diff --git a/references.txt b/references.txt index f6a1c5f431..5605231089 100644 --- a/references.txt +++ b/references.txt @@ -1,141028 +1,96869 @@ -CVE-2000-0045 - http://www.securityfocus.com/bid/926 -CVE-2000-0052 - http://www.l0pht.com/advisories/pam_advisory -CVE-2000-0119 - http://marc.info/?l=bugtraq&m=94936267131123&w=2 -CVE-2000-0219 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2000-0275 - http://www.l0pht.com/advisories/cc-pinextract.txt -CVE-2000-0342 - http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 -CVE-2000-0359 - http://www.securityfocus.com/bid/1248 -CVE-2000-0384 - http://www.l0pht.com/advisories/ipivot7180.html -CVE-2000-0405 - http://www.l0pht.com/advisories/asniff_advisory.txt -CVE-2000-0427 - http://www.l0pht.com/advisories/etoken-piepa.txt -CVE-2000-0428 - http://www.nai.com/nai_labs/asp_set/advisory/39_Trend.asp -CVE-2000-0455 - http://www.nai.com/nai_labs/asp_set/advisory/41initialized.asp -CVE-2000-0500 - http://marc.info/?l=bugtraq&m=96161462915381&w=2 -CVE-2000-0538 - http://marc.info/?l=bugtraq&m=96045469627806&w=2 -CVE-2000-0613 - http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml -CVE-2000-0622 - http://www.nai.com/research/covert/advisories/043.asp -CVE-2000-0625 - http://www.l0pht.com/advisories/netzero.txt -CVE-2000-0632 - http://www.nai.com/nai_labs/asp_set/advisory/43_Advisory.asp -CVE-2000-0635 - http://www.zdnet.com/zdnn/stories/news/0,4586,2600258,00.html -CVE-2000-0673 - http://www.nai.com/research/covert/advisories/044.asp -CVE-2000-0778 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A927 -CVE-2000-0867 - http://www.redhat.com/support/errata/RHSA-2000-061.html -CVE-2000-0892 - http://www.kb.cert.org/vuls/id/22404 -CVE-2000-0979 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A996 -CVE-2000-1034 - http://www.securityfocus.com/bid/1899 -CVE-2000-1049 - http://marc.info/?l=bugtraq&m=97310314724964&w=2 -CVE-2000-1050 - http://marc.info/?l=bugtraq&m=97236316510117&w=2 -CVE-2000-1053 - http://marc.info/?l=bugtraq&m=97236125107957&w=2 -CVE-2000-1079 - http://www.nai.com/research/covert/advisories/045.asp -CVE-2000-1081 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 -CVE-2000-1082 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 -CVE-2000-1083 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 -CVE-2000-1084 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 -CVE-2000-1085 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 -CVE-2000-1086 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 -CVE-2000-1087 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 -CVE-2000-1088 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 -CVE-2000-1103 - http://www.securityfocus.com/archive/1/147120 -CVE-2000-1196 - http://packetstormsecurity.org/0004-exploits/ooo1.txt -CVE-2000-1207 - http://marc.info/?l=bugtraq&m=97034397026473&w=2 -CVE-2000-1216 - http://www.kb.cert.org/vuls/id/433499 -CVE-2000-1220 - http://www.l0pht.com/advisories/lpd_advisory -CVE-2000-1221 - http://www.l0pht.com/advisories/lpd_advisory -CVE-2001-0002 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A920 -CVE-2001-0010 - http://www.nai.com/research/covert/advisories/047.asp -CVE-2001-0011 - http://www.nai.com/research/covert/advisories/047.asp -CVE-2001-0012 - http://www.nai.com/research/covert/advisories/047.asp -CVE-2001-0013 - http://www.nai.com/research/covert/advisories/047.asp -CVE-2001-0115 - http://marc.info/?l=bugtraq&m=97934312727101&w=2 -CVE-2001-0134 - http://marc.info/?l=bugtraq&m=97967435023835&w=2 -CVE-2001-0151 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A90 -CVE-2001-0241 - http://marc.info/?l=bugtraq&m=98874912915948&w=2 -CVE-2001-0247 - http://www.nai.com/research/covert/advisories/048.asp -CVE-2001-0248 - http://www.nai.com/research/covert/advisories/048.asp -CVE-2001-0249 - http://www.nai.com/research/covert/advisories/048.asp -CVE-2001-0323 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2001-0328 - http://securityreason.com/securityalert/57 -CVE-2001-0341 - http://marc.info/?l=bugtraq&m=99348216322147&w=2 -CVE-2001-0414 - http://marc.info/?l=bugtraq&m=98642418618512&w=2 -CVE-2001-0441 - http://www.redhat.com/support/errata/RHSA-2001-028.html -CVE-2001-0464 - http://marc.info/?l=bugtraq&m=98761402029302&w=2 -CVE-2001-0465 - http://www.turbotax.com/atr/update/ -CVE-2001-0486 - http://marc.info/?l=bugtraq&m=98865027328391&w=2 -CVE-2001-0498 - http://www.nai.com/research/covert/advisories/049.asp -CVE-2001-0499 - http://www.nai.com/research/covert/advisories/050.asp -CVE-2001-0507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A909 -CVE-2001-0507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A912 -CVE-2001-0515 - http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf -CVE-2001-0516 - http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf -CVE-2001-0517 - http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf -CVE-2001-0548 - http://marc.info/?l=bugtraq&m=99598918914068&w=2 -CVE-2001-0550 - http://marc.info/?l=bugtraq&m=100700363414799&w=2 -CVE-2001-0554 - http://www.redhat.com/support/errata/RHSA-2001-099.html -CVE-2001-0557 - https://exchange.xforce.ibmcloud.com/vulnerabilities/6513 -CVE-2001-0652 - http://marc.info/?l=bugtraq&m=99745571104126&w=2 -CVE-2001-0685 - http://marc.info/?l=bugtraq&m=98339581702282&w=2 -CVE-2001-0727 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A921 -CVE-2001-0740 - http://marc.info/?l=bugtraq&m=100119572524232&w=2 -CVE-2001-0820 - http://marc.info/?l=bugtraq&m=99406263214417&w=2 -CVE-2001-0836 - http://marc.info/?l=bugtraq&m=100342151132277&w=2 -CVE-2001-0853 - http://marc.info/?l=bugtraq&m=100498111712723&w=2 -CVE-2001-0920 - http://marc.info/?l=bugtraq&m=100680319004162&w=2 -CVE-2001-0927 - http://marc.info/?l=bugtraq&m=100689302316077&w=2 -CVE-2001-0931 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 -CVE-2001-0932 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 -CVE-2001-0933 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 -CVE-2001-0934 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 -CVE-2001-0946 - http://marc.info/?l=bugtraq&m=100743394701962&w=2 -CVE-2001-0998 - http://www-1.ibm.com/support/search.wss?rs=0&q=IY20943&apar=only -CVE-2001-1002 - http://marc.info/?l=bugtraq&m=99892644616749&w=2 -CVE-2001-1201 - http://marc.info/?l=bugtraq&m=100863301405266&w=2 -CVE-2001-1288 - http://marc.info/?l=vuln-dev&m=99651044701417&w=2 -CVE-2001-1362 - http://freshmeat.net/releases/51981/ -CVE-2001-1390 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1391 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1392 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1393 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1394 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1395 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1396 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1397 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1398 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1399 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1400 - http://www.redhat.com/support/errata/RHSA-2001-047.html -CVE-2001-1410 - http://marc.info/?l=bugtraq&m=105829174431769&w=2 -CVE-2001-1455 - http://www.securityfocus.com/bid/6060 -CVE-2001-1458 - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/advisories_template.htm%3Findexid%3D12 -CVE-2001-1499 - http://www.osvdb.org/20210 -CVE-2002-0022 - http://marc.info/?l=bugtraq&m=101362984930597&w=2 -CVE-2002-0022 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A925 -CVE-2002-0027 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A974 -CVE-2002-0058 - http://marc.info/?l=bugtraq&m=101534535304228&w=2 -CVE-2002-0073 - http://marc.info/?l=bugtraq&m=101901273810598&w=2 -CVE-2002-0078 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A96 -CVE-2002-0081 - http://marc.info/?l=bugtraq&m=101484705523351&w=2 -CVE-2002-0081 - http://marc.info/?l=bugtraq&m=101537076619812&w=2 -CVE-2002-0081 - http://marc.info/?l=ntbugtraq&m=101484975231922&w=2 -CVE-2002-0081 - http://security.e-matters.de/advisories/012002.html -CVE-2002-0082 - http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html -CVE-2002-0084 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A97 -CVE-2002-0098 - http://www.boozt.com/news_detail.php?id=3 -CVE-2002-0133 - http://marc.info/?l=bugtraq&m=101366658112809&w=2 -CVE-2002-0133 - http://marc.info/?l=bugtraq&m=101424723728817&w=2 -CVE-2002-0134 - http://marc.info/?l=bugtraq&m=101424723728817&w=2 -CVE-2002-0137 - http://marc.info/?l=bugtraq&m=101102759631000&w=2 -CVE-2002-0138 - http://marc.info/?l=bugtraq&m=101102759631000&w=2 -CVE-2002-0138 - http://marc.info/?l=bugtraq&m=101111688819855&w=2 -CVE-2002-0148 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A92 -CVE-2002-0149 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A95 -CVE-2002-0162 - http://marc.info/?l=bugtraq&m=101724766216872 -CVE-2002-0184 - http://marc.info/?l=bugtraq&m=101974610509912&w=2 -CVE-2002-0190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A923 -CVE-2002-0191 - http://marc.info/?l=bugtraq&m=101778302030981&w=2 -CVE-2002-0193 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A99 -CVE-2002-0200 - http://marc.info/?l=bugtraq&m=101174569103289&w=2 -CVE-2002-0201 - http://marc.info/?l=bugtraq&m=101174569103289&w=2 -CVE-2002-0231 - http://marc.info/?l=bugtraq&m=101286747013955&w=2 -CVE-2002-0241 - http://www.cisco.com/warp/public/707/ciscosecure-acs-nds-authentication-vuln-pub.shtml -CVE-2002-0244 - http://marc.info/?l=bugtraq&m=101310622531303&w=2 -CVE-2002-0252 - https://www.exploit-db.com/exploits/4673 -CVE-2002-0283 - http://marc.info/?l=bugtraq&m=101408718030099&w=2 -CVE-2002-0287 - http://marc.info/?l=bugtraq&m=101389284625019&w=2 -CVE-2002-0288 - http://marc.info/?l=bugtraq&m=101408906001958&w=2 -CVE-2002-0289 - http://marc.info/?l=bugtraq&m=101408906001958&w=2 -CVE-2002-0292 - http://marc.info/?l=bugtraq&m=101414005501708&w=2 -CVE-2002-0309 - http://marc.info/?l=bugtraq&m=101424307617060&w=2 -CVE-2002-0314 - http://marc.info/?l=bugtraq&m=101441689224760&w=2 -CVE-2002-0315 - http://marc.info/?l=bugtraq&m=101441689224760&w=2 -CVE-2002-0319 - http://marc.info/?l=bugtraq&m=101446366708757&w=2 -CVE-2002-0326 - http://marc.info/?l=bugtraq&m=101474387016066&w=2 -CVE-2002-0346 - http://marc.info/?l=bugtraq&m=101495944202452&w=2 -CVE-2002-0347 - http://marc.info/?l=bugtraq&m=101495944202452&w=2 -CVE-2002-0348 - http://marc.info/?l=bugtraq&m=101495944202452&w=2 -CVE-2002-0354 - http://marc.info/?l=bugtraq&m=102017952204097&w=2 -CVE-2002-0354 - http://marc.info/?l=ntbugtraq&m=102020343728766&w=2 -CVE-2002-0359 - http://marc.info/?l=bugtraq&m=102459162909825&w=2 -CVE-2002-0370 - http://securityreason.com/securityalert/587 -CVE-2002-0371 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A98 -CVE-2002-0391 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9 -CVE-2002-0440 - http://seclists.org/lists/bugtraq/2002/Mar/0162.html -CVE-2002-0470 - http://seclists.org/bugtraq/2002/Mar/0263.html -CVE-2002-0471 - http://seclists.org/bugtraq/2002/Mar/0263.html -CVE-2002-0473 - http://prdownloads.sourceforge.net/phpbb/phpBB-2.0.1.zip -CVE-2002-0598 - http://www.foundstone.com/knowledge/fscan112_advisory.html -CVE-2002-0619 - http://marc.info/?l=bugtraq&m=102139136019862&w=2 -CVE-2002-0648 - http://marc.info/?l=bugtraq&m=103011639524314&w=2 -CVE-2002-0652 - http://marc.info/?l=bugtraq&m=102459162909825&w=2 -CVE-2002-0653 - http://marc.info/?l=bugtraq&m=102513970919836&w=2 -CVE-2002-0662 - http://marc.info/?l=bugtraq&m=103098575826031&w=2 -CVE-2002-0677 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A91 -CVE-2002-0693 - http://marc.info/?l=bugtraq&m=103419115517344&w=2 -CVE-2002-0717 - http://marc.info/?l=bugtraq&m=102734516023281&w=2 -CVE-2002-0727 - http://marc.info/?l=bugtraq&m=101829645415486&w=2 -CVE-2002-0797 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A94 -CVE-2002-0813 - http://marc.info/?l=bugtraq&m=103002169829669&w=2 -CVE-2002-0816 - http://marc.info/?l=bugtraq&m=102709593117171&w=2 -CVE-2002-0817 - http://marc.info/?l=bugtraq&m=102812622416695&w=2 -CVE-2002-0820 - http://marc.info/?l=bugtraq&m=102979180524452&w=2 -CVE-2002-0823 - http://marc.info/?l=bugtraq&m=102822806329440&w=2 -CVE-2002-0838 - http://marc.info/?l=bugtraq&m=103305615613319&w=2 -CVE-2002-0859 - http://marc.info/?l=bugtraq&m=102450188620081&w=2 -CVE-2002-0860 - http://marc.info/?l=bugtraq&m=101829911018463&w=2 -CVE-2002-0861 - http://marc.info/?l=bugtraq&m=101829726516346&w=2 -CVE-2002-0866 - http://www.kb.cert.org/vuls/id/307306 -CVE-2002-0869 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A929 -CVE-2002-0869 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A930 -CVE-2002-0869 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A983 -CVE-2002-0887 - http://marc.info/?l=bugtraq&m=99057164129869&w=2 -CVE-2002-0898 - http://marc.info/?l=ntbugtraq&m=102256058220402&w=2 -CVE-2002-0909 - http://marc.info/?l=bugtraq&m=102306166201275&w=2 -CVE-2002-0909 - http://marc.info/?l=vuln-dev&m=102297259123103&w=2 -CVE-2002-0945 - http://www.seanox.de/projects.devwex.php -CVE-2002-0946 - http://www.seanox.de/projects.devwex.php -CVE-2002-0968 - http://marc.info/?l=bugtraq&m=102563702928443&w=2 -CVE-2002-0985 - http://www.redhat.com/support/errata/RHSA-2002-213.html -CVE-2002-0986 - http://www.redhat.com/support/errata/RHSA-2002-213.html -CVE-2002-1053 - http://www.w3.org/Jigsaw/RelNotes.html#2.2.1 -CVE-2002-1079 - http://www.osvdb.org/3285 -CVE-2002-1091 - http://marc.info/?l=bugtraq&m=103134051120770&w=2 -CVE-2002-1119 - http://www.redhat.com/support/errata/RHSA-2003-048.html -CVE-2002-1120 - https://www.exploit-db.com/exploits/16770/ -CVE-2002-1142 - http://www.foundstone.com/knowledge/randd-advisories-display.html?id=337 -CVE-2002-1143 - http://marc.info/?l=bugtraq&m=103040003014999&w=2 -CVE-2002-1143 - http://marc.info/?l=bugtraq&m=103252858816401&w=2 -CVE-2002-1155 - http://marc.info/?l=bugtraq&m=105474080512376&w=2 -CVE-2002-1155 - http://marc.info/?l=bugtraq&m=105577912106710&w=2 -CVE-2002-1156 - http://www.securityfocus.com/bid/6065 -CVE-2002-1160 - http://marc.info/?l=bugtraq&m=104431622818954&w=2 -CVE-2002-1160 - http://www.kb.cert.org/vuls/id/911505 -CVE-2002-1170 - http://www.redhat.com/support/errata/RHSA-2002-228.html -CVE-2002-1174 - http://marc.info/?l=bugtraq&m=103340148625187&w=2 -CVE-2002-1175 - http://marc.info/?l=bugtraq&m=103340148625187&w=2 -CVE-2002-1180 - http://www.securityfocus.com/bid/6068 -CVE-2002-1180 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A931 -CVE-2002-1181 - http://www.securityfocus.com/bid/6068 -CVE-2002-1181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A942 -CVE-2002-1181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A944 -CVE-2002-1182 - http://www.securityfocus.com/bid/6068 -CVE-2002-1187 - http://marc.info/?l=bugtraq&m=103158601431054&w=2 -CVE-2002-1217 - http://marc.info/?l=bugtraq&m=103470310417576&w=2 -CVE-2002-1217 - http://marc.info/?l=ntbugtraq&m=103470202010570&w=2 -CVE-2002-1254 - http://marc.info/?l=bugtraq&m=103530131201191&w=2 -CVE-2002-1317 - http://www.securityfocus.com/bid/6241 -CVE-2002-1337 - http://marc.info/?l=bugtraq&m=104678739608479&w=2 -CVE-2002-1338 - http://marc.info/?l=bugtraq&m=101830175621193&w=2 -CVE-2002-1339 - http://marc.info/?l=bugtraq&m=101830175621193&w=2 -CVE-2002-1340 - http://marc.info/?l=bugtraq&m=101830175621193&w=2 -CVE-2002-1364 - http://marc.info/?l=bugtraq&m=103858895600963&w=2 -CVE-2002-1365 - http://marc.info/?l=bugtraq&m=103979751818638&w=2 -CVE-2002-1365 - http://security.e-matters.de/advisories/052002.html -CVE-2002-1366 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1367 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1368 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1369 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1371 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1372 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1373 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 -CVE-2002-1373 - http://security.e-matters.de/advisories/042002.html -CVE-2002-1374 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 -CVE-2002-1374 - http://security.e-matters.de/advisories/042002.html -CVE-2002-1375 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 -CVE-2002-1375 - http://security.e-matters.de/advisories/042002.html -CVE-2002-1376 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 -CVE-2002-1376 - http://security.e-matters.de/advisories/042002.html -CVE-2002-1383 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 -CVE-2002-1398 - http://www.novell.com/linux/security/advisories/2002_038_postgresql.html -CVE-2002-1400 - http://www.novell.com/linux/security/advisories/2002_038_postgresql.html -CVE-2002-1444 - http://www.securityfocus.com/bid/5477 -CVE-2002-1456 - http://marc.info/?l=bugtraq&m=103046375002380&w=2 -CVE-2002-1456 - http://marc.info/?l=ntbugtraq&m=103046138631893&w=2 -CVE-2002-1590 - http://www.securityfocus.com/bid/6061 -CVE-2002-1914 - http://www.redhat.com/support/errata/RHSA-2005-583.html -CVE-2002-1996 - http://sourceforge.net/tracker/index.php?func=detail&aid=524777&group_id=27927&atid=392228 -CVE-2002-20001 - https://dheatattack.com -CVE-2002-20001 - https://dheatattack.gitlab.io/ -CVE-2002-20001 - https://github.com/Balasys/dheater -CVE-2002-20001 - https://github.com/mozilla/ssl-config-generator/issues/162 -CVE-2002-20001 - https://gitlab.com/dheatattack/dheater -CVE-2002-20001 - https://ieeexplore.ieee.org/document/10374117 -CVE-2002-20001 - https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/ -CVE-2002-2048 - http://marc.info/?l=vuln-dev&m=102321152215055&w=2 -CVE-2002-2175 - http://marc.info/?l=bugtraq&m=102508071021631&w=2 -CVE-2002-2181 - http://www.securityfocus.com/bid/6063 -CVE-2002-2185 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2002-2185 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2002-2217 - https://www.exploit-db.com/exploits/2318 -CVE-2002-2226 - http://securityreason.com/securityalert/3160 -CVE-2002-2246 - http://www.deerfield.com/products/visnetic_website/ -CVE-2002-2281 - http://marc.info/?l=bugtraq&m=103798147613151&w=2 -CVE-2002-2284 - http://marc.info/?l=bugtraq&m=103798147613151&w=2 -CVE-2002-2380 - http://www.securityfocus.com/bid/6064 -CVE-2002-2381 - http://www.securityfocus.com/bid/6062 -CVE-2002-2426 - http://packetstormsecurity.org/0210-exploits/hackingcitrix.txt -CVE-2002-2435 - http://bugzilla.mozilla.org/show_bug.cgi?id=147777 -CVE-2002-2436 - http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ -CVE-2002-2436 - http://bugzilla.mozilla.org/show_bug.cgi?id=147777 -CVE-2002-2437 - http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ -CVE-2002-2437 - http://bugzilla.mozilla.org/show_bug.cgi?id=147777 -CVE-2003-0001 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2003-0015 - http://security.e-matters.de/advisories/012003.html -CVE-2003-0025 - http://marc.info/?l=bugtraq&m=104204786206563&w=2 -CVE-2003-0056 - http://marc.info/?l=bugtraq&m=104342864418213&w=2 -CVE-2003-0062 - http://marc.info/?l=bugtraq&m=104490777824360&w=2 -CVE-2003-0075 - http://marc.info/?l=bugtraq&m=104428700106672&w=2 -CVE-2003-0091 - http://packetstormsecurity.org/0304-advisories/sa2003-02.txt -CVE-2003-0097 - http://www.slackware.com/changelog/current.php?cpu=i386 -CVE-2003-0100 - http://marc.info/?l=bugtraq&m=104576100719090&w=2 -CVE-2003-0100 - http://marc.info/?l=bugtraq&m=104587206702715&w=2 -CVE-2003-0105 - http://marc.info/?l=bugtraq&m=109215441332682&w=2 -CVE-2003-0106 - http://marc.info/?l=bugtraq&m=104869513822233&w=2 -CVE-2003-0106 - http://marc.info/?l=ntbugtraq&m=104868285106289&w=2 -CVE-2003-0107 - http://marc.info/?l=bugtraq&m=104610337726297&w=2 -CVE-2003-0109 - http://marc.info/?l=bugtraq&m=104861839130254&w=2 -CVE-2003-0113 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A926 -CVE-2003-0114 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A963 -CVE-2003-0121 - http://marc.info/?l=bugtraq&m=104716030503607&w=2 -CVE-2003-0128 - http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 -CVE-2003-0129 - http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 -CVE-2003-0130 - http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 -CVE-2003-0132 - http://marc.info/?l=bugtraq&m=104982175321731&w=2 -CVE-2003-0132 - http://marc.info/?l=bugtraq&m=104994309010974&w=2 -CVE-2003-0132 - http://marc.info/?l=bugtraq&m=105001663120995&w=2 -CVE-2003-0140 - http://marc.info/?l=bugtraq&m=104818814931378&w=2 -CVE-2003-0143 - http://marc.info/?l=bugtraq&m=104739841223916&w=2 -CVE-2003-0148 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp -CVE-2003-0149 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp -CVE-2003-0190 - http://lab.mediaservice.net/advisory/2003-01-openssh.txt -CVE-2003-0190 - http://marc.info/?l=bugtraq&m=105172058404810&w=2 -CVE-2003-0190 - http://www.redhat.com/support/errata/RHSA-2003-222.html -CVE-2003-0197 - http://marc.info/?l=bugtraq&m=104940730819887&w=2 -CVE-2003-0203 - http://marc.info/?l=bugtraq&m=104610380126860&w=2 -CVE-2003-0209 - http://marc.info/?l=bugtraq&m=105111217731583&w=2 -CVE-2003-0219 - http://marc.info/?l=bugtraq&m=105155734411836&w=2 -CVE-2003-0220 - http://marc.info/?l=bugtraq&m=105155734411836&w=2 -CVE-2003-0226 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A933 -CVE-2003-0227 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A936 -CVE-2003-0227 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A966 -CVE-2003-0264 - http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execution.html -CVE-2003-0274 - http://marc.info/?l=bugtraq&m=105241224228693&w=2 -CVE-2003-0281 - http://marc.info/?l=bugtraq&m=105259012802997&w=2 -CVE-2003-0286 - http://packetstormsecurity.org/0305-exploits/snitz_exec.txt -CVE-2003-0306 - http://marc.info/?l=bugtraq&m=105284486526310&w=2 -CVE-2003-0306 - http://marc.info/?l=vuln-dev&m=105241032526289&w=2 -CVE-2003-0309 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A948 -CVE-2003-0330 - http://marc.info/?l=bugtraq&m=105344891005369&w=2 -CVE-2003-0337 - http://marc.info/?l=bugtraq&m=105361879109409&w=2 -CVE-2003-0344 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A922 -CVE-2003-0347 - http://marc.info/?l=bugtraq&m=106262077829157&w=2 -CVE-2003-0349 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A938 -CVE-2003-0353 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A961 -CVE-2003-0353 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A962 -CVE-2003-0377 - http://marc.info/?l=bugtraq&m=105370528728225&w=2 -CVE-2003-0386 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9894 -CVE-2003-0390 - http://marc.info/?l=bugtraq&m=105121918523320&w=2 -CVE-2003-0407 - http://marc.info/?l=bugtraq&m=105405668423102&w=2 -CVE-2003-0408 - http://marc.info/?l=bugtraq&m=105405629622652&w=2 -CVE-2003-0446 - http://marc.info/?l=bugtraq&m=105585986015421&w=2 -CVE-2003-0446 - http://marc.info/?l=bugtraq&m=105595990924165&w=2 -CVE-2003-0446 - http://marc.info/?l=ntbugtraq&m=105585001905002&w=2 -CVE-2003-0449 - http://marc.info/?l=bugtraq&m=105561134624665&w=2 -CVE-2003-0449 - http://marc.info/?l=bugtraq&m=105561189625082&w=2 -CVE-2003-0456 - http://marc.info/?l=bugtraq&m=105733894003737&w=2 -CVE-2003-0461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9330 -CVE-2003-0461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A997 -CVE-2003-0462 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0471 - http://marc.info/?l=bugtraq&m=105648385900792&w=2 -CVE-2003-0476 - http://marc.info/?l=bugtraq&m=105664924024009&w=2 -CVE-2003-0485 - http://marc.info/?l=bugtraq&m=105613243117155&w=2 -CVE-2003-0501 - http://marc.info/?l=bugtraq&m=105621758104242 -CVE-2003-0501 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0504 - http://www.security-corporation.com/articles-20030702-005.html -CVE-2003-0508 - http://marc.info/?l=bugtraq&m=105709569312583&w=2 -CVE-2003-0508 - http://marc.info/?l=bugtraq&m=105785749721291&w=2 -CVE-2003-0509 - http://marc.info/?l=bugtraq&m=105709450711395&w=2 -CVE-2003-0522 - http://marc.info/?l=bugtraq&m=105733145930031&w=2 -CVE-2003-0522 - http://marc.info/?l=bugtraq&m=105760660928715&w=2 -CVE-2003-0524 - http://marc.info/?l=bugtraq&m=105769387706906&w=2 -CVE-2003-0526 - http://marc.info/?l=bugtraq&m=105838519729525&w=2 -CVE-2003-0526 - http://marc.info/?l=ntbugtraq&m=105838590030409&w=2 -CVE-2003-0533 - http://marc.info/?l=bugtraq&m=108325860431471&w=2 -CVE-2003-0533 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A919 -CVE-2003-0542 - http://www.securityfocus.com/bid/9504 -CVE-2003-0542 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458 -CVE-2003-0550 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0551 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0552 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0553 - http://marc.info/?l=bugtraq&m=105820193406838&w=2 -CVE-2003-0560 - http://marc.info/?l=bugtraq&m=105733277731084&w=2 -CVE-2003-0561 - http://marc.info/?l=bugtraq&m=105769805311484&w=2 -CVE-2003-0564 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A914 -CVE-2003-0575 - http://marc.info/?l=bugtraq&m=105958240709302&w=2 -CVE-2003-0578 - http://marc.info/?l=bugtraq&m=105839150004682&w=2 -CVE-2003-0579 - http://marc.info/?l=bugtraq&m=105838948002337&w=2 -CVE-2003-0580 - http://marc.info/?l=bugtraq&m=105839042603476&w=2 -CVE-2003-0581 - http://marc.info/?l=bugtraq&m=105829691405446&w=2 -CVE-2003-0583 - http://marc.info/?l=bugtraq&m=105846288808846&w=2 -CVE-2003-0584 - http://marc.info/?l=bugtraq&m=105846288808846&w=2 -CVE-2003-0585 - http://marc.info/?l=bugtraq&m=105845898003616&w=2 -CVE-2003-0586 - http://marc.info/?l=bugtraq&m=105845898003616&w=2 -CVE-2003-0594 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A917 -CVE-2003-0594 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9826 -CVE-2003-0605 - http://marc.info/?l=bugtraq&m=105880332428706&w=2 -CVE-2003-0610 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp -CVE-2003-0616 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp -CVE-2003-0619 - http://marc.info/?l=bugtraq&m=105950927708272&w=2 -CVE-2003-0619 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0621 - http://marc.info/?l=bugtraq&m=106762000607681&w=2 -CVE-2003-0622 - http://marc.info/?l=bugtraq&m=106762000607681&w=2 -CVE-2003-0623 - http://marc.info/?l=bugtraq&m=106762000607681&w=2 -CVE-2003-0624 - http://marc.info/?l=bugtraq&m=106761926906781&w=2 -CVE-2003-0641 - http://marc.info/?l=bugtraq&m=105848106631132&w=2 -CVE-2003-0642 - http://marc.info/?l=bugtraq&m=105848106631132&w=2 -CVE-2003-0655 - http://marc.info/?l=bugtraq&m=105978381618095&w=2 -CVE-2003-0685 - http://marc.info/?l=bugtraq&m=106071059430211&w=2 -CVE-2003-0693 - http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010135.html -CVE-2003-0699 - http://www.redhat.com/support/errata/RHSA-2003-239.html -CVE-2003-0717 - http://marc.info/?l=bugtraq&m=106666713812158&w=2 -CVE-2003-0719 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A903 -CVE-2003-0719 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A951 -CVE-2003-0721 - http://marc.info/?l=bugtraq&m=106367213400313&w=2 -CVE-2003-0727 - https://www.exploit-db.com/exploits/42780/ -CVE-2003-0735 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 -CVE-2003-0736 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 -CVE-2003-0737 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 -CVE-2003-0738 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 -CVE-2003-0739 - http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1106 -CVE-2003-0740 - http://marc.info/?l=bugtraq&m=106260760211958&w=2 -CVE-2003-0746 - http://www.kb.cert.org/vuls/id/377804 -CVE-2003-0758 - http://www.coresecurity.com/common/showdoc.php?idx=366&idxseccion=10 -CVE-2003-0759 - http://www.coresecurity.com/common/showdoc.php?idx=366&idxseccion=10 -CVE-2003-0767 - http://marc.info/?l=bugtraq&m=106304902323758&w=2 -CVE-2003-0770 - http://marc.info/?l=bugtraq&m=106381136115972&w=2 -CVE-2003-0780 - http://marc.info/?l=bugtraq&m=106364207129993&w=2 -CVE-2003-0789 - http://www.securityfocus.com/bid/9504 -CVE-2003-0807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A969 -CVE-2003-0807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A995 -CVE-2003-0812 - http://marc.info/?l=bugtraq&m=106865197102041&w=2 -CVE-2003-0812 - http://www.kb.cert.org/vuls/id/567620 -CVE-2003-0813 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A900 -CVE-2003-0831 - https://www.exploit-db.com/exploits/107/ -CVE-2003-0845 - http://marc.info/?l=bugtraq&m=106546044416498&w=2 -CVE-2003-0845 - http://marc.info/?l=bugtraq&m=106547728803252&w=2 -CVE-2003-0848 - http://marc.info/?l=bugtraq&m=106589631819348&w=2 -CVE-2003-0854 - https://www.exploit-db.com/exploits/115 -CVE-2003-0906 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A959 -CVE-2003-0907 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 -CVE-2003-0910 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A911 -CVE-2003-0925 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9692 -CVE-2003-0927 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9691 -CVE-2003-0935 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9802 -CVE-2003-0936 - http://marc.info/?l=bugtraq&m=106875764826251&w=2 -CVE-2003-0946 - http://marc.info/?l=bugtraq&m=106867135830683&w=2 -CVE-2003-0961 - http://marc.info/?l=bugtraq&m=107064830206816&w=2 -CVE-2003-0962 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9415 -CVE-2003-0967 - http://marc.info/?l=bugtraq&m=106944220426970 -CVE-2003-0968 - http://marc.info/?l=bugtraq&m=106986437621130&w=2 -CVE-2003-0974 - http://marc.info/?l=bugtraq&m=107004362416252&w=2 -CVE-2003-0984 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9406 -CVE-2003-0985 - http://isec.pl/vulnerabilities/isec-0013-mremap.txt -CVE-2003-0985 - http://marc.info/?l=bugtraq&m=107332782121916&w=2 -CVE-2003-0985 - http://marc.info/?l=bugtraq&m=107340358402129&w=2 -CVE-2003-0986 - http://www.redhat.com/support/errata/RHSA-2004-017.html -CVE-2003-0986 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9707 -CVE-2003-0990 - http://marc.info/?l=bugtraq&m=107247236124180&w=2 -CVE-2003-1026 - http://marc.info/?l=bugtraq&m=107038202225587&w=2 -CVE-2003-1026 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A643 -CVE-2003-1027 - http://marc.info/?l=bugtraq&m=107038202225587&w=2 -CVE-2003-1028 - http://marc.info/?l=bugtraq&m=107038202225587&w=2 -CVE-2003-1033 - http://marc.info/?l=bugtraq&m=105103613727471&w=2 -CVE-2003-1034 - http://marc.info/?l=bugtraq&m=104914778303805&w=2 -CVE-2003-1040 - http://www.redhat.com/support/errata/RHSA-2004-065.html -CVE-2003-1040 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9423 -CVE-2003-1041 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 -CVE-2003-1041 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A956 -CVE-2003-1048 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 -CVE-2003-1073 - http://isec.pl/vulnerabilities/isec-0008-sun-at.txt -CVE-2003-1094 - http://www.securityfocus.com/bid/8320 -CVE-2003-1143 - http://aluigi.altervista.org/adv/ssboom-adv.txt -CVE-2003-1154 - http://www.computerworld.co.nz/cw.nsf/0/BF9E8E6E2D313E5FCC256DD70016473F?OpenDocument&More= -CVE-2003-1215 - http://marc.info/?l=bugtraq&m=107273069130885&w=2 -CVE-2003-1216 - http://marc.info/?l=bugtraq&m=107196735102970&w=2 -CVE-2003-1292 - https://www.exploit-db.com/exploits/1864 -CVE-2003-1299 - http://packetstormsecurity.org/0305-exploits/baby.txt -CVE-2003-1300 - http://packetstormsecurity.org/0305-exploits/baby.txt -CVE-2003-1310 - http://www.securityfocus.com/bid/8329 -CVE-2003-1314 - https://www.exploit-db.com/exploits/2980 -CVE-2003-1318 - http://marc.info/?l=bugtraq&m=105820430209748&w=2 -CVE-2003-1325 - http://packetstormsecurity.org/0304-exploits/hl-headnut.c -CVE-2003-1339 - http://marc.info/?l=bugtraq&m=107090390002654&w=2 -CVE-2003-1339 - https://www.exploit-db.com/exploits/133 -CVE-2003-1340 - http://securityreason.com/securityalert/3185 -CVE-2003-1348 - http://securityreason.com/securityalert/3227 -CVE-2003-1354 - http://seclists.org/lists/bugtraq/2003/Jan/0178.html -CVE-2003-1358 - http://securityreason.com/securityalert/3236 -CVE-2003-1359 - http://securityreason.com/securityalert/3236 -CVE-2003-1360 - http://securityreason.com/securityalert/3236 -CVE-2003-1376 - http://securityreason.com/securityalert/3265 -CVE-2003-1381 - http://securityreason.com/securityalert/3258 -CVE-2003-1397 - http://securityreason.com/securityalert/3255 -CVE-2003-1418 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2003-1497 - http://securityreason.com/securityalert/3298 -CVE-2003-1531 - http://www.security-corporation.com/index.php?id=advisories&a=013-FR -CVE-2003-1550 - http://www.security-corporation.com/index.php?id=advisories&a=011-FR -CVE-2003-1556 - http://securityreason.com/securityalert/3796 -CVE-2003-1559 - http://securityreason.com/securityalert/3989 -CVE-2003-1560 - http://securityreason.com/securityalert/4004 -CVE-2003-1561 - http://securityreason.com/securityalert/4004 -CVE-2003-1564 - http://www.reddit.com/r/programming/comments/65843/time_to_upgrade_libxml2 -CVE-2003-1571 - https://www.exploit-db.com/exploits/7488 -CVE-2003-1573 - http://seclists.org/bugtraq/2003/Dec/0249.html -CVE-2003-5001 - https://vuldb.com/?id.104 -CVE-2003-5003 - https://vuldb.com/?id.296 -CVE-2004-0001 - http://www.redhat.com/support/errata/RHSA-2004-017.html -CVE-2004-0003 - http://www.redhat.com/support/errata/RHSA-2004-065.html -CVE-2004-0003 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9204 -CVE-2004-0005 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 -CVE-2004-0006 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 -CVE-2004-0007 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 -CVE-2004-0007 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9906 -CVE-2004-0008 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 -CVE-2004-0008 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9469 -CVE-2004-0010 - http://www.redhat.com/support/errata/RHSA-2004-065.html -CVE-2004-0034 - http://marc.info/?l=bugtraq&m=107340481804110&w=2 -CVE-2004-0035 - http://marc.info/?l=bugtraq&m=107340481804110&w=2 -CVE-2004-0055 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9989 -CVE-2004-0059 - http://marc.info/?l=bugtraq&m=107411794303201&w=2 -CVE-2004-0060 - http://marc.info/?l=bugtraq&m=107411794303201&w=2 -CVE-2004-0061 - http://marc.info/?l=bugtraq&m=107411794303201&w=2 -CVE-2004-0065 - http://marc.info/?l=bugtraq&m=107394912715478&w=2 -CVE-2004-0066 - http://marc.info/?l=bugtraq&m=107394912715478&w=2 -CVE-2004-0067 - http://marc.info/?l=bugtraq&m=107394912715478&w=2 -CVE-2004-0069 - http://marc.info/?l=bugtraq&m=107367110805273&w=2 -CVE-2004-0069 - http://marc.info/?l=bugtraq&m=107401398014761&w=2 -CVE-2004-0075 - http://www.redhat.com/support/errata/RHSA-2004-065.html -CVE-2004-0077 - http://marc.info/?l=bugtraq&m=107711762014175&w=2 -CVE-2004-0077 - http://security.gentoo.org/glsa/glsa-200403-02.xml -CVE-2004-0077 - http://www.redhat.com/support/errata/RHSA-2004-065.html -CVE-2004-0079 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975 -CVE-2004-0079 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779 -CVE-2004-0081 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902 -CVE-2004-0083 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612 -CVE-2004-0085 - http://www.securityfocus.com/bid/9504 -CVE-2004-0086 - http://www.securityfocus.com/bid/9504 -CVE-2004-0087 - http://www.securityfocus.com/bid/9504 -CVE-2004-0088 - http://www.securityfocus.com/bid/9504 -CVE-2004-0090 - http://www.securityfocus.com/bid/9504 -CVE-2004-0091 - http://marc.info/?l=bugtraq&m=107462349324945&w=2 -CVE-2004-0091 - http://marc.info/?l=vuln-dev&m=107462499927040&w=2 -CVE-2004-0092 - http://www.securityfocus.com/bid/9504 -CVE-2004-0104 - http://www.kb.cert.org/vuls/id/518518 -CVE-2004-0105 - http://www.kb.cert.org/vuls/id/513062 -CVE-2004-0109 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940 -CVE-2004-0112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928 -CVE-2004-0112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580 -CVE-2004-0116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A955 -CVE-2004-0116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A957 -CVE-2004-0116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A958 -CVE-2004-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A907 -CVE-2004-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A946 -CVE-2004-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A964 -CVE-2004-0123 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A924 -CVE-2004-0131 - http://ftp.gnu.org/gnu/radius/radius-1.2.tar.gz -CVE-2004-0148 - http://www.redhat.com/support/errata/RHSA-2004-096.html -CVE-2004-0154 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9673 -CVE-2004-0155 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9291 -CVE-2004-0155 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A945 -CVE-2004-0164 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A947 -CVE-2004-0164 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9737 -CVE-2004-0176 - http://marc.info/?l=bugtraq&m=108007072215742&w=2 -CVE-2004-0176 - http://www.kb.cert.org/vuls/id/644886 -CVE-2004-0176 - http://www.redhat.com/support/errata/RHSA-2004-136.html -CVE-2004-0178 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9427 -CVE-2004-0180 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9462 -CVE-2004-0183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A972 -CVE-2004-0183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9971 -CVE-2004-0184 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9581 -CVE-2004-0184 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A976 -CVE-2004-0185 - http://www.redhat.com/support/errata/RHSA-2004-096.html -CVE-2004-0189 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A941 -CVE-2004-0191 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A937 -CVE-2004-0197 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A968 -CVE-2004-0199 - http://marc.info/?l=bugtraq&m=108437759930820&w=2 -CVE-2004-0199 - http://marc.info/?l=full-disclosure&m=108430407801825&w=2 -CVE-2004-0199 - http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt -CVE-2004-0199 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-015 -CVE-2004-0200 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028 -CVE-2004-0201 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 -CVE-2004-0202 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-016 -CVE-2004-0203 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-026 -CVE-2004-0204 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017 -CVE-2004-0205 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-021 -CVE-2004-0206 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 -CVE-2004-0207 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 -CVE-2004-0208 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 -CVE-2004-0209 - http://marc.info/?l=bugtraq&m=109829067325779&w=2 -CVE-2004-0209 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 -CVE-2004-0210 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020 -CVE-2004-0211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 -CVE-2004-0212 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-022 -CVE-2004-0213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-019 -CVE-2004-0214 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 -CVE-2004-0215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-018 -CVE-2004-0216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0228 - http://fedoranews.org/updates/FEDORA-2004-111.shtml -CVE-2004-0230 - http://www.kb.cert.org/vuls/id/415294 -CVE-2004-0230 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2004-0230 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 -CVE-2004-0230 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 -CVE-2004-0230 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2004-0233 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A979 -CVE-2004-0234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977 -CVE-2004-0234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881 -CVE-2004-0235 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978 -CVE-2004-0236 - http://marc.info/?l=bugtraq&m=107576894019530&w=2 -CVE-2004-0240 - http://marc.info/?l=bugtraq&m=107582648326448&w=2 -CVE-2004-0241 - http://marc.info/?l=bugtraq&m=107582648326448&w=2 -CVE-2004-0242 - http://marc.info/?l=bugtraq&m=107582648326448&w=2 -CVE-2004-0245 - http://marc.info/?l=bugtraq&m=107586518120516&w=2 -CVE-2004-0247 - http://marc.info/?l=bugtraq&m=107584109420084&w=2 -CVE-2004-0251 - http://marc.info/?l=bugtraq&m=107594183924958&w=2 -CVE-2004-0253 - http://marc.info/?l=bugtraq&m=107604065819233&w=2 -CVE-2004-0254 - http://marc.info/?l=bugtraq&m=107606726417150&w=2 -CVE-2004-0262 - http://marc.info/?l=bugtraq&m=107634556632195&w=2 -CVE-2004-0264 - http://marc.info/?l=bugtraq&m=107634638201570&w=2 -CVE-2004-0265 - http://marc.info/?l=bugtraq&m=107634727520936&w=2 -CVE-2004-0266 - http://marc.info/?l=bugtraq&m=107635110327066&w=2 -CVE-2004-0269 - http://marc.info/?l=bugtraq&m=107643348117646&w=2 -CVE-2004-0271 - http://marc.info/?l=bugtraq&m=107643014606515&w=2 -CVE-2004-0272 - http://marc.info/?l=bugtraq&m=107643014606515&w=2 -CVE-2004-0273 - http://marc.info/?l=bugtraq&m=107642978524321&w=2 -CVE-2004-0276 - http://marc.info/?l=bugtraq&m=107652610506968&w=2 -CVE-2004-0278 - http://marc.info/?l=bugtraq&m=107655269820530&w=2 -CVE-2004-0288 - https://exchange.xforce.ibmcloud.com/vulnerabilities/15209 -CVE-2004-0290 - http://marc.info/?l=bugtraq&m=107695064204362&w=2 -CVE-2004-0292 - http://marc.info/?l=bugtraq&m=107703630913205&w=2 -CVE-2004-0297 - https://exchange.xforce.ibmcloud.com/vulnerabilities/15243 -CVE-2004-0304 - http://marc.info/?l=bugtraq&m=107712159425226&w=2 -CVE-2004-0305 - http://marc.info/?l=bugtraq&m=107712159425226&w=2 -CVE-2004-0314 - http://marc.info/?l=bugtraq&m=107757029514146&w=2 -CVE-2004-0319 - http://marc.info/?l=bugtraq&m=107756639427140&w=2 -CVE-2004-0321 - http://marc.info/?l=bugtraq&m=107756001412888&w=2 -CVE-2004-0332 - http://www.securityfocus.com/bid/9754 -CVE-2004-0339 - http://marc.info/?l=bugtraq&m=107799508130700&w=2 -CVE-2004-0345 - http://marc.info/?l=bugtraq&m=107816217901923&w=2 -CVE-2004-0348 - http://marc.info/?l=bugtraq&m=107833097705486&w=2 -CVE-2004-0350 - http://marc.info/?l=bugtraq&m=107833097705486&w=2 -CVE-2004-0351 - http://marc.info/?l=bugtraq&m=107833097705486&w=2 -CVE-2004-0365 - http://www.redhat.com/support/errata/RHSA-2004-136.html -CVE-2004-0365 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196 -CVE-2004-0367 - http://www.redhat.com/support/errata/RHSA-2004-136.html -CVE-2004-0367 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A905 -CVE-2004-0380 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A990 -CVE-2004-0385 - http://www.kb.cert.org/vuls/id/413006 -CVE-2004-0394 - http://lwn.net/Articles/81773/ -CVE-2004-0396 - http://marc.info/?l=bugtraq&m=108498454829020&w=2 -CVE-2004-0396 - http://security.e-matters.de/advisories/072004.html -CVE-2004-0396 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058 -CVE-2004-0396 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970 -CVE-2004-0397 - http://marc.info/?l=bugtraq&m=108498676517697&w=2 -CVE-2004-0397 - http://security.e-matters.de/advisories/082004.html -CVE-2004-0398 - http://marc.info/?l=bugtraq&m=108498433632333&w=2 -CVE-2004-0403 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A984 -CVE-2004-0411 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954 -CVE-2004-0414 - http://security.e-matters.de/advisories/092004.html -CVE-2004-0414 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A993 -CVE-2004-0415 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9965 -CVE-2004-0416 - http://security.e-matters.de/advisories/092004.html -CVE-2004-0416 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A994 -CVE-2004-0417 - http://security.e-matters.de/advisories/092004.html -CVE-2004-0418 - http://security.e-matters.de/advisories/092004.html -CVE-2004-0420 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024 -CVE-2004-0421 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971 -CVE-2004-0424 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A939 -CVE-2004-0426 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9495 -CVE-2004-0426 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A967 -CVE-2004-0427 - http://fedoranews.org/updates/FEDORA-2004-111.shtml -CVE-2004-0427 - http://www.redhat.com/support/errata/RHSA-2004-260.html -CVE-2004-0452 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938 -CVE-2004-0453 - http://marc.info/?l=bugtraq&m=108723630730487&w=2 -CVE-2004-0494 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854 -CVE-2004-0495 - http://www.redhat.com/support/errata/RHSA-2004-260.html -CVE-2004-0497 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867 -CVE-2004-0498 - http://www.stonesoft.com/support/Security_Advisories/6735.html -CVE-2004-0500 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429 -CVE-2004-0504 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9769 -CVE-2004-0504 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A982 -CVE-2004-0505 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9433 -CVE-2004-0505 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A986 -CVE-2004-0506 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9695 -CVE-2004-0506 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A987 -CVE-2004-0507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A988 -CVE-2004-0510 - http://marc.info/?l=bugtraq&m=109889281711636&w=2 -CVE-2004-0520 - http://marc.info/?l=bugtraq&m=108611554415078&w=2 -CVE-2004-0520 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt -CVE-2004-0523 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991 -CVE-2004-0529 - http://marc.info/?l=bugtraq&m=108663003608211&w=2 -CVE-2004-0537 - http://marc.info/?l=bugtraq&m=108627581717738&w=2 -CVE-2004-0541 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A980 -CVE-2004-0548 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2004-0549 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 -CVE-2004-0554 - http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html -CVE-2004-0554 - http://www.redhat.com/support/errata/RHSA-2004-260.html -CVE-2004-0554 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426 -CVE-2004-0557 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801 -CVE-2004-0558 - https://github.com/fibonascii/CVE-2004-0558 -CVE-2004-0566 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 -CVE-2004-0567 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 -CVE-2004-0568 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043 -CVE-2004-0569 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-029 -CVE-2004-0571 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 -CVE-2004-0572 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 -CVE-2004-0573 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-027 -CVE-2004-0574 - http://marc.info/?l=bugtraq&m=109761632831563&w=2 -CVE-2004-0574 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036 -CVE-2004-0574 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4392 -CVE-2004-0575 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-034 -CVE-2004-0587 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9398 -CVE-2004-0594 - http://marc.info/?l=bugtraq&m=108981780109154&w=2 -CVE-2004-0594 - http://www.novell.com/linux/security/advisories/2004_21_php4.html -CVE-2004-0595 - http://marc.info/?l=bugtraq&m=108981780109154&w=2 -CVE-2004-0595 - http://www.novell.com/linux/security/advisories/2004_21_php4.html -CVE-2004-0597 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009 -CVE-2004-0600 - http://marc.info/?l=bugtraq&m=109053195818351&w=2 -CVE-2004-0605 - http://marc.info/?l=bugtraq&m=108766803817406&w=2 -CVE-2004-0607 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9163 -CVE-2004-0608 - http://aluigi.altervista.org/adv/unsecure-adv.txt -CVE-2004-0608 - http://marc.info/?l=bugtraq&m=108787105023304&w=2 -CVE-2004-0619 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9773 -CVE-2004-0620 - http://marc.info/?l=bugtraq&m=108809720026642&w=2 -CVE-2004-0622 - http://citp.princeton.edu/pub/coldboot.pdf -CVE-2004-0633 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9931 -CVE-2004-0635 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721 -CVE-2004-0639 - http://marc.info/?l=bugtraq&m=108611554415078&w=2 -CVE-2004-0639 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt -CVE-2004-0659 - http://marc.info/?l=bugtraq&m=108844316930791&w=2 -CVE-2004-0671 - https://exchange.xforce.ibmcloud.com/vulnerabilities/16609 -CVE-2004-0674 - http://marc.info/?l=bugtraq&m=108886995627906&w=2 -CVE-2004-0675 - http://marc.info/?l=bugtraq&m=108887778628398&w=2 -CVE-2004-0679 - http://securityreason.com/securityalert/560 -CVE-2004-0683 - http://marc.info/?l=bugtraq&m=108938579712894&w=2 -CVE-2004-0687 - http://packetstormsecurity.com/files/170620/Solaris-10-dtprintinfo-libXm-libXpm-Security-Issues.html -CVE-2004-0687 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9187 -CVE-2004-0689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9334 -CVE-2004-0691 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9485 -CVE-2004-0694 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9981 -CVE-2004-0700 - http://packetstormsecurity.org/0407-advisories/modsslFormat.txt -CVE-2004-0718 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9997 -CVE-2004-0722 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9378 -CVE-2004-0724 - http://marc.info/?l=bugtraq&m=108966465302107&w=2 -CVE-2004-0727 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0733 - https://www.exploit-db.com/exploits/3757 -CVE-2004-0735 - http://marc.info/?l=bugtraq&m=109008314631518&w=2 -CVE-2004-0739 - http://marc.info/?l=bugtraq&m=109035224715409&w=2 -CVE-2004-0758 - http://bugzilla.mozilla.org/show_bug.cgi?id=249004 -CVE-2004-0761 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9240 -CVE-2004-0763 - http://marc.info/?l=bugtraq&m=109087067730938&w=2 -CVE-2004-0763 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9436 -CVE-2004-0764 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9419 -CVE-2004-0769 - http://marc.info/?l=bugtraq&m=108745217504379&w=2 -CVE-2004-0771 - http://marc.info/?l=bugtraq&m=108668791510153 -CVE-2004-0771 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9595 -CVE-2004-0775 - http://marc.info/?l=bugtraq&m=109223783402624&w=2 -CVE-2004-0783 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9348 -CVE-2004-0790 - http://securityreason.com/securityalert/57 -CVE-2004-0790 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 -CVE-2004-0790 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 -CVE-2004-0791 - http://securityreason.com/securityalert/57 -CVE-2004-0791 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-0791 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2004-0796 - http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337 -CVE-2004-0798 - https://www.exploit-db.com/exploits/566/ -CVE-2004-0806 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9805 -CVE-2004-0809 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9588 -CVE-2004-0825 - http://www.kb.cert.org/vuls/id/914870 -CVE-2004-0835 - http://www.redhat.com/support/errata/RHSA-2004-611.html -CVE-2004-0836 - http://www.redhat.com/support/errata/RHSA-2004-611.html -CVE-2004-0837 - http://www.redhat.com/support/errata/RHSA-2004-611.html -CVE-2004-0839 - http://marc.info/?l=bugtraq&m=109336221826652&w=2 -CVE-2004-0839 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0840 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5509 -CVE-2004-0841 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0842 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0843 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0844 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0845 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0869 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 -CVE-2004-0870 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 -CVE-2004-0871 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 -CVE-2004-0872 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 -CVE-2004-0882 - http://marc.info/?l=bugtraq&m=110054671403755&w=2 -CVE-2004-0882 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969 -CVE-2004-0883 - http://marc.info/?l=bugtraq&m=110072140811965&w=2 -CVE-2004-0883 - http://security.e-matters.de/advisories/142004.html -CVE-2004-0886 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907 -CVE-2004-0888 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714 -CVE-2004-0892 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039 -CVE-2004-0893 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 -CVE-2004-0894 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 -CVE-2004-0897 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-003 -CVE-2004-0899 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 -CVE-2004-0900 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 -CVE-2004-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 -CVE-2004-0902 - http://bugzilla.mozilla.org/show_bug.cgi?id=256316 -CVE-2004-0908 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9745 -CVE-2004-0914 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943 -CVE-2004-0949 - http://marc.info/?l=bugtraq&m=110072140811965&w=2 -CVE-2004-0949 - http://security.e-matters.de/advisories/142004.html -CVE-2004-0953 - http://marc.info/?l=bugtraq&m=110144303826709&w=2 -CVE-2004-0957 - http://www.redhat.com/support/errata/RHSA-2004-611.html -CVE-2004-0959 - http://marc.info/?l=bugtraq&m=109534848430404&w=2 -CVE-2004-0963 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-023 -CVE-2004-0964 - http://marc.info/?l=bugtraq&m=109608092609200&w=2 -CVE-2004-0964 - http://marc.info/?l=bugtraq&m=109638486728548&w=2 -CVE-2004-0966 - https://www.ubuntu.com/usn/usn-5-1/ -CVE-2004-0968 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523 -CVE-2004-0976 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9752 -CVE-2004-0978 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0979 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -CVE-2004-0989 - http://marc.info/?l=bugtraq&m=109880813013482&w=2 -CVE-2004-0990 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952 -CVE-2004-1008 - http://marc.info/?l=bugtraq&m=109889312917613&w=2 -CVE-2004-1008 - http://www.chiark.greenend.org.uk/~sgtatham/putty/ -CVE-2004-1010 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9848 -CVE-2004-1011 - http://marc.info/?l=bugtraq&m=110123023521619&w=2 -CVE-2004-1011 - http://security.e-matters.de/advisories/152004.html -CVE-2004-1012 - http://marc.info/?l=bugtraq&m=110123023521619&w=2 -CVE-2004-1012 - http://security.e-matters.de/advisories/152004.html -CVE-2004-1013 - http://marc.info/?l=bugtraq&m=110123023521619&w=2 -CVE-2004-1013 - http://security.e-matters.de/advisories/152004.html -CVE-2004-1016 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-1017 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-1017 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9786 -CVE-2004-1018 - http://marc.info/?l=bugtraq&m=110314318531298&w=2 -CVE-2004-1019 - http://marc.info/?l=bugtraq&m=110314318531298&w=2 -CVE-2004-1019 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2004-1036 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9592 -CVE-2004-1049 - http://marc.info/?l=bugtraq&m=110382891718076&w=2 -CVE-2004-1049 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 -CVE-2004-1050 - http://marc.info/?l=bugtraq&m=109942758911846&w=2 -CVE-2004-1052 - http://marc.info/?l=bugtraq&m=110011817627839&w=2 -CVE-2004-1056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795 -CVE-2004-1057 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-1060 - http://securityreason.com/securityalert/57 -CVE-2004-1060 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 -CVE-2004-1061 - https://bugzilla.mozilla.org/show_bug.cgi?id=272620 -CVE-2004-1070 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt -CVE-2004-1070 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450 -CVE-2004-1071 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt -CVE-2004-1071 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9917 -CVE-2004-1072 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt -CVE-2004-1073 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt -CVE-2004-1074 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9751 -CVE-2004-1075 - http://marc.info/?l=bugtraq&m=110138568212036&w=2 -CVE-2004-1075 - http://marc.info/?l=bugtraq&m=110149122529761&w=2 -CVE-2004-1080 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 -CVE-2004-1081 - http://www.securityfocus.com/bid/11802 -CVE-2004-1083 - http://www.securityfocus.com/bid/11802 -CVE-2004-1084 - http://www.securityfocus.com/bid/11802 -CVE-2004-1085 - http://www.securityfocus.com/bid/11802 -CVE-2004-1086 - http://www.securityfocus.com/bid/11802 -CVE-2004-1087 - http://www.securityfocus.com/bid/11802 -CVE-2004-1088 - http://www.securityfocus.com/bid/11802 -CVE-2004-1089 - http://www.securityfocus.com/bid/11802 -CVE-2004-1094 - http://www.networksecurity.fi/advisories/dtsearch.html -CVE-2004-1094 - http://www.networksecurity.fi/advisories/lotus-notes.html -CVE-2004-1094 - http://www.networksecurity.fi/advisories/mcafee-virusscan.html -CVE-2004-1094 - http://www.networksecurity.fi/advisories/multiledger.html -CVE-2004-1094 - http://www.networksecurity.fi/advisories/payroll.html -CVE-2004-1118 - http://marc.info/?l=bugtraq&m=110114233323417&w=2 -CVE-2004-1120 - http://bugs.gentoo.org/show_bug.cgi?id=70090 -CVE-2004-1127 - http://marc.info/?l=bugtraq&m=110144606411674&w=2 -CVE-2004-1137 - http://isec.pl/vulnerabilities/isec-0018-igmp.txt -CVE-2004-1138 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571 -CVE-2004-1139 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2004-1140 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2004-1141 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2004-1141 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9473 -CVE-2004-1142 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2004-1165 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645 -CVE-2004-1166 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2004-1183 - http://www.redhat.com/support/errata/RHSA-2005-019.html -CVE-2004-1183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9743 -CVE-2004-1184 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658 -CVE-2004-1190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9369 -CVE-2004-1193 - http://marc.info/?l=bugtraq&m=110118902823639&w=2 -CVE-2004-1193 - http://marc.info/?l=bugtraq&m=110138413816367&w=2 -CVE-2004-1196 - http://marc.info/?l=bugtraq&m=110140029419018&w=2 -CVE-2004-1197 - http://marc.info/?l=bugtraq&m=110140029419018&w=2 -CVE-2004-1207 - http://marc.info/?l=bugtraq&m=109651567308405&w=2 -CVE-2004-1208 - http://marc.info/?l=bugtraq&m=110176280402580&w=2 -CVE-2004-1210 - http://marc.info/?l=bugtraq&m=110197682705001&w=2 -CVE-2004-1214 - http://marc.info/?l=bugtraq&m=110201776207915&w=2 -CVE-2004-1215 - http://marc.info/?l=bugtraq&m=110201776207915&w=2 -CVE-2004-1216 - http://marc.info/?l=bugtraq&m=110201776207915&w=2 -CVE-2004-1218 - http://marc.info/?l=bugtraq&m=110238855010003&w=2 -CVE-2004-1219 - http://echo.or.id/adv/adv09-y3dips-2004.txt -CVE-2004-1219 - http://marc.info/?l=bugtraq&m=110245123927025&w=2 -CVE-2004-1220 - http://marc.info/?l=bugtraq&m=110244662102167&w=2 -CVE-2004-1224 - http://marc.info/?l=bugtraq&m=110279034910663&w=2 -CVE-2004-1229 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 -CVE-2004-1229 - http://www.man.poznan.pl/~security/gg-adv.txt -CVE-2004-1230 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 -CVE-2004-1230 - http://www.man.poznan.pl/~security/gg-adv.txt -CVE-2004-1231 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 -CVE-2004-1231 - http://www.man.poznan.pl/~security/gg-adv.txt -CVE-2004-1232 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 -CVE-2004-1232 - http://www.man.poznan.pl/~security/gg-adv.txt -CVE-2004-1233 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 -CVE-2004-1233 - http://www.man.poznan.pl/~security/gg-adv.txt -CVE-2004-1234 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-1235 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-1235 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567 -CVE-2004-1244 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009 -CVE-2004-1269 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9545 -CVE-2004-1287 - http://www.redhat.com/support/errata/RHSA-2005-381.html -CVE-2004-1305 - http://marc.info/?l=bugtraq&m=110382854111833&w=2 -CVE-2004-1305 - http://www.kb.cert.org/vuls/id/177584 -CVE-2004-1305 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 -CVE-2004-1306 - http://marc.info/?l=bugtraq&m=110383690219440&w=2 -CVE-2004-1308 - http://www.redhat.com/support/errata/RHSA-2005-019.html -CVE-2004-1308 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9392 -CVE-2004-1316 - http://isec.pl/vulnerabilities/isec-0020-mozilla.txt -CVE-2004-1316 - http://marc.info/?l=bugtraq&m=110436284718949&w=2 -CVE-2004-1316 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9808 -CVE-2004-1317 - http://marc.info/?l=bugtraq&m=110425875504586&w=2 -CVE-2004-1317 - http://marc.info/?l=bugtraq&m=110429204712327&w=2 -CVE-2004-1317 - http://www.hat-squad.com/en/000142.html -CVE-2004-1329 - http://marc.info/?l=bugtraq&m=110355931920123&w=2 -CVE-2004-1329 - https://www.exploit-db.com/exploits/701 -CVE-2004-1330 - http://marc.info/?l=bugtraq&m=110355931920123&w=2 -CVE-2004-1331 - http://securityreason.com/securityalert/3220 -CVE-2004-1335 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2004-1361 - http://marc.info/?l=bugtraq&m=110383690219440&w=2 -CVE-2004-1392 - http://marc.info/?l=bugtraq&m=109898213806099&w=2 -CVE-2004-1392 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279 -CVE-2004-1395 - http://aluigi.altervista.org/adv/lithsock-adv.txt -CVE-2004-1395 - http://marc.info/?l=bugtraq&m=110297515500671&w=2 -CVE-2004-1398 - http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt -CVE-2004-1399 - http://marc.info/?l=bugtraq&m=110304269031484&w=2 -CVE-2004-1401 - http://marc.info/?l=bugtraq&m=110305802005220&w=2 -CVE-2004-1402 - http://marc.info/?l=bugtraq&m=110314454810163&w=2 -CVE-2004-1403 - http://marc.info/?l=bugtraq&m=110313585810712&w=2 -CVE-2004-1414 - http://marc.info/?l=bugtraq&m=110357519312200&w=2 -CVE-2004-1415 - http://marc.info/?l=bugtraq&m=110375900916558&w=2 -CVE-2004-1419 - http://marc.info/?l=bugtraq&m=110391024404947&w=2 -CVE-2004-1423 - https://www.exploit-db.com/exploits/2608 -CVE-2004-1424 - http://marc.info/?l=bugtraq&m=110425409614735&w=2 -CVE-2004-1425 - http://marc.info/?l=bugtraq&m=110425409614735&w=2 -CVE-2004-1469 - http://marc.info/?l=bugtraq&m=109517782910407&w=2 -CVE-2004-1471 - http://security.e-matters.de/advisories/092004.html -CVE-2004-1475 - http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0 -CVE-2004-1476 - http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0 -CVE-2004-1487 - http://marc.info/?l=bugtraq&m=110269474112384&w=2 -CVE-2004-1488 - http://marc.info/?l=bugtraq&m=110269474112384&w=2 -CVE-2004-1488 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750 -CVE-2004-1492 - http://marc.info/?l=bugtraq&m=109889705116038&w=2 -CVE-2004-1493 - http://marc.info/?l=bugtraq&m=109889705116038&w=2 -CVE-2004-1501 - http://marc.info/?l=bugtraq&m=109976745017459&w=2 -CVE-2004-1502 - http://marc.info/?l=bugtraq&m=109976745017459&w=2 -CVE-2004-1504 - http://echo.or.id/adv/adv08-y3dips-2004.txt -CVE-2004-1504 - http://marc.info/?l=bugtraq&m=110004150430309&w=2 -CVE-2004-1505 - http://echo.or.id/adv/adv08-y3dips-2004.txt -CVE-2004-1505 - http://marc.info/?l=bugtraq&m=110004150430309&w=2 -CVE-2004-1506 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 -CVE-2004-1507 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 -CVE-2004-1508 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 -CVE-2004-1509 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 -CVE-2004-1510 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 -CVE-2004-1517 - http://marc.info/?l=bugtraq&m=110020607924001&w=2 -CVE-2004-1518 - http://marc.info/?l=bugtraq&m=110021385926870&w=2 -CVE-2004-1528 - http://marc.info/?l=bugtraq&m=110064626111756&w=2 -CVE-2004-1528 - http://www.waraxe.us/index.php?modname=sa&id=38 -CVE-2004-1529 - http://marc.info/?l=bugtraq&m=110064626111756&w=2 -CVE-2004-1529 - http://www.waraxe.us/index.php?modname=sa&id=38 -CVE-2004-1530 - http://marc.info/?l=bugtraq&m=110064626111756&w=2 -CVE-2004-1530 - http://www.waraxe.us/index.php?modname=sa&id=38 -CVE-2004-1539 - http://marc.info/?l=bugtraq&m=110114770406920&w=2 -CVE-2004-1542 - http://marc.info/?l=bugtraq&m=110124208811327&w=2 -CVE-2004-1543 - http://www.securityfocus.com/bid/11744 -CVE-2004-1546 - http://marc.info/?l=bugtraq&m=109591179510781&w=2 -CVE-2004-1547 - http://aluigi.altervista.org/adv/actp-adv.txt -CVE-2004-1547 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 -CVE-2004-1548 - http://aluigi.altervista.org/adv/actp-adv.txt -CVE-2004-1548 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 -CVE-2004-1549 - http://aluigi.altervista.org/adv/actp-adv.txt -CVE-2004-1549 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 -CVE-2004-1552 - https://www.exploit-db.com/exploits/3546 -CVE-2004-1553 - https://www.exploit-db.com/exploits/6357 -CVE-2004-1553 - https://www.exploit-db.com/exploits/6420 -CVE-2004-1558 - http://marc.info/?l=bugtraq&m=109630699829536&w=2 -CVE-2004-1558 - http://www.hat-squad.com/en/000075.html -CVE-2004-1561 - http://aluigi.altervista.org/adv/iceexec-adv.txt -CVE-2004-1561 - http://marc.info/?l=bugtraq&m=109640005127644&w=2 -CVE-2004-1569 - http://marc.info/?l=bugtraq&m=109668542406346&w=2 -CVE-2004-1571 - http://echo.or.id/adv/adv07-y3dips-2004.txt -CVE-2004-1571 - http://marc.info/?l=bugtraq&m=109664986210763&w=2 -CVE-2004-1572 - http://echo.or.id/adv/adv07-y3dips-2004.txt -CVE-2004-1572 - http://marc.info/?l=bugtraq&m=109664986210763&w=2 -CVE-2004-1573 - http://echo.or.id/adv/adv07-y3dips-2004.txt -CVE-2004-1573 - http://marc.info/?l=bugtraq&m=109664986210763&w=2 -CVE-2004-1574 - http://aluigi.altervista.org/adv/vymesbof-adv.txt -CVE-2004-1574 - http://marc.info/?l=bugtraq&m=109665993315769&w=2 -CVE-2004-1585 - http://marc.info/?l=bugtraq&m=109716787607302&w=2 -CVE-2004-1586 - http://marc.info/?l=bugtraq&m=109716787607302&w=2 -CVE-2004-1587 - http://marc.info/?l=bugtraq&m=109728194025487&w=2 -CVE-2004-1587 - http://marc.info/?l=full-disclosure&m=109727077824860&w=2 -CVE-2004-1595 - http://marc.info/?l=bugtraq&m=109778648232233&w=2 -CVE-2004-1602 - http://marc.info/?l=bugtraq&m=109786760926133&w=2 -CVE-2004-1605 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1606 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1607 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1608 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1609 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1610 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1611 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1612 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 -CVE-2004-1618 - http://aluigi.altervista.org/adv/toneboom-adv.txt -CVE-2004-1618 - http://marc.info/?l=bugtraq&m=109820344806472&w=2 -CVE-2004-1619 - http://marc.info/?l=bugtraq&m=109829017407842&w=2 -CVE-2004-1638 - http://marc.info/?l=bugtraq&m=109880961630050&w=2 -CVE-2004-1639 - http://marc.info/?l=bugtraq&m=109886388528179&w=2 -CVE-2004-1641 - http://marc.info/?l=bugtraq&m=109396159332523&w=2 -CVE-2004-1642 - http://marc.info/?l=bugtraq&m=109396193723317&w=2 -CVE-2004-1647 - http://marc.info/?l=bugtraq&m=109414967003192&w=2 -CVE-2004-1648 - http://marc.info/?l=bugtraq&m=109414967003192&w=2 -CVE-2004-1649 - http://marc.info/?l=bugtraq&m=109413415205017&w=2 -CVE-2004-1649 - http://marc.info/?l=full-disclosure&m=109391133831787&w=2 -CVE-2004-1662 - http://echo.or.id/adv/adv05-y3dips-2004.txt -CVE-2004-1662 - http://marc.info/?l=bugtraq&m=109441750900432&w=2 -CVE-2004-1664 - http://marc.info/?l=bugtraq&m=109449953200587&w=2 -CVE-2004-1667 - http://aluigi.altervista.org/adv/haloboom-adv.txt -CVE-2004-1667 - http://marc.info/?l=bugtraq&m=109479695022024&w=2 -CVE-2004-1668 - http://marc.info/?l=bugtraq&m=109483089621955&w=2 -CVE-2004-1676 - http://marc.info/?l=bugtraq&m=109508834910733&w=2 -CVE-2004-1688 - http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026515.html -CVE-2004-1688 - http://marc.info/?l=bugtraq&m=109543366631724&w=2 -CVE-2004-1695 - http://marc.info/?l=bugtraq&m=109577497718374&w=2 -CVE-2004-1696 - http://marc.info/?l=bugtraq&m=109577497718374&w=2 -CVE-2004-1698 - http://marc.info/?l=bugtraq&m=109581586128899&w=2 -CVE-2004-1699 - http://marc.info/?l=bugtraq&m=109589167110196&w=2 -CVE-2004-1701 - http://marc.info/?l=bugtraq&m=109208394910086&w=2 -CVE-2004-1701 - http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 -CVE-2004-1702 - http://marc.info/?l=bugtraq&m=109208394910086&w=2 -CVE-2004-1702 - http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 -CVE-2004-1705 - http://marc.info/?l=bugtraq&m=109121546120575&w=2 -CVE-2004-1705 - http://marc.info/?l=bugtraq&m=109146099404071&w=2 -CVE-2004-1716 - http://marc.info/?l=bugtraq&m=109267937212298&w=2 -CVE-2004-1723 - http://marc.info/?l=bugtraq&m=109285292901685&w=2 -CVE-2004-1724 - http://marc.info/?l=bugtraq&m=109285292901685&w=2 -CVE-2004-1727 - http://marc.info/?l=bugtraq&m=109309119502208&w=2 -CVE-2004-1738 - http://indohack.sourceforge.net/drponidi/jshop-vuln.txt -CVE-2004-1738 - http://marc.info/?l=bugtraq&m=109327547026265&w=2 -CVE-2004-1739 - http://marc.info/?l=bugtraq&m=109327938924287&w=2 -CVE-2004-1743 - http://marc.info/?l=bugtraq&m=109341398102863&w=2 -CVE-2004-1744 - http://marc.info/?l=bugtraq&m=109341398102863&w=2 -CVE-2004-1745 - http://marc.info/?l=bugtraq&m=109339761608821&w=2 -CVE-2004-1746 - http://marc.info/?l=bugtraq&m=109340580218818&w=2 -CVE-2004-1751 - http://aluigi.altervista.org/adv/gc2boom-adv.txt -CVE-2004-1751 - http://marc.info/?l=bugtraq&m=109357154602892&w=2 -CVE-2004-1752 - http://marc.info/?l=bugtraq&m=109364123707953&w=2 -CVE-2004-1761 - http://www.redhat.com/support/errata/RHSA-2004-136.html -CVE-2004-1763 - http://marc.info/?l=full-disclosure&m=108091662105032&w=2 -CVE-2004-1802 - http://aluigi.altervista.org/adv/chatany-ghost-adv.txt -CVE-2004-1802 - http://marc.info/?l=bugtraq&m=107885946220895&w=2 -CVE-2004-1805 - http://aluigi.altervista.org/adv/unrfs-adv.txt -CVE-2004-1805 - http://marc.info/?l=bugtraq&m=107893764406905&w=2 -CVE-2004-1831 - http://aluigi.altervista.org/adv/chrome-boom-adv.txt -CVE-2004-1831 - http://marc.info/?l=bugtraq&m=107964719614657&w=2 -CVE-2004-1837 - http://marc.info/?l=bugtraq&m=107997967421972&w=2 -CVE-2004-1850 - http://aluigi.altervista.org/adv/ragefreeze-adv.txt -CVE-2004-1850 - http://marc.info/?l=bugtraq&m=108006680013576&w=2 -CVE-2004-1853 - http://aluigi.altervista.org/adv/t3cbof-adv.txt -CVE-2004-1853 - http://marc.info/?l=bugtraq&m=108016076221855&w=2 -CVE-2004-1854 - http://aluigi.altervista.org/adv/picobof-adv.txt -CVE-2004-1854 - http://marc.info/?l=bugtraq&m=108016032220647&w=2 -CVE-2004-1868 - http://marc.info/?l=bugtraq&m=108025234317408&w=2 -CVE-2004-1868 - http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt -CVE-2004-1869 - http://aluigi.altervista.org/adv/ethboom-adv.txt -CVE-2004-1869 - http://marc.info/?l=bugtraq&m=108024309814423&w=2 -CVE-2004-1870 - http://marc.info/?l=bugtraq&m=108057790723123&w=2 -CVE-2004-1871 - http://marc.info/?l=bugtraq&m=108057790723123&w=2 -CVE-2004-1879 - http://marc.info/?l=bugtraq&m=108067894822358&w=2 -CVE-2004-1881 - http://marc.info/?l=bugtraq&m=108075059013762&w=2 -CVE-2004-1882 - http://marc.info/?l=bugtraq&m=108075059013762&w=2 -CVE-2004-1888 - http://marc.info/?l=bugtraq&m=108100973820868&w=2 -CVE-2004-1892 - http://marc.info/?l=bugtraq&m=108100987429960&w=2 -CVE-2004-1900 - http://aluigi.altervista.org/adv/igi2fs-adv.txt -CVE-2004-1900 - http://marc.info/?l=bugtraq&m=108120385811815&w=2 -CVE-2004-1903 - http://marc.info/?l=bugtraq&m=108127833002955&w=2 -CVE-2004-1904 - http://marc.info/?l=bugtraq&m=108130573130482&w=2 -CVE-2004-1905 - http://marc.info/?l=bugtraq&m=108130573130482&w=2 -CVE-2004-1906 - http://marc.info/?l=bugtraq&m=108136872711898&w=2 -CVE-2004-1907 - http://marc.info/?l=bugtraq&m=108137421524251&w=2 -CVE-2004-1908 - http://marc.info/?l=bugtraq&m=108136872711898&w=2 -CVE-2004-1908 - http://marc.info/?l=bugtraq&m=108137545531496&w=2 -CVE-2004-1910 - http://marc.info/?l=bugtraq&m=108136901406896&w=2 -CVE-2004-1915 - http://marc.info/?l=bugtraq&m=108145722229810&w=2 -CVE-2004-1916 - http://marc.info/?l=bugtraq&m=108146376315229&w=2 -CVE-2004-1917 - http://marc.info/?l=bugtraq&m=108146376315229&w=2 -CVE-2004-1918 - http://aluigi.altervista.org/adv/rsniff-adv.txt -CVE-2004-1918 - http://marc.info/?l=bugtraq&m=108152508004665&w=2 -CVE-2004-1938 - http://marc.info/?l=bugtraq&m=108239796512897&w=2 -CVE-2004-1938 - http://www.waraxe.us/index.php?modname=sa&id=19 -CVE-2004-1946 - http://marc.info/?l=bugtraq&m=108249818308672&w=2 -CVE-2004-1947 - http://marc.info/?l=bugtraq&m=108240639427412&w=2 -CVE-2004-1958 - http://aluigi.altervista.org/adv/umod-adv.txt -CVE-2004-1958 - http://marc.info/?l=bugtraq&m=108267310519459&w=2 -CVE-2004-1959 - http://marc.info/?l=bugtraq&m=108276299810121&w=2 -CVE-2004-1959 - http://www.waraxe.us/index.php?modname=sa&id=25 -CVE-2004-1960 - http://www.waraxe.us/index.php?modname=sa&id=25 -CVE-2004-1961 - http://www.waraxe.us/index.php?modname=sa&id=25 -CVE-2004-1962 - http://www.waraxe.us/index.php?modname=sa&id=25 -CVE-2004-1983 - http://marc.info/?l=bugtraq&m=108360001130312&w=2 -CVE-2004-1983 - http://marc.info/?l=bugtraq&m=108420555920369&w=2 -CVE-2004-2003 - http://marc.info/?l=bugtraq&m=108386181021070&w=2 -CVE-2004-2012 - http://marc.info/?l=bugtraq&m=108432258920570&w=2 -CVE-2004-2014 - http://www.securityfocus.com/bid/10361 -CVE-2004-2014 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9830 -CVE-2004-2017 - http://marc.info/?l=bugtraq&m=108481571131866&w=2 -CVE-2004-2017 - http://www.osvdb.org/6344 -CVE-2004-2023 - http://www.packetstormsecurity.org/0405-advisories/zencart112d.txt -CVE-2004-2033 - http://marc.info/?l=bugtraq&m=108559623703422&w=2 -CVE-2004-2037 - http://marc.info/?l=bugtraq&m=108577846011604&w=2 -CVE-2004-2038 - http://marc.info/?l=bugtraq&m=108585789220174&w=2 -CVE-2004-2056 - http://marc.info/?l=bugtraq&m=109087144509299&w=2 -CVE-2004-2057 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 -CVE-2004-2058 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 -CVE-2004-2059 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 -CVE-2004-2060 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 -CVE-2004-2067 - http://www.jaws.com.mx/index.php?gadget=blog&action=single_view&id=10 -CVE-2004-2077 - http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml -CVE-2004-2099 - http://aluigi.altervista.org/adv/nfshp2cbof-adv.txt -CVE-2004-2099 - http://marc.info/?l=bugtraq&m=107479094508691&w=2 -CVE-2004-2100 - http://marc.info/?l=bugtraq&m=107480261825214&w=2 -CVE-2004-2101 - http://marc.info/?l=bugtraq&m=107480261825214&w=2 -CVE-2004-2110 - http://marc.info/?l=bugtraq&m=107487971405960&w=2 -CVE-2004-2114 - http://marc.info/?l=bugtraq&m=107515550931508&w=2 -CVE-2004-2116 - http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html -CVE-2004-2125 - http://marc.info/?l=bugtraq&m=107530966524193&w=2 -CVE-2004-2126 - http://marc.info/?l=bugtraq&m=107530966524193&w=2 -CVE-2004-2137 - http://www.networksecurity.fi/advisories/outlook-bcc.html -CVE-2004-2154 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9940 -CVE-2004-2157 - http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html -CVE-2004-2158 - http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html -CVE-2004-2165 - http://aluigi.altervista.org/adv/lotr3boom-adv.txt -CVE-2004-2165 - http://seclists.org/lists/fulldisclosure/2004/Sep/0660.html -CVE-2004-2262 - https://www.exploit-db.com/exploits/704 -CVE-2004-2274 - http://www.w3.org/Jigsaw/RelNotes.html#2.2.4 -CVE-2004-2289 - http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm -CVE-2004-2289 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015 -CVE-2004-2300 - http://www.packetstormsecurity.org/0405-advisories/snmpdadv.txt -CVE-2004-2360 - http://aluigi.altervista.org/adv/battlemages-adv.txt -CVE-2004-2361 - http://aluigi.altervista.org/adv/hgmcrash-adv.txt -CVE-2004-2361 - http://marc.info/?l=bugtraq&m=107764783411414&w=2 -CVE-2004-2366 - http://www.cuteftp.com/gsftps/history.asp -CVE-2004-2371 - http://aluigi.altervista.org/adv/grboom-adv.txt -CVE-2004-2432 - http://www.packetstormsecurity.org/0406-exploits/WinAgentsTFTP.txt -CVE-2004-2449 - http://aluigi.altervista.org/adv/wilco-again-adv.txt -CVE-2004-2466 - http://packetstormsecurity.com/files/167892/Easy-Chat-Server-3.1-Buffer-Overflow.html -CVE-2004-2466 - https://www.exploit-db.com/exploits/4289 -CVE-2004-2468 - http://www.osvdb.org/4755 -CVE-2004-2479 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9711 -CVE-2004-2489 - http://marc.info/?l=bugtraq&m=107524391217364&w=2 -CVE-2004-2490 - http://marc.info/?l=bugtraq&m=107524391217364&w=2 -CVE-2004-2501 - http://www.hat-squad.com/en/000102.html -CVE-2004-2502 - http://packetstormsecurity.org/0407-advisories/fedora_im-switch_tempfile_race.txt -CVE-2004-2513 - https://www.exploit-db.com/exploits/663 -CVE-2004-2529 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 -CVE-2004-2529 - http://www.man.poznan.pl/~security/gg-adv.txt -CVE-2004-2547 - http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt -CVE-2004-2548 - http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt -CVE-2004-2553 - http://cvs.sourceforge.net/viewcvs.py/ignition/ignitionserver/docs/security/20040302-operator-privilege-escalation.txt?view=markup -CVE-2004-2616 - http://aluigi.altervista.org/adv/actp-adv.txt -CVE-2004-2616 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 -CVE-2004-2622 - http://www.securityfocus.com/bid/11498 -CVE-2004-2627 - http://www.theregister.co.uk/2004/10/22/mobile_java_peril/ -CVE-2004-2643 - http://packetstormsecurity.org/0410-exploits/cabarc.txt -CVE-2004-2646 - http://marc.info/?l=bugtraq&m=109164397601049&w=2 -CVE-2004-2647 - http://marc.info/?l=bugtraq&m=109164397601049&w=2 -CVE-2004-2670 - http://echo.or.id/adv/adv02-y3dips-2004.txt -CVE-2004-2671 - http://echo.or.id/adv/adv02-y3dips-2004.txt -CVE-2004-2685 - https://www.exploit-db.com/exploits/4360 -CVE-2004-2685 - https://www.exploit-db.com/exploits/621 -CVE-2004-2695 - http://www.vbulletin.com/forum/bugs.php?do=view&bugid=3379 -CVE-2004-2719 - https://www.exploit-db.com/exploits/164 -CVE-2004-2720 - http://securityreason.com/securityalert/3200 -CVE-2004-2720 - http://www.sec-tec.co.uk/vulnerability/snitzxss.html -CVE-2004-2721 - http://freshmeat.net/projects/openskat/?branch_id=36295&release_id=178549 -CVE-2004-2738 - http://marc.info/?l=bugtraq&m=110391024404947&w=2 -CVE-2004-2754 - http://securityreason.com/securityalert/3371 -CVE-2004-2760 - http://securityreason.com/securityalert/4100 -CVE-2004-2761 - http://securityreason.com/securityalert/4866 -CVE-2004-2761 - http://www.phreedom.org/research/rogue-ca/ -CVE-2004-2761 - http://www.ubuntu.com/usn/usn-740-1 -CVE-2004-2761 - http://www.win.tue.nl/hashclash/SoftIntCodeSign/ -CVE-2004-2761 - http://www.win.tue.nl/hashclash/rogue-ca/ -CVE-2004-2776 - https://github.com/mikaku/Monitorix/issues/30 -CVE-2005-0001 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2005-0003 - http://www.redhat.com/support/errata/RHSA-2005-017.html -CVE-2005-0003 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512 -CVE-2005-0005 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9925 -CVE-2005-0006 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2005-0007 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2005-0008 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2005-0009 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2005-0010 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2005-0010 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9521 -CVE-2005-0021 - http://www.redhat.com/support/errata/RHSA-2005-025.html -CVE-2005-0022 - http://marc.info/?l=bugtraq&m=110824870908614&w=2 -CVE-2005-0022 - http://www.redhat.com/support/errata/RHSA-2005-025.html -CVE-2005-0023 - http://bugzilla.gnome.org/show_bug.cgi?id=317312 -CVE-2005-0040 - http://www.securityfocus.com/bid/13646 -CVE-2005-0044 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-012 -CVE-2005-0045 - http://www.securityfocus.com/bid/12484 -CVE-2005-0045 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-011 -CVE-2005-0047 - http://marc.info/?l=bugtraq&m=111755870828817&w=2 -CVE-2005-0047 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-012 -CVE-2005-0047 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A901 -CVE-2005-0048 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 -CVE-2005-0049 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-006 -CVE-2005-0050 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-010 -CVE-2005-0051 - http://www.securityfocus.com/bid/12486 -CVE-2005-0051 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-007 -CVE-2005-0053 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 -CVE-2005-0054 - http://marc.info/?l=bugtraq&m=110796851002781&w=2 -CVE-2005-0054 - http://www.kb.cert.org/vuls/id/580299 -CVE-2005-0054 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 -CVE-2005-0055 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 -CVE-2005-0056 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 -CVE-2005-0057 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-015 -CVE-2005-0058 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040 -CVE-2005-0059 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-017 -CVE-2005-0060 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 -CVE-2005-0061 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 -CVE-2005-0063 - http://marc.info/?l=bugtraq&m=111755356016155&w=2 -CVE-2005-0063 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-016 -CVE-2005-0069 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402 -CVE-2005-0075 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9587 -CVE-2005-0078 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9260 -CVE-2005-0084 - http://www.redhat.com/support/errata/RHSA-2005-037.html -CVE-2005-0084 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9140 -CVE-2005-0089 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9811 -CVE-2005-0100 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408 -CVE-2005-0102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9616 -CVE-2005-0108 - http://marc.info/?l=bugtraq&m=110548193312050&w=2 -CVE-2005-0109 - http://www.daemonology.net/hyperthreading-considered-harmful/ -CVE-2005-0109 - http://www.kb.cert.org/vuls/id/911878 -CVE-2005-0109 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747 -CVE-2005-0116 - http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf -CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2004/Dec/3914.html -CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2005/Jan/1089.html -CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2005/Jan/2018.html -CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2005/Jan/2020.html -CVE-2005-0124 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-0135 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0135 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9040 -CVE-2005-0142 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9543 -CVE-2005-0147 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9578 -CVE-2005-0179 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9890 -CVE-2005-0182 - http://marc.info/?l=bugtraq&m=110547469530582&w=2 -CVE-2005-0183 - http://marc.info/?l=bugtraq&m=110549426300953&w=2 -CVE-2005-0184 - http://marc.info/?l=bugtraq&m=110549426300953&w=2 -CVE-2005-0193 - http://marc.info/?l=bugtraq&m=110642400018425&w=2 -CVE-2005-0202 - http://www.redhat.com/support/errata/RHSA-2005-136.html -CVE-2005-0205 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9596 -CVE-2005-0207 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0209 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0211 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9573 -CVE-2005-0212 - http://aluigi.altervista.org/adv/amp2zero-adv.txt -CVE-2005-0212 - http://marc.info/?l=bugtraq&m=110503597505648&w=2 -CVE-2005-0213 - http://marc.info/?l=bugtraq&m=110505334903257&w=2 -CVE-2005-0215 - http://marc.info/?l=bugtraq&m=110512665029209&w=2 -CVE-2005-0216 - http://marc.info/?l=bugtraq&m=110537385427004&w=2 -CVE-2005-0218 - http://seclists.org/lists/fulldisclosure/2005/Jan/0332.html -CVE-2005-0229 - http://marc.info/?l=full-disclosure&m=110824766519417&w=2 -CVE-2005-0229 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-001.txt -CVE-2005-0230 - http://marc.info/?l=bugtraq&m=110780995232064&w=2 -CVE-2005-0230 - https://bugzilla.mozilla.org/show_bug.cgi?id=279945 -CVE-2005-0231 - http://marc.info/?l=bugtraq&m=110781134617144&w=2 -CVE-2005-0232 - http://marc.info/?l=bugtraq&m=110781055630856&w=2 -CVE-2005-0233 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 -CVE-2005-0234 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 -CVE-2005-0235 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 -CVE-2005-0236 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 -CVE-2005-0247 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9345 -CVE-2005-0251 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 -CVE-2005-0251 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 -CVE-2005-0252 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 -CVE-2005-0252 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 -CVE-2005-0253 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 -CVE-2005-0253 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 -CVE-2005-0254 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 -CVE-2005-0254 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 -CVE-2005-0255 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9111 -CVE-2005-0273 - http://marc.info/?l=bugtraq&m=110486165802196&w=2 -CVE-2005-0274 - http://marc.info/?l=bugtraq&m=110486165802196&w=2 -CVE-2005-0279 - http://marc.info/?l=bugtraq&m=110486654213504&w=2 -CVE-2005-0280 - http://marc.info/?l=bugtraq&m=110486654213504&w=2 -CVE-2005-0281 - http://marc.info/?l=bugtraq&m=110486654213504&w=2 -CVE-2005-0282 - http://marc.info/?l=bugtraq&m=110486566600980&w=2 -CVE-2005-0290 - http://marc.info/?l=bugtraq&m=110599727631560&w=2 -CVE-2005-0291 - http://marc.info/?l=bugtraq&m=110599727631560&w=2 -CVE-2005-0295 - http://marc.info/?l=bugtraq&m=110608422029555&w=2 -CVE-2005-0299 - http://marc.info/?l=bugtraq&m=110627132209963&w=2 -CVE-2005-0300 - http://marc.info/?l=bugtraq&m=110627201120011&w=2 -CVE-2005-0304 - http://aluigi.altervista.org/adv/divxplayer-adv.txt -CVE-2005-0304 - http://marc.info/?l=bugtraq&m=110642748517854&w=2 -CVE-2005-0308 - http://marc.info/?l=bugtraq&m=110661194108205&w=2 -CVE-2005-0309 - http://marc.info/?l=bugtraq&m=110666998407073&w=2 -CVE-2005-0310 - http://marc.info/?l=bugtraq&m=110666998407073&w=2 -CVE-2005-0312 - http://marc.info/?l=bugtraq&m=110687202332039&w=2 -CVE-2005-0316 - http://marc.info/?l=bugtraq&m=110693045507245&w=2 -CVE-2005-0316 - http://www.oliverkarow.de/research/WebWasherCONNECT.txt -CVE-2005-0325 - http://aluigi.altervista.org/adv/xprallyboom-adv.txt -CVE-2005-0325 - http://marc.info/?l=bugtraq&m=110720064811485&w=2 -CVE-2005-0330 - http://aluigi.altervista.org/adv/painkkeybof-adv.txt -CVE-2005-0330 - http://marc.info/?l=bugtraq&m=110736915015707&w=2 -CVE-2005-0332 - http://marc.info/?l=bugtraq&m=110737616324614&w=2 -CVE-2005-0333 - http://marc.info/?l=bugtraq&m=110746524021133&w=2 -CVE-2005-0339 - http://marc.info/?l=bugtraq&m=110763204301080&w=2 -CVE-2005-0340 - http://marc.info/?l=bugtraq&m=110791369419784&w=2 -CVE-2005-0343 - http://marc.info/?l=bugtraq&m=110782042532295&w=2 -CVE-2005-0345 - http://www.securityfocus.com/bid/12482 -CVE-2005-0347 - http://marc.info/?l=bugtraq&m=110792779115794&w=2 -CVE-2005-0348 - http://marc.info/?l=bugtraq&m=110792779115794&w=2 -CVE-2005-0353 - http://marc.info/?l=full-disclosure&m=111072872816405&w=2 -CVE-2005-0369 - http://marc.info/?l=bugtraq&m=110811699206052&w=2 -CVE-2005-0370 - http://marc.info/?l=bugtraq&m=110811699206052&w=2 -CVE-2005-0371 - http://marc.info/?l=bugtraq&m=110811699206052&w=2 -CVE-2005-0372 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9923 -CVE-2005-0374 - http://marc.info/?l=bugtraq&m=110555988111899&w=2 -CVE-2005-0375 - http://marc.info/?l=bugtraq&m=110557050700947&w=2 -CVE-2005-0375 - http://www.waraxe.us/advisory-39.html -CVE-2005-0376 - http://marc.info/?l=bugtraq&m=110557050700947&w=2 -CVE-2005-0376 - http://www.waraxe.us/advisory-39.html -CVE-2005-0377 - http://marc.info/?l=bugtraq&m=110557050700947&w=2 -CVE-2005-0377 - http://www.waraxe.us/advisory-39.html -CVE-2005-0379 - http://marc.info/?l=bugtraq&m=110565373407474&w=2 -CVE-2005-0380 - http://marc.info/?l=bugtraq&m=110565373407474&w=2 -CVE-2005-0382 - http://marc.info/?l=bugtraq&m=110565587010998&w=2 -CVE-2005-0384 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0384 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562 -CVE-2005-0400 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0401 - http://marc.info/?l=bugtraq&m=111168413007891&w=2 -CVE-2005-0401 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9650 -CVE-2005-0403 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435 -CVE-2005-0404 - http://bugs.kde.org/show_bug.cgi?id=96020 -CVE-2005-0406 - http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html -CVE-2005-0406 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt -CVE-2005-0407 - http://seclists.org/lists/fulldisclosure/2005/Feb/0347.html -CVE-2005-0407 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-007.txt -CVE-2005-0408 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt -CVE-2005-0409 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-003.txt -CVE-2005-0410 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-004.txt -CVE-2005-0411 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-005.txt -CVE-2005-0413 - https://www.exploit-db.com/exploits/4822 -CVE-2005-0414 - http://marc.info/?l=bugtraq&m=110797495532358&w=2 -CVE-2005-0416 - http://marc.info/?l=bugtraq&m=110556975827760&w=2 -CVE-2005-0416 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 -CVE-2005-0419 - http://marc.info/?l=bugtraq&m=110780306326130&w=2 -CVE-2005-0430 - http://aluigi.altervista.org/adv/q3infoboom-adv.txt -CVE-2005-0430 - http://marc.info/?l=bugtraq&m=110824822224025&w=2 -CVE-2005-0449 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0468 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9640 -CVE-2005-0469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708 -CVE-2005-0476 - http://marc.info/?l=bugtraq&m=110869187805397&w=2 -CVE-2005-0492 - http://marc.info/?l=bugtraq&m=110879063511486&w=2 -CVE-2005-0501 - http://aluigi.altervista.org/adv/bontagobof-adv.txt -CVE-2005-0504 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9770 -CVE-2005-0511 - http://marc.info/?l=bugtraq&m=110910899415763&w=2 -CVE-2005-0519 - http://www.securityfocus.com/bid/12487 -CVE-2005-0524 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9310 -CVE-2005-0526 - http://marc.info/?l=bugtraq&m=110917641105486&w=2 -CVE-2005-0526 - http://marc.info/?l=bugtraq&m=110917702708589&w=2 -CVE-2005-0526 - http://marc.info/?l=bugtraq&m=110917768511595&w=2 -CVE-2005-0527 - http://marc.info/?l=bugtraq&m=110935267500395&w=2 -CVE-2005-0529 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0530 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0531 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0550 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 -CVE-2005-0551 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 -CVE-2005-0553 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 -CVE-2005-0554 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 -CVE-2005-0555 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 -CVE-2005-0558 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-023 -CVE-2005-0560 - http://marc.info/?l=bugtraq&m=111393947713420&w=2 -CVE-2005-0563 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-029 -CVE-2005-0568 - http://aluigi.altervista.org/adv/sof2guidboom-adv.txt -CVE-2005-0568 - http://marc.info/?l=bugtraq&m=110927288423807&w=2 -CVE-2005-0569 - http://marc.info/?l=bugtraq&m=110927754230666&w=2 -CVE-2005-0570 - http://marc.info/?l=bugtraq&m=110927754230666&w=2 -CVE-2005-0571 - http://marc.info/?l=bugtraq&m=110927754230666&w=2 -CVE-2005-0575 - http://marc.info/?l=bugtraq&m=110943766505666&w=2 -CVE-2005-0575 - http://www.exploit-db.com/exploits/24950 -CVE-2005-0585 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9924 -CVE-2005-0591 - http://marc.info/?l=bugtraq&m=110547286002188&w=2 -CVE-2005-0591 - https://bugzilla.mozilla.org/show_bug.cgi?id=260560 -CVE-2005-0593 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9533 -CVE-2005-0597 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml -CVE-2005-0598 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml -CVE-2005-0599 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml -CVE-2005-0600 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml -CVE-2005-0601 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml -CVE-2005-0606 - http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html -CVE-2005-0607 - http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html -CVE-2005-0619 - https://www.exploit-db.com/exploits/846 -CVE-2005-0621 - http://aluigi.altervista.org/adv/scrapboom-adv.txt -CVE-2005-0621 - http://marc.info/?l=full-disclosure&m=110961578504928&w=2 -CVE-2005-0628 - http://marc.info/?l=bugtraq&m=110971101826900&w=2 -CVE-2005-0629 - http://marc.info/?l=bugtraq&m=110970474726113&w=2 -CVE-2005-0629 - http://marc.info/?l=bugtraq&m=110970911514167&w=2 -CVE-2005-0630 - http://marc.info/?l=bugtraq&m=110971002211589&w=2 -CVE-2005-0631 - http://marc.info/?l=bugtraq&m=110970738214608&w=2 -CVE-2005-0632 - http://marc.info/?l=bugtraq&m=110989169008570&w=2 -CVE-2005-0633 - http://marc.info/?l=bugtraq&m=111023000624809&w=2 -CVE-2005-0638 - http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf -CVE-2005-0658 - http://marc.info/?l=bugtraq&m=110995289619649&w=2 -CVE-2005-0671 - http://aluigi.altervista.org/adv/ca3dex-adv.txt -CVE-2005-0672 - http://aluigi.altervista.org/adv/ca3dex-adv.txt -CVE-2005-0688 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 -CVE-2005-0688 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 -CVE-2005-0693 - http://aluigi.altervista.org/adv/chasercool-adv.txt -CVE-2005-0696 - http://securityreason.com/securityalert/494 -CVE-2005-0699 - http://marc.info/?l=bugtraq&m=111083125521813&w=2 -CVE-2005-0709 - http://marc.info/?l=bugtraq&m=111066115808506&w=2 -CVE-2005-0710 - http://marc.info/?l=bugtraq&m=111065974004648&w=2 -CVE-2005-0711 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591 -CVE-2005-0726 - http://marc.info/?l=bugtraq&m=111056135818279&w=2 -CVE-2005-0729 - http://aluigi.altervista.org/adv/xprallyfs-adv.txt -CVE-2005-0736 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0736 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870 -CVE-2005-0739 - http://marc.info/?l=bugtraq&m=111066805726551&w=2 -CVE-2005-0739 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687 -CVE-2005-0749 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0750 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0753 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9688 -CVE-2005-0758 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797 -CVE-2005-0762 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9736 -CVE-2005-0766 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9866 -CVE-2005-0767 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0768 - http://marc.info/?l=bugtraq&m=111092012415193&w=2 -CVE-2005-0770 - http://marc.info/?l=bugtraq&m=111100269512216&w=2 -CVE-2005-0770 - http://pb.specialised.info/all/adv/ida-debugger-adv.txt -CVE-2005-0774 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 -CVE-2005-0775 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 -CVE-2005-0776 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 -CVE-2005-0777 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 -CVE-2005-0778 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 -CVE-2005-0782 - http://marc.info/?l=bugtraq&m=111221940107161&w=2 -CVE-2005-0786 - http://marc.info/?l=bugtraq&m=111082702422979&w=2 -CVE-2005-0790 - http://securityreason.com/adv/%5BphpAdsNew%202.0.4-pr1%20Multiple%20vulnerabilities%20cXIb8O3.9%5D.asc -CVE-2005-0791 - http://securityreason.com/adv/%5BphpAdsNew%202.0.4-pr1%20Multiple%20vulnerabilities%20cXIb8O3.9%5D.asc -CVE-2005-0799 - http://marc.info/?l=bugtraq&m=111091250923281&w=2 -CVE-2005-0803 - http://marc.info/?l=bugtraq&m=111108743527497&w=2 -CVE-2005-0803 - http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf -CVE-2005-0803 - http://www.kb.cert.org/vuls/id/134756 -CVE-2005-0803 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 -CVE-2005-0804 - http://marc.info/?l=bugtraq&m=111108519331738&w=2 -CVE-2005-0815 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0815 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9307 -CVE-2005-0826 - http://marc.info/?l=bugtraq&m=111125734701262&w=2 -CVE-2005-0836 - http://jouko.iki.fi/adv/ws.html -CVE-2005-0836 - http://marc.info/?l=full-disclosure&m=111117284323657&w=2 -CVE-2005-0839 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0839 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9460 -CVE-2005-0841 - http://marc.info/?l=bugtraq&m=111143649730845&w=2 -CVE-2005-0847 - https://www.exploit-db.com/exploits/893 -CVE-2005-0848 - http://aluigi.altervista.org/adv/funlabsboom-adv.txt -CVE-2005-0849 - http://aluigi.altervista.org/adv/funlabsboom-adv.txt -CVE-2005-0853 - https://www.exploit-db.com/exploits/7499 -CVE-2005-0859 - https://www.exploit-db.com/exploits/2009 -CVE-2005-0867 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0876 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2005-0877 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2005-0891 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710 -CVE-2005-0894 - http://marc.info/?l=bugtraq&m=111176899423078&w=2 -CVE-2005-0897 - http://marc.info/?l=bugtraq&m=111186424600509&w=2 -CVE-2005-0898 - http://marc.info/?l=bugtraq&m=111186424600509&w=2 -CVE-2005-0905 - http://marc.info/?l=full-disclosure&m=111175236620942&w=2 -CVE-2005-0906 - http://aluigi.altervista.org/adv/tincat2bof-adv.txt -CVE-2005-0919 - http://exploitlabs.com/files/advisories/EXPL-A-2005-003-adventiachat.txt -CVE-2005-0919 - http://marc.info/?l=full-disclosure&m=111211930330410&w=2 -CVE-2005-0924 - http://exploitlabs.com/files/advisories/EXPL-A-2005-004-edata.txt -CVE-2005-0924 - http://marc.info/?l=full-disclosure&m=111211945505635&w=2 -CVE-2005-0928 - http://marc.info/?l=bugtraq&m=111205342909640&w=2 -CVE-2005-0929 - http://marc.info/?l=bugtraq&m=111205342909640&w=2 -CVE-2005-0935 - http://marc.info/?l=bugtraq&m=111221890614271&w=2 -CVE-2005-0936 - http://marc.info/?l=bugtraq&m=111221890614271&w=2 -CVE-2005-0941 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9106 -CVE-2005-0948 - http://marc.info/?l=bugtraq&m=111213291118273&w=2 -CVE-2005-0949 - http://marc.info/?l=bugtraq&m=111213291118273&w=2 -CVE-2005-0952 - http://marc.info/?l=bugtraq&m=111221940107161&w=2 -CVE-2005-0955 - http://marc.info/?l=bugtraq&m=111230101127767&w=2 -CVE-2005-0956 - http://marc.info/?l=bugtraq&m=111230101127767&w=2 -CVE-2005-0966 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9185 -CVE-2005-0967 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9657 -CVE-2005-0977 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-0979 - http://marc.info/?l=bugtraq&m=111238364916500&w=2 -CVE-2005-0980 - http://marc.info/?l=bugtraq&m=111247198021626&w=2 -CVE-2005-0981 - http://marc.info/?l=bugtraq&m=111247198021626&w=2 -CVE-2005-0983 - http://aluigi.altervista.org/adv/q3msgboom-adv.txt -CVE-2005-0983 - http://marc.info/?l=bugtraq&m=111246796918067&w=2 -CVE-2005-0984 - http://aluigi.altervista.org/adv/jamsgbof-adv.txt -CVE-2005-0984 - http://marc.info/?l=bugtraq&m=111246855213653&w=2 -CVE-2005-0989 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-0990 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9613 -CVE-2005-0992 - http://www.arrelnet.com/advisories/adv20050403.html -CVE-2005-10001 - https://vuldb.com/?id.1022 -CVE-2005-1003 - http://marc.info/?l=bugtraq&m=111264602406090&w=2 -CVE-2005-1004 - http://marc.info/?l=bugtraq&m=111264602406090&w=2 -CVE-2005-1005 - http://marc.info/?l=bugtraq&m=111264602406090&w=2 -CVE-2005-1007 - http://www.stalker.com/CommuniGatePro/History.html -CVE-2005-1009 - http://www.hat-squad.com/en/000164.html -CVE-2005-1009 - http://www.hat-squad.com/en/000165.html -CVE-2005-1013 - http://marc.info/?l=bugtraq&m=111273637518494&w=2 -CVE-2005-1019 - http://marc.info/?l=bugtraq&m=111262942708249&w=2 -CVE-2005-1023 - http://www.securityreason.com/adv/PHPNuke%206.x-7.6-p1.txt -CVE-2005-1024 - http://www.securityreason.com/adv/PHPNuke%206.x-7.6-p1.txt -CVE-2005-1029 - http://marc.info/?l=bugtraq&m=111280834000432&w=2 -CVE-2005-1030 - http://marc.info/?l=bugtraq&m=111280834000432&w=2 -CVE-2005-1041 - http://www.redhat.com/support/errata/RHSA-2005-366.html -CVE-2005-1041 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9487 -CVE-2005-1046 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5802 -CVE-2005-1048 - http://marc.info/?l=bugtraq&m=111298226029957&w=2 -CVE-2005-1049 - http://marc.info/?l=bugtraq&m=111298226029957&w=2 -CVE-2005-1050 - http://marc.info/?l=bugtraq&m=111298226029957&w=2 -CVE-2005-1051 - http://marc.info/?l=bugtraq&m=111306207306155&w=2 -CVE-2005-1055 - http://marc.info/?l=bugtraq&m=111323802003019&w=2 -CVE-2005-1071 - http://marc.info/?l=bugtraq&m=111331738223323&w=2 -CVE-2005-1077 - http://marc.info/?l=full-disclosure&m=111330048629182&w=2 -CVE-2005-1078 - http://marc.info/?l=full-disclosure&m=111330048629182&w=2 -CVE-2005-1079 - http://marc.info/?l=bugtraq&m=111340031132596&w=2 -CVE-2005-1099 - http://marc.info/?l=bugtraq&m=111339935903880&w=2 -CVE-2005-1100 - http://marc.info/?l=bugtraq&m=111339935903880&w=2 -CVE-2005-1111 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9783 -CVE-2005-1113 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 -CVE-2005-1114 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 -CVE-2005-1115 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 -CVE-2005-1116 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 -CVE-2005-1134 - http://seclists.org/lists/bugtraq/2005/Apr/0195.html -CVE-2005-1141 - http://marc.info/?l=bugtraq&m=111358557823673&w=2 -CVE-2005-1142 - http://marc.info/?l=bugtraq&m=111358557823673&w=2 -CVE-2005-1143 - http://www.snkenjoi.com/secadv/secadv4.txt -CVE-2005-1144 - http://www.snkenjoi.com/secadv/secadv4.txt -CVE-2005-1145 - http://www.snkenjoi.com/secadv/secadv3.txt -CVE-2005-1146 - http://www.snkenjoi.com/secadv/secadv3.txt -CVE-2005-1147 - http://www.snkenjoi.com/secadv/secadv3.txt -CVE-2005-1148 - http://www.snkenjoi.com/secadv/secadv3.txt -CVE-2005-1153 - http://www.mozilla.org/security/announce/mfsa2005-35.html -CVE-2005-1153 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9584 -CVE-2005-1155 - https://bugzilla.mozilla.org/show_bug.cgi?id=290036 -CVE-2005-1157 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9961 -CVE-2005-1158 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100019 -CVE-2005-1159 - http://www.mozilla.org/security/announce/mfsa2005-40.html -CVE-2005-1159 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-1160 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-1161 - http://marc.info/?l=bugtraq&m=111352017704126&w=2 -CVE-2005-1162 - http://marc.info/?l=bugtraq&m=111352017704126&w=2 -CVE-2005-1163 - http://aluigi.altervista.org/adv/yagerbof-adv.txt -CVE-2005-1163 - http://marc.info/?l=bugtraq&m=111352154820865&w=2 -CVE-2005-1164 - http://aluigi.altervista.org/adv/yagerbof-adv.txt -CVE-2005-1164 - http://marc.info/?l=bugtraq&m=111352154820865&w=2 -CVE-2005-1165 - http://aluigi.altervista.org/adv/yagerbof-adv.txt -CVE-2005-1165 - http://marc.info/?l=bugtraq&m=111352154820865&w=2 -CVE-2005-1173 - http://marc.info/?l=bugtraq&m=111384806002021&w=2 -CVE-2005-1175 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902 -CVE-2005-1180 - http://marc.info/?l=bugtraq&m=111359804013536&w=2 -CVE-2005-1184 - http://seclists.org/lists/fulldisclosure/2005/Apr/0358.html -CVE-2005-1191 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-024 -CVE-2005-1192 - http://securityreason.com/securityalert/262 -CVE-2005-1192 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A935 -CVE-2005-1193 - http://www.kb.cert.org/vuls/id/113196 -CVE-2005-1194 - http://www.redhat.com/support/errata/RHSA-2005-381.html -CVE-2005-1199 - http://marc.info/?l=bugtraq&m=111393619021575&w=2 -CVE-2005-1205 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-033 -CVE-2005-1206 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-027 -CVE-2005-1207 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-028 -CVE-2005-1208 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-026 -CVE-2005-1211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-025 -CVE-2005-1212 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-031 -CVE-2005-1213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-030 -CVE-2005-1213 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A989 -CVE-2005-1214 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-032 -CVE-2005-1214 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A906 -CVE-2005-1215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 -CVE-2005-1216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 -CVE-2005-1218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041 -CVE-2005-1220 - http://marc.info/?l=bugtraq&m=111402253108991&w=2 -CVE-2005-1223 - http://marc.info/?l=bugtraq&m=111401502007772&w=2 -CVE-2005-1224 - http://marc.info/?l=bugtraq&m=111401172901705&w=2 -CVE-2005-1233 - http://www.snkenjoi.com/secadv/secadv7.txt -CVE-2005-1234 - http://www.snkenjoi.com/secadv/secadv9.txt -CVE-2005-1235 - http://www.snkenjoi.com/secadv/secadv9.txt -CVE-2005-1237 - https://www.exploit-db.com/exploits/3631 -CVE-2005-1263 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-1267 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 -CVE-2005-1268 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9589 -CVE-2005-1269 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9544 -CVE-2005-1275 - http://seclists.org/lists/bugtraq/2005/Apr/0407.html -CVE-2005-1275 - http://www.imagemagick.org/script/changelog.php -CVE-2005-1279 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9601 -CVE-2005-1286 - http://marc.info/?l=bugtraq&m=111420400316397&w=2 -CVE-2005-1287 - http://marc.info/?l=bugtraq&m=111428133317901&w=2 -CVE-2005-1291 - http://marc.info/?l=bugtraq&m=111428393022389&w=2 -CVE-2005-1292 - http://marc.info/?l=bugtraq&m=111428393022389&w=2 -CVE-2005-1293 - http://marc.info/?l=bugtraq&m=111445131808328&w=2 -CVE-2005-1294 - http://marc.info/?l=bugtraq&m=111445064725591&w=2 -CVE-2005-1294 - http://www.digitalmunition.com/DMA%5B2005-0423a%5D.txt -CVE-2005-1306 - http://www.securityfocus.com/bid/13962 -CVE-2005-1328 - http://lostmon.blogspot.com/2005/04/oneworldstore-critical-failure.html -CVE-2005-1329 - http://lostmon.blogspot.com/2005/04/oneworldstore-user-information.html -CVE-2005-1348 - http://marc.info/?l=bugtraq&m=111445834220015&w=2 -CVE-2005-1360 - http://marc.info/?l=bugtraq&m=111454354214982&w=2 -CVE-2005-1361 - http://marc.info/?l=bugtraq&m=111453994718211&w=2 -CVE-2005-1362 - http://marc.info/?l=bugtraq&m=111454090503662&w=2 -CVE-2005-1363 - http://marc.info/?l=bugtraq&m=111454142832023&w=2 -CVE-2005-1364 - http://marc.info/?l=bugtraq&m=111454192928364&w=2 -CVE-2005-1365 - http://marc.info/?l=full-disclosure&m=111625635716712&w=2 -CVE-2005-1365 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-010.txt -CVE-2005-1366 - http://marc.info/?l=full-disclosure&m=111625623909003&w=2 -CVE-2005-1366 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-011.txt -CVE-2005-1367 - http://marc.info/?l=full-disclosure&m=111625623909003&w=2 -CVE-2005-1367 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-012.txt -CVE-2005-1384 - http://marc.info/?l=bugtraq&m=111473522804665&w=2 -CVE-2005-1384 - http://pridels0.blogspot.com/2006/03/phpcoin-poc.html -CVE-2005-1393 - http://marc.info/?l=full-disclosure&m=111489411524630&w=2 -CVE-2005-1393 - http://www.digitalmunition.com/DMA%5B2005-0425a%5D.txt -CVE-2005-1394 - http://marc.info/?l=full-disclosure&m=111489411524630&w=2 -CVE-2005-1394 - http://www.digitalmunition.com/DMA%5B2005-0425a%5D.txt -CVE-2005-1398 - http://lostmon.blogspot.com/2005/04/phpcart-price-manipulation.html -CVE-2005-1401 - http://aluigi.altervista.org/adv/mtpbugs-adv.txt -CVE-2005-1402 - http://aluigi.altervista.org/adv/mtpbugs-adv.txt -CVE-2005-1410 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9343 -CVE-2005-1415 - http://www.cuteftp.com/gsftps/history.asp -CVE-2005-1425 - https://www.exploit-db.com/exploits/8609 -CVE-2005-1426 - https://www.exploit-db.com/exploits/8610 -CVE-2005-1431 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9238 -CVE-2005-1440 - http://lostmon.blogspot.com/2005/04/viart-shop-enterprise-multiple.html -CVE-2005-1454 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9610 -CVE-2005-1455 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9579 -CVE-2005-1456 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9700 -CVE-2005-1457 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9825 -CVE-2005-1460 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9970 -CVE-2005-1461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9853 -CVE-2005-1462 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9713 -CVE-2005-1464 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9534 -CVE-2005-1467 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9654 -CVE-2005-1469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9598 -CVE-2005-1471 - http://marc.info/?l=full-disclosure&m=111537013104724&w=2 -CVE-2005-1476 - http://marc.info/?l=full-disclosure&m=111553138007647&w=2 -CVE-2005-1476 - http://marc.info/?l=full-disclosure&m=111556301530553&w=2 -CVE-2005-1476 - http://www.kb.cert.org/vuls/id/534710 -CVE-2005-1476 - https://bugzilla.mozilla.org/show_bug.cgi?id=293302 -CVE-2005-1477 - http://marc.info/?l=full-disclosure&m=111553138007647&w=2 -CVE-2005-1477 - http://marc.info/?l=full-disclosure&m=111556301530553&w=2 -CVE-2005-1477 - https://bugzilla.mozilla.org/show_bug.cgi?id=293302 -CVE-2005-1477 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9231 -CVE-2005-1480 - http://marc.info/?l=bugtraq&m=111507556127582&w=2 -CVE-2005-1481 - http://marc.info/?l=bugtraq&m=111530675909673&w=2 -CVE-2005-1482 - http://marc.info/?l=bugtraq&m=111530871724865&w=2 -CVE-2005-1483 - http://marc.info/?l=bugtraq&m=111530871724865&w=2 -CVE-2005-1484 - http://marc.info/?l=bugtraq&m=111530871716145&w=2 -CVE-2005-1485 - http://marc.info/?l=bugtraq&m=111530871716145&w=2 -CVE-2005-1486 - http://marc.info/?l=bugtraq&m=111530799109755&w=2 -CVE-2005-1487 - http://marc.info/?l=bugtraq&m=111530799109755&w=2 -CVE-2005-1496 - http://www.red-database-security.com/exploits/oracle_exploit_dbms_scheduler_select_user.html -CVE-2005-1497 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 -CVE-2005-1497 - http://mywebland.com/forums/viewtopic.php?t=180 -CVE-2005-1498 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 -CVE-2005-1498 - http://mywebland.com/forums/viewtopic.php?t=180 -CVE-2005-1499 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 -CVE-2005-1499 - http://mywebland.com/forums/viewtopic.php?t=180 -CVE-2005-1500 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 -CVE-2005-1500 - http://mywebland.com/forums/viewtopic.php?t=180 -CVE-2005-1504 - http://aluigi.altervista.org/adv/gskeyinuse-adv.txt -CVE-2005-1504 - http://marc.info/?l=bugtraq&m=111539740212818&w=2 -CVE-2005-1507 - http://marc.info/?l=bugtraq&m=111541709402784&w=2 -CVE-2005-1513 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html -CVE-2005-1513 - http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html -CVE-2005-1513 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html -CVE-2005-1513 - http://seclists.org/fulldisclosure/2020/May/42 -CVE-2005-1513 - http://seclists.org/fulldisclosure/2023/Jun/2 -CVE-2005-1513 - http://www.openwall.com/lists/oss-security/2020/05/19/8 -CVE-2005-1513 - http://www.openwall.com/lists/oss-security/2023/06/06/3 -CVE-2005-1514 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html -CVE-2005-1514 - http://seclists.org/fulldisclosure/2020/May/42 -CVE-2005-1514 - http://www.openwall.com/lists/oss-security/2020/05/19/8 -CVE-2005-1515 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html -CVE-2005-1515 - http://seclists.org/fulldisclosure/2020/May/42 -CVE-2005-1515 - http://www.openwall.com/lists/oss-security/2020/05/19/8 -CVE-2005-1519 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9976 -CVE-2005-1532 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-1547 - http://marc.info/?l=bugtraq&m=111600439331242&w=2 -CVE-2005-1554 - http://marc.info/?l=bugtraq&m=111575905112831&w=2 -CVE-2005-1556 - http://aluigi.altervista.org/adv/gskeyinuse-adv.txt -CVE-2005-1556 - http://marc.info/?l=bugtraq&m=111575820116969&w=2 -CVE-2005-1561 - http://marc.info/?l=bugtraq&m=111584883727605&w=2 -CVE-2005-1562 - http://marc.info/?l=bugtraq&m=111584883727605&w=2 -CVE-2005-1567 - http://marc.info/?l=bugtraq&m=111592417803514&w=2 -CVE-2005-1568 - http://marc.info/?l=bugtraq&m=111592417803514&w=2 -CVE-2005-1569 - http://marc.info/?l=bugtraq&m=111592417803514&w=2 -CVE-2005-1593 - http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html -CVE-2005-1594 - http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html -CVE-2005-1595 - http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html -CVE-2005-1598 - https://www.exploit-db.com/exploits/1013 -CVE-2005-1612 - http://marc.info/?l=bugtraq&m=111601780332632&w=2 -CVE-2005-1613 - http://marc.info/?l=bugtraq&m=111601780332632&w=2 -CVE-2005-1614 - http://marc.info/?l=bugtraq&m=111600262424876&w=2 -CVE-2005-1615 - http://marc.info/?l=bugtraq&m=111600262424876&w=2 -CVE-2005-1616 - http://marc.info/?l=bugtraq&m=111600262424876&w=2 -CVE-2005-1618 - http://marc.info/?l=bugtraq&m=111601904204055&w=2 -CVE-2005-1619 - http://marc.info/?l=bugtraq&m=111602076500031&w=2 -CVE-2005-1620 - http://marc.info/?l=bugtraq&m=111609838307070&w=2 -CVE-2005-1621 - http://marc.info/?l=bugtraq&m=111627124301526&w=2 -CVE-2005-1636 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504 -CVE-2005-1643 - http://aluigi.altervista.org/adv/zoidboom-adv.txt -CVE-2005-1667 - https://www.exploit-db.com/exploits/983 -CVE-2005-1671 - http://marc.info/?l=bugtraq&m=111643475210982&w=2 -CVE-2005-1679 - http://marc.info/?l=bugtraq&m=111661253517089&w=2 -CVE-2005-1681 - http://marc.info/?l=bugtraq&m=111653168810937&w=2 -CVE-2005-1683 - http://marc.info/?l=bugtraq&m=111653088303057&w=2 -CVE-2005-1686 - http://marc.info/?l=bugtraq&m=111661117701398&w=2 -CVE-2005-1686 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9845 -CVE-2005-1689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819 -CVE-2005-1692 - http://marc.info/?l=bugtraq&m=111670637812128&w=2 -CVE-2005-1702 - http://aluigi.altervista.org/adv/warkings-adv.txt -CVE-2005-1702 - http://marc.info/?l=bugtraq&m=111686776303832&w=2 -CVE-2005-1703 - http://aluigi.altervista.org/adv/warkings-adv.txt -CVE-2005-1703 - http://marc.info/?l=bugtraq&m=111686776303832&w=2 -CVE-2005-1704 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071 -CVE-2005-1712 - http://sourceforge.net/project/shownotes.php?release_id=328092 -CVE-2005-1713 - http://sourceforge.net/project/shownotes.php?release_id=328092 -CVE-2005-1718 - http://aluigi.altervista.org/adv/wartimesboom-adv.txt -CVE-2005-1739 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A960 -CVE-2005-1741 - http://aluigi.altervista.org/adv/haloloop-adv.txt -CVE-2005-1751 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9639 -CVE-2005-1752 - http://marc.info/?l=bugtraq&m=111695779919830&w=2 -CVE-2005-1760 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9522 -CVE-2005-1766 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9509 -CVE-2005-1769 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9852 -CVE-2005-1770 - http://marc.info/?l=bugtraq&m=111712494620031&w=2 -CVE-2005-1770 - http://pb.specialised.info/all/adv/avast-adv.txt -CVE-2005-1772 - http://aluigi.altervista.org/adv/t3wmbof-adv.txt -CVE-2005-1772 - http://marc.info/?l=bugtraq&m=111713248227479&w=2 -CVE-2005-1775 - http://marc.info/?l=bugtraq&m=111713248227479&w=2 -CVE-2005-1776 - http://aluigi.altervista.org/adv/cnedrabof-adv.txt -CVE-2005-1776 - http://marc.info/?l=bugtraq&m=111713300212601&w=2 -CVE-2005-1787 - http://marc.info/?l=bugtraq&m=111721290726958&w=2 -CVE-2005-1790 - http://marc.info/?l=bugtraq&m=111746394106172&w=2 -CVE-2005-1790 - http://www.kb.cert.org/vuls/id/887861 -CVE-2005-1791 - http://marc.info/?l=bugtraq&m=111746303509720&w=2 -CVE-2005-1792 - http://www.networksecurity.fi/advisories/windows-wmi-rpc.html -CVE-2005-1797 - http://cr.yp.to/antiforgery/cachetiming-20050414.pdf -CVE-2005-1808 - http://aluigi.altervista.org/adv/strong2boom-adv.txt -CVE-2005-1808 - http://marc.info/?l=bugtraq&m=111747562806999&w=2 -CVE-2005-1814 - http://marc.info/?l=bugtraq&m=111746551802380&w=2 -CVE-2005-1829 - http://marc.info/?l=bugtraq&m=111746441220149&w=2 -CVE-2005-1830 - http://marc.info/?l=bugtraq&m=111746654827861&w=2 -CVE-2005-1830 - http://pb.specialised.info/all/adv/sice-adv.txt -CVE-2005-1832 - http://marc.info/?l=bugtraq&m=111757191118050&w=2 -CVE-2005-1833 - http://marc.info/?l=bugtraq&m=111757191118050&w=2 -CVE-2005-1840 - http://marc.info/?l=bugtraq&m=111773774916907&w=2 -CVE-2005-1849 - http://www.ubuntulinux.org/usn/usn-151-3 -CVE-2005-1852 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 -CVE-2005-1858 - http://www.sven-tantau.de/public_files/fuse/fuse_20050603.txt -CVE-2005-1874 - http://bugs.gentoo.org/show_bug.cgi?id=93079 -CVE-2005-1875 - http://marc.info/?l=bugtraq&m=111773894525119&w=2 -CVE-2005-1891 - http://marc.info/?l=bugtraq&m=111816939928640&w=2 -CVE-2005-1899 - http://aluigi.altervista.org/adv/rakzero-adv.txt -CVE-2005-1899 - http://marc.info/?l=bugtraq&m=111809312423958&w=2 -CVE-2005-1900 - http://www.networksecurity.fi/advisories/sawmill-admin.html -CVE-2005-1901 - http://www.networksecurity.fi/advisories/sawmill-admin.html -CVE-2005-1907 - http://www.networksecurity.fi/advisories/windows-isa-firewall.html -CVE-2005-1918 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946 -CVE-2005-1920 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9434 -CVE-2005-1921 - http://marc.info/?l=bugtraq&m=112008638320145&w=2 -CVE-2005-1921 - http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt -CVE-2005-1924 - http://www.attrition.org/pipermail/vim/2007-July/001710.html -CVE-2005-1924 - https://www.exploit-db.com/exploits/4173 -CVE-2005-1928 - http://securityreason.com/securityalert/259 -CVE-2005-1929 - http://securityreason.com/securityalert/256 -CVE-2005-1929 - http://securityreason.com/securityalert/257 -CVE-2005-1930 - http://securityreason.com/securityalert/258 -CVE-2005-1937 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-1949 - http://marc.info/?l=bugtraq&m=111835539312985&w=2 -CVE-2005-1952 - http://marc.info/?l=bugtraq&m=111852830111316&w=2 -CVE-2005-1953 - http://marc.info/?l=bugtraq&m=111852830111316&w=2 -CVE-2005-1967 - http://echo.or.id/adv/adv16-theday-2005.txt -CVE-2005-1968 - http://echo.or.id/adv/adv16-theday-2005.txt -CVE-2005-1974 - http://securityreason.com/securityalert/56 -CVE-2005-1978 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 -CVE-2005-1979 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 -CVE-2005-1980 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 -CVE-2005-1981 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 -CVE-2005-1982 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 -CVE-2005-1983 - http://www.securiteam.com/windowsntfocus/5YP0E00GKW.html -CVE-2005-1983 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039 -CVE-2005-1984 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-043 -CVE-2005-1985 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-046 -CVE-2005-1985 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A910 -CVE-2005-1987 - http://marc.info/?l=bugtraq&m=112915118302012&w=2 -CVE-2005-1987 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048 -CVE-2005-1988 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 -CVE-2005-1989 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 -CVE-2005-1990 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 -CVE-2005-1994 - http://marc.info/?l=bugtraq&m=111877410528692&w=2 -CVE-2005-2002 - http://marc.info/?l=bugtraq&m=111885974124936&w=2 -CVE-2005-2003 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 -CVE-2005-2004 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 -CVE-2005-2005 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 -CVE-2005-2006 - http://securityreason.com/securityalert/439 -CVE-2005-2008 - http://marc.info/?l=bugtraq&m=111927717726371&w=2 -CVE-2005-2009 - http://echo.or.id/adv/adv18-theday-2005.txt -CVE-2005-2009 - http://marc.info/?l=bugtraq&m=111928552304897&w=2 -CVE-2005-2010 - http://echo.or.id/adv/adv18-theday-2005.txt -CVE-2005-2010 - http://marc.info/?l=bugtraq&m=111928552304897&w=2 -CVE-2005-2011 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 -CVE-2005-2012 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 -CVE-2005-2013 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 -CVE-2005-2014 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 -CVE-2005-2030 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 -CVE-2005-2035 - http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt -CVE-2005-2035 - http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html -CVE-2005-2036 - http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt -CVE-2005-2036 - http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html -CVE-2005-2053 - http://echo.or.id/adv/adv20-theday-2005.txt -CVE-2005-2053 - http://marc.info/?l=bugtraq&m=111954840611126&w=2 -CVE-2005-2062 - http://echo.or.id/adv/adv21-theday-2005.txt -CVE-2005-2062 - http://marc.info/?l=bugtraq&m=111963341429906&w=2 -CVE-2005-2062 - https://www.exploit-db.com/exploits/3550 -CVE-2005-2063 - http://echo.or.id/adv/adv21-theday-2005.txt -CVE-2005-2063 - http://marc.info/?l=bugtraq&m=111963341429906&w=2 -CVE-2005-2064 - http://marc.info/?l=bugtraq&m=111989223906484&w=2 -CVE-2005-2065 - http://marc.info/?l=bugtraq&m=111989223906484&w=2 -CVE-2005-2066 - http://marc.info/?l=bugtraq&m=111989223906484&w=2 -CVE-2005-2067 - http://marc.info/?l=bugtraq&m=111989828622112&w=2 -CVE-2005-2069 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445 -CVE-2005-2071 - http://marc.info/?l=bugtraq&m=111963068714114&w=2 -CVE-2005-2081 - http://marc.info/?l=bugtraq&m=111946399501080&w=2 -CVE-2005-2082 - http://marc.info/?l=bugtraq&m=112006605026261&w=2 -CVE-2005-2086 - http://marc.info/?l=bugtraq&m=111999905917019&w=2 -CVE-2005-2087 - http://marc.info/?l=bugtraq&m=112006764714946&w=2 -CVE-2005-2087 - http://www.kb.cert.org/vuls/id/939605 -CVE-2005-2090 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2005-2096 - http://www.ubuntulinux.org/usn/usn-151-3 -CVE-2005-2098 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9638 -CVE-2005-2099 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9079 -CVE-2005-2102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9283 -CVE-2005-2104 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9411 -CVE-2005-2106 - http://www.drupal.org/security/drupal-sa-2005-002/advisory.txt -CVE-2005-2107 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 -CVE-2005-2108 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 -CVE-2005-2109 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 -CVE-2005-2110 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt -CVE-2005-2110 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 -CVE-2005-2111 - http://marc.info/?l=bugtraq&m=112006558125309&w=2 -CVE-2005-2114 - http://marc.info/?l=bugtraq&m=112008299210033&w=2 -CVE-2005-2114 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9628 -CVE-2005-2117 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 -CVE-2005-2118 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 -CVE-2005-2119 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 -CVE-2005-2120 - http://www.kb.cert.org/vuls/id/214572 -CVE-2005-2120 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047 -CVE-2005-2122 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 -CVE-2005-2123 - http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf -CVE-2005-2123 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 -CVE-2005-2124 - http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf -CVE-2005-2124 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 -CVE-2005-2126 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-044 -CVE-2005-2127 - http://isc.sans.org/diary.php?date=2005-08-18 -CVE-2005-2127 - http://www.kb.cert.org/vuls/id/740372 -CVE-2005-2128 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-050 -CVE-2005-2143 - http://www.freewebs.com/xxosfilexx/HungFPage.html -CVE-2005-2153 - http://seclists.org/lists/bugtraq/2005/Jul/0009.html -CVE-2005-2154 - http://seclists.org/lists/bugtraq/2005/Jul/0009.html -CVE-2005-2159 - http://marc.info/?l=bugtraq&m=112051398718830&w=2 -CVE-2005-2160 - http://marc.info/?l=bugtraq&m=112060187204457&w=2 -CVE-2005-2163 - http://marc.info/?l=bugtraq&m=112059745606348&w=2 -CVE-2005-2177 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2005-2177 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9986 -CVE-2005-2178 - http://marc.info/?l=bugtraq&m=112059815028059&w=2 -CVE-2005-2179 - http://marc.info/?l=bugtraq&m=112067013827970&w=2 -CVE-2005-2180 - http://marc.info/?l=bugtraq&m=112066901231154&w=2 -CVE-2005-2184 - http://marc.info/?l=bugtraq&m=112069267700034&w=2 -CVE-2005-2185 - http://marc.info/?l=bugtraq&m=112069267700034&w=2 -CVE-2005-2186 - http://marc.info/?l=bugtraq&m=112066594312876&w=2 -CVE-2005-2187 - http://marc.info/?l=bugtraq&m=112066594312876&w=2 -CVE-2005-2188 - http://marc.info/?l=bugtraq&m=112066594312876&w=2 -CVE-2005-2190 - http://marc.info/?l=bugtraq&m=112077057001064&w=2 -CVE-2005-2191 - http://marc.info/?l=bugtraq&m=112077057001064&w=2 -CVE-2005-2192 - http://marc.info/?l=bugtraq&m=112075901100640&w=2 -CVE-2005-2193 - http://marc.info/?l=bugtraq&m=112084384928950&w=2 -CVE-2005-2204 - http://marc.info/?l=bugtraq&m=112084050624959&w=2 -CVE-2005-2204 - http://marc.info/?l=bugtraq&m=112110963416714&w=2 -CVE-2005-2220 - http://marc.info/?l=bugtraq&m=112121930328341&w=2 -CVE-2005-2221 - http://marc.info/?l=bugtraq&m=112121930328341&w=2 -CVE-2005-2227 - http://marc.info/?l=bugtraq&m=112120030308592&w=2 -CVE-2005-2229 - http://marc.info/?l=bugtraq&m=112110868021563&w=2 -CVE-2005-2246 - https://www.exploit-db.com/exploits/3596 -CVE-2005-2251 - https://www.exploit-db.com/exploits/2452 -CVE-2005-2260 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html -CVE-2005-2260 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2261 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html -CVE-2005-2261 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-2261 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2262 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html -CVE-2005-2263 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2264 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9887 -CVE-2005-2265 - http://www.mozilla.org/security/announce/mfsa2005-50.html -CVE-2005-2265 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html -CVE-2005-2265 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-2265 - https://bugzilla.mozilla.org/show_bug.cgi?id=295854 -CVE-2005-2265 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2266 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-2266 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2267 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2268 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2269 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html -CVE-2005-2269 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-2269 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2269 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9777 -CVE-2005-2270 - http://www.redhat.com/support/errata/RHSA-2005-601.html -CVE-2005-2270 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -CVE-2005-2270 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550 -CVE-2005-2278 - http://marc.info/?l=bugtraq&m=112127188609993&w=2 -CVE-2005-2287 - http://marc.info/?l=bugtraq&m=112122500308722&w=2 -CVE-2005-2295 - http://aluigi.altervista.org/adv/panzone-adv.txt -CVE-2005-2295 - http://marc.info/?l=bugtraq&m=112129258221823&w=2 -CVE-2005-2307 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-045 -CVE-2005-2327 - https://www.exploit-db.com/exploits/1106 -CVE-2005-2337 - http://securityreason.com/securityalert/59 -CVE-2005-2365 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9118 -CVE-2005-2373 - http://marc.info/?l=bugtraq&m=112196537312610&w=2 -CVE-2005-2387 - http://seclists.org/lists/bugtraq/2005/Jul/0402.html -CVE-2005-2389 - http://www.hat-squad.com/en/000170.html -CVE-2005-2392 - http://lostmon.blogspot.com/2005/07/cmsimple-search-variable-xss.html -CVE-2005-2395 - http://securityreason.com/securityalert/8 -CVE-2005-2403 - http://seclists.org/lists/bugtraq/2005/Jul/0403.html -CVE-2005-2414 - http://marc.info/?l=bugtraq&m=112199282029269&w=2 -CVE-2005-2415 - http://marc.info/?l=bugtraq&m=112206702015439&w=2 -CVE-2005-2416 - http://marc.info/?l=bugtraq&m=112206702015439&w=2 -CVE-2005-2417 - http://marc.info/?l=bugtraq&m=112206702015439&w=2 -CVE-2005-2419 - http://marc.info/?l=bugtraq&m=112230649106740&w=2 -CVE-2005-2428 - https://www.exploit-db.com/exploits/39495/ -CVE-2005-2430 - http://marc.info/?l=bugtraq&m=112259845904350&w=2 -CVE-2005-2431 - http://marc.info/?l=bugtraq&m=112259845904350&w=2 -CVE-2005-2438 - http://marc.info/?l=bugtraq&m=112264706213040&w=2 -CVE-2005-2439 - http://marc.info/?l=bugtraq&m=112264706213040&w=2 -CVE-2005-2442 - http://marc.info/?l=bugtraq&m=112239353829324&w=2 -CVE-2005-2458 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-2467 - http://marc.info/?l=bugtraq&m=112292193807958&w=2 -CVE-2005-2468 - http://marc.info/?l=bugtraq&m=112292193807958&w=2 -CVE-2005-2475 - http://securityreason.com/securityalert/32 -CVE-2005-2475 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9975 -CVE-2005-2490 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-2494 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9388 -CVE-2005-2495 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615 -CVE-2005-2495 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998 -CVE-2005-2496 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9669 -CVE-2005-2498 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569 -CVE-2005-2499 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9538 -CVE-2005-2537 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 -CVE-2005-2538 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 -CVE-2005-2539 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 -CVE-2005-2540 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 -CVE-2005-2549 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553 -CVE-2005-2553 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9647 -CVE-2005-2556 - http://marc.info/?l=bugtraq&m=112786017426276&w=2 -CVE-2005-2557 - http://marc.info/?l=bugtraq&m=112786017426276&w=2 -CVE-2005-2562 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 -CVE-2005-2563 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 -CVE-2005-2564 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 -CVE-2005-2565 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 -CVE-2005-2567 - http://marc.info/?l=bugtraq&m=112352095923614&w=2 -CVE-2005-2568 - http://marc.info/?l=bugtraq&m=112352095923614&w=2 -CVE-2005-2569 - http://marc.info/?l=bugtraq&m=112360702307424&w=2 -CVE-2005-2570 - http://marc.info/?l=bugtraq&m=112360702307424&w=2 -CVE-2005-2571 - http://marc.info/?l=bugtraq&m=112360702307424&w=2 -CVE-2005-2577 - http://marc.info/?l=bugtraq&m=112379283900586&w=2 -CVE-2005-2580 - http://marc.info/?l=bugtraq&m=112387501519835&w=2 -CVE-2005-2588 - http://lostmon.blogspot.com/2005/08/dvbbs-multiple-variable-cross-site.html -CVE-2005-2602 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1682 -CVE-2005-2609 - http://www.packetstormsecurity.org/0508-exploits/vegadns-dyn0.txt -CVE-2005-2610 - http://www.packetstormsecurity.org/0508-exploits/vegadns-dyn0.txt -CVE-2005-2628 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 -CVE-2005-2629 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550 -CVE-2005-2635 - http://www.securityreason.com/adv/phpAdsnew.SR.16.asc -CVE-2005-2639 - http://aluigi.altervista.org/adv/chmpokbof-adv.txt -CVE-2005-2639 - http://marc.info/?l=bugtraq&m=112431235221271&w=2 -CVE-2005-2650 - http://packetstormsecurity.org/0508-advisories/emefaGuest.txt -CVE-2005-2650 - http://www.securityfocus.com/bid/14599 -CVE-2005-2651 - http://marc.info/?l=bugtraq&m=112438781604862&w=2 -CVE-2005-2652 - http://marc.info/?l=bugtraq&m=112438781604862&w=2 -CVE-2005-2660 - http://securityreason.com/securityalert/38 -CVE-2005-2661 - http://securityreason.com/securityalert/547 -CVE-2005-2665 - http://marc.info/?l=bugtraq&m=112472951529964&w=2 -CVE-2005-2672 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9993 -CVE-2005-2678 - http://marc.info/?l=bugtraq&m=112474727903399&w=2 -CVE-2005-2683 - http://marc.info/?l=bugtraq&m=112474427221031&w=2 -CVE-2005-2694 - http://marc.info/?l=bugtraq&m=112447630109392&w=2 -CVE-2005-2699 - http://marc.info/?l=bugtraq&m=112474427221031&w=2 -CVE-2005-2701 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323 -CVE-2005-2704 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9784 -CVE-2005-2708 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-2709 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-2709 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-2710 - http://marc.info/?l=bugtraq&m=112785544325326&w=2 -CVE-2005-2710 - http://marc.info/?l=full-disclosure&m=112775929608219&w=2 -CVE-2005-2710 - http://securityreason.com/securityalert/27 -CVE-2005-2710 - http://securityreason.com/securityalert/41 -CVE-2005-2718 - https://bugs.gentoo.org/show_bug.cgi?id=103555 -CVE-2005-2719 - http://marc.info/?l=bugtraq&m=112483407515020&w=2 -CVE-2005-2726 - http://marc.info/?l=bugtraq&m=112490496918102&w=2 -CVE-2005-2727 - http://marc.info/?l=bugtraq&m=112490496918102&w=2 -CVE-2005-2733 - http://marc.info/?l=bugtraq&m=112511159821143&w=2 -CVE-2005-2753 - http://pb.specialised.info/all/adv/quicktime-mov-io1-adv.txt -CVE-2005-2753 - http://www.securityfocus.com/bid/15306 -CVE-2005-2754 - http://pb.specialised.info/all/adv/quicktime-mov-io2-adv.txt -CVE-2005-2755 - http://pb.specialised.info/all/adv/quicktime-mov-dos-adv.txt -CVE-2005-2755 - http://securityreason.com/securityalert/145 -CVE-2005-2756 - http://pb.specialised.info/all/adv/quicktime-pict-adv.txt -CVE-2005-2756 - http://securityreason.com/securityalert/144 -CVE-2005-2758 - http://securityreason.com/securityalert/48 -CVE-2005-2776 - http://marc.info/?l=bugtraq&m=112516327607001&w=2 -CVE-2005-2777 - http://marc.info/?l=bugtraq&m=112516327607001&w=2 -CVE-2005-2779 - http://marc.info/?l=bugtraq&m=112498693231687&w=2 -CVE-2005-2779 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-014.txt -CVE-2005-2789 - http://aluigi.altervista.org/adv/bfccown-adv.txt -CVE-2005-2789 - http://marc.info/?l=bugtraq&m=112534155318828&w=2 -CVE-2005-2790 - http://aluigi.altervista.org/adv/bfccown-adv.txt -CVE-2005-2790 - http://marc.info/?l=bugtraq&m=112534155318828&w=2 -CVE-2005-2791 - http://aluigi.altervista.org/adv/bfccown-adv.txt -CVE-2005-2791 - http://marc.info/?l=bugtraq&m=112534155318828&w=2 -CVE-2005-2792 - http://marc.info/?l=bugtraq&m=112542447219235&w=2 -CVE-2005-2793 - http://marc.info/?l=bugtraq&m=112542447219235&w=2 -CVE-2005-2798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717 -CVE-2005-2800 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954 -CVE-2005-2813 - http://seclists.org/lists/bugtraq/2005/Aug/0440.html -CVE-2005-2814 - http://seclists.org/lists/bugtraq/2005/Aug/0440.html -CVE-2005-2815 - http://seclists.org/lists/bugtraq/2005/Aug/0440.html -CVE-2005-2827 - http://securityreason.com/securityalert/252 -CVE-2005-2827 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-055 -CVE-2005-2829 - http://securityreason.com/securityalert/254 -CVE-2005-2842 - https://www.exploit-db.com/exploits/42703/ -CVE-2005-2844 - http://marc.info/?l=bugtraq&m=112550635826169&w=2 -CVE-2005-2847 - http://marc.info/?l=bugtraq&m=112560044813390&w=2 -CVE-2005-2848 - http://marc.info/?l=bugtraq&m=112560044813390&w=2 -CVE-2005-2849 - http://marc.info/?l=bugtraq&m=112560044813390&w=2 -CVE-2005-2855 - http://packetstormsecurity.org/0509-exploits/unb153.html -CVE-2005-2856 - http://securityreason.com/securityalert/49 -CVE-2005-2860 - http://marc.info/?l=bugtraq&m=112561344400914&w=2 -CVE-2005-2860 - http://seclists.org/lists/vulnwatch/2005/Jul-Sep/0032.html -CVE-2005-2861 - http://seclists.org/lists/vulnwatch/2005/Jul-Sep/0032.html -CVE-2005-2871 - http://securityreason.com/securityalert/83 -CVE-2005-2871 - https://bugzilla.mozilla.org/show_bug.cgi?id=307259 -CVE-2005-2871 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608 -CVE-2005-2873 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9838 -CVE-2005-2874 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774 -CVE-2005-2880 - http://marc.info/?l=bugtraq&m=112605610624004&w=2 -CVE-2005-2881 - http://marc.info/?l=bugtraq&m=112605610624004&w=2 -CVE-2005-2882 - http://marc.info/?l=bugtraq&m=112605610624004&w=2 -CVE-2005-2890 - http://marc.info/?l=bugtraq&m=112610983428771&w=2 -CVE-2005-2892 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 -CVE-2005-2893 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 -CVE-2005-2894 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 -CVE-2005-2895 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 -CVE-2005-2898 - http://marc.info/?l=bugtraq&m=112577523810442&w=2 -CVE-2005-2898 - http://marc.info/?l=bugtraq&m=112605448327521&w=2 -CVE-2005-2902 - http://marc.info/?l=bugtraq&m=112629627512785&w=2 -CVE-2005-2929 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9712 -CVE-2005-2933 - http://securityreason.com/securityalert/47 -CVE-2005-2933 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858 -CVE-2005-2943 - http://securityreason.com/securityalert/81 -CVE-2005-2947 - http://marc.info/?l=bugtraq&m=112629480300071&w=2 -CVE-2005-2948 - http://marc.info/?l=bugtraq&m=112629480300071&w=2 -CVE-2005-2949 - http://securityreason.com/securityalert/2 -CVE-2005-2950 - http://securityreason.com/securityalert/1 -CVE-2005-2951 - http://marc.info/?l=bugtraq&m=112662698511403&w=2 -CVE-2005-2951 - http://securityreason.com/securityalert/5 -CVE-2005-2952 - http://marc.info/?l=bugtraq&m=112662785418368&w=2 -CVE-2005-2952 - http://securityreason.com/securityalert/4 -CVE-2005-2968 - http://www.ubuntu.com/usn/usn-186-1 -CVE-2005-2973 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-2974 - https://bugzilla.redhat.com/show_bug.cgi?id=494826 -CVE-2005-2975 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697 -CVE-2005-2977 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168181 -CVE-2005-2981 - http://marc.info/?l=bugtraq&m=112680922318639&w=2 -CVE-2005-2982 - http://marc.info/?l=bugtraq&m=112680922318639&w=2 -CVE-2005-2991 - http://securityreason.com/securityalert/12 -CVE-2005-2992 - http://securityreason.com/securityalert/11 -CVE-2005-2993 - http://securityreason.com/securityalert/360 -CVE-2005-3010 - http://securityreason.com/securityalert/14 -CVE-2005-3011 - http://www.vmware.com/support/vi3/doc/esx-2559638-patch.html -CVE-2005-3026 - http://marc.info/?l=bugtraq&m=112714879101323&w=2 -CVE-2005-3026 - http://marc.info/?l=bugtraq&m=112716394925851&w=2 -CVE-2005-3026 - http://securityreason.com/securityalert/13 -CVE-2005-3043 - http://packetstormsecurity.org/0509-exploits/mall23.txt -CVE-2005-3044 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3044 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9561 -CVE-2005-3045 - http://marc.info/?l=bugtraq&m=112741430006983&w=2 -CVE-2005-3046 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 -CVE-2005-3047 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 -CVE-2005-3048 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 -CVE-2005-3049 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 -CVE-2005-3050 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 -CVE-2005-3051 - http://www.vuln.sg/turbosearcher330-en.html -CVE-2005-3052 - http://securityreason.com/securityalert/20 -CVE-2005-3053 - http://www.redhat.com/support/errata/RHSA-2005-808.html -CVE-2005-3055 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472 -CVE-2005-3063 - http://marc.info/?l=bugtraq&m=112758146618234&w=2 -CVE-2005-3063 - http://securityreason.com/securityalert/21 -CVE-2005-3064 - http://aluigi.altervista.org/adv/mtaboom-adv.txt -CVE-2005-3065 - http://securityreason.com/securityalert/26 -CVE-2005-3066 - http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt -CVE-2005-3067 - http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt -CVE-2005-3089 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9280 -CVE-2005-3090 - http://marc.info/?l=bugtraq&m=112786017426276&w=2 -CVE-2005-3092 - http://marc.info/?l=bugtraq&m=112776577002945&w=2 -CVE-2005-3092 - http://securityreason.com/securityalert/25 -CVE-2005-3099 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A943 -CVE-2005-3106 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 -CVE-2005-3108 - http://www.redhat.com/support/errata/RHSA-2005-808.html -CVE-2005-3110 - http://www.redhat.com/support/errata/RHSA-2005-808.html -CVE-2005-3116 - http://seer.support.veritas.com/docs/279553.htm -CVE-2005-3119 - http://www.redhat.com/support/errata/RHSA-2005-808.html -CVE-2005-3120 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257 -CVE-2005-3130 - http://securityreason.com/securityalert/33 -CVE-2005-3134 - http://marc.info/?l=bugtraq&m=112811189420696&w=2 -CVE-2005-3134 - http://securityreason.com/securityalert/39 -CVE-2005-3135 - http://aluigi.altervista.org/adv/virtbugs-adv.txt -CVE-2005-3135 - http://marc.info/?l=bugtraq&m=112811771331997&w=2 -CVE-2005-3136 - http://aluigi.altervista.org/adv/virtbugs-adv.txt -CVE-2005-3136 - http://marc.info/?l=bugtraq&m=112811771331997&w=2 -CVE-2005-3136 - http://securityreason.com/securityalert/40 -CVE-2005-3141 - http://securityreason.com/securityalert/43 -CVE-2005-3142 - http://securityreason.com/securityalert/44 -CVE-2005-3142 - http://www.kaspersky.com/news?id=171512144 -CVE-2005-3152 - http://securityreason.com/securityalert/35 -CVE-2005-3153 - http://marc.info/?l=bugtraq&m=112818273307878&w=2 -CVE-2005-3153 - http://securityreason.com/securityalert/42 -CVE-2005-3154 - http://securityreason.com/securityalert/45 -CVE-2005-3156 - http://marc.info/?l=bugtraq&m=112812059917394&w=2 -CVE-2005-3157 - http://marc.info/?l=bugtraq&m=112793982604963&w=2 -CVE-2005-3158 - http://marc.info/?l=bugtraq&m=112801702000944&w=2 -CVE-2005-3161 - http://securityreason.com/securityalert/54 -CVE-2005-3177 - http://support.microsoft.com/kb/831374 -CVE-2005-3178 - http://marc.info/?l=bugtraq&m=112862493918840&w=2 -CVE-2005-3178 - http://www.redhat.com/support/errata/RHSA-2005-802.html -CVE-2005-3180 - http://www.redhat.com/support/errata/RHSA-2005-808.html -CVE-2005-3180 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-3181 - http://www.redhat.com/support/errata/RHSA-2005-808.html -CVE-2005-3181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467 -CVE-2005-3182 - http://securityreason.com/securityalert/74 -CVE-2005-3183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9653 -CVE-2005-3185 - http://securityreason.com/securityalert/82 -CVE-2005-3185 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810 -CVE-2005-3186 - http://securityreason.com/securityalert/188 -CVE-2005-3186 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503 -CVE-2005-3188 - http://securityreason.com/securityalert/397 -CVE-2005-3191 - http://www.securityfocus.com/archive/1/418883/100/0/threaded -CVE-2005-3191 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760 -CVE-2005-3192 - http://www.securityfocus.com/archive/1/418883/100/0/threaded -CVE-2005-3193 - http://www.securityfocus.com/archive/1/418883/100/0/threaded -CVE-2005-3196 - http://securityreason.com/securityalert/53 -CVE-2005-3198 - http://securityreason.com/securityalert/55 -CVE-2005-3199 - http://securityreason.com/securityalert/52 -CVE-2005-3200 - http://marc.info/?l=bugtraq&m=112872691119874&w=2 -CVE-2005-3201 - http://marc.info/?l=bugtraq&m=112872691119874&w=2 -CVE-2005-3208 - http://marc.info/?l=bugtraq&m=112872593432359&w=2 -CVE-2005-3209 - http://marc.info/?l=bugtraq&m=112872593432359&w=2 -CVE-2005-3210 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3211 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3212 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3213 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3214 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3215 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3216 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3217 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3218 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3219 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3220 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3221 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3222 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3223 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3224 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3225 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3226 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3227 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3228 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3229 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3230 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3231 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3232 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3233 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3234 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3235 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 -CVE-2005-3236 - http://marc.info/?l=bugtraq&m=112879353805769&w=2 -CVE-2005-3236 - http://securityreason.com/securityalert/70 -CVE-2005-3237 - http://marc.info/?l=bugtraq&m=112879353805769&w=2 -CVE-2005-3237 - http://securityreason.com/securityalert/70 -CVE-2005-3243 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9836 -CVE-2005-3244 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9665 -CVE-2005-3249 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9313 -CVE-2005-3257 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 -CVE-2005-3259 - http://marc.info/?l=bugtraq&m=112907535528616&w=2 -CVE-2005-3260 - http://marc.info/?l=bugtraq&m=112907535528616&w=2 -CVE-2005-3261 - http://marc.info/?l=bugtraq&m=112907535528616&w=2 -CVE-2005-3267 - http://marc.info/?l=bugtraq&m=113026202728568&w=2 -CVE-2005-3267 - http://securityreason.com/securityalert/115 -CVE-2005-3269 - http://securityreason.com/securityalert/51 -CVE-2005-3273 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-3273 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9552 -CVE-2005-3274 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3275 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-3276 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-3276 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748 -CVE-2005-3284 - http://securityreason.com/securityalert/80 -CVE-2005-3286 - http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt -CVE-2005-3286 - http://seclists.org/bugtraq/2005/Oct/166 -CVE-2005-3286 - http://securityreason.com/securityalert/78 -CVE-2005-3294 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-016-typsoft-ftpd.txt -CVE-2005-3295 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A992 -CVE-2005-3299 - http://securityreason.com/securityalert/69 -CVE-2005-3300 - http://marc.info/?l=bugtraq&m=113017591414699&w=2 -CVE-2005-3303 - http://securityreason.com/securityalert/146 -CVE-2005-3304 - http://marc.info/?l=bugtraq&m=113017049702436&w=2 -CVE-2005-3310 - http://marc.info/?l=bugtraq&m=113017003617987&w=2 -CVE-2005-3312 - http://marc.info/?l=bugtraq&m=113017003617987&w=2 -CVE-2005-3312 - http://securityreason.com/securityalert/18 -CVE-2005-3312 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1746 -CVE-2005-3314 - http://www.securityfocus.com/bid/15491 -CVE-2005-3319 - http://securityreason.com/securityalert/525 -CVE-2005-3330 - http://marc.info/?l=bugtraq&m=113028858316430&w=2 -CVE-2005-3330 - http://securityreason.com/securityalert/117 -CVE-2005-3350 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9314 -CVE-2005-3352 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2005-3353 - http://securityreason.com/securityalert/525 -CVE-2005-3356 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3358 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3363 - https://www.exploit-db.com/exploits/1530 -CVE-2005-3365 - https://www.exploit-db.com/exploits/4853 -CVE-2005-3383 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 -CVE-2005-3384 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 -CVE-2005-3385 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 -CVE-2005-3386 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 -CVE-2005-3386 - http://securityreason.com/securityalert/120 -CVE-2005-3388 - http://securityreason.com/securityalert/133 -CVE-2005-3389 - http://securityreason.com/securityalert/134 -CVE-2005-3390 - http://securityreason.com/securityalert/132 -CVE-2005-3391 - http://securityreason.com/securityalert/525 -CVE-2005-3392 - http://securityreason.com/securityalert/525 -CVE-2005-3396 - http://securityreason.com/securityalert/261 -CVE-2005-3402 - http://marc.info/?l=bugtraq&m=113028017608146&w=2 -CVE-2005-3412 - http://marc.info/?l=full-disclosure&m=113083841308736&w=2 -CVE-2005-3412 - http://securityreason.com/securityalert/136 -CVE-2005-3415 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 -CVE-2005-3415 - http://securityreason.com/securityalert/130 -CVE-2005-3416 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 -CVE-2005-3416 - http://securityreason.com/securityalert/130 -CVE-2005-3417 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 -CVE-2005-3417 - http://securityreason.com/securityalert/130 -CVE-2005-3418 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 -CVE-2005-3418 - http://securityreason.com/securityalert/130 -CVE-2005-3419 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 -CVE-2005-3419 - http://securityreason.com/securityalert/130 -CVE-2005-3420 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 -CVE-2005-3420 - http://securityreason.com/securityalert/130 -CVE-2005-3427 - http://securityreason.com/securityalert/137 -CVE-2005-3455 - http://www.kb.cert.org/vuls/id/150508 -CVE-2005-3473 - http://securityreason.com/securityalert/138 -CVE-2005-3477 - http://securityreason.com/securityalert/105 -CVE-2005-3482 - http://securityreason.com/securityalert/139 -CVE-2005-3483 - http://aluigi.altervista.org/adv/ggwbof-adv.txt -CVE-2005-3483 - http://marc.info/?l=full-disclosure&m=113095918810489&w=2 -CVE-2005-3485 - http://aluigi.altervista.org/adv/gliderbof-adv.txt -CVE-2005-3485 - http://marc.info/?l=full-disclosure&m=113095975721571&w=2 -CVE-2005-3486 - http://aluigi.altervista.org/adv/scorchbugs-adv.txt -CVE-2005-3486 - http://marc.info/?l=full-disclosure&m=113095941031946&w=2 -CVE-2005-3487 - http://aluigi.altervista.org/adv/scorchbugs-adv.txt -CVE-2005-3487 - http://marc.info/?l=full-disclosure&m=113095941031946&w=2 -CVE-2005-3488 - http://aluigi.altervista.org/adv/scorchbugs-adv.txt -CVE-2005-3488 - http://marc.info/?l=full-disclosure&m=113095941031946&w=2 -CVE-2005-3489 - http://aluigi.altervista.org/adv/asusvsbugs-adv.txt -CVE-2005-3489 - http://marc.info/?l=full-disclosure&m=113096055302614&w=2 -CVE-2005-3490 - http://aluigi.altervista.org/adv/asusvsbugs-adv.txt -CVE-2005-3490 - http://marc.info/?l=full-disclosure&m=113096055302614&w=2 -CVE-2005-3491 - http://aluigi.altervista.org/adv/flatfragz-adv.txt -CVE-2005-3491 - http://marc.info/?l=full-disclosure&m=113096078606274&w=2 -CVE-2005-3492 - http://aluigi.altervista.org/adv/flatfragz-adv.txt -CVE-2005-3492 - http://marc.info/?l=full-disclosure&m=113096078606274&w=2 -CVE-2005-3493 - http://aluigi.altervista.org/adv/bcarrydos-adv.txt -CVE-2005-3493 - http://marc.info/?l=full-disclosure&m=113096122630102&w=2 -CVE-2005-3505 - http://securityreason.com/securityalert/148 -CVE-2005-3510 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2005-3521 - http://marc.info/?l=bugtraq&m=112967223222966&w=2 -CVE-2005-3522 - http://marc.info/?l=bugtraq&m=112967149509401&w=2 -CVE-2005-3525 - http://securityreason.com/securityalert/481 -CVE-2005-3526 - http://securityreason.com/securityalert/577 -CVE-2005-3527 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3555 - http://www.trapkit.de/advisories/TKADV2005-11-001.txt -CVE-2005-3556 - http://www.trapkit.de/advisories/TKADV2005-11-001.txt -CVE-2005-3557 - http://www.trapkit.de/advisories/TKADV2005-11-001.txt -CVE-2005-3560 - http://securityreason.com/securityalert/155 -CVE-2005-3569 - http://www.osvdb.org/20708 -CVE-2005-3571 - http://marc.info/?l=bugtraq&m=113199214723444&w=2 -CVE-2005-3571 - http://securityreason.com/securityalert/176 -CVE-2005-3575 - http://securityreason.com/securityalert/180 -CVE-2005-3579 - http://securityreason.com/securityalert/179 -CVE-2005-3583 - http://securityreason.com/securityalert/143 -CVE-2005-3589 - http://ingehenriksen.blogspot.com/2005/11/filezilla-server-terminal-094d-dos-poc_21.html -CVE-2005-3589 - http://marc.info/?l=bugtraq&m=113140190521377&w=2 -CVE-2005-3591 - http://marc.info/?l=bugtraq&m=113140426614670&w=2 -CVE-2005-3591 - http://securityreason.com/securityalert/149 -CVE-2005-3596 - http://marc.info/?l=bugtraq&m=113156859811594&w=2 -CVE-2005-3622 - http://securityreason.com/securityalert/185 -CVE-2005-3624 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437 -CVE-2005-3625 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575 -CVE-2005-3626 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992 -CVE-2005-3633 - http://marc.info/?l=bugtraq&m=113156438708932&w=2 -CVE-2005-3633 - http://securityreason.com/securityalert/164 -CVE-2005-3634 - http://marc.info/?l=bugtraq&m=113156525006667&w=2 -CVE-2005-3634 - http://securityreason.com/securityalert/163 -CVE-2005-3635 - http://marc.info/?l=bugtraq&m=113156601505542&w=2 -CVE-2005-3635 - http://securityreason.com/securityalert/162 -CVE-2005-3636 - http://marc.info/?l=bugtraq&m=113156601505542&w=2 -CVE-2005-3636 - http://securityreason.com/securityalert/162 -CVE-2005-3644 - https://www.exploit-db.com/exploits/1328 -CVE-2005-3646 - http://securityreason.com/securityalert/172 -CVE-2005-3648 - http://marc.info/?l=bugtraq&m=113165668814241&w=2 -CVE-2005-3649 - http://marc.info/?l=bugtraq&m=113165668814241&w=2 -CVE-2005-3649 - http://securityreason.com/securityalert/168 -CVE-2005-3652 - http://securityreason.com/securityalert/266 -CVE-2005-3654 - http://securityreason.com/securityalert/322 -CVE-2005-3657 - http://securityreason.com/securityalert/279 -CVE-2005-3662 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583 -CVE-2005-3663 - http://securityreason.com/securityalert/187 -CVE-2005-3671 - http://www.securityfocus.com/bid/15416 -CVE-2005-3672 - http://www.stonesoft.com/support/Security_Advisories/7244.html -CVE-2005-3679 - http://marc.info/?l=bugtraq&m=113201260613863&w=2 -CVE-2005-3680 - http://marc.info/?l=bugtraq&m=113199244824660&w=2 -CVE-2005-3681 - http://marc.info/?l=bugtraq&m=113199244824660&w=2 -CVE-2005-3682 - http://securityreason.com/securityalert/181 -CVE-2005-3684 - http://marc.info/?l=full-disclosure&m=113222358007499&w=2 -CVE-2005-3686 - http://packetstormsecurity.org/0511-exploits/unb153pl3_xpl.html -CVE-2005-3694 - https://bugs.gentoo.org/show_bug.cgi?id=100519 -CVE-2005-3732 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9857 -CVE-2005-3734 - http://www.trapkit.de/advisories/TKADV2005-11-004.txt -CVE-2005-3737 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330894 -CVE-2005-3737 - http://securityreason.com/securityalert/58 -CVE-2005-3784 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3784 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174078 -CVE-2005-3784 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9080 -CVE-2005-3790 - http://securityreason.com/securityalert/182 -CVE-2005-3792 - http://securityreason.com/achievement_exploitalert/5 -CVE-2005-3792 - http://www.waraxe.us/advisory-46.html -CVE-2005-3796 - http://securityreason.com/securityalert/184 -CVE-2005-3797 - http://securityreason.com/securityalert/189 -CVE-2005-3798 - http://securityreason.com/securityalert/189 -CVE-2005-3799 - http://securityreason.com/achievement_exploitalert/4 -CVE-2005-3802 - http://securityreason.com/securityalert/186 -CVE-2005-3805 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3806 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3806 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-3806 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9903 -CVE-2005-3807 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3808 - http://seclists.org/lists/linux-kernel/2005/Nov/7839.html -CVE-2005-3813 - http://marc.info/?l=full-disclosure&m=113285451031500&w=2 -CVE-2005-3813 - http://securityreason.com/securityalert/205 -CVE-2005-3822 - http://securityreason.com/securityalert/203 -CVE-2005-3857 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-3857 - http://www.securityfocus.com/archive/1/428028/100/0/threaded -CVE-2005-3857 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9727 -CVE-2005-3858 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9396 -CVE-2005-3859 - http://securityreason.com/securityalert/209 -CVE-2005-3861 - http://securityreason.com/securityalert/210 -CVE-2005-3867 - http://pridels0.blogspot.com/2005/11/revenuepilot-search-engine-xss-vuln.html -CVE-2005-3887 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 -CVE-2005-3888 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 -CVE-2005-3889 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 -CVE-2005-3890 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 -CVE-2005-3891 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 -CVE-2005-3892 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 -CVE-2005-3903 - http://securityreason.com/securityalert/251 -CVE-2005-3915 - http://www.clavister.com/support/support_update_ISAKMP.html -CVE-2005-3919 - http://securityreason.com/securityalert/211 -CVE-2005-3921 - http://securityreason.com/securityalert/227 -CVE-2005-3922 - http://securityreason.com/securityalert/216 -CVE-2005-3924 - http://securityreason.com/securityalert/213 -CVE-2005-3927 - http://securityreason.com/securityalert/212 -CVE-2005-3929 - http://securityreason.com/securityalert/217 -CVE-2005-3931 - http://securityreason.com/securityalert/218 -CVE-2005-3949 - http://securityreason.com/securityalert/215 -CVE-2005-3952 - https://www.exploit-db.com/exploits/3456 -CVE-2005-3961 - http://securityreason.com/securityalert/215 -CVE-2005-3964 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9393 -CVE-2005-3967 - http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html -CVE-2005-3983 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1582 -CVE-2005-3991 - http://securityreason.com/securityalert/221 -CVE-2005-3992 - http://securityreason.com/securityalert/226 -CVE-2005-4005 - http://securityreason.com/securityalert/31 -CVE-2005-4015 - http://securityreason.com/securityalert/214 -CVE-2005-4058 - http://evuln.com/vulns/40/summary.html -CVE-2005-4065 - http://securityreason.com/securityalert/222 -CVE-2005-4066 - http://www.networksecurity.fi/advisories/total-commander.html -CVE-2005-4079 - http://securityreason.com/securityalert/237 -CVE-2005-4080 - http://securityreason.com/securityalert/232 -CVE-2005-4087 - http://securityreason.com/securityalert/239 -CVE-2005-4089 - http://www.hacker.co.il/security/ie/css_import.html -CVE-2005-4089 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2005-4131 - http://securityreason.com/securityalert/584 -CVE-2005-4131 - http://securityreason.com/securityalert/591 -CVE-2005-4131 - http://www.theregister.co.uk/2005/12/10/ebay_pulls_excel_vulnerability_auction/ -CVE-2005-4131 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -CVE-2005-4134 - http://marc.info/?l=full-disclosure&m=113404911919629&w=2 -CVE-2005-4134 - http://marc.info/?l=full-disclosure&m=113405896025702&w=2 -CVE-2005-4134 - http://www.networksecurity.fi/advisories/netscape-history.html -CVE-2005-4134 - http://www.redhat.com/support/errata/RHSA-2006-0199.html -CVE-2005-4140 - http://securityreason.com/securityalert/244 -CVE-2005-4152 - http://securityreason.com/securityalert/243 -CVE-2005-4154 - http://pear.php.net/advisory-20051104.txt -CVE-2005-4164 - http://www.osvdb.org/21456 -CVE-2005-4195 - https://www.exploit-db.com/exploits/5540 -CVE-2005-4199 - http://securityreason.com/securityalert/294 -CVE-2005-4199 - http://www.trapkit.de/advisories/TKADV2005-12-001.txt -CVE-2005-4218 - https://www.exploit-db.com/exploits/1324 -CVE-2005-4219 - http://securityreason.com/securityalert/250 -CVE-2005-4249 - http://securityreason.com/securityalert/253 -CVE-2005-4267 - http://securityreason.com/securityalert/277 -CVE-2005-4268 - http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237 -CVE-2005-4270 - http://securityreason.com/securityalert/260 -CVE-2005-4287 - http://securityreason.com/securityalert/263 -CVE-2005-4288 - http://securityreason.com/securityalert/264 -CVE-2005-4294 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1910 -CVE-2005-4317 - http://securityreason.com/securityalert/255 -CVE-2005-4318 - http://securityreason.com/securityalert/255 -CVE-2005-4319 - http://securityreason.com/securityalert/255 -CVE-2005-4327 - http://securityreason.com/securityalert/267 -CVE-2005-4329 - http://securityreason.com/securityalert/268 -CVE-2005-4332 - http://securityreason.com/securityalert/265 -CVE-2005-4348 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659 -CVE-2005-4349 - http://marc.info/?l=bugtraq&m=113486637512821&w=2 -CVE-2005-4349 - http://securityreason.com/securityalert/270 -CVE-2005-4351 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt -CVE-2005-4351 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-15.txt -CVE-2005-4352 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-16.txt -CVE-2005-4357 - http://securityreason.com/securityalert/269 -CVE-2005-4358 - http://securityreason.com/securityalert/269 -CVE-2005-4360 - http://securityreason.com/securityalert/271 -CVE-2005-4360 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-041 -CVE-2005-4398 - http://pridels0.blogspot.com/2005/12/lemoon-xss-vuln.html -CVE-2005-4402 - http://marc.info/?l=full-disclosure&m=113502692010867&w=2 -CVE-2005-4411 - https://www.exploit-db.com/exploits/1375 -CVE-2005-4415 - http://packetstormsecurity.org/0512-exploits/ztml.txt -CVE-2005-4416 - http://packetstormsecurity.org/0512-exploits/ztml.txt -CVE-2005-4424 - http://securityreason.com/securityalert/157 -CVE-2005-4432 - http://marc.info/?l=full-disclosure&m=113478814326427&w=2 -CVE-2005-4432 - http://marc.info/?l=full-disclosure&m=113970096305873&w=2 -CVE-2005-4437 - http://securityreason.com/securityalert/274 -CVE-2005-4438 - http://securityreason.com/securityalert/276 -CVE-2005-4449 - http://securityreason.com/securityalert/248 -CVE-2005-4459 - http://securityreason.com/securityalert/282 -CVE-2005-4461 - http://securityreason.com/securityalert/284 -CVE-2005-4462 - http://securityreason.com/securityalert/288 -CVE-2005-4463 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt -CVE-2005-4463 - http://echo.or.id/adv/adv24-theday-2005.txt -CVE-2005-4463 - http://securityreason.com/securityalert/286 -CVE-2005-4466 - http://securityreason.com/securityalert/281 -CVE-2005-4466 - http://www.hat-squad.com/en/000171.html -CVE-2005-4494 - http://pridels0.blogspot.com/2005/12/spip-xss-vuln.html -CVE-2005-4496 - http://pridels0.blogspot.com/2005/12/syntaxcms-xss-vuln.html -CVE-2005-4506 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt -CVE-2005-4507 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt -CVE-2005-4508 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt -CVE-2005-4514 - http://securityreason.com/securityalert/293 -CVE-2005-4516 - http://securityreason.com/securityalert/272 -CVE-2005-4517 - http://securityreason.com/securityalert/272 -CVE-2005-4518 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 -CVE-2005-4518 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4519 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 -CVE-2005-4519 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 -CVE-2005-4519 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4520 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 -CVE-2005-4520 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 -CVE-2005-4520 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4521 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 -CVE-2005-4521 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 -CVE-2005-4521 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4522 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 -CVE-2005-4522 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 -CVE-2005-4522 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4523 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 -CVE-2005-4523 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4524 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 -CVE-2005-4524 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt -CVE-2005-4549 - http://marc.info/?l=full-disclosure&m=113532626203708&w=2 -CVE-2005-4549 - http://securityreason.com/securityalert/298 -CVE-2005-4550 - http://marc.info/?l=full-disclosure&m=113532633229270&w=2 -CVE-2005-4550 - http://securityreason.com/securityalert/297 -CVE-2005-4563 - http://securityreason.com/securityalert/278 -CVE-2005-4573 - http://securityreason.com/securityalert/273 -CVE-2005-4574 - http://pridels0.blogspot.com/2005/12/commonspot-content-server-vuln.html -CVE-2005-4575 - http://pridels0.blogspot.com/2005/12/commonspot-content-server-vuln.html -CVE-2005-4576 - http://pridels0.blogspot.com/2005/12/fatwire-updateengine-62-multiple-xss.html -CVE-2005-4584 - http://aluigi.altervista.org/adv/bzflagboom-adv.txt -CVE-2005-4585 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9678 -CVE-2005-4593 - http://securityreason.com/securityalert/303 -CVE-2005-4596 - http://pridels0.blogspot.com/2005/12/adesguestbook-xss-vuln.html -CVE-2005-4598 - http://pridels0.blogspot.com/2005/12/ooapp-guestbook-xss-vuln.html -CVE-2005-4600 - http://securityreason.com/securityalert/306 -CVE-2005-4600 - https://www.exploit-db.com/exploits/4441 -CVE-2005-4601 - http://www.ubuntu.com/usn/usn-246-1 -CVE-2005-4602 - http://securityreason.com/securityalert/311 -CVE-2005-4603 - http://securityreason.com/securityalert/310 -CVE-2005-4605 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2005-4606 - http://securityreason.com/securityalert/305 -CVE-2005-4607 - http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html -CVE-2005-4608 - http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html -CVE-2005-4609 - http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html -CVE-2005-4637 - http://pridels0.blogspot.com/2005/12/kayako-supportsuite-multiple-vuln.html -CVE-2005-4638 - http://pridels0.blogspot.com/2005/12/kayako-supportsuite-multiple-vuln.html -CVE-2005-4659 - http://sourceforge.net/tracker/index.php?func=detail&aid=1344032&group_id=40604&atid=428516 -CVE-2005-4668 - http://securityreason.com/securityalert/147 -CVE-2005-4681 - http://seclists.org/lists/bugtraq/2005/Dec/0263.html -CVE-2005-4681 - http://securityreason.com/securityalert/285 -CVE-2005-4681 - http://www.packetstormsecurity.org/0512-exploits/mIRCexploitXPSP2eng.c -CVE-2005-4696 - http://securityreason.com/securityalert/46 -CVE-2005-4696 - https://www.exploit-db.com/exploits/26323/ -CVE-2005-4697 - http://securityreason.com/securityalert/46 -CVE-2005-4698 - http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt -CVE-2005-4699 - http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt -CVE-2005-4700 - http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt -CVE-2005-4715 - http://securityreason.com/securityalert/3 -CVE-2005-4749 - http://www.securityfocus.com/bid/15052 -CVE-2005-4750 - http://www.securityfocus.com/bid/15052 -CVE-2005-4751 - http://www.securityfocus.com/bid/15052 -CVE-2005-4752 - http://www.securityfocus.com/bid/15052 -CVE-2005-4753 - http://www.securityfocus.com/bid/15052 -CVE-2005-4754 - http://www.securityfocus.com/bid/15052 -CVE-2005-4755 - http://www.securityfocus.com/bid/15052 -CVE-2005-4756 - http://www.securityfocus.com/bid/15052 -CVE-2005-4757 - http://www.securityfocus.com/bid/15052 -CVE-2005-4758 - http://www.securityfocus.com/bid/15052 -CVE-2005-4759 - http://www.securityfocus.com/bid/15052 -CVE-2005-4760 - http://www.securityfocus.com/bid/15052 -CVE-2005-4761 - http://dev2dev.bea.com/pub/advisory/152 -CVE-2005-4761 - http://www.securityfocus.com/bid/15052 -CVE-2005-4762 - http://www.securityfocus.com/bid/15052 -CVE-2005-4763 - http://www.securityfocus.com/bid/15052 -CVE-2005-4764 - http://www.securityfocus.com/bid/15052 -CVE-2005-4765 - http://www.securityfocus.com/bid/15052 -CVE-2005-4766 - http://www.securityfocus.com/bid/15052 -CVE-2005-4767 - http://www.securityfocus.com/bid/15052 -CVE-2005-4777 - http://securityreason.com/securityalert/37 -CVE-2005-4783 - http://www.packetstormsecurity.org/0601-advisories/NetBSD-SA2006-001.txt -CVE-2005-4785 - http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt -CVE-2005-4807 - http://bugs.gentoo.org/show_bug.cgi?id=99464 -CVE-2005-4807 - http://www.ubuntu.com/usn/usn-336-1 -CVE-2005-4826 - http://www.blackhat.com/html/bh-europe-05/bh-eu-05-speakers.html#Berrueta -CVE-2005-4837 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9442 -CVE-2005-4848 - http://blog2.lemondeinformatique.fr/management_du_si/2006/05/notre_ami_imad_.html -CVE-2005-4858 - http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt -CVE-2005-4859 - http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt -CVE-2005-4874 - https://bugzilla.mozilla.org/show_bug.cgi?id=297078 -CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/20/9 -CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/21/1 -CVE-2005-4900 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340 -CVE-2006-0001 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054 -CVE-2006-0002 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003 -CVE-2006-0003 - https://www.exploit-db.com/exploits/2052 -CVE-2006-0003 - https://www.exploit-db.com/exploits/2164 -CVE-2006-0004 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-010 -CVE-2006-0006 - http://securityreason.com/securityalert/423 -CVE-2006-0006 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-005 -CVE-2006-0007 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-039 -CVE-2006-0009 - http://isc.sans.org/diary.php?storyid=1618 -CVE-2006-0009 - http://www.darkreading.com/document.asp?doc_id=101970 -CVE-2006-0009 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -CVE-2006-0012 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015 -CVE-2006-0013 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-008 -CVE-2006-0014 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-016 -CVE-2006-0015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-017 -CVE-2006-0020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004 -CVE-2006-0021 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007 -CVE-2006-0021 - https://www.exploit-db.com/exploits/1599 -CVE-2006-0022 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-028 -CVE-2006-0023 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-011 -CVE-2006-0024 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 -CVE-2006-0025 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-024 -CVE-2006-0026 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-034 -CVE-2006-0027 - http://www.kb.cert.org/vuls/id/303452 -CVE-2006-0027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-019 -CVE-2006-0028 - http://securityreason.com/securityalert/583 -CVE-2006-0028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -CVE-2006-0029 - http://securityreason.com/securityalert/585 -CVE-2006-0029 - http://securityreason.com/securityalert/586 -CVE-2006-0029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -CVE-2006-0030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -CVE-2006-0031 - http://securityreason.com/securityalert/589 -CVE-2006-0031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -CVE-2006-0032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-053 -CVE-2006-0033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-039 -CVE-2006-0034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 -CVE-2006-0049 - http://securityreason.com/securityalert/450 -CVE-2006-0049 - http://securityreason.com/securityalert/568 -CVE-2006-0052 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9475 -CVE-2006-0059 - http://www.digitalbond.com/SCADA_Blog/2006/05/us-cert-livedata-iccp-vulnerability.html -CVE-2006-0063 - http://securityreason.com/securityalert/313 -CVE-2006-0064 - https://www.exploit-db.com/exploits/1398 -CVE-2006-0065 - http://evuln.com/vulns/1/summary.html -CVE-2006-0065 - http://securityreason.com/securityalert/315 -CVE-2006-0066 - http://evuln.com/vulns/9/summary.html -CVE-2006-0067 - http://evuln.com/vulns/2/summary.html -CVE-2006-0068 - http://pridels0.blogspot.com/2006/01/primo-cart-sql-inj.html -CVE-2006-0069 - http://evuln.com/vulns/4/summary.html -CVE-2006-0074 - http://evuln.com/vulns/5/summary.html -CVE-2006-0074 - https://www.exploit-db.com/exploits/8706 -CVE-2006-0075 - http://evuln.com/vulns/6/summary.html -CVE-2006-0076 - http://evuln.com/vulns/3/summary.html -CVE-2006-0078 - http://evuln.com/vulns/10/summary.html -CVE-2006-0078 - http://securityreason.com/securityalert/316 -CVE-2006-0079 - http://evuln.com/vulns/11/summary.html -CVE-2006-0079 - http://securityreason.com/securityalert/318 -CVE-2006-0082 - http://securityreason.com/securityalert/500 -CVE-2006-0082 - http://www.ubuntu.com/usn/usn-246-1 -CVE-2006-0084 - http://evuln.com/vulns/13/summary.html -CVE-2006-0087 - http://securityreason.com/securityalert/314 -CVE-2006-0087 - http://www.evuln.com/vulns/12/summary.html -CVE-2006-0088 - http://evuln.com/vulns/8/summary.html -CVE-2006-0095 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2006-0099 - https://www.exploit-db.com/exploits/1401 -CVE-2006-0100 - http://securityreason.com/securityalert/317 -CVE-2006-0102 - http://evuln.com/vulns/14/summary.html -CVE-2006-0102 - http://securityreason.com/securityalert/320 -CVE-2006-0103 - http://evuln.com/vulns/14/summary.html -CVE-2006-0103 - http://securityreason.com/securityalert/320 -CVE-2006-0104 - http://evuln.com/vulns/14/exploit.html -CVE-2006-0104 - http://evuln.com/vulns/14/summary.html -CVE-2006-0104 - http://securityreason.com/securityalert/320 -CVE-2006-0110 - http://evuln.com/vulns/16/summary.html -CVE-2006-0123 - http://evuln.com/vulns/15/summary.html -CVE-2006-0124 - http://evuln.com/vulns/15/summary.html -CVE-2006-0131 - http://echo.or.id/adv/adv26-K-159-2006.txt -CVE-2006-0134 - http://evuln.com/vulns/17/exploit.html -CVE-2006-0134 - http://evuln.com/vulns/17/summary.html -CVE-2006-0135 - http://evuln.com/vulns/17/exploit.html -CVE-2006-0135 - http://evuln.com/vulns/17/summary.html -CVE-2006-0136 - http://evuln.com/vulns/7/exploit.html -CVE-2006-0136 - http://evuln.com/vulns/7/summary.html -CVE-2006-0137 - http://evuln.com/vulns/7/exploit.html -CVE-2006-0137 - http://evuln.com/vulns/7/summary.html -CVE-2006-0140 - http://evuln.com/vulns/19/summary.html -CVE-2006-0143 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html -CVE-2006-0145 - http://securityreason.com/securityalert/405 -CVE-2006-0147 - https://www.exploit-db.com/exploits/1663 -CVE-2006-0153 - http://evuln.com/vulns/18/summary.html -CVE-2006-0154 - http://evuln.com/vulns/18/summary.html -CVE-2006-0155 - http://evuln.com/vulns/18/summary.html -CVE-2006-0156 - http://securityreason.com/securityalert/325 -CVE-2006-0160 - http://evuln.com/vulns/21/summary.html -CVE-2006-0160 - http://securityreason.com/securityalert/326 -CVE-2006-0167 - http://evuln.com/vulns/22/summary.html -CVE-2006-0167 - http://www.securityfocus.com/archive/1/421863/100/0/threaded -CVE-2006-0168 - http://evuln.com/vulns/22/summary.html -CVE-2006-0168 - http://www.securityfocus.com/archive/1/421863/100/0/threaded -CVE-2006-0169 - http://evuln.com/vulns/23/summary.html -CVE-2006-0179 - https://www.exploit-db.com/exploits/1411 -CVE-2006-0180 - http://evuln.com/vulns/24/summary.html -CVE-2006-0182 - http://evuln.com/vulns/25/summary.html -CVE-2006-0183 - http://evuln.com/vulns/25/summary.html -CVE-2006-0184 - http://www.exploitlabs.com/files/advisories/EXPL-A-2006-001-asptopsites.txt -CVE-2006-0192 - http://securityreason.com/securityalert/414 -CVE-2006-0195 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9548 -CVE-2006-0199 - http://www.nukedx.com/?viewdoc=7 -CVE-2006-0200 - http://securityreason.com/securityalert/337 -CVE-2006-0204 - http://evuln.com/vulns/28/summary.html -CVE-2006-0205 - http://evuln.com/vulns/27/summary.html -CVE-2006-0205 - http://evuln.com/vulns/28/summary.html -CVE-2006-0206 - http://evuln.com/vulns/29/exploit.html -CVE-2006-0206 - http://evuln.com/vulns/29/summary.html -CVE-2006-0209 - http://evuln.com/vulns/26/summary.html -CVE-2006-0214 - http://securityreason.com/securityalert/351 -CVE-2006-0225 - http://securityreason.com/securityalert/462 -CVE-2006-0225 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962 -CVE-2006-0226 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson -CVE-2006-0233 - http://evuln.com/vulns/36/summary.html -CVE-2006-0234 - http://evuln.com/vulns/35/summary.html -CVE-2006-0236 - https://bugzilla.mozilla.org/show_bug.cgi?id=300246 -CVE-2006-0242 - http://securityreason.com/securityalert/355 -CVE-2006-0244 - http://securityreason.com/securityalert/353 -CVE-2006-0244 - http://www.arrelnet.com/advisories/adv20060116.html -CVE-2006-0249 - http://evuln.com/vulns/33/summary.html -CVE-2006-0252 - http://evuln.com/vulns/30/summary.html -CVE-2006-0292 - http://www.redhat.com/support/errata/RHSA-2006-0199.html -CVE-2006-0292 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-0296 - http://www.redhat.com/support/errata/RHSA-2006-0199.html -CVE-2006-0296 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-0300 - http://securityreason.com/securityalert/480 -CVE-2006-0300 - http://securityreason.com/securityalert/543 -CVE-2006-0300 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295 -CVE-2006-0301 - http://securityreason.com/securityalert/470 -CVE-2006-0304 - http://aluigi.altervista.org/adv/dualsbof-adv.txt -CVE-2006-0308 - https://www.exploit-db.com/exploits/3524 -CVE-2006-0310 - http://evuln.com/vulns/37/summary.html -CVE-2006-0311 - http://evuln.com/vulns/37/summary.html -CVE-2006-0312 - http://evuln.com/vulns/37/summary.html -CVE-2006-0318 - http://evuln.com/vulns/34/summary -CVE-2006-0320 - http://evuln.com/vulns/31/summary -CVE-2006-0323 - http://securityreason.com/securityalert/690 -CVE-2006-0324 - http://evuln.com/vulns/41/summary.html -CVE-2006-0324 - http://securityreason.com/securityalert/356 -CVE-2006-0328 - http://securityreason.com/securityalert/362 -CVE-2006-0339 - http://securityreason.com/securityalert/357 -CVE-2006-0340 - http://securityreason.com/securityalert/358 -CVE-2006-0341 - http://marc.info/?l=full-disclosure&m=113777628702043&w=2 -CVE-2006-0342 - http://marc.info/?l=full-disclosure&m=113777628702043&w=2 -CVE-2006-0345 - http://evuln.com/vulns/40/summary.html -CVE-2006-0346 - http://evuln.com/vulns/40/summary.html -CVE-2006-0349 - http://evuln.com/vulns/39/summary.html -CVE-2006-0350 - http://evuln.com/vulns/39/summary.html -CVE-2006-0352 - http://evuln.com/vulns/38/summary/bt/ -CVE-2006-0359 - http://securityreason.com/securityalert/354 -CVE-2006-0360 - http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041437.html -CVE-2006-0361 - http://evuln.com/vulns/32/exploit -CVE-2006-0361 - http://evuln.com/vulns/32/summary/ -CVE-2006-0362 - http://isc.sans.org/diary.php?storyid=1042 -CVE-2006-0370 - http://evuln.com/vulns/42/summary.html -CVE-2006-0371 - http://evuln.com/vulns/42/summary.html -CVE-2006-0376 - http://www.theta44.org/karma/ -CVE-2006-0403 - http://evuln.com/vulns/43/summary.html -CVE-2006-0403 - http://securityreason.com/securityalert/370 -CVE-2006-0404 - http://evuln.com/vulns/44/summary.html -CVE-2006-0409 - http://evuln.com/vulns/45/summary.html -CVE-2006-0417 - http://evuln.com/vulns/47/summary.html -CVE-2006-0433 - http://securityreason.com/securityalert/399 -CVE-2006-0435 - http://securityreason.com/securityalert/402 -CVE-2006-0435 - http://securityreason.com/securityalert/403 -CVE-2006-0437 - http://securityreason.com/securityalert/406 -CVE-2006-0438 - http://securityreason.com/securityalert/406 -CVE-2006-0439 - http://evuln.com/vulns/46/summary.html -CVE-2006-0440 - http://evuln.com/vulns/46/summary.html -CVE-2006-0441 - https://www.exploit-db.com/exploits/40675/ -CVE-2006-0443 - http://evuln.com/vulns/49/summary.html -CVE-2006-0450 - http://securityreason.com/securityalert/368 -CVE-2006-0454 - http://www.securityfocus.com/archive/1/427981/100/0/threaded -CVE-2006-0456 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9909 -CVE-2006-0457 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9566 -CVE-2006-0459 - http://securityreason.com/securityalert/570 -CVE-2006-0461 - http://evuln.com/vulns/48/summary.html -CVE-2006-0461 - http://securityreason.com/securityalert/372 -CVE-2006-0462 - http://evuln.com/vulns/50/summary.html -CVE-2006-0468 - http://www.stalker.com/CommuniGatePro/History.html -CVE-2006-0471 - http://evuln.com/vulns/51/ -CVE-2006-0471 - http://evuln.com/vulns/51/summary.html -CVE-2006-0472 - http://evuln.com/vulns/51/ -CVE-2006-0472 - http://evuln.com/vulns/51/summary.html -CVE-2006-0473 - http://evuln.com/vulns/51/ -CVE-2006-0473 - http://evuln.com/vulns/51/summary.html -CVE-2006-0476 - http://securityreason.com/securityalert/398 -CVE-2006-0476 - http://www.heise.de/newsticker/meldung/68981 -CVE-2006-0476 - https://www.exploit-db.com/exploits/3422 -CVE-2006-0489 - http://securityreason.com/securityalert/383 -CVE-2006-0491 - http://securityreason.com/securityalert/396 -CVE-2006-0491 - http://www.evuln.com/vulns/53/summary.html -CVE-2006-0492 - http://securityreason.com/securityalert/394 -CVE-2006-0492 - http://www.evuln.com/vulns/52/summary.html -CVE-2006-0502 - http://securityreason.com/securityalert/390 -CVE-2006-0509 - http://securityreason.com/securityalert/391 -CVE-2006-0513 - http://securityreason.com/securityalert/412 -CVE-2006-0517 - http://securityreason.com/securityalert/395 -CVE-2006-0521 - http://securityreason.com/securityalert/393 -CVE-2006-0527 - http://securityreason.com/securityalert/438 -CVE-2006-0530 - http://securityreason.com/securityalert/404 -CVE-2006-0532 - http://securityreason.com/securityalert/400 -CVE-2006-0533 - http://marc.info/?l=full-disclosure&m=113894933522271&w=2 -CVE-2006-0534 - http://securityreason.com/securityalert/401 -CVE-2006-0537 - http://securityreason.com/securityalert/408 -CVE-2006-0537 - https://www.exploit-db.com/exploits/1466 -CVE-2006-0538 - http://securityreason.com/securityalert/407 -CVE-2006-0540 - http://www.evuln.com/vulns/54/summary.html -CVE-2006-0541 - http://www.evuln.com/vulns/54/summary.html -CVE-2006-0542 - http://www.evuln.com/vulns/56/summary.html -CVE-2006-0555 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9932 -CVE-2006-0557 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9674 -CVE-2006-0563 - http://securityreason.com/securityalert/415 -CVE-2006-0565 - http://securityreason.com/securityalert/410 -CVE-2006-0565 - http://securityreason.com/securityalert/556 -CVE-2006-0566 - http://securityreason.com/securityalert/416 -CVE-2006-0566 - http://www.stalker.com/CommuniGatePro/History.html -CVE-2006-0568 - http://securityreason.com/securityalert/411 -CVE-2006-0570 - http://evuln.com/vulns/61/summary.html -CVE-2006-0570 - http://securityreason.com/securityalert/427 -CVE-2006-0571 - http://evuln.com/vulns/61/summary.html -CVE-2006-0571 - http://securityreason.com/securityalert/427 -CVE-2006-0572 - http://evuln.com/vulns/61/summary.html -CVE-2006-0572 - http://securityreason.com/securityalert/427 -CVE-2006-0573 - http://marc.info/?l=bugtraq&m=113898556313924&w=2 -CVE-2006-0575 - http://marc.info/?l=full-disclosure&m=113890734603201&w=2 -CVE-2006-0588 - http://securityreason.com/securityalert/413 -CVE-2006-0589 - http://securityreason.com/securityalert/413 -CVE-2006-0590 - http://securityreason.com/securityalert/413 -CVE-2006-0602 - http://evuln.com/vulns/58/summary.html -CVE-2006-0603 - http://evuln.com/vulns/58/summary.html -CVE-2006-0604 - http://evuln.com/vulns/58/description.html -CVE-2006-0605 - http://evuln.com/vulns/55/summary.html -CVE-2006-0606 - http://evuln.com/vulns/55/summary.html -CVE-2006-0607 - http://www.evuln.com/vulns/60/summary.html -CVE-2006-0608 - http://www.evuln.com/vulns/60/summary.html -CVE-2006-0609 - http://www.evuln.com/vulns/60/summary.html -CVE-2006-0610 - http://www.evuln.com/vulns/62/summary.html -CVE-2006-0624 - http://securityreason.com/securityalert/418 -CVE-2006-0627 - http://www.evuln.com/vulns/64/summary.html -CVE-2006-0628 - http://securityreason.com/securityalert/409 -CVE-2006-0628 - http://www.evuln.com/vulns/57/summary.html -CVE-2006-0636 - http://securityreason.com/securityalert/419 -CVE-2006-0642 - http://www.packetstormsecurity.org/0602-advisories/Bypass.pdf -CVE-2006-0642 - http://www.packetstormsecurity.org/filedesc/Bypass.pdf.html -CVE-2006-0643 - http://securityreason.com/securityalert/421 -CVE-2006-0644 - http://dragonflycms.org/Forums/viewtopic/p=98034.html -CVE-2006-0644 - http://dragonflycms.org/Forums/viewtopic/p=98034.html#98034 -CVE-2006-0645 - http://securityreason.com/securityalert/446 -CVE-2006-0648 - http://evuln.com/vulns/70/summary.html -CVE-2006-0648 - http://securityreason.com/securityalert/420 -CVE-2006-0653 - http://evuln.com/vulns/59/summary.html -CVE-2006-0654 - http://evuln.com/vulns/59/summary.html -CVE-2006-0655 - http://evuln.com/vulns/59/summary.html -CVE-2006-0657 - http://evuln.com/vulns/63/summary.html -CVE-2006-0657 - http://securityreason.com/securityalert/442 -CVE-2006-0658 - https://www.exploit-db.com/exploits/3702 -CVE-2006-0661 - http://evuln.com/vulns/65/summary.html -CVE-2006-0661 - http://securityreason.com/securityalert/447 -CVE-2006-0670 - http://marc.info/?l=full-disclosure&m=113924625825488&w=2 -CVE-2006-0670 - http://securityreason.com/securityalert/465 -CVE-2006-0670 - http://www.secuobs.com/news/05022006-bluetooth9.shtml#english -CVE-2006-0671 - http://marc.info/?l=bugtraq&m=113926179907655&w=2 -CVE-2006-0671 - http://marc.info/?l=full-disclosure&m=113924661724270&w=2 -CVE-2006-0671 - http://www.secuobs.com/news/05022006-bluetooth7.shtml#english -CVE-2006-0673 - http://evuln.com/vulns/71/summary.html -CVE-2006-0673 - http://securityreason.com/securityalert/459 -CVE-2006-0676 - http://securityreason.com/securityalert/425 -CVE-2006-0677 - http://securityreason.com/securityalert/449 -CVE-2006-0678 - http://securityreason.com/securityalert/498 -CVE-2006-0679 - http://securityreason.com/achievement_securityalert/32 -CVE-2006-0679 - http://securityreason.com/securityalert/440 -CVE-2006-0683 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt -CVE-2006-0684 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt -CVE-2006-0685 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt -CVE-2006-0686 - http://securityreason.com/securityalert/430 -CVE-2006-0686 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt -CVE-2006-0687 - http://securityreason.com/securityalert/428 -CVE-2006-0688 - http://echo.or.id/adv/adv26-K-159-2006.txt -CVE-2006-0689 - http://www.evuln.com/vulns/69/summary.html -CVE-2006-0690 - http://www.evuln.com/vulns/69/summary.html -CVE-2006-0691 - http://www.evuln.com/vulns/69/summary.html -CVE-2006-0692 - http://securityreason.com/securityalert/451 -CVE-2006-0692 - http://www.evuln.com/vulns/67/summary.html -CVE-2006-0693 - http://securityreason.com/securityalert/453 -CVE-2006-0693 - http://www.evuln.com/vulns/68/summary.html -CVE-2006-0703 - http://securityreason.com/securityalert/429 -CVE-2006-0708 - http://securityreason.com/securityalert/444 -CVE-2006-0708 - http://securityreason.com/securityalert/492 -CVE-2006-0713 - http://securityreason.com/securityalert/426 -CVE-2006-0714 - http://securityreason.com/securityalert/432 -CVE-2006-0716 - http://securityreason.com/securityalert/431 -CVE-2006-0719 - http://securityreason.com/securityalert/424 -CVE-2006-0720 - http://securityreason.com/securityalert/476 -CVE-2006-0722 - http://evuln.com/vulns/73/summary.html -CVE-2006-0722 - http://securityreason.com/securityalert/468 -CVE-2006-0723 - http://evuln.com/vulns/72/summary.html -CVE-2006-0724 - http://evuln.com/vulns/72/summary.html -CVE-2006-0729 - http://securityreason.com/securityalert/477 -CVE-2006-0729 - http://www.evuln.com/vulns/75/summary.html -CVE-2006-0735 - http://evuln.com/vulns/79/summary.html -CVE-2006-0735 - http://evuln.com/vulns/80/summary.html -CVE-2006-0735 - http://www.evuln.com/vulns/80/summary.html -CVE-2006-0744 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732 -CVE-2006-0746 - http://securityreason.com/securityalert/566 -CVE-2006-0747 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9508 -CVE-2006-0748 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-0748 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-0749 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-0756 - http://securityreason.com/securityalert/434 -CVE-2006-0759 - http://securityreason.com/securityalert/422 -CVE-2006-0764 - http://securityreason.com/securityalert/435 -CVE-2006-0768 - http://www.piotrbania.com/all/adv/kadu-fun.txt -CVE-2006-0771 - http://securityreason.com/securityalert/448 -CVE-2006-0775 - http://securityreason.com/securityalert/467 -CVE-2006-0775 - http://www.evuln.com/vulns/74/summary.html -CVE-2006-0776 - http://securityreason.com/securityalert/490 -CVE-2006-0776 - http://www.evuln.com/vulns/77/summary.html -CVE-2006-0777 - http://securityreason.com/securityalert/489 -CVE-2006-0777 - http://www.evuln.com/vulns/76/summary.html -CVE-2006-0778 - http://www.securityfocus.com/archive/1/425084/100/0/threaded -CVE-2006-0779 - http://www.securityfocus.com/archive/1/425084/100/0/threaded -CVE-2006-0780 - http://evuln.com/vulns/81/summary.html -CVE-2006-0780 - http://securityreason.com/securityalert/508 -CVE-2006-0781 - http://evuln.com/vulns/81/summary.html -CVE-2006-0781 - http://securityreason.com/securityalert/508 -CVE-2006-0782 - http://evuln.com/vulns/81/summary.html -CVE-2006-0782 - http://securityreason.com/securityalert/508 -CVE-2006-0783 - http://securityreason.com/securityalert/443 -CVE-2006-0784 - http://securityreason.com/securityalert/441 -CVE-2006-0786 - http://securityreason.com/securityalert/445 -CVE-2006-0795 - http://evuln.com/vulns/78/summary.html -CVE-2006-0797 - http://www.secuobs.com/news/15022006-nokia_n70.shtml#english -CVE-2006-0800 - http://securityreason.com/securityalert/454 -CVE-2006-0801 - http://securityreason.com/securityalert/454 -CVE-2006-0802 - http://securityreason.com/securityalert/454 -CVE-2006-0805 - http://securityreason.com/securityalert/455 -CVE-2006-0805 - http://www.waraxe.us/advisory-45.html -CVE-2006-0806 - http://securityreason.com/securityalert/452 -CVE-2006-0807 - http://securityreason.com/securityalert/461 -CVE-2006-0809 - http://evuln.com/vulns/84/summary.html -CVE-2006-0809 - http://securityreason.com/securityalert/540 -CVE-2006-0810 - http://evuln.com/vulns/84/summary.html -CVE-2006-0810 - http://securityreason.com/securityalert/540 -CVE-2006-0811 - http://evuln.com/vulns/84/summary.html -CVE-2006-0811 - http://securityreason.com/securityalert/540 -CVE-2006-0813 - http://securityreason.com/securityalert/479 -CVE-2006-0814 - http://securityreason.com/securityalert/523 -CVE-2006-0819 - http://securityreason.com/securityalert/576 -CVE-2006-0821 - https://www.exploit-db.com/exploits/1513 -CVE-2006-0829 - http://evuln.com/vulns/83/summary.html -CVE-2006-0829 - http://securityreason.com/securityalert/528 -CVE-2006-0832 - http://securityreason.com/securityalert/456 -CVE-2006-0836 - http://securityreason.com/securityalert/469 -CVE-2006-0843 - http://securityreason.com/securityalert/522 -CVE-2006-0843 - http://www.evuln.com/vulns/82/summary.html -CVE-2006-0844 - http://securityreason.com/securityalert/522 -CVE-2006-0844 - http://www.evuln.com/vulns/82/summary.html -CVE-2006-0845 - http://securityreason.com/securityalert/522 -CVE-2006-0845 - http://www.evuln.com/vulns/82/summary.html -CVE-2006-0846 - http://securityreason.com/securityalert/522 -CVE-2006-0846 - http://www.evuln.com/vulns/82/summary.html -CVE-2006-0848 - http://www.heise.de/english/newsticker/news/69862 -CVE-2006-0848 - http://www.kb.cert.org/vuls/id/999708 -CVE-2006-0851 - https://www.exploit-db.com/exploits/1516 -CVE-2006-0852 - https://www.exploit-db.com/exploits/1512 -CVE-2006-0855 - http://securityreason.com/securityalert/546 -CVE-2006-0856 - http://www.evuln.com/vulns/66/summary.html -CVE-2006-0861 - http://securityreason.com/securityalert/460 -CVE-2006-0863 - http://securityreason.com/securityalert/473 -CVE-2006-0869 - http://securityreason.com/securityalert/466 -CVE-2006-0870 - http://www.nukedx.com/?viewdoc=9 -CVE-2006-0871 - http://securityreason.com/securityalert/493 -CVE-2006-0877 - http://evuln.com/vulns/85/summary.html -CVE-2006-0883 - http://securityreason.com/securityalert/520 -CVE-2006-0884 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-0888 - https://www.exploit-db.com/exploits/1489 -CVE-2006-0895 - http://securityreason.com/securityalert/478 -CVE-2006-0896 - http://evuln.com/vulns/86/summary.html -CVE-2006-0896 - http://securityreason.com/securityalert/545 -CVE-2006-0898 - http://securityreason.com/securityalert/488 -CVE-2006-0899 - http://securityreason.com/securityalert/518 -CVE-2006-0899 - https://www.exploit-db.com/exploits/1533 -CVE-2006-0900 - http://securityreason.com/securityalert/521 -CVE-2006-0903 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915 -CVE-2006-0908 - http://securityreason.com/securityalert/497 -CVE-2006-0911 - http://securityreason.com/securityalert/472 -CVE-2006-0915 - https://bugzilla.mozilla.org/show_bug.cgi?id=313441 -CVE-2006-0916 - http://securityreason.com/securityalert/464 -CVE-2006-0917 - http://securityreason.com/securityalert/463 -CVE-2006-0918 - http://securityreason.com/securityalert/485 -CVE-2006-0920 - http://securityreason.com/securityalert/483 -CVE-2006-0921 - http://securityreason.com/securityalert/484 -CVE-2006-0922 - http://securityreason.com/securityalert/482 -CVE-2006-0923 - http://securityreason.com/securityalert/491 -CVE-2006-0923 - http://www.nukedx.com/?viewdoc=12 -CVE-2006-0927 - http://www.nukedx.com/?viewdoc=11 -CVE-2006-0930 - http://securityreason.com/securityalert/487 -CVE-2006-0932 - http://securityreason.com/securityalert/486 -CVE-2006-0938 - http://www.nukedx.com/?viewdoc=16 -CVE-2006-0939 - http://securityreason.com/securityalert/495 -CVE-2006-0940 - http://evuln.com/vulns/87/summary.html -CVE-2006-0940 - http://securityreason.com/securityalert/557 -CVE-2006-0941 - http://evuln.com/vulns/87/summary.html -CVE-2006-0941 - http://securityreason.com/securityalert/557 -CVE-2006-0943 - http://securityreason.com/securityalert/496 -CVE-2006-0944 - https://www.exploit-db.com/exploits/3859 -CVE-2006-0948 - http://securityreason.com/securityalert/1416 -CVE-2006-0950 - http://securityreason.com/securityalert/575 -CVE-2006-0957 - http://evuln.com/vulns/89/summary.html -CVE-2006-0958 - http://evuln.com/vulns/89/summary.html -CVE-2006-0959 - http://securityreason.com/securityalert/512 -CVE-2006-0959 - https://www.exploit-db.com/exploits/1539 -CVE-2006-0961 - http://www.nukedx.com/?viewdoc=10 -CVE-2006-0961 - https://www.exploit-db.com/exploits/1562 -CVE-2006-0962 - https://www.exploit-db.com/exploits/1543 -CVE-2006-0968 - http://securityreason.com/securityalert/524 -CVE-2006-0969 - http://securityreason.com/securityalert/507 -CVE-2006-0970 - http://securityreason.com/securityalert/505 -CVE-2006-0971 - http://securityreason.com/securityalert/506 -CVE-2006-0972 - http://securityreason.com/securityalert/501 -CVE-2006-0973 - https://www.exploit-db.com/exploits/1525 -CVE-2006-0978 - http://securityreason.com/securityalert/504 -CVE-2006-0983 - http://securityreason.com/securityalert/510 -CVE-2006-0984 - http://securityreason.com/securityalert/511 -CVE-2006-0985 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt -CVE-2006-0986 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt -CVE-2006-0989 - http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html -CVE-2006-0990 - http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html -CVE-2006-0991 - http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html -CVE-2006-0992 - https://www.exploit-db.com/exploits/1679 -CVE-2006-1000 - http://www.nukedx.com/?viewdoc=13 -CVE-2006-1000 - http://www.nukedx.com/?viewdoc=14 -CVE-2006-1001 - https://www.exploit-db.com/exploits/1526 -CVE-2006-1008 - http://securityreason.com/securityalert/562 -CVE-2006-1015 - http://securityreason.com/securityalert/517 -CVE-2006-1017 - http://securityreason.com/securityalert/516 -CVE-2006-1020 - http://evuln.com/vulns/90/summary.html -CVE-2006-1020 - http://securityreason.com/securityalert/574 -CVE-2006-1022 - http://securityreason.com/securityalert/515 -CVE-2006-1027 - http://securityreason.com/securityalert/527 -CVE-2006-1028 - http://securityreason.com/securityalert/527 -CVE-2006-1032 - http://securityreason.com/securityalert/502 -CVE-2006-1042 - http://securityreason.com/securityalert/537 -CVE-2006-1045 - http://securityreason.com/securityalert/514 -CVE-2006-1045 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1046 - http://aluigi.altervista.org/adv/monopdx-adv.txt -CVE-2006-1056 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2006-1056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995 -CVE-2006-1058 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483 -CVE-2006-1073 - http://securityreason.com/securityalert/542 -CVE-2006-1074 - http://aluigi.altervista.org/adv/lieroxxx-adv.txt -CVE-2006-1075 - http://aluigi.altervista.org/adv/lieroxxx-adv.txt -CVE-2006-1075 - http://securityreason.com/securityalert/549 -CVE-2006-1077 - http://securityreason.com/securityalert/544 -CVE-2006-1078 - http://issues.apache.org/bugzilla/show_bug.cgi?id=31975 -CVE-2006-1078 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -CVE-2006-1078 - http://seclists.org/bugtraq/2004/Oct/0359.html -CVE-2006-1078 - http://seclists.org/fulldisclosure/2023/Nov/13 -CVE-2006-1079 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -CVE-2006-1079 - http://seclists.org/fulldisclosure/2023/Nov/13 -CVE-2006-1081 - http://securityreason.com/securityalert/536 -CVE-2006-1082 - http://securityreason.com/securityalert/533 -CVE-2006-1091 - http://securityreason.com/securityalert/535 -CVE-2006-1094 - http://www.nukedx.com/?viewdoc=17 -CVE-2006-1096 - http://pridels0.blogspot.com/2006/03/nz-ecommerce-sqlxss-vuln.html -CVE-2006-1097 - http://www.nukedx.com/?viewdoc=17 -CVE-2006-1098 - http://pridels0.blogspot.com/2006/03/nz-ecommerce-sqlxss-vuln.html -CVE-2006-1100 - http://aluigi.altervista.org/adv/evilcube-adv.txt -CVE-2006-1101 - http://aluigi.altervista.org/adv/evilcube-adv.txt -CVE-2006-1102 - http://aluigi.altervista.org/adv/evilcube-adv.txt -CVE-2006-1102 - http://securityreason.com/securityalert/548 -CVE-2006-1103 - http://securityreason.com/securityalert/550 -CVE-2006-1107 - http://evuln.com/vulns/93/summary.html -CVE-2006-1107 - http://securityreason.com/securityalert/595 -CVE-2006-1108 - http://evuln.com/vulns/93/summary.html -CVE-2006-1108 - http://securityreason.com/securityalert/595 -CVE-2006-1109 - http://securityreason.com/securityalert/530 -CVE-2006-1109 - http://www.nukedx.com/?viewdoc=18 -CVE-2006-1110 - https://www.exploit-db.com/exploits/1547 -CVE-2006-1111 - https://www.exploit-db.com/exploits/1547 -CVE-2006-1112 - http://securityreason.com/securityalert/539 -CVE-2006-1112 - https://www.exploit-db.com/exploits/1547 -CVE-2006-1120 - http://securityreason.com/securityalert/392 -CVE-2006-1121 - http://securityreason.com/securityalert/531 -CVE-2006-1122 - http://securityreason.com/securityalert/559 -CVE-2006-1123 - http://securityreason.com/securityalert/559 -CVE-2006-1129 - http://evuln.com/vulns/88/summary.html -CVE-2006-1130 - http://evuln.com/vulns/88/summary.html -CVE-2006-1130 - http://securityreason.com/securityalert/558 -CVE-2006-1132 - http://securityreason.com/securityalert/552 -CVE-2006-1133 - http://securityreason.com/securityalert/552 -CVE-2006-1134 - http://evuln.com/vulns/91/description.html -CVE-2006-1134 - http://securityreason.com/securityalert/582 -CVE-2006-1145 - http://aluigi.altervista.org/adv/aa2k6x-adv.txt -CVE-2006-1146 - http://aluigi.altervista.org/adv/aa2k6x-adv.txt -CVE-2006-1147 - http://aluigi.altervista.org/adv/aa2k6x-adv.txt -CVE-2006-1149 - https://www.exploit-db.com/exploits/1561 -CVE-2006-1153 - https://www.exploit-db.com/exploits/1556 -CVE-2006-1154 - https://www.exploit-db.com/exploits/3027 -CVE-2006-1168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373 -CVE-2006-1182 - http://securityreason.com/securityalert/588 -CVE-2006-1184 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 -CVE-2006-1185 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1186 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1188 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1189 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1190 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A965 -CVE-2006-1191 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1192 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1193 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-029 -CVE-2006-1194 - http://aluigi.altervista.org/adv/enetx-adv.txt -CVE-2006-1195 - http://aluigi.altervista.org/adv/enetx-adv.txt -CVE-2006-1200 - http://securityreason.com/securityalert/553 -CVE-2006-1208 - http://securityreason.com/securityalert/564 -CVE-2006-1209 - http://securityreason.com/securityalert/565 -CVE-2006-1213 - http://www.nukedx.com/?viewdoc=19 -CVE-2006-1216 - http://securityreason.com/securityalert/474 -CVE-2006-1217 - http://evuln.com/vulns/96/summary.html -CVE-2006-1219 - https://www.exploit-db.com/exploits/1566 -CVE-2006-1223 - http://securityreason.com/securityalert/572 -CVE-2006-1224 - http://securityreason.com/securityalert/569 -CVE-2006-1225 - http://securityreason.com/securityalert/579 -CVE-2006-1226 - http://securityreason.com/securityalert/581 -CVE-2006-1227 - http://securityreason.com/securityalert/578 -CVE-2006-1228 - http://securityreason.com/securityalert/580 -CVE-2006-1229 - http://www.osvdb.org/23802 -CVE-2006-1232 - http://evuln.com/vulns/99/summary.html -CVE-2006-1232 - http://securityreason.com/securityalert/626 -CVE-2006-1234 - http://evuln.com/vulns/98/summary.html -CVE-2006-1234 - http://securityreason.com/securityalert/627 -CVE-2006-1234 - http://www.securityfocus.com/archive/1/428807/100/0/threaded -CVE-2006-1236 - http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html -CVE-2006-1236 - https://www.exploit-db.com/exploits/1582 -CVE-2006-1237 - http://evuln.com/vulns/97/summary.html -CVE-2006-1237 - http://securityreason.com/securityalert/623 -CVE-2006-1238 - http://evuln.com/vulns/100/summary.html -CVE-2006-1243 - https://www.exploit-db.com/exploits/1581 -CVE-2006-1245 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1252 - https://www.exploit-db.com/exploits/1570 -CVE-2006-1256 - http://evuln.com/vulns/104/summary.html -CVE-2006-1256 - http://securityreason.com/securityalert/650 -CVE-2006-1257 - http://securityreason.com/securityalert/594 -CVE-2006-1259 - http://evuln.com/vulns/103/summary.html -CVE-2006-1259 - http://securityreason.com/securityalert/645 -CVE-2006-1260 - http://securityreason.com/securityalert/590 -CVE-2006-1262 - http://securityreason.com/securityalert/592 -CVE-2006-1264 - http://evuln.com/vulns/92/summary.html -CVE-2006-1265 - http://evuln.com/vulns/92/summary.html -CVE-2006-1273 - http://securityreason.com/securityalert/593 -CVE-2006-1274 - http://securityreason.com/securityalert/573 -CVE-2006-1275 - http://aluigi.altervista.org/adv/ggzcdos-adv.txt -CVE-2006-1276 - http://evuln.com/vulns/94/summary.html -CVE-2006-1276 - http://securityreason.com/securityalert/613 -CVE-2006-1277 - http://evuln.com/vulns/95/summary.html -CVE-2006-1278 - http://evuln.com/vulns/95/summary.html -CVE-2006-1278 - http://securityreason.com/securityalert/619 -CVE-2006-1278 - https://www.exploit-db.com/exploits/6040 -CVE-2006-1291 - https://www.exploit-db.com/exploits/1586 -CVE-2006-1292 - https://www.exploit-db.com/exploits/1585 -CVE-2006-1293 - http://securityreason.com/securityalert/599 -CVE-2006-1294 - https://www.exploit-db.com/exploits/1587 -CVE-2006-1297 - http://securityreason.com/securityalert/597 -CVE-2006-1300 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-033 -CVE-2006-1301 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-1302 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-1303 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-1304 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-1305 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 -CVE-2006-1306 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-1306 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A950 -CVE-2006-1308 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-1309 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-1311 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-013 -CVE-2006-1313 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023 -CVE-2006-1314 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035 -CVE-2006-1315 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035 -CVE-2006-1316 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 -CVE-2006-1316 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A918 -CVE-2006-1318 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 -CVE-2006-1320 - http://www.securityfocus.com/bid/18999 -CVE-2006-1324 - http://securityreason.com/securityalert/529 -CVE-2006-1324 - http://securityreason.com/securityalert/598 -CVE-2006-1327 - https://www.exploit-db.com/exploits/1594 -CVE-2006-1328 - http://evuln.com/vulns/105/summary.html -CVE-2006-1332 - http://securityreason.com/securityalert/471 -CVE-2006-1333 - http://www.nukedx.com/?viewdoc=20 -CVE-2006-1334 - http://evuln.com/vulns/101/summary.html -CVE-2006-1341 - http://evuln.com/vulns/102/description.html -CVE-2006-1341 - http://securityreason.com/securityalert/646 -CVE-2006-1342 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2006-1343 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2006-1346 - https://www.exploit-db.com/exploits/1595 -CVE-2006-1347 - https://www.exploit-db.com/exploits/1595 -CVE-2006-1348 - https://www.exploit-db.com/exploits/1595 -CVE-2006-1353 - http://www.nukedx.com/?viewdoc=21 -CVE-2006-1353 - https://www.exploit-db.com/exploits/1597 -CVE-2006-1357 - http://securityreason.com/securityalert/611 -CVE-2006-1359 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1359 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A985 -CVE-2006-1363 - https://www.exploit-db.com/exploits/1600 -CVE-2006-1364 - https://www.exploit-db.com/exploits/1601 -CVE-2006-1371 - https://www.exploit-db.com/exploits/1605 -CVE-2006-1385 - http://securityreason.com/securityalert/609 -CVE-2006-1388 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -CVE-2006-1392 - http://www.kb.cert.org/vuls/id/337585 -CVE-2006-1402 - http://aluigi.altervista.org/adv/csdoombof-adv.txt -CVE-2006-1402 - http://www.securityfocus.com/bid/17248 -CVE-2006-1403 - http://aluigi.altervista.org/adv/csdoombof-adv.txt -CVE-2006-1403 - http://www.securityfocus.com/bid/17248 -CVE-2006-1408 - http://aluigi.altervista.org/adv/vaboom-adv.txt -CVE-2006-1409 - http://aluigi.altervista.org/adv/vaboom-adv.txt -CVE-2006-1412 - https://www.exploit-db.com/exploits/1611 -CVE-2006-1422 - https://www.exploit-db.com/exploits/1610 -CVE-2006-1457 - http://www.kb.cert.org/vuls/id/519473 -CVE-2006-1478 - http://securityreason.com/securityalert/641 -CVE-2006-1480 - https://www.exploit-db.com/exploits/1608 -CVE-2006-1481 - https://www.exploit-db.com/exploits/1609 -CVE-2006-1492 - http://www.zataz.com/news/10871/Probleme-de-securite-decouvert-dans-le-logiciel-ExploreXP.html -CVE-2006-1493 - http://www.zataz.com/news/10871/Probleme-de-securite-decouvert-dans-le-logiciel-ExploreXP.html -CVE-2006-1495 - https://www.exploit-db.com/exploits/1617 -CVE-2006-1499 - http://evuln.com/vulns/108/summary.html -CVE-2006-1502 - http://securityreason.com/securityalert/532 -CVE-2006-1510 - http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html -CVE-2006-1511 - http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html -CVE-2006-1516 - http://bugs.debian.org/365938 -CVE-2006-1516 - http://securityreason.com/securityalert/840 -CVE-2006-1516 - http://www.wisec.it/vulns.php?page=7 -CVE-2006-1516 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918 -CVE-2006-1517 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 -CVE-2006-1517 - http://securityreason.com/securityalert/839 -CVE-2006-1517 - http://www.wisec.it/vulns.php?page=8 -CVE-2006-1518 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 -CVE-2006-1518 - http://securityreason.com/securityalert/839 -CVE-2006-1518 - http://www.wisec.it/vulns.php?page=8 -CVE-2006-1520 - http://www.gossamer-threads.com/lists/spf/devel/27053?page=last -CVE-2006-1522 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9325 -CVE-2006-1526 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9929 -CVE-2006-1529 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1530 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1531 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1533 - http://evuln.com/vulns/107/summary.html -CVE-2006-1534 - http://evuln.com/vulns/109/summary.html -CVE-2006-1534 - http://securityreason.com/securityalert/682 -CVE-2006-1537 - http://securityreason.com/securityalert/651 -CVE-2006-1540 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 -CVE-2006-1540 - https://www.exploit-db.com/exploits/1615 -CVE-2006-1541 - http://www.nukedx.com/?viewdoc=22 -CVE-2006-1541 - https://www.exploit-db.com/exploits/1623 -CVE-2006-1542 - https://www.exploit-db.com/exploits/1591 -CVE-2006-1549 - http://securityreason.com/securityalert/2312 -CVE-2006-1551 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php -CVE-2006-1553 - http://evuln.com/vulns/106/description.html -CVE-2006-1554 - http://evuln.com/vulns/106/description.html -CVE-2006-1555 - http://evuln.com/vulns/106/description.html -CVE-2006-1560 - http://securityreason.com/securityalert/680 -CVE-2006-1568 - http://evuln.com/vulns/115/summary.html -CVE-2006-1569 - http://evuln.com/vulns/115/summary.html -CVE-2006-1571 - http://evuln.com/vulns/114/summary.html -CVE-2006-1571 - http://securityreason.com/securityalert/701 -CVE-2006-1574 - http://www.hitachi-support.com/security_e/vuls_e/HS06-005_e/index-e.html -CVE-2006-1575 - http://evuln.com/vulns/113/description.html -CVE-2006-1576 - http://evuln.com/vulns/113/description.html -CVE-2006-1591 - http://securityreason.com/securityalert/700 -CVE-2006-1592 - http://aluigi.altervista.org/adv/zdaebof-adv.txt -CVE-2006-1593 - http://aluigi.altervista.org/adv/zdaebof-adv.txt -CVE-2006-1593 - http://securityreason.com/securityalert/662 -CVE-2006-1594 - https://www.exploit-db.com/exploits/1627 -CVE-2006-1595 - https://www.exploit-db.com/exploits/1627 -CVE-2006-1596 - https://www.exploit-db.com/exploits/1627 -CVE-2006-1610 - https://www.exploit-db.com/exploits/1629 -CVE-2006-1612 - http://evuln.com/vulns/116/summary.html -CVE-2006-1613 - http://evuln.com/vulns/116/summary.html -CVE-2006-1620 - https://www.exploit-db.com/exploits/4730 -CVE-2006-1626 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-1637 - http://evuln.com/vulns/117/summary.html -CVE-2006-1638 - http://evuln.com/vulns/117/summary.html -CVE-2006-1639 - http://evuln.com/vulns/119/summary.html -CVE-2006-1639 - http://securityreason.com/securityalert/734 -CVE-2006-1640 - http://evuln.com/vulns/118/summary.html -CVE-2006-1640 - http://securityreason.com/securityalert/732 -CVE-2006-1641 - http://evuln.com/vulns/118/summary.html -CVE-2006-1649 - http://securityreason.com/securityalert/672 -CVE-2006-1652 - http://securityreason.com/securityalert/674 -CVE-2006-1652 - https://www.exploit-db.com/exploits/1642 -CVE-2006-1652 - https://www.exploit-db.com/exploits/1643 -CVE-2006-1657 - http://evuln.com/vulns/121/summary.html -CVE-2006-1658 - http://evuln.com/vulns/121/summary.html -CVE-2006-1662 - http://securityreason.com/securityalert/519 -CVE-2006-1664 - https://www.exploit-db.com/exploits/1641 -CVE-2006-1667 - https://www.exploit-db.com/exploits/1645 -CVE-2006-1668 - https://www.exploit-db.com/exploits/1645 -CVE-2006-1669 - https://www.exploit-db.com/exploits/1646 -CVE-2006-1690 - http://evuln.com/vulns/123/summary.html -CVE-2006-1690 - http://securityreason.com/securityalert/752 -CVE-2006-1691 - http://evuln.com/vulns/123/summary.html -CVE-2006-1694 - https://www.exploit-db.com/exploits/1655 -CVE-2006-1705 - http://www.securityfocus.com/archive/1/430434/100/0/threaded -CVE-2006-1708 - https://www.exploit-db.com/exploits/1662 -CVE-2006-1710 - https://www.exploit-db.com/exploits/1653 -CVE-2006-1721 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2006-1721 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9861 -CVE-2006-1723 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1724 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1724 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1725 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1725 - https://bugzilla.mozilla.org/show_bug.cgi?id=327014 -CVE-2006-1726 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1727 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1727 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1728 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1728 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1729 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1730 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1730 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1731 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1731 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9604 -CVE-2006-1732 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1733 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1734 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1735 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1737 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1738 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9405 -CVE-2006-1739 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1739 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9817 -CVE-2006-1741 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1741 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9167 -CVE-2006-1742 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1747 - https://www.exploit-db.com/exploits/1658 -CVE-2006-1755 - http://evuln.com/vulns/120/summary.html -CVE-2006-1756 - http://evuln.com/vulns/120/summary.html -CVE-2006-1763 - http://securityreason.com/securityalert/689 -CVE-2006-1776 - https://www.exploit-db.com/exploits/1663 -CVE-2006-1777 - https://www.exploit-db.com/exploits/1663 -CVE-2006-1778 - http://securityreason.com/securityalert/702 -CVE-2006-1778 - https://www.exploit-db.com/exploits/1663 -CVE-2006-1779 - https://www.exploit-db.com/exploits/1663 -CVE-2006-1781 - http://pridels0.blogspot.com/2006/04/monstertoplist.html -CVE-2006-1781 - https://www.exploit-db.com/exploits/3530 -CVE-2006-1784 - https://www.exploit-db.com/exploits/1665 -CVE-2006-1789 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php -CVE-2006-1790 - http://www.redhat.com/support/errata/RHSA-2006-0330.html -CVE-2006-1798 - http://evuln.com/vulns/124/summary.html -CVE-2006-1799 - https://www.exploit-db.com/exploits/1669 -CVE-2006-1817 - http://evuln.com/vulns/125/summary.html -CVE-2006-1818 - http://evuln.com/vulns/125/summary.html -CVE-2006-1819 - https://www.exploit-db.com/exploits/1673 -CVE-2006-1822 - http://securityreason.com/securityalert/710 -CVE-2006-1823 - http://securityreason.com/securityalert/710 -CVE-2006-1828 - https://www.exploit-db.com/exploits/1666 -CVE-2006-1831 - https://www.exploit-db.com/exploits/1677 -CVE-2006-1832 - https://www.exploit-db.com/exploits/1677 -CVE-2006-1834 - http://marc.info/?l=full-disclosure&m=114493114031891&w=2 -CVE-2006-1837 - https://www.exploit-db.com/exploits/1682 -CVE-2006-1838 - https://www.exploit-db.com/exploits/1682 -CVE-2006-1856 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9927 -CVE-2006-1858 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9510 -CVE-2006-1861 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124 -CVE-2006-1862 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9390 -CVE-2006-1864 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2006-1891 - http://securityreason.com/securityalert/765 -CVE-2006-1917 - https://www.exploit-db.com/exploits/1683 -CVE-2006-1919 - https://www.exploit-db.com/exploits/1694 -CVE-2006-1921 - https://www.exploit-db.com/exploits/1695 -CVE-2006-1922 - http://pridels0.blogspot.com/2006/04/totalcalendar-remote-code-execution.html -CVE-2006-1929 - http://pridels0.blogspot.com/2006/04/i-rater-platinum-remote-file-inclusion.html -CVE-2006-1932 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9823 -CVE-2006-1938 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9850 -CVE-2006-1940 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9781 -CVE-2006-1942 - http://www.networksecurity.fi/advisories/netscape-view-image.html -CVE-2006-1942 - http://www.securityfocus.com/archive/1/431267/100/0/threaded -CVE-2006-1942 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1954 - https://www.exploit-db.com/exploits/1699 -CVE-2006-1955 - https://www.exploit-db.com/exploits/1699 -CVE-2006-1964 - http://www.nukedx.com/?getxpl=23 -CVE-2006-1967 - http://securityreason.com/securityalert/503 -CVE-2006-1978 - https://www.exploit-db.com/exploits/1686 -CVE-2006-1979 - http://evuln.com/vulns/122/summary.html -CVE-2006-1979 - http://securityreason.com/securityalert/747 -CVE-2006-1990 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696 -CVE-2006-1992 - http://securityreason.com/securityalert/781 -CVE-2006-1992 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-1993 - http://securityreason.com/securityalert/780 -CVE-2006-1993 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-1994 - http://www.nukedx.com/?viewdoc=27 -CVE-2006-1995 - http://securityreason.com/securityalert/784 -CVE-2006-1996 - http://securityreason.com/securityalert/784 -CVE-2006-1998 - http://aluigi.altervista.org/adv/openttdx-adv.txt -CVE-2006-1999 - http://aluigi.altervista.org/adv/openttdx-adv.txt -CVE-2006-2001 - http://securityreason.com/securityalert/783 -CVE-2006-2002 - http://www.nukedx.com/?viewdoc=28 -CVE-2006-2005 - http://securityreason.com/securityalert/782 -CVE-2006-2005 - http://www.nukedx.com/?getxpl=29 -CVE-2006-2008 - https://www.exploit-db.com/exploits/1711 -CVE-2006-2009 - http://securityreason.com/securityalert/787 -CVE-2006-2012 - http://aluigi.altervista.org/adv/skulltagfs-adv.txt -CVE-2006-2017 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2006-2019 - https://www.exploit-db.com/exploits/1715 -CVE-2006-2024 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9893 -CVE-2006-2027 - http://securityreason.com/securityalert/788 -CVE-2006-2028 - http://www.nukedx.com/?getxpl=25 -CVE-2006-2029 - http://www.nukedx.com/?getxpl=25 -CVE-2006-2032 - http://www.nukedx.com/?getxpl=24 -CVE-2006-2033 - http://www.nukedx.com/?getxpl=24 -CVE-2006-2040 - http://securityreason.com/securityalert/789 -CVE-2006-2046 - https://www.exploit-db.com/exploits/4264 -CVE-2006-2048 - http://securityreason.com/securityalert/786 -CVE-2006-2058 - http://securityreason.com/securityalert/785 -CVE-2006-2059 - http://securityreason.com/securityalert/796 -CVE-2006-2060 - http://securityreason.com/securityalert/796 -CVE-2006-2061 - http://securityreason.com/securityalert/796 -CVE-2006-2066 - http://www.nukedx.com/?viewdoc=26 -CVE-2006-2067 - http://www.nukedx.com/?viewdoc=26 -CVE-2006-2070 - http://securityreason.com/securityalert/800 -CVE-2006-2071 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2006-2071 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9978 -CVE-2006-2081 - http://securityreason.com/securityalert/802 -CVE-2006-2081 - http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html -CVE-2006-2084 - http://securityreason.com/securityalert/812 -CVE-2006-2085 - http://securityreason.com/securityalert/820 -CVE-2006-2088 - http://securityreason.com/securityalert/806 -CVE-2006-2089 - http://securityreason.com/securityalert/807 -CVE-2006-2090 - http://securityreason.com/securityalert/807 -CVE-2006-2091 - http://securityreason.com/securityalert/818 -CVE-2006-2093 - http://securityreason.com/securityalert/817 -CVE-2006-2096 - http://securityreason.com/securityalert/814 -CVE-2006-2097 - http://securityreason.com/securityalert/813 -CVE-2006-2099 - http://securityreason.com/securityalert/815 -CVE-2006-2100 - http://securityreason.com/securityalert/815 -CVE-2006-2101 - http://securityreason.com/securityalert/815 -CVE-2006-2102 - http://securityreason.com/securityalert/815 -CVE-2006-2103 - http://securityreason.com/securityalert/808 -CVE-2006-2107 - http://securityreason.com/securityalert/809 -CVE-2006-2108 - https://www.exploit-db.com/exploits/1718 -CVE-2006-2111 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 -CVE-2006-2114 - http://securityreason.com/securityalert/816 -CVE-2006-2115 - http://securityreason.com/securityalert/816 -CVE-2006-2116 - http://securityreason.com/securityalert/825 -CVE-2006-2117 - http://securityreason.com/securityalert/822 -CVE-2006-2118 - http://securityreason.com/securityalert/821 -CVE-2006-2119 - http://securityreason.com/securityalert/811 -CVE-2006-2120 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9572 -CVE-2006-2121 - http://securityreason.com/securityalert/824 -CVE-2006-2122 - http://securityreason.com/securityalert/823 -CVE-2006-2127 - http://securityreason.com/securityalert/810 -CVE-2006-2128 - http://evuln.com/vulns/130/summary.html -CVE-2006-2129 - http://evuln.com/vulns/130/summary.html -CVE-2006-2130 - http://evuln.com/vulns/131/summary.html -CVE-2006-2131 - http://evuln.com/vulns/131/summary.html -CVE-2006-2134 - https://www.exploit-db.com/exploits/1728 -CVE-2006-2135 - http://evuln.com/vulns/128/ -CVE-2006-2136 - http://evuln.com/vulns/126/ -CVE-2006-2137 - https://www.exploit-db.com/exploits/1727 -CVE-2006-2138 - http://securityreason.com/securityalert/827 -CVE-2006-2139 - http://evuln.com/vulns/129/summary.html -CVE-2006-2142 - https://www.exploit-db.com/exploits/1729 -CVE-2006-2143 - http://securityreason.com/securityalert/828 -CVE-2006-2144 - http://securityreason.com/securityalert/826 -CVE-2006-2145 - http://evuln.com/vulns/127/summary.html -CVE-2006-2146 - http://evuln.com/vulns/127/summary.html -CVE-2006-2149 - https://www.exploit-db.com/exploits/1732 -CVE-2006-2151 - https://www.exploit-db.com/exploits/1722 -CVE-2006-2151 - https://www.exploit-db.com/exploits/1724 -CVE-2006-2152 - https://www.exploit-db.com/exploits/1723 -CVE-2006-2152 - https://www.exploit-db.com/exploits/1725 -CVE-2006-2153 - http://securityreason.com/securityalert/830 -CVE-2006-2156 - https://www.exploit-db.com/exploits/1738 -CVE-2006-2167 - http://securityreason.com/securityalert/831 -CVE-2006-2174 - http://securityreason.com/securityalert/832 -CVE-2006-2175 - https://www.exploit-db.com/exploits/1740 -CVE-2006-2177 - http://securityreason.com/securityalert/833 -CVE-2006-2181 - http://pridels0.blogspot.com/2006/05/albinator-208-remote-file-inclusion.html -CVE-2006-2182 - http://pridels0.blogspot.com/2006/05/albinator-208-remote-file-inclusion.html -CVE-2006-2186 - http://securityreason.com/securityalert/834 -CVE-2006-2189 - http://securityreason.com/securityalert/836 -CVE-2006-2193 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9788 -CVE-2006-2194 - http://www.ubuntu.com/usn/usn-310-1 -CVE-2006-2204 - http://securityreason.com/securityalert/551 -CVE-2006-2218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-2219 - http://securityreason.com/securityalert/837 -CVE-2006-2220 - http://securityreason.com/securityalert/837 -CVE-2006-2223 - http://www.redhat.com/support/errata/RHSA-2006-0525.html -CVE-2006-2223 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985 -CVE-2006-2224 - http://www.redhat.com/support/errata/RHSA-2006-0525.html -CVE-2006-2226 - http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt -CVE-2006-2226 - https://www.exploit-db.com/exploits/1552 -CVE-2006-2231 - http://securityreason.com/securityalert/843 -CVE-2006-2232 - http://securityreason.com/securityalert/844 -CVE-2006-2236 - https://www.exploit-db.com/exploits/1750 -CVE-2006-2239 - http://evuln.com/vulns/133/summary.html -CVE-2006-2242 - https://www.exploit-db.com/exploits/1749 -CVE-2006-2245 - http://pridels0.blogspot.com/2006/05/phpbb-auction-mod-remote-file.html -CVE-2006-2249 - http://securityreason.com/securityalert/860 -CVE-2006-2250 - http://securityreason.com/securityalert/860 -CVE-2006-2253 - https://www.exploit-db.com/exploits/1752 -CVE-2006-2256 - https://www.exploit-db.com/exploits/1764 -CVE-2006-2261 - https://www.exploit-db.com/exploits/1763 -CVE-2006-2263 - https://www.exploit-db.com/exploits/1759 -CVE-2006-2268 - https://www.exploit-db.com/exploits/7622 -CVE-2006-2274 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531 -CVE-2006-2276 - http://www.redhat.com/support/errata/RHSA-2006-0525.html -CVE-2006-2284 - https://www.exploit-db.com/exploits/1766 -CVE-2006-2297 - http://securityreason.com/securityalert/886 -CVE-2006-2314 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9947 -CVE-2006-2315 - https://www.exploit-db.com/exploits/1762 -CVE-2006-2323 - http://securityreason.com/securityalert/156 -CVE-2006-2324 - http://secdev.zoller.lu/research/zango.htm -CVE-2006-2328 - http://securityreason.com/securityalert/883 -CVE-2006-2329 - http://securityreason.com/securityalert/883 -CVE-2006-2330 - http://securityreason.com/securityalert/873 -CVE-2006-2331 - http://securityreason.com/securityalert/873 -CVE-2006-2361 - https://www.exploit-db.com/exploits/1774 -CVE-2006-2363 - https://www.exploit-db.com/exploits/1751 -CVE-2006-2369 - http://seclists.org/fulldisclosure/2022/May/29 -CVE-2006-2369 - http://securityreason.com/securityalert/8355 -CVE-2006-2369 - http://www.intelliadmin.com/blog/2006/05/vnc-flaw-proof-of-concept.html -CVE-2006-2370 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 -CVE-2006-2371 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 -CVE-2006-2372 - http://securityreason.com/securityalert/1201 -CVE-2006-2372 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036 -CVE-2006-2372 - https://www.exploit-db.com/exploits/2054 -CVE-2006-2373 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 -CVE-2006-2374 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 -CVE-2006-2376 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-026 -CVE-2006-2378 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-022 -CVE-2006-2379 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032 -CVE-2006-2380 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-031 -CVE-2006-2382 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-2383 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-2384 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-2385 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -CVE-2006-2386 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-076 -CVE-2006-2387 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 -CVE-2006-2388 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-2389 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 -CVE-2006-2392 - https://www.exploit-db.com/exploits/1779 -CVE-2006-2393 - http://aluigi.altervista.org/adv/empiredos-adv.txt -CVE-2006-2395 - http://pridels0.blogspot.com/2006/05/popphoto-remote-file-inclusion-vuln.html -CVE-2006-2399 - http://aluigi.altervista.org/adv/outgunx-adv.txt -CVE-2006-2399 - http://securityreason.com/securityalert/898 -CVE-2006-2400 - http://aluigi.altervista.org/adv/outgunx-adv.txt -CVE-2006-2400 - http://securityreason.com/securityalert/898 -CVE-2006-2401 - http://aluigi.altervista.org/adv/outgunx-adv.txt -CVE-2006-2401 - http://securityreason.com/securityalert/898 -CVE-2006-2402 - http://aluigi.altervista.org/adv/outgunx-adv.txt -CVE-2006-2402 - http://securityreason.com/securityalert/898 -CVE-2006-2407 - http://marc.info/?l=full-disclosure&m=114764338702488&w=2 -CVE-2006-2407 - http://securityreason.com/securityalert/901 -CVE-2006-2408 - http://aluigi.altervista.org/adv/raydiumx-adv.txt -CVE-2006-2408 - http://securityreason.com/securityalert/900 -CVE-2006-2409 - http://aluigi.altervista.org/adv/raydiumx-adv.txt -CVE-2006-2409 - http://securityreason.com/securityalert/900 -CVE-2006-2410 - http://aluigi.altervista.org/adv/raydiumx-adv.txt -CVE-2006-2410 - http://securityreason.com/securityalert/900 -CVE-2006-2411 - http://aluigi.altervista.org/adv/raydiumx-adv.txt -CVE-2006-2411 - http://securityreason.com/securityalert/900 -CVE-2006-2412 - http://aluigi.altervista.org/adv/raydiumx-adv.txt -CVE-2006-2412 - http://securityreason.com/securityalert/900 -CVE-2006-2415 - http://www.osvdb.org/25505 -CVE-2006-2420 - https://bugzilla.mozilla.org/show_bug.cgi?id=313441 -CVE-2006-2424 - https://www.exploit-db.com/exploits/1795 -CVE-2006-2440 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9481 -CVE-2006-2446 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9117 -CVE-2006-2447 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9184 -CVE-2006-2449 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844 -CVE-2006-2450 - http://seclists.org/fulldisclosure/2022/May/29 -CVE-2006-2460 - http://securityreason.com/securityalert/921 -CVE-2006-2460 - https://www.exploit-db.com/exploits/1785 -CVE-2006-2465 - http://packetstormsecurity.com/files/124955/Mp3info-Stack-Buffer-Overflow.html -CVE-2006-2465 - http://packetstormsecurity.com/files/125786/MP3Info-0.8.5-SEH-Buffer-Overflow.html -CVE-2006-2465 - http://www.exploit-db.com/exploits/32358 -CVE-2006-2468 - http://dev2dev.bea.com/pub/advisory/190 -CVE-2006-2483 - https://www.exploit-db.com/exploits/1790 -CVE-2006-2485 - http://www.nukedx.com/?getxpl=30 -CVE-2006-2487 - https://www.exploit-db.com/exploits/1800 -CVE-2006-2491 - http://securityreason.com/securityalert/927 -CVE-2006-2492 - http://isc.sans.org/diary.php?storyid=1345 -CVE-2006-2492 - http://isc.sans.org/diary.php?storyid=1346 -CVE-2006-2494 - https://www.exploit-db.com/exploits/1806 -CVE-2006-2507 - http://securityreason.com/securityalert/932 -CVE-2006-2509 - http://www.securityfocus.com/bid/18046 -CVE-2006-2510 - http://www.securityfocus.com/bid/18046 -CVE-2006-2516 - https://www.exploit-db.com/exploits/1811 -CVE-2006-2521 - https://www.exploit-db.com/exploits/1808 -CVE-2006-2523 - https://www.exploit-db.com/exploits/1805 -CVE-2006-2541 - https://www.exploit-db.com/exploits/1807 -CVE-2006-2548 - http://securityreason.com/securityalert/942 -CVE-2006-2548 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-002.php -CVE-2006-2548 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-003.php -CVE-2006-2550 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-003.php -CVE-2006-2554 - http://aluigi.altervista.org/adv/genecysbof-adv.txt -CVE-2006-2554 - http://securityreason.com/securityalert/944 -CVE-2006-2555 - http://aluigi.altervista.org/adv/genecysbof-adv.txt -CVE-2006-2555 - http://securityreason.com/securityalert/944 -CVE-2006-2557 - http://securityreason.com/securityalert/947 -CVE-2006-2557 - https://www.exploit-db.com/exploits/1789 -CVE-2006-2565 - http://securityreason.com/securityalert/949 -CVE-2006-2566 - http://securityreason.com/securityalert/949 -CVE-2006-2567 - http://securityreason.com/securityalert/949 -CVE-2006-2568 - https://www.exploit-db.com/exploits/1814 -CVE-2006-2569 - https://www.exploit-db.com/exploits/1810 -CVE-2006-2570 - https://www.exploit-db.com/exploits/1809 -CVE-2006-2575 - http://aluigi.altervista.org/adv/panza-adv.txt -CVE-2006-2576 - https://www.exploit-db.com/exploits/1817 -CVE-2006-2583 - http://securityreason.com/securityalert/951 -CVE-2006-2587 - http://aluigi.altervista.org/adv/pbwebbof-adv.txt -CVE-2006-2611 - http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349&r2=14348&pathrev=14349 -CVE-2006-2613 - http://securityreason.com/securityalert/960 -CVE-2006-2613 - https://bugzilla.mozilla.org/show_bug.cgi?id=267645 -CVE-2006-2616 - http://securityreason.com/securityalert/955 -CVE-2006-2617 - http://securityreason.com/securityalert/955 -CVE-2006-2618 - http://securityreason.com/securityalert/955 -CVE-2006-2634 - http://securityreason.com/securityalert/967 -CVE-2006-2639 - http://securityreason.com/securityalert/971 -CVE-2006-2648 - http://www.nukedx.com/?viewdoc=32 -CVE-2006-2651 - http://securityreason.com/securityalert/982 -CVE-2006-2656 - http://marc.info/?l=vuln-dev&m=114857412916909&w=2 -CVE-2006-2665 - https://www.exploit-db.com/exploits/1827 -CVE-2006-2666 - https://www.exploit-db.com/exploits/1827 -CVE-2006-2668 - https://www.exploit-db.com/exploits/1828 -CVE-2006-2669 - http://securityreason.com/securityalert/990 -CVE-2006-2680 - http://securityreason.com/securityalert/992 -CVE-2006-2682 - https://www.exploit-db.com/exploits/1825 -CVE-2006-2683 - https://www.exploit-db.com/exploits/1824 -CVE-2006-2685 - https://www.exploit-db.com/exploits/1823 -CVE-2006-2686 - https://www.exploit-db.com/exploits/1829 -CVE-2006-2693 - http://www.nukedx.com/?viewdoc=37 -CVE-2006-2725 - http://www.nukedx.com/?getxpl=36 -CVE-2006-2725 - http://www.nukedx.com/?viewdoc=36 -CVE-2006-2726 - https://www.exploit-db.com/exploits/1848 -CVE-2006-2727 - http://www.nukedx.com/?viewdoc=36 -CVE-2006-2730 - https://www.exploit-db.com/exploits/1835 -CVE-2006-2731 - http://www.nukedx.com/?getxpl=34 -CVE-2006-2731 - http://www.nukedx.com/?viewdoc=34 -CVE-2006-2732 - http://www.nukedx.com/?getxpl=31 -CVE-2006-2732 - http://www.nukedx.com/?viewdoc=31 -CVE-2006-2733 - http://www.nukedx.com/?getxpl=31 -CVE-2006-2733 - http://www.nukedx.com/?viewdoc=31 -CVE-2006-2734 - http://www.nukedx.com/?getxpl=31 -CVE-2006-2734 - http://www.nukedx.com/?viewdoc=31 -CVE-2006-2735 - http://www.nukedx.com/?getxpl=38 -CVE-2006-2735 - http://www.nukedx.com/?viewdoc=38 -CVE-2006-2736 - http://www.nukedx.com/?getxpl=41 -CVE-2006-2736 - http://www.nukedx.com/?viewdoc=41 -CVE-2006-2739 - http://www.nukedx.com/?getxpl=33 -CVE-2006-2739 - http://www.nukedx.com/?viewdoc=33 -CVE-2006-2740 - http://www.nukedx.com/?getxpl=33 -CVE-2006-2740 - http://www.nukedx.com/?viewdoc=33 -CVE-2006-2741 - http://www.nukedx.com/?getxpl=33 -CVE-2006-2741 - http://www.nukedx.com/?viewdoc=33 -CVE-2006-2743 - https://www.exploit-db.com/exploits/1821 -CVE-2006-2744 - http://www.nukedx.com/?getxpl=35 -CVE-2006-2744 - http://www.nukedx.com/?viewdoc=35 -CVE-2006-2745 - http://www.nukedx.com/?getxpl=35 -CVE-2006-2745 - http://www.nukedx.com/?viewdoc=35 -CVE-2006-2746 - http://www.nukedx.com/?getxpl=35 -CVE-2006-2746 - http://www.nukedx.com/?viewdoc=35 -CVE-2006-2755 - http://www.nukedx.com/?viewdoc=40 -CVE-2006-2763 - https://www.exploit-db.com/exploits/5803 -CVE-2006-2766 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-043 -CVE-2006-2767 - https://www.exploit-db.com/exploits/1854 -CVE-2006-2768 - https://www.exploit-db.com/exploits/1855 -CVE-2006-2769 - http://marc.info/?l=snort-devel&m=114909074311462&w=2 -CVE-2006-2770 - http://securityreason.com/securityalert/1015 -CVE-2006-2775 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2776 - http://www.mozilla.org/security/announce/2006/mfsa2006-37.html -CVE-2006-2776 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2776 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9849 -CVE-2006-2777 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2778 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2778 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703 -CVE-2006-2779 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2779 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9762 -CVE-2006-2780 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2782 - http://www.mozilla.org/security/announce/2006/mfsa2006-41.html -CVE-2006-2782 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2783 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2784 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2784 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768 -CVE-2006-2785 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2786 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2786 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9966 -CVE-2006-2787 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-2787 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9491 -CVE-2006-2788 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-2793 - http://securityreason.com/securityalert/745 -CVE-2006-2793 - http://www.nukedx.com/?viewdoc=39 -CVE-2006-2794 - http://www.nukedx.com/?viewdoc=39 -CVE-2006-2797 - https://www.exploit-db.com/exploits/1818 -CVE-2006-2798 - https://www.exploit-db.com/exploits/1818 -CVE-2006-2802 - https://www.exploit-db.com/exploits/1852 -CVE-2006-2803 - http://securityreason.com/securityalert/1024 -CVE-2006-2810 - http://securityreason.com/securityalert/571 -CVE-2006-2812 - http://securityreason.com/securityalert/1032 -CVE-2006-2818 - https://www.exploit-db.com/exploits/1865 -CVE-2006-2819 - https://www.exploit-db.com/exploits/1863 -CVE-2006-2822 - http://securityreason.com/securityalert/1026 -CVE-2006-2834 - https://www.exploit-db.com/exploits/1851 -CVE-2006-2841 - https://www.exploit-db.com/exploits/1858 -CVE-2006-2843 - https://www.exploit-db.com/exploits/1861 -CVE-2006-2844 - https://www.exploit-db.com/exploits/1861 -CVE-2006-2845 - https://www.exploit-db.com/exploits/1861 -CVE-2006-2847 - https://www.exploit-db.com/exploits/1859 -CVE-2006-2848 - https://www.exploit-db.com/exploits/1859 -CVE-2006-2849 - https://www.exploit-db.com/exploits/1860 -CVE-2006-2860 - https://www.exploit-db.com/exploits/1871 -CVE-2006-2861 - http://pridels0.blogspot.com/2006/06/particle-wiki-sql-inj.html -CVE-2006-2863 - https://www.exploit-db.com/exploits/1872 -CVE-2006-2864 - https://www.exploit-db.com/exploits/1870 -CVE-2006-2866 - http://securityreason.com/securityalert/1053 -CVE-2006-2867 - http://securityreason.com/securityalert/1052 -CVE-2006-2868 - https://www.exploit-db.com/exploits/1877 -CVE-2006-2871 - http://securityreason.com/securityalert/1051 -CVE-2006-2872 - http://securityreason.com/securityalert/1050 -CVE-2006-2875 - http://aluigi.altervista.org/adv/q3cbof-adv.txt -CVE-2006-2877 - http://securityreason.com/securityalert/1058 -CVE-2006-2879 - http://securityreason.com/securityalert/1057 -CVE-2006-2881 - https://www.exploit-db.com/exploits/1881 -CVE-2006-2882 - http://securityreason.com/securityalert/1056 -CVE-2006-2883 - http://securityreason.com/securityalert/1055 -CVE-2006-2884 - http://securityreason.com/securityalert/1055 -CVE-2006-2887 - http://securityreason.com/securityalert/1054 -CVE-2006-2888 - https://www.exploit-db.com/exploits/1883 -CVE-2006-2889 - http://securityreason.com/securityalert/1061 -CVE-2006-2890 - http://securityreason.com/securityalert/1061 -CVE-2006-2891 - http://securityreason.com/securityalert/1061 -CVE-2006-2892 - http://securityreason.com/securityalert/1060 -CVE-2006-2893 - http://securityreason.com/securityalert/1060 -CVE-2006-2894 - http://securityreason.com/securityalert/1059 -CVE-2006-2895 - http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES -CVE-2006-2896 - https://www.exploit-db.com/exploits/1875 -CVE-2006-2899 - http://securityreason.com/securityalert/1063 -CVE-2006-2900 - http://securityreason.com/securityalert/1059 -CVE-2006-2928 - http://securityreason.com/securityalert/1068 -CVE-2006-2929 - https://www.exploit-db.com/exploits/1886 -CVE-2006-2936 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html -CVE-2006-2937 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html -CVE-2006-2937 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2006-2937 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2006-2937 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2006-2937 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2006-2937 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2006-2940 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html -CVE-2006-2940 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2006-2940 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2006-2940 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2006-2940 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2006-2940 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2006-2941 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9912 -CVE-2006-2962 - https://www.exploit-db.com/exploits/1895 -CVE-2006-2965 - http://securityreason.com/securityalert/1071 -CVE-2006-2966 - http://securityreason.com/securityalert/1070 -CVE-2006-2967 - http://securityreason.com/securityalert/1077 -CVE-2006-2968 - http://securityreason.com/securityalert/1092 -CVE-2006-2969 - http://securityreason.com/securityalert/1091 -CVE-2006-2970 - http://securityreason.com/securityalert/1091 -CVE-2006-2982 - https://www.exploit-db.com/exploits/1891 -CVE-2006-2991 - http://securityreason.com/securityalert/1082 -CVE-2006-2994 - http://securityreason.com/securityalert/1081 -CVE-2006-2995 - https://www.exploit-db.com/exploits/1898 -CVE-2006-2996 - https://www.exploit-db.com/exploits/1896 -CVE-2006-2998 - https://www.exploit-db.com/exploits/1899 -CVE-2006-2999 - http://securityreason.com/securityalert/1080 -CVE-2006-3000 - http://securityreason.com/securityalert/1080 -CVE-2006-3001 - http://securityreason.com/securityalert/1080 -CVE-2006-3004 - http://securityreason.com/securityalert/1097 -CVE-2006-3012 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-004.txt -CVE-2006-3013 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-005.txt -CVE-2006-3019 - http://securityreason.com/securityalert/1106 -CVE-2006-3027 - https://www.exploit-db.com/exploits/2986 -CVE-2006-3028 - https://www.exploit-db.com/exploits/1908 -CVE-2006-3042 - http://securityreason.com/securityalert/1098 -CVE-2006-3059 - http://isc.sans.org/diary.php?storyid=1420 -CVE-2006-3059 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -CVE-2006-3060 - http://securityreason.com/securityalert/1108 -CVE-2006-3061 - http://securityreason.com/securityalert/1107 -CVE-2006-3065 - https://www.exploit-db.com/exploits/1904 -CVE-2006-3081 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516 -CVE-2006-3083 - http://www.ubuntu.com/usn/usn-334-1 -CVE-2006-3083 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515 -CVE-2006-3084 - http://www.ubuntu.com/usn/usn-334-1 -CVE-2006-3086 - http://marc.info/?l=full-disclosure&m=115067840426070&w=2 -CVE-2006-3086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-050 -CVE-2006-3086 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A999 -CVE-2006-3094 - http://marc.info/?l=bugtraq&m=115048898305454&w=2 -CVE-2006-3102 - https://www.exploit-db.com/exploits/1918 -CVE-2006-3109 - http://securityreason.com/securityalert/1114 -CVE-2006-3110 - http://marc.info/?l=bugtraq&m=115024576618386&w=2 -CVE-2006-3111 - http://marc.info/?l=bugtraq&m=115024576618386&w=2 -CVE-2006-3112 - http://marc.info/?l=bugtraq&m=115024576618386&w=2 -CVE-2006-3113 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3113 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3114 - http://securityreason.com/securityalert/1340 -CVE-2006-3117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704 -CVE-2006-3134 - http://europe.nokia.com/nokia/0,,93034,00.html -CVE-2006-3142 - https://www.exploit-db.com/exploits/4140 -CVE-2006-3144 - https://www.exploit-db.com/exploits/1929 -CVE-2006-3144 - https://www.exploit-db.com/exploits/9699 -CVE-2006-3162 - https://www.exploit-db.com/exploits/1936 -CVE-2006-3172 - http://marc.info/?l=bugtraq&m=115016951316696&w=2 -CVE-2006-3177 - https://www.exploit-db.com/exploits/1912 -CVE-2006-3181 - http://securityreason.com/securityalert/1128 -CVE-2006-3182 - http://securityreason.com/securityalert/1128 -CVE-2006-3183 - http://securityreason.com/securityalert/1128 -CVE-2006-3184 - https://www.exploit-db.com/exploits/1931 -CVE-2006-3185 - http://securityreason.com/securityalert/1127 -CVE-2006-3189 - http://marc.info/?l=bugtraq&m=115041611713385&w=2 -CVE-2006-3192 - https://www.exploit-db.com/exploits/1923 -CVE-2006-3193 - https://www.exploit-db.com/exploits/1933 -CVE-2006-3194 - http://securityreason.com/securityalert/1135 -CVE-2006-3195 - http://securityreason.com/securityalert/1135 -CVE-2006-3196 - http://securityreason.com/securityalert/1135 -CVE-2006-3197 - http://securityreason.com/securityalert/596 -CVE-2006-3200 - http://securityreason.com/securityalert/1132 -CVE-2006-3221 - https://www.exploit-db.com/exploits/1938 -CVE-2006-3221 - https://www.exploit-db.com/exploits/1939 -CVE-2006-3222 - http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-15.html -CVE-2006-3226 - http://securityreason.com/securityalert/1157 -CVE-2006-3228 - https://www.exploit-db.com/exploits/1935 -CVE-2006-3252 - http://securityreason.com/securityalert/1152 -CVE-2006-3253 - http://securityreason.com/securityalert/1155 -CVE-2006-3254 - http://securityreason.com/securityalert/1154 -CVE-2006-3255 - http://securityreason.com/securityalert/1153 -CVE-2006-3259 - http://securityreason.com/securityalert/1151 -CVE-2006-3260 - http://securityreason.com/securityalert/1150 -CVE-2006-3261 - http://securityreason.com/securityalert/1159 -CVE-2006-3262 - http://securityreason.com/securityalert/1158 -CVE-2006-3264 - http://securityreason.com/securityalert/1156 -CVE-2006-3265 - http://securityreason.com/securityalert/538 -CVE-2006-3266 - https://www.exploit-db.com/exploits/1951 -CVE-2006-3269 - https://www.exploit-db.com/exploits/1952 -CVE-2006-3275 - http://marc.info/?l=full-disclosure&m=115102378824221&w=2 -CVE-2006-3279 - http://www.osvdb.org/26831 -CVE-2006-3280 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3281 - http://www.kb.cert.org/vuls/id/655100 -CVE-2006-3281 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-045 -CVE-2006-3294 - https://www.exploit-db.com/exploits/1955 -CVE-2006-3298 - http://www.security.nnov.ru/Gnews281.html -CVE-2006-3299 - http://securityreason.com/securityalert/1170 -CVE-2006-3300 - https://www.exploit-db.com/exploits/1948 -CVE-2006-3304 - https://www.exploit-db.com/exploits/1953 -CVE-2006-3309 - https://www.exploit-db.com/exploits/1957 -CVE-2006-3313 - http://securityreason.com/securityalert/1168 -CVE-2006-3315 - http://securityreason.com/securityalert/1176 -CVE-2006-3317 - http://securityreason.com/securityalert/1173 -CVE-2006-3317 - https://www.exploit-db.com/exploits/3528 -CVE-2006-3318 - http://securityreason.com/securityalert/1173 -CVE-2006-3319 - http://securityreason.com/securityalert/1175 -CVE-2006-3320 - http://securityreason.com/securityalert/1174 -CVE-2006-3322 - http://securityreason.com/securityalert/1173 -CVE-2006-3323 - http://securityreason.com/securityalert/1172 -CVE-2006-3324 - http://aluigi.altervista.org/adv/q3cfilevar-adv.txt -CVE-2006-3324 - http://securityreason.com/securityalert/1171 -CVE-2006-3325 - http://aluigi.altervista.org/adv/q3cfilevar-adv.txt -CVE-2006-3325 - http://securityreason.com/securityalert/1171 -CVE-2006-3327 - http://marc.info/?l=bugtraq&m=115109990800428&w=2 -CVE-2006-3329 - http://securityreason.com/securityalert/1179 -CVE-2006-3330 - http://securityreason.com/securityalert/1179 -CVE-2006-3331 - http://securityreason.com/securityalert/1177 -CVE-2006-3335 - http://securityreason.com/securityalert/1178 -CVE-2006-3335 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5676 -CVE-2006-3340 - https://www.exploit-db.com/exploits/1956 -CVE-2006-3341 - https://www.exploit-db.com/exploits/1961 -CVE-2006-3347 - https://www.exploit-db.com/exploits/1968 -CVE-2006-3352 - http://isc.sans.org/diary.php?storyid=1448 -CVE-2006-3353 - https://www.exploit-db.com/exploits/1972 -CVE-2006-3362 - https://www.exploit-db.com/exploits/1964 -CVE-2006-3362 - https://www.exploit-db.com/exploits/2035 -CVE-2006-3362 - https://www.exploit-db.com/exploits/6344 -CVE-2006-3375 - https://www.exploit-db.com/exploits/1971 -CVE-2006-3376 - http://securityreason.com/securityalert/1190 -CVE-2006-3382 - http://securityreason.com/securityalert/1189 -CVE-2006-3387 - https://www.exploit-db.com/exploits/1812 -CVE-2006-3394 - https://www.exploit-db.com/exploits/1975 -CVE-2006-3396 - https://www.exploit-db.com/exploits/1981 -CVE-2006-3399 - http://securityreason.com/securityalert/1196 -CVE-2006-3400 - https://www.exploit-db.com/exploits/1976 -CVE-2006-3401 - https://www.exploit-db.com/exploits/1977 -CVE-2006-3422 - https://www.exploit-db.com/exploits/1982 -CVE-2006-3425 - http://securityreason.com/securityalert/1200 -CVE-2006-3426 - http://securityreason.com/securityalert/1200 -CVE-2006-3430 - http://securityreason.com/securityalert/1200 -CVE-2006-3431 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 -CVE-2006-3434 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 -CVE-2006-3435 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 -CVE-2006-3436 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-056 -CVE-2006-3438 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-050 -CVE-2006-3440 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041 -CVE-2006-3441 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041 -CVE-2006-3442 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-052 -CVE-2006-3443 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-051 -CVE-2006-3444 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-049 -CVE-2006-3445 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-068 -CVE-2006-3448 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-005 -CVE-2006-3449 - http://securityreason.com/securityalert/1342 -CVE-2006-3449 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048 -CVE-2006-3450 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3451 - http://securityreason.com/securityalert/1343 -CVE-2006-3451 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3459 - http://secunia.com/blog/76 -CVE-2006-3461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9910 -CVE-2006-3465 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9067 -CVE-2006-3467 - http://www.vmware.com/download/esx/esx-254-200610-patch.html -CVE-2006-3468 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9809 -CVE-2006-3469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827 -CVE-2006-3478 - https://www.exploit-db.com/exploits/1983 -CVE-2006-3479 - http://securityreason.com/securityalert/1205 -CVE-2006-3491 - http://aluigi.altervista.org/adv/kailleraex-adv.txt -CVE-2006-3491 - http://marc.info/?l=full-disclosure&m=115220500707900&w=2 -CVE-2006-3493 - http://marc.info/?l=full-disclosure&m=115231380526820&w=2 -CVE-2006-3493 - http://marc.info/?l=full-disclosure&m=115261598510657&w=2 -CVE-2006-3494 - http://securityreason.com/securityalert/1209 -CVE-2006-3514 - http://securityreason.com/securityalert/1202 -CVE-2006-3515 - http://securityreason.com/securityalert/1206 -CVE-2006-3516 - http://securityreason.com/securityalert/1208 -CVE-2006-3517 - http://securityreason.com/securityalert/1207 -CVE-2006-3518 - http://securityreason.com/securityalert/1203 -CVE-2006-3519 - http://securityreason.com/securityalert/1204 -CVE-2006-3520 - https://www.exploit-db.com/exploits/1996 -CVE-2006-3522 - http://marc.info/?l=full-disclosure&m=115249298204354&w=2 -CVE-2006-3522 - http://marc.info/?l=full-disclosure&m=115253898206225&w=2 -CVE-2006-3528 - http://marc.info/?l=bugtraq&m=115876919804966&w=2 -CVE-2006-3528 - https://www.exploit-db.com/exploits/1994 -CVE-2006-3530 - http://securityreason.com/securityalert/1215 -CVE-2006-3530 - https://www.exploit-db.com/exploits/2024 -CVE-2006-3531 - http://securityreason.com/securityalert/1214 -CVE-2006-3532 - http://securityreason.com/securityalert/1214 -CVE-2006-3533 - http://securityreason.com/securityalert/1214 -CVE-2006-3542 - http://securityreason.com/securityalert/1223 -CVE-2006-3546 - http://securityreason.com/securityalert/1232 -CVE-2006-3554 - http://securityreason.com/securityalert/1234 -CVE-2006-3558 - http://securityreason.com/securityalert/1226 -CVE-2006-3559 - http://securityreason.com/securityalert/1226 -CVE-2006-3571 - https://www.exploit-db.com/exploits/1993 -CVE-2006-3572 - https://www.exploit-db.com/exploits/1993 -CVE-2006-3580 - https://www.exploit-db.com/exploits/1931 -CVE-2006-3581 - http://aluigi.altervista.org/adv/adplugbof-adv.txt -CVE-2006-3582 - http://aluigi.altervista.org/adv/adplugbof-adv.txt -CVE-2006-3583 - http://securityreason.com/securityalert/1339 -CVE-2006-3584 - http://securityreason.com/securityalert/1339 -CVE-2006-3585 - http://securityreason.com/securityalert/1339 -CVE-2006-3586 - http://securityreason.com/securityalert/1339 -CVE-2006-3589 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html -CVE-2006-3590 - http://isc.sans.org/diary.php?storyid=1484 -CVE-2006-3590 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048 -CVE-2006-3598 - https://www.exploit-db.com/exploits/5154 -CVE-2006-3619 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9617 -CVE-2006-3626 - http://www.securityfocus.com/bid/18992 -CVE-2006-3628 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9175 -CVE-2006-3632 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9468 -CVE-2006-3637 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3638 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3639 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3640 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3643 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-044 -CVE-2006-3647 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 -CVE-2006-3648 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-051 -CVE-2006-3650 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 -CVE-2006-3651 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 -CVE-2006-3652 - http://www.securityfocus.com/bid/18994 -CVE-2006-3655 - http://www.securityfocus.com/bid/18993 -CVE-2006-3656 - http://packetstormsecurity.org/0607-exploits/mspp-poc3.txt -CVE-2006-3656 - http://www.securityfocus.com/bid/18993 -CVE-2006-3660 - http://www.securityfocus.com/bid/18993 -CVE-2006-3668 - http://aluigi.altervista.org/adv/dumbit-adv.txt -CVE-2006-3668 - http://securityreason.com/securityalert/1240 -CVE-2006-3670 - https://www.exploit-db.com/exploits/2014 -CVE-2006-3675 - http://securityreason.com/securityalert/1308 -CVE-2006-3676 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-006.txt -CVE-2006-3677 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3677 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3683 - http://packetstormsecurity.org/0606-exploits/flipper.txt -CVE-2006-3685 - https://www.exploit-db.com/exploits/2009 -CVE-2006-3689 - http://www.securityfocus.com/bid/18990 -CVE-2006-3690 - http://www.securityfocus.com/bid/18998 -CVE-2006-3690 - https://www.exploit-db.com/exploits/2030 -CVE-2006-3693 - http://securityreason.com/securityalert/1242 -CVE-2006-3694 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983 -CVE-2006-3702 - http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html -CVE-2006-3725 - http://www.securityfocus.com/bid/18995 -CVE-2006-3727 - https://www.exploit-db.com/exploits/2032 -CVE-2006-3730 - http://isc.sans.org/diary.php?storyid=1742 -CVE-2006-3730 - https://www.exploit-db.com/exploits/2440 -CVE-2006-3735 - https://www.exploit-db.com/exploits/2019 -CVE-2006-3736 - https://www.exploit-db.com/exploits/2020 -CVE-2006-3738 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html -CVE-2006-3738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370 -CVE-2006-3739 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-3740 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-3740 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454 -CVE-2006-3743 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9895 -CVE-2006-3747 - http://securityreason.com/securityalert/1312 -CVE-2006-3748 - https://www.exploit-db.com/exploits/2023 -CVE-2006-3749 - http://securityreason.com/securityalert/1249 -CVE-2006-3749 - http://www.securityfocus.com/bid/18991 -CVE-2006-3749 - https://www.exploit-db.com/exploits/2028 -CVE-2006-3750 - http://securityreason.com/securityalert/1249 -CVE-2006-3750 - https://www.exploit-db.com/exploits/2026 -CVE-2006-3751 - http://securityreason.com/securityalert/1249 -CVE-2006-3751 - https://www.exploit-db.com/exploits/2027 -CVE-2006-3754 - https://www.exploit-db.com/exploits/2018 -CVE-2006-3765 - http://securityreason.com/securityalert/1258 -CVE-2006-3768 - http://securityreason.com/securityalert/1300 -CVE-2006-3771 - http://securityreason.com/securityalert/1265 -CVE-2006-3771 - https://www.exploit-db.com/exploits/2046 -CVE-2006-3772 - https://www.exploit-db.com/exploits/2036 -CVE-2006-3773 - https://www.exploit-db.com/exploits/2021 -CVE-2006-3787 - http://www.securityfocus.com/bid/18996 -CVE-2006-3788 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt -CVE-2006-3788 - http://securityreason.com/securityalert/1259 -CVE-2006-3789 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt -CVE-2006-3789 - http://securityreason.com/securityalert/1259 -CVE-2006-3790 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt -CVE-2006-3790 - http://securityreason.com/securityalert/1259 -CVE-2006-3791 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt -CVE-2006-3791 - http://securityreason.com/securityalert/1259 -CVE-2006-3792 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt -CVE-2006-3792 - http://securityreason.com/securityalert/1259 -CVE-2006-3801 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3801 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3802 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3802 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3802 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9611 -CVE-2006-3803 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3803 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3804 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3805 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3805 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3805 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-3806 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3806 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3806 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-3807 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3807 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3807 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-3808 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3808 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3808 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-3809 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3809 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3809 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-3809 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9753 -CVE-2006-3810 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3810 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3811 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3811 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3811 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-3811 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934 -CVE-2006-3812 - http://www.redhat.com/support/errata/RHSA-2006-0608.html -CVE-2006-3812 - http://www.securityfocus.com/archive/1/446658/100/200/threaded -CVE-2006-3813 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9456 -CVE-2006-3814 - http://aluigi.altervista.org/adv/cheesebof-adv.txt -CVE-2006-3814 - http://securityreason.com/securityalert/1291 -CVE-2006-3822 - http://www.packetstormsecurity.org/0607-exploits/geoauctionsSQL.txt -CVE-2006-3823 - http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html -CVE-2006-3823 - http://www.packetstormsecurity.org/0607-exploits/geoauctionsSQL.txt -CVE-2006-3835 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2006-3836 - http://securityreason.com/securityalert/1280 -CVE-2006-3842 - http://securityreason.com/securityalert/1273 -CVE-2006-3847 - https://www.exploit-db.com/exploits/2062 -CVE-2006-3851 - https://www.exploit-db.com/exploits/2068 -CVE-2006-3852 - http://securityreason.com/securityalert/1285 -CVE-2006-3854 - http://securityreason.com/securityalert/1409 -CVE-2006-3859 - http://securityreason.com/securityalert/1408 -CVE-2006-3860 - http://securityreason.com/securityalert/1407 -CVE-2006-3864 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 -CVE-2006-3867 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 -CVE-2006-3868 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 -CVE-2006-3869 - http://securityreason.com/securityalert/1441 -CVE-2006-3873 - http://securityreason.com/securityalert/1555 -CVE-2006-3873 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -CVE-2006-3875 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 -CVE-2006-3876 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 -CVE-2006-3877 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 -CVE-2006-3877 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 -CVE-2006-3879 - http://aluigi.altervista.org/adv/lmmgt2ho-adv.txt -CVE-2006-3879 - http://aluigi.org/poc/lmmgt2ho.zip -CVE-2006-3879 - http://securityreason.com/securityalert/1288 -CVE-2006-3880 - http://securityreason.com/securityalert/1282 -CVE-2006-3883 - http://securityreason.com/securityalert/1287 -CVE-2006-3884 - http://securityreason.com/securityalert/1287 -CVE-2006-3885 - http://www.sec-tec.co.uk/vulnerability/r55w_directory_traversal.html -CVE-2006-3890 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -CVE-2006-3890 - https://www.exploit-db.com/exploits/2785 -CVE-2006-3903 - http://marc.info/?l=bugtraq&m=114791192612460&w=2 -CVE-2006-3904 - https://www.exploit-db.com/exploits/2071 -CVE-2006-3905 - http://marc.info/?l=bugtraq&m=114791192612460&w=2 -CVE-2006-3908 - http://aluigi.altervista.org/adv/gnefs-adv.txt -CVE-2006-3911 - https://www.exploit-db.com/exploits/2060 -CVE-2006-3912 - https://www.exploit-db.com/exploits/1984 -CVE-2006-3912 - https://www.exploit-db.com/exploits/1985 -CVE-2006-3912 - https://www.exploit-db.com/exploits/1992 -CVE-2006-3913 - http://aluigi.altervista.org/adv/freecivx-adv.txt -CVE-2006-3917 - https://www.exploit-db.com/exploits/2058 -CVE-2006-3922 - http://securityreason.com/securityalert/1310 -CVE-2006-3922 - https://www.exploit-db.com/exploits/2081 -CVE-2006-3928 - https://www.exploit-db.com/exploits/2077 -CVE-2006-3929 - http://securityreason.com/securityalert/1301 -CVE-2006-3930 - http://securityreason.com/securityalert/1309 -CVE-2006-3930 - https://www.exploit-db.com/exploits/2078 -CVE-2006-3931 - http://securityreason.com/securityalert/1303 -CVE-2006-3933 - http://securityreason.com/securityalert/1302 -CVE-2006-3934 - http://securityreason.com/securityalert/1302 -CVE-2006-3935 - http://securityreason.com/securityalert/1302 -CVE-2006-3936 - http://securityreason.com/securityalert/1302 -CVE-2006-3937 - http://securityreason.com/securityalert/1304 -CVE-2006-3938 - http://securityreason.com/securityalert/1307 -CVE-2006-3939 - http://securityreason.com/securityalert/1305 -CVE-2006-3940 - http://securityreason.com/securityalert/1306 -CVE-2006-3942 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063 -CVE-2006-3947 - http://securityreason.com/securityalert/1313 -CVE-2006-3947 - https://www.exploit-db.com/exploits/2086 -CVE-2006-3948 - http://securityreason.com/securityalert/1311 -CVE-2006-3949 - http://securityreason.com/securityalert/1318 -CVE-2006-3951 - https://www.exploit-db.com/exploits/2064 -CVE-2006-3953 - http://securityreason.com/securityalert/1319 -CVE-2006-3954 - http://securityreason.com/securityalert/1319 -CVE-2006-3955 - http://securityreason.com/securityalert/1315 -CVE-2006-3956 - http://securityreason.com/securityalert/1317 -CVE-2006-3962 - https://www.exploit-db.com/exploits/2090 -CVE-2006-3963 - http://marc.info/?l=full-disclosure&m=115423462216111&w=2 -CVE-2006-3964 - http://marc.info/?l=full-disclosure&m=115423462216111&w=2 -CVE-2006-3965 - http://marc.info/?l=full-disclosure&m=115423462216111&w=2 -CVE-2006-3966 - http://securityreason.com/securityalert/1316 -CVE-2006-3966 - https://www.exploit-db.com/exploits/2096 -CVE-2006-3967 - http://securityreason.com/securityalert/1314 -CVE-2006-3969 - https://www.exploit-db.com/exploits/2085 -CVE-2006-3970 - https://www.exploit-db.com/exploits/2092 -CVE-2006-3980 - http://securityreason.com/securityalert/1322 -CVE-2006-3980 - https://www.exploit-db.com/exploits/2084 -CVE-2006-3982 - http://securityreason.com/securityalert/1321 -CVE-2006-3983 - https://www.exploit-db.com/exploits/2095 -CVE-2006-3984 - http://securityreason.com/securityalert/1320 -CVE-2006-3984 - https://www.exploit-db.com/exploits/2100 -CVE-2006-3985 - http://securityreason.com/securityalert/1334 -CVE-2006-3985 - http://vuln.sg/powarc962-en.html -CVE-2006-3986 - http://securityreason.com/securityalert/1328 -CVE-2006-3986 - https://www.exploit-db.com/exploits/2097 -CVE-2006-3987 - http://securityreason.com/securityalert/1327 -CVE-2006-3987 - https://www.exploit-db.com/exploits/2104 -CVE-2006-3988 - http://securityreason.com/securityalert/1326 -CVE-2006-3988 - https://www.exploit-db.com/exploits/2101 -CVE-2006-3989 - http://securityreason.com/securityalert/1325 -CVE-2006-3989 - https://www.exploit-db.com/exploits/2103 -CVE-2006-3990 - http://securityreason.com/securityalert/1324 -CVE-2006-3991 - https://www.exploit-db.com/exploits/2102 -CVE-2006-3993 - http://securityreason.com/securityalert/1323 -CVE-2006-3993 - https://www.exploit-db.com/exploits/2098 -CVE-2006-3994 - https://www.exploit-db.com/exploits/2105 -CVE-2006-3995 - https://www.exploit-db.com/exploits/2089 -CVE-2006-3995 - https://www.exploit-db.com/exploits/3553 -CVE-2006-3996 - http://securityreason.com/securityalert/1330 -CVE-2006-3996 - https://www.exploit-db.com/exploits/2088 -CVE-2006-3997 - http://securityreason.com/securityalert/1329 -CVE-2006-3998 - https://www.exploit-db.com/exploits/2099 -CVE-2006-3999 - http://securityreason.com/securityalert/1338 -CVE-2006-4004 - https://www.exploit-db.com/exploits/2087 -CVE-2006-4005 - http://aluigi.altervista.org/adv/bcloneboom-adv.txt -CVE-2006-4005 - http://aluigi.org/poc/bcloneboom.zip -CVE-2006-4006 - http://aluigi.altervista.org/adv/bcloneboom-adv.txt -CVE-2006-4006 - http://aluigi.org/poc/bcloneboom.zip -CVE-2006-4007 - http://securityreason.com/securityalert/1333 -CVE-2006-4008 - http://securityreason.com/securityalert/1332 -CVE-2006-4009 - http://securityreason.com/securityalert/1331 -CVE-2006-4010 - http://securityreason.com/securityalert/1331 -CVE-2006-4011 - https://www.exploit-db.com/exploits/2115 -CVE-2006-4012 - http://securityreason.com/securityalert/1336 -CVE-2006-4012 - https://www.exploit-db.com/exploits/2113 -CVE-2006-4015 - http://securityreason.com/securityalert/1335 -CVE-2006-4016 - http://securityreason.com/securityalert/1337 -CVE-2006-4020 - http://securityreason.com/securityalert/1341 -CVE-2006-4021 - http://securityreason.com/securityalert/1396 -CVE-2006-4024 - http://aluigi.altervista.org/adv/festahc-adv.txt -CVE-2006-4025 - http://securityreason.com/securityalert/1344 -CVE-2006-4026 - http://securityreason.com/securityalert/1346 -CVE-2006-4026 - https://www.exploit-db.com/exploits/2128 -CVE-2006-4029 - http://securityreason.com/securityalert/1345 -CVE-2006-4029 - http://vuln.sg/agephone1381-en.html -CVE-2006-4032 - http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html#Endler -CVE-2006-4033 - http://securityreason.com/securityalert/1351 -CVE-2006-4033 - http://vuln.sg/lhaplus152-en.html -CVE-2006-4035 - http://securityreason.com/securityalert/1350 -CVE-2006-4036 - http://securityreason.com/securityalert/1348 -CVE-2006-4040 - https://www.exploit-db.com/exploits/2093 -CVE-2006-4042 - http://securityreason.com/securityalert/1347 -CVE-2006-4042 - https://www.exploit-db.com/exploits/2118 -CVE-2006-4043 - http://securityreason.com/securityalert/1347 -CVE-2006-4043 - https://www.exploit-db.com/exploits/2118 -CVE-2006-4045 - https://www.exploit-db.com/exploits/2121 -CVE-2006-4046 - http://aluigi.altervista.org/adv/ocpbof-adv.txt -CVE-2006-4046 - http://securityreason.com/securityalert/1349 -CVE-2006-4046 - https://www.exploit-db.com/exploits/2094 -CVE-2006-4050 - http://securityreason.com/securityalert/1352 -CVE-2006-4051 - http://securityreason.com/securityalert/1369 -CVE-2006-4051 - https://www.exploit-db.com/exploits/2120 -CVE-2006-4052 - https://www.exploit-db.com/exploits/2119 -CVE-2006-4053 - http://securityreason.com/securityalert/1355 -CVE-2006-4055 - http://securityreason.com/securityalert/1354 -CVE-2006-4055 - https://www.exploit-db.com/exploits/2116 -CVE-2006-4057 - http://securityreason.com/securityalert/1368 -CVE-2006-4058 - http://securityreason.com/securityalert/1358 -CVE-2006-4059 - http://securityreason.com/securityalert/1366 -CVE-2006-4059 - https://www.exploit-db.com/exploits/2135 -CVE-2006-4060 - http://securityreason.com/securityalert/1364 -CVE-2006-4060 - https://www.exploit-db.com/exploits/2141 -CVE-2006-4061 - http://www.osvdb.org/29133 -CVE-2006-4062 - https://www.exploit-db.com/exploits/2131 -CVE-2006-4063 - https://www.exploit-db.com/exploits/2129 -CVE-2006-4064 - https://www.exploit-db.com/exploits/2138 -CVE-2006-4065 - https://www.exploit-db.com/exploits/2130 -CVE-2006-4068 - http://securityreason.com/securityalert/1362 -CVE-2006-4070 - http://securityreason.com/securityalert/1361 -CVE-2006-4071 - http://determina.blogspot.com/2007/01/whats-wrong-with-wmf.html -CVE-2006-4071 - http://securityreason.com/securityalert/1353 -CVE-2006-4071 - https://www.exploit-db.com/exploits/3111 -CVE-2006-4072 - https://www.exploit-db.com/exploits/2150 -CVE-2006-4073 - https://www.exploit-db.com/exploits/2134 -CVE-2006-4074 - https://www.exploit-db.com/exploits/2125 -CVE-2006-4075 - http://securityreason.com/securityalert/1367 -CVE-2006-4075 - https://www.exploit-db.com/exploits/2146 -CVE-2006-4078 - http://securityreason.com/securityalert/1381 -CVE-2006-4079 - http://securityreason.com/securityalert/1381 -CVE-2006-4080 - http://securityreason.com/securityalert/1381 -CVE-2006-4081 - http://securityreason.com/securityalert/1363 -CVE-2006-4082 - http://securityreason.com/securityalert/1363 -CVE-2006-4088 - http://securityreason.com/securityalert/1357 -CVE-2006-4089 - http://aluigi.altervista.org/adv/alsapbof-adv.txt -CVE-2006-4089 - http://securityreason.com/securityalert/1356 -CVE-2006-4090 - http://securityreason.com/securityalert/1359 -CVE-2006-4091 - http://securityreason.com/securityalert/1360 -CVE-2006-4092 - http://securityreason.com/securityalert/1365 -CVE-2006-4096 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623 -CVE-2006-4102 - https://www.exploit-db.com/exploits/2123 -CVE-2006-4103 - http://securityreason.com/securityalert/1373 -CVE-2006-4103 - https://www.exploit-db.com/exploits/2148 -CVE-2006-4104 - http://securityreason.com/securityalert/1374 -CVE-2006-4105 - http://securityreason.com/securityalert/1371 -CVE-2006-4106 - http://securityreason.com/securityalert/1372 -CVE-2006-4110 - http://securityreason.com/securityalert/1370 -CVE-2006-4113 - https://www.exploit-db.com/exploits/2149 -CVE-2006-4114 - https://www.exploit-db.com/exploits/2159 -CVE-2006-4115 - http://securityreason.com/securityalert/1375 -CVE-2006-4116 - http://securityreason.com/securityalert/1378 -CVE-2006-4116 - http://vuln.sg/lhaz131-en.html -CVE-2006-4118 - http://securityreason.com/securityalert/1376 -CVE-2006-4121 - https://www.exploit-db.com/exploits/2155 -CVE-2006-4123 - https://www.exploit-db.com/exploits/2153 -CVE-2006-4124 - https://www.exploit-db.com/exploits/2144 -CVE-2006-4125 - http://securityreason.com/securityalert/1377 -CVE-2006-4126 - http://securityreason.com/securityalert/1377 -CVE-2006-4127 - http://securityreason.com/securityalert/1377 -CVE-2006-4128 - http://securityreason.com/securityalert/1380 -CVE-2006-4129 - https://www.exploit-db.com/exploits/2177 -CVE-2006-4130 - http://securityreason.com/securityalert/1379 -CVE-2006-4131 - http://securityreason.com/securityalert/1387 -CVE-2006-4131 - https://www.exploit-db.com/exploits/2156 -CVE-2006-4132 - http://securityreason.com/securityalert/1387 -CVE-2006-4132 - https://www.exploit-db.com/exploits/2156 -CVE-2006-4133 - http://securityreason.com/securityalert/1386 -CVE-2006-4134 - http://securityreason.com/securityalert/1390 -CVE-2006-4138 - http://securityreason.com/securityalert/1382 -CVE-2006-4140 - http://securityreason.com/securityalert/1389 -CVE-2006-4141 - http://securityreason.com/securityalert/1383 -CVE-2006-4142 - http://securityreason.com/securityalert/1384 -CVE-2006-4142 - https://www.exploit-db.com/exploits/2170 -CVE-2006-4143 - http://securityreason.com/securityalert/1388 -CVE-2006-4144 - http://securityreason.com/securityalert/1385 -CVE-2006-4156 - http://securityreason.com/securityalert/1391 -CVE-2006-4158 - https://www.exploit-db.com/exploits/2165 -CVE-2006-4159 - https://www.exploit-db.com/exploits/2169 -CVE-2006-4160 - https://www.exploit-db.com/exploits/2173 -CVE-2006-4161 - http://securityreason.com/securityalert/1395 -CVE-2006-4162 - http://securityreason.com/securityalert/1394 -CVE-2006-4164 - https://www.exploit-db.com/exploits/2168 -CVE-2006-4166 - http://securityreason.com/securityalert/1393 -CVE-2006-4166 - https://www.exploit-db.com/exploits/2158 -CVE-2006-4168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349 -CVE-2006-4184 - http://securityreason.com/securityalert/1392 -CVE-2006-4188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5500 -CVE-2006-4190 - http://securityreason.com/securityalert/1398 -CVE-2006-4191 - http://securityreason.com/securityalert/1411 -CVE-2006-4191 - https://www.exploit-db.com/exploits/2178 -CVE-2006-4192 - http://aluigi.altervista.org/adv/mptho-adv.txt -CVE-2006-4192 - http://securityreason.com/securityalert/1397 -CVE-2006-4192 - https://bugzilla.redhat.com/show_bug.cgi?id=497154 -CVE-2006-4193 - http://securityreason.com/securityalert/1402 -CVE-2006-4195 - http://securityreason.com/securityalert/1406 -CVE-2006-4195 - https://www.exploit-db.com/exploits/2184 -CVE-2006-4196 - http://securityreason.com/securityalert/1400 -CVE-2006-4196 - https://www.exploit-db.com/exploits/2175 -CVE-2006-4197 - http://aluigi.altervista.org/adv/brainzbof-adv.txt -CVE-2006-4197 - http://securityreason.com/securityalert/1399 -CVE-2006-4198 - http://securityreason.com/securityalert/1410 -CVE-2006-4198 - https://www.exploit-db.com/exploits/2174 -CVE-2006-4202 - https://www.exploit-db.com/exploits/2186 -CVE-2006-4203 - https://www.exploit-db.com/exploits/2182 -CVE-2006-4204 - https://www.exploit-db.com/exploits/2190 -CVE-2006-4205 - https://www.exploit-db.com/exploits/2183 -CVE-2006-4206 - http://securityreason.com/securityalert/1405 -CVE-2006-4207 - https://www.exploit-db.com/exploits/2188 -CVE-2006-4208 - http://securityreason.com/securityalert/1401 -CVE-2006-4209 - http://securityreason.com/securityalert/1404 -CVE-2006-4209 - https://www.exploit-db.com/exploits/2171 -CVE-2006-4210 - https://www.exploit-db.com/exploits/2181 -CVE-2006-4213 - https://www.exploit-db.com/exploits/2166 -CVE-2006-4219 - http://securityreason.com/securityalert/1403 -CVE-2006-4221 - http://securityreason.com/securityalert/1424 -CVE-2006-4224 - http://securityreason.com/securityalert/1413 -CVE-2006-4228 - http://securityreason.com/securityalert/1412 -CVE-2006-4230 - http://securityreason.com/securityalert/1415 -CVE-2006-4231 - http://securityreason.com/securityalert/1414 -CVE-2006-4234 - https://www.exploit-db.com/exploits/2191 -CVE-2006-4236 - http://securityreason.com/securityalert/1417 -CVE-2006-4236 - https://www.exploit-db.com/exploits/2201 -CVE-2006-4237 - http://www.securityfocus.com/bid/19567 -CVE-2006-4237 - https://www.exploit-db.com/exploits/2199 -CVE-2006-4238 - https://www.exploit-db.com/exploits/2200 -CVE-2006-4239 - https://www.exploit-db.com/exploits/2192 -CVE-2006-4240 - http://securityreason.com/securityalert/1420 -CVE-2006-4241 - http://securityreason.com/securityalert/1419 -CVE-2006-4242 - http://securityreason.com/securityalert/1418 -CVE-2006-4242 - https://www.exploit-db.com/exploits/2203 -CVE-2006-4244 - http://securityreason.com/securityalert/1472 -CVE-2006-4253 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9528 -CVE-2006-4255 - http://securityreason.com/securityalert/1423 -CVE-2006-4256 - http://securityreason.com/securityalert/1422 -CVE-2006-4259 - http://securityreason.com/securityalert/1421 -CVE-2006-4260 - http://securityreason.com/securityalert/1421 -CVE-2006-4262 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 -CVE-2006-4262 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9661 -CVE-2006-4265 - http://securityreason.com/securityalert/1427 -CVE-2006-4266 - http://securityreason.com/securityalert/1428 -CVE-2006-4267 - http://securityreason.com/securityalert/1429 -CVE-2006-4268 - http://securityreason.com/securityalert/1429 -CVE-2006-4270 - http://securityreason.com/securityalert/1430 -CVE-2006-4270 - https://www.exploit-db.com/exploits/2202 -CVE-2006-4272 - http://securityreason.com/securityalert/1426 -CVE-2006-4275 - http://securityreason.com/securityalert/1433 -CVE-2006-4276 - https://www.exploit-db.com/exploits/2220 -CVE-2006-4278 - https://www.exploit-db.com/exploits/2227 -CVE-2006-4279 - http://securityreason.com/securityalert/1434 -CVE-2006-4281 - http://securityreason.com/securityalert/1435 -CVE-2006-4282 - http://securityreason.com/securityalert/1436 -CVE-2006-4282 - https://www.exploit-db.com/exploits/2213 -CVE-2006-4283 - http://securityreason.com/securityalert/1432 -CVE-2006-4284 - http://securityreason.com/securityalert/1445 -CVE-2006-4284 - https://www.exploit-db.com/exploits/2230 -CVE-2006-4285 - https://www.exploit-db.com/exploits/2221 -CVE-2006-4286 - http://securityreason.com/securityalert/1431 -CVE-2006-4287 - https://www.exploit-db.com/exploits/2226 -CVE-2006-4288 - https://www.exploit-db.com/exploits/2207 -CVE-2006-4291 - https://www.exploit-db.com/exploits/2211 -CVE-2006-4293 - http://securityreason.com/securityalert/1442 -CVE-2006-4296 - https://www.exploit-db.com/exploits/2225 -CVE-2006-4300 - http://securityreason.com/securityalert/1440 -CVE-2006-4300 - https://www.exploit-db.com/exploits/2228 -CVE-2006-4300 - https://www.exploit-db.com/exploits/2232 -CVE-2006-4301 - http://securityreason.com/securityalert/1439 -CVE-2006-4301 - https://www.exploit-db.com/exploits/4251 -CVE-2006-4309 - http://securityreason.com/securityalert/1438 -CVE-2006-4310 - http://securityreason.com/securityalert/1444 -CVE-2006-4314 - http://securityreason.com/securityalert/1437 -CVE-2006-4316 - http://www.ssh.com/company/news/2006/english/security/article/776/ -CVE-2006-4317 - http://securityreason.com/securityalert/1443 -CVE-2006-4318 - http://packetstormsecurity.org/0608-exploits/wftpd_exp.c -CVE-2006-4318 - https://www.exploit-db.com/exploits/2233 -CVE-2006-4321 - https://www.exploit-db.com/exploits/2196 -CVE-2006-4323 - http://evuln.com/vulns/135/description.html -CVE-2006-4324 - http://evuln.com/vulns/135/description.html -CVE-2006-4325 - http://evuln.com/vulns/134/description.html -CVE-2006-4327 - http://evuln.com/vulns/136/description.html -CVE-2006-4328 - http://evuln.com/vulns/136/description.html -CVE-2006-4329 - https://www.exploit-db.com/exploits/2229 -CVE-2006-4330 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9869 -CVE-2006-4334 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-4335 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-4336 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-4337 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-4338 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-4339 - http://www.redhat.com/support/errata/RHSA-2007-0073.html -CVE-2006-4339 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html -CVE-2006-4339 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2006-4339 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2006-4339 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2006-4339 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2006-4339 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2006-4340 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-4342 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 -CVE-2006-4343 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html -CVE-2006-4343 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2006-4343 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2006-4343 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2006-4343 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2006-4343 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2006-4343 - https://www.exploit-db.com/exploits/4773 -CVE-2006-4348 - http://securityreason.com/securityalert/1447 -CVE-2006-4348 - https://www.exploit-db.com/exploits/2215 -CVE-2006-4350 - http://securityreason.com/securityalert/1448 -CVE-2006-4350 - http://securityreason.com/securityalert/1460 -CVE-2006-4351 - http://securityreason.com/securityalert/1448 -CVE-2006-4354 - https://www.exploit-db.com/exploits/2239 -CVE-2006-4357 - http://securityreason.com/securityalert/1454 -CVE-2006-4358 - http://securityreason.com/securityalert/1459 -CVE-2006-4359 - http://vuln.sg/powerzip706-en.html -CVE-2006-4361 - http://securityreason.com/securityalert/1453 -CVE-2006-4362 - http://securityreason.com/securityalert/1452 -CVE-2006-4363 - http://securityreason.com/securityalert/1450 -CVE-2006-4363 - https://www.exploit-db.com/exploits/2217 -CVE-2006-4364 - http://securityreason.com/securityalert/1446 -CVE-2006-4364 - https://www.exploit-db.com/exploits/2245 -CVE-2006-4365 - http://www.nukedx.com/?viewdoc=48 -CVE-2006-4365 - https://www.exploit-db.com/exploits/2251 -CVE-2006-4367 - https://www.exploit-db.com/exploits/2248 -CVE-2006-4368 - http://www.nukedx.com/?viewdoc=47 -CVE-2006-4368 - https://www.exploit-db.com/exploits/2250 -CVE-2006-4369 - http://www.nukedx.com/?viewdoc=47 -CVE-2006-4369 - https://www.exploit-db.com/exploits/2250 -CVE-2006-4370 - http://securityreason.com/securityalert/1455 -CVE-2006-4371 - http://securityreason.com/securityalert/1455 -CVE-2006-4372 - https://www.exploit-db.com/exploits/2222 -CVE-2006-4373 - http://securityreason.com/securityalert/1449 -CVE-2006-4373 - https://www.exploit-db.com/exploits/2249 -CVE-2006-4374 - http://securityreason.com/securityalert/1457 -CVE-2006-4375 - http://securityreason.com/securityalert/1451 -CVE-2006-4376 - http://securityreason.com/securityalert/1458 -CVE-2006-4377 - http://securityreason.com/securityalert/1458 -CVE-2006-4378 - http://securityreason.com/securityalert/1456 -CVE-2006-4381 - http://securityreason.com/securityalert/1551 -CVE-2006-4382 - http://securityreason.com/securityalert/1554 -CVE-2006-4384 - http://securityreason.com/securityalert/1554 -CVE-2006-4385 - http://securityreason.com/securityalert/1554 -CVE-2006-4386 - http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt -CVE-2006-4386 - http://securityreason.com/securityalert/1550 -CVE-2006-4388 - http://securityreason.com/securityalert/1554 -CVE-2006-4389 - http://securityreason.com/securityalert/1554 -CVE-2006-4417 - http://securityreason.com/securityalert/1461 -CVE-2006-4418 - https://www.exploit-db.com/exploits/2252 -CVE-2006-4419 - https://www.exploit-db.com/exploits/2259 -CVE-2006-4420 - https://www.exploit-db.com/exploits/2253 -CVE-2006-4421 - http://securityreason.com/securityalert/1463 -CVE-2006-4423 - http://securityreason.com/securityalert/1462 -CVE-2006-4424 - https://www.exploit-db.com/exploits/2254 -CVE-2006-4426 - https://www.exploit-db.com/exploits/2260 -CVE-2006-4427 - https://www.exploit-db.com/exploits/2255 -CVE-2006-4430 - http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html -CVE-2006-4431 - http://marc.info/?l=full-disclosure&m=115642248226217&w=2 -CVE-2006-4431 - http://securityreason.com/securityalert/1466 -CVE-2006-4432 - http://securityreason.com/securityalert/1466 -CVE-2006-4433 - http://securityreason.com/securityalert/1466 -CVE-2006-4440 - https://www.exploit-db.com/exploits/2263 -CVE-2006-4443 - http://securityreason.com/securityalert/1467 -CVE-2006-4445 - http://www.attrition.org/pipermail/vim/2006-August/001000.html -CVE-2006-4446 - http://securityreason.com/securityalert/1468 -CVE-2006-4446 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -CVE-2006-4448 - http://securityreason.com/securityalert/1471 -CVE-2006-4448 - https://www.exploit-db.com/exploits/2218 -CVE-2006-4449 - http://securityreason.com/securityalert/1469 -CVE-2006-4450 - http://securityreason.com/securityalert/1470 -CVE-2006-4452 - https://www.exploit-db.com/exploits/2269 -CVE-2006-4455 - https://www.exploit-db.com/exploits/2124 -CVE-2006-4455 - https://www.exploit-db.com/exploits/2147 -CVE-2006-4456 - https://www.exploit-db.com/exploits/2275 -CVE-2006-4458 - https://www.exploit-db.com/exploits/2270 -CVE-2006-4462 - http://securityreason.com/securityalert/1484 -CVE-2006-4463 - http://securityreason.com/securityalert/1483 -CVE-2006-4464 - http://securityreason.com/securityalert/1485 -CVE-2006-4464 - https://www.exploit-db.com/exploits/2176 -CVE-2006-4465 - http://securityreason.com/securityalert/1486 -CVE-2006-4467 - http://securityreason.com/securityalert/1475 -CVE-2006-4477 - http://securityreason.com/securityalert/1479 -CVE-2006-4478 - http://securityreason.com/securityalert/1479 -CVE-2006-4479 - http://securityreason.com/securityalert/1479 -CVE-2006-4480 - http://securityreason.com/securityalert/1478 -CVE-2006-4484 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2006-4484 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9004 -CVE-2006-4487 - http://securityreason.com/securityalert/1482 -CVE-2006-4488 - https://www.exploit-db.com/exploits/2273 -CVE-2006-4489 - https://www.exploit-db.com/exploits/2272 -CVE-2006-4494 - http://securityreason.com/securityalert/1473 -CVE-2006-4495 - http://securityreason.com/securityalert/1474 -CVE-2006-4496 - http://securityreason.com/securityalert/1476 -CVE-2006-4497 - http://securityreason.com/securityalert/1480 -CVE-2006-4498 - http://securityreason.com/securityalert/1477 -CVE-2006-4498 - https://www.exploit-db.com/exploits/2271 -CVE-2006-4500 - http://securityreason.com/securityalert/1481 -CVE-2006-4501 - http://securityreason.com/securityalert/1481 -CVE-2006-4502 - http://securityreason.com/securityalert/1481 -CVE-2006-4503 - http://www.evuln.com/vulns/138/ -CVE-2006-4504 - http://www.evuln.com/vulns/138/ -CVE-2006-4505 - http://www.evuln.com/vulns/138/ -CVE-2006-4514 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413 -CVE-2006-4523 - http://securityreason.com/securityalert/1489 -CVE-2006-4523 - https://www.exploit-db.com/exploits/2246 -CVE-2006-4524 - http://securityreason.com/securityalert/1488 -CVE-2006-4528 - http://securityreason.com/securityalert/1487 -CVE-2006-4529 - http://securityreason.com/securityalert/1487 -CVE-2006-4530 - http://securityreason.com/securityalert/1487 -CVE-2006-4531 - https://www.exploit-db.com/exploits/2281 -CVE-2006-4532 - https://www.exploit-db.com/exploits/2282 -CVE-2006-4533 - http://packetstormsecurity.org/0608-exploits/plume-1.0.6.txt -CVE-2006-4534 - http://isc.sans.org/diary.php?storyid=1669 -CVE-2006-4534 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 -CVE-2006-4536 - https://www.exploit-db.com/exploits/2262 -CVE-2006-4541 - http://securityreason.com/securityalert/1512 -CVE-2006-4543 - http://securityreason.com/securityalert/1490 -CVE-2006-4544 - http://securityreason.com/securityalert/1501 -CVE-2006-4545 - http://www.attrition.org/pipermail/vim/2006-September/001012.html -CVE-2006-4548 - http://securityreason.com/securityalert/1497 -CVE-2006-4553 - http://securityreason.com/securityalert/1491 -CVE-2006-4554 - http://securityreason.com/securityalert/1498 -CVE-2006-4558 - http://securityreason.com/securityalert/1492 -CVE-2006-4560 - http://shampoo.antville.org/stories/1451301/ -CVE-2006-4561 - http://shampoo.antville.org/stories/1451301/ -CVE-2006-4565 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-4566 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9637 -CVE-2006-4568 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-4568 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9843 -CVE-2006-4570 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-4571 - http://www.ubuntu.com/usn/usn-361-1 -CVE-2006-4574 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740 -CVE-2006-4583 - https://www.exploit-db.com/exploits/2293 -CVE-2006-4584 - http://securityreason.com/securityalert/1508 -CVE-2006-4584 - https://www.exploit-db.com/exploits/2297 -CVE-2006-4585 - http://securityreason.com/securityalert/1508 -CVE-2006-4585 - https://www.exploit-db.com/exploits/2297 -CVE-2006-4586 - http://securityreason.com/securityalert/1508 -CVE-2006-4586 - https://www.exploit-db.com/exploits/2297 -CVE-2006-4589 - https://www.exploit-db.com/exploits/2290 -CVE-2006-4592 - https://www.exploit-db.com/exploits/2296 -CVE-2006-4594 - https://www.exploit-db.com/exploits/2279 -CVE-2006-4595 - http://securityreason.com/securityalert/1514 -CVE-2006-4597 - https://www.exploit-db.com/exploits/2287 -CVE-2006-4599 - http://securityreason.com/securityalert/1494 -CVE-2006-4600 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618 -CVE-2006-4601 - http://securityreason.com/securityalert/1496 -CVE-2006-4602 - http://isc.sans.org/diary.php?storyid=1672 -CVE-2006-4602 - https://www.exploit-db.com/exploits/2288 -CVE-2006-4604 - https://www.exploit-db.com/exploits/2280 -CVE-2006-4605 - http://securityreason.com/securityalert/1499 -CVE-2006-4605 - https://www.exploit-db.com/exploits/8425 -CVE-2006-4606 - http://securityreason.com/securityalert/1499 -CVE-2006-4606 - https://www.exploit-db.com/exploits/3538 -CVE-2006-4606 - https://www.exploit-db.com/exploits/8425 -CVE-2006-4607 - http://securityreason.com/securityalert/1499 -CVE-2006-4607 - https://www.exploit-db.com/exploits/8425 -CVE-2006-4608 - http://securityreason.com/securityalert/1499 -CVE-2006-4608 - https://www.exploit-db.com/exploits/8425 -CVE-2006-4609 - http://securityreason.com/securityalert/1495 -CVE-2006-4610 - http://securityreason.com/securityalert/1513 -CVE-2006-4610 - https://www.exploit-db.com/exploits/2304 -CVE-2006-4611 - http://securityreason.com/securityalert/1493 -CVE-2006-4611 - https://www.exploit-db.com/exploits/2303 -CVE-2006-4623 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9775 -CVE-2006-4624 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756 -CVE-2006-4629 - https://www.exploit-db.com/exploits/2308 -CVE-2006-4630 - https://www.exploit-db.com/exploits/2301 -CVE-2006-4631 - http://securityreason.com/securityalert/1521 -CVE-2006-4631 - https://www.exploit-db.com/exploits/2300 -CVE-2006-4632 - http://securityreason.com/securityalert/1521 -CVE-2006-4632 - https://www.exploit-db.com/exploits/2300 -CVE-2006-4633 - http://securityreason.com/securityalert/1521 -CVE-2006-4633 - https://www.exploit-db.com/exploits/2300 -CVE-2006-4636 - https://www.exploit-db.com/exploits/2310 -CVE-2006-4638 - https://www.exploit-db.com/exploits/2307 -CVE-2006-4641 - https://www.exploit-db.com/exploits/2294 -CVE-2006-4644 - https://www.exploit-db.com/exploits/2313 -CVE-2006-4645 - https://www.exploit-db.com/exploits/2315 -CVE-2006-4647 - https://www.exploit-db.com/exploits/2309 -CVE-2006-4648 - https://www.exploit-db.com/exploits/2312 -CVE-2006-4655 - http://securityreason.com/securityalert/1545 -CVE-2006-4656 - https://www.exploit-db.com/exploits/2317 -CVE-2006-4662 - http://securityreason.com/securityalert/1530 -CVE-2006-4662 - http://www.securityfocus.com/archive/1/445513/100/0/threaded -CVE-2006-4664 - https://www.exploit-db.com/exploits/2311 -CVE-2006-4669 - https://www.exploit-db.com/exploits/2329 -CVE-2006-4670 - https://www.exploit-db.com/exploits/2327 -CVE-2006-4671 - https://www.exploit-db.com/exploits/3027 -CVE-2006-4672 - https://www.exploit-db.com/exploits/2316 -CVE-2006-4676 - https://www.exploit-db.com/exploits/2284 -CVE-2006-4681 - https://www.exploit-db.com/exploits/2320 -CVE-2006-4687 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -CVE-2006-4688 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 -CVE-2006-4689 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 -CVE-2006-4691 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070 -CVE-2006-4691 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A908 -CVE-2006-4692 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-065 -CVE-2006-4693 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 -CVE-2006-4694 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 -CVE-2006-4695 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-017 -CVE-2006-4696 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063 -CVE-2006-4697 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 -CVE-2006-4702 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 -CVE-2006-4712 - http://securityreason.com/securityalert/1558 -CVE-2006-4712 - http://www.gnucitizen.org/blog/cross-context-scripting-with-sage -CVE-2006-4713 - http://securityreason.com/securityalert/1557 -CVE-2006-4713 - https://www.exploit-db.com/exploits/2340 -CVE-2006-4714 - https://www.exploit-db.com/exploits/2339 -CVE-2006-4715 - https://www.exploit-db.com/exploits/2337 -CVE-2006-4716 - https://www.exploit-db.com/exploits/2319 -CVE-2006-4719 - https://www.exploit-db.com/exploits/2335 -CVE-2006-4720 - http://securityreason.com/securityalert/1556 -CVE-2006-4720 - https://www.exploit-db.com/exploits/2342 -CVE-2006-4721 - https://www.exploit-db.com/exploits/2333 -CVE-2006-4722 - http://securityreason.com/securityalert/1552 -CVE-2006-4723 - https://www.exploit-db.com/exploits/2328 -CVE-2006-4731 - http://securityreason.com/securityalert/1553 -CVE-2006-4732 - http://silversmith.persiangig.com/PoC.rar -CVE-2006-4733 - https://www.exploit-db.com/exploits/3245 -CVE-2006-4735 - http://securityreason.com/securityalert/1564 -CVE-2006-4736 - http://securityreason.com/securityalert/1563 -CVE-2006-4737 - http://securityreason.com/securityalert/1562 -CVE-2006-4738 - http://securityreason.com/securityalert/1562 -CVE-2006-4739 - http://securityreason.com/securityalert/1562 -CVE-2006-4740 - http://securityreason.com/securityalert/1562 -CVE-2006-4741 - http://securityreason.com/securityalert/1561 -CVE-2006-4742 - http://securityreason.com/securityalert/1561 -CVE-2006-4744 - http://securityreason.com/securityalert/1560 -CVE-2006-4745 - http://securityreason.com/securityalert/1559 -CVE-2006-4746 - http://securityreason.com/securityalert/1568 -CVE-2006-4746 - https://www.exploit-db.com/exploits/2318 -CVE-2006-4747 - http://securityreason.com/securityalert/1567 -CVE-2006-4748 - http://securityreason.com/securityalert/1566 -CVE-2006-4750 - https://www.exploit-db.com/exploits/2344 -CVE-2006-4751 - http://securityreason.com/securityalert/1565 -CVE-2006-4752 - http://securityreason.com/securityalert/1565 -CVE-2006-4757 - http://securityreason.com/securityalert/1569 -CVE-2006-4763 - http://securityreason.com/securityalert/1571 -CVE-2006-4764 - http://securityreason.com/securityalert/1570 -CVE-2006-4764 - https://www.exploit-db.com/exploits/2346 -CVE-2006-4765 - http://securityreason.com/securityalert/1575 -CVE-2006-4766 - http://securityreason.com/securityalert/1574 -CVE-2006-4769 - https://www.exploit-db.com/exploits/2350 -CVE-2006-4770 - https://www.exploit-db.com/exploits/2343 -CVE-2006-4771 - http://securityreason.com/securityalert/1573 -CVE-2006-4772 - http://securityreason.com/securityalert/1572 -CVE-2006-4777 - http://securityreason.com/securityalert/1577 -CVE-2006-4777 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -CVE-2006-4779 - https://www.exploit-db.com/exploits/2353 -CVE-2006-4780 - http://securityreason.com/securityalert/1576 -CVE-2006-4780 - https://www.exploit-db.com/exploits/2349 -CVE-2006-4781 - https://www.exploit-db.com/exploits/2334 -CVE-2006-4782 - https://www.exploit-db.com/exploits/2352 -CVE-2006-4788 - https://www.exploit-db.com/exploits/2354 -CVE-2006-4789 - https://www.exploit-db.com/exploits/2338 -CVE-2006-4790 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9937 -CVE-2006-4793 - https://www.exploit-db.com/exploits/2362 -CVE-2006-4796 - http://securityreason.com/securityalert/1578 -CVE-2006-4797 - http://evuln.com/vulns/137/summary.html -CVE-2006-4797 - http://securityreason.com/securityalert/1580 -CVE-2006-4798 - http://securityreason.com/securityalert/1579 -CVE-2006-4801 - http://www.netragard.com/pdfs/research/ROXIO_RACE_NETRAGARD-20060624.txt -CVE-2006-4810 - http://www.vmware.com/support/vi3/doc/esx-2559638-patch.html -CVE-2006-4812 - http://securityreason.com/securityalert/1691 -CVE-2006-4814 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648 -CVE-2006-4823 - https://www.exploit-db.com/exploits/2363 -CVE-2006-4824 - https://www.exploit-db.com/exploits/2356 -CVE-2006-4825 - http://securityreason.com/securityalert/1582 -CVE-2006-4826 - https://www.exploit-db.com/exploits/2361 -CVE-2006-4827 - https://www.exploit-db.com/exploits/2359 -CVE-2006-4829 - http://securityreason.com/securityalert/1594 -CVE-2006-4837 - https://www.exploit-db.com/exploits/1905 -CVE-2006-4842 - https://www.exploit-db.com/exploits/45433/ -CVE-2006-4845 - https://www.exploit-db.com/exploits/2368 -CVE-2006-4849 - http://attrition.org/pipermail/vim/2007-April/001523.html -CVE-2006-4849 - https://www.exploit-db.com/exploits/2383 -CVE-2006-4850 - https://www.exploit-db.com/exploits/2372 -CVE-2006-4852 - https://www.exploit-db.com/exploits/2384 -CVE-2006-4853 - https://www.exploit-db.com/exploits/2371 -CVE-2006-4855 - http://securityreason.com/securityalert/1591 -CVE-2006-4856 - http://securityreason.com/securityalert/1597 -CVE-2006-4858 - https://www.exploit-db.com/exploits/2367 -CVE-2006-4859 - https://www.exploit-db.com/exploits/2370 -CVE-2006-4863 - http://securityvulns.com/Rdocument844.html -CVE-2006-4866 - http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt -CVE-2006-4867 - https://www.exploit-db.com/exploits/2378 -CVE-2006-4869 - https://www.exploit-db.com/exploits/2357 -CVE-2006-4870 - https://www.exploit-db.com/exploits/2377 -CVE-2006-4878 - https://www.exploit-db.com/exploits/2593 -CVE-2006-4890 - https://www.exploit-db.com/exploits/2380 -CVE-2006-4891 - https://www.exploit-db.com/exploits/2386 -CVE-2006-4892 - https://www.exploit-db.com/exploits/2385 -CVE-2006-4897 - https://www.exploit-db.com/exploits/2388 -CVE-2006-4898 - https://www.exploit-db.com/exploits/2381 -CVE-2006-4906 - https://www.exploit-db.com/exploits/2394 -CVE-2006-4908 - http://securityreason.com/securityalert/1622 -CVE-2006-4912 - https://www.exploit-db.com/exploits/2373 -CVE-2006-4913 - https://www.exploit-db.com/exploits/2389 -CVE-2006-4915 - http://securityreason.com/securityalert/1621 -CVE-2006-4916 - https://www.exploit-db.com/exploits/2395 -CVE-2006-4918 - https://www.exploit-db.com/exploits/2396 -CVE-2006-4919 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 -CVE-2006-4919 - https://www.exploit-db.com/exploits/2374 -CVE-2006-4920 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 -CVE-2006-4920 - https://www.exploit-db.com/exploits/2374 -CVE-2006-4921 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 -CVE-2006-4922 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 -CVE-2006-4922 - https://www.exploit-db.com/exploits/2374 -CVE-2006-4924 - http://bugs.gentoo.org/show_bug.cgi?id=148228 -CVE-2006-4924 - http://www.ubuntu.com/usn/usn-355-1 -CVE-2006-4925 - http://bugs.gentoo.org/show_bug.cgi?id=148228 -CVE-2006-4944 - https://www.exploit-db.com/exploits/2411 -CVE-2006-4945 - https://www.exploit-db.com/exploits/2398 -CVE-2006-4946 - https://www.exploit-db.com/exploits/2399 -CVE-2006-4957 - https://www.exploit-db.com/exploits/2397 -CVE-2006-4958 - http://securityreason.com/securityalert/1623 -CVE-2006-4958 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2555 -CVE-2006-4959 - http://securityreason.com/securityalert/1623 -CVE-2006-4959 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2555 -CVE-2006-4960 - https://www.exploit-db.com/exploits/2402 -CVE-2006-4961 - https://www.exploit-db.com/exploits/2402 -CVE-2006-4962 - https://www.exploit-db.com/exploits/2402 -CVE-2006-4962 - https://www.exploit-db.com/exploits/4277 -CVE-2006-4963 - https://www.exploit-db.com/exploits/2391 -CVE-2006-4965 - http://securityreason.com/securityalert/1631 -CVE-2006-4965 - http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox -CVE-2006-4965 - http://www.gnucitizen.org/blog/backdooring-mp3-files/ -CVE-2006-4965 - http://www.kb.cert.org/vuls/id/751808 -CVE-2006-4966 - http://securityreason.com/securityalert/1630 -CVE-2006-4966 - https://www.exploit-db.com/exploits/2410 -CVE-2006-4967 - http://securityreason.com/securityalert/1625 -CVE-2006-4968 - https://www.exploit-db.com/exploits/2390 -CVE-2006-4969 - https://www.exploit-db.com/exploits/2393 -CVE-2006-4970 - http://securityreason.com/securityalert/1624 -CVE-2006-4970 - https://www.exploit-db.com/exploits/2392 -CVE-2006-4971 - http://securityreason.com/securityalert/1628 -CVE-2006-4972 - http://securityreason.com/securityalert/1628 -CVE-2006-4974 - https://www.exploit-db.com/exploits/2401 -CVE-2006-4975 - http://securityreason.com/securityalert/1626 -CVE-2006-4976 - http://securityreason.com/securityalert/1629 -CVE-2006-4977 - http://securityreason.com/securityalert/1627 -CVE-2006-4977 - https://www.exploit-db.com/exploits/2376 -CVE-2006-4978 - http://securityreason.com/securityalert/1627 -CVE-2006-4978 - https://www.exploit-db.com/exploits/2376 -CVE-2006-4979 - http://securityreason.com/securityalert/1627 -CVE-2006-4979 - https://www.exploit-db.com/exploits/2376 -CVE-2006-4984 - http://securityreason.com/securityalert/1634 -CVE-2006-4985 - http://securityreason.com/securityalert/1634 -CVE-2006-4986 - http://securityreason.com/securityalert/1634 -CVE-2006-4987 - http://securityreason.com/securityalert/1633 -CVE-2006-4988 - http://securityreason.com/securityalert/1633 -CVE-2006-4989 - http://securityreason.com/securityalert/1633 -CVE-2006-4990 - http://securityreason.com/securityalert/1632 -CVE-2006-4990 - http://www.osvdb.org/32251 -CVE-2006-4993 - https://www.exploit-db.com/exploits/2405 -CVE-2006-5015 - http://securityreason.com/securityalert/1644 -CVE-2006-5016 - http://securityreason.com/securityalert/1642 -CVE-2006-5017 - http://securityreason.com/securityalert/1642 -CVE-2006-5018 - http://securityreason.com/securityalert/1639 -CVE-2006-5019 - http://securityreason.com/securityalert/1637 -CVE-2006-5020 - https://www.exploit-db.com/exploits/2413 -CVE-2006-5022 - https://www.exploit-db.com/exploits/2407 -CVE-2006-5023 - https://www.exploit-db.com/exploits/2416 -CVE-2006-5027 - http://securityreason.com/securityalert/1638 -CVE-2006-5028 - http://securityreason.com/securityalert/1643 -CVE-2006-5030 - https://www.exploit-db.com/exploits/2406 -CVE-2006-5032 - https://www.exploit-db.com/exploits/2409 -CVE-2006-5036 - http://securityreason.com/securityalert/1635 -CVE-2006-5037 - http://securityreason.com/securityalert/1635 -CVE-2006-5038 - http://www.osnews.com/story.php/15923/Review-FiWin-SS28S-WiFi-VoIP-SIPSkype-Phone/ -CVE-2006-5043 - https://www.exploit-db.com/exploits/3560 -CVE-2006-5048 - https://www.exploit-db.com/exploits/2083 -CVE-2006-5050 - http://securityreason.com/securityalert/1636 -CVE-2006-5051 - http://www.ubuntu.com/usn/usn-355-1 -CVE-2006-5052 - http://www.redhat.com/support/errata/RHSA-2007-0703.html -CVE-2006-5053 - https://www.exploit-db.com/exploits/2419 -CVE-2006-5054 - https://www.exploit-db.com/exploits/2423 -CVE-2006-5055 - http://marc.info/?l=full-disclosure&m=115913461828660&w=2 -CVE-2006-5055 - https://www.exploit-db.com/exploits/2424 -CVE-2006-5056 - http://securityreason.com/securityalert/1641 -CVE-2006-5057 - http://securityreason.com/securityalert/1640 -CVE-2006-5059 - http://securityreason.com/securityalert/1645 -CVE-2006-5060 - http://securityreason.com/securityalert/1649 -CVE-2006-5061 - https://www.exploit-db.com/exploits/2422 -CVE-2006-5062 - https://www.exploit-db.com/exploits/2428 -CVE-2006-5065 - https://www.exploit-db.com/exploits/2420 -CVE-2006-5066 - http://securityreason.com/securityalert/1648 -CVE-2006-5067 - http://securityreason.com/securityalert/1647 -CVE-2006-5068 - https://www.exploit-db.com/exploits/2432 -CVE-2006-5068 - https://www.exploit-db.com/exploits/2433 -CVE-2006-5069 - http://securityreason.com/securityalert/1646 -CVE-2006-5070 - https://www.exploit-db.com/exploits/2434 -CVE-2006-5077 - https://www.exploit-db.com/exploits/2429 -CVE-2006-5078 - https://www.exploit-db.com/exploits/2427 -CVE-2006-5079 - https://www.exploit-db.com/exploits/2437 -CVE-2006-5083 - https://www.exploit-db.com/exploits/2430 -CVE-2006-5087 - https://www.exploit-db.com/exploits/2431 -CVE-2006-5092 - https://www.exploit-db.com/exploits/2436 -CVE-2006-5093 - https://www.exploit-db.com/exploits/2450 -CVE-2006-5097 - http://securityreason.com/securityalert/1655 -CVE-2006-5097 - http://www.attrition.org/pipermail/vim/2006-October/001076.html -CVE-2006-5100 - https://www.exploit-db.com/exploits/2435 -CVE-2006-5101 - http://securityreason.com/securityalert/1658 -CVE-2006-5102 - https://www.exploit-db.com/exploits/2439 -CVE-2006-5112 - https://www.exploit-db.com/exploits/2445 -CVE-2006-5113 - http://packetstormsecurity.org/0610-exploits/Exporia-0.3.0.txt -CVE-2006-5115 - https://www.exploit-db.com/exploits/2447 -CVE-2006-5116 - http://securityreason.com/securityalert/1677 -CVE-2006-5118 - http://securityreason.com/securityalert/1666 -CVE-2006-5123 - http://securityreason.com/securityalert/1672 -CVE-2006-5124 - https://www.exploit-db.com/exploits/2451 -CVE-2006-5125 - https://www.exploit-db.com/exploits/2451 -CVE-2006-5126 - https://www.exploit-db.com/exploits/2454 -CVE-2006-5133 - http://securityreason.com/securityalert/1675 -CVE-2006-5135 - https://www.exploit-db.com/exploits/2442 -CVE-2006-5140 - https://www.exploit-db.com/exploits/2456 -CVE-2006-5144 - http://securityreason.com/securityalert/1680 -CVE-2006-5145 - http://securityreason.com/securityalert/1680 -CVE-2006-5146 - http://securityreason.com/securityalert/1679 -CVE-2006-5147 - https://www.exploit-db.com/exploits/2461 -CVE-2006-5148 - https://www.exploit-db.com/exploits/2459 -CVE-2006-5151 - http://securityreason.com/securityalert/1688 -CVE-2006-5153 - http://securityreason.com/securityalert/1685 -CVE-2006-5155 - https://www.exploit-db.com/exploits/2455 -CVE-2006-5157 - http://securityreason.com/securityalert/1682 -CVE-2006-5161 - http://securityreason.com/securityalert/1681 -CVE-2006-5162 - http://securityreason.com/securityalert/1683 -CVE-2006-5162 - https://www.exploit-db.com/exploits/2039 -CVE-2006-5163 - http://securityreason.com/securityalert/1686 -CVE-2006-5164 - http://securityreason.com/securityalert/1687 -CVE-2006-5165 - https://www.exploit-db.com/exploits/2446 -CVE-2006-5166 - http://securityreason.com/securityalert/1684 -CVE-2006-5167 - https://www.exploit-db.com/exploits/2465 -CVE-2006-5168 - http://securityreason.com/securityalert/1689 -CVE-2006-5174 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9885 -CVE-2006-5178 - http://securityreason.com/securityalert/1692 -CVE-2006-5180 - https://www.exploit-db.com/exploits/2443 -CVE-2006-5181 - https://www.exploit-db.com/exploits/2462 -CVE-2006-5182 - https://www.exploit-db.com/exploits/2471 -CVE-2006-5186 - https://www.exploit-db.com/exploits/2470 -CVE-2006-5187 - https://www.exploit-db.com/exploits/2468 -CVE-2006-5189 - https://www.exploit-db.com/exploits/2472 -CVE-2006-5190 - https://www.exploit-db.com/exploits/28743/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28744/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28745/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28746/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28747/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28748/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28749/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28750/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28752/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28753/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28754/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28755/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28756/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28757/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28758/ -CVE-2006-5190 - https://www.exploit-db.com/exploits/28759/ -CVE-2006-5191 - https://www.exploit-db.com/exploits/2477/ -CVE-2006-5192 - https://www.exploit-db.com/exploits/2476/ -CVE-2006-5198 - http://isc.sans.org/diary.php?storyid=1861 -CVE-2006-5198 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -CVE-2006-5202 - https://www.exploit-db.com/exploits/5926 -CVE-2006-5205 - https://www.exploit-db.com/exploits/2473 -CVE-2006-5206 - https://www.exploit-db.com/exploits/2473 -CVE-2006-5207 - https://www.exploit-db.com/exploits/2478 -CVE-2006-5208 - https://www.exploit-db.com/exploits/2479 -CVE-2006-5209 - https://www.exploit-db.com/exploits/2475/ -CVE-2006-5210 - http://securityreason.com/securityalert/1726 -CVE-2006-5216 - http://exploitlabs.com/files/advisories/EXPL-A-2006-005-shttpd.txt -CVE-2006-5216 - https://www.exploit-db.com/exploits/2482 -CVE-2006-5218 - http://scary.beasts.org/security/CESA-2006-003.html -CVE-2006-5219 - http://marc.info/?l=full-disclosure&m=116034301209228&w=2 -CVE-2006-5219 - http://securityreason.com/securityalert/1699 -CVE-2006-5220 - http://securityreason.com/securityalert/1702 -CVE-2006-5220 - https://www.exploit-db.com/exploits/2496 -CVE-2006-5221 - https://www.exploit-db.com/exploits/2485 -CVE-2006-5222 - https://www.exploit-db.com/exploits/2481 -CVE-2006-5223 - https://www.exploit-db.com/exploits/2483 -CVE-2006-5224 - https://www.exploit-db.com/exploits/2480 -CVE-2006-5226 - https://www.exploit-db.com/exploits/2490 -CVE-2006-5230 - https://www.exploit-db.com/exploits/2484 -CVE-2006-5236 - http://securityreason.com/securityalert/1711 -CVE-2006-5236 - https://www.exploit-db.com/exploits/2487 -CVE-2006-5239 - http://marc.info/?l=full-disclosure&m=116042862409660&w=2 -CVE-2006-5240 - https://www.exploit-db.com/exploits/2493 -CVE-2006-5241 - http://securityreason.com/securityalert/1708 -CVE-2006-5241 - https://www.exploit-db.com/exploits/2497 -CVE-2006-5244 - https://www.exploit-db.com/exploits/2495 -CVE-2006-5245 - http://securityreason.com/securityalert/1717 -CVE-2006-5246 - http://securityreason.com/securityalert/1717 -CVE-2006-5247 - http://securityreason.com/securityalert/1717 -CVE-2006-5253 - http://securityreason.com/securityalert/1721 -CVE-2006-5254 - https://www.exploit-db.com/exploits/2379 -CVE-2006-5256 - https://www.exploit-db.com/exploits/2510 -CVE-2006-5257 - https://www.exploit-db.com/exploits/2489 -CVE-2006-5259 - http://marc.info/?l=bugtraq&m=116049484210942&w=2 -CVE-2006-5259 - https://www.exploit-db.com/exploits/2503 -CVE-2006-5261 - http://securityreason.com/securityalert/1720 -CVE-2006-5261 - https://www.exploit-db.com/exploits/2488 -CVE-2006-5263 - https://www.exploit-db.com/exploits/2500 -CVE-2006-5270 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-010 -CVE-2006-5276 - https://www.exploit-db.com/exploits/3362 -CVE-2006-5280 - https://www.exploit-db.com/exploits/2516 -CVE-2006-5281 - https://www.exploit-db.com/exploits/2514 -CVE-2006-5282 - https://www.exploit-db.com/exploits/2518 -CVE-2006-5283 - https://www.exploit-db.com/exploits/2519 -CVE-2006-5284 - https://www.exploit-db.com/exploits/2517 -CVE-2006-5285 - http://marc.info/?l=full-disclosure&m=116062269104422&w=2 -CVE-2006-5285 - http://securityreason.com/securityalert/1735 -CVE-2006-5287 - http://marc.info/?l=full-disclosure&m=116062281632705&w=2 -CVE-2006-5289 - http://securityreason.com/securityalert/1722 -CVE-2006-5289 - https://www.exploit-db.com/exploits/2508 -CVE-2006-5291 - http://securityreason.com/securityalert/1723 -CVE-2006-5291 - https://www.exploit-db.com/exploits/2521 -CVE-2006-5292 - https://www.exploit-db.com/exploits/2509 -CVE-2006-5293 - http://securityreason.com/securityalert/1724 -CVE-2006-5294 - http://securityreason.com/securityalert/1728 -CVE-2006-5296 - http://www.informationweek.com/management/showArticle.jhtml?articleID=193302553 -CVE-2006-5296 - https://www.exploit-db.com/exploits/2523 -CVE-2006-5299 - http://securityreason.com/securityalert/1725 -CVE-2006-5300 - http://securityreason.com/securityalert/1727 -CVE-2006-5301 - https://www.exploit-db.com/exploits/2533 -CVE-2006-5302 - https://www.exploit-db.com/exploits/2534 -CVE-2006-5304 - https://www.exploit-db.com/exploits/2557 -CVE-2006-5305 - http://securityreason.com/securityalert/1729 -CVE-2006-5305 - https://www.exploit-db.com/exploits/2546 -CVE-2006-5306 - https://www.exploit-db.com/exploits/2522 -CVE-2006-5307 - https://www.exploit-db.com/exploits/2529 -CVE-2006-5308 - http://isc.sans.org/diary.php?storyid=1791 -CVE-2006-5308 - https://www.exploit-db.com/exploits/2536 -CVE-2006-5309 - https://www.exploit-db.com/exploits/2550 -CVE-2006-5310 - https://www.exploit-db.com/exploits/2535 -CVE-2006-5312 - https://www.exploit-db.com/exploits/2532 -CVE-2006-5314 - http://securityreason.com/securityalert/1734 -CVE-2006-5314 - https://www.exploit-db.com/exploits/2501 -CVE-2006-5315 - http://securityreason.com/securityalert/1734 -CVE-2006-5315 - https://www.exploit-db.com/exploits/2502 -CVE-2006-5316 - http://securityreason.com/securityalert/1734 -CVE-2006-5316 - https://www.exploit-db.com/exploits/2502 -CVE-2006-5317 - http://securityreason.com/securityalert/1734 -CVE-2006-5317 - https://www.exploit-db.com/exploits/2504 -CVE-2006-5318 - https://www.exploit-db.com/exploits/2505 -CVE-2006-5319 - http://securityreason.com/securityalert/1734 -CVE-2006-5319 - https://www.exploit-db.com/exploits/2506 -CVE-2006-5320 - https://www.exploit-db.com/exploits/2507 -CVE-2006-5331 - http://www.linuxgrill.com/anonymous/kernel/v2.6/ChangeLog-2.6.19 -CVE-2006-5379 - http://securityreason.com/securityalert/1742 -CVE-2006-5383 - https://www.exploit-db.com/exploits/2567 -CVE-2006-5384 - https://www.exploit-db.com/exploits/2540 -CVE-2006-5385 - https://www.exploit-db.com/exploits/2547 -CVE-2006-5386 - https://www.exploit-db.com/exploits/2561 -CVE-2006-5387 - https://www.exploit-db.com/exploits/2538 -CVE-2006-5388 - https://www.exploit-db.com/exploits/2568 -CVE-2006-5390 - https://www.exploit-db.com/exploits/2551 -CVE-2006-5391 - https://www.exploit-db.com/exploits/2571 -CVE-2006-5392 - https://www.exploit-db.com/exploits/2570 -CVE-2006-5398 - https://www.exploit-db.com/exploits/2574 -CVE-2006-5399 - https://www.exploit-db.com/exploits/2584 -CVE-2006-5400 - https://www.exploit-db.com/exploits/2559 -CVE-2006-5401 - https://www.exploit-db.com/exploits/2562 -CVE-2006-5402 - http://marc.info/?l=bugtraq&m=116110988829381&w=2 -CVE-2006-5410 - http://securityreason.com/securityalert/1747 -CVE-2006-5412 - https://www.exploit-db.com/exploits/2588 -CVE-2006-5413 - https://www.exploit-db.com/exploits/2553 -CVE-2006-5415 - https://www.exploit-db.com/exploits/2545 -CVE-2006-5418 - https://www.exploit-db.com/exploits/2549 -CVE-2006-5419 - https://www.exploit-db.com/exploits/2576 -CVE-2006-5421 - https://www.exploit-db.com/exploits/2583 -CVE-2006-5426 - https://www.exploit-db.com/exploits/2595 -CVE-2006-5427 - https://www.exploit-db.com/exploits/2591 -CVE-2006-5429 - https://www.exploit-db.com/exploits/2589 -CVE-2006-5432 - https://www.exploit-db.com/exploits/2590 -CVE-2006-5433 - https://www.exploit-db.com/exploits/2582 -CVE-2006-5434 - https://www.exploit-db.com/exploits/2577 -CVE-2006-5442 - http://securityreason.com/securityalert/1755 -CVE-2006-5448 - http://securityreason.com/securityalert/1756 -CVE-2006-5452 - http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt -CVE-2006-5453 - http://securityreason.com/securityalert/1760 -CVE-2006-5454 - http://securityreason.com/securityalert/1760 -CVE-2006-5455 - http://securityreason.com/securityalert/1760 -CVE-2006-5456 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765 -CVE-2006-5458 - https://www.exploit-db.com/exploits/2526 -CVE-2006-5459 - http://securityreason.com/securityalert/1761 -CVE-2006-5462 - http://www.ubuntu.com/usn/usn-382-1 -CVE-2006-5463 - http://www.ubuntu.com/usn/usn-382-1 -CVE-2006-5463 - https://bugzilla.mozilla.org/show_bug.cgi?id=355655 -CVE-2006-5464 - http://www.ubuntu.com/usn/usn-382-1 -CVE-2006-5464 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9304 -CVE-2006-5469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9537 -CVE-2006-5471 - https://www.exploit-db.com/exploits/2511 -CVE-2006-5472 - https://www.exploit-db.com/exploits/2520 -CVE-2006-5473 - http://securityreason.com/securityalert/1763 -CVE-2006-5474 - http://securityreason.com/securityalert/1767 -CVE-2006-5475 - http://securityreason.com/securityalert/1766 -CVE-2006-5476 - http://securityreason.com/securityalert/1765 -CVE-2006-5477 - http://securityreason.com/securityalert/1764 -CVE-2006-5480 - https://www.exploit-db.com/exploits/2606 -CVE-2006-5485 - http://securityreason.com/securityalert/1762 -CVE-2006-5487 - http://securityreason.com/securityalert/1857 -CVE-2006-5491 - http://securityreason.com/securityalert/1768 -CVE-2006-5493 - https://www.exploit-db.com/exploits/2566 -CVE-2006-5494 - https://www.exploit-db.com/exploits/2599 -CVE-2006-5495 - https://www.exploit-db.com/exploits/2611 -CVE-2006-5496 - http://securityreason.com/securityalert/1769 -CVE-2006-5497 - https://www.exploit-db.com/exploits/2600 -CVE-2006-5499 - http://securityreason.com/securityalert/1771 -CVE-2006-5506 - https://www.exploit-db.com/exploits/2624 -CVE-2006-5507 - http://packetstormsecurity.org/0610-exploits/Derdirigent.txt -CVE-2006-5508 - http://securityreason.com/securityalert/1774 -CVE-2006-5509 - http://securityreason.com/securityalert/1774 -CVE-2006-5510 - https://www.exploit-db.com/exploits/2598 -CVE-2006-5511 - https://www.exploit-db.com/exploits/2616 -CVE-2006-5514 - https://www.exploit-db.com/exploits/2604 -CVE-2006-5517 - https://www.exploit-db.com/exploits/2609 -CVE-2006-5518 - https://www.exploit-db.com/exploits/2605 -CVE-2006-5519 - https://www.exploit-db.com/exploits/2613 -CVE-2006-5521 - https://www.exploit-db.com/exploits/2614 -CVE-2006-5521 - https://www.exploit-db.com/exploits/4755 -CVE-2006-5522 - https://www.exploit-db.com/exploits/2607 -CVE-2006-5523 - https://www.exploit-db.com/exploits/2620 -CVE-2006-5525 - https://www.exploit-db.com/exploits/2617 -CVE-2006-5526 - https://www.exploit-db.com/exploits/2621 -CVE-2006-5527 - https://www.exploit-db.com/exploits/2630 -CVE-2006-5531 - https://www.exploit-db.com/exploits/2631 -CVE-2006-5539 - https://www.exploit-db.com/exploits/2640 -CVE-2006-5543 - https://www.exploit-db.com/exploits/2612 -CVE-2006-5546 - https://www.exploit-db.com/exploits/2622 -CVE-2006-5547 - https://www.exploit-db.com/exploits/2622 -CVE-2006-5548 - https://www.exploit-db.com/exploits/2622 -CVE-2006-5550 - http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html -CVE-2006-5551 - https://www.exploit-db.com/exploits/2625 -CVE-2006-5552 - https://www.exploit-db.com/exploits/2650 -CVE-2006-5554 - https://www.exploit-db.com/exploits/2647 -CVE-2006-5555 - https://www.exploit-db.com/exploits/2596 -CVE-2006-5556 - https://www.exploit-db.com/exploits/2636 -CVE-2006-5557 - https://www.exploit-db.com/exploits/2633 -CVE-2006-5557 - https://www.exploit-db.com/exploits/2634 -CVE-2006-5558 - https://www.exploit-db.com/exploits/2635 -CVE-2006-5559 - http://www.kb.cert.org/vuls/id/589272 -CVE-2006-5559 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009 -CVE-2006-5560 - http://securityreason.com/securityalert/1782 -CVE-2006-5561 - https://www.exploit-db.com/exploits/2644 -CVE-2006-5562 - https://www.exploit-db.com/exploits/2623 -CVE-2006-5566 - http://securityreason.com/securityalert/1791 -CVE-2006-5570 - http://securityreason.com/securityalert/1790 -CVE-2006-5570 - http://vuln.sg/cruiseworks109d-en.html -CVE-2006-5571 - http://securityreason.com/securityalert/1790 -CVE-2006-5571 - http://vuln.sg/cruiseworks109d-en.html -CVE-2006-5574 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-001 -CVE-2006-5577 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 -CVE-2006-5578 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 -CVE-2006-5579 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 -CVE-2006-5581 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 -CVE-2006-5583 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-074 -CVE-2006-5584 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-077 -CVE-2006-5586 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2006-5587 - https://www.exploit-db.com/exploits/2626 -CVE-2006-5588 - https://www.exploit-db.com/exploits/2632 -CVE-2006-5590 - https://www.exploit-db.com/exploits/2645 -CVE-2006-5596 - https://www.exploit-db.com/exploits/2637 -CVE-2006-5597 - https://www.exploit-db.com/exploits/2651 -CVE-2006-5599 - http://securityreason.com/securityalert/1792 -CVE-2006-5600 - http://securityreason.com/securityalert/1793 -CVE-2006-5606 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-007.php?lang=en -CVE-2006-5607 - http://securityreason.com/securityalert/1796 -CVE-2006-5609 - http://securityreason.com/securityalert/1797 -CVE-2006-5612 - http://securityreason.com/securityalert/1795 -CVE-2006-5612 - https://www.exploit-db.com/exploits/3467 -CVE-2006-5613 - https://www.exploit-db.com/exploits/2666 -CVE-2006-5614 - https://www.exploit-db.com/exploits/2672 -CVE-2006-5615 - http://securityreason.com/securityalert/1794 -CVE-2006-5617 - http://securityreason.com/securityalert/1798 -CVE-2006-5618 - https://www.exploit-db.com/exploits/2677 -CVE-2006-5619 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9311 -CVE-2006-5620 - http://securityreason.com/securityalert/1803 -CVE-2006-5620 - https://www.exploit-db.com/exploits/2656 -CVE-2006-5621 - https://www.exploit-db.com/exploits/2654 -CVE-2006-5622 - https://www.exploit-db.com/exploits/2660 -CVE-2006-5623 - https://www.exploit-db.com/exploits/2667 -CVE-2006-5625 - https://www.exploit-db.com/exploits/2659 -CVE-2006-5626 - http://securityreason.com/securityalert/1802 -CVE-2006-5627 - https://www.exploit-db.com/exploits/2681 -CVE-2006-5628 - http://securityreason.com/securityalert/1800 -CVE-2006-5629 - https://www.exploit-db.com/exploits/4730 -CVE-2006-5630 - http://securityreason.com/securityalert/1804 -CVE-2006-5633 - https://bugzilla.mozilla.org/show_bug.cgi?id=358797 -CVE-2006-5634 - https://www.exploit-db.com/exploits/2688 -CVE-2006-5635 - http://securityreason.com/securityalert/1801 -CVE-2006-5636 - http://securityreason.com/securityalert/1799 -CVE-2006-5636 - https://www.exploit-db.com/exploits/2673 -CVE-2006-5637 - https://www.exploit-db.com/exploits/2678 -CVE-2006-5638 - https://www.exploit-db.com/exploits/2679 -CVE-2006-5640 - https://www.exploit-db.com/exploits/2684 -CVE-2006-5641 - https://www.exploit-db.com/exploits/2683 -CVE-2006-5650 - http://securityreason.com/securityalert/1830 -CVE-2006-5651 - http://securityreason.com/securityalert/1829 -CVE-2006-5652 - http://securityreason.com/securityalert/1806 -CVE-2006-5653 - http://securityreason.com/securityalert/1805 -CVE-2006-5655 - http://securityreason.com/securityalert/1809 -CVE-2006-5658 - http://securityreason.com/securityalert/1808 -CVE-2006-5661 - http://securityreason.com/securityalert/1807 -CVE-2006-5662 - http://securityreason.com/securityalert/1819 -CVE-2006-5665 - https://www.exploit-db.com/exploits/2686 -CVE-2006-5666 - https://www.exploit-db.com/exploits/2687 -CVE-2006-5667 - http://securityreason.com/securityalert/1811 -CVE-2006-5667 - https://www.exploit-db.com/exploits/2691 -CVE-2006-5669 - https://www.exploit-db.com/exploits/2692 -CVE-2006-5670 - https://www.exploit-db.com/exploits/2669 -CVE-2006-5672 - https://www.exploit-db.com/exploits/2674 -CVE-2006-5673 - https://www.exploit-db.com/exploits/2655 -CVE-2006-5675 - http://sourceforge.net/project/shownotes.php?group_id=140317&release_id=456313 -CVE-2006-5676 - https://www.exploit-db.com/exploits/2661 -CVE-2006-5677 - http://securityreason.com/securityalert/1820 -CVE-2006-5678 - http://securityreason.com/securityalert/1810 -CVE-2006-5702 - http://securityreason.com/securityalert/1816 -CVE-2006-5703 - http://securityreason.com/securityalert/1816 -CVE-2006-5707 - http://securityreason.com/securityalert/1814 -CVE-2006-5707 - https://www.exploit-db.com/exploits/2675 -CVE-2006-5711 - http://securityreason.com/securityalert/1817 -CVE-2006-5712 - http://marc.info/?l=full-disclosure&m=116232831525086&w=2 -CVE-2006-5714 - https://www.exploit-db.com/exploits/2690 -CVE-2006-5715 - https://www.exploit-db.com/exploits/2699 -CVE-2006-5716 - http://securityreason.com/securityalert/1822 -CVE-2006-5717 - http://securityreason.com/securityalert/1815 -CVE-2006-5719 - http://securityreason.com/securityalert/1813 -CVE-2006-5720 - http://securityreason.com/securityalert/1812 -CVE-2006-5721 - http://securityreason.com/securityalert/1821 -CVE-2006-5724 - http://securityreason.com/securityalert/1818 -CVE-2006-5725 - https://www.exploit-db.com/exploits/2637 -CVE-2006-5727 - https://www.exploit-db.com/exploits/2718 -CVE-2006-5728 - https://www.exploit-db.com/exploits/2715 -CVE-2006-5730 - https://www.exploit-db.com/exploits/2706 -CVE-2006-5731 - https://www.exploit-db.com/exploits/2702 -CVE-2006-5732 - https://www.exploit-db.com/exploits/2694 -CVE-2006-5733 - https://www.exploit-db.com/exploits/2707 -CVE-2006-5734 - http://securityreason.com/securityalert/1823 -CVE-2006-5735 - http://securityreason.com/securityalert/1824 -CVE-2006-5736 - http://securityreason.com/securityalert/1824 -CVE-2006-5740 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9482 -CVE-2006-5745 - https://www.exploit-db.com/exploits/2743 -CVE-2006-5747 - http://www.ubuntu.com/usn/usn-382-1 -CVE-2006-5747 - https://bugzilla.mozilla.org/show_bug.cgi?id=355569 -CVE-2006-5748 - http://www.ubuntu.com/usn/usn-382-1 -CVE-2006-5749 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html -CVE-2006-5752 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2006-5753 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html -CVE-2006-5753 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371 -CVE-2006-5755 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9554 -CVE-2006-5758 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson -CVE-2006-5758 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2006-5759 - http://securityreason.com/securityalert/1825 -CVE-2006-5760 - https://www.exploit-db.com/exploits/2717 -CVE-2006-5761 - http://securityreason.com/securityalert/1825 -CVE-2006-5762 - https://www.exploit-db.com/exploits/2670 -CVE-2006-5762 - https://www.exploit-db.com/exploits/3568 -CVE-2006-5763 - https://www.exploit-db.com/exploits/3568 -CVE-2006-5765 - http://securityreason.com/securityalert/1826 -CVE-2006-5766 - https://www.exploit-db.com/exploits/2703 -CVE-2006-5767 - https://www.exploit-db.com/exploits/2713 -CVE-2006-5768 - http://marc.info/?l=bugtraq&m=116283724113571&w=2 -CVE-2006-5768 - https://www.exploit-db.com/exploits/2725 -CVE-2006-5772 - https://www.exploit-db.com/exploits/2704 -CVE-2006-5773 - https://www.exploit-db.com/exploits/2704 -CVE-2006-5776 - http://securityreason.com/securityalert/1827 -CVE-2006-5777 - https://www.exploit-db.com/exploits/2709 -CVE-2006-5779 - http://securityreason.com/securityalert/1831 -CVE-2006-5780 - http://securityreason.com/securityalert/1831 -CVE-2006-5780 - https://www.exploit-db.com/exploits/2729 -CVE-2006-5782 - http://securityreason.com/securityalert/1842 -CVE-2006-5784 - http://securityreason.com/securityalert/1828 -CVE-2006-5784 - https://www.exploit-db.com/exploits/3291 -CVE-2006-5785 - http://securityreason.com/securityalert/1828 -CVE-2006-5786 - https://www.exploit-db.com/exploits/2711 -CVE-2006-5787 - https://www.exploit-db.com/exploits/2731 -CVE-2006-5788 - https://www.exploit-db.com/exploits/2739 -CVE-2006-5789 - http://securityreason.com/securityalert/1832 -CVE-2006-5790 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392016 -CVE-2006-5791 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392016 -CVE-2006-5793 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2006-5795 - http://securityreason.com/securityalert/1834 -CVE-2006-5795 - https://www.exploit-db.com/exploits/2727 -CVE-2006-5796 - http://marc.info/?l=bugtraq&m=116283614914510&w=2 -CVE-2006-5796 - https://www.exploit-db.com/exploits/2724 -CVE-2006-5802 - https://www.exploit-db.com/exploits/2722 -CVE-2006-5803 - https://www.exploit-db.com/exploits/2723 -CVE-2006-5804 - http://securityreason.com/securityalert/1833 -CVE-2006-5811 - http://securityreason.com/securityalert/1844 -CVE-2006-5811 - https://www.exploit-db.com/exploits/2727 -CVE-2006-5816 - http://securityreason.com/securityalert/1836 -CVE-2006-5820 - http://securityreason.com/securityalert/2513 -CVE-2006-5825 - http://securityreason.com/securityalert/1838 -CVE-2006-5826 - http://marc.info/?l=full-disclosure&m=116289234522958&w=2 -CVE-2006-5826 - http://marc.info/?l=full-disclosure&m=116295408114746&w=2 -CVE-2006-5826 - http://securityreason.com/securityalert/1837 -CVE-2006-5826 - https://www.exploit-db.com/exploits/2734 -CVE-2006-5827 - http://securityreason.com/securityalert/1843 -CVE-2006-5828 - https://www.exploit-db.com/exploits/2720 -CVE-2006-5829 - http://securityreason.com/securityalert/1839 -CVE-2006-5830 - http://securityreason.com/securityalert/1839 -CVE-2006-5831 - http://securityreason.com/securityalert/1839 -CVE-2006-5832 - http://securityreason.com/securityalert/1839 -CVE-2006-5833 - http://securityreason.com/securityalert/1841 -CVE-2006-5834 - https://www.exploit-db.com/exploits/2719 -CVE-2006-5837 - https://www.exploit-db.com/exploits/2733 -CVE-2006-5838 - http://securityreason.com/securityalert/1835 -CVE-2006-5839 - https://www.exploit-db.com/exploits/2736 -CVE-2006-5840 - http://securityreason.com/securityalert/1840 -CVE-2006-5841 - https://www.exploit-db.com/exploits/2742 -CVE-2006-5846 - http://marc.info/?l=bugtraq&m=116303405916694&w=2 -CVE-2006-5847 - http://marc.info/?l=bugtraq&m=116303405916694&w=2 -CVE-2006-5849 - https://www.exploit-db.com/exploits/2741 -CVE-2006-5850 - http://securityreason.com/securityalert/1846 -CVE-2006-5850 - https://www.exploit-db.com/exploits/2716 -CVE-2006-5851 - https://www.exploit-db.com/exploits/2737 -CVE-2006-5852 - https://www.exploit-db.com/exploits/2738 -CVE-2006-5853 - http://securityreason.com/securityalert/1845 -CVE-2006-5857 - http://www.piotrbania.com/all/adv/adobe-acrobat-adv.txt -CVE-2006-5863 - https://www.exploit-db.com/exploits/2782 -CVE-2006-5864 - https://www.exploit-db.com/exploits/2858 -CVE-2006-5865 - https://www.exploit-db.com/exploits/2747 -CVE-2006-5866 - http://www.securityfocus.com/archive/1/451318/100/0/threaded -CVE-2006-5866 - https://www.exploit-db.com/exploits/2748 -CVE-2006-5870 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9145 -CVE-2006-5878 - http://trac.edgewall.org/ticket/4049 -CVE-2006-5879 - https://www.exploit-db.com/exploits/2762 -CVE-2006-5880 - https://www.exploit-db.com/exploits/2761 -CVE-2006-5881 - http://securityreason.com/securityalert/1853 -CVE-2006-5881 - https://www.exploit-db.com/exploits/2754 -CVE-2006-5883 - http://securityreason.com/securityalert/1847 -CVE-2006-5884 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -CVE-2006-5885 - http://securityreason.com/securityalert/1856 -CVE-2006-5885 - https://www.exploit-db.com/exploits/2756 -CVE-2006-5886 - http://securityreason.com/securityalert/1850 -CVE-2006-5886 - https://www.exploit-db.com/exploits/2755 -CVE-2006-5887 - http://securityreason.com/securityalert/1855 -CVE-2006-5887 - https://www.exploit-db.com/exploits/2757 -CVE-2006-5888 - https://www.exploit-db.com/exploits/2765 -CVE-2006-5889 - https://www.exploit-db.com/exploits/2751 -CVE-2006-5890 - https://www.exploit-db.com/exploits/2764 -CVE-2006-5891 - http://securityreason.com/securityalert/1851 -CVE-2006-5891 - https://www.exploit-db.com/exploits/2763 -CVE-2006-5892 - https://www.exploit-db.com/exploits/2746 -CVE-2006-5893 - https://www.exploit-db.com/exploits/2767 -CVE-2006-5894 - https://www.exploit-db.com/exploits/2760 -CVE-2006-5895 - http://securityreason.com/securityalert/1848 -CVE-2006-5895 - https://www.exploit-db.com/exploits/2750 -CVE-2006-5897 - http://securityreason.com/securityalert/1854 -CVE-2006-5898 - http://securityreason.com/securityalert/1852 -CVE-2006-5900 - http://securityreason.com/securityalert/1863 -CVE-2006-5901 - http://securityreason.com/securityalert/1860 -CVE-2006-5904 - http://securityreason.com/securityalert/1849 -CVE-2006-5905 - http://securityreason.com/securityalert/1859 -CVE-2006-5905 - https://www.exploit-db.com/exploits/8878 -CVE-2006-5908 - http://securityreason.com/securityalert/1866 -CVE-2006-5914 - http://securityreason.com/securityalert/1864 -CVE-2006-5915 - http://securityreason.com/securityalert/1864 -CVE-2006-5917 - http://securityreason.com/securityalert/1865 -CVE-2006-5918 - http://securityreason.com/securityalert/1862 -CVE-2006-5919 - http://securityreason.com/securityalert/1861 -CVE-2006-5919 - https://www.exploit-db.com/exploits/2364 -CVE-2006-5920 - http://securityreason.com/securityalert/1858 -CVE-2006-5921 - http://securityreason.com/securityalert/1867 -CVE-2006-5922 - http://securityreason.com/securityalert/1867 -CVE-2006-5923 - https://www.exploit-db.com/exploits/2745 -CVE-2006-5927 - http://securityreason.com/securityalert/1874 -CVE-2006-5928 - http://securityreason.com/securityalert/1869 -CVE-2006-5928 - https://www.exploit-db.com/exploits/2775 -CVE-2006-5930 - http://securityreason.com/securityalert/1868 -CVE-2006-5930 - https://www.exploit-db.com/exploits/2777 -CVE-2006-5933 - http://securityreason.com/securityalert/1873 -CVE-2006-5934 - http://securityreason.com/securityalert/1872 -CVE-2006-5934 - https://www.exploit-db.com/exploits/2773 -CVE-2006-5935 - http://securityreason.com/securityalert/1871 -CVE-2006-5936 - http://securityreason.com/securityalert/1870 -CVE-2006-5937 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 -CVE-2006-5938 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 -CVE-2006-5939 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 -CVE-2006-5940 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 -CVE-2006-5942 - http://securityreason.com/securityalert/1875 -CVE-2006-5943 - http://securityreason.com/securityalert/1875 -CVE-2006-5944 - http://securityreason.com/securityalert/1876 -CVE-2006-5945 - http://securityreason.com/securityalert/1876 -CVE-2006-5946 - http://securityreason.com/securityalert/1877 -CVE-2006-5948 - https://www.exploit-db.com/exploits/2778 -CVE-2006-5951 - http://securityreason.com/securityalert/1878 -CVE-2006-5952 - https://www.exploit-db.com/exploits/2779 -CVE-2006-5954 - https://www.exploit-db.com/exploits/2780 -CVE-2006-5957 - http://securityreason.com/securityalert/1881 -CVE-2006-5958 - http://securityreason.com/securityalert/1881 -CVE-2006-5959 - http://securityreason.com/securityalert/1880 -CVE-2006-5960 - http://securityreason.com/securityalert/1880 -CVE-2006-5962 - http://securityreason.com/securityalert/1879 -CVE-2006-5962 - https://www.exploit-db.com/exploits/2782 -CVE-2006-5968 - http://securityreason.com/securityalert/1890 -CVE-2006-5975 - http://securityreason.com/securityalert/1882 -CVE-2006-5975 - https://www.exploit-db.com/exploits/2781 -CVE-2006-5976 - http://securityreason.com/securityalert/1882 -CVE-2006-5976 - https://www.exploit-db.com/exploits/2781 -CVE-2006-5977 - http://securityreason.com/securityalert/1883 -CVE-2006-5983 - http://securityreason.com/securityalert/1885 -CVE-2006-5984 - http://securityreason.com/securityalert/1884 -CVE-2006-5987 - http://securityreason.com/securityalert/1886 -CVE-2006-5991 - http://securityreason.com/securityalert/1887 -CVE-2006-5994 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9005698&intsrc=hm_list -CVE-2006-5994 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 -CVE-2006-6007 - http://securityreason.com/securityalert/1888 -CVE-2006-6010 - http://securityreason.com/securityalert/1889 -CVE-2006-6011 - http://securityreason.com/securityalert/1889 -CVE-2006-6018 - http://securityreason.com/securityalert/1891 -CVE-2006-6020 - http://securityreason.com/securityalert/1895 -CVE-2006-6021 - http://securityreason.com/securityalert/1898 -CVE-2006-6022 - http://securityreason.com/securityalert/1898 -CVE-2006-6023 - http://securityreason.com/securityalert/1893 -CVE-2006-6026 - http://www.attrition.org/pipermail/vim/2007-March/001459.html -CVE-2006-6026 - https://www.exploit-db.com/exploits/3531 -CVE-2006-6028 - https://www.exploit-db.com/exploits/2795 -CVE-2006-6029 - http://securityreason.com/securityalert/1894 -CVE-2006-6030 - http://securityreason.com/securityalert/1897 -CVE-2006-6031 - http://securityreason.com/securityalert/1899 -CVE-2006-6032 - http://securityreason.com/securityalert/1896 -CVE-2006-6033 - http://securityreason.com/securityalert/1892 -CVE-2006-6035 - http://marc.info/?l=bugtraq&m=116387287216907&w=2 -CVE-2006-6036 - http://freshmeat.net/projects/openhuman/?branch_id=67092&release_id=240896 -CVE-2006-6038 - https://www.exploit-db.com/exploits/2797 -CVE-2006-6039 - https://www.exploit-db.com/exploits/2798 -CVE-2006-6041 - https://www.exploit-db.com/exploits/2752 -CVE-2006-6042 - https://www.exploit-db.com/exploits/2811 -CVE-2006-6044 - https://www.exploit-db.com/exploits/2814 -CVE-2006-6046 - http://marc.info/?l=bugtraq&m=116373125308955&w=2 -CVE-2006-6047 - https://www.exploit-db.com/exploits/2790 -CVE-2006-6051 - https://www.exploit-db.com/exploits/2807 -CVE-2006-6056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9949 -CVE-2006-6061 - http://www.kb.cert.org/vuls/id/367424 -CVE-2006-6063 - https://www.exploit-db.com/exploits/2815 -CVE-2006-6065 - https://www.exploit-db.com/exploits/2799 -CVE-2006-6070 - https://www.exploit-db.com/exploits/2813 -CVE-2006-6073 - http://marc.info/?l=bugtraq&m=116353137028066&w=2 -CVE-2006-6077 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2006-6077 - https://bugzilla.mozilla.org/show_bug.cgi?id=360493 -CVE-2006-6078 - https://www.exploit-db.com/exploits/2831 -CVE-2006-6080 - http://securityreason.com/securityalert/1908 -CVE-2006-6086 - https://www.exploit-db.com/exploits/2818 -CVE-2006-6087 - http://securityreason.com/securityalert/1919 -CVE-2006-6088 - http://securityreason.com/securityalert/1912 -CVE-2006-6093 - https://www.exploit-db.com/exploits/2817 -CVE-2006-6095 - http://marc.info/?l=bugtraq&m=116387481223790&w=2 -CVE-2006-6096 - http://marc.info/?l=bugtraq&m=116387481223790&w=2 -CVE-2006-6097 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html -CVE-2006-6102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991 -CVE-2006-6106 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html -CVE-2006-6107 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9951 -CVE-2006-6115 - https://www.exploit-db.com/exploits/2828 -CVE-2006-6116 - https://www.exploit-db.com/exploits/2830 -CVE-2006-6117 - https://www.exploit-db.com/exploits/2829 -CVE-2006-6121 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2006-6133 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-052 -CVE-2006-6134 - http://www.kb.cert.org/vuls/id/208769 -CVE-2006-6134 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 -CVE-2006-6137 - https://www.exploit-db.com/exploits/2847 -CVE-2006-6138 - https://www.exploit-db.com/exploits/2847 -CVE-2006-6142 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9988 -CVE-2006-6149 - https://www.exploit-db.com/exploits/2836 -CVE-2006-6150 - https://www.exploit-db.com/exploits/2839 -CVE-2006-6154 - https://www.exploit-db.com/exploits/2838 -CVE-2006-6157 - https://www.exploit-db.com/exploits/2822 -CVE-2006-6160 - https://www.exploit-db.com/exploits/2846 -CVE-2006-6161 - https://www.exploit-db.com/exploits/7493 -CVE-2006-6169 - http://www.redhat.com/support/errata/RHSA-2006-0754.html -CVE-2006-6177 - http://www.nukedx.com/?getxpl=52 -CVE-2006-6177 - http://www.nukedx.com/?viewdoc=52 -CVE-2006-6184 - http://www.exploit-db.com/exploits/24952 -CVE-2006-6185 - http://securityreason.com/securityalert/1939 -CVE-2006-6186 - http://securityreason.com/securityalert/1940 -CVE-2006-6187 - http://securityreason.com/securityalert/1937 -CVE-2006-6188 - http://securityreason.com/securityalert/1937 -CVE-2006-6191 - https://www.exploit-db.com/exploits/2853 -CVE-2006-6193 - https://www.exploit-db.com/exploits/2848 -CVE-2006-6194 - http://securityreason.com/securityalert/1936 -CVE-2006-6196 - http://securityreason.com/securityalert/1941 -CVE-2006-6199 - https://www.exploit-db.com/exploits/2880 -CVE-2006-6200 - http://securityreason.com/securityalert/1935 -CVE-2006-6202 - https://www.exploit-db.com/exploits/2843 -CVE-2006-6203 - https://www.exploit-db.com/exploits/2852 -CVE-2006-6207 - http://securityreason.com/securityalert/1933 -CVE-2006-6209 - http://securityreason.com/securityalert/1947 -CVE-2006-6211 - http://securityreason.com/securityalert/1945 -CVE-2006-6213 - https://www.exploit-db.com/exploits/2840 -CVE-2006-6214 - https://www.exploit-db.com/exploits/2835 -CVE-2006-6216 - https://www.exploit-db.com/exploits/2851 -CVE-2006-6220 - https://www.exploit-db.com/exploits/2834 -CVE-2006-6222 - http://securityreason.com/securityalert/2033 -CVE-2006-6225 - https://www.exploit-db.com/exploits/1963 -CVE-2006-6226 - http://aluigi.altervista.org/adv/neoenginex-adv.txt -CVE-2006-6227 - http://aluigi.altervista.org/adv/neoenginex-adv.txt -CVE-2006-6235 - http://www.redhat.com/support/errata/RHSA-2006-0754.html -CVE-2006-6236 - https://www.exploit-db.com/exploits/3040 -CVE-2006-6237 - https://www.exploit-db.com/exploits/2841 -CVE-2006-6242 - https://www.exploit-db.com/exploits/2869 -CVE-2006-6243 - http://securityreason.com/securityalert/1959 -CVE-2006-6247 - http://securityreason.com/securityalert/1950 -CVE-2006-6250 - https://www.exploit-db.com/exploits/2861 -CVE-2006-6251 - https://www.exploit-db.com/exploits/2870 -CVE-2006-6251 - https://www.exploit-db.com/exploits/2872 -CVE-2006-6253 - http://securityreason.com/securityalert/1961 -CVE-2006-6254 - http://securityreason.com/securityalert/1961 -CVE-2006-6255 - https://www.exploit-db.com/exploits/2843 -CVE-2006-6261 - https://www.exploit-db.com/exploits/2860 -CVE-2006-6268 - http://www.nukedx.com/?viewdoc=51 -CVE-2006-6271 - http://securityreason.com/securityalert/1960 -CVE-2006-6274 - http://attrition.org/pipermail/vim/2006-November/001147.html -CVE-2006-6274 - http://securityreason.com/securityalert/1956 -CVE-2006-6285 - http://attrition.org/pipermail/vim/2006-December/001159.html -CVE-2006-6285 - https://www.exploit-db.com/exploits/2868 -CVE-2006-6287 - https://www.exploit-db.com/exploits/2873 -CVE-2006-6288 - http://www.securityfocus.com/archive/1/485564/100/100/threaded -CVE-2006-6288 - https://www.exploit-db.com/exploits/4839 -CVE-2006-6293 - https://www.exploit-db.com/exploits/2893 -CVE-2006-6295 - https://www.exploit-db.com/exploits/2885 -CVE-2006-6296 - https://www.exploit-db.com/exploits/2879 -CVE-2006-6311 - http://securityreason.com/securityalert/1968 -CVE-2006-6328 - https://www.exploit-db.com/exploits/2786 -CVE-2006-6329 - https://www.exploit-db.com/exploits/2786 -CVE-2006-6330 - https://www.exploit-db.com/exploits/2786 -CVE-2006-6334 - https://www.exploit-db.com/exploits/5106 -CVE-2006-6341 - https://www.exploit-db.com/exploits/2794 -CVE-2006-6349 - https://www.exploit-db.com/exploits/3015 -CVE-2006-6352 - http://securityreason.com/securityalert/1998 -CVE-2006-6352 - https://www.exploit-db.com/exploits/2892 -CVE-2006-6355 - http://securityreason.com/securityalert/1997 -CVE-2006-6358 - http://marc.info/?l=bugtraq&m=116525508018486&w=2 -CVE-2006-6359 - http://marc.info/?l=bugtraq&m=116525508018486&w=2 -CVE-2006-6360 - https://www.exploit-db.com/exploits/2886 -CVE-2006-6363 - http://securityreason.com/securityalert/1991 -CVE-2006-6364 - http://securityreason.com/securityalert/1990 -CVE-2006-6367 - http://marc.info/?l=bugtraq&m=116508632603388&w=2 -CVE-2006-6368 - https://www.exploit-db.com/exploits/2884 -CVE-2006-6376 - https://www.exploit-db.com/exploits/2883 -CVE-2006-6377 - http://www.securityfocus.com/archive/1/453644/100/0/threaded -CVE-2006-6380 - https://www.exploit-db.com/exploits/2881 -CVE-2006-6381 - https://www.exploit-db.com/exploits/2881 -CVE-2006-6390 - https://www.exploit-db.com/exploits/2889 -CVE-2006-6396 - https://www.exploit-db.com/exploits/2880 -CVE-2006-6405 - http://www.quantenblog.net/security/virus-scanner-bypass -CVE-2006-6406 - http://www.quantenblog.net/security/virus-scanner-bypass -CVE-2006-6407 - http://www.quantenblog.net/security/virus-scanner-bypass -CVE-2006-6408 - http://www.quantenblog.net/security/virus-scanner-bypass -CVE-2006-6409 - http://www.quantenblog.net/security/virus-scanner-bypass -CVE-2006-6410 - https://www.exploit-db.com/exploits/2264 -CVE-2006-6418 - http://www.netragard.com/pdfs/research/HP-TRU64-LIBPTHREAD-20060811.txt -CVE-2006-6421 - http://securityreason.com/securityalert/2005 -CVE-2006-6426 - https://www.exploit-db.com/exploits/2898 -CVE-2006-6445 - https://www.exploit-db.com/exploits/2888 -CVE-2006-6453 - https://www.exploit-db.com/exploits/2895 -CVE-2006-6456 - http://isc.sans.org/diary.php?storyid=1925 -CVE-2006-6456 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 -CVE-2006-6462 - https://www.exploit-db.com/exploits/2897 -CVE-2006-6463 - http://securityreason.com/securityalert/2016 -CVE-2006-6464 - http://securityreason.com/securityalert/2016 -CVE-2006-6465 - https://www.exploit-db.com/exploits/2875 -CVE-2006-6475 - http://securityreason.com/securityalert/2052 -CVE-2006-6476 - http://securityreason.com/securityalert/2052 -CVE-2006-6477 - http://securityreason.com/securityalert/2052 -CVE-2006-6481 - http://www.quantenblog.net/security/virus-scanner-bypass -CVE-2006-6485 - http://securityreason.com/securityalert/2020 -CVE-2006-6501 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9746 -CVE-2006-6502 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9626 -CVE-2006-6512 - http://securityreason.com/securityalert/2032 -CVE-2006-6513 - http://securityreason.com/securityalert/2032 -CVE-2006-6514 - http://securityreason.com/securityalert/2032 -CVE-2006-6516 - https://www.exploit-db.com/exploits/3263 -CVE-2006-6518 - http://securityreason.com/securityalert/2025 -CVE-2006-6519 - http://securityreason.com/securityalert/2025 -CVE-2006-6520 - http://securityreason.com/securityalert/2026 -CVE-2006-6521 - http://securityreason.com/securityalert/2026 -CVE-2006-6523 - http://securityreason.com/securityalert/2028 -CVE-2006-6524 - https://www.exploit-db.com/exploits/2909 -CVE-2006-6526 - https://www.exploit-db.com/exploits/2905 -CVE-2006-6537 - http://securityreason.com/securityalert/2030 -CVE-2006-6538 - http://securityreason.com/securityalert/2029 -CVE-2006-6538 - https://www.exploit-db.com/exploits/2915 -CVE-2006-6539 - http://securityreason.com/securityalert/2032 -CVE-2006-6541 - http://securityreason.com/securityalert/2031 -CVE-2006-6542 - https://www.exploit-db.com/exploits/2906 -CVE-2006-6543 - https://www.exploit-db.com/exploits/2907 -CVE-2006-6545 - https://www.exploit-db.com/exploits/2917 -CVE-2006-6546 - https://www.exploit-db.com/exploits/2891 -CVE-2006-6547 - http://aluigi.altervista.org/adv/mlipodbof-adv.txt -CVE-2006-6549 - http://securityreason.com/securityalert/2034 -CVE-2006-6550 - https://www.exploit-db.com/exploits/2894 -CVE-2006-6551 - https://www.exploit-db.com/exploits/2896 -CVE-2006-6552 - https://www.exploit-db.com/exploits/2923 -CVE-2006-6553 - https://www.exploit-db.com/exploits/2925 -CVE-2006-6558 - https://www.exploit-db.com/exploits/2926 -CVE-2006-6559 - https://www.exploit-db.com/exploits/2908 -CVE-2006-6560 - https://www.exploit-db.com/exploits/2921 -CVE-2006-6563 - https://www.exploit-db.com/exploits/3330 -CVE-2006-6565 - https://www.exploit-db.com/exploits/2914 -CVE-2006-6566 - https://www.exploit-db.com/exploits/2904 -CVE-2006-6566 - https://www.exploit-db.com/exploits/2918 -CVE-2006-6567 - https://www.exploit-db.com/exploits/2924 -CVE-2006-6568 - https://www.exploit-db.com/exploits/2924 -CVE-2006-6569 - http://securityreason.com/securityalert/2035 -CVE-2006-6570 - http://securityreason.com/securityalert/2035 -CVE-2006-6571 - http://securityreason.com/securityalert/2035 -CVE-2006-6575 - https://www.exploit-db.com/exploits/2930 -CVE-2006-6576 - http://packetstormsecurity.com/files/161711/Golden-FTP-Server-4.70-Buffer-Overflow.html -CVE-2006-6577 - http://securityreason.com/securityalert/2037 -CVE-2006-6578 - http://securityreason.com/securityalert/2036 -CVE-2006-6585 - http://securityreason.com/securityalert/2046 -CVE-2006-6586 - https://www.exploit-db.com/exploits/2740 -CVE-2006-6590 - https://www.exploit-db.com/exploits/2931 -CVE-2006-6592 - http://securityreason.com/securityalert/2039 -CVE-2006-6593 - http://securityreason.com/securityalert/2038 -CVE-2006-6598 - https://www.exploit-db.com/exploits/2902 -CVE-2006-6599 - https://www.exploit-db.com/exploits/2903 -CVE-2006-6603 - http://messenger.yahoo.com/security_update.php?id=120806 -CVE-2006-6604 - https://www.exploit-db.com/exploits/2902 -CVE-2006-6605 - http://securityreason.com/securityalert/2053 -CVE-2006-6611 - https://www.exploit-db.com/exploits/2920 -CVE-2006-6612 - https://www.exploit-db.com/exploits/2927 -CVE-2006-6613 - https://www.exploit-db.com/exploits/2913 -CVE-2006-6615 - https://www.exploit-db.com/exploits/2919 -CVE-2006-6624 - https://www.exploit-db.com/exploits/2934 -CVE-2006-6627 - http://securityreason.com/securityalert/2044 -CVE-2006-6631 - https://www.exploit-db.com/exploits/2572 -CVE-2006-6632 - https://www.exploit-db.com/exploits/2539 -CVE-2006-6633 - https://www.exploit-db.com/exploits/2594 -CVE-2006-6635 - https://www.exploit-db.com/exploits/2628 -CVE-2006-6640 - http://securityreason.com/securityalert/2048 -CVE-2006-6642 - http://securityreason.com/securityalert/2050 -CVE-2006-6643 - https://www.exploit-db.com/exploits/2942 -CVE-2006-6644 - https://www.exploit-db.com/exploits/2941 -CVE-2006-6645 - https://www.exploit-db.com/exploits/2939 -CVE-2006-6649 - http://securityreason.com/securityalert/2051 -CVE-2006-6650 - https://www.exploit-db.com/exploits/2940 -CVE-2006-6661 - https://www.exploit-db.com/exploits/2953 -CVE-2006-6665 - https://www.exploit-db.com/exploits/2950 -CVE-2006-6666 - https://www.exploit-db.com/exploits/2944 -CVE-2006-6669 - http://securityreason.com/securityalert/2054 -CVE-2006-6671 - http://securityreason.com/securityalert/2055 -CVE-2006-6673 - https://www.exploit-db.com/exploits/2952 -CVE-2006-6676 - http://securityreason.com/securityalert/2079 -CVE-2006-6677 - http://securityreason.com/securityalert/2079 -CVE-2006-6686 - https://www.exploit-db.com/exploits/2965 -CVE-2006-6690 - http://securityreason.com/securityalert/2056 -CVE-2006-6691 - https://www.exploit-db.com/exploits/2964 -CVE-2006-6694 - https://www.exploit-db.com/exploits/2556 -CVE-2006-6696 - http://isc.sans.org/diary.php?n&storyid=1965 -CVE-2006-6696 - http://www.security.nnov.ru/Gnews944.html -CVE-2006-6696 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 -CVE-2006-6697 - http://securityreason.com/securityalert/2057 -CVE-2006-6701 - http://www.netragard.com/pdfs/research/ATMAIL-XSRF-ADVISORY-20061206.txt -CVE-2006-6710 - https://www.exploit-db.com/exploits/2971 -CVE-2006-6711 - https://www.exploit-db.com/exploits/2970 -CVE-2006-6715 - https://www.exploit-db.com/exploits/2973 -CVE-2006-6716 - https://www.exploit-db.com/exploits/2945 -CVE-2006-6719 - https://www.exploit-db.com/exploits/2947 -CVE-2006-6720 - https://www.exploit-db.com/exploits/2943 -CVE-2006-6722 - https://www.exploit-db.com/exploits/2938 -CVE-2006-6723 - https://www.exploit-db.com/exploits/3013 -CVE-2006-6724 - https://www.exploit-db.com/exploits/2972 -CVE-2006-6726 - https://www.exploit-db.com/exploits/2976 -CVE-2006-6731 - http://www.redhat.com/support/errata/RHSA-2007-0073.html -CVE-2006-6732 - https://www.exploit-db.com/exploits/2958 -CVE-2006-6736 - http://www.redhat.com/support/errata/RHSA-2007-0073.html -CVE-2006-6736 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9729 -CVE-2006-6737 - http://www.redhat.com/support/errata/RHSA-2007-0073.html -CVE-2006-6738 - https://www.exploit-db.com/exploits/2960 -CVE-2006-6739 - https://www.exploit-db.com/exploits/2955 -CVE-2006-6740 - https://www.exploit-db.com/exploits/2956 -CVE-2006-6742 - http://securityreason.com/securityalert/2074 -CVE-2006-6745 - http://www.redhat.com/support/errata/RHSA-2007-0073.html -CVE-2006-6745 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9621 -CVE-2006-6746 - http://securityreason.com/securityalert/2058 -CVE-2006-6747 - http://securityreason.com/securityalert/2058 -CVE-2006-6754 - http://securityreason.com/securityalert/2073 -CVE-2006-6755 - http://securityreason.com/securityalert/2073 -CVE-2006-6755 - https://www.exploit-db.com/exploits/2975 -CVE-2006-6756 - http://securityreason.com/securityalert/2073 -CVE-2006-6756 - https://www.exploit-db.com/exploits/2975 -CVE-2006-6757 - https://www.exploit-db.com/exploits/2963 -CVE-2006-6758 - https://www.exploit-db.com/exploits/2974 -CVE-2006-6759 - https://www.exploit-db.com/exploits/2966 -CVE-2006-6760 - https://www.exploit-db.com/exploits/2578 -CVE-2006-6764 - https://www.exploit-db.com/exploits/2979 -CVE-2006-6765 - https://www.exploit-db.com/exploits/3000 -CVE-2006-6770 - https://www.exploit-db.com/exploits/3003 -CVE-2006-6771 - https://www.exploit-db.com/exploits/3007 -CVE-2006-6773 - http://securityreason.com/securityalert/2077 -CVE-2006-6774 - https://www.exploit-db.com/exploits/3008 -CVE-2006-6775 - https://www.exploit-db.com/exploits/2985 -CVE-2006-6778 - http://securityreason.com/securityalert/2062 -CVE-2006-6780 - https://www.exploit-db.com/exploits/3002 -CVE-2006-6781 - https://www.exploit-db.com/exploits/3002 -CVE-2006-6783 - http://securityreason.com/securityalert/2071 -CVE-2006-6785 - https://www.exploit-db.com/exploits/2981 -CVE-2006-6786 - https://www.exploit-db.com/exploits/2981 -CVE-2006-6787 - https://www.exploit-db.com/exploits/2998 -CVE-2006-6792 - https://www.exploit-db.com/exploits/2993 -CVE-2006-6795 - https://www.exploit-db.com/exploits/3010 -CVE-2006-6796 - https://www.exploit-db.com/exploits/3005 -CVE-2006-6797 - http://www.kb.cert.org/vuls/id/740636 -CVE-2006-6797 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 -CVE-2006-6799 - https://www.exploit-db.com/exploits/3029 -CVE-2006-6800 - http://securityreason.com/securityalert/2059 -CVE-2006-6800 - https://www.exploit-db.com/exploits/3028 -CVE-2006-6801 - https://www.exploit-db.com/exploits/2984 -CVE-2006-6802 - https://www.exploit-db.com/exploits/2991 -CVE-2006-6803 - https://www.exploit-db.com/exploits/2989 -CVE-2006-6804 - https://www.exploit-db.com/exploits/2992 -CVE-2006-6805 - https://www.exploit-db.com/exploits/2988 -CVE-2006-6806 - https://www.exploit-db.com/exploits/2990 -CVE-2006-6807 - https://www.exploit-db.com/exploits/3001 -CVE-2006-6809 - https://www.exploit-db.com/exploits/3026 -CVE-2006-6811 - http://www.kde.org/info/security/advisory-20070109-1.txt -CVE-2006-6811 - https://www.exploit-db.com/exploits/3023 -CVE-2006-6812 - https://www.exploit-db.com/exploits/3019 -CVE-2006-6813 - https://www.exploit-db.com/exploits/2997 -CVE-2006-6820 - https://www.exploit-db.com/exploits/2995 -CVE-2006-6821 - https://www.exploit-db.com/exploits/2996 -CVE-2006-6822 - https://www.exploit-db.com/exploits/2994 -CVE-2006-6823 - https://www.exploit-db.com/exploits/3025 -CVE-2006-6824 - http://lostmon.blogspot.com/2006/12/php-icalendar-multiple-variable-cross.html -CVE-2006-6827 - https://www.exploit-db.com/exploits/3041 -CVE-2006-6830 - https://www.exploit-db.com/exploits/2983 -CVE-2006-6831 - https://www.exploit-db.com/exploits/3031 -CVE-2006-6837 - http://vuln.sg/isowincmd173-en.html -CVE-2006-6837 - http://vuln.sg/isowincmd173-jp.html -CVE-2006-6838 - http://securityreason.com/securityalert/2089 -CVE-2006-6842 - https://www.exploit-db.com/exploits/3033 -CVE-2006-6846 - https://www.exploit-db.com/exploits/3032 -CVE-2006-6847 - https://www.exploit-db.com/exploits/3030 -CVE-2006-6848 - https://www.exploit-db.com/exploits/3035 -CVE-2006-6849 - https://www.exploit-db.com/exploits/3016 -CVE-2006-6850 - https://www.exploit-db.com/exploits/3009 -CVE-2006-6853 - https://www.exploit-db.com/exploits/3037 -CVE-2006-6853 - https://www.exploit-db.com/exploits/3038 -CVE-2006-6855 - https://www.exploit-db.com/exploits/3034 -CVE-2006-6856 - https://www.exploit-db.com/exploits/3036 -CVE-2006-6859 - https://www.exploit-db.com/exploits/3048 -CVE-2006-6863 - https://www.exploit-db.com/exploits/3051 -CVE-2006-6864 - https://www.exploit-db.com/exploits/3050 -CVE-2006-6865 - https://www.exploit-db.com/exploits/3046 -CVE-2006-6866 - https://www.exploit-db.com/exploits/3039 -CVE-2006-6867 - https://www.exploit-db.com/exploits/3059 -CVE-2006-6869 - https://www.exploit-db.com/exploits/3057 -CVE-2006-6870 - http://www.ubuntu.com/usn/usn-402-1 -CVE-2006-6871 - https://www.exploit-db.com/exploits/3004 -CVE-2006-6872 - https://www.exploit-db.com/exploits/3004 -CVE-2006-6873 - https://www.exploit-db.com/exploits/3004 -CVE-2006-6877 - https://www.exploit-db.com/exploits/2982 -CVE-2006-6878 - https://www.exploit-db.com/exploits/3020 -CVE-2006-6879 - https://www.exploit-db.com/exploits/3017 -CVE-2006-6879 - https://www.exploit-db.com/exploits/3020 -CVE-2006-6880 - https://www.exploit-db.com/exploits/3017 -CVE-2006-6885 - https://www.exploit-db.com/exploits/3042 -CVE-2006-6888 - https://www.exploit-db.com/exploits/3054 -CVE-2006-6889 - https://www.exploit-db.com/exploits/3047 -CVE-2006-6890 - https://www.exploit-db.com/exploits/3044 -CVE-2006-6891 - https://www.exploit-db.com/exploits/3053 -CVE-2006-6910 - https://www.exploit-db.com/exploits/3056 -CVE-2006-6911 - https://www.exploit-db.com/exploits/3089 -CVE-2006-6917 - https://www.exploit-db.com/exploits/3086 -CVE-2006-6923 - http://securityreason.com/securityalert/2144 -CVE-2006-6924 - http://securityreason.com/securityalert/2144 -CVE-2006-6925 - http://securityreason.com/securityalert/2144 -CVE-2006-6927 - http://securityreason.com/securityalert/2143 -CVE-2006-6928 - http://securityreason.com/securityalert/2143 -CVE-2006-6929 - http://securityreason.com/securityalert/2142 -CVE-2006-6930 - http://securityreason.com/securityalert/2142 -CVE-2006-6932 - http://securityreason.com/securityalert/2147 -CVE-2006-6934 - http://securityreason.com/securityalert/2150 -CVE-2006-6935 - http://securityreason.com/securityalert/2150 -CVE-2006-6936 - http://securityreason.com/securityalert/2148 -CVE-2006-6937 - http://securityreason.com/securityalert/2148 -CVE-2006-6938 - https://www.exploit-db.com/exploits/2685 -CVE-2006-6941 - https://www.exploit-db.com/exploits/2704 -CVE-2006-6951 - http://securityreason.com/securityalert/2173 -CVE-2006-6957 - http://securityreason.com/securityalert/2194 -CVE-2006-6958 - http://packetstormsecurity.org/0606-exploits/phpbluedragon-2.txt -CVE-2006-6958 - http://securityreason.com/securityalert/2193 -CVE-2006-6959 - http://www.sentinel.gr/advisories/SGA-0001.txt -CVE-2006-6960 - http://www.sentinel.gr/advisories/SGA-0001.txt -CVE-2006-6961 - http://www.sentinel.gr/advisories/SGA-0001.txt -CVE-2006-6962 - https://www.exploit-db.com/exploits/1959 -CVE-2006-6963 - http://securityreason.com/securityalert/2188 -CVE-2006-6976 - https://www.exploit-db.com/exploits/2555 -CVE-2006-7007 - https://www.exploit-db.com/exploits/1758 -CVE-2006-7012 - http://securityreason.com/securityalert/2257 -CVE-2006-7012 - https://www.exploit-db.com/exploits/1876 -CVE-2006-7014 - http://securityreason.com/securityalert/2255 -CVE-2006-7022 - http://securityreason.com/securityalert/2251 -CVE-2006-7023 - http://securityreason.com/securityalert/2251 -CVE-2006-7024 - https://www.exploit-db.com/exploits/1943 -CVE-2006-7025 - http://marc.info/?l=full-disclosure&m=114555163911635&w=2 -CVE-2006-7025 - http://www.osvdb.org/24795 -CVE-2006-7026 - https://www.exploit-db.com/exploits/1730 -CVE-2006-7031 - https://www.exploit-db.com/exploits/1775 -CVE-2006-7032 - https://www.exploit-db.com/exploits/1921 -CVE-2006-7037 - http://securityreason.com/securityalert/2305 -CVE-2006-7051 - https://www.exploit-db.com/exploits/1657 -CVE-2006-7055 - https://www.exploit-db.com/exploits/1753 -CVE-2006-7059 - http://securityreason.com/securityalert/2300 -CVE-2006-7060 - http://securityreason.com/securityalert/2300 -CVE-2006-7061 - http://securityreason.com/securityalert/2300 -CVE-2006-7063 - https://www.exploit-db.com/exploits/1857 -CVE-2006-7067 - http://securityreason.com/securityalert/2328 -CVE-2006-7068 - https://www.exploit-db.com/exploits/2257 -CVE-2006-7069 - https://www.exploit-db.com/exploits/2336 -CVE-2006-7070 - http://securityreason.com/securityalert/2326 -CVE-2006-7070 - https://www.exploit-db.com/exploits/2072 -CVE-2006-7071 - http://securityreason.com/securityalert/2325 -CVE-2006-7071 - https://www.exploit-db.com/exploits/2010 -CVE-2006-7072 - http://securityreason.com/securityalert/2324 -CVE-2006-7073 - http://sourceforge.net/project/shownotes.php?group_id=66311&release_id=445469 -CVE-2006-7075 - http://aluigi.altervista.org/adv/aquabof-adv.txt -CVE-2006-7076 - http://securityreason.com/securityalert/2323 -CVE-2006-7077 - http://securityreason.com/securityalert/2323 -CVE-2006-7078 - http://securityreason.com/securityalert/2329 -CVE-2006-7079 - https://www.exploit-db.com/exploits/2415 -CVE-2006-7080 - https://www.exploit-db.com/exploits/2415 -CVE-2006-7081 - https://www.exploit-db.com/exploits/2323 -CVE-2006-7082 - http://securityreason.com/securityalert/2322 -CVE-2006-7083 - http://securityreason.com/securityalert/2322 -CVE-2006-7085 - http://securityreason.com/securityalert/2322 -CVE-2006-7090 - http://securityreason.com/securityalert/2327 -CVE-2006-7095 - http://aluigi.altervista.org/adv/dim3bof-adv.txt -CVE-2006-7096 - http://aluigi.altervista.org/adv/dim3bof-adv.txt -CVE-2006-7100 - https://www.exploit-db.com/exploits/2525 -CVE-2006-7101 - https://www.exploit-db.com/exploits/2759 -CVE-2006-7102 - https://www.exploit-db.com/exploits/2563 -CVE-2006-7106 - https://www.exploit-db.com/exploits/2602 -CVE-2006-7107 - https://www.exploit-db.com/exploits/2665 -CVE-2006-7108 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689 -CVE-2006-7112 - https://www.exploit-db.com/exploits/2712 -CVE-2006-7115 - http://securityreason.com/securityalert/2357 -CVE-2006-7116 - https://www.exploit-db.com/exploits/2863 -CVE-2006-7117 - https://www.exploit-db.com/exploits/2863 -CVE-2006-7118 - http://securityreason.com/securityalert/2358 -CVE-2006-7119 - https://www.exploit-db.com/exploits/2732 -CVE-2006-7127 - https://www.exploit-db.com/exploits/2474/ -CVE-2006-7127 - https://www.exploit-db.com/exploits/5317 -CVE-2006-7128 - https://www.exploit-db.com/exploits/2469 -CVE-2006-7130 - https://www.exploit-db.com/exploits/2512 -CVE-2006-7131 - https://www.exploit-db.com/exploits/2558 -CVE-2006-7132 - https://www.exploit-db.com/exploits/2664 -CVE-2006-7136 - https://www.exploit-db.com/exploits/2827 -CVE-2006-7147 - https://www.exploit-db.com/exploits/2531 -CVE-2006-7149 - http://securityreason.com/securityalert/2379 -CVE-2006-7150 - http://securityreason.com/securityalert/2379 -CVE-2006-7151 - http://securityreason.com/securityalert/2378 -CVE-2006-7152 - https://www.exploit-db.com/exploits/2849 -CVE-2006-7153 - http://securityreason.com/securityalert/2371 -CVE-2006-7156 - https://www.exploit-db.com/exploits/2528 -CVE-2006-7157 - http://securityreason.com/securityalert/2375 -CVE-2006-7159 - http://securityreason.com/securityalert/2377 -CVE-2006-7160 - http://securityreason.com/securityalert/2376 -CVE-2006-7161 - http://securityreason.com/securityalert/2374 -CVE-2006-7169 - https://www.exploit-db.com/exploits/2721 -CVE-2006-7172 - https://www.exploit-db.com/exploits/3496 -CVE-2006-7172 - https://www.exploit-db.com/exploits/3497 -CVE-2006-7173 - https://www.exploit-db.com/exploits/3502 -CVE-2006-7183 - https://www.exploit-db.com/exploits/2850 -CVE-2006-7185 - https://www.exploit-db.com/exploits/2766 -CVE-2006-7186 - http://www.bantychick.com/live/?action=forum&board=shootbreeze&op=display&num=19&start=15 -CVE-2006-7192 - http://securityreason.com/securityalert/2530 -CVE-2006-7192 - http://www.cpni.gov.uk/docs/re-20061020-00710.pdf -CVE-2006-7194 - http://marc.info/?l=bugtraq&m=116283849004075&w=2 -CVE-2006-7194 - https://www.exploit-db.com/exploits/2726 -CVE-2006-7195 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2006-7196 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2006-7208 - https://www.exploit-db.com/exploits/1995 -CVE-2006-7210 - https://www.exploit-db.com/exploits/2194 -CVE-2006-7210 - https://www.exploit-db.com/exploits/2204 -CVE-2006-7210 - https://www.exploit-db.com/exploits/2210 -CVE-2006-7228 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2006-7233 - http://www.igniterealtime.org/issues/browse/JM-629 -CVE-2006-7234 - https://bugzilla.redhat.com/show_bug.cgi?id=214205 -CVE-2006-7234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9719 -CVE-2007-0001 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9560 -CVE-2007-0006 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9829 -CVE-2007-0008 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0009 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0015 - http://isc.sans.org/diary.html?storyid=2094 -CVE-2007-0015 - http://www.kb.cert.org/vuls/id/442497 -CVE-2007-0015 - https://www.exploit-db.com/exploits/3064 -CVE-2007-0016 - https://www.exploit-db.com/exploits/4051 -CVE-2007-0018 - http://secunia.com/blog/6/ -CVE-2007-0020 - https://www.exploit-db.com/exploits/3160 -CVE-2007-0025 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-012 -CVE-2007-0026 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-011 -CVE-2007-0027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 -CVE-2007-0028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 -CVE-2007-0029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 -CVE-2007-0030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 -CVE-2007-0031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 -CVE-2007-0033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 -CVE-2007-0034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 -CVE-2007-0035 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 -CVE-2007-0038 - http://securityreason.com/securityalert/2542 -CVE-2007-0038 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2007-0039 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 -CVE-2007-0040 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-039 -CVE-2007-0044 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -CVE-2007-0044 - http://securityreason.com/securityalert/2090 -CVE-2007-0044 - http://www.wisec.it/vulns.php?page=9 -CVE-2007-0045 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -CVE-2007-0045 - http://securityreason.com/securityalert/2090 -CVE-2007-0045 - http://www.gnucitizen.org/blog/danger-danger-danger/ -CVE-2007-0045 - http://www.wisec.it/vulns.php?page=9 -CVE-2007-0045 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693 -CVE-2007-0046 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -CVE-2007-0046 - http://securityreason.com/securityalert/2090 -CVE-2007-0046 - http://www.wisec.it/vulns.php?page=9 -CVE-2007-0046 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9684 -CVE-2007-0047 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -CVE-2007-0048 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -CVE-2007-0048 - http://securityreason.com/securityalert/2090 -CVE-2007-0048 - http://www.wisec.it/vulns.php?page=9 -CVE-2007-0049 - https://www.exploit-db.com/exploits/3068 -CVE-2007-0051 - https://www.exploit-db.com/exploits/3080 -CVE-2007-0052 - https://www.exploit-db.com/exploits/3061 -CVE-2007-0053 - https://www.exploit-db.com/exploits/3062 -CVE-2007-0055 - https://www.exploit-db.com/exploits/3063 -CVE-2007-0059 - http://www.gnucitizen.org/blog/backdooring-quicktime-movies/ -CVE-2007-0059 - http://www.kb.cert.org/vuls/id/304064 -CVE-2007-0061 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-0061 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-0061 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-0061 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-0061 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-0061 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-0062 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-0062 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-0062 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-0062 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-0062 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-0062 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-0063 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-0063 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-0063 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-0063 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-0063 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-0063 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-0064 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068 -CVE-2007-0065 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-008 -CVE-2007-0066 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001 -CVE-2007-0069 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001 -CVE-2007-0071 - http://isc.sans.org/diary.html?storyid=4465 -CVE-2007-0075 - http://securityreason.com/securityalert/2100 -CVE-2007-0076 - http://securityreason.com/securityalert/2099 -CVE-2007-0077 - http://securityreason.com/securityalert/2098 -CVE-2007-0078 - http://securityreason.com/securityalert/2097 -CVE-2007-0079 - http://securityreason.com/securityalert/2102 -CVE-2007-0081 - http://securityreason.com/securityalert/2095 -CVE-2007-0082 - https://www.exploit-db.com/exploits/3049 -CVE-2007-0083 - http://securityreason.com/securityalert/2101 -CVE-2007-0088 - http://securityreason.com/securityalert/2103 -CVE-2007-0091 - https://www.exploit-db.com/exploits/3066 -CVE-2007-0092 - https://www.exploit-db.com/exploits/3074 -CVE-2007-0093 - http://securityreason.com/securityalert/2106 -CVE-2007-0093 - https://www.exploit-db.com/exploits/3076 -CVE-2007-0094 - http://securityreason.com/securityalert/2105 -CVE-2007-0095 - http://securityreason.com/securityalert/2104 -CVE-2007-0097 - http://vuln.sg/powarc964-en.html -CVE-2007-0098 - https://www.exploit-db.com/exploits/3075 -CVE-2007-0099 - http://isc.sans.org/diary.php?storyid=2004 -CVE-2007-0099 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 -CVE-2007-0106 - http://securityreason.com/securityalert/2114 -CVE-2007-0107 - http://securityreason.com/securityalert/2112 -CVE-2007-0109 - http://securityreason.com/securityalert/2113 -CVE-2007-0111 - http://blog.trendmicro.com/flaw-in-3rd-party-app-weakens-windows-mobile/ -CVE-2007-0112 - http://securityreason.com/securityalert/2111 -CVE-2007-0113 - http://securityreason.com/securityalert/2110 -CVE-2007-0115 - http://securityreason.com/securityalert/2107 -CVE-2007-0116 - http://securityreason.com/securityalert/2109 -CVE-2007-0120 - https://www.exploit-db.com/exploits/3078 -CVE-2007-0121 - http://securityreason.com/securityalert/2108 -CVE-2007-0122 - http://securityreason.com/securityalert/2123 -CVE-2007-0122 - https://www.exploit-db.com/exploits/3085 -CVE-2007-0123 - http://securityreason.com/securityalert/2116 -CVE-2007-0124 - http://securityreason.com/securityalert/2115 -CVE-2007-0128 - https://www.exploit-db.com/exploits/3081 -CVE-2007-0129 - https://www.exploit-db.com/exploits/3073 -CVE-2007-0130 - https://www.exploit-db.com/exploits/3082 -CVE-2007-0132 - https://www.exploit-db.com/exploits/3083 -CVE-2007-0134 - https://www.exploit-db.com/exploits/3083 -CVE-2007-0135 - http://securityreason.com/exploitalert/1698 -CVE-2007-0135 - https://www.exploit-db.com/exploits/3079 -CVE-2007-0140 - http://securityreason.com/securityalert/2122 -CVE-2007-0141 - http://securityreason.com/securityalert/2121 -CVE-2007-0142 - http://securityreason.com/securityalert/2120 -CVE-2007-0143 - https://www.exploit-db.com/exploits/3090 -CVE-2007-0144 - https://www.exploit-db.com/exploits/3089 -CVE-2007-0146 - http://securityreason.com/securityalert/2119 -CVE-2007-0148 - https://www.exploit-db.com/exploits/3098 -CVE-2007-0149 - http://securityreason.com/securityalert/2118 -CVE-2007-0150 - http://securityreason.com/securityalert/2117 -CVE-2007-0153 - http://securityreason.com/securityalert/2127 -CVE-2007-0154 - http://securityreason.com/securityalert/2126 -CVE-2007-0155 - http://securityreason.com/securityalert/2125 -CVE-2007-0156 - http://securityreason.com/securityalert/2124 -CVE-2007-0160 - http://securityreason.com/securityalert/2129 -CVE-2007-0161 - http://securityreason.com/securityalert/2128 -CVE-2007-0162 - http://landonf.bikemonkey.org/code/macosx/MOAB_Day_8.20070109002959.18582.timor.html -CVE-2007-0167 - http://securityreason.com/securityalert/2134 -CVE-2007-0167 - https://www.exploit-db.com/exploits/3104 -CVE-2007-0170 - https://www.exploit-db.com/exploits/3097 -CVE-2007-0171 - https://www.exploit-db.com/exploits/3096 -CVE-2007-0172 - https://www.exploit-db.com/exploits/3093 -CVE-2007-0173 - https://www.exploit-db.com/exploits/3091 -CVE-2007-0176 - http://securityreason.com/securityalert/2133 -CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES -CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES -CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES -CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES -CVE-2007-0178 - http://securityreason.com/securityalert/2132 -CVE-2007-0179 - http://securityreason.com/securityalert/2131 -CVE-2007-0180 - http://vuln.sg/efcommander575-en.html -CVE-2007-0181 - https://www.exploit-db.com/exploits/3100 -CVE-2007-0182 - http://securityreason.com/securityalert/2136 -CVE-2007-0189 - http://securityreason.com/securityalert/2141 -CVE-2007-0190 - http://securityreason.com/securityalert/2139 -CVE-2007-0191 - http://securityreason.com/securityalert/2138 -CVE-2007-0192 - http://securityreason.com/securityalert/2137 -CVE-2007-0196 - https://www.exploit-db.com/exploits/3105 -CVE-2007-0200 - https://www.exploit-db.com/exploits/3108 -CVE-2007-0202 - http://securityreason.com/securityalert/2135 -CVE-2007-0202 - https://www.exploit-db.com/exploits/3103 -CVE-2007-0205 - http://securityreason.com/securityalert/2135 -CVE-2007-0205 - https://www.exploit-db.com/exploits/3103 -CVE-2007-0206 - http://securityreason.com/securityalert/2140 -CVE-2007-0208 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 -CVE-2007-0209 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 -CVE-2007-0210 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-007 -CVE-2007-0211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-006 -CVE-2007-0213 - http://packetstormsecurity.com/files/153533/Microsoft-Exchange-2003-base64-MIME-Remote-Code-Execution.html -CVE-2007-0213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 -CVE-2007-0215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 -CVE-2007-0216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 -CVE-2007-0217 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 -CVE-2007-0218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -CVE-2007-0219 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 -CVE-2007-0220 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 -CVE-2007-0221 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 -CVE-2007-0224 - https://www.exploit-db.com/exploits/3115 -CVE-2007-0225 - https://www.exploit-db.com/exploits/3115 -CVE-2007-0226 - https://www.exploit-db.com/exploits/3106 -CVE-2007-0229 - http://applefun.blogspot.com/2007/01/moab-10-01-2007-apple-dmg-ufs.html -CVE-2007-0232 - http://securityreason.com/securityalert/2146 -CVE-2007-0232 - https://www.exploit-db.com/exploits/3113 -CVE-2007-0233 - https://www.exploit-db.com/exploits/3109 -CVE-2007-0236 - https://www.exploit-db.com/exploits/3130 -CVE-2007-0243 - http://securityreason.com/securityalert/2158 -CVE-2007-0245 - http://www.redhat.com/support/errata/RHSA-2007-0406.html -CVE-2007-0249 - http://securityreason.com/securityalert/2149 -CVE-2007-0250 - http://securityreason.com/securityalert/2149 -CVE-2007-0251 - http://securityreason.com/securityalert/2165 -CVE-2007-0260 - http://securityreason.com/securityalert/2145 -CVE-2007-0261 - https://www.exploit-db.com/exploits/3116 -CVE-2007-0298 - http://securityreason.com/securityalert/2152 -CVE-2007-0298 - https://www.exploit-db.com/exploits/3117 -CVE-2007-0300 - https://www.exploit-db.com/exploits/3118 -CVE-2007-0301 - https://www.exploit-db.com/exploits/3123 -CVE-2007-0302 - http://securityreason.com/securityalert/2164 -CVE-2007-0304 - https://www.exploit-db.com/exploits/3120 -CVE-2007-0305 - http://securityreason.com/securityalert/2151 -CVE-2007-0305 - https://www.exploit-db.com/exploits/3135 -CVE-2007-0306 - https://www.exploit-db.com/exploits/3122 -CVE-2007-0307 - https://www.exploit-db.com/exploits/3121 -CVE-2007-0309 - http://securityreason.com/securityalert/2153 -CVE-2007-0310 - http://securityreason.com/securityalert/2162 -CVE-2007-0311 - https://www.exploit-db.com/exploits/3126 -CVE-2007-0312 - http://securityreason.com/securityalert/2157 -CVE-2007-0314 - https://www.exploit-db.com/exploits/3114 -CVE-2007-0316 - http://securityreason.com/securityalert/2166 -CVE-2007-0319 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-0323 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-0329 - https://www.exploit-db.com/exploits/3125 -CVE-2007-0330 - http://securityreason.com/securityalert/2160 -CVE-2007-0333 - http://securityreason.com/securityalert/2163 -CVE-2007-0335 - http://securityreason.com/securityalert/2161 -CVE-2007-0337 - https://www.exploit-db.com/exploits/3134 -CVE-2007-0338 - https://www.exploit-db.com/exploits/3128 -CVE-2007-0339 - http://securityreason.com/securityalert/2154 -CVE-2007-0340 - https://www.exploit-db.com/exploits/3124 -CVE-2007-0344 - https://www.exploit-db.com/exploits/3139 -CVE-2007-0345 - https://www.exploit-db.com/exploits/3136 -CVE-2007-0347 - http://securityreason.com/securityalert/2192 -CVE-2007-0352 - http://securityreason.com/securityalert/2156 -CVE-2007-0352 - https://www.exploit-db.com/exploits/3149 -CVE-2007-0353 - http://securityreason.com/securityalert/2155 -CVE-2007-0354 - https://www.exploit-db.com/exploits/3141 -CVE-2007-0355 - https://www.exploit-db.com/exploits/3151 -CVE-2007-0356 - https://www.exploit-db.com/exploits/3142 -CVE-2007-0357 - http://securityreason.com/securityalert/2159 -CVE-2007-0359 - https://www.exploit-db.com/exploits/3147 -CVE-2007-0360 - https://www.exploit-db.com/exploits/3150 -CVE-2007-0361 - https://www.exploit-db.com/exploits/3145 -CVE-2007-0364 - http://www.osvdb.org/32850 -CVE-2007-0364 - http://www.osvdb.org/32851 -CVE-2007-0368 - https://www.exploit-db.com/exploits/3154 -CVE-2007-0369 - https://www.exploit-db.com/exploits/3153 -CVE-2007-0370 - https://www.exploit-db.com/exploits/3153 -CVE-2007-0371 - https://www.exploit-db.com/exploits/3155 -CVE-2007-0388 - https://www.exploit-db.com/exploits/3143 -CVE-2007-0388 - https://www.exploit-db.com/exploits/3144 -CVE-2007-0390 - http://securityreason.com/securityalert/2170 -CVE-2007-0395 - https://www.exploit-db.com/exploits/3152 -CVE-2007-0399 - http://securityreason.com/securityalert/2169 -CVE-2007-0400 - http://securityreason.com/securityalert/2167 -CVE-2007-0401 - http://securityreason.com/securityalert/2167 -CVE-2007-0402 - http://securityreason.com/securityalert/2168 -CVE-2007-0403 - http://securityreason.com/securityalert/2168 -CVE-2007-0410 - http://dev2dev.bea.com/pub/advisory/204 -CVE-2007-0427 - http://securityreason.com/securityalert/2177 -CVE-2007-0428 - http://securityreason.com/securityalert/2171 -CVE-2007-0429 - https://www.exploit-db.com/exploits/3157 -CVE-2007-0430 - http://securityreason.com/securityalert/2178 -CVE-2007-0448 - http://securityreason.com/securityalert/2175 -CVE-2007-0450 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-0450 - http://securityreason.com/securityalert/2446 -CVE-2007-0452 - http://securityreason.com/securityalert/2219 -CVE-2007-0452 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758 -CVE-2007-0455 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2007-0464 - https://www.exploit-db.com/exploits/3200 -CVE-2007-0468 - http://securityreason.com/securityalert/2172 -CVE-2007-0471 - http://securityreason.com/securityalert/2179 -CVE-2007-0481 - http://www.kb.cert.org/vuls/id/274760 -CVE-2007-0485 - https://www.exploit-db.com/exploits/3169 -CVE-2007-0486 - http://securityreason.com/securityalert/2174 -CVE-2007-0488 - http://securityreason.com/securityalert/2176 -CVE-2007-0489 - https://www.exploit-db.com/exploits/3175 -CVE-2007-0493 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614 -CVE-2007-0495 - https://www.exploit-db.com/exploits/3161 -CVE-2007-0496 - https://www.exploit-db.com/exploits/3163 -CVE-2007-0497 - http://echo.or.id/adv/adv62-y3dips-2007.txt -CVE-2007-0498 - https://www.exploit-db.com/exploits/3165 -CVE-2007-0499 - https://www.exploit-db.com/exploits/3164 -CVE-2007-0500 - https://www.exploit-db.com/exploits/3162 -CVE-2007-0501 - https://www.exploit-db.com/exploits/3171 -CVE-2007-0502 - https://www.exploit-db.com/exploits/3172 -CVE-2007-0504 - https://www.exploit-db.com/exploits/3180 -CVE-2007-0508 - https://www.exploit-db.com/exploits/3183 -CVE-2007-0511 - https://www.exploit-db.com/exploits/3184 -CVE-2007-0515 - http://isc.sans.org/diary.html?storyid=2133 -CVE-2007-0515 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 -CVE-2007-0517 - http://securityreason.com/securityalert/2184 -CVE-2007-0518 - http://securityreason.com/securityalert/2183 -CVE-2007-0519 - http://securityreason.com/securityalert/2182 -CVE-2007-0520 - http://securityreason.com/securityalert/2181 -CVE-2007-0521 - http://securityreason.com/securityalert/2180 -CVE-2007-0522 - http://securityreason.com/securityalert/2180 -CVE-2007-0523 - http://securityreason.com/securityalert/2180 -CVE-2007-0524 - http://securityreason.com/securityalert/2180 -CVE-2007-0526 - http://securityreason.com/securityalert/2186 -CVE-2007-0527 - http://securityreason.com/securityalert/2185 -CVE-2007-0528 - https://www.exploit-db.com/exploits/3189 -CVE-2007-0532 - http://securityreason.com/securityalert/2187 -CVE-2007-0538 - http://securityreason.com/securityalert/2211 -CVE-2007-0539 - http://securityreason.com/securityalert/2191 -CVE-2007-0540 - http://securityreason.com/securityalert/2191 -CVE-2007-0541 - http://securityreason.com/securityalert/2191 -CVE-2007-0542 - http://securityreason.com/securityalert/2190 -CVE-2007-0543 - http://securityreason.com/securityalert/2189 -CVE-2007-0545 - http://securityreason.com/securityalert/2214 -CVE-2007-0546 - http://securityreason.com/securityalert/2213 -CVE-2007-0548 - https://www.exploit-db.com/exploits/3182 -CVE-2007-0549 - http://securityreason.com/securityalert/2212 -CVE-2007-0550 - http://securityreason.com/securityalert/2212 -CVE-2007-0551 - http://securityreason.com/securityalert/2195 -CVE-2007-0554 - https://www.exploit-db.com/exploits/3195 -CVE-2007-0555 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739 -CVE-2007-0558 - https://www.exploit-db.com/exploits/3191 -CVE-2007-0559 - https://www.exploit-db.com/exploits/3185 -CVE-2007-0560 - https://www.exploit-db.com/exploits/3186 -CVE-2007-0561 - https://www.exploit-db.com/exploits/3192 -CVE-2007-0562 - https://www.exploit-db.com/exploits/3190 -CVE-2007-0566 - https://www.exploit-db.com/exploits/3187 -CVE-2007-0568 - https://www.exploit-db.com/exploits/3201 -CVE-2007-0569 - https://www.exploit-db.com/exploits/3216 -CVE-2007-0570 - https://www.exploit-db.com/exploits/3202 -CVE-2007-0571 - https://www.exploit-db.com/exploits/3212 -CVE-2007-0572 - https://www.exploit-db.com/exploits/3207 -CVE-2007-0573 - https://www.exploit-db.com/exploits/3205 -CVE-2007-0576 - https://www.exploit-db.com/exploits/3209 -CVE-2007-0577 - https://www.exploit-db.com/exploits/3206 -CVE-2007-0578 - http://www.mpg123.de/cgi-bin/news.cgi -CVE-2007-0580 - https://www.exploit-db.com/exploits/3215 -CVE-2007-0581 - https://www.exploit-db.com/exploits/3214 -CVE-2007-0582 - https://www.exploit-db.com/exploits/3210 -CVE-2007-0584 - https://www.exploit-db.com/exploits/3217 -CVE-2007-0585 - https://www.exploit-db.com/exploits/3222 -CVE-2007-0588 - http://security-protocols.com/sp-x43-advisory.php -CVE-2007-0589 - https://www.exploit-db.com/exploits/3197 -CVE-2007-0590 - https://www.exploit-db.com/exploits/3197 -CVE-2007-0591 - https://www.exploit-db.com/exploits/3198 -CVE-2007-0592 - http://securityreason.com/securityalert/2196 -CVE-2007-0593 - http://securityreason.com/securityalert/2205 -CVE-2007-0594 - http://securityreason.com/securityalert/2206 -CVE-2007-0596 - http://www.securityfocus.com/archive/1/458076/100/0/threaded -CVE-2007-0597 - http://www.securityfocus.com/archive/1/458076/100/0/threaded -CVE-2007-0598 - http://www.securityfocus.com/archive/1/458076/100/0/threaded -CVE-2007-0599 - http://www.securityfocus.com/archive/1/458076/100/0/threaded -CVE-2007-0600 - https://www.exploit-db.com/exploits/3194 -CVE-2007-0601 - http://www.securityfocus.com/archive/1/458076/100/0/threaded -CVE-2007-0605 - http://securityreason.com/securityalert/2663 -CVE-2007-0608 - http://securityreason.com/securityalert/2661 -CVE-2007-0609 - http://securityreason.com/securityalert/2662 -CVE-2007-0612 - http://securityreason.com/securityalert/2199 -CVE-2007-0617 - http://securityreason.com/securityalert/2210 -CVE-2007-0620 - http://securityreason.com/securityalert/2197 -CVE-2007-0623 - http://securityreason.com/securityalert/2198 -CVE-2007-0624 - http://securityreason.com/securityalert/2198 -CVE-2007-0631 - https://www.exploit-db.com/exploits/3227 -CVE-2007-0633 - https://www.exploit-db.com/exploits/3228 -CVE-2007-0637 - https://www.exploit-db.com/exploits/3225 -CVE-2007-0638 - https://www.exploit-db.com/exploits/3226 -CVE-2007-0639 - https://www.exploit-db.com/exploits/3221 -CVE-2007-0643 - https://www.exploit-db.com/exploits/3229 -CVE-2007-0656 - https://www.exploit-db.com/exploits/3231 -CVE-2007-0662 - https://www.exploit-db.com/exploits/3236 -CVE-2007-0664 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -CVE-2007-0664 - http://seclists.org/fulldisclosure/2023/Nov/13 -CVE-2007-0667 - http://securityreason.com/securityalert/2217 -CVE-2007-0671 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 -CVE-2007-0673 - http://securityreason.com/securityalert/2218 -CVE-2007-0674 - http://blog.trendmicro.com/trend-micro-finds-more-windows-mobile-flaws/ -CVE-2007-0676 - https://www.exploit-db.com/exploits/3234 -CVE-2007-0677 - http://echo.or.id/adv/adv63-y3dips-2007.txt -CVE-2007-0677 - http://securityreason.com/securityalert/2215 -CVE-2007-0677 - https://www.exploit-db.com/exploits/3237 -CVE-2007-0678 - https://www.exploit-db.com/exploits/3233 -CVE-2007-0679 - https://www.exploit-db.com/exploits/3238 -CVE-2007-0680 - https://www.exploit-db.com/exploits/3235 -CVE-2007-0681 - https://www.exploit-db.com/exploits/3239 -CVE-2007-0682 - https://www.exploit-db.com/exploits/3240 -CVE-2007-0683 - http://marc.info/?l=bugtraq&m=117036933022782&w=2 -CVE-2007-0683 - https://www.exploit-db.com/exploits/3242 -CVE-2007-0684 - https://www.exploit-db.com/exploits/3243 -CVE-2007-0685 - http://blog.trendmicro.com/trend-micro-finds-more-windows-mobile-flaws/ -CVE-2007-0686 - https://www.exploit-db.com/exploits/3224 -CVE-2007-0687 - https://www.exploit-db.com/exploits/3232 -CVE-2007-0688 - https://www.exploit-db.com/exploits/3241 -CVE-2007-0690 - http://securityreason.com/securityalert/2744 -CVE-2007-0692 - http://securityreason.com/securityalert/2741 -CVE-2007-0693 - http://securityreason.com/securityalert/2740 -CVE-2007-0694 - http://securityreason.com/securityalert/2739 -CVE-2007-0697 - https://www.exploit-db.com/exploits/3208 -CVE-2007-0699 - http://securityreason.com/securityalert/2223 -CVE-2007-0700 - http://www.attrition.org/pipermail/vim/2007-February/001280.html -CVE-2007-0700 - https://www.exploit-db.com/exploits/5182 -CVE-2007-0701 - https://www.exploit-db.com/exploits/3247 -CVE-2007-0702 - http://www.attrition.org/pipermail/vim/2007-February/001264.html -CVE-2007-0702 - https://www.exploit-db.com/exploits/3246 -CVE-2007-0703 - https://www.exploit-db.com/exploits/3249 -CVE-2007-0704 - https://www.exploit-db.com/exploits/2329 -CVE-2007-0713 - http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt -CVE-2007-0754 - http://securityreason.com/securityalert/2703 -CVE-2007-0756 - http://securityreason.com/securityalert/2220 -CVE-2007-0756 - https://www.exploit-db.com/exploits/3257 -CVE-2007-0757 - https://www.exploit-db.com/exploits/3251 -CVE-2007-0760 - https://www.exploit-db.com/exploits/3252 -CVE-2007-0761 - https://www.exploit-db.com/exploits/3258 -CVE-2007-0762 - https://www.exploit-db.com/exploits/3259 -CVE-2007-0763 - https://www.exploit-db.com/exploits/3255 -CVE-2007-0764 - https://www.exploit-db.com/exploits/3255 -CVE-2007-0765 - https://www.exploit-db.com/exploits/3256 -CVE-2007-0766 - https://www.exploit-db.com/exploits/3254 -CVE-2007-0771 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9447 -CVE-2007-0775 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0777 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0778 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0778 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9151 -CVE-2007-0779 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0779 - https://bugzilla.mozilla.org/show_bug.cgi?id=361298 -CVE-2007-0780 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0780 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9884 -CVE-2007-0784 - http://securityreason.com/securityalert/2225 -CVE-2007-0785 - https://www.exploit-db.com/exploits/3266 -CVE-2007-0786 - https://www.exploit-db.com/exploits/3261 -CVE-2007-0788 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES -CVE-2007-0790 - https://www.exploit-db.com/exploits/3277 -CVE-2007-0791 - http://securityreason.com/securityalert/2222 -CVE-2007-0792 - http://securityreason.com/securityalert/2222 -CVE-2007-0793 - http://securityreason.com/securityalert/2221 -CVE-2007-0795 - http://securityreason.com/securityalert/2216 -CVE-2007-0797 - https://www.exploit-db.com/exploits/3268 -CVE-2007-0800 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0804 - https://www.exploit-db.com/exploits/3271 -CVE-2007-0806 - http://securityreason.com/securityalert/2226 -CVE-2007-0807 - http://securityreason.com/securityalert/2228 -CVE-2007-0809 - https://www.exploit-db.com/exploits/3270 -CVE-2007-0810 - https://www.exploit-db.com/exploits/3267 -CVE-2007-0811 - https://www.exploit-db.com/exploits/3272 -CVE-2007-0812 - https://www.exploit-db.com/exploits/3262 -CVE-2007-0815 - http://securityreason.com/securityalert/2227 -CVE-2007-0816 - https://www.exploit-db.com/exploits/3248 -CVE-2007-0824 - https://www.exploit-db.com/exploits/3275 -CVE-2007-0825 - https://www.exploit-db.com/exploits/3276 -CVE-2007-0826 - https://www.exploit-db.com/exploits/3278 -CVE-2007-0827 - https://www.exploit-db.com/exploits/3279 -CVE-2007-0828 - http://securityreason.com/securityalert/2229 -CVE-2007-0837 - https://www.exploit-db.com/exploits/3280 -CVE-2007-0839 - https://www.exploit-db.com/exploits/3281 -CVE-2007-0843 - http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html -CVE-2007-0845 - https://www.exploit-db.com/exploits/3282 -CVE-2007-0846 - https://www.exploit-db.com/exploits/3283 -CVE-2007-0847 - https://www.exploit-db.com/exploits/3283 -CVE-2007-0848 - https://www.exploit-db.com/exploits/3284 -CVE-2007-0854 - http://changelog.cpanel.net/index.cgi -CVE-2007-0859 - http://securityreason.com/securityalert/2260 -CVE-2007-0859 - http://www.securityfocus.com/archive/1/460908/100/0/threaded -CVE-2007-0864 - https://www.exploit-db.com/exploits/3288 -CVE-2007-0865 - https://www.exploit-db.com/exploits/3287 -CVE-2007-0867 - https://www.exploit-db.com/exploits/3285 -CVE-2007-0870 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 -CVE-2007-0873 - https://www.exploit-db.com/exploits/3305 -CVE-2007-0881 - http://echo.or.id/adv/adv64-y3dips-2007.txt -CVE-2007-0881 - https://www.exploit-db.com/exploits/3292 -CVE-2007-0882 - http://isc.sans.org/diary.html?storyid=2220 -CVE-2007-0882 - http://www.securityfocus.com/bid/22512 -CVE-2007-0883 - https://www.exploit-db.com/exploits/3294 -CVE-2007-0886 - http://marc.info/?l=full-disclosure&m=117094708423302&w=2 -CVE-2007-0886 - https://www.exploit-db.com/exploits/3289 -CVE-2007-0887 - http://marc.info/?l=full-disclosure&m=117094708423302&w=2 -CVE-2007-0887 - https://www.exploit-db.com/exploits/3290 -CVE-2007-0890 - http://changelog.cpanel.net/index.cgi -CVE-2007-0904 - https://www.exploit-db.com/exploits/3286 -CVE-2007-0906 - http://www.redhat.com/support/errata/RHSA-2007-0088.html -CVE-2007-0907 - http://www.redhat.com/support/errata/RHSA-2007-0088.html -CVE-2007-0908 - http://securityreason.com/securityalert/2321 -CVE-2007-0908 - http://www.redhat.com/support/errata/RHSA-2007-0088.html -CVE-2007-0909 - http://www.redhat.com/support/errata/RHSA-2007-0088.html -CVE-2007-0909 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9722 -CVE-2007-0910 - http://www.redhat.com/support/errata/RHSA-2007-0088.html -CVE-2007-0910 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9514 -CVE-2007-0920 - https://www.exploit-db.com/exploits/3295 -CVE-2007-0927 - https://www.exploit-db.com/exploits/3296 -CVE-2007-0933 - http://www.blackhat.com/presentations/bh-europe-07/Butti/Presentation/bh-eu-07-Butti.pdf -CVE-2007-0934 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030 -CVE-2007-0936 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030 -CVE-2007-0938 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-018 -CVE-2007-0939 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-018 -CVE-2007-0940 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-028 -CVE-2007-0942 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-0943 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-0944 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-0945 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-0946 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-0947 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-0949 - https://www.exploit-db.com/exploits/5032 -CVE-2007-0949 - https://www.exploit-db.com/exploits/5077 -CVE-2007-0955 - http://securityreason.com/securityalert/2249 -CVE-2007-0958 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt -CVE-2007-0969 - http://securityreason.com/securityalert/2261 -CVE-2007-0970 - http://securityreason.com/securityalert/2261 -CVE-2007-0971 - https://www.exploit-db.com/exploits/3310 -CVE-2007-0972 - https://www.exploit-db.com/exploits/3311 -CVE-2007-0976 - https://www.exploit-db.com/exploits/3307 -CVE-2007-0976 - https://www.exploit-db.com/exploits/3610 -CVE-2007-0977 - https://www.exploit-db.com/exploits/3302 -CVE-2007-0981 - http://securityreason.com/securityalert/2262 -CVE-2007-0981 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0981 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9730 -CVE-2007-0983 - https://www.exploit-db.com/exploits/3297 -CVE-2007-0984 - https://www.exploit-db.com/exploits/3301 -CVE-2007-0985 - https://www.exploit-db.com/exploits/3299 -CVE-2007-0986 - https://www.exploit-db.com/exploits/3309 -CVE-2007-0987 - https://www.exploit-db.com/exploits/3309 -CVE-2007-0988 - http://securityreason.com/securityalert/2315 -CVE-2007-0988 - http://www.redhat.com/support/errata/RHSA-2007-0088.html -CVE-2007-0994 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 -CVE-2007-0995 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-0996 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-1000 - http://bugzilla.kernel.org/show_bug.cgi?id=8134 -CVE-2007-1001 - http://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.html -CVE-2007-1003 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798 -CVE-2007-1004 - http://securityreason.com/securityalert/2264 -CVE-2007-1008 - http://securityreason.com/securityalert/2278 -CVE-2007-1009 - http://securityreason.com/securityalert/2596 -CVE-2007-1010 - https://www.exploit-db.com/exploits/3314 -CVE-2007-1011 - https://www.exploit-db.com/exploits/3328 -CVE-2007-1012 - http://securityreason.com/securityalert/2267 -CVE-2007-1013 - https://www.exploit-db.com/exploits/3324 -CVE-2007-1014 - https://www.exploit-db.com/exploits/3331 -CVE-2007-1015 - https://www.exploit-db.com/exploits/3318 -CVE-2007-1017 - https://www.exploit-db.com/exploits/3322 -CVE-2007-1019 - https://www.exploit-db.com/exploits/3325 -CVE-2007-1020 - http://securityreason.com/securityalert/2265 -CVE-2007-1021 - https://www.exploit-db.com/exploits/3317 -CVE-2007-1023 - https://www.exploit-db.com/exploits/3321 -CVE-2007-1024 - http://securityreason.com/securityalert/2266 -CVE-2007-1025 - https://www.exploit-db.com/exploits/3323 -CVE-2007-1026 - https://www.exploit-db.com/exploits/3327 -CVE-2007-1029 - http://securityreason.com/securityalert/2277 -CVE-2007-1030 - http://securityreason.com/securityalert/2268 -CVE-2007-1031 - https://www.exploit-db.com/exploits/3326 -CVE-2007-1034 - https://www.exploit-db.com/exploits/3334 -CVE-2007-1040 - https://www.exploit-db.com/exploits/3332 -CVE-2007-1041 - https://www.exploit-db.com/exploits/3342 -CVE-2007-1043 - http://securityreason.com/securityalert/2275 -CVE-2007-1044 - http://securityreason.com/securityalert/2276 -CVE-2007-1045 - http://securityreason.com/securityalert/2272 -CVE-2007-1046 - http://securityreason.com/securityalert/2271 -CVE-2007-1046 - http://www.securityfocus.com/archive/1/460306/100/0/threaded -CVE-2007-1047 - http://www.rhyolite.com/anti-spam/dcc/CHANGES -CVE-2007-1050 - http://securityreason.com/securityalert/2270 -CVE-2007-1051 - http://securityreason.com/securityalert/2279 -CVE-2007-1052 - http://securityreason.com/securityalert/2269 -CVE-2007-1053 - http://securityreason.com/securityalert/2273 -CVE-2007-1054 - http://attrition.org/pipermail/vim/2007-February/001367.html -CVE-2007-1054 - http://securityreason.com/securityalert/2274 -CVE-2007-1054 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES -CVE-2007-1055 - http://securityreason.com/securityalert/2274 -CVE-2007-1055 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES -CVE-2007-1057 - https://www.exploit-db.com/exploits/3356 -CVE-2007-1058 - https://www.exploit-db.com/exploits/3339 -CVE-2007-1059 - https://www.exploit-db.com/exploits/3336 -CVE-2007-1060 - https://www.exploit-db.com/exploits/3348 -CVE-2007-1061 - https://www.exploit-db.com/exploits/3346 -CVE-2007-1069 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 -CVE-2007-1073 - http://securityreason.com/securityalert/2283 -CVE-2007-1074 - https://www.exploit-db.com/exploits/3349 -CVE-2007-1075 - https://www.exploit-db.com/exploits/3341 -CVE-2007-1076 - http://attrition.org/pipermail/vim/2007-February/001377.html -CVE-2007-1078 - https://www.exploit-db.com/exploits/3360 -CVE-2007-1079 - https://www.exploit-db.com/exploits/3343 -CVE-2007-1080 - https://www.exploit-db.com/exploits/3341 -CVE-2007-1082 - https://www.exploit-db.com/exploits/3347 -CVE-2007-1084 - http://www.heise-security.co.uk/news/85728 -CVE-2007-1091 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-1091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 -CVE-2007-1095 - https://bugzilla.mozilla.org/show_bug.cgi?id=371360 -CVE-2007-1104 - https://www.exploit-db.com/exploits/3374 -CVE-2007-1105 - https://www.exploit-db.com/exploits/3370 -CVE-2007-1106 - https://www.exploit-db.com/exploits/3373 -CVE-2007-1107 - https://www.exploit-db.com/exploits/3371 -CVE-2007-1107 - https://www.exploit-db.com/exploits/4950 -CVE-2007-1107 - https://www.exploit-db.com/exploits/4961 -CVE-2007-1108 - https://www.exploit-db.com/exploits/3372 -CVE-2007-1116 - https://bugzilla.mozilla.org/show_bug.cgi?id=371375 -CVE-2007-1118 - https://www.exploit-db.com/exploits/3361 -CVE-2007-1130 - https://www.exploit-db.com/exploits/3366 -CVE-2007-1131 - https://www.exploit-db.com/exploits/3367 -CVE-2007-1133 - https://www.exploit-db.com/exploits/3365 -CVE-2007-1152 - https://www.exploit-db.com/exploits/8095 -CVE-2007-1156 - http://securityreason.com/securityalert/2370 -CVE-2007-1158 - http://marc.info/?l=full-disclosure&m=117251821622820&w=2 -CVE-2007-1158 - http://securityreason.com/securityalert/2336 -CVE-2007-1162 - https://www.exploit-db.com/exploits/3350 -CVE-2007-1163 - https://www.exploit-db.com/exploits/3351 -CVE-2007-1164 - https://www.exploit-db.com/exploits/3353 -CVE-2007-1165 - https://www.exploit-db.com/exploits/3354 -CVE-2007-1166 - http://attrition.org/pipermail/vim/2007-February/001379.html -CVE-2007-1166 - http://securityreason.com/securityalert/2372 -CVE-2007-1166 - https://www.exploit-db.com/exploits/3355 -CVE-2007-1167 - https://www.exploit-db.com/exploits/3357 -CVE-2007-1171 - http://www.waraxe.us/advisory-53.html -CVE-2007-1171 - https://www.exploit-db.com/exploits/3337 -CVE-2007-1172 - https://www.exploit-db.com/exploits/3338 -CVE-2007-1189 - https://www.exploit-db.com/exploits/3383 -CVE-2007-1195 - https://www.exploit-db.com/exploits/3385 -CVE-2007-1201 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-017 -CVE-2007-1202 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 -CVE-2007-1203 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 -CVE-2007-1204 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-019 -CVE-2007-1205 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020 -CVE-2007-1206 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-022 -CVE-2007-1209 - http://securityreason.com/securityalert/2531 -CVE-2007-1209 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 -CVE-2007-1211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2007-1212 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2007-1213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2007-1214 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 -CVE-2007-1215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -CVE-2007-1218 - https://bugs.gentoo.org/show_bug.cgi?id=168916 -CVE-2007-1218 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9520 -CVE-2007-1219 - https://www.exploit-db.com/exploits/3382 -CVE-2007-1220 - http://securityreason.com/securityalert/2367 -CVE-2007-1221 - http://securityreason.com/securityalert/2367 -CVE-2007-1224 - https://www.exploit-db.com/exploits/3381 -CVE-2007-1225 - https://www.exploit-db.com/exploits/3381 -CVE-2007-1226 - http://securityreason.com/securityalert/2342 -CVE-2007-1227 - http://securityreason.com/securityalert/2342 -CVE-2007-1233 - https://www.exploit-db.com/exploits/3379 -CVE-2007-1234 - http://securityreason.com/securityalert/2373 -CVE-2007-1235 - http://securityreason.com/securityalert/2373 -CVE-2007-1236 - http://securityreason.com/securityalert/2373 -CVE-2007-1237 - http://securityreason.com/securityalert/2373 -CVE-2007-1248 - http://securityreason.com/securityalert/2343 -CVE-2007-1250 - https://www.exploit-db.com/exploits/3390 -CVE-2007-1251 - http://aluigi.altervista.org/adv/netrekfs-adv.txt -CVE-2007-1254 - https://www.exploit-db.com/exploits/3352 -CVE-2007-1255 - https://www.exploit-db.com/exploits/3352 -CVE-2007-1260 - https://www.exploit-db.com/exploits/3395 -CVE-2007-1263 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1264 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1265 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1266 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1267 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1268 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1269 - http://www.coresecurity.com/?action=item&id=1687 -CVE-2007-1270 - http://securityreason.com/securityalert/2524 -CVE-2007-1271 - http://securityreason.com/securityalert/2524 -CVE-2007-1282 - http://www.redhat.com/support/errata/RHSA-2007-0108.html -CVE-2007-1289 - http://securityreason.com/securityalert/2356 -CVE-2007-1291 - http://securityreason.com/securityalert/2356 -CVE-2007-1292 - http://www.vbulletin.com/forum/showthread.php?postid=1314422 -CVE-2007-1292 - https://www.exploit-db.com/exploits/3387 -CVE-2007-1293 - https://www.exploit-db.com/exploits/3403 -CVE-2007-1294 - https://www.exploit-db.com/exploits/3392 -CVE-2007-1295 - https://www.exploit-db.com/exploits/3411 -CVE-2007-1296 - https://www.exploit-db.com/exploits/3410 -CVE-2007-1297 - https://www.exploit-db.com/exploits/3409 -CVE-2007-1297 - https://www.exploit-db.com/exploits/5593 -CVE-2007-1298 - https://www.exploit-db.com/exploits/3408 -CVE-2007-1299 - https://www.exploit-db.com/exploits/3398 -CVE-2007-1301 - https://www.exploit-db.com/exploits/3397 -CVE-2007-1302 - http://securityreason.com/securityalert/2348 -CVE-2007-1304 - http://securityreason.com/securityalert/2350 -CVE-2007-1305 - http://securityreason.com/securityalert/2350 -CVE-2007-1308 - http://securityreason.com/securityalert/2345 -CVE-2007-1321 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9302 -CVE-2007-1330 - http://securityreason.com/securityalert/2388 -CVE-2007-1331 - http://securityreason.com/securityalert/2385 -CVE-2007-1331 - http://www.scip.ch/publikationen/advisories/scip_advisory-2893_eportfolio_%201.0_java_multiple_vulnerabilities.txt -CVE-2007-1332 - http://securityreason.com/securityalert/2385 -CVE-2007-1332 - http://www.scip.ch/publikationen/advisories/scip_advisory-2893_eportfolio_%201.0_java_multiple_vulnerabilities.txt -CVE-2007-1337 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 -CVE-2007-1339 - https://www.exploit-db.com/exploits/3416 -CVE-2007-1340 - https://www.exploit-db.com/exploits/3406 -CVE-2007-1342 - http://securityreason.com/securityalert/2396 -CVE-2007-1347 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html -CVE-2007-1347 - https://www.exploit-db.com/exploits/3419 -CVE-2007-1350 - http://securityreason.com/securityalert/2395 -CVE-2007-1355 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-1355 - http://securityreason.com/securityalert/2722 -CVE-2007-1357 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html -CVE-2007-1358 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-1371 - http://securityreason.com/securityalert/2399 -CVE-2007-1371 - http://www.radscan.com/conquest/cq-ml/msg00169.html -CVE-2007-1372 - https://www.exploit-db.com/exploits/3423 -CVE-2007-1373 - http://securityreason.com/securityalert/2398 -CVE-2007-1375 - https://www.exploit-db.com/exploits/3424 -CVE-2007-1376 - https://www.exploit-db.com/exploits/3426 -CVE-2007-1376 - https://www.exploit-db.com/exploits/3427 -CVE-2007-1380 - https://www.exploit-db.com/exploits/3413 -CVE-2007-1382 - https://www.exploit-db.com/exploits/3429 -CVE-2007-1391 - https://www.exploit-db.com/exploits/3436 -CVE-2007-1392 - https://www.exploit-db.com/exploits/3435 -CVE-2007-1393 - https://www.exploit-db.com/exploits/3438 -CVE-2007-1394 - https://www.exploit-db.com/exploits/3428 -CVE-2007-1395 - http://securityreason.com/securityalert/2402 -CVE-2007-1397 - http://securityreason.com/securityalert/8216 -CVE-2007-1398 - https://www.exploit-db.com/exploits/3434 -CVE-2007-1401 - http://securityreason.com/securityalert/2405 -CVE-2007-1401 - https://www.exploit-db.com/exploits/3431 -CVE-2007-1403 - https://www.exploit-db.com/exploits/3421 -CVE-2007-1404 - https://www.exploit-db.com/exploits/3432 -CVE-2007-1410 - https://www.exploit-db.com/exploits/3437 -CVE-2007-1411 - http://securityreason.com/securityalert/2407 -CVE-2007-1412 - https://www.exploit-db.com/exploits/3442 -CVE-2007-1413 - https://www.exploit-db.com/exploits/3439 -CVE-2007-1413 - https://www.exploit-db.com/exploits/4204 -CVE-2007-1415 - https://www.exploit-db.com/exploits/3443 -CVE-2007-1417 - https://www.exploit-db.com/exploits/3449 -CVE-2007-1420 - http://securityreason.com/securityalert/2413 -CVE-2007-1420 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530 -CVE-2007-1423 - https://www.exploit-db.com/exploits/3448 -CVE-2007-1425 - https://www.exploit-db.com/exploits/3457 -CVE-2007-1427 - https://www.exploit-db.com/exploits/3458 -CVE-2007-1428 - https://www.exploit-db.com/exploits/3455 -CVE-2007-1436 - http://securityreason.com/securityalert/2436 -CVE-2007-1437 - http://securityreason.com/securityalert/2435 -CVE-2007-1438 - https://www.exploit-db.com/exploits/3469 -CVE-2007-1439 - http://securityreason.com/securityalert/2423 -CVE-2007-1439 - https://www.exploit-db.com/exploits/3468 -CVE-2007-1440 - http://securityreason.com/securityalert/2431 -CVE-2007-1440 - https://www.exploit-db.com/exploits/3470 -CVE-2007-1441 - http://securityreason.com/securityalert/2434 -CVE-2007-1445 - https://www.exploit-db.com/exploits/3466 -CVE-2007-1446 - http://securityreason.com/securityalert/2421 -CVE-2007-1451 - http://securityreason.com/securityalert/2433 -CVE-2007-1454 - http://www.securityfocus.com/bid/22914 -CVE-2007-1459 - https://www.exploit-db.com/exploits/3473 -CVE-2007-1467 - http://securityreason.com/securityalert/2437 -CVE-2007-1468 - http://securityreason.com/securityalert/2442 -CVE-2007-1470 - http://securityreason.com/securityalert/2441 -CVE-2007-1471 - http://securityreason.com/securityalert/2440 -CVE-2007-1472 - http://securityreason.com/securityalert/2428 -CVE-2007-1472 - https://www.exploit-db.com/exploits/3486 -CVE-2007-1475 - http://securityreason.com/securityalert/2439 -CVE-2007-1475 - https://www.exploit-db.com/exploits/3488 -CVE-2007-1476 - http://marc.info/?l=full-disclosure&m=117396596027148&w=2 -CVE-2007-1476 - http://securityreason.com/securityalert/2438 -CVE-2007-1478 - https://www.exploit-db.com/exploits/3494 -CVE-2007-1479 - https://www.exploit-db.com/exploits/3489 -CVE-2007-1480 - https://www.exploit-db.com/exploits/3489 -CVE-2007-1481 - https://www.exploit-db.com/exploits/3490 -CVE-2007-1482 - https://www.exploit-db.com/exploits/3490 -CVE-2007-1483 - https://www.exploit-db.com/exploits/3492 -CVE-2007-1485 - http://securityreason.com/securityalert/2443 -CVE-2007-1486 - http://securityreason.com/securityalert/2432 -CVE-2007-1487 - https://www.exploit-db.com/exploits/3484 -CVE-2007-1493 - http://securityreason.com/securityalert/2430 -CVE-2007-1495 - http://securityreason.com/securityalert/2445 -CVE-2007-1496 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9831 -CVE-2007-1498 - http://securityreason.com/securityalert/2444 -CVE-2007-1499 - http://securityreason.com/securityalert/2448 -CVE-2007-1499 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -CVE-2007-1501 - https://www.exploit-db.com/exploits/3514 -CVE-2007-1502 - http://securityreason.com/securityalert/2447 -CVE-2007-1503 - http://securityreason.com/securityalert/2447 -CVE-2007-1510 - https://www.exploit-db.com/exploits/3500 -CVE-2007-1511 - http://securityreason.com/securityalert/2470 -CVE-2007-1513 - http://securityreason.com/securityalert/2452 -CVE-2007-1513 - https://www.exploit-db.com/exploits/3485 -CVE-2007-1514 - http://securityreason.com/securityalert/2449 -CVE-2007-1516 - https://www.exploit-db.com/exploits/3487 -CVE-2007-1517 - https://www.exploit-db.com/exploits/3477 -CVE-2007-1519 - http://www.ush.it/2007/03/09/php-nuke-wild-post-xss/ -CVE-2007-1520 - http://www.ush.it/2007/03/09/php-nuke-wild-post-xss/ -CVE-2007-1523 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson -CVE-2007-1524 - https://www.exploit-db.com/exploits/3476/ -CVE-2007-1525 - https://www.exploit-db.com/exploits/3478 -CVE-2007-1539 - https://www.exploit-db.com/exploits/3521 -CVE-2007-1543 - http://aluigi.altervista.org/adv/nasbugs-adv.txt -CVE-2007-1544 - http://aluigi.altervista.org/adv/nasbugs-adv.txt -CVE-2007-1545 - http://aluigi.altervista.org/adv/nasbugs-adv.txt -CVE-2007-1546 - http://aluigi.altervista.org/adv/nasbugs-adv.txt -CVE-2007-1547 - http://aluigi.altervista.org/adv/nasbugs-adv.txt -CVE-2007-1552 - https://www.exploit-db.com/exploits/3516 -CVE-2007-1553 - https://www.exploit-db.com/exploits/3506 -CVE-2007-1555 - https://www.exploit-db.com/exploits/3519 -CVE-2007-1556 - https://www.exploit-db.com/exploits/3498 -CVE-2007-1558 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782 -CVE-2007-1560 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10291 -CVE-2007-1561 - http://marc.info/?l=full-disclosure&m=117432783011737&w=2 -CVE-2007-1561 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html -CVE-2007-1566 - https://www.exploit-db.com/exploits/3520 -CVE-2007-1568 - https://www.exploit-db.com/exploits/3462 -CVE-2007-1568 - https://www.exploit-db.com/exploits/3463 -CVE-2007-1569 - https://www.exploit-db.com/exploits/3464 -CVE-2007-1571 - https://www.exploit-db.com/exploits/3471 -CVE-2007-1577 - https://www.exploit-db.com/exploits/3522 -CVE-2007-1578 - https://www.exploit-db.com/exploits/3527 -CVE-2007-1579 - https://www.exploit-db.com/exploits/3537 -CVE-2007-1580 - https://www.exploit-db.com/exploits/3523 -CVE-2007-1581 - https://www.exploit-db.com/exploits/3529 -CVE-2007-1582 - https://www.exploit-db.com/exploits/3525 -CVE-2007-1584 - https://www.exploit-db.com/exploits/3517 -CVE-2007-1592 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html -CVE-2007-1594 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html -CVE-2007-1596 - https://www.exploit-db.com/exploits/3539 -CVE-2007-1600 - https://www.exploit-db.com/exploits/3533 -CVE-2007-1612 - https://www.exploit-db.com/exploits/3513 -CVE-2007-1613 - https://www.exploit-db.com/exploits/3503 -CVE-2007-1615 - https://www.exploit-db.com/exploits/3509 -CVE-2007-1616 - https://www.exploit-db.com/exploits/3515 -CVE-2007-1617 - https://www.exploit-db.com/exploits/3510 -CVE-2007-1618 - https://www.exploit-db.com/exploits/3507 -CVE-2007-1619 - https://www.exploit-db.com/exploits/3511 -CVE-2007-1620 - https://www.exploit-db.com/exploits/3501 -CVE-2007-1621 - https://www.exploit-db.com/exploits/3504 -CVE-2007-1622 - http://www.buayacorp.com/files/wordpress/wordpress-advisory.txt -CVE-2007-1626 - https://www.exploit-db.com/exploits/3512 -CVE-2007-1628 - https://www.exploit-db.com/exploits/3532 -CVE-2007-1629 - https://www.exploit-db.com/exploits/3536 -CVE-2007-1630 - https://www.exploit-db.com/exploits/3534 -CVE-2007-1633 - https://www.exploit-db.com/exploits/3518 -CVE-2007-1636 - https://www.exploit-db.com/exploits/3548 -CVE-2007-1640 - https://www.exploit-db.com/exploits/3542 -CVE-2007-1641 - https://www.exploit-db.com/exploits/3543 -CVE-2007-1643 - https://www.exploit-db.com/exploits/3545 -CVE-2007-1644 - https://www.exploit-db.com/exploits/3544 -CVE-2007-1645 - https://www.exploit-db.com/exploits/3541 -CVE-2007-1646 - http://securityreason.com/securityalert/2475 -CVE-2007-1647 - https://www.exploit-db.com/exploits/3508 -CVE-2007-1648 - https://www.exploit-db.com/exploits/3547 -CVE-2007-1658 - http://isc.sans.org/diary.html?storyid=2507 -CVE-2007-1658 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9014194 -CVE-2007-1658 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 -CVE-2007-1659 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9725 -CVE-2007-1660 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2007-1667 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776 -CVE-2007-1669 - http://securityreason.com/securityalert/2680 -CVE-2007-1671 - http://securityreason.com/securityalert/2680 -CVE-2007-1672 - http://securityreason.com/securityalert/2680 -CVE-2007-1673 - http://securityreason.com/securityalert/2680 -CVE-2007-1678 - http://securityreason.com/securityalert/2480 -CVE-2007-1679 - http://securityreason.com/securityalert/2487 -CVE-2007-1680 - http://securityreason.com/securityalert/2523 -CVE-2007-1692 - http://isc.sans.org/diary.html?storyid=2517 -CVE-2007-1693 - http://securityreason.com/securityalert/2716 -CVE-2007-1696 - https://www.exploit-db.com/exploits/3556 -CVE-2007-1697 - https://www.exploit-db.com/exploits/3552 -CVE-2007-1698 - https://www.exploit-db.com/exploits/3552 -CVE-2007-1699 - https://www.exploit-db.com/exploits/3557 -CVE-2007-1702 - https://www.exploit-db.com/exploits/3567 -CVE-2007-1703 - https://www.exploit-db.com/exploits/3565 -CVE-2007-1704 - https://www.exploit-db.com/exploits/3564 -CVE-2007-1705 - https://www.exploit-db.com/exploits/3549 -CVE-2007-1706 - https://www.exploit-db.com/exploits/3558 -CVE-2007-1707 - https://www.exploit-db.com/exploits/3562 -CVE-2007-1708 - https://www.exploit-db.com/exploits/3563 -CVE-2007-1709 - http://securityreason.com/securityalert/2512 -CVE-2007-1709 - https://www.exploit-db.com/exploits/3576 -CVE-2007-1710 - https://www.exploit-db.com/exploits/3573 -CVE-2007-1712 - https://www.exploit-db.com/exploits/3551 -CVE-2007-1714 - http://securityreason.com/securityalert/2481 -CVE-2007-1715 - https://www.exploit-db.com/exploits/3568 -CVE-2007-1719 - https://www.exploit-db.com/exploits/3578 -CVE-2007-1720 - https://www.exploit-db.com/exploits/3582 -CVE-2007-1721 - http://securityreason.com/securityalert/2491 -CVE-2007-1721 - https://www.exploit-db.com/exploits/3583 -CVE-2007-1723 - http://securityreason.com/securityalert/2484 -CVE-2007-1725 - https://www.exploit-db.com/exploits/3580 -CVE-2007-1725 - https://www.exploit-db.com/exploits/3581 -CVE-2007-1726 - https://www.exploit-db.com/exploits/3581 -CVE-2007-1728 - http://securityreason.com/securityalert/2485 -CVE-2007-1729 - http://securityreason.com/securityalert/2486 -CVE-2007-1730 - http://securityreason.com/securityalert/2482 -CVE-2007-1732 - http://marc.info/?l=bugtraq&m=117319839710382&w=2 -CVE-2007-1733 - http://securityreason.com/securityalert/2483 -CVE-2007-1733 - https://www.exploit-db.com/exploits/3589 -CVE-2007-1734 - http://securityreason.com/securityalert/2511 -CVE-2007-1735 - http://securityreason.com/securityalert/2489 -CVE-2007-1735 - https://www.exploit-db.com/exploits/3593 -CVE-2007-1736 - http://securityreason.com/securityalert/2488 -CVE-2007-1737 - http://securityreason.com/securityalert/2488 -CVE-2007-1744 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 -CVE-2007-1747 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-025 -CVE-2007-1749 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-050 -CVE-2007-1750 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -CVE-2007-1751 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -CVE-2007-1754 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-037 -CVE-2007-1756 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 -CVE-2007-1764 - http://securityreason.com/securityalert/2510 -CVE-2007-1766 - http://securityreason.com/securityalert/2508 -CVE-2007-1766 - https://www.exploit-db.com/exploits/3608 -CVE-2007-1771 - https://www.exploit-db.com/exploits/3592 -CVE-2007-1776 - https://www.exploit-db.com/exploits/3590 -CVE-2007-1778 - https://www.exploit-db.com/exploits/3591 -CVE-2007-1785 - http://securityreason.com/securityalert/2509 -CVE-2007-1787 - https://www.exploit-db.com/exploits/3600 -CVE-2007-1790 - https://www.exploit-db.com/exploits/3607 -CVE-2007-1791 - https://www.exploit-db.com/exploits/3605 -CVE-2007-1797 - http://www.imagemagick.org/script/changelog.php -CVE-2007-1797 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254 -CVE-2007-1800 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Dror -CVE-2007-1801 - https://www.exploit-db.com/exploits/3601 -CVE-2007-1804 - http://aluigi.altervista.org/adv/pulsex-adv.txt -CVE-2007-1804 - http://aluigi.org/poc/pulsex.zip -CVE-2007-1805 - https://www.exploit-db.com/exploits/3630 -CVE-2007-1806 - https://www.exploit-db.com/exploits/3633 -CVE-2007-1807 - https://www.exploit-db.com/exploits/3632 -CVE-2007-1808 - https://www.exploit-db.com/exploits/3629 -CVE-2007-1809 - https://www.exploit-db.com/exploits/3628 -CVE-2007-1810 - https://www.exploit-db.com/exploits/3626 -CVE-2007-1811 - https://www.exploit-db.com/exploits/3625 -CVE-2007-1812 - https://www.exploit-db.com/exploits/3624 -CVE-2007-1813 - https://www.exploit-db.com/exploits/3623 -CVE-2007-1814 - https://www.exploit-db.com/exploits/3620 -CVE-2007-1815 - https://www.exploit-db.com/exploits/3619 -CVE-2007-1816 - https://www.exploit-db.com/exploits/3621 -CVE-2007-1817 - https://www.exploit-db.com/exploits/3618 -CVE-2007-1818 - https://www.exploit-db.com/exploits/3613 -CVE-2007-1836 - http://securityreason.com/securityalert/2516 -CVE-2007-1837 - https://www.exploit-db.com/exploits/3598 -CVE-2007-1838 - https://www.exploit-db.com/exploits/3597 -CVE-2007-1839 - https://www.exploit-db.com/exploits/3599 -CVE-2007-1842 - https://www.exploit-db.com/exploits/3614 -CVE-2007-1843 - https://www.exploit-db.com/exploits/3638 -CVE-2007-1844 - http://securityreason.com/securityalert/2515 -CVE-2007-1845 - http://securityreason.com/securityalert/2514 -CVE-2007-1846 - https://www.exploit-db.com/exploits/3603 -CVE-2007-1847 - https://www.exploit-db.com/exploits/3612 -CVE-2007-1848 - http://securityreason.com/securityalert/2522 -CVE-2007-1850 - http://securityreason.com/securityalert/2522 -CVE-2007-1851 - https://www.exploit-db.com/exploits/3641 -CVE-2007-1852 - http://securityreason.com/securityalert/2517 -CVE-2007-1855 - http://securityreason.com/securityalert/2520 -CVE-2007-1858 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-1862 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2007-1863 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824 -CVE-2007-1866 - http://securityreason.com/securityalert/2518 -CVE-2007-1867 - https://www.exploit-db.com/exploits/3648 -CVE-2007-1871 - http://securityreason.com/securityalert/2569 -CVE-2007-1872 - http://securityreason.com/securityalert/2568 -CVE-2007-1876 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 -CVE-2007-1877 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 -CVE-2007-1878 - http://securityreason.com/securityalert/2525 -CVE-2007-1878 - http://www.gnucitizen.org/blog/firebug-goes-evil -CVE-2007-1882 - http://securityreason.com/securityalert/2527 -CVE-2007-1894 - http://chxsecurity.org/advisories/adv-1-mid.txt -CVE-2007-1894 - http://securityreason.com/securityalert/2526 -CVE-2007-1895 - https://www.exploit-db.com/exploits/3657 -CVE-2007-1896 - https://www.exploit-db.com/exploits/3657 -CVE-2007-1897 - https://www.exploit-db.com/exploits/3656 -CVE-2007-1898 - http://securityreason.com/securityalert/2710 -CVE-2007-1899 - https://www.exploit-db.com/exploits/5975 -CVE-2007-1905 - http://securityreason.com/securityalert/2554 -CVE-2007-1906 - http://securityreason.com/securityalert/2533 -CVE-2007-1907 - https://www.exploit-db.com/exploits/3696 -CVE-2007-1908 - https://www.exploit-db.com/exploits/3694 -CVE-2007-1909 - https://www.exploit-db.com/exploits/3691 -CVE-2007-1910 - https://www.exploit-db.com/exploits/3690 -CVE-2007-1911 - https://www.exploit-db.com/exploits/3690 -CVE-2007-1912 - https://www.exploit-db.com/exploits/3693 -CVE-2007-1913 - http://securityreason.com/securityalert/2535 -CVE-2007-1914 - http://securityreason.com/securityalert/2538 -CVE-2007-1915 - http://securityreason.com/securityalert/2538 -CVE-2007-1916 - http://securityreason.com/securityalert/2537 -CVE-2007-1917 - http://securityreason.com/securityalert/2536 -CVE-2007-1918 - http://securityreason.com/securityalert/2540 -CVE-2007-1920 - https://www.exploit-db.com/exploits/3678 -CVE-2007-1921 - http://securityreason.com/securityalert/2541 -CVE-2007-1921 - http://www.piotrbania.com/all/adv/nullsoft-winamp-libsndfile-adv.txt -CVE-2007-1922 - http://securityreason.com/securityalert/2532 -CVE-2007-1923 - http://securityreason.com/securityalert/2552 -CVE-2007-1923 - https://github.com/ledgersmb/LedgerSMB/blob/master/Changelog -CVE-2007-1924 - http://securityreason.com/securityalert/2528 -CVE-2007-1926 - http://securityreason.com/securityalert/2534 -CVE-2007-1927 - http://securityreason.com/securityalert/2529 -CVE-2007-1928 - http://securityreason.com/securityalert/2539 -CVE-2007-1929 - https://www.exploit-db.com/exploits/3676 -CVE-2007-1930 - https://www.exploit-db.com/exploits/3677 -CVE-2007-1931 - https://www.exploit-db.com/exploits/3679 -CVE-2007-1932 - https://www.exploit-db.com/exploits/3687 -CVE-2007-1933 - https://www.exploit-db.com/exploits/3689 -CVE-2007-1934 - https://www.exploit-db.com/exploits/3683 -CVE-2007-1935 - https://www.exploit-db.com/exploits/3682 -CVE-2007-1936 - https://www.exploit-db.com/exploits/3682 -CVE-2007-1937 - https://www.exploit-db.com/exploits/3681 -CVE-2007-1942 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html -CVE-2007-1942 - http://securityreason.com/securityalert/2558 -CVE-2007-1943 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html -CVE-2007-1943 - http://securityreason.com/securityalert/2558 -CVE-2007-1946 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html -CVE-2007-1946 - http://securityreason.com/securityalert/2558 -CVE-2007-1948 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html -CVE-2007-1948 - http://securityreason.com/securityalert/2558 -CVE-2007-1949 - http://securityreason.com/securityalert/2557 -CVE-2007-1950 - http://securityreason.com/securityalert/2557 -CVE-2007-1952 - http://securityreason.com/securityalert/2546 -CVE-2007-1956 - http://securityreason.com/securityalert/2545 -CVE-2007-1957 - http://securityreason.com/securityalert/2543 -CVE-2007-1960 - https://www.exploit-db.com/exploits/3666 -CVE-2007-1961 - https://www.exploit-db.com/exploits/3665 -CVE-2007-1962 - https://www.exploit-db.com/exploits/3663 -CVE-2007-1963 - https://www.exploit-db.com/exploits/3653 -CVE-2007-1964 - http://securityreason.com/securityalert/2544 -CVE-2007-1967 - http://securityreason.com/securityalert/2555 -CVE-2007-1968 - http://securityreason.com/securityalert/2548 -CVE-2007-1968 - https://www.exploit-db.com/exploits/3685 -CVE-2007-1969 - http://securityreason.com/securityalert/2549 -CVE-2007-1971 - http://securityreason.com/securityalert/2547 -CVE-2007-1972 - http://securityreason.com/securityalert/2599 -CVE-2007-1973 - http://securityreason.com/securityalert/2563 -CVE-2007-1974 - https://www.exploit-db.com/exploits/3644 -CVE-2007-1974 - https://www.exploit-db.com/exploits/3645 -CVE-2007-1974 - https://www.exploit-db.com/exploits/3646 -CVE-2007-1975 - http://securityreason.com/securityalert/2567 -CVE-2007-1976 - https://www.exploit-db.com/exploits/3642 -CVE-2007-1978 - https://www.exploit-db.com/exploits/3640 -CVE-2007-1979 - https://www.exploit-db.com/exploits/3655 -CVE-2007-1980 - https://www.exploit-db.com/exploits/3639 -CVE-2007-1982 - https://www.exploit-db.com/exploits/3641 -CVE-2007-1983 - https://www.exploit-db.com/exploits/3660 -CVE-2007-1984 - http://securityreason.com/securityalert/2559 -CVE-2007-1985 - http://securityreason.com/securityalert/2564 -CVE-2007-1986 - https://www.exploit-db.com/exploits/3659 -CVE-2007-1987 - http://securityreason.com/securityalert/2551 -CVE-2007-1988 - http://securityreason.com/securityalert/2550 -CVE-2007-1992 - https://www.exploit-db.com/exploits/3706 -CVE-2007-1994 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5624 -CVE-2007-1996 - http://securityreason.com/securityalert/2562 -CVE-2007-1998 - https://www.exploit-db.com/exploits/3697 -CVE-2007-1999 - https://www.exploit-db.com/exploits/3700 -CVE-2007-2000 - https://www.exploit-db.com/exploits/3701 -CVE-2007-2001 - https://www.exploit-db.com/exploits/3701 -CVE-2007-2002 - https://www.exploit-db.com/exploits/3702 -CVE-2007-2003 - https://www.exploit-db.com/exploits/3702 -CVE-2007-2004 - https://www.exploit-db.com/exploits/3702 -CVE-2007-2005 - https://www.exploit-db.com/exploits/3703 -CVE-2007-2006 - https://www.exploit-db.com/exploits/3704 -CVE-2007-2007 - https://www.exploit-db.com/exploits/3704 -CVE-2007-2008 - https://www.exploit-db.com/exploits/3704 -CVE-2007-2009 - https://www.exploit-db.com/exploits/3705 -CVE-2007-2011 - http://securityreason.com/securityalert/2556 -CVE-2007-2015 - http://securityreason.com/securityalert/2553 -CVE-2007-2016 - http://securityreason.com/securityalert/2560 -CVE-2007-2017 - http://pridels0.blogspot.com/2007/03/alstrasoft-video-share-enterprise.html -CVE-2007-2018 - http://pridels0.blogspot.com/2007/03/alstrasoft-video-share-enterprise.html -CVE-2007-2019 - http://securityreason.com/securityalert/2566 -CVE-2007-2020 - http://securityreason.com/securityalert/2561 -CVE-2007-2021 - http://securityreason.com/securityalert/2565 -CVE-2007-2022 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332 -CVE-2007-2027 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9741 -CVE-2007-2043 - https://www.exploit-db.com/exploits/3714 -CVE-2007-2044 - https://www.exploit-db.com/exploits/3712 -CVE-2007-2045 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9127 -CVE-2007-2048 - http://securityreason.com/securityalert/2589 -CVE-2007-2049 - https://www.exploit-db.com/exploits/3713 -CVE-2007-2050 - https://www.exploit-db.com/exploits/3718 -CVE-2007-2052 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-2052 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093 -CVE-2007-2053 - http://securityreason.com/securityalert/2655 -CVE-2007-2054 - http://securityreason.com/securityalert/2657 -CVE-2007-2055 - http://securityreason.com/securityalert/2656 -CVE-2007-2057 - http://securityreason.com/securityalert/2584 -CVE-2007-2060 - http://www.kb.cert.org/vuls/id/319464 -CVE-2007-2060 - http://www.kb.cert.org/vuls/id/MIMG-6ZKP4T -CVE-2007-2061 - http://securityreason.com/securityalert/2572 -CVE-2007-2062 - https://www.exploit-db.com/exploits/3727 -CVE-2007-2064 - http://securityreason.com/securityalert/2587 -CVE-2007-2067 - https://www.exploit-db.com/exploits/3745 -CVE-2007-2068 - https://www.exploit-db.com/exploits/3749 -CVE-2007-2069 - https://www.exploit-db.com/exploits/3747 -CVE-2007-2070 - https://www.exploit-db.com/exploits/3748 -CVE-2007-2072 - http://attrition.org/pipermail/vim/2007-April/001534.html -CVE-2007-2072 - http://securityreason.com/securityalert/2580 -CVE-2007-2073 - http://attrition.org/pipermail/vim/2007-April/001534.html -CVE-2007-2075 - http://sourceforge.net/tracker/index.php?func=detail&aid=1696780&group_id=101952&atid=630783 -CVE-2007-2078 - http://securityreason.com/securityalert/2582 -CVE-2007-2079 - https://www.exploit-db.com/exploits/3738 -CVE-2007-2080 - https://www.exploit-db.com/exploits/3738 -CVE-2007-2081 - http://securityreason.com/securityalert/2581 -CVE-2007-2082 - http://securityreason.com/securityalert/2581 -CVE-2007-2083 - http://securityreason.com/securityalert/2591 -CVE-2007-2084 - http://attrition.org/pipermail/vim/2007-April/001523.html -CVE-2007-2084 - http://securityreason.com/securityalert/2583 -CVE-2007-2086 - https://www.exploit-db.com/exploits/3741 -CVE-2007-2088 - http://securityreason.com/securityalert/2586 -CVE-2007-2089 - https://www.exploit-db.com/exploits/3736 -CVE-2007-2090 - http://securityreason.com/securityalert/2585 -CVE-2007-2091 - https://www.exploit-db.com/exploits/3750 -CVE-2007-2093 - http://securityreason.com/securityalert/2590 -CVE-2007-2093 - https://www.exploit-db.com/exploits/3735 -CVE-2007-2094 - http://www.securityfocus.com/bid/23524 -CVE-2007-2094 - https://www.exploit-db.com/exploits/3751 -CVE-2007-2095 - http://securityreason.com/securityalert/2592 -CVE-2007-2096 - http://securityreason.com/securityalert/2588 -CVE-2007-2097 - http://securityreason.com/securityalert/2573 -CVE-2007-2098 - http://securityreason.com/securityalert/2574 -CVE-2007-2099 - http://securityreason.com/securityalert/2575 -CVE-2007-2100 - http://securityreason.com/securityalert/2570 -CVE-2007-2102 - http://securityreason.com/securityalert/2571 -CVE-2007-2103 - http://securityreason.com/securityalert/2576 -CVE-2007-2104 - http://securityreason.com/securityalert/2577 -CVE-2007-2105 - http://securityreason.com/securityalert/2578 -CVE-2007-2106 - http://securityreason.com/securityalert/2579 -CVE-2007-2135 - http://securityreason.com/securityalert/2612 -CVE-2007-2136 - http://securityreason.com/securityalert/2598 -CVE-2007-2137 - http://securityreason.com/securityalert/2597 -CVE-2007-2138 - http://www.redhat.com/support/errata/RHSA-2007-0337.html -CVE-2007-2139 - http://securityreason.com/securityalert/2628 -CVE-2007-2141 - http://securityreason.com/securityalert/2593 -CVE-2007-2141 - https://www.exploit-db.com/exploits/3758 -CVE-2007-2142 - https://www.exploit-db.com/exploits/3752 -CVE-2007-2143 - https://www.exploit-db.com/exploits/3759 -CVE-2007-2144 - https://www.exploit-db.com/exploits/3753 -CVE-2007-2145 - https://www.exploit-db.com/exploits/3754 -CVE-2007-2147 - http://securityreason.com/securityalert/2595 -CVE-2007-2148 - http://securityreason.com/securityalert/2595 -CVE-2007-2149 - http://securityreason.com/securityalert/2595 -CVE-2007-2153 - http://securityreason.com/securityalert/2594 -CVE-2007-2154 - https://www.exploit-db.com/exploits/3756 -CVE-2007-2156 - https://www.exploit-db.com/exploits/3763 -CVE-2007-2157 - https://www.exploit-db.com/exploits/3764 -CVE-2007-2158 - https://www.exploit-db.com/exploits/3760 -CVE-2007-2164 - http://securityreason.com/securityalert/2600 -CVE-2007-2166 - https://www.exploit-db.com/exploits/3765 -CVE-2007-2167 - https://www.exploit-db.com/exploits/3762 -CVE-2007-2169 - https://www.exploit-db.com/exploits/3761 -CVE-2007-2170 - http://securityreason.com/securityalert/2611 -CVE-2007-2171 - http://securityreason.com/securityalert/2610 -CVE-2007-2175 - http://www.theregister.co.uk/2007/04/20/pwn-2-own_winner/ -CVE-2007-2179 - http://securityreason.com/securityalert/2606 -CVE-2007-2180 - http://securityreason.com/securityalert/2601 -CVE-2007-2180 - https://www.exploit-db.com/exploits/3768 -CVE-2007-2181 - https://www.exploit-db.com/exploits/3778 -CVE-2007-2182 - https://www.exploit-db.com/exploits/3775 -CVE-2007-2183 - https://www.exploit-db.com/exploits/3774 -CVE-2007-2184 - https://www.exploit-db.com/exploits/3773 -CVE-2007-2185 - https://www.exploit-db.com/exploits/3771 -CVE-2007-2186 - https://www.exploit-db.com/exploits/3770 -CVE-2007-2187 - http://www.digit-labs.org/files/exploits/extremail-v9.c -CVE-2007-2187 - https://www.exploit-db.com/exploits/3769 -CVE-2007-2189 - https://www.exploit-db.com/exploits/3766 -CVE-2007-2190 - http://securityreason.com/securityalert/2607 -CVE-2007-2191 - http://securityreason.com/securityalert/2627 -CVE-2007-2192 - https://www.exploit-db.com/exploits/3772 -CVE-2007-2193 - https://www.exploit-db.com/exploits/3776 -CVE-2007-2194 - https://www.exploit-db.com/exploits/3777 -CVE-2007-2196 - http://securityreason.com/securityalert/2603 -CVE-2007-2199 - https://www.exploit-db.com/exploits/3781 -CVE-2007-2199 - https://www.exploit-db.com/exploits/3915 -CVE-2007-2199 - https://www.exploit-db.com/exploits/4111 -CVE-2007-2200 - https://www.exploit-db.com/exploits/3783 -CVE-2007-2201 - http://securityreason.com/securityalert/2653 -CVE-2007-2201 - https://www.exploit-db.com/exploits/3785 -CVE-2007-2202 - http://securityreason.com/securityalert/2609 -CVE-2007-2204 - https://www.exploit-db.com/exploits/3786 -CVE-2007-2205 - http://securityreason.com/securityalert/2630 -CVE-2007-2206 - http://securityreason.com/securityalert/2602 -CVE-2007-2207 - http://securityreason.com/securityalert/2602 -CVE-2007-2208 - http://securityreason.com/securityalert/2608 -CVE-2007-2209 - https://www.exploit-db.com/exploits/3779 -CVE-2007-2210 - http://securityreason.com/securityalert/2604 -CVE-2007-2211 - https://www.exploit-db.com/exploits/3780 -CVE-2007-2214 - http://securityreason.com/securityalert/2605 -CVE-2007-2216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-2217 - http://www.kb.cert.org/vuls/id/180345 -CVE-2007-2217 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-2217 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-055 -CVE-2007-2217 - https://www.exploit-db.com/exploits/4584 -CVE-2007-2218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-031 -CVE-2007-2219 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-035 -CVE-2007-2221 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -CVE-2007-2222 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -CVE-2007-2223 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-042 -CVE-2007-2224 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-043 -CVE-2007-2225 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 -CVE-2007-2227 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 -CVE-2007-2228 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-2228 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-058 -CVE-2007-2229 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-032 -CVE-2007-2234 - http://securityreason.com/securityalert/2613 -CVE-2007-2235 - http://securityreason.com/securityalert/2613 -CVE-2007-2236 - http://securityreason.com/securityalert/2613 -CVE-2007-2237 - https://www.exploit-db.com/exploits/4044 -CVE-2007-2240 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-2242 - http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf -CVE-2007-2242 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9574 -CVE-2007-2243 - http://securityreason.com/securityalert/2631 -CVE-2007-2244 - https://www.exploit-db.com/exploits/3793 -CVE-2007-2247 - http://securityreason.com/securityalert/2616 -CVE-2007-2248 - http://securityreason.com/securityalert/2617 -CVE-2007-2248 - http://www.waraxe.us/advisory-49.html -CVE-2007-2249 - http://securityreason.com/securityalert/2617 -CVE-2007-2249 - http://www.waraxe.us/advisory-49.html -CVE-2007-2250 - http://securityreason.com/securityalert/2617 -CVE-2007-2250 - http://www.waraxe.us/advisory-49.html -CVE-2007-2254 - http://securityreason.com/securityalert/2618 -CVE-2007-2255 - http://securityreason.com/securityalert/2619 -CVE-2007-2256 - http://securityreason.com/securityalert/2620 -CVE-2007-2257 - http://securityreason.com/securityalert/2621 -CVE-2007-2258 - http://securityreason.com/securityalert/2622 -CVE-2007-2259 - http://securityreason.com/securityalert/2623 -CVE-2007-2260 - http://securityreason.com/securityalert/2624 -CVE-2007-2261 - http://securityreason.com/securityalert/2625 -CVE-2007-2262 - http://securityreason.com/securityalert/2626 -CVE-2007-2264 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9100 -CVE-2007-2265 - http://securityreason.com/securityalert/2629 -CVE-2007-2270 - https://www.exploit-db.com/exploits/3791 -CVE-2007-2270 - https://www.exploit-db.com/exploits/3792 -CVE-2007-2271 - https://www.exploit-db.com/exploits/3794 -CVE-2007-2272 - https://www.exploit-db.com/exploits/3795 -CVE-2007-2273 - https://www.exploit-db.com/exploits/3796 -CVE-2007-2274 - https://www.exploit-db.com/exploits/3784 -CVE-2007-2277 - http://securityreason.com/securityalert/2614 -CVE-2007-2278 - http://securityreason.com/securityalert/2615 -CVE-2007-2283 - https://www.exploit-db.com/exploits/3798 -CVE-2007-2284 - https://www.exploit-db.com/exploits/3797 -CVE-2007-2285 - http://attrition.org/pipermail/vim/2007-April/001545.html -CVE-2007-2285 - http://attrition.org/pipermail/vim/2007-April/001546.html -CVE-2007-2285 - https://www.exploit-db.com/exploits/3800 -CVE-2007-2290 - http://securityreason.com/securityalert/2632 -CVE-2007-2291 - http://securityreason.com/securityalert/2654 -CVE-2007-2291 - http://www.wisec.it/vulns.php?id=11 -CVE-2007-2292 - http://securityreason.com/securityalert/2654 -CVE-2007-2292 - http://www.wisec.it/vulns.php?id=11 -CVE-2007-2293 - http://securityreason.com/securityalert/2645 -CVE-2007-2294 - http://securityreason.com/securityalert/2646 -CVE-2007-2297 - http://securityreason.com/securityalert/2644 -CVE-2007-2298 - https://www.exploit-db.com/exploits/3732 -CVE-2007-2299 - https://www.exploit-db.com/exploits/3731 -CVE-2007-2300 - http://securityreason.com/securityalert/2643 -CVE-2007-2301 - https://www.exploit-db.com/exploits/3744 -CVE-2007-2302 - https://www.exploit-db.com/exploits/3722 -CVE-2007-2303 - https://www.exploit-db.com/exploits/3742 -CVE-2007-2304 - https://www.exploit-db.com/exploits/3729 -CVE-2007-2305 - https://www.exploit-db.com/exploits/3729 -CVE-2007-2306 - http://securityreason.com/securityalert/2642 -CVE-2007-2307 - https://www.exploit-db.com/exploits/3717 -CVE-2007-2308 - http://securityreason.com/securityalert/2639 -CVE-2007-2310 - http://securityreason.com/securityalert/2640 -CVE-2007-2311 - http://securityreason.com/securityalert/2641 -CVE-2007-2312 - http://securityreason.com/securityalert/2642 -CVE-2007-2313 - https://www.exploit-db.com/exploits/3716 -CVE-2007-2317 - https://www.exploit-db.com/exploits/3707 -CVE-2007-2319 - https://www.exploit-db.com/exploits/3734 -CVE-2007-2320 - https://www.exploit-db.com/exploits/3739 -CVE-2007-2324 - https://www.exploit-db.com/exploits/3799 -CVE-2007-2326 - http://securityreason.com/securityalert/2634 -CVE-2007-2327 - http://securityreason.com/securityalert/2635 -CVE-2007-2328 - http://securityreason.com/securityalert/2636 -CVE-2007-2329 - http://securityreason.com/securityalert/2637 -CVE-2007-2330 - http://securityreason.com/securityalert/2638 -CVE-2007-2331 - http://securityreason.com/securityalert/2633 -CVE-2007-2338 - http://securityreason.com/securityalert/2617 -CVE-2007-2338 - http://www.waraxe.us/advisory-49.html -CVE-2007-2339 - http://securityreason.com/securityalert/2617 -CVE-2007-2339 - http://www.waraxe.us/advisory-49.html -CVE-2007-2340 - https://www.exploit-db.com/exploits/3803 -CVE-2007-2341 - https://www.exploit-db.com/exploits/3802 -CVE-2007-2342 - https://www.exploit-db.com/exploits/3767 -CVE-2007-2345 - https://www.exploit-db.com/exploits/3668 -CVE-2007-2346 - https://www.exploit-db.com/exploits/3669 -CVE-2007-2347 - https://www.exploit-db.com/exploits/3667 -CVE-2007-2350 - http://securityreason.com/securityalert/2652 -CVE-2007-2352 - http://securityreason.com/securityalert/2657 -CVE-2007-2356 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238422 -CVE-2007-2357 - http://securityreason.com/securityalert/2649 -CVE-2007-2358 - http://attrition.org/pipermail/vim/2007-April/001566.html -CVE-2007-2362 - http://securityreason.com/securityalert/2658 -CVE-2007-2362 - http://www.digit-labs.org/files/exploits/mydns-rr-smash.c -CVE-2007-2363 - https://www.exploit-db.com/exploits/3811 -CVE-2007-2364 - https://www.exploit-db.com/exploits/3809 -CVE-2007-2365 - https://www.exploit-db.com/exploits/3812 -CVE-2007-2366 - https://www.exploit-db.com/exploits/3812 -CVE-2007-2367 - http://securityreason.com/securityalert/2647 -CVE-2007-2368 - https://www.exploit-db.com/exploits/3673 -CVE-2007-2369 - https://www.exploit-db.com/exploits/3673 -CVE-2007-2370 - https://www.exploit-db.com/exploits/3672 -CVE-2007-2371 - https://www.exploit-db.com/exploits/3671 -CVE-2007-2372 - https://www.exploit-db.com/exploits/3671 -CVE-2007-2373 - http://packetstormsecurity.org/0704-exploits/xoopswflinks-sql.txt -CVE-2007-2373 - https://www.exploit-db.com/exploits/3670 -CVE-2007-2408 - http://isc.sans.org/diary.html?storyid=3214 -CVE-2007-2411 - http://securityreason.com/securityalert/2648 -CVE-2007-2412 - http://securityreason.com/securityalert/2651 -CVE-2007-2416 - http://securityreason.com/securityalert/2650 -CVE-2007-2422 - http://securityreason.com/securityalert/2659 -CVE-2007-2424 - https://www.exploit-db.com/exploits/3818 -CVE-2007-2425 - https://www.exploit-db.com/exploits/3817 -CVE-2007-2426 - https://www.exploit-db.com/exploits/3814 -CVE-2007-2427 - https://www.exploit-db.com/exploits/3813 -CVE-2007-2430 - https://www.exploit-db.com/exploits/3816 -CVE-2007-2431 - https://www.exploit-db.com/exploits/3816 -CVE-2007-2438 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876 -CVE-2007-2442 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt -CVE-2007-2442 - http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt -CVE-2007-2442 - http://www.kb.cert.org/vuls/id/356961 -CVE-2007-2443 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt -CVE-2007-2443 - http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt -CVE-2007-2443 - http://www.kb.cert.org/vuls/id/365313 -CVE-2007-2444 - http://securityreason.com/securityalert/2701 -CVE-2007-2445 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2007-2446 - http://securityreason.com/securityalert/2702 -CVE-2007-2447 - http://securityreason.com/securityalert/2700 -CVE-2007-2448 - http://www.ubuntu.com/usn/USN-1053-1 -CVE-2007-2449 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-2450 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-2450 - http://securityreason.com/securityalert/2813 -CVE-2007-2452 - http://securityreason.com/securityalert/2760 -CVE-2007-2453 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9960 -CVE-2007-2456 - https://www.exploit-db.com/exploits/3805 -CVE-2007-2457 - https://www.exploit-db.com/exploits/3733 -CVE-2007-2458 - https://www.exploit-db.com/exploits/3733 -CVE-2007-2471 - https://www.exploit-db.com/exploits/3827 -CVE-2007-2481 - http://securityreason.com/securityalert/2660 -CVE-2007-2481 - https://www.exploit-db.com/exploits/3825 -CVE-2007-2482 - http://securityreason.com/securityalert/2660 -CVE-2007-2482 - http://www.exploit-db.com/exploits/3825 -CVE-2007-2483 - https://www.exploit-db.com/exploits/3824 -CVE-2007-2484 - https://www.exploit-db.com/exploits/3824 -CVE-2007-2485 - https://www.exploit-db.com/exploits/3828 -CVE-2007-2486 - https://www.exploit-db.com/exploits/3831 -CVE-2007-2487 - http://securityreason.com/securityalert/2675 -CVE-2007-2492 - http://securityreason.com/securityalert/2674 -CVE-2007-2492 - https://www.exploit-db.com/exploits/3835 -CVE-2007-2493 - https://www.exploit-db.com/exploits/3833 -CVE-2007-2494 - https://www.exploit-db.com/exploits/3826 -CVE-2007-2495 - https://www.exploit-db.com/exploits/3830 -CVE-2007-2497 - https://www.exploit-db.com/exploits/3819 -CVE-2007-2498 - https://www.exploit-db.com/exploits/3823 -CVE-2007-2503 - http://securityreason.com/securityalert/2673 -CVE-2007-2503 - http://www.attrition.org/pipermail/vim/2007-April/001541.html -CVE-2007-2504 - http://securityreason.com/securityalert/2673 -CVE-2007-2504 - http://www.attrition.org/pipermail/vim/2007-April/001541.html -CVE-2007-2507 - https://www.exploit-db.com/exploits/3832 -CVE-2007-2509 - http://securityreason.com/securityalert/2672 -CVE-2007-2514 - http://securityreason.com/securityalert/2785 -CVE-2007-2519 - http://pear.php.net/advisory-20070507.txt -CVE-2007-2521 - https://www.exploit-db.com/exploits/3846 -CVE-2007-2524 - http://securityreason.com/securityalert/2668 -CVE-2007-2527 - https://www.exploit-db.com/exploits/3868 -CVE-2007-2530 - https://www.exploit-db.com/exploits/3865 -CVE-2007-2531 - https://www.exploit-db.com/exploits/3869 -CVE-2007-2532 - http://securityreason.com/securityalert/2666 -CVE-2007-2534 - http://securityreason.com/securityalert/2669 -CVE-2007-2535 - http://securityreason.com/securityalert/2680 -CVE-2007-2536 - http://securityreason.com/securityalert/2680 -CVE-2007-2537 - http://securityreason.com/securityalert/2670 -CVE-2007-2538 - http://securityreason.com/securityalert/2671 -CVE-2007-2538 - https://www.exploit-db.com/exploits/3850 -CVE-2007-2539 - http://securityreason.com/securityalert/2671 -CVE-2007-2539 - https://www.exploit-db.com/exploits/3850 -CVE-2007-2540 - https://www.exploit-db.com/exploits/3852 -CVE-2007-2541 - https://www.exploit-db.com/exploits/3847 -CVE-2007-2542 - https://www.exploit-db.com/exploits/3848 -CVE-2007-2543 - https://www.exploit-db.com/exploits/3849 -CVE-2007-2544 - https://www.exploit-db.com/exploits/3854 -CVE-2007-2545 - https://www.exploit-db.com/exploits/3853 -CVE-2007-2546 - http://securityreason.com/securityalert/2676 -CVE-2007-2547 - http://securityreason.com/securityalert/2677 -CVE-2007-2547 - http://www.securityfocus.com/bid/23856 -CVE-2007-2548 - http://securityreason.com/securityalert/2677 -CVE-2007-2548 - http://www.securityfocus.com/bid/23856 -CVE-2007-2549 - http://securityreason.com/securityalert/2677 -CVE-2007-2549 - http://www.securityfocus.com/bid/23856 -CVE-2007-2550 - http://securityreason.com/securityalert/2678 -CVE-2007-2554 - http://securityreason.com/securityalert/2679 -CVE-2007-2555 - http://securityreason.com/securityalert/2664 -CVE-2007-2556 - http://securityreason.com/securityalert/2665 -CVE-2007-2556 - https://www.exploit-db.com/exploits/3858 -CVE-2007-2558 - http://securityreason.com/securityalert/2667 -CVE-2007-2559 - http://securityreason.com/securityalert/2681 -CVE-2007-2560 - https://www.exploit-db.com/exploits/3867 -CVE-2007-2561 - http://securityreason.com/securityalert/2688 -CVE-2007-2562 - http://securityreason.com/securityalert/2684 -CVE-2007-2565 - http://securityreason.com/securityalert/2687 -CVE-2007-2566 - http://securityreason.com/securityalert/2683 -CVE-2007-2567 - http://securityreason.com/securityalert/2683 -CVE-2007-2569 - https://www.exploit-db.com/exploits/3864 -CVE-2007-2570 - https://www.exploit-db.com/exploits/3863 -CVE-2007-2571 - https://www.exploit-db.com/exploits/3862 -CVE-2007-2572 - https://www.exploit-db.com/exploits/3861 -CVE-2007-2573 - https://www.exploit-db.com/exploits/3860 -CVE-2007-2574 - https://www.exploit-db.com/exploits/3859 -CVE-2007-2575 - https://www.exploit-db.com/exploits/3857 -CVE-2007-2576 - http://moaxb.blogspot.com/2007/05/moaxb-05-east-wind-software.html -CVE-2007-2576 - https://www.exploit-db.com/exploits/3856 -CVE-2007-2577 - http://securityreason.com/securityalert/2686 -CVE-2007-2578 - http://securityreason.com/securityalert/2686 -CVE-2007-2579 - http://securityreason.com/securityalert/2686 -CVE-2007-2580 - http://securityreason.com/securityalert/2685 -CVE-2007-2581 - http://securityreason.com/securityalert/2682 -CVE-2007-2581 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-2581 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-059 -CVE-2007-2583 - http://packetstormsecurity.com/files/124295/MySQL-5.0.x-Denial-Of-Service.html -CVE-2007-2583 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9930 -CVE-2007-2590 - http://securityreason.com/securityalert/2689 -CVE-2007-2591 - http://securityreason.com/securityalert/2689 -CVE-2007-2592 - http://securityreason.com/securityalert/2689 -CVE-2007-2594 - https://www.exploit-db.com/exploits/3879 -CVE-2007-2596 - https://www.exploit-db.com/exploits/3884 -CVE-2007-2597 - https://www.exploit-db.com/exploits/3885 -CVE-2007-2598 - https://www.exploit-db.com/exploits/3886 -CVE-2007-2599 - https://www.exploit-db.com/exploits/3887 -CVE-2007-2600 - https://www.exploit-db.com/exploits/3887 -CVE-2007-2601 - https://www.exploit-db.com/exploits/3889 -CVE-2007-2602 - http://securityreason.com/securityalert/2708 -CVE-2007-2603 - http://securityreason.com/securityalert/2708 -CVE-2007-2604 - http://securityreason.com/securityalert/2708 -CVE-2007-2605 - http://securityreason.com/securityalert/2708 -CVE-2007-2606 - http://securityreason.com/securityalert/2708 -CVE-2007-2607 - https://www.exploit-db.com/exploits/3870 -CVE-2007-2608 - https://www.exploit-db.com/exploits/3878 -CVE-2007-2609 - https://www.exploit-db.com/exploits/3876 -CVE-2007-2611 - https://www.exploit-db.com/exploits/3874 -CVE-2007-2614 - http://securityreason.com/securityalert/2690 -CVE-2007-2615 - https://www.exploit-db.com/exploits/3875 -CVE-2007-2618 - http://securityreason.com/securityalert/2691 -CVE-2007-2620 - https://www.exploit-db.com/exploits/3894 -CVE-2007-2621 - https://www.exploit-db.com/exploits/3895 -CVE-2007-2622 - https://www.exploit-db.com/exploits/3896 -CVE-2007-2623 - https://www.exploit-db.com/exploits/3891 -CVE-2007-2626 - http://securityreason.com/securityalert/2695 -CVE-2007-2627 - http://securityreason.com/securityalert/2694 -CVE-2007-2628 - http://securityreason.com/securityalert/2693 -CVE-2007-2629 - http://securityreason.com/securityalert/2698 -CVE-2007-2632 - http://marc.info/?l=bugtraq&m=117883301207293&w=2 -CVE-2007-2638 - http://securityreason.com/securityalert/2696 -CVE-2007-2639 - http://securityreason.com/securityalert/2699 -CVE-2007-2641 - http://securityreason.com/securityalert/2692 -CVE-2007-2641 - https://www.exploit-db.com/exploits/3905 -CVE-2007-2642 - https://www.exploit-db.com/exploits/3902 -CVE-2007-2643 - https://www.exploit-db.com/exploits/3901 -CVE-2007-2644 - https://www.exploit-db.com/exploits/3899 -CVE-2007-2646 - http://securityreason.com/securityalert/2706 -CVE-2007-2646 - http://vuln.sg/yenc32-107-en.html -CVE-2007-2647 - https://www.exploit-db.com/exploits/3903 -CVE-2007-2649 - http://securityreason.com/securityalert/2705 -CVE-2007-2654 - http://www.ubuntu.com/usn/usn-516-1 -CVE-2007-2656 - https://www.exploit-db.com/exploits/3898 -CVE-2007-2657 - https://www.exploit-db.com/exploits/3910 -CVE-2007-2658 - https://www.exploit-db.com/exploits/3917 -CVE-2007-2659 - https://www.exploit-db.com/exploits/3918 -CVE-2007-2660 - https://www.exploit-db.com/exploits/3915 -CVE-2007-2661 - https://www.exploit-db.com/exploits/3914 -CVE-2007-2662 - https://www.exploit-db.com/exploits/3911 -CVE-2007-2663 - https://www.exploit-db.com/exploits/3909 -CVE-2007-2664 - https://www.exploit-db.com/exploits/3908 -CVE-2007-2665 - https://www.exploit-db.com/exploits/3906 -CVE-2007-2666 - https://www.exploit-db.com/exploits/3912 -CVE-2007-2667 - https://www.exploit-db.com/exploits/3916 -CVE-2007-2668 - https://www.exploit-db.com/exploits/3913 -CVE-2007-2671 - http://securityreason.com/securityalert/2704 -CVE-2007-2672 - https://www.exploit-db.com/exploits/3839 -CVE-2007-2673 - https://www.exploit-db.com/exploits/3843 -CVE-2007-2674 - https://www.exploit-db.com/exploits/3842 -CVE-2007-2675 - https://www.exploit-db.com/exploits/3840 -CVE-2007-2676 - https://www.exploit-db.com/exploits/3838 -CVE-2007-2677 - https://www.exploit-db.com/exploits/3837 -CVE-2007-2681 - http://securityreason.com/securityalert/2697 -CVE-2007-2691 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559 -CVE-2007-2692 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166 -CVE-2007-2699 - http://packetstormsecurity.com/files/153072/Oracle-Application-Testing-Suite-WebLogic-Server-Administration-Console-War-Deployment.html -CVE-2007-2706 - https://www.exploit-db.com/exploits/3924 -CVE-2007-2707 - https://www.exploit-db.com/exploits/3923 -CVE-2007-2708 - https://www.exploit-db.com/exploits/3920 -CVE-2007-2709 - https://www.exploit-db.com/exploits/3919 -CVE-2007-2711 - https://www.exploit-db.com/exploits/3925 -CVE-2007-2713 - http://securityreason.com/securityalert/2707 -CVE-2007-2715 - https://www.exploit-db.com/exploits/3900 -CVE-2007-2717 - https://www.exploit-db.com/exploits/3907 -CVE-2007-2721 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9397 -CVE-2007-2722 - https://www.exploit-db.com/exploits/3930 -CVE-2007-2724 - http://securityreason.com/securityalert/2713 -CVE-2007-2726 - https://www.exploit-db.com/exploits/3929 -CVE-2007-2729 - http://securityreason.com/securityalert/2714 -CVE-2007-2730 - http://securityreason.com/securityalert/2714 -CVE-2007-2731 - http://securityreason.com/securityalert/2710 -CVE-2007-2732 - http://securityreason.com/securityalert/2711 -CVE-2007-2733 - http://securityreason.com/securityalert/2711 -CVE-2007-2734 - http://securityreason.com/securityalert/2712 -CVE-2007-2735 - https://www.exploit-db.com/exploits/3931 -CVE-2007-2736 - https://www.exploit-db.com/exploits/3928 -CVE-2007-2738 - https://www.exploit-db.com/exploits/3932 -CVE-2007-2743 - https://www.exploit-db.com/exploits/3935 -CVE-2007-2749 - https://www.exploit-db.com/exploits/3943 -CVE-2007-2750 - https://www.exploit-db.com/exploits/3942 -CVE-2007-2751 - https://www.exploit-db.com/exploits/3941 -CVE-2007-2752 - https://www.exploit-db.com/exploits/3936 -CVE-2007-2753 - https://www.exploit-db.com/exploits/3936 -CVE-2007-2755 - https://www.exploit-db.com/exploits/3938 -CVE-2007-2756 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2007-2757 - http://securityreason.com/securityalert/2721 -CVE-2007-2758 - http://vuln.sg/winimage808000-en.html -CVE-2007-2761 - https://www.exploit-db.com/exploits/3945 -CVE-2007-2762 - https://www.exploit-db.com/exploits/3947 -CVE-2007-2770 - https://www.exploit-db.com/exploits/3934 -CVE-2007-2772 - http://securityreason.com/securityalert/2727 -CVE-2007-2772 - https://www.exploit-db.com/exploits/3939 -CVE-2007-2772 - https://www.exploit-db.com/exploits/3940 -CVE-2007-2773 - https://www.exploit-db.com/exploits/3955 -CVE-2007-2774 - https://www.exploit-db.com/exploits/3953 -CVE-2007-2775 - https://www.exploit-db.com/exploits/3957 -CVE-2007-2776 - https://www.exploit-db.com/exploits/3958 -CVE-2007-2777 - https://www.exploit-db.com/exploits/3959 -CVE-2007-2778 - https://www.exploit-db.com/exploits/3949 -CVE-2007-2779 - https://www.exploit-db.com/exploits/3948 -CVE-2007-2780 - http://marc.info/?l=full-disclosure&m=117948032428148&w=2 -CVE-2007-2782 - http://securityreason.com/securityalert/2726 -CVE-2007-2783 - http://securityreason.com/securityalert/2723 -CVE-2007-2785 - http://securityreason.com/securityalert/2729 -CVE-2007-2787 - https://www.exploit-db.com/exploits/3951 -CVE-2007-2787 - https://www.exploit-db.com/exploits/3952 -CVE-2007-2790 - http://securityreason.com/securityalert/2728 -CVE-2007-2792 - http://packetstormsecurity.org/0806-exploits/joomlayanc-sql.txt -CVE-2007-2792 - https://www.exploit-db.com/exploits/3944 -CVE-2007-2793 - https://www.exploit-db.com/exploits/3946 -CVE-2007-2797 - http://securityreason.com/securityalert/3066 -CVE-2007-2798 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt -CVE-2007-2798 - http://www.kb.cert.org/vuls/id/554257 -CVE-2007-2798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996 -CVE-2007-2801 - http://www.securityfocus.com/archive/1/472434/100/0/threaded -CVE-2007-2803 - https://www.exploit-db.com/exploits/4007 -CVE-2007-2809 - http://isc.sans.org/diary.html?storyid=2823 -CVE-2007-2810 - http://securityreason.com/securityalert/2715 -CVE-2007-2812 - http://securityreason.com/securityalert/2724 -CVE-2007-2815 - http://securityreason.com/securityalert/2725 -CVE-2007-2816 - https://www.exploit-db.com/exploits/3962 -CVE-2007-2817 - https://www.exploit-db.com/exploits/3964 -CVE-2007-2820 - http://marc.info/?l=full-disclosure&m=117981953312669&w=2 -CVE-2007-2821 - http://www.waraxe.us/advisory-50.html -CVE-2007-2822 - https://www.exploit-db.com/exploits/3963 -CVE-2007-2824 - https://www.exploit-db.com/exploits/3956 -CVE-2007-2826 - http://securityreason.com/securityalert/2718 -CVE-2007-2826 - https://www.exploit-db.com/exploits/4031 -CVE-2007-2833 - http://www.ubuntu.com/usn/usn-504-1 -CVE-2007-2834 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9967 -CVE-2007-2845 - http://marc.info/?l=full-disclosure&m=118000321419384&w=2 -CVE-2007-2846 - http://marc.info/?l=full-disclosure&m=118007660813710&w=2 -CVE-2007-2851 - https://www.exploit-db.com/exploits/3961 -CVE-2007-2852 - http://securityreason.com/securityalert/2733 -CVE-2007-2853 - https://www.exploit-db.com/exploits/3967 -CVE-2007-2854 - https://www.exploit-db.com/exploits/3970 -CVE-2007-2857 - http://securityreason.com/securityalert/2732 -CVE-2007-2858 - http://securityreason.com/securityalert/2731 -CVE-2007-2859 - http://securityreason.com/securityalert/2735 -CVE-2007-2860 - http://securityreason.com/securityalert/2736 -CVE-2007-2861 - http://securityreason.com/securityalert/2734 -CVE-2007-2862 - http://securityreason.com/securityalert/2730 -CVE-2007-2863 - http://securityreason.com/securityalert/2790 -CVE-2007-2865 - http://marc.info/?l=full-disclosure&m=117987658110713&w=2 -CVE-2007-2870 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9547 -CVE-2007-2872 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424 -CVE-2007-2875 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9251 -CVE-2007-2877 - http://sourceforge.net/project/shownotes.php?group_id=10894&release_id=503937 -CVE-2007-2879 - http://securityreason.com/securityalert/2737 -CVE-2007-2880 - http://securityreason.com/securityalert/2738 -CVE-2007-2883 - http://securityreason.com/securityalert/2753 -CVE-2007-2884 - https://www.exploit-db.com/exploits/3976 -CVE-2007-2884 - https://www.exploit-db.com/exploits/3977 -CVE-2007-2887 - http://securityreason.com/securityalert/2742 -CVE-2007-2888 - https://www.exploit-db.com/exploits/3978 -CVE-2007-2889 - https://www.exploit-db.com/exploits/3980 -CVE-2007-2890 - https://www.exploit-db.com/exploits/3981 -CVE-2007-2891 - https://www.exploit-db.com/exploits/3983 -CVE-2007-2898 - http://securityreason.com/securityalert/2752 -CVE-2007-2898 - http://www.waraxe.us/advisory-51.html -CVE-2007-2899 - https://www.exploit-db.com/exploits/3971 -CVE-2007-2900 - https://www.exploit-db.com/exploits/3972 -CVE-2007-2901 - https://www.exploit-db.com/exploits/3974 -CVE-2007-2902 - https://www.exploit-db.com/exploits/3974 -CVE-2007-2905 - http://securityreason.com/securityalert/2752 -CVE-2007-2905 - http://www.waraxe.us/advisory-51.html -CVE-2007-2908 - http://securityreason.com/securityalert/2751 -CVE-2007-2913 - http://securityreason.com/securityalert/2749 -CVE-2007-2914 - http://securityreason.com/securityalert/2750 -CVE-2007-2915 - http://securityreason.com/securityalert/2746 -CVE-2007-2916 - http://securityreason.com/securityalert/2745 -CVE-2007-2926 - http://www.ubuntu.com/usn/usn-491-1 -CVE-2007-2928 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-2929 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-2931 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-054 -CVE-2007-2932 - http://securityreason.com/securityalert/2743 -CVE-2007-2933 - https://www.exploit-db.com/exploits/4003 -CVE-2007-2934 - https://www.exploit-db.com/exploits/3999 -CVE-2007-2935 - https://www.exploit-db.com/exploits/3998 -CVE-2007-2936 - https://www.exploit-db.com/exploits/3997 -CVE-2007-2937 - https://www.exploit-db.com/exploits/3995 -CVE-2007-2938 - https://www.exploit-db.com/exploits/3993 -CVE-2007-2939 - https://www.exploit-db.com/exploits/3994 -CVE-2007-2940 - https://www.exploit-db.com/exploits/3992 -CVE-2007-2941 - https://www.exploit-db.com/exploits/3990 -CVE-2007-2942 - https://www.exploit-db.com/exploits/3989 -CVE-2007-2943 - https://www.exploit-db.com/exploits/3987 -CVE-2007-2945 - http://securityreason.com/securityalert/2754 -CVE-2007-2946 - https://www.exploit-db.com/exploits/3986 -CVE-2007-2947 - https://www.exploit-db.com/exploits/3991 -CVE-2007-2958 - http://bugs.gentoo.org/show_bug.cgi?id=190104 -CVE-2007-2958 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-2959 - http://securityreason.com/securityalert/2747 -CVE-2007-2961 - http://sourceforge.net/project/shownotes.php?group_id=185741&release_id=512101 -CVE-2007-2962 - http://securityreason.com/securityalert/2748 -CVE-2007-2968 - http://securityreason.com/securityalert/2761 -CVE-2007-2969 - https://www.exploit-db.com/exploits/4000 -CVE-2007-2971 - https://www.exploit-db.com/exploits/3988 -CVE-2007-2972 - http://marc.info/?l=full-disclosure&m=118040810718045&w=2 -CVE-2007-2974 - http://securityreason.com/securityalert/2764 -CVE-2007-2975 - http://www.igniterealtime.org/issues/browse/JM-1049 -CVE-2007-2978 - http://securityreason.com/securityalert/2756 -CVE-2007-2979 - http://securityreason.com/securityalert/2755 -CVE-2007-2985 - https://www.exploit-db.com/exploits/4006 -CVE-2007-2986 - https://www.exploit-db.com/exploits/4005 -CVE-2007-2988 - http://securityreason.com/securityalert/2763 -CVE-2007-2988 - https://www.exploit-db.com/exploits/4004 -CVE-2007-2991 - http://securityreason.com/securityalert/2757 -CVE-2007-2992 - http://securityreason.com/securityalert/2759 -CVE-2007-2993 - http://securityreason.com/securityalert/2759 -CVE-2007-2994 - http://securityreason.com/securityalert/2762 -CVE-2007-2997 - http://securityreason.com/securityalert/2758 -CVE-2007-3000 - http://securityreason.com/securityalert/2768 -CVE-2007-3001 - http://securityreason.com/securityalert/2768 -CVE-2007-3002 - http://securityreason.com/securityalert/2768 -CVE-2007-3003 - http://securityreason.com/securityalert/2769 -CVE-2007-3006 - https://www.exploit-db.com/exploits/4017 -CVE-2007-3006 - https://www.exploit-db.com/exploits/6329 -CVE-2007-3010 - http://marc.info/?l=full-disclosure&m=119002152126755&w=2 -CVE-2007-3010 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php -CVE-2007-3011 - http://securityreason.com/securityalert/2858 -CVE-2007-3011 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php -CVE-2007-3012 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-003.php -CVE-2007-3013 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-004.php -CVE-2007-3014 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-005.php -CVE-2007-3017 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-006.php -CVE-2007-3018 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-007.php -CVE-2007-3027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -CVE-2007-3028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-039 -CVE-2007-3029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 -CVE-2007-3030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 -CVE-2007-3032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 -CVE-2007-3033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 -CVE-2007-3034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-046 -CVE-2007-3038 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-038 -CVE-2007-3039 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-065 -CVE-2007-3039 - https://www.exploit-db.com/exploits/4745 -CVE-2007-3039 - https://www.exploit-db.com/exploits/4760 -CVE-2007-3039 - https://www.exploit-db.com/exploits/4934 -CVE-2007-3040 - http://securityreason.com/securityalert/3124 -CVE-2007-3040 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-051 -CVE-2007-3041 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -CVE-2007-3047 - http://securityreason.com/securityalert/2771 -CVE-2007-3051 - https://www.exploit-db.com/exploits/4020 -CVE-2007-3052 - https://www.exploit-db.com/exploits/4026 -CVE-2007-3057 - https://www.exploit-db.com/exploits/4022 -CVE-2007-3059 - http://securityreason.com/securityalert/2770 -CVE-2007-3061 - http://securityreason.com/securityalert/2780 -CVE-2007-3065 - https://www.exploit-db.com/exploits/4019 -CVE-2007-3066 - http://securityreason.com/securityalert/2773 -CVE-2007-3068 - https://www.exploit-db.com/exploits/4024 -CVE-2007-3070 - http://securityreason.com/securityalert/2772 -CVE-2007-3072 - https://bugzilla.mozilla.org/show_bug.cgi?id=367428 -CVE-2007-3073 - https://bugzilla.mozilla.org/show_bug.cgi?id=367428 -CVE-2007-3074 - https://bugzilla.mozilla.org/show_bug.cgi?id=367428 -CVE-2007-3077 - https://www.exploit-db.com/exploits/4030 -CVE-2007-3080 - http://securityreason.com/securityalert/2766 -CVE-2007-3081 - http://securityreason.com/securityalert/2779 -CVE-2007-3082 - https://www.exploit-db.com/exploits/4029 -CVE-2007-3083 - http://securityreason.com/securityalert/2776 -CVE-2007-3085 - http://securityreason.com/securityalert/2777 -CVE-2007-3086 - http://securityreason.com/securityalert/2775 -CVE-2007-3087 - http://securityreason.com/securityalert/2774 -CVE-2007-3088 - http://securityreason.com/securityalert/2778 -CVE-2007-3089 - http://securityreason.com/securityalert/2781 -CVE-2007-3091 - http://securityreason.com/securityalert/2781 -CVE-2007-3091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2007-3092 - http://securityreason.com/securityalert/2781 -CVE-2007-3096 - https://www.exploit-db.com/exploits/4036 -CVE-2007-3098 - https://www.exploit-db.com/exploits/4033 -CVE-2007-3102 - http://www.redhat.com/support/errata/RHSA-2007-0703.html -CVE-2007-3103 - https://www.exploit-db.com/exploits/5167 -CVE-2007-3107 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9936 -CVE-2007-3108 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9984 -CVE-2007-3109 - http://securityreason.com/securityalert/2784 -CVE-2007-3111 - https://www.exploit-db.com/exploits/4023 -CVE-2007-3118 - https://www.exploit-db.com/exploits/4034 -CVE-2007-3119 - https://www.exploit-db.com/exploits/4040 -CVE-2007-3131 - http://securityreason.com/securityalert/2783 -CVE-2007-3132 - http://www.symantec.com/avcenter/security/Content/2007.06.05b.html -CVE-2007-3133 - http://securityreason.com/securityalert/2782 -CVE-2007-3135 - http://securityreason.com/securityalert/2787 -CVE-2007-3136 - https://www.exploit-db.com/exploits/4041 -CVE-2007-3137 - http://securityreason.com/securityalert/2789 -CVE-2007-3138 - https://www.exploit-db.com/exploits/4025 -CVE-2007-3139 - https://www.exploit-db.com/exploits/4025 -CVE-2007-3140 - https://www.exploit-db.com/exploits/4039 -CVE-2007-3141 - http://securityreason.com/securityalert/2786 -CVE-2007-3142 - http://www.0x000000.com/?i=334 -CVE-2007-3143 - http://www.0x000000.com/?i=334 -CVE-2007-3144 - http://www.0x000000.com/?i=334 -CVE-2007-3145 - http://www.0x000000.com/?i=334 -CVE-2007-3146 - http://securityreason.com/securityalert/2788 -CVE-2007-3147 - https://www.exploit-db.com/exploits/4042 -CVE-2007-3148 - https://www.exploit-db.com/exploits/4043 -CVE-2007-3157 - http://securityreason.com/securityalert/2803 -CVE-2007-3157 - http://www.digit-labs.org/files/exploits/safenet-dos.c -CVE-2007-3158 - http://securityreason.com/securityalert/2793 -CVE-2007-3159 - https://www.exploit-db.com/exploits/4046 -CVE-2007-3160 - https://www.exploit-db.com/exploits/4055 -CVE-2007-3161 - https://www.exploit-db.com/exploits/4058 -CVE-2007-3162 - http://www.exploit-db.com/exploits/14938 -CVE-2007-3162 - https://www.exploit-db.com/exploits/4056 -CVE-2007-3166 - https://www.exploit-db.com/exploits/4014 -CVE-2007-3167 - https://www.exploit-db.com/exploits/4015 -CVE-2007-3168 - https://www.exploit-db.com/exploits/4010 -CVE-2007-3169 - https://www.exploit-db.com/exploits/4009 -CVE-2007-3178 - http://securityreason.com/securityalert/2798 -CVE-2007-3179 - http://securityreason.com/securityalert/2799 -CVE-2007-3184 - http://securityreason.com/securityalert/2796 -CVE-2007-3188 - https://www.exploit-db.com/exploits/4057 -CVE-2007-3194 - http://securityreason.com/securityalert/2794 -CVE-2007-3196 - http://securityreason.com/securityalert/2795 -CVE-2007-3198 - http://securityreason.com/securityalert/2797 -CVE-2007-3199 - https://www.exploit-db.com/exploits/4059 -CVE-2007-3201 - http://securityreason.com/securityalert/2791 -CVE-2007-3202 - http://securityreason.com/securityalert/2792 -CVE-2007-3205 - http://securityreason.com/securityalert/2800 -CVE-2007-3214 - https://www.exploit-db.com/exploits/4054 -CVE-2007-3215 - http://seclists.org/fulldisclosure/2011/Oct/223 -CVE-2007-3215 - http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce -CVE-2007-3217 - http://securityreason.com/securityalert/2812 -CVE-2007-3220 - https://www.exploit-db.com/exploits/4070 -CVE-2007-3221 - https://www.exploit-db.com/exploits/4069 -CVE-2007-3222 - https://www.exploit-db.com/exploits/4068 -CVE-2007-3228 - https://www.exploit-db.com/exploits/4071 -CVE-2007-3230 - https://www.exploit-db.com/exploits/4072 -CVE-2007-3233 - https://www.exploit-db.com/exploits/4060 -CVE-2007-3234 - https://www.exploit-db.com/exploits/4062 -CVE-2007-3235 - https://www.exploit-db.com/exploits/4062 -CVE-2007-3236 - https://www.exploit-db.com/exploits/4064 -CVE-2007-3237 - https://www.exploit-db.com/exploits/4063 -CVE-2007-3248 - http://www.securityfocus.com/bid/24473 -CVE-2007-3249 - http://marc.info/?l=full-disclosure&m=118184411720509&w=2 -CVE-2007-3251 - https://www.exploit-db.com/exploits/4054 -CVE-2007-3254 - http://securityreason.com/securityalert/2845 -CVE-2007-3255 - http://securityreason.com/securityalert/2845 -CVE-2007-3256 - http://securityreason.com/securityalert/2845 -CVE-2007-3259 - http://securityreason.com/securityalert/2841 -CVE-2007-3266 - http://securityreason.com/securityalert/2816 -CVE-2007-3267 - http://securityreason.com/securityalert/2815 -CVE-2007-3269 - http://securityreason.com/securityalert/2825 -CVE-2007-3270 - https://www.exploit-db.com/exploits/4074 -CVE-2007-3271 - https://www.exploit-db.com/exploits/4075 -CVE-2007-3272 - https://www.exploit-db.com/exploits/4076 -CVE-2007-3274 - http://securityreason.com/securityalert/2810 -CVE-2007-3281 - http://securityreason.com/securityalert/2811 -CVE-2007-3282 - https://www.exploit-db.com/exploits/4067 -CVE-2007-3284 - http://lostmon.blogspot.com/2007/06/safari-301-552122-for-windows.html -CVE-2007-3288 - http://securityreason.com/securityalert/2826 -CVE-2007-3289 - https://www.exploit-db.com/exploits/4084 -CVE-2007-3290 - https://www.exploit-db.com/exploits/4082 -CVE-2007-3291 - https://www.exploit-db.com/exploits/4082 -CVE-2007-3292 - https://www.exploit-db.com/exploits/4082 -CVE-2007-3293 - https://www.exploit-db.com/exploits/4082 -CVE-2007-3294 - https://www.exploit-db.com/exploits/4080 -CVE-2007-3295 - http://securityreason.com/securityalert/2818 -CVE-2007-3297 - https://www.exploit-db.com/exploits/4085 -CVE-2007-3303 - http://securityreason.com/securityalert/2814 -CVE-2007-3304 - http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2 -CVE-2007-3304 - http://securityreason.com/securityalert/2814 -CVE-2007-3306 - https://www.exploit-db.com/exploits/4079 -CVE-2007-3307 - https://www.exploit-db.com/exploits/4078 -CVE-2007-3311 - http://securityreason.com/securityalert/2817 -CVE-2007-3311 - https://www.exploit-db.com/exploits/3588 -CVE-2007-3312 - https://www.exploit-db.com/exploits/4081 -CVE-2007-3313 - https://www.exploit-db.com/exploits/4081 -CVE-2007-3314 - http://vuln.sg/salamander25-en.html -CVE-2007-3323 - http://securityreason.com/securityalert/2819 -CVE-2007-3324 - http://securityreason.com/securityalert/2819 -CVE-2007-3325 - https://www.exploit-db.com/exploits/4086 -CVE-2007-3326 - http://securityreason.com/securityalert/2820 -CVE-2007-3327 - http://securityreason.com/securityalert/2828 -CVE-2007-3330 - http://securityreason.com/securityalert/2829 -CVE-2007-3331 - http://securityreason.com/securityalert/2829 -CVE-2007-3332 - http://securityreason.com/securityalert/2830 -CVE-2007-3339 - http://securityreason.com/securityalert/2842 -CVE-2007-3340 - http://securityreason.com/securityalert/2822 -CVE-2007-3342 - http://securityreason.com/securityalert/2821 -CVE-2007-3354 - http://securityreason.com/securityalert/2824 -CVE-2007-3355 - http://securityreason.com/securityalert/2824 -CVE-2007-3356 - http://securityreason.com/securityalert/2824 -CVE-2007-3357 - http://securityreason.com/securityalert/2824 -CVE-2007-3358 - https://www.exploit-db.com/exploits/4089 -CVE-2007-3360 - https://www.exploit-db.com/exploits/4087 -CVE-2007-3364 - http://securityreason.com/securityalert/2823 -CVE-2007-3365 - http://securityreason.com/securityalert/2827 -CVE-2007-3370 - https://www.exploit-db.com/exploits/4091 -CVE-2007-3371 - https://www.exploit-db.com/exploits/4090 -CVE-2007-3374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9524 -CVE-2007-3375 - http://vuln.sg/lhaca121-en.html -CVE-2007-3377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904 -CVE-2007-3378 - http://seclists.org/fulldisclosure/2020/Sep/34 -CVE-2007-3378 - http://www.openwall.com/lists/oss-security/2020/09/17/3 -CVE-2007-3380 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9337 -CVE-2007-3382 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-3384 - http://securityreason.com/securityalert/2971 -CVE-2007-3385 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-3385 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9549 -CVE-2007-3386 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2007-3388 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9690 -CVE-2007-3389 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9964 -CVE-2007-3396 - http://securityreason.com/securityalert/2840 -CVE-2007-3398 - http://securityreason.com/securityalert/2835 -CVE-2007-3400 - https://www.exploit-db.com/exploits/4101 -CVE-2007-3401 - https://www.exploit-db.com/exploits/4102 -CVE-2007-3402 - https://www.exploit-db.com/exploits/4107 -CVE-2007-3403 - https://www.exploit-db.com/exploits/4106 -CVE-2007-3404 - https://www.exploit-db.com/exploits/4105 -CVE-2007-3407 - http://securityreason.com/securityalert/2832 -CVE-2007-3425 - https://www.exploit-db.com/exploits/4100 -CVE-2007-3426 - https://www.exploit-db.com/exploits/4100 -CVE-2007-3427 - https://www.exploit-db.com/exploits/4100 -CVE-2007-3429 - https://www.exploit-db.com/exploits/4099 -CVE-2007-3430 - https://www.exploit-db.com/exploits/4098 -CVE-2007-3431 - https://www.exploit-db.com/exploits/4097 -CVE-2007-3432 - https://www.exploit-db.com/exploits/4096 -CVE-2007-3433 - https://www.exploit-db.com/exploits/4095 -CVE-2007-3434 - https://www.exploit-db.com/exploits/4095 -CVE-2007-3435 - https://www.exploit-db.com/exploits/4094 -CVE-2007-3446 - https://www.exploit-db.com/exploits/4103 -CVE-2007-3447 - https://www.exploit-db.com/exploits/4103 -CVE-2007-3448 - https://www.exploit-db.com/exploits/4103 -CVE-2007-3449 - https://www.exploit-db.com/exploits/4104 -CVE-2007-3451 - https://www.exploit-db.com/exploits/4104 -CVE-2007-3452 - https://www.exploit-db.com/exploits/4108 -CVE-2007-3453 - http://securityreason.com/securityalert/2843 -CVE-2007-3456 - http://www.mindedsecurity.com/labs/advisories/MSA01110707 -CVE-2007-3459 - http://securityreason.com/securityalert/2844 -CVE-2007-3459 - https://www.exploit-db.com/exploits/4110 -CVE-2007-3460 - https://www.exploit-db.com/exploits/4112 -CVE-2007-3461 - https://www.exploit-db.com/exploits/4114 -CVE-2007-3470 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9165 -CVE-2007-3472 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2007-3473 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2007-3475 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2007-3475 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728 -CVE-2007-3476 - http://www.redhat.com/support/errata/RHSA-2008-0146.html -CVE-2007-3487 - http://securityreason.com/securityalert/2846 -CVE-2007-3487 - https://www.exploit-db.com/exploits/4119 -CVE-2007-3488 - https://www.exploit-db.com/exploits/4120 -CVE-2007-3489 - http://securityreason.com/securityalert/2848 -CVE-2007-3490 - http://pstgroup.blogspot.com/2007/06/exploitmicrosoft-excel-20002003-sheet.html -CVE-2007-3490 - https://www.exploit-db.com/exploits/4121 -CVE-2007-3491 - http://securityreason.com/securityalert/2851 -CVE-2007-3492 - http://securityreason.com/securityalert/2847 -CVE-2007-3493 - https://www.exploit-db.com/exploits/4109 -CVE-2007-3494 - http://securityreason.com/securityalert/2853 -CVE-2007-3495 - http://securityreason.com/securityalert/2849 -CVE-2007-3496 - http://securityreason.com/securityalert/2850 -CVE-2007-3500 - http://securityreason.com/securityalert/2852 -CVE-2007-3505 - https://www.exploit-db.com/exploits/4115 -CVE-2007-3507 - http://securityreason.com/securityalert/2854 -CVE-2007-3511 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9763 -CVE-2007-3512 - http://vuln.sg/lhaca121-en.html -CVE-2007-3513 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9883 -CVE-2007-3515 - https://www.exploit-db.com/exploits/4130 -CVE-2007-3518 - https://www.exploit-db.com/exploits/4136 -CVE-2007-3519 - https://www.exploit-db.com/exploits/4135 -CVE-2007-3520 - https://www.exploit-db.com/exploits/4134 -CVE-2007-3521 - https://www.exploit-db.com/exploits/4133 -CVE-2007-3522 - https://www.exploit-db.com/exploits/4132 -CVE-2007-3523 - https://www.exploit-db.com/exploits/4131 -CVE-2007-3524 - https://www.exploit-db.com/exploits/4129 -CVE-2007-3526 - https://www.exploit-db.com/exploits/4128 -CVE-2007-3534 - https://www.exploit-db.com/exploits/4125 -CVE-2007-3535 - https://www.exploit-db.com/exploits/4124 -CVE-2007-3536 - https://www.exploit-db.com/exploits/4123 -CVE-2007-3539 - https://www.exploit-db.com/exploits/5222 -CVE-2007-3542 - https://www.exploit-db.com/exploits/4096 -CVE-2007-3543 - http://www.buayacorp.com/files/wordpress/wordpress-advisory.html -CVE-2007-3544 - http://www.buayacorp.com/files/wordpress/wordpress-advisory.html -CVE-2007-3547 - https://www.exploit-db.com/exploits/4116 -CVE-2007-3548 - https://www.exploit-db.com/exploits/4126 -CVE-2007-3549 - https://www.exploit-db.com/exploits/4127 -CVE-2007-3550 - http://securityreason.com/securityalert/2855 -CVE-2007-3555 - http://securityreason.com/securityalert/2857 -CVE-2007-3555 - http://securityvulns.ru/Rdocument391.html -CVE-2007-3555 - http://websecurity.com.ua/1045/ -CVE-2007-3556 - http://securityreason.com/securityalert/2857 -CVE-2007-3557 - http://securityreason.com/securityalert/2856 -CVE-2007-3559 - http://www.xssed.com/advisory/60/PHP-FUSION_FUSION_QUERY_Cross-Site_Scripting_Vulnerability/ -CVE-2007-3562 - https://www.exploit-db.com/exploits/4139 -CVE-2007-3563 - https://www.exploit-db.com/exploits/4138 -CVE-2007-3567 - http://securityreason.com/securityalert/2859 -CVE-2007-3569 - http://securityreason.com/securityalert/2868 -CVE-2007-3573 - http://securityreason.com/securityalert/2860 -CVE-2007-3574 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ -CVE-2007-3575 - http://securityreason.com/securityalert/2862 -CVE-2007-3582 - https://www.exploit-db.com/exploits/4141 -CVE-2007-3583 - https://www.exploit-db.com/exploits/4142 -CVE-2007-3584 - https://www.exploit-db.com/exploits/4147 -CVE-2007-3585 - https://www.exploit-db.com/exploits/4144 -CVE-2007-3586 - https://www.exploit-db.com/exploits/4144 -CVE-2007-3587 - https://www.exploit-db.com/exploits/4145 -CVE-2007-3588 - http://securityreason.com/securityalert/2861 -CVE-2007-3589 - https://www.exploit-db.com/exploits/4122 -CVE-2007-3590 - https://www.exploit-db.com/exploits/4122 -CVE-2007-3597 - http://securityreason.com/securityalert/2866 -CVE-2007-3605 - http://securityreason.com/securityalert/2873 -CVE-2007-3605 - https://www.exploit-db.com/exploits/4148 -CVE-2007-3606 - https://www.exploit-db.com/exploits/4149 -CVE-2007-3607 - http://securityreason.com/securityalert/2873 -CVE-2007-3607 - https://www.exploit-db.com/exploits/4148 -CVE-2007-3607 - https://www.exploit-db.com/exploits/4149 -CVE-2007-3608 - http://securityreason.com/securityalert/2873 -CVE-2007-3608 - https://www.exploit-db.com/exploits/4148 -CVE-2007-3608 - https://www.exploit-db.com/exploits/4149 -CVE-2007-3609 - https://www.exploit-db.com/exploits/4154 -CVE-2007-3610 - https://www.exploit-db.com/exploits/4153 -CVE-2007-3611 - https://www.exploit-db.com/exploits/4150 -CVE-2007-3612 - https://www.exploit-db.com/exploits/4152 -CVE-2007-3613 - http://securityreason.com/securityalert/2865 -CVE-2007-3614 - http://securityreason.com/securityalert/2867 -CVE-2007-3619 - http://securityreason.com/securityalert/2864 -CVE-2007-3619 - http://www.netragard.com/pdfs/research/NETRAGARD-20070628-MAILGUARD.txt -CVE-2007-3621 - http://securityreason.com/securityalert/2863 -CVE-2007-3621 - https://www.exploit-db.com/exploits/4151 -CVE-2007-3630 - https://www.exploit-db.com/exploits/4163 -CVE-2007-3631 - https://www.exploit-db.com/exploits/4159 -CVE-2007-3632 - https://www.exploit-db.com/exploits/4156 -CVE-2007-3633 - https://www.exploit-db.com/exploits/4160 -CVE-2007-3639 - http://securityreason.com/securityalert/2869 -CVE-2007-3640 - http://securityreason.com/securityalert/2882 -CVE-2007-3646 - https://www.exploit-db.com/exploits/4161 -CVE-2007-3647 - http://securityreason.com/securityalert/2870 -CVE-2007-3649 - https://www.exploit-db.com/exploits/4155 -CVE-2007-3655 - http://www.exploit-db.com/exploits/30284 -CVE-2007-3656 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9105 -CVE-2007-3657 - http://www.securityfocus.com/archive/1/473212 -CVE-2007-3658 - http://www.securityfocus.com/archive/1/473212 -CVE-2007-3662 - http://www.securityfocus.com/archive/1/473212 -CVE-2007-3663 - http://www.securityfocus.com/archive/1/473212 -CVE-2007-3665 - http://www.securityfocus.com/archive/1/473212 -CVE-2007-3666 - http://www.securityfocus.com/archive/1/473212 -CVE-2007-3670 - http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/ -CVE-2007-3670 - http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/ -CVE-2007-3671 - http://www.immunityinc.com/downloads/0day_IPO.pdf -CVE-2007-3675 - http://www.kaspersky.com/news?id=207575572 -CVE-2007-3678 - http://vuln.sg/quarkxpress72-en.html -CVE-2007-3681 - https://www.exploit-db.com/exploits/4165 -CVE-2007-3682 - https://www.exploit-db.com/exploits/4167 -CVE-2007-3683 - https://www.exploit-db.com/exploits/4164 -CVE-2007-3687 - https://www.exploit-db.com/exploits/4166 -CVE-2007-3697 - http://securityreason.com/securityalert/2881 -CVE-2007-3697 - https://www.exploit-db.com/exploits/4169 -CVE-2007-3702 - https://www.exploit-db.com/exploits/4171 -CVE-2007-3703 - http://www.exploit-db.com/exploits/4170 -CVE-2007-3726 - http://securityreason.com/securityalert/2880 -CVE-2007-3738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9875 -CVE-2007-3740 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9953 -CVE-2007-3742 - http://isc.sans.org/diary.html?storyid=3214 -CVE-2007-3743 - http://isc.sans.org/diary.html?storyid=3214 -CVE-2007-3768 - http://marc.info/?l=full-disclosure&m=118409539009277&w=2 -CVE-2007-3768 - http://securityreason.com/securityalert/2883 -CVE-2007-3769 - http://marc.info/?l=full-disclosure&m=118409539009277&w=2 -CVE-2007-3772 - https://www.exploit-db.com/exploits/4174 -CVE-2007-3773 - http://chxsecurity.org/advisories/adv-2-mid.txt -CVE-2007-3773 - http://securityreason.com/securityalert/2896 -CVE-2007-3774 - http://securityreason.com/securityalert/2886 -CVE-2007-3777 - http://securityreason.com/securityalert/2887 -CVE-2007-3778 - http://www.attrition.org/pipermail/vim/2007-July/001704.html -CVE-2007-3778 - http://www.attrition.org/pipermail/vim/2007-July/001710.html -CVE-2007-3778 - https://exchange.xforce.ibmcloud.com/vulnerabilities/35363 -CVE-2007-3781 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9195 -CVE-2007-3790 - https://www.exploit-db.com/exploits/4175 -CVE-2007-3792 - http://securityreason.com/securityalert/2888 -CVE-2007-3798 - http://bugs.gentoo.org/show_bug.cgi?id=184815 -CVE-2007-3798 - http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c -CVE-2007-3798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771 -CVE-2007-3799 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9792 -CVE-2007-3803 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf -CVE-2007-3803 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf -CVE-2007-3804 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf -CVE-2007-3804 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf -CVE-2007-3805 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf -CVE-2007-3805 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf -CVE-2007-3807 - http://securityreason.com/securityalert/2893 -CVE-2007-3808 - http://www.exploit-db.com/exploits/4186 -CVE-2007-3809 - https://www.exploit-db.com/exploits/4185 -CVE-2007-3810 - https://www.exploit-db.com/exploits/4184 -CVE-2007-3811 - https://www.exploit-db.com/exploits/4183 -CVE-2007-3813 - https://www.exploit-db.com/exploits/4180 -CVE-2007-3814 - https://www.exploit-db.com/exploits/4179 -CVE-2007-3815 - http://securityreason.com/securityalert/2898 -CVE-2007-3821 - http://securityreason.com/securityalert/2890 -CVE-2007-3822 - http://securityreason.com/securityalert/2890 -CVE-2007-3823 - http://packetstormsecurity.org/0707-advisories/wsftp75290-dos.txt -CVE-2007-3824 - http://www.packetstormsecurity.org/0707-exploits/mzkblog-sql.txt -CVE-2007-3826 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-3826 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 -CVE-2007-3834 - http://securityreason.com/securityalert/2889 -CVE-2007-3835 - http://securityreason.com/securityalert/2889 -CVE-2007-3840 - https://www.exploit-db.com/exploits/4187 -CVE-2007-3843 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9670 -CVE-2007-3844 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9493 -CVE-2007-3846 - http://crisp.cs.du.edu/?q=node/36 -CVE-2007-3847 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2007-3871 - http://securityreason.com/securityalert/3129 -CVE-2007-3876 - https://www.exploit-db.com/exploits/4759 -CVE-2007-3881 - https://www.exploit-db.com/exploits/4191 -CVE-2007-3882 - https://www.exploit-db.com/exploits/4189 -CVE-2007-3883 - https://www.exploit-db.com/exploits/4190 -CVE-2007-3883 - https://www.exploit-db.com/exploits/5395 -CVE-2007-3887 - http://www.packetstormsecurity.org/0707-exploits/aspziy-xss.txt -CVE-2007-3889 - https://www.exploit-db.com/exploits/5774 -CVE-2007-3890 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-044 -CVE-2007-3891 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 -CVE-2007-3892 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-3892 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 -CVE-2007-3893 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-3893 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 -CVE-2007-3895 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-064 -CVE-2007-3896 - http://www.heise-security.co.uk/news/96982 -CVE-2007-3897 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-3897 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-056 -CVE-2007-3898 - http://securityreason.com/securityalert/3373 -CVE-2007-3898 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-062 -CVE-2007-3899 - http://www.securityfocus.com/archive/1/482366/100/0/threaded -CVE-2007-3901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-064 -CVE-2007-3901 - https://www.exploit-db.com/exploits/4866 -CVE-2007-3902 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -CVE-2007-3903 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -CVE-2007-3919 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9913 -CVE-2007-3928 - http://securityreason.com/securityalert/2906 -CVE-2007-3932 - https://www.exploit-db.com/exploits/4194 -CVE-2007-3933 - https://www.exploit-db.com/exploits/4193 -CVE-2007-3934 - https://www.exploit-db.com/exploits/4195 -CVE-2007-3935 - https://www.exploit-db.com/exploits/4197 -CVE-2007-3936 - https://www.exploit-db.com/exploits/4198 -CVE-2007-3937 - https://www.exploit-db.com/exploits/4198 -CVE-2007-3938 - https://www.exploit-db.com/exploits/4199 -CVE-2007-3939 - https://www.exploit-db.com/exploits/4192 -CVE-2007-3940 - http://packetstormsecurity.org/0707-advisories/quickersite-xss.txt -CVE-2007-3944 - http://www.nytimes.com/2007/07/23/technology/23iphone.html?_r=1&adxnnl=1&adxnnlx=1185163364-1OTsRJvbylLamj17FY2wnw&oref=slogin -CVE-2007-3951 - http://securityreason.com/securityalert/2912 -CVE-2007-3952 - http://securityreason.com/securityalert/2913 -CVE-2007-3953 - http://securityreason.com/securityalert/2914 -CVE-2007-3955 - https://www.exploit-db.com/exploits/4217 -CVE-2007-3956 - https://www.exploit-db.com/exploits/4205 -CVE-2007-3957 - https://www.exploit-db.com/exploits/4216 -CVE-2007-3958 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html -CVE-2007-3958 - https://www.exploit-db.com/exploits/4215 -CVE-2007-3963 - http://securityreason.com/securityalert/2915 -CVE-2007-3969 - http://securityreason.com/securityalert/2920 -CVE-2007-3970 - http://securityreason.com/securityalert/2922 -CVE-2007-3971 - http://securityreason.com/securityalert/2923 -CVE-2007-3972 - http://securityreason.com/securityalert/2924 -CVE-2007-3973 - https://www.exploit-db.com/exploits/4211 -CVE-2007-3974 - https://www.exploit-db.com/exploits/4211 -CVE-2007-3975 - http://securityreason.com/securityalert/2933 -CVE-2007-3976 - https://www.exploit-db.com/exploits/4213 -CVE-2007-3977 - https://www.exploit-db.com/exploits/4213 -CVE-2007-3978 - https://www.exploit-db.com/exploits/4213 -CVE-2007-3979 - https://www.exploit-db.com/exploits/4206 -CVE-2007-3980 - https://www.exploit-db.com/exploits/4210 -CVE-2007-3981 - https://www.exploit-db.com/exploits/4209 -CVE-2007-3982 - https://www.exploit-db.com/exploits/4208 -CVE-2007-3984 - https://www.exploit-db.com/exploits/4214 -CVE-2007-3988 - http://securityreason.com/securityalert/2926 -CVE-2007-3996 - http://securityreason.com/securityalert/3103 -CVE-2007-3997 - http://securityreason.com/securityalert/3102 -CVE-2007-3997 - https://www.exploit-db.com/exploits/4392 -CVE-2007-3999 - http://securityreason.com/securityalert/3092 -CVE-2007-3999 - http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt -CVE-2007-3999 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9379 -CVE-2007-4000 - http://securityreason.com/securityalert/3092 -CVE-2007-4000 - http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt -CVE-2007-4000 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9278 -CVE-2007-4005 - https://www.exploit-db.com/exploits/4222 -CVE-2007-4007 - https://www.exploit-db.com/exploits/4221 -CVE-2007-4008 - https://www.exploit-db.com/exploits/4220 -CVE-2007-4009 - https://www.exploit-db.com/exploits/4219 -CVE-2007-4010 - https://www.exploit-db.com/exploits/4218 -CVE-2007-4022 - http://securityreason.com/securityalert/2930 -CVE-2007-4031 - https://www.exploit-db.com/exploits/4230 -CVE-2007-4032 - https://www.exploit-db.com/exploits/4229 -CVE-2007-4033 - https://www.exploit-db.com/exploits/4227 -CVE-2007-4038 - http://seclists.org/fulldisclosure/2007/Jul/0557.html -CVE-2007-4039 - http://seclists.org/fulldisclosure/2007/Jul/0557.html -CVE-2007-4040 - http://seclists.org/fulldisclosure/2007/Jul/0557.html -CVE-2007-4045 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9303 -CVE-2007-4046 - https://www.exploit-db.com/exploits/4201 -CVE-2007-4047 - http://securityreason.com/securityalert/2934 -CVE-2007-4053 - https://www.exploit-db.com/exploits/4242 -CVE-2007-4054 - https://www.exploit-db.com/exploits/4241 -CVE-2007-4055 - https://www.exploit-db.com/exploits/4239 -CVE-2007-4056 - https://www.exploit-db.com/exploits/4238 -CVE-2007-4057 - https://www.exploit-db.com/exploits/4235 -CVE-2007-4058 - https://www.exploit-db.com/exploits/4244 -CVE-2007-4059 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-4059 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-4059 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-4059 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-4059 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-4059 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-4059 - https://www.exploit-db.com/exploits/4240 -CVE-2007-4060 - https://www.exploit-db.com/exploits/4243 -CVE-2007-4061 - https://www.exploit-db.com/exploits/4237 -CVE-2007-4065 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9173 -CVE-2007-4067 - https://www.exploit-db.com/exploits/4226 -CVE-2007-4068 - https://www.exploit-db.com/exploits/4224 -CVE-2007-4069 - https://www.exploit-db.com/exploits/4225 -CVE-2007-4071 - http://securityreason.com/securityalert/2946 -CVE-2007-4093 - http://securityreason.com/securityalert/2931 -CVE-2007-4094 - http://securityreason.com/securityalert/2932 -CVE-2007-4095 - http://securityreason.com/securityalert/2935 -CVE-2007-4101 - http://securityreason.com/securityalert/2937 -CVE-2007-4102 - http://securityreason.com/securityalert/2942 -CVE-2007-4108 - http://securityreason.com/securityalert/2948 -CVE-2007-4109 - http://securityreason.com/securityalert/2947 -CVE-2007-4110 - http://securityreason.com/securityalert/2936 -CVE-2007-4111 - http://securityreason.com/securityalert/2949 -CVE-2007-4114 - http://securityreason.com/securityalert/2945 -CVE-2007-4115 - http://securityreason.com/securityalert/2953 -CVE-2007-4117 - http://securityreason.com/securityalert/2940 -CVE-2007-4118 - http://securityreason.com/securityalert/2939 -CVE-2007-4119 - http://securityreason.com/securityalert/2943 -CVE-2007-4120 - http://securityreason.com/securityalert/2941 -CVE-2007-4121 - http://securityreason.com/securityalert/2944 -CVE-2007-4126 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9039 -CVE-2007-4127 - http://securityreason.com/securityalert/2938 -CVE-2007-4128 - https://www.exploit-db.com/exploits/4248 -CVE-2007-4135 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9864 -CVE-2007-4136 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871 -CVE-2007-4138 - http://securityreason.com/securityalert/3135 -CVE-2007-4140 - https://www.exploit-db.com/exploits/4252 -CVE-2007-4145 - http://securityreason.com/securityalert/2959 -CVE-2007-4155 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-4155 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-4155 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-4155 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-4155 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-4155 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-4155 - https://www.exploit-db.com/exploits/4245 -CVE-2007-4156 - https://www.exploit-db.com/exploits/4246 -CVE-2007-4171 - https://www.exploit-db.com/exploits/4254 -CVE-2007-4180 - http://securityreason.com/securityalert/2973 -CVE-2007-4181 - http://securityreason.com/securityalert/2973 -CVE-2007-4182 - http://securityreason.com/securityalert/2972 -CVE-2007-4183 - https://www.exploit-db.com/exploits/4253 -CVE-2007-4186 - http://securityreason.com/securityalert/2979 -CVE-2007-4187 - http://securityreason.com/securityalert/2969 -CVE-2007-4191 - http://securityreason.com/securityalert/2968 -CVE-2007-4203 - http://securityreason.com/securityalert/2970 -CVE-2007-4205 - http://securityreason.com/securityalert/2978 -CVE-2007-4207 - http://securityreason.com/securityalert/2977 -CVE-2007-4208 - http://securityreason.com/securityalert/2976 -CVE-2007-4210 - http://securityreason.com/securityalert/2975 -CVE-2007-4212 - http://securityreason.com/securityalert/2974 -CVE-2007-4213 - http://securityreason.com/securityalert/3034 -CVE-2007-4218 - http://securityreason.com/securityalert/3052 -CVE-2007-4219 - http://securityreason.com/securityalert/3052 -CVE-2007-4224 - http://securityreason.com/securityalert/2982 -CVE-2007-4224 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879 -CVE-2007-4225 - http://securityreason.com/securityalert/2982 -CVE-2007-4226 - http://securityreason.com/securityalert/2986 -CVE-2007-4227 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html -CVE-2007-4231 - https://www.exploit-db.com/exploits/4267 -CVE-2007-4232 - https://www.exploit-db.com/exploits/4268 -CVE-2007-4235 - http://securityreason.com/securityalert/2983 -CVE-2007-4242 - http://securityreason.com/securityalert/2981 -CVE-2007-4243 - http://securityreason.com/securityalert/2981 -CVE-2007-4244 - http://securityreason.com/securityalert/2984 -CVE-2007-4245 - http://securityreason.com/securityalert/2980 -CVE-2007-4247 - http://securityreason.com/securityalert/3004 -CVE-2007-4248 - http://securityreason.com/securityalert/3004 -CVE-2007-4249 - http://securityreason.com/securityalert/3004 -CVE-2007-4250 - http://securityreason.com/securityalert/3004 -CVE-2007-4251 - http://securityreason.com/securityalert/3004 -CVE-2007-4252 - https://www.exploit-db.com/exploits/4255 -CVE-2007-4253 - https://www.exploit-db.com/exploits/4256 -CVE-2007-4254 - https://www.exploit-db.com/exploits/4259 -CVE-2007-4255 - https://www.exploit-db.com/exploits/4260 -CVE-2007-4256 - https://www.exploit-db.com/exploits/4261 -CVE-2007-4257 - https://www.exploit-db.com/exploits/4262 -CVE-2007-4257 - https://www.exploit-db.com/exploits/4263 -CVE-2007-4258 - https://www.exploit-db.com/exploits/4265 -CVE-2007-4259 - http://securityreason.com/securityalert/2985 -CVE-2007-4260 - http://securityreason.com/securityalert/2985 -CVE-2007-4261 - http://securityreason.com/securityalert/2985 -CVE-2007-4262 - http://securityreason.com/securityalert/2985 -CVE-2007-4279 - https://www.exploit-db.com/exploits/4269 -CVE-2007-4283 - http://securityreason.com/securityalert/2989 -CVE-2007-4287 - https://www.exploit-db.com/exploits/4271 -CVE-2007-4288 - http://securityreason.com/securityalert/2987 -CVE-2007-4290 - http://securityreason.com/securityalert/2988 -CVE-2007-4297 - http://www.packetstormsecurity.org/0708-exploits/dersimiz-xss.txt -CVE-2007-4309 - http://www.heise-security.co.uk/news/92958 -CVE-2007-4312 - https://www.exploit-db.com/exploits/4275 -CVE-2007-4313 - https://www.exploit-db.com/exploits/4276 -CVE-2007-4314 - https://www.exploit-db.com/exploits/4278 -CVE-2007-4316 - http://securityreason.com/securityalert/3002 -CVE-2007-4317 - http://securityreason.com/securityalert/3002 -CVE-2007-4318 - http://securityreason.com/securityalert/3002 -CVE-2007-4319 - http://securityreason.com/securityalert/3002 -CVE-2007-4320 - https://www.exploit-db.com/exploits/4273 -CVE-2007-4324 - http://scan.flashsec.org/ -CVE-2007-4324 - http://securityreason.com/securityalert/2995 -CVE-2007-4325 - http://securityreason.com/securityalert/2994 -CVE-2007-4327 - http://securityreason.com/securityalert/3000 -CVE-2007-4328 - http://securityreason.com/securityalert/2999 -CVE-2007-4329 - http://securityreason.com/securityalert/2998 -CVE-2007-4330 - http://securityreason.com/securityalert/2997 -CVE-2007-4336 - https://www.exploit-db.com/exploits/4279 -CVE-2007-4339 - http://securityreason.com/securityalert/3008 -CVE-2007-4342 - http://securityreason.com/securityalert/3005 -CVE-2007-4349 - http://securityreason.com/securityalert/4501 -CVE-2007-4350 - http://securityreason.com/securityalert/4447 -CVE-2007-4351 - http://www.cups.org/str.php?L2561 -CVE-2007-4352 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9979 -CVE-2007-4358 - http://aluigi.altervista.org/adv/zoidboom2-adv.txt -CVE-2007-4358 - http://aluigi.org/poc/zoidboom2.zip -CVE-2007-4358 - http://securityreason.com/securityalert/3014 -CVE-2007-4362 - https://www.exploit-db.com/exploits/4284 -CVE-2007-4366 - http://securityreason.com/securityalert/3015 -CVE-2007-4366 - https://www.exploit-db.com/exploits/4281 -CVE-2007-4368 - https://www.exploit-db.com/exploits/4286 -CVE-2007-4369 - https://www.exploit-db.com/exploits/4282 -CVE-2007-4370 - https://www.exploit-db.com/exploits/4283 -CVE-2007-4371 - http://securityreason.com/securityalert/3016 -CVE-2007-4373 - http://aluigi.altervista.org/adv/bv2x-adv.txt -CVE-2007-4373 - http://securityreason.com/securityalert/3024 -CVE-2007-4374 - http://aluigi.altervista.org/adv/bv2x-adv.txt -CVE-2007-4374 - http://securityreason.com/securityalert/3024 -CVE-2007-4375 - http://securityreason.com/securityalert/3018 -CVE-2007-4376 - http://securityreason.com/securityalert/3019 -CVE-2007-4377 - https://www.exploit-db.com/exploits/4287 -CVE-2007-4378 - http://aluigi.altervista.org/adv/bv2x-adv.txt -CVE-2007-4378 - http://securityreason.com/securityalert/3024 -CVE-2007-4379 - http://aluigi.altervista.org/adv/bv2x-adv.txt -CVE-2007-4379 - http://securityreason.com/securityalert/3024 -CVE-2007-4382 - http://securityreason.com/securityalert/3027 -CVE-2007-4382 - https://www.exploit-db.com/exploits/4285 -CVE-2007-4385 - http://securityreason.com/securityalert/3035 -CVE-2007-4386 - https://www.exploit-db.com/exploits/4291 -CVE-2007-4396 - http://securityreason.com/securityalert/3036 -CVE-2007-4397 - http://securityreason.com/securityalert/3036 -CVE-2007-4398 - http://securityreason.com/securityalert/3036 -CVE-2007-4399 - http://securityreason.com/securityalert/3036 -CVE-2007-4400 - http://securityreason.com/securityalert/3036 -CVE-2007-4401 - http://securityreason.com/securityalert/3036 -CVE-2007-4402 - http://securityreason.com/securityalert/3036 -CVE-2007-4403 - http://securityreason.com/securityalert/3036 -CVE-2007-4404 - http://securityreason.com/securityalert/3031 -CVE-2007-4405 - http://securityreason.com/securityalert/3031 -CVE-2007-4406 - http://securityreason.com/securityalert/3031 -CVE-2007-4407 - http://securityreason.com/securityalert/3031 -CVE-2007-4408 - http://securityreason.com/securityalert/3031 -CVE-2007-4409 - http://securityreason.com/securityalert/3031 -CVE-2007-4410 - http://securityreason.com/securityalert/3031 -CVE-2007-4411 - http://securityreason.com/securityalert/3031 -CVE-2007-4420 - https://www.exploit-db.com/exploits/4290 -CVE-2007-4424 - http://securityreason.com/securityalert/3022 -CVE-2007-4425 - http://securityreason.com/securityalert/3030 -CVE-2007-4426 - http://securityreason.com/securityalert/3030 -CVE-2007-4429 - http://blogs.csoonline.com/the_skype_mystery_why_blame_the_august_windows_updates -CVE-2007-4429 - http://en.securitylab.ru/poc/301420.php -CVE-2007-4429 - http://en.securitylab.ru/poc/extra/301419.php -CVE-2007-4429 - http://securityreason.com/securityalert/3032 -CVE-2007-4429 - http://www.securitylab.ru/news/301422.php -CVE-2007-4430 - http://www.heise-security.co.uk/news/94526/ -CVE-2007-4431 - http://www.thespanner.co.uk/2007/08/17/safari-beta-zero-day/ -CVE-2007-4433 - http://www.packetstormsecurity.org/0708-exploits/aspnet-xss.txt -CVE-2007-4434 - http://www.packetstormsecurity.org/0708-exploits/tfsc-xss.txt -CVE-2007-4439 - https://www.exploit-db.com/exploits/4295 -CVE-2007-4440 - https://www.exploit-db.com/exploits/4294 -CVE-2007-4441 - https://www.exploit-db.com/exploits/4293 -CVE-2007-4442 - http://aluigi.org/adv/unrwebdos-adv.txt -CVE-2007-4442 - http://aluigi.org/poc/unrwebdos.zip -CVE-2007-4442 - http://securityreason.com/securityalert/3039 -CVE-2007-4443 - http://aluigi.org/adv/unrwebdos-adv.txt -CVE-2007-4443 - http://aluigi.org/poc/unrwebdos.zip -CVE-2007-4443 - http://securityreason.com/securityalert/3039 -CVE-2007-4444 - http://aluigi.org/poc/rfactorx.zip -CVE-2007-4444 - http://securityreason.com/securityalert/3037 -CVE-2007-4445 - http://aluigi.org/poc/rfactorx.zip -CVE-2007-4445 - http://securityreason.com/securityalert/3037 -CVE-2007-4446 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4446 - http://securityreason.com/securityalert/3033 -CVE-2007-4447 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4447 - http://securityreason.com/securityalert/3033 -CVE-2007-4448 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4448 - http://securityreason.com/securityalert/3033 -CVE-2007-4449 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4449 - http://securityreason.com/securityalert/3033 -CVE-2007-4450 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4450 - http://securityreason.com/securityalert/3033 -CVE-2007-4451 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4451 - http://securityreason.com/securityalert/3033 -CVE-2007-4452 - http://aluigi.org/poc/toribashish.zip -CVE-2007-4452 - http://securityreason.com/securityalert/3033 -CVE-2007-4454 - http://securityreason.com/securityalert/3038 -CVE-2007-4456 - https://www.exploit-db.com/exploits/4296 -CVE-2007-4463 - http://securityreason.com/securityalert/3044 -CVE-2007-4464 - http://securityreason.com/securityalert/3044 -CVE-2007-4465 - http://securityreason.com/securityalert/3113 -CVE-2007-4474 - https://www.exploit-db.com/exploits/4818 -CVE-2007-4474 - https://www.exploit-db.com/exploits/4820 -CVE-2007-4474 - https://www.exploit-db.com/exploits/5111 -CVE-2007-4476 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336 -CVE-2007-4484 - http://securityvulns.com/Rdocument846.html -CVE-2007-4485 - http://securityvulns.com/Rdocument845.html -CVE-2007-4486 - http://securityvulns.com/Rdocument752.html -CVE-2007-4487 - http://securityreason.com/securityalert/3051 -CVE-2007-4488 - http://securityreason.com/securityalert/3050 -CVE-2007-4489 - https://www.exploit-db.com/exploits/4299 -CVE-2007-4490 - http://securityreason.com/securityalert/3052 -CVE-2007-4496 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-4496 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-4496 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-4496 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-4496 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-4496 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-4497 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-4497 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-4497 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-4497 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-4497 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-4497 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-4498 - http://securityreason.com/securityalert/3059 -CVE-2007-4502 - https://www.exploit-db.com/exploits/4310 -CVE-2007-4503 - https://www.exploit-db.com/exploits/4308 -CVE-2007-4503 - https://www.exploit-db.com/exploits/6794 -CVE-2007-4504 - https://www.exploit-db.com/exploits/4307 -CVE-2007-4505 - https://www.exploit-db.com/exploits/4306 -CVE-2007-4506 - https://www.exploit-db.com/exploits/4305 -CVE-2007-4507 - https://www.exploit-db.com/exploits/4304 -CVE-2007-4508 - http://aluigi.altervista.org/adv/asurabof-adv.txt -CVE-2007-4508 - http://securityreason.com/securityalert/3053 -CVE-2007-4509 - https://www.exploit-db.com/exploits/4309 -CVE-2007-4510 - http://securityreason.com/securityalert/3054 -CVE-2007-4512 - http://securityreason.com/securityalert/3107 -CVE-2007-4517 - http://securityreason.com/securityalert/8524 -CVE-2007-4521 - http://securityreason.com/securityalert/3065 -CVE-2007-4522 - http://securityreason.com/securityalert/3058 -CVE-2007-4523 - http://securityreason.com/securityalert/3058 -CVE-2007-4524 - http://securityreason.com/securityalert/3055 -CVE-2007-4524 - https://www.exploit-db.com/exploits/4382 -CVE-2007-4525 - http://securityreason.com/securityalert/3056 -CVE-2007-4528 - https://www.exploit-db.com/exploits/4311 -CVE-2007-4531 - http://aluigi.altervista.org/adv/soldatdos-adv.txt -CVE-2007-4531 - http://aluigi.org/poc/soldatdos.zip -CVE-2007-4532 - http://aluigi.altervista.org/adv/soldatdos-adv.txt -CVE-2007-4532 - http://aluigi.org/poc/soldatdos.zip -CVE-2007-4533 - http://securityreason.com/securityalert/3057 -CVE-2007-4534 - http://securityreason.com/securityalert/3057 -CVE-2007-4535 - http://securityreason.com/securityalert/3057 -CVE-2007-4537 - http://aluigi.altervista.org/adv/skulltaghof-adv.txt -CVE-2007-4537 - http://securityreason.com/securityalert/3067 -CVE-2007-4540 - http://securityreason.com/securityalert/3062 -CVE-2007-4545 - http://securityreason.com/securityalert/3060 -CVE-2007-4546 - http://securityreason.com/securityalert/3060 -CVE-2007-4547 - http://securityreason.com/securityalert/3060 -CVE-2007-4549 - http://vuln.sg/alpass27-en.html -CVE-2007-4550 - http://vuln.sg/alpass27-en.html -CVE-2007-4553 - http://securityreason.com/securityalert/3075 -CVE-2007-4554 - http://securityreason.com/securityalert/3064 -CVE-2007-4555 - http://securityreason.com/securityalert/3068 -CVE-2007-4560 - http://securityreason.com/securityalert/3063 -CVE-2007-4561 - http://securityreason.com/securityalert/3069 -CVE-2007-4566 - http://securityreason.com/securityalert/3061 -CVE-2007-4571 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9053 -CVE-2007-4573 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9735 -CVE-2007-4577 - http://securityreason.com/securityalert/3073 -CVE-2007-4578 - http://securityreason.com/securityalert/3072 -CVE-2007-4581 - https://www.exploit-db.com/exploits/4327 -CVE-2007-4582 - https://www.exploit-db.com/exploits/4322 -CVE-2007-4583 - https://www.exploit-db.com/exploits/4323 -CVE-2007-4583 - https://www.exploit-db.com/exploits/4324 -CVE-2007-4584 - https://www.exploit-db.com/exploits/4321 -CVE-2007-4585 - https://www.exploit-db.com/exploits/4317 -CVE-2007-4586 - https://www.exploit-db.com/exploits/4318 -CVE-2007-4592 - http://securityreason.com/securityalert/3753 -CVE-2007-4596 - https://www.exploit-db.com/exploits/4314 -CVE-2007-4597 - https://www.exploit-db.com/exploits/4313 -CVE-2007-4598 - http://isc.sans.org/diary.html?storyid=3323 -CVE-2007-4600 - http://securityreason.com/securityalert/3248 -CVE-2007-4602 - https://www.exploit-db.com/exploits/4329 -CVE-2007-4603 - https://www.exploit-db.com/exploits/4330 -CVE-2007-4604 - https://www.exploit-db.com/exploits/4331 -CVE-2007-4605 - https://www.exploit-db.com/exploits/4332 -CVE-2007-4606 - https://www.exploit-db.com/exploits/4333 -CVE-2007-4607 - https://www.exploit-db.com/exploits/4328 -CVE-2007-4620 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/04/ca-alert-notification-server-multiple-vulnerabilities.aspx -CVE-2007-4627 - https://www.exploit-db.com/exploits/4338 -CVE-2007-4628 - https://www.exploit-db.com/exploits/4339 -CVE-2007-4630 - http://securityreason.com/securityalert/3080 -CVE-2007-4636 - https://www.exploit-db.com/exploits/4340 -CVE-2007-4637 - https://www.exploit-db.com/exploits/4336 -CVE-2007-4638 - http://securityreason.com/securityalert/3086 -CVE-2007-4640 - https://www.exploit-db.com/exploits/4341 -CVE-2007-4641 - https://www.exploit-db.com/exploits/4341 -CVE-2007-4642 - http://aluigi.altervista.org/adv/dumsdei-adv.txt -CVE-2007-4642 - http://aluigi.org/poc/dumsdei.zip -CVE-2007-4642 - http://securityreason.com/securityalert/3084 -CVE-2007-4643 - http://aluigi.org/poc/dumsdei.zip -CVE-2007-4643 - http://securityreason.com/securityalert/3084 -CVE-2007-4644 - http://aluigi.org/poc/dumsdei.zip -CVE-2007-4644 - http://securityreason.com/securityalert/3084 -CVE-2007-4645 - https://www.exploit-db.com/exploits/4342 -CVE-2007-4646 - https://www.exploit-db.com/exploits/4344 -CVE-2007-4647 - https://www.exploit-db.com/exploits/4343 -CVE-2007-4648 - http://securityreason.com/securityalert/3087 -CVE-2007-4649 - http://securityreason.com/securityalert/3085 -CVE-2007-4653 - https://www.exploit-db.com/exploits/4346 -CVE-2007-4668 - http://tracker.firebirdsql.org/browse/CORE-1312 -CVE-2007-4686 - http://www.trapkit.de/advisories/TKADV2007-001.txt -CVE-2007-4712 - https://www.exploit-db.com/exploits/4356 -CVE-2007-4714 - https://www.exploit-db.com/exploits/4353 -CVE-2007-4715 - https://www.exploit-db.com/exploits/4352 -CVE-2007-4722 - https://www.exploit-db.com/exploits/4868 -CVE-2007-4723 - http://securityreason.com/securityalert/3100 -CVE-2007-4726 - https://www.exploit-db.com/exploits/4362 -CVE-2007-4727 - http://securityreason.com/securityalert/3127 -CVE-2007-4727 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-4731 - http://securityreason.com/securityalert/3128 -CVE-2007-4734 - https://www.exploit-db.com/exploits/4355 -CVE-2007-4735 - https://www.exploit-db.com/exploits/4354 -CVE-2007-4736 - https://www.exploit-db.com/exploits/4349 -CVE-2007-4737 - https://www.exploit-db.com/exploits/4358 -CVE-2007-4744 - https://www.exploit-db.com/exploits/4365 -CVE-2007-4745 - http://securityreason.com/securityalert/3101 -CVE-2007-4748 - https://www.exploit-db.com/exploits/4348 -CVE-2007-4749 - http://securityreason.com/securityalert/3132 -CVE-2007-4750 - http://securityreason.com/securityalert/3150 -CVE-2007-4751 - http://securityreason.com/securityalert/3150 -CVE-2007-4752 - http://securityreason.com/securityalert/3126 -CVE-2007-4753 - http://securityreason.com/securityalert/3104 -CVE-2007-4754 - http://aluigi.altervista.org/adv/aa2k7x-adv.txt -CVE-2007-4754 - http://securityreason.com/securityalert/3105 -CVE-2007-4755 - http://aluigi.altervista.org/adv/aa2k7x-adv.txt -CVE-2007-4755 - http://securityreason.com/securityalert/3105 -CVE-2007-4756 - http://securityreason.com/securityalert/3106 -CVE-2007-4757 - https://www.exploit-db.com/exploits/4368 -CVE-2007-4763 - https://www.exploit-db.com/exploits/4363 -CVE-2007-4768 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9701 -CVE-2007-4769 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804 -CVE-2007-4770 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5507 -CVE-2007-4772 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2007-4776 - https://www.exploit-db.com/exploits/4361 -CVE-2007-4776 - https://www.exploit-db.com/exploits/4431 -CVE-2007-4777 - http://securityreason.com/securityalert/3108 -CVE-2007-4779 - http://securityreason.com/securityalert/3108 -CVE-2007-4780 - http://securityreason.com/securityalert/3108 -CVE-2007-4781 - https://www.exploit-db.com/exploits/4350 -CVE-2007-4782 - http://securityreason.com/securityalert/3109 -CVE-2007-4783 - http://securityreason.com/securityalert/3115 -CVE-2007-4784 - http://securityreason.com/securityalert/3114 -CVE-2007-4785 - http://securityreason.com/securityalert/3118 -CVE-2007-4790 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 -CVE-2007-4790 - https://www.exploit-db.com/exploits/4369 -CVE-2007-4802 - https://www.exploit-db.com/exploits/4366 -CVE-2007-4802 - https://www.exploit-db.com/exploits/4372 -CVE-2007-4803 - https://www.exploit-db.com/exploits/4364 -CVE-2007-4804 - https://www.exploit-db.com/exploits/4385 -CVE-2007-4805 - https://www.exploit-db.com/exploits/4378 -CVE-2007-4806 - https://www.exploit-db.com/exploits/4377 -CVE-2007-4807 - https://www.exploit-db.com/exploits/4377 -CVE-2007-4808 - https://www.exploit-db.com/exploits/4376 -CVE-2007-4809 - https://www.exploit-db.com/exploits/4374 -CVE-2007-4810 - http://securityreason.com/securityalert/3110 -CVE-2007-4811 - http://securityreason.com/securityalert/3110 -CVE-2007-4812 - http://securityreason.com/securityalert/3111 -CVE-2007-4814 - http://securityreason.com/securityalert/3112 -CVE-2007-4814 - https://www.exploit-db.com/exploits/4379 -CVE-2007-4814 - https://www.exploit-db.com/exploits/4398 -CVE-2007-4815 - https://www.exploit-db.com/exploits/4384 -CVE-2007-4816 - https://www.exploit-db.com/exploits/4375 -CVE-2007-4817 - https://www.exploit-db.com/exploits/4383 -CVE-2007-4818 - http://securityreason.com/securityalert/3116 -CVE-2007-4818 - https://www.exploit-db.com/exploits/4381 -CVE-2007-4819 - http://securityreason.com/securityalert/3116 -CVE-2007-4819 - https://www.exploit-db.com/exploits/4381 -CVE-2007-4820 - https://www.exploit-db.com/exploits/4380 -CVE-2007-4821 - https://www.exploit-db.com/exploits/4373 -CVE-2007-4822 - http://securityreason.com/securityalert/3117 -CVE-2007-4825 - http://securityreason.com/securityalert/3119 -CVE-2007-4832 - http://aluigi.altervista.org/adv/cellfucktor-adv.txt -CVE-2007-4832 - http://securityreason.com/securityalert/3130 -CVE-2007-4834 - https://www.exploit-db.com/exploits/4387 -CVE-2007-4835 - http://securityreason.com/securityalert/3120 -CVE-2007-4836 - http://securityreason.com/securityalert/3120 -CVE-2007-4837 - http://securityreason.com/securityalert/3121 -CVE-2007-4838 - http://aluigi.altervista.org/adv/cellfucktor-adv.txt -CVE-2007-4838 - http://aluigi.org/poc/cellfucktor.zip -CVE-2007-4838 - http://securityreason.com/securityalert/3130 -CVE-2007-4840 - http://securityreason.com/securityalert/3122 -CVE-2007-4842 - http://securityreason.com/securityalert/3123 -CVE-2007-4843 - http://securityreason.com/securityalert/3125 -CVE-2007-4844 - http://securityreason.com/securityalert/3125 -CVE-2007-4845 - https://www.exploit-db.com/exploits/4371 -CVE-2007-4846 - https://www.exploit-db.com/exploits/4370 -CVE-2007-4872 - http://securityreason.com/securityalert/3174 -CVE-2007-4873 - http://securityreason.com/securityalert/3173 -CVE-2007-4874 - http://securityreason.com/securityalert/3166 -CVE-2007-4879 - http://0x90.eu/ff_tls_poc.html -CVE-2007-4879 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2007-4879 - https://bugzilla.mozilla.org/show_bug.cgi?id=395399 -CVE-2007-4880 - http://securityreason.com/securityalert/3184 -CVE-2007-4881 - http://securityreason.com/securityalert/3131 -CVE-2007-4886 - https://www.exploit-db.com/exploits/4390 -CVE-2007-4887 - http://securityreason.com/securityalert/3133 -CVE-2007-4889 - http://securityreason.com/securityalert/3134 -CVE-2007-4890 - https://www.exploit-db.com/exploits/4394 -CVE-2007-4891 - https://www.exploit-db.com/exploits/4393 -CVE-2007-4894 - http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html -CVE-2007-4895 - https://www.exploit-db.com/exploits/4386 -CVE-2007-4897 - http://securityreason.com/securityalert/3138 -CVE-2007-4899 - http://securityreason.com/securityalert/3139 -CVE-2007-4900 - http://securityreason.com/securityalert/3137 -CVE-2007-4901 - http://securityreason.com/securityalert/3136 -CVE-2007-4902 - https://www.exploit-db.com/exploits/4388 -CVE-2007-4903 - https://www.exploit-db.com/exploits/4389 -CVE-2007-4905 - https://www.exploit-db.com/exploits/4390 -CVE-2007-4906 - http://securityreason.com/securityalert/3142 -CVE-2007-4906 - https://www.exploit-db.com/exploits/4395 -CVE-2007-4907 - https://www.exploit-db.com/exploits/4396 -CVE-2007-4908 - https://www.exploit-db.com/exploits/4390 -CVE-2007-4909 - http://securityreason.com/securityalert/3141 -CVE-2007-4911 - https://www.exploit-db.com/exploits/4403 -CVE-2007-4915 - http://securityreason.com/securityalert/3151 -CVE-2007-4915 - https://www.exploit-db.com/exploits/4542 -CVE-2007-4916 - http://securityreason.com/securityalert/3143 -CVE-2007-4917 - http://securityreason.com/securityalert/3149 -CVE-2007-4918 - http://securityreason.com/securityalert/3148 -CVE-2007-4918 - https://www.exploit-db.com/exploits/4410 -CVE-2007-4919 - https://www.exploit-db.com/exploits/4408 -CVE-2007-4920 - https://www.exploit-db.com/exploits/4407 -CVE-2007-4921 - https://www.exploit-db.com/exploits/4405 -CVE-2007-4922 - https://www.exploit-db.com/exploits/4400 -CVE-2007-4923 - https://www.exploit-db.com/exploits/4401 -CVE-2007-4924 - https://www.exploit-db.com/exploits/9240 -CVE-2007-4926 - http://securityreason.com/securityalert/3145 -CVE-2007-4927 - http://securityreason.com/securityalert/3145 -CVE-2007-4928 - http://securityreason.com/securityalert/3145 -CVE-2007-4929 - http://securityreason.com/securityalert/3145 -CVE-2007-4930 - http://securityreason.com/securityalert/3145 -CVE-2007-4932 - https://www.exploit-db.com/exploits/4419 -CVE-2007-4933 - https://www.exploit-db.com/exploits/4419 -CVE-2007-4934 - https://www.exploit-db.com/exploits/4406 -CVE-2007-4937 - http://securityreason.com/securityalert/3147 -CVE-2007-4938 - http://securityreason.com/securityalert/3144 -CVE-2007-4939 - http://securityreason.com/securityalert/3144 -CVE-2007-4940 - http://securityreason.com/securityalert/3144 -CVE-2007-4941 - http://securityreason.com/securityalert/3144 -CVE-2007-4952 - https://www.exploit-db.com/exploits/4418 -CVE-2007-4953 - https://www.exploit-db.com/exploits/4417 -CVE-2007-4954 - https://www.exploit-db.com/exploits/4416 -CVE-2007-4955 - https://www.exploit-db.com/exploits/4415 -CVE-2007-4956 - https://www.exploit-db.com/exploits/4412 -CVE-2007-4956 - https://www.exploit-db.com/exploits/4413 -CVE-2007-4956 - https://www.exploit-db.com/exploits/4414 -CVE-2007-4957 - https://www.exploit-db.com/exploits/4411 -CVE-2007-4960 - http://www.gnucitizen.org/blog/ie-pwns-secondlife -CVE-2007-4961 - http://www.gnucitizen.org/blog/ie-pwns-secondlife -CVE-2007-4962 - http://securityreason.com/securityalert/3140 -CVE-2007-4963 - http://securityreason.com/securityalert/3140 -CVE-2007-4964 - http://securityreason.com/securityalert/3140 -CVE-2007-4965 - http://bugs.gentoo.org/show_bug.cgi?id=192876 -CVE-2007-4965 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-4966 - https://www.exploit-db.com/exploits/4404 -CVE-2007-4975 - http://securityreason.com/securityalert/3155 -CVE-2007-4976 - http://securityreason.com/securityalert/3152 -CVE-2007-4977 - http://securityreason.com/securityalert/3152 -CVE-2007-4978 - https://www.exploit-db.com/exploits/4421 -CVE-2007-4979 - https://www.exploit-db.com/exploits/4422 -CVE-2007-4980 - http://securityreason.com/securityalert/3154 -CVE-2007-4981 - http://securityreason.com/securityalert/3153 -CVE-2007-4982 - https://www.exploit-db.com/exploits/4420 -CVE-2007-4983 - https://www.exploit-db.com/exploits/4427 -CVE-2007-4984 - https://www.exploit-db.com/exploits/4425 -CVE-2007-4985 - http://www.imagemagick.org/script/changelog.php -CVE-2007-4986 - http://www.imagemagick.org/script/changelog.php -CVE-2007-4986 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9963 -CVE-2007-4987 - http://www.imagemagick.org/script/changelog.php -CVE-2007-4988 - http://www.imagemagick.org/script/changelog.php -CVE-2007-4988 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656 -CVE-2007-5000 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2007-5000 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9539 -CVE-2007-5009 - https://www.exploit-db.com/exploits/4434 -CVE-2007-5015 - https://www.exploit-db.com/exploits/4430 -CVE-2007-5016 - https://www.exploit-db.com/exploits/4433 -CVE-2007-5017 - https://www.exploit-db.com/exploits/4428 -CVE-2007-5018 - https://www.exploit-db.com/exploits/4429 -CVE-2007-5019 - https://www.exploit-db.com/exploits/4432 -CVE-2007-5020 - http://www.gnucitizen.org/blog/0day-pdf-pwns-windows -CVE-2007-5023 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-5023 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-5023 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-5023 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5023 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-5023 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-5024 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5025 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-5026 - http://securityreason.com/securityalert/3156 -CVE-2007-5027 - http://securityreason.com/securityalert/3159 -CVE-2007-5032 - http://securityreason.com/securityalert/3157 -CVE-2007-5033 - http://securityreason.com/securityalert/3158 -CVE-2007-5036 - https://www.exploit-db.com/exploits/4426 -CVE-2007-5039 - http://securityreason.com/securityalert/3161 -CVE-2007-5040 - http://securityreason.com/securityalert/3161 -CVE-2007-5041 - http://securityreason.com/securityalert/3161 -CVE-2007-5042 - http://securityreason.com/securityalert/3161 -CVE-2007-5043 - http://securityreason.com/securityalert/3161 -CVE-2007-5044 - http://securityreason.com/securityalert/3161 -CVE-2007-5045 - http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox -CVE-2007-5047 - http://securityreason.com/securityalert/3161 -CVE-2007-5050 - https://www.exploit-db.com/exploits/4439 -CVE-2007-5052 - http://securityreason.com/securityalert/3162 -CVE-2007-5053 - https://www.exploit-db.com/exploits/4441 -CVE-2007-5054 - https://www.exploit-db.com/exploits/4441 -CVE-2007-5055 - https://www.exploit-db.com/exploits/4441 -CVE-2007-5056 - https://www.exploit-db.com/exploits/4442 -CVE-2007-5056 - https://www.exploit-db.com/exploits/5090 -CVE-2007-5056 - https://www.exploit-db.com/exploits/5091 -CVE-2007-5056 - https://www.exploit-db.com/exploits/5097 -CVE-2007-5056 - https://www.exploit-db.com/exploits/5098 -CVE-2007-5057 - http://securityreason.com/securityalert/3163 -CVE-2007-5058 - http://securityreason.com/securityalert/3164 -CVE-2007-5060 - http://securityreason.com/securityalert/3165 -CVE-2007-5061 - https://www.exploit-db.com/exploits/4443 -CVE-2007-5062 - https://www.exploit-db.com/exploits/4435 -CVE-2007-5063 - https://www.exploit-db.com/exploits/4436 -CVE-2007-5065 - https://www.exploit-db.com/exploits/4440 -CVE-2007-5067 - https://www.exploit-db.com/exploits/4450 -CVE-2007-5068 - https://www.exploit-db.com/exploits/4449 -CVE-2007-5069 - https://www.exploit-db.com/exploits/4447 -CVE-2007-5070 - https://www.exploit-db.com/exploits/4445 -CVE-2007-5078 - http://securityreason.com/securityalert/3192 -CVE-2007-5089 - http://securityreason.com/securityalert/3168 -CVE-2007-5089 - https://www.exploit-db.com/exploits/4454 -CVE-2007-5092 - http://securityreason.com/securityalert/3169 -CVE-2007-5092 - http://www.waraxe.us/advisory-54.html -CVE-2007-5094 - http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html -CVE-2007-5094 - https://www.exploit-db.com/exploits/4438 -CVE-2007-5095 - http://www.gnucitizen.org/blog/backdooring-windows-media-files -CVE-2007-5098 - https://www.exploit-db.com/exploits/4451 -CVE-2007-5099 - https://www.exploit-db.com/exploits/4448 -CVE-2007-5102 - https://www.exploit-db.com/exploits/4446 -CVE-2007-5103 - https://www.exploit-db.com/exploits/4446 -CVE-2007-5105 - http://securityreason.com/securityalert/3175 -CVE-2007-5106 - http://securityreason.com/securityalert/3175 -CVE-2007-5107 - https://www.exploit-db.com/exploits/4452 -CVE-2007-5109 - http://securityreason.com/securityalert/3176 -CVE-2007-5110 - https://www.exploit-db.com/exploits/4453 -CVE-2007-5111 - https://www.exploit-db.com/exploits/4453 -CVE-2007-5112 - http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/ -CVE-2007-5112 - http://securityreason.com/securityalert/3177 -CVE-2007-5112 - http://www.gnucitizen.org/blog/google-urchin-password-theft-madness -CVE-2007-5117 - https://www.exploit-db.com/exploits/4456 -CVE-2007-5119 - http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html -CVE-2007-5119 - http://securityreason.com/securityalert/3167 -CVE-2007-5120 - http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html -CVE-2007-5120 - http://securityreason.com/securityalert/3167 -CVE-2007-5121 - http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html -CVE-2007-5121 - http://securityreason.com/securityalert/3167 -CVE-2007-5122 - https://www.exploit-db.com/exploits/4457 -CVE-2007-5123 - https://www.exploit-db.com/exploits/4458 -CVE-2007-5127 - http://securityreason.com/securityalert/3171 -CVE-2007-5128 - http://securityreason.com/securityalert/3174 -CVE-2007-5130 - http://securityreason.com/securityalert/3172 -CVE-2007-5131 - https://www.exploit-db.com/exploits/4459 -CVE-2007-5135 - http://securityreason.com/securityalert/3179 -CVE-2007-5135 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-5137 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-5137 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9540 -CVE-2007-5138 - https://www.exploit-db.com/exploits/4461 -CVE-2007-5139 - https://www.exploit-db.com/exploits/4462 -CVE-2007-5140 - https://www.exploit-db.com/exploits/4463 -CVE-2007-5141 - http://securityreason.com/securityalert/3178 -CVE-2007-5141 - http://www.waraxe.us/advisory-55.html -CVE-2007-5149 - https://www.exploit-db.com/exploits/4465 -CVE-2007-5150 - http://securityreason.com/securityalert/3181 -CVE-2007-5150 - http://www.waraxe.us/advisory-56.html -CVE-2007-5151 - http://www.waraxe.us/advisory-58.html -CVE-2007-5155 - http://vuln.sg/iceows420b-en.html -CVE-2007-5156 - http://securityreason.com/securityalert/3182 -CVE-2007-5156 - http://www.securityfocus.com/archive/1/480830/100/0/threaded -CVE-2007-5156 - http://www.waraxe.us/advisory-57.html -CVE-2007-5156 - https://www.exploit-db.com/exploits/5618 -CVE-2007-5156 - https://www.exploit-db.com/exploits/5688 -CVE-2007-5157 - https://www.exploit-db.com/exploits/4464 -CVE-2007-5161 - http://marc.info/?l=full-disclosure&m=119115897930583&w=2 -CVE-2007-5161 - http://securityreason.com/securityalert/3183 -CVE-2007-5162 - http://securityreason.com/securityalert/3180 -CVE-2007-5169 - http://vuln.sg/pagemaker701-en.html -CVE-2007-5173 - https://www.exploit-db.com/exploits/4471 -CVE-2007-5174 - https://www.exploit-db.com/exploits/4472 -CVE-2007-5175 - https://www.exploit-db.com/exploits/4473 -CVE-2007-5177 - https://www.exploit-db.com/exploits/4469 -CVE-2007-5178 - https://www.exploit-db.com/exploits/4470 -CVE-2007-5180 - http://packetstormsecurity.org/0709-exploits/ohesa-sql.txt -CVE-2007-5181 - http://packetstormsecurity.org/0709-exploits/netkamp-sql.txt -CVE-2007-5182 - http://packetstormsecurity.org/0709-exploits/netkamp-sql.txt -CVE-2007-5183 - http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html -CVE-2007-5184 - https://www.exploit-db.com/exploits/4478 -CVE-2007-5185 - https://www.exploit-db.com/exploits/4477 -CVE-2007-5186 - https://www.exploit-db.com/exploits/4476 -CVE-2007-5187 - https://www.exploit-db.com/exploits/4475 -CVE-2007-5189 - http://securityreason.com/securityalert/3186 -CVE-2007-5195 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-5196 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-5200 - http://www.novell.com/linux/security/advisories/2007_20_sr.html -CVE-2007-5212 - http://securityreason.com/securityalert/3188 -CVE-2007-5213 - http://securityreason.com/securityalert/3188 -CVE-2007-5214 - http://securityreason.com/securityalert/3188 -CVE-2007-5218 - http://securityreason.com/securityalert/3190 -CVE-2007-5219 - https://www.exploit-db.com/exploits/4479 -CVE-2007-5220 - http://securityreason.com/securityalert/3189 -CVE-2007-5221 - https://www.exploit-db.com/exploits/4481 -CVE-2007-5222 - https://www.exploit-db.com/exploits/4467 -CVE-2007-5223 - http://securityreason.com/securityalert/3191 -CVE-2007-5224 - http://securityreason.com/securityalert/3187 -CVE-2007-5225 - https://www.exploit-db.com/exploits/4516 -CVE-2007-5225 - https://www.exploit-db.com/exploits/5227 -CVE-2007-5229 - http://marc.info/?l=full-disclosure&m=119145344606493&w=2 -CVE-2007-5229 - https://www.exploit-db.com/exploits/30637/ -CVE-2007-5230 - https://www.exploit-db.com/exploits/4466 -CVE-2007-5231 - https://www.exploit-db.com/exploits/4466 -CVE-2007-5232 - http://www.redhat.com/support/errata/RHSA-2007-0963.html -CVE-2007-5232 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9331 -CVE-2007-5233 - https://www.exploit-db.com/exploits/4482 -CVE-2007-5234 - https://www.exploit-db.com/exploits/4483 -CVE-2007-5238 - http://www.redhat.com/support/errata/RHSA-2007-0963.html -CVE-2007-5239 - http://www.redhat.com/support/errata/RHSA-2007-0963.html -CVE-2007-5240 - http://www.redhat.com/support/errata/RHSA-2007-0963.html -CVE-2007-5247 - http://aluigi.altervista.org/adv/fearfspb-adv.txt -CVE-2007-5247 - http://aluigi.org/poc/fearfspb.zip -CVE-2007-5247 - http://securityreason.com/securityalert/3197 -CVE-2007-5248 - http://aluigi.altervista.org/adv/d3engfspb-adv.txt -CVE-2007-5248 - http://aluigi.org/poc/d3engfspb.zip -CVE-2007-5248 - http://securityreason.com/securityalert/3196 -CVE-2007-5249 - http://aluigi.altervista.org/adv/aaboompb-adv.txt -CVE-2007-5249 - http://aluigi.org/poc/aaboompb.zip -CVE-2007-5249 - http://securityreason.com/securityalert/3193 -CVE-2007-5250 - http://aluigi.altervista.org/adv/aaboompb-adv.txt -CVE-2007-5250 - http://aluigi.org/poc/aaboompb.zip -CVE-2007-5250 - http://securityreason.com/securityalert/3193 -CVE-2007-5252 - http://securityreason.com/securityalert/3198 -CVE-2007-5253 - http://securityreason.com/securityalert/3194 -CVE-2007-5253 - https://www.exploit-db.com/exploits/30639/ -CVE-2007-5255 - http://websecurity.com.ua/1368/ -CVE-2007-5256 - http://securityreason.com/securityalert/3195 -CVE-2007-5256 - https://www.exploit-db.com/exploits/4484 -CVE-2007-5257 - https://www.exploit-db.com/exploits/4474 -CVE-2007-5260 - http://securityreason.com/securityalert/3199 -CVE-2007-5261 - https://www.exploit-db.com/exploits/4480 -CVE-2007-5262 - http://aluigi.altervista.org/adv/dropteamz-adv.txt -CVE-2007-5262 - http://securityreason.com/securityalert/3202 -CVE-2007-5263 - http://aluigi.altervista.org/adv/dropteamz-adv.txt -CVE-2007-5263 - http://securityreason.com/securityalert/3202 -CVE-2007-5264 - http://aluigi.altervista.org/adv/dropteamz-adv.txt -CVE-2007-5264 - http://securityreason.com/securityalert/3202 -CVE-2007-5266 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2007-5267 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2007-5268 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2007-5269 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2007-5269 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2007-5269 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-5269 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-5269 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5269 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-5269 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-5271 - https://www.exploit-db.com/exploits/4485 -CVE-2007-5272 - https://www.exploit-db.com/exploits/4486 -CVE-2007-5273 - http://crypto.stanford.edu/dns/dns-rebinding.pdf -CVE-2007-5273 - http://www.redhat.com/support/errata/RHSA-2007-0963.html -CVE-2007-5274 - http://crypto.stanford.edu/dns/dns-rebinding.pdf -CVE-2007-5274 - http://www.redhat.com/support/errata/RHSA-2007-0963.html -CVE-2007-5275 - http://crypto.stanford.edu/dns/dns-rebinding.pdf -CVE-2007-5275 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250 -CVE-2007-5276 - http://crypto.stanford.edu/dns/dns-rebinding.pdf -CVE-2007-5277 - http://crypto.stanford.edu/dns/dns-rebinding.pdf -CVE-2007-5278 - https://www.exploit-db.com/exploits/4466 -CVE-2007-5293 - https://www.exploit-db.com/exploits/4495 -CVE-2007-5294 - https://www.exploit-db.com/exploits/4495 -CVE-2007-5298 - https://www.exploit-db.com/exploits/4491 -CVE-2007-5299 - https://www.exploit-db.com/exploits/4493 -CVE-2007-5300 - https://www.exploit-db.com/exploits/4498 -CVE-2007-5301 - https://www.exploit-db.com/exploits/5424 -CVE-2007-5308 - https://www.exploit-db.com/exploits/4501 -CVE-2007-5309 - http://www.attrition.org/pipermail/vim/2007-October/001823.html -CVE-2007-5309 - http://www.attrition.org/pipermail/vim/2007-October/001824.html -CVE-2007-5309 - https://www.exploit-db.com/exploits/4496 -CVE-2007-5310 - https://www.exploit-db.com/exploits/4497 -CVE-2007-5311 - https://www.exploit-db.com/exploits/4500 -CVE-2007-5312 - https://www.exploit-db.com/exploits/4500 -CVE-2007-5313 - https://www.exploit-db.com/exploits/4492 -CVE-2007-5314 - https://www.exploit-db.com/exploits/4502 -CVE-2007-5315 - https://www.exploit-db.com/exploits/4503 -CVE-2007-5316 - https://www.exploit-db.com/exploits/4504 -CVE-2007-5321 - https://www.exploit-db.com/exploits/4494 -CVE-2007-5322 - https://www.exploit-db.com/exploits/4506 -CVE-2007-5333 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-5340 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9622 -CVE-2007-5342 - http://www.redhat.com/support/errata/RHSA-2008-0862.html -CVE-2007-5342 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-5344 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -CVE-2007-5347 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -CVE-2007-5348 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 -CVE-2007-5350 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-066 -CVE-2007-5351 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-063 -CVE-2007-5352 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-002 -CVE-2007-5364 - http://securityreason.com/securityalert/3212 -CVE-2007-5365 - http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962 -CVE-2007-5365 - https://www.exploit-db.com/exploits/4601 -CVE-2007-5371 - http://securityreason.com/securityalert/3215 -CVE-2007-5374 - https://www.exploit-db.com/exploits/4505 -CVE-2007-5375 - http://crypto.stanford.edu/dns/dns-rebinding.pdf -CVE-2007-5378 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2007-5378 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9480 -CVE-2007-5383 - http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/ -CVE-2007-5384 - http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/ -CVE-2007-5385 - http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/ -CVE-2007-5387 - https://www.exploit-db.com/exploits/4519 -CVE-2007-5388 - https://www.exploit-db.com/exploits/4518 -CVE-2007-5390 - https://www.exploit-db.com/exploits/4520 -CVE-2007-5393 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9839 -CVE-2007-5395 - http://bugs.gentoo.org/show_bug.cgi?id=196803 -CVE-2007-5398 - http://securityreason.com/securityalert/3372 -CVE-2007-5400 - http://securityreason.com/securityalert/4048 -CVE-2007-5407 - https://www.exploit-db.com/exploits/4508 -CVE-2007-5408 - https://www.exploit-db.com/exploits/4511 -CVE-2007-5409 - https://www.exploit-db.com/exploits/4512 -CVE-2007-5412 - https://www.exploit-db.com/exploits/4507 -CVE-2007-5416 - http://securityvulns.ru/Sdocument137.html -CVE-2007-5416 - https://www.exploit-db.com/exploits/4510 -CVE-2007-5417 - http://securityvulns.com/Sdocument42.html -CVE-2007-5418 - http://securityvulns.com/Rdocument960.html -CVE-2007-5423 - http://securityvulns.ru/Sdocument162.html -CVE-2007-5423 - https://www.exploit-db.com/exploits/4509 -CVE-2007-5438 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2007-5438 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2007-5438 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-5438 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-5438 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5438 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-5438 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-5440 - http://securityvulns.com/Rdocument959.html -CVE-2007-5446 - https://www.exploit-db.com/exploits/4526 -CVE-2007-5447 - https://www.exploit-db.com/exploits/4517 -CVE-2007-5449 - https://www.exploit-db.com/exploits/4527 -CVE-2007-5450 - https://www.exploit-db.com/exploits/4522 -CVE-2007-5451 - https://www.exploit-db.com/exploits/4524 -CVE-2007-5452 - https://www.exploit-db.com/exploits/4513 -CVE-2007-5453 - https://www.exploit-db.com/exploits/4513 -CVE-2007-5455 - https://www.exploit-db.com/exploits/4529 -CVE-2007-5456 - http://securityreason.com/securityalert/3222 -CVE-2007-5457 - https://www.exploit-db.com/exploits/4521 -CVE-2007-5458 - https://www.exploit-db.com/exploits/4523 -CVE-2007-5461 - http://www.redhat.com/support/errata/RHSA-2008-0862.html -CVE-2007-5461 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-5461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202 -CVE-2007-5461 - https://www.exploit-db.com/exploits/4530 -CVE-2007-5464 - http://aluigi.altervista.org/adv/lfscbof-adv.txt -CVE-2007-5464 - http://securityreason.com/securityalert/3234 -CVE-2007-5465 - https://www.exploit-db.com/exploits/4536 -CVE-2007-5466 - http://www.digit-labs.org/files/exploits/extremail-v8.pl -CVE-2007-5466 - https://www.exploit-db.com/exploits/4533 -CVE-2007-5466 - https://www.exploit-db.com/exploits/4534 -CVE-2007-5466 - https://www.exploit-db.com/exploits/4535 -CVE-2007-5467 - http://www.digit-labs.org/files/exploits/extremail-v3.pl -CVE-2007-5467 - https://www.exploit-db.com/exploits/4532 -CVE-2007-5474 - http://securityreason.com/securityalert/4226 -CVE-2007-5481 - http://www.rhyolite.com/anti-spam/dcc/CHANGES -CVE-2007-5484 - https://www.exploit-db.com/exploits/4529 -CVE-2007-5485 - https://www.exploit-db.com/exploits/4528 -CVE-2007-5487 - https://www.exploit-db.com/exploits/4531 -CVE-2007-5489 - https://www.exploit-db.com/exploits/4538 -CVE-2007-5490 - https://www.exploit-db.com/exploits/4539 -CVE-2007-5495 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9705 -CVE-2007-5498 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9452 -CVE-2007-5500 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9868 -CVE-2007-5503 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2007-5503 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-5503 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5503 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-5511 - https://www.exploit-db.com/exploits/4570 -CVE-2007-5511 - https://www.exploit-db.com/exploits/4571 -CVE-2007-5511 - https://www.exploit-db.com/exploits/4572 -CVE-2007-5542 - http://packetstormsecurity.org/0710-advisories/mirandaim-overflows.txt -CVE-2007-5543 - http://packetstormsecurity.org/0710-advisories/mirandaim-overflows.txt -CVE-2007-5573 - https://www.exploit-db.com/exploits/4544 -CVE-2007-5574 - https://www.exploit-db.com/exploits/4543 -CVE-2007-5583 - https://www.exploit-db.com/exploits/4692 -CVE-2007-5592 - https://www.exploit-db.com/exploits/4545 -CVE-2007-5593 - http://www.securityfocus.com/bid/26119 -CVE-2007-5594 - http://www.securityfocus.com/bid/26119 -CVE-2007-5595 - http://www.securityfocus.com/bid/26119 -CVE-2007-5596 - http://www.securityfocus.com/bid/26119 -CVE-2007-5597 - http://www.securityfocus.com/bid/26119 -CVE-2007-5600 - https://www.exploit-db.com/exploits/4538 -CVE-2007-5603 - http://securityreason.com/securityalert/3342 -CVE-2007-5603 - https://www.exploit-db.com/exploits/4594 -CVE-2007-5617 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-5617 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-5617 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-5617 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-5618 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2007-5618 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2007-5618 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5618 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2007-5618 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2007-5619 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2007-5620 - https://www.exploit-db.com/exploits/4546 -CVE-2007-5625 - http://securityreason.com/securityalert/3275 -CVE-2007-5627 - https://www.exploit-db.com/exploits/4554 -CVE-2007-5628 - https://www.exploit-db.com/exploits/4555 -CVE-2007-5630 - https://www.exploit-db.com/exploits/4550 -CVE-2007-5631 - https://www.exploit-db.com/exploits/4551 -CVE-2007-5633 - http://www.bugtrack.almico.com/view.php?id=987 -CVE-2007-5634 - http://www.bugtrack.almico.com/view.php?id=987 -CVE-2007-5639 - http://securityreason.com/securityalert/3273 -CVE-2007-5641 - https://www.exploit-db.com/exploits/4549 -CVE-2007-5642 - https://www.exploit-db.com/exploits/4549 -CVE-2007-5643 - https://www.exploit-db.com/exploits/4548 -CVE-2007-5644 - https://www.exploit-db.com/exploits/4548 -CVE-2007-5646 - http://www.simplemachines.org/community/index.php?topic=196380.0 -CVE-2007-5646 - https://www.exploit-db.com/exploits/4547 -CVE-2007-5647 - http://packetstormsecurity.org/0710-exploits/socketkb-xss.txt -CVE-2007-5649 - http://packetstormsecurity.org/0710-exploits/socketmail-xss.txt -CVE-2007-5650 - http://securityreason.com/securityalert/3285 -CVE-2007-5653 - https://www.exploit-db.com/exploits/4553 -CVE-2007-5654 - https://www.exploit-db.com/exploits/4556 -CVE-2007-5655 - http://www.tibco.com/mk/advisory.jsp -CVE-2007-5656 - http://www.tibco.com/mk/advisory.jsp -CVE-2007-5657 - http://www.tibco.com/mk/advisory.jsp -CVE-2007-5658 - http://www.tibco.com/mk/advisory.jsp -CVE-2007-5659 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9813 -CVE-2007-5663 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9928 -CVE-2007-5671 - http://securityreason.com/securityalert/3922 -CVE-2007-5671 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2007-5674 - https://www.exploit-db.com/exploits/4558 -CVE-2007-5676 - https://www.exploit-db.com/exploits/4563 -CVE-2007-5678 - http://securityreason.com/securityalert/3305 -CVE-2007-5679 - https://www.exploit-db.com/exploits/6250 -CVE-2007-5689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9898 -CVE-2007-5696 - http://securityreason.com/securityalert/3305 -CVE-2007-5697 - https://www.exploit-db.com/exploits/4565 -CVE-2007-5699 - https://www.exploit-db.com/exploits/4566 -CVE-2007-5709 - https://www.exploit-db.com/exploits/4583 -CVE-2007-5710 - http://www.waraxe.us/advisory-59.html -CVE-2007-5711 - http://aluigi.altervista.org/adv/wicassert-adv.txt -CVE-2007-5711 - http://aluigi.org/poc/wicassert.zip -CVE-2007-5719 - https://www.exploit-db.com/exploits/4587 -CVE-2007-5720 - https://www.exploit-db.com/exploits/4586 -CVE-2007-5721 - https://www.exploit-db.com/exploits/4585 -CVE-2007-5731 - https://www.exploit-db.com/exploits/4567 -CVE-2007-5754 - https://www.exploit-db.com/exploits/4588 -CVE-2007-5771 - https://www.exploit-db.com/exploits/4562 -CVE-2007-5772 - https://www.exploit-db.com/exploits/4562 -CVE-2007-5773 - https://www.exploit-db.com/exploits/4561 -CVE-2007-5774 - https://www.exploit-db.com/exploits/4561 -CVE-2007-5779 - https://www.exploit-db.com/exploits/4579 -CVE-2007-5780 - https://www.exploit-db.com/exploits/4582 -CVE-2007-5781 - https://www.exploit-db.com/exploits/4581 -CVE-2007-5782 - https://www.exploit-db.com/exploits/4580 -CVE-2007-5783 - https://www.exploit-db.com/exploits/4578 -CVE-2007-5784 - https://www.exploit-db.com/exploits/4577 -CVE-2007-5785 - https://www.exploit-db.com/exploits/4576 -CVE-2007-5786 - https://www.exploit-db.com/exploits/4575 -CVE-2007-5800 - https://www.exploit-db.com/exploits/4593 -CVE-2007-5802 - http://securityreason.com/securityalert/3335 -CVE-2007-5806 - http://securityreason.com/securityalert/3340 -CVE-2007-5811 - https://www.exploit-db.com/exploits/4590 -CVE-2007-5812 - https://www.exploit-db.com/exploits/4591 -CVE-2007-5813 - https://www.exploit-db.com/exploits/4592 -CVE-2007-5814 - http://securityreason.com/securityalert/3342 -CVE-2007-5815 - http://securityreason.com/securityalert/3342 -CVE-2007-5820 - https://www.exploit-db.com/exploits/4599 -CVE-2007-5821 - https://www.exploit-db.com/exploits/4597 -CVE-2007-5822 - http://securityreason.com/securityalert/3339 -CVE-2007-5822 - https://www.exploit-db.com/exploits/4596 -CVE-2007-5823 - http://securityreason.com/securityalert/3339 -CVE-2007-5823 - https://www.exploit-db.com/exploits/4596 -CVE-2007-5824 - https://www.exploit-db.com/exploits/4600 -CVE-2007-5826 - https://www.exploit-db.com/exploits/4598 -CVE-2007-5828 - http://securityreason.com/securityalert/3338 -CVE-2007-5840 - https://www.exploit-db.com/exploits/4607 -CVE-2007-5841 - https://www.exploit-db.com/exploits/4606 -CVE-2007-5842 - https://www.exploit-db.com/exploits/4605 -CVE-2007-5843 - https://www.exploit-db.com/exploits/4604 -CVE-2007-5844 - https://www.exploit-db.com/exploits/4602 -CVE-2007-5845 - https://www.exploit-db.com/exploits/3221 -CVE-2007-5845 - https://www.exploit-db.com/exploits/4602 -CVE-2007-5846 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 -CVE-2007-5849 - http://www.cups.org/str.php?L2589 -CVE-2007-5887 - https://www.exploit-db.com/exploits/4609 -CVE-2007-5889 - http://securityreason.com/securityalert/3345 -CVE-2007-5898 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2007-5899 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2007-5901 - http://bugs.gentoo.org/show_bug.cgi?id=199214 -CVE-2007-5902 - http://bugs.gentoo.org/show_bug.cgi?id=199214 -CVE-2007-5904 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901 -CVE-2007-5909 - http://vuln.sg/lotusnotes702doc-en.html -CVE-2007-5909 - http://vuln.sg/lotusnotes702mif-en.html -CVE-2007-5909 - http://vuln.sg/lotusnotes702sam-en.html -CVE-2007-5910 - http://vuln.sg/lotusnotes702wpd-en.html -CVE-2007-5911 - https://www.exploit-db.com/exploits/4610 -CVE-2007-5912 - https://www.exploit-db.com/exploits/4611 -CVE-2007-5913 - https://www.exploit-db.com/exploits/4608 -CVE-2007-5914 - https://www.exploit-db.com/exploits/4608 -CVE-2007-5925 - http://bugs.gentoo.org/show_bug.cgi?id=198988 -CVE-2007-5926 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt -CVE-2007-5927 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt -CVE-2007-5928 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt -CVE-2007-5929 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt -CVE-2007-5938 - http://bugs.gentoo.org/show_bug.cgi?id=199209 -CVE-2007-5941 - https://www.exploit-db.com/exploits/4613 -CVE-2007-5947 - http://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues -CVE-2007-5947 - http://www.mozilla.org/security/announce/2007/mfsa2007-37.html -CVE-2007-5947 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9873 -CVE-2007-5958 - https://www.exploit-db.com/exploits/5152 -CVE-2007-5960 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9794 -CVE-2007-5962 - https://www.exploit-db.com/exploits/5814 -CVE-2007-5966 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-5973 - https://www.exploit-db.com/exploits/4614 -CVE-2007-5974 - https://www.exploit-db.com/exploits/4611 -CVE-2007-5979 - http://securityreason.com/securityalert/3364 -CVE-2007-5983 - http://securityreason.com/securityalert/3360 -CVE-2007-5984 - http://securityreason.com/securityalert/3360 -CVE-2007-5992 - https://www.exploit-db.com/exploits/4622 -CVE-2007-5993 - http://securityreason.com/securityalert/3369 -CVE-2007-5994 - http://packetstormsecurity.org/0711-exploits/yappa-ng-rfi.txt -CVE-2007-5995 - https://www.exploit-db.com/exploits/4621 -CVE-2007-5996 - https://www.exploit-db.com/exploits/4620 -CVE-2007-5997 - https://www.exploit-db.com/exploits/4619 -CVE-2007-5998 - https://www.exploit-db.com/exploits/4618 -CVE-2007-5999 - https://www.exploit-db.com/exploits/4617 -CVE-2007-6000 - http://securityreason.com/securityalert/3370 -CVE-2007-6004 - https://www.exploit-db.com/exploits/4623 -CVE-2007-6005 - http://marc.info/?l=full-disclosure&m=119498701505838&w=2 -CVE-2007-6012 - http://securityreason.com/securityalert/3374 -CVE-2007-6013 - http://securityreason.com/securityalert/3375 -CVE-2007-6015 - http://bugs.gentoo.org/show_bug.cgi?id=200773 -CVE-2007-6016 - https://www.exploit-db.com/exploits/5205 -CVE-2007-6017 - http://support.veritas.com/docs/300471 -CVE-2007-6026 - http://securityreason.com/securityalert/3376 -CVE-2007-6027 - https://www.exploit-db.com/exploits/4626 -CVE-2007-6028 - http://marc.info/?l=full-disclosure&m=119517573408574&w=2 -CVE-2007-6029 - http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote-code-execution.html -CVE-2007-6032 - http://packetstormsecurity.org/0710-exploits/aleris-sql.txt -CVE-2007-6033 - http://www.digitalbond.com/index.php/2007/11/19/wonderware-intouch-80-netdde-vulnerability-s4-preview/ -CVE-2007-6036 - http://aluigi.altervista.org/adv/live555x-adv.txt -CVE-2007-6037 - http://securityreason.com/securityalert/3377 -CVE-2007-6038 - https://www.exploit-db.com/exploits/4636 -CVE-2007-6039 - http://securityreason.com/securityalert/3365 -CVE-2007-6039 - http://securityreason.com/securityalert/3366 -CVE-2007-6041 - http://aluigi.altervista.org/adv/rorbof-adv.txt -CVE-2007-6041 - http://aluigi.org/poc/rorbof.zip -CVE-2007-6043 - http://www.computerworld.com.au/index.php/id;1165210682;fp;2;fpid;1 -CVE-2007-6055 - http://securityreason.com/securityalert/3379 -CVE-2007-6057 - https://www.exploit-db.com/exploits/4628 -CVE-2007-6058 - https://www.exploit-db.com/exploits/4627 -CVE-2007-6063 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9846 -CVE-2007-6078 - https://www.exploit-db.com/exploits/4638 -CVE-2007-6079 - https://www.exploit-db.com/exploits/4637 -CVE-2007-6080 - https://www.exploit-db.com/exploits/4637 -CVE-2007-6082 - https://www.exploit-db.com/exploits/4635 -CVE-2007-6083 - https://www.exploit-db.com/exploits/4634 -CVE-2007-6084 - https://www.exploit-db.com/exploits/4633 -CVE-2007-6085 - https://www.exploit-db.com/exploits/4632 -CVE-2007-6086 - https://www.exploit-db.com/exploits/4632 -CVE-2007-6087 - https://www.exploit-db.com/exploits/4632 -CVE-2007-6088 - https://www.exploit-db.com/exploits/4631 -CVE-2007-6089 - https://www.exploit-db.com/exploits/4630 -CVE-2007-6103 - http://aluigi.altervista.org/adv/ihudos-adv.txt -CVE-2007-6105 - https://www.exploit-db.com/exploits/4640 -CVE-2007-6106 - https://www.exploit-db.com/exploits/4641 -CVE-2007-6111 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9048 -CVE-2007-6112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9772 -CVE-2007-6113 - http://securityreason.com/securityalert/3095 -CVE-2007-6113 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9841 -CVE-2007-6113 - https://www.exploit-db.com/exploits/4347 -CVE-2007-6115 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9726 -CVE-2007-6116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9799 -CVE-2007-6119 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9880 -CVE-2007-6120 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488 -CVE-2007-6124 - https://www.exploit-db.com/exploits/4660 -CVE-2007-6125 - https://www.exploit-db.com/exploits/4660 -CVE-2007-6126 - https://www.exploit-db.com/exploits/4655 -CVE-2007-6127 - https://www.exploit-db.com/exploits/4655 -CVE-2007-6128 - https://www.exploit-db.com/exploits/4653 -CVE-2007-6129 - https://www.exploit-db.com/exploits/4652 -CVE-2007-6133 - https://www.exploit-db.com/exploits/4642 -CVE-2007-6134 - https://www.exploit-db.com/exploits/4646 -CVE-2007-6135 - http://www.packetstormsecurity.org/0711-exploits/phpslideshow-xss.txt -CVE-2007-6137 - https://www.exploit-db.com/exploits/4645 -CVE-2007-6139 - https://www.exploit-db.com/exploits/4650 -CVE-2007-6140 - http://www.packetstormsecurity.org/0711-exploits/dora-sql.txt -CVE-2007-6147 - https://www.exploit-db.com/exploits/4659 -CVE-2007-6159 - http://securityreason.com/securityalert/3402 -CVE-2007-6160 - http://securityreason.com/securityalert/3402 -CVE-2007-6161 - http://securityreason.com/securityalert/3402 -CVE-2007-6164 - https://www.exploit-db.com/exploits/4665 -CVE-2007-6165 - http://www.heise-security.co.uk/news/99257 -CVE-2007-6166 - http://securityreason.com/securityalert/3410 -CVE-2007-6166 - http://www.beskerming.com/security/2007/11/25/74/QuickTime_-_Remote_hacker_automatic_control -CVE-2007-6166 - https://www.exploit-db.com/exploits/4648 -CVE-2007-6166 - https://www.exploit-db.com/exploits/6013 -CVE-2007-6172 - https://www.exploit-db.com/exploits/4668 -CVE-2007-6176 - https://www.exploit-db.com/exploits/4647 -CVE-2007-6177 - https://www.exploit-db.com/exploits/4670 -CVE-2007-6178 - https://www.exploit-db.com/exploits/4671 -CVE-2007-6179 - https://www.exploit-db.com/exploits/4672 -CVE-2007-6181 - http://securityreason.com/securityalert/3406 -CVE-2007-6183 - http://securityreason.com/securityalert/3407 -CVE-2007-6184 - https://www.exploit-db.com/exploits/4669 -CVE-2007-6185 - http://securityreason.com/securityalert/3408 -CVE-2007-6185 - https://www.exploit-db.com/exploits/4666 -CVE-2007-6187 - https://www.exploit-db.com/exploits/4675 -CVE-2007-6188 - https://www.exploit-db.com/exploits/4674 -CVE-2007-6189 - http://securityreason.com/securityalert/3405 -CVE-2007-6189 - https://www.exploit-db.com/exploits/4663 -CVE-2007-6191 - http://www.packetstormsecurity.org/0711-exploits/pmapper-rfi.txt -CVE-2007-6195 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5710 -CVE-2007-6202 - https://www.exploit-db.com/exploits/4678 -CVE-2007-6204 - https://www.exploit-db.com/exploits/4724 -CVE-2007-6207 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9471 -CVE-2007-6212 - https://www.exploit-db.com/exploits/4679 -CVE-2007-6213 - https://www.exploit-db.com/exploits/4677 -CVE-2007-6214 - https://www.exploit-db.com/exploits/4680 -CVE-2007-6215 - https://www.exploit-db.com/exploits/4676 -CVE-2007-6217 - https://www.exploit-db.com/exploits/4649 -CVE-2007-6218 - http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt -CVE-2007-6223 - https://www.exploit-db.com/exploits/4686 -CVE-2007-6224 - http://securityreason.com/securityalert/3415 -CVE-2007-6229 - https://www.exploit-db.com/exploits/4685 -CVE-2007-6230 - https://www.exploit-db.com/exploits/4685 -CVE-2007-6231 - https://www.exploit-db.com/exploits/4684 -CVE-2007-6232 - https://www.exploit-db.com/exploits/4681 -CVE-2007-6233 - https://www.exploit-db.com/exploits/4681 -CVE-2007-6234 - https://www.exploit-db.com/exploits/4681 -CVE-2007-6235 - https://www.exploit-db.com/exploits/4683 -CVE-2007-6236 - https://www.exploit-db.com/exploits/4682 -CVE-2007-6237 - http://securityreason.com/securityalert/3416 -CVE-2007-6238 - http://wabisabilabi.blogspot.com/2007/11/quicktime-zeroday-vulnerability-still.html -CVE-2007-6240 - https://www.exploit-db.com/exploits/4687 -CVE-2007-6242 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9188 -CVE-2007-6243 - http://www.securityfocus.com/bid/26929 -CVE-2007-6244 - http://www.securityfocus.com/bid/26929 -CVE-2007-6245 - http://www.securityfocus.com/bid/26929 -CVE-2007-6245 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9546 -CVE-2007-6246 - http://www.securityfocus.com/bid/26929 -CVE-2007-6255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -CVE-2007-6258 - https://www.exploit-db.com/exploits/5330 -CVE-2007-6258 - https://www.exploit-db.com/exploits/5386 -CVE-2007-6261 - http://www.digit-labs.org/files/exploits/xnu-macho-dos.c -CVE-2007-6262 - http://securityreason.com/securityalert/3420 -CVE-2007-6262 - http://www.coresecurity.com/?action=item&id=2035 -CVE-2007-6268 - http://marc.info/?l=bugtraq&m=119678724111351&w=2 -CVE-2007-6269 - http://marc.info/?l=bugtraq&m=119678724111351&w=2 -CVE-2007-6270 - http://marc.info/?l=bugtraq&m=119678724111351&w=2 -CVE-2007-6271 - http://securityreason.com/securityalert/3421 -CVE-2007-6272 - http://securityreason.com/securityalert/3422 -CVE-2007-6273 - http://marc.info/?l=bugtraq&m=119678272603064&w=2 -CVE-2007-6276 - https://www.exploit-db.com/exploits/4690 -CVE-2007-6283 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977 -CVE-2007-6286 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2007-6289 - https://www.exploit-db.com/exploits/4696 -CVE-2007-6289 - https://www.exploit-db.com/exploits/9284 -CVE-2007-6290 - https://www.exploit-db.com/exploits/4696 -CVE-2007-6292 - https://www.exploit-db.com/exploits/4697 -CVE-2007-6296 - http://securityreason.com/securityalert/3426 -CVE-2007-6297 - http://securityreason.com/securityalert/3426 -CVE-2007-6301 - http://securityreason.com/securityalert/3427 -CVE-2007-6307 - http://securityreason.com/securityalert/3431 -CVE-2007-6310 - https://www.exploit-db.com/exploits/4711 -CVE-2007-6311 - https://www.exploit-db.com/exploits/4711 -CVE-2007-6318 - http://securityreason.com/securityalert/3433 -CVE-2007-6321 - http://securityreason.com/securityalert/3435 -CVE-2007-6322 - https://www.exploit-db.com/exploits/4729 -CVE-2007-6323 - https://www.exploit-db.com/exploits/4728 -CVE-2007-6324 - https://www.exploit-db.com/exploits/4726 -CVE-2007-6325 - https://www.exploit-db.com/exploits/4725 -CVE-2007-6326 - https://www.exploit-db.com/exploits/4717 -CVE-2007-6327 - https://www.exploit-db.com/exploits/4716 -CVE-2007-6328 - http://aluigi.org/poc/dosboxxx.zip -CVE-2007-6328 - http://securityreason.com/securityalert/3442 -CVE-2007-6329 - http://securityreason.com/securityalert/3443 -CVE-2007-6331 - https://www.exploit-db.com/exploits/4720 -CVE-2007-6332 - https://www.exploit-db.com/exploits/4720 -CVE-2007-6333 - https://www.exploit-db.com/exploits/4720 -CVE-2007-6335 - https://www.exploit-db.com/exploits/4862 -CVE-2007-6340 - http://securityreason.com/securityalert/3611 -CVE-2007-6344 - https://www.exploit-db.com/exploits/4719 -CVE-2007-6347 - https://www.exploit-db.com/exploits/4722 -CVE-2007-6348 - http://marc.info/?l=squirrelmail-devel&m=119765235203392&w=2 -CVE-2007-6351 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9420 -CVE-2007-6357 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9052538&source=rss_topic17 -CVE-2007-6359 - http://digit-labs.org/files/exploits/xnu-superblob-dos.c -CVE-2007-6362 - https://www.exploit-db.com/exploits/4691 -CVE-2007-6366 - https://www.exploit-db.com/exploits/4693 -CVE-2007-6367 - https://www.exploit-db.com/exploits/4693 -CVE-2007-6368 - https://www.exploit-db.com/exploits/4694 -CVE-2007-6369 - https://www.exploit-db.com/exploits/4695 -CVE-2007-6377 - http://aluigi.altervista.org/adv/badblue-adv.txt -CVE-2007-6377 - http://securityreason.com/securityalert/3448 -CVE-2007-6377 - https://www.exploit-db.com/exploits/4784 -CVE-2007-6378 - http://aluigi.altervista.org/adv/badblue-adv.txt -CVE-2007-6378 - http://securityreason.com/securityalert/3448 -CVE-2007-6379 - http://aluigi.altervista.org/adv/badblue-adv.txt -CVE-2007-6379 - http://securityreason.com/securityalert/3448 -CVE-2007-6387 - https://www.exploit-db.com/exploits/4825 -CVE-2007-6388 - http://securityreason.com/securityalert/3541 -CVE-2007-6388 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2007-6391 - https://www.exploit-db.com/exploits/4709 -CVE-2007-6392 - https://www.exploit-db.com/exploits/4708 -CVE-2007-6393 - https://www.exploit-db.com/exploits/4707 -CVE-2007-6394 - https://www.exploit-db.com/exploits/4706 -CVE-2007-6395 - https://www.exploit-db.com/exploits/4705 -CVE-2007-6396 - https://www.exploit-db.com/exploits/4705 -CVE-2007-6397 - https://www.exploit-db.com/exploits/4705 -CVE-2007-6398 - https://www.exploit-db.com/exploits/4705 -CVE-2007-6399 - https://www.exploit-db.com/exploits/4705 -CVE-2007-6400 - https://www.exploit-db.com/exploits/4704 -CVE-2007-6401 - http://securityreason.com/securityalert/3453 -CVE-2007-6404 - https://www.exploit-db.com/exploits/4700 -CVE-2007-6405 - https://www.exploit-db.com/exploits/4700 -CVE-2007-6411 - http://securityreason.com/securityalert/3455 -CVE-2007-6414 - https://www.exploit-db.com/exploits/4731 -CVE-2007-6416 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9840 -CVE-2007-6424 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html -CVE-2007-6424 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002533.html -CVE-2007-6435 - http://securityreason.com/securityalert/3459 -CVE-2007-6451 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9685 -CVE-2007-6453 - http://securityreason.com/securityalert/3460 -CVE-2007-6454 - http://aluigi.altervista.org/adv/peercasthof-adv.txt -CVE-2007-6454 - http://securityreason.com/securityalert/3461 -CVE-2007-6455 - http://securityreason.com/securityalert/3462 -CVE-2007-6458 - https://www.exploit-db.com/exploits/4733 -CVE-2007-6459 - https://www.exploit-db.com/exploits/4734 -CVE-2007-6460 - http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/ -CVE-2007-6460 - http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/log.php?r1=284&r2=325 -CVE-2007-6460 - http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/logerror.php?r1=245&r2=325 -CVE-2007-6462 - https://www.exploit-db.com/exploits/4737 -CVE-2007-6464 - https://www.exploit-db.com/exploits/4736 -CVE-2007-6466 - https://www.exploit-db.com/exploits/4739 -CVE-2007-6466 - https://www.exploit-db.com/exploits/4740 -CVE-2007-6468 - http://sourceforge.net/project/shownotes.php?release_id=562016&group_id=124987 -CVE-2007-6472 - https://www.exploit-db.com/exploits/4750 -CVE-2007-6473 - https://www.exploit-db.com/exploits/4742 -CVE-2007-6474 - https://www.exploit-db.com/exploits/4738 -CVE-2007-6475 - https://www.exploit-db.com/exploits/4738 -CVE-2007-6476 - https://www.exploit-db.com/exploits/4738 -CVE-2007-6478 - http://securityreason.com/securityalert/3470 -CVE-2007-6478 - https://www.exploit-db.com/exploits/5122 -CVE-2007-6479 - https://www.exploit-db.com/exploits/4753 -CVE-2007-6485 - https://www.exploit-db.com/exploits/4735 -CVE-2007-6488 - https://www.exploit-db.com/exploits/4712 -CVE-2007-6489 - https://www.exploit-db.com/exploits/4712 -CVE-2007-6490 - https://www.exploit-db.com/exploits/4712 -CVE-2007-6491 - http://securityreason.com/securityalert/3473 -CVE-2007-6494 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6495 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6496 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6497 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6498 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6499 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6500 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6501 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6502 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6503 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6504 - https://www.exploit-db.com/exploits/4730 -CVE-2007-6506 - http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9053818 -CVE-2007-6506 - https://www.exploit-db.com/exploits/4757 -CVE-2007-6508 - https://www.exploit-db.com/exploits/4758 -CVE-2007-6509 - http://marc.info/?l=full-disclosure&m=119794961212714&w=2 -CVE-2007-6510 - http://aluigi.altervista.org/adv/prowizbof-adv.txt -CVE-2007-6510 - http://aluigi.org/poc/prowizbof.zip -CVE-2007-6511 - http://mrhinkydink.blogspot.com/2007/12/websense-policy-filtering-bypass.html -CVE-2007-6513 - http://www.heise-security.co.uk/news/100934 -CVE-2007-6515 - http://securityreason.com/securityalert/3480 -CVE-2007-6515 - http://www.exploit-db.com/exploits/15987 -CVE-2007-6523 - http://securityreason.com/securityalert/3482 -CVE-2007-6524 - https://bugzilla.mozilla.org/show_bug.cgi?id=408076 -CVE-2007-6528 - http://securityreason.com/securityalert/3484 -CVE-2007-6528 - https://www.exploit-db.com/exploits/4942 -CVE-2007-6530 - http://marc.info/?l=full-disclosure&m=119863639428564&w=2 -CVE-2007-6533 - http://aluigi.altervista.org/adv/zoomprayer-adv.txt -CVE-2007-6533 - http://securityreason.com/securityalert/3486 -CVE-2007-6534 - http://securityreason.com/securityalert/3490 -CVE-2007-6537 - http://aluigi.altervista.org/adv/winuaebof-adv.txt -CVE-2007-6537 - http://aluigi.org/poc/winuaebof.zip -CVE-2007-6538 - http://securityreason.com/securityalert/3492 -CVE-2007-6542 - https://www.exploit-db.com/exploits/4764 -CVE-2007-6543 - https://www.exploit-db.com/exploits/4791 -CVE-2007-6544 - https://www.exploit-db.com/exploits/4787 -CVE-2007-6544 - https://www.exploit-db.com/exploits/4790 -CVE-2007-6545 - https://www.exploit-db.com/exploits/4790 -CVE-2007-6546 - https://www.exploit-db.com/exploits/4790 -CVE-2007-6547 - https://www.exploit-db.com/exploits/4790 -CVE-2007-6548 - https://www.exploit-db.com/exploits/4790 -CVE-2007-6550 - https://www.exploit-db.com/exploits/4789 -CVE-2007-6551 - https://www.exploit-db.com/exploits/4788 -CVE-2007-6552 - https://www.exploit-db.com/exploits/4786 -CVE-2007-6553 - https://www.exploit-db.com/exploits/4785 -CVE-2007-6554 - https://www.exploit-db.com/exploits/4785 -CVE-2007-6555 - https://www.exploit-db.com/exploits/4783 -CVE-2007-6556 - https://www.exploit-db.com/exploits/4777 -CVE-2007-6557 - https://www.exploit-db.com/exploits/4778 -CVE-2007-6558 - http://securityreason.com/securityalert/3500 -CVE-2007-6558 - http://www.securityfocus.com/archive/1/485564/100/100/threaded -CVE-2007-6561 - http://securityreason.com/securityalert/3495 -CVE-2007-6565 - https://www.exploit-db.com/exploits/4793 -CVE-2007-6566 - https://www.exploit-db.com/exploits/4794 -CVE-2007-6567 - https://www.exploit-db.com/exploits/4794 -CVE-2007-6568 - https://www.exploit-db.com/exploits/4795 -CVE-2007-6573 - http://securityreason.com/securityalert/3494 -CVE-2007-6575 - https://www.exploit-db.com/exploits/4776 -CVE-2007-6576 - https://www.exploit-db.com/exploits/4775 -CVE-2007-6577 - https://www.exploit-db.com/exploits/4772 -CVE-2007-6578 - https://www.exploit-db.com/exploits/4774 -CVE-2007-6579 - https://www.exploit-db.com/exploits/4771 -CVE-2007-6580 - https://www.exploit-db.com/exploits/4770 -CVE-2007-6581 - https://www.exploit-db.com/exploits/4767 -CVE-2007-6582 - https://www.exploit-db.com/exploits/4766 -CVE-2007-6583 - https://www.exploit-db.com/exploits/4765 -CVE-2007-6584 - https://www.exploit-db.com/exploits/4765 -CVE-2007-6584 - https://www.exploit-db.com/exploits/5434 -CVE-2007-6585 - https://www.exploit-db.com/exploits/4763 -CVE-2007-6586 - https://www.exploit-db.com/exploits/4762 -CVE-2007-6587 - http://packetstormsecurity.com/files/112947/Plogger-Photo-Gallery-SQL-Injection.html -CVE-2007-6587 - http://packetstormsecurity.org/files/112947/Plogger-Photo-Gallery-SQL-Injection.html -CVE-2007-6587 - https://labs.mwrinfosecurity.com/advisories/2007/12/17/plogger-sql-injection/ -CVE-2007-6589 - http://blog.beford.org/?p=8 -CVE-2007-6589 - http://www.mozilla.org/security/announce/2007/mfsa2007-37.html -CVE-2007-6589 - https://bugzilla.mozilla.org/show_bug.cgi?id=403331 -CVE-2007-6593 - http://securityreason.com/securityalert/3499 -CVE-2007-6602 - https://www.exploit-db.com/exploits/4805 -CVE-2007-6603 - https://www.exploit-db.com/exploits/4804 -CVE-2007-6604 - https://www.exploit-db.com/exploits/4802 -CVE-2007-6605 - https://www.exploit-db.com/exploits/4801 -CVE-2007-6606 - http://securityreason.com/securityalert/3502 -CVE-2007-6607 - http://securityreason.com/securityalert/3502 -CVE-2007-6608 - http://securityreason.com/securityalert/3502 -CVE-2007-6614 - https://www.exploit-db.com/exploits/4782 -CVE-2007-6615 - https://www.exploit-db.com/exploits/4782 -CVE-2007-6620 - https://www.exploit-db.com/exploits/4799 -CVE-2007-6621 - https://www.exploit-db.com/exploits/4799 -CVE-2007-6622 - https://www.exploit-db.com/exploits/4798 -CVE-2007-6623 - https://www.exploit-db.com/exploits/4798 -CVE-2007-6624 - https://www.exploit-db.com/exploits/4796 -CVE-2007-6626 - http://aluigi.altervista.org/adv/fengulo-adv.txt -CVE-2007-6626 - http://aluigi.org/poc/fengulo.zip -CVE-2007-6626 - http://securityreason.com/securityalert/3507 -CVE-2007-6627 - http://aluigi.altervista.org/adv/fengulo-adv.txt -CVE-2007-6627 - http://aluigi.org/poc/fengulo.zip -CVE-2007-6627 - http://securityreason.com/securityalert/3507 -CVE-2007-6628 - http://aluigi.altervista.org/adv/fengulo-adv.txt -CVE-2007-6628 - http://aluigi.org/poc/fengulo.zip -CVE-2007-6628 - http://securityreason.com/securityalert/3507 -CVE-2007-6629 - http://aluigi.altervista.org/adv/fengulo-adv.txt -CVE-2007-6629 - http://aluigi.org/poc/fengulo.zip -CVE-2007-6629 - http://securityreason.com/securityalert/3507 -CVE-2007-6630 - http://aluigi.altervista.org/adv/fengulo-adv.txt -CVE-2007-6630 - http://aluigi.org/poc/fengulo.zip -CVE-2007-6630 - http://securityreason.com/securityalert/3507 -CVE-2007-6631 - http://aluigi.altervista.org/adv/libnemesibof-adv.txt -CVE-2007-6631 - http://aluigi.org/poc/libnemesibof.zip -CVE-2007-6631 - http://securityreason.com/securityalert/3513 -CVE-2007-6632 - https://www.exploit-db.com/exploits/4800 -CVE-2007-6637 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828 -CVE-2007-6638 - https://www.exploit-db.com/exploits/4797 -CVE-2007-6639 - https://www.exploit-db.com/exploits/4821 -CVE-2007-6642 - http://securityreason.com/securityalert/3505 -CVE-2007-6647 - https://www.exploit-db.com/exploits/4817 -CVE-2007-6648 - https://www.exploit-db.com/exploits/4816 -CVE-2007-6649 - https://www.exploit-db.com/exploits/4815 -CVE-2007-6650 - http://www.bugreport.ir/?/24 -CVE-2007-6650 - https://www.exploit-db.com/exploits/4814 -CVE-2007-6651 - http://www.bugreport.ir/?/24 -CVE-2007-6651 - https://www.exploit-db.com/exploits/4814 -CVE-2007-6652 - https://www.exploit-db.com/exploits/4813 -CVE-2007-6653 - https://www.exploit-db.com/exploits/4812 -CVE-2007-6654 - https://www.exploit-db.com/exploits/4819 -CVE-2007-6655 - https://www.exploit-db.com/exploits/4811 -CVE-2007-6656 - https://www.exploit-db.com/exploits/4810 -CVE-2007-6657 - https://www.exploit-db.com/exploits/4808 -CVE-2007-6658 - https://www.exploit-db.com/exploits/4809 -CVE-2007-6663 - https://www.exploit-db.com/exploits/4827 -CVE-2007-6664 - https://www.exploit-db.com/exploits/4826 -CVE-2007-6665 - https://www.exploit-db.com/exploits/4824 -CVE-2007-6666 - https://www.exploit-db.com/exploits/4823 -CVE-2007-6667 - https://www.exploit-db.com/exploits/4822 -CVE-2007-6668 - https://www.exploit-db.com/exploits/4741 -CVE-2007-6673 - http://www.packetstormsecurity.org/0712-exploits/makale-xss.txt -CVE-2007-6674 - http://www.packetstormsecurity.org/0801-exploits/rapidshare-xss.txt -CVE-2007-6676 - http://securityreason.com/securityalert/3519 -CVE-2007-6681 - http://aluigi.altervista.org/adv/vlcboffs-adv.txt -CVE-2007-6681 - http://securityreason.com/securityalert/3550 -CVE-2007-6681 - https://www.exploit-db.com/exploits/5667 -CVE-2007-6682 - http://aluigi.altervista.org/adv/vlcboffs-adv.txt -CVE-2007-6682 - http://securityreason.com/securityalert/3550 -CVE-2007-6682 - https://www.exploit-db.com/exploits/5519 -CVE-2007-6685 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6686 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6687 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6688 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6689 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6690 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6691 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6692 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6693 - http://bugs.gentoo.org/show_bug.cgi?id=203217 -CVE-2007-6697 - http://marc.info/?l=bugtraq&m=120110205511630&w=2 -CVE-2007-6697 - http://vexillium.org/?sec-sdlgif -CVE-2007-6699 - http://seclists.org/fulldisclosure/2007/Dec/0561.html -CVE-2007-6702 - https://www.exploit-db.com/exploits/4744 -CVE-2007-6707 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ -CVE-2007-6708 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ -CVE-2007-6709 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ -CVE-2007-6712 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9210 -CVE-2007-6720 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2007-6725 - http://www.openwall.com/lists/oss-security/2009/04/01/10 -CVE-2007-6725 - http://www.redhat.com/support/errata/RHSA-2009-0420.html -CVE-2007-6725 - https://bugzilla.redhat.com/show_bug.cgi?id=493442 -CVE-2007-6725 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9507 -CVE-2007-6731 - http://aluigi.altervista.org/adv/xmpbof-adv.txt -CVE-2007-6732 - http://aluigi.altervista.org/adv/xmpbof-adv.txt -CVE-2007-6736 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2007-6737 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2007-6738 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2007-6739 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2007-6740 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2007-6741 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2007-6744 - http://kb.flexerasoftware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=Installation-InstallShield-InstallShield2008Premier-Public-ProductInfo-IS2008PremProReleaseNotes2pdf&sliceId=pdfPage_42 -CVE-2007-6752 - http://groups.drupal.org/node/216314 -CVE-2007-6752 - http://packetstormsecurity.org/files/110404/drupal712-xsrf.txt -CVE-2007-6753 - http://blog.acrossecurity.com/2010/10/breaking-setdlldirectory-protection.html -CVE-2007-6755 - http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ -CVE-2007-6755 - https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html -CVE-2007-6758 - http://attrition.org/pipermail/vim/2007-April/001545.html -CVE-2007-6761 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b29669c065f60501e7289e1950fa2a618962358 -CVE-2008-0001 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709 -CVE-2008-0002 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-0007 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412 -CVE-2008-0010 - https://www.exploit-db.com/exploits/5093 -CVE-2008-0011 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 -CVE-2008-0015 - http://isc.sans.org/diary.html?storyid=6733 -CVE-2008-0015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -CVE-2008-0016 - https://bugzilla.mozilla.org/show_bug.cgi?id=443288 -CVE-2008-0017 - https://bugzilla.mozilla.org/show_bug.cgi?id=443299 -CVE-2008-0020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -CVE-2008-0027 - http://securityreason.com/securityalert/3551 -CVE-2008-0062 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt -CVE-2008-0062 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-0062 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9496 -CVE-2008-0063 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt -CVE-2008-0063 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-0067 - http://securityreason.com/securityalert/4885 -CVE-2008-0067 - http://securityreason.com/securityalert/8307 -CVE-2008-0068 - http://aluigi.altervista.org/adv/closedviewx-adv.txt -CVE-2008-0069 - https://www.exploit-db.com/exploits/5346 -CVE-2008-0071 - http://securityreason.com/securityalert/3943 -CVE-2008-0071 - https://www.exploit-db.com/exploits/5918 -CVE-2008-0074 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005 -CVE-2008-0075 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-006 -CVE-2008-0076 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 -CVE-2008-0077 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 -CVE-2008-0078 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 -CVE-2008-0080 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-007 -CVE-2008-0081 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0082 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-050 -CVE-2008-0083 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-022 -CVE-2008-0084 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-004 -CVE-2008-0085 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2008-0085 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2008-0085 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 -CVE-2008-0086 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2008-0086 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2008-0086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 -CVE-2008-0087 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020 -CVE-2008-0088 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-003 -CVE-2008-0089 - https://www.exploit-db.com/exploits/4830 -CVE-2008-0090 - https://www.exploit-db.com/exploits/4829 -CVE-2008-0091 - https://www.exploit-db.com/exploits/4828 -CVE-2008-0092 - http://securityreason.com/securityalert/3511 -CVE-2008-0094 - http://securityreason.com/securityalert/3522 -CVE-2008-0096 - http://aluigi.altervista.org/adv/gswsshit-adv.txt -CVE-2008-0096 - http://securityreason.com/securityalert/3517 -CVE-2008-0097 - http://aluigi.altervista.org/adv/gswsshit-adv.txt -CVE-2008-0097 - http://securityreason.com/securityalert/3517 -CVE-2008-0099 - https://www.exploit-db.com/exploits/4831 -CVE-2008-0100 - http://aluigi.altervista.org/adv/whitedunboffs-adv.txt -CVE-2008-0100 - http://securityreason.com/securityalert/3516 -CVE-2008-0101 - http://aluigi.altervista.org/adv/whitedunboffs-adv.txt -CVE-2008-0101 - http://securityreason.com/securityalert/3516 -CVE-2008-0102 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012 -CVE-2008-0103 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-013 -CVE-2008-0104 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012 -CVE-2008-0105 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 -CVE-2008-0106 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2008-0106 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2008-0106 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 -CVE-2008-0107 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2008-0107 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2008-0107 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 -CVE-2008-0108 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 -CVE-2008-0108 - https://www.exploit-db.com/exploits/5107 -CVE-2008-0109 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-009 -CVE-2008-0110 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-015 -CVE-2008-0111 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0112 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0113 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016 -CVE-2008-0114 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0115 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0116 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0117 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -CVE-2008-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5508 -CVE-2008-0118 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016 -CVE-2008-0119 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-027 -CVE-2008-0120 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 -CVE-2008-0121 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 -CVE-2008-0122 - https://bugzilla.redhat.com/show_bug.cgi?id=429149 -CVE-2008-0127 - http://securityreason.com/securityalert/3530 -CVE-2008-0127 - https://www.exploit-db.com/exploits/4878 -CVE-2008-0128 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -CVE-2008-0129 - https://www.exploit-db.com/exploits/4832 -CVE-2008-0132 - http://aluigi.altervista.org/adv/pragmassh-adv.txt -CVE-2008-0132 - http://aluigi.org/poc/pragmassh.zip -CVE-2008-0133 - https://www.exploit-db.com/exploits/4840 -CVE-2008-0134 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt -CVE-2008-0135 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt -CVE-2008-0136 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt -CVE-2008-0137 - https://www.exploit-db.com/exploits/4838 -CVE-2008-0138 - https://www.exploit-db.com/exploits/4847 -CVE-2008-0139 - https://www.exploit-db.com/exploits/4849 -CVE-2008-0140 - https://www.exploit-db.com/exploits/4846 -CVE-2008-0141 - https://www.exploit-db.com/exploits/4835 -CVE-2008-0142 - https://www.exploit-db.com/exploits/4835 -CVE-2008-0143 - https://www.exploit-db.com/exploits/4834 -CVE-2008-0144 - https://www.exploit-db.com/exploits/4833 -CVE-2008-0147 - https://www.exploit-db.com/exploits/4863 -CVE-2008-0148 - https://www.exploit-db.com/exploits/4861 -CVE-2008-0149 - https://www.exploit-db.com/exploits/4861 -CVE-2008-0151 - http://aluigi.altervista.org/adv/waccaz-adv.txt -CVE-2008-0151 - http://aluigi.altervista.org/adv/wachof-adv.txt -CVE-2008-0152 - http://aluigi.altervista.org/adv/slnetmsg-adv.txt -CVE-2008-0153 - http://aluigi.altervista.org/adv/pragmatel-adv.txt -CVE-2008-0154 - https://www.exploit-db.com/exploits/4865 -CVE-2008-0155 - https://www.exploit-db.com/exploits/4865 -CVE-2008-0157 - https://www.exploit-db.com/exploits/4858 -CVE-2008-0158 - http://packetstormsecurity.org/0801-exploits/shopscript-disclose.txt -CVE-2008-0158 - https://www.exploit-db.com/exploits/4855 -CVE-2008-0159 - https://www.exploit-db.com/exploits/4860 -CVE-2008-0166 - https://www.exploit-db.com/exploits/5622 -CVE-2008-0166 - https://www.exploit-db.com/exploits/5632 -CVE-2008-0166 - https://www.exploit-db.com/exploits/5720 -CVE-2008-0177 - https://www.exploit-db.com/exploits/5191 -CVE-2008-0185 - https://www.exploit-db.com/exploits/4852 -CVE-2008-0186 - https://www.exploit-db.com/exploits/4852 -CVE-2008-0187 - https://www.exploit-db.com/exploits/4836 -CVE-2008-0208 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt -CVE-2008-0209 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt -CVE-2008-0210 - https://www.exploit-db.com/exploits/4846 -CVE-2008-0219 - https://www.exploit-db.com/exploits/4867 -CVE-2008-0220 - https://www.exploit-db.com/exploits/4869 -CVE-2008-0220 - https://www.exploit-db.com/exploits/4982 -CVE-2008-0221 - https://www.exploit-db.com/exploits/4869 -CVE-2008-0222 - https://www.exploit-db.com/exploits/4844 -CVE-2008-0224 - https://www.exploit-db.com/exploits/4845 -CVE-2008-0226 - http://securityreason.com/securityalert/3531 -CVE-2008-0227 - http://securityreason.com/securityalert/3531 -CVE-2008-0228 - http://securityreason.com/securityalert/3534 -CVE-2008-0229 - http://securityreason.com/securityalert/3533 -CVE-2008-0230 - http://packetstormsecurity.org/0801-exploits/osdata-lfi.txt -CVE-2008-0230 - https://www.exploit-db.com/exploits/4870 -CVE-2008-0231 - https://www.exploit-db.com/exploits/4876 -CVE-2008-0232 - http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt -CVE-2008-0232 - https://www.exploit-db.com/exploits/4864 -CVE-2008-0233 - http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt -CVE-2008-0233 - https://www.exploit-db.com/exploits/4864 -CVE-2008-0234 - http://securityreason.com/securityalert/3537 -CVE-2008-0234 - http://www.kb.cert.org/vuls/id/112179 -CVE-2008-0234 - https://www.exploit-db.com/exploits/4885 -CVE-2008-0234 - https://www.exploit-db.com/exploits/4906 -CVE-2008-0235 - http://packetstormsecurity.org/0801-exploits/msvfpole-exec.txt -CVE-2008-0235 - https://www.exploit-db.com/exploits/4875 -CVE-2008-0236 - https://www.exploit-db.com/exploits/4873 -CVE-2008-0237 - https://www.exploit-db.com/exploits/4874 -CVE-2008-0244 - http://aluigi.altervista.org/adv/sapone-adv.txt -CVE-2008-0244 - http://securityreason.com/securityalert/3536 -CVE-2008-0244 - https://www.exploit-db.com/exploits/4877 -CVE-2008-0245 - https://www.exploit-db.com/exploits/4871 -CVE-2008-0246 - https://www.exploit-db.com/exploits/4871 -CVE-2008-0248 - https://www.exploit-db.com/exploits/4894 -CVE-2008-0249 - https://www.exploit-db.com/exploits/4872 -CVE-2008-0250 - https://www.exploit-db.com/exploits/4892 -CVE-2008-0253 - https://www.exploit-db.com/exploits/4904 -CVE-2008-0254 - https://www.exploit-db.com/exploits/4901 -CVE-2008-0255 - https://www.exploit-db.com/exploits/4886 -CVE-2008-0256 - https://www.exploit-db.com/exploits/4900 -CVE-2008-0259 - https://www.exploit-db.com/exploits/4902 -CVE-2008-0260 - https://www.exploit-db.com/exploits/4902 -CVE-2008-0262 - https://www.exploit-db.com/exploits/4898 -CVE-2008-0262 - https://www.exploit-db.com/exploits/4905 -CVE-2008-0265 - http://securityreason.com/securityalert/3545 -CVE-2008-0266 - http://securityreason.com/securityalert/3542 -CVE-2008-0267 - http://securityreason.com/securityalert/3542 -CVE-2008-0268 - http://securityreason.com/securityalert/3542 -CVE-2008-0270 - https://www.exploit-db.com/exploits/4899 -CVE-2008-0276 - http://drupal.org/node/208524 -CVE-2008-0278 - https://www.exploit-db.com/exploits/4907 -CVE-2008-0279 - https://www.exploit-db.com/exploits/4908 -CVE-2008-0280 - http://securityreason.com/securityalert/3544 -CVE-2008-0280 - https://www.exploit-db.com/exploits/4882 -CVE-2008-0282 - https://www.exploit-db.com/exploits/4880 -CVE-2008-0283 - https://www.exploit-db.com/exploits/4883 -CVE-2008-0284 - http://securityreason.com/securityalert/3540 -CVE-2008-0286 - http://securityreason.com/securityalert/3546 -CVE-2008-0287 - https://www.exploit-db.com/exploits/4889 -CVE-2008-0288 - http://securityreason.com/securityalert/3548 -CVE-2008-0288 - https://www.exploit-db.com/exploits/4895 -CVE-2008-0289 - http://securityreason.com/securityalert/3547 -CVE-2008-0290 - https://www.exploit-db.com/exploits/4887 -CVE-2008-0291 - https://www.exploit-db.com/exploits/4910 -CVE-2008-0297 - https://www.exploit-db.com/exploits/4897 -CVE-2008-0298 - http://securityreason.com/securityalert/3549 -CVE-2008-0300 - http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php -CVE-2008-0300 - https://www.exploit-db.com/exploits/5232 -CVE-2008-0301 - http://marc.info/?l=full-disclosure&m=120523564611595&w=2 -CVE-2008-0301 - http://securityreason.com/securityalert/3728 -CVE-2008-0301 - http://www.redteam-pentesting.de/advisories/rt-sa-2008-002.php -CVE-2008-0301 - https://www.exploit-db.com/exploits/5233 -CVE-2008-0304 - http://www.ubuntu.com/usn/usn-582-2 -CVE-2008-0310 - https://www.exploit-db.com/exploits/5355 -CVE-2008-0324 - https://www.exploit-db.com/exploits/4911 -CVE-2008-0325 - https://www.exploit-db.com/exploits/4916 -CVE-2008-0326 - https://www.exploit-db.com/exploits/4917 -CVE-2008-0327 - https://www.exploit-db.com/exploits/4914 -CVE-2008-0328 - https://www.exploit-db.com/exploits/4915 -CVE-2008-0329 - https://www.exploit-db.com/exploits/4912 -CVE-2008-0330 - http://www.open.com.au/radiator/history.html -CVE-2008-0332 - https://www.exploit-db.com/exploits/4920 -CVE-2008-0333 - https://www.exploit-db.com/exploits/4921 -CVE-2008-0334 - http://packetstormsecurity.org/0801-exploits/pMachinePro-241-xss.txt -CVE-2008-0337 - https://www.exploit-db.com/exploits/4923 -CVE-2008-0338 - https://www.exploit-db.com/exploits/4923 -CVE-2008-0350 - https://www.exploit-db.com/exploits/4884 -CVE-2008-0351 - https://www.exploit-db.com/exploits/4884 -CVE-2008-0352 - https://www.exploit-db.com/exploits/4893 -CVE-2008-0353 - https://www.exploit-db.com/exploits/4925 -CVE-2008-0355 - https://www.exploit-db.com/exploits/4929 -CVE-2008-0357 - https://www.exploit-db.com/exploits/4930 -CVE-2008-0358 - https://www.exploit-db.com/exploits/4924 -CVE-2008-0359 - https://www.exploit-db.com/exploits/4919 -CVE-2008-0360 - https://www.exploit-db.com/exploits/4919 -CVE-2008-0361 - http://securityreason.com/securityalert/3552 -CVE-2008-0361 - https://www.exploit-db.com/exploits/4926 -CVE-2008-0362 - http://securityreason.com/securityalert/3553 -CVE-2008-0363 - http://securityreason.com/securityalert/3553 -CVE-2008-0364 - http://aluigi.altervista.org/adv/ruttorrent-adv.txt -CVE-2008-0364 - http://aluigi.org/poc/ruttorrent.zip -CVE-2008-0364 - http://securityreason.com/securityalert/3554 -CVE-2008-0365 - http://securityreason.com/securityalert/3555 -CVE-2008-0365 - http://www.coresecurity.com/?action=item&id=2025 -CVE-2008-0366 - http://securityreason.com/securityalert/3555 -CVE-2008-0366 - http://www.coresecurity.com/?action=item&id=2025 -CVE-2008-0371 - https://www.exploit-db.com/exploits/4922 -CVE-2008-0372 - http://securityreason.com/securityalert/3557 -CVE-2008-0376 - https://www.exploit-db.com/exploits/4937 -CVE-2008-0377 - http://securityreason.com/securityalert/3556 -CVE-2008-0379 - https://www.exploit-db.com/exploits/4931 -CVE-2008-0380 - https://www.exploit-db.com/exploits/4932 -CVE-2008-0382 - http://securityreason.com/securityalert/3559 -CVE-2008-0382 - https://www.exploit-db.com/exploits/4927 -CVE-2008-0382 - https://www.exploit-db.com/exploits/4928 -CVE-2008-0383 - http://securityreason.com/securityalert/3558 -CVE-2008-0383 - http://www.waraxe.us/advisory-62.html -CVE-2008-0384 - https://www.exploit-db.com/exploits/4935 -CVE-2008-0385 - http://securityreason.com/securityalert/3707 -CVE-2008-0387 - http://securityreason.com/securityalert/3580 -CVE-2008-0387 - http://www.coresecurity.com/?action=item&id=2095 -CVE-2008-0388 - https://www.exploit-db.com/exploits/4939 -CVE-2008-0390 - https://www.exploit-db.com/exploits/4933 -CVE-2008-0391 - https://www.exploit-db.com/exploits/4922 -CVE-2008-0392 - https://www.exploit-db.com/exploits/4938 -CVE-2008-0393 - https://www.exploit-db.com/exploits/4936 -CVE-2008-0394 - https://www.exploit-db.com/exploits/4949 -CVE-2008-0395 - http://securityreason.com/securityalert/3573 -CVE-2008-0395 - http://www.waraxe.us/advisory-63.html -CVE-2008-0397 - https://www.exploit-db.com/exploits/4958 -CVE-2008-0398 - https://www.exploit-db.com/exploits/4958 -CVE-2008-0399 - https://www.exploit-db.com/exploits/4946 -CVE-2008-0403 - http://securityreason.com/securityalert/3566 -CVE-2008-0403 - https://www.exploit-db.com/exploits/4941 -CVE-2008-0411 - http://scary.beasts.org/security/CESA-2008-001.html -CVE-2008-0411 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557 -CVE-2008-0412 - http://www.ubuntu.com/usn/usn-582-2 -CVE-2008-0413 - http://www.ubuntu.com/usn/usn-582-2 -CVE-2008-0415 - http://www.ubuntu.com/usn/usn-582-2 -CVE-2008-0415 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897 -CVE-2008-0416 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-0418 - http://www.ubuntu.com/usn/usn-582-2 -CVE-2008-0420 - http://www.ubuntu.com/usn/usn-582-2 -CVE-2008-0420 - https://bugzilla.mozilla.org/show_bug.cgi?id=408076 -CVE-2008-0421 - https://www.exploit-db.com/exploits/4966 -CVE-2008-0422 - https://www.exploit-db.com/exploits/4952 -CVE-2008-0423 - https://www.exploit-db.com/exploits/4955 -CVE-2008-0424 - https://www.exploit-db.com/exploits/4951 -CVE-2008-0425 - https://www.exploit-db.com/exploits/4943 -CVE-2008-0427 - http://bugreport.ir/?/27 -CVE-2008-0427 - http://marc.info/?l=bugtraq&m=120093005310107&w=2 -CVE-2008-0427 - https://www.exploit-db.com/exploits/4945 -CVE-2008-0428 - http://bugreport.ir/?/27 -CVE-2008-0428 - http://marc.info/?l=bugtraq&m=120093005310107&w=2 -CVE-2008-0428 - https://www.exploit-db.com/exploits/4945 -CVE-2008-0429 - https://www.exploit-db.com/exploits/4956 -CVE-2008-0429 - https://www.exploit-db.com/exploits/6401 -CVE-2008-0430 - https://www.exploit-db.com/exploits/4944 -CVE-2008-0431 - https://www.exploit-db.com/exploits/4954 -CVE-2008-0434 - https://www.exploit-db.com/exploits/4947 -CVE-2008-0435 - https://www.exploit-db.com/exploits/4953 -CVE-2008-0437 - https://www.exploit-db.com/exploits/4959 -CVE-2008-0438 - http://securityreason.com/securityalert/3571 -CVE-2008-0439 - http://securityreason.com/securityalert/3564 -CVE-2008-0440 - https://www.exploit-db.com/exploits/4956 -CVE-2008-0443 - https://www.exploit-db.com/exploits/4967 -CVE-2008-0446 - https://www.exploit-db.com/exploits/4969 -CVE-2008-0447 - https://www.exploit-db.com/exploits/4968 -CVE-2008-0451 - http://securityreason.com/securityalert/3574 -CVE-2008-0452 - https://www.exploit-db.com/exploits/4973 -CVE-2008-0453 - https://www.exploit-db.com/exploits/4960 -CVE-2008-0454 - http://www.kb.cert.org/vuls/id/248184 -CVE-2008-0455 - http://securityreason.com/securityalert/3575 -CVE-2008-0455 - http://www.mindedsecurity.com/MSA01150108.html -CVE-2008-0456 - http://securityreason.com/securityalert/3575 -CVE-2008-0456 - http://www.mindedsecurity.com/MSA01150108.html -CVE-2008-0457 - https://www.exploit-db.com/exploits/5078 -CVE-2008-0458 - https://www.exploit-db.com/exploits/4975 -CVE-2008-0459 - https://www.exploit-db.com/exploits/4976 -CVE-2008-0461 - https://www.exploit-db.com/exploits/4965 -CVE-2008-0464 - https://www.exploit-db.com/exploits/4977 -CVE-2008-0465 - https://www.exploit-db.com/exploits/4980 -CVE-2008-0466 - http://securityreason.com/securityalert/3584 -CVE-2008-0466 - http://www.bugreport.ir/?/29 -CVE-2008-0466 - http://www.bugreport.ir/?/31 -CVE-2008-0466 - https://www.exploit-db.com/exploits/4970 -CVE-2008-0466 - https://www.exploit-db.com/exploits/4971 -CVE-2008-0468 - https://www.exploit-db.com/exploits/4985 -CVE-2008-0469 - https://www.exploit-db.com/exploits/4984 -CVE-2008-0470 - https://www.exploit-db.com/exploits/4974 -CVE-2008-0473 - http://securityreason.com/securityalert/3584 -CVE-2008-0473 - http://www.bugreport.ir/?/31 -CVE-2008-0473 - https://www.exploit-db.com/exploits/4971 -CVE-2008-0477 - https://www.exploit-db.com/exploits/4979 -CVE-2008-0478 - https://www.exploit-db.com/exploits/4962 -CVE-2008-0479 - http://securityreason.com/securityalert/3588 -CVE-2008-0479 - http://www.bugreport.ir/?/30 -CVE-2008-0479 - https://www.exploit-db.com/exploits/4972 -CVE-2008-0480 - http://securityreason.com/securityalert/3589 -CVE-2008-0480 - http://www.bugreport.ir/?/29 -CVE-2008-0480 - https://www.exploit-db.com/exploits/4970 -CVE-2008-0481 - http://securityreason.com/securityalert/3584 -CVE-2008-0481 - http://www.bugreport.ir/?/31 -CVE-2008-0481 - https://www.exploit-db.com/exploits/4971 -CVE-2008-0485 - http://securityreason.com/securityalert/3607 -CVE-2008-0486 - http://securityreason.com/securityalert/3608 -CVE-2008-0490 - https://www.exploit-db.com/exploits/4992 -CVE-2008-0491 - https://www.exploit-db.com/exploits/4993 -CVE-2008-0492 - https://www.exploit-db.com/exploits/4987 -CVE-2008-0493 - https://www.exploit-db.com/exploits/4998 -CVE-2008-0498 - https://www.exploit-db.com/exploits/5002 -CVE-2008-0501 - https://www.exploit-db.com/exploits/5000 -CVE-2008-0502 - https://www.exploit-db.com/exploits/5012 -CVE-2008-0503 - https://www.exploit-db.com/exploits/5003 -CVE-2008-0506 - http://www.waraxe.us/advisory-65.html -CVE-2008-0506 - https://www.exploit-db.com/exploits/5019 -CVE-2008-0507 - https://www.exploit-db.com/exploits/5013 -CVE-2008-0508 - http://securityreason.com/securityalert/3595 -CVE-2008-0510 - https://www.exploit-db.com/exploits/5007 -CVE-2008-0511 - https://www.exploit-db.com/exploits/5009 -CVE-2008-0512 - https://www.exploit-db.com/exploits/5008 -CVE-2008-0513 - https://www.exploit-db.com/exploits/5006 -CVE-2008-0514 - https://www.exploit-db.com/exploits/5010 -CVE-2008-0515 - https://www.exploit-db.com/exploits/5011 -CVE-2008-0517 - https://www.exploit-db.com/exploits/5016 -CVE-2008-0518 - https://www.exploit-db.com/exploits/5014 -CVE-2008-0519 - https://www.exploit-db.com/exploits/5015 -CVE-2008-0520 - https://www.exploit-db.com/exploits/5017 -CVE-2008-0521 - https://www.exploit-db.com/exploits/5001 -CVE-2008-0538 - http://marc.info/?l=full-disclosure&m=120139657100513&w=2 -CVE-2008-0538 - https://www.exploit-db.com/exploits/4990 -CVE-2008-0541 - https://www.exploit-db.com/exploits/4989 -CVE-2008-0542 - https://www.exploit-db.com/exploits/4989 -CVE-2008-0545 - https://www.exploit-db.com/exploits/4991 -CVE-2008-0546 - http://securityreason.com/securityalert/3600 -CVE-2008-0546 - https://www.exploit-db.com/exploits/4988 -CVE-2008-0547 - http://securityreason.com/securityalert/3600 -CVE-2008-0547 - https://www.exploit-db.com/exploits/4988 -CVE-2008-0548 - http://aluigi.altervista.org/adv/steamcazz-adv.txt -CVE-2008-0549 - http://aluigi.altervista.org/adv/steamcazz-adv.txt -CVE-2008-0549 - http://aluigi.org/poc/steamcazz.zip -CVE-2008-0550 - http://aluigi.altervista.org/adv/steamcazz-adv.txt -CVE-2008-0550 - http://aluigi.org/poc/steamcazz.zip -CVE-2008-0551 - https://www.exploit-db.com/exploits/4986 -CVE-2008-0552 - http://securityreason.com/securityalert/3601 -CVE-2008-0553 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-0554 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056 -CVE-2008-0557 - https://www.exploit-db.com/exploits/5030 -CVE-2008-0561 - https://www.exploit-db.com/exploits/5029 -CVE-2008-0562 - https://www.exploit-db.com/exploits/5031 -CVE-2008-0564 - http://www.ubuntu.com/usn/usn-586-1 -CVE-2008-0565 - https://www.exploit-db.com/exploits/5021 -CVE-2008-0566 - https://www.exploit-db.com/exploits/5022 -CVE-2008-0567 - https://www.exploit-db.com/exploits/5020 -CVE-2008-0572 - https://www.exploit-db.com/exploits/5026 -CVE-2008-0573 - https://www.exploit-db.com/exploits/5004 -CVE-2008-0579 - https://www.exploit-db.com/exploits/5011 -CVE-2008-0580 - http://securityreason.com/securityalert/3611 -CVE-2008-0581 - http://securityreason.com/securityalert/3611 -CVE-2008-0590 - http://securityreason.com/securityalert/3609 -CVE-2008-0590 - https://www.exploit-db.com/exploits/5044 -CVE-2008-0591 - http://securityreason.com/securityalert/2781 -CVE-2008-0592 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9972 -CVE-2008-0593 - https://bugzilla.mozilla.org/show_bug.cgi?id=397427 -CVE-2008-0594 - https://bugzilla.mozilla.org/show_bug.cgi?id=408164 -CVE-2008-0595 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9353 -CVE-2008-0597 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9492 -CVE-2008-0600 - https://www.exploit-db.com/exploits/5092 -CVE-2008-0601 - https://www.exploit-db.com/exploits/5064 -CVE-2008-0602 - https://www.exploit-db.com/exploits/5061 -CVE-2008-0603 - https://www.exploit-db.com/exploits/5058 -CVE-2008-0606 - https://www.exploit-db.com/exploits/5059 -CVE-2008-0607 - https://www.exploit-db.com/exploits/5038 -CVE-2008-0609 - https://www.exploit-db.com/exploits/5060 -CVE-2008-0611 - https://www.exploit-db.com/exploits/5062 -CVE-2008-0612 - https://www.exploit-db.com/exploits/5057 -CVE-2008-0613 - https://www.exploit-db.com/exploits/5057 -CVE-2008-0614 - https://www.exploit-db.com/exploits/5065 -CVE-2008-0615 - http://securityreason.com/securityalert/3615 -CVE-2008-0615 - https://www.exploit-db.com/exploits/5035 -CVE-2008-0616 - http://securityreason.com/securityalert/3615 -CVE-2008-0616 - https://www.exploit-db.com/exploits/5035 -CVE-2008-0617 - http://securityreason.com/securityalert/3615 -CVE-2008-0617 - https://www.exploit-db.com/exploits/5035 -CVE-2008-0619 - https://www.exploit-db.com/exploits/5063 -CVE-2008-0620 - http://securityreason.com/securityalert/3619 -CVE-2008-0621 - http://securityreason.com/securityalert/3619 -CVE-2008-0621 - https://www.exploit-db.com/exploits/5079 -CVE-2008-0623 - https://www.exploit-db.com/exploits/5043 -CVE-2008-0623 - https://www.exploit-db.com/exploits/5046 -CVE-2008-0623 - https://www.exploit-db.com/exploits/5048 -CVE-2008-0624 - https://www.exploit-db.com/exploits/5051 -CVE-2008-0625 - https://www.exploit-db.com/exploits/5052 -CVE-2008-0628 - http://securityreason.com/securityalert/3621 -CVE-2008-0628 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9847 -CVE-2008-0631 - https://www.exploit-db.com/exploits/4999 -CVE-2008-0632 - http://securityreason.com/securityalert/3617 -CVE-2008-0632 - https://www.exploit-db.com/exploits/5033 -CVE-2008-0633 - http://securityreason.com/securityalert/3618 -CVE-2008-0633 - https://sourceforge.net/project/shownotes.php?group_id=138780&release_id=571924 -CVE-2008-0634 - https://www.exploit-db.com/exploits/5045 -CVE-2008-0635 - http://securityreason.com/securityalert/3620 -CVE-2008-0647 - https://www.exploit-db.com/exploits/5153 -CVE-2008-0648 - https://www.exploit-db.com/exploits/5068 -CVE-2008-0649 - https://www.exploit-db.com/exploits/5071 -CVE-2008-0652 - https://www.exploit-db.com/exploits/5073 -CVE-2008-0653 - https://www.exploit-db.com/exploits/5072 -CVE-2008-0654 - http://securityreason.com/securityalert/3622 -CVE-2008-0656 - http://securityreason.com/securityalert/3626 -CVE-2008-0658 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470 -CVE-2008-0659 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9060483 -CVE-2008-0659 - https://www.exploit-db.com/exploits/5025 -CVE-2008-0660 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9060483 -CVE-2008-0660 - https://www.exploit-db.com/exploits/5049 -CVE-2008-0661 - http://securityreason.com/securityalert/3623 -CVE-2008-0661 - https://www.exploit-db.com/exploits/5067 -CVE-2008-0661 - https://www.exploit-db.com/exploits/5069 -CVE-2008-0662 - http://securityreason.com/securityalert/3627 -CVE-2008-0667 - http://securityreason.com/securityalert/3625 -CVE-2008-0667 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9731 -CVE-2008-0670 - https://www.exploit-db.com/exploits/5081 -CVE-2008-0671 - http://aluigi.altervista.org/adv/rintintin-adv.txt -CVE-2008-0671 - http://securityreason.com/securityalert/3632 -CVE-2008-0672 - http://aluigi.altervista.org/adv/rintintin-adv.txt -CVE-2008-0672 - http://securityreason.com/securityalert/3632 -CVE-2008-0673 - http://aluigi.altervista.org/adv/rintintin-adv.txt -CVE-2008-0673 - http://securityreason.com/securityalert/3632 -CVE-2008-0675 - http://securityreason.com/securityalert/3631 -CVE-2008-0675 - https://www.exploit-db.com/exploits/5037 -CVE-2008-0676 - https://www.exploit-db.com/exploits/5050 -CVE-2008-0677 - https://www.exploit-db.com/exploits/5050 -CVE-2008-0678 - https://www.exploit-db.com/exploits/5042 -CVE-2008-0679 - https://www.exploit-db.com/exploits/5042 -CVE-2008-0680 - https://www.exploit-db.com/exploits/5054 -CVE-2008-0681 - http://securityreason.com/securityalert/3628 -CVE-2008-0681 - https://www.exploit-db.com/exploits/5041 -CVE-2008-0682 - https://www.exploit-db.com/exploits/5039 -CVE-2008-0683 - https://www.exploit-db.com/exploits/5053 -CVE-2008-0686 - https://www.exploit-db.com/exploits/5034 -CVE-2008-0689 - https://www.exploit-db.com/exploits/5055 -CVE-2008-0690 - https://www.exploit-db.com/exploits/5047 -CVE-2008-0692 - https://www.exploit-db.com/exploits/5056 -CVE-2008-0695 - https://www.exploit-db.com/exploits/5040 -CVE-2008-0702 - http://securityreason.com/securityalert/3639 -CVE-2008-0702 - https://www.exploit-db.com/exploits/5036 -CVE-2008-0703 - http://securityreason.com/securityalert/3629 -CVE-2008-0703 - https://www.exploit-db.com/exploits/5027 -CVE-2008-0714 - https://www.exploit-db.com/exploits/5074 -CVE-2008-0719 - https://www.exploit-db.com/exploits/5075 -CVE-2008-0721 - https://www.exploit-db.com/exploits/5076 -CVE-2008-0722 - https://www.exploit-db.com/exploits/4983 -CVE-2008-0724 - http://securityreason.com/securityalert/3631 -CVE-2008-0724 - https://www.exploit-db.com/exploits/5037 -CVE-2008-0729 - http://securityreason.com/securityalert/3630 -CVE-2008-0729 - https://www.exploit-db.com/exploits/4978 -CVE-2008-0734 - https://www.exploit-db.com/exploits/5088 -CVE-2008-0735 - https://www.exploit-db.com/exploits/5105 -CVE-2008-0736 - http://securityreason.com/securityalert/3600 -CVE-2008-0736 - https://www.exploit-db.com/exploits/4988 -CVE-2008-0737 - http://securityreason.com/securityalert/3600 -CVE-2008-0737 - https://www.exploit-db.com/exploits/4988 -CVE-2008-0742 - https://www.exploit-db.com/exploits/5082 -CVE-2008-0745 - https://www.exploit-db.com/exploits/5089 -CVE-2008-0746 - https://www.exploit-db.com/exploits/5084 -CVE-2008-0747 - http://securityreason.com/securityalert/3642 -CVE-2008-0747 - https://www.exploit-db.com/exploits/5085 -CVE-2008-0748 - https://www.exploit-db.com/exploits/5086 -CVE-2008-0748 - https://www.exploit-db.com/exploits/5100 -CVE-2008-0752 - https://www.exploit-db.com/exploits/5083 -CVE-2008-0755 - http://aluigi.altervista.org/adv/cyanuro-adv.txt -CVE-2008-0756 - http://aluigi.altervista.org/adv/cyanuro-adv.txt -CVE-2008-0758 - http://aluigi.altervista.org/adv/ezipirla-adv.txt -CVE-2008-0758 - http://aluigi.org/poc/ezipirla.zip -CVE-2008-0759 - http://aluigi.altervista.org/adv/ezipirla-adv.txt -CVE-2008-0759 - http://aluigi.org/poc/ezipirla.zip -CVE-2008-0761 - https://www.exploit-db.com/exploits/5104 -CVE-2008-0766 - http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt -CVE-2008-0767 - http://aluigi.altervista.org/adv/ezipirla-adv.txt -CVE-2008-0767 - http://aluigi.org/poc/ezipirla.zip -CVE-2008-0770 - https://www.exploit-db.com/exploits/5018 -CVE-2008-0772 - https://www.exploit-db.com/exploits/5080 -CVE-2008-0773 - https://www.exploit-db.com/exploits/5094 -CVE-2008-0776 - https://www.exploit-db.com/exploits/5096 -CVE-2008-0778 - https://www.exploit-db.com/exploits/5110 -CVE-2008-0782 - http://www.attrition.org/pipermail/vim/2008-January/001890.html -CVE-2008-0782 - https://www.exploit-db.com/exploits/4957 -CVE-2008-0787 - http://www.waraxe.us/advisory-64.html -CVE-2008-0787 - https://www.exploit-db.com/exploits/5070 -CVE-2008-0788 - http://securityreason.com/securityalert/3656 -CVE-2008-0789 - http://securityreason.com/securityalert/3655 -CVE-2008-0790 - http://aluigi.altervista.org/adv/winipds-adv.txt -CVE-2008-0790 - http://securityreason.com/securityalert/3658 -CVE-2008-0791 - http://aluigi.altervista.org/adv/winipds-adv.txt -CVE-2008-0791 - http://securityreason.com/securityalert/3658 -CVE-2008-0794 - https://www.exploit-db.com/exploits/5108 -CVE-2008-0795 - https://www.exploit-db.com/exploits/5109 -CVE-2008-0796 - https://www.exploit-db.com/exploits/5115 -CVE-2008-0798 - https://www.exploit-db.com/exploits/5116 -CVE-2008-0799 - https://www.exploit-db.com/exploits/5119 -CVE-2008-0800 - https://www.exploit-db.com/exploits/5118 -CVE-2008-0801 - https://www.exploit-db.com/exploits/5117 -CVE-2008-0802 - https://www.exploit-db.com/exploits/5120 -CVE-2008-0803 - https://www.exploit-db.com/exploits/5121 -CVE-2008-0804 - https://www.exploit-db.com/exploits/5150 -CVE-2008-0805 - https://www.exploit-db.com/exploits/5136 -CVE-2008-0811 - https://www.exploit-db.com/exploits/5130 -CVE-2008-0813 - https://www.exploit-db.com/exploits/5137 -CVE-2008-0814 - https://www.exploit-db.com/exploits/5129 -CVE-2008-0818 - https://www.exploit-db.com/exploits/5124 -CVE-2008-0821 - https://www.exploit-db.com/exploits/5125 -CVE-2008-0822 - https://www.exploit-db.com/exploits/5123 -CVE-2008-0827 - https://www.exploit-db.com/exploits/5147 -CVE-2008-0829 - https://www.exploit-db.com/exploits/5132 -CVE-2008-0830 - https://www.exploit-db.com/exploits/5151 -CVE-2008-0831 - https://www.exploit-db.com/exploits/5103 -CVE-2008-0832 - https://www.exploit-db.com/exploits/5128 -CVE-2008-0833 - https://www.exploit-db.com/exploits/5134 -CVE-2008-0835 - https://www.exploit-db.com/exploits/5131 -CVE-2008-0838 - http://securityreason.com/securityalert/3673 -CVE-2008-0839 - https://www.exploit-db.com/exploits/5138 -CVE-2008-0840 - https://www.exploit-db.com/exploits/5140 -CVE-2008-0841 - https://www.exploit-db.com/exploits/5133 -CVE-2008-0842 - https://www.exploit-db.com/exploits/5146 -CVE-2008-0843 - http://packetstormsecurity.org/1002-exploits/statcountex-disclose.txt -CVE-2008-0844 - https://www.exploit-db.com/exploits/5145 -CVE-2008-0847 - https://www.exploit-db.com/exploits/5148 -CVE-2008-0848 - http://securityreason.com/securityalert/3688 -CVE-2008-0850 - http://securityreason.com/securityalert/3687 -CVE-2008-0851 - http://securityreason.com/securityalert/3687 -CVE-2008-0852 - http://aluigi.altervista.org/adv/freesshdnull-adv.txt -CVE-2008-0857 - http://securityreason.com/securityalert/3680 -CVE-2008-0857 - https://www.exploit-db.com/exploits/5164 -CVE-2008-0871 - http://aluigi.altervista.org/adv/nowsmsz-adv.txt -CVE-2008-0871 - https://www.exploit-db.com/exploits/5695 -CVE-2008-0872 - http://securityreason.com/securityalert/3686 -CVE-2008-0873 - http://securityreason.com/securityalert/3681 -CVE-2008-0873 - https://www.exploit-db.com/exploits/5158 -CVE-2008-0874 - http://securityreason.com/securityalert/3682 -CVE-2008-0874 - https://www.exploit-db.com/exploits/5157 -CVE-2008-0877 - http://securityreason.com/securityalert/3683 -CVE-2008-0878 - https://www.exploit-db.com/exploits/5156 -CVE-2008-0879 - http://packetstormsecurity.com/files/126697/PHP-Nuke-Web-Links-SQL-Injection.html -CVE-2008-0879 - http://securityreason.com/securityalert/3684 -CVE-2008-0880 - https://www.exploit-db.com/exploits/5155 -CVE-2008-0881 - https://www.exploit-db.com/exploits/5159 -CVE-2008-0882 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9625 -CVE-2008-0888 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-0888 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733 -CVE-2008-0891 - http://www.kb.cert.org/vuls/id/661475 -CVE-2008-0894 - http://securityreason.com/securityalert/3685 -CVE-2008-0894 - https://bugzilla.mozilla.org/show_bug.cgi?id=408076 -CVE-2008-0905 - https://www.exploit-db.com/exploits/5162 -CVE-2008-0906 - https://www.exploit-db.com/exploits/5161 -CVE-2008-0907 - https://www.exploit-db.com/exploits/5163 -CVE-2008-0911 - https://www.exploit-db.com/exploits/5166 -CVE-2008-0912 - http://aluigi.altervista.org/adv/mobilinkhof-adv.txt -CVE-2008-0912 - http://securityreason.com/securityalert/3691 -CVE-2008-0916 - https://www.exploit-db.com/exploits/5160 -CVE-2008-0919 - http://securityreason.com/securityalert/3689 -CVE-2008-0919 - https://www.exploit-db.com/exploits/5171 -CVE-2008-0920 - http://securityreason.com/securityalert/3689 -CVE-2008-0920 - https://www.exploit-db.com/exploits/5171 -CVE-2008-0921 - https://www.exploit-db.com/exploits/5170 -CVE-2008-0922 - https://www.exploit-db.com/exploits/5168 -CVE-2008-0923 - http://securityreason.com/securityalert/3700 -CVE-2008-0923 - http://www.coresecurity.com/?action=item&id=2129 -CVE-2008-0923 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-0923 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-0923 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-0923 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-0927 - https://www.exploit-db.com/exploits/5547 -CVE-2008-0928 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706 -CVE-2008-0934 - https://www.exploit-db.com/exploits/5172 -CVE-2008-0939 - https://www.exploit-db.com/exploits/5135 -CVE-2008-0944 - http://aluigi.altervista.org/adv/ipsimene-adv.txt -CVE-2008-0944 - http://securityreason.com/securityalert/3697 -CVE-2008-0945 - http://aluigi.altervista.org/adv/ipsimene-adv.txt -CVE-2008-0945 - http://aluigi.org/poc/ipsimene.zip -CVE-2008-0945 - http://securityreason.com/securityalert/3697 -CVE-2008-0946 - http://aluigi.altervista.org/adv/ipsimene-adv.txt -CVE-2008-0946 - http://aluigi.org/poc/ipsimene.zip -CVE-2008-0946 - http://securityreason.com/securityalert/3697 -CVE-2008-0947 - http://securityreason.com/securityalert/3752 -CVE-2008-0947 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt -CVE-2008-0948 - http://securityreason.com/securityalert/3752 -CVE-2008-0948 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt -CVE-2008-0948 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-0948 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9209 -CVE-2008-0951 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038 -CVE-2008-0955 - https://www.exploit-db.com/exploits/5681 -CVE-2008-0960 - http://securityreason.com/securityalert/3933 -CVE-2008-0960 - http://www.ubuntu.com/usn/usn-685-1 -CVE-2008-0960 - https://bugzilla.redhat.com/show_bug.cgi?id=447974 -CVE-2008-0960 - https://www.exploit-db.com/exploits/5790 -CVE-2008-0964 - https://www.exploit-db.com/exploits/6328 -CVE-2008-0967 - http://securityreason.com/securityalert/3922 -CVE-2008-0967 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-0971 - http://securityreason.com/securityalert/4792 -CVE-2008-0973 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0973 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0973 - http://securityreason.com/securityalert/3698 -CVE-2008-0974 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0974 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0974 - http://securityreason.com/securityalert/3698 -CVE-2008-0975 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0975 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0975 - http://securityreason.com/securityalert/3698 -CVE-2008-0976 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0976 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0976 - http://securityreason.com/securityalert/3698 -CVE-2008-0977 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0977 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0977 - http://securityreason.com/securityalert/3698 -CVE-2008-0978 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0978 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0978 - http://securityreason.com/securityalert/3698 -CVE-2008-0979 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt -CVE-2008-0979 - http://aluigi.org/poc/doubletakedown.zip -CVE-2008-0979 - http://securityreason.com/securityalert/3698 -CVE-2008-0980 - http://securityreason.com/securityalert/3699 -CVE-2008-0981 - http://securityreason.com/securityalert/3699 -CVE-2008-0982 - http://securityreason.com/securityalert/3699 -CVE-2008-0985 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2008-0986 - http://www.coresecurity.com/?action=item&id=2148 -CVE-2008-10001 - http://seclists.org/bugtraq/2008/Sep/0157.html -CVE-2008-1038 - https://www.exploit-db.com/exploits/5189 -CVE-2008-1039 - https://www.exploit-db.com/exploits/5185 -CVE-2008-1041 - http://www.packetstormsecurity.org/0802-exploits/mattswhois-xss.txt -CVE-2008-1042 - https://www.exploit-db.com/exploits/5183 -CVE-2008-1043 - https://www.exploit-db.com/exploits/5180 -CVE-2008-1044 - https://www.exploit-db.com/exploits/5190 -CVE-2008-1046 - https://www.exploit-db.com/exploits/5176 -CVE-2008-1051 - https://www.exploit-db.com/exploits/5175 -CVE-2008-1052 - http://aluigi.altervista.org/adv/surgeftpizza-adv.txt -CVE-2008-1052 - http://securityreason.com/securityalert/3704 -CVE-2008-1053 - https://www.exploit-db.com/exploits/5186 -CVE-2008-1054 - http://aluigi.altervista.org/adv/surgemailz-adv.txt -CVE-2008-1054 - http://securityreason.com/securityalert/3705 -CVE-2008-1055 - http://aluigi.altervista.org/adv/surgemailz-adv.txt -CVE-2008-1055 - http://securityreason.com/securityalert/3705 -CVE-2008-1059 - http://securityreason.com/securityalert/3706 -CVE-2008-1059 - https://www.exploit-db.com/exploits/5194 -CVE-2008-1060 - http://securityreason.com/securityalert/3706 -CVE-2008-1060 - https://www.exploit-db.com/exploits/5194 -CVE-2008-1061 - http://securityreason.com/securityalert/3706 -CVE-2008-1061 - https://www.exploit-db.com/exploits/5194 -CVE-2008-1067 - https://www.exploit-db.com/exploits/5173 -CVE-2008-1068 - https://www.exploit-db.com/exploits/5182 -CVE-2008-1069 - https://www.exploit-db.com/exploits/5174 -CVE-2008-1074 - https://www.exploit-db.com/exploits/5197 -CVE-2008-1077 - https://www.exploit-db.com/exploits/5195 -CVE-2008-1083 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 -CVE-2008-1083 - https://www.exploit-db.com/exploits/5442 -CVE-2008-1083 - https://www.exploit-db.com/exploits/6330 -CVE-2008-1084 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-025 -CVE-2008-1084 - https://www.exploit-db.com/exploits/5518 -CVE-2008-1085 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-024 -CVE-2008-1086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023 -CVE-2008-1087 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 -CVE-2008-1087 - https://www.exploit-db.com/exploits/5442 -CVE-2008-1087 - https://www.exploit-db.com/exploits/6656 -CVE-2008-1088 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-018 -CVE-2008-1089 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019 -CVE-2008-1090 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019 -CVE-2008-1091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 -CVE-2008-1093 - http://securityreason.com/securityalert/4268 -CVE-2008-1094 - http://securityreason.com/securityalert/4793 -CVE-2008-1094 - https://www.exploit-db.com/exploits/7496 -CVE-2008-1105 - https://www.exploit-db.com/exploits/5712 -CVE-2008-1106 - http://securityreason.com/securityalert/3930 -CVE-2008-1110 - http://bugs.gentoo.org/show_bug.cgi?id=208100 -CVE-2008-1110 - https://www.exploit-db.com/exploits/1641 -CVE-2008-1116 - https://www.exploit-db.com/exploits/5188 -CVE-2008-1117 - http://aluigi.altervista.org/adv/timbuto-adv.txt -CVE-2008-1117 - http://aluigi.org/poc/timbuto.zip -CVE-2008-1117 - http://securityreason.com/securityalert/3741 -CVE-2008-1117 - https://www.exploit-db.com/exploits/4455 -CVE-2008-1117 - https://www.exploit-db.com/exploits/5238 -CVE-2008-1118 - https://www.exploit-db.com/exploits/5238 -CVE-2008-1119 - https://www.exploit-db.com/exploits/5204 -CVE-2008-1121 - https://www.exploit-db.com/exploits/5196 -CVE-2008-1122 - https://www.exploit-db.com/exploits/5198 -CVE-2008-1122 - https://www.exploit-db.com/exploits/5447 -CVE-2008-1123 - https://www.exploit-db.com/exploits/5199 -CVE-2008-1124 - https://www.exploit-db.com/exploits/5200 -CVE-2008-1125 - https://www.exploit-db.com/exploits/5200 -CVE-2008-1126 - https://www.exploit-db.com/exploits/5202 -CVE-2008-1127 - https://www.exploit-db.com/exploits/5201 -CVE-2008-1136 - http://securityreason.com/securityalert/3710 -CVE-2008-1136 - http://www.coresecurity.com/?action=item&id=2070 -CVE-2008-1137 - https://www.exploit-db.com/exploits/5178 -CVE-2008-1138 - https://www.exploit-db.com/exploits/5142 -CVE-2008-1139 - https://www.exploit-db.com/exploits/5143 -CVE-2008-1140 - https://www.exploit-db.com/exploits/5144 -CVE-2008-1141 - https://www.exploit-db.com/exploits/5141 -CVE-2008-1144 - http://securityreason.com/securityalert/4227 -CVE-2008-1145 - https://www.exploit-db.com/exploits/5215 -CVE-2008-1156 - http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml -CVE-2008-1160 - http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf -CVE-2008-1160 - https://www.exploit-db.com/exploits/5289 -CVE-2008-1162 - https://www.exploit-db.com/exploits/5211 -CVE-2008-1163 - https://www.exploit-db.com/exploits/5208 -CVE-2008-1164 - https://www.exploit-db.com/exploits/5209 -CVE-2008-1176 - https://www.exploit-db.com/exploits/5114 -CVE-2008-1177 - https://www.exploit-db.com/exploits/5114 -CVE-2008-1180 - http://securityreason.com/securityalert/3720 -CVE-2008-1181 - http://securityreason.com/securityalert/3719 -CVE-2008-1185 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9672 -CVE-2008-1186 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9585 -CVE-2008-1189 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9582 -CVE-2008-1190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9914 -CVE-2008-1194 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9542 -CVE-2008-1195 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1195 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486 -CVE-2008-1197 - http://securityreason.com/securityalert/4215 -CVE-2008-1218 - https://www.exploit-db.com/exploits/5257 -CVE-2008-1229 - https://www.exploit-db.com/exploits/5112 -CVE-2008-1230 - https://www.exploit-db.com/exploits/5112 -CVE-2008-1231 - https://www.exploit-db.com/exploits/5112 -CVE-2008-1232 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx -CVE-2008-1232 - http://securityreason.com/securityalert/4098 -CVE-2008-1232 - http://www.redhat.com/support/errata/RHSA-2008-0862.html -CVE-2008-1232 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-1233 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1234 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551 -CVE-2008-1235 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1236 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1237 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1237 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9651 -CVE-2008-1238 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1238 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9889 -CVE-2008-1240 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1241 - http://www.ubuntu.com/usn/usn-592-1 -CVE-2008-1247 - https://www.exploit-db.com/exploits/5313 -CVE-2008-1247 - https://www.exploit-db.com/exploits/5926 -CVE-2008-1272 - https://www.exploit-db.com/exploits/5223 -CVE-2008-1275 - https://www.exploit-db.com/exploits/5235 -CVE-2008-1276 - http://aluigi.altervista.org/adv/maildisable-adv.txt -CVE-2008-1276 - http://securityreason.com/securityalert/3724 -CVE-2008-1276 - https://www.exploit-db.com/exploits/5249 -CVE-2008-1277 - http://aluigi.altervista.org/adv/maildisable-adv.txt -CVE-2008-1277 - http://securityreason.com/securityalert/3724 -CVE-2008-1278 - http://aluigi.altervista.org/adv/remotelynowhere-adv.txt -CVE-2008-1279 - http://aluigi.altervista.org/adv/acrogroup-adv.txt -CVE-2008-1280 - http://aluigi.altervista.org/adv/acroagent-adv.txt -CVE-2008-1281 - https://www.exploit-db.com/exploits/5230 -CVE-2008-1283 - http://securityreason.com/securityalert/3725 -CVE-2008-1284 - http://securityreason.com/securityalert/3726 -CVE-2008-1295 - https://www.exploit-db.com/exploits/5231 -CVE-2008-1297 - https://www.exploit-db.com/exploits/5226 -CVE-2008-1302 - http://aluigi.altervista.org/adv/perforces-adv.txt -CVE-2008-1302 - http://aluigi.org/poc/perforces.zip -CVE-2008-1302 - http://securityreason.com/securityalert/3735 -CVE-2008-1303 - http://aluigi.altervista.org/adv/perforces-adv.txt -CVE-2008-1303 - http://aluigi.org/poc/perforces.zip -CVE-2008-1303 - http://securityreason.com/securityalert/3735 -CVE-2008-1305 - https://www.exploit-db.com/exploits/5236 -CVE-2008-1307 - https://www.exploit-db.com/exploits/5225 -CVE-2008-1309 - https://www.exploit-db.com/exploits/5332 -CVE-2008-1313 - https://www.exploit-db.com/exploits/5234 -CVE-2008-1316 - https://www.exploit-db.com/exploits/5240 -CVE-2008-1318 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES -CVE-2008-1319 - http://aluigi.altervista.org/adv/versantcmd-adv.txt -CVE-2008-1319 - http://marc.info/?l=bugtraq&m=120468784112145&w=2 -CVE-2008-1319 - http://securityreason.com/securityalert/3738 -CVE-2008-1319 - https://www.exploit-db.com/exploits/5213 -CVE-2008-1320 - http://aluigi.altervista.org/adv/asgulo-adv.txt -CVE-2008-1320 - http://securityreason.com/securityalert/3737 -CVE-2008-1320 - https://www.exploit-db.com/exploits/5229 -CVE-2008-1321 - http://aluigi.altervista.org/adv/asgulo-adv.txt -CVE-2008-1321 - http://securityreason.com/securityalert/3737 -CVE-2008-1321 - https://www.exploit-db.com/exploits/5229 -CVE-2008-1322 - http://aluigi.altervista.org/adv/asgulo-adv.txt -CVE-2008-1322 - http://securityreason.com/securityalert/3737 -CVE-2008-1322 - https://www.exploit-db.com/exploits/5229 -CVE-2008-1331 - https://www.exploit-db.com/exploits/5662 -CVE-2008-1336 - https://www.exploit-db.com/exploits/5206 -CVE-2008-1336 - https://www.exploit-db.com/exploits/5447 -CVE-2008-1337 - http://aluigi.altervista.org/adv/timbuto-adv.txt -CVE-2008-1337 - http://aluigi.org/poc/timbuto.zip -CVE-2008-1337 - http://securityreason.com/securityalert/3741 -CVE-2008-1338 - http://aluigi.altervista.org/adv/perforces-adv.txt -CVE-2008-1338 - http://aluigi.org/poc/perforces.zip -CVE-2008-1338 - http://securityreason.com/securityalert/3735 -CVE-2008-1340 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1340 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1344 - https://www.exploit-db.com/exploits/5246 -CVE-2008-1345 - https://www.exploit-db.com/exploits/5246 -CVE-2008-1346 - https://www.exploit-db.com/exploits/5247 -CVE-2008-1347 - https://www.exploit-db.com/exploits/5247 -CVE-2008-1349 - http://packetstormsecurity.org/0804-exploits/runcms11a-sql.txt -CVE-2008-1349 - https://www.exploit-db.com/exploits/5244 -CVE-2008-1349 - https://www.exploit-db.com/exploits/5340 -CVE-2008-1350 - https://www.exploit-db.com/exploits/5243 -CVE-2008-1351 - https://www.exploit-db.com/exploits/5245 -CVE-2008-1352 - http://securityreason.com/securityalert/3746 -CVE-2008-1354 - http://marc.info/?l=bugtraq&m=120545152114985&w=2 -CVE-2008-1357 - http://aluigi.altervista.org/adv/meccaffi-adv.txt -CVE-2008-1357 - http://securityreason.com/securityalert/3748 -CVE-2008-1358 - https://www.exploit-db.com/exploits/5248 -CVE-2008-1361 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1361 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1361 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1361 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1361 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1362 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1362 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1362 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1362 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1362 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1363 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1363 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1363 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1363 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1363 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1364 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1364 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1364 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1365 - http://aluigi.altervista.org/adv/officescaz-adv.txt -CVE-2008-1366 - http://aluigi.altervista.org/adv/officescaz-adv.txt -CVE-2008-1374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9636 -CVE-2008-1392 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1392 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1398 - https://www.exploit-db.com/exploits/5256 -CVE-2008-1400 - https://www.exploit-db.com/exploits/5269 -CVE-2008-1401 - https://www.exploit-db.com/exploits/5269 -CVE-2008-1402 - https://www.exploit-db.com/exploits/5269 -CVE-2008-1404 - https://www.exploit-db.com/exploits/5254 -CVE-2008-1405 - https://www.exploit-db.com/exploits/5260 -CVE-2008-1406 - https://www.exploit-db.com/exploits/5252 -CVE-2008-1407 - https://www.exploit-db.com/exploits/5255 -CVE-2008-1408 - https://www.exploit-db.com/exploits/5263 -CVE-2008-1409 - https://www.exploit-db.com/exploits/5265 -CVE-2008-1410 - https://www.exploit-db.com/exploits/5228 -CVE-2008-1411 - https://www.exploit-db.com/exploits/5228 -CVE-2008-1413 - http://securityreason.com/securityalert/3757 -CVE-2008-1414 - https://www.exploit-db.com/exploits/5262 -CVE-2008-1415 - https://www.exploit-db.com/exploits/5262 -CVE-2008-1416 - https://www.exploit-db.com/exploits/5266 -CVE-2008-1420 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9500 -CVE-2008-1423 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9851 -CVE-2008-1425 - https://www.exploit-db.com/exploits/5275 -CVE-2008-1426 - https://www.exploit-db.com/exploits/5274 -CVE-2008-1427 - https://www.exploit-db.com/exploits/5273 -CVE-2008-1430 - https://www.exploit-db.com/exploits/5276 -CVE-2008-1434 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 -CVE-2008-1435 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038 -CVE-2008-1436 - http://isc.sans.org/diary.html?storyid=4306 -CVE-2008-1436 - http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html -CVE-2008-1436 - https://www.exploit-db.com/exploits/6705 -CVE-2008-1437 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 -CVE-2008-1438 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 -CVE-2008-1440 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 -CVE-2008-1441 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 -CVE-2008-1442 - http://securityreason.com/securityalert/3934 -CVE-2008-1442 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031 -CVE-2008-1444 - http://securityreason.com/securityalert/3937 -CVE-2008-1444 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 -CVE-2008-1445 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035 -CVE-2008-1446 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 -CVE-2008-1447 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-1447 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 -CVE-2008-1447 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627 -CVE-2008-1447 - https://www.exploit-db.com/exploits/6122 -CVE-2008-1447 - https://www.exploit-db.com/exploits/6123 -CVE-2008-1447 - https://www.exploit-db.com/exploits/6130 -CVE-2008-1448 - http://www.coresecurity.com/content/internet-explorer-zone-elevation -CVE-2008-1448 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-048 -CVE-2008-1451 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-034 -CVE-2008-1453 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030 -CVE-2008-1454 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 -CVE-2008-1455 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 -CVE-2008-1456 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 -CVE-2008-1457 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 -CVE-2008-1459 - https://www.exploit-db.com/exploits/5278 -CVE-2008-1460 - https://www.exploit-db.com/exploits/5277 -CVE-2008-1461 - http://securityreason.com/securityalert/3761 -CVE-2008-1462 - https://www.exploit-db.com/exploits/5285 -CVE-2008-1465 - https://www.exploit-db.com/exploits/5280 -CVE-2008-1467 - https://www.exploit-db.com/exploits/5283 -CVE-2008-1472 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx -CVE-2008-1472 - https://www.exploit-db.com/exploits/5264 -CVE-2008-1477 - http://securityreason.com/securityalert/3767 -CVE-2008-1478 - https://www.exploit-db.com/exploits/5270 -CVE-2008-1480 - https://www.exploit-db.com/exploits/5258 -CVE-2008-1482 - http://aluigi.altervista.org/adv/xinehof-adv.txt -CVE-2008-1482 - http://aluigi.org/poc/xinehof.zip -CVE-2008-1482 - http://securityreason.com/securityalert/3769 -CVE-2008-1484 - https://www.exploit-db.com/exploits/5165 -CVE-2008-1488 - http://pecl.php.net/bugs/bug.php?id=13415 -CVE-2008-1491 - http://aluigi.altervista.org/adv/asuxdpc-adv.txt -CVE-2008-1491 - http://securityreason.com/securityalert/3771 -CVE-2008-1491 - https://www.exploit-db.com/exploits/5694 -CVE-2008-1492 - http://securityreason.com/securityalert/3772 -CVE-2008-1492 - https://www.exploit-db.com/exploits/5288 -CVE-2008-1493 - https://www.exploit-db.com/exploits/5296 -CVE-2008-1495 - https://www.exploit-db.com/exploits/5281 -CVE-2008-1496 - https://www.exploit-db.com/exploits/5281 -CVE-2008-1498 - https://www.exploit-db.com/exploits/5259 -CVE-2008-1501 - https://www.exploit-db.com/exploits/5306 -CVE-2008-1505 - https://www.exploit-db.com/exploits/5294 -CVE-2008-1506 - https://www.exploit-db.com/exploits/5281 -CVE-2008-1507 - https://www.exploit-db.com/exploits/5281 -CVE-2008-1509 - https://www.exploit-db.com/exploits/5293 -CVE-2008-1512 - https://www.exploit-db.com/exploits/5301 -CVE-2008-1513 - https://www.exploit-db.com/exploits/5239 -CVE-2008-1514 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9555 -CVE-2008-1534 - https://www.exploit-db.com/exploits/5303 -CVE-2008-1535 - https://www.exploit-db.com/exploits/5297 -CVE-2008-1537 - https://www.exploit-db.com/exploits/5302 -CVE-2008-1539 - https://www.exploit-db.com/exploits/5295 -CVE-2008-1541 - https://www.exploit-db.com/exploits/5304 -CVE-2008-1544 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031 -CVE-2008-1545 - http://securityreason.com/securityalert/3786 -CVE-2008-1545 - http://www.mindedsecurity.com/MSA01240108.html -CVE-2008-1546 - http://securityreason.com/securityalert/3794 -CVE-2008-1547 - http://securityreason.com/securityalert/4441 -CVE-2008-1551 - https://www.exploit-db.com/exploits/5290 -CVE-2008-1552 - http://securityreason.com/securityalert/3795 -CVE-2008-1553 - https://www.exploit-db.com/exploits/5312 -CVE-2008-1554 - https://www.exploit-db.com/exploits/5311 -CVE-2008-1555 - https://www.exploit-db.com/exploits/5309 -CVE-2008-1556 - https://www.exploit-db.com/exploits/5309 -CVE-2008-1557 - https://www.exploit-db.com/exploits/5309 -CVE-2008-1558 - https://www.exploit-db.com/exploits/5307 -CVE-2008-1559 - https://www.exploit-db.com/exploits/5310 -CVE-2008-1561 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9315 -CVE-2008-1562 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9318 -CVE-2008-1569 - https://bugs.gentoo.org/show_bug.cgi?id=214403 -CVE-2008-1570 - https://bugs.gentoo.org/show_bug.cgi?id=214403 -CVE-2008-1591 - https://www.exploit-db.com/exploits/5292 -CVE-2008-1602 - http://securityreason.com/securityalert/3798 -CVE-2008-1608 - https://www.exploit-db.com/exploits/5502 -CVE-2008-1609 - https://www.exploit-db.com/exploits/2474/ -CVE-2008-1609 - https://www.exploit-db.com/exploits/5317 -CVE-2008-1610 - http://www.offensive-security.com/0day/quick-tftp-poc.py.txt -CVE-2008-1610 - https://www.exploit-db.com/exploits/5315 -CVE-2008-1611 - https://www.exploit-db.com/exploits/5314 -CVE-2008-1613 - https://www.exploit-db.com/exploits/5482 -CVE-2008-1615 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9563 -CVE-2008-1623 - https://www.exploit-db.com/exploits/5322 -CVE-2008-1624 - https://www.exploit-db.com/exploits/5325 -CVE-2008-1635 - https://www.exploit-db.com/exploits/5324 -CVE-2008-1639 - https://www.exploit-db.com/exploits/5331 -CVE-2008-1640 - https://www.exploit-db.com/exploits/5329 -CVE-2008-1645 - https://www.exploit-db.com/exploits/5328 -CVE-2008-1646 - https://www.exploit-db.com/exploits/5326 -CVE-2008-1647 - https://www.exploit-db.com/exploits/5338 -CVE-2008-1649 - https://www.exploit-db.com/exploits/5333 -CVE-2008-1650 - https://www.exploit-db.com/exploits/5333 -CVE-2008-1651 - https://www.exploit-db.com/exploits/5333 -CVE-2008-1654 - http://www.gnucitizen.org/blog/hacking-the-interwebs/ -CVE-2008-1657 - http://www.ubuntu.com/usn/usn-649-1 -CVE-2008-1663 - http://securityreason.com/securityalert/3979 -CVE-2008-1667 - http://securityreason.com/securityalert/4054 -CVE-2008-1678 - http://securityreason.com/securityalert/3981 -CVE-2008-1678 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9754 -CVE-2008-1679 - http://bugs.python.org/issue1179 -CVE-2008-1680 - https://www.exploit-db.com/exploits/5295 -CVE-2008-1682 - https://www.exploit-db.com/exploits/5345 -CVE-2008-1689 - http://aluigi.altervista.org/adv/slmaildos-adv.txt -CVE-2008-1689 - http://aluigi.org/poc/slmaildos.zip -CVE-2008-1690 - http://aluigi.org/poc/slmaildos.zip -CVE-2008-1691 - http://aluigi.altervista.org/adv/slmaildos-adv.txt -CVE-2008-1696 - https://www.exploit-db.com/exploits/5347 -CVE-2008-1697 - https://www.exploit-db.com/exploits/5342 -CVE-2008-1702 - https://www.exploit-db.com/exploits/5308 -CVE-2008-1705 - http://aluigi.altervista.org/adv/soliduro-adv.txt -CVE-2008-1705 - http://aluigi.org/poc/soliduro.zip -CVE-2008-1706 - http://aluigi.altervista.org/adv/soliduro-adv.txt -CVE-2008-1706 - http://aluigi.org/poc/soliduro.zip -CVE-2008-1707 - http://aluigi.altervista.org/adv/soliduro-adv.txt -CVE-2008-1707 - http://aluigi.org/poc/soliduro.zip -CVE-2008-1708 - http://aluigi.altervista.org/adv/soliduro-adv.txt -CVE-2008-1708 - http://aluigi.org/poc/soliduro.zip -CVE-2008-1709 - https://www.exploit-db.com/exploits/5349 -CVE-2008-1711 - https://www.exploit-db.com/exploits/5364 -CVE-2008-1712 - https://www.exploit-db.com/exploits/5323 -CVE-2008-1713 - https://www.exploit-db.com/exploits/5341 -CVE-2008-1714 - https://www.exploit-db.com/exploits/5334 -CVE-2008-1715 - https://www.exploit-db.com/exploits/5319 -CVE-2008-1721 - http://securityreason.com/securityalert/3802 -CVE-2008-1721 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-1721 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9407 -CVE-2008-1724 - https://www.exploit-db.com/exploits/5398 -CVE-2008-1725 - https://www.exploit-db.com/exploits/5416 -CVE-2008-1726 - https://www.exploit-db.com/exploits/5421 -CVE-2008-1727 - https://www.exploit-db.com/exploits/5418 -CVE-2008-1728 - http://www.igniterealtime.org/issues/browse/JM-1289 -CVE-2008-1730 - https://www.exploit-db.com/exploits/5419 -CVE-2008-1732 - https://www.exploit-db.com/exploits/5410 -CVE-2008-1735 - http://securityreason.com/securityalert/3838 -CVE-2008-1735 - http://www.coresecurity.com/?action=item&id=2249 -CVE-2008-1736 - http://securityreason.com/securityalert/3838 -CVE-2008-1736 - http://www.coresecurity.com/?action=item&id=2249 -CVE-2008-1737 - http://securityreason.com/securityalert/3838 -CVE-2008-1737 - http://www.coresecurity.com/?action=item&id=2249 -CVE-2008-1738 - http://securityreason.com/securityalert/3838 -CVE-2008-1738 - http://www.coresecurity.com/?action=item&id=2249 -CVE-2008-1750 - https://www.exploit-db.com/exploits/5422 -CVE-2008-1751 - https://www.exploit-db.com/exploits/5423 -CVE-2008-1755 - https://www.exploit-db.com/exploits/5420 -CVE-2008-1758 - https://www.exploit-db.com/exploits/5353 -CVE-2008-1759 - https://www.exploit-db.com/exploits/5352 -CVE-2008-1760 - https://www.exploit-db.com/exploits/5365 -CVE-2008-1763 - https://www.exploit-db.com/exploits/5368 -CVE-2008-1765 - https://www.exploit-db.com/exploits/5479 -CVE-2008-1767 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785 -CVE-2008-1770 - https://www.exploit-db.com/exploits/5741 -CVE-2008-1771 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476241 -CVE-2008-1772 - https://www.exploit-db.com/exploits/5402 -CVE-2008-1773 - https://www.exploit-db.com/exploits/5393 -CVE-2008-1774 - https://www.exploit-db.com/exploits/5406 -CVE-2008-1776 - https://www.exploit-db.com/exploits/5348 -CVE-2008-1782 - https://www.exploit-db.com/exploits/5399 -CVE-2008-1783 - https://www.exploit-db.com/exploits/5387 -CVE-2008-1784 - https://www.exploit-db.com/exploits/5388 -CVE-2008-1785 - https://www.exploit-db.com/exploits/5384 -CVE-2008-1786 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx -CVE-2008-1788 - https://www.exploit-db.com/exploits/5371 -CVE-2008-1789 - https://www.exploit-db.com/exploits/5385 -CVE-2008-1790 - https://www.exploit-db.com/exploits/5402 -CVE-2008-1791 - https://www.exploit-db.com/exploits/5401 -CVE-2008-1795 - http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/ -CVE-2008-1795 - http://securityreason.com/securityalert/3810 -CVE-2008-1797 - http://securityreason.com/securityalert/3811 -CVE-2008-1798 - https://www.exploit-db.com/exploits/5369 -CVE-2008-1799 - https://www.exploit-db.com/exploits/5360 -CVE-2008-1801 - https://www.exploit-db.com/exploits/5561 -CVE-2008-1802 - https://www.exploit-db.com/exploits/5585 -CVE-2008-1803 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800 -CVE-2008-1806 - http://www.ubuntu.com/usn/usn-643-1 -CVE-2008-1806 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-1806 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1806 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1806 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1806 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1806 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1806 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321 -CVE-2008-1807 - http://www.ubuntu.com/usn/usn-643-1 -CVE-2008-1807 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-1807 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1807 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1807 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1807 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1807 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767 -CVE-2008-1808 - http://www.ubuntu.com/usn/usn-643-1 -CVE-2008-1808 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-1808 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-1808 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-1808 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-1808 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-1808 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-1838 - https://www.exploit-db.com/exploits/5444 -CVE-2008-1840 - http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=592069 -CVE-2008-1841 - http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=592069 -CVE-2008-1842 - http://aluigi.altervista.org/adv/closedview-adv.txt -CVE-2008-1842 - http://aluigi.org/poc/closedview.zip -CVE-2008-1843 - http://marc.info/?l=bugtraq&m=120792465631586&w=2 -CVE-2008-1844 - http://marc.info/?l=bugtraq&m=120792465631586&w=2 -CVE-2008-1847 - https://www.exploit-db.com/exploits/5432 -CVE-2008-1848 - https://www.exploit-db.com/exploits/5431 -CVE-2008-1849 - https://www.exploit-db.com/exploits/5431 -CVE-2008-1851 - http://aluigi.altervista.org/adv/closedviewx-adv.txt -CVE-2008-1852 - http://aluigi.altervista.org/adv/closedviewx-adv.txt -CVE-2008-1853 - http://aluigi.altervista.org/adv/closedviewx-adv.txt -CVE-2008-1855 - https://www.exploit-db.com/exploits/5343 -CVE-2008-1856 - https://www.exploit-db.com/exploits/5392 -CVE-2008-1857 - https://www.exploit-db.com/exploits/5394 -CVE-2008-1858 - https://www.exploit-db.com/exploits/5400 -CVE-2008-1859 - https://www.exploit-db.com/exploits/5402 -CVE-2008-1860 - https://www.exploit-db.com/exploits/5408 -CVE-2008-1861 - https://www.exploit-db.com/exploits/5405 -CVE-2008-1862 - https://www.exploit-db.com/exploits/5405 -CVE-2008-1863 - https://www.exploit-db.com/exploits/5389 -CVE-2008-1864 - https://www.exploit-db.com/exploits/5390 -CVE-2008-1866 - https://www.exploit-db.com/exploits/5381 -CVE-2008-1867 - https://www.exploit-db.com/exploits/5382 -CVE-2008-1868 - https://www.exploit-db.com/exploits/5380 -CVE-2008-1869 - https://www.exploit-db.com/exploits/5383 -CVE-2008-1870 - https://www.exploit-db.com/exploits/5367 -CVE-2008-1871 - https://www.exploit-db.com/exploits/5377 -CVE-2008-1872 - https://www.exploit-db.com/exploits/5362 -CVE-2008-1874 - https://www.exploit-db.com/exploits/5358 -CVE-2008-1875 - https://www.exploit-db.com/exploits/5364 -CVE-2008-1876 - https://www.exploit-db.com/exploits/5375 -CVE-2008-1878 - https://www.exploit-db.com/exploits/5458 -CVE-2008-1881 - http://aluigi.altervista.org/adv/vlcboffs-adv.txt -CVE-2008-1881 - http://aluigi.org/adv/vlcboffs-adv.txt -CVE-2008-1881 - https://www.exploit-db.com/exploits/5250 -CVE-2008-1883 - http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/ -CVE-2008-1883 - http://securityreason.com/securityalert/3810 -CVE-2008-1885 - http://seclists.org/bugtraq/2008/Apr/0065.html -CVE-2008-1885 - https://www.exploit-db.com/exploits/5397 -CVE-2008-1886 - http://seclists.org/bugtraq/2008/Apr/0065.html -CVE-2008-1886 - https://www.exploit-db.com/exploits/5397 -CVE-2008-1887 - http://bugs.python.org/issue2587 -CVE-2008-1887 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-1889 - https://www.exploit-db.com/exploits/5457 -CVE-2008-1895 - https://www.exploit-db.com/exploits/5456 -CVE-2008-1896 - https://www.exploit-db.com/exploits/5456 -CVE-2008-1898 - https://www.exploit-db.com/exploits/5460 -CVE-2008-1898 - https://www.exploit-db.com/exploits/5530 -CVE-2008-1903 - https://www.exploit-db.com/exploits/5429 -CVE-2008-1904 - https://www.exploit-db.com/exploits/5433 -CVE-2008-1906 - https://www.exploit-db.com/exploits/5437 -CVE-2008-1907 - https://www.exploit-db.com/exploits/5437 -CVE-2008-1908 - https://www.exploit-db.com/exploits/5437 -CVE-2008-1909 - https://www.exploit-db.com/exploits/5428 -CVE-2008-1910 - https://www.exploit-db.com/exploits/5427 -CVE-2008-1911 - https://www.exploit-db.com/exploits/5434 -CVE-2008-1912 - https://www.exploit-db.com/exploits/5453 -CVE-2008-1912 - https://www.exploit-db.com/exploits/5492 -CVE-2008-1913 - https://www.exploit-db.com/exploits/5454 -CVE-2008-1914 - https://www.exploit-db.com/exploits/5451 -CVE-2008-1915 - https://www.exploit-db.com/exploits/5480 -CVE-2008-1918 - https://www.exploit-db.com/exploits/5470 -CVE-2008-1918 - https://www.exploit-db.com/exploits/7576 -CVE-2008-1919 - https://www.exploit-db.com/exploits/5471 -CVE-2008-1921 - https://www.exploit-db.com/exploits/5464 -CVE-2008-1926 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9833 -CVE-2008-1927 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792 -CVE-2008-1927 - http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156 -CVE-2008-1933 - https://www.exploit-db.com/exploits/5489 -CVE-2008-1934 - https://www.exploit-db.com/exploits/5481 -CVE-2008-1935 - https://www.exploit-db.com/exploits/5488 -CVE-2008-1936 - https://www.exploit-db.com/exploits/5450 -CVE-2008-1939 - https://www.exploit-db.com/exploits/5475 -CVE-2008-1945 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905 -CVE-2008-1947 - http://www.redhat.com/support/errata/RHSA-2008-0862.html -CVE-2008-1947 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-1948 - http://securityreason.com/securityalert/3902 -CVE-2008-1949 - http://securityreason.com/securityalert/3902 -CVE-2008-1949 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519 -CVE-2008-1950 - http://securityreason.com/securityalert/3902 -CVE-2008-1951 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635 -CVE-2008-1954 - https://www.exploit-db.com/exploits/5485 -CVE-2008-1957 - https://www.exploit-db.com/exploits/5483 -CVE-2008-1958 - https://www.exploit-db.com/exploits/5483 -CVE-2008-1961 - https://www.exploit-db.com/exploits/5469 -CVE-2008-1962 - https://www.exploit-db.com/exploits/5474 -CVE-2008-1963 - https://www.exploit-db.com/exploits/5463 -CVE-2008-1965 - http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability -CVE-2008-1968 - http://securityreason.com/securityalert/3830 -CVE-2008-1971 - https://www.exploit-db.com/exploits/5467 -CVE-2008-1973 - https://www.exploit-db.com/exploits/5472 -CVE-2008-1974 - http://securityreason.com/securityalert/3831 -CVE-2008-1975 - https://www.exploit-db.com/exploits/5487 -CVE-2008-1979 - http://aluigi.altervista.org/adv/carcbackazz-adv.txt -CVE-2008-1982 - https://www.exploit-db.com/exploits/5486 -CVE-2008-1984 - http://aluigi.altervista.org/adv/ecsqdamn-adv.txt -CVE-2008-1989 - https://www.exploit-db.com/exploits/5459 -CVE-2008-1990 - http://securityreason.com/securityalert/3842 -CVE-2008-1990 - https://www.exploit-db.com/exploits/5478 -CVE-2008-1991 - http://securityreason.com/securityalert/3842 -CVE-2008-1991 - https://www.exploit-db.com/exploits/5478 -CVE-2008-1992 - http://securityreason.com/securityalert/3842 -CVE-2008-1992 - https://www.exploit-db.com/exploits/5478 -CVE-2008-1993 - http://securityreason.com/securityalert/3842 -CVE-2008-1993 - https://www.exploit-db.com/exploits/5478 -CVE-2008-1999 - http://securityreason.com/securityalert/3833 -CVE-2008-2000 - http://securityreason.com/securityalert/3833 -CVE-2008-2001 - http://securityreason.com/securityalert/3833 -CVE-2008-2002 - http://securityreason.com/securityalert/3839 -CVE-2008-2003 - http://securityreason.com/securityalert/3832 -CVE-2008-2005 - https://www.exploit-db.com/exploits/6474 -CVE-2008-2006 - http://securityreason.com/securityalert/3901 -CVE-2008-2012 - https://www.exploit-db.com/exploits/5495 -CVE-2008-2013 - https://www.exploit-db.com/exploits/5500 -CVE-2008-2014 - http://securityreason.com/securityalert/3835 -CVE-2008-2015 - https://www.exploit-db.com/exploits/5496 -CVE-2008-2016 - http://securityreason.com/securityalert/3837 -CVE-2008-2017 - http://securityreason.com/securityalert/3837 -CVE-2008-2018 - https://www.exploit-db.com/exploits/5506 -CVE-2008-2019 - http://securityreason.com/securityalert/3836 -CVE-2008-2020 - http://securityreason.com/securityalert/3834 -CVE-2008-2022 - http://www.bugreport.ir/?/37 -CVE-2008-2022 - https://www.exploit-db.com/exploits/5507 -CVE-2008-2023 - http://www.bugreport.ir/?/37 -CVE-2008-2023 - https://www.exploit-db.com/exploits/5507 -CVE-2008-2024 - https://www.exploit-db.com/exploits/5494 -CVE-2008-2026 - http://securityreason.com/securityalert/3848 -CVE-2008-2027 - http://securityreason.com/securityalert/3850 -CVE-2008-2028 - https://www.exploit-db.com/exploits/5494 -CVE-2008-2029 - https://www.exploit-db.com/exploits/5494 -CVE-2008-2036 - https://www.exploit-db.com/exploits/5448 -CVE-2008-2040 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573 -CVE-2008-2040 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680 -CVE-2008-2042 - http://securityreason.com/securityalert/3861 -CVE-2008-2044 - http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47 -CVE-2008-2044 - http://securityreason.com/securityalert/3845 -CVE-2008-2045 - https://www.exploit-db.com/exploits/5521 -CVE-2008-2047 - https://www.exploit-db.com/exploits/5503 -CVE-2008-2048 - https://www.exploit-db.com/exploits/5503 -CVE-2008-2049 - http://vuln.sg/epostmailserver410-en.html -CVE-2008-2051 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2008-2055 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml -CVE-2008-2056 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml -CVE-2008-2057 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml -CVE-2008-2058 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml -CVE-2008-2059 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml -CVE-2008-2063 - https://www.exploit-db.com/exploits/5520 -CVE-2008-2065 - https://www.exploit-db.com/exploits/5508 -CVE-2008-2069 - http://securityreason.com/securityalert/3847 -CVE-2008-2069 - https://www.exploit-db.com/exploits/5515 -CVE-2008-2070 - http://securityreason.com/securityalert/3866 -CVE-2008-2071 - http://securityreason.com/securityalert/3866 -CVE-2008-2072 - https://www.exploit-db.com/exploits/5529 -CVE-2008-2073 - https://www.exploit-db.com/exploits/5529 -CVE-2008-2074 - https://www.exploit-db.com/exploits/5525 -CVE-2008-2076 - https://www.exploit-db.com/exploits/5528 -CVE-2008-2079 - http://bugs.mysql.com/bug.php?id=32167 -CVE-2008-2081 - https://www.exploit-db.com/exploits/5499 -CVE-2008-2082 - https://www.exploit-db.com/exploits/5499 -CVE-2008-2083 - http://securityreason.com/securityalert/3853 -CVE-2008-2083 - https://www.exploit-db.com/exploits/5516 -CVE-2008-2084 - https://www.exploit-db.com/exploits/5505 -CVE-2008-2086 - http://securityreason.com/securityalert/4693 -CVE-2008-2087 - http://securityreason.com/securityalert/3855 -CVE-2008-2087 - https://www.exploit-db.com/exploits/5517 -CVE-2008-2088 - https://www.exploit-db.com/exploits/5504 -CVE-2008-2091 - https://www.exploit-db.com/exploits/5477 -CVE-2008-2093 - https://www.exploit-db.com/exploits/5491 -CVE-2008-2095 - https://www.exploit-db.com/exploits/5484 -CVE-2008-2096 - http://securityreason.com/securityalert/3857 -CVE-2008-2096 - https://www.exploit-db.com/exploits/5546 -CVE-2008-2097 - http://securityreason.com/securityalert/3922 -CVE-2008-2097 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-2100 - http://securityreason.com/securityalert/3922 -CVE-2008-2100 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html -CVE-2008-2101 - http://securityreason.com/securityalert/4202 -CVE-2008-2101 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-2106 - http://aluigi.altervista.org/adv/cod4statz-adv.txt -CVE-2008-2106 - http://securityreason.com/securityalert/3858 -CVE-2008-2107 - http://securityreason.com/securityalert/3859 -CVE-2008-2107 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2008-2108 - http://securityreason.com/securityalert/3859 -CVE-2008-2108 - http://www.redhat.com/support/errata/RHSA-2008-0546.html -CVE-2008-2113 - https://www.exploit-db.com/exploits/5552 -CVE-2008-2114 - https://www.exploit-db.com/exploits/5551 -CVE-2008-2115 - https://www.exploit-db.com/exploits/5549 -CVE-2008-2116 - https://www.exploit-db.com/exploits/5549 -CVE-2008-2119 - https://www.exploit-db.com/exploits/5749 -CVE-2008-2124 - https://www.exploit-db.com/exploits/5553 -CVE-2008-2125 - https://www.exploit-db.com/exploits/5560 -CVE-2008-2127 - https://www.exploit-db.com/exploits/5558 -CVE-2008-2128 - https://www.exploit-db.com/exploits/5558 -CVE-2008-2129 - https://www.exploit-db.com/exploits/5554 -CVE-2008-2131 - http://users.own-hero.net/~decoder/advisories/mvnforum-jsxss.txt -CVE-2008-2132 - https://www.exploit-db.com/exploits/5556 -CVE-2008-2135 - https://www.exploit-db.com/exploits/5559 -CVE-2008-2137 - http://kerneltrap.org/mailarchive/git-commits-head/2008/5/8/1760604 -CVE-2008-2145 - http://securityreason.com/securityalert/3868 -CVE-2008-2146 - http://trac.wordpress.org/ticket/4748 -CVE-2008-2152 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9787 -CVE-2008-2161 - https://www.exploit-db.com/exploits/5563 -CVE-2008-2175 - https://www.exploit-db.com/exploits/5533 -CVE-2008-2177 - https://www.exploit-db.com/exploits/5537 -CVE-2008-2180 - https://www.exploit-db.com/exploits/5538 -CVE-2008-2181 - https://www.exploit-db.com/exploits/5538 -CVE-2008-2183 - https://www.exploit-db.com/exploits/5535 -CVE-2008-2186 - https://www.exploit-db.com/exploits/7532 -CVE-2008-2189 - http://securityreason.com/securityalert/3874 -CVE-2008-2189 - https://www.exploit-db.com/exploits/5543 -CVE-2008-2190 - https://www.exploit-db.com/exploits/5542 -CVE-2008-2190 - https://www.exploit-db.com/exploits/8711 -CVE-2008-2191 - http://securityreason.com/securityalert/3876 -CVE-2008-2191 - https://www.exploit-db.com/exploits/5541 -CVE-2008-2192 - https://www.exploit-db.com/exploits/5532 -CVE-2008-2193 - https://www.exploit-db.com/exploits/5539 -CVE-2008-2194 - https://www.exploit-db.com/exploits/5550 -CVE-2008-2195 - https://www.exploit-db.com/exploits/5550 -CVE-2008-2197 - https://www.exploit-db.com/exploits/5548 -CVE-2008-2198 - http://securityreason.com/securityalert/3877 -CVE-2008-2198 - https://www.exploit-db.com/exploits/5544 -CVE-2008-2199 - http://securityreason.com/securityalert/3878 -CVE-2008-2199 - https://www.exploit-db.com/exploits/5545 -CVE-2008-2215 - https://www.exploit-db.com/exploits/5523 -CVE-2008-2216 - https://www.exploit-db.com/exploits/5523 -CVE-2008-2217 - https://www.exploit-db.com/exploits/5510 -CVE-2008-2220 - https://www.exploit-db.com/exploits/5526 -CVE-2008-2222 - https://www.exploit-db.com/exploits/5603 -CVE-2008-2223 - https://www.exploit-db.com/exploits/5565 -CVE-2008-2224 - https://www.exploit-db.com/exploits/5566 -CVE-2008-2225 - https://www.exploit-db.com/exploits/5555 -CVE-2008-2228 - https://www.exploit-db.com/exploits/5567 -CVE-2008-2231 - http://securityreason.com/securityalert/3923 -CVE-2008-2240 - http://www.attrition.org/pipermail/vim/2008-May/001988.html -CVE-2008-2240 - http://www.attrition.org/pipermail/vim/2008-May/001989.html -CVE-2008-2244 - http://isc.sans.org/diary.html?storyid=4696 -CVE-2008-2245 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-046 -CVE-2008-2245 - https://www.exploit-db.com/exploits/6732 -CVE-2008-2246 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047 -CVE-2008-2247 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039 -CVE-2008-2248 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039 -CVE-2008-2249 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071 -CVE-2008-2250 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 -CVE-2008-2251 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 -CVE-2008-2252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 -CVE-2008-2253 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054 -CVE-2008-2254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -CVE-2008-2255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -CVE-2008-2256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -CVE-2008-2257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -CVE-2008-2258 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -CVE-2008-2259 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -CVE-2008-2263 - https://www.exploit-db.com/exploits/5611 -CVE-2008-2265 - https://www.exploit-db.com/exploits/5609 -CVE-2008-2267 - https://www.exploit-db.com/exploits/5600 -CVE-2008-2269 - https://www.exploit-db.com/exploits/5615 -CVE-2008-2270 - https://www.exploit-db.com/exploits/5621 -CVE-2008-2276 - http://marc.info/?l=bugtraq&m=121130774617956&w=4 -CVE-2008-2276 - https://www.exploit-db.com/exploits/5657 -CVE-2008-2277 - https://www.exploit-db.com/exploits/5614 -CVE-2008-2278 - https://www.exploit-db.com/exploits/5613 -CVE-2008-2279 - https://www.exploit-db.com/exploits/5613 -CVE-2008-2281 - https://www.exploit-db.com/exploits/5619 -CVE-2008-2282 - https://www.exploit-db.com/exploits/5617 -CVE-2008-2283 - https://www.exploit-db.com/exploits/5612 -CVE-2008-2285 - http://www.ubuntu.com/usn/usn-612-5 -CVE-2008-2292 - http://www.ubuntu.com/usn/usn-685-1 -CVE-2008-2293 - https://www.exploit-db.com/exploits/5630 -CVE-2008-2294 - https://www.exploit-db.com/exploits/5627 -CVE-2008-2295 - https://www.exploit-db.com/exploits/5620 -CVE-2008-2296 - https://www.exploit-db.com/exploits/5620 -CVE-2008-2297 - https://www.exploit-db.com/exploits/5628 -CVE-2008-2298 - https://www.exploit-db.com/exploits/5629 -CVE-2008-2301 - https://www.exploit-db.com/exploits/5623 -CVE-2008-2304 - http://securityreason.com/securityalert/3988 -CVE-2008-2304 - https://www.exploit-db.com/exploits/6043 -CVE-2008-2315 - http://www.openwall.com/lists/oss-security/2008/11/05/2 -CVE-2008-2315 - http://www.openwall.com/lists/oss-security/2008/11/05/3 -CVE-2008-2315 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-2315 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9761 -CVE-2008-2335 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html -CVE-2008-2335 - http://packetstormsecurity.com/files/130755/Vastal-I-tech-phpVID-1.2.3-Cross-Site-Scripting.html -CVE-2008-2335 - http://seclists.org/fulldisclosure/2015/Mar/59 -CVE-2008-2335 - https://www.exploit-db.com/exploits/6422 -CVE-2008-2336 - https://www.exploit-db.com/exploits/5626 -CVE-2008-2337 - https://www.exploit-db.com/exploits/5631 -CVE-2008-2338 - https://www.exploit-db.com/exploits/5616 -CVE-2008-2340 - https://www.exploit-db.com/exploits/5624 -CVE-2008-2341 - https://www.exploit-db.com/exploits/5624 -CVE-2008-2342 - https://www.exploit-db.com/exploits/5624 -CVE-2008-2343 - https://www.exploit-db.com/exploits/5624 -CVE-2008-2346 - https://www.exploit-db.com/exploits/5645 -CVE-2008-2347 - https://www.exploit-db.com/exploits/5650 -CVE-2008-2348 - https://www.exploit-db.com/exploits/5648 -CVE-2008-2349 - https://www.exploit-db.com/exploits/5634 -CVE-2008-2350 - http://lostmon.blogspot.com/2008/05/bcoos-highlightphp-traversal-file.html -CVE-2008-2351 - https://www.exploit-db.com/exploits/5641 -CVE-2008-2352 - https://www.exploit-db.com/exploits/5640 -CVE-2008-2353 - https://www.exploit-db.com/exploits/5647 -CVE-2008-2355 - https://www.exploit-db.com/exploits/5637 -CVE-2008-2356 - https://www.exploit-db.com/exploits/5635 -CVE-2008-2357 - http://seclists.org/fulldisclosure/2008/May/0488.html -CVE-2008-2357 - http://securityreason.com/securityalert/3903 -CVE-2008-2358 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9644 -CVE-2008-2360 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329 -CVE-2008-2364 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2008-2364 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577 -CVE-2008-2365 - http://securityreason.com/securityalert/3965 -CVE-2008-2370 - http://securityreason.com/securityalert/4099 -CVE-2008-2370 - http://www.redhat.com/support/errata/RHSA-2008-0862.html -CVE-2008-2370 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-2372 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383 -CVE-2008-2374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9973 -CVE-2008-2376 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9863 -CVE-2008-2379 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764 -CVE-2008-2382 - http://securityreason.com/securityalert/4803 -CVE-2008-2382 - http://www.coresecurity.com/content/vnc-remote-dos -CVE-2008-2383 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317 -CVE-2008-2390 - https://www.exploit-db.com/exploits/5511 -CVE-2008-2393 - https://www.exploit-db.com/exploits/5654 -CVE-2008-2394 - https://www.exploit-db.com/exploits/5642 -CVE-2008-2395 - https://www.exploit-db.com/exploits/5652 -CVE-2008-2396 - https://www.exploit-db.com/exploits/5651 -CVE-2008-2399 - http://vuln.sg/fireftp0971-en.html -CVE-2008-2411 - http://securityreason.com/securityalert/3900 -CVE-2008-2411 - https://www.exploit-db.com/exploits/5576 -CVE-2008-2416 - https://www.exploit-db.com/exploits/5639 -CVE-2008-2417 - https://www.exploit-db.com/exploits/5638 -CVE-2008-2427 - http://securityreason.com/securityalert/3956 -CVE-2008-2427 - https://www.exploit-db.com/exploits/5951 -CVE-2008-2430 - http://securityreason.com/securityalert/3976 -CVE-2008-2433 - http://securityreason.com/securityalert/4191 -CVE-2008-2434 - http://securityreason.com/securityalert/4802 -CVE-2008-2436 - http://securityreason.com/securityalert/4228 -CVE-2008-2437 - http://securityreason.com/securityalert/4263 -CVE-2008-2441 - http://securityreason.com/securityalert/4216 -CVE-2008-2443 - https://www.exploit-db.com/exploits/5610 -CVE-2008-2444 - https://www.exploit-db.com/exploits/5607 -CVE-2008-2445 - https://www.exploit-db.com/exploits/5606 -CVE-2008-2446 - https://www.exploit-db.com/exploits/5606 -CVE-2008-2447 - https://www.exploit-db.com/exploits/5605 -CVE-2008-2448 - https://www.exploit-db.com/exploits/5608 -CVE-2008-2453 - https://www.exploit-db.com/exploits/5599 -CVE-2008-2454 - https://www.exploit-db.com/exploits/5587 -CVE-2008-2455 - https://www.exploit-db.com/exploits/5604 -CVE-2008-2456 - https://www.exploit-db.com/exploits/5658 -CVE-2008-2457 - https://www.exploit-db.com/exploits/5660 -CVE-2008-2459 - https://www.exploit-db.com/exploits/5655 -CVE-2008-2461 - https://www.exploit-db.com/exploits/5661 -CVE-2008-2468 - http://securityreason.com/securityalert/4269 -CVE-2008-2469 - http://securityreason.com/securityalert/4487 -CVE-2008-2469 - https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025 -CVE-2008-2469 - https://www.exploit-db.com/exploits/6805 -CVE-2008-2474 - http://securityreason.com/securityalert/4320 -CVE-2008-2477 - https://www.exploit-db.com/exploits/5659 -CVE-2008-2480 - https://www.exploit-db.com/exploits/5672 -CVE-2008-2481 - https://www.exploit-db.com/exploits/5671 -CVE-2008-2482 - https://www.exploit-db.com/exploits/5669 -CVE-2008-2483 - https://www.exploit-db.com/exploits/5673 -CVE-2008-2484 - https://www.exploit-db.com/exploits/5673 -CVE-2008-2487 - https://www.exploit-db.com/exploits/5676 -CVE-2008-2488 - https://www.exploit-db.com/exploits/5674 -CVE-2008-2496 - https://www.exploit-db.com/exploits/5668 -CVE-2008-2501 - https://www.exploit-db.com/exploits/5683 -CVE-2008-2504 - https://www.exploit-db.com/exploits/5665 -CVE-2008-2505 - https://www.exploit-db.com/exploits/5664 -CVE-2008-2506 - https://www.exploit-db.com/exploits/5664 -CVE-2008-2511 - http://retrogod.altervista.org/9sg_CA_poc.html -CVE-2008-2511 - https://www.exploit-db.com/exploits/5682 -CVE-2008-2519 - http://vuln.sg/coreftp211565-en.html -CVE-2008-2520 - https://www.exploit-db.com/exploits/5596 -CVE-2008-2521 - https://www.exploit-db.com/exploits/5598 -CVE-2008-2522 - https://www.exploit-db.com/exploits/5597 -CVE-2008-2529 - https://www.exploit-db.com/exploits/5581 -CVE-2008-2530 - https://www.exploit-db.com/exploits/5588 -CVE-2008-2532 - https://www.exploit-db.com/exploits/5602 -CVE-2008-2533 - https://www.exploit-db.com/exploits/5578 -CVE-2008-2534 - https://www.exploit-db.com/exploits/5578 -CVE-2008-2535 - https://www.exploit-db.com/exploits/5578 -CVE-2008-2536 - https://www.exploit-db.com/exploits/5601 -CVE-2008-2537 - https://www.exploit-db.com/exploits/5577 -CVE-2008-2540 - http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html -CVE-2008-2540 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -CVE-2008-2540 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015 -CVE-2008-2542 - http://securityreason.com/securityalert/3924 -CVE-2008-2549 - https://www.exploit-db.com/exploits/5687 -CVE-2008-2551 - http://securityreason.com/securityalert/3926 -CVE-2008-2551 - https://www.exploit-db.com/exploits/5732 -CVE-2008-2554 - http://securityreason.com/securityalert/3925 -CVE-2008-2554 - https://www.exploit-db.com/exploits/5705 -CVE-2008-2555 - https://www.exploit-db.com/exploits/5706 -CVE-2008-2556 - https://www.exploit-db.com/exploits/5703 -CVE-2008-2560 - https://www.exploit-db.com/exploits/5742 -CVE-2008-2561 - https://www.exploit-db.com/exploits/5742 -CVE-2008-2562 - https://www.exploit-db.com/exploits/5744 -CVE-2008-2564 - https://www.exploit-db.com/exploits/5737 -CVE-2008-2565 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html -CVE-2008-2565 - https://www.exploit-db.com/exploits/5739 -CVE-2008-2565 - https://www.exploit-db.com/exploits/9023 -CVE-2008-2566 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html -CVE-2008-2566 - https://www.exploit-db.com/exploits/5739 -CVE-2008-2568 - https://www.exploit-db.com/exploits/5743 -CVE-2008-2568 - https://www.exploit-db.com/exploits/5833 -CVE-2008-2569 - https://www.exploit-db.com/exploits/5740 -CVE-2008-2572 - http://securityreason.com/securityalert/3927 -CVE-2008-2572 - https://www.exploit-db.com/exploits/5685 -CVE-2008-2573 - https://www.exploit-db.com/exploits/5709 -CVE-2008-2573 - https://www.exploit-db.com/exploits/5751 -CVE-2008-2574 - http://securityreason.com/securityalert/3928 -CVE-2008-2574 - https://www.exploit-db.com/exploits/5728 -CVE-2008-2595 - https://www.exploit-db.com/exploits/6101 -CVE-2008-2626 - https://www.exploit-db.com/exploits/5731 -CVE-2008-2627 - https://www.exploit-db.com/exploits/5730 -CVE-2008-2628 - https://www.exploit-db.com/exploits/5723 -CVE-2008-2629 - https://www.exploit-db.com/exploits/5724 -CVE-2008-2630 - https://www.exploit-db.com/exploits/5734 -CVE-2008-2632 - https://www.exploit-db.com/exploits/5721 -CVE-2008-2633 - http://packetstormsecurity.org/0806-exploits/joomlajoomradio-sql.txt -CVE-2008-2633 - https://www.exploit-db.com/exploits/5729 -CVE-2008-2634 - https://www.exploit-db.com/exploits/5717 -CVE-2008-2635 - http://vuln.sg/bitkinex293-en.html -CVE-2008-2636 - http://securityreason.com/securityalert/3929 -CVE-2008-2637 - http://securityreason.com/securityalert/3931 -CVE-2008-2638 - https://www.exploit-db.com/exploits/5736 -CVE-2008-2639 - http://isc.sans.org/diary.html?storyid=4556 -CVE-2008-2639 - http://securityreason.com/securityalert/3944 -CVE-2008-2639 - https://www.exploit-db.com/exploits/6387 -CVE-2008-2641 - http://isc.sans.org/diary.html?storyid=4616 -CVE-2008-2642 - http://securityreason.com/securityalert/3932 -CVE-2008-2643 - https://www.exploit-db.com/exploits/5710 -CVE-2008-2644 - https://www.exploit-db.com/exploits/5725 -CVE-2008-2645 - https://www.exploit-db.com/exploits/5722 -CVE-2008-2646 - https://www.exploit-db.com/exploits/5716 -CVE-2008-2647 - https://www.exploit-db.com/exploits/5716 -CVE-2008-2648 - https://www.exploit-db.com/exploits/5716 -CVE-2008-2649 - https://www.exploit-db.com/exploits/5715 -CVE-2008-2650 - https://www.exploit-db.com/exploits/5700 -CVE-2008-2651 - https://www.exploit-db.com/exploits/5719 -CVE-2008-2652 - https://www.exploit-db.com/exploits/5725 -CVE-2008-2664 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9646 -CVE-2008-2665 - http://securityreason.com/securityalert/3941 -CVE-2008-2666 - http://securityreason.com/securityalert/3942 -CVE-2008-2668 - http://securityreason.com/securityalert/3935 -CVE-2008-2668 - https://www.exploit-db.com/exploits/5773 -CVE-2008-2669 - http://securityreason.com/securityalert/3935 -CVE-2008-2669 - https://www.exploit-db.com/exploits/5773 -CVE-2008-2670 - http://securityreason.com/securityalert/3938 -CVE-2008-2670 - https://www.exploit-db.com/exploits/5774 -CVE-2008-2671 - http://securityreason.com/securityalert/3939 -CVE-2008-2671 - https://www.exploit-db.com/exploits/5772 -CVE-2008-2672 - http://securityreason.com/securityalert/3936 -CVE-2008-2672 - https://www.exploit-db.com/exploits/5771 -CVE-2008-2673 - https://www.exploit-db.com/exploits/5768 -CVE-2008-2676 - https://www.exploit-db.com/exploits/5761 -CVE-2008-2677 - https://www.exploit-db.com/exploits/5764 -CVE-2008-2678 - https://www.exploit-db.com/exploits/5764 -CVE-2008-2679 - https://www.exploit-db.com/exploits/5766 -CVE-2008-2680 - https://www.exploit-db.com/exploits/5766 -CVE-2008-2681 - https://www.exploit-db.com/exploits/5766 -CVE-2008-2682 - https://www.exploit-db.com/exploits/5766 -CVE-2008-2683 - http://securityreason.com/securityalert/8276 -CVE-2008-2683 - http://securityreason.com/securityalert/8277 -CVE-2008-2683 - https://www.exploit-db.com/exploits/5750 -CVE-2008-2684 - https://www.exploit-db.com/exploits/5750 -CVE-2008-2686 - https://www.exploit-db.com/exploits/5767 -CVE-2008-2687 - https://www.exploit-db.com/exploits/5762 -CVE-2008-2688 - https://www.exploit-db.com/exploits/5765 -CVE-2008-2689 - https://www.exploit-db.com/exploits/5757 -CVE-2008-2691 - https://www.exploit-db.com/exploits/5753 -CVE-2008-2692 - https://www.exploit-db.com/exploits/5755 -CVE-2008-2693 - https://www.exploit-db.com/exploits/5746 -CVE-2008-2693 - https://www.exploit-db.com/exploits/5747 -CVE-2008-2694 - https://www.exploit-db.com/exploits/5754 -CVE-2008-2695 - https://www.exploit-db.com/exploits/5754 -CVE-2008-2697 - https://www.exploit-db.com/exploits/5759 -CVE-2008-2698 - http://securityreason.com/securityalert/3940 -CVE-2008-2699 - https://www.exploit-db.com/exploits/5758 -CVE-2008-2700 - https://www.exploit-db.com/exploits/5760 -CVE-2008-2701 - http://packetstormsecurity.org/0806-exploits/joomlagameq-sql.txt -CVE-2008-2701 - https://www.exploit-db.com/exploits/5752 -CVE-2008-2702 - http://vuln.sg/alftp41b2-en.html -CVE-2008-2712 - http://securityreason.com/securityalert/3951 -CVE-2008-2712 - http://www.openwall.com/lists/oss-security/2008/10/15/1 -CVE-2008-2717 - http://securityreason.com/securityalert/3945 -CVE-2008-2718 - http://securityreason.com/securityalert/3945 -CVE-2008-2725 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9606 -CVE-2008-2726 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9959 -CVE-2008-2742 - https://www.exploit-db.com/exploits/5770 -CVE-2008-2744 - http://securityreason.com/securityalert/3946 -CVE-2008-2745 - https://www.exploit-db.com/exploits/5777 -CVE-2008-2745 - https://www.exploit-db.com/exploits/5778 -CVE-2008-2746 - https://www.exploit-db.com/exploits/5796 -CVE-2008-2747 - http://securityreason.com/securityalert/3952 -CVE-2008-2748 - http://aluigi.org/poc/skulltagloop.zip -CVE-2008-2748 - http://securityreason.com/securityalert/3953 -CVE-2008-2751 - http://securityreason.com/securityalert/3949 -CVE-2008-2753 - https://www.exploit-db.com/exploits/5788 -CVE-2008-2754 - https://www.exploit-db.com/exploits/5785 -CVE-2008-2755 - https://www.exploit-db.com/exploits/5789 -CVE-2008-2756 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2756 - http://securityreason.com/securityalert/3950 -CVE-2008-2756 - http://www.securityfocus.com/bid/29672 -CVE-2008-2757 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2757 - http://securityreason.com/securityalert/3950 -CVE-2008-2757 - http://www.securityfocus.com/bid/29672 -CVE-2008-2758 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2758 - http://securityreason.com/securityalert/3950 -CVE-2008-2758 - http://www.securityfocus.com/bid/29672 -CVE-2008-2759 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2759 - http://securityreason.com/securityalert/3950 -CVE-2008-2759 - http://www.securityfocus.com/bid/29672 -CVE-2008-2760 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2760 - http://securityreason.com/securityalert/3950 -CVE-2008-2760 - http://www.securityfocus.com/bid/29672 -CVE-2008-2761 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2761 - http://securityreason.com/securityalert/3950 -CVE-2008-2761 - http://www.securityfocus.com/bid/29672 -CVE-2008-2762 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2762 - http://securityreason.com/securityalert/3950 -CVE-2008-2762 - http://www.securityfocus.com/bid/29672 -CVE-2008-2763 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2763 - http://securityreason.com/securityalert/3950 -CVE-2008-2763 - http://www.securityfocus.com/bid/29672 -CVE-2008-2764 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2764 - http://securityreason.com/securityalert/3950 -CVE-2008-2764 - http://www.securityfocus.com/bid/29672 -CVE-2008-2765 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2765 - http://securityreason.com/securityalert/3950 -CVE-2008-2765 - http://www.securityfocus.com/bid/29672 -CVE-2008-2766 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2766 - http://securityreason.com/securityalert/3950 -CVE-2008-2766 - http://www.securityfocus.com/bid/29672 -CVE-2008-2767 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2767 - http://securityreason.com/securityalert/3950 -CVE-2008-2767 - http://www.securityfocus.com/bid/29672 -CVE-2008-2768 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 -CVE-2008-2768 - http://securityreason.com/securityalert/3950 -CVE-2008-2768 - http://www.securityfocus.com/bid/29672 -CVE-2008-2769 - http://securityreason.com/securityalert/3947 -CVE-2008-2770 - https://www.exploit-db.com/exploits/5787 -CVE-2008-2774 - https://www.exploit-db.com/exploits/5678 -CVE-2008-2778 - https://www.exploit-db.com/exploits/5677 -CVE-2008-2779 - http://vuln.sg/cuteftp820-en.html -CVE-2008-2781 - http://securityreason.com/securityalert/3954 -CVE-2008-2782 - https://www.exploit-db.com/exploits/5680 -CVE-2008-2785 - https://bugzilla.mozilla.org/show_bug.cgi?id=440230 -CVE-2008-2785 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900 -CVE-2008-2787 - http://securityreason.com/securityalert/3948 -CVE-2008-2789 - http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt -CVE-2008-2789 - https://www.exploit-db.com/exploits/5836 -CVE-2008-2790 - https://www.exploit-db.com/exploits/5840 -CVE-2008-2791 - https://www.exploit-db.com/exploits/5834 -CVE-2008-2792 - https://www.exploit-db.com/exploits/5846 -CVE-2008-2793 - https://www.exploit-db.com/exploits/5839 -CVE-2008-2795 - http://vuln.sg/ultraedit1400b-en.html -CVE-2008-2796 - http://securityreason.com/securityalert/3973 -CVE-2008-2796 - https://www.exploit-db.com/exploits/5838 -CVE-2008-2798 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2798 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2799 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2799 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2800 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2800 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2800 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9386 -CVE-2008-2801 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2801 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2802 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2802 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2803 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2803 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2805 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2805 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2807 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2807 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432 -CVE-2008-2808 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2808 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2808 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668 -CVE-2008-2809 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2809 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2809 - https://bugzilla.mozilla.org/show_bug.cgi?id=402347 -CVE-2008-2810 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2810 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2810 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9593 -CVE-2008-2811 - http://www.redhat.com/support/errata/RHSA-2008-0547.html -CVE-2008-2811 - http://www.redhat.com/support/errata/RHSA-2008-0549.html -CVE-2008-2811 - https://bugzilla.mozilla.org/show_bug.cgi?id=439735 -CVE-2008-2811 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9865 -CVE-2008-2813 - https://www.exploit-db.com/exploits/5813 -CVE-2008-2815 - https://www.exploit-db.com/exploits/5832 -CVE-2008-2816 - https://www.exploit-db.com/exploits/5828 -CVE-2008-2817 - https://www.exploit-db.com/exploits/5830 -CVE-2008-2818 - https://www.exploit-db.com/exploits/5801 -CVE-2008-2820 - http://securityreason.com/securityalert/3955 -CVE-2008-2820 - https://www.exploit-db.com/exploits/5831 -CVE-2008-2821 - http://vuln.sg/glubsecureftp2515-en.html -CVE-2008-2822 - http://vuln.sg/3dftp801-en.html -CVE-2008-2823 - https://www.exploit-db.com/exploits/5820 -CVE-2008-2830 - http://it.slashdot.org/it/08/06/18/1919224.shtml -CVE-2008-2832 - https://www.exploit-db.com/exploits/5850 -CVE-2008-2833 - https://www.exploit-db.com/exploits/5887 -CVE-2008-2834 - https://www.exploit-db.com/exploits/5885 -CVE-2008-2835 - https://www.exploit-db.com/exploits/5898 -CVE-2008-2836 - https://www.exploit-db.com/exploits/5847 -CVE-2008-2837 - https://www.exploit-db.com/exploits/5863 -CVE-2008-2838 - https://www.exploit-db.com/exploits/5848 -CVE-2008-2839 - https://www.exploit-db.com/exploits/5848 -CVE-2008-2841 - https://www.exploit-db.com/exploits/5795 -CVE-2008-2842 - http://www.bugreport.ir/?/43 -CVE-2008-2842 - https://www.exploit-db.com/exploits/5849 -CVE-2008-2843 - http://www.bugreport.ir/?/43 -CVE-2008-2843 - https://www.exploit-db.com/exploits/5849 -CVE-2008-2844 - https://www.exploit-db.com/exploits/5857 -CVE-2008-2845 - https://www.exploit-db.com/exploits/5854 -CVE-2008-2846 - https://www.exploit-db.com/exploits/5858 -CVE-2008-2847 - https://www.exploit-db.com/exploits/5853 -CVE-2008-2853 - https://www.exploit-db.com/exploits/5855 -CVE-2008-2854 - https://www.exploit-db.com/exploits/5864 -CVE-2008-2855 - https://www.exploit-db.com/exploits/5860 -CVE-2008-2856 - https://www.exploit-db.com/exploits/5860 -CVE-2008-2857 - https://www.exploit-db.com/exploits/5821 -CVE-2008-2860 - https://www.exploit-db.com/exploits/5867 -CVE-2008-2861 - http://securityreason.com/securityalert/3957 -CVE-2008-2861 - https://www.exploit-db.com/exploits/5859 -CVE-2008-2862 - http://securityreason.com/securityalert/3957 -CVE-2008-2862 - http://www.bugreport.ir/?/45 -CVE-2008-2862 - https://www.exploit-db.com/exploits/5859 -CVE-2008-2863 - http://securityreason.com/securityalert/3957 -CVE-2008-2863 - http://www.bugreport.ir/?/45 -CVE-2008-2863 - https://www.exploit-db.com/exploits/5859 -CVE-2008-2864 - http://securityreason.com/securityalert/3957 -CVE-2008-2864 - http://www.bugreport.ir/?/45 -CVE-2008-2864 - https://www.exploit-db.com/exploits/5859 -CVE-2008-2865 - https://www.exploit-db.com/exploits/5842 -CVE-2008-2866 - https://www.exploit-db.com/exploits/5865 -CVE-2008-2867 - https://www.exploit-db.com/exploits/5929 -CVE-2008-2868 - https://www.exploit-db.com/exploits/5927 -CVE-2008-2869 - https://www.exploit-db.com/exploits/5930 -CVE-2008-2870 - https://www.exploit-db.com/exploits/5925 -CVE-2008-2872 - https://www.exploit-db.com/exploits/5895 -CVE-2008-2873 - https://www.exploit-db.com/exploits/5895 -CVE-2008-2874 - https://www.exploit-db.com/exploits/5934 -CVE-2008-2875 - https://www.exploit-db.com/exploits/5932 -CVE-2008-2876 - https://www.exploit-db.com/exploits/5933 -CVE-2008-2877 - https://www.exploit-db.com/exploits/5921 -CVE-2008-2878 - http://securityreason.com/securityalert/3959 -CVE-2008-2878 - http://www.bugreport.ir/?/44 -CVE-2008-2879 - http://securityreason.com/securityalert/3958 -CVE-2008-2881 - http://e-rdc.org/v1/news.php?readmore=101 -CVE-2008-2881 - https://www.exploit-db.com/exploits/5924 -CVE-2008-2882 - http://securityreason.com/securityalert/3962 -CVE-2008-2882 - https://www.exploit-db.com/exploits/5895 -CVE-2008-2883 - https://www.exploit-db.com/exploits/5876 -CVE-2008-2884 - https://www.exploit-db.com/exploits/5900 -CVE-2008-2885 - https://www.exploit-db.com/exploits/5906 -CVE-2008-2886 - http://securityreason.com/securityalert/3961 -CVE-2008-2886 - https://www.exploit-db.com/exploits/5876 -CVE-2008-2887 - https://www.exploit-db.com/exploits/5872 -CVE-2008-2888 - https://www.exploit-db.com/exploits/5901 -CVE-2008-2889 - http://vuln.sg/wiseftp558-en.html -CVE-2008-2890 - http://securityreason.com/securityalert/3960 -CVE-2008-2890 - https://www.exploit-db.com/exploits/5889 -CVE-2008-2891 - https://www.exploit-db.com/exploits/5878 -CVE-2008-2892 - https://www.exploit-db.com/exploits/5893 -CVE-2008-2893 - https://www.exploit-db.com/exploits/5890 -CVE-2008-2894 - http://vuln.sg/classicftp102-en.html -CVE-2008-2895 - https://www.exploit-db.com/exploits/5884 -CVE-2008-2896 - https://www.exploit-db.com/exploits/5871 -CVE-2008-2897 - https://www.exploit-db.com/exploits/5899 -CVE-2008-2898 - https://www.exploit-db.com/exploits/5904 -CVE-2008-2900 - https://www.exploit-db.com/exploits/5892 -CVE-2008-2901 - https://www.exploit-db.com/exploits/5811 -CVE-2008-2902 - https://www.exploit-db.com/exploits/5821 -CVE-2008-2903 - https://www.exploit-db.com/exploits/5823 -CVE-2008-2904 - https://www.exploit-db.com/exploits/5812 -CVE-2008-2905 - https://www.exploit-db.com/exploits/5808 -CVE-2008-2906 - https://www.exploit-db.com/exploits/5802 -CVE-2008-2907 - https://www.exploit-db.com/exploits/5798 -CVE-2008-2909 - https://www.exploit-db.com/exploits/5794 -CVE-2008-2910 - https://www.exploit-db.com/exploits/5793 -CVE-2008-2911 - https://www.exploit-db.com/exploits/5810 -CVE-2008-2912 - https://www.exploit-db.com/exploits/5810 -CVE-2008-2913 - https://www.exploit-db.com/exploits/5822 -CVE-2008-2914 - https://www.exploit-db.com/exploits/5807 -CVE-2008-2915 - https://www.exploit-db.com/exploits/5809 -CVE-2008-2916 - http://e-rdc.org/v1/news.php?readmore=98 -CVE-2008-2916 - http://securityreason.com/securityalert/3963 -CVE-2008-2916 - https://www.exploit-db.com/exploits/5804 -CVE-2008-2917 - http://securityreason.com/securityalert/3964 -CVE-2008-2917 - https://www.exploit-db.com/exploits/5805 -CVE-2008-2918 - https://www.exploit-db.com/exploits/5815 -CVE-2008-2919 - https://www.exploit-db.com/exploits/5806 -CVE-2008-2920 - https://www.exploit-db.com/exploits/5819 -CVE-2008-2921 - https://www.exploit-db.com/exploits/5819 -CVE-2008-2922 - https://www.exploit-db.com/exploits/5817 -CVE-2008-2935 - http://securityreason.com/securityalert/4078 -CVE-2008-2935 - http://www.ocert.org/advisories/ocert-2008-009.html -CVE-2008-2936 - http://securityreason.com/securityalert/4160 -CVE-2008-2936 - https://www.exploit-db.com/exploits/6337 -CVE-2008-2938 - http://securityreason.com/securityalert/4148 -CVE-2008-2938 - http://www.redhat.com/support/errata/RHSA-2008-0862.html -CVE-2008-2938 - https://www.exploit-db.com/exploits/6229 -CVE-2008-2947 - http://www.kb.cert.org/vuls/id/923508 -CVE-2008-2947 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -CVE-2008-2948 - http://sirdarckcat.blogspot.com/2008/05/ghosts-for-ie8-and-ie75730.html -CVE-2008-2948 - http://www.gnucitizen.org/blog/ghost-busters/ -CVE-2008-2948 - http://www.kb.cert.org/vuls/id/516627 -CVE-2008-2949 - http://www.kb.cert.org/vuls/id/516627 -CVE-2008-2950 - http://securityreason.com/securityalert/3977 -CVE-2008-2950 - http://www.ocert.org/advisories/ocert-2008-007.html -CVE-2008-2950 - https://www.exploit-db.com/exploits/6032 -CVE-2008-2955 - http://securityreason.com/securityalert/3966 -CVE-2008-2956 - http://crisp.cs.du.edu/?q=ca2007-1 -CVE-2008-2957 - http://crisp.cs.du.edu/?q=ca2007-1 -CVE-2008-2957 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076 -CVE-2008-2959 - https://www.exploit-db.com/exploits/5851 -CVE-2008-2961 - https://www.exploit-db.com/exploits/5896 -CVE-2008-2962 - https://www.exploit-db.com/exploits/5913 -CVE-2008-2963 - https://www.exploit-db.com/exploits/5913 -CVE-2008-2964 - https://www.exploit-db.com/exploits/5911 -CVE-2008-2965 - https://www.exploit-db.com/exploits/5877 -CVE-2008-2966 - https://www.exploit-db.com/exploits/5877 -CVE-2008-2967 - http://securityreason.com/securityalert/3959 -CVE-2008-2967 - http://www.bugreport.ir/?/44 -CVE-2008-2968 - http://securityreason.com/securityalert/3959 -CVE-2008-2968 - http://www.bugreport.ir/?/44 -CVE-2008-2969 - http://securityreason.com/securityalert/3959 -CVE-2008-2969 - http://www.bugreport.ir/?/44 -CVE-2008-2970 - http://securityreason.com/securityalert/3959 -CVE-2008-2970 - http://www.bugreport.ir/?/44 -CVE-2008-2971 - https://www.exploit-db.com/exploits/5875 -CVE-2008-2972 - https://www.exploit-db.com/exploits/5883 -CVE-2008-2973 - https://www.exploit-db.com/exploits/5919 -CVE-2008-2974 - https://www.exploit-db.com/exploits/5919 -CVE-2008-2975 - https://www.exploit-db.com/exploits/5917 -CVE-2008-2976 - https://www.exploit-db.com/exploits/5917 -CVE-2008-2977 - https://www.exploit-db.com/exploits/5920 -CVE-2008-2978 - https://www.exploit-db.com/exploits/5920 -CVE-2008-2979 - http://securityreason.com/securityalert/3968 -CVE-2008-2979 - https://www.exploit-db.com/exploits/5920 -CVE-2008-2980 - https://www.exploit-db.com/exploits/5903 -CVE-2008-2981 - https://www.exploit-db.com/exploits/5903 -CVE-2008-2982 - https://www.exploit-db.com/exploits/5903 -CVE-2008-2983 - https://www.exploit-db.com/exploits/5914 -CVE-2008-2984 - https://www.exploit-db.com/exploits/5905 -CVE-2008-2985 - https://www.exploit-db.com/exploits/5905 -CVE-2008-2986 - https://www.exploit-db.com/exploits/5897 -CVE-2008-2987 - http://securityreason.com/securityalert/3958 -CVE-2008-2988 - http://securityreason.com/securityalert/3958 -CVE-2008-2989 - https://www.exploit-db.com/exploits/5908 -CVE-2008-2990 - http://securityreason.com/securityalert/3967 -CVE-2008-2990 - https://www.exploit-db.com/exploits/5915 -CVE-2008-2992 - http://securityreason.com/securityalert/4549 -CVE-2008-2992 - http://www.coresecurity.com/content/adobe-reader-buffer-overflow -CVE-2008-2992 - https://www.exploit-db.com/exploits/6994 -CVE-2008-2992 - https://www.exploit-db.com/exploits/7006 -CVE-2008-2993 - http://securityreason.com/securityalert/3971 -CVE-2008-2993 - http://www.securityfocus.com/bid/29651 -CVE-2008-2993 - https://www.exploit-db.com/exploits/5784 -CVE-2008-2994 - http://securityreason.com/securityalert/3969 -CVE-2008-2995 - http://securityreason.com/securityalert/3969 -CVE-2008-2996 - http://securityreason.com/securityalert/3970 -CVE-2008-2996 - https://www.exploit-db.com/exploits/5791 -CVE-2008-2997 - http://securityreason.com/securityalert/3970 -CVE-2008-2997 - https://www.exploit-db.com/exploits/5791 -CVE-2008-3003 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 -CVE-2008-3004 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 -CVE-2008-3005 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 -CVE-2008-3006 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 -CVE-2008-3007 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-055 -CVE-2008-3008 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053 -CVE-2008-3008 - https://www.exploit-db.com/exploits/6454 -CVE-2008-3009 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076 -CVE-2008-3010 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076 -CVE-2008-3012 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 -CVE-2008-3013 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 -CVE-2008-3014 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 -CVE-2008-3015 - http://www.evilfingers.com/patchTuesday/MS08_052_GDI+_Vulnerability_ver2.txt -CVE-2008-3015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 -CVE-2008-3015 - https://www.exploit-db.com/exploits/6619 -CVE-2008-3015 - https://www.exploit-db.com/exploits/6716 -CVE-2008-3018 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 -CVE-2008-3019 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 -CVE-2008-3020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 -CVE-2008-3021 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 -CVE-2008-3022 - http://securityreason.com/securityalert/3972 -CVE-2008-3022 - https://www.exploit-db.com/exploits/5996 -CVE-2008-3024 - http://securityreason.com/securityalert/3974 -CVE-2008-3025 - https://www.exploit-db.com/exploits/5988 -CVE-2008-3026 - https://www.exploit-db.com/exploits/5984 -CVE-2008-3027 - https://www.exploit-db.com/exploits/5985 -CVE-2008-3030 - https://www.exploit-db.com/exploits/5987 -CVE-2008-3031 - https://www.exploit-db.com/exploits/5982 -CVE-2008-3033 - http://securityreason.com/securityalert/3975 -CVE-2008-3034 - http://securityreason.com/securityalert/3975 -CVE-2008-3035 - https://www.exploit-db.com/exploits/5991 -CVE-2008-3036 - https://www.exploit-db.com/exploits/5992 -CVE-2008-3068 - http://securityreason.com/securityalert/3978 -CVE-2008-3068 - https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt -CVE-2008-3068 - https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt -CVE-2008-3068 - https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt -CVE-2008-3068 - https://www.cynops.de/techzone/http_over_x509.html -CVE-2008-3074 - http://www.openwall.com/lists/oss-security/2008/10/15/1 -CVE-2008-3075 - http://www.openwall.com/lists/oss-security/2008/10/15/1 -CVE-2008-3080 - https://www.exploit-db.com/exploits/5975 -CVE-2008-3083 - https://www.exploit-db.com/exploits/5993 -CVE-2008-3087 - https://www.exploit-db.com/exploits/6007 -CVE-2008-3088 - https://www.exploit-db.com/exploits/6007 -CVE-2008-3089 - https://www.exploit-db.com/exploits/6010 -CVE-2008-3090 - http://vuln.sg/blognplus255-en.html -CVE-2008-3093 - https://www.exploit-db.com/exploits/6008 -CVE-2008-3098 - http://securityreason.com/securityalert/4303 -CVE-2008-3100 - http://securityreason.com/securityalert/4057 -CVE-2008-3101 - http://securityreason.com/securityalert/4208 -CVE-2008-3102 - http://securityreason.com/securityalert/4298 -CVE-2008-3103 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3104 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3104 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3104 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9565 -CVE-2008-3105 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3106 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3106 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3107 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3108 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3108 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3109 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3110 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3111 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3111 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3112 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3112 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3113 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3113 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3114 - http://www.redhat.com/support/errata/RHSA-2008-0790.html -CVE-2008-3114 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3114 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9755 -CVE-2008-3115 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-3116 - http://securityreason.com/securityalert/3982 -CVE-2008-3117 - https://www.exploit-db.com/exploits/5938 -CVE-2008-3118 - https://www.exploit-db.com/exploits/5938 -CVE-2008-3119 - http://securityreason.com/securityalert/3980 -CVE-2008-3119 - https://www.exploit-db.com/exploits/6034 -CVE-2008-3123 - https://www.exploit-db.com/exploits/6022 -CVE-2008-3124 - https://www.exploit-db.com/exploits/6021 -CVE-2008-3125 - https://www.exploit-db.com/exploits/6020 -CVE-2008-3125 - https://www.exploit-db.com/exploits/6027 -CVE-2008-3127 - https://www.exploit-db.com/exploits/5981 -CVE-2008-3128 - https://www.exploit-db.com/exploits/5973 -CVE-2008-3129 - https://www.exploit-db.com/exploits/5974 -CVE-2008-3131 - http://securityreason.com/securityalert/3984 -CVE-2008-3131 - https://www.exploit-db.com/exploits/5977 -CVE-2008-3132 - https://www.exploit-db.com/exploits/5965 -CVE-2008-3133 - https://www.exploit-db.com/exploits/5971 -CVE-2008-3135 - http://aluigi.altervista.org/adv/usurdat-adv.txt -CVE-2008-3135 - http://securityreason.com/securityalert/3983 -CVE-2008-3136 - https://www.exploit-db.com/exploits/5976 -CVE-2008-3142 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-3143 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-3144 - http://bugs.python.org/issue2588 -CVE-2008-3144 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-3145 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9020 -CVE-2008-3147 - http://securityreason.com/securityalert/3987 -CVE-2008-3148 - https://www.exploit-db.com/exploits/6031 -CVE-2008-3149 - http://securityreason.com/securityalert/3985 -CVE-2008-3150 - https://www.exploit-db.com/exploits/6018 -CVE-2008-3151 - http://securityreason.com/securityalert/3986 -CVE-2008-3152 - https://www.exploit-db.com/exploits/6014 -CVE-2008-3152 - https://www.exploit-db.com/exploits/6019 -CVE-2008-3153 - https://www.exploit-db.com/exploits/6017 -CVE-2008-3154 - https://www.exploit-db.com/exploits/5997 -CVE-2008-3155 - https://www.exploit-db.com/exploits/6004 -CVE-2008-3156 - https://www.exploit-db.com/exploits/6004 -CVE-2008-3164 - https://www.exploit-db.com/exploits/6016 -CVE-2008-3165 - http://securityreason.com/securityalert/3995 -CVE-2008-3165 - https://www.exploit-db.com/exploits/6009 -CVE-2008-3166 - http://securityreason.com/securityalert/3994 -CVE-2008-3166 - https://www.exploit-db.com/exploits/6028 -CVE-2008-3167 - http://securityreason.com/securityalert/3993 -CVE-2008-3167 - https://www.exploit-db.com/exploits/6024 -CVE-2008-3178 - http://securityreason.com/securityalert/3991 -CVE-2008-3178 - https://www.exploit-db.com/exploits/6015 -CVE-2008-3179 - http://securityreason.com/securityalert/3992 -CVE-2008-3179 - https://www.exploit-db.com/exploits/6037 -CVE-2008-3180 - http://securityreason.com/securityalert/3990 -CVE-2008-3180 - https://www.exploit-db.com/exploits/6011 -CVE-2008-3181 - https://www.exploit-db.com/exploits/6011 -CVE-2008-3182 - http://securityreason.com/securityalert/3997 -CVE-2008-3182 - https://www.exploit-db.com/exploits/6030 -CVE-2008-3182 - https://www.exploit-db.com/exploits/6039 -CVE-2008-3183 - http://securityreason.com/securityalert/3998 -CVE-2008-3183 - https://www.exploit-db.com/exploits/6036 -CVE-2008-3184 - http://securityreason.com/securityalert/4000 -CVE-2008-3185 - http://e-rdc.org/v1/news.php?readmore=101 -CVE-2008-3185 - http://securityreason.com/securityalert/4002 -CVE-2008-3185 - https://www.exploit-db.com/exploits/5924 -CVE-2008-3189 - https://www.exploit-db.com/exploits/6035 -CVE-2008-3190 - http://securityreason.com/securityalert/4001 -CVE-2008-3190 - https://www.exploit-db.com/exploits/6071 -CVE-2008-3191 - http://securityreason.com/securityalert/4003 -CVE-2008-3191 - https://www.exploit-db.com/exploits/6068 -CVE-2008-3192 - http://securityreason.com/securityalert/3999 -CVE-2008-3192 - https://www.exploit-db.com/exploits/6057 -CVE-2008-3193 - http://securityreason.com/securityalert/3999 -CVE-2008-3193 - https://www.exploit-db.com/exploits/6057 -CVE-2008-3194 - http://securityreason.com/securityalert/3996 -CVE-2008-3194 - https://www.exploit-db.com/exploits/6074 -CVE-2008-3195 - http://securityreason.com/securityalert/4265 -CVE-2008-3195 - https://www.exploit-db.com/exploits/6269 -CVE-2008-3200 - http://securityreason.com/securityalert/4005 -CVE-2008-3200 - https://www.exploit-db.com/exploits/6058 -CVE-2008-3203 - https://www.exploit-db.com/exploits/6033 -CVE-2008-3204 - http://securityreason.com/securityalert/4006 -CVE-2008-3204 - https://www.exploit-db.com/exploits/6044 -CVE-2008-3205 - http://securityreason.com/securityalert/4007 -CVE-2008-3205 - https://www.exploit-db.com/exploits/6042 -CVE-2008-3206 - http://securityreason.com/securityalert/4008 -CVE-2008-3207 - http://securityreason.com/securityalert/4010 -CVE-2008-3207 - https://www.exploit-db.com/exploits/6078 -CVE-2008-3208 - http://securityreason.com/securityalert/4011 -CVE-2008-3208 - https://www.exploit-db.com/exploits/6059 -CVE-2008-3209 - http://securityreason.com/securityalert/4012 -CVE-2008-3209 - https://www.exploit-db.com/exploits/6083 -CVE-2008-3210 - http://securityreason.com/securityalert/4013 -CVE-2008-3210 - https://www.exploit-db.com/exploits/6046 -CVE-2008-3211 - http://securityreason.com/securityalert/4014 -CVE-2008-3211 - https://www.exploit-db.com/exploits/6070 -CVE-2008-3213 - http://securityreason.com/securityalert/4009 -CVE-2008-3213 - https://www.exploit-db.com/exploits/6056 -CVE-2008-3214 - http://www.openwall.com/lists/oss-security/2008/07/03/4 -CVE-2008-3214 - http://www.openwall.com/lists/oss-security/2008/07/08/8 -CVE-2008-3214 - http://www.openwall.com/lists/oss-security/2008/07/12/3 -CVE-2008-3214 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2008-3234 - https://www.exploit-db.com/exploits/6094 -CVE-2008-3237 - http://securityreason.com/securityalert/4015 -CVE-2008-3237 - https://www.exploit-db.com/exploits/6069 -CVE-2008-3238 - http://securityreason.com/securityalert/4015 -CVE-2008-3238 - https://www.exploit-db.com/exploits/6069 -CVE-2008-3239 - http://securityreason.com/securityalert/4022 -CVE-2008-3239 - https://www.exploit-db.com/exploits/6085 -CVE-2008-3240 - http://securityreason.com/securityalert/4016 -CVE-2008-3240 - https://www.exploit-db.com/exploits/6087 -CVE-2008-3241 - http://securityreason.com/securityalert/4021 -CVE-2008-3241 - https://www.exploit-db.com/exploits/6067 -CVE-2008-3242 - http://securityreason.com/securityalert/4019 -CVE-2008-3242 - https://www.exploit-db.com/exploits/6090 -CVE-2008-3245 - https://www.exploit-db.com/exploits/6091 -CVE-2008-3250 - http://securityreason.com/securityalert/4017 -CVE-2008-3250 - https://www.exploit-db.com/exploits/6097 -CVE-2008-3250 - https://www.exploit-db.com/exploits/6113 -CVE-2008-3251 - http://securityreason.com/securityalert/4018 -CVE-2008-3251 - https://www.exploit-db.com/exploits/6088 -CVE-2008-3254 - https://www.exploit-db.com/exploits/6096 -CVE-2008-3256 - https://www.exploit-db.com/exploits/6099 -CVE-2008-3257 - http://www.attrition.org/pipermail/vim/2008-July/002035.html -CVE-2008-3257 - http://www.attrition.org/pipermail/vim/2008-July/002036.html -CVE-2008-3257 - https://www.exploit-db.com/exploits/6089 -CVE-2008-3260 - http://securityreason.com/securityalert/4020 -CVE-2008-3261 - http://securityreason.com/securityalert/4020 -CVE-2008-3262 - http://securityreason.com/securityalert/4020 -CVE-2008-3265 - http://securityreason.com/securityalert/4023 -CVE-2008-3265 - https://www.exploit-db.com/exploits/6086 -CVE-2008-3266 - http://securityreason.com/securityalert/4028 -CVE-2008-3266 - https://www.exploit-db.com/exploits/6105 -CVE-2008-3267 - http://securityreason.com/securityalert/4029 -CVE-2008-3267 - https://www.exploit-db.com/exploits/6110 -CVE-2008-3269 - http://securityreason.com/securityalert/4030 -CVE-2008-3269 - https://www.exploit-db.com/exploits/6077 -CVE-2008-3271 - http://securityreason.com/securityalert/4396 -CVE-2008-3274 - http://www.freeipa.org/page/Downloads -CVE-2008-3280 - https://www.exploit-db.com/exploits/5720 -CVE-2008-3281 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 -CVE-2008-3285 - http://securityreason.com/securityalert/4027 -CVE-2008-3287 - http://securityreason.com/securityalert/4031 -CVE-2008-3288 - http://securityreason.com/securityalert/4026 -CVE-2008-3289 - http://securityreason.com/securityalert/4025 -CVE-2008-3290 - http://securityreason.com/securityalert/4024 -CVE-2008-3291 - http://securityreason.com/securityalert/4032 -CVE-2008-3291 - https://www.exploit-db.com/exploits/6098 -CVE-2008-3292 - http://securityreason.com/securityalert/4033 -CVE-2008-3292 - https://www.exploit-db.com/exploits/6115 -CVE-2008-3293 - http://securityreason.com/securityalert/4034 -CVE-2008-3293 - https://www.exploit-db.com/exploits/6112 -CVE-2008-3297 - http://securityreason.com/securityalert/4035 -CVE-2008-3298 - http://securityreason.com/securityalert/4035 -CVE-2008-3301 - https://www.exploit-db.com/exploits/6073 -CVE-2008-3302 - http://securityreason.com/securityalert/4036 -CVE-2008-3302 - https://www.exploit-db.com/exploits/6073 -CVE-2008-3303 - http://securityreason.com/securityalert/4036 -CVE-2008-3303 - https://www.exploit-db.com/exploits/6073 -CVE-2008-3304 - https://www.exploit-db.com/exploits/6073 -CVE-2008-3305 - http://securityreason.com/securityalert/4037 -CVE-2008-3305 - https://www.exploit-db.com/exploits/6117 -CVE-2008-3307 - http://securityreason.com/securityalert/4037 -CVE-2008-3307 - https://www.exploit-db.com/exploits/6117 -CVE-2008-3308 - http://securityreason.com/securityalert/4037 -CVE-2008-3308 - https://www.exploit-db.com/exploits/6117 -CVE-2008-3309 - http://securityreason.com/securityalert/4038 -CVE-2008-3309 - https://www.exploit-db.com/exploits/6104 -CVE-2008-3310 - http://securityreason.com/securityalert/4039 -CVE-2008-3310 - https://www.exploit-db.com/exploits/6119 -CVE-2008-3311 - http://securityreason.com/securityalert/4040 -CVE-2008-3314 - http://aluigi.altervista.org/adv/zdaemonull-adv.txt -CVE-2008-3314 - http://aluigi.org/poc/zdaemonull.zip -CVE-2008-3314 - http://securityreason.com/securityalert/4043 -CVE-2008-3315 - http://securityreason.com/securityalert/4041 -CVE-2008-3317 - http://securityreason.com/securityalert/4042 -CVE-2008-3317 - https://www.exploit-db.com/exploits/6066 -CVE-2008-3318 - https://www.exploit-db.com/exploits/6064 -CVE-2008-3319 - http://www.securityfocus.com/bid/30205 -CVE-2008-3319 - https://www.exploit-db.com/exploits/6062 -CVE-2008-3320 - https://www.exploit-db.com/exploits/6061 -CVE-2008-3321 - https://www.exploit-db.com/exploits/6065 -CVE-2008-3322 - https://www.exploit-db.com/exploits/6063 -CVE-2008-3323 - http://securityreason.com/securityalert/4051 -CVE-2008-3323 - https://bugzilla.redhat.com/show_bug.cgi?id=449929 -CVE-2008-3324 - http://seclists.org/fulldisclosure/2008/Aug/0302.html -CVE-2008-3326 - https://www.exploit-db.com/exploits/6653 -CVE-2008-3331 - http://marc.info/?l=bugtraq&m=121130774617956&w=4 -CVE-2008-3331 - http://securityreason.com/securityalert/4044 -CVE-2008-3331 - https://www.exploit-db.com/exploits/5657 -CVE-2008-3332 - http://marc.info/?l=bugtraq&m=121130774617956&w=4 -CVE-2008-3332 - http://securityreason.com/securityalert/4044 -CVE-2008-3332 - https://www.exploit-db.com/exploits/5657 -CVE-2008-3333 - http://www.mantisbt.org/bugs/view.php?id=9154 -CVE-2008-3333 - https://bugzilla.redhat.com/show_bug.cgi?id=456044 -CVE-2008-3335 - http://punbb.informer.com/ -CVE-2008-3336 - http://punbb.informer.com/ -CVE-2008-3342 - http://securityreason.com/securityalert/4050 -CVE-2008-3343 - http://securityreason.com/securityalert/4050 -CVE-2008-3344 - http://securityreason.com/securityalert/4049 -CVE-2008-3345 - http://securityreason.com/securityalert/4049 -CVE-2008-3346 - http://securityreason.com/securityalert/4045 -CVE-2008-3346 - https://www.exploit-db.com/exploits/6114 -CVE-2008-3347 - http://securityreason.com/securityalert/4046 -CVE-2008-3348 - http://securityreason.com/securityalert/4046 -CVE-2008-3350 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2008-3351 - http://securityreason.com/securityalert/4053 -CVE-2008-3351 - https://www.exploit-db.com/exploits/6125 -CVE-2008-3352 - http://securityreason.com/securityalert/4052 -CVE-2008-3352 - https://www.exploit-db.com/exploits/6128 -CVE-2008-3355 - http://securityreason.com/securityalert/4047 -CVE-2008-3355 - https://www.exploit-db.com/exploits/6132 -CVE-2008-3360 - http://securityreason.com/securityalert/4058 -CVE-2008-3360 - https://www.exploit-db.com/exploits/6103 -CVE-2008-3360 - https://www.exploit-db.com/exploits/6116 -CVE-2008-3360 - https://www.exploit-db.com/exploits/6121 -CVE-2008-3360 - https://www.exploit-db.com/exploits/6238 -CVE-2008-3361 - http://securityreason.com/securityalert/4059 -CVE-2008-3361 - https://www.exploit-db.com/exploits/6118 -CVE-2008-3361 - https://www.exploit-db.com/exploits/6227 -CVE-2008-3362 - http://securityreason.com/securityalert/4060 -CVE-2008-3362 - https://www.exploit-db.com/exploits/6127 -CVE-2008-3363 - http://securityreason.com/securityalert/4056 -CVE-2008-3363 - https://www.exploit-db.com/exploits/6149 -CVE-2008-3364 - http://securityreason.com/securityalert/4061 -CVE-2008-3364 - https://www.exploit-db.com/exploits/6152 -CVE-2008-3365 - http://securityreason.com/securityalert/4062 -CVE-2008-3365 - https://www.exploit-db.com/exploits/6150 -CVE-2008-3366 - http://securityreason.com/securityalert/4063 -CVE-2008-3366 - https://www.exploit-db.com/exploits/6146 -CVE-2008-3367 - http://securityreason.com/securityalert/4055 -CVE-2008-3368 - http://securityreason.com/securityalert/4064 -CVE-2008-3368 - https://www.exploit-db.com/exploits/6153 -CVE-2008-3369 - http://securityreason.com/securityalert/4065 -CVE-2008-3369 - https://www.exploit-db.com/exploits/6154 -CVE-2008-3370 - http://securityreason.com/securityalert/4066 -CVE-2008-3371 - http://securityreason.com/securityalert/4067 -CVE-2008-3371 - http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt -CVE-2008-3371 - https://www.exploit-db.com/exploits/6148 -CVE-2008-3371 - https://www.exploit-db.com/exploits/6451 -CVE-2008-3371 - https://www.exploit-db.com/exploits/9095 -CVE-2008-3372 - http://securityreason.com/securityalert/4068 -CVE-2008-3372 - https://www.exploit-db.com/exploits/6143 -CVE-2008-3374 - https://www.exploit-db.com/exploits/6159 -CVE-2008-3375 - http://securityreason.com/securityalert/4069 -CVE-2008-3377 - http://securityreason.com/securityalert/4070 -CVE-2008-3377 - https://www.exploit-db.com/exploits/6134 -CVE-2008-3378 - http://securityreason.com/securityalert/4071 -CVE-2008-3378 - https://www.exploit-db.com/exploits/6133 -CVE-2008-3380 - http://securityreason.com/securityalert/4072 -CVE-2008-3382 - https://www.exploit-db.com/exploits/6108 -CVE-2008-3383 - https://www.exploit-db.com/exploits/6111 -CVE-2008-3384 - http://securityreason.com/securityalert/4073 -CVE-2008-3384 - https://www.exploit-db.com/exploits/6107 -CVE-2008-3385 - http://securityreason.com/securityalert/4074 -CVE-2008-3385 - https://www.exploit-db.com/exploits/6080 -CVE-2008-3386 - http://securityreason.com/securityalert/4075 -CVE-2008-3386 - https://www.exploit-db.com/exploits/6092 -CVE-2008-3387 - http://securityreason.com/securityalert/4076 -CVE-2008-3387 - https://www.exploit-db.com/exploits/6102 -CVE-2008-3388 - http://securityreason.com/securityalert/4079 -CVE-2008-3390 - http://securityreason.com/securityalert/4080 -CVE-2008-3390 - https://www.exploit-db.com/exploits/6156 -CVE-2008-3396 - http://aluigi.altervista.org/adv/ut2004null-adv.txt -CVE-2008-3396 - http://aluigi.org/poc/ut2004null.zip -CVE-2008-3398 - http://securityreason.com/securityalert/4081 -CVE-2008-3398 - https://www.exploit-db.com/exploits/6131 -CVE-2008-3399 - http://securityreason.com/securityalert/4081 -CVE-2008-3399 - https://www.exploit-db.com/exploits/6131 -CVE-2008-3400 - http://securityreason.com/securityalert/4081 -CVE-2008-3400 - https://www.exploit-db.com/exploits/6131 -CVE-2008-3401 - http://securityreason.com/securityalert/4082 -CVE-2008-3401 - https://www.exploit-db.com/exploits/6161 -CVE-2008-3402 - http://securityreason.com/securityalert/4083 -CVE-2008-3402 - https://www.exploit-db.com/exploits/6162 -CVE-2008-3403 - http://securityreason.com/securityalert/4084 -CVE-2008-3403 - https://www.exploit-db.com/exploits/6109 -CVE-2008-3404 - http://securityreason.com/securityalert/4085 -CVE-2008-3405 - http://securityreason.com/securityalert/4086 -CVE-2008-3405 - https://www.exploit-db.com/exploits/6164 -CVE-2008-3406 - http://securityreason.com/securityalert/4087 -CVE-2008-3406 - https://www.exploit-db.com/exploits/6140 -CVE-2008-3407 - http://securityreason.com/securityalert/4087 -CVE-2008-3407 - https://www.exploit-db.com/exploits/6140 -CVE-2008-3408 - http://securityreason.com/securityalert/4088 -CVE-2008-3408 - https://www.exploit-db.com/exploits/6157 -CVE-2008-3409 - http://aluigi.altervista.org/adv/ut3mendo-adv.txt -CVE-2008-3409 - http://aluigi.org/poc/ut3mendo.zip -CVE-2008-3410 - http://aluigi.altervista.org/adv/ut3mendo-adv.txt -CVE-2008-3410 - http://aluigi.org/poc/ut3mendo.zip -CVE-2008-3411 - http://securityreason.com/securityalert/4089 -CVE-2008-3412 - http://securityreason.com/securityalert/4090 -CVE-2008-3412 - https://www.exploit-db.com/exploits/6139 -CVE-2008-3413 - http://securityreason.com/securityalert/4091 -CVE-2008-3413 - https://www.exploit-db.com/exploits/6144 -CVE-2008-3414 - http://securityreason.com/securityalert/4092 -CVE-2008-3414 - https://www.exploit-db.com/exploits/6145 -CVE-2008-3415 - http://securityreason.com/securityalert/4093 -CVE-2008-3415 - https://www.exploit-db.com/exploits/6142 -CVE-2008-3416 - http://securityreason.com/securityalert/4094 -CVE-2008-3416 - https://www.exploit-db.com/exploits/6137 -CVE-2008-3417 - http://securityreason.com/securityalert/4095 -CVE-2008-3417 - https://www.exploit-db.com/exploits/6135 -CVE-2008-3418 - http://securityreason.com/securityalert/4077 -CVE-2008-3418 - https://www.exploit-db.com/exploits/6141 -CVE-2008-3419 - http://securityreason.com/securityalert/4096 -CVE-2008-3419 - https://www.exploit-db.com/exploits/6147 -CVE-2008-3420 - http://securityreason.com/securityalert/4097 -CVE-2008-3420 - https://www.exploit-db.com/exploits/6138 -CVE-2008-3430 - http://packetstormsecurity.org/0807-exploits/siol-overflow.txt -CVE-2008-3431 - http://securityreason.com/securityalert/4107 -CVE-2008-3431 - http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability -CVE-2008-3431 - https://www.exploit-db.com/exploits/6218 -CVE-2008-3443 - http://securityreason.com/securityalert/4158 -CVE-2008-3443 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570 -CVE-2008-3443 - https://www.exploit-db.com/exploits/6239 -CVE-2008-3445 - http://securityreason.com/securityalert/4103 -CVE-2008-3445 - https://www.exploit-db.com/exploits/6180 -CVE-2008-3446 - http://securityreason.com/securityalert/4101 -CVE-2008-3446 - https://www.exploit-db.com/exploits/6179 -CVE-2008-3447 - https://www.exploit-db.com/exploits/6174 -CVE-2008-3448 - http://securityreason.com/securityalert/4102 -CVE-2008-3452 - http://securityreason.com/securityalert/4104 -CVE-2008-3452 - https://www.exploit-db.com/exploits/6171 -CVE-2008-3454 - http://securityreason.com/securityalert/4105 -CVE-2008-3454 - https://www.exploit-db.com/exploits/6163 -CVE-2008-3455 - http://securityreason.com/securityalert/4106 -CVE-2008-3455 - https://www.exploit-db.com/exploits/6160 -CVE-2008-3460 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 -CVE-2008-3464 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-066 -CVE-2008-3464 - https://www.exploit-db.com/exploits/6757 -CVE-2008-3465 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071 -CVE-2008-3466 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-059 -CVE-2008-3471 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 -CVE-2008-3472 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -CVE-2008-3473 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -CVE-2008-3474 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -CVE-2008-3475 - http://ifsec.blogspot.com/2008/10/internet-explorer-6-componentfrompoint.html -CVE-2008-3475 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -CVE-2008-3476 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -CVE-2008-3477 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 -CVE-2008-3479 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065 -CVE-2008-3480 - http://securityreason.com/securityalert/4197 -CVE-2008-3480 - http://www.coresecurity.com/content/anzio-web-print-object-buffer-overflow -CVE-2008-3480 - https://www.exploit-db.com/exploits/6278 -CVE-2008-3481 - http://securityreason.com/securityalert/4108 -CVE-2008-3481 - https://www.exploit-db.com/exploits/6178 -CVE-2008-3484 - http://securityreason.com/securityalert/4109 -CVE-2008-3484 - https://www.exploit-db.com/exploits/6187 -CVE-2008-3485 - http://securityreason.com/securityalert/4110 -CVE-2008-3486 - http://securityreason.com/securityalert/4108 -CVE-2008-3486 - https://www.exploit-db.com/exploits/6178 -CVE-2008-3487 - http://securityreason.com/securityalert/4111 -CVE-2008-3487 - https://www.exploit-db.com/exploits/6182 -CVE-2008-3489 - http://securityreason.com/securityalert/4112 -CVE-2008-3489 - https://www.exploit-db.com/exploits/6176 -CVE-2008-3490 - http://securityreason.com/securityalert/4113 -CVE-2008-3490 - https://www.exploit-db.com/exploits/6184 -CVE-2008-3491 - http://securityreason.com/securityalert/4117 -CVE-2008-3491 - https://www.exploit-db.com/exploits/6185 -CVE-2008-3491 - https://www.exploit-db.com/exploits/6186 -CVE-2008-3492 - http://aluigi.altervista.org/adv/armynchia-adv.txt -CVE-2008-3492 - http://aluigi.org/poc/armynchia.zip -CVE-2008-3493 - https://www.exploit-db.com/exploits/6181 -CVE-2008-3497 - http://securityreason.com/securityalert/4115 -CVE-2008-3497 - https://www.exploit-db.com/exploits/5937 -CVE-2008-3498 - http://securityreason.com/securityalert/4114 -CVE-2008-3498 - https://www.exploit-db.com/exploits/5939 -CVE-2008-3505 - http://securityreason.com/securityalert/4116 -CVE-2008-3505 - https://www.exploit-db.com/exploits/5941 -CVE-2008-3506 - http://securityreason.com/securityalert/4116 -CVE-2008-3506 - https://www.exploit-db.com/exploits/5941 -CVE-2008-3507 - https://www.exploit-db.com/exploits/6207 -CVE-2008-3508 - https://www.exploit-db.com/exploits/6206 -CVE-2008-3509 - https://www.exploit-db.com/exploits/6209 -CVE-2008-3509 - https://www.exploit-db.com/exploits/6210 -CVE-2008-3514 - http://securityreason.com/securityalert/4150 -CVE-2008-3520 - http://www.ubuntu.com/usn/USN-742-1 -CVE-2008-3521 - http://bugs.gentoo.org/attachment.cgi?id=163282&action=view -CVE-2008-3521 - http://www.ubuntu.com/usn/USN-742-1 -CVE-2008-3522 - http://bugs.gentoo.org/attachment.cgi?id=163282&action=view -CVE-2008-3522 - http://www.ubuntu.com/usn/USN-742-1 -CVE-2008-3525 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364 -CVE-2008-3528 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-3529 - https://www.exploit-db.com/exploits/8798 -CVE-2008-3533 - http://bugzilla.gnome.org/show_bug.cgi?id=546364 -CVE-2008-3533 - https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860 -CVE-2008-3536 - http://securityreason.com/securityalert/4209 -CVE-2008-3537 - http://securityreason.com/securityalert/4209 -CVE-2008-3539 - http://securityreason.com/securityalert/4236 -CVE-2008-3542 - http://securityreason.com/securityalert/4346 -CVE-2008-3544 - http://securityreason.com/securityalert/4397 -CVE-2008-3545 - http://securityreason.com/securityalert/4399 -CVE-2008-3546 - http://kerneltrap.org/mailarchive/git/2008/7/16/2529284 -CVE-2008-3554 - https://www.exploit-db.com/exploits/6214 -CVE-2008-3555 - http://securityreason.com/securityalert/4120 -CVE-2008-3555 - https://www.exploit-db.com/exploits/6208 -CVE-2008-3556 - http://securityreason.com/securityalert/4119 -CVE-2008-3557 - http://securityreason.com/securityalert/4118 -CVE-2008-3557 - https://www.exploit-db.com/exploits/6213 -CVE-2008-3558 - https://www.exploit-db.com/exploits/6220 -CVE-2008-3560 - http://lostmon.blogspot.com/2008/08/kshop-module-search-variable-and-field.html -CVE-2008-3563 - http://securityreason.com/securityalert/4121 -CVE-2008-3563 - https://www.exploit-db.com/exploits/6204 -CVE-2008-3564 - http://securityreason.com/securityalert/4122 -CVE-2008-3564 - https://www.exploit-db.com/exploits/6203 -CVE-2008-3568 - http://securityreason.com/securityalert/4123 -CVE-2008-3569 - http://securityreason.com/securityalert/4127 -CVE-2008-3570 - http://securityreason.com/securityalert/4124 -CVE-2008-3570 - https://www.exploit-db.com/exploits/6183 -CVE-2008-3571 - http://securityreason.com/securityalert/4128 -CVE-2008-3571 - https://www.exploit-db.com/exploits/6196 -CVE-2008-3572 - http://securityreason.com/securityalert/4129 -CVE-2008-3574 - http://securityreason.com/securityalert/4125 -CVE-2008-3575 - http://securityreason.com/securityalert/4130 -CVE-2008-3578 - http://securityreason.com/securityalert/4126 -CVE-2008-3578 - https://www.exploit-db.com/exploits/6201 -CVE-2008-3580 - http://securityreason.com/securityalert/4131 -CVE-2008-3580 - https://www.exploit-db.com/exploits/6192 -CVE-2008-3581 - http://securityreason.com/securityalert/4131 -CVE-2008-3581 - https://www.exploit-db.com/exploits/6192 -CVE-2008-3582 - http://securityreason.com/securityalert/4132 -CVE-2008-3583 - https://www.exploit-db.com/exploits/6195 -CVE-2008-3585 - http://securityreason.com/securityalert/4133 -CVE-2008-3585 - https://www.exploit-db.com/exploits/6189 -CVE-2008-3586 - https://www.exploit-db.com/exploits/6199 -CVE-2008-3587 - http://securityreason.com/securityalert/4134 -CVE-2008-3588 - http://securityreason.com/securityalert/4135 -CVE-2008-3588 - https://www.exploit-db.com/exploits/6190 -CVE-2008-3589 - http://securityreason.com/securityalert/4136 -CVE-2008-3589 - https://www.exploit-db.com/exploits/6194 -CVE-2008-3591 - http://securityreason.com/securityalert/4137 -CVE-2008-3591 - https://www.exploit-db.com/exploits/6177 -CVE-2008-3592 - http://securityreason.com/securityalert/4137 -CVE-2008-3592 - https://www.exploit-db.com/exploits/6177 -CVE-2008-3593 - http://securityreason.com/securityalert/4138 -CVE-2008-3593 - https://www.exploit-db.com/exploits/6200 -CVE-2008-3594 - http://securityreason.com/securityalert/4139 -CVE-2008-3594 - https://www.exploit-db.com/exploits/6193 -CVE-2008-3595 - https://www.exploit-db.com/exploits/6224 -CVE-2008-3597 - http://aluigi.altervista.org/adv/skulltagod-adv.txt -CVE-2008-3598 - http://securityreason.com/securityalert/4140 -CVE-2008-3598 - https://www.exploit-db.com/exploits/6226 -CVE-2008-3599 - http://securityreason.com/securityalert/4141 -CVE-2008-3599 - https://www.exploit-db.com/exploits/6228 -CVE-2008-3600 - http://securityreason.com/securityalert/4142 -CVE-2008-3600 - https://www.exploit-db.com/exploits/6222 -CVE-2008-3601 - http://securityreason.com/securityalert/4144 -CVE-2008-3601 - https://www.exploit-db.com/exploits/6223 -CVE-2008-3602 - http://securityreason.com/securityalert/4143 -CVE-2008-3602 - https://www.exploit-db.com/exploits/6225 -CVE-2008-3603 - https://www.exploit-db.com/exploits/6221 -CVE-2008-3604 - http://securityreason.com/securityalert/4145 -CVE-2008-3604 - https://www.exploit-db.com/exploits/6230 -CVE-2008-3606 - http://securityreason.com/securityalert/4146 -CVE-2008-3607 - http://securityreason.com/securityalert/4147 -CVE-2008-3640 - http://www.cups.org/str.php?L2919 -CVE-2008-3641 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9666 -CVE-2008-3648 - http://packetstormsecurity.org/0808-advisories/Nslookup-Crash.txt -CVE-2008-3649 - http://securityreason.com/securityalert/4149 -CVE-2008-3649 - https://www.exploit-db.com/exploits/6167 -CVE-2008-3656 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9682 -CVE-2008-3657 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9793 -CVE-2008-3658 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9724 -CVE-2008-3660 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9597 -CVE-2008-3663 - http://securityreason.com/securityalert/4304 -CVE-2008-3664 - http://securityreason.com/securityalert/4229 -CVE-2008-3669 - http://securityreason.com/securityalert/4151 -CVE-2008-3669 - https://www.exploit-db.com/exploits/6165 -CVE-2008-3670 - http://securityreason.com/securityalert/4149 -CVE-2008-3670 - https://www.exploit-db.com/exploits/6167 -CVE-2008-3673 - http://securityreason.com/securityalert/4153 -CVE-2008-3673 - https://www.exploit-db.com/exploits/6169 -CVE-2008-3674 - http://securityreason.com/securityalert/4152 -CVE-2008-3674 - https://www.exploit-db.com/exploits/6170 -CVE-2008-3675 - http://securityreason.com/securityalert/4154 -CVE-2008-3675 - https://www.exploit-db.com/exploits/6235 -CVE-2008-3676 - http://securityreason.com/securityalert/4155 -CVE-2008-3679 - http://www.securityfocus.com/bid/30665 -CVE-2008-3679 - http://www.securityfocus.com/bid/30665/exploit -CVE-2008-3680 - http://aluigi.altervista.org/adv/ventrilobotomy-adv.txt -CVE-2008-3680 - http://aluigi.org/poc/ventrilobotomy.zip -CVE-2008-3680 - http://securityreason.com/securityalert/4156 -CVE-2008-3680 - https://www.exploit-db.com/exploits/6237 -CVE-2008-3681 - http://securityreason.com/securityalert/4157 -CVE-2008-3681 - https://www.exploit-db.com/exploits/6234 -CVE-2008-3691 - http://securityreason.com/securityalert/4202 -CVE-2008-3691 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3691 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3691 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3691 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3691 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3691 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3691 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3692 - http://securityreason.com/securityalert/4202 -CVE-2008-3692 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3692 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3692 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3692 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3692 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3692 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3692 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3693 - http://securityreason.com/securityalert/4202 -CVE-2008-3693 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3693 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3693 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3693 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3693 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3693 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3693 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3694 - http://securityreason.com/securityalert/4202 -CVE-2008-3694 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3694 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3694 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3694 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3694 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3694 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3694 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3695 - http://securityreason.com/securityalert/4202 -CVE-2008-3695 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3695 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3695 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3695 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3695 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3695 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3695 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3696 - http://securityreason.com/securityalert/4202 -CVE-2008-3696 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3696 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3696 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3696 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3696 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3696 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3696 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3697 - http://securityreason.com/securityalert/4202 -CVE-2008-3697 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3697 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3698 - http://securityreason.com/securityalert/4202 -CVE-2008-3698 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html -CVE-2008-3698 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3698 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3698 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3698 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3698 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3698 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3702 - http://securityreason.com/securityalert/4159 -CVE-2008-3702 - https://www.exploit-db.com/exploits/6216 -CVE-2008-3703 - http://securityreason.com/securityalert/4161 -CVE-2008-3704 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -CVE-2008-3704 - https://www.exploit-db.com/exploits/6244 -CVE-2008-3704 - https://www.exploit-db.com/exploits/6317 -CVE-2008-3706 - http://securityreason.com/securityalert/4162 -CVE-2008-3706 - https://www.exploit-db.com/exploits/6249 -CVE-2008-3707 - http://packetstormsecurity.org/0808-exploits/cyboards-rfilfixss.txt -CVE-2008-3708 - http://securityreason.com/securityalert/4163 -CVE-2008-3708 - https://www.exploit-db.com/exploits/6247 -CVE-2008-3709 - http://packetstormsecurity.org/0808-exploits/cyboards-rfilfixss.txt -CVE-2008-3710 - http://packetstormsecurity.org/0808-exploits/cyboards-rfilfixss.txt -CVE-2008-3711 - http://securityreason.com/securityalert/4167 -CVE-2008-3711 - https://www.exploit-db.com/exploits/6255 -CVE-2008-3712 - http://securityreason.com/securityalert/4164 -CVE-2008-3713 - http://securityreason.com/securityalert/4165 -CVE-2008-3713 - https://www.exploit-db.com/exploits/6258 -CVE-2008-3714 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432 -CVE-2008-3714 - http://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764 -CVE-2008-3715 - http://securityreason.com/securityalert/4166 -CVE-2008-3718 - http://securityreason.com/securityalert/4168 -CVE-2008-3718 - https://www.exploit-db.com/exploits/6260 -CVE-2008-3719 - https://www.exploit-db.com/exploits/6270 -CVE-2008-3720 - http://securityreason.com/securityalert/4169 -CVE-2008-3720 - https://www.exploit-db.com/exploits/6250 -CVE-2008-3721 - http://securityreason.com/securityalert/4169 -CVE-2008-3721 - https://www.exploit-db.com/exploits/6250 -CVE-2008-3723 - http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.html -CVE-2008-3723 - http://packetstormsecurity.org/0808-exploits/phpizabi-traverse.txt -CVE-2008-3724 - http://www.osvdb.org/47554 -CVE-2008-3725 - https://www.exploit-db.com/exploits/6271 -CVE-2008-3726 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 -CVE-2008-3726 - http://securityreason.com/securityalert/4172 -CVE-2008-3726 - http://www.oliverkarow.de/research/mailscan.txt -CVE-2008-3727 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 -CVE-2008-3727 - http://securityreason.com/securityalert/4172 -CVE-2008-3727 - http://www.oliverkarow.de/research/mailscan.txt -CVE-2008-3727 - https://www.exploit-db.com/exploits/6407 -CVE-2008-3728 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 -CVE-2008-3728 - http://securityreason.com/securityalert/4172 -CVE-2008-3728 - http://www.oliverkarow.de/research/mailscan.txt -CVE-2008-3729 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 -CVE-2008-3729 - http://securityreason.com/securityalert/4172 -CVE-2008-3729 - http://www.oliverkarow.de/research/mailscan.txt -CVE-2008-3732 - http://securityreason.com/securityalert/4170 -CVE-2008-3732 - https://www.exploit-db.com/exploits/6252 -CVE-2008-3733 - http://securityreason.com/securityalert/4171 -CVE-2008-3733 - https://www.exploit-db.com/exploits/6253 -CVE-2008-3734 - http://securityreason.com/securityalert/4173 -CVE-2008-3734 - https://www.exploit-db.com/exploits/6257 -CVE-2008-3735 - http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.html -CVE-2008-3735 - http://packetstormsecurity.org/0808-exploits/phpizabi-traverse.txt -CVE-2008-3748 - http://securityreason.com/securityalert/4174 -CVE-2008-3748 - https://www.exploit-db.com/exploits/6277 -CVE-2008-3749 - http://securityreason.com/securityalert/4175 -CVE-2008-3749 - https://www.exploit-db.com/exploits/6276 -CVE-2008-3749 - https://www.exploit-db.com/exploits/6936 -CVE-2008-3750 - http://packetstormsecurity.org/0808-exploits/urlrotator-sql.txt -CVE-2008-3750 - https://www.exploit-db.com/exploits/6949 -CVE-2008-3751 - http://packetstormsecurity.org/0808-exploits/shorturl-sql.txt -CVE-2008-3751 - https://www.exploit-db.com/exploits/6940 -CVE-2008-3752 - http://www.packetstormsecurity.org/0808-exploits/adexchange-sql.txt -CVE-2008-3753 - http://www.packetstormsecurity.org/0808-exploits/prograte-sql.txt -CVE-2008-3754 - http://www.packetstormsecurity.org/0808-exploits/stylishtextads-sql.txt -CVE-2008-3755 - http://packetstormsecurity.org/0808-exploits/classifieds-sql.txt -CVE-2008-3755 - https://www.exploit-db.com/exploits/6945 -CVE-2008-3756 - http://packetstormsecurity.org/0808-exploits/viral-sql.txt -CVE-2008-3756 - https://www.exploit-db.com/exploits/6941 -CVE-2008-3757 - http://www.packetstormsecurity.org/0808-exploits/forcedmatrix-sql.txt -CVE-2008-3757 - https://www.exploit-db.com/exploits/6939 -CVE-2008-3758 - http://securityreason.com/securityalert/4176 -CVE-2008-3761 - http://securityreason.com/securityalert/4177 -CVE-2008-3761 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2008-3761 - https://www.exploit-db.com/exploits/6262 -CVE-2008-3762 - http://securityreason.com/securityalert/4178 -CVE-2008-3762 - https://www.exploit-db.com/exploits/6261 -CVE-2008-3763 - http://securityreason.com/securityalert/4178 -CVE-2008-3763 - https://www.exploit-db.com/exploits/6261 -CVE-2008-3764 - http://securityreason.com/securityalert/4178 -CVE-2008-3764 - https://www.exploit-db.com/exploits/6261 -CVE-2008-3765 - http://packetstormsecurity.org/0808-exploits/quickpoll-sql.txt -CVE-2008-3765 - https://www.exploit-db.com/exploits/7105 -CVE-2008-3767 - http://securityreason.com/securityalert/4179 -CVE-2008-3767 - https://www.exploit-db.com/exploits/6280 -CVE-2008-3768 - http://securityreason.com/securityalert/4180 -CVE-2008-3768 - https://www.exploit-db.com/exploits/6273 -CVE-2008-3769 - http://securityreason.com/securityalert/4181 -CVE-2008-3770 - http://securityreason.com/securityalert/4181 -CVE-2008-3771 - https://www.exploit-db.com/exploits/6279 -CVE-2008-3772 - https://www.exploit-db.com/exploits/6279 -CVE-2008-3773 - http://marc.info/?l=bugtraq&m=121933258013788&w=2 -CVE-2008-3773 - http://securityreason.com/securityalert/4182 -CVE-2008-3773 - http://www.coresecurity.com/content/vbulletin-cross-site-scripting-vulnerability -CVE-2008-3774 - http://packetstormsecurity.org/0808-exploits/simasycms-sql.txt -CVE-2008-3775 - http://securityreason.com/securityalert/4183 -CVE-2008-3779 - http://securityreason.com/securityalert/4184 -CVE-2008-3779 - https://www.exploit-db.com/exploits/6294 -CVE-2008-3780 - http://securityreason.com/securityalert/4184 -CVE-2008-3780 - https://www.exploit-db.com/exploits/6294 -CVE-2008-3783 - http://securityreason.com/securityalert/4185 -CVE-2008-3783 - https://www.exploit-db.com/exploits/6297 -CVE-2008-3784 - http://securityreason.com/securityalert/4186 -CVE-2008-3784 - https://www.exploit-db.com/exploits/6296 -CVE-2008-3785 - http://securityreason.com/securityalert/4189 -CVE-2008-3785 - https://www.exploit-db.com/exploits/6295 -CVE-2008-3787 - http://securityreason.com/securityalert/4187 -CVE-2008-3787 - https://www.exploit-db.com/exploits/6298 -CVE-2008-3788 - http://packetstormsecurity.org/0808-exploits/photocart-sql.txt -CVE-2008-3788 - http://securityreason.com/securityalert/4188 -CVE-2008-3788 - https://www.exploit-db.com/exploits/6285 -CVE-2008-3792 - http://securityreason.com/securityalert/4210 -CVE-2008-3794 - http://securityreason.com/securityalert/4190 -CVE-2008-3794 - https://www.exploit-db.com/exploits/6293 -CVE-2008-3795 - http://securityreason.com/securityalert/4173 -CVE-2008-3795 - https://www.exploit-db.com/exploits/6257 -CVE-2008-3821 - http://securityreason.com/securityalert/4916 -CVE-2008-3823 - http://securityreason.com/securityalert/4245 -CVE-2008-3824 - http://securityreason.com/securityalert/4245 -CVE-2008-3825 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2008-3827 - http://securityreason.com/securityalert/4326 -CVE-2008-3827 - http://www.ocert.org/advisories/ocert-2008-013.html -CVE-2008-3833 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980 -CVE-2008-3834 - https://www.exploit-db.com/exploits/7822 -CVE-2008-3835 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9643 -CVE-2008-3837 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-3837 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9950 -CVE-2008-3840 - http://securityreason.com/securityalert/4192 -CVE-2008-3841 - http://securityreason.com/securityalert/4181 -CVE-2008-3842 - http://securityreason.com/securityalert/4193 -CVE-2008-3843 - http://securityreason.com/securityalert/4193 -CVE-2008-3845 - http://securityreason.com/securityalert/4192 -CVE-2008-3845 - https://www.exploit-db.com/exploits/6307 -CVE-2008-3848 - https://www.exploit-db.com/exploits/6309 -CVE-2008-3851 - http://securityreason.com/securityalert/4195 -CVE-2008-3851 - https://www.exploit-db.com/exploits/6300 -CVE-2008-3859 - http://securityreason.com/securityalert/4196 -CVE-2008-3859 - https://www.exploit-db.com/exploits/6314 -CVE-2008-3861 - http://securityreason.com/securityalert/4198 -CVE-2008-3861 - https://www.exploit-db.com/exploits/6320 -CVE-2008-3862 - http://securityreason.com/securityalert/4489 -CVE-2008-3863 - http://securityreason.com/securityalert/4488 -CVE-2008-3863 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9939 -CVE-2008-3864 - http://securityreason.com/securityalert/4937 -CVE-2008-3865 - http://securityreason.com/securityalert/4937 -CVE-2008-3867 - http://securityreason.com/securityalert/4537 -CVE-2008-3868 - http://securityreason.com/securityalert/4537 -CVE-2008-3874 - http://securityreason.com/securityalert/4176 -CVE-2008-3877 - http://securityreason.com/securityalert/4199 -CVE-2008-3877 - https://www.exploit-db.com/exploits/6322 -CVE-2008-3877 - https://www.exploit-db.com/exploits/7577 -CVE-2008-3878 - http://securityreason.com/securityalert/4200 -CVE-2008-3878 - https://www.exploit-db.com/exploits/6318 -CVE-2008-3879 - http://securityreason.com/securityalert/4201 -CVE-2008-3879 - https://www.exploit-db.com/exploits/6319 -CVE-2008-3883 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-3889 - http://securityreason.com/securityalert/4239 -CVE-2008-3889 - https://www.exploit-db.com/exploits/6472 -CVE-2008-3892 - http://securityreason.com/securityalert/4202 -CVE-2008-3892 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html -CVE-2008-3892 - http://www.vmware.com/support/player/doc/releasenotes_player.html -CVE-2008-3892 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html -CVE-2008-3892 - http://www.vmware.com/support/server/doc/releasenotes_server.html -CVE-2008-3892 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -CVE-2008-3892 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -CVE-2008-3892 - https://www.exploit-db.com/exploits/6345 -CVE-2008-3894 - http://securityreason.com/securityalert/4207 -CVE-2008-3895 - http://securityreason.com/securityalert/4211 -CVE-2008-3896 - http://securityreason.com/securityalert/4204 -CVE-2008-3896 - http://securityreason.com/securityalert/4206 -CVE-2008-3897 - http://securityreason.com/securityalert/4212 -CVE-2008-3898 - http://securityreason.com/securityalert/4213 -CVE-2008-3899 - http://securityreason.com/securityalert/4203 -CVE-2008-3900 - http://securityreason.com/securityalert/4205 -CVE-2008-3902 - http://securityreason.com/securityalert/4214 -CVE-2008-3905 - http://www.openwall.com/lists/oss-security/2008/09/03/3 -CVE-2008-3908 - http://securityreason.com/securityalert/4217 -CVE-2008-3909 - http://www.djangoproject.com/weblog/2008/sep/02/security/ -CVE-2008-3909 - https://bugzilla.redhat.com/show_bug.cgi?id=460966 -CVE-2008-3917 - http://securityreason.com/securityalert/4219 -CVE-2008-3921 - http://securityreason.com/securityalert/4218 -CVE-2008-3922 - http://securityreason.com/securityalert/4218 -CVE-2008-3922 - https://www.exploit-db.com/exploits/6368 -CVE-2008-3923 - http://securityreason.com/securityalert/4220 -CVE-2008-3923 - https://www.exploit-db.com/exploits/6313 -CVE-2008-3924 - http://securityreason.com/securityalert/4220 -CVE-2008-3924 - https://www.exploit-db.com/exploits/6313 -CVE-2008-3925 - http://securityreason.com/securityalert/4220 -CVE-2008-3925 - https://www.exploit-db.com/exploits/6313 -CVE-2008-3926 - http://securityreason.com/securityalert/4220 -CVE-2008-3926 - https://www.exploit-db.com/exploits/6313 -CVE-2008-3927 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-3928 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-3929 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-3930 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-3931 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-3933 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9620 -CVE-2008-3934 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9920 -CVE-2008-3936 - http://securityreason.com/securityalert/4221 -CVE-2008-3936 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3807 -CVE-2008-3941 - http://securityreason.com/securityalert/4222 -CVE-2008-3942 - http://packetstormsecurity.org/0808-exploits/phpemlak-sql.txt -CVE-2008-3943 - http://securityreason.com/securityalert/4223 -CVE-2008-3943 - https://www.exploit-db.com/exploits/6361 -CVE-2008-3944 - http://securityreason.com/securityalert/4224 -CVE-2008-3944 - https://www.exploit-db.com/exploits/6362 -CVE-2008-3945 - http://securityreason.com/securityalert/4225 -CVE-2008-3945 - https://www.exploit-db.com/exploits/6336 -CVE-2008-3948 - http://securityreason.com/securityalert/4229 -CVE-2008-3950 - http://securityreason.com/securityalert/4264 -CVE-2008-3950 - http://www.coresecurity.com/content/iphone-safari-javascript-alert-denial-of-service -CVE-2008-3951 - http://securityreason.com/securityalert/4230 -CVE-2008-3951 - https://www.exploit-db.com/exploits/6371 -CVE-2008-3952 - http://securityreason.com/securityalert/4231 -CVE-2008-3952 - https://www.exploit-db.com/exploits/6383 -CVE-2008-3953 - http://securityreason.com/securityalert/4232 -CVE-2008-3953 - https://www.exploit-db.com/exploits/6385 -CVE-2008-3954 - http://securityreason.com/securityalert/4233 -CVE-2008-3954 - https://www.exploit-db.com/exploits/6396 -CVE-2008-3955 - http://securityreason.com/securityalert/4234 -CVE-2008-3955 - https://www.exploit-db.com/exploits/6395 -CVE-2008-3968 - http://punbb.informer.com/forums/topic/19682/punbb-1220-and-13rc-hotfix-released/ -CVE-2008-3979 - https://www.exploit-db.com/exploits/8074 -CVE-2008-4019 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 -CVE-2008-4020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-056 -CVE-2008-4023 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-060 -CVE-2008-4024 - http://www.coresecurity.com/content/word-arbitrary-free -CVE-2008-4024 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4025 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4026 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 -CVE-2008-4030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-077 -CVE-2008-4033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 -CVE-2008-4036 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-064 -CVE-2008-4037 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-068 -CVE-2008-4037 - https://www.exploit-db.com/exploits/7125 -CVE-2008-4038 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-063 -CVE-2008-4039 - http://securityreason.com/securityalert/4237 -CVE-2008-4039 - https://www.exploit-db.com/exploits/6354 -CVE-2008-4041 - http://securityreason.com/securityalert/4238 -CVE-2008-4043 - http://securityreason.com/securityalert/4240 -CVE-2008-4043 - https://www.exploit-db.com/exploits/6350 -CVE-2008-4044 - http://securityreason.com/securityalert/4241 -CVE-2008-4044 - https://www.exploit-db.com/exploits/6351 -CVE-2008-4048 - http://securityreason.com/securityalert/4242 -CVE-2008-4048 - https://www.exploit-db.com/exploits/6323 -CVE-2008-4049 - http://securityreason.com/securityalert/4243 -CVE-2008-4049 - https://www.exploit-db.com/exploits/6324 -CVE-2008-4050 - http://securityreason.com/securityalert/4244 -CVE-2008-4050 - https://www.exploit-db.com/exploits/6334 -CVE-2008-4054 - http://securityreason.com/securityalert/4235 -CVE-2008-4054 - https://www.exploit-db.com/exploits/6310 -CVE-2008-4058 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4058 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9679 -CVE-2008-4059 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9529 -CVE-2008-4060 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4061 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4062 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4063 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4064 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4064 - https://bugzilla.mozilla.org/show_bug.cgi?id=441995 -CVE-2008-4065 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4067 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4068 - http://www.redhat.com/support/errata/RHSA-2008-0879.html -CVE-2008-4071 - http://securityreason.com/securityalert/4257 -CVE-2008-4071 - https://www.exploit-db.com/exploits/6424 -CVE-2008-4072 - http://securityreason.com/securityalert/4246 -CVE-2008-4072 - https://www.exploit-db.com/exploits/6431 -CVE-2008-4073 - http://securityreason.com/securityalert/4248 -CVE-2008-4073 - https://www.exploit-db.com/exploits/6426 -CVE-2008-4074 - http://securityreason.com/securityalert/4247 -CVE-2008-4074 - https://www.exploit-db.com/exploits/6433 -CVE-2008-4075 - http://securityreason.com/securityalert/4249 -CVE-2008-4075 - https://www.exploit-db.com/exploits/6430 -CVE-2008-4077 - http://securityreason.com/securityalert/4250 -CVE-2008-4078 - http://securityreason.com/securityalert/4250 -CVE-2008-4080 - http://securityreason.com/securityalert/4252 -CVE-2008-4080 - https://www.exploit-db.com/exploits/6402 -CVE-2008-4080 - https://www.youtube.com/watch?v=mm4bfsZdLmA&t=1h53m -CVE-2008-4081 - http://securityreason.com/securityalert/4258 -CVE-2008-4081 - https://www.exploit-db.com/exploits/6406 -CVE-2008-4082 - http://securityreason.com/securityalert/4251 -CVE-2008-4082 - https://www.exploit-db.com/exploits/6332 -CVE-2008-4083 - http://securityreason.com/securityalert/4251 -CVE-2008-4083 - https://www.exploit-db.com/exploits/6332 -CVE-2008-4084 - http://securityreason.com/securityalert/4254 -CVE-2008-4084 - https://www.exploit-db.com/exploits/6342 -CVE-2008-4085 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4086 - http://securityreason.com/securityalert/4253 -CVE-2008-4086 - https://www.exploit-db.com/exploits/6349 -CVE-2008-4087 - http://securityreason.com/securityalert/4259 -CVE-2008-4087 - https://www.exploit-db.com/exploits/6333 -CVE-2008-4088 - http://securityreason.com/securityalert/4255 -CVE-2008-4088 - https://www.exploit-db.com/exploits/6338 -CVE-2008-4089 - https://www.exploit-db.com/exploits/6338 -CVE-2008-4090 - http://securityreason.com/securityalert/4260 -CVE-2008-4090 - https://www.exploit-db.com/exploits/6348 -CVE-2008-4091 - https://www.exploit-db.com/exploits/6335 -CVE-2008-4092 - http://securityreason.com/securityalert/4261 -CVE-2008-4092 - https://www.exploit-db.com/exploits/6347 -CVE-2008-4093 - http://securityreason.com/securityalert/4256 -CVE-2008-4093 - https://www.exploit-db.com/exploits/6321 -CVE-2008-4096 - http://fd.the-wildcat.de/pma_e36a091q11.php -CVE-2008-4098 - http://bugs.mysql.com/bug.php?id=32167 -CVE-2008-4100 - https://www.exploit-db.com/exploits/6197 -CVE-2008-4101 - http://www.openwall.com/lists/oss-security/2008/09/11/3 -CVE-2008-4102 - http://securityreason.com/securityalert/4271 -CVE-2008-4103 - http://securityreason.com/securityalert/4275 -CVE-2008-4104 - http://securityreason.com/securityalert/4275 -CVE-2008-4105 - http://securityreason.com/securityalert/4275 -CVE-2008-4106 - http://securityreason.com/securityalert/4272 -CVE-2008-4106 - https://www.exploit-db.com/exploits/6397 -CVE-2008-4106 - https://www.exploit-db.com/exploits/6421 -CVE-2008-4107 - http://securityreason.com/securityalert/4271 -CVE-2008-4108 - http://securityreason.com/securityalert/4274 -CVE-2008-4109 - http://www.ubuntu.com/usn/usn-649-1 -CVE-2008-4110 - http://securityreason.com/securityalert/4262 -CVE-2008-4113 - http://securityreason.com/securityalert/4266 -CVE-2008-4113 - https://www.exploit-db.com/exploits/7618 -CVE-2008-4114 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 -CVE-2008-4114 - https://www.exploit-db.com/exploits/6463 -CVE-2008-4115 - http://securityreason.com/securityalert/4267 -CVE-2008-4115 - https://www.exploit-db.com/exploits/6451 -CVE-2008-4116 - http://securityreason.com/securityalert/4270 -CVE-2008-4116 - https://www.exploit-db.com/exploits/6471 -CVE-2008-4119 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/09/25.aspx -CVE-2008-4119 - http://securityreason.com/securityalert/4318 -CVE-2008-4120 - http://securityreason.com/securityalert/4324 -CVE-2008-4121 - http://securityreason.com/securityalert/4448 -CVE-2008-4122 - http://securityreason.com/securityalert/4794 -CVE-2008-4127 - http://securityreason.com/securityalert/4273 -CVE-2008-4128 - https://www.exploit-db.com/exploits/6476 -CVE-2008-4128 - https://www.exploit-db.com/exploits/6477 -CVE-2008-4133 - http://securityreason.com/securityalert/4276 -CVE-2008-4134 - http://securityreason.com/securityalert/4277 -CVE-2008-4134 - https://www.exploit-db.com/exploits/6473 -CVE-2008-4135 - http://securityreason.com/securityalert/4278 -CVE-2008-4135 - https://www.exploit-db.com/exploits/6459 -CVE-2008-4136 - https://www.exploit-db.com/exploits/6458 -CVE-2008-4137 - https://www.exploit-db.com/exploits/6475 -CVE-2008-4138 - https://www.exploit-db.com/exploits/6478 -CVE-2008-4141 - http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt -CVE-2008-4141 - http://securityreason.com/securityalert/4294 -CVE-2008-4141 - https://www.exploit-db.com/exploits/6480 -CVE-2008-4142 - https://www.exploit-db.com/exploits/6483 -CVE-2008-4144 - https://www.exploit-db.com/exploits/6364 -CVE-2008-4145 - https://www.exploit-db.com/exploits/6485 -CVE-2008-4146 - http://securityreason.com/securityalert/4295 -CVE-2008-4146 - https://www.exploit-db.com/exploits/6482 -CVE-2008-4150 - http://securityreason.com/securityalert/4296 -CVE-2008-4150 - https://www.exploit-db.com/exploits/6488 -CVE-2008-4151 - http://securityreason.com/securityalert/4297 -CVE-2008-4151 - https://www.exploit-db.com/exploits/6487 -CVE-2008-4154 - http://securityreason.com/securityalert/4279 -CVE-2008-4154 - https://www.exploit-db.com/exploits/6281 -CVE-2008-4155 - http://securityreason.com/securityalert/4280 -CVE-2008-4155 - https://www.exploit-db.com/exploits/6288 -CVE-2008-4156 - http://securityreason.com/securityalert/4281 -CVE-2008-4156 - https://www.exploit-db.com/exploits/6284 -CVE-2008-4157 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html -CVE-2008-4157 - http://packetstormsecurity.com/files/130754/Vastal-I-tech-phpVID-1.2.3-SQL-Injection.html -CVE-2008-4157 - http://seclists.org/fulldisclosure/2015/Mar/58 -CVE-2008-4157 - http://securityreason.com/securityalert/4291 -CVE-2008-4157 - https://www.exploit-db.com/exploits/6422 -CVE-2008-4158 - http://securityreason.com/securityalert/4290 -CVE-2008-4158 - https://www.exploit-db.com/exploits/6413 -CVE-2008-4159 - http://securityreason.com/securityalert/4283 -CVE-2008-4159 - https://www.exploit-db.com/exploits/6423 -CVE-2008-4161 - http://securityreason.com/securityalert/4287 -CVE-2008-4161 - https://www.exploit-db.com/exploits/6490 -CVE-2008-4162 - http://securityreason.com/securityalert/4289 -CVE-2008-4164 - http://securityreason.com/securityalert/4288 -CVE-2008-4164 - https://www.exploit-db.com/exploits/6393 -CVE-2008-4166 - http://securityreason.com/securityalert/4284 -CVE-2008-4167 - http://securityreason.com/securityalert/4282 -CVE-2008-4167 - https://www.exploit-db.com/exploits/6437 -CVE-2008-4168 - http://securityreason.com/securityalert/4285 -CVE-2008-4169 - http://securityreason.com/securityalert/4286 -CVE-2008-4169 - https://www.exploit-db.com/exploits/6467 -CVE-2008-4170 - http://securityreason.com/securityalert/4293 -CVE-2008-4172 - http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt -CVE-2008-4173 - http://securityreason.com/securityalert/4292 -CVE-2008-4173 - https://www.exploit-db.com/exploits/6486 -CVE-2008-4174 - http://packetstormsecurity.org/0809-exploits/dynamicmp3-xss.txt -CVE-2008-4175 - http://securityreason.com/securityalert/4299 -CVE-2008-4175 - https://www.exploit-db.com/exploits/6466 -CVE-2008-4176 - http://securityreason.com/securityalert/4309 -CVE-2008-4176 - https://www.exploit-db.com/exploits/6453 -CVE-2008-4177 - http://securityreason.com/securityalert/4310 -CVE-2008-4177 - https://www.exploit-db.com/exploits/6465 -CVE-2008-4178 - http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt -CVE-2008-4178 - https://www.exploit-db.com/exploits/6946 -CVE-2008-4178 - https://www.exploit-db.com/exploits/6947 -CVE-2008-4178 - https://www.exploit-db.com/exploits/6950 -CVE-2008-4178 - https://www.exploit-db.com/exploits/6951 -CVE-2008-4179 - http://securityreason.com/securityalert/4289 -CVE-2008-4180 - http://securityreason.com/securityalert/4289 -CVE-2008-4181 - http://securityreason.com/securityalert/4301 -CVE-2008-4181 - https://www.exploit-db.com/exploits/6461 -CVE-2008-4182 - http://packetstormsecurity.org/0809-exploits/turba-xss.txt -CVE-2008-4183 - http://securityreason.com/securityalert/4300 -CVE-2008-4183 - https://www.exploit-db.com/exploits/6390 -CVE-2008-4185 - http://securityreason.com/securityalert/4314 -CVE-2008-4185 - https://www.exploit-db.com/exploits/6370 -CVE-2008-4187 - http://securityreason.com/securityalert/4315 -CVE-2008-4187 - https://www.exploit-db.com/exploits/6489 -CVE-2008-4190 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4190 - https://www.exploit-db.com/exploits/9135 -CVE-2008-4191 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4192 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4193 - http://securityreason.com/securityalert/4302 -CVE-2008-4193 - https://www.exploit-db.com/exploits/5718 -CVE-2008-4193 - https://www.exploit-db.com/exploits/5827 -CVE-2008-4201 - http://bugs.gentoo.org/show_bug.cgi?id=238445 -CVE-2008-4202 - http://securityreason.com/securityalert/4305 -CVE-2008-4202 - https://www.exploit-db.com/exploits/6469 -CVE-2008-4203 - http://securityreason.com/securityalert/4306 -CVE-2008-4203 - https://www.exploit-db.com/exploits/6462 -CVE-2008-4204 - http://securityreason.com/securityalert/4308 -CVE-2008-4204 - https://www.exploit-db.com/exploits/6470 -CVE-2008-4205 - http://e-rdc.org/v1/news.php?readmore=108 -CVE-2008-4205 - http://securityreason.com/securityalert/4307 -CVE-2008-4205 - https://www.exploit-db.com/exploits/6468 -CVE-2008-4206 - http://e-rdc.org/v1/news.php?readmore=108 -CVE-2008-4206 - http://securityreason.com/securityalert/4307 -CVE-2008-4206 - https://www.exploit-db.com/exploits/6468 -CVE-2008-4207 - http://e-rdc.org/v1/news.php?readmore=108 -CVE-2008-4207 - http://securityreason.com/securityalert/4307 -CVE-2008-4207 - https://www.exploit-db.com/exploits/6468 -CVE-2008-4210 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511 -CVE-2008-4226 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9888 -CVE-2008-4241 - http://securityreason.com/securityalert/4316 -CVE-2008-4241 - https://www.exploit-db.com/exploits/6536 -CVE-2008-4242 - http://securityreason.com/securityalert/4313 -CVE-2008-4243 - http://aluigi.org/adv/ut3webown-adv.txt -CVE-2008-4243 - http://securityreason.com/securityalert/4317 -CVE-2008-4243 - https://www.exploit-db.com/exploits/6506 -CVE-2008-4244 - http://securityreason.com/securityalert/4312 -CVE-2008-4244 - https://www.exploit-db.com/exploits/6521 -CVE-2008-4245 - http://securityreason.com/securityalert/4311 -CVE-2008-4245 - https://www.exploit-db.com/exploits/6513 -CVE-2008-4247 - http://securityreason.com/securityalert/4313 -CVE-2008-4247 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2008-4250 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 -CVE-2008-4250 - https://www.exploit-db.com/exploits/6824 -CVE-2008-4250 - https://www.exploit-db.com/exploits/6841 -CVE-2008-4250 - https://www.exploit-db.com/exploits/7104 -CVE-2008-4250 - https://www.exploit-db.com/exploits/7132 -CVE-2008-4252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -CVE-2008-4253 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -CVE-2008-4254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -CVE-2008-4255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -CVE-2008-4256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -CVE-2008-4258 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 -CVE-2008-4259 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 -CVE-2008-4260 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 -CVE-2008-4261 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 -CVE-2008-4264 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 -CVE-2008-4265 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 -CVE-2008-4266 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 -CVE-2008-4268 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075 -CVE-2008-4269 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075 -CVE-2008-4278 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-4279 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html -CVE-2008-4295 - https://www.exploit-db.com/exploits/6582 -CVE-2008-4296 - http://securityreason.com/securityalert/4319 -CVE-2008-4299 - http://securityreason.com/securityalert/4323 -CVE-2008-4300 - http://securityreason.com/securityalert/4325 -CVE-2008-4307 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-4307 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233 -CVE-2008-4309 - http://www.ubuntu.com/usn/usn-685-1 -CVE-2008-4309 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860 -CVE-2008-4310 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10250 -CVE-2008-4313 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9556 -CVE-2008-4314 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684 -CVE-2008-4315 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9431 -CVE-2008-4318 - http://securityreason.com/securityalert/4322 -CVE-2008-4318 - https://www.exploit-db.com/exploits/6559 -CVE-2008-4319 - https://www.exploit-db.com/exploits/6567 -CVE-2008-4321 - http://securityreason.com/securityalert/4327 -CVE-2008-4321 - https://www.exploit-db.com/exploits/6240 -CVE-2008-4321 - https://www.exploit-db.com/exploits/6248 -CVE-2008-4321 - https://www.exploit-db.com/exploits/6256 -CVE-2008-4323 - https://www.exploit-db.com/exploits/6616 -CVE-2008-4324 - http://securityreason.com/securityalert/4321 -CVE-2008-4324 - http://www.secniche.org/moz303/index.html -CVE-2008-4324 - https://www.exploit-db.com/exploits/6614 -CVE-2008-4327 - https://www.exploit-db.com/exploits/6588 -CVE-2008-4328 - http://securityreason.com/securityalert/4337 -CVE-2008-4329 - https://www.exploit-db.com/exploits/6571 -CVE-2008-4330 - https://www.exploit-db.com/exploits/6562 -CVE-2008-4331 - https://www.exploit-db.com/exploits/6563 -CVE-2008-4332 - https://www.exploit-db.com/exploits/6566 -CVE-2008-4333 - https://www.exploit-db.com/exploits/6566 -CVE-2008-4334 - https://www.exploit-db.com/exploits/6568 -CVE-2008-4335 - https://www.exploit-db.com/exploits/6572 -CVE-2008-4335 - https://www.exploit-db.com/exploits/6574 -CVE-2008-4336 - https://www.exploit-db.com/exploits/6572 -CVE-2008-4338 - http://securityreason.com/securityalert/4338 -CVE-2008-4340 - http://secniche.org/gcrds.html -CVE-2008-4340 - http://securityreason.com/securityalert/4339 -CVE-2008-4340 - https://www.exploit-db.com/exploits/6554 -CVE-2008-4341 - https://www.exploit-db.com/exploits/6531 -CVE-2008-4342 - https://www.exploit-db.com/exploits/6491 -CVE-2008-4343 - https://www.exploit-db.com/exploits/6537 -CVE-2008-4344 - http://packetstormsecurity.org/0809-exploits/6rbscriptcat-sql.txt -CVE-2008-4345 - https://www.exploit-db.com/exploits/6443 -CVE-2008-4346 - http://securityreason.com/securityalert/4267 -CVE-2008-4346 - https://www.exploit-db.com/exploits/6451 -CVE-2008-4347 - https://www.exploit-db.com/exploits/6447 -CVE-2008-4348 - http://packetstormsecurity.org/0809-exploits/phpportfolio-sql.txt -CVE-2008-4350 - https://www.exploit-db.com/exploits/6446 -CVE-2008-4351 - https://www.exploit-db.com/exploits/6452 -CVE-2008-4352 - https://www.exploit-db.com/exploits/6452 -CVE-2008-4353 - https://www.exploit-db.com/exploits/6455 -CVE-2008-4354 - https://www.exploit-db.com/exploits/6444 -CVE-2008-4355 - https://www.exploit-db.com/exploits/6442 -CVE-2008-4356 - https://www.exploit-db.com/exploits/6460 -CVE-2008-4357 - https://www.exploit-db.com/exploits/6449 -CVE-2008-4361 - http://securityreason.com/securityalert/4340 -CVE-2008-4361 - https://www.exploit-db.com/exploits/6604 -CVE-2008-4362 - http://securityreason.com/securityalert/4341 -CVE-2008-4362 - https://www.exploit-db.com/exploits/6515 -CVE-2008-4363 - http://digit-labs.org/files/exploits/deslock-probe-read.c -CVE-2008-4363 - http://securityreason.com/securityalert/4342 -CVE-2008-4363 - https://www.exploit-db.com/exploits/6498 -CVE-2008-4364 - http://securityreason.com/securityalert/4343 -CVE-2008-4364 - https://www.exploit-db.com/exploits/6610 -CVE-2008-4366 - http://securityreason.com/securityalert/4344 -CVE-2008-4366 - https://www.exploit-db.com/exploits/6594 -CVE-2008-4369 - http://securityreason.com/securityalert/4330 -CVE-2008-4369 - https://www.exploit-db.com/exploits/6411 -CVE-2008-4370 - http://securityreason.com/securityalert/4330 -CVE-2008-4370 - https://www.exploit-db.com/exploits/6411 -CVE-2008-4371 - http://securityreason.com/securityalert/4331 -CVE-2008-4371 - https://www.exploit-db.com/exploits/6409 -CVE-2008-4372 - http://securityreason.com/securityalert/4331 -CVE-2008-4372 - https://www.exploit-db.com/exploits/6409 -CVE-2008-4373 - http://securityreason.com/securityalert/4332 -CVE-2008-4373 - https://www.exploit-db.com/exploits/6417 -CVE-2008-4374 - http://securityreason.com/securityalert/4333 -CVE-2008-4374 - https://www.exploit-db.com/exploits/6408 -CVE-2008-4375 - http://securityreason.com/securityalert/4334 -CVE-2008-4375 - https://www.exploit-db.com/exploits/6412 -CVE-2008-4376 - http://securityreason.com/securityalert/4328 -CVE-2008-4376 - https://www.exploit-db.com/exploits/6404 -CVE-2008-4377 - http://securityreason.com/securityalert/4335 -CVE-2008-4377 - https://www.exploit-db.com/exploits/6405 -CVE-2008-4378 - http://securityreason.com/securityalert/4336 -CVE-2008-4378 - https://www.exploit-db.com/exploits/6403 -CVE-2008-4378 - https://www.exploit-db.com/exploits/8918 -CVE-2008-4379 - http://securityreason.com/securityalert/4336 -CVE-2008-4379 - https://www.exploit-db.com/exploits/6403 -CVE-2008-4380 - http://securityreason.com/securityalert/4329 -CVE-2008-4380 - https://www.exploit-db.com/exploits/6394 -CVE-2008-4381 - http://securityreason.com/securityalert/4345 -CVE-2008-4381 - http://www.openwall.com/lists/oss-security/2008/10/03/7 -CVE-2008-4381 - http://www.openwall.com/lists/oss-security/2008/10/03/8 -CVE-2008-4383 - http://securityreason.com/securityalert/4347 -CVE-2008-4392 - http://www.your.org/dnscache/ -CVE-2008-4392 - http://www.your.org/dnscache/djbdns.pdf -CVE-2008-4396 - http://packetstormsecurity.org/0809-advisories/filealyzer-overflow.txt -CVE-2008-4397 - http://securityreason.com/securityalert/4412 -CVE-2008-4408 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_1/phase3/RELEASE-NOTES -CVE-2008-4408 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_2/phase3/RELEASE-NOTES -CVE-2008-4411 - http://securityreason.com/securityalert/4398 -CVE-2008-4413 - http://securityreason.com/securityalert/4545 -CVE-2008-4414 - http://securityreason.com/securityalert/4567 -CVE-2008-4415 - http://securityreason.com/securityalert/4601 -CVE-2008-4416 - http://securityreason.com/securityalert/4686 -CVE-2008-4418 - http://securityreason.com/securityalert/4705 -CVE-2008-4420 - http://vuln.sg/dynazip5007-en.html -CVE-2008-4420 - http://vuln.sg/turbozip6-en.html -CVE-2008-4421 - http://securityreason.com/securityalert/4360 -CVE-2008-4421 - https://www.exploit-db.com/exploits/6686 -CVE-2008-4423 - http://securityreason.com/securityalert/4350 -CVE-2008-4423 - https://www.exploit-db.com/exploits/6232 -CVE-2008-4425 - http://securityreason.com/securityalert/4348 -CVE-2008-4425 - https://www.exploit-db.com/exploits/6215 -CVE-2008-4426 - http://securityreason.com/securityalert/4348 -CVE-2008-4426 - https://www.exploit-db.com/exploits/6215 -CVE-2008-4427 - http://securityreason.com/securityalert/4349 -CVE-2008-4427 - https://www.exploit-db.com/exploits/6231 -CVE-2008-4428 - http://securityreason.com/securityalert/4349 -CVE-2008-4428 - https://www.exploit-db.com/exploits/6231 -CVE-2008-4432 - http://lostmon.blogspot.com/2008/08/rmsoft-minishop-module-multiple.html -CVE-2008-4433 - http://lostmon.blogspot.com/2008/08/rmsoft-minishop-module-multiple.html -CVE-2008-4436 - http://securityreason.com/securityalert/4351 -CVE-2008-4436 - https://www.exploit-db.com/exploits/6233 -CVE-2008-4440 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4441 - http://securityreason.com/securityalert/4400 -CVE-2008-4444 - http://securityreason.com/securityalert/4917 -CVE-2008-4447 - http://packetstormsecurity.org/0810-exploits/webshell431-xssxsrf.txt -CVE-2008-4448 - http://packetstormsecurity.org/0810-exploits/webshell431-xssxsrf.txt -CVE-2008-4449 - http://securityreason.com/securityalert/4352 -CVE-2008-4449 - https://www.exploit-db.com/exploits/6654 -CVE-2008-4449 - https://www.exploit-db.com/exploits/6666 -CVE-2008-4451 - http://securityreason.com/securityalert/4353 -CVE-2008-4451 - https://www.exploit-db.com/exploits/6647 -CVE-2008-4452 - http://securityreason.com/securityalert/4356 -CVE-2008-4452 - https://www.exploit-db.com/exploits/6651 -CVE-2008-4453 - http://securityreason.com/securityalert/4355 -CVE-2008-4453 - https://www.exploit-db.com/exploits/6638 -CVE-2008-4455 - https://www.exploit-db.com/exploits/6641 -CVE-2008-4456 - http://securityreason.com/securityalert/4357 -CVE-2008-4457 - http://securityreason.com/securityalert/4288 -CVE-2008-4457 - https://www.exploit-db.com/exploits/6393 -CVE-2008-4460 - https://www.exploit-db.com/exploits/6379 -CVE-2008-4461 - https://www.exploit-db.com/exploits/6388 -CVE-2008-4462 - https://www.exploit-db.com/exploits/6373 -CVE-2008-4463 - http://securityreason.com/securityalert/4358 -CVE-2008-4463 - https://www.exploit-db.com/exploits/6378 -CVE-2008-4464 - https://www.exploit-db.com/exploits/6380 -CVE-2008-4465 - https://www.exploit-db.com/exploits/6376 -CVE-2008-4466 - https://www.exploit-db.com/exploits/6382 -CVE-2008-4467 - https://www.exploit-db.com/exploits/6374 -CVE-2008-4468 - https://www.exploit-db.com/exploits/6375 -CVE-2008-4469 - http://securityreason.com/securityalert/4359 -CVE-2008-4469 - https://www.exploit-db.com/exploits/6381 -CVE-2008-4470 - http://securityreason.com/securityalert/4354 -CVE-2008-4470 - https://www.exploit-db.com/exploits/6389 -CVE-2008-4471 - http://securityreason.com/securityalert/4361 -CVE-2008-4471 - https://www.exploit-db.com/exploits/6630 -CVE-2008-4472 - http://securityreason.com/securityalert/4361 -CVE-2008-4472 - https://www.exploit-db.com/exploits/6630 -CVE-2008-4473 - http://securityreason.com/securityalert/4429 -CVE-2008-4474 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4475 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4476 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4477 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4478 - http://securityreason.com/securityalert/4406 -CVE-2008-4479 - http://securityreason.com/securityalert/4405 -CVE-2008-4480 - http://securityreason.com/securityalert/4404 -CVE-2008-4483 - http://securityreason.com/securityalert/4366 -CVE-2008-4483 - https://www.exploit-db.com/exploits/6645 -CVE-2008-4484 - http://securityreason.com/securityalert/4365 -CVE-2008-4484 - https://www.exploit-db.com/exploits/6586 -CVE-2008-4485 - http://marc.info/?l=bugtraq&m=122210321731789&w=2 -CVE-2008-4485 - http://marc.info/?l=bugtraq&m=122298544725313&w=2 -CVE-2008-4485 - http://securityreason.com/securityalert/4367 -CVE-2008-4486 - http://securityreason.com/securityalert/4368 -CVE-2008-4486 - https://www.exploit-db.com/exploits/6687 -CVE-2008-4490 - http://securityreason.com/securityalert/4364 -CVE-2008-4490 - https://www.exploit-db.com/exploits/6679 -CVE-2008-4491 - http://securityreason.com/securityalert/4363 -CVE-2008-4492 - http://securityreason.com/securityalert/4362 -CVE-2008-4492 - https://www.exploit-db.com/exploits/6693 -CVE-2008-4493 - http://securityreason.com/securityalert/4376 -CVE-2008-4493 - https://www.exploit-db.com/exploits/6699 -CVE-2008-4494 - http://securityreason.com/securityalert/4375 -CVE-2008-4494 - https://www.exploit-db.com/exploits/6698 -CVE-2008-4495 - http://securityreason.com/securityalert/4369 -CVE-2008-4495 - https://www.exploit-db.com/exploits/6695 -CVE-2008-4496 - http://securityreason.com/securityalert/4374 -CVE-2008-4496 - https://www.exploit-db.com/exploits/6694 -CVE-2008-4497 - http://securityreason.com/securityalert/4373 -CVE-2008-4497 - https://www.exploit-db.com/exploits/6697 -CVE-2008-4498 - http://securityreason.com/securityalert/4372 -CVE-2008-4498 - https://www.exploit-db.com/exploits/6696 -CVE-2008-4499 - http://securityreason.com/securityalert/4371 -CVE-2008-4500 - http://securityreason.com/securityalert/4377 -CVE-2008-4500 - https://www.exploit-db.com/exploits/6660 -CVE-2008-4501 - http://securityreason.com/securityalert/4378 -CVE-2008-4501 - https://www.exploit-db.com/exploits/6661 -CVE-2008-4502 - http://securityreason.com/securityalert/4370 -CVE-2008-4502 - https://www.exploit-db.com/exploits/6700 -CVE-2008-4509 - http://securityreason.com/securityalert/4379 -CVE-2008-4509 - https://www.exploit-db.com/exploits/6670 -CVE-2008-4509 - https://www.exploit-db.com/exploits/6674 -CVE-2008-4509 - https://www.exploit-db.com/exploits/6680 -CVE-2008-4510 - http://securityreason.com/securityalert/4388 -CVE-2008-4510 - https://www.exploit-db.com/exploits/6671 -CVE-2008-4511 - http://securityreason.com/securityalert/4380 -CVE-2008-4512 - http://securityreason.com/securityalert/4395 -CVE-2008-4514 - http://securityreason.com/securityalert/4394 -CVE-2008-4514 - https://www.exploit-db.com/exploits/6689 -CVE-2008-4516 - http://securityreason.com/securityalert/4381 -CVE-2008-4516 - https://www.exploit-db.com/exploits/6675 -CVE-2008-4517 - http://securityreason.com/securityalert/4382 -CVE-2008-4517 - https://www.exploit-db.com/exploits/6677 -CVE-2008-4518 - http://securityreason.com/securityalert/4383 -CVE-2008-4518 - https://www.exploit-db.com/exploits/6678 -CVE-2008-4519 - http://securityreason.com/securityalert/4383 -CVE-2008-4519 - https://www.exploit-db.com/exploits/6678 -CVE-2008-4521 - http://securityreason.com/securityalert/4384 -CVE-2008-4521 - https://www.exploit-db.com/exploits/6682 -CVE-2008-4522 - http://securityreason.com/securityalert/4386 -CVE-2008-4522 - https://www.exploit-db.com/exploits/6669 -CVE-2008-4523 - http://securityreason.com/securityalert/4389 -CVE-2008-4523 - https://www.exploit-db.com/exploits/6657 -CVE-2008-4524 - http://securityreason.com/securityalert/4392 -CVE-2008-4524 - https://www.exploit-db.com/exploits/6662 -CVE-2008-4526 - http://securityreason.com/securityalert/4387 -CVE-2008-4526 - https://www.exploit-db.com/exploits/6663 -CVE-2008-4527 - http://securityreason.com/securityalert/4385 -CVE-2008-4527 - https://www.exploit-db.com/exploits/6683 -CVE-2008-4528 - http://securityreason.com/securityalert/4390 -CVE-2008-4528 - https://www.exploit-db.com/exploits/6667 -CVE-2008-4529 - http://securityreason.com/securityalert/4391 -CVE-2008-4529 - https://www.exploit-db.com/exploits/6685 -CVE-2008-4532 - http://securityreason.com/securityalert/4393 -CVE-2008-4540 - http://securityreason.com/securityalert/4402 -CVE-2008-4546 - http://securityreason.com/securityalert/4401 -CVE-2008-4546 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2008-4547 - http://securityreason.com/securityalert/4407 -CVE-2008-4547 - https://www.exploit-db.com/exploits/4903 -CVE-2008-4548 - http://securityreason.com/securityalert/4411 -CVE-2008-4548 - https://www.exploit-db.com/exploits/4918 -CVE-2008-4549 - http://securityreason.com/securityalert/4410 -CVE-2008-4549 - https://www.exploit-db.com/exploits/4981 -CVE-2008-4553 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4555 - http://securityreason.com/securityalert/4409 -CVE-2008-4556 - http://securityreason.com/securityalert/4408 -CVE-2008-4556 - https://www.exploit-db.com/exploits/6786 -CVE-2008-4557 - http://securityreason.com/securityalert/4403 -CVE-2008-4557 - https://www.exploit-db.com/exploits/4851 -CVE-2008-4558 - http://www.coresecurity.com/content/vlc-xspf-memory-corruption -CVE-2008-4558 - http://www.exploit-db.com/exploits/6756 -CVE-2008-4569 - http://securityreason.com/securityalert/4417 -CVE-2008-4569 - https://www.exploit-db.com/exploits/6731 -CVE-2008-4570 - http://securityreason.com/securityalert/4418 -CVE-2008-4570 - https://www.exploit-db.com/exploits/6736 -CVE-2008-4572 - http://securityreason.com/securityalert/4422 -CVE-2008-4572 - https://www.exploit-db.com/exploits/6738 -CVE-2008-4573 - http://securityreason.com/securityalert/4420 -CVE-2008-4573 - https://www.exploit-db.com/exploits/6725 -CVE-2008-4574 - http://securityreason.com/securityalert/4426 -CVE-2008-4574 - https://www.exploit-db.com/exploits/6720 -CVE-2008-4576 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9822 -CVE-2008-4582 - http://securityreason.com/securityalert/4416 -CVE-2008-4582 - https://bugzilla.mozilla.org/show_bug.cgi?id=455311 -CVE-2008-4583 - http://securityreason.com/securityalert/4427 -CVE-2008-4583 - https://www.exploit-db.com/exploits/5028 -CVE-2008-4584 - http://securityreason.com/securityalert/4424 -CVE-2008-4584 - https://www.exploit-db.com/exploits/5005 -CVE-2008-4585 - http://securityreason.com/securityalert/4414 -CVE-2008-4586 - http://securityreason.com/securityalert/4425 -CVE-2008-4586 - https://www.exploit-db.com/exploits/4913 -CVE-2008-4587 - http://securityreason.com/securityalert/4428 -CVE-2008-4587 - https://www.exploit-db.com/exploits/4909 -CVE-2008-4588 - http://securityreason.com/securityalert/4415 -CVE-2008-4588 - https://www.exploit-db.com/exploits/6752 -CVE-2008-4589 - http://securityreason.com/securityalert/4421 -CVE-2008-4590 - http://securityreason.com/securityalert/4413 -CVE-2008-4590 - https://www.exploit-db.com/exploits/6714 -CVE-2008-4591 - http://securityreason.com/securityalert/4419 -CVE-2008-4591 - https://www.exploit-db.com/exploits/6425 -CVE-2008-4592 - http://securityreason.com/securityalert/4423 -CVE-2008-4592 - https://www.exploit-db.com/exploits/6427 -CVE-2008-4599 - http://securityreason.com/securityalert/4430 -CVE-2008-4599 - https://www.exploit-db.com/exploits/6763 -CVE-2008-4600 - http://securityreason.com/securityalert/4431 -CVE-2008-4600 - https://www.exploit-db.com/exploits/6766 -CVE-2008-4602 - http://securityreason.com/securityalert/4432 -CVE-2008-4602 - https://www.exploit-db.com/exploits/6772 -CVE-2008-4603 - http://securityreason.com/securityalert/4433 -CVE-2008-4603 - https://www.exploit-db.com/exploits/6769 -CVE-2008-4604 - http://securityreason.com/securityalert/4434 -CVE-2008-4604 - https://www.exploit-db.com/exploits/6762 -CVE-2008-4605 - http://securityreason.com/securityalert/4434 -CVE-2008-4605 - https://www.exploit-db.com/exploits/6762 -CVE-2008-4606 - http://securityreason.com/securityalert/4435 -CVE-2008-4606 - https://www.exploit-db.com/exploits/6765 -CVE-2008-4609 - http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked -CVE-2008-4609 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2008-4609 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 -CVE-2008-4611 - http://securityreason.com/securityalert/4436 -CVE-2008-4612 - http://securityreason.com/securityalert/4439 -CVE-2008-4612 - https://www.exploit-db.com/exploits/4848 -CVE-2008-4613 - http://securityreason.com/securityalert/4439 -CVE-2008-4613 - https://www.exploit-db.com/exploits/4848 -CVE-2008-4614 - http://securityreason.com/securityalert/4439 -CVE-2008-4614 - https://www.exploit-db.com/exploits/4848 -CVE-2008-4616 - http://securityreason.com/securityalert/4438 -CVE-2008-4617 - http://securityreason.com/securityalert/4437 -CVE-2008-4617 - https://www.exploit-db.com/exploits/5337 -CVE-2008-4619 - http://securityreason.com/securityalert/4440 -CVE-2008-4619 - https://www.exploit-db.com/exploits/6775 -CVE-2008-4620 - http://securityreason.com/securityalert/4450 -CVE-2008-4620 - https://www.exploit-db.com/exploits/6781 -CVE-2008-4621 - http://securityreason.com/securityalert/4451 -CVE-2008-4621 - https://www.exploit-db.com/exploits/6780 -CVE-2008-4622 - http://securityreason.com/securityalert/4452 -CVE-2008-4622 - https://www.exploit-db.com/exploits/6779 -CVE-2008-4623 - http://securityreason.com/securityalert/4453 -CVE-2008-4623 - https://www.exploit-db.com/exploits/6792 -CVE-2008-4624 - http://securityreason.com/securityalert/4454 -CVE-2008-4624 - https://www.exploit-db.com/exploits/6785 -CVE-2008-4625 - http://securityreason.com/securityalert/4446 -CVE-2008-4625 - https://www.exploit-db.com/exploits/6777 -CVE-2008-4626 - http://securityreason.com/securityalert/4444 -CVE-2008-4626 - https://www.exploit-db.com/exploits/6788 -CVE-2008-4627 - http://securityreason.com/securityalert/4443 -CVE-2008-4627 - https://www.exploit-db.com/exploits/6790 -CVE-2008-4628 - http://securityreason.com/securityalert/4442 -CVE-2008-4628 - https://www.exploit-db.com/exploits/6782 -CVE-2008-4632 - http://securityreason.com/securityalert/4445 -CVE-2008-4632 - https://www.exploit-db.com/exploits/6767 -CVE-2008-4642 - http://securityreason.com/securityalert/4449 -CVE-2008-4642 - https://www.exploit-db.com/exploits/6758 -CVE-2008-4643 - http://securityreason.com/securityalert/4455 -CVE-2008-4643 - https://www.exploit-db.com/exploits/6759 -CVE-2008-4644 - http://securityreason.com/securityalert/4455 -CVE-2008-4644 - https://www.exploit-db.com/exploits/6759 -CVE-2008-4645 - http://securityreason.com/securityalert/4456 -CVE-2008-4645 - https://www.exploit-db.com/exploits/6755 -CVE-2008-4648 - http://packetstormsecurity.org/0810-exploits/elxis-xss.txt -CVE-2008-4649 - http://packetstormsecurity.org/0810-exploits/elxis-xss.txt -CVE-2008-4650 - http://securityreason.com/securityalert/4457 -CVE-2008-4650 - https://www.exploit-db.com/exploits/6760 -CVE-2008-4652 - http://securityreason.com/securityalert/4458 -CVE-2008-4652 - https://www.exploit-db.com/exploits/6793 -CVE-2008-4652 - https://www.exploit-db.com/exploits/6840 -CVE-2008-4653 - http://securityreason.com/securityalert/4459 -CVE-2008-4653 - https://www.exploit-db.com/exploits/6795 -CVE-2008-4654 - http://securityreason.com/securityalert/4460 -CVE-2008-4662 - http://securityreason.com/securityalert/4463 -CVE-2008-4662 - https://www.exploit-db.com/exploits/6744 -CVE-2008-4665 - http://securityreason.com/securityalert/4466 -CVE-2008-4665 - https://www.exploit-db.com/exploits/6626 -CVE-2008-4666 - http://securityreason.com/securityalert/4467 -CVE-2008-4666 - https://www.exploit-db.com/exploits/6576 -CVE-2008-4667 - http://securityreason.com/securityalert/4468 -CVE-2008-4667 - https://www.exploit-db.com/exploits/6628 -CVE-2008-4668 - http://securityreason.com/securityalert/4464 -CVE-2008-4668 - https://www.exploit-db.com/exploits/6618 -CVE-2008-4673 - http://securityreason.com/securityalert/4461 -CVE-2008-4673 - https://www.exploit-db.com/exploits/6623 -CVE-2008-4674 - http://securityreason.com/securityalert/4469 -CVE-2008-4674 - https://www.exploit-db.com/exploits/6599 -CVE-2008-4675 - http://securityreason.com/securityalert/4465 -CVE-2008-4675 - https://www.exploit-db.com/exploits/6611 -CVE-2008-4680 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2922 -CVE-2008-4680 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9605 -CVE-2008-4682 - http://securityreason.com/securityalert/4462 -CVE-2008-4682 - https://www.exploit-db.com/exploits/6622 -CVE-2008-4683 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9821 -CVE-2008-4687 - http://securityreason.com/securityalert/4470 -CVE-2008-4687 - https://www.exploit-db.com/exploits/44611/ -CVE-2008-4687 - https://www.exploit-db.com/exploits/6768 -CVE-2008-4696 - http://securityreason.com/securityalert/4504 -CVE-2008-4696 - https://www.exploit-db.com/exploits/6801 -CVE-2008-4699 - http://securityreason.com/securityalert/4471 -CVE-2008-4699 - https://www.exploit-db.com/exploits/6414 -CVE-2008-4700 - http://securityreason.com/securityalert/4472 -CVE-2008-4700 - https://www.exploit-db.com/exploits/6416 -CVE-2008-4702 - http://securityreason.com/securityalert/4419 -CVE-2008-4702 - https://www.exploit-db.com/exploits/6425 -CVE-2008-4703 - http://securityreason.com/securityalert/4474 -CVE-2008-4703 - https://www.exploit-db.com/exploits/5446 -CVE-2008-4704 - http://securityreason.com/securityalert/4473 -CVE-2008-4704 - https://www.exploit-db.com/exploits/6751 -CVE-2008-4705 - http://securityreason.com/securityalert/4477 -CVE-2008-4705 - https://www.exploit-db.com/exploits/6754 -CVE-2008-4706 - http://securityreason.com/securityalert/4480 -CVE-2008-4706 - https://www.exploit-db.com/exploits/6593 -CVE-2008-4707 - http://securityreason.com/securityalert/4493 -CVE-2008-4707 - https://www.exploit-db.com/exploits/6617 -CVE-2008-4708 - http://securityreason.com/securityalert/4495 -CVE-2008-4708 - https://www.exploit-db.com/exploits/6621 -CVE-2008-4709 - http://securityreason.com/securityalert/4496 -CVE-2008-4709 - https://www.exploit-db.com/exploits/6613 -CVE-2008-4711 - http://securityreason.com/securityalert/4486 -CVE-2008-4711 - https://www.exploit-db.com/exploits/6595 -CVE-2008-4712 - http://securityreason.com/securityalert/4481 -CVE-2008-4712 - https://www.exploit-db.com/exploits/6601 -CVE-2008-4713 - http://securityreason.com/securityalert/4482 -CVE-2008-4713 - https://www.exploit-db.com/exploits/6578 -CVE-2008-4714 - http://securityreason.com/securityalert/4497 -CVE-2008-4714 - https://www.exploit-db.com/exploits/6580 -CVE-2008-4715 - http://securityreason.com/securityalert/4485 -CVE-2008-4715 - https://www.exploit-db.com/exploits/5493 -CVE-2008-4716 - http://securityreason.com/securityalert/4500 -CVE-2008-4716 - https://www.exploit-db.com/exploits/6605 -CVE-2008-4717 - http://securityreason.com/securityalert/4479 -CVE-2008-4717 - https://www.exploit-db.com/exploits/6608 -CVE-2008-4718 - http://securityreason.com/securityalert/4499 -CVE-2008-4718 - https://www.exploit-db.com/exploits/6592 -CVE-2008-4718 - https://www.exploit-db.com/exploits/6607 -CVE-2008-4719 - http://securityreason.com/securityalert/4478 -CVE-2008-4719 - https://www.exploit-db.com/exploits/6585 -CVE-2008-4720 - http://securityreason.com/securityalert/4503 -CVE-2008-4720 - https://www.exploit-db.com/exploits/6587 -CVE-2008-4721 - http://securityreason.com/securityalert/4502 -CVE-2008-4721 - https://www.exploit-db.com/exploits/6625 -CVE-2008-4725 - http://securityreason.com/securityalert/4504 -CVE-2008-4725 - https://www.exploit-db.com/exploits/6801 -CVE-2008-4726 - http://securityreason.com/securityalert/4498 -CVE-2008-4726 - https://www.exploit-db.com/exploits/6804 -CVE-2008-4727 - http://securityreason.com/securityalert/4494 -CVE-2008-4728 - https://www.exploit-db.com/exploits/6773 -CVE-2008-4728 - https://www.exploit-db.com/exploits/6774 -CVE-2008-4728 - https://www.exploit-db.com/exploits/6776 -CVE-2008-4729 - http://securityreason.com/securityalert/4505 -CVE-2008-4729 - https://www.exploit-db.com/exploits/6761 -CVE-2008-4730 - http://securityreason.com/securityalert/4484 -CVE-2008-4732 - http://chxsecurity.org/advisories/adv-3-full.txt -CVE-2008-4732 - http://securityreason.com/securityalert/4492 -CVE-2008-4732 - https://www.exploit-db.com/exploits/6747 -CVE-2008-4733 - http://chxsecurity.org/advisories/adv-3-full.txt -CVE-2008-4733 - http://securityreason.com/securityalert/4492 -CVE-2008-4734 - http://chxsecurity.org/advisories/adv-3-full.txt -CVE-2008-4734 - http://securityreason.com/securityalert/4492 -CVE-2008-4735 - https://www.exploit-db.com/exploits/6598 -CVE-2008-4736 - http://securityreason.com/securityalert/4483 -CVE-2008-4736 - https://www.exploit-db.com/exploits/6589 -CVE-2008-4738 - http://securityreason.com/securityalert/4476 -CVE-2008-4738 - https://www.exploit-db.com/exploits/6603 -CVE-2008-4739 - http://securityreason.com/securityalert/4475 -CVE-2008-4739 - https://www.exploit-db.com/exploits/6602 -CVE-2008-4740 - http://securityreason.com/securityalert/4506 -CVE-2008-4740 - https://www.exploit-db.com/exploits/6287 -CVE-2008-4741 - http://marc.info/?l=bugtraq&m=121933211712734&w=2 -CVE-2008-4741 - http://securityreason.com/securityalert/4507 -CVE-2008-4743 - http://www.packetstormsecurity.org/0808-exploits/faqman-sql.txt -CVE-2008-4744 - http://www.packetstormsecurity.org/0808-exploits/dxshopcart-sql.txt -CVE-2008-4748 - http://securityreason.com/securityalert/4508 -CVE-2008-4748 - https://www.exploit-db.com/exploits/6832 -CVE-2008-4749 - http://securityreason.com/securityalert/4509 -CVE-2008-4749 - https://www.exploit-db.com/exploits/6828 -CVE-2008-4750 - http://securityreason.com/securityalert/4509 -CVE-2008-4750 - https://www.exploit-db.com/exploits/6828 -CVE-2008-4751 - http://packetstormsecurity.org/0810-exploits/ipei-xss.txt -CVE-2008-4751 - http://securityreason.com/securityalert/4510 -CVE-2008-4752 - http://securityreason.com/securityalert/4511 -CVE-2008-4752 - https://www.exploit-db.com/exploits/6836 -CVE-2008-4753 - http://securityreason.com/securityalert/4512 -CVE-2008-4753 - https://www.exploit-db.com/exploits/6829 -CVE-2008-4754 - http://securityreason.com/securityalert/4513 -CVE-2008-4754 - https://www.exploit-db.com/exploits/6843 -CVE-2008-4755 - http://securityreason.com/securityalert/4521 -CVE-2008-4755 - https://www.exploit-db.com/exploits/6839 -CVE-2008-4756 - https://www.exploit-db.com/exploits/6833 -CVE-2008-4757 - https://www.exploit-db.com/exploits/6833 -CVE-2008-4758 - http://securityreason.com/securityalert/4527 -CVE-2008-4758 - https://www.exploit-db.com/exploits/6833 -CVE-2008-4759 - http://securityreason.com/securityalert/4520 -CVE-2008-4759 - https://www.exploit-db.com/exploits/6835 -CVE-2008-4760 - http://securityreason.com/securityalert/4519 -CVE-2008-4760 - https://www.exploit-db.com/exploits/6844 -CVE-2008-4762 - http://securityreason.com/securityalert/4515 -CVE-2008-4762 - https://www.exploit-db.com/exploits/6800 -CVE-2008-4762 - https://www.exploit-db.com/exploits/6812 -CVE-2008-4763 - http://securityreason.com/securityalert/4514 -CVE-2008-4764 - https://www.exploit-db.com/exploits/5435 -CVE-2008-4765 - http://packetstormsecurity.org/0804-exploits/pollbooth20-sql.txt -CVE-2008-4765 - https://www.exploit-db.com/exploits/5436 -CVE-2008-4770 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367 -CVE-2008-4771 - http://securityreason.com/securityalert/4517 -CVE-2008-4771 - https://www.exploit-db.com/exploits/5193 -CVE-2008-4772 - http://securityreason.com/securityalert/4523 -CVE-2008-4772 - https://www.exploit-db.com/exploits/6853 -CVE-2008-4773 - http://securityreason.com/securityalert/4523 -CVE-2008-4773 - https://www.exploit-db.com/exploits/6853 -CVE-2008-4774 - http://securityreason.com/securityalert/4523 -CVE-2008-4774 - https://www.exploit-db.com/exploits/6853 -CVE-2008-4775 - http://securityreason.com/securityalert/4516 -CVE-2008-4778 - http://securityreason.com/securityalert/4525 -CVE-2008-4778 - https://www.exploit-db.com/exploits/5414 -CVE-2008-4778 - https://www.exploit-db.com/exploits/5447 -CVE-2008-4779 - http://securityreason.com/securityalert/4528 -CVE-2008-4779 - https://www.exploit-db.com/exploits/6831 -CVE-2008-4780 - http://securityreason.com/securityalert/4522 -CVE-2008-4780 - https://www.exploit-db.com/exploits/6846 -CVE-2008-4781 - http://securityreason.com/securityalert/4526 -CVE-2008-4781 - https://www.exploit-db.com/exploits/6850 -CVE-2008-4782 - http://securityreason.com/securityalert/4518 -CVE-2008-4782 - https://www.exploit-db.com/exploits/6854 -CVE-2008-4783 - http://securityreason.com/securityalert/4529 -CVE-2008-4783 - https://www.exploit-db.com/exploits/6848 -CVE-2008-4784 - http://securityreason.com/securityalert/4524 -CVE-2008-4784 - https://www.exploit-db.com/exploits/6818 -CVE-2008-4785 - http://securityreason.com/securityalert/4530 -CVE-2008-4785 - https://www.exploit-db.com/exploits/6849 -CVE-2008-4786 - http://securityreason.com/securityalert/4531 -CVE-2008-4786 - https://www.exploit-db.com/exploits/6852 -CVE-2008-4800 - http://securityreason.com/securityalert/4532 -CVE-2008-4813 - http://securityreason.com/securityalert/4564 -CVE-2008-4827 - http://securityreason.com/securityalert/4879 -CVE-2008-4829 - http://securityreason.com/securityalert/4647 -CVE-2008-4834 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 -CVE-2008-4835 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 -CVE-2008-4837 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -CVE-2008-4841 - http://securityreason.com/securityalert/4711 -CVE-2008-4841 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 -CVE-2008-4841 - https://www.exploit-db.com/exploits/6560 -CVE-2008-4844 - http://isc.sans.org/diary.html?storyid=5458 -CVE-2008-4844 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078 -CVE-2008-4844 - https://www.exploit-db.com/exploits/7403 -CVE-2008-4844 - https://www.exploit-db.com/exploits/7410 -CVE-2008-4844 - https://www.exploit-db.com/exploits/7477 -CVE-2008-4844 - https://www.exploit-db.com/exploits/7583 -CVE-2008-4864 - http://www.openwall.com/lists/oss-security/2008/10/29/3 -CVE-2008-4864 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-4871 - http://securityreason.com/securityalert/4533 -CVE-2008-4873 - http://securityreason.com/securityalert/4534 -CVE-2008-4873 - https://www.exploit-db.com/exploits/6864 -CVE-2008-4874 - http://securityreason.com/securityalert/4536 -CVE-2008-4874 - https://www.exploit-db.com/exploits/5113 -CVE-2008-4875 - http://securityreason.com/securityalert/4536 -CVE-2008-4875 - https://www.exploit-db.com/exploits/5113 -CVE-2008-4876 - http://securityreason.com/securityalert/4536 -CVE-2008-4876 - https://www.exploit-db.com/exploits/5113 -CVE-2008-4877 - http://securityreason.com/securityalert/4535 -CVE-2008-4877 - https://www.exploit-db.com/exploits/6869 -CVE-2008-4878 - http://securityreason.com/securityalert/4535 -CVE-2008-4878 - https://www.exploit-db.com/exploits/6869 -CVE-2008-4879 - http://securityreason.com/securityalert/4543 -CVE-2008-4879 - https://www.exploit-db.com/exploits/6953 -CVE-2008-4880 - http://securityreason.com/securityalert/4548 -CVE-2008-4880 - https://www.exploit-db.com/exploits/6958 -CVE-2008-4881 - https://www.exploit-db.com/exploits/6943 -CVE-2008-4882 - http://securityreason.com/securityalert/4540 -CVE-2008-4882 - https://www.exploit-db.com/exploits/6938 -CVE-2008-4883 - https://www.exploit-db.com/exploits/6937 -CVE-2008-4884 - http://securityreason.com/securityalert/4538 -CVE-2008-4884 - https://www.exploit-db.com/exploits/6948 -CVE-2008-4885 - http://securityreason.com/securityalert/4541 -CVE-2008-4885 - https://www.exploit-db.com/exploits/6942 -CVE-2008-4886 - http://securityreason.com/securityalert/4539 -CVE-2008-4886 - https://www.exploit-db.com/exploits/6952 -CVE-2008-4887 - http://securityreason.com/securityalert/4544 -CVE-2008-4887 - https://www.exploit-db.com/exploits/6957 -CVE-2008-4888 - https://www.exploit-db.com/exploits/6957 -CVE-2008-4889 - http://securityreason.com/securityalert/4552 -CVE-2008-4889 - https://www.exploit-db.com/exploits/6961 -CVE-2008-4890 - http://securityreason.com/securityalert/4553 -CVE-2008-4890 - https://www.exploit-db.com/exploits/6960 -CVE-2008-4894 - https://www.exploit-db.com/exploits/6888 -CVE-2008-4895 - https://www.exploit-db.com/exploits/6935 -CVE-2008-4897 - http://packetstormsecurity.org/0810-exploits/logzpodcast-sql.txt -CVE-2008-4897 - http://securityreason.com/securityalert/4546 -CVE-2008-4897 - http://securityreason.com/securityalert/4555 -CVE-2008-4897 - https://www.exploit-db.com/exploits/6896 -CVE-2008-4900 - https://www.exploit-db.com/exploits/6944 -CVE-2008-4901 - https://www.exploit-db.com/exploits/6912 -CVE-2008-4902 - https://www.exploit-db.com/exploits/6917 -CVE-2008-4903 - http://securityreason.com/securityalert/4550 -CVE-2008-4904 - http://securityreason.com/securityalert/4550 -CVE-2008-4905 - http://securityreason.com/securityalert/4550 -CVE-2008-4906 - http://securityreason.com/securityalert/4551 -CVE-2008-4906 - https://www.exploit-db.com/exploits/6885 -CVE-2008-4910 - http://securityreason.com/securityalert/4542 -CVE-2008-4912 - http://securityreason.com/securityalert/4547 -CVE-2008-4912 - https://www.exploit-db.com/exploits/5426 -CVE-2008-4913 - http://securityreason.com/securityalert/4554 -CVE-2008-4913 - https://www.exploit-db.com/exploits/5522 -CVE-2008-4916 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2008-4916 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439 -CVE-2008-4918 - http://securityreason.com/securityalert/4556 -CVE-2008-4919 - http://securityreason.com/securityalert/4558 -CVE-2008-4919 - https://www.exploit-db.com/exploits/6875 -CVE-2008-4921 - http://securityreason.com/securityalert/4559 -CVE-2008-4921 - https://www.exploit-db.com/exploits/6959 -CVE-2008-4922 - http://securityreason.com/securityalert/4560 -CVE-2008-4922 - https://www.exploit-db.com/exploits/6878 -CVE-2008-4923 - http://securityreason.com/securityalert/4561 -CVE-2008-4923 - https://www.exploit-db.com/exploits/6870 -CVE-2008-4924 - http://securityreason.com/securityalert/4562 -CVE-2008-4924 - https://www.exploit-db.com/exploits/6871 -CVE-2008-4925 - http://securityreason.com/securityalert/4563 -CVE-2008-4925 - https://www.exploit-db.com/exploits/6872 -CVE-2008-4926 - https://www.exploit-db.com/exploits/6873 -CVE-2008-4928 - http://www.openwall.com/lists/oss-security/2008/11/01/2 -CVE-2008-4929 - http://www.openwall.com/lists/oss-security/2008/11/01/2 -CVE-2008-4930 - http://www.openwall.com/lists/oss-security/2008/11/01/2 -CVE-2008-4931 - http://securityreason.com/securityalert/4566 -CVE-2008-4932 - http://securityreason.com/securityalert/4565 -CVE-2008-4932 - https://www.exploit-db.com/exploits/6898 -CVE-2008-4935 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4936 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4937 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4938 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4939 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4940 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4941 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4942 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4943 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4944 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4945 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4946 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4947 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4948 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4949 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4950 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4951 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4952 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4953 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4954 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4955 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4956 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4957 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4958 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4959 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4960 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4964 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4965 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4966 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4967 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4968 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4969 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4970 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4971 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4972 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4973 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4974 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4975 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4976 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4977 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4978 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4979 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4980 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4981 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4982 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4983 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4984 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4985 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4986 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4987 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4988 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4993 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4993 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9576 -CVE-2008-4994 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4995 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4996 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4997 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4998 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-4999 - http://securityreason.com/securityalert/4568 -CVE-2008-5000 - http://securityreason.com/securityalert/4572 -CVE-2008-5000 - https://www.exploit-db.com/exploits/6996 -CVE-2008-5002 - http://securityreason.com/securityalert/4571 -CVE-2008-5002 - https://www.exploit-db.com/exploits/6963 -CVE-2008-5003 - http://securityreason.com/securityalert/4569 -CVE-2008-5003 - https://www.exploit-db.com/exploits/6934 -CVE-2008-5004 - https://www.exploit-db.com/exploits/6925 -CVE-2008-5005 - http://marc.info/?l=full-disclosure&m=122572590212610&w=4 -CVE-2008-5005 - http://securityreason.com/securityalert/4570 -CVE-2008-5005 - https://bugzilla.redhat.com/show_bug.cgi?id=469667 -CVE-2008-5007 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-5013 - https://bugzilla.mozilla.org/show_bug.cgi?id=433610 -CVE-2008-5013 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9660 -CVE-2008-5014 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157 -CVE-2008-5018 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872 -CVE-2008-5021 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642 -CVE-2008-5023 - https://bugzilla.mozilla.org/show_bug.cgi?id=424733 -CVE-2008-5023 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908 -CVE-2008-5024 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063 -CVE-2008-5029 - http://securityreason.com/securityalert/4573 -CVE-2008-5029 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9558 -CVE-2008-5031 - http://www.openwall.com/lists/oss-security/2008/11/05/2 -CVE-2008-5031 - http://www.openwall.com/lists/oss-security/2008/11/05/3 -CVE-2008-5031 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-5034 - https://bugs.gentoo.org/show_bug.cgi?id=235770 -CVE-2008-5036 - https://www.exploit-db.com/exploits/7051 -CVE-2008-5039 - http://securityreason.com/securityalert/4575 -CVE-2008-5040 - http://securityreason.com/securityalert/4577 -CVE-2008-5040 - https://www.exploit-db.com/exploits/6857 -CVE-2008-5042 - http://securityreason.com/securityalert/4574 -CVE-2008-5042 - https://www.exploit-db.com/exploits/7070 -CVE-2008-5043 - http://securityreason.com/securityalert/4578 -CVE-2008-5044 - http://securityreason.com/securityalert/4576 -CVE-2008-5045 - http://securityreason.com/securityalert/4583 -CVE-2008-5045 - https://www.exploit-db.com/exploits/6926 -CVE-2008-5046 - http://securityreason.com/securityalert/4589 -CVE-2008-5046 - https://www.exploit-db.com/exploits/7030 -CVE-2008-5047 - http://securityreason.com/securityalert/4580 -CVE-2008-5047 - https://www.exploit-db.com/exploits/7043 -CVE-2008-5049 - http://securityreason.com/securityalert/4582 -CVE-2008-5049 - https://www.exploit-db.com/exploits/7054 -CVE-2008-5050 - http://securityreason.com/securityalert/4579 -CVE-2008-5051 - http://securityreason.com/securityalert/4581 -CVE-2008-5051 - https://www.exploit-db.com/exploits/7078 -CVE-2008-5052 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9449 -CVE-2008-5053 - http://securityreason.com/securityalert/4584 -CVE-2008-5054 - https://www.exploit-db.com/exploits/7015 -CVE-2008-5058 - https://www.exploit-db.com/exploits/7004 -CVE-2008-5059 - http://securityreason.com/securityalert/4587 -CVE-2008-5059 - https://www.exploit-db.com/exploits/6916 -CVE-2008-5060 - http://securityreason.com/securityalert/4587 -CVE-2008-5060 - https://www.exploit-db.com/exploits/6916 -CVE-2008-5061 - http://securityreason.com/securityalert/4590 -CVE-2008-5061 - https://www.exploit-db.com/exploits/7049 -CVE-2008-5062 - http://securityreason.com/securityalert/4590 -CVE-2008-5062 - https://www.exploit-db.com/exploits/7049 -CVE-2008-5063 - http://securityreason.com/securityalert/4586 -CVE-2008-5065 - http://securityreason.com/securityalert/4585 -CVE-2008-5065 - https://www.exploit-db.com/exploits/6860 -CVE-2008-5066 - http://securityreason.com/securityalert/4592 -CVE-2008-5066 - https://www.exploit-db.com/exploits/6859 -CVE-2008-5069 - https://www.exploit-db.com/exploits/6577 -CVE-2008-5070 - http://securityreason.com/securityalert/4593 -CVE-2008-5070 - https://www.exploit-db.com/exploits/6612 -CVE-2008-5071 - http://securityreason.com/securityalert/4591 -CVE-2008-5071 - https://www.exploit-db.com/exploits/6606 -CVE-2008-5072 - http://packetstormsecurity.org/filedesc/klite-dos-tgz.html -CVE-2008-5072 - http://securityreason.com/securityalert/4588 -CVE-2008-5072 - https://www.exploit-db.com/exploits/6565 -CVE-2008-5073 - http://securityreason.com/securityalert/4595 -CVE-2008-5074 - http://securityreason.com/securityalert/4594 -CVE-2008-5074 - https://www.exploit-db.com/exploits/6620 -CVE-2008-5075 - http://securityreason.com/securityalert/4596 -CVE-2008-5075 - https://www.exploit-db.com/exploits/6596 -CVE-2008-5077 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155 -CVE-2008-5079 - http://securityreason.com/securityalert/4694 -CVE-2008-5080 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21 -CVE-2008-5081 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987 -CVE-2008-5081 - https://www.exploit-db.com/exploits/7520 -CVE-2008-5086 - http://www.ubuntu.com/usn/usn-694-1 -CVE-2008-5088 - http://securityreason.com/securityalert/4599 -CVE-2008-5088 - https://www.exploit-db.com/exploits/6510 -CVE-2008-5089 - http://vuln.sg/ddarviewer2501314-en.html -CVE-2008-5090 - http://securityreason.com/securityalert/4598 -CVE-2008-5090 - https://www.exploit-db.com/exploits/6499 -CVE-2008-5097 - http://securityreason.com/securityalert/4597 -CVE-2008-5097 - https://www.exploit-db.com/exploits/6501 -CVE-2008-5100 - http://securityreason.com/securityalert/4605 -CVE-2008-5105 - http://securityreason.com/securityalert/4603 -CVE-2008-5106 - http://securityreason.com/securityalert/4603 -CVE-2008-5120 - http://securityreason.com/securityalert/4602 -CVE-2008-5121 - http://securityreason.com/securityalert/4600 -CVE-2008-5121 - https://www.exploit-db.com/exploits/5837 -CVE-2008-5123 - http://securityreason.com/securityalert/4604 -CVE-2008-5123 - https://www.exploit-db.com/exploits/5888 -CVE-2008-5124 - http://securityreason.com/securityalert/4606 -CVE-2008-5125 - http://securityreason.com/securityalert/4604 -CVE-2008-5125 - https://www.exploit-db.com/exploits/5888 -CVE-2008-5127 - https://www.exploit-db.com/exploits/7244 -CVE-2008-5131 - http://securityreason.com/securityalert/4607 -CVE-2008-5131 - https://www.exploit-db.com/exploits/7014 -CVE-2008-5132 - http://securityreason.com/securityalert/4608 -CVE-2008-5132 - https://www.exploit-db.com/exploits/7114 -CVE-2008-5158 - http://aluigi.org/adv/wincomalpd-adv.txt -CVE-2008-5158 - http://aluigi.org/poc/wincomalpd.zip -CVE-2008-5158 - http://securityreason.com/securityalert/4610 -CVE-2008-5159 - http://aluigi.org/adv/wincomalpd-adv.txt -CVE-2008-5159 - http://aluigi.org/poc/wincomalpd.zip -CVE-2008-5159 - http://securityreason.com/securityalert/4610 -CVE-2008-5160 - http://securityreason.com/securityalert/4609 -CVE-2008-5160 - https://www.exploit-db.com/exploits/5184 -CVE-2008-5161 - http://isc.sans.org/diary.html?storyid=5366 -CVE-2008-5163 - http://securityreason.com/securityalert/4612 -CVE-2008-5164 - http://securityreason.com/securityalert/4612 -CVE-2008-5166 - http://securityreason.com/securityalert/4615 -CVE-2008-5166 - https://www.exploit-db.com/exploits/5946 -CVE-2008-5167 - http://securityreason.com/securityalert/4616 -CVE-2008-5167 - https://www.exploit-db.com/exploits/5955 -CVE-2008-5167 - https://www.exploit-db.com/exploits/6282 -CVE-2008-5168 - http://securityreason.com/securityalert/4614 -CVE-2008-5168 - https://www.exploit-db.com/exploits/5947 -CVE-2008-5169 - http://securityreason.com/securityalert/4617 -CVE-2008-5169 - https://www.exploit-db.com/exploits/5949 -CVE-2008-5170 - http://securityreason.com/securityalert/4618 -CVE-2008-5170 - https://www.exploit-db.com/exploits/5950 -CVE-2008-5171 - https://www.exploit-db.com/exploits/5952 -CVE-2008-5174 - http://securityreason.com/securityalert/4613 -CVE-2008-5174 - https://www.exploit-db.com/exploits/5948 -CVE-2008-5175 - http://vuln.sg/aceftp3803-en.html -CVE-2008-5176 - http://aluigi.org/adv/wincomalpd-adv.txt -CVE-2008-5176 - http://aluigi.org/poc/wincomalpd.zip -CVE-2008-5176 - http://securityreason.com/securityalert/4610 -CVE-2008-5178 - https://www.exploit-db.com/exploits/7135 -CVE-2008-5180 - https://www.exploit-db.com/exploits/7262 -CVE-2008-5183 - http://www.openwall.com/lists/oss-security/2008/11/20/1 -CVE-2008-5183 - https://www.exploit-db.com/exploits/7150 -CVE-2008-5185 - http://www.openwall.com/lists/oss-security/2008/11/20/4 -CVE-2008-5188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607 -CVE-2008-5190 - http://securityreason.com/securityalert/4619 -CVE-2008-5190 - https://www.exploit-db.com/exploits/5970 -CVE-2008-5191 - http://securityreason.com/securityalert/4623 -CVE-2008-5191 - https://www.exploit-db.com/exploits/5960 -CVE-2008-5192 - http://securityreason.com/securityalert/4621 -CVE-2008-5192 - https://www.exploit-db.com/exploits/5958 -CVE-2008-5193 - http://securityreason.com/securityalert/4621 -CVE-2008-5193 - https://www.exploit-db.com/exploits/5958 -CVE-2008-5194 - http://securityreason.com/securityalert/4622 -CVE-2008-5194 - https://www.exploit-db.com/exploits/5964 -CVE-2008-5195 - http://securityreason.com/securityalert/4620 -CVE-2008-5195 - https://www.exploit-db.com/exploits/5967 -CVE-2008-5196 - http://securityreason.com/securityalert/4639 -CVE-2008-5196 - https://www.exploit-db.com/exploits/5942 -CVE-2008-5197 - http://securityreason.com/securityalert/4640 -CVE-2008-5197 - https://www.exploit-db.com/exploits/5961 -CVE-2008-5198 - http://securityreason.com/securityalert/4641 -CVE-2008-5198 - https://www.exploit-db.com/exploits/5969 -CVE-2008-5199 - http://securityreason.com/securityalert/4642 -CVE-2008-5200 - http://securityreason.com/securityalert/4643 -CVE-2008-5200 - https://www.exploit-db.com/exploits/5966 -CVE-2008-5201 - http://securityreason.com/securityalert/4644 -CVE-2008-5201 - https://www.exploit-db.com/exploits/5957 -CVE-2008-5202 - http://securityreason.com/securityalert/4644 -CVE-2008-5202 - https://www.exploit-db.com/exploits/5957 -CVE-2008-5203 - https://www.exploit-db.com/exploits/5962 -CVE-2008-5204 - https://www.exploit-db.com/exploits/5962 -CVE-2008-5205 - http://securityreason.com/securityalert/4645 -CVE-2008-5208 - http://securityreason.com/securityalert/4624 -CVE-2008-5208 - https://www.exploit-db.com/exploits/5583 -CVE-2008-5209 - http://securityreason.com/securityalert/4625 -CVE-2008-5209 - https://www.exploit-db.com/exploits/5575 -CVE-2008-5210 - https://www.exploit-db.com/exploits/5586 -CVE-2008-5211 - http://securityreason.com/securityalert/4629 -CVE-2008-5211 - http://users.own-hero.net/~decoder/advisories/sphider134-xss.txt -CVE-2008-5212 - http://securityreason.com/securityalert/4627 -CVE-2008-5212 - https://www.exploit-db.com/exploits/5591 -CVE-2008-5213 - http://securityreason.com/securityalert/4632 -CVE-2008-5213 - https://www.exploit-db.com/exploits/5590 -CVE-2008-5213 - https://www.exploit-db.com/exploits/6927 -CVE-2008-5214 - http://securityreason.com/securityalert/4628 -CVE-2008-5214 - https://www.exploit-db.com/exploits/5595 -CVE-2008-5215 - http://securityreason.com/securityalert/4628 -CVE-2008-5215 - https://www.exploit-db.com/exploits/5595 -CVE-2008-5216 - http://securityreason.com/securityalert/4636 -CVE-2008-5216 - https://www.exploit-db.com/exploits/5594 -CVE-2008-5217 - http://securityreason.com/securityalert/4626 -CVE-2008-5217 - https://www.exploit-db.com/exploits/5579 -CVE-2008-5218 - http://securityreason.com/securityalert/4633 -CVE-2008-5218 - https://www.exploit-db.com/exploits/7140 -CVE-2008-5219 - http://securityreason.com/securityalert/4634 -CVE-2008-5219 - https://www.exploit-db.com/exploits/7149 -CVE-2008-5220 - https://www.exploit-db.com/exploits/7165 -CVE-2008-5221 - http://securityreason.com/securityalert/4631 -CVE-2008-5221 - https://www.exploit-db.com/exploits/7170 -CVE-2008-5222 - http://securityreason.com/securityalert/4635 -CVE-2008-5223 - http://securityreason.com/securityalert/4637 -CVE-2008-5223 - https://www.exploit-db.com/exploits/5689 -CVE-2008-5225 - http://securityreason.com/securityalert/4638 -CVE-2008-5226 - http://securityreason.com/securityalert/4630 -CVE-2008-5226 - https://www.exploit-db.com/exploits/5692 -CVE-2008-5229 - http://securityreason.com/securityalert/4646 -CVE-2008-5230 - http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html -CVE-2008-5230 - http://www.aircrack-ng.org/doku.php?id=tkiptun-ng -CVE-2008-5232 - http://packetstormsecurity.org/0808-exploits/wms-overflow.txt -CVE-2008-5233 - http://securityreason.com/securityalert/4648 -CVE-2008-5234 - http://securityreason.com/securityalert/4648 -CVE-2008-5236 - http://securityreason.com/securityalert/4648 -CVE-2008-5237 - http://securityreason.com/securityalert/4648 -CVE-2008-5238 - http://securityreason.com/securityalert/4648 -CVE-2008-5239 - http://securityreason.com/securityalert/4648 -CVE-2008-5240 - http://securityreason.com/securityalert/4648 -CVE-2008-5241 - http://securityreason.com/securityalert/4648 -CVE-2008-5242 - http://securityreason.com/securityalert/4648 -CVE-2008-5243 - http://securityreason.com/securityalert/4648 -CVE-2008-5247 - http://securityreason.com/securityalert/4648 -CVE-2008-5264 - http://securityreason.com/securityalert/4655 -CVE-2008-5265 - http://securityreason.com/securityalert/4656 -CVE-2008-5265 - https://www.exploit-db.com/exploits/5782 -CVE-2008-5266 - http://securityreason.com/securityalert/4659 -CVE-2008-5267 - http://securityreason.com/securityalert/4654 -CVE-2008-5267 - https://www.exploit-db.com/exploits/5776 -CVE-2008-5268 - http://securityreason.com/securityalert/4653 -CVE-2008-5268 - https://www.exploit-db.com/exploits/5775 -CVE-2008-5269 - http://securityreason.com/securityalert/4652 -CVE-2008-5269 - https://www.exploit-db.com/exploits/5745 -CVE-2008-5270 - http://securityreason.com/securityalert/4651 -CVE-2008-5270 - https://www.exploit-db.com/exploits/5783 -CVE-2008-5271 - https://www.exploit-db.com/exploits/5779 -CVE-2008-5272 - http://securityreason.com/securityalert/4660 -CVE-2008-5272 - https://www.exploit-db.com/exploits/5779 -CVE-2008-5273 - http://securityreason.com/securityalert/4658 -CVE-2008-5273 - https://www.exploit-db.com/exploits/5781 -CVE-2008-5275 - http://vuln.sg/net2ftp096-en.html -CVE-2008-5276 - http://securityreason.com/securityalert/4680 -CVE-2008-5278 - http://securityreason.com/securityalert/4662 -CVE-2008-5279 - http://aluigi.altervista.org/adv/zilabzcsx-adv.txt -CVE-2008-5279 - http://aluigi.org/poc/zilabzcsx.zip -CVE-2008-5280 - http://aluigi.altervista.org/adv/zilabzcsx-adv.txt -CVE-2008-5280 - http://aluigi.org/poc/zilabzcsx.zip -CVE-2008-5281 - http://packetstormsecurity.org/0802-exploits/titan-heap-py.txt -CVE-2008-5282 - http://securityreason.com/securityalert/4657 -CVE-2008-5284 - http://aluigi.altervista.org/adv/emerdal-adv.txt -CVE-2008-5285 - http://securityreason.com/securityalert/4663 -CVE-2008-5287 - http://securityreason.com/securityalert/4664 -CVE-2008-5287 - https://www.exploit-db.com/exploits/7224 -CVE-2008-5288 - http://securityreason.com/securityalert/4665 -CVE-2008-5288 - https://www.exploit-db.com/exploits/7229 -CVE-2008-5289 - http://securityreason.com/securityalert/4666 -CVE-2008-5289 - https://www.exploit-db.com/exploits/7228 -CVE-2008-5289 - https://www.exploit-db.com/exploits/7230 -CVE-2008-5290 - http://securityreason.com/securityalert/4666 -CVE-2008-5290 - https://www.exploit-db.com/exploits/7228 -CVE-2008-5291 - http://securityreason.com/securityalert/4667 -CVE-2008-5291 - https://www.exploit-db.com/exploits/7231 -CVE-2008-5292 - http://securityreason.com/securityalert/4668 -CVE-2008-5292 - https://www.exploit-db.com/exploits/7234 -CVE-2008-5293 - http://securityreason.com/securityalert/4669 -CVE-2008-5293 - https://www.exploit-db.com/exploits/7222 -CVE-2008-5294 - http://securityreason.com/securityalert/4670 -CVE-2008-5294 - https://www.exploit-db.com/exploits/7223 -CVE-2008-5295 - http://securityreason.com/securityalert/4671 -CVE-2008-5295 - https://www.exploit-db.com/exploits/7235 -CVE-2008-5297 - http://securityreason.com/securityalert/4672 -CVE-2008-5297 - https://www.exploit-db.com/exploits/7151 -CVE-2008-5300 - http://securityreason.com/securityalert/4673 -CVE-2008-5303 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9699 -CVE-2008-5305 - http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-5305 -CVE-2008-5306 - http://securityreason.com/securityalert/4674 -CVE-2008-5306 - https://www.exploit-db.com/exploits/7200 -CVE-2008-5307 - http://securityreason.com/securityalert/4678 -CVE-2008-5307 - https://www.exploit-db.com/exploits/7201 -CVE-2008-5308 - http://securityreason.com/securityalert/4676 -CVE-2008-5308 - https://www.exploit-db.com/exploits/7191 -CVE-2008-5309 - http://securityreason.com/securityalert/4675 -CVE-2008-5309 - https://www.exploit-db.com/exploits/7208 -CVE-2008-5310 - http://securityreason.com/securityalert/4677 -CVE-2008-5310 - https://www.exploit-db.com/exploits/7198 -CVE-2008-5311 - http://securityreason.com/securityalert/4679 -CVE-2008-5311 - https://www.exploit-db.com/exploits/7199 -CVE-2008-5314 - https://www.exploit-db.com/exploits/7330 -CVE-2008-5315 - http://securityreason.com/securityalert/4681 -CVE-2008-5318 - http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki/branches/2.0/changelog.txt?view=markup -CVE-2008-5319 - http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki/branches/2.0/changelog.txt?view=markup -CVE-2008-5320 - http://securityreason.com/securityalert/4683 -CVE-2008-5320 - https://www.exploit-db.com/exploits/6791 -CVE-2008-5321 - http://securityreason.com/securityalert/4682 -CVE-2008-5321 - https://www.exploit-db.com/exploits/6778 -CVE-2008-5322 - http://packetstormsecurity.org/0810-exploits/wysiwikiwyg-lfixssdisclose.txt -CVE-2008-5322 - https://www.exploit-db.com/exploits/6042 -CVE-2008-5323 - http://packetstormsecurity.org/0810-exploits/wysiwikiwyg-lfixssdisclose.txt -CVE-2008-5323 - https://www.exploit-db.com/exploits/6042 -CVE-2008-5332 - http://securityreason.com/securityalert/4687 -CVE-2008-5332 - https://www.exploit-db.com/exploits/7221 -CVE-2008-5333 - http://securityreason.com/securityalert/4691 -CVE-2008-5333 - https://www.exploit-db.com/exploits/7218 -CVE-2008-5334 - http://securityreason.com/securityalert/4691 -CVE-2008-5334 - https://www.exploit-db.com/exploits/7218 -CVE-2008-5335 - http://securityreason.com/securityalert/4688 -CVE-2008-5335 - https://www.exploit-db.com/exploits/7173 -CVE-2008-5336 - http://securityreason.com/securityalert/4690 -CVE-2008-5336 - https://www.exploit-db.com/exploits/7216 -CVE-2008-5336 - https://www.exploit-db.com/exploits/7236 -CVE-2008-5337 - http://securityreason.com/securityalert/4689 -CVE-2008-5337 - https://www.exploit-db.com/exploits/7215 -CVE-2008-5338 - http://securityreason.com/securityalert/4689 -CVE-2008-5338 - https://www.exploit-db.com/exploits/7215 -CVE-2008-5340 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5341 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5342 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5343 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5348 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6549 -CVE-2008-5351 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5353 - http://blog.cr0.org/2009/05/write-once-own-everyone.html -CVE-2008-5353 - http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html -CVE-2008-5356 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5357 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5358 - http://www.redhat.com/support/errata/RHSA-2009-0369.html -CVE-2008-5361 - http://securityreason.com/securityalert/4692 -CVE-2008-5362 - http://securityreason.com/securityalert/4692 -CVE-2008-5363 - http://securityreason.com/securityalert/4692 -CVE-2008-5365 - https://www.exploit-db.com/exploits/7287 -CVE-2008-5377 - https://www.exploit-db.com/exploits/7550 -CVE-2008-5381 - http://securityreason.com/securityalert/4697 -CVE-2008-5383 - http://securityreason.com/securityalert/4698 -CVE-2008-5383 - https://www.exploit-db.com/exploits/7307 -CVE-2008-5393 - http://securityreason.com/securityalert/4696 -CVE-2008-5394 - http://bugs.debian.org/505071 -CVE-2008-5394 - http://bugs.debian.org/505271 -CVE-2008-5394 - http://securityreason.com/securityalert/4695 -CVE-2008-5394 - https://www.exploit-db.com/exploits/7313 -CVE-2008-5399 - http://securityreason.com/securityalert/4699 -CVE-2008-5400 - http://securityreason.com/securityalert/4699 -CVE-2008-5401 - http://securityreason.com/securityalert/4700 -CVE-2008-5402 - http://securityreason.com/securityalert/4701 -CVE-2008-5403 - http://securityreason.com/securityalert/4702 -CVE-2008-5405 - http://securityreason.com/securityalert/4703 -CVE-2008-5405 - https://www.exploit-db.com/exploits/7297 -CVE-2008-5405 - https://www.exploit-db.com/exploits/7309 -CVE-2008-5406 - http://securityreason.com/securityalert/4704 -CVE-2008-5406 - https://www.exploit-db.com/exploits/7296 -CVE-2008-5409 - https://www.exploit-db.com/exploits/7178 -CVE-2008-5415 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/12/10.aspx -CVE-2008-5415 - http://securityreason.com/securityalert/4708 -CVE-2008-5416 - http://securityreason.com/securityalert/4706 -CVE-2008-5416 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2008-5416 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2008-5416 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-004 -CVE-2008-5416 - https://www.exploit-db.com/exploits/7501 -CVE-2008-5418 - http://securityreason.com/securityalert/4707 -CVE-2008-5418 - https://www.exploit-db.com/exploits/7168 -CVE-2008-5419 - http://securityreason.com/securityalert/4710 -CVE-2008-5420 - http://securityreason.com/securityalert/4709 -CVE-2008-5424 - http://securityreason.com/securityalert/4721 -CVE-2008-5425 - http://securityreason.com/securityalert/4721 -CVE-2008-5426 - http://securityreason.com/securityalert/4721 -CVE-2008-5427 - http://securityreason.com/securityalert/4721 -CVE-2008-5428 - http://securityreason.com/securityalert/4721 -CVE-2008-5429 - http://securityreason.com/securityalert/4721 -CVE-2008-5431 - http://securityreason.com/securityalert/4722 -CVE-2008-5433 - http://punbb.informer.com/ -CVE-2008-5434 - http://punbb.informer.com/ -CVE-2008-5435 - http://punbb.informer.com/ -CVE-2008-5486 - http://securityreason.com/securityalert/4719 -CVE-2008-5486 - https://www.exploit-db.com/exploits/7124 -CVE-2008-5487 - http://securityreason.com/securityalert/4719 -CVE-2008-5487 - https://www.exploit-db.com/exploits/7124 -CVE-2008-5488 - https://www.exploit-db.com/exploits/7037 -CVE-2008-5489 - http://securityreason.com/securityalert/4713 -CVE-2008-5489 - https://www.exploit-db.com/exploits/7128 -CVE-2008-5490 - http://securityreason.com/securityalert/4718 -CVE-2008-5490 - https://www.exploit-db.com/exploits/7131 -CVE-2008-5491 - http://securityreason.com/securityalert/4717 -CVE-2008-5491 - https://www.exploit-db.com/exploits/7121 -CVE-2008-5492 - http://securityreason.com/securityalert/4715 -CVE-2008-5492 - https://www.exploit-db.com/exploits/7126 -CVE-2008-5493 - http://securityreason.com/securityalert/4720 -CVE-2008-5493 - https://www.exploit-db.com/exploits/7134 -CVE-2008-5494 - http://securityreason.com/securityalert/4712 -CVE-2008-5494 - https://www.exploit-db.com/exploits/7093 -CVE-2008-5496 - http://securityreason.com/securityalert/4714 -CVE-2008-5496 - https://www.exploit-db.com/exploits/7098 -CVE-2008-5497 - http://securityreason.com/securityalert/4716 -CVE-2008-5497 - https://www.exploit-db.com/exploits/7113 -CVE-2008-5498 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9667 -CVE-2008-5500 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5503 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5504 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5506 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5507 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5507 - https://bugzilla.mozilla.org/show_bug.cgi?id=461735 -CVE-2008-5507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376 -CVE-2008-5508 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5510 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5510 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662 -CVE-2008-5511 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5512 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5512 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814 -CVE-2008-5513 - http://www.ubuntu.com/usn/usn-690-2 -CVE-2008-5515 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-5516 - http://securityreason.com/securityalert/4919 -CVE-2008-5518 - https://www.exploit-db.com/exploits/8458 -CVE-2008-5520 - http://securityreason.com/securityalert/4723 -CVE-2008-5521 - http://securityreason.com/securityalert/4723 -CVE-2008-5522 - http://securityreason.com/securityalert/4723 -CVE-2008-5523 - http://securityreason.com/securityalert/4723 -CVE-2008-5524 - http://securityreason.com/securityalert/4723 -CVE-2008-5525 - http://securityreason.com/securityalert/4723 -CVE-2008-5526 - http://securityreason.com/securityalert/4723 -CVE-2008-5527 - http://securityreason.com/securityalert/4723 -CVE-2008-5528 - http://securityreason.com/securityalert/4723 -CVE-2008-5529 - http://securityreason.com/securityalert/4723 -CVE-2008-5530 - http://securityreason.com/securityalert/4723 -CVE-2008-5531 - http://securityreason.com/securityalert/4723 -CVE-2008-5532 - http://securityreason.com/securityalert/4723 -CVE-2008-5533 - http://securityreason.com/securityalert/4723 -CVE-2008-5534 - http://securityreason.com/securityalert/4723 -CVE-2008-5535 - http://securityreason.com/securityalert/4723 -CVE-2008-5536 - http://securityreason.com/securityalert/4723 -CVE-2008-5537 - http://securityreason.com/securityalert/4723 -CVE-2008-5538 - http://securityreason.com/securityalert/4723 -CVE-2008-5539 - http://securityreason.com/securityalert/4723 -CVE-2008-5540 - http://securityreason.com/securityalert/4723 -CVE-2008-5541 - http://securityreason.com/securityalert/4723 -CVE-2008-5542 - http://securityreason.com/securityalert/4723 -CVE-2008-5543 - http://securityreason.com/securityalert/4723 -CVE-2008-5544 - http://securityreason.com/securityalert/4723 -CVE-2008-5545 - http://securityreason.com/securityalert/4723 -CVE-2008-5546 - http://securityreason.com/securityalert/4723 -CVE-2008-5547 - http://securityreason.com/securityalert/4723 -CVE-2008-5548 - http://securityreason.com/securityalert/4723 -CVE-2008-5551 - http://securityreason.com/securityalert/4724 -CVE-2008-5558 - http://securityreason.com/securityalert/4769 -CVE-2008-5559 - http://securityreason.com/securityalert/4725 -CVE-2008-5559 - https://www.exploit-db.com/exploits/7398 -CVE-2008-5560 - http://securityreason.com/securityalert/4725 -CVE-2008-5560 - https://www.exploit-db.com/exploits/7398 -CVE-2008-5561 - http://securityreason.com/securityalert/4726 -CVE-2008-5561 - https://www.exploit-db.com/exploits/7396 -CVE-2008-5562 - http://securityreason.com/securityalert/4727 -CVE-2008-5562 - https://www.exploit-db.com/exploits/7361 -CVE-2008-5563 - http://securityreason.com/securityalert/4728 -CVE-2008-5564 - http://securityreason.com/securityalert/4729 -CVE-2008-5565 - http://securityreason.com/securityalert/4730 -CVE-2008-5565 - https://www.exploit-db.com/exploits/7365 -CVE-2008-5566 - http://securityreason.com/securityalert/4751 -CVE-2008-5566 - https://www.exploit-db.com/exploits/7400 -CVE-2008-5567 - http://securityreason.com/securityalert/4731 -CVE-2008-5567 - https://www.exploit-db.com/exploits/7366 -CVE-2008-5568 - http://securityreason.com/securityalert/4735 -CVE-2008-5568 - https://www.exploit-db.com/exploits/7364 -CVE-2008-5569 - http://securityreason.com/securityalert/4745 -CVE-2008-5570 - http://securityreason.com/securityalert/4751 -CVE-2008-5570 - https://www.exploit-db.com/exploits/7400 -CVE-2008-5571 - http://securityreason.com/securityalert/4749 -CVE-2008-5571 - https://www.exploit-db.com/exploits/7390 -CVE-2008-5572 - http://securityreason.com/securityalert/4748 -CVE-2008-5572 - https://www.exploit-db.com/exploits/7371 -CVE-2008-5573 - http://securityreason.com/securityalert/4741 -CVE-2008-5573 - https://www.exploit-db.com/exploits/7391 -CVE-2008-5574 - http://securityreason.com/securityalert/4747 -CVE-2008-5574 - https://www.exploit-db.com/exploits/7407 -CVE-2008-5575 - http://securityreason.com/securityalert/4752 -CVE-2008-5576 - http://securityreason.com/securityalert/4739 -CVE-2008-5576 - https://www.exploit-db.com/exploits/5149 -CVE-2008-5577 - http://securityreason.com/securityalert/4739 -CVE-2008-5577 - https://www.exploit-db.com/exploits/5149 -CVE-2008-5578 - http://securityreason.com/securityalert/4739 -CVE-2008-5578 - https://www.exploit-db.com/exploits/5149 -CVE-2008-5579 - http://securityreason.com/securityalert/4733 -CVE-2008-5579 - https://www.exploit-db.com/exploits/6733 -CVE-2008-5580 - http://securityreason.com/securityalert/4733 -CVE-2008-5580 - https://www.exploit-db.com/exploits/6733 -CVE-2008-5581 - http://securityreason.com/securityalert/4733 -CVE-2008-5581 - https://www.exploit-db.com/exploits/6733 -CVE-2008-5582 - http://securityreason.com/securityalert/4732 -CVE-2008-5582 - https://www.exploit-db.com/exploits/5192 -CVE-2008-5583 - http://securityreason.com/securityalert/4734 -CVE-2008-5584 - http://securityreason.com/securityalert/4734 -CVE-2008-5585 - http://packetstormsecurity.org/0812-exploits/icxbbportal-rfi.txt -CVE-2008-5585 - http://securityreason.com/securityalert/4738 -CVE-2008-5585 - https://www.exploit-db.com/exploits/7341 -CVE-2008-5586 - http://securityreason.com/securityalert/4736 -CVE-2008-5586 - https://www.exploit-db.com/exploits/7328 -CVE-2008-5587 - http://securityreason.com/securityalert/4737 -CVE-2008-5587 - https://www.exploit-db.com/exploits/7363 -CVE-2008-5588 - http://securityreason.com/securityalert/4740 -CVE-2008-5588 - https://www.exploit-db.com/exploits/7349 -CVE-2008-5589 - http://securityreason.com/securityalert/4746 -CVE-2008-5589 - https://www.exploit-db.com/exploits/7350 -CVE-2008-5590 - http://securityreason.com/securityalert/4743 -CVE-2008-5590 - https://www.exploit-db.com/exploits/7368 -CVE-2008-5591 - http://securityreason.com/securityalert/4742 -CVE-2008-5591 - https://www.exploit-db.com/exploits/7351 -CVE-2008-5592 - http://securityreason.com/securityalert/4742 -CVE-2008-5592 - https://www.exploit-db.com/exploits/7351 -CVE-2008-5593 - http://securityreason.com/securityalert/4750 -CVE-2008-5593 - https://www.exploit-db.com/exploits/7375 -CVE-2008-5594 - http://securityreason.com/securityalert/4744 -CVE-2008-5594 - https://www.exploit-db.com/exploits/7374 -CVE-2008-5595 - http://packetstormsecurity.org/0812-exploits/aspautodealer-sqldisclose.txt -CVE-2008-5595 - http://securityreason.com/securityalert/4754 -CVE-2008-5595 - https://www.exploit-db.com/exploits/7356 -CVE-2008-5596 - http://securityreason.com/securityalert/4755 -CVE-2008-5596 - https://www.exploit-db.com/exploits/7372 -CVE-2008-5597 - http://securityreason.com/securityalert/4756 -CVE-2008-5597 - https://www.exploit-db.com/exploits/7353 -CVE-2008-5598 - http://securityreason.com/securityalert/4760 -CVE-2008-5598 - https://www.exploit-db.com/exploits/7377 -CVE-2008-5599 - http://securityreason.com/securityalert/4757 -CVE-2008-5599 - https://www.exploit-db.com/exploits/7352 -CVE-2008-5600 - http://securityreason.com/securityalert/4757 -CVE-2008-5600 - https://www.exploit-db.com/exploits/7352 -CVE-2008-5601 - http://securityreason.com/securityalert/4758 -CVE-2008-5601 - https://www.exploit-db.com/exploits/7338 -CVE-2008-5602 - http://securityreason.com/securityalert/4761 -CVE-2008-5602 - https://www.exploit-db.com/exploits/7370 -CVE-2008-5603 - http://securityreason.com/securityalert/4762 -CVE-2008-5603 - https://www.exploit-db.com/exploits/7359 -CVE-2008-5604 - http://securityreason.com/securityalert/4765 -CVE-2008-5604 - https://www.exploit-db.com/exploits/7342 -CVE-2008-5605 - http://securityreason.com/securityalert/4763 -CVE-2008-5605 - https://www.exploit-db.com/exploits/7357 -CVE-2008-5606 - http://securityreason.com/securityalert/4764 -CVE-2008-5606 - https://www.exploit-db.com/exploits/7376 -CVE-2008-5607 - http://securityreason.com/securityalert/4759 -CVE-2008-5607 - https://www.exploit-db.com/exploits/7331 -CVE-2008-5608 - http://securityreason.com/securityalert/4754 -CVE-2008-5608 - https://www.exploit-db.com/exploits/7356 -CVE-2008-5608 - https://www.exploit-db.com/exploits/7360 -CVE-2008-5619 - https://www.exploit-db.com/exploits/7549 -CVE-2008-5619 - https://www.exploit-db.com/exploits/7553 -CVE-2008-5621 - http://securityreason.com/securityalert/4753 -CVE-2008-5621 - https://www.exploit-db.com/exploits/7382 -CVE-2008-5625 - https://www.exploit-db.com/exploits/7171 -CVE-2008-5626 - http://securityreason.com/securityalert/4766 -CVE-2008-5626 - https://www.exploit-db.com/exploits/6741 -CVE-2008-5627 - https://www.exploit-db.com/exploits/7282 -CVE-2008-5628 - http://securityreason.com/securityalert/4781 -CVE-2008-5628 - https://www.exploit-db.com/exploits/7269 -CVE-2008-5629 - https://www.exploit-db.com/exploits/7256 -CVE-2008-5630 - http://securityreason.com/securityalert/4780 -CVE-2008-5630 - https://www.exploit-db.com/exploits/7238 -CVE-2008-5631 - https://www.exploit-db.com/exploits/7279 -CVE-2008-5632 - https://www.exploit-db.com/exploits/7301 -CVE-2008-5633 - https://www.exploit-db.com/exploits/7275 -CVE-2008-5634 - https://www.exploit-db.com/exploits/7273 -CVE-2008-5635 - https://www.exploit-db.com/exploits/7278 -CVE-2008-5636 - http://securityreason.com/securityalert/4779 -CVE-2008-5636 - https://www.exploit-db.com/exploits/7294 -CVE-2008-5637 - http://securityreason.com/securityalert/4778 -CVE-2008-5637 - https://www.exploit-db.com/exploits/7239 -CVE-2008-5638 - http://securityreason.com/securityalert/4768 -CVE-2008-5638 - https://www.exploit-db.com/exploits/7300 -CVE-2008-5639 - http://securityreason.com/securityalert/4777 -CVE-2008-5639 - https://www.exploit-db.com/exploits/7241 -CVE-2008-5640 - http://securityreason.com/securityalert/4776 -CVE-2008-5640 - https://www.exploit-db.com/exploits/7290 -CVE-2008-5641 - http://securityreason.com/securityalert/4767 -CVE-2008-5641 - https://www.exploit-db.com/exploits/7299 -CVE-2008-5642 - http://securityreason.com/securityalert/4775 -CVE-2008-5642 - https://www.exploit-db.com/exploits/7285 -CVE-2008-5643 - http://securityreason.com/securityalert/4774 -CVE-2008-5643 - https://www.exploit-db.com/exploits/7092 -CVE-2008-5645 - http://securityreason.com/securityalert/4773 -CVE-2008-5648 - https://www.exploit-db.com/exploits/7025 -CVE-2008-5649 - http://securityreason.com/securityalert/4772 -CVE-2008-5649 - https://www.exploit-db.com/exploits/7102 -CVE-2008-5650 - http://securityreason.com/securityalert/4771 -CVE-2008-5650 - https://www.exploit-db.com/exploits/7103 -CVE-2008-5651 - https://www.exploit-db.com/exploits/7053 -CVE-2008-5652 - http://securityreason.com/securityalert/4770 -CVE-2008-5652 - https://www.exploit-db.com/exploits/7045 -CVE-2008-5653 - https://www.exploit-db.com/exploits/7044 -CVE-2008-5654 - https://www.exploit-db.com/exploits/7046 -CVE-2008-5659 - http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38417 -CVE-2008-5660 - http://www.coresecurity.com/content/vinagre-format-string -CVE-2008-5660 - https://bugzilla.redhat.com/show_bug.cgi?id=475070 -CVE-2008-5660 - https://www.exploit-db.com/exploits/7401 -CVE-2008-5663 - http://securityreason.com/securityalert/4782 -CVE-2008-5663 - https://www.exploit-db.com/exploits/6706 -CVE-2008-5663 - https://www.exploit-db.com/exploits/6711 -CVE-2008-5664 - http://securityreason.com/securityalert/4783 -CVE-2008-5664 - https://www.exploit-db.com/exploits/7492 -CVE-2008-5665 - http://securityreason.com/securityalert/4784 -CVE-2008-5665 - https://www.exploit-db.com/exploits/6748 -CVE-2008-5666 - http://securityreason.com/securityalert/4785 -CVE-2008-5666 - https://www.exploit-db.com/exploits/6717 -CVE-2008-5667 - https://www.exploit-db.com/exploits/6658 -CVE-2008-5668 - http://securityreason.com/securityalert/4786 -CVE-2008-5669 - http://securityreason.com/securityalert/4786 -CVE-2008-5670 - http://securityreason.com/securityalert/4786 -CVE-2008-5671 - http://securityreason.com/securityalert/4787 -CVE-2008-5674 - http://securityreason.com/securityalert/4788 -CVE-2008-5677 - http://securityreason.com/securityalert/4789 -CVE-2008-5677 - https://www.exploit-db.com/exploits/6664 -CVE-2008-5678 - http://securityreason.com/securityalert/4790 -CVE-2008-5678 - https://www.exploit-db.com/exploits/6653 -CVE-2008-5679 - http://securityreason.com/securityalert/4791 -CVE-2008-5689 - http://securityreason.com/securityalert/4801 -CVE-2008-5691 - http://securityreason.com/securityalert/4795 -CVE-2008-5691 - https://www.exploit-db.com/exploits/7505 -CVE-2008-5692 - http://securityreason.com/securityalert/4799 -CVE-2008-5693 - http://securityreason.com/securityalert/4799 -CVE-2008-5695 - http://securityreason.com/securityalert/4798 -CVE-2008-5695 - http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html -CVE-2008-5695 - https://www.exploit-db.com/exploits/5066 -CVE-2008-5697 - http://securityreason.com/securityalert/4797 -CVE-2008-5697 - https://www.exploit-db.com/exploits/6690 -CVE-2008-5698 - http://securityreason.com/securityalert/4796 -CVE-2008-5698 - https://www.exploit-db.com/exploits/6718 -CVE-2008-5700 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2008-5705 - http://securityreason.com/securityalert/4800 -CVE-2008-5705 - https://www.exploit-db.com/exploits/7183 -CVE-2008-5706 - http://securityreason.com/securityalert/4800 -CVE-2008-5706 - https://www.exploit-db.com/exploits/7183 -CVE-2008-5708 - http://securityreason.com/securityalert/4804 -CVE-2008-5708 - https://www.exploit-db.com/exploits/6729 -CVE-2008-5711 - http://securityreason.com/securityalert/4805 -CVE-2008-5711 - https://www.exploit-db.com/exploits/5102 -CVE-2008-5712 - http://securityreason.com/securityalert/4806 -CVE-2008-5712 - https://www.exploit-db.com/exploits/6704 -CVE-2008-5713 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9385 -CVE-2008-5715 - http://securityreason.com/securityalert/4807 -CVE-2008-5715 - https://www.exploit-db.com/exploits/7554 -CVE-2008-5722 - http://securityreason.com/securityalert/4808 -CVE-2008-5722 - https://www.exploit-db.com/exploits/7578 -CVE-2008-5725 - http://securityreason.com/securityalert/4809 -CVE-2008-5725 - https://www.exploit-db.com/exploits/7533 -CVE-2008-5726 - http://securityreason.com/securityalert/4810 -CVE-2008-5726 - https://www.exploit-db.com/exploits/7565 -CVE-2008-5727 - http://securityreason.com/securityalert/4818 -CVE-2008-5727 - https://www.exploit-db.com/exploits/7559 -CVE-2008-5728 - http://securityreason.com/securityalert/4819 -CVE-2008-5728 - https://www.exploit-db.com/exploits/7560 -CVE-2008-5729 - http://securityreason.com/securityalert/4819 -CVE-2008-5729 - https://www.exploit-db.com/exploits/7560 -CVE-2008-5730 - http://securityreason.com/securityalert/4819 -CVE-2008-5730 - https://www.exploit-db.com/exploits/7560 -CVE-2008-5731 - http://securityreason.com/securityalert/4811 -CVE-2008-5731 - http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php -CVE-2008-5731 - https://www.exploit-db.com/exploits/7556 -CVE-2008-5732 - http://securityreason.com/securityalert/4812 -CVE-2008-5732 - https://www.exploit-db.com/exploits/7537 -CVE-2008-5733 - http://securityreason.com/securityalert/4814 -CVE-2008-5733 - https://www.exploit-db.com/exploits/7598 -CVE-2008-5735 - http://securityreason.com/securityalert/4813 -CVE-2008-5735 - https://www.exploit-db.com/exploits/7536 -CVE-2008-5735 - https://www.exploit-db.com/exploits/7547 -CVE-2008-5736 - http://securityreason.com/securityalert/8124 -CVE-2008-5736 - http://www.exploit-db.com/exploits/16951 -CVE-2008-5736 - https://www.exploit-db.com/exploits/7581 -CVE-2008-5737 - http://securityreason.com/securityalert/4815 -CVE-2008-5737 - https://www.exploit-db.com/exploits/7551 -CVE-2008-5738 - http://securityreason.com/securityalert/4816 -CVE-2008-5738 - https://www.exploit-db.com/exploits/7513 -CVE-2008-5739 - http://securityreason.com/securityalert/4817 -CVE-2008-5739 - https://www.exploit-db.com/exploits/7544 -CVE-2008-5742 - http://securityreason.com/securityalert/4819 -CVE-2008-5742 - https://www.exploit-db.com/exploits/7560 -CVE-2008-5745 - http://securityreason.com/securityalert/4823 -CVE-2008-5745 - https://www.exploit-db.com/exploits/7585 -CVE-2008-5747 - http://securityreason.com/securityalert/4822 -CVE-2008-5748 - http://securityreason.com/securityalert/4820 -CVE-2008-5748 - https://www.exploit-db.com/exploits/7580 -CVE-2008-5749 - http://securityreason.com/securityalert/4821 -CVE-2008-5749 - https://www.exploit-db.com/exploits/7566 -CVE-2008-5750 - http://securityreason.com/securityalert/4821 -CVE-2008-5750 - https://www.exploit-db.com/exploits/7566 -CVE-2008-5751 - http://securityreason.com/securityalert/4824 -CVE-2008-5751 - https://www.exploit-db.com/exploits/7596 -CVE-2008-5752 - http://securityreason.com/securityalert/4836 -CVE-2008-5752 - https://www.exploit-db.com/exploits/7543 -CVE-2008-5753 - http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html -CVE-2008-5753 - http://securityreason.com/securityalert/4835 -CVE-2008-5753 - http://www.kb.cert.org/vuls/id/565580 -CVE-2008-5753 - https://www.exploit-db.com/exploits/37056/ -CVE-2008-5753 - https://www.exploit-db.com/exploits/7571 -CVE-2008-5754 - https://www.exploit-db.com/exploits/7589 -CVE-2008-5754 - https://www.exploit-db.com/exploits/8420 -CVE-2008-5755 - http://securityreason.com/securityalert/4839 -CVE-2008-5755 - https://www.exploit-db.com/exploits/7582 -CVE-2008-5756 - http://securityreason.com/securityalert/4838 -CVE-2008-5756 - https://www.exploit-db.com/exploits/7592 -CVE-2008-5761 - http://securityreason.com/securityalert/4825 -CVE-2008-5761 - https://www.exploit-db.com/exploits/7461 -CVE-2008-5762 - http://securityreason.com/securityalert/4847 -CVE-2008-5762 - https://www.exploit-db.com/exploits/7444 -CVE-2008-5763 - https://www.exploit-db.com/exploits/7444 -CVE-2008-5764 - http://securityreason.com/securityalert/4831 -CVE-2008-5764 - https://www.exploit-db.com/exploits/7481 -CVE-2008-5765 - https://www.exploit-db.com/exploits/7481 -CVE-2008-5766 - http://securityreason.com/securityalert/4830 -CVE-2008-5766 - https://www.exploit-db.com/exploits/7487 -CVE-2008-5767 - http://securityreason.com/securityalert/4829 -CVE-2008-5767 - https://www.exploit-db.com/exploits/7495 -CVE-2008-5768 - http://securityreason.com/securityalert/4854 -CVE-2008-5768 - https://www.exploit-db.com/exploits/7479 -CVE-2008-5770 - http://securityreason.com/securityalert/4826 -CVE-2008-5770 - https://www.exploit-db.com/exploits/7451 -CVE-2008-5771 - http://securityreason.com/securityalert/4826 -CVE-2008-5771 - https://www.exploit-db.com/exploits/7451 -CVE-2008-5772 - http://securityreason.com/securityalert/4848 -CVE-2008-5772 - https://www.exploit-db.com/exploits/7464 -CVE-2008-5773 - http://securityreason.com/securityalert/4840 -CVE-2008-5773 - https://www.exploit-db.com/exploits/7491 -CVE-2008-5774 - https://www.exploit-db.com/exploits/7462 -CVE-2008-5775 - http://securityreason.com/securityalert/4844 -CVE-2008-5775 - https://www.exploit-db.com/exploits/7482 -CVE-2008-5776 - https://www.exploit-db.com/exploits/7482 -CVE-2008-5777 - http://securityreason.com/securityalert/4832 -CVE-2008-5777 - https://www.exploit-db.com/exploits/7480 -CVE-2008-5778 - http://securityreason.com/securityalert/4852 -CVE-2008-5778 - https://www.exploit-db.com/exploits/7489 -CVE-2008-5779 - http://securityreason.com/securityalert/4849 -CVE-2008-5779 - https://www.exploit-db.com/exploits/7474 -CVE-2008-5780 - http://securityreason.com/securityalert/4842 -CVE-2008-5780 - https://www.exploit-db.com/exploits/7466 -CVE-2008-5781 - http://securityreason.com/securityalert/4850 -CVE-2008-5781 - https://www.exploit-db.com/exploits/7483 -CVE-2008-5782 - http://securityreason.com/securityalert/4845 -CVE-2008-5782 - https://www.exploit-db.com/exploits/7072 -CVE-2008-5783 - http://securityreason.com/securityalert/4843 -CVE-2008-5783 - https://www.exploit-db.com/exploits/7069 -CVE-2008-5784 - https://www.exploit-db.com/exploits/7063 -CVE-2008-5785 - http://securityreason.com/securityalert/4846 -CVE-2008-5785 - https://www.exploit-db.com/exploits/7061 -CVE-2008-5787 - http://securityreason.com/securityalert/4851 -CVE-2008-5787 - https://www.exploit-db.com/exploits/7019 -CVE-2008-5788 - http://securityreason.com/securityalert/4833 -CVE-2008-5788 - https://www.exploit-db.com/exploits/7052 -CVE-2008-5789 - http://securityreason.com/securityalert/4827 -CVE-2008-5789 - https://www.exploit-db.com/exploits/7040 -CVE-2008-5790 - https://www.exploit-db.com/exploits/7039 -CVE-2008-5792 - http://securityreason.com/securityalert/4853 -CVE-2008-5792 - https://www.exploit-db.com/exploits/7059 -CVE-2008-5793 - http://securityreason.com/securityalert/4841 -CVE-2008-5793 - https://www.exploit-db.com/exploits/7038 -CVE-2008-5794 - http://securityreason.com/securityalert/4834 -CVE-2008-5794 - https://www.exploit-db.com/exploits/7022 -CVE-2008-5802 - https://www.exploit-db.com/exploits/7048 -CVE-2008-5803 - http://securityreason.com/securityalert/4855 -CVE-2008-5803 - https://www.exploit-db.com/exploits/7041 -CVE-2008-5804 - http://securityreason.com/securityalert/4828 -CVE-2008-5804 - https://www.exploit-db.com/exploits/7050 -CVE-2008-5805 - https://www.exploit-db.com/exploits/7047 -CVE-2008-5806 - http://securityreason.com/securityalert/4837 -CVE-2008-5806 - https://www.exploit-db.com/exploits/7023 -CVE-2008-5810 - http://securityreason.com/securityalert/4856 -CVE-2008-5811 - http://securityreason.com/securityalert/4857 -CVE-2008-5811 - https://www.exploit-db.com/exploits/7587 -CVE-2008-5815 - http://securityreason.com/securityalert/4859 -CVE-2008-5815 - https://www.exploit-db.com/exploits/7621 -CVE-2008-5816 - http://securityreason.com/securityalert/4858 -CVE-2008-5816 - https://www.exploit-db.com/exploits/7570 -CVE-2008-5817 - http://securityreason.com/securityalert/4860 -CVE-2008-5817 - https://www.exploit-db.com/exploits/7602 -CVE-2008-5818 - http://securityreason.com/securityalert/4861 -CVE-2008-5818 - https://www.exploit-db.com/exploits/7604 -CVE-2008-5819 - http://securityreason.com/securityalert/4864 -CVE-2008-5819 - https://www.exploit-db.com/exploits/7603 -CVE-2008-5820 - http://securityreason.com/securityalert/4863 -CVE-2008-5820 - https://www.exploit-db.com/exploits/7619 -CVE-2008-5821 - http://packetstormsecurity.org/0812-exploits/safari_webkit_ml.txt -CVE-2008-5822 - http://www.packetstormsecurity.org/0812-exploits/mzff_libxul_ml.txt -CVE-2008-5828 - http://securityreason.com/securityalert/4862 -CVE-2008-5838 - https://www.exploit-db.com/exploits/6398 -CVE-2008-5840 - http://securityreason.com/securityalert/4865 -CVE-2008-5840 - https://www.exploit-db.com/exploits/6526 -CVE-2008-5841 - http://securityreason.com/securityalert/4867 -CVE-2008-5841 - https://www.exploit-db.com/exploits/6540 -CVE-2008-5847 - http://securityreason.com/securityalert/4868 -CVE-2008-5847 - https://www.exploit-db.com/exploits/7529 -CVE-2008-5851 - http://securityreason.com/securityalert/4869 -CVE-2008-5851 - https://www.exploit-db.com/exploits/7522 -CVE-2008-5852 - http://securityreason.com/securityalert/4876 -CVE-2008-5852 - https://www.exploit-db.com/exploits/7534 -CVE-2008-5853 - http://securityreason.com/securityalert/4872 -CVE-2008-5853 - https://www.exploit-db.com/exploits/7532 -CVE-2008-5854 - http://securityreason.com/securityalert/4873 -CVE-2008-5854 - https://www.exploit-db.com/exploits/7526 -CVE-2008-5855 - http://securityreason.com/securityalert/4873 -CVE-2008-5855 - https://www.exploit-db.com/exploits/7526 -CVE-2008-5856 - https://www.exploit-db.com/exploits/7579 -CVE-2008-5859 - http://securityreason.com/securityalert/4868 -CVE-2008-5859 - https://www.exploit-db.com/exploits/7529 -CVE-2008-5860 - http://securityreason.com/securityalert/4868 -CVE-2008-5860 - https://www.exploit-db.com/exploits/7529 -CVE-2008-5861 - http://securityreason.com/securityalert/4875 -CVE-2008-5861 - https://www.exploit-db.com/exploits/7527 -CVE-2008-5862 - http://securityreason.com/securityalert/4877 -CVE-2008-5862 - https://www.exploit-db.com/exploits/7521 -CVE-2008-5863 - http://securityreason.com/securityalert/4874 -CVE-2008-5863 - https://www.exploit-db.com/exploits/7530 -CVE-2008-5864 - http://securityreason.com/securityalert/4871 -CVE-2008-5864 - https://www.exploit-db.com/exploits/7539 -CVE-2008-5865 - http://securityreason.com/securityalert/4870 -CVE-2008-5865 - https://www.exploit-db.com/exploits/7538 -CVE-2008-5866 - http://securityreason.com/securityalert/4884 -CVE-2008-5868 - http://securityreason.com/securityalert/4882 -CVE-2008-5868 - https://www.exploit-db.com/exploits/7608 -CVE-2008-5869 - http://securityreason.com/securityalert/4884 -CVE-2008-5870 - http://securityreason.com/securityalert/4878 -CVE-2008-5870 - https://www.exploit-db.com/exploits/6673 -CVE-2008-5873 - http://securityreason.com/securityalert/4883 -CVE-2008-5873 - https://www.exploit-db.com/exploits/6691 -CVE-2008-5874 - https://www.exploit-db.com/exploits/7568 -CVE-2008-5874 - https://www.exploit-db.com/exploits/7575 -CVE-2008-5875 - http://securityreason.com/securityalert/4880 -CVE-2008-5875 - https://www.exploit-db.com/exploits/7567 -CVE-2008-5877 - http://securityreason.com/securityalert/4881 -CVE-2008-5877 - https://www.exploit-db.com/exploits/7515 -CVE-2008-5878 - http://securityreason.com/securityalert/4881 -CVE-2008-5878 - https://www.exploit-db.com/exploits/7515 -CVE-2008-5879 - http://securityreason.com/securityalert/4881 -CVE-2008-5879 - https://www.exploit-db.com/exploits/7515 -CVE-2008-5880 - http://securityreason.com/securityalert/4886 -CVE-2008-5880 - https://www.exploit-db.com/exploits/7518 -CVE-2008-5881 - http://securityreason.com/securityalert/4888 -CVE-2008-5881 - https://www.exploit-db.com/exploits/7687 -CVE-2008-5882 - http://securityreason.com/securityalert/4889 -CVE-2008-5883 - http://securityreason.com/securityalert/4897 -CVE-2008-5883 - https://www.exploit-db.com/exploits/6734 -CVE-2008-5884 - http://securityreason.com/securityalert/4900 -CVE-2008-5884 - https://www.exploit-db.com/exploits/6668 -CVE-2008-5885 - http://securityreason.com/securityalert/4898 -CVE-2008-5885 - https://www.exploit-db.com/exploits/7446 -CVE-2008-5886 - http://securityreason.com/securityalert/4899 -CVE-2008-5886 - https://www.exploit-db.com/exploits/7445 -CVE-2008-5887 - http://securityreason.com/securityalert/4901 -CVE-2008-5888 - http://securityreason.com/securityalert/4902 -CVE-2008-5888 - https://www.exploit-db.com/exploits/7486 -CVE-2008-5889 - https://www.exploit-db.com/exploits/7486 -CVE-2008-5890 - https://www.exploit-db.com/exploits/7517 -CVE-2008-5892 - http://securityreason.com/securityalert/4903 -CVE-2008-5892 - https://www.exploit-db.com/exploits/7485 -CVE-2008-5893 - http://securityreason.com/securityalert/4903 -CVE-2008-5893 - https://www.exploit-db.com/exploits/7485 -CVE-2008-5894 - http://securityreason.com/securityalert/4904 -CVE-2008-5894 - https://www.exploit-db.com/exploits/7458 -CVE-2008-5895 - http://securityreason.com/securityalert/4905 -CVE-2008-5895 - https://www.exploit-db.com/exploits/7476 -CVE-2008-5896 - http://securityreason.com/securityalert/4906 -CVE-2008-5896 - https://www.exploit-db.com/exploits/7472 -CVE-2008-5897 - https://www.exploit-db.com/exploits/7470 -CVE-2008-5898 - http://securityreason.com/securityalert/4907 -CVE-2008-5898 - https://www.exploit-db.com/exploits/7468 -CVE-2008-5899 - https://www.exploit-db.com/exploits/7469 -CVE-2008-5900 - http://securityreason.com/securityalert/4909 -CVE-2008-5900 - https://www.exploit-db.com/exploits/7471 -CVE-2008-5901 - http://securityreason.com/securityalert/4908 -CVE-2008-5901 - https://www.exploit-db.com/exploits/7449 -CVE-2008-5902 - http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf -CVE-2008-5903 - http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf -CVE-2008-5904 - http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf -CVE-2008-5905 - http://ktorrent.org/?q=node/23 -CVE-2008-5906 - http://ktorrent.org/?q=node/23 -CVE-2008-5912 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 -CVE-2008-5913 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 -CVE-2008-5914 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 -CVE-2008-5915 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 -CVE-2008-5916 - http://securityreason.com/securityalert/4922 -CVE-2008-5918 - http://securityreason.com/securityalert/4928 -CVE-2008-5918 - https://www.exploit-db.com/exploits/6822 -CVE-2008-5919 - http://securityreason.com/securityalert/4928 -CVE-2008-5919 - https://www.exploit-db.com/exploits/6822 -CVE-2008-5920 - http://securityreason.com/securityalert/4928 -CVE-2008-5920 - https://www.exploit-db.com/exploits/6822 -CVE-2008-5921 - http://securityreason.com/securityalert/4924 -CVE-2008-5921 - https://www.exploit-db.com/exploits/7439 -CVE-2008-5922 - http://securityreason.com/securityalert/4926 -CVE-2008-5922 - https://www.exploit-db.com/exploits/7459 -CVE-2008-5923 - http://packetstormsecurity.org/0812-exploits/aspdevxmdiary-sqldisclose.txt -CVE-2008-5925 - http://packetstormsecurity.org/0812-exploits/aspdevxmdiary-sqldisclose.txt -CVE-2008-5926 - http://securityreason.com/securityalert/4925 -CVE-2008-5926 - https://www.exploit-db.com/exploits/7447 -CVE-2008-5927 - http://securityreason.com/securityalert/4927 -CVE-2008-5927 - https://www.exploit-db.com/exploits/7443 -CVE-2008-5928 - http://securityreason.com/securityalert/4929 -CVE-2008-5928 - https://www.exploit-db.com/exploits/7453 -CVE-2008-5929 - http://securityreason.com/securityalert/4930 -CVE-2008-5929 - https://www.exploit-db.com/exploits/7438 -CVE-2008-5930 - http://securityreason.com/securityalert/4931 -CVE-2008-5930 - https://www.exploit-db.com/exploits/7436 -CVE-2008-5931 - http://securityreason.com/securityalert/4931 -CVE-2008-5931 - https://www.exploit-db.com/exploits/7436 -CVE-2008-5932 - http://securityreason.com/securityalert/4932 -CVE-2008-5932 - https://www.exploit-db.com/exploits/7450 -CVE-2008-5933 - http://securityreason.com/securityalert/4933 -CVE-2008-5933 - https://www.exploit-db.com/exploits/7465 -CVE-2008-5934 - http://securityreason.com/securityalert/4933 -CVE-2008-5934 - https://www.exploit-db.com/exploits/7465 -CVE-2008-5935 - http://securityreason.com/securityalert/4934 -CVE-2008-5936 - https://www.exploit-db.com/exploits/6734 -CVE-2008-5937 - http://securityreason.com/securityalert/4939 -CVE-2008-5937 - https://www.exploit-db.com/exploits/6672 -CVE-2008-5938 - http://securityreason.com/securityalert/4940 -CVE-2008-5938 - https://www.exploit-db.com/exploits/7204 -CVE-2008-5939 - http://securityreason.com/securityalert/4940 -CVE-2008-5939 - https://www.exploit-db.com/exploits/7204 -CVE-2008-5947 - http://packetstormsecurity.org/0808-exploits/yapbb-rfi.txt -CVE-2008-5948 - https://www.exploit-db.com/exploits/7345 -CVE-2008-5949 - https://www.exploit-db.com/exploits/7336 -CVE-2008-5950 - https://www.exploit-db.com/exploits/7339 -CVE-2008-5951 - https://www.exploit-db.com/exploits/7339 -CVE-2008-5952 - https://www.exploit-db.com/exploits/7305 -CVE-2008-5953 - https://www.exploit-db.com/exploits/7304 -CVE-2008-5955 - https://www.exploit-db.com/exploits/7337 -CVE-2008-5956 - https://www.exploit-db.com/exploits/7337 -CVE-2008-5957 - https://www.exploit-db.com/exploits/7343 -CVE-2008-5958 - https://www.exploit-db.com/exploits/7295 -CVE-2008-5959 - https://www.exploit-db.com/exploits/7276 -CVE-2008-5962 - https://www.exploit-db.com/exploits/7344 -CVE-2008-5963 - https://www.exploit-db.com/exploits/7344 -CVE-2008-5965 - https://www.exploit-db.com/exploits/6737 -CVE-2008-5966 - https://www.exploit-db.com/exploits/6735 -CVE-2008-5967 - https://www.exploit-db.com/exploits/6519 -CVE-2008-5968 - https://www.exploit-db.com/exploits/6519 -CVE-2008-5969 - https://www.exploit-db.com/exploits/7323 -CVE-2008-5972 - https://www.exploit-db.com/exploits/7302 -CVE-2008-5973 - https://www.exploit-db.com/exploits/7281 -CVE-2008-5974 - https://www.exploit-db.com/exploits/7283 -CVE-2008-5976 - http://www.packetstormsecurity.org/0812-exploits/phpjobwebsite-cmsqlxss.txt -CVE-2008-5977 - http://www.packetstormsecurity.org/0812-exploits/phpjobwebsite-cmsqlxss.txt -CVE-2008-5978 - https://www.exploit-db.com/exploits/7319 -CVE-2008-5979 - https://www.exploit-db.com/exploits/7319 -CVE-2008-5980 - https://www.exploit-db.com/exploits/7319 -CVE-2008-5981 - https://www.exploit-db.com/exploits/7318 -CVE-2008-5983 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2008-5988 - https://www.exploit-db.com/exploits/6555 -CVE-2008-5989 - https://www.exploit-db.com/exploits/6553 -CVE-2008-5990 - https://www.exploit-db.com/exploits/6551 -CVE-2008-5991 - https://www.exploit-db.com/exploits/6552 -CVE-2008-5992 - https://www.exploit-db.com/exploits/6549 -CVE-2008-5993 - https://www.exploit-db.com/exploits/6558 -CVE-2008-5997 - http://packetstormsecurity.org/0809-exploits/omnicom-traverse.txt -CVE-2008-5998 - http://drupal.org/node/312968 -CVE-2008-5999 - http://drupal.org/node/312968 -CVE-2008-6001 - https://www.exploit-db.com/exploits/6557 -CVE-2008-6002 - https://www.exploit-db.com/exploits/6556 -CVE-2008-6003 - https://www.exploit-db.com/exploits/6561 -CVE-2008-6004 - https://www.exploit-db.com/exploits/6561 -CVE-2008-6006 - https://www.exploit-db.com/exploits/6632 -CVE-2008-6007 - https://www.exploit-db.com/exploits/6637 -CVE-2008-6009 - https://www.exploit-db.com/exploits/6635 -CVE-2008-6010 - https://www.exploit-db.com/exploits/6631 -CVE-2008-6011 - https://www.exploit-db.com/exploits/6631 -CVE-2008-6011 - https://www.exploit-db.com/exploits/6634 -CVE-2008-6012 - https://www.exploit-db.com/exploits/6639 -CVE-2008-6014 - https://www.exploit-db.com/exploits/6636 -CVE-2008-6017 - https://www.exploit-db.com/exploits/7514 -CVE-2008-6018 - https://www.exploit-db.com/exploits/7519 -CVE-2008-6022 - https://www.exploit-db.com/exploits/6254 -CVE-2008-6023 - https://www.exploit-db.com/exploits/6254 -CVE-2008-6025 - https://www.exploit-db.com/exploits/6530 -CVE-2008-6028 - https://www.exploit-db.com/exploits/6535 -CVE-2008-6029 - https://www.exploit-db.com/exploits/6527 -CVE-2008-6030 - https://www.exploit-db.com/exploits/6517 -CVE-2008-6031 - https://www.exploit-db.com/exploits/6524 -CVE-2008-6032 - https://www.exploit-db.com/exploits/6529 -CVE-2008-6033 - https://www.exploit-db.com/exploits/6525 -CVE-2008-6035 - http://packetstormsecurity.org/0809-exploits/achievo-xss.txt -CVE-2008-6036 - https://www.exploit-db.com/exploits/6533 -CVE-2008-6037 - https://www.exploit-db.com/exploits/6522 -CVE-2008-6042 - https://www.exploit-db.com/exploits/6518 -CVE-2008-6050 - https://www.exploit-db.com/exploits/7504 -CVE-2008-6057 - https://www.exploit-db.com/exploits/7493 -CVE-2008-6064 - https://www.exploit-db.com/exploits/4888 -CVE-2008-6068 - https://www.exploit-db.com/exploits/5748 -CVE-2008-6074 - https://www.exploit-db.com/exploits/6806 -CVE-2008-6076 - https://www.exploit-db.com/exploits/6802 -CVE-2008-6077 - https://www.exploit-db.com/exploits/6808 -CVE-2008-6078 - https://www.exploit-db.com/exploits/6796 -CVE-2008-6080 - https://www.exploit-db.com/exploits/6809 -CVE-2008-6081 - https://www.exploit-db.com/exploits/5468 -CVE-2008-6082 - https://www.exploit-db.com/exploits/6753 -CVE-2008-6083 - https://www.exploit-db.com/exploits/6816 -CVE-2008-6084 - https://www.exploit-db.com/exploits/6803 -CVE-2008-6086 - https://www.exploit-db.com/exploits/6710 -CVE-2008-6087 - https://www.exploit-db.com/exploits/6710 -CVE-2008-6088 - https://www.exploit-db.com/exploits/6709 -CVE-2008-6089 - https://www.exploit-db.com/exploits/6715 -CVE-2008-6090 - https://www.exploit-db.com/exploits/6713 -CVE-2008-6091 - https://www.exploit-db.com/exploits/6642 -CVE-2008-6092 - https://www.exploit-db.com/exploits/6649 -CVE-2008-6093 - https://www.exploit-db.com/exploits/6644 -CVE-2008-6099 - https://www.exploit-db.com/exploits/6648 -CVE-2008-6100 - https://www.exploit-db.com/exploits/6643 -CVE-2008-6101 - https://www.exploit-db.com/exploits/6909 -CVE-2008-6101 - https://www.exploit-db.com/exploits/9387 -CVE-2008-6102 - https://www.exploit-db.com/exploits/6650 -CVE-2008-6103 - http://packetstormsecurity.org/0809-exploits/a4deskphp-rfi.txt -CVE-2008-6105 - http://www-1.ibm.com/support/docview.wss?uid=swg1PJ33180 -CVE-2008-6106 - http://www-1.ibm.com/support/docview.wss?uid=swg1PJ33180 -CVE-2008-6108 - https://www.exploit-db.com/exploits/5758 -CVE-2008-6111 - https://www.exploit-db.com/exploits/7186 -CVE-2008-6112 - https://www.exploit-db.com/exploits/7190 -CVE-2008-6114 - https://www.exploit-db.com/exploits/7184 -CVE-2008-6115 - https://www.exploit-db.com/exploits/7195 -CVE-2008-6116 - https://www.exploit-db.com/exploits/7182 -CVE-2008-6117 - https://www.exploit-db.com/exploits/7202 -CVE-2008-6118 - https://www.exploit-db.com/exploits/7205 -CVE-2008-6123 - http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367 -CVE-2008-6129 - http://marc.info/?l=bugtraq&m=122278832621348&w=2 -CVE-2008-6130 - http://marc.info/?l=bugtraq&m=122278832621348&w=2 -CVE-2008-6131 - http://marc.info/?l=bugtraq&m=122278832621348&w=2 -CVE-2008-6133 - https://www.exploit-db.com/exploits/6659 -CVE-2008-6138 - https://www.exploit-db.com/exploits/6703 -CVE-2008-6139 - https://www.exploit-db.com/exploits/6703 -CVE-2008-6142 - https://www.exploit-db.com/exploits/7624 -CVE-2008-6143 - https://www.exploit-db.com/exploits/7597 -CVE-2008-6146 - https://www.exploit-db.com/exploits/7593 -CVE-2008-6147 - https://www.exploit-db.com/exploits/7599 -CVE-2008-6148 - https://www.exploit-db.com/exploits/7573 -CVE-2008-6149 - https://www.exploit-db.com/exploits/7574 -CVE-2008-6150 - https://www.exploit-db.com/exploits/7613 -CVE-2008-6151 - https://www.exploit-db.com/exploits/7609 -CVE-2008-6152 - https://www.exploit-db.com/exploits/7610 -CVE-2008-6153 - https://www.exploit-db.com/exploits/7627 -CVE-2008-6154 - https://www.exploit-db.com/exploits/6701 -CVE-2008-6156 - https://www.exploit-db.com/exploits/6702 -CVE-2008-6157 - https://www.exploit-db.com/exploits/7613 -CVE-2008-6162 - https://www.exploit-db.com/exploits/6652 -CVE-2008-6163 - https://www.exploit-db.com/exploits/6655 -CVE-2008-6165 - https://www.exploit-db.com/exploits/6814 -CVE-2008-6166 - https://www.exploit-db.com/exploits/6827 -CVE-2008-6167 - https://www.exploit-db.com/exploits/6821 -CVE-2008-6168 - https://www.exploit-db.com/exploits/6821 -CVE-2008-6172 - https://www.exploit-db.com/exploits/6817 -CVE-2008-6175 - https://www.exploit-db.com/exploits/6815 -CVE-2008-6177 - https://www.exploit-db.com/exploits/6797 -CVE-2008-6178 - https://www.exploit-db.com/exploits/8060 -CVE-2008-6179 - https://www.exploit-db.com/exploits/6746 -CVE-2008-6180 - https://www.exploit-db.com/exploits/6739 -CVE-2008-6181 - https://www.exploit-db.com/exploits/6724 -CVE-2008-6182 - https://www.exploit-db.com/exploits/6723 -CVE-2008-6183 - https://www.exploit-db.com/exploits/6740 -CVE-2008-6184 - https://www.exploit-db.com/exploits/6730 -CVE-2008-6185 - https://www.exploit-db.com/exploits/6719 -CVE-2008-6186 - https://www.exploit-db.com/exploits/6742 -CVE-2008-6187 - https://www.exploit-db.com/exploits/6707 -CVE-2008-6188 - https://www.exploit-db.com/exploits/6708 -CVE-2008-6190 - http://packetstormsecurity.org/0810-exploits/eebcms-xss.txt -CVE-2008-6193 - https://www.exploit-db.com/exploits/5913 -CVE-2008-6197 - https://www.exploit-db.com/exploits/5350 -CVE-2008-6198 - https://www.exploit-db.com/exploits/5379 -CVE-2008-6199 - https://www.exploit-db.com/exploits/5465 -CVE-2008-6201 - https://www.exploit-db.com/exploits/5449 -CVE-2008-6202 - https://www.exploit-db.com/exploits/5373 -CVE-2008-6204 - https://www.exploit-db.com/exploits/5409 -CVE-2008-6209 - https://www.exploit-db.com/exploits/5359 -CVE-2008-6209 - https://www.exploit-db.com/exploits/6377 -CVE-2008-6210 - https://www.exploit-db.com/exploits/5415 -CVE-2008-6213 - https://www.exploit-db.com/exploits/6874 -CVE-2008-6214 - https://www.exploit-db.com/exploits/6877 -CVE-2008-6215 - https://www.exploit-db.com/exploits/6876 -CVE-2008-6216 - https://www.exploit-db.com/exploits/6876 -CVE-2008-6220 - https://www.exploit-db.com/exploits/6987 -CVE-2008-6221 - https://www.exploit-db.com/exploits/7002 -CVE-2008-6222 - https://www.exploit-db.com/exploits/6980 -CVE-2008-6223 - https://www.exploit-db.com/exploits/6992 -CVE-2008-6224 - https://www.exploit-db.com/exploits/6992 -CVE-2008-6225 - https://www.exploit-db.com/exploits/7009 -CVE-2008-6226 - https://www.exploit-db.com/exploits/7003 -CVE-2008-6227 - https://www.exploit-db.com/exploits/6999 -CVE-2008-6228 - https://www.exploit-db.com/exploits/6999 -CVE-2008-6230 - https://www.exploit-db.com/exploits/6997 -CVE-2008-6231 - https://www.exploit-db.com/exploits/7000 -CVE-2008-6232 - https://www.exploit-db.com/exploits/6998 -CVE-2008-6233 - https://www.exploit-db.com/exploits/7007 -CVE-2008-6234 - https://www.exploit-db.com/exploits/5207 -CVE-2008-6237 - https://www.exploit-db.com/exploits/6915 -CVE-2008-6241 - https://www.exploit-db.com/exploits/7615 -CVE-2008-6242 - https://www.exploit-db.com/exploits/6922 -CVE-2008-6243 - https://www.exploit-db.com/exploits/6903 -CVE-2008-6244 - https://www.exploit-db.com/exploits/6924 -CVE-2008-6245 - https://www.exploit-db.com/exploits/6910 -CVE-2008-6246 - https://www.exploit-db.com/exploits/6913 -CVE-2008-6247 - https://www.exploit-db.com/exploits/6920 -CVE-2008-6248 - https://www.exploit-db.com/exploits/6075 -CVE-2008-6249 - https://www.exploit-db.com/exploits/6075 -CVE-2008-6250 - http://e-rdc.org/v1/news.php?readmore=102 -CVE-2008-6250 - https://www.exploit-db.com/exploits/6079 -CVE-2008-6251 - https://www.exploit-db.com/exploits/7143 -CVE-2008-6252 - https://www.exploit-db.com/exploits/7088 -CVE-2008-6253 - https://www.exploit-db.com/exploits/7153 -CVE-2008-6254 - https://www.exploit-db.com/exploits/7144 -CVE-2008-6256 - http://www.waraxe.us/advisory-68.html -CVE-2008-6257 - https://www.exploit-db.com/exploits/7137 -CVE-2008-6258 - https://www.exploit-db.com/exploits/7141 -CVE-2008-6259 - https://www.exploit-db.com/exploits/7141 -CVE-2008-6260 - https://www.exploit-db.com/exploits/7148 -CVE-2008-6261 - https://www.exploit-db.com/exploits/7138 -CVE-2008-6263 - https://www.exploit-db.com/exploits/7147 -CVE-2008-6264 - http://packetstormsecurity.org/0811-exploits/slidepopups-sql.txt -CVE-2008-6264 - https://www.exploit-db.com/exploits/7036 -CVE-2008-6265 - https://www.exploit-db.com/exploits/7065 -CVE-2008-6267 - https://www.exploit-db.com/exploits/6974 -CVE-2008-6268 - https://www.exploit-db.com/exploits/6974 -CVE-2008-6269 - https://www.exploit-db.com/exploits/6955 -CVE-2008-6270 - https://www.exploit-db.com/exploits/6969 -CVE-2008-6271 - https://www.exploit-db.com/exploits/6973 -CVE-2008-6272 - https://www.exploit-db.com/exploits/6969 -CVE-2008-6274 - https://www.exploit-db.com/exploits/7248 -CVE-2008-6277 - http://packetstormsecurity.com/0811-exploits/rakhi-sqlxssfpd.txt -CVE-2008-6277 - https://www.exploit-db.com/exploits/7250 -CVE-2008-6278 - http://packetstormsecurity.com/0811-exploits/rakhi-sqlxssfpd.txt -CVE-2008-6279 - http://packetstormsecurity.com/0811-exploits/rakhi-sqlxssfpd.txt -CVE-2008-6280 - http://packetstormsecurity.org/0811-exploits/linksys-xss.txt -CVE-2008-6281 - https://www.exploit-db.com/exploits/7268 -CVE-2008-6282 - https://www.exploit-db.com/exploits/7237 -CVE-2008-6284 - https://www.exploit-db.com/exploits/7311 -CVE-2008-6285 - https://www.exploit-db.com/exploits/7284 -CVE-2008-6286 - https://www.exploit-db.com/exploits/7280 -CVE-2008-6287 - https://www.exploit-db.com/exploits/7310 -CVE-2008-6288 - https://www.exploit-db.com/exploits/6126 -CVE-2008-6289 - https://www.exploit-db.com/exploits/6988 -CVE-2008-6290 - https://www.exploit-db.com/exploits/6990 -CVE-2008-6291 - https://www.exploit-db.com/exploits/6966 -CVE-2008-6292 - https://www.exploit-db.com/exploits/6968 -CVE-2008-6293 - https://www.exploit-db.com/exploits/6964 -CVE-2008-6294 - https://www.exploit-db.com/exploits/6965 -CVE-2008-6296 - https://www.exploit-db.com/exploits/6954 -CVE-2008-6297 - http://lostmon.blogspot.com/2008/11/dhcart-multiple-variable-xss-and-stored.html -CVE-2008-6301 - https://www.exploit-db.com/exploits/6995 -CVE-2008-6302 - https://www.exploit-db.com/exploits/7106 -CVE-2008-6303 - https://www.exploit-db.com/exploits/7176 -CVE-2008-6305 - https://www.exploit-db.com/exploits/7155 -CVE-2008-6307 - https://www.exploit-db.com/exploits/7156 -CVE-2008-6308 - https://www.exploit-db.com/exploits/7159 -CVE-2008-6309 - https://www.exploit-db.com/exploits/7166 -CVE-2008-6310 - https://www.exploit-db.com/exploits/7163 -CVE-2008-6311 - https://www.exploit-db.com/exploits/7411 -CVE-2008-6312 - https://www.exploit-db.com/exploits/7397 -CVE-2008-6313 - https://www.exploit-db.com/exploits/7417 -CVE-2008-6314 - https://www.exploit-db.com/exploits/7386 -CVE-2008-6315 - https://www.exploit-db.com/exploits/7392 -CVE-2008-6316 - https://www.exploit-db.com/exploits/7392 -CVE-2008-6317 - https://www.exploit-db.com/exploits/7399 -CVE-2008-6318 - https://www.exploit-db.com/exploits/7399 -CVE-2008-6319 - https://www.exploit-db.com/exploits/7413 -CVE-2008-6320 - https://www.exploit-db.com/exploits/7412 -CVE-2008-6321 - https://www.exploit-db.com/exploits/7412 -CVE-2008-6322 - https://www.exploit-db.com/exploits/7415 -CVE-2008-6323 - https://www.exploit-db.com/exploits/7414 -CVE-2008-6324 - https://www.exploit-db.com/exploits/7416 -CVE-2008-6327 - https://www.exploit-db.com/exploits/7397 -CVE-2008-6328 - https://www.exploit-db.com/exploits/5797 -CVE-2008-6328 - https://www.exploit-db.com/exploits/7411 -CVE-2008-6329 - https://www.exploit-db.com/exploits/7164 -CVE-2008-6330 - https://www.exploit-db.com/exploits/7160 -CVE-2008-6332 - https://www.exploit-db.com/exploits/7146 -CVE-2008-6333 - https://www.exploit-db.com/exploits/7541 -CVE-2008-6334 - https://www.exploit-db.com/exploits/7525 -CVE-2008-6335 - https://www.exploit-db.com/exploits/7524 -CVE-2008-6336 - https://www.exploit-db.com/exploits/7542 -CVE-2008-6337 - https://www.exploit-db.com/exploits/7546 -CVE-2008-6345 - https://www.exploit-db.com/exploits/7548 -CVE-2008-6347 - https://www.exploit-db.com/exploits/6976 -CVE-2008-6348 - https://www.exploit-db.com/exploits/7016 -CVE-2008-6349 - https://www.exploit-db.com/exploits/7029 -CVE-2008-6350 - https://www.exploit-db.com/exploits/7035 -CVE-2008-6351 - https://www.exploit-db.com/exploits/7035 -CVE-2008-6352 - https://www.exploit-db.com/exploits/7432 -CVE-2008-6353 - https://www.exploit-db.com/exploits/7429 -CVE-2008-6354 - https://www.exploit-db.com/exploits/7427 -CVE-2008-6355 - https://www.exploit-db.com/exploits/7428 -CVE-2008-6356 - https://www.exploit-db.com/exploits/7419 -CVE-2008-6357 - https://www.exploit-db.com/exploits/7420 -CVE-2008-6358 - https://www.exploit-db.com/exploits/7433 -CVE-2008-6359 - http://packetstormsecurity.org/files/110772/Maxs-Guestbook-1.0-Local-File-Inclusion-Path-Disclosure.html -CVE-2008-6361 - https://www.exploit-db.com/exploits/7422 -CVE-2008-6362 - https://www.exploit-db.com/exploits/7346 -CVE-2008-6363 - https://www.exploit-db.com/exploits/7362 -CVE-2008-6364 - https://www.exploit-db.com/exploits/7425 -CVE-2008-6365 - https://www.exploit-db.com/exploits/7424 -CVE-2008-6366 - https://www.exploit-db.com/exploits/7423 -CVE-2008-6367 - https://www.exploit-db.com/exploits/7435 -CVE-2008-6369 - https://www.exploit-db.com/exploits/7244 -CVE-2008-6370 - https://www.exploit-db.com/exploits/7244 -CVE-2008-6371 - https://www.exploit-db.com/exploits/7254 -CVE-2008-6372 - https://www.exploit-db.com/exploits/7271 -CVE-2008-6374 - https://www.exploit-db.com/exploits/7325 -CVE-2008-6375 - http://packetstormsecurity.org/0812-exploits/jbook-disclosesql.txt -CVE-2008-6376 - http://packetstormsecurity.org/0812-exploits/jbook-disclosesql.txt -CVE-2008-6377 - https://www.exploit-db.com/exploits/7335 -CVE-2008-6378 - https://www.exploit-db.com/exploits/7327 -CVE-2008-6379 - https://www.exploit-db.com/exploits/7326 -CVE-2008-6380 - https://www.exploit-db.com/exploits/7298 -CVE-2008-6381 - https://www.exploit-db.com/exploits/7317 -CVE-2008-6382 - https://www.exploit-db.com/exploits/7316 -CVE-2008-6386 - http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt -CVE-2008-6387 - https://www.exploit-db.com/exploits/7303 -CVE-2008-6388 - https://www.exploit-db.com/exploits/7324 -CVE-2008-6389 - https://www.exploit-db.com/exploits/7333 -CVE-2008-6390 - https://www.exploit-db.com/exploits/7254 -CVE-2008-6392 - http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt -CVE-2008-6393 - https://www.exploit-db.com/exploits/7555 -CVE-2008-6394 - https://www.exploit-db.com/exploits/6352 -CVE-2008-6396 - http://packetstormsecurity.org/0809-exploits/uploader6-xss.txt -CVE-2008-6401 - https://www.exploit-db.com/exploits/6542 -CVE-2008-6402 - https://www.exploit-db.com/exploits/6539 -CVE-2008-6403 - https://www.exploit-db.com/exploits/6538 -CVE-2008-6405 - https://www.exploit-db.com/exploits/6545 -CVE-2008-6407 - https://www.exploit-db.com/exploits/6547 -CVE-2008-6408 - https://www.exploit-db.com/exploits/6547 -CVE-2008-6409 - https://www.exploit-db.com/exploits/6547 -CVE-2008-6410 - https://www.exploit-db.com/exploits/6543 -CVE-2008-6411 - https://www.exploit-db.com/exploits/6500 -CVE-2008-6414 - https://www.exploit-db.com/exploits/6550 -CVE-2008-6419 - https://www.exploit-db.com/exploits/5701 -CVE-2008-6420 - https://www.exploit-db.com/exploits/5711 -CVE-2008-6421 - https://www.exploit-db.com/exploits/5707 -CVE-2008-6422 - https://www.exploit-db.com/exploits/5699 -CVE-2008-6423 - https://www.exploit-db.com/exploits/5704 -CVE-2008-6424 - http://vuln.sg/FFFTP196b-en.html -CVE-2008-6425 - https://www.exploit-db.com/exploits/5713 -CVE-2008-6427 - http://e-rdc.org/v1/news.php?readmore=91 -CVE-2008-6427 - https://www.exploit-db.com/exploits/5698 -CVE-2008-6427 - https://www.exploit-db.com/exploits/5928 -CVE-2008-6429 - https://www.exploit-db.com/exploits/5708 -CVE-2008-6430 - https://www.exploit-db.com/exploits/5714 -CVE-2008-6438 - https://www.exploit-db.com/exploits/5666 -CVE-2008-6438 - https://www.exploit-db.com/exploits/6346 -CVE-2008-6438 - https://www.exploit-db.com/exploits/6856 -CVE-2008-6441 - http://aluigi.altervista.org/adv/unrealcfs-adv.txt -CVE-2008-6446 - https://www.exploit-db.com/exploits/7322 -CVE-2008-6447 - https://www.exploit-db.com/exploits/7402 -CVE-2008-6451 - https://www.exploit-db.com/exploits/6505 -CVE-2008-6452 - https://www.exploit-db.com/exploits/6504 -CVE-2008-6453 - https://www.exploit-db.com/exploits/6520 -CVE-2008-6454 - https://www.exploit-db.com/exploits/6511 -CVE-2008-6464 - https://www.exploit-db.com/exploits/6508 -CVE-2008-6466 - https://www.exploit-db.com/exploits/6516 -CVE-2008-6467 - https://www.exploit-db.com/exploits/6512 -CVE-2008-6468 - https://www.exploit-db.com/exploits/6502 -CVE-2008-6469 - https://www.exploit-db.com/exploits/6503 -CVE-2008-6471 - https://www.exploit-db.com/exploits/6494 -CVE-2008-6472 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9629 -CVE-2008-6473 - https://www.exploit-db.com/exploits/5370 -CVE-2008-6475 - https://www.exploit-db.com/exploits/5391 -CVE-2008-6477 - https://www.exploit-db.com/exploits/5440 -CVE-2008-6481 - https://www.exploit-db.com/exploits/5989 -CVE-2008-6482 - https://www.exploit-db.com/exploits/6928 -CVE-2008-6483 - https://www.exploit-db.com/exploits/6975 -CVE-2008-6484 - https://www.exploit-db.com/exploits/7010 -CVE-2008-6485 - https://www.exploit-db.com/exploits/7026 -CVE-2008-6487 - https://www.exploit-db.com/exploits/7067 -CVE-2008-6488 - https://www.exploit-db.com/exploits/7021 -CVE-2008-6489 - https://www.exploit-db.com/exploits/5318 -CVE-2008-6490 - https://www.exploit-db.com/exploits/5407 -CVE-2008-6492 - https://www.exploit-db.com/exploits/7354 -CVE-2008-6493 - https://www.exploit-db.com/exploits/7340 -CVE-2008-6494 - https://www.exploit-db.com/exploits/7332 -CVE-2008-6495 - http://packetstormsecurity.org/0812-exploits/yappang-xss.txt -CVE-2008-6496 - https://www.exploit-db.com/exploits/7358 -CVE-2008-6497 - https://www.exploit-db.com/exploits/7387 -CVE-2008-6498 - https://www.exploit-db.com/exploits/7384 -CVE-2008-6499 - https://www.exploit-db.com/exploits/7384 -CVE-2008-6500 - http://packetstormsecurity.org/0812-exploits/aspshoppingcart-xss.txt -CVE-2008-6501 - https://www.exploit-db.com/exploits/7409 -CVE-2008-6502 - https://www.exploit-db.com/exploits/7409 -CVE-2008-6508 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt -CVE-2008-6508 - http://www.igniterealtime.org/issues/browse/JM-1489 -CVE-2008-6508 - https://www.exploit-db.com/exploits/7075 -CVE-2008-6509 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt -CVE-2008-6509 - http://www.igniterealtime.org/issues/browse/JM-1488 -CVE-2008-6509 - https://www.exploit-db.com/exploits/7075 -CVE-2008-6510 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt -CVE-2008-6510 - http://www.igniterealtime.org/issues/browse/JM-629 -CVE-2008-6510 - https://www.exploit-db.com/exploits/7075 -CVE-2008-6511 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt -CVE-2008-6511 - https://www.exploit-db.com/exploits/7075 -CVE-2008-6513 - https://www.exploit-db.com/exploits/7312 -CVE-2008-6515 - http://packetstormsecurity.org/0812-exploits/yappang-xss.txt -CVE-2008-6518 - https://www.exploit-db.com/exploits/6259 -CVE-2008-6519 - http://www.bratax.be/advisories/b013.html -CVE-2008-6519 - https://www.exploit-db.com/exploits/5354 -CVE-2008-6520 - http://www.bratax.be/advisories/b013.html -CVE-2008-6523 - https://www.exploit-db.com/exploits/5466 -CVE-2008-6524 - https://www.exploit-db.com/exploits/5466 -CVE-2008-6525 - https://www.exploit-db.com/exploits/7018 -CVE-2008-6526 - https://www.exploit-db.com/exploits/6962 -CVE-2008-6527 - https://www.exploit-db.com/exploits/6930 -CVE-2008-6528 - https://www.exploit-db.com/exploits/7442 -CVE-2008-6529 - https://www.exploit-db.com/exploits/7408 -CVE-2008-6530 - https://www.exploit-db.com/exploits/7408 -CVE-2008-6534 - http://vuln.sg/nullftpserver1107-en.html -CVE-2008-6534 - https://www.exploit-db.com/exploits/7355 -CVE-2008-6535 - https://www.exploit-db.com/exploits/7367 -CVE-2008-6537 - https://www.exploit-db.com/exploits/5425 -CVE-2008-6538 - https://www.exploit-db.com/exploits/5298 -CVE-2008-6539 - https://www.exploit-db.com/exploits/5305 -CVE-2008-6551 - https://www.exploit-db.com/exploits/7031 -CVE-2008-6553 - https://www.exploit-db.com/exploits/6933 -CVE-2008-6558 - https://www.exploit-db.com/exploits/5356 -CVE-2008-6559 - https://www.exploit-db.com/exploits/5357 -CVE-2008-6580 - https://www.exploit-db.com/exploits/7440 -CVE-2008-6581 - https://www.exploit-db.com/exploits/7418 -CVE-2008-6582 - https://www.exploit-db.com/exploits/7586 -CVE-2008-6583 - https://www.exploit-db.com/exploits/5455 -CVE-2008-6592 - https://www.exploit-db.com/exploits/5452 -CVE-2008-6593 - https://www.exploit-db.com/exploits/5452 -CVE-2008-6598 - http://freshmeat.net/projects/wanpipe/releases/276026 -CVE-2008-6602 - http://freshmeat.net/projects/download-center-lite/releases/275651 -CVE-2008-6604 - https://www.exploit-db.com/exploits/5690 -CVE-2008-6605 - https://www.exploit-db.com/exploits/7060 -CVE-2008-6606 - https://www.exploit-db.com/exploits/6967 -CVE-2008-6606 - https://www.exploit-db.com/exploits/6971 -CVE-2008-6607 - https://www.exploit-db.com/exploits/6971 -CVE-2008-6608 - https://www.exploit-db.com/exploits/7013 -CVE-2008-6609 - http://packetstormsecurity.org/0812-exploits/phpcksec-xssdisclose.txt -CVE-2008-6610 - http://packetstormsecurity.org/0812-exploits/phpcksec-xssdisclose.txt -CVE-2008-6611 - https://www.exploit-db.com/exploits/7306 -CVE-2008-6612 - https://www.exploit-db.com/exploits/7306 -CVE-2008-6613 - https://www.exploit-db.com/exploits/7306 -CVE-2008-6614 - https://www.exploit-db.com/exploits/9699 -CVE-2008-6617 - https://www.exploit-db.com/exploits/5726 -CVE-2008-6622 - https://www.exploit-db.com/exploits/6977 -CVE-2008-6623 - https://www.exploit-db.com/exploits/6989 -CVE-2008-6624 - https://www.exploit-db.com/exploits/6983 -CVE-2008-6625 - https://www.exploit-db.com/exploits/6984 -CVE-2008-6626 - https://www.exploit-db.com/exploits/6985 -CVE-2008-6627 - https://www.exploit-db.com/exploits/6986 -CVE-2008-6629 - https://www.exploit-db.com/exploits/6974 -CVE-2008-6632 - https://www.exploit-db.com/exploits/5653 -CVE-2008-6633 - https://www.exploit-db.com/exploits/5670 -CVE-2008-6634 - https://www.exploit-db.com/exploits/5675 -CVE-2008-6635 - https://www.exploit-db.com/exploits/5916 -CVE-2008-6636 - https://www.exploit-db.com/exploits/5916 -CVE-2008-6638 - https://www.exploit-db.com/exploits/5272 -CVE-2008-6638 - https://www.exploit-db.com/exploits/5569 -CVE-2008-6641 - https://www.exploit-db.com/exploits/5564 -CVE-2008-6642 - https://www.exploit-db.com/exploits/5509 -CVE-2008-6647 - https://www.exploit-db.com/exploits/5580 -CVE-2008-6648 - https://www.exploit-db.com/exploits/5582 -CVE-2008-6649 - https://www.exploit-db.com/exploits/5582 -CVE-2008-6650 - https://www.exploit-db.com/exploits/5568 -CVE-2008-6651 - https://www.exploit-db.com/exploits/5524 -CVE-2008-6652 - https://www.exploit-db.com/exploits/5557 -CVE-2008-6653 - https://www.exploit-db.com/exploits/5527 -CVE-2008-6656 - https://www.exploit-db.com/exploits/5531 -CVE-2008-6657 - https://www.exploit-db.com/exploits/6993 -CVE-2008-6658 - https://www.exploit-db.com/exploits/6993 -CVE-2008-6659 - https://www.exploit-db.com/exploits/7011 -CVE-2008-6661 - http://marc.info/?l=bugtraq&m=122893066212987&w=2 -CVE-2008-6663 - https://www.exploit-db.com/exploits/5879 -CVE-2008-6664 - https://www.exploit-db.com/exploits/5829 -CVE-2008-6665 - https://www.exploit-db.com/exploits/5824 -CVE-2008-6667 - https://www.exploit-db.com/exploits/5954 -CVE-2008-6668 - https://www.exploit-db.com/exploits/5856 -CVE-2008-6669 - https://www.exploit-db.com/exploits/5856 -CVE-2008-6670 - http://aluigi.altervista.org/adv/sunagex-adv.txt -CVE-2008-6670 - http://aluigi.org/poc/sunagex.zip -CVE-2008-6671 - http://aluigi.altervista.org/adv/sunagex-adv.txt -CVE-2008-6671 - http://aluigi.org/poc/sunagex.zip -CVE-2008-6672 - http://aluigi.altervista.org/adv/sunagex-adv.txt -CVE-2008-6672 - http://aluigi.org/poc/sunagex.zip -CVE-2008-6679 - http://www.openwall.com/lists/oss-security/2009/04/01/10 -CVE-2008-6679 - https://bugzilla.redhat.com/show_bug.cgi?id=493445 -CVE-2008-6683 - https://www.exploit-db.com/exploits/6956 -CVE-2008-6684 - https://www.exploit-db.com/exploits/6956 -CVE-2008-6700 - https://www.exploit-db.com/exploits/5797 -CVE-2008-6702 - http://aluigi.altervista.org/adv/stalkerboom-adv.txt -CVE-2008-6703 - http://aluigi.altervista.org/adv/stalker39x-adv.txt -CVE-2008-6704 - http://aluigi.altervista.org/adv/stalker39x-adv.txt -CVE-2008-6705 - http://aluigi.altervista.org/adv/stalker39x-adv.txt -CVE-2008-6713 - http://aluigi.altervista.org/adv/wicboom-adv.txt -CVE-2008-6714 - https://www.exploit-db.com/exploits/5818 -CVE-2008-6715 - https://www.exploit-db.com/exploits/7017 -CVE-2008-6716 - https://www.exploit-db.com/exploits/7017 -CVE-2008-6717 - https://www.exploit-db.com/exploits/7032 -CVE-2008-6718 - https://www.exploit-db.com/exploits/7033 -CVE-2008-6719 - https://www.exploit-db.com/exploits/7034 -CVE-2008-6720 - https://www.exploit-db.com/exploits/7024 -CVE-2008-6721 - https://www.exploit-db.com/exploits/6932 -CVE-2008-6723 - https://www.exploit-db.com/exploits/7028 -CVE-2008-6725 - https://www.exploit-db.com/exploits/7625 -CVE-2008-6726 - https://www.exploit-db.com/exploits/7625 -CVE-2008-6727 - https://www.exploit-db.com/exploits/7607 -CVE-2008-6729 - https://www.exploit-db.com/exploits/7557 -CVE-2008-6730 - https://www.exploit-db.com/exploits/7616 -CVE-2008-6731 - https://www.exploit-db.com/exploits/7600 -CVE-2008-6734 - https://www.exploit-db.com/exploits/5940 -CVE-2008-6734 - https://www.exploit-db.com/exploits/5956 -CVE-2008-6735 - https://www.exploit-db.com/exploits/5841 -CVE-2008-6737 - http://aluigi.altervista.org/adv/crysislog-adv.txt -CVE-2008-6738 - https://www.exploit-db.com/exploits/5845 -CVE-2008-6739 - https://www.exploit-db.com/exploits/5780 -CVE-2008-6740 - https://www.exploit-db.com/exploits/5902/ -CVE-2008-6741 - https://www.exploit-db.com/exploits/5826 -CVE-2008-6742 - https://www.exploit-db.com/exploits/5843 -CVE-2008-6743 - https://www.exploit-db.com/exploits/7497 -CVE-2008-6745 - https://www.exploit-db.com/exploits/5909 -CVE-2008-6748 - https://www.exploit-db.com/exploits/7623 -CVE-2008-6749 - https://www.exploit-db.com/exploits/7614 -CVE-2008-6750 - https://www.exploit-db.com/exploits/7614 -CVE-2008-6751 - https://www.exploit-db.com/exploits/7531 -CVE-2008-6752 - https://www.exploit-db.com/exploits/7523 -CVE-2008-6761 - https://www.exploit-db.com/exploits/7622 -CVE-2008-6763 - https://www.exploit-db.com/exploits/7601 -CVE-2008-6768 - https://www.exploit-db.com/exploits/7500 -CVE-2008-6769 - https://www.exploit-db.com/exploits/7545 -CVE-2008-6770 - https://www.exploit-db.com/exploits/7545 -CVE-2008-6771 - https://www.exploit-db.com/exploits/7545 -CVE-2008-6772 - https://www.exploit-db.com/exploits/7545 -CVE-2008-6773 - https://www.exploit-db.com/exploits/7545 -CVE-2008-6776 - https://www.exploit-db.com/exploits/6914 -CVE-2008-6777 - https://www.exploit-db.com/exploits/6879 -CVE-2008-6778 - https://www.exploit-db.com/exploits/6918 -CVE-2008-6779 - http://packetstormsecurity.org/0810-exploits/phpnukesarkilar-sql.txt -CVE-2008-6780 - https://www.exploit-db.com/exploits/6911 -CVE-2008-6781 - https://www.exploit-db.com/exploits/6894 -CVE-2008-6781 - https://www.exploit-db.com/exploits/6906 -CVE-2008-6782 - https://www.exploit-db.com/exploits/6905 -CVE-2008-6783 - https://www.exploit-db.com/exploits/6907 -CVE-2008-6784 - https://www.exploit-db.com/exploits/6895 -CVE-2008-6785 - https://www.exploit-db.com/exploits/7509 -CVE-2008-6787 - https://www.exploit-db.com/exploits/7507 -CVE-2008-6788 - https://www.exploit-db.com/exploits/6819 -CVE-2008-6789 - https://www.exploit-db.com/exploits/6820 -CVE-2008-6790 - https://www.exploit-db.com/exploits/6820 -CVE-2008-6791 - https://www.exploit-db.com/exploits/6838 -CVE-2008-6793 - http://www.ikkisoft.com/stuff/LC-2008-07.txt -CVE-2008-6793 - https://www.exploit-db.com/exploits/7001 -CVE-2008-6794 - https://www.exploit-db.com/exploits/6923 -CVE-2008-6795 - https://www.exploit-db.com/exploits/6981 -CVE-2008-6796 - https://www.exploit-db.com/exploits/7008 -CVE-2008-6797 - http://www.mitel.com/resources/NuPoint_and_Exchange.pdf -CVE-2008-6798 - https://www.exploit-db.com/exploits/7094 -CVE-2008-6804 - https://www.exploit-db.com/exploits/6886 -CVE-2008-6805 - https://www.exploit-db.com/exploits/6764 -CVE-2008-6806 - https://www.exploit-db.com/exploits/6866 -CVE-2008-6808 - https://www.exploit-db.com/exploits/6908 -CVE-2008-6809 - https://www.exploit-db.com/exploits/7253 -CVE-2008-6810 - https://www.exploit-db.com/exploits/7263 -CVE-2008-6811 - https://www.exploit-db.com/exploits/6867 -CVE-2008-6812 - https://www.exploit-db.com/exploits/5999 -CVE-2008-6813 - https://www.exploit-db.com/exploits/5998 -CVE-2008-6814 - https://www.exploit-db.com/exploits/6868 -CVE-2008-6815 - https://www.exploit-db.com/exploits/6855 -CVE-2008-6822 - https://www.exploit-db.com/exploits/6830 -CVE-2008-6823 - https://www.exploit-db.com/exploits/6899 -CVE-2008-6824 - https://www.exploit-db.com/exploits/6899 -CVE-2008-6825 - https://www.exploit-db.com/exploits/6026 -CVE-2008-6826 - https://www.exploit-db.com/exploits/6845 -CVE-2008-6829 - https://www.exploit-db.com/exploits/6834 -CVE-2008-6833 - https://www.exploit-db.com/exploits/6060 -CVE-2008-6834 - https://www.exploit-db.com/exploits/6016 -CVE-2008-6840 - http://packetstormsecurity.org/0807-exploits/vwebmail-rfi.txt -CVE-2008-6841 - https://www.exploit-db.com/exploits/6003 -CVE-2008-6842 - https://www.exploit-db.com/exploits/8271 -CVE-2008-6844 - https://www.exploit-db.com/exploits/7406 -CVE-2008-6847 - http://packetstormsecurity.org/0812-exploits/preaspjob-xsscm.txt -CVE-2008-6848 - https://www.exploit-db.com/exploits/7561 -CVE-2008-6849 - https://www.exploit-db.com/exploits/7561 -CVE-2008-6851 - https://www.exploit-db.com/exploits/7558 -CVE-2008-6852 - https://www.exploit-db.com/exploits/7572 -CVE-2008-6853 - https://www.exploit-db.com/exploits/7611 -CVE-2008-6854 - https://www.exploit-db.com/exploits/6902 -CVE-2008-6855 - https://www.exploit-db.com/exploits/6901 -CVE-2008-6856 - https://www.exploit-db.com/exploits/6900 -CVE-2008-6857 - http://www.securityfocus.com/bid/32003 -CVE-2008-6857 - https://www.exploit-db.com/exploits/6882 -CVE-2008-6858 - https://www.exploit-db.com/exploits/6890 -CVE-2008-6859 - https://www.exploit-db.com/exploits/6893 -CVE-2008-6860 - https://www.exploit-db.com/exploits/6883 -CVE-2008-6861 - https://www.exploit-db.com/exploits/6904 -CVE-2008-6862 - https://www.exploit-db.com/exploits/6889 -CVE-2008-6863 - https://www.exploit-db.com/exploits/6891 -CVE-2008-6864 - https://www.exploit-db.com/exploits/6892 -CVE-2008-6867 - https://www.exploit-db.com/exploits/6919 -CVE-2008-6869 - https://www.exploit-db.com/exploits/7286 -CVE-2008-6870 - https://www.exploit-db.com/exploits/7348 -CVE-2008-6871 - https://www.exploit-db.com/exploits/7348 -CVE-2008-6872 - https://www.exploit-db.com/exploits/7292 -CVE-2008-6873 - https://www.exploit-db.com/exploits/7288 -CVE-2008-6874 - https://www.exploit-db.com/exploits/7463 -CVE-2008-6877 - https://www.exploit-db.com/exploits/6038 -CVE-2008-6878 - https://www.exploit-db.com/exploits/6038 -CVE-2008-6881 - https://www.exploit-db.com/exploits/7441 -CVE-2008-6882 - https://www.exploit-db.com/exploits/7441 -CVE-2008-6883 - https://www.exploit-db.com/exploits/7441 -CVE-2008-6884 - https://www.exploit-db.com/exploits/7380 -CVE-2008-6887 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt -CVE-2008-6888 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt -CVE-2008-6889 - https://www.exploit-db.com/exploits/7274 -CVE-2008-6890 - http://packetstormsecurity.org/0812-exploits/aspforum-cmsqlxss.txt -CVE-2008-6891 - http://packetstormsecurity.org/0812-exploits/aspforum-cmsqlxss.txt -CVE-2008-6892 - https://www.exploit-db.com/exploits/7395 -CVE-2008-6897 - https://www.exploit-db.com/exploits/7564 -CVE-2008-6898 - https://www.exploit-db.com/exploits/7617 -CVE-2008-6900 - https://www.exploit-db.com/exploits/7456 -CVE-2008-6901 - https://www.exploit-db.com/exploits/7510 -CVE-2008-6902 - https://www.exploit-db.com/exploits/7510 -CVE-2008-6905 - https://www.exploit-db.com/exploits/7475 -CVE-2008-6906 - https://www.exploit-db.com/exploits/7475 -CVE-2008-6907 - https://www.exploit-db.com/exploits/7511 -CVE-2008-6911 - https://www.exploit-db.com/exploits/6023 -CVE-2008-6912 - https://www.exploit-db.com/exploits/7066 -CVE-2008-6913 - https://www.exploit-db.com/exploits/7062 -CVE-2008-6914 - https://www.exploit-db.com/exploits/7058 -CVE-2008-6915 - https://www.exploit-db.com/exploits/7058 -CVE-2008-6916 - https://www.exploit-db.com/exploits/7055 -CVE-2008-6917 - https://www.exploit-db.com/exploits/7071 -CVE-2008-6918 - https://www.exploit-db.com/exploits/7620 -CVE-2008-6919 - https://www.exploit-db.com/exploits/7605 -CVE-2008-6920 - https://www.exploit-db.com/exploits/7563 -CVE-2008-6921 - https://www.exploit-db.com/exploits/7562 -CVE-2008-6922 - https://www.exploit-db.com/exploits/6012 -CVE-2008-6923 - https://www.exploit-db.com/exploits/6025 -CVE-2008-6926 - https://www.exploit-db.com/exploits/6897 -CVE-2008-6927 - https://www.exploit-db.com/exploits/6897 -CVE-2008-6928 - https://www.exploit-db.com/exploits/7084 -CVE-2008-6929 - https://www.exploit-db.com/exploits/7082 -CVE-2008-6930 - https://www.exploit-db.com/exploits/7085 -CVE-2008-6931 - https://www.exploit-db.com/exploits/7083 -CVE-2008-6932 - https://www.exploit-db.com/exploits/7101 -CVE-2008-6933 - https://www.exploit-db.com/exploits/7130 -CVE-2008-6934 - https://www.exploit-db.com/exploits/7079 -CVE-2008-6935 - https://www.exploit-db.com/exploits/7145 -CVE-2008-6935 - https://www.exploit-db.com/exploits/7167 -CVE-2008-6936 - https://www.exploit-db.com/exploits/7167 -CVE-2008-6938 - https://www.exploit-db.com/exploits/7109 -CVE-2008-6939 - https://www.exploit-db.com/exploits/7107 -CVE-2008-6940 - https://www.exploit-db.com/exploits/7107 -CVE-2008-6941 - https://www.exploit-db.com/exploits/7107 -CVE-2008-6942 - https://www.exploit-db.com/exploits/7110 -CVE-2008-6943 - https://www.exploit-db.com/exploits/7112 -CVE-2008-6944 - https://www.exploit-db.com/exploits/7111 -CVE-2008-6945 - http://ftp.icdevgroup.org/interchange/5.7/WHATSNEW -CVE-2008-6945 - http://www.icdevgroup.org/i/dev/news?id=ssEkj9j8&mv_arg=00030&mv_pc=96 -CVE-2008-6946 - https://www.exploit-db.com/exploits/7076 -CVE-2008-6947 - https://www.exploit-db.com/exploits/7076 -CVE-2008-6948 - https://www.exploit-db.com/exploits/7076 -CVE-2008-6949 - https://www.exploit-db.com/exploits/7076 -CVE-2008-6950 - https://www.exploit-db.com/exploits/7120 -CVE-2008-6951 - https://www.exploit-db.com/exploits/7203 -CVE-2008-6952 - https://www.exploit-db.com/exploits/7162 -CVE-2008-6953 - http://retrogod.altervista.org/9sg_oovoo_url_poc.html -CVE-2008-6953 - https://www.exploit-db.com/exploits/7090 -CVE-2008-6955 - https://www.exploit-db.com/exploits/7136 -CVE-2008-6956 - https://www.exploit-db.com/exploits/7136 -CVE-2008-6957 - https://www.exploit-db.com/exploits/7185 -CVE-2008-6958 - https://www.exploit-db.com/exploits/7119 -CVE-2008-6959 - https://www.exploit-db.com/exploits/7142 -CVE-2008-6960 - https://www.exploit-db.com/exploits/7074 -CVE-2008-6963 - https://www.exploit-db.com/exploits/7118 -CVE-2008-6964 - https://www.exploit-db.com/exploits/7123 -CVE-2008-6965 - https://www.exploit-db.com/exploits/7087 -CVE-2008-6966 - https://www.exploit-db.com/exploits/7087 -CVE-2008-6971 - https://www.exploit-db.com/exploits/6392 -CVE-2008-6974 - https://www.exploit-db.com/exploits/9209 -CVE-2008-6975 - https://www.exploit-db.com/exploits/9209 -CVE-2008-6976 - https://www.exploit-db.com/exploits/6366 -CVE-2008-6977 - https://www.exploit-db.com/exploits/6357 -CVE-2008-6977 - https://www.exploit-db.com/exploits/6420 -CVE-2008-6978 - https://www.exploit-db.com/exploits/6357 -CVE-2008-6978 - https://www.exploit-db.com/exploits/6420 -CVE-2008-6982 - http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download -CVE-2008-6982 - https://www.exploit-db.com/exploits/6369 -CVE-2008-6983 - https://www.exploit-db.com/exploits/6369 -CVE-2008-6985 - http://www.zen-cart.com/forum/showthread.php?p=604473 -CVE-2008-6986 - http://www.zen-cart.com/forum/showthread.php?p=604473 -CVE-2008-6988 - https://www.exploit-db.com/exploits/6428 -CVE-2008-6989 - https://www.exploit-db.com/exploits/6428 -CVE-2008-6991 - https://www.exploit-db.com/exploits/6343 -CVE-2008-6994 - http://www.infoworld.com/d/security-central/critical-vulnerability-patched-in-googles-chrome-599 -CVE-2008-6994 - https://www.exploit-db.com/exploits/6365 -CVE-2008-6994 - https://www.exploit-db.com/exploits/6367 -CVE-2008-6995 - https://www.exploit-db.com/exploits/6353 -CVE-2008-6996 - https://www.exploit-db.com/exploits/6355 -CVE-2008-6997 - https://www.exploit-db.com/exploits/6386 -CVE-2008-6998 - https://www.exploit-db.com/exploits/6372 -CVE-2008-7001 - https://www.exploit-db.com/exploits/6405 -CVE-2008-7003 - https://www.exploit-db.com/exploits/7478 -CVE-2008-7004 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39903 -CVE-2008-7005 - https://www.exploit-db.com/exploits/6432 -CVE-2008-7006 - https://www.exploit-db.com/exploits/6456 -CVE-2008-7007 - https://www.exploit-db.com/exploits/6457 -CVE-2008-7010 - http://packetstormsecurity.org/0809-exploits/skalinks-editor.txt -CVE-2008-7010 - https://www.exploit-db.com/exploits/6445 -CVE-2008-7014 - https://www.exploit-db.com/exploits/6493 -CVE-2008-7017 - http://www.cynops.de/advisories/AKLINK-SA-2008-007.txt -CVE-2008-7019 - https://www.exploit-db.com/exploits/6583 -CVE-2008-7021 - https://www.exploit-db.com/exploits/6514 -CVE-2008-7022 - https://www.exploit-db.com/exploits/6600 -CVE-2008-7024 - https://www.exploit-db.com/exploits/6584 -CVE-2008-7026 - https://www.exploit-db.com/exploits/6633 -CVE-2008-7027 - https://www.exploit-db.com/exploits/6579 -CVE-2008-7028 - https://www.exploit-db.com/exploits/6591 -CVE-2008-7031 - http://aluigi.org/adv/wachof-adv.txt -CVE-2008-7038 - https://www.exploit-db.com/exploits/5203 -CVE-2008-7038 - https://www.exploit-db.com/exploits/5242 -CVE-2008-7041 - https://www.exploit-db.com/exploits/7089 -CVE-2008-7042 - https://www.exploit-db.com/exploits/7080 -CVE-2008-7043 - https://www.exploit-db.com/exploits/7080 -CVE-2008-7044 - https://www.exploit-db.com/exploits/7086 -CVE-2008-7045 - https://www.exploit-db.com/exploits/7086 -CVE-2008-7047 - https://www.exploit-db.com/exploits/7179 -CVE-2008-7049 - https://www.exploit-db.com/exploits/7172 -CVE-2008-7049 - https://www.exploit-db.com/exploits/7175 -CVE-2008-7051 - https://www.exploit-db.com/exploits/7081 -CVE-2008-7052 - https://www.exploit-db.com/exploits/7094 -CVE-2008-7053 - https://www.exploit-db.com/exploits/6326 -CVE-2008-7054 - https://www.exploit-db.com/exploits/6301 -CVE-2008-7055 - https://www.exploit-db.com/exploits/6301 -CVE-2008-7056 - https://www.exploit-db.com/exploits/6286 -CVE-2008-7057 - https://www.exploit-db.com/exploits/6286 -CVE-2008-7058 - https://www.exploit-db.com/exploits/6286 -CVE-2008-7062 - https://www.exploit-db.com/exploits/7233 -CVE-2008-7063 - https://www.exploit-db.com/exploits/7258 -CVE-2008-7064 - https://www.exploit-db.com/exploits/7217 -CVE-2008-7065 - https://www.exploit-db.com/exploits/7220 -CVE-2008-7066 - https://www.exploit-db.com/exploits/7291 -CVE-2008-7067 - https://www.exploit-db.com/exploits/7255 -CVE-2008-7069 - https://www.exploit-db.com/exploits/7266 -CVE-2008-7070 - https://www.exploit-db.com/exploits/7181 -CVE-2008-7071 - https://www.exploit-db.com/exploits/7227 -CVE-2008-7072 - https://www.exploit-db.com/exploits/7227 -CVE-2008-7073 - https://www.exploit-db.com/exploits/7225 -CVE-2008-7074 - https://www.exploit-db.com/exploits/7249 -CVE-2008-7075 - https://www.exploit-db.com/exploits/7240 -CVE-2008-7075 - https://www.exploit-db.com/exploits/7243 -CVE-2008-7076 - https://www.exploit-db.com/exploits/7251 -CVE-2008-7077 - https://www.exploit-db.com/exploits/7267 -CVE-2008-7078 - https://www.exploit-db.com/exploits/7314 -CVE-2008-7079 - https://www.exploit-db.com/exploits/7207 -CVE-2008-7080 - https://www.exploit-db.com/exploits/7206 -CVE-2008-7083 - https://www.exploit-db.com/exploits/7270 -CVE-2008-7084 - https://www.exploit-db.com/exploits/6151 -CVE-2008-7085 - https://www.exploit-db.com/exploits/6084 -CVE-2008-7086 - https://www.exploit-db.com/exploits/6050 -CVE-2008-7088 - https://www.exploit-db.com/exploits/6082 -CVE-2008-7089 - https://www.exploit-db.com/exploits/6173 -CVE-2008-7090 - https://www.exploit-db.com/exploits/6173 -CVE-2008-7091 - https://www.exploit-db.com/exploits/6173 -CVE-2008-7097 - https://www.exploit-db.com/exploits/6312 -CVE-2008-7098 - https://www.exploit-db.com/exploits/6312 -CVE-2008-7099 - https://www.exploit-db.com/exploits/6312 -CVE-2008-7103 - https://www.exploit-db.com/exploits/6327 -CVE-2008-7107 - https://www.exploit-db.com/exploits/6251 -CVE-2008-7114 - https://www.exploit-db.com/exploits/6315 -CVE-2008-7115 - https://www.exploit-db.com/exploits/6305 -CVE-2008-7116 - https://www.exploit-db.com/exploits/6339 -CVE-2008-7117 - https://www.exploit-db.com/exploits/6339 -CVE-2008-7118 - https://www.exploit-db.com/exploits/6339 -CVE-2008-7119 - https://www.exploit-db.com/exploits/6341 -CVE-2008-7120 - http://www.packetstormsecurity.org/0809-exploits/hotlinks-sql.txt -CVE-2008-7121 - http://www.packetstormsecurity.org/0809-exploits/hotlinks-sql.txt -CVE-2008-7122 - https://www.exploit-db.com/exploits/5271 -CVE-2008-7123 - https://www.exploit-db.com/exploits/5220 -CVE-2008-7124 - https://www.exploit-db.com/exploits/5219 -CVE-2008-7124 - https://www.exploit-db.com/exploits/5220 -CVE-2008-7126 - http://aluigi.altervista.org/adv/visibroken-adv.txt -CVE-2008-7127 - http://aluigi.altervista.org/adv/visibroken-adv.txt -CVE-2008-7136 - https://www.exploit-db.com/exploits/5217 -CVE-2008-7149 - http://freshmeat.net/projects/agilewiki/releases/273210 -CVE-2008-7153 - https://www.exploit-db.com/exploits/4879 -CVE-2008-7153 - https://www.exploit-db.com/exploits/4891 -CVE-2008-7154 - https://www.exploit-db.com/exploits/4879 -CVE-2008-7156 - https://www.exploit-db.com/exploits/4859 -CVE-2008-7157 - https://www.exploit-db.com/exploits/4859 -CVE-2008-7163 - https://www.exploit-db.com/exploits/4854 -CVE-2008-7166 - http://aluigi.altervista.org/adv/ruttorrent2-adv.txt -CVE-2008-7167 - https://www.exploit-db.com/exploits/5936 -CVE-2008-7169 - https://www.exploit-db.com/exploits/5963 -CVE-2008-7171 - https://www.exploit-db.com/exploits/5873 -CVE-2008-7172 - https://www.exploit-db.com/exploits/5873 -CVE-2008-7176 - https://www.exploit-db.com/exploits/5792 -CVE-2008-7178 - https://www.exploit-db.com/exploits/5756 -CVE-2008-7179 - https://www.exploit-db.com/exploits/5959 -CVE-2008-7180 - https://www.exploit-db.com/exploits/5769 -CVE-2008-7181 - https://www.exploit-db.com/exploits/5800 -CVE-2008-7182 - https://www.exploit-db.com/exploits/5968 -CVE-2008-7185 - http://packetstormsecurity.org/0806-advisories/rhythmbox-dos.txt -CVE-2008-7188 - https://www.exploit-db.com/exploits/4837 -CVE-2008-7189 - http://freshmeat.net/projects/localmediabrowser/releases/269578 -CVE-2008-7203 - https://www.exploit-db.com/exploits/4856 -CVE-2008-7208 - https://www.exploit-db.com/exploits/4857 -CVE-2008-7209 - https://www.exploit-db.com/exploits/4857 -CVE-2008-7210 - https://www.exploit-db.com/exploits/4890 -CVE-2008-7220 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html -CVE-2008-7220 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2008-7220 - https://seclists.org/bugtraq/2019/May/18 -CVE-2008-7223 - http://freshmeat.net/projects/linpha/releases/271366 -CVE-2008-7225 - http://aluigi.org/adv/wachof-adv.txt -CVE-2008-7232 - http://aluigi.altervista.org/adv/xtacacsdz-adv.txt -CVE-2008-7232 - http://aluigi.org/poc/xtacacsdz.zip -CVE-2008-7240 - https://www.exploit-db.com/exploits/5179 -CVE-2008-7251 - http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11536&r2=11535&pathrev=11536 -CVE-2008-7254 - http://packetstormsecurity.org/0808-exploits/pepsicms-rfi.txt -CVE-2008-7258 - http://marc.info/?l=oss-security&m=128013391907262&w=2 -CVE-2008-7258 - http://marc.info/?l=oss-security&m=128017258305041&w=2 -CVE-2008-7258 - http://marc.info/?l=oss-security&m=128077707318085&w=2 -CVE-2008-7258 - http://www.openwall.com/lists/oss-security/2010/08/19/6 -CVE-2008-7262 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2008-7263 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2008-7264 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2008-7267 - https://www.exploit-db.com/exploits/6823 -CVE-2008-7268 - https://www.exploit-db.com/exploits/6823 -CVE-2008-7269 - https://www.exploit-db.com/exploits/6823 -CVE-2008-7303 - http://www.coresecurity.com/content/apple-osx-sandbox-bypass -CVE-2009-0004 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6211 -CVE-2009-0023 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2009-0026 - http://securityreason.com/securityalert/4942 -CVE-2009-0028 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0033 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0041 - http://securityreason.com/securityalert/4910 -CVE-2009-0042 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/26/ca20090126-01-ca-anti-virus-engine-detection-evasion-multiple-vulnerabilities.aspx -CVE-2009-0043 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/07.aspx -CVE-2009-0043 - http://securityreason.com/securityalert/4887 -CVE-2009-0066 - http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk -CVE-2009-0066 - http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html -CVE-2009-0070 - https://www.exploit-db.com/exploits/7673 -CVE-2009-0071 - https://www.exploit-db.com/exploits/8091 -CVE-2009-0071 - https://www.exploit-db.com/exploits/8219 -CVE-2009-0075 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002 -CVE-2009-0075 - https://www.exploit-db.com/exploits/8077 -CVE-2009-0075 - https://www.exploit-db.com/exploits/8079 -CVE-2009-0075 - https://www.exploit-db.com/exploits/8080 -CVE-2009-0075 - https://www.exploit-db.com/exploits/8082 -CVE-2009-0076 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002 -CVE-2009-0077 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 -CVE-2009-0081 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 -CVE-2009-0082 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 -CVE-2009-0083 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 -CVE-2009-0084 - http://www.piotrbania.com/all/adv/ms-directx-mjpeg-adv.txt -CVE-2009-0084 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-011 -CVE-2009-0085 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-007 -CVE-2009-0086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 -CVE-2009-0087 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 -CVE-2009-0088 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 -CVE-2009-0089 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 -CVE-2009-0090 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 -CVE-2009-0091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 -CVE-2009-0093 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 -CVE-2009-0094 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 -CVE-2009-0095 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 -CVE-2009-0096 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 -CVE-2009-0097 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 -CVE-2009-0098 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 -CVE-2009-0099 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 -CVE-2009-0100 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 -CVE-2009-0102 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-074 -CVE-2009-0103 - http://securityreason.com/securityalert/4888 -CVE-2009-0103 - https://www.exploit-db.com/exploits/7687 -CVE-2009-0104 - http://securityreason.com/securityalert/4890 -CVE-2009-0104 - https://www.exploit-db.com/exploits/7680 -CVE-2009-0105 - http://securityreason.com/securityalert/4890 -CVE-2009-0105 - https://www.exploit-db.com/exploits/7680 -CVE-2009-0106 - https://www.exploit-db.com/exploits/7672 -CVE-2009-0107 - https://www.exploit-db.com/exploits/7672 -CVE-2009-0108 - http://securityreason.com/securityalert/4891 -CVE-2009-0108 - https://www.exploit-db.com/exploits/7674 -CVE-2009-0109 - http://securityreason.com/securityalert/4892 -CVE-2009-0109 - https://www.exploit-db.com/exploits/7682 -CVE-2009-0110 - http://securityreason.com/securityalert/4893 -CVE-2009-0110 - https://www.exploit-db.com/exploits/7679 -CVE-2009-0111 - http://securityreason.com/securityalert/4894 -CVE-2009-0111 - https://www.exploit-db.com/exploits/7683 -CVE-2009-0112 - http://securityreason.com/securityalert/4895 -CVE-2009-0113 - http://securityreason.com/securityalert/4896 -CVE-2009-0113 - https://www.exploit-db.com/exploits/7691 -CVE-2009-0114 - http://isc.sans.org/diary.html?storyid=5929 -CVE-2009-0115 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9214 -CVE-2009-0119 - http://securityreason.com/securityalert/4912 -CVE-2009-0119 - https://www.exploit-db.com/exploits/7720 -CVE-2009-0120 - http://securityreason.com/securityalert/4911 -CVE-2009-0123 - http://isc.sans.org/diary.html?storyid=5689 -CVE-2009-0133 - http://securityreason.com/securityalert/4914 -CVE-2009-0133 - https://www.exploit-db.com/exploits/7727 -CVE-2009-0134 - http://securityreason.com/securityalert/4913 -CVE-2009-0134 - https://www.exploit-db.com/exploits/7779 -CVE-2009-0135 - http://securityreason.com/securityalert/4915 -CVE-2009-0136 - http://securityreason.com/securityalert/4915 -CVE-2009-0146 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9632 -CVE-2009-0147 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941 -CVE-2009-0148 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9633 -CVE-2009-0153 - http://bugs.icu-project.org/trac/ticket/5691 -CVE-2009-0159 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0159 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9634 -CVE-2009-0166 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9778 -CVE-2009-0168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5503 -CVE-2009-0174 - http://securityreason.com/securityalert/4918 -CVE-2009-0174 - https://www.exploit-db.com/exploits/7709 -CVE-2009-0174 - https://www.exploit-db.com/exploits/7713 -CVE-2009-0174 - https://www.exploit-db.com/exploits/7714 -CVE-2009-0174 - https://www.exploit-db.com/exploits/7715 -CVE-2009-0175 - http://securityreason.com/securityalert/4920 -CVE-2009-0175 - https://www.exploit-db.com/exploits/7708 -CVE-2009-0177 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-0177 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433 -CVE-2009-0177 - https://www.exploit-db.com/exploits/7647 -CVE-2009-0181 - http://securityreason.com/securityalert/4921 -CVE-2009-0182 - http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.html -CVE-2009-0182 - http://securityreason.com/securityalert/4923 -CVE-2009-0182 - https://www.exploit-db.com/exploits/7695 -CVE-2009-0183 - https://www.exploit-db.com/exploits/7986 -CVE-2009-0217 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-0220 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0221 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0222 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0223 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0224 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0225 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0226 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0227 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0228 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 -CVE-2009-0229 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 -CVE-2009-0230 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 -CVE-2009-0231 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 -CVE-2009-0232 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 -CVE-2009-0233 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 -CVE-2009-0234 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 -CVE-2009-0235 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 -CVE-2009-0237 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 -CVE-2009-0238 - http://isc.sans.org/diary.html?storyid=5923 -CVE-2009-0238 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 -CVE-2009-0239 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-023 -CVE-2009-0241 - http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html -CVE-2009-0243 - http://isc.sans.org/diary.html?storyid=5695 -CVE-2009-0244 - http://securityreason.com/securityalert/4938 -CVE-2009-0246 - http://securityreason.com/securityalert/4941 -CVE-2009-0248 - https://www.exploit-db.com/exploits/7805 -CVE-2009-0249 - https://www.exploit-db.com/exploits/7805 -CVE-2009-0250 - http://securityreason.com/securityalert/4935 -CVE-2009-0250 - https://www.exploit-db.com/exploits/7780 -CVE-2009-0251 - http://securityreason.com/securityalert/4935 -CVE-2009-0251 - https://www.exploit-db.com/exploits/7780 -CVE-2009-0252 - https://www.exploit-db.com/exploits/7801 -CVE-2009-0253 - http://securityreason.com/securityalert/4936 -CVE-2009-0253 - https://www.exploit-db.com/exploits/7842 -CVE-2009-0259 - https://www.exploit-db.com/exploits/6560 -CVE-2009-0261 - https://www.exploit-db.com/exploits/7839 -CVE-2009-0262 - https://www.exploit-db.com/exploits/7737 -CVE-2009-0263 - https://www.exploit-db.com/exploits/7742 -CVE-2009-0269 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0279 - https://www.exploit-db.com/exploits/7851 -CVE-2009-0280 - https://www.exploit-db.com/exploits/7850 -CVE-2009-0281 - https://www.exploit-db.com/exploits/7802 -CVE-2009-0284 - https://www.exploit-db.com/exploits/7862 -CVE-2009-0286 - https://www.exploit-db.com/exploits/7863 -CVE-2009-0290 - https://www.exploit-db.com/exploits/7792 -CVE-2009-0291 - https://www.exploit-db.com/exploits/7883 -CVE-2009-0292 - https://www.exploit-db.com/exploits/7874 -CVE-2009-0293 - https://www.exploit-db.com/exploits/7877 -CVE-2009-0295 - https://www.exploit-db.com/exploits/7867 -CVE-2009-0296 - https://www.exploit-db.com/exploits/7873 -CVE-2009-0297 - https://www.exploit-db.com/exploits/7880 -CVE-2009-0298 - https://www.exploit-db.com/exploits/7869 -CVE-2009-0299 - https://www.exploit-db.com/exploits/7878 -CVE-2009-0299 - https://www.exploit-db.com/exploits/9236 -CVE-2009-0301 - https://www.exploit-db.com/exploits/7868 -CVE-2009-0304 - https://www.exploit-db.com/exploits/7865 -CVE-2009-0315 - https://bugzilla.redhat.com/show_bug.cgi?id=481560 -CVE-2009-0316 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305 -CVE-2009-0316 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493937 -CVE-2009-0316 - https://bugzilla.redhat.com/show_bug.cgi?id=481565 -CVE-2009-0317 - https://bugzilla.redhat.com/show_bug.cgi?id=481570 -CVE-2009-0321 - http://lostmon.blogspot.com/2009/01/safari-for-windows-321-remote-http-uri.html -CVE-2009-0322 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0323 - http://www.coresecurity.com/content/amaya-buffer-overflows -CVE-2009-0323 - https://www.exploit-db.com/exploits/7902 -CVE-2009-0324 - https://www.exploit-db.com/exploits/7814 -CVE-2009-0325 - https://www.exploit-db.com/exploits/7831 -CVE-2009-0327 - https://www.exploit-db.com/exploits/7798 -CVE-2009-0328 - https://www.exploit-db.com/exploits/7816 -CVE-2009-0329 - https://www.exploit-db.com/exploits/7824 -CVE-2009-0330 - https://www.exploit-db.com/exploits/7818 -CVE-2009-0331 - https://www.exploit-db.com/exploits/7819 -CVE-2009-0333 - https://www.exploit-db.com/exploits/7833 -CVE-2009-0334 - https://www.exploit-db.com/exploits/7806 -CVE-2009-0335 - https://www.exploit-db.com/exploits/7806 -CVE-2009-0336 - https://www.exploit-db.com/exploits/7806 -CVE-2009-0337 - https://www.exploit-db.com/exploits/7806 -CVE-2009-0340 - https://www.exploit-db.com/exploits/7813 -CVE-2009-0349 - https://www.exploit-db.com/exploits/7852 -CVE-2009-0350 - https://www.exploit-db.com/exploits/7857 -CVE-2009-0351 - https://www.exploit-db.com/exploits/7875 -CVE-2009-0352 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0353 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0354 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9796 -CVE-2009-0355 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0355 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9161 -CVE-2009-0356 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9922 -CVE-2009-0357 - https://bugzilla.mozilla.org/show_bug.cgi?id=380418 -CVE-2009-0357 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9459 -CVE-2009-0369 - https://www.exploit-db.com/exploits/7912 -CVE-2009-0371 - https://www.exploit-db.com/exploits/7879 -CVE-2009-0372 - https://www.exploit-db.com/exploits/7859 -CVE-2009-0373 - https://www.exploit-db.com/exploits/7881 -CVE-2009-0374 - https://www.exploit-db.com/exploits/7903 -CVE-2009-0377 - https://www.exploit-db.com/exploits/7847 -CVE-2009-0378 - https://www.exploit-db.com/exploits/7847 -CVE-2009-0379 - https://www.exploit-db.com/exploits/7846 -CVE-2009-0380 - https://www.exploit-db.com/exploits/7841 -CVE-2009-0381 - https://www.exploit-db.com/exploits/7840 -CVE-2009-0383 - https://www.exploit-db.com/exploits/7835 -CVE-2009-0384 - https://www.exploit-db.com/exploits/7849 -CVE-2009-0386 - http://www.redhat.com/support/errata/RHSA-2009-0271.html -CVE-2009-0387 - http://www.redhat.com/support/errata/RHSA-2009-0271.html -CVE-2009-0388 - http://www.coresecurity.com/content/vnc-integer-overflows -CVE-2009-0388 - https://www.exploit-db.com/exploits/7990 -CVE-2009-0388 - https://www.exploit-db.com/exploits/8024 -CVE-2009-0389 - https://www.exploit-db.com/exploits/7910 -CVE-2009-0392 - https://www.exploit-db.com/exploits/7915 -CVE-2009-0393 - https://www.exploit-db.com/exploits/7915 -CVE-2009-0394 - https://www.exploit-db.com/exploits/7917 -CVE-2009-0395 - https://www.exploit-db.com/exploits/7916 -CVE-2009-0397 - http://www.redhat.com/support/errata/RHSA-2009-0271.html -CVE-2009-0397 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9942 -CVE-2009-0398 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9886 -CVE-2009-0399 - https://www.exploit-db.com/exploits/7894 -CVE-2009-0400 - https://www.exploit-db.com/exploits/7900 -CVE-2009-0401 - http://packetstormsecurity.org/0901-exploits/ephpcmscid-sql.txt -CVE-2009-0403 - https://www.exploit-db.com/exploits/7894 -CVE-2009-0404 - http://freshmeat.net/projects/htmlawed/?branch_id=74760&release_id=293026 -CVE-2009-0405 - https://www.exploit-db.com/exploits/7901 -CVE-2009-0406 - https://www.exploit-db.com/exploits/7892 -CVE-2009-0407 - https://www.exploit-db.com/exploits/7876 -CVE-2009-0409 - https://www.exploit-db.com/exploits/7899 -CVE-2009-0419 - https://bugzilla.mozilla.org/show_bug.cgi?id=380418 -CVE-2009-0420 - https://www.exploit-db.com/exploits/7795 -CVE-2009-0421 - https://www.exploit-db.com/exploits/7793 -CVE-2009-0422 - https://www.exploit-db.com/exploits/7778 -CVE-2009-0423 - https://www.exploit-db.com/exploits/7786 -CVE-2009-0425 - https://www.exploit-db.com/exploits/7797 -CVE-2009-0426 - https://www.exploit-db.com/exploits/7767 -CVE-2009-0427 - https://www.exploit-db.com/exploits/7773 -CVE-2009-0428 - https://www.exploit-db.com/exploits/7787 -CVE-2009-0431 - http://packetstormsecurity.org/0901-exploits/linkspro-sql.txt -CVE-2009-0441 - https://www.exploit-db.com/exploits/7965 -CVE-2009-0442 - https://www.exploit-db.com/exploits/7980 -CVE-2009-0443 - https://www.exploit-db.com/exploits/7942 -CVE-2009-0444 - https://www.exploit-db.com/exploits/7979 -CVE-2009-0445 - https://www.exploit-db.com/exploits/7968 -CVE-2009-0445 - https://www.exploit-db.com/exploits/9451 -CVE-2009-0446 - https://www.exploit-db.com/exploits/7961 -CVE-2009-0447 - https://www.exploit-db.com/exploits/7963 -CVE-2009-0448 - https://www.exploit-db.com/exploits/7977 -CVE-2009-0450 - https://www.exploit-db.com/exploits/7975 -CVE-2009-0451 - https://www.exploit-db.com/exploits/7932 -CVE-2009-0452 - https://www.exploit-db.com/exploits/7956 -CVE-2009-0453 - https://www.exploit-db.com/exploits/7956 -CVE-2009-0454 - https://www.exploit-db.com/exploits/7970 -CVE-2009-0456 - https://www.exploit-db.com/exploits/7946 -CVE-2009-0457 - https://www.exploit-db.com/exploits/7939 -CVE-2009-0458 - https://www.exploit-db.com/exploits/7940 -CVE-2009-0459 - https://www.exploit-db.com/exploits/7941 -CVE-2009-0460 - https://www.exploit-db.com/exploits/7951 -CVE-2009-0461 - https://www.exploit-db.com/exploits/7952 -CVE-2009-0462 - https://www.exploit-db.com/exploits/7953 -CVE-2009-0463 - https://www.exploit-db.com/exploits/7954 -CVE-2009-0464 - https://www.exploit-db.com/exploits/7955 -CVE-2009-0465 - https://www.exploit-db.com/exploits/7928 -CVE-2009-0467 - https://www.exploit-db.com/exploits/7919 -CVE-2009-0468 - https://www.exploit-db.com/exploits/7919 -CVE-2009-0476 - https://www.exploit-db.com/exploits/7958 -CVE-2009-0476 - https://www.exploit-db.com/exploits/7973 -CVE-2009-0476 - https://www.exploit-db.com/exploits/7974 -CVE-2009-0478 - https://www.exploit-db.com/exploits/8021 -CVE-2009-0490 - http://bugs.gentoo.org/show_bug.cgi?id=253493 -CVE-2009-0490 - https://www.exploit-db.com/exploits/7634 -CVE-2009-0491 - https://www.exploit-db.com/exploits/7637 -CVE-2009-0493 - https://www.exploit-db.com/exploits/7686 -CVE-2009-0494 - https://www.exploit-db.com/exploits/7734 -CVE-2009-0495 - https://www.exploit-db.com/exploits/7743 -CVE-2009-0496 - http://www.coresecurity.com/content/openfire-multiple-vulnerabilities -CVE-2009-0496 - http://www.igniterealtime.org/issues/browse/JM-1506 -CVE-2009-0497 - http://www.coresecurity.com/content/openfire-multiple-vulnerabilities -CVE-2009-0498 - https://www.exploit-db.com/exploits/7744 -CVE-2009-0513 - https://www.exploit-db.com/exploits/8025 -CVE-2009-0514 - https://www.exploit-db.com/exploits/8025 -CVE-2009-0515 - https://www.exploit-db.com/exploits/8020 -CVE-2009-0516 - https://www.exploit-db.com/exploits/8011 -CVE-2009-0517 - https://www.exploit-db.com/exploits/7948 -CVE-2009-0518 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-0519 - http://isc.sans.org/diary.html?storyid=5929 -CVE-2009-0520 - http://isc.sans.org/diary.html?storyid=5929 -CVE-2009-0521 - http://isc.sans.org/diary.html?storyid=5929 -CVE-2009-0522 - http://isc.sans.org/diary.html?storyid=5929 -CVE-2009-0526 - https://www.exploit-db.com/exploits/8016 -CVE-2009-0527 - https://www.exploit-db.com/exploits/8016 -CVE-2009-0528 - https://www.exploit-db.com/exploits/8007 -CVE-2009-0529 - https://www.exploit-db.com/exploits/8017 -CVE-2009-0530 - https://www.exploit-db.com/exploits/8017 -CVE-2009-0531 - https://www.exploit-db.com/exploits/8012 -CVE-2009-0534 - https://www.exploit-db.com/exploits/8018 -CVE-2009-0535 - https://www.exploit-db.com/exploits/8029 -CVE-2009-0537 - https://www.exploit-db.com/exploits/8163 -CVE-2009-0542 - https://www.exploit-db.com/exploits/8037 -CVE-2009-0545 - http://www.ikkisoft.com/stuff/LC-2009-01.txt -CVE-2009-0545 - https://www.exploit-db.com/exploits/8023 -CVE-2009-0546 - https://www.exploit-db.com/exploits/7995 -CVE-2009-0546 - https://www.exploit-db.com/exploits/8010 -CVE-2009-0547 - https://bugzilla.redhat.com/show_bug.cgi?id=484925 -CVE-2009-0547 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9619 -CVE-2009-0549 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-0550 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 -CVE-2009-0550 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -CVE-2009-0551 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -CVE-2009-0552 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -CVE-2009-0553 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -CVE-2009-0554 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -CVE-2009-0555 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-051 -CVE-2009-0556 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-0557 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-0558 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-0559 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-0560 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-0561 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-0562 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 -CVE-2009-0563 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027 -CVE-2009-0565 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027 -CVE-2009-0566 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-030 -CVE-2009-0568 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-026 -CVE-2009-0570 - https://www.exploit-db.com/exploits/8001 -CVE-2009-0571 - https://www.exploit-db.com/exploits/8001 -CVE-2009-0572 - https://www.exploit-db.com/exploits/7969 -CVE-2009-0574 - https://www.exploit-db.com/exploits/8002 -CVE-2009-0577 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9968 -CVE-2009-0580 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0580 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9101 -CVE-2009-0583 - http://bugs.gentoo.org/show_bug.cgi?id=261087 -CVE-2009-0584 - http://bugs.gentoo.org/show_bug.cgi?id=261087 -CVE-2009-0585 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9599 -CVE-2009-0586 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9694 -CVE-2009-0590 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html -CVE-2009-0590 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198 -CVE-2009-0592 - https://www.exploit-db.com/exploits/7658 -CVE-2009-0593 - https://www.exploit-db.com/exploits/7663 -CVE-2009-0594 - https://www.exploit-db.com/exploits/7648 -CVE-2009-0595 - https://www.exploit-db.com/exploits/7648 -CVE-2009-0596 - https://www.exploit-db.com/exploits/7648 -CVE-2009-0597 - https://www.exploit-db.com/exploits/7640 -CVE-2009-0598 - https://www.exploit-db.com/exploits/7660 -CVE-2009-0599 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9677 -CVE-2009-0602 - https://www.exploit-db.com/exploits/7998 -CVE-2009-0604 - https://www.exploit-db.com/exploits/8014 -CVE-2009-0611 - http://packetstormsecurity.org/0902-exploits/nqfs-xss.txt -CVE-2009-0639 - https://www.exploit-db.com/exploits/8005 -CVE-2009-0641 - https://www.exploit-db.com/exploits/8055 -CVE-2009-0643 - https://www.exploit-db.com/exploits/7999 -CVE-2009-0645 - https://www.exploit-db.com/exploits/7976 -CVE-2009-0646 - https://www.exploit-db.com/exploits/7964 -CVE-2009-0649 - https://www.exploit-db.com/exploits/8051 -CVE-2009-0650 - https://www.exploit-db.com/exploits/8058 -CVE-2009-0652 - http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike -CVE-2009-0652 - https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf -CVE-2009-0653 - http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike -CVE-2009-0653 - https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf -CVE-2009-0658 - http://isc.sans.org/diary.html?n&storyid=5902 -CVE-2009-0658 - http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219 -CVE-2009-0658 - https://www.exploit-db.com/exploits/8090 -CVE-2009-0658 - https://www.exploit-db.com/exploits/8099 -CVE-2009-0663 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499 -CVE-2009-0672 - https://www.exploit-db.com/exploits/8068 -CVE-2009-0673 - https://www.exploit-db.com/exploits/8068 -CVE-2009-0674 - https://www.exploit-db.com/exploits/8068 -CVE-2009-0675 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0676 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0677 - https://www.exploit-db.com/exploits/8068 -CVE-2009-0678 - https://www.exploit-db.com/exploits/8068 -CVE-2009-0680 - https://www.exploit-db.com/exploits/8008 -CVE-2009-0686 - https://www.exploit-db.com/exploits/8322 -CVE-2009-0687 - https://www.exploit-db.com/exploits/8406 -CVE-2009-0687 - https://www.exploit-db.com/exploits/8581 -CVE-2009-0688 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/69 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/71 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/72 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/73 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/75 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/76 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/77 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/78 -CVE-2009-0689 - http://securityreason.com/achievement_securityalert/81 -CVE-2009-0689 - https://bugzilla.mozilla.org/show_bug.cgi?id=516396 -CVE-2009-0689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9541 -CVE-2009-0690 - http://www.kb.cert.org/vuls/id/251793 -CVE-2009-0691 - http://www.kb.cert.org/vuls/id/251793 -CVE-2009-0692 - http://www.kb.cert.org/vuls/id/410676 -CVE-2009-0693 - http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/ -CVE-2009-0695 - http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/ -CVE-2009-0696 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0701 - https://www.exploit-db.com/exploits/7668 -CVE-2009-0702 - https://www.exploit-db.com/exploits/7670 -CVE-2009-0703 - https://www.exploit-db.com/exploits/7635 -CVE-2009-0704 - https://www.exploit-db.com/exploits/7659 -CVE-2009-0705 - https://www.exploit-db.com/exploits/7641 -CVE-2009-0706 - http://packetstormsecurity.org/0901-exploits/joomlasimplereview-sql.txt -CVE-2009-0707 - https://www.exploit-db.com/exploits/7642 -CVE-2009-0711 - https://www.exploit-db.com/exploits/7636 -CVE-2009-0714 - https://www.exploit-db.com/exploits/9006 -CVE-2009-0714 - https://www.exploit-db.com/exploits/9007 -CVE-2009-0722 - https://www.exploit-db.com/exploits/8032 -CVE-2009-0726 - https://www.exploit-db.com/exploits/7746 -CVE-2009-0727 - http://e-rdc.org/v1/news.php?readmore=126 -CVE-2009-0727 - https://www.exploit-db.com/exploits/8098 -CVE-2009-0728 - https://www.exploit-db.com/exploits/8100 -CVE-2009-0731 - https://www.exploit-db.com/exploits/8094 -CVE-2009-0733 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9742 -CVE-2009-0735 - https://www.exploit-db.com/exploits/8030 -CVE-2009-0737 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES -CVE-2009-0737 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES -CVE-2009-0738 - https://www.exploit-db.com/exploits/8033 -CVE-2009-0739 - https://www.exploit-db.com/exploits/8034 -CVE-2009-0740 - https://www.exploit-db.com/exploits/8035 -CVE-2009-0744 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6066 -CVE-2009-0745 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0746 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0747 - http://bugzilla.kernel.org/show_bug.cgi?id=12375 -CVE-2009-0747 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0747 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200 -CVE-2009-0748 - http://bugzilla.kernel.org/show_bug.cgi?id=12371 -CVE-2009-0748 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0750 - https://www.exploit-db.com/exploits/8076 -CVE-2009-0751 - https://www.exploit-db.com/exploits/8148 -CVE-2009-0753 - https://www.exploit-db.com/exploits/8097 -CVE-2009-0760 - https://www.exploit-db.com/exploits/7982 -CVE-2009-0761 - https://www.exploit-db.com/exploits/7982 -CVE-2009-0763 - https://www.exploit-db.com/exploits/7993 -CVE-2009-0765 - https://www.exploit-db.com/exploits/7993 -CVE-2009-0767 - https://www.exploit-db.com/exploits/7993 -CVE-2009-0768 - https://www.exploit-db.com/exploits/7984 -CVE-2009-0772 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0772 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9609 -CVE-2009-0774 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0775 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0775 - https://bugzilla.mozilla.org/show_bug.cgi?id=474456 -CVE-2009-0775 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9681 -CVE-2009-0776 - http://www.redhat.com/support/errata/RHSA-2009-0258.html -CVE-2009-0776 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9241 -CVE-2009-0778 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0781 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0783 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0787 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0788 - http://www.redhat.com/support/errata/RHSA-2011-0434.html -CVE-2009-0792 - http://www.redhat.com/support/errata/RHSA-2009-0420.html -CVE-2009-0796 - https://bugzilla.redhat.com/show_bug.cgi?id=494402 -CVE-2009-0798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9955 -CVE-2009-0799 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-0800 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-0807 - https://www.exploit-db.com/exploits/8092 -CVE-2009-0810 - https://www.exploit-db.com/exploits/8101 -CVE-2009-0812 - https://www.exploit-db.com/exploits/8121 -CVE-2009-0813 - https://www.exploit-db.com/exploits/8144 -CVE-2009-0820 - http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/check.php?r1=318&r2=332 -CVE-2009-0826 - https://www.exploit-db.com/exploits/7689 -CVE-2009-0827 - https://www.exploit-db.com/exploits/7690 -CVE-2009-0828 - https://www.exploit-db.com/exploits/7699 -CVE-2009-0831 - https://www.exploit-db.com/exploits/7697 -CVE-2009-0832 - https://www.exploit-db.com/exploits/7698 -CVE-2009-0833 - https://www.exploit-db.com/exploits/7696 -CVE-2009-0834 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-0834 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600 -CVE-2009-0836 - http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html -CVE-2009-0836 - http://www.coresecurity.com/content/foxit-reader-vulnerabilities -CVE-2009-0837 - http://www.coresecurity.com/content/foxit-reader-vulnerabilities -CVE-2009-0844 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt -CVE-2009-0844 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9474 -CVE-2009-0845 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt -CVE-2009-0846 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt -CVE-2009-0847 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt -CVE-2009-0851 - https://www.exploit-db.com/exploits/8161 -CVE-2009-0852 - https://www.exploit-db.com/exploits/8161 -CVE-2009-0853 - https://www.exploit-db.com/exploits/8161 -CVE-2009-0855 - http://packetstormsecurity.com/files/170073/IBM-Websphere-Application-Server-7.0-Cross-Site-Scripting.html -CVE-2009-0863 - https://www.exploit-db.com/exploits/8071 -CVE-2009-0864 - https://www.exploit-db.com/exploits/8071 -CVE-2009-0865 - https://www.exploit-db.com/exploits/8059 -CVE-2009-0866 - https://www.exploit-db.com/exploits/8073 -CVE-2009-0879 - https://www.exploit-db.com/exploits/8190 -CVE-2009-0881 - https://www.exploit-db.com/exploits/8167 -CVE-2009-0883 - https://www.exploit-db.com/exploits/8165 -CVE-2009-0885 - https://www.exploit-db.com/exploits/8135 -CVE-2009-0886 - https://www.exploit-db.com/exploits/8168 -CVE-2009-0886 - https://www.exploit-db.com/exploits/8169 -CVE-2009-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 -CVE-2009-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -CVE-2009-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 -CVE-2009-0908 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-0909 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-0910 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-0920 - http://securityreason.com/securityalert/8308 -CVE-2009-0920 - http://www.coresecurity.com/content/openview-buffer-overflows -CVE-2009-0921 - http://www.coresecurity.com/content/openview-buffer-overflows -CVE-2009-0932 - http://securityreason.com/securityalert/8077 -CVE-2009-0949 - http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability -CVE-2009-0949 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631 -CVE-2009-0950 - https://www.exploit-db.com/exploits/8861 -CVE-2009-0950 - https://www.exploit-db.com/exploits/8934 -CVE-2009-0963 - https://www.exploit-db.com/exploits/8226 -CVE-2009-0964 - https://www.exploit-db.com/exploits/8226 -CVE-2009-0965 - https://www.exploit-db.com/exploits/8228 -CVE-2009-0966 - https://www.exploit-db.com/exploits/8230 -CVE-2009-0967 - https://www.exploit-db.com/exploits/8212 -CVE-2009-0968 - https://www.exploit-db.com/exploits/8229 -CVE-2009-0969 - http://packetstormsecurity.org/0903-exploits/phpfox1621-xsrf.txt -CVE-2009-0981 - https://www.exploit-db.com/exploits/8456 -CVE-2009-10001 - https://vuldb.com/?id.218296 -CVE-2009-1022 - https://www.exploit-db.com/exploits/8225 -CVE-2009-1023 - https://www.exploit-db.com/exploits/8220 -CVE-2009-1024 - https://www.exploit-db.com/exploits/8216 -CVE-2009-1025 - https://www.exploit-db.com/exploits/8216 -CVE-2009-1026 - https://www.exploit-db.com/exploits/8209 -CVE-2009-1028 - http://securityreason.com/securityalert/8217 -CVE-2009-1028 - https://www.exploit-db.com/exploits/8180 -CVE-2009-1029 - https://www.exploit-db.com/exploits/8203 -CVE-2009-1030 - https://www.exploit-db.com/exploits/8196 -CVE-2009-1031 - https://www.exploit-db.com/exploits/8211 -CVE-2009-1032 - https://www.exploit-db.com/exploits/8238 -CVE-2009-1033 - https://www.exploit-db.com/exploits/8240 -CVE-2009-1038 - https://www.exploit-db.com/exploits/8217 -CVE-2009-1039 - https://www.exploit-db.com/exploits/8231 -CVE-2009-1040 - https://www.exploit-db.com/exploits/8224 -CVE-2009-1041 - https://www.exploit-db.com/exploits/8261 -CVE-2009-1044 - https://bugzilla.mozilla.org/show_bug.cgi?id=484320 -CVE-2009-1045 - https://www.exploit-db.com/exploits/8213 -CVE-2009-1049 - https://www.exploit-db.com/exploits/8243 -CVE-2009-1049 - https://www.exploit-db.com/exploits/8244 -CVE-2009-1050 - https://www.exploit-db.com/exploits/8243 -CVE-2009-1051 - http://e-rdc.org/v1/news.php?readmore=131 -CVE-2009-1052 - http://e-rdc.org/v1/news.php?readmore=130 -CVE-2009-1053 - http://e-rdc.org/v1/news.php?readmore=129 -CVE-2009-1057 - https://www.exploit-db.com/exploits/8180 -CVE-2009-1058 - https://www.exploit-db.com/exploits/8180 -CVE-2009-1059 - https://www.exploit-db.com/exploits/8180 -CVE-2009-1060 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9129978 -CVE-2009-1063 - https://www.exploit-db.com/exploits/8270 -CVE-2009-1064 - http://www.waraxe.us/advisory-73.html -CVE-2009-1064 - https://www.exploit-db.com/exploits/8257 -CVE-2009-1066 - https://www.exploit-db.com/exploits/8252 -CVE-2009-1067 - https://www.exploit-db.com/exploits/8252 -CVE-2009-1068 - https://www.exploit-db.com/exploits/8249 -CVE-2009-1068 - https://www.exploit-db.com/exploits/8251 -CVE-2009-1071 - https://www.exploit-db.com/exploits/8236 -CVE-2009-1072 - http://www.redhat.com/support/errata/RHSA-2009-1081.html -CVE-2009-1072 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1072 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1087 - https://www.exploit-db.com/exploits/8215 -CVE-2009-1088 - https://www.exploit-db.com/exploits/8247 -CVE-2009-1092 - https://www.exploit-db.com/exploits/8206 -CVE-2009-1093 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1093 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1094 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1094 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1095 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1095 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1096 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1096 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1097 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1097 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1098 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1098 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1098 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9956 -CVE-2009-1099 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1099 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1100 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1100 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1101 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1101 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1102 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1103 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1103 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1104 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1104 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1105 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1105 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1106 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1106 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1107 - http://www.redhat.com/support/errata/RHSA-2009-1038.html -CVE-2009-1107 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1122 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 -CVE-2009-1123 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 -CVE-2009-1124 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 -CVE-2009-1125 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 -CVE-2009-1126 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 -CVE-2009-1127 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 -CVE-2009-1128 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-1129 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-1130 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-1131 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-1132 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-049 -CVE-2009-1133 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-044 -CVE-2009-1134 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -CVE-2009-1135 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-031 -CVE-2009-1136 - http://isc.sans.org/diary.html?storyid=6778 -CVE-2009-1136 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 -CVE-2009-1137 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -CVE-2009-1138 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018 -CVE-2009-1139 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018 -CVE-2009-1140 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1141 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1146 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-1147 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html -CVE-2009-1151 - http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ -CVE-2009-1151 - https://www.exploit-db.com/exploits/8921 -CVE-2009-1152 - https://www.exploit-db.com/exploits/8260 -CVE-2009-1169 - https://bugzilla.mozilla.org/show_bug.cgi?id=485217 -CVE-2009-1169 - https://www.exploit-db.com/exploits/8285 -CVE-2009-1171 - https://www.exploit-db.com/exploits/8297 -CVE-2009-1179 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1180 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1180 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9926 -CVE-2009-1181 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9683 -CVE-2009-1182 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1183 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1184 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1185 - http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html -CVE-2009-1185 - https://www.exploit-db.com/exploits/8572 -CVE-2009-1187 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1188 - http://www.kb.cert.org/vuls/id/196617 -CVE-2009-1188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9957 -CVE-2009-1190 - http://www.packetstormsecurity.org/hitb06/DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf -CVE-2009-1191 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2009-1192 - http://www.redhat.com/support/errata/RHSA-2009-1081.html -CVE-2009-1192 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1192 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1204 - http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki/branches/2.0/changelog.txt?view=markup -CVE-2009-1209 - https://www.exploit-db.com/exploits/8314 -CVE-2009-1209 - https://www.exploit-db.com/exploits/8321 -CVE-2009-1210 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9526 -CVE-2009-1210 - https://www.exploit-db.com/exploits/8308 -CVE-2009-1212 - https://www.exploit-db.com/exploits/8332 -CVE-2009-1218 - http://www.coresecurity.com/content/sun-calendar-express -CVE-2009-1219 - http://www.coresecurity.com/content/sun-calendar-express -CVE-2009-1222 - https://www.exploit-db.com/exploits/8328 -CVE-2009-1224 - https://www.exploit-db.com/exploits/8331 -CVE-2009-1226 - https://www.exploit-db.com/exploits/8324 -CVE-2009-1227 - https://www.exploit-db.com/exploits/8313 -CVE-2009-1228 - https://www.exploit-db.com/exploits/8296 -CVE-2009-1229 - https://www.exploit-db.com/exploits/8304 -CVE-2009-1230 - https://www.exploit-db.com/exploits/8324 -CVE-2009-1232 - https://bugzilla.mozilla.org/show_bug.cgi?id=485941 -CVE-2009-1232 - https://www.exploit-db.com/exploits/8306 -CVE-2009-1233 - https://www.exploit-db.com/exploits/8325 -CVE-2009-1234 - https://www.exploit-db.com/exploits/8320 -CVE-2009-1235 - https://www.exploit-db.com/exploits/8266 -CVE-2009-1236 - http://www.digit-labs.org/files/exploits/xnu-appletalk-zip.c -CVE-2009-1236 - https://www.exploit-db.com/exploits/8262 -CVE-2009-1237 - http://www.digit-labs.org/files/exploits/xnu-macfsstat-leak.c -CVE-2009-1237 - http://www.digit-labs.org/files/exploits/xnu-profil-leak.c -CVE-2009-1237 - https://www.exploit-db.com/exploits/8263 -CVE-2009-1237 - https://www.exploit-db.com/exploits/8264 -CVE-2009-1238 - http://www.digit-labs.org/files/exploits/xnu-vfssysctl-dos.c -CVE-2009-1238 - https://www.exploit-db.com/exploits/8265 -CVE-2009-1240 - http://blog.zoller.lu/2009/04/ibm-proventia-evasion-limited-details.html -CVE-2009-1241 - http://blog.zoller.lu/2009/04/clamav-094-and-below-evasion-and-bypass.html -CVE-2009-1242 - http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of,20090402,8311 -CVE-2009-1242 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1243 - http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-proc-net-udp-8586 -CVE-2009-1246 - https://www.exploit-db.com/exploits/8290 -CVE-2009-1247 - https://www.exploit-db.com/exploits/8291 -CVE-2009-1248 - https://www.exploit-db.com/exploits/8291 -CVE-2009-1252 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1256 - https://www.exploit-db.com/exploits/8355 -CVE-2009-1257 - https://www.exploit-db.com/exploits/8343 -CVE-2009-1259 - https://www.exploit-db.com/exploits/8351 -CVE-2009-1260 - https://www.exploit-db.com/exploits/8343 -CVE-2009-1263 - https://www.exploit-db.com/exploits/8353 -CVE-2009-1265 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1277 - https://www.exploit-db.com/exploits/8350 -CVE-2009-1278 - https://www.exploit-db.com/exploits/8350 -CVE-2009-1282 - https://www.exploit-db.com/exploits/8347 -CVE-2009-1283 - https://www.exploit-db.com/exploits/8347 -CVE-2009-1298 - http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/ -CVE-2009-1303 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9455 -CVE-2009-1304 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9535 -CVE-2009-1308 - http://www.theregister.co.uk/2009/03/08/ebay_scam_wizardy/ -CVE-2009-1308 - https://bugzilla.mozilla.org/show_bug.cgi?id=481558 -CVE-2009-1309 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9494 -CVE-2009-1312 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9818 -CVE-2009-1314 - https://www.exploit-db.com/exploits/8382 -CVE-2009-1315 - https://www.exploit-db.com/exploits/8424 -CVE-2009-1316 - https://www.exploit-db.com/exploits/8424 -CVE-2009-1317 - https://www.exploit-db.com/exploits/8432 -CVE-2009-1318 - https://www.exploit-db.com/exploits/8423 -CVE-2009-1319 - https://www.exploit-db.com/exploits/8431 -CVE-2009-1321 - https://www.exploit-db.com/exploits/8418 -CVE-2009-1322 - https://www.exploit-db.com/exploits/8418 -CVE-2009-1323 - https://www.exploit-db.com/exploits/8382 -CVE-2009-1324 - https://www.exploit-db.com/exploits/8407 -CVE-2009-1324 - https://www.exploit-db.com/exploits/8412 -CVE-2009-1325 - https://www.exploit-db.com/exploits/8402 -CVE-2009-1325 - https://www.exploit-db.com/exploits/8416 -CVE-2009-1326 - https://www.exploit-db.com/exploits/8404 -CVE-2009-1326 - https://www.exploit-db.com/exploits/8410 -CVE-2009-1327 - https://www.exploit-db.com/exploits/8403 -CVE-2009-1327 - https://www.exploit-db.com/exploits/8411 -CVE-2009-1328 - https://www.exploit-db.com/exploits/8405 -CVE-2009-1328 - https://www.exploit-db.com/exploits/8413 -CVE-2009-1329 - https://www.exploit-db.com/exploits/8405/ -CVE-2009-1329 - https://www.exploit-db.com/exploits/8426 -CVE-2009-1330 - https://www.exploit-db.com/exploits/39933/ -CVE-2009-1330 - https://www.exploit-db.com/exploits/8427 -CVE-2009-1331 - https://www.exploit-db.com/exploits/8445 -CVE-2009-1336 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1336 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1337 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1337 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1338 - http://www.redhat.com/support/errata/RHSA-2009-1081.html -CVE-2009-1338 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1341 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680 -CVE-2009-1345 - https://www.exploit-db.com/exploits/8455 -CVE-2009-1346 - https://www.exploit-db.com/exploits/8457 -CVE-2009-1347 - https://www.exploit-db.com/exploits/8461 -CVE-2009-1348 - http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html -CVE-2009-1351 - https://www.exploit-db.com/exploits/8451 -CVE-2009-1352 - https://www.exploit-db.com/exploits/8434 -CVE-2009-1353 - https://www.exploit-db.com/exploits/8447 -CVE-2009-1354 - https://www.exploit-db.com/exploits/8428 -CVE-2009-1356 - https://www.exploit-db.com/exploits/8452 -CVE-2009-1357 - http://www.coresecurity.com/content/sun-delegated-administrator -CVE-2009-1360 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1367 - https://www.exploit-db.com/exploits/8394 -CVE-2009-1368 - https://www.exploit-db.com/exploits/8394 -CVE-2009-1369 - https://www.exploit-db.com/exploits/8394 -CVE-2009-1370 - https://www.exploit-db.com/exploits/8390 -CVE-2009-1373 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005 -CVE-2009-1377 - http://www.ubuntu.com/usn/USN-792-1 -CVE-2009-1377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9663 -CVE-2009-1378 - http://www.ubuntu.com/usn/USN-792-1 -CVE-2009-1378 - https://www.exploit-db.com/exploits/8720 -CVE-2009-1379 - http://www.ubuntu.com/usn/USN-792-1 -CVE-2009-1379 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9744 -CVE-2009-1384 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-1384 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9652 -CVE-2009-1385 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1385 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1386 - http://www.ubuntu.com/usn/USN-792-1 -CVE-2009-1386 - https://www.exploit-db.com/exploits/8873 -CVE-2009-1387 - http://www.ubuntu.com/usn/USN-792-1 -CVE-2009-1388 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1389 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1392 - http://www.securityfocus.com/bid/35370 -CVE-2009-1392 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9501 -CVE-2009-1403 - https://www.exploit-db.com/exploits/8501 -CVE-2009-1404 - https://www.exploit-db.com/exploits/8502 -CVE-2009-1405 - https://www.exploit-db.com/exploits/8502 -CVE-2009-1406 - https://www.exploit-db.com/exploits/8503 -CVE-2009-1407 - https://www.exploit-db.com/exploits/8504 -CVE-2009-1408 - https://www.exploit-db.com/exploits/8453 -CVE-2009-1409 - https://www.exploit-db.com/exploits/8495 -CVE-2009-1410 - https://www.exploit-db.com/exploits/8505 -CVE-2009-1411 - https://www.exploit-db.com/exploits/8482 -CVE-2009-1437 - https://hansesecure.de/vulnerability-in-coolplayer/ -CVE-2009-1437 - https://www.exploit-db.com/exploits/8489 -CVE-2009-1437 - https://www.exploit-db.com/exploits/8519 -CVE-2009-1437 - https://www.exploit-db.com/exploits/8520 -CVE-2009-1438 - https://bugzilla.redhat.com/show_bug.cgi?id=496834 -CVE-2009-1439 - http://www.redhat.com/support/errata/RHSA-2009-1081.html -CVE-2009-1439 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1439 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1444 - https://www.exploit-db.com/exploits/8516 -CVE-2009-1445 - https://www.exploit-db.com/exploits/8516 -CVE-2009-1446 - https://www.exploit-db.com/exploits/8514 -CVE-2009-1447 - https://www.exploit-db.com/exploits/8474 -CVE-2009-1449 - https://www.exploit-db.com/exploits/8527 -CVE-2009-1450 - https://www.exploit-db.com/exploits/7936 -CVE-2009-1451 - https://www.exploit-db.com/exploits/7936 -CVE-2009-1452 - https://www.exploit-db.com/exploits/8460 -CVE-2009-1453 - https://www.exploit-db.com/exploits/8464 -CVE-2009-1467 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-001 -CVE-2009-1467 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-002 -CVE-2009-1468 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-003 -CVE-2009-1469 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-004 -CVE-2009-1480 - https://www.exploit-db.com/exploits/8533 -CVE-2009-1483 - https://www.exploit-db.com/exploits/8481 -CVE-2009-1486 - https://www.exploit-db.com/exploits/8549 -CVE-2009-1487 - https://www.exploit-db.com/exploits/8493 -CVE-2009-1488 - https://www.exploit-db.com/exploits/8493 -CVE-2009-1489 - https://www.exploit-db.com/exploits/8493 -CVE-2009-1492 - https://www.exploit-db.com/exploits/8569 -CVE-2009-1493 - https://www.exploit-db.com/exploits/8570 -CVE-2009-1495 - https://www.exploit-db.com/exploits/8374 -CVE-2009-1496 - https://www.exploit-db.com/exploits/8367 -CVE-2009-1497 - https://www.exploit-db.com/exploits/8370 -CVE-2009-1498 - https://www.exploit-db.com/exploits/8357 -CVE-2009-1499 - https://www.exploit-db.com/exploits/8366 -CVE-2009-1500 - https://www.exploit-db.com/exploits/8565 -CVE-2009-1502 - https://www.exploit-db.com/exploits/8566 -CVE-2009-1503 - https://www.exploit-db.com/exploits/8571 -CVE-2009-1504 - https://www.exploit-db.com/exploits/8529 -CVE-2009-1506 - https://www.exploit-db.com/exploits/8563 -CVE-2009-1508 - https://www.exploit-db.com/exploits/8317 -CVE-2009-1509 - https://www.exploit-db.com/exploits/8341 -CVE-2009-1510 - https://www.exploit-db.com/exploits/8334 -CVE-2009-1511 - https://www.exploit-db.com/exploits/8466 -CVE-2009-1512 - https://www.exploit-db.com/exploits/8317 -CVE-2009-1514 - https://www.exploit-db.com/exploits/8573 -CVE-2009-1516 - https://www.exploit-db.com/exploits/8542 -CVE-2009-1517 - https://www.exploit-db.com/exploits/8523 -CVE-2009-1519 - https://www.exploit-db.com/exploits/8593 -CVE-2009-1523 - https://bugzilla.redhat.com/show_bug.cgi?id=499867 -CVE-2009-1524 - https://bugzilla.redhat.com/show_bug.cgi?id=499867 -CVE-2009-1528 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1529 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1530 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1531 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1532 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -CVE-2009-1533 - http://blogs.technet.com/srd/archive/2009/06/09/ms09-024.aspx -CVE-2009-1533 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-024 -CVE-2009-1534 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 -CVE-2009-1535 - http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html -CVE-2009-1535 - http://isc.sans.org/diary.html?n&storyid=6397 -CVE-2009-1535 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 -CVE-2009-1537 - http://isc.sans.org/diary.html?storyid=6481 -CVE-2009-1537 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 -CVE-2009-1538 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 -CVE-2009-1539 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 -CVE-2009-1542 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-033 -CVE-2009-1544 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-041 -CVE-2009-1545 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-038 -CVE-2009-1546 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-038 -CVE-2009-1547 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 -CVE-2009-1548 - https://www.exploit-db.com/exploits/8600 -CVE-2009-1549 - https://www.exploit-db.com/exploits/8599 -CVE-2009-1550 - https://www.exploit-db.com/exploits/8555 -CVE-2009-1551 - https://www.exploit-db.com/exploits/8602 -CVE-2009-1557 - http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/ -CVE-2009-1560 - http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/ -CVE-2009-1561 - http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt -CVE-2009-1564 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2009-1565 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2009-1570 - http://www.redhat.com/support/errata/RHSA-2011-0837.html -CVE-2009-1571 - https://bugzilla.mozilla.org/show_bug.cgi?id=526500 -CVE-2009-1574 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9624 -CVE-2009-1577 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9837 -CVE-2009-1578 - https://bugzilla.redhat.com/show_bug.cgi?id=500363 -CVE-2009-1582 - https://www.exploit-db.com/exploits/8605 -CVE-2009-1583 - https://www.exploit-db.com/exploits/8615 -CVE-2009-1584 - https://www.exploit-db.com/exploits/8615 -CVE-2009-1584 - https://www.exploit-db.com/exploits/8616 -CVE-2009-1586 - https://www.exploit-db.com/exploits/8612 -CVE-2009-1587 - https://www.exploit-db.com/exploits/8604 -CVE-2009-1592 - https://www.exploit-db.com/exploits/8611 -CVE-2009-1592 - https://www.exploit-db.com/exploits/8614 -CVE-2009-1602 - https://www.exploit-db.com/exploits/8606 -CVE-2009-1607 - https://www.exploit-db.com/exploits/8618 -CVE-2009-1609 - https://www.exploit-db.com/exploits/8647 -CVE-2009-1610 - https://www.exploit-db.com/exploits/8639 -CVE-2009-1611 - https://www.exploit-db.com/exploits/8613 -CVE-2009-1611 - https://www.exploit-db.com/exploits/8621 -CVE-2009-1612 - https://www.exploit-db.com/exploits/8579 -CVE-2009-1613 - https://www.exploit-db.com/exploits/8576 -CVE-2009-1613 - https://www.exploit-db.com/exploits/8577 -CVE-2009-1614 - https://www.exploit-db.com/exploits/8577 -CVE-2009-1615 - https://www.exploit-db.com/exploits/8577 -CVE-2009-1617 - https://www.exploit-db.com/exploits/8550 -CVE-2009-1618 - https://www.exploit-db.com/exploits/8552 -CVE-2009-1619 - https://www.exploit-db.com/exploits/8551 -CVE-2009-1621 - https://www.exploit-db.com/exploits/8539 -CVE-2009-1622 - https://www.exploit-db.com/exploits/8548 -CVE-2009-1623 - https://www.exploit-db.com/exploits/8545 -CVE-2009-1624 - https://www.exploit-db.com/exploits/8545 -CVE-2009-1625 - https://www.exploit-db.com/exploits/8546 -CVE-2009-1626 - https://www.exploit-db.com/exploits/8547 -CVE-2009-1627 - https://www.exploit-db.com/exploits/8531 -CVE-2009-1627 - https://www.exploit-db.com/exploits/8536 -CVE-2009-1630 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1630 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1630 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990 -CVE-2009-1633 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1633 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1633 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9525 -CVE-2009-1637 - https://www.exploit-db.com/exploits/8638 -CVE-2009-1638 - https://www.exploit-db.com/exploits/8627 -CVE-2009-1641 - https://www.exploit-db.com/exploits/8631 -CVE-2009-1641 - https://www.exploit-db.com/exploits/8632 -CVE-2009-1642 - https://packetstormsecurity.com/files/144558/ASX-To-MP3-Converter-Stack-Overflow.html -CVE-2009-1642 - https://www.exploit-db.com/exploits/8629 -CVE-2009-1642 - https://www.exploit-db.com/exploits/8630 -CVE-2009-1643 - https://www.exploit-db.com/exploits/8624 -CVE-2009-1644 - https://www.exploit-db.com/exploits/8625 -CVE-2009-1644 - https://www.exploit-db.com/exploits/8640 -CVE-2009-1645 - https://www.exploit-db.com/exploits/8633 -CVE-2009-1645 - https://www.exploit-db.com/exploits/8634 -CVE-2009-1646 - https://www.exploit-db.com/exploits/8628 -CVE-2009-1647 - https://www.exploit-db.com/exploits/8526 -CVE-2009-1649 - https://www.exploit-db.com/exploits/8680 -CVE-2009-1650 - https://www.exploit-db.com/exploits/8679 -CVE-2009-1651 - https://www.exploit-db.com/exploits/8689 -CVE-2009-1652 - https://www.exploit-db.com/exploits/8689 -CVE-2009-1653 - https://www.exploit-db.com/exploits/8667 -CVE-2009-1654 - https://www.exploit-db.com/exploits/8690 -CVE-2009-1655 - https://www.exploit-db.com/exploits/8690 -CVE-2009-1658 - https://www.exploit-db.com/exploits/8643 -CVE-2009-1659 - https://www.exploit-db.com/exploits/8603 -CVE-2009-1660 - https://www.exploit-db.com/exploits/8644 -CVE-2009-1661 - https://www.exploit-db.com/exploits/8655 -CVE-2009-1662 - https://www.exploit-db.com/exploits/8642 -CVE-2009-1663 - https://www.exploit-db.com/exploits/8690 -CVE-2009-1664 - https://www.exploit-db.com/exploits/8690 -CVE-2009-1665 - https://www.exploit-db.com/exploits/8690 -CVE-2009-1668 - https://www.exploit-db.com/exploits/8650 -CVE-2009-1669 - https://www.exploit-db.com/exploits/8659 -CVE-2009-1670 - https://www.exploit-db.com/exploits/8626 -CVE-2009-1671 - https://www.exploit-db.com/exploits/8665 -CVE-2009-1672 - https://www.exploit-db.com/exploits/8665 -CVE-2009-1674 - https://www.exploit-db.com/exploits/8656 -CVE-2009-1675 - https://www.exploit-db.com/exploits/8623 -CVE-2009-1677 - https://www.exploit-db.com/exploits/8659 -CVE-2009-1678 - https://www.exploit-db.com/exploits/8659 -CVE-2009-1692 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-1692 - https://www.exploit-db.com/exploits/9160 -CVE-2009-1698 - http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html -CVE-2009-1698 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484 -CVE-2009-1699 - https://www.exploit-db.com/exploits/8907 -CVE-2009-1725 - https://bugzilla.redhat.com/show_bug.cgi?id=513813 -CVE-2009-1729 - http://seclists.org/fulldisclosure/2009/May/0177.html -CVE-2009-1729 - http://www.coresecurity.com/content/sun-communications-express -CVE-2009-1731 - http://securityreason.com/exploitalert/6198 -CVE-2009-1734 - https://www.exploit-db.com/exploits/8737 -CVE-2009-1735 - https://www.exploit-db.com/exploits/8737 -CVE-2009-1736 - https://www.exploit-db.com/exploits/8731 -CVE-2009-1738 - http://drupal.org/node/453098 -CVE-2009-1738 - http://drupal.org/node/461706 -CVE-2009-1739 - https://www.exploit-db.com/exploits/8735 -CVE-2009-1741 - https://www.exploit-db.com/exploits/8741 -CVE-2009-1742 - https://www.exploit-db.com/exploits/8709 -CVE-2009-1743 - https://www.exploit-db.com/exploits/8670 -CVE-2009-1744 - https://www.exploit-db.com/exploits/8670 -CVE-2009-1746 - https://www.exploit-db.com/exploits/8727 -CVE-2009-1747 - https://www.exploit-db.com/exploits/8751 -CVE-2009-1748 - https://www.exploit-db.com/exploits/8745 -CVE-2009-1749 - https://www.exploit-db.com/exploits/8745 -CVE-2009-1750 - https://www.exploit-db.com/exploits/8730 -CVE-2009-1751 - https://www.exploit-db.com/exploits/8748 -CVE-2009-1752 - https://www.exploit-db.com/exploits/8744 -CVE-2009-1759 - https://www.exploit-db.com/exploits/8470 -CVE-2009-1761 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-01-ca-arcserve-backup-message-engine-denial-of-service-vulnerabilities.aspx -CVE-2009-1764 - https://www.exploit-db.com/exploits/8726 -CVE-2009-1765 - https://www.exploit-db.com/exploits/8715 -CVE-2009-1766 - https://www.exploit-db.com/exploits/8724 -CVE-2009-1767 - https://www.exploit-db.com/exploits/8691 -CVE-2009-1768 - https://www.exploit-db.com/exploits/8700 -CVE-2009-1770 - https://www.exploit-db.com/exploits/8714 -CVE-2009-1771 - https://www.exploit-db.com/exploits/8714 -CVE-2009-1774 - https://www.exploit-db.com/exploits/8681 -CVE-2009-1778 - https://www.exploit-db.com/exploits/8664 -CVE-2009-1779 - https://www.exploit-db.com/exploits/8658 -CVE-2009-1780 - https://www.exploit-db.com/exploits/8658 -CVE-2009-1781 - https://www.exploit-db.com/exploits/8658 -CVE-2009-1783 - http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html -CVE-2009-1784 - http://blog.zoller.lu/2009/04/avg-zip-evasion-bypass.html -CVE-2009-1786 - https://www.exploit-db.com/exploits/9306 -CVE-2009-1787 - https://www.exploit-db.com/exploits/8710 -CVE-2009-1789 - https://www.exploit-db.com/exploits/8695 -CVE-2009-1792 - http://www.coresecurity.com/content/StoneTrip-S3DPlayers -CVE-2009-1799 - http://marc.info/?l=bugtraq&m=124171333011782&w=2 -CVE-2009-1799 - https://www.exploit-db.com/exploits/8636 -CVE-2009-1804 - https://www.exploit-db.com/exploits/8635 -CVE-2009-1809 - https://www.exploit-db.com/exploits/8707 -CVE-2009-1810 - https://www.exploit-db.com/exploits/8707 -CVE-2009-1811 - https://www.exploit-db.com/exploits/8708 -CVE-2009-1812 - https://www.exploit-db.com/exploits/8708 -CVE-2009-1813 - https://www.exploit-db.com/exploits/8683 -CVE-2009-1814 - https://www.exploit-db.com/exploits/8706 -CVE-2009-1815 - https://www.exploit-db.com/exploits/8698 -CVE-2009-1815 - https://www.exploit-db.com/exploits/8701 -CVE-2009-1816 - https://www.exploit-db.com/exploits/8676 -CVE-2009-1817 - https://www.exploit-db.com/exploits/8677 -CVE-2009-1818 - https://www.exploit-db.com/exploits/8672 -CVE-2009-1819 - https://www.exploit-db.com/exploits/8702 -CVE-2009-1820 - https://www.exploit-db.com/exploits/8702 -CVE-2009-1821 - https://www.exploit-db.com/exploits/8705 -CVE-2009-1822 - https://www.exploit-db.com/exploits/8697 -CVE-2009-1824 - https://www.exploit-db.com/exploits/8782 -CVE-2009-1825 - https://www.exploit-db.com/exploits/8707 -CVE-2009-1826 - https://www.exploit-db.com/exploits/8708 -CVE-2009-1827 - http://blog.zoller.lu/2009/04/advisory-firefox-dos-condition.html -CVE-2009-1827 - https://bugzilla.mozilla.org/show_bug.cgi?id=465615 -CVE-2009-1827 - https://www.exploit-db.com/exploits/8794 -CVE-2009-1828 - http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html -CVE-2009-1828 - https://bugzilla.mozilla.org/show_bug.cgi?id=469565 -CVE-2009-1828 - https://www.exploit-db.com/exploits/8822 -CVE-2009-1829 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9270 -CVE-2009-1830 - https://www.exploit-db.com/exploits/8777 -CVE-2009-1830 - https://www.exploit-db.com/exploits/8804 -CVE-2009-1831 - https://www.exploit-db.com/exploits/8767 -CVE-2009-1831 - https://www.exploit-db.com/exploits/8770 -CVE-2009-1831 - https://www.exploit-db.com/exploits/8772 -CVE-2009-1831 - https://www.exploit-db.com/exploits/8783 -CVE-2009-1835 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9803 -CVE-2009-1836 - https://bugzilla.mozilla.org/show_bug.cgi?id=479880 -CVE-2009-1837 - https://bugzilla.mozilla.org/show_bug.cgi?id=486269 -CVE-2009-1839 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9256 -CVE-2009-1840 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9448 -CVE-2009-1841 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9815 -CVE-2009-1846 - https://www.exploit-db.com/exploits/8816 -CVE-2009-1847 - https://www.exploit-db.com/exploits/8815 -CVE-2009-1848 - https://www.exploit-db.com/exploits/8814 -CVE-2009-1850 - https://www.exploit-db.com/exploits/8808 -CVE-2009-1852 - https://www.exploit-db.com/exploits/8803 -CVE-2009-1853 - https://www.exploit-db.com/exploits/8802 -CVE-2009-1854 - https://www.exploit-db.com/exploits/8813 -CVE-2009-1861 - http://www.kb.cert.org/vuls/id/568153 -CVE-2009-1862 - http://isc.sans.org/diary.html?storyid=6847 -CVE-2009-1862 - http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability -CVE-2009-1869 - http://roeehay.blogspot.com/2009/08/exploitation-of-cve-2009-1869.html -CVE-2009-1873 - https://www.exploit-db.com/exploits/9443 -CVE-2009-1879 - http://www.gdssecurity.com/l/b/2009/08/20/adobe-flex-3-3-sdk-dom-based-xss/ -CVE-2009-1882 - http://imagemagick.org/script/changelog.php -CVE-2009-1883 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9513 -CVE-2009-1887 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9716 -CVE-2009-1890 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2009-1890 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9403 -CVE-2009-1891 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248 -CVE-2009-1894 - http://www.akitasecurity.nl/advisory.php?id=AK20090602 -CVE-2009-1894 - https://bugzilla.redhat.com/show_bug.cgi?id=510071 -CVE-2009-1895 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-1895 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9453 -CVE-2009-1897 - http://isc.sans.org/diary.html?storyid=6820 -CVE-2009-1902 - https://www.exploit-db.com/exploits/8241 -CVE-2009-1904 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780 -CVE-2009-1910 - https://www.exploit-db.com/exploits/8648 -CVE-2009-1911 - https://www.exploit-db.com/exploits/8649 -CVE-2009-1912 - https://www.exploit-db.com/exploits/8622 -CVE-2009-1913 - https://www.exploit-db.com/exploits/8645 -CVE-2009-1914 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1915 - https://www.exploit-db.com/exploits/8832 -CVE-2009-1916 - https://www.exploit-db.com/exploits/8454 -CVE-2009-1917 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 -CVE-2009-1918 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 -CVE-2009-1919 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 -CVE-2009-1920 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-045 -CVE-2009-1922 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-040 -CVE-2009-1923 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-039 -CVE-2009-1924 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-039 -CVE-2009-1925 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 -CVE-2009-1926 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 -CVE-2009-1929 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-044 -CVE-2009-1930 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-042 -CVE-2009-1936 - https://www.exploit-db.com/exploits/8790 -CVE-2009-1941 - https://www.exploit-db.com/exploits/8850 -CVE-2009-1944 - https://www.exploit-db.com/exploits/8837 -CVE-2009-1945 - https://www.exploit-db.com/exploits/8857 -CVE-2009-1946 - https://www.exploit-db.com/exploits/8851 -CVE-2009-1947 - https://www.exploit-db.com/exploits/8841 -CVE-2009-1948 - https://www.exploit-db.com/exploits/8841 -CVE-2009-1949 - https://www.exploit-db.com/exploits/8841 -CVE-2009-1950 - https://www.exploit-db.com/exploits/8859 -CVE-2009-1951 - https://www.exploit-db.com/exploits/8858 -CVE-2009-1952 - https://www.exploit-db.com/exploits/8858 -CVE-2009-1955 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2009-1955 - https://www.exploit-db.com/exploits/8842 -CVE-2009-1956 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2009-1960 - https://www.exploit-db.com/exploits/8781 -CVE-2009-1960 - https://www.exploit-db.com/exploits/8812 -CVE-2009-1961 - http://www.ubuntu.com/usn/usn-793-1 -CVE-2009-1996 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-2003 - https://www.exploit-db.com/exploits/8668 -CVE-2009-2010 - https://www.exploit-db.com/exploits/8671 -CVE-2009-2011 - http://www.coresecurity.com/content/DXStudio-player-firefox-plugin -CVE-2009-2011 - https://www.exploit-db.com/exploits/8922 -CVE-2009-2013 - https://www.exploit-db.com/exploits/8900 -CVE-2009-2014 - https://www.exploit-db.com/exploits/8891 -CVE-2009-2015 - https://www.exploit-db.com/exploits/8898 -CVE-2009-2016 - https://www.exploit-db.com/exploits/8894 -CVE-2009-2017 - https://www.exploit-db.com/exploits/8893 -CVE-2009-2018 - https://www.exploit-db.com/exploits/8886 -CVE-2009-2019 - https://www.exploit-db.com/exploits/8901 -CVE-2009-2020 - https://www.exploit-db.com/exploits/8901 -CVE-2009-2021 - https://www.exploit-db.com/exploits/8892 -CVE-2009-2022 - https://www.exploit-db.com/exploits/8890 -CVE-2009-2023 - https://www.exploit-db.com/exploits/8906 -CVE-2009-2024 - https://www.exploit-db.com/exploits/8889 -CVE-2009-2025 - https://www.exploit-db.com/exploits/8903 -CVE-2009-2033 - https://www.exploit-db.com/exploits/8932 -CVE-2009-2034 - https://www.exploit-db.com/exploits/8932 -CVE-2009-2036 - https://www.exploit-db.com/exploits/8927 -CVE-2009-2037 - https://www.exploit-db.com/exploits/8853 -CVE-2009-2040 - https://www.exploit-db.com/exploits/8902 -CVE-2009-2042 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2009-2060 - https://bugzilla.mozilla.org/show_bug.cgi?id=479880 -CVE-2009-2071 - https://bugzilla.mozilla.org/show_bug.cgi?id=479880 -CVE-2009-2080 - https://www.exploit-db.com/exploits/8917 -CVE-2009-2081 - https://www.exploit-db.com/exploits/8928 -CVE-2009-2095 - https://www.exploit-db.com/exploits/8948 -CVE-2009-2096 - https://www.exploit-db.com/exploits/8962 -CVE-2009-2098 - https://www.exploit-db.com/exploits/8966 -CVE-2009-2099 - https://www.exploit-db.com/exploits/8959 -CVE-2009-2100 - https://www.exploit-db.com/exploits/8946 -CVE-2009-2101 - https://www.exploit-db.com/exploits/8931 -CVE-2009-2102 - https://www.exploit-db.com/exploits/8968 -CVE-2009-2109 - https://www.exploit-db.com/exploits/8979 -CVE-2009-2110 - https://www.exploit-db.com/exploits/8952 -CVE-2009-2111 - https://www.exploit-db.com/exploits/8951 -CVE-2009-2112 - https://www.exploit-db.com/exploits/8975 -CVE-2009-2113 - https://www.exploit-db.com/exploits/8980 -CVE-2009-2117 - https://www.exploit-db.com/exploits/8981 -CVE-2009-2120 - https://www.exploit-db.com/exploits/8977 -CVE-2009-2122 - https://www.exploit-db.com/exploits/8961 -CVE-2009-2123 - https://www.exploit-db.com/exploits/8953 -CVE-2009-2123 - https://www.exploit-db.com/exploits/9342 -CVE-2009-2124 - https://www.exploit-db.com/exploits/8953 -CVE-2009-2127 - https://www.exploit-db.com/exploits/8953 -CVE-2009-2129 - https://www.exploit-db.com/exploits/8953 -CVE-2009-2130 - https://www.exploit-db.com/exploits/8953 -CVE-2009-2131 - https://www.exploit-db.com/exploits/8936 -CVE-2009-2133 - https://www.exploit-db.com/exploits/8941 -CVE-2009-2134 - https://www.exploit-db.com/exploits/8941 -CVE-2009-2138 - https://www.exploit-db.com/exploits/8942 -CVE-2009-2141 - https://www.exploit-db.com/exploits/8942 -CVE-2009-2142 - https://www.exploit-db.com/exploits/8935 -CVE-2009-2143 - https://www.exploit-db.com/exploits/8945 -CVE-2009-2145 - https://www.exploit-db.com/exploits/8943 -CVE-2009-2147 - https://www.exploit-db.com/exploits/8939 -CVE-2009-2148 - https://www.exploit-db.com/exploits/8937 -CVE-2009-2149 - https://www.exploit-db.com/exploits/8937 -CVE-2009-2150 - https://www.exploit-db.com/exploits/8937 -CVE-2009-2151 - https://www.exploit-db.com/exploits/8954 -CVE-2009-2152 - https://www.exploit-db.com/exploits/8954 -CVE-2009-2153 - https://www.exploit-db.com/exploits/8947 -CVE-2009-2154 - https://www.exploit-db.com/exploits/8947 -CVE-2009-2156 - http://www.waraxe.us/advisory-74.html -CVE-2009-2156 - https://www.exploit-db.com/exploits/8958 -CVE-2009-2157 - http://www.waraxe.us/advisory-74.html -CVE-2009-2157 - https://www.exploit-db.com/exploits/8958 -CVE-2009-2158 - http://www.waraxe.us/advisory-74.html -CVE-2009-2158 - https://www.exploit-db.com/exploits/8958 -CVE-2009-2159 - http://www.waraxe.us/advisory-74.html -CVE-2009-2159 - https://www.exploit-db.com/exploits/8958 -CVE-2009-2160 - http://www.waraxe.us/advisory-74.html -CVE-2009-2160 - https://www.exploit-db.com/exploits/8958 -CVE-2009-2161 - http://www.waraxe.us/advisory-74.html -CVE-2009-2161 - https://www.exploit-db.com/exploits/8958 -CVE-2009-2164 - https://www.exploit-db.com/exploits/8884 -CVE-2009-2164 - https://www.exploit-db.com/exploits/8885 -CVE-2009-2166 - https://www.exploit-db.com/exploits/8868 -CVE-2009-2167 - https://www.exploit-db.com/exploits/8865 -CVE-2009-2168 - https://www.exploit-db.com/exploits/8865 -CVE-2009-2172 - https://www.exploit-db.com/exploits/8965 -CVE-2009-2173 - https://www.exploit-db.com/exploits/8971 -CVE-2009-2176 - https://www.exploit-db.com/exploits/8978 -CVE-2009-2177 - https://www.exploit-db.com/exploits/8978 -CVE-2009-2178 - https://www.exploit-db.com/exploits/8990 -CVE-2009-2179 - https://www.exploit-db.com/exploits/8990 -CVE-2009-2180 - https://www.exploit-db.com/exploits/8988 -CVE-2009-2181 - https://www.exploit-db.com/exploits/8995 -CVE-2009-2182 - https://www.exploit-db.com/exploits/8995 -CVE-2009-2183 - https://www.exploit-db.com/exploits/8995 -CVE-2009-2184 - https://www.exploit-db.com/exploits/8996 -CVE-2009-2204 - http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf -CVE-2009-2209 - https://www.exploit-db.com/exploits/9000 -CVE-2009-2210 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9994 -CVE-2009-2216 - http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html -CVE-2009-2223 - http://www.exploit-db.com/exploits/9015 -CVE-2009-2230 - http://www.exploit-db.com/exploits/9001 -CVE-2009-2254 - http://www.zen-cart.com/forum/attachment.php?attachmentid=5965 -CVE-2009-2255 - http://www.zen-cart.com/forum/attachment.php?attachmentid=5965 -CVE-2009-2261 - http://www.exploit-db.com/exploits/8881 -CVE-2009-2265 - http://isc.sans.org/diary.html?storyid=6724 -CVE-2009-2265 - http://packetstormsecurity.com/files/163271/Adobe-ColdFusion-8-Remote-Command-Execution.html -CVE-2009-2286 - http://www.openwall.com/lists/oss-security/2009/07/03/1 -CVE-2009-2294 - http://www.ocert.org/advisories/ocert-2009-008.html -CVE-2009-2295 - http://www.ocert.org/advisories/ocert-2009-009.html -CVE-2009-2308 - http://packetstormsecurity.org/0906-exploits/punbbaffiliations-blindsql.txt -CVE-2009-2308 - http://packetstormsecurity.org/0906-exploits/punbbaffiliationsin-blindsql.txt -CVE-2009-2325 - http://www.osvdb.org/55484 -CVE-2009-2334 - http://www.exploit-db.com/exploits/9110 -CVE-2009-2335 - http://www.exploit-db.com/exploits/9110 -CVE-2009-2336 - http://www.exploit-db.com/exploits/9110 -CVE-2009-2347 - http://www.ocert.org/advisories/ocert-2009-012.html -CVE-2009-2360 - http://bugs.horde.org/ticket/8398 -CVE-2009-2361 - http://osticket.com/forums/project.php?issueid=118 -CVE-2009-2362 - http://packetstormsecurity.org/0907-exploits/audioplus-overflow.txt -CVE-2009-2363 - http://packetstormsecurity.org/0907-exploits/audiopluspls-overflow.txt -CVE-2009-2370 - http://drupal.org/node/507580 -CVE-2009-2371 - http://drupal.org/node/507580 -CVE-2009-2382 - http://www.exploit-db.com/exploits/9053 -CVE-2009-2384 - http://www.exploit-db.com/exploits/9061 -CVE-2009-2386 - http://www.coresecurity.com/content/winds3d-viewer-advisory -CVE-2009-2397 - http://www.exploit-db.com/exploits/9041 -CVE-2009-2401 - http://www.exploit-db.com/exploits/9014 -CVE-2009-2402 - http://www.exploit-db.com/exploits/9014 -CVE-2009-2403 - http://www.exploit-db.com/exploits/9033 -CVE-2009-2404 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-2404 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2009-2406 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2407 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2408 - http://isc.sans.org/diary.html?storyid=7003 -CVE-2009-2408 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-2409 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html -CVE-2009-2412 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9958 -CVE-2009-2414 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2416 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2416 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 -CVE-2009-2417 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2433 - http://www.exploit-db.com/exploits/9100 -CVE-2009-2436 - http://packetstormsecurity.org/0907-exploits/myphpdating10-sql.txt -CVE-2009-2437 - http://packetstormsecurity.org/0907-exploits/rentventory-xss.txt -CVE-2009-2438 - http://packetstormsecurity.org/0907-exploits/clansphere-xss.txt -CVE-2009-2439 - http://packetstormsecurity.org/0907-exploits/alibabaclone-sql.txt -CVE-2009-2440 - http://packetstormsecurity.org/0907-exploits/jnm-xss.txt -CVE-2009-2441 - http://www.packetstormsecurity.com/0907-exploits/ogp51-xss.txt -CVE-2009-2442 - http://www.packetstormsecurity.com/0907-exploits/linea-xss.txt -CVE-2009-2443 - http://www.packetstormsecurity.org/0907-exploits/siteframe-sqlphpinfo.txt -CVE-2009-2447 - http://www.packetstormsecurity.com/0907-exploits/ogp51-morexss.txt -CVE-2009-2451 - http://www.exploit-db.com/exploits/8558 -CVE-2009-2464 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9594 -CVE-2009-2466 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9820 -CVE-2009-2467 - https://bugzilla.mozilla.org/show_bug.cgi?id=493601 -CVE-2009-2472 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 -CVE-2009-2473 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9461 -CVE-2009-2477 - http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/ -CVE-2009-2477 - http://isc.sans.org/diary.html?storyid=6796 -CVE-2009-2477 - http://www.kb.cert.org/vuls/id/443060 -CVE-2009-2477 - https://www.exploit-db.com/exploits/40936/ -CVE-2009-2479 - http://blog.mozilla.com/security/2009/07/19/milw0rm-9158-stack-overflow-crash-not-exploitable-cve-2009-2479/ -CVE-2009-2479 - http://www.exploit-db.com/exploits/9158 -CVE-2009-2479 - https://bugzilla.mozilla.org/show_bug.cgi?id=504342 -CVE-2009-2479 - https://bugzilla.mozilla.org/show_bug.cgi?id=504343 -CVE-2009-2484 - http://www.exploit-db.com/exploits/9029 -CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 -CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 -CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 -CVE-2009-2494 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -CVE-2009-2495 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 -CVE-2009-2495 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 -CVE-2009-2496 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 -CVE-2009-2497 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 -CVE-2009-2498 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-047 -CVE-2009-2499 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-047 -CVE-2009-2500 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2501 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2502 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2503 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2504 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2506 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-073 -CVE-2009-2507 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-057 -CVE-2009-2510 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-056 -CVE-2009-2511 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-056 -CVE-2009-2512 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-063 -CVE-2009-2513 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 -CVE-2009-2514 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 -CVE-2009-2515 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 -CVE-2009-2516 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 -CVE-2009-2517 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 -CVE-2009-2518 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2518 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6430 -CVE-2009-2519 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-046 -CVE-2009-2524 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059 -CVE-2009-2525 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-051 -CVE-2009-2526 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 -CVE-2009-2527 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-052 -CVE-2009-2528 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-2529 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 -CVE-2009-2530 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 -CVE-2009-2531 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 -CVE-2009-2532 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 -CVE-2009-2533 - http://www.coresecurity.com/content/real-helix-dna -CVE-2009-2533 - http://www.exploit-db.com/exploits/9198 -CVE-2009-2534 - http://www.coresecurity.com/content/real-helix-dna -CVE-2009-2534 - http://www.exploit-db.com/exploits/9198 -CVE-2009-2535 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2535 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2535 - https://bugzilla.mozilla.org/show_bug.cgi?id=460713 -CVE-2009-2536 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2536 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2537 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2537 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2538 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2538 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2539 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2539 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2540 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2540 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2541 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2541 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2542 - http://www.exploit-db.com/exploits/9160 -CVE-2009-2542 - http://www.g-sec.lu/one-bug-to-rule-them-all.html -CVE-2009-2547 - http://aluigi.altervista.org/adv/armadioz-adv.txt -CVE-2009-2548 - http://aluigi.altervista.org/adv/armazzofs-adv.txt -CVE-2009-2549 - http://aluigi.altervista.org/adv/armazzo-adv.txt -CVE-2009-2550 - http://www.exploit-db.com/exploits/9157 -CVE-2009-2551 - http://packetstormsecurity.org/0907-exploits/eid-xss.txt -CVE-2009-2560 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6416 -CVE-2009-2564 - http://www.exploit-db.com/exploits/9199 -CVE-2009-2568 - http://www.exploit-db.com/exploits/8617 -CVE-2009-2570 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 -CVE-2009-2571 - http://packetstormsecurity.org/0905-exploits/verliadmin-xss.txt -CVE-2009-2573 - http://www.exploit-db.com/exploits/8586 -CVE-2009-2584 - http://xorl.wordpress.com/2009/07/21/linux-kernel-sgi-gru-driver-off-by-one-overwrite/ -CVE-2009-2586 - http://packetstormsecurity.org/0907-exploits/ezarticles-xss.txt -CVE-2009-2587 - http://packetstormsecurity.org/0907-exploits/dragdopcart-xss.txt -CVE-2009-2588 - http://packetstormsecurity.org/0907-exploits/hotscriptsclone-xss.txt -CVE-2009-2589 - http://packetstormsecurity.org/0907-exploits/hutscript-sqlxss.txt -CVE-2009-2590 - http://packetstormsecurity.org/0907-exploits/hutscript-sqlxss.txt -CVE-2009-2605 - http://www.exploit-db.com/exploits/8831 -CVE-2009-2607 - http://www.exploit-db.com/exploits/9017 -CVE-2009-2617 - http://marc.info/?l=full-disclosure&m=124624413120440&w=2 -CVE-2009-2617 - http://marc.info/?l=full-disclosure&m=124627617220913&w=2 -CVE-2009-2620 - http://tracker.firebirdsql.org/browse/CORE-2563 -CVE-2009-2620 - http://www.coresecurity.com/content/firebird-sql-dos -CVE-2009-2620 - http://www.exploit-db.com/exploits/9295 -CVE-2009-2625 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-2625 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2625 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356 -CVE-2009-2628 - http://www.kb.cert.org/vuls/id/444513 -CVE-2009-2631 - http://www.kb.cert.org/vuls/id/261869 -CVE-2009-2631 - http://www.stonesoft.com/en/support/security_advisories/2009_03_12.html -CVE-2009-2640 - http://packetstormsecurity.org/files/110437/Interlogy-Profile-Manager-Basic-Insecure-Cookie-Handling.html -CVE-2009-2648 - http://packetstormsecurity.org/0907-exploits/flashden-disclose.txt -CVE-2009-2649 - https://www.exploit-db.com/exploits/9134 -CVE-2009-2650 - http://www.exploit-db.com/exploits/9173 -CVE-2009-2654 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9686 -CVE-2009-2655 - http://www.exploit-db.com/exploits/9253 -CVE-2009-2656 - http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf -CVE-2009-2660 - https://bugs.gentoo.org/show_bug.cgi?id=276235 -CVE-2009-2663 - https://bugzilla.redhat.com/show_bug.cgi?id=516259 -CVE-2009-2663 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9506 -CVE-2009-2664 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9806 -CVE-2009-2670 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2671 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2672 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2672 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359 -CVE-2009-2673 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2675 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2676 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603 -CVE-2009-2690 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443 -CVE-2009-2692 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2693 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-2693 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2009-2694 - http://www.coresecurity.com/content/libpurple-arbitrary-write -CVE-2009-2695 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9882 -CVE-2009-2697 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9586 -CVE-2009-2698 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2698 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 -CVE-2009-2699 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2009-2703 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6435 -CVE-2009-2715 - http://www.exploit-db.com/exploits/9323 -CVE-2009-2716 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2718 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2719 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2720 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2721 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2722 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2723 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2724 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2730 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2735 - http://www.exploit-db.com/exploits/9371 -CVE-2009-2736 - http://www.exploit-db.com/exploits/9371 -CVE-2009-2761 - http://blog.zoller.lu/2009/01/tzo-2009-2-avira-antivir-priviledge.html -CVE-2009-2762 - http://www.exploit-db.com/exploits/9410 -CVE-2009-2764 - http://www.exploit-db.com/exploits/9362 -CVE-2009-2765 - http://isc.sans.org/diary.html?storyid=6853 -CVE-2009-2765 - http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/ -CVE-2009-2771 - http://packetstormsecurity.org/0907-exploits/fas-xss.txt -CVE-2009-2772 - http://packetstormsecurity.org/0907-exploits/pgroomate-xss.txt -CVE-2009-2773 - http://www.exploit-db.com/exploits/9269 -CVE-2009-2776 - http://packetstormsecurity.org/0907-exploits/smartasp-sql.txt -CVE-2009-2779 - http://packetstormsecurity.org/0907-exploits/ajmatrixdna-sql.txt -CVE-2009-2780 - http://packetstormsecurity.org/0907-exploits/68classifieds-xss.txt -CVE-2009-2783 - http://marc.info/?l=bugtraq&m=124905075425380&w=2 -CVE-2009-2784 - http://www.exploit-db.com/exploits/9310 -CVE-2009-2785 - http://packetstormsecurity.org/0907-exploits/openclassifieds-xss.txt -CVE-2009-2787 - http://packetstormsecurity.org/0907-exploits/punbbrep-lfi.txt -CVE-2009-2790 - http://packetstormsecurity.org/0907-exploits/softbizdating-sql.txt -CVE-2009-2791 - http://www.exploit-db.com/exploits/9331 -CVE-2009-2792 - http://www.exploit-db.com/exploits/9313 -CVE-2009-2813 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191 -CVE-2009-2820 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9153 -CVE-2009-2841 - http://threatpost.com/en_us/blogs/apple-patches-critical-safari-vulnerabilities-111109 -CVE-2009-2842 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5915 -CVE-2009-2847 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2848 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html -CVE-2009-2848 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9766 -CVE-2009-2876 - http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html -CVE-2009-2878 - http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-013-cisco.html -CVE-2009-2881 - http://www.exploit-db.com/exploits/9246 -CVE-2009-2882 - http://packetstormsecurity.org/0907-exploits/pgmatchmaking-xss.txt -CVE-2009-2884 - http://packetstormsecurity.org/0907-exploits/tallestbuildings-sql.txt -CVE-2009-2885 - http://packetstormsecurity.org/0907-exploits/tallestbuildings-sql.txt -CVE-2009-2886 - http://packetstormsecurity.org/0907-exploits/presidentbios-sqlxss.txt -CVE-2009-2887 - http://packetstormsecurity.org/0907-exploits/presidentbios-sqlxss.txt -CVE-2009-2888 - http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt -CVE-2009-2889 - http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt -CVE-2009-2890 - http://packetstormsecurity.org/0907-exploits/riddledepot-sqlxss.txt -CVE-2009-2891 - http://packetstormsecurity.org/0907-exploits/riddledepot-sqlxss.txt -CVE-2009-2892 - http://www.exploit-db.com/exploits/9252 -CVE-2009-2893 - http://packetstormsecurity.org/0907-exploits/xzero-xss.txt -CVE-2009-2894 - http://packetstormsecurity.org/0907-exploits/clone2009-sql.txt -CVE-2009-2896 - http://www.exploit-db.com/exploits/9220 -CVE-2009-2897 - http://www.coresecurity.com/content/hyperic-hq-vulnerabilities -CVE-2009-2898 - http://www.coresecurity.com/content/hyperic-hq-vulnerabilities -CVE-2009-2901 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-2901 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2009-2902 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-2902 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2009-2904 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9862 -CVE-2009-2905 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9664 -CVE-2009-2906 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944 -CVE-2009-2915 - http://packetstormsecurity.org/0908-exploits/discuz60-sql.txt -CVE-2009-2916 - http://aluigi.altervista.org/adv/vietcong2fs-adv.txt -CVE-2009-2917 - http://www.exploit-db.com/exploits/9382 -CVE-2009-2919 - http://securityreason.com/exploitalert/5644 -CVE-2009-2921 - http://www.exploit-db.com/exploits/9353 -CVE-2009-2923 - http://www.exploit-db.com/exploits/9444 -CVE-2009-2925 - http://www.exploit-db.com/exploits/9140 -CVE-2009-2949 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-2949 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10176 -CVE-2009-2950 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-2957 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2009-2958 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2009-2958 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9816 -CVE-2009-2961 - http://www.exploit-db.com/exploits/9467 -CVE-2009-3003 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -CVE-2009-3004 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -CVE-2009-3005 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -CVE-2009-3006 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -CVE-2009-3006 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6437 -CVE-2009-3007 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -CVE-2009-3008 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -CVE-2009-3031 - http://sotiriu.de/adv/NSOADV-2009-001.txt -CVE-2009-3038 - http://www.exploit-db.com/exploits/9517 -CVE-2009-3042 - http://seclists.org/fulldisclosure/2009/Aug/0143.html -CVE-2009-3042 - http://www.exploit-db.com/exploits/9416 -CVE-2009-3050 - http://bugs.gentoo.org/show_bug.cgi?id=278186 -CVE-2009-3050 - http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt -CVE-2009-3050 - http://www.openwall.com/lists/oss-security/2009/07/25/3 -CVE-2009-3057 - http://packetstormsecurity.org/0909-exploits/beex-xss.txt -CVE-2009-3058 - http://packetstormsecurity.org/0909-exploits/akplayer-overflow.txt -CVE-2009-3059 - http://packetstormsecurity.org/0908-exploits/jboard-sql.txt -CVE-2009-3060 - http://packetstormsecurity.org/0908-exploits/jboard-sql.txt -CVE-2009-3061 - http://packetstormsecurity.org/0909-exploits/alqatarigroup-sql.txt -CVE-2009-3065 - http://www.exploit-db.com/exploits/9577 -CVE-2009-3066 - http://packetstormsecurity.org/0909-exploits/propertywatch-xss.txt -CVE-2009-3067 - http://packetstormsecurity.org/0909-exploits/resvman-xss.txt -CVE-2009-3069 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3070 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3071 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3072 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3073 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3074 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3074 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9444 -CVE-2009-3075 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3076 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3076 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9306 -CVE-2009-3077 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3078 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3079 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html -CVE-2009-3085 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6434 -CVE-2009-3095 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9363 -CVE-2009-3103 - http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html -CVE-2009-3103 - http://isc.sans.org/diary.html?storyid=7093 -CVE-2009-3103 - http://www.exploit-db.com/exploits/9594 -CVE-2009-3103 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 -CVE-2009-3111 - http://www.openwall.com/lists/oss-security/2009/09/09/1 -CVE-2009-3111 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9919 -CVE-2009-3112 - http://www.oxidforge.org/wiki/Security_bulletins/2009-001 -CVE-2009-3114 - http://www.scip.ch/?vuldb.4021 -CVE-2009-3118 - http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt -CVE-2009-3119 - http://packetstormsecurity.org/0908-exploits/phpfusiondsmsf-sql.txt -CVE-2009-3123 - http://packetstormsecurity.org/0908-exploits/wapmotor-lfi.txt -CVE-2009-3124 - http://packetstormsecurity.org/0908-exploits/quarkmail-lfi.txt -CVE-2009-3126 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -CVE-2009-3127 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3128 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3129 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3130 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3131 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3132 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3133 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3134 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -CVE-2009-3135 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-068 -CVE-2009-3147 - http://packetstormsecurity.org/0907-exploits/reviewpost-xss.txt -CVE-2009-3148 - http://www.exploit-db.com/exploits/9325 -CVE-2009-3149 - http://www.exploit-db.com/exploits/9355 -CVE-2009-3151 - http://www.exploit-db.com/exploits/9307 -CVE-2009-3152 - http://packetstormsecurity.org/0907-exploits/ntsoft-xss.txt -CVE-2009-3153 - http://packetstormsecurity.org/0907-exploits/x10mp3se-xss.txt -CVE-2009-3158 - http://www.exploit-db.com/exploits/9337 -CVE-2009-3162 - http://packetstormsecurity.org/0908-exploits/multiwebsite-xss.txt -CVE-2009-3170 - http://www.exploit-db.com/exploits/9561 -CVE-2009-3171 - http://packetstormsecurity.org/0909-exploits/gazellecms-xss.txt -CVE-2009-3182 - http://www.exploit-db.com/exploits/9433 -CVE-2009-3184 - http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt -CVE-2009-3185 - http://www.exploit-db.com/exploits/9529 -CVE-2009-3186 - http://packetstormsecurity.org/0908-exploits/videogirls-xss.txt -CVE-2009-3187 - http://packetstormsecurity.org/0908-exploits/saa-xss.txt -CVE-2009-3189 - http://packetstormsecurity.org/0908-exploits/digiozgb-xss.txt -CVE-2009-3192 - http://packetstormsecurity.org/0908-exploits/linkorcms-xss.txt -CVE-2009-3194 - http://packetstormsecurity.org/0908-exploits/searchfeed-xss.txt -CVE-2009-3195 - http://packetstormsecurity.org/0908-exploits/auctionrsscs-xss.txt -CVE-2009-3196 - http://packetstormsecurity.org/0908-exploits/phpvideoyoutube-xss.txt -CVE-2009-3197 - http://packetstormsecurity.org/0908-exploits/phpcalsearch-xss.txt -CVE-2009-3198 - http://packetstormsecurity.org/0908-exploits/ams-xss.txt -CVE-2009-3201 - http://www.exploit-db.com/exploits/9620 -CVE-2009-3202 - http://packetstormsecurity.org/0908-exploits/uloki-xss.txt -CVE-2009-3203 - http://packetstormsecurity.org/0908-exploits/ajauctionoopd2-sql.txt -CVE-2009-3204 - http://packetstormsecurity.org/0908-exploits/stivaforum-xss.txt -CVE-2009-3205 - http://packetstormsecurity.org/0908-exploits/cbauthority-sql.txt -CVE-2009-3208 - http://packetstormsecurity.org/0908-exploits/phpfreebb-sql.txt -CVE-2009-3209 - http://packetstormsecurity.org/0908-exploits/phpem-sql.txt -CVE-2009-3211 - http://packetstormsecurity.org/0908-exploits/infinity-disclose.txt -CVE-2009-3212 - http://packetstormsecurity.org/0908-exploits/infinity-disclose.txt -CVE-2009-3213 - http://packetstormsecurity.org/0908-exploits/broid-overflow.txt -CVE-2009-3215 - http://www.exploit-db.com/exploits/9276 -CVE-2009-3216 - http://www.exploit-db.com/exploits/9266 -CVE-2009-3217 - http://www.exploit-db.com/exploits/9266 -CVE-2009-3221 - http://packetstormsecurity.org/0907-exploits/alp-overflow.txt -CVE-2009-3222 - http://packetstormsecurity.org/0907-exploits/honesttraffic-xss.txt -CVE-2009-3223 - http://www.exploit-db.com/exploits/9271 -CVE-2009-3225 - http://packetstormsecurity.org/0907-exploits/almondclassifieds-xss.txt -CVE-2009-3226 - http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt -CVE-2009-3227 - http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt -CVE-2009-3228 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9409 -CVE-2009-3244 - http://www.exploit-db.com/exploits/9682 -CVE-2009-3245 - http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html -CVE-2009-3245 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790 -CVE-2009-3246 - http://www.packetstormsecurity.com/0909-exploits/mybuxscript-sql.txt -CVE-2009-3249 - http://securityreason.com/securityalert/8118 -CVE-2009-3253 - http://www.exploit-db.com/exploits/9546 -CVE-2009-3255 - http://packetstormsecurity.org/0908-exploits/rqms-bypass.txt -CVE-2009-3256 - http://packetstormsecurity.org/0908-exploits/livestreet-xss.txt -CVE-2009-3260 - http://packetstormsecurity.org/0908-exploits/livestreet-xss.txt -CVE-2009-3261 - http://packetstormsecurity.org/0908-exploits/livestreet-xss.txt -CVE-2009-3263 - http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ -CVE-2009-3265 - http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ -CVE-2009-3266 - http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ -CVE-2009-3266 - http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/ -CVE-2009-3274 - https://bugzilla.mozilla.org/show_bug.cgi?id=514823 -CVE-2009-3274 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9641 -CVE-2009-3286 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757 -CVE-2009-3292 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9982 -CVE-2009-3295 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-003.txt -CVE-2009-3301 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-3302 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-3308 - http://www.exploit-db.com/exploits/9719 -CVE-2009-3311 - http://packetstormsecurity.org/0909-exploits/rssms-xss.txt -CVE-2009-3316 - http://www.exploit-db.com/exploits/9713 -CVE-2009-3320 - http://packetstormsecurity.org/0909-exploits/paolink-xss.txt -CVE-2009-3334 - http://www.exploit-db.com/exploits/9732 -CVE-2009-3338 - http://www.exploit-db.com/exploits/9659 -CVE-2009-3342 - https://www.exploit-db.com/exploits/9654 -CVE-2009-3348 - http://www.exploit-db.com/exploits/9640 -CVE-2009-3349 - http://www.exploit-db.com/exploits/9640 -CVE-2009-3350 - http://drupal.org/node/572852 -CVE-2009-3351 - http://drupal.org/node/572852 -CVE-2009-3352 - http://drupal.org/node/572852 -CVE-2009-3353 - http://drupal.org/node/572852 -CVE-2009-3354 - http://drupal.org/node/572852 -CVE-2009-3355 - http://packetstormsecurity.org/0909-exploits/buydatingsite-xss.txt -CVE-2009-3357 - http://e-rdc.org/v1/news.php?readmore=142 -CVE-2009-3357 - http://www.exploit-db.com/exploits/9648 -CVE-2009-3359 - http://packetstormsecurity.org/0909-exploits/matchagencybiz-xss.txt -CVE-2009-3360 - http://packetstormsecurity.org/0909-exploits/datemill-xss.txt -CVE-2009-3362 - http://packetstormsecurity.org/0909-exploits/sznews-rfi.txt -CVE-2009-3368 - http://e-rdc.org/v1/news.php?readmore=142 -CVE-2009-3368 - http://www.exploit-db.com/exploits/9648 -CVE-2009-3370 - https://bugzilla.mozilla.org/show_bug.cgi?id=511615 -CVE-2009-3371 - https://bugzilla.mozilla.org/show_bug.cgi?id=514554 -CVE-2009-3373 - https://bugzilla.mozilla.org/show_bug.cgi?id=511689 -CVE-2009-3374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9789 -CVE-2009-3380 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9463 -CVE-2009-3389 - http://www.theora.org/news/#libtheora-1.1.0 -CVE-2009-3410 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3411 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3412 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3413 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3414 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3415 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3416 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3421 - http://www.exploit-db.com/exploits/9293 -CVE-2009-3422 - http://www.exploit-db.com/exploits/9294 -CVE-2009-3423 - http://www.exploit-db.com/exploits/9292 -CVE-2009-3425 - http://www.exploit-db.com/exploits/9350 -CVE-2009-3426 - http://www.exploit-db.com/exploits/9350 -CVE-2009-3434 - http://packetstormsecurity.org/0909-exploits/mambojoomlatupinambis-sql.txt -CVE-2009-3436 - http://packetstormsecurity.org/0909-exploits/maxwebportal-sql.txt -CVE-2009-3438 - http://packetstormsecurity.org/0909-exploits/joomlafb-sql.txt -CVE-2009-3443 - http://packetstormsecurity.org/0909-exploits/joomlafastball-sql.txt -CVE-2009-3446 - http://www.exploit-db.com/exploits/9733 -CVE-2009-3449 - http://www.exploit-db.com/exploits/9689 -CVE-2009-3457 - http://seclists.org/fulldisclosure/2009/Sep/0369.html -CVE-2009-3459 - http://isc.sans.org/diary.html?storyid=7300 -CVE-2009-3478 - http://vuln.sg/fireftp105-en.html -CVE-2009-3483 - http://www.packetstormsecurity.org/0909-exploits/Dr_IDE-CuteFTP_FTP_8.3.3-PoC.py.txt -CVE-2009-3484 - http://www.packetstormsecurity.org/0909-exploits/coreftp_local.py.txt -CVE-2009-3491 - http://packetstormsecurity.org/0909-exploits/joomlasportfusion-sql.txt -CVE-2009-3493 - http://packetstormsecurity.org/0909-exploits/paobacheca-xss.txt -CVE-2009-3497 - http://www.packetstormsecurity.org/0909-exploits/realestaterealtors-sql.txt -CVE-2009-3498 - http://packetstormsecurity.org/0909-exploits/hbcms-sql.txt -CVE-2009-3500 - http://packetstormsecurity.org/0909-exploits/bpgames-sql.txt -CVE-2009-3501 - http://packetstormsecurity.org/0909-exploits/bpstudent-sql.txt -CVE-2009-3502 - http://packetstormsecurity.org/0909-exploits/bpmusic-sql.txt -CVE-2009-3503 - http://packetstormsecurity.org/0909-exploits/bpholidaylettings-sql.txt -CVE-2009-3504 - http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt -CVE-2009-3505 - http://packetstormsecurity.org/0909-exploits/mmorpgzone-sql.txt -CVE-2009-3506 - http://www.exploit-db.com/exploits/9311 -CVE-2009-3507 - http://www.exploit-db.com/exploits/9311 -CVE-2009-3508 - http://www.exploit-db.com/exploits/9314 -CVE-2009-3509 - http://packetstormsecurity.org/0907-exploits/cjdynamicpoll-xss.txt -CVE-2009-3510 - http://www.exploit-db.com/exploits/9316 -CVE-2009-3511 - http://www.exploit-db.com/exploits/9308 -CVE-2009-3512 - http://packetstormsecurity.org/0907-exploits/myweight-xss.txt -CVE-2009-3513 - http://packetstormsecurity.org/0907-exploits/etraining-xss.txt -CVE-2009-3514 - http://www.exploit-db.com/exploits/9312 -CVE-2009-3515 - http://www.exploit-db.com/exploits/9312 -CVE-2009-3520 - http://packetstormsecurity.org/0909-exploits/cmsphp-xsrf.txt -CVE-2009-3525 - http://www.openwall.com/lists/oss-security/2009/09/25/1 -CVE-2009-3525 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466 -CVE-2009-3531 - http://packetstormsecurity.org/0907-exploits/universecms-sql.txt -CVE-2009-3532 - http://www.packetstormsecurity.org/0907-advisories/DDIVRT-2009-26.txt -CVE-2009-3535 - http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt -CVE-2009-3536 - http://www.exploit-db.com/exploits/9200 -CVE-2009-3539 - http://packetstormsecurity.org/0907-exploits/ultraclassifieds-xss.txt -CVE-2009-3542 - http://packetstormsecurity.org/0907-exploits/ls-lfi.txt -CVE-2009-3547 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9327 -CVE-2009-3548 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-3548 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2009-3553 - http://www.cups.org/str.php?L3200 -CVE-2009-3555 - http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html -CVE-2009-3555 - http://clicky.me/tlsvuln -CVE-2009-3555 - http://seclists.org/fulldisclosure/2009/Nov/139 -CVE-2009-3555 - http://ubuntu.com/usn/usn-923-1 -CVE-2009-3555 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2009-3555 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-3555 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2009-3555 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2009-3555 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2009-3555 - http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html -CVE-2009-3555 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html -CVE-2009-3555 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-3555 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2009-3555 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -CVE-2009-3556 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9738 -CVE-2009-3563 - https://www.kb.cert.org/vuls/id/417980 -CVE-2009-3574 - http://www.exploit-db.com/exploits/9671 -CVE-2009-3576 - http://www.coresecurity.com/content/softimage-arbitrary-command-execution -CVE-2009-3577 - http://www.coresecurity.com/content/3dsmax-arbitrary-command-execution -CVE-2009-3578 - http://www.coresecurity.com/content/maya-arbitrary-command-execution -CVE-2009-3579 - http://www.coresecurity.com/content/jetty-persistent-xss -CVE-2009-3579 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-3585 - http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch -CVE-2009-3585 - http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch -CVE-2009-3585 - http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch -CVE-2009-3586 - http://census-labs.com/news/2009/12/02/corehttp-web-server/ -CVE-2009-3592 - http://packetstormsecurity.org/0910-exploits/X-Cart-submail-XSS.txt -CVE-2009-3593 - http://packetstormsecurity.org/0907-exploits/freelancers-xss.txt -CVE-2009-3598 - http://packetstormsecurity.org/0907-exploits/formxp-xss.txt -CVE-2009-3599 - http://packetstormsecurity.org/0907-exploits/hubscript-xssphpinfo.txt -CVE-2009-3600 - http://packetstormsecurity.org/0907-exploits/hubscript-xssphpinfo.txt -CVE-2009-3601 - http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt -CVE-2009-3603 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9671 -CVE-2009-3604 - http://site.pi3.com.pl/adv/xpdf.txt -CVE-2009-3608 - http://www.ocert.org/advisories/ocert-2009-016.html -CVE-2009-3608 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9536 -CVE-2009-3612 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10395 -CVE-2009-3615 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9414 -CVE-2009-3616 - https://bugzilla.redhat.com/show_bug.cgi?id=508567 -CVE-2009-3620 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891 -CVE-2009-3621 - http://lkml.org/lkml/2009/10/19/50 -CVE-2009-3621 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9921 -CVE-2009-3622 - http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ -CVE-2009-3622 - http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html -CVE-2009-3622 - https://bugzilla.redhat.com/show_bug.cgi?id=530056 -CVE-2009-3625 - http://www.openwall.com/lists/oss-security/2009/10/22/3 -CVE-2009-3625 - http://www.openwall.com/lists/oss-security/2009/10/22/6 -CVE-2009-3625 - https://bugzilla.redhat.com/show_bug.cgi?id=530255 -CVE-2009-3626 - http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973 -CVE-2009-3626 - http://www.openwall.com/lists/oss-security/2009/10/23/8 -CVE-2009-3641 - http://marc.info/?l=oss-security&m=125649553414700&w=2 -CVE-2009-3641 - http://seclists.org/fulldisclosure/2009/Oct/299 -CVE-2009-3641 - https://bugzilla.redhat.com/show_bug.cgi?id=530863 -CVE-2009-3642 - http://packetstormsecurity.org/0909-exploits/heat-sql.txt -CVE-2009-3643 - http://packetstormsecurity.org/0910-exploits/XM-ftp-dos.txt -CVE-2009-3644 - http://packetstormsecurity.org/0910-exploits/joomlasoundset-sql.txt -CVE-2009-3645 - http://packetstormsecurity.org/0910-exploits/joomlacbrb-sql.txt -CVE-2009-3648 - http://www.madirish.net/?article=251 -CVE-2009-3661 - http://www.exploit-db.com/exploits/9693 -CVE-2009-3663 - http://www.exploit-db.com/exploits/9657 -CVE-2009-3668 - http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt -CVE-2009-3669 - http://www.exploit-db.com/exploits/9697 -CVE-2009-3671 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 -CVE-2009-3672 - http://www.symantec.com/connect/blogs/zero-day-internet-explorer-exploit-published -CVE-2009-3672 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 -CVE-2009-3673 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 -CVE-2009-3674 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 -CVE-2009-3675 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-069 -CVE-2009-3676 - http://g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html -CVE-2009-3676 - http://seclists.org/fulldisclosure/2009/Nov/134 -CVE-2009-3676 - http://secunia.com/blog/66/ -CVE-2009-3678 - http://isc.sans.org/diary.html?storyid=8809 -CVE-2009-3694 - http://securityreason.com/expldownload/1/7380/1 -CVE-2009-3704 - http://packetstormsecurity.org/0910-exploits/zoiper_dos.py.txt -CVE-2009-3705 - http://packetstormsecurity.org/0909-exploits/achievo134-rfi.txt -CVE-2009-3707 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2009-3709 - http://packetstormsecurity.org/0910-exploits/alleycode-overflow.txt -CVE-2009-3710 - http://packetstormsecurity.org/0910-exploits/riorey-passwd.txt -CVE-2009-3714 - http://www.exploit-db.com/exploits/9205 -CVE-2009-3715 - http://www.exploit-db.com/exploits/9205 -CVE-2009-3716 - http://www.exploit-db.com/exploits/9205 -CVE-2009-3717 - http://www.exploit-db.com/exploits/9102 -CVE-2009-3721 - http://www.ocert.org/advisories/ocert-2009-013.html -CVE-2009-3722 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9892 -CVE-2009-3724 - https://snyk.io/vuln/SNYK-PYTHON-PYRAD-40000 -CVE-2009-3726 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734 -CVE-2009-3732 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2009-3734 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -CVE-2009-3735 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 -CVE-2009-3742 - http://issues.liferay.com/browse/LPS-6034 -CVE-2009-3747 - http://packetstormsecurity.org/0910-exploits/tbmnetcms-xss.txt -CVE-2009-3748 - http://sotiriu.de/adv/NSOADV-2009-003.txt -CVE-2009-3749 - http://sotiriu.de/adv/NSOADV-2009-002.txt -CVE-2009-3754 - http://www.exploit-db.com/exploits/9101 -CVE-2009-3755 - http://www.exploit-db.com/exploits/9101 -CVE-2009-3756 - http://www.exploit-db.com/exploits/9101 -CVE-2009-3757 - http://www.exploit-db.com/exploits/9106 -CVE-2009-3758 - http://www.exploit-db.com/exploits/9106 -CVE-2009-3759 - http://www.exploit-db.com/exploits/9106 -CVE-2009-3760 - http://www.exploit-db.com/exploits/9106 -CVE-2009-3762 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-3763 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-3764 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2009-3787 - http://www.waraxe.us/advisory-75.html -CVE-2009-3788 - http://www.packetstormsecurity.org/0910-exploits/opendocman-sqlxss.txt -CVE-2009-3789 - http://www.packetstormsecurity.org/0910-exploits/opendocman-sqlxss.txt -CVE-2009-3793 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2009-3802 - http://packetstormsecurity.org/0910-exploits/ONSEC-09-005.txt -CVE-2009-3803 - http://packetstormsecurity.org/0910-exploits/ONSEC-09-004.txt -CVE-2009-3805 - http://www.packetstormsecurity.com/0910-exploits/gpg2kleo-dos.txt -CVE-2009-3807 - http://www.exploit-db.com/exploits/9147 -CVE-2009-3808 - http://www.exploit-db.com/exploits/9178 -CVE-2009-3809 - http://www.exploit-db.com/exploits/9212 -CVE-2009-3810 - http://www.exploit-db.com/exploits/9213 -CVE-2009-3811 - http://liquidworm.blogspot.com/2009/07/music-tag-editor-161-build-212-remote.html -CVE-2009-3811 - http://www.exploit-db.com/exploits/9167 -CVE-2009-3812 - http://packetstormsecurity.org/0907-exploits/otsav-overflow.txt -CVE-2009-3812 - http://www.exploit-db.com/exploits/9113 -CVE-2009-3822 - http://www.packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt -CVE-2009-3825 - http://www.exploit-db.com/exploits/9103 -CVE-2009-3829 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9945 -CVE-2009-3833 - http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt -CVE-2009-3834 - http://packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt -CVE-2009-3835 - http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt -CVE-2009-3837 - http://www.packetstormsecurity.org/0910-exploits/eurekamc-dos.txt -CVE-2009-3838 - http://www.packetstormsecurity.org/0910-exploits/pegasusmc-dos.txt -CVE-2009-3840 - http://seclists.org/fulldisclosure/2009/Nov/199 -CVE-2009-3840 - http://www.coresecurity.com/content/openview_nnm_internaldb_dos -CVE-2009-3850 - http://www.coresecurity.com/content/blender-scripting-injection -CVE-2009-3857 - http://www.exploit-db.com/exploits/9133 -CVE-2009-3858 - http://packetstormsecurity.org/0907-exploits/gejosoft-xss.txt -CVE-2009-3859 - http://www.exploit-db.com/exploits/9114 -CVE-2009-3863 - http://www.exploit-db.com/exploits/9683 -CVE-2009-3867 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3868 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3869 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3871 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3871 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360 -CVE-2009-3872 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3873 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3873 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602 -CVE-2009-3874 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3875 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3876 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3877 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2009-3879 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9568 -CVE-2009-3887 - http://ocert.org/advisories/ocert-2009-013.html -CVE-2009-3887 - https://www.akitasecurity.nl/advisory.php?id=AK20090601 -CVE-2009-3896 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035 -CVE-2009-3901 - http://packetstormsecurity.org/0911-exploits/ecourier-xss.txt -CVE-2009-3904 - http://www.acunetix.com/blog/websecuritynews/cubecart-4-session-management-bypass-leads-to-administrator-access/ -CVE-2009-3909 - https://bugzilla.gnome.org/show_bug.cgi?id=600741 -CVE-2009-3911 - http://packetstormsecurity.org/0911-exploits/tftgallery-traversal.txt -CVE-2009-3912 - http://packetstormsecurity.org/0911-exploits/tftgallery-traversal.txt -CVE-2009-3924 - http://aluigi.altervista.org/adv/sof2pbbof-adv.txt -CVE-2009-3924 - http://aluigi.org/poc/sof2pbbof.zip -CVE-2009-3931 - http://securethoughts.com/2009/11/using-blended-browser-threats-involving-chrome-to-steal-files-on-your-computer/ -CVE-2009-3938 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680 -CVE-2009-3938 - http://bugs.freedesktop.org/show_bug.cgi?id=23074 -CVE-2009-3947 - http://www.exploit-db.com/exploits/9131 -CVE-2009-3948 - http://www.exploit-db.com/exploits/9139 -CVE-2009-3956 - http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt -CVE-2009-3960 - https://www.exploit-db.com/exploits/41855/ -CVE-2009-3967 - http://www.exploit-db.com/exploits/9480 -CVE-2009-3969 - http://www.exploit-db.com/exploits/9487 -CVE-2009-3977 - http://seclists.org/fulldisclosure/2009/Nov/199 -CVE-2009-3977 - http://www.coresecurity.com/content/openview_nnm_internaldb_dos -CVE-2009-3983 - https://bugzilla.mozilla.org/show_bug.cgi?id=487872 -CVE-2009-3984 - https://bugzilla.mozilla.org/show_bug.cgi?id=521461 -CVE-2009-3984 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9791 -CVE-2009-3985 - https://bugzilla.mozilla.org/show_bug.cgi?id=514232 -CVE-2009-3985 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9911 -CVE-2009-3988 - https://bugzilla.mozilla.org/show_bug.cgi?id=504862 -CVE-2009-3988 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9384 -CVE-2009-4008 - http://unbound.nlnetlabs.nl/downloads/unbound-1.4.4.tar.gz -CVE-2009-4017 - http://seclists.org/fulldisclosure/2009/Nov/228 -CVE-2009-4017 - http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ -CVE-2009-4017 - http://www.openwall.com/lists/oss-security/2009/11/20/7 -CVE-2009-4030 - http://bugs.mysql.com/bug.php?id=32167 -CVE-2009-4056 - http://www.packetstormsecurity.org/0911-exploits/betsycms-lfi.txt -CVE-2009-4057 - http://www.packetstormsecurity.org/0911-exploits/joomlanexus-sql.txt -CVE-2009-4059 - http://packetstormsecurity.org/0911-exploits/joomlajoomclip-sql.txt -CVE-2009-4065 - http://drupal.org/node/636462 -CVE-2009-4073 - http://www.theregister.co.uk/2009/11/23/internet_explorer_file_disclosure_bug/ -CVE-2009-4074 - http://www.theregister.co.uk/2009/11/20/internet_explorer_security_flaw/ -CVE-2009-4074 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2009-4082 - http://packetstormsecurity.org/0911-exploits/opt-rfi.txt -CVE-2009-4082 - http://www.exploit-db.com/exploits/10218 -CVE-2009-4086 - http://packetstormsecurity.org/0911-exploits/xerver-split.txt -CVE-2009-4087 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt -CVE-2009-4088 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt -CVE-2009-4089 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt -CVE-2009-4090 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt -CVE-2009-4091 - http://www.exploit-db.com/exploits/10180 -CVE-2009-4092 - http://www.exploit-db.com/exploits/10180 -CVE-2009-4093 - http://www.exploit-db.com/exploits/10180 -CVE-2009-4096 - http://packetstormsecurity.org/0911-exploits/istek-disclose.txt -CVE-2009-4097 - http://packetstormsecurity.org/0911-exploits/serenityaudio-overflow.txt -CVE-2009-4099 - http://packetstormsecurity.org/0911-exploits/joomlagcalendar-sql.txt -CVE-2009-4100 - http://www.net-security.org/secworld.php?id=8527 -CVE-2009-4102 - http://www.net-security.org/secworld.php?id=8527 -CVE-2009-4104 - http://securityreason.com/exploitalert/7480 -CVE-2009-4107 - http://hjafari.blogspot.com/2009/09/invisible-browsing-5052-ibkey-local.html -CVE-2009-4113 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4115 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4116 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4118 - http://packetstormsecurity.org/0911-exploits/sybsec-adv17.txt -CVE-2009-4131 - http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/ -CVE-2009-4136 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9358 -CVE-2009-4137 - http://www.suspekt.org/2009/12/09/advisory-032009-piwik-cookie-unserialize-vulnerability/ -CVE-2009-4138 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9527 -CVE-2009-4140 - http://packetstormsecurity.com/files/123493/wpseowatcher-exec.txt -CVE-2009-4140 - http://packetstormsecurity.com/files/123494/wpslimstatex-exec.txt -CVE-2009-4140 - http://packetstormsecurity.org/0910-exploits/piwik-upload.txt -CVE-2009-4141 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9201 -CVE-2009-4146 - http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html -CVE-2009-4147 - http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html -CVE-2009-4148 - http://www.coresecurity.com/content/dazstudio-scripting-injection -CVE-2009-4151 - http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch -CVE-2009-4151 - http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch -CVE-2009-4151 - http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch -CVE-2009-4154 - http://packetstormsecurity.org/0911-exploits/elxiscms-disclose.txt -CVE-2009-4156 - http://www.exploit-db.com/exploits/10259 -CVE-2009-4168 - http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt -CVE-2009-4172 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4173 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4174 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4175 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4201 - http://liquidworm.blogspot.com/2009/05/mp3-tag-assistant-pro-292-tag-metadata.html -CVE-2009-4212 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt -CVE-2009-4216 - http://packetstormsecurity.org/0911-exploits/klinza-lfi.txt -CVE-2009-4220 - http://packetstormsecurity.org/0911-exploits/pointcomma-rfi.txt -CVE-2009-4220 - http://www.exploit-db.com/exploits/10220 -CVE-2009-4221 - http://packetstormsecurity.org/0911-exploits/phpbazar211fix-sql.txt -CVE-2009-4222 - http://packetstormsecurity.org/0911-exploits/phpbazar-access.txt -CVE-2009-4223 - http://www.exploit-db.com/exploits/10216 -CVE-2009-4224 - http://packetstormsecurity.org/0911-exploits/sweetrice-rfilfi.txt -CVE-2009-4224 - http://www.exploit-db.com/exploits/10246 -CVE-2009-4227 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274 -CVE-2009-4227 - https://bugzilla.redhat.com/show_bug.cgi?id=543905 -CVE-2009-4228 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274 -CVE-2009-4228 - https://bugzilla.redhat.com/show_bug.cgi?id=543905 -CVE-2009-4231 - http://packetstormsecurity.org/0911-exploits/sweetrice-rfilfi.txt -CVE-2009-4234 - http://packetstormsecurity.org/0911-exploits/micronet-xss.txt -CVE-2009-4237 - http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities -CVE-2009-4238 - http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities -CVE-2009-4245 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9998 -CVE-2009-4249 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4250 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -CVE-2009-4251 - http://www.packetstormsecurity.org/0912-exploits/jasc-overflow.txt -CVE-2009-4261 - http://www.ocert.org/advisories/ocert-2009-019.html -CVE-2009-4261 - http://www.openwall.com/lists/oss-security/2009/12/17/5 -CVE-2009-4262 - http://www.packetstormsecurity.org/0912-exploits/hbns-admin.txt -CVE-2009-4264 - http://www.exploit-db.com/exploits/10329 -CVE-2009-4269 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2009-4307 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9874 -CVE-2009-4308 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2009-4315 - http://packetstormsecurity.org/0912-exploits/nuggetz-exec.txt -CVE-2009-4317 - http://packetstormsecurity.org/0912-exploits/ezcart-xss.txt -CVE-2009-4318 - http://packetstormsecurity.org/0912-exploits/rem101-xss.txt -CVE-2009-4321 - http://www.zen-cart.com/forum/showthread.php?t=142784 -CVE-2009-4322 - http://www.zen-cart.com/forum/showthread.php?t=142784 -CVE-2009-4323 - http://www.zen-cart.com/forum/showthread.php?t=142784 -CVE-2009-4324 - http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html -CVE-2009-4324 - http://www.symantec.com/connect/blogs/zero-day-xmas-present -CVE-2009-4347 - http://packetstormsecurity.org/0912-exploits/daloradius-xss.txt -CVE-2009-4349 - http://packetstormsecurity.org/0912-exploits/linkupgold-xsrf.txt -CVE-2009-4350 - http://packetstormsecurity.com/0912-exploits/arcticissue-xss.txt -CVE-2009-4359 - http://www.packetstormsecurity.org/0911-exploits/xoopssmartmedia-xss.txt -CVE-2009-4360 - http://securityreason.com/exploitalert/7494 -CVE-2009-4360 - http://www.packetstormsecurity.org/0911-exploits/xoopscontent-sql.txt -CVE-2009-4365 - http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt -CVE-2009-4366 - http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt -CVE-2009-4367 - http://www.exploit-db.com/exploits/10513 -CVE-2009-4369 - http://www.madirish.net/?article=441 -CVE-2009-4371 - http://www.madirish.net/?article=442 -CVE-2009-4372 - http://www.exploit-db.com/exploits/10480 -CVE-2009-4377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9564 -CVE-2009-4381 - http://packetstormsecurity.org/0912-exploits/mps-xss.txt -CVE-2009-4382 - http://packetstormsecurity.org/0912-exploits/phpfabercms-xss.txt -CVE-2009-4384 - http://packetstormsecurity.org/0912-exploits/ezpollhoster-xssxsrf.txt -CVE-2009-4384 - http://www.exploit-db.com/exploits/10439 -CVE-2009-4385 - http://packetstormsecurity.org/0912-exploits/ezpollhoster-xssxsrf.txt -CVE-2009-4385 - http://www.exploit-db.com/exploits/10439 -CVE-2009-4386 - http://packetstormsecurity.org/0912-exploits/b2cbcs-sql.txt -CVE-2009-4387 - http://www.scip.ch/?vuldb.4063 -CVE-2009-4403 - http://www.exploit-db.com/exploits/10534 -CVE-2009-4406 - http://www.packetstormsecurity.org/0912-exploits/apc-xss.txt -CVE-2009-4413 - http://www.exploit-db.com/exploits/10338 -CVE-2009-4417 - http://www.suspekt.org/2009/12/09/advisory-032009-piwik-cookie-unserialize-vulnerability/ -CVE-2009-4419 - http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf -CVE-2009-4423 - http://packetstormsecurity.org/0912-exploits/weencompany-sql.txt -CVE-2009-4424 - http://packetstormsecurity.org/0912-exploits/wppyrmont-sql.txt -CVE-2009-4425 - http://packetstormsecurity.org/0912-exploits/idevcart-xss.txt -CVE-2009-4426 - http://packetstormsecurity.org/0912-exploits/ignition-lfi.txt -CVE-2009-4426 - http://www.exploit-db.com/exploits/10569 -CVE-2009-4428 - http://packetstormsecurity.org/0912-exploits/joomlaportfolio-sql.txt -CVE-2009-4429 - http://www.madirish.net/?article=440 -CVE-2009-4431 - http://packetstormsecurity.org/0912-exploits/joomlajcalpro-rfi.txt -CVE-2009-4432 - http://packetstormsecurity.org/0912-exploits/videocms-sql.txt -CVE-2009-4433 - http://packetstormsecurity.org/0912-exploits/isupport-lfixss.txt -CVE-2009-4434 - http://packetstormsecurity.org/0912-exploits/isupport-lfixss.txt -CVE-2009-4435 - http://packetstormsecurity.org/0912-exploits/f3site2009-lfi.txt -CVE-2009-4437 - http://packetstormsecurity.org/0912-exploits/activeauctionhouse-sql.txt -CVE-2009-4458 - http://www.exploit-db.com/exploits/10645 -CVE-2009-4463 - http://blog.48bits.com/?p=781 -CVE-2009-4464 - http://www.packetstormsecurity.org/0912-exploits/abd-xss.txt -CVE-2009-4474 - http://www.exploit-db.com/exploits/9588 -CVE-2009-4475 - http://packetstormsecurity.org/0909-exploits/joomlajoomlub-sql.txt -CVE-2009-4477 - http://www.exploit-db.com/exploits/9565 -CVE-2009-4478 - http://www.exploit-db.com/exploits/9565 -CVE-2009-4484 - http://bugs.mysql.com/bug.php?id=50227 -CVE-2009-4484 - http://isc.sans.org/diary.html?storyid=7900 -CVE-2009-4484 - https://bugzilla.redhat.com/show_bug.cgi?id=555313 -CVE-2009-4487 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4488 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4489 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4490 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4491 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -CVE-2009-4491 - http://seclists.org/fulldisclosure/2023/Nov/13 -CVE-2009-4491 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4492 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4493 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4494 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4495 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4496 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4500 - https://support.zabbix.com/browse/ZBX-993 -CVE-2009-4512 - http://packetstormsecurity.org/0910-exploits/oscailt33-lfi.txt -CVE-2009-4512 - http://securityreason.com/exploitalert/7422 -CVE-2009-4522 - http://packetstormsecurity.org/0910-exploits/bloofoxcms-xss.txt -CVE-2009-4523 - http://www.packetstormsecurity.org/0910-exploits/zainu-xss.txt -CVE-2009-4529 - http://www.packetstormsecurity.org/0910-exploits/navicopa-disclose.txt -CVE-2009-4530 - http://packetstormsecurity.org/0910-exploits/mongoose-disclose.txt -CVE-2009-4531 - http://packetstormsecurity.org/0910-exploits/httpdx-disclose.txt -CVE-2009-4536 - http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ -CVE-2009-4537 - http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ -CVE-2009-4537 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9439 -CVE-2009-4538 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9702 -CVE-2009-4541 - http://www.exploit-db.com/exploits/9397 -CVE-2009-4542 - http://www.exploit-db.com/exploits/9397 -CVE-2009-4543 - http://www.exploit-db.com/exploits/9396 -CVE-2009-4544 - http://www.exploit-db.com/exploits/9396 -CVE-2009-4547 - http://packetstormsecurity.org/0908-exploits/viartcms-xss.txt -CVE-2009-4548 - http://packetstormsecurity.org/0908-exploits/viarthd-xss.txt -CVE-2009-4553 - http://www.exploit-db.com/exploits/9392 -CVE-2009-4567 - http://packetstormsecurity.org/0912-exploits/viscacha-xss.txt -CVE-2009-4567 - http://www.exploit-db.com/exploits/10354 -CVE-2009-4569 - http://packetstormsecurity.org/0912-exploits/elkagroupv-sql.txt -CVE-2009-4574 - http://packetstormsecurity.org/0912-exploits/iescorts-sql.txt -CVE-2009-4576 - http://packetstormsecurity.org/0912-exploits/joomlabeeheard-sql.txt -CVE-2009-4578 - http://packetstormsecurity.org/0912-exploits/joomlafacileforms-xss.txt -CVE-2009-4579 - http://packetstormsecurity.org/0912-exploits/joomlaartistavenue-xss.txt -CVE-2009-4580 - http://packetstormsecurity.org/0912-exploits/hastablog-xss.txt -CVE-2009-4581 - http://packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt -CVE-2009-4581 - http://www.exploit-db.com/exploits/10793 -CVE-2009-4583 - http://packetstormsecurity.org/0912-exploits/joomladhforum-sql.txt -CVE-2009-4584 - http://packetstormsecurity.org/0912-exploits/dbmastersmm-insecure.txt -CVE-2009-4585 - http://packetstormsecurity.org/0912-exploits/uranyumsoft-disclose.txt -CVE-2009-4586 - http://lostmon.blogspot.com/2009/10/wowd-search-client-multiple-variable.html -CVE-2009-4586 - http://packetstormsecurity.org/0910-exploits/wowd-xss.txt -CVE-2009-4587 - http://xc0re.wordpress.com/2009/10/25/cherokee-web-server-0-5-4-denial-of-service/ -CVE-2009-4588 - http://www.exploit-db.com/exploits/9116 -CVE-2009-4596 - http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txt -CVE-2009-4597 - http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txt -CVE-2009-4598 - http://packetstormsecurity.org/0912-exploits/joomlajphoto-sql.txt -CVE-2009-4599 - http://packetstormsecurity.org/0912-exploits/joomlajobs-sql.txt -CVE-2009-4601 - http://packetstormsecurity.org/0912-exploits/zeejob-xss.txt -CVE-2009-4604 - http://packetstormsecurity.org/0912-exploits/joomlamamboleto-rfi.txt -CVE-2009-4604 - http://www.exploit-db.com/exploits/10369 -CVE-2009-4609 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-4610 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-4611 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-4611 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -CVE-2009-4612 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-4621 - http://www.exploit-db.com/exploits/9576 -CVE-2009-4627 - http://www.exploit-db.com/exploits/9525 -CVE-2009-4628 - http://evilc0de.blogspot.com/2009/09/tpdugg-joomla-component-11-blind-sql.html -CVE-2009-4630 - https://bugzilla.mozilla.org/show_bug.cgi?id=453403 -CVE-2009-4656 - http://www.exploit-db.com/exploits/9691 -CVE-2009-4659 - http://www.exploit-db.com/exploits/9707 -CVE-2009-4661 - http://www.exploit-db.com/exploits/9695 -CVE-2009-4661 - http://www.exploit-db.com/exploits/9734 -CVE-2009-4668 - http://www.exploit-db.com/exploits/8780 -CVE-2009-4673 - http://www.exploit-db.com/exploits/8788 -CVE-2009-4678 - http://packetstormsecurity.org/0912-exploits/winngb-xss.txt -CVE-2009-4680 - http://packetstormsecurity.org/0907-exploits/wbd-sqlxss.txt -CVE-2009-4681 - http://packetstormsecurity.org/0907-exploits/wbd-sqlxss.txt -CVE-2009-4684 - http://packetstormsecurity.org/0907-exploits/ezodiak-xss.txt -CVE-2009-4685 - http://packetstormsecurity.org/0907-exploits/astrology-xss.txt -CVE-2009-4686 - http://packetstormsecurity.org/0907-exploits/adquick-xss.txt -CVE-2009-4688 - http://packetstormsecurity.org/0907-exploits/scsc-sqlxss.txt -CVE-2009-4689 - http://packetstormsecurity.org/0907-exploits/scsc-sqlxss.txt -CVE-2009-4690 - http://packetstormsecurity.org/0907-exploits/programsrating-xss.txt -CVE-2009-4691 - http://packetstormsecurity.org/0907-exploits/linktrader-sqlxss.txt -CVE-2009-4712 - http://packetstormsecurity.org/0907-exploits/tukanasec-sql.txt -CVE-2009-4714 - http://packetstormsecurity.org/0907-exploits/xoopsceleparquiz-xss.txt -CVE-2009-4715 - http://packetstormsecurity.org/0907-exploits/rtce-xss.txt -CVE-2009-4716 - http://packetstormsecurity.org/0907-exploits/ezwebsearch-xss.txt -CVE-2009-4717 - http://packetstormsecurity.org/0907-exploits/webstatcaffe-xss.txt -CVE-2009-4722 - http://www.exploit-db.com/exploits/9281 -CVE-2009-4723 - http://www.exploit-db.com/exploits/9333 -CVE-2009-4726 - http://www.exploit-db.com/exploits/9334 -CVE-2009-4731 - http://packetstormsecurity.org/0907-exploits/articlepubpro-sql.txt -CVE-2009-4732 - http://www.exploit-db.com/exploits/9335 -CVE-2009-4733 - http://www.exploit-db.com/exploits/9336 -CVE-2009-4736 - http://packetstormsecurity.org/0607-exploits/newangels-11.txt -CVE-2009-4748 - http://packetstormsecurity.org/0907-exploits/wpmco-sql.txt -CVE-2009-4749 - http://packetstormsecurity.org/0907-exploits/phplive-sql.txt -CVE-2009-4750 - http://www.packetstormsecurity.org/0907-exploits/toppaidmailer-rfi.txt -CVE-2009-4751 - http://www.packetstormsecurity.org/0907-exploits/swingerclub-sqlrfi.txt -CVE-2009-4752 - http://www.packetstormsecurity.org/0907-exploits/swingerclub-sqlrfi.txt -CVE-2009-4754 - http://www.exploit-db.com/exploits/8578 -CVE-2009-4756 - http://www.exploit-db.com/exploits/8588 -CVE-2009-4757 - http://www.exploit-db.com/exploits/8601 -CVE-2009-4758 - http://www.exploit-db.com/exploits/8568 -CVE-2009-4759 - http://www.exploit-db.com/exploits/8607 -CVE-2009-4765 - http://packetstormsecurity.org/1001-exploits/aspcnrhikaye-disclose.txt -CVE-2009-4766 - http://packetstormsecurity.org/1001-exploits/ypportal-disclose.txt -CVE-2009-4775 - http://www.exploit-db.com/exploits/9607 -CVE-2009-4775 - http://www.packetstormsecurity.org/0909-exploits/nocoolnameforawsftppoc.pl.txt -CVE-2009-4779 - http://www.exploit-db.com/exploits/10217 -CVE-2009-4782 - http://packetstormsecurity.org/0912-exploits/theeta-sqlxss.txt -CVE-2009-4783 - http://packetstormsecurity.org/0912-exploits/theeta-sqlxss.txt -CVE-2009-4784 - http://packetstormsecurity.org/0912-exploits/joomlajoaktree-sql.txt -CVE-2009-4785 - http://packetstormsecurity.org/0911-exploits/joomla-quicknews.txt -CVE-2009-4789 - http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt -CVE-2009-4791 - http://www.exploit-db.com/exploits/8319 -CVE-2009-4792 - http://www.exploit-db.com/exploits/8309 -CVE-2009-4793 - http://www.exploit-db.com/exploits/8309 -CVE-2009-4797 - http://e-rdc.org/v1/news.php?readmore=132 -CVE-2009-4797 - http://www.exploit-db.com/exploits/8318 -CVE-2009-4811 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2009-4834 - http://www.exploit-db.com/exploits/9590 -CVE-2009-4836 - http://www.exploit-db.com/exploits/8871 -CVE-2009-4854 - http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt -CVE-2009-4856 - http://packetstormsecurity.org/0908-exploits/pesc-xss.txt -CVE-2009-4857 - http://packetstormsecurity.org/0908-exploits/ppv-xss.txt -CVE-2009-4858 - http://packetstormsecurity.org/0908-exploits/yac-xss.txt -CVE-2009-4859 - http://packetstormsecurity.org/0908-exploits/owosasp-xss.txt -CVE-2009-4861 - http://packetstormsecurity.org/0908-exploits/supportpro-xss.txt -CVE-2009-4863 - http://www.exploit-db.com/exploits/9368 -CVE-2009-4864 - http://packetstormsecurity.org/0908-exploits/des-xss.txt -CVE-2009-4865 - http://packetstormsecurity.org/0908-exploits/des-xss.txt -CVE-2009-4866 - http://packetstormsecurity.org/0908-exploits/simplesearch-xss.txt -CVE-2009-4867 - http://www.exploit-db.com/exploits/9364 -CVE-2009-4868 - http://packetstormsecurity.org/0908-exploits/hitronsam-xss.txt -CVE-2009-4869 - http://packetstormsecurity.org/0908-exploits/nasimgb-xss.txt -CVE-2009-4871 - http://www.exploit-db.com/exploits/9389 -CVE-2009-4874 - http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt -CVE-2009-4883 - http://www.exploit-db.com/exploits/8182 -CVE-2009-4887 - http://www.exploit-db.com/exploits/8172 -CVE-2009-4888 - http://packetstormsecurity.org/0903-exploits/phortail-xss.txt -CVE-2009-4897 - http://bugs.ghostscript.com/show_bug.cgi?id=690523 -CVE-2009-4904 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt -CVE-2009-4906 - http://packetstormsecurity.org/0912-exploits/ape-xsrf.txt -CVE-2009-4907 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt -CVE-2009-4908 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt -CVE-2009-4909 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt -CVE-2009-4931 - http://www.exploit-db.com/exploits/8485 -CVE-2009-4932 - http://www.exploit-db.com/exploits/8484 -CVE-2009-4936 - http://www.exploit-db.com/exploits/8819 -CVE-2009-4937 - http://www.exploit-db.com/exploits/8819 -CVE-2009-4973 - http://www.exploit-db.com/exploits/9524 -CVE-2009-4974 - http://www.exploit-db.com/exploits/9524 -CVE-2009-4977 - http://www.exploit-db.com/exploits/9365 -CVE-2009-4978 - http://www.exploit-db.com/exploits/9365 -CVE-2009-4983 - http://packetstormsecurity.org/0908-exploits/silurus-xss.txt -CVE-2009-4984 - http://www.exploit-db.com/exploits/9370 -CVE-2009-4985 - http://www.exploit-db.com/exploits/9370 -CVE-2009-4988 - http://www.exploit-db.com/exploits/9319 -CVE-2009-4989 - http://packetstormsecurity.org/0908-exploits/ajauctionprooopd-xss.txt -CVE-2009-4991 - http://packetstormsecurity.org/0908-exploits/omnistarrecruiting-xss.txt -CVE-2009-4992 - http://www.exploit-db.com/exploits/9383 -CVE-2009-4993 - http://www.exploit-db.com/exploits/9383 -CVE-2009-5003 - http://packetstormsecurity.org/0907-exploits/bes-sql.txt -CVE-2009-5010 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2009-5011 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2009-5012 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2009-5013 - http://code.google.com/p/pyftpdlib/issues/detail?id=119 -CVE-2009-5013 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2009-5018 - https://bugzilla.redhat.com/show_bug.cgi?id=547515 -CVE-2009-5021 - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz -CVE-2009-5025 - https://packetstormsecurity.com/files/cve/CVE-2009-5025 -CVE-2009-5028 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2009-5031 - http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html -CVE-2009-5045 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-5046 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-5047 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-5048 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-5049 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -CVE-2009-5067 - http://packetstormsecurity.org/files/81614/html2ps-1.0-beta5-File-Disclosure.html -CVE-2009-5087 - http://securityreason.com/securityalert/8372 -CVE-2009-5087 - http://www.exploit-db.com/exploits/8041 -CVE-2009-5097 - http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-11-remote-file-access.html -CVE-2009-5098 - http://securityreason.com/securityalert/8373 -CVE-2009-5098 - http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-version-11-floating.html -CVE-2009-5118 - https://kc.mcafee.com/corporate/index?page=content&id=SB10013 -CVE-2009-5125 - http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html -CVE-2009-5132 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78570 -CVE-2009-5134 - http://www.exploit-db.com/exploits/9539 -CVE-2009-5135 - http://www.exploit-db.com/exploits/8191/ -CVE-2009-5142 - http://packetstormsecurity.com/files/127724/WordPress-Gamespeed-Theme-Cross-Site-Scripting.html -CVE-2009-5149 - http://www.kb.cert.org/vuls/id/419568 -CVE-2009-5154 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb -CVE-2009-5159 - https://packetstormsecurity.com/files/83624/Invision-Power-Board-3.0.4-Cross-Site-Scripting.html -CVE-2009-5159 - https://www.exploit-db.com/exploits/33394 -CVE-2010-0003 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0007 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0007 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9630 -CVE-2010-0008 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0010 - http://blog.pi3.com.pl/?p=69 -CVE-2010-0010 - http://packetstormsecurity.org/1001-exploits/modproxy-overflow.txt -CVE-2010-0010 - http://site.pi3.com.pl/adv/mod_proxy.txt -CVE-2010-0012 - https://launchpad.net/bugs/500625 -CVE-2010-0027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0066 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0067 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0068 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0069 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0070 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0071 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0072 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0074 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0075 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0076 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0077 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0078 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0079 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0080 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -CVE-2010-0081 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0082 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0082 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0082 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0082 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0083 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0084 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0084 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0084 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0084 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0084 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0085 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0085 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0085 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0085 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0085 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0086 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0087 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0087 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0087 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0087 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0088 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0088 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0088 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0088 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0088 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0089 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0089 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0089 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0090 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0090 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0090 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0091 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0091 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0091 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0091 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0091 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0091 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9855 -CVE-2010-0092 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0092 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0092 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0092 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0093 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0093 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0093 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0093 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0093 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9877 -CVE-2010-0094 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0094 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0094 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0094 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0094 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0095 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0095 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0095 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0095 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0095 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0097 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9357 -CVE-2010-0103 - http://www.symantec.com/connect/blogs/trojan-found-usb-battery-charger-software -CVE-2010-0105 - http://securityreason.com/achievement_securityalert/83 -CVE-2010-0149 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0150 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0151 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0157 - http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt -CVE-2010-0158 - http://packetstormsecurity.org/1001-exploits/joomlabamboo-sql.txt -CVE-2010-0159 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9590 -CVE-2010-0160 - https://bugzilla.mozilla.org/show_bug.cgi?id=531222 -CVE-2010-0160 - https://bugzilla.mozilla.org/show_bug.cgi?id=533000 -CVE-2010-0164 - https://bugzilla.mozilla.org/show_bug.cgi?id=547143 -CVE-2010-0167 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9835 -CVE-2010-0174 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9502 -CVE-2010-0175 - https://bugzilla.mozilla.org/show_bug.cgi?id=540100 -CVE-2010-0175 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9834 -CVE-2010-0176 - https://bugzilla.mozilla.org/show_bug.cgi?id=538308 -CVE-2010-0177 - https://bugzilla.mozilla.org/show_bug.cgi?id=538310 -CVE-2010-0179 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-0179 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9446 -CVE-2010-0182 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375 -CVE-2010-0183 - https://bugzilla.mozilla.org/show_bug.cgi?id=557174 -CVE-2010-0184 - http://www.tibco.com/mk/advisory.jsp -CVE-2010-0187 - https://bugzilla.redhat.com/show_bug.cgi?id=564287 -CVE-2010-0211 - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 -CVE-2010-0212 - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 -CVE-2010-0216 - http://securityreason.com/securityalert/8245 -CVE-2010-0217 - http://securityreason.com/securityalert/8255 -CVE-2010-0219 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-0219 - http://www.exploit-db.com/exploits/15869 -CVE-2010-0220 - http://isc.sans.org/diary.html?storyid=7897 -CVE-2010-0244 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0245 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0246 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0247 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0248 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0249 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -CVE-2010-0252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 -CVE-2010-0252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 -CVE-2010-0254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-028 -CVE-2010-0255 - http://isc.sans.org/diary.html?n&storyid=8152 -CVE-2010-0255 - http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag -CVE-2010-0255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -CVE-2010-0256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-028 -CVE-2010-0266 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-045 -CVE-2010-0267 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0277 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9421 -CVE-2010-0280 - http://www.coresecurity.com/content/google-sketchup-vulnerability -CVE-2010-0287 - http://www.exploit-db.com/exploits/11141 -CVE-2010-0288 - http://www.exploit-db.com/exploits/11141 -CVE-2010-0291 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0296 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2010-0296 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2010-0296 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-0296 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2010-0304 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9933 -CVE-2010-0307 - http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of%2C20100202%2C15754.html -CVE-2010-0307 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0319 - http://packetstormsecurity.org/1001-exploits/docmintcms-xss.txt -CVE-2010-0320 - http://packetstormsecurity.org/1001-exploits/glittercentral-xss.txt -CVE-2010-0321 - http://packetstormsecurity.org/1001-exploits/jamitjobboard-xss.txt -CVE-2010-0365 - http://www.packetstormsecurity.com/1001-exploits/bitsvs-xssuploadrfi.txt -CVE-2010-0366 - http://www.packetstormsecurity.com/1001-exploits/bitsvs-xssuploadrfi.txt -CVE-2010-0367 - http://www.packetstormsecurity.com/1001-exploits/bitsvs-xssuploadrfi.txt -CVE-2010-0370 - http://packetstormsecurity.org/1001-exploits/drupalnb-xss.txt -CVE-2010-0371 - http://packetstormsecurity.org/1001-exploits/galleriehitmaaan-xss.txt -CVE-2010-0372 - http://packetstormsecurity.org/1001-exploits/joomlaarticlemanager-sql.txt -CVE-2010-0373 - http://packetstormsecurity.org/1001-exploits/joomlalibros-sql.txt -CVE-2010-0374 - http://www.packetstormsecurity.com/1001-exploits/joomlamarketplace-xss.txt -CVE-2010-0376 - http://packetstormsecurity.org/1001-exploits/phpcalendars-xss.txt -CVE-2010-0377 - http://packetstormsecurity.org/1001-exploits/phpmyspace-sql.txt -CVE-2010-0380 - http://packetstormsecurity.org/1001-exploits/phpcalendars-xss.txt -CVE-2010-0395 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0405 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html -CVE-2010-0408 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 -CVE-2010-0408 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2010-0408 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9935 -CVE-2010-0410 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0411 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675 -CVE-2010-0415 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0415 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9399 -CVE-2010-0421 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9417 -CVE-2010-0423 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9842 -CVE-2010-0425 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2010-0425 - http://www.senseofsecurity.com.au/advisories/SOS-10-002 -CVE-2010-0425 - https://www.exploit-db.com/exploits/11650 -CVE-2010-0433 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0433 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0433 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856 -CVE-2010-0434 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 -CVE-2010-0434 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2010-0436 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999 -CVE-2010-0437 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0440 - http://www.coresecurity.com/content/cisco-secure-desktop-xss -CVE-2010-0442 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9720 -CVE-2010-0453 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0454 - http://packetstormsecurity.org/1001-exploits/publique-sql.txt -CVE-2010-0455 - http://www.packetstormsecurity.com/1001-exploits/punbb13-xss.txt -CVE-2010-0456 - http://www.exploit-db.com/exploits/11222 -CVE-2010-0457 - http://packetstormsecurity.org/1001-exploits/magicportal-sql.txt -CVE-2010-0458 - http://packetstormsecurity.org/0512-exploits/blog12SQL.txt -CVE-2010-0459 - http://packetstormsecurity.org/1001-exploits/joomlamochigames-sql.txt -CVE-2010-0459 - http://www.exploit-db.com/exploits/11243 -CVE-2010-0460 - http://packetstormsecurity.org/1001-advisories/kayako-xss.txt -CVE-2010-0461 - http://packetstormsecurity.org/1001-exploits/joomlacasino1-sql.txt -CVE-2010-0467 - http://www.exploit-db.com/exploits/11277 -CVE-2010-0469 - http://packetstormsecurity.org/1001-advisories/DDIVRT-2009-27.txt -CVE-2010-0470 - http://packetstormsecurity.org/1001-exploits/comtrend-xss.txt -CVE-2010-0478 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-025 -CVE-2010-0483 - http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt -CVE-2010-0483 - http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk -CVE-2010-0483 - http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ -CVE-2010-0483 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170 -CVE-2010-0484 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 -CVE-2010-0485 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 -CVE-2010-0486 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 -CVE-2010-0487 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 -CVE-2010-0488 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0489 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0490 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0491 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0492 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0494 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0550 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication -CVE-2010-0551 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication -CVE-2010-0552 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-001/-geo-r-gncaster-insecure-handling-of-long-urls -CVE-2010-0553 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-002/-geo-r-gncaster-insecure-handling-of-nmea-data -CVE-2010-0554 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication -CVE-2010-0555 - http://isc.sans.org/diary.html?n&storyid=8152 -CVE-2010-0555 - http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag -CVE-2010-0565 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0565 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56339 -CVE-2010-0566 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0567 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0568 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0569 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml -CVE-2010-0601 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-0602 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-0603 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-0604 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-0605 - http://osticket.com/forums/project.php?issueid=176 -CVE-2010-0605 - http://packetstormsecurity.org/1002-exploits/osTicket-1.6-RC5-SQLi.pdf -CVE-2010-0605 - http://www.exploit-db.com/exploits/11380 -CVE-2010-0606 - http://osticket.com/forums/project.php?issueid=176 -CVE-2010-0606 - http://packetstormsecurity.org/1002-exploits/osTicket-1.6-RC5-ReflectedXSS.pdf -CVE-2010-0607 - http://marc.info/?l=full-disclosure&m=126531284626756&w=2 -CVE-2010-0607 - http://packetstormsecurity.org/1002-exploits/sterlite-xss.txt -CVE-2010-0608 - http://packetstormsecurity.org/1001-exploits/novaboard112-sql.txt -CVE-2010-0610 - http://packetstormsecurity.org/1002-exploits/joomlaphotoblog-bsql.txt -CVE-2010-0611 - http://packetstormsecurity.org/1002-exploits/baalsystems-sql.txt -CVE-2010-0611 - http://www.exploit-db.com/exploits/11346 -CVE-2010-0614 - http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt -CVE-2010-0615 - http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt -CVE-2010-0616 - http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt -CVE-2010-0622 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0622 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9655 -CVE-2010-0628 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt -CVE-2010-0629 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567052 -CVE-2010-0629 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt -CVE-2010-0629 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9489 -CVE-2010-0630 - http://packetstormsecurity.org/1002-exploits/evernewfjs-sql.txt -CVE-2010-0632 - http://packetstormsecurity.org/1001-exploits/joomlasimplefaq-sql.txt -CVE-2010-0661 - http://flock.com/security/ -CVE-2010-0671 - http://packetstormsecurity.org/1002-exploits/pogodnycms-sql.txt -CVE-2010-0672 - http://packetstormsecurity.org/1002-exploits/wsnguest102-sql.txt -CVE-2010-0673 - http://packetstormsecurity.org/1002-exploits/wpcopperleaf-sql.txt -CVE-2010-0674 - http://packetstormsecurity.org/1002-exploits/statcountex-disclose.txt -CVE-2010-0675 - http://packetstormsecurity.org/1002-exploits/bgscms-xss.txt -CVE-2010-0676 - http://packetstormsecurity.org/1002-exploits/joomlarwcards-lfi.txt -CVE-2010-0677 - http://packetstormsecurity.org/1002-exploits/katalog-rfisql.txt -CVE-2010-0678 - http://packetstormsecurity.org/1002-exploits/katalog-rfisql.txt -CVE-2010-0679 - http://packetstormsecurity.org/1002-advisories/chemviewx-overflow.txt -CVE-2010-0679 - http://packetstormsecurity.org/1002-exploits/hyleoschemview-heap.rb.txt -CVE-2010-0682 - http://hakre.wordpress.com/2010/02/16/the-short-memory-of-wordpress-org-security/ -CVE-2010-0689 - http://sotiriu.de/adv/NSOADV-2010-003.txt -CVE-2010-0690 - http://packetstormsecurity.org/1002-exploits/videogamesrental-sql.txt -CVE-2010-0693 - http://packetstormsecurity.org/1002-exploits/trademanager-sql.txt -CVE-2010-0694 - http://packetstormsecurity.org/1001-exploits/joomlaperchagallery-sql.txt -CVE-2010-0695 - http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt -CVE-2010-0698 - http://packetstormsecurity.org/1002-exploits/wsccms-sql.txt -CVE-2010-0699 - http://packetstormsecurity.org/1002-exploits/vss-xss.txt -CVE-2010-0700 - http://zeroscience.mk/codes/wamp_xss.txt -CVE-2010-0700 - http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php -CVE-2010-0701 - http://packetstormsecurity.org/1002-exploits/omnidocs-sql.txt -CVE-2010-0702 - http://packetstormsecurity.org/1002-exploits/tribox-sql.txt -CVE-2010-0703 - http://packetstormsecurity.org/1002-exploits/PR09-04.txt -CVE-2010-0706 - http://www.packetstormsecurity.org/1002-exploits/nikara-xss.txt -CVE-2010-0709 - http://www.exploit-db.com/exploits/11477 -CVE-2010-0709 - http://www.exploit-db.com/exploits/11478 -CVE-2010-0711 - http://packetstormsecurity.org/1002-exploits/aspcodecms-xssxsrf.txt -CVE-2010-0719 - http://www.scmagazineus.com/malta-researchers-find-windows-bug-that-crashes-pcs/article/164439/ -CVE-2010-0720 - http://packetstormsecurity.org/1002-exploits/erotik-sql.txt -CVE-2010-0721 - http://packetstormsecurity.org/1002-exploits/auktionshausgelb-sql.txt -CVE-2010-0723 - http://packetstormsecurity.org/1002-exploits/eroauktion20-sql.txt -CVE-2010-0723 - http://packetstormsecurity.org/1002-exploits/eroauktion2010-sql.txt -CVE-2010-0724 - http://packetstormsecurity.org/1002-exploits/arabcart-sqlxss.txt -CVE-2010-0725 - http://packetstormsecurity.org/1002-exploits/arabcart-sqlxss.txt -CVE-2010-0730 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0731 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759 -CVE-2010-0734 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0738 - http://securityreason.com/securityalert/8408 -CVE-2010-0740 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0740 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0746 - https://bugzilla.redhat.com/show_bug.cgi?id=523178 -CVE-2010-0753 - http://www.exploit-db.com/exploits/11549 -CVE-2010-0753 - http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt -CVE-2010-0754 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt -CVE-2010-0754 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-006.txt -CVE-2010-0755 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt -CVE-2010-0756 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt -CVE-2010-0757 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt -CVE-2010-0758 - http://packetstormsecurity.org/1002-exploits/softbizjobs-sql.txt -CVE-2010-0759 - http://packetstormsecurity.org/1002-exploits/joomlascriptegrator-lfi.txt -CVE-2010-0761 - http://packetstormsecurity.org/1002-exploits/ebooksrental-sql.txt -CVE-2010-0761 - http://www.exploit-db.com/exploits/11402 -CVE-2010-0762 - http://packetstormsecurity.org/1002-exploits/cdrentals-sql.txt -CVE-2010-0762 - http://www.exploit-db.com/exploits/11401 -CVE-2010-0764 - http://packetstormsecurity.org/1002-exploits/esmile-sql.txt -CVE-2010-0765 - http://packetstormsecurity.org/1001-exploits/fipsforum-disclose.txt -CVE-2010-0766 - http://www.coresecurity.com/content/luxology-modo-lxo-vulnerability -CVE-2010-0795 - http://www.exploit-db.com/exploits/11292 -CVE-2010-0796 - http://packetstormsecurity.org/1001-exploits/joomlajequiz-sql.txt -CVE-2010-0796 - http://www.exploit-db.com/exploits/11287 -CVE-2010-0799 - http://packetstormsecurity.org/1001-exploits/phpunity-lfi.txt -CVE-2010-0801 - http://packetstormsecurity.org/1001-exploits/joomlaautartitarot-traversal.txt -CVE-2010-0802 - http://packetstormsecurity.org/1001-exploits/ipbawards-sql.txt -CVE-2010-0803 - http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-sql.txt -CVE-2010-0803 - http://www.exploit-db.com/exploits/11280 -CVE-2010-0804 - http://packetstormsecurity.org/1001-exploits/iboutique-xss.txt -CVE-2010-0805 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0806 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0807 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -CVE-2010-0808 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-0811 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 -CVE-2010-0811 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 -CVE-2010-0814 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 -CVE-2010-0815 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-031 -CVE-2010-0816 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-030 -CVE-2010-0817 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 -CVE-2010-0819 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-037 -CVE-2010-0825 - https://bugs.launchpad.net/ubuntu/+bug/531569 -CVE-2010-0826 - http://www.ubuntu.com/usn/USN-922-1 -CVE-2010-0829 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718 -CVE-2010-0835 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0836 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0837 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0837 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0837 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0837 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0837 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0838 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0838 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0838 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0838 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0838 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0839 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0839 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0839 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0839 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0840 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0840 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0840 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0840 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0840 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0840 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 -CVE-2010-0841 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0841 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0841 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0841 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0842 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0842 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0842 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0842 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0843 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0843 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0843 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0843 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0844 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0844 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0844 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0845 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0845 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0845 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0845 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0845 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9896 -CVE-2010-0846 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0846 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0846 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0846 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0847 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0847 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0847 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0847 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0847 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0848 - http://ubuntu.com/usn/usn-923-1 -CVE-2010-0848 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0848 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0848 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0848 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0848 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9899 -CVE-2010-0849 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0849 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0849 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0849 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0850 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -CVE-2010-0850 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0850 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0851 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0852 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0853 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0854 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0855 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0856 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0857 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0858 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0859 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0860 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0861 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0862 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0863 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0864 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0865 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0866 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0867 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0868 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0869 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0870 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0871 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0872 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0873 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0874 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0875 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0876 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0877 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0878 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0879 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0880 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0881 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0882 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0883 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0884 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0885 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0886 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-0886 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-0888 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0889 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0890 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0891 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0892 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0893 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0894 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0895 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0896 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0897 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -CVE-2010-0898 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0899 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0900 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0901 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0902 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0903 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0904 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0905 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0906 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0907 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0908 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0909 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0910 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0911 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0912 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0913 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0914 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0915 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0916 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-0917 - http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt -CVE-2010-0917 - http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ -CVE-2010-0924 - http://nobytes.com/exploits/Safari_4.0.4_background_DoS_pl.txt -CVE-2010-0925 - http://nobytes.com/exploits/Safari_4.0.4_background_DoS_pl.txt -CVE-2010-0928 - http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf -CVE-2010-0928 - http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/ -CVE-2010-0938 - http://packetstormsecurity.org/1001-exploits/todooforum-xss.txt -CVE-2010-0939 - http://packetstormsecurity.org/1001-exploits/abbforums-dislclose.txt -CVE-2010-0940 - http://packetstormsecurity.org/1001-exploits/simplephpgb-xss.txt -CVE-2010-0941 - http://packetstormsecurity.org/1001-exploits/hitcounter-xss.txt -CVE-2010-0942 - http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-traversal.txt -CVE-2010-0943 - http://packetstormsecurity.org/1001-exploits/joomlajashowcase-traversal.txt -CVE-2010-0944 - http://packetstormsecurity.org/1001-exploits/joomlajcollection-traversal.txt -CVE-2010-0945 - http://www.packetstormsecurity.org/0912-exploits/joomlahotbrackets-sql.txt -CVE-2010-0947 - http://packetstormsecurity.org/1003-exploits/bbsmax-xss.txt -CVE-2010-0948 - http://packetstormsecurity.org/1003-exploits/bigforum-sql.txt -CVE-2010-0949 - http://www.packetstormsecurity.com/1003-exploits/natychmiast-sqlxss.txt -CVE-2010-0950 - http://www.packetstormsecurity.com/1003-exploits/natychmiast-sqlxss.txt -CVE-2010-0951 - http://packetstormsecurity.org/1003-exploits/dev4u-sql.txt -CVE-2010-0952 - http://packetstormsecurity.org/1003-exploits/onecmsv25-sql.txt -CVE-2010-0954 - http://evilc0de.blogspot.com/2010/03/pre-e-learning-portal-sql-injection.html -CVE-2010-0954 - http://www.packetstormsecurity.com/1003-exploits/preelearningportal-sql.txt -CVE-2010-0955 - http://packetstormsecurity.org/1003-exploits/bildflirt-sql.txt -CVE-2010-0956 - http://packetstormsecurity.org/1003-exploits/opencart-sql.txt -CVE-2010-0957 - http://packetstormsecurity.org/1002-exploits/saskiashopsystem-lfi.txt -CVE-2010-0958 - http://packetstormsecurity.org/1003-exploits/tribisur-lfi.txt -CVE-2010-0958 - http://www.exploit-db.com/exploits/11655 -CVE-2010-0964 - http://packetstormsecurity.org/1003-exploits/eroserotikwebkat-sql.txt -CVE-2010-0965 - http://packetstormsecurity.org/1003-exploits/jevci-disclose.txt -CVE-2010-0966 - http://www.exploit-db.com/exploits/11735 -CVE-2010-0970 - http://www.exploit-db.com/exploits/11737 -CVE-2010-0971 - http://packetstormsecurity.org/1003-exploits/atutor-xss.txt -CVE-2010-0974 - http://www.packetstormsecurity.com/1003-exploits/phpcityportal-sqlrfi.txt -CVE-2010-0975 - http://packetstormsecurity.org/1003-exploits/phpcityportal-sqlrfi.txt -CVE-2010-0976 - http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt -CVE-2010-0977 - http://packetstormsecurity.org/1001-exploits/pdportal-disclose.txt -CVE-2010-0978 - http://packetstormsecurity.org/1001-exploits/kmsoftgb-disclose.txt -CVE-2010-0979 - http://packetstormsecurity.org/1001-exploits/odig-xss.txt -CVE-2010-0980 - http://greyhathackers.wordpress.com/2010/01/02/left-4-dead-stats-1-1-sql-injection-vulnerability/ -CVE-2010-0980 - http://packetstormsecurity.org/1001-exploits/left4deadstats-sql.txt -CVE-2010-0980 - http://www.exploit-db.com/exploits/10930 -CVE-2010-0981 - http://packetstormsecurity.org/0912-exploits/joomlatpjobs-sql.txt -CVE-2010-0982 - http://packetstormsecurity.org/1001-exploits/joomlacartweberp-lfi.txt -CVE-2010-0983 - http://packetstormsecurity.org/1001-exploits/rezervi-rfi.txt -CVE-2010-0983 - http://www.exploit-db.com/exploits/10967 -CVE-2010-0984 - http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt -CVE-2010-10001 - http://seclists.org/bugtraq/2010/Jul/60 -CVE-2010-10001 - https://vuldb.com/?id.4143 -CVE-2010-10001 - https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt -CVE-2010-10011 - https://vuldb.com/?id.250446 -CVE-2010-10011 - https://www.exploit-db.com/exploits/15445 -CVE-2010-1003 - http://www.coresecurity.com/content/efront-php-file-inclusion -CVE-2010-1028 - http://blog.mozilla.com/security/2010/02/22/secunia-advisory-sa38608/ -CVE-2010-1028 - http://blog.mozilla.com/security/2010/03/18/update-on-secunia-advisory-sa38608/ -CVE-2010-1028 - https://bugzilla.mozilla.org/show_bug.cgi?id=552216 -CVE-2010-1029 - http://www.exploit-db.com/exploits/11567 -CVE-2010-1044 - http://packetstormsecurity.org/1002-exploits/oputils_5-sql.txt -CVE-2010-1046 - http://www.exploit-db.com/exploits/11356 -CVE-2010-1047 - http://packetstormsecurity.org/1002-exploits/masa2elmc-sql.txt -CVE-2010-1050 - http://packetstormsecurity.org/1002-exploits/audistats-sql.txt -CVE-2010-1053 - http://www.exploit-db.com/exploits/11345 -CVE-2010-1054 - http://packetstormsecurity.org/1003-exploits/parscms-sql.txt -CVE-2010-1055 - http://evilc0de.blogspot.com/2010/03/osdate-rfi-vuln.html -CVE-2010-1056 - http://packetstormsecurity.org/1003-exploits/joomlarokdownloads-lfi.txt -CVE-2010-1058 - http://packetstormsecurity.org/1003-exploits/addressbookscript-lfi.txt -CVE-2010-1060 - http://packetstormsecurity.org/1003-exploits/shorturl-lfi.txt -CVE-2010-1062 - http://packetstormsecurity.org/1003-exploits/frecf-lfi.txt -CVE-2010-1064 - http://packetstormsecurity.org/1001-exploits/erolife-disclose.txt -CVE-2010-1066 - http://packetstormsecurity.org/1001-exploits/awcm-backup.txt -CVE-2010-1068 - http://packetstormsecurity.org/1001-exploits/surgeftp-xss.txt -CVE-2010-1069 - http://packetstormsecurity.org/1001-exploits/proarcadescripttogame-sql.txt -CVE-2010-1070 - http://packetstormsecurity.org/1001-exploits/imagoscriptsdac-sql.txt -CVE-2010-1071 - http://packetstormsecurity.org/1001-exploits/phpmdj103-sql.txt -CVE-2010-1072 - http://greyhathackers.wordpress.com/2010/01/07/sniggabo-cms-v2-21-xss-vulnerability/ -CVE-2010-1072 - http://packetstormsecurity.org/1001-exploits/sniggabocms-xss.txt -CVE-2010-1075 - http://packetstormsecurity.org/1002-exploits/elcms-sql.txt -CVE-2010-1077 - http://packetstormsecurity.org/1002-exploits/vbseo-lfi.txt -CVE-2010-1078 - http://www.packetstormsecurity.org/1002-exploits/spherecms-sql.txt -CVE-2010-1080 - http://packetstormsecurity.org/1002-exploits/pulsecms-xss.txt -CVE-2010-1081 - http://packetstormsecurity.org/1002-exploits/joomlacp-lfi.txt -CVE-2010-1083 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-1084 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1085 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1086 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1087 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1088 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1089 - http://packetstormsecurity.org/1003-exploits/phptroubleticket-sql.txt -CVE-2010-1090 - http://packetstormsecurity.org/1002-exploits/phpmysite-sqlxss.txt -CVE-2010-1090 - http://www.exploit-db.com/exploits/11588 -CVE-2010-1091 - http://packetstormsecurity.org/1002-exploits/phpmysite-sqlxss.txt -CVE-2010-1091 - http://www.exploit-db.com/exploits/11588 -CVE-2010-1105 - http://www.packetstormsecurity.com/1001-exploits/advertisemanager-xssrfitraversal.txt -CVE-2010-1106 - http://www.packetstormsecurity.com/1001-exploits/advertisemanager-xssrfitraversal.txt -CVE-2010-1109 - http://packetstormsecurity.org/1001-exploits/phpmysport-sqlaccess.txt -CVE-2010-1109 - http://phpmysport.sourceforge.net/en/forum/bugs/sujet_2851.html -CVE-2010-1110 - http://packetstormsecurity.org/1001-exploits/phpmysport-sqlaccess.txt -CVE-2010-1110 - http://phpmysport.sourceforge.net/en/forum/bugs/sujet_2851.html -CVE-2010-1111 - http://www.packetstormsecurity.com/1001-exploits/jokescomplete-xss.txt -CVE-2010-1112 - http://packetstormsecurity.org/1001-exploits/klonews-xss.txt -CVE-2010-1113 - http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt -CVE-2010-1114 - http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt -CVE-2010-1115 - http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt -CVE-2010-1116 - http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt -CVE-2010-1121 - https://bugzilla.mozilla.org/show_bug.cgi?id=555109 -CVE-2010-1122 - https://bugzilla.mozilla.org/show_bug.cgi?id=552216 -CVE-2010-1125 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -CVE-2010-1126 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -CVE-2010-1127 - http://securityreason.com/exploitalert/7731 -CVE-2010-1130 - http://securityreason.com/achievement_securityalert/82 -CVE-2010-1130 - http://securityreason.com/securityalert/7008 -CVE-2010-1132 - http://www.exploit-db.com/exploits/11662 -CVE-2010-1138 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2010-1139 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2010-1140 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2010-1141 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2010-1142 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html -CVE-2010-1150 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES -CVE-2010-1150 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES -CVE-2010-1157 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1157 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-1158 - http://www.openwall.com/lists/oss-security/2010/04/08/9 -CVE-2010-1158 - http://www.openwall.com/lists/oss-security/2010/04/14/3 -CVE-2010-1158 - https://bugzilla.redhat.com/show_bug.cgi?id=580605 -CVE-2010-1163 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382 -CVE-2010-1168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807 -CVE-2010-1171 - http://www.redhat.com/support/errata/RHSA-2011-0434.html -CVE-2010-1173 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1176 - http://www.exploit-db.com/exploits/11891 -CVE-2010-1179 - http://www.exploit-db.com/exploits/11890 -CVE-2010-1184 - http://www.theregister.co.uk/2010/03/26/open_source_wireless_sniffer/ -CVE-2010-1186 - http://www.coresecurity.com/content/nextgen-gallery-xss-vulnerability -CVE-2010-1186 - http://www.exploit-db.com/exploits/12098 -CVE-2010-1187 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1187 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9832 -CVE-2010-1188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878 -CVE-2010-1190 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES -CVE-2010-1196 - https://bugzilla.mozilla.org/show_bug.cgi?id=534666 -CVE-2010-1198 - https://bugzilla.mozilla.org/show_bug.cgi?id=532246 -CVE-2010-1199 - https://bugzilla.mozilla.org/show_bug.cgi?id=554255 -CVE-2010-1208 - https://bugzilla.mozilla.org/show_bug.cgi?id=572986 -CVE-2010-1209 - https://bugzilla.mozilla.org/show_bug.cgi?id=552110 -CVE-2010-1213 - https://bugzilla.mozilla.org/show_bug.cgi?id=568148 -CVE-2010-1214 - https://bugzilla.mozilla.org/show_bug.cgi?id=572985 -CVE-2010-1216 - http://www.exploit-db.com/exploits/11832 -CVE-2010-1217 - http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt -CVE-2010-1225 - http://www.coresecurity.com/content/virtual-pc-2007-hypervisor-memory-protection-bug -CVE-2010-1226 - http://www.exploit-db.com/exploits/11769 -CVE-2010-1227 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-1236 - http://flock.com/security/ -CVE-2010-1239 - http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ -CVE-2010-1239 - http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ -CVE-2010-1240 - http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ -CVE-2010-1240 - http://blog.didierstevens.com/2010/06/29/quickpost-no-escape-from-pdf/ -CVE-2010-1241 - http://www.blackhat.com/html/bh-eu-10/bh-eu-10-briefings.html#Li -CVE-2010-1255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 -CVE-2010-1256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-040 -CVE-2010-1257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -CVE-2010-1257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 -CVE-2010-1258 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -CVE-2010-1259 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -CVE-2010-1260 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -CVE-2010-1261 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -CVE-2010-1262 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -CVE-2010-1263 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-036 -CVE-2010-1264 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 -CVE-2010-1265 - http://packetstormsecurity.org/1003-exploits/joomladcsflashgames-sql.txt -CVE-2010-1266 - http://packetstormsecurity.org/1003-exploits/webmaid-rfilfi.txt -CVE-2010-1266 - http://www.exploit-db.com/exploits/11831 -CVE-2010-1267 - http://packetstormsecurity.org/1003-exploits/webmaid-rfilfi.txt -CVE-2010-1267 - http://www.exploit-db.com/exploits/11831 -CVE-2010-1268 - http://packetstormsecurity.org/1003-exploits/justvisual-lfi.txt -CVE-2010-1269 - http://packetstormsecurity.org/1003-exploits/phpscripte24-sql.txt -CVE-2010-1270 - http://packetstormsecurity.org/1003-exploits/multiauktions-sql.txt -CVE-2010-1271 - http://packetstormsecurity.org/1003-exploits/smartplugs-sql.txt -CVE-2010-1272 - http://packetstormsecurity.org/1003-exploits/gnattgp-rfi.txt -CVE-2010-1272 - http://www.exploit-db.com/exploits/11621 -CVE-2010-1277 - http://legalhackers.com/advisories/zabbix181api-sql.txt -CVE-2010-1280 - http://www.zeroscience.mk/codes/shockwave_mem.txt -CVE-2010-1280 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php -CVE-2010-1296 - http://www.exploit-db.com/exploits/12751 -CVE-2010-1296 - http://www.exploit-db.com/exploits/12752 -CVE-2010-1296 - http://www.exploit-db.com/exploits/12753 -CVE-2010-1296 - http://www.zeroscience.mk/codes/psbrush_bof.txt -CVE-2010-1296 - http://www.zeroscience.mk/codes/psgradient_bof.txt -CVE-2010-1296 - http://www.zeroscience.mk/codes/psstyle_bof.txt -CVE-2010-1296 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4938.php -CVE-2010-1296 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4939.php -CVE-2010-1296 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4940.php -CVE-2010-1297 - http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ -CVE-2010-1297 - http://www.exploit-db.com/exploits/13787 -CVE-2010-1297 - http://www.kb.cert.org/vuls/id/486225 -CVE-2010-1297 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-1299 - http://packetstormsecurity.org/1004-exploits/dynpgcms-rfi.txt -CVE-2010-1299 - http://www.exploit-db.com/exploits/11994 -CVE-2010-1300 - http://packetstormsecurity.org/1003-exploits/yamamah-sql.txt -CVE-2010-1301 - http://packetstormsecurity.org/1004-exploits/centreon-sql.txt -CVE-2010-1301 - http://www.exploit-db.com/exploits/11979 -CVE-2010-1302 - http://packetstormsecurity.org/1003-exploits/joomladwgraph-lfi.txt -CVE-2010-1303 - http://drupal.org/node/758756 -CVE-2010-1305 - http://packetstormsecurity.org/1004-exploits/jinventory-lfi.txt -CVE-2010-1306 - http://packetstormsecurity.org/1004-exploits/joomlapicasa-lfi.txt -CVE-2010-1306 - http://www.exploit-db.com/exploits/12058 -CVE-2010-1307 - http://packetstormsecurity.org/1004-exploits/joomlaupdater-lfi.txt -CVE-2010-1307 - http://www.exploit-db.com/exploits/12070 -CVE-2010-1308 - http://packetstormsecurity.org/1004-exploits/joomlasvmap-lfi.txt -CVE-2010-1308 - http://www.exploit-db.com/exploits/12066 -CVE-2010-1312 - http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt -CVE-2010-1312 - http://www.exploit-db.com/exploits/12077 -CVE-2010-1313 - http://www.exploit-db.com/exploits/12082 -CVE-2010-1314 - http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt -CVE-2010-1314 - http://www.exploit-db.com/exploits/12086 -CVE-2010-1315 - http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt -CVE-2010-1320 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490 -CVE-2010-1320 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt -CVE-2010-1321 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt -CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-1321 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-1321 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1323 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt -CVE-2010-1323 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2010-1323 - http://www.redhat.com/support/errata/RHSA-2010-0925.html -CVE-2010-1323 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-1324 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt -CVE-2010-1324 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2010-1324 - http://www.redhat.com/support/errata/RHSA-2010-0925.html -CVE-2010-1335 - http://packetstormsecurity.org/1003-exploits/inskycms-rfi.txt -CVE-2010-1337 - http://www.packetstormsecurity.com/1003-exploits/vanilla-rfi.txt -CVE-2010-1338 - http://packetstormsecurity.org/1003-exploits/woltlabb-sql.txt -CVE-2010-1340 - http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt -CVE-2010-1344 - http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt -CVE-2010-1345 - http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt -CVE-2010-1346 - http://packetstormsecurity.org/1003-exploits/minicmsribafs-sql.txt -CVE-2010-1346 - http://www.exploit-db.com/exploits/11835 -CVE-2010-1349 - http://www.exploit-db.com/exploits/11622 -CVE-2010-1350 - http://packetstormsecurity.org/1004-exploits/joomlajpjobs-sql.txt -CVE-2010-1352 - http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt -CVE-2010-1352 - http://www.exploit-db.com/exploits/12084 -CVE-2010-1353 - http://packetstormsecurity.org/1004-exploits/joomlaloginbox-lfi.txt -CVE-2010-1353 - http://www.exploit-db.com/exploits/12068 -CVE-2010-1354 - http://packetstormsecurity.org/1004-exploits/joomlavjdeo-lfi.txt -CVE-2010-1354 - http://www.exploit-db.com/exploits/12102 -CVE-2010-1357 - http://packetstormsecurity.org/1001-exploits/sbddirectory-xss.txt -CVE-2010-1360 - http://packetstormsecurity.org/1001-exploits/faqengine-rfi.txt -CVE-2010-1361 - http://packetstormsecurity.org/1001-exploits/phpeppershopws-xss.txt -CVE-2010-1363 - http://packetstormsecurity.org/1001-exploits/joomlajprojects-sql.txt -CVE-2010-1364 - http://packetstormsecurity.org/1002-exploits/uigapersonalportal-sql.txt -CVE-2010-1365 - http://packetstormsecurity.org/1002-exploits/uigafc-sql.txt -CVE-2010-1366 - http://packetstormsecurity.org/1002-exploits/uigafanclub-sql.txt -CVE-2010-1366 - http://www.exploit-db.com/exploits/11593 -CVE-2010-1368 - http://packetstormsecurity.org/1002-exploits/gamescript-sql.txt -CVE-2010-1369 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt -CVE-2010-1369 - http://www.exploit-db.com/exploits/11589 -CVE-2010-1370 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt -CVE-2010-1371 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt -CVE-2010-1372 - http://packetstormsecurity.org/1002-exploits/joomlahdflvplayer-sql.txt -CVE-2010-1422 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -CVE-2010-1429 - https://www.exploit-db.com/exploits/44009/ -CVE-2010-1431 - http://seclists.org/fulldisclosure/2010/Apr/272 -CVE-2010-1436 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1437 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1437 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715 -CVE-2010-1439 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9232 -CVE-2010-1457 - http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz -CVE-2010-1461 - http://www.exploit-db.com/exploits/12232 -CVE-2010-1466 - http://www.exploit-db.com/exploits/12193 -CVE-2010-1467 - http://www.exploit-db.com/exploits/12193 -CVE-2010-1468 - http://packetstormsecurity.org/1004-exploits/joomlamvrmm-sql.txt -CVE-2010-1469 - http://packetstormsecurity.org/1004-exploits/joomlajprojectmanager-lfi.txt -CVE-2010-1469 - http://www.exploit-db.com/exploits/12146 -CVE-2010-1470 - http://packetstormsecurity.org/1004-exploits/joomlawebtv-lfi.txt -CVE-2010-1470 - http://www.exploit-db.com/exploits/12166 -CVE-2010-1471 - http://packetstormsecurity.org/1004-exploits/joomlaaddressbook-lfi.txt -CVE-2010-1471 - http://www.exploit-db.com/exploits/12170 -CVE-2010-1472 - http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt -CVE-2010-1472 - http://www.exploit-db.com/exploits/12167 -CVE-2010-1473 - http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt -CVE-2010-1473 - http://www.exploit-db.com/exploits/12171 -CVE-2010-1474 - http://packetstormsecurity.org/1004-exploits/joomlasweetykeeper-lfi.txt -CVE-2010-1474 - http://www.exploit-db.com/exploits/12182 -CVE-2010-1475 - http://packetstormsecurity.org/1004-exploits/joomlapr-lfi.txt -CVE-2010-1475 - http://www.exploit-db.com/exploits/12147 -CVE-2010-1476 - http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt -CVE-2010-1476 - http://www.exploit-db.com/exploits/12150 -CVE-2010-1477 - http://packetstormsecurity.org/1004-exploits/joomlasermonspeaker-sql.txt -CVE-2010-1478 - http://packetstormsecurity.org/1004-exploits/joomlajfeedback-lfi.txt -CVE-2010-1478 - http://www.exploit-db.com/exploits/12145 -CVE-2010-1479 - http://packetstormsecurity.org/1004-exploits/joomlarokmodule-bsql.txt -CVE-2010-1479 - http://www.exploit-db.com/exploits/12148 -CVE-2010-1486 - http://www.coresecurity.com/content/cactushop-xss-persistent-vulnerability -CVE-2010-1489 - http://p42.us/ie8xss/ -CVE-2010-1489 - http://p42.us/ie8xss/Abusing_IE8s_XSS_Filters.pdf -CVE-2010-1491 - http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt -CVE-2010-1491 - http://www.exploit-db.com/exploits/12318 -CVE-2010-1493 - http://packetstormsecurity.org/1004-exploits/joomlaawdwall-lfisql.txt -CVE-2010-1493 - http://www.exploit-db.com/exploits/12113 -CVE-2010-1494 - http://packetstormsecurity.org/1004-exploits/joomlaawdwall-lfisql.txt -CVE-2010-1494 - http://www.exploit-db.com/exploits/12113 -CVE-2010-1495 - http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt -CVE-2010-1495 - http://www.exploit-db.com/exploits/12286 -CVE-2010-1496 - http://packetstormsecurity.org/1004-exploits/joomlajoltcard-sql.txt -CVE-2010-1497 - http://packetstormsecurity.org/1004-exploits/dlstats-sqlxssadmin.txt -CVE-2010-1498 - http://packetstormsecurity.org/1004-exploits/dlstats-sqlxssadmin.txt -CVE-2010-1499 - http://packetstormsecurity.org/1004-exploits/musicbox33-sql.txt -CVE-2010-1529 - http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt -CVE-2010-1531 - http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt -CVE-2010-1531 - http://www.exploit-db.com/exploits/12054 -CVE-2010-1532 - http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt -CVE-2010-1532 - http://www.exploit-db.com/exploits/12118 -CVE-2010-1533 - http://www.exploit-db.com/exploits/12142 -CVE-2010-1534 - http://www.exploit-db.com/exploits/12067 -CVE-2010-1535 - http://www.exploit-db.com/exploits/12151 -CVE-2010-1537 - http://packetstormsecurity.org/1002-exploits/phpcdb-lfi.txt -CVE-2010-1537 - http://www.exploit-db.com/exploits/11585 -CVE-2010-1538 - http://packetstormsecurity.org/1002-exploits/phpraincheck-sql.txt -CVE-2010-1538 - http://www.exploit-db.com/exploits/11586 -CVE-2010-1544 - http://packetstormsecurity.org/1002-exploits/rcadcm425-dos.txt -CVE-2010-1546 - http://www.madirish.net/?article=458 -CVE-2010-1547 - http://www.madirish.net/?article=458 -CVE-2010-1548 - http://www.madirish.net/?article=458 -CVE-2010-1549 - https://www.exploit-db.com/exploits/43411/ -CVE-2010-1552 - http://securityreason.com/securityalert/8157 -CVE-2010-1553 - http://securityreason.com/securityalert/8153 -CVE-2010-1554 - http://securityreason.com/securityalert/8154 -CVE-2010-1561 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-1562 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-1563 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-1565 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-1567 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml -CVE-2010-1583 - http://www.exploit-db.com/exploits/12452 -CVE-2010-1583 - http://www.madirish.net/?article=456 -CVE-2010-1584 - http://drupal.org/node/794718 -CVE-2010-1584 - http://www.madirish.net/?article=457 -CVE-2010-1584 - http://www.packetstormsecurity.com/1005-exploits/drupalab-xss.txt -CVE-2010-1584 - http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ -CVE-2010-1586 - http://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse -CVE-2010-1594 - http://packetstormsecurity.org/1001-exploits/ocsinventoryng-sqlxss.txt -CVE-2010-1595 - http://packetstormsecurity.org/1001-exploits/ocsinventoryng-sqlxss.txt -CVE-2010-1599 - http://packetstormsecurity.org/1004-exploits/nkinfoweb-sql.txt -CVE-2010-1600 - http://www.exploit-db.com/exploits/12234 -CVE-2010-1600 - http://www.packetstormsecurity.com/1004-exploits/joomlamediamallfactory-bsql.txt -CVE-2010-1601 - http://packetstormsecurity.org/1004-exploits/joomlajacomment-lfi.txt -CVE-2010-1601 - http://www.exploit-db.com/exploits/12236 -CVE-2010-1602 - http://packetstormsecurity.org/1004-exploits/joomlazimbcomment-lfi.txt -CVE-2010-1602 - http://www.exploit-db.com/exploits/12283 -CVE-2010-1603 - http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt -CVE-2010-1603 - http://www.exploit-db.com/exploits/12284 -CVE-2010-1604 - http://packetstormsecurity.org/1004-exploits/nctjobsportal-sqlxss.txt -CVE-2010-1606 - http://packetstormsecurity.org/1004-exploits/nctjobsportal-sqlxss.txt -CVE-2010-1607 - http://www.exploit-db.com/exploits/12316 -CVE-2010-1611 - http://packetstormsecurity.org/1002-exploits/alegrocart-xsrf.txt -CVE-2010-1618 - http://www.ja-sig.org/issues/browse/PHPCAS-52 -CVE-2010-1620 - http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz -CVE-2010-1622 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2010-1624 - http://www.securityfocus.com/bid/40138 -CVE-2010-1626 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490 -CVE-2010-1634 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2010-1635 - https://bugzilla.samba.org/show_bug.cgi?id=7229 -CVE-2010-1637 - http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 -CVE-2010-1638 - http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74 -CVE-2010-1641 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-1641 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916 -CVE-2010-1651 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 -CVE-2010-1652 - http://packetstormsecurity.org/1004-exploits/helpcenterlive-lfi.txt -CVE-2010-1652 - http://www.exploit-db.com/exploits/12421 -CVE-2010-1653 - http://packetstormsecurity.org/1004-exploits/joomlagraphics-lfi.txt -CVE-2010-1653 - http://www.exploit-db.com/exploits/12430 -CVE-2010-1654 - http://packetstormsecurity.org/1004-exploits/ireee-sql.txt -CVE-2010-1657 - http://packetstormsecurity.org/1004-exploits/joomlasmartsite-lfi.txt -CVE-2010-1657 - http://www.exploit-db.com/exploits/12428 -CVE-2010-1658 - http://packetstormsecurity.org/1004-exploits/joomlnoticeboard-lfi.txt -CVE-2010-1658 - http://www.exploit-db.com/exploits/12427 -CVE-2010-1659 - http://packetstormsecurity.org/1004-exploits/joomlaultimateportfolio-lfi.txt -CVE-2010-1659 - http://www.exploit-db.com/exploits/12426 -CVE-2010-1660 - http://packetstormsecurity.org/1004-exploits/clscriptclassfieds-sql.txt -CVE-2010-1661 - http://packetstormsecurity.org/1004-exploits/phpquickarcade-sqlxss.txt -CVE-2010-1661 - http://www.exploit-db.com/exploits/12416 -CVE-2010-1662 - http://packetstormsecurity.org/1004-exploits/phpquickarcade-sqlxss.txt -CVE-2010-1662 - http://www.exploit-db.com/exploits/12416 -CVE-2010-1681 - http://www.coresecurity.com/content/ms-visio-dxf-buffer-overflow -CVE-2010-1685 - https://seclists.org/fulldisclosure/2010/Apr/331 -CVE-2010-1689 - http://www.coresecurity.com/content/CORE-2010-0424-windows-smtp-dns-query-id-bugs -CVE-2010-1690 - http://www.coresecurity.com/content/CORE-2010-0424-windows-smtp-dns-query-id-bugs -CVE-2010-1702 - http://packetstormsecurity.org/1004-exploits/whmcs-sql.txt -CVE-2010-1703 - http://packetstormsecurity.org/1004-exploits/aps-sqlxss.txt -CVE-2010-1704 - http://packetstormsecurity.org/1004-exploits/aps-sqlxss.txt -CVE-2010-1706 - http://packetstormsecurity.org/1004-exploits/2daybizauctionscript-sql.txt -CVE-2010-1708 - http://packetstormsecurity.org/1004-exploits/freerealty-sql.txt -CVE-2010-1710 - http://packetstormsecurity.org/1004-exploits/siestta-lfixss.txt -CVE-2010-1711 - http://packetstormsecurity.org/1004-exploits/siestta-lfixss.txt -CVE-2010-1713 - http://packetstormsecurity.org/1004-exploits/postnukemodload-sql.txt -CVE-2010-1714 - http://packetstormsecurity.org/1004-exploits/joomlaarcadegames-lfi.txt -CVE-2010-1714 - http://www.exploit-db.com/exploits/12168 -CVE-2010-1715 - http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt -CVE-2010-1715 - http://www.exploit-db.com/exploits/12174 -CVE-2010-1717 - http://www.exploit-db.com/exploits/12291 -CVE-2010-1718 - http://www.exploit-db.com/exploits/12282 -CVE-2010-1719 - http://packetstormsecurity.org/1004-exploits/joomlamtfireeagle-lfi.txt -CVE-2010-1719 - http://www.exploit-db.com/exploits/12233 -CVE-2010-1722 - http://packetstormsecurity.org/1004-exploits/joomlaonlinemarket-lfi.txt -CVE-2010-1722 - http://www.exploit-db.com/exploits/12177 -CVE-2010-1723 - http://www.exploit-db.com/exploits/12289 -CVE-2010-1725 - http://packetstormsecurity.org/1004-exploits/alibabacloneplatinum-sql.txt -CVE-2010-1726 - http://packetstormsecurity.org/1004-exploits/ec21clone-sql.txt -CVE-2010-1727 - http://packetstormsecurity.org/1004-exploits/jobpost-sql.txt -CVE-2010-1734 - http://vigilance.fr/vulnerability/Windows-denials-of-service-of-win32k-sys-9607 -CVE-2010-1735 - http://vigilance.fr/vulnerability/Windows-denials-of-service-of-win32k-sys-9607 -CVE-2010-1736 - http://packetstormsecurity.org/1004-exploits/krmhaber-disclose.txt -CVE-2010-1737 - http://packetstormsecurity.org/1005-exploits/gallo-rfi.txt -CVE-2010-1737 - http://www.exploit-db.com/exploits/12488 -CVE-2010-1739 - http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt -CVE-2010-1740 - http://packetstormsecurity.org/1005-exploits/guppy-sql.txt -CVE-2010-1741 - http://packetstormsecurity.org/1005-exploits/billwerx-sql.txt -CVE-2010-1742 - http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt -CVE-2010-1743 - http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt -CVE-2010-1744 - http://packetstormsecurity.org/1004-exploits/b2bgoldscript-sql.txt -CVE-2010-1748 - http://cups.org/str.php?L3577 -CVE-2010-1748 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723 -CVE-2010-1818 - http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010 -CVE-2010-1851 - http://www.cnet.com/8301-31361_1-20004265-254.html -CVE-2010-1852 - http://www.cnet.com/8301-31361_1-20004265-254.html -CVE-2010-1855 - http://packetstormsecurity.org/1003-exploits/ppwb-sql.txt -CVE-2010-1856 - http://packetstormsecurity.org/1003-exploits/repairshop2-xss.txt -CVE-2010-1858 - http://packetstormsecurity.org/1003-exploits/joomlasmestorage-lfi.txt -CVE-2010-1870 - http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html -CVE-2010-1870 - http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html -CVE-2010-1870 - http://seclists.org/fulldisclosure/2020/Oct/23 -CVE-2010-1870 - http://securityreason.com/securityalert/8345 -CVE-2010-1870 - http://www.exploit-db.com/exploits/14360 -CVE-2010-1872 - http://packetstormsecurity.org/1004-exploits/flashcard-xss.txt -CVE-2010-1873 - http://packetstormsecurity.org/1004-exploits/joomlajvehicles-sql.txt -CVE-2010-1873 - http://www.exploit-db.com/exploits/12190 -CVE-2010-1876 - http://packetstormsecurity.org/1004-exploits/ajshoppingcart-sql.txt -CVE-2010-1877 - http://packetstormsecurity.org/1004-exploits/joomlajtmreseller-sql.txt -CVE-2010-1878 - http://packetstormsecurity.org/1004-exploits/joomlaorgchart-lfi.txt -CVE-2010-1878 - http://www.exploit-db.com/exploits/12317 -CVE-2010-1881 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 -CVE-2010-1886 - http://support.microsoft.com/kb/982316 -CVE-2010-1887 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 -CVE-2010-1891 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-069 -CVE-2010-1894 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 -CVE-2010-1895 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 -CVE-2010-1896 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 -CVE-2010-1897 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 -CVE-2010-1918 - http://packetstormsecurity.org/1005-exploits/MOPS-2010-018.pdf -CVE-2010-1919 - http://www.packetstormsecurity.org/1005-advisories/ESA-2010-007.txt -CVE-2010-1920 - http://packetstormsecurity.org/1005-exploits/openmairie-rfilfi.txt -CVE-2010-1920 - http://www.exploit-db.com/exploits/12486 -CVE-2010-1921 - http://packetstormsecurity.org/1005-exploits/openmairie-rfilfi.txt -CVE-2010-1921 - http://www.exploit-db.com/exploits/12486 -CVE-2010-1922 - http://packetstormsecurity.org/1005-exploits/29o3cms-rfi.txt -CVE-2010-1923 - http://packetstormsecurity.org/1005-exploits/web20snfcs-sql.txt -CVE-2010-1925 - http://packetstormsecurity.org/1005-exploits/teknoportal-sql.txt -CVE-2010-1926 - http://packetstormsecurity.org/1004-exploits/opencourrier-rfilfi.txt -CVE-2010-1926 - http://www.exploit-db.com/exploits/12398 -CVE-2010-1927 - http://packetstormsecurity.org/1004-exploits/opencourrier-rfilfi.txt -CVE-2010-1927 - http://www.exploit-db.com/exploits/12398 -CVE-2010-1928 - http://packetstormsecurity.org/1004-exploits/openplanning-rfilfi.txt -CVE-2010-1928 - http://www.exploit-db.com/exploits/12365 -CVE-2010-1929 - http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities -CVE-2010-1929 - http://www.exploit-db.com/exploits/14010 -CVE-2010-1930 - http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities -CVE-2010-1930 - http://www.exploit-db.com/exploits/14010 -CVE-2010-1931 - http://www.coresecurity.com/content/cubecart-php-shopping-cart-sql-injection -CVE-2010-1932 - http://www.coresecurity.com/content/XnView-MBM-Processing-Heap-Overflow -CVE-2010-1934 - http://packetstormsecurity.org/1004-exploits/openplanning-rfilfi.txt -CVE-2010-1934 - http://www.exploit-db.com/exploits/12365 -CVE-2010-1935 - http://packetstormsecurity.org/1004-exploits/openpresse-lfi.txt -CVE-2010-1935 - http://www.exploit-db.com/exploits/12364 -CVE-2010-1936 - http://packetstormsecurity.org/1004-exploits/opencominterne-lfi.txt -CVE-2010-1936 - http://www.exploit-db.com/exploits/12396 -CVE-2010-1938 - http://securityreason.com/achievement_securityalert/87 -CVE-2010-1938 - http://securityreason.com/securityalert/7450 -CVE-2010-1938 - http://site.pi3.com.pl/adv/libopie-adv.txt -CVE-2010-1938 - http://www.exploit-db.com/exploits/12762 -CVE-2010-1939 - http://h07.w.interia.pl/Safari.rar -CVE-2010-1944 - http://packetstormsecurity.org/1005-exploits/opencimetiere-rfi.txt -CVE-2010-1944 - http://www.exploit-db.com/exploits/12476 -CVE-2010-1945 - http://packetstormsecurity.org/1004-exploits/openfoncier-rfilfi.txt -CVE-2010-1945 - http://www.exploit-db.com/exploits/12366 -CVE-2010-1946 - http://packetstormsecurity.org/1004-exploits/openregistrecil-rfilfi.txt -CVE-2010-1946 - http://www.exploit-db.com/exploits/12313 -CVE-2010-1947 - http://packetstormsecurity.org/1004-exploits/openregistrecil-rfilfi.txt -CVE-2010-1947 - http://www.exploit-db.com/exploits/12313 -CVE-2010-1948 - http://packetstormsecurity.org/1004-exploits/openfoncier-rfilfi.txt -CVE-2010-1948 - http://www.exploit-db.com/exploits/12366 -CVE-2010-1949 - http://www.exploit-db.com/exploits/12305 -CVE-2010-1951 - http://www.exploit-db.com/exploits/12249 -CVE-2010-1952 - http://packetstormsecurity.org/1004-exploits/joomlabeeheardlite-lfi.txt -CVE-2010-1952 - http://www.exploit-db.com/exploits/12239 -CVE-2010-1953 - http://www.exploit-db.com/exploits/12288 -CVE-2010-1954 - http://www.exploit-db.com/exploits/12287 -CVE-2010-1955 - http://packetstormsecurity.org/1004-exploits/joomladeluxeblog-lfi.txt -CVE-2010-1955 - http://www.exploit-db.com/exploits/12238 -CVE-2010-1956 - http://packetstormsecurity.org/1004-exploits/joomlagadgetfactory-lfi.txt -CVE-2010-1956 - http://www.exploit-db.com/exploits/12285 -CVE-2010-1957 - http://packetstormsecurity.org/1004-exploits/joomlalovefactory-lfi.txt -CVE-2010-1957 - http://www.exploit-db.com/exploits/12235 -CVE-2010-1958 - http://www.madirish.net/?article=461 -CVE-2010-1964 - http://securityreason.com/securityalert/8155 -CVE-2010-1977 - http://www.exploit-db.com/exploits/12083 -CVE-2010-1979 - http://www.exploit-db.com/exploits/12088 -CVE-2010-1980 - http://packetstormsecurity.org/1004-exploits/joomlaflickr-lfi.txt -CVE-2010-1980 - http://www.exploit-db.com/exploits/12085 -CVE-2010-1981 - http://packetstormsecurity.org/1004-exploits/joomlafabrik-lfi.txt -CVE-2010-1981 - http://www.exploit-db.com/exploits/12087 -CVE-2010-1982 - http://packetstormsecurity.org/1004-exploits/joomlajavoice-lfi.txt -CVE-2010-1983 - http://evilc0de.blogspot.com/2010/04/joomla-component-redtwitter-lfi-vuln.html -CVE-2010-1983 - http://packetstormsecurity.org/1004-exploits/joomlaredtwitter-lfi.txt -CVE-2010-1983 - http://www.exploit-db.com/exploits/12055 -CVE-2010-1997 - http://packetstormsecurity.org/1005-exploits/sauruscms-xss.txt -CVE-2010-1999 - http://packetstormsecurity.org/1005-exploits/opencatalogue-lfi.txt -CVE-2010-1999 - http://www.exploit-db.com/exploits/12475 -CVE-2010-2000 - http://drupal.org/node/797192 -CVE-2010-2003 - http://packetstormsecurity.org/1005-exploits/advancedpoll208-xss.txt -CVE-2010-2005 - http://www.packetstormsecurity.com/1001-exploits/datalifeengine83-rfi.txt -CVE-2010-2008 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-2009 - http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt -CVE-2010-2009 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php -CVE-2010-2012 - http://packetstormsecurity.org/1005-exploits/migascms-sql.txt -CVE-2010-2016 - http://packetstormsecurity.org/1005-exploits/iceberg-sql.txt -CVE-2010-2017 - http://packetstormsecurity.org/1005-exploits/lokomediacms-xss.txt -CVE-2010-2018 - http://packetstormsecurity.org/1005-exploits/lokomediacms-disclose.txt -CVE-2010-2021 - http://www.madirish.net/?article=460 -CVE-2010-2031 - http://www.exploit-db.com/exploits/12710 -CVE-2010-2032 - http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt -CVE-2010-2033 - http://packetstormsecurity.org/1005-exploits/joomlaperchact-lfi.txt -CVE-2010-2034 - http://packetstormsecurity.org/1005-exploits/joomlaperchaia-lfi.txt -CVE-2010-2035 - http://packetstormsecurity.org/1005-exploits/joomlaperchagl-lfi.txt -CVE-2010-2036 - http://packetstormsecurity.org/1005-exploits/joomlaperchafa-lfi.txt -CVE-2010-2037 - http://packetstormsecurity.org/1005-exploits/joomlaperchada-lfi.txt -CVE-2010-2038 - http://packetstormsecurity.org/1005-exploits/gpeasycms-xss.txt -CVE-2010-2039 - http://packetstormsecurity.org/1004-exploits/gpeasy-xsrf.txt -CVE-2010-2040 - http://www.packetstormsecurity.org/1005-exploits/shopzillaas-xss.txt -CVE-2010-2041 - http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt -CVE-2010-2042 - http://packetstormsecurity.org/1005-exploits/ecshopsearch-sql.txt -CVE-2010-2043 - http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html -CVE-2010-2043 - http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt -CVE-2010-2044 - http://packetstormsecurity.org/1005-exploits/joomlakonsultasi-sql.txt -CVE-2010-2045 - http://packetstormsecurity.org/1005-exploits/joomlafdione-lfi.txt -CVE-2010-2045 - http://www.exploit-db.com/exploits/12595 -CVE-2010-2046 - http://packetstormsecurity.org/1005-exploits/joomlaactivehelper-xss.txt -CVE-2010-2047 - http://www.exploit-db.com/exploits/12641 -CVE-2010-2050 - http://packetstormsecurity.org/1005-exploits/joomlamscomment-lfi.txt -CVE-2010-2051 - http://packetstormsecurity.org/1005-exploits/dbcart-sql.txt -CVE-2010-2055 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183 -CVE-2010-2055 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316 -CVE-2010-2062 - https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/ -CVE-2010-2063 - http://www.samba.org/samba/security/CVE-2010-2063.html -CVE-2010-2063 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859 -CVE-2010-2066 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2068 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2010-2068 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2010-2070 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2078 - http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html -CVE-2010-2078 - http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt -CVE-2010-2079 - http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html -CVE-2010-2079 - http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt -CVE-2010-2085 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf -CVE-2010-2086 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf -CVE-2010-2087 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf -CVE-2010-2088 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf -CVE-2010-2089 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2010-2089 - https://bugzilla.redhat.com/show_bug.cgi?id=598197 -CVE-2010-2102 - http://www.exploit-db.com/exploits/12740 -CVE-2010-2103 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-2103 - http://www.exploit-db.com/exploits/12689 -CVE-2010-2111 - http://cross-site-scripting.blogspot.com/2010/05/pacific-timesheet-674-cross-site.html -CVE-2010-2113 - http://cross-site-scripting.blogspot.com/2010/05/uniform-server-565-xsrf.html -CVE-2010-2114 - http://cross-site-scripting.blogspot.com/2010/05/brekeke-pbx-2448-cross-site-request.html -CVE-2010-2122 - http://packetstormsecurity.org/1005-exploits/joomlasimpledownload-lfi.txt -CVE-2010-2124 - http://packetstormsecurity.org/1005-exploits/conpresso407-sql.txt -CVE-2010-2126 - http://packetstormsecurity.org/1004-exploits/snipegallery-rfi.txt -CVE-2010-2127 - http://packetstormsecurity.org/1005-exploits/jv2foldergallery-rfi.txt -CVE-2010-2129 - http://packetstormsecurity.org/1005-exploits/joomlaajaxec-lfi.txt -CVE-2010-2130 - http://packetstormsecurity.org/1002-exploits/arisg5-xss.txt -CVE-2010-2132 - http://www.packetstormsecurity.com/1002-exploits/oes-rfi.txt -CVE-2010-2133 - http://packetstormsecurity.org/1003-exploits/mlf-sql.txt -CVE-2010-2134 - http://www.exploit-db.com/exploits/11584 -CVE-2010-2135 - http://packetstormsecurity.org/1002-exploits/hazelpresslite-sql.txt -CVE-2010-2135 - http://www.exploit-db.com/exploits/11602 -CVE-2010-2136 - http://www.packetstormsecurity.com/1002-exploits/articlefriendly-lfi.txt -CVE-2010-2137 - http://packetstormsecurity.org/1002-exploits/proman-rfilfi.txt -CVE-2010-2137 - http://www.exploit-db.com/exploits/11587 -CVE-2010-2138 - http://packetstormsecurity.org/1002-exploits/proman-rfilfi.txt -CVE-2010-2138 - http://www.exploit-db.com/exploits/11587 -CVE-2010-2141 - http://packetstormsecurity.org/1005-exploits/nitro-sql.txt -CVE-2010-2142 - http://packetstormsecurity.org/1005-exploits/cyberhost-sql.txt -CVE-2010-2143 - http://packetstormsecurity.org/1005-exploits/symphony-lfi.txt -CVE-2010-2143 - http://www.exploit-db.com/exploits/12809 -CVE-2010-2144 - http://packetstormsecurity.org/1005-exploits/zeeways-xss.txt -CVE-2010-2153 - http://cross-site-scripting.blogspot.com/2010/06/tcexam-101006-arbitrary-upload.html -CVE-2010-2153 - http://www.packetstormsecurity.org/1006-exploits/tcexam-shell.txt -CVE-2010-2160 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2161 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2162 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2163 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2164 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2165 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2166 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2167 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2169 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2170 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2171 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2172 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2173 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2174 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2175 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2176 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2177 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2178 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2179 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2180 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2181 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2182 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2183 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2184 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2185 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2186 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2187 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2188 - http://www.redhat.com/support/errata/RHSA-2010-0470.html -CVE-2010-2226 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2227 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2227 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-2235 - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz -CVE-2010-2240 - http://www.redhat.com/support/errata/RHSA-2010-0670.html -CVE-2010-2243 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e -CVE-2010-2248 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2252 - http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html -CVE-2010-2252 - http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00031.html -CVE-2010-2254 - http://packetstormsecurity.org/1001-exploits/joomlaboh-sql.txt -CVE-2010-2255 - http://packetstormsecurity.org/1001-exploits/joomlabfsurveypro-sql.txt -CVE-2010-2256 - http://packetstormsecurity.org/1001-exploits/ppmvcs-sqlxss.txt -CVE-2010-2257 - http://packetstormsecurity.org/1001-exploits/ppmvcs-sqlxss.txt -CVE-2010-2258 - http://packetstormsecurity.org/1001-exploits/phpbannerexchange-xss.txt -CVE-2010-2259 - http://packetstormsecurity.org/1001-exploits/joomlabfsurvey-lfi.txt -CVE-2010-2260 - http://packetstormsecurity.org/1001-exploits/bandwidthmeter-xss.txt -CVE-2010-2263 - http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html -CVE-2010-2263 - http://www.exploit-db.com/exploits/13822 -CVE-2010-2273 - http://bugs.dojotoolkit.org/ticket/10773 -CVE-2010-2273 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 -CVE-2010-2273 - http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/ -CVE-2010-2274 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 -CVE-2010-2275 - http://bugs.dojotoolkit.org/ticket/10773 -CVE-2010-2275 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 -CVE-2010-2275 - http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/ -CVE-2010-2276 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 -CVE-2010-2295 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -CVE-2010-2301 - https://bugs.webkit.org/show_bug.cgi?id=38922 -CVE-2010-2311 - http://www.exploit-db.com/exploits/13820 -CVE-2010-2313 - http://packetstormsecurity.org/1006-exploits/simm-lfi.txt -CVE-2010-2313 - http://www.exploit-db.com/exploits/12848/ -CVE-2010-2314 - http://packetstormsecurity.org/1005-exploits/nucleustwitter-rfi.txt -CVE-2010-2314 - http://www.exploit-db.com/exploits/12790/ -CVE-2010-2318 - http://packetstormsecurity.org/1001-exploits/phpcityportal-xss.txt -CVE-2010-2321 - http://www.exploit-db.com/exploits/13817 -CVE-2010-2321 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4941.php -CVE-2010-2324 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 -CVE-2010-2328 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 -CVE-2010-2329 - http://packetstormsecurity.org/1006-exploits/rosoft444-overflow.txt -CVE-2010-2330 - http://www.exploit-db.com/exploits/13876 -CVE-2010-2335 - http://www.exploit-db.com/exploits/13845 -CVE-2010-2336 - http://www.exploit-db.com/exploits/13845 -CVE-2010-2338 - http://packetstormsecurity.org/1006-exploits/vuwebvisitoranalyst-sql.txt -CVE-2010-2339 - http://packetstormsecurity.org/1006-advisories/major_rls73.txt -CVE-2010-2340 - http://packetstormsecurity.org/1006-exploits/arabportal22x-sql.txt -CVE-2010-2341 - http://packetstormsecurity.org/1006-exploits/ezpxphotoblog-rfi.txt -CVE-2010-2343 - http://www.exploit-db.com/exploits/13760 -CVE-2010-2343 - http://www.exploit-db.com/exploits/13763 -CVE-2010-2349 - http://www.exploit-db.com/exploits/13920 -CVE-2010-2351 - http://www.exploit-db.com/exploits/13906 -CVE-2010-2354 - http://packetstormsecurity.org/1006-exploits/elms-sql-xss.txt -CVE-2010-2356 - http://packetstormsecurity.org/1006-exploits/elms-sql-xss.txt -CVE-2010-2358 - http://packetstormsecurity.org/1006-exploits/nakid-rfi.txt -CVE-2010-2359 - http://packetstormsecurity.org/1006-exploits/ewebquizv8-sql.txt -CVE-2010-2370 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2371 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2372 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2373 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2374 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2375 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2376 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2377 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2378 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2379 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2380 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2381 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2382 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2383 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2384 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2385 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2386 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2388 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2389 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2390 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2391 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2392 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2393 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2394 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2395 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2396 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2397 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2398 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2399 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2400 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2401 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2402 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2403 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2404 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2405 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2406 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2407 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2408 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2409 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2410 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2411 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2412 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2413 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2414 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2415 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2416 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2417 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2418 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2419 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-2429 - http://www.splunk.com/view/SP-CAAAFHY -CVE-2010-2439 - http://www.exploit-db.com/exploits/13934 -CVE-2010-2440 - http://www.exploit-db.com/exploits/13965 -CVE-2010-2441 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -CVE-2010-2442 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -CVE-2010-2445 - http://packetstormsecurity.com/files/163311/Android-2.0-FreeCIV-Arbitrary-Code-Execution.html -CVE-2010-2456 - http://packetstormsecurity.org/1006-exploits/linkerimg-rfi.txt -CVE-2010-2458 - http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt -CVE-2010-2459 - http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt -CVE-2010-2461 - http://packetstormsecurity.org/1006-exploits/overstock-sql.txt -CVE-2010-2462 - http://packetstormsecurity.org/1006-exploits/orohyip-sql.txt -CVE-2010-2464 - http://packetstormsecurity.org/1006-exploits/joomlarscomments-xss.txt -CVE-2010-2465 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html -CVE-2010-2465 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -CVE-2010-2466 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html -CVE-2010-2466 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -CVE-2010-2467 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html -CVE-2010-2467 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -CVE-2010-2468 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html -CVE-2010-2468 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -CVE-2010-2469 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html -CVE-2010-2469 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -CVE-2010-2480 - http://bugs.python.org/issue9061 -CVE-2010-2480 - https://bugzilla.redhat.com/show_bug.cgi?id=609573 -CVE-2010-2490 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490 -CVE-2010-2492 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-2492 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-2502 - http://www.splunk.com/view/SP-CAAAFGD -CVE-2010-2503 - http://www.splunk.com/view/SP-CAAAFGD -CVE-2010-2504 - http://www.splunk.com/view/SP-CAAAFGD -CVE-2010-2505 - http://www.exploit-db.com/exploits/13888 -CVE-2010-2507 - http://packetstormsecurity.org/1006-exploits/joomlapicasa2gallery-lfi.txt -CVE-2010-2513 - http://packetstormsecurity.org/1006-exploits/joomlajeajax-sql.txt -CVE-2010-2514 - http://packetstormsecurity.org/1006-exploits/joomlajfaq-sqlxss.txt -CVE-2010-2515 - http://packetstormsecurity.org/1006-exploits/joomlajfaq-sqlxss.txt -CVE-2010-2521 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2524 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2525 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2646a1f61a3b5525914757f10fa12b5b94713648 -CVE-2010-2526 - http://www.ubuntu.com/usn/USN-1001-1 -CVE-2010-2535 - http://www.ocert.org/advisories/ocert-2010-002.html -CVE-2010-2535 - http://www.openwall.com/lists/oss-security/2010/07/20/2 -CVE-2010-2535 - http://www.openwall.com/lists/oss-security/2010/07/21/8 -CVE-2010-2537 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-2538 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-2549 - http://seclists.org/fulldisclosure/2010/Jul/3 -CVE-2010-2549 - http://www.exploit-db.com/exploits/14156 -CVE-2010-2556 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -CVE-2010-2557 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -CVE-2010-2558 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -CVE-2010-2559 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -CVE-2010-2560 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -CVE-2010-2561 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-051 -CVE-2010-2563 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-067 -CVE-2010-2568 - http://isc.sans.edu/diary.html?storyid=9181 -CVE-2010-2568 - http://isc.sans.edu/diary.html?storyid=9190 -CVE-2010-2586 - http://forums.winamp.com/showthread.php?t=324322 -CVE-2010-2609 - http://packetstormsecurity.org/1006-exploits/jobsearchengine-sql.txt -CVE-2010-2611 - http://packetstormsecurity.org/1006-exploits/inetsolutionjobsearch-sql.txt -CVE-2010-2613 - http://packetstormsecurity.org/1006-exploits/joomlaawdsong-xss.txt -CVE-2010-2616 - http://www.packetstormsecurity.com/1006-exploits/phpbiblesearch-sqlxss.txt -CVE-2010-2617 - http://www.packetstormsecurity.com/1006-exploits/phpbiblesearch-sqlxss.txt -CVE-2010-2618 - http://packetstormsecurity.org/1006-exploits/adaptcms200-rfi.txt -CVE-2010-2618 - http://www.exploit-db.com/exploits/14016 -CVE-2010-2621 - http://aluigi.org/adv/qtsslame-adv.txt -CVE-2010-2621 - http://aluigi.org/poc/qtsslame.zip -CVE-2010-2632 - http://securityreason.com/achievement_securityalert/89 -CVE-2010-2632 - http://securityreason.com/achievement_securityalert/97 -CVE-2010-2632 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-2669 - http://cross-site-scripting.blogspot.com/2010/07/orbis-102-reflected-xss.html -CVE-2010-2673 - http://packetstormsecurity.org/1003-exploits/devana-sql.txt -CVE-2010-2674 - http://packetstormsecurity.org/1003-exploits/tsokacms-sqlxss.txt -CVE-2010-2675 - http://packetstormsecurity.org/1003-exploits/tsokacms-sqlxss.txt -CVE-2010-2676 - http://packetstormsecurity.org/1003-exploits/owa123-lfirfi.txt -CVE-2010-2677 - http://packetstormsecurity.org/1003-exploits/owa123-lfirfi.txt -CVE-2010-2679 - http://packetstormsecurity.org/1003-exploits/joomlaweblinks-sql.txt -CVE-2010-2680 - http://packetstormsecurity.org/1006-exploits/joomlajesectionfinder-lfi.txt -CVE-2010-2682 - http://packetstormsecurity.org/1004-exploits/joomlarealtyna-lfi.txt -CVE-2010-2683 - http://packetstormsecurity.org/1006-exploits/pagedirector-sql.txt -CVE-2010-2683 - http://www.exploit-db.com/exploits/14112 -CVE-2010-2684 - http://packetstormsecurity.org/1006-exploits/pagedirector-sqladdadmin.txt -CVE-2010-2685 - http://packetstormsecurity.org/1006-exploits/pagedirector-sqladdadmin.txt -CVE-2010-2687 - http://packetstormsecurity.org/1006-exploits/boatclassifieds-sql.txt -CVE-2010-2688 - http://packetstormsecurity.org/1006-exploits/boatclassdetail-sql.txt -CVE-2010-2689 - http://packetstormsecurity.org/1006-exploits/webdm-sql.txt -CVE-2010-2690 - http://www.exploit-db.com/exploits/14126 -CVE-2010-2691 - http://www.packetstormsecurity.com/1006-exploits/2daybiztshirt-sql.txt -CVE-2010-2692 - http://www.packetstormsecurity.com/1006-exploits/2daybiztshirt-sql.txt -CVE-2010-2694 - http://www.exploit-db.com/exploits/14312 -CVE-2010-2702 - http://aluigi.altervista.org/adv/unrealcbof-adv.txt -CVE-2010-2709 - http://securityreason.com/securityalert/8150 -CVE-2010-2709 - http://www.coresecurity.com/content/hp-nnm-ovjavalocale-buffer-overflow -CVE-2010-2709 - http://www.exploit-db.com/exploits/14547 -CVE-2010-2716 - http://packetstormsecurity.org/1007-exploits/psnews-sql.txt -CVE-2010-2718 - http://packetstormsecurity.org/1007-exploits/cruxpa-xss.txt -CVE-2010-2721 - http://packetstormsecurity.org/1007-exploits/lyrics-sql.txt -CVE-2010-2743 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-073 -CVE-2010-2744 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-073 -CVE-2010-2751 - https://bugzilla.mozilla.org/show_bug.cgi?id=536466 -CVE-2010-2752 - https://bugzilla.mozilla.org/show_bug.cgi?id=574059 -CVE-2010-2753 - https://bugzilla.mozilla.org/show_bug.cgi?id=571106 -CVE-2010-2754 - https://bugzilla.mozilla.org/show_bug.cgi?id=568564 -CVE-2010-2760 - https://bugzilla.mozilla.org/show_bug.cgi?id=585815 -CVE-2010-2761 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-2761 - https://bugzilla.mozilla.org/show_bug.cgi?id=591165 -CVE-2010-2765 - https://bugzilla.mozilla.org/show_bug.cgi?id=576447 -CVE-2010-2766 - https://bugzilla.mozilla.org/show_bug.cgi?id=580445 -CVE-2010-2768 - https://bugzilla.mozilla.org/show_bug.cgi?id=579744 -CVE-2010-2769 - https://bugzilla.mozilla.org/show_bug.cgi?id=520189 -CVE-2010-2770 - https://bugzilla.mozilla.org/show_bug.cgi?id=583520 -CVE-2010-2772 - http://infoworld.com/d/security-central/new-weaponized-virus-targets-industrial-secrets-725 -CVE-2010-2772 - http://www.wired.com/threatlevel/2010/07/siemens-scada/ -CVE-2010-2791 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2010-2795 - https://issues.jasig.org/browse/PHPCAS-61 -CVE-2010-2796 - https://issues.jasig.org/browse/PHPCAS-67 -CVE-2010-2797 - http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html -CVE-2010-2798 - http://www.redhat.com/support/errata/RHSA-2010-0670.html -CVE-2010-2798 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-2800 - http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=95 -CVE-2010-2801 - http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118 -CVE-2010-2806 - https://bugzilla.redhat.com/show_bug.cgi?id=621980 -CVE-2010-2844 - http://cross-site-scripting.blogspot.com/2010/07/news-office-2018-reflected-xss.html -CVE-2010-2844 - http://packetstormsecurity.org/1007-exploits/newsoffice-xss.txt -CVE-2010-2845 - http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt -CVE-2010-2846 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt -CVE-2010-2847 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt -CVE-2010-2848 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt -CVE-2010-2849 - http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-reflected-xss.html -CVE-2010-2849 - http://packetstormsecurity.org/1007-exploits/nubuilder-xss.txt -CVE-2010-2850 - http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-local-file-inclusion.html -CVE-2010-2850 - http://packetstormsecurity.org/1007-exploits/nubuilder-lfi.txt -CVE-2010-2852 - http://cross-site-scripting.blogspot.com/2010/07/runcms-21-magpie-rss-module-reflected.html -CVE-2010-2853 - http://packetstormsecurity.org/1004-exploits/iscriptsvisualcaster-sql.txt -CVE-2010-2857 - http://packetstormsecurity.org/1007-exploits/joomlamusicmanager-lfi.txt -CVE-2010-2858 - http://packetstormsecurity.org/1007-exploits/simpnews-xss.txt -CVE-2010-2859 - http://packetstormsecurity.org/1007-exploits/simpnews-xss.txt -CVE-2010-2861 - http://securityreason.com/securityalert/8148 -CVE-2010-2861 - http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/ -CVE-2010-2863 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2864 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2865 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2866 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2867 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2868 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2869 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2870 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2871 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2872 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2873 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2874 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2875 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2876 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2877 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2878 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2879 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2880 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2881 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2882 - http://www.adobe.com/support/security/bulletins/apsb10-20.html -CVE-2010-2891 - http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow -CVE-2010-2891 - http://www.exploit-db.com/exploits/15293 -CVE-2010-2892 - http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability -CVE-2010-2892 - http://www.exploit-db.com/exploits/15488 -CVE-2010-2904 - http://packetstormsecurity.org/1007-advisories/DSECRG-09-068.txt -CVE-2010-2907 - http://packetstormsecurity.org/1004-exploits/joomlahuruhelpdesk-sql.txt -CVE-2010-2908 - http://packetstormsecurity.org/1007-exploits/joomlajoomdle-sql.txt -CVE-2010-2910 - http://packetstormsecurity.org/1007-exploits/joomlaoziogallery-sql.txt -CVE-2010-2911 - http://packetstormsecurity.org/1007-exploits/kayakoesupport37002-sql.txt -CVE-2010-2912 - http://packetstormsecurity.org/1007-exploits/kayakoesupport-sql.txt -CVE-2010-2915 - http://packetstormsecurity.org/0907-exploits/ajhypeprime-sql.txt -CVE-2010-2915 - http://www.exploit-db.com/exploits/14435 -CVE-2010-2916 - http://packetstormsecurity.org/1007-exploits/ajhyipmeridian-sql.txt -CVE-2010-2916 - http://www.exploit-db.com/exploits/14436 -CVE-2010-2917 - http://packetstormsecurity.org/1007-exploits/ajarticle-xss.txt -CVE-2010-2918 - http://packetstormsecurity.org/0804-exploits/joomlavisites-rfi.txt -CVE-2010-2919 - http://packetstormsecurity.org/1007-exploits/joomlastaticxt-sql.txt -CVE-2010-2920 - http://packetstormsecurity.org/1004-exploits/joomlafoobla-lfi.txt -CVE-2010-2920 - http://www.exploit-db.com/exploits/12120 -CVE-2010-2921 - http://packetstormsecurity.org/1007-exploits/joomlagolfcourseguide-sql.txt -CVE-2010-2922 - http://packetstormsecurity.org/1007-exploits/akyblog-sql.txt -CVE-2010-2923 - http://packetstormsecurity.org/1007-exploits/joomlayoutube-sql.txt -CVE-2010-2925 - http://packetstormsecurity.org/1007-exploits/freewaycms-sql.txt -CVE-2010-2928 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2928 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -CVE-2010-2932 - http://www.exploit-db.com/exploits/14504 -CVE-2010-2935 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-2936 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-2936 - https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6 -CVE-2010-2938 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-2939 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-2942 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-2943 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-2943 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-2950 - https://bugzilla.redhat.com/show_bug.cgi?id=598537 -CVE-2010-2962 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-2965 - http://www.kb.cert.org/vuls/id/MAPG-86EPFA -CVE-2010-2975 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2976 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2977 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2978 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2979 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2980 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2981 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2982 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2983 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2984 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2986 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2987 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-2988 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html -CVE-2010-3015 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3023 - http://packetstormsecurity.org/1008-exploits/diamondlist-xssxsrf.txt -CVE-2010-3024 - http://marc.info/?l=bugtraq&m=128104130309426&w=2 -CVE-2010-3024 - http://packetstormsecurity.org/1008-exploits/diamondlist-xssxsrf.txt -CVE-2010-3024 - http://www.exploit-db.com/exploits/14565 -CVE-2010-3025 - http://packetstormsecurity.org/1008-exploits/openblog-xssxsrf.txt -CVE-2010-3026 - http://packetstormsecurity.org/1008-exploits/openblog-xssxsrf.txt -CVE-2010-3026 - http://www.exploit-db.com/exploits/14562 -CVE-2010-3027 - http://packetstormsecurity.org/1008-exploits/tycoonrecord-sql.txt -CVE-2010-3039 - http://seclists.org/fulldisclosure/2010/Nov/40 -CVE-2010-3048 - http://www.fuzzmyapp.com/advisories/FMA-2010-002/FMA-2010-002-EN.xml -CVE-2010-3056 - http://yehg.net/lab/pr0js/advisories/phpmyadmin/%5Bphpmyadmin-3.3.5%5D_cross_site_scripting%28XSS%29 -CVE-2010-3066 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3067 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3067 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3069 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html -CVE-2010-3073 - https://bugzilla.redhat.com/show_bug.cgi?id=630460 -CVE-2010-3074 - https://bugzilla.redhat.com/show_bug.cgi?id=630460 -CVE-2010-3075 - https://bugzilla.redhat.com/show_bug.cgi?id=630460 -CVE-2010-3076 - http://packetstormsecurity.org/1009-exploits/smbind-sql.txt -CVE-2010-3077 - http://seclists.org/fulldisclosure/2010/Sep/82 -CVE-2010-3078 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3078 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3079 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3080 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3081 - http://sota.gen.nz/compat1/ -CVE-2010-3081 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3086 - http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread -CVE-2010-3086 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3107 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074 -CVE-2010-3113 - http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=628032 -CVE-2010-3125 - http://www.exploit-db.com/exploits/14747 -CVE-2010-3127 - http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html -CVE-2010-3130 - http://www.exploit-db.com/exploits/14764 -CVE-2010-3131 - https://bugzilla.mozilla.org/show_bug.cgi?id=579593 -CVE-2010-3138 - http://www.exploit-db.com/exploits/14765 -CVE-2010-3138 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php -CVE-2010-3138 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014 -CVE-2010-3139 - http://www.exploit-db.com/exploits/14758 -CVE-2010-3144 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-097 -CVE-2010-3145 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-001 -CVE-2010-3146 - http://www.exploit-db.com/exploits/14746/ -CVE-2010-3146 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-016 -CVE-2010-3147 - http://www.exploit-db.com/exploits/14745/ -CVE-2010-3147 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-096 -CVE-2010-3148 - http://www.exploit-db.com/exploits/14744/ -CVE-2010-3148 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-055 -CVE-2010-3166 - https://bugzilla.mozilla.org/show_bug.cgi?id=579655 -CVE-2010-3167 - https://bugzilla.mozilla.org/show_bug.cgi?id=576070 -CVE-2010-3168 - https://bugzilla.mozilla.org/show_bug.cgi?id=576075 -CVE-2010-3173 - https://bugzilla.mozilla.org/show_bug.cgi?id=587234 -CVE-2010-3178 - https://bugzilla.mozilla.org/show_bug.cgi?id=576616 -CVE-2010-3187 - http://seclists.org/fulldisclosure/2010/Jul/317 -CVE-2010-3187 - http://seclists.org/fulldisclosure/2010/Jul/324 -CVE-2010-3187 - http://seclists.org/fulldisclosure/2010/Jul/337 -CVE-2010-3201 - https://www.exploit-db.com/exploits/34797/ -CVE-2010-3202 - http://flock.com/security/ -CVE-2010-3204 - http://packetstormsecurity.org/1008-exploits/peciocms-rfi.txt -CVE-2010-3205 - http://packetstormsecurity.org/1008-exploits/textpattern-rfi.txt -CVE-2010-3206 - http://packetstormsecurity.org/1008-exploits/diycms-rfi.txt -CVE-2010-3207 - http://packetstormsecurity.org/1008-exploits/galeriashqip-sql.txt -CVE-2010-3208 - http://www.packetstormsecurity.com/1008-exploits/wiccle-xss.txt -CVE-2010-3209 - http://packetstormsecurity.org/1008-exploits/seagull-rfi.txt -CVE-2010-3210 - http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt -CVE-2010-3212 - http://packetstormsecurity.org/1008-exploits/seagull-sql.txt -CVE-2010-3212 - http://www.exploit-db.com/exploits/14838 -CVE-2010-3213 - http://sites.google.com/site/tentacoloviola/pwning-corporate-webmails -CVE-2010-3213 - http://www.exploit-db.com/exploits/14285 -CVE-2010-3222 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-084 -CVE-2010-3227 - http://www.exploit-db.com/exploits/13921/ -CVE-2010-3243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072 -CVE-2010-3262 - http://flock.com/security/ -CVE-2010-3266 - http://www.coresecurity.com/content/multiple-vulnerabilities-in-bugtracker -CVE-2010-3266 - http://www.exploit-db.com/exploits/15653 -CVE-2010-3267 - http://www.coresecurity.com/content/multiple-vulnerabilities-in-bugtracker -CVE-2010-3267 - http://www.exploit-db.com/exploits/15653 -CVE-2010-3268 - http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos -CVE-2010-3269 - http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities -CVE-2010-3270 - http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities -CVE-2010-3271 - http://securityreason.com/securityalert/8281 -CVE-2010-3271 - http://www.coresecurity.com/content/IBM-WebSphere-CSRF -CVE-2010-3271 - http://www.exploit-db.com/exploits/17404 -CVE-2010-3272 - http://securityreason.com/securityalert/8089 -CVE-2010-3272 - http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities -CVE-2010-3273 - http://securityreason.com/securityalert/8089 -CVE-2010-3273 - http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities -CVE-2010-3274 - http://securityreason.com/securityalert/8089 -CVE-2010-3274 - http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities -CVE-2010-3275 - http://securityreason.com/securityalert/8162 -CVE-2010-3275 - http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files -CVE-2010-3276 - http://securityreason.com/securityalert/8162 -CVE-2010-3276 - http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files -CVE-2010-3296 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3296 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3297 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3298 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3298 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3301 - http://sota.gen.nz/compat2/ -CVE-2010-3301 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3305 - https://www.exploit-db.com/exploits/15014 -CVE-2010-3305 - https://www.openwall.com/lists/oss-security/2010/09/17/7 -CVE-2010-3313 - http://www.exploit-db.com/exploits/11777/ -CVE-2010-3314 - http://www.exploit-db.com/exploits/11777/ -CVE-2010-3315 - http://www.ubuntu.com/usn/USN-1053-1 -CVE-2010-3322 - http://www.splunk.com/view/SP-CAAAFQ6 -CVE-2010-3323 - http://www.splunk.com/view/SP-CAAAFQ6 -CVE-2010-3324 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3324 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072 -CVE-2010-3325 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3326 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3327 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3328 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3329 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3330 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3331 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -CVE-2010-3332 - http://threatpost.com/en_us/blogs/new-crypto-attack-affects-millions-aspnet-apps-091310 -CVE-2010-3338 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-092 -CVE-2010-3340 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3342 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3343 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3345 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3346 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3348 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3405 - http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc -CVE-2010-3406 - http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc -CVE-2010-3407 - http://www.exploit-db.com/exploits/15005 -CVE-2010-3419 - http://packetstormsecurity.org/1009-exploits/fcms-rfi.txt -CVE-2010-3425 - http://cloudscan.blogspot.com/2010/09/vendorsmarterstats-bug-cross-site.html -CVE-2010-3426 - http://packetstormsecurity.org/1009-exploits/joomlajphone-lfi.txt -CVE-2010-3429 - http://www.ocert.org/advisories/ocert-2010-004.html -CVE-2010-3429 - http://www.openwall.com/lists/oss-security/2010/09/28/4 -CVE-2010-3432 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3432 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3439 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3439 -CVE-2010-3442 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3442 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3444 - https://bugzilla.redhat.com/show_bug.cgi?id=565997 -CVE-2010-3450 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-3451 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-3452 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-3453 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-3454 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-3455 - http://packetstormsecurity.org/1009-exploits/achecker-xss.txt -CVE-2010-3456 - http://packetstormsecurity.org/1009-exploits/essimpledownload-lfi.txt -CVE-2010-3457 - http://packetstormsecurity.org/1009-exploits/symphony-sqlxss.txt -CVE-2010-3458 - http://packetstormsecurity.org/1009-exploits/symphony-sqlxss.txt -CVE-2010-3460 - http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt -CVE-2010-3462 - http://packetstormsecurity.org/1009-exploits/mollify16-xss.txt -CVE-2010-3463 - http://packetstormsecurity.org/1009-exploits/santafox-xssxsrf.txt -CVE-2010-3464 - http://packetstormsecurity.org/1009-exploits/santafox-xssxsrf.txt -CVE-2010-3467 - http://packetstormsecurity.org/1009-exploits/exoopport-sql.txt -CVE-2010-3468 - http://www.exploit-db.com/exploits/15120 -CVE-2010-3477 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3477 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3479 - http://packetstormsecurity.org/1009-exploits/boutikone-sql.txt -CVE-2010-3480 - http://www.exploit-db.com/exploits/15011 -CVE-2010-3481 - http://www.exploit-db.com/exploits/15011 -CVE-2010-3482 - http://packetstormsecurity.org/1009-exploits/primitive-sqlxss.txt -CVE-2010-3482 - http://www.exploit-db.com/exploits/15064 -CVE-2010-3483 - http://packetstormsecurity.org/1009-exploits/primitive-sqlxss.txt -CVE-2010-3483 - http://www.exploit-db.com/exploits/15064 -CVE-2010-3484 - http://packetstormsecurity.org/1009-exploits/lightneasy-sql.txt -CVE-2010-3484 - http://www.exploit-db.com/exploits/15060 -CVE-2010-3486 - http://cloudscan.blogspot.com/2010/09/smarter-stats-533819-file-fuzzing.html -CVE-2010-3486 - http://packetstormsecurity.org/1009-exploits/smartermail-traversal.txt -CVE-2010-3487 - http://packetstormsecurity.org/1009-exploits/pinky10-traversal.txt -CVE-2010-3488 - http://packetstormsecurity.org/1009-exploits/quickshare10-traversal.txt -CVE-2010-3489 - http://packetstormsecurity.org/1009-exploits/ZSL-2010-4964.txt -CVE-2010-3489 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4964.php -CVE-2010-3493 - https://bugzilla.redhat.com/show_bug.cgi?id=632200 -CVE-2010-3494 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY -CVE-2010-3496 - http://www.n00bz.net/antivirus-cve -CVE-2010-3497 - http://www.n00bz.net/antivirus-cve -CVE-2010-3498 - http://www.n00bz.net/antivirus-cve -CVE-2010-3499 - http://www.n00bz.net/antivirus-cve -CVE-2010-3500 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3501 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3502 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3503 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3504 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3505 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3506 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3507 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3508 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3509 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3510 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3511 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3512 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3513 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3514 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3515 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3516 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3517 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3518 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3519 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3520 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3521 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3522 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3523 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3524 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3525 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3526 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3527 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3528 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3529 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3530 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3531 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3532 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3533 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3534 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3535 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3536 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3537 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3538 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3539 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3540 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3541 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3541 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3541 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3541 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3541 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3542 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3544 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3545 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3546 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3547 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3548 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3548 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3548 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3548 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3548 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3549 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3549 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3549 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3549 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3549 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3550 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3550 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3550 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3551 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3551 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3551 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3551 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3551 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3552 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3553 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3553 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3553 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3553 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3553 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3554 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3554 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3554 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3554 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3555 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3555 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3555 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3556 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3556 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3556 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3556 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3557 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3557 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3557 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3557 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3557 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3558 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3558 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3559 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3559 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3559 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3560 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3560 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3561 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3561 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3561 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3561 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3562 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3562 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3562 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3562 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3562 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3563 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3563 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3564 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3564 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3565 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3565 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3565 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3565 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3565 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3566 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3566 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3566 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3566 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3567 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3567 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3567 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3567 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3568 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3568 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3568 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3568 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3568 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3569 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3569 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3569 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3569 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3569 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3570 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3571 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3571 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3571 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3571 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3572 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3572 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3572 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3572 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3573 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3573 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3573 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3573 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3573 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3574 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3574 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -CVE-2010-3574 - http://www.redhat.com/support/errata/RHSA-2010-0865.html -CVE-2010-3574 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-3574 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3575 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3576 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3577 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3578 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3579 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3580 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3581 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3582 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3583 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3584 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3585 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -CVE-2010-3586 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3587 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3588 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3589 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3590 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3591 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3592 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3593 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3594 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3595 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3596 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3597 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3598 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3599 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3600 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-3601 - http://packetstormsecurity.org/1009-exploits/ibphotohost-sql.txt -CVE-2010-3602 - http://packetstormsecurity.org/1009-advisories/moaub16-mojoportal.pdf -CVE-2010-3602 - http://packetstormsecurity.org/1009-exploits/moaub-mojoportal.txt -CVE-2010-3603 - http://packetstormsecurity.org/1009-advisories/moaub16-mojoportal.pdf -CVE-2010-3603 - http://packetstormsecurity.org/1009-exploits/moaub-mojoportal.txt -CVE-2010-3608 - http://packetstormsecurity.org/1009-exploits/wpquiz27-sql.txt -CVE-2010-3654 - http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html -CVE-2010-3658 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7225 -CVE-2010-3659 - https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/ -CVE-2010-3660 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3660 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS -CVE-2010-3661 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3661 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Open_Redirection -CVE-2010-3662 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3662 - https://typo3.org/security/advisory/typo3-sa-2010-012/#SQL_Injection -CVE-2010-3663 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3663 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Arbitrary_Code_Execution -CVE-2010-3664 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3664 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Information_Disclosure -CVE-2010-3665 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3665 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS -CVE-2010-3666 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3666 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness -CVE-2010-3667 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3667 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Spam_Abuse -CVE-2010-3668 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3668 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Header_Injection -CVE-2010-3669 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3669 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS -CVE-2010-3670 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3670 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness -CVE-2010-3671 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3671 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Broken_Authentication_and_Session_Management -CVE-2010-3672 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3672 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS -CVE-2010-3673 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3673 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Information_Disclosure -CVE-2010-3674 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -CVE-2010-3674 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS -CVE-2010-3676 - https://bugzilla.redhat.com/show_bug.cgi?id=628660 -CVE-2010-3677 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3677 - https://bugzilla.redhat.com/show_bug.cgi?id=628040 -CVE-2010-3678 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3679 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3680 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3681 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3682 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3682 - https://bugzilla.redhat.com/show_bug.cgi?id=628328 -CVE-2010-3683 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3689 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-3690 - https://issues.jasig.org/browse/PHPCAS-80 -CVE-2010-3691 - https://issues.jasig.org/browse/PHPCAS-80 -CVE-2010-3692 - https://issues.jasig.org/browse/PHPCAS-80 -CVE-2010-3695 - http://securityreason.com/securityalert/8170 -CVE-2010-3699 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3699 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3709 - http://securityreason.com/achievement_securityalert/90 -CVE-2010-3709 - http://www.exploit-db.com/exploits/15431 -CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/13/8 -CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/14/22 -CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/18/3 -CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/18/5 -CVE-2010-3712 - http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS) -CVE-2010-3742 - http://packetstormsecurity.org/1008-exploits/freesimplesoftware-rfi.txt -CVE-2010-3747 - http://securityreason.com/securityalert/8147 -CVE-2010-3765 - http://www.exploit-db.com/exploits/15342 -CVE-2010-3765 - http://www.ubuntu.com/usn/USN-1011-2 -CVE-2010-3765 - https://bugzilla.mozilla.org/show_bug.cgi?id=607222 -CVE-2010-3765 - https://bugzilla.mozilla.org/show_bug.cgi?id=607222#c53 -CVE-2010-3766 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3766 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3766 - https://bugzilla.mozilla.org/show_bug.cgi?id=590771 -CVE-2010-3767 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3767 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3767 - https://bugzilla.mozilla.org/show_bug.cgi?id=599468 -CVE-2010-3768 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3768 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3769 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3770 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3770 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3771 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3771 - http://www.mozilla.org/security/announce/2010/mfsa2010-76.html -CVE-2010-3771 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3772 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3772 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3772 - https://bugzilla.mozilla.org/show_bug.cgi?id=594547 -CVE-2010-3773 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3773 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3774 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3774 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3774 - https://bugzilla.mozilla.org/show_bug.cgi?id=602780 -CVE-2010-3775 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3775 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3776 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3776 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3777 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3777 - http://www.redhat.com/support/errata/RHSA-2010-0966.html -CVE-2010-3778 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -CVE-2010-3787 - http://www.kb.cert.org/vuls/id/309873 -CVE-2010-3833 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3834 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3835 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3836 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3837 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3838 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3839 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3840 - http://www.ubuntu.com/usn/USN-1017-1 -CVE-2010-3847 - https://www.exploit-db.com/exploits/44024/ -CVE-2010-3847 - https://www.exploit-db.com/exploits/44025/ -CVE-2010-3856 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2010-3856 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html -CVE-2010-3856 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2010-3856 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2010-3856 - https://www.exploit-db.com/exploits/44025/ -CVE-2010-3858 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3858 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3858 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3859 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3859 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3861 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3861 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-3864 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html -CVE-2010-3865 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3865 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3865 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3874 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3876 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3876 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3876 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3877 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3879 - http://www.halfdog.net/Security/FuseTimerace/ -CVE-2010-3879 - https://bugs.launchpad.net/bugs/670622 -CVE-2010-3879 - https://bugzilla.redhat.com/show_bug.cgi?id=651183 -CVE-2010-3880 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-3880 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-3880 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3888 - http://www.securelist.com/en/blog/2291/Myrtus_and_Guava_Episode_MS10_061 -CVE-2010-3888 - http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities -CVE-2010-3889 - http://www.securelist.com/en/blog/2291/Myrtus_and_Guava_Episode_MS10_061 -CVE-2010-3889 - http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities -CVE-2010-3904 - http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html -CVE-2010-3904 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-3904 - https://www.exploit-db.com/exploits/44677/ -CVE-2010-3906 - http://www.exploit-db.com/exploits/15744 -CVE-2010-3908 - http://ffmpeg.mplayerhq.hu/ -CVE-2010-3909 - http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt -CVE-2010-3910 - http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt -CVE-2010-3911 - http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt -CVE-2010-3915 - http://www.symantec.com/connect/blogs/new-ichitaro-vulnerability-confirmed -CVE-2010-3934 - http://packetstormsecurity.org/1009-exploits/blackberry-crossorigin.txt -CVE-2010-3962 - http://www.exploit-db.com/exploits/15421 -CVE-2010-3962 - http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks -CVE-2010-3962 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -CVE-2010-3970 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2010-3970 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006 -CVE-2010-3971 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2010-3972 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2010-3972 - http://www.exploit-db.com/exploits/15803 -CVE-2010-3973 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2010-3973 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 -CVE-2010-3974 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-024 -CVE-2010-3976 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29 -CVE-2010-3979 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-3980 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-3981 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-3982 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-3983 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -CVE-2010-4006 - http://www.exploit-db.com/exploits/15607 -CVE-2010-4020 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt -CVE-2010-4020 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2010-4020 - http://www.redhat.com/support/errata/RHSA-2010-0925.html -CVE-2010-4021 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt -CVE-2010-4051 - http://seclists.org/fulldisclosure/2011/Jan/78 -CVE-2010-4051 - http://securityreason.com/achievement_securityalert/93 -CVE-2010-4051 - http://securityreason.com/securityalert/8003 -CVE-2010-4051 - http://www.exploit-db.com/exploits/15935 -CVE-2010-4052 - http://seclists.org/fulldisclosure/2011/Jan/78 -CVE-2010-4052 - http://securityreason.com/achievement_securityalert/93 -CVE-2010-4052 - http://securityreason.com/securityalert/8003 -CVE-2010-4052 - http://www.exploit-db.com/exploits/15935 -CVE-2010-4055 - http://aluigi.altervista.org/adv/soliddb_1-adv.txt -CVE-2010-4055 - http://www.exploit-db.com/exploits/15261 -CVE-2010-4056 - http://aluigi.altervista.org/adv/soliddb_1-adv.txt -CVE-2010-4056 - http://www.exploit-db.com/exploits/15261 -CVE-2010-4057 - http://aluigi.altervista.org/adv/soliddb_1-adv.txt -CVE-2010-4057 - http://www.exploit-db.com/exploits/15261 -CVE-2010-4072 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4072 - http://www.ubuntu.com/usn/USN-1041-1 -CVE-2010-4072 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4073 - http://securityreason.com/securityalert/8366 -CVE-2010-4073 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4073 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4074 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4075 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4075 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4076 - https://bugzilla.redhat.com/show_bug.cgi?id=648661 -CVE-2010-4077 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4079 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4080 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4080 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4081 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4081 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4082 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4083 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-4083 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4083 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4093 - http://www.kb.cert.org/vuls/id/189929 -CVE-2010-4099 - http://www.exploit-db.com/exploits/15318 -CVE-2010-4107 - http://securityreason.com/securityalert/8328 -CVE-2010-4107 - http://www.exploit-db.com/exploits/15631 -CVE-2010-4142 - http://aluigi.org/adv/realwin_1-adv.txt -CVE-2010-4142 - http://www.exploit-db.com/exploits/15259 -CVE-2010-4144 - http://packetstormsecurity.org/1010-exploits/kisiselradyoscript-disclose.txt -CVE-2010-4145 - http://packetstormsecurity.org/1010-exploits/kisiselradyoscript-disclose.txt -CVE-2010-4148 - http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt -CVE-2010-4149 - http://packetstormsecurity.org/1010-exploits/freshftp-traversal.txt -CVE-2010-4151 - http://packetstormsecurity.org/1010-exploits/deluxebb13x-sql.txt -CVE-2010-4154 - http://packetstormsecurity.org/1010-exploits/ftpvoyager-traversal.txt -CVE-2010-4155 - http://www.packetstormsecurity.com/1010-exploits/exv2-xss.txt -CVE-2010-4155 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4970.php -CVE-2010-4157 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-4157 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4158 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4158 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4160 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4161 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-4161 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4162 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4163 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4165 - http://securityreason.com/securityalert/8111 -CVE-2010-4167 - http://www.imagemagick.org/script/changelog.php -CVE-2010-4167 - http://www.ubuntu.com/usn/USN-1028-1 -CVE-2010-4170 - http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html -CVE-2010-4170 - https://www.exploit-db.com/exploits/46730/ -CVE-2010-4185 - http://www.exploit-db.com/exploits/15327 -CVE-2010-4193 - http://www.kb.cert.org/vuls/id/189929 -CVE-2010-4194 - http://www.kb.cert.org/vuls/id/189929 -CVE-2010-4195 - http://www.kb.cert.org/vuls/id/189929 -CVE-2010-4196 - http://www.kb.cert.org/vuls/id/189929 -CVE-2010-4210 - https://www.exploit-db.com/exploits/15206/ -CVE-2010-4228 - http://securityreason.com/securityalert/8149 -CVE-2010-4230 - http://www.exploit-db.com/exploits/15504 -CVE-2010-4230 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt -CVE-2010-4231 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt -CVE-2010-4232 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt -CVE-2010-4233 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt -CVE-2010-4234 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt -CVE-2010-4238 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4239 - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-lfi.txt -CVE-2010-4240 - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-xss.txt -CVE-2010-4241 - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-xsrf.txt -CVE-2010-4242 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-4242 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4242 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4243 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4247 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-4247 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4248 - http://www.redhat.com/support/errata/RHSA-2011-0004.html -CVE-2010-4248 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4248 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4249 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4249 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4251 - http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread -CVE-2010-4251 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4252 - https://bugzilla.redhat.com/show_bug.cgi?id=659297 -CVE-2010-4253 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4254 - http://www.exploit-db.com/exploits/15974 -CVE-2010-4255 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4257 - http://www.xakep.ru/magazine/xa/124/052/1.asp -CVE-2010-4258 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177 -CVE-2010-4258 - https://lkml.org/lkml/2010/12/1/543 -CVE-2010-4259 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html -CVE-2010-4259 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html -CVE-2010-4259 - http://openwall.com/lists/oss-security/2010/12/02/5 -CVE-2010-4259 - http://openwall.com/lists/oss-security/2010/12/02/8 -CVE-2010-4259 - http://www.exploit-db.com/exploits/15732 -CVE-2010-4259 - https://bugzilla.redhat.com/show_bug.cgi?id=659359 -CVE-2010-4262 - http://www.openwall.com/lists/oss-security/2010/12/03/2 -CVE-2010-4262 - http://www.openwall.com/lists/oss-security/2010/12/06/8 -CVE-2010-4262 - https://bugzilla.redhat.com/show_bug.cgi?id=659676 -CVE-2010-4263 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4263 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4268 - http://packetstormsecurity.org/1011-exploits/joomlaflipwall-sql.txt -CVE-2010-4269 - http://packetstormsecurity.org/1011-exploits/collabtive065-sql.txt -CVE-2010-4269 - http://www.exploit-db.com/exploits/15381 -CVE-2010-4272 - http://packetstormsecurity.org/1011-exploits/joomlasponsorwall-sql.txt -CVE-2010-4273 - http://packetstormsecurity.org/1010-exploits/accimoveis-sql.txt -CVE-2010-4278 - http://seclists.org/fulldisclosure/2010/Nov/326 -CVE-2010-4278 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download -CVE-2010-4278 - http://www.exploit-db.com/exploits/15640 -CVE-2010-4279 - http://packetstormsecurity.com/files/129830/Pandora-3.1-Auth-Bypass-Arbitrary-File-Upload.html -CVE-2010-4279 - http://seclists.org/fulldisclosure/2010/Nov/326 -CVE-2010-4279 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download -CVE-2010-4279 - http://www.exploit-db.com/exploits/15639 -CVE-2010-4279 - https://www.exploit-db.com/exploits/35731/ -CVE-2010-4280 - http://seclists.org/fulldisclosure/2010/Nov/326 -CVE-2010-4280 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download -CVE-2010-4280 - http://www.exploit-db.com/exploits/15641 -CVE-2010-4280 - http://www.exploit-db.com/exploits/15642 -CVE-2010-4281 - http://seclists.org/fulldisclosure/2010/Nov/326 -CVE-2010-4281 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download -CVE-2010-4281 - http://www.exploit-db.com/exploits/15643 -CVE-2010-4282 - http://seclists.org/fulldisclosure/2010/Nov/326 -CVE-2010-4282 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download -CVE-2010-4282 - http://www.exploit-db.com/exploits/15643 -CVE-2010-4283 - http://seclists.org/fulldisclosure/2010/Nov/326 -CVE-2010-4283 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download -CVE-2010-4283 - http://www.exploit-db.com/exploits/15643 -CVE-2010-4300 - http://www.exploit-db.com/exploits/15676 -CVE-2010-4301 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14713 -CVE-2010-4313 - http://www.exploit-db.com/exploits/15636 -CVE-2010-4323 - http://securityreason.com/securityalert/8092 -CVE-2010-4323 - http://securityreason.com/securityalert/8094 -CVE-2010-4328 - http://securityreason.com/securityalert/8096 -CVE-2010-4330 - http://www.exploit-db.com/exploits/15691 -CVE-2010-4331 - http://www.exploit-db.com/exploits/16000 -CVE-2010-4332 - http://www.exploit-db.com/exploits/15740 -CVE-2010-4333 - http://www.exploit-db.com/exploits/15741 -CVE-2010-4333 - http://www.securityfocus.com/archive/1/515306/100/0/threaded -CVE-2010-4335 - http://securityreason.com/securityalert/8026 -CVE-2010-4335 - http://www.exploit-db.com/exploits/16011 -CVE-2010-4343 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4344 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2010-4344 - http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ -CVE-2010-4345 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2010-4345 - http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ -CVE-2010-4346 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4346 - https://bugzilla.redhat.com/show_bug.cgi?id=662189 -CVE-2010-4348 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php -CVE-2010-4348 - https://bugzilla.redhat.com/show_bug.cgi?id=663230 -CVE-2010-4349 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php -CVE-2010-4349 - https://bugzilla.redhat.com/show_bug.cgi?id=663230 -CVE-2010-4350 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php -CVE-2010-4350 - https://bugzilla.redhat.com/show_bug.cgi?id=663230 -CVE-2010-4352 - https://bugs.freedesktop.org/show_bug.cgi?id=32321 -CVE-2010-4358 - http://evuln.com/vulns/144/summary.html -CVE-2010-4363 - http://evuln.com/vulns/146/summary.html -CVE-2010-4370 - http://forums.winamp.com/showthread.php?t=324322 -CVE-2010-4371 - http://forums.winamp.com/showthread.php?t=324322 -CVE-2010-4372 - http://forums.winamp.com/showthread.php?t=324322 -CVE-2010-4373 - http://forums.winamp.com/showthread.php?t=324322 -CVE-2010-4374 - http://forums.winamp.com/showthread.php?t=324322 -CVE-2010-4398 - http://isc.sans.edu/diary.html?storyid=9988 -CVE-2010-4398 - http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/ -CVE-2010-4398 - http://www.exploit-db.com/exploits/15609/ -CVE-2010-4399 - http://www.exploit-db.com/exploits/15646 -CVE-2010-4400 - http://www.exploit-db.com/exploits/15646 -CVE-2010-4401 - http://www.exploit-db.com/exploits/15646 -CVE-2010-4406 - http://www.exploit-db.com/exploits/15656 -CVE-2010-4407 - http://evuln.com/vulns/151/summary.html -CVE-2010-4409 - http://www.exploit-db.com/exploits/15722 -CVE-2010-4411 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-4411 - https://bugzilla.mozilla.org/show_bug.cgi?id=591165 -CVE-2010-4413 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4414 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4415 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4416 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4417 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4417 - https://www.exploit-db.com/exploits/38859/ -CVE-2010-4418 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4419 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4420 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4421 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4422 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4422 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4423 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4424 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4425 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4426 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4427 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4428 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4429 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4430 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4431 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4432 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4433 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4434 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4435 - http://securityreason.com/securityalert/8069 -CVE-2010-4435 - http://www.exploit-db.com/exploits/16137 -CVE-2010-4435 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4436 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4437 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4438 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4439 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4440 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4441 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4442 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4443 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4444 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4445 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4446 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4447 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4447 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4448 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4448 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4448 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4449 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4450 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4450 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4451 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4452 - http://securityreason.com/securityalert/8145 -CVE-2010-4452 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4452 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4452 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4453 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4454 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4454 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4454 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4455 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4456 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4457 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4458 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4459 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4460 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4461 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4462 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4462 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4462 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4463 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4463 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4464 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -CVE-2010-4465 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4465 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4465 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4465 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14034 -CVE-2010-4466 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4466 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4467 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4467 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4468 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4468 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4468 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4469 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4470 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4470 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4471 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4471 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4471 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4472 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4472 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4473 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4473 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4473 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4474 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4475 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4475 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4476 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4476 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -CVE-2010-4476 - http://www.redhat.com/support/errata/RHSA-2011-0880.html -CVE-2010-4478 - https://bugzilla.redhat.com/show_bug.cgi?id=659297 -CVE-2010-4480 - http://www.exploit-db.com/exploits/15699 -CVE-2010-4508 - https://wiki.mozilla.org/Platform/2010-12-07 -CVE-2010-4512 - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz -CVE-2010-4513 - http://marc.info/?l=bugtraq&m=129182251500541&w=2 -CVE-2010-4523 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 -CVE-2010-4523 - http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html -CVE-2010-4524 - http://openwall.com/lists/oss-security/2010/12/21/4 -CVE-2010-4524 - http://openwall.com/lists/oss-security/2010/12/22/4 -CVE-2010-4524 - https://bugzilla.redhat.com/show_bug.cgi?id=664718 -CVE-2010-4525 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4526 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4538 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539 -CVE-2010-4539 - http://www.ubuntu.com/usn/USN-1053-1 -CVE-2010-4539 - https://bugzilla.redhat.com/show_bug.cgi?id=667407 -CVE-2010-4540 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 -CVE-2010-4540 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 -CVE-2010-4541 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 -CVE-2010-4541 - http://www.redhat.com/support/errata/RHSA-2011-0837.html -CVE-2010-4541 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 -CVE-2010-4542 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 -CVE-2010-4542 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 -CVE-2010-4543 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 -CVE-2010-4543 - http://www.redhat.com/support/errata/RHSA-2011-0837.html -CVE-2010-4543 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 -CVE-2010-4566 - http://securityreason.com/securityalert/8119 -CVE-2010-4567 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-4568 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-4568 - https://bugzilla.mozilla.org/show_bug.cgi?id=619594 -CVE-2010-4569 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-4570 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-4572 - http://www.bugzilla.org/security/3.2.9/ -CVE-2010-4588 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2010-4595 - http://www-01.ibm.com/support/docview.wss?uid=swg1IZ86207 -CVE-2010-4597 - http://www.exploit-db.com/exploits/15767 -CVE-2010-4603 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM22186 -CVE-2010-4604 - http://www.securityfocus.com/archive/1/515263/100/0/threaded -CVE-2010-4607 - http://www.exploit-db.com/exploits/15799 -CVE-2010-4608 - http://www.exploit-db.com/exploits/15799 -CVE-2010-4609 - http://www.exploit-db.com/exploits/15800 -CVE-2010-4610 - http://www.exploit-db.com/exploits/15800 -CVE-2010-4611 - http://www.exploit-db.com/exploits/15800 -CVE-2010-4612 - http://www.exploit-db.com/exploits/15797 -CVE-2010-4613 - http://www.exploit-db.com/exploits/15797 -CVE-2010-4614 - http://www.exploit-db.com/exploits/15769 -CVE-2010-4630 - http://packetstormsecurity.org/1011-exploits/wpsurvey-xss.txt -CVE-2010-4631 - http://packetstormsecurity.org/1011-exploits/aspilotpilotcart-sqlxssinject.txt -CVE-2010-4632 - http://packetstormsecurity.org/1011-exploits/aspilotpilotcart-sqlxssinject.txt -CVE-2010-4633 - http://packetstormsecurity.org/1011-exploits/digishop-sql.txt -CVE-2010-4634 - http://packetstormsecurity.org/1011-exploits/osticket-lfi.txt -CVE-2010-4634 - http://www.attrition.org/pipermail/vim/2010-November/002468.html -CVE-2010-4634 - http://www.attrition.org/pipermail/vim/2010-November/002469.html -CVE-2010-4635 - http://packetstormsecurity.org/1011-exploits/site2nitevr-sql.txt -CVE-2010-4637 - http://packetstormsecurity.org/1011-exploits/wpfeedlist-xss.txt -CVE-2010-4639 - http://packetstormsecurity.org/1011-exploits/mysourcematrix-sql.txt -CVE-2010-4643 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2010-4644 - http://www.ubuntu.com/usn/USN-1053-1 -CVE-2010-4647 - http://openwall.com/lists/oss-security/2011/01/06/16 -CVE-2010-4647 - http://openwall.com/lists/oss-security/2011/01/06/7 -CVE-2010-4647 - http://yehg.net/lab/pr0js/advisories/eclipse/%5Beclipse_help_server%5D_cross_site_scripting -CVE-2010-4655 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2010-4662 - https://packetstormsecurity.com/files/cve/CVE-2010-4662 -CVE-2010-4668 - http://www.redhat.com/support/errata/RHSA-2011-0007.html -CVE-2010-4669 - http://www.youtube.com/watch?v=00yjWB6gGy8 -CVE-2010-4670 - http://www.youtube.com/watch?v=00yjWB6gGy8 -CVE-2010-4671 - http://www.youtube.com/watch?v=00yjWB6gGy8 -CVE-2010-4694 - https://bugzilla.redhat.com/show_bug.cgi?id=547515 -CVE-2010-4695 - https://bugzilla.redhat.com/show_bug.cgi?id=547515 -CVE-2010-4698 - http://seclists.org/fulldisclosure/2010/Dec/180 -CVE-2010-4701 - http://www.exploit-db.com/exploits/15839 -CVE-2010-4704 - http://ffmpeg.mplayerhq.hu/ -CVE-2010-4709 - http://www.exploit-db.com/exploits/16040 -CVE-2010-4721 - http://www.exploit-db.com/exploits/15754 -CVE-2010-4740 - http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt -CVE-2010-4740 - http://securityreason.com/securityalert/8083 -CVE-2010-4748 - http://securityreason.com/securityalert/8113 -CVE-2010-4749 - http://securityreason.com/securityalert/8112 -CVE-2010-4749 - http://www.exploit-db.com/exploits/15743 -CVE-2010-4750 - http://securityreason.com/securityalert/8112 -CVE-2010-4750 - http://www.exploit-db.com/exploits/15743 -CVE-2010-4754 - http://securityreason.com/achievement_securityalert/89 -CVE-2010-4754 - http://securityreason.com/exploitalert/9223 -CVE-2010-4754 - http://securityreason.com/securityalert/8116 -CVE-2010-4755 - http://securityreason.com/achievement_securityalert/89 -CVE-2010-4755 - http://securityreason.com/exploitalert/9223 -CVE-2010-4755 - http://securityreason.com/securityalert/8116 -CVE-2010-4756 - http://securityreason.com/achievement_securityalert/89 -CVE-2010-4756 - http://securityreason.com/exploitalert/9223 -CVE-2010-4770 - http://securityreason.com/securityalert/8159 -CVE-2010-4774 - http://www.exploit-db.com/exploits/15594 -CVE-2010-4776 - http://securityreason.com/securityalert/8158 -CVE-2010-4780 - http://securityreason.com/securityalert/8183 -CVE-2010-4780 - http://www.exploit-db.com/exploits/15645 -CVE-2010-4781 - http://securityreason.com/securityalert/8183 -CVE-2010-4781 - http://www.exploit-db.com/exploits/15645 -CVE-2010-4782 - http://securityreason.com/securityalert/8185 -CVE-2010-4783 - http://evuln.com/vulns/148/summary.html -CVE-2010-4784 - http://evuln.com/vulns/147/summary.html -CVE-2010-4784 - http://securityreason.com/securityalert/8184 -CVE-2010-4790 - http://packetstormsecurity.org/1010-exploits/filterftp-traversal.txt -CVE-2010-4791 - http://packetstormsecurity.org/1010-exploits/phpfusionmguser-sql.txt -CVE-2010-4791 - http://securityreason.com/securityalert/8219 -CVE-2010-4791 - http://www.exploit-db.com/exploits/15227 -CVE-2010-4792 - http://packetstormsecurity.org/1010-exploits/overlook-xss.txt -CVE-2010-4792 - http://securityreason.com/securityalert/8220 -CVE-2010-4793 - http://packetstormsecurity.org/1010-exploits/autoemanager-sql.txt -CVE-2010-4797 - http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt -CVE-2010-4798 - http://www.exploit-db.com/exploits/15232 -CVE-2010-4799 - http://packetstormsecurity.org/1010-exploits/chipmunkpwngame-sql.txt -CVE-2010-4800 - http://packetstormsecurity.org/1010-exploits/baconmap10-sql.txt -CVE-2010-4800 - http://securityreason.com/securityalert/8225 -CVE-2010-4800 - http://www.exploit-db.com/exploits/15233 -CVE-2010-4801 - http://packetstormsecurity.org/1010-exploits/baconmap10-lfi.txt -CVE-2010-4801 - http://securityreason.com/securityalert/8229 -CVE-2010-4801 - http://www.exploit-db.com/exploits/15234 -CVE-2010-4804 - http://www.csc.ncsu.edu/faculty/jiang/nexuss.html -CVE-2010-4805 - http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread -CVE-2010-4819 - https://bugs.freedesktop.org/show_bug.cgi?id=28801 -CVE-2010-4839 - http://www.exploit-db.com/exploits/15513 -CVE-2010-4843 - http://securityreason.com/securityalert/8395 -CVE-2010-4844 - http://securityreason.com/securityalert/8396 -CVE-2010-4844 - http://www.exploit-db.com/exploits/15755 -CVE-2010-4847 - http://securityreason.com/securityalert/8397 -CVE-2010-4847 - http://www.exploit-db.com/exploits/15756 -CVE-2010-4848 - http://evuln.com/vulns/139/summary.html -CVE-2010-4850 - http://securityreason.com/securityalert/8398 -CVE-2010-4850 - http://www.exploit-db.com/exploits/15633 -CVE-2010-4851 - http://securityreason.com/securityalert/8399 -CVE-2010-4851 - http://www.exploit-db.com/exploits/15644 -CVE-2010-4852 - http://securityreason.com/securityalert/8399 -CVE-2010-4852 - http://www.exploit-db.com/exploits/15644 -CVE-2010-4853 - http://packetstormsecurity.org/1011-exploits/joomlaccinvoices-sql.txt -CVE-2010-4855 - http://packetstormsecurity.org/1010-exploits/xweblog22-sql.txt -CVE-2010-4857 - http://packetstormsecurity.org/1010-exploits/cagcms-sqlxss.txt -CVE-2010-4857 - http://securityreason.com/securityalert/8415 -CVE-2010-4857 - http://www.exploit-db.com/exploits/15210 -CVE-2010-4858 - http://packetstormsecurity.org/1010-exploits/dnetlivestats-lfi.txt -CVE-2010-4858 - http://securityreason.com/securityalert/8417 -CVE-2010-4858 - http://www.exploit-db.com/exploits/15204 -CVE-2010-4859 - http://packetstormsecurity.org/1005-exploits/webasyst-sql.txt -CVE-2010-4860 - http://packetstormsecurity.org/1009-exploits/myphpauction-sql.txt -CVE-2010-4861 - http://packetstormsecurity.org/1009-exploits/webspell421-sql.txt -CVE-2010-4863 - http://packetstormsecurity.org/1009-exploits/getsimplecms201-xss.txt -CVE-2010-4863 - http://securityreason.com/securityalert/8420 -CVE-2010-4864 - http://packetstormsecurity.org/1010-exploits/joomlaclubmanager-sql.txt -CVE-2010-4866 - http://packetstormsecurity.org/1010-exploits/chipmunkboard13-sql.txt -CVE-2010-4866 - http://securityreason.com/securityalert/8423 -CVE-2010-4866 - http://www.exploit-db.com/exploits/15175 -CVE-2010-4868 - http://packetstormsecurity.org/1010-exploits/wagora-lfixss.txt -CVE-2010-4869 - http://www.exploit-db.com/exploits/15309 -CVE-2010-4870 - http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt -CVE-2010-4870 - http://securityreason.com/securityalert/8427 -CVE-2010-4870 - http://www.exploit-db.com/exploits/15328 -CVE-2010-4873 - http://packetstormsecurity.org/1011-exploits/webid085p1-xss.txt -CVE-2010-4873 - http://securityreason.com/securityalert/8429 -CVE-2010-4874 - http://packetstormsecurity.org/1010-exploits/ninkobb-xss.txt -CVE-2010-4874 - http://securityreason.com/securityalert/8430 -CVE-2010-4874 - http://www.exploit-db.com/exploits/15330 -CVE-2010-4875 - http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt -CVE-2010-4875 - http://securityreason.com/securityalert/8431 -CVE-2010-4877 - http://packetstormsecurity.org/1009-exploits/onecms-xss.txt -CVE-2010-4877 - http://securityreason.com/securityalert/8432 -CVE-2010-4880 - http://packetstormsecurity.org/1008-advisories/apphp-xssxsrf.txt -CVE-2010-4880 - http://securityreason.com/securityalert/8433 -CVE-2010-4881 - http://packetstormsecurity.org/1008-advisories/apphp-xssxsrf.txt -CVE-2010-4881 - http://securityreason.com/securityalert/8433 -CVE-2010-4882 - http://securityreason.com/securityalert/8434 -CVE-2010-4883 - http://packetstormsecurity.org/1009-exploits/modx202pl-xss.txt -CVE-2010-4883 - http://securityreason.com/securityalert/8435 -CVE-2010-4884 - http://packetstormsecurity.org/1008-exploits/hinnendahlgb-rfi.txt -CVE-2010-4884 - http://securityreason.com/securityalert/8436 -CVE-2010-4893 - http://www.exploit-db.com/exploits/14948 -CVE-2010-4894 - http://packetstormsecurity.org/1009-exploits/chillycms-sqlxss.txt -CVE-2010-4894 - http://securityreason.com/securityalert/8437 -CVE-2010-4894 - http://www.exploit-db.com/exploits/14897 -CVE-2010-4895 - http://packetstormsecurity.org/1009-exploits/chillycms-sqlxss.txt -CVE-2010-4895 - http://securityreason.com/securityalert/8437 -CVE-2010-4895 - http://www.exploit-db.com/exploits/14897 -CVE-2010-4899 - http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt -CVE-2010-4899 - http://securityreason.com/securityalert/8438 -CVE-2010-4899 - http://websecurity.com.ua/4146/ -CVE-2010-4900 - http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt -CVE-2010-4900 - http://securityreason.com/securityalert/8438 -CVE-2010-4900 - http://websecurity.com.ua/4146/ -CVE-2010-4901 - http://securityreason.com/securityalert/8439 -CVE-2010-4901 - http://www.packetstormsecurity.org/1009-advisories/ZSL-2010-4962.txt -CVE-2010-4901 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php -CVE-2010-4902 - http://packetstormsecurity.org/1009-exploits/joomlaclantools-sql.txt -CVE-2010-4902 - http://securityreason.com/securityalert/8440 -CVE-2010-4903 - http://securityreason.com/securityalert/8441 -CVE-2010-4904 - http://www.exploit-db.com/exploits/14922 -CVE-2010-4906 - http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt -CVE-2010-4906 - http://securityreason.com/securityalert/8442 -CVE-2010-4907 - http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt -CVE-2010-4907 - http://securityreason.com/securityalert/8442 -CVE-2010-4908 - http://packetstormsecurity.org/0908-exploits/vsm-sql.txt -CVE-2010-4908 - http://securityreason.com/securityalert/8443 -CVE-2010-4909 - http://packetstormsecurity.org/1009-exploits/mechbunnypsr-xss.txt -CVE-2010-4909 - http://securityreason.com/securityalert/8444 -CVE-2010-4910 - http://packetstormsecurity.org/1009-exploits/coldcalendar-sql.txt -CVE-2010-4910 - http://securityreason.com/securityalert/8445 -CVE-2010-4911 - http://packetstormsecurity.org/1009-exploits/phpclassifiedsads-sql.txt -CVE-2010-4911 - http://securityreason.com/securityalert/8447 -CVE-2010-4912 - http://packetstormsecurity.org/1009-exploits/ucenter-sql.txt -CVE-2010-4912 - http://securityreason.com/securityalert/8446 -CVE-2010-4913 - http://packetstormsecurity.org/1009-exploits/coldusergroup-sql.txt -CVE-2010-4913 - http://securityreason.com/securityalert/8448 -CVE-2010-4915 - http://packetstormsecurity.org/1009-exploits/coldbookmarks-sql.txt -CVE-2010-4915 - http://securityreason.com/securityalert/8449 -CVE-2010-4915 - http://www.exploit-db.com/exploits/14933 -CVE-2010-4916 - http://packetstormsecurity.org/1009-exploits/coldusergroup-sql.txt -CVE-2010-4916 - http://securityreason.com/securityalert/8448 -CVE-2010-4917 - http://packetstormsecurity.org/1009-exploits/ablog-sql.txt -CVE-2010-4918 - http://packetstormsecurity.org/1009-exploits/ijoomlamagazine-rfi.txt -CVE-2010-4921 - http://packetstormsecurity.org/1009-exploits/dmxreadypbm-sql.txt -CVE-2010-4922 - http://securityreason.com/securityalert/8453 -CVE-2010-4923 - http://packetstormsecurity.org/0908-exploits/vbs-sql.txt -CVE-2010-4923 - http://securityreason.com/securityalert/8460 -CVE-2010-4925 - http://packetstormsecurity.org/1008-exploits/nukedklanpartenaires-sql.txt -CVE-2010-4926 - http://packetstormsecurity.org/1009-exploits/joomlatimetrack-sql.txt -CVE-2010-4927 - http://packetstormsecurity.org/1009-exploits/joomlarestaurantguide-sqlxsslfi.txt -CVE-2010-4928 - http://packetstormsecurity.org/1009-exploits/joomlarestaurantguide-sqlxsslfi.txt -CVE-2010-4930 - http://securityreason.com/securityalert/8455 -CVE-2010-4933 - http://packetstormsecurity.org/1009-exploits/geeklog138-sql.txt -CVE-2010-4936 - http://packetstormsecurity.org/1008-exploits/joomlaslideshow-sql.txt -CVE-2010-4940 - http://packetstormsecurity.org/1009-exploits/wanewsletter-sql.txt -CVE-2010-4942 - http://packetstormsecurity.org/1009-exploits/exoopportecal-sql.txt -CVE-2010-4945 - http://packetstormsecurity.org/0901-exploits/joomlacamel-sql.txt -CVE-2010-4945 - http://packetstormsecurity.org/1008-exploits/joomlacamelcitydb2-sql.txt -CVE-2010-4950 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4951 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4952 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4953 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4954 - http://packetstormsecurity.org/1009-exploits/xtcommercegambio-sql.txt -CVE-2010-4955 - http://packetstormsecurity.org/1008-exploits/apboard-sql.txt -CVE-2010-4956 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4957 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4958 - http://packetstormsecurity.org/1008-exploits/pradoportal-xss.txt -CVE-2010-4958 - http://securityreason.com/securityalert/8468 -CVE-2010-4959 - http://www.packetstormsecurity.com/1007-exploits/prepodcastportal-sql.txt -CVE-2010-4960 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4961 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4962 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -CVE-2010-4963 - http://packetstormsecurity.org/1008-exploits/bxr-sqlxssxsrf.txt -CVE-2010-4963 - http://securityreason.com/securityalert/8470 -CVE-2010-4968 - http://packetstormsecurity.org/1007-exploits/joomlawmtpic-sql.txt -CVE-2010-4969 - http://www.exploit-db.com/exploits/14241 -CVE-2010-4970 - http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt -CVE-2010-4970 - http://securityreason.com/securityalert/8491 -CVE-2010-4970 - http://www.exploit-db.com/exploits/14217 -CVE-2010-4971 - http://packetstormsecurity.org/1006-exploits/joomlavideowhisper-xss.txt -CVE-2010-4972 - http://packetstormsecurity.org/1006-exploits/ypnincjokescript-sql.txt -CVE-2010-4972 - http://securityreason.com/securityalert/8490 -CVE-2010-4972 - http://www.exploit-db.com/exploits/14107 -CVE-2010-4974 - http://packetstormsecurity.org/1007-exploits/bsautodealer-sql.txt -CVE-2010-4974 - http://securityreason.com/securityalert/8489 -CVE-2010-4974 - http://www.exploit-db.com/exploits/14239 -CVE-2010-4976 - http://www.packetstormsecurity.com/1006-exploits/metinfo-xss.txt -CVE-2010-4977 - http://packetstormsecurity.org/1007-exploits/joomlacanteen-lfisql.txt -CVE-2010-4978 - http://www.packetstormsecurity.com/1006-exploits/candid-sql.txt -CVE-2010-4979 - http://www.packetstormsecurity.com/1006-exploits/candid-sql.txt -CVE-2010-4980 - http://packetstormsecurity.org/1007-exploits/reservelogic-sql.txt -CVE-2010-4982 - http://www.exploit-db.com/exploits/14326 -CVE-2010-4983 - http://packetstormsecurity.org/1007-exploits/cybermatch-sql.txt -CVE-2010-4983 - http://www.salvatorefresta.net/files/adv/iScripts%20CyberMatch%201.0%20Blind%20SQL%20Injection%20Vulnerability-02072010.txt -CVE-2010-4984 - http://packetstormsecurity.org/1007-exploits/mykazaamnms-sqlxss.txt -CVE-2010-4985 - http://packetstormsecurity.org/1007-exploits/mykazaamnms-sqlxss.txt -CVE-2010-4992 - http://packetstormsecurity.org/1007-exploits/joomlapaymentsplus-sql.txt -CVE-2010-4993 - http://packetstormsecurity.org/1007-exploits/joomlaeventcal-sql.txt -CVE-2010-4994 - http://packetstormsecurity.org/1007-exploits/joomlajobspro-sql.txt -CVE-2010-4995 - http://packetstormsecurity.org/1007-exploits/joomlaneorecruit-sql.txt -CVE-2010-4998 - http://packetstormsecurity.org/1006-exploits/ardeacore-rfi.txt -CVE-2010-4998 - http://securityreason.com/securityalert/8503 -CVE-2010-4998 - http://www.exploit-db.com/exploits/13832/ -CVE-2010-5000 - http://packetstormsecurity.org/1006-exploits/mcloginsystem-sql.txt -CVE-2010-5002 - http://packetstormsecurity.org/1007-exploits/exponentcms-xss.txt -CVE-2010-5002 - http://securityreason.com/securityalert/8485 -CVE-2010-5003 - http://packetstormsecurity.org/1007-exploits/joomlaautartimonial-sql.txt -CVE-2010-5006 - http://packetstormsecurity.org/1006-exploits/emorealtymanager-sql.txt -CVE-2010-5007 - http://packetstormsecurity.org/1006-exploits/utstats-sqlxss.txt -CVE-2010-5008 - http://packetstormsecurity.org/1006-exploits/brightsuite-sql.txt -CVE-2010-5009 - http://packetstormsecurity.org/1006-exploits/utstats-sqlxss.txt -CVE-2010-5010 - http://packetstormsecurity.org/1006-exploits/schoolmation-sqlxss.txt -CVE-2010-5011 - http://packetstormsecurity.org/1006-exploits/schoolmation-sqlxss.txt -CVE-2010-5012 - http://packetstormsecurity.org/1006-exploits/dalogin-sqlxssdisclose.txt -CVE-2010-5013 - http://packetstormsecurity.org/1006-exploits/virtualrealestate-sql.txt -CVE-2010-5015 - http://www.packetstormsecurity.com/1006-exploits/2daybiz-sqlxss.txt -CVE-2010-5017 - http://www.exploit-db.com/exploits/10978 -CVE-2010-5018 - http://packetstormsecurity.org/1006-exploits/2daybizocs-sqlxss.txt -CVE-2010-5019 - http://packetstormsecurity.org/1006-exploits/2daybizocs-sqlxss.txt -CVE-2010-5021 - http://packetstormsecurity.org/1006-exploits/digitalinterchangelibrary-sql.txt -CVE-2010-5023 - http://packetstormsecurity.org/1006-exploits/digitalinterchange-sql.txt -CVE-2010-5024 - http://packetstormsecurity.org/1006-exploits/cutesitecms-sql.txt -CVE-2010-5024 - http://securityreason.com/securityalert/8515 -CVE-2010-5025 - http://packetstormsecurity.org/1006-exploits/cutesitecms-xss.txt -CVE-2010-5025 - http://securityreason.com/securityalert/8514 -CVE-2010-5026 - http://packetstormsecurity.org/1006-exploits/fairinabox-sqlxss.txt -CVE-2010-5027 - http://packetstormsecurity.org/1006-exploits/fairinabox-sqlxss.txt -CVE-2010-5029 - http://packetstormsecurity.org/1006-exploits/ecomatcms-sql.txt -CVE-2010-5029 - http://securityreason.com/securityalert/8518 -CVE-2010-5030 - http://packetstormsecurity.org/1006-exploits/ecomatcms-xss.txt -CVE-2010-5030 - http://securityreason.com/securityalert/8517 -CVE-2010-5031 - http://packetstormsecurity.org/1006-exploits/filenicescript-xss.txt -CVE-2010-5032 - http://packetstormsecurity.org/1005-exploits/joomla_com_bfquiz_sploit.py.txt -CVE-2010-5032 - http://www.packetstormsecurity.org/1005-exploits/joomlabfquiz-sql.txt -CVE-2010-5033 - http://packetstormsecurity.org/1005-exploits/fusebox-sql.txt -CVE-2010-5033 - http://securityreason.com/securityalert/8520 -CVE-2010-5033 - http://www.exploit-db.com/exploits/12786 -CVE-2010-5034 - http://packetstormsecurity.org/1006-exploits/iscriptseasybiller-sql.txt -CVE-2010-5035 - http://packetstormsecurity.org/1006-exploits/iscriptsewap-sqlxss.txt -CVE-2010-5036 - http://packetstormsecurity.org/1006-exploits/iscriptsewap-sqlxss.txt -CVE-2010-5037 - http://packetstormsecurity.org/1006-exploits/commonsensecms-sql.txt -CVE-2010-5038 - http://packetstormsecurity.org/1005-exploits/groonescf-rfi.txt -CVE-2010-5040 - http://www.exploit-db.com/exploits/12787/ -CVE-2010-5041 - http://www.exploit-db.com/exploits/12787/ -CVE-2010-5046 - http://packetstormsecurity.org/1005-exploits/ecocms-xss.txt -CVE-2010-5047 - http://packetstormsecurity.org/1005-exploits/pressrelease-sql.txt -CVE-2010-5048 - http://packetstormsecurity.org/1005-exploits/joomlajcomments-xss.txt -CVE-2010-5049 - http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt -CVE-2010-5053 - http://packetstormsecurity.org/1004-exploits/joomlaxobbix-sql.txt -CVE-2010-5053 - http://www.exploit-db.com/exploits/12097 -CVE-2010-5055 - http://packetstormsecurity.org/1004-exploits/almnrzm-sql.txt -CVE-2010-5056 - http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt -CVE-2010-5057 - http://packetstormsecurity.org/1004-exploits/cmsariadna-sql.txt -CVE-2010-5059 - http://packetstormsecurity.org/1004-exploits/cmscout-sql.txt -CVE-2010-5060 - http://packetstormsecurity.org/1003-exploits/nusnewssystem-sql.txt -CVE-2010-5061 - http://packetstormsecurity.org/1003-exploits/rsstatic-sql.txt -CVE-2010-5062 - http://packetstormsecurity.org/1003-exploits/mhproducts-sql.txt -CVE-2010-5063 - http://seclists.org/fulldisclosure/2010/Aug/235 -CVE-2010-5064 - http://seclists.org/fulldisclosure/2010/Aug/235 -CVE-2010-5065 - http://seclists.org/fulldisclosure/2010/Aug/235 -CVE-2010-5066 - http://seclists.org/fulldisclosure/2010/Aug/235 -CVE-2010-5067 - http://seclists.org/fulldisclosure/2010/Aug/235 -CVE-2010-5074 - http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ -CVE-2010-5082 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-012 -CVE-2010-5083 - http://www.exploit-db.com/exploits/14589 -CVE-2010-5085 - http://marc.info/?l=bugtraq&m=128104795219200&w=2 -CVE-2010-5086 - http://cross-site-scripting.blogspot.com/2010/07/bit-weaver-27-local-file-inclusion.html -CVE-2010-5091 - http://dl.packetstormsecurity.net/1006-exploits/silverstripe-shell.txt -CVE-2010-5107 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2010-5107 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2010-5144 - http://mrhinkydink.blogspot.com/2010/05/websense-633-via-bypass.html -CVE-2010-5150 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5150 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5151 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5151 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5152 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5152 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5153 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5153 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5154 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5154 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5155 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5155 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5156 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5156 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5157 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5157 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5158 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5158 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5159 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5159 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5160 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5160 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5161 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5161 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5162 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5162 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5163 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5163 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5164 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5164 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5165 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5165 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5166 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5166 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5167 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5167 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5168 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5168 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5169 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5169 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5170 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5170 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5171 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5171 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5172 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5172 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5173 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5173 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5174 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5174 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5175 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5175 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5176 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5176 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5177 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5177 - http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/ -CVE-2010-5177 - http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/ -CVE-2010-5177 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5178 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5178 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5179 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5179 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5180 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5180 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5181 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5181 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5182 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5182 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5183 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5183 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5184 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ -CVE-2010-5184 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ -CVE-2010-5204 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bibm_lotus_symphony%5D_3-beta-4_insecure_dll_hijacking -CVE-2010-5205 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Be-press-one_office%5D_insecure_dll_hijacking -CVE-2010-5206 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Be-press-one_office%5D_insecure_dll_hijacking -CVE-2010-5207 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bcelframe_office%5D_2008_insecure_dll_hijacking -CVE-2010-5208 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bkingsoft_office%5D_2010_insecure_dll_hijacking -CVE-2010-5209 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bnuance_pdf_reader%5D_6.0_insecure_dll_hijacking -CVE-2010-5211 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Balsee%5D_6.20.0.1_insecure_dll_hijacking -CVE-2010-5218 - http://packetstormsecurity.org/1010-exploits/dupehunter-dllhijack.txt -CVE-2010-5219 - http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt -CVE-2010-5220 - http://packetstormsecurity.org/1010-exploits/meo-dllhijack.txt -CVE-2010-5221 - http://packetstormsecurity.org/1010-exploits/stdu-dllhijack.txt -CVE-2010-5223 - http://packetstormsecurity.org/1010-exploits/phoenix-dllhijack.txt -CVE-2010-5224 - http://packetstormsecurity.org/1010-exploits/cooliphoneringtone-dllhijack.txt -CVE-2010-5225 - http://xlocux.wordpress.com/2010/11/22/babylon-pro-8-xx-dll-hijacking/ -CVE-2010-5231 - http://secunia.com/blog/120 -CVE-2010-5232 - http://secunia.com/blog/120 -CVE-2010-5237 - http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html -CVE-2010-5238 - http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html -CVE-2010-5240 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4953.php -CVE-2010-5240 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4954.php -CVE-2010-5243 - http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html -CVE-2010-5263 - http://packetstormsecurity.org/1009-exploits/sothinkswf-dllhijack.txt -CVE-2010-5264 - http://packetstormsecurity.org/1009-exploits/yloader-dllhijack.txt -CVE-2010-5265 - http://packetstormsecurity.org/1009-exploits/smartsniff-dllhijack.txt -CVE-2010-5266 - http://packetstormsecurity.org/1009-exploits/videocharge-dllhijack.txt -CVE-2010-5267 - http://packetstormsecurity.org/1009-exploits/seasyofficerecovery-dllhijack.txt -CVE-2010-5268 - http://www.coresecurity.com/content/amazon-kindle-for-pc-wintab32-dll-hijacking-exploit-10-5 -CVE-2010-5278 - http://packetstormsecurity.org/1009-exploits/modx202pl-lfi.txt -CVE-2010-5279 - http://seclists.org/fulldisclosure/2010/Aug/235 -CVE-2010-5280 - http://packetstormsecurity.org/1010-exploits/joomlacbe-lfi.txt -CVE-2010-5280 - http://www.exploit-db.com/exploits/15222 -CVE-2010-5281 - http://packetstormsecurity.org/1009-exploits/cmscout209-lfi.txt -CVE-2010-5282 - http://packetstormsecurity.org/1009-exploits/opentext-xsrfxss.txt -CVE-2010-5283 - http://packetstormsecurity.org/1009-exploits/opentext-xsrfxss.txt -CVE-2010-5284 - http://packetstormsecurity.org/1010-exploits/collabtive-xssxsrf.txt -CVE-2010-5284 - http://www.exploit-db.com/exploits/15240 -CVE-2010-5285 - http://packetstormsecurity.org/1010-exploits/collabtive-xssxsrf.txt -CVE-2010-5285 - http://www.exploit-db.com/exploits/15240 -CVE-2010-5286 - http://packetstormsecurity.org/1010-exploits/joomlajstore-lfi.txt -CVE-2010-5289 - http://www.exploit-db.com/exploits/12030/ -CVE-2010-5290 - http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/ -CVE-2010-5298 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2010-5298 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2010-5298 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2010-5298 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2010-5298 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html -CVE-2010-5298 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2010-5298 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2010-5299 - http://packetstormsecurity.com/files/125723/MicroP-0.1.1.1600-Buffer-Overflow.html -CVE-2010-5300 - http://packetstormsecurity.com/files/126216/Jzip-2.0.0.132900-Buffer-Overflow.html -CVE-2010-5300 - http://seclists.org/fulldisclosure/2010/Apr/79 -CVE-2010-5300 - http://www.exploit-db.com/exploits/32899 -CVE-2010-5312 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2010-5312 - https://www.drupal.org/sa-core-2022-002 -CVE-2010-5313 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2010-5313 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2010-5313 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2010-5322 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html -CVE-2010-5322 - https://github.com/ZeusCart/zeuscart/issues/28 -CVE-2010-5324 - http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html -CVE-2010-5325 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2010-5327 - https://issues.liferay.com/browse/LPE-14964 -CVE-2010-5327 - https://issues.liferay.com/browse/LPS-64547 -CVE-2010-5327 - https://issues.liferay.com/browse/LPS-7087 -CVE-2010-5329 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc0a80798576f80ca10b3f6c9c7097f12fd1d64e -CVE-2010-5330 - https://www.exploit-db.com/exploits/14146 -CVE-2010-5333 - https://www.exploit-db.com/exploits/14941 -CVE-2010-5333 - https://www.exploit-db.com/exploits/15016 -CVE-2010-5334 - https://vuldb.com/?id.142994 -CVE-2010-5335 - https://vuldb.com/?id.142994 -CVE-2010-5336 - https://vuldb.com/?id.142993 -CVE-2010-5337 - https://vuldb.com/?id.142993 -CVE-2010-5338 - https://vuldb.com/?id.142993 -CVE-2010-5339 - https://vuldb.com/?id.142993 -CVE-2010-5340 - https://vuldb.com/?id.142993 -CVE-2011-0004 - http://openwall.com/lists/oss-security/2011/01/06/1 -CVE-2011-0013 - http://securityreason.com/securityalert/8093 -CVE-2011-0020 - https://bugzilla.redhat.com/show_bug.cgi?id=671122 -CVE-2011-0027 - http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow/ -CVE-2011-0028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-033 -CVE-2011-0032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015 -CVE-2011-0041 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-029 -CVE-2011-0042 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015 -CVE-2011-0043 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013 -CVE-2011-0045 - http://securityreason.com/securityalert/8110 -CVE-2011-0046 - http://www.bugzilla.org/security/3.2.9/ -CVE-2011-0046 - https://bugzilla.mozilla.org/show_bug.cgi?id=621090 -CVE-2011-0048 - http://www.bugzilla.org/security/3.2.9/ -CVE-2011-0049 - http://securityreason.com/securityalert/8061 -CVE-2011-0049 - http://www.exploit-db.com/exploits/16103 -CVE-2011-0050 - http://securityreason.com/securityalert/8097 -CVE-2011-0051 - https://bugzilla.mozilla.org/show_bug.cgi?id=616659 -CVE-2011-0054 - https://bugzilla.mozilla.org/show_bug.cgi?id=615657 -CVE-2011-0055 - https://bugzilla.mozilla.org/show_bug.cgi?id=616009 -CVE-2011-0056 - https://bugzilla.mozilla.org/show_bug.cgi?id=622015 -CVE-2011-0057 - https://bugzilla.mozilla.org/show_bug.cgi?id=626631 -CVE-2011-0063 - http://securityreason.com/securityalert/8133 -CVE-2011-0063 - http://sotiriu.de/adv/NSOADV-2011-003.txt -CVE-2011-0064 - https://bugzilla.mozilla.org/show_bug.cgi?id=606997 -CVE-2011-0065 - http://securityreason.com/securityalert/8326 -CVE-2011-0070 - https://bugzilla.mozilla.org/show_bug.cgi?id=645565 -CVE-2011-0071 - https://bugzilla.mozilla.org/show_bug.cgi?id=624764 -CVE-2011-0073 - https://bugzilla.mozilla.org/show_bug.cgi?id=630919 -CVE-2011-0075 - https://bugzilla.mozilla.org/show_bug.cgi?id=635977 -CVE-2011-0076 - https://bugzilla.mozilla.org/show_bug.cgi?id=634724 -CVE-2011-0077 - https://bugzilla.mozilla.org/show_bug.cgi?id=623998 -CVE-2011-0078 - https://bugzilla.mozilla.org/show_bug.cgi?id=635705 -CVE-2011-0083 - https://bugzilla.mozilla.org/show_bug.cgi?id=648090 -CVE-2011-0084 - https://bugzilla.mozilla.org/show_bug.cgi?id=648094 -CVE-2011-0085 - https://bugzilla.mozilla.org/show_bug.cgi?id=648100 -CVE-2011-0091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013 -CVE-2011-0096 - http://blogs.technet.com/b/msrc/archive/2011/01/28/microsoft-releases-security-advisory-2501696.aspx -CVE-2011-0096 - http://www.exploit-db.com/exploits/16071 -CVE-2011-0107 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 -CVE-2011-0182 - http://securityreason.com/securityalert/8402 -CVE-2011-0222 - http://securityreason.com/securityalert/8313 -CVE-2011-0226 - http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html -CVE-2011-0228 - http://securityreason.com/securityalert/8361 -CVE-2011-0257 - http://securityreason.com/securityalert/8365 -CVE-2011-0258 - http://securityreason.com/securityalert/8368 -CVE-2011-0266 - http://securityreason.com/securityalert/8151 -CVE-2011-0267 - http://securityreason.com/securityalert/8156 -CVE-2011-0281 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-0282 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-0284 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt -CVE-2011-0285 - http://securityreason.com/securityalert/8200 -CVE-2011-0285 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt -CVE-2011-0322 - http://securityreason.com/securityalert/8142 -CVE-2011-0342 - http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02 -CVE-2011-0346 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2011-0347 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx -CVE-2011-0355 - http://securityreason.com/securityalert/8090 -CVE-2011-0364 - http://securityreason.com/securityalert/8095 -CVE-2011-0379 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0382 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0383 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0385 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0386 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0388 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0391 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0392 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml -CVE-2011-0406 - http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html -CVE-2011-0406 - http://www.exploit-db.com/exploits/15957 -CVE-2011-0411 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0412 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0418 - http://securityreason.com/achievement_securityalert/97 -CVE-2011-0418 - http://securityreason.com/securityalert/8228 -CVE-2011-0419 - http://securityreason.com/achievement_securityalert/98 -CVE-2011-0419 - http://securityreason.com/securityalert/8246 -CVE-2011-0419 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-0419 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2011-0420 - http://securityreason.com/achievement_securityalert/94 -CVE-2011-0420 - http://securityreason.com/securityalert/8087 -CVE-2011-0420 - http://www.exploit-db.com/exploits/16182 -CVE-2011-0421 - http://securityreason.com/securityalert/8146 -CVE-2011-0421 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-0469 - https://bugzilla.suse.com/show_bug.cgi?id=679325 -CVE-2011-0471 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64662 -CVE-2011-0480 - http://ffmpeg.mplayerhq.hu/ -CVE-2011-0500 - http://www.exploit-db.com/exploits/15936 -CVE-2011-0501 - http://www.exploit-db.com/exploits/15901 -CVE-2011-0502 - http://www.exploit-db.com/exploits/15897 -CVE-2011-0503 - http://www.exploit-db.com/exploits/15968 -CVE-2011-0504 - http://www.exploit-db.com/exploits/15968 -CVE-2011-0509 - http://dev.vaadin.com/ticket/6257 -CVE-2011-0510 - http://www.exploit-db.com/exploits/16003 -CVE-2011-0512 - http://www.exploit-db.com/exploits/16004 -CVE-2011-0514 - http://www.exploit-db.com/exploits/15940 -CVE-2011-0521 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-0522 - http://securityreason.com/securityalert/8064 -CVE-2011-0522 - http://www.exploit-db.com/exploits/16108 -CVE-2011-0525 - https://packetstormsecurity.com/files/cve/CVE-2011-0525 -CVE-2011-0526 - http://openwall.com/lists/oss-security/2011/01/27/2 -CVE-2011-0526 - http://openwall.com/lists/oss-security/2011/01/27/5 -CVE-2011-0526 - http://yehg.net/lab/pr0js/advisories/%5Bvanilla_forums-2.0.16%5D_cross_site_scripting -CVE-2011-0531 - http://www.openwall.com/lists/oss-security/2011/01/31/4 -CVE-2011-0531 - http://www.openwall.com/lists/oss-security/2011/01/31/8 -CVE-2011-0533 - http://securityreason.com/securityalert/8091 -CVE-2011-0535 - http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html -CVE-2011-0535 - http://openwall.com/lists/oss-security/2011/02/01/1 -CVE-2011-0535 - http://openwall.com/lists/oss-security/2011/02/03/1 -CVE-2011-0535 - http://seclists.org/fulldisclosure/2011/Feb/0 -CVE-2011-0535 - http://securityreason.com/securityalert/8067 -CVE-2011-0536 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-0545 - http://sotiriu.de/adv/NSOADV-2011-001.txt -CVE-2011-0546 - http://securityreason.com/securityalert/8300 -CVE-2011-0560 - http://www.kb.cert.org/vuls/id/812969 -CVE-2011-0561 - http://www.kb.cert.org/vuls/id/812969 -CVE-2011-0562 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0563 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0565 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0566 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0567 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0585 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0586 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0587 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0589 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0590 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0591 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0592 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0593 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0594 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0595 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0596 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0598 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0599 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0600 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0602 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0603 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0604 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0606 - http://www.redhat.com/support/errata/RHSA-2011-0301.html -CVE-2011-0609 - http://securityreason.com/securityalert/8152 -CVE-2011-0611 - http://secunia.com/blog/210/ -CVE-2011-0614 - http://securityreason.com/securityalert/8253 -CVE-2011-0614 - http://www.exploit-db.com/exploits/17278/ -CVE-2011-0614 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5012.php -CVE-2011-0615 - http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file -CVE-2011-0635 - http://www.exploit-db.com/exploits/16016 -CVE-2011-0636 - http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7677-1391+00.htm -CVE-2011-0636 - http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7681-487+00.htm -CVE-2011-0653 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -CVE-2011-0654 - http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx -CVE-2011-0694 - http://securityreason.com/securityalert/8098 -CVE-2011-0696 - http://www.djangoproject.com/weblog/2011/feb/08/security/ -CVE-2011-0696 - https://bugzilla.redhat.com/show_bug.cgi?id=676357 -CVE-2011-0697 - http://www.djangoproject.com/weblog/2011/feb/08/security/ -CVE-2011-0698 - http://www.djangoproject.com/weblog/2011/feb/08/security/ -CVE-2011-0708 - http://bugs.php.net/bug.php?id=54002 -CVE-2011-0708 - http://openwall.com/lists/oss-security/2011/02/14/1 -CVE-2011-0708 - http://openwall.com/lists/oss-security/2011/02/16/7 -CVE-2011-0708 - http://securityreason.com/securityalert/8114 -CVE-2011-0708 - http://www.exploit-db.com/exploits/16261/ -CVE-2011-0708 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-0710 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-0722 - http://ffmpeg.mplayerhq.hu/ -CVE-2011-0723 - http://ffmpeg.mplayerhq.hu/ -CVE-2011-0725 - https://bugs.launchpad.net/bugs/722228 -CVE-2011-0727 - http://www.ubuntu.com/usn/USN-1099-1 -CVE-2011-0740 - http://www.autosectools.com/Advisories/WordPress.RSS.Feed.Reader.for.WordPress.0.1_Reflected.Cross-site.Scripting_82.html -CVE-2011-0742 - http://telussecuritylabs.com/threats/show/FSC20110125-06 -CVE-2011-0745 - http://securityreason.com/securityalert/8141 -CVE-2011-0745 - http://www.redteam-pentesting.de/advisories/rt-sa-2011-002 -CVE-2011-0751 - http://securityreason.com/securityalert/8140 -CVE-2011-0751 - http://www.redteam-pentesting.de/advisories/rt-sa-2011-001 -CVE-2011-0761 - http://securityreason.com/securityalert/8248 -CVE-2011-0761 - http://www.toucan-system.com/advisories/tssa-2011-03.txt -CVE-2011-0762 - http://securityreason.com/achievement_securityalert/95 -CVE-2011-0762 - http://securityreason.com/securityalert/8109 -CVE-2011-0762 - http://www.exploit-db.com/exploits/16270 -CVE-2011-0764 - http://securityreason.com/securityalert/8171 -CVE-2011-0764 - http://www.toucan-system.com/advisories/tssa-2011-01.txt -CVE-2011-0772 - http://securityreason.com/securityalert/8062 -CVE-2011-0773 - http://securityreason.com/securityalert/8063 -CVE-2011-0773 - http://www.autosectools.com/Advisories/PivotX.2.2.2_Reflected.Cross-site.Scripting_76.html -CVE-2011-0785 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0786 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0786 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0787 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0788 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0788 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0789 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0790 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0791 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0792 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0793 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0794 - http://www.kb.cert.org/vuls/id/520721 -CVE-2011-0794 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0795 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0796 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0797 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0798 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0799 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0800 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0801 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0802 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0802 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0802 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0803 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0804 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0805 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0806 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0807 - http://securityreason.com/securityalert/8327 -CVE-2011-0807 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0808 - http://www.kb.cert.org/vuls/id/520721 -CVE-2011-0808 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0809 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0810 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0811 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0812 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0813 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0814 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0814 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0814 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0815 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0815 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0815 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0816 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0817 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0817 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0818 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0819 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0820 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0821 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0822 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0823 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0824 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0825 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0826 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0827 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0828 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0829 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0830 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0831 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0832 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0833 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0834 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0835 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0836 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0837 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0838 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0839 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0840 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0841 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0843 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0844 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0845 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0846 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0847 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0848 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0849 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0850 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0851 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0852 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0853 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0854 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0855 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0856 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0857 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0858 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0859 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0860 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0861 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -CVE-2011-0862 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0862 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0862 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0863 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0863 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0864 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0864 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0865 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0865 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0865 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0866 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0866 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0866 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0867 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0867 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0867 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0868 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0868 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0868 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0869 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0869 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0869 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0870 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0871 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0871 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0871 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0872 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0872 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0872 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0873 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-0873 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0873 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -CVE-2011-0875 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0876 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0877 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0879 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0880 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0881 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0882 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0883 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0884 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-0885 - http://seclists.org/bugtraq/2011/Feb/36 -CVE-2011-0885 - http://securityreason.com/securityalert/8066 -CVE-2011-0885 - http://www.exploit-db.com/exploits/16123/ -CVE-2011-0886 - http://seclists.org/bugtraq/2011/Feb/36 -CVE-2011-0886 - http://securityreason.com/securityalert/8068 -CVE-2011-0886 - http://www.exploit-db.com/exploits/16123/ -CVE-2011-0887 - http://seclists.org/bugtraq/2011/Feb/36 -CVE-2011-0887 - http://securityreason.com/securityalert/8068 -CVE-2011-0887 - http://www.exploit-db.com/exploits/16123/ -CVE-2011-0895 - http://securityreason.com/securityalert/8186 -CVE-2011-0904 - https://bugzilla.gnome.org/show_bug.cgi?id=641802 -CVE-2011-0908 - http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 -CVE-2011-0909 - http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 -CVE-2011-0910 - http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 -CVE-2011-0923 - http://securityreason.com/securityalert/8261 -CVE-2011-0923 - http://securityreason.com/securityalert/8323 -CVE-2011-0923 - http://securityreason.com/securityalert/8329 -CVE-2011-0975 - https://exchange.xforce.ibmcloud.com/vulnerabilities/65135 -CVE-2011-0977 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 -CVE-2011-0978 - http://securityreason.com/securityalert/8231 -CVE-2011-0997 - https://www.exploit-db.com/exploits/37623/ -CVE-2011-10005 - https://vuldb.com/?id.250716 -CVE-2011-10005 - https://www.exploit-db.com/exploits/17354 -CVE-2011-1007 - https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4 -CVE-2011-1009 - https://www.openwall.com/lists/oss-security/2011/02/22/14 -CVE-2011-1010 - http://securityreason.com/securityalert/8115 -CVE-2011-1010 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1012 - http://securityreason.com/securityalert/8115 -CVE-2011-1017 - http://securityreason.com/securityalert/8115 -CVE-2011-1047 - http://securityreason.com/securityalert/8099 -CVE-2011-1049 - https://www.hex-rays.com/vulnfix.shtml -CVE-2011-1050 - https://www.hex-rays.com/vulnfix.shtml -CVE-2011-1051 - https://www.hex-rays.com/vulnfix.shtml -CVE-2011-1052 - https://www.hex-rays.com/vulnfix.shtml -CVE-2011-1053 - https://www.hex-rays.com/vulnfix.shtml -CVE-2011-1054 - https://www.hex-rays.com/vulnfix.shtml -CVE-2011-1055 - http://www.exploit-db.com/exploits/16171 -CVE-2011-1060 - http://evuln.com/vulns/174/summary.html -CVE-2011-1060 - http://securityreason.com/securityalert/8101 -CVE-2011-1061 - http://evuln.com/vulns/175/summary.html -CVE-2011-1061 - http://securityreason.com/securityalert/8102 -CVE-2011-1062 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4990.php -CVE-2011-1063 - http://securityreason.com/securityalert/8103 -CVE-2011-1069 - https://www.openwall.com/lists/oss-security/2011/02/28/9 -CVE-2011-1071 - http://bugs.debian.org/615120 -CVE-2011-1071 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1073 - http://securityreason.com/securityalert/8117 -CVE-2011-1074 - http://securityreason.com/securityalert/8117 -CVE-2011-1079 - http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html -CVE-2011-1086 - https://www.exploit-db.com/exploits/35125 -CVE-2011-1087 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4931.php -CVE-2011-1090 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1092 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1095 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1096 - http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts -CVE-2011-1099 - http://securityreason.com/securityalert/8121 -CVE-2011-1099 - http://www.exploit-db.com/exploits/16933 -CVE-2011-1100 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4992.php -CVE-2011-1127 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip -CVE-2011-1128 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip -CVE-2011-1129 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip -CVE-2011-1130 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip -CVE-2011-1131 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip -CVE-2011-1137 - http://www.exploit-db.com/exploits/16129/ -CVE-2011-1141 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5732 -CVE-2011-1150 - https://www.openwall.com/lists/oss-security/2011/03/14/20 -CVE-2011-1151 - https://packetstormsecurity.com/files/101835/Joomla-1.6.0-SQL-Injection.html -CVE-2011-1151 - https://www.openwall.com/lists/oss-security/2011/03/14/21 -CVE-2011-1153 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1163 - http://securityreason.com/securityalert/8189 -CVE-2011-1170 - http://securityreason.com/securityalert/8278 -CVE-2011-1171 - http://securityreason.com/securityalert/8278 -CVE-2011-1172 - http://securityreason.com/securityalert/8278 -CVE-2011-1173 - http://securityreason.com/securityalert/8279 -CVE-2011-1178 - http://www.redhat.com/support/errata/RHSA-2011-0837.html -CVE-2011-1183 - http://securityreason.com/securityalert/8187 -CVE-2011-1206 - http://securityreason.com/securityalert/8213 -CVE-2011-1213 - http://securityreason.com/securityalert/8285 -CVE-2011-1220 - http://www.securityfocus.com/archive/1/518199/100/0/threaded -CVE-2011-1243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 -CVE-2011-1249 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-046 -CVE-2011-1249 - https://www.exploit-db.com/exploits/40564/ -CVE-2011-1252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -CVE-2011-1257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1260 - http://securityreason.com/securityalert/8275 -CVE-2011-1276 - http://securityreason.com/securityalert/8330 -CVE-2011-1331 - http://www.symantec.com/connect/blogs/targeted-attacks-2011-using-ichitaro-zero-day-vulnerability -CVE-2011-1345 - https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011 -CVE-2011-1346 - https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011 -CVE-2011-1347 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1347 - https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011 -CVE-2011-1407 - http://www.ubuntu.com/usn/USN-1135-1 -CVE-2011-1411 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2011-1412 - http://securityreason.com/securityalert/8324 -CVE-2011-1428 - http://savannah.nongnu.org/patch/index.php?7459 -CVE-2011-1429 - http://securityreason.com/securityalert/8143 -CVE-2011-1431 - http://securityreason.com/securityalert/8144 -CVE-2011-1464 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1466 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1467 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1469 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1470 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1471 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 -CVE-2011-1473 - http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html -CVE-2011-1473 - http://www.ietf.org/mail-archive/web/tls/current/msg07553.html -CVE-2011-1474 - http://seclists.org/oss-sec/2011/q1/579 -CVE-2011-1475 - http://securityreason.com/securityalert/8188 -CVE-2011-1478 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1480 - http://www.openwall.com/lists/oss-security/2011/03/23/7 -CVE-2011-1480 - http://www.openwall.com/lists/oss-security/2011/03/30/6 -CVE-2011-1481 - http://www.openwall.com/lists/oss-security/2011/03/23/8 -CVE-2011-1481 - http://www.openwall.com/lists/oss-security/2011/03/30/7 -CVE-2011-1482 - http://www.openwall.com/lists/oss-security/2011/03/23/9 -CVE-2011-1482 - http://www.openwall.com/lists/oss-security/2011/03/30/8 -CVE-2011-1487 - https://bugzilla.redhat.com/show_bug.cgi?id=692898 -CVE-2011-1488 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488 -CVE-2011-1489 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 -CVE-2011-1490 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 -CVE-2011-1494 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1495 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1502 - http://issues.liferay.com/browse/LPS-14927 -CVE-2011-1503 - http://issues.liferay.com/browse/LPS-13762 -CVE-2011-1503 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 -CVE-2011-1504 - http://issues.liferay.com/browse/LPS-11506 -CVE-2011-1504 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 -CVE-2011-1508 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 -CVE-2011-1509 - http://securityreason.com/securityalert/8385 -CVE-2011-1509 - http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp -CVE-2011-1510 - http://securityreason.com/securityalert/8385 -CVE-2011-1510 - http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp -CVE-2011-1511 - http://securityreason.com/securityalert/8254 -CVE-2011-1511 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-1512 - http://securityreason.com/securityalert/8263 -CVE-2011-1512 - http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow -CVE-2011-1513 - http://www.coresecurity.com/content/e107-cms-script-command-injection -CVE-2011-1514 - http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities -CVE-2011-1515 - http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities -CVE-2011-1516 - http://www.coresecurity.com/content/apple-osx-sandbox-bypass -CVE-2011-1523 - http://openwall.com/lists/oss-security/2011/03/25/3 -CVE-2011-1523 - https://bugzilla.redhat.com/show_bug.cgi?id=690877 -CVE-2011-1524 - http://securityreason.com/securityalert/8166 -CVE-2011-1524 - http://sotiriu.de/adv/NSOADV-2011-001.txt -CVE-2011-1525 - http://aluigi.org/adv/real_5-adv.txt -CVE-2011-1525 - http://securityreason.com/securityalert/8181 -CVE-2011-1525 - http://www.exploit-db.com/exploits/17019 -CVE-2011-1526 - http://securityreason.com/securityalert/8301 -CVE-2011-1527 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt -CVE-2011-1528 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt -CVE-2011-1529 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt -CVE-2011-1546 - http://securityreason.com/securityalert/8172 -CVE-2011-1546 - http://www.exploit-db.com/exploits/17084/ -CVE-2011-1547 - http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080031.html -CVE-2011-1548 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544 -CVE-2011-1552 - http://securityreason.com/securityalert/8171 -CVE-2011-1552 - http://www.toucan-system.com/advisories/tssa-2011-01.txt -CVE-2011-1553 - http://securityreason.com/securityalert/8171 -CVE-2011-1553 - http://www.toucan-system.com/advisories/tssa-2011-01.txt -CVE-2011-1554 - http://securityreason.com/securityalert/8171 -CVE-2011-1554 - http://www.toucan-system.com/advisories/tssa-2011-01.txt -CVE-2011-1556 - http://www.autosectools.com/Advisories/Andy%27s.PHP.Knowledgebase.Project.0.95.4_SQL.Injection_161.html -CVE-2011-1556 - http://www.exploit-db.com/exploits/17061/ -CVE-2011-1563 - http://aluigi.org/adv/realwin_2-adv.txt -CVE-2011-1563 - http://aluigi.org/adv/realwin_3-adv.txt -CVE-2011-1563 - http://aluigi.org/adv/realwin_4-adv.txt -CVE-2011-1563 - http://aluigi.org/adv/realwin_5-adv.txt -CVE-2011-1563 - http://aluigi.org/adv/realwin_7-adv.txt -CVE-2011-1563 - http://aluigi.org/adv/realwin_8-adv.txt -CVE-2011-1563 - http://securityreason.com/securityalert/8176 -CVE-2011-1563 - http://www.exploit-db.com/exploits/17025 -CVE-2011-1564 - http://aluigi.org/adv/realwin_6-adv.txt -CVE-2011-1564 - http://securityreason.com/securityalert/8177 -CVE-2011-1564 - http://www.exploit-db.com/exploits/17025 -CVE-2011-1565 - http://aluigi.org/adv/igss_1-adv.txt -CVE-2011-1565 - http://securityreason.com/securityalert/8178 -CVE-2011-1565 - http://www.exploit-db.com/exploits/17024 -CVE-2011-1566 - http://aluigi.org/adv/igss_8-adv.txt -CVE-2011-1566 - http://www.exploit-db.com/exploits/17024 -CVE-2011-1567 - http://aluigi.org/adv/igss_2-adv.txt -CVE-2011-1567 - http://aluigi.org/adv/igss_3-adv.txt -CVE-2011-1567 - http://aluigi.org/adv/igss_4-adv.txt -CVE-2011-1567 - http://aluigi.org/adv/igss_5-adv.txt -CVE-2011-1567 - http://aluigi.org/adv/igss_7-adv.txt -CVE-2011-1567 - http://securityreason.com/securityalert/8179 -CVE-2011-1567 - http://securityreason.com/securityalert/8251 -CVE-2011-1567 - http://www.exploit-db.com/exploits/17024 -CVE-2011-1568 - http://aluigi.org/adv/igss_6-adv.txt -CVE-2011-1568 - http://securityreason.com/securityalert/8182 -CVE-2011-1568 - http://www.exploit-db.com/exploits/17024 -CVE-2011-1569 - http://securityreason.com/securityalert/8180 -CVE-2011-1569 - http://soroush.secproject.com/blog/2011/01/unrestricted_file_download_v1_0/ -CVE-2011-1569 - http://www.exploit-db.com/exploits/17011 -CVE-2011-1570 - http://issues.liferay.com/browse/LPS-12628 -CVE-2011-1570 - http://issues.liferay.com/browse/LPS-13250 -CVE-2011-1570 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 -CVE-2011-1571 - http://issues.liferay.com/browse/LPS-14726 -CVE-2011-1571 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 -CVE-2011-1590 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15050 -CVE-2011-1591 - http://www.exploit-db.com/exploits/17195 -CVE-2011-1591 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836 -CVE-2011-1595 - https://bugzilla.redhat.com/show_bug.cgi?id=676252 -CVE-2011-1652 - http://resources.infosecinstitute.com/slaac-attack/ -CVE-2011-1657 - https://bugs.php.net/bug.php?id=54681 -CVE-2011-1658 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1659 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html -CVE-2011-1666 - http://securityreason.com/securityalert/8191 -CVE-2011-1667 - http://securityreason.com/securityalert/8192 -CVE-2011-1667 - http://www.exploit-db.com/exploits/17102 -CVE-2011-1668 - http://securityreason.com/securityalert/8193 -CVE-2011-1669 - http://www.autosectools.com/Advisories/WordPress.WP.Custom.Pages.0.5.0.1_Local.File.Inclusion_169.html -CVE-2011-1669 - http://www.exploit-db.com/exploits/17119 -CVE-2011-1670 - http://securityreason.com/securityalert/8195 -CVE-2011-1670 - http://www.exploit-db.com/exploits/17098 -CVE-2011-1671 - http://securityreason.com/securityalert/8196 -CVE-2011-1671 - http://www.mavitunasecurity.com/XSS-vulnerability-in-Tracks/ -CVE-2011-1685 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 -CVE-2011-1686 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 -CVE-2011-1687 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 -CVE-2011-1688 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 -CVE-2011-1689 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 -CVE-2011-1690 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 -CVE-2011-1714 - http://www.autosectools.com/Advisories/eyeOS.2.3_Reflected.Cross-site.Scripting_172.html -CVE-2011-1714 - http://www.exploit-db.com/exploits/17127 -CVE-2011-1715 - http://www.autosectools.com/Advisories/eyeOS.2.3_Local.File.Inclusion_173.html -CVE-2011-1715 - http://www.exploit-db.com/exploits/17127 -CVE-2011-1717 - http://www.androidpolice.com/2011/04/14/exclusive-vulnerability-in-skype-for-android-is-exposing-your-name-phone-number-chat-logs-and-a-lot-more/ -CVE-2011-1717 - http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/ -CVE-2011-1721 - http://securityreason.com/securityalert/8212 -CVE-2011-1723 - http://securityreason.com/securityalert/8211 -CVE-2011-1723 - http://www.mavitunasecurity.com/XSS-vulnerability-in-Redmine/ -CVE-2011-1749 - http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download -CVE-2011-1751 - https://github.com/nelhage/virtunoid -CVE-2011-1760 - https://bugzilla.redhat.com/show_bug.cgi?id=700883 -CVE-2011-1761 - http://www.exploit-db.com/exploits/17222 -CVE-2011-1771 - http://securityreason.com/securityalert/8367 -CVE-2011-1776 - http://securityreason.com/securityalert/8369 -CVE-2011-1829 - http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog -CVE-2011-1833 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-1838 - http://securityreason.com/securityalert/8257 -CVE-2011-1838 - http://www.mavitunasecurity.com/XSS-vulnerability-in-Twiki/ -CVE-2011-1857 - http://securityreason.com/securityalert/8273 -CVE-2011-1858 - http://securityreason.com/securityalert/8273 -CVE-2011-1859 - http://securityreason.com/securityalert/8273 -CVE-2011-1860 - http://securityreason.com/securityalert/8273 -CVE-2011-1861 - http://securityreason.com/securityalert/8273 -CVE-2011-1862 - http://securityreason.com/securityalert/8273 -CVE-2011-1863 - http://securityreason.com/securityalert/8273 -CVE-2011-1865 - http://securityreason.com/securityalert/8288 -CVE-2011-1865 - http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities -CVE-2011-1865 - http://www.exploit-db.com/exploits/17458 -CVE-2011-1865 - http://www.exploit-db.com/exploits/17490 -CVE-2011-1866 - http://securityreason.com/securityalert/8289 -CVE-2011-1866 - http://www.coresecurity.com/content/HP-Data-Protector-EXECCMD-Vulnerability -CVE-2011-1866 - http://www.exploit-db.com/exploits/17461 -CVE-2011-1867 - http://securityreason.com/securityalert/8302 -CVE-2011-1890 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -CVE-2011-1891 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -CVE-2011-1892 - http://securityreason.com/securityalert/8386 -CVE-2011-1892 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -CVE-2011-1893 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -CVE-2011-1938 - http://securityreason.com/securityalert/8294 -CVE-2011-1939 - https://bugs.php.net/bug.php?id=47802 -CVE-2011-1944 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2011-1952 - http://securityreason.com/securityalert/8270 -CVE-2011-1953 - http://securityreason.com/securityalert/8270 -CVE-2011-1954 - http://securityreason.com/securityalert/8270 -CVE-2011-1960 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1961 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1962 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1963 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1964 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-1968 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-065 -CVE-2011-1974 - https://www.exploit-db.com/exploits/40627/ -CVE-2011-1976 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-067 -CVE-2011-1982 - http://www.kb.cert.org/vuls/id/909022 -CVE-2011-1984 - http://securityreason.com/securityalert/8378 -CVE-2011-2003 - http://securityreason.com/securityalert/8473 -CVE-2011-2009 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-076 -CVE-2011-2023 - http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14121 -CVE-2011-2039 - http://securityreason.com/securityalert/8272 -CVE-2011-2074 - http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/ -CVE-2011-2076 - http://securityreason.com/securityalert/8245 -CVE-2011-2077 - http://securityreason.com/securityalert/8245 -CVE-2011-2078 - http://securityreason.com/securityalert/8245 -CVE-2011-2079 - http://securityreason.com/securityalert/8245 -CVE-2011-2080 - http://securityreason.com/securityalert/8245 -CVE-2011-2081 - http://securityreason.com/securityalert/8245 -CVE-2011-2089 - http://www.exploit-db.com/exploits/17240 -CVE-2011-2105 - http://www.kb.cert.org/vuls/id/264729 -CVE-2011-2122 - http://www.securityfocus.com/archive/1/518439/100/0/threaded -CVE-2011-2131 - http://securityreason.com/securityalert/8347 -CVE-2011-2151 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-2154 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-2155 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-2158 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-2160 - http://ffmpeg.mplayerhq.hu/ -CVE-2011-2161 - http://ffmpeg.mplayerhq.hu/ -CVE-2011-2168 - http://securityreason.com/achievement_securityalert/97 -CVE-2011-2174 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5908 -CVE-2011-2179 - http://securityreason.com/securityalert/8274 -CVE-2011-2189 - http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 -CVE-2011-2189 - https://bugzilla.redhat.com/show_bug.cgi?id=711134 -CVE-2011-2189 - https://bugzilla.redhat.com/show_bug.cgi?id=711245 -CVE-2011-2193 - http://securityreason.com/securityalert/8304 -CVE-2011-2195 - https://seclists.org/bugtraq/2011/Jun/34 -CVE-2011-2198 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2011-2198 - https://bugzilla.redhat.com/show_bug.cgi?id=712148 -CVE-2011-2201 - https://bugzilla.redhat.com/show_bug.cgi?id=712694 -CVE-2011-2207 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2207 -CVE-2011-2214 - http://securityreason.com/securityalert/8265 -CVE-2011-2220 - http://securityreason.com/securityalert/8305 -CVE-2011-2230 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2231 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2232 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2237 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2238 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2239 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2240 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2241 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2242 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2243 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2244 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2245 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2246 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2248 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2249 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2250 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2251 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2252 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2253 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2255 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2257 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2258 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2259 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2260 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2261 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2262 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2263 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2264 - http://www.kb.cert.org/vuls/id/103425 -CVE-2011-2264 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2267 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2271 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2272 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2273 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2274 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2275 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2277 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2278 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2279 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2280 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2281 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2282 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2283 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2284 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2285 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2286 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2287 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2288 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2289 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2290 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2291 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2292 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2293 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2294 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2295 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2296 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2297 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2298 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2299 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2300 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2301 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2302 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2303 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2304 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2305 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2306 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2307 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -CVE-2011-2308 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2309 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2310 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2311 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2312 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2313 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2314 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2315 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2316 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2317 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2318 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2319 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2320 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2321 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2322 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2323 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2324 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2325 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2326 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-2327 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-2330 - http://www.securityfocus.com/archive/1/518199/100/0/threaded -CVE-2011-2357 - http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html -CVE-2011-2357 - http://seclists.org/fulldisclosure/2011/Aug/9 -CVE-2011-2357 - http://securityreason.com/securityalert/8335 -CVE-2011-2363 - https://bugzilla.mozilla.org/show_bug.cgi?id=648160 -CVE-2011-2365 - https://bugzilla.mozilla.org/show_bug.cgi?id=655742 -CVE-2011-2366 - https://bugzilla.mozilla.org/show_bug.cgi?id=655987 -CVE-2011-2366 - https://bugzilla.mozilla.org/show_bug.cgi?id=656277 -CVE-2011-2366 - https://bugzilla.mozilla.org/show_bug.cgi?id=659349 -CVE-2011-2366 - https://hacks.mozilla.org/2011/06/cross-domain-webgl-textures-disabled-in-firefox-5/ -CVE-2011-2369 - https://bugzilla.mozilla.org/show_bug.cgi?id=650001 -CVE-2011-2371 - https://bugzilla.mozilla.org/show_bug.cgi?id=664009 -CVE-2011-2372 - https://bugzilla.mozilla.org/show_bug.cgi?id=657462 -CVE-2011-2378 - https://bugzilla.mozilla.org/show_bug.cgi?id=648065 -CVE-2011-2382 - http://ju12.tistory.com/attachment/cfile4.uf@151FAB4C4DDC9E0002A6FE.ppt -CVE-2011-2382 - http://www.networkworld.com/community/node/74259 -CVE-2011-2382 - http://www.theregister.co.uk/2011/05/25/microsoft_internet_explorer_cookiejacking/ -CVE-2011-2382 - http://www.youtube.com/watch?v=V95CX-3JpK0 -CVE-2011-2382 - http://www.youtube.com/watch?v=VsSkcnIFCxM -CVE-2011-2382 - https://sites.google.com/site/tentacoloviola/cookiejacking/Cookiejacking2011_final.ppt -CVE-2011-2383 - http://ju12.tistory.com/attachment/cfile4.uf@151FAB4C4DDC9E0002A6FE.ppt -CVE-2011-2383 - http://www.networkworld.com/community/node/74259 -CVE-2011-2383 - http://www.theregister.co.uk/2011/05/25/microsoft_internet_explorer_cookiejacking/ -CVE-2011-2383 - http://www.youtube.com/watch?v=V95CX-3JpK0 -CVE-2011-2383 - http://www.youtube.com/watch?v=VsSkcnIFCxM -CVE-2011-2383 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -CVE-2011-2383 - https://sites.google.com/site/tentacoloviola/cookiejacking/Cookiejacking2011_final.ppt -CVE-2011-2395 - http://securityreason.com/securityalert/8271 -CVE-2011-2398 - http://securityreason.com/securityalert/8303 -CVE-2011-2399 - http://securityreason.com/securityalert/8320 -CVE-2011-2402 - http://securityreason.com/securityalert/8321 -CVE-2011-2403 - http://securityreason.com/securityalert/8321 -CVE-2011-2412 - http://securityreason.com/securityalert/8390 -CVE-2011-2443 - http://securityreason.com/securityalert/8410 -CVE-2011-2443 - http://www.exploit-db.com/exploits/17918/ -CVE-2011-2443 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php -CVE-2011-2461 - http://packetstormsecurity.com/files/131376/Magento-eCommerce-Vulnerable-Adobe-Flex-SDK.html -CVE-2011-2461 - https://threatpost.com/adobe-cve-2011-2461-remains-exploitable-four-years-after-patch/111754 -CVE-2011-2467 - https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt -CVE-2011-2471 - https://bugzilla.redhat.com/show_bug.cgi?id=700883 -CVE-2011-2472 - https://bugzilla.redhat.com/show_bug.cgi?id=700883 -CVE-2011-2494 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-2494 - https://bugzilla.redhat.com/show_bug.cgi?id=716842 -CVE-2011-2495 - https://bugzilla.redhat.com/show_bug.cgi?id=716825 -CVE-2011-2500 - http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download -CVE-2011-2505 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html -CVE-2011-2505 - http://securityreason.com/securityalert/8306 -CVE-2011-2506 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html -CVE-2011-2506 - http://securityreason.com/securityalert/8306 -CVE-2011-2507 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html -CVE-2011-2507 - http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html -CVE-2011-2507 - http://securityreason.com/securityalert/8306 -CVE-2011-2508 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html -CVE-2011-2508 - http://securityreason.com/securityalert/8306 -CVE-2011-2509 - http://www.openwall.com/lists/oss-security/2011/06/28/4 -CVE-2011-2509 - http://www.openwall.com/lists/oss-security/2011/06/29/12 -CVE-2011-2522 - http://securityreason.com/securityalert/8317 -CVE-2011-2522 - http://www.exploit-db.com/exploits/17577 -CVE-2011-2522 - https://bugzilla.samba.org/show_bug.cgi?id=8290 -CVE-2011-2523 - http://packetstormsecurity.com/files/162145/vsftpd-2.3.4-Backdoor-Command-Execution.html -CVE-2011-2523 - https://packetstormsecurity.com/files/102745/VSFTPD-2.3.4-Backdoor-Command-Execution.html -CVE-2011-2523 - https://vigilance.fr/vulnerability/vsftpd-backdoor-in-version-2-3-4-10805 -CVE-2011-2525 - http://kerneltrap.org/mailarchive/linux-netdev/2010/5/21/6277805 -CVE-2011-2543 - http://securityreason.com/securityalert/8393 -CVE-2011-2543 - http://www.exploit-db.com/exploits/17871 -CVE-2011-2544 - http://securityreason.com/securityalert/8393 -CVE-2011-2544 - http://www.exploit-db.com/exploits/17871 -CVE-2011-2577 - http://securityreason.com/securityalert/8387 -CVE-2011-2577 - http://www.exploit-db.com/exploits/17871 -CVE-2011-2598 - http://www.theregister.co.uk/2011/06/16/webgl_security_threats_redux/ -CVE-2011-2608 - http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt -CVE-2011-2685 - http://www.kb.cert.org/vuls/id/953183 -CVE-2011-2694 - https://bugzilla.samba.org/show_bug.cgi?id=8289 -CVE-2011-2697 - http://www.openwall.com/lists/oss-security/2011/07/13/3 -CVE-2011-2697 - http://www.openwall.com/lists/oss-security/2011/07/18/3 -CVE-2011-2697 - http://www.openwall.com/lists/oss-security/2011/07/28/1 -CVE-2011-2698 - http://www.openwall.com/lists/oss-security/2011/07/19/5 -CVE-2011-2698 - http://www.openwall.com/lists/oss-security/2011/07/20/2 -CVE-2011-2698 - https://bugzilla.redhat.com/show_bug.cgi?id=723215 -CVE-2011-2699 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-2701 - http://securityreason.com/securityalert/8325 -CVE-2011-2702 - http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/ -CVE-2011-2707 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-2710 - http://www.openwall.com/lists/oss-security/2011/07/22/1 -CVE-2011-2710 - http://www.openwall.com/lists/oss-security/2011/07/22/5 -CVE-2011-2716 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2011-2716 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2011-2716 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2011-2716 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2011-2719 - http://securityreason.com/securityalert/8322 -CVE-2011-2725 - http://packetstormsecurity.com/files/105610/Ark-2.16-Directory-Traversal.html -CVE-2011-2725 - https://bugzilla.redhat.com/show_bug.cgi?id=725764 -CVE-2011-2730 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2011-2743 - http://securityreason.com/securityalert/8312 -CVE-2011-2743 - http://www.ocert.org/advisories/ocert-2011-001.html -CVE-2011-2744 - http://securityreason.com/securityalert/8312 -CVE-2011-2744 - http://www.ocert.org/advisories/ocert-2011-001.html -CVE-2011-2744 - http://www.openwall.com/lists/oss-security/2011/07/13/5 -CVE-2011-2745 - http://securityreason.com/securityalert/8314 -CVE-2011-2745 - http://www.openwall.com/lists/oss-security/2011/07/13/5 -CVE-2011-2750 - http://aluigi.org/adv/nfr_2-adv.txt -CVE-2011-2750 - http://securityreason.com/securityalert/8309 -CVE-2011-2762 - http://securityreason.com/securityalert/8364 -CVE-2011-2763 - http://securityreason.com/securityalert/8363 -CVE-2011-2764 - http://securityreason.com/securityalert/8324 -CVE-2011-2780 - http://securityreason.com/securityalert/8312 -CVE-2011-2780 - http://www.ocert.org/advisories/ocert-2011-001.html -CVE-2011-2780 - http://www.openwall.com/lists/oss-security/2011/07/13/5 -CVE-2011-2837 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14139 -CVE-2011-2841 - http://securityreason.com/securityalert/8411 -CVE-2011-2841 - https://www.exploit-db.com/exploits/17929/ -CVE-2011-2891 - http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html -CVE-2011-2892 - http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html -CVE-2011-2904 - https://support.zabbix.com/browse/ZBX-3835 -CVE-2011-2905 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-2906 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-2917 - http://www.openwall.com/lists/oss-security/2011/08/12/6 -CVE-2011-2917 - http://yehg.net/lab/pr0js/advisories/%5Bmambo4.6_x%5D_sql_injection -CVE-2011-2918 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-2921 - http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html -CVE-2011-2922 - https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html -CVE-2011-2922 - https://packetstormsecurity.com/files/cve/CVE-2011-2922 -CVE-2011-2928 - http://securityreason.com/securityalert/8360 -CVE-2011-2934 - https://www.openwall.com/lists/oss-security/2011/08/19/13 -CVE-2011-2935 - https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities -CVE-2011-2936 - https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities -CVE-2011-2938 - http://packetstormsecurity.org/files/104149 -CVE-2011-2938 - http://securityreason.com/securityalert/8391 -CVE-2011-2944 - http://packetstormsecurity.org/files/110166/The-Uploader-2.0.4-Eng-Ita-Remote-File-Upload.html -CVE-2011-2964 - http://www.openwall.com/lists/oss-security/2011/07/13/3 -CVE-2011-2964 - http://www.openwall.com/lists/oss-security/2011/07/18/3 -CVE-2011-2964 - http://www.openwall.com/lists/oss-security/2011/07/28/1 -CVE-2011-2987 - https://bugzilla.mozilla.org/show_bug.cgi?id=665934 -CVE-2011-2988 - https://bugzilla.mozilla.org/show_bug.cgi?id=665936 -CVE-2011-2989 - https://bugzilla.mozilla.org/show_bug.cgi?id=674042 -CVE-2011-3001 - https://bugzilla.mozilla.org/show_bug.cgi?id=672485 -CVE-2011-3003 - https://bugzilla.mozilla.org/show_bug.cgi?id=682335 -CVE-2011-3010 - http://www.mavitunasecurity.com/xss-vulnerability-in-twiki5 -CVE-2011-3012 - http://securityreason.com/securityalert/8324 -CVE-2011-3046 - https://plus.google.com/u/0/116651741222993143554/posts/5Eq5d9XgFqs -CVE-2011-3079 - https://bugzilla.mozilla.org/show_bug.cgi?id=1087565 -CVE-2011-3143 - http://www.digitalbond.com/scadapedia/vulnerability-notes/heap-overflow-vulnerability/ -CVE-2011-3144 - http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/ -CVE-2011-3182 - http://marc.info/?l=full-disclosure&m=131373057621672&w=2 -CVE-2011-3182 - http://securityreason.com/achievement_securityalert/101 -CVE-2011-3183 - https://www.openwall.com/lists/oss-security/2011/08/22/11 -CVE-2011-3187 - http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html -CVE-2011-3188 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-3190 - http://securityreason.com/securityalert/8362 -CVE-2011-3191 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-3192 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3192 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-3192 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3192 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2011-3201 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2011-3202 - https://www.openwall.com/lists/oss-security/2011/08/30/5 -CVE-2011-3203 - https://www.openwall.com/lists/oss-security/2011/08/30/6 -CVE-2011-3250 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15825 -CVE-2011-3296 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3297 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3298 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3299 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3300 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3301 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3302 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3303 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml -CVE-2011-3322 - http://securityreason.com/securityalert/8374 -CVE-2011-3322 - http://www.exploit-db.com/exploits/17827 -CVE-2011-3332 - http://www.kb.cert.org/vuls/id/225833 -CVE-2011-3336 - http://seclists.org/fulldisclosure/2014/Mar/166 -CVE-2011-3336 - https://cxsecurity.com/issue/WLB-2011110082 -CVE-2011-3340 - http://census-labs.com/news/2011/10/03/netvolution-referer-SQLi/ -CVE-2011-3348 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2011-3352 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3352 -CVE-2011-3352 - https://www.immuniweb.com/advisory/HTB23039 -CVE-2011-3353 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-3356 - http://securityreason.com/securityalert/8392 -CVE-2011-3356 - http://www.mantisbt.org/bugs/view.php?id=13191 -CVE-2011-3356 - http://www.mantisbt.org/bugs/view.php?id=13281 -CVE-2011-3357 - http://securityreason.com/securityalert/8392 -CVE-2011-3357 - http://www.mantisbt.org/bugs/view.php?id=13281 -CVE-2011-3358 - http://securityreason.com/securityalert/8392 -CVE-2011-3362 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog -CVE-2011-3362 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog -CVE-2011-3368 - http://www.exploit-db.com/exploits/17969 -CVE-2011-3368 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2011-3368 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-3386 - http://www.darkreading.com/security/vulnerabilities/231300312/getting-root-on-the-human-body.html -CVE-2011-3386 - http://www.hanselman.com/blog/HackersCanKillDiabeticsWithInsulinPumpsFromAHalfMileAwayUmNoFactsVsJournalisticFearMongering.aspx -CVE-2011-3386 - http://www.scmagazineus.com/black-hat-insulin-pumps-can-be-hacked/article/209106/ -CVE-2011-3389 - http://vnhacker.blogspot.com/2011/09/beast.html -CVE-2011-3389 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3389 - http://www.imperialviolet.org/2011/09/23/chromeandbeast.html -CVE-2011-3389 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2011-3389 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2011-3389 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3389 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 -CVE-2011-3390 - http://securityreason.com/securityalert/8370 -CVE-2011-3390 - http://voidroot.blogspot.com/2011/08/xss-in-ibm-open-admin-tool.html -CVE-2011-3393 - http://securityreason.com/securityalert/8376 -CVE-2011-3394 - http://securityreason.com/securityalert/8376 -CVE-2011-3402 - http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two -CVE-2011-3402 - http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit -CVE-2011-3402 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 -CVE-2011-3410 - http://www.kb.cert.org/vuls/id/361441 -CVE-2011-3410 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 -CVE-2011-3411 - http://www.kb.cert.org/vuls/id/361441 -CVE-2011-3411 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 -CVE-2011-3412 - http://www.kb.cert.org/vuls/id/361441 -CVE-2011-3412 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 -CVE-2011-3414 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-3478 - https://www.exploit-db.com/exploits/38599/ -CVE-2011-3487 - https://www.exploit-db.com/exploits/42706/ -CVE-2011-3488 - http://aluigi.altervista.org/adv/metastock_1-adv.txt -CVE-2011-3489 - http://aluigi.altervista.org/adv/rslogix_1-adv.txt -CVE-2011-3489 - http://securityreason.com/securityalert/8383 -CVE-2011-3490 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt -CVE-2011-3490 - http://securityreason.com/securityalert/8382 -CVE-2011-3490 - http://www.exploit-db.com/exploits/17848 -CVE-2011-3491 - http://aluigi.altervista.org/adv/movicon_1-adv.txt -CVE-2011-3492 - http://aluigi.altervista.org/adv/daqfactory_1-adv.txt -CVE-2011-3492 - http://www.exploit-db.com/exploits/17855 -CVE-2011-3493 - http://aluigi.altervista.org/adv/cogent_1-adv.txt -CVE-2011-3494 - http://aluigi.altervista.org/adv/esignal_1-adv.txt -CVE-2011-3495 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt -CVE-2011-3495 - http://securityreason.com/securityalert/8382 -CVE-2011-3496 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt -CVE-2011-3496 - http://securityreason.com/securityalert/8382 -CVE-2011-3496 - http://www.exploit-db.com/exploits/17848 -CVE-2011-3497 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt -CVE-2011-3497 - http://securityreason.com/securityalert/8382 -CVE-2011-3498 - http://aluigi.altervista.org/adv/movicon_1-adv.txt -CVE-2011-3499 - http://aluigi.altervista.org/adv/movicon_3-adv.txt -CVE-2011-3501 - http://aluigi.altervista.org/adv/cogent_3-adv.txt -CVE-2011-3504 - http://ubuntu.com/usn/usn-1320-1 -CVE-2011-3504 - http://ubuntu.com/usn/usn-1333-1 -CVE-2011-3504 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog -CVE-2011-3504 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog -CVE-2011-3506 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3507 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3508 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3509 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3510 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3511 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3512 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3513 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3514 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3515 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3516 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3516 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3517 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3518 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3519 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3520 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3521 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3521 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3522 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3523 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3524 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3525 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3526 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3527 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3528 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3529 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3530 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3531 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3532 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3533 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3534 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3535 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3536 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3537 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3538 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3539 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3541 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3542 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3543 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3544 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3544 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3545 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3545 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3546 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3546 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3547 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3547 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3548 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3548 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3549 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3549 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3550 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3550 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3551 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3551 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3552 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3552 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3553 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3553 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3554 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3554 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3555 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3555 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3556 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3556 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3557 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3557 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3558 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3558 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3559 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -CVE-2011-3560 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3560 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3561 - http://www.ibm.com/developerworks/java/jdk/alerts/ -CVE-2011-3561 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -CVE-2011-3562 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-3563 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2011-3563 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2011-3564 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3565 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3566 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3568 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3569 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3570 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3571 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3573 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3574 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-3578 - http://securityreason.com/securityalert/8392 -CVE-2011-3578 - http://www.mantisbt.org/bugs/view.php?id=13281 -CVE-2011-3579 - http://securityreason.com/securityalert/8404 -CVE-2011-3580 - http://securityreason.com/securityalert/8404 -CVE-2011-3582 - https://www.openwall.com/lists/oss-security/2011/09/30/3 -CVE-2011-3595 - http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-stable%5D_cross_site_scripting%28XSS%29 -CVE-2011-3595 - https://www.openwall.com/lists/oss-security/2011/10/04/7 -CVE-2011-3596 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3596 -CVE-2011-3607 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/ -CVE-2011-3607 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html -CVE-2011-3607 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2011-3607 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-3609 - https://bugzilla.redhat.com/show_bug.cgi?id=743006 -CVE-2011-3609 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3609 -CVE-2011-3610 - https://packetstormsecurity.com/files/105054/Secunia-Security-Advisory-46005.html -CVE-2011-3611 - https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html -CVE-2011-3611 - https://www.immuniweb.com/advisory/HTB22913 -CVE-2011-3612 - https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html -CVE-2011-3612 - https://www.immuniweb.com/advisory/HTB22913 -CVE-2011-3613 - https://packetstormsecurity.com/files/105853/Secunia-Security-Advisory-46387.html -CVE-2011-3614 - https://packetstormsecurity.com/files/105853/Secunia-Security-Advisory-46387.html -CVE-2011-3640 - http://blog.acrossecurity.com/2011/10/google-chrome-pkcs11txt-file-planting.html -CVE-2011-3645 - http://securityreason.com/securityalert/8394 -CVE-2011-3648 - https://bugzilla.mozilla.org/show_bug.cgi?id=690225 -CVE-2011-3657 - https://bugzilla.mozilla.org/show_bug.cgi?id=697699 -CVE-2011-3658 - https://bugzilla.mozilla.org/show_bug.cgi?id=708186 -CVE-2011-3659 - https://bugzilla.mozilla.org/show_bug.cgi?id=708198 -CVE-2011-3663 - https://bugzilla.mozilla.org/show_bug.cgi?id=704482 -CVE-2011-3668 - https://bugzilla.mozilla.org/show_bug.cgi?id=703975 -CVE-2011-3669 - https://bugzilla.mozilla.org/show_bug.cgi?id=703983 -CVE-2011-3671 - https://bugzilla.mozilla.org/show_bug.cgi?id=739343 -CVE-2011-3713 - http://packetstormsecurity.com/files/129666 -CVE-2011-3829 - http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt -CVE-2011-3833 - http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt -CVE-2011-3881 - http://www.rafayhackingarticles.net/2014/10/a-tale-of-another-sop-bypass-in-android.html -CVE-2011-3901 - https://seclists.org/fulldisclosure/2012/May/19 -CVE-2011-3923 - http://seclists.org/fulldisclosure/2014/Jul/38 -CVE-2011-3923 - http://www.exploit-db.com/exploits/24874 -CVE-2011-3929 - http://ffmpeg.org/ -CVE-2011-3936 - http://ffmpeg.org/ -CVE-2011-3937 - http://ffmpeg.org/security.html -CVE-2011-3940 - http://ffmpeg.org/ -CVE-2011-3945 - http://ffmpeg.org/ -CVE-2011-3947 - http://ffmpeg.org/ -CVE-2011-3951 - http://ffmpeg.org/ -CVE-2011-3952 - http://ffmpeg.org/ -CVE-2011-3973 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog -CVE-2011-3973 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog -CVE-2011-3974 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog -CVE-2011-3974 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog -CVE-2011-3975 - http://news.cnet.com/8301-1035_3-20114556-94/ -CVE-2011-3975 - http://www.androidpolice.com/2011/10/01/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more/ -CVE-2011-3976 - http://www.exploit-db.com/exploits/17876 -CVE-2011-3979 - http://securityreason.com/securityalert/8409 -CVE-2011-3981 - http://www.exploit-db.com/exploits/17861 -CVE-2011-4024 - http://securityreason.com/securityalert/8477 -CVE-2011-4024 - http://www.exploit-db.com/exploits/18005 -CVE-2011-4040 - http://www.kb.cert.org/vuls/id/819630 -CVE-2011-4060 - http://securityreason.com/securityalert/8475 -CVE-2011-4060 - http://www.nth-dimension.org.uk/pub/NDSA20110310.txt.asc -CVE-2011-4061 - http://securityreason.com/securityalert/8476 -CVE-2011-4062 - http://www.exploit-db.com/exploits/17908 -CVE-2011-4066 - http://www.exploit-db.com/exploits/17992 -CVE-2011-4075 - http://www.exploit-db.com/exploits/18021/ -CVE-2011-4081 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-4089 - http://seclists.org/fulldisclosure/2011/Oct/804 -CVE-2011-4089 - http://www.exploit-db.com/exploits/18147 -CVE-2011-4089 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862 -CVE-2011-4091 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2011-4093 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2011-4094 - https://www.exploit-db.com/exploits/18020 -CVE-2011-4106 - http://www.exploit-db.com/exploits/17602 -CVE-2011-4106 - http://www.exploit-db.com/exploits/17872 -CVE-2011-4107 - https://bugzilla.redhat.com/show_bug.cgi?id=751112 -CVE-2011-4112 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-4122 - http://c-skills.blogspot.com/2011/11/openpam-trickery.html -CVE-2011-4122 - http://stealth.openwall.net/xSports/pamslam -CVE-2011-4124 - https://bugs.launchpad.net/calibre/+bug/885027 -CVE-2011-4124 - https://lwn.net/Articles/464824/ -CVE-2011-4125 - https://bugs.launchpad.net/calibre/+bug/885027 -CVE-2011-4125 - https://lwn.net/Articles/464824/ -CVE-2011-4126 - https://bugs.launchpad.net/calibre/+bug/885027 -CVE-2011-4126 - https://lwn.net/Articles/464824/ -CVE-2011-4151 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt -CVE-2011-4153 - http://cxsecurity.com/research/103 -CVE-2011-4153 - http://www.exploit-db.com/exploits/18370/ -CVE-2011-4161 - http://isc.sans.org/diary/Hacking+HP+Printers+for+Fun+and+Profit/12112 -CVE-2011-4231 - http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_34s.html -CVE-2011-4293 - http://moodle.org/mod/forum/discuss.php?d=182736 -CVE-2011-4314 - http://openid.net/2011/05/05/attribute-exchange-security-alert/ -CVE-2011-4317 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2011-4317 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-4317 - https://community.qualys.com/blogs/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issue -CVE-2011-4324 - https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 -CVE-2011-4336 - https://seclists.org/bugtraq/2011/Nov/140 -CVE-2011-4337 - http://www.exploit-db.com/exploits/18132/ -CVE-2011-4337 - http://www.openwall.com/lists/oss-security/2011/11/22/3 -CVE-2011-4339 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2011-4340 - http://seclists.org/bugtraq/2011/Nov/8 -CVE-2011-4340 - http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/ -CVE-2011-4341 - http://seclists.org/bugtraq/2011/Nov/8 -CVE-2011-4341 - http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/ -CVE-2011-4342 - http://seclists.org/fulldisclosure/2011/Mar/328 -CVE-2011-4342 - http://www.exploit-db.com/exploits/17056 -CVE-2011-4342 - http://www.openwall.com/lists/oss-security/2011/11/22/10 -CVE-2011-4342 - http://www.openwall.com/lists/oss-security/2011/11/22/7 -CVE-2011-4344 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2011-11-08.cb -CVE-2011-4345 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2011-4348 - http://www.openwall.com/lists/oss-security/2012/03/05/2 -CVE-2011-4349 - http://www.openwall.com/lists/oss-security/2011/11/25/4 -CVE-2011-4350 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350 -CVE-2011-4352 - http://ffmpeg.org/ -CVE-2011-4352 - http://ubuntu.com/usn/usn-1320-1 -CVE-2011-4352 - http://ubuntu.com/usn/usn-1333-1 -CVE-2011-4353 - http://ffmpeg.org/ -CVE-2011-4353 - http://ubuntu.com/usn/usn-1320-1 -CVE-2011-4353 - http://ubuntu.com/usn/usn-1333-1 -CVE-2011-4354 - http://openwall.com/lists/oss-security/2011/12/01/6 -CVE-2011-4358 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-4360 - https://bugzilla.redhat.com/show_bug.cgi?id=758171 -CVE-2011-4361 - https://bugzilla.redhat.com/show_bug.cgi?id=758171 -CVE-2011-4362 - http://blog.pi3.com.pl/?p=277 -CVE-2011-4362 - http://www.exploit-db.com/exploits/18295 -CVE-2011-4364 - http://ffmpeg.org/ -CVE-2011-4364 - http://ubuntu.com/usn/usn-1320-1 -CVE-2011-4364 - http://ubuntu.com/usn/usn-1333-1 -CVE-2011-4403 - http://seclists.org/fulldisclosure/2012/Feb/171 -CVE-2011-4415 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/ -CVE-2011-4415 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html -CVE-2011-4431 - http://securityreason.com/securityalert/8530 -CVE-2011-4432 - http://securityreason.com/securityalert/8530 -CVE-2011-4453 - http://www.exploit-db.com/exploits/18149/ -CVE-2011-4454 - https://packetstormsecurity.com/files/107082/Tiki-Wiki-CMS-Groupware-Cross-Site-Scripting.html -CVE-2011-4455 - https://packetstormsecurity.com/files/107082/Tiki-Wiki-CMS-Groupware-Cross-Site-Scripting.html -CVE-2011-4457 - http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457 -CVE-2011-4461 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-4461 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2011-4461 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2011-4461 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2011-4462 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-4499 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4500 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4501 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4502 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4503 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4504 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4505 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4506 - http://www.kb.cert.org/vuls/id/357851 -CVE-2011-4516 - http://www.kb.cert.org/vuls/id/887409 -CVE-2011-4516 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-4517 - http://www.kb.cert.org/vuls/id/887409 -CVE-2011-4517 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-4529 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt -CVE-2011-4530 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt -CVE-2011-4531 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt -CVE-2011-4532 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt -CVE-2011-4558 - https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html -CVE-2011-4559 - http://seclists.org/fulldisclosure/2011/Oct/224 -CVE-2011-4559 - http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin -CVE-2011-4566 - http://www.redhat.com/support/errata/RHSA-2012-0019.html -CVE-2011-4579 - http://ffmpeg.org/ -CVE-2011-4579 - http://ubuntu.com/usn/usn-1320-1 -CVE-2011-4579 - http://ubuntu.com/usn/usn-1333-1 -CVE-2011-4582 - http://moodle.org/mod/forum/discuss.php?d=191748 -CVE-2011-4591 - http://moodle.org/mod/forum/discuss.php?d=191760 -CVE-2011-4592 - http://moodle.org/mod/forum/discuss.php?d=191761 -CVE-2011-4594 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 -CVE-2011-4599 - http://bugs.icu-project.org/trac/ticket/8984 -CVE-2011-4613 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652249 -CVE-2011-4642 - http://www.splunk.com/view/SP-CAAAGMM -CVE-2011-4643 - http://www.splunk.com/view/SP-CAAAGMM -CVE-2011-4650 - https://icisystem.blogspot.com/2015/09/cisco-notification-alert-prime-dcnm-01.html -CVE-2011-4670 - http://seclists.org/fulldisclosure/2011/Oct/154 -CVE-2011-4670 - http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_XSS -CVE-2011-4670 - https://www.exploit-db.com/exploits/36203/ -CVE-2011-4670 - https://www.exploit-db.com/exploits/36204/ -CVE-2011-4671 - http://www.exploit-db.com/exploits/18114 -CVE-2011-4672 - http://seclists.org/fulldisclosure/2011/Nov/303 -CVE-2011-4672 - http://www.exploit-db.com/exploits/18128 -CVE-2011-4674 - http://www.exploit-db.com/exploits/18155 -CVE-2011-4674 - https://support.zabbix.com/browse/ZBX-4385 -CVE-2011-4709 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5057.php -CVE-2011-4713 - http://seclists.org/fulldisclosure/2011/Nov/117 -CVE-2011-4713 - http://www.exploit-db.com/exploits/18099 -CVE-2011-4722 - http://www.exploit-db.com/exploits/18189/ -CVE-2011-4725 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4726 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4727 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4728 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4729 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4730 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4731 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4732 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4733 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -CVE-2011-4734 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4735 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4736 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4737 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4738 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4739 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4740 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4741 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4742 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4743 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4744 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html -CVE-2011-4745 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -CVE-2011-4746 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -CVE-2011-4747 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -CVE-2011-4748 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -CVE-2011-4749 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -CVE-2011-4750 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-4751 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-4752 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -CVE-2011-4753 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4754 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4755 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4756 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4757 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4758 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4759 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4760 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4761 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4762 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html -CVE-2011-4763 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html -CVE-2011-4764 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html -CVE-2011-4765 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html -CVE-2011-4766 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html -CVE-2011-4767 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html -CVE-2011-4768 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html -CVE-2011-4776 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4777 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4778 - http://www.splunk.com/view/SP-CAAAGMM -CVE-2011-4801 - http://www.exploit-db.com/exploits/18117 -CVE-2011-4806 - http://www.exploit-db.com/exploits/18045 -CVE-2011-4807 - http://www.exploit-db.com/exploits/18045 -CVE-2011-4815 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-4832 - http://www.exploit-db.com/exploits/18066 -CVE-2011-4834 - http://0a29.blogspot.com/2011/12/0a29-11-2-privilege-escalation.html -CVE-2011-4838 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-4847 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4848 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4849 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4850 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4851 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4852 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4853 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4854 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4855 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4856 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html -CVE-2011-4858 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-4858 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py -CVE-2011-4873 - http://aluigi.altervista.org/adv/atvise_1-adv.txt -CVE-2011-4885 - http://www.exploit-db.com/exploits/18305 -CVE-2011-4885 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-4885 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2011-4885 - http://www.redhat.com/support/errata/RHSA-2012-0019.html -CVE-2011-4885 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py -CVE-2011-4898 - http://www.exploit-db.com/exploits/18417 -CVE-2011-4899 - http://www.exploit-db.com/exploits/18417 -CVE-2011-4905 - https://issues.apache.org/jira/browse/AMQ-3294 -CVE-2011-4906 - https://www.exploit-db.com/exploits/10183 -CVE-2011-4908 - https://www.exploit-db.com/exploits/9926 -CVE-2011-4915 - http://www.openwall.com/lists/oss-security/2011/11/07/9 -CVE-2011-4915 - https://lkml.org/lkml/2011/11/7/340 -CVE-2011-4915 - https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 -CVE-2011-4916 - https://lkml.org/lkml/2011/11/7/355 -CVE-2011-4917 - https://lkml.org/lkml/2011/11/7/340 -CVE-2011-4938 - https://seclists.org/bugtraq/2011/Dec/7 -CVE-2011-4942 - http://www.openwall.com/lists/oss-security/2011/03/18/8 -CVE-2011-4942 - http://yehg.net/lab/pr0js/advisories/%5Bgeeklog1.7.1%5D_cross_site_scripting -CVE-2011-4944 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2011-4946 - http://www.openwall.com/lists/oss-security/2012/03/29/3 -CVE-2011-4947 - http://www.openwall.com/lists/oss-security/2012/03/29/3 -CVE-2011-4948 - http://packetstormsecurity.org/files/101676/eGroupware-1.8.001.20110421-Local-File-Inclusion.html -CVE-2011-4949 - http://packetstormsecurity.org/files/100179/eGroupware-1.8.001-SQL-Injection.html -CVE-2011-4950 - http://packetstormsecurity.org/files/100180/eGroupware-1.8.001-Cross-Site-Scripting.html -CVE-2011-4951 - http://packetstormsecurity.org/files/101675/eGroupware-1.8.001.20110421-Open-Redirect.html -CVE-2011-4966 - https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 -CVE-2011-4969 - http://bugs.jquery.com/ticket/9521 -CVE-2011-4970 - http://site.pi3.com.pl/adv/disk_pool_manager_1.txt -CVE-2011-4970 - http://www.openwall.com/lists/oss-security/2013/03/10/1 -CVE-2011-4971 - http://insecurety.net/?p=872 -CVE-2011-5004 - http://www.vulnerability-lab.com/get_content.php?id=342 -CVE-2011-5012 - http://www.exploit-db.com/exploits/18119 -CVE-2011-5018 - http://www.cloudscan.me/2011/12/cve-2011-5018-koala-framework-xss.html -CVE-2011-5020 - http://www.cloudscan.me/2012/02/cve-2011-5020-online-tv-database-sql.html -CVE-2011-5033 - http://www.exploit-db.com/exploits/18225 -CVE-2011-5034 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-5034 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py -CVE-2011-5035 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-5035 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2011-5035 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2011-5035 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py -CVE-2011-5036 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-5037 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2011-5039 - http://www.exploit-db.com/exploits/18259 -CVE-2011-5039 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5064.php -CVE-2011-5039 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5065.php -CVE-2011-5040 - http://www.exploit-db.com/exploits/18259 -CVE-2011-5040 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5064.php -CVE-2011-5044 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5062.php -CVE-2011-5046 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-008 -CVE-2011-5050 - http://www.vulnerability-lab.com/get_content.php?id=60 -CVE-2011-5053 - http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ -CVE-2011-5054 - http://c-skills.blogspot.com/2011/11/openpam-trickery.html -CVE-2011-5075 - http://www.exploit-db.com/exploits/18132/ -CVE-2011-5075 - http://www.openwall.com/lists/oss-security/2011/11/22/3 -CVE-2011-5081 - http://seclists.org/bugtraq/2011/Apr/266 -CVE-2011-5082 - http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982 -CVE-2011-5083 - http://cxsecurity.com/issue/WLB-2011090012 -CVE-2011-5083 - http://vigilance.fr/vulnerability/Dotclear-file-upload-via-swfupload-swf-11396 -CVE-2011-5094 - http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html -CVE-2011-5094 - http://www.ietf.org/mail-archive/web/tls/current/msg07553.html -CVE-2011-5098 - http://tickets.opscode.com/browse/CHEF-2649 -CVE-2011-5099 - http://packetstormsecurity.org/files/112092/Joomla-CCNewsLetter-1.0.7-SQL-Injection.html -CVE-2011-5109 - http://www.exploit-db.com/exploits/18127 -CVE-2011-5110 - http://sourceforge.net/tracker/?func=detail&aid=3506818&group_id=219284&atid=1045881 -CVE-2011-5110 - http://www.exploit-db.com/exploits/18129 -CVE-2011-5114 - http://www.vulnerability-lab.com/get_content.php?id=33 -CVE-2011-5115 - http://packetstormsecurity.org/files/106859/dlguardshoppingcart-xss.txt -CVE-2011-5116 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5053.php -CVE-2011-5129 - http://packetstormsecurity.org/files/107312/xchat-dos.txt -CVE-2011-5129 - http://www.exploit-db.com/exploits/18159 -CVE-2011-5130 - http://www.exploit-db.com/exploits/18198 -CVE-2011-5135 - http://www.exploit-db.com/exploits/18224 -CVE-2011-5136 - http://seclists.org/fulldisclosure/2011/Dec/125 -CVE-2011-5139 - http://www.exploit-db.com/exploits/18009 -CVE-2011-5147 - http://www.exploit-db.com/exploits/18121 -CVE-2011-5148 - http://www.exploit-db.com/exploits/18287 -CVE-2011-5149 - http://www.exploit-db.com/exploits/18261 -CVE-2011-5149 - http://www.vulnerability-lab.com/get_content.php?id=91 -CVE-2011-5155 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5009.php -CVE-2011-5158 - http://sotiriu.de/adv/NSOADV-2010-010.txt -CVE-2011-5165 - http://www.exploit-db.com/exploits/11975 -CVE-2011-5165 - http://www.exploit-db.com/exploits/11976 -CVE-2011-5165 - http://www.exploit-db.com/exploits/18142 -CVE-2011-5165 - https://www.exploit-db.com/exploits/36465/ -CVE-2011-5165 - https://www.exploit-db.com/exploits/36826/ -CVE-2011-5165 - https://www.exploit-db.com/exploits/36827/ -CVE-2011-5166 - http://www.exploit-db.com/exploits/17856 -CVE-2011-5167 - http://www.exploit-db.com/exploits/18092 -CVE-2011-5169 - http://www.vulnerability-lab.com/get_content.php?id=196 -CVE-2011-5171 - http://www.exploit-db.com/exploits/18220 -CVE-2011-5175 - http://packetstormsecurity.org/files/115772/Banana-Dance-CMS-B.2.1-XSS-SQL-Injection.html -CVE-2011-5178 - http://seclists.org/fulldisclosure/2011/Nov/158 -CVE-2011-5183 - http://www.exploit-db.com/exploits/18091 -CVE-2011-5184 - http://0a29.blogspot.com/2011/11/0a29-11-1-cross-site-scripting.html -CVE-2011-5186 - http://www.exploit-db.com/exploits/18056 -CVE-2011-5195 - http://www.exploit-db.com/exploits/18266 -CVE-2011-5196 - http://www.exploit-db.com/exploits/18266 -CVE-2011-5197 - http://www.exploit-db.com/exploits/18266 -CVE-2011-5205 - http://packetstormsecurity.org/files/108239/rapidleech-xss.txt -CVE-2011-5209 - http://packetstormsecurity.org/files/108145/graphicclone-xss.txt -CVE-2011-5210 - http://www.autosectools.com/Advisories/Limny.3.0.0_Local.File.Inclusion_99.html -CVE-2011-5215 - http://packetstormsecurity.org/files/107970/videoportalneu-sql.txt -CVE-2011-5222 - http://packetstormsecurity.org/files/107971/flirtportal-sql.txt -CVE-2011-5228 - http://www.exploit-db.com/exploits/18249 -CVE-2011-5228 - http://www.vulnerability-lab.com/get_content.php?id=362 -CVE-2011-5229 - http://www.exploit-db.com/exploits/18249 -CVE-2011-5229 - http://www.vulnerability-lab.com/get_content.php?id=362 -CVE-2011-5230 - http://www.exploit-db.com/exploits/18246 -CVE-2011-5233 - http://www.exploit-db.com/exploits/18257 -CVE-2011-5234 - http://packetstormsecurity.org/files/107972/social2-sql.txt -CVE-2011-5252 - http://www.mavitunasecurity.com/open-redirection-vulnerability-in-orchard/ -CVE-2011-5257 - http://www.exploit-db.com/exploits/18053 -CVE-2011-5267 - http://www.autosectools.com/Advisories/WikiWig.5.01_Persistent-Reflected.Cross-site.Scripting_139.html -CVE-2011-5267 - http://www.exploit-db.com/exploits/16988 -CVE-2011-5268 - https://projects.duckcorp.org/versions/13 -CVE-2011-5279 - http://seclists.org/fulldisclosure/2012/Apr/0 -CVE-2011-5283 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2011-5284 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2011-5325 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2011-5325 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2011-5325 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2011-5325 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2011-5330 - https://www.exploit-db.com/exploits/17031 -CVE-2011-5331 - https://www.exploit-db.com/exploits/17058 -CVE-2012-0014 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 -CVE-2012-0015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 -CVE-2012-0021 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-0025 - http://www.exploit-db.com/exploits/18256 -CVE-2012-0031 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-0036 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2012-0044 - http://www.ubuntu.com/usn/USN-1556-1 -CVE-2012-0053 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2012-0053 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-0060 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-0061 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-0071 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0072 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0073 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0074 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0075 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0076 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0077 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0078 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0079 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0080 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0081 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0082 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0083 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0084 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0085 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0086 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0087 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0088 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0089 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0090 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0091 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0092 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0093 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0094 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0095 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0096 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0097 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0098 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0099 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0100 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0101 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0102 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0103 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0104 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0105 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0106 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0107 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0108 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0109 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0110 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0111 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0112 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0113 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0114 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0115 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0116 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0117 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0118 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0119 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0120 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0134 - http://www.securityfocus.com/archive/1/522386 -CVE-2012-0154 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-008 -CVE-2012-0158 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-027 -CVE-2012-0206 - http://doc.powerdns.com/powerdns-advisory-2012-01.html -CVE-2012-0206 - https://bugzilla.redhat.com/show_bug.cgi?id=772570 -CVE-2012-0208 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0209 - http://eromang.zataz.com/2012/02/15/cve-2012-0209-horde-backdoor-analysis/ -CVE-2012-0209 - http://packetstormsecurity.org/files/109874/Horde-3.3.12-Backdoor-Arbitrary-PHP-Code-Execution.html -CVE-2012-0217 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0217 - https://www.exploit-db.com/exploits/28718/ -CVE-2012-0217 - https://www.exploit-db.com/exploits/46508/ -CVE-2012-0249 - http://www.kb.cert.org/vuls/id/551715 -CVE-2012-0250 - http://www.kb.cert.org/vuls/id/551715 -CVE-2012-0255 - http://www.kb.cert.org/vuls/id/551715 -CVE-2012-0324 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-03-05.cb -CVE-2012-0325 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-03-05.cb -CVE-2012-0358 - http://www.kb.cert.org/vuls/id/339177 -CVE-2012-0360 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-0389 - http://www.exploit-db.com/exploits/18447 -CVE-2012-0391 - http://www.exploit-db.com/exploits/18329 -CVE-2012-0392 - http://www.exploit-db.com/exploits/18329 -CVE-2012-0393 - http://www.exploit-db.com/exploits/18329 -CVE-2012-0394 - http://www.exploit-db.com/exploits/18329 -CVE-2012-0394 - http://www.exploit-db.com/exploits/31434 -CVE-2012-0406 - http://aluigi.altervista.org/adv/dpa_1-adv.txt -CVE-2012-0406 - http://www.exploit-db.com/exploits/18688/ -CVE-2012-0407 - http://aluigi.altervista.org/adv/dpa_1-adv.txt -CVE-2012-0407 - http://www.exploit-db.com/exploits/18688/ -CVE-2012-0435 - http://www.kb.cert.org/vuls/id/806908 -CVE-2012-0440 - https://bugzilla.mozilla.org/show_bug.cgi?id=718319 -CVE-2012-0441 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-0441 - https://bugzilla.mozilla.org/show_bug.cgi?id=715073 -CVE-2012-0444 - https://bugzilla.mozilla.org/show_bug.cgi?id=719612 -CVE-2012-0451 - https://bugzilla.mozilla.org/show_bug.cgi?id=717511 -CVE-2012-0453 - https://bugzilla.mozilla.org/show_bug.cgi?id=725663 -CVE-2012-0454 - https://bugzilla.mozilla.org/show_bug.cgi?id=684555 -CVE-2012-0455 - https://bugzilla.mozilla.org/show_bug.cgi?id=704354 -CVE-2012-0458 - https://bugzilla.mozilla.org/show_bug.cgi?id=719994 -CVE-2012-0459 - https://bugzilla.mozilla.org/show_bug.cgi?id=723446 -CVE-2012-0464 - http://www.zdnet.com/blog/security/mozilla-knew-of-pwn2own-bug-before-cansecwest/10757 -CVE-2012-0464 - http://www.zdnet.com/blog/security/researchers-hack-into-newest-firefox-with-zero-day-flaw/10663 -CVE-2012-0464 - https://bugzilla.mozilla.org/show_bug.cgi?id=735104 -CVE-2012-0466 - https://bugzilla.mozilla.org/show_bug.cgi?id=745397 -CVE-2012-0472 - https://bugzilla.mozilla.org/show_bug.cgi?id=744480 -CVE-2012-0474 - https://bugzilla.mozilla.org/show_bug.cgi?id=687745 -CVE-2012-0479 - https://bugzilla.mozilla.org/show_bug.cgi?id=714631 -CVE-2012-0484 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0485 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0486 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0487 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0488 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0489 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0490 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0491 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0492 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0493 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0494 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0495 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0496 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -CVE-2012-0497 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0497 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0498 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0498 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0499 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0499 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0500 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0501 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0501 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0502 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0503 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0504 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0505 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0506 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0507 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0508 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -CVE-2012-0509 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0510 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0511 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0512 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0513 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0514 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0515 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0516 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0517 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0518 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-0519 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0520 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0521 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0522 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0523 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0524 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0525 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0526 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0527 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0528 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0529 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0530 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0531 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0532 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0533 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0534 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0535 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0536 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0537 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0538 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0539 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0540 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-0541 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0542 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0543 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0544 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0545 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0546 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0548 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0549 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0550 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0551 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0551 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-0552 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0554 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0555 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0556 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0557 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0558 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0559 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0560 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0561 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0562 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0563 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-0564 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0565 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0566 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0567 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0568 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2012-0570 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2012-0571 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0572 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-0573 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0574 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-0575 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0576 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0577 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0578 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-0579 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0580 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0581 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0582 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0583 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-0668 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15821 -CVE-2012-0694 - https://seclists.org/bugtraq/2012/Jun/165 -CVE-2012-0694 - https://www.exploit-db.com/exploits/19381 -CVE-2012-0698 - http://packetstormsecurity.com/files/118281/TrouSerS-Denial-Of-Service.html -CVE-2012-0699 - http://www.exploit-db.com/exploits/18667 -CVE-2012-0781 - http://cxsecurity.com/research/103 -CVE-2012-0781 - http://www.exploit-db.com/exploits/18370/ -CVE-2012-0782 - http://www.exploit-db.com/exploits/18417 -CVE-2012-0785 - https://www.cloudbees.com/jenkins-security-advisory-2012-01-12 -CVE-2012-0786 - https://github.com/hercules-team/augeas/commit/16387744 -CVE-2012-0815 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-0825 - http://openid.net/2011/05/05/attribute-exchange-security-alert/ -CVE-2012-0829 - http://www.openwall.com/lists/oss-security/2012/02/02/10 -CVE-2012-0830 - http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ -CVE-2012-0830 - https://gist.github.com/1725489 -CVE-2012-0839 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2012-0841 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2012-0845 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2012-0846 - http://www.openwall.com/lists/oss-security/2012/02/12/3 -CVE-2012-0846 - http://www.openwall.com/lists/oss-security/2012/02/13/6 -CVE-2012-0847 - http://ffmpeg.org/security.html -CVE-2012-0848 - http://ffmpeg.org/security.html -CVE-2012-0849 - http://ffmpeg.org/security.html -CVE-2012-0850 - http://ffmpeg.org/security.html -CVE-2012-0851 - http://ffmpeg.org/security.html -CVE-2012-0851 - http://ffmpeg.org/trac/ffmpeg/ticket/758 -CVE-2012-0852 - http://ffmpeg.org/security.html -CVE-2012-0852 - https://ffmpeg.org/trac/ffmpeg/ticket/794 -CVE-2012-0853 - http://ffmpeg.org/trac/ffmpeg/ticket/780 -CVE-2012-0854 - http://ffmpeg.org/security.html -CVE-2012-0855 - http://ffmpeg.org/security.html -CVE-2012-0856 - http://ffmpeg.org/security.html -CVE-2012-0856 - http://ffmpeg.org/trac/ffmpeg/ticket/757 -CVE-2012-0857 - http://ffmpeg.org/security.html -CVE-2012-0858 - http://ffmpeg.org/ -CVE-2012-0859 - http://ffmpeg.org/security.html -CVE-2012-0865 - http://www.openwall.com/lists/oss-security/2012/02/12/4 -CVE-2012-0865 - http://www.openwall.com/lists/oss-security/2012/02/13/5 -CVE-2012-0865 - http://www.openwall.com/lists/oss-security/2012/02/18/1 -CVE-2012-0865 - http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0.x%5D_open_url_redirection -CVE-2012-0869 - http://www.openwall.com/lists/oss-security/2012/02/20/1 -CVE-2012-0872 - http://www.openwall.com/lists/oss-security/2012/02/20/10 -CVE-2012-0872 - http://www.openwall.com/lists/oss-security/2012/02/20/5 -CVE-2012-0872 - http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss -CVE-2012-0873 - http://www.openwall.com/lists/oss-security/2012/02/20/11 -CVE-2012-0873 - http://www.openwall.com/lists/oss-security/2012/02/20/6 -CVE-2012-0873 - http://yehg.net/lab/pr0js/advisories/%5BDolphin_7.0.7%5D_xss -CVE-2012-0874 - http://www.exploit-db.com/exploits/30211 -CVE-2012-0876 - http://bugs.python.org/issue13703#msg151870 -CVE-2012-0876 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2012-0876 - http://www.ubuntu.com/usn/USN-1527-1 -CVE-2012-0876 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2012-0876 - https://www.tenable.com/security/tns-2016-20 -CVE-2012-0879 - http://www.ubuntu.com/usn/USN-1408-1 -CVE-2012-0881 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2012-0895 - http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt -CVE-2012-0895 - http://www.exploit-db.com/exploits/18355 -CVE-2012-0896 - http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt -CVE-2012-0896 - http://www.exploit-db.com/exploits/18355 -CVE-2012-0900 - http://www.darksecurity.de/advisories/SSCHADV2011-042.txt -CVE-2012-0903 - http://seclists.org/fulldisclosure/2012/Jan/244 -CVE-2012-0903 - http://www.vulnerability-lab.com/get_content.php?id=378 -CVE-2012-0904 - http://www.exploit-db.com/exploits/18309 -CVE-2012-0905 - http://www.exploit-db.com/exploits/18385 -CVE-2012-0906 - http://www.exploit-db.com/exploits/18386 -CVE-2012-0907 - http://aluigi.altervista.org/adv/neoaxis_1-adv.txt -CVE-2012-0911 - http://www.exploit-db.com/exploits/19573 -CVE-2012-0911 - http://www.exploit-db.com/exploits/19630 -CVE-2012-0929 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 -CVE-2012-0930 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 -CVE-2012-0931 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 -CVE-2012-0932 - http://packetstormsecurity.org/files/108887/leadcapturepagesystem-xss.txt -CVE-2012-0933 - http://packetstormsecurity.org/files/108869/acidcat-xss.txt -CVE-2012-0936 - http://issues.opennms.org/browse/NMS-5128?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel#issue-tabs -CVE-2012-0936 - http://issues.opennms.org/browse/NMS/fixforversion/10824#atl_token=BCL8-RCDX-MB62-2EZT%7C38eaf469042162355c28f5393587690a8388d556%7Clout&selectedTab=com.atlassian.jira.plugin.system.project%3Aversion-summary-panel -CVE-2012-0936 - http://issues.opennms.org/browse/NMS/fixforversion/10825 -CVE-2012-0937 - http://www.exploit-db.com/exploits/18417 -CVE-2012-0941 - http://packetstormsecurity.org/files/109168/VL-144.txt -CVE-2012-0941 - https://fortiguard.com/psirt/FG-IR-012-001 -CVE-2012-0941 - https://www.vulnerability-lab.com/get_content.php?id=144 -CVE-2012-0954 - http://seclists.org/fulldisclosure/2012/Jun/289 -CVE-2012-0957 - http://www.openwall.com/lists/oss-security/2012/10/09/4 -CVE-2012-0979 - http://packetstormsecurity.org/files/109246/twiki-xss.txt -CVE-2012-0979 - http://st2tea.blogspot.com/2012/01/cross-site-scripting-twiki.html -CVE-2012-0984 - http://packetstormsecurity.org/files/111958/XOOPS-2.5.4-Cross-Site-Scripting.html -CVE-2012-0984 - http://www.exploit-db.com/exploits/18753 -CVE-2012-0985 - http://www.exploit-db.com/exploits/18958 -CVE-2012-10005 - https://vuldb.com/?id.218155 -CVE-2012-10012 - https://github.com/wp-plugins/facebook-button-plugin/commit/33144ae5a45ed07efe7fceca901d91365fdbf7cb -CVE-2012-1002 - http://www.exploit-db.com/exploits/18820 -CVE-2012-1004 - http://st2tea.blogspot.com/2012/02/foswiki-cross-site-scripting.html -CVE-2012-1007 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2012-1007 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2012-1008 - http://www.exploit-db.com/exploits/18453 -CVE-2012-1009 - http://www.exploit-db.com/exploits/18454 -CVE-2012-1014 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt -CVE-2012-1015 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt -CVE-2012-1017 - http://www.exploit-db.com/exploits/18465 -CVE-2012-1018 - http://dl.packetstormsecurity.net/1202-exploits/joomlacurrencyconverter-xss.txt -CVE-2012-1019 - http://packetstormsecurity.org/files/109447/XWiki-Enterprise-3.4-Cross-Site-Scripting.html -CVE-2012-1019 - http://st2tea.blogspot.com/2012/02/xwiki-cross-site-scripting.html -CVE-2012-1020 - http://marc.info/?l=full-disclosure&m=132852645911072&w=2 -CVE-2012-1020 - http://www.vulnerability-lab.com/get_content.php?id=304 -CVE-2012-1021 - http://packetstormsecurity.org/files/109290/4images-xss.txt -CVE-2012-1022 - http://packetstormsecurity.org/files/109290/4images-xss.txt -CVE-2012-1023 - http://packetstormsecurity.org/files/109290/4images-xss.txt -CVE-2012-1027 - http://www.kb.cert.org/vuls/id/732115 -CVE-2012-1029 - http://packetstormsecurity.org/files/109485/Tube-Ace-SQL-Injection.html -CVE-2012-1029 - http://www.exploit-db.com/exploits/18466 -CVE-2012-1031 - http://world.episerver.com/Blogs/Jens-N/Dates/2012/1/Security-vulnerability---Elevation-of-privilege/ -CVE-2012-1033 - http://www.kb.cert.org/vuls/id/542123 -CVE-2012-1035 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2012-1047 - http://www.exploit-db.com/exploits/18473 -CVE-2012-1047 - http://www.vulnerability-lab.com/get_content.php?id=405 -CVE-2012-1048 - http://www.vulnerability-lab.com/get_content.php?id=423 -CVE-2012-1049 - http://packetstormsecurity.org/files/109528 -CVE-2012-1049 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5070.php -CVE-2012-1056 - http://drupal.org/node/1425150 -CVE-2012-1057 - http://drupal.org/node/1425150 -CVE-2012-1058 - http://packetstormsecurity.org/files/109507/Flyspray-0.9.9.6-Cross-Site-Request-Forgery.html -CVE-2012-1059 - http://packetstormsecurity.org/files/109389/VL-407.txt -CVE-2012-1059 - http://www.exploit-db.com/exploits/18455 -CVE-2012-1059 - http://www.vulnerability-lab.com/get_content.php?id=407 -CVE-2012-1062 - http://www.vulnerability-lab.com/get_content.php?id=115 -CVE-2012-1063 - http://www.vulnerability-lab.com/get_content.php?id=115 -CVE-2012-1097 - http://www.openwall.com/lists/oss-security/2012/03/05/1 -CVE-2012-1110 - http://www.openwall.com/lists/oss-security/2012/03/05/15 -CVE-2012-1110 - http://www.openwall.com/lists/oss-security/2012/03/05/21 -CVE-2012-1110 - http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss -CVE-2012-1112 - http://www.openwall.com/lists/oss-security/2012/03/05/14 -CVE-2012-1112 - http://www.openwall.com/lists/oss-security/2012/03/05/23 -CVE-2012-1112 - http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi -CVE-2012-1125 - http://www.exploit-db.com/exploits/18412 -CVE-2012-1148 - http://www.ubuntu.com/usn/USN-1527-1 -CVE-2012-1150 - http://bugs.python.org/issue13703 -CVE-2012-1150 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2012-1153 - http://www.exploit-db.com/exploits/18392 -CVE-2012-1153 - http://www.exploit-db.com/exploits/18922 -CVE-2012-1156 - https://moodle.org/mod/forum/discuss.php?d=198623 -CVE-2012-1173 - https://bugzilla.redhat.com/show_bug.cgi?id=803078 -CVE-2012-1182 - https://www.samba.org/samba/security/CVE-2012-1182 -CVE-2012-1198 - http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html -CVE-2012-1199 - http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html -CVE-2012-1200 - http://packetstormsecurity.org/files/109669/Nova-CMS-Remote-File-Inclusion.html -CVE-2012-1207 - http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2012-1208 - http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2012-1210 - http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1211 - http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1212 - http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html -CVE-2012-1212 - http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html -CVE-2012-1213 - http://packetstormsecurity.org/files/109710/Zimbra-Cross-Site-Scripting.html -CVE-2012-1213 - http://st2tea.blogspot.com/2012/02/zimbra-cross-site-scripting.html -CVE-2012-1214 - http://packetstormsecurity.org/files/109618/#comment-10343 -CVE-2012-1214 - http://packetstormsecurity.org/files/109618/Yoono-Desktop-1.8.16-Cross-Site-Scripting.html -CVE-2012-1215 - http://packetstormsecurity.org/files/109617/#comment-10344 -CVE-2012-1215 - http://packetstormsecurity.org/files/109617/Yoono-Firefox-7.7.0-Cross-Site-Scripting.html -CVE-2012-1216 - http://packetstormsecurity.org/files/109706/PBBoard-2.1.4-Cross-Site-Request-Forgery-Shell-Upload.html -CVE-2012-1217 - http://packetstormsecurity.org/files/109665/STHS-v2-Web-Portal-2.2-SQL-Injection.html -CVE-2012-1218 - http://www.vulnerability-lab.com/get_content.php?id=402 -CVE-2012-1219 - http://www.vulnerability-lab.com/get_content.php?id=402 -CVE-2012-1224 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-004.txt -CVE-2012-1226 - http://www.exploit-db.com/exploits/18480 -CVE-2012-1226 - http://www.securityfocus.com/archive/1/521583 -CVE-2012-1226 - http://www.vulnerability-lab.com/get_content.php?id=428 -CVE-2012-1257 - http://developer.pidgin.im/ticket/14830 -CVE-2012-1258 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1258 - http://www.exploit-db.com/exploits/18750 -CVE-2012-1259 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1259 - http://www.exploit-db.com/exploits/18750 -CVE-2012-1260 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1260 - http://www.exploit-db.com/exploits/18750 -CVE-2012-1261 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1261 - http://www.exploit-db.com/exploits/18750 -CVE-2012-1262 - http://packetstormsecurity.org/files/110203/Movable-Type-Publishing-Platform-Cross-Site-Scripting.html -CVE-2012-1293 - http://www.openwall.com/lists/oss-security/2012/02/20/1 -CVE-2012-1294 - http://packetstormsecurity.org/files/109849/Impulsio-CMS-SQL-Injection.html -CVE-2012-1297 - http://packetstormsecurity.org/files/110214/ContaoCMS-2.11.0-Cross-Site-Request-Forgery.html -CVE-2012-1317 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-1366 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-1370 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html -CVE-2012-1417 - http://packetstormsecurity.org/files/110320/yealink-xss.txt -CVE-2012-1464 - http://www.exploit-db.com/exploits/18543 -CVE-2012-1465 - http://www.exploit-db.com/exploits/18541 -CVE-2012-1466 - http://www.exploit-db.com/exploits/18542 -CVE-2012-1467 - https://www.htbridge.com/advisory/HTB23079 -CVE-2012-1468 - https://www.htbridge.com/advisory/HTB23079 -CVE-2012-1469 - https://www.htbridge.com/advisory/HTB23079 -CVE-2012-1493 - http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/ -CVE-2012-1495 - https://packetstormsecurity.com/files/112323/WebCalendar-1.2.4-Pre-Auth-Remote-Code-Injection.html -CVE-2012-1495 - https://packetstormsecurity.com/files/112332/WebCalendar-1.2.4-Remote-Code-Execution.html -CVE-2012-1495 - https://www.exploit-db.com/exploits/18775 -CVE-2012-1498 - http://packetstormsecurity.org/files/110294/WebfolioCMS-1.1.4-Cross-Site-Request-Forgery.html -CVE-2012-1500 - https://web.archive.org/web/20121014055829/http://www.cloudscan.me/2012/09/cve-2012-1500-ghs-5375-ghs-5642.html -CVE-2012-1500 - https://www.exploit-db.com/exploits/21052 -CVE-2012-1503 - http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html -CVE-2012-1503 - http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html -CVE-2012-1503 - http://www.exploit-db.com/exploits/22151 -CVE-2012-1516 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html -CVE-2012-1517 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html -CVE-2012-1523 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1531 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-1531 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-1531 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-1532 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-1532 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-1533 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-1533 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-1541 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2012-1543 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2012-1545 - http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621 -CVE-2012-1561 - http://drupal.org/node/1432318 -CVE-2012-1563 - https://www.exploit-db.com/exploits/41156/ -CVE-2012-1580 - https://bugzilla.wikimedia.org/show_bug.cgi?id=35317 -CVE-2012-1584 - http://www.openwall.com/lists/oss-security/2012/03/21/11 -CVE-2012-1584 - http://www.openwall.com/lists/oss-security/2012/03/26/4 -CVE-2012-1593 - http://www.exploit-db.com/exploits/18758 -CVE-2012-1602 - http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html -CVE-2012-1603 - http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html -CVE-2012-1604 - http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html -CVE-2012-1613 - http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html -CVE-2012-1614 - http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html -CVE-2012-1626 - http://drupal.org/node/1401026 -CVE-2012-1632 - http://drupal.org/node/1401678 -CVE-2012-1633 - http://drupal.org/node/1401678 -CVE-2012-1641 - http://drupal.org/node/1432318 -CVE-2012-1654 - http://drupal.org/node/1470980 -CVE-2012-1661 - http://packetstormsecurity.org/files/113644/ESRI-ArcMap-Arbitrary-Code-Execution.html -CVE-2012-1661 - http://www.exploit-db.com/exploits/19138 -CVE-2012-1663 - http://www.exploit-db.com/exploits/24865 -CVE-2012-1667 - http://www.kb.cert.org/vuls/id/381699 -CVE-2012-1669 - http://packetstormsecurity.com/files/111114/phpMoneyBooks-1.0.2-Local-File-Inclusion.html -CVE-2012-1669 - http://seclists.org/fulldisclosure/2012/Mar/259 -CVE-2012-1669 - http://www.exploit-db.com/exploits/18648 -CVE-2012-1670 - http://www.exploit-db.com/exploits/18647/ -CVE-2012-1671 - http://www.exploit-db.com/exploits/18701 -CVE-2012-1672 - http://www.exploit-db.com/exploits/18702/ -CVE-2012-1673 - http://www.exploit-db.com/exploits/18700/ -CVE-2012-1674 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1675 - http://seclists.org/fulldisclosure/2012/Apr/204 -CVE-2012-1675 - http://seclists.org/fulldisclosure/2012/Apr/343 -CVE-2012-1675 - http://www.kb.cert.org/vuls/id/359816 -CVE-2012-1676 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1679 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1681 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1683 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1684 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1685 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-1686 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-1687 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1688 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1689 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1690 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1691 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1692 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1693 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1694 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1695 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1695 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2012-1696 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1697 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1698 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1702 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-1703 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1704 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1705 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-1706 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1707 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1708 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1709 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1710 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -CVE-2012-1711 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1713 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1713 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1715 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1716 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1717 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1717 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1718 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1718 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1719 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1720 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1720 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1721 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1722 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1723 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1724 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1724 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1725 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1726 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -CVE-2012-1727 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1728 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1729 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1730 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1731 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1732 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1733 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1734 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1735 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1736 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1737 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1738 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1739 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1740 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1741 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1742 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1743 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1744 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1745 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1746 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1747 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1748 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1749 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1750 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1751 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-1752 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1753 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1754 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1756 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1757 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1758 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1759 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1760 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1761 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1762 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1763 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-1764 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1765 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1766 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1766 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1767 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1767 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1768 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1768 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1769 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1769 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1770 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1770 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1771 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1771 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1772 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1772 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1773 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-1773 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-1777 - http://packetstormsecurity.org/files/111276/F5-FirePass-SSL-VPN-6.x-7.x-SQL-Injection.html -CVE-2012-1777 - http://seclists.org/fulldisclosure/2012/Mar/324 -CVE-2012-1779 - http://packetstormsecurity.org/files/110212/idev-BusinessDirectory-3.0-Cross-Site-Scripting.html -CVE-2012-1780 - http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1781 - http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-1782 - http://www.vulnerability-lab.com/get_content.php?id=461 -CVE-2012-1783 - http://www.exploit-db.com/exploits/18524 -CVE-2012-1784 - http://packetstormsecurity.org/files/110225/MyJobList-0.1.3-SQL-Injection.html -CVE-2012-1787 - http://packetstormsecurity.org/files/110219/Webglimpse-Brute-Force-Cross-Site-Scripting.html -CVE-2012-1788 - http://packetstormsecurity.org/files/110224/WonderDesk-Cross-Site-Scripting.html -CVE-2012-1788 - http://st2tea.blogspot.com/2012/02/wonderdesk-cross-site-scripting.html -CVE-2012-1790 - http://packetstormsecurity.org/files/110216 -CVE-2012-1790 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5075.php -CVE-2012-1803 - http://www.kb.cert.org/vuls/id/889195 -CVE-2012-1803 - http://www.kb.cert.org/vuls/id/MAPG-8RCPEN -CVE-2012-1825 - http://www.kb.cert.org/vuls/id/815532 -CVE-2012-1825 - http://www.kb.cert.org/vuls/id/MAPG-8TWMEJ -CVE-2012-1826 - http://dotcms.com/dotCMSVersions/ -CVE-2012-1826 - http://www.kb.cert.org/vuls/id/898083 -CVE-2012-1827 - http://www.kb.cert.org/vuls/id/773035 -CVE-2012-1827 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 -CVE-2012-1828 - http://www.kb.cert.org/vuls/id/773035 -CVE-2012-1828 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 -CVE-2012-1829 - http://www.kb.cert.org/vuls/id/773035 -CVE-2012-1829 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 -CVE-2012-1836 - http://www.kb.cert.org/vuls/id/212651 -CVE-2012-1839 - http://www.kb.cert.org/vuls/id/504019 -CVE-2012-1840 - http://www.kb.cert.org/vuls/id/504019 -CVE-2012-1841 - http://www.kb.cert.org/vuls/id/913483 -CVE-2012-1841 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 -CVE-2012-1841 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY -CVE-2012-1842 - http://www.kb.cert.org/vuls/id/913483 -CVE-2012-1842 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 -CVE-2012-1842 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY -CVE-2012-1843 - http://www.kb.cert.org/vuls/id/913483 -CVE-2012-1843 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 -CVE-2012-1843 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY -CVE-2012-1844 - http://www.kb.cert.org/vuls/id/913483 -CVE-2012-1844 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 -CVE-2012-1844 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY -CVE-2012-1844 - http://www.kb.cert.org/vuls/id/MORO-8QNJLE -CVE-2012-1845 - http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588 -CVE-2012-1846 - http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588 -CVE-2012-1856 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-060 -CVE-2012-1858 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1870 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-049 -CVE-2012-1872 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1873 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1874 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1875 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1876 - http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621 -CVE-2012-1876 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1877 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1878 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1879 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1880 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1881 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1882 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -CVE-2012-1897 - http://packetstormsecurity.org/files/111116/Wolfcms-0.75-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-1898 - http://packetstormsecurity.org/files/111116/Wolfcms-0.75-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-1899 - http://packetstormsecurity.org/files/110524/Webfolio-CMS-1.1.4-Cross-Site-Scripting.html -CVE-2012-1900 - http://packetstormsecurity.org/files/110593/RazorCMS-1.2.1-STABLE-Cross-Site-Request-Forgery.html -CVE-2012-1900 - http://www.exploit-db.com/exploits/18575 -CVE-2012-1903 - https://web.archive.org/web/20160317182930/http://www.cloudscan.me/2013/03/cve-2012-1903-stored-xss-javascript.html -CVE-2012-1904 - http://packetstormsecurity.org/files/111162/RealPlayer-1.1.4-Memory-Corruption.html -CVE-2012-1908 - http://www.splunk.com/view/SP-CAAAGTK#38585 -CVE-2012-1910 - https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831 -CVE-2012-1911 - http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929 -CVE-2012-1911 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt -CVE-2012-1911 - http://www.exploit-db.com/exploits/18578 -CVE-2012-1912 - http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929 -CVE-2012-1912 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt -CVE-2012-1912 - http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html -CVE-2012-1912 - http://www.exploit-db.com/exploits/18578 -CVE-2012-1916 - http://www.kb.cert.org/vuls/id/743555 -CVE-2012-1917 - http://www.kb.cert.org/vuls/id/743555 -CVE-2012-1918 - http://www.kb.cert.org/vuls/id/743555 -CVE-2012-1919 - http://www.kb.cert.org/vuls/id/743555 -CVE-2012-1920 - http://www.kb.cert.org/vuls/id/743555 -CVE-2012-1921 - http://packetstormsecurity.org/files/110770/Sitecom-WLM-2501-Cross-Site-Request-Forgery.html -CVE-2012-1932 - https://packetstormsecurity.com/files/111185/Wolf-CMS-0.75-Persistent-Cross-Site-Scripting.html -CVE-2012-1933 - http://dev.sourcefabric.org/browse/CS-4179 -CVE-2012-1933 - http://www.exploit-db.com/exploits/18752 -CVE-2012-1934 - http://dev.sourcefabric.org/browse/CS-4179 -CVE-2012-1934 - http://dev.sourcefabric.org/browse/CS-4181 -CVE-2012-1934 - http://www.exploit-db.com/exploits/18752 -CVE-2012-1935 - http://dev.sourcefabric.org/browse/CS-4179 -CVE-2012-1935 - http://dev.sourcefabric.org/browse/CS-4182 -CVE-2012-1935 - http://dev.sourcefabric.org/browse/CS-4183 -CVE-2012-1935 - http://www.exploit-db.com/exploits/18752 -CVE-2012-1942 - https://bugzilla.mozilla.org/show_bug.cgi?id=748764 -CVE-2012-1943 - https://bugzilla.mozilla.org/show_bug.cgi?id=750850 -CVE-2012-1944 - https://bugzilla.mozilla.org/show_bug.cgi?id=751422 -CVE-2012-1945 - https://bugzilla.mozilla.org/show_bug.cgi?id=670514 -CVE-2012-1946 - https://bugzilla.mozilla.org/show_bug.cgi?id=750109 -CVE-2012-1948 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1948 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1949 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1950 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1950 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1950 - https://bugzilla.mozilla.org/show_bug.cgi?id=724247 -CVE-2012-1950 - https://bugzilla.mozilla.org/show_bug.cgi?id=724599 -CVE-2012-1950 - https://bugzilla.mozilla.org/show_bug.cgi?id=725611 -CVE-2012-1951 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1951 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1952 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1952 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1953 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1953 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1954 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1954 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1955 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1955 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1955 - https://bugzilla.mozilla.org/show_bug.cgi?id=757376 -CVE-2012-1956 - https://bugzilla.mozilla.org/show_bug.cgi?id=756719 -CVE-2012-1957 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1957 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1957 - https://bugzilla.mozilla.org/show_bug.cgi?id=750096 -CVE-2012-1958 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1958 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1958 - https://bugzilla.mozilla.org/show_bug.cgi?id=750820 -CVE-2012-1959 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1959 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1960 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1961 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1961 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1962 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1962 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1963 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1963 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1963 - https://bugzilla.mozilla.org/show_bug.cgi?id=767778 -CVE-2012-1964 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1964 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1965 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1965 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1966 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1966 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1966 - https://bugzilla.mozilla.org/show_bug.cgi?id=734076 -CVE-2012-1967 - http://rhn.redhat.com/errata/RHSA-2012-1088.html -CVE-2012-1967 - http://www.ubuntu.com/usn/USN-1509-1 -CVE-2012-1978 - http://packetstormsecurity.com/files/111408/Simple-PHP-Agenda-2.2.8-Cross-Site-Request-Forgery.html -CVE-2012-1979 - http://packetstormsecurity.org/files/111405/SyndeoCMS-3.0.01-Cross-Site-Scripting.html -CVE-2012-20001 - https://seclists.org/bugtraq/2012/Nov/1 -CVE-2012-2052 - http://seclists.org/bugtraq/2012/May/58 -CVE-2012-2056 - http://drupal.org/node/1482126 -CVE-2012-2057 - http://drupal.org/node/1482126 -CVE-2012-2058 - http://drupal.org/node/1482126 -CVE-2012-2059 - http://drupal.org/node/1482126 -CVE-2012-2060 - http://drupal.org/node/1482126 -CVE-2012-2061 - http://drupal.org/node/1482126 -CVE-2012-2062 - http://drupal.org/node/1482126 -CVE-2012-2096 - http://drupal.org/node/1528614 -CVE-2012-2098 - http://packetstormsecurity.org/files/113014/Apache-Commons-Compress-Apache-Ant-Denial-Of-Service.html -CVE-2012-2098 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2012-2098 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2012-2099 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-005.txt -CVE-2012-2102 - http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/ -CVE-2012-2113 - https://bugzilla.redhat.com/show_bug.cgi?id=810551 -CVE-2012-2115 - http://seclists.org/fulldisclosure/2012/Jan/27 -CVE-2012-2115 - http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/ -CVE-2012-2115 - http://www.openwall.com/lists/oss-security/2012/04/17/1 -CVE-2012-2115 - http://www.openwall.com/lists/oss-security/2012/04/18/7 -CVE-2012-2121 - http://www.ubuntu.com/usn/USN-1577-1 -CVE-2012-2123 - https://bugzilla.redhat.com/show_bug.cgi?id=806722 -CVE-2012-2124 - https://bugzilla.redhat.com/show_bug.cgi?id=814671 -CVE-2012-2127 - http://www.kernel.org/pub/linux/kernel/v3.x/ -CVE-2012-2127 - http://www.ubuntu.com/usn/USN-1594-1 -CVE-2012-2128 - http://seclists.org/bugtraq/2012/Apr/121 -CVE-2012-2128 - http://www.openwall.com/lists/oss-security/2012/04/22/4 -CVE-2012-2128 - http://www.openwall.com/lists/oss-security/2012/04/23/1 -CVE-2012-2128 - https://bugzilla.redhat.com/show_bug.cgi?id=815122 -CVE-2012-2129 - http://seclists.org/bugtraq/2012/Apr/121 -CVE-2012-2129 - http://www.openwall.com/lists/oss-security/2012/04/22/4 -CVE-2012-2129 - http://www.openwall.com/lists/oss-security/2012/04/23/1 -CVE-2012-2129 - https://bugzilla.redhat.com/show_bug.cgi?id=815122 -CVE-2012-2135 - http://www.ubuntu.com/usn/USN-1616-1 -CVE-2012-2137 - http://www.ubuntu.com/usn/USN-1594-1 -CVE-2012-2139 - https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f -CVE-2012-2149 - http://packetstormsecurity.org/files/112862/libwpd-WPXContentListener-_closeTableRow-Memory-Overwrite.html -CVE-2012-2150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2012-2208 - http://www.exploit-db.com/exploits/18782 -CVE-2012-2209 - http://www.exploit-db.com/exploits/18782 -CVE-2012-2211 - http://packetstormsecurity.org/files/111626/egroupware-xss.txt -CVE-2012-2227 - http://www.exploit-db.com/exploits/18828 -CVE-2012-2234 - http://packetstormsecurity.org/files/111905/ -CVE-2012-2243 - https://bugs.launchpad.net/mahara/+bug/1055232 -CVE-2012-2246 - https://bugs.launchpad.net/mahara/+bug/1057240 -CVE-2012-2270 - http://packetstormsecurity.org/files/111956/ownCloud-3.0.0-Cross-Site-Scripting.html -CVE-2012-2271 - http://www.exploit-db.com/exploits/18892/ -CVE-2012-2275 - http://packetstormsecurity.org/files/116275/TestLink-1.9.3-Cross-Site-Request-Forgery.html -CVE-2012-2275 - http://www.exploit-db.com/exploits/21135 -CVE-2012-2276 - http://aluigi.org/adv/irm_1-adv.txt -CVE-2012-2276 - http://www.exploit-db.com/exploits/18734 -CVE-2012-2277 - http://aluigi.org/adv/irm_1-adv.txt -CVE-2012-2277 - http://www.exploit-db.com/exploits/18734 -CVE-2012-2371 - http://packetstormsecurity.org/files/112658/WordPress-WP-FaceThumb-Gallery-0.1-Cross-Site-Scripting.html -CVE-2012-2372 - http://www.ubuntu.com/usn/USN-1556-1 -CVE-2012-2376 - http://isc.sans.edu/diary.html?storyid=13255 -CVE-2012-2376 - http://openwall.com/lists/oss-security/2012/05/20/2 -CVE-2012-2376 - https://bugzilla.redhat.com/show_bug.cgi?id=823464 -CVE-2012-2395 - https://github.com/cobbler/cobbler/commit/6d9167e5da44eca56bdf42b5776097a6779aaadf -CVE-2012-2396 - http://www.exploit-db.com/exploits/18757/ -CVE-2012-2399 - http://make.wordpress.org/core/2013/06/21/secure-swfupload/ -CVE-2012-2399 - http://packetstormsecurity.com/files/120746/SWFUpload-Content-Spoofing-Cross-Site-Scripting.html -CVE-2012-2399 - http://packetstormsecurity.com/files/122399/tinymce11-xss.txt -CVE-2012-2401 - https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ -CVE-2012-2425 - http://packetstormsecurity.org/files/111403/Intuit-Help-System-Protocol-File-Retrieval.html -CVE-2012-2437 - http://packetstormsecurity.org/files/117975/AWCM-2.2-Access-Bypass.html -CVE-2012-2438 - http://packetstormsecurity.org/files/117975/AWCM-2.2-Access-Bypass.html -CVE-2012-2441 - http://www.kb.cert.org/vuls/id/889195 -CVE-2012-2442 - http://packetstormsecurity.org/files/112295/Nokia-CP-Suite-Video-Manager-7.1.180.64-Denial-Of-Service.html -CVE-2012-2442 - http://www.exploit-db.com/exploits/18795 -CVE-2012-2446 - http://www.kb.cert.org/vuls/id/763795 -CVE-2012-2447 - http://www.kb.cert.org/vuls/id/763795 -CVE-2012-2448 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html -CVE-2012-2449 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html -CVE-2012-2450 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html -CVE-2012-2498 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html -CVE-2012-2499 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html -CVE-2012-2500 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html -CVE-2012-2511 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -CVE-2012-2512 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -CVE-2012-2513 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -CVE-2012-2514 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -CVE-2012-2568 - http://www.kb.cert.org/vuls/id/515283 -CVE-2012-2570 - http://www.exploit-db.com/exploits/20010 -CVE-2012-2576 - http://www.exploit-db.com/exploits/18833 -CVE-2012-2577 - http://www.kb.cert.org/vuls/id/174119 -CVE-2012-2582 - http://www.kb.cert.org/vuls/id/582879 -CVE-2012-2585 - http://www.exploit-db.com/exploits/20356/ -CVE-2012-2591 - http://packetstormsecurity.org/files/115354/EmailArchitect-Enterprise-Email-Server-10.0-Cross-Site-Scripting.html -CVE-2012-2601 - http://www.exploit-db.com/exploits/20035 -CVE-2012-2601 - http://www.kb.cert.org/vuls/id/777007 -CVE-2012-2602 - http://www.kb.cert.org/vuls/id/174119 -CVE-2012-2603 - http://www.kb.cert.org/vuls/id/442595 -CVE-2012-2603 - http://www.kb.cert.org/vuls/id/MAPG-8RJPJX -CVE-2012-2604 - http://www.kb.cert.org/vuls/id/709939 -CVE-2012-2604 - http://www.kb.cert.org/vuls/id/MAPG-8TJKAF -CVE-2012-2605 - http://www.kb.cert.org/vuls/id/709939 -CVE-2012-2605 - http://www.kb.cert.org/vuls/id/MAPG-8TJKAF -CVE-2012-2606 - http://www.kb.cert.org/vuls/id/709939 -CVE-2012-2606 - http://www.kb.cert.org/vuls/id/MAPG-8TJKAF -CVE-2012-2607 - http://www.kb.cert.org/vuls/id/977312 -CVE-2012-2607 - http://www.kb.cert.org/vuls/id/MORO-8UYN8P -CVE-2012-2611 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -CVE-2012-2612 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -CVE-2012-2614 - http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow -CVE-2012-2614 - http://www.exploit-db.com/exploits/19340 -CVE-2012-2619 - http://www.coresecurity.com/content/broadcom-input-validation-BCM4325-BCM4329 -CVE-2012-2619 - http://www.kb.cert.org/vuls/id/160027 -CVE-2012-2629 - http://packetstormsecurity.com/files/112748/Axous-1.1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-2657 - http://www.openwall.com/lists/oss-security/2012/05/29/10 -CVE-2012-2657 - http://www.openwall.com/lists/oss-security/2012/05/29/7 -CVE-2012-2658 - http://www.openwall.com/lists/oss-security/2012/05/29/10 -CVE-2012-2658 - http://www.openwall.com/lists/oss-security/2012/05/29/7 -CVE-2012-2664 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-2670 - http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html -CVE-2012-2671 - https://github.com/rtomayko/rack-cache/blob/master/CHANGES -CVE-2012-2673 - http://www.ubuntu.com/usn/USN-1546-1 -CVE-2012-2679 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79260 -CVE-2012-2687 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2012-2720 - http://drupal.org/node/1619808 -CVE-2012-2724 - http://drupal.org/node/1619818 -CVE-2012-2724 - http://drupal.org/node/1619848 -CVE-2012-2737 - http://www.ubuntu.com/usn/USN-1485-1 -CVE-2012-2738 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2012-2739 - http://www.ocert.org/advisories/ocert-2011-003.html -CVE-2012-2740 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php -CVE-2012-2741 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php -CVE-2012-2751 - http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html -CVE-2012-2751 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2012-2760 - http://packetstormsecurity.org/files/112991/Mod_Auth_OpenID-Session-Stealing.html -CVE-2012-2763 - http://www.openwall.com/lists/oss-security/2012/05/31/1 -CVE-2012-2763 - http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html -CVE-2012-2772 - http://ffmpeg.org/security.html -CVE-2012-2774 - http://ffmpeg.org/security.html -CVE-2012-2775 - http://ffmpeg.org/security.html -CVE-2012-2776 - http://ffmpeg.org/security.html -CVE-2012-2777 - http://ffmpeg.org/security.html -CVE-2012-2779 - http://ffmpeg.org/security.html -CVE-2012-2782 - http://ffmpeg.org/security.html -CVE-2012-2783 - http://ffmpeg.org/security.html -CVE-2012-2784 - http://ffmpeg.org/security.html -CVE-2012-2785 - http://ffmpeg.org/security.html -CVE-2012-2786 - http://ffmpeg.org/security.html -CVE-2012-2787 - http://ffmpeg.org/security.html -CVE-2012-2788 - http://ffmpeg.org/security.html -CVE-2012-2789 - http://ffmpeg.org/security.html -CVE-2012-2790 - http://ffmpeg.org/security.html -CVE-2012-2791 - http://ffmpeg.org/security.html -CVE-2012-2792 - http://ffmpeg.org/security.html -CVE-2012-2793 - http://ffmpeg.org/security.html -CVE-2012-2794 - http://ffmpeg.org/security.html -CVE-2012-2795 - http://ffmpeg.org/security.html -CVE-2012-2796 - http://ffmpeg.org/security.html -CVE-2012-2797 - http://ffmpeg.org/security.html -CVE-2012-2798 - http://ffmpeg.org/security.html -CVE-2012-2799 - http://ffmpeg.org/security.html -CVE-2012-2800 - http://ffmpeg.org/security.html -CVE-2012-2801 - http://ffmpeg.org/security.html -CVE-2012-2802 - http://ffmpeg.org/security.html -CVE-2012-2803 - http://ffmpeg.org/security.html -CVE-2012-2804 - http://ffmpeg.org/security.html -CVE-2012-2808 - http://blog.watchfire.com/files/androiddnsweakprng.pdf -CVE-2012-2814 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2012-2843 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15569 -CVE-2012-2889 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15829 -CVE-2012-2903 - http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html -CVE-2012-2905 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5091.php -CVE-2012-2906 - http://packetstormsecurity.org/files/112804/Artiphp-CMS-5.5.0-Cross-Site-Scripting.html -CVE-2012-2906 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php -CVE-2012-2908 - http://www.exploit-db.com/exploits/18873 -CVE-2012-2908 - http://www.vulnerability-lab.com/get_content.php?id=525 -CVE-2012-2909 - http://www.exploit-db.com/exploits/18873 -CVE-2012-2909 - http://www.vulnerability-lab.com/get_content.php?id=525 -CVE-2012-2910 - http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html -CVE-2012-2910 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php -CVE-2012-2911 - http://packetstormsecurity.org/files/112801/SiliSoftware-backupDB-1.2.7a-Cross-Site-Scripting.html -CVE-2012-2911 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5089.php -CVE-2012-2912 - http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html -CVE-2012-2913 - http://packetstormsecurity.org/files/112699/WordPress-Leaflet-0.0.1-Cross-Site-Scripting.html -CVE-2012-2914 - http://packetstormsecurity.org/files/112785/Unijimpe-Captcha-Cross-Site-Scripting.html -CVE-2012-2916 - http://packetstormsecurity.org/files/112692/WordPress-SABRE-1.2.0-Cross-Site-Scripting.html -CVE-2012-2917 - http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html -CVE-2012-2918 - http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html -CVE-2012-2919 - http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html -CVE-2012-2921 - https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706 -CVE-2012-2921 - https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py -CVE-2012-2923 - http://www.exploit-db.com/exploits/18858 -CVE-2012-2924 - http://www.exploit-db.com/exploits/18858 -CVE-2012-2925 - http://www.exploit-db.com/exploits/18845 -CVE-2012-2938 - http://www.exploit-db.com/exploits/18871 -CVE-2012-2938 - http://www.vulnerability-lab.com/get_content.php?id=530 -CVE-2012-2939 - http://iel-sayed.blogspot.com/2012/05/travelon-express-cms-v622-multiple-web.html -CVE-2012-2939 - http://www.exploit-db.com/exploits/18871 -CVE-2012-2939 - http://www.vulnerability-lab.com/get_content.php?id=530 -CVE-2012-2941 - http://packetstormsecurity.org/files/112945/Yandex.Server-2010-9.0-Enterprise-Cross-Site-Scripting.html -CVE-2012-2943 - http://packetstormsecurity.org/files/112859/Cryptographp-Local-File-Inclusion-HTTP-Response-Splitting.html -CVE-2012-2956 - http://www.exploit-db.com/exploits/20063 -CVE-2012-2959 - http://www.kb.cert.org/vuls/id/221180 -CVE-2012-2971 - http://packetstormsecurity.com/files/119543/Security-Notice-For-CA-ARCserve-Backup.html -CVE-2012-2972 - http://packetstormsecurity.com/files/119543/Security-Notice-For-CA-ARCserve-Backup.html -CVE-2012-2972 - http://www.kb.cert.org/vuls/id/408099 -CVE-2012-2974 - http://www.kb.cert.org/vuls/id/377915 -CVE-2012-2975 - http://www.kb.cert.org/vuls/id/143395 -CVE-2012-2980 - http://www.kb.cert.org/vuls/id/251635 -CVE-2012-2980 - http://www.kb.cert.org/vuls/id/MAPG-8R5LD6 -CVE-2012-2981 - http://www.kb.cert.org/vuls/id/788478 -CVE-2012-2982 - http://www.kb.cert.org/vuls/id/788478 -CVE-2012-2983 - http://www.kb.cert.org/vuls/id/788478 -CVE-2012-2984 - http://www.kb.cert.org/vuls/id/318779 -CVE-2012-2985 - http://www.kb.cert.org/vuls/id/247235 -CVE-2012-2986 - http://www.kb.cert.org/vuls/id/441363 -CVE-2012-2991 - http://www.kb.cert.org/vuls/id/459446 -CVE-2012-2993 - http://www.kb.cert.org/vuls/id/389795 -CVE-2012-2994 - http://www.kb.cert.org/vuls/id/591667 -CVE-2012-2995 - http://www.kb.cert.org/vuls/id/471364 -CVE-2012-2996 - http://www.kb.cert.org/vuls/id/471364 -CVE-2012-2998 - http://www.kb.cert.org/vuls/id/950795 -CVE-2012-2999 - http://www.kb.cert.org/vuls/id/989684 -CVE-2012-3000 - http://packetstormsecurity.com/files/119739/F5-BIG-IP-11.2.0-SQL-Injection.html -CVE-2012-3002 - http://www.kb.cert.org/vuls/id/265532 -CVE-2012-3062 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-3106 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-3106 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3107 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-3107 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3108 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-3108 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3109 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-3109 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3110 - http://www.kb.cert.org/vuls/id/118913 -CVE-2012-3110 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3111 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3112 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3113 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3114 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3115 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3116 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3117 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3118 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3119 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3120 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3121 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3122 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3123 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3124 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3125 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3126 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3127 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3128 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3129 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3130 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3131 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3132 - http://www.darkreading.com/database-security/167901020/security/news/240004776/hacking-oracle-database-indexes.html -CVE-2012-3132 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3134 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3135 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -CVE-2012-3137 - http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ -CVE-2012-3137 - http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular -CVE-2012-3137 - http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html -CVE-2012-3137 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2012-3137 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3138 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3139 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3140 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3141 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3142 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3143 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-3143 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-3144 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3144 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3145 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3146 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3147 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3147 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3148 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3149 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3149 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3150 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3150 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3151 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3152 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3152 - http://www.youtube.com/watch?v=NinvMDOj7sM -CVE-2012-3153 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3154 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3155 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3156 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3156 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3157 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3158 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3158 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3159 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-3159 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-3160 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3160 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3161 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3162 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3163 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3163 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3164 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3165 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3166 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3166 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3167 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3167 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3171 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3173 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3173 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3175 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3176 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3177 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3177 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3179 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3180 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3180 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3181 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3182 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3183 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3184 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3185 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3186 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3187 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3188 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3189 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3191 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3193 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3194 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3195 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3196 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3197 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3197 - http://www.ubuntu.com/usn/USN-1621-1 -CVE-2012-3198 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3199 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3200 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3201 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3202 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3203 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3204 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3205 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3206 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3207 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3208 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3209 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3210 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3211 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3212 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3213 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2012-3214 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3215 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3216 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-3216 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-3217 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3221 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3222 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3223 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3224 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3225 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3226 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3227 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3228 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3229 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3230 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-3236 - http://www.exploit-db.com/exploits/19482 -CVE-2012-3236 - http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html -CVE-2012-3342 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2012-3347 - http://www.kb.cert.org/vuls/id/773035 -CVE-2012-3347 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 -CVE-2012-3350 - http://www.exploit-db.com/exploits/19629 -CVE-2012-3351 - https://www.exploit-db.com/exploits/37552 -CVE-2012-3351 - https://www.exploit-db.com/exploits/37672 -CVE-2012-3358 - http://www.openwall.com/lists/oss-security/2012/07/11/1 -CVE-2012-3362 - http://www.autosectools.com/Advisories/eXtplorer.2.1.RC3_Cross-site.Request.Forgery_174.html -CVE-2012-3372 - http://www.theregister.co.uk/2012/07/07/cyberoam_tor_ssl_spying_flap/ -CVE-2012-3386 - https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html -CVE-2012-3399 - http://www.openwall.com/lists/oss-security/2012/07/09/4 -CVE-2012-3399 - http://www.openwall.com/lists/oss-security/2012/07/10/1 -CVE-2012-3400 - http://www.ubuntu.com/usn/USN-1556-1 -CVE-2012-3407 - http://www.openwall.com/lists/oss-security/2012/07/11/16 -CVE-2012-3410 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278 -CVE-2012-3411 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2012-3412 - http://www.ubuntu.com/usn/USN-1568-1 -CVE-2012-3412 - http://www.ubuntu.com/usn/USN-1577-1 -CVE-2012-3414 - http://make.wordpress.org/core/2013/06/21/secure-swfupload/ -CVE-2012-3414 - http://packetstormsecurity.com/files/122399/TinyMCE-Image-Manager-1.1-Cross-Site-Scripting.html -CVE-2012-3414 - https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ -CVE-2012-3418 - https://bugzilla.redhat.com/show_bug.cgi?id=840920 -CVE-2012-3430 - http://www.ubuntu.com/usn/USN-1568-1 -CVE-2012-3430 - http://www.ubuntu.com/usn/USN-1577-1 -CVE-2012-3434 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt -CVE-2012-3440 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-3448 - https://www.exploit-db.com/exploits/38030/ -CVE-2012-3450 - https://bugs.php.net/bug.php?id=61755 -CVE-2012-3455 - http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf -CVE-2012-3456 - http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf -CVE-2012-3483 - http://www.openwall.com/lists/oss-security/2012/08/14/1 -CVE-2012-3484 - http://www.openwall.com/lists/oss-security/2012/08/14/1 -CVE-2012-3485 - http://www.openwall.com/lists/oss-security/2012/08/14/1 -CVE-2012-3486 - http://www.openwall.com/lists/oss-security/2012/08/14/1 -CVE-2012-3487 - http://www.openwall.com/lists/oss-security/2012/08/14/1 -CVE-2012-3511 - http://www.ubuntu.com/usn/USN-1577-1 -CVE-2012-3512 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684075 -CVE-2012-3515 - http://www.ubuntu.com/usn/USN-1590-1 -CVE-2012-3520 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2012-3520 - https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea -CVE-2012-3524 - http://stealth.openwall.net/null/dzug.c -CVE-2012-3524 - http://www.exploit-db.com/exploits/21323 -CVE-2012-3544 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2012-3544 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2012-3544 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2012-3569 - http://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html -CVE-2012-3569 - http://www.vmware.com/security/advisories/VMSA-2012-0015.html -CVE-2012-3571 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-3577 - http://packetstormsecurity.org/files/113287/WordPress-Nmedia-WP-Member-Conversation-1.35.0-Shell-Upload.html -CVE-2012-3578 - http://packetstormsecurity.org/files/113323/WordPress-FCChat-Widget-2.x-Shell-Upload.html -CVE-2012-3579 - http://packetstormsecurity.com/files/116277/Symantec-Messaging-Gateway-9.5-Default-SSH-Password.html -CVE-2012-3585 - http://www.reactionpenetrationtesting.co.uk/Irfanview-JLS-Heap-Overflow.html -CVE-2012-3752 - http://packetstormsecurity.com/files/118359/Apple-QuickTime-7.7.2-TeXML-Style-Element-font-table-Field-Stack-Buffer-Overflow.html -CVE-2012-3753 - http://packetstormsecurity.com/files/118421/Apple-QuickTime-7.7.2-MIME-Type-Buffer-Overflow.html -CVE-2012-3755 - http://packetstormsecurity.org/files/118231/Apple-QuickTime-7.7.2-Buffer-Overflow.html -CVE-2012-3791 - http://www.exploit-db.com/exploits/18955 -CVE-2012-3792 - http://aluigi.org/adv/proservrex_1-adv.txt -CVE-2012-3793 - http://aluigi.org/adv/proservrex_1-adv.txt -CVE-2012-3794 - http://aluigi.org/adv/proservrex_1-adv.txt -CVE-2012-3795 - http://aluigi.org/adv/proservrex_1-adv.txt -CVE-2012-3796 - http://aluigi.org/adv/proservrex_1-adv.txt -CVE-2012-3797 - http://aluigi.org/adv/proservrex_1-adv.txt -CVE-2012-3800 - http://drupalcode.org/project/og.git/commitdiff/d48fef5 -CVE-2012-3806 - https://packetstormsecurity.com/files/cve/CVE-2012-3806 -CVE-2012-3806 - https://www.tenable.com/plugins/nessus/65612 -CVE-2012-3807 - https://packetstormsecurity.com/files/cve/CVE-2012-3806 -CVE-2012-3807 - https://www.tenable.com/plugins/nessus/65612 -CVE-2012-3808 - https://packetstormsecurity.com/files/cve/CVE-2012-3808 -CVE-2012-3808 - https://www.tenable.com/plugins/nessus/65612 -CVE-2012-3809 - https://packetstormsecurity.com/files/cve/CVE-2012-3809 -CVE-2012-3809 - https://www.tenable.com/plugins/nessus/65612 -CVE-2012-3810 - https://packetstormsecurity.com/files/cve/CVE-2012-3809 -CVE-2012-3810 - https://www.tenable.com/plugins/nessus/65612 -CVE-2012-3816 - http://www.exploit-db.com/exploits/18945 -CVE-2012-3828 - http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html -CVE-2012-3829 - http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html -CVE-2012-3830 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2012-002/-php-decoda-cross-site-scripting-in-video-tags -CVE-2012-3832 - https://github.com/milesj/php-decoda/commit/6f2b9fb48bc110edeab17459038feb2627d52320 -CVE-2012-3833 - http://packetstormsecurity.org/files/112243/Quick.CMS-4.0-Cross-Site-Scripting.html -CVE-2012-3834 - http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html -CVE-2012-3834 - http://www.exploit-db.com/exploits/18800 -CVE-2012-3835 - http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html -CVE-2012-3835 - http://www.exploit-db.com/exploits/18800 -CVE-2012-3836 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php -CVE-2012-3837 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php -CVE-2012-3838 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php -CVE-2012-3839 - http://www.exploit-db.com/exploits/18814 -CVE-2012-3840 - http://www.exploit-db.com/exploits/18814 -CVE-2012-3841 - http://packetstormsecurity.org/files/112218/KMPlayer-3.2.0.19-DLL-Hijack.html -CVE-2012-3842 - http://www.vulnerability-lab.com/get_content.php?id=509 -CVE-2012-3843 - http://packetstormsecurity.org/files/112241/e107-Cross-Site-Scripting.html -CVE-2012-3844 - http://packetstormsecurity.org/files/112385/vBulletin-4.1.12-Cross-Site-Scripting.html -CVE-2012-3846 - http://packetstormsecurity.org/files/112375/PHP-Pastebin-Cross-Site-Scripting.html -CVE-2012-3870 - http://packetstormsecurity.org/files/115276/Openconstructor-CMS-3.12.0-Cross-Site-Scripting.html -CVE-2012-3871 - http://packetstormsecurity.org/files/115285/Openconstructor-CMS-3.12.0-i_hybrid.php-XSS.html -CVE-2012-3872 - http://packetstormsecurity.org/files/115284/Openconstructor-CMS-3.12.0-Reflected-XSS.html -CVE-2012-3873 - http://packetstormsecurity.org/files/115286/Openconstructor-CMS-3.12.0-SQL-Injection.html -CVE-2012-3935 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-cupxcp -CVE-2012-3946 - http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_caveats_15_3_2s.html -CVE-2012-3965 - https://bugzilla.mozilla.org/show_bug.cgi?id=769108 -CVE-2012-3972 - https://bugzilla.mozilla.org/show_bug.cgi?id=746855 -CVE-2012-3973 - https://bugzilla.mozilla.org/show_bug.cgi?id=757128 -CVE-2012-3980 - https://bugzilla.mozilla.org/show_bug.cgi?id=771859 -CVE-2012-3984 - https://bugzilla.mozilla.org/show_bug.cgi?id=575294 -CVE-2012-3992 - https://bugzilla.mozilla.org/show_bug.cgi?id=775009 -CVE-2012-3993 - https://bugzilla.mozilla.org/show_bug.cgi?id=768101 -CVE-2012-3996 - http://www.exploit-db.com/exploits/19573 -CVE-2012-3996 - http://www.exploit-db.com/exploits/19630 -CVE-2012-4024 - http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel -CVE-2012-4025 - http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel -CVE-2012-4026 - http://www.kb.cert.org/vuls/id/977312 -CVE-2012-4026 - http://www.kb.cert.org/vuls/id/MORO-8UYN8P -CVE-2012-4029 - https://packetstormsecurity.com/files/115927/Chamilo-1.8.8.4-XSS-File-Deletion.html -CVE-2012-4032 - http://packetstormsecurity.org/files/114541/WebsitePanel-CMS-Open-Redirect.html -CVE-2012-4037 - http://www.madirish.net/541 -CVE-2012-4037 - https://trac.transmissionbt.com/ticket/4979 -CVE-2012-4051 - http://www.kb.cert.org/vuls/id/555668 -CVE-2012-4055 - http://packetstormsecurity.org/files/112287/Uiga-FanClub-SQL-Injection.html -CVE-2012-4056 - http://packetstormsecurity.org/files/112288/Uiga-Personal-Portal-SQL-Injection.html -CVE-2012-4057 - http://www.exploit-db.com/exploits/18799 -CVE-2012-4058 - http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-4059 - http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-4060 - http://packetstormsecurity.org/files/112259/ASP-DEv-XM-Forums-SQL-Injection.html -CVE-2012-4061 - http://packetstormsecurity.org/files/112257/ASP-DEv-XM-Diary-SQL-Injection.html -CVE-2012-4097 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4097 -CVE-2012-4098 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098 -CVE-2012-4099 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099 -CVE-2012-4172 - http://www.kb.cert.org/vuls/id/872545 -CVE-2012-4173 - http://www.kb.cert.org/vuls/id/872545 -CVE-2012-4174 - http://www.kb.cert.org/vuls/id/872545 -CVE-2012-4175 - http://www.kb.cert.org/vuls/id/872545 -CVE-2012-4176 - http://www.kb.cert.org/vuls/id/872545 -CVE-2012-4177 - http://seclists.org/fulldisclosure/2012/Jul/375 -CVE-2012-4178 - http://www.exploit-db.com/exploits/20123 -CVE-2012-4189 - https://bugzilla.mozilla.org/show_bug.cgi?id=790296 -CVE-2012-4192 - http://www.thespanner.co.uk/2012/10/10/firefox-knows-what-your-friends-did-last-summer/ -CVE-2012-4192 - https://bugzilla.mozilla.org/show_bug.cgi?id=799952 -CVE-2012-4194 - http://www.ubuntu.com/usn/USN-1620-2 -CVE-2012-4194 - https://bugzilla.mozilla.org/show_bug.cgi?id=800666 -CVE-2012-4195 - http://www.ubuntu.com/usn/USN-1620-2 -CVE-2012-4196 - http://www.ubuntu.com/usn/USN-1620-2 -CVE-2012-4206 - https://bugzilla.mozilla.org/show_bug.cgi?id=792106 -CVE-2012-4209 - https://bugzilla.mozilla.org/show_bug.cgi?id=792405 -CVE-2012-4210 - https://bugzilla.mozilla.org/show_bug.cgi?id=796866 -CVE-2012-4220 - http://www.kb.cert.org/vuls/id/702452 -CVE-2012-4221 - http://www.kb.cert.org/vuls/id/702452 -CVE-2012-4222 - http://www.kb.cert.org/vuls/id/702452 -CVE-2012-4226 - http://packetstormsecurity.com/files/115463/WordPress-Quick-Post-Widget-1.9.1-Cross-Site-Scripting.html -CVE-2012-4226 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-016.txt -CVE-2012-4230 - http://packetstormsecurity.com/files/120750/TinyMCE-3.5.8-Cross-Site-Scripting.html -CVE-2012-4230 - http://seclists.org/fulldisclosure/2013/Mar/114 -CVE-2012-4230 - http://www.madirish.net/554 -CVE-2012-4234 - http://packetstormsecurity.org/files/116057/Phorum-5.2.18-Cross-Site-Scripting.html -CVE-2012-4236 - http://www.openwall.com/lists/oss-security/2012/08/13/7 -CVE-2012-4241 - http://packetstormsecurity.com/files/116714/Microcart-1.0-Checkout-Cross-Site-Scripting.html -CVE-2012-4241 - http://packetstormsecurity.com/files/116721/Microcart-1.0-Cross-Site-Scripting.html -CVE-2012-4248 - http://www.kb.cert.org/vuls/id/122656 -CVE-2012-4248 - http://www.kb.cert.org/vuls/id/MORO-8WKGBN -CVE-2012-4249 - http://www.kb.cert.org/vuls/id/122656 -CVE-2012-4249 - http://www.kb.cert.org/vuls/id/MORO-8WKGBN -CVE-2012-4251 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html -CVE-2012-4252 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html -CVE-2012-4253 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html -CVE-2012-4254 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html -CVE-2012-4255 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html -CVE-2012-4256 - http://packetstormsecurity.org/files/112233/jNews-7.5.1-Information-Disclosure.html -CVE-2012-4257 - http://packetstormsecurity.org/files/112248/Yaqas-CMS-Alpha1-Information-Disclosure.html -CVE-2012-4258 - http://packetstormsecurity.org/files/112480/MYRE-Real-Estate-Mobile-2012-2-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-4258 - http://www.exploit-db.com/exploits/18843 -CVE-2012-4258 - http://www.vulnerability-lab.com/get_content.php?id=516 -CVE-2012-4259 - http://www.exploit-db.com/exploits/18802 -CVE-2012-4260 - http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-4260 - http://www.exploit-db.com/exploits/18844 -CVE-2012-4260 - http://www.vulnerability-lab.com/get_content.php?id=524 -CVE-2012-4262 - http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-4262 - http://www.exploit-db.com/exploits/18844 -CVE-2012-4262 - http://www.vulnerability-lab.com/get_content.php?id=524 -CVE-2012-4263 - http://packetstormsecurity.org/files/112617/WordPress-Better-WP-Security-Cross-Site-Scripting.html -CVE-2012-4265 - http://www.exploit-db.com/exploits/18872 -CVE-2012-4265 - http://www.vulnerability-lab.com/get_content.php?id=512 -CVE-2012-4266 - http://www.exploit-db.com/exploits/18872 -CVE-2012-4266 - http://www.vulnerability-lab.com/get_content.php?id=512 -CVE-2012-4268 - http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html -CVE-2012-4269 - http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html -CVE-2012-4270 - http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html -CVE-2012-4271 - http://packetstormsecurity.org/files/112619/WordPress-Bad-Behavior-Cross-Site-Scripting.html -CVE-2012-4273 - http://packetstormsecurity.org/files/112615/WordPress-2-Click-Socialmedia-Buttons-Cross-Site-Scripting.html -CVE-2012-4278 - http://www.exploit-db.com/exploits/18874 -CVE-2012-4278 - http://www.vulnerability-lab.com/get_content.php?id=513 -CVE-2012-4279 - http://www.exploit-db.com/exploits/18874 -CVE-2012-4279 - http://www.vulnerability-lab.com/get_content.php?id=513 -CVE-2012-4280 - http://www.exploit-db.com/exploits/18874 -CVE-2012-4280 - http://www.vulnerability-lab.com/get_content.php?id=513 -CVE-2012-4281 - http://www.exploit-db.com/exploits/18871 -CVE-2012-4281 - http://www.vulnerability-lab.com/get_content.php?id=530 -CVE-2012-4282 - http://packetstormsecurity.org/files/112488/Trombinoscope-3.5-SQL-Injection.html -CVE-2012-4284 - https://packetstormsecurity.com/files/120643/Viscosity-setuid-set-ViscosityHelper-Privilege-Escalation.html -CVE-2012-4287 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7572 -CVE-2012-4288 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7571 -CVE-2012-4290 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7573 -CVE-2012-4291 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7570 -CVE-2012-4301 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2012-4303 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2012-4305 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2012-4324 - http://packetstormsecurity.org/files/111564/Vacation-Rental-Listing-Cross-Site-Request-Forgery.html -CVE-2012-4326 - http://packetstormsecurity.org/files/111563/AlstraSoft-Site-Uptime-Cross-Site-Request-Forgery.html -CVE-2012-4329 - http://aluigi.org/adv/samsux_1-adv.txt -CVE-2012-4329 - http://www.exploit-db.com/exploits/18751 -CVE-2012-4330 - http://aluigi.org/adv/samsux_1-adv.txt -CVE-2012-4330 - http://www.exploit-db.com/exploits/18751 -CVE-2012-4333 - http://www.exploit-db.com/exploits/18765 -CVE-2012-4334 - http://www.exploit-db.com/exploits/18765 -CVE-2012-4335 - http://www.exploit-db.com/exploits/18765 -CVE-2012-4344 - http://www.exploit-db.com/exploits/20035 -CVE-2012-4344 - http://www.kb.cert.org/vuls/id/777007 -CVE-2012-4353 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4354 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4355 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4356 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4357 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4358 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4359 - http://aluigi.org/adv/winlog_2-adv.txt -CVE-2012-4361 - http://www.exploit-db.com/exploits/18901/ -CVE-2012-4361 - http://www.kb.cert.org/vuls/id/441363 -CVE-2012-4362 - http://www.exploit-db.com/exploits/18901/ -CVE-2012-4362 - http://www.kb.cert.org/vuls/id/441363 -CVE-2012-4385 - https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759 -CVE-2012-4399 - http://seclists.org/bugtraq/2012/Jul/101 -CVE-2012-4399 - http://www.exploit-db.com/exploits/19863 -CVE-2012-4405 - http://www.securityfocus.com/bid/55494 -CVE-2012-4409 - http://packetstormsecurity.org/files/116268/mcrypt-2.6.8-Buffer-Overflow-Proof-Of-Concept.html -CVE-2012-4409 - http://www.openwall.com/lists/oss-security/2012/09/06/4 -CVE-2012-4412 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2012-4412 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2012-4412 - http://sourceware.org/bugzilla/show_bug.cgi?id=14547 -CVE-2012-4412 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2012-4414 - http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/ -CVE-2012-4416 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-4420 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4420 -CVE-2012-4424 - http://sourceware.org/bugzilla/show_bug.cgi?id=14547 -CVE-2012-4425 - http://www.exploit-db.com/exploits/21323 -CVE-2012-4428 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428 -CVE-2012-4438 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 -CVE-2012-4439 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 -CVE-2012-4440 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 -CVE-2012-4441 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 -CVE-2012-4448 - http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html -CVE-2012-4469 - http://drupal.org/node/1650784 -CVE-2012-4481 - https://bugzilla.redhat.com/show_bug.cgi?id=863484 -CVE-2012-4484 - http://drupal.org/node/1691446 -CVE-2012-4492 - http://drupal.org/node/1719392 -CVE-2012-4494 - http://drupal.org/node/1719392 -CVE-2012-4496 - http://www.madirish.net/538 -CVE-2012-4512 - http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html -CVE-2012-4512 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc -CVE-2012-4513 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc -CVE-2012-4514 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc -CVE-2012-4515 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc -CVE-2012-4528 - http://seclists.org/fulldisclosure/2012/Oct/113 -CVE-2012-4530 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33 -CVE-2012-4530 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 -CVE-2012-4530 - https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33 -CVE-2012-4532 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-014.txt -CVE-2012-4540 - https://bugzilla.redhat.com/show_bug.cgi?id=869040 -CVE-2012-4553 - http://drupal.org/node/1815912 -CVE-2012-4554 - http://drupal.org/node/1815912 -CVE-2012-4567 - http://sourceforge.net/p/mydms/code/HEAD/tree/trunk/CHANGELOG -CVE-2012-4568 - http://sourceforge.net/p/mydms/code/HEAD/tree/trunk/CHANGELOG -CVE-2012-4569 - http://sourceforge.net/p/mydms/code/HEAD/tree/trunk/CHANGELOG -CVE-2012-4570 - http://sourceforge.net/p/mydms/code/HEAD/tree/trunk/CHANGELOG -CVE-2012-4573 - http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html -CVE-2012-4577 - http://www.digitalbond.com/2012/06/13/korenix-and-oring-insecurity -CVE-2012-4600 - http://www.kb.cert.org/vuls/id/511404 -CVE-2012-4611 - http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html -CVE-2012-4615 - http://packetstormsecurity.org/files/118358/EMC-Smarts-Network-Configuration-Manager-Bypass.html -CVE-2012-4638 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-4658 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-4676 - http://www.openwall.com/lists/oss-security/2012/08/14/1 -CVE-2012-4679 - http://dev.sourcefabric.org/browse/CS-4184 -CVE-2012-4680 - http://www.foofus.net/?page_id=616 -CVE-2012-4681 - http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html -CVE-2012-4681 - https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day -CVE-2012-4700 - http://www.integraxor.com/blog/security-issue-for-activex-enabled-browser-vulnerability-note -CVE-2012-4728 - http://packetstormsecurity.com/files/120713/Corel-Quattro-Pro-X6-Standard-Edition-NULL-Pointer-Dereference.html -CVE-2012-4743 - http://www.vulnerability-lab.com/get_content.php?id=504 -CVE-2012-4744 - http://www.vulnerability-lab.com/get_content.php?id=504 -CVE-2012-4745 - http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6.x_(asp)%5D_xss -CVE-2012-4750 - https://packetstormsecurity.com/files/117391/Ezhometech-EzServer-7.0-Remote-Heap-Corruption.html -CVE-2012-4751 - http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html -CVE-2012-4751 - http://www.kb.cert.org/vuls/id/603276 -CVE-2012-4754 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5068.php -CVE-2012-4755 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php -CVE-2012-4760 - https://packetstormsecurity.com/files/cve/CVE-2012-4760 -CVE-2012-4760 - https://seclists.org/bugtraq/2012/Nov/108 -CVE-2012-4761 - https://packetstormsecurity.com/files/cve/CVE-2012-4760 -CVE-2012-4761 - https://seclists.org/bugtraq/2012/Nov/108 -CVE-2012-4767 - https://packetstormsecurity.com/files/118491/Safend-Data-Protector-3.4.5586.9772-Privilege-Escalation.html -CVE-2012-4768 - http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt -CVE-2012-4771 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html -CVE-2012-4771 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5105.php -CVE-2012-4772 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html -CVE-2012-4773 - http://packetstormsecurity.org/files/116433 -CVE-2012-4773 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html -CVE-2012-4773 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5106.php -CVE-2012-4792 - http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html -CVE-2012-4792 - http://www.kb.cert.org/vuls/id/154201 -CVE-2012-4820 - http://seclists.org/bugtraq/2012/Sep/38 -CVE-2012-4820 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-4821 - http://seclists.org/bugtraq/2012/Sep/38 -CVE-2012-4821 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-4822 - http://seclists.org/bugtraq/2012/Sep/38 -CVE-2012-4822 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-4823 - http://seclists.org/bugtraq/2012/Sep/38 -CVE-2012-4823 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-4856 - http://www.kb.cert.org/vuls/id/194604 -CVE-2012-4864 - http://packetstormsecurity.org/files/111034 -CVE-2012-4864 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5080.php -CVE-2012-4865 - http://packetstormsecurity.org/files/111031 -CVE-2012-4865 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5079.php -CVE-2012-4866 - http://packetstormsecurity.org/files/110949/Xtreme-RAT-DLL-Hijack.html -CVE-2012-4867 - http://packetstormsecurity.org/files/111075/Vtiger-5.1.0-Local-File-Inclusion.html -CVE-2012-4869 - http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html -CVE-2012-4869 - http://seclists.org/fulldisclosure/2012/Mar/234 -CVE-2012-4869 - http://www.exploit-db.com/exploits/18649 -CVE-2012-4870 - http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html -CVE-2012-4870 - http://seclists.org/fulldisclosure/2012/Mar/234 -CVE-2012-4870 - http://www.exploit-db.com/exploits/18649 -CVE-2012-4871 - http://packetstormsecurity.org/files/110974/LiteSpeed-4.1.11-Cross-Site-Scripting.html -CVE-2012-4872 - http://st2tea.blogspot.com/2012/03/kayako-fusion-cross-site-scripting.html -CVE-2012-4876 - http://www.exploit-db.com/exploits/18675 -CVE-2012-4877 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html -CVE-2012-4877 - http://www.vulnerability-lab.com/get_content.php?id=487 -CVE-2012-4878 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html -CVE-2012-4878 - http://www.vulnerability-lab.com/get_content.php?id=487 -CVE-2012-4886 - http://packetstormsecurity.com/files/121431/WPS-Office-Stack-Buffer-Overflow.html -CVE-2012-4886 - http://seclists.org/fulldisclosure/2013/Apr/247 -CVE-2012-4886 - http://www.exploit-db.com/exploits/25140 -CVE-2012-4889 - http://packetstormsecurity.org/files/111474/VL-437.txt -CVE-2012-4889 - http://www.vulnerability-lab.com/get_content.php?id=437 -CVE-2012-4890 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html -CVE-2012-4890 - http://www.vulnerability-lab.com/get_content.php?id=487 -CVE-2012-4891 - http://packetstormsecurity.com/files/130169/ManageEngine-Firewall-Analyzer-8.0-Directory-Traversal-XSS.html -CVE-2012-4893 - http://www.kb.cert.org/vuls/id/788478 -CVE-2012-4897 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html -CVE-2012-4901 - https://www.exploit-db.com/exploits/21742/ -CVE-2012-4902 - https://www.exploit-db.com/exploits/21742/ -CVE-2012-4922 - https://trac.torproject.org/projects/tor/ticket/6811 -CVE-2012-4923 - http://packetstormsecurity.org/files/109942/Endian-UTM-Firewall-2.4.x-Cross-Site-Scripting.html -CVE-2012-4923 - http://www.vulnerability-lab.com/get_content.php?id=436 -CVE-2012-4924 - http://www.exploit-db.com/exploits/18538 -CVE-2012-4925 - http://www.exploit-db.com/exploits/18544 -CVE-2012-4926 - http://www.exploit-db.com/exploits/18544 -CVE-2012-4927 - http://freecode.com/projects/limesurvey/releases/342070 -CVE-2012-4927 - http://packetstormsecurity.org/files/110100/limesurvey-sql.txt -CVE-2012-4928 - http://packetstormsecurity.org/files/110046/Oxwall-1.1.1-Cross-Site-Scripting.html -CVE-2012-4929 - http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor -CVE-2012-4929 - http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312 -CVE-2012-4929 - http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512 -CVE-2012-4929 - http://www.theregister.co.uk/2012/09/14/crime_tls_attack/ -CVE-2012-4929 - https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls -CVE-2012-4929 - https://github.com/mpgn/CRIME-poc -CVE-2012-4929 - https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212 -CVE-2012-4930 - http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312 -CVE-2012-4930 - http://www.theregister.co.uk/2012/09/14/crime_tls_attack/ -CVE-2012-4930 - https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls -CVE-2012-4934 - http://www.kb.cert.org/vuls/id/207540 -CVE-2012-4935 - http://www.kb.cert.org/vuls/id/802596 -CVE-2012-4936 - http://www.kb.cert.org/vuls/id/802596 -CVE-2012-4937 - http://www.kb.cert.org/vuls/id/802596 -CVE-2012-4938 - http://www.kb.cert.org/vuls/id/802596 -CVE-2012-4939 - http://www.kb.cert.org/vuls/id/203844 -CVE-2012-4941 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4942 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4943 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4944 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4945 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4946 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4947 - http://www.kb.cert.org/vuls/id/427547 -CVE-2012-4949 - http://www.kb.cert.org/vuls/id/795644 -CVE-2012-4950 - http://www.kb.cert.org/vuls/id/802596 -CVE-2012-4951 - http://www.kb.cert.org/vuls/id/180091 -CVE-2012-4953 - http://www.kb.cert.org/vuls/id/985625 -CVE-2012-4955 - http://www.kb.cert.org/vuls/id/558132 -CVE-2012-4956 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 -CVE-2012-4957 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 -CVE-2012-4958 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 -CVE-2012-4959 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 -CVE-2012-4969 - http://www.securityweek.com/new-internet-explorer-zero-day-being-exploited-wild -CVE-2012-4987 - http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html -CVE-2012-4988 - http://seclists.org/fulldisclosure/2012/Oct/36 -CVE-2012-4988 - http://www.reactionpenetrationtesting.co.uk/xnview-jls-heap.html -CVE-2012-4988 - https://www.exploit-db.com/exploits/21741/ -CVE-2012-4992 - http://seclists.org/fulldisclosure/2012/Mar/7 -CVE-2012-4992 - http://www.exploit-db.com/exploits/18555 -CVE-2012-4992 - http://www.vulnerability-lab.com/get_content.php?id=462 -CVE-2012-4994 - http://freecode.com/projects/limesurvey/releases/342070 -CVE-2012-4995 - http://freecode.com/projects/limesurvey/releases/342070 -CVE-2012-4997 - http://www.exploit-db.com/exploits/18559 -CVE-2012-4998 - http://packetstormsecurity.org/files/110376/starcms-xss.txt -CVE-2012-5000 - http://www.exploit-db.com/exploits/18558 -CVE-2012-5004 - http://www.vulnerability-lab.com/get_content.php?id=392 -CVE-2012-5014 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-5017 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-5032 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-5037 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -CVE-2012-5050 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html -CVE-2012-5051 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html -CVE-2012-5054 - http://packetstormsecurity.org/files/116435/Adobe-Flash-Player-Matrix3D-Integer-Overflow-Code-Execution.html -CVE-2012-5058 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5060 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-5061 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5063 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5064 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5065 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5066 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5067 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5068 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5068 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5069 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5069 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5070 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5071 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5071 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5072 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5072 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5073 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5073 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5074 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5075 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5075 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5076 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5077 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5078 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5079 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5079 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5080 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5081 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5081 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5082 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5082 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15827 -CVE-2012-5083 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5083 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5083 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5084 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5084 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5085 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5085 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5086 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5087 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5088 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5089 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 -CVE-2012-5089 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -CVE-2012-5090 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5091 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5092 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5093 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5094 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5095 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -CVE-2012-5096 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-5103 - http://packetstormsecurity.org/files/108389/ggbguestbook-xss.txt -CVE-2012-5104 - http://packetstormsecurity.org/files/108353/ubbforum-xss.txt -CVE-2012-5104 - http://st2tea.blogspot.com/2012/01/ubb-forum756-cross-site-scripting.html -CVE-2012-5166 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-5193 - https://www.exploit-db.com/exploits/22216 -CVE-2012-5195 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-5215 - http://www.kb.cert.org/vuls/id/782451 -CVE-2012-5223 - http://www.vbseo.com/f5/vbseo-security-bulletin-all-supported-versions-patch-release-52783/ -CVE-2012-5225 - http://st2tea.blogspot.com/2012/01/xclick-cart-cross-site-scripting.html -CVE-2012-5242 - http://www.exploit-db.com/exploits/23573 -CVE-2012-5243 - http://www.exploit-db.com/exploits/23573 -CVE-2012-5244 - http://www.exploit-db.com/exploits/23573/ -CVE-2012-5290 - http://packetstormsecurity.org/files/108342/EasyWebRealEstate-Blind-SQL-Injection.html -CVE-2012-5293 - http://www.exploit-db.com/exploits/18342 -CVE-2012-5305 - http://www.vulnerability-lab.com/get_content.php?id=486 -CVE-2012-5306 - http://www.exploit-db.com/exploits/18673 -CVE-2012-5313 - http://marc.info/?l=full-disclosure&m=132706457510193&w=2 -CVE-2012-5313 - http://www.vulnerability-lab.com/get_content.php?id=384 -CVE-2012-5314 - http://st2tea.blogspot.com/2012/01/viewgit-cross-site-scripting.html -CVE-2012-5316 - http://www.vulnerability-lab.com/get_content.php?id=28 -CVE-2012-5321 - http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html -CVE-2012-5322 - http://packetstormsecurity.org/files/109987/Xavi-7968-ADSL-Router-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-5323 - http://packetstormsecurity.org/files/109987/Xavi-7968-ADSL-Router-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-5324 - http://www.exploit-db.com/exploits/18427 -CVE-2012-5324 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5067.php -CVE-2012-5334 - http://www.exploit-db.com/exploits/18616 -CVE-2012-5337 - http://www.zerodaylab.com/zdl-advisories/2012-5337.html -CVE-2012-5338 - http://www.zerodaylab.com/zdl-advisories/2012-5338.html -CVE-2012-5340 - http://www.exploit-db.com/exploits/23246 -CVE-2012-5341 - http://packetstormsecurity.org/files/108340/statit4-xss.txt -CVE-2012-5341 - http://st2tea.blogspot.com/2012/01/otterware-statit4-cross-site-scripting.html -CVE-2012-5342 - http://packetstormsecurity.org/files/108426/CommonSense-CMS-Blind-SQL-Injection.html -CVE-2012-5343 - http://packetstormsecurity.org/files/108355/ZSL-2012-5066.txt -CVE-2012-5343 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5066.php -CVE-2012-5346 - http://packetstormsecurity.org/files/108282/wplivephp-xss.txt -CVE-2012-5347 - http://www.exploit-db.com/exploits/18322 -CVE-2012-5348 - http://www.exploit-db.com/exploits/18335 -CVE-2012-5349 - http://www.exploit-db.com/exploits/18330 -CVE-2012-5350 - http://www.exploit-db.com/exploits/18330 -CVE-2012-5351 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2012-5356 - https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/1016643 -CVE-2012-5367 - http://packetstormsecurity.org/files/117925/OrangeHRM-2.7.1-rc.1-Cross-Site-Request-Forgery-SQL-Injection.html -CVE-2012-5370 - http://www.ocert.org/advisories/ocert-2012-001.html -CVE-2012-5371 - http://www.ocert.org/advisories/ocert-2012-001.html -CVE-2012-5372 - http://www.ocert.org/advisories/ocert-2012-001.html -CVE-2012-5373 - http://www.ocert.org/advisories/ocert-2012-001.html -CVE-2012-5373 - https://bugzilla.redhat.com/show_bug.cgi?id=880705 -CVE-2012-5387 - http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-5388 - http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2012-5450 - http://packetstormsecurity.org/files/117951/CMS-Made-Simple-1.11.2-Cross-Site-Request-Forgery.html -CVE-2012-5452 - http://packetstormsecurity.org/files/116434/Subrion-CMS-2.2.1-Cross-Site-Scripting.html -CVE-2012-5452 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html -CVE-2012-5452 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5105.php -CVE-2012-5458 - http://www.vmware.com/security/advisories/VMSA-2012-0015.html -CVE-2012-5459 - http://www.vmware.com/security/advisories/VMSA-2012-0015.html -CVE-2012-5470 - http://www.exploit-db.com/exploits/21889/ -CVE-2012-5517 - http://www.kernel.org/pub/linux/kernel/v3.x/ -CVE-2012-5526 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-5529 - http://tracker.firebirdsql.org/browse/CORE-3884 -CVE-2012-5532 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2012-5533 - http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html -CVE-2012-5533 - http://www.exploit-db.com/exploits/22902 -CVE-2012-5553 - http://drupal.org/node/1834046 -CVE-2012-5553 - http://www.madirish.net/551 -CVE-2012-5558 - http://drupal.org/node/1840892 -CVE-2012-5563 - https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5 -CVE-2012-5574 - https://bugs.gentoo.org/show_bug.cgi?id=444696 -CVE-2012-5578 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5578 -CVE-2012-5611 - http://seclists.org/fulldisclosure/2012/Dec/4 -CVE-2012-5611 - http://www.exploit-db.com/exploits/23075 -CVE-2012-5611 - http://www.openwall.com/lists/oss-security/2012/12/02/3 -CVE-2012-5611 - http://www.openwall.com/lists/oss-security/2012/12/02/4 -CVE-2012-5611 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-5612 - http://seclists.org/fulldisclosure/2012/Dec/5 -CVE-2012-5612 - http://www.exploit-db.com/exploits/23076 -CVE-2012-5612 - http://www.openwall.com/lists/oss-security/2012/12/02/3 -CVE-2012-5612 - http://www.openwall.com/lists/oss-security/2012/12/02/4 -CVE-2012-5612 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2012-5613 - http://www.openwall.com/lists/oss-security/2012/12/02/3 -CVE-2012-5613 - http://www.openwall.com/lists/oss-security/2012/12/02/4 -CVE-2012-5614 - http://seclists.org/fulldisclosure/2012/Dec/7 -CVE-2012-5614 - http://www.openwall.com/lists/oss-security/2012/12/02/3 -CVE-2012-5614 - http://www.openwall.com/lists/oss-security/2012/12/02/4 -CVE-2012-5614 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2012-5615 - http://www.openwall.com/lists/oss-security/2012/12/02/3 -CVE-2012-5615 - http://www.openwall.com/lists/oss-security/2012/12/02/4 -CVE-2012-5615 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2012-5615 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2012-5619 - http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/ -CVE-2012-5627 - http://seclists.org/fulldisclosure/2012/Dec/58 -CVE-2012-5633 - http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html -CVE-2012-5656 - http://www.openwall.com/lists/oss-security/2012/12/20/3 -CVE-2012-5656 - https://bugs.launchpad.net/inkscape/+bug/1025185 -CVE-2012-5667 - https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473 -CVE-2012-5683 - http://packetstormsecurity.com/files/117894/ZPanel-10.0.1-XSS-CSRF-SQL-Injection.html -CVE-2012-5684 - http://packetstormsecurity.com/files/117894/ZPanel-10.0.1-XSS-CSRF-SQL-Injection.html -CVE-2012-5687 - http://packetstormsecurity.org/files/117749/TP-LINK-TL-WR841N-Local-File-Inclusion.html -CVE-2012-5688 - http://www.ubuntu.com/usn/USN-1657-1 -CVE-2012-5700 - http://www.exploit-db.com/exploits/22741 -CVE-2012-5701 - http://packetstormsecurity.com/files/118274/dotProject-2.1.6-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5703 - http://www.coresecurity.com/content/vmware-esx-input-validation-error -CVE-2012-5723 - http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html -CVE-2012-5777 - http://packetstormsecurity.com/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html -CVE-2012-5777 - http://packetstormsecurity.org/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html -CVE-2012-5783 - http://www.ubuntu.com/usn/USN-2769-1 -CVE-2012-5828 - https://packetstormsecurity.com/files/cve/CVE-2012-5828 -CVE-2012-5849 - http://www.exploit-db.com/exploits/23252 -CVE-2012-5853 - http://seclists.org/bugtraq/2012/Nov/33 -CVE-2012-5856 - http://packetstormsecurity.org/files/118053/WordPress-UK-Cookie-Cross-Site-Scripting.html -CVE-2012-5858 - http://packetstormsecurity.org/files/118154/Kies-Air-Denial-Of-Service-Authorization-Bypass.html -CVE-2012-5859 - http://packetstormsecurity.org/files/118154/Kies-Air-Denial-Of-Service-Authorization-Bypass.html -CVE-2012-5860 - http://www.kb.cert.org/vuls/id/659615 -CVE-2012-5865 - http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5866 - http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5872 - https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/ -CVE-2012-5873 - https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/ -CVE-2012-5874 - http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html -CVE-2012-5874 - http://www.exploit-db.com/exploits/23575 -CVE-2012-5875 - http://www.exploit-db.com/exploits/23574 -CVE-2012-5876 - http://www.exploit-db.com/exploits/24022 -CVE-2012-5877 - http://www.exploit-db.com/exploits/24022 -CVE-2012-5890 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-002/ -CVE-2012-5891 - http://packetstormsecurity.org/files/111402/Dalbum-144-Build-174-Cross-Site-Request-Forgery.html -CVE-2012-5891 - http://www.exploit-db.com/exploits/18685 -CVE-2012-5892 - http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html -CVE-2012-5893 - http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html -CVE-2012-5894 - http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html -CVE-2012-5896 - http://packetstormsecurity.org/files/111312/Quest-InTrust-10.4.x-Annotation-Objects-Code-Execution.html -CVE-2012-5896 - http://packetstormsecurity.org/files/111853/Quest-InTrust-Annotation-Objects-Uninitialized-Pointer.html -CVE-2012-5896 - http://www.exploit-db.com/exploits/18674 -CVE-2012-5898 - http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5898 - http://vulnerability-lab.com/get_content.php?id=485 -CVE-2012-5898 - http://www.exploit-db.com/exploits/18687 -CVE-2012-5899 - http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5899 - http://vulnerability-lab.com/get_content.php?id=485 -CVE-2012-5899 - http://www.exploit-db.com/exploits/18687 -CVE-2012-5900 - http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5900 - http://vulnerability-lab.com/get_content.php?id=485 -CVE-2012-5900 - http://www.exploit-db.com/exploits/18687 -CVE-2012-5901 - http://packetstormsecurity.org/files/111360/PTK-1.0.5-Cross-Site-Scripting-Unrestricted-Access.html -CVE-2012-5902 - http://packetstormsecurity.org/files/111360/PTK-1.0.5-Cross-Site-Scripting-Unrestricted-Access.html -CVE-2012-5903 - http://packetstormsecurity.org/files/111356/SMF-2.0.2-Cross-Site-Scripting.html -CVE-2012-5905 - http://packetstormsecurity.org/files/111296/KnFTPd-1.0.0-Denial-Of-Service.html -CVE-2012-5905 - http://www.exploit-db.com/exploits/18671 -CVE-2012-5906 - http://lostmon.blogspot.com/2012/03/greenbrowser-about-dialog-xss-and.html -CVE-2012-5906 - http://packetstormsecurity.org/files/111252/GreenBrowser-6.1.x-Cross-Site-Scripting.html -CVE-2012-5907 - http://packetstormsecurity.org/files/111291/TomatoCart-1.2.0-Alpha-2-Local-File-Inclusion.html -CVE-2012-5907 - http://www.mavitunasecurity.com/local-file-inclusion-vulnerability-in-tomatocart/ -CVE-2012-5908 - http://packetstormsecurity.org/files/111238/MyBB-1.6.6-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5909 - http://packetstormsecurity.org/files/111238/MyBB-1.6.6-Cross-Site-Scripting-SQL-Injection.html -CVE-2012-5910 - http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html -CVE-2012-5910 - http://vulnerability-lab.com/get_content.php?id=482 -CVE-2012-5911 - http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html -CVE-2012-5911 - http://vulnerability-lab.com/get_content.php?id=482 -CVE-2012-5912 - http://packetstormsecurity.org/files/111274/PicoPublisher-2.0-SQL-Injection.html -CVE-2012-5912 - http://www.exploit-db.com/exploits/18670 -CVE-2012-5913 - http://packetstormsecurity.org/files/111249/WordPress-Integrator-1.32-Cross-Site-Scripting.html -CVE-2012-5913 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-010.txt -CVE-2012-5914 - http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html -CVE-2012-5915 - http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html -CVE-2012-5916 - http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html -CVE-2012-5919 - http://packetstormsecurity.org/files/112089/Havalite-CMS-1.0.4-Cross-Site-Scripting.html -CVE-2012-5919 - http://www.vulnerability-lab.com/get_content.php?id=520 -CVE-2012-5956 - http://www.kb.cert.org/vuls/id/571068 -CVE-2012-5958 - http://packetstormsecurity.com/files/160242/libupnp-1.6.18-Denial-Of-Service.html -CVE-2012-5958 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5958 - https://www.tenable.com/security/research/tra-2017-10 -CVE-2012-5959 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5959 - https://www.tenable.com/security/research/tra-2017-10 -CVE-2012-5960 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5960 - https://www.tenable.com/security/research/tra-2017-10 -CVE-2012-5961 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5962 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5963 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5964 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5965 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -CVE-2012-5966 - http://www.kb.cert.org/vuls/id/876780 -CVE-2012-5968 - http://www.kb.cert.org/vuls/id/871148 -CVE-2012-5969 - http://www.kb.cert.org/vuls/id/871148 -CVE-2012-5970 - http://www.kb.cert.org/vuls/id/871148 -CVE-2012-6029 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029 -CVE-2012-6039 - http://www.exploit-db.com/exploits/18352 -CVE-2012-6045 - http://packetstormsecurity.org/files/112495/Ramui-Forum-Script-Cross-Site-Scripting.html -CVE-2012-6046 - http://packetstormsecurity.org/files/112536/PHP-Enter-Code-Injection.html -CVE-2012-6048 - http://www.exploit-db.com/exploits/18851 -CVE-2012-6049 - http://packetstormsecurity.org/files/112242/Quick.Cart-5.0-Information-Disclosure.html -CVE-2012-6050 - http://www.133tsec.com/2012/04/30/0day-ddos-mikrotik-server-side-ddos-attack/ -CVE-2012-6050 - http://www.exploit-db.com/exploits/18817 -CVE-2012-6064 - http://packetstormsecurity.org/files/117951/CMS-Made-Simple-1.11.2-Cross-Site-Request-Forgery.html -CVE-2012-6065 - http://drupal.org/node/1834046 -CVE-2012-6065 - http://www.madirish.net/551 -CVE-2012-6068 - http://www.digitalbond.com/tools/basecamp/3s-codesys/ -CVE-2012-6069 - http://www.digitalbond.com/tools/basecamp/3s-codesys/ -CVE-2012-6072 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb -CVE-2012-6073 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb -CVE-2012-6074 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb -CVE-2012-6081 - http://www.exploit-db.com/exploits/25304 -CVE-2012-6084 - http://www.ratbox.org/download/ircd-ratbox-3.0.8.tar.bz2 -CVE-2012-6084 - http://www.stack.nl/~jilles/irc/charybdis-3.4.2.tbz2 -CVE-2012-6119 - https://github.com/candlepin/candlepin/commit/f4d93230e58b969c506b4c9778e04482a059b08c -CVE-2012-6134 - https://github.com/intridea/omniauth-oauth2/pull/25 -CVE-2012-6153 - http://www.ubuntu.com/usn/USN-2769-1 -CVE-2012-6270 - http://www.kb.cert.org/vuls/id/546769 -CVE-2012-6271 - http://www.kb.cert.org/vuls/id/519137 -CVE-2012-6273 - http://www.kb.cert.org/vuls/id/990652 -CVE-2012-6274 - http://www.kb.cert.org/vuls/id/990652 -CVE-2012-6275 - http://www.kb.cert.org/vuls/id/990652 -CVE-2012-6290 - http://packetstormsecurity.com/files/119806/ImageCMS-4.0.0b-SQL-Injection.html -CVE-2012-6297 - https://packetstormsecurity.com/files/cve/CVE-2012-6297 -CVE-2012-6301 - http://packetstormsecurity.org/files/118539/Android-4.0.3-Browser-Crash.html -CVE-2012-6303 - http://www.exploit-db.com/exploits/19772 -CVE-2012-6307 - https://www.exploit-db.com/exploits/21739/ -CVE-2012-6329 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2012-6334 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html -CVE-2012-6335 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html -CVE-2012-6336 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html -CVE-2012-6337 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html -CVE-2012-6340 - https://packetstormsecurity.com/files/118854/Netgear-WGR614-Credential-Information.html -CVE-2012-6341 - https://packetstormsecurity.com/files/date/2012-12-14/ -CVE-2012-6342 - http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html -CVE-2012-6342 - http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities -CVE-2012-6346 - https://www.vulnerability-lab.com/get_content.php?id=702 -CVE-2012-6347 - https://www.vulnerability-lab.com/get_content.php?id=558 -CVE-2012-6369 - http://packetstormsecurity.org/files/118467/Agilebits-1Password-3.9.9-Cross-Site-Scripting.html -CVE-2012-6369 - http://www.youtube.com/watch?v=A1kPL9ggRi4 -CVE-2012-6422 - http://forum.xda-developers.com/showthread.php?p=35469999 -CVE-2012-6422 - http://forum.xda-developers.com/showthread.php?t=2051290 -CVE-2012-6422 - http://www.securityweek.com/new-vulnerability-exposed-samsungs-android-devices -CVE-2012-6429 - http://packetstormsecurity.com/files/119423/Samsung-Kies-2.5.0.12114_1-Buffer-Overflow.html -CVE-2012-6430 - http://packetstormsecurity.com/files/119422/Quick.Cms-5.0-Quick.Cart-6.0-Cross-Site-Scripting.html -CVE-2012-6448 - https://www.exploit-db.com/exploits/38153 -CVE-2012-6449 - https://packetstormsecurity.com/files/119113/C-Panel-WHM-11.34.0-Cross-Site-Scripting.html -CVE-2012-6493 - http://packetstormsecurity.com/files/119260/Nexpose-Security-Console-Cross-Site-Request-Forgery.html -CVE-2012-6493 - http://www.exploit-db.com/exploits/23924 -CVE-2012-6498 - http://thaicert.or.th/alerts/admin/2012/al2012ad025.html -CVE-2012-6498 - http://www.youtube.com/watch?v=CfvTCSS3LGY -CVE-2012-6504 - http://www.exploit-db.com/exploits/18788 -CVE-2012-6505 - http://www.exploit-db.com/exploits/18788 -CVE-2012-6507 - http://packetstormsecurity.org/files/112106/ChurchCMS-0.0.1-SQL-Injection.html -CVE-2012-6508 - http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html -CVE-2012-6508 - http://www.vulnerability-lab.com/get_content.php?id=502 -CVE-2012-6509 - http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html -CVE-2012-6509 - http://www.vulnerability-lab.com/get_content.php?id=502 -CVE-2012-6510 - http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html -CVE-2012-6510 - http://www.vulnerability-lab.com/get_content.php?id=502 -CVE-2012-6511 - http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html -CVE-2012-6512 - http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html -CVE-2012-6514 - http://packetstormsecurity.org/files/112235/Joomla-nBill-Lite-Cross-Site-Scripting.html -CVE-2012-6516 - http://www.exploit-db.com/exploits/18778 -CVE-2012-6517 - http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html -CVE-2012-6517 - http://www.exploit-db.com/exploits/18804 -CVE-2012-6517 - http://www.vulnerability-lab.com/get_content.php?id=518 -CVE-2012-6518 - http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html -CVE-2012-6518 - http://www.exploit-db.com/exploits/18804 -CVE-2012-6518 - http://www.vulnerability-lab.com/get_content.php?id=518 -CVE-2012-6519 - http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html -CVE-2012-6519 - http://www.exploit-db.com/exploits/18804 -CVE-2012-6519 - http://www.vulnerability-lab.com/get_content.php?id=518 -CVE-2012-6520 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-005.txt -CVE-2012-6520 - http://www.openwall.com/lists/oss-security/2012/04/13/4 -CVE-2012-6520 - http://www.openwall.com/lists/oss-security/2012/04/15/1 -CVE-2012-6521 - http://packetstormsecurity.org/files/115253/Elefant-CMS-1.2.0-Cross-Site-Scripting.html -CVE-2012-6522 - http://www.exploit-db.com/exploits/18711 -CVE-2012-6526 - http://packetstormsecurity.org/files/108756/vastalfreelance-sql.txt -CVE-2012-6528 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-002.txt -CVE-2012-6534 - http://seclists.org/fulldisclosure/2012/Oct/25 -CVE-2012-6534 - https://www.exploit-db.com/exploits/21744/ -CVE-2012-6542 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2012-6544 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2012-6545 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2012-6546 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2012-6547 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2012-6548 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2012-6548 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2012-6548 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2012-6549 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2012-6549 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2012-6553 - http://waleedassar.blogspot.com/2012/05/resource-hacker-heap-overflow.html -CVE-2012-6558 - http://waleedassar.blogspot.com/2012/05/pe-explorer-heap-overflow-vulnerability.html -CVE-2012-6561 - http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip -CVE-2012-6562 - http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip -CVE-2012-6563 - http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip -CVE-2012-6572 - http://www.madirish.net/550 -CVE-2012-6586 - http://www.exploit-db.com/exploits/22712/ -CVE-2012-6587 - http://www.exploit-db.com/exploits/22712/ -CVE-2012-6607 - https://github.com/hercules-team/augeas/commit/16387744 -CVE-2012-6608 - http://packetstormsecurity.com/files/118454/Elastix-2.3.0-Cross-Site-Scripting.html -CVE-2012-6611 - https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html -CVE-2012-6611 - https://www.exploit-db.com/exploits/43032 -CVE-2012-6613 - http://www.exploit-db.com/exploits/22930/ -CVE-2012-6614 - http://www.exploit-db.com/exploits/22930/ -CVE-2012-6614 - https://packetstormsecurity.com/files/118355/D-Link-DSR-250N-Backdoor.html -CVE-2012-6621 - http://packetstormsecurity.com/files/124711 -CVE-2012-6621 - http://packetstormsecurity.org/files/112643/GetSimple-CMS-3.1-Cross-Site-Scripting.html -CVE-2012-6621 - http://www.vulnerability-lab.com/get_content.php?id=521 -CVE-2012-6622 - http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html -CVE-2012-6623 - http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html -CVE-2012-6624 - http://packetstormsecurity.org/files/112689/WordPress-Soundcloud-Is-Gold-2.1-Cross-Site-Scripting.html -CVE-2012-6625 - http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html -CVE-2012-6626 - http://www.exploit-db.com/exploits/18882 -CVE-2012-6627 - http://packetstormsecurity.org/files/112694/WordPress-Newsletter-Manager-1.0-Cross-Site-Scripting.html -CVE-2012-6628 - http://packetstormsecurity.org/files/112694/WordPress-Newsletter-Manager-1.0-Cross-Site-Scripting.html -CVE-2012-6630 - http://packetstormsecurity.org/files/112697/WordPress-Media-Categories-1.1.1-Cross-Site-Scripting.html -CVE-2012-6631 - http://packetstormsecurity.org/files/112655/NetBill-Billing-System-1.2-CSRF-XSS.html -CVE-2012-6632 - http://packetstormsecurity.org/files/112655/NetBill-Billing-System-1.2-CSRF-XSS.html -CVE-2012-6636 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2012-6637 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt -CVE-2012-6637 - http://seclists.org/bugtraq/2014/Jan/96 -CVE-2012-6637 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2012-6643 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt -CVE-2012-6644 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt -CVE-2012-6645 - http://drupal.org/node/1432318 -CVE-2012-6658 - http://www.exploit-db.com/exploits/20063 -CVE-2012-6666 - https://www.exploit-db.com/exploits/37944 -CVE-2012-6684 - http://co3k.org/blog/redcloth-unfixed-xss-en -CVE-2012-6684 - http://seclists.org/fulldisclosure/2014/Dec/50 -CVE-2012-6687 - https://bugzilla.redhat.com/show_bug.cgi?id=1189958 -CVE-2012-6692 - http://packetstormsecurity.com/files/132294/WordPress-Yoast-2.1.1-Cross-Site-Scripting.html -CVE-2012-6698 - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 -CVE-2012-6699 - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 -CVE-2012-6700 - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 -CVE-2012-6702 - https://www.tenable.com/security/tns-2016-20 -CVE-2012-6705 - http://st2tea.blogspot.com/2012/02/jamroom-cross-site-scripting.html -CVE-2012-6706 - http://telussecuritylabs.com/threats/show/TSL20121207-01 -CVE-2012-6706 - https://lock.cmpxchg8b.com/sophailv2.pdf -CVE-2012-6708 - http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html -CVE-2012-6708 - http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html -CVE-2012-6708 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2012-6710 - http://itsecuritysolutions.org/2012-12-31-eXtplorer-v2.1-authentication-bypass-vulnerability -CVE-2012-6720 - http://seclists.org/oss-sec/2012/q2/396 -CVE-2012-6721 - https://seclists.org/oss-sec/2012/q2/396 -CVE-2013-0008 - http://www.exploit-db.com/exploits/24485 -CVE-2013-0019 - https://www.exploit-db.com/exploits/40879/ -CVE-2013-0077 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-011 -CVE-2013-0079 - http://www.kb.cert.org/vuls/id/851777 -CVE-2013-0086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-025 -CVE-2013-0090 - http://packetstormsecurity.com/files/140186/Microsoft-Internet-Explorer-9-IEFRAME-CView-EnsureSize-Use-After-Free.html -CVE-2013-0090 - https://www.exploit-db.com/exploits/40935/ -CVE-2013-0109 - http://www.kb.cert.org/vuls/id/957036 -CVE-2013-0110 - http://www.kb.cert.org/vuls/id/957036 -CVE-2013-0111 - http://www.kb.cert.org/vuls/id/957036 -CVE-2013-0113 - http://www.kb.cert.org/vuls/id/248449 -CVE-2013-0120 - http://www.kb.cert.org/vuls/id/160460 -CVE-2013-0122 - http://www.kb.cert.org/vuls/id/131263 -CVE-2013-0123 - http://www.kb.cert.org/vuls/id/406596 -CVE-2013-0124 - http://www.kb.cert.org/vuls/id/406596 -CVE-2013-0126 - http://www.kb.cert.org/vuls/id/278204 -CVE-2013-0135 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html -CVE-2013-0140 - http://www.kb.cert.org/vuls/id/209131 -CVE-2013-0140 - https://kc.mcafee.com/corporate/index?page=content&id=SB10042 -CVE-2013-0141 - http://www.kb.cert.org/vuls/id/209131 -CVE-2013-0141 - https://kc.mcafee.com/corporate/index?page=content&id=SB10042 -CVE-2013-0149 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-0150 - https://nealpoole.com/blog/2013/07/code-execution-via-f5-networks-java-applet/ -CVE-2013-0156 - http://www.insinuator.net/2013/01/rails-yaml/ -CVE-2013-0156 - https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156 -CVE-2013-0158 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-01-04.cb -CVE-2013-0160 - http://www.openwall.com/lists/oss-security/2013/01/08/3 -CVE-2013-0160 - https://bugzilla.redhat.com/show_bug.cgi?id=892983 -CVE-2013-0169 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-0169 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-0175 - https://github.com/sferik/multi_xml/pull/34 -CVE-2013-0177 - http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html -CVE-2013-0191 - http://sourceforge.net/p/pam-pgsql/bugs/13/ -CVE-2013-0216 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-0217 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-0228 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-0228 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2013-0230 - https://www.exploit-db.com/exploits/36839/ -CVE-2013-0232 - http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/ -CVE-2013-0234 - http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html -CVE-2013-0236 - https://bugzilla.redhat.com/show_bug.cgi?id=904121 -CVE-2013-0238 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267 -CVE-2013-0238 - http://www.openwall.com/lists/oss-security/2013/01/29/8 -CVE-2013-0239 - http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html -CVE-2013-0244 - http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html -CVE-2013-0245 - http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html -CVE-2013-0246 - http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html -CVE-2013-0248 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2013-0249 - http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/ -CVE-2013-0249 - http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html -CVE-2013-0249 - http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html -CVE-2013-0249 - http://www.exploit-db.com/exploits/24487 -CVE-2013-0249 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-0255 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2013-0261 - http://rhn.redhat.com/errata/RHSA-2013-0595.html -CVE-2013-0263 - https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ -CVE-2013-0266 - http://rhn.redhat.com/errata/RHSA-2013-0595.html -CVE-2013-0286 - http://www.openwall.com/lists/oss-security/2013/02/14/4 -CVE-2013-0290 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-0291 - http://www.openwall.com/lists/oss-security/2013/02/15/3 -CVE-2013-0292 - http://www.exploit-db.com/exploits/33614 -CVE-2013-0292 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-0308 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2013-0311 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-0322 - http://drupal.org/node/1922136 -CVE-2013-0327 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb -CVE-2013-0328 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb -CVE-2013-0329 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb -CVE-2013-0330 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb -CVE-2013-0331 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb -CVE-2013-0334 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2013-0338 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-0338 - http://www.ubuntu.com/usn/USN-1782-1 -CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/33 -CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/34 -CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/35 -CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/38 -CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/39 -CVE-2013-0343 - http://www.ubuntu.com/usn/USN-1976-1 -CVE-2013-0349 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2013-0351 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0367 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0368 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0371 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0375 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0383 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0384 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0385 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0386 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0389 - http://www.ubuntu.com/usn/USN-1703-1 -CVE-2013-0398 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-0401 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-0401 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ -CVE-2013-0402 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-0402 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ -CVE-2013-0403 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0404 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0405 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0406 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0408 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0409 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0410 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0411 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0412 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0413 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0416 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-0419 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0422 - http://immunityproducts.blogspot.ca/2013/01/confirmed-java-only-fixed-one-of-two.html -CVE-2013-0422 - http://krebsonsecurity.com/2013/01/zero-day-java-exploit-debuts-in-crimeware/ -CVE-2013-0422 - http://seclists.org/bugtraq/2013/Jan/48 -CVE-2013-0422 - https://threatpost.com/en_us/blogs/nasty-new-java-zero-day-found-exploit-kits-already-have-it-011013 -CVE-2013-0423 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0424 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0425 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0426 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0427 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0428 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0428 - https://bugzilla.redhat.com/show_bug.cgi?id=907207 -CVE-2013-0429 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0430 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0431 - http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ -CVE-2013-0431 - http://seclists.org/fulldisclosure/2013/Jan/142 -CVE-2013-0431 - http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717 -CVE-2013-0431 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0432 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0433 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0434 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0435 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0436 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0437 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0438 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0439 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0440 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0441 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0442 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0443 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0444 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0445 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0446 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0447 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0448 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0449 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0450 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-0499 - http://seclists.org/bugtraq/2013/May/83 -CVE-2013-0577 - http://www-01.ibm.com/support/docview.wss?uid=swg21651990 -CVE-2013-0579 - http://www-01.ibm.com/support/docview.wss?uid=swg21651990 -CVE-2013-0580 - http://www-01.ibm.com/support/docview.wss?uid=swg21651990 -CVE-2013-0597 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-0608 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16037 -CVE-2013-0618 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15822 -CVE-2013-0657 - https://www.exploit-db.com/exploits/45218/ -CVE-2013-0662 - https://www.exploit-db.com/exploits/45219/ -CVE-2013-0662 - https://www.exploit-db.com/exploits/45220/ -CVE-2013-0663 - https://www.exploit-db.com/exploits/44678/ -CVE-2013-0722 - http://www.exploit-db.com/exploits/23945/ -CVE-2013-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=805121 -CVE-2013-0753 - https://bugzilla.mozilla.org/show_bug.cgi?id=814001 -CVE-2013-0754 - https://bugzilla.mozilla.org/show_bug.cgi?id=814026 -CVE-2013-0755 - https://bugzilla.mozilla.org/show_bug.cgi?id=814027 -CVE-2013-0756 - https://bugzilla.mozilla.org/show_bug.cgi?id=814029 -CVE-2013-0757 - https://bugzilla.mozilla.org/show_bug.cgi?id=813901 -CVE-2013-0758 - https://bugzilla.mozilla.org/show_bug.cgi?id=813906 -CVE-2013-0774 - https://bugzilla.mozilla.org/show_bug.cgi?id=827193 -CVE-2013-0787 - https://bugzilla.mozilla.org/show_bug.cgi?id=848644 -CVE-2013-0788 - https://bugzilla.mozilla.org/show_bug.cgi?id=813442 -CVE-2013-0788 - https://bugzilla.mozilla.org/show_bug.cgi?id=840263 -CVE-2013-0791 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-0793 - https://bugzilla.mozilla.org/show_bug.cgi?id=803870 -CVE-2013-0797 - https://bugzilla.mozilla.org/show_bug.cgi?id=830134 -CVE-2013-0799 - https://bugzilla.mozilla.org/show_bug.cgi?id=848417 -CVE-2013-0803 - https://packetstormsecurity.com/files/cve/CVE-2013-0803 -CVE-2013-0805 - http://packetstormsecurity.com/files/119767/iTop-Cross-Site-Scripting.html -CVE-2013-0807 - http://packetstormsecurity.com/files/119805/gpEasy-3.5.2-Cross-Site-Scripting.html -CVE-2013-0871 - http://www.openwall.com/lists/oss-security/2013/02/15/16 -CVE-2013-0871 - http://www.ubuntu.com/usn/USN-1737-1 -CVE-2013-0871 - http://www.ubuntu.com/usn/USN-1741-1 -CVE-2013-0894 - http://www.ubuntu.com/usn/USN-1790-1 -CVE-2013-0913 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2013-0914 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-0914 - http://www.ubuntu.com/usn/USN-1788-1 -CVE-2013-0946 - https://www.exploit-db.com/exploits/42719/ -CVE-2013-10001 - https://vuldb.com/?id.8900 -CVE-2013-10003 - https://vuldb.com/?id.12789 -CVE-2013-1034 - http://www.cloudscan.me/2013/09/cve-2013-1034-stored-xss-xxe-os-x.html -CVE-2013-1052 - http://www.ubuntu.com/usn/USN-1766-1 -CVE-2013-1054 - https://launchpad.net/bugs/1175661 -CVE-2013-1055 - https://launchpad.net/bugs/1175691 -CVE-2013-1060 - http://www.ubuntu.com/usn/USN-1938-1 -CVE-2013-1100 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100 -CVE-2013-1115 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex -CVE-2013-1116 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex -CVE-2013-1117 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex -CVE-2013-1118 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex -CVE-2013-1119 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex -CVE-2013-1124 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1124 -CVE-2013-1140 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1140 -CVE-2013-1142 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat -CVE-2013-1145 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-cce -CVE-2013-1300 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-1306 - http://packetstormsecurity.com/files/140092/Microsoft-Internet-Explorer-9-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html -CVE-2013-1306 - https://www.exploit-db.com/exploits/40894/ -CVE-2013-1309 - http://packetstormsecurity.com/files/140094/Microsoft-Internet-Explorer-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html -CVE-2013-1309 - https://www.exploit-db.com/exploits/40893/ -CVE-2013-1340 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-1345 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-1352 - https://packetstormsecurity.com/files/cve/CVE-2013-1352/page1/ -CVE-2013-1353 - https://packetstormsecurity.com/files/119461/OrangeHRM-2.7.1-Cross-Site-Scripting.html -CVE-2013-1359 - https://packetstormsecurity.com/files/author/7547/ -CVE-2013-1359 - https://seclists.org/fulldisclosure/2013/Jan/125 -CVE-2013-1360 - http://www.exploit-db.com/exploits/24203 -CVE-2013-1360 - https://packetstormsecurity.com/files/cve/CVE-2013-1360 -CVE-2013-1364 - https://support.zabbix.com/browse/ZBX-6097 -CVE-2013-1393 - http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html -CVE-2013-1393 - http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html -CVE-2013-1408 - http://packetstormsecurity.com/files/120089/WordPress-Wysija-Newsletters-2.2-SQL-Injection.html -CVE-2013-1409 - http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html -CVE-2013-1410 - https://www.exploit-database.net/?id=59355 -CVE-2013-1414 - http://www.exploit-db.com/exploits/26528/ -CVE-2013-1418 - https://github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d -CVE-2013-1436 - http://www.openwall.com/lists/oss-security/2013/07/26/5 -CVE-2013-1438 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-1450 - http://pastebin.com/raw.php?i=rz9BcBey -CVE-2013-1450 - http://www.youtube.com/ChristianHaiderPoC -CVE-2013-1450 - http://www.youtube.com/watch?v=TPqagWAvo8U -CVE-2013-1451 - http://pastebin.com/raw.php?i=rz9BcBey -CVE-2013-1451 - http://www.youtube.com/ChristianHaiderPoC -CVE-2013-1451 - http://www.youtube.com/watch?v=TPqagWAvo8U -CVE-2013-1453 - http://karmainsecurity.com/KIS-2013-03 -CVE-2013-1463 - http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html -CVE-2013-1464 - http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html -CVE-2013-1465 - http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html -CVE-2013-1466 - http://packetstormsecurity.com/files/120423/glFusion-1.2.2-Cross-Site-Scripting.html -CVE-2013-1466 - http://www.exploit-db.com/exploits/24536 -CVE-2013-1468 - http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html -CVE-2013-1468 - http://www.exploit-db.com/exploits/24561 -CVE-2013-1469 - http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html -CVE-2013-1469 - http://www.exploit-db.com/exploits/24561 -CVE-2013-1469 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php -CVE-2013-1470 - http://packetstormsecurity.com/files/120593/Geeklog-1.8.2-Cross-Site-Scripting.html -CVE-2013-1471 - http://www.vulnerability-lab.com/get_content.php?id=701 -CVE-2013-1471 - http://www.youtube.com/watch?v=5d7cIaM80oY -CVE-2013-1472 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1473 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1474 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1474 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16378 -CVE-2013-1475 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1476 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1477 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1478 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1479 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1480 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1481 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1482 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1483 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1488 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1488 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ -CVE-2013-1489 - http://seclists.org/fulldisclosure/2013/Jan/241 -CVE-2013-1489 - http://thenextweb.com/insider/2013/01/28/new-vulnerability-bypasses-oracles-attempt-to-stop-malware-drive-by-downloads-via-java-applets/ -CVE-2013-1489 - http://www.informationweek.com/security/application-security/java-security-work-remains-bug-hunter-sa/240147150 -CVE-2013-1489 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -CVE-2013-1489 - http://www.zdnet.com/java-update-doesnt-prevent-silent-exploits-at-all-7000010422/ -CVE-2013-1490 - http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ -CVE-2013-1490 - http://seclists.org/fulldisclosure/2013/Jan/142 -CVE-2013-1490 - http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717 -CVE-2013-1491 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1491 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ -CVE-2013-1493 - http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident -CVE-2013-1494 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1495 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1496 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1497 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1498 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1499 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1500 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-1500 - http://www.securityfocus.com/bid/60627 -CVE-2013-1501 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1502 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-1502 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1503 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1504 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1505 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1506 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1507 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1508 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1509 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1510 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1511 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-1511 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1512 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1513 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1514 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1515 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1516 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1517 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1518 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1518 - https://bugzilla.redhat.com/show_bug.cgi?id=952646 -CVE-2013-1519 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1520 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1521 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1522 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1523 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1524 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1525 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1526 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1527 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1528 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1529 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1530 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1531 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1532 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1533 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1534 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1535 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1536 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1537 - http://seclists.org/fulldisclosure/2013/Feb/18 -CVE-2013-1537 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1538 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1539 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1540 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1541 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1542 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1543 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1544 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1545 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1546 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1547 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1548 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1549 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1550 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1551 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1552 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1553 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1554 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1555 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1556 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1557 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1558 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1559 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1560 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1561 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1562 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1563 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1564 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1565 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1566 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1567 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1568 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1569 - http://bugs.icu-project.org/trac/ticket/10107 -CVE-2013-1569 - http://site.icu-project.org/download/51#TOC-Known-Issues -CVE-2013-1569 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2013-1569 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-1569 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-1570 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-1571 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-1571 - http://www.securityfocus.com/bid/60634 -CVE-2013-1586 - http://anonsvn.wireshark.org/viewvc/trunk/epan/reassemble.c?r1=46999&r2=46998&pathrev=46999 -CVE-2013-1592 - http://www.coresecurity.com/content/SAP-netweaver-msg-srv-multiple-vulnerabilities -CVE-2013-1592 - http://www.exploit-db.com/exploits/24511 -CVE-2013-1592 - https://packetstormsecurity.com/files/cve/CVE-2013-1592 -CVE-2013-1593 - https://packetstormsecurity.com/files/cve/CVE-2013-1593 -CVE-2013-1593 - https://www.coresecurity.com/content/SAP-netweaver-msg-srv-multiple-vulnerabilities -CVE-2013-1594 - http://www.exploit-db.com/exploits/25139 -CVE-2013-1594 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt -CVE-2013-1594 - https://packetstormsecurity.com/files/cve/CVE-2013-1594 -CVE-2013-1594 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities -CVE-2013-1595 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt -CVE-2013-1595 - https://packetstormsecurity.com/files/cve/CVE-2013-1595 -CVE-2013-1595 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities -CVE-2013-1596 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt -CVE-2013-1596 - https://packetstormsecurity.com/files/cve/CVE-2013-1596 -CVE-2013-1596 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities -CVE-2013-1597 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt -CVE-2013-1597 - https://packetstormsecurity.com/files/cve/CVE-2013-1597 -CVE-2013-1597 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities -CVE-2013-1598 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt -CVE-2013-1598 - https://packetstormsecurity.com/files/cve/CVE-2013-1598 -CVE-2013-1598 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities -CVE-2013-1599 - http://www.exploit-db.com/exploits/25138 -CVE-2013-1599 - https://packetstormsecurity.com/files/cve/CVE-2013-1599 -CVE-2013-1599 - https://seclists.org/fulldisclosure/2013/Apr/253 -CVE-2013-1599 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities -CVE-2013-1600 - https://packetstormsecurity.com/files/cve/CVE-2013-1600 -CVE-2013-1600 - https://vuldb.com/?id.8572 -CVE-2013-1600 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities -CVE-2013-1601 - https://packetstormsecurity.com/files/cve/CVE-2013-1601 -CVE-2013-1601 - https://vuldb.com/?id.8573 -CVE-2013-1601 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities -CVE-2013-1602 - https://packetstormsecurity.com/files/cve/CVE-2013-1602 -CVE-2013-1602 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities -CVE-2013-1603 - https://packetstormsecurity.com/files/cve/CVE-2013-1603 -CVE-2013-1603 - https://vuldb.com/?id.8575 -CVE-2013-1603 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities -CVE-2013-1604 - http://seclists.org/fulldisclosure/2013/May/194 -CVE-2013-1604 - http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities -CVE-2013-1604 - http://www.exploit-db.com/exploits/25813 -CVE-2013-1605 - http://packetstormsecurity.com/files/121787/MayGion-IP-Camera-Path-Traversal-Buffer-Overflow.html -CVE-2013-1605 - http://seclists.org/fulldisclosure/2013/May/194 -CVE-2013-1605 - http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities -CVE-2013-1605 - http://www.exploit-db.com/exploits/25813 -CVE-2013-1606 - http://www.coresecurity.com/advisories/buffer-overflow-ubiquiti-aircam-rtsp-service -CVE-2013-1606 - http://www.exploit-db.com/exploits/26138/ -CVE-2013-1616 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html -CVE-2013-1617 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html -CVE-2013-1618 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-1619 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-1620 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-1620 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1620 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-1621 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-1623 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-1624 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf -CVE-2013-1629 - http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/ -CVE-2013-1629 - https://github.com/pypa/pip/issues/425 -CVE-2013-1630 - http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/ -CVE-2013-1630 - https://github.com/mardiros/pyshop/blob/master/CHANGES.txt -CVE-2013-1633 - http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/ -CVE-2013-1636 - http://packetstormsecurity.com/files/120433/WordPress-Pretty-Link-1.6.3-Cross-Site-Scripting.html -CVE-2013-1636 - http://packetstormsecurity.com/files/121623/Joomla-Jnews-8.0.1-Cross-Site-Scripting.html -CVE-2013-1640 - http://ubuntu.com/usn/usn-1759-1 -CVE-2013-1641 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt -CVE-2013-1642 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt -CVE-2013-1652 - http://ubuntu.com/usn/usn-1759-1 -CVE-2013-1653 - http://ubuntu.com/usn/usn-1759-1 -CVE-2013-1654 - http://ubuntu.com/usn/usn-1759-1 -CVE-2013-1655 - http://ubuntu.com/usn/usn-1759-1 -CVE-2013-1667 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1668 - http://www.exploit-db.com/exploits/24629 -CVE-2013-1672 - https://bugzilla.mozilla.org/show_bug.cgi?id=850492 -CVE-2013-1682 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1684 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1685 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1686 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1687 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1690 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1692 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1692 - https://bugzilla.mozilla.org/show_bug.cgi?id=866915 -CVE-2013-1693 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1693 - https://bugzilla.mozilla.org/show_bug.cgi?id=711043 -CVE-2013-1694 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1697 - http://www.ubuntu.com/usn/USN-1891-1 -CVE-2013-1705 - https://bugzilla.mozilla.org/show_bug.cgi?id=882865 -CVE-2013-1706 - https://bugzilla.mozilla.org/show_bug.cgi?id=888361 -CVE-2013-1707 - https://bugzilla.mozilla.org/show_bug.cgi?id=888314 -CVE-2013-1712 - https://bugzilla.mozilla.org/show_bug.cgi?id=859072 -CVE-2013-1721 - https://bugzilla.mozilla.org/show_bug.cgi?id=890277 -CVE-2013-1726 - https://bugzilla.mozilla.org/show_bug.cgi?id=890853 -CVE-2013-1733 - https://bugzilla.mozilla.org/show_bug.cgi?id=911593 -CVE-2013-1734 - https://bugzilla.mozilla.org/show_bug.cgi?id=913904 -CVE-2013-1739 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1739 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-1740 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1740 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-1741 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1741 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-1742 - https://bugzilla.mozilla.org/show_bug.cgi?id=924802 -CVE-2013-1744 - http://infosecabsurdity.wordpress.com/research/isa-2013-002/ -CVE-2013-1758 - http://packetstormsecurity.com/files/120378/WordPress-Marekkis-Watermark-Cross-Site-Scripting.html -CVE-2013-1759 - http://packetstormsecurity.com/files/120379/WordPress-Responsive-Logo-Slideshow-Cross-Site-Scripting.html -CVE-2013-1763 - http://www.exploit-db.com/exploits/33336 -CVE-2013-1763 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1763 - http://www.openwall.com/lists/oss-security/2013/02/24/3 -CVE-2013-1767 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1767 - http://www.ubuntu.com/usn/USN-1788-1 -CVE-2013-1768 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-1773 - http://www.exploit-db.com/exploits/23248/ -CVE-2013-1774 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2013-1775 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1776 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1781 - http://drupal.org/node/1929486 -CVE-2013-1786 - http://drupalcode.org/project/company.git/commitdiff/d9a99da -CVE-2013-1792 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1792 - http://www.ubuntu.com/usn/USN-1788-1 -CVE-2013-1796 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1796 - http://www.ubuntu.com/usn/USN-1808-1 -CVE-2013-1797 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1798 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html -CVE-2013-1798 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1803 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html -CVE-2013-1804 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html -CVE-2013-1806 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html -CVE-2013-1807 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html -CVE-2013-1808 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb -CVE-2013-1808 - http://www.openwall.com/lists/oss-security/2013/03/10/2 -CVE-2013-1812 - https://github.com/openid/ruby-openid/pull/43 -CVE-2013-1813 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2013-1813 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2013-1813 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2013-1813 - http://seclists.org/fulldisclosure/2020/Mar/15 -CVE-2013-1813 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2013-1815 - http://rhn.redhat.com/errata/RHSA-2013-0671.html -CVE-2013-1819 - http://www.ubuntu.com/usn/USN-1973-1 -CVE-2013-1828 - http://www.exploit-db.com/exploits/24747 -CVE-2013-1828 - https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1 -CVE-2013-1848 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1848 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2013-1852 - http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html -CVE-2013-1858 - http://stealth.openwall.net/xSports/clown-newuser.c -CVE-2013-1859 - http://packetstormsecurity.com/files/120788/Drupal-Node-Parameter-Control-6.x-Access-Bypass.html -CVE-2013-1860 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1860 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2013-1861 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-1862 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-1875 - http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html -CVE-2013-1887 - http://packetstormsecurity.com/files/120892/Drupal-Views-7.x-Cross-Site-Scripting.html -CVE-2013-1892 - http://www.exploit-db.com/exploits/24947 -CVE-2013-1896 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-1900 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2013-1902 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2013-1903 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2013-1905 - http://packetstormsecurity.com/files/120985/Drupal-Zero-Point-7.x-Cross-Site-Scripting.html -CVE-2013-1907 - http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html -CVE-2013-1908 - http://packetstormsecurity.com/files/120995/Drupal-Common-Wikis-7.x-Access-Bypass-Privilege-Escalation.html -CVE-2013-1914 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -CVE-2013-1914 - http://seclists.org/fulldisclosure/2021/Sep/0 -CVE-2013-1916 - https://www.exploit-db.com/exploits/16181 -CVE-2013-1925 - http://packetstormsecurity.com/files/121072/Drupal-Chaos-Tool-Suite-7.x-Access-Bypass.html -CVE-2013-1929 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1929 - http://www.ubuntu.com/usn/USN-1834-1 -CVE-2013-1937 - http://immunityservices.blogspot.com/2019/02/cvss.html -CVE-2013-1937 - http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html -CVE-2013-1940 - https://bugs.freedesktop.org/show_bug.cgi?id=63353 -CVE-2013-1942 - https://github.com/happyworm/jPlayer/commit/e8ca190f7f972a6a421cb95f09e138720e40ed6d -CVE-2013-1944 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-1954 - http://trac.videolan.org/vlc/ticket/8024 -CVE-2013-1959 - http://www.openwall.com/lists/oss-security/2013/04/29/1 -CVE-2013-1965 - http://struts.apache.org/development/2.x/docs/s2-012.html -CVE-2013-1966 - http://struts.apache.org/development/2.x/docs/s2-013.html -CVE-2013-1966 - https://cwiki.apache.org/confluence/display/WW/S2-013 -CVE-2013-1967 - https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd -CVE-2013-1977 - https://bugs.launchpad.net/devstack/+bug/1168252 -CVE-2013-1979 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-1979 - http://www.openwall.com/lists/oss-security/2013/04/29/1 -CVE-2013-20002 - https://en.0day.today/exploit/22090 -CVE-2013-20002 - https://packetstormsecurity.com/files/124149/WordPress-Elemin-Shell-Upload.html -CVE-2013-20002 - https://themify.me/blog/urgent-vulnerability-found-in-themify-framework-please-read -CVE-2013-20003 - https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/ -CVE-2013-20003 - https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf -CVE-2013-2006 - https://bugs.launchpad.net/ossn/+bug/1168252 -CVE-2013-2010 - http://packetstormsecurity.com/files/130999/WordPress-W3-Total-Cache-PHP-Code-Execution.html -CVE-2013-2017 - http://www.openwall.com/lists/oss-security/2013/04/29/10 -CVE-2013-2018 - http://www.openwall.com/lists/oss-security/2013/04/29/11 -CVE-2013-2019 - http://www.openwall.com/lists/oss-security/2013/04/29/11 -CVE-2013-2024 - http://www.openwall.com/lists/oss-security/2013/04/29/13 -CVE-2013-2025 - https://github.com/ushahidi/Ushahidi_Web/issues/1009 -CVE-2013-2027 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2013-2028 - http://packetstormsecurity.com/files/121675/Nginx-1.3.9-1.4.0-Denial-Of-Service.html -CVE-2013-2028 - https://github.com/rapid7/metasploit-framework/pull/1834 -CVE-2013-2031 - https://bugzilla.wikimedia.org/show_bug.cgi?id=47304 -CVE-2013-2033 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb -CVE-2013-2034 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb -CVE-2013-2036 - https://drupal.org/node/1983356 -CVE-2013-2050 - http://packetstormsecurity.com/files/124609/cfme_manageiq_evm_pass_reset.rb.txt -CVE-2013-2061 - https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc -CVE-2013-2064 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2013-2067 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2013-2088 - https://www.exploit-db.com/exploits/40507/ -CVE-2013-2090 - http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html -CVE-2013-2094 - http://packetstormsecurity.com/files/121616/semtex.c -CVE-2013-2094 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2094 - http://www.reddit.com/r/netsec/comments/1eb9iw -CVE-2013-2095 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095 -CVE-2013-2097 - http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html -CVE-2013-2097 - http://www.exploit-db.com/exploits/25519 -CVE-2013-2105 - http://vapid.dhs.org/advisories/show_in_browser.html -CVE-2013-2105 - http://www.openwall.com/lists/oss-security/2013/05/18/4 -CVE-2013-2107 - http://seclists.org/oss-sec/2013/q2/356 -CVE-2013-2115 - http://struts.apache.org/development/2.x/docs/s2-014.html -CVE-2013-2115 - https://cwiki.apache.org/confluence/display/WW/S2-014 -CVE-2013-2131 - https://github.com/oetiker/rrdtool-1.x/pull/397 -CVE-2013-2134 - http://struts.apache.org/development/2.x/docs/s2-015.html -CVE-2013-2134 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-2134 - https://cwiki.apache.org/confluence/display/WW/S2-015 -CVE-2013-2135 - http://struts.apache.org/development/2.x/docs/s2-015.html -CVE-2013-2135 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-2135 - https://cwiki.apache.org/confluence/display/WW/S2-015 -CVE-2013-2140 - http://www.ubuntu.com/usn/USN-1938-1 -CVE-2013-2141 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2143 - http://packetstormsecurity.com/files/125866/Katello-Red-Hat-Satellite-users-update_roles-Missing-Authorization.html -CVE-2013-2146 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2162 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711600 -CVE-2013-2164 - https://bugzilla.redhat.com/show_bug.cgi?id=973100 -CVE-2013-2165 - http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html -CVE-2013-2166 - http://www.securityfocus.com/bid/60684 -CVE-2013-2167 - http://www.securityfocus.com/bid/60680 -CVE-2013-2172 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-2172 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-2172 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-2174 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-2174 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-2178 - http://www.openwall.com/lists/oss-security/2013/06/13/7 -CVE-2013-2182 - http://www.openwall.com/lists/oss-security/2013/06/14/11 -CVE-2013-2182 - https://github.com/monkey/monkey/issues/92 -CVE-2013-2186 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-2186 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-2186 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-2186 - https://www.tenable.com/security/research/tra-2016-23 -CVE-2013-2205 - http://make.wordpress.org/core/2013/06/21/secure-swfupload/ -CVE-2013-2224 - http://www.openwall.com/lists/oss-security/2013/06/30/7 -CVE-2013-2226 - http://www.securityfocus.com/bid/60693 -CVE-2013-2226 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php -CVE-2013-2227 - http://www.securityfocus.com/bid/60692 -CVE-2013-2227 - https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html -CVE-2013-2232 - http://www.ubuntu.com/usn/USN-1938-1 -CVE-2013-2233 - https://github.com/ansible/ansible/issues/857 -CVE-2013-2234 - http://www.ubuntu.com/usn/USN-1938-1 -CVE-2013-2237 - http://www.ubuntu.com/usn/USN-1973-1 -CVE-2013-2248 - http://struts.apache.org/release/2.3.x/docs/s2-017.html -CVE-2013-2248 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-2251 - http://cxsecurity.com/issue/WLB-2014010087 -CVE-2013-2251 - http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html -CVE-2013-2251 - http://struts.apache.org/release/2.3.x/docs/s2-016.html -CVE-2013-2251 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 -CVE-2013-2251 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-2270 - http://packetstormsecurity.com/files/120594/Airvana-HubBub-C1-600-RT-Cross-Site-Scripting.html -CVE-2013-2271 - http://packetstormsecurity.com/files/120613/dlinkdsl2740b-bypass.txt -CVE-2013-2275 - http://ubuntu.com/usn/usn-1759-1 -CVE-2013-2277 - http://www.ubuntu.com/usn/USN-1790-1 -CVE-2013-2294 - http://packetstormsecurity.com/files/120862/ViewGit-0.0.6-Cross-Site-Scripting.html -CVE-2013-2294 - http://seclists.org/fulldisclosure/2013/Mar/174 -CVE-2013-2294 - http://www.exploit-db.com/exploits/24862 -CVE-2013-2299 - http://ics-cert.us-cert.gov/advisories/ICSA-13-225-01 -CVE-2013-2352 - http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/ -CVE-2013-2371 - http://www.tibco.com/mk/advisory.jsp -CVE-2013-2372 - http://www.tibco.com/mk/advisory.jsp -CVE-2013-2373 - http://www.tibco.com/mk/advisory.jsp -CVE-2013-2374 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2375 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2376 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-2376 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2377 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2378 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2379 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2380 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2381 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2382 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2383 - http://bugs.icu-project.org/trac/ticket/10107 -CVE-2013-2383 - http://site.icu-project.org/download/51#TOC-Known-Issues -CVE-2013-2383 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2013-2383 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-2383 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2384 - http://bugs.icu-project.org/trac/ticket/10107 -CVE-2013-2384 - http://site.icu-project.org/download/51#TOC-Known-Issues -CVE-2013-2384 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2013-2384 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-2384 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2385 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2386 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2387 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2388 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2389 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2390 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2391 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2392 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2393 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2394 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2395 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2396 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2397 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2398 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2399 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2400 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2401 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2402 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2403 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2404 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2405 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2406 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2407 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2407 - http://www.securityfocus.com/bid/60653 -CVE-2013-2408 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2409 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2410 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2411 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2412 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2412 - http://www.securityfocus.com/bid/60618 -CVE-2013-2413 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2414 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2415 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2416 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2417 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2418 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2419 - http://bugs.icu-project.org/trac/ticket/10107 -CVE-2013-2419 - http://site.icu-project.org/download/51#TOC-Known-Issues -CVE-2013-2419 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2013-2419 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-2419 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2420 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2421 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2422 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2423 - http://www.exploit-db.com/exploits/24976 -CVE-2013-2423 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2424 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2425 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2426 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2427 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2428 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2429 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2430 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2431 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2432 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2433 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2434 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2435 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2436 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2437 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2437 - http://www.securityfocus.com/bid/60636 -CVE-2013-2438 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2439 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2440 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -CVE-2013-2441 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html -CVE-2013-2442 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2442 - http://www.securityfocus.com/bid/60643 -CVE-2013-2443 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2443 - http://www.securityfocus.com/bid/60646 -CVE-2013-2444 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2444 - http://www.securityfocus.com/bid/60633 -CVE-2013-2445 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2445 - http://www.securityfocus.com/bid/60639 -CVE-2013-2446 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2446 - http://www.securityfocus.com/bid/60620 -CVE-2013-2447 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2447 - http://www.securityfocus.com/bid/60629 -CVE-2013-2448 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2448 - http://www.securityfocus.com/bid/60640 -CVE-2013-2449 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2450 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2450 - http://www.securityfocus.com/bid/60638 -CVE-2013-2451 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2451 - http://www.securityfocus.com/bid/60625 -CVE-2013-2452 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2452 - http://www.securityfocus.com/bid/60617 -CVE-2013-2453 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2453 - http://www.securityfocus.com/bid/60644 -CVE-2013-2454 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2454 - http://www.securityfocus.com/bid/60650 -CVE-2013-2455 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2455 - http://www.securityfocus.com/bid/60619 -CVE-2013-2456 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2456 - http://www.securityfocus.com/bid/60641 -CVE-2013-2457 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2457 - http://www.securityfocus.com/bid/60632 -CVE-2013-2458 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2459 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2459 - http://www.securityfocus.com/bid/60647 -CVE-2013-2460 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2460 - https://bugzilla.redhat.com/show_bug.cgi?id=975122 -CVE-2013-2461 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2461 - http://www.securityfocus.com/bid/60645 -CVE-2013-2461 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-2462 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2463 - http://www.informationweek.com/security/vulnerabilities/hackers-target-java-6-with-security-expl/240160443 -CVE-2013-2463 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2463 - http://www.securityfocus.com/bid/60655 -CVE-2013-2464 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2464 - http://www.securityfocus.com/bid/60631 -CVE-2013-2465 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2465 - http://www.securityfocus.com/bid/60657 -CVE-2013-2466 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2466 - http://www.securityfocus.com/bid/60624 -CVE-2013-2467 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2468 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2468 - http://www.securityfocus.com/bid/60637 -CVE-2013-2469 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2469 - http://www.securityfocus.com/bid/60658 -CVE-2013-2470 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2470 - http://www.securityfocus.com/bid/60651 -CVE-2013-2471 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2471 - http://www.securityfocus.com/bid/60659 -CVE-2013-2472 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2472 - http://www.securityfocus.com/bid/60656 -CVE-2013-2473 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-2473 - http://www.securityfocus.com/bid/60623 -CVE-2013-2474 - http://www.exploit-db.com/exploits/24906 -CVE-2013-2475 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8274 -CVE-2013-2492 - http://tracker.firebirdsql.org/browse/CORE-4058 -CVE-2013-2492 - https://gist.github.com/zeroSteiner/85daef257831d904479c -CVE-2013-2495 - http://www.ubuntu.com/usn/USN-1790-1 -CVE-2013-2496 - http://www.ubuntu.com/usn/USN-1790-1 -CVE-2013-2501 - http://packetstormsecurity.com/files/120730/WordPress-Terillion-Reviews-Cross-Site-Scripting.html -CVE-2013-2503 - http://blog.c22.cc/2013/03/11/privoxy-proxy-authentication-credential-exposure-cve-2013-2503/ -CVE-2013-2507 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2507 - http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html -CVE-2013-2512 - http://vapidlabs.com/advisory.php?v=34 -CVE-2013-2516 - http://www.vapidlabs.com/advisory.php?v=36 -CVE-2013-2546 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2547 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2548 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2558 - http://immunityproducts.blogspot.com/2013/03/infiltrate-preview-truetype-font.html -CVE-2013-2561 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2013-2562 - http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt -CVE-2013-2563 - http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt -CVE-2013-2564 - http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt -CVE-2013-2566 - http://www.isg.rhul.ac.uk/tls/ -CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2013-2567 - http://www.coresecurity.com/advisories/zavio-IP-cameras-multiple-vulnerabilities -CVE-2013-2567 - http://www.exploit-db.com/exploits/25815 -CVE-2013-2567 - https://packetstormsecurity.com/files/cve/CVE-2013-2567 -CVE-2013-2568 - https://packetstormsecurity.com/files/cve/CVE-2013-2568/page1/ -CVE-2013-2568 - https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities -CVE-2013-2569 - https://packetstormsecurity.com/files/cve/CVE-2013-2569 -CVE-2013-2569 - https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities -CVE-2013-2570 - https://packetstormsecurity.com/files/cve/CVE-2013-2570 -CVE-2013-2570 - https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities -CVE-2013-2571 - http://www.exploit-db.com/exploits/25987 -CVE-2013-2571 - https://packetstormsecurity.com/files/121917/Xpient-POS-Iris-3.8-Cash-Drawer-Operation-Remote-Trigger.html -CVE-2013-2572 - http://www.exploit-db.com/exploits/25812 -CVE-2013-2572 - https://packetstormsecurity.com/files/cve/CVE-2013-2572 -CVE-2013-2572 - https://www.coresecurity.com/advisories/tp-link-ip-cameras-multiple-vulnerabilities -CVE-2013-2573 - https://packetstormsecurity.com/files/cve/CVE-2013-2573 -CVE-2013-2573 - https://vuldb.com/?id.8912 -CVE-2013-2573 - https://www.coresecurity.com/advisories/tp-link-IP-cameras-multiple-vulnerabilities -CVE-2013-2574 - http://www.coresecurity.com/advisories/foscam-ip-cameras-improper-access-restrictions -CVE-2013-2574 - http://www.exploit-db.com/exploits/27076 -CVE-2013-2574 - https://packetstormsecurity.com/files/cve/CVE-2013-2574 -CVE-2013-2576 - http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability -CVE-2013-2576 - http://www.exploit-db.com/exploits/27047 -CVE-2013-2577 - http://www.coresecurity.com/advisories/xnview-buffer-overflow-vulnerability -CVE-2013-2577 - http://www.exploit-db.com/exploits/27049 -CVE-2013-2578 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras -CVE-2013-2579 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras -CVE-2013-2580 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras -CVE-2013-2581 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras -CVE-2013-2585 - http://www.isecauditors.com/advisories-2013#2013-004 -CVE-2013-2586 - http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html -CVE-2013-2586 - http://www.exploit-db.com/exploits/28654 -CVE-2013-2594 - http://packetstormsecurity.com/files/121402/Hornbill-Supportworks-ITSM-1.0.0-SQL-Injection.html -CVE-2013-2596 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2596 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2013-2615 - http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html -CVE-2013-2615 - http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html -CVE-2013-2616 - http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html -CVE-2013-2617 - http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html -CVE-2013-2617 - http://seclists.org/fulldisclosure/2013/Mar/124 -CVE-2013-2618 - http://packetstormsecurity.com/files/121034/Network-Weathermap-0.97a-Cross-Site-Scripting.html -CVE-2013-2619 - http://packetstormsecurity.com/files/121035/Aspen-0.8-Directory-Traversal.html -CVE-2013-2619 - http://seclists.org/fulldisclosure/2013/Apr/2 -CVE-2013-2621 - https://www.isecauditors.com/advisories-2013#2013-009 -CVE-2013-2622 - https://packetstormsecurity.com/files/123557/Uebimiau-2.7.11-Cross-Site-Scripting-Open-Redirection.html -CVE-2013-2623 - https://www.isecauditors.com/advisories-2013#2013-009 -CVE-2013-2624 - https://www.isecauditors.com/advisories-2013#2013-009 -CVE-2013-2631 - https://packetstormsecurity.com/files/121128/TinyWebGallery-1.8.9-Path-Disclosure.html -CVE-2013-2631 - https://www.isecauditors.com/advisories-2013#2013-012 -CVE-2013-2634 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2634 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2013-2635 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-2635 - http://www.ubuntu.com/usn/USN-1814-1 -CVE-2013-2651 - http://packetstormsecurity.com/files/123558 -CVE-2013-2652 - http://packetstormsecurity.com/files/123771/WebCollab-3.30-HTTP-Response-Splitting.html -CVE-2013-2653 - http://seclists.org/bugtraq/2013/Aug/12 -CVE-2013-2670 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2670 - http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html -CVE-2013-2671 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2671 - http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html -CVE-2013-2672 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2673 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2674 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2675 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2676 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -CVE-2013-2678 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2678 - http://www.exploit-db.com/exploits/25292 -CVE-2013-2679 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2679 - http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html -CVE-2013-2680 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2681 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2682 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2683 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2684 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2013-2686 - http://telussecuritylabs.com/threats/show/TSL20130327-01 -CVE-2013-2686 - https://issues.asterisk.org/jira/browse/ASTERISK-20967 -CVE-2013-2687 - http://aluigi.altervista.org/adv/qnxph_1-adv.txt -CVE-2013-2687 - http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01 -CVE-2013-2688 - http://aluigi.altervista.org/adv/qnxph_1-adv.txt -CVE-2013-2688 - http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01 -CVE-2013-2690 - http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html -CVE-2013-2690 - http://www.exploit-db.com/exploits/24898 -CVE-2013-2712 - http://www.exploit-db.com/exploits/24965 -CVE-2013-2713 - http://www.exploit-db.com/exploits/24965 -CVE-2013-2741 - http://packetstormsecurity.com/files/120923 -CVE-2013-2742 - http://packetstormsecurity.com/files/120923 -CVE-2013-2743 - http://packetstormsecurity.com/files/120923 -CVE-2013-2744 - http://packetstormsecurity.com/files/120923 -CVE-2013-2748 - http://www.exploit-db.com/exploits/24924 -CVE-2013-2751 - http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html -CVE-2013-2754 - http://packetstormsecurity.com/files/121564/UMI.CMS-2.9-Cross-Site-Request-Forgery.html -CVE-2013-2760 - http://www.exploit-db.com/exploits/24930/ -CVE-2013-2766 - http://www.splunk.com/view/SP-CAAAHSQ -CVE-2013-2767 - http://www.kb.cert.org/vuls/id/521612 -CVE-2013-2776 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-2817 - http://ics-cert.us-cert.gov/advisories/ICSA-14-051-02 -CVE-2013-2842 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15914 -CVE-2013-2850 - http://www.ubuntu.com/usn/USN-1847-1 -CVE-2013-2852 - http://www.ubuntu.com/usn/USN-1915-1 -CVE-2013-2874 - https://code.google.com/p/chromium/issues/detail?id=237611 -CVE-2013-2877 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-2877 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-2877 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-2888 - http://www.ubuntu.com/usn/USN-1976-1 -CVE-2013-2892 - http://www.ubuntu.com/usn/USN-1976-1 -CVE-2013-2924 - http://bugs.icu-project.org/trac/ticket/10318 -CVE-2013-2930 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-2945 - http://packetstormsecurity.com/files/121481/b2evolution-4.1.6-SQL-Injection.html -CVE-2013-2967 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-2976 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-3006 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3007 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3008 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3009 - http://seclists.org/fulldisclosure/2016/Apr/3 -CVE-2013-3009 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3010 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3011 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3012 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-3029 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-3050 - http://packetstormsecurity.com/files/121202/ZAPms-1.41-SQL-Injection.html -CVE-2013-3050 - http://www.exploit-db.com/exploits/24942 -CVE-2013-3067 - https://www.ise.io/research/studies-and-papers/linksys_wrt310v2/ -CVE-2013-3070 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-3072 - https://www.ise.io/research/studies-and-papers/netgear_wndr4700/ -CVE-2013-3073 - https://vuldb.com/?id.8471 -CVE-2013-3073 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-3085 - https://www.ise.io/research/studies-and-papers/belkin_f5d8236-4v2/ -CVE-2013-3088 - https://www.ise.io/research/studies-and-papers/belkin_n900/ -CVE-2013-3091 - https://www.ise.io/research/studies-and-papers/belkin_n900/ -CVE-2013-3096 - https://www.ise.io/research/studies-and-papers/dlink_dir865l/ -CVE-2013-3111 - http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html -CVE-2013-3111 - https://www.exploit-db.com/exploits/40907/ -CVE-2013-3120 - https://www.exploit-db.com/exploits/40844/ -CVE-2013-3129 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-3143 - http://packetstormsecurity.com/files/140166/Microsoft-Internet-Explorer-9-IEFRAME-CMarkup..RemovePointerPos-Use-After-Free.html -CVE-2013-3143 - https://www.exploit-db.com/exploits/40923/ -CVE-2013-3154 - http://blogs.technet.com/b/srd/archive/2013/07/09/assessing-risk-for-the-july-2013-security-updates.aspx -CVE-2013-3154 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-058 -CVE-2013-3167 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-3172 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-3173 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-3221 - http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/ -CVE-2013-3222 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3223 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3224 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3225 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3227 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3228 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3229 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3231 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3232 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3233 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3234 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3235 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 -CVE-2013-3242 - http://karmainsecurity.com/KIS-2013-04 -CVE-2013-3242 - http://www.exploit-db.com/exploits/25087 -CVE-2013-3245 - http://seclists.org/fulldisclosure/2013/Jul/71 -CVE-2013-3245 - http://seclists.org/fulldisclosure/2013/Jul/77 -CVE-2013-3245 - http://seclists.org/fulldisclosure/2013/Jul/79 -CVE-2013-3245 - http://secunia.com/blog/372/ -CVE-2013-3245 - http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia -CVE-2013-3281 - http://www.kb.cert.org/vuls/id/466876 -CVE-2013-3294 - http://packetstormsecurity.com/files/121643/Exponent-CMS-2.2.0-Beta-3-LFI-SQL-Injection.html -CVE-2013-3294 - http://seclists.org/bugtraq/2013/May/57 -CVE-2013-3299 - http://seclists.org/bugtraq/2013/Jul/18 -CVE-2013-3301 - http://www.ubuntu.com/usn/USN-1834-1 -CVE-2013-3302 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 -CVE-2013-3311 - http://www.exploit-db.com/exploits/27878 -CVE-2013-3312 - https://www.exploit-db.com/exploits/27878 -CVE-2013-3313 - https://www.exploit-db.com/exploits/27878 -CVE-2013-3314 - http://www.exploit-db.com/exploits/27878 -CVE-2013-3315 - http://www.tibco.com/mk/advisory.jsp -CVE-2013-3316 - http://www.exploit-db.com/exploits/24916/ -CVE-2013-3317 - http://www.exploit-db.com/exploits/24916/ -CVE-2013-3319 - http://labs.integrity.pt/advisories/cve-2013-3319/ -CVE-2013-3321 - https://www.securityfocus.com/archive/1/526552 -CVE-2013-3322 - https://www.securityfocus.com/archive/1/526552 -CVE-2013-3366 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-3367 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-3402 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-3403 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-3404 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-3412 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-3433 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-3434 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-3482 - http://www.secunia.com/blog/366 -CVE-2013-3484 - https://github.com/dotCMS/dotCMS/issues/2949 -CVE-2013-3499 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3500 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3501 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3502 - http://www.exploit-db.com/exploits/25001 -CVE-2013-3502 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3503 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3504 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3505 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3506 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3507 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3508 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3509 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3510 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3511 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3512 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3513 - http://www.kb.cert.org/vuls/id/345260 -CVE-2013-3514 - http://seclists.org/bugtraq/2013/Jul/27 -CVE-2013-3515 - http://seclists.org/bugtraq/2013/Jul/27 -CVE-2013-3515 - http://www.exploit-db.com/exploits/26624 -CVE-2013-3516 - https://www.ise.io/research/studies-and-papers/netgear_wnr3500/ -CVE-2013-3524 - http://www.exploit-db.com/exploits/24960 -CVE-2013-3525 - http://packetstormsecurity.com/files/121245/RT-Request-Tracker-4.0.10-SQL-Injection.html -CVE-2013-3526 - http://packetstormsecurity.com/files/121167/WordPress-Traffic-Analyzer-Cross-Site-Scripting.html -CVE-2013-3527 - http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html -CVE-2013-3529 - http://packetstormsecurity.com/files/121030/WordPress-FuneralPress-1.1.6-Cross-Site-Scripting.html -CVE-2013-3530 - http://packetstormsecurity.com/files/121204/WordPress-Spiffy-XSPF-Player-0.1-SQL-Injection.html -CVE-2013-3531 - http://packetstormsecurity.com/files/121091/Radio-CMS-2.2-SQL-Injection.html -CVE-2013-3532 - http://packetstormsecurity.com/files/121250/WordPress-Spider-Video-Player-2.1-SQL-Injection.html -CVE-2013-3532 - http://packetstormsecurity.com/files/128851/WordPress-HTML5-Flash-Player-SQL-Injection.html -CVE-2013-3533 - http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html -CVE-2013-3535 - http://packetstormsecurity.com/files/121303/CMSLogik-1.2.1-Cross-Site-Scripting.html -CVE-2013-3535 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php -CVE-2013-3536 - http://packetstormsecurity.com/files/121046/WHMCS-Grouppay-1.5-SQL-Injection.html -CVE-2013-3537 - http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html -CVE-2013-3538 - http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html -CVE-2013-3539 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3540 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3541 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3542 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3542 - https://www.youtube.com/watch?v=XkCBs4lenhI -CVE-2013-3543 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3577 - http://www.kb.cert.org/vuls/id/217836 -CVE-2013-3578 - http://www.kb.cert.org/vuls/id/217836 -CVE-2013-3579 - http://www.kb.cert.org/vuls/id/704828 -CVE-2013-3580 - http://www.kb.cert.org/vuls/id/709806 -CVE-2013-3582 - http://www.kb.cert.org/vuls/id/912156 -CVE-2013-3582 - http://www.kb.cert.org/vuls/id/BLUU-99HSLA -CVE-2013-3582 - https://media.blackhat.com/us-13/US-13-Butterworth-BIOS-Security-Slides.pdf -CVE-2013-3582 - https://www.blackhat.com/us-13/archives.html#Butterworth -CVE-2013-3583 - http://www.kb.cert.org/vuls/id/595142 -CVE-2013-3584 - http://www.kb.cert.org/vuls/id/595142 -CVE-2013-3585 - http://www.kb.cert.org/vuls/id/882286 -CVE-2013-3586 - http://www.kb.cert.org/vuls/id/882286 -CVE-2013-3587 - http://breachattack.com/ -CVE-2013-3587 - https://www.blackhat.com/us-13/briefings.html#Prado -CVE-2013-3591 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3594 - http://www.kb.cert.org/vuls/id/122582 -CVE-2013-3595 - http://www.kb.cert.org/vuls/id/122582 -CVE-2013-3599 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3600 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3601 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3602 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3603 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3604 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3605 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-3606 - http://www.kb.cert.org/vuls/id/122582 -CVE-2013-3607 - http://www.kb.cert.org/vuls/id/648646 -CVE-2013-3608 - http://www.kb.cert.org/vuls/id/648646 -CVE-2013-3609 - http://www.kb.cert.org/vuls/id/648646 -CVE-2013-3616 - http://www.kb.cert.org/vuls/id/521348 -CVE-2013-3617 - http://www.kb.cert.org/vuls/id/533894 -CVE-2013-3617 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3626 - http://www.kb.cert.org/vuls/id/436214 -CVE-2013-3627 - http://www.kb.cert.org/vuls/id/613886 -CVE-2013-3628 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3629 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3630 - http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html -CVE-2013-3630 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3631 - http://www.kb.cert.org/vuls/id/326830 -CVE-2013-3631 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3632 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats -CVE-2013-3635 - http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html -CVE-2013-3636 - http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html -CVE-2013-3637 - http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html -CVE-2013-3639 - http://packetstormsecurity.com/files/122174/Xaraya-2.4.0-b1-Cross-Site-Scripting.html -CVE-2013-3660 - http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ -CVE-2013-3660 - http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw -CVE-2013-3660 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -CVE-2013-3661 - http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ -CVE-2013-3661 - http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw -CVE-2013-3662 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html -CVE-2013-3663 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html -CVE-2013-3664 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html -CVE-2013-3666 - https://plus.google.com/110348415484169880343/posts/9KxBtkyuYcj -CVE-2013-3670 - http://ffmpeg.org/security.html -CVE-2013-3671 - http://ffmpeg.org/security.html -CVE-2013-3672 - http://ffmpeg.org/security.html -CVE-2013-3673 - http://ffmpeg.org/security.html -CVE-2013-3674 - http://ffmpeg.org/security.html -CVE-2013-3675 - http://ffmpeg.org/security.html -CVE-2013-3678 - http://packetstormsecurity.com/files/129083/SAP-GRC-Bypass-Privilege-Escalation-Program-Execution.html -CVE-2013-3685 - https://androidvulnerabilities.org/all -CVE-2013-3686 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3687 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3688 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3688 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras -CVE-2013-3689 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3690 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3691 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3693 - http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=1C7CE6911426BCFAF2A80C3834F4DF0F?externalId=KB35139&sliceId=1&cmd=displayKC&docType=kc&noCount=true&ViewedDocsListHelper=com.kanisa.apps.common.BaseViewedDocsListHelperImpl -CVE-2013-3718 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-3718 -CVE-2013-3720 - http://www.darksecurity.de/advisories/2013/SSCHADV2013-004.txt -CVE-2013-3721 - http://packetstormsecurity.com/files/120976/PsychoStats-3.2.2b-Blind-SQL-Injection.html -CVE-2013-3727 - http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html -CVE-2013-3727 - http://seclists.org/bugtraq/2013/Jul/26 -CVE-2013-3728 - http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html -CVE-2013-3728 - http://seclists.org/bugtraq/2013/Jul/26 -CVE-2013-3729 - http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html -CVE-2013-3729 - http://seclists.org/bugtraq/2013/Jul/26 -CVE-2013-3734 - https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ -CVE-2013-3739 - http://www.exploit-db.com/exploits/26125 -CVE-2013-3743 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-3743 - http://www.securityfocus.com/bid/60626 -CVE-2013-3744 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -CVE-2013-3744 - http://www.securityfocus.com/bid/60654 -CVE-2013-3745 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3746 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3747 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3748 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3749 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3750 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3751 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-3751 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-3751 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3751 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-3752 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3753 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3754 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3755 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3756 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3757 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3758 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3759 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3760 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3761 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3762 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3763 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3764 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3765 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3766 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3767 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3768 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3769 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3770 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3771 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3772 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3773 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3774 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-3774 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-3774 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3774 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-3775 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3776 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3777 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3778 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3779 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3780 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3781 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3782 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3783 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3784 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3785 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3786 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3787 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3788 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3789 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3790 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3791 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3792 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3793 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-3793 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3794 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-3794 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3795 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3796 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3797 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3798 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3799 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3800 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3801 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-3801 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3802 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3803 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3804 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3805 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-3805 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3806 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3807 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3808 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3809 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-3809 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3810 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3811 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3812 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-3812 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3813 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3814 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3816 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3818 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3819 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3820 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3821 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3822 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3823 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3824 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3825 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html -CVE-2013-3826 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3827 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3828 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3829 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3829 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-3831 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3832 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3833 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3834 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3835 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3836 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3837 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3838 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3839 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3840 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3841 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3842 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-3893 - http://packetstormsecurity.com/files/162585/Microsoft-Internet-Explorer-8-SetMouseCapture-Use-After-Free.html -CVE-2013-3918 - http://www.darkreading.com/vulnerability/new-ie-vulnerability-found-in-the-wild-s/240163814/ -CVE-2013-3928 - http://longinox.blogspot.com/2013/08/explot-stack-based-overflow-bypassing.html -CVE-2013-3928 - http://packetstormsecurity.com/files/122810/Chasys-Draw-IES-Buffer-Overflow.html -CVE-2013-3928 - http://www.exploit-db.com/exploits/27609 -CVE-2013-3960 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18896 -CVE-2013-3961 - http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html -CVE-2013-3961 - http://seclists.org/fulldisclosure/2013/Jun/67 -CVE-2013-3961 - http://www.exploit-db.com/exploits/26136 -CVE-2013-3961 - http://www.webera.fr/advisory-02-php-agenda-isql-exploit -CVE-2013-3962 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3963 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3964 - http://seclists.org/fulldisclosure/2013/Jun/84 -CVE-2013-3969 - http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/ -CVE-2013-4002 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 -CVE-2013-4002 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-4002 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2013-4004 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-4005 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 -CVE-2013-4057 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR48815 -CVE-2013-4057 - http://www-01.ibm.com/support/docview.wss?uid=swg21666684 -CVE-2013-4058 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR48815 -CVE-2013-4058 - http://www-01.ibm.com/support/docview.wss?uid=swg21666684 -CVE-2013-4059 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR48815 -CVE-2013-4059 - http://www-01.ibm.com/support/docview.wss?uid=swg21666684 -CVE-2013-4074 - http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html -CVE-2013-4078 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8729 -CVE-2013-4091 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html -CVE-2013-4092 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html -CVE-2013-4093 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html -CVE-2013-4094 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html -CVE-2013-4095 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html -CVE-2013-4096 - http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html -CVE-2013-4097 - http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html -CVE-2013-4098 - http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html -CVE-2013-4103 - http://packetstormsecurity.com/files/134252/Cryptocat-Script-Insertion.html -CVE-2013-4103 - https://packetstormsecurity.com/files/cve/CVE-2013-4103 -CVE-2013-4106 - https://vuldb.com/pl/?id.9433 -CVE-2013-4109 - https://vuldb.com/es/?id.9445 -CVE-2013-4116 - https://github.com/npm/npm/issues/3635 -CVE-2013-4117 - http://openwall.com/lists/oss-security/2013/07/11/11 -CVE-2013-4117 - http://packetstormsecurity.com/files/122259/WordPress-Category-Grid-View-Gallery-XSS.html -CVE-2013-4162 - http://www.ubuntu.com/usn/USN-1938-1 -CVE-2013-4163 - http://www.ubuntu.com/usn/USN-1938-1 -CVE-2013-4164 - https://hackerone.com/reports/499 -CVE-2013-4165 - https://github.com/bitcoin/bitcoin/issues/2838 -CVE-2013-4165 - https://github.com/bitcoin/bitcoin/pull/2845 -CVE-2013-4179 - http://www.ubuntu.com/usn/USN-2005-1 -CVE-2013-4183 - http://www.ubuntu.com/usn/USN-2005-1 -CVE-2013-4202 - http://www.ubuntu.com/usn/USN-2005-1 -CVE-2013-4211 - https://packetstormsecurity.com/files/cve/CVE-2013-4211 -CVE-2013-4227 - https://drupal.org/node/2058655 -CVE-2013-4233 - http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ -CVE-2013-4234 - http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ -CVE-2013-4238 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-4238 - http://www.ubuntu.com/usn/USN-1982-1 -CVE-2013-4238 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-4240 - http://seclists.org/fulldisclosure/2013/Aug/96 -CVE-2013-4240 - http://seclists.org/fulldisclosure/2013/Aug/98 -CVE-2013-4241 - http://seclists.org/fulldisclosure/2013/Aug/96 -CVE-2013-4241 - http://seclists.org/fulldisclosure/2013/Aug/98 -CVE-2013-4242 - http://www.kb.cert.org/vuls/id/976534 -CVE-2013-4242 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-4249 - http://seclists.org/oss-sec/2013/q3/369 -CVE-2013-4249 - https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued -CVE-2013-4254 - http://www.ubuntu.com/usn/USN-1973-1 -CVE-2013-4256 - http://radscan.com/pipermail/nas/2013-August/001270.html -CVE-2013-4258 - http://radscan.com/pipermail/nas/2013-August/001270.html -CVE-2013-4262 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-4274 - http://www.madirish.net/557 -CVE-2013-4275 - http://www.madirish.net/?article=452 -CVE-2013-4275 - https://drupal.org/node/754000 -CVE-2013-4286 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-4286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-4286 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-4288 - http://seclists.org/oss-sec/2013/q3/626 -CVE-2013-4288 - http://www.openwall.com/lists/oss-security/2013/09/18/4 -CVE-2013-4298 - http://www.imagemagick.org/script/changelog.php -CVE-2013-4305 - https://bugzilla.wikimedia.org/show_bug.cgi?id=49070 -CVE-2013-4311 - http://www.openwall.com/lists/oss-security/2013/09/18/6 -CVE-2013-4312 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2013-4318 - http://www.openwall.com/lists/oss-security/2013/09/09/10 -CVE-2013-4322 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-4322 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2013-4322 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-4322 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-4322 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-4324 - http://www.openwall.com/lists/oss-security/2013/09/18/6 -CVE-2013-4326 - http://www.openwall.com/lists/oss-security/2013/09/18/6 -CVE-2013-4327 - http://www.openwall.com/lists/oss-security/2013/09/18/6 -CVE-2013-4330 - http://packetstormsecurity.com/files/123454/ -CVE-2013-4341 - http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html -CVE-2013-4345 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-4346 - https://github.com/simplegeo/python-oauth2/issues/129 -CVE-2013-4353 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2013-4378 - http://seclists.org/oss-sec/2013/q3/679 -CVE-2013-4444 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2013-4447 - http://packetstormsecurity.com/files/123660/Drupal-Simplenews-6.x-7.x-Cross-Site-Scripting.html -CVE-2013-4449 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-4465 - https://github.com/SimpleMachines/SMF2.1/issues/701 -CVE-2013-4472 - http://seclists.org/oss-sec/2013/q4/181 -CVE-2013-4472 - http://seclists.org/oss-sec/2013/q4/183 -CVE-2013-4473 - http://www.openwall.com/lists/oss-security/2013/10/29/1 -CVE-2013-4474 - http://www.openwall.com/lists/oss-security/2013/10/29/1 -CVE-2013-4497 - https://bugs.launchpad.net/nova/+bug/1202266 -CVE-2013-4511 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-4513 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-4514 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-4515 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-4517 - http://packetstormsecurity.com/files/124554/Java-XML-Signature-Denial-Of-Service-Attack.html -CVE-2013-4545 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2013-4545 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-4545 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-4548 - https://hackerone.com/reports/500 -CVE-2013-4550 - https://projects.duckcorp.org/versions/13 -CVE-2013-4561 - https://github.com/openshift/origin-server/commit/f1abe972794e35a4bfba597694ce829990f14d39 -CVE-2013-4565 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729279 -CVE-2013-4579 - http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html -CVE-2013-4579 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-4587 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-4590 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2013-4590 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-4591 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 -CVE-2013-4602 - https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html -CVE-2013-4602 - https://vuldb.com/?id.9151 -CVE-2013-4625 - http://packetstormsecurity.com/files/122535/WordPress-Duplicator-0.4.4-Cross-Site-Scripting.html -CVE-2013-4630 - http://www.exploit-db.com/exploits/25295 -CVE-2013-4649 - http://packetstormsecurity.com/files/122792/DotNetNuke-DNN-7.1.0-6.2.8-Cross-Site-Scripting.html -CVE-2013-4654 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-4655 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-4656 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -CVE-2013-4658 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf -CVE-2013-4659 - https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html -CVE-2013-4660 - https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/ -CVE-2013-4664 - https://www.exploit-db.com/exploits/26244 -CVE-2013-4665 - https://www.exploit-db.com/exploits/26244 -CVE-2013-4670 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html -CVE-2013-4671 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html -CVE-2013-4672 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html -CVE-2013-4692 - http://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.html -CVE-2013-4693 - http://packetstormsecurity.com/files/122223/Xorbin-Digital-Flash-Clock-1.0-For-WordPress-XSS.html -CVE-2013-4694 - http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html -CVE-2013-4694 - http://packetstormsecurity.com/files/122978 -CVE-2013-4694 - http://seclists.org/fulldisclosure/2013/Jul/4 -CVE-2013-4694 - http://www.exploit-db.com/exploits/26558 -CVE-2013-4694 - https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 -CVE-2013-4695 - http://www.exploit-db.com/exploits/26557 -CVE-2013-4717 - https://web.archive.org/web/20130817120539/http://www.otrs.com/de/open-source/community-news/security-advisories/security-advisory-2013-05/ -CVE-2013-4718 - https://web.archive.org/web/20130817120539/http://www.otrs.com/de/open-source/community-news/security-advisories/security-advisory-2013-05/ -CVE-2013-4722 - http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html -CVE-2013-4723 - http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html -CVE-2013-4726 - http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html -CVE-2013-4744 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ -CVE-2013-4748 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ -CVE-2013-4751 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4751 -CVE-2013-4759 - http://packetstormsecurity.com/files/122527/Magnolia-CMS-5.0.1-Community-Edition-Cross-Site-Scripting.html -CVE-2013-4772 - http://packetstormsecurity.com/files/122314/D-Link-DIR-505L-DIR-826L-Authentication-Bypass.html -CVE-2013-4777 - https://plus.google.com/110348415484169880343/posts/5ofgPNrSu3J -CVE-2013-4784 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-4786 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2013-4787 - http://www.zdnet.com/google-releases-fix-to-oems-for-blue-security-android-security-hole-7000017782/ -CVE-2013-4788 - http://hmarco.org/bugs/CVE-2013-4788.html -CVE-2013-4788 - http://seclists.org/fulldisclosure/2015/Sep/23 -CVE-2013-4788 - http://www.openwall.com/lists/oss-security/2013/07/15/9 -CVE-2013-4791 - http://davidsopaslabs.blogspot.com/2013/07/prestashop-persistent-xss-and-csrf.html -CVE-2013-4792 - http://davidsopaslabs.blogspot.com/2013/07/prestashop-persistent-xss-and-csrf.html -CVE-2013-4795 - http://seclists.org/bugtraq/2013/Aug/69 -CVE-2013-4800 - http://packetstormsecurity.com/files/123533 -CVE-2013-4806 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-4810 - https://www.exploit-db.com/exploits/28713/ -CVE-2013-4821 - http://www.kb.cert.org/vuls/id/895524 -CVE-2013-4848 - https://vuldb.com/?id.10495 -CVE-2013-4848 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf -CVE-2013-4855 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf -CVE-2013-4856 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf -CVE-2013-4860 - http://packetstormsecurity.com/files/122657/Radio-Thermostat-Of-America-Inc-Lack-Of-Authentication.html -CVE-2013-4861 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html -CVE-2013-4861 - http://www.exploit-db.com/exploits/27286 -CVE-2013-4861 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt -CVE-2013-4862 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html -CVE-2013-4862 - http://www.exploit-db.com/exploits/27286 -CVE-2013-4862 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt -CVE-2013-4863 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html -CVE-2013-4863 - http://www.exploit-db.com/exploits/27286 -CVE-2013-4863 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt -CVE-2013-4864 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html -CVE-2013-4864 - http://www.exploit-db.com/exploits/27286 -CVE-2013-4864 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt -CVE-2013-4865 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html -CVE-2013-4865 - http://www.exploit-db.com/exploits/27286 -CVE-2013-4865 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt -CVE-2013-4866 - http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html -CVE-2013-4867 - http://www.exploit-db.com/exploits/27285 -CVE-2013-4868 - http://www.exploit-db.com/exploits/27285 -CVE-2013-4869 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -CVE-2013-4873 - http://staff.tumblr.com/post/55648373578/important-security-update-for-iphone-ipad-users -CVE-2013-4873 - http://www.theregister.co.uk/2013/07/17/tumblr_ios_snafu_fixed/ -CVE-2013-4874 - http://www.kb.cert.org/vuls/id/458007 -CVE-2013-4874 - http://www.kb.cert.org/vuls/id/BLUU-997M5B -CVE-2013-4875 - http://www.kb.cert.org/vuls/id/458007 -CVE-2013-4875 - http://www.kb.cert.org/vuls/id/BLUU-997M5B -CVE-2013-4876 - http://www.kb.cert.org/vuls/id/458007 -CVE-2013-4876 - http://www.kb.cert.org/vuls/id/BLUU-997M5B -CVE-2013-4877 - http://www.kb.cert.org/vuls/id/458007 -CVE-2013-4877 - http://www.kb.cert.org/vuls/id/BLUU-997M5B -CVE-2013-4885 - http://packetstormsecurity.com/files/122719/TWSL2013-025.txt -CVE-2013-4891 - https://github.com/bcit-ci/CodeIgniter/issues/4020 -CVE-2013-4891 - https://nealpoole.com/blog/2013/07/codeigniter-21-xss-clean-filter-bypass/ -CVE-2013-4900 - http://www.exploit-db.com/exploits/27777 -CVE-2013-4922 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094&r2=50093&pathrev=50094 -CVE-2013-4923 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094&r2=50093&pathrev=50094 -CVE-2013-4930 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474&r2=50473&pathrev=50474 -CVE-2013-4937 - http://reviews.cnet.com/8301-3132_7-57594003-98 -CVE-2013-4948 - http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html -CVE-2013-4949 - http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html -CVE-2013-4950 - http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html -CVE-2013-4952 - http://www.exploit-db.com/exploits/26416 -CVE-2013-4973 - http://www.kb.cert.org/vuls/id/246524 -CVE-2013-4975 - http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities -CVE-2013-4976 - http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities -CVE-2013-4977 - http://packetstormsecurity.com/files/122718/Hikvision-IP-Cameras-Overflow-Bypass-Privilege-Escalation.html -CVE-2013-4977 - http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities -CVE-2013-4978 - http://www.coresecurity.com/advisories/aloaha-pdf-suite-buffer-overflow-vulnerability -CVE-2013-4979 - http://www.coresecurity.com/advisories/eps-viewer-buffer-overflow-vulnerability -CVE-2013-4980 - http://seclists.org/fulldisclosure/2013/Aug/284 -CVE-2013-4980 - http://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities -CVE-2013-4981 - http://seclists.org/fulldisclosure/2013/Aug/284 -CVE-2013-4981 - http://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities -CVE-2013-4982 - http://seclists.org/fulldisclosure/2013/Aug/284 -CVE-2013-4982 - https://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities -CVE-2013-4983 - http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities -CVE-2013-4984 - http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities -CVE-2013-4985 - http://www.coresecurity.com/advisories/vivotek-ip-cameras-rtsp-authentication-bypass -CVE-2013-4985 - http://www.exploit-db.com/exploits/29516 -CVE-2013-4986 - http://packetstormsecurity.com/files/123476 -CVE-2013-4986 - http://www.coresecurity.com/advisories/pdfcool-studio-buffer-overflow-vulnerability -CVE-2013-4987 - http://www.coresecurity.com/advisories/pinapp-mail-secure-access-control-failure -CVE-2013-4988 - http://packetstormsecurity.com/files/124380/IcoFX-2.5.0.0-Buffer-Overflow.html -CVE-2013-4988 - http://packetstormsecurity.com/files/162995/IcoFX-2.6-Buffer-Overflow.html -CVE-2013-4988 - http://seclists.org/fulldisclosure/2013/Dec/54 -CVE-2013-4988 - http://www.coresecurity.com/advisories/icofx-buffer-overflow-vulnerability -CVE-2013-4988 - http://www.exploit-db.com/exploits/30208 -CVE-2013-5005 - http://www.zerodaylab.com/zdl-advisories/2013-5005.html -CVE-2013-5014 - http://www.exploit-db.com/exploits/31853 -CVE-2013-5014 - http://www.exploit-db.com/exploits/31917 -CVE-2013-5015 - http://www.exploit-db.com/exploits/31853 -CVE-2013-5015 - http://www.exploit-db.com/exploits/31917 -CVE-2013-5019 - https://www.exploit-db.com/exploits/44472/ -CVE-2013-5027 - https://www.immuniweb.com/advisory/HTB23169 -CVE-2013-5028 - http://packetstormsecurity.com/files/123193 -CVE-2013-5030 - http://www.kb.cert.org/vuls/id/742932 -CVE-2013-5037 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -CVE-2013-5037 - http://www.youtube.com/watch?v=CPlT09ZIj48 -CVE-2013-5038 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -CVE-2013-5038 - http://www.youtube.com/watch?v=CPlT09ZIj48 -CVE-2013-5039 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -CVE-2013-5039 - http://www.youtube.com/watch?v=CPlT09ZIj48 -CVE-2013-5045 - http://packetstormsecurity.com/files/127245/MS13-097-Registry-Symlink-IE-Sandbox-Escape.html -CVE-2013-5065 - https://www.exploit-db.com/exploits/37732/ -CVE-2013-5092 - http://packetstormsecurity.com/files/122737/algosec-xss.txt -CVE-2013-5094 - http://packetstormsecurity.com/files/120721/McAfee-Vulnerability-Manager-7.5-Cross-Site-Scripting.html -CVE-2013-5094 - http://www.tenable.com/plugins/index.php?view=single&id=65738 -CVE-2013-5099 - http://www.exploit-db.com/exploits/26958 -CVE-2013-5100 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ -CVE-2013-5112 - https://blog.c22.cc/advisories/cve-2013-5112-evernote-android-insecure-storage-of-pin-data-bypass-of-pin-protection/ -CVE-2013-5113 - http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/ -CVE-2013-5113 - https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/ -CVE-2013-5114 - http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/ -CVE-2013-5114 - https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/ -CVE-2013-5116 - https://packetstormsecurity.com/files/author/8433/ -CVE-2013-5117 - http://seclists.org/fulldisclosure/2013/Sep/9 -CVE-2013-5117 - http://www.exploit-db.com/exploits/27602 -CVE-2013-5120 - http://www.exploit-db.com/exploits/27430 -CVE-2013-5121 - http://www.exploit-db.com/exploits/27430 -CVE-2013-5122 - https://packetstormsecurity.com/files/cve/CVE-2013-5122 -CVE-2013-5211 - http://www.kb.cert.org/vuls/id/348126 -CVE-2013-5211 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2013-5212 - http://seclists.org/fulldisclosure/2013/Oct/224 -CVE-2013-5215 - http://packetstormsecurity.com/files/123943/FOSCAM-Wireless-IP-Camera-Cross-Site-Scripting.html -CVE-2013-5218 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -CVE-2013-5218 - http://www.youtube.com/watch?v=CPlT09ZIj48 -CVE-2013-5219 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -CVE-2013-5219 - http://www.youtube.com/watch?v=CPlT09ZIj48 -CVE-2013-5220 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -CVE-2013-5220 - http://www.youtube.com/watch?v=CPlT09ZIj48 -CVE-2013-5223 - http://packetstormsecurity.com/files/123976 -CVE-2013-5223 - http://seclists.org/fulldisclosure/2013/Nov/76 -CVE-2013-5300 - http://packetstormsecurity.com/files/122547/Alienvault-OSSIM-Cross-Site-Scripting.html -CVE-2013-5301 - http://packetstormsecurity.com/files/122735/Trustport-Webfilter-Traversal-File-Disclosure.html -CVE-2013-5311 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html -CVE-2013-5312 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html -CVE-2013-5316 - http://packetstormsecurity.com/files/122663/Rite-CMS-1.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-5317 - http://packetstormsecurity.com/files/122663/Rite-CMS-1.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-5319 - http://packetstormsecurity.com/files/122721 -CVE-2013-5319 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5151.php -CVE-2013-5320 - http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html -CVE-2013-5321 - http://www.exploit-db.com/exploits/26406 -CVE-2013-5326 - http://www.kb.cert.org/vuls/id/295276 -CVE-2013-5331 - https://hackerone.com/reports/2106 -CVE-2013-5385 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-5385 - http://www.kb.cert.org/vuls/id/BLUU-985QTG -CVE-2013-5431 - http://www.kb.cert.org/vuls/id/596990 -CVE-2013-5447 - http://packetstormsecurity.com/files/124658 -CVE-2013-5528 - http://packetstormsecurity.com/files/140071/Cisco-Unified-Communications-Manager-7-8-9-Directory-Traversal.html -CVE-2013-5528 - https://www.exploit-db.com/exploits/40887/ -CVE-2013-5573 - http://packetstormsecurity.com/files/124513 -CVE-2013-5573 - http://seclists.org/bugtraq/2013/Dec/104 -CVE-2013-5573 - http://seclists.org/fulldisclosure/2013/Dec/159 -CVE-2013-5573 - http://www.exploit-db.com/exploits/30408 -CVE-2013-5576 - http://www.cso.com.au/article/523528/joomla_patches_file_manager_vulnerability_responsible_hijacked_websites/ -CVE-2013-5576 - http://www.kb.cert.org/vuls/id/639620 -CVE-2013-5576 - https://github.com/joomla/joomla-cms/commit/fa5645208eefd70f521cd2e4d53d5378622133d8 -CVE-2013-5586 - http://packetstormsecurity.com/files/123196 -CVE-2013-5593 - https://bugzilla.mozilla.org/show_bug.cgi?id=868327 -CVE-2013-5598 - https://bugzilla.mozilla.org/show_bug.cgi?id=920515 -CVE-2013-5605 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-5605 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-5606 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-5606 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-5607 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-5609 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5609 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-5610 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5611 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5612 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5613 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5613 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-5614 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5615 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5615 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-5616 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5616 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-5618 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5618 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-5619 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-5639 - http://packetstormsecurity.com/files/123482 -CVE-2013-5639 - http://www.exploit-db.com/exploits/28684 -CVE-2013-5640 - http://packetstormsecurity.com/files/123482 -CVE-2013-5640 - http://www.exploit-db.com/exploits/28684 -CVE-2013-5647 - http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html -CVE-2013-5648 - https://bugs.mageia.org/show_bug.cgi?id=11100 -CVE-2013-5658 - https://packetstormsecurity.com/files/123049/PWStore-2010.8.30.0-Cross-Site-Scripting-Denial-Of-Service.html -CVE-2013-5660 - http://packetstormsecurity.com/files/121512/Winarchiver-3.2-Buffer-Overflow.html -CVE-2013-5660 - http://realpentesting.blogspot.com.es/p/blog-page_3.html -CVE-2013-5667 - http://www.7elements.co.uk/news/cve-2013-5667/ -CVE-2013-5667 - http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ -CVE-2013-5668 - http://www.7elements.co.uk/news/cve-2013-5668/ -CVE-2013-5668 - http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ -CVE-2013-5669 - http://www.7elements.co.uk/news/cve-2013-5669/ -CVE-2013-5669 - http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ -CVE-2013-5672 - http://packetstormsecurity.com/files/123036 -CVE-2013-5672 - http://seclists.org/fulldisclosure/2013/Sep/5 -CVE-2013-5672 - http://www.exploit-db.com/exploits/28054 -CVE-2013-5673 - http://packetstormsecurity.com/files/123036 -CVE-2013-5673 - http://seclists.org/fulldisclosure/2013/Sep/5 -CVE-2013-5673 - http://www.exploit-db.com/exploits/28054 -CVE-2013-5676 - http://seclists.org/fulldisclosure/2013/Dec/37 -CVE-2013-5679 - http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html -CVE-2013-5679 - http://www.securityfocus.com/bid/62415 -CVE-2013-5680 - http://www.exploit-db.com/exploits/28683 -CVE-2013-5694 - http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html -CVE-2013-5701 - http://seclists.org/fulldisclosure/2013/Sep/43 -CVE-2013-5703 - http://www.kb.cert.org/vuls/id/101462 -CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2013-5704 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2013-5706 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-5707 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-5708 - http://www.kb.cert.org/vuls/id/960908 -CVE-2013-5716 - http://www.exploit-db.com/exploits/28080 -CVE-2013-5726 - http://seclists.org/fulldisclosure/2013/Nov/9 -CVE-2013-5730 - http://packetstormsecurity.com/files/123200/D-Link-DSL-2740B-Cross-Site-Request-Forgery.html -CVE-2013-5745 - https://bugzilla.gnome.org/show_bug.cgi?id=707905 -CVE-2013-5748 - http://packetstormsecurity.com/files/123455/SimpleRisk-20130915-01-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-5749 - http://packetstormsecurity.com/files/123455/SimpleRisk-20130915-01-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-5756 - http://www.exploit-db.com/exploits/33740 -CVE-2013-5757 - http://www.exploit-db.com/exploits/33740 -CVE-2013-5758 - http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html -CVE-2013-5758 - http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html -CVE-2013-5758 - http://www.exploit-db.com/exploits/33741 -CVE-2013-5758 - http://www.exploit-db.com/exploits/33742 -CVE-2013-5761 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5762 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5763 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5765 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5766 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5767 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5768 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5769 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5770 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5771 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5772 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5772 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5773 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5774 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5774 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5775 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5776 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5777 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5778 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5778 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5779 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5780 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5780 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5781 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5782 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5782 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5783 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5783 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5784 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5784 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5786 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5787 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5788 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5789 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5790 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5790 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5791 - http://www.citadelo.com/en/ms13-105-oracle-outside-in-mdb-parsing-vulnerability-cve-2013-5791/ -CVE-2013-5791 - http://www.exploit-db.com/exploits/31222 -CVE-2013-5791 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5792 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5793 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5794 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5796 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5797 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5797 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5798 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5799 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5800 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5801 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5802 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5802 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5803 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5803 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5804 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5804 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5805 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5806 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5807 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5809 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5809 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5810 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5811 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5812 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5813 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5814 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5814 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5815 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5816 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5817 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5817 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5818 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5819 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5820 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5820 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5822 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5823 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5823 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5824 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5825 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5825 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5826 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5827 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5828 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5829 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5829 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5830 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5830 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5831 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5832 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5835 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5836 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5837 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5838 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5839 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5840 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5840 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5841 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5842 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5842 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5843 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5844 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5845 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5846 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5847 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5848 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5849 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5849 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5850 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5850 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5851 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5851 - http://www.ubuntu.com/usn/USN-2033-1 -CVE-2013-5852 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5854 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5855 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-5855 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2013-5855 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-5855 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-5856 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5857 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5859 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5861 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5862 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5863 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5864 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5865 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5866 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5867 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html -CVE-2013-5870 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5878 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5884 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5887 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5888 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5889 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5891 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-5893 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5895 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5896 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5898 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5899 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5902 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5904 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5905 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5906 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5907 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5910 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2013-5930 - http://packetstormsecurity.com/files/123138/realestatephpscript-xss.txt -CVE-2013-5931 - http://packetstormsecurity.com/files/123138/realestatephpscript-xss.txt -CVE-2013-5933 - https://plus.google.com/110348415484169880343/posts/5ofgPNrSu3J -CVE-2013-5939 - http://packetstormsecurity.com/files/123746/PHPCMS-Guestbook-Cross-Site-Scripting.html -CVE-2013-5948 - http://seclists.org/fulldisclosure/2014/Apr/59 -CVE-2013-5952 - http://packetstormsecurity.com/files/125737 -CVE-2013-5953 - http://packetstormsecurity.com/files/125738 -CVE-2013-5954 - http://packetstormsecurity.com/files/125735 -CVE-2013-5954 - http://seclists.org/fulldisclosure/2014/Mar/270 -CVE-2013-5955 - http://packetstormsecurity.com/files/125734 -CVE-2013-5955 - http://seclists.org/fulldisclosure/2014/Mar/269 -CVE-2013-5956 - http://packetstormsecurity.com/files/125732/Joomla-Youtube-Gallery-3.4.0-Cross-Site-Scripting.html -CVE-2013-5956 - http://seclists.org/fulldisclosure/2014/Mar/264 -CVE-2013-5956 - http://seclists.org/fulldisclosure/2014/Mar/288 -CVE-2013-5960 - http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html -CVE-2013-5960 - http://www.securityfocus.com/bid/62415 -CVE-2013-5961 - http://packetstormsecurity.com/files/123349 -CVE-2013-5962 - http://packetstormsecurity.com/files/123303 -CVE-2013-5962 - http://www.exploit-db.com/exploits/28377 -CVE-2013-5962 - http://www.vulnerability-lab.com/get_content.php?id=1080 -CVE-2013-5963 - http://packetstormsecurity.com/files/123235 -CVE-2013-5973 - http://www.vmware.com/security/advisories/VMSA-2013-0016.html -CVE-2013-5977 - http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-5977 - http://seclists.org/bugtraq/2013/Oct/52 -CVE-2013-5977 - http://www.exploit-db.com/exploits/28959 -CVE-2013-5978 - http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-5978 - http://seclists.org/bugtraq/2013/Oct/52 -CVE-2013-5978 - http://www.exploit-db.com/exploits/28959 -CVE-2013-5979 - https://bugs.launchpad.net/xibo/+bug/1093967 -CVE-2013-5983 - http://packetstormsecurity.com/files/123747 -CVE-2013-5984 - http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html -CVE-2013-5988 - https://packetstormsecurity.com/files/cve/CVE-2013-5988 -CVE-2013-6010 - http://packetstormsecurity.com/files/123327 -CVE-2013-6017 - http://www.kb.cert.org/vuls/id/204950 -CVE-2013-6021 - http://www.kb.cert.org/vuls/id/233990 -CVE-2013-6021 - https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/ -CVE-2013-6022 - http://www.kb.cert.org/vuls/id/450646 -CVE-2013-6023 - http://www.exploit-db.com/exploits/29959 -CVE-2013-6023 - http://www.kb.cert.org/vuls/id/785838 -CVE-2013-6025 - http://www.kb.cert.org/vuls/id/303900 -CVE-2013-6025 - https://www.exploit-db.com/exploits/38805/ -CVE-2013-6026 - http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ -CVE-2013-6027 - http://pastebin.com/raw.php?i=vbiG42VD -CVE-2013-6028 - http://www.kb.cert.org/vuls/id/204950 -CVE-2013-6029 - http://www.kb.cert.org/vuls/id/346278 -CVE-2013-6030 - http://www.kb.cert.org/vuls/id/168751 -CVE-2013-6037 - http://www.kb.cert.org/vuls/id/687278 -CVE-2013-6038 - http://www.kb.cert.org/vuls/id/586958 -CVE-2013-6039 - http://www.kb.cert.org/vuls/id/268662 -CVE-2013-6040 - http://www.exploit-db.com/exploits/31176 -CVE-2013-6040 - http://www.exploit-db.com/exploits/31177 -CVE-2013-6040 - http://www.kb.cert.org/vuls/id/219470 -CVE-2013-6044 - http://seclists.org/oss-sec/2013/q3/369 -CVE-2013-6044 - https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued -CVE-2013-6048 - https://github.com/munin-monitoring/munin/blob/2.0.18/ChangeLog -CVE-2013-6058 - http://packetstormsecurity.com/files/123929 -CVE-2013-6074 - http://packetstormsecurity.com/files/123934/Open-Xchange-AppSuite-Script-Insertion.html -CVE-2013-6078 - http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ -CVE-2013-6079 - http://packetstormsecurity.com/files/122677 -CVE-2013-6114 - http://www.exploit-db.com/exploits/28811/ -CVE-2013-6117 - http://blog.depthsecurity.com/2013/11/dahua-dvr-authentication-bypass-cve.html -CVE-2013-6117 - http://packetstormsecurity.com/files/124022/Dahua-DVR-Authentication-Bypass.html -CVE-2013-6117 - http://seclists.org/bugtraq/2013/Nov/62 -CVE-2013-6117 - http://www.exploit-db.com/exploits/29673 -CVE-2013-6127 - http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 -CVE-2013-6127 - http://www.exploit-db.com/exploits/28084/ -CVE-2013-6128 - http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 -CVE-2013-6128 - http://www.exploit-db.com/exploits/28085/ -CVE-2013-6129 - http://www.net-security.org/secworld.php?id=15743 -CVE-2013-6162 - http://www.exploit-db.com/exploits/30373 -CVE-2013-6163 - http://packetstormsecurity.com/files/123916 -CVE-2013-6164 - http://packetstormsecurity.com/files/123915 -CVE-2013-6164 - http://www.exploit-db.com/exploits/29517 -CVE-2013-6173 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html -CVE-2013-6173 - http://www.kb.cert.org/vuls/id/346982 -CVE-2013-6174 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html -CVE-2013-6174 - http://www.kb.cert.org/vuls/id/346982 -CVE-2013-6175 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html -CVE-2013-6175 - http://www.kb.cert.org/vuls/id/346982 -CVE-2013-6176 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html -CVE-2013-6176 - http://www.kb.cert.org/vuls/id/346982 -CVE-2013-6177 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html -CVE-2013-6177 - http://www.kb.cert.org/vuls/id/346982 -CVE-2013-6181 - http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure.html -CVE-2013-6182 - http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html -CVE-2013-6221 - http://packetstormsecurity.com/files/127247/HP-AutoPass-License-Server-File-Upload.html -CVE-2013-6223 - http://seclists.org/fulldisclosure/2013/Nov/210 -CVE-2013-6224 - http://packetstormsecurity.com/files/124222 -CVE-2013-6225 - http://www.exploit-db.com/exploits/29672 -CVE-2013-6227 - https://www.exploit-db.com/exploits/46206/ -CVE-2013-6229 - http://www.isecauditors.com/advisories-2013#2013-014 -CVE-2013-6231 - http://www.exploit-db.com/exploits/31990 -CVE-2013-6232 - http://packetstormsecurity.com/files/125495 -CVE-2013-6232 - http://www.exploit-db.com/exploits/32038 -CVE-2013-6233 - http://packetstormsecurity.com/files/125496 -CVE-2013-6233 - http://www.exploit-db.com/exploits/32039 -CVE-2013-6234 - http://packetstormsecurity.com/files/125497 -CVE-2013-6234 - http://www.exploit-db.com/exploits/32040 -CVE-2013-6235 - http://packetstormsecurity.com/files/124933 -CVE-2013-6235 - http://seclists.org/fulldisclosure/2014/Jan/164 -CVE-2013-6236 - https://packetstormsecurity.com/files/cve/CVE-2013-6236 -CVE-2013-6236 - https://seclists.org/bugtraq/2013/Oct/149 -CVE-2013-6237 - http://packetstormsecurity.com/files/124274/ISL-Light-Desktop-3.5.4-Information-Disclosure.html -CVE-2013-6239 - http://packetstormsecurity.com/files/123764 -CVE-2013-6242 - http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html -CVE-2013-6242 - http://seclists.org/bugtraq/2013/Nov/127 -CVE-2013-6246 - http://packetstormsecurity.com/files/123703/quest-captcha.txt -CVE-2013-6267 - http://packetstormsecurity.com/files/124200 -CVE-2013-6271 - http://seclists.org/fulldisclosure/2013/Nov/204 -CVE-2013-6271 - http://www.theregister.co.uk/2013/12/10/android_has_lockbypass_bug/ -CVE-2013-6272 - http://packetstormsecurity.com/files/127359/Android-OS-Authorization-Missing.html -CVE-2013-6272 - http://seclists.org/fulldisclosure/2014/Jul/13 -CVE-2013-6275 - http://www.exploit-db.com/exploits/29274 -CVE-2013-6281 - http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html -CVE-2013-6282 - https://www.exploit-db.com/exploits/40975/ -CVE-2013-6283 - http://www.exploit-db.com/exploits/27700 -CVE-2013-6295 - http://davidsopaslabs.blogspot.com/2013/ -CVE-2013-6295 - http://davidsopaslabs.blogspot.com/2013/10/how-salesman-could-hack-prestashop.html -CVE-2013-6327 - http://www-01.ibm.com/support/docview.wss?uid=swg21659907 -CVE-2013-6341 - http://packetstormsecurity.com/files/124201 -CVE-2013-6348 - http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html -CVE-2013-6358 - https://web.archive.org/web/20150423041900/http://labs.davidsopas.com/2013/10/how-salesman-could-hack-prestashop.html -CVE-2013-6359 - https://github.com/munin-monitoring/munin/blob/2.0.18/ChangeLog -CVE-2013-6364 - http://www.exploit-db.com/exploits/29519 -CVE-2013-6364 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-6364 -CVE-2013-6365 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-6365 -CVE-2013-6365 - https://packetstormsecurity.com/files/cve/CVE-2013-6365 -CVE-2013-6367 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-6368 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-6370 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-6371 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-6376 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-6380 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-6383 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-6397 - http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html -CVE-2013-6418 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2013-6420 - https://hackerone.com/reports/523 -CVE-2013-6420 - https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html -CVE-2013-6421 - http://www.openwall.com/lists/oss-security/2013/12/03/1 -CVE-2013-6421 - http://www.openwall.com/lists/oss-security/2013/12/03/6 -CVE-2013-6422 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2013-6435 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2013-6438 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-6438 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-6438 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-6438 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-6440 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2013-6444 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-6449 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-6449 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2013-6449 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-6449 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-6449 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-6450 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2013-6450 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2013-6450 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2013-6450 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2013-6450 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2013-6462 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2013-6466 - https://cert.vde.com/en-us/advisories/vde-2017-001 -CVE-2013-6489 - http://www.securityfocus.com/bid/65192 -CVE-2013-6618 - http://www.exploit-db.com/exploits/29544 -CVE-2013-6618 - http://www.senseofsecurity.com.au/advisories/SOS-13-003 -CVE-2013-6627 - http://blog.skylined.nl/20161219001.html -CVE-2013-6627 - http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html -CVE-2013-6627 - https://www.exploit-db.com/exploits/40944/ -CVE-2013-6629 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-6629 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2013-6629 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-6629 - https://bugzilla.mozilla.org/show_bug.cgi?id=891693 -CVE-2013-6630 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-6630 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-6630 - https://bugzilla.mozilla.org/show_bug.cgi?id=891693 -CVE-2013-6661 - https://code.google.com/p/chromium/issues/detail?id=333885 -CVE-2013-6661 - https://code.google.com/p/chromium/issues/detail?id=334274 -CVE-2013-6671 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-6671 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-6672 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-6673 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2013-6673 - http://www.ubuntu.com/usn/USN-2053-1 -CVE-2013-6674 - http://packetstormsecurity.com/files/124965/Mozilla-Thunderbird-Filter-Bypass.html -CVE-2013-6674 - http://seclists.org/fulldisclosure/2014/Jan/182 -CVE-2013-6674 - http://www.kb.cert.org/vuls/id/863369 -CVE-2013-6674 - https://bugzilla.mozilla.org/show_bug.cgi?id=868267 -CVE-2013-6735 - http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html -CVE-2013-6763 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-6767 - http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-Buffer-Overflow.html -CVE-2013-6767 - http://seclists.org/bugtraq/2013/Dec/90 -CVE-2013-6767 - http://www.exploit-db.com/exploits/30374 -CVE-2013-6767 - http://www.vulnerability-lab.com/get_content.php?id=1171 -CVE-2013-6780 - http://packetstormsecurity.com/files/130527/Cisco-Ironport-AsyncOS-Cross-Site-Scripting.html -CVE-2013-6789 - http://seclists.org/bugtraq/2013/Aug/12 -CVE-2013-6793 - http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html -CVE-2013-6793 - http://seclists.org/bugtraq/2013/Oct/154 -CVE-2013-6793 - http://www.exploit-db.com/exploits/29279 -CVE-2013-6793 - http://www.vulnerability-lab.com/get_content.php?id=1125 -CVE-2013-6795 - http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html -CVE-2013-6795 - https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0 -CVE-2013-6796 - http://packetstormsecurity.com/files/124054 -CVE-2013-6799 - http://cxsecurity.com/issue/WLB-2013110059 -CVE-2013-6800 - https://github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d -CVE-2013-6805 - https://github.com/koto/exceed-mitm -CVE-2013-6806 - https://github.com/koto/exceed-mitm -CVE-2013-6807 - https://github.com/koto/exceed-mitm -CVE-2013-6809 - http://packetstormsecurity.com/files/124275/Tftpd32-Client-Side-Format-String.html -CVE-2013-6809 - http://seclists.org/fulldisclosure/2013/Dec/15 -CVE-2013-6810 - https://www.exploit-db.com/exploits/42701/ -CVE-2013-6810 - https://www.exploit-db.com/exploits/42702/ -CVE-2013-6825 - http://packetstormsecurity.com/files/126883/DCMTK-Privilege-Escalation.html -CVE-2013-6825 - http://seclists.org/fulldisclosure/2014/Jun/11 -CVE-2013-6826 - http://packetstormsecurity.com/files/123980/fortianalyzer-xsrf.txt -CVE-2013-6835 - http://seclists.org/bugtraq/2014/Mar/63 -CVE-2013-6835 - http://seclists.org/fulldisclosure/2014/Mar/92 -CVE-2013-6837 - http://cxsecurity.com/issue/WLB-2013110149 -CVE-2013-6837 - http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html -CVE-2013-6853 - http://packetstormsecurity.com/files/124800/Y-Toolbar-Cross-Site-Scripting.html -CVE-2013-6853 - http://www.cloudscan.me/2014/01/cve-2013-6853-stored-xss-in-y-toolbar.html -CVE-2013-6872 - http://packetstormsecurity.com/files/124777/Collabtive-1.1-SQL-Injection.html -CVE-2013-6872 - http://seclists.org/fulldisclosure/2014/Jan/72 -CVE-2013-6872 - http://www.exploit-db.com/exploits/30946 -CVE-2013-6873 - http://packetstormsecurity.com/files/124035/testa-sql.txt -CVE-2013-6876 - http://packetstormsecurity.com/files/126887/s3dvt-Privilege-Escalation.html -CVE-2013-6877 - http://packetstormsecurity.com/files/124535 -CVE-2013-6877 - http://www.coresecurity.com/advisories/realplayer-heap-based-buffer-overflow-vulnerability -CVE-2013-6880 - http://www.7elements.co.uk/resources/blog/cve-2013-6880-proof-concept -CVE-2013-6881 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html -CVE-2013-6882 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html -CVE-2013-6883 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html -CVE-2013-6884 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html -CVE-2013-6885 - http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924 -CVE-2013-6919 - http://www.rafayhackingarticles.net/2013/11/phpthumb-server-side-request-forgery.html -CVE-2013-6922 - http://www.exploit-db.com/exploits/30726 -CVE-2013-6923 - http://packetstormsecurity.com/files/124685 -CVE-2013-6923 - http://www.exploit-db.com/exploits/30727 -CVE-2013-6924 - http://packetstormsecurity.com/files/124688/Seagate-BlackArmor-NAS-sg2000-2000.1331-Remote-Command-Execution.html -CVE-2013-6933 - http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html -CVE-2013-6934 - http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html -CVE-2013-6935 - http://packetstormsecurity.com/files/133899/Watermark-Master-Buffer-Overflow-SEH.html -CVE-2013-6935 - http://www.exploit-db.com/exploits/29327 -CVE-2013-6936 - http://packetstormsecurity.com/files/124091/MyBB-Ajaxfs-SQL-Injection.html -CVE-2013-6945 - http://www.darkreading.com/vulnerability/anatomy-of-an-electronic-health-record-e/240164441/ -CVE-2013-6948 - http://www.kb.cert.org/vuls/id/656302 -CVE-2013-6949 - http://www.kb.cert.org/vuls/id/656302 -CVE-2013-6950 - http://www.kb.cert.org/vuls/id/656302 -CVE-2013-6951 - http://www.kb.cert.org/vuls/id/656302 -CVE-2013-6952 - http://www.kb.cert.org/vuls/id/656302 -CVE-2013-6954 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2013-6955 - http://www.kb.cert.org/vuls/id/615910 -CVE-2013-6976 - http://packetstormsecurity.com/files/124449/Cisco-EPC3925-Cross-Site-Request-Forgery.html -CVE-2013-6976 - http://www.exploit-db.com/exploits/30362/ -CVE-2013-6986 - http://packetstormsecurity.com/files/124330/ZippyYum-3.4-Insecure-Data-Storage.html -CVE-2013-6987 - http://packetstormsecurity.com/files/124563 -CVE-2013-6994 - https://github.com/koto/exceed-mitm -CVE-2013-7002 - http://packetstormsecurity.com/files/124344 -CVE-2013-7003 - http://packetstormsecurity.com/files/124374/LiveZilla-5.1.1.0-Cross-Site-Scripting.html -CVE-2013-7008 - http://ffmpeg.org/security.html -CVE-2013-7009 - http://ffmpeg.org/security.html -CVE-2013-7010 - http://ffmpeg.org/security.html -CVE-2013-7011 - http://ffmpeg.org/security.html -CVE-2013-7012 - http://ffmpeg.org/security.html -CVE-2013-7013 - http://ffmpeg.org/security.html -CVE-2013-7014 - http://ffmpeg.org/security.html -CVE-2013-7015 - http://ffmpeg.org/security.html -CVE-2013-7016 - http://ffmpeg.org/security.html -CVE-2013-7017 - http://ffmpeg.org/security.html -CVE-2013-7018 - http://ffmpeg.org/security.html -CVE-2013-7019 - http://ffmpeg.org/security.html -CVE-2013-7020 - http://ffmpeg.org/security.html -CVE-2013-7021 - http://ffmpeg.org/security.html -CVE-2013-7022 - http://ffmpeg.org/security.html -CVE-2013-7023 - http://ffmpeg.org/security.html -CVE-2013-7024 - http://ffmpeg.org/security.html -CVE-2013-7025 - http://seclists.org/fulldisclosure/2013/Dec/32 -CVE-2013-7025 - http://www.exploit-db.com/exploits/30054 -CVE-2013-7025 - http://www.vulnerability-lab.com/get_content.php?id=1099 -CVE-2013-7027 - http://www.ubuntu.com/usn/USN-2076-1 -CVE-2013-7030 - http://www.exploit-db.com/exploits/30237/ -CVE-2013-7033 - http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html -CVE-2013-7043 - http://www.exploit-db.com/exploits/29927/ -CVE-2013-7049 - http://seclists.org/oss-sec/2013/q4/482 -CVE-2013-7050 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849 -CVE-2013-7051 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt -CVE-2013-7051 - http://www.exploit-db.com/exploits/31425 -CVE-2013-7052 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt -CVE-2013-7053 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt -CVE-2013-7054 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt -CVE-2013-7055 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt -CVE-2013-7057 - http://www.exploit-db.com/exploits/35046 -CVE-2013-7070 - https://github.com/mikaku/Monitorix/issues/30 -CVE-2013-7071 - https://github.com/mikaku/Monitorix/issues/30 -CVE-2013-7085 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732006 -CVE-2013-7086 - http://packetstormsecurity.com/files/124421 -CVE-2013-7091 - http://packetstormsecurity.com/files/124321 -CVE-2013-7091 - http://www.exploit-db.com/exploits/30472 -CVE-2013-7092 - http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html -CVE-2013-7103 - http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html -CVE-2013-7104 - http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html -CVE-2013-7127 - http://www.securelist.com/en/blog/8168/Loophole_in_Safari -CVE-2013-7129 - http://packetstormsecurity.com/files/124240 -CVE-2013-7136 - http://www.planitcomputing.ie/upc-wifi-attack.pdf -CVE-2013-7140 - http://seclists.org/bugtraq/2014/Jan/57 -CVE-2013-7141 - http://seclists.org/bugtraq/2014/Jan/57 -CVE-2013-7142 - http://seclists.org/bugtraq/2014/Jan/57 -CVE-2013-7143 - http://seclists.org/bugtraq/2014/Jan/57 -CVE-2013-7144 - https://www.thaicert.or.th/papers/general/2013/pa2013ge010.html -CVE-2013-7175 - http://www.kb.cert.org/vuls/id/869702 -CVE-2013-7179 - http://www.kb.cert.org/vuls/id/431726 -CVE-2013-7183 - http://www.kb.cert.org/vuls/id/431726 -CVE-2013-7184 - http://www.exploit-db.com/exploits/30414 -CVE-2013-7185 - http://www.exploit-db.com/exploits/30413 -CVE-2013-7186 - http://packetstormsecurity.com/files/124282 -CVE-2013-7186 - http://packetstormsecurity.com/files/124283 -CVE-2013-7186 - http://packetstormsecurity.com/files/124284 -CVE-2013-7187 - http://packetstormsecurity.com/files/124343/wpformcraft-sql.txt -CVE-2013-7187 - http://www.exploit-db.com/exploits/30002 -CVE-2013-7191 - http://makthepla.net/blog/=/helpdesk-pilot-add-admin -CVE-2013-7192 - http://packetstormsecurity.com/files/124451 -CVE-2013-7193 - http://packetstormsecurity.com/files/124441/c2cfac-sql.txt -CVE-2013-7194 - http://packetstormsecurity.com/files/124400 -CVE-2013-7194 - http://www.exploit-db.com/exploits/30213 -CVE-2013-7201 - https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/ -CVE-2013-7202 - https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/ -CVE-2013-7203 - http://packetstormsecurity.com/files/149438/ManageEngine-SupportCenter-Plus-8.1.0-Cross-Site-Scripting.html -CVE-2013-7209 - http://packetstormsecurity.com/files/124598/JForum-Cross-Site-Request-Forgery.html -CVE-2013-7216 - http://packetstormsecurity.com/files/124442 -CVE-2013-7220 - https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j -CVE-2013-7226 - https://bugs.php.net/bug.php?id=66356 -CVE-2013-7226 - https://hackerone.com/reports/1356 -CVE-2013-7234 - http://seclists.org/fulldisclosure/2013/Dec/83 -CVE-2013-7234 - http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ -CVE-2013-7235 - http://seclists.org/fulldisclosure/2013/Dec/83 -CVE-2013-7235 - http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ -CVE-2013-7236 - http://seclists.org/fulldisclosure/2013/Dec/83 -CVE-2013-7236 - http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ -CVE-2013-7240 - http://seclists.org/oss-sec/2013/q4/566 -CVE-2013-7240 - http://seclists.org/oss-sec/2013/q4/570 -CVE-2013-7243 - http://packetstormsecurity.com/files/124711 -CVE-2013-7246 - http://packetstormsecurity.com/files/124886 -CVE-2013-7246 - http://seclists.org/fulldisclosure/2014/Jan/132 -CVE-2013-7246 - http://www.exploit-db.com/exploits/31179 -CVE-2013-7257 - http://packetstormsecurity.com/files/124537 -CVE-2013-7257 - https://github.com/Codiad/Codiad/issues/584 -CVE-2013-7259 - https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j -CVE-2013-7260 - http://www.kb.cert.org/vuls/id/698278 -CVE-2013-7262 - https://github.com/mapserver/mapserver/issues/4834 -CVE-2013-7263 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7264 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7265 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7266 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7267 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7268 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7269 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7270 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7271 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7276 - http://packetstormsecurity.com/files/124587/WordPress-Recommend-Cross-Site-Scripting.html -CVE-2013-7277 - https://www.netsparker.com/critical-xss-vulnerabilities-andy-php-knowledgebase -CVE-2013-7278 - http://packetstormsecurity.com/files/124624 -CVE-2013-7280 - http://packetstormsecurity.com/files/120611/Hanso-Player-2.1.0-Buffer-Overflow.html -CVE-2013-7280 - http://www.exploit-db.com/exploits/24556 -CVE-2013-7281 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2013-7285 - http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html -CVE-2013-7285 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2013-7286 - http://seclists.org/fulldisclosure/2014/Apr/21 -CVE-2013-7287 - http://seclists.org/fulldisclosure/2014/Apr/21 -CVE-2013-7292 - http://www.kb.cert.org/vuls/id/612076 -CVE-2013-7306 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7306 - http://www.kb.cert.org/vuls/id/BLUU-98MS25 -CVE-2013-7307 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7307 - http://www.kb.cert.org/vuls/id/BLUU-97KQ2C -CVE-2013-7308 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7308 - http://www.kb.cert.org/vuls/id/BLUU-985QRV -CVE-2013-7309 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7309 - http://www.kb.cert.org/vuls/id/BLUU-985QSE -CVE-2013-7310 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7310 - http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ -CVE-2013-7311 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7311 - http://www.kb.cert.org/vuls/id/BLUU-985QRC -CVE-2013-7312 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7312 - http://www.kb.cert.org/vuls/id/BLUU-985QS8 -CVE-2013-7313 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7313 - http://www.kb.cert.org/vuls/id/BLUU-97KQ26 -CVE-2013-7314 - http://www.kb.cert.org/vuls/id/229804 -CVE-2013-7314 - http://www.kb.cert.org/vuls/id/BLUU-985QUQ -CVE-2013-7317 - http://www.kb.cert.org/vuls/id/405942 -CVE-2013-7318 - http://packetstormsecurity.com/files/122899/algosec64-xss.txt -CVE-2013-7326 - http://packetstormsecurity.com/files/124402 -CVE-2013-7327 - https://bugs.php.net/bug.php?id=66356 -CVE-2013-7328 - https://bugs.php.net/bug.php?id=66356 -CVE-2013-7331 - https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ -CVE-2013-7332 - https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ -CVE-2013-7334 - http://packetstormsecurity.com/files/119806/ImageCMS-4.0.0b-SQL-Injection.html -CVE-2013-7349 - http://packetstormsecurity.com/files/122771 -CVE-2013-7349 - http://packetstormsecurity.com/files/123482 -CVE-2013-7349 - http://www.exploit-db.com/exploits/28684 -CVE-2013-7349 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php -CVE-2013-7349 - https://www.netsparker.com/critical-xss-sql-injection-vulnerabilities-gnew/ -CVE-2013-7351 - http://seclists.org/oss-sec/2014/q2/1 -CVE-2013-7352 - http://packetstormsecurity.com/files/121481/b2evolution-4.1.6-SQL-Injection.html -CVE-2013-7368 - http://packetstormsecurity.com/files/122771 -CVE-2013-7368 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php -CVE-2013-7368 - https://www.netsparker.com/critical-xss-sql-injection-vulnerabilities-gnew/ -CVE-2013-7373 - http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/ -CVE-2013-7373 - http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5 -CVE-2013-7375 - http://packetstormsecurity.com/files/120368/PHP-Fusion-CMS-7.02.05-SQL-Injection.html -CVE-2013-7375 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html -CVE-2013-7375 - http://seclists.org/bugtraq/2013/Feb/80 -CVE-2013-7376 - http://seclists.org/bugtraq/2013/Jul/27 -CVE-2013-7385 - http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html -CVE-2013-7388 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html -CVE-2013-7389 - http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt -CVE-2013-7392 - http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ -CVE-2013-7393 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2013-7409 - http://packetstormsecurity.com/files/123554/ALLPlayer-5.6.2-Buffer-Overflow.html -CVE-2013-7409 - http://packetstormsecurity.com/files/123986/ALLPlayer-5.6.2-SEH-Buffer-Overflow.html -CVE-2013-7409 - http://packetstormsecurity.com/files/124161/ALLPlayer-5.7-Buffer-Overflow.html -CVE-2013-7409 - http://packetstormsecurity.com/files/125519/ALLPlayer-5.8.1-Buffer-Overflow.html -CVE-2013-7409 - http://www.exploit-db.com/exploits/28855 -CVE-2013-7409 - http://www.exploit-db.com/exploits/29549 -CVE-2013-7417 - http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-7417 - http://sourceforge.net/p/ipcop/bugs/807/ -CVE-2013-7418 - http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2013-7418 - http://sourceforge.net/p/ipcop/bugs/807/ -CVE-2013-7419 - http://packetstormsecurity.com/files/124239/WordPress-Js-Multi-Hotel-2.2.1-Cross-Site-Scripting.html -CVE-2013-7421 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2013-7421 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2013-7421 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2013-7421 - http://www.ubuntu.com/usn/USN-2543-1 -CVE-2013-7421 - https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu -CVE-2013-7423 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -CVE-2013-7423 - http://seclists.org/fulldisclosure/2021/Sep/0 -CVE-2013-7435 - https://bugs.launchpad.net/evergreen/+bug/1206589 -CVE-2013-7446 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2013-7446 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2013-7447 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2013-7447 - http://www.securityfocus.com/bid/83239 -CVE-2013-7447 - http://www.ubuntu.com/usn/USN-2898-1 -CVE-2013-7450 - https://github.com/pulp/pulp/pull/627 -CVE-2013-7458 - https://github.com/antirez/linenoise/issues/121 -CVE-2013-7458 - https://github.com/antirez/redis/blob/3.2/00-RELEASENOTES -CVE-2013-7458 - https://github.com/antirez/redis/pull/3322 -CVE-2013-7466 - http://hauntit.blogspot.com/2013/04/en-smf-204-full-disclosure.html -CVE-2013-7467 - http://hauntit.blogspot.com/2013/04/en-smf-204-full-disclosure.html -CVE-2013-7468 - https://packetstormsecurity.com/files/121391/public_phpInjection-smf204.txt -CVE-2013-7471 - https://www.exploit-db.com/exploits/27044 -CVE-2013-7485 - http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html -CVE-2013-7485 - http://seclists.org/bugtraq/2013/Nov/127 -CVE-2013-7486 - http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html -CVE-2013-7486 - http://seclists.org/bugtraq/2013/Nov/127 -CVE-2013-7487 - http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html -CVE-2013-7489 - https://www.openwall.com/lists/oss-security/2020/05/14/11 -CVE-2013-7490 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014 -CVE-2013-7491 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013 -CVE-2014-0014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2014-0015 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0015 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2014-0015 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0015 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-0015 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0030 - https://www.exploit-db.com/exploits/45341/ -CVE-2014-0032 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-0033 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0033 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0033 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0033 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0038 - http://www.openwall.com/lists/oss-security/2014/01/31/2 -CVE-2014-0038 - https://www.exploit-db.com/exploits/40503/ -CVE-2014-0040 - https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3 -CVE-2014-0041 - https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3CONFIRM: -CVE-2014-0042 - https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3 -CVE-2014-0050 - http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html -CVE-2014-0050 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0050 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0050 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-0050 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0050 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2014-0060 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0061 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0062 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0063 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0064 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0064 - https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a -CVE-2014-0065 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0066 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0071 - http://rhn.redhat.com/errata/RHSA-2014-0233.html -CVE-2014-0072 - https://github.com/apache/cordova-plugin-file-transfer/commit/a1d6fc07e8a40c1b2b16f4103c403b30e1089668 -CVE-2014-0075 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0075 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0075 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0075 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0075 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0076 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-0076 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0076 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0076 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2014-0088 - https://hackerone.com/reports/4689 -CVE-2014-0094 - http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html -CVE-2014-0094 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-0095 - http://seclists.org/fulldisclosure/2014/May/134 -CVE-2014-0095 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0096 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0096 - http://seclists.org/fulldisclosure/2014/May/135 -CVE-2014-0096 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0096 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0096 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0096 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0097 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2014-0098 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0098 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0098 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0098 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0099 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0099 - http://seclists.org/fulldisclosure/2014/May/138 -CVE-2014-0099 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0099 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0099 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0106 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-0107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0107 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-0107 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2014-0107 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2014-0112 - http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html -CVE-2014-0112 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-0113 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-0114 - http://openwall.com/lists/oss-security/2014/07/08/1 -CVE-2014-0114 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2014-0114 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0114 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0114 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0114 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0114 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2014-0116 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-0117 - http://seclists.org/fulldisclosure/2014/Jul/117 -CVE-2014-0117 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0118 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0118 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2014-0118 - https://hackerone.com/reports/20861 -CVE-2014-0119 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0119 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0119 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0119 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0119 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0130 - https://hackerone.com/reports/3370 -CVE-2014-0133 - https://hackerone.com/reports/4690 -CVE-2014-0138 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0138 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-0138 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0139 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-0156 - https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff -CVE-2014-0160 - http://seclists.org/fulldisclosure/2014/Apr/173 -CVE-2014-0160 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0160 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-0160 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0160 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0160 - https://hackerone.com/reports/6626 -CVE-2014-0181 - http://www.openwall.com/lists/oss-security/2023/04/16/3 -CVE-2014-0185 - https://bugs.php.net/bug.php?id=67060 -CVE-2014-0185 - https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d -CVE-2014-0191 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0191 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-0195 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0195 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-0195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0195 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0195 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0195 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0195 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html -CVE-2014-0195 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0195 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2014-0196 - http://pastebin.com/raw.php?i=yTSFUBgZ -CVE-2014-0196 - http://www.exploit-db.com/exploits/33516 -CVE-2014-0196 - https://bugzilla.redhat.com/show_bug.cgi?id=1094232 -CVE-2014-0198 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0198 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0198 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0198 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0198 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0198 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html -CVE-2014-0198 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0198 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2014-0207 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-0207 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-0209 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0209 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0209 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0210 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0210 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0210 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0211 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0211 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0211 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0220 - http://packetstormsecurity.com/files/126956/Cloudera-Manager-4.8.2-5.0.0-Information-Disclosure.html -CVE-2014-0221 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0221 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-0221 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0221 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0221 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0221 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0221 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html -CVE-2014-0221 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0221 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2014-0224 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0224 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-0224 - http://www.kb.cert.org/vuls/id/978508 -CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-0224 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0224 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0224 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-0224 - http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download -CVE-2014-0224 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html -CVE-2014-0224 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0224 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2014-0226 - http://seclists.org/fulldisclosure/2014/Jul/114 -CVE-2014-0226 - http://www.exploit-db.com/exploits/34133 -CVE-2014-0226 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0226 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2014-0227 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-0227 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-0227 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-0228 - http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html -CVE-2014-0230 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-0230 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-0230 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-0231 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html -CVE-2014-0231 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-0231 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2014-0232 - http://packetstormsecurity.com/files/127929/Apache-OFBiz-11.04.04-12.04.03-Cross-Site-Scripting.html -CVE-2014-0237 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-0237 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-0238 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-0238 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-0243 - http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html -CVE-2014-0243 - http://seclists.org/fulldisclosure/2014/May/145 -CVE-2014-0243 - http://www.openwall.com/lists/oss-security/2014/05/28/1 -CVE-2014-0250 - https://github.com/FreeRDP/FreeRDP/issues/1871 -CVE-2014-0254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-006 -CVE-2014-0257 - http://packetstormsecurity.com/files/127246/MS14-009-.NET-Deployment-Service-IE-Sandbox-Escape.html -CVE-2014-0282 - http://www.exploit-db.com/exploits/33860 -CVE-2014-0315 - http://seclists.org/fulldisclosure/2020/Jul/33 -CVE-2014-0329 - http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html -CVE-2014-0329 - http://www.kb.cert.org/vuls/id/228886 -CVE-2014-0330 - http://www.kb.cert.org/vuls/id/813382 -CVE-2014-0331 - http://seclists.org/fulldisclosure/2014/Apr/53 -CVE-2014-0331 - http://www.kb.cert.org/vuls/id/667340 -CVE-2014-0332 - http://www.kb.cert.org/vuls/id/727318 -CVE-2014-0332 - http://www.sonicwall.com/us/shared/download/Support_Bulletin_GMS_Vulnerability_XSS_Resolved_in_7.1_SP2_and_7.2.pdf -CVE-2014-0335 - http://www.kb.cert.org/vuls/id/823452 -CVE-2014-0336 - http://www.kb.cert.org/vuls/id/823452 -CVE-2014-0337 - http://www.kb.cert.org/vuls/id/917700 -CVE-2014-0338 - http://seclists.org/fulldisclosure/2014/Mar/154 -CVE-2014-0338 - http://www.kb.cert.org/vuls/id/807134 -CVE-2014-0339 - http://seclists.org/fulldisclosure/2014/Mar/274 -CVE-2014-0339 - http://www.kb.cert.org/vuls/id/381692 -CVE-2014-0341 - http://www.kb.cert.org/vuls/id/901156 -CVE-2014-0342 - http://www.kb.cert.org/vuls/id/901156 -CVE-2014-0357 - http://www.kb.cert.org/vuls/id/251628 -CVE-2014-0358 - http://www.kb.cert.org/vuls/id/657622 -CVE-2014-0359 - http://www.kb.cert.org/vuls/id/657622 -CVE-2014-0361 - http://www.kb.cert.org/vuls/id/622950 -CVE-2014-0362 - http://www.kb.cert.org/vuls/id/673313 -CVE-2014-0363 - http://issues.igniterealtime.org/browse/SMACK-410 -CVE-2014-0363 - http://www.kb.cert.org/vuls/id/489228 -CVE-2014-0364 - http://www.kb.cert.org/vuls/id/489228 -CVE-2014-0368 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0373 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0375 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0376 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0382 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0384 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0387 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0403 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0410 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0411 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0413 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0414 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0415 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0416 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0417 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0418 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0420 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-0421 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0422 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0423 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0424 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0426 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0428 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 -CVE-2014-0429 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0432 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0436 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-0436 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-0436 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-0442 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0446 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0447 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0448 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0449 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0450 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0451 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0452 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0453 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0454 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0455 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0456 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0457 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0458 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0459 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0460 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0461 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0463 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0464 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0465 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0476 - http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html -CVE-2014-0476 - https://www.exploit-db.com/exploits/38775/ -CVE-2014-0491 - https://hackerone.com/reports/2107 -CVE-2014-0502 - https://hackerone.com/reports/2170 -CVE-2014-0503 - https://hackerone.com/reports/6380 -CVE-2014-0508 - https://hackerone.com/reports/2140 -CVE-2014-0514 - http://packetstormsecurity.com/files/127113/Adobe-Reader-for-Android-addJavascriptInterface-Exploit.html -CVE-2014-0514 - http://seclists.org/fulldisclosure/2014/Apr/192 -CVE-2014-0514 - http://www.exploit-db.com/exploits/32884 -CVE-2014-0514 - http://www.securify.nl/advisory/SFY20140401/adobe_reader_for_android_exposes_insecure_javascript_interfaces.html -CVE-2014-0535 - https://hackerone.com/reports/15362 -CVE-2014-0538 - https://hackerone.com/reports/12497 -CVE-2014-0554 - https://hackerone.com/reports/27651 -CVE-2014-0556 - http://packetstormsecurity.com/files/131516/Adobe-Flash-Player-copyPixelsToByteArray-Integer-Overflow.html -CVE-2014-0556 - https://www.exploit-db.com/exploits/36808/ -CVE-2014-0619 - http://packetstormsecurity.com/files/128739/Hamster-Free-ZIP-Archiver-2.0.1.7-DLL-Hijacking.html -CVE-2014-0620 - http://www.exploit-db.com/exploits/30668 -CVE-2014-0621 - http://www.exploit-db.com/exploits/30667 -CVE-2014-0639 - http://packetstormsecurity.com/files/126788/RSA-Archer-GRC-Cross-Site-Scripting.html -CVE-2014-0659 - https://github.com/elvanderb/TCP-32764 -CVE-2014-0679 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140226-pi -CVE-2014-0683 - https://www.exploit-db.com/exploits/45986/ -CVE-2014-0749 - http://packetstormsecurity.com/files/126651/Torque-2.5.13-Buffer-Overflow.html -CVE-2014-0749 - http://packetstormsecurity.com/files/126855/TORQUE-Resource-Manager-2.5.13-Buffer-Overflow.html -CVE-2014-0749 - http://www.exploit-db.com/exploits/33554 -CVE-2014-0749 - https://labs.mwrinfosecurity.com/advisories/2014/05/14/torque-buffer-overflow -CVE-2014-0780 - https://www.exploit-db.com/exploits/42699/ -CVE-2014-0781 - https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities -CVE-2014-0783 - https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities -CVE-2014-0784 - https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities -CVE-2014-0787 - https://www.exploit-db.com/exploits/42724/ -CVE-2014-0792 - https://support.sonatype.com/entries/37828023-Nexus-Security-Vulnerability -CVE-2014-0834 - http://www-01.ibm.com/support/docview.wss?uid=swg1IV52863 -CVE-2014-0864 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0864 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0865 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0865 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0866 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0866 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0867 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0867 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0868 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0868 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0869 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0869 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0870 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0870 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0871 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0871 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0892 - http://www.kb.cert.org/vuls/id/350089 -CVE-2014-0894 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -CVE-2014-0894 - http://seclists.org/fulldisclosure/2014/Jun/173 -CVE-2014-0907 - http://packetstormsecurity.com/files/126940/IBM-DB2-Privilege-Escalation.html -CVE-2014-0907 - http://seclists.org/fulldisclosure/2014/Jun/7 -CVE-2014-0907 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-0980 - http://packetstormsecurity.com/files/125089 -CVE-2014-0980 - http://seclists.org/fulldisclosure/2014/Feb/34 -CVE-2014-0980 - http://www.coresecurity.com/advisories/publish-it-buffer-overflow-vulnerability -CVE-2014-0980 - http://www.exploit-db.com/exploits/31461 -CVE-2014-0981 - http://seclists.org/fulldisclosure/2014/Mar/95 -CVE-2014-0981 - http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities -CVE-2014-0981 - http://www.exploit-db.com/exploits/32208 -CVE-2014-0981 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0983 - http://seclists.org/fulldisclosure/2014/Mar/95 -CVE-2014-0983 - http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities -CVE-2014-0983 - http://www.exploit-db.com/exploits/32208 -CVE-2014-0983 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-0984 - http://www.coresecurity.com/advisories/sap-router-password-timing-attack -CVE-2014-0984 - http://www.exploit-db.com/exploits/32919 -CVE-2014-0993 - http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-buffer-overflow -CVE-2014-0993 - http://www.kb.cert.org/vuls/id/646748 -CVE-2014-0994 - http://seclists.org/fulldisclosure/2014/Sep/57 -CVE-2014-0994 - http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-heap-buffer-overflow -CVE-2014-0995 - http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html -CVE-2014-0995 - http://seclists.org/fulldisclosure/2014/Oct/76 -CVE-2014-0995 - http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability -CVE-2014-0997 - http://packetstormsecurity.com/files/130107/Android-WiFi-Direct-Denial-Of-Service.html -CVE-2014-0997 - http://seclists.org/fulldisclosure/2015/Jan/104 -CVE-2014-0997 - https://www.coresecurity.com/advisories/android-wifi-direct-denial-service -CVE-2014-0997 - https://www.exploit-db.com/exploits/35913/ -CVE-2014-0998 - http://seclists.org/fulldisclosure/2015/Jan/107 -CVE-2014-0998 - http://www.coresecurity.com/advisories/freebsd-kernel-multiple-vulnerabilities -CVE-2014-0999 - http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html -CVE-2014-0999 - http://seclists.org/fulldisclosure/2015/May/95 -CVE-2014-0999 - http://www.exploit-db.com/exploits/37114 -CVE-2014-100003 - http://packetstormsecurity.com/files/128668/YourMembers-Blind-SQL-Injection.html -CVE-2014-100005 - http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ -CVE-2014-100008 - http://packetstormsecurity.com/files/125959 -CVE-2014-100009 - http://packetstormsecurity.com/files/125959 -CVE-2014-10001 - http://packetstormsecurity.com/files/124755 -CVE-2014-100014 - http://www.exploit-db.com/exploits/31763 -CVE-2014-100015 - http://packetstormsecurity.com/files/125361 -CVE-2014-100015 - http://www.exploit-db.com/exploits/32163 -CVE-2014-100016 - http://packetstormsecurity.com/files/124986/WordPress-Photocrati-Cross-Site-Scripting.html -CVE-2014-100017 - http://packetstormsecurity.com/files/128179/PhpOnlineChat-3.0-Cross-Site-Scripting.html -CVE-2014-100018 - https://security.dxw.com/advisories/xss-in-unconfirmed-1-2-3/ -CVE-2014-100020 - http://www.exploit-db.com/exploits/31140 -CVE-2014-100022 - https://security.dxw.com/advisories/admin-xss-and-sqli-in-mtouch-quiz-3-0-6/ -CVE-2014-100023 - https://security.dxw.com/advisories/admin-xss-and-sqli-in-mtouch-quiz-3-0-6/ -CVE-2014-100025 - http://packetstormsecurity.com/files/125379 -CVE-2014-100027 - https://github.com/getusedtoit/wp-slimstat/issues/3 -CVE-2014-100028 - http://packetstormsecurity.com/files/124682 -CVE-2014-100029 - http://packetstormsecurity.com/files/125464 -CVE-2014-10003 - http://packetstormsecurity.com/files/124918 -CVE-2014-100030 - http://packetstormsecurity.com/files/125464 -CVE-2014-100031 - http://packetstormsecurity.com/files/125464 -CVE-2014-100032 - http://packetstormsecurity.com/files/128213/Airties-Air6372SO-Modem-Web-Interface-Cross-Site-Scripting.html -CVE-2014-100036 - https://www.netsparker.com/critical-xss-vulnerabilities-in-flatpress/ -CVE-2014-100037 - https://www.netsparker.com/xss-vulnerability-in-storytlr/ -CVE-2014-100038 - https://www.netsparker.com/critical-xss-vulnerabilities-in-storytlr/ -CVE-2014-10004 - http://packetstormsecurity.com/files/124918 -CVE-2014-10005 - http://packetstormsecurity.com/files/124918 -CVE-2014-10006 - http://packetstormsecurity.com/files/124918 -CVE-2014-10007 - https://www.netsparker.com/critical-xss-vulnerabilities-in-maian-weblog/ -CVE-2014-10008 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5169.php -CVE-2014-10009 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5169.php -CVE-2014-10010 - http://packetstormsecurity.com/files/124755 -CVE-2014-10011 - http://packetstormsecurity.com/files/129262/TRENDnet-SecurView-Wireless-Network-Camera-TV-IP422WN-Buffer-Overflow.html -CVE-2014-10011 - http://www.zeroscience.mk/codes/trendnet_bof.txt -CVE-2014-10011 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5211.php -CVE-2014-10012 - http://packetstormsecurity.com/files/129035/Another-WordPress-Classifieds-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-10013 - http://packetstormsecurity.com/files/129035/Another-WordPress-Classifieds-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-10013 - http://www.exploit-db.com/exploits/35204 -CVE-2014-10014 - http://packetstormsecurity.com/files/124753/eventbookingcalendar-xssxsrfsql.txt -CVE-2014-10015 - http://packetstormsecurity.com/files/124753/eventbookingcalendar-xssxsrfsql.txt -CVE-2014-10016 - http://packetstormsecurity.com/files/125513 -CVE-2014-10017 - http://packetstormsecurity.com/files/125513 -CVE-2014-10020 - http://packetstormsecurity.com/files/124914 -CVE-2014-10020 - http://www.exploit-db.com/exploits/31142 -CVE-2014-10023 - http://packetstormsecurity.com/files/125007 -CVE-2014-10029 - http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html -CVE-2014-10029 - http://seclists.org/fulldisclosure/2014/Nov/73 -CVE-2014-10033 - http://www.exploit-db.com/exploits/31515 -CVE-2014-10033 - http://www.secgeek.net/oscommerce-v2x-sql-injection-vulnerability/ -CVE-2014-10034 - http://packetstormsecurity.com/files/125480 -CVE-2014-10034 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5170.php -CVE-2014-10035 - http://packetstormsecurity.com/files/125480 -CVE-2014-10035 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5170.php -CVE-2014-10036 - https://www.netsparker.com/critical-xss-vulnerabilities-in-teamcity/ -CVE-2014-10038 - http://packetstormsecurity.com/files/124801 -CVE-2014-10039 - http://www.securityfocus.com/bid/103671 -CVE-2014-10043 - http://www.securityfocus.com/bid/103671 -CVE-2014-10044 - http://www.securityfocus.com/bid/103671 -CVE-2014-10045 - http://www.securityfocus.com/bid/103671 -CVE-2014-10046 - http://www.securityfocus.com/bid/103671 -CVE-2014-10047 - http://www.securityfocus.com/bid/103671 -CVE-2014-10048 - http://www.securityfocus.com/bid/103671 -CVE-2014-10050 - http://www.securityfocus.com/bid/103671 -CVE-2014-10051 - http://www.securityfocus.com/bid/103671 -CVE-2014-10052 - http://www.securityfocus.com/bid/103671 -CVE-2014-10053 - http://www.securityfocus.com/bid/103671 -CVE-2014-10054 - http://www.securityfocus.com/bid/103671 -CVE-2014-10055 - http://www.securityfocus.com/bid/103671 -CVE-2014-10056 - http://www.securityfocus.com/bid/103671 -CVE-2014-10057 - http://www.securityfocus.com/bid/103671 -CVE-2014-10058 - http://www.securityfocus.com/bid/103671 -CVE-2014-10059 - http://www.securityfocus.com/bid/103671 -CVE-2014-10062 - http://www.securityfocus.com/bid/103671 -CVE-2014-10063 - http://www.securityfocus.com/bid/103671 -CVE-2014-10074 - http://issues.umbraco.org/issue/U4-5901 -CVE-2014-10076 - http://www.vapidlabs.com/advisory.php?v=81 -CVE-2014-10078 - https://www.exploit-db.com/exploits/46549/ -CVE-2014-10079 - https://packetstormsecurity.com/files/127786/Vembu-Backup-Disaster-Recovery-6.1-Follow-Up.html -CVE-2014-10079 - https://www.exploit-db.com/exploits/46549/ -CVE-2014-10377 - https://wpvulndb.com/vulnerabilities/9812 -CVE-2014-10392 - https://wpvulndb.com/vulnerabilities/9621 -CVE-2014-10396 - https://packetstormsecurity.com/files/128186/ -CVE-2014-10397 - https://packetstormsecurity.com/files/128188/ -CVE-2014-10398 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt -CVE-2014-10401 - https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a -CVE-2014-10401 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014 -CVE-2014-1201 - https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-report.txt -CVE-2014-1201 - https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-testcase.html -CVE-2014-1202 - http://baraktawily.blogspot.com/2014/01/soapui-code-execution-vulnerability-cve.html -CVE-2014-1202 - http://packetstormsecurity.com/files/124773/SoapUI-Remote-Code-Execution.html -CVE-2014-1202 - http://www.exploit-db.com/exploits/30908 -CVE-2014-1202 - http://www.youtube.com/watch?v=3lCLE64rsc0 -CVE-2014-1204 - http://www.exploit-db.com/exploits/31578 -CVE-2014-1206 - http://www.exploit-db.com/exploits/31738 -CVE-2014-1213 - http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html -CVE-2014-1213 - http://seclists.org/fulldisclosure/2014/Feb/1 -CVE-2014-1224 - http://seclists.org/fulldisclosure/2014/Mar/389 -CVE-2014-1224 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration -CVE-2014-1226 - http://seclists.org/fulldisclosure/2014/Jun/12 -CVE-2014-1237 - http://packetstormsecurity.com/files/125062 -CVE-2014-125026 - https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898 -CVE-2014-125029 - https://vuldb.com/?id.217150 -CVE-2014-125033 - https://vuldb.com/?id.217178 -CVE-2014-125035 - https://github.com/mrbobbybryant/Jobs-Plugin/commit/b8a56718b1d42834c6ec51d9c489c5dc20471d7b -CVE-2014-125049 - https://vuldb.com/?id.217560 -CVE-2014-125082 - https://github.com/nivit/redports/commit/fc2c1ea1b8d795094abb15ac73cab90830534e04 -CVE-2014-125087 - https://github.com/jmurty/java-xmlbuilder/issues/6 -CVE-2014-1359 - http://packetstormsecurity.com/files/167630/launchd-Heap-Corruption.html -CVE-2014-1372 - https://code.google.com/p/google-security-research/issues/detail?id=18 -CVE-2014-1401 - http://packetstormsecurity.com/files/125079 -CVE-2014-1402 - http://openwall.com/lists/oss-security/2014/01/10/2 -CVE-2014-1402 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 -CVE-2014-1403 - http://seclists.org/fulldisclosure/2014/Feb/5 -CVE-2014-1409 - http://seclists.org/fulldisclosure/2014/Apr/21 -CVE-2014-1409 - https://packetstormsecurity.com/files/cve/CVE-2014-1409 -CVE-2014-1438 - http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/ -CVE-2014-1438 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2014-1441 - http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html -CVE-2014-1441 - http://seclists.org/fulldisclosure/2014/Feb/39 -CVE-2014-1442 - http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html -CVE-2014-1442 - http://seclists.org/fulldisclosure/2014/Feb/39 -CVE-2014-1443 - http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html -CVE-2014-1443 - http://seclists.org/fulldisclosure/2014/Feb/39 -CVE-2014-1446 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2014-1449 - http://browser-shredders.blogspot.com/2014/01/cve-2014-1449-maxthon-cloud-browser-for.html -CVE-2014-1455 - http://www.securityfocus.com/bid/66689 -CVE-2014-1457 - https://www.secureworks.com/research/swrx-2014-006 -CVE-2014-1459 - http://packetstormsecurity.com/files/125078 -CVE-2014-1459 - http://www.exploit-db.com/exploits/31521 -CVE-2014-1466 - http://packetstormsecurity.com/files/124724/cspmysql-sql.txt -CVE-2014-1477 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1478 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1479 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1479 - https://bugzilla.mozilla.org/show_bug.cgi?id=911864 -CVE-2014-1480 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1480 - https://bugzilla.mozilla.org/show_bug.cgi?id=916726 -CVE-2014-1481 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1482 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1483 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1483 - https://bugzilla.mozilla.org/show_bug.cgi?id=950427 -CVE-2014-1484 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1485 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1486 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1486 - https://bugzilla.mozilla.org/show_bug.cgi?id=942164 -CVE-2014-1487 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1488 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1489 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1490 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-1490 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-1491 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-1491 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-1492 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-1492 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-1493 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1494 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1496 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1496 - https://bugzilla.mozilla.org/show_bug.cgi?id=925747 -CVE-2014-1497 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1498 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1499 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1500 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1500 - https://bugzilla.mozilla.org/show_bug.cgi?id=956524 -CVE-2014-1501 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1502 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1504 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1504 - https://bugzilla.mozilla.org/show_bug.cgi?id=911547 -CVE-2014-1505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1506 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1507 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1508 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1509 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1510 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1510 - https://bugzilla.mozilla.org/show_bug.cgi?id=982906 -CVE-2014-1511 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1512 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1512 - https://bugzilla.mozilla.org/show_bug.cgi?id=982957 -CVE-2014-1513 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1513 - https://bugzilla.mozilla.org/show_bug.cgi?id=982974 -CVE-2014-1514 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1516 - http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/ -CVE-2014-1517 - https://bugzilla.mozilla.org/show_bug.cgi?id=713926 -CVE-2014-1518 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1519 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1520 - http://packetstormsecurity.com/files/161696/Mozilla-Arbitrary-Code-Execution-Privilege-Escalation.html -CVE-2014-1520 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1520 - https://bugzilla.mozilla.org/show_bug.cgi?id=961676 -CVE-2014-1522 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1522 - https://bugzilla.mozilla.org/show_bug.cgi?id=995289 -CVE-2014-1523 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1524 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1525 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1526 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1527 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1528 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1528 - https://bugzilla.mozilla.org/show_bug.cgi?id=963962 -CVE-2014-1529 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1530 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1531 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1532 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1533 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1534 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1002340 -CVE-2014-1536 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1537 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1538 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1539 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1539 - https://bugzilla.mozilla.org/show_bug.cgi?id=995603 -CVE-2014-1540 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1541 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1542 - http://www.mozilla.org/security/announce/2014/mfsa2014-53.html -CVE-2014-1542 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1542 - https://bugzilla.mozilla.org/show_bug.cgi?id=991533 -CVE-2014-1543 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1543 - https://bugzilla.mozilla.org/show_bug.cgi?id=1011859 -CVE-2014-1544 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1544 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-1545 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1545 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-1546 - https://bugzilla.mozilla.org/show_bug.cgi?id=1036213 -CVE-2014-1547 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1547 - https://bugzilla.mozilla.org/show_bug.cgi?id=1012694 -CVE-2014-1547 - https://bugzilla.mozilla.org/show_bug.cgi?id=1019684 -CVE-2014-1548 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1002702 -CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020008 -CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020041 -CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1021240 -CVE-2014-1549 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1549 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020205 -CVE-2014-1550 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1550 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020411 -CVE-2014-1551 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1551 - https://bugzilla.mozilla.org/show_bug.cgi?id=1018234 -CVE-2014-1552 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1553 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1553 - https://bugzilla.mozilla.org/show_bug.cgi?id=1022945 -CVE-2014-1554 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1555 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1556 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1557 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1559 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1561 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1561 - https://bugzilla.mozilla.org/show_bug.cgi?id=910375 -CVE-2014-1562 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1563 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1563 - https://bugzilla.mozilla.org/show_bug.cgi?id=1018524 -CVE-2014-1564 - http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html -CVE-2014-1564 - http://seclists.org/fulldisclosure/2014/Sep/18 -CVE-2014-1564 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1564 - https://bugzilla.mozilla.org/show_bug.cgi?id=1045977 -CVE-2014-1565 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1565 - https://bugzilla.mozilla.org/show_bug.cgi?id=1047831 -CVE-2014-1566 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1567 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1568 - http://www.kb.cert.org/vuls/id/772676 -CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-1568 - https://bugzilla.mozilla.org/show_bug.cgi?id=1064636 -CVE-2014-1568 - https://bugzilla.mozilla.org/show_bug.cgi?id=1069405 -CVE-2014-1569 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1569 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-1569 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-1569 - https://bugzilla.mozilla.org/show_bug.cgi?id=1064670 -CVE-2014-1569 - https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02 -CVE-2014-1571 - http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html -CVE-2014-1572 - http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html -CVE-2014-1572 - http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/ -CVE-2014-1572 - https://bugzilla.mozilla.org/show_bug.cgi?id=1074812 -CVE-2014-1573 - http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html -CVE-2014-1573 - http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/ -CVE-2014-1573 - https://bugzilla.mozilla.org/show_bug.cgi?id=1075578 -CVE-2014-1574 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1575 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1576 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1576 - https://bugzilla.mozilla.org/show_bug.cgi?id=1041512 -CVE-2014-1577 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1578 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1578 - https://bugzilla.mozilla.org/show_bug.cgi?id=1063327 -CVE-2014-1580 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1581 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1581 - https://bugzilla.mozilla.org/show_bug.cgi?id=1068218 -CVE-2014-1582 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1583 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1584 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1585 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1586 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1587 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1587 - https://bugzilla.mozilla.org/show_bug.cgi?id=1072847 -CVE-2014-1588 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1588 - https://bugzilla.mozilla.org/show_bug.cgi?id=1026037 -CVE-2014-1588 - https://bugzilla.mozilla.org/show_bug.cgi?id=1075546 -CVE-2014-1588 - https://bugzilla.mozilla.org/show_bug.cgi?id=1096026 -CVE-2014-1589 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1590 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1591 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1591 - https://bugzilla.mozilla.org/show_bug.cgi?id=1069762 -CVE-2014-1592 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1592 - https://bugzilla.mozilla.org/show_bug.cgi?id=1088635 -CVE-2014-1593 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1594 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-1595 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-1595 - http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/ -CVE-2014-1595 - https://bugzilla.mozilla.org/show_bug.cgi?id=1092855 -CVE-2014-1603 - http://seclists.org/fulldisclosure/2014/May/53 -CVE-2014-1604 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263 -CVE-2014-1610 - http://www.exploit-db.com/exploits/31329/ -CVE-2014-1610 - https://bugzilla.wikimedia.org/show_bug.cgi?id=60339 -CVE-2014-1611 - http://packetstormsecurity.com/files/124803/Drupal-Anonymous-Posting-7.x-Cross-Site-Scripting.html -CVE-2014-1612 - http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html -CVE-2014-1612 - http://www.kb.cert.org/vuls/id/252294 -CVE-2014-1617 - https://packetstormsecurity.com/files/cve/CVE-2014-1617 -CVE-2014-1618 - http://packetstormsecurity.com/files/124723/uaepdshopping-sql.txt -CVE-2014-1619 - http://packetstormsecurity.com/files/124652 -CVE-2014-1620 - http://packetstormsecurity.com/files/124681/Hiox-Guest-Book-5.0-Cross-Site-Scripting.html -CVE-2014-1635 - https://labs.integrity.pt/advisories/cve-2014-1635/ -CVE-2014-1636 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html -CVE-2014-1637 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html -CVE-2014-1648 - http://seclists.org/fulldisclosure/2014/Apr/256 -CVE-2014-1665 - https://packetstormsecurity.com/files/125086 -CVE-2014-1665 - https://www.exploit-db.com/exploits/31427/ -CVE-2014-1670 - http://www.youtube.com/watch?v=_j1RKtTxZ3k -CVE-2014-1673 - http://packetstormsecurity.com/files/124967 -CVE-2014-1673 - http://seclists.org/fulldisclosure/2014/Jan/185 -CVE-2014-1677 - http://seclists.org/fulldisclosure/2016/Jul/67 -CVE-2014-1677 - http://www.exploit-db.com/exploits/31894 -CVE-2014-1677 - https://packetstormsecurity.com/files/125388 -CVE-2014-1680 - http://packetstormsecurity.com/files/125059 -CVE-2014-1683 - http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html -CVE-2014-1683 - http://seclists.org/fulldisclosure/2014/Jan/159 -CVE-2014-1683 - http://www.exploit-db.com/exploits/31183 -CVE-2014-1684 - https://trac.videolan.org/vlc/ticket/10482 -CVE-2014-1686 - https://packetstormsecurity.com/files/125682 -CVE-2014-1690 - http://www.ubuntu.com/usn/USN-2140-1 -CVE-2014-1695 - http://adamziaja.com/poc/201401-xss-otrs.html -CVE-2014-1695 - http://packetstormsecurity.com/files/131654/OTRS-3.x-Cross-Site-Scripting.html -CVE-2014-1695 - https://www.exploit-db.com/exploits/36842/ -CVE-2014-1737 - http://www.openwall.com/lists/oss-security/2014/05/09/2 -CVE-2014-1738 - http://www.openwall.com/lists/oss-security/2014/05/09/2 -CVE-2014-1739 - http://speirofr.appspot.com/cve-2014-1739-kernel-infoleak-vulnerability-in-media_enum_entities.html -CVE-2014-1739 - http://www.openwall.com/lists/oss-security/2014/06/15/1 -CVE-2014-1750 - http://seclists.org/oss-sec/2014/q1/173 -CVE-2014-1757 - http://www.kb.cert.org/vuls/id/882841 -CVE-2014-1767 - https://www.exploit-db.com/exploits/39446/ -CVE-2014-1767 - https://www.exploit-db.com/exploits/39525/ -CVE-2014-1770 - https://www.corelan.be/index.php/2014/05/22/on-cve-2014-1770-zdi-14-140-internet-explorer-8-0day/ -CVE-2014-1776 - http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ -CVE-2014-1785 - http://packetstormsecurity.com/files/140233/Microsoft-Internet-Explorer-11-MSHTML-CSpliceTreeEngine-RemoveSplice-Use-After-Free.html -CVE-2014-1785 - https://www.exploit-db.com/exploits/40946/ -CVE-2014-1826 - http://www.madirish.net/559 -CVE-2014-1827 - http://www.madirish.net/559 -CVE-2014-1828 - http://www.madirish.net/559 -CVE-2014-1833 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737160 -CVE-2014-1836 - http://seclists.org/fulldisclosure/2014/Feb/14 -CVE-2014-1836 - https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt -CVE-2014-1840 - http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/ -CVE-2014-1840 - http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html -CVE-2014-1849 - http://seclists.org/fulldisclosure/2014/May/35 -CVE-2014-1854 - http://www.exploit-db.com/exploits/31834 -CVE-2014-1855 - http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html -CVE-2014-1860 - http://www.openwall.com/lists/oss-security/2014/02/03/14 -CVE-2014-1860 - https://packetstormsecurity.com/files/cve/CVE-2014-1860 -CVE-2014-1860 - https://www.exploit-database.net/?id=21609 -CVE-2014-1861 - http://blog.quaji.com/2014/02/remote-code-execution-on-all-enterprise.html -CVE-2014-1874 - http://www.ubuntu.com/usn/USN-2136-1 -CVE-2014-1874 - http://www.ubuntu.com/usn/USN-2140-1 -CVE-2014-1876 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-1877 - http://seclists.org/oss-sec/2014/q1/258 -CVE-2014-1881 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt -CVE-2014-1881 - http://seclists.org/bugtraq/2014/Jan/96 -CVE-2014-1881 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1882 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt -CVE-2014-1882 - http://seclists.org/bugtraq/2014/Jan/96 -CVE-2014-1882 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1883 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt -CVE-2014-1883 - http://seclists.org/bugtraq/2014/Jan/96 -CVE-2014-1883 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1884 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt -CVE-2014-1884 - http://seclists.org/bugtraq/2014/Jan/96 -CVE-2014-1884 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1885 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1886 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1887 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf -CVE-2014-1888 - http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html -CVE-2014-1903 - http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html -CVE-2014-1903 - http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html -CVE-2014-1906 - http://packetstormsecurity.com/files/125454 -CVE-2014-1907 - http://packetstormsecurity.com/files/125454 -CVE-2014-1912 - http://bugs.python.org/issue20246 -CVE-2014-1912 - http://pastebin.com/raw.php?i=GHXSmNEg -CVE-2014-1912 - http://www.exploit-db.com/exploits/31875 -CVE-2014-1912 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2014-1912 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-1914 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html -CVE-2014-1915 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html -CVE-2014-1963 - https://erpscan.io/advisories/erpscan-14-001-sap-netweaver-message-server-dos/ -CVE-2014-2008 - http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-Information-Disclosure-SQL-Injection.html -CVE-2014-2008 - http://seclists.org/fulldisclosure/2014/Sep/23 -CVE-2014-2008 - http://www.exploit-db.com/exploits/34586 -CVE-2014-2009 - http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-Information-Disclosure-SQL-Injection.html -CVE-2014-2009 - http://seclists.org/fulldisclosure/2014/Sep/23 -CVE-2014-2009 - http://www.exploit-db.com/exploits/34586 -CVE-2014-2013 - http://bugs.ghostscript.com/show_bug.cgi?id=694957 -CVE-2014-2013 - http://seclists.org/fulldisclosure/2014/Jan/130 -CVE-2014-2013 - http://www.exploit-db.com/exploits/31090 -CVE-2014-2018 - http://www.kb.cert.org/vuls/id/863369 -CVE-2014-2018 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-2018 - http://www.vulnerability-lab.com/get_content.php?id=953 -CVE-2014-2018 - https://bugzilla.mozilla.org/show_bug.cgi?id=875818 -CVE-2014-2020 - https://bugs.php.net/bug.php?id=66356 -CVE-2014-2021 - http://packetstormsecurity.com/files/128691/vBulletin-5.x-4.x-Persistent-Cross-Site-Scripting.html -CVE-2014-2021 - http://seclists.org/fulldisclosure/2014/Oct/55 -CVE-2014-2021 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2021 -CVE-2014-2022 - http://packetstormsecurity.com/files/128696/vBulletin-4.x-SQL-Injection.html -CVE-2014-2022 - http://seclists.org/fulldisclosure/2014/Oct/56 -CVE-2014-2022 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2022 -CVE-2014-2023 - http://packetstormsecurity.com/files/128854/vBulletin-4.x-Tapatalk-Blind-SQL-Injection.html -CVE-2014-2023 - http://seclists.org/fulldisclosure/2014/Oct/57 -CVE-2014-2023 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2023 -CVE-2014-2024 - https://github.com/open-classifieds/openclassifieds2/issues/556 -CVE-2014-2025 - http://www.christian-schneider.net/advisories/CVE-2014-2025.txt -CVE-2014-2026 - http://packetstormsecurity.com/files/129590/Intrexx-Professional-6.0-5.2-Cross-Site-Scripting.html -CVE-2014-2026 - http://www.christian-schneider.net/advisories/CVE-2014-2026.txt -CVE-2014-2027 - http://openwall.com/lists/oss-security/2014/02/19/10 -CVE-2014-2027 - http://openwall.com/lists/oss-security/2014/02/19/4 -CVE-2014-2034 - https://support.sonatype.com/entries/42374566-CVE-2014-2034-Nexus-Security-Advisory-REST-API -CVE-2014-2038 - http://www.ubuntu.com/usn/USN-2140-1 -CVE-2014-2040 - http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/index.html -CVE-2014-2044 - http://packetstormsecurity.com/files/125585/ownCloud-4.0.x-4.5.x-Remote-Code-Execution.html -CVE-2014-2044 - http://www.exploit-db.com/exploits/32162 -CVE-2014-2045 - http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html -CVE-2014-2045 - https://www.exploit-db.com/exploits/39407/ -CVE-2014-2072 - http://packetstormsecurity.com/files/125308/Catia-V5-6R2013-Stack-Buffer-Overflow.html -CVE-2014-2073 - http://packetstormsecurity.com/files/125325/Catia-V5-6R2013-Stack-Buffer-Overflow.html -CVE-2014-2075 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-2081 - http://packetstormsecurity.com/files/127997/VTLS-Virtua-SQL-Injection.html -CVE-2014-2087 - http://seclists.org/fulldisclosure/2014/Mar/137 -CVE-2014-2087 - https://www.rcesecurity.com/2014/03/cve-2014-2087-free-download-manager-cdownloads_deleted-updatedownload-remote-code-execution -CVE-2014-2088 - http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html -CVE-2014-2089 - http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html -CVE-2014-2090 - http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html -CVE-2014-2091 - http://packetstormsecurity.com/files/125348/ATutor-2.1.1-Cross-Site-Scripting.html -CVE-2014-2092 - http://packetstormsecurity.com/files/125353/CMSMadeSimple-1.11.10-Cross-Site-Scripting.html -CVE-2014-2132 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex -CVE-2014-2133 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex -CVE-2014-2134 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex -CVE-2014-2135 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex -CVE-2014-2136 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex -CVE-2014-2177 - http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html -CVE-2014-2177 - http://seclists.org/fulldisclosure/2014/Nov/6 -CVE-2014-2178 - http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html -CVE-2014-2178 - http://seclists.org/fulldisclosure/2014/Nov/6 -CVE-2014-2179 - http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html -CVE-2014-2179 - http://seclists.org/fulldisclosure/2014/Nov/6 -CVE-2014-2198 - http://www.securityfocus.com/bid/68334 -CVE-2014-2206 - http://www.rcesecurity.com/2014/03/cve-2014-2206-getgo-download-manager-http-response-header-buffer-overflow-remote-code-execution -CVE-2014-2223 - http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html -CVE-2014-2225 - http://seclists.org/fulldisclosure/2014/Jul/126 -CVE-2014-2225 - http://sethsec.blogspot.com/2014/07/cve-2014-2225.html -CVE-2014-2226 - http://packetstormsecurity.com/files/127616/Ubiquiti-UbiFi-Controller-2.4.5-Password-Hash-Disclosure.html -CVE-2014-2226 - http://seclists.org/fulldisclosure/2014/Jul/127 -CVE-2014-2226 - http://sethsec.blogspot.com/2014/07/cve-2014-2226.html -CVE-2014-2227 - http://seclists.org/fulldisclosure/2014/Jul/128 -CVE-2014-2227 - http://sethsec.blogspot.com/2014/07/cve-2014-2227.html -CVE-2014-2230 - http://packetstormsecurity.com/files/128718/OpenX-2.8.10-Open-Redirect.html -CVE-2014-2230 - http://seclists.org/fulldisclosure/2014/Oct/72 -CVE-2014-2232 - http://www.christian-schneider.net/advisories/CVE-2014-2232.txt -CVE-2014-2233 - http://www.christian-schneider.net/advisories/CVE-2014-2233.txt -CVE-2014-2242 - https://bugzilla.wikimedia.org/show_bug.cgi?id=60771 -CVE-2014-2249 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf -CVE-2014-2250 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf -CVE-2014-2252 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf -CVE-2014-2254 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf -CVE-2014-2256 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf -CVE-2014-2258 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf -CVE-2014-2260 - http://packetstormsecurity.com/files/124804/Ajenti-1.2.13-Cross-Site-Scripting.html -CVE-2014-2265 - http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/ -CVE-2014-2274 - https://security.dxw.com/advisories/stored-xss-and-csrf-vulnerabilities-in-subscribe-to-comments-reloaded-140129/ -CVE-2014-2278 - http://packetstormsecurity.com/files/125726 -CVE-2014-2279 - http://packetstormsecurity.com/files/125726 -CVE-2014-2280 - http://packetstormsecurity.com/files/125726 -CVE-2014-2299 - http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html -CVE-2014-2301 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-003/-metadata-information-disclosure-in-orbiteam-bscw -CVE-2014-2302 - http://packetstormsecurity.com/files/126861/webEdition-CMS-2.8.0.0-Remote-Command-Execution.html -CVE-2014-2302 - http://seclists.org/fulldisclosure/2014/May/147 -CVE-2014-2302 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-004 -CVE-2014-2303 - http://packetstormsecurity.com/files/126862/webEdition-CMS-6.3.8.0-svn6985-SQL-Injection.html -CVE-2014-2303 - http://seclists.org/fulldisclosure/2014/May/148 -CVE-2014-2303 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-005/-sql-injection-in-webedition-cms-file-browser -CVE-2014-2315 - http://packetstormsecurity.com/files/125397 -CVE-2014-2318 - http://packetstormsecurity.com/files/125507 -CVE-2014-2322 - http://www.openwall.com/lists/oss-security/2014/03/10/8 -CVE-2014-2322 - http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html -CVE-2014-2325 - http://seclists.org/fulldisclosure/2014/Mar/110 -CVE-2014-2326 - http://packetstormsecurity.com/files/125849/Deutsche-Telekom-CERT-Advisory-DTC-A-20140324-001.html -CVE-2014-2341 - http://www.exploit-db.com/exploits/32830 -CVE-2014-2364 - http://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html -CVE-2014-2382 - http://packetstormsecurity.com/files/129172/Faronics-Deep-Freeze-Arbitrary-Code-Execution.html -CVE-2014-2383 - https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce -CVE-2014-2384 - http://seclists.org/fulldisclosure/2014/Apr/163 -CVE-2014-2385 - http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html -CVE-2014-2388 - http://packetstormsecurity.com/files/127850 -CVE-2014-2388 - http://packetstormsecurity.com/files/127850/BlackBerry-Z10-Authentication-Bypass.html -CVE-2014-2388 - http://www.modzero.ch/advisories/MZ-13-04-Blackberry_Z10-File-Exchange-Authentication-By-Pass.txt -CVE-2014-2397 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2398 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2399 - http://packetstormsecurity.com/files/127222/Endeca-Latitude-2.2.2-Cross-Site-Request-Forgery.html -CVE-2014-2399 - http://seclists.org/fulldisclosure/2014/Jun/123 -CVE-2014-2399 - http://www.exploit-db.com/exploits/33897 -CVE-2014-2399 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2400 - http://packetstormsecurity.com/files/127223/Endeca-Latitude-2.2.2-Cross-Site-Scripting.html -CVE-2014-2400 - http://seclists.org/fulldisclosure/2014/Jun/124 -CVE-2014-2400 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2401 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2402 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2403 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2404 - http://packetstormsecurity.com/files/127047/Oracle-Access-Manager-Information-Disclosure.html -CVE-2014-2404 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2406 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2407 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2408 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2409 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2410 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2411 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2412 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2413 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2414 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2415 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2416 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2417 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2418 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2419 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2419 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2420 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2421 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2422 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2423 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2424 - http://packetstormsecurity.com/files/127365/Oracle-Event-Processing-FileUploadServlet-Arbitrary-File-Upload.html -CVE-2014-2424 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2425 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2426 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2427 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2428 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2429 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2430 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2430 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2431 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2431 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2432 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2432 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2433 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2434 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2435 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2436 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2436 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2437 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2438 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2439 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2440 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2440 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2441 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2442 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2443 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2444 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2445 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2446 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2447 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2448 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2449 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2450 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2451 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2452 - http://packetstormsecurity.com/files/127047/Oracle-Access-Manager-Information-Disclosure.html -CVE-2014-2452 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2453 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2454 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2455 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2456 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2456 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2456 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2457 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2458 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2459 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2460 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2461 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2463 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2464 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2465 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2466 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2467 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2468 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2470 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2471 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -CVE-2014-2472 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2473 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2474 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2475 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2476 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2477 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2477 - http://www.exploit-db.com/exploits/34333 -CVE-2014-2477 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2477 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2478 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2479 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2479 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2479 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2480 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2480 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2480 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2481 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2481 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2481 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2482 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2482 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2482 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2483 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2483 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2483 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2484 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2484 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2484 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2485 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2485 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2485 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2486 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2486 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2486 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2487 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2487 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2487 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2488 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2488 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2488 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2489 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2489 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2489 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2490 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2490 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2490 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2491 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2491 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2491 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2492 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2492 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2492 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2493 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2493 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2493 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2494 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2494 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2494 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2494 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2495 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2495 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2495 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2496 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-2496 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-2496 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-2497 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-2497 - https://bugs.php.net/bug.php?id=66901 -CVE-2014-2497 - https://bugzilla.redhat.com/show_bug.cgi?id=1076676 -CVE-2014-2502 - http://packetstormsecurity.com/files/126897/RSA-Adaptive-Authentication-Cross-Site-Scripting.html -CVE-2014-2503 - http://packetstormsecurity.com/files/126947/EMC-Documentum-Digital-Asset-Manager-Blind-DQL-Injection.html -CVE-2014-2506 - http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html -CVE-2014-2507 - http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html -CVE-2014-2508 - http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html -CVE-2014-2509 - http://packetstormsecurity.com/files/127301/EMC-Network-Configuration-Manager-NCM-Session-Fixation.html -CVE-2014-2512 - http://packetstormsecurity.com/files/127309/EMC-Documentum-eRoom-Cross-Site-Scripting.html -CVE-2014-2512 - http://packetstormsecurity.com/files/127321/EMC-Documentum-eRoom-Stored-Cross-Site-Scripting.html -CVE-2014-2512 - http://seclists.org/fulldisclosure/2014/Jul/0 -CVE-2014-2526 - http://packetstormsecurity.com/files/125766 -CVE-2014-2531 - http://www.exploit-db.com/exploits/32516 -CVE-2014-2532 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2014-2532 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-2532 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-2533 - http://seclists.org/bugtraq/2014/Mar/66 -CVE-2014-2533 - http://seclists.org/fulldisclosure/2014/Mar/98 -CVE-2014-2533 - https://www.exploit-db.com/exploits/45575/ -CVE-2014-2534 - http://seclists.org/bugtraq/2014/Mar/66 -CVE-2014-2534 - http://seclists.org/fulldisclosure/2014/Mar/98 -CVE-2014-2540 - http://www.exploit-db.com/exploits/32792 -CVE-2014-2541 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-2542 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-2543 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-2544 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-2545 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-2550 - https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/ -CVE-2014-2558 - http://seclists.org/fulldisclosure/2014/Apr/305 -CVE-2014-2559 - http://packetstormsecurity.com/files/126134 -CVE-2014-2559 - http://seclists.org/fulldisclosure/2014/Apr/172 -CVE-2014-2559 - https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 -CVE-2014-2560 - https://seclists.org/bugtraq/2014/Mar/185 -CVE-2014-2570 - http://codalabs.net/cla-2014-001 -CVE-2014-2575 - http://packetstormsecurity.com/files/126953/DevExpress-ASP.NET-File-Manager-13.2.8-Directory-Traversal.html -CVE-2014-2575 - http://seclists.org/fulldisclosure/2014/Jun/24 -CVE-2014-2575 - http://www.exploit-db.com/exploits/33700 -CVE-2014-2575 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-006/-directory-traversal-in-devexpress-asp-net-file-manager -CVE-2014-2577 - http://packetstormsecurity.com/files/126907/Transform-Foundation-Server-4.3.1-5.2-Cross-Site-Scripting.html -CVE-2014-2577 - http://seclists.org/fulldisclosure/2014/Jun/15 -CVE-2014-2586 - http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html -CVE-2014-2587 - http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html -CVE-2014-2588 - http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html -CVE-2014-2589 - http://www.vulnerability-lab.com/get_content.php?id=1100 -CVE-2014-2595 - http://packetstormsecurity.com/files/127740/Barracuda-WAF-Authentication-Bypass.html -CVE-2014-2595 - http://seclists.org/fulldisclosure/2014/Aug/5 -CVE-2014-2595 - https://www.exploit-db.com/exploits/39278 -CVE-2014-2598 - http://packetstormsecurity.com/files/126127 -CVE-2014-2598 - http://seclists.org/fulldisclosure/2014/Apr/171 -CVE-2014-2598 - http://www.exploit-db.com/exploits/32867 -CVE-2014-2598 - https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/ -CVE-2014-2623 - http://packetstormsecurity.com/files/130658/HP-Data-Protector-8.10-Remote-Command-Execution.html -CVE-2014-2623 - http://www.exploit-db.com/exploits/34066/ -CVE-2014-2623 - http://www.exploit-db.com/exploits/36304 -CVE-2014-2630 - http://packetstormsecurity.com/files/156206/xglance-bin-Local-Root-Privilege-Escalation.html -CVE-2014-2630 - http://packetstormsecurity.com/files/157528/HP-Performance-Monitoring-xglance-Privilege-Escalation.html -CVE-2014-2630 - http://seclists.org/fulldisclosure/2020/Feb/1 -CVE-2014-2640 - http://www.kb.cert.org/vuls/id/125228 -CVE-2014-2647 - http://www.exploit-db.com/exploits/35076 -CVE-2014-2653 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-2665 - https://bugzilla.wikimedia.org/show_bug.cgi?id=62497 -CVE-2014-2668 - http://packetstormsecurity.com/files/125889 -CVE-2014-2669 - https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a -CVE-2014-2671 - http://packetstormsecurity.com/files/125834 -CVE-2014-2671 - http://www.exploit-db.com/exploits/32477/ -CVE-2014-2674 - https://security.dxw.com/advisories/end-user-exploitable-local-file-inclusion-vulnerability-in-ajax-pagination-twitter-style-1-1/ -CVE-2014-2675 - https://security.dxw.com/advisories/csrf-vulnerability-in-wp-html-sitemap-1-2/ -CVE-2014-2710 - http://packetstormsecurity.com/files/136731/Oliver-1.3.0-1.3.1-Cross-Site-Scripting.html -CVE-2014-2710 - http://seclists.org/fulldisclosure/2016/Apr/66 -CVE-2014-2716 - http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html -CVE-2014-2718 - http://packetstormsecurity.com/files/128904/ASUS-Router-Man-In-The-Middle.html -CVE-2014-2718 - http://seclists.org/fulldisclosure/2014/Oct/122 -CVE-2014-2721 - https://fortiguard.com/advisory/FG-IR-14-010 -CVE-2014-2722 - https://fortiguard.com/advisory/FG-IR-14-010 -CVE-2014-2723 - https://fortiguard.com/advisory/FG-IR-14-010 -CVE-2014-2729 - http://packetstormsecurity.com/files/126187/Ektron-CMS-8.7-Cross-Site-Scripting.html -CVE-2014-2734 - http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html -CVE-2014-2734 - http://seclists.org/fulldisclosure/2014/Apr/231 -CVE-2014-2734 - http://seclists.org/fulldisclosure/2014/May/13 -CVE-2014-2734 - https://gist.github.com/emboss/91696b56cd227c8a0c13 -CVE-2014-2734 - https://news.ycombinator.com/item?id=7601973 -CVE-2014-2734 - https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/ -CVE-2014-2815 - http://packetstormsecurity.com/files/164419/Microsoft-Office-OneNote-2007-Remote-Code-Execution.html -CVE-2014-2838 - http://seclists.org/fulldisclosure/2014/Mar/399 -CVE-2014-2838 - https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/ -CVE-2014-2839 - http://seclists.org/fulldisclosure/2014/Mar/399 -CVE-2014-2839 - https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/ -CVE-2014-2843 - http://www.christian-schneider.net/advisories/CVE-2014-2843.txt -CVE-2014-2844 - http://seclists.org/fulldisclosure/2014/Apr/223 -CVE-2014-2846 - http://seclists.org/fulldisclosure/2014/Apr/257 -CVE-2014-2859 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2860 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2861 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2862 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2863 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2864 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2865 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2866 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2867 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2868 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2869 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2870 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2871 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2872 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2873 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2874 - http://www.kb.cert.org/vuls/id/437385 -CVE-2014-2879 - http://seclists.org/fulldisclosure/2014/Mar/409 -CVE-2014-2879 - http://www.vulnerability-lab.com/get_content.php?id=1191 -CVE-2014-2880 - http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html -CVE-2014-2880 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-2906 - https://github.com/fish-shell/fish-shell/issues/1437 -CVE-2014-2908 - https://www.exploit-db.com/exploits/44687/ -CVE-2014-2913 - http://seclists.org/fulldisclosure/2014/Apr/240 -CVE-2014-2913 - http://seclists.org/fulldisclosure/2014/Apr/242 -CVE-2014-2921 - https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt -CVE-2014-2922 - https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt -CVE-2014-2925 - http://seclists.org/fulldisclosure/2014/Apr/59 -CVE-2014-2926 - http://www.kb.cert.org/vuls/id/204988 -CVE-2014-2938 - http://www.kb.cert.org/vuls/id/767044 -CVE-2014-2939 - http://www.kb.cert.org/vuls/id/537684 -CVE-2014-2940 - http://www.kb.cert.org/vuls/id/460687 -CVE-2014-2941 - http://www.kb.cert.org/vuls/id/269991 -CVE-2014-2942 - http://www.kb.cert.org/vuls/id/882207 -CVE-2014-2946 - http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html -CVE-2014-2946 - http://www.kb.cert.org/vuls/id/325636 -CVE-2014-2947 - http://www.kb.cert.org/vuls/id/112412 -CVE-2014-2948 - http://www.kb.cert.org/vuls/id/112412 -CVE-2014-2950 - http://www.kb.cert.org/vuls/id/917348 -CVE-2014-2951 - http://www.kb.cert.org/vuls/id/917348 -CVE-2014-2956 - http://www.kb.cert.org/vuls/id/960193 -CVE-2014-2957 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2014-2962 - http://www.kb.cert.org/vuls/id/774788 -CVE-2014-2962 - https://www.exploit-db.com/exploits/38488/ -CVE-2014-2963 - http://www.kb.cert.org/vuls/id/100972 -CVE-2014-2964 - http://www.kb.cert.org/vuls/id/882207 -CVE-2014-2965 - http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html -CVE-2014-2965 - http://seclists.org/fulldisclosure/2014/Jun/113 -CVE-2014-2966 - http://www.kb.cert.org/vuls/id/162308 -CVE-2014-2968 - http://www.kb.cert.org/vuls/id/688812 -CVE-2014-2969 - http://www.kb.cert.org/vuls/id/143740 -CVE-2014-2974 - http://www.kb.cert.org/vuls/id/867980 -CVE-2014-2975 - http://www.kb.cert.org/vuls/id/867980 -CVE-2014-2994 - http://an7isec.blogspot.co.il/2014/04/pown-noobs-acunetix-0day.html -CVE-2014-2994 - http://osandamalith.wordpress.com/2014/04/24/pwning-script-kiddies-acunetix-buffer-overflow/ -CVE-2014-2994 - http://packetstormsecurity.com/files/126306/Acunetix-8-Stack-Buffer-Overflow.html -CVE-2014-2994 - http://packetstormsecurity.com/files/126307/Acunetix-8-Scanner-Buffer-Overflow.html -CVE-2014-2994 - http://www.exploit-db.com/exploits/32997 -CVE-2014-2994 - https://www.youtube.com/watch?v=RHaMx8K1GeM -CVE-2014-2995 - http://packetstormsecurity.com/files/126134 -CVE-2014-2995 - http://seclists.org/fulldisclosure/2014/Apr/172 -CVE-2014-2995 - https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 -CVE-2014-3004 - http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html -CVE-2014-3004 - http://seclists.org/fulldisclosure/2014/May/142 -CVE-2014-3004 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2014-3004 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2014-3005 - https://support.zabbix.com/browse/ZBX-8151 -CVE-2014-3065 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-3074 - http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html -CVE-2014-3080 - http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html -CVE-2014-3080 - http://seclists.org/fulldisclosure/2014/Jul/113 -CVE-2014-3080 - http://www.exploit-db.com/exploits/34132/ -CVE-2014-3080 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983 -CVE-2014-3081 - http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html -CVE-2014-3081 - http://seclists.org/fulldisclosure/2014/Jul/113 -CVE-2014-3081 - http://www.exploit-db.com/exploits/34132/ -CVE-2014-3081 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983 -CVE-2014-3085 - http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html -CVE-2014-3085 - http://www.exploit-db.com/exploits/34132/ -CVE-2014-3085 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983 -CVE-2014-3088 - http://packetstormsecurity.com/files/127294 -CVE-2014-3088 - http://packetstormsecurity.com/files/127829/IBM-Sametime-Meet-Server-8.5-Arbitrary-File-Upload.html -CVE-2014-3094 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT02593 -CVE-2014-3100 - http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html -CVE-2014-3100 - http://www.slideshare.net/ibmsecurity/android-keystorestackbufferoverflow -CVE-2014-3110 - https://www.exploit-db.com/exploits/44749/ -CVE-2014-3111 - http://seclists.org/fulldisclosure/2014/May/60 -CVE-2014-3115 - http://www.kb.cert.org/vuls/id/902790 -CVE-2014-3120 - https://www.elastic.co/blog/logstash-1-4-3-released -CVE-2014-3120 - https://www.elastic.co/community/security/ -CVE-2014-3127 - http://seclists.org/oss-sec/2014/q2/191 -CVE-2014-3127 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306 -CVE-2014-3135 - http://packetstormsecurity.com/files/126226/vBulletin-5.1-Cross-Site-Scripting.html -CVE-2014-3136 - https://packetstormsecurity.com/files/cve/CVE-2014-3136 -CVE-2014-3138 - http://packetstormsecurity.com/files/126171/Xerox-DocuShare-SQL-Injection.html -CVE-2014-3144 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05ab8f2647e4221cbdb3856dd7d32bd5407316b3 -CVE-2014-3144 - https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 -CVE-2014-3145 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05ab8f2647e4221cbdb3856dd7d32bd5407316b3 -CVE-2014-3145 - https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 -CVE-2014-3146 - http://seclists.org/fulldisclosure/2014/Apr/210 -CVE-2014-3146 - http://seclists.org/fulldisclosure/2014/Apr/319 -CVE-2014-3148 - http://packetstormsecurity.com/files/128338/OKCupid-Cross-Site-Scripting.html -CVE-2014-3149 - http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html -CVE-2014-3149 - http://www.christian-schneider.net/advisories/CVE-2014-3149.txt -CVE-2014-3158 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-3182 - https://code.google.com/p/google-security-research/issues/detail?id=89 -CVE-2014-3187 - https://medium.com/section-9-lab/abusing-ios-url-handlers-on-messages-96979e8b12f5 -CVE-2014-3205 - https://www.exploit-db.com/exploits/33159/ -CVE-2014-3206 - https://www.exploit-db.com/exploits/33159/ -CVE-2014-3207 - https://bugzilla.mozilla.org/show_bug.cgi?id=952077 -CVE-2014-3210 - http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html -CVE-2014-3215 - http://openwall.com/lists/oss-security/2014/05/08/1 -CVE-2014-3215 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-3216 - http://www.exploit-db.com/exploits/33335 -CVE-2014-3220 - http://seclists.org/fulldisclosure/2014/May/16 -CVE-2014-3225 - http://packetstormsecurity.com/files/126553/Cobbler-Local-File-Inclusion.html -CVE-2014-3225 - http://www.exploit-db.com/exploits/33252 -CVE-2014-3227 - http://openwall.com/lists/oss-security/2014/04/29/4 -CVE-2014-3227 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306 -CVE-2014-3247 - http://www.exploit-db.com/exploits/33250 -CVE-2014-3248 - http://puppetlabs.com/security/cve/cve-2014-3248 -CVE-2014-3249 - http://puppetlabs.com/security/cve/cve-2014-3249 -CVE-2014-3250 - https://puppet.com/security/cve/CVE-2014-3250 -CVE-2014-3251 - http://puppetlabs.com/security/cve/cve-2014-3251 -CVE-2014-3289 - http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html -CVE-2014-3289 - http://seclists.org/fulldisclosure/2014/Jun/57 -CVE-2014-3306 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ciscosa-20140716-cm -CVE-2014-3414 - http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html -CVE-2014-3415 - http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html -CVE-2014-3416 - https://issues.jasig.org/browse/UP-4105 -CVE-2014-3417 - https://issues.jasig.org/browse/UP-4106 -CVE-2014-3418 - http://seclists.org/fulldisclosure/2014/Jul/35 -CVE-2014-3418 - http://www.exploit-db.com/exploits/34030 -CVE-2014-3419 - http://packetstormsecurity.com/files/127410/Infoblox-6.8.4.x-Weak-MySQL-Password.html -CVE-2014-3427 - http://packetstormsecurity.com/files/127081/Yealink-VoIP-Phones-XSS-CRLF-Injection.html -CVE-2014-3427 - http://seclists.org/fulldisclosure/2014/Jun/74 -CVE-2014-3428 - http://packetstormsecurity.com/files/127081/Yealink-VoIP-Phones-XSS-CRLF-Injection.html -CVE-2014-3428 - http://seclists.org/fulldisclosure/2014/Jun/74 -CVE-2014-3429 - https://github.com/ipython/ipython/pull/4845 -CVE-2014-3434 - http://packetstormsecurity.com/files/127772/Symantec-Endpoint-Protection-11.x-12.x-Kernel-Pool-Overflow.html -CVE-2014-3437 - http://seclists.org/fulldisclosure/2014/Nov/7 -CVE-2014-3438 - http://seclists.org/fulldisclosure/2014/Nov/7 -CVE-2014-3439 - http://seclists.org/fulldisclosure/2014/Nov/7 -CVE-2014-3441 - http://packetstormsecurity.com/files/126564/VLC-Player-2.1.3-Memory-Corruption.html -CVE-2014-3442 - http://packetstormsecurity.com/files/126636 -CVE-2014-3443 - http://www.exploit-db.com/exploits/33332 -CVE-2014-3444 - http://packetstormsecurity.com/files/126637 -CVE-2014-3445 - http://packetstormsecurity.com/files/126844/HandsomeWeb-SOS-Webpages-1.1.11-Backup-Hash-Disclosure.html -CVE-2014-3445 - http://seclists.org/fulldisclosure/2014/May/130 -CVE-2014-3447 - https://packetstormsecurity.com/files/126741/BSS-Continuity-CMS-4.2.22640.0-Denial-Of-Service.html -CVE-2014-3448 - http://packetstormsecurity.com/files/126740/BSS-Continuity-CMS-4.2.22640.0-Code-Execution.html -CVE-2014-3449 - http://packetstormsecurity.com/files/126739/BSS-Continuity-CMS-4.2.22640.0-Authentication-Bypass.html -CVE-2014-3451 - http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html -CVE-2014-3452 - http://packetstormsecurity.com/files/126613/klite1045-corrupt.txt -CVE-2014-3453 - http://seclists.org/fulldisclosure/2014/May/44 -CVE-2014-3470 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-3470 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 -CVE-2014-3470 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3470 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-3470 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-3470 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-3470 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html -CVE-2014-3470 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-3470 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 -CVE-2014-3474 - https://bugs.launchpad.net/horizon/+bug/1322197 -CVE-2014-3478 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3478 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3479 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3479 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3480 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3480 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3482 - https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J -CVE-2014-3482 - https://hackerone.com/reports/28449 -CVE-2014-3483 - https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J -CVE-2014-3483 - https://hackerone.com/reports/28450 -CVE-2014-3486 - https://bugzilla.redhat.com/show_bug.cgi?id=1107528 -CVE-2014-3487 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3487 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3490 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2014-3496 - https://bugzilla.redhat.com/show_bug.cgi?id=1110470 -CVE-2014-3503 - http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html -CVE-2014-3504 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3505 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3506 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3507 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3508 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3509 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3510 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3511 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3512 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-3515 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3515 - https://hackerone.com/reports/28445 -CVE-2014-3517 - https://bugs.launchpad.net/nova/+bug/1325128 -CVE-2014-3519 - http://www.openwall.com/lists/oss-security/2014/06/24/16 -CVE-2014-3522 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3528 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3531 - https://github.com/theforeman/foreman/pull/1580 -CVE-2014-3532 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2014-3533 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2014-3538 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3538 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3538 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-3538 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3544 - http://osandamalith.wordpress.com/2014/07/25/moodle-2-7-persistent-xss/ -CVE-2014-3544 - http://packetstormsecurity.com/files/127624/Moodle-2.7-Cross-Site-Scripting.html -CVE-2014-3544 - http://www.exploit-db.com/exploits/34169 -CVE-2014-3558 - https://hibernate.atlassian.net/browse/HV-912 -CVE-2014-3564 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3565 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3566 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-3566 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2014-3566 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-3566 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3566 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2014-3566 - https://github.com/mpgn/poodle-PoC -CVE-2014-3566 - https://www.elastic.co/blog/logstash-1-4-3-released -CVE-2014-3567 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-3567 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3569 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2014-3569 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-3569 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-3570 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2014-3570 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-3570 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-3571 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-3572 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2014-3572 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-3572 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-3576 - http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html -CVE-2014-3576 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2014-3576 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-3577 - http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html -CVE-2014-3577 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-3577 - http://www.ubuntu.com/usn/USN-2769-1 -CVE-2014-3581 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-3581 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-3583 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-3583 - https://hackerone.com/reports/36264 -CVE-2014-3587 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3587 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3587 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-3587 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3587 - http://www.ubuntu.com/usn/USN-2344-1 -CVE-2014-3592 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3592 -CVE-2014-3596 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2014-3597 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3597 - http://www.ubuntu.com/usn/USN-2344-1 -CVE-2014-3597 - https://github.com/php/php-src/commit/2fefae47716d501aec41c1102f3fd4531f070b05 -CVE-2014-3601 - http://www.ubuntu.com/usn/USN-2358-1 -CVE-2014-3610 - http://www.ubuntu.com/usn/USN-2394-1 -CVE-2014-3611 - http://www.ubuntu.com/usn/USN-2394-1 -CVE-2014-3613 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3613 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3613 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3614 - http://seclists.org/oss-sec/2014/q3/589 -CVE-2014-3629 - http://packetstormsecurity.com/files/129034/Apache-Qpid-0.30-Induced-HTTP-Requests.html -CVE-2014-3630 - https://playframework.com/security/vulnerability/CVE-2014-3630-XmlExternalEntity -CVE-2014-3631 - http://www.exploit-db.com/exploits/36268 -CVE-2014-3634 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3635 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-3637 - http://www.openwall.com/lists/oss-security/2019/06/24/13 -CVE-2014-3637 - http://www.openwall.com/lists/oss-security/2019/06/24/14 -CVE-2014-3643 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2014-3646 - http://www.ubuntu.com/usn/USN-2394-1 -CVE-2014-3647 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3647 - http://www.ubuntu.com/usn/USN-2394-1 -CVE-2014-3647 - https://bugzilla.redhat.com/show_bug.cgi?id=1144897 -CVE-2014-3660 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3660 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-3665 - https://www.cloudbees.com/jenkins-security-advisory-2014-10-30 -CVE-2014-3668 - http://linux.oracle.com/errata/ELSA-2014-1768.html -CVE-2014-3668 - http://www.ubuntu.com/usn/USN-2391-1 -CVE-2014-3668 - https://hackerone.com/reports/104011 -CVE-2014-3669 - http://linux.oracle.com/errata/ELSA-2014-1768.html -CVE-2014-3669 - http://www.ubuntu.com/usn/USN-2391-1 -CVE-2014-3669 - https://bugs.php.net/bug.php?id=68044 -CVE-2014-3669 - https://hackerone.com/reports/104012 -CVE-2014-3670 - http://linux.oracle.com/errata/ELSA-2014-1768.html -CVE-2014-3670 - http://www.ubuntu.com/usn/USN-2391-1 -CVE-2014-3672 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-3683 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-3688 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -CVE-2014-3690 - http://www.openwall.com/lists/oss-security/2014/10/21/4 -CVE-2014-3690 - http://www.openwall.com/lists/oss-security/2014/10/29/7 -CVE-2014-3703 - http://rhn.redhat.com/errata/RHSA-2014-1691.html -CVE-2014-3704 - http://packetstormsecurity.com/files/128720/Drupal-7.X-SQL-Injection.html -CVE-2014-3704 - http://packetstormsecurity.com/files/128721/Drupal-7.31-SQL-Injection.html -CVE-2014-3704 - http://packetstormsecurity.com/files/128741/Drupal-HTTP-Parameter-Key-Value-SQL-Injection.html -CVE-2014-3704 - http://seclists.org/fulldisclosure/2014/Oct/75 -CVE-2014-3704 - http://www.exploit-db.com/exploits/34984 -CVE-2014-3704 - http://www.exploit-db.com/exploits/34993 -CVE-2014-3704 - http://www.exploit-db.com/exploits/35150 -CVE-2014-3704 - http://www.openwall.com/lists/oss-security/2014/10/15/23 -CVE-2014-3704 - https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html -CVE-2014-3704 - https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html -CVE-2014-3707 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-3707 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-3707 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-3707 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3707 - https://hackerone.com/reports/104014 -CVE-2014-3710 - http://linux.oracle.com/errata/ELSA-2014-1768.html -CVE-2014-3710 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-3710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-3710 - http://www.ubuntu.com/usn/USN-2391-1 -CVE-2014-3710 - http://www.ubuntu.com/usn/USN-2494-1 -CVE-2014-3718 - http://packetstormsecurity.com/files/126654/Aleph-500-Cross-Site-Scripting.html -CVE-2014-3719 - http://packetstormsecurity.com/files/126635/Aleph-500-SQL-Injection.html -CVE-2014-3735 - http://packetstormsecurity.com/files/126640/Intel-Ideo-Video-4.5-Memory-Corruption.html -CVE-2014-3737 - http://packetstormsecurity.com/files/127221/Storesprite-7-Cross-Site-Scripting.html -CVE-2014-3738 - http://packetstormsecurity.com/files/127623/Zenoss-Monitoring-System-4.2.5-2108-Cross-Site-Scripting.html -CVE-2014-3738 - http://www.exploit-db.com/exploits/34165 -CVE-2014-3738 - http://www.openwall.com/lists/oss-security/2014/05/14/5 -CVE-2014-3739 - http://www.openwall.com/lists/oss-security/2014/05/14/5 -CVE-2014-3740 - http://packetstormsecurity.com/files/126596/SpiceWorks-7.2.00174-Cross-Site-Scripting.html -CVE-2014-3740 - http://packetstormsecurity.com/files/126994/SpiceWorks-IT-Ticketing-System-Cross-Site-Scripting.html -CVE-2014-3740 - http://seclists.org/fulldisclosure/2014/Jun/42 -CVE-2014-3740 - http://www.exploit-db.com/exploits/33330 -CVE-2014-3752 - http://packetstormsecurity.com/files/127227/G-Data-TotalProtection-2014-Code-Execution.html -CVE-2014-3753 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18986 -CVE-2014-3758 - http://seclists.org/fulldisclosure/2014/Apr/314 -CVE-2014-3759 - http://seclists.org/fulldisclosure/2014/Apr/314 -CVE-2014-3772 - https://github.com/nilsteampassnet/TeamPass/commit/7715512f2bd5659cc69e063a1c513c19e384340f -CVE-2014-3773 - https://github.com/nilsteampassnet/TeamPass/commit/7715512f2bd5659cc69e063a1c513c19e384340f -CVE-2014-3775 - http://www.ubuntu.com/usn/USN-2215-1 -CVE-2014-3777 - http://packetstormsecurity.com/files/127280/Reportico-Admin-Credential-Leak.html -CVE-2014-3778 - http://www.exploit-db.com/exploits/33792 -CVE-2014-3779 - http://packetstormsecurity.com/files/129803/ADSelfservice-Plus-5.1-Cross-Site-Scripting.html -CVE-2014-3781 - http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html -CVE-2014-3783 - http://packetstormsecurity.com/files/126768/Dotclear-2.6.2-SQL-Injection.html -CVE-2014-3786 - http://packetstormsecurity.com/files/126870/Pixie-CMS-1.04-Cross-Site-Scripting.html -CVE-2014-3791 - http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day -CVE-2014-3791 - http://packetstormsecurity.com/files/126614/Easy-File-Sharing-Web-Server-6.8-Buffer-Overflow.html -CVE-2014-3792 - http://packetstormsecurity.com/files/126426/Beetel-450TC2-Cross-Site-Request-Forgery.html -CVE-2014-3793 - http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html -CVE-2014-3797 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-3797 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-3803 - http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/ -CVE-2014-3804 - https://www.exploit-db.com/exploits/42708/ -CVE-2014-3805 - https://www.exploit-db.com/exploits/42709/ -CVE-2014-3806 - http://packetstormsecurity.com/files/126550/VM-Turbo-Operations-Manager-4.5.x-Directory-Traversal.html -CVE-2014-3807 - http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html -CVE-2014-3810 - http://packetstormsecurity.com/files/127148/Dolphin-7.1.4-SQL-Injection.html -CVE-2014-3826 - http://adamziaja.com/poc/201312-xss-mybb.html -CVE-2014-3827 - https://adamziaja.com/poc/201312-xss-mybb.html -CVE-2014-3828 - http://seclists.org/fulldisclosure/2014/Oct/78 -CVE-2014-3828 - http://www.kb.cert.org/vuls/id/298796 -CVE-2014-3829 - http://seclists.org/fulldisclosure/2014/Oct/78 -CVE-2014-3829 - http://www.kb.cert.org/vuls/id/298796 -CVE-2014-3830 - http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-3840 - http://www.exploit-db.com/exploits/33493 -CVE-2014-3842 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html -CVE-2014-3842 - http://seclists.org/fulldisclosure/2014/Apr/265 -CVE-2014-3842 - http://www.exploit-db.com/exploits/33076 -CVE-2014-3846 - http://packetstormsecurity.com/files/126735/flyingcart-xss.txt -CVE-2014-3848 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html -CVE-2014-3848 - http://seclists.org/fulldisclosure/2014/Apr/265 -CVE-2014-3848 - http://www.exploit-db.com/exploits/33076 -CVE-2014-3849 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html -CVE-2014-3849 - http://seclists.org/fulldisclosure/2014/Apr/265 -CVE-2014-3849 - http://www.exploit-db.com/exploits/33076 -CVE-2014-3850 - http://seclists.org/fulldisclosure/2014/Jun/63 -CVE-2014-3850 - https://security.dxw.com/advisories/csrf-in-member-approval-131109-permits-unapproved-registrations -CVE-2014-3851 - http://www.openwall.com/lists/oss-security/2014/05/14/3 -CVE-2014-3851 - http://www.openwall.com/lists/oss-security/2014/05/23/1 -CVE-2014-3852 - http://www.openwall.com/lists/oss-security/2014/05/14/3 -CVE-2014-3852 - http://www.openwall.com/lists/oss-security/2014/05/23/1 -CVE-2014-3853 - http://www.openwall.com/lists/oss-security/2014/05/14/3 -CVE-2014-3853 - http://www.openwall.com/lists/oss-security/2014/05/23/1 -CVE-2014-3854 - http://www.openwall.com/lists/oss-security/2014/05/14/3 -CVE-2014-3854 - http://www.openwall.com/lists/oss-security/2014/05/23/1 -CVE-2014-3855 - http://www.openwall.com/lists/oss-security/2014/05/14/3 -CVE-2014-3855 - http://www.openwall.com/lists/oss-security/2014/05/23/1 -CVE-2014-3856 - https://github.com/fish-shell/fish-shell/issues/1437 -CVE-2014-3857 - http://fereidani.com/articles/show/76_kerio_control_8_3_1_boolean_based_blind_sql_injection -CVE-2014-3857 - http://packetstormsecurity.com/files/127320/Kerio-Control-8.3.1-Blind-SQL-Injection.html -CVE-2014-3857 - http://www.exploit-db.com/exploits/33954 -CVE-2014-3860 - http://packetstormsecurity.com/files/126882/Xilisoft-Video-Converter-Ultimate-7.8.1-build-20140505-DLL-Hijacking.html -CVE-2014-3863 - http://packetstormsecurity.com/files/127372/Joomla-JChatSocial-2.2-Cross-Site-Scripting.html -CVE-2014-3864 - http://openwall.com/lists/oss-security/2014/05/25/2 -CVE-2014-3864 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746498 -CVE-2014-3865 - http://openwall.com/lists/oss-security/2014/05/25/2 -CVE-2014-3868 - http://packetstormsecurity.com/files/127196/ZeusCart-4.x-Remote-SQL-Injection.html -CVE-2014-3868 - http://seclists.org/fulldisclosure/2014/Jun/116 -CVE-2014-3868 - https://github.com/ZeusCart/zeuscart/pull/23 -CVE-2014-3870 - http://packetstormsecurity.com/files/126782/wpbib2html-xss.txt -CVE-2014-3871 - http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html -CVE-2014-3875 - http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html -CVE-2014-3875 - http://seclists.org/fulldisclosure/2014/Jun/1 -CVE-2014-3876 - http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html -CVE-2014-3877 - http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html -CVE-2014-3878 - http://packetstormsecurity.com/files/126948/IPSwitch-IMail-12.4-Cross-Site-Scripting.html -CVE-2014-3878 - http://seclists.org/fulldisclosure/2014/Jun/19 -CVE-2014-3878 - http://www.exploit-db.com/exploits/33633 -CVE-2014-3888 - http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html -CVE-2014-3903 - https://wpvulndb.com/vulnerabilities/7534 -CVE-2014-3913 - http://packetstormsecurity.com/files/127152/Ericom-AccessNow-Server-Buffer-Overflow.html -CVE-2014-3917 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-3921 - http://packetstormsecurity.com/files/126763/WordPress-Simple-Popup-Cross-Site-Scripting.html -CVE-2014-3922 - http://packetstormsecurity.com/files/126847/InterScan-Messaging-Security-Virtual-Appliance-8.5.1.1516-Cross-Site-Scripting.html -CVE-2014-3922 - http://seclists.org/fulldisclosure/2014/May/164 -CVE-2014-3928 - https://github.com/Cougar/lg/issues/4 -CVE-2014-3934 - http://packetstormsecurity.com/files/126803/phpnuke83news-sql.txt -CVE-2014-3935 - http://packetstormsecurity.com/files/126701 -CVE-2014-3936 - http://packetstormsecurity.com/files/127427/D-Link-HNAP-Request-Remote-Buffer-Overflow.html -CVE-2014-3936 - http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug -CVE-2014-3956 - http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html -CVE-2014-3961 - http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html -CVE-2014-3962 - http://packetstormsecurity.com/files/126866/Videos-Tube-1.0-SQL-Injection.html -CVE-2014-3974 - http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2014-3975 - http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2014-3976 - http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html -CVE-2014-3976 - http://seclists.org/fulldisclosure/2014/Apr/16 -CVE-2014-3976 - http://www.exploit-db.com/exploits/32702 -CVE-2014-3977 - http://packetstormsecurity.com/files/127067/IBM-AIX-6.1.8-Privilege-Escalation.html -CVE-2014-3978 - http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-3981 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-3990 - http://packetstormsecurity.com/files/127460/OpenCart-1.5.6.4-PHP-Object-Injection.html -CVE-2014-3991 - http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html -CVE-2014-3992 - http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html -CVE-2014-3996 - http://packetstormsecurity.com/files/127973/ManageEngine-Password-Manager-MetadataServlet.dat-SQL-Injection.html -CVE-2014-3996 - http://seclists.org/fulldisclosure/2014/Aug/55 -CVE-2014-3996 - http://seclists.org/fulldisclosure/2014/Aug/85 -CVE-2014-3997 - http://seclists.org/fulldisclosure/2014/Aug/55 -CVE-2014-3997 - http://seclists.org/fulldisclosure/2014/Aug/85 -CVE-2014-4003 - http://packetstormsecurity.com/files/126986/SAP-SLD-Information-Tampering.html -CVE-2014-4014 - http://www.exploit-db.com/exploits/33824 -CVE-2014-4017 - http://packetstormsecurity.com/files/126781/WordPress-Conversion-Ninja-Cross-Site-Scripting.html -CVE-2014-4018 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html -CVE-2014-4018 - http://www.exploit-db.com/exploits/33803 -CVE-2014-4018 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ -CVE-2014-4019 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html -CVE-2014-4019 - http://www.exploit-db.com/exploits/33803 -CVE-2014-4019 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ -CVE-2014-4027 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4030 - http://seclists.org/fulldisclosure/2014/Jun/64 -CVE-2014-4030 - https://security.dxw.com/advisories/jw-player-for-flash-html5-video/ -CVE-2014-4032 - http://packetstormsecurity.com/files/126856/Fiyo-CMS-1.5.7-Cross-Site-Scripting.html -CVE-2014-4033 - http://packetstormsecurity.com/files/127006/eFront-3.6.14.4-Cross-Site-Scripting.html -CVE-2014-4034 - http://packetstormsecurity.com/files/127005/ZeroCMS-1.0-SQL-Injection.html -CVE-2014-4034 - http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html -CVE-2014-4034 - http://seclists.org/fulldisclosure/2015/Feb/4 -CVE-2014-4034 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5186.php -CVE-2014-4035 - http://packetstormsecurity.com/files/126949/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html -CVE-2014-4035 - http://packetstormsecurity.com/files/154024/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html -CVE-2014-4036 - http://packetstormsecurity.com/files/126909/ImpressCMS-1.3.6.1-Cross-Site-Scripting.html -CVE-2014-4037 - http://packetstormsecurity.com/files/126902/FCKeditor-2.6.10-Cross-Site-Scripting.html -CVE-2014-4043 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2014-4043 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2014-4043 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2014-4043 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2014-4043 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2014-4043 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2014-4045 - http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html -CVE-2014-4046 - http://packetstormsecurity.com/files/127088/Asterisk-Project-Security-Advisory-AST-2014-006.html -CVE-2014-4047 - http://packetstormsecurity.com/files/127089/Asterisk-Project-Security-Advisory-AST-2014-007.html -CVE-2014-4048 - http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html -CVE-2014-4049 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-4076 - http://www.exploit-db.com/exploits/35936 -CVE-2014-4076 - https://www.exploit-db.com/exploits/37755/ -CVE-2014-4101 - http://www.securityfocus.com/bid/69609 -CVE-2014-4113 - http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html -CVE-2014-4113 - https://www.exploit-db.com/exploits/37064/ -CVE-2014-4113 - https://www.exploit-db.com/exploits/39666/ -CVE-2014-4114 - http://www.exploit-db.com/exploits/35019 -CVE-2014-4114 - http://www.exploit-db.com/exploits/35055 -CVE-2014-4138 - http://blog.skylined.nl/20161221001.html -CVE-2014-4138 - http://packetstormsecurity.com/files/140258/Microsoft-Internet-Explorer-11-MSHTML-CPasteCommand-ConvertBitmaptoPng-Buffer-Overflow.html -CVE-2014-4138 - https://www.exploit-db.com/exploits/40960/ -CVE-2014-4141 - https://www.exploit-db.com/exploits/40685/ -CVE-2014-4154 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html -CVE-2014-4154 - http://www.exploit-db.com/exploits/33803 -CVE-2014-4154 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ -CVE-2014-4155 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html -CVE-2014-4155 - http://www.exploit-db.com/exploits/33803 -CVE-2014-4155 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities -CVE-2014-4158 - http://packetstormsecurity.com/files/126332/Kolibri-2.0-Stack-Buffer-Overflow.html -CVE-2014-4162 - http://packetstormsecurity.com/files/126812/Zyxel-P-660HW-T1-Cross-Site-Request-Forgery.html -CVE-2014-4163 - http://seclists.org/fulldisclosure/2014/Jun/62 -CVE-2014-4164 - http://packetstormsecurity.com/files/127001/AlogoSec-FireFlow-6.3-Cross-Site-Scripting.html -CVE-2014-4165 - http://packetstormsecurity.com/files/127043/ntop-xss.txt -CVE-2014-4166 - http://packetstormsecurity.com/files/127074/SHOUTcast-DNAS-2.2.1-Cross-Site-Scripting.html -CVE-2014-4166 - http://www.exploit-db.com/exploits/33714 -CVE-2014-4170 - http://packetstormsecurity.com/files/127701/Free-Reprintables-ArticleFR-11.06.2014-Improper-Access-Control.html -CVE-2014-4171 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4172 - https://issues.jasig.org/browse/CASC-228 -CVE-2014-4187 - http://packetstormsecurity.com/files/127098/ClipBucket-CMS-Cross-Site-Scripting.html -CVE-2014-4194 - http://packetstormsecurity.com/files/127164/ZeroCMS-1.0-SQL-Injection.html -CVE-2014-4195 - http://packetstormsecurity.com/files/127262/ZeroCMS-1.0-Cross-Site-Scripting.html -CVE-2014-4196 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt -CVE-2014-4197 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt -CVE-2014-4198 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt -CVE-2014-4199 - http://seclists.org/fulldisclosure/2014/Aug/71 -CVE-2014-4200 - http://seclists.org/fulldisclosure/2014/Aug/71 -CVE-2014-4201 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4201 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4201 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4202 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4202 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4202 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4203 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4203 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4203 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4204 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4204 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4204 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4205 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4205 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4205 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4206 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4206 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4206 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4207 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4207 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-4207 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4207 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4208 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4208 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4208 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4209 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4209 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4209 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4210 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4210 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4210 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4211 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4211 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4211 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4212 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4212 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-4212 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4212 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4213 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4213 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4213 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4214 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4214 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4214 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4215 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4215 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4215 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4216 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4216 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4216 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4217 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4217 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4217 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4218 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4218 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4218 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4219 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4219 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4219 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4220 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4220 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4220 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4221 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4221 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4221 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4222 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4222 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4222 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4223 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4223 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4223 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4224 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4224 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4224 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4225 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4225 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4225 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4226 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4226 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4226 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4227 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4227 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4227 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4228 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4228 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4228 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4229 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4229 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4229 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4230 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4230 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4230 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4231 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4231 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4231 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4232 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4232 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4232 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4233 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4233 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4233 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4234 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4234 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4234 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4235 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4235 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4235 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4236 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4236 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4236 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4237 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4237 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4237 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4238 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4238 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4238 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4239 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4239 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4239 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4240 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4240 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4240 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4241 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4241 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4241 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4242 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4242 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4242 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4243 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4243 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-4243 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4243 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4244 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4244 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4244 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4244 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 -CVE-2014-4245 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4245 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4245 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4246 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4246 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4246 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4247 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4247 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4247 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4248 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4248 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4248 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4249 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4249 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4249 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4250 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4250 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4250 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4251 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4251 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4251 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4252 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4252 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4252 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4253 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4253 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4253 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4254 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4254 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4254 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4255 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4255 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4255 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4256 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4256 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4256 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4257 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4257 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4257 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4258 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4258 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-4258 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4258 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4259 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-4260 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4260 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-4260 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4260 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4261 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4261 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4261 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4262 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4262 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4262 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4263 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4263 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4263 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4263 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 -CVE-2014-4264 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4264 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4264 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4264 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 -CVE-2014-4265 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4265 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4265 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4266 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4266 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4266 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4267 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4267 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4267 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4268 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4268 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4268 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4269 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4269 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4269 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4270 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4270 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4270 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4271 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-4271 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -CVE-2014-4271 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-4271 - https://exchange.xforce.ibmcloud.com/vulnerabilities/94562 -CVE-2014-4274 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-4274 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4275 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4276 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4277 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4278 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4279 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-4280 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4281 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4282 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4283 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4284 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4285 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4287 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-4287 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4288 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-4288 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4289 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4290 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4291 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4292 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4293 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4294 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4295 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4296 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4297 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4298 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4299 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4300 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4301 - https://www.netsparker.com/critical-xss-vulnerabilities-in-ajenti -CVE-2014-4302 - http://packetstormsecurity.com/files/127050/HAM3D-Shop-Engine-CMS-Cross-Site-Scripting.html -CVE-2014-4304 - https://www.netsparker.com/critical-xss-vulnerability-in-sql-buddy -CVE-2014-4305 - http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html -CVE-2014-4306 - http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html -CVE-2014-4307 - http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html -CVE-2014-4308 - http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html -CVE-2014-4309 - http://packetstormsecurity.com/files/127044/Openfiler-NAS-SAN-Appliance-2.99-XSS-Traversal-Command-Injection.html -CVE-2014-4310 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-4311 - http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html -CVE-2014-4311 - http://seclists.org/fulldisclosure/2014/Oct/2 -CVE-2014-4312 - http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html -CVE-2014-4312 - http://seclists.org/fulldisclosure/2014/Oct/2 -CVE-2014-4313 - http://packetstormsecurity.com/files/128564/Epicor-Procurement-SQL-Injection.html -CVE-2014-4326 - https://www.elastic.co/community/security/ -CVE-2014-4329 - http://packetstormsecurity.com/files/127329/Ntop-NG-1.1-Cross-Site-Scripting.html -CVE-2014-4330 - http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html -CVE-2014-4330 - http://seclists.org/fulldisclosure/2014/Sep/84 -CVE-2014-4330 - http://seclists.org/oss-sec/2014/q3/692 -CVE-2014-4331 - http://packetstormsecurity.com/files/127404/OctavoCMS-Cross-Site-Scripting.html -CVE-2014-4334 - http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html -CVE-2014-4334 - http://www.exploit-db.com/exploits/33804 -CVE-2014-4334 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5187.php -CVE-2014-4335 - http://packetstormsecurity.com/files/127128/BarracudaDrive-6.7.2-Cross-Site-Scripting.html -CVE-2014-4341 - https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 -CVE-2014-4342 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-4342 - https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 -CVE-2014-4343 - https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f -CVE-2014-4344 - https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b -CVE-2014-4344 - https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc -CVE-2014-4345 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt -CVE-2014-4345 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-4345 - https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1 -CVE-2014-4346 - http://seclists.org/fulldisclosure/2014/Jul/77 -CVE-2014-4347 - http://seclists.org/fulldisclosure/2014/Jul/77 -CVE-2014-4395 - https://code.google.com/p/google-security-research/issues/detail?id=29 -CVE-2014-4402 - https://code.google.com/p/google-security-research/issues/detail?id=33 -CVE-2014-4406 - http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html -CVE-2014-4492 - http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html -CVE-2014-4498 - https://trmm.net/Thunderstrike -CVE-2014-4511 - http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ -CVE-2014-4511 - http://packetstormsecurity.com/files/127281/Gitlist-0.4.0-Remote-Code-Execution.html -CVE-2014-4511 - http://packetstormsecurity.com/files/127364/Gitlist-Unauthenticated-Remote-Command-Execution.html -CVE-2014-4511 - http://www.exploit-db.com/exploits/33990 -CVE-2014-4514 - http://codevigilant.com/disclosure/wp-plugin-alipay-a3-cross-site-scripting-xss -CVE-2014-4515 - http://codevigilant.com/disclosure/wp-plugin-anyfont-a3-cross-site-scripting-xss -CVE-2014-4516 - http://codevigilant.com/disclosure/wp-plugin-bic-media-a3-cross-site-scripting-xss -CVE-2014-4519 - http://codevigilant.com/disclosure/wp-plugin-conversador-a3-cross-site-scripting-xss -CVE-2014-4520 - http://codevigilant.com/disclosure/wp-plugin-dmca-watermarker-a3-cross-site-scripting-xss -CVE-2014-4523 - http://codevigilant.com/disclosure/wp-plugin-easy-career-openings-a3-cross-site-scripting-xss -CVE-2014-4524 - http://codevigilant.com/disclosure/wp-plugin-easy-post-types-a3-cross-site-scripting-xss -CVE-2014-4526 - http://codevigilant.com/disclosure/wp-plugin-efence-a3-cross-site-scripting-xss -CVE-2014-4527 - http://codevigilant.com/disclosure/wp-plugin-envialosimple-email-marketing-y-newsletters-gratis-a3-cross-site-scripting-xss -CVE-2014-4528 - http://codevigilant.com/disclosure/wp-plugin-fbpromotions-a3-cross-site-scripting-xss -CVE-2014-4537 - http://codevigilant.com/disclosure/wp-plugin-keyword-strategy-internal-links-a3-cross-site-scripting-xss -CVE-2014-4538 - http://codevigilant.com/disclosure/wp-plugin-malware-finder-a3-cross-site-scripting-xss -CVE-2014-4540 - http://codevigilant.com/disclosure/wp-plugin-oleggo-livestream-a3-cross-site-scripting-xss -CVE-2014-4541 - http://codevigilant.com/disclosure/wp-plugin-omfg-mobile-a3-cross-site-scripting-xss -CVE-2014-4547 - http://codevigilant.com/disclosure/wp-plugin-rezgo-online-booking-a3-cross-site-scripting-xss -CVE-2014-4554 - http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss -CVE-2014-4557 - http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-jigoshop-a3-cross-site-scripting-xss -CVE-2014-4558 - http://codevigilant.com/disclosure/wp-plugin-swipehq-payment-gateway-woocommerce-a3-cross-site-scripting-xss -CVE-2014-4574 - http://codevigilant.com/disclosure/wp-plugin-webengage-a3-cross-site-scripting-xss -CVE-2014-4604 - http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss -CVE-2014-4611 - https://hackerone.com/reports/17688 -CVE-2014-4613 - http://packetstormsecurity.com/files/125438/Piwigo-2.6.1-Cross-Site-Request-Forgery.html -CVE-2014-4616 - https://hackerone.com/reports/12297 -CVE-2014-4617 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-4619 - http://packetstormsecurity.com/files/128005/RSA-Identity-Management-And-Governance-Authentication-Bypass.html -CVE-2014-4620 - http://packetstormsecurity.com/files/128841/EMC-NetWorker-Module-For-MEDITECH-NMMEDI-Information-Disclosure.html -CVE-2014-4623 - http://packetstormsecurity.com/files/128842/EMC-Avamar-Weak-Password-Storage.html -CVE-2014-4624 - http://packetstormsecurity.com/files/128843/EMC-Avamar-Sensitive-Information-Disclosure.html -CVE-2014-4624 - http://packetstormsecurity.com/files/128850/VMware-Security-Advisory-2014-0011.html -CVE-2014-4626 - http://www.kb.cert.org/vuls/id/315340 -CVE-2014-4626 - https://docs.google.com/spreadsheets/d/1DiiUPCPvmaliWcfwPSc36y2mDvuidkDKQBWqaIuJi0A/edit?usp=sharing -CVE-2014-4627 - http://packetstormsecurity.com/files/128986/RSA-Web-Threat-Detection-SQL-Injection.html -CVE-2014-4629 - http://packetstormsecurity.com/files/129376/EMC-Documentum-Content-Server-Insecure-Direct-Object-Reference.html -CVE-2014-4635 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html -CVE-2014-4636 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html -CVE-2014-4637 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html -CVE-2014-4638 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html -CVE-2014-4639 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html -CVE-2014-4643 - http://packetstormsecurity.com/files/127075/Core-FTP-LE-2.2-Heap-Overflow.html -CVE-2014-4643 - http://www.exploit-db.com/exploits/33713 -CVE-2014-4652 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4653 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4654 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4655 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4656 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4663 - http://packetstormsecurity.com/files/127192/TimThumb-2.8.13-Remote-Code-Execution.html -CVE-2014-4663 - http://seclists.org/fulldisclosure/2014/Jul/4 -CVE-2014-4663 - http://seclists.org/fulldisclosure/2014/Jun/117 -CVE-2014-4663 - http://www.exploit-db.com/exploits/33851 -CVE-2014-4667 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-4669 - http://packetstormsecurity.com/files/127239/HP-Enterprise-Maps-1.00-Authenticated-XXE-Injection.html -CVE-2014-4670 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-4670 - https://bugs.php.net/bug.php?id=67538 -CVE-2014-4671 - http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/ -CVE-2014-4677 - https://bierbaumer.net/security/cve-2014-4677/ -CVE-2014-4688 - https://www.exploit-db.com/exploits/43560/ -CVE-2014-4698 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-4698 - https://bugs.php.net/bug.php?id=67539 -CVE-2014-4699 - http://openwall.com/lists/oss-security/2014/07/05/4 -CVE-2014-4699 - http://openwall.com/lists/oss-security/2014/07/08/16 -CVE-2014-4699 - http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html -CVE-2014-4699 - http://www.exploit-db.com/exploits/34134 -CVE-2014-4699 - http://www.openwall.com/lists/oss-security/2014/07/04/4 -CVE-2014-4701 - http://legalhackers.com/advisories/nagios-check_dhcp.txt -CVE-2014-4701 - http://seclists.org/fulldisclosure/2014/May/74 -CVE-2014-4701 - http://www.exploit-db.com/exploits/33387 -CVE-2014-4703 - http://seclists.org/fulldisclosure/2014/Jun/141 -CVE-2014-4710 - http://packetstormsecurity.com/files/127634/ZeroCMS-1.0-Cross-Site-Scripting.html -CVE-2014-4710 - https://community.qualys.com/blogs/securitylabs/2014/07/24/yet-another-zerocms-cross-site-scripting-vulnerability-cve-2014-4710 -CVE-2014-4716 - http://packetstormsecurity.com/files/127244/Thomson-TWG87OUIR-Cross-Site-Request-Forgery.html -CVE-2014-4717 - http://packetstormsecurity.com/files/127238/WordPress-Simple-Share-Buttons-Adder-4.4-CSRF-XSS.html -CVE-2014-4717 - http://seclists.org/fulldisclosure/2014/Jun/138 -CVE-2014-4717 - https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder -CVE-2014-4718 - http://packetstormsecurity.com/files/127188/Lunar-CMS-3.3-CSRF-Cross-Site-Scripting.html -CVE-2014-4718 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php -CVE-2014-4719 - http://packetstormsecurity.com/files/127177/User-Friendly-SVN-Cross-Site-Scripting.html -CVE-2014-4721 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-4721 - https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html -CVE-2014-4722 - http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scripting.html -CVE-2014-4723 - http://packetstormsecurity.com/files/127293/WordPress-Easy-Banners-1.4-Cross-Site-Scripting.html -CVE-2014-4724 - http://packetstormsecurity.com/files/127291/WordPress-Custom-Banners-1.2.2.2-Cross-Site-Scripting.html -CVE-2014-4727 - http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html -CVE-2014-4727 - http://seclists.org/fulldisclosure/2014/Sep/80 -CVE-2014-4728 - http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html -CVE-2014-4728 - http://seclists.org/fulldisclosure/2014/Sep/80 -CVE-2014-4734 - http://packetstormsecurity.com/files/127499/e107-2.0-alpha2-Cross-Site-Scripting.html -CVE-2014-4735 - http://packetstormsecurity.com/files/128140/MyWebSQL-3.4-Cross-Site-Scripting.html -CVE-2014-4736 - http://packetstormsecurity.com/files/127594/E2-2844-SQL-Injection.html -CVE-2014-4737 - http://packetstormsecurity.com/files/128519/Textpattern-4.5.5-Cross-Site-Scripting.html -CVE-2014-4741 - http://packetstormsecurity.com/files/127370/xClassified-1.2-SQL-Injection.html -CVE-2014-4742 - https://www.netsparker.com/critical-xss-vulnerability-in-kajonacms -CVE-2014-4744 - https://www.netsparker.com/critical-xss-vulnerabilities-in-osticket/ -CVE-2014-4747 - http://packetstormsecurity.com/files/127830/IBM-Sametime-Meet-Server-8.5-Password-Disclosure.html -CVE-2014-4748 - http://packetstormsecurity.com/files/127831/IBM-Sametime-Meet-Server-8.5-Cross-Site-Scripting.html -CVE-2014-4770 - http://www.kb.cert.org/vuls/id/573356 -CVE-2014-4816 - http://www.kb.cert.org/vuls/id/573356 -CVE-2014-4845 - http://packetstormsecurity.com/files/127289/WordPress-Bannerman-0.2.4-Cross-Site-Scripting.html -CVE-2014-4846 - http://packetstormsecurity.com/files/127288/WordPress-ml-slider-2.5-Cross-Site-Scripting.html -CVE-2014-4847 - http://packetstormsecurity.com/files/127292/WordPress-Random-Banner-1.1.2.1-Cross-Site-Scripting.html -CVE-2014-4848 - http://packetstormsecurity.com/files/127290/WordPress-Blogstand-Smart-Banner-1.0-Cross-Site-Scripting.html -CVE-2014-4849 - http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html -CVE-2014-4850 - http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html -CVE-2014-4851 - http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html -CVE-2014-4852 - http://packetstormsecurity.com/files/127371/Atom-CMS-Shell-Upload-SQL-Injection.html -CVE-2014-4853 - http://packetstormsecurity.com/files/127330/OpenDocMan-1.2.7.2-Cross-Site-Scripting.html -CVE-2014-4853 - https://github.com/opendocman/opendocman/issues/163 -CVE-2014-4854 - http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html -CVE-2014-4858 - http://www.kb.cert.org/vuls/id/394540 -CVE-2014-4859 - http://www.kb.cert.org/vuls/id/552286 -CVE-2014-4860 - http://www.kb.cert.org/vuls/id/552286 -CVE-2014-4865 - http://seclists.org/fulldisclosure/2014/Sep/38 -CVE-2014-4865 - http://www.kb.cert.org/vuls/id/241508 -CVE-2014-4867 - http://www.kb.cert.org/vuls/id/280844 -CVE-2014-4868 - http://www.kb.cert.org/vuls/id/111588 -CVE-2014-4869 - http://www.kb.cert.org/vuls/id/111588 -CVE-2014-4870 - http://www.kb.cert.org/vuls/id/111588 -CVE-2014-4871 - http://www.kb.cert.org/vuls/id/941108 -CVE-2014-4872 - http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html -CVE-2014-4873 - http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html -CVE-2014-4874 - http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html -CVE-2014-4875 - http://www.kb.cert.org/vuls/id/301788 -CVE-2014-4875 - http://www.kb.cert.org/vuls/id/JLAD-9X4SPN -CVE-2014-4877 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-4877 - https://github.com/rapid7/metasploit-framework/pull/4088 -CVE-2014-4877 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2014-4880 - http://packetstormsecurity.com/files/129187/Hikvision-DVR-RTSP-Request-Remote-Code-Execution.html -CVE-2014-4881 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4881 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4882 - http://www.kb.cert.org/vuls/id/595884 -CVE-2014-4884 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4884 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4885 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4885 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4887 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4887 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4888 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4888 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4889 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4889 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4890 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4890 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4891 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4891 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4892 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4892 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4894 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4894 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4895 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4895 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4896 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4896 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4897 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4897 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4898 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4898 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4899 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4899 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4900 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4900 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4901 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4901 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4903 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4903 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4904 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4904 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4905 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4905 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4906 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-4906 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-4909 - https://bugs.gentoo.org/show_bug.cgi?id=516822 -CVE-2014-4912 - https://www.exploit-db.com/exploits/33983/ -CVE-2014-4925 - http://packetstormsecurity.com/files/129864/Good-For-Enterprise-Android-HTML-Injection.html -CVE-2014-4925 - http://seclists.org/fulldisclosure/2015/Jan/17 -CVE-2014-4927 - http://packetstormsecurity.com/files/127544/ACME-micro_httpd-Denial-Of-Service.html -CVE-2014-4930 - http://packetstormsecurity.com/files/128012/ManageEngine-EventLog-Analyzer-7-Cross-Site-Scripting.html -CVE-2014-4936 - http://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and -CVE-2014-4936 - http://packetstormsecurity.com/files/130244/Malwarebytes-Anti-Malware-Anti-Exploit-Update-Remote-Code-Execution.html -CVE-2014-4943 - http://www.exploit-db.com/exploits/36267 -CVE-2014-4944 - http://packetstormsecurity.com/files/127407/WordPress-BSK-PDF-Manager-1.3.2-SQL-Injection.html -CVE-2014-4958 - http://packetstormsecurity.com/files/128414/Telerik-ASP.NET-AJAX-RadEditor-Control-2014.1.403.35-XSS.html -CVE-2014-4959 - http://packetstormsecurity.com/files/127651/Android-SDK-SQL-Injection.html -CVE-2014-4959 - http://seclists.org/fulldisclosure/2014/Jul/138 -CVE-2014-4959 - http://seclists.org/fulldisclosure/2014/Jul/139 -CVE-2014-4960 - http://packetstormsecurity.com/files/127497/Joomla-Youtube-Gallery-4.1.7-SQL-Injection.html -CVE-2014-4962 - http://seclists.org/fulldisclosure/2014/Jul/38 -CVE-2014-4963 - http://seclists.org/fulldisclosure/2014/Jul/38 -CVE-2014-4964 - http://seclists.org/fulldisclosure/2014/Jul/38 -CVE-2014-4965 - http://seclists.org/fulldisclosure/2014/Jul/38 -CVE-2014-4968 - http://www.exploit-db.com/exploits/34088/ -CVE-2014-4971 - http://packetstormsecurity.com/files/127535/Microsoft-XP-SP3-BthPan.sys-Arbitrary-Write-Privilege-Escalation.html -CVE-2014-4971 - http://packetstormsecurity.com/files/127536/Microsoft-XP-SP3-MQAC.sys-Arbitrary-Write-Privilege-Escalation.html -CVE-2014-4971 - http://packetstormsecurity.com/files/128674/Microsoft-Bluetooth-Personal-Area-Networking-BthPan.sys-Privilege-Escalation.html -CVE-2014-4971 - http://seclists.org/fulldisclosure/2014/Jul/96 -CVE-2014-4971 - http://seclists.org/fulldisclosure/2014/Jul/97 -CVE-2014-4971 - http://www.exploit-db.com/exploits/34112 -CVE-2014-4971 - http://www.exploit-db.com/exploits/34131 -CVE-2014-4971 - http://www.exploit-db.com/exploits/34982 -CVE-2014-4971 - https://www.korelogic.com/Resources/Advisories/KL-001-2014-002.txt -CVE-2014-4971 - https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt -CVE-2014-4972 - https://g0blin.co.uk/cve-2014-4972/ -CVE-2014-4972 - https://wpvulndb.com/vulnerabilities/8232 -CVE-2014-4974 - http://packetstormsecurity.com/files/128874/ESET-7.0-Kernel-Memory-Leak.html -CVE-2014-4975 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-4976 - http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html -CVE-2014-4977 - http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html -CVE-2014-4977 - http://packetstormsecurity.com/files/137098/Dell-SonicWALL-Scrutinizer-11.01-methodDetail-SQL-Injection.html -CVE-2014-4977 - https://www.exploit-db.com/exploits/39836/ -CVE-2014-4980 - http://packetstormsecurity.com/files/127532/Tenable-Nessus-5.2.7-Parameter-Tampering-Authentication-Bypass.html -CVE-2014-4980 - http://www.halock.com/blog/cve-2014-4980-parameter-tampering-nessus-web-ui/ -CVE-2014-4981 - http://ocert.org/advisories/ocert-2014-005.html -CVE-2014-4981 - http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html -CVE-2014-4981 - http://www.openwall.com/lists/oss-security/2014/07/23/6 -CVE-2014-4982 - http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html -CVE-2014-4982 - http://www.openwall.com/lists/oss-security/2014/07/23/6 -CVE-2014-4984 - http://packetstormsecurity.com/files/127769/Crescendo-Sales-CRM-SQL-Injection.html -CVE-2014-5005 - http://seclists.org/fulldisclosure/2014/Aug/88 -CVE-2014-5005 - http://www.exploit-db.com/exploits/34594 -CVE-2014-5006 - http://seclists.org/fulldisclosure/2014/Aug/88 -CVE-2014-5006 - http://www.exploit-db.com/exploits/34594 -CVE-2014-5007 - http://seclists.org/fulldisclosure/2014/Aug/88 -CVE-2014-5016 - http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html -CVE-2014-5017 - http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html -CVE-2014-5018 - http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html -CVE-2014-5023 - http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ -CVE-2014-5024 - http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html -CVE-2014-5024 - http://seclists.org/fulldisclosure/2014/Jul/125 -CVE-2014-5029 - https://cups.org/str.php?L4455 -CVE-2014-5030 - https://cups.org/str.php?L4455 -CVE-2014-5031 - https://cups.org/str.php?L4455 -CVE-2014-5034 - https://github.com/0pc0deFR/wordpress-sploit-framework/blob/master/exploits/Brute_Force_Login_Protection_1_3_Cross_Site_Request_Forgery -CVE-2014-5035 - http://packetstormsecurity.com/files/127843/Opendaylight-1.0-Local-File-Inclusion-Remote-File-Inclusion.html -CVE-2014-5072 - https://www.wpsecurityauditlog.com/plugin-change-log/ -CVE-2014-5073 - http://packetstormsecurity.com/files/127864/VMTurbo-Operations-Manager-4.6-vmtadmin.cgi-Remote-Command-Execution.html -CVE-2014-5074 - https://www.exploit-db.com/exploits/44693/ -CVE-2014-5076 - https://www.youtube.com/watch?v=MF9lrh1kpDs -CVE-2014-5077 - http://www.ubuntu.com/usn/USN-2335-1 -CVE-2014-5077 - http://www.ubuntu.com/usn/USN-2358-1 -CVE-2014-5081 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5081 - https://www.exploit-db.com/exploits/34238 -CVE-2014-5082 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5082 - http://www.exploit-db.com/exploits/34189 -CVE-2014-5083 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5084 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5085 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5086 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5087 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -CVE-2014-5088 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5089 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5090 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5091 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5091 - http://www.exploit-db.com/exploits/34239 -CVE-2014-5092 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5093 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5094 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -CVE-2014-5097 - http://packetstormsecurity.com/files/127943/ArticleFR-3.0.4-SQL-Injection.html -CVE-2014-5098 - http://packetstormsecurity.com/files/127854/Jamroom-5.2.6-Cross-Site-Scripting.html -CVE-2014-5100 - http://packetstormsecurity.com/files/127523/Omeka-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-5100 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5193.php -CVE-2014-5101 - http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html -CVE-2014-5102 - http://packetstormsecurity.com/files/127537/vBulletin-5.1.2-SQL-Injection.html -CVE-2014-5103 - http://packetstormsecurity.com/files/127568/EventLog-Analyzer-9.0-Build-9000-Cross-Site-Scripting.html -CVE-2014-5104 - http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-5105 - http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-5107 - http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html -CVE-2014-5108 - http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html -CVE-2014-5109 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html -CVE-2014-5110 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html -CVE-2014-5111 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html -CVE-2014-5112 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html -CVE-2014-5113 - http://packetstormsecurity.com/files/127545/MyConnection-Server-MCS-9.7i-Cross-Site-Scripting.html -CVE-2014-5113 - http://treadstonesecurity.blogspot.ca/2014/07/myconnection-server-mcs-reflective-xss.html -CVE-2014-5114 - http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html -CVE-2014-5115 - http://packetstormsecurity.com/files/127642/DirPHP-1.0-Local-File-Inclusion.html -CVE-2014-5115 - http://www.exploit-db.com/exploits/34173 -CVE-2014-5116 - http://www.exploit-db.com/exploits/33384 -CVE-2014-5119 - http://seclists.org/fulldisclosure/2014/Aug/69 -CVE-2014-5120 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-5121 - http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html -CVE-2014-5122 - http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html -CVE-2014-5127 - http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html -CVE-2014-5128 - http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html -CVE-2014-5129 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html -CVE-2014-5130 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html -CVE-2014-5131 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html -CVE-2014-5132 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html -CVE-2014-5138 - https://packetstormsecurity.com/files/128053/Sierra-Library-Services-Platform-1.2_3-XSS-Enumeration.html -CVE-2014-5139 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm -CVE-2014-5140 - http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html -CVE-2014-5140 - http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/ -CVE-2014-5140 - http://www.exploit-db.com/exploits/34552 -CVE-2014-5144 - https://www.exploit-db.com/exploits/36463/ -CVE-2014-5171 - http://packetstormsecurity.com/files/127666/SAP-HANA-XS-Missing-Encryption.html -CVE-2014-5172 - http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html -CVE-2014-5173 - http://packetstormsecurity.com/files/127667/SAP-HANA-IU5-SDK-Authentication-Bypass.html -CVE-2014-5174 - http://packetstormsecurity.com/files/127671/SAP-Netweaver-Business-Warehouse-Missing-Authorization.html -CVE-2014-5176 - http://packetstormsecurity.com/files/127669/SAP-FI-Manager-Self-Service-Hardcoded-Username.html -CVE-2014-5178 - http://packetstormsecurity.com/files/127622/Easy-File-Sharing-Persistent-Cross-Site-Scripting.html -CVE-2014-5188 - http://packetstormsecurity.com/files/127672/Lyris-ListManagerWeb-8.95a-Cross-Site-Scripting.html -CVE-2014-5189 - http://packetstormsecurity.com/files/127640/WordPress-Lead-Octopus-Power-SQL-Injection.html -CVE-2014-5190 - http://packetstormsecurity.com/files/127723/WordPress-SI-CAPTCHA-Cross-Site-Scripting.html -CVE-2014-5192 - http://www.exploit-db.com/exploits/34189 -CVE-2014-5193 - http://www.exploit-db.com/exploits/34189 -CVE-2014-5194 - http://packetstormsecurity.com/files/159715/Sphider-Search-Engine-1.3.6-Remote-Code-Execution.html -CVE-2014-5194 - http://www.exploit-db.com/exploits/34189 -CVE-2014-5196 - https://security.dxw.com/advisories/csrf-and-xss-in-improved-user-search-allow-execution-of-arbitrary-javascript-in-wordpress-admin-area/ -CVE-2014-5200 - http://packetstormsecurity.com/files/127639 -CVE-2014-5201 - http://packetstormsecurity.com/files/127533/WordPress-Gallery-Objects-0.4-SQL-Injection.html -CVE-2014-5201 - http://www.homelab.it/index.php/2014/07/18/wordpress-gallery-objects-0-4-sql-injection/#sthash.ftMVwBVK.dpbs -CVE-2014-5202 - http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html -CVE-2014-5207 - http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html -CVE-2014-5208 - https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A -CVE-2014-5214 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html -CVE-2014-5214 - http://seclists.org/fulldisclosure/2014/Dec/78 -CVE-2014-5215 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html -CVE-2014-5215 - http://seclists.org/fulldisclosure/2014/Dec/78 -CVE-2014-5216 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html -CVE-2014-5216 - http://seclists.org/fulldisclosure/2014/Dec/78 -CVE-2014-5217 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html -CVE-2014-5217 - http://seclists.org/fulldisclosure/2014/Dec/78 -CVE-2014-5234 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html -CVE-2014-5235 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html -CVE-2014-5236 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html -CVE-2014-5237 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html -CVE-2014-5238 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html -CVE-2014-5243 - https://bugzilla.wikimedia.org/show_bug.cgi?id=65778 -CVE-2014-5246 - http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html -CVE-2014-5247 - http://packetstormsecurity.com/files/127851/Ganeti-Insecure-Archive-Permission.html -CVE-2014-5247 - http://www.ocert.org/advisories/ocert-2014-006.html -CVE-2014-5249 - https://www.drupal.org/node/2316717 -CVE-2014-5250 - https://www.drupal.org/node/2316717 -CVE-2014-5257 - http://packetstormsecurity.com/files/128978/Forma-Lms-1.2.1-Cross-Site-Scripting.html -CVE-2014-5258 - http://packetstormsecurity.com/files/128301/webEdition-6.3.8.0-Path-Traversal.html -CVE-2014-5259 - http://packetstormsecurity.com/files/128141/BlackCat-CMS-1.0.3-Cross-Site-Scripting.html -CVE-2014-5269 - https://github.com/plack/Plack/issues/405 -CVE-2014-5275 - http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html -CVE-2014-5276 - http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html -CVE-2014-5284 - http://packetstormsecurity.com/files/129111/OSSEC-2.8-Privilege-Escalation.html -CVE-2014-5284 - https://github.com/ossec/ossec-hids/releases/tag/2.8.1 -CVE-2014-5285 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-5286 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-5287 - http://packetstormsecurity.com/files/131284/Kemp-Load-Master-7.1-16-CSRF-XSS-DoS-Code-Execution.html -CVE-2014-5287 - https://www.exploit-db.com/exploits/36609/ -CVE-2014-5288 - http://packetstormsecurity.com/files/131284/Kemp-Load-Master-7.1-16-CSRF-XSS-DoS-Code-Execution.html -CVE-2014-5288 - https://www.exploit-db.com/exploits/36609/ -CVE-2014-5289 - http://packetstormsecurity.com/files/127912/Senkas-Kolibri-WebServer-2.0-Buffer-Overflow.html -CVE-2014-5297 - http://packetstormsecurity.com/files/128352/X2Engine-4.1.7-PHP-Object-Injection.html -CVE-2014-5298 - http://packetstormsecurity.com/files/128353/X2Engine-4.1.7-Unrestricted-File-Upload.html -CVE-2014-5300 - http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html -CVE-2014-5300 - http://www.exploit-db.com/exploits/34865 -CVE-2014-5301 - http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html -CVE-2014-5301 - http://packetstormsecurity.com/files/130020/ManageEngine-Multiple-Products-Authenticated-File-Upload.html -CVE-2014-5301 - http://seclists.org/fulldisclosure/2015/Jan/5 -CVE-2014-5301 - https://www.exploit-db.com/exploits/35845/ -CVE-2014-5302 - http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html -CVE-2014-5302 - http://seclists.org/fulldisclosure/2015/Jan/12 -CVE-2014-5302 - http://seclists.org/fulldisclosure/2015/Jan/5 -CVE-2014-5307 - http://packetstormsecurity.com/files/127948/Panda-Security-2014-Privilege-Escalation.html -CVE-2014-5308 - http://packetstormsecurity.com/files/128521/TestLink-1.9.11-SQL-Injection.html -CVE-2014-5308 - http://seclists.org/fulldisclosure/2014/Oct/13 -CVE-2014-5332 - http://nvidia.custhelp.com/app/answers/detail/a_id/3618 -CVE-2014-5334 - https://bugs.freenas.org/issues/5844 -CVE-2014-5337 - https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/ -CVE-2014-5338 - http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html -CVE-2014-5339 - http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html -CVE-2014-5340 - http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html -CVE-2014-5343 - http://packetstormsecurity.com/files/127777/Feng-Office-Cross-Site-Scripting.html -CVE-2014-5345 - http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html -CVE-2014-5347 - http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html -CVE-2014-5347 - http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-5348 - http://seclists.org/fulldisclosure/2014/Aug/41 -CVE-2014-5349 - http://www.exploit-db.com/exploits/33951 -CVE-2014-5349 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5190.php -CVE-2014-5350 - http://seclists.org/fulldisclosure/2014/Jul/78 -CVE-2014-5351 - https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca -CVE-2014-5352 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt -CVE-2014-5353 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-5355 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-5355 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-5355 - https://github.com/krb5/krb5/commit/102bb6ebf20f9174130c85c3b052ae104e5073ec -CVE-2014-5360 - http://seclists.org/fulldisclosure/2015/Feb/6 -CVE-2014-5361 - http://packetstormsecurity.com/files/131496/Landesk-Management-Suite-9.5-RFI-CSRF.html -CVE-2014-5362 - http://packetstormsecurity.com/files/131496/Landesk-Management-Suite-9.5-RFI-CSRF.html -CVE-2014-5368 - http://seclists.org/oss-sec/2014/q3/407 -CVE-2014-5370 - http://packetstormsecurity.com/files/131504/BlueDragon-CFChart-Servlet-7.1.1.17759-Directory-Traversal.html -CVE-2014-5370 - https://www.exploit-db.com/exploits/36815/ -CVE-2014-5375 - http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html -CVE-2014-5376 - http://packetstormsecurity.com/files/128485/Moab-Insecure-Message-Signing-Authentication-Bypass.html -CVE-2014-5377 - http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html -CVE-2014-5377 - http://seclists.org/fulldisclosure/2014/Aug/75 -CVE-2014-5377 - http://seclists.org/fulldisclosure/2014/Aug/76 -CVE-2014-5377 - http://seclists.org/fulldisclosure/2014/Aug/84 -CVE-2014-5377 - http://www.exploit-db.com/exploits/34449 -CVE-2014-5380 - http://packetstormsecurity.com/files/128003/Grand-MA-300-Fingerprint-Reader-Weak-PIN-Verification.html -CVE-2014-5380 - http://seclists.org/fulldisclosure/2014/Aug/70 -CVE-2014-5381 - http://packetstormsecurity.com/files/128003/Grand-MA-300-Fingerprint-Reader-Weak-PIN-Verification.html -CVE-2014-5381 - http://seclists.org/fulldisclosure/2014/Aug/70 -CVE-2014-5382 - http://seclists.org/fulldisclosure/2014/Jul/40 -CVE-2014-5385 - http://seclists.org/fulldisclosure/2014/Jul/38 -CVE-2014-5387 - http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html -CVE-2014-5387 - http://seclists.org/fulldisclosure/2014/Nov/2 -CVE-2014-5389 - http://packetstormsecurity.com/files/128525/WordPress-Content-Audit-1.6-Blind-SQL-Injection.html -CVE-2014-5389 - http://seclists.org/fulldisclosure/2014/Oct/8 -CVE-2014-5389 - https://security.dxw.com/advisories/blind-sqli-vulnerability-in-content-audit-could-allow-a-privileged-attacker-to-exfiltrate-password-hashes/ -CVE-2014-5391 - http://packetstormsecurity.com/files/128180/JobScheduler-Cross-Site-Scripting.html -CVE-2014-5391 - http://www.christian-schneider.net/advisories/CVE-2014-5391.txt -CVE-2014-5392 - http://packetstormsecurity.com/files/128181/JobScheduler-XML-eXternal-Entity-Injection.html -CVE-2014-5392 - http://www.christian-schneider.net/advisories/CVE-2014-5392.txt -CVE-2014-5393 - http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html -CVE-2014-5393 - http://www.christian-schneider.net/advisories/CVE-2014-5393.txt -CVE-2014-5395 - https://www.exploit-db.com/exploits/46092/ -CVE-2014-5396 - http://seclists.org/fulldisclosure/2014/Jul/40 -CVE-2014-5408 - https://ics-cert.us-cert.gov/advisories/ICSA-14-303-01 -CVE-2014-5437 - http://seclists.org/fulldisclosure/2014/Dec/57 -CVE-2014-5437 - http://seclists.org/fulldisclosure/2014/Dec/58 -CVE-2014-5438 - http://seclists.org/fulldisclosure/2014/Dec/58 -CVE-2014-5439 - http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html -CVE-2014-5440 - http://packetstormsecurity.com/files/128064/MX-SmartTimer-13.18.5.11-SQL-Injection.html -CVE-2014-5441 - http://packetstormsecurity.com/files/127978/Fatt-Free-CRM-Cross-Site-Scripting.html -CVE-2014-5445 - http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html -CVE-2014-5445 - http://seclists.org/fulldisclosure/2014/Dec/9 -CVE-2014-5446 - http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html -CVE-2014-5446 - http://seclists.org/fulldisclosure/2014/Dec/9 -CVE-2014-5451 - http://packetstormsecurity.com/files/128302/MODX-Revolution-2.3.1-pl-Cross-Site-Scripting.html -CVE-2014-5453 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5191.php -CVE-2014-5454 - http://packetstormsecurity.com/files/127866/SAS-Visual-Analytics-6.4M1-Arbitrary-File-Upload.html -CVE-2014-5455 - http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html -CVE-2014-5455 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php -CVE-2014-5459 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-5460 - http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html -CVE-2014-5460 - http://whitexploit.blogspot.mx/2014/08/wordpress-slideshow-gallery-146-shell.html -CVE-2014-5460 - http://www.exploit-db.com/exploits/34514 -CVE-2014-5462 - http://packetstormsecurity.com/files/129403/OpenEMR-4.1.2-7-SQL-Injection.html -CVE-2014-5462 - http://seclists.org/fulldisclosure/2014/Dec/24 -CVE-2014-5462 - https://github.com/openemr/openemr/issues/1782 -CVE-2014-5464 - http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html -CVE-2014-5465 - http://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-Inclusion.html -CVE-2014-5465 - http://www.exploit-db.com/exploits/34436 -CVE-2014-5468 - http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html -CVE-2014-5468 - http://www.exploit-db.com/exploits/34669 -CVE-2014-5471 - http://www.ubuntu.com/usn/USN-2358-1 -CVE-2014-5472 - http://www.ubuntu.com/usn/USN-2358-1 -CVE-2014-5507 - http://packetstormsecurity.com/files/128806/iBackup-10.0.0.32-Local-Privilege-Escalation.html -CVE-2014-5516 - http://packetstormsecurity.com/files/128342/KonaKart-Storefront-Application-Cross-Site-Request-Forgery.html -CVE-2014-5519 - http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html -CVE-2014-5519 - http://seclists.org/fulldisclosure/2014/Aug/77 -CVE-2014-5519 - http://seclists.org/oss-sec/2014/q3/456 -CVE-2014-5520 - http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html -CVE-2014-5520 - http://seclists.org/fulldisclosure/2014/Aug/78 -CVE-2014-5520 - http://www.openwall.com/lists/oss-security/2014/08/27/4 -CVE-2014-5521 - http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html -CVE-2014-5521 - http://seclists.org/fulldisclosure/2014/Aug/78 -CVE-2014-5521 - http://www.openwall.com/lists/oss-security/2014/08/27/4 -CVE-2014-5524 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5524 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5525 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5525 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5526 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5526 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5527 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5527 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5528 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5528 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5529 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5529 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5531 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5531 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5532 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5532 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5534 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5534 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5535 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5535 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5536 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5536 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5537 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5537 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5538 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5538 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5539 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5539 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5540 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5540 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5541 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5541 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5542 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5542 - http://www.kb.cert.org/vuls/id/638641 -CVE-2014-5542 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5543 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5543 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5544 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5544 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5545 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5545 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5546 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5546 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5547 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5547 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5548 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5548 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5549 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5549 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5550 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5550 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5551 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5551 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5552 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5552 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5553 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5553 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5554 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5554 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5555 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5555 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5556 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5556 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5557 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5557 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5558 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5558 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5559 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5559 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5560 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5560 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5561 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5561 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5562 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5562 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5563 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5563 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5564 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5564 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5565 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5565 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5566 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5566 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5567 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5567 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5568 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5568 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5569 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5569 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5570 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5570 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5571 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5571 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5572 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5572 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5573 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5573 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5574 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5574 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5576 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5576 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5577 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5577 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5578 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5578 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5579 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5579 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5580 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5580 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5581 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5581 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5582 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5582 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5583 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5583 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5584 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5584 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5585 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5585 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5586 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5586 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5587 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5587 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5588 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5588 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5589 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5589 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5590 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5590 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5591 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5591 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5592 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5592 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5593 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5593 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5594 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5594 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5595 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5595 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5596 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5596 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5597 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5597 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5598 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5598 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5599 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5599 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5600 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5600 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5601 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5601 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5602 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5602 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5603 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5603 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5604 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5604 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5605 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5605 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5606 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5606 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5607 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5607 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5608 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5608 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5609 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5609 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5610 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5610 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5611 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5611 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5612 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5612 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5613 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5613 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5614 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5614 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5615 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5615 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5616 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5616 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5617 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5617 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5618 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5618 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5620 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5620 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5621 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5621 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5622 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5622 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5623 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5623 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5624 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5624 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5625 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5625 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5626 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5626 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5627 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5627 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5628 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5628 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5629 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5629 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5630 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5630 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5631 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5631 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5632 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5632 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5633 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5633 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5634 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5634 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5635 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5635 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5636 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5636 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5637 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5637 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5638 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5638 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5639 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5639 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5640 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5640 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5641 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5641 - http://www.kb.cert.org/vuls/id/714937 -CVE-2014-5641 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5642 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5642 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5643 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5643 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5644 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5644 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5645 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5645 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5646 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5646 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5647 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5647 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5648 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5648 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5649 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5649 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5650 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5650 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5651 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5651 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5652 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5652 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5653 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5653 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5654 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5654 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5655 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5655 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5656 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5656 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5657 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5657 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5658 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5658 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5659 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5659 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5660 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5660 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5661 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5661 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5662 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5662 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5663 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5663 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5664 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5664 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5665 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5665 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5666 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5666 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5667 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5667 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5668 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5668 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5669 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5669 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5670 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5670 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5671 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5671 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5672 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5672 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5673 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5673 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5674 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5674 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5675 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5675 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5676 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5676 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5677 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5677 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5678 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5678 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5679 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5679 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5680 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5680 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5681 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5681 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5682 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5682 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5683 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5683 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5684 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5684 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5685 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5685 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5686 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5686 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5687 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5687 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5688 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5688 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5689 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5689 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5690 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5690 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5691 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5691 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5692 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5692 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5693 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5693 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5694 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5694 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5695 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5695 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5696 - http://www.kb.cert.org/vuls/id/148041 -CVE-2014-5696 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5696 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5697 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5697 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5698 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5698 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5699 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5699 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5700 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5700 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5701 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5701 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5702 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5702 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5703 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5703 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5704 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5704 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-5704 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5705 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5705 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5706 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5706 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5707 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5707 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5708 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5708 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5709 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5709 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5710 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5710 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5711 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5711 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5712 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5712 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5713 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5713 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5714 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5714 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5715 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5715 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5716 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5716 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5717 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5717 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5719 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5719 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5720 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5720 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5721 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5721 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5722 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5722 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5723 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5723 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5724 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5724 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5725 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5725 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5726 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5726 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5727 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5727 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5728 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5728 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5729 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5729 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5730 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5730 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5731 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5731 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5732 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5732 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5733 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5733 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5734 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5734 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5735 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5735 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5736 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5736 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5737 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5737 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5738 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5738 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5739 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5739 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5740 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5740 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5741 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5741 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5742 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5742 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5743 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5743 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5744 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5744 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5745 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5745 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5746 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5746 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5747 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5747 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5748 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5748 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5749 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5749 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5750 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5750 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5751 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5751 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5752 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5752 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5753 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5754 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5754 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5755 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5755 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5756 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5756 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5757 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5757 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5758 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5758 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5759 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5759 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5760 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5760 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5761 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5761 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5762 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5762 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5763 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5763 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5764 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5764 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5765 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5765 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5766 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5766 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5767 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5767 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5768 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5768 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5769 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5769 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5770 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5770 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5771 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5771 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5772 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5772 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5773 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5773 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5774 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5774 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5775 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5775 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5776 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5776 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5777 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5777 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5778 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5778 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5779 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5779 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5780 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5780 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5781 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5781 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5782 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5782 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5783 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5783 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5784 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5784 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5785 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5785 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5786 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5786 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5787 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5787 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5788 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5788 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5789 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5789 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5790 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5790 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5791 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5791 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5792 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5792 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5793 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5793 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5794 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5794 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5796 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5796 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5797 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5797 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5798 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5798 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5799 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5799 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5800 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5800 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5801 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5801 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5802 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5802 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5803 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5803 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5804 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5804 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5805 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5805 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5806 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5806 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5807 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5807 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5808 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5808 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5809 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5809 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5810 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5810 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5811 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5811 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5812 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5812 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5813 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5813 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5815 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5815 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5816 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5816 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5817 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5817 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5818 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5818 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5819 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5819 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5820 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5820 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5821 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5821 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5822 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5822 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5823 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5823 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5824 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5824 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5825 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5825 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5826 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5826 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5827 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5827 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5828 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5828 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5829 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5829 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5830 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5830 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5831 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5831 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5832 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5832 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5833 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5833 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5834 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5834 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5835 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5835 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5836 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5836 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5837 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5837 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5838 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5838 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5839 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5839 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5840 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5840 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5841 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5841 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5842 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5842 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5843 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5843 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5844 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5844 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5845 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5845 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5846 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5846 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5847 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5847 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5848 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5848 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5849 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5849 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5850 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5850 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5851 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5851 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5852 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5852 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5853 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5853 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5854 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5854 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5855 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5855 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5856 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5856 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5857 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5857 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5858 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5858 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5859 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5859 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5860 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5860 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5861 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5861 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5862 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5862 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5863 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5863 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5864 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5864 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5865 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5865 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5866 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5866 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5867 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5867 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5868 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5868 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5869 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5869 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5870 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5870 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5871 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5871 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5872 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5872 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5873 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5873 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5874 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5874 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5875 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5875 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5876 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5876 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5877 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5877 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5878 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5878 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5879 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5879 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5881 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5881 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5882 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5882 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5883 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5883 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5884 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5884 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5885 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5885 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5886 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5886 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5887 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5887 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5888 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5888 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5889 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5889 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5890 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5890 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5891 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5891 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5892 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5892 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5893 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5893 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5894 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5894 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5895 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5895 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5896 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5896 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5897 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5897 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5898 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5898 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5899 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5899 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5900 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5900 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5901 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5901 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5902 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5902 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5903 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5903 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5904 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5904 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5905 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5905 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5906 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5906 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5907 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5907 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5908 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5908 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5909 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5909 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5910 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5910 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5911 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5911 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5912 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5912 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5913 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5913 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5914 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5914 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5915 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5915 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5916 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5916 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5917 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5917 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5918 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5918 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5919 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5919 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5920 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5920 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5921 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5921 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5922 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5922 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5923 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5923 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5924 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5924 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5925 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5925 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5926 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5926 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5927 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5927 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5928 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5928 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5929 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5929 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5930 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5930 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5931 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5931 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5932 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5932 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5933 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5933 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5934 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5934 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5935 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5935 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5936 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5936 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5937 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5937 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5938 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5938 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5939 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5939 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5940 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5940 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5941 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5941 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5942 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5942 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5943 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5943 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5944 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5944 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5945 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5945 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5946 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5946 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5947 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5947 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5948 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5948 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5949 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5949 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5950 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5950 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5951 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5951 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5952 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5952 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5953 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5953 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5954 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5954 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5955 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5955 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5956 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5956 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5957 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5957 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5958 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5958 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5959 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5959 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5960 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5960 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5961 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5961 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5962 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5962 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5963 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5963 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5964 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5964 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5965 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5965 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5966 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5966 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5967 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5967 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5968 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5968 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5969 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5969 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5970 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5970 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5971 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5971 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5972 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5972 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5973 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5973 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5974 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5974 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5975 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5975 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5976 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5976 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5977 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5977 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5978 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5978 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5979 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5979 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5980 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5980 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5981 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5981 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5982 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5982 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5983 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5983 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5984 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5984 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5985 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5985 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5986 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5986 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5987 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5987 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5988 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5988 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5989 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5989 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5990 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5990 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5991 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5991 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5992 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5992 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5993 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5993 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5994 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5994 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5995 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5995 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5996 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5996 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5997 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5997 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5998 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5998 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-5999 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-5999 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6000 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6000 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6001 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6001 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6002 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6002 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6003 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6003 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6004 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6004 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6005 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6005 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6006 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6006 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6007 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6007 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6008 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6008 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6009 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6009 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6010 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6010 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6011 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6011 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6012 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6012 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6013 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6013 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6014 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6014 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6015 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6015 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6016 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6016 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6017 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6017 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6018 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6018 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6019 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6019 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6020 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6020 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6021 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6021 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6022 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6022 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6023 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6023 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6024 - http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html -CVE-2014-6024 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6024 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6025 - http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html -CVE-2014-6025 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6025 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6027 - http://www.openwall.com/lists/oss-security/2014/09/02/3 -CVE-2014-6027 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759574 -CVE-2014-6028 - http://www.openwall.com/lists/oss-security/2014/09/02/3 -CVE-2014-6029 - http://www.openwall.com/lists/oss-security/2014/09/02/3 -CVE-2014-6030 - http://packetstormsecurity.com/files/128296/ClassApps-SelectSurvey.net-4.124.004-SQL-Injection.html -CVE-2014-6032 - http://packetstormsecurity.com/files/128915/F5-Big-IP-11.3.0.39.0-XML-External-Entity-Injection-1.html -CVE-2014-6034 - http://seclists.org/fulldisclosure/2014/Sep/110 -CVE-2014-6035 - http://seclists.org/fulldisclosure/2014/Sep/110 -CVE-2014-6036 - http://seclists.org/fulldisclosure/2014/Sep/110 -CVE-2014-6037 - http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html -CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Aug/86 -CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Sep/1 -CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Sep/19 -CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Sep/20 -CVE-2014-6037 - http://www.exploit-db.com/exploits/34519 -CVE-2014-6038 - http://packetstormsecurity.com/files/128996/ManageEngine-EventLog-Analyzer-SQL-Credential-Disclosure.html -CVE-2014-6038 - http://seclists.org/fulldisclosure/2014/Nov/12 -CVE-2014-6039 - http://packetstormsecurity.com/files/128996/ManageEngine-EventLog-Analyzer-SQL-Credential-Disclosure.html -CVE-2014-6039 - http://seclists.org/fulldisclosure/2014/Nov/12 -CVE-2014-6041 - http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html -CVE-2014-6043 - http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html -CVE-2014-6043 - http://seclists.org/fulldisclosure/2014/Aug/86 -CVE-2014-6043 - http://seclists.org/fulldisclosure/2014/Sep/19 -CVE-2014-6043 - http://www.exploit-db.com/exploits/34519 -CVE-2014-6051 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6052 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6059 - http://packetstormsecurity.com/files/128137/WordPress-Advanced-Access-Manager-2.8.2-File-Write-Code-Execution.html -CVE-2014-6070 - http://packetstormsecurity.com/files/128121/LogAnalyzer-3.6.5-Cross-Site-Scripting.html -CVE-2014-6070 - http://seclists.org/fulldisclosure/2014/Sep/17 -CVE-2014-6070 - http://www.exploit-db.com/exploits/34525 -CVE-2014-6071 - http://seclists.org/fulldisclosure/2014/Sep/10 -CVE-2014-6071 - https://bugzilla.redhat.com/show_bug.cgi?id=1136683 -CVE-2014-6071 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2014-6130 - http://www.kb.cert.org/vuls/id/432608 -CVE-2014-6140 - http://packetstormsecurity.com/files/129349/IBM-Endpoint-Manager-For-Mobile-Devices-Code-Execution.html -CVE-2014-6140 - http://seclists.org/fulldisclosure/2014/Dec/3 -CVE-2014-6140 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-012/-unauthenticated-remote-code-execution-in-ibm-endpoint-manager-mobile-device-management-components -CVE-2014-6173 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR50241 -CVE-2014-6230 - http://seclists.org/fulldisclosure/2014/Sep/60 -CVE-2014-6230 - https://security.dxw.com/advisories/vulnerability-in-wp-ban-allows-visitors-to-bypass-the-ip-blacklist-in-some-configurations/ -CVE-2014-6242 - http://packetstormsecurity.com/files/128419/All-In-One-WP-Security-3.8.2-SQL-Injection.html -CVE-2014-6242 - http://www.exploit-db.com/exploits/34781 -CVE-2014-6243 - http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html -CVE-2014-6252 - https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/ -CVE-2014-6253 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6253 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6254 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6254 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6255 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6255 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6256 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6256 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6257 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6257 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6258 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6258 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6259 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6259 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6260 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6260 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6261 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6261 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6262 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-6262 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-6270 - http://www.ubuntu.com/usn/USN-2921-1 -CVE-2014-6271 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html -CVE-2014-6271 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -CVE-2014-6271 - http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html -CVE-2014-6271 - http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html -CVE-2014-6271 - http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html -CVE-2014-6271 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 -CVE-2014-6271 - http://www.qnap.com/i/en/support/con_show.php?cid=61 -CVE-2014-6271 - https://hackerone.com/reports/29839 -CVE-2014-6271 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2014-6271 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 -CVE-2014-6271 - https://www.exploit-db.com/exploits/34879/ -CVE-2014-6271 - https://www.exploit-db.com/exploits/37816/ -CVE-2014-6271 - https://www.exploit-db.com/exploits/38849/ -CVE-2014-6271 - https://www.exploit-db.com/exploits/39918/ -CVE-2014-6271 - https://www.exploit-db.com/exploits/40619/ -CVE-2014-6271 - https://www.exploit-db.com/exploits/40938/ -CVE-2014-6271 - https://www.exploit-db.com/exploits/42938/ -CVE-2014-6273 - http://www.ubuntu.com/usn/USN-2353-1 -CVE-2014-6277 - http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html -CVE-2014-6277 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -CVE-2014-6277 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 -CVE-2014-6277 - http://www.qnap.com/i/en/support/con_show.php?cid=61 -CVE-2014-6277 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 -CVE-2014-6278 - http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html -CVE-2014-6278 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -CVE-2014-6278 - http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html -CVE-2014-6278 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 -CVE-2014-6278 - http://www.qnap.com/i/en/support/con_show.php?cid=61 -CVE-2014-6278 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 -CVE-2014-6278 - https://www.exploit-db.com/exploits/39568/ -CVE-2014-6278 - https://www.exploit-db.com/exploits/39887/ -CVE-2014-6280 - http://packetstormsecurity.com/files/128286/OsClass-3.4.1-Cross-Site-Scripting.html -CVE-2014-6280 - https://www.netsparker.com/xss-vulnerabilities-in-osclass/ -CVE-2014-6284 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-004/?fid=6200 -CVE-2014-6287 - http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html -CVE-2014-6287 - http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html -CVE-2014-6287 - http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html -CVE-2014-6287 - http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html -CVE-2014-6287 - https://www.exploit-db.com/exploits/39161/ -CVE-2014-6308 - http://packetstormsecurity.com/files/128285/OsClass-3.4.1-Local-File-Inclusion.html -CVE-2014-6308 - https://www.netsparker.com/lfi-vulnerability-in-osclass/ -CVE-2014-6312 - http://seclists.org/fulldisclosure/2014/Sep/58 -CVE-2014-6312 - http://www.exploit-db.com/exploits/34762 -CVE-2014-6312 - https://security.dxw.com/advisories/csrfxss-vulnerablity-in-login-widget-with-shortcode-allows-unauthenticated-attackers-to-do-anything-an-admin-can-do -CVE-2014-6313 - http://seclists.org/fulldisclosure/2014/Sep/59 -CVE-2014-6313 - https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do -CVE-2014-6315 - http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html -CVE-2014-6321 - http://www.kb.cert.org/vuls/id/505120 -CVE-2014-6321 - http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/ -CVE-2014-6332 - http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html -CVE-2014-6332 - http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html -CVE-2014-6332 - http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html -CVE-2014-6332 - http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html -CVE-2014-6332 - http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html -CVE-2014-6332 - http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows -CVE-2014-6332 - http://www.kb.cert.org/vuls/id/158647 -CVE-2014-6332 - https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt -CVE-2014-6332 - https://www.exploit-db.com/exploits/37668/ -CVE-2014-6332 - https://www.exploit-db.com/exploits/37800/ -CVE-2014-6332 - https://www.exploit-db.com/exploits/38500/ -CVE-2014-6332 - https://www.exploit-db.com/exploits/38512/ -CVE-2014-6363 - https://www.exploit-db.com/exploits/40721/ -CVE-2014-6389 - http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html -CVE-2014-6389 - http://seclists.org/fulldisclosure/2014/Oct/7 -CVE-2014-6389 - http://www.exploit-db.com/exploits/34861 -CVE-2014-6392 - http://seclists.org/fulldisclosure/2014/Sep/13 -CVE-2014-6409 - http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html -CVE-2014-6409 - http://seclists.org/fulldisclosure/2014/Sep/71 -CVE-2014-6409 - http://www.exploit-db.com/exploits/34718 -CVE-2014-6412 - http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html -CVE-2014-6412 - http://seclists.org/fulldisclosure/2015/Feb/42 -CVE-2014-6413 - http://seclists.org/fulldisclosure/2014/Sep/70 -CVE-2014-6413 - https://packetstormsecurity.com/files/128310 -CVE-2014-6420 - http://packetstormsecurity.com/files/128293/Livefyre-LiveComments-3.0-Cross-Site-Scripting.html -CVE-2014-6435 - http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html -CVE-2014-6436 - http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html -CVE-2014-6437 - http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html -CVE-2014-6439 - http://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html -CVE-2014-6439 - https://www.elastic.co/community/security/ -CVE-2014-6444 - https://research.g0blin.co.uk/cve-2014-6444/ -CVE-2014-6444 - https://wpvulndb.com/vulnerabilities/8233 -CVE-2014-6445 - http://research.g0blin.co.uk/cve-2014-6445/ -CVE-2014-6446 - http://packetstormsecurity.com/files/131002/Wordpress-InfusionSoft-Shell-Upload.html -CVE-2014-6446 - http://research.g0blin.co.uk/cve-2014-6446/ -CVE-2014-6452 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6453 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6454 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6455 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6456 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6456 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6457 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6457 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6458 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6458 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6459 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6460 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6461 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6462 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6463 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6463 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6464 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6464 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6464 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6465 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6466 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6466 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6467 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6468 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6469 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6469 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6469 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6470 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6471 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6472 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6473 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6474 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6475 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6476 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6476 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6477 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6478 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6478 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6479 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6480 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6481 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6482 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6483 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6484 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6484 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6485 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6486 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6487 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6488 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6489 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6490 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6491 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6491 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6491 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6492 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6492 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6493 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6493 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6494 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6494 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6494 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6495 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6495 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6496 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6496 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6497 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6498 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6499 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6500 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6500 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6500 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6501 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6502 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6502 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6503 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6503 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6504 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6505 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6505 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6506 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6506 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6507 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6507 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6507 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6508 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6509 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6510 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6511 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6511 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-6511 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6512 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6512 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6513 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6513 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6514 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6515 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6515 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6516 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6517 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6518 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6519 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6520 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6520 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6521 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6522 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6523 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6524 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6525 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6526 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6527 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6527 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6528 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6529 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6530 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6530 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6531 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6531 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6532 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6532 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6533 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6534 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6535 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6536 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6537 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6538 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6539 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6540 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6541 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6542 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6543 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6544 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6545 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6546 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6547 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6548 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6549 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6550 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6551 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6551 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6552 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6553 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6554 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6555 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6555 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6555 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6556 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6557 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6558 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 -CVE-2014-6558 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6559 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6559 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6559 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6560 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6561 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6562 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6563 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6564 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -CVE-2014-6565 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6566 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6567 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6568 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-6568 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-6568 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6569 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6570 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6571 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6572 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6573 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6574 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6575 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6576 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6577 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6578 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6579 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6580 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6581 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6582 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6583 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6584 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6585 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-6585 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6585 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2014-6586 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6587 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6587 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2014-6588 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6589 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6590 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6591 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-6591 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6591 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2014-6592 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6593 - http://packetstormsecurity.com/files/134251/Java-Secure-Socket-Extension-JSSE-SKIP-TLS.html -CVE-2014-6593 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6593 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2014-6593 - https://www.exploit-db.com/exploits/38641/ -CVE-2014-6594 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6595 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6596 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6597 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6598 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6599 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6600 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6601 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2014-6601 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2014-6602 - http://packetstormsecurity.com/files/128320/Nokia-Asha-501-Lock-Bypass.html -CVE-2014-6603 - http://packetstormsecurity.com/files/128382/Suricata-2.0.3-Out-Of-Bounds-Access.html -CVE-2014-6607 - http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html -CVE-2014-6607 - http://seclists.org/fulldisclosure/2014/Sep/71 -CVE-2014-6607 - http://www.exploit-db.com/exploits/34718 -CVE-2014-6616 - http://packetstormsecurity.com/files/128975/Softing-FG-100-PB-Cross-Site-Scripting.html -CVE-2014-6617 - http://packetstormsecurity.com/files/128976/Softing-FG-100-PB-Hardcoded-Backdoor.html -CVE-2014-6618 - http://packetstormsecurity.com/files/128336/Your-Online-Shop-Cross-Site-Scripting.html -CVE-2014-6619 - http://packetstormsecurity.com/files/128337 -CVE-2014-6619 - http://www.exploit-db.com/exploits/34760 -CVE-2014-6635 - http://packetstormsecurity.com/files/128335/Exponent-CMS-2.3.0-Cross-Site-Scripting.html -CVE-2014-6636 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6636 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6637 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6637 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6638 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6638 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6639 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6639 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6640 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6640 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6641 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6641 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6642 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6642 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6643 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6643 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6645 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6645 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6646 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6646 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6647 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6647 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6648 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6648 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6649 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6649 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6650 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6650 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6651 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6651 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6652 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6652 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6653 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6653 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6654 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6654 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6655 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6655 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6656 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6656 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6657 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6657 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6658 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6658 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6659 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6659 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6660 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6660 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6661 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6661 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6662 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6662 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6663 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6663 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6664 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6664 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6665 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6665 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6666 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6666 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6667 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6667 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6668 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6668 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6669 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6669 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6670 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6670 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6671 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6671 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6672 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6672 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6673 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6673 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6674 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6674 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6675 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6675 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6676 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6676 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6677 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6677 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6678 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6678 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6679 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6679 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6680 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6680 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6681 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6681 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6682 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6682 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6683 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6683 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6684 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6684 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6685 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6685 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6686 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6686 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6687 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6687 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6688 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6688 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6689 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6689 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6690 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6690 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6691 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6691 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6692 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6692 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6693 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6693 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6694 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6694 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6695 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6695 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6696 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6696 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6697 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6697 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6698 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6698 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6699 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6699 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6700 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6700 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6701 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6701 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6702 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6702 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6703 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6703 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6704 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6704 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6705 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6705 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6706 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6706 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6707 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6707 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6708 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6708 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6709 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6709 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6710 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6710 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6711 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6711 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6712 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6712 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6713 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6713 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6714 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6714 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6715 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6715 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6716 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6716 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6717 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6717 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6718 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6718 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6719 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6719 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6720 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6720 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6721 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6721 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6722 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6722 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6723 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6723 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6724 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6724 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6725 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6725 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6726 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6726 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6727 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6727 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6728 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6728 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6729 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6729 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6730 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6730 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6731 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6731 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6732 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6732 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6733 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6733 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6734 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6734 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6735 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6735 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6736 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6736 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6737 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6737 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6738 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6738 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6739 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6739 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6740 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6740 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6741 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6741 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6742 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6742 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6743 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6743 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6744 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6744 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6745 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6745 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6746 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6746 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6747 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6747 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6748 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6748 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6749 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6749 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6750 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6750 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6751 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6751 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6752 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6752 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6753 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6754 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6754 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6755 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6755 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6756 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6756 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6757 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6757 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6758 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6758 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6759 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6759 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6760 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6760 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6761 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6761 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6762 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6762 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6763 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6763 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6764 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6764 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6765 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6765 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6766 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6766 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6767 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6767 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6768 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6768 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6769 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6769 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6770 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6770 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6771 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6771 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6772 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6772 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6773 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6773 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6774 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6774 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6775 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6775 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6776 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6776 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6777 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6777 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6778 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6778 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6779 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6779 - http://www.kb.cert.org/vuls/id/781201 -CVE-2014-6779 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6780 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6780 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6781 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6781 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6782 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6782 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6783 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6783 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6784 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6784 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6785 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6785 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6786 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6786 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6787 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6787 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6788 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6788 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6789 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6789 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6790 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6790 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6791 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6791 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6792 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6792 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6793 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6793 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6794 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6794 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6795 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6795 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6796 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6796 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6797 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6797 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6798 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6798 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6799 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6799 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6800 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6800 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6801 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6801 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6802 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6802 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6803 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6803 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6804 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6804 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6805 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6805 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6806 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6806 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6807 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6807 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6808 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6808 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6810 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6810 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6812 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6812 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6813 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6813 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6814 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6814 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6815 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6815 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6816 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6816 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6817 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6817 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6818 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6818 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6819 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6819 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6820 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6820 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6821 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6821 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6822 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6822 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6823 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6823 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6824 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6824 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6825 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6825 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6826 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6826 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6827 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6827 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6828 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6828 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6829 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6829 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6830 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6830 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6831 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6831 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6832 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6832 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6833 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6833 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6834 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6834 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6835 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6835 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6836 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6836 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6837 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6837 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6838 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6838 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6839 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6839 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6840 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6840 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6841 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6841 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6842 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6842 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6843 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6843 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6844 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6844 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6845 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6845 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6846 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6846 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6847 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6847 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6848 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6848 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6850 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6850 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6851 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6851 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6852 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6852 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6853 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6853 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6854 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6854 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6855 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6855 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6856 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6856 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6857 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6857 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6858 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6858 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6859 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6859 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6860 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6860 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6861 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6861 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6862 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6862 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6863 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6863 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6864 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6864 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6865 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6865 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6866 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6866 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6867 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6867 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6868 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6868 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6869 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6869 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6870 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6870 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6871 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6871 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6872 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6872 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6873 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6873 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6874 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6874 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6875 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6875 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6876 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6876 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6877 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6877 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6878 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6878 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6879 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6879 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6880 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6880 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6881 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6881 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6882 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6882 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6883 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6883 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6884 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6884 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6885 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6885 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6886 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6886 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6887 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6887 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6888 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6888 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6889 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6889 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6890 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6890 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6891 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6891 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6892 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6892 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6893 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6893 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6894 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6894 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6895 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6895 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6896 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6896 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6897 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6897 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6898 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6898 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6899 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6899 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6900 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6900 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6901 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6901 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6902 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6902 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6903 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6903 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6904 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6904 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6905 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6905 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6906 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6906 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6907 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6907 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6908 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6908 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6909 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6909 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6910 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6910 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6911 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6911 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6912 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6912 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6913 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6913 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6914 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6914 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6916 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6916 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6917 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6917 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6918 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6918 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6919 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6919 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6920 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6920 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6921 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6921 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6922 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6922 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6923 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6923 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6924 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6924 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6925 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6925 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6926 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6926 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6927 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6927 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6928 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6928 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6929 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6929 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6930 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6930 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6931 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6931 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6932 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6932 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6933 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6933 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6934 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6934 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6935 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6935 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6936 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6936 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6937 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6937 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6938 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6938 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6939 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6939 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6940 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6940 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6941 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6941 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6942 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6942 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6943 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6943 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6944 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6944 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6945 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6945 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6946 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6946 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6947 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6947 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6948 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6948 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6949 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6949 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6950 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6950 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6951 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6951 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6952 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6952 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6953 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6953 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6954 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6954 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6955 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6955 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6956 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6956 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6957 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6957 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6958 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6958 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6959 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6959 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6960 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6960 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6961 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6961 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6962 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6962 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6963 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6963 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6964 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6964 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6965 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6965 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6966 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6966 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6967 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6967 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6968 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6968 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6969 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6969 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6970 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6970 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6971 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6971 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6972 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6972 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6973 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6973 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6974 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6974 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6975 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6975 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6976 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6976 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6977 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6977 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6978 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6978 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6979 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6979 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6980 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6980 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6981 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6981 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6982 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6982 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6983 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6983 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6984 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6984 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6985 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6985 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6986 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6986 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6987 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6987 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6988 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6988 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6989 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6989 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6990 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6990 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6991 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6991 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6992 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6992 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6993 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6993 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6994 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6994 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6995 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6995 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6996 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6996 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6997 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6997 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6998 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6998 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-6999 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-6999 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7000 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7000 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7001 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7001 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7002 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7002 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7003 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7003 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7004 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7004 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7005 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7005 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7006 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7006 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7007 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7007 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7008 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7008 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7009 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7009 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7010 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7010 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7011 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7011 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7012 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7012 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7013 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7013 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7015 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7015 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7016 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7016 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7017 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7017 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7018 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7018 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7019 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7019 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7020 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7020 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7021 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7021 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7022 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7022 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7023 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7023 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7024 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7024 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7025 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7025 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7026 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7026 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7027 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7027 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7028 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7028 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7029 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7029 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7030 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7030 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7031 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7031 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7032 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7032 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7033 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7033 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7034 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7034 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7035 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7035 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7036 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7036 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7037 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7037 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7038 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7038 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7039 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7039 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7040 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7040 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7041 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7041 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7042 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7042 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7043 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7043 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7044 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7044 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7045 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7045 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7046 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7046 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7047 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7047 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7048 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7048 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7049 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7049 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7050 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7050 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7052 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7052 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7053 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7053 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7054 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7054 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7055 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7055 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7056 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7056 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7057 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7057 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7058 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7058 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7059 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7059 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7060 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7060 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7061 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7061 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7062 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7062 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7063 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7063 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7064 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7064 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7065 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7065 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7066 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7066 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7067 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7067 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7068 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7068 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7069 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7069 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7070 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7070 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7071 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7071 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7072 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7072 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7073 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7073 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7075 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7075 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7076 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7076 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7077 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7077 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7078 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7078 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7079 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7079 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7080 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7080 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7082 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7082 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7083 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7083 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7084 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7084 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7085 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7085 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7086 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7086 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7087 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7087 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7088 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7088 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7089 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7089 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7090 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7090 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7091 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7091 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7092 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7092 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7093 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7093 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7098 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7098 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7099 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7099 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7100 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7100 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7101 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7101 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7102 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7102 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7103 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7103 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7104 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7104 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7106 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7106 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7107 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7107 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7108 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7108 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7109 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7109 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7111 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7111 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7113 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7113 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7115 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7115 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7116 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7116 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7117 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7117 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7118 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7118 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7119 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7119 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7120 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7120 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7121 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7121 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7122 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7122 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7123 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7123 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7124 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7124 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7125 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7125 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7127 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7127 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7128 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7128 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7129 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7129 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7131 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7131 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7132 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7132 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7134 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7134 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7135 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7135 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7136 - http://packetstormsecurity.com/files/129474/K7-Computing-Multiple-Products-K7FWFilt.sys-Privilege-Escalation.html -CVE-2014-7137 - http://packetstormsecurity.com/files/129175/Dolibarr-ERP-And-CRM-3.5.3-SQL-Injection.html -CVE-2014-7138 - http://packetstormsecurity.com/files/128626/WordPress-Google-Calendar-Events-2.0.1-Cross-Site-Scripting.html -CVE-2014-7139 - http://packetstormsecurity.com/files/128625/WordPress-Contact-Form-DB-2.8.13-Cross-Site-Scripting.html -CVE-2014-7145 - http://www.ubuntu.com/usn/USN-2394-1 -CVE-2014-7146 - http://www.mantisbt.org/bugs/view.php?id=17725 -CVE-2014-7151 - https://research.g0blin.co.uk/cve-2014-7151/ -CVE-2014-7151 - https://wpvulndb.com/vulnerabilities/8237 -CVE-2014-7152 - http://research.g0blin.co.uk/cve-2014-7152/ -CVE-2014-7153 - http://packetstormsecurity.com/files/128118/WordPress-Huge-IT-Image-Gallery-1.0.0-SQL-Injection.html -CVE-2014-7157 - http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html -CVE-2014-7157 - http://seclists.org/fulldisclosure/2014/Sep/108 -CVE-2014-7158 - http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html -CVE-2014-7158 - http://seclists.org/fulldisclosure/2014/Sep/108 -CVE-2014-7169 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html -CVE-2014-7169 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -CVE-2014-7169 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 -CVE-2014-7169 - http://www.qnap.com/i/en/support/con_show.php?cid=61 -CVE-2014-7169 - http://www.ubuntu.com/usn/USN-2363-1 -CVE-2014-7169 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2014-7169 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 -CVE-2014-7169 - https://www.exploit-db.com/exploits/34879/ -CVE-2014-7173 - https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html -CVE-2014-7174 - https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html -CVE-2014-7175 - https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html -CVE-2014-7176 - http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html -CVE-2014-7177 - http://seclists.org/fulldisclosure/2014/Oct/120 -CVE-2014-7178 - http://seclists.org/fulldisclosure/2014/Oct/121 -CVE-2014-7180 - http://packetstormsecurity.com/files/128819/ElectricCommander-4.2.4.71224-Privilege-Escalation.html -CVE-2014-7181 - http://packetstormsecurity.com/files/128693/WordPress-MaxButtons-1.26.0-Cross-Site-Scripting.html -CVE-2014-7182 - http://packetstormsecurity.com/files/128694/WordPress-WP-Google-Maps-6.0.26-Cross-Site-Scripting.html -CVE-2014-7183 - http://packetstormsecurity.com/files/128768/LiteCart-1.1.2.1-Cross-Site-Scripting.html -CVE-2014-7183 - https://www.netsparker.com/xss-vulnerabilities-in-litecart/ -CVE-2014-7185 - http://www.openwall.com/lists/oss-security/2014/09/23/5 -CVE-2014-7185 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-7185 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-7185 - https://bugzilla.redhat.com/show_bug.cgi?id=1146026 -CVE-2014-7186 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html -CVE-2014-7186 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -CVE-2014-7186 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 -CVE-2014-7186 - http://www.qnap.com/i/en/support/con_show.php?cid=61 -CVE-2014-7186 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 -CVE-2014-7187 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html -CVE-2014-7187 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -CVE-2014-7187 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 -CVE-2014-7187 - http://www.qnap.com/i/en/support/con_show.php?cid=61 -CVE-2014-7187 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 -CVE-2014-7188 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf -CVE-2014-7190 - http://packetstormsecurity.com/files/128455/Openfiler-2.99.1-Denial-Of-Service.html -CVE-2014-7190 - http://seclists.org/fulldisclosure/2014/Sep/109 -CVE-2014-7191 - https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8 -CVE-2014-7194 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-7195 - http://www.tibco.com/mk/advisory.jsp -CVE-2014-7200 - http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-7200 - http://seclists.org/fulldisclosure/2014/Sep/89 -CVE-2014-7201 - http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-7201 - http://seclists.org/fulldisclosure/2014/Sep/89 -CVE-2014-7202 - https://github.com/zeromq/libzmq/issues/1190 -CVE-2014-7205 - https://www.exploit-db.com/exploits/40689/ -CVE-2014-7208 - http://seclists.org/fulldisclosure/2014/Dec/77 -CVE-2014-7208 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-7216 - http://packetstormsecurity.com/files/133443/Yahoo-Messenger-11.5.0.228-Buffer-Overflow.html -CVE-2014-7216 - http://seclists.org/fulldisclosure/2015/Sep/24 -CVE-2014-7216 - https://www.rcesecurity.com/2015/09/cve-2014-7216-a-journey-through-yahoos-bug-bounty-program/ -CVE-2014-7221 - https://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html -CVE-2014-7222 - http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html -CVE-2014-7226 - http://packetstormsecurity.com/files/128532/HTTP-File-Server-2.3a-2.3b-2.3c-Remote-Command-Execution.html -CVE-2014-7226 - http://www.exploit-db.com/exploits/34852 -CVE-2014-7228 - http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/ -CVE-2014-7228 - https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html -CVE-2014-7235 - http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html -CVE-2014-7235 - https://www.exploit-db.com/exploits/41005/ -CVE-2014-7236 - http://packetstormsecurity.com/files/128623/Twiki-Perl-Code-Execution.html -CVE-2014-7238 - https://wpvulndb.com/vulnerabilities/8235 -CVE-2014-7240 - https://g0blin.co.uk/cve-2014-7240/ -CVE-2014-7240 - https://wpvulndb.com/vulnerabilities/8234 -CVE-2014-7271 - https://github.com/sddm/sddm/pull/279/files -CVE-2014-7272 - https://github.com/sddm/sddm/pull/280 -CVE-2014-7277 - http://packetstormsecurity.com/files/128551/ZyXEL-SBG-3300-Security-Gateway-Cross-Site-Scripting.html -CVE-2014-7278 - http://packetstormsecurity.com/files/128550/ZyXEL-SBG-3300-Security-Gateway-Denial-Of-Service.html -CVE-2014-7280 - http://packetstormsecurity.com/files/128579/Nessus-Web-UI-2.3.3-Cross-Site-Scripting.html -CVE-2014-7280 - http://seclists.org/fulldisclosure/2014/Oct/26 -CVE-2014-7280 - http://www.exploit-db.com/exploits/34929 -CVE-2014-7280 - http://www.tenable.com/security/tns-2014-08 -CVE-2014-7281 - http://packetstormsecurity.com/files/128671/Tenda-A32-Cross-Site-Request-Forgery.html -CVE-2014-7284 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 -CVE-2014-7285 - http://packetstormsecurity.com/files/130612/Symantec-Web-Gateway-5-restore.php-Command-Injection.html -CVE-2014-7289 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html -CVE-2014-7289 - http://seclists.org/fulldisclosure/2015/Jan/91 -CVE-2014-7290 - http://packetstormsecurity.com/files/129114/Atlas-Systems-Aeon-3.5-3.6-Cross-Site-Scripting.html -CVE-2014-7290 - http://seclists.org/fulldisclosure/2014/Nov/32 -CVE-2014-7292 - http://packetstormsecurity.com/files/128749/Newtelligence-dasBlog-2.3-Open-Redirect.html -CVE-2014-7293 - http://seclists.org/fulldisclosure/2014/Dec/125 -CVE-2014-7294 - http://packetstormsecurity.com/files/129756/Ex-Libris-Patron-Directory-Services-2.1-Open-Redirect.html -CVE-2014-7294 - http://seclists.org/fulldisclosure/2014/Dec/127 -CVE-2014-7297 - https://wpvulndb.com/vulnerabilities/9809 -CVE-2014-7298 - http://www.centrify.com/support/announcements.asp#20141014 -CVE-2014-7301 - https://packetstormsecurity.com/files/129466/SGI-Tempo-Database-Password-Disclosure.html -CVE-2014-7302 - http://packetstormsecurity.com/files/129465/SGI-Tempo-vx-Setuid-Privilege-Escalation.html -CVE-2014-7302 - https://labs.mwrinfosecurity.com/advisories/2014/12/02/sgi-suid-root-privilege-escalation/ -CVE-2014-7303 - https://packetstormsecurity.com/files/129467/SGI-Tempo-Database-Exposure.html -CVE-2014-7307 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7307 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7309 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7309 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7310 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7310 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7313 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7313 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7314 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7314 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7315 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7315 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7316 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7316 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7317 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7317 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7320 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7320 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7321 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7321 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7323 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7323 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7325 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7325 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7326 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7326 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7327 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7327 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7328 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7328 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7329 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7329 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7330 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7330 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7331 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7331 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7333 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7333 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7334 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7334 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7335 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7335 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7336 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7336 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7337 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7337 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7338 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7338 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7339 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7339 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7340 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7340 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7341 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7341 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7342 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7342 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7344 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7344 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7345 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7345 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7346 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7346 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7348 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7348 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7351 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7351 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7352 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7352 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7353 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7353 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7354 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7354 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7357 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7357 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7358 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7358 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7359 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7359 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7360 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7360 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7361 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7361 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7362 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7362 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7364 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7364 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7366 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7366 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7367 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7367 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7368 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7368 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7369 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7369 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7370 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7370 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7371 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7371 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7372 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7372 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7373 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7373 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7374 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7374 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7375 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7375 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7376 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7376 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7378 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7378 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7379 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7379 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7380 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7380 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7382 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7382 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7384 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7384 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7385 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7385 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7387 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7387 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7388 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7388 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7389 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7389 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7390 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7390 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7391 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7391 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7392 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7392 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7393 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7393 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7394 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7394 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7395 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7395 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7396 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7396 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7397 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7397 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7398 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7398 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7399 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7399 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7402 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7402 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7403 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7403 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7405 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7405 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7406 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7406 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7407 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7407 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7408 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7408 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7409 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7409 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7410 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7410 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7413 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7413 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7414 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7414 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7415 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7415 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7416 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7416 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7417 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7417 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7418 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7418 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7419 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7419 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7420 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7420 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7421 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7421 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7422 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7422 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7423 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7423 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7424 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7424 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7425 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7425 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7427 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7427 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7428 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7428 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7430 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7430 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7431 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7431 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7432 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7432 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7433 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7433 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7434 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7434 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7435 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7435 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7436 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7436 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7437 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7437 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7439 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7439 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7441 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7441 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7443 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7443 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7444 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7444 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7445 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7445 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7446 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7446 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7447 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7447 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7448 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7448 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7449 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7449 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7450 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7450 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7452 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7452 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7454 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7454 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7455 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7455 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7456 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7456 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7457 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7457 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7458 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7458 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7459 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7459 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7460 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7460 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7461 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7461 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7462 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7462 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7463 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7463 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7464 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7464 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7465 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7465 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7466 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7466 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7467 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7467 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7468 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7468 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7469 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7469 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7470 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7470 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7471 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7471 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7472 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7472 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7475 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7475 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7476 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7476 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7478 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7478 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7481 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7481 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7483 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7483 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7484 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7484 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7485 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7485 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7486 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7486 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7487 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7487 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7488 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7488 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7490 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7490 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7491 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7491 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7492 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7492 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7493 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7493 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7494 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7494 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7495 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7495 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7497 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7498 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7498 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7499 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7499 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7501 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7501 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7502 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7502 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7505 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7505 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7506 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7506 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7507 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7507 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7508 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7508 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7509 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7509 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7510 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7510 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7513 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7513 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7515 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7515 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7516 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7516 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7517 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7517 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7518 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7518 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7519 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7519 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7520 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7520 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7521 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7521 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7522 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7522 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7523 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7523 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7524 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7524 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7525 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7525 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7526 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7526 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7527 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7527 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7528 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7528 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7529 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7529 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7530 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7530 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7532 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7532 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7533 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7533 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7534 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7534 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7535 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7535 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7536 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7536 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7538 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7538 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7539 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7539 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7542 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7542 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7543 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7543 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7544 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7544 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7546 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7546 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7547 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7547 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7550 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7550 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7551 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7551 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7552 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7552 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7553 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7553 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7554 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7554 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7555 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7555 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7557 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7557 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7558 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7558 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7559 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7559 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7560 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7560 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7562 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7562 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7563 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7563 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7564 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7564 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7565 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7565 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7566 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7566 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7567 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7567 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7568 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7568 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7569 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7569 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7570 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7570 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7571 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7571 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7572 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7572 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7573 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7573 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7575 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7575 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7576 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7576 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7577 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7577 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7578 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7578 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7580 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7580 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7581 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7581 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7582 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7582 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7584 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7584 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7585 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7585 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7587 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7587 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7589 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7589 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7590 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7590 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7591 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7591 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7592 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7592 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7593 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7593 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7595 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7595 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7596 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7596 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7597 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7597 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7598 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7598 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7602 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7602 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7603 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7603 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7604 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7604 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7605 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7605 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7606 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7606 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7607 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7607 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7608 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7608 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7609 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7609 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7610 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7610 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7611 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7611 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7612 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7612 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7613 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7613 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7614 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7614 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7616 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7616 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7617 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7617 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7618 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7618 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7620 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7620 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7621 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7621 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7622 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7622 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7624 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7624 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7626 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7626 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7628 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7628 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7629 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7629 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7630 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7630 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7631 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7631 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7632 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7632 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7633 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7633 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7634 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7634 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7636 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7636 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7638 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7638 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7640 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7640 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7642 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7642 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7643 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7643 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7644 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7644 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7646 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7646 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7647 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7647 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7648 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7648 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7649 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7649 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7650 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7650 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7652 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7652 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7655 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7655 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7656 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7656 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7659 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7659 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7660 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7660 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7661 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7661 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7663 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7663 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7664 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7664 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7666 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7666 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7667 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7667 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7668 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7668 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7670 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7670 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7671 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7671 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7674 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7674 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7676 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7676 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7677 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7677 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7681 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7681 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7682 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7682 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7683 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7683 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7685 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7685 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7686 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7686 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7688 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7688 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7689 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7689 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7690 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7690 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7691 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7691 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7692 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7692 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7693 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7693 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7694 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7694 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7695 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7695 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7696 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7696 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7697 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7697 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7698 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7698 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7700 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7700 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7701 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7701 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7702 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7702 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7703 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7703 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7705 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7705 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7707 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7707 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7708 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7708 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7710 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7710 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7712 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7712 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7713 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7713 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7714 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7714 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7715 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7715 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7716 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7716 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7717 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7717 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7718 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7718 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7719 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7719 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7720 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7720 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7721 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7721 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7722 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7722 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7723 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7723 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7724 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7724 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7725 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7725 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7726 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7726 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7727 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7727 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7728 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7728 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7731 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7731 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7733 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7733 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7734 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7734 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7735 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7735 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7737 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7737 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7739 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7739 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7740 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7740 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7741 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7741 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7742 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7742 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7743 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7743 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7744 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7744 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7745 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7745 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7746 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7746 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7748 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7748 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7749 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7749 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7750 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7750 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7751 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7751 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7752 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7752 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7753 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7754 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7754 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7755 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7755 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7756 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7756 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7757 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7757 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7758 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7758 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7759 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7759 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7760 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7760 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7761 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7761 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7762 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7762 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7763 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7763 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7764 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7764 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7765 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7765 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7766 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7766 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7767 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7767 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7768 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7768 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7769 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7769 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7770 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7770 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7771 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7771 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7772 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7772 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7773 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7773 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7774 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7774 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7775 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7775 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7776 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7776 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7777 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7777 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7778 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7778 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7779 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7779 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7780 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7780 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7781 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7781 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7782 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7782 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7783 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7783 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7784 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7784 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7785 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7785 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7786 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7786 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7787 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7787 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7788 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7788 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7789 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7789 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7791 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7791 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7793 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7793 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7794 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7794 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7795 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7795 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7796 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7796 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7797 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7797 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7798 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7798 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7799 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7799 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7800 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7800 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7802 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7802 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7803 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7803 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7804 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-7804 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-7809 - http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html -CVE-2014-7809 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-7809 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-7809 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-7810 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-7810 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-7810 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-7817 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2014-7817 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2014-7818 - https://puppet.com/security/cve/cve-2014-7829 -CVE-2014-7821 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-7822 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-7822 - http://www.ubuntu.com/usn/USN-2543-1 -CVE-2014-7822 - https://www.exploit-db.com/exploits/36743/ -CVE-2014-7829 - https://hackerone.com/reports/43440 -CVE-2014-7829 - https://puppet.com/security/cve/cve-2014-7829 -CVE-2014-7840 - https://bugzilla.redhat.com/show_bug.cgi?id=1163075 -CVE-2014-7841 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -CVE-2014-7841 - https://bugzilla.redhat.com/show_bug.cgi?id=1163087 -CVE-2014-7842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-7842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-7842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-7842 - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -CVE-2014-7843 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -CVE-2014-7857 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html -CVE-2014-7858 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html -CVE-2014-7859 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html -CVE-2014-7860 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html -CVE-2014-7862 - http://packetstormsecurity.com/files/129769/Desktop-Central-Add-Administrator.html -CVE-2014-7862 - http://seclists.org/fulldisclosure/2015/Jan/2 -CVE-2014-7862 - https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_dc9_admin.txt -CVE-2014-7863 - http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html -CVE-2014-7863 - http://seclists.org/fulldisclosure/2015/Jan/114 -CVE-2014-7864 - http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html -CVE-2014-7864 - http://seclists.org/fulldisclosure/2015/Jan/114 -CVE-2014-7866 - http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html -CVE-2014-7866 - http://seclists.org/fulldisclosure/2014/Nov/21 -CVE-2014-7868 - http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html -CVE-2014-7868 - http://seclists.org/fulldisclosure/2014/Nov/21 -CVE-2014-7870 - http://seclists.org/fulldisclosure/2014/Apr/41 -CVE-2014-7871 - http://packetstormsecurity.com/files/129020/OX-App-Suite-7.6.0-SQL-Injection.html -CVE-2014-7872 - http://packetstormsecurity.com/files/135841/Comodo-Internet-Security-VNC-Server-Exposure.html -CVE-2014-7872 - https://www.exploit-db.com/exploits/37065/ -CVE-2014-7884 - http://www.kb.cert.org/vuls/id/868948 -CVE-2014-7885 - http://www.kb.cert.org/vuls/id/868948 -CVE-2014-7910 - https://www.exploit-db.com/exploits/34879/ -CVE-2014-7911 - http://seclists.org/fulldisclosure/2014/Nov/51 -CVE-2014-7922 - http://isciurus.blogspot.com/2015/01/android-app-with-full-control-over-your.html -CVE-2014-7922 - https://gist.github.com/isciurus/df4d7edd9c3efb4a0753 -CVE-2014-7923 - http://bugs.icu-project.org/trac/ticket/11370 -CVE-2014-7923 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-7923 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-7926 - http://bugs.icu-project.org/trac/ticket/11369 -CVE-2014-7926 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-7926 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-7940 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-7940 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-7951 - http://packetstormsecurity.com/files/131510/ADB-Backup-Traversal-File-Overwrite.html -CVE-2014-7951 - https://www.exploit-db.com/exploits/36813/ -CVE-2014-7952 - http://packetstormsecurity.com/files/132645/ADB-Backup-APK-Injection.html -CVE-2014-7952 - http://seclists.org/fulldisclosure/2015/Jul/46 -CVE-2014-7952 - http://www.search-lab.hu/about-us/news/110-android-adb-backup-apk-injection-vulnerability -CVE-2014-7952 - https://github.com/irsl/ADB-Backup-APK-Injection/ -CVE-2014-7954 - http://packetstormsecurity.com/files/131509/Android-4.4-MTP-Path-Traversal.html -CVE-2014-7956 - http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html -CVE-2014-7956 - http://seclists.org/fulldisclosure/2015/Jan/26 -CVE-2014-7957 - http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html -CVE-2014-7957 - http://seclists.org/fulldisclosure/2015/Jan/26 -CVE-2014-7958 - http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html -CVE-2014-7959 - http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html -CVE-2014-7960 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-7970 - http://www.openwall.com/lists/oss-security/2014/10/08/21 -CVE-2014-7970 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2014-7985 - http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html -CVE-2014-7986 - http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html -CVE-2014-7987 - http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html -CVE-2014-8069 - http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html -CVE-2014-8070 - http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html -CVE-2014-8071 - http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html -CVE-2014-8072 - http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html -CVE-2014-8073 - http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html -CVE-2014-8080 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-8082 - http://packetstormsecurity.com/files/128824/TestLink-1.9.12-Path-Disclosure.html -CVE-2014-8083 - http://packetstormsecurity.com/files/129775/Osclass-3.4.2-SQL-Injection.html -CVE-2014-8083 - http://seclists.org/fulldisclosure/2014/Dec/132 -CVE-2014-8084 - http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html -CVE-2014-8084 - http://seclists.org/fulldisclosure/2014/Dec/133 -CVE-2014-8085 - http://packetstormsecurity.com/files/129777/Osclass-3.4.2-Shell-Upload.html -CVE-2014-8085 - http://seclists.org/fulldisclosure/2014/Dec/134 -CVE-2014-8087 - https://g0blin.co.uk/cve-2014-8087/ -CVE-2014-8087 - https://wpvulndb.com/vulnerabilities/8240 -CVE-2014-8088 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8090 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-8091 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8091 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8091 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8093 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8093 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8094 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8095 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8095 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8095 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8096 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8096 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8096 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8097 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8097 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8097 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8098 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8098 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8099 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8100 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8100 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8100 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8101 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8101 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8102 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8102 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8102 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8103 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8109 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2014-8109 - https://bugzilla.redhat.com/show_bug.cgi?id=1174077 -CVE-2014-8116 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-8116 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8116 - http://www.ubuntu.com/usn/USN-2494-1 -CVE-2014-8117 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-8117 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8117 - http://www.ubuntu.com/usn/USN-2494-1 -CVE-2014-8124 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8134 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-8137 - http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html -CVE-2014-8137 - http://www.ubuntu.com/usn/USN-2483-2 -CVE-2014-8138 - http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html -CVE-2014-8138 - http://www.ubuntu.com/usn/USN-2483-2 -CVE-2014-8142 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8142 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-8142 - https://bugs.php.net/bug.php?id=68594 -CVE-2014-8145 - http://packetstormsecurity.com/files/129699/SoX-14.4.1-Heap-Buffer-Overflow.html -CVE-2014-8145 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8146 - http://bugs.icu-project.org/trac/changeset/37162 -CVE-2014-8146 - http://openwall.com/lists/oss-security/2015/05/05/6 -CVE-2014-8146 - http://seclists.org/fulldisclosure/2015/May/14 -CVE-2014-8146 - http://www.kb.cert.org/vuls/id/602540 -CVE-2014-8146 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8146 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-8147 - http://bugs.icu-project.org/trac/changeset/37080 -CVE-2014-8147 - http://openwall.com/lists/oss-security/2015/05/05/6 -CVE-2014-8147 - http://seclists.org/fulldisclosure/2015/May/14 -CVE-2014-8147 - http://www.kb.cert.org/vuls/id/602540 -CVE-2014-8147 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8147 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-8150 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8150 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-8150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8150 - https://hackerone.com/reports/73242 -CVE-2014-8157 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-8157 - http://www.ubuntu.com/usn/USN-2483-2 -CVE-2014-8158 - http://www.ubuntu.com/usn/USN-2483-2 -CVE-2014-8160 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2014-8160 - https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b -CVE-2014-8169 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8240 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8240 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8241 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-8241 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8243 - http://www.kb.cert.org/vuls/id/447516 -CVE-2014-8244 - http://www.kb.cert.org/vuls/id/447516 -CVE-2014-8246 - http://www.kb.cert.org/vuls/id/343060 -CVE-2014-8247 - http://www.kb.cert.org/vuls/id/343060 -CVE-2014-8248 - http://www.kb.cert.org/vuls/id/343060 -CVE-2014-8266 - http://www.kb.cert.org/vuls/id/546340 -CVE-2014-8267 - http://www.kb.cert.org/vuls/id/546340 -CVE-2014-8268 - http://www.kb.cert.org/vuls/id/546340 -CVE-2014-8269 - http://www.kb.cert.org/vuls/id/659684 -CVE-2014-8272 - http://www.kb.cert.org/vuls/id/843044 -CVE-2014-8272 - http://www.kb.cert.org/vuls/id/BLUU-9RDQHM -CVE-2014-8275 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2014-8275 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-8275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2014-8293 - http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html -CVE-2014-8294 - http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html -CVE-2014-8295 - http://packetstormsecurity.com/files/128480/Bacula-web-5.2.10-SQL-Injection.html -CVE-2014-8295 - http://www.exploit-db.com/exploits/34851 -CVE-2014-8296 - https://www.drupal.org/node/2189751 -CVE-2014-8298 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8305 - http://seclists.org/fulldisclosure/2014/Sep/55 -CVE-2014-8306 - http://seclists.org/fulldisclosure/2014/Sep/55 -CVE-2014-8307 - http://seclists.org/fulldisclosure/2014/Sep/55 -CVE-2014-8308 - http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html -CVE-2014-8310 - http://packetstormsecurity.com/files/128600/SAP-Business-Objects-Denial-Of-Service-Via-CORBA.html -CVE-2014-8311 - http://packetstormsecurity.com/files/128601/SAP-Business-Objects-Information-Disclosure-Via-CORBA.html -CVE-2014-8312 - http://packetstormsecurity.com/files/128603/SAP-Business-Warehouse-Missing-Authorization-Check.html -CVE-2014-8313 - http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html -CVE-2014-8314 - http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html -CVE-2014-8316 - http://packetstormsecurity.com/files/128633/SAP-BusinessObjects-Explorer-14.0.5-XXE-Injection.html -CVE-2014-8319 - http://www.securityfocus.com/bid/65527 -CVE-2014-8320 - http://seclists.org/fulldisclosure/2014/Apr/41 -CVE-2014-8321 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html -CVE-2014-8322 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html -CVE-2014-8323 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html -CVE-2014-8324 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html -CVE-2014-8325 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-013/ -CVE-2014-8325 - http://www.openwall.com/lists/oss-security/2014/10/17/11 -CVE-2014-8327 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-014/ -CVE-2014-8329 - http://seclists.org/fulldisclosure/2014/Jul/40 -CVE-2014-8330 - http://packetstormsecurity.com/files/127827/Espo-CRM-Cross-Site-Scripting.html -CVE-2014-8334 - http://packetstormsecurity.com/files/128785/WordPress-Database-Manager-2.7.1-Command-Injection-Credential-Leak.html -CVE-2014-8334 - http://seclists.org/fulldisclosure/2014/Oct/99 -CVE-2014-8334 - http://seclists.org/oss-sec/2014/q4/365 -CVE-2014-8334 - http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html -CVE-2014-8335 - http://packetstormsecurity.com/files/128785/WordPress-Database-Manager-2.7.1-Command-Injection-Credential-Leak.html -CVE-2014-8335 - http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html -CVE-2014-8336 - http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html -CVE-2014-8337 - http://packetstormsecurity.com/files/128979/HelpDEZk-1.0.1-Unrestricted-File-Upload.html -CVE-2014-8338 - https://packetstormsecurity.com/files/128997/Drupal-7-Videowhisper-Cross-Site-Scripting.html -CVE-2014-8339 - http://packetstormsecurity.com/files/128909/Nuevolabs-Nuevoplayer-For-Clipshare-SQL-Injection.html -CVE-2014-8339 - http://www.youtube.com/watch?v=_-oOI1LnEdk -CVE-2014-8340 - http://packetstormsecurity.com/files/129445/phpTrafficA-2.3-SQL-Injection.html -CVE-2014-8347 - http://packetstormsecurity.com/files/128853/Filemaker-Login-Bypass-Privilege-Escalation.html -CVE-2014-8349 - http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html -CVE-2014-8351 - http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-8351 - http://seclists.org/fulldisclosure/2014/Nov/3 -CVE-2014-8351 - https://github.com/LaboCNIL/CookieViz/commit/489b6050f6c53fe7b24c4bed3eeb9c25543960e2 -CVE-2014-8352 - http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-8352 - http://seclists.org/fulldisclosure/2014/Nov/3 -CVE-2014-8352 - https://github.com/LaboCNIL/CookieViz/commit/489b6050f6c53fe7b24c4bed3eeb9c25543960e2 -CVE-2014-8354 - http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html -CVE-2014-8355 - http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html -CVE-2014-8356 - http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html -CVE-2014-8356 - https://www.exploit-db.com/exploits/38453/ -CVE-2014-8357 - http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html -CVE-2014-8357 - https://www.exploit-db.com/exploits/38453/ -CVE-2014-8358 - https://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html -CVE-2014-8359 - http://osandamalith.wordpress.com/2014/10/20/escalating-local-privileges-using-mobile-partner/ -CVE-2014-8359 - http://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html -CVE-2014-8361 - http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html -CVE-2014-8361 - https://www.exploit-db.com/exploits/37169/ -CVE-2014-8362 - http://packetstormsecurity.com/files/136040/Vivint-Sky-Control-Panel-Unauthenticated-Access.html -CVE-2014-8363 - http://packetstormsecurity.com/files/127771/WordPress-WPSS-0.62-SQL-Injection.html -CVE-2014-8364 - http://packetstormsecurity.com/files/127770/WordPress-WPSS-0.62-Cross-Site-Scripting.html -CVE-2014-8365 - http://packetstormsecurity.com/files/127003/Xornic-Contact-Us-Form-CAPTCHA-Bypass-XSS.html -CVE-2014-8366 - http://packetstormsecurity.com/files/127284/openSIS-5.3-SQL-Injection.html -CVE-2014-8366 - http://seclists.org/fulldisclosure/2014/Jun/151 -CVE-2014-8371 - http://seclists.org/fulldisclosure/2014/Dec/23 -CVE-2014-8371 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html -CVE-2014-8373 - http://packetstormsecurity.com/files/129455/VMware-Security-Advisory-2014-0013.html -CVE-2014-8373 - http://seclists.org/fulldisclosure/2014/Dec/33 -CVE-2014-8375 - http://packetstormsecurity.com/files/127833/WordPress-GB-Gallery-Slideshow-1.5-SQL-Injection.html -CVE-2014-8375 - http://www.homelab.it/index.php/2014/08/10/wordpress-gb-gallery-slideshow -CVE-2014-8377 - http://packetstormsecurity.com/files/127946/Webasyst-Shop-Script-5.2.2.30933-Cross-Site-Scripting.html -CVE-2014-8380 - http://packetstormsecurity.com/files/126813/Splunk-6.1.1-Cross-Site-Scripting.html -CVE-2014-8380 - https://www.exploit-db.com/exploits/40997/ -CVE-2014-8381 - http://packetstormsecurity.com/files/128725/Megapolis.Portal-Manager-Cross-Site-Scripting.html -CVE-2014-8381 - http://seclists.org/fulldisclosure/2014/Oct/77 -CVE-2014-8383 - http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html -CVE-2014-8383 - http://seclists.org/fulldisclosure/2015/Apr/88 -CVE-2014-8383 - http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities -CVE-2014-8384 - http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html -CVE-2014-8384 - http://seclists.org/fulldisclosure/2015/Apr/88 -CVE-2014-8384 - http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities -CVE-2014-8386 - http://seclists.org/fulldisclosure/2014/Nov/57 -CVE-2014-8386 - http://www.coresecurity.com/advisories/advantech-adamView-buffer-overflow -CVE-2014-8387 - http://seclists.org/fulldisclosure/2014/Nov/58 -CVE-2014-8387 - http://www.coresecurity.com/advisories/advantech-eki-6340-command-injection -CVE-2014-8389 - http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html -CVE-2014-8389 - http://seclists.org/fulldisclosure/2015/Jul/29 -CVE-2014-8389 - https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection -CVE-2014-8390 - http://www.coresecurity.com/advisories/schneider-vampset-stack-and-heap-buffer-overflow -CVE-2014-8391 - http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html -CVE-2014-8391 - http://seclists.org/fulldisclosure/2015/May/95 -CVE-2014-8391 - https://www.exploit-db.com/exploits/37114/ -CVE-2014-8393 - http://packetstormsecurity.com/files/129922/Corel-Software-DLL-Hijacking.html -CVE-2014-8393 - http://seclists.org/fulldisclosure/2015/Jan/33 -CVE-2014-8393 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking -CVE-2014-8394 - http://seclists.org/fulldisclosure/2015/Jan/33 -CVE-2014-8394 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking -CVE-2014-8395 - http://seclists.org/fulldisclosure/2015/Jan/33 -CVE-2014-8395 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking -CVE-2014-8396 - http://seclists.org/fulldisclosure/2015/Jan/33 -CVE-2014-8396 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking -CVE-2014-8397 - http://seclists.org/fulldisclosure/2015/Jan/33 -CVE-2014-8397 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking -CVE-2014-8398 - http://seclists.org/fulldisclosure/2015/Jan/33 -CVE-2014-8398 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking -CVE-2014-8419 - http://packetstormsecurity.com/files/129234/CodeMeter-Weak-Service-Permissions.html -CVE-2014-8426 - http://packetstormsecurity.com/files/130027/Barracuda-Load-Balancer-ADC-Key-Recovery-Password-Reset.html -CVE-2014-8428 - http://packetstormsecurity.com/files/130027/Barracuda-Load-Balancer-ADC-Key-Recovery-Password-Reset.html -CVE-2014-8440 - https://www.exploit-db.com/exploits/36880/ -CVE-2014-8469 - http://packetstormsecurity.com/files/129153/PHPFox-Cross-Site-Scripting.html -CVE-2014-8475 - http://packetstormsecurity.com/files/128972/FreeBSD-Security-Advisory-sshd-Denial-Of-Service.html -CVE-2014-8480 - http://www.openwall.com/lists/oss-security/2014/10/23/7 -CVE-2014-8481 - http://www.openwall.com/lists/oss-security/2014/10/23/7 -CVE-2014-8484 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8485 - http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html -CVE-2014-8485 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8489 - http://packetstormsecurity.com/files/129454/PingFederate-6.10.1-SP-Endpoints-Open-Redirect.html -CVE-2014-8489 - http://seclists.org/fulldisclosure/2014/Dec/35 -CVE-2014-8491 - https://g0blin.co.uk/cve-2014-8491/ -CVE-2014-8491 - https://wpvulndb.com/vulnerabilities/8238 -CVE-2014-8492 - https://g0blin.co.uk/cve-2014-8492/ -CVE-2014-8492 - https://wpvulndb.com/vulnerabilities/8239 -CVE-2014-8493 - http://packetstormsecurity.com/files/129139/ZTE-ZXHN-H108L-Access-Bypass.html -CVE-2014-8493 - http://seclists.org/fulldisclosure/2014/Nov/46 -CVE-2014-8493 - http://www.exploit-db.com/exploits/35272 -CVE-2014-8493 - http://www.exploit-db.com/exploits/35276 -CVE-2014-8494 - http://packetstormsecurity.com/files/128868/ESTsoft-ALUpdate-8.5.1.0.0-Privilege-Escalation.html -CVE-2014-8496 - https://www.youtube.com/watch?v=La9nMeVCtt4 -CVE-2014-8498 - http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html -CVE-2014-8498 - http://seclists.org/fulldisclosure/2014/Nov/18 -CVE-2014-8498 - http://www.exploit-db.com/exploits/35210 -CVE-2014-8499 - http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html -CVE-2014-8499 - http://seclists.org/fulldisclosure/2014/Nov/18 -CVE-2014-8499 - http://www.exploit-db.com/exploits/35210 -CVE-2014-8500 - http://www.kb.cert.org/vuls/id/264212 -CVE-2014-8500 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8500 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-8501 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8502 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8503 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8505 - http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-8506 - http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-8507 - http://packetstormsecurity.com/files/129283/Android-WAPPushManager-SQL-Injection.html -CVE-2014-8507 - http://seclists.org/fulldisclosure/2014/Nov/86 -CVE-2014-8516 - https://packetstormsecurity.com/files/129023 -CVE-2014-8517 - https://www.exploit-db.com/exploits/43112/ -CVE-2014-8520 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8521 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8522 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8523 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8524 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8525 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8526 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8527 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8528 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8529 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8530 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8531 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8532 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8533 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 -CVE-2014-8538 - http://www.kb.cert.org/vuls/id/582497 -CVE-2014-8538 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -CVE-2014-8539 - http://packetstormsecurity.com/files/129171/Joomla-Simple-Email-Form-1.8.5-Cross-Site-Scripting.html -CVE-2014-8540 - https://about.gitlab.com/2014/10/30/gitlab-7-4-3-released/ -CVE-2014-8541 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2014-8555 - http://packetstormsecurity.com/files/129052/Progress-OpenEdge-11.2-Directory-Traversal.html -CVE-2014-8557 - http://packetstormsecurity.com/files/129009/JExperts-Tecnologia-Channel-Software-Cross-Site-Scripting.html -CVE-2014-8558 - http://packetstormsecurity.com/files/129010/JExperts-Tecnologia-Channel-Software-Privilege-Escalation.html -CVE-2014-8559 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8561 - http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html -CVE-2014-8561 - http://seclists.org/fulldisclosure/2014/Nov/1 -CVE-2014-8562 - https://bugzilla.redhat.com/show_bug.cgi?id=1159362 -CVE-2014-8562 - https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html -CVE-2014-8567 - https://github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647 -CVE-2014-8577 - http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html -CVE-2014-8577 - http://www.exploit-db.com/exploits/34959 -CVE-2014-8577 - http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php -CVE-2014-8585 - http://packetstormsecurity.com/files/128852/WordPress-Download-Manager-Arbitrary-File-Download.html -CVE-2014-8586 - http://packetstormsecurity.com/files/128814/WordPress-CP-Multi-View-Event-Calendar-1.01-SQL-Injection.html -CVE-2014-8586 - http://www.exploit-db.com/exploits/35073 -CVE-2014-8592 - https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/ -CVE-2014-8593 - http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-8596 - http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html -CVE-2014-8596 - http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html -CVE-2014-8596 - http://seclists.org/fulldisclosure/2015/Oct/23 -CVE-2014-8601 - http://www.kb.cert.org/vuls/id/264212 -CVE-2014-8602 - http://www.kb.cert.org/vuls/id/264212 -CVE-2014-8602 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8603 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ -CVE-2014-8604 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ -CVE-2014-8605 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ -CVE-2014-8606 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ -CVE-2014-8607 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ -CVE-2014-8608 - http://packetstormsecurity.com/files/129470/K7-Computing-Multiple-Products-Null-Pointer-Dereference.html -CVE-2014-8609 - http://packetstormsecurity.com/files/129281/Android-Settings-Pendingintent-Leak.html -CVE-2014-8609 - http://seclists.org/fulldisclosure/2014/Nov/81 -CVE-2014-8610 - http://packetstormsecurity.com/files/129282/Android-SMS-Resend.html -CVE-2014-8610 - http://seclists.org/fulldisclosure/2014/Nov/85 -CVE-2014-8612 - http://seclists.org/fulldisclosure/2015/Jan/107 -CVE-2014-8612 - http://www.coresecurity.com/advisories/freebsd-kernel-multiple-vulnerabilities -CVE-2014-8617 - http://seclists.org/fulldisclosure/2015/Mar/5 -CVE-2014-8621 - https://g0blin.co.uk/cve-2014-8621/ -CVE-2014-8621 - https://wpvulndb.com/vulnerabilities/8241 -CVE-2014-8622 - http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html -CVE-2014-8629 - http://packetstormsecurity.com/files/129112/Pandora-FMS-5.1SP1-Cross-Site-Scripting.html -CVE-2014-8629 - http://seclists.org/fulldisclosure/2014/Nov/35 -CVE-2014-8630 - https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 -CVE-2014-8631 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8632 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8634 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-8635 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8636 - http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html -CVE-2014-8636 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8637 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8638 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-8638 - http://www.securityfocus.com/bid/72047 -CVE-2014-8638 - https://bugzilla.mozilla.org/show_bug.cgi?id=1080987 -CVE-2014-8639 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-8640 - http://www.mozilla.org/security/announce/2014/mfsa2015-05.html -CVE-2014-8640 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8641 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-8642 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8643 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-8643 - https://bugzilla.mozilla.org/show_bug.cgi?id=1117140 -CVE-2014-8652 - http://firebitsbr.wordpress.com/2014/07/16/vsla-security-advisory-fire-scada-dos-2013-001-http-dos-requests-flooding-crash-device-vulnerabilities-elipse-e3-scada-plc/ -CVE-2014-8652 - http://seclists.org/fulldisclosure/2014/Jul/69 -CVE-2014-8653 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html -CVE-2014-8653 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php -CVE-2014-8654 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html -CVE-2014-8654 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php -CVE-2014-8655 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html -CVE-2014-8656 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html -CVE-2014-8656 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php -CVE-2014-8657 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html -CVE-2014-8657 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php -CVE-2014-8658 - http://packetstormsecurity.com/files/128907/Confluence-RefinedWiki-Original-Theme-Cross-Site-Scripting.html -CVE-2014-8658 - http://seclists.org/fulldisclosure/2014/Oct/126 -CVE-2014-8664 - http://service.sap.com/sap/support/notes/0001810405 -CVE-2014-8670 - http://packetstormsecurity.com/files/128958/vBulletin-4.2.1-Open-Redirect.html -CVE-2014-8673 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html -CVE-2014-8673 - http://seclists.org/fulldisclosure/2015/Jul/44 -CVE-2014-8673 - https://www.exploit-db.com/exploits/37604/ -CVE-2014-8674 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html -CVE-2014-8674 - http://seclists.org/fulldisclosure/2015/Jul/44 -CVE-2014-8674 - https://www.exploit-db.com/exploits/37604/ -CVE-2014-8675 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html -CVE-2014-8675 - http://seclists.org/fulldisclosure/2015/Jul/44 -CVE-2014-8675 - https://www.exploit-db.com/exploits/37604/ -CVE-2014-8676 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html -CVE-2014-8676 - http://seclists.org/fulldisclosure/2015/Jul/44 -CVE-2014-8676 - https://www.exploit-db.com/exploits/37604/ -CVE-2014-8677 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html -CVE-2014-8677 - http://seclists.org/fulldisclosure/2015/Jul/44 -CVE-2014-8677 - https://www.exploit-db.com/exploits/37604/ -CVE-2014-8681 - http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html -CVE-2014-8681 - http://seclists.org/fulldisclosure/2014/Nov/31 -CVE-2014-8681 - http://www.exploit-db.com/exploits/35237 -CVE-2014-8682 - http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html -CVE-2014-8682 - http://seclists.org/fulldisclosure/2014/Nov/33 -CVE-2014-8682 - http://www.exploit-db.com/exploits/35238 -CVE-2014-8683 - http://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html -CVE-2014-8683 - http://seclists.org/fulldisclosure/2014/Nov/34 -CVE-2014-8684 - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html -CVE-2014-8684 - https://github.com/kohana/core/pull/492 -CVE-2014-8686 - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html -CVE-2014-8686 - https://beyondbinary.io/articles/seagate-nas-rce/ -CVE-2014-8686 - https://www.dionach.com/blog/codeigniter-session-decoding-vulnerability -CVE-2014-8687 - http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html -CVE-2014-8687 - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html -CVE-2014-8687 - https://beyondbinary.io/articles/seagate-nas-rce/ -CVE-2014-8687 - https://www.exploit-db.com/exploits/36202/ -CVE-2014-8687 - https://www.exploit-db.com/exploits/36264/ -CVE-2014-8688 - https://blog.zimperium.com/telegram-hack/ -CVE-2014-8690 - http://packetstormsecurity.com/files/130382/Exponent-CMS-2.3.1-Cross-Site-Scripting.html -CVE-2014-8710 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8711 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8711 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8712 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8712 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8713 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-8713 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8713 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8714 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2014-8714 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8714 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8722 - http://packetstormsecurity.com/files/162906/GetSimple-CMS-3.3.4-Information-Disclosure.html -CVE-2014-8724 - http://packetstormsecurity.com/files/129626/W3-Total-Cache-0.9.4-Cross-Site-Scripting.html -CVE-2014-8727 - http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html -CVE-2014-8731 - http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html -CVE-2014-8732 - http://packetstormsecurity.com/files/129090/PHPMemcachedAdmin-1.2.2-Cross-Site-Scripting.html -CVE-2014-8737 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8738 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-8739 - https://www.exploit-db.com/exploits/35057/ -CVE-2014-8739 - https://www.exploit-db.com/exploits/36811/ -CVE-2014-8751 - http://packetstormsecurity.com/files/129443/goYWP-WebPress-13.00.06-Cross-Site-Scripting.html -CVE-2014-8751 - http://seclists.org/fulldisclosure/2014/Dec/34 -CVE-2014-8753 - http://packetstormsecurity.com/files/130392/Cit-e-Net-6-Cross-Site-Scripting.html -CVE-2014-8754 - http://packetstormsecurity.com/files/129290/WordPress-Ad-Manager-1.1.2-Open-Redirect.html -CVE-2014-8757 - http://packetstormsecurity.com/files/130286/LG-On-Screen-Phone-Authentication-Bypass.html -CVE-2014-8757 - http://seclists.org/fulldisclosure/2015/Feb/26 -CVE-2014-8758 - https://g0blin.co.uk/cve-2014-8758/ -CVE-2014-8758 - https://wpvulndb.com/vulnerabilities/8236 -CVE-2014-8766 - http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-8767 - http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html -CVE-2014-8768 - http://packetstormsecurity.com/files/129156/tcpdump-4.6.2-Geonet-Denial-Of-Service.html -CVE-2014-8769 - http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html -CVE-2014-8778 - http://packetstormsecurity.com/files/133437/Checkmarx-CxQL-7.1.5-Sandbox-Bypass.html -CVE-2014-8778 - http://seclists.org/fulldisclosure/2015/Sep/17 -CVE-2014-8779 - http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html -CVE-2014-8780 - https://www.vulnerability-lab.com/get_content.php?id=1373 -CVE-2014-8788 - http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html -CVE-2014-8789 - http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html -CVE-2014-8790 - http://packetstormsecurity.com/files/129778/GetSimple-CMS-3.3.4-XML-External-Entity-Injection.html -CVE-2014-8790 - http://seclists.org/fulldisclosure/2014/Dec/135 -CVE-2014-8791 - http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html -CVE-2014-8793 - http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html -CVE-2014-8793 - http://packetstormsecurity.com/files/129622/Revive-Adserver-3.0.5-Cross-Site-Scripting.html -CVE-2014-8793 - http://www.revive-adserver.com/security/revive-sa-2014-002/ -CVE-2014-8799 - http://www.exploit-db.com/exploits/35346 -CVE-2014-8800 - http://www.exploit-db.com/exploits/35439 -CVE-2014-8801 - http://packetstormsecurity.com/files/129189/Paid-Memberships-Pro-1.7.14.2-Path-Traversal.html -CVE-2014-8801 - http://www.exploit-db.com/exploits/35303 -CVE-2014-8810 - http://www.exploit-db.com/exploits/35505 -CVE-2014-8826 - http://packetstormsecurity.com/files/130147/OS-X-Gatekeeper-Bypass.html -CVE-2014-8826 - https://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html -CVE-2014-8835 - http://packetstormsecurity.com/files/135701/OS-X-Sysmond-XPC-Type-Confusion-Privilege-Escalation.html -CVE-2014-8835 - http://www.exploit-db.com/exploits/35742/ -CVE-2014-8839 - http://www.theregister.co.uk/2015/01/10/spotlight_caught_spreading_your_delicates/ -CVE-2014-8868 - http://seclists.org/fulldisclosure/2014/Dec/2 -CVE-2014-8868 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-011 -CVE-2014-8869 - http://seclists.org/fulldisclosure/2015/Jan/31 -CVE-2014-8869 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0 -CVE-2014-8871 - http://packetstormsecurity.com/files/130444/Hybris-Commerce-Software-Suite-5.x-File-Disclosure-Traversal.html -CVE-2014-8871 - http://seclists.org/fulldisclosure/2015/Feb/63 -CVE-2014-8872 - http://packetstormsecurity.com/files/130040/AVM-FRITZ-Box-Firmware-Signature-Bypass.html -CVE-2014-8872 - http://seclists.org/fulldisclosure/2015/Jan/86 -CVE-2014-8874 - http://seclists.org/fulldisclosure/2014/Dec/1 -CVE-2014-8874 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-009 -CVE-2014-8875 - http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html -CVE-2014-8875 - http://www.revive-adserver.com/security/revive-sa-2014-002/ -CVE-2014-8877 - http://packetstormsecurity.com/files/129183/WordPress-CM-Download-Manager-2.0.0-Code-Injection.html -CVE-2014-8884 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -CVE-2014-8886 - http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html -CVE-2014-8886 - http://seclists.org/fulldisclosure/2016/Jan/12 -CVE-2014-8886 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-014 -CVE-2014-8889 - http://packetstormsecurity.com/files/130767/Dropbox-SDK-For-Android-Remote-Exploitation.html -CVE-2014-8889 - https://securityintelligence.com/droppedin-remotely-exploitable-vulnerability-in-the-dropbox-sdk-for-android/ -CVE-2014-8891 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015 -CVE-2014-8892 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015 -CVE-2014-8904 - https://www.exploit-db.com/exploits/38576/ -CVE-2014-8948 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html -CVE-2014-8948 - http://seclists.org/fulldisclosure/2014/Apr/265 -CVE-2014-8948 - http://www.exploit-db.com/exploits/33076 -CVE-2014-8949 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html -CVE-2014-8949 - http://seclists.org/fulldisclosure/2014/Apr/265 -CVE-2014-8949 - http://www.exploit-db.com/exploits/33076 -CVE-2014-8953 - http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html -CVE-2014-8954 - http://packetstormsecurity.com/files/129104/phpSound-Music-Sharing-Platform-1.0.5-Cross-Site-Scripting.html -CVE-2014-8955 - http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html -CVE-2014-8956 - http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html -CVE-2014-8957 - http://packetstormsecurity.com/files/130723/OpenKM-Stored-Cross-Site-Scripting.html -CVE-2014-8962 - http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html -CVE-2014-8962 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-8993 - http://packetstormsecurity.com/files/129811/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Cross-Site-Scripting.html -CVE-2014-8995 - http://packetstormsecurity.com/files/129135/Maarch-LetterBox-2.8-Insecure-Cookie-Handling.html -CVE-2014-8996 - http://packetstormsecurity.com/files/129133/Nibbleblog-4.0.1-Cross-Site-Scripting.html -CVE-2014-8996 - http://seclists.org/fulldisclosure/2014/Nov/38 -CVE-2014-8997 - http://packetstormsecurity.com/files/129108/Digi-Online-Examination-System-2.0-Shell-Upload.html -CVE-2014-8998 - http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_replace-PHP-Code-Execution.html -CVE-2014-8999 - http://packetstormsecurity.com/files/129134/XOOPS-2.5.6-SQL-Injection.html -CVE-2014-8999 - http://seclists.org/fulldisclosure/2014/Nov/39 -CVE-2014-9000 - http://packetstormsecurity.com/files/128799 -CVE-2014-9001 - http://seclists.org/fulldisclosure/2014/Oct/101 -CVE-2014-9002 - http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html -CVE-2014-9003 - http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html -CVE-2014-9006 - http://packetstormsecurity.com/files/129082/Monstra-3.0.1-Bruteforce-Mitigation-Bypass.html -CVE-2014-9013 - https://www.exploit-db.com/exploits/36490/ -CVE-2014-9014 - https://www.exploit-db.com/exploits/36466/ -CVE-2014-9015 - https://www.drupal.org/SA-CORE-2014-006 -CVE-2014-9016 - https://www.drupal.org/SA-CORE-2014-006 -CVE-2014-9017 - http://packetstormsecurity.com/files/130723/OpenKM-Stored-Cross-Site-Scripting.html -CVE-2014-9017 - http://seclists.org/fulldisclosure/2015/Mar/48 -CVE-2014-9017 - http://seclists.org/fulldisclosure/2015/Mar/51 -CVE-2014-9019 - http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html -CVE-2014-9020 - http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html -CVE-2014-9020 - http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html -CVE-2014-9021 - http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html -CVE-2014-9027 - http://packetstormsecurity.com/files/129041 -CVE-2014-9028 - http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html -CVE-2014-9028 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-9029 - http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html -CVE-2014-9029 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-9031 - http://klikki.fi/adv/wordpress.html -CVE-2014-9031 - http://seclists.org/fulldisclosure/2014/Nov/62 -CVE-2014-9089 - https://www.mantisbt.org/bugs/view.php?id=17841 -CVE-2014-9095 - http://packetstormsecurity.com/files/127525/Raritan-PowerIQ-Unauthenticated-SQL-Injection.html -CVE-2014-9096 - http://packetstormsecurity.com/files/127615/Pligg-2.0.1-SQL-Injection-Command-Execution.html -CVE-2014-9097 - http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9098 - http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9099 - http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html -CVE-2014-9100 - http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html -CVE-2014-9101 - http://packetstormsecurity.com/files/127652/Oxwall-1.7.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9101 - http://packetstormsecurity.com/files/127690/SkaDate-Lite-2.0-CSRF-Cross-Site-Scripting.html -CVE-2014-9101 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5195.php -CVE-2014-9101 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5197.php -CVE-2014-9102 - http://packetstormsecurity.com/files/127683/Joomla-Kunena-Forum-3.0.5-SQL-Injection.html -CVE-2014-9103 - http://packetstormsecurity.com/files/127684/joomlakunena305-xss.txt -CVE-2014-9104 - http://seclists.org/fulldisclosure/2014/Jul/76 -CVE-2014-9104 - https://www.youtube.com/watch?v=qhgysgfvQh8 -CVE-2014-9112 - http://seclists.org/fulldisclosure/2014/Nov/74 -CVE-2014-9112 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-9113 - http://packetstormsecurity.com/files/129323/CCH-Wolters-Kluwer-PFX-Engagement-7.1-Privilege-Escalation.html -CVE-2014-9115 - http://seclists.org/fulldisclosure/2014/Nov/23 -CVE-2014-9118 - http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html -CVE-2014-9118 - https://www.exploit-db.com/exploits/38453/ -CVE-2014-9119 - http://seclists.org/oss-sec/2014/q4/1059 -CVE-2014-9119 - https://wpvulndb.com/vulnerabilities/7726 -CVE-2014-9120 - https://www.netsparker.com/xss-vulnerability-in-subrion-cms/ -CVE-2014-9126 - http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html -CVE-2014-9127 - http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html -CVE-2014-9129 - http://packetstormsecurity.com/files/129357/WordPress-CM-Download-Manager-2.0.6-XSS-CSRF.html -CVE-2014-9130 - http://www.ubuntu.com/usn/USN-2461-1 -CVE-2014-9140 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -CVE-2014-9142 - http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html -CVE-2014-9143 - http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html -CVE-2014-9144 - http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html -CVE-2014-9145 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html -CVE-2014-9146 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html -CVE-2014-9147 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html -CVE-2014-9147 - https://www.exploit-db.com/exploits/36581/ -CVE-2014-9148 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html -CVE-2014-9148 - https://www.exploit-db.com/exploits/36581/ -CVE-2014-9161 - http://packetstormsecurity.com/files/134394/Adobe-Reader-X-XI-Out-Of-Bounds-Read.html -CVE-2014-9173 - http://www.exploit-db.com/exploits/35371 -CVE-2014-9174 - https://wpvulndb.com/vulnerabilities/7692 -CVE-2014-9175 - http://packetstormsecurity.com/files/129232/WordPress-wpDataTables-1.5.3-SQL-Injection.html -CVE-2014-9175 - http://www.exploit-db.com/exploits/35340 -CVE-2014-9175 - http://www.homelab.it/index.php/2014/11/23/wordpress-wpdatatables-sql-injection-vulnerability -CVE-2014-9176 - http://h4x0resec.blogspot.com/2014/11/wordpress-sexy-squeeze-pages-plugin.html -CVE-2014-9176 - http://packetstormsecurity.com/files/129285/WordPress-Sexy-Squeeze-Pages-Cross-Site-Scripting.html -CVE-2014-9177 - http://h4x0resec.blogspot.com/2014/11/wordpress-html5-mp3-player-with.html -CVE-2014-9177 - http://packetstormsecurity.com/files/129286/WordPress-Html5-Mp3-Player-Full-Path-Disclosure.html -CVE-2014-9178 - http://packetstormsecurity.com/files/129212/WordPress-SP-Client-Document-Manager-2.4.1-SQL-Injection.html -CVE-2014-9179 - http://packetstormsecurity.com/files/129103/WordPress-SupportEzzy-Ticket-System-1.2.5-Cross-Site-Scripting.html -CVE-2014-9180 - http://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html -CVE-2014-9182 - http://packetstormsecurity.com/files/129042/Anchor-CMS-0.9.2-Header-Injection.html -CVE-2014-9183 - http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html -CVE-2014-9184 - http://packetstormsecurity.com/files/129015/ZTE-ZXDSL-831CII-Insecure-Direct-Object-Reference.html -CVE-2014-9185 - http://packetstormsecurity.com/files/129624/Morfy-CMS-1.05-Remote-Command-Execution.html -CVE-2014-9185 - http://seclists.org/fulldisclosure/2014/Dec/70 -CVE-2014-9185 - http://www.vulnerability-lab.com/get_content.php?id=1367 -CVE-2014-9185 - https://github.com/Awilum/monstra-cms/issues/351 -CVE-2014-9195 - https://www.exploit-db.com/exploits/37066/ -CVE-2014-9208 - https://www.exploit-db.com/exploits/38108/ -CVE-2014-9211 - https://packetstormsecurity.com/files/author/11084/ -CVE-2014-9212 - http://packetstormsecurity.com/files/129372/Altitude-uAgent-Altitude-uCI-7.5-XSS.html -CVE-2014-9215 - https://www.youtube.com/watch?v=AQiGvH5xrJg -CVE-2014-9218 - https://github.com/phpmyadmin/phpmyadmin/commit/62b2c918d26cc78d1763945e3d44d1a63294a819 -CVE-2014-9222 - http://www.kb.cert.org/vuls/id/561444 -CVE-2014-9224 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html -CVE-2014-9224 - http://seclists.org/fulldisclosure/2015/Jan/91 -CVE-2014-9225 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html -CVE-2014-9225 - http://seclists.org/fulldisclosure/2015/Jan/91 -CVE-2014-9226 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html -CVE-2014-9226 - http://seclists.org/fulldisclosure/2015/Jan/91 -CVE-2014-9234 - http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html -CVE-2014-9235 - http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9235 - http://seclists.org/fulldisclosure/2014/Nov/45 -CVE-2014-9236 - http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9236 - http://seclists.org/fulldisclosure/2014/Nov/45 -CVE-2014-9237 - http://packetstormsecurity.com/files/129129/Proticaret-E-Commerce-Script-3.0-SQL-Injection.html -CVE-2014-9237 - http://seclists.org/fulldisclosure/2014/Nov/43 -CVE-2014-9238 - http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html -CVE-2014-9239 - http://seclists.org/fulldisclosure/2014/Nov/20 -CVE-2014-9240 - http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9241 - http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9242 - http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html -CVE-2014-9242 - http://seclists.org/fulldisclosure/2014/Nov/44 -CVE-2014-9243 - http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html -CVE-2014-9243 - http://seclists.org/fulldisclosure/2014/Nov/44 -CVE-2014-9245 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9245 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9247 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9247 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9248 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9248 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9249 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9249 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9250 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9250 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9251 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9251 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9252 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9252 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9258 - http://www.exploit-db.com/exploits/35528 -CVE-2014-9260 - http://packetstormsecurity.com/files/130690/WordPress-Download-Manager-2.7.2-Privilege-Escalation.html -CVE-2014-9261 - http://packetstormsecurity.com/files/130739/Codoforum-2.5.1-Arbitrary-File-Download.html -CVE-2014-9261 - http://www.exploit-db.com/exploits/36320 -CVE-2014-9262 - https://www.exploit-db.com/exploits/36112/ -CVE-2014-9272 - https://www.mantisbt.org/bugs/view.php?id=17297 -CVE-2014-9280 - http://www.mantisbt.org/bugs/view.php?id=17875 -CVE-2014-9281 - http://seclists.org/oss-sec/2014/q4/913 -CVE-2014-9281 - https://www.mantisbt.org/bugs/view.php?id=17876 -CVE-2014-9293 - http://www.kb.cert.org/vuls/id/852879 -CVE-2014-9293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-9294 - http://www.kb.cert.org/vuls/id/852879 -CVE-2014-9294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-9295 - http://www.kb.cert.org/vuls/id/852879 -CVE-2014-9295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-9295 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2014-9296 - http://www.kb.cert.org/vuls/id/852879 -CVE-2014-9296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2014-9300 - http://seclists.org/bugtraq/2014/Jul/72 -CVE-2014-9301 - http://seclists.org/bugtraq/2014/Jul/72 -CVE-2014-9302 - http://seclists.org/bugtraq/2014/Jul/72 -CVE-2014-9303 - http://seclists.org/fulldisclosure/2014/Dec/2 -CVE-2014-9303 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-011 -CVE-2014-9305 - http://packetstormsecurity.com/files/129395/Cart66-Lite-WordPress-Ecommerce-1.5.1.17-SQL-Injection.html -CVE-2014-9305 - http://www.exploit-db.com/exploits/35459 -CVE-2014-9308 - http://packetstormsecurity.com/files/129875/WordPress-Shopping-Cart-3.0.4-Unrestricted-File-Upload.html -CVE-2014-9308 - http://www.exploit-db.com/exploits/35730 -CVE-2014-9311 - http://packetstormsecurity.com/files/131321/WordPress-Shareaholic-7.6.0.3-Cross-Site-Scripting.html -CVE-2014-9312 - http://packetstormsecurity.com/files/130104/Photo-Gallery-1.2.5-Shell-Upload.html -CVE-2014-9312 - http://packetstormsecurity.com/files/130384/WordPress-Photo-Gallery-1.2.5-Unrestricted-File-Upload.html -CVE-2014-9320 - http://packetstormsecurity.com/files/129613/SAP-Business-Objects-Search-Token-Privilege-Escalation.html -CVE-2014-9322 - http://www.exploit-db.com/exploits/36266 -CVE-2014-9325 - http://packetstormsecurity.com/files/129654/TWiki-6.0.1-QUERYSTRING-QUERYPARAMSTRING-XSS.html -CVE-2014-9330 - http://seclists.org/fulldisclosure/2014/Dec/97 -CVE-2014-9330 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2014-9330 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-9331 - http://packetstormsecurity.com/files/130219/ManageEngine-Desktop-Central-9-Cross-Site-Request-Forgery.html -CVE-2014-9331 - http://www.exploit-db.com/exploits/35980 -CVE-2014-9334 - http://packetstormsecurity.com/files/129623/WordPress-Bird-Feeder-1.2.3-CSRF-XSS.html -CVE-2014-9334 - http://seclists.org/fulldisclosure/2014/Dec/69 -CVE-2014-9334 - http://www.vulnerability-lab.com/get_content.php?id=1372 -CVE-2014-9335 - http://packetstormsecurity.com/files/129575/WordPress-DandyID-Services-ID-1.5.9-CSRF-XSS.html -CVE-2014-9336 - http://packetstormsecurity.com/files/129576/WordPress-iTwitter-WP-0.04-CSRF-XSS.html -CVE-2014-9336 - http://seclists.org/fulldisclosure/2014/Dec/72 -CVE-2014-9337 - http://packetstormsecurity.com/files/129577/Mikiurl-WordPress-Eklentisi-2.0-CSRF-XSS.html -CVE-2014-9338 - http://packetstormsecurity.com/files/129578/WordPress-O2Tweet-0.0.4-CSRF-XSS.html -CVE-2014-9339 - http://packetstormsecurity.com/files/129580/WordPress-SPNbabble-1.4.1-CSRF-XSS.html -CVE-2014-9340 - http://packetstormsecurity.com/files/129581/WordPress-wpCommentTwit-0.5-CSRF-XSS.html -CVE-2014-9341 - http://packetstormsecurity.com/files/129582/WordPress-yURL-ReTwitt-WP-1.4-CSRF-XSS.html -CVE-2014-9343 - http://packetstormsecurity.com/files/129162/Snowfox-CMS-1.0-Open-Redirect.html -CVE-2014-9343 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5206.php -CVE-2014-9344 - http://packetstormsecurity.com/files/129164/Snowfox-CMS-1.0-Cross-Site-Request-Forgery.html -CVE-2014-9344 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5205.php -CVE-2014-9345 - http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html -CVE-2014-9345 - http://www.exploit-db.com/exploits/35463 -CVE-2014-9348 - http://packetstormsecurity.com/files/129229/RobotStats-1.0-SQL-Injection.html -CVE-2014-9349 - http://packetstormsecurity.com/files/129230/RobotStats-1.0-Cross-Site-Scripting.html -CVE-2014-9350 - http://packetstormsecurity.com/files/129227/TP-Link-TL-WR740N-Denial-Of-Service.html -CVE-2014-9350 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5210.php -CVE-2014-9352 - http://seclists.org/fulldisclosure/2014/Oct/133 -CVE-2014-9360 - http://seclists.org/fulldisclosure/2014/Oct/133 -CVE-2014-9361 - https://www.drupal.org/node/2299467 -CVE-2014-9364 - https://www.drupal.org/node/2299467 -CVE-2014-9365 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-9365 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-9367 - http://packetstormsecurity.com/files/129655/TWiki-6.0.0-6.0.1-WebSearch-Cross-Site-Scripting.html -CVE-2014-9368 - http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.html -CVE-2014-9374 - http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html -CVE-2014-9382 - http://packetstormsecurity.com/files/132121/FreeBox-3.0.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9382 - http://seclists.org/fulldisclosure/2015/Jun/1 -CVE-2014-9385 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9385 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9386 - http://www.kb.cert.org/vuls/id/449452 -CVE-2014-9386 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing -CVE-2014-9389 - https://support.sonatype.com/entries/84705937-CVE-2014-9389-Nexus-Security-Advisory-Directory-Traversal -CVE-2014-9391 - http://packetstormsecurity.com/files/129637/WordPress-gSlideShow-0.1-CSRF-XSS.html -CVE-2014-9392 - http://packetstormsecurity.com/files/129638/WordPress-PictoBrowser-0.3.1-CSRF-XSS.html -CVE-2014-9393 - http://packetstormsecurity.com/files/129639/WordPress-Twitter-0.7-CSRF-XSS.html -CVE-2014-9394 - http://packetstormsecurity.com/files/129640/WordPress-PWG-Random-1.11-CSRF-XSS.html -CVE-2014-9395 - http://packetstormsecurity.com/files/129641/WordPress-Simplelife-1.2-CSRF-XSS.html -CVE-2014-9396 - http://packetstormsecurity.com/files/129642/WordPress-SimpleFlickr-3.0.3-CSRF-XSS.html -CVE-2014-9397 - http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9398 - http://packetstormsecurity.com/files/129644/WordPress-Twitter-LiveBlog-1.1.2-CSRF-XSS.html -CVE-2014-9399 - http://packetstormsecurity.com/files/129645/WordPress-TweetScribe-1.1-CSRF-XSS.html -CVE-2014-9400 - http://packetstormsecurity.com/files/129646/WordPress-WP-Unique-Article-Header-Image-1.0-CSRF-XSS.html -CVE-2014-9401 - http://packetstormsecurity.com/files/129647/WordPress-WP-Limit-Posts-Automatically-0.7-CSRF-XSS.html -CVE-2014-9402 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2014-9402 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2014-9402 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2014-9402 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2014-9402 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2014-9402 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2014-9402 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2014-9405 - http://packetstormsecurity.com/files/132121/FreeBox-3.0.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9405 - http://seclists.org/fulldisclosure/2015/Jun/1 -CVE-2014-9406 - http://seclists.org/fulldisclosure/2014/Dec/57 -CVE-2014-9408 - http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html -CVE-2014-9412 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html -CVE-2014-9412 - http://seclists.org/fulldisclosure/2014/Dec/78 -CVE-2014-9413 - http://packetstormsecurity.com/files/129500/WordPress-IP-Ban-1.2.3-CSRF-XSS.html -CVE-2014-9414 - http://packetstormsecurity.com/files/129512/W3-Total-Cache-0.9.4-Cross-Site-Request-Forgery.html -CVE-2014-9414 - http://seclists.org/fulldisclosure/2014/Dec/67 -CVE-2014-9415 - http://packetstormsecurity.com/files/152965/Huawei-eSpace-1.1.11.103-Unicode-Stack-Buffer-Overflow.html -CVE-2014-9416 - http://packetstormsecurity.com/files/152966/Huawei-eSpace-1.1.11.103-DLL-Hijacking.html -CVE-2014-9417 - http://packetstormsecurity.com/files/152967/Huawei-eSpace-1.1.11.103-Meeting-Image-File-Format-Handling-Buffer-Overflow.html -CVE-2014-9418 - http://packetstormsecurity.com/files/152968/Huawei-eSpace-1.1.11.103-Meeting-Heap-Overflow.html -CVE-2014-9420 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9421 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt -CVE-2014-9422 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt -CVE-2014-9423 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt -CVE-2014-9427 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9427 - https://hackerone.com/reports/73234 -CVE-2014-9429 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9430 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9431 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2014-9432 - http://packetstormsecurity.com/files/129709/CMS-Serendipity-2.0-rc1-Cross-Site-Scripting.html -CVE-2014-9432 - http://seclists.org/fulldisclosure/2014/Dec/108 -CVE-2014-9433 - http://packetstormsecurity.com/files/129713/CMS-Contenido-4.9.5-Cross-Site-Scripting.html -CVE-2014-9433 - http://seclists.org/fulldisclosure/2014/Dec/111 -CVE-2014-9434 - http://seclists.org/fulldisclosure/2014/Dec/131 -CVE-2014-9435 - http://seclists.org/fulldisclosure/2014/Dec/131 -CVE-2014-9436 - http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html -CVE-2014-9436 - http://seclists.org/fulldisclosure/2014/Dec/99 -CVE-2014-9437 - http://packetstormsecurity.com/files/129509 -CVE-2014-9438 - http://packetstormsecurity.com/files/129619/vBulletin-Moderator-Control-Panel-4.2.2-CSRF.html -CVE-2014-9438 - https://rstforums.com/forum/88810-csrf-vbulletin-modcp.rst -CVE-2014-9440 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9440 - http://www.exploit-db.com/exploits/35591 -CVE-2014-9441 - http://packetstormsecurity.com/files/129507 -CVE-2014-9444 - http://packetstormsecurity.com/files/129749/WordPress-Frontend-Uploader-0.9.2-Cross-Site-Scripting.html -CVE-2014-9444 - http://seclists.org/fulldisclosure/2014/Dec/122 -CVE-2014-9448 - http://www.exploit-db.com/exploits/35105 -CVE-2014-9451 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9451 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9452 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9452 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9453 - http://packetstormsecurity.com/files/129502/WordPress-Simple-Visitor-Stat-Cross-Site-Scripting.html -CVE-2014-9454 - http://packetstormsecurity.com/files/129503/WordPress-Simple-Sticky-Footer-1.3.2-CSRF-XSS.html -CVE-2014-9455 - http://packetstormsecurity.com/files/129451/ClassAd-3.0-SQL-Injection.html -CVE-2014-9456 - http://www.exploit-db.com/exploits/35589 -CVE-2014-9457 - http://www.exploit-db.com/exploits/35625 -CVE-2014-9458 - https://www.hex-rays.com/bugbounty.shtml -CVE-2014-9458 - https://www.hex-rays.com/vulnfix.shtml -CVE-2014-9459 - http://packetstormsecurity.com/files/129751/e107-2.0-Alpha2-Cross-Site-Request-Forgery.html -CVE-2014-9459 - http://seclists.org/fulldisclosure/2014/Dec/124 -CVE-2014-9460 - http://packetstormsecurity.com/files/129501/WordPress-WP-ViperGB-1.3.10-CSRF-XSS.html -CVE-2014-9463 - https://blog.sucuri.net/2015/01/serious-vulnerability-on-vbseo.html -CVE-2014-9463 - https://www.exploit-db.com/exploits/36232/ -CVE-2014-9464 - https://github.com/microweber/microweber/commit/4ee09f9dda35cd1b15daa351f335c2a4a0538d29 -CVE-2014-9466 - http://packetstormsecurity.com/files/130379/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Exposure.html -CVE-2014-9469 - http://packetstormsecurity.com/files/130393/vBulletin-5.1.3-Cross-Site-Scripting.html -CVE-2014-9471 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147 -CVE-2014-9480 - https://phabricator.wikimedia.org/T69180 -CVE-2014-9491 - http://seclists.org/oss-sec/2015/q1/27 -CVE-2014-9493 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-9496 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2014-9512 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2014-9512 - http://www.ubuntu.com/usn/USN-2879-1 -CVE-2014-9515 - https://github.com/DozerMapper/dozer/issues/217 -CVE-2014-9515 - https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rce -CVE-2014-9515 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2014-9517 - http://packetstormsecurity.com/files/129609/D-Link-DCS-2103-Brute-Force-Cross-Site-Scripting.html -CVE-2014-9522 - http://packetstormsecurity.com/files/129586/CMS-Papoo-6.0.0-Revision-4701-Cross-Site-Scripting.html -CVE-2014-9523 - http://packetstormsecurity.com/files/129499/WordPress-Our-Team-Showcase-1.2-CSRF-XSS.html -CVE-2014-9524 - http://packetstormsecurity.com/files/129506/WordPress-Facebook-Like-Box-2.8.2-CSRF-XSS.html -CVE-2014-9525 - http://packetstormsecurity.com/files/129510/WordPress-Timed-Popup-1.3-CSRF-XSS.html -CVE-2014-9526 - http://packetstormsecurity.com/files/129446/Concrete5-CMS-5.7.2-5.7.2.1-Cross-Site-Scripting.html -CVE-2014-9526 - http://seclists.org/fulldisclosure/2014/Dec/38 -CVE-2014-9528 - http://packetstormsecurity.com/files/129440/Humhub-0.10.0-rc.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2014-9528 - http://seclists.org/fulldisclosure/2014/Dec/31 -CVE-2014-9528 - http://www.exploit-db.com/exploits/35510 -CVE-2014-9529 - http://www.ubuntu.com/usn/USN-2512-1 -CVE-2014-9529 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2014-9557 - http://packetstormsecurity.com/files/130076/SmartCMS-2-Cross-Site-Scripting.html -CVE-2014-9558 - http://packetstormsecurity.com/files/130075/SmartCMS-2-SQL-Injection.html -CVE-2014-9560 - http://packetstormsecurity.com/files/129888/SoftBB-0.1.3-SQL-Injection.html -CVE-2014-9560 - http://seclists.org/fulldisclosure/2015/Jan/20 -CVE-2014-9561 - http://packetstormsecurity.com/files/129889/SoftBB-0.1.3-Cross-Site-Scripting.html -CVE-2014-9561 - http://seclists.org/fulldisclosure/2015/Jan/21 -CVE-2014-9562 - http://seclists.org/fulldisclosure/2015/Feb/8 -CVE-2014-9566 - http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html -CVE-2014-9567 - http://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html -CVE-2014-9568 - http://puppetlabs.com/security/cve/cve-2014-9568 -CVE-2014-9575 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9575 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9576 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9576 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9577 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9577 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9578 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9578 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9579 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -CVE-2014-9579 - http://seclists.org/fulldisclosure/2014/Dec/76 -CVE-2014-9580 - http://packetstormsecurity.com/files/129666 -CVE-2014-9583 - http://packetstormsecurity.com/files/129815/ASUSWRT-3.0.0.4.376_1071-LAN-Backdoor-Command-Execution.html -CVE-2014-9583 - https://www.exploit-db.com/exploits/44524/ -CVE-2014-9584 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9584 - http://www.ubuntu.com/usn/USN-2512-1 -CVE-2014-9584 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2014-9585 - http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html -CVE-2014-9585 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2014-9597 - https://trac.videolan.org/vlc/ticket/13389 -CVE-2014-9599 - http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html -CVE-2014-9600 - http://packetstormsecurity.com/files/129764/iExplorer-3.6.3.0-DLL-Hijacking.html -CVE-2014-9605 - https://www.exploit-db.com/exploits/37928/ -CVE-2014-9606 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9607 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9608 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9609 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9610 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9610 - https://www.exploit-db.com/exploits/37929/ -CVE-2014-9611 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9611 - https://www.exploit-db.com/exploits/37931/ -CVE-2014-9612 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9613 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9614 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9615 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9616 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9617 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9618 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9618 - https://www.exploit-db.com/exploits/37933/ -CVE-2014-9619 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -CVE-2014-9619 - https://www.exploit-db.com/exploits/37932/ -CVE-2014-9620 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-9622 - http://seclists.org/fulldisclosure/2014/Nov/36 -CVE-2014-9623 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9632 - http://packetstormsecurity.com/files/130248/AVG-Internet-Security-2015.0.5315-Privilege-Escalation.html -CVE-2014-9633 - http://packetstormsecurity.com/files/130094/Comodo-Backup-4.4.0.0-NULL-Pointer-Dereference.html -CVE-2014-9636 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9642 - http://packetstormsecurity.com/files/130247/BullGuard-14.1.285.4-Privilege-Escalation.html -CVE-2014-9643 - http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html -CVE-2014-9644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-9644 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2014-9644 - http://www.ubuntu.com/usn/USN-2543-1 -CVE-2014-9644 - https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu -CVE-2014-9645 - http://seclists.org/fulldisclosure/2020/Mar/15 -CVE-2014-9645 - https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu -CVE-2014-9652 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9652 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-9653 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2014-9653 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-9654 - http://bugs.icu-project.org/trac/changeset/36801 -CVE-2014-9654 - http://bugs.icu-project.org/trac/ticket/11371 -CVE-2014-9654 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9655 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2014-9655 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2014-9656 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9657 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9658 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9659 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9660 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9661 - http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html -CVE-2014-9661 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9663 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9664 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9666 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9667 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9669 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9670 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9671 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9672 - http://packetstormsecurity.com/files/134395/FreeType-2.5.3-Mac-FOND-Resource-Parsing-Out-Of-Bounds-Read-From-Stack.html -CVE-2014-9672 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9673 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9674 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9675 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9677 - http://www.theregister.co.uk/2014/12/23/wikileaks_pdf_viewer_vuln/ -CVE-2014-9678 - http://www.theregister.co.uk/2014/12/23/wikileaks_pdf_viewer_vuln/ -CVE-2014-9679 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-9680 - http://openwall.com/lists/oss-security/2014/10/15/24 -CVE-2014-9683 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9686 - http://seclists.org/fulldisclosure/2014/Feb/53 -CVE-2014-9701 - https://www.mantisbt.org/bugs/view.php?id=17362#c40613 -CVE-2014-9705 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9705 - https://bugs.php.net/bug.php?id=68552 -CVE-2014-9705 - https://hackerone.com/reports/104013 -CVE-2014-9706 - http://www.openwall.com/lists/oss-security/2015/03/21/1 -CVE-2014-9707 - http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html -CVE-2014-9708 - http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html -CVE-2014-9708 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2014-9709 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2014-9709 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9711 - http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html -CVE-2014-9711 - http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html -CVE-2014-9711 - https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html -CVE-2014-9711 - https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html -CVE-2014-9715 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 -CVE-2014-9715 - http://www.openwall.com/lists/oss-security/2015/04/08/1 -CVE-2014-9715 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2014-9717 - http://www.openwall.com/lists/oss-security/2015/04/17/4 -CVE-2014-9727 - http://www.exploit-db.com/exploits/33136 -CVE-2014-9734 - http://packetstormsecurity.com/files/132366/WordPress-Revslider-4.2.2-XSS-Information-Disclosure.html -CVE-2014-9734 - http://www.exploit-db.com/exploits/34511 -CVE-2014-9734 - https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html -CVE-2014-9735 - http://seclists.org/fulldisclosure/2014/Nov/78 -CVE-2014-9735 - https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ -CVE-2014-9735 - https://wpvulndb.com/vulnerabilities/7954 -CVE-2014-9743 - http://seclists.org/fulldisclosure/2014/Mar/324 -CVE-2014-9746 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2014-9750 - http://www.kb.cert.org/vuls/id/852879 -CVE-2014-9750 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-9751 - http://www.kb.cert.org/vuls/id/852879 -CVE-2014-9751 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2014-9752 - http://packetstormsecurity.com/files/134215/ATutor-2.2-File-Upload.html -CVE-2014-9754 - http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html -CVE-2014-9755 - http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html -CVE-2014-9757 - http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html -CVE-2014-9758 - http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/ -CVE-2014-9761 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2014-9761 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2014-9761 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2014-9761 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2014-9761 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2014-9761 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2014-9766 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2014-9773 - http://www.openwall.com/lists/oss-security/2016/05/03/1 -CVE-2014-9803 - https://www.kernel.org/pub/linux/kernel/next/patch-v3.15-rc5-next-20140519.xz -CVE-2014-9862 - http://seclists.org/fulldisclosure/2020/Jul/8 -CVE-2014-9862 - http://www.openwall.com/lists/oss-security/2020/07/09/2 -CVE-2014-9911 - http://bugs.icu-project.org/trac/changeset/35699 -CVE-2014-9911 - http://bugs.icu-project.org/trac/ticket/1089 -CVE-2014-9911 - https://bugs.php.net/bug.php?id=67397 -CVE-2014-9912 - https://bugs.php.net/bug.php?id=67397 -CVE-2014-9913 - https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 -CVE-2014-9917 - https://www.exploit-db.com/exploits/34089/ -CVE-2014-9918 - https://www.exploit-db.com/exploits/34089/ -CVE-2014-9919 - https://www.exploit-db.com/exploits/34089/ -CVE-2014-9938 - https://github.com/njhartwell/pw3nage -CVE-2014-9945 - http://www.securityfocus.com/bid/98246 -CVE-2014-9953 - http://www.securityfocus.com/bid/98874 -CVE-2014-9954 - http://www.securityfocus.com/bid/98874 -CVE-2014-9955 - http://www.securityfocus.com/bid/98874 -CVE-2014-9956 - http://www.securityfocus.com/bid/98874 -CVE-2014-9957 - http://www.securityfocus.com/bid/98874 -CVE-2014-9958 - http://www.securityfocus.com/bid/98874 -CVE-2014-9959 - http://www.securityfocus.com/bid/98874 -CVE-2014-9960 - http://www.securityfocus.com/bid/98874 -CVE-2014-9961 - http://www.securityfocus.com/bid/98874 -CVE-2014-9962 - http://www.securityfocus.com/bid/98874 -CVE-2014-9963 - http://www.securityfocus.com/bid/98874 -CVE-2014-9964 - http://www.securityfocus.com/bid/98874 -CVE-2014-9965 - http://www.securityfocus.com/bid/98874 -CVE-2014-9966 - http://www.securityfocus.com/bid/98874 -CVE-2014-9967 - http://www.securityfocus.com/bid/98874 -CVE-2014-9971 - http://www.securityfocus.com/bid/103671 -CVE-2014-9972 - http://www.securityfocus.com/bid/103671 -CVE-2014-9976 - http://www.securityfocus.com/bid/103671 -CVE-2014-9981 - http://www.securityfocus.com/bid/103671 -CVE-2014-9983 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172 -CVE-2014-9984 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2014-9984 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2014-9984 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2014-9984 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2014-9984 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2014-9984 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2014-9985 - http://www.securityfocus.com/bid/103671 -CVE-2014-9986 - http://www.securityfocus.com/bid/103671 -CVE-2014-9987 - http://www.securityfocus.com/bid/103671 -CVE-2014-9988 - http://www.securityfocus.com/bid/103671 -CVE-2014-9989 - http://www.securityfocus.com/bid/103671 -CVE-2014-9990 - http://www.securityfocus.com/bid/103671 -CVE-2014-9991 - http://www.securityfocus.com/bid/103671 -CVE-2014-9993 - http://www.securityfocus.com/bid/103671 -CVE-2014-9994 - http://www.securityfocus.com/bid/103671 -CVE-2014-9995 - http://www.securityfocus.com/bid/103671 -CVE-2014-9996 - http://www.securityfocus.com/bid/103671 -CVE-2014-9997 - http://www.securityfocus.com/bid/103671 -CVE-2014-9998 - http://www.securityfocus.com/bid/103671 -CVE-2015-0001 - http://packetstormsecurity.com/files/134392/Microsoft-Windows-8.1-Ahcache.sys-NtApphelpCacheControl-Privilege-Escalation.html -CVE-2015-0002 - http://www.zdnet.com/article/google-discloses-unpatched-windows-vulnerability/ -CVE-2015-0005 - http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html -CVE-2015-0005 - http://seclists.org/fulldisclosure/2015/Mar/60 -CVE-2015-0005 - http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation -CVE-2015-0008 - http://packetstormsecurity.com/files/155002/Microsoft-Windows-Server-2012-Group-Policy-Remote-Code-Execution.html -CVE-2015-0008 - http://www.kb.cert.org/vuls/id/787252 -CVE-2015-0009 - http://packetstormsecurity.com/files/155007/Microsoft-Windows-Server-2012-Group-Policy-Security-Feature-Bypass.html -CVE-2015-0016 - http://packetstormsecurity.com/files/130201/MS15-004-Microsoft-Remote-Desktop-Services-Web-Proxy-IE-Sandbox-Escape.html -CVE-2015-0030 - http://www.securityfocus.com/bid/72444 -CVE-2015-0040 - https://www.exploit-db.com/exploits/40757/ -CVE-2015-0050 - https://www.exploit-db.com/exploits/40841/ -CVE-2015-0057 - https://www.exploit-db.com/exploits/39035/ -CVE-2015-0064 - https://www.exploit-db.com/exploits/37967/ -CVE-2015-0065 - https://www.exploit-db.com/exploits/37966/ -CVE-2015-0072 - http://innerht.ml/blog/ie-uxss.html -CVE-2015-0072 - http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html -CVE-2015-0072 - http://www.pcworld.com/article/2879372/dangerous-ie-vulnerability-opens-door-to-powerful-phishing-attacks.html -CVE-2015-0072 - https://nakedsecurity.sophos.com/2015/02/04/internet-explorer-has-a-cross-site-scripting-zero-day-bug/ -CVE-2015-0097 - https://www.exploit-db.com/exploits/37657/ -CVE-2015-0138 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0179 - https://www.exploit-db.com/exploits/42605/ -CVE-2015-0192 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0197 - http://www-304.ibm.com/support/docview.wss?uid=swg21902662 -CVE-2015-0198 - http://www-304.ibm.com/support/docview.wss?uid=swg21902662 -CVE-2015-0199 - http://www-304.ibm.com/support/docview.wss?uid=swg21902662 -CVE-2015-0203 - https://packetstormsecurity.com/files/129941/Apache-Qpid-0.30-Denial-Of-Service.html -CVE-2015-0204 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0204 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2015-0204 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-0204 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-0204 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0204 - http://www.securityfocus.com/bid/91787 -CVE-2015-0205 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2015-0205 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-0205 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0205 - http://www.securityfocus.com/bid/91787 -CVE-2015-0206 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 -CVE-2015-0206 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-0206 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0206 - http://www.securityfocus.com/bid/91787 -CVE-2015-0207 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0208 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0209 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0223 - http://packetstormsecurity.com/files/130106/Apache-Qpid-0.30-Anonymous-Action-Prevention.html -CVE-2015-0224 - http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html -CVE-2015-0225 - http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html -CVE-2015-0228 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-0228 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0228 - http://www.securityfocus.com/bid/91787 -CVE-2015-0228 - https://hackerone.com/reports/103991 -CVE-2015-0231 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0232 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0235 - http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/ -CVE-2015-0235 - http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html -CVE-2015-0235 - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html -CVE-2015-0235 - http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html -CVE-2015-0235 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2015-0235 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -CVE-2015-0235 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html -CVE-2015-0235 - http://seclists.org/fulldisclosure/2015/Jan/111 -CVE-2015-0235 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2015-0235 - http://seclists.org/fulldisclosure/2021/Sep/0 -CVE-2015-0235 - http://seclists.org/fulldisclosure/2022/Jun/36 -CVE-2015-0235 - http://seclists.org/oss-sec/2015/q1/274 -CVE-2015-0235 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0235 - http://www.securityfocus.com/bid/91787 -CVE-2015-0235 - https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability -CVE-2015-0235 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2015-0235 - https://kc.mcafee.com/corporate/index?page=content&id=SB10100 -CVE-2015-0235 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2015-0235 - https://security.netapp.com/advisory/ntap-20150127-0001/ -CVE-2015-0235 - https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt -CVE-2015-0239 - http://www.openwall.com/lists/oss-security/2015/01/27/6 -CVE-2015-0239 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0239 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0239 - http://www.ubuntu.com/usn/USN-2514-1 -CVE-2015-0240 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0240 - http://www.ubuntu.com/usn/USN-2508-1 -CVE-2015-0240 - https://www.exploit-db.com/exploits/36741/ -CVE-2015-0245 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0247 - http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html -CVE-2015-0248 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0250 - http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html -CVE-2015-0250 - http://seclists.org/fulldisclosure/2015/Mar/142 -CVE-2015-0251 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0252 - http://packetstormsecurity.com/files/131756/Apache-Xerces-C-XML-Parser-Denial-Of-Service.html -CVE-2015-0252 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-0252 - https://www.exploit-db.com/exploits/36906/ -CVE-2015-0253 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0253 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0254 - http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html -CVE-2015-0254 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-0254 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2015-0254 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2015-0255 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0255 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0258 - http://packetstormsecurity.com/files/133736/Collabtive-2.0-Shell-Upload.html -CVE-2015-0261 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -CVE-2015-0265 - http://www.slideshare.net/wojdwo/big-problems-with-big-data-hadoop-interfaces-security -CVE-2015-0266 - http://www.slideshare.net/wojdwo/big-problems-with-big-data-hadoop-interfaces-security -CVE-2015-0272 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0273 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0273 - https://bugs.php.net/bug.php?id=68942 -CVE-2015-0274 - http://www.ubuntu.com/usn/USN-2543-1 -CVE-2015-0275 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0279 - http://packetstormsecurity.com/files/153734/Tufin-Secure-Change-Remote-Code-Execution.html -CVE-2015-0279 - http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html -CVE-2015-0279 - http://seclists.org/fulldisclosure/2019/Jul/21 -CVE-2015-0285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0286 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-0286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0288 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0288 - https://hackerone.com/reports/73236 -CVE-2015-0289 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0290 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0291 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0293 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-0293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-0299 - http://packetstormsecurity.com/files/133737/Open-Source-Point-Of-Sale-2.3.1-Cross-Site-Scripting.html -CVE-2015-0313 - http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.html -CVE-2015-0313 - https://www.exploit-db.com/exploits/36579/ -CVE-2015-0336 - https://www.exploit-db.com/exploits/36962/ -CVE-2015-0343 - http://packetstormsecurity.com/files/132269/Adobe-Connect-9.3-Cross-Site-Scripting.html -CVE-2015-0343 - http://seclists.org/bugtraq/2015/Jun/61 -CVE-2015-0343 - http://seclists.org/fulldisclosure/2015/Jun/35 -CVE-2015-0362 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0363 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0364 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0365 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0366 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0367 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0368 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0369 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0370 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0371 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0372 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0373 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0374 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0374 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0374 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0375 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0376 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0377 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf -CVE-2015-0377 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0378 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0379 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0380 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0381 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0381 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0381 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0382 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0382 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0382 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0382 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0383 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0383 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0384 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0385 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0386 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0387 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0388 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0389 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0390 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0391 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0392 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0393 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0394 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0395 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0395 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0396 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0397 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0398 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0399 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0400 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0400 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0401 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0402 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0403 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0403 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0404 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0405 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0406 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0406 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0407 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0407 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0408 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0408 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0409 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0409 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0410 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0410 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0411 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0411 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0411 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0411 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0412 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0412 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0413 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0413 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html -CVE-2015-0414 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0415 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0416 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0417 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0418 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0419 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0420 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0421 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0422 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0423 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0423 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0424 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0425 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0426 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0427 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0428 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0429 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0430 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0431 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0432 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0432 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0432 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0433 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0433 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0433 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0433 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0434 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0435 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0436 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0437 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -CVE-2015-0438 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0439 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0440 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0441 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0443 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0444 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0445 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0446 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0447 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0448 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0449 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0450 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0451 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0452 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0453 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0455 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0456 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0457 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0458 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0458 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0459 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0459 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0460 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0460 - http://www.ubuntu.com/usn/USN-2573-1 -CVE-2015-0461 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0462 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0463 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0464 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0465 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0466 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0467 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0468 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-0469 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0469 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0469 - http://www.ubuntu.com/usn/USN-2573-1 -CVE-2015-0470 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0471 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0472 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0473 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0474 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0475 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0476 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0477 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0477 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0477 - http://www.ubuntu.com/usn/USN-2573-1 -CVE-2015-0478 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0478 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0478 - http://www.ubuntu.com/usn/USN-2573-1 -CVE-2015-0479 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0480 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0480 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0480 - http://www.ubuntu.com/usn/USN-2573-1 -CVE-2015-0482 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0483 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0484 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0485 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0486 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0486 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0487 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0488 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0488 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0488 - http://www.ubuntu.com/usn/USN-2573-1 -CVE-2015-0489 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0490 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0491 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-0491 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0492 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0493 - http://packetstormsecurity.com/files/131494/Oracle-Outside-In-ibpsd2.dll-PSD-File-Processing-Buffer-Overflow.html -CVE-2015-0493 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0494 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0495 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0496 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0497 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0498 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0499 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0499 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0499 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0500 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-0500 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0501 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0502 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0503 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0504 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0505 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-0505 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0506 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0507 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0508 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0509 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0510 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0511 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-0514 - http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html -CVE-2015-0514 - https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html -CVE-2015-0519 - http://packetstormsecurity.com/files/130284/EMC-Captiva-Capture-Sensitive-Information-Disclosure.html -CVE-2015-0521 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html -CVE-2015-0522 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html -CVE-2015-0523 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html -CVE-2015-0524 - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html -CVE-2015-0525 - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html -CVE-2015-0527 - http://packetstormsecurity.com/files/130959/EMC-Documentum-xMS-Sensitive-Information-Disclosure.html -CVE-2015-0528 - http://packetstormsecurity.com/files/131035/EMC-Isilon-OneFS-Privilege-Escalation.html -CVE-2015-0529 - http://packetstormsecurity.com/files/131250/EMC-PowerPath-Virtual-Appliance-Undocumented-User-Accounts.html -CVE-2015-0531 - http://packetstormsecurity.com/files/131748/EMC-SourceOne-Email-Management-Account-Lockout-Policy.html -CVE-2015-0532 - http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html -CVE-2015-0538 - http://packetstormsecurity.com/files/131749/EMC-AutoStart-5.4.3-5.5.0-Packet-Injection.html -CVE-2015-0553 - http://packetstormsecurity.com/files/130008/CMS-Websitebaker-2.8.3-SP3-Cross-Site-Scripting.html -CVE-2015-0554 - http://packetstormsecurity.com/files/129828/Pirelli-ADSL2-2-Wireless-Router-P.DGA4001N-Information-Disclosure.html -CVE-2015-0555 - http://packetstormsecurity.com/files/131421/Samsung-iPOLiS-1.12.2-ReadConfigValue-Remote-Code-Execution.html -CVE-2015-0555 - http://seclists.org/fulldisclosure/2015/Feb/81 -CVE-2015-0558 - http://packetstormsecurity.com/files/129817/Pirelli-Router-P.DG-A4001N-WPA-Key-Reverse-Engineering.html -CVE-2015-0561 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0561 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773 -CVE-2015-0562 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0562 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0563 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0563 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0564 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -CVE-2015-0564 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0565 - https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html -CVE-2015-0565 - https://www.exploit-db.com/exploits/36310/ -CVE-2015-0565 - https://www.exploit-db.com/exploits/36311/ -CVE-2015-0569 - https://www.exploit-db.com/exploits/39308/ -CVE-2015-0574 - http://www.securityfocus.com/bid/103671 -CVE-2015-0576 - http://www.securityfocus.com/bid/103671 -CVE-2015-0624 - http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html -CVE-2015-0635 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani -CVE-2015-0636 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani -CVE-2015-0637 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani -CVE-2015-0659 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0659 -CVE-2015-0779 - http://seclists.org/fulldisclosure/2015/Apr/21 -CVE-2015-0779 - https://www.exploit-db.com/exploits/36964/ -CVE-2015-0797 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0798 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0799 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0800 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0801 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0801 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0801 - https://bugzilla.mozilla.org/show_bug.cgi?id=1146339 -CVE-2015-0802 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0802 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0802 - https://www.exploit-db.com/exploits/37958/ -CVE-2015-0803 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0803 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0804 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0804 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0805 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0805 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0806 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0806 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0807 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0807 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0808 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0808 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0810 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0810 - https://bugzilla.mozilla.org/show_bug.cgi?id=1125013 -CVE-2015-0811 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0811 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0812 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0812 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0812 - https://bugzilla.mozilla.org/show_bug.cgi?id=1128126 -CVE-2015-0813 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0813 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0814 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0814 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0815 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0815 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0816 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0816 - http://www.ubuntu.com/usn/USN-2550-1 -CVE-2015-0816 - https://www.exploit-db.com/exploits/37958/ -CVE-2015-0817 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1145255 -CVE-2015-0818 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0818 - https://bugzilla.mozilla.org/show_bug.cgi?id=1144988 -CVE-2015-0819 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0820 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0821 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0821 - https://bugzilla.mozilla.org/show_bug.cgi?id=1111960 -CVE-2015-0822 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0822 - https://bugzilla.mozilla.org/show_bug.cgi?id=1110557 -CVE-2015-0823 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0824 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0825 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0826 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0827 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0828 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0829 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0830 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0831 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0831 - https://bugzilla.mozilla.org/show_bug.cgi?id=1130541 -CVE-2015-0832 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0833 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0833 - https://bugzilla.mozilla.org/show_bug.cgi?id=945192 -CVE-2015-0834 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0835 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-0835 - https://bugzilla.mozilla.org/show_bug.cgi?id=1092947 -CVE-2015-0836 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-0836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1111243 -CVE-2015-0836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1111248 -CVE-2015-0836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1117406 -CVE-2015-0848 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-0852 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2015-0860 - https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html -CVE-2015-0884 - http://www.kb.cert.org/vuls/id/632140 -CVE-2015-0899 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-0901 - https://wpvulndb.com/vulnerabilities/7872 -CVE-2015-0917 - http://packetstormsecurity.com/files/129826/Kajona-CMS-4.6-Cross-Site-Scripting.html -CVE-2015-0917 - http://seclists.org/fulldisclosure/2015/Jan/11 -CVE-2015-0918 - http://packetstormsecurity.com/files/129825/Sefrengo-CMS-1.6.0-Cross-Site-Scripting.html -CVE-2015-0918 - http://seclists.org/fulldisclosure/2015/Jan/10 -CVE-2015-0919 - http://packetstormsecurity.com/files/129824/Sefrengo-CMS-1.6.0-SQL-Injection.html -CVE-2015-0919 - http://seclists.org/fulldisclosure/2015/Jan/9 -CVE-2015-0920 - http://packetstormsecurity.com/files/129804/WordPress-Banner-Effect-Header-1.2.6-XSS-CSRF.html -CVE-2015-0921 - http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html -CVE-2015-0921 - http://seclists.org/fulldisclosure/2015/Jan/8 -CVE-2015-0921 - https://kc.mcafee.com/corporate/index?page=content&id=SB10095 -CVE-2015-0922 - http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html -CVE-2015-0922 - http://seclists.org/fulldisclosure/2015/Jan/8 -CVE-2015-0922 - https://kc.mcafee.com/corporate/index?page=content&id=SB10095 -CVE-2015-0923 - http://www.kb.cert.org/vuls/id/377644 -CVE-2015-0925 - http://www.kb.cert.org/vuls/id/110652 -CVE-2015-0926 - http://www.kb.cert.org/vuls/id/637068 -CVE-2015-0931 - http://www.kb.cert.org/vuls/id/377644 -CVE-2015-0933 - http://www.kb.cert.org/vuls/id/302668 -CVE-2015-0934 - http://www.kb.cert.org/vuls/id/302668 -CVE-2015-0935 - http://www.kb.cert.org/vuls/id/978652 -CVE-2015-0935 - https://www.exploit-db.com/exploits/39958/ -CVE-2015-0936 - http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html -CVE-2015-0936 - http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html -CVE-2015-0937 - http://www.kb.cert.org/vuls/id/274244 -CVE-2015-0938 - http://www.kb.cert.org/vuls/id/274244 -CVE-2015-0943 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-0949 - http://www.kb.cert.org/vuls/id/631788 -CVE-2015-0950 - http://www.kb.cert.org/vuls/id/924124 -CVE-2015-0951 - http://www.kb.cert.org/vuls/id/924124 -CVE-2015-0961 - http://www.kb.cert.org/vuls/id/534407 -CVE-2015-0962 - http://www.kb.cert.org/vuls/id/534407 -CVE-2015-0974 - http://packetstormsecurity.com/files/129808/ZTE-Datacard-MF19-Privilege-Escalation-DLL-Hijacking.html -CVE-2015-0984 - http://seclists.org/fulldisclosure/2015/Apr/79 -CVE-2015-1000013 - http://www.vapidlabs.com/advisory.php?v=153 -CVE-2015-10001 - https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734 -CVE-2015-10001 - https://www.openwall.com/lists/oss-security/2015/06/17/6 -CVE-2015-10007 - https://github.com/82Flex/WEIPDCRM/commit/43bad79392332fa39e31b95268e76fbda9fec3a4 -CVE-2015-10008 - https://github.com/82Flex/WEIPDCRM/commit/43bad79392332fa39e31b95268e76fbda9fec3a4 -CVE-2015-10009 - https://vuldb.com/?id.217187 -CVE-2015-10028 - https://vuldb.com/?ctiid.217624 -CVE-2015-10030 - https://vuldb.com/?ctiid.217642 -CVE-2015-10032 - https://vuldb.com/?id.217663 -CVE-2015-10041 - https://vuldb.com/?id.218304 -CVE-2015-10063 - https://vuldb.com/?ctiid.218453 -CVE-2015-10075 - https://vuldb.com/?id.220219 -CVE-2015-10087 - https://vuldb.com/?id.221809 -CVE-2015-10087 - https://www.exploit-db.com/exploits/36372 -CVE-2015-10090 - https://github.com/wp-plugins/landing-pages/commit/c8e22c1340c11fedfb0a0a67ea690421bdb62b94 -CVE-2015-10101 - https://github.com/wp-plugins/google-analytics-top-posts-widget/commit/25bb1dea113716200a6f0f3135801d84a7a65540 -CVE-2015-10129 - https://vuldb.com/?id.252716 -CVE-2015-1026 - http://packetstormsecurity.com/files/130737/Manage-Engine-AD-Audit-Manager-Plus-Cross-Site-Scripting.html -CVE-2015-1027 - https://www.percona.com/blog/2015/05/06/percona-security-advisory-cve-2015-1027/ -CVE-2015-1028 - http://www.exploit-db.com/exploits/35747 -CVE-2015-1028 - http://www.exploit-db.com/exploits/35750 -CVE-2015-1028 - http://www.exploit-db.com/exploits/35751 -CVE-2015-1028 - http://www.xlabs.com.br/blog/?p=339 -CVE-2015-1029 - http://puppetlabs.com/security/cve/cve-2015-1029 -CVE-2015-1032 - http://packetstormsecurity.com/files/130007/Kiwix-Cross-Site-Scripting.html -CVE-2015-1040 - http://packetstormsecurity.com/files/129865/CMS-BEdita-3.4.0-Cross-Site-Scripting.html -CVE-2015-1041 - http://packetstormsecurity.com/files/129872/CMS-e107-1.0.4-Cross-Site-Scripting.html -CVE-2015-1041 - http://www.securityfocus.com/bid/71977 -CVE-2015-1042 - http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html -CVE-2015-1050 - http://packetstormsecurity.com/files/129911/F5-BIG-IP-Application-Security-Manager-ASM-XSS.html -CVE-2015-1050 - http://seclists.org/fulldisclosure/2015/Jan/43 -CVE-2015-1052 - http://packetstormsecurity.com/files/129917/CMS-PHPKit-WCMS-1.6.6-Cross-Site-Scripting.html -CVE-2015-1052 - http://seclists.org/fulldisclosure/2015/Jan/25 -CVE-2015-1053 - http://packetstormsecurity.com/files/129916/CMS-Croogo-2.2.0-Cross-Site-Scripting.html -CVE-2015-1053 - http://seclists.org/fulldisclosure/2015/Jan/24 -CVE-2015-1054 - http://codecanyon.net/item/crea8social-php-social-networking-platform-v31/9211270/support -CVE-2015-1054 - http://packetstormsecurity.com/files/129816/Crea8Social-2.0-Cross-Site-Scripting.html -CVE-2015-1054 - http://www.exploit-db.com/exploits/35691 -CVE-2015-1056 - http://packetstormsecurity.com/files/129841/Brother-MFC-J4410DW-Cross-Site-Scripting.html -CVE-2015-1058 - http://packetstormsecurity.com/files/129812/AdaptCMS-3.0.3-Cross-Site-Scripting.html -CVE-2015-1058 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5218.php -CVE-2015-1059 - http://packetstormsecurity.com/files/129814/AdaptCMS-3.0.3-Remote-Command-Execution.html -CVE-2015-1059 - http://zeroscience.mk/en/vulnerabilities/ZSL-2015-5220.php -CVE-2015-1060 - http://packetstormsecurity.com/files/129813/AdaptCMS-3.0.3-HTTP-Referer-Header-Open-Redirect.html -CVE-2015-1060 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5219.php -CVE-2015-1100 - https://www.exploit-db.com/exploits/36814/ -CVE-2015-1130 - https://www.exploit-db.com/exploits/36692/ -CVE-2015-1157 - http://www.reddit.com/r/apple/comments/37e8c1/malicious_text_message/ -CVE-2015-1158 - http://www.kb.cert.org/vuls/id/810572 -CVE-2015-1158 - https://www.cups.org/str.php?L4609 -CVE-2015-1158 - https://www.exploit-db.com/exploits/37336/ -CVE-2015-1158 - https://www.exploit-db.com/exploits/41233/ -CVE-2015-1159 - http://www.kb.cert.org/vuls/id/810572 -CVE-2015-1159 - https://www.cups.org/str.php?L4609 -CVE-2015-1169 - http://packetstormsecurity.com/files/130053/CAS-Server-3.5.2-LDAP-Authentication-Bypass.html -CVE-2015-1169 - https://issues.jasig.org/browse/CAS-1429 -CVE-2015-1170 - http://nvidia.custhelp.com/app/answers/detail/a_id/3634 -CVE-2015-1171 - http://packetstormsecurity.com/files/129992/simeditor-overflow.txt -CVE-2015-1171 - https://osandamalith.wordpress.com/2015/01/16/sim-editor-stack-based-buffer-overflow/ -CVE-2015-1171 - https://www.youtube.com/watch?v=tljbFpYtDTk -CVE-2015-1172 - http://packetstormsecurity.com/files/130282/WordPress-Holding-Pattern-0.6-Shell-Upload.html -CVE-2015-1172 - https://wpvulndb.com/vulnerabilities/7784 -CVE-2015-1173 - http://packetstormsecurity.com/files/133147/UNIT4TETA-TETA-WEB-22.62.3.4-Authorization-Bypass.html -CVE-2015-1174 - http://packetstormsecurity.com/files/133296/UNIT4TETA-TETA-WEB-22.62.3.4-Session-Fixation.html -CVE-2015-1175 - http://packetstormsecurity.com/files/130026/Prestashop-1.6.0.9-Cross-Site-Scripting.html -CVE-2015-1176 - http://packetstormsecurity.com/files/130057/osTicket-1.9.4-Cross-Site-Scripting.html -CVE-2015-1177 - http://packetstormsecurity.com/files/130058/Exponent-CMS-2.3.2-Cross-Site-Scripting.html -CVE-2015-1178 - http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html -CVE-2015-1179 - http://packetstormsecurity.com/files/130062/Mango-Automation-SCADA-HMI-2.4.0-Cross-Site-Scripting.html -CVE-2015-1180 - http://packetstormsecurity.com/files/130063/EventSentry-3.1.0-Cross-Site-Scripting.html -CVE-2015-1187 - http://packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.html -CVE-2015-1187 - http://packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.html -CVE-2015-1188 - http://seclists.org/fulldisclosure/2015/Apr/103 -CVE-2015-1195 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1197 - http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html -CVE-2015-1204 - https://wpvulndb.com/vulnerabilities/7744 -CVE-2015-1205 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1209 - http://www.ubuntu.com/usn/USN-2495-1 -CVE-2015-1210 - http://www.ubuntu.com/usn/USN-2495-1 -CVE-2015-1211 - http://www.ubuntu.com/usn/USN-2495-1 -CVE-2015-1212 - http://www.ubuntu.com/usn/USN-2495-1 -CVE-2015-1265 - https://www.exploit-db.com/exploits/37766/ -CVE-2015-1270 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-1279 - https://code.google.com/p/chromium/issues/detail?id=483981 -CVE-2015-1282 - https://pdfium.googlesource.com/pdfium/+/4ff7a4246c81a71b4f878e959b3ca304cd76ec8a -CVE-2015-1283 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-1283 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2015-1283 - https://www.tenable.com/security/tns-2016-20 -CVE-2015-1300 - https://github.com/w3c/resource-timing/issues/29 -CVE-2015-1305 - http://packetstormsecurity.com/files/130177/McAfee-Data-Loss-Prevention-Endpoint-Privilege-Escalation.html -CVE-2015-1313 - https://beyondbinary.io/articles/teamcity-account-creation/ -CVE-2015-1314 - http://packetstormsecurity.com/files/130067/USAA-Mobile-App-Information-Disclosure.html -CVE-2015-1318 - https://www.exploit-db.com/exploits/36782/ -CVE-2015-1318 - https://www.exploit-db.com/exploits/43971/ -CVE-2015-1324 - http://www.ubuntu.com/usn/USN-2609-1 -CVE-2015-1324 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239 -CVE-2015-1325 - http://www.ubuntu.com/usn/USN-2609-1 -CVE-2015-1325 - https://www.exploit-db.com/exploits/37088/ -CVE-2015-1328 - https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html -CVE-2015-1328 - https://www.exploit-db.com/exploits/37292/ -CVE-2015-1331 - https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842 -CVE-2015-1333 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1335 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1336 - http://packetstormsecurity.com/files/140759/Man-db-2.6.7.1-Privilege-Escalation.html -CVE-2015-1336 - http://www.halfdog.net/Security/2015/MandbSymlinkLocalRootPrivilegeEscalation/ -CVE-2015-1338 - http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html -CVE-2015-1338 - http://seclists.org/fulldisclosure/2015/Sep/101 -CVE-2015-1338 - http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/ -CVE-2015-1338 - https://www.exploit-db.com/exploits/38353/ -CVE-2015-1345 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1349 - https://kb.isc.org/article/AA-01235 -CVE-2015-1351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1351 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-1352 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-1362 - http://packetstormsecurity.com/files/130037/Exif-Pilot-4.7.2-Buffer-Overflow.html -CVE-2015-1363 - http://packetstormsecurity.com/files/130066/articleFR-CMS-3.0.5-Cross-Site-Scripting.html -CVE-2015-1363 - http://seclists.org/fulldisclosure/2015/Jan/101 -CVE-2015-1364 - http://seclists.org/fulldisclosure/2015/Jan/81 -CVE-2015-1364 - http://www.exploit-db.com/exploits/35857 -CVE-2015-1365 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html -CVE-2015-1365 - http://seclists.org/fulldisclosure/2015/Jan/75 -CVE-2015-1365 - http://www.exploit-db.com/exploits/35846 -CVE-2015-1366 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html -CVE-2015-1366 - http://seclists.org/fulldisclosure/2015/Jan/75 -CVE-2015-1366 - http://www.exploit-db.com/exploits/35846 -CVE-2015-1367 - http://packetstormsecurity.com/files/129990/CatBot-0.4.2-SQL-Injection.html -CVE-2015-1367 - http://seclists.org/fulldisclosure/2015/Jan/63 -CVE-2015-1367 - http://www.vulnerability-lab.com/get_content.php?id=1408 -CVE-2015-1368 - http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html -CVE-2015-1368 - http://seclists.org/fulldisclosure/2015/Jan/52 -CVE-2015-1368 - http://www.exploit-db.com/exploits/35786 -CVE-2015-1375 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html -CVE-2015-1375 - http://seclists.org/fulldisclosure/2015/Jan/75 -CVE-2015-1375 - http://www.exploit-db.com/exploits/35846 -CVE-2015-1376 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html -CVE-2015-1376 - http://seclists.org/fulldisclosure/2015/Jan/75 -CVE-2015-1376 - http://www.exploit-db.com/exploits/35846 -CVE-2015-1384 - http://seclists.org/fulldisclosure/2015/Feb/2 -CVE-2015-1384 - https://www.netsparker.com/cve-2015-1384-xss-vulnerability-in-banner-effect-header/ -CVE-2015-1385 - http://packetstormsecurity.com/files/130155/Blubrry-PowerPress-6.0-Cross-Site-Scripting.html -CVE-2015-1385 - http://seclists.org/fulldisclosure/2015/Jan/130 -CVE-2015-1385 - https://www.netsparker.com/cve-2015-1385-xss-vulnerability-in-blubrry-powerpress/ -CVE-2015-1386 - http://www.openwall.com/lists/oss-security/2015/01/27/27 -CVE-2015-1386 - https://bugzilla.redhat.com/show_bug.cgi?id=1185717 -CVE-2015-1389 - http://packetstormsecurity.com/files/132060/Aruba-ClearPass-Policy-Manager-6.4-Cross-Site-Scripting.html -CVE-2015-1389 - https://www.exploit-db.com/exploits/37172/ -CVE-2015-1395 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873 -CVE-2015-1397 - https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html -CVE-2015-1400 - http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html -CVE-2015-1401 - http://www.openwall.com/lists/oss-security/2015/01/11/7 -CVE-2015-1402 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/ -CVE-2015-1402 - http://www.openwall.com/lists/oss-security/2015/01/11/7 -CVE-2015-1403 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/ -CVE-2015-1403 - http://www.openwall.com/lists/oss-security/2015/01/11/7 -CVE-2015-1404 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/ -CVE-2015-1404 - http://www.openwall.com/lists/oss-security/2015/01/11/7 -CVE-2015-1405 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/ -CVE-2015-1405 - http://www.openwall.com/lists/oss-security/2015/01/11/7 -CVE-2015-1415 - http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-Disclosure.html -CVE-2015-1418 - http://rachelbythebay.com/w/2018/04/05/bangpatch/ -CVE-2015-1418 - https://bugs.debian.org/894667 -CVE-2015-1422 - http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html -CVE-2015-1422 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php -CVE-2015-1423 - http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html -CVE-2015-1423 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php -CVE-2015-1424 - http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html -CVE-2015-1424 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php -CVE-2015-1427 - http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html -CVE-2015-1427 - http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html -CVE-2015-1427 - https://www.elastic.co/community/security/ -CVE-2015-1428 - http://www.exploit-db.com/exploits/35972 -CVE-2015-1434 - http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-1435 - http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-1436 - http://packetstormsecurity.com/files/130355/WordPress-Easing-Slider-2.2.0.6-Cross-Site-Scripting.html -CVE-2015-1437 - http://packetstormsecurity.com/files/130187/Asus-RT-N10-Plus-Cross-Site-Scripting.html -CVE-2015-1438 - http://packetstormsecurity.com/files/132682/Panda-Security-1.0.0.13-Arbitrary-Code-Execution.html -CVE-2015-1442 - http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html -CVE-2015-1442 - http://seclists.org/fulldisclosure/2015/Feb/4 -CVE-2015-1450 - http://packetstormsecurity.com/files/130122/Restaurantbiller-SQL-Injection-Shell-Upload.html -CVE-2015-1451 - http://seclists.org/fulldisclosure/2015/Jan/125 -CVE-2015-1452 - http://seclists.org/fulldisclosure/2015/Jan/125 -CVE-2015-1455 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html -CVE-2015-1456 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html -CVE-2015-1457 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html -CVE-2015-1458 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html -CVE-2015-1459 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html -CVE-2015-1467 - http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html -CVE-2015-1472 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2015-1472 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2015-1472 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2015-1472 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2015-1472 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-1472 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1472 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2015-1472 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2015-1473 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1474 - http://packetstormsecurity.com/files/130778/Google-Android-Integer-Oveflow-Heap-Corruption.html -CVE-2015-1474 - http://seclists.org/fulldisclosure/2015/Mar/63 -CVE-2015-1475 - http://packetstormsecurity.com/files/130220/My-Little-Forum-2.3.3-2.2-1.7-Cross-Site-Scripting.html -CVE-2015-1476 - http://packetstormsecurity.com/files/130073/ecommerceMajor-SQL-Injection.html -CVE-2015-1476 - http://www.exploit-db.com/exploits/35878 -CVE-2015-1477 - http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-1477 - http://www.exploit-db.com/exploits/35911 -CVE-2015-1478 - http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-1478 - http://www.exploit-db.com/exploits/35911 -CVE-2015-1479 - http://packetstormsecurity.com/files/130079/ManageEngine-ServiceDesk-9.0-SQL-Injection.html -CVE-2015-1479 - http://www.exploit-db.com/exploits/35890 -CVE-2015-1479 - http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-sql-injection-vulnerability -CVE-2015-1480 - http://packetstormsecurity.com/files/130081/ManageEngine-ServiceDesk-Plus-9.0-Privilege-Escalation.html -CVE-2015-1480 - http://www.exploit-db.com/exploits/35904 -CVE-2015-1480 - http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-privileges-management-vulnerability -CVE-2015-1481 - http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html -CVE-2015-1481 - http://seclists.org/fulldisclosure/2015/Jan/52 -CVE-2015-1481 - http://www.exploit-db.com/exploits/35786 -CVE-2015-1482 - http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html -CVE-2015-1482 - http://seclists.org/fulldisclosure/2015/Jan/52 -CVE-2015-1482 - http://www.exploit-db.com/exploits/35786 -CVE-2015-1486 - https://www.exploit-db.com/exploits/37812/ -CVE-2015-1487 - https://www.exploit-db.com/exploits/37812/ -CVE-2015-1489 - https://www.exploit-db.com/exploits/37812/ -CVE-2015-1497 - http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html -CVE-2015-1497 - https://www.exploit-db.com/exploits/40491/ -CVE-2015-1503 - http://packetstormsecurity.com/files/147505/IceWarp-Mail-Server-Directory-Traversal.html -CVE-2015-1503 - https://www.exploit-db.com/exploits/44587/ -CVE-2015-1503 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-001/?fid=5614 -CVE-2015-1512 - http://packetstormsecurity.com/files/130119/FancyFon-FAMOC-3.16.5-Cross-Site-Scripting.html -CVE-2015-1512 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-011.txt -CVE-2015-1513 - http://packetstormsecurity.com/files/130194/SIPhone-Enterprise-PBX-SQL-Injection.html -CVE-2015-1514 - http://packetstormsecurity.com/files/130117/FancyFon-FAMOC-3.16.5-SQL-Injection.html -CVE-2015-1514 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-010.txt -CVE-2015-1516 - http://adrianhayter.com/exploits.php -CVE-2015-1517 - http://packetstormsecurity.com/files/130440/Piwigo-2.7.3-SQL-Injection.html -CVE-2015-1518 - http://packetstormsecurity.com/files/130322/Radexscript-CMS-2.2.0-SQL-Injection.html -CVE-2015-1518 - http://seclists.org/fulldisclosure/2015/Feb/39 -CVE-2015-1518 - http://www.exploit-db.com/exploits/36023 -CVE-2015-1536 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-1538 - http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html -CVE-2015-1538 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-1538 - https://www.exploit-db.com/exploits/38124/ -CVE-2015-1539 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-1541 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-1547 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-1547 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-1547 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-1560 - http://packetstormsecurity.com/files/132607/Merethis-Centreon-2.5.4-SQL-Injection-Remote-Command-Execution.html -CVE-2015-1561 - http://packetstormsecurity.com/files/132607/Merethis-Centreon-2.5.4-SQL-Injection-Remote-Command-Execution.html -CVE-2015-1564 - http://seclists.org/fulldisclosure/2015/Jan/79 -CVE-2015-1571 - http://seclists.org/fulldisclosure/2015/Jan/125 -CVE-2015-1574 - http://packetstormsecurity.com/files/130388/Google-Email-4.4.2.0200-Denial-Of-Service.html -CVE-2015-1574 - http://seclists.org/fulldisclosure/2015/Feb/58 -CVE-2015-1575 - http://packetstormsecurity.com/files/130292/u5CMS-3.9.3-Cross-Site-Scripting.html -CVE-2015-1575 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5223.php -CVE-2015-1576 - http://packetstormsecurity.com/files/130326/u5CMS-3.9.3-SQL-Injection.html -CVE-2015-1576 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5225.php -CVE-2015-1577 - http://packetstormsecurity.com/files/130325/u5CMS-3.9.3-Arbitrary-File-Deletion.html -CVE-2015-1577 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5226.php -CVE-2015-1578 - http://packetstormsecurity.com/files/130317/u5CMS-3.9.3-Open-Redirect.html -CVE-2015-1578 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5227.php -CVE-2015-1579 - https://wpvulndb.com/vulnerabilities/7540 -CVE-2015-1580 - http://packetstormsecurity.com/files/130314/WordPress-Redirection-Page-1.2-CSRF-XSS.html -CVE-2015-1581 - http://packetstormsecurity.com/files/130316/WordPress-Mobile-Domain-1.5.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-1582 - http://packetstormsecurity.com/files/130318/WordPress-Spider-Facebook-1.0.10-Cross-Site-Scripting.html -CVE-2015-1583 - http://packetstormsecurity.com/files/130598/ATutor-LCMS-2.2-Cross-Site-Request-Forgery.html -CVE-2015-1583 - https://edricteo.com/cve-2015-1583-atutor-lcms-csrf-vulnerability/ -CVE-2015-1585 - http://packetstormsecurity.com/files/130410/Fat-Free-CRM-0.13.5-Cross-Site-Request-Forgery.html -CVE-2015-1587 - http://packetstormsecurity.com/files/130383/Maarch-LetterBox-2.8-Unrestricted-File-Upload.html -CVE-2015-1587 - http://www.exploit-db.com/exploits/35113 -CVE-2015-1588 - http://packetstormsecurity.com/files/131649/Open-Xchange-Server-6-OX-AppSuite-Cross-Site-Scripting.html -CVE-2015-1589 - http://www.openwall.com/lists/oss-security/2015/02/12/16 -CVE-2015-1589 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776164 -CVE-2015-1590 - https://github.com/kamailio/kamailio/issues/48 -CVE-2015-1591 - https://github.com/kamailio/kamailio/issues/48 -CVE-2015-1600 - http://packetstormsecurity.com/files/130401/Netatmo-Weather-Station-Cleartext-Password-Leak.html -CVE-2015-1603 - http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html -CVE-2015-1604 - http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html -CVE-2015-1614 - http://packetstormsecurity.com/files/130404/WordPress-Image-Metadata-Cruncher-Cross-Site-Scripting.html -CVE-2015-1635 - http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html -CVE-2015-1635 - https://www.exploit-db.com/exploits/36773/ -CVE-2015-1635 - https://www.exploit-db.com/exploits/36776/ -CVE-2015-1645 - http://packetstormsecurity.com/files/131457/Microsoft-Windows-GDI-MRSETDIBITSTODEVICE-bPlay-EMF-Parsing-Memory-Corruption.html -CVE-2015-1674 - https://www.exploit-db.com/exploits/37052/ -CVE-2015-1701 - http://seclists.org/fulldisclosure/2020/May/34 -CVE-2015-1701 - https://www.exploit-db.com/exploits/37049/ -CVE-2015-1701 - https://www.exploit-db.com/exploits/37367/ -CVE-2015-1721 - https://www.exploit-db.com/exploits/38274/ -CVE-2015-1722 - https://www.exploit-db.com/exploits/38265/ -CVE-2015-1722 - https://www.exploit-db.com/exploits/38275/ -CVE-2015-1723 - https://www.exploit-db.com/exploits/38273/ -CVE-2015-1724 - https://www.exploit-db.com/exploits/38272/ -CVE-2015-1725 - https://www.exploit-db.com/exploits/38270/ -CVE-2015-1725 - https://www.exploit-db.com/exploits/38271/ -CVE-2015-1726 - https://www.exploit-db.com/exploits/38269/ -CVE-2015-1727 - https://www.exploit-db.com/exploits/38268/ -CVE-2015-1730 - http://blog.skylined.nl/20161206001.html -CVE-2015-1730 - http://packetstormsecurity.com/files/140050/Microsoft-Internet-Explorer-9-jscript9-JavaScriptStackWalker-Memory-Corruption.html -CVE-2015-1730 - https://www.exploit-db.com/exploits/40881/ -CVE-2015-1776 - http://www.securityfocus.com/bid/83259 -CVE-2015-1779 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1781 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1782 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1784 - https://blog.nettitude.com/uk/crsf-and-unsafe-arbitrary-file-upload-in-nextgen-gallery-plugin-for-wordpress -CVE-2015-1784 - https://wpscan.com/vulnerability/c894727a-b779-4583-a860-13c2c27275d4 -CVE-2015-1785 - https://blog.nettitude.com/uk/crsf-and-unsafe-arbitrary-file-upload-in-nextgen-gallery-plugin-for-wordpress -CVE-2015-1785 - https://wpscan.com/vulnerability/c894727a-b779-4583-a860-13c2c27275d4 -CVE-2015-1787 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1788 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1788 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1788 - http://www.securityfocus.com/bid/91787 -CVE-2015-1788 - https://hackerone.com/reports/73241 -CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1789 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1789 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1789 - http://www.securityfocus.com/bid/91787 -CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1790 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1790 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1790 - http://www.securityfocus.com/bid/91787 -CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1791 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1791 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1791 - http://www.securityfocus.com/bid/91787 -CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1792 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1792 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1792 - http://www.securityfocus.com/bid/91787 -CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-1793 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-1793 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1793 - http://www.securityfocus.com/bid/91787 -CVE-2015-1793 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2015-1793 - https://www.exploit-db.com/exploits/38640/ -CVE-2015-1794 - http://fortiguard.com/advisory/openssl-advisory-december-2015 -CVE-2015-1794 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-1794 - http://www.ubuntu.com/usn/USN-2830-1 -CVE-2015-1798 - http://www.kb.cert.org/vuls/id/374268 -CVE-2015-1798 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1798 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1799 - http://www.kb.cert.org/vuls/id/374268 -CVE-2015-1799 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1802 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1802 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-1803 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1803 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-1804 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1804 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-1805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1815 - http://www.openwall.com/lists/oss-security/2015/03/26/1 -CVE-2015-1815 - https://bugzilla.redhat.com/show_bug.cgi?id=1203352 -CVE-2015-1815 - https://www.exploit-db.com/exploits/36564/ -CVE-2015-1819 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-1819 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1821 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1822 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-1829 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-1830 - http://packetstormsecurity.com/files/156643/Apache-ActiveMQ-5.11.1-Directory-Traversal-Shell-Upload.html -CVE-2015-1832 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2015-1832 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2015-1832 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2015-1833 - http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html -CVE-2015-1833 - https://www.exploit-db.com/exploits/37110/ -CVE-2015-1835 - http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-apache-vulnerability-that-allows-one-click-modification-of-android-apps/ -CVE-2015-1842 - http://rhn.redhat.com/errata/RHSA-2015-0789.html -CVE-2015-1842 - http://rhn.redhat.com/errata/RHSA-2015-0831.html -CVE-2015-1842 - http://rhn.redhat.com/errata/RHSA-2015-0832.html -CVE-2015-1842 - https://access.redhat.com/errata/RHSA-2015:0789 -CVE-2015-1842 - https://access.redhat.com/errata/RHSA-2015:0831 -CVE-2015-1842 - https://access.redhat.com/errata/RHSA-2015:0832 -CVE-2015-1852 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1855 - https://puppetlabs.com/security/cve/cve-2015-1855 -CVE-2015-1856 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-1862 - http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html -CVE-2015-1862 - http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html -CVE-2015-1862 - http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html -CVE-2015-1862 - https://www.exploit-db.com/exploits/36746/ -CVE-2015-1862 - https://www.exploit-db.com/exploits/36747/ -CVE-2015-1863 - http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html -CVE-2015-1863 - http://seclists.org/fulldisclosure/2015/Apr/82 -CVE-2015-1872 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-1874 - http://packetstormsecurity.com/files/130654/WordPress-Contact-Form-DB-2.8.29-Cross-Site-Request-Forgery.html -CVE-2015-1874 - http://seclists.org/fulldisclosure/2015/Mar/21 -CVE-2015-1874 - https://security.dxw.com/advisories/csrf-in-contact-form-db-allows-attacker-to-delete-all-stored-form-submissions/ -CVE-2015-1875 - http://packetstormsecurity.com/files/130698/Elastix-2.5.0-SQL-Injection.html -CVE-2015-1875 - https://www.exploit-db.com/exploits/36305/ -CVE-2015-1876 - http://packetstormsecurity.com/files/130431/ES-File-Explorer-3.2.4.1-Path-Traversal.html -CVE-2015-1877 - http://www.openwall.com/lists/oss-security/2015/02/18/7 -CVE-2015-1877 - http://www.openwall.com/lists/oss-security/2015/02/18/9 -CVE-2015-1879 - http://packetstormsecurity.com/files/130309/WordPress-Google-Doc-Embedder-2.5.18-Cross-Site-Scripting.html -CVE-2015-1892 - http://www.kb.cert.org/vuls/id/550620 -CVE-2015-1914 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-1916 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-1926 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-1935 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT08543 -CVE-2015-1969 - http://www-01.ibm.com/support/docview.wss?uid=swg21967384 -CVE-2015-20019 - https://seclists.org/bugtraq/2015/Dec/124 -CVE-2015-20019 - https://wpscan.com/vulnerability/4f92b211-e09c-4ed0-bc98-27e0b51b1f86 -CVE-2015-20067 - https://seclists.org/fulldisclosure/2015/Jul/73 -CVE-2015-20067 - https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a -CVE-2015-20105 - https://packetstormsecurity.com/files/131814/ -CVE-2015-20105 - https://seclists.org/bugtraq/2015/May/45 -CVE-2015-20105 - https://wpscan.com/vulnerability/2bc3af7e-5542-40c4-8141-7c49e8df68f0 -CVE-2015-20106 - https://wpscan.com/vulnerability/907792c4-3384-4351-bb75-0ad10f65fbe1 -CVE-2015-20107 - https://github.com/python/cpython/issues/68966 -CVE-2015-2023 - https://www.exploit-db.com/exploits/38751/ -CVE-2015-2025 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2026 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2027 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2028 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2029 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2030 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2031 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 -CVE-2015-2034 - http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-2035 - http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-2039 - http://packetstormsecurity.com/files/130306/WordPress-Acobot-Live-Chat-And-Contact-Form-2.0-CSRF-XSS.html -CVE-2015-2040 - http://packetstormsecurity.com/files/130311/WordPress-Contact-Form-DB-2.8.26-Cross-Site-Scripting.html -CVE-2015-2041 - https://github.com/torvalds/linux/commit/6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49 -CVE-2015-2043 - http://packetstormsecurity.com/files/130490/MyConnection-Server-8.2b-Cross-Site-Scripting.html -CVE-2015-2049 - http://www.kb.cert.org/vuls/id/377348 -CVE-2015-2049 - https://www.exploit-db.com/exploits/39192/ -CVE-2015-2050 - http://www.kb.cert.org/vuls/id/184100 -CVE-2015-2051 - https://www.exploit-db.com/exploits/37171/ -CVE-2015-2054 - http://seclists.org/fulldisclosure/2015/Jan/58 -CVE-2015-2055 - http://www.exploit-db.com/exploits/35859 -CVE-2015-2062 - http://packetstormsecurity.com/files/130796/WordPress-Huge-IT-Slider-2.6.8-SQL-Injection.html -CVE-2015-2064 - http://seclists.org/fulldisclosure/2015/Feb/66 -CVE-2015-2065 - http://packetstormsecurity.com/files/130371/WordPress-Video-Gallery-2.7-SQL-Injection.html -CVE-2015-2065 - http://www.exploit-db.com/exploits/36058 -CVE-2015-2066 - http://seclists.org/fulldisclosure/2015/Feb/69 -CVE-2015-2067 - http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2015-2068 - http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2015-2069 - http://packetstormsecurity.com/files/130458/WordPress-WooCommerce-2.2.10-Cross-Site-Scripting.html -CVE-2015-2069 - http://seclists.org/fulldisclosure/2015/Feb/75 -CVE-2015-2070 - http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html -CVE-2015-2071 - http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html -CVE-2015-2072 - http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html -CVE-2015-2073 - http://packetstormsecurity.com/files/130520/SAP-Business-Objects-Unauthorized-File-Repository-Server-Read.html -CVE-2015-2074 - http://packetstormsecurity.com/files/130521/SAP-Business-Objects-Unauthorized-File-Repository-Server-Write.html -CVE-2015-2075 - http://packetstormsecurity.com/files/130522/SAP-Business-Objects-Unauthorized-Audit-Information-Delete.html -CVE-2015-2076 - http://packetstormsecurity.com/files/130523/SAP-Business-Objects-Unauthorized-Audit-Information-Access.html -CVE-2015-2080 - http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html -CVE-2015-2080 - http://seclists.org/fulldisclosure/2015/Mar/12 -CVE-2015-2080 - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html -CVE-2015-2082 - http://packetstormsecurity.com/files/130396/UNIT4-Prosoft-HRMS-8.14.230.47-Cross-Site-Scripting.html -CVE-2015-2083 - http://packetstormsecurity.com/files/130441/Ilch-CMS-Cross-Site-Request-Forgery.html -CVE-2015-2084 - http://packetstormsecurity.com/files/130461/WordPress-Easy-Social-Icons-1.2.2-CSRF-XSS.html -CVE-2015-2084 - http://seclists.org/fulldisclosure/2015/Feb/76 -CVE-2015-2084 - http://www.exploit-db.com/exploits/36161 -CVE-2015-2087 - https://www.drupal.org/node/2427069 -CVE-2015-2089 - http://packetstormsecurity.com/files/130313/WordPress-Cross-Slide-2.0.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-2090 - http://packetstormsecurity.com/files/130381/WordPress-Survey-And-Poll-1.1.7-Blind-SQL-Injection.html -CVE-2015-2090 - http://www.exploit-db.com/exploits/36054 -CVE-2015-2094 - http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html -CVE-2015-2094 - https://www.exploit-db.com/exploits/36517/ -CVE-2015-2097 - http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html -CVE-2015-2097 - http://seclists.org/fulldisclosure/2015/Feb/90 -CVE-2015-2097 - https://www.exploit-db.com/exploits/36505/ -CVE-2015-2097 - https://www.exploit-db.com/exploits/36602/ -CVE-2015-2097 - https://www.exploit-db.com/exploits/36607/ -CVE-2015-2102 - http://packetstormsecurity.com/files/130485/Clipbucket-2.7.0.4.v2929-rc3-Blind-SQL-Injection.html -CVE-2015-2102 - http://www.exploit-db.com/exploits/36156 -CVE-2015-2103 - http://packetstormsecurity.com/files/130403/Cosmoshop-Cross-Site-Scripting.html -CVE-2015-2125 - https://www.exploit-db.com/exploits/37250/ -CVE-2015-2150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2150 - http://www.ubuntu.com/usn/USN-2632-1 -CVE-2015-2151 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2153 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -CVE-2015-2153 - https://www.exploit-db.com/exploits/37663/ -CVE-2015-2154 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -CVE-2015-2155 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -CVE-2015-2156 - https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass -CVE-2015-2165 - http://packetstormsecurity.com/files/131232/Ericsson-Drutt-MSDP-Report-Viewer-Cross-Site-Scripting.html -CVE-2015-2166 - http://packetstormsecurity.com/files/131233/Ericsson-Drutt-MSDP-Instance-Monitor-Directory-Traversal-File-Access.html -CVE-2015-2166 - https://www.exploit-db.com/exploits/36619/ -CVE-2015-2167 - http://packetstormsecurity.com/files/131230/Ericsson-Drutt-MSDP-3PI-Manager-Open-Redirect.html -CVE-2015-2169 - http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html -CVE-2015-2169 - http://seclists.org/fulldisclosure/2015/Jun/74 -CVE-2015-2169 - http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html -CVE-2015-2169 - https://www.exploit-db.com/exploits/37395/ -CVE-2015-2177 - https://www.exploit-db.com/exploits/44802/ -CVE-2015-2180 - https://github.com/roundcube/roundcubemail/issues/4757 -CVE-2015-2181 - https://github.com/roundcube/roundcubemail/issues/4757 -CVE-2015-2182 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-2182 - https://github.com/ZeusCart/zeuscart/issues/28 -CVE-2015-2183 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-2183 - https://github.com/ZeusCart/zeuscart/issues/28 -CVE-2015-2184 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-2184 - https://github.com/ZeusCart/zeuscart/issues/28 -CVE-2015-2188 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-2188 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2189 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-2189 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2190 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-2191 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2194 - http://packetstormsecurity.com/files/130397/WordPress-Fusion-3.1-Arbitrary-File-Upload.html -CVE-2015-2198 - http://www.exploit-db.com/exploits/36154 -CVE-2015-2199 - http://www.exploit-db.com/exploits/36086 -CVE-2015-2203 - https://bugs.launchpad.net/evergreen/+bug/1206589 -CVE-2015-2207 - http://packetstormsecurity.com/files/132807/NetCracker-Resource-Management-System-8.0-Cross-Site-Scripting.html -CVE-2015-2208 - http://packetstormsecurity.com/files/130685/PHPMoAdmin-1.1.2-Remote-Code-Execution.html -CVE-2015-2208 - http://seclists.org/fulldisclosure/2015/Mar/19 -CVE-2015-2208 - http://www.exploit-db.com/exploits/36251 -CVE-2015-2209 - http://seclists.org/fulldisclosure/2015/Feb/67 -CVE-2015-2210 - http://packetstormsecurity.com/files/131732/Epicor-Retail-Store-Help-System-3.2.03.01.008-Code-Execution.html -CVE-2015-2213 - https://wpvulndb.com/vulnerabilities/8126 -CVE-2015-2214 - http://packetstormsecurity.com/files/130583/NetCat-CMS-5.01-3.12-Full-Path-Disclosure.html -CVE-2015-2216 - http://packetstormsecurity.com/files/130595/WordPress-Photocrati-Theme-4.x.x-SQL-Injection.html -CVE-2015-2216 - https://wpvulndb.com/vulnerabilities/7818 -CVE-2015-2217 - http://packetstormsecurity.com/files/130684/Ultimate-PHP-Board-UPB-2.2.7-Cross-Site-Scripting.html -CVE-2015-2217 - https://github.com/PHP-Outburst/myUPB/issues/17 -CVE-2015-2218 - http://www.exploit-db.com/exploits/36086 -CVE-2015-2220 - http://packetstormsecurity.com/files/130369/WordPress-Ninja-Forms-2.8.8-Cross-Site-Scripting.html -CVE-2015-2223 - http://packetstormsecurity.com/files/131182/Palo-Alto-Traps-Server-3.1.2.1546-Cross-Site-Scripting.html -CVE-2015-2237 - http://packetstormsecurity.com/files/130696/Betster-1.0.4-SQL-Injection-Authentication-Bypass.html -CVE-2015-2237 - https://www.exploit-db.com/exploits/36306/ -CVE-2015-2242 - http://packetstormsecurity.com/files/130656/Webshop-Hun-1.062S-SQL-Injection.html -CVE-2015-2243 - http://packetstormsecurity.com/files/130653/Webshop-Hun-1.062S-Directory-Traversal.html -CVE-2015-2244 - http://packetstormsecurity.com/files/130648/Webshop-Hun-1.062S-Cross-Site-Scripting.html -CVE-2015-2247 - http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/ -CVE-2015-2247 - https://speakerdeck.com/richo/building-a-hipster-catapult-or-how2own-your-skateboard -CVE-2015-2248 - http://packetstormsecurity.com/files/131762/Dell-SonicWALL-Secure-Remote-Access-7.5-8.0-CSRF.html -CVE-2015-2248 - http://www.scip.ch/en/?vuldb.75111 -CVE-2015-2248 - https://www.exploit-db.com/exploits/36940/ -CVE-2015-2250 - http://packetstormsecurity.com/files/131882/Concrete5-5.7.3.1-Cross-Site-Scripting.html -CVE-2015-2250 - http://seclists.org/fulldisclosure/2015/May/51 -CVE-2015-2250 - https://www.netsparker.com/cve-2015-2250-multiple-xss-vulnerabilities-identified-in-concrete5/ -CVE-2015-2264 - http://www.kb.cert.org/vuls/id/794095 -CVE-2015-2275 - http://packetstormsecurity.com/files/130766/Community-Gallery-2.0-Cross-Site-Scripting.html -CVE-2015-2275 - http://seclists.org/fulldisclosure/2015/Mar/65 -CVE-2015-2275 - http://www.exploit-db.com/exploits/36368 -CVE-2015-2278 - http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html -CVE-2015-2278 - http://seclists.org/fulldisclosure/2015/May/50 -CVE-2015-2278 - http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities -CVE-2015-2279 - http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html -CVE-2015-2279 - http://seclists.org/fulldisclosure/2015/Jul/29 -CVE-2015-2279 - https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection -CVE-2015-2279 - https://www.exploit-db.com/exploits/37532/ -CVE-2015-2280 - http://packetstormsecurity.com/files/132609/AirLink101-SkyIPCam1620W-OS-Command-Injection.html -CVE-2015-2280 - http://seclists.org/fulldisclosure/2015/Jul/40 -CVE-2015-2280 - http://www.securityfocus.com/bid/75597 -CVE-2015-2280 - https://www.coresecurity.com/advisories/airlink101-skyipcam1620w-os-command-injection -CVE-2015-2280 - https://www.exploit-db.com/exploits/37527/ -CVE-2015-2281 - http://seclists.org/fulldisclosure/2015/Mar/111 -CVE-2015-2281 - http://www.coresecurity.com/advisories/fortinet-single-sign-on-stack-overflow -CVE-2015-2281 - https://www.exploit-db.com/exploits/36422/ -CVE-2015-2282 - http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html -CVE-2015-2282 - http://seclists.org/fulldisclosure/2015/May/50 -CVE-2015-2282 - http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities -CVE-2015-2285 - http://packetstormsecurity.com/files/130587/Ubuntu-Vivid-Upstart-Privilege-Escalation.html -CVE-2015-2285 - http://seclists.org/fulldisclosure/2015/Mar/7 -CVE-2015-2289 - http://packetstormsecurity.com/files/130838/Serendipity-CMS-2.0-Cross-Site-Scripting.html -CVE-2015-2291 - http://packetstormsecurity.com/files/130854/Intel-Network-Adapter-Diagnostic-Driver-IOCTL-DoS.html -CVE-2015-2291 - https://www.exploit-db.com/exploits/36392/ -CVE-2015-2292 - http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html -CVE-2015-2292 - http://seclists.org/fulldisclosure/2015/Mar/73 -CVE-2015-2292 - https://wpvulndb.com/vulnerabilities/7841 -CVE-2015-2292 - https://www.exploit-db.com/exploits/36413/ -CVE-2015-2293 - http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html -CVE-2015-2293 - http://seclists.org/fulldisclosure/2015/Mar/73 -CVE-2015-2293 - https://wpvulndb.com/vulnerabilities/7841 -CVE-2015-2294 - http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-2294 - https://www.exploit-db.com/exploits/36506/ -CVE-2015-2295 - http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-2295 - https://www.exploit-db.com/exploits/36506/ -CVE-2015-2298 - https://github.com/ether/etherpad-lite/releases/tag/1.5.2 -CVE-2015-2301 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2305 - http://www.kb.cert.org/vuls/id/695940 -CVE-2015-2305 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2314 - http://klikki.fi/adv/wpml.html -CVE-2015-2314 - http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html -CVE-2015-2315 - http://klikki.fi/adv/wpml.html -CVE-2015-2315 - http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html -CVE-2015-2316 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-2317 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-2321 - http://packetstormsecurity.com/files/132931/WordPress-Job-Manager-0.7.22-Cross-Site-Scripting.html -CVE-2015-2321 - https://wpvulndb.com/vulnerabilities/8129 -CVE-2015-2321 - https://www.exploit-db.com/exploits/37738/ -CVE-2015-2328 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-2331 - https://hackerone.com/reports/73239 -CVE-2015-2342 - http://seclists.org/fulldisclosure/2015/Oct/1 -CVE-2015-2342 - https://www.7elements.co.uk/resources/technical-advisories/cve-2015-2342-vmware-vcenter-remote-code-execution/ -CVE-2015-2346 - http://packetstormsecurity.com/files/131459/Huawei-SEQ-Analyst-XXE-Injection.html -CVE-2015-2346 - http://seclists.org/fulldisclosure/2015/Apr/42 -CVE-2015-2347 - http://packetstormsecurity.com/files/131460/Huawei-SEQ-Analyst-Cross-Site-Scripting.html -CVE-2015-2347 - http://seclists.org/fulldisclosure/2015/Apr/43 -CVE-2015-2347 - https://drive.google.com/folderview?id=0B-LWHbwdK3P9fnBlLWZqWlZqNnB0b2xHWFpYUWt3bmY3Y0lPUHVLNm9VTUlFcWhYTHlZSUU&usp=sharing -CVE-2015-2348 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2349 - http://packetstormsecurity.com/files/130751/SuperWebMailer-5.50.0.01160-Cross-Site-Scripting.html -CVE-2015-2349 - http://seclists.org/fulldisclosure/2015/Mar/55 -CVE-2015-2350 - http://packetstormsecurity.com/files/130722/MikroTik-RouterOS-Cross-Site-Request-Forgery.html -CVE-2015-2350 - http://seclists.org/fulldisclosure/2015/Mar/49 -CVE-2015-2351 - http://packetstormsecurity.com/files/130812/Alkacon-OpenCms-9.5.1-Cross-Site-Scripting.html -CVE-2015-2365 - https://www.exploit-db.com/exploits/38267/ -CVE-2015-2366 - https://www.exploit-db.com/exploits/38266/ -CVE-2015-2370 - https://www.exploit-db.com/exploits/37768/ -CVE-2015-2418 - http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html -CVE-2015-2426 - http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/ -CVE-2015-2426 - https://www.exploit-db.com/exploits/38222/ -CVE-2015-2431 - https://www.exploit-db.com/exploits/37911/ -CVE-2015-2432 - https://www.exploit-db.com/exploits/37920/ -CVE-2015-2433 - https://www.exploit-db.com/exploits/38222/ -CVE-2015-2444 - https://www.exploit-db.com/exploits/37764/ -CVE-2015-2455 - https://www.exploit-db.com/exploits/37919/ -CVE-2015-2456 - https://www.exploit-db.com/exploits/37918/ -CVE-2015-2458 - https://www.exploit-db.com/exploits/37923/ -CVE-2015-2459 - https://www.exploit-db.com/exploits/37922/ -CVE-2015-2460 - https://www.exploit-db.com/exploits/37921/ -CVE-2015-2461 - https://www.exploit-db.com/exploits/37917/ -CVE-2015-2462 - https://www.exploit-db.com/exploits/37916/ -CVE-2015-2463 - https://www.exploit-db.com/exploits/37915/ -CVE-2015-2464 - https://www.exploit-db.com/exploits/37914/ -CVE-2015-2467 - https://www.exploit-db.com/exploits/37913/ -CVE-2015-2468 - https://www.exploit-db.com/exploits/37912/ -CVE-2015-2469 - https://www.exploit-db.com/exploits/37910/ -CVE-2015-2470 - https://www.exploit-db.com/exploits/37924/ -CVE-2015-2482 - https://www.exploit-db.com/exploits/40798/ -CVE-2015-2502 - http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild -CVE-2015-2507 - https://www.exploit-db.com/exploits/38279/ -CVE-2015-2508 - https://www.exploit-db.com/exploits/38198/ -CVE-2015-2509 - https://www.exploit-db.com/exploits/38151/ -CVE-2015-2509 - https://www.exploit-db.com/exploits/38195/ -CVE-2015-2510 - https://www.exploit-db.com/exploits/38217/ -CVE-2015-2511 - https://www.exploit-db.com/exploits/38276/ -CVE-2015-2512 - https://www.exploit-db.com/exploits/38280/ -CVE-2015-2517 - https://www.exploit-db.com/exploits/38278/ -CVE-2015-2518 - https://www.exploit-db.com/exploits/38277/ -CVE-2015-2520 - https://www.exploit-db.com/exploits/38215/ -CVE-2015-2521 - https://www.exploit-db.com/exploits/38216/ -CVE-2015-2522 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-2523 - https://www.exploit-db.com/exploits/38214/ -CVE-2015-2524 - https://www.exploit-db.com/exploits/38202/ -CVE-2015-2525 - https://www.exploit-db.com/exploits/38200/ -CVE-2015-2527 - https://www.exploit-db.com/exploits/38199/ -CVE-2015-2528 - http://packetstormsecurity.com/files/159109/Microsoft-Windows-CloudExperienceHostBroker-Privilege-Escalation.html -CVE-2015-2528 - https://www.exploit-db.com/exploits/38201/ -CVE-2015-2552 - http://packetstormsecurity.com/files/133962/Microsoft-Trusted-Boot-Security-Feature-Bypass.html -CVE-2015-2553 - http://packetstormsecurity.com/files/133971/Windows-Sandboxed-Mount-Reparse-Point-Creation-Mitigation-Bypass.html -CVE-2015-2553 - https://www.exploit-db.com/exploits/38474/ -CVE-2015-2554 - https://www.exploit-db.com/exploits/38580/ -CVE-2015-2560 - http://packetstormsecurity.com/files/131062/Manage-Engine-Desktop-Central-9-Unauthorized-Administrative-Password-Reset.html -CVE-2015-2562 - http://packetstormsecurity.com/files/130896/Joomla-ECommerce-WD-1.2.5-SQL-Injection.html -CVE-2015-2562 - http://seclists.org/fulldisclosure/2015/Mar/123 -CVE-2015-2562 - https://www.exploit-db.com/exploits/36439/ -CVE-2015-2563 - http://packetstormsecurity.com/files/130754/Vastal-I-tech-phpVID-1.2.3-SQL-Injection.html -CVE-2015-2563 - http://seclists.org/fulldisclosure/2015/Mar/58 -CVE-2015-2564 - http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html -CVE-2015-2564 - http://seclists.org/fulldisclosure/2015/Mar/30 -CVE-2015-2564 - http://www.exploit-db.com/exploits/36303 -CVE-2015-2565 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2566 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2567 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2568 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-2568 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2568 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2568 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2570 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2571 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2571 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2571 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2572 - http://packetstormsecurity.com/files/131507/Oracle-Hyperion-Smart-View-For-Office-11.1.2.3.000-DoS.html -CVE-2015-2572 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2572 - https://www.exploit-db.com/exploits/36783/ -CVE-2015-2573 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2573 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2573 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2574 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2575 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2576 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2577 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2578 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2579 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -CVE-2015-2580 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2581 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2582 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2582 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2583 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2584 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2585 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2586 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2587 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2588 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2589 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2590 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2591 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2592 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2593 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2594 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2595 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2596 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2597 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2598 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2599 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2600 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2601 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2602 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2603 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2604 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2605 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2606 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2607 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2608 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-2609 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2610 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2611 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2612 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2613 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2614 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2615 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2616 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2617 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2618 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2619 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2620 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2620 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2621 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2622 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2623 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2624 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2625 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2626 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2627 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2628 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2629 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2630 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2631 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2632 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2633 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-2634 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2635 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2636 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2637 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2638 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2639 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2640 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2641 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2642 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-2643 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2643 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2644 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2645 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2646 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2647 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2648 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2648 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2649 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2650 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2651 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2652 - http://seclists.org/fulldisclosure/2015/Oct/33 -CVE-2015-2652 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2653 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2654 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2655 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2656 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2657 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2658 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2659 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2660 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2661 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2662 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2663 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2664 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2667 - http://packetstormsecurity.com/files/131731/GNS3-1.2.3-DLL-Hijacking.html -CVE-2015-2674 - https://bugzilla.redhat.com/show_bug.cgi?id=1202837 -CVE-2015-2676 - http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-2677 - http://packetstormsecurity.com/files/130729/ocPortal-9.0.16-Cross-Site-Scripting.html -CVE-2015-2678 - http://packetstormsecurity.com/files/130771/GeniXCMS-0.0.1-Cross-Site-Scripting.html -CVE-2015-2678 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5233.php -CVE-2015-2679 - http://packetstormsecurity.com/files/130770/GeniXCMS-0.0.1-SQL-Injection.html -CVE-2015-2679 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5232.php -CVE-2015-2680 - http://packetstormsecurity.com/files/130772/GeniXCMS-0.0.1-Cross-Site-Request-Forgery.html -CVE-2015-2680 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5234.php -CVE-2015-2681 - http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-2682 - http://packetstormsecurity.com/files/130928/Citrix-Command-Center-Configuration-Disclosure.html -CVE-2015-2682 - http://seclists.org/fulldisclosure/2015/Mar/126 -CVE-2015-2682 - https://www.exploit-db.com/exploits/36441/ -CVE-2015-2683 - http://packetstormsecurity.com/files/130930/Citrx-Command-Center-Advent-JMX-Servlet-Accessible.html -CVE-2015-2683 - http://seclists.org/fulldisclosure/2015/Mar/127 -CVE-2015-2690 - http://packetstormsecurity.com/files/131591/FreePBX-12.0.43-Cross-Site-Scripting.html -CVE-2015-2694 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2694 - https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604 -CVE-2015-2695 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2695 - https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d -CVE-2015-2696 - https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a -CVE-2015-2697 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2697 - https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789 -CVE-2015-2698 - https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd -CVE-2015-2702 - http://packetstormsecurity.com/files/130898/Websense-Email-Security-Cross-Site-Scripting.html -CVE-2015-2703 - http://packetstormsecurity.com/files/130902/Websense-Data-Security-Cross-Site-Scripting.html -CVE-2015-2703 - http://packetstormsecurity.com/files/130908/Websense-Content-Gateway-Error-Message-Cross-Site-Scripting.html -CVE-2015-2704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2706 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2708 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2709 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2710 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2711 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2712 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2712 - https://bugzilla.mozilla.org/show_bug.cgi?id=1152280 -CVE-2015-2713 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2714 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2715 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2716 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2716 - https://bugzilla.mozilla.org/show_bug.cgi?id=1140537 -CVE-2015-2716 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2015-2716 - https://www.tenable.com/security/tns-2016-20 -CVE-2015-2717 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2717 - https://bugzilla.mozilla.org/show_bug.cgi?id=1154683 -CVE-2015-2718 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2718 - https://bugzilla.mozilla.org/show_bug.cgi?id=1146724 -CVE-2015-2720 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2721 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-2721 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-2721 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2721 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2721 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-2721 - http://www.securityfocus.com/bid/91787 -CVE-2015-2722 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2722 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2724 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2724 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2725 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2725 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2726 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2726 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2727 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2728 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2728 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2729 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2729 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2730 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2730 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2730 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-2731 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2731 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2733 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2733 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2734 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2734 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2735 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2735 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2736 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2736 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2737 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2737 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2738 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2738 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2739 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2739 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2740 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2740 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2741 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2741 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2742 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2742 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2743 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2743 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1101158 -CVE-2015-2746 - http://packetstormsecurity.com/files/130899/Websense-Appliance-Manager-Command-Injection.html -CVE-2015-2746 - https://www.exploit-db.com/exploits/36423/ -CVE-2015-2746 - https://www.securify.nl/advisory/SFY20140906/command_injection_vulnerability_in_network_diagnostics_tool_of_websense_appliance_manager.html -CVE-2015-2747 - http://packetstormsecurity.com/files/130897/Websense-Data-Security-DLP-Incident-Forensics-Preview-XSS.html -CVE-2015-2747 - https://www.securify.nl/advisory/SFY20140904/websense_data_security_dlp_incident_forensics_preview_is_vulnerable_to_cross_site_scripting.html -CVE-2015-2748 - http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html -CVE-2015-2755 - http://packetstormsecurity.com/files/130960/WordPress-AB-Google-Map-Travel-CSRF-XSS.html -CVE-2015-2755 - http://packetstormsecurity.com/files/131155/WordPress-Google-Map-Travel-3.4-XSS-CSRF.html -CVE-2015-2774 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-2780 - https://www.exploit-db.com/exploits/36520/ -CVE-2015-2781 - http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html -CVE-2015-2781 - http://seclists.org/fulldisclosure/2015/Apr/18 -CVE-2015-2783 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2783 - https://bugs.php.net/bug.php?id=69324 -CVE-2015-2783 - https://hackerone.com/reports/73238 -CVE-2015-2787 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2787 - https://hackerone.com/reports/73235 -CVE-2015-2789 - http://packetstormsecurity.com/files/130840/Foxit-Reader-7.0.6.1126-Privilege-Escalation.html -CVE-2015-2789 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5235.php -CVE-2015-2790 - http://www.exploit-db.com/exploits/36334 -CVE-2015-2790 - http://www.exploit-db.com/exploits/36335 -CVE-2015-2791 - http://klikki.fi/adv/wpml.html -CVE-2015-2791 - http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html -CVE-2015-2792 - http://klikki.fi/adv/wpml.html -CVE-2015-2792 - http://packetstormsecurity.com/files/130839/WordPress-WPML-Missing-Authentication.html -CVE-2015-2792 - http://seclists.org/fulldisclosure/2015/Mar/79 -CVE-2015-2793 - https://ikiwiki.info/bugs/XSS_Alert...__33____33____33__/ -CVE-2015-2794 - http://www.dnnsoftware.com/community/security/security-center -CVE-2015-2794 - https://www.exploit-db.com/exploits/39777/ -CVE-2015-2797 - https://www.exploit-db.com/exploits/36577/ -CVE-2015-2797 - https://www.exploit-db.com/exploits/37170/ -CVE-2015-2798 - https://www.exploit-db.com/exploits/36561/ -CVE-2015-2802 - https://packetstormsecurity.com/files/cve/CVE-2015-2802 -CVE-2015-2803 - http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html -CVE-2015-2803 - http://seclists.org/fulldisclosure/2015/Jun/43 -CVE-2015-2803 - https://www.exploit-db.com/exploits/37301/ -CVE-2015-2803 - https://www.redteam-pentesting.de/advisories/rt-sa-2015-002 -CVE-2015-2804 - http://packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html -CVE-2015-2804 - http://seclists.org/fulldisclosure/2015/Jun/22 -CVE-2015-2804 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id -CVE-2015-2805 - http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html -CVE-2015-2805 - http://seclists.org/fulldisclosure/2015/Jun/23 -CVE-2015-2805 - https://www.exploit-db.com/exploits/37261/ -CVE-2015-2805 - https://www.redteam-pentesting.de/advisories/rt-sa-2015-004 -CVE-2015-2806 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-2807 - http://packetstormsecurity.com/files/133350/WordPress-Navis-DocumentCloud-0.1-Cross-Site-Scripting.html -CVE-2015-2807 - http://seclists.org/fulldisclosure/2015/Aug/78 -CVE-2015-2807 - https://security.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ -CVE-2015-2807 - https://wpvulndb.com/vulnerabilities/8164 -CVE-2015-2808 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 -CVE-2015-2808 - http://www-304.ibm.com/support/docview.wss?uid=swg21960015 -CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-2808 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-2808 - http://www.securityfocus.com/bid/91787 -CVE-2015-2808 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2015-2808 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 -CVE-2015-2809 - http://www.kb.cert.org/vuls/id/550620 -CVE-2015-2809 - http://www.kb.cert.org/vuls/id/BLUU-9TLSHD -CVE-2015-2810 - http://seclists.org/bugtraq/2015/Apr/89 -CVE-2015-2811 - http://packetstormsecurity.com/files/132358/SAP-NetWeaver-Portal-7.31-XXE-Injection.html -CVE-2015-2812 - http://packetstormsecurity.com/files/132356/SAP-NetWeaver-Portal-7.31-XXE-Injection.html -CVE-2015-2813 - http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html -CVE-2015-2815 - http://packetstormsecurity.com/files/132353/SAP-NetWeaver-Dispatcher-Buffer-Overflow.html -CVE-2015-2816 - http://packetstormsecurity.com/files/132363/SAP-Afaria-7-Missing-Authorization-Check.html -CVE-2015-2817 - http://packetstormsecurity.com/files/132359/SAP-Management-Console-Information-Disclosure.html -CVE-2015-2819 - http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html -CVE-2015-2819 - https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/ -CVE-2015-2820 - http://packetstormsecurity.com/files/132362/SAP-Afaria-7-Denial-Of-Service.html -CVE-2015-2820 - https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/ -CVE-2015-2824 - http://packetstormsecurity.com/files/131280/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-SQL-Injection.html -CVE-2015-2824 - http://seclists.org/fulldisclosure/2015/Apr/6 -CVE-2015-2824 - http://seclists.org/fulldisclosure/2015/Apr/7 -CVE-2015-2824 - https://www.exploit-db.com/exploits/36613/ -CVE-2015-2825 - http://packetstormsecurity.com/files/131282/WordPress-Simple-Ads-Manager-2.5.94-File-Upload.html -CVE-2015-2825 - http://seclists.org/fulldisclosure/2015/Apr/8 -CVE-2015-2825 - https://www.exploit-db.com/exploits/36614/ -CVE-2015-2826 - http://packetstormsecurity.com/files/131281/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-Information-Disclosure.html -CVE-2015-2826 - http://seclists.org/fulldisclosure/2015/Apr/10 -CVE-2015-2826 - https://www.exploit-db.com/exploits/36615/ -CVE-2015-2827 - http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html -CVE-2015-2828 - http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html -CVE-2015-2830 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2830 - http://www.ubuntu.com/usn/USN-2632-1 -CVE-2015-2838 - http://packetstormsecurity.com/files/130937/Citrix-NITRO-SDK-Command-Injection.html -CVE-2015-2838 - http://seclists.org/fulldisclosure/2015/Mar/129 -CVE-2015-2838 - https://www.exploit-db.com/exploits/36442/ -CVE-2015-2838 - https://www.securify.nl/advisory/SFY20140806/command_injection_vulnerability_in_citrix_nitro_sdk_xen_hotfix_page.html -CVE-2015-2839 - http://packetstormsecurity.com/files/130931/Citrix-NITRO-SDK-xen_hotfix-Cross-Site-Scripting.html -CVE-2015-2839 - http://seclists.org/fulldisclosure/2015/Mar/128 -CVE-2015-2839 - https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html -CVE-2015-2840 - http://packetstormsecurity.com/files/130936/Citrix-NetScaler-VPX-Cross-Site-Scripting.html -CVE-2015-2841 - http://seclists.org/fulldisclosure/2015/Mar/95 -CVE-2015-2841 - https://www.exploit-db.com/exploits/36369/ -CVE-2015-2842 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html -CVE-2015-2842 - https://www.exploit-db.com/exploits/36807/ -CVE-2015-2843 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html -CVE-2015-2843 - https://www.exploit-db.com/exploits/36807/ -CVE-2015-2843 - https://www.exploit-db.com/exploits/42296/ -CVE-2015-2844 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html -CVE-2015-2844 - https://www.exploit-db.com/exploits/36807/ -CVE-2015-2845 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html -CVE-2015-2845 - https://www.exploit-db.com/exploits/36807/ -CVE-2015-2845 - https://www.exploit-db.com/exploits/42296/ -CVE-2015-2847 - http://www.kb.cert.org/vuls/id/857948 -CVE-2015-2848 - http://www.kb.cert.org/vuls/id/857948 -CVE-2015-2849 - http://www.kb.cert.org/vuls/id/485324 -CVE-2015-2850 - http://www.kb.cert.org/vuls/id/485324 -CVE-2015-2851 - http://www.kb.cert.org/vuls/id/551972 -CVE-2015-2851 - http://www.kb.cert.org/vuls/id/BLUU-9VBU45 -CVE-2015-2852 - http://www.kb.cert.org/vuls/id/498348 -CVE-2015-2853 - http://www.kb.cert.org/vuls/id/498348 -CVE-2015-2854 - http://www.kb.cert.org/vuls/id/498348 -CVE-2015-2855 - http://www.kb.cert.org/vuls/id/498348 -CVE-2015-2857 - http://packetstormsecurity.com/files/132665/Accellion-FTA-getStatus-verify_oauth_token-Command-Execution.html -CVE-2015-2857 - https://community.rapid7.com/community/metasploit/blog/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857 -CVE-2015-2857 - https://www.exploit-db.com/exploits/37597/ -CVE-2015-2859 - http://www.kb.cert.org/vuls/id/264092 -CVE-2015-2860 - http://www.kb.cert.org/vuls/id/555984 -CVE-2015-2861 - http://www.kb.cert.org/vuls/id/842780 -CVE-2015-2862 - http://www.kb.cert.org/vuls/id/919604 -CVE-2015-2863 - http://www.kb.cert.org/vuls/id/919604 -CVE-2015-2864 - http://www.kb.cert.org/vuls/id/101500 -CVE-2015-2864 - https://www.youtube.com/watch?v=MB8AL5u7JCA -CVE-2015-2866 - http://www.kb.cert.org/vuls/id/253708 -CVE-2015-2866 - https://www.exploit-db.com/exploits/40441/ -CVE-2015-2869 - http://www.kb.cert.org/vuls/id/813631 -CVE-2015-2870 - http://www.kb.cert.org/vuls/id/360431 -CVE-2015-2871 - http://www.kb.cert.org/vuls/id/360431 -CVE-2015-2872 - http://www.kb.cert.org/vuls/id/248692 -CVE-2015-2873 - http://www.kb.cert.org/vuls/id/248692 -CVE-2015-2874 - https://www.kb.cert.org/vuls/id/903500 -CVE-2015-2874 - https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH -CVE-2015-2874 - https://www.kb.cert.org/vuls/id/GWAN-A26L3F -CVE-2015-2875 - https://www.kb.cert.org/vuls/id/903500 -CVE-2015-2875 - https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH -CVE-2015-2875 - https://www.kb.cert.org/vuls/id/GWAN-A26L3F -CVE-2015-2876 - https://www.kb.cert.org/vuls/id/903500 -CVE-2015-2876 - https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH -CVE-2015-2876 - https://www.kb.cert.org/vuls/id/GWAN-A26L3F -CVE-2015-2877 - http://www.antoniobarresi.com/files/cain_advisory.txt -CVE-2015-2878 - https://www.exploit-db.com/exploits/37686/ -CVE-2015-2890 - http://www.kb.cert.org/vuls/id/577140 -CVE-2015-2890 - http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L -CVE-2015-2894 - https://www.kb.cert.org/vuls/id/377260 -CVE-2015-2895 - https://www.kb.cert.org/vuls/id/377260 -CVE-2015-2896 - https://www.kb.cert.org/vuls/id/377260 -CVE-2015-2898 - http://www.kb.cert.org/vuls/id/675052 -CVE-2015-2899 - http://www.kb.cert.org/vuls/id/675052 -CVE-2015-2900 - http://www.kb.cert.org/vuls/id/675052 -CVE-2015-2901 - http://www.kb.cert.org/vuls/id/675052 -CVE-2015-2902 - http://www.kb.cert.org/vuls/id/350508 -CVE-2015-2903 - http://www.kb.cert.org/vuls/id/350508 -CVE-2015-2904 - http://www.kb.cert.org/vuls/id/335192 -CVE-2015-2905 - http://www.kb.cert.org/vuls/id/335192 -CVE-2015-2909 - http://www.kb.cert.org/vuls/id/276148 -CVE-2015-2912 - https://www.kb.cert.org/vuls/id/845332 -CVE-2015-2913 - https://www.kb.cert.org/vuls/id/845332 -CVE-2015-2914 - http://www.kb.cert.org/vuls/id/906576 -CVE-2015-2915 - http://www.kb.cert.org/vuls/id/906576 -CVE-2015-2916 - http://www.kb.cert.org/vuls/id/906576 -CVE-2015-2917 - http://www.kb.cert.org/vuls/id/906576 -CVE-2015-2918 - https://www.kb.cert.org/vuls/id/845332 -CVE-2015-2922 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-2922 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2923 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6fd99094de2b83d1d4c8457f2c83483b2828e75a -CVE-2015-2924 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2925 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-2925 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-2926 - http://packetstormsecurity.com/files/131332/phpTrafficA-2.3-Cross-Site-Scripting.html -CVE-2015-2936 - https://phabricator.wikimedia.org/T64685 -CVE-2015-2939 - https://phabricator.wikimedia.org/T85113 -CVE-2015-2973 - https://wpvulndb.com/vulnerabilities/8114 -CVE-2015-2993 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2993 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-2994 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2994 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-2995 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2995 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-2995 - https://www.exploit-db.com/exploits/37667/ -CVE-2015-2996 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2996 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-2997 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2997 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-2998 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2998 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-2999 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-2999 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-3000 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-3000 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-3001 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -CVE-2015-3001 - http://seclists.org/fulldisclosure/2015/Jun/8 -CVE-2015-3008 - http://packetstormsecurity.com/files/131364/Asterisk-Project-Security-Advisory-AST-2015-003.html -CVE-2015-3026 - http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html -CVE-2015-3026 - http://www.openwall.com/lists/oss-security/2015/04/08/11 -CVE-2015-3026 - http://www.openwall.com/lists/oss-security/2015/04/08/8 -CVE-2015-3035 - http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html -CVE-2015-3035 - http://seclists.org/fulldisclosure/2015/Apr/26 -CVE-2015-3036 - http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html -CVE-2015-3036 - http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html -CVE-2015-3036 - http://seclists.org/fulldisclosure/2015/May/74 -CVE-2015-3036 - http://www.kb.cert.org/vuls/id/177092 -CVE-2015-3036 - https://www.exploit-db.com/exploits/38454/ -CVE-2015-3036 - https://www.exploit-db.com/exploits/38566/ -CVE-2015-3042 - https://www.exploit-db.com/exploits/37839/ -CVE-2015-3043 - https://www.exploit-db.com/exploits/37536/ -CVE-2015-3073 - https://www.exploit-db.com/exploits/38344/ -CVE-2015-3080 - https://www.exploit-db.com/exploits/37853/ -CVE-2015-3081 - https://www.exploit-db.com/exploits/37842/ -CVE-2015-3082 - https://www.exploit-db.com/exploits/37840/ -CVE-2015-3083 - https://www.exploit-db.com/exploits/37841/ -CVE-2015-3087 - https://www.exploit-db.com/exploits/37843/ -CVE-2015-3088 - https://www.exploit-db.com/exploits/37844/ -CVE-2015-3089 - https://www.exploit-db.com/exploits/37845/ -CVE-2015-3093 - https://www.exploit-db.com/exploits/37846/ -CVE-2015-3106 - https://www.exploit-db.com/exploits/37847/ -CVE-2015-3107 - https://www.exploit-db.com/exploits/37850/ -CVE-2015-3118 - https://www.exploit-db.com/exploits/37848/ -CVE-2015-3124 - https://www.exploit-db.com/exploits/37849/ -CVE-2015-3134 - https://www.exploit-db.com/exploits/37862/ -CVE-2015-3138 - https://github.com/the-tcpdump-group/tcpdump/issues/446 -CVE-2015-3141 - http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html -CVE-2015-3141 - https://www.exploit-db.com/exploits/36949/ -CVE-2015-3143 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-3143 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3144 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-3144 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3144 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-3145 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-3145 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3148 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3148 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3152 - http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html -CVE-2015-3153 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-3153 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3153 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-3153 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-3163 - https://bugzilla.redhat.com/show_bug.cgi?id=1215034 -CVE-2015-3166 - http://ubuntu.com/usn/usn-2621-1 -CVE-2015-3167 - http://ubuntu.com/usn/usn-2621-1 -CVE-2015-3182 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3183 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3183 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-3183 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-3183 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-3183 - http://www.securityfocus.com/bid/91787 -CVE-2015-3183 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2015-3188 - http://packetstormsecurity.com/files/132417/Apache-Storm-0.10.0-beta-Code-Execution.html -CVE-2015-3192 - https://jira.spring.io/browse/SPR-13136 -CVE-2015-3193 - http://fortiguard.com/advisory/openssl-advisory-december-2015 -CVE-2015-3193 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3193 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3193 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-3193 - http://www.securityfocus.com/bid/91787 -CVE-2015-3193 - http://www.ubuntu.com/usn/USN-2830-1 -CVE-2015-3193 - https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-3193.html -CVE-2015-3193 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 -CVE-2015-3194 - http://fortiguard.com/advisory/openssl-advisory-december-2015 -CVE-2015-3194 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3194 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3194 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-3194 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3194 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3194 - http://www.securityfocus.com/bid/91787 -CVE-2015-3194 - http://www.ubuntu.com/usn/USN-2830-1 -CVE-2015-3194 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 -CVE-2015-3195 - http://fortiguard.com/advisory/openssl-advisory-december-2015 -CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-3195 - http://www.securityfocus.com/bid/91787 -CVE-2015-3195 - http://www.ubuntu.com/usn/USN-2830-1 -CVE-2015-3195 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 -CVE-2015-3196 - http://fortiguard.com/advisory/openssl-advisory-december-2015 -CVE-2015-3196 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3196 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-3196 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3196 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3196 - http://www.ubuntu.com/usn/USN-2830-1 -CVE-2015-3196 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 -CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-3197 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3197 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3197 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-3197 - http://www.securityfocus.com/bid/91787 -CVE-2015-3197 - https://www.kb.cert.org/vuls/id/257823 -CVE-2015-3200 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-3202 - http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html -CVE-2015-3202 - http://www.ubuntu.com/usn/USN-2617-2 -CVE-2015-3202 - https://www.exploit-db.com/exploits/37089/ -CVE-2015-3203 - https://www.exploit-db.com/exploits/38256/ -CVE-2015-3205 - http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html -CVE-2015-3205 - https://www.exploit-db.com/exploits/37249/ -CVE-2015-3212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3212 - http://www.ubuntu.com/usn/USN-2716-1 -CVE-2015-3214 - https://www.exploit-db.com/exploits/37990/ -CVE-2015-3217 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-3217 - https://bugzilla.redhat.com/show_bug.cgi?id=1228283 -CVE-2015-3222 - http://packetstormsecurity.com/files/132281/OSSEC-2.8.1-Local-Root-Escalation.html -CVE-2015-3223 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3226 - https://hackerone.com/reports/47280 -CVE-2015-3228 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-3231 - https://www.drupal.org/SA-CORE-2015-002 -CVE-2015-3232 - https://www.drupal.org/SA-CORE-2015-002 -CVE-2015-3233 - https://www.drupal.org/SA-CORE-2015-002 -CVE-2015-3234 - https://www.drupal.org/SA-CORE-2015-002 -CVE-2015-3236 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3236 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-3236 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3236 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-3236 - http://www.securityfocus.com/bid/91787 -CVE-2015-3237 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3237 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-3237 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-3237 - http://www.securityfocus.com/bid/91787 -CVE-2015-3238 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3240 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3241 - https://github.com/openstack/ossa/blob/482576204dec96f580817b119e3166d71c757731/ossa/OSSA-2015-015.yaml -CVE-2015-3244 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-3244 - https://bugzilla.redhat.com/show_bug.cgi?id=1232908 -CVE-2015-3245 - https://www.exploit-db.com/exploits/44633/ -CVE-2015-3245 - https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt -CVE-2015-3246 - https://www.exploit-db.com/exploits/44633/ -CVE-2015-3246 - https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt -CVE-2015-3253 - http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html -CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-3253 - http://www.securityfocus.com/bid/91787 -CVE-2015-3253 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2015-3256 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3256 - https://bugzilla.redhat.com/show_bug.cgi?id=1245684 -CVE-2015-3258 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3268 - http://packetstormsecurity.com/files/136638/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html -CVE-2015-3276 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3279 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3280 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-3290 - https://www.exploit-db.com/exploits/37722/ -CVE-2015-3300 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html -CVE-2015-3300 - https://www.exploit-db.com/exploits/36860/ -CVE-2015-3301 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html -CVE-2015-3301 - https://www.exploit-db.com/exploits/36860/ -CVE-2015-3302 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html -CVE-2015-3302 - https://www.exploit-db.com/exploits/36860/ -CVE-2015-3306 - http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html -CVE-2015-3306 - http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html -CVE-2015-3306 - http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html -CVE-2015-3306 - http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html -CVE-2015-3306 - http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html -CVE-2015-3306 - https://www.exploit-db.com/exploits/36742/ -CVE-2015-3306 - https://www.exploit-db.com/exploits/36803/ -CVE-2015-3307 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3307 - https://bugs.php.net/bug.php?id=69443 -CVE-2015-3307 - https://hackerone.com/reports/104026 -CVE-2015-3313 - http://packetstormsecurity.com/files/131530/WordPress-Community-Events-1.3.5-SQL-Injection.html -CVE-2015-3313 - https://www.exploit-db.com/exploits/36805/ -CVE-2015-3314 - http://packetstormsecurity.com/files/131558/WordPress-Tune-Library-1.5.4-SQL-Injection.html -CVE-2015-3314 - https://www.exploit-db.com/exploits/36802/ -CVE-2015-3315 - https://www.exploit-db.com/exploits/44097/ -CVE-2015-3319 - http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html -CVE-2015-3319 - http://seclists.org/fulldisclosure/2015/Apr/18 -CVE-2015-3325 - http://packetstormsecurity.com/files/131801/WordPress-WP-Symposium-15.1-SQL-Injection.html -CVE-2015-3325 - https://www.exploit-db.com/exploits/37080/ -CVE-2015-3326 - http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html -CVE-2015-3329 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3329 - https://bugs.php.net/bug.php?id=69441 -CVE-2015-3329 - https://hackerone.com/reports/73237 -CVE-2015-3330 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3331 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3331 - http://www.ubuntu.com/usn/USN-2632-1 -CVE-2015-3337 - http://packetstormsecurity.com/files/131646/Elasticsearch-Directory-Traversal.html -CVE-2015-3337 - https://www.elastic.co/community/security -CVE-2015-3337 - https://www.exploit-db.com/exploits/37054/ -CVE-2015-3339 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3339 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3346 - https://www.drupal.org/node/2402905 -CVE-2015-3395 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-3404 - https://www.drupal.org/node/2415947 -CVE-2015-3405 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-3405 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3411 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3412 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3414 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-3414 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-3415 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-3415 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-3416 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-3416 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-3418 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-3419 - http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud -CVE-2015-3422 - http://packetstormsecurity.com/files/132341/SearchBlox-8.2-Cross-Site-Scripting.html -CVE-2015-3423 - http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html -CVE-2015-3424 - http://packetstormsecurity.com/files/134176/Accentis-Content-Resource-Management-System-SQL-Injection.html -CVE-2015-3425 - http://packetstormsecurity.com/files/134177/Accentis-Content-Resource-Management-System-Cross-Site-Scripting.html -CVE-2015-3429 - http://packetstormsecurity.com/files/131802/WordPress-Twenty-Fifteen-4.2.1-Cross-Site-Scripting.html -CVE-2015-3429 - http://seclists.org/fulldisclosure/2015/May/41 -CVE-2015-3429 - https://wpvulndb.com/vulnerabilities/7965 -CVE-2015-3429 - https://www.netsparker.com/cve-2015-3429-dom-xss-vulnerability-in-twenty-fifteen-wordpress-theme/ -CVE-2015-3438 - https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/ -CVE-2015-3438 - https://wpvulndb.com/vulnerabilities/7929 -CVE-2015-3439 - http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html -CVE-2015-3439 - https://wpvulndb.com/vulnerabilities/7933 -CVE-2015-3440 - http://packetstormsecurity.com/files/131644/WordPress-4.2-Cross-Site-Scripting.html -CVE-2015-3440 - http://seclists.org/fulldisclosure/2015/Apr/84 -CVE-2015-3440 - https://klikki.fi/adv/wordpress2.html -CVE-2015-3440 - https://wpvulndb.com/vulnerabilities/7945 -CVE-2015-3440 - https://www.exploit-db.com/exploits/36844/ -CVE-2015-3442 - http://packetstormsecurity.com/files/132549/Soreco-AG-Xpert.Line-3.0-Authentication-Bypass.html -CVE-2015-3443 - https://www.exploit-db.com/exploits/37394/ -CVE-2015-3447 - http://seclists.org/fulldisclosure/2015/Apr/97 -CVE-2015-3447 - http://www.vulnerability-lab.com/get_content.php?id=1359 -CVE-2015-3449 - http://packetstormsecurity.com/files/132681/SAP-Afaria-XeService.exe-7.0.6398.0-Weak-File-Permissions.html -CVE-2015-3455 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3456 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-3456 - https://www.exploit-db.com/exploits/37053/ -CVE-2015-3459 - http://hextechsecurity.com/?p=123 -CVE-2015-3620 - http://packetstormsecurity.com/files/131766/Fortinet-FortiAnalyzer-FortiManager-Cross-Site-Scripting.html -CVE-2015-3620 - http://seclists.org/fulldisclosure/2015/May/13 -CVE-2015-3621 - http://packetstormsecurity.com/files/132680/SAP-ECC-Privilege-Escalation.html -CVE-2015-3622 - http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html -CVE-2015-3622 - http://seclists.org/fulldisclosure/2015/Apr/109 -CVE-2015-3623 - http://packetstormsecurity.com/files/133499/Qlikview-11.20-SR4-Blind-XXE-Injection.html -CVE-2015-3623 - https://www.exploit-db.com/exploits/38118/ -CVE-2015-3624 - http://packetstormsecurity.com/files/132104/Ektron-CMS-9.10-SP1-Cross-Site-Request-Forgery.html -CVE-2015-3624 - https://www.exploit-db.com/exploits/37296/ -CVE-2015-3627 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html -CVE-2015-3628 - http://packetstormsecurity.com/files/134434/F5-iControl-iCall-Script-Root-Command-Execution.html -CVE-2015-3628 - https://www.exploit-db.com/exploits/38764/ -CVE-2015-3629 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html -CVE-2015-3630 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html -CVE-2015-3631 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html -CVE-2015-3632 - http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html -CVE-2015-3632 - https://www.exploit-db.com/exploits/36859/ -CVE-2015-3636 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-3636 - http://www.ubuntu.com/usn/USN-2632-1 -CVE-2015-3643 - https://www.exploit-db.com/exploits/36820/ -CVE-2015-3646 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-3647 - http://packetstormsecurity.com/files/131976/WordPress-WP-Photo-Album-Plus-6.1.2-Cross-Site-Scripting.html -CVE-2015-3648 - http://packetstormsecurity.com/files/132142/ResourceSpace-7.1.6513-Local-File-Inclusion.html -CVE-2015-3673 - https://www.exploit-db.com/exploits/38036/ -CVE-2015-3693 - http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html -CVE-2015-3704 - http://packetstormsecurity.com/files/133547/OS-X-Privilege-Escalation.html -CVE-2015-3704 - https://www.exploit-db.com/exploits/38138/ -CVE-2015-3783 - https://www.exploit-db.com/exploits/38264/ -CVE-2015-3796 - https://www.exploit-db.com/exploits/38263/ -CVE-2015-3798 - https://www.exploit-db.com/exploits/38262/ -CVE-2015-3810 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3811 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-3811 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3812 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-3812 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3813 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-3814 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -CVE-2015-3824 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3826 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3827 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3828 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3829 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3831 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3832 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3833 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3834 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3835 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3836 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3837 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3839 - http://blog.trendmicro.com/trendlabs-security-intelligence/os-x-zero-days-on-the-rise-a-2015-midyear-review-on-advanced-attack-surfaces/ -CVE-2015-3839 - http://blog.trendmicro.com/trendlabs-security-intelligence/two-new-android-bugs-mess-up-messaging-may-lead-to-multiple-send-charges/ -CVE-2015-3840 - http://blog.trendmicro.com/trendlabs-security-intelligence/os-x-zero-days-on-the-rise-a-2015-midyear-review-on-advanced-attack-surfaces/ -CVE-2015-3840 - http://blog.trendmicro.com/trendlabs-security-intelligence/two-new-android-bugs-mess-up-messaging-may-lead-to-multiple-send-charges/ -CVE-2015-3842 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3843 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3844 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-3854 - http://seclists.org/fulldisclosure/2016/May/71 -CVE-2015-3854 - http://seclists.org/fulldisclosure/2016/May/72 -CVE-2015-3860 - http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-bypass/ -CVE-2015-3864 - https://www.exploit-db.com/exploits/38226/ -CVE-2015-3864 - https://www.exploit-db.com/exploits/39640/ -CVE-2015-3864 - https://www.exploit-db.com/exploits/40436/ -CVE-2015-3868 - http://packetstormsecurity.com/files/134132/Libstagefright-Saio-Tag-Integer-Overflow-Heap-Corruption.html -CVE-2015-3884 - http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html -CVE-2015-3885 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-3888 - http://sotiriu.de/adv/NSOADV-2015-001.txt -CVE-2015-3897 - http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html -CVE-2015-3898 - http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html -CVE-2015-3900 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-3900 - https://hackerone.com/reports/103993 -CVE-2015-3903 - http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html -CVE-2015-3904 - http://packetstormsecurity.com/files/131934/WordPress-Roomcloud-1.1-Cross-Site-Scripting.html -CVE-2015-3904 - http://seclists.org/fulldisclosure/2015/May/40 -CVE-2015-3905 - https://github.com/kohler/t1utils/blob/master/NEWS -CVE-2015-3905 - https://github.com/kohler/t1utils/issues/4 -CVE-2015-3908 - http://www.openwall.com/lists/oss-security/2015/07/14/4 -CVE-2015-3921 - http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html -CVE-2015-3922 - http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html -CVE-2015-3923 - http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html -CVE-2015-3931 - http://packetstormsecurity.com/files/132473/Microsec-e-Szigno-Netlock-Mokka-XML-Signature-Wrapping.html -CVE-2015-3931 - http://www.neih.gov.hu/?q=node/66 -CVE-2015-3932 - http://packetstormsecurity.com/files/132473/Microsec-e-Szigno-Netlock-Mokka-XML-Signature-Wrapping.html -CVE-2015-3932 - http://www.neih.gov.hu/?q=node/66 -CVE-2015-3933 - https://www.exploit-db.com/exploits/37363/ -CVE-2015-3934 - http://packetstormsecurity.com/files/132479/Fiyo-CMS-2.0_1.9.1-SQL-Injection.html -CVE-2015-3935 - http://packetstormsecurity.com/files/132108/Dolibarr-3.5-3.6-HTML-Injection.html -CVE-2015-3935 - http://seclists.org/fulldisclosure/2015/May/126 -CVE-2015-3935 - https://github.com/Dolibarr/dolibarr/issues/2857 -CVE-2015-3964 - http://seclists.org/fulldisclosure/2015/Sep/51 -CVE-2015-3986 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html -CVE-2015-3986 - https://www.exploit-db.com/exploits/36860/ -CVE-2015-3994 - http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html -CVE-2015-3995 - http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html -CVE-2015-3999 - http://seclists.org/fulldisclosure/2015/May/72 -CVE-2015-4000 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-4000 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4000 - http://www.securityfocus.com/bid/91787 -CVE-2015-4000 - https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/ -CVE-2015-4000 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 -CVE-2015-4000 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2015-4000 - https://weakdh.org/ -CVE-2015-4000 - https://weakdh.org/imperfect-forward-secrecy.pdf -CVE-2015-4000 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2015-4001 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c -CVE-2015-4001 - https://github.com/torvalds/linux/commit/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c -CVE-2015-4002 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 -CVE-2015-4002 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d114b9fe78c8d6fc6e70808c2092aa307c36dc8e -CVE-2015-4002 - https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 -CVE-2015-4002 - https://github.com/torvalds/linux/commit/d114b9fe78c8d6fc6e70808c2092aa307c36dc8e -CVE-2015-4003 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04bf464a5dfd9ade0dda918e44366c2c61fce80b -CVE-2015-4003 - https://github.com/torvalds/linux/commit/04bf464a5dfd9ade0dda918e44366c2c61fce80b -CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2015-4004 - https://lkml.org/lkml/2015/5/13/739 -CVE-2015-4010 - http://packetstormsecurity.com/files/132209/WordPress-Encrypted-Contact-Form-1.0.4-CSRF-XSS.html -CVE-2015-4010 - http://seclists.org/fulldisclosure/2015/May/63 -CVE-2015-4010 - https://wpvulndb.com/vulnerabilities/7992 -CVE-2015-4010 - https://www.exploit-db.com/exploits/37264/ -CVE-2015-4018 - http://packetstormsecurity.com/files/131974/WordPress-FeedWordPress-2015.0426-SQL-Injection.html -CVE-2015-4018 - http://seclists.org/fulldisclosure/2015/May/75 -CVE-2015-4018 - https://www.exploit-db.com/exploits/37067/ -CVE-2015-4020 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-4021 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4021 - https://bugs.php.net/bug.php?id=69453 -CVE-2015-4021 - https://hackerone.com/reports/104027 -CVE-2015-4022 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4022 - https://hackerone.com/reports/73240 -CVE-2015-4024 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4024 - https://bugs.php.net/bug.php?id=69364 -CVE-2015-4025 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4026 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4027 - http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html -CVE-2015-4027 - https://www.exploit-db.com/exploits/38847/ -CVE-2015-4029 - http://seclists.org/fulldisclosure/2015/Jul/66 -CVE-2015-4038 - http://packetstormsecurity.com/files/132012/WordPress-WP-Membership-1.2.3-Privilege-Escalation.html -CVE-2015-4038 - https://wpvulndb.com/vulnerabilities/7998 -CVE-2015-4039 - http://packetstormsecurity.com/files/132011/WordPress-WP-Membership-1.2.3-Cross-Site-Scripting.html -CVE-2015-4039 - https://www.exploit-db.com/exploits/37074/ -CVE-2015-4040 - http://packetstormsecurity.com/files/133931/F5-BigIP-10.2.4-Build-595.0-HF3-Path-Traversal.html -CVE-2015-4045 - https://sysdream.com/uploads/media/default/0001/01/8c6a70098657b4474fe7abe9bcdd5e73b234b610.pdf -CVE-2015-4045 - https://www.alienvault.com/forums/discussion/5127/ -CVE-2015-4046 - https://sysdream.com/uploads/media/default/0001/01/8c6a70098657b4474fe7abe9bcdd5e73b234b610.pdf -CVE-2015-4046 - https://www.alienvault.com/forums/discussion/5127/ -CVE-2015-4047 - http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html -CVE-2015-4051 - http://packetstormsecurity.com/files/132168/Beckhoff-IPC-Diagnositcs-Authentication-Bypass.html -CVE-2015-4051 - http://packetstormsecurity.com/files/134071/Beckoff-CX9020-CPU-Model-Remote-Code-Execution.html -CVE-2015-4051 - http://seclists.org/fulldisclosure/2015/Jun/10 -CVE-2015-4054 - https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5 -CVE-2015-4062 - http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-4062 - https://www.exploit-db.com/exploits/37107/ -CVE-2015-4063 - http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-4063 - https://www.exploit-db.com/exploits/37107/ -CVE-2015-4064 - http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-4064 - https://www.exploit-db.com/exploits/37108/ -CVE-2015-4065 - http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-4065 - https://www.exploit-db.com/exploits/37108/ -CVE-2015-4066 - http://packetstormsecurity.com/files/132036/WordPress-GigPress-2.3.8-SQL-Injection.html -CVE-2015-4066 - https://www.exploit-db.com/exploits/37109/ -CVE-2015-4071 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html -CVE-2015-4071 - http://seclists.org/fulldisclosure/2015/Jul/102 -CVE-2015-4071 - https://www.exploit-db.com/exploits/37666/ -CVE-2015-4072 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html -CVE-2015-4072 - http://seclists.org/fulldisclosure/2015/Jul/102 -CVE-2015-4072 - https://www.exploit-db.com/exploits/37666/ -CVE-2015-4073 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html -CVE-2015-4073 - http://seclists.org/fulldisclosure/2015/Jul/102 -CVE-2015-4073 - https://www.exploit-db.com/exploits/37666/ -CVE-2015-4074 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html -CVE-2015-4074 - http://seclists.org/fulldisclosure/2015/Jul/102 -CVE-2015-4074 - https://www.exploit-db.com/exploits/37666/ -CVE-2015-4075 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html -CVE-2015-4075 - http://seclists.org/fulldisclosure/2015/Jul/102 -CVE-2015-4075 - https://www.exploit-db.com/exploits/37666/ -CVE-2015-4077 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html -CVE-2015-4077 - http://seclists.org/fulldisclosure/2015/Sep/0 -CVE-2015-4077 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities -CVE-2015-4077 - https://www.exploit-db.com/exploits/45149/ -CVE-2015-4080 - http://packetstormsecurity.com/files/132210/Kankun-Smart-Socket-Mobile-App-Hardcoded-AES-Key.html -CVE-2015-4080 - https://plus.google.com/109112844319840106704/posts -CVE-2015-4084 - http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html -CVE-2015-4084 - https://www.exploit-db.com/exploits/37132/ -CVE-2015-4089 - https://wpvulndb.com/vulnerabilities/9756 -CVE-2015-4091 - http://packetstormsecurity.com/files/133122/SAP-NetWeaver-AS-Java-XXE-Injection.html -CVE-2015-4093 - http://packetstormsecurity.com/files/132232/Kibana-4.0.2-Cross-Site-Scripting.html -CVE-2015-4093 - https://www.elastic.co/community/security/ -CVE-2015-4108 - http://packetstormsecurity.com/files/132179/Wing-FTP-4.4.6-Code-Execution-Cross-Site-Request-Forgery.html -CVE-2015-4108 - http://packetstormsecurity.com/files/132180/Wing-FTP-4.4.6-Cross-Site-Request-Forgery.html -CVE-2015-4109 - http://packetstormsecurity.com/files/132181/WordPress-Users-Ultra-1.5.15-SQL-Injection.html -CVE-2015-4116 - https://bugs.php.net/bug.php?id=69737 -CVE-2015-4117 - https://www.exploit-db.com/exploits/37369/ -CVE-2015-4118 - http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html -CVE-2015-4118 - https://www.exploit-db.com/exploits/37259/ -CVE-2015-4119 - http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html -CVE-2015-4119 - https://www.exploit-db.com/exploits/37259/ -CVE-2015-4127 - http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html -CVE-2015-4127 - https://www.exploit-db.com/exploits/37112/ -CVE-2015-4129 - http://www.kb.cert.org/vuls/id/110532 -CVE-2015-4133 - http://packetstormsecurity.com/files/130845/ -CVE-2015-4133 - http://packetstormsecurity.com/files/131515/ -CVE-2015-4133 - https://wpvulndb.com/vulnerabilities/7867 -CVE-2015-4133 - https://www.exploit-db.com/exploits/36809/ -CVE-2015-4134 - http://packetstormsecurity.com/files/132033/phpwind-8.7-Open-Redirect.html -CVE-2015-4135 - http://packetstormsecurity.com/files/132030/phpwind-8.7-Cross-Site-Scripting.html -CVE-2015-4137 - http://packetstormsecurity.com/files/131981/Milw0rm-Clone-Script-1.0-SQL-Injection.html -CVE-2015-4137 - https://www.exploit-db.com/exploits/37248/ -CVE-2015-4138 - http://www.kb.cert.org/vuls/id/498348 -CVE-2015-4139 - http://www.openwall.com/lists/oss-security/2015/05/29/1 -CVE-2015-4140 - http://www.openwall.com/lists/oss-security/2015/05/29/1 -CVE-2015-4141 - http://www.ubuntu.com/usn/USN-2650-1 -CVE-2015-4142 - http://www.ubuntu.com/usn/USN-2650-1 -CVE-2015-4143 - http://www.ubuntu.com/usn/USN-2650-1 -CVE-2015-4144 - http://www.ubuntu.com/usn/USN-2650-1 -CVE-2015-4145 - http://www.ubuntu.com/usn/USN-2650-1 -CVE-2015-4146 - http://www.ubuntu.com/usn/USN-2650-1 -CVE-2015-4147 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4148 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4152 - http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html -CVE-2015-4152 - https://www.elastic.co/blog/logstash-1-4-3-released -CVE-2015-4152 - https://www.elastic.co/community/security/ -CVE-2015-4153 - http://packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html -CVE-2015-4153 - https://www.exploit-db.com/exploits/37200/ -CVE-2015-4165 - http://packetstormsecurity.com/files/132234/Elasticsearch-1.5.2-File-Creation.html -CVE-2015-4165 - https://www.elastic.co/community/security/ -CVE-2015-4167 - http://www.ubuntu.com/usn/USN-2632-1 -CVE-2015-4170 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4170 - https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz -CVE-2015-4173 - http://packetstormsecurity.com/files/133302/Dell-SonicWall-NetExtender-7.5.215-Privilege-Escalation.html -CVE-2015-4174 - http://packetstormsecurity.com/files/132514/Climatix-BACnet-IP-Communication-Module-Cross-Site-Scripting.html -CVE-2015-4179 - http://www.openwall.com/lists/oss-security/2015/06/03/3 -CVE-2015-4325 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151006-vcs -CVE-2015-4336 - http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html -CVE-2015-4337 - http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html -CVE-2015-4338 - http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html -CVE-2015-4342 - http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html -CVE-2015-4342 - http://seclists.org/fulldisclosure/2015/Jun/19 -CVE-2015-4345 - https://www.drupal.org/node/2428857 -CVE-2015-4356 - https://www.drupal.org/node/2445297 -CVE-2015-4357 - https://www.drupal.org/node/2445297 -CVE-2015-4374 - https://www.drupal.org/node/2454063 -CVE-2015-4381 - https://www.drupal.org/node/2474135 -CVE-2015-4382 - https://www.drupal.org/node/2474135 -CVE-2015-4400 - https://blog.fortinet.com/2016/01/22/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell -CVE-2015-4410 - https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html -CVE-2015-4411 - https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html -CVE-2015-4412 - https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html -CVE-2015-4413 - http://packetstormsecurity.com/files/132425/WordPress-Nextend-Facebook-Connect-1.5.4-Cross-Site-Scripting.html -CVE-2015-4413 - http://seclists.org/fulldisclosure/2015/Jun/70 -CVE-2015-4414 - http://packetstormsecurity.com/files/132266/WordPress-SE-HTML5-Album-Audio-Player-1.1.0-Directory-Traversal.html -CVE-2015-4414 - https://wpvulndb.com/vulnerabilities/8032 -CVE-2015-4414 - https://www.exploit-db.com/exploits/37274/ -CVE-2015-4420 - https://www.exploit-db.com/exploits/37271/ -CVE-2015-4427 - http://packetstormsecurity.com/files/132105/Ektron-CMS-9.10-SP1-Cross-Site-Scripting.html -CVE-2015-4453 - http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html -CVE-2015-4455 - http://packetstormsecurity.com/files/132256/WordPress-Aviary-Image-Editor-Add-On-For-Gravity-Forms-3.0-Beta-Shell-Upload.html -CVE-2015-4460 - https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html -CVE-2015-4460 - https://raw.githubusercontent.com/Siros96/CSRF/master/PoC -CVE-2015-4460 - https://www.exploit-db.com/exploits/37447/ -CVE-2015-4464 - http://packetstormsecurity.com/files/132437/Kguard-Digital-Video-Recorder-Bypass-Issues.html -CVE-2015-4473 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4474 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4475 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4476 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4477 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4477 - https://bugzilla.mozilla.org/show_bug.cgi?id=1179484 -CVE-2015-4478 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4479 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4479 - https://bugzilla.mozilla.org/show_bug.cgi?id=1185115 -CVE-2015-4480 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4481 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4481 - https://bugzilla.mozilla.org/show_bug.cgi?id=1171518 -CVE-2015-4481 - https://www.exploit-db.com/exploits/37925/ -CVE-2015-4482 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4483 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4483 - https://bugzilla.mozilla.org/show_bug.cgi?id=1148732 -CVE-2015-4484 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4485 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4486 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4487 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4488 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4489 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4490 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4491 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4491 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-4491 - https://bugzilla.gnome.org/show_bug.cgi?id=752297 -CVE-2015-4492 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4493 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4495 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4495 - https://www.exploit-db.com/exploits/37772/ -CVE-2015-4496 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1149605 -CVE-2015-4497 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4497 - http://www.ubuntu.com/usn/USN-2723-1 -CVE-2015-4497 - https://bugzilla.mozilla.org/show_bug.cgi?id=1164766 -CVE-2015-4497 - https://bugzilla.mozilla.org/show_bug.cgi?id=1175278 -CVE-2015-4498 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4498 - http://www.ubuntu.com/usn/USN-2723-1 -CVE-2015-4498 - https://bugzilla.mozilla.org/show_bug.cgi?id=1042699 -CVE-2015-4499 - http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html -CVE-2015-4499 - https://bugzilla.mozilla.org/show_bug.cgi?id=1202447 -CVE-2015-4500 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4500 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4501 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4502 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4503 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4504 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4505 - https://bugzilla.mozilla.org/show_bug.cgi?id=1177861 -CVE-2015-4506 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4507 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4508 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4509 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4509 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1198435 -CVE-2015-4510 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4510 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4511 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4512 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4513 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4513 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4513 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-4514 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4515 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4516 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4517 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4517 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4518 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4518 - https://bugzilla.mozilla.org/show_bug.cgi?id=1136692 -CVE-2015-4518 - https://bugzilla.mozilla.org/show_bug.cgi?id=1182778 -CVE-2015-4519 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4519 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4519 - https://bugzilla.mozilla.org/show_bug.cgi?id=1189814 -CVE-2015-4520 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4520 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4521 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4522 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4522 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4538 - http://packetstormsecurity.com/files/133405/EMC-Atmos-2.3.0-XML-External-Entity-Injection.html -CVE-2015-4541 - http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html -CVE-2015-4542 - http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html -CVE-2015-4543 - http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html -CVE-2015-4544 - http://packetstormsecurity.com/files/133441/EMC-Documentum-Content-Server-Privilege-Escalation.html -CVE-2015-4546 - http://packetstormsecurity.com/files/133784/RSA-OneStep-6.9-Path-Traversal.html -CVE-2015-4547 - http://packetstormsecurity.com/files/133779/RSA-Web-Threat-Detection-Privilege-Escalation-Information-Disclosure.html -CVE-2015-4548 - http://packetstormsecurity.com/files/133779/RSA-Web-Threat-Detection-Privilege-Escalation-Information-Disclosure.html -CVE-2015-4551 - http://www.openoffice.org/security/cves/CVE-2015-4551.html -CVE-2015-4551 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4552 - http://adrianhayter.com/exploits.php -CVE-2015-4553 - https://www.exploit-db.com/exploits/37423/ -CVE-2015-4554 - http://www.tibco.com/mk/advisory.jsp -CVE-2015-4555 - http://www.tibco.com/mk/advisory.jsp -CVE-2015-4557 - http://packetstormsecurity.com/files/132432/WordPress-Nextend-Twitter-Connect-1.5.1-Cross-Site-Scripting.html -CVE-2015-4557 - http://seclists.org/fulldisclosure/2015/Jun/71 -CVE-2015-4586 - http://packetstormsecurity.com/files/132324/CellPipe-7130-Cross-Site-Request-Forgery.html -CVE-2015-4587 - http://packetstormsecurity.com/files/132327/CellPipe-7130-Cross-Site-Scripting.html -CVE-2015-4588 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4591 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html -CVE-2015-4591 - https://www.exploit-db.com/exploits/39402/ -CVE-2015-4592 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html -CVE-2015-4592 - https://www.exploit-db.com/exploits/39402/ -CVE-2015-4593 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html -CVE-2015-4593 - https://www.exploit-db.com/exploits/39402/ -CVE-2015-4594 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html -CVE-2015-4594 - https://www.exploit-db.com/exploits/39402/ -CVE-2015-4598 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4599 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4601 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4602 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4603 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4604 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4605 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4614 - https://www.exploit-db.com/exploits/37534/ -CVE-2015-4616 - https://www.exploit-db.com/exploits/37534/ -CVE-2015-4620 - https://kb.isc.org/article/AA-01306 -CVE-2015-4624 - http://packetstormsecurity.com/files/133052/WiFi-Pineapple-Predictable-CSRF-Token.html -CVE-2015-4624 - http://packetstormsecurity.com/files/139212/Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection-2.html -CVE-2015-4624 - https://www.exploit-db.com/exploits/40609/ -CVE-2015-4626 - https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html -CVE-2015-4630 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html -CVE-2015-4630 - https://seclists.org/fulldisclosure/2015/Jun/80 -CVE-2015-4630 - https://www.exploit-db.com/exploits/37389/ -CVE-2015-4631 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html -CVE-2015-4631 - https://seclists.org/fulldisclosure/2015/Jun/80 -CVE-2015-4631 - https://www.exploit-db.com/exploits/37389/ -CVE-2015-4632 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html -CVE-2015-4632 - https://seclists.org/fulldisclosure/2015/Jun/80 -CVE-2015-4632 - https://www.exploit-db.com/exploits/37388/ -CVE-2015-4633 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html -CVE-2015-4633 - https://seclists.org/fulldisclosure/2015/Jun/80 -CVE-2015-4633 - https://www.exploit-db.com/exploits/37387/ -CVE-2015-4640 - http://www.kb.cert.org/vuls/id/155412 -CVE-2015-4640 - https://github.com/nowsecure/samsung-ime-rce-poc/ -CVE-2015-4640 - https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ -CVE-2015-4641 - http://www.kb.cert.org/vuls/id/155412 -CVE-2015-4641 - https://github.com/nowsecure/samsung-ime-rce-poc/ -CVE-2015-4641 - https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ -CVE-2015-4642 - https://bugs.php.net/bug.php?id=69646 -CVE-2015-4643 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4643 - https://hackerone.com/reports/104028 -CVE-2015-4644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4651 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-4654 - http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html -CVE-2015-4655 - https://www.securify.nl/advisory/SFY20150503/reflected_cross_site_scripting_in_synology_diskstation_manager.html -CVE-2015-4656 - https://www.securify.nl/advisory/SFY20150504/synology_photo_station_multiple_cross_site_scripting_vulnerabilities.html -CVE-2015-4658 - https://www.exploit-db.com/exploits/37290/ -CVE-2015-4659 - https://www.exploit-db.com/exploits/37266/ -CVE-2015-4660 - http://packetstormsecurity.com/files/132122/Enhanced-SQL-Portal-5.0.7961-Cross-Site-Scripting.html -CVE-2015-4661 - http://packetstormsecurity.com/files/132193/Symphony-CMS-2.6.2-Cross-Site-Scripting.html -CVE-2015-4664 - http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html -CVE-2015-4664 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -CVE-2015-4664 - https://www.exploit-db.com/exploits/37708/ -CVE-2015-4665 - http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html -CVE-2015-4665 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -CVE-2015-4665 - https://www.exploit-db.com/exploits/37708/ -CVE-2015-4666 - http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html -CVE-2015-4666 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -CVE-2015-4666 - https://www.exploit-db.com/exploits/37708/ -CVE-2015-4667 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -CVE-2015-4667 - https://www.exploit-db.com/exploits/37708/ -CVE-2015-4668 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -CVE-2015-4668 - https://www.exploit-db.com/exploits/37708/ -CVE-2015-4669 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -CVE-2015-4669 - https://www.exploit-db.com/exploits/37708/ -CVE-2015-4671 - http://packetstormsecurity.com/files/135163/OpenCart-2.1.0.1-Cross-Site-Scripting.html -CVE-2015-4671 - http://seclists.org/fulldisclosure/2016/Jan/17 -CVE-2015-4674 - http://seclists.org/fulldisclosure/2015/Jun/105 -CVE-2015-4675 - http://packetstormsecurity.com/files/132196/TinySRP-Buffer-Overflow.html -CVE-2015-4676 - http://packetstormsecurity.com/files/132186/TickFa-1.x-SQL-Injection.html -CVE-2015-4677 - https://www.exploit-db.com/exploits/37257/ -CVE-2015-4678 - http://packetstormsecurity.com/files/132216/Persian-Car-CMS-1.0-SQL-Injection.html -CVE-2015-4679 - http://packetstormsecurity.com/files/132178/Airties-RT210-Cross-Site-Scripting.html -CVE-2015-4680 - http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html -CVE-2015-4681 - http://seclists.org/fulldisclosure/2015/Jun/81 -CVE-2015-4681 - https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -CVE-2015-4681 - https://www.exploit-db.com/exploits/37449/ -CVE-2015-4682 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -CVE-2015-4682 - http://seclists.org/fulldisclosure/2015/Jun/81 -CVE-2015-4682 - https://www.exploit-db.com/exploits/37449/ -CVE-2015-4683 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -CVE-2015-4683 - http://seclists.org/fulldisclosure/2015/Jun/81 -CVE-2015-4683 - https://www.exploit-db.com/exploits/37449/ -CVE-2015-4684 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -CVE-2015-4684 - http://seclists.org/fulldisclosure/2015/Jun/81 -CVE-2015-4684 - https://www.exploit-db.com/exploits/37449/ -CVE-2015-4685 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -CVE-2015-4685 - http://seclists.org/fulldisclosure/2015/Jun/81 -CVE-2015-4685 - https://www.exploit-db.com/exploits/37449/ -CVE-2015-4687 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html -CVE-2015-4688 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html -CVE-2015-4689 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html -CVE-2015-4694 - http://www.openwall.com/lists/oss-security/2015/06/12/4 -CVE-2015-4694 - http://www.openwall.com/lists/oss-security/2015/06/21/2 -CVE-2015-4694 - https://wordpress.org/support/topic/zip-attachments-wordpress-plugin-v114-arbitrary-file-download-vulnerability?replies=1 -CVE-2015-4694 - https://wpvulndb.com/vulnerabilities/8047 -CVE-2015-4695 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4696 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4697 - http://seclists.org/fulldisclosure/2015/Jun/57 -CVE-2015-4697 - https://wordpress.org/support/topic/discovered-security-vulnerabilities-1/ -CVE-2015-4699 - http://seclists.org/fulldisclosure/2015/Dec/48 -CVE-2015-4700 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 -CVE-2015-4700 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4703 - http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-File-Download.html -CVE-2015-4703 - https://wpvulndb.com/vulnerabilities/8055 -CVE-2015-4704 - http://packetstormsecurity.com/files/132459/Download-Zip-Attachments-1.0-File-Download.html -CVE-2015-4713 - http://packetstormsecurity.com/files/132369/ApPHP-Hotel-Site-3.x.x-SQL-Injection.html -CVE-2015-4714 - http://packetstormsecurity.com/files/132214/DreamBox-DM500s-Cross-Site-Scripting.html -CVE-2015-4725 - http://packetstormsecurity.com/files/132337/Audio-Share-2.0.2-Cross-Site-Scripting-Remote-File-Inclusion.html -CVE-2015-4726 - http://packetstormsecurity.com/files/132337/Audio-Share-2.0.2-Cross-Site-Scripting-Remote-File-Inclusion.html -CVE-2015-4727 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4728 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4729 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4730 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4731 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4732 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4733 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4734 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4734 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4735 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4736 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4737 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4737 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4738 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4739 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4740 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4741 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4742 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4743 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4744 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4745 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4746 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4747 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4748 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4749 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4750 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4751 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4752 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4752 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4753 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4754 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4755 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4756 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4757 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4758 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4759 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4760 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4761 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4762 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4763 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4764 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4765 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4766 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4767 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4768 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4769 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4770 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4771 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4772 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4773 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4774 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4775 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4776 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4777 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4778 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4779 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4780 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4781 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4782 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4783 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4784 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4785 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4786 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4787 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4788 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4789 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4790 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html -CVE-2015-4791 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4792 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4792 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4792 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4793 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4794 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4795 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4796 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4797 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4798 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4799 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4800 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4801 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4802 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4802 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4802 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4803 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4803 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4804 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4805 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4806 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4806 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4807 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4807 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4808 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4809 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4810 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4811 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4812 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4813 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4815 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4815 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4815 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4816 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4816 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4816 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4817 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4818 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4819 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4819 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4819 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4820 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4821 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4822 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4823 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4824 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4825 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4826 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4826 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4827 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4828 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4830 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4830 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4831 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4832 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4833 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4834 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4835 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4835 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4836 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4836 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4836 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4837 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4838 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4839 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4840 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4840 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4841 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4842 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4843 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4843 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4844 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4844 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4845 - http://packetstormsecurity.com/files/134098/Oracle-E-Business-Suite-12.2.4-Database-User-Enumeration.html -CVE-2015-4845 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4846 - http://packetstormsecurity.com/files/134099/Oracle-E-Business-Suite-12.1.3-12.1.4-SQL-Injection.html -CVE-2015-4846 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4847 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4848 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4849 - http://packetstormsecurity.com/files/134118/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html -CVE-2015-4849 - http://seclists.org/fulldisclosure/2015/Oct/112 -CVE-2015-4849 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4850 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4851 - http://packetstormsecurity.com/files/134119/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html -CVE-2015-4851 - http://seclists.org/fulldisclosure/2015/Oct/113 -CVE-2015-4851 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4852 - http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ -CVE-2015-4852 - http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html -CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-4852 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4852 - https://www.exploit-db.com/exploits/42806/ -CVE-2015-4852 - https://www.exploit-db.com/exploits/46628/ -CVE-2015-4854 - http://packetstormsecurity.com/files/134100/Oracle-E-Business-Suite-12.1.4-Cross-Site-Scripting.html -CVE-2015-4854 - http://seclists.org/fulldisclosure/2015/Oct/100 -CVE-2015-4854 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4856 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4857 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4858 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4858 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4858 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4859 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4860 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4860 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4861 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4861 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4861 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4862 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4863 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4864 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4864 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4865 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4866 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4867 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4868 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4868 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4869 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4870 - http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html -CVE-2015-4870 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4870 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4870 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4870 - https://www.exploit-db.com/exploits/39867/ -CVE-2015-4871 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4871 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-4871 - http://www.ubuntu.com/usn/USN-2818-1 -CVE-2015-4872 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4872 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4873 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4874 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4875 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4876 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4877 - http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html -CVE-2015-4877 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4877 - https://www.exploit-db.com/exploits/38788/ -CVE-2015-4878 - http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html -CVE-2015-4878 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4878 - https://www.exploit-db.com/exploits/38789/ -CVE-2015-4879 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4879 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4879 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4880 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4881 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4881 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4882 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4882 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4883 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4883 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4884 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4885 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4886 - http://packetstormsecurity.com/files/134117/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html -CVE-2015-4886 - http://seclists.org/fulldisclosure/2015/Oct/111 -CVE-2015-4886 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4887 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4888 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4890 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4891 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4892 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4893 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4893 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4894 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4895 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4896 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4898 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4899 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4900 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4901 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4902 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4903 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4903 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4904 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4905 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4906 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4907 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4908 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4909 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4910 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4911 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4911 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-4912 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4913 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-4913 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4913 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-4914 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4915 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4916 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4917 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -CVE-2015-4919 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4920 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4921 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4922 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4923 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4924 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4925 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-4926 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-5053 - http://nvidia.custhelp.com/app/answers/detail/a_id/3802 -CVE-2015-5054 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html -CVE-2015-5057 - https://wpvulndb.com/vulnerabilities/8064 -CVE-2015-5061 - http://www.vulnerability-lab.com/get_content.php?id=1488 -CVE-2015-5061 - https://packetstormsecurity.com/files/132402/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html -CVE-2015-5062 - http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt -CVE-2015-5062 - http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html -CVE-2015-5063 - http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt -CVE-2015-5063 - http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html -CVE-2015-5064 - http://packetstormsecurity.com/files/132420/MySQL-Lite-Administrator-Beta-1-Cross-Site-Scripting.html -CVE-2015-5065 - http://packetstormsecurity.com/files/132278/WordPress-Paypal-Currency-Converter-Basic-For-Woocommerce-1.3-File-Read.html -CVE-2015-5065 - https://www.exploit-db.com/exploits/37253/ -CVE-2015-5066 - http://packetstormsecurity.com/files/132397/GeniXCMS-0.0.3-Cross-Site-Scripting.html -CVE-2015-5066 - https://www.exploit-db.com/exploits/37360/ -CVE-2015-5067 - http://packetstormsecurity.com/files/133515/SAP-NetWeaver-AS-FKCDBFTRACE-ABAP-Hardcoded-Credentials.html -CVE-2015-5067 - http://packetstormsecurity.com/files/133516/SAP-NetWeaver-AS-LSCT1I13-ABAP-Hardcoded-Credentials.html -CVE-2015-5068 - http://packetstormsecurity.com/files/133514/SAP-Mobile-Platform-3-XXE-Injection.html -CVE-2015-5071 - https://packetstormsecurity.com/files/133688/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html -CVE-2015-5072 - https://packetstormsecurity.com/files/133689/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html -CVE-2015-5073 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5074 - http://packetstormsecurity.com/files/133717/X2Engine-4.2-Arbitrary-File-Upload.html -CVE-2015-5074 - http://seclists.org/fulldisclosure/2015/Sep/92 -CVE-2015-5074 - https://github.com/X2Engine/X2CRM/commit/10b72bfe7a1b9694f19a0adef72d85a754d4d3f8#diff-26a90fcab2707d6ef509fccb3588790f -CVE-2015-5074 - https://www.exploit-db.com/exploits/38323/ -CVE-2015-5075 - http://packetstormsecurity.com/files/133718/X2Engine-4.2-Cross-Site-Request-Forgery.html -CVE-2015-5075 - http://seclists.org/fulldisclosure/2015/Sep/93 -CVE-2015-5075 - https://www.exploit-db.com/exploits/38321/ -CVE-2015-5076 - http://packetstormsecurity.com/files/133716/X2Engine-4.2-Cross-Site-Scripting.html -CVE-2015-5076 - http://seclists.org/fulldisclosure/2015/Sep/91 -CVE-2015-5079 - http://packetstormsecurity.com/files/132541/BlackCat-CMS-1.1.1-Path-Traversal.html -CVE-2015-5082 - http://packetstormsecurity.com/files/133469/Endian-Firewall-Proxy-Password-Change-Command-Injection.html -CVE-2015-5082 - https://www.exploit-db.com/exploits/37426/ -CVE-2015-5082 - https://www.exploit-db.com/exploits/37428/ -CVE-2015-5082 - https://www.exploit-db.com/exploits/38096/ -CVE-2015-5116 - https://www.exploit-db.com/exploits/37851/ -CVE-2015-5119 - http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/ -CVE-2015-5119 - https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html -CVE-2015-5122 - http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html -CVE-2015-5122 - https://perception-point.io/new/breaking-cfi.php -CVE-2015-5122 - https://www.exploit-db.com/exploits/37599/ -CVE-2015-5123 - http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ -CVE-2015-5123 - http://www.kb.cert.org/vuls/id/918568 -CVE-2015-5125 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5125 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5127 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5127 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5127 - https://www.exploit-db.com/exploits/37861/ -CVE-2015-5129 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5129 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5130 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5130 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5130 - https://www.exploit-db.com/exploits/37854/ -CVE-2015-5131 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5131 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5131 - https://www.exploit-db.com/exploits/37856/ -CVE-2015-5132 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5132 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5132 - https://www.exploit-db.com/exploits/37857/ -CVE-2015-5133 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5133 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5133 - https://www.exploit-db.com/exploits/37858/ -CVE-2015-5134 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5134 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5134 - https://www.exploit-db.com/exploits/37852/ -CVE-2015-5143 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-5144 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-5148 - https://www.exploit-db.com/exploits/37325/ -CVE-2015-5149 - http://packetstormsecurity.com/files/132376/ManageEngine-SupportCenter-Plus-7.90-XSS-Traversal-Password-Disclosure.html -CVE-2015-5149 - http://www.vulnerability-lab.com/get_content.php?id=1501 -CVE-2015-5149 - https://www.exploit-db.com/exploits/37322/ -CVE-2015-5150 - http://packetstormsecurity.com/files/132376/ManageEngine-SupportCenter-Plus-7.90-XSS-Traversal-Password-Disclosure.html -CVE-2015-5150 - http://www.vulnerability-lab.com/get_content.php?id=1501 -CVE-2015-5150 - https://www.exploit-db.com/exploits/37322/ -CVE-2015-5151 - http://packetstormsecurity.com/files/132366/WordPress-Revslider-4.2.2-XSS-Information-Disclosure.html -CVE-2015-5156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5157 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5157 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5161 - http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt -CVE-2015-5161 - http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html -CVE-2015-5161 - http://seclists.org/fulldisclosure/2015/Aug/46 -CVE-2015-5161 - https://www.exploit-db.com/exploits/37765/ -CVE-2015-5162 - https://launchpad.net/bugs/1449062 -CVE-2015-5165 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5174 - http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html -CVE-2015-5174 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-5180 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2015-5194 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5195 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5207 - http://packetstormsecurity.com/files/136840/Apache-Cordova-iOS-3.9.1-Access-Bypass.html -CVE-2015-5208 - http://packetstormsecurity.com/files/136839/Apache-Cordova-iOS-3.9.1-Arbitrary-Plugin-Execution.html -CVE-2015-5211 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/ -CVE-2015-5212 - http://www.openoffice.org/security/cves/CVE-2015-5212.html -CVE-2015-5212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5213 - http://www.openoffice.org/security/cves/CVE-2015-5213.html -CVE-2015-5213 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5214 - http://www.openoffice.org/security/cves/CVE-2015-5214.html -CVE-2015-5214 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5219 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5223 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-5223 - https://bugs.launchpad.net/swift/+bug/1449212 -CVE-2015-5227 - https://wpvulndb.com/vulnerabilities/8200 -CVE-2015-5229 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5234 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5235 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5243 - https://github.com/jsmitty12/phpWhois/blob/master/CHANGELOG.md -CVE-2015-5243 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180425-01_phpWhois_Code_Execution -CVE-2015-5248 - https://bugzilla.redhat.com/show_bug.cgi?id=1272326 -CVE-2015-5248 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-017/?fid=7150 -CVE-2015-5252 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-5252 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5254 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-5254 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-5255 - http://packetstormsecurity.com/files/134506/Apache-Flex-BlazeDS-4.7.1-SSRF.html -CVE-2015-5256 - http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html -CVE-2015-5260 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5261 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5262 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-5262 - http://www.ubuntu.com/usn/USN-2769-1 -CVE-2015-5273 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5277 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2015-5277 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2015-5277 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5277 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2015-5279 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5281 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5283 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5285 - http://packetstormsecurity.com/files/133897/Kallithea-0.2.9-HTTP-Response-Splitting.html -CVE-2015-5285 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5267.php -CVE-2015-5285 - https://www.exploit-db.com/exploits/38424/ -CVE-2015-5287 - http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html -CVE-2015-5287 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5287 - https://www.exploit-db.com/exploits/38832/ -CVE-2015-5288 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5289 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5291 - https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ -CVE-2015-5292 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5295 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-5296 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-5296 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5299 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-5299 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5300 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-5302 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-5307 - https://bugzilla.redhat.com/show_bug.cgi?id=1277172 -CVE-2015-5308 - https://wpvulndb.com/vulnerabilities/8221 -CVE-2015-5310 - http://www.ubuntu.com/usn/USN-2808-1 -CVE-2015-5312 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-5312 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5314 - http://www.ubuntu.com/usn/USN-2808-1 -CVE-2015-5315 - http://www.ubuntu.com/usn/USN-2808-1 -CVE-2015-5316 - http://www.ubuntu.com/usn/USN-2808-1 -CVE-2015-5327 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206 -CVE-2015-5330 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5333 - http://packetstormsecurity.com/files/133998/Qualys-Security-Advisory-LibreSSL-Leak-Overflow.html -CVE-2015-5334 - http://packetstormsecurity.com/files/133998/Qualys-Security-Advisory-LibreSSL-Leak-Overflow.html -CVE-2015-5345 - http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html -CVE-2015-5345 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-5345 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-5346 - http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html -CVE-2015-5346 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-5346 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-5348 - http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html -CVE-2015-5351 - http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html -CVE-2015-5351 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-5351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-5351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-5352 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-5352 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5353 - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html -CVE-2015-5353 - https://www.exploit-db.com/exploits/37439/ -CVE-2015-5354 - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html -CVE-2015-5354 - https://www.exploit-db.com/exploits/37439/ -CVE-2015-5355 - http://packetstormsecurity.com/files/132481/GetSimple-CMS-5.7.3.1-Cross-Site-Scripting.html -CVE-2015-5356 - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1059 -CVE-2015-5364 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 -CVE-2015-5364 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5364 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5365 - http://packetstormsecurity.com/files/132418/Zurmo-CRM-3.0.2-Cross-Site-Scripting.html -CVE-2015-5366 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 -CVE-2015-5366 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5366 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5370 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5370 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2015-5372 - http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html -CVE-2015-5374 - https://www.exploit-db.com/exploits/44103/ -CVE-2015-5375 - http://packetstormsecurity.com/files/133674/Open-Xchange-Server-6-OX-AppSuite-Cross-Site-Scripting.html -CVE-2015-5378 - http://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html -CVE-2015-5378 - https://www.elastic.co/community/security -CVE-2015-5379 - http://packetstormsecurity.com/files/132764/Axigen-Cross-Site-Scripting.html -CVE-2015-5381 - https://github.com/roundcube/roundcubemail/commit/b782815dacda55eee6793249b5da1789256206fc -CVE-2015-5399 - https://packetstormsecurity.com/files/132715/phpVibe-Stored-Cross-Site-Scripting.html -CVE-2015-5399 - https://www.exploit-db.com/exploits/37659 -CVE-2015-5452 - http://packetstormsecurity.com/files/132498/Watchguard-XCS-10.0-SQL-Injection-Command-Execution.html -CVE-2015-5452 - http://packetstormsecurity.com/files/133721/Watchguard-XCS-Remote-Command-Execution.html -CVE-2015-5452 - https://www.exploit-db.com/exploits/38346/ -CVE-2015-5453 - http://packetstormsecurity.com/files/132498/Watchguard-XCS-10.0-SQL-Injection-Command-Execution.html -CVE-2015-5453 - http://packetstormsecurity.com/files/133721/Watchguard-XCS-Remote-Command-Execution.html -CVE-2015-5453 - https://www.exploit-db.com/exploits/38346/ -CVE-2015-5454 - http://packetstormsecurity.com/files/132461/Nucleus-CMS-3.65-Cross-Site-Scripting.html -CVE-2015-5454 - https://github.com/NucleusCMS/NucleusCMS/issues/83 -CVE-2015-5455 - http://packetstormsecurity.com/files/132513/X-Cart-4.5.0-Cross-Site-Scripting.html -CVE-2015-5456 - http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html -CVE-2015-5457 - http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html -CVE-2015-5458 - http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html -CVE-2015-5459 - http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html -CVE-2015-5459 - http://seclists.org/fulldisclosure/2015/Jun/104 -CVE-2015-5460 - http://packetstormsecurity.com/files/132552/Snorby-2.6.2-Cross-Site-Scripting.html -CVE-2015-5461 - http://packetstormsecurity.com/files/132553/WordPress-StageShow-5.0.8-Open-Redirect.html -CVE-2015-5461 - http://seclists.org/fulldisclosure/2015/Jul/27 -CVE-2015-5461 - https://wpvulndb.com/vulnerabilities/8073 -CVE-2015-5465 - http://packetstormsecurity.com/files/133399/SiS-Windows-VGA-Display-Manager-Privilege-Escalation.html -CVE-2015-5465 - http://seclists.org/fulldisclosure/2015/Sep/1 -CVE-2015-5465 - https://www.exploit-db.com/exploits/38054/ -CVE-2015-5465 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-003.txt -CVE-2015-5466 - http://packetstormsecurity.com/files/133400/XGI-Windows-VGA-Display-Manager-Privilege-Escalation.html -CVE-2015-5466 - http://seclists.org/fulldisclosure/2015/Sep/2 -CVE-2015-5466 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-004.txt -CVE-2015-5471 - http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html -CVE-2015-5471 - https://wpvulndb.com/vulnerabilities/8071 -CVE-2015-5472 - https://wpvulndb.com/vulnerabilities/8091 -CVE-2015-5477 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718 -CVE-2015-5477 - http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html -CVE-2015-5477 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-5477 - https://kb.isc.org/article/AA-01272 -CVE-2015-5477 - https://kb.isc.org/article/AA-01306 -CVE-2015-5477 - https://www.exploit-db.com/exploits/37721/ -CVE-2015-5477 - https://www.exploit-db.com/exploits/37723/ -CVE-2015-5479 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-5481 - http://packetstormsecurity.com/files/132657/WordPress-GD-bbPress-Attachments-2.1-Cross-Site-Scripting.html -CVE-2015-5481 - http://seclists.org/fulldisclosure/2015/Jul/53 -CVE-2015-5481 - https://security.dxw.com/advisories/reflected-xss-in-gd-bbpress-attachments-allows-an-attacker-to-do-almost-anything-an-admin-can/ -CVE-2015-5481 - https://wpvulndb.com/vulnerabilities/8088 -CVE-2015-5482 - https://packetstormsecurity.com/files/132656/wpgdbbpress-lfi.txt -CVE-2015-5482 - https://security.dxw.com/advisories/local-file-include-vulnerability-in-gd-bbpress-attachments-allows-attackers-to-include-arbitrary-php-files/ -CVE-2015-5482 - https://wpvulndb.com/vulnerabilities/8087 -CVE-2015-5483 - http://packetstormsecurity.com/files/133349/WordPress-Private-Only-3.5.1-CSRF-Cross-Site-Scripting.html -CVE-2015-5483 - http://seclists.org/fulldisclosure/2015/Aug/77 -CVE-2015-5483 - https://security.dxw.com/advisories/csrfxss-vulnerability-in-private-only-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ -CVE-2015-5484 - http://seclists.org/fulldisclosure/2015/Jul/68 -CVE-2015-5484 - https://security.dxw.com/advisories/stored-xss-in-plotly-allows-less-privileged-users-to-insert-arbitrary-javascript-into-posts/ -CVE-2015-5485 - http://packetstormsecurity.com/files/132676/The-Events-Calender-Eventbrite-Tickets-3.9.6-Cross-Site-Scripting.html -CVE-2015-5485 - http://seclists.org/fulldisclosure/2015/Jul/67 -CVE-2015-5485 - https://security.dxw.com/advisories/reflected-xss-in-the-events-calendar-eventbrite-tickets-allows-unauthenticated-users-to-do-almost-anything-an-admin-can/ -CVE-2015-5519 - http://packetstormsecurity.com/files/132584/WideImage-11.02.19-Cross-Site-Scripting.html -CVE-2015-5520 - http://packetstormsecurity.com/files/132583/Orchard-CMS-1.9.0-1.8.2-1.7.3-Cross-Site-Scripting.html -CVE-2015-5520 - http://seclists.org/fulldisclosure/2015/Jul/32 -CVE-2015-5520 - https://www.exploit-db.com/exploits/37533/ -CVE-2015-5521 - http://packetstormsecurity.com/files/132589/Black-Cat-CMS-1.1.2-Cross-Site-Scripting.html -CVE-2015-5522 - http://www.openwall.com/lists/oss-security/2015/06/04/2 -CVE-2015-5523 - http://www.openwall.com/lists/oss-security/2015/06/04/2 -CVE-2015-5524 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2015-5528 - http://packetstormsecurity.com/files/132670/WordPress-Floating-Social-Bar-1.1.5-Cross-Site-Scripting.html -CVE-2015-5528 - https://wpvulndb.com/vulnerabilities/8098 -CVE-2015-5529 - http://packetstormsecurity.com/files/132683/ArticleFR-3.0.6-Cross-Site-Scripting.html -CVE-2015-5529 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5247.php -CVE-2015-5529 - https://www.exploit-db.com/exploits/37596/ -CVE-2015-5530 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5248.php -CVE-2015-5530 - https://www.exploit-db.com/exploits/37596/ -CVE-2015-5531 - http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversal.html -CVE-2015-5531 - http://packetstormsecurity.com/files/133797/ElasticSearch-Path-Traversal-Arbitrary-File-Download.html -CVE-2015-5531 - http://packetstormsecurity.com/files/133964/ElasticSearch-Snapshot-API-Directory-Traversal.html -CVE-2015-5531 - https://www.elastic.co/community/security/ -CVE-2015-5531 - https://www.exploit-db.com/exploits/38383/ -CVE-2015-5532 - http://packetstormsecurity.com/files/132812/WordPress-Paid-Memberships-Pro-1.8.4.2-Cross-Site-Scripting.html -CVE-2015-5532 - https://wpvulndb.com/vulnerabilities/8109 -CVE-2015-5533 - http://packetstormsecurity.com/files/132811/WordPress-Count-Per-Day-3.4-SQL-Injection.html -CVE-2015-5533 - https://wpvulndb.com/vulnerabilities/8110 -CVE-2015-5533 - https://www.exploit-db.com/exploits/37707/ -CVE-2015-5534 - http://packetstormsecurity.com/files/134124/Oxwall-1.7.4-Cross-Site-Request-Forgery.html -CVE-2015-5534 - https://www.exploit-db.com/exploits/38581/ -CVE-2015-5535 - http://packetstormsecurity.com/files/132916/WordPress-qTranslate-2.5.39-Cross-Site-Scripting.html -CVE-2015-5535 - https://wpvulndb.com/vulnerabilities/8120 -CVE-2015-5539 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5539 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5539 - https://www.exploit-db.com/exploits/37855/ -CVE-2015-5540 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5540 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5540 - https://www.exploit-db.com/exploits/37859/ -CVE-2015-5541 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5541 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5544 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5544 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5545 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5545 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5546 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5546 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5547 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5547 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5548 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5548 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5549 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5549 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5550 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5550 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5551 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5551 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5552 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5552 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5553 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5553 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5554 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5554 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5555 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5555 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5556 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5556 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5557 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5557 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5558 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5558 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5559 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5559 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5560 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5560 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5561 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5561 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5562 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5562 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5563 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5563 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5564 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5564 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5565 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5565 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5566 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5566 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5567 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5567 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5568 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5568 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5568 - https://www.exploit-db.com/exploits/38348/ -CVE-2015-5570 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5570 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5571 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5571 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5572 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5572 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5573 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5573 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5574 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5574 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5574 - https://www.exploit-db.com/exploits/39652/ -CVE-2015-5575 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5575 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5576 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5576 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5577 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5577 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5578 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5578 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5579 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5579 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5580 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5580 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5581 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5581 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5582 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5582 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5584 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5584 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5587 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5587 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5588 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-5588 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-5591 - http://packetstormsecurity.com/files/132667/ZenPhoto-1.4.8-XSS-SQL-Injection-Traversal.html -CVE-2015-5592 - http://packetstormsecurity.com/files/132667/ZenPhoto-1.4.8-XSS-SQL-Injection-Traversal.html -CVE-2015-5599 - http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html -CVE-2015-5599 - http://seclists.org/fulldisclosure/2015/Jul/64 -CVE-2015-5600 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-5600 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-5600 - http://www.securityfocus.com/bid/91787 -CVE-2015-5600 - https://security.netapp.com/advisory/ntap-20151106-0001/ -CVE-2015-5602 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-5602 - https://www.exploit-db.com/exploits/37710/ -CVE-2015-5603 - http://packetstormsecurity.com/files/133401/Jira-HipChat-For-Jira-Java-Code-Execution.html -CVE-2015-5603 - https://www.exploit-db.com/exploits/38551/ -CVE-2015-5603 - https://www.exploit-db.com/exploits/38905/ -CVE-2015-5610 - http://www.kb.cert.org/vuls/id/912036 -CVE-2015-5611 - https://www.youtube.com/watch?v=MK0SrxBC1xs&feature=youtu.be -CVE-2015-5612 - http://www.openwall.com/lists/oss-security/2015/07/21/5 -CVE-2015-5612 - https://github.com/octobercms/october/issues/1302 -CVE-2015-5613 - https://github.com/octobercms/october/issues/1302 -CVE-2015-5617 - http://packetstormsecurity.com/files/133082/Enorth-Webpublisher-CMS-SQL-Injection.html -CVE-2015-5618 - http://www.kb.cert.org/vuls/id/360431 -CVE-2015-5619 - http://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html -CVE-2015-5621 - https://sourceforge.net/p/net-snmp/bugs/2615/ -CVE-2015-5621 - https://www.exploit-db.com/exploits/45547/ -CVE-2015-5622 - https://wpvulndb.com/vulnerabilities/8111 -CVE-2015-5623 - https://wpvulndb.com/vulnerabilities/8111 -CVE-2015-5664 - https://www.qnap.com/i/en/support/con_show.php?cid=93 -CVE-2015-5675 - http://packetstormsecurity.com/files/133335/FreeBSD-Security-Advisory-IRET-Handler-Privilege-Escalation.html -CVE-2015-5681 - http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html -CVE-2015-5681 - http://seclists.org/fulldisclosure/2015/Jul/64 -CVE-2015-5687 - http://seclists.org/fulldisclosure/2015/Aug/83 -CVE-2015-5696 - http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html -CVE-2015-5696 - https://www.exploit-db.com/exploits/37739/ -CVE-2015-5697 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-5697 - http://www.ubuntu.com/usn/USN-2732-1 -CVE-2015-5697 - https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16 -CVE-2015-5698 - http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html -CVE-2015-5703 - http://packetstormsecurity.com/files/133672/Guard-2.0.0-rev7-SQL-Injection.html -CVE-2015-5711 - http://www.tibco.com/mk/advisory.jsp -CVE-2015-5712 - http://www.tibco.com/mk/advisory.jsp -CVE-2015-5713 - http://www.tibco.com/mk/advisory.jsp -CVE-2015-5714 - https://github.com/WordPress/WordPress/commit/f72b21af23da6b6d54208e5c1d65ececdaa109c8 -CVE-2015-5714 - https://wpvulndb.com/vulnerabilities/8186 -CVE-2015-5715 - https://wpvulndb.com/vulnerabilities/8188 -CVE-2015-5718 - http://packetstormsecurity.com/files/132968/Websense-Triton-Content-Manager-8.0.0-Build-1165-Buffer-Overflow.html -CVE-2015-5718 - http://seclists.org/fulldisclosure/2015/Aug/8 -CVE-2015-5722 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-5722 - https://kb.isc.org/article/AA-01306 -CVE-2015-5725 - https://github.com/bcit-ci/CodeIgniter/issues/4020 -CVE-2015-5729 - http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html -CVE-2015-5729 - http://seclists.org/fulldisclosure/2015/Dec/79 -CVE-2015-5730 - https://wpvulndb.com/vulnerabilities/8130 -CVE-2015-5732 - https://wpvulndb.com/vulnerabilities/8131 -CVE-2015-5733 - https://wpvulndb.com/vulnerabilities/8132 -CVE-2015-5734 - https://wpvulndb.com/vulnerabilities/8133 -CVE-2015-5735 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html -CVE-2015-5735 - http://seclists.org/fulldisclosure/2015/Sep/0 -CVE-2015-5735 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities -CVE-2015-5736 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html -CVE-2015-5736 - http://seclists.org/fulldisclosure/2015/Sep/0 -CVE-2015-5736 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities -CVE-2015-5736 - https://www.exploit-db.com/exploits/41721/ -CVE-2015-5736 - https://www.exploit-db.com/exploits/41722/ -CVE-2015-5736 - https://www.exploit-db.com/exploits/45149/ -CVE-2015-5737 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html -CVE-2015-5737 - http://seclists.org/fulldisclosure/2015/Sep/0 -CVE-2015-5737 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities -CVE-2015-5742 - http://packetstormsecurity.com/files/133906/Veeam-Backup-And-Replication-6-7-8-Privilege-Escalation.html -CVE-2015-5754 - http://packetstormsecurity.com/files/133550/OS-X-Suid-Privilege-Escalation.html -CVE-2015-5754 - https://www.exploit-db.com/exploits/38136/ -CVE-2015-5764 - http://packetstormsecurity.com/files/133847/Apple-Safari-8.0.8-URI-Spoofing.html -CVE-2015-5764 - http://seclists.org/fulldisclosure/2015/Oct/16 -CVE-2015-5784 - https://www.exploit-db.com/exploits/38137/ -CVE-2015-5889 - http://packetstormsecurity.com/files/133826/issetugid-rsh-libmalloc-OS-X-Local-Root.html -CVE-2015-5889 - http://packetstormsecurity.com/files/134087/Mac-OS-X-10.9.5-10.10.5-rsh-libmalloc-Privilege-Escalation.html -CVE-2015-5889 - https://www.exploit-db.com/exploits/38371/ -CVE-2015-5889 - https://www.exploit-db.com/exploits/38540/ -CVE-2015-5914 - https://trmm.net/Thunderstrike_FAQ -CVE-2015-5917 - https://cxsecurity.com/issue/WLB-2013040082 -CVE-2015-5947 - https://github.com/XiphosResearch/exploits/tree/master/suiteshell -CVE-2015-5947 - https://github.com/salesagility/SuiteCRM/issues/333 -CVE-2015-5948 - https://github.com/XiphosResearch/exploits/tree/master/suiteshell -CVE-2015-5948 - https://github.com/salesagility/SuiteCRM/issues/333 -CVE-2015-5949 - http://packetstormsecurity.com/files/133266/VLC-2.2.1-Arbitrary-Pointer-Dereference.html -CVE-2015-5949 - http://www.openwall.com/lists/oss-security/2015/08/20/8 -CVE-2015-5950 - http://nvidia.custhelp.com/app/answers/detail/a_id/3763/~/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia -CVE-2015-5951 - http://packetstormsecurity.com/files/133003/Thomson-Reuters-FATCA-Arbitrary-File-Upload.html -CVE-2015-5956 - http://packetstormsecurity.com/files/133551/Typo3-CMS-6.2.14-4.5.40-Cross-Site-Scripting.html -CVE-2015-5956 - http://seclists.org/fulldisclosure/2015/Sep/57 -CVE-2015-5958 - http://packetstormsecurity.com/files/132865/phpFileManager-0.9.8-Remote-Command-Execution.html -CVE-2015-5963 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-5964 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-5986 - https://kb.isc.org/article/AA-01306 -CVE-2015-5987 - https://www.kb.cert.org/vuls/id/201168 -CVE-2015-5988 - https://www.kb.cert.org/vuls/id/201168 -CVE-2015-5989 - https://www.kb.cert.org/vuls/id/201168 -CVE-2015-5990 - https://www.kb.cert.org/vuls/id/201168 -CVE-2015-5991 - http://www.kb.cert.org/vuls/id/525276 -CVE-2015-5992 - http://www.kb.cert.org/vuls/id/525276 -CVE-2015-5993 - http://www.kb.cert.org/vuls/id/525276 -CVE-2015-5994 - https://www.kb.cert.org/vuls/id/630872 -CVE-2015-5995 - https://www.kb.cert.org/vuls/id/630872 -CVE-2015-5996 - https://www.exploit-db.com/exploits/45078/ -CVE-2015-5996 - https://www.kb.cert.org/vuls/id/630872 -CVE-2015-5997 - http://www.kb.cert.org/vuls/id/549807 -CVE-2015-5998 - http://www.kb.cert.org/vuls/id/549807 -CVE-2015-5999 - http://packetstormsecurity.com/files/134379/D-Link-DIR-816L-Cross-Site-Request-Forgery.html -CVE-2015-5999 - http://seclists.org/fulldisclosure/2015/Nov/45 -CVE-2015-5999 - https://www.exploit-db.com/exploits/38707/ -CVE-2015-6000 - http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html -CVE-2015-6000 - https://www.exploit-db.com/exploits/38345/ -CVE-2015-6003 - http://www.kb.cert.org/vuls/id/751328 -CVE-2015-6003 - https://www.qnap.com/i/en/support/con_show.php?cid=85 -CVE-2015-6004 - https://www.kb.cert.org/vuls/id/176160 -CVE-2015-6005 - https://www.kb.cert.org/vuls/id/176160 -CVE-2015-6006 - http://www.kb.cert.org/vuls/id/675052 -CVE-2015-6007 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-6008 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-6008 - https://www.exploit-db.com/exploits/38292/ -CVE-2015-6009 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-6009 - https://www.exploit-db.com/exploits/38292/ -CVE-2015-6010 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-6011 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-6012 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-6013 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-6013 - https://www.kb.cert.org/vuls/id/916896 -CVE-2015-6014 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-6014 - https://www.kb.cert.org/vuls/id/916896 -CVE-2015-6015 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-6015 - https://www.kb.cert.org/vuls/id/916896 -CVE-2015-6016 - https://www.kb.cert.org/vuls/id/870744 -CVE-2015-6016 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R -CVE-2015-6017 - https://www.kb.cert.org/vuls/id/870744 -CVE-2015-6017 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R -CVE-2015-6018 - https://www.exploit-db.com/exploits/38455/ -CVE-2015-6018 - https://www.kb.cert.org/vuls/id/870744 -CVE-2015-6018 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R -CVE-2015-6019 - https://www.kb.cert.org/vuls/id/870744 -CVE-2015-6019 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R -CVE-2015-6020 - https://www.kb.cert.org/vuls/id/870744 -CVE-2015-6020 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R -CVE-2015-6023 - http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html -CVE-2015-6023 - http://seclists.org/fulldisclosure/2016/May/13 -CVE-2015-6023 - http://seclists.org/fulldisclosure/2016/May/18 -CVE-2015-6023 - https://www.exploit-db.com/exploits/39762/ -CVE-2015-6024 - http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html -CVE-2015-6024 - http://seclists.org/fulldisclosure/2016/May/13 -CVE-2015-6024 - http://seclists.org/fulldisclosure/2016/May/18 -CVE-2015-6024 - https://www.exploit-db.com/exploits/39762/ -CVE-2015-6029 - http://www.kb.cert.org/vuls/id/842252 -CVE-2015-6030 - http://www.kb.cert.org/vuls/id/842252 -CVE-2015-6032 - http://www.kb.cert.org/vuls/id/573848 -CVE-2015-6033 - http://www.kb.cert.org/vuls/id/573848 -CVE-2015-6086 - https://www.exploit-db.com/exploits/39698/ -CVE-2015-6098 - http://packetstormsecurity.com/files/134521/Microsoft-Windows-Ndis.sys-Buffer-Overflow.html -CVE-2015-6098 - https://www.exploit-db.com/exploits/38793/ -CVE-2015-6099 - http://packetstormsecurity.com/files/134314/Microsoft-.NET-Framework-XSS-Privilege-Escalation.html -CVE-2015-6100 - https://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 -CVE-2015-6100 - https://www.exploit-db.com/exploits/38796/ -CVE-2015-6101 - https://www.exploit-db.com/exploits/38795/ -CVE-2015-6102 - http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html -CVE-2015-6102 - https://www.exploit-db.com/exploits/38794/ -CVE-2015-6103 - http://packetstormsecurity.com/files/134397/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html -CVE-2015-6103 - https://www.exploit-db.com/exploits/38714/ -CVE-2015-6104 - http://packetstormsecurity.com/files/134398/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html -CVE-2015-6104 - https://www.exploit-db.com/exploits/38713/ -CVE-2015-6127 - https://www.exploit-db.com/exploits/38912/ -CVE-2015-6128 - https://www.exploit-db.com/exploits/38918/ -CVE-2015-6131 - https://www.exploit-db.com/exploits/38911/ -CVE-2015-6132 - https://www.exploit-db.com/exploits/38968/ -CVE-2015-6152 - https://www.exploit-db.com/exploits/38972/ -CVE-2015-6168 - http://seclists.org/fulldisclosure/2016/Dec/4 -CVE-2015-6168 - https://www.exploit-db.com/exploits/40878/ -CVE-2015-6238 - https://wpvulndb.com/vulnerabilities/8159 -CVE-2015-6238 - https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/ -CVE-2015-6240 - https://bugzilla.redhat.com/show_bug.cgi?id=1243468 -CVE-2015-6241 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6242 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6243 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6243 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6244 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6244 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6245 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6245 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6246 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6246 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6247 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6248 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6248 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6249 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-6250 - https://github.com/claviska/simple-php-captcha/issues/16 -CVE-2015-6305 - http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html -CVE-2015-6305 - https://www.exploit-db.com/exploits/38289/ -CVE-2015-6306 - http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html -CVE-2015-6306 - https://www.exploit-db.com/exploits/38303/ -CVE-2015-6306 - https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html -CVE-2015-6318 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151007-vcs -CVE-2015-6352 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-ucd -CVE-2015-6357 - http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Certificate-Validation.html -CVE-2015-6357 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fmc -CVE-2015-6357 - http://wadofstuff.blogspot.com.au/2015/11/cve-2015-6357-firepwner-exploit-for.html -CVE-2015-6361 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-xb3 -CVE-2015-6364 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-vds -CVE-2015-6396 - https://www.exploit-db.com/exploits/45986/ -CVE-2015-6401 - https://www.exploit-db.com/exploits/39904/ -CVE-2015-6402 - https://www.exploit-db.com/exploits/39904/ -CVE-2015-6409 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab -CVE-2015-6420 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization -CVE-2015-6420 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-6420 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-6420 - https://www.kb.cert.org/vuls/id/581311 -CVE-2015-6435 - http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution.html -CVE-2015-6472 - http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html -CVE-2015-6472 - http://seclists.org/fulldisclosure/2016/Mar/4 -CVE-2015-6473 - http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html -CVE-2015-6473 - http://seclists.org/fulldisclosure/2016/Mar/4 -CVE-2015-6477 - http://packetstormsecurity.com/files/135068/Nordex-Control-2-NC2-SCADA-16-Cross-Site-Scripting.html -CVE-2015-6477 - http://seclists.org/fulldisclosure/2015/Dec/117 -CVE-2015-6497 - http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html -CVE-2015-6497 - http://packetstormsecurity.com/files/133544/Magento-1.9.2-File-Inclusion.html -CVE-2015-6497 - http://seclists.org/fulldisclosure/2015/Sep/48 -CVE-2015-6498 - http://packetstormsecurity.com/files/134191/Alcatel-Lucent-Home-Device-Manager-Spoofing.html -CVE-2015-6498 - http://seclists.org/fulldisclosure/2015/Nov/6 -CVE-2015-6500 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt -CVE-2015-6507 - http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html -CVE-2015-6507 - http://seclists.org/fulldisclosure/2015/Sep/109 -CVE-2015-6512 - http://packetstormsecurity.com/files/132673/FreiChat-9.6-SQL-Injection.html -CVE-2015-6512 - https://www.exploit-db.com/exploits/37592/ -CVE-2015-6513 - http://packetstormsecurity.com/files/132658/Joomla-J2Store-3.1.6-SQL-Injection.html -CVE-2015-6516 - http://packetstormsecurity.com/files/132672/sysPass-1.0.9-SQL-Injection.html -CVE-2015-6516 - https://www.exploit-db.com/exploits/37610/ -CVE-2015-6516 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-031.txt -CVE-2015-6517 - http://packetstormsecurity.com/files/132580/phpLiteAdmin-1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-6518 - http://packetstormsecurity.com/files/132580/phpLiteAdmin-1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-6519 - http://packetstormsecurity.com/files/132648/Arab-Portal-3-SQL-Injection.html -CVE-2015-6519 - https://www.exploit-db.com/exploits/37594/ -CVE-2015-6519 - https://youtu.be/5nFblYE90Vk -CVE-2015-6522 - https://wpvulndb.com/vulnerabilities/8140 -CVE-2015-6522 - https://www.exploit-db.com/exploits/37824/ -CVE-2015-6523 - http://seclists.org/fulldisclosure/2015/Jul/104 -CVE-2015-6523 - https://wpvulndb.com/vulnerabilities/8108 -CVE-2015-6526 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6527 - https://hackerone.com/reports/104017 -CVE-2015-6528 - http://packetstormsecurity.com/files/133059/Coppermine-Photo-Gallery-1.5.36-Cross-Site-Scripting.html -CVE-2015-6529 - http://packetstormsecurity.com/files/133055/phpipam-1.1.010-Cross-Site-Scripting.html -CVE-2015-6530 - http://packetstormsecurity.com/files/133247/OpenText-Secure-MFT-2014-R2-SP4-Cross-Site-Scripting.html -CVE-2015-6530 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-041.txt -CVE-2015-6531 - https://www.tenable.com/security/research/tra-2015-02 -CVE-2015-6535 - http://packetstormsecurity.com/files/133340/WordPress-YouTube-Embed-3.3.2-Cross-Site-Scripting.html -CVE-2015-6535 - https://wpvulndb.com/vulnerabilities/8163 -CVE-2015-6537 - https://www.kb.cert.org/vuls/id/630239 -CVE-2015-6538 - https://www.kb.cert.org/vuls/id/630239 -CVE-2015-6540 - http://packetstormsecurity.com/files/134767/Intellect-Core-Cross-Site-Scripting.html -CVE-2015-6541 - http://seclists.org/fulldisclosure/2016/Feb/121 -CVE-2015-6541 - https://www.exploit-db.com/exploits/39500/ -CVE-2015-6545 - http://packetstormsecurity.com/files/133404/Cerb-7.0.3-Cross-Site-Request-Forgery.html -CVE-2015-6545 - https://github.com/wgm/cerb/commit/12de87ff9961a4f3ad2946c8f47dd0c260607144 -CVE-2015-6545 - https://www.exploit-db.com/exploits/38074/ -CVE-2015-6563 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-6563 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-6563 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6564 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-6564 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-6564 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6565 - http://openwall.com/lists/oss-security/2017/01/26/2 -CVE-2015-6565 - https://www.exploit-db.com/exploits/41173/ -CVE-2015-6567 - http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html -CVE-2015-6567 - https://www.exploit-db.com/exploits/38000/ -CVE-2015-6567 - https://www.exploit-db.com/exploits/40004/ -CVE-2015-6568 - http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html -CVE-2015-6568 - https://www.exploit-db.com/exploits/38000/ -CVE-2015-6568 - https://www.exploit-db.com/exploits/40004/ -CVE-2015-6569 - https://floodlight.atlassian.net/wiki/spaces/floodlightcontroller/pages/24805419/Floodlight+v1.2 -CVE-2015-6574 - https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf -CVE-2015-6575 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ -CVE-2015-6576 - http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html -CVE-2015-6584 - http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html -CVE-2015-6584 - http://seclists.org/fulldisclosure/2015/Sep/37 -CVE-2015-6584 - https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/ -CVE-2015-6585 - https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf -CVE-2015-6588 - http://packetstormsecurity.com/files/134529/MODX-2.3.5-Cross-Site-Scripting.html -CVE-2015-6589 - http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html -CVE-2015-6589 - https://www.exploit-db.com/exploits/38351/ -CVE-2015-6591 - http://packetstormsecurity.com/files/134081/articleFR-3.0.7-Arbitrary-File-Read.html -CVE-2015-6602 - https://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/ -CVE-2015-6602 - https://support.silentcircle.com/customer/en/portal/articles/2145864-privatos-1-1-12-release-notes -CVE-2015-6602 - https://threatpost.com/stagefright-2-0-vulnerabilities-affect-1-billion-android-devices/114863/ -CVE-2015-6639 - http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html -CVE-2015-6639 - http://seclists.org/fulldisclosure/2023/May/26 -CVE-2015-6639 - https://www.exploit-db.com/exploits/39757/ -CVE-2015-6647 - http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html -CVE-2015-6647 - http://seclists.org/fulldisclosure/2023/May/26 -CVE-2015-6655 - http://packetstormsecurity.com/files/133299/Pligg-CMS-2.0.2-Cross-Site-Request-Forgery.html -CVE-2015-6655 - https://www.exploit-db.com/exploits/37955/ -CVE-2015-6662 - http://packetstormsecurity.com/files/134507/SAP-NetWeaver-7.4-XXE-Injection.html -CVE-2015-6662 - http://seclists.org/fulldisclosure/2015/Nov/92 -CVE-2015-6662 - https://erpscan.io/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/ -CVE-2015-6663 - http://packetstormsecurity.com/files/134508/SAP-Afaria-7-Cross-Site-Scripting.html -CVE-2015-6664 - http://packetstormsecurity.com/files/134509/SAP-Mobile-Platform-2.3-XXE-Injection.html -CVE-2015-6664 - http://seclists.org/fulldisclosure/2015/Nov/96 -CVE-2015-6664 - https://erpscan.io/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/ -CVE-2015-6668 - https://wpvulndb.com/vulnerabilities/8167 -CVE-2015-6673 - https://bugzilla.redhat.com/show_bug.cgi?id=1251749 -CVE-2015-6676 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-6676 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-6677 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-6677 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-6678 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-6678 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-6679 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-6679 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-6682 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-6682 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-6734 - https://phabricator.wikimedia.org/T108198 -CVE-2015-6742 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-6743 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-6744 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-6745 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-6746 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-6747 - http://seclists.org/fulldisclosure/2015/Jul/120 -CVE-2015-6748 - https://hibernate.atlassian.net/browse/HV-1012 -CVE-2015-6750 - http://packetstormsecurity.com/files/133248/Ricoh-FTP-Server-1.1.0.6-Buffer-Overflow.html -CVE-2015-6763 - http://packetstormsecurity.com/files/134482/Google-Chrome-Integer-Overflow.html -CVE-2015-6763 - https://www.exploit-db.com/exploits/38763/ -CVE-2015-6765 - https://codereview.chromium.org/1463463003/ -CVE-2015-6769 - https://codereview.chromium.org/1362203002/ -CVE-2015-6787 - https://www.exploit-db.com/exploits/39162/ -CVE-2015-6787 - https://www.exploit-db.com/exploits/39163/ -CVE-2015-6787 - https://www.exploit-db.com/exploits/39165/ -CVE-2015-6805 - https://wpvulndb.com/vulnerabilities/8154 -CVE-2015-6805 - https://www.exploit-db.com/exploits/37907/ -CVE-2015-6809 - https://github.com/bedita/bedita/issues/623 -CVE-2015-6809 - https://www.exploit-db.com/exploits/38051/ -CVE-2015-6810 - https://www.exploit-db.com/exploits/37989/ -CVE-2015-6811 - http://packetstormsecurity.com/files/133378/Cyberoam-CR500iNG-XP-10.6.2-MR-1-Blind-SQL-Injection.html -CVE-2015-6811 - https://www.exploit-db.com/exploits/38034/ -CVE-2015-6818 - http://ffmpeg.org/security.html -CVE-2015-6818 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-6819 - http://ffmpeg.org/security.html -CVE-2015-6820 - http://ffmpeg.org/security.html -CVE-2015-6820 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-6821 - http://ffmpeg.org/security.html -CVE-2015-6822 - http://ffmpeg.org/security.html -CVE-2015-6823 - http://ffmpeg.org/security.html -CVE-2015-6824 - http://ffmpeg.org/security.html -CVE-2015-6824 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-6825 - http://ffmpeg.org/security.html -CVE-2015-6826 - http://ffmpeg.org/security.html -CVE-2015-6826 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-6827 - http://packetstormsecurity.com/files/133498/Autoexchanger-5.1.0-Cross-Site-Request-Forgery.html -CVE-2015-6827 - https://www.exploit-db.com/exploits/38119/ -CVE-2015-6828 - https://wpvulndb.com/vulnerabilities/8179 -CVE-2015-6829 - https://wpvulndb.com/vulnerabilities/8178 -CVE-2015-6831 - https://bugs.php.net/bug.php?id=70168 -CVE-2015-6831 - https://bugs.php.net/bug.php?id=70169 -CVE-2015-6831 - https://hackerone.com/reports/104018 -CVE-2015-6832 - https://bugs.php.net/bug.php?id=70068 -CVE-2015-6832 - https://hackerone.com/reports/104016 -CVE-2015-6833 - https://hackerone.com/reports/104019 -CVE-2015-6834 - https://bugs.php.net/bug.php?id=70172 -CVE-2015-6834 - https://bugs.php.net/bug.php?id=70365 -CVE-2015-6834 - https://bugs.php.net/bug.php?id=70366 -CVE-2015-6834 - https://hackerone.com/reports/103995 -CVE-2015-6834 - https://hackerone.com/reports/103996 -CVE-2015-6834 - https://hackerone.com/reports/103997 -CVE-2015-6835 - https://bugs.php.net/bug.php?id=70219 -CVE-2015-6835 - https://hackerone.com/reports/103998 -CVE-2015-6836 - https://hackerone.com/reports/104010 -CVE-2015-6839 - https://www.youtube.com/watch?v=CTOCspLn6Zk -CVE-2015-6843 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html -CVE-2015-6844 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html -CVE-2015-6845 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html -CVE-2015-6846 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html -CVE-2015-6847 - http://packetstormsecurity.com/files/134420/EMC-VPLEX-Sensitive-Information-Exposure.html -CVE-2015-6850 - http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html -CVE-2015-6851 - http://packetstormsecurity.com/files/135013/RSA-SecurID-Web-Agent-Authentication-Bypass.html -CVE-2015-6852 - http://packetstormsecurity.com/files/135044/EMC-Secure-Remote-Services-Virtual-Edition-Path-Traversal.html -CVE-2015-6856 - http://packetstormsecurity.com/files/134987/Dell-Authentication-Driver-Uncontrolled-Write.html -CVE-2015-6856 - http://seclists.org/fulldisclosure/2015/Dec/81 -CVE-2015-6856 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-008.txt -CVE-2015-6908 - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240 -CVE-2015-6908 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6908 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-6909 - http://packetstormsecurity.com/files/133520/Synology-Download-Station-3.5-2956-3.5-2962-Cross-Site-Scripting.html -CVE-2015-6909 - https://www.securify.nl/advisory/SFY20150809/multiple_cross_site_scripting_vulnerabilities_in_synology_download_station.html -CVE-2015-6910 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html -CVE-2015-6910 - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html -CVE-2015-6911 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html -CVE-2015-6911 - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html -CVE-2015-6912 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html -CVE-2015-6912 - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html -CVE-2015-6913 - http://packetstormsecurity.com/files/133520/Synology-Download-Station-3.5-2956-3.5-2962-Cross-Site-Scripting.html -CVE-2015-6913 - https://www.securify.nl/advisory/SFY20150809/multiple_cross_site_scripting_vulnerabilities_in_synology_download_station.html -CVE-2015-6914 - http://packetstormsecurity.com/files/133251/SiteFactory-CMS-5.5.9-Directory-Traversal.html -CVE-2015-6915 - http://packetstormsecurity.com/files/133297/ResourceSpace-CMS-7.3.7009-SQL-Injection.html -CVE-2015-6919 - http://packetstormsecurity.com/files/133375/Joomla-GoogleSearch-CSE-3.0.2-Cross-Site-Scripting.html -CVE-2015-6920 - http://packetstormsecurity.com/files/133371/WordPress-sourceAFRICA-0.1.3-Cross-Site-Scripting.html -CVE-2015-6920 - https://wpvulndb.com/vulnerabilities/8169 -CVE-2015-6922 - http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html -CVE-2015-6922 - https://www.exploit-db.com/exploits/38351/ -CVE-2015-6923 - http://packetstormsecurity.com/files/133620/VBox-Satellite-Express-Arbitrary-Write-Privilege-Escalation.html -CVE-2015-6923 - http://seclists.org/fulldisclosure/2015/Sep/72 -CVE-2015-6923 - https://www.exploit-db.com/exploits/38225/ -CVE-2015-6923 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-005.txt -CVE-2015-6925 - https://github.com/IAIK/wolfSSL-DoS -CVE-2015-6928 - http://packetstormsecurity.com/files/133535/CubeCart-6.0.6-Administrative-Bypass.html -CVE-2015-6928 - http://seclists.org/fulldisclosure/2015/Sep/40 -CVE-2015-6929 - http://packetstormsecurity.com/files/133538/Nokia-Solutions-And-Networks-Cross-Site-Scripting.html -CVE-2015-6929 - http://seclists.org/fulldisclosure/2015/Sep/42 -CVE-2015-6934 - http://www.vmware.com/security/advisories/VMSA-2015-0009.html -CVE-2015-6937 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-6937 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-6939 - http://packetstormsecurity.com/files/133907/Joomla-CMS-3.4.3-Cross-Site-Scripting.html -CVE-2015-6940 - http://packetstormsecurity.com/files/133601/Pentaho-5.2.x-BA-Suite-PDI-Information-Disclosure.html -CVE-2015-6943 - http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html -CVE-2015-6943 - http://seclists.org/fulldisclosure/2015/Sep/10 -CVE-2015-6944 - http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-6945 - http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2015-6959 - https://www.youtube.com/watch?v=-WXWqNBEQQc -CVE-2015-6962 - http://packetstormsecurity.com/files/133610/Farol-SQL-Injection.html -CVE-2015-6962 - https://www.exploit-db.com/exploits/38213/ -CVE-2015-6965 - http://packetstormsecurity.com/files/133463/WordPress-Contact-Form-Generator-2.0.1-CSRF.html -CVE-2015-6965 - https://wpvulndb.com/vulnerabilities/8176 -CVE-2015-6965 - https://www.exploit-db.com/exploits/38086/ -CVE-2015-6966 - http://seclists.org/fulldisclosure/2015/Sep/4 -CVE-2015-6967 - http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html -CVE-2015-6967 - http://seclists.org/fulldisclosure/2015/Sep/5 -CVE-2015-6968 - http://packetstormsecurity.com/files/133426/Serendipity-2.0.1-Shell-Upload.html -CVE-2015-6968 - http://seclists.org/fulldisclosure/2015/Sep/6 -CVE-2015-6969 - http://packetstormsecurity.com/files/133427/Serendipity-2.0.1-Cross-Site-Scripting.html -CVE-2015-6969 - http://seclists.org/fulldisclosure/2015/Sep/9 -CVE-2015-6970 - https://www.exploit-db.com/exploits/38369/ -CVE-2015-6971 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-018/?fid=7172 -CVE-2015-6972 - http://packetstormsecurity.com/files/133558/Openfire-3.10.2-Cross-Site-Scripting.html -CVE-2015-6972 - https://www.exploit-db.com/exploits/38191/ -CVE-2015-6973 - http://packetstormsecurity.com/files/133554/Openfire-3.10.2-Cross-Site-Request-Forgery.html -CVE-2015-6973 - https://www.exploit-db.com/exploits/38192/ -CVE-2015-7007 - http://packetstormsecurity.com/files/134072/Safari-User-Assisted-Applescript-Exec-Attack.html -CVE-2015-7007 - https://www.exploit-db.com/exploits/38535/ -CVE-2015-7039 - https://www.exploit-db.com/exploits/38917/ -CVE-2015-7047 - https://www.exploit-db.com/exploits/39371/ -CVE-2015-7047 - https://www.exploit-db.com/exploits/39373/ -CVE-2015-7047 - https://www.exploit-db.com/exploits/39374/ -CVE-2015-7047 - https://www.exploit-db.com/exploits/39375/ -CVE-2015-7077 - https://www.exploit-db.com/exploits/39368/ -CVE-2015-7078 - https://www.exploit-db.com/exploits/39370/ -CVE-2015-7084 - https://www.exploit-db.com/exploits/39357/ -CVE-2015-7084 - https://www.exploit-db.com/exploits/39366/ -CVE-2015-7106 - https://www.exploit-db.com/exploits/39369/ -CVE-2015-7108 - https://www.exploit-db.com/exploits/39372/ -CVE-2015-7110 - https://www.exploit-db.com/exploits/39365/ -CVE-2015-7174 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7174 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7175 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7175 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7176 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7176 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7177 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7177 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7178 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7178 - https://bugzilla.mozilla.org/show_bug.cgi?id=1189860 -CVE-2015-7179 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7179 - https://bugzilla.mozilla.org/show_bug.cgi?id=1190526 -CVE-2015-7180 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7180 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7181 - http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html -CVE-2015-7181 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-7181 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-7181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-7181 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7181 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7181 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-7181 - http://www.securityfocus.com/bid/91787 -CVE-2015-7181 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7182 - http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html -CVE-2015-7182 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-7182 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-7182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-7182 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7182 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7182 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-7182 - http://www.securityfocus.com/bid/91787 -CVE-2015-7182 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7183 - http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html -CVE-2015-7183 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-7183 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-7183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-7183 - http://www.securityfocus.com/bid/91787 -CVE-2015-7183 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7184 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7184 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208339 -CVE-2015-7185 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7185 - https://bugzilla.mozilla.org/show_bug.cgi?id=1149000 -CVE-2015-7186 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7186 - https://bugzilla.mozilla.org/show_bug.cgi?id=1193027 -CVE-2015-7187 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7188 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7188 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7188 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7188 - https://bugzilla.mozilla.org/show_bug.cgi?id=1199430 -CVE-2015-7189 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7189 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7189 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7190 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7190 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208520 -CVE-2015-7191 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7192 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7193 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7193 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7193 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7194 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7194 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7194 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7194 - https://bugzilla.mozilla.org/show_bug.cgi?id=1211262 -CVE-2015-7195 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7196 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7196 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7197 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7197 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7197 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7198 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7198 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7198 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7199 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7199 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7199 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7200 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7200 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7200 - http://www.ubuntu.com/usn/USN-2819-1 -CVE-2015-7201 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7201 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7201 - https://bugzilla.mozilla.org/show_bug.cgi?id=1203135 -CVE-2015-7205 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7205 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1220493 -CVE-2015-7207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1185256 -CVE-2015-7207 - https://github.com/w3c/resource-timing/issues/29 -CVE-2015-7210 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7211 - https://bugzilla.mozilla.org/show_bug.cgi?id=1221444 -CVE-2015-7212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7213 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7213 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7213 - https://bugzilla.mozilla.org/show_bug.cgi?id=1206211 -CVE-2015-7214 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7214 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7214 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228950 -CVE-2015-7217 - https://bugzilla.mozilla.org/show_bug.cgi?id=1203078 -CVE-2015-7218 - https://bugzilla.mozilla.org/show_bug.cgi?id=1194818 -CVE-2015-7219 - https://bugzilla.mozilla.org/show_bug.cgi?id=1194820 -CVE-2015-7222 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7222 - https://bugzilla.mozilla.org/show_bug.cgi?id=1216748 -CVE-2015-7235 - https://wpvulndb.com/vulnerabilities/8193 -CVE-2015-7235 - https://www.exploit-db.com/exploits/38187/ -CVE-2015-7236 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-7236 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7239 - http://packetstormsecurity.com/files/134801/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html -CVE-2015-7239 - http://seclists.org/fulldisclosure/2015/Dec/66 -CVE-2015-7239 - https://erpscan.io/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/ -CVE-2015-7241 - http://packetstormsecurity.com/files/133627/SAP-Netweaver-XML-External-Entity-Injection.html -CVE-2015-7241 - https://www.exploit-db.com/exploits/38261/ -CVE-2015-7242 - http://ds-develop.de/advisories/advisory-2016-01-07-1-avm.txt -CVE-2015-7242 - http://packetstormsecurity.com/files/135168/AVM-FRITZ-OS-HTML-Injection.html -CVE-2015-7243 - http://packetstormsecurity.com/files/133377/Boxoft-WAV-To-MP3-Converter-Buffer-Overflow.html -CVE-2015-7243 - http://packetstormsecurity.com/files/137277/Boxoft-Wav-To-MP3-Converter-1.0-Buffer-Overflow.html -CVE-2015-7243 - https://www.exploit-db.com/exploits/38035/ -CVE-2015-7243 - https://www.exploit-db.com/exploits/44971/ -CVE-2015-7244 - http://www.kb.cert.org/vuls/id/316888 -CVE-2015-7245 - http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html -CVE-2015-7245 - https://www.exploit-db.com/exploits/39409/ -CVE-2015-7246 - http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html -CVE-2015-7246 - https://www.exploit-db.com/exploits/39409/ -CVE-2015-7247 - http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html -CVE-2015-7247 - https://www.exploit-db.com/exploits/39409/ -CVE-2015-7248 - https://www.exploit-db.com/exploits/38773/ -CVE-2015-7249 - https://www.exploit-db.com/exploits/38773/ -CVE-2015-7250 - https://www.exploit-db.com/exploits/38773/ -CVE-2015-7251 - https://www.exploit-db.com/exploits/38773/ -CVE-2015-7252 - https://www.exploit-db.com/exploits/38773/ -CVE-2015-7253 - http://www.kb.cert.org/vuls/id/866432 -CVE-2015-7254 - https://github.com/0xAdrian/scripts/blob/master/2015_7254_exploit.py -CVE-2015-7254 - https://www.exploit-db.com/exploits/45991/ -CVE-2015-7257 - http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html -CVE-2015-7257 - http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html -CVE-2015-7257 - https://www.exploit-db.com/exploits/38772/ -CVE-2015-7258 - http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html -CVE-2015-7258 - http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html -CVE-2015-7258 - https://www.exploit-db.com/exploits/38772/ -CVE-2015-7259 - http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html -CVE-2015-7259 - http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html -CVE-2015-7259 - https://www.exploit-db.com/exploits/38772/ -CVE-2015-7270 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -CVE-2015-7271 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -CVE-2015-7272 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -CVE-2015-7273 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -CVE-2015-7274 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -CVE-2015-7274 - http://www.securityfocus.com/bid/97545 -CVE-2015-7274 - http://www.securityfocus.com/bid/97546 -CVE-2015-7275 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -CVE-2015-7285 - http://www.kb.cert.org/vuls/id/428280 -CVE-2015-7285 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL -CVE-2015-7286 - http://www.kb.cert.org/vuls/id/428280 -CVE-2015-7286 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL -CVE-2015-7287 - http://www.kb.cert.org/vuls/id/428280 -CVE-2015-7287 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL -CVE-2015-7288 - http://www.kb.cert.org/vuls/id/428280 -CVE-2015-7288 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL -CVE-2015-7289 - http://www.kb.cert.org/vuls/id/419568 -CVE-2015-7290 - http://www.kb.cert.org/vuls/id/419568 -CVE-2015-7291 - http://www.kb.cert.org/vuls/id/419568 -CVE-2015-7292 - https://marcograss.github.io/security/android/cve/2016/01/15/cve-2015-7292-amazon-kernel-stack-buffer-overflow.html -CVE-2015-7293 - http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html -CVE-2015-7293 - https://www.exploit-db.com/exploits/38411/ -CVE-2015-7296 - http://www.kb.cert.org/vuls/id/906576 -CVE-2015-7297 - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html -CVE-2015-7297 - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html -CVE-2015-7297 - https://www.exploit-db.com/exploits/38797/ -CVE-2015-7297 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ -CVE-2015-7299 - http://packetstormsecurity.com/files/133953/K2-SmartForms-BlackPearl-SQL-Injection.html -CVE-2015-7309 - http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html -CVE-2015-7309 - http://seclists.org/fulldisclosure/2015/Aug/66 -CVE-2015-7309 - https://www.exploit-db.com/exploits/38196/ -CVE-2015-7319 - http://packetstormsecurity.com/files/133757/WordPress-Appointment-Booking-Calendar-1.1.7-SQL-Injection.html -CVE-2015-7319 - https://wpvulndb.com/vulnerabilities/8199 -CVE-2015-7320 - http://packetstormsecurity.com/files/133743/WordPress-Appointment-Booking-Calendar-1.1.7-XSS.html -CVE-2015-7320 - https://wpvulndb.com/vulnerabilities/8199 -CVE-2015-7322 - https://profundis-labs.com/advisories/CVE-2015-7322.txt -CVE-2015-7323 - http://seclists.org/fulldisclosure/2015/Sep/98 -CVE-2015-7323 - https://packetstormsecurity.com/files/133711/Junos-Pulse-Secure-Meeting-8.0.5-Access-Bypass.html -CVE-2015-7323 - https://profundis-labs.com/advisories/CVE-2015-7323.txt -CVE-2015-7324 - http://seclists.org/fulldisclosure/2015/Oct/11 -CVE-2015-7324 - https://www.davidsopas.com/komento-joomla-component-persistent-xss/ -CVE-2015-7326 - http://packetstormsecurity.com/files/134178/Milton-Webdav-2.7.0.1-XXE-Injection.html -CVE-2015-7327 - https://bugzilla.mozilla.org/show_bug.cgi?id=1153672 -CVE-2015-7327 - https://bugzilla.mozilla.org/show_bug.cgi?id=1167489 -CVE-2015-7346 - http://packetstormsecurity.com/files/132286/ZCMS-1.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-7346 - https://www.exploit-db.com/exploits/37272/ -CVE-2015-7347 - http://packetstormsecurity.com/files/132286/ZCMS-1.1-Cross-Site-Scripting-SQL-Injection.html -CVE-2015-7347 - https://www.exploit-db.com/exploits/37272/ -CVE-2015-7348 - http://packetstormsecurity.com/files/134391/zTree-3.5.19.1-Cross-Site-Scripting.html -CVE-2015-7348 - http://seclists.org/fulldisclosure/2015/Nov/80 -CVE-2015-7357 - http://packetstormsecurity.com/files/133867/WordPress-U-Design-Theme-2.7.9-Cross-Site-Scripting.html -CVE-2015-7357 - https://wpvulndb.com/vulnerabilities/8177 -CVE-2015-7358 - http://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.html -CVE-2015-7358 - https://www.exploit-db.com/exploits/38403/ -CVE-2015-7359 - http://packetstormsecurity.com/files/133877/Truecrypt-7-Privilege-Escalation.html -CVE-2015-7360 - http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html -CVE-2015-7361 - http://fortiguard.com/advisory/zebos-routing-remote-shell-service-enabled -CVE-2015-7362 - http://fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privilege-escalation-vulnerability -CVE-2015-7364 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7364 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7365 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7365 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7366 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7366 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7367 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7367 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7368 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7368 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7369 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7369 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7370 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7370 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7371 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7371 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7372 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7372 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7373 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -CVE-2015-7373 - http://www.revive-adserver.com/security/revive-sa-2015-001 -CVE-2015-7377 - http://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html -CVE-2015-7377 - https://wpvulndb.com/vulnerabilities/8212 -CVE-2015-7378 - http://packetstormsecurity.com/files/136607/Panda-Security-URL-Filtering-Privilege-Escalation.html -CVE-2015-7378 - https://www.exploit-db.com/exploits/39670/ -CVE-2015-7381 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-7382 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-7383 - http://www.kb.cert.org/vuls/id/374092 -CVE-2015-7384 - https://bugzilla.redhat.com/show_bug.cgi?id=1268791 -CVE-2015-7385 - http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html -CVE-2015-7386 - http://packetstormsecurity.com/files/133494/WordPress-Easy-Media-Gallery-1.3.47-Cross-Site-Scripting.html -CVE-2015-7386 - https://wpvulndb.com/vulnerabilities/8181 -CVE-2015-7387 - http://packetstormsecurity.com/files/133581/ManageEngine-EventLog-Analyzer-10.6-Build-10060-SQL-Query-Execution.html -CVE-2015-7387 - http://packetstormsecurity.com/files/133747/ManageEngine-EventLog-Analyzer-Remote-Code-Execution.html -CVE-2015-7387 - http://seclists.org/fulldisclosure/2015/Sep/59 -CVE-2015-7387 - https://www.exploit-db.com/exploits/38173/ -CVE-2015-7387 - https://www.exploit-db.com/exploits/38352/ -CVE-2015-7392 - http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html -CVE-2015-7450 - https://www.exploit-db.com/exploits/41613/ -CVE-2015-7474 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 -CVE-2015-7484 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 -CVE-2015-7485 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 -CVE-2015-7486 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 -CVE-2015-7497 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7498 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7499 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7500 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-7500 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7501 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-7501 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-7501 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-7501 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2015-7505 - http://seclists.org/fulldisclosure/2015/Dec/70 -CVE-2015-7506 - http://seclists.org/fulldisclosure/2015/Dec/70 -CVE-2015-7507 - http://seclists.org/fulldisclosure/2015/Dec/73 -CVE-2015-7508 - http://seclists.org/fulldisclosure/2015/Dec/73 -CVE-2015-7510 - https://github.com/systemd/systemd/issues/2002 -CVE-2015-7511 - http://www.securityfocus.com/bid/83253 -CVE-2015-7512 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7513 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-7513 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-7515 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2015-7515 - https://www.exploit-db.com/exploits/39544/ -CVE-2015-7517 - https://wpvulndb.com/vulnerabilities/8345 -CVE-2015-7521 - http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html -CVE-2015-7527 - http://packetstormsecurity.com/files/134626/WordPress-Cool-Video-Gallery-1.9-Command-Injection.html -CVE-2015-7527 - https://wpvulndb.com/vulnerabilities/8348 -CVE-2015-7540 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7545 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7545 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7545 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7546 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7547 - http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow -CVE-2015-7547 - http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html -CVE-2015-7547 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2015-7547 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -CVE-2015-7547 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html -CVE-2015-7547 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2015-7547 - http://seclists.org/fulldisclosure/2021/Sep/0 -CVE-2015-7547 - http://seclists.org/fulldisclosure/2022/Jun/36 -CVE-2015-7547 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-7547 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-7547 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7547 - http://www.securityfocus.com/bid/83265 -CVE-2015-7547 - https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html -CVE-2015-7547 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-7547 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2015-7547 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2015-7547 - https://security.netapp.com/advisory/ntap-20160217-0002/ -CVE-2015-7547 - https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 -CVE-2015-7547 - https://www.exploit-db.com/exploits/39454/ -CVE-2015-7547 - https://www.exploit-db.com/exploits/40339/ -CVE-2015-7547 - https://www.kb.cert.org/vuls/id/457759 -CVE-2015-7547 - https://www.tenable.com/security/research/tra-2017-08 -CVE-2015-7550 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-7551 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7554 - http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html -CVE-2015-7554 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-7554 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-7555 - http://packetstormsecurity.com/files/135034/giflib-5.1.1-Heap-Overflow.html -CVE-2015-7555 - http://seclists.org/fulldisclosure/2015/Dec/83 -CVE-2015-7562 - https://www.exploit-db.com/exploits/39559/ -CVE-2015-7563 - https://www.exploit-db.com/exploits/39559/ -CVE-2015-7564 - https://www.exploit-db.com/exploits/39559/ -CVE-2015-7566 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2015-7566 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2015-7566 - https://bugzilla.redhat.com/show_bug.cgi?id=1283371 -CVE-2015-7566 - https://www.exploit-db.com/exploits/39540/ -CVE-2015-7567 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html -CVE-2015-7567 - http://seclists.org/fulldisclosure/2016/Feb/44 -CVE-2015-7567 - https://www.exploit-db.com/exploits/39436/ -CVE-2015-7568 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html -CVE-2015-7568 - http://seclists.org/fulldisclosure/2016/Feb/44 -CVE-2015-7568 - https://www.exploit-db.com/exploits/39436/ -CVE-2015-7569 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html -CVE-2015-7569 - http://seclists.org/fulldisclosure/2016/Feb/44 -CVE-2015-7569 - https://www.exploit-db.com/exploits/39436/ -CVE-2015-7570 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html -CVE-2015-7570 - http://seclists.org/fulldisclosure/2016/Feb/44 -CVE-2015-7570 - https://www.exploit-db.com/exploits/39436/ -CVE-2015-7571 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html -CVE-2015-7571 - http://seclists.org/fulldisclosure/2016/Feb/44 -CVE-2015-7571 - https://www.exploit-db.com/exploits/39436/ -CVE-2015-7575 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2015-7575 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-7575 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-7575 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-7575 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7575 - http://www.securityfocus.com/bid/91787 -CVE-2015-7596 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7597 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7598 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7599 - https://security.netapp.com/advisory/ntap-20151029-0001/ -CVE-2015-7601 - http://packetstormsecurity.com/files/133756/PCMan-FTP-Server-2.0.7-Directory-Traversal.html -CVE-2015-7601 - https://www.exploit-db.com/exploits/38340/ -CVE-2015-7602 - http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html -CVE-2015-7602 - https://www.exploit-db.com/exploits/38341/ -CVE-2015-7603 - https://www.exploit-db.com/exploits/38260/ -CVE-2015-7609 - https://bugzilla.zimbra.com/show_bug.cgi?id=101435 -CVE-2015-7611 - http://packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.html -CVE-2015-7611 - http://packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.html -CVE-2015-7613 - http://www.openwall.com/lists/oss-security/2015/10/01/8 -CVE-2015-7613 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7613 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7622 - https://www.exploit-db.com/exploits/38787/ -CVE-2015-7645 - http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/ -CVE-2015-7645 - http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html -CVE-2015-7645 - https://www.exploit-db.com/exploits/38490/ -CVE-2015-7647 - https://www.exploit-db.com/exploits/38969/ -CVE-2015-7648 - https://www.exploit-db.com/exploits/38970/ -CVE-2015-7652 - https://www.exploit-db.com/exploits/39020/ -CVE-2015-7666 - https://wpvulndb.com/vulnerabilities/8210 -CVE-2015-7667 - https://wpvulndb.com/vulnerabilities/8204 -CVE-2015-7668 - https://wpvulndb.com/vulnerabilities/8205 -CVE-2015-7669 - https://wpvulndb.com/vulnerabilities/8206 -CVE-2015-7670 - https://wpvulndb.com/vulnerabilities/8207 -CVE-2015-7672 - https://www.youtube.com/watch?v=sIONzwQAngU -CVE-2015-7674 - http://www.openwall.com/lists/oss-security/2015/10/05/7 -CVE-2015-7675 - http://packetstormsecurity.com/files/135457/Ipswitch-MOVEit-DMZ-8.1-Authorization-Bypass.html -CVE-2015-7675 - https://www.profundis-labs.com/advisories/CVE-2015-7675.txt -CVE-2015-7676 - http://packetstormsecurity.com/files/135458/Ipswitch-MOVEit-DMZ-8.1-Persistent-Cross-Site-Scripting.html -CVE-2015-7676 - https://profundis-labs.com/advisories/CVE-2015-7676.txt -CVE-2015-7677 - http://packetstormsecurity.com/files/135459/Ipswitch-MOVEit-DMZ-8.1-File-ID-Enumeration.html -CVE-2015-7677 - https://www.profundis-labs.com/advisories/CVE-2015-7677.txt -CVE-2015-7678 - http://packetstormsecurity.com/files/135460/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Request-Forgery.html -CVE-2015-7679 - http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html -CVE-2015-7679 - https://profundis-labs.com/advisories/CVE-2015-7679.txt -CVE-2015-7680 - http://packetstormsecurity.com/files/135462/Ipswitch-MOVEit-DMZ-8.1-Information-Disclosure.html -CVE-2015-7680 - https://profundis-labs.com/advisories/CVE-2015-7680.txt -CVE-2015-7682 - http://packetstormsecurity.com/files/133929/WordPress-Pie-Register-2.0.18-SQL-Injection.html -CVE-2015-7682 - https://wpvulndb.com/vulnerabilities/8213 -CVE-2015-7683 - http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.html -CVE-2015-7683 - https://wpvulndb.com/vulnerabilities/8214 -CVE-2015-7691 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7692 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7701 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7702 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7703 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7704 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7704 - https://eprint.iacr.org/2015/1020.pdf -CVE-2015-7704 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2015-7704 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7705 - http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html -CVE-2015-7705 - https://eprint.iacr.org/2015/1020.pdf -CVE-2015-7705 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7706 - http://packetstormsecurity.com/files/134760/Secure-Data-Space-3.1.1-2-Cross-Site-Scripting.html -CVE-2015-7706 - http://seclists.org/fulldisclosure/2015/Dec/36 -CVE-2015-7707 - http://packetstormsecurity.com/files/133559/Openfire-3.10.2-Privilege-Escalation.html -CVE-2015-7707 - https://igniterealtime.org/issues/browse/OF-941 -CVE-2015-7707 - https://www.exploit-db.com/exploits/38190/ -CVE-2015-7708 - http://packetstormsecurity.com/files/133712/4images-1.7.11-Cross-Site-Scripting.html -CVE-2015-7708 - http://seclists.org/fulldisclosure/2015/Sep/95 -CVE-2015-7709 - https://packetstormsecurity.com/files/132660/Western-Digital-Arkeia-11.0.13-Remote-Code-Execution.html -CVE-2015-7709 - https://www.exploit-db.com/exploits/37600/ -CVE-2015-7711 - http://packetstormsecurity.com/files/134217/ATutor-2.2-Cross-Site-Scripting.html -CVE-2015-7712 - http://packetstormsecurity.com/files/134218/ATutor-2.2-PHP-Code-Injection.html -CVE-2015-7713 - http://www.securityfocus.com/bid/76960 -CVE-2015-7714 - http://packetstormsecurity.com/files/134066/Realtyna-RPL-8.9.2-SQL-Injection.html -CVE-2015-7714 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5272.php -CVE-2015-7714 - https://www.exploit-db.com/exploits/38527/ -CVE-2015-7715 - http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html -CVE-2015-7715 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php -CVE-2015-7715 - https://www.exploit-db.com/exploits/38528/ -CVE-2015-7723 - http://packetstormsecurity.com/files/134121/AMD-fglrx-driver-14.4.2-Privilege-Escalation.html -CVE-2015-7723 - http://seclists.org/fulldisclosure/2015/Oct/104 -CVE-2015-7724 - http://packetstormsecurity.com/files/134120/AMD-fglrx-driver-15.7-Privilege-Escalation.html -CVE-2015-7724 - http://seclists.org/fulldisclosure/2015/Oct/103 -CVE-2015-7725 - http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html -CVE-2015-7725 - http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html -CVE-2015-7725 - http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html -CVE-2015-7725 - http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html -CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/110 -CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/111 -CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/113 -CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/118 -CVE-2015-7726 - http://seclists.org/fulldisclosure/2015/Sep/114 -CVE-2015-7727 - http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html -CVE-2015-7727 - http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html -CVE-2015-7727 - http://seclists.org/fulldisclosure/2015/Sep/115 -CVE-2015-7727 - http://seclists.org/fulldisclosure/2015/Sep/117 -CVE-2015-7728 - http://seclists.org/fulldisclosure/2015/Sep/116 -CVE-2015-7729 - http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html -CVE-2015-7729 - http://seclists.org/fulldisclosure/2015/Sep/112 -CVE-2015-7743 - https://packetstormsecurity.com/files/137255/Paessler-PRTG-Network-Monitor-14.4.12.3282-XXE-Injection.html -CVE-2015-7744 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7744 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-7755 - https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554 -CVE-2015-7756 - https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554 -CVE-2015-7765 - http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html -CVE-2015-7765 - http://seclists.org/fulldisclosure/2015/Sep/66 -CVE-2015-7765 - https://www.exploit-db.com/exploits/38221/ -CVE-2015-7766 - http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html -CVE-2015-7766 - http://seclists.org/fulldisclosure/2015/Sep/66 -CVE-2015-7766 - https://www.exploit-db.com/exploits/38221/ -CVE-2015-7767 - https://www.exploit-db.com/exploits/37908/ -CVE-2015-7767 - https://www.exploit-db.com/exploits/38252/ -CVE-2015-7768 - http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html -CVE-2015-7768 - http://packetstormsecurity.com/files/137252/Konica-Minolta-FTP-Utility-1.0-SEH-Buffer-Overflow.html -CVE-2015-7768 - https://www.exploit-db.com/exploits/38254/ -CVE-2015-7768 - https://www.exploit-db.com/exploits/39215/ -CVE-2015-7791 - https://wpvulndb.com/vulnerabilities/8356 -CVE-2015-7799 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-7803 - https://bugs.php.net/bug.php?id=69720 -CVE-2015-7803 - https://hackerone.com/reports/103990 -CVE-2015-7804 - https://hackerone.com/reports/104008 -CVE-2015-7805 - http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html -CVE-2015-7805 - http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/ -CVE-2015-7805 - https://www.exploit-db.com/exploits/38447/ -CVE-2015-7806 - https://wpvulndb.com/vulnerabilities/8220 -CVE-2015-7808 - http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ -CVE-2015-7808 - http://packetstormsecurity.com/files/134331/vBulletin-5.1.2-Unserialize-Code-Execution.html -CVE-2015-7808 - https://www.exploit-db.com/exploits/38629/ -CVE-2015-7815 - http://packetstormsecurity.com/files/134219/Piwik-2.14.3-Local-File-Inclusion.html -CVE-2015-7816 - http://packetstormsecurity.com/files/134220/Piwik-2.14.3-PHP-Object-Injection.html -CVE-2015-7822 - http://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html -CVE-2015-7823 - http://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html -CVE-2015-7828 - http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html -CVE-2015-7830 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-7833 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2015-7848 - http://www.talosintelligence.com/reports/TALOS-2015-0052/ -CVE-2015-7852 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7853 - http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html -CVE-2015-7853 - http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html -CVE-2015-7855 - https://www.exploit-db.com/exploits/40840/ -CVE-2015-7857 - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html -CVE-2015-7857 - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html -CVE-2015-7857 - https://www.exploit-db.com/exploits/38797/ -CVE-2015-7857 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ -CVE-2015-7858 - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html -CVE-2015-7858 - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html -CVE-2015-7858 - https://www.exploit-db.com/exploits/38797/ -CVE-2015-7858 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ -CVE-2015-7860 - http://www.kb.cert.org/vuls/id/966927 -CVE-2015-7861 - http://www.kb.cert.org/vuls/id/966927 -CVE-2015-7865 - http://packetstormsecurity.com/files/134520/NVIDIA-Stereoscopic-3D-Driver-Service-Arbitrary-Run-Key-Creation.html -CVE-2015-7865 - https://www.exploit-db.com/exploits/38792/ -CVE-2015-7872 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-7872 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7874 - https://www.exploit-db.com/exploits/39119/ -CVE-2015-7880 - https://www.drupal.org/node/2582015 -CVE-2015-7888 - http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html -CVE-2015-7889 - http://packetstormsecurity.com/files/134105/Samsung-SecEmailComposer-QUICK_REPLY_BACKGROUND-Permission-Weakness.html -CVE-2015-7889 - https://www.exploit-db.com/exploits/38558/ -CVE-2015-7890 - http://packetstormsecurity.com/files/134106/Samsung-Seiren-Kernel-Driver-Buffer-Overflow.html -CVE-2015-7890 - https://www.exploit-db.com/exploits/38556/ -CVE-2015-7891 - http://packetstormsecurity.com/files/134107/Samsung-Fimg2d-FIMG2D_BITBLT_BLIT-Ioctl-Concurrency-Flaw.html -CVE-2015-7891 - https://www.exploit-db.com/exploits/38557/ -CVE-2015-7892 - http://packetstormsecurity.com/files/134108/Samsung-M2m1shot-Kernel-Driver-Buffer-Overflow.html -CVE-2015-7892 - https://www.exploit-db.com/exploits/38555/ -CVE-2015-7893 - http://packetstormsecurity.com/files/135643/Samsung-SecEmailUI-Script-Injection.html -CVE-2015-7893 - https://www.exploit-db.com/exploits/38554/ -CVE-2015-7894 - http://packetstormsecurity.com/files/134197/Samsung-LibQjpeg-Image-Decoding-Memory-Corruption.html -CVE-2015-7894 - https://www.exploit-db.com/exploits/38614/ -CVE-2015-7895 - http://packetstormsecurity.com/files/134950/Samsung-Galaxy-S6-Samsung-Gallery-Bitmap-Decoding-Crash.html -CVE-2015-7895 - https://www.exploit-db.com/exploits/38613/ -CVE-2015-7896 - http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html -CVE-2015-7896 - https://www.exploit-db.com/exploits/38612/ -CVE-2015-7897 - http://packetstormsecurity.com/files/134199/Samsung-Galaxy-S6-Android.media.process-Face-Recognition-Memory-Corruption.html -CVE-2015-7897 - https://www.exploit-db.com/exploits/38611/ -CVE-2015-7898 - http://packetstormsecurity.com/files/134951/Samsung-Galaxy-S6-Samsung-Gallery-GIF-Parsing-Crash.html -CVE-2015-7898 - https://www.exploit-db.com/exploits/38610/ -CVE-2015-7901 - https://www.exploit-db.com/exploits/42698/ -CVE-2015-7924 - http://seclists.org/fulldisclosure/2015/Dec/118 -CVE-2015-7925 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html -CVE-2015-7925 - http://seclists.org/fulldisclosure/2015/Dec/118 -CVE-2015-7926 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html -CVE-2015-7926 - http://seclists.org/fulldisclosure/2015/Dec/118 -CVE-2015-7927 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html -CVE-2015-7927 - http://seclists.org/fulldisclosure/2015/Dec/118 -CVE-2015-7928 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html -CVE-2015-7928 - http://seclists.org/fulldisclosure/2015/Dec/118 -CVE-2015-7929 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html -CVE-2015-7929 - http://seclists.org/fulldisclosure/2015/Dec/118 -CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2015-7940 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2015-7940 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2015-7941 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-7941 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7942 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-7942 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7944 - http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html -CVE-2015-7944 - https://www.exploit-db.com/exploits/39169/ -CVE-2015-7945 - http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html -CVE-2015-7945 - https://www.exploit-db.com/exploits/39169/ -CVE-2015-7961 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7962 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7963 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7964 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7965 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7966 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7967 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -CVE-2015-7973 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7975 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7976 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7977 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7977 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7978 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7978 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7979 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-7979 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-7981 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-7981 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-7984 - https://www.exploit-db.com/exploits/38765/ -CVE-2015-7985 - http://packetstormsecurity.com/files/134513/Steam-2.10.91.91-Weak-File-Permissions-Privilege-Escalation.html -CVE-2015-7986 - http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html -CVE-2015-7986 - http://seclists.org/fulldisclosure/2016/Jan/94 -CVE-2015-7986 - https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/ -CVE-2015-7986 - https://www.exploit-db.com/exploits/39382/ -CVE-2015-7987 - http://www.kb.cert.org/vuls/id/143335 -CVE-2015-7987 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-7988 - http://www.kb.cert.org/vuls/id/143335 -CVE-2015-7988 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-7989 - https://wpvulndb.com/vulnerabilities/8187 -CVE-2015-7990 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-7990 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-7990 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-7991 - http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html -CVE-2015-7992 - http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html -CVE-2015-7993 - http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html -CVE-2015-7994 - http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html -CVE-2015-7995 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-7995 - https://bugzilla.redhat.com/show_bug.cgi?id=1257962 -CVE-2015-8000 - http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html -CVE-2015-8000 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2015-8000 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8000 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8025 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-8036 - https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ -CVE-2015-8041 - https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog -CVE-2015-8044 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8044 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8046 - https://www.exploit-db.com/exploits/39019/ -CVE-2015-8048 - https://www.exploit-db.com/exploits/39649/ -CVE-2015-8051 - http://seclists.org/fulldisclosure/2015/Nov/81 -CVE-2015-8051 - http://www.vulnerability-lab.com/get_content.php?id=1478 -CVE-2015-8080 - http://www.openwall.com/lists/oss-security/2015/11/06/4 -CVE-2015-8080 - https://github.com/antirez/redis/issues/2855 -CVE-2015-8090 - http://www.tibco.com/mk/advisory.jsp -CVE-2015-8096 - http://packetstormsecurity.com/files/134084/Google-Picasa-Phase-One-Tags-Processing-Integer-Overflow.html -CVE-2015-8100 - http://packetstormsecurity.com/files/134323/OpenBSD-net-snmp-Information-Disclosure.html -CVE-2015-8103 - http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jenkins -CVE-2015-8103 - http://packetstormsecurity.com/files/134805/Jenkins-CLI-RMI-Java-Deserialization.html -CVE-2015-8103 - https://www.exploit-db.com/exploits/38983/ -CVE-2015-8104 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8104 - http://www.securityfocus.com/bid/91787 -CVE-2015-8124 - http://seclists.org/fulldisclosure/2015/Dec/89 -CVE-2015-8126 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-8126 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-8126 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8131 - https://www.elastic.co/community/security/ -CVE-2015-8138 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8138 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-8139 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-8140 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-8148 - http://www.securityfocus.com/bid/83271 -CVE-2015-8149 - http://www.securityfocus.com/bid/83270 -CVE-2015-8150 - http://www.securityfocus.com/bid/83269 -CVE-2015-8151 - http://www.securityfocus.com/bid/83268 -CVE-2015-8158 - https://www.kb.cert.org/vuls/id/718152 -CVE-2015-8215 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8221 - http://packetstormsecurity.com/files/134315/Google-Picasa-CAMF-Section-Integer-Overflow.html -CVE-2015-8241 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8241 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8242 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8242 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8247 - http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html -CVE-2015-8249 - http://packetstormsecurity.com/files/134806/ManageEngine-Desktop-Central-9-FileUploadServlet-ConnectionId.html -CVE-2015-8249 - https://community.rapid7.com/community/infosec/blog/2015/12/14/r7-2015-22-manageengine-desktop-central-9-fileuploadservlet-connectionid-vulnerability-cve-2015-8249 -CVE-2015-8249 - https://www.exploit-db.com/exploits/38982/ -CVE-2015-8252 - https://www.kb.cert.org/vuls/id/792004 -CVE-2015-8253 - https://www.kb.cert.org/vuls/id/792004 -CVE-2015-8254 - https://www.kb.cert.org/vuls/id/792004 -CVE-2015-8255 - https://www.exploit-db.com/exploits/41626/ -CVE-2015-8256 - http://packetstormsecurity.com/files/141674/AXIS-Network-Camera-Cross-Site-Scripting.html -CVE-2015-8256 - https://www.exploit-db.com/exploits/39683/ -CVE-2015-8257 - http://packetstormsecurity.com/files/138083/AXIS-Authenticated-Remote-Command-Execution.html -CVE-2015-8257 - https://www.exploit-db.com/exploits/40171/ -CVE-2015-8258 - https://www.exploit-db.com/exploits/41625/ -CVE-2015-8261 - https://www.exploit-db.com/exploits/39231/ -CVE-2015-8261 - https://www.kb.cert.org/vuls/id/753264 -CVE-2015-8262 - https://www.kb.cert.org/vuls/id/646008 -CVE-2015-8263 - https://www.kb.cert.org/vuls/id/403568 -CVE-2015-8264 - http://seclists.org/fulldisclosure/2016/Mar/64 -CVE-2015-8265 - https://www.kb.cert.org/vuls/id/972224 -CVE-2015-8267 - https://www.kb.cert.org/vuls/id/757840 -CVE-2015-8268 - http://www.kb.cert.org/vuls/id/204232 -CVE-2015-8269 - https://www.kb.cert.org/vuls/id/719736 -CVE-2015-8269 - https://www.kb.cert.org/vuls/id/GWAN-A6LPPW -CVE-2015-8270 - http://www.talosintelligence.com/reports/TALOS-2016-0066/ -CVE-2015-8271 - http://www.talosintelligence.com/reports/TALOS-2016-0067/ -CVE-2015-8272 - http://www.talosintelligence.com/reports/TALOS-2016-0068/ -CVE-2015-8277 - http://www.kb.cert.org/vuls/id/485744 -CVE-2015-8277 - https://www.securifera.com/advisories/cve-2015-8277 -CVE-2015-8279 - https://www.kb.cert.org/vuls/id/913000 -CVE-2015-8280 - https://www.kb.cert.org/vuls/id/913000 -CVE-2015-8281 - https://www.kb.cert.org/vuls/id/913000 -CVE-2015-8282 - http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html -CVE-2015-8282 - http://seclists.org/fulldisclosure/2016/Jan/58 -CVE-2015-8282 - https://www.exploit-db.com/exploits/39266/ -CVE-2015-8283 - http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html -CVE-2015-8283 - http://seclists.org/fulldisclosure/2016/Jan/58 -CVE-2015-8283 - https://www.exploit-db.com/exploits/39266/ -CVE-2015-8284 - http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html -CVE-2015-8284 - http://seclists.org/fulldisclosure/2016/Jan/58 -CVE-2015-8284 - https://www.exploit-db.com/exploits/39266/ -CVE-2015-8285 - https://www.exploit-db.com/exploits/39475/ -CVE-2015-8286 - http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html -CVE-2015-8286 - http://seclists.org/bugtraq/2015/Jun/117 -CVE-2015-8286 - http://www.kb.cert.org/vuls/id/899080 -CVE-2015-8288 - http://www.kb.cert.org/vuls/id/778696 -CVE-2015-8289 - http://kb.netgear.com/app/answers/detail/a_id/30490 -CVE-2015-8289 - http://www.kb.cert.org/vuls/id/778696 -CVE-2015-8298 - http://packetstormsecurity.com/files/134525/RXTEC-RXAdmin-SQL-Injection.html -CVE-2015-8298 - http://seclists.org/fulldisclosure/2015/Nov/90 -CVE-2015-8298 - https://github.com/sbaresearch/advisories/tree/public/2015/RXTEC_20150513 -CVE-2015-8299 - http://packetstormsecurity.com/files/134524/KNX-ETS-4.1.5-Build-3246-Buffer-Overflow.html -CVE-2015-8299 - https://github.com/sbaresearch/advisories/tree/public/2015/knAx_20150101 -CVE-2015-8300 - http://packetstormsecurity.com/files/134523/Polycom-BTOE-Connector-2.3.0-Local-Privilege-Escalation.html -CVE-2015-8300 - http://seclists.org/fulldisclosure/2015/Nov/88 -CVE-2015-8300 - https://github.com/sbaresearch/advisories/tree/public/2015/Polycom_20150513 -CVE-2015-8309 - https://www.exploit-db.com/exploits/40361/ -CVE-2015-8317 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8317 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8320 - http://packetstormsecurity.com/files/134496/Apache-Cordova-Android-3.6.4-BridgeSecret-Weak-Randomization.html -CVE-2015-8324 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8327 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8329 - http://packetstormsecurity.com/files/135761/SAP-MII-12.2-14.0-15.0-Cryptography-Issues.html -CVE-2015-8330 - http://packetstormsecurity.com/files/135775/SAP-PCo-2.2-2.3-15.0-15.1-Denial-Of-Service.html -CVE-2015-8330 - https://erpscan.io/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/ -CVE-2015-8350 - http://packetstormsecurity.com/files/134598/WordPress-Calls-To-Action-2.4.3-Cross-Site-Scripting.html -CVE-2015-8351 - http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html -CVE-2015-8351 - https://www.exploit-db.com/exploits/38861/ -CVE-2015-8352 - https://www.exploit-db.com/exploits/39017/ -CVE-2015-8353 - http://packetstormsecurity.com/files/134600/WordPress-Role-Scoper-1.3.66-Cross-Site-Scripting.html -CVE-2015-8353 - https://wpvulndb.com/vulnerabilities/8347 -CVE-2015-8354 - http://packetstormsecurity.com/files/134601/WordPress-Ultimate-Member-1.3.28-Cross-Site-Scripting.html -CVE-2015-8354 - https://wpvulndb.com/vulnerabilities/8346 -CVE-2015-8356 - http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html -CVE-2015-8356 - https://www.exploit-db.com/exploits/39246/ -CVE-2015-8357 - http://packetstormsecurity.com/files/134765/bitrix.scan-Bitrix-1.0.3-Path-Traversal.html -CVE-2015-8357 - https://www.exploit-db.com/exploits/38976/ -CVE-2015-8358 - http://packetstormsecurity.com/files/134766/bitrix.mpbuilder-Bitrix-1.0.10-Local-File-Inclusion.html -CVE-2015-8358 - https://www.exploit-db.com/exploits/38975/ -CVE-2015-8360 - http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html -CVE-2015-8361 - http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html -CVE-2015-8362 - http://seclists.org/fulldisclosure/2016/Jan/63 -CVE-2015-8362 - https://www.kb.cert.org/vuls/id/992624 -CVE-2015-8364 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-8365 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2015-8366 - http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html -CVE-2015-8367 - http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html -CVE-2015-8368 - http://packetstormsecurity.com/files/134593/ntop-ng-2.0.15102-Privilege-Escalation.html -CVE-2015-8368 - http://seclists.org/fulldisclosure/2015/Dec/10 -CVE-2015-8368 - https://www.exploit-db.com/exploits/38836/ -CVE-2015-8369 - http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html -CVE-2015-8369 - http://seclists.org/fulldisclosure/2015/Dec/8 -CVE-2015-8370 - http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html -CVE-2015-8370 - http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html -CVE-2015-8370 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-8370 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8374 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2015-8374 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-8374 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-8376 - http://seclists.org/fulldisclosure/2015/Dec/101 -CVE-2015-8376 - http://seclists.org/fulldisclosure/2015/Dec/7 -CVE-2015-8379 - http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html -CVE-2015-8379 - http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html -CVE-2015-8385 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8386 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8388 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8391 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8396 - http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/ -CVE-2015-8396 - http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html -CVE-2015-8396 - https://www.exploit-db.com/exploits/39229/ -CVE-2015-8397 - http://packetstormsecurity.com/files/135206/GDCM-2.6.0-2.6.1-Out-Of-Bounds-Read.html -CVE-2015-8398 - https://www.exploit-db.com/exploits/39170/ -CVE-2015-8399 - https://www.exploit-db.com/exploits/39170/ -CVE-2015-8410 - https://www.exploit-db.com/exploits/39040/ -CVE-2015-8411 - https://www.exploit-db.com/exploits/39041/ -CVE-2015-8412 - https://www.exploit-db.com/exploits/39042/ -CVE-2015-8413 - https://www.exploit-db.com/exploits/39043/ -CVE-2015-8415 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8415 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8416 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8416 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8417 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8417 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8418 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8418 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8419 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8419 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8420 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8420 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8420 - https://www.exploit-db.com/exploits/39044/ -CVE-2015-8421 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8421 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8421 - https://www.exploit-db.com/exploits/39045/ -CVE-2015-8422 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8422 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8422 - https://www.exploit-db.com/exploits/39046/ -CVE-2015-8423 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8423 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8423 - https://www.exploit-db.com/exploits/39047/ -CVE-2015-8424 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8424 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8424 - https://www.exploit-db.com/exploits/39048/ -CVE-2015-8425 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8425 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8425 - https://www.exploit-db.com/exploits/39049/ -CVE-2015-8426 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8426 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8426 - https://www.exploit-db.com/exploits/39650/ -CVE-2015-8427 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8427 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8427 - https://www.exploit-db.com/exploits/39050/ -CVE-2015-8428 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8428 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8428 - https://www.exploit-db.com/exploits/39051/ -CVE-2015-8429 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8429 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8429 - https://www.exploit-db.com/exploits/39052/ -CVE-2015-8430 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8430 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8430 - https://www.exploit-db.com/exploits/39053/ -CVE-2015-8431 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8431 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8431 - https://www.exploit-db.com/exploits/39054/ -CVE-2015-8432 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8432 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8433 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8433 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8434 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8434 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8434 - https://www.exploit-db.com/exploits/39072/ -CVE-2015-8435 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8435 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8436 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8436 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8437 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8437 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8438 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8438 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8439 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8439 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8440 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8440 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8441 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8441 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8442 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8442 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8443 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8443 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8444 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8444 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8445 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8445 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8446 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8446 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8447 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8447 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8448 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8448 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8449 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8449 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8450 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8450 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8451 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8451 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8452 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8452 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8453 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8453 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8454 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8454 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8455 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8455 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8456 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8456 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8457 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8457 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8459 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8459 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8460 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8460 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8472 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2015-8472 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -CVE-2015-8508 - http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html -CVE-2015-8508 - https://bugzilla.mozilla.org/show_bug.cgi?id=1221518 -CVE-2015-8509 - http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html -CVE-2015-8509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1232785 -CVE-2015-8510 - https://bugzilla.mozilla.org/show_bug.cgi?id=1190038 -CVE-2015-8540 - http://www.openwall.com/lists/oss-security/2015/12/17/10 -CVE-2015-8540 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-8542 - http://packetstormsecurity.com/files/136069/Open-Xchange-Guard-2.2.0-2.0-Private-Key-Disclosure.html -CVE-2015-8543 - http://www.openwall.com/lists/oss-security/2015/12/09/5 -CVE-2015-8543 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8543 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-8543 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-8546 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2015-8550 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8554 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8555 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8556 - http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html -CVE-2015-8556 - https://www.exploit-db.com/exploits/39010/ -CVE-2015-8557 - http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html -CVE-2015-8557 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8560 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8562 - http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html -CVE-2015-8562 - http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html -CVE-2015-8562 - https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html -CVE-2015-8562 - https://www.exploit-db.com/exploits/38977/ -CVE-2015-8562 - https://www.exploit-db.com/exploits/39033/ -CVE-2015-8567 - http://www.ubuntu.com/usn/USN-2891-1 -CVE-2015-8568 - https://bugzilla.redhat.com/show_bug.cgi?id=1289816 -CVE-2015-8569 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-8569 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-8575 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-8575 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-8577 - https://kc.mcafee.com/corporate/index?page=content&id=SB10142 -CVE-2015-8593 - http://www.securityfocus.com/bid/103671 -CVE-2015-8594 - http://www.securityfocus.com/bid/103671 -CVE-2015-8603 - http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html -CVE-2015-8603 - http://seclists.org/fulldisclosure/2016/Jan/18 -CVE-2015-8604 - http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html -CVE-2015-8604 - http://seclists.org/fulldisclosure/2016/Jan/16 -CVE-2015-8605 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8606 - http://seclists.org/fulldisclosure/2015/Dec/55 -CVE-2015-8606 - http://www.openwall.com/lists/oss-security/2015/12/17/1 -CVE-2015-8606 - http://www.openwall.com/lists/oss-security/2015/12/17/11 -CVE-2015-8606 - http://www.openwall.com/lists/oss-security/2015/12/18/5 -CVE-2015-8606 - http://www.silverstripe.org/download/security-releases/ss-2015-026 -CVE-2015-8606 - https://cybersecurityworks.com/zerodays/cve-2015-8606-silverstripe.html -CVE-2015-8607 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-8607 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2015-8608 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2015-8608 - https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html -CVE-2015-8608 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2015-8612 - http://packetstormsecurity.com/files/135047/Slackware-Security-Advisory-blueman-Updates.html -CVE-2015-8612 - https://www.exploit-db.com/exploits/46186/ -CVE-2015-8616 - https://bugs.php.net/bug.php?id=71020 -CVE-2015-8618 - https://github.com/golang/go/issues/13515 -CVE-2015-8620 - http://packetstormsecurity.com/files/135859/Avast-11.1.2245-Heap-Overflow.html -CVE-2015-8629 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8629 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8629 - https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb -CVE-2015-8630 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8630 - https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b -CVE-2015-8631 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8631 - https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 -CVE-2015-8634 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8634 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8634 - https://www.exploit-db.com/exploits/39221/ -CVE-2015-8635 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8635 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8635 - https://www.exploit-db.com/exploits/39220/ -CVE-2015-8636 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8636 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8636 - https://www.exploit-db.com/exploits/39219/ -CVE-2015-8638 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8638 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8639 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8639 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8640 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8640 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8641 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8641 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8642 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8642 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8643 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8643 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8644 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8644 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8644 - https://www.exploit-db.com/exploits/39476/ -CVE-2015-8645 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8645 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8646 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8646 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8647 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8647 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8648 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8648 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8649 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8649 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8650 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8650 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8651 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2015-8651 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2015-8660 - http://packetstormsecurity.com/files/135151/Ubuntu-14.04-LTS-15.10-overlayfs-Local-Root.html -CVE-2015-8660 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8660 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8660 - https://www.exploit-db.com/exploits/39166/ -CVE-2015-8660 - https://www.exploit-db.com/exploits/39230/ -CVE-2015-8660 - https://www.exploit-db.com/exploits/40688/ -CVE-2015-8665 - http://www.openwall.com/lists/oss-security/2015/12/24/2 -CVE-2015-8665 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8665 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8665 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8667 - https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html -CVE-2015-8668 - http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html -CVE-2015-8668 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8668 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8683 - http://www.openwall.com/lists/oss-security/2015/12/25/1 -CVE-2015-8683 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8683 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8683 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8684 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1323-exponent-cms-235-file-upload-cross-site-scripting-vulnerability -CVE-2015-8684 - https://packetstormsecurity.com/files/136762/Exponent-CMS-2.3.5-File-Upload-Cross-Site-Scripting.html -CVE-2015-8685 - http://packetstormsecurity.com/files/135256/dolibarr-HTML-Injection.html -CVE-2015-8685 - http://seclists.org/fulldisclosure/2016/Jan/40 -CVE-2015-8687 - http://seclists.org/fulldisclosure/2016/Jan/0 -CVE-2015-8704 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2015-8704 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8709 - http://www.openwall.com/lists/oss-security/2015/12/17/12 -CVE-2015-8711 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8712 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8713 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8714 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8715 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8716 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8717 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8718 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8719 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8720 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8721 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8722 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8723 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8724 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8726 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8727 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8728 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8729 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8730 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8731 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8732 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8733 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2015-8741 - http://www.wireshark.org/security/wnpa-sec-2015-59.html -CVE-2015-8751 - http://www.openwall.com/lists/oss-security/2016/01/07/10 -CVE-2015-8765 - https://www.kb.cert.org/vuls/id/576313 -CVE-2015-8766 - http://seclists.org/fulldisclosure/2015/Dec/60 -CVE-2015-8767 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8767 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8767 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2015-8768 - https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF -CVE-2015-8770 - http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html -CVE-2015-8770 - https://www.exploit-db.com/exploits/39245/ -CVE-2015-8776 - http://www.securityfocus.com/bid/83277 -CVE-2015-8777 - http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html -CVE-2015-8778 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2015-8778 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2015-8778 - http://www.securityfocus.com/bid/83275 -CVE-2015-8778 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2015-8779 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2015-8779 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2015-8779 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2015-8779 - https://sourceware.org/bugzilla/show_bug.cgi?id=17905 -CVE-2015-8780 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2015-0001 -CVE-2015-8781 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8781 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8781 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8782 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8782 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8782 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8783 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8783 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8783 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8784 - http://www.openwall.com/lists/oss-security/2016/01/24/8 -CVE-2015-8784 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8784 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8784 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2015-8785 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8785 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2015-8785 - http://www.ubuntu.com/usn/USN-2886-1 -CVE-2015-8786 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8787 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8787 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2015-8787 - http://www.ubuntu.com/usn/USN-2890-3 -CVE-2015-8806 - http://www.openwall.com/lists/oss-security/2016/02/03/5 -CVE-2015-8806 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-8812 - http://www.securityfocus.com/bid/83218 -CVE-2015-8812 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2015-8816 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8816 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2015-8830 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2015-8831 - http://packetstormsecurity.com/files/134353/dotclear-2.8.1-Cross-Site-Scripting.html -CVE-2015-8831 - http://seclists.org/fulldisclosure/2015/Nov/59 -CVE-2015-8832 - http://packetstormsecurity.com/files/134352/dotclear-2.8.1-Shell-Upload.html -CVE-2015-8835 - https://bugs.php.net/bug.php?id=70081 -CVE-2015-8836 - https://bugzilla.redhat.com/show_bug.cgi?id=863102 -CVE-2015-8837 - https://bugzilla.redhat.com/show_bug.cgi?id=863091 -CVE-2015-8841 - http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html -CVE-2015-8853 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2015-8853 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-8853 - https://rt.perl.org/Public/Bug/Display.html?id=123562 -CVE-2015-8864 - https://github.com/roundcube/roundcubemail/issues/4949 -CVE-2015-8865 - https://hackerone.com/reports/476179 -CVE-2015-8868 - http://www.openwall.com/lists/oss-security/2016/04/12/1 -CVE-2015-8868 - https://bugs.freedesktop.org/show_bug.cgi?id=93476 -CVE-2015-8869 - http://www.openwall.com/lists/oss-security/2016/04/29/1 -CVE-2015-8869 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8871 - https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md -CVE-2015-8873 - https://bugs.php.net/bug.php?id=69793 -CVE-2015-8895 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8895 - http://www.securityfocus.com/bid/91025 -CVE-2015-8896 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8897 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8898 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2015-8916 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8917 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8919 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8920 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8921 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8922 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8923 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8924 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8924 - https://github.com/libarchive/libarchive/issues/515 -CVE-2015-8925 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8926 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8928 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8930 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8931 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8932 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8934 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2015-8934 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2015-8935 - https://hackerone.com/reports/145392 -CVE-2015-8947 - https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e -CVE-2015-8952 - https://usn.ubuntu.com/3582-1/ -CVE-2015-8953 - http://www.openwall.com/lists/oss-security/2016/08/23/9 -CVE-2015-8960 - https://kcitls.org -CVE-2015-8965 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2015-8965 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2015-8968 - https://hackerone.com/reports/104465 -CVE-2015-8969 - https://hackerone.com/reports/105190 -CVE-2015-8973 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2015-8974 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2015-8975 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2015-8976 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2015-8977 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2015-8979 - http://packetstormsecurity.com/files/140191/DCMTK-storescp-DICOM-storage-C-STORE-SCP-Remote-Stack-Buffer-Overflow.html -CVE-2015-8979 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php -CVE-2015-8994 - http://marc.info/?l=php-internals&m=147921016724565&w=2 -CVE-2015-8994 - http://seclists.org/oss-sec/2016/q4/343 -CVE-2015-8994 - http://seclists.org/oss-sec/2017/q1/520 -CVE-2015-8994 - https://bugs.php.net/bug.php?id=69090 -CVE-2015-9008 - http://www.securityfocus.com/bid/98874 -CVE-2015-9009 - http://www.securityfocus.com/bid/98874 -CVE-2015-9010 - http://www.securityfocus.com/bid/98874 -CVE-2015-9011 - http://www.securityfocus.com/bid/98874 -CVE-2015-9012 - http://www.securityfocus.com/bid/98874 -CVE-2015-9013 - http://www.securityfocus.com/bid/98874 -CVE-2015-9014 - http://www.securityfocus.com/bid/98874 -CVE-2015-9015 - http://www.securityfocus.com/bid/98874 -CVE-2015-9020 - http://www.securityfocus.com/bid/98874 -CVE-2015-9021 - http://www.securityfocus.com/bid/98874 -CVE-2015-9022 - http://www.securityfocus.com/bid/98874 -CVE-2015-9023 - http://www.securityfocus.com/bid/98874 -CVE-2015-9024 - http://www.securityfocus.com/bid/98874 -CVE-2015-9025 - http://www.securityfocus.com/bid/98874 -CVE-2015-9026 - http://www.securityfocus.com/bid/98874 -CVE-2015-9027 - http://www.securityfocus.com/bid/98874 -CVE-2015-9028 - http://www.securityfocus.com/bid/98874 -CVE-2015-9029 - http://www.securityfocus.com/bid/98874 -CVE-2015-9030 - http://www.securityfocus.com/bid/98874 -CVE-2015-9031 - http://www.securityfocus.com/bid/98874 -CVE-2015-9032 - http://www.securityfocus.com/bid/98874 -CVE-2015-9033 - http://www.securityfocus.com/bid/98874 -CVE-2015-9056 - https://www.elastic.co/community/security -CVE-2015-9063 - http://www.securityfocus.com/bid/103671 -CVE-2015-9064 - http://www.securityfocus.com/bid/103671 -CVE-2015-9065 - http://www.securityfocus.com/bid/103671 -CVE-2015-9066 - http://www.securityfocus.com/bid/103671 -CVE-2015-9098 - https://www.exploit-db.com/exploits/42444/ -CVE-2015-9101 - https://blogs.gentoo.org/ago/2017/06/17/lame-heap-based-buffer-overflow-in-fill_buffer_resample-util-c/ -CVE-2015-9101 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2015-9101 -CVE-2015-9108 - http://www.securityfocus.com/bid/103671 -CVE-2015-9109 - http://www.securityfocus.com/bid/103671 -CVE-2015-9110 - http://www.securityfocus.com/bid/103671 -CVE-2015-9111 - http://www.securityfocus.com/bid/103671 -CVE-2015-9112 - http://www.securityfocus.com/bid/103671 -CVE-2015-9113 - http://www.securityfocus.com/bid/103671 -CVE-2015-9114 - http://www.securityfocus.com/bid/103671 -CVE-2015-9115 - http://www.securityfocus.com/bid/103671 -CVE-2015-9116 - http://www.securityfocus.com/bid/103671 -CVE-2015-9118 - http://www.securityfocus.com/bid/103671 -CVE-2015-9119 - http://www.securityfocus.com/bid/103671 -CVE-2015-9120 - http://www.securityfocus.com/bid/103671 -CVE-2015-9122 - http://www.securityfocus.com/bid/103671 -CVE-2015-9123 - http://www.securityfocus.com/bid/103671 -CVE-2015-9124 - http://www.securityfocus.com/bid/103671 -CVE-2015-9126 - http://www.securityfocus.com/bid/103671 -CVE-2015-9127 - http://www.securityfocus.com/bid/103671 -CVE-2015-9128 - http://www.securityfocus.com/bid/103671 -CVE-2015-9129 - http://www.securityfocus.com/bid/103671 -CVE-2015-9130 - http://www.securityfocus.com/bid/103671 -CVE-2015-9131 - http://www.securityfocus.com/bid/103671 -CVE-2015-9132 - http://www.securityfocus.com/bid/103671 -CVE-2015-9133 - http://www.securityfocus.com/bid/103671 -CVE-2015-9134 - http://www.securityfocus.com/bid/103671 -CVE-2015-9135 - http://www.securityfocus.com/bid/103671 -CVE-2015-9136 - http://www.securityfocus.com/bid/103671 -CVE-2015-9137 - http://www.securityfocus.com/bid/103671 -CVE-2015-9138 - http://www.securityfocus.com/bid/103671 -CVE-2015-9139 - http://www.securityfocus.com/bid/103671 -CVE-2015-9140 - http://www.securityfocus.com/bid/103671 -CVE-2015-9141 - http://www.securityfocus.com/bid/103671 -CVE-2015-9142 - http://www.securityfocus.com/bid/103671 -CVE-2015-9143 - http://www.securityfocus.com/bid/103671 -CVE-2015-9144 - http://www.securityfocus.com/bid/103671 -CVE-2015-9145 - http://www.securityfocus.com/bid/103671 -CVE-2015-9146 - http://www.securityfocus.com/bid/103671 -CVE-2015-9147 - http://www.securityfocus.com/bid/103671 -CVE-2015-9148 - http://www.securityfocus.com/bid/103671 -CVE-2015-9149 - http://www.securityfocus.com/bid/103671 -CVE-2015-9150 - http://www.securityfocus.com/bid/103671 -CVE-2015-9151 - http://www.securityfocus.com/bid/103671 -CVE-2015-9152 - http://www.securityfocus.com/bid/103671 -CVE-2015-9153 - http://www.securityfocus.com/bid/103671 -CVE-2015-9156 - http://www.securityfocus.com/bid/103671 -CVE-2015-9157 - http://www.securityfocus.com/bid/103671 -CVE-2015-9158 - http://www.securityfocus.com/bid/103671 -CVE-2015-9159 - http://www.securityfocus.com/bid/103671 -CVE-2015-9160 - http://www.securityfocus.com/bid/103671 -CVE-2015-9161 - http://www.securityfocus.com/bid/103671 -CVE-2015-9162 - http://www.securityfocus.com/bid/103671 -CVE-2015-9163 - http://www.securityfocus.com/bid/103671 -CVE-2015-9164 - http://www.securityfocus.com/bid/103671 -CVE-2015-9165 - http://www.securityfocus.com/bid/103671 -CVE-2015-9166 - http://www.securityfocus.com/bid/103671 -CVE-2015-9167 - http://www.securityfocus.com/bid/103671 -CVE-2015-9169 - http://www.securityfocus.com/bid/103671 -CVE-2015-9170 - http://www.securityfocus.com/bid/103671 -CVE-2015-9171 - http://www.securityfocus.com/bid/103671 -CVE-2015-9172 - http://www.securityfocus.com/bid/103671 -CVE-2015-9173 - http://www.securityfocus.com/bid/103671 -CVE-2015-9174 - http://www.securityfocus.com/bid/103671 -CVE-2015-9175 - http://www.securityfocus.com/bid/103671 -CVE-2015-9176 - http://www.securityfocus.com/bid/103671 -CVE-2015-9177 - http://www.securityfocus.com/bid/103671 -CVE-2015-9178 - http://www.securityfocus.com/bid/103671 -CVE-2015-9179 - http://www.securityfocus.com/bid/103671 -CVE-2015-9180 - http://www.securityfocus.com/bid/103671 -CVE-2015-9181 - http://www.securityfocus.com/bid/103671 -CVE-2015-9182 - http://www.securityfocus.com/bid/103671 -CVE-2015-9183 - http://www.securityfocus.com/bid/103671 -CVE-2015-9184 - http://www.securityfocus.com/bid/103671 -CVE-2015-9185 - http://www.securityfocus.com/bid/103671 -CVE-2015-9186 - http://www.securityfocus.com/bid/103671 -CVE-2015-9187 - http://www.securityfocus.com/bid/103671 -CVE-2015-9188 - http://www.securityfocus.com/bid/103671 -CVE-2015-9189 - http://www.securityfocus.com/bid/103671 -CVE-2015-9190 - http://www.securityfocus.com/bid/103671 -CVE-2015-9191 - http://www.securityfocus.com/bid/103671 -CVE-2015-9192 - http://www.securityfocus.com/bid/103671 -CVE-2015-9193 - http://www.securityfocus.com/bid/103671 -CVE-2015-9194 - http://www.securityfocus.com/bid/103671 -CVE-2015-9195 - http://www.securityfocus.com/bid/103671 -CVE-2015-9196 - http://www.securityfocus.com/bid/103671 -CVE-2015-9197 - http://www.securityfocus.com/bid/103671 -CVE-2015-9198 - http://www.securityfocus.com/bid/103671 -CVE-2015-9199 - http://www.securityfocus.com/bid/103671 -CVE-2015-9200 - http://www.securityfocus.com/bid/103671 -CVE-2015-9201 - http://www.securityfocus.com/bid/103671 -CVE-2015-9202 - http://www.securityfocus.com/bid/103671 -CVE-2015-9203 - http://www.securityfocus.com/bid/103671 -CVE-2015-9204 - http://www.securityfocus.com/bid/103671 -CVE-2015-9205 - http://www.securityfocus.com/bid/103671 -CVE-2015-9206 - http://www.securityfocus.com/bid/103671 -CVE-2015-9207 - http://www.securityfocus.com/bid/103671 -CVE-2015-9208 - http://www.securityfocus.com/bid/103671 -CVE-2015-9209 - http://www.securityfocus.com/bid/103671 -CVE-2015-9210 - http://www.securityfocus.com/bid/103671 -CVE-2015-9211 - http://www.securityfocus.com/bid/103671 -CVE-2015-9212 - http://www.securityfocus.com/bid/103671 -CVE-2015-9213 - http://www.securityfocus.com/bid/103671 -CVE-2015-9215 - http://www.securityfocus.com/bid/103671 -CVE-2015-9216 - http://www.securityfocus.com/bid/103671 -CVE-2015-9217 - http://www.securityfocus.com/bid/103671 -CVE-2015-9218 - http://www.securityfocus.com/bid/103671 -CVE-2015-9219 - http://www.securityfocus.com/bid/103671 -CVE-2015-9220 - http://www.securityfocus.com/bid/103671 -CVE-2015-9221 - http://www.securityfocus.com/bid/103671 -CVE-2015-9222 - http://www.securityfocus.com/bid/103671 -CVE-2015-9222 - https://www.exploit-db.com/exploits/39739/ -CVE-2015-9223 - http://www.securityfocus.com/bid/103671 -CVE-2015-9224 - http://www.securityfocus.com/bid/103671 -CVE-2015-9226 - http://packetstormsecurity.com/files/134362/AlegroCart-1.2.8-SQL-Injection.html -CVE-2015-9226 - http://seclists.org/fulldisclosure/2015/Nov/68 -CVE-2015-9226 - https://www.exploit-db.com/exploits/38727/ -CVE-2015-9227 - http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html -CVE-2015-9227 - http://seclists.org/fulldisclosure/2015/Nov/67 -CVE-2015-9227 - https://www.exploit-db.com/exploits/38728/ -CVE-2015-9228 - http://www.openwall.com/lists/oss-security/2015/10/27/6 -CVE-2015-9228 - https://github.com/cybersecurityworks/Disclosed/issues/6 -CVE-2015-9228 - https://packetstormsecurity.com/files/135061/WordPress-NextGEN-Gallery-2.1.10-Shell-Upload.html -CVE-2015-9228 - https://wpvulndb.com/vulnerabilities/9758 -CVE-2015-9229 - https://cybersecurityworks.com/zerodays/cve-2015-9229-nextgen-gallery.html -CVE-2015-9229 - https://github.com/cybersecurityworks/Disclosed/issues/5 -CVE-2015-9230 - http://www.openwall.com/lists/oss-security/2015/10/27/3 -CVE-2015-9230 - https://cxsecurity.com/issue/WLB-2016010011 -CVE-2015-9230 - https://cybersecurityworks.com/zerodays/cve-2015-9230-bulletproof.html -CVE-2015-9230 - https://forum.ait-pro.com/forums/topic/bps-changelog/ -CVE-2015-9230 - https://github.com/cybersecurityworks/Disclosed/issues/3 -CVE-2015-9230 - https://packetstormsecurity.com/files/135125/BulletProof-Security-.52.4-Cross-Site-Scripting.html -CVE-2015-9230 - https://wpvulndb.com/vulnerabilities/8224 -CVE-2015-9232 - https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt -CVE-2015-9233 - http://seclists.org/fulldisclosure/2015/Jul/49 -CVE-2015-9234 - http://seclists.org/fulldisclosure/2015/Jul/49 -CVE-2015-9236 - https://github.com/hapijs/hapi/issues/2850 -CVE-2015-9251 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html -CVE-2015-9251 - http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html -CVE-2015-9251 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -CVE-2015-9251 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2015-9251 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2015-9251 - https://github.com/jquery/jquery/pull/2588 -CVE-2015-9251 - https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2 -CVE-2015-9251 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2015-9251 - https://seclists.org/bugtraq/2019/May/18 -CVE-2015-9251 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2015-9251 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2015-9251 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2015-9251 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2015-9251 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2015-9251 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2015-9251 - https://www.tenable.com/security/tns-2019-08 -CVE-2015-9253 - https://www.futureweb.at/security/CVE-2015-9253/ -CVE-2015-9260 - https://cybersecurityworks.com/zerodays/cve-2015-9260-bedita.html -CVE-2015-9260 - https://github.com/bedita/bedita/issues/755#issuecomment-148036760 -CVE-2015-9260 - https://github.com/cybersecurityworks/Disclosed/issues/8 -CVE-2015-9261 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2015-9261 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2015-9261 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html -CVE-2015-9261 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2015-9261 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2015-9261 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2015-9261 - http://seclists.org/fulldisclosure/2022/Jun/36 -CVE-2015-9261 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2015-9261 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2015-9263 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php -CVE-2015-9263 - https://www.exploit-db.com/exploits/37888/ -CVE-2015-9266 - https://hackerone.com/reports/73480 -CVE-2015-9266 - https://www.exploit-db.com/exploits/39701/ -CVE-2015-9266 - https://www.exploit-db.com/exploits/39853/ -CVE-2015-9269 - https://seclists.org/fulldisclosure/2015/Jul/97 -CVE-2015-9270 - https://seclists.org/fulldisclosure/2015/Jul/125 -CVE-2015-9272 - https://www.openwall.com/lists/oss-security/2015/04/01/2 -CVE-2015-9285 - https://lists.openwall.net/full-disclosure/2015/12/23/13 -CVE-2015-9286 - https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625 -CVE-2015-9286 - https://www.vulnerability-lab.com/get_content.php?id=1608 -CVE-2015-9297 - https://wpvulndb.com/vulnerabilities/9761 -CVE-2015-9298 - https://wpvulndb.com/vulnerabilities/9761 -CVE-2015-9302 - https://wpvulndb.com/vulnerabilities/8342 -CVE-2015-9304 - https://wpvulndb.com/vulnerabilities/9764 -CVE-2015-9307 - https://wpvulndb.com/vulnerabilities/9766 -CVE-2015-9308 - https://wpvulndb.com/vulnerabilities/9766 -CVE-2015-9309 - https://wpvulndb.com/vulnerabilities/9766 -CVE-2015-9316 - https://www.exploit-db.com/exploits/38678 -CVE-2015-9320 - https://wpvulndb.com/vulnerabilities/9769 -CVE-2015-9324 - https://wpvulndb.com/vulnerabilities/9770 -CVE-2015-9333 - https://wpvulndb.com/vulnerabilities/9773 -CVE-2015-9380 - https://wpvulndb.com/vulnerabilities/7225 -CVE-2015-9383 - https://savannah.nongnu.org/bugs/?46346 -CVE-2015-9384 - https://wpvulndb.com/vulnerabilities/8361 -CVE-2015-9385 - https://wpvulndb.com/vulnerabilities/8359 -CVE-2015-9386 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ -CVE-2015-9387 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ -CVE-2015-9388 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ -CVE-2015-9389 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ -CVE-2015-9391 - https://wpvulndb.com/vulnerabilities/8351 -CVE-2015-9392 - https://seclists.org/bugtraq/2015/Dec/13 -CVE-2015-9392 - https://wpvulndb.com/vulnerabilities/8350 -CVE-2015-9393 - https://wpvulndb.com/vulnerabilities/8350 -CVE-2015-9394 - https://wpvulndb.com/vulnerabilities/8350 -CVE-2015-9395 - https://seclists.org/bugtraq/2015/Dec/12 -CVE-2015-9395 - https://wpvulndb.com/vulnerabilities/8349/ -CVE-2015-9396 - https://wpvulndb.com/vulnerabilities/8344 -CVE-2015-9397 - https://wpvulndb.com/vulnerabilities/8322 -CVE-2015-9398 - https://wpvulndb.com/vulnerabilities/8322 -CVE-2015-9399 - https://wpvulndb.com/vulnerabilities/8316 -CVE-2015-9400 - https://wpvulndb.com/vulnerabilities/8304 -CVE-2015-9401 - https://wpvulndb.com/vulnerabilities/8293 -CVE-2015-9402 - https://seclists.org/bugtraq/2015/Nov/93 -CVE-2015-9402 - https://wpvulndb.com/vulnerabilities/8243 -CVE-2015-9403 - https://packetstormsecurity.com/files/134240/ -CVE-2015-9404 - https://packetstormsecurity.com/files/134240/ -CVE-2015-9405 - https://wpvulndb.com/vulnerabilities/8216 -CVE-2015-9406 - https://packetstormsecurity.com/files/133778/ -CVE-2015-9406 - https://wpvulndb.com/vulnerabilities/9890 -CVE-2015-9407 - https://packetstormsecurity.com/files/133593/ -CVE-2015-9407 - https://wpvulndb.com/vulnerabilities/8194 -CVE-2015-9408 - https://packetstormsecurity.com/files/133593/ -CVE-2015-9408 - https://wpvulndb.com/vulnerabilities/8194 -CVE-2015-9409 - https://packetstormsecurity.com/files/133594/ -CVE-2015-9409 - https://wpvulndb.com/vulnerabilities/8190 -CVE-2015-9410 - https://cybersecurityworks.com/zerodays/cve-2015-9410-blubrry.html -CVE-2015-9410 - https://github.com/cybersecurityworks/Disclosed/issues/7 -CVE-2015-9411 - https://wpvulndb.com/vulnerabilities/8183 -CVE-2015-9412 - https://wpvulndb.com/vulnerabilities/8182 -CVE-2015-9413 - https://packetstormsecurity.com/files/133480/ -CVE-2015-9413 - https://wpvulndb.com/vulnerabilities/8180 -CVE-2015-9414 - https://wpvulndb.com/vulnerabilities/8175 -CVE-2015-9415 - https://wpvulndb.com/vulnerabilities/8174 -CVE-2015-9416 - https://wpvulndb.com/vulnerabilities/8173 -CVE-2015-9417 - https://wpvulndb.com/vulnerabilities/8170 -CVE-2015-9418 - https://advisories.dxw.com/advisories/csrf-in-watu-pro-allows-unauthenticated-attackers-to-delete-quizzes/ -CVE-2015-9419 - https://packetstormsecurity.com/files/133362/ -CVE-2015-9420 - https://wpvulndb.com/vulnerabilities/8306 -CVE-2015-9421 - https://wpvulndb.com/vulnerabilities/8338 -CVE-2015-9422 - https://wpvulndb.com/vulnerabilities/8331 -CVE-2015-9423 - https://wpvulndb.com/vulnerabilities/8331 -CVE-2015-9424 - https://wpvulndb.com/vulnerabilities/8330 -CVE-2015-9425 - https://wpvulndb.com/vulnerabilities/8327 -CVE-2015-9426 - https://wpvulndb.com/vulnerabilities/8297 -CVE-2015-9427 - http://packetstormsecurity.com/files/133267/ -CVE-2015-9427 - https://wpvulndb.com/vulnerabilities/8158 -CVE-2015-9428 - https://wpvulndb.com/vulnerabilities/8291 -CVE-2015-9429 - https://wpvulndb.com/vulnerabilities/8285 -CVE-2015-9430 - https://wpvulndb.com/vulnerabilities/8281 -CVE-2015-9431 - https://wpvulndb.com/vulnerabilities/8279 -CVE-2015-9432 - https://wpvulndb.com/vulnerabilities/8268 -CVE-2015-9433 - https://wpvulndb.com/vulnerabilities/8252 -CVE-2015-9434 - https://wpvulndb.com/vulnerabilities/8290 -CVE-2015-9435 - https://security.dxw.com/advisories/the-oauth2-complete-plugin-for-wordpress-uses-a-pseudorandom-number-generator-which-is-non-cryptographically-secure/ -CVE-2015-9436 - https://wpvulndb.com/vulnerabilities/8258 -CVE-2015-9437 - https://wpvulndb.com/vulnerabilities/8258 -CVE-2015-9438 - https://wpvulndb.com/vulnerabilities/8247 -CVE-2015-9439 - https://wpvulndb.com/vulnerabilities/8246 -CVE-2015-9440 - http://packetstormsecurity.com/files/133002/ -CVE-2015-9441 - http://packetstormsecurity.com/files/133001/ -CVE-2015-9442 - http://packetstormsecurity.com/files/132992/ -CVE-2015-9443 - http://packetstormsecurity.com/files/132911/ -CVE-2015-9444 - http://packetstormsecurity.com/files/132908/ -CVE-2015-9445 - http://packetstormsecurity.com/files/132842/ -CVE-2015-9445 - https://wpvulndb.com/vulnerabilities/8113 -CVE-2015-9446 - http://packetstormsecurity.com/files/132842/ -CVE-2015-9446 - https://wpvulndb.com/vulnerabilities/8113 -CVE-2015-9447 - http://packetstormsecurity.com/files/132842/ -CVE-2015-9447 - https://wpvulndb.com/vulnerabilities/8113 -CVE-2015-9448 - https://wpvulndb.com/vulnerabilities/8324 -CVE-2015-9449 - https://wpvulndb.com/vulnerabilities/8321 -CVE-2015-9450 - https://wpvulndb.com/vulnerabilities/8340 -CVE-2015-9451 - https://wpvulndb.com/vulnerabilities/8340 -CVE-2015-9452 - https://wpvulndb.com/vulnerabilities/8336 -CVE-2015-9453 - https://wpvulndb.com/vulnerabilities/8333 -CVE-2015-9454 - https://wpvulndb.com/vulnerabilities/8284 -CVE-2015-9455 - https://security.dxw.com/advisories/csrf-and-arbitrary-file-deletion-in-buddypress-activity-plus-1-5/ -CVE-2015-9456 - https://wpvulndb.com/vulnerabilities/8315 -CVE-2015-9457 - https://wpvulndb.com/vulnerabilities/8249 -CVE-2015-9460 - https://wpvulndb.com/vulnerabilities/8339 -CVE-2015-9461 - https://wpvulndb.com/vulnerabilities/8311 -CVE-2015-9462 - https://wpvulndb.com/vulnerabilities/8311 -CVE-2015-9463 - http://packetstormsecurity.com/files/132578/ -CVE-2015-9464 - https://www.exploit-db.com/exploits/37494 -CVE-2015-9465 - https://wpvulndb.com/vulnerabilities/8309 -CVE-2015-9466 - https://wpvulndb.com/vulnerabilities/8318 -CVE-2015-9467 - https://wpvulndb.com/vulnerabilities/8320 -CVE-2015-9469 - https://packetstormsecurity.com/files/132910/ -CVE-2015-9470 - https://packetstormsecurity.com/files/132279/ -CVE-2015-9471 - https://packetstormsecurity.com/files/132124/ -CVE-2015-9471 - https://wpvulndb.com/vulnerabilities/8019 -CVE-2015-9472 - https://wpvulndb.com/vulnerabilities/8015 -CVE-2015-9473 - https://packetstormsecurity.com/files/132042/ -CVE-2015-9474 - https://wpvulndb.com/vulnerabilities/8061 -CVE-2015-9475 - https://wpvulndb.com/vulnerabilities/8061 -CVE-2015-9476 - https://wpvulndb.com/vulnerabilities/8061 -CVE-2015-9477 - https://wpvulndb.com/vulnerabilities/8061 -CVE-2015-9479 - https://packetstormsecurity.com/files/132590/ -CVE-2015-9480 - https://www.exploit-db.com/exploits/37252 -CVE-2015-9481 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9482 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9483 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9484 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9485 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9486 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9487 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9488 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9489 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9490 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9491 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9492 - https://packetstormsecurity.com/files/131957/ -CVE-2015-9493 - https://wpvulndb.com/vulnerabilities/7937 -CVE-2015-9494 - https://wpvulndb.com/vulnerabilities/7982 -CVE-2015-9495 - https://wpvulndb.com/vulnerabilities/7981 -CVE-2015-9496 - https://wpvulndb.com/vulnerabilities/7972 -CVE-2015-9496 - https://www.exploit-db.com/exploits/36942 -CVE-2015-9497 - https://packetstormsecurity.com/files/131798/ -CVE-2015-9497 - https://wpvulndb.com/vulnerabilities/7974 -CVE-2015-9498 - https://wpvulndb.com/vulnerabilities/8011 -CVE-2015-9499 - https://wpvulndb.com/vulnerabilities/7955 -CVE-2015-9499 - https://www.exploit-db.com/exploits/35385 -CVE-2015-9500 - https://packetstormsecurity.com/files/131657/ -CVE-2015-9501 - https://wpvulndb.com/vulnerabilities/7994 -CVE-2015-9502 - https://wpvulndb.com/vulnerabilities/7987 -CVE-2015-9503 - https://wpvulndb.com/vulnerabilities/7986 -CVE-2015-9504 - https://wpvulndb.com/vulnerabilities/7957 -CVE-2015-9537 - https://cybersecurityworks.com/zerodays/cve-2015-9537-nextgen.html -CVE-2015-9537 - https://github.com/cybersecurityworks/Disclosed/issues/1 -CVE-2015-9537 - https://www.openwall.com/lists/oss-security/2015/10/27/4 -CVE-2015-9538 - https://cxsecurity.com/issue/WLB-2015080165 -CVE-2015-9538 - https://cybersecurityworks.com/zerodays/cve-2015-9538-nextgen.html -CVE-2015-9538 - https://github.com/cybersecurityworks/Disclosed/issues/2 -CVE-2015-9538 - https://packetstormsecurity.com/files/135114/WordPress-NextGEN-Gallery-2.1.15-Cross-Site-Scripting-Path-Traversal.html -CVE-2015-9538 - https://www.openwall.com/lists/oss-security/2015/08/28/4 -CVE-2015-9538 - https://www.openwall.com/lists/oss-security/2015/09/01/7 -CVE-2015-9539 - https://cybersecurityworks.com/zerodays/cve-2015-9539-fastsecure.html -CVE-2015-9539 - https://github.com/cybersecurityworks/Disclosed/issues/4 -CVE-2015-9539 - https://www.openwall.com/lists/oss-security/2015/10/27/2 -CVE-2015-9544 - https://github.com/ofirdagan/cross-domain-local-storage/issues/17 -CVE-2015-9544 - https://github.com/ofirdagan/cross-domain-local-storage/pull/19 -CVE-2015-9544 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe -CVE-2015-9545 - https://github.com/ofirdagan/cross-domain-local-storage/issues/17 -CVE-2015-9545 - https://github.com/ofirdagan/cross-domain-local-storage/pull/19 -CVE-2015-9545 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client -CVE-2015-9546 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2015-9547 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2015-9548 - https://mattermost.com/security-updates/ -CVE-2015-9549 - https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html -CVE-2015-9549 - https://github.com/cybersecurityworks/Disclosed/issues/11 -CVE-2015-9549 - https://www.openwall.com/lists/oss-security/2015/12/19/2 -CVE-2016-0006 - https://www.exploit-db.com/exploits/39311/ -CVE-2016-0007 - https://code.google.com/p/google-security-research/issues/detail?id=589 -CVE-2016-0007 - https://www.exploit-db.com/exploits/39310/ -CVE-2016-0007 - https://www.exploit-db.com/exploits/39311/ -CVE-2016-0015 - http://packetstormsecurity.com/files/135232/Microsoft-DirectShow-Remote-Code-Execution.html -CVE-2016-0015 - https://www.exploit-db.com/exploits/39232/ -CVE-2016-0016 - https://www.exploit-db.com/exploits/39233/ -CVE-2016-0040 - https://www.exploit-db.com/exploits/44586/ -CVE-2016-0049 - http://packetstormsecurity.com/files/135797/Windows-Kerberos-Security-Feature-Bypass.html -CVE-2016-0049 - https://www.exploit-db.com/exploits/39442/ -CVE-2016-0051 - https://www.exploit-db.com/exploits/39432/ -CVE-2016-0051 - https://www.exploit-db.com/exploits/39788/ -CVE-2016-0051 - https://www.exploit-db.com/exploits/40085/ -CVE-2016-0063 - https://www.exploit-db.com/exploits/40845/ -CVE-2016-0073 - https://www.exploit-db.com/exploits/40574/ -CVE-2016-0075 - https://www.exploit-db.com/exploits/40573/ -CVE-2016-0079 - https://www.exploit-db.com/exploits/40608/ -CVE-2016-0093 - https://www.exploit-db.com/exploits/39648/ -CVE-2016-0094 - https://www.exploit-db.com/exploits/39647/ -CVE-2016-0099 - https://www.exploit-db.com/exploits/39574/ -CVE-2016-0099 - https://www.exploit-db.com/exploits/39719/ -CVE-2016-0099 - https://www.exploit-db.com/exploits/39809/ -CVE-2016-0099 - https://www.exploit-db.com/exploits/40107/ -CVE-2016-0108 - https://www.exploit-db.com/exploits/39562/ -CVE-2016-0111 - https://www.exploit-db.com/exploits/39663/ -CVE-2016-0120 - https://www.exploit-db.com/exploits/39561/ -CVE-2016-0121 - https://www.exploit-db.com/exploits/39560/ -CVE-2016-0122 - https://www.exploit-db.com/exploits/39694/ -CVE-2016-0128 - https://www.kb.cert.org/vuls/id/813296 -CVE-2016-0143 - https://www.exploit-db.com/exploits/39712/ -CVE-2016-0145 - https://www.exploit-db.com/exploits/39743/ -CVE-2016-0148 - http://packetstormsecurity.com/files/136671/.NET-Framework-4.6-DLL-Hijacking.html -CVE-2016-0151 - https://www.exploit-db.com/exploits/39740/ -CVE-2016-0153 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-044 -CVE-2016-0160 - http://packetstormsecurity.com/files/136702/Microsoft-Internet-Explorer-11-DLL-Hijacking.html -CVE-2016-0160 - http://seclists.org/fulldisclosure/2016/Apr/61 -CVE-2016-0165 - https://www.exploit-db.com/exploits/44480/ -CVE-2016-0168 - http://packetstormsecurity.com/files/137094/Microsoft-Windows-gdi32.dll-Information-Disclosure.html -CVE-2016-0169 - http://packetstormsecurity.com/files/137095/Microsoft-Windows-gdi32.dll-Data-Copy.html -CVE-2016-0170 - http://packetstormsecurity.com/files/137096/Microsoft-Windows-gdi32.dll-ExtEscape-Buffer-Overflow.html -CVE-2016-0171 - http://packetstormsecurity.com/files/137502/Windows-7-win32k-Bitmap-Use-After-Free.html -CVE-2016-0171 - https://www.exploit-db.com/exploits/39959/ -CVE-2016-0173 - http://packetstormsecurity.com/files/137503/Windows-7-win32k-Bitmap-Use-After-Free.html -CVE-2016-0173 - https://www.exploit-db.com/exploits/39960/ -CVE-2016-0185 - https://www.exploit-db.com/exploits/39805/ -CVE-2016-0189 - https://www.exploit-db.com/exploits/40118/ -CVE-2016-0189 - https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/ -CVE-2016-0199 - http://packetstormsecurity.com/files/137533/Microsoft-Internet-Explorer-11-Garbage-Collector-Attribute-Type-Confusion.html -CVE-2016-0199 - http://seclists.org/fulldisclosure/2016/Jun/44 -CVE-2016-0199 - https://www.exploit-db.com/exploits/39994/ -CVE-2016-0219 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 -CVE-2016-0237 - http://www-01.ibm.com/support/docview.wss?uid=swg21981631 -CVE-2016-0354 - http://www.securityfocus.com/bid/100599 -CVE-2016-0355 - http://www.securityfocus.com/bid/100599 -CVE-2016-0356 - http://www.securityfocus.com/bid/100599 -CVE-2016-0363 - http://seclists.org/fulldisclosure/2016/Apr/3 -CVE-2016-0376 - http://seclists.org/fulldisclosure/2016/Apr/43 -CVE-2016-0392 - http://packetstormsecurity.com/files/137373/IBM-GPFS-Spectrum-Scale-Command-Injection.html -CVE-2016-0400 - https://www.exploit-db.com/exploits/40039/ -CVE-2016-0401 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0402 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0402 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0403 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0404 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0405 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0406 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0407 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0408 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0409 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0411 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0412 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0413 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0414 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0415 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0416 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0417 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0418 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0419 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0420 - http://packetstormsecurity.com/files/138509/JD-Edwards-9.1-EnterpriseOne-Server-Create-Users.html -CVE-2016-0420 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0421 - http://packetstormsecurity.com/files/138508/JD-Edwards-9.1-EnterpriseOne-Server-Manager-Shutdown.html -CVE-2016-0421 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0422 - http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html -CVE-2016-0422 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0423 - http://packetstormsecurity.com/files/138512/JD-Edwards-9.1-EnterpriseOne-Server-JDENET-Denial-Of-Service.html -CVE-2016-0423 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0424 - http://packetstormsecurity.com/files/138510/JD-Edwards-9.1-EnterpriseOne-Server-Denial-Of-Service.html -CVE-2016-0424 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0425 - http://packetstormsecurity.com/files/138511/JD-Edwards-9.1-EnterpriseOne-Server-Password-Disclosure.html -CVE-2016-0425 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0426 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0427 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0428 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0429 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0430 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0431 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0432 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0433 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0434 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0435 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0436 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0437 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0438 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0439 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0440 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0441 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0442 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0443 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0444 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0445 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0446 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0447 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0448 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0448 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0449 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0450 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0451 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0452 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0453 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0454 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0455 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0456 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0456 - https://erpscan.io/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/ -CVE-2016-0457 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0457 - https://erpscan.io/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/ -CVE-2016-0458 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0459 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0460 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0461 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0462 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0463 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0464 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0465 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0466 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0466 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0467 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0468 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0469 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0470 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0471 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0472 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0473 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0474 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0475 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0475 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0476 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0477 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0478 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0479 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0480 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0481 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0482 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0483 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0483 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0484 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0485 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0486 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0487 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0488 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0489 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0490 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0491 - http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html -CVE-2016-0491 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0491 - https://www.exploit-db.com/exploits/39691/ -CVE-2016-0491 - https://www.exploit-db.com/exploits/39852/ -CVE-2016-0492 - http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html -CVE-2016-0492 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0492 - https://www.exploit-db.com/exploits/39691/ -CVE-2016-0492 - https://www.exploit-db.com/exploits/39852/ -CVE-2016-0493 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0494 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0494 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0495 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0496 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0497 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0498 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0499 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0500 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0501 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0502 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0503 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0504 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0505 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0505 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0506 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0507 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0508 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0509 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0510 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0511 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0512 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0513 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0514 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0515 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0516 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0517 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0518 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0519 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0520 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0521 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0522 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0523 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0524 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0525 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0526 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0527 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0528 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0529 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0530 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0531 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0532 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0533 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0534 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0535 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0536 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0537 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0538 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0539 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0540 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0541 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0542 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0543 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0544 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0545 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0546 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0546 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0546 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0547 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0548 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0549 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0550 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0551 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0552 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0553 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0554 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0555 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0556 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0557 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0558 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0559 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0560 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0561 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0562 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0563 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0564 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0565 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0566 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0567 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0568 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0569 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0570 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0571 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0572 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0573 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0574 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0575 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0576 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0577 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0578 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0579 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0580 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0581 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0582 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0583 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0584 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0585 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0586 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0587 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0588 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0589 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0590 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0591 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0592 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0594 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0595 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0596 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0596 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0596 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0597 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0597 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0597 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0598 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0598 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0598 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0599 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0600 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0600 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0601 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0602 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0605 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0606 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0606 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0606 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0607 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0608 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0608 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0608 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0609 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0609 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0609 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0610 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0611 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0614 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0616 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0616 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0616 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0617 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0618 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -CVE-2016-0623 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-0635 - http://www.securityfocus.com/bid/91787 -CVE-2016-0635 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-0636 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0638 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0639 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0640 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0640 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0641 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0641 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0642 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0643 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0644 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0646 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0646 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0647 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0647 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0648 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0648 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0649 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0649 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0650 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0650 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0651 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0652 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0653 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0654 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0655 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0656 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0657 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0658 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0659 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0661 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0662 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0663 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0665 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0666 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0666 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0667 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0668 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0669 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0671 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0672 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0673 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0674 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0675 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0676 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0677 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0678 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0679 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0680 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0681 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0682 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0683 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0684 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0685 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0686 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0686 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0687 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0687 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0688 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0689 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0690 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0691 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0692 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0693 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0694 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0695 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0695 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0696 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0697 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0698 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0699 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0700 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0701 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0701 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-0701 - http://www.securityfocus.com/bid/91787 -CVE-2016-0701 - https://www.kb.cert.org/vuls/id/257823 -CVE-2016-0701 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-0701 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-0701 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-0701 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-0702 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0702 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0702 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0702 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-0702 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0703 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-0703 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0703 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-0703 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0703 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0704 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-0704 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0704 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-0704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0704 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0705 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0705 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0705 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0705 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0705 - http://www.securityfocus.com/bid/91787 -CVE-2016-0705 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 -CVE-2016-0705 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-0705 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0706 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-0706 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-0706 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-0706 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0709 - http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and -CVE-2016-0709 - http://packetstormsecurity.com/files/136489/Apache-Jetspeed-Arbitrary-File-Upload.html -CVE-2016-0709 - https://www.exploit-db.com/exploits/39643/ -CVE-2016-0710 - http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and -CVE-2016-0710 - http://packetstormsecurity.com/files/136489/Apache-Jetspeed-Arbitrary-File-Upload.html -CVE-2016-0710 - https://www.exploit-db.com/exploits/39643/ -CVE-2016-0714 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-0714 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-0714 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-0714 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0718 - http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html -CVE-2016-0718 - http://seclists.org/fulldisclosure/2017/Feb/68 -CVE-2016-0718 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-0718 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-0718 - http://www.ubuntu.com/usn/USN-2983-1 -CVE-2016-0718 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2016-0718 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-0723 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0723 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-0723 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-0723 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2016-0727 - http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html -CVE-2016-0728 - http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/ -CVE-2016-0728 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0728 - http://www.ubuntu.com/usn/USN-2872-2 -CVE-2016-0728 - https://security.netapp.com/advisory/ntap-20160211-0001/ -CVE-2016-0728 - https://www.exploit-db.com/exploits/39277/ -CVE-2016-0729 - http://packetstormsecurity.com/files/135949/Apache-Xerces-C-XML-Parser-Buffer-Overflow.html -CVE-2016-0729 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-0729 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0729 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-0736 - https://www.exploit-db.com/exploits/40961/ -CVE-2016-0737 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0738 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0741 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0742 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2016-0746 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2016-0747 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2016-0749 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0752 - https://www.exploit-db.com/exploits/40561/ -CVE-2016-0755 - http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html -CVE-2016-0755 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-0758 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0762 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2016-0762 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-0763 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-0763 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-0773 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0774 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0777 - http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html -CVE-2016-0777 - http://seclists.org/fulldisclosure/2016/Jan/44 -CVE-2016-0777 - http://www.openwall.com/lists/oss-security/2016/01/14/7 -CVE-2016-0777 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2016-0777 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0777 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2016-0777 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-0778 - http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html -CVE-2016-0778 - http://seclists.org/fulldisclosure/2016/Jan/44 -CVE-2016-0778 - http://www.openwall.com/lists/oss-security/2016/01/14/7 -CVE-2016-0778 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html -CVE-2016-0778 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0778 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2016-0778 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-0779 - http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html -CVE-2016-0782 - http://packetstormsecurity.com/files/136215/Apache-ActiveMQ-5.13.0-Cross-Site-Scripting.html -CVE-2016-0783 - http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code -CVE-2016-0783 - http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html -CVE-2016-0784 - http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code -CVE-2016-0784 - http://packetstormsecurity.com/files/136484/Apache-OpenMeetings-3.1.0-Path-Traversal.html -CVE-2016-0784 - https://www.exploit-db.com/exploits/39642/ -CVE-2016-0787 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0792 - https://www.exploit-db.com/exploits/42394/ -CVE-2016-0792 - https://www.exploit-db.com/exploits/43375/ -CVE-2016-0793 - http://packetstormsecurity.com/files/136323/Wildfly-Filter-Restriction-Bypass-Information-Disclosure.html -CVE-2016-0793 - https://www.exploit-db.com/exploits/39573/ -CVE-2016-0796 - http://www.vapidlabs.com/advisory.php?v=162 -CVE-2016-0797 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0797 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-0797 - http://www.securityfocus.com/bid/91787 -CVE-2016-0797 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-0797 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0798 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0798 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0798 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0798 - http://www.securityfocus.com/bid/91787 -CVE-2016-0798 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0799 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0799 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-0799 - http://www.securityfocus.com/bid/91787 -CVE-2016-0799 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 -CVE-2016-0799 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-0799 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0800 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-0800 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-0800 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-0800 - http://www.securityfocus.com/bid/91787 -CVE-2016-0800 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953 -CVE-2016-0800 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554 -CVE-2016-0800 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2016-0800 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 -CVE-2016-0800 - https://www.kb.cert.org/vuls/id/583776 -CVE-2016-0801 - https://www.exploit-db.com/exploits/39801/ -CVE-2016-0821 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-0823 - http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html -CVE-2016-0846 - https://www.exploit-db.com/exploits/39686/ -CVE-2016-0854 - https://www.exploit-db.com/exploits/39735/ -CVE-2016-0861 - http://packetstormsecurity.com/files/135586/GE-Industrial-Solutions-UPS-SNMP-Adapter-Command-Injection.html -CVE-2016-0861 - http://seclists.org/fulldisclosure/2016/Feb/21 -CVE-2016-0861 - https://www.exploit-db.com/exploits/39408/ -CVE-2016-0862 - http://packetstormsecurity.com/files/135586/GE-Industrial-Solutions-UPS-SNMP-Adapter-Command-Injection.html -CVE-2016-0862 - http://seclists.org/fulldisclosure/2016/Feb/21 -CVE-2016-0862 - https://www.exploit-db.com/exploits/39408/ -CVE-2016-0887 - http://packetstormsecurity.com/files/136656/RSA-BSAFE-Lenstras-Attack.html -CVE-2016-0891 - http://packetstormsecurity.com/files/136837/EMC-ViPR-SRM-Cross-Site-Request-Forgery.html -CVE-2016-0891 - https://www.exploit-db.com/exploits/39738/ -CVE-2016-0891 - https://www.securify.nl/advisory/SFY20141109/emc_m_r__watch4net__lacks_c%20ross_site_request_forgery_protection.html -CVE-2016-0892 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html -CVE-2016-0893 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html -CVE-2016-0894 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html -CVE-2016-0895 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html -CVE-2016-0900 - http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html -CVE-2016-0901 - http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html -CVE-2016-0902 - http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html -CVE-2016-0926 - https://pivotal.io/security/cve-2016-0926 -CVE-2016-0951 - https://www.exploit-db.com/exploits/39429/ -CVE-2016-0952 - https://www.exploit-db.com/exploits/39430/ -CVE-2016-0953 - https://www.exploit-db.com/exploits/39431/ -CVE-2016-0954 - https://www.exploit-db.com/exploits/39533/ -CVE-2016-0956 - http://packetstormsecurity.com/files/135720/Apache-Sling-Framework-2.3.6-Information-Disclosure.html -CVE-2016-0956 - http://seclists.org/fulldisclosure/2016/Feb/48 -CVE-2016-0956 - https://www.exploit-db.com/exploits/39435/ -CVE-2016-0964 - https://www.exploit-db.com/exploits/39467/ -CVE-2016-0965 - https://www.exploit-db.com/exploits/39460/ -CVE-2016-0967 - https://www.exploit-db.com/exploits/39466/ -CVE-2016-0971 - https://www.exploit-db.com/exploits/39465/ -CVE-2016-0974 - https://www.exploit-db.com/exploits/39463/ -CVE-2016-0984 - https://www.exploit-db.com/exploits/39462/ -CVE-2016-0985 - https://www.exploit-db.com/exploits/39461/ -CVE-2016-0997 - https://www.exploit-db.com/exploits/39613/ -CVE-2016-0998 - https://www.exploit-db.com/exploits/39612/ -CVE-2016-0998 - https://www.exploit-db.com/exploits/39631/ -CVE-2016-0999 - https://www.exploit-db.com/exploits/39611/ -CVE-2016-1000 - https://www.exploit-db.com/exploits/39610/ -CVE-2016-1000000 - https://www.tenable.com/security/research/tra-2016-15 -CVE-2016-1000028 - http://www.securityfocus.com/bid/92134 -CVE-2016-1000028 - https://www.tenable.com/security/tns-2016-11 -CVE-2016-1000029 - http://www.securityfocus.com/bid/92134 -CVE-2016-1000029 - https://www.tenable.com/security/tns-2016-11 -CVE-2016-1000031 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-1000031 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-1000031 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-1000031 - https://www.tenable.com/security/research/tra-2016-23 -CVE-2016-1000031 - https://www.tenable.com/security/research/tra-2016-30 -CVE-2016-1000107 - https://httpoxy.org/ -CVE-2016-1000109 - https://httpoxy.org/ -CVE-2016-1000110 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 -CVE-2016-1000113 - http://www.vapidlabs.com/advisory.php?v=164 -CVE-2016-1000114 - http://www.vapidlabs.com/advisory.php?v=164 -CVE-2016-1000123 - https://www.exploit-db.com/exploits/42596/ -CVE-2016-1000124 - https://www.exploit-db.com/exploits/42597/ -CVE-2016-1000125 - https://www.exploit-db.com/exploits/42598/ -CVE-2016-1000131 - http://www.securityfocus.com/bid/93867 -CVE-2016-1000218 - https://www.elastic.co/community/security -CVE-2016-1000219 - https://www.elastic.co/community/security -CVE-2016-1000220 - https://www.elastic.co/community/security -CVE-2016-1000221 - https://www.elastic.co/community/security -CVE-2016-1000222 - https://www.elastic.co/community/security -CVE-2016-1000271 - https://packetstormsecurity.com/files/140141/Joomla-DT-Register-SQL-Injection.html -CVE-2016-1000338 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000339 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000340 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000341 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000342 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000343 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000344 - https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f -CVE-2016-1000344 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000345 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000346 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-1000352 - https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f -CVE-2016-1000352 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-10005 - http://packetstormsecurity.com/files/140232/SAP-Solman-7.31-Information-Disclosure.html -CVE-2016-10005 - http://seclists.org/fulldisclosure/2016/Dec/69 -CVE-2016-10005 - https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/ -CVE-2016-10007 - https://security.elarlang.eu/cve-2016-10007-and-cve-2016-10008-2-sql-injection-vulnerabilities-in-dotcms-blacklist-defence-bypass.html -CVE-2016-10008 - https://security.elarlang.eu/cve-2016-10007-and-cve-2016-10008-2-sql-injection-vulnerabilities-in-dotcms-blacklist-defence-bypass.html -CVE-2016-10009 - http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html -CVE-2016-10009 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html -CVE-2016-10009 - https://www.exploit-db.com/exploits/40963/ -CVE-2016-1001 - https://www.exploit-db.com/exploits/39609/ -CVE-2016-10010 - http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html -CVE-2016-10010 - https://www.exploit-db.com/exploits/40962/ -CVE-2016-1002 - https://www.exploit-db.com/exploits/39608/ -CVE-2016-10027 - https://issues.igniterealtime.org/projects/SMACK/issues/SMACK-739 -CVE-2016-10030 - https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee -CVE-2016-10031 - http://forum.wampserver.com/read.php?2,144473 -CVE-2016-10031 - https://packetstormsecurity.com/files/140279/Wampserver-3.0.6-Privilege-Escalation.html -CVE-2016-10031 - https://www.exploit-db.com/exploits/40967/ -CVE-2016-10033 - http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html -CVE-2016-10033 - http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html -CVE-2016-10033 - http://seclists.org/fulldisclosure/2016/Dec/78 -CVE-2016-10033 - https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html -CVE-2016-10033 - https://www.exploit-db.com/exploits/40968/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/40969/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/40970/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/40974/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/40986/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/41962/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/41996/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/42024/ -CVE-2016-10033 - https://www.exploit-db.com/exploits/42221/ -CVE-2016-10034 - https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html -CVE-2016-10034 - https://www.exploit-db.com/exploits/40979/ -CVE-2016-10034 - https://www.exploit-db.com/exploits/40986/ -CVE-2016-10034 - https://www.exploit-db.com/exploits/42221/ -CVE-2016-10036 - http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html -CVE-2016-10036 - https://www.exploit-db.com/exploits/44543/ -CVE-2016-10043 - https://www.exploit-db.com/exploits/41179/ -CVE-2016-10045 - http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html -CVE-2016-10045 - http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html -CVE-2016-10045 - http://seclists.org/fulldisclosure/2016/Dec/81 -CVE-2016-10045 - https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html -CVE-2016-10045 - https://www.exploit-db.com/exploits/40969/ -CVE-2016-10045 - https://www.exploit-db.com/exploits/40986/ -CVE-2016-10045 - https://www.exploit-db.com/exploits/42221/ -CVE-2016-10063 - https://bugzilla.redhat.com/show_bug.cgi?id=1410476 -CVE-2016-10072 - http://forum.wampserver.com/read.php?2,144473 -CVE-2016-10072 - https://packetstormsecurity.com/files/138948/wampserver306-insecure.txt -CVE-2016-10073 - http://packetstormsecurity.com/files/142486/Vanilla-Forums-2.3-Remote-Code-Execution.html -CVE-2016-10073 - https://exploitbox.io/vuln/Vanilla-Forums-Exploit-Host-Header-Injection-CVE-2016-10073-0day.html -CVE-2016-10073 - https://www.exploit-db.com/exploits/41996/ -CVE-2016-10074 - http://packetstormsecurity.com/files/140290/SwiftMailer-Remote-Code-Execution.html -CVE-2016-10074 - http://seclists.org/fulldisclosure/2016/Dec/86 -CVE-2016-10074 - https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html -CVE-2016-10074 - https://www.exploit-db.com/exploits/40972/ -CVE-2016-10074 - https://www.exploit-db.com/exploits/40986/ -CVE-2016-10074 - https://www.exploit-db.com/exploits/42221/ -CVE-2016-10079 - https://www.exploit-db.com/exploits/41030/ -CVE-2016-10081 - https://www.exploit-db.com/exploits/41435/ -CVE-2016-10092 - http://bugzilla.maptools.org/show_bug.cgi?id=2620 -CVE-2016-10092 - http://bugzilla.maptools.org/show_bug.cgi?id=2622 -CVE-2016-10092 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10092 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092 -CVE-2016-10092 - https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a -CVE-2016-10093 - http://bugzilla.maptools.org/show_bug.cgi?id=2610 -CVE-2016-10093 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10093 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093 -CVE-2016-10094 - http://bugzilla.maptools.org/show_bug.cgi?id=2640 -CVE-2016-10094 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10095 - http://bugzilla.maptools.org/show_bug.cgi?id=2625 -CVE-2016-10095 - http://www.openwall.com/lists/oss-security/2017/01/01/7 -CVE-2016-10095 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-stack-based-buffer-overflow-in-_tiffvgetfield-tif_dir-c/ -CVE-2016-10096 - https://github.com/semplon/GeniXCMS/issues/58 -CVE-2016-10097 - http://www.cloudscan.me/2016/03/xxe-dork-open-am-1010-xml-injection.html -CVE-2016-10108 - http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html -CVE-2016-1011 - http://packetstormsecurity.com/files/137050/Adobe-Flash-MovieClip.duplicateMovieClip-Use-After-Free.html -CVE-2016-1011 - https://www.exploit-db.com/exploits/39779/ -CVE-2016-10114 - https://github.com/qemm/joomlasqli -CVE-2016-10114 - https://www.exploit-db.com/exploits/40973/ -CVE-2016-10127 - https://github.com/rohe/pysaml2/issues/366 -CVE-2016-1013 - https://www.exploit-db.com/exploits/39778/ -CVE-2016-10131 - https://gist.github.com/Zenexer/40d02da5e07f151adeaeeaa11af9ab36 -CVE-2016-10131 - https://github.com/bcit-ci/CodeIgniter/issues/4963 -CVE-2016-10133 - https://bugs.ghostscript.com/show_bug.cgi?id=697401 -CVE-2016-10134 - https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html -CVE-2016-10136 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html -CVE-2016-10137 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html -CVE-2016-10138 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html -CVE-2016-10139 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html -CVE-2016-1014 - http://packetstormsecurity.com/files/137532/Adobe-Flash-Player-DLL-Hijacking.html -CVE-2016-1014 - http://seclists.org/fulldisclosure/2016/Jun/39 -CVE-2016-10140 - http://seclists.org/bugtraq/2017/Feb/6 -CVE-2016-10140 - http://seclists.org/fulldisclosure/2017/Feb/11 -CVE-2016-10141 - https://bugs.ghostscript.com/show_bug.cgi?id=697448 -CVE-2016-10142 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 -CVE-2016-10144 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485 -CVE-2016-10145 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851483 -CVE-2016-10148 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html -CVE-2016-10149 - https://github.com/rohe/pysaml2/issues/366 -CVE-2016-10151 - https://github.com/achernya/hesiod/pull/9 -CVE-2016-10152 - https://github.com/achernya/hesiod/pull/10 -CVE-2016-10156 - https://bugzilla.suse.com/show_bug.cgi?id=1020601 -CVE-2016-10156 - https://www.exploit-db.com/exploits/41171/ -CVE-2016-10157 - https://packetstormsecurity.com/files/140366/Akamai-NetSession-1.9.3.1-DLL-Hijacking.html -CVE-2016-10161 - https://hackerone.com/reports/200909 -CVE-2016-10162 - https://hackerone.com/reports/195688 -CVE-2016-10164 - http://www.openwall.com/lists/oss-security/2017/01/22/2 -CVE-2016-10165 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-10173 - https://github.com/halostatue/minitar/issues/16 -CVE-2016-10174 - http://seclists.org/fulldisclosure/2016/Dec/72 -CVE-2016-10174 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt -CVE-2016-10174 - https://www.exploit-db.com/exploits/40949/ -CVE-2016-10174 - https://www.exploit-db.com/exploits/41719/ -CVE-2016-10175 - http://seclists.org/fulldisclosure/2016/Dec/72 -CVE-2016-10175 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt -CVE-2016-10175 - https://www.exploit-db.com/exploits/40949/ -CVE-2016-10176 - http://seclists.org/fulldisclosure/2016/Dec/72 -CVE-2016-10176 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt -CVE-2016-10176 - https://www.exploit-db.com/exploits/40949/ -CVE-2016-10177 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10178 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10179 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10180 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10181 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10182 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10183 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10184 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10185 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10186 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -CVE-2016-10190 - https://ffmpeg.org/security.html -CVE-2016-10190 - https://trac.ffmpeg.org/ticket/5992 -CVE-2016-10191 - https://ffmpeg.org/security.html -CVE-2016-10192 - https://ffmpeg.org/security.html -CVE-2016-10192 - https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 -CVE-2016-10194 - https://github.com/spejman/festivaltts4r/issues/1 -CVE-2016-10196 - https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5 -CVE-2016-10196 - https://github.com/libevent/libevent/issues/318 -CVE-2016-10196 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2016-10197 - https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e -CVE-2016-10197 - https://github.com/libevent/libevent/issues/332 -CVE-2016-10198 - https://bugzilla.gnome.org/show_bug.cgi?id=775450 -CVE-2016-10199 - https://bugzilla.gnome.org/show_bug.cgi?id=775451 -CVE-2016-10208 - http://seclists.org/fulldisclosure/2016/Nov/75 -CVE-2016-10217 - https://bugs.ghostscript.com/show_bug.cgi?id=697456 -CVE-2016-10218 - https://bugs.ghostscript.com/show_bug.cgi?id=697444 -CVE-2016-10219 - https://bugs.ghostscript.com/show_bug.cgi?id=697453 -CVE-2016-10220 - https://bugs.ghostscript.com/show_bug.cgi?id=697450 -CVE-2016-10221 - https://bugs.ghostscript.com/show_bug.cgi?id=697400 -CVE-2016-10222 - https://bugs.webkit.org/show_bug.cgi?id=164123 -CVE-2016-10225 - http://www.openwall.com/lists/oss-security/2016/10/05/16 -CVE-2016-10226 - https://bugs.webkit.org/show_bug.cgi?id=165091 -CVE-2016-10228 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2016-10243 - https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/ -CVE-2016-10244 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-10249 - https://blogs.gentoo.org/ago/2016/10/23/jasper-heap-based-buffer-overflow-in-jpc_dec_tiledecode-jpc_dec-c/ -CVE-2016-10250 - https://blogs.gentoo.org/ago/2016/10/23/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c-incomplete-fix-for-cve-2016-8887/ -CVE-2016-10251 - https://blogs.gentoo.org/ago/2016/11/04/jasper-use-of-uninitialized-value-in-jpc_pi_nextcprl-jpc_t2cod-c/ -CVE-2016-10251 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-10254 - https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/ -CVE-2016-10255 - https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ -CVE-2016-10266 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero -CVE-2016-10267 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero -CVE-2016-10268 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10269 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10269 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10269 -CVE-2016-10270 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10271 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10271 - https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a -CVE-2016-10272 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -CVE-2016-10272 - https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a -CVE-2016-10277 - https://www.exploit-db.com/exploits/42601/ -CVE-2016-10298 - http://www.securityfocus.com/bid/98874 -CVE-2016-10299 - http://www.securityfocus.com/bid/98874 -CVE-2016-10304 - https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/ -CVE-2016-10310 - https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/ -CVE-2016-10311 - https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/ -CVE-2016-10317 - https://bugs.ghostscript.com/show_bug.cgi?id=697459 -CVE-2016-10320 - http://seclists.org/oss-sec/2016/q4/442 -CVE-2016-10328 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-10332 - http://www.securityfocus.com/bid/98874 -CVE-2016-10333 - http://www.securityfocus.com/bid/98874 -CVE-2016-10334 - http://www.securityfocus.com/bid/98874 -CVE-2016-10335 - http://www.securityfocus.com/bid/98874 -CVE-2016-10336 - http://www.securityfocus.com/bid/98874 -CVE-2016-10337 - http://www.securityfocus.com/bid/98874 -CVE-2016-10338 - http://www.securityfocus.com/bid/98874 -CVE-2016-10339 - http://www.securityfocus.com/bid/98874 -CVE-2016-10340 - http://www.securityfocus.com/bid/98874 -CVE-2016-10341 - http://www.securityfocus.com/bid/98874 -CVE-2016-10342 - http://www.securityfocus.com/bid/98874 -CVE-2016-10349 - https://github.com/libarchive/libarchive/issues/834 -CVE-2016-10350 - https://github.com/libarchive/libarchive/issues/835 -CVE-2016-10362 - https://www.elastic.co/community/security -CVE-2016-10363 - https://www.elastic.co/community/security -CVE-2016-10364 - https://www.elastic.co/community/security -CVE-2016-10365 - https://www.elastic.co/community/security -CVE-2016-10366 - https://www.elastic.co/community/security -CVE-2016-10367 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-016/?fid=8341 -CVE-2016-10368 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-016/?fid=8341 -CVE-2016-10370 - https://alephsecurity.com/vulns/aleph-2017022 -CVE-2016-10372 - https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/ -CVE-2016-10372 - https://isc.sans.edu/forums/diary/TR069+NewNTPServer+Exploits+What+we+know+so+far/21763/ -CVE-2016-10378 - http://code610.blogspot.com/2016/09/sql-injection-in-latest-e107-cms.html -CVE-2016-10379 - http://code610.blogspot.com/2016/08/testing-sql-injections-in-comvirtuemart.html -CVE-2016-10380 - http://www.securityfocus.com/bid/103671 -CVE-2016-10381 - http://www.securityfocus.com/bid/103671 -CVE-2016-10384 - http://www.securityfocus.com/bid/103671 -CVE-2016-10385 - http://www.securityfocus.com/bid/103671 -CVE-2016-10386 - http://www.securityfocus.com/bid/103671 -CVE-2016-10387 - http://www.securityfocus.com/bid/103671 -CVE-2016-10390 - http://www.securityfocus.com/bid/103671 -CVE-2016-10392 - http://www.securityfocus.com/bid/103671 -CVE-2016-10396 - https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 -CVE-2016-10401 - https://www.exploit-db.com/exploits/43105/ -CVE-2016-10406 - http://www.securityfocus.com/bid/103671 -CVE-2016-10407 - http://www.securityfocus.com/bid/103671 -CVE-2016-10409 - http://www.securityfocus.com/bid/103671 -CVE-2016-10410 - http://www.securityfocus.com/bid/103671 -CVE-2016-10411 - http://www.securityfocus.com/bid/103671 -CVE-2016-10412 - http://www.securityfocus.com/bid/103671 -CVE-2016-10414 - http://www.securityfocus.com/bid/103671 -CVE-2016-10415 - http://www.securityfocus.com/bid/103671 -CVE-2016-10416 - http://www.securityfocus.com/bid/103671 -CVE-2016-10417 - http://www.securityfocus.com/bid/103671 -CVE-2016-10418 - http://www.securityfocus.com/bid/103671 -CVE-2016-10419 - http://www.securityfocus.com/bid/103671 -CVE-2016-10420 - http://www.securityfocus.com/bid/103671 -CVE-2016-10421 - http://www.securityfocus.com/bid/103671 -CVE-2016-10422 - http://www.securityfocus.com/bid/103671 -CVE-2016-10423 - http://www.securityfocus.com/bid/103671 -CVE-2016-10424 - http://www.securityfocus.com/bid/103671 -CVE-2016-10425 - http://www.securityfocus.com/bid/103671 -CVE-2016-10426 - http://www.securityfocus.com/bid/103671 -CVE-2016-10427 - http://www.securityfocus.com/bid/103671 -CVE-2016-10428 - http://www.securityfocus.com/bid/103671 -CVE-2016-10429 - http://www.securityfocus.com/bid/103671 -CVE-2016-10430 - http://www.securityfocus.com/bid/103671 -CVE-2016-10431 - http://www.securityfocus.com/bid/103671 -CVE-2016-10432 - http://www.securityfocus.com/bid/103671 -CVE-2016-10433 - http://www.securityfocus.com/bid/103671 -CVE-2016-10434 - http://www.securityfocus.com/bid/103671 -CVE-2016-10435 - http://www.securityfocus.com/bid/103671 -CVE-2016-10436 - http://www.securityfocus.com/bid/103671 -CVE-2016-10437 - http://www.securityfocus.com/bid/103671 -CVE-2016-10438 - http://www.securityfocus.com/bid/103671 -CVE-2016-10439 - http://www.securityfocus.com/bid/103671 -CVE-2016-10440 - http://www.securityfocus.com/bid/103671 -CVE-2016-10441 - http://www.securityfocus.com/bid/103671 -CVE-2016-10442 - http://www.securityfocus.com/bid/103671 -CVE-2016-10443 - http://www.securityfocus.com/bid/103671 -CVE-2016-10444 - http://www.securityfocus.com/bid/103671 -CVE-2016-10445 - http://www.securityfocus.com/bid/103671 -CVE-2016-10446 - http://www.securityfocus.com/bid/103671 -CVE-2016-10447 - http://www.securityfocus.com/bid/103671 -CVE-2016-10448 - http://www.securityfocus.com/bid/103671 -CVE-2016-10449 - http://www.securityfocus.com/bid/103671 -CVE-2016-10450 - http://www.securityfocus.com/bid/103671 -CVE-2016-10451 - http://www.securityfocus.com/bid/103671 -CVE-2016-10452 - http://www.securityfocus.com/bid/103671 -CVE-2016-10454 - http://www.securityfocus.com/bid/103671 -CVE-2016-10455 - http://www.securityfocus.com/bid/103671 -CVE-2016-10456 - http://www.securityfocus.com/bid/103671 -CVE-2016-10457 - http://www.securityfocus.com/bid/103671 -CVE-2016-10458 - http://www.securityfocus.com/bid/103671 -CVE-2016-10459 - http://www.securityfocus.com/bid/103671 -CVE-2016-10460 - http://www.securityfocus.com/bid/103671 -CVE-2016-10461 - http://www.securityfocus.com/bid/103671 -CVE-2016-10462 - http://www.securityfocus.com/bid/103671 -CVE-2016-10464 - http://www.securityfocus.com/bid/103671 -CVE-2016-10466 - http://www.securityfocus.com/bid/103671 -CVE-2016-10467 - http://www.securityfocus.com/bid/103671 -CVE-2016-10469 - http://www.securityfocus.com/bid/103671 -CVE-2016-10471 - http://www.securityfocus.com/bid/103671 -CVE-2016-10472 - http://www.securityfocus.com/bid/103671 -CVE-2016-10473 - http://www.securityfocus.com/bid/103671 -CVE-2016-10474 - http://www.securityfocus.com/bid/103671 -CVE-2016-10475 - http://www.securityfocus.com/bid/103671 -CVE-2016-10476 - http://www.securityfocus.com/bid/103671 -CVE-2016-10477 - http://www.securityfocus.com/bid/103671 -CVE-2016-10478 - http://www.securityfocus.com/bid/103671 -CVE-2016-10479 - http://www.securityfocus.com/bid/103671 -CVE-2016-10480 - http://www.securityfocus.com/bid/103671 -CVE-2016-10481 - http://www.securityfocus.com/bid/103671 -CVE-2016-10482 - http://www.securityfocus.com/bid/103671 -CVE-2016-10483 - http://www.securityfocus.com/bid/103671 -CVE-2016-10484 - http://www.securityfocus.com/bid/103671 -CVE-2016-10485 - http://www.securityfocus.com/bid/103671 -CVE-2016-10486 - http://www.securityfocus.com/bid/103671 -CVE-2016-10487 - http://www.securityfocus.com/bid/103671 -CVE-2016-10489 - http://www.securityfocus.com/bid/103671 -CVE-2016-10490 - http://www.securityfocus.com/bid/103671 -CVE-2016-10491 - http://www.securityfocus.com/bid/103671 -CVE-2016-10492 - http://www.securityfocus.com/bid/103671 -CVE-2016-10493 - http://www.securityfocus.com/bid/103671 -CVE-2016-10494 - http://www.securityfocus.com/bid/103671 -CVE-2016-10495 - http://www.securityfocus.com/bid/103671 -CVE-2016-10496 - http://www.securityfocus.com/bid/103671 -CVE-2016-10497 - http://www.securityfocus.com/bid/103671 -CVE-2016-10498 - http://www.securityfocus.com/bid/103671 -CVE-2016-10499 - http://www.securityfocus.com/bid/103671 -CVE-2016-10501 - http://www.securityfocus.com/bid/103671 -CVE-2016-10504 - https://github.com/uclouvain/openjpeg/issues/835 -CVE-2016-10504 - https://www.exploit-db.com/exploits/42600/ -CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/776 -CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/784 -CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/785 -CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/792 -CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/731 -CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/732 -CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/777 -CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/778 -CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/779 -CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/780 -CVE-2016-10507 - https://github.com/uclouvain/openjpeg/issues/833 -CVE-2016-10511 - https://hackerone.com/reports/168538 -CVE-2016-10512 - https://packetstormsecurity.com/files/139844/Multitech-RightFax-Faxfinder-Credential-Disclosure.html -CVE-2016-10513 - https://github.com/Piwigo/Piwigo/commit/9a93d1f44b06605af84520509e7a0e8b64ab0c05 -CVE-2016-10517 - https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES -CVE-2016-10517 - https://www.reddit.com/r/redis/comments/5r8wxn/redis_327_is_out_important_security_fixes_inside/ -CVE-2016-10518 - https://gist.github.com/c0nrad/e92005446c480707a74a -CVE-2016-10519 - https://github.com/feross/bittorrent-dht/issues/87 -CVE-2016-10523 - https://github.com/mqttjs/mqtt-packet/pull/8 -CVE-2016-10541 - https://github.com/advisories/GHSA-qg8p-v9q4-gh34 -CVE-2016-10547 - https://github.com/matt-/nunjucks_test -CVE-2016-10548 - https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9 -CVE-2016-10701 - http://jira.pentaho.com/browse/BISERVER-13207 -CVE-2016-10702 - https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ -CVE-2016-10705 - https://wpvulndb.com/vulnerabilities/8517 -CVE-2016-10706 - https://www.wordfence.com/blog/2016/05/jetpack-vulnerability/ -CVE-2016-10708 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2016-10709 - https://www.exploit-db.com/exploits/39709/ -CVE-2016-10710 - http://threat.tevora.com/biscom-secure-file-transfer-arbitrary-file-download/ -CVE-2016-10715 - https://packetstormsecurity.com/files/137648/JIRA-Artezio-Board-1.4-Cross-Site-Scripting-Information-Disclosure.html -CVE-2016-10716 - https://packetstormsecurity.com/files/137649/JIRA-Mail.ru-Calendar-2.4.2.50_JIRA6-Cross-Site-Scripting.html -CVE-2016-10717 - https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/ -CVE-2016-10717 - https://github.com/mspaling/mbam-exclusions-poc- -CVE-2016-10717 - https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt -CVE-2016-10717 - https://www.youtube.com/watch?v=LF5ic5nOoUY -CVE-2016-10718 - https://github.com/brave/browser-laptop/issues/5006 -CVE-2016-10718 - https://github.com/brave/browser-laptop/issues/5007 -CVE-2016-10718 - https://www.exploit-db.com/exploits/44475/ -CVE-2016-10719 - https://packetstormsecurity.com/files/138881/TP-Link-Archer-CR-700-Cross-Site-Scripting.html -CVE-2016-10721 - https://github.com/Thomas-Tsai/partclone/issues/82 -CVE-2016-10722 - https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/ -CVE-2016-10722 - https://github.com/Thomas-Tsai/partclone/issues/71 -CVE-2016-10728 - https://github.com/kirillwow/ids_bypass -CVE-2016-10729 - https://www.exploit-db.com/exploits/39217/ -CVE-2016-10730 - https://www.exploit-db.com/exploits/39244/ -CVE-2016-10735 - https://access.redhat.com/errata/RHSA-2020:0133 -CVE-2016-10736 - https://advisories.dxw.com/advisories/reflected-xss-in-social-pug-easy-social-share-buttons-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ -CVE-2016-10737 - https://www.exploit-db.com/exploits/40650 -CVE-2016-10738 - https://www.exploit-db.com/exploits/40620 -CVE-2016-10742 - https://support.zabbix.com/browse/ZBX-10272 -CVE-2016-10743 - http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html -CVE-2016-10745 - https://usn.ubuntu.com/4011-1/ -CVE-2016-10746 - https://github.com/libvirt/libvirt/compare/11288f5...8fd6867 -CVE-2016-10749 - https://github.com/DaveGamble/cJSON/issues/30 -CVE-2016-10749 - https://www.openwall.com/lists/oss-security/2016/11/07/2 -CVE-2016-10761 - https://www.kb.cert.org/vuls/id/981271 -CVE-2016-10763 - https://hackerone.com/reports/152958 -CVE-2016-1077 - http://packetstormsecurity.com/files/137035/Adobe-Reader-DC-15.010.20060-Memory-Corruption.html -CVE-2016-1077 - https://0patch.blogspot.com/2016/06/writing-0patch-for-acrobat-readers-use.html -CVE-2016-1077 - https://www.exploit-db.com/exploits/39799/ -CVE-2016-10861 - https://www.pentestpartners.com/security-blog/a-neet-csrf-to-reverse-shell-in-wi-fi-music-streamer/ -CVE-2016-10862 - https://www.pentestpartners.com/security-blog/a-neet-csrf-to-reverse-shell-in-wi-fi-music-streamer/ -CVE-2016-10864 - https://www.pentestpartners.com/security-blog/netgear-ex7000-wi-fi-range-extender-minor-xss-and-poor-password-handling/ -CVE-2016-10867 - https://wpvulndb.com/vulnerabilities/9736 -CVE-2016-10872 - https://wpvulndb.com/vulnerabilities/9738 -CVE-2016-10873 - https://wpvulndb.com/vulnerabilities/9739 -CVE-2016-10874 - https://wpvulndb.com/vulnerabilities/9739 -CVE-2016-10875 - https://wpvulndb.com/vulnerabilities/9740 -CVE-2016-10878 - https://wpvulndb.com/vulnerabilities/9741 -CVE-2016-10884 - https://wpvulndb.com/vulnerabilities/9744 -CVE-2016-10905 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2016-10905 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2016-10905 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36e4ad0316c017d5b271378ed9a1c9a4b77fab5f -CVE-2016-10906 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2016-10906 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c278c253f3d992c6994d08aa0efb2b6806ca396f -CVE-2016-10907 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d47964bfd471f0dd4c89f28556aec68bffa0020 -CVE-2016-10935 - https://wpvulndb.com/vulnerabilities/9825 -CVE-2016-10938 - https://advisories.dxw.com/advisories/copy-me-vulnerable-to-csrf-allowing-unauthenticated-attacker-to-copy-posts/ -CVE-2016-10938 - https://wpvulndb.com/vulnerabilities/8706 -CVE-2016-10939 - http://lenonleite.com.br/en/blog/2016/12/16/xtreme-locator-dealer-locator-plugin-wordpress-sql-injection/ -CVE-2016-10940 - http://lenonleite.com.br/en/2016/12/16/zm-gallery-1-plugin-wordpress-blind-injection/ -CVE-2016-10943 - http://lenonleite.com.br/en/2016/12/16/english-zx_csv-upload-1-plugin-wordpress-sql-injection/ -CVE-2016-10943 - https://wpvulndb.com/vulnerabilities/8702 -CVE-2016-10944 - https://advisories.dxw.com/advisories/csrf-vulnerability-in-multisite-post-duplicator-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can-do/ -CVE-2016-10945 - https://wpvulndb.com/vulnerabilities/8681 -CVE-2016-10946 - https://wpvulndb.com/vulnerabilities/8679 -CVE-2016-10947 - https://advisories.dxw.com/advisories/sql-injection-in-post-indexer-allows-super-admins-to-read-the-contents-of-the-database/ -CVE-2016-10948 - https://advisories.dxw.com/advisories/unserialisation-in-post-indexer-could-allow-man-in-the-middle-to-execute-arbitrary-code-in-some-circumstances/ -CVE-2016-10949 - https://advisories.dxw.com/advisories/sql-injection-and-unserialization-vulnerability-in-relevanssi-premium-could-allow-admins-to-execute-arbitrary-code-in-some-circumstances/ -CVE-2016-10950 - http://lenonleite.com.br/en/2016/11/10/sirv-1-3-1-plugin-for-wordpress/ -CVE-2016-10950 - https://wpvulndb.com/vulnerabilities/8673 -CVE-2016-10951 - http://lenonleite.com.br/en/2016/11/10/firestorm-shopping-cart-ecommerce-plugin-2-07-02-for-wordpress/ -CVE-2016-10951 - https://wpvulndb.com/vulnerabilities/8672 -CVE-2016-10952 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_quotes_collection_wordpress_plugin.html -CVE-2016-10952 - https://wpvulndb.com/vulnerabilities/8649 -CVE-2016-10953 - https://wpvulndb.com/vulnerabilities/8641 -CVE-2016-10954 - https://wpvulndb.com/vulnerabilities/8622 -CVE-2016-10955 - https://wpvulndb.com/vulnerabilities/8612 -CVE-2016-10956 - https://cxsecurity.com/issue/WLB-2016080220 -CVE-2016-10956 - https://wpvulndb.com/vulnerabilities/8609 -CVE-2016-10957 - https://wpvulndb.com/vulnerabilities/8607 -CVE-2016-10957 - https://www.saotn.org/wordpress-advisory-akal-theme-xss-vulnerability/ -CVE-2016-1096 - http://packetstormsecurity.com/files/137051/Adobe-Flash-MP4-File-Stack-Corruption.html -CVE-2016-1096 - https://www.exploit-db.com/exploits/39828/ -CVE-2016-10961 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_colorway_wordpress_theme.html -CVE-2016-10961 - https://wpvulndb.com/vulnerabilities/8568 -CVE-2016-10964 - https://rastating.github.io/dwnldr-1-0-stored-xss-disclosure/ -CVE-2016-10965 - https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ -CVE-2016-10966 - https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ -CVE-2016-10967 - https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ -CVE-2016-10968 - https://wordpress.org/plugins/peepso-core/#developers -CVE-2016-10972 - https://wpvulndb.com/vulnerabilities/8852 -CVE-2016-10972 - https://www.exploit-db.com/exploits/39894 -CVE-2016-10973 - https://wpvulndb.com/vulnerabilities/8614 -CVE-2016-10976 - https://wpvulndb.com/vulnerabilities/8497 -CVE-2016-10977 - https://wpvulndb.com/vulnerabilities/8491 -CVE-2016-10978 - https://wpvulndb.com/vulnerabilities/8486 -CVE-2016-10980 - https://www.openwall.com/lists/oss-security/2016/04/16/2 -CVE-2016-10983 - https://packetstormsecurity.com/files/136887/ -CVE-2016-10984 - https://0x62626262.wordpress.com/2016/04/21/echosign-plugin-for-wordpress-xss-vulnerability/ -CVE-2016-10984 - https://wpvulndb.com/vulnerabilities/8465 -CVE-2016-10985 - https://0x62626262.wordpress.com/2016/04/21/echosign-plugin-for-wordpress-xss-vulnerability/ -CVE-2016-10985 - https://wpvulndb.com/vulnerabilities/8465 -CVE-2016-10986 - https://0x62626262.wordpress.com/2016/04/21/tweet-wheel-xss-vulnerability/ -CVE-2016-10986 - https://wpvulndb.com/vulnerabilities/8464 -CVE-2016-10987 - https://0x62626262.wordpress.com/2016/04/21/persian-woocommerce-sms-xss-vulnerability/ -CVE-2016-10987 - https://wpvulndb.com/vulnerabilities/8463 -CVE-2016-10988 - https://wpvulndb.com/vulnerabilities/8457 -CVE-2016-10989 - https://wpvulndb.com/vulnerabilities/8457 -CVE-2016-10990 - https://wpvulndb.com/vulnerabilities/8430 -CVE-2016-10991 - https://wpvulndb.com/vulnerabilities/8426 -CVE-2016-10992 - https://packetstormsecurity.com/files/136445/ -CVE-2016-10992 - https://wpvulndb.com/vulnerabilities/8429 -CVE-2016-10993 - https://wpvulndb.com/vulnerabilities/8431 -CVE-2016-10993 - https://www.vulnerability-lab.com/get_content.php?id=1808 -CVE-2016-10994 - https://wpvulndb.com/vulnerabilities/8478 -CVE-2016-10994 - https://www.vulnerability-lab.com/get_content.php?id=1839 -CVE-2016-10995 - https://wpvulndb.com/vulnerabilities/8482 -CVE-2016-10997 - https://wpvulndb.com/vulnerabilities/8412 -CVE-2016-10997 - https://www.exploit-db.com/exploits/39552 -CVE-2016-10998 - https://wpvulndb.com/vulnerabilities/8425 -CVE-2016-10999 - https://www.vulnerability-lab.com/get_content.php?id=1771 -CVE-2016-11005 - https://rastating.github.io/instalinker-reflected-xss-information-disclosure/ -CVE-2016-11006 - https://wpvulndb.com/vulnerabilities/8378 -CVE-2016-11007 - https://wpvulndb.com/vulnerabilities/8378 -CVE-2016-11008 - https://wpvulndb.com/vulnerabilities/8378 -CVE-2016-11009 - https://wpvulndb.com/vulnerabilities/8378 -CVE-2016-1101 - http://packetstormsecurity.com/files/137052/Adobe-Flash-ATF-Processing-Heap-Overflow.html -CVE-2016-1101 - https://www.exploit-db.com/exploits/39827/ -CVE-2016-11010 - https://wpvulndb.com/vulnerabilities/8378 -CVE-2016-11011 - https://wpvulndb.com/vulnerabilities/8378 -CVE-2016-11012 - https://wpvulndb.com/vulnerabilities/8389 -CVE-2016-11013 - https://github.com/agentevolution/wp-listings/pull/52 -CVE-2016-11014 - https://cybersecurityworks.com/zerodays/cve-2016-11014-netgear.html -CVE-2016-11014 - https://github.com/cybersecurityworks/Disclosed/issues/14 -CVE-2016-11014 - https://lists.openwall.net/full-disclosure/2016/01/11/5 -CVE-2016-11014 - https://packetstormsecurity.com/files/135216/Netgear-1.0.0.24-Bypass-Improper-Session-Management.html -CVE-2016-11015 - https://cybersecurityworks.com/zerodays/cve-2016-11015-netgear.html -CVE-2016-11015 - https://github.com/cybersecurityworks/Disclosed/issues/13 -CVE-2016-11015 - https://lists.openwall.net/full-disclosure/2016/01/11/4 -CVE-2016-11015 - https://packetstormsecurity.com/files/135215/Netgear-1.0.0.24-Cross-Site-Request-Forgery.html -CVE-2016-11016 - https://cybersecurityworks.com/zerodays/cve-2016-11016-netgear.html -CVE-2016-11016 - https://github.com/cybersecurityworks/Disclosed/issues/12 -CVE-2016-11016 - https://lists.openwall.net/full-disclosure/2016/01/11/1 -CVE-2016-11016 - https://packetstormsecurity.com/files/135194/Netgear-1.0.0.24-Cross-Site-Scripting.html -CVE-2016-11017 - https://ctrlu.net/vuln/0002.html -CVE-2016-11017 - https://www.exploit-db.com/exploits/39564 -CVE-2016-1102 - http://packetstormsecurity.com/files/137053/Adobe-Flash-JXR-Processing-Out-Of-Bounds-Read.html -CVE-2016-1102 - https://www.exploit-db.com/exploits/39824/ -CVE-2016-11021 - https://www.exploit-db.com/exploits/39437 -CVE-2016-11022 - http://firmware.re/vulns/acsa-2015-002.php -CVE-2016-11025 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11026 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11027 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11028 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11029 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-1103 - http://packetstormsecurity.com/files/137054/Adobe-Flash-Raw-565-Texture-Processing-Overflow.html -CVE-2016-1103 - https://www.exploit-db.com/exploits/39826/ -CVE-2016-11030 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11031 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11032 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11033 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11034 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11035 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11036 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11038 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11039 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-1104 - http://packetstormsecurity.com/files/137055/Adobe-Flash-Object-Placing-Out-Of-Bounds-Read.html -CVE-2016-1104 - https://www.exploit-db.com/exploits/39825/ -CVE-2016-11040 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11041 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11042 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11043 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11044 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11045 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11046 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11047 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11048 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11049 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-1105 - http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html -CVE-2016-1105 - https://www.exploit-db.com/exploits/39829/ -CVE-2016-11050 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11052 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11053 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2016-11054 - https://kb.netgear.com/31245/DGN2200v4-Command-Execution-and-FTP-Insecure-Root-Directory-Security-Vulnerability -CVE-2016-11055 - https://kb.netgear.com/30114/NETGEAR-Product-Vulnerability-Advisory-CSRF-LocalFile-XSS -CVE-2016-11056 - https://kb.netgear.com/30275/ReadyNAS-Surveillance-Security-Vulnerability-Announcement -CVE-2016-11057 - https://kb.netgear.com/29960/NETGEAR-Product-Vulnerability-Advisory-Potential-security-issue-associated-with-remote-management -CVE-2016-1106 - http://packetstormsecurity.com/files/137057/Adobe-Flash-SetNative-Use-After-Free.html -CVE-2016-1106 - https://www.exploit-db.com/exploits/39831/ -CVE-2016-11060 - https://kb.netgear.com/31426/SSL-Renegotiation-Denial-of-Service-Vulnerability -CVE-2016-11062 - https://mattermost.com/security-updates/ -CVE-2016-11063 - https://mattermost.com/security-updates/ -CVE-2016-11064 - https://mattermost.com/security-updates/ -CVE-2016-11065 - https://mattermost.com/security-updates/ -CVE-2016-11066 - https://mattermost.com/security-updates/ -CVE-2016-11067 - https://mattermost.com/security-updates/ -CVE-2016-11068 - https://mattermost.com/security-updates/ -CVE-2016-11069 - https://mattermost.com/security-updates/ -CVE-2016-11070 - https://mattermost.com/security-updates/ -CVE-2016-11071 - https://mattermost.com/security-updates/ -CVE-2016-11072 - https://mattermost.com/security-updates/ -CVE-2016-11073 - https://mattermost.com/security-updates/ -CVE-2016-11074 - https://mattermost.com/security-updates/ -CVE-2016-11075 - https://mattermost.com/security-updates/ -CVE-2016-11076 - https://mattermost.com/security-updates/ -CVE-2016-11077 - https://mattermost.com/security-updates/ -CVE-2016-11078 - https://mattermost.com/security-updates/ -CVE-2016-11079 - https://mattermost.com/security-updates/ -CVE-2016-11080 - https://mattermost.com/security-updates/ -CVE-2016-11081 - https://mattermost.com/security-updates/ -CVE-2016-11082 - https://mattermost.com/security-updates/ -CVE-2016-11083 - https://mattermost.com/security-updates/ -CVE-2016-11084 - https://mattermost.com/security-updates/ -CVE-2016-11085 - https://security.dxw.com/advisories/csrfstored-xss-in-quiz-and-survey-master-formerly-quiz-master-next-allows-unauthenticated-attackers-to-do-almost-anything-an-admin-can/ -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-1181 - http://www.securityfocus.com/bid/91787 -CVE-2016-1181 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-1181 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-1181 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-1182 - http://www.securityfocus.com/bid/91787 -CVE-2016-1182 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-1182 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-1182 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-1183 - http://jvn.jp/en/jp/JVN74659077/index.html -CVE-2016-1209 - http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html -CVE-2016-1209 - http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities -CVE-2016-1209 - https://wpvulndb.com/vulnerabilities/8485 -CVE-2016-1234 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -CVE-2016-1234 - http://seclists.org/fulldisclosure/2021/Sep/0 -CVE-2016-1240 - http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html -CVE-2016-1240 - http://packetstormsecurity.com/files/170857/Apache-Tomcat-On-Ubuntu-Log-Init-Privilege-Escalation.html -CVE-2016-1240 - https://www.exploit-db.com/exploits/40450/ -CVE-2016-1243 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248 -CVE-2016-1244 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248 -CVE-2016-1247 - http://packetstormsecurity.com/files/139750/Nginx-Debian-Based-Distros-Root-Privilege-Escalation.html -CVE-2016-1247 - http://seclists.org/fulldisclosure/2016/Nov/78 -CVE-2016-1247 - https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html -CVE-2016-1247 - https://www.exploit-db.com/exploits/40768/ -CVE-2016-1247 - https://www.youtube.com/watch?v=aTswN1k1fQs -CVE-2016-1248 - https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a -CVE-2016-1252 - http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html -CVE-2016-1252 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 -CVE-2016-1252 - https://www.exploit-db.com/exploits/40916/ -CVE-2016-1281 - http://seclists.org/fulldisclosure/2016/Jan/22 -CVE-2016-1283 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1283 - https://www.tenable.com/security/tns-2017-14 -CVE-2016-1285 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-1285 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1285 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1286 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1286 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1286 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1287 - http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html -CVE-2016-1287 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike -CVE-2016-1287 - https://www.exploit-db.com/exploits/39823/ -CVE-2016-1287 - https://www.kb.cert.org/vuls/id/327976 -CVE-2016-1291 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode -CVE-2016-1328 - https://www.exploit-db.com/exploits/39904/ -CVE-2016-1334 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-wap -CVE-2016-1336 - https://www.exploit-db.com/exploits/39904/ -CVE-2016-1337 - https://www.exploit-db.com/exploits/39904/ -CVE-2016-1415 - https://www.exploit-db.com/exploits/40509/ -CVE-2016-1417 - http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html -CVE-2016-1421 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp -CVE-2016-1421 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp -CVE-2016-1421 - https://www.tenable.com/security/research/tra-2020-24 -CVE-2016-1446 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms -CVE-2016-1447 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms1 -CVE-2016-1448 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms2 -CVE-2016-1449 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms3 -CVE-2016-1450 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms4 -CVE-2016-1464 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-meetings-player -CVE-2016-1464 - https://www.exploit-db.com/exploits/40508/ -CVE-2016-1489 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html -CVE-2016-1489 - http://seclists.org/fulldisclosure/2016/Jan/67 -CVE-2016-1489 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities -CVE-2016-1490 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html -CVE-2016-1490 - http://seclists.org/fulldisclosure/2016/Jan/67 -CVE-2016-1490 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities -CVE-2016-1491 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html -CVE-2016-1491 - http://seclists.org/fulldisclosure/2016/Jan/67 -CVE-2016-1491 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities -CVE-2016-1492 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html -CVE-2016-1492 - http://seclists.org/fulldisclosure/2016/Jan/67 -CVE-2016-1492 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities -CVE-2016-1493 - http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html -CVE-2016-1493 - http://seclists.org/fulldisclosure/2016/Jan/56 -CVE-2016-1493 - http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm -CVE-2016-1499 - http://packetstormsecurity.com/files/135158/ownCloud-8.2.1-8.1.4-8.0.9-Information-Exposure.html -CVE-2016-1499 - https://hackerone.com/reports/110655 -CVE-2016-1499 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-062.txt -CVE-2016-15002 - https://youtu.be/KKlwi-u6wyA -CVE-2016-15003 - https://vuldb.com/?id.97204 -CVE-2016-15003 - https://www.exploit-db.com/exploits/39803/ -CVE-2016-15003 - https://youtu.be/r06VwwJ9J4M -CVE-2016-1501 - https://hackerone.com/reports/85201 -CVE-2016-1501 - https://hackerone.com/reports/87505 -CVE-2016-15038 - https://www.exploit-db.com/exploits/40214 -CVE-2016-1513 - http://www.openoffice.org/security/cves/CVE-2016-1513.html -CVE-2016-1516 - https://github.com/opencv/opencv/issues/5956 -CVE-2016-1517 - https://github.com/opencv/opencv/issues/5956 -CVE-2016-1518 - http://packetstormsecurity.com/files/136280/Grandstream-Wave-1.0.1.26-Man-In-The-Middle.html -CVE-2016-1519 - http://packetstormsecurity.com/files/136290/Grandstream-Wave-1.0.1.26-TLS-Man-In-The-Middle.html -CVE-2016-1520 - http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html -CVE-2016-1521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1521 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-1522 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1522 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1523 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1523 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1523 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246093 -CVE-2016-1524 - http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html -CVE-2016-1524 - http://seclists.org/fulldisclosure/2016/Feb/30 -CVE-2016-1524 - http://www.kb.cert.org/vuls/id/777024 -CVE-2016-1524 - https://www.exploit-db.com/exploits/39412/ -CVE-2016-1525 - http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html -CVE-2016-1525 - http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html -CVE-2016-1525 - http://seclists.org/fulldisclosure/2016/Feb/30 -CVE-2016-1525 - http://www.kb.cert.org/vuls/id/777024 -CVE-2016-1525 - https://www.exploit-db.com/exploits/39412/ -CVE-2016-1525 - https://www.exploit-db.com/exploits/39515/ -CVE-2016-1526 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1531 - http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html -CVE-2016-1531 - https://www.exploit-db.com/exploits/39535/ -CVE-2016-1531 - https://www.exploit-db.com/exploits/39549/ -CVE-2016-1531 - https://www.exploit-db.com/exploits/39702/ -CVE-2016-1541 - http://www.kb.cert.org/vuls/id/862384 -CVE-2016-1541 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1541 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1542 - http://packetstormsecurity.com/files/136461/BMC-Server-Automation-BSA-RSCD-Agent-User-Enumeration.html -CVE-2016-1542 - https://www.exploit-db.com/exploits/43902/ -CVE-2016-1542 - https://www.exploit-db.com/exploits/43939/ -CVE-2016-1543 - http://packetstormsecurity.com/files/136462/BMC-Server-Automation-BSA-RSCD-Agent-Unauthorized-Password-Reset.html -CVE-2016-1543 - https://www.exploit-db.com/exploits/43902/ -CVE-2016-1543 - https://www.exploit-db.com/exploits/43939/ -CVE-2016-1546 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-1547 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1547 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1548 - http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-1548 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1548 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1548 - https://www.kb.cert.org/vuls/id/718152 -CVE-2016-1549 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1549 - http://www.talosintelligence.com/reports/TALOS-2016-0083/ -CVE-2016-1550 - http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-1550 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1550 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1550 - https://www.kb.cert.org/vuls/id/718152 -CVE-2016-1551 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-1555 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html -CVE-2016-1555 - https://www.exploit-db.com/exploits/45909/ -CVE-2016-1556 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html -CVE-2016-1557 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html -CVE-2016-1558 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html -CVE-2016-1559 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html -CVE-2016-1560 - http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html -CVE-2016-1561 - http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html -CVE-2016-1562 - http://www.kb.cert.org/vuls/id/713312 -CVE-2016-1564 - https://wpvulndb.com/vulnerabilities/8358 -CVE-2016-1566 - https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/ -CVE-2016-1575 - http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/ -CVE-2016-1575 - https://launchpad.net/bugs/1534961 -CVE-2016-1576 - http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ -CVE-2016-1576 - https://bugs.launchpad.net/bugs/1535150 -CVE-2016-1583 - http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html -CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-1583 - https://www.exploit-db.com/exploits/39992/ -CVE-2016-1593 - http://packetstormsecurity.com/files/136717/Novell-ServiceDesk-Authenticated-File-Upload.html -CVE-2016-1593 - https://packetstormsecurity.com/files/136646 -CVE-2016-1593 - https://www.exploit-db.com/exploits/39687/ -CVE-2016-1593 - https://www.exploit-db.com/exploits/39708/ -CVE-2016-1594 - https://packetstormsecurity.com/files/136646 -CVE-2016-1594 - https://www.exploit-db.com/exploits/39687/ -CVE-2016-1595 - https://packetstormsecurity.com/files/136646 -CVE-2016-1595 - https://www.exploit-db.com/exploits/39687/ -CVE-2016-1596 - https://packetstormsecurity.com/files/136646 -CVE-2016-1596 - https://www.exploit-db.com/exploits/39687/ -CVE-2016-1606 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php -CVE-2016-1606 - https://cxsecurity.com/issue/WLB-2016050136 -CVE-2016-1607 - http://seclists.org/bugtraq/2016/Jul/119 -CVE-2016-1607 - https://www.exploit-db.com/exploits/40161/ -CVE-2016-1608 - http://seclists.org/bugtraq/2016/Jul/119 -CVE-2016-1608 - https://www.exploit-db.com/exploits/40161/ -CVE-2016-1609 - http://seclists.org/bugtraq/2016/Jul/119 -CVE-2016-1609 - https://www.exploit-db.com/exploits/40161/ -CVE-2016-1610 - http://seclists.org/bugtraq/2016/Jul/119 -CVE-2016-1610 - https://www.exploit-db.com/exploits/40161/ -CVE-2016-1611 - http://seclists.org/bugtraq/2016/Jul/119 -CVE-2016-1611 - https://www.exploit-db.com/exploits/40161/ -CVE-2016-1626 - https://codereview.chromium.org/1583233008 -CVE-2016-1713 - http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html -CVE-2016-1713 - https://www.exploit-db.com/exploits/44379/ -CVE-2016-1714 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1715 - https://kc.mcafee.com/corporate/index?page=content&id=SB10145 -CVE-2016-1719 - http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html -CVE-2016-1719 - http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html -CVE-2016-1719 - http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html -CVE-2016-1719 - http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html -CVE-2016-1719 - http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html -CVE-2016-1719 - http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html -CVE-2016-1719 - https://www.exploit-db.com/exploits/39359/ -CVE-2016-1719 - https://www.exploit-db.com/exploits/39360/ -CVE-2016-1719 - https://www.exploit-db.com/exploits/39361/ -CVE-2016-1719 - https://www.exploit-db.com/exploits/39362/ -CVE-2016-1719 - https://www.exploit-db.com/exploits/39363/ -CVE-2016-1719 - https://www.exploit-db.com/exploits/39364/ -CVE-2016-1720 - http://packetstormsecurity.com/files/135435/IOKit-Methods-Being-Called-Without-Locks-From-IOServiceClose.html -CVE-2016-1720 - https://www.exploit-db.com/exploits/39367/ -CVE-2016-1721 - http://packetstormsecurity.com/files/135444/iOS-OS-X-Kernel-Uninitialized-Variable-Code-Execution.html -CVE-2016-1721 - https://www.exploit-db.com/exploits/39358/ -CVE-2016-1723 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -CVE-2016-1723 - http://www.securityfocus.com/bid/81263 -CVE-2016-1724 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -CVE-2016-1724 - http://www.securityfocus.com/bid/81263 -CVE-2016-1725 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -CVE-2016-1725 - http://www.securityfocus.com/bid/81263 -CVE-2016-1726 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -CVE-2016-1726 - http://www.securityfocus.com/bid/81263 -CVE-2016-1727 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -CVE-2016-1727 - http://www.securityfocus.com/bid/81263 -CVE-2016-1728 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -CVE-2016-1728 - http://www.securityfocus.com/bid/81263 -CVE-2016-1741 - https://www.exploit-db.com/exploits/39615/ -CVE-2016-1743 - https://www.exploit-db.com/exploits/39675/ -CVE-2016-1744 - https://www.exploit-db.com/exploits/39616/ -CVE-2016-1749 - https://www.exploit-db.com/exploits/39607/ -CVE-2016-1755 - https://www.exploit-db.com/exploits/39614/ -CVE-2016-1757 - https://www.exploit-db.com/exploits/39595/ -CVE-2016-1757 - https://www.exploit-db.com/exploits/39741/ -CVE-2016-1762 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1762 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1767 - https://www.exploit-db.com/exploits/39633/ -CVE-2016-1768 - https://www.exploit-db.com/exploits/39634/ -CVE-2016-1769 - https://www.exploit-db.com/exploits/39635/ -CVE-2016-1793 - http://packetstormsecurity.com/files/137401/OS-X-AppleGraphicsDeviceControl-NULL-Pointer-Dereference.html -CVE-2016-1793 - https://www.exploit-db.com/exploits/39923/ -CVE-2016-1794 - http://packetstormsecurity.com/files/137402/OS-X-AppleMuxControl.kext-NULL-Pointer-Dereference.html -CVE-2016-1794 - https://www.exploit-db.com/exploits/39922/ -CVE-2016-1801 - https://www.kb.cert.org/vuls/id/877625 -CVE-2016-1803 - http://packetstormsecurity.com/files/137399/OS-X-CoreCaptureResponder-NULL-Pointer-Dereference.html -CVE-2016-1803 - https://www.exploit-db.com/exploits/39925/ -CVE-2016-1807 - http://packetstormsecurity.com/files/137395/OS-X-iOS-Kernel-IOHDIXControllerUserClient-Use-After-Free.html -CVE-2016-1807 - https://www.exploit-db.com/exploits/39929/ -CVE-2016-1813 - http://packetstormsecurity.com/files/137400/OS-X-IOAccelSharedUserClient2-page_off_resource-NULL-Pointer-Dereference.html -CVE-2016-1813 - https://www.exploit-db.com/exploits/39924/ -CVE-2016-1819 - http://packetstormsecurity.com/files/137396/OS-X-Kernel-Use-After-Free-From-IOAcceleratorFamily2-Bad-Locking.html -CVE-2016-1819 - https://www.exploit-db.com/exploits/39928/ -CVE-2016-1821 - https://www.exploit-db.com/exploits/39926/ -CVE-2016-1823 - http://packetstormsecurity.com/files/137397/OS-X-Kernel-Raw-Cast-Out-Of-Bounds-Read.html -CVE-2016-1823 - https://www.exploit-db.com/exploits/39927/ -CVE-2016-1833 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1833 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1833 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1834 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1834 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1834 - https://bugzilla.gnome.org/show_bug.cgi?id=763071 -CVE-2016-1835 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1835 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1835 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1836 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1836 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1836 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1837 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1837 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1837 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1838 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1838 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1838 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1839 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1839 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1839 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1839 - https://bugzilla.gnome.org/show_bug.cgi?id=758605 -CVE-2016-1840 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-1840 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-1840 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1840 - https://bugzilla.gnome.org/show_bug.cgi?id=757711 -CVE-2016-1846 - http://packetstormsecurity.com/files/137403/OS-X-GeForce.kext-NULL-Pointer-Dereference.html -CVE-2016-1846 - https://www.exploit-db.com/exploits/39920/ -CVE-2016-1848 - https://www.exploit-db.com/exploits/39839/ -CVE-2016-1854 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html -CVE-2016-1856 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html -CVE-2016-1857 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html -CVE-2016-1858 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html -CVE-2016-1859 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html -CVE-2016-1861 - https://www.exploit-db.com/exploits/39930/ -CVE-2016-1863 - http://www.securityfocus.com/bid/91828 -CVE-2016-1863 - https://www.exploit-db.com/exploits/40652/ -CVE-2016-1865 - http://www.securityfocus.com/bid/91828 -CVE-2016-1867 - http://www.openwall.com/lists/oss-security/2016/01/13/2 -CVE-2016-1867 - http://www.openwall.com/lists/oss-security/2016/01/13/6 -CVE-2016-1879 - http://packetstormsecurity.com/files/135369/FreeBSD-SCTP-ICMPv6-Denial-Of-Service.html -CVE-2016-1879 - https://www.exploit-db.com/exploits/39305/ -CVE-2016-1881 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-1885 - http://packetstormsecurity.com/files/136276/FreeBSD-Kernel-amd64_set_ldt-Heap-Overflow.html -CVE-2016-1885 - http://seclists.org/fulldisclosure/2016/Mar/56 -CVE-2016-1885 - http://www.coresecurity.com/advisories/freebsd-kernel-amd64setldt-heap-overflow -CVE-2016-1885 - https://www.exploit-db.com/exploits/39570/ -CVE-2016-1886 - http://cturt.github.io/SETFKEY.html -CVE-2016-1887 - http://cturt.github.io/sendmsg.html -CVE-2016-1897 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2016-1897 - https://www.kb.cert.org/vuls/id/772447 -CVE-2016-1898 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2016-1898 - https://www.kb.cert.org/vuls/id/772447 -CVE-2016-1903 - http://www.openwall.com/lists/oss-security/2016/01/14/8 -CVE-2016-1903 - https://bugs.php.net/bug.php?id=70976 -CVE-2016-1904 - http://www.openwall.com/lists/oss-security/2016/01/14/8 -CVE-2016-1904 - https://bugs.php.net/bug.php?id=71270 -CVE-2016-1906 - https://github.com/openshift/origin/pull/6576 -CVE-2016-1907 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2016-1907 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-1908 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1909 - http://packetstormsecurity.com/files/135225/FortiGate-OS-5.0.7-SSH-Backdoor.html -CVE-2016-1909 - https://www.exploit-db.com/exploits/39224/ -CVE-2016-1910 - https://www.exploit-db.com/exploits/43495/ -CVE-2016-1911 - http://seclists.org/fulldisclosure/2016/Apr/58 -CVE-2016-1912 - http://packetstormsecurity.com/files/135201/Dolibarr-3.8.3-Cross-Site-Scripting.html -CVE-2016-1912 - https://github.com/Dolibarr/dolibarr/issues/4341 -CVE-2016-1914 - http://seclists.org/fulldisclosure/2016/Feb/95 -CVE-2016-1914 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038033 -CVE-2016-1914 - https://www.exploit-db.com/exploits/39481/ -CVE-2016-1915 - http://seclists.org/fulldisclosure/2016/Feb/95 -CVE-2016-1915 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038033 -CVE-2016-1915 - https://www.exploit-db.com/exploits/39481/ -CVE-2016-1919 - http://packetstormsecurity.com/files/135303/Samsung-KNOX-1.0-Weak-eCryptFS-Key-Generation.html -CVE-2016-1923 - http://www.openwall.com/lists/oss-security/2016/01/18/4 -CVE-2016-1923 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-1924 - http://www.openwall.com/lists/oss-security/2016/01/18/4 -CVE-2016-1924 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-1926 - http://packetstormsecurity.com/files/135328/OpenVAS-Greenbone-Security-Assistant-Cross-Site-Scripting.html -CVE-2016-1929 - http://seclists.org/fulldisclosure/2016/Apr/59 -CVE-2016-1930 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1935 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1938 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-1938 - http://www.securityfocus.com/bid/91787 -CVE-2016-1941 - https://bugzilla.mozilla.org/show_bug.cgi?id=1116385 -CVE-2016-1942 - https://bugzilla.mozilla.org/show_bug.cgi?id=1189082 -CVE-2016-1943 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228590 -CVE-2016-1946 - https://bugzilla.mozilla.org/show_bug.cgi?id=1232069 -CVE-2016-1949 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245724 -CVE-2016-1950 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-1950 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-1950 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-1950 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1950 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1952 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1954 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1954 - https://bugzilla.mozilla.org/show_bug.cgi?id=1243178 -CVE-2016-1955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208946 -CVE-2016-1957 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1958 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1958 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228754 -CVE-2016-1959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1234949 -CVE-2016-1960 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1960 - https://www.exploit-db.com/exploits/42484/ -CVE-2016-1960 - https://www.exploit-db.com/exploits/44294/ -CVE-2016-1961 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1961 - https://bugzilla.mozilla.org/show_bug.cgi?id=1249377 -CVE-2016-1962 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1964 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1965 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1965 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245264 -CVE-2016-1966 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1966 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246054 -CVE-2016-1967 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246956 -CVE-2016-1973 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1974 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1974 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228103 -CVE-2016-1977 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-1977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1248876 -CVE-2016-1978 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-1978 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1978 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1978 - http://www.securityfocus.com/bid/91787 -CVE-2016-1979 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-1979 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-1979 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-1979 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-1984 - http://seclists.org/fulldisclosure/2016/Jan/63 -CVE-2016-1984 - https://www.kb.cert.org/vuls/id/992624 -CVE-2016-20009 - https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ -CVE-2016-20010 - https://www.wordfence.com/blog/2016/06/vulnerability-ewww-image-optimizer/ -CVE-2016-20012 - https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097 -CVE-2016-20012 - https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185 -CVE-2016-20012 - https://rushter.com/blog/public-ssh-keys/ -CVE-2016-20016 - https://www.exploit-db.com/exploits/41471 -CVE-2016-20017 - https://www.exploit-db.com/exploits/44760 -CVE-2016-20018 - https://github.com/knex/knex/issues/1227 -CVE-2016-2004 - http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html -CVE-2016-2004 - http://packetstormsecurity.com/files/137341/HP-Data-Protector-Encrypted-Communication-Remote-Command-Execution.html -CVE-2016-2004 - http://www.kb.cert.org/vuls/id/267328 -CVE-2016-2004 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 -CVE-2016-2004 - https://www.exploit-db.com/exploits/39858/ -CVE-2016-2004 - https://www.exploit-db.com/exploits/39874/ -CVE-2016-2005 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 -CVE-2016-2006 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 -CVE-2016-2007 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 -CVE-2016-2008 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 -CVE-2016-2031 - http://packetstormsecurity.com/files/136997/Aruba-Authentication-Bypass-Insecure-Transport-Tons-Of-Issues.html -CVE-2016-2031 - http://seclists.org/fulldisclosure/2016/May/19 -CVE-2016-2032 - http://packetstormsecurity.com/files/136997/Aruba-Authentication-Bypass-Insecure-Transport-Tons-Of-Issues.html -CVE-2016-2032 - http://seclists.org/fulldisclosure/2016/May/19 -CVE-2016-2039 - https://github.com/phpmyadmin/phpmyadmin/commit/f20970d32c3dfdf82aef7b6c244da1f769043813 -CVE-2016-2046 - http://packetstormsecurity.com/files/135709/Sophos-UTM-9-Cross-Site-Scripting.html -CVE-2016-2046 - http://seclists.org/fulldisclosure/2016/Feb/60 -CVE-2016-2046 - http://www.halock.com/blog/cve-2016-2046-cross-site-scripting-sophos-utm-9/ -CVE-2016-2047 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-2047 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2052 - https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5 -CVE-2016-2054 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html -CVE-2016-2055 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html -CVE-2016-2056 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html -CVE-2016-2056 - http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html -CVE-2016-2057 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html -CVE-2016-2058 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html -CVE-2016-2069 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2069 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2073 - http://www.openwall.com/lists/oss-security/2016/01/25/6 -CVE-2016-2073 - http://www.openwall.com/lists/oss-security/2016/01/26/7 -CVE-2016-2073 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2076 - http://www.vmware.com/security/advisories/VMSA-2016-0004.html -CVE-2016-2078 - http://packetstormsecurity.com/files/137189/VMWare-vSphere-Web-Client-6.0-Cross-Site-Scripting.html -CVE-2016-2085 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2016-2086 - http://www.securityfocus.com/bid/83282 -CVE-2016-2087 - http://packetstormsecurity.com/files/136564/Hexchat-IRC-Client-2.11.0-Directory-Traversal.html -CVE-2016-2087 - https://www.exploit-db.com/exploits/39656/ -CVE-2016-2089 - http://www.openwall.com/lists/oss-security/2016/01/28/4 -CVE-2016-2091 - http://www.openwall.com/lists/oss-security/2016/01/19/3 -CVE-2016-2098 - https://www.exploit-db.com/exploits/40086/ -CVE-2016-2099 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-2105 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-2105 - http://www.securityfocus.com/bid/91787 -CVE-2016-2105 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-2106 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-2106 - http://www.securityfocus.com/bid/91787 -CVE-2016-2106 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-2106 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 -CVE-2016-2107 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -CVE-2016-2107 - http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-2107 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2107 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2107 - http://www.securityfocus.com/bid/91787 -CVE-2016-2107 - https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/ -CVE-2016-2107 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-2107 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 -CVE-2016-2107 - https://www.exploit-db.com/exploits/39768/ -CVE-2016-2108 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -CVE-2016-2108 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-2108 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2108 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2108 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2108 - http://www.securityfocus.com/bid/91787 -CVE-2016-2108 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 -CVE-2016-2109 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-2109 - http://www.securityfocus.com/bid/91787 -CVE-2016-2109 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-2109 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 -CVE-2016-2110 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2110 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2111 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2111 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2112 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2112 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2113 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2113 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2114 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2114 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2115 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2115 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2117 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2117 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-2118 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2118 - http://www.ubuntu.com/usn/USN-2950-3 -CVE-2016-2118 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2016-2118 - https://www.kb.cert.org/vuls/id/813296 -CVE-2016-2119 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2126 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 -CVE-2016-2143 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2145 - https://github.com/UNINETT/mod_auth_mellon/pull/71 -CVE-2016-2146 - https://github.com/UNINETT/mod_auth_mellon/pull/71 -CVE-2016-2147 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2016-2147 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2016-2147 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2016-2147 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2016-2147 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2016-2147 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2016-2147 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2016-2148 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2016-2148 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2016-2148 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2016-2148 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2016-2148 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2016-2148 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2016-2148 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2016-2150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2160 - https://github.com/openshift/origin/pull/7864 -CVE-2016-2163 - http://packetstormsecurity.com/files/136433/Apache-OpenMeetings-3.0.7-Cross-Site-Scripting.html -CVE-2016-2164 - http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html -CVE-2016-2166 - http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html -CVE-2016-2167 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-2168 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-2170 - http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html -CVE-2016-2171 - http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and -CVE-2016-2175 - http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html -CVE-2016-2176 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -CVE-2016-2176 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-2176 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-2176 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2176 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2176 - http://www.securityfocus.com/bid/91787 -CVE-2016-2176 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 -CVE-2016-2177 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2177 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2177 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2177 - http://www.ubuntu.com/usn/USN-3181-1 -CVE-2016-2177 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2177 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2178 - http://eprint.iacr.org/2016/594.pdf -CVE-2016-2178 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2178 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2178 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2178 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2178 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2179 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2179 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2179 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2180 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2180 - https://hackerone.com/reports/221789 -CVE-2016-2180 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2180 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2181 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2181 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2181 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2181 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2182 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2182 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2182 - https://hackerone.com/reports/221788 -CVE-2016-2182 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2182 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2183 - http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html -CVE-2016-2183 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-2183 - http://seclists.org/fulldisclosure/2017/May/105 -CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2183 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2183 - https://access.redhat.com/articles/2548661 -CVE-2016-2183 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us -CVE-2016-2183 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 -CVE-2016-2183 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-2183 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-2183 - https://kc.mcafee.com/corporate/index?page=content&id=SB10197 -CVE-2016-2183 - https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ -CVE-2016-2183 - https://sweet32.info/ -CVE-2016-2183 - https://www.exploit-db.com/exploits/42091/ -CVE-2016-2183 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-2183 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-2183 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-2183 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-2183 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-2183 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-2184 - http://seclists.org/bugtraq/2016/Mar/88 -CVE-2016-2184 - http://seclists.org/bugtraq/2016/Mar/89 -CVE-2016-2184 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-2184 - https://www.exploit-db.com/exploits/39555/ -CVE-2016-2185 - http://seclists.org/bugtraq/2016/Mar/90 -CVE-2016-2185 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-2185 - https://bugzilla.redhat.com/show_bug.cgi?id=1283362 -CVE-2016-2185 - https://bugzilla.redhat.com/show_bug.cgi?id=1283363 -CVE-2016-2186 - http://seclists.org/bugtraq/2016/Mar/85 -CVE-2016-2186 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-2188 - http://seclists.org/bugtraq/2016/Mar/87 -CVE-2016-2188 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-2188 - https://www.exploit-db.com/exploits/39556/ -CVE-2016-2191 - http://packetstormsecurity.com/files/136553/Optipng-Invalid-Write.html -CVE-2016-2203 - http://packetstormsecurity.com/files/136758/Symantec-Brightmail-10.6.0-7-LDAP-Credential-Grabber.html -CVE-2016-2203 - https://www.exploit-db.com/exploits/39715/ -CVE-2016-2207 - https://www.exploit-db.com/exploits/40031/ -CVE-2016-2208 - https://www.exploit-db.com/exploits/39835/ -CVE-2016-2209 - https://www.exploit-db.com/exploits/40037/ -CVE-2016-2210 - https://www.exploit-db.com/exploits/40032/ -CVE-2016-2212 - http://karmainsecurity.com/KIS-2016-02 -CVE-2016-2212 - http://packetstormsecurity.com/files/135941/Magento-1.9.2.2-RSS-Feed-Information-Disclosure.html -CVE-2016-2212 - http://seclists.org/fulldisclosure/2016/Feb/105 -CVE-2016-2213 - http://git.videolan.org/?p=ffmpeg.git;a=commit;h=0aada30510d809bccfd539a90ea37b61188f2cb4 -CVE-2016-2216 - http://packetstormsecurity.com/files/135711/Node.js-HTTP-Response-Splitting.html -CVE-2016-2221 - https://wpvulndb.com/vulnerabilities/8377 -CVE-2016-2222 - https://wpvulndb.com/vulnerabilities/8376 -CVE-2016-2226 - https://www.exploit-db.com/exploits/42386/ -CVE-2016-2230 - http://www.kb.cert.org/vuls/id/544527 -CVE-2016-2231 - https://debihiga.wordpress.com/sa-whip/ -CVE-2016-2233 - http://packetstormsecurity.com/files/136563/Hexchat-IRC-Client-2.11.0-CAP-LS-Handling-Buffer-Overflow.html -CVE-2016-2233 - https://www.exploit-db.com/exploits/39657/ -CVE-2016-2242 - http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html -CVE-2016-2268 - http://packetstormsecurity.com/files/135617/Dell-SecureWorks-iOS-Certificate-Validation-Failure.html -CVE-2016-2270 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-2278 - https://www.exploit-db.com/exploits/39522/ -CVE-2016-2279 - https://www.exploit-db.com/exploits/44626/ -CVE-2016-2285 - http://seclists.org/fulldisclosure/2016/May/7 -CVE-2016-2286 - http://seclists.org/fulldisclosure/2016/May/7 -CVE-2016-2288 - https://www.exploit-db.com/exploits/39630/ -CVE-2016-2295 - http://seclists.org/fulldisclosure/2016/May/7 -CVE-2016-2296 - https://www.exploit-db.com/exploits/39822/ -CVE-2016-2314 - https://debihiga.wordpress.com/sa-ftp/ -CVE-2016-2315 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2315 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2317 - http://www.securityfocus.com/bid/83241 -CVE-2016-2318 - http://www.securityfocus.com/bid/83241 -CVE-2016-2324 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2324 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2326 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2016-2330 - http://www.ubuntu.com/usn/USN-2944-1 -CVE-2016-2334 - http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html -CVE-2016-2335 - http://www.talosintel.com/reports/TALOS-2016-0094/ -CVE-2016-2336 - http://www.talosintelligence.com/reports/TALOS-2016-0029/ -CVE-2016-2337 - http://www.talosintelligence.com/reports/TALOS-2016-0031/ -CVE-2016-2338 - http://www.talosintelligence.com/reports/TALOS-2016-0032/ -CVE-2016-2339 - http://www.talosintelligence.com/reports/TALOS-2016-0034/ -CVE-2016-2340 - http://www.kb.cert.org/vuls/id/279472 -CVE-2016-2342 - http://www.kb.cert.org/vuls/id/270232 -CVE-2016-2342 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2345 - http://packetstormsecurity.com/files/136293/Solarwinds-Dameware-Mini-Remote-Code-Execution.html -CVE-2016-2345 - http://www.kb.cert.org/vuls/id/897144 -CVE-2016-2345 - https://www.securifera.com/advisories/CVE-2016-2345 -CVE-2016-2346 - http://www.kb.cert.org/vuls/id/229047 -CVE-2016-2346 - https://adamcaudill.com/2016/02/02/plsql-developer-nonexistent-encryption/ -CVE-2016-2347 - http://www.talosintelligence.com/reports/TALOS-2016-0095/ -CVE-2016-2350 - http://www.kb.cert.org/vuls/id/505560 -CVE-2016-2351 - http://www.kb.cert.org/vuls/id/505560 -CVE-2016-2352 - http://www.kb.cert.org/vuls/id/505560 -CVE-2016-2353 - http://www.kb.cert.org/vuls/id/505560 -CVE-2016-2356 - https://www.youtube.com/watch?v=scckkI7CAW0 -CVE-2016-2357 - https://www.youtube.com/watch?v=scckkI7CAW0 -CVE-2016-2358 - https://www.youtube.com/watch?v=scckkI7CAW0 -CVE-2016-2359 - https://www.youtube.com/watch?v=scckkI7CAW0 -CVE-2016-2360 - https://www.youtube.com/watch?v=scckkI7CAW0 -CVE-2016-2362 - http://www.kb.cert.org/vuls/id/754056 -CVE-2016-2363 - http://www.kb.cert.org/vuls/id/754056 -CVE-2016-2364 - http://www.kb.cert.org/vuls/id/754056 -CVE-2016-2381 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2381 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2381 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2381 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-2381 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-2384 - http://www.securityfocus.com/bid/83256 -CVE-2016-2384 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2384 - https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384 -CVE-2016-2385 - http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html -CVE-2016-2385 - https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/ -CVE-2016-2385 - https://www.exploit-db.com/exploits/39638/ -CVE-2016-2386 - http://packetstormsecurity.com/files/137129/SAP-NetWeaver-AS-JAVA-7.5-SQL-Injection.html -CVE-2016-2386 - http://seclists.org/fulldisclosure/2016/May/56 -CVE-2016-2386 - https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/ -CVE-2016-2386 - https://github.com/vah13/SAP_exploit -CVE-2016-2386 - https://www.exploit-db.com/exploits/39840/ -CVE-2016-2386 - https://www.exploit-db.com/exploits/43495/ -CVE-2016-2387 - http://packetstormsecurity.com/files/137045/SAP-NetWeaver-AS-JAVA-7.4-Cross-Site-Scripting.html -CVE-2016-2387 - http://seclists.org/fulldisclosure/2016/May/39 -CVE-2016-2387 - https://erpscan.io/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/ -CVE-2016-2388 - http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html -CVE-2016-2388 - http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html -CVE-2016-2388 - https://www.exploit-db.com/exploits/39841/ -CVE-2016-2388 - https://www.exploit-db.com/exploits/43495/ -CVE-2016-2389 - http://packetstormsecurity.com/files/137046/SAP-MII-15.0-Directory-Traversal.html -CVE-2016-2389 - http://seclists.org/fulldisclosure/2016/May/40 -CVE-2016-2389 - https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/ -CVE-2016-2389 - https://www.exploit-db.com/exploits/39837/ -CVE-2016-2391 - http://www.securityfocus.com/bid/83263 -CVE-2016-2392 - http://www.securityfocus.com/bid/83274 -CVE-2016-2398 - http://www.kb.cert.org/vuls/id/418072 -CVE-2016-2399 - http://www.nemux.org/2016/02/23/libquicktime-1-2-4/ -CVE-2016-2399 - https://packetstormsecurity.com/files/135899/libquicktime-1.2.4-Integer-Overflow.html -CVE-2016-2399 - https://www.exploit-db.com/exploits/39487/ -CVE-2016-2402 - https://koz.io/pinning-cve-2016-2402/ -CVE-2016-2408 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40241/ -CVE-2016-2417 - https://www.exploit-db.com/exploits/39685/ -CVE-2016-2494 - http://packetstormsecurity.com/files/137404/Android-system-bin-sdcard-Stack-Buffer-Overflow.html -CVE-2016-2494 - https://www.exploit-db.com/exploits/39921/ -CVE-2016-2510 - https://github.com/frohoff/ysoserial/pull/13 -CVE-2016-2510 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-2511 - http://packetstormsecurity.com/files/135886/WebSVN-2.3.3-Cross-Site-Scripting.html -CVE-2016-2511 - http://seclists.org/fulldisclosure/2016/Feb/99 -CVE-2016-2512 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2513 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2516 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2516 - https://www.kb.cert.org/vuls/id/718152 -CVE-2016-2517 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2517 - https://www.kb.cert.org/vuls/id/718152 -CVE-2016-2518 - http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-2518 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2518 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2518 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2518 - https://www.kb.cert.org/vuls/id/718152 -CVE-2016-2519 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2519 - https://www.kb.cert.org/vuls/id/718152 -CVE-2016-2521 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2523 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-2525 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077 -CVE-2016-2526 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983 -CVE-2016-2527 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982 -CVE-2016-2528 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984 -CVE-2016-2530 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2531 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2532 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2533 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html -CVE-2016-2539 - https://packetstormsecurity.com/files/136109/ATutor-LMS-2.2.1-CSRF-Remote-Code-Execution.html -CVE-2016-2539 - https://www.exploit-db.com/exploits/39524/ -CVE-2016-2541 - https://fortiguard.com/zeroday/FG-VD-15-118 -CVE-2016-2542 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2016-2542 - https://www.tenable.com/security/tns-2019-08 -CVE-2016-2543 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2544 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2544 - https://bugzilla.redhat.com/show_bug.cgi?id=1311558 -CVE-2016-2545 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2546 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2547 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2548 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2549 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2550 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-2550 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2016-2555 - https://github.com/atutor/ATutor/commit/629b2c992447f7670a2fecc484abfad8c4c2d298 -CVE-2016-2555 - https://www.exploit-db.com/exploits/39514/ -CVE-2016-2560 - https://github.com/phpmyadmin/phpmyadmin/commit/ab1283e8366c97a155d4e9ae58628a248458ea32 -CVE-2016-2561 - https://github.com/phpmyadmin/phpmyadmin/commit/f33a42f1da9db943a67bda7d29f7dd91957a8e7e -CVE-2016-2563 - http://seclists.org/fulldisclosure/2016/Mar/22 -CVE-2016-2563 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563 -CVE-2016-2564 - https://medium.com/@iancarroll/bypassing-authentication-in-invision-power-board-with-cve-2016-2564-9a24ea3655f9 -CVE-2016-2569 - http://www.openwall.com/lists/oss-security/2016/02/26/2 -CVE-2016-2569 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt -CVE-2016-2569 - https://usn.ubuntu.com/3557-1/ -CVE-2016-2570 - http://www.openwall.com/lists/oss-security/2016/02/26/2 -CVE-2016-2570 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt -CVE-2016-2570 - https://usn.ubuntu.com/3557-1/ -CVE-2016-2571 - http://www.openwall.com/lists/oss-security/2016/02/26/2 -CVE-2016-2571 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt -CVE-2016-2571 - http://www.ubuntu.com/usn/USN-2921-1 -CVE-2016-2571 - https://usn.ubuntu.com/3557-1/ -CVE-2016-2572 - http://www.openwall.com/lists/oss-security/2016/02/26/2 -CVE-2016-2572 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt -CVE-2016-2774 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-2776 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2776 - https://www.exploit-db.com/exploits/40453/ -CVE-2016-2782 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-2782 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2016-2782 - https://www.exploit-db.com/exploits/39539/ -CVE-2016-2783 - https://packetstormsecurity.com/files/138082/Avaya-VOSS-4.1.0.0-SPB-Traffic-Traversal.html -CVE-2016-2784 - http://packetstormsecurity.com/files/136897/CMS-Made-Simple-Cache-Poisoning.html -CVE-2016-2784 - http://seclists.org/fulldisclosure/2016/May/15 -CVE-2016-2784 - https://www.exploit-db.com/exploits/39760/ -CVE-2016-2790 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2791 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2792 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2793 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2794 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2795 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2796 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2797 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2798 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2800 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2801 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2802 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -CVE-2016-2803 - http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html -CVE-2016-2804 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2804 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2804 - https://bugzilla.mozilla.org/show_bug.cgi?id=1240880 -CVE-2016-2805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2806 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2806 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2806 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2807 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2807 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2807 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2808 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2808 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2808 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246061 -CVE-2016-2809 - https://bugzilla.mozilla.org/show_bug.cgi?id=1212939 -CVE-2016-2810 - https://bugzilla.mozilla.org/show_bug.cgi?id=1229681 -CVE-2016-2811 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2811 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2811 - https://bugzilla.mozilla.org/show_bug.cgi?id=1252330 -CVE-2016-2812 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2812 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2814 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2814 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2814 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2816 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2816 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2816 - https://bugzilla.mozilla.org/show_bug.cgi?id=1223743 -CVE-2016-2817 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2817 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2818 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2818 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2819 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2819 - https://bugzilla.mozilla.org/show_bug.cgi?id=1270381 -CVE-2016-2819 - https://www.exploit-db.com/exploits/44293/ -CVE-2016-2820 - http://www.ubuntu.com/usn/USN-2936-1 -CVE-2016-2820 - http://www.ubuntu.com/usn/USN-2936-3 -CVE-2016-2820 - https://bugzilla.mozilla.org/show_bug.cgi?id=870870 -CVE-2016-2821 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2821 - https://bugzilla.mozilla.org/show_bug.cgi?id=1271460 -CVE-2016-2822 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2822 - https://bugzilla.mozilla.org/show_bug.cgi?id=1273129 -CVE-2016-2824 - https://bugzilla.mozilla.org/show_bug.cgi?id=1248580 -CVE-2016-2825 - https://bugzilla.mozilla.org/show_bug.cgi?id=1193093 -CVE-2016-2826 - https://bugzilla.mozilla.org/show_bug.cgi?id=1237219 -CVE-2016-2827 - https://bugzilla.mozilla.org/show_bug.cgi?id=1289085 -CVE-2016-2828 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2830 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2831 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2834 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-2834 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-2836 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2837 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2837 - https://bugzilla.mozilla.org/show_bug.cgi?id=1274637 -CVE-2016-2838 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2840 - http://packetstormsecurity.com/files/136543/Open-Xchange-7.8.0-Cross-Site-Scripting.html -CVE-2016-2842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-2842 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 -CVE-2016-2842 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-2845 - http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html -CVE-2016-2847 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-2847 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-2847 - http://www.ubuntu.com/usn/USN-2948-2 -CVE-2016-2851 - http://seclists.org/fulldisclosure/2016/Mar/21 -CVE-2016-2851 - https://www.exploit-db.com/exploits/39550/ -CVE-2016-2851 - https://www.x41-dsec.de/lab/advisories/x41-2016-001-libotr/ -CVE-2016-2855 - http://packetstormsecurity.com/files/137025/Huawei-Mobile-Broadband-HL-Service-22.001.25.00.03-Local-Privilege-Escalation.html -CVE-2016-2855 - http://seclists.org/fulldisclosure/2016/May/34 -CVE-2016-2959 - http://www.securityfocus.com/bid/100599 -CVE-2016-2965 - http://www.securityfocus.com/bid/100599 -CVE-2016-2969 - http://www.securityfocus.com/bid/100599 -CVE-2016-2971 - http://www.securityfocus.com/bid/100599 -CVE-2016-2972 - http://www.securityfocus.com/bid/100599 -CVE-2016-2973 - http://www.securityfocus.com/bid/100599 -CVE-2016-2977 - http://www.securityfocus.com/bid/100599 -CVE-2016-2979 - http://www.securityfocus.com/bid/100599 -CVE-2016-3029 - http://www.ibm.com/support/docview.wss?uid=swg21995345 -CVE-2016-3053 - https://www.exploit-db.com/exploits/40709/ -CVE-2016-3062 - https://bugzilla.libav.org/show_bug.cgi?id=929 -CVE-2016-3062 - https://ffmpeg.org/security.html -CVE-2016-3063 - https://security.netapp.com/advisory/ntap-20160310-0004/ -CVE-2016-3068 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-3068 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3069 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-3069 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3074 - http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html -CVE-2016-3074 - http://seclists.org/fulldisclosure/2016/Apr/72 -CVE-2016-3074 - https://www.exploit-db.com/exploits/39736/ -CVE-2016-3078 - http://www.openwall.com/lists/oss-security/2016/04/28/1 -CVE-2016-3078 - https://www.exploit-db.com/exploits/39742/ -CVE-2016-3081 - http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html -CVE-2016-3081 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3081 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3081 - http://www.securityfocus.com/bid/91787 -CVE-2016-3081 - https://www.exploit-db.com/exploits/39756/ -CVE-2016-3085 - http://packetstormsecurity.com/files/137390/Apache-CloudStack-4.5.0-Authentication-Bypass.html -CVE-2016-3087 - https://www.exploit-db.com/exploits/39919/ -CVE-2016-3088 - https://www.exploit-db.com/exploits/42283/ -CVE-2016-3089 - http://packetstormsecurity.com/files/138313/Apache-OpenMeetings-3.1.0-Cross-Site-Scripting.html -CVE-2016-3092 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-3092 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-3092 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-3092 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3092 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-3094 - http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html -CVE-2016-3096 - https://github.com/ansible/ansible-modules-extras/pull/1941 -CVE-2016-3096 - https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4 -CVE-2016-3109 - http://packetstormsecurity.com/files/136781/Shopware-Remote-Code-Execution.html -CVE-2016-3109 - https://github.com/shopware/shopware/commit/d73e9031a5b2ab6e918eb86d1e2b2e873cd3558d -CVE-2016-3115 - http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html -CVE-2016-3115 - http://seclists.org/fulldisclosure/2016/Mar/46 -CVE-2016-3115 - http://seclists.org/fulldisclosure/2016/Mar/47 -CVE-2016-3115 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-3115 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3115 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3115 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115 -CVE-2016-3115 - https://www.exploit-db.com/exploits/39569/ -CVE-2016-3116 - http://packetstormsecurity.com/files/136251/Dropbear-SSHD-xauth-Command-Injection-Bypass.html -CVE-2016-3116 - http://seclists.org/fulldisclosure/2016/Mar/47 -CVE-2016-3116 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115 -CVE-2016-3128 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038913 -CVE-2016-3129 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038814&language=None -CVE-2016-3132 - https://bugs.php.net/bug.php?id=71735 -CVE-2016-3134 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3134 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-3134 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-3134 - https://code.google.com/p/google-security-research/issues/detail?id=758 -CVE-2016-3135 - http://www.ubuntu.com/usn/USN-2930-2 -CVE-2016-3135 - http://www.ubuntu.com/usn/USN-3056-1 -CVE-2016-3135 - https://code.google.com/p/google-security-research/issues/detail?id=758 -CVE-2016-3136 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3136 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3136 - https://bugzilla.redhat.com/show_bug.cgi?id=1283370 -CVE-2016-3136 - https://bugzilla.redhat.com/show_bug.cgi?id=1317007 -CVE-2016-3136 - https://www.exploit-db.com/exploits/39541/ -CVE-2016-3137 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3137 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3138 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3139 - https://bugzilla.redhat.com/show_bug.cgi?id=1283375 -CVE-2016-3139 - https://bugzilla.redhat.com/show_bug.cgi?id=1283377 -CVE-2016-3139 - https://www.exploit-db.com/exploits/39538/ -CVE-2016-3140 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3140 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3140 - https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f -CVE-2016-3140 - https://www.exploit-db.com/exploits/39537/ -CVE-2016-3141 - https://bugs.php.net/bug.php?id=71587 -CVE-2016-3142 - https://bugs.php.net/bug.php?id=71498 -CVE-2016-3147 - https://www.securifera.com/advisories/cve-2016-3147/ -CVE-2016-3149 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html -CVE-2016-3150 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html -CVE-2016-3151 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html -CVE-2016-3152 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html -CVE-2016-3156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3156 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-3156 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3157 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3157 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3158 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3159 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3161 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -CVE-2016-3172 - http://www.openwall.com/lists/oss-security/2016/03/10/13 -CVE-2016-3172 - http://www.openwall.com/lists/oss-security/2016/03/15/11 -CVE-2016-3173 - http://packetstormsecurity.com/files/137187/Open-Xchange-OX-AppSuite-7.8.0-XSS-Open-Redirect.html -CVE-2016-3174 - http://packetstormsecurity.com/files/137187/Open-Xchange-OX-AppSuite-7.8.0-XSS-Open-Redirect.html -CVE-2016-3183 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-3185 - https://bugs.php.net/bug.php?id=70081 -CVE-2016-3185 - https://bugs.php.net/bug.php?id=71610 -CVE-2016-3186 - https://bugzilla.redhat.com/show_bug.cgi?id=1319503 -CVE-2016-3186 - https://usn.ubuntu.com/3606-1/ -CVE-2016-3189 - http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html -CVE-2016-3189 - http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html -CVE-2016-3189 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3189 - https://seclists.org/bugtraq/2019/Aug/4 -CVE-2016-3189 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-3191 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3196 - http://seclists.org/fulldisclosure/2016/Aug/4 -CVE-2016-3196 - http://www.vulnerability-lab.com/get_content.php?id=1687 -CVE-2016-3216 - https://www.exploit-db.com/exploits/39990/ -CVE-2016-3219 - https://www.exploit-db.com/exploits/39993/ -CVE-2016-3220 - https://www.exploit-db.com/exploits/39991/ -CVE-2016-3222 - http://packetstormsecurity.com/files/140043/Microsoft-Edge-CBase-Scriptable-Private-Query-Interface-Memory-Corruption.html -CVE-2016-3222 - https://www.exploit-db.com/exploits/40880/ -CVE-2016-3223 - http://packetstormsecurity.com/files/138248/Microsoft-Windows-7-Group-Policy-Privilege-Escalation.html -CVE-2016-3223 - https://www.exploit-db.com/exploits/40219/ -CVE-2016-3225 - https://www.exploit-db.com/exploits/45562/ -CVE-2016-3235 - http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html -CVE-2016-3237 - https://www.exploit-db.com/exploits/40409/ -CVE-2016-3247 - http://blog.skylined.nl/20161118002.html -CVE-2016-3247 - http://seclists.org/fulldisclosure/2016/Nov/111 -CVE-2016-3247 - https://www.exploit-db.com/exploits/40797/ -CVE-2016-3288 - https://www.exploit-db.com/exploits/40253/ -CVE-2016-3301 - https://www.exploit-db.com/exploits/40255/ -CVE-2016-3303 - https://www.exploit-db.com/exploits/40256/ -CVE-2016-3304 - https://www.exploit-db.com/exploits/40257/ -CVE-2016-3309 - https://www.exploit-db.com/exploits/42960/ -CVE-2016-3310 - https://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 -CVE-2016-3313 - https://www.exploit-db.com/exploits/40224/ -CVE-2016-3316 - https://www.exploit-db.com/exploits/40238/ -CVE-2016-3321 - http://seclists.org/fulldisclosure/2016/Aug/44 -CVE-2016-3321 - https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html -CVE-2016-3324 - https://www.exploit-db.com/exploits/40748/ -CVE-2016-3325 - https://www.exploit-db.com/exploits/40747/ -CVE-2016-3351 - https://www.brokenbrowser.com/detecting-apps-mimetype-malware/ -CVE-2016-3357 - https://www.exploit-db.com/exploits/40406/ -CVE-2016-3371 - https://www.exploit-db.com/exploits/40429/ -CVE-2016-3373 - https://www.exploit-db.com/exploits/40430/ -CVE-2016-3374 - http://blog.malerisch.net/2016/09/microsoft--out-of-bounds-read-pdf-library-cve-2016-3374.html -CVE-2016-3387 - https://www.exploit-db.com/exploits/40607/ -CVE-2016-3388 - https://www.exploit-db.com/exploits/40606/ -CVE-2016-3403 - http://seclists.org/fulldisclosure/2017/Jan/30 -CVE-2016-3403 - https://sysdream.com/news/lab/2017-01-12-cve-2016-3403-multiple-csrf-in-zimbra-administration-interface/ -CVE-2016-3411 - https://www.exploit-db.com/exploits/45177/ -CVE-2016-3416 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3417 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3418 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3419 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3420 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3421 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3422 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3423 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3424 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3424 - http://www.securityfocus.com/bid/91787 -CVE-2016-3425 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3426 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3426 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3427 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3427 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3428 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3429 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3431 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3432 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3432 - http://www.securityfocus.com/bid/91787 -CVE-2016-3433 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3433 - http://www.securityfocus.com/bid/91787 -CVE-2016-3434 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3435 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3436 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3437 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3438 - http://packetstormsecurity.com/files/138564/Oracle-E-Business-Suite-12.2-Cross-Site-Scripting.html -CVE-2016-3438 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3439 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3440 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3440 - http://www.securityfocus.com/bid/91787 -CVE-2016-3441 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3442 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3443 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3444 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3444 - http://www.securityfocus.com/bid/91787 -CVE-2016-3445 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3445 - http://www.securityfocus.com/bid/91787 -CVE-2016-3446 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3446 - http://www.securityfocus.com/bid/91787 -CVE-2016-3447 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3448 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3448 - http://www.securityfocus.com/bid/91787 -CVE-2016-3449 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3450 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3450 - http://www.securityfocus.com/bid/91787 -CVE-2016-3451 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3451 - http://www.securityfocus.com/bid/91787 -CVE-2016-3452 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3452 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3452 - http://www.securityfocus.com/bid/91787 -CVE-2016-3453 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3453 - http://www.securityfocus.com/bid/91787 -CVE-2016-3454 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3455 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3456 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3457 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3458 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3458 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3458 - http://www.securityfocus.com/bid/91787 -CVE-2016-3459 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3459 - http://www.securityfocus.com/bid/91787 -CVE-2016-3460 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3461 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3462 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3463 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3464 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3465 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3466 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html -CVE-2016-3467 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3467 - http://www.securityfocus.com/bid/91787 -CVE-2016-3468 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3468 - http://www.securityfocus.com/bid/91787 -CVE-2016-3469 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3469 - http://www.securityfocus.com/bid/91787 -CVE-2016-3470 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3470 - http://www.securityfocus.com/bid/91787 -CVE-2016-3471 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3471 - http://www.securityfocus.com/bid/91787 -CVE-2016-3472 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3472 - http://www.securityfocus.com/bid/91787 -CVE-2016-3473 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3473 - https://www.exploit-db.com/exploits/40590/ -CVE-2016-3474 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3474 - http://www.securityfocus.com/bid/91787 -CVE-2016-3475 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3475 - http://www.securityfocus.com/bid/91787 -CVE-2016-3476 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3476 - http://www.securityfocus.com/bid/91787 -CVE-2016-3477 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3477 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3477 - http://www.securityfocus.com/bid/91787 -CVE-2016-3478 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3478 - http://www.securityfocus.com/bid/91787 -CVE-2016-3479 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3479 - http://www.securityfocus.com/bid/91787 -CVE-2016-3480 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3480 - http://www.securityfocus.com/bid/91787 -CVE-2016-3481 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3481 - http://www.securityfocus.com/bid/91787 -CVE-2016-3482 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3482 - http://www.securityfocus.com/bid/91787 -CVE-2016-3483 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3483 - http://www.securityfocus.com/bid/91787 -CVE-2016-3484 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3484 - http://www.securityfocus.com/bid/91787 -CVE-2016-3485 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3485 - http://www.securityfocus.com/bid/91787 -CVE-2016-3486 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3486 - http://www.securityfocus.com/bid/91787 -CVE-2016-3487 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3487 - http://www.securityfocus.com/bid/91787 -CVE-2016-3488 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3488 - http://www.securityfocus.com/bid/91787 -CVE-2016-3489 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3489 - http://www.securityfocus.com/bid/91787 -CVE-2016-3490 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3490 - http://www.securityfocus.com/bid/91787 -CVE-2016-3491 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3491 - http://www.securityfocus.com/bid/91787 -CVE-2016-3491 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -CVE-2016-3492 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3493 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3493 - http://www.securityfocus.com/bid/91787 -CVE-2016-3494 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3494 - http://www.securityfocus.com/bid/91787 -CVE-2016-3495 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3496 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3496 - http://www.securityfocus.com/bid/91787 -CVE-2016-3497 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3497 - http://www.securityfocus.com/bid/91787 -CVE-2016-3498 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3498 - http://www.securityfocus.com/bid/91787 -CVE-2016-3499 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3499 - http://www.securityfocus.com/bid/91787 -CVE-2016-3500 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3500 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3500 - http://www.securityfocus.com/bid/91787 -CVE-2016-3501 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3501 - http://www.securityfocus.com/bid/91787 -CVE-2016-3502 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3502 - http://www.securityfocus.com/bid/91787 -CVE-2016-3503 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3503 - http://www.securityfocus.com/bid/91787 -CVE-2016-3504 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3504 - http://www.securityfocus.com/bid/91787 -CVE-2016-3505 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-3506 - http://www.securityfocus.com/bid/91787 -CVE-2016-3507 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3507 - http://www.securityfocus.com/bid/91787 -CVE-2016-3508 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3508 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3508 - http://www.securityfocus.com/bid/91787 -CVE-2016-3509 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3509 - http://www.securityfocus.com/bid/91787 -CVE-2016-3510 - http://packetstormsecurity.com/files/152324/Oracle-Weblogic-Server-Deserialization-MarshalledObject-Remote-Code-Execution.html -CVE-2016-3510 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3510 - http://www.securityfocus.com/bid/91787 -CVE-2016-3511 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3511 - http://www.securityfocus.com/bid/91787 -CVE-2016-3512 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3512 - http://www.securityfocus.com/bid/91787 -CVE-2016-3513 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3513 - http://www.securityfocus.com/bid/91787 -CVE-2016-3514 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3514 - http://www.securityfocus.com/bid/91787 -CVE-2016-3515 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3515 - http://www.securityfocus.com/bid/91787 -CVE-2016-3516 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3516 - http://www.securityfocus.com/bid/91787 -CVE-2016-3517 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3517 - http://www.securityfocus.com/bid/91787 -CVE-2016-3518 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3518 - http://www.securityfocus.com/bid/91787 -CVE-2016-3519 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3519 - http://www.securityfocus.com/bid/91787 -CVE-2016-3520 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3520 - http://www.securityfocus.com/bid/91787 -CVE-2016-3521 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3521 - http://www.securityfocus.com/bid/91787 -CVE-2016-3522 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3522 - http://www.securityfocus.com/bid/91787 -CVE-2016-3523 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3523 - http://www.securityfocus.com/bid/91787 -CVE-2016-3524 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3524 - http://www.securityfocus.com/bid/91787 -CVE-2016-3525 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3525 - http://www.securityfocus.com/bid/91787 -CVE-2016-3526 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3526 - http://www.securityfocus.com/bid/91787 -CVE-2016-3527 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3527 - http://www.securityfocus.com/bid/91787 -CVE-2016-3528 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3528 - http://www.securityfocus.com/bid/91787 -CVE-2016-3529 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3529 - http://www.securityfocus.com/bid/91787 -CVE-2016-3530 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3530 - http://www.securityfocus.com/bid/91787 -CVE-2016-3531 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3531 - http://www.securityfocus.com/bid/91787 -CVE-2016-3532 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3532 - http://www.securityfocus.com/bid/91787 -CVE-2016-3532 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -CVE-2016-3533 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3533 - http://www.securityfocus.com/bid/91787 -CVE-2016-3533 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -CVE-2016-3534 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3534 - http://www.securityfocus.com/bid/91787 -CVE-2016-3534 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -CVE-2016-3535 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3535 - http://www.securityfocus.com/bid/91787 -CVE-2016-3535 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -CVE-2016-3536 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3536 - http://www.securityfocus.com/bid/91787 -CVE-2016-3536 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -CVE-2016-3537 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3537 - http://www.securityfocus.com/bid/91787 -CVE-2016-3538 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3538 - http://www.securityfocus.com/bid/91787 -CVE-2016-3539 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3539 - http://www.securityfocus.com/bid/91787 -CVE-2016-3540 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3540 - http://www.securityfocus.com/bid/91787 -CVE-2016-3541 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3541 - http://www.securityfocus.com/bid/91787 -CVE-2016-3542 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3542 - http://www.securityfocus.com/bid/91787 -CVE-2016-3543 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3543 - http://www.securityfocus.com/bid/91787 -CVE-2016-3544 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3544 - http://www.securityfocus.com/bid/91787 -CVE-2016-3545 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3545 - http://www.securityfocus.com/bid/91787 -CVE-2016-3546 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3546 - http://www.securityfocus.com/bid/91787 -CVE-2016-3547 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3547 - http://www.securityfocus.com/bid/91787 -CVE-2016-3548 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3548 - http://www.securityfocus.com/bid/91787 -CVE-2016-3549 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3549 - http://www.securityfocus.com/bid/91787 -CVE-2016-3550 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3550 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3550 - http://www.securityfocus.com/bid/91787 -CVE-2016-3551 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3552 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3552 - http://www.securityfocus.com/bid/91787 -CVE-2016-3553 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3553 - http://www.securityfocus.com/bid/91787 -CVE-2016-3554 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3554 - http://www.securityfocus.com/bid/91787 -CVE-2016-3555 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3555 - http://www.securityfocus.com/bid/91787 -CVE-2016-3556 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3556 - http://www.securityfocus.com/bid/91787 -CVE-2016-3557 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3557 - http://www.securityfocus.com/bid/91787 -CVE-2016-3558 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3558 - http://www.securityfocus.com/bid/91787 -CVE-2016-3559 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3559 - http://www.securityfocus.com/bid/91787 -CVE-2016-3560 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3560 - http://www.securityfocus.com/bid/91787 -CVE-2016-3561 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3561 - http://www.securityfocus.com/bid/91787 -CVE-2016-3562 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-3563 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3563 - http://www.securityfocus.com/bid/91787 -CVE-2016-3564 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3564 - http://www.securityfocus.com/bid/91787 -CVE-2016-3565 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3565 - http://www.securityfocus.com/bid/91787 -CVE-2016-3566 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3566 - http://www.securityfocus.com/bid/91787 -CVE-2016-3567 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3567 - http://www.securityfocus.com/bid/91787 -CVE-2016-3568 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3568 - http://www.securityfocus.com/bid/91787 -CVE-2016-3569 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3569 - http://www.securityfocus.com/bid/91787 -CVE-2016-3570 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3570 - http://www.securityfocus.com/bid/91787 -CVE-2016-3571 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3571 - http://www.securityfocus.com/bid/91787 -CVE-2016-3572 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3572 - http://www.securityfocus.com/bid/91787 -CVE-2016-3573 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3573 - http://www.securityfocus.com/bid/91787 -CVE-2016-3574 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3574 - http://www.securityfocus.com/bid/91787 -CVE-2016-3575 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3575 - http://www.securityfocus.com/bid/91787 -CVE-2016-3576 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3576 - http://www.securityfocus.com/bid/91787 -CVE-2016-3577 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3577 - http://www.securityfocus.com/bid/91787 -CVE-2016-3578 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3578 - http://www.securityfocus.com/bid/91787 -CVE-2016-3579 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3579 - http://www.securityfocus.com/bid/91787 -CVE-2016-3580 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3580 - http://www.securityfocus.com/bid/91787 -CVE-2016-3581 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3581 - http://www.securityfocus.com/bid/91787 -CVE-2016-3582 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3582 - http://www.securityfocus.com/bid/91787 -CVE-2016-3583 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3583 - http://www.securityfocus.com/bid/91787 -CVE-2016-3584 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3584 - http://www.securityfocus.com/bid/91787 -CVE-2016-3585 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3585 - http://www.securityfocus.com/bid/91787 -CVE-2016-3586 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3586 - http://www.securityfocus.com/bid/91787 -CVE-2016-3587 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3587 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3587 - http://www.securityfocus.com/bid/91787 -CVE-2016-3588 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3588 - http://www.securityfocus.com/bid/91787 -CVE-2016-3589 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3589 - http://www.securityfocus.com/bid/91787 -CVE-2016-3590 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3590 - http://www.securityfocus.com/bid/91787 -CVE-2016-3591 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3591 - http://www.securityfocus.com/bid/91787 -CVE-2016-3592 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3592 - http://www.securityfocus.com/bid/91787 -CVE-2016-3593 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3593 - http://www.securityfocus.com/bid/91787 -CVE-2016-3594 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3594 - http://www.securityfocus.com/bid/91787 -CVE-2016-3595 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3595 - http://www.securityfocus.com/bid/91787 -CVE-2016-3596 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3596 - http://www.securityfocus.com/bid/91787 -CVE-2016-3597 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3597 - http://www.securityfocus.com/bid/91787 -CVE-2016-3598 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3598 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3598 - http://www.securityfocus.com/bid/91787 -CVE-2016-3606 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3606 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3606 - http://www.securityfocus.com/bid/91787 -CVE-2016-3607 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2016-3607 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3607 - http://www.securityfocus.com/bid/91787 -CVE-2016-3608 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3608 - http://www.securityfocus.com/bid/91787 -CVE-2016-3609 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3609 - http://www.securityfocus.com/bid/91787 -CVE-2016-3610 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3610 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3610 - http://www.securityfocus.com/bid/91787 -CVE-2016-3611 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3611 - http://www.securityfocus.com/bid/91787 -CVE-2016-3612 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3612 - http://www.securityfocus.com/bid/91787 -CVE-2016-3613 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3613 - http://www.securityfocus.com/bid/91787 -CVE-2016-3614 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3614 - http://www.securityfocus.com/bid/91787 -CVE-2016-3615 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-3615 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3615 - http://www.securityfocus.com/bid/91787 -CVE-2016-3627 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3627 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3627 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3628 - http://www.tibco.com/mk/advisory.jsp -CVE-2016-3630 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-3632 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3632 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3638 - http://packetstormsecurity.com/files/139096/SAP-SLDREG-Memory-Corruption.html -CVE-2016-3639 - http://packetstormsecurity.com/files/138428/SAP-HANA-1.00.091.00.1418659308-Information-Disclosure.html -CVE-2016-3642 - http://packetstormsecurity.com/files/137486/Solarwinds-Virtualization-Manager-6.3.1-Java-Deserialization.html -CVE-2016-3642 - http://seclists.org/fulldisclosure/2016/Jun/25 -CVE-2016-3642 - http://seclists.org/fulldisclosure/2016/Jun/29 -CVE-2016-3643 - http://packetstormsecurity.com/files/137487/Solarwinds-Virtualization-Manager-6.3.1-Privilege-Escalation.html -CVE-2016-3643 - http://seclists.org/fulldisclosure/2016/Jun/26 -CVE-2016-3643 - https://www.exploit-db.com/exploits/39967/ -CVE-2016-3644 - https://www.exploit-db.com/exploits/40034/ -CVE-2016-3645 - https://www.exploit-db.com/exploits/40035/ -CVE-2016-3646 - https://www.exploit-db.com/exploits/40036/ -CVE-2016-3652 - https://www.exploit-db.com/exploits/40041/ -CVE-2016-3653 - https://www.exploit-db.com/exploits/40041/ -CVE-2016-3658 - http://www.openwall.com/lists/oss-security/2016/04/08/12 -CVE-2016-3659 - http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html -CVE-2016-3659 - http://seclists.org/fulldisclosure/2016/Apr/4 -CVE-2016-3664 - http://packetstormsecurity.com/files/137020/Trend-Micro-Mobile-Security-Man-In-The-Middle.html -CVE-2016-3670 - http://packetstormsecurity.com/files/137279/Liferay-CE-Stored-Cross-Site-Scripting.html -CVE-2016-3670 - https://www.exploit-db.com/exploits/39880/ -CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-3672 - https://www.exploit-db.com/exploits/39669/ -CVE-2016-3684 - http://packetstormsecurity.com/files/136172/SAP-Download-Manager-2.1.142-Weak-Encryption.html -CVE-2016-3684 - http://seclists.org/fulldisclosure/2016/Mar/20 -CVE-2016-3684 - http://www.coresecurity.com/advisories/sap-download-manager-password-weak-encryption -CVE-2016-3685 - http://packetstormsecurity.com/files/136172/SAP-Download-Manager-2.1.142-Weak-Encryption.html -CVE-2016-3685 - http://seclists.org/fulldisclosure/2016/Mar/20 -CVE-2016-3685 - http://www.coresecurity.com/advisories/sap-download-manager-password-weak-encryption -CVE-2016-3688 - http://packetstormsecurity.com/files/136548/DotCMS-3.3-SQL-Injection.html -CVE-2016-3688 - http://seclists.org/fulldisclosure/2016/Apr/11 -CVE-2016-3688 - http://seclists.org/fulldisclosure/2016/Apr/5 -CVE-2016-3689 - http://www.ubuntu.com/usn/USN-2970-1 -CVE-2016-3689 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3694 - http://packetstormsecurity.com/files/136734/modified-eCommerce-2.0.0.0-Rev-9678-SQL-Injection.html -CVE-2016-3694 - https://www.exploit-db.com/exploits/39710/ -CVE-2016-3697 - https://github.com/opencontainers/runc/pull/708 -CVE-2016-3698 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3698 - https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f -CVE-2016-3705 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3705 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3705 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3710 - http://rhn.redhat.com/errata/RHSA-2016-0725.html -CVE-2016-3710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3710 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3712 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3714 - http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html -CVE-2016-3714 - http://www.openwall.com/lists/oss-security/2016/05/03/13 -CVE-2016-3714 - http://www.openwall.com/lists/oss-security/2016/05/03/18 -CVE-2016-3714 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3714 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3714 - https://imagetragick.com/ -CVE-2016-3714 - https://www.exploit-db.com/exploits/39767/ -CVE-2016-3714 - https://www.exploit-db.com/exploits/39791/ -CVE-2016-3714 - https://www.imagemagick.org/script/changelog.php -CVE-2016-3714 - https://www.kb.cert.org/vuls/id/250519 -CVE-2016-3715 - http://www.openwall.com/lists/oss-security/2016/05/03/18 -CVE-2016-3715 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3715 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3715 - https://www.exploit-db.com/exploits/39767/ -CVE-2016-3715 - https://www.imagemagick.org/script/changelog.php -CVE-2016-3716 - http://www.openwall.com/lists/oss-security/2016/05/03/18 -CVE-2016-3716 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3716 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3716 - https://www.exploit-db.com/exploits/39767/ -CVE-2016-3716 - https://www.imagemagick.org/script/changelog.php -CVE-2016-3717 - http://www.openwall.com/lists/oss-security/2016/05/03/18 -CVE-2016-3717 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3717 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3717 - https://www.exploit-db.com/exploits/39767/ -CVE-2016-3717 - https://www.imagemagick.org/script/changelog.php -CVE-2016-3718 - http://www.openwall.com/lists/oss-security/2016/05/03/18 -CVE-2016-3718 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-3718 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-3718 - https://www.exploit-db.com/exploits/39767/ -CVE-2016-3718 - https://www.imagemagick.org/script/changelog.php -CVE-2016-3721 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3722 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3723 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3724 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3725 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3726 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3727 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 -CVE-2016-3737 - https://www.tenable.com/security/research/tra-2016-22 -CVE-2016-3739 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-3739 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-3740 - https://0patch.blogspot.com/2016/07/0patching-foxit-readers-heap-buffer.html -CVE-2016-3861 - https://www.exploit-db.com/exploits/40354/ -CVE-2016-3912 - https://android.googlesource.com/platform/frameworks/base/+/6c049120c2d749f0c0289d822ec7d0aa692f55c5 -CVE-2016-3914 - https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/3a3a5d145d380deef2d5b7c3150864cd04be397f -CVE-2016-3943 - http://packetstormsecurity.com/files/136606/Panda-Endpoint-Administration-Agent-Privilege-Escalation.html -CVE-2016-3943 - https://www.exploit-db.com/exploits/39671/ -CVE-2016-3945 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3945 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3948 - https://usn.ubuntu.com/3557-1/ -CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-3952 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ -CVE-2016-3953 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ -CVE-2016-3954 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ -CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-3957 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ -CVE-2016-3960 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3961 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-3961 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-3961 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-3962 - https://www.exploit-db.com/exploits/40120/ -CVE-2016-3963 - https://www.exploit-db.com/exploits/44721/ -CVE-2016-3968 - http://packetstormsecurity.com/files/136561/Sophos-Cyberoam-NG-Series-Cross-Site-Scripting.html -CVE-2016-3968 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5313.php -CVE-2016-3971 - http://seclists.org/fulldisclosure/2016/Apr/37 -CVE-2016-3972 - http://seclists.org/fulldisclosure/2016/Apr/36 -CVE-2016-3973 - http://packetstormsecurity.com/files/137579/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html -CVE-2016-3974 - http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html -CVE-2016-3974 - http://seclists.org/fulldisclosure/2016/Jun/41 -CVE-2016-3974 - https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/ -CVE-2016-3974 - https://www.exploit-db.com/exploits/39995/ -CVE-2016-3975 - http://packetstormsecurity.com/files/137529/SAP-NetWeaver-AS-JAVA-7.5-Cross-Site-Scripting.html -CVE-2016-3975 - http://seclists.org/fulldisclosure/2016/Jun/42 -CVE-2016-3975 - https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/ -CVE-2016-3976 - http://packetstormsecurity.com/files/137528/SAP-NetWeaver-AS-JAVA-7.5-Directory-Traversal.html -CVE-2016-3976 - http://seclists.org/fulldisclosure/2016/Jun/40 -CVE-2016-3976 - https://erpscan.io/advisories/erpscan-16-012/ -CVE-2016-3976 - https://launchpad.support.sap.com/#/notes/2234971 -CVE-2016-3976 - https://www.exploit-db.com/exploits/39996/ -CVE-2016-3977 - https://bugzilla.redhat.com/show_bug.cgi?id=1325771 -CVE-2016-3978 - http://seclists.org/fulldisclosure/2016/Mar/68 -CVE-2016-3979 - http://packetstormsecurity.com/files/137589/SAP-NetWeaver-AS-JAVA-7.4-icman-Denial-Of-Service.html -CVE-2016-3979 - https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/ -CVE-2016-3980 - http://packetstormsecurity.com/files/137591/SAP-NetWeaver-AS-JAVA-7.4-jstart-Denial-Of-Service.html -CVE-2016-3980 - https://erpscan.io/advisories/erpscan-16-018-sap-java-jstart-dos/ -CVE-2016-3984 - http://lab.mediaservice.net/advisory/2016-01-mcafee.txt -CVE-2016-3984 - http://seclists.org/fulldisclosure/2016/Mar/13 -CVE-2016-3984 - https://www.exploit-db.com/exploits/39531/ -CVE-2016-3986 - http://packetstormsecurity.com/files/136090/Avast-Authenticode-Parsing-Memory-Corruption.html -CVE-2016-3986 - https://www.exploit-db.com/exploits/39530/ -CVE-2016-3987 - http://blog.trendmicro.com/information-on-reported-vulnerabilities-in-trend-micro-password-manager/ -CVE-2016-3987 - http://packetstormsecurity.com/files/135222/TrendMicro-Node.js-HTTP-Server-Command-Execution.html -CVE-2016-3987 - https://www.exploit-db.com/exploits/39218/ -CVE-2016-3989 - https://www.exploit-db.com/exploits/40120/ -CVE-2016-3990 - http://bugzilla.maptools.org/show_bug.cgi?id=2544 -CVE-2016-3990 - http://www.openwall.com/lists/oss-security/2016/04/12/2 -CVE-2016-3990 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3990 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3991 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-3991 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-3996 - http://packetstormsecurity.com/files/136710/KNOX-2.3-Clipboard-Data-Disclosure.html -CVE-2016-4000 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-4000 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-4000 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-4000 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-4000 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-4000 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-4004 - https://www.exploit-db.com/exploits/39486/ -CVE-2016-4006 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4006 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268 -CVE-2016-4008 - http://www.openwall.com/lists/oss-security/2016/04/11/3 -CVE-2016-4010 - https://packetstormsecurity.com/files/137121/Magento-Unauthenticated-Arbitrary-File-Write.html -CVE-2016-4010 - https://packetstormsecurity.com/files/137312/Magento-2.0.6-Unserialize-Remote-Code-Execution.html -CVE-2016-4010 - https://www.exploit-db.com/exploits/39838/ -CVE-2016-4014 - http://packetstormsecurity.com/files/137919/SAP-NetWeaver-AS-JAVA-7.4-XXE-Injection.html -CVE-2016-4014 - http://seclists.org/fulldisclosure/2016/Jul/45 -CVE-2016-4014 - https://erpscan.io/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/ -CVE-2016-4015 - https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/ -CVE-2016-4016 - http://packetstormsecurity.com/files/137920/SAP-xMII-15-Cross-Site-Scripting.html -CVE-2016-4016 - http://seclists.org/fulldisclosure/2016/Jul/46 -CVE-2016-4016 - https://erpscan.io/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/ -CVE-2016-4021 - http://seclists.org/bugtraq/2016/Apr/99 -CVE-2016-4021 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt -CVE-2016-4025 - https://labs.nettitude.com/blog/escaping-avast-sandbox-using-single-ioctl-cve-2016-4025/ -CVE-2016-4027 - http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html -CVE-2016-4029 - https://wpvulndb.com/vulnerabilities/8473 -CVE-2016-4030 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 -CVE-2016-4031 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 -CVE-2016-4032 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 -CVE-2016-4051 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-4051 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4051 - http://www.securityfocus.com/bid/86788 -CVE-2016-4051 - http://www.securityfocus.com/bid/91787 -CVE-2016-4052 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-4052 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4052 - http://www.securityfocus.com/bid/86788 -CVE-2016-4052 - http://www.securityfocus.com/bid/91787 -CVE-2016-4053 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-4053 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4053 - http://www.securityfocus.com/bid/86788 -CVE-2016-4053 - http://www.securityfocus.com/bid/91787 -CVE-2016-4054 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4054 - http://www.securityfocus.com/bid/86788 -CVE-2016-4055 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-4055 - https://www.tenable.com/security/tns-2019-02 -CVE-2016-4068 - https://github.com/roundcube/roundcubemail/issues/4949 -CVE-2016-4070 - https://bugs.php.net/bug.php?id=71798 -CVE-2016-4070 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4071 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4071 - https://www.exploit-db.com/exploits/39645/ -CVE-2016-4072 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4075 - http://abhikafle.com.np/opera-url-spoofing-poc/ -CVE-2016-4078 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4079 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4080 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4081 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4082 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4085 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-4108 - http://packetstormsecurity.com/files/137058/Adobe-Flash-addProperty-Use-After-Free.html -CVE-2016-4108 - https://www.exploit-db.com/exploits/39830/ -CVE-2016-4117 - https://www.exploit-db.com/exploits/46339/ -CVE-2016-4119 - https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader -CVE-2016-4135 - https://www.exploit-db.com/exploits/40087/ -CVE-2016-4136 - https://www.exploit-db.com/exploits/40088/ -CVE-2016-4137 - https://www.exploit-db.com/exploits/40089/ -CVE-2016-4138 - https://www.exploit-db.com/exploits/40090/ -CVE-2016-4175 - https://www.exploit-db.com/exploits/40103/ -CVE-2016-4176 - https://www.exploit-db.com/exploits/40105/ -CVE-2016-4177 - https://www.exploit-db.com/exploits/40104/ -CVE-2016-4179 - https://www.exploit-db.com/exploits/40102/ -CVE-2016-4201 - https://www.exploit-db.com/exploits/40101/ -CVE-2016-4203 - https://www.exploit-db.com/exploits/40097/ -CVE-2016-4204 - https://www.exploit-db.com/exploits/40096/ -CVE-2016-4205 - https://www.exploit-db.com/exploits/40095/ -CVE-2016-4206 - https://www.exploit-db.com/exploits/40100/ -CVE-2016-4207 - https://www.exploit-db.com/exploits/40099/ -CVE-2016-4208 - https://www.exploit-db.com/exploits/40098/ -CVE-2016-4226 - https://www.exploit-db.com/exploits/40308/ -CVE-2016-4227 - https://www.exploit-db.com/exploits/40307/ -CVE-2016-4228 - https://www.exploit-db.com/exploits/40309/ -CVE-2016-4229 - http://packetstormsecurity.com/files/138531/Adobe-Flash-BitmapData.copyPixels-Use-After-Free.html -CVE-2016-4229 - https://www.exploit-db.com/exploits/40310/ -CVE-2016-4230 - http://packetstormsecurity.com/files/138532/Adobe-Flash-MovieClip-Transform-Use-After-Free.html -CVE-2016-4230 - https://www.exploit-db.com/exploits/40311/ -CVE-2016-4231 - https://www.exploit-db.com/exploits/40356/ -CVE-2016-4232 - https://www.exploit-db.com/exploits/40355/ -CVE-2016-4264 - http://legalhackers.com/advisories/Adobe-ColdFusion-11-XXE-Exploit-CVE-2016-4264.txt -CVE-2016-4264 - https://helpx.adobe.com/security/products/coldfusion/apsb16-30.html -CVE-2016-4264 - https://www.exploit-db.com/exploits/40346/ -CVE-2016-4271 - https://blog.bjornweb.nl/2017/02/flash-bypassing-local-sandbox-data-exfiltration-credentials-leak/ -CVE-2016-4273 - https://www.exploit-db.com/exploits/40510/ -CVE-2016-4275 - https://www.exploit-db.com/exploits/40421/ -CVE-2016-4289 - http://www.talosintelligence.com/reports/TALOS-2016-0127/ -CVE-2016-4293 - http://www.talosintelligence.com/reports/TALOS-2016-0148/ -CVE-2016-4294 - http://www.talosintelligence.com/reports/TALOS-2016-0149/ -CVE-2016-4295 - http://www.talosintelligence.com/reports/TALOS-2016-0150/ -CVE-2016-4296 - http://www.talosintelligence.com/reports/TALOS-2016-0151/ -CVE-2016-4298 - http://www.talosintelligence.com/reports/TALOS-2016-0144/ -CVE-2016-4300 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4300 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4301 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4301 - http://www.talosintel.com/reports/TALOS-2016-0153/ -CVE-2016-4302 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4302 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4302 - https://github.com/libarchive/libarchive/issues/719 -CVE-2016-4303 - http://www.talosintelligence.com/reports/TALOS-2016-0164/ -CVE-2016-4304 - http://www.talosintelligence.com/reports/TALOS-2016-0166/ -CVE-2016-4305 - http://www.talosintelligence.com/reports/TALOS-2016-0167/ -CVE-2016-4306 - http://www.talosintelligence.com/reports/TALOS-2016-0168/ -CVE-2016-4307 - http://www.talosintelligence.com/reports/TALOS-2016-0169/ -CVE-2016-4309 - http://hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt -CVE-2016-4309 - http://packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html -CVE-2016-4309 - https://www.exploit-db.com/exploits/39983/ -CVE-2016-4311 - http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt -CVE-2016-4311 - http://packetstormsecurity.com/files/138329/WSO2-Identity-Server-5.1.0-XML-Injection.html -CVE-2016-4311 - https://www.exploit-db.com/exploits/40239/ -CVE-2016-4312 - http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt -CVE-2016-4312 - http://packetstormsecurity.com/files/138329/WSO2-Identity-Server-5.1.0-XML-Injection.html -CVE-2016-4312 - https://www.exploit-db.com/exploits/40239/ -CVE-2016-4313 - http://packetstormsecurity.com/files/137031/eXtplorer-2.1.9-Path-Traversal.html -CVE-2016-4313 - https://www.exploit-db.com/exploits/39816/ -CVE-2016-4314 - http://packetstormsecurity.com/files/138330/WSO2-Carbon-4.4.5-Local-File-Inclusion.html -CVE-2016-4314 - https://www.exploit-db.com/exploits/40240/ -CVE-2016-4315 - http://packetstormsecurity.com/files/138332/WSO2-Carbon-4.4.5-Cross-Site-Request-Forgery-Denial-Of-Service.html -CVE-2016-4315 - https://www.exploit-db.com/exploits/40242/ -CVE-2016-4316 - http://packetstormsecurity.com/files/138331/WSO2-Carbon-4.4.5-Cross-Site-Scripting.html -CVE-2016-4316 - https://www.exploit-db.com/exploits/40241/ -CVE-2016-4322 - http://packetstormsecurity.com/files/138600/BMC-BladeLogic-Server-Automation-For-Linux-8.7-Directory-Dump.html -CVE-2016-4325 - http://www.kb.cert.org/vuls/id/785823 -CVE-2016-4326 - http://www.kb.cert.org/vuls/id/586503 -CVE-2016-4327 - http://packetstormsecurity.com/files/137073/WSO2-SOA-Enablement-Server-Cross-Site-Scripting.html -CVE-2016-4329 - http://www.talosintelligence.com/reports/TALOS-2016-0175/ -CVE-2016-4330 - http://www.talosintelligence.com/reports/TALOS-2016-0176/ -CVE-2016-4331 - http://www.talosintelligence.com/reports/TALOS-2016-0177/ -CVE-2016-4332 - http://www.talosintelligence.com/reports/TALOS-2016-0178/ -CVE-2016-4333 - http://www.talosintelligence.com/reports/TALOS-2016-0179/ -CVE-2016-4335 - http://www.talosintelligence.com/reports/TALOS-2016-0172/ -CVE-2016-4336 - http://www.talosintelligence.com/reports/TALOS-2016-0173/ -CVE-2016-4337 - http://packetstormsecurity.com/files/137734/Ktools-Photostore-4.7.5-Blind-SQL-Injection.html -CVE-2016-4337 - https://www.exploit-db.com/exploits/40046/ -CVE-2016-4338 - http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html -CVE-2016-4338 - http://seclists.org/fulldisclosure/2016/May/9 -CVE-2016-4338 - https://www.exploit-db.com/exploits/39769/ -CVE-2016-4340 - http://packetstormsecurity.com/files/138368/GitLab-Impersonate-Privilege-Escalation.html -CVE-2016-4340 - https://www.exploit-db.com/exploits/40236/ -CVE-2016-4342 - https://bugs.php.net/bug.php?id=71354 -CVE-2016-4342 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4343 - https://bugs.php.net/bug.php?id=71331 -CVE-2016-4343 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4344 - https://bugs.php.net/bug.php?id=71637 -CVE-2016-4345 - https://bugs.php.net/bug.php?id=71637 -CVE-2016-4346 - https://bugs.php.net/bug.php?id=71637 -CVE-2016-4360 - https://www.tenable.com/security/research/tra-2016-17 -CVE-2016-4361 - https://www.tenable.com/security/research/tra-2016-26 -CVE-2016-4372 - https://www.exploit-db.com/exploits/42756/ -CVE-2016-4384 - https://www.tenable.com/security/research/tra-2016-26 -CVE-2016-4385 - https://www.tenable.com/security/research/tra-2016-27 -CVE-2016-4393 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4394 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4395 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4395 - https://www.tenable.com/security/research/tra-2016-32 -CVE-2016-4396 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4396 - https://www.tenable.com/security/research/tra-2016-32 -CVE-2016-4417 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4418 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4421 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4425 - https://github.com/akheron/jansson/issues/282 -CVE-2016-4428 - https://bugs.launchpad.net/horizon/+bug/1567673 -CVE-2016-4429 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2016-4430 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-4431 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-4432 - http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html -CVE-2016-4433 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-4436 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-4437 - http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html -CVE-2016-4437 - http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html -CVE-2016-4438 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-4447 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4447 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4447 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4448 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4448 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4448 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4449 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-4449 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4449 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4463 - http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html -CVE-2016-4463 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-4463 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-4465 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-4469 - http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html -CVE-2016-4469 - http://seclists.org/fulldisclosure/2016/Jul/37 -CVE-2016-4469 - https://www.exploit-db.com/exploits/40109/ -CVE-2016-4470 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4470 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4470 - http://www.ubuntu.com/usn/USN-3056-1 -CVE-2016-4472 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2016-4472 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-4476 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2016-4477 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2016-4478 - http://www.openwall.com/lists/oss-security/2016/05/03/1 -CVE-2016-4480 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4483 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4484 - http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html -CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-4486 - https://www.exploit-db.com/exploits/46006/ -CVE-2016-4491 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 -CVE-2016-4509 - https://ics-cert.us-cert.gov/advisories/ICSA-16-182-01 -CVE-2016-4512 - https://ics-cert.us-cert.gov/advisories/ICSA-16-182-01 -CVE-2016-4534 - http://packetstormsecurity.com/files/download/136089/mcafeevses-bypass.html -CVE-2016-4534 - http://seclists.org/fulldisclosure/2016/Mar/13 -CVE-2016-4534 - https://lab.mediaservice.net/advisory/2016-01-mcafee.txt -CVE-2016-4534 - https://www.exploit-db.com/exploits/39531/ -CVE-2016-4535 - http://packetstormsecurity.com/files/136907/McAfee-Relocation-Processing-Memory-Corruption.html -CVE-2016-4535 - https://www.exploit-db.com/exploits/39770/ -CVE-2016-4537 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4538 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4539 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4540 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4541 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4542 - https://bugs.php.net/bug.php?id=72094 -CVE-2016-4542 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4543 - https://bugs.php.net/bug.php?id=72094 -CVE-2016-4543 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-4544 - https://bugs.php.net/bug.php?id=72094 -CVE-2016-4553 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4554 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4555 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4556 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4557 - https://www.exploit-db.com/exploits/40759/ -CVE-2016-4560 - http://www-01.ibm.com/support/docview.wss?uid=swg21985483 -CVE-2016-4562 - http://www.imagemagick.org/script/changelog.php -CVE-2016-4562 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4562 - https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950 -CVE-2016-4563 - http://www.imagemagick.org/script/changelog.php -CVE-2016-4563 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4563 - https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950 -CVE-2016-4564 - http://www.imagemagick.org/script/changelog.php -CVE-2016-4564 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4564 - https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950 -CVE-2016-4565 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-4565 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4565 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4565 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-4565 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-4565 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-4566 - https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e -CVE-2016-4566 - https://wpvulndb.com/vulnerabilities/8489 -CVE-2016-4567 - https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c -CVE-2016-4567 - https://wpvulndb.com/vulnerabilities/8488 -CVE-2016-4568 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab -CVE-2016-4578 - https://www.exploit-db.com/exploits/46529/ -CVE-2016-4581 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4581 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3000-1 -CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3002-1 -CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3003-1 -CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3004-1 -CVE-2016-4582 - http://www.securityfocus.com/bid/91828 -CVE-2016-4583 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4585 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4586 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4587 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4588 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4589 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4590 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4591 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4592 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4622 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4623 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4624 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4625 - https://www.exploit-db.com/exploits/40653/ -CVE-2016-4625 - https://www.exploit-db.com/exploits/40669/ -CVE-2016-4651 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -CVE-2016-4655 - https://www.exploit-db.com/exploits/44836/ -CVE-2016-4656 - https://www.exploit-db.com/exploits/44836/ -CVE-2016-4657 - https://www.exploit-db.com/exploits/44836/ -CVE-2016-4657 - https://www.youtube.com/watch?v=xkdPjbaLngE -CVE-2016-4669 - http://packetstormsecurity.com/files/158874/Safari-Webkit-For-iOS-7.1.2-JIT-Optimization-Bug.html -CVE-2016-4669 - https://www.exploit-db.com/exploits/40654/ -CVE-2016-4676 - https://packetstormsecurity.com/files/cve/CVE-2016-4676 -CVE-2016-4758 - http://mksben.l0.cm/2016/09/safari-uxss-showModalDialog.html -CVE-2016-4788 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40208 -CVE-2016-4793 - http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt -CVE-2016-4793 - https://www.exploit-db.com/exploits/39813/ -CVE-2016-4794 - http://www.ubuntu.com/usn/USN-3056-1 -CVE-2016-4796 - https://github.com/uclouvain/openjpeg/issues/774 -CVE-2016-4796 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-4797 - https://github.com/uclouvain/openjpeg/issues/733 -CVE-2016-4797 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-4800 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-4803 - http://seclists.org/fulldisclosure/2016/May/69 -CVE-2016-4803 - https://dotcms.com/docs/latest/change-log#release-3.3.2 -CVE-2016-4803 - https://security.elarlang.eu/cve-2016-4803-dotcms-email-header-injection-vulnerability-full-disclosure.html -CVE-2016-4805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4805 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-4806 - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html -CVE-2016-4806 - https://www.exploit-db.com/exploits/39821/ -CVE-2016-4807 - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html -CVE-2016-4807 - https://www.exploit-db.com/exploits/39821/ -CVE-2016-4808 - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html -CVE-2016-4808 - https://www.exploit-db.com/exploits/39821/ -CVE-2016-4809 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4833 - https://wpvulndb.com/vulnerabilities/8580 -CVE-2016-4838 - http://www.sourcenext.com/support/i/160725_1 -CVE-2016-4839 - http://www.sourcenext.com/support/i/160725_1 -CVE-2016-4855 - https://github.com/ADOdb/ADOdb/issues/274 -CVE-2016-4913 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4913 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-4945 - http://packetstormsecurity.com/files/137221/Citrix-Netscaler-11.0-Build-64.35-Cross-Site-Scripting.html -CVE-2016-4951 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4951 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-4953 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-4953 - http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html -CVE-2016-4953 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-4954 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-4954 - http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html -CVE-2016-4954 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-4955 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-4955 - http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html -CVE-2016-4955 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-4956 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-4956 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-4957 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -CVE-2016-4959 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -CVE-2016-4959 - http://www.tripwire.com/state-of-security/vulnerability-management/warning-this-post-contains-graphic-nvidia-content/ -CVE-2016-4960 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -CVE-2016-4961 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -CVE-2016-4962 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-4965 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities -CVE-2016-4965 - https://www.kb.cert.org/vuls/id/724487 -CVE-2016-4966 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities -CVE-2016-4966 - https://www.kb.cert.org/vuls/id/724487 -CVE-2016-4967 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities -CVE-2016-4967 - https://www.kb.cert.org/vuls/id/724487 -CVE-2016-4968 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities -CVE-2016-4968 - https://www.kb.cert.org/vuls/id/724487 -CVE-2016-4969 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities -CVE-2016-4969 - https://www.kb.cert.org/vuls/id/724487 -CVE-2016-4971 - http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html -CVE-2016-4971 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-4971 - https://www.exploit-db.com/exploits/40064/ -CVE-2016-4974 - http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html -CVE-2016-4975 - https://hackerone.com/reports/409512 -CVE-2016-4978 - https://access.redhat.com/errata/RHSA-2017:1835 -CVE-2016-4978 - https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf -CVE-2016-4979 - http://packetstormsecurity.com/files/137771/Apache-2.4.20-X509-Authentication-Bypass.html -CVE-2016-4979 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-4989 - http://seclists.org/oss-sec/2016/q2/574 -CVE-2016-4997 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4997 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-4997 - https://www.exploit-db.com/exploits/40435/ -CVE-2016-4997 - https://www.exploit-db.com/exploits/40489/ -CVE-2016-4998 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-4998 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-5000 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-5003 - http://www.openwall.com/lists/oss-security/2020/01/24/2 -CVE-2016-5005 - http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html -CVE-2016-5005 - http://seclists.org/fulldisclosure/2016/Jul/38 -CVE-2016-5017 - http://packetstormsecurity.com/files/138755/ZooKeeper-3.4.8-3.5.2-Buffer-Overflow.html -CVE-2016-5017 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-5018 - http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html -CVE-2016-5018 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-5019 - http://packetstormsecurity.com/files/138920/Apache-MyFaces-Trinidad-Information-Disclosure.html -CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-5019 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-5019 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-5025 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -CVE-2016-5027 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5028 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5028 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5029 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5029 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5030 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5030 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5031 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5031 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5032 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5032 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5033 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5033 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5034 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5034 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5035 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5035 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5036 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5036 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5037 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5037 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5038 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5038 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5039 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5039 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5040 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5040 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5041 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5041 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5042 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5042 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5043 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5043 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5044 - http://www.openwall.com/lists/oss-security/2016/05/24/1 -CVE-2016-5044 - https://www.prevanders.net/dwarfbug.html -CVE-2016-5048 - http://www.kb.cert.org/vuls/id/294272 -CVE-2016-5049 - http://www.kb.cert.org/vuls/id/294272 -CVE-2016-5050 - http://www.kb.cert.org/vuls/id/294272 -CVE-2016-5051 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5052 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5053 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5054 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5055 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5056 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5057 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5058 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5059 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -CVE-2016-5060 - http://packetstormsecurity.com/files/137469/nGrinder-3.3-Cross-Site-Scripting.html -CVE-2016-5060 - http://seclists.org/fulldisclosure/2016/Jun/23 -CVE-2016-5061 - http://www.kb.cert.org/vuls/id/706359 -CVE-2016-5062 - http://www.kb.cert.org/vuls/id/706359 -CVE-2016-5063 - https://www.exploit-db.com/exploits/43902/ -CVE-2016-5063 - https://www.exploit-db.com/exploits/43934/ -CVE-2016-5080 - http://packetstormsecurity.com/files/137970/Objective-Systems-Inc.-ASN1C-For-C-C-Heap-Memory-Corruption.html -CVE-2016-5080 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-5081 - http://www.kb.cert.org/vuls/id/301735 -CVE-2016-5084 - http://www.kb.cert.org/vuls/id/884840 -CVE-2016-5084 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS -CVE-2016-5085 - http://www.kb.cert.org/vuls/id/884840 -CVE-2016-5085 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS -CVE-2016-5086 - http://www.kb.cert.org/vuls/id/884840 -CVE-2016-5086 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS -CVE-2016-5093 - https://bugs.php.net/bug.php?id=72241 -CVE-2016-5094 - https://bugs.php.net/bug.php?id=72135 -CVE-2016-5095 - https://bugs.php.net/bug.php?id=72135 -CVE-2016-5102 - https://usn.ubuntu.com/3606-1/ -CVE-2016-5104 - http://www.ubuntu.com/usn/USN-3026-1 -CVE-2016-5118 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5118 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-5119 - https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html -CVE-2016-5124 - http://packetstormsecurity.com/files/137894/Open-Xchange-App-Suite-7.8.1-Cross-Site-Scripting.html -CVE-2016-5126 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5134 - https://www.kb.cert.org/vuls/id/877625 -CVE-2016-5180 - https://c-ares.haxx.se/adv_20160929.html -CVE-2016-5195 - http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html -CVE-2016-5195 - http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html -CVE-2016-5195 - http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html -CVE-2016-5195 - http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html -CVE-2016-5195 - http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html -CVE-2016-5195 - http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html -CVE-2016-5195 - http://rhn.redhat.com/errata/RHSA-2016-2126.html -CVE-2016-5195 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux -CVE-2016-5195 - http://www.openwall.com/lists/oss-security/2022/03/07/1 -CVE-2016-5195 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-5195 - https://bugzilla.redhat.com/show_bug.cgi?id=1384344 -CVE-2016-5195 - https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs -CVE-2016-5195 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2016-5195 - https://www.exploit-db.com/exploits/40611/ -CVE-2016-5195 - https://www.exploit-db.com/exploits/40616/ -CVE-2016-5195 - https://www.exploit-db.com/exploits/40839/ -CVE-2016-5195 - https://www.exploit-db.com/exploits/40847/ -CVE-2016-5203 - http://www.securityfocus.com/bid/94633 -CVE-2016-5204 - http://www.securityfocus.com/bid/94633 -CVE-2016-5205 - http://www.securityfocus.com/bid/94633 -CVE-2016-5206 - http://www.securityfocus.com/bid/94633 -CVE-2016-5207 - http://www.securityfocus.com/bid/94633 -CVE-2016-5208 - http://www.securityfocus.com/bid/94633 -CVE-2016-5209 - http://www.securityfocus.com/bid/94633 -CVE-2016-5210 - http://www.securityfocus.com/bid/94633 -CVE-2016-5211 - http://www.securityfocus.com/bid/94633 -CVE-2016-5212 - http://www.securityfocus.com/bid/94633 -CVE-2016-5213 - http://www.securityfocus.com/bid/94633 -CVE-2016-5214 - http://www.securityfocus.com/bid/94633 -CVE-2016-5215 - http://www.securityfocus.com/bid/94633 -CVE-2016-5216 - http://www.securityfocus.com/bid/94633 -CVE-2016-5217 - http://www.securityfocus.com/bid/94633 -CVE-2016-5218 - http://www.securityfocus.com/bid/94633 -CVE-2016-5219 - http://www.securityfocus.com/bid/94633 -CVE-2016-5220 - http://www.securityfocus.com/bid/94633 -CVE-2016-5221 - http://www.securityfocus.com/bid/94633 -CVE-2016-5222 - http://www.securityfocus.com/bid/94633 -CVE-2016-5223 - http://www.securityfocus.com/bid/94633 -CVE-2016-5224 - http://www.securityfocus.com/bid/94633 -CVE-2016-5225 - http://www.securityfocus.com/bid/94633 -CVE-2016-5226 - http://www.securityfocus.com/bid/94633 -CVE-2016-5228 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php -CVE-2016-5228 - https://cxsecurity.com/issue/WLB-2016050136 -CVE-2016-5228 - https://www.exploit-db.com/exploits/40649/ -CVE-2016-5229 - http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html -CVE-2016-5237 - https://packetstormsecurity.com/files/137343/Valve-Steam-3.42.16.13-Local-Privilege-Escalation.html -CVE-2016-5237 - https://www.exploit-db.com/exploits/39888/ -CVE-2016-5239 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-5240 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -CVE-2016-5243 - http://www.ubuntu.com/usn/USN-3056-1 -CVE-2016-5244 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-5248 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-012/?fid=8073 -CVE-2016-5249 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-012/?fid=8073 -CVE-2016-5252 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5253 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246944 -CVE-2016-5254 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5257 - https://bugzilla.mozilla.org/show_bug.cgi?id=1289280 -CVE-2016-5258 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5259 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5261 - https://bugzilla.mozilla.org/show_bug.cgi?id=1287266 -CVE-2016-5262 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5263 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5264 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5265 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5265 - https://bugzilla.mozilla.org/show_bug.cgi?id=1278013 -CVE-2016-5266 - https://bugzilla.mozilla.org/show_bug.cgi?id=1226977 -CVE-2016-5268 - https://bugzilla.mozilla.org/show_bug.cgi?id=1253673 -CVE-2016-5284 - https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 -CVE-2016-5289 - http://www.securityfocus.com/bid/94337 -CVE-2016-5291 - https://bugzilla.mozilla.org/show_bug.cgi?id=1292159 -CVE-2016-5292 - http://www.securityfocus.com/bid/94337 -CVE-2016-5293 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246945 -CVE-2016-5294 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246972 -CVE-2016-5295 - http://www.securityfocus.com/bid/94337 -CVE-2016-5295 - https://bugzilla.mozilla.org/show_bug.cgi?id=1247239 -CVE-2016-5298 - http://www.securityfocus.com/bid/94337 -CVE-2016-5298 - https://bugzilla.mozilla.org/show_bug.cgi?id=1227538 -CVE-2016-5299 - http://www.securityfocus.com/bid/94337 -CVE-2016-5299 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245791 -CVE-2016-5300 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-5300 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5300 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2016-5300 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-5304 - https://www.exploit-db.com/exploits/40041/ -CVE-2016-5309 - https://www.exploit-db.com/exploits/40405/ -CVE-2016-5310 - https://www.exploit-db.com/exploits/40405/ -CVE-2016-5312 - http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html -CVE-2016-5312 - https://www.exploit-db.com/exploits/40437/ -CVE-2016-5313 - http://packetstormsecurity.com/files/139006/Symantec-Web-Gateway-5.2.2-OS-Command-Injection.html -CVE-2016-5314 - http://www.openwall.com/lists/oss-security/2016/06/15/9 -CVE-2016-5314 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-5318 - http://www.openwall.com/lists/oss-security/2016/04/27/6 -CVE-2016-5318 - https://usn.ubuntu.com/3606-1/ -CVE-2016-5319 - http://www.openwall.com/lists/oss-security/2016/04/27/6 -CVE-2016-5330 - https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html -CVE-2016-5331 - http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html -CVE-2016-5331 - http://seclists.org/fulldisclosure/2016/Aug/38 -CVE-2016-5333 - http://www.theregister.co.uk/2016/08/16/vmware_shipped_public_key_with_its_photon_osforcontainers/ -CVE-2016-5346 - https://github.com/ele7enxxh/poc-exp/tree/master/CVE-2016-5346 -CVE-2016-5348 - https://www.exploit-db.com/exploits/40502/ -CVE-2016-5350 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5351 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5352 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5353 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5354 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5355 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5355 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394 -CVE-2016-5356 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5356 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395 -CVE-2016-5357 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5357 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396 -CVE-2016-5358 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5384 - http://www.ubuntu.com/usn/USN-3063-1 -CVE-2016-5385 - http://www.kb.cert.org/vuls/id/797896 -CVE-2016-5385 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-5385 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-5385 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5385 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-5385 - https://httpoxy.org/ -CVE-2016-5386 - http://www.kb.cert.org/vuls/id/797896 -CVE-2016-5386 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-5386 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5386 - https://httpoxy.org/ -CVE-2016-5387 - http://www.kb.cert.org/vuls/id/797896 -CVE-2016-5387 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-5387 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-5387 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5387 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-5387 - https://httpoxy.org/ -CVE-2016-5388 - http://www.kb.cert.org/vuls/id/797896 -CVE-2016-5388 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-5388 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-5388 - https://httpoxy.org/ -CVE-2016-5399 - http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html -CVE-2016-5399 - http://seclists.org/fulldisclosure/2016/Jul/72 -CVE-2016-5399 - http://www.openwall.com/lists/oss-security/2016/07/21/1 -CVE-2016-5399 - https://www.exploit-db.com/exploits/40155/ -CVE-2016-5403 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5403 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-5404 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5408 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5418 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5419 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-5419 - http://www.securityfocus.com/bid/92319 -CVE-2016-5420 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-5421 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-5425 - http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html -CVE-2016-5425 - http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt -CVE-2016-5425 - http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html -CVE-2016-5425 - https://www.exploit-db.com/exploits/40488/ -CVE-2016-5425 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-5429 - https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b#diff-2a982d82ef0f673fd0ba2beba0e18420R138 -CVE-2016-5431 - https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b -CVE-2016-5434 - http://www.openwall.com/lists/oss-security/2016/06/11/4 -CVE-2016-5434 - https://lists.archlinux.org/pipermail/pacman-dev/2016-June/021148.html -CVE-2016-5436 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5436 - http://www.securityfocus.com/bid/91787 -CVE-2016-5437 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5437 - http://www.securityfocus.com/bid/91787 -CVE-2016-5439 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5439 - http://www.securityfocus.com/bid/91787 -CVE-2016-5440 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5440 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5440 - http://www.securityfocus.com/bid/91787 -CVE-2016-5441 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5441 - http://www.securityfocus.com/bid/91787 -CVE-2016-5442 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5442 - http://www.securityfocus.com/bid/91787 -CVE-2016-5443 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5443 - http://www.securityfocus.com/bid/91787 -CVE-2016-5444 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5444 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5444 - http://www.securityfocus.com/bid/91787 -CVE-2016-5445 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5445 - http://www.securityfocus.com/bid/91787 -CVE-2016-5446 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5446 - http://www.securityfocus.com/bid/91787 -CVE-2016-5447 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5447 - http://www.securityfocus.com/bid/91787 -CVE-2016-5448 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5448 - http://www.securityfocus.com/bid/91787 -CVE-2016-5449 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5449 - http://www.securityfocus.com/bid/91787 -CVE-2016-5450 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5450 - http://www.securityfocus.com/bid/91787 -CVE-2016-5451 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5451 - http://www.securityfocus.com/bid/91787 -CVE-2016-5452 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5452 - http://www.securityfocus.com/bid/91787 -CVE-2016-5453 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5453 - http://www.securityfocus.com/bid/91787 -CVE-2016-5454 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5454 - http://www.securityfocus.com/bid/91787 -CVE-2016-5455 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5455 - http://www.securityfocus.com/bid/91787 -CVE-2016-5456 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5456 - http://www.securityfocus.com/bid/91787 -CVE-2016-5457 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5457 - http://www.securityfocus.com/bid/91787 -CVE-2016-5458 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5458 - http://www.securityfocus.com/bid/91787 -CVE-2016-5459 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5459 - http://www.securityfocus.com/bid/91787 -CVE-2016-5460 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5460 - http://www.securityfocus.com/bid/91787 -CVE-2016-5461 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5461 - http://www.securityfocus.com/bid/91787 -CVE-2016-5462 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5462 - http://www.securityfocus.com/bid/91787 -CVE-2016-5463 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5463 - http://www.securityfocus.com/bid/91787 -CVE-2016-5464 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5464 - http://www.securityfocus.com/bid/91787 -CVE-2016-5465 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5465 - http://www.securityfocus.com/bid/91787 -CVE-2016-5466 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5466 - http://www.securityfocus.com/bid/91787 -CVE-2016-5467 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5467 - http://www.securityfocus.com/bid/91787 -CVE-2016-5468 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5468 - http://www.securityfocus.com/bid/91787 -CVE-2016-5469 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5469 - http://www.securityfocus.com/bid/91787 -CVE-2016-5470 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5470 - http://www.securityfocus.com/bid/91787 -CVE-2016-5471 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5471 - http://www.securityfocus.com/bid/91787 -CVE-2016-5472 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5472 - http://www.securityfocus.com/bid/91787 -CVE-2016-5473 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5473 - http://www.securityfocus.com/bid/91787 -CVE-2016-5474 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5474 - http://www.securityfocus.com/bid/91787 -CVE-2016-5475 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5475 - http://www.securityfocus.com/bid/91787 -CVE-2016-5476 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5476 - http://www.securityfocus.com/bid/91787 -CVE-2016-5477 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html -CVE-2016-5477 - http://www.securityfocus.com/bid/91787 -CVE-2016-5479 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5480 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5481 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5482 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5486 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5487 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5488 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5489 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5490 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5491 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5492 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5493 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5495 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5497 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5498 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5499 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5500 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5501 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5502 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5503 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5504 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5505 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5506 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5507 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5508 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5509 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5510 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5511 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5512 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5513 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5514 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5515 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5516 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5517 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5518 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5519 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5521 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5522 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5523 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5524 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5525 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5526 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5527 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5528 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5529 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5530 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5531 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5532 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5533 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5534 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5535 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5535 - https://www.tenable.com/security/research/tra-2016-33 -CVE-2016-5536 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5537 - http://hyp3rlinx.altervista.org/advisories/ORACLE-NETBEANS-IDE-DIRECTORY-TRAVERSAL.txt -CVE-2016-5537 - http://packetstormsecurity.com/files/139259/Oracle-Netbeans-IDE-8.1-Directory-Traversal.html -CVE-2016-5537 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5537 - https://www.exploit-db.com/exploits/40588/ -CVE-2016-5538 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5539 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5540 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5541 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5542 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5543 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5544 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5545 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5546 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5547 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5548 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5549 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5551 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2016-5552 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5553 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5554 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5555 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5556 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5557 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5558 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5559 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5560 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5561 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5562 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5563 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5564 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5565 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5566 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5567 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5568 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5569 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5570 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5571 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5572 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5573 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5574 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5575 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5576 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5577 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5578 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5579 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5580 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5581 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5582 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5583 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5584 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5585 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5586 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5587 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5588 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5589 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5590 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5591 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5592 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5593 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5594 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5595 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5596 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5597 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5598 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5599 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5600 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5601 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5602 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5603 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5604 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5605 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5606 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5607 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5608 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5609 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5610 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5611 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5612 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5613 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5614 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5615 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5618 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5619 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5620 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5621 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5622 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5623 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-5624 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5625 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5626 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5627 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5628 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5629 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5630 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5631 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5632 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5633 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5634 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-5636 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5636 - https://bugs.python.org/issue26171 -CVE-2016-5637 - http://www.kb.cert.org/vuls/id/123799 -CVE-2016-5638 - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html -CVE-2016-5639 - https://www.exploit-db.com/exploits/40813/ -CVE-2016-5648 - http://packetstormsecurity.com/files/137775/Acer-Portal-Android-Application-3.9.3.2006-Man-In-The-Middle.html -CVE-2016-5648 - https://www.kb.cert.org/vuls/id/690343 -CVE-2016-5649 - http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html -CVE-2016-5649 - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html -CVE-2016-5650 - http://www.kb.cert.org/vuls/id/301735 -CVE-2016-5653 - http://www.kb.cert.org/vuls/id/682704 -CVE-2016-5654 - http://www.kb.cert.org/vuls/id/682704 -CVE-2016-5655 - http://www.kb.cert.org/vuls/id/682704 -CVE-2016-5660 - http://www.kb.cert.org/vuls/id/665280 -CVE-2016-5660 - http://www.kb.cert.org/vuls/id/JLAD-ABMPVA -CVE-2016-5661 - http://www.kb.cert.org/vuls/id/665280 -CVE-2016-5661 - http://www.kb.cert.org/vuls/id/JLAD-ABMPVA -CVE-2016-5662 - http://www.kb.cert.org/vuls/id/305607 -CVE-2016-5663 - http://www.kb.cert.org/vuls/id/305607 -CVE-2016-5664 - http://www.kb.cert.org/vuls/id/305607 -CVE-2016-5672 - http://packetstormsecurity.com/files/138107/Intel-Crosswalk-Project-Man-In-The-Middle.html -CVE-2016-5672 - http://www.kb.cert.org/vuls/id/217871 -CVE-2016-5672 - https://blogs.intel.com/evangelists/2016/07/28/crosswalk-security-vulnerability/ -CVE-2016-5673 - http://www.kb.cert.org/vuls/id/735416 -CVE-2016-5673 - http://www.kb.cert.org/vuls/id/BLUU-A9WQVP -CVE-2016-5674 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5674 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5675 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5675 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5676 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5676 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5677 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5677 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5678 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5678 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5679 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5679 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5680 - http://www.kb.cert.org/vuls/id/856152 -CVE-2016-5680 - https://www.exploit-db.com/exploits/40200/ -CVE-2016-5681 - http://www.kb.cert.org/vuls/id/332115 -CVE-2016-5683 - http://www.kb.cert.org/vuls/id/294272 -CVE-2016-5684 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-5686 - http://www.kb.cert.org/vuls/id/884840 -CVE-2016-5686 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS -CVE-2016-5687 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5688 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5689 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5690 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5691 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5696 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5696 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-5696 - https://github.com/Gnoxter/mountain_goat -CVE-2016-5699 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5709 - http://packetstormsecurity.com/files/137525/Solarwinds-Virtualization-Manager-6.3.1-Weak-Crypto.html -CVE-2016-5709 - http://seclists.org/fulldisclosure/2016/Jun/38 -CVE-2016-5715 - http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html -CVE-2016-5725 - http://packetstormsecurity.com/files/138809/jsch-0.1.53-Path-Traversal.html -CVE-2016-5725 - http://seclists.org/fulldisclosure/2016/Sep/53 -CVE-2016-5725 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725 -CVE-2016-5725 - https://www.exploit-db.com/exploits/40411/ -CVE-2016-5725 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2016-5725 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2016-5725 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-5734 - https://www.exploit-db.com/exploits/40185/ -CVE-2016-5737 - https://github.com/openstack-infra/puppet-gerrit/commit/8573c2ee172f66c1667de49685c88fdc8883ca8b -CVE-2016-5740 - http://packetstormsecurity.com/files/138700/Open-Xchange-App-Suite-7.8.2-Cross-Site-Scripting.html -CVE-2016-5740 - https://www.exploit-db.com/exploits/40378/ -CVE-2016-5746 - https://github.com/yast/yast-storage/pull/224 -CVE-2016-5756 - https://www.novell.com/support/kb/doc.php?id=7017813 -CVE-2016-5760 - http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html -CVE-2016-5760 - http://seclists.org/fulldisclosure/2016/Aug/123 -CVE-2016-5761 - http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html -CVE-2016-5761 - http://seclists.org/fulldisclosure/2016/Aug/123 -CVE-2016-5762 - http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html -CVE-2016-5762 - http://seclists.org/fulldisclosure/2016/Aug/123 -CVE-2016-5764 - https://www.exploit-db.com/exploits/40651/ -CVE-2016-5766 - https://bugs.php.net/bug.php?id=72339 -CVE-2016-5767 - https://bugs.php.net/bug.php?id=72446 -CVE-2016-5769 - https://bugs.php.net/bug.php?id=72455 -CVE-2016-5770 - https://bugs.php.net/bug.php?id=72262 -CVE-2016-5771 - https://bugs.php.net/bug.php?id=72433 -CVE-2016-5773 - https://bugs.php.net/bug.php?id=72434 -CVE-2016-5782 - https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01-0 -CVE-2016-5787 - https://ics-cert.us-cert.gov/advisories/ICSA-16-194-02 -CVE-2016-5809 - https://www.exploit-db.com/exploits/44640/ -CVE-2016-5817 - https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01 -CVE-2016-5821 - http://packetstormsecurity.com/files/137733/Huawei-HiSuite-For-Windows-4.0.3.301-Privilege-Escalation.html -CVE-2016-5829 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-5832 - https://wpvulndb.com/vulnerabilities/8522 -CVE-2016-5833 - https://wpvulndb.com/vulnerabilities/8518 -CVE-2016-5834 - https://wpvulndb.com/vulnerabilities/8518 -CVE-2016-5835 - https://wpvulndb.com/vulnerabilities/8519 -CVE-2016-5836 - https://wpvulndb.com/vulnerabilities/8523 -CVE-2016-5837 - https://wpvulndb.com/vulnerabilities/8520 -CVE-2016-5838 - https://wpvulndb.com/vulnerabilities/8524 -CVE-2016-5840 - https://www.exploit-db.com/exploits/40180/ -CVE-2016-5841 - http://www.openwall.com/lists/oss-security/2016/06/23/1 -CVE-2016-5841 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5842 - http://www.openwall.com/lists/oss-security/2016/06/23/1 -CVE-2016-5842 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5844 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-5844 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-5845 - http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html -CVE-2016-5845 - http://seclists.org/fulldisclosure/2016/Aug/46 -CVE-2016-5845 - https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities -CVE-2016-5845 - https://www.exploit-db.com/exploits/40230/ -CVE-2016-5847 - http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html -CVE-2016-5847 - http://seclists.org/fulldisclosure/2016/Aug/46 -CVE-2016-5847 - https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities -CVE-2016-5847 - https://www.exploit-db.com/exploits/40230/ -CVE-2016-5851 - http://www.openwall.com/lists/oss-security/2016/06/28/7 -CVE-2016-5852 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -CVE-2016-5873 - https://bugs.php.net/bug.php?id=71719 -CVE-2016-5878 - http://www.securityfocus.com/bid/92279 -CVE-2016-5943 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 -CVE-2016-5944 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 -CVE-2016-5945 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 -CVE-2016-5946 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 -CVE-2016-5947 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 -CVE-2016-5980 - http://www.ibm.com/support/docview.wss?uid=swg21991992 -CVE-2016-6020 - http://www.securityfocus.com/bid/95098 -CVE-2016-6079 - https://www.exploit-db.com/exploits/40710/ -CVE-2016-6128 - https://bugs.php.net/72494 -CVE-2016-6137 - http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html -CVE-2016-6138 - http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html -CVE-2016-6139 - http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html -CVE-2016-6140 - http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html -CVE-2016-6142 - http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html -CVE-2016-6144 - http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html -CVE-2016-6144 - https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components -CVE-2016-6145 - http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html -CVE-2016-6145 - https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components -CVE-2016-6146 - http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html -CVE-2016-6147 - http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html -CVE-2016-6148 - http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html -CVE-2016-6149 - http://packetstormsecurity.com/files/138456/SAP-HANA-SPS09-1.00.091.00.1418659308-EXPORT-Information-Disclosure.html -CVE-2016-6150 - http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html -CVE-2016-6153 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt -CVE-2016-6153 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6164 - http://git.videolan.org/gitweb.cgi/ffmpeg.git/?a=commit;h=8a3221cc67a516dfc1700bdae3566ec52c7ee823 -CVE-2016-6167 - https://packetstormsecurity.com/files/137742/Putty-Beta-0.67-DLL-Hijacking.html -CVE-2016-6174 - http://karmainsecurity.com/KIS-2016-11 -CVE-2016-6174 - http://packetstormsecurity.com/files/137804/IPS-Community-Suite-4.1.12.3-PHP-Code-Injection.html -CVE-2016-6174 - http://seclists.org/fulldisclosure/2016/Jul/19 -CVE-2016-6174 - https://www.exploit-db.com/exploits/40084/ -CVE-2016-6175 - https://kmkz-web-blog.blogspot.cz/2016/07/advisory-cve-2016-6175.html -CVE-2016-6175 - https://www.exploit-db.com/exploits/40154/ -CVE-2016-6185 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-6185 - https://rt.cpan.org/Public/Bug/Display.html?id=115808 -CVE-2016-6186 - http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html -CVE-2016-6186 - http://seclists.org/fulldisclosure/2016/Jul/53 -CVE-2016-6186 - http://www.vulnerability-lab.com/get_content.php?id=1869 -CVE-2016-6186 - https://www.exploit-db.com/exploits/40129/ -CVE-2016-6195 - http://www.securityfocus.com/bid/92687 -CVE-2016-6195 - https://github.com/drewlong/vbully -CVE-2016-6197 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-6197 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-6198 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-6198 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-6199 - https://discuss.gradle.org/t/a-security-issue-about-gradle-rce/17726 -CVE-2016-6201 - http://packetstormsecurity.com/files/143014/Ektron-CMS-9.10SP1-Cross-Site-Scripting.html -CVE-2016-6207 - http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html -CVE-2016-6210 - https://www.exploit-db.com/exploits/40113/ -CVE-2016-6210 - https://www.exploit-db.com/exploits/40136/ -CVE-2016-6214 - https://github.com/libgd/libgd/issues/247#issuecomment-232084241 -CVE-2016-6225 - https://www.percona.com/blog/2017/01/12/cve-2016-6225-percona-xtrabackup-encryption-iv-not-set-properly/ -CVE-2016-6231 - https://support.kaspersky.com/vulnerability.aspx?el=12430#280716 -CVE-2016-6232 - https://www.kde.org/info/security/advisory-20160724-1.txt -CVE-2016-6239 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6240 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6241 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6242 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6243 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6245 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6246 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6247 - http://www.openwall.com/lists/oss-security/2016/07/14/5 -CVE-2016-6250 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-6253 - http://packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html -CVE-2016-6253 - https://www.exploit-db.com/exploits/40141/ -CVE-2016-6253 - https://www.exploit-db.com/exploits/40385/ -CVE-2016-6255 - https://www.exploit-db.com/exploits/40589/ -CVE-2016-6255 - https://www.tenable.com/security/research/tra-2017-10 -CVE-2016-6256 - http://packetstormsecurity.com/files/142597/SAP-Business-One-For-Android-1.2.3-XML-Injection.html -CVE-2016-6256 - https://www.exploit-db.com/exploits/42036/ -CVE-2016-6258 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-6264 - http://www.openwall.com/lists/oss-security/2016/06/29/3 -CVE-2016-6264 - http://www.openwall.com/lists/oss-security/2016/07/21/2 -CVE-2016-6264 - http://www.openwall.com/lists/oss-security/2016/07/21/6 -CVE-2016-6266 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ -CVE-2016-6267 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ -CVE-2016-6268 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ -CVE-2016-6269 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ -CVE-2016-6270 - https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ -CVE-2016-6271 - https://github.com/gteissier/CVE-2016-6271 -CVE-2016-6272 - http://packetstormsecurity.com/files/146418/EPIC-MyChart-SQL-Injection.html -CVE-2016-6272 - https://www.exploit-db.com/exploits/44098/ -CVE-2016-6273 - https://www.tenable.com/security/research/tra-2016-29 -CVE-2016-6277 - http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html -CVE-2016-6277 - https://www.exploit-db.com/exploits/40889/ -CVE-2016-6277 - https://www.exploit-db.com/exploits/41598/ -CVE-2016-6283 - http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html -CVE-2016-6283 - http://seclists.org/fulldisclosure/2017/Jan/3 -CVE-2016-6283 - https://www.exploit-db.com/exploits/40989/ -CVE-2016-6285 - http://packetstormsecurity.com/files/140548/Atlassian-Jira-7.1.7-Cross-Site-Scripting.html -CVE-2016-6289 - http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities -CVE-2016-6289 - https://bugs.php.net/72513 -CVE-2016-6290 - https://bugs.php.net/72562 -CVE-2016-6295 - https://bugs.php.net/72479 -CVE-2016-6296 - http://www.ubuntu.com/usn/USN-3059-1 -CVE-2016-6296 - https://bugs.php.net/72606 -CVE-2016-6297 - http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities -CVE-2016-6301 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -CVE-2016-6301 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2016-6301 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2016-6301 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2016-6301 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2016-6301 - http://seclists.org/fulldisclosure/2020/Mar/15 -CVE-2016-6301 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2016-6301 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6302 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-6302 - https://hackerone.com/reports/221787 -CVE-2016-6302 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-6302 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6303 - https://hackerone.com/reports/221785 -CVE-2016-6303 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-6303 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6304 - http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html -CVE-2016-6304 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6304 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-6304 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-6304 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6305 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6306 - http://seclists.org/fulldisclosure/2017/Jul/31 -CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6306 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-6306 - https://hackerone.com/reports/221790 -CVE-2016-6306 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 -CVE-2016-6306 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-6306 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-6306 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-6306 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-6306 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6307 - https://hackerone.com/reports/221791 -CVE-2016-6307 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6308 - https://hackerone.com/reports/221792 -CVE-2016-6308 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6309 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-6309 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-6309 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6309 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-6317 - https://hackerone.com/reports/139321 -CVE-2016-6321 - http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html -CVE-2016-6321 - http://seclists.org/fulldisclosure/2016/Oct/96 -CVE-2016-6321 - https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt -CVE-2016-6329 - https://sweet32.info/ -CVE-2016-6330 - https://www.tenable.com/security/research/tra-2016-22 -CVE-2016-6350 - http://www.openwall.com/lists/oss-security/2016/07/26/6 -CVE-2016-6350 - http://www.openwall.com/lists/oss-security/2016/07/26/8 -CVE-2016-6366 - https://www.exploit-db.com/exploits/40258/ -CVE-2016-6367 - https://www.exploit-db.com/exploits/40271/ -CVE-2016-6369 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160824-anyconnect -CVE-2016-6374 - http://www.securityfocus.com/bid/93095 -CVE-2016-6423 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ios-ikev -CVE-2016-6433 - http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html -CVE-2016-6433 - https://www.exploit-db.com/exploits/40463/ -CVE-2016-6433 - https://www.exploit-db.com/exploits/41041/ -CVE-2016-6433 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt -CVE-2016-6434 - https://www.exploit-db.com/exploits/40465/ -CVE-2016-6434 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt -CVE-2016-6435 - https://www.exploit-db.com/exploits/40464/ -CVE-2016-6435 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt -CVE-2016-6438 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8 -CVE-2016-6447 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms -CVE-2016-6448 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms1 -CVE-2016-6461 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-asa -CVE-2016-6483 - http://legalhackers.com/advisories/vBulletin-SSRF-Vulnerability-Exploit.txt -CVE-2016-6483 - https://www.exploit-db.com/exploits/40225/ -CVE-2016-6484 - http://packetstormsecurity.com/files/138615/Infoblox-7.0.1-CRLF-Injection-HTTP-Response-Splitting.html -CVE-2016-6489 - http://www.ubuntu.com/usn/USN-3193-1 -CVE-2016-6489 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-6491 - http://www.openwall.com/lists/oss-security/2016/07/28/13 -CVE-2016-6491 - http://www.openwall.com/lists/oss-security/2016/07/28/15 -CVE-2016-6491 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -CVE-2016-6492 - http://packetstormsecurity.com/files/138113/MediaTek-Driver-Privilege-Escalation.html -CVE-2016-6496 - https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf -CVE-2016-6497 - https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf -CVE-2016-6501 - https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf -CVE-2016-6503 - https://www.exploit-db.com/exploits/40196/ -CVE-2016-6504 - https://www.exploit-db.com/exploits/40194/ -CVE-2016-6505 - https://www.exploit-db.com/exploits/40197/ -CVE-2016-6512 - https://www.exploit-db.com/exploits/40195/ -CVE-2016-6515 - http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html -CVE-2016-6515 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6515 - https://www.exploit-db.com/exploits/40888/ -CVE-2016-6516 - http://www.openwall.com/lists/oss-security/2016/07/31/6 -CVE-2016-6520 - http://www.imagemagick.org/script/changelog.php -CVE-2016-6521 - https://github.com/sheehan/grails-console/issues/54 -CVE-2016-6521 - https://github.com/sheehan/grails-console/issues/55 -CVE-2016-6523 - http://www.openwall.com/lists/oss-security/2016/08/02/3 -CVE-2016-6557 - https://www.kb.cert.org/vuls/id/763843 -CVE-2016-6558 - https://www.kb.cert.org/vuls/id/763843 -CVE-2016-6559 - https://www.kb.cert.org/vuls/id/548487 -CVE-2016-6563 - http://seclists.org/fulldisclosure/2016/Nov/38 -CVE-2016-6563 - https://www.exploit-db.com/exploits/40805/ -CVE-2016-6563 - https://www.kb.cert.org/vuls/id/677427 -CVE-2016-6564 - https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack -CVE-2016-6564 - https://www.kb.cert.org/vuls/id/624539 -CVE-2016-6565 - https://www.kb.cert.org/vuls/id/346175 -CVE-2016-6566 - https://www.kb.cert.org/vuls/id/846103 -CVE-2016-6567 - https://www.kb.cert.org/vuls/id/167623 -CVE-2016-6578 - https://www.kb.cert.org/vuls/id/865216 -CVE-2016-6582 - http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html -CVE-2016-6593 - http://packetstormsecurity.com/files/140098/Symantec-VIP-Access-Arbitrary-DLL-Execution.html -CVE-2016-6597 - http://packetstormsecurity.com/files/138210/Sophos-Mobile-Control-3.5.0.3-Open-Reverse-Proxy.html -CVE-2016-6598 - http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html -CVE-2016-6598 - http://seclists.org/fulldisclosure/2018/Jan/92 -CVE-2016-6598 - https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt -CVE-2016-6599 - http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html -CVE-2016-6599 - http://seclists.org/fulldisclosure/2018/Jan/92 -CVE-2016-6599 - https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt -CVE-2016-6600 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html -CVE-2016-6600 - http://seclists.org/fulldisclosure/2016/Aug/54 -CVE-2016-6600 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt -CVE-2016-6600 - https://www.exploit-db.com/exploits/40229/ -CVE-2016-6601 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html -CVE-2016-6601 - http://seclists.org/fulldisclosure/2016/Aug/54 -CVE-2016-6601 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt -CVE-2016-6601 - https://www.exploit-db.com/exploits/40229/ -CVE-2016-6602 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html -CVE-2016-6602 - http://seclists.org/fulldisclosure/2016/Aug/54 -CVE-2016-6602 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt -CVE-2016-6602 - https://www.exploit-db.com/exploits/40229/ -CVE-2016-6603 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html -CVE-2016-6603 - http://seclists.org/fulldisclosure/2016/Aug/54 -CVE-2016-6603 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt -CVE-2016-6603 - https://www.exploit-db.com/exploits/40229/ -CVE-2016-6615 - http://www.securityfocus.com/bid/95041 -CVE-2016-6616 - http://www.securityfocus.com/bid/95042 -CVE-2016-6617 - http://www.securityfocus.com/bid/95044 -CVE-2016-6618 - http://www.securityfocus.com/bid/95047 -CVE-2016-6619 - http://www.securityfocus.com/bid/95048 -CVE-2016-6622 - http://www.securityfocus.com/bid/95049 -CVE-2016-6634 - https://wpvulndb.com/vulnerabilities/8474 -CVE-2016-6635 - https://wpvulndb.com/vulnerabilities/8475 -CVE-2016-6662 - http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html -CVE-2016-6662 - http://seclists.org/fulldisclosure/2016/Sep/23 -CVE-2016-6662 - http://www.openwall.com/lists/oss-security/2016/09/12/3 -CVE-2016-6662 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6662 - https://www.exploit-db.com/exploits/40360/ -CVE-2016-6662 - https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/ -CVE-2016-6663 - http://seclists.org/fulldisclosure/2016/Nov/4 -CVE-2016-6663 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6663 - https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html -CVE-2016-6663 - https://www.exploit-db.com/exploits/40678/ -CVE-2016-6663 - https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ -CVE-2016-6664 - http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html -CVE-2016-6664 - http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html -CVE-2016-6664 - http://seclists.org/fulldisclosure/2016/Nov/4 -CVE-2016-6664 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-6664 - https://www.exploit-db.com/exploits/40679/ -CVE-2016-6664 - https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ -CVE-2016-6668 - http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html -CVE-2016-6671 - http://www.openwall.com/lists/oss-security/2016/08/12/6 -CVE-2016-6689 - https://www.exploit-db.com/exploits/40515/ -CVE-2016-6707 - https://www.exploit-db.com/exploits/40874/ -CVE-2016-6754 - https://www.exploit-db.com/exploits/40846/ -CVE-2016-6772 - https://www.exploit-db.com/exploits/40945/ -CVE-2016-6793 - https://www.tenable.com/security/research/tra-2016-23 -CVE-2016-6794 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-6796 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-6797 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2016-6802 - http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html -CVE-2016-6803 - https://www.openoffice.org/security/cves/CVE-2016-6803.html -CVE-2016-6804 - https://www.openoffice.org/security/cves/CVE-2016-6804.html -CVE-2016-6808 - http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html -CVE-2016-6814 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-6814 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-6814 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-6814 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-6814 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-6814 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-6816 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-6816 - https://www.exploit-db.com/exploits/41783/ -CVE-2016-6823 - http://www.openwall.com/lists/oss-security/2016/09/26/3 -CVE-2016-6837 - https://mantisbt.org/bugs/view.php?id=21611 -CVE-2016-6840 - http://packetstormsecurity.com/files/138061/Huawei-ISM-Professional-Cross-Site-Scripting.html -CVE-2016-6851 - http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html -CVE-2016-6851 - https://www.exploit-db.com/exploits/40377/ -CVE-2016-6853 - http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html -CVE-2016-6853 - https://www.exploit-db.com/exploits/40377/ -CVE-2016-6854 - http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html -CVE-2016-6854 - https://www.exploit-db.com/exploits/40377/ -CVE-2016-6855 - http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html -CVE-2016-6855 - http://www.ubuntu.com/usn/USN-3069-1 -CVE-2016-6855 - https://bugzilla.gnome.org/show_bug.cgi?id=770143 -CVE-2016-6855 - https://www.exploit-db.com/exploits/40291/ -CVE-2016-6881 - http://www.openwall.com/lists/oss-security/2016/09/26/6 -CVE-2016-6890 - https://www.kb.cert.org/vuls/id/396440 -CVE-2016-6891 - https://www.kb.cert.org/vuls/id/396440 -CVE-2016-6892 - https://www.kb.cert.org/vuls/id/396440 -CVE-2016-6896 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html -CVE-2016-6896 - https://wpvulndb.com/vulnerabilities/8606 -CVE-2016-6896 - https://www.exploit-db.com/exploits/40288/ -CVE-2016-6897 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html -CVE-2016-6897 - https://wpvulndb.com/vulnerabilities/8606 -CVE-2016-6897 - https://www.exploit-db.com/exploits/40288/ -CVE-2016-6902 - https://github.com/ghantoos/lshell/issues/147 -CVE-2016-6905 - https://github.com/libgd/libgd/issues/248 -CVE-2016-6909 - http://fortiguard.com/advisory/FG-IR-16-023 -CVE-2016-6909 - http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html -CVE-2016-6909 - https://www.exploit-db.com/exploits/40276/ -CVE-2016-6913 - http://seclists.org/fulldisclosure/2016/Aug/122 -CVE-2016-6914 - http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html -CVE-2016-6914 - https://hackerone.com/reports/140793 -CVE-2016-6914 - https://www.exploit-db.com/exploits/43390/ -CVE-2016-6920 - http://packetstormsecurity.com/files/138618/ffmpeg-3.1.2-Heap-Overflow.html -CVE-2016-7039 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html -CVE-2016-7044 - https://irssi.org/security/irssi_sa_2016.txt -CVE-2016-7045 - https://irssi.org/security/irssi_sa_2016.txt -CVE-2016-7048 - https://bugzilla.redhat.com/show_bug.cgi?id=1378043 -CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-7052 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7052 - https://www.tenable.com/security/tns-2016-20 -CVE-2016-7054 - https://www.exploit-db.com/exploits/40899/ -CVE-2016-7055 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-7055 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2016-7055 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-7063 - https://lf.lc/CVE-2016-7063.txt -CVE-2016-7065 - http://seclists.org/fulldisclosure/2016/Nov/143 -CVE-2016-7065 - https://www.exploit-db.com/exploits/40842/ -CVE-2016-7079 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7080 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7081 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7082 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7083 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7083 - https://www.exploit-db.com/exploits/40398/ -CVE-2016-7084 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7084 - https://www.exploit-db.com/exploits/40399/ -CVE-2016-7085 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7086 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html -CVE-2016-7089 - http://packetstormsecurity.com/files/138393/ESCALATEPLOWMAN-WatchGuard-Privilege-Escalation.html -CVE-2016-7089 - https://www.exploit-db.com/exploits/40270/ -CVE-2016-7092 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-7094 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-7097 - http://www.ubuntu.com/usn/USN-3146-1 -CVE-2016-7098 - http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html -CVE-2016-7098 - http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html -CVE-2016-7098 - https://www.exploit-db.com/exploits/40824/ -CVE-2016-7101 - http://www.openwall.com/lists/oss-security/2016/09/26/8 -CVE-2016-7103 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-7103 - https://www.drupal.org/sa-core-2022-002 -CVE-2016-7103 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2016-7103 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2016-7103 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-7103 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2016-7103 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-7103 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7115 - https://github.com/haakonnessjoen/MAC-Telnet/commit/b69d11727d4f0f8cf719c79e3fb700f55ca03e9a -CVE-2016-7119 - http://www.dnnsoftware.com/community/security/security-center -CVE-2016-7124 - https://bugs.php.net/bug.php?id=72663 -CVE-2016-7124 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7125 - https://bugs.php.net/bug.php?id=72681 -CVE-2016-7125 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7126 - https://bugs.php.net/bug.php?id=72697 -CVE-2016-7126 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7127 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7128 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7129 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7130 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7131 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7132 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7133 - https://bugs.php.net/bug.php?id=72742 -CVE-2016-7135 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -CVE-2016-7135 - http://seclists.org/fulldisclosure/2016/Oct/80 -CVE-2016-7136 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -CVE-2016-7136 - http://seclists.org/fulldisclosure/2016/Oct/80 -CVE-2016-7137 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -CVE-2016-7137 - http://seclists.org/fulldisclosure/2016/Oct/80 -CVE-2016-7138 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -CVE-2016-7138 - http://seclists.org/fulldisclosure/2016/Oct/80 -CVE-2016-7139 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -CVE-2016-7139 - http://seclists.org/fulldisclosure/2016/Oct/80 -CVE-2016-7140 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -CVE-2016-7140 - http://seclists.org/fulldisclosure/2016/Oct/80 -CVE-2016-7141 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-7146 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html -CVE-2016-7147 - https://www.curesec.com/blog/article/blog/Plone-XSS-186.html -CVE-2016-7148 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html -CVE-2016-7154 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf -CVE-2016-7154 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -CVE-2016-7163 - http://www.openwall.com/lists/oss-security/2016/09/08/3 -CVE-2016-7163 - https://github.com/uclouvain/openjpeg/issues/826 -CVE-2016-7163 - https://github.com/uclouvain/openjpeg/pull/809 -CVE-2016-7164 - http://www.openwall.com/lists/oss-security/2016/09/08/1 -CVE-2016-7165 - http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html -CVE-2016-7166 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -CVE-2016-7166 - https://github.com/libarchive/libarchive/issues/660 -CVE-2016-7167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-7168 - http://www.openwall.com/lists/oss-security/2016/09/08/19 -CVE-2016-7168 - http://www.openwall.com/lists/oss-security/2016/09/08/24 -CVE-2016-7168 - https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html -CVE-2016-7168 - https://wpvulndb.com/vulnerabilities/8615 -CVE-2016-7169 - https://wpvulndb.com/vulnerabilities/8616 -CVE-2016-7172 - https://kb.netapp.com/support/s/article/NTAP-20161220-0001 -CVE-2016-7177 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12750 -CVE-2016-7178 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751 -CVE-2016-7179 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12752 -CVE-2016-7185 - https://www.exploit-db.com/exploits/40572/ -CVE-2016-7188 - https://www.exploit-db.com/exploits/40562/ -CVE-2016-7200 - http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html -CVE-2016-7200 - https://github.com/theori-io/chakra-2016-11 -CVE-2016-7200 - https://www.exploit-db.com/exploits/40785/ -CVE-2016-7200 - https://www.exploit-db.com/exploits/40990/ -CVE-2016-7201 - http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html -CVE-2016-7201 - https://github.com/theori-io/chakra-2016-11 -CVE-2016-7201 - https://www.exploit-db.com/exploits/40784/ -CVE-2016-7201 - https://www.exploit-db.com/exploits/40990/ -CVE-2016-7202 - https://www.exploit-db.com/exploits/40786/ -CVE-2016-7202 - https://www.exploit-db.com/exploits/40793/ -CVE-2016-7203 - https://www.exploit-db.com/exploits/40787/ -CVE-2016-7216 - https://www.exploit-db.com/exploits/40766/ -CVE-2016-7224 - https://www.exploit-db.com/exploits/40765/ -CVE-2016-7225 - https://www.exploit-db.com/exploits/40764/ -CVE-2016-7226 - https://www.exploit-db.com/exploits/40763/ -CVE-2016-7237 - https://www.exploit-db.com/exploits/40744/ -CVE-2016-7240 - https://www.exploit-db.com/exploits/40773/ -CVE-2016-7241 - http://packetstormsecurity.com/files/139991/Microsoft-Edge-JSON.parse-Information-Leak.html -CVE-2016-7241 - https://www.exploit-db.com/exploits/40875/ -CVE-2016-7255 - http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html -CVE-2016-7255 - https://github.com/mwrlabs/CVE-2016-7255 -CVE-2016-7255 - https://www.exploit-db.com/exploits/40745/ -CVE-2016-7255 - https://www.exploit-db.com/exploits/40823/ -CVE-2016-7255 - https://www.exploit-db.com/exploits/41015/ -CVE-2016-7259 - http://packetstormsecurity.com/files/140172/Microsoft-Windows-Type-1-Font-Processing-Privilege-Escalation.html -CVE-2016-7274 - https://www.exploit-db.com/exploits/41615/ -CVE-2016-7286 - http://packetstormsecurity.com/files/140250/Microsoft-Edge-SIMD.toLocaleString-Uninitialized-Memory.html -CVE-2016-7286 - https://www.exploit-db.com/exploits/40947/ -CVE-2016-7287 - http://packetstormsecurity.com/files/140251/Microsoft-Edge-Internationalization-Type-Confusion.html -CVE-2016-7287 - https://www.exploit-db.com/exploits/40948/ -CVE-2016-7288 - http://packetstormsecurity.com/files/140994/Microsoft-Edge-TypedArray.sort-Use-After-Free.html -CVE-2016-7288 - https://www.exploit-db.com/exploits/41357/ -CVE-2016-7289 - http://fortiguard.com/advisory/FG-VD-16-068 -CVE-2016-7381 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7382 - http://nvidia.custhelp.com/app/answers/detail/a_id/4246 -CVE-2016-7382 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7383 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7384 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7384 - https://www.exploit-db.com/exploits/40655/ -CVE-2016-7385 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7385 - https://www.exploit-db.com/exploits/40657/ -CVE-2016-7386 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7386 - https://www.exploit-db.com/exploits/40656/ -CVE-2016-7387 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7387 - https://www.exploit-db.com/exploits/40659/ -CVE-2016-7388 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7389 - http://nvidia.custhelp.com/app/answers/detail/a_id/4246 -CVE-2016-7390 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7390 - https://www.exploit-db.com/exploits/40658/ -CVE-2016-7391 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-7391 - https://www.exploit-db.com/exploits/40661/ -CVE-2016-7398 - https://bugs.php.net/bug.php?id=73055 -CVE-2016-7398 - https://bugs.php.net/bug.php?id=73055&edit=1 -CVE-2016-7400 - https://www.exploit-db.com/exploits/40412/ -CVE-2016-7410 - http://www.openwall.com/lists/oss-security/2016/09/13/5 -CVE-2016-7411 - https://bugs.php.net/bug.php?id=73052 -CVE-2016-7411 - https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 -CVE-2016-7412 - https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 -CVE-2016-7412 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7413 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7414 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7415 - https://bugs.php.net/bug.php?id=73007 -CVE-2016-7415 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7416 - https://bugs.php.net/bug.php?id=73007 -CVE-2016-7416 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7417 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7418 - https://bugs.php.net/bug.php?id=73065 -CVE-2016-7418 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-7419 - https://hackerone.com/reports/145355 -CVE-2016-7420 - https://github.com/weidai11/cryptopp/issues/277 -CVE-2016-7425 - http://www.ubuntu.com/usn/USN-3145-1 -CVE-2016-7425 - http://www.ubuntu.com/usn/USN-3146-1 -CVE-2016-7426 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7427 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7428 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7429 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-7429 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7431 - http://packetstormsecurity.com/files/140240/FreeBSD-Security-Advisory-FreeBSD-SA-16.39.ntp.html -CVE-2016-7431 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-7431 - http://www.ubuntu.com/usn/USN-3349-1 -CVE-2016-7431 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7433 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-7433 - http://www.ubuntu.com/usn/USN-3349-1 -CVE-2016-7433 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7434 - https://hackerone.com/reports/147310 -CVE-2016-7434 - https://www.exploit-db.com/exploits/40806/ -CVE-2016-7434 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-7440 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-7445 - http://www.openwall.com/lists/oss-security/2016/09/18/4 -CVE-2016-7445 - https://github.com/uclouvain/openjpeg/issues/843 -CVE-2016-7454 - https://packetstormsecurity.com/files/140121/XFINITY-Gateway-Technicolor-DPC3941T-Cross-Site-Request-Forgery.html -CVE-2016-7478 - https://bugs.php.net/bug.php?id=73093 -CVE-2016-7479 - https://bugs.php.net/bug.php?id=73092 -CVE-2016-7504 - http://bugs.ghostscript.com/show_bug.cgi?id=697142 -CVE-2016-7505 - http://bugs.ghostscript.com/show_bug.cgi?id=697140 -CVE-2016-7506 - http://bugs.ghostscript.com/show_bug.cgi?id=697141 -CVE-2016-7508 - https://github.com/glpi-project/glpi/issues/1047 -CVE-2016-7508 - https://www.exploit-db.com/exploits/42262/ -CVE-2016-7510 - https://bugzilla.redhat.com/show_bug.cgi?id=1377015 -CVE-2016-7510 - https://sourceforge.net/p/libdwarf/bugs/4/ -CVE-2016-7511 - https://sourceforge.net/p/libdwarf/bugs/3/ -CVE-2016-7511 - https://www.prevanders.net/dwarfbug.html#DW201609-002 -CVE-2016-7521 - https://github.com/ImageMagick/ImageMagick/issues/92 -CVE-2016-7526 - https://github.com/ImageMagick/ImageMagick/commit/b60d1ed0af37c50b91a40937825b4c61e8458095 -CVE-2016-7538 - https://github.com/ImageMagick/ImageMagick/issues/148 -CVE-2016-7540 - https://github.com/ImageMagick/ImageMagick/pull/223 -CVE-2016-7541 - http://fortiguard.com/advisory/FG-IR-16-088 -CVE-2016-7542 - http://fortiguard.com/advisory/FG-IR-16-050 -CVE-2016-7560 - http://fortiguard.com/advisory/FG-IR-16-029 -CVE-2016-7563 - https://bugs.ghostscript.com/show_bug.cgi?id=697136 -CVE-2016-7564 - https://bugs.ghostscript.com/show_bug.cgi?id=697137 -CVE-2016-7565 - http://www.openwall.com/lists/oss-security/2016/09/22/6 -CVE-2016-7567 - https://www.exploit-db.com/exploits/45804/ -CVE-2016-7568 - https://bugs.php.net/bug.php?id=73003 -CVE-2016-7568 - https://github.com/libgd/libgd/issues/308 -CVE-2016-7569 - http://www.openwall.com/lists/oss-security/2016/09/28/2 -CVE-2016-7569 - http://www.openwall.com/lists/oss-security/2016/09/28/4 -CVE-2016-7596 - http://www.securityfocus.com/bid/94903 -CVE-2016-7600 - http://www.securityfocus.com/bid/94903 -CVE-2016-7602 - http://www.securityfocus.com/bid/94903 -CVE-2016-7603 - http://www.securityfocus.com/bid/94903 -CVE-2016-7604 - http://www.securityfocus.com/bid/94903 -CVE-2016-7605 - http://www.securityfocus.com/bid/94903 -CVE-2016-7608 - http://www.securityfocus.com/bid/94903 -CVE-2016-7609 - http://www.securityfocus.com/bid/94903 -CVE-2016-7612 - https://www.exploit-db.com/exploits/40955/ -CVE-2016-7617 - http://www.securityfocus.com/bid/94903 -CVE-2016-7617 - https://www.exploit-db.com/exploits/40952/ -CVE-2016-7618 - http://www.securityfocus.com/bid/94903 -CVE-2016-7620 - http://www.securityfocus.com/bid/94903 -CVE-2016-7621 - https://www.exploit-db.com/exploits/40956/ -CVE-2016-7622 - http://www.securityfocus.com/bid/94903 -CVE-2016-7624 - http://www.securityfocus.com/bid/94903 -CVE-2016-7625 - http://www.securityfocus.com/bid/94903 -CVE-2016-7626 - https://www.exploit-db.com/exploits/40906/ -CVE-2016-7628 - http://www.securityfocus.com/bid/94903 -CVE-2016-7629 - http://www.securityfocus.com/bid/94903 -CVE-2016-7633 - http://www.securityfocus.com/bid/94903 -CVE-2016-7633 - https://www.exploit-db.com/exploits/40954/ -CVE-2016-7637 - https://www.exploit-db.com/exploits/40931/ -CVE-2016-7637 - https://www.exploit-db.com/exploits/40957/ -CVE-2016-7644 - https://www.exploit-db.com/exploits/40931/ -CVE-2016-7660 - https://www.exploit-db.com/exploits/40959/ -CVE-2016-7661 - https://www.exploit-db.com/exploits/40931/ -CVE-2016-7661 - https://www.exploit-db.com/exploits/40958/ -CVE-2016-7780 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7781 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7782 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7783 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7784 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7786 - https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html -CVE-2016-7786 - https://www.exploit-db.com/exploits/44469/ -CVE-2016-7788 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7789 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-7790 - http://www.openwall.com/lists/oss-security/2016/09/22/6 -CVE-2016-7791 - http://www.openwall.com/lists/oss-security/2016/09/29/11 -CVE-2016-7792 - https://packetstormsecurity.com/files/138928/Ubiquiti-UniFi-AP-AC-Lite-5.2.7-Improper-Access-Control.html -CVE-2016-7795 - http://www.openwall.com/lists/oss-security/2016/09/28/9 -CVE-2016-7795 - http://www.openwall.com/lists/oss-security/2016/09/30/1 -CVE-2016-7795 - https://github.com/systemd/systemd/issues/4234 -CVE-2016-7796 - http://www.openwall.com/lists/oss-security/2016/09/30/1 -CVE-2016-7796 - https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 -CVE-2016-7809 - http://www.securityfocus.com/bid/94248 -CVE-2016-7810 - http://www.securityfocus.com/bid/94248 -CVE-2016-7811 - http://www.securityfocus.com/bid/94248 -CVE-2016-7851 - https://www.exploit-db.com/exploits/40742/ -CVE-2016-7866 - http://hyp3rlinx.altervista.org/advisories/ADOBE-ANIMATE-MEMORY-CORRUPTION-VULNERABILITY.txt -CVE-2016-7866 - http://packetstormsecurity.com/files/140164/Adobe-Animate-15.2.1.95-Buffer-Overflow.html -CVE-2016-7866 - http://seclists.org/fulldisclosure/2016/Dec/45 -CVE-2016-7866 - https://www.exploit-db.com/exploits/40915/ -CVE-2016-7904 - http://www.openwall.com/lists/oss-security/2017/01/16/1 -CVE-2016-7919 - https://www.youtube.com/watch?v=pQS1GdQ3CBc -CVE-2016-7966 - http://www.openwall.com/lists/oss-security/2016/10/05/1 -CVE-2016-7967 - http://www.openwall.com/lists/oss-security/2016/10/05/1 -CVE-2016-7968 - http://www.openwall.com/lists/oss-security/2016/10/05/1 -CVE-2016-7977 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-7980 - http://www.openwall.com/lists/oss-security/2016/10/12/6 -CVE-2016-7980 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-exec-code-cross-site-request-forgery-cve-2016-7980/ -CVE-2016-7981 - http://www.openwall.com/lists/oss-security/2016/10/12/7 -CVE-2016-7982 - http://www.openwall.com/lists/oss-security/2016/10/12/8 -CVE-2016-7982 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-1-3-1-2-file-enumeration-path-traversal-cve-2016-7982/ -CVE-2016-7998 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-template-compiler-composer-php-code-execution-cve-2016-7998/ -CVE-2016-7999 - http://www.openwall.com/lists/oss-security/2016/10/12/10 -CVE-2016-7999 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-server-side-request-forgery-cve-2016-7999/ -CVE-2016-8006 - https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html -CVE-2016-8007 - https://kc.mcafee.com/corporate/index?page=content&id=SB10173 -CVE-2016-8016 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8017 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8018 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8019 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8020 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8021 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8022 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8023 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8024 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8025 - https://www.exploit-db.com/exploits/40911/ -CVE-2016-8027 - https://kc.mcafee.com/corporate/index?page=content&id=SB10187 -CVE-2016-8201 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 -CVE-2016-8201 - https://www.kb.cert.org/vuls/id/192371 -CVE-2016-8220 - https://docs.pivotal.io/gemfire-cf/relnotes.html -CVE-2016-8235 - http://www.securityfocus.com/bid/97543 -CVE-2016-8281 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8282 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8283 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8284 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8288 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8289 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8290 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8291 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -CVE-2016-8297 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8298 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8299 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8300 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8301 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8302 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8303 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8304 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8305 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8306 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8307 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8308 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8309 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8310 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8311 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8312 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8313 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8314 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8315 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8316 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8317 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8318 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8319 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8320 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8322 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8323 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8324 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8325 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8327 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8328 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8329 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8330 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2016-8332 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-8366 - https://www.exploit-db.com/exploits/45586/ -CVE-2016-8371 - https://www.exploit-db.com/exploits/45590/ -CVE-2016-8377 - https://www.exploit-db.com/exploits/42700/ -CVE-2016-8380 - https://www.exploit-db.com/exploits/45590/ -CVE-2016-8385 - http://www.talosintelligence.com/reports/TALOS-2016-0210/ -CVE-2016-8386 - http://www.talosintelligence.com/reports/TALOS-2016-0211/ -CVE-2016-8387 - http://www.talosintelligence.com/reports/TALOS-2016-0212/ -CVE-2016-8388 - http://www.talosintelligence.com/reports/TALOS-2016-0213/ -CVE-2016-8389 - http://www.talosintelligence.com/reports/TALOS-2016-0214/ -CVE-2016-8462 - https://github.com/CunningLogic/PixelDump_CVE-2016-8462 -CVE-2016-8462 - https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ -CVE-2016-8492 - https://fortiguard.com/advisory/FG-IR-16-067 -CVE-2016-8513 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-8514 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-8515 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-8516 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-8517 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-8518 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2016-8519 - https://www.tenable.com/security/research/tra-2017-05 -CVE-2016-8523 - https://www.exploit-db.com/exploits/41297/ -CVE-2016-8525 - https://www.tenable.com/security/research/tra-2017-09 -CVE-2016-8526 - https://www.exploit-db.com/exploits/41482/ -CVE-2016-8527 - https://www.exploit-db.com/exploits/41482/ -CVE-2016-8530 - https://www.tenable.com/security/research/tra-2017-09 -CVE-2016-8568 - https://github.com/libgit2/libgit2/issues/3936 -CVE-2016-8580 - https://www.exploit-db.com/exploits/40682/ -CVE-2016-8581 - https://www.exploit-db.com/exploits/40683/ -CVE-2016-8582 - https://www.exploit-db.com/exploits/40684/ -CVE-2016-8584 - http://packetstormsecurity.com/files/142227/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-Session-Generation-Authentication-Bypass.html -CVE-2016-8585 - http://packetstormsecurity.com/files/142223/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-admin_sys_time.cgi-Remote-Code-Execution.html -CVE-2016-8585 - http://packetstormsecurity.com/files/142224/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-admin_sys_time.cgi-Remote-Code-Execution.html -CVE-2016-8586 - http://packetstormsecurity.com/files/142222/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-detected_potential_files.cgi-Remote-Code-Execution.html -CVE-2016-8587 - http://packetstormsecurity.com/files/142221/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-dlp_policy_upload.cgi-Remote-Code-Execution.html -CVE-2016-8588 - http://packetstormsecurity.com/files/142220/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-hotfix_upload.cgi-Remote-Code-Execution.html -CVE-2016-8589 - http://packetstormsecurity.com/files/142219/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_dae.cgi-Remote-Code-Execution.html -CVE-2016-8590 - http://packetstormsecurity.com/files/142218/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_dlp.cgi-Remote-Code-Execution.html -CVE-2016-8591 - http://packetstormsecurity.com/files/142217/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query.cgi-Remote-Code-Execution.html -CVE-2016-8592 - http://packetstormsecurity.com/files/142216/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_system.cgi-Remote-Code-Execution.html -CVE-2016-8593 - http://packetstormsecurity.com/files/142215/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-upload.cgi-Remote-Code-Execution.html -CVE-2016-8600 - http://seclists.org/fulldisclosure/2016/Oct/63 -CVE-2016-8600 - https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html -CVE-2016-8605 - http://www.openwall.com/lists/oss-security/2016/10/12/1 -CVE-2016-8610 - http://seclists.org/oss-sec/2016/q4/224 -CVE-2016-8610 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2016-8610 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2016-8610 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-8610 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-8610 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2016-8615 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8616 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8617 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8618 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8619 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8620 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8621 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8622 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8623 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8624 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-8624 - https://hackerone.com/reports/180434 -CVE-2016-8641 - https://www.exploit-db.com/exploits/40774/ -CVE-2016-8645 - http://www.openwall.com/lists/oss-security/2016/11/30/3 -CVE-2016-8650 - http://seclists.org/fulldisclosure/2016/Nov/76 -CVE-2016-8654 - https://github.com/mdadams/jasper/issues/93 -CVE-2016-8654 - https://github.com/mdadams/jasper/issues/94 -CVE-2016-8655 - http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html -CVE-2016-8655 - https://www.exploit-db.com/exploits/40871/ -CVE-2016-8655 - https://www.exploit-db.com/exploits/44696/ -CVE-2016-8658 - http://www.ubuntu.com/usn/USN-3145-1 -CVE-2016-8658 - http://www.ubuntu.com/usn/USN-3146-1 -CVE-2016-8661 - https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one -CVE-2016-8676 - http://www.openwall.com/lists/oss-security/2016/12/04/3 -CVE-2016-8676 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-8704 - http://www.talosintelligence.com/reports/TALOS-2016-0219/ -CVE-2016-8705 - http://www.talosintelligence.com/reports/TALOS-2016-0220/ -CVE-2016-8706 - http://www.talosintelligence.com/reports/TALOS-2016-0221/ -CVE-2016-8712 - http://www.talosintelligence.com/reports/TALOS-2016-0225/ -CVE-2016-8714 - http://www.talosintelligence.com/reports/TALOS-2016-0227/ -CVE-2016-8718 - http://www.talosintelligence.com/reports/TALOS-2016-0232/ -CVE-2016-8719 - http://www.talosintelligence.com/reports/TALOS-2016-0233/ -CVE-2016-8720 - http://www.talosintelligence.com/reports/TALOS-2016-0234/ -CVE-2016-8721 - http://www.talosintelligence.com/reports/TALOS-2016-0235/ -CVE-2016-8722 - http://www.talosintelligence.com/reports/TALOS-2016-0236/ -CVE-2016-8723 - http://www.talosintelligence.com/reports/TALOS-2016-0237/ -CVE-2016-8724 - http://www.talosintelligence.com/reports/TALOS-2016-0238/ -CVE-2016-8725 - http://www.talosintelligence.com/reports/TALOS-2016-0239/ -CVE-2016-8726 - http://www.talosintelligence.com/reports/TALOS-2016-0240/ -CVE-2016-8727 - http://www.talosintelligence.com/reports/TALOS-2016-0241/ -CVE-2016-8728 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0242 -CVE-2016-8730 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0244 -CVE-2016-8731 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0245 -CVE-2016-8732 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0246 -CVE-2016-8734 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2016-8735 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-8735 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-8735 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-8737 - https://brooklyn.apache.org/community/security/CVE-2016-8737.html -CVE-2016-8740 - http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html -CVE-2016-8740 - https://www.exploit-db.com/exploits/40909/ -CVE-2016-8742 - https://www.exploit-db.com/exploits/40865/ -CVE-2016-8743 - https://hackerone.com/reports/244459 -CVE-2016-8744 - https://brooklyn.apache.org/community/security/CVE-2016-8744.html -CVE-2016-8745 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-8769 - https://www.exploit-db.com/exploits/40807/ -CVE-2016-8802 - http://www.securityfocus.com/bid/94538 -CVE-2016-8805 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8805 - https://www.exploit-db.com/exploits/40667/ -CVE-2016-8806 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8806 - https://www.exploit-db.com/exploits/40663/ -CVE-2016-8807 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8807 - https://www.exploit-db.com/exploits/40668/ -CVE-2016-8808 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8808 - https://www.exploit-db.com/exploits/40666/ -CVE-2016-8809 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8809 - https://www.exploit-db.com/exploits/40664/ -CVE-2016-8810 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8810 - https://www.exploit-db.com/exploits/40665/ -CVE-2016-8811 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8811 - https://www.exploit-db.com/exploits/40662/ -CVE-2016-8812 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -CVE-2016-8812 - https://www.exploit-db.com/exploits/40660/ -CVE-2016-8820 - http://www.securityfocus.com/bid/95045 -CVE-2016-8855 - https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html -CVE-2016-8855 - https://www.exploit-db.com/exploits/41618/ -CVE-2016-8862 - https://github.com/ImageMagick/ImageMagick/issues/271 -CVE-2016-8863 - https://www.tenable.com/security/research/tra-2017-10 -CVE-2016-8866 - https://github.com/ImageMagick/ImageMagick/issues/271 -CVE-2016-8869 - https://medium.com/@showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.rq4qh1v4r -CVE-2016-8869 - https://www.exploit-db.com/exploits/40637/ -CVE-2016-8870 - https://medium.com/@showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.rq4qh1v4r -CVE-2016-8870 - https://www.exploit-db.com/exploits/40637/ -CVE-2016-8887 - http://www.openwall.com/lists/oss-security/2016/10/23/6 -CVE-2016-8897 - http://www.openwall.com/lists/oss-security/2016/09/30/5 -CVE-2016-8898 - http://www.openwall.com/lists/oss-security/2016/09/30/5 -CVE-2016-8899 - http://www.openwall.com/lists/oss-security/2016/09/30/5 -CVE-2016-8900 - http://www.openwall.com/lists/oss-security/2016/09/30/5 -CVE-2016-8902 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8902 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8903 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8903 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8904 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8904 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8905 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8905 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8906 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8906 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8907 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8907 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8908 - http://seclists.org/fulldisclosure/2016/Nov/0 -CVE-2016-8908 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -CVE-2016-8972 - https://www.exploit-db.com/exploits/40950/ -CVE-2016-9017 - http://bugs.ghostscript.com/show_bug.cgi?id=697171 -CVE-2016-9018 - https://www.exploit-db.com/exploits/40617/ -CVE-2016-9019 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-9020 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-9036 - http://www.talosintelligence.com/reports/TALOS-2016-0254/ -CVE-2016-9037 - http://www.talosintelligence.com/reports/TALOS-2016-0255/ -CVE-2016-9039 - http://www.talosintelligence.com/reports/TALOS-2016-0257/ -CVE-2016-9040 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0258 -CVE-2016-9042 - http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html -CVE-2016-9042 - http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html -CVE-2016-9042 - http://www.ubuntu.com/usn/USN-3349-1 -CVE-2016-9044 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315 -CVE-2016-9045 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0314 -CVE-2016-9048 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0313 -CVE-2016-9049 - http://www.talosintelligence.com/reports/TALOS-2016-0263/ -CVE-2016-9050 - http://www.talosintelligence.com/reports/TALOS-2016-0264/ -CVE-2016-9051 - http://www.talosintelligence.com/reports/TALOS-2016-0265/ -CVE-2016-9052 - http://www.talosintelligence.com/reports/TALOS-2016-0266/ -CVE-2016-9053 - http://www.talosintelligence.com/reports/TALOS-2016-0267/ -CVE-2016-9054 - http://www.talosintelligence.com/reports/TALOS-2016-0268/ -CVE-2016-9061 - http://www.securityfocus.com/bid/94337 -CVE-2016-9061 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245795 -CVE-2016-9062 - http://www.securityfocus.com/bid/94337 -CVE-2016-9063 - http://www.securityfocus.com/bid/94337 -CVE-2016-9066 - https://bugzilla.mozilla.org/show_bug.cgi?id=1299686 -CVE-2016-9067 - http://www.securityfocus.com/bid/94337 -CVE-2016-9068 - http://www.securityfocus.com/bid/94337 -CVE-2016-9069 - http://www.securityfocus.com/bid/94337 -CVE-2016-9070 - http://www.securityfocus.com/bid/94337 -CVE-2016-9071 - http://www.securityfocus.com/bid/94337 -CVE-2016-9071 - https://bugzilla.mozilla.org/show_bug.cgi?id=1285003 -CVE-2016-9072 - http://www.securityfocus.com/bid/94337 -CVE-2016-9073 - http://www.securityfocus.com/bid/94337 -CVE-2016-9075 - http://www.securityfocus.com/bid/94337 -CVE-2016-9076 - http://www.securityfocus.com/bid/94337 -CVE-2016-9077 - http://www.securityfocus.com/bid/94337 -CVE-2016-9078 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317641 -CVE-2016-9079 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321066 -CVE-2016-9079 - https://www.exploit-db.com/exploits/41151/ -CVE-2016-9079 - https://www.exploit-db.com/exploits/42327/ -CVE-2016-9086 - https://hackerone.com/reports/178152 -CVE-2016-9087 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -CVE-2016-9091 - https://www.exploit-db.com/exploits/41785/ -CVE-2016-9091 - https://www.exploit-db.com/exploits/41786/ -CVE-2016-9109 - https://bugs.ghostscript.com/show_bug.cgi?id=697136#c4 -CVE-2016-9111 - https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html -CVE-2016-9111 - https://vuldb.com/?id.93250 -CVE-2016-9111 - https://www.exploit-db.com/exploits/40686/ -CVE-2016-9112 - https://github.com/uclouvain/openjpeg/issues/855 -CVE-2016-9112 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-9113 - https://github.com/uclouvain/openjpeg/issues/856 -CVE-2016-9114 - https://github.com/uclouvain/openjpeg/issues/857 -CVE-2016-9115 - https://github.com/uclouvain/openjpeg/issues/858 -CVE-2016-9116 - https://github.com/uclouvain/openjpeg/issues/859 -CVE-2016-9117 - https://github.com/uclouvain/openjpeg/issues/860 -CVE-2016-9118 - https://github.com/uclouvain/openjpeg/issues/861 -CVE-2016-9136 - http://bugs.ghostscript.com/show_bug.cgi?id=697244 -CVE-2016-9137 - https://bugs.php.net/bug.php?id=73147 -CVE-2016-9137 - https://www.tenable.com/security/tns-2016-19 -CVE-2016-9138 - https://bugs.php.net/bug.php?id=73147 -CVE-2016-9148 - http://packetstormsecurity.com/files/139660/CA-Service-Desk-Manaager-12.9-14.1-Code-Execution.html -CVE-2016-9150 - https://www.exploit-db.com/exploits/40790/ -CVE-2016-9151 - https://www.exploit-db.com/exploits/40788/ -CVE-2016-9151 - https://www.exploit-db.com/exploits/40789/ -CVE-2016-9164 - http://packetstormsecurity.com/files/139661/CA-Unified-Infrastructure-Management-Bypass-Traversal-Disclosure.html -CVE-2016-9176 - https://www.exploit-db.com/exploits/40648/ -CVE-2016-9177 - https://github.com/perwendel/spark/issues/700 -CVE-2016-9186 - https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html -CVE-2016-9187 - https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html -CVE-2016-9188 - https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html -CVE-2016-9192 - https://github.com/serializingme/cve-2016-9192 -CVE-2016-9192 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1 -CVE-2016-9207 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-expressway -CVE-2016-9244 - http://packetstormsecurity.com/files/141017/Ticketbleed-F5-TLS-Information-Disclosure.html -CVE-2016-9244 - https://blog.filippo.io/finding-ticketbleed/ -CVE-2016-9244 - https://www.exploit-db.com/exploits/41298/ -CVE-2016-9259 - https://www.tenable.com/security/tns-2016-17 -CVE-2016-9262 - https://blogs.gentoo.org/ago/2016/11/07/jasper-use-after-free-in-jas_realloc-jas_malloc-c -CVE-2016-9262 - https://bugzilla.redhat.com/show_bug.cgi?id=1393882 -CVE-2016-9263 - https://opnsec.com/2017/10/cve-2016-9263-unpatched-xsf-vulnerability-in-wordpress/ -CVE-2016-9264 - https://blogs.gentoo.org/ago/2016/11/07/libming-listmp3-global-buffer-overflow-in-printmp3headers-listmp3-c/ -CVE-2016-9265 - https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list -CVE-2016-9266 - https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-left-shift-in-listmp3-c -CVE-2016-9271 - https://docs.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html#tsb_210 -CVE-2016-9274 - https://github.com/git-for-windows/git/issues/944 -CVE-2016-9275 - https://blogs.gentoo.org/ago/2016/11/07/libdwarf-heap-based-buffer-overflow-in-_dwarf_skim_forms-dwarf_macro5-c -CVE-2016-9276 - https://blogs.gentoo.org/ago/2016/11/07/libdwarf-heap-based-buffer-overflow-in-dwarf_get_aranges_list-dwarf_arange-c -CVE-2016-9294 - http://bugs.ghostscript.com/show_bug.cgi?id=697172 -CVE-2016-9296 - https://github.com/yangke/7zip-null-pointer-dereference -CVE-2016-9296 - https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db/ -CVE-2016-9297 - http://bugzilla.maptools.org/show_bug.cgi?id=2590 -CVE-2016-9299 - http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition -CVE-2016-9299 - https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ -CVE-2016-9299 - https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 -CVE-2016-9299 - https://www.exploit-db.com/exploits/44642/ -CVE-2016-9310 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-9311 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-9312 - https://www.kb.cert.org/vuls/id/633847 -CVE-2016-9313 - http://www.openwall.com/lists/oss-security/2016/07/22/1 -CVE-2016-9318 - https://github.com/lsh123/xmlsec/issues/43 -CVE-2016-9332 - https://www.exploit-db.com/exploits/40779/ -CVE-2016-9349 - https://www.exploit-db.com/exploits/42401/ -CVE-2016-9349 - https://www.exploit-db.com/exploits/42402/ -CVE-2016-9351 - https://www.exploit-db.com/exploits/42402/ -CVE-2016-9387 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9387 - https://bugzilla.redhat.com/show_bug.cgi?id=1396959 -CVE-2016-9388 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9388 - https://bugzilla.redhat.com/show_bug.cgi?id=1396962 -CVE-2016-9389 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9389 - https://bugzilla.redhat.com/show_bug.cgi?id=1396963 -CVE-2016-9389 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-9390 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9390 - https://bugzilla.redhat.com/show_bug.cgi?id=1396965 -CVE-2016-9391 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9391 - https://bugzilla.redhat.com/show_bug.cgi?id=1396967 -CVE-2016-9392 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9392 - https://bugzilla.redhat.com/show_bug.cgi?id=1396971 -CVE-2016-9392 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-9393 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9394 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9395 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9395 - https://bugzilla.redhat.com/show_bug.cgi?id=1396977 -CVE-2016-9396 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9396 - https://bugzilla.redhat.com/show_bug.cgi?id=1396978 -CVE-2016-9397 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9397 - https://bugzilla.redhat.com/show_bug.cgi?id=1396979 -CVE-2016-9398 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9398 - https://bugzilla.redhat.com/show_bug.cgi?id=1396980 -CVE-2016-9399 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -CVE-2016-9399 - https://bugzilla.redhat.com/show_bug.cgi?id=1396981 -CVE-2016-9402 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9403 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9404 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9405 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9406 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9407 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9408 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9409 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9410 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9411 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9412 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9413 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9414 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9415 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9416 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9417 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9418 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9419 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9420 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9421 - http://www.openwall.com/lists/oss-security/2016/11/18/1 -CVE-2016-9422 - http://www.securityfocus.com/bid/94407 -CVE-2016-9423 - http://www.securityfocus.com/bid/94407 -CVE-2016-9423 - https://github.com/tats/w3m/issues/9 -CVE-2016-9424 - http://www.securityfocus.com/bid/94407 -CVE-2016-9425 - http://www.securityfocus.com/bid/94407 -CVE-2016-9425 - https://github.com/tats/w3m/issues/21 -CVE-2016-9426 - http://www.securityfocus.com/bid/94407 -CVE-2016-9427 - http://www.securityfocus.com/bid/94407 -CVE-2016-9428 - http://www.securityfocus.com/bid/94407 -CVE-2016-9429 - http://www.securityfocus.com/bid/94407 -CVE-2016-9430 - http://www.securityfocus.com/bid/94407 -CVE-2016-9431 - http://www.securityfocus.com/bid/94407 -CVE-2016-9432 - http://www.securityfocus.com/bid/94407 -CVE-2016-9433 - http://www.securityfocus.com/bid/94407 -CVE-2016-9434 - http://www.securityfocus.com/bid/94407 -CVE-2016-9435 - http://www.securityfocus.com/bid/94407 -CVE-2016-9436 - http://www.securityfocus.com/bid/94407 -CVE-2016-9437 - http://www.securityfocus.com/bid/94407 -CVE-2016-9438 - http://www.securityfocus.com/bid/94407 -CVE-2016-9439 - http://www.securityfocus.com/bid/94407 -CVE-2016-9440 - http://www.securityfocus.com/bid/94407 -CVE-2016-9441 - http://www.securityfocus.com/bid/94407 -CVE-2016-9442 - http://www.securityfocus.com/bid/94407 -CVE-2016-9443 - http://www.securityfocus.com/bid/94407 -CVE-2016-9445 - http://www.openwall.com/lists/oss-security/2016/11/18/12 -CVE-2016-9445 - http://www.openwall.com/lists/oss-security/2016/11/18/13 -CVE-2016-9445 - https://bugzilla.gnome.org/show_bug.cgi?id=774533 -CVE-2016-9445 - https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe -CVE-2016-9445 - https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html -CVE-2016-9446 - http://www.openwall.com/lists/oss-security/2016/11/18/12 -CVE-2016-9446 - http://www.openwall.com/lists/oss-security/2016/11/18/13 -CVE-2016-9446 - https://bugzilla.gnome.org/show_bug.cgi?id=774533 -CVE-2016-9446 - https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe -CVE-2016-9446 - https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html -CVE-2016-9447 - http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html -CVE-2016-9447 - http://www.openwall.com/lists/oss-security/2016/11/18/12 -CVE-2016-9447 - http://www.openwall.com/lists/oss-security/2016/11/18/13 -CVE-2016-9453 - http://bugzilla.maptools.org/show_bug.cgi?id=2579 -CVE-2016-9459 - https://hackerone.com/reports/146278 -CVE-2016-9460 - https://hackerone.com/reports/145463 -CVE-2016-9461 - https://hackerone.com/reports/145950 -CVE-2016-9462 - https://hackerone.com/reports/146067 -CVE-2016-9463 - https://github.com/nextcloud/apps/commit/decb91fd31f4ffab191cbf09ce4e5c55c67a4087 -CVE-2016-9463 - https://hackerone.com/reports/148151 -CVE-2016-9463 - https://rhinosecuritylabs.com/2016/10/operation-ownedcloud-exploitation-post-exploitation-persistence/ -CVE-2016-9464 - https://hackerone.com/reports/153905 -CVE-2016-9465 - https://hackerone.com/reports/163338 -CVE-2016-9466 - https://hackerone.com/reports/165686 -CVE-2016-9467 - https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d -CVE-2016-9467 - https://hackerone.com/reports/154827 -CVE-2016-9468 - https://hackerone.com/reports/149798 -CVE-2016-9469 - https://gitlab.com/gitlab-org/gitlab-ce/issues/25064 -CVE-2016-9469 - https://hackerone.com/reports/186194 -CVE-2016-9470 - https://www.revive-adserver.com/security/revive-sa-2016-002/ -CVE-2016-9471 - https://www.revive-adserver.com/security/revive-sa-2016-002/ -CVE-2016-9472 - https://hackerone.com/reports/170156 -CVE-2016-9472 - https://www.revive-adserver.com/security/revive-sa-2016-002/ -CVE-2016-9473 - https://cxsecurity.com/issue/WLB-2017010042 -CVE-2016-9473 - https://hackerone.com/reports/175958 -CVE-2016-9480 - https://www.prevanders.net/dwarfbug.html -CVE-2016-9485 - https://www.kb.cert.org/vuls/id/768331 -CVE-2016-9486 - https://www.kb.cert.org/vuls/id/768331 -CVE-2016-9488 - http://packetstormsecurity.com/files/158554/ManageEngine-Applications-Manager-13-SQL-Injection.html -CVE-2016-9488 - http://seclists.org/fulldisclosure/2017/Apr/9 -CVE-2016-9488 - https://packetstormsecurity.com/files/142022/ManageEngine-Applications-Manager-12-13-XSS-SQL-Injection-Code-Execution.html -CVE-2016-9489 - http://seclists.org/fulldisclosure/2017/Apr/9 -CVE-2016-9490 - http://seclists.org/fulldisclosure/2017/Apr/9 -CVE-2016-9490 - https://packetstormsecurity.com/files/142022/ManageEngine-Applications-Manager-12-13-XSS-SQL-Injection-Code-Execution.html -CVE-2016-9491 - http://seclists.org/fulldisclosure/2017/Apr/9 -CVE-2016-9494 - https://www.kb.cert.org/vuls/id/614751 -CVE-2016-9495 - https://www.kb.cert.org/vuls/id/614751 -CVE-2016-9496 - https://www.kb.cert.org/vuls/id/614751 -CVE-2016-9497 - https://www.kb.cert.org/vuls/id/614751 -CVE-2016-9498 - http://seclists.org/fulldisclosure/2017/Apr/9 -CVE-2016-9499 - https://www.kb.cert.org/vuls/id/745607 -CVE-2016-9500 - https://www.kb.cert.org/vuls/id/745607 -CVE-2016-9555 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8 -CVE-2016-9556 - http://www.openwall.com/lists/oss-security/2016/12/01/4 -CVE-2016-9556 - https://blogs.gentoo.org/ago/2016/11/19/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h -CVE-2016-9557 - https://blogs.gentoo.org/ago/2016/11/19/jasper-signed-integer-overflow-in-jas_image-c -CVE-2016-9558 - http://www.openwall.com/lists/oss-security/2016/11/19/6 -CVE-2016-9558 - https://blogs.gentoo.org/ago/2016/11/19/libdwarf-negation-overflow-in-dwarf_leb-c/ -CVE-2016-9558 - https://www.prevanders.net/dwarfbug.html -CVE-2016-9559 - http://www.openwall.com/lists/oss-security/2016/11/19/7 -CVE-2016-9559 - https://blogs.gentoo.org/ago/2016/11/19/imagemagick-null-pointer-must-never-be-null-tiff-c/ -CVE-2016-9559 - https://github.com/ImageMagick/ImageMagick/issues/298 -CVE-2016-9560 - http://www.openwall.com/lists/oss-security/2016/11/20/1 -CVE-2016-9560 - https://blogs.gentoo.org/ago/2016/11/20/jasper-stack-based-buffer-overflow-in-jpc_tsfb_getbands2-jpc_tsfb-c/ -CVE-2016-9560 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-9560 -CVE-2016-9562 - https://erpscan.io/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/ -CVE-2016-9563 - https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/ -CVE-2016-9565 - http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html -CVE-2016-9565 - http://seclists.org/fulldisclosure/2016/Dec/57 -CVE-2016-9565 - https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html -CVE-2016-9565 - https://www.exploit-db.com/exploits/40920/ -CVE-2016-9566 - http://seclists.org/fulldisclosure/2016/Dec/58 -CVE-2016-9566 - https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html -CVE-2016-9566 - https://www.exploit-db.com/exploits/40921/ -CVE-2016-9568 - https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ -CVE-2016-9569 - https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ -CVE-2016-9570 - https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ -CVE-2016-9572 - https://github.com/uclouvain/openjpeg/issues/863 -CVE-2016-9573 - https://github.com/uclouvain/openjpeg/issues/862 -CVE-2016-9580 - https://github.com/uclouvain/openjpeg/issues/871 -CVE-2016-9581 - https://github.com/uclouvain/openjpeg/issues/872 -CVE-2016-9583 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2016-9586 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-9587 - https://www.exploit-db.com/exploits/41013/ -CVE-2016-9588 - https://usn.ubuntu.com/3822-1/ -CVE-2016-9601 - https://bugs.ghostscript.com/show_bug.cgi?id=697457 -CVE-2016-9604 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f -CVE-2016-9634 - https://bugzilla.gnome.org/show_bug.cgi?id=774834 -CVE-2016-9634 - https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html -CVE-2016-9635 - https://bugzilla.gnome.org/show_bug.cgi?id=774834 -CVE-2016-9635 - https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html -CVE-2016-9636 - https://bugzilla.gnome.org/show_bug.cgi?id=774834 -CVE-2016-9636 - https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html -CVE-2016-9644 - http://www.ubuntu.com/usn/USN-3146-1 -CVE-2016-9650 - http://www.securityfocus.com/bid/94633 -CVE-2016-9651 - http://www.securityfocus.com/bid/94633 -CVE-2016-9651 - https://www.exploit-db.com/exploits/42175/ -CVE-2016-9652 - http://www.securityfocus.com/bid/94633 -CVE-2016-9682 - https://www.exploit-db.com/exploits/42342/ -CVE-2016-9722 - https://www.exploit-db.com/exploits/45005/ -CVE-2016-9726 - http://www.ibm.com/support/docview.wss?uid=swg21999542 -CVE-2016-9727 - http://www.ibm.com/support/docview.wss?uid=swg21999542 -CVE-2016-9756 - https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c -CVE-2016-9773 - http://www.openwall.com/lists/oss-security/2016/12/01/4 -CVE-2016-9773 - https://blogs.gentoo.org/ago/2016/12/01/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h-incomplete-fix-for-cve-2016-9556/ -CVE-2016-9774 - http://www.ubuntu.com/usn/USN-3177-1 -CVE-2016-9775 - http://www.ubuntu.com/usn/USN-3177-1 -CVE-2016-9775 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2016-9793 - https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793 -CVE-2016-9796 - http://blog.malerisch.net/2016/12/alcatel-omnivista-8770-unauth-rce-giop-corba.html -CVE-2016-9796 - https://github.com/malerisch/omnivista-8770-unauth-rce -CVE-2016-9796 - https://www.exploit-db.com/exploits/40862/ -CVE-2016-9797 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9798 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9799 - https://www.spinics.net/lists/linux-bluetooth/msg68898.html -CVE-2016-9800 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9801 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9802 - https://www.spinics.net/lists/linux-bluetooth/msg68898.html -CVE-2016-9803 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9804 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9807 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9807 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9807 - https://bugzilla.gnome.org/show_bug.cgi?id=774859 -CVE-2016-9808 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9808 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9808 - https://scarybeastsecurity.blogspot.com/2016/11/0day-poc-incorrect-fix-for-gstreamer.html -CVE-2016-9809 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9809 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9809 - https://bugzilla.gnome.org/show_bug.cgi?id=774896 -CVE-2016-9810 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9810 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9810 - https://bugzilla.gnome.org/show_bug.cgi?id=774897 -CVE-2016-9811 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9811 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9811 - https://bugzilla.gnome.org/show_bug.cgi?id=774902 -CVE-2016-9812 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9812 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9812 - https://bugzilla.gnome.org/show_bug.cgi?id=775048 -CVE-2016-9813 - http://www.openwall.com/lists/oss-security/2016/12/01/2 -CVE-2016-9813 - http://www.openwall.com/lists/oss-security/2016/12/05/8 -CVE-2016-9813 - https://bugzilla.gnome.org/show_bug.cgi?id=775120 -CVE-2016-9813 - https://www.exploit-db.com/exploits/42162/ -CVE-2016-9819 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9820 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9821 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9822 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9823 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9824 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9825 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9826 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -CVE-2016-9827 - http://www.openwall.com/lists/oss-security/2016/12/01/7 -CVE-2016-9827 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c/ -CVE-2016-9828 - http://www.openwall.com/lists/oss-security/2016/12/01/8 -CVE-2016-9828 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-null-pointer-dereference-in-dumpbuffer-read-c/ -CVE-2016-9829 - http://www.openwall.com/lists/oss-security/2016/12/01/5 -CVE-2016-9829 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_definefont-parser-c/ -CVE-2016-9830 - https://blogs.gentoo.org/ago/2016/12/01/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c -CVE-2016-9831 - http://www.openwall.com/lists/oss-security/2016/12/01/6 -CVE-2016-9831 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_rgba-parser-c/ -CVE-2016-9832 - http://packetstormsecurity.com/files/140062/PwC-ACE-Software-For-SAP-Security-8.10.304-ABAP-Injection.html -CVE-2016-9834 - http://seclists.org/bugtraq/2017/Jun/4 -CVE-2016-9835 - https://github.com/zikula/core/issues/3237 -CVE-2016-9836 - https://github.com/XiphosResearch/exploits/tree/master/Joomraa -CVE-2016-9838 - https://www.exploit-db.com/exploits/41157/ -CVE-2016-9840 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-9840 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-9840 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-9841 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-9841 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-9841 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-9841 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-9842 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-9842 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-9842 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-9843 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-9843 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2016-9843 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2016-9843 - https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 -CVE-2016-9843 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2016-9844 - https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 -CVE-2016-9847 - https://www.phpmyadmin.net/security/PMASA-2016-58 -CVE-2016-9878 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2016-9878 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2016-9888 - https://github.com/GNOME/libgsf/commit/95a8351a75758cf10b3bf6abae0b6b461f90d9e5 -CVE-2016-9892 - http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html -CVE-2016-9892 - http://seclists.org/fulldisclosure/2017/Feb/68 -CVE-2016-9899 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317409 -CVE-2016-9899 - https://www.exploit-db.com/exploits/41042/ -CVE-2016-9900 - https://bugzilla.mozilla.org/show_bug.cgi?id=1319122 -CVE-2016-9901 - https://bugzilla.mozilla.org/show_bug.cgi?id=1320057 -CVE-2016-9902 - https://bugzilla.mozilla.org/show_bug.cgi?id=1320039 -CVE-2016-9903 - https://bugzilla.mozilla.org/show_bug.cgi?id=1315435 -CVE-2016-9917 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html -CVE-2016-9918 - https://www.spinics.net/lists/linux-bluetooth/msg68898.html -CVE-2016-9920 - https://blog.ripstech.com/2016/roundcube-command-execution-via-email/ -CVE-2016-9933 - https://bugs.php.net/bug.php?id=72696 -CVE-2016-9933 - https://github.com/libgd/libgd/issues/215 -CVE-2016-9934 - https://bugs.php.net/bug.php?id=73331 -CVE-2016-9936 - https://bugs.php.net/bug.php?id=72978 -CVE-2016-9941 - https://github.com/LibVNC/libvncserver/pull/137 -CVE-2016-9942 - https://github.com/LibVNC/libvncserver/pull/137 -CVE-2016-9949 - https://bugs.launchpad.net/apport/+bug/1648806 -CVE-2016-9949 - https://github.com/DonnchaC/ubuntu-apport-exploitation -CVE-2016-9949 - https://www.exploit-db.com/exploits/40937/ -CVE-2016-9950 - https://bugs.launchpad.net/apport/+bug/1648806 -CVE-2016-9950 - https://github.com/DonnchaC/ubuntu-apport-exploitation -CVE-2016-9950 - https://www.exploit-db.com/exploits/40937/ -CVE-2016-9951 - https://bugs.launchpad.net/apport/+bug/1648806 -CVE-2016-9951 - https://github.com/DonnchaC/ubuntu-apport-exploitation -CVE-2016-9951 - https://www.exploit-db.com/exploits/40937/ -CVE-2016-9957 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html -CVE-2016-9958 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html -CVE-2016-9959 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html -CVE-2016-9960 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html -CVE-2016-9961 - https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html -CVE-2017-0003 - http://fortiguard.com/advisory/FG-VD-16-079 -CVE-2017-0022 - https://0patch.blogspot.com/2017/09/exploit-kit-rendezvous-and-cve-2017-0022.html -CVE-2017-0037 - https://0patch.blogspot.si/2017/03/0patching-another-0-day-internet.html -CVE-2017-0037 - https://www.exploit-db.com/exploits/41454/ -CVE-2017-0037 - https://www.exploit-db.com/exploits/42354/ -CVE-2017-0037 - https://www.exploit-db.com/exploits/43125/ -CVE-2017-0038 - https://0patch.blogspot.com/2017/02/0patching-0-day-windows-gdi32dll-memory.html -CVE-2017-0038 - https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS -CVE-2017-0038 - https://www.exploit-db.com/exploits/41363/ -CVE-2017-0045 - http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt -CVE-2017-0045 - https://www.exploit-db.com/exploits/41619/ -CVE-2017-0058 - https://www.exploit-db.com/exploits/41879/ -CVE-2017-0059 - https://www.exploit-db.com/exploits/41661/ -CVE-2017-0059 - https://www.exploit-db.com/exploits/42354/ -CVE-2017-0059 - https://www.exploit-db.com/exploits/43125/ -CVE-2017-0060 - https://www.exploit-db.com/exploits/41656/ -CVE-2017-0061 - https://www.exploit-db.com/exploits/41657/ -CVE-2017-0062 - https://www.exploit-db.com/exploits/41658/ -CVE-2017-0063 - https://www.exploit-db.com/exploits/41659/ -CVE-2017-0070 - https://www.exploit-db.com/exploits/41623/ -CVE-2017-0072 - https://www.exploit-db.com/exploits/41654/ -CVE-2017-0083 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0084 - https://www.exploit-db.com/exploits/41648/ -CVE-2017-0085 - https://www.exploit-db.com/exploits/41646/ -CVE-2017-0086 - https://www.exploit-db.com/exploits/41649/ -CVE-2017-0087 - https://www.exploit-db.com/exploits/41650/ -CVE-2017-0088 - https://www.exploit-db.com/exploits/41651/ -CVE-2017-0089 - https://www.exploit-db.com/exploits/41652/ -CVE-2017-0090 - https://www.exploit-db.com/exploits/41653/ -CVE-2017-0091 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0092 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0100 - http://blog.inspired-sec.com/archive/2017/03/17/COM-Moniker-Privesc.html -CVE-2017-0100 - https://www.exploit-db.com/exploits/41607/ -CVE-2017-0101 - https://www.exploit-db.com/exploits/44479/ -CVE-2017-0103 - https://www.exploit-db.com/exploits/41645/ -CVE-2017-0108 - https://www.exploit-db.com/exploits/41647/ -CVE-2017-0111 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0112 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0113 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0114 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0115 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0116 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0117 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0118 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0119 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0120 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0121 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0122 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0123 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0124 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0125 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0126 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0127 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0128 - https://www.exploit-db.com/exploits/41655/ -CVE-2017-0135 - https://www.freebuf.com/articles/web/164871.html -CVE-2017-0141 - http://packetstormsecurity.com/files/172826/Microsoft-ChakaCore-Remote-Code-Execution.html -CVE-2017-0143 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -CVE-2017-0143 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -CVE-2017-0143 - https://www.exploit-db.com/exploits/41891/ -CVE-2017-0143 - https://www.exploit-db.com/exploits/41987/ -CVE-2017-0143 - https://www.exploit-db.com/exploits/43970/ -CVE-2017-0144 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -CVE-2017-0144 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -CVE-2017-0144 - https://www.exploit-db.com/exploits/41891/ -CVE-2017-0144 - https://www.exploit-db.com/exploits/41987/ -CVE-2017-0144 - https://www.exploit-db.com/exploits/42030/ -CVE-2017-0144 - https://www.exploit-db.com/exploits/42031/ -CVE-2017-0145 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -CVE-2017-0145 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -CVE-2017-0145 - https://www.exploit-db.com/exploits/41891/ -CVE-2017-0145 - https://www.exploit-db.com/exploits/41987/ -CVE-2017-0146 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -CVE-2017-0146 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -CVE-2017-0146 - https://www.exploit-db.com/exploits/41891/ -CVE-2017-0146 - https://www.exploit-db.com/exploits/41987/ -CVE-2017-0146 - https://www.exploit-db.com/exploits/43970/ -CVE-2017-0147 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -CVE-2017-0147 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -CVE-2017-0147 - https://www.exploit-db.com/exploits/41891/ -CVE-2017-0147 - https://www.exploit-db.com/exploits/41987/ -CVE-2017-0147 - https://www.exploit-db.com/exploits/43970/ -CVE-2017-0148 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -CVE-2017-0148 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -CVE-2017-0148 - https://www.exploit-db.com/exploits/41891/ -CVE-2017-0148 - https://www.exploit-db.com/exploits/41987/ -CVE-2017-0160 - https://www.exploit-db.com/exploits/41903/ -CVE-2017-0165 - https://www.exploit-db.com/exploits/41901/ -CVE-2017-0167 - https://www.exploit-db.com/exploits/41880/ -CVE-2017-0175 - https://www.exploit-db.com/exploits/42009/ -CVE-2017-0199 - http://rewtin.blogspot.nl/2017/04/cve-2017-0199-practical-exploitation-poc.html -CVE-2017-0199 - https://www.exploit-db.com/exploits/41894/ -CVE-2017-0199 - https://www.exploit-db.com/exploits/41934/ -CVE-2017-0199 - https://www.exploit-db.com/exploits/42995/ -CVE-2017-0202 - https://www.exploit-db.com/exploits/41941/ -CVE-2017-0211 - https://www.exploit-db.com/exploits/41902/ -CVE-2017-0213 - https://www.exploit-db.com/exploits/42020/ -CVE-2017-0214 - https://www.exploit-db.com/exploits/42021/ -CVE-2017-0220 - https://www.exploit-db.com/exploits/42009/ -CVE-2017-0245 - https://www.exploit-db.com/exploits/42008/ -CVE-2017-0258 - https://www.exploit-db.com/exploits/42006/ -CVE-2017-0259 - https://www.exploit-db.com/exploits/42007/ -CVE-2017-0263 - https://www.exploit-db.com/exploits/44478/ -CVE-2017-0263 - https://xiaodaozhi.com/exploit/117.html -CVE-2017-0282 - https://www.exploit-db.com/exploits/42237/ -CVE-2017-0283 - https://0patch.blogspot.com/2017/07/0patching-quick-brown-fox-of-cve-2017.html -CVE-2017-0283 - https://www.exploit-db.com/exploits/42234/ -CVE-2017-0284 - https://www.exploit-db.com/exploits/42235/ -CVE-2017-0285 - https://www.exploit-db.com/exploits/42236/ -CVE-2017-0286 - https://www.exploit-db.com/exploits/42238/ -CVE-2017-0287 - https://www.exploit-db.com/exploits/42239/ -CVE-2017-0288 - https://www.exploit-db.com/exploits/42241/ -CVE-2017-0289 - https://www.exploit-db.com/exploits/42240/ -CVE-2017-0290 - https://0patch.blogspot.si/2017/05/0patching-worst-windows-remote-code.html -CVE-2017-0290 - https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/ -CVE-2017-0290 - https://www.exploit-db.com/exploits/41975/ -CVE-2017-0299 - https://www.exploit-db.com/exploits/42219/ -CVE-2017-0300 - https://www.exploit-db.com/exploits/42244/ -CVE-2017-0308 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0309 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0310 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0311 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0312 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0312 - https://www.exploit-db.com/exploits/41364/ -CVE-2017-0313 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0313 - https://www.exploit-db.com/exploits/41365/ -CVE-2017-0314 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0315 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0317 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0318 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0319 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0320 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0321 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0322 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0323 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0324 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 -CVE-2017-0341 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0342 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0343 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0344 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0345 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0346 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0347 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0348 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0349 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0350 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0351 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0352 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0353 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0354 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0355 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 -CVE-2017-0358 - http://www.openwall.com/lists/oss-security/2017/02/04/1 -CVE-2017-0358 - https://www.exploit-db.com/exploits/41240/ -CVE-2017-0358 - https://www.exploit-db.com/exploits/41356/ -CVE-2017-0366 - https://phabricator.wikimedia.org/T151735 -CVE-2017-0379 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-0379 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-0384 - https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe -CVE-2017-0390 - https://android.googlesource.com/platform/external/tremolo/+/5dc99237d49e73c27d3eca54f6ccd97d13f94de0 -CVE-2017-0399 - https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac -CVE-2017-0400 - https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac -CVE-2017-0401 - https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe -CVE-2017-0402 - https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac -CVE-2017-0402 - https://android.googlesource.com/platform/hardware/qcom/audio/+/d72ea85c78a1a68bf99fd5804ad9784b4102fe57 -CVE-2017-0411 - https://www.exploit-db.com/exploits/41354/ -CVE-2017-0412 - https://www.exploit-db.com/exploits/41355/ -CVE-2017-0425 - http://www.securityfocus.com/bid/96106 -CVE-2017-0478 - https://github.com/JiounDai/CVE-2017-0478 -CVE-2017-0510 - https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/ -CVE-2017-0541 - https://github.com/JiounDai/CVE-2017-0541 -CVE-2017-0551 - https://android.googlesource.com/platform/external/libavc/+/8b5fd8f24eba5dd19ab2f80ea11a9125aa882ae2 -CVE-2017-0561 - https://www.exploit-db.com/exploits/41805/ -CVE-2017-0561 - https://www.exploit-db.com/exploits/41806/ -CVE-2017-0563 - http://seclists.org/fulldisclosure/2017/May/19 -CVE-2017-0563 - https://alephsecurity.com/vulns/aleph-2017009 -CVE-2017-0569 - https://www.exploit-db.com/exploits/41808/ -CVE-2017-0576 - https://github.com/derrekr/android_security/commit/0dd1a733e60cf5239c0a185d4219ba2ef1118a8b -CVE-2017-0594 - https://android.googlesource.com/platform/frameworks/av/+/594bf934384920618d2b6ce0bcda1f60144cb3eb -CVE-2017-0595 - https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1 -CVE-2017-0596 - https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1 -CVE-2017-0600 - https://android.googlesource.com/platform/frameworks/av/+/961e5ac5788b52304e64b9a509781beaf5201fb0 -CVE-2017-0635 - https://android.googlesource.com/platform/frameworks/av/+/523f6b49c1a2289161f40cf9fe80b92e592e9441 -CVE-2017-0750 - https://usn.ubuntu.com/3583-2/ -CVE-2017-0781 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-0781 - https://www.exploit-db.com/exploits/44415/ -CVE-2017-0782 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-0783 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-0785 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-0785 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-0810 - https://android.googlesource.com/platform/external/libmpeg2/+/7737780815fe523ad7b0e49456eb75d27a30818a -CVE-2017-0811 - https://android.googlesource.com/platform/external/libhevc/+/25c0ffbe6a181b4a373c3c9b421ea449d457e6ed -CVE-2017-0812 - https://android.googlesource.com/device/google/dragon/+/7df7ec13b1d222ac3a66797fbe432605ea8f973f -CVE-2017-0814 - https://android.googlesource.com/platform/external/tremolo/+/eeb4e45d5683f88488c083ecf142dc89bc3f0b47 -CVE-2017-0817 - https://android.googlesource.com/platform/frameworks/av/+/d834160d9759f1098df692b34e6eeb548f9e317b -CVE-2017-0818 - https://android.googlesource.com/platform/frameworks/av/+/d07f5c14e811951ff9b411ceb84e7288e0d04aaf -CVE-2017-0819 - https://android.googlesource.com/platform/external/libhevc/+/87fb7909c49e6a4510ba86ace1ffc83459c7e1b9 -CVE-2017-0820 - https://android.googlesource.com/platform/frameworks/av/+/8a3a2f6ea7defe1a81bb32b3c9f3537f84749b9d -CVE-2017-0861 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229 -CVE-2017-0861 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-0861 - https://usn.ubuntu.com/3583-2/ -CVE-2017-0861 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-0883 - https://hackerone.com/reports/169680 -CVE-2017-0884 - https://hackerone.com/reports/169680 -CVE-2017-0885 - https://hackerone.com/reports/174524 -CVE-2017-0886 - https://hackerone.com/reports/174524 -CVE-2017-0887 - https://hackerone.com/reports/173622 -CVE-2017-0888 - https://hackerone.com/reports/179073 -CVE-2017-0889 - https://hackerone.com/reports/713 -CVE-2017-0890 - https://hackerone.com/reports/213227 -CVE-2017-0891 - https://hackerone.com/reports/216812 -CVE-2017-0892 - https://hackerone.com/reports/191979 -CVE-2017-0893 - https://hackerone.com/reports/222838 -CVE-2017-0894 - https://hackerone.com/reports/218876 -CVE-2017-0895 - https://hackerone.com/reports/203594 -CVE-2017-0898 - https://hackerone.com/reports/212241 -CVE-2017-0899 - https://hackerone.com/reports/226335 -CVE-2017-0900 - https://hackerone.com/reports/243003 -CVE-2017-0901 - https://hackerone.com/reports/243156 -CVE-2017-0901 - https://www.exploit-db.com/exploits/42611/ -CVE-2017-0902 - https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32 -CVE-2017-0902 - https://hackerone.com/reports/218088 -CVE-2017-0903 - https://hackerone.com/reports/274990 -CVE-2017-0904 - https://edoverflow.com/2017/ruby-resolv-bug/ -CVE-2017-0904 - https://github.com/jtdowney/private_address_check/issues/1 -CVE-2017-0904 - https://hackerone.com/reports/287245 -CVE-2017-0909 - https://hackerone.com/reports/288950 -CVE-2017-0913 - https://hackerone.com/reports/301406 -CVE-2017-0914 - https://hackerone.com/reports/298176 -CVE-2017-0915 - https://hackerone.com/reports/298873 -CVE-2017-0916 - https://hackerone.com/reports/299473 -CVE-2017-0918 - https://hackerone.com/reports/301432 -CVE-2017-0919 - https://hackerone.com/reports/301137 -CVE-2017-0928 - https://hackerone.com/reports/308158 -CVE-2017-0930 - https://hackerone.com/reports/296282 -CVE-2017-0931 - https://github.com/guardian/html-janitor/issues/34 -CVE-2017-0931 - https://hackerone.com/reports/308155 -CVE-2017-0932 - https://hackerone.com/reports/239719 -CVE-2017-0933 - https://hackerone.com/reports/240098 -CVE-2017-0934 - https://hackerone.com/reports/241044 -CVE-2017-0935 - https://hackerone.com/reports/242407 -CVE-2017-0936 - https://hackerone.com/reports/297751 -CVE-2017-10000 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1000010 - https://packetstormsecurity.com/files/140365/Audacity-2.1.2-DLL-Hijacking.html -CVE-2017-1000027 - https://cp270.wordpress.com/2017/02/02/security-advisory-open-url-redirect-in-sme-server/ -CVE-2017-1000028 - https://www.exploit-db.com/exploits/45196/ -CVE-2017-1000028 - https://www.exploit-db.com/exploits/45198/ -CVE-2017-1000028 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904 -CVE-2017-1000029 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037 -CVE-2017-1000030 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037 -CVE-2017-1000033 - https://cjc.im/advisories/0007/ -CVE-2017-1000033 - https://wpvulndb.com/vulnerabilities/8862 -CVE-2017-1000034 - http://doc.akka.io/docs/akka/2.4/security/2017-02-10-java-serialization.html -CVE-2017-1000037 - https://github.com/justinsteven/advisories/blob/master/2017_rvm_cd_command_execution.md -CVE-2017-1000038 - https://security.dxw.com/advisories/stored-xss-in-relevanssi-could-allow-an-unauthenticated-attacker-to-do-almost-anything-an-admin-can-do/ -CVE-2017-1000042 - https://hackerone.com/reports/54327 -CVE-2017-1000043 - https://hackerone.com/reports/99245 -CVE-2017-1000047 - https://github.com/justinsteven/advisories/blob/master/2017_rbenv_ruby_version_directory_traversal.md -CVE-2017-1000060 - https://rioru.github.io/pentest/web/2017/03/28/from-unauthenticated-to-root-supervision.html -CVE-2017-1000061 - https://github.com/lsh123/xmlsec/issues/43 -CVE-2017-1000061 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2017-1000062 - https://elixirforum.com/t/kitto-a-framework-for-interactive-dashboards/2089/13 -CVE-2017-1000063 - https://elixirforum.com/t/kitto-a-framework-for-interactive-dashboards/2089/13 -CVE-2017-1000064 - https://elixirforum.com/t/kitto-a-framework-for-interactive-dashboards/2089/13 -CVE-2017-1000072 - https://github.com/marcobambini/gravity/issues/123 -CVE-2017-1000075 - https://github.com/marcobambini/gravity/issues/133 -CVE-2017-1000083 - http://seclists.org/oss-sec/2017/q3/128 -CVE-2017-1000083 - https://bugzilla.gnome.org/show_bug.cgi?id=784630 -CVE-2017-1000083 - https://www.exploit-db.com/exploits/45824/ -CVE-2017-1000083 - https://www.exploit-db.com/exploits/46341/ -CVE-2017-10001 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1000112 - https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 -CVE-2017-1000112 - https://hackerone.com/reports/684573 -CVE-2017-1000112 - https://www.exploit-db.com/exploits/45147/ -CVE-2017-1000116 - https://hackerone.com/reports/260005 -CVE-2017-1000117 - https://hackerone.com/reports/260005 -CVE-2017-1000117 - https://www.exploit-db.com/exploits/42599/ -CVE-2017-1000119 - http://packetstormsecurity.com/files/154390/October-CMS-Upload-Protection-Bypass-Code-Execution.html -CVE-2017-1000120 - http://tech.mantz-it.com/2016/12/sql-injection-in-frappe-framework.html -CVE-2017-1000126 - http://www.openwall.com/lists/oss-security/2017/06/30/1 -CVE-2017-1000127 - http://www.openwall.com/lists/oss-security/2017/06/30/1 -CVE-2017-1000128 - http://www.openwall.com/lists/oss-security/2017/06/30/1 -CVE-2017-1000136 - https://bugs.launchpad.net/mahara/+bug/1363873 -CVE-2017-1000140 - https://bugs.launchpad.net/mahara/+bug/1404117 -CVE-2017-1000147 - https://bugs.launchpad.net/mahara/+bug/1480329 -CVE-2017-1000158 - https://bugs.python.org/issue30657 -CVE-2017-1000163 - https://elixirforum.com/t/security-releases-for-phoenix/4143 -CVE-2017-1000170 - http://packetstormsecurity.com/files/161900/WordPress-Delightful-Downloads-Jquery-File-Tree-1.6.6-Path-Traversal.html -CVE-2017-1000170 - https://github.com/jqueryfiletree/jqueryfiletree/issues/66 -CVE-2017-1000172 - https://github.com/marcobambini/gravity/issues/144 -CVE-2017-1000173 - https://github.com/marcobambini/gravity/issues/172 -CVE-2017-1000174 - https://github.com/matthiaskramm/swftools/issues/21 -CVE-2017-1000176 - https://github.com/matthiaskramm/swftools/issues/23 -CVE-2017-1000182 - https://github.com/matthiaskramm/swftools/issues/30 -CVE-2017-1000185 - https://github.com/matthiaskramm/swftools/issues/33 -CVE-2017-1000186 - https://github.com/matthiaskramm/swftools/issues/34 -CVE-2017-1000187 - https://github.com/matthiaskramm/swftools/issues/36 -CVE-2017-1000190 - https://github.com/ngallagher/simplexml/issues/18 -CVE-2017-10002 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1000212 - https://github.com/tonini/alchemist-server/issues/14 -CVE-2017-1000218 - https://github.com/hfiref0x/LightFTP/issues/5 -CVE-2017-1000221 - https://opencast.jira.com/browse/MH-11862 -CVE-2017-1000224 - https://security.dxw.com/advisories/csrf-in-youtube-plugin/ -CVE-2017-1000225 - https://security.dxw.com/advisories/reflected-xss-in-relevanssi-premium-when-using-relevanssi_didyoumean-could-allow-unauthenticated-attacker-to-do-almost-anything-an-admin-can/ -CVE-2017-1000226 - https://security.dxw.com/advisories/stop-user-enumeration-rest-api/ -CVE-2017-1000227 - https://security.dxw.com/advisories/stored-xss-salutation-theme/ -CVE-2017-1000227 - https://wpvulndb.com/vulnerabilities/9734 -CVE-2017-1000229 - https://sourceforge.net/p/optipng/bugs/65/ -CVE-2017-1000250 - https://www.kb.cert.org/vuls/id/240311 -CVE-2017-1000251 - https://www.exploit-db.com/exploits/42762/ -CVE-2017-1000251 - https://www.kb.cert.org/vuls/id/240311 -CVE-2017-1000253 - https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt -CVE-2017-1000257 - https://hackerone.com/reports/278231 -CVE-2017-10003 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1000353 - http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html -CVE-2017-1000353 - https://www.exploit-db.com/exploits/41965/ -CVE-2017-1000353 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2017-1000364 - https://www.exploit-db.com/exploits/45625/ -CVE-2017-1000364 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000365 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000366 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2017-1000366 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2017-1000366 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2017-1000366 - https://www.exploit-db.com/exploits/42274/ -CVE-2017-1000366 - https://www.exploit-db.com/exploits/42275/ -CVE-2017-1000366 - https://www.exploit-db.com/exploits/42276/ -CVE-2017-1000366 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000367 - http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html -CVE-2017-1000367 - http://seclists.org/fulldisclosure/2017/Jun/3 -CVE-2017-1000367 - https://www.exploit-db.com/exploits/42183/ -CVE-2017-1000369 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000370 - https://www.exploit-db.com/exploits/42273/ -CVE-2017-1000370 - https://www.exploit-db.com/exploits/42274/ -CVE-2017-1000370 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000371 - https://www.exploit-db.com/exploits/42273/ -CVE-2017-1000371 - https://www.exploit-db.com/exploits/42276/ -CVE-2017-1000371 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000372 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000373 - https://www.exploit-db.com/exploits/42271/ -CVE-2017-1000373 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000374 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000375 - https://www.exploit-db.com/exploits/42272/ -CVE-2017-1000375 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000376 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2017-1000376 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000377 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000378 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000379 - https://www.exploit-db.com/exploits/42275/ -CVE-2017-1000379 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1000380 - http://www.openwall.com/lists/oss-security/2017/06/12/2 -CVE-2017-1000385 - https://robotattack.org/ -CVE-2017-1000385 - https://www.kb.cert.org/vuls/id/144389 -CVE-2017-10004 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1000405 - https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0 -CVE-2017-1000405 - https://www.exploit-db.com/exploits/43199/ -CVE-2017-1000407 - https://usn.ubuntu.com/3583-2/ -CVE-2017-1000408 - https://www.exploit-db.com/exploits/43331/ -CVE-2017-1000409 - https://www.exploit-db.com/exploits/43331/ -CVE-2017-1000410 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-1000415 - https://www.youtube.com/watch?v=FW--c_F_cY8 -CVE-2017-1000416 - https://www.youtube.com/watch?v=FW--c_F_cY8 -CVE-2017-1000417 - https://www.youtube.com/watch?v=FW--c_F_cY8 -CVE-2017-1000418 - https://github.com/Mindwerks/wildmidi/issues/178 -CVE-2017-1000422 - https://bugzilla.gnome.org/show_bug.cgi?id=785973 -CVE-2017-1000432 - https://www.exploit-db.com/exploits/43462/ -CVE-2017-1000434 - https://cjc.im/advisories/0008/ -CVE-2017-1000434 - https://wpvulndb.com/vulnerabilities/8992 -CVE-2017-1000437 - https://github.com/marcobambini/gravity/issues/186 -CVE-2017-1000448 - https://github.com/structured-data/linter/issues/41 -CVE-2017-1000450 - https://github.com/opencv/opencv/issues/9723 -CVE-2017-1000452 - https://www.whitehats.nl/blog/xml-signature-wrapping-samlify -CVE-2017-1000458 - https://bro-tracker.atlassian.net/browse/BIT-1856 -CVE-2017-1000466 - https://github.com/invoiceninja/invoiceninja/issues/1727 -CVE-2017-1000474 - https://www.exploit-db.com/exploits/44318/ -CVE-2017-1000475 - https://www.exploit-db.com/exploits/48044 -CVE-2017-1000477 - https://github.com/pravednik/xmlBundle -CVE-2017-1000477 - https://github.com/pravednik/xmlBundle/issues/2 -CVE-2017-1000486 - https://github.com/primefaces/primefaces/issues/1152 -CVE-2017-1000486 - https://www.exploit-db.com/exploits/43733/ -CVE-2017-1000491 - https://github.com/rhysd/Shiba/commit/e8a65b0f81eb04903eedd29500d7e1bedf249eab -CVE-2017-1000491 - https://github.com/rhysd/Shiba/issues/42 -CVE-2017-1000499 - http://cyberworldmirror.com/vulnerability-phpmyadmin-lets-attacker-perform-drop-table-single-click/ -CVE-2017-1000499 - https://www.exploit-db.com/exploits/45284/ -CVE-2017-10005 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10006 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1000600 - https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ -CVE-2017-1000600 - https://youtu.be/GePBmsNJw6Y?t=1763 -CVE-2017-10007 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10008 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10009 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10010 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1001000 - https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab -CVE-2017-1001002 - https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170 -CVE-2017-1001003 - https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170 -CVE-2017-10011 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10012 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10013 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10015 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10016 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10017 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10018 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10019 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10020 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-1002000 - https://www.exploit-db.com/exploits/41540/ -CVE-2017-1002001 - https://www.exploit-db.com/exploits/41540/ -CVE-2017-1002002 - https://www.exploit-db.com/exploits/41540/ -CVE-2017-1002003 - https://www.exploit-db.com/exploits/41540/ -CVE-2017-1002008 - https://wpvulndb.com/vulnerabilities/8777 -CVE-2017-1002008 - https://www.exploit-db.com/exploits/41622/ -CVE-2017-1002020 - https://wpvulndb.com/vulnerabilities/8833 -CVE-2017-1002021 - https://wpvulndb.com/vulnerabilities/8833 -CVE-2017-1002022 - https://wpvulndb.com/vulnerabilities/8833 -CVE-2017-1002027 - https://wpvulndb.com/vulnerabilities/8889 -CVE-2017-1002028 - https://wpvulndb.com/vulnerabilities/8888 -CVE-2017-10021 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10022 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10023 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10024 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10025 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10026 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10027 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10028 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10029 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10030 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10031 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10032 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10033 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10033 - https://www.exploit-db.com/exploits/44757/ -CVE-2017-10034 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10035 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10036 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10037 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10038 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10039 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10040 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10041 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10042 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10043 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10044 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10045 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10046 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10046 - https://www.exploit-db.com/exploits/44141/ -CVE-2017-10047 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10048 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10049 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10050 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10051 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10052 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10053 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10053 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10054 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10055 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10056 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10057 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10058 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10059 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10060 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10061 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10062 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10063 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10064 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10065 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10066 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10067 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10068 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-10069 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10070 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10071 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10072 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10073 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10074 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10075 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10076 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10077 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10078 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10078 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10079 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10080 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10081 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10082 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10083 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10084 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10085 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10086 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10087 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10088 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10089 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10090 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10091 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10092 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10093 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10094 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10095 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10096 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10097 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10098 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10099 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10100 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10101 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10102 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10102 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10103 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10104 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10105 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10106 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10106 - https://erpscan.io/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/ -CVE-2017-10107 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10108 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10108 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10109 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10110 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10111 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10112 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10113 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10114 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10115 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10115 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10116 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10116 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10117 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10118 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10118 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10119 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10120 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10121 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10122 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10123 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10125 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10126 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10128 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10129 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10129 - https://www.exploit-db.com/exploits/42426/ -CVE-2017-10130 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10131 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10132 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10133 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10134 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10135 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10135 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10136 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10137 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10140 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-10141 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10142 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10143 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10144 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10145 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10146 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10147 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10147 - https://erpscan.io/advisories/erpscan-17-041-unauthorized-container-shutdown-servermigrationcoordinator/ -CVE-2017-10147 - https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10147 -CVE-2017-10148 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10148 - https://erpscan.io/advisories/erpscan-17-042-anonymous-log-injection-in-fscm/ -CVE-2017-10148 - https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10148 -CVE-2017-10149 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10150 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10152 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10153 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10154 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10155 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10156 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10157 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10158 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10159 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10160 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10161 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10162 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10163 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10164 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10165 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10166 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10168 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10169 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10170 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10171 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10172 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10173 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10174 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10175 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10176 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10176 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10177 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10178 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10179 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10180 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10181 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10182 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10183 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10184 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10185 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10186 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10187 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10188 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10189 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10190 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10191 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10192 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10193 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10194 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10195 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10196 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10198 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10198 - https://cert.vde.com/en-us/advisories/vde-2017-002 -CVE-2017-10199 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10200 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10201 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10202 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10203 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10204 - http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html -CVE-2017-10204 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10204 - https://www.exploit-db.com/exploits/42425/ -CVE-2017-10205 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10206 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10207 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10208 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10209 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10210 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10211 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10212 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10213 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10214 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10215 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10216 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10217 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10218 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10219 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10220 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10221 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10222 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10223 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10224 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10225 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10226 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10227 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10228 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10229 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10230 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10231 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10232 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10233 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10234 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10235 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10236 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10237 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10238 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10239 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10240 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10241 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10242 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10243 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10244 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10245 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10246 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10246 - https://www.exploit-db.com/exploits/42340/ -CVE-2017-10247 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10248 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10249 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10250 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10251 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10252 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10253 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10254 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10255 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10256 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10257 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10258 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-10259 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10260 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10261 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10262 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-10263 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10264 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10265 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10268 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10270 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10271 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10271 - https://www.exploit-db.com/exploits/43458/ -CVE-2017-10271 - https://www.exploit-db.com/exploits/43924/ -CVE-2017-10273 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-10273 - https://www.exploit-db.com/exploits/43848/ -CVE-2017-10274 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10276 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10277 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10279 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10280 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10281 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10282 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-10283 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10284 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10299 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10300 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10301 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-10302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10303 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10306 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10308 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10309 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10309 - https://www.exploit-db.com/exploits/43103/ -CVE-2017-10310 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10311 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10312 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10313 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10314 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10315 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10316 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10317 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10318 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10319 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10320 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10321 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10322 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10323 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10324 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10325 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10326 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10327 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10328 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10329 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10330 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10331 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10332 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10333 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10334 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10335 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10336 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10337 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10338 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10339 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10340 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10341 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10342 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10343 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10344 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10345 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10346 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10347 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10348 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10349 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10350 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10352 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-10352 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10353 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10354 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10355 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10356 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10357 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10358 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10359 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10360 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10361 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10362 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10363 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10364 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10365 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10366 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10366 - https://www.exploit-db.com/exploits/43594/ -CVE-2017-10367 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10368 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10369 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10370 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10372 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10373 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10375 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10378 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10379 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10380 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10381 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10382 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10383 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10384 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10385 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10386 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10387 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10388 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10389 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10391 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10392 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10393 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10394 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10395 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10396 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10397 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10398 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10399 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10400 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10401 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10402 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10403 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10404 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10405 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10406 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10407 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10408 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10409 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10410 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10411 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10412 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10413 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10414 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10415 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10416 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10417 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10418 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10419 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10420 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10421 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10422 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10423 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10424 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10425 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10426 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10427 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10428 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-10616 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qx9c-49m4-f3vj -CVE-2017-10617 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wjp8-8qf6-vqmc -CVE-2017-10661 - https://www.exploit-db.com/exploits/43345/ -CVE-2017-10665 - https://www.futureweb.at/security/CVE-2017-10665/ -CVE-2017-10668 - http://seclists.org/fulldisclosure/2017/Jun/44 -CVE-2017-10669 - http://seclists.org/fulldisclosure/2017/Jun/44 -CVE-2017-10670 - http://seclists.org/fulldisclosure/2017/Jun/44 -CVE-2017-10672 - https://hackerone.com/reports/259390 -CVE-2017-10672 - https://rt.cpan.org/Public/Bug/Display.html?id=122246 -CVE-2017-10678 - https://github.com/Piwigo/Piwigo/issues/721 -CVE-2017-10679 - https://github.com/Piwigo/Piwigo/issues/721 -CVE-2017-10680 - https://github.com/Piwigo/Piwigo/issues/721 -CVE-2017-10681 - https://github.com/Piwigo/Piwigo/issues/721 -CVE-2017-10682 - https://www.exploit-db.com/exploits/43337/ -CVE-2017-10684 - https://bugzilla.redhat.com/show_bug.cgi?id=1464687 -CVE-2017-10685 - https://bugzilla.redhat.com/show_bug.cgi?id=1464692 -CVE-2017-10686 - https://bugzilla.nasm.us/show_bug.cgi?id=3392414 -CVE-2017-10688 - http://bugzilla.maptools.org/show_bug.cgi?id=2712 -CVE-2017-10688 - https://www.exploit-db.com/exploits/42299/ -CVE-2017-10699 - https://trac.videolan.org/vlc/ticket/18467 -CVE-2017-10700 - https://www.qnap.com/en/support/con_show.php?cid=128 -CVE-2017-10708 - https://launchpad.net/bugs/1700573 -CVE-2017-10709 - https://www.reddit.com/r/netsec/comments/6kajkc/elephone_p9000_lock_screen_lockout_bypass_with/ -CVE-2017-10711 - https://www.seekurity.com/blog/general/reflected-xss-vulnerability-in-simplerisk/ -CVE-2017-10711 - https://www.youtube.com/watch?v=jOUKEYW0RQw -CVE-2017-10718 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10718 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10719 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10719 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10720 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10720 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10721 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10721 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10722 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10722 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10723 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10723 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10724 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -CVE-2017-10724 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf -CVE-2017-10784 - https://hackerone.com/reports/223363 -CVE-2017-10789 - https://github.com/perl5-dbi/DBD-mysql/issues/110 -CVE-2017-10790 - https://bugzilla.redhat.com/show_bug.cgi?id=1464141 -CVE-2017-10793 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ -CVE-2017-10795 - https://github.com/intelliants/subrion/issues/467 -CVE-2017-10801 - https://www.seekurity.com/blog/advisories/cross-sitescripting-vulnerability-in-phpsocial-aka-phpdolphin-social-network-script/ -CVE-2017-1082 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1083 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1084 - https://www.exploit-db.com/exploits/42277/ -CVE-2017-1084 - https://www.exploit-db.com/exploits/42278/ -CVE-2017-1084 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1085 - https://www.exploit-db.com/exploits/42279/ -CVE-2017-1085 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -CVE-2017-1092 - https://www.exploit-db.com/exploits/42091/ -CVE-2017-1092 - https://www.exploit-db.com/exploits/42541/ -CVE-2017-10928 - https://github.com/ImageMagick/ImageMagick/issues/539 -CVE-2017-10952 - https://0patch.blogspot.com/2017/08/0patching-foxit-readers-saveas-0day-cve.html -CVE-2017-10971 - https://bugzilla.suse.com/show_bug.cgi?id=1035283 -CVE-2017-10972 - https://bugzilla.suse.com/show_bug.cgi?id=1035283 -CVE-2017-10974 - http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt -CVE-2017-10974 - https://www.exploit-db.com/exploits/42303/ -CVE-2017-10976 - https://github.com/matthiaskramm/swftools/issues/28 -CVE-2017-10989 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-10991 - https://lorexxar.cn/2017/07/07/WordPress%20WP%20Statistics%20authenticated%20xss%20Vulnerability(WP%20Statistics%20-=12.0.9)/ -CVE-2017-10992 - https://labs.integrity.pt/advisories/cve-2017-10992/ -CVE-2017-11004 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-11011 - http://www.securityfocus.com/bid/103671 -CVE-2017-11088 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-11089 - https://usn.ubuntu.com/3620-1/ -CVE-2017-11096 - https://github.com/matthiaskramm/swftools/issues/25 -CVE-2017-11097 - https://github.com/matthiaskramm/swftools/issues/24 -CVE-2017-11098 - https://github.com/matthiaskramm/swftools/issues/32 -CVE-2017-11099 - https://github.com/matthiaskramm/swftools/issues/31 -CVE-2017-11100 - https://github.com/matthiaskramm/swftools/issues/27 -CVE-2017-11101 - https://github.com/matthiaskramm/swftools/issues/26 -CVE-2017-11105 - https://alephsecurity.com/vulns/aleph-2017026 -CVE-2017-11107 - https://bugs.launchpad.net/ubuntu/+source/phpldapadmin/+bug/1701731 -CVE-2017-11111 - https://bugzilla.nasm.us/show_bug.cgi?id=3392415 -CVE-2017-11112 - https://bugzilla.redhat.com/show_bug.cgi?id=1464686 -CVE-2017-11113 - https://bugzilla.redhat.com/show_bug.cgi?id=1464691 -CVE-2017-11114 - http://seclists.org/fulldisclosure/2017/Jul/76 -CVE-2017-11115 - http://seclists.org/fulldisclosure/2017/Jul/77 -CVE-2017-11116 - http://seclists.org/fulldisclosure/2017/Jul/77 -CVE-2017-11117 - http://seclists.org/fulldisclosure/2017/Jul/77 -CVE-2017-11118 - http://seclists.org/fulldisclosure/2017/Jul/77 -CVE-2017-11119 - http://seclists.org/fulldisclosure/2017/Jul/78 -CVE-2017-11120 - http://packetstormsecurity.com/files/144328/Broadcom-802.11k-Neighbor-Report-Response-Out-Of-Bounds-Write.html -CVE-2017-11120 - https://www.exploit-db.com/exploits/42784/ -CVE-2017-11121 - http://packetstormsecurity.com/files/144329/Broadcom-802.11r-FT-Reassociation-Response-Overflows.html -CVE-2017-11122 - http://packetstormsecurity.com/files/144461/Broadcom-ICMPv6-Information-Leak.html -CVE-2017-11124 - https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_unserialize-archive-c/ -CVE-2017-11125 - https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_get_path-util-c/ -CVE-2017-11126 - https://blogs.gentoo.org/ago/2017/07/03/mpg123-global-buffer-overflow-in-iii_i_stereo-layer3-c/ -CVE-2017-11127 - https://websecnerd.blogspot.in/2017/07/bolt-cms-3.html -CVE-2017-11128 - https://websecnerd.blogspot.in/2017/07/bolt-cms-3.html -CVE-2017-11141 - https://github.com/ImageMagick/ImageMagick/issues/469 -CVE-2017-11144 - https://hackerone.com/reports/248609 -CVE-2017-11145 - https://hackerone.com/reports/248659 -CVE-2017-11151 - https://www.exploit-db.com/exploits/42434/ -CVE-2017-11152 - https://www.exploit-db.com/exploits/42434/ -CVE-2017-11153 - https://www.exploit-db.com/exploits/42434/ -CVE-2017-11154 - https://www.exploit-db.com/exploits/42434/ -CVE-2017-11155 - https://www.exploit-db.com/exploits/42434/ -CVE-2017-11164 - http://openwall.com/lists/oss-security/2017/07/11/3 -CVE-2017-11165 - https://packetstormsecurity.com/files/143328/DataTaker-DT80-dEX-1.50.012-Sensitive-Configuration-Exposure.html -CVE-2017-11165 - https://www.exploit-db.com/exploits/42313/ -CVE-2017-11166 - https://github.com/ImageMagick/ImageMagick/issues/471 -CVE-2017-11170 - https://github.com/ImageMagick/ImageMagick/issues/472 -CVE-2017-11171 - https://bugzilla.suse.com/show_bug.cgi?id=1025068 -CVE-2017-11173 - https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html -CVE-2017-11175 - https://github.com/miruser/Roche-CVEs/blob/master/CVE-2017-11175.md -CVE-2017-11176 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-11176 - https://www.exploit-db.com/exploits/45553/ -CVE-2017-11181 - https://packetstormsecurity.com/files/143307/Rise-Ultimate-Project-Manager-1.8-Cross-Site-Scripting.html -CVE-2017-11182 - https://packetstormsecurity.com/files/143307/Rise-Ultimate-Project-Manager-1.8-Cross-Site-Scripting.html -CVE-2017-11191 - http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html -CVE-2017-11197 - https://www.exploit-db.com/exploits/42319 -CVE-2017-11198 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Reflected-XSS-in-get-image-php -CVE-2017-11200 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Authenticated-SQL-injection -CVE-2017-11201 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Stored-XSS-in-images-php -CVE-2017-11202 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Stored-XSS-in-visitors-php -CVE-2017-11281 - https://www.exploit-db.com/exploits/42781/ -CVE-2017-11281 - https://www.exploit-db.com/exploits/42782/ -CVE-2017-11281 - https://www.youtube.com/watch?v=CvmnUeza9zw -CVE-2017-11282 - http://packetstormsecurity.com/files/144332/Adobe-Flash-appleToRange-Out-Of-Bounds-Read.html -CVE-2017-11282 - https://www.exploit-db.com/exploits/42783/ -CVE-2017-11282 - https://www.youtube.com/watch?v=6iZnIQbRf5M -CVE-2017-1129 - https://www.exploit-db.com/exploits/42602/ -CVE-2017-1130 - https://www.exploit-db.com/exploits/42604/ -CVE-2017-11309 - http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt -CVE-2017-11309 - http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html -CVE-2017-11309 - https://www.exploit-db.com/exploits/43121/ -CVE-2017-11310 - https://github.com/ImageMagick/ImageMagick/issues/517 -CVE-2017-11317 - http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html -CVE-2017-11317 - https://www.exploit-db.com/exploits/43874/ -CVE-2017-11318 - https://www.tarlogic.com/advisories/Tarlogic-2017-002.txt -CVE-2017-11319 - http://packetstormsecurity.com/files/145230/Perspective-ICM-Investigation-And-Case-5.1.1.16-Privilege-Escalation.html -CVE-2017-11319 - https://www.exploit-db.com/exploits/43210/ -CVE-2017-11320 - http://seclists.org/fulldisclosure/2017/Aug/3 -CVE-2017-11320 - https://www.exploit-db.com/exploits/42427/ -CVE-2017-11321 - https://sysdream.com/news/lab/2017-09-29-cve-2017-11321-ucopia-wireless-appliance-5-1-8-restricted-shell-escape/ -CVE-2017-11321 - https://www.exploit-db.com/exploits/42937/ -CVE-2017-11322 - https://sysdream.com/news/lab/2017-09-29-cve-2017-11322-ucopia-wireless-appliance-5-1-8-privileges-escalation/ -CVE-2017-11322 - https://www.exploit-db.com/exploits/42936/ -CVE-2017-11323 - http://exploit.kitploit.com/2017/08/alzip-851-buffer-overflow.html -CVE-2017-11330 - http://seclists.org/fulldisclosure/2017/Jul/79 -CVE-2017-11330 - https://www.exploit-db.com/exploits/42396/ -CVE-2017-11331 - http://seclists.org/fulldisclosure/2017/Jul/80 -CVE-2017-11331 - https://www.exploit-db.com/exploits/42397/ -CVE-2017-11332 - http://seclists.org/fulldisclosure/2017/Jul/81 -CVE-2017-11332 - https://www.exploit-db.com/exploits/42398/ -CVE-2017-11333 - http://seclists.org/fulldisclosure/2017/Jul/82 -CVE-2017-11333 - https://www.exploit-db.com/exploits/42399/ -CVE-2017-11335 - http://bugzilla.maptools.org/show_bug.cgi?id=2715 -CVE-2017-11336 - https://bugzilla.redhat.com/show_bug.cgi?id=1470729 -CVE-2017-11337 - https://bugzilla.redhat.com/show_bug.cgi?id=1470737 -CVE-2017-11338 - https://bugzilla.redhat.com/show_bug.cgi?id=1470913 -CVE-2017-11339 - https://bugzilla.redhat.com/show_bug.cgi?id=1470946 -CVE-2017-11340 - https://bugzilla.redhat.com/show_bug.cgi?id=1470950 -CVE-2017-11341 - https://bugzilla.redhat.com/show_bug.cgi?id=1470714 -CVE-2017-11342 - https://bugzilla.redhat.com/show_bug.cgi?id=1470722 -CVE-2017-11346 - https://www.exploit-db.com/exploits/42358/ -CVE-2017-11355 - http://seclists.org/fulldisclosure/2017/Jul/28 -CVE-2017-11355 - https://www.exploit-db.com/exploits/42335/ -CVE-2017-11356 - http://seclists.org/fulldisclosure/2017/Jul/28 -CVE-2017-11356 - https://www.exploit-db.com/exploits/42335/ -CVE-2017-11357 - https://www.exploit-db.com/exploits/43874/ -CVE-2017-11358 - http://seclists.org/fulldisclosure/2017/Jul/81 -CVE-2017-11358 - https://www.exploit-db.com/exploits/42398/ -CVE-2017-11359 - http://seclists.org/fulldisclosure/2017/Jul/81 -CVE-2017-11359 - https://www.exploit-db.com/exploits/42398/ -CVE-2017-11360 - https://github.com/ImageMagick/ImageMagick/issues/518 -CVE-2017-11366 - http://www.jianshu.com/p/41ac7ac2a7af -CVE-2017-11367 - https://hackerone.com/reports/250581 -CVE-2017-11379 - https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities -CVE-2017-11380 - https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities -CVE-2017-11381 - https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities -CVE-2017-11394 - https://www.exploit-db.com/exploits/42971/ -CVE-2017-11395 - http://www.coresecurity.com/advisories/trend-micro-smart-protection-os-command-injection -CVE-2017-11398 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities -CVE-2017-11398 - https://www.exploit-db.com/exploits/43388/ -CVE-2017-11399 - https://github.com/FFmpeg/FFmpeg/commit/96349da5ec8eda9f0368446e557fe0c8ba0e66b7 -CVE-2017-11399 - https://github.com/FFmpeg/FFmpeg/commit/ba4beaf6149f7241c8bd85fe853318c2f6837ad0 -CVE-2017-11403 - https://blogs.gentoo.org/ago/2017/07/12/graphicsmagick-use-after-free-in-closeblob-blob-c/ -CVE-2017-11420 - http://www.openwall.com/lists/oss-security/2017/07/13/1 -CVE-2017-11421 - https://bugs.debian.org/868705 -CVE-2017-11423 - https://bugzilla.clamav.net/show_bug.cgi?id=11873 -CVE-2017-11427 - https://www.kb.cert.org/vuls/id/475445 -CVE-2017-11428 - https://www.kb.cert.org/vuls/id/475445 -CVE-2017-11429 - https://www.kb.cert.org/vuls/id/475445 -CVE-2017-11430 - https://www.kb.cert.org/vuls/id/475445 -CVE-2017-11439 - https://packetstormsecurity.com/files/143357/Sitecore-CMS-8.2-Cross-Site-Scripting-File-Disclosure.html -CVE-2017-11440 - https://packetstormsecurity.com/files/143357/Sitecore-CMS-8.2-Cross-Site-Scripting-File-Disclosure.html -CVE-2017-11444 - https://github.com/intelliants/subrion/issues/479 -CVE-2017-11446 - https://github.com/ImageMagick/ImageMagick/issues/537 -CVE-2017-11447 - https://github.com/ImageMagick/ImageMagick/issues/556 -CVE-2017-11448 - https://github.com/ImageMagick/ImageMagick/issues/556 -CVE-2017-11449 - https://github.com/ImageMagick/ImageMagick/issues/556 -CVE-2017-11450 - https://github.com/ImageMagick/ImageMagick/issues/556 -CVE-2017-11457 - https://erpscan.io/advisories/erpscan-17-018-sap-netweaver-java-7-5-xxe-com-sap-km-cm-ice/ -CVE-2017-11458 - https://erpscan.io/advisories/erpscan-17-017-sap-netweaver-java-7-3-java-xss-ctcprotocolprotocol-servlet/ -CVE-2017-11459 - https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/ -CVE-2017-11460 - https://erpscan.io/advisories/erpscan-17-016-sap-netweaver-java-7-4-dataarchivingservice-servlet-xss/ -CVE-2017-11466 - http://seclists.org/fulldisclosure/2017/Jul/33 -CVE-2017-11466 - https://github.com/dotCMS/core/issues/12131 -CVE-2017-11466 - https://packetstormsecurity.com/files/143383/dotcms411-shell.txt -CVE-2017-11478 - https://github.com/ImageMagick/ImageMagick/issues/528 -CVE-2017-11494 - https://www.exploit-db.com/exploits/42408/ -CVE-2017-11495 - https://github.com/ZIllR0/Routers/blob/master/PHICOMM -CVE-2017-11500 - http://blackwolfsec.cc/2017/07/20/Metinfo-directory-traversal-bypass/ -CVE-2017-11503 - https://cxsecurity.com/issue/WLB-2017060181 -CVE-2017-11503 - https://packetstormsecurity.com/files/143138/phpmailer-xss.txt -CVE-2017-11505 - https://github.com/ImageMagick/ImageMagick/issues/526 -CVE-2017-11507 - https://www.tenable.com/security/research/tra-2017-20 -CVE-2017-11509 - https://www.tenable.com/security/research/tra-2017-36 -CVE-2017-11510 - https://www.tenable.com/security/research/tra-2017-33 -CVE-2017-11517 - https://www.exploit-db.com/exploits/41153/ -CVE-2017-11519 - https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html -CVE-2017-11522 - https://github.com/ImageMagick/ImageMagick/issues/586 -CVE-2017-11523 - https://github.com/ImageMagick/ImageMagick/issues/591 -CVE-2017-11525 - https://github.com/ImageMagick/ImageMagick/issues/519 -CVE-2017-11526 - https://github.com/ImageMagick/ImageMagick/issues/527 -CVE-2017-11527 - https://github.com/ImageMagick/ImageMagick/issues/523 -CVE-2017-11528 - https://github.com/ImageMagick/ImageMagick/issues/522 -CVE-2017-11529 - https://github.com/ImageMagick/ImageMagick/issues/525 -CVE-2017-11530 - https://github.com/ImageMagick/ImageMagick/issues/524 -CVE-2017-11531 - https://github.com/ImageMagick/ImageMagick/issues/566 -CVE-2017-11532 - https://github.com/ImageMagick/ImageMagick/issues/563 -CVE-2017-11533 - https://github.com/ImageMagick/ImageMagick/issues/562 -CVE-2017-11534 - https://github.com/ImageMagick/ImageMagick/issues/564 -CVE-2017-11535 - https://github.com/ImageMagick/ImageMagick/issues/561 -CVE-2017-11536 - https://github.com/ImageMagick/ImageMagick/issues/567 -CVE-2017-11537 - https://github.com/ImageMagick/ImageMagick/issues/560 -CVE-2017-11538 - https://github.com/ImageMagick/ImageMagick/issues/569 -CVE-2017-11539 - http://www.securityfocus.com/bid/99936 -CVE-2017-11539 - https://github.com/ImageMagick/ImageMagick/issues/582 -CVE-2017-11540 - https://github.com/ImageMagick/ImageMagick/issues/581 -CVE-2017-11541 - https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print -CVE-2017-11542 - https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim -CVE-2017-11543 - https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl -CVE-2017-11546 - http://seclists.org/fulldisclosure/2017/Jul/83 -CVE-2017-11547 - http://seclists.org/fulldisclosure/2017/Jul/83 -CVE-2017-11548 - http://seclists.org/fulldisclosure/2017/Jul/84 -CVE-2017-11548 - https://www.exploit-db.com/exploits/42400/ -CVE-2017-11549 - http://seclists.org/fulldisclosure/2017/Jul/83 -CVE-2017-11550 - http://seclists.org/fulldisclosure/2017/Jul/85 -CVE-2017-11551 - http://seclists.org/fulldisclosure/2017/Jul/85 -CVE-2017-11552 - http://seclists.org/fulldisclosure/2017/Jul/94 -CVE-2017-11552 - https://www.exploit-db.com/exploits/42409/ -CVE-2017-11553 - https://bugzilla.redhat.com/show_bug.cgi?id=1471772 -CVE-2017-11555 - https://bugzilla.redhat.com/show_bug.cgi?id=1471782 -CVE-2017-11556 - https://bugzilla.redhat.com/show_bug.cgi?id=1471786 -CVE-2017-11557 - https://www.manageengine.com/ -CVE-2017-11557 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18738 -CVE-2017-11559 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 -CVE-2017-11560 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 -CVE-2017-11561 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 -CVE-2017-11563 - http://seclists.org/fulldisclosure/2018/Aug/18 -CVE-2017-11563 - https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf -CVE-2017-11564 - http://seclists.org/fulldisclosure/2018/Aug/19 -CVE-2017-11564 - https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf -CVE-2017-11567 - http://hyp3rlinx.altervista.org/advisories/MONGOOSE-WEB-SERVER-v6.5-CSRF-COMMAND-EXECUTION.txt -CVE-2017-11567 - http://seclists.org/fulldisclosure/2017/Sep/3 -CVE-2017-11567 - https://www.exploit-db.com/exploits/42614/ -CVE-2017-11568 - https://github.com/fontforge/fontforge/issues/3089 -CVE-2017-11569 - https://github.com/fontforge/fontforge/issues/3093 -CVE-2017-11570 - https://github.com/fontforge/fontforge/issues/3097 -CVE-2017-11571 - https://github.com/fontforge/fontforge/issues/3087 -CVE-2017-11572 - https://github.com/fontforge/fontforge/issues/3092 -CVE-2017-11573 - https://github.com/fontforge/fontforge/issues/3098 -CVE-2017-11574 - https://github.com/fontforge/fontforge/issues/3090 -CVE-2017-11575 - https://github.com/fontforge/fontforge/issues/3096 -CVE-2017-11576 - https://github.com/fontforge/fontforge/issues/3091 -CVE-2017-11577 - https://github.com/fontforge/fontforge/issues/3088 -CVE-2017-11578 - http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html -CVE-2017-11578 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Blipcare_sec_issues.pdf -CVE-2017-11579 - http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html -CVE-2017-11579 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Blipcare_sec_issues.pdf -CVE-2017-11580 - http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html -CVE-2017-11580 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Blipcare_sec_issues.pdf -CVE-2017-11581 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#Reflected-XSS -CVE-2017-11582 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-after-limit-via-system-num-parameter -CVE-2017-11583 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-in-action-related-catid-parameter -CVE-2017-11584 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-via-system-field-parameter -CVE-2017-11585 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#remote-php-code-execution -CVE-2017-11586 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#URL-Redirector-Abuse -CVE-2017-11600 - http://seclists.org/bugtraq/2017/Jul/30 -CVE-2017-11605 - https://bugzilla.redhat.com/show_bug.cgi?id=1474019 -CVE-2017-11608 - https://bugzilla.redhat.com/show_bug.cgi?id=1474276 -CVE-2017-11610 - https://www.exploit-db.com/exploits/42779/ -CVE-2017-11611 - https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc -CVE-2017-11613 - https://gist.github.com/dazhouzhou/1a3b7400547f23fe316db303ab9b604f -CVE-2017-11613 - https://usn.ubuntu.com/3606-1/ -CVE-2017-11628 - https://hackerone.com/reports/248601 -CVE-2017-11629 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#api-php-Reflected-XSS -CVE-2017-11631 - https://github.com/FiyoCMS/FiyoCMS/issues/7 -CVE-2017-11639 - https://github.com/ImageMagick/ImageMagick/issues/588 -CVE-2017-11640 - https://github.com/ImageMagick/ImageMagick/issues/584 -CVE-2017-11644 - https://github.com/ImageMagick/ImageMagick/issues/587 -CVE-2017-11652 - http://packetstormsecurity.com/files/143516/Razer-Synapse-2.20-DLL-Hijacking.html -CVE-2017-11653 - http://packetstormsecurity.com/files/143516/Razer-Synapse-2.20-DLL-Hijacking.html -CVE-2017-11658 - https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 -CVE-2017-11658 - https://wpvulndb.com/vulnerabilities/8872 -CVE-2017-11661 - http://seclists.org/fulldisclosure/2017/Aug/12 -CVE-2017-11661 - https://www.exploit-db.com/exploits/42433/ -CVE-2017-11662 - http://seclists.org/fulldisclosure/2017/Aug/12 -CVE-2017-11662 - https://www.exploit-db.com/exploits/42433/ -CVE-2017-11663 - http://seclists.org/fulldisclosure/2017/Aug/12 -CVE-2017-11663 - https://www.exploit-db.com/exploits/42433/ -CVE-2017-11664 - http://seclists.org/fulldisclosure/2017/Aug/12 -CVE-2017-11664 - https://www.exploit-db.com/exploits/42433/ -CVE-2017-11673 - http://code610.blogspot.com/2017/07/readwrite-access-violation-acunetix.html -CVE-2017-11674 - http://code610.blogspot.com/2017/07/readwrite-access-violation-acunetix.html -CVE-2017-11675 - https://github.com/imp0wd3r/vuln-papers/tree/master/zencart-155e-auth-rce -CVE-2017-11677 - https://github.com/curlyboi/hashtopus/issues/63 -CVE-2017-11678 - https://github.com/curlyboi/hashtopus/issues/63 -CVE-2017-11679 - https://github.com/curlyboi/hashtopus/issues/63 -CVE-2017-11680 - https://github.com/s3inlc/hashtopussy/issues/241 -CVE-2017-11681 - https://github.com/s3inlc/hashtopussy/issues/241 -CVE-2017-11682 - https://github.com/s3inlc/hashtopussy/issues/241 -CVE-2017-11683 - https://bugzilla.redhat.com/show_bug.cgi?id=1475124 -CVE-2017-11684 - https://bugzilla.libav.org/show_bug.cgi?id=1073 -CVE-2017-11692 - https://github.com/jbeder/yaml-cpp/issues/519 -CVE-2017-11695 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html -CVE-2017-11695 - http://seclists.org/fulldisclosure/2017/Aug/17 -CVE-2017-11696 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html -CVE-2017-11696 - http://seclists.org/fulldisclosure/2017/Aug/17 -CVE-2017-11697 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html -CVE-2017-11697 - http://seclists.org/fulldisclosure/2017/Aug/17 -CVE-2017-11698 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html -CVE-2017-11698 - http://seclists.org/fulldisclosure/2017/Aug/17 -CVE-2017-11714 - https://bugs.ghostscript.com/show_bug.cgi?id=698158 -CVE-2017-11719 - https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92 -CVE-2017-11719 - https://github.com/FFmpeg/FFmpeg/commit/f31fc4755f69ab26bf6e8be47875b7dcede8e29e -CVE-2017-11720 - https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/ -CVE-2017-11720 - https://sourceforge.net/p/lame/bugs/460/ -CVE-2017-11723 - https://github.com/JojoCMS/Jojo-CMS/issues/30 -CVE-2017-11724 - https://github.com/ImageMagick/ImageMagick/issues/624 -CVE-2017-11734 - https://github.com/libming/libming/issues/83 -CVE-2017-11738 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 -CVE-2017-11739 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 -CVE-2017-11740 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 -CVE-2017-11741 - http://seclists.org/fulldisclosure/2017/Aug/0 -CVE-2017-11741 - https://www.exploit-db.com/exploits/43224/ -CVE-2017-11750 - https://github.com/ImageMagick/ImageMagick/issues/632 -CVE-2017-11751 - https://github.com/ImageMagick/ImageMagick/issues/631 -CVE-2017-11752 - https://github.com/ImageMagick/ImageMagick/issues/628 -CVE-2017-11753 - https://github.com/ImageMagick/ImageMagick/issues/629 -CVE-2017-11754 - https://github.com/ImageMagick/ImageMagick/issues/633 -CVE-2017-11755 - https://github.com/ImageMagick/ImageMagick/issues/634 -CVE-2017-11764 - https://www.exploit-db.com/exploits/42765/ -CVE-2017-11785 - https://www.exploit-db.com/exploits/43001/ -CVE-2017-11793 - https://www.exploit-db.com/exploits/43368/ -CVE-2017-11799 - https://www.exploit-db.com/exploits/42998/ -CVE-2017-11802 - https://www.exploit-db.com/exploits/43000/ -CVE-2017-11809 - https://www.exploit-db.com/exploits/42999/ -CVE-2017-11810 - https://www.exploit-db.com/exploits/43131/ -CVE-2017-11811 - https://www.exploit-db.com/exploits/43152/ -CVE-2017-11823 - https://www.exploit-db.com/exploits/42997/ -CVE-2017-11826 - https://0patch.blogspot.com/2017/11/0patching-pretty-nasty-microsoft-word.html -CVE-2017-11826 - https://www.tarlogic.com/en/blog/exploiting-word-cve-2017-11826/ -CVE-2017-11830 - https://www.exploit-db.com/exploits/43162/ -CVE-2017-11831 - https://www.exploit-db.com/exploits/43165/ -CVE-2017-11839 - https://www.exploit-db.com/exploits/43180/ -CVE-2017-11840 - https://www.exploit-db.com/exploits/43183/ -CVE-2017-11841 - https://www.exploit-db.com/exploits/43181/ -CVE-2017-11855 - https://www.exploit-db.com/exploits/43371/ -CVE-2017-11861 - https://www.exploit-db.com/exploits/43153/ -CVE-2017-11870 - https://www.exploit-db.com/exploits/43182/ -CVE-2017-11873 - https://www.exploit-db.com/exploits/43154/ -CVE-2017-11882 - http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 -CVE-2017-11882 - https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html -CVE-2017-11882 - https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html -CVE-2017-11882 - https://github.com/0x09AL/CVE-2017-11882-metasploit -CVE-2017-11882 - https://github.com/embedi/CVE-2017-11882 -CVE-2017-11882 - https://github.com/rxwx/CVE-2017-11882 -CVE-2017-11882 - https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ -CVE-2017-11882 - https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ -CVE-2017-11882 - https://www.exploit-db.com/exploits/43163/ -CVE-2017-11885 - https://www.exploit-db.com/exploits/44616/ -CVE-2017-11890 - https://www.exploit-db.com/exploits/43369/ -CVE-2017-11893 - https://www.exploit-db.com/exploits/43466/ -CVE-2017-11903 - https://www.exploit-db.com/exploits/43367/ -CVE-2017-11906 - https://www.exploit-db.com/exploits/43372/ -CVE-2017-11907 - https://www.exploit-db.com/exploits/43370/ -CVE-2017-11909 - https://www.exploit-db.com/exploits/43467/ -CVE-2017-11911 - https://www.exploit-db.com/exploits/43468/ -CVE-2017-11914 - https://www.exploit-db.com/exploits/43713/ -CVE-2017-11918 - https://www.exploit-db.com/exploits/43469/ -CVE-2017-12065 - https://github.com/Cacti/cacti/issues/877 -CVE-2017-12066 - https://github.com/Cacti/cacti/issues/877 -CVE-2017-12067 - https://github.com/hackerlib/hackerlib-vul/tree/master/potrace/heap-buffer-overflow-mkbitmap -CVE-2017-12068 - https://github.com/kevins1022/cve/blob/master/wordpress-event-list.md -CVE-2017-12081 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433 -CVE-2017-12082 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434 -CVE-2017-12086 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0438 -CVE-2017-12088 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0440 -CVE-2017-12089 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0441 -CVE-2017-12090 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0442 -CVE-2017-12092 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0444 -CVE-2017-12093 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0445 -CVE-2017-12094 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0446 -CVE-2017-12095 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0447 -CVE-2017-12096 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0448 -CVE-2017-12099 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0451 -CVE-2017-12100 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0452 -CVE-2017-12101 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0453 -CVE-2017-12102 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454 -CVE-2017-12103 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455 -CVE-2017-12104 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456 -CVE-2017-12105 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457 -CVE-2017-12110 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0462 -CVE-2017-12112 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0464 -CVE-2017-12119 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0471 -CVE-2017-12120 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0472 -CVE-2017-12121 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0473 -CVE-2017-12123 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0475 -CVE-2017-12124 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0476 -CVE-2017-12125 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0477 -CVE-2017-12126 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0478 -CVE-2017-12127 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0479 -CVE-2017-12128 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0480 -CVE-2017-12129 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0481 -CVE-2017-12130 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0486 -CVE-2017-12131 - https://github.com/kevins1022/cve/blob/master/wordpress-Easy-Testimonials.md -CVE-2017-12138 - https://github.com/XOOPS/XoopsCore25/issues/523 -CVE-2017-12140 - https://github.com/ImageMagick/ImageMagick/issues/533 -CVE-2017-12143 - https://somevulnsofadlab.blogspot.com/2017/07/libquicktimeallocation-failed-in.html -CVE-2017-12143 - https://sourceforge.net/p/libquicktime/mailman/message/35888850/ -CVE-2017-12145 - https://somevulnsofadlab.blogspot.com/2017/07/libquicktimeallocation-failed-in_30.html -CVE-2017-12145 - https://sourceforge.net/p/libquicktime/mailman/message/35888849/ -CVE-2017-12149 - https://github.com/gottburgm/Exploits/tree/master/CVE-2017-12149 -CVE-2017-12153 - http://seclists.org/oss-sec/2017/q3/437 -CVE-2017-12153 - https://usn.ubuntu.com/3583-2/ -CVE-2017-12154 - https://usn.ubuntu.com/3698-1/ -CVE-2017-12154 - https://usn.ubuntu.com/3698-2/ -CVE-2017-12190 - https://usn.ubuntu.com/3582-1/ -CVE-2017-12190 - https://usn.ubuntu.com/3583-2/ -CVE-2017-12192 - https://usn.ubuntu.com/3583-2/ -CVE-2017-12193 - https://usn.ubuntu.com/3698-1/ -CVE-2017-12193 - https://usn.ubuntu.com/3698-2/ -CVE-2017-12199 - https://github.com/kevins1022/cve/blob/master/wordpress-product-catalog.md -CVE-2017-12200 - https://github.com/kevins1022/cve/blob/master/wordpress-product-catalog.md -CVE-2017-12374 - https://bugzilla.clamav.net/show_bug.cgi?id=11939 -CVE-2017-12375 - https://bugzilla.clamav.net/show_bug.cgi?id=11940 -CVE-2017-12376 - https://bugzilla.clamav.net/show_bug.cgi?id=11942 -CVE-2017-12377 - https://bugzilla.clamav.net/show_bug.cgi?id=11943 -CVE-2017-12378 - https://bugzilla.clamav.net/show_bug.cgi?id=11946 -CVE-2017-12379 - https://bugzilla.clamav.net/show_bug.cgi?id=11944 -CVE-2017-12380 - https://bugzilla.clamav.net/show_bug.cgi?id=11945 -CVE-2017-12413 - https://packetstormsecurity.com/files/143657/Axis-2100-Network-Camera-2.43-Cross-Site-Scripting.html -CVE-2017-12415 - https://bugs.oxid-esales.com/view.php?id=6674 -CVE-2017-12418 - https://github.com/ImageMagick/ImageMagick/issues/643 -CVE-2017-12427 - https://github.com/ImageMagick/ImageMagick/issues/636 -CVE-2017-12439 - https://packetstormsecurity.com/files/143542/Flash-Slideshow-Maker-Professional-XSS-Content-Forgery-Redirect.html -CVE-2017-12441 - http://seclists.org/fulldisclosure/2017/Aug/15 -CVE-2017-12442 - http://seclists.org/fulldisclosure/2017/Aug/15 -CVE-2017-12443 - http://seclists.org/fulldisclosure/2017/Aug/15 -CVE-2017-12444 - http://seclists.org/fulldisclosure/2017/Aug/15 -CVE-2017-12445 - http://seclists.org/fulldisclosure/2017/Aug/15 -CVE-2017-12447 - https://github.com/hackerlib/hackerlib-vul/tree/master/gnome -CVE-2017-12472 - https://github.com/cn-uofbasel/ccn-lite/issues/138 -CVE-2017-12477 - https://www.exploit-db.com/exploits/43031/ -CVE-2017-12478 - https://www.exploit-db.com/exploits/43030/ -CVE-2017-12478 - https://www.exploit-db.com/exploits/45559/ -CVE-2017-12480 - https://medium.com/@BaYinMin/cve-2017-12480-sandboxie-installer-dll-hijacking-or-unsafe-dll-loading-vulnerability-41ad0562f41 -CVE-2017-12500 - https://www.exploit-db.com/exploits/44648/ -CVE-2017-12542 - https://www.exploit-db.com/exploits/44005/ -CVE-2017-12556 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us -CVE-2017-12557 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us -CVE-2017-12557 - https://www.exploit-db.com/exploits/45952/ -CVE-2017-12558 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us -CVE-2017-12559 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03777en_us -CVE-2017-12560 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03777en_us -CVE-2017-12573 - http://seclists.org/fulldisclosure/2018/Aug/29 -CVE-2017-12574 - http://seclists.org/fulldisclosure/2018/Aug/25 -CVE-2017-12575 - http://seclists.org/fulldisclosure/2018/Aug/26 -CVE-2017-12576 - http://seclists.org/fulldisclosure/2018/Aug/27 -CVE-2017-12577 - http://seclists.org/fulldisclosure/2018/Aug/28 -CVE-2017-12579 - https://www.exploit-db.com/exploits/43223/ -CVE-2017-12581 - https://blog.doyensec.com/2017/08/03/electron-framework-security.html -CVE-2017-12583 - https://github.com/splitbrain/dokuwiki/issues/2061 -CVE-2017-12584 - https://github.com/slims/slims8_akasia/issues/49 -CVE-2017-12586 - https://github.com/slims/slims8_akasia/issues/48 -CVE-2017-12587 - https://github.com/ImageMagick/ImageMagick/issues/535 -CVE-2017-12595 - https://github.com/qpdf/qpdf/issues/146 -CVE-2017-12597 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12598 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12599 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12601 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12603 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12604 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12605 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12606 - https://github.com/opencv/opencv/issues/9309 -CVE-2017-12607 - https://www.openoffice.org/security/cves/CVE-2017-12607.html -CVE-2017-12608 - https://www.openoffice.org/security/cves/CVE-2017-12608.html -CVE-2017-12610 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-12615 - http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html -CVE-2017-12615 - https://github.com/breaktoprotect/CVE-2017-12615 -CVE-2017-12615 - https://www.exploit-db.com/exploits/42953/ -CVE-2017-12617 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-12617 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-12617 - https://www.exploit-db.com/exploits/42966/ -CVE-2017-12617 - https://www.exploit-db.com/exploits/43008/ -CVE-2017-12626 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2017-12626 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-12626 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2017-12626 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2017-12626 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-12626 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-12626 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-12627 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2017-12629 - https://www.exploit-db.com/exploits/43009/ -CVE-2017-12635 - https://www.exploit-db.com/exploits/44498/ -CVE-2017-12635 - https://www.exploit-db.com/exploits/45019/ -CVE-2017-12636 - https://www.exploit-db.com/exploits/44913/ -CVE-2017-12636 - https://www.exploit-db.com/exploits/45019/ -CVE-2017-12640 - https://github.com/ImageMagick/ImageMagick/issues/542 -CVE-2017-12641 - https://github.com/ImageMagick/ImageMagick/issues/550 -CVE-2017-12642 - https://github.com/ImageMagick/ImageMagick/issues/552 -CVE-2017-12643 - https://github.com/ImageMagick/ImageMagick/issues/549 -CVE-2017-12644 - https://github.com/ImageMagick/ImageMagick/issues/551 -CVE-2017-12645 - https://issues.liferay.com/browse/LPS-72307 -CVE-2017-12650 - https://wpvulndb.com/vulnerabilities/8883 -CVE-2017-12651 - https://wpvulndb.com/vulnerabilities/8884 -CVE-2017-12662 - https://github.com/ImageMagick/ImageMagick/issues/576 -CVE-2017-12663 - https://github.com/ImageMagick/ImageMagick/issues/573 -CVE-2017-12664 - https://github.com/ImageMagick/ImageMagick/issues/574 -CVE-2017-12665 - https://github.com/ImageMagick/ImageMagick/issues/577 -CVE-2017-12666 - https://github.com/ImageMagick/ImageMagick/issues/572 -CVE-2017-12667 - https://github.com/ImageMagick/ImageMagick/issues/553 -CVE-2017-12668 - https://github.com/ImageMagick/ImageMagick/issues/575 -CVE-2017-12669 - https://github.com/ImageMagick/ImageMagick/issues/571 -CVE-2017-12691 - https://github.com/ImageMagick/ImageMagick/issues/656 -CVE-2017-12692 - https://github.com/ImageMagick/ImageMagick/issues/653 -CVE-2017-12693 - https://github.com/ImageMagick/ImageMagick/issues/652 -CVE-2017-12718 - https://www.exploit-db.com/exploits/43776/ -CVE-2017-1274 - http://packetstormsecurity.com/files/152786/Lotus-Domino-8.5.3-EXAMINE-Stack-Buffer-Overflow.html -CVE-2017-12754 - https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/Asus_DeleteOfflineClientOverflow.txt -CVE-2017-12757 - https://www.exploit-db.com/exploits/42507 -CVE-2017-12758 - https://www.exploit-db.com/exploits/42492 -CVE-2017-12759 - https://www.exploit-db.com/exploits/42499 -CVE-2017-12760 - https://www.exploit-db.com/exploits/41283 -CVE-2017-12761 - https://www.exploit-db.com/exploits/42440 -CVE-2017-12762 - https://usn.ubuntu.com/3620-1/ -CVE-2017-12778 - http://archive.is/eF2GR -CVE-2017-12778 - https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada -CVE-2017-12779 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12779 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12779 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12780 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12780 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12780 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12781 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12781 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12781 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12782 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12782 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12782 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12783 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12783 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12783 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12785 - https://www.exploit-db.com/exploits/42518/ -CVE-2017-12786 - https://www.exploit-db.com/exploits/42518/ -CVE-2017-12787 - https://www.exploit-db.com/exploits/42518/ -CVE-2017-12788 - https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md -CVE-2017-12789 - https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md -CVE-2017-12790 - https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md -CVE-2017-12800 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12800 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12800 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12801 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12801 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12801 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12802 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12802 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12802 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12803 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -CVE-2017-12803 - http://seclists.org/fulldisclosure/2017/Nov/19 -CVE-2017-12803 - https://github.com/Matroska-Org/foundation-source/issues/24 -CVE-2017-12804 - https://github.com/jsummers/imageworsener/issues/30 -CVE-2017-12805 - https://github.com/ImageMagick/ImageMagick/issues/664 -CVE-2017-12806 - https://github.com/ImageMagick/ImageMagick/issues/660 -CVE-2017-12814 - https://hackerone.com/reports/272497 -CVE-2017-12814 - https://rt.perl.org/Public/Bug/Display.html?id=131665 -CVE-2017-12814 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-12816 - https://support.kaspersky.com/vulnerability.aspx?el=12430#090817 -CVE-2017-12817 - https://support.kaspersky.com/vulnerability.aspx?el=12430#090817 -CVE-2017-12823 - https://support.kaspersky.com/vulnerability.aspx?el=12430#091017 -CVE-2017-12837 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-12839 - https://sourceforge.net/p/mpg123/bugs/255/ -CVE-2017-12844 - https://youtu.be/MI4dhEia1d4 -CVE-2017-12853 - https://www.exploit-db.com/exploits/42449/ -CVE-2017-12856 - https://github.com/cooltey/C.P.Sub/issues/2 -CVE-2017-12858 - https://hackerone.com/reports/260414 -CVE-2017-12862 - https://github.com/opencv/opencv/issues/9370 -CVE-2017-12863 - https://github.com/opencv/opencv/issues/9371 -CVE-2017-12864 - https://github.com/opencv/opencv/issues/9372 -CVE-2017-12865 - https://www.nri-secure.com/blog/new-iot-vulnerability-connmando -CVE-2017-12875 - https://github.com/ImageMagick/ImageMagick/issues/659 -CVE-2017-12876 - http://www.openwall.com/lists/oss-security/2017/08/16/3 -CVE-2017-12876 - https://blogs.gentoo.org/ago/2017/08/10/imagemagick-heap-based-buffer-overflow-in-omp_outlined-32-enhance-c/ -CVE-2017-12877 - http://www.openwall.com/lists/oss-security/2017/08/16/2 -CVE-2017-12877 - https://blogs.gentoo.org/ago/2017/08/10/imagemagick-use-after-free-in-destroyimage-image-c/ -CVE-2017-12879 - https://drive.google.com/open?id=0B6WbMqXSfqQFODZHUGtLdzU3eDA -CVE-2017-12879 - https://youtu.be/QOLdH2oey8Q -CVE-2017-12883 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-12904 - https://github.com/akrennmair/newsbeuter/commit/96e9506ae9e252c548665152d1b8968297128307 -CVE-2017-12904 - https://github.com/akrennmair/newsbeuter/issues/591 -CVE-2017-12919 - http://www.openwall.com/lists/oss-security/2017/08/17/13 -CVE-2017-12919 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-heap-based-buffer-overflow-in-olestreamwritevt_lpstr-olestrm-cpp/ -CVE-2017-12920 - http://www.openwall.com/lists/oss-security/2017/08/17/12 -CVE-2017-12920 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-cdirectorygetdirentry-dir-cxx/ -CVE-2017-12921 - http://www.openwall.com/lists/oss-security/2017/08/17/10 -CVE-2017-12921 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-pfileflashpixviewgetglobalinfoproperty-f_fpxvw-cpp/ -CVE-2017-12922 - http://www.openwall.com/lists/oss-security/2017/08/17/11 -CVE-2017-12922 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-wchar-c/ -CVE-2017-12923 - http://www.openwall.com/lists/oss-security/2017/08/17/9 -CVE-2017-12923 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-olestreamwritevt_lpstr-olestrm-cpp/ -CVE-2017-12924 - http://www.openwall.com/lists/oss-security/2017/08/17/8 -CVE-2017-12924 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-divide-by-zero-in-cdirvectorgettable-dirfunc-hxx/ -CVE-2017-12925 - http://www.openwall.com/lists/oss-security/2017/08/17/14 -CVE-2017-12925 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-double-free-in-dffromlb-docfile-cxx/ -CVE-2017-12928 - http://packetstormsecurity.com/files/144259/DlxSpot-Hardcoded-Password.html -CVE-2017-12929 - http://packetstormsecurity.com/files/144258/DlxSpot-Shell-Upload.html -CVE-2017-12930 - http://packetstormsecurity.com/files/144257/DlxSpot-SQL-Injection.html -CVE-2017-12932 - https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4 -CVE-2017-12932 - https://hackerone.com/reports/261335 -CVE-2017-12933 - https://hackerone.com/reports/261336 -CVE-2017-12934 - https://hackerone.com/reports/261338 -CVE-2017-12935 - https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/ -CVE-2017-12936 - https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-use-after-free-in-readwmfimage-wmf-c/ -CVE-2017-12937 - https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-heap-based-buffer-overflow-in-readsunimage-sun-c/ -CVE-2017-12938 - http://seclists.org/oss-sec/2017/q3/290 -CVE-2017-12940 - http://seclists.org/oss-sec/2017/q3/290 -CVE-2017-12941 - http://seclists.org/oss-sec/2017/q3/290 -CVE-2017-12942 - http://seclists.org/oss-sec/2017/q3/290 -CVE-2017-12943 - https://jithindkurup.tumblr.com/post/165218785974/d-link-dir-600-authentication-bypass-absolute -CVE-2017-12943 - https://www.exploit-db.com/exploits/42581/ -CVE-2017-12943 - https://www.youtube.com/watch?v=PeNOJORAQsQ -CVE-2017-12944 - https://usn.ubuntu.com/3606-1/ -CVE-2017-12945 - http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html -CVE-2017-12945 - https://www.exploit-db.com/exploits/47722 -CVE-2017-12950 - http://seclists.org/fulldisclosure/2017/Aug/39 -CVE-2017-12950 - https://www.exploit-db.com/exploits/42546/ -CVE-2017-12951 - http://seclists.org/fulldisclosure/2017/Aug/39 -CVE-2017-12951 - https://www.exploit-db.com/exploits/42546/ -CVE-2017-12952 - http://seclists.org/fulldisclosure/2017/Aug/39 -CVE-2017-12952 - https://www.exploit-db.com/exploits/42546/ -CVE-2017-12953 - http://seclists.org/fulldisclosure/2017/Aug/39 -CVE-2017-12953 - https://www.exploit-db.com/exploits/42546/ -CVE-2017-12954 - http://seclists.org/fulldisclosure/2017/Aug/39 -CVE-2017-12954 - https://www.exploit-db.com/exploits/42546/ -CVE-2017-12955 - https://bugzilla.redhat.com/show_bug.cgi?id=1482295 -CVE-2017-12956 - https://bugzilla.redhat.com/show_bug.cgi?id=1482296 -CVE-2017-12957 - https://bugzilla.redhat.com/show_bug.cgi?id=1482423 -CVE-2017-12962 - https://bugzilla.redhat.com/show_bug.cgi?id=1482331 -CVE-2017-12963 - https://bugzilla.redhat.com/show_bug.cgi?id=1482335 -CVE-2017-12964 - https://bugzilla.redhat.com/show_bug.cgi?id=1482397 -CVE-2017-12965 - http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt -CVE-2017-12965 - http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html -CVE-2017-12965 - https://www.exploit-db.com/exploits/42520/ -CVE-2017-12969 - http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-VIEWERCTRL-ACTIVE-X-BUFFER-OVERFLOW-0DAY.txt -CVE-2017-12969 - http://packetstormsecurity.com/files/144882/Avaya-IP-Office-IPO-10.1-Active-X-Buffer-Overflow.html -CVE-2017-12969 - http://seclists.org/fulldisclosure/2017/Nov/17 -CVE-2017-12969 - https://www.exploit-db.com/exploits/43120/ -CVE-2017-1297 - https://www.exploit-db.com/exploits/42260/ -CVE-2017-12970 - http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt -CVE-2017-12970 - http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html -CVE-2017-12970 - https://www.exploit-db.com/exploits/42520/ -CVE-2017-12971 - http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt -CVE-2017-12971 - http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html -CVE-2017-12971 - https://www.exploit-db.com/exploits/42520/ -CVE-2017-12979 - https://github.com/splitbrain/dokuwiki/issues/2080 -CVE-2017-12980 - https://github.com/splitbrain/dokuwiki/issues/2081 -CVE-2017-12982 - https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/ -CVE-2017-12982 - https://github.com/uclouvain/openjpeg/issues/983 -CVE-2017-12983 - https://github.com/ImageMagick/ImageMagick/issues/682 -CVE-2017-12984 - https://www.exploit-db.com/exploits/42535/ -CVE-2017-12985 - https://hackerone.com/reports/268803 -CVE-2017-12986 - https://hackerone.com/reports/268804 -CVE-2017-13008 - https://hackerone.com/reports/268805 -CVE-2017-13009 - https://hackerone.com/reports/268806 -CVE-2017-13010 - https://hackerone.com/reports/268807 -CVE-2017-13038 - https://hackerone.com/reports/268808 -CVE-2017-13056 - http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html -CVE-2017-13063 - https://sourceforge.net/p/graphicsmagick/bugs/434/ -CVE-2017-13064 - https://sourceforge.net/p/graphicsmagick/bugs/436/ -CVE-2017-13065 - https://sourceforge.net/p/graphicsmagick/bugs/435/ -CVE-2017-13066 - https://sourceforge.net/p/graphicsmagick/bugs/430/ -CVE-2017-13077 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13077 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13077 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-13077 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13077 - https://cert.vde.com/en-us/advisories/vde-2017-003 -CVE-2017-13077 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13077 - https://hackerone.com/reports/286740 -CVE-2017-13077 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13077 - https://www.krackattacks.com/ -CVE-2017-13078 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13078 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13078 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-13078 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13078 - https://cert.vde.com/en-us/advisories/vde-2017-003 -CVE-2017-13078 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13078 - https://hackerone.com/reports/286740 -CVE-2017-13078 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13078 - https://www.krackattacks.com/ -CVE-2017-13079 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13079 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13079 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-13079 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13079 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13079 - https://hackerone.com/reports/286740 -CVE-2017-13079 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13079 - https://www.krackattacks.com/ -CVE-2017-13080 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13080 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13080 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-13080 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13080 - https://cert.vde.com/en-us/advisories/vde-2017-003 -CVE-2017-13080 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13080 - https://hackerone.com/reports/286740 -CVE-2017-13080 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13080 - https://www.krackattacks.com/ -CVE-2017-13081 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13081 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13081 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-13081 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13081 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13081 - https://hackerone.com/reports/286740 -CVE-2017-13081 - https://www.krackattacks.com/ -CVE-2017-13082 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13082 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13082 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-13082 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13082 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13082 - https://hackerone.com/reports/286740 -CVE-2017-13082 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13082 - https://www.krackattacks.com/ -CVE-2017-13084 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13084 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13084 - https://hackerone.com/reports/286740 -CVE-2017-13084 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13084 - https://www.krackattacks.com/ -CVE-2017-13086 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13086 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13086 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13086 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13086 - https://hackerone.com/reports/286740 -CVE-2017-13086 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13086 - https://www.krackattacks.com/ -CVE-2017-13087 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13087 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13087 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13087 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13087 - https://hackerone.com/reports/286740 -CVE-2017-13087 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13087 - https://www.krackattacks.com/ -CVE-2017-13088 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt -CVE-2017-13088 - http://www.kb.cert.org/vuls/id/228519 -CVE-2017-13088 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-13088 - http://www.ubuntu.com/usn/USN-3455-1 -CVE-2017-13088 - https://cert.vde.com/en-us/advisories/vde-2017-005 -CVE-2017-13088 - https://hackerone.com/reports/286740 -CVE-2017-13088 - https://support.lenovo.com/us/en/product_security/LEN-17420 -CVE-2017-13088 - https://www.krackattacks.com/ -CVE-2017-13089 - https://github.com/r1b/CVE-2017-13089 -CVE-2017-13089 - https://hackerone.com/reports/287666 -CVE-2017-13090 - https://hackerone.com/reports/287667 -CVE-2017-13091 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13092 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13093 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13094 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13095 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13096 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13097 - https://www.kb.cert.org/vuls/id/739007 -CVE-2017-13098 - http://www.kb.cert.org/vuls/id/144389 -CVE-2017-13098 - https://robotattack.org/ -CVE-2017-13098 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-13099 - http://www.kb.cert.org/vuls/id/144389 -CVE-2017-13099 - https://robotattack.org/ -CVE-2017-13100 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13101 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13102 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13104 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13105 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13106 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13107 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13108 - https://www.kb.cert.org/vuls/id/787952 -CVE-2017-13129 - http://seclists.org/bugtraq/2017/Sep/19 -CVE-2017-13129 - http://seclists.org/fulldisclosure/2017/Sep/38 -CVE-2017-13135 - https://github.com/ebel34/bpg-web-encoder/issues/1 -CVE-2017-13136 - https://github.com/ebel34/bpg-web-encoder/issues/1 -CVE-2017-13137 - https://packetstormsecurity.com/files/143116/WordPress-FormCraft-Basic-1.0.5-SQL-Injection.html -CVE-2017-13138 - https://wpvulndb.com/vulnerabilities/8892 -CVE-2017-13143 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870012 -CVE-2017-13143 - https://github.com/ImageMagick/ImageMagick/issues/362 -CVE-2017-13147 - https://sourceforge.net/p/graphicsmagick/bugs/446/ -CVE-2017-13156 - http://packetstormsecurity.com/files/155189/Android-Janus-APK-Signature-Bypass.html -CVE-2017-13166 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-13168 - https://usn.ubuntu.com/3753-2/ -CVE-2017-13168 - https://usn.ubuntu.com/3820-1/ -CVE-2017-13168 - https://usn.ubuntu.com/3822-1/ -CVE-2017-13189 - https://android.googlesource.com/platform/external/libavc/+/5acaa6fc86c73a750e5f4900c4e2d44bf22f683a -CVE-2017-13194 - https://android.googlesource.com/platform/external/libvpx/+/55cd1dd7c8d0a3de907d22e0f12718733f4e41d9 -CVE-2017-13200 - https://android.googlesource.com/platform/frameworks/av/+/dd3ca4d6b81a9ae2ddf358b7b93d2f8c010921f5 -CVE-2017-13203 - https://android.googlesource.com/platform/external/libavc/+/e86d3cfd2bc28dac421092106751e5638d54a848 -CVE-2017-13204 - https://android.googlesource.com/platform/external/libavc/+/42cf02965b11c397dd37a0063e683cef005bc0ae -CVE-2017-13209 - https://www.exploit-db.com/exploits/43513/ -CVE-2017-13216 - https://www.exploit-db.com/exploits/43464/ -CVE-2017-13218 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-13220 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51bda2bca53b265715ca1852528f38dc67429d9a -CVE-2017-13236 - https://www.exploit-db.com/exploits/43996/ -CVE-2017-13253 - https://www.exploit-db.com/exploits/44291/ -CVE-2017-13258 - https://www.exploit-db.com/exploits/44326/ -CVE-2017-13258 - https://www.exploit-db.com/exploits/44327/ -CVE-2017-13260 - https://www.exploit-db.com/exploits/44326/ -CVE-2017-13260 - https://www.exploit-db.com/exploits/44327/ -CVE-2017-13261 - https://www.exploit-db.com/exploits/44326/ -CVE-2017-13261 - https://www.exploit-db.com/exploits/44327/ -CVE-2017-13262 - https://www.exploit-db.com/exploits/44326/ -CVE-2017-13262 - https://www.exploit-db.com/exploits/44327/ -CVE-2017-13648 - https://sourceforge.net/p/graphicsmagick/bugs/433/ -CVE-2017-13692 - https://github.com/htacg/tidy-html5/issues/588 -CVE-2017-13695 - https://usn.ubuntu.com/3696-1/ -CVE-2017-13696 - https://www.exploit-db.com/exploits/42557 -CVE-2017-13696 - https://www.exploit-db.com/exploits/42558/ -CVE-2017-13696 - https://www.exploit-db.com/exploits/42559/ -CVE-2017-13696 - https://www.exploit-db.com/exploits/42560/ -CVE-2017-13704 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-13704 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-13706 - http://packetstormsecurity.com/files/144527/Lansweeper-6.0.100.29-XXE-Injection.html -CVE-2017-13706 - http://seclists.org/fulldisclosure/2017/Oct/14 -CVE-2017-13708 - http://packetstormsecurity.com/files/143949/VX-Search-Enterprise-10.0.14-Buffer-Overflow.html -CVE-2017-13713 - http://packetstormsecurity.com/files/143978/Wireless-Repeater-BE126-Remote-Code-Execution.html -CVE-2017-13713 - https://www.exploit-db.com/exploits/42608/ -CVE-2017-13717 - http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html -CVE-2017-13718 - http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html -CVE-2017-13719 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -CVE-2017-13726 - http://bugzilla.maptools.org/show_bug.cgi?id=2727 -CVE-2017-13727 - http://bugzilla.maptools.org/show_bug.cgi?id=2728 -CVE-2017-13733 - https://bugzilla.redhat.com/show_bug.cgi?id=1484290 -CVE-2017-13734 - https://bugzilla.redhat.com/show_bug.cgi?id=1484291 -CVE-2017-13745 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-13745 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-13754 - http://seclists.org/fulldisclosure/2017/Sep/1 -CVE-2017-13754 - https://www.exploit-db.com/exploits/42610/ -CVE-2017-13754 - https://www.vulnerability-lab.com/get_content.php?id=2074 -CVE-2017-13757 - https://sourceware.org/bugzilla/show_bug.cgi?id=22018 -CVE-2017-13771 - http://packetstormsecurity.com/files/143975/Lexmark-Scan-To-Network-SNF-3.2.9-Information-Disclosure.html -CVE-2017-13771 - http://seclists.org/fulldisclosure/2017/Aug/46 -CVE-2017-13772 - http://packetstormsecurity.com/files/158999/TP-Link-WDR4300-Remote-Code-Execution.html -CVE-2017-13772 - https://www.exploit-db.com/exploits/43022/ -CVE-2017-13772 - https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/ -CVE-2017-13775 - http://openwall.com/lists/oss-security/2017/08/31/3 -CVE-2017-13776 - http://openwall.com/lists/oss-security/2017/08/31/2 -CVE-2017-13777 - http://openwall.com/lists/oss-security/2017/08/31/1 -CVE-2017-13782 - http://packetstormsecurity.com/files/172827/Apple-XNU-Kernel-Memory-Exposure.html -CVE-2017-13783 - https://www.exploit-db.com/exploits/43172/ -CVE-2017-13784 - https://www.exploit-db.com/exploits/43171/ -CVE-2017-13785 - https://www.exploit-db.com/exploits/43170/ -CVE-2017-13791 - https://www.exploit-db.com/exploits/43176/ -CVE-2017-13792 - https://www.exploit-db.com/exploits/43167/ -CVE-2017-13794 - https://www.exploit-db.com/exploits/43174/ -CVE-2017-13795 - https://www.exploit-db.com/exploits/43169/ -CVE-2017-13796 - https://www.exploit-db.com/exploits/43166/ -CVE-2017-13797 - https://www.exploit-db.com/exploits/43168/ -CVE-2017-13798 - https://www.exploit-db.com/exploits/43175/ -CVE-2017-13802 - https://www.exploit-db.com/exploits/43173/ -CVE-2017-13847 - https://www.exploit-db.com/exploits/43326/ -CVE-2017-13849 - https://www.exploit-db.com/exploits/43161/ -CVE-2017-13855 - https://www.exploit-db.com/exploits/43318/ -CVE-2017-13861 - http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html -CVE-2017-13861 - https://www.exploit-db.com/exploits/43320/ -CVE-2017-13865 - https://www.exploit-db.com/exploits/43321/ -CVE-2017-13867 - https://www.exploit-db.com/exploits/43328/ -CVE-2017-13868 - https://github.com/bazad/ctl_ctloutput-leak -CVE-2017-13869 - https://www.exploit-db.com/exploits/43319/ -CVE-2017-13872 - https://www.exploit-db.com/exploits/43201/ -CVE-2017-13872 - https://www.exploit-db.com/exploits/43248/ -CVE-2017-13875 - https://www.exploit-db.com/exploits/43327/ -CVE-2017-13876 - https://www.exploit-db.com/exploits/43325/ -CVE-2017-13878 - https://www.exploit-db.com/exploits/43780/ -CVE-2017-13904 - http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html -CVE-2017-14016 - https://www.exploit-db.com/exploits/43340/ -CVE-2017-14034 - https://github.com/ebel34/bpg-web-encoder/issues/1 -CVE-2017-14039 - https://blogs.gentoo.org/ago/2017/08/28/openjpeg-heap-based-buffer-overflow-in-opj_t2_encode_packet-t2-c/ -CVE-2017-14039 - https://github.com/uclouvain/openjpeg/issues/992 -CVE-2017-14040 - https://blogs.gentoo.org/ago/2017/08/28/openjpeg-invalid-memory-write-in-tgatoimage-convert-c/ -CVE-2017-14040 - https://github.com/uclouvain/openjpeg/issues/995 -CVE-2017-14041 - https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/ -CVE-2017-14041 - https://github.com/uclouvain/openjpeg/issues/997 -CVE-2017-14042 - https://blogs.gentoo.org/ago/2017/08/28/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c-2/ -CVE-2017-14051 - https://usn.ubuntu.com/3583-2/ -CVE-2017-14064 - https://hackerone.com/reports/209949 -CVE-2017-14075 - http://packetstormsecurity.com/files/144045/Jungo-DriverWizard-WinDrive-OOB-Write-Privilege-Escalation.html -CVE-2017-14075 - https://www.exploit-db.com/exploits/42625/ -CVE-2017-14083 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14083-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-ENCRYPTION-KEY-DISCLOSURE.txt -CVE-2017-14083 - http://packetstormsecurity.com/files/144398/TrendMicro-OfficeScan-11.0-XG-12.0-Encryption-Key-Disclosure.html -CVE-2017-14083 - http://seclists.org/fulldisclosure/2017/Sep/90 -CVE-2017-14083 - https://www.exploit-db.com/exploits/42889/ -CVE-2017-14084 - http://packetstormsecurity.com/files/144400/TrendMicro-OfficeScan-11.0-XG-12.0-Man-In-The-Middle.html -CVE-2017-14084 - https://www.exploit-db.com/exploits/42891/ -CVE-2017-14085 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14085-TRENDMICRO-OFFICESCAN-XG-REMOTE-NT-DOMAIN-PHP-INFO-DISCLOSURE.txt -CVE-2017-14085 - http://packetstormsecurity.com/files/144402/TrendMicro-OfficeScan-11.0-XG-12.0-Information-Disclosure.html -CVE-2017-14085 - http://seclists.org/fulldisclosure/2017/Sep/85 -CVE-2017-14085 - https://www.exploit-db.com/exploits/42893/ -CVE-2017-14086 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt -CVE-2017-14086 - http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html -CVE-2017-14086 - http://seclists.org/fulldisclosure/2017/Sep/88 -CVE-2017-14086 - https://www.exploit-db.com/exploits/42892/ -CVE-2017-14087 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt -CVE-2017-14087 - http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html -CVE-2017-14087 - http://seclists.org/fulldisclosure/2017/Sep/86 -CVE-2017-14087 - https://www.exploit-db.com/exploits/42895/ -CVE-2017-14089 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14089-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-MEMORY-CORRUPTION.txt -CVE-2017-14089 - http://packetstormsecurity.com/files/144464/TrendMicro-OfficeScan-11.0-XG-12.0-Memory-Corruption.html -CVE-2017-14089 - http://seclists.org/fulldisclosure/2017/Sep/91 -CVE-2017-14089 - https://www.exploit-db.com/exploits/42920/ -CVE-2017-14090 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities -CVE-2017-14091 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities -CVE-2017-14092 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities -CVE-2017-14093 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities -CVE-2017-14094 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities -CVE-2017-14094 - https://www.exploit-db.com/exploits/43388/ -CVE-2017-14095 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities -CVE-2017-14095 - https://www.exploit-db.com/exploits/43388/ -CVE-2017-14096 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities -CVE-2017-14096 - https://www.exploit-db.com/exploits/43388/ -CVE-2017-14097 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities -CVE-2017-14097 - https://www.exploit-db.com/exploits/43388/ -CVE-2017-14103 - https://blogs.gentoo.org/ago/2017/09/01/graphicsmagick-use-after-free-in-closeblob-blob-c-incomplete-fix-for-cve-2017-11403/ -CVE-2017-14105 - https://github.com/theguly/CVE-2017-14105 -CVE-2017-14106 - https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html -CVE-2017-14107 - https://blogs.gentoo.org/ago/2017/09/01/libzip-memory-allocation-failure-in-_zip_cdir_grow-zip_dirent-c/ -CVE-2017-14108 - https://bugzilla.gnome.org/show_bug.cgi?id=791037 -CVE-2017-14108 - https://cxsecurity.com/issue/WLB-2017090008 -CVE-2017-14108 - https://packetstormsecurity.com/files/143983/libgedit.a-3.22.1-Denial-Of-Service.html -CVE-2017-14115 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ -CVE-2017-14116 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ -CVE-2017-14117 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ -CVE-2017-14120 - http://www.openwall.com/lists/oss-security/2017/08/20/1 -CVE-2017-14120 - https://bugs.debian.org/874059 -CVE-2017-14121 - http://www.openwall.com/lists/oss-security/2017/08/20/1 -CVE-2017-14122 - http://www.openwall.com/lists/oss-security/2017/08/20/1 -CVE-2017-14125 - http://seclists.org/fulldisclosure/2017/Sep/55 -CVE-2017-14125 - https://wpvulndb.com/vulnerabilities/8907 -CVE-2017-14126 - https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html -CVE-2017-14126 - https://www.exploit-db.com/exploits/42618/ -CVE-2017-14128 - https://sourceware.org/bugzilla/show_bug.cgi?id=22059 -CVE-2017-14129 - https://sourceware.org/bugzilla/show_bug.cgi?id=22047 -CVE-2017-14130 - https://sourceware.org/bugzilla/show_bug.cgi?id=22058 -CVE-2017-14132 - https://github.com/mdadams/jasper/issues/147 -CVE-2017-14138 - https://github.com/ImageMagick/ImageMagick/issues/639 -CVE-2017-14139 - https://github.com/ImageMagick/ImageMagick/issues/578 -CVE-2017-14140 - https://usn.ubuntu.com/3583-2/ -CVE-2017-14143 - https://www.exploit-db.com/exploits/43028/ -CVE-2017-14143 - https://www.exploit-db.com/exploits/43876/ -CVE-2017-14147 - http://packetstormsecurity.com/files/144022/FiberHome-Unauthenticated-ADSL-Router-Factory-Reset.html -CVE-2017-14147 - https://www.exploit-db.com/exploits/42649/ -CVE-2017-14151 - https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_mqc_flush-mqc-c/ -CVE-2017-14151 - https://github.com/uclouvain/openjpeg/issues/982 -CVE-2017-14152 - https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c/ -CVE-2017-14152 - https://github.com/uclouvain/openjpeg/commit/4241ae6fbbf1de9658764a80944dc8108f2b4154 -CVE-2017-14152 - https://github.com/uclouvain/openjpeg/issues/985 -CVE-2017-14153 - http://packetstormsecurity.com/files/144046/Jungo-DriverWizard-WinDrive-Overflow.html -CVE-2017-14153 - https://www.exploit-db.com/exploits/42624/ -CVE-2017-14156 - https://usn.ubuntu.com/3583-2/ -CVE-2017-14159 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2017-14160 - http://openwall.com/lists/oss-security/2017/09/21/2 -CVE-2017-14164 - https://blogs.gentoo.org/ago/2017/09/06/heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c-incomplete-fix-for-cve-2017-14152/ -CVE-2017-14164 - https://github.com/uclouvain/openjpeg/issues/991 -CVE-2017-14165 - https://blogs.gentoo.org/ago/2017/09/06/graphicsmagick-memory-allocation-failure-in-magickmalloc-memory-c-2/ -CVE-2017-14166 - https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/ -CVE-2017-14172 - https://github.com/ImageMagick/ImageMagick/issues/715 -CVE-2017-14173 - https://github.com/ImageMagick/ImageMagick/issues/713 -CVE-2017-14174 - https://github.com/ImageMagick/ImageMagick/issues/714 -CVE-2017-14175 - https://github.com/ImageMagick/ImageMagick/issues/712 -CVE-2017-14177 - https://launchpad.net/bugs/1726372 -CVE-2017-14177 - https://usn.ubuntu.com/usn/usn-3480-1 -CVE-2017-14179 - https://launchpad.net/bugs/1726372 -CVE-2017-14179 - https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14179 -CVE-2017-14180 - https://launchpad.net/bugs/1726372 -CVE-2017-14180 - https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14180 -CVE-2017-14180 - https://usn.ubuntu.com/usn/usn-3480-1 -CVE-2017-14181 - https://blogs.gentoo.org/ago/2017/09/07/aacplusenc-null-pointer-dereference-in-deletebitbuffer-bitbuffer-c/ -CVE-2017-14181 - https://github.com/teknoraver/aacplusenc/issues/1 -CVE-2017-14182 - http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html -CVE-2017-14184 - https://fortiguard.com/advisory/FG-IR-17-214 -CVE-2017-14190 - https://fortiguard.com/advisory/FG-IR-17-262 -CVE-2017-14199 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12 -CVE-2017-14201 - https://github.com/zephyrproject-rtos/zephyr/pull/13260 -CVE-2017-14201 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17 -CVE-2017-14202 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18 -CVE-2017-14219 - https://www.exploit-db.com/exploits/42633/ -CVE-2017-14227 - https://bugzilla.redhat.com/show_bug.cgi?id=1489356 -CVE-2017-14229 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-14232 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-14243 - https://www.exploit-db.com/exploits/42739/ -CVE-2017-14244 - https://www.exploit-db.com/exploits/42740/ -CVE-2017-14245 - https://usn.ubuntu.com/4013-1/ -CVE-2017-14246 - https://usn.ubuntu.com/4013-1/ -CVE-2017-14248 - https://github.com/ImageMagick/ImageMagick/issues/717 -CVE-2017-14249 - https://github.com/ImageMagick/ImageMagick/issues/708 -CVE-2017-14257 - https://github.com/axiomatic-systems/Bento4/issues/181 -CVE-2017-14258 - https://github.com/axiomatic-systems/Bento4/issues/181 -CVE-2017-14259 - https://github.com/axiomatic-systems/Bento4/issues/181 -CVE-2017-14260 - https://github.com/axiomatic-systems/Bento4/issues/181 -CVE-2017-14261 - https://github.com/axiomatic-systems/Bento4/issues/181 -CVE-2017-14266 - https://www.exploit-db.com/exploits/42652/ -CVE-2017-14267 - http://seclists.org/fulldisclosure/2017/Sep/13 -CVE-2017-14267 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup -CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/AddProfileCSRFXSSPoc.html -CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFInternetDCPoC.html -CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFPocRedirectSMS.html -CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFPocResetDefaults.html -CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/uploadBinarySettingsCSRFPoC.html -CVE-2017-14268 - http://seclists.org/fulldisclosure/2017/Sep/13 -CVE-2017-14268 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup -CVE-2017-14269 - http://seclists.org/fulldisclosure/2017/Sep/13 -CVE-2017-14269 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup -CVE-2017-14311 - https://www.exploit-db.com/exploits/42735/ -CVE-2017-14312 - https://github.com/NagiosEnterprises/nagioscore/issues/424 -CVE-2017-14313 - https://wpvulndb.com/vulnerabilities/8901 -CVE-2017-14322 - https://www.exploit-db.com/exploits/44513/ -CVE-2017-14324 - https://github.com/ImageMagick/ImageMagick/issues/739 -CVE-2017-14325 - https://github.com/ImageMagick/ImageMagick/issues/741 -CVE-2017-14326 - https://github.com/ImageMagick/ImageMagick/issues/740 -CVE-2017-14339 - https://www.tarlogic.com/blog/fuzzing-yadifa-dns/ -CVE-2017-14341 - https://github.com/ImageMagick/ImageMagick/issues/654 -CVE-2017-14342 - https://github.com/ImageMagick/ImageMagick/issues/650 -CVE-2017-14343 - https://github.com/ImageMagick/ImageMagick/issues/649 -CVE-2017-14344 - http://srcincite.io/advisories/src-2017-0027/ -CVE-2017-14344 - https://www.exploit-db.com/exploits/42665/ -CVE-2017-14355 - https://www.exploit-db.com/exploits/43857/ -CVE-2017-14400 - https://github.com/ImageMagick/ImageMagick/issues/746 -CVE-2017-14406 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-null-pointer-dereference-in-sync_buffer-mpglibdblinterface-c/ -CVE-2017-14407 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-filteryule-gain_analysis-c/ -CVE-2017-14408 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-dct36-mpglibdbllayer3-c/ -CVE-2017-14409 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_dequantize_sample-mpglibdbllayer3-c/ -CVE-2017-14410 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_i_stereo-mpglibdbllayer3-c/ -CVE-2017-14411 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-copy_mp-mpglibdblinterface-c/ -CVE-2017-14412 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-invalid-memory-write-in-copy_mp-mpglibdblinterface-c/ -CVE-2017-14432 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 -CVE-2017-14433 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 -CVE-2017-14434 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 -CVE-2017-14435 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 -CVE-2017-14436 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 -CVE-2017-14437 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 -CVE-2017-14438 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0487 -CVE-2017-14439 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0487 -CVE-2017-14443 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0492 -CVE-2017-14444 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0493 -CVE-2017-14445 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0494 -CVE-2017-14446 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0495 -CVE-2017-14447 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0496 -CVE-2017-14451 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0500 -CVE-2017-14452 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 -CVE-2017-14453 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 -CVE-2017-14454 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502 -CVE-2017-14455 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 -CVE-2017-14458 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0506 -CVE-2017-14459 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0507 -CVE-2017-14460 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0508 -CVE-2017-14461 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510 -CVE-2017-14461 - https://usn.ubuntu.com/3587-2/ -CVE-2017-14462 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14463 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14464 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14465 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14466 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14467 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14468 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14469 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14470 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14471 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14472 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14473 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -CVE-2017-14482 - http://www.openwall.com/lists/oss-security/2017/09/11/1 -CVE-2017-14482 - https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28350 -CVE-2017-14489 - https://usn.ubuntu.com/3583-2/ -CVE-2017-14489 - https://www.exploit-db.com/exploits/42932/ -CVE-2017-14491 - http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html -CVE-2017-14491 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-14491 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-14491 - https://www.exploit-db.com/exploits/42941/ -CVE-2017-14492 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-14492 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-14492 - https://www.exploit-db.com/exploits/42942/ -CVE-2017-14493 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-14493 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-14493 - https://www.exploit-db.com/exploits/42943/ -CVE-2017-14494 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-14494 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-14494 - https://www.exploit-db.com/exploits/42944/ -CVE-2017-14495 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-14495 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-14495 - https://www.exploit-db.com/exploits/42945/ -CVE-2017-14496 - http://thekelleys.org.uk/dnsmasq/CHANGELOG -CVE-2017-14496 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -CVE-2017-14496 - https://www.exploit-db.com/exploits/42946/ -CVE-2017-14498 - http://lists.openwall.net/full-disclosure/2017/09/14/2 -CVE-2017-14506 - http://baraktawily.blogspot.co.il/2017/09/gem-in-box-xss-vulenrability-cve-2017.html -CVE-2017-14507 - https://wpvulndb.com/vulnerabilities/8921 -CVE-2017-14507 - https://www.exploit-db.com/exploits/42794/ -CVE-2017-14508 - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ -CVE-2017-14509 - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ -CVE-2017-14510 - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ -CVE-2017-14513 - https://github.com/phantom0301/vulns/blob/master/Metinfo2.md -CVE-2017-14516 - https://blogs.sap.com/2017/06/13/sap-security-patch-day-june2017/ -CVE-2017-14517 - https://bugs.freedesktop.org/show_bug.cgi?id=102687 -CVE-2017-14518 - https://bugs.freedesktop.org/show_bug.cgi?id=102688 -CVE-2017-14519 - https://bugs.freedesktop.org/show_bug.cgi?id=102701 -CVE-2017-14520 - https://bugs.freedesktop.org/show_bug.cgi?id=102719 -CVE-2017-14521 - https://www.exploit-db.com/exploits/43963/ -CVE-2017-14523 - https://www.exploit-db.com/exploits/43964/ -CVE-2017-14524 - http://seclists.org/fulldisclosure/2017/Sep/57 -CVE-2017-14525 - http://seclists.org/fulldisclosure/2017/Sep/57 -CVE-2017-14528 - http://bugzilla.maptools.org/show_bug.cgi?id=2730 -CVE-2017-14529 - https://sourceware.org/bugzilla/show_bug.cgi?id=22113 -CVE-2017-14530 - https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html -CVE-2017-14530 - https://github.com/cybersecurityworks/Disclosed/issues/9 -CVE-2017-14533 - https://github.com/ImageMagick/ImageMagick/issues/648 -CVE-2017-14535 - http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html -CVE-2017-14535 - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ -CVE-2017-14535 - https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t -CVE-2017-14536 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-cross-site-scripting-vulnerabilities/ -CVE-2017-14537 - http://packetstormsecurity.com/files/162853/Trixbox-2.8.0.4-Path-Traversal.html -CVE-2017-14537 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ -CVE-2017-14572 - https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14572 -CVE-2017-14596 - https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/ -CVE-2017-14600 - https://github.com/delta/pragyan/issues/228 -CVE-2017-14601 - https://github.com/delta/pragyan/issues/228 -CVE-2017-14604 - https://bugzilla.gnome.org/show_bug.cgi?id=777991 -CVE-2017-14604 - https://github.com/freedomofpress/securedrop/issues/2238 -CVE-2017-14604 - https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/ -CVE-2017-1461 - http://www.ibm.com/support/docview.wss?uid=swg22010321 -CVE-2017-14615 - http://seclists.org/bugtraq/2017/Sep/22 -CVE-2017-14617 - https://bugs.freedesktop.org/show_bug.cgi?id=102854 -CVE-2017-14618 - https://packetstormsecurity.com/files/144280/phpMyFAQ-2.9.8-Cross-Site-Scripting.html -CVE-2017-14618 - https://www.exploit-db.com/exploits/42761/ -CVE-2017-14619 - https://packetstormsecurity.com/files/144603/phpMyFAQ-2.9.8-Cross-Site-Scripting.html -CVE-2017-14619 - https://www.exploit-db.com/exploits/42987/ -CVE-2017-14620 - http://xss.cx/cve/2017/14620/smarterstats.v11-3-6347.html -CVE-2017-14620 - https://www.exploit-db.com/exploits/42923/ -CVE-2017-14622 - https://packetstormsecurity.com/files/144261/WordPress-2kb-Amazon-Affiliates-Store-2.1.0-Cross-Site-Scripting.html -CVE-2017-14627 - https://www.exploit-db.com/exploits/42777/ -CVE-2017-14627 - https://www.exploit-db.com/exploits/45985/ -CVE-2017-14628 - https://github.com/pts/sam2p/issues/14 -CVE-2017-14629 - https://github.com/pts/sam2p/issues/14 -CVE-2017-14630 - https://github.com/pts/sam2p/issues/14 -CVE-2017-14631 - https://github.com/pts/sam2p/issues/14 -CVE-2017-14634 - https://usn.ubuntu.com/4013-1/ -CVE-2017-14636 - https://github.com/pts/sam2p/issues/14 -CVE-2017-14637 - https://github.com/pts/sam2p/issues/14 -CVE-2017-14638 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_atomsettype-ap4atom-h/ -CVE-2017-14638 - https://github.com/axiomatic-systems/Bento4/issues/182 -CVE-2017-14639 - https://blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-underflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/ -CVE-2017-14639 - https://github.com/axiomatic-systems/Bento4/issues/190 -CVE-2017-14640 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_atomsampletablegetsample-ap4atomsampletable-cpp/ -CVE-2017-14640 - https://github.com/axiomatic-systems/Bento4/issues/183 -CVE-2017-14641 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_dataatomap4_dataatom-ap4metadata-cpp/ -CVE-2017-14641 - https://github.com/axiomatic-systems/Bento4/issues/184 -CVE-2017-14642 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_stdcfilebytestreamreadpartial-ap4stdcfilebytestream-cpp/ -CVE-2017-14642 - https://github.com/axiomatic-systems/Bento4/issues/185 -CVE-2017-14643 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_bytestouint32be-ap4utils-h/ -CVE-2017-14643 - https://github.com/axiomatic-systems/Bento4/issues/187 -CVE-2017-14644 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_hdlratomap4_hdlratom-ap4hdlratom-cpp/ -CVE-2017-14645 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_bitstreamreadbytes-ap4bitstream-cpp/ -CVE-2017-14646 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_databuffersetdata-ap4databuffer-cpp/ -CVE-2017-14646 - https://github.com/axiomatic-systems/Bento4/issues/188 -CVE-2017-14647 - https://blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-overflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/ -CVE-2017-14649 - https://blogs.gentoo.org/ago/2017/09/19/graphicsmagick-assertion-failure-in-pixel_cache-c/ -CVE-2017-14650 - https://github.com/horde/horde/commit/eb3afd14c22c77ae0d29e2848f5ac726ef6e7c5b -CVE-2017-14651 - https://cybersecurityworks.com/zerodays/cve-2017-14651-wso2.html -CVE-2017-14651 - https://github.com/cybersecurityworks/Disclosed/issues/15 -CVE-2017-14652 - http://adrianhayter.com/exploits.php -CVE-2017-14680 - http://seclists.org/bugtraq/2017/Sep/20 -CVE-2017-14680 - http://seclists.org/fulldisclosure/2017/Sep/39 -CVE-2017-14683 - http://baraktawily.blogspot.co.il/2017/09/gem-in-box-xss-vulenrability-cve-2017.html -CVE-2017-14684 - https://github.com/ImageMagick/ImageMagick/issues/770 -CVE-2017-14685 - https://bugs.ghostscript.com/show_bug.cgi?id=698539 -CVE-2017-14686 - https://bugs.ghostscript.com/show_bug.cgi?id=698540 -CVE-2017-14687 - https://bugs.ghostscript.com/show_bug.cgi?id=698558 -CVE-2017-14702 - https://github.com/wshepherd0010/advisories/blob/master/CVE-2017-14702.md -CVE-2017-14702 - https://www.exploit-db.com/exploits/42952/ -CVE-2017-14703 - https://www.exploit-db.com/exploits/42772/ -CVE-2017-14704 - https://www.exploit-db.com/exploits/42773/ -CVE-2017-14705 - https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/ -CVE-2017-14706 - https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/ -CVE-2017-14712 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -CVE-2017-14712 - https://www.exploit-db.com/exploits/42950/ -CVE-2017-14713 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -CVE-2017-14714 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -CVE-2017-14715 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -CVE-2017-14716 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -CVE-2017-14717 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -CVE-2017-14717 - https://www.exploit-db.com/exploits/42950/ -CVE-2017-14719 - https://wpvulndb.com/vulnerabilities/8911 -CVE-2017-14722 - https://wpvulndb.com/vulnerabilities/8912 -CVE-2017-14723 - https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e -CVE-2017-14724 - https://wpvulndb.com/vulnerabilities/8913 -CVE-2017-14725 - https://wpvulndb.com/vulnerabilities/8910 -CVE-2017-14726 - https://wpvulndb.com/vulnerabilities/8914 -CVE-2017-14729 - https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/ -CVE-2017-14730 - https://github.com/gentoo/gentoo/pull/5665 -CVE-2017-14731 - https://github.com/libofx/libofx/issues/10 -CVE-2017-14735 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-14735 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-14735 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2017-14735 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-14735 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2017-14735 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-14738 - https://www.exploit-db.com/exploits/42922/ -CVE-2017-14742 - https://www.exploit-db.com/exploits/43236/ -CVE-2017-14743 - https://medium.com/iotsploit/faleemi-fsc-880-multiple-security-vulnerabilities-ed1d132c2cce -CVE-2017-14745 - https://sourceware.org/bugzilla/show_bug.cgi?id=22148 -CVE-2017-14748 - https://us.battle.net/forums/en/overwatch/topic/20759216554 -CVE-2017-14749 - https://github.com/jerryscript-project/jerryscript/issues/2008 -CVE-2017-14757 - https://www.exploit-db.com/exploits/42939/ -CVE-2017-14758 - https://www.exploit-db.com/exploits/42940/ -CVE-2017-14766 - https://limbenjamin.com/articles/simple-student-result-auth-bypass.html -CVE-2017-14766 - https://wpvulndb.com/vulnerabilities/8920 -CVE-2017-14767 - https://github.com/FFmpeg/FFmpeg/commit/c42a1388a6d1bfd8001bf6a4241d8ca27e49326d -CVE-2017-14770 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf -CVE-2017-14771 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf -CVE-2017-14772 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf -CVE-2017-14773 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf -CVE-2017-14795 - https://github.com/leonzhao7/vulnerability/blob/master/An%20Out-of-Bounds%20Read%20%28DoS%29%20Vulnerability%20in%20hevc.c%20of%20libbpg.md -CVE-2017-14796 - https://github.com/leonzhao7/vulnerability/blob/master/An%20integer%20underflow%20vulnerability%20in%20sao_filter_CTB%20of%20libbpg.md -CVE-2017-14798 - https://bugzilla.suse.com/show_bug.cgi?id=1062722 -CVE-2017-14798 - https://www.exploit-db.com/exploits/45184/ -CVE-2017-14838 - https://www.exploit-db.com/exploits/42795/ -CVE-2017-14839 - https://www.exploit-db.com/exploits/42797/ -CVE-2017-14840 - https://www.exploit-db.com/exploits/42796/ -CVE-2017-14841 - https://www.exploit-db.com/exploits/42799/ -CVE-2017-14842 - https://www.exploit-db.com/exploits/42798/ -CVE-2017-14843 - https://www.exploit-db.com/exploits/42804/ -CVE-2017-14844 - https://www.exploit-db.com/exploits/42801/ -CVE-2017-14845 - https://www.exploit-db.com/exploits/42800/ -CVE-2017-14846 - https://www.exploit-db.com/exploits/42802/ -CVE-2017-14847 - https://www.exploit-db.com/exploits/42805/ -CVE-2017-14848 - https://wpvulndb.com/vulnerabilities/8929 -CVE-2017-14848 - https://www.exploit-db.com/exploits/42924/ -CVE-2017-14857 - https://bugzilla.redhat.com/show_bug.cgi?id=1495043 -CVE-2017-14858 - https://bugzilla.redhat.com/show_bug.cgi?id=1494782 -CVE-2017-14859 - https://bugzilla.redhat.com/show_bug.cgi?id=1494780 -CVE-2017-14860 - https://bugzilla.redhat.com/show_bug.cgi?id=1494776 -CVE-2017-14861 - https://bugzilla.redhat.com/show_bug.cgi?id=1494787 -CVE-2017-14862 - https://bugzilla.redhat.com/show_bug.cgi?id=1494786 -CVE-2017-14863 - https://bugzilla.redhat.com/show_bug.cgi?id=1494443 -CVE-2017-14864 - https://bugzilla.redhat.com/show_bug.cgi?id=1494467 -CVE-2017-14865 - https://bugzilla.redhat.com/show_bug.cgi?id=1494778 -CVE-2017-14866 - https://bugzilla.redhat.com/show_bug.cgi?id=1494781 -CVE-2017-14904 - https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html -CVE-2017-14926 - https://bugs.freedesktop.org/show_bug.cgi?id=102601 -CVE-2017-14927 - https://bugs.freedesktop.org/show_bug.cgi?id=102604 -CVE-2017-14928 - https://bugs.freedesktop.org/show_bug.cgi?id=102607 -CVE-2017-14929 - https://bugs.freedesktop.org/show_bug.cgi?id=102969 -CVE-2017-14930 - https://sourceware.org/bugzilla/show_bug.cgi?id=22191 -CVE-2017-14931 - http://seclists.org/fulldisclosure/2017/Sep/34 -CVE-2017-14931 - https://github.com/skysider/openexif_vulnerabilities -CVE-2017-14932 - https://sourceware.org/bugzilla/show_bug.cgi?id=22204 -CVE-2017-14933 - https://sourceware.org/bugzilla/show_bug.cgi?id=22210 -CVE-2017-14934 - https://sourceware.org/bugzilla/show_bug.cgi?id=22219 -CVE-2017-14937 - https://www.researchgate.net/publication/321183727_Security_Evaluation_of_an_Airbag-ECU_by_Reusing_Threat_Modeling_Artefacts -CVE-2017-14938 - http://www.securityfocus.com/bid/101212 -CVE-2017-14938 - https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/ -CVE-2017-14939 - https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/ -CVE-2017-14939 - https://www.exploit-db.com/exploits/42970/ -CVE-2017-14940 - https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/ -CVE-2017-14942 - https://www.exploit-db.com/exploits/42916/ -CVE-2017-14945 - https://bugs.ghostscript.com/show_bug.cgi?id=698537 -CVE-2017-14946 - https://bugs.ghostscript.com/show_bug.cgi?id=698538 -CVE-2017-14947 - https://bugs.ghostscript.com/show_bug.cgi?id=698551 -CVE-2017-14952 - http://bugs.icu-project.org/trac/changeset/40324/trunk/icu4c/source/i18n/zonemeta.cpp -CVE-2017-14953 - http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html -CVE-2017-14955 - https://www.exploit-db.com/exploits/43021/ -CVE-2017-14956 - http://packetstormsecurity.com/files/144617/AlienVault-USM-5.4.2-Cross-Site-Request-Forgery.html -CVE-2017-14956 - https://www.exploit-db.com/exploits/42988/ -CVE-2017-14960 - http://seclists.org/fulldisclosure/2018/Jan/6 -CVE-2017-14960 - https://www.exploit-db.com/exploits/43422/ -CVE-2017-14961 - http://packetstormsecurity.com/files/144955/IKARUS-AntiVirus-2.16.7-Privilege-Escalation.html -CVE-2017-14961 - https://www.exploit-db.com/exploits/43139/ -CVE-2017-14977 - https://bugs.freedesktop.org/show_bug.cgi?id=103045 -CVE-2017-14979 - https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php -CVE-2017-14980 - http://packetstormsecurity.com/files/144452/Sync-Breeze-Enterprise-10.0.28-Buffer-Overflow.html -CVE-2017-14981 - https://github.com/atutor/ATutor/issues/135 -CVE-2017-14988 - https://github.com/openexr/openexr/issues/248 -CVE-2017-14994 - https://nandynarwhals.org/CVE-2017-14994/ -CVE-2017-14994 - https://sourceforge.net/p/graphicsmagick/bugs/512/ -CVE-2017-15008 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b -CVE-2017-15009 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b -CVE-2017-15011 - https://hackinparis.com/data/slides/2017/2017_Cohen_Gil_The_forgotten_interface_Windows_named_pipes.pdf -CVE-2017-15011 - https://www.youtube.com/watch?v=m6zISgWPGGY -CVE-2017-15012 - https://www.exploit-db.com/exploits/43003/ -CVE-2017-15013 - https://www.exploit-db.com/exploits/43004/ -CVE-2017-15014 - https://www.exploit-db.com/exploits/43005/ -CVE-2017-15020 - https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/ -CVE-2017-15021 - https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/ -CVE-2017-15022 - https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/ -CVE-2017-15023 - https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/ -CVE-2017-15024 - https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/ -CVE-2017-15025 - https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/ -CVE-2017-15035 - https://www.7elements.co.uk/resources/technical-advisories/pyrobatchftp-buffer-overflow-seh-overwrite/ -CVE-2017-15035 - https://www.exploit-db.com/exploits/42962/ -CVE-2017-15043 - https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/swi-psa-2018-003-technical-bulletin-reaper/ -CVE-2017-15045 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-15045 -CVE-2017-15048 - http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html -CVE-2017-15048 - https://www.exploit-db.com/exploits/43355/ -CVE-2017-15049 - http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html -CVE-2017-15049 - http://seclists.org/fulldisclosure/2017/Dec/47 -CVE-2017-15049 - https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt -CVE-2017-15049 - https://www.exploit-db.com/exploits/43354/ -CVE-2017-15051 - http://blog.amossys.fr/teampass-multiple-cve-01.html -CVE-2017-15052 - http://blog.amossys.fr/teampass-multiple-cve-01.html -CVE-2017-15053 - http://blog.amossys.fr/teampass-multiple-cve-01.html -CVE-2017-15054 - http://blog.amossys.fr/teampass-multiple-cve-01.html -CVE-2017-15055 - http://blog.amossys.fr/teampass-multiple-cve-01.html -CVE-2017-15056 - https://github.com/upx/upx/issues/128 -CVE-2017-15063 - https://github.com/intelliants/subrion/issues/570 -CVE-2017-15081 - http://w00troot.blogspot.in/2017/10/php-melody-2.html -CVE-2017-15081 - https://www.exploit-db.com/exploits/43062/ -CVE-2017-15095 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-15095 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-15095 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-15095 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-15102 - https://usn.ubuntu.com/3583-2/ -CVE-2017-15115 - https://usn.ubuntu.com/3581-1/ -CVE-2017-15115 - https://usn.ubuntu.com/3582-1/ -CVE-2017-15115 - https://usn.ubuntu.com/3583-2/ -CVE-2017-15118 - https://www.exploit-db.com/exploits/43194/ -CVE-2017-15130 - https://usn.ubuntu.com/3587-2/ -CVE-2017-15134 - https://pagure.io/389-ds-base/c/6aa2acdc3cad9 -CVE-2017-1515 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-1516 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-15185 - http://seclists.org/fulldisclosure/2017/Jul/82 -CVE-2017-15185 - https://www.exploit-db.com/exploits/42399/ -CVE-2017-15216 - https://www.misp.software/Changelog.txt -CVE-2017-15218 - http://www.securityfocus.com/bid/101233 -CVE-2017-15220 - https://www.exploit-db.com/exploits/42973/ -CVE-2017-15221 - http://packetstormsecurity.com/files/144590/ASX-To-MP3-3.1.3.7-Buffer-Overflow.html -CVE-2017-15221 - http://packetstormsecurity.com/files/154788/ASX-To-MP3-Converter-3.1.3.7-Stack-Overflow.html -CVE-2017-15221 - https://www.exploit-db.com/exploits/42974/ -CVE-2017-15222 - https://www.exploit-db.com/exploits/43025/ -CVE-2017-15222 - https://www.exploit-db.com/exploits/43448/ -CVE-2017-15222 - https://www.exploit-db.com/exploits/46070/ -CVE-2017-15223 - https://www.exploit-db.com/exploits/43026/ -CVE-2017-15225 - https://sourceware.org/bugzilla/show_bug.cgi?id=22212 -CVE-2017-15232 - https://github.com/mozilla/mozjpeg/issues/268 -CVE-2017-15265 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-15265 - https://usn.ubuntu.com/3698-1/ -CVE-2017-15265 - https://usn.ubuntu.com/3698-2/ -CVE-2017-15265 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-15266 - https://bugzilla.redhat.com/show_bug.cgi?id=1499599 -CVE-2017-15267 - https://bugzilla.redhat.com/show_bug.cgi?id=1499600 -CVE-2017-15269 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html -CVE-2017-15270 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html -CVE-2017-15270 - https://www.exploit-db.com/exploits/43144/ -CVE-2017-15271 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html -CVE-2017-15271 - https://www.exploit-db.com/exploits/43144/ -CVE-2017-15272 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html -CVE-2017-15274 - https://usn.ubuntu.com/3583-2/ -CVE-2017-15276 - https://www.exploit-db.com/exploits/43002/ -CVE-2017-15277 - https://hackerone.com/reports/302885 -CVE-2017-15284 - https://packetstormsecurity.com/files/144587/OctoberCMS-1.0.425-Cross-Site-Scripting.html -CVE-2017-15284 - https://www.exploit-db.com/exploits/42978/ -CVE-2017-15286 - https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md -CVE-2017-15287 - https://www.exploit-db.com/exploits/42986/ -CVE-2017-15288 - https://github.com/scala/scala/pull/6108 -CVE-2017-15291 - https://www.exploit-db.com/exploits/43023/ -CVE-2017-15293 - https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/ -CVE-2017-15295 - https://erpscan.io/advisories/erpscan-17-033-sap-pos-missing-authentication-xpressserver/ -CVE-2017-15296 - https://erpscan.io/advisories/erpscan-17-036-csrf-sap-java-crm/ -CVE-2017-15305 - https://github.com/C0der1iu/Nexusphppoc/blob/master/xss2.txt -CVE-2017-15312 - http://www.huawei.com/en/psirt/security-notices/huawei-sn-20171201-01-smartcare-en -CVE-2017-15313 - http://www.huawei.com/en/psirt/security-notices/huawei-sn-20171201-01-smartcare-en -CVE-2017-1532 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-15357 - https://www.exploit-db.com/exploits/43218/ -CVE-2017-15358 - https://www.exploit-db.com/exploits/45107/ -CVE-2017-15359 - https://www.exploit-db.com/exploits/42991/ -CVE-2017-15360 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b -CVE-2017-15361 - https://www.kb.cert.org/vuls/id/307015 -CVE-2017-15363 - https://extensions.typo3.org/extension/download/restler/1.7.1/zip/ -CVE-2017-15365 - https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/ -CVE-2017-15367 - https://www.exploit-db.com/exploits/44272/ -CVE-2017-15369 - https://bugs.ghostscript.com/show_bug.cgi?id=698592 -CVE-2017-15370 - https://bugzilla.redhat.com/show_bug.cgi?id=1500554 -CVE-2017-15371 - https://bugzilla.redhat.com/show_bug.cgi?id=1500570 -CVE-2017-15372 - https://bugzilla.redhat.com/show_bug.cgi?id=1500553 -CVE-2017-15373 - https://www.exploit-db.com/exploits/42979/ -CVE-2017-15374 - https://www.exploit-db.com/exploits/43849/ -CVE-2017-15374 - https://www.vulnerability-lab.com/get_content.php?id=1922 -CVE-2017-15375 - https://www.vulnerability-lab.com/get_content.php?id=1941 -CVE-2017-15376 - https://www.vulnerability-lab.com/get_content.php?id=2097 -CVE-2017-15378 - https://www.exploit-db.com/exploits/42981/ -CVE-2017-15379 - https://www.exploit-db.com/exploits/42980/ -CVE-2017-15380 - https://www.exploit-db.com/exploits/42983/ -CVE-2017-15381 - https://www.exploit-db.com/exploits/42982/ -CVE-2017-15383 - https://cxsecurity.com/issue/WLB-2016110092 -CVE-2017-15383 - https://packetstormsecurity.com/files/139658/Nero-7.10.1.0-Privilege-Escalation.html -CVE-2017-15384 - https://cxsecurity.com/issue/WLB-2016110122 -CVE-2017-15384 - https://packetstormsecurity.com/files/139696/ratemephp-xss.txt -CVE-2017-15396 - http://bugs.icu-project.org/trac/changeset/40494 -CVE-2017-1540 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-1545 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-1546 - http://www.ibm.com/support/docview.wss?uid=swg22010321 -CVE-2017-15539 - https://github.com/imsebao/404team/blob/master/zorovavi-blog-sql-injection.md -CVE-2017-15565 - https://bugs.freedesktop.org/show_bug.cgi?id=103016 -CVE-2017-15580 - http://0day.today/exploits/28864 -CVE-2017-15580 - https://cxsecurity.com/issue/WLB-2017100187 -CVE-2017-15580 - https://packetstormsecurity.com/files/144747/osticket1101-shell.txt -CVE-2017-15580 - https://www.exploit-db.com/exploits/45169/ -CVE-2017-15588 - https://xenbits.xen.org/xsa/advisory-241.html -CVE-2017-15595 - https://www.exploit-db.com/exploits/43014/ -CVE-2017-1560 - http://www.ibm.com/support/docview.wss?uid=swg22010321 -CVE-2017-15600 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html -CVE-2017-15600 - https://bugzilla.redhat.com/show_bug.cgi?id=1501695 -CVE-2017-15601 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html -CVE-2017-15602 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html -CVE-2017-15613 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15614 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15615 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15616 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15617 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15618 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15619 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15620 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15621 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15622 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15623 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15624 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15625 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15626 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15627 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15628 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15629 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-1563 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-15630 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15631 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15632 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15633 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15634 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15635 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15636 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15637 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -CVE-2017-15639 - https://www.exploit-db.com/exploits/43045/ -CVE-2017-15642 - https://sourceforge.net/p/sox/bugs/297/ -CVE-2017-15649 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e -CVE-2017-15651 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b -CVE-2017-15653 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html -CVE-2017-15653 - http://seclists.org/fulldisclosure/2018/Jan/63 -CVE-2017-15654 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html -CVE-2017-15654 - http://seclists.org/fulldisclosure/2018/Jan/63 -CVE-2017-15655 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html -CVE-2017-15655 - http://seclists.org/fulldisclosure/2018/Jan/63 -CVE-2017-15655 - http://sploit.tech/2018/01/16/ASUS-part-I.html -CVE-2017-15656 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html -CVE-2017-15656 - http://seclists.org/fulldisclosure/2018/Jan/63 -CVE-2017-15662 - http://packetstormsecurity.com/files/145764/VX-Search-Enterprise-10.1.12-Denial-Of-Service.html -CVE-2017-15662 - https://www.exploit-db.com/exploits/43451/ -CVE-2017-15663 - http://packetstormsecurity.com/files/145763/Disk-Pulse-Enterprise-10.1.18-Denial-Of-Service.html -CVE-2017-15663 - https://www.exploit-db.com/exploits/43452/ -CVE-2017-15663 - https://www.exploit-db.com/exploits/43589/ -CVE-2017-15664 - http://packetstormsecurity.com/files/145760/Sync-Breeze-Enterprise-10.1.16-Denial-Of-Service.html -CVE-2017-15664 - https://www.exploit-db.com/exploits/43453/ -CVE-2017-15665 - http://packetstormsecurity.com/files/145756/DiskBoss-Enterprise-8.5.12-Denial-Of-Service.html -CVE-2017-15665 - https://www.exploit-db.com/exploits/43454/ -CVE-2017-15667 - https://www.exploit-db.com/exploits/43403/ -CVE-2017-1567 - http://www.ibm.com/support/docview.wss?uid=swg22012789 -CVE-2017-15673 - http://packetstormsecurity.com/files/145096/CSC-Cart-4.6.2-Shell-Upload.html -CVE-2017-15680 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15681 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15682 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15683 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15684 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15685 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15686 - https://docs.craftercms.org/en/3.0/security/advisory.html -CVE-2017-15687 - https://www.exploit-db.com/exploits/43024/ -CVE-2017-15706 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-15707 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-15708 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2017-15708 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-15715 - https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html -CVE-2017-15727 - https://www.exploit-db.com/exploits/43063/ -CVE-2017-15730 - https://www.exploit-db.com/exploits/43064/ -CVE-2017-15805 - https://www.fwhibbit.es/lfi-en-cisco-small-business-sa500-series-cuando-la-seguridad-de-tu-red-esta-hecha-un-cisco -CVE-2017-15806 - https://www.exploit-db.com/exploits/43155/ -CVE-2017-15810 - https://packetstormsecurity.com/files/144583/WordPress-PopCash.Net-Publisher-Code-Integration-1.0-Cross-Site-Scripting.html -CVE-2017-15810 - https://wpvulndb.com/vulnerabilities/8936 -CVE-2017-15811 - https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html -CVE-2017-15811 - https://wpvulndb.com/vulnerabilities/8930 -CVE-2017-15812 - https://wpvulndb.com/vulnerabilities/8937 -CVE-2017-15841 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-15867 - https://wpvulndb.com/vulnerabilities/8939 -CVE-2017-15868 - https://usn.ubuntu.com/3583-2/ -CVE-2017-15878 - https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html -CVE-2017-15878 - https://www.exploit-db.com/exploits/43054/ -CVE-2017-15879 - https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html -CVE-2017-15879 - https://www.exploit-db.com/exploits/43053/ -CVE-2017-15883 - https://knowledgebase.progress.com/articles/Article/Sitefinity-Security-Advisory-for-cryptographic-vulnerability-CVE-2017-15883 -CVE-2017-15884 - https://www.exploit-db.com/exploits/43222/ -CVE-2017-15885 - https://distributedcompute.com/2017/10/24/axis-2100-network-camera-2-03-xss-vulnerability/ -CVE-2017-15889 - http://packetstormsecurity.com/files/157807/Synology-DiskStation-Manager-smart.cgi-Remote-Command-Execution.html -CVE-2017-15895 - https://www.synology.com/en-global/support/security/Synology_SA_17_71_SRM -CVE-2017-15906 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2017-15911 - https://issues.igniterealtime.org/browse/OF-1417 -CVE-2017-15917 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b -CVE-2017-15918 - https://www.exploit-db.com/exploits/43221/ -CVE-2017-15919 - https://wpvulndb.com/vulnerabilities/8935 -CVE-2017-15920 - http://packetstormsecurity.com/files/144786/Watchdog-Development-Anti-Malware-Online-Security-Pro-NULL-Pointer-Dereference.html -CVE-2017-15920 - https://www.exploit-db.com/exploits/43058/ -CVE-2017-15921 - http://packetstormsecurity.com/files/144786/Watchdog-Development-Anti-Malware-Online-Security-Pro-NULL-Pointer-Dereference.html -CVE-2017-15921 - https://www.exploit-db.com/exploits/43058/ -CVE-2017-15922 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html -CVE-2017-15924 - http://openwall.com/lists/oss-security/2017/10/13/2 -CVE-2017-15924 - https://github.com/shadowsocks/shadowsocks-libev/issues/1734 -CVE-2017-15924 - https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/ -CVE-2017-15928 - https://github.com/ohler55/ox/issues/194 -CVE-2017-1593 - http://www.ibm.com/support/docview.wss?uid=swg22010321 -CVE-2017-15931 - https://github.com/radare/radare2/issues/8731 -CVE-2017-15932 - https://github.com/radare/radare2/issues/8743 -CVE-2017-15934 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d -CVE-2017-15935 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d -CVE-2017-15936 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d -CVE-2017-15937 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d -CVE-2017-15938 - https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/ -CVE-2017-15939 - https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/ -CVE-2017-15944 - https://www.exploit-db.com/exploits/43342/ -CVE-2017-15944 - https://www.exploit-db.com/exploits/44597/ -CVE-2017-15946 - https://www.vulnerability-lab.com/get_content.php?id=2061 -CVE-2017-15947 - https://www.vulnerability-lab.com/get_content.php?id=2072 -CVE-2017-15948 - https://www.vulnerability-lab.com/get_content.php?id=2067 -CVE-2017-15949 - https://www.vulnerability-lab.com/get_content.php?id=2076 -CVE-2017-15950 - http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html -CVE-2017-15953 - https://github.com/extramaster/bchunk/issues/2 -CVE-2017-15954 - https://github.com/extramaster/bchunk/issues/3 -CVE-2017-15955 - https://github.com/extramaster/bchunk/issues/4 -CVE-2017-15956 - https://packetstormsecurity.com/files/144456/ConverTo-Video-Downloader-And-Converter-1.4.1-Arbitrary-File-Download.html -CVE-2017-15957 - https://packetstormsecurity.com/files/144431/Ingenious-School-Management-System-2.3.0-Arbitrary-File-Upload.html -CVE-2017-15957 - https://www.exploit-db.com/exploits/43102/ -CVE-2017-15958 - https://packetstormsecurity.com/files/144430/D-Park-Pro-Domain-Parking-Script-1.0-SQL-Injection.html -CVE-2017-15958 - https://www.exploit-db.com/exploits/43101/ -CVE-2017-15959 - https://packetstormsecurity.com/files/144428/Adult-Script-Pro-2.2.4-SQL-Injection.html -CVE-2017-15959 - https://www.exploit-db.com/exploits/43100/ -CVE-2017-15960 - https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html -CVE-2017-15960 - https://www.exploit-db.com/exploits/43099/ -CVE-2017-15961 - https://packetstormsecurity.com/files/144432/iProject-Management-System-1.0-SQL-Injection.html -CVE-2017-15961 - https://www.exploit-db.com/exploits/43098/ -CVE-2017-15962 - https://packetstormsecurity.com/files/144433/iStock-Management-System-1.0-Arbitrary-File-Upload.html -CVE-2017-15962 - https://www.exploit-db.com/exploits/43097/ -CVE-2017-15963 - https://packetstormsecurity.com/files/144434/iTech-Gigs-Script-1.21-SQL-Injection.html -CVE-2017-15963 - https://www.exploit-db.com/exploits/43096/ -CVE-2017-15964 - https://packetstormsecurity.com/files/144082/Job-Board-Software-1.0-SQL-Injection.html -CVE-2017-15964 - https://www.exploit-db.com/exploits/43095/ -CVE-2017-15965 - https://packetstormsecurity.com/files/144435/Joomla-NS-Download-Shop-2.2.6-SQL-Injection.html -CVE-2017-15965 - https://www.exploit-db.com/exploits/43094/ -CVE-2017-15966 - https://packetstormsecurity.com/files/144436/Joomla-Zh-YandexMap-6.1.1.0-SQL-Injection.html -CVE-2017-15966 - https://www.exploit-db.com/exploits/43093/ -CVE-2017-15967 - https://packetstormsecurity.com/files/144437/Mailing-List-Manager-Pro-3.0-SQL-Injection.html -CVE-2017-15967 - https://www.exploit-db.com/exploits/43092/ -CVE-2017-15968 - https://packetstormsecurity.com/files/144438/MyBuilder-Clone-1.0-SQL-Injection.html -CVE-2017-15968 - https://www.exploit-db.com/exploits/43091/ -CVE-2017-15969 - https://packetstormsecurity.com/files/144439/PG-All-Share-Video-1.0-SQL-Injection.html -CVE-2017-15969 - https://www.exploit-db.com/exploits/43090/ -CVE-2017-15970 - https://packetstormsecurity.com/files/144440/PHP-CityPortal-2.0-SQL-Injection.html -CVE-2017-15970 - https://www.exploit-db.com/exploits/43089/ -CVE-2017-15971 - https://packetstormsecurity.com/files/144441/Same-Sex-Dating-Software-Pro-1.0-SQL-Injection.html -CVE-2017-15971 - https://www.exploit-db.com/exploits/43088/ -CVE-2017-15972 - https://packetstormsecurity.com/files/144442/SoftDatepro-Dating-Social-Network-1.3-SQL-Injection.html -CVE-2017-15972 - https://www.exploit-db.com/exploits/43087/ -CVE-2017-15973 - https://packetstormsecurity.com/files/144443/Sokial-Social-Network-Script-1.0-SQL-Injection.html -CVE-2017-15973 - https://www.exploit-db.com/exploits/43086/ -CVE-2017-15974 - https://packetstormsecurity.com/files/144444/tPanel-2009-SQL-Injection.html -CVE-2017-15974 - https://www.exploit-db.com/exploits/43085/ -CVE-2017-15975 - https://packetstormsecurity.com/files/144445/Vastal-I-Tech-Dating-Zone-0.9.9-SQL-Injection.html -CVE-2017-15975 - https://www.exploit-db.com/exploits/43084/ -CVE-2017-15976 - https://packetstormsecurity.com/files/144446/ZeeBuddy-2x-SQL-Injection.html -CVE-2017-15976 - https://www.exploit-db.com/exploits/43083/ -CVE-2017-15977 - https://www.exploit-db.com/exploits/43082/ -CVE-2017-15978 - https://www.exploit-db.com/exploits/43081/ -CVE-2017-15979 - https://www.exploit-db.com/exploits/43080/ -CVE-2017-15980 - https://www.exploit-db.com/exploits/43079/ -CVE-2017-15981 - https://www.exploit-db.com/exploits/43078/ -CVE-2017-15982 - https://www.exploit-db.com/exploits/43077/ -CVE-2017-15983 - https://www.exploit-db.com/exploits/43076/ -CVE-2017-15984 - https://www.exploit-db.com/exploits/43075/ -CVE-2017-15985 - https://www.exploit-db.com/exploits/43074/ -CVE-2017-15986 - https://www.exploit-db.com/exploits/43073/ -CVE-2017-15987 - https://www.exploit-db.com/exploits/43072/ -CVE-2017-15988 - https://www.exploit-db.com/exploits/43071/ -CVE-2017-15989 - https://www.exploit-db.com/exploits/43070/ -CVE-2017-15990 - https://www.exploit-db.com/exploits/43069/ -CVE-2017-15991 - https://www.exploit-db.com/exploits/43068/ -CVE-2017-15992 - https://www.exploit-db.com/exploits/43067/ -CVE-2017-15993 - https://www.exploit-db.com/exploits/43066/ -CVE-2017-16001 - https://www.exploit-db.com/exploits/43220/ -CVE-2017-16007 - http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html -CVE-2017-16010 - https://github.com/i18next/i18next/pull/826 -CVE-2017-16013 - https://github.com/hapijs/hapi/issues/3466 -CVE-2017-16016 - https://github.com/punkave/sanitize-html/issues/100 -CVE-2017-16018 - https://github.com/restify/node-restify/issues/1018 -CVE-2017-16026 - https://github.com/request/request/issues/1904 -CVE-2017-16036 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server -CVE-2017-16037 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy -CVE-2017-16039 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp -CVE-2017-16083 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router -CVE-2017-16084 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream -CVE-2017-16085 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2 -CVE-2017-16088 - https://github.com/hacksparrow/safe-eval/issues/5 -CVE-2017-16089 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr -CVE-2017-16090 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fsk-server -CVE-2017-16092 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho -CVE-2017-16093 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js -CVE-2017-16094 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-http -CVE-2017-16095 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1 -CVE-2017-16096 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan -CVE-2017-16097 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http -CVE-2017-16100 - https://github.com/skoranga/node-dns-sync/issues/5 -CVE-2017-16101 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg -CVE-2017-16102 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui -CVE-2017-16103 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt -CVE-2017-16104 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/citypredict.whauwiller -CVE-2017-16105 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl -CVE-2017-16106 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock -CVE-2017-16107 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket -CVE-2017-16108 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server -CVE-2017-16109 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick -CVE-2017-16110 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons -CVE-2017-16114 - https://github.com/chjj/marked/issues/937 -CVE-2017-16120 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing -CVE-2017-16121 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/datachannel-client -CVE-2017-16122 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci -CVE-2017-16123 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket -CVE-2017-16124 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront -CVE-2017-16125 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/rtcmulticonnection-client -CVE-2017-16130 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx -CVE-2017-16131 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list -CVE-2017-16132 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry -CVE-2017-16133 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv -CVE-2017-16134 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple -CVE-2017-16135 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy -CVE-2017-16139 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jikes -CVE-2017-16140 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95 -CVE-2017-16141 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu -CVE-2017-16142 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver -CVE-2017-16143 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood -CVE-2017-16144 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/myserver.alexcthomas18 -CVE-2017-16145 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa -CVE-2017-16146 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve -CVE-2017-16147 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server -CVE-2017-16148 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46 -CVE-2017-16149 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver -CVE-2017-16150 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123 -CVE-2017-16152 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server -CVE-2017-16153 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan -CVE-2017-16154 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird -CVE-2017-16155 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli -CVE-2017-16156 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz -CVE-2017-16157 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr -CVE-2017-16158 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http -CVE-2017-16159 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode -CVE-2017-16160 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli -CVE-2017-16161 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru -CVE-2017-16162 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian -CVE-2017-16163 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo -CVE-2017-16164 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio -CVE-2017-16165 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server -CVE-2017-16166 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix -CVE-2017-16167 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack -CVE-2017-16168 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve -CVE-2017-16169 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake -CVE-2017-16170 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver -CVE-2017-16171 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver -CVE-2017-16172 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12 -CVE-2017-16173 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder -CVE-2017-16174 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast -CVE-2017-16175 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6 -CVE-2017-16176 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework -CVE-2017-16177 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista -CVE-2017-16178 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package -CVE-2017-16179 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio -CVE-2017-16180 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc -CVE-2017-16181 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev -CVE-2017-16182 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx -CVE-2017-16183 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server -CVE-2017-16184 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app -CVE-2017-16185 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server -CVE-2017-16186 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm -CVE-2017-16187 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device -CVE-2017-16188 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver -CVE-2017-16189 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sly07 -CVE-2017-16190 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc -CVE-2017-16191 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver -CVE-2017-16192 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne -CVE-2017-16193 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs -CVE-2017-16194 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard -CVE-2017-16195 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce -CVE-2017-16196 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver -CVE-2017-16197 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve -CVE-2017-16198 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp -CVE-2017-16199 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum -CVE-2017-16200 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo -CVE-2017-16201 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver -CVE-2017-16208 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6 -CVE-2017-16209 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver -CVE-2017-16210 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server -CVE-2017-16211 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex -CVE-2017-16212 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt -CVE-2017-16213 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver -CVE-2017-16214 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver -CVE-2017-16215 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve -CVE-2017-16216 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server -CVE-2017-16217 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client -CVE-2017-16218 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6 -CVE-2017-16219 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy -CVE-2017-16220 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc -CVE-2017-16221 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt -CVE-2017-16222 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding -CVE-2017-16223 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa -CVE-2017-16229 - https://github.com/ohler55/ox/issues/195 -CVE-2017-16231 - http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html -CVE-2017-16231 - http://seclists.org/fulldisclosure/2018/Dec/33 -CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/11 -CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/3 -CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/7 -CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/8 -CVE-2017-16232 - http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html -CVE-2017-16232 - http://seclists.org/fulldisclosure/2018/Dec/32 -CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/11 -CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/3 -CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/7 -CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/8 -CVE-2017-16237 - https://www.exploit-db.com/exploits/43109/ -CVE-2017-16244 - https://www.exploit-db.com/exploits/43106/ -CVE-2017-16249 - http://packetstormsecurity.com/files/144908/Debut-Embedded-httpd-1.20-Denial-Of-Service.html -CVE-2017-16249 - https://www.exploit-db.com/exploits/43119/ -CVE-2017-16249 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2017-017/?fid=10211 -CVE-2017-16249 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Denial-of-Service-Vulnerability-in-Brother-Printers/?page=1&year=0&month=0&LangType=1033 -CVE-2017-16252 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16253 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16254 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16255 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16256 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16257 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16258 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16259 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16260 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16261 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16262 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16263 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16264 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16265 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16266 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16267 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16268 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16269 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16270 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16271 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16272 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16273 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16274 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16275 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16276 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16277 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16278 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16279 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16280 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16281 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16282 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16283 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16284 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16285 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16286 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16287 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16288 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16289 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16290 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16291 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16292 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16293 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16294 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16295 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16296 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16297 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16298 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16299 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16300 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16301 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16302 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16303 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16304 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16305 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16306 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16307 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16308 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16309 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16310 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16311 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16312 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16313 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16314 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16315 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16316 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16317 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16318 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16319 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16320 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16321 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16322 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16323 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16324 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16325 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16326 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16327 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16328 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16329 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16330 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16331 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16332 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16333 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16334 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16335 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16336 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16337 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -CVE-2017-16338 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16339 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16340 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16341 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16342 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16343 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16344 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16345 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16346 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16347 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -CVE-2017-16348 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0485 -CVE-2017-16352 - https://www.exploit-db.com/exploits/43111/ -CVE-2017-16353 - https://www.exploit-db.com/exploits/43111/ -CVE-2017-16356 - http://packetstormsecurity.com/files/146422/Joomla-Kubik-Rubik-SIGE-3.2.3-Cross-Site-Scripting.html -CVE-2017-16356 - https://www.exploit-db.com/exploits/44104/ -CVE-2017-16357 - https://github.com/radare/radare2/issues/8742 -CVE-2017-16358 - https://github.com/radare/radare2/issues/8748 -CVE-2017-16510 - https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html -CVE-2017-16513 - https://www.7elements.co.uk/resources/technical-advisories/ipswitch-ws_ftp-professional-local-buffer-overflow-seh-overwrite/ -CVE-2017-16513 - https://www.exploit-db.com/exploits/43115/ -CVE-2017-16516 - https://github.com/brianmario/yajl-ruby/issues/176 -CVE-2017-16522 - https://packetstormsecurity.com/files/144805/MitraStar-DSL-100HN-T1-GPT-2541GNAC-Privilege-Escalation.html -CVE-2017-16522 - https://www.exploit-db.com/exploits/43061/ -CVE-2017-16523 - https://packetstormsecurity.com/files/144805/MitraStar-DSL-100HN-T1-GPT-2541GNAC-Privilege-Escalation.html -CVE-2017-16523 - https://www.exploit-db.com/exploits/43061/ -CVE-2017-16524 - https://github.com/realistic-security/CVE-2017-16524 -CVE-2017-16524 - https://www.exploit-db.com/exploits/43138/ -CVE-2017-16525 - https://usn.ubuntu.com/3583-2/ -CVE-2017-16530 - https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ -CVE-2017-16531 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-16541 - https://bugzilla.mozilla.org/show_bug.cgi?id=1412081 -CVE-2017-16541 - https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/ -CVE-2017-16542 - http://code610.blogspot.com/2017/11/sql-injection-in-manageengine.html -CVE-2017-16542 - https://www.exploit-db.com/exploits/43129/ -CVE-2017-16543 - http://code610.blogspot.com/2017/11/sql-injection-in-manageengine.html -CVE-2017-16543 - https://www.exploit-db.com/exploits/43129/ -CVE-2017-16544 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2017-16544 - http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html -CVE-2017-16544 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html -CVE-2017-16544 - http://seclists.org/fulldisclosure/2019/Jun/18 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2020/Mar/15 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2020/Sep/6 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2021/Aug/21 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2021/Jan/39 -CVE-2017-16544 - http://seclists.org/fulldisclosure/2022/Jun/36 -CVE-2017-16544 - https://seclists.org/bugtraq/2019/Jun/14 -CVE-2017-16544 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2017-16560 - https://medium.com/@esterling_/cve-2017-16560-sandisk-secure-access-leaves-plain-text-copies-of-files-on-disk-4eabeca6bdbc -CVE-2017-16561 - https://www.exploit-db.com/exploits/43108/ -CVE-2017-16562 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681?s_rank=9 -CVE-2017-16562 - https://wpvulndb.com/vulnerabilities/8950 -CVE-2017-16562 - https://www.exploit-db.com/exploits/43117/ -CVE-2017-16563 - https://distributedcompute.com/2017/11/04/vonage-ht802-multiple-vulnerabilities/ -CVE-2017-16564 - https://distributedcompute.com/2017/11/04/vonage-ht802-multiple-vulnerabilities/ -CVE-2017-16565 - https://distributedcompute.com/2017/11/04/vonage-ht802-multiple-vulnerabilities/ -CVE-2017-16566 - https://siggyd.github.io/Advisories/CVE-2017-16566 -CVE-2017-16567 - https://www.exploit-db.com/exploits/43122/ -CVE-2017-16568 - https://www.exploit-db.com/exploits/43123/ -CVE-2017-16570 - https://www.exploit-db.com/exploits/43922/ -CVE-2017-16607 - https://www.tenable.com/security/research/tra-2018-02 -CVE-2017-16608 - https://www.tenable.com/security/research/tra-2018-02 -CVE-2017-16609 - https://www.tenable.com/security/research/tra-2018-02 -CVE-2017-16610 - https://www.tenable.com/security/research/tra-2018-02 -CVE-2017-16615 - https://github.com/thanethomson/MLAlchemy/issues/1 -CVE-2017-16615 - https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/ -CVE-2017-16616 - https://github.com/Stranger6667/pyanyapi/issues/41 -CVE-2017-16616 - https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparser-in-pyanyapi/ -CVE-2017-16618 - https://github.com/tadashi-aikawa/owlmixin/issues/12 -CVE-2017-16618 - https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/ -CVE-2017-16629 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16629-sapphireims-login-page-information-disclosure/ -CVE-2017-16630 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16630-sapphireims-idor-based-privilege-elevation/ -CVE-2017-16631 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16631-sapphireims-idor-on-password-reset/ -CVE-2017-16632 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16632-sapphireims-insecure-storage-of-password/ -CVE-2017-16635 - https://www.vulnerability-lab.com/get_content.php?id=1997 -CVE-2017-16636 - https://www.vulnerability-lab.com/get_content.php?id=2000 -CVE-2017-16637 - https://www.vulnerability-lab.com/get_content.php?id=2102 -CVE-2017-16639 - http://packetstormsecurity.com/files/149351/Tor-Browser-SMB-Deanonymization-Information-Disclosure.html -CVE-2017-16639 - https://seclists.org/bugtraq/2018/Sep/29 -CVE-2017-16639 - https://www.wearesegment.com/research/tor-browser-deanonymization-with-smb/ -CVE-2017-16641 - https://github.com/Cacti/cacti/issues/1057 -CVE-2017-16642 - https://hackerone.com/reports/283644 -CVE-2017-16642 - https://www.exploit-db.com/exploits/43133/ -CVE-2017-16649 - https://usn.ubuntu.com/3822-1/ -CVE-2017-16651 - http://packetstormsecurity.com/files/161226/Roundcube-Webmail-1.2-File-Disclosure.html -CVE-2017-16666 - http://packetstormsecurity.com/files/145639/Xplico-Remote-Code-Execution.html -CVE-2017-16666 - https://pentest.blog/advisory-xplico-unauthenticated-remote-code-execution-cve-2017-16666/ -CVE-2017-16666 - https://www.exploit-db.com/exploits/43430/ -CVE-2017-16670 - http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html -CVE-2017-16709 - http://packetstormsecurity.com/files/154362/AwindInc-SNMP-Service-Command-Injection.html -CVE-2017-16709 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2017-16711 - https://github.com/matthiaskramm/swftools/issues/46 -CVE-2017-16716 - https://www.exploit-db.com/exploits/43928/ -CVE-2017-16720 - https://www.exploit-db.com/exploits/44278/ -CVE-2017-16741 - https://cert.vde.com/en-us/advisories/vde-2017-006 -CVE-2017-16743 - https://cert.vde.com/en-us/advisories/vde-2017-006 -CVE-2017-16755 - https://ruby.sh/helpspot-disclosure-20180206.txt -CVE-2017-16756 - https://ruby.sh/helpspot-disclosure-20180206.txt -CVE-2017-16757 - https://www.vulnerability-lab.com/get_content.php?id=2062 -CVE-2017-16758 - https://packetstormsecurity.com/files/144921/WordPress-Ultimate-Instagram-Feed-1.2-Cross-Site-Scripting.html -CVE-2017-16758 - https://wpvulndb.com/vulnerabilities/8947 -CVE-2017-16763 - https://github.com/bbengfort/confire/issues/24 -CVE-2017-16763 - https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/ -CVE-2017-16764 - https://github.com/illagrenan/django-make-app/issues/5 -CVE-2017-16764 - https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16764-vulnerability-in-django-make-app/ -CVE-2017-16775 - https://www.synology.com/security/advisory/Synology_SA_18_28 -CVE-2017-16777 - https://www.exploit-db.com/exploits/43219/ -CVE-2017-16778 - https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection -CVE-2017-1678 - http://www.ibm.com/support/docview.wss?uid=swg22010321 -CVE-2017-16780 - https://www.exploit-db.com/exploits/43136/ -CVE-2017-16781 - https://www.exploit-db.com/exploits/43137/ -CVE-2017-16783 - http://packetstormsecurity.com/files/159690/CMS-Made-Simple-2.1.6-Server-Side-Template-Injection.html -CVE-2017-16783 - https://www.netsparker.com/web-applications-advisories/ns-17-032-server-side-template-injection-vulnerability-in-cms-made-simple/ -CVE-2017-16784 - https://www.netsparker.com/web-applications-advisories/ns-17-031-reflected-xss-vulnerability-in-cms-made-simple/ -CVE-2017-16785 - https://github.com/Cacti/cacti/issues/1071 -CVE-2017-16786 - http://packetstormsecurity.com/files/145388/Meinberg-LANTIME-Web-Configuration-Utility-6.16.008-Arbitrary-File-Read.html -CVE-2017-16786 - http://seclists.org/fulldisclosure/2017/Dec/50 -CVE-2017-16787 - http://seclists.org/fulldisclosure/2017/Dec/33 -CVE-2017-16787 - https://www.exploit-db.com/exploits/43332/ -CVE-2017-16788 - http://seclists.org/fulldisclosure/2017/Dec/32 -CVE-2017-16793 - https://github.com/matthiaskramm/swftools/issues/47 -CVE-2017-16794 - https://github.com/matthiaskramm/swftools/issues/50 -CVE-2017-16798 - https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20UPLOAD%20FILE%20XSS.md -CVE-2017-16799 - https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md -CVE-2017-16803 - https://bugzilla.libav.org/show_bug.cgi?id=1098 -CVE-2017-16806 - https://www.exploit-db.com/exploits/43141/ -CVE-2017-16807 - https://packetstormsecurity.com/files/144965/KirbyCMS-Cross-Site-Scripting.html -CVE-2017-16807 - https://www.exploit-db.com/exploits/43140/ -CVE-2017-16808 - http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html -CVE-2017-16808 - https://github.com/the-tcpdump-group/tcpdump/issues/645 -CVE-2017-16815 - https://packetstormsecurity.com/files/144914/WordPress-Duplicator-Migration-1.2.28-Cross-Site-Scripting.html -CVE-2017-16819 - https://www.exploit-db.com/exploits/43158/ -CVE-2017-16826 - https://sourceware.org/bugzilla/show_bug.cgi?id=22376 -CVE-2017-16827 - https://sourceware.org/bugzilla/show_bug.cgi?id=22306 -CVE-2017-16828 - https://sourceware.org/bugzilla/show_bug.cgi?id=22386 -CVE-2017-16829 - https://sourceware.org/bugzilla/show_bug.cgi?id=22307 -CVE-2017-16830 - https://sourceware.org/bugzilla/show_bug.cgi?id=22384 -CVE-2017-16831 - https://sourceware.org/bugzilla/show_bug.cgi?id=22385 -CVE-2017-16832 - https://sourceware.org/bugzilla/show_bug.cgi?id=22373 -CVE-2017-16836 - https://packetstormsecurity.com/files/134288/Arris-TG1682G-Modem-Cross-Site-Scripting.html -CVE-2017-16836 - https://www.exploit-db.com/exploits/38657/ -CVE-2017-16841 - https://www.exploit-db.com/exploits/43149/ -CVE-2017-16842 - https://packetstormsecurity.com/files/145080/WordPress-Yoast-SEO-Cross-Site-Scripting.html -CVE-2017-16843 - https://www.exploit-db.com/exploits/43150/ -CVE-2017-16846 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -CVE-2017-16847 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -CVE-2017-16848 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -CVE-2017-16849 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -CVE-2017-16850 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -CVE-2017-16851 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -CVE-2017-16860 - https://ecosystem.atlassian.net/browse/APL-1363 -CVE-2017-16867 - https://www.theverge.com/2017/11/16/16665064/amazon-key-camera-disable -CVE-2017-16867 - https://www.wired.com/story/amazon-key-flaw-let-deliverymen-disable-your-camera/ -CVE-2017-16868 - https://github.com/matthiaskramm/swftools/issues/52 -CVE-2017-16870 - https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated-ssrf -CVE-2017-16871 - https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated--upload-file-and-php-code-execution -CVE-2017-16879 - http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html -CVE-2017-16884 - http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt -CVE-2017-16884 - http://packetstormsecurity.com/files/145182/MistServer-2.12-Cross-Site-Scripting.html -CVE-2017-16884 - http://seclists.org/fulldisclosure/2017/Dec/2 -CVE-2017-16884 - https://www.exploit-db.com/exploits/43205/ -CVE-2017-16885 - https://www.exploit-db.com/exploits/43460/ -CVE-2017-16886 - https://www.exploit-db.com/exploits/43460/ -CVE-2017-16887 - https://www.exploit-db.com/exploits/43460/ -CVE-2017-16890 - https://github.com/matthiaskramm/swftools/issues/57 -CVE-2017-16893 - https://github.com/Piwigo/Piwigo/issues/804 -CVE-2017-16894 - http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html -CVE-2017-16895 - https://www.exploit-db.com/exploits/43216/ -CVE-2017-16899 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881143 -CVE-2017-16902 - https://www.exploit-db.com/exploits/43164/ -CVE-2017-16906 - http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html -CVE-2017-16907 - http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html -CVE-2017-16908 - http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html -CVE-2017-16914 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 -CVE-2017-16921 - http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html -CVE-2017-16921 - https://www.exploit-db.com/exploits/43853/ -CVE-2017-16923 - https://github.com/Iolop/Poc/tree/master/Router/Tenda -CVE-2017-16926 - https://bugs.debian.org/882372 -CVE-2017-16928 - http://packetstormsecurity.com/files/146158/Arq-5.10-Local-Privilege-Escalation.html -CVE-2017-16928 - https://m4.rkw.io/blog/two-local-root-privesc-bugs-in-arq-backup--510.html -CVE-2017-16928 - https://www.exploit-db.com/exploits/43925/ -CVE-2017-16929 - http://www.openwall.com/lists/oss-security/2017/12/04/3 -CVE-2017-16929 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16929 -CVE-2017-16929 - https://www.exploit-db.com/exploits/43231/ -CVE-2017-16930 - http://www.openwall.com/lists/oss-security/2017/12/04/3 -CVE-2017-16930 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16930 -CVE-2017-16930 - https://www.exploit-db.com/exploits/43231/ -CVE-2017-16931 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-16936 - https://github.com/Iolop/Poc/tree/master/Router/Tenda -CVE-2017-16938 - https://sourceforge.net/p/optipng/bugs/69/ -CVE-2017-16942 - https://usn.ubuntu.com/4013-1/ -CVE-2017-16943 - http://openwall.com/lists/oss-security/2017/11/25/2 -CVE-2017-16943 - http://openwall.com/lists/oss-security/2017/11/25/3 -CVE-2017-16943 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2017-16943 - https://bugs.exim.org/show_bug.cgi?id=2199 -CVE-2017-16943 - https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944 -CVE-2017-16943 - https://hackerone.com/reports/296991 -CVE-2017-16944 - http://openwall.com/lists/oss-security/2017/11/25/2 -CVE-2017-16944 - http://openwall.com/lists/oss-security/2017/11/25/3 -CVE-2017-16944 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2017-16944 - https://bugs.exim.org/show_bug.cgi?id=2201 -CVE-2017-16944 - https://hackerone.com/reports/296994 -CVE-2017-16944 - https://www.exploit-db.com/exploits/43184/ -CVE-2017-16945 - http://packetstormsecurity.com/files/146159/Arq-5.10-Local-Privilege-Escalation.html -CVE-2017-16945 - https://m4.rkw.io/blog/two-local-root-privesc-bugs-in-arq-backup--510.html -CVE-2017-16945 - https://www.exploit-db.com/exploits/43926/ -CVE-2017-16948 - https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference1 -CVE-2017-16949 - http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html -CVE-2017-16949 - https://wpvulndb.com/vulnerabilities/8977 -CVE-2017-16949 - https://www.exploit-db.com/exploits/43324/ -CVE-2017-16951 - https://www.exploit-db.com/exploits/43186/ -CVE-2017-16952 - https://www.exploit-db.com/exploits/43185/ -CVE-2017-16953 - http://packetstormsecurity.com/files/145121/ZTE-ZXDSL-831-Unauthorized-Configuration-Access-Bypass.html -CVE-2017-16953 - https://www.exploit-db.com/exploits/43188/ -CVE-2017-16955 - https://packetstormsecurity.com/files/145059/WordPress-In-Link-1.0-SQL-Injection.html -CVE-2017-16955 - https://wpvulndb.com/vulnerabilities/8962 -CVE-2017-16961 - https://github.com/bigtreecms/BigTree-CMS/issues/323 -CVE-2017-16962 - https://packetstormsecurity.com/files/145095/communigatepro-xss.txt -CVE-2017-16962 - https://www.exploit-db.com/exploits/43177/ -CVE-2017-16994 - https://www.exploit-db.com/exploits/43178/ -CVE-2017-16995 - http://openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-16995 - https://www.exploit-db.com/exploits/44298/ -CVE-2017-16995 - https://www.exploit-db.com/exploits/45010/ -CVE-2017-16995 - https://www.exploit-db.com/exploits/45058/ -CVE-2017-16996 - http://openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-1700 - http://www.ibm.com/support/docview.wss?uid=swg22015635 -CVE-2017-17043 - https://packetstormsecurity.com/files/145060/wpemagmc10-xss.txt -CVE-2017-17043 - https://wpvulndb.com/vulnerabilities/8964 -CVE-2017-17049 - https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference_0x82730010 -CVE-2017-17050 - https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerDereference_0x82730020 -CVE-2017-17055 - http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt -CVE-2017-17055 - http://packetstormsecurity.com/files/145183/Artica-Web-Proxy-3.06.112216-Remote-Code-Execution.html -CVE-2017-17055 - http://seclists.org/fulldisclosure/2017/Dec/3 -CVE-2017-17055 - https://www.exploit-db.com/exploits/43206/ -CVE-2017-17056 - http://packetstormsecurity.com/files/145160/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Request-Forgery.html -CVE-2017-17057 - http://packetstormsecurity.com/files/145159/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Scripting.html -CVE-2017-17058 - https://www.exploit-db.com/exploits/43196/ -CVE-2017-17058 - https://www.exploit-db.com/ghdb/4613/ -CVE-2017-17059 - https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 -CVE-2017-17059 - https://packetstormsecurity.com/files/145044/WordPress-amtyThumb-8.1.3-Cross-Site-Scripting.html -CVE-2017-17062 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2017-17062 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2017-17062 - https://www.exploit-db.com/exploits/44881/ -CVE-2017-17068 - https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/ -CVE-2017-17069 - https://packetstormsecurity.com/files/145202/Amazon-Audible-DLL-Hijacking.html -CVE-2017-17080 - https://sourceware.org/bugzilla/show_bug.cgi?id=22421 -CVE-2017-17085 - https://www.exploit-db.com/exploits/43233/ -CVE-2017-17088 - http://packetstormsecurity.com/files/145435/Sync-Breeze-10.2.12-Denial-Of-Service.html -CVE-2017-17088 - http://seclists.org/fulldisclosure/2017/Dec/45 -CVE-2017-17088 - https://www.exploit-db.com/exploits/43344/ -CVE-2017-17090 - https://www.exploit-db.com/exploits/43992/ -CVE-2017-17091 - https://wpvulndb.com/vulnerabilities/8969 -CVE-2017-17093 - https://wpvulndb.com/vulnerabilities/8968 -CVE-2017-17095 - http://bugzilla.maptools.org/show_bug.cgi?id=2750 -CVE-2017-17095 - http://www.openwall.com/lists/oss-security/2017/11/30/3 -CVE-2017-17095 - https://usn.ubuntu.com/3606-1/ -CVE-2017-17095 - https://www.exploit-db.com/exploits/43322/ -CVE-2017-17096 - https://wpvulndb.com/vulnerabilities/8971 -CVE-2017-17097 - https://www.exploit-db.com/exploits/43431/ -CVE-2017-17098 - https://www.exploit-db.com/exploits/43431/ -CVE-2017-17099 - https://packetstormsecurity.com/files/144586/Sync-Breeze-Enterprise-10.1.16-SEH-Overflow.html -CVE-2017-17099 - https://www.exploit-db.com/exploits/42984/ -CVE-2017-17101 - https://youtu.be/B75C13Zw35Y -CVE-2017-17102 - https://github.com/FiyoCMS/FiyoCMS/issues/9 -CVE-2017-17103 - https://github.com/FiyoCMS/FiyoCMS/issues/10 -CVE-2017-17104 - https://github.com/FiyoCMS/FiyoCMS/issues/11 -CVE-2017-17105 - http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html -CVE-2017-17105 - http://packetstormsecurity.com/files/158120/Zivif-Camera-2.3.4.2103-iptest.cgi-Blind-Remote-Command-Execution.html -CVE-2017-17106 - http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html -CVE-2017-17107 - http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html -CVE-2017-17110 - http://packetstormsecurity.com/files/145231/Techno-Portfolio-Management-Panel-1.0-SQL-Injection.html -CVE-2017-17110 - https://www.exploit-db.com/exploits/43211/ -CVE-2017-17111 - http://packetstormsecurity.com/files/145237/Readymade-Classifieds-Script-1.0-SQL-Injection.html -CVE-2017-17111 - https://www.exploit-db.com/exploits/43212/ -CVE-2017-17112 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Pool_Corruption_1 -CVE-2017-17113 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Null_Pointer_Dereference_1 -CVE-2017-17114 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Memory_Corruption_1_0x83000084 -CVE-2017-17121 - https://sourceware.org/bugzilla/show_bug.cgi?id=22506 -CVE-2017-17122 - https://sourceware.org/bugzilla/show_bug.cgi?id=22508 -CVE-2017-17123 - https://sourceware.org/bugzilla/show_bug.cgi?id=22509 -CVE-2017-17124 - https://sourceware.org/bugzilla/show_bug.cgi?id=22507 -CVE-2017-17125 - https://sourceware.org/bugzilla/show_bug.cgi?id=22443 -CVE-2017-17126 - https://sourceware.org/bugzilla/show_bug.cgi?id=22510 -CVE-2017-17127 - https://bugzilla.libav.org/show_bug.cgi?id=1099 -CVE-2017-17128 - https://bugzilla.libav.org/show_bug.cgi?id=1104 -CVE-2017-17129 - https://bugzilla.libav.org/show_bug.cgi?id=1101 -CVE-2017-17130 - https://bugzilla.libav.org/show_bug.cgi?id=1100 -CVE-2017-1725 - http://www.ibm.com/support/docview.wss?uid=swg22015635 -CVE-2017-17309 - http://packetstormsecurity.com/files/155954/Huawei-HG255-Directory-Traversal.html -CVE-2017-1734 - http://www.ibm.com/support/docview.wss?uid=swg22015635 -CVE-2017-17382 - https://robotattack.org/ -CVE-2017-17382 - https://www.kb.cert.org/vuls/id/144389 -CVE-2017-17405 - https://hackerone.com/reports/294462 -CVE-2017-17405 - https://www.exploit-db.com/exploits/43381/ -CVE-2017-17406 - https://www.tenable.com/security/research/tra-2018-02 -CVE-2017-17411 - https://www.exploit-db.com/exploits/43363/ -CVE-2017-17411 - https://www.exploit-db.com/exploits/43429/ -CVE-2017-17417 - https://www.exploit-db.com/exploits/46446/ -CVE-2017-17427 - https://robotattack.org/ -CVE-2017-17427 - https://www.kb.cert.org/vuls/id/144389 -CVE-2017-17428 - https://www.kb.cert.org/vuls/id/144389 -CVE-2017-17431 - https://code610.blogspot.com/2017/12/modus-operandi-genixcms-115.html -CVE-2017-17439 - https://github.com/heimdal/heimdal/issues/353 -CVE-2017-17440 - https://bugs.debian.org/883528#35 -CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html -CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html -CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html -CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html -CVE-2017-17442 - http://support.blackberry.com/kb/articleDetail?articleNumber=000047227 -CVE-2017-17446 - https://bitbucket.org/mpyne/game-music-emu/issues/14/addresssanitizer-negative-size-param-size -CVE-2017-17446 - https://bugs.debian.org/883691 -CVE-2017-17448 - https://usn.ubuntu.com/3620-1/ -CVE-2017-17450 - https://usn.ubuntu.com/3583-2/ -CVE-2017-17451 - https://packetstormsecurity.com/files/145222/WordPress-WP-Mailster-1.5.4.0-Cross-Site-Scripting.html -CVE-2017-17451 - https://wpvulndb.com/vulnerabilities/8973 -CVE-2017-17458 - https://bz.mercurial-scm.org/show_bug.cgi?id=5730 -CVE-2017-17458 - https://hackerone.com/reports/294147 -CVE-2017-17458 - https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html -CVE-2017-17464 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002570 -CVE-2017-17465 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002574 -CVE-2017-17466 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730088 -CVE-2017-17467 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730074 -CVE-2017-17468 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730020 -CVE-2017-17469 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730008 -CVE-2017-17470 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730054 -CVE-2017-17471 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82732140 -CVE-2017-17472 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730030 -CVE-2017-17473 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730050 -CVE-2017-17474 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730070 -CVE-2017-17475 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82736068 -CVE-2017-17482 - https://www.theregister.co.uk/2018/02/06/openvms_vulnerability/ -CVE-2017-17484 - https://github.com/znc/znc/issues/1459 -CVE-2017-17484 - https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp -CVE-2017-17484 - https://ssl.icu-project.org/trac/changeset/40714 -CVE-2017-17484 - https://ssl.icu-project.org/trac/changeset/40715 -CVE-2017-17484 - https://ssl.icu-project.org/trac/ticket/13490 -CVE-2017-17484 - https://ssl.icu-project.org/trac/ticket/13510 -CVE-2017-17485 - https://github.com/irsl/jackson-rce-via-spel/ -CVE-2017-17485 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-17497 - https://github.com/htacg/tidy-html5/issues/656 -CVE-2017-17498 - https://sourceforge.net/p/graphicsmagick/bugs/525/ -CVE-2017-17499 - https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=33078&sid=5fbb164c3830293138917f9b14264ed1 -CVE-2017-17500 - https://sourceforge.net/p/graphicsmagick/bugs/523/ -CVE-2017-17501 - https://sourceforge.net/p/graphicsmagick/bugs/526/ -CVE-2017-17502 - https://sourceforge.net/p/graphicsmagick/bugs/521/ -CVE-2017-17503 - https://sourceforge.net/p/graphicsmagick/bugs/522/ -CVE-2017-17537 - https://www.exploit-db.com/exploits/43200/ -CVE-2017-17538 - https://www.exploit-db.com/exploits/43317/ -CVE-2017-17539 - https://fortiguard.com/advisory/FG-IR-17-274 -CVE-2017-17540 - https://fortiguard.com/advisory/FG-IR-17-274 -CVE-2017-17541 - https://fortiguard.com/advisory/FG-IR-17-305 -CVE-2017-17543 - https://fortiguard.com/advisory/FG-IR-17-214 -CVE-2017-17554 - https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20%20aubio_source_avcodec_readframe%20of%20aubio.md -CVE-2017-17555 - https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20swri_audio_convert%20of%20ffmpeg%20libswresample.md -CVE-2017-17557 - https://blog.0patch.com/2018/05/0patching-foxit-reader-buffer-oops.html -CVE-2017-17558 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-17560 - https://download.exploitee.rs/file/generic/Exploiteers-DEFCON25.pdf -CVE-2017-17560 - https://www.exploit-db.com/exploits/43356/ -CVE-2017-17561 - http://www.jianshu.com/p/35af80b97ee6 -CVE-2017-17562 - https://www.elttam.com.au/blog/goahead/ -CVE-2017-17562 - https://www.exploit-db.com/exploits/43360/ -CVE-2017-17562 - https://www.exploit-db.com/exploits/43877/ -CVE-2017-17570 - https://packetstormsecurity.com/files/145297/FS-Expedia-Clone-1.0-SQL-Injection.html -CVE-2017-17570 - https://www.exploit-db.com/exploits/43261/ -CVE-2017-17571 - https://packetstormsecurity.com/files/145298/FS-Foodpanda-Clone-1.0-SQL-Injection.html -CVE-2017-17571 - https://www.exploit-db.com/exploits/43262/ -CVE-2017-17572 - https://packetstormsecurity.com/files/145303/FS-Amazon-Clone-1.0-SQL-Injection.html -CVE-2017-17572 - https://www.exploit-db.com/exploits/43259/ -CVE-2017-17573 - https://packetstormsecurity.com/files/145319/FS-Ebay-Clone-1.0-SQL-Injection.html -CVE-2017-17573 - https://www.exploit-db.com/exploits/43256/ -CVE-2017-17574 - https://packetstormsecurity.com/files/145302/FS-Care-Clone-1.0-SQL-Injection.html -CVE-2017-17574 - https://www.exploit-db.com/exploits/43258/ -CVE-2017-17575 - https://packetstormsecurity.com/files/145315/FS-Groupon-Clone-1.0-SQL-Injection.html -CVE-2017-17575 - https://www.exploit-db.com/exploits/43253/ -CVE-2017-17576 - https://packetstormsecurity.com/files/145316/FS-Gigs-Script-1.0-SQL-Injection.html -CVE-2017-17576 - https://www.exploit-db.com/exploits/43254/ -CVE-2017-17577 - https://packetstormsecurity.com/files/145296/FS-Trademe-Clone-1.0-SQL-Injection.html -CVE-2017-17577 - https://www.exploit-db.com/exploits/43260/ -CVE-2017-17578 - https://packetstormsecurity.com/files/145301/FS-Crowdfunding-Script-1.0-SQL-Injection.html -CVE-2017-17578 - https://www.exploit-db.com/exploits/43257/ -CVE-2017-17579 - https://packetstormsecurity.com/files/145317/FS-Freelancer-Clone-1.0-SQL-Injection.html -CVE-2017-17579 - https://www.exploit-db.com/exploits/43255/ -CVE-2017-17580 - https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html -CVE-2017-17580 - https://www.exploit-db.com/exploits/43249/ -CVE-2017-17581 - https://packetstormsecurity.com/files/145253/FS-Quibids-Clone-1.0-SQL-Injection.html -CVE-2017-17581 - https://www.exploit-db.com/exploits/43243/ -CVE-2017-17582 - https://packetstormsecurity.com/files/145314/FS-Grubhub-Clone-1.0-SQL-Injection.html -CVE-2017-17582 - https://www.exploit-db.com/exploits/43252/ -CVE-2017-17583 - https://packetstormsecurity.com/files/145252/FS-Shutterstock-Clone-1.0-SQL-Injection.html -CVE-2017-17583 - https://www.exploit-db.com/exploits/43242/ -CVE-2017-17584 - https://packetstormsecurity.com/files/145289/FS-Makemytrip-Clone-1.0-SQL-Injection.html -CVE-2017-17584 - https://www.exploit-db.com/exploits/43246/ -CVE-2017-17585 - https://packetstormsecurity.com/files/145255/FS-Monster-Clone-1.0-SQL-Injection.html -CVE-2017-17585 - https://www.exploit-db.com/exploits/43245/ -CVE-2017-17586 - https://packetstormsecurity.com/files/145254/FS-Olx-Clone-1.0-SQL-Injection.html -CVE-2017-17586 - https://www.exploit-db.com/exploits/43244/ -CVE-2017-17587 - https://packetstormsecurity.com/files/145308/FS-Indiamart-Clone-1.0-SQL-Injection.html -CVE-2017-17587 - https://www.exploit-db.com/exploits/43250/ -CVE-2017-17588 - https://packetstormsecurity.com/files/145313/FS-IMDB-Clone-1.0-SQL-Injection.html -CVE-2017-17588 - https://www.exploit-db.com/exploits/43251/ -CVE-2017-17589 - https://packetstormsecurity.com/files/145250/FS-Thumbtack-Clone-1.0-SQL-Injection.html -CVE-2017-17589 - https://www.exploit-db.com/exploits/43240/ -CVE-2017-17590 - https://packetstormsecurity.com/files/145251/FS-Stackoverflow-Clone-1.0-SQL-Injection.html -CVE-2017-17590 - https://www.exploit-db.com/exploits/43241/ -CVE-2017-17591 - https://packetstormsecurity.com/files/145249/Realestate-Crowdfunding-Script-2.7.2-SQL-Injection.html -CVE-2017-17591 - https://www.exploit-db.com/exploits/43239/ -CVE-2017-17592 - https://packetstormsecurity.com/files/145248/Website-Auction-Marketplace-2.0.5-SQL-Injection.html -CVE-2017-17592 - https://www.exploit-db.com/exploits/43238/ -CVE-2017-17593 - https://packetstormsecurity.com/files/145247/Simple-Chatting-System-1.0.0-Arbitrary-File-Upload.html -CVE-2017-17593 - https://www.exploit-db.com/exploits/43237/ -CVE-2017-17594 - https://packetstormsecurity.com/files/145246/DomainSale-PHP-Script-1.0-SQL-Injection.html -CVE-2017-17594 - https://www.exploit-db.com/exploits/43235/ -CVE-2017-17595 - https://packetstormsecurity.com/files/145309/Beauty-Parlour-Booking-Script-1.0-SQL-Injection.html -CVE-2017-17595 - https://www.exploit-db.com/exploits/43267/ -CVE-2017-17596 - https://packetstormsecurity.com/files/145311/Entrepreneur-Job-Portal-Script-2.0.6-SQL-Injection.html -CVE-2017-17596 - https://www.exploit-db.com/exploits/43275/ -CVE-2017-17597 - https://packetstormsecurity.com/files/145290/Nearbuy-Clone-Script-3.2-SQL-Injection.html -CVE-2017-17597 - https://www.exploit-db.com/exploits/43268/ -CVE-2017-17598 - https://packetstormsecurity.com/files/145304/Affiliate-MLM-Script-1.0-SQL-Injection.html -CVE-2017-17598 - https://www.exploit-db.com/exploits/43265/ -CVE-2017-17599 - https://packetstormsecurity.com/files/145300/Advance-Online-Learning-Management-Script-3.1-SQL-Injection.html -CVE-2017-17599 - https://www.exploit-db.com/exploits/43264/ -CVE-2017-17600 - https://packetstormsecurity.com/files/145318/Basic-B2B-Script-2.0.8-SQL-Injection.html -CVE-2017-17600 - https://www.exploit-db.com/exploits/43266/ -CVE-2017-17601 - https://packetstormsecurity.com/files/145291/Cab-Booking-Script-1.0-SQL-Injection.html -CVE-2017-17601 - https://www.exploit-db.com/exploits/43269/ -CVE-2017-17602 - https://packetstormsecurity.com/files/145299/Advance-B2B-Script-2.1.3-SQL-Injection.html -CVE-2017-17602 - https://www.exploit-db.com/exploits/43263/ -CVE-2017-17603 - https://packetstormsecurity.com/files/145345/Advanced-Real-Estate-Script-4.0.7-SQL-Injection.html -CVE-2017-17603 - https://www.exploit-db.com/exploits/43304/ -CVE-2017-17604 - https://packetstormsecurity.com/files/145346/Entrepreneur-Bus-Booking-Script-3.0.4-SQL-Injection.html -CVE-2017-17604 - https://www.exploit-db.com/exploits/43305/ -CVE-2017-17605 - https://packetstormsecurity.com/files/145310/Consumer-Complaints-Clone-Script-1.0-SQL-Injection.html -CVE-2017-17605 - https://www.exploit-db.com/exploits/43274/ -CVE-2017-17606 - https://packetstormsecurity.com/files/145292/Co-work-Space-Search-Script-1.0-SQL-Injection.html -CVE-2017-17606 - https://www.exploit-db.com/exploits/43273/ -CVE-2017-17607 - https://packetstormsecurity.com/files/145293/CMS-Auditor-Website-1.0-SQL-Injection.html -CVE-2017-17607 - https://www.exploit-db.com/exploits/43272/ -CVE-2017-17608 - https://packetstormsecurity.com/files/145294/Child-Care-Script-1.0-SQL-Injection.html -CVE-2017-17608 - https://www.exploit-db.com/exploits/43271/ -CVE-2017-17609 - https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html -CVE-2017-17609 - https://www.exploit-db.com/exploits/43270/ -CVE-2017-17610 - https://packetstormsecurity.com/files/145305/E-commerce-MLM-Software-1.0-SQL-Injection.html -CVE-2017-17610 - https://www.exploit-db.com/exploits/43277/ -CVE-2017-17611 - https://packetstormsecurity.com/files/145312/Doctor-Search-Script-1.0-SQL-Injection.html -CVE-2017-17611 - https://www.exploit-db.com/exploits/43276/ -CVE-2017-17612 - https://packetstormsecurity.com/files/145324/Hot-Scripts-Clone-3.1-SQL-Injection.html -CVE-2017-17612 - https://www.exploit-db.com/exploits/43284/ -CVE-2017-17612 - https://www.exploit-db.com/exploits/43916/ -CVE-2017-17613 - https://packetstormsecurity.com/files/145323/Freelance-Website-Script-2.0.6-SQL-Injection.html -CVE-2017-17613 - https://www.exploit-db.com/exploits/43283/ -CVE-2017-17614 - https://packetstormsecurity.com/files/145321/Food-Order-Script-1.0-SQL-Injection.html -CVE-2017-17614 - https://www.exploit-db.com/exploits/43281/ -CVE-2017-17615 - https://packetstormsecurity.com/files/145320/Facebook-Clone-Script-1.0-SQL-Injection.html -CVE-2017-17615 - https://www.exploit-db.com/exploits/43280/ -CVE-2017-17616 - https://packetstormsecurity.com/files/145306/Event-Search-Script-1.0-SQL-Injection.html -CVE-2017-17616 - https://www.exploit-db.com/exploits/43279/ -CVE-2017-17617 - https://packetstormsecurity.com/files/145325/Foodspotting-Clone-Script-1.0-SQL-Injection.html -CVE-2017-17617 - https://www.exploit-db.com/exploits/43285/ -CVE-2017-17618 - https://packetstormsecurity.com/files/145326/Kickstarter-Clone-Script-2.0-SQL-Injection.html -CVE-2017-17618 - https://www.exploit-db.com/exploits/43286/ -CVE-2017-17619 - https://packetstormsecurity.com/files/145328/Laundry-Booking-Script-1.0-SQL-Injection.html -CVE-2017-17619 - https://packetstormsecurity.com/files/145330/Laundry-Booking-Script-1.0-SQL-Injection.html -CVE-2017-17619 - https://www.exploit-db.com/exploits/43288/ -CVE-2017-17620 - https://packetstormsecurity.com/files/145332/Lawyer-Search-Script-1.1-SQL-Injection.html -CVE-2017-17620 - https://www.exploit-db.com/exploits/43289/ -CVE-2017-17621 - https://packetstormsecurity.com/files/145331/Multivendor-Penny-Auction-Clone-Script-1.0-SQL-Injection.html -CVE-2017-17621 - https://packetstormsecurity.com/files/145333/Multivendor-Penny-Auction-Clone-Script-1.0-SQL-Injection.html -CVE-2017-17621 - https://www.exploit-db.com/exploits/43290/ -CVE-2017-17622 - https://packetstormsecurity.com/files/145329/Online-Exam-Test-Application-Script-1.6-SQL-Injection.html -CVE-2017-17622 - https://packetstormsecurity.com/files/145334/Online-Exam-Test-Application-Script-1.6-SQL-Injection.html -CVE-2017-17622 - https://www.exploit-db.com/exploits/43291/ -CVE-2017-17623 - https://packetstormsecurity.com/files/145335/Opensource-Classified-Ads-Script-3.2-SQL-Injection.html -CVE-2017-17623 - https://www.exploit-db.com/exploits/43292/ -CVE-2017-17624 - https://packetstormsecurity.com/files/145336/PHP-Multivendor-Ecommerce-1.0-SQL-Injection.html -CVE-2017-17624 - https://www.exploit-db.com/exploits/43293/ -CVE-2017-17625 - https://packetstormsecurity.com/files/145337/Professional-Service-Script-1.0-SQL-Injection.html -CVE-2017-17625 - https://www.exploit-db.com/exploits/43294/ -CVE-2017-17626 - https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html -CVE-2017-17626 - https://www.exploit-db.com/exploits/43295/ -CVE-2017-17627 - https://packetstormsecurity.com/files/145339/Readymade-Video-Sharing-Script-3.2-SQL-Injection.html -CVE-2017-17627 - https://www.exploit-db.com/exploits/43296/ -CVE-2017-17628 - https://packetstormsecurity.com/files/145340/Responsive-Realestate-Script-3.2-SQL-Injection.html -CVE-2017-17628 - https://www.exploit-db.com/exploits/43297/ -CVE-2017-17629 - https://packetstormsecurity.com/files/145327/Secure-E-commerce-Script-2.0.1-SQL-Injection.html -CVE-2017-17629 - https://www.exploit-db.com/exploits/43287/ -CVE-2017-17630 - https://packetstormsecurity.com/files/145322/Yoga-Class-Script-1.0-SQL-Injection.html -CVE-2017-17630 - https://www.exploit-db.com/exploits/43282/ -CVE-2017-17631 - https://packetstormsecurity.com/files/145341/Multireligion-Responsive-Matrimonial-4.7.2-SQL-Injection.html -CVE-2017-17631 - https://www.exploit-db.com/exploits/43299/ -CVE-2017-17632 - https://packetstormsecurity.com/files/145342/Responsive-Events-And-Movie-Ticket-Booking-Script-3.2.1-SQL-Injection.html -CVE-2017-17632 - https://www.exploit-db.com/exploits/43300/ -CVE-2017-17633 - https://packetstormsecurity.com/files/145343/Multiplex-Movie-Theater-Booking-Script-3.1.5-SQL-Injection.html -CVE-2017-17633 - https://www.exploit-db.com/exploits/43301/ -CVE-2017-17634 - https://packetstormsecurity.com/files/145344/Single-Theater-Booking-Script-3.2.1-SQL-Injection.html -CVE-2017-17634 - https://www.exploit-db.com/exploits/43302/ -CVE-2017-17635 - https://packetstormsecurity.com/files/145347/MLM-Forex-Market-Plan-Script-2.0.4-SQL-Injection.html -CVE-2017-17635 - https://www.exploit-db.com/exploits/43306/ -CVE-2017-17636 - https://packetstormsecurity.com/files/145348/MLM-Forced-Matrix-2.0.9-SQL-Injection.html -CVE-2017-17636 - https://www.exploit-db.com/exploits/43307/ -CVE-2017-17637 - https://packetstormsecurity.com/files/145349/Car-Rental-Script-2.0.4-SQL-Injection.html -CVE-2017-17637 - https://www.exploit-db.com/exploits/43308/ -CVE-2017-17638 - https://packetstormsecurity.com/files/145350/Groupon-Clone-Script-3.01-SQL-Injection.html -CVE-2017-17638 - https://www.exploit-db.com/exploits/43309/ -CVE-2017-17639 - https://packetstormsecurity.com/files/145351/Muslim-Matrimonial-Script-3.02-SQL-Injection.html -CVE-2017-17639 - https://www.exploit-db.com/exploits/43310/ -CVE-2017-17640 - https://packetstormsecurity.com/files/145352/Advanced-World-Database-2.0.5-SQL-Injection.html -CVE-2017-17640 - https://www.exploit-db.com/exploits/43311/ -CVE-2017-17641 - https://packetstormsecurity.com/files/145353/Resume-Clone-Script-2.0.5-SQL-Injection.html -CVE-2017-17641 - https://www.exploit-db.com/exploits/43312/ -CVE-2017-17642 - https://packetstormsecurity.com/files/145354/Basic-Job-Site-Script-2.0.5-SQL-Injection.html -CVE-2017-17642 - https://www.exploit-db.com/exploits/43314/ -CVE-2017-17643 - https://packetstormsecurity.com/files/145444/FS-Lynda-Clone-1.0-SQL-Injection.html -CVE-2017-17643 - https://www.exploit-db.com/exploits/43335/ -CVE-2017-17645 - https://packetstormsecurity.com/files/145445/Bus-Booking-Script-1.0-SQL-Injection.html -CVE-2017-17645 - https://www.exploit-db.com/exploits/43336/ -CVE-2017-17648 - https://www.exploit-db.com/exploits/43278 -CVE-2017-17649 - https://packetstormsecurity.com/files/145438/Readymade-Video-Sharing-Script-3.2-HTML-Injection.html -CVE-2017-17649 - https://www.exploit-db.com/exploits/43333/ -CVE-2017-17651 - https://packetstormsecurity.com/files/145439/Paid-To-Read-Script-2.0.5-SQL-Injection.html -CVE-2017-17651 - https://www.exploit-db.com/exploits/43334/ -CVE-2017-17662 - http://packetstormsecurity.com/files/145770/Yawcam-0.6.0-Directory-Traversal.html -CVE-2017-17669 - https://github.com/Exiv2/exiv2/issues/187 -CVE-2017-17672 - https://www.exploit-db.com/exploits/43362/ -CVE-2017-17681 - https://github.com/ImageMagick/ImageMagick/issues/869 -CVE-2017-17682 - https://github.com/ImageMagick/ImageMagick/issues/870 -CVE-2017-17683 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c44 -CVE-2017-17684 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c04_ -CVE-2017-17692 - http://packetstormsecurity.com/files/145510/Samsung-Internet-Browser-SOP-Bypass.html -CVE-2017-17692 - https://www.exploit-db.com/exploits/43376/ -CVE-2017-17704 - https://systemoverlord.com/2017/12/18/cve-2017-17704-broken-cryptography-in-istar-ultra-ip-acm-by-software-house.html -CVE-2017-17707 - https://www.profundis-labs.com/advisories/CVE-2017-17707.txt -CVE-2017-17708 - https://www.profundis-labs.com/advisories/CVE-2017-17708.txt -CVE-2017-17712 - https://usn.ubuntu.com/3581-1/ -CVE-2017-17712 - https://usn.ubuntu.com/3582-1/ -CVE-2017-17713 - https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/ -CVE-2017-17713 - https://www.youtube.com/watch?v=RWw1UTeZee8 -CVE-2017-17713 - https://www.youtube.com/watch?v=Txp6IwR24jY -CVE-2017-17713 - https://www.youtube.com/watch?v=efmvL235S-8 -CVE-2017-17714 - https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/ -CVE-2017-17714 - https://www.youtube.com/watch?v=Txp6IwR24jY -CVE-2017-17716 - https://gitlab.com/gitlab-org/gitlab-ce/issues/30420 -CVE-2017-17719 - http://seclists.org/fulldisclosure/2017/Dec/71 -CVE-2017-17719 - https://wpvulndb.com/vulnerabilities/8981 -CVE-2017-17721 - https://0day.today/exploit/29277 -CVE-2017-17721 - https://cxsecurity.com/issue/WLB-2017120155 -CVE-2017-17721 - https://packetstormsecurity.com/files/145511/BEIMS-ContractorWeb-5.18.0.0-SQL-Injection.html -CVE-2017-17721 - https://www.exploit-db.com/exploits/43379/ -CVE-2017-17722 - https://bugzilla.redhat.com/show_bug.cgi?id=1524116 -CVE-2017-17723 - https://bugzilla.redhat.com/show_bug.cgi?id=1524104 -CVE-2017-17724 - https://bugzilla.redhat.com/show_bug.cgi?id=1524107 -CVE-2017-17724 - https://github.com/Exiv2/exiv2/issues/263 -CVE-2017-17724 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md -CVE-2017-17725 - https://bugzilla.redhat.com/show_bug.cgi?id=1525055 -CVE-2017-17725 - https://github.com/Exiv2/exiv2/issues/188 -CVE-2017-17727 - https://www.seebug.org/vuldb/ssvid-20050 -CVE-2017-17733 - http://www.0day5.com/archives/4383/ -CVE-2017-17737 - https://www.exploit-db.com/exploits/43364/ -CVE-2017-17738 - https://www.exploit-db.com/exploits/43364/ -CVE-2017-17739 - https://www.exploit-db.com/exploits/43364/ -CVE-2017-17740 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2017-17740 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2017-17741 - https://usn.ubuntu.com/3620-1/ -CVE-2017-17742 - https://hackerone.com/reports/153794 -CVE-2017-17744 - http://seclists.org/fulldisclosure/2017/Dec/72 -CVE-2017-17744 - https://wpvulndb.com/vulnerabilities/8982 -CVE-2017-17745 - http://seclists.org/fulldisclosure/2017/Dec/67 -CVE-2017-17746 - http://seclists.org/fulldisclosure/2017/Dec/67 -CVE-2017-17747 - http://seclists.org/fulldisclosure/2017/Dec/67 -CVE-2017-17752 - https://www.exploit-db.com/exploits/43378/ -CVE-2017-17753 - http://seclists.org/fulldisclosure/2017/Dec/73 -CVE-2017-17759 - https://www.exploit-db.com/exploits/43377/ -CVE-2017-17760 - https://github.com/opencv/opencv/issues/10351 -CVE-2017-17762 - https://kryptera.se/sarbarhet-i-episerver/ -CVE-2017-17774 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/piwigo.md -CVE-2017-17775 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/piwigo.md -CVE-2017-17780 - https://packetstormsecurity.com/files/145469/Clockwork-SMS-Cross-Site-Scripting.html -CVE-2017-17786 - https://bugzilla.gnome.org/show_bug.cgi?id=739134 -CVE-2017-17787 - https://bugzilla.gnome.org/show_bug.cgi?id=790853 -CVE-2017-17789 - https://bugzilla.gnome.org/show_bug.cgi?id=790849 -CVE-2017-17790 - https://github.com/ruby/ruby/pull/1777 -CVE-2017-17792 - https://github.com/BlogoText/blogotext/issues/345 -CVE-2017-17793 - https://github.com/BlogoText/blogotext/issues/345 -CVE-2017-17794 - https://github.com/BlogoText/blogotext/issues/345 -CVE-2017-17795 - https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000088 -CVE-2017-17796 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x827300A4 -CVE-2017-17797 - https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000058 -CVE-2017-17798 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x8273A0A0 -CVE-2017-17799 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x82730068 -CVE-2017-17800 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273A0A0 -CVE-2017-17801 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273E060 -CVE-2017-17802 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273E080 -CVE-2017-17803 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x82736068 -CVE-2017-17804 - https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000084 -CVE-2017-17805 - https://usn.ubuntu.com/3620-1/ -CVE-2017-17806 - https://usn.ubuntu.com/3583-2/ -CVE-2017-17807 - https://usn.ubuntu.com/3620-1/ -CVE-2017-17809 - https://github.com/VerSprite/research/blob/master/advisories/VS-2017-007.md -CVE-2017-17822 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md -CVE-2017-17823 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md -CVE-2017-17824 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md -CVE-2017-17825 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Stored%20XSS%20Vulnerabilities%20in%20Piwigo%202.9.2.md -CVE-2017-17826 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Stored%20XSS%20Vulnerabilities%20in%20Piwigo%202.9.2.md -CVE-2017-17827 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Cross%20Site%20Request%20Forgery%20in%20Piwigo%202.9.2.md -CVE-2017-17828 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md -CVE-2017-17829 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md -CVE-2017-17830 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md -CVE-2017-17832 - http://packetstormsecurity.com/files/145517/ServersCheck-Monitoring-Software-Cross-Site-Scripting.html -CVE-2017-17837 - https://issues.apache.org/jira/browse/DELTASPIKE-1307 -CVE-2017-17847 - https://sourceforge.net/p/enigmail/bugs/709/ -CVE-2017-17848 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2017-17848 - https://sourceforge.net/p/enigmail/bugs/709/ -CVE-2017-17849 - https://packetstormsecurity.com/files/145530/GetGo-Download-Manager-5.3.0.2712-Buffer-Overflow.html -CVE-2017-17849 - https://www.exploit-db.com/exploits/43391/ -CVE-2017-17849 - https://www.exploit-db.com/exploits/45087/ -CVE-2017-17852 - http://www.openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-17853 - http://www.openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-17854 - http://www.openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-17855 - http://www.openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-17856 - http://www.openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-17857 - http://www.openwall.com/lists/oss-security/2017/12/21/2 -CVE-2017-17859 - https://poctestblog.blogspot.com/2017/12/samsung-internet-browser-sop-bypassuxss.html -CVE-2017-17860 - https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM -CVE-2017-17866 - https://bugs.ghostscript.com/show_bug.cgi?id=698699 -CVE-2017-17867 - https://neonsea.uk/blog/2017/12/23/rce-inteno-iopsys.html -CVE-2017-17867 - https://www.exploit-db.com/exploits/43428/ -CVE-2017-17868 - https://cxsecurity.com/issue/WLB-2017120169 -CVE-2017-17869 - https://cxsecurity.com/issue/WLB-2017120183 -CVE-2017-17870 - https://www.exploit-db.com/exploits/43323/ -CVE-2017-17871 - https://www.exploit-db.com/exploits/43329/ -CVE-2017-17872 - https://www.exploit-db.com/exploits/43330/ -CVE-2017-17873 - https://www.exploit-db.com/exploits/43316/ -CVE-2017-17874 - https://www.exploit-db.com/exploits/43315/ -CVE-2017-17875 - https://www.exploit-db.com/exploits/43393/ -CVE-2017-17876 - https://www.exploit-db.com/exploits/43394/ -CVE-2017-17888 - https://www.seebug.org/vuldb/ssvid-96555 -CVE-2017-1789 - https://exchange.xforce.ibmcloud.com/vulnerabilities/137034 -CVE-2017-17891 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md -CVE-2017-17892 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md -CVE-2017-17893 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md -CVE-2017-17894 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md -CVE-2017-17895 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md -CVE-2017-17896 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md -CVE-2017-17901 - http://packetstormsecurity.com/files/145548/ZyXEL-P-660HW-TTL-Expiry-Denial-Of-Service.html -CVE-2017-17903 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/FS%20Lynda%20Clone.md -CVE-2017-17904 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/FS%20Lynda%20Clone.md -CVE-2017-17905 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md -CVE-2017-17906 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md -CVE-2017-17907 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md -CVE-2017-17908 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Responsive%20Realestate%20Script.md -CVE-2017-17909 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Responsive%20Realestate%20Script.md -CVE-2017-17912 - https://sourceforge.net/p/graphicsmagick/bugs/533/ -CVE-2017-17924 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17925 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17926 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17927 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17928 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17929 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17930 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -CVE-2017-17932 - https://www.exploit-db.com/exploits/43406/ -CVE-2017-17932 - https://www.exploit-db.com/exploits/43407/ -CVE-2017-17932 - https://www.exploit-db.com/exploits/43523/ -CVE-2017-17933 - https://packetstormsecurity.com/files/145572/NetWin-SurgeFTP-23f2-Cross-Site-Scripting.html -CVE-2017-17934 - https://github.com/ImageMagick/ImageMagick/issues/920 -CVE-2017-17936 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Vanguard.md -CVE-2017-17937 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Vanguard.md -CVE-2017-17938 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md -CVE-2017-17939 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md -CVE-2017-17940 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md -CVE-2017-17941 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md -CVE-2017-17942 - http://bugzilla.maptools.org/show_bug.cgi?id=2767 -CVE-2017-17944 - http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues -CVE-2017-17945 - http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues -CVE-2017-17946 - https://sidechannel.tempestsi.com/password-manager-flaw-allows-for-arbitrary-command-execution-b6bb273206b1 -CVE-2017-17951 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17952 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17953 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17954 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17955 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17956 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17957 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17958 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17959 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17960 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -CVE-2017-17968 - https://www.exploit-db.com/exploits/43408/ -CVE-2017-17970 - http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html -CVE-2017-17970 - https://www.exploit-db.com/exploits/43477/ -CVE-2017-17971 - https://github.com/Dolibarr/dolibarr/issues/8000 -CVE-2017-17976 - http://packetstormsecurity.com/files/145903/PerfexCRM-1.9.7-Arbitrary-File-Upload.html -CVE-2017-17976 - https://www.exploit-db.com/exploits/43590/ -CVE-2017-17981 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17982 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17983 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17984 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17985 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17986 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17987 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17988 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -CVE-2017-17989 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17990 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17991 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17992 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17993 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17994 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17995 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -CVE-2017-17996 - http://seclists.org/fulldisclosure/2018/Feb/10 -CVE-2017-17996 - http://www.ryantzj.com/flexense-syncbreeze-entreprise-10314-buffer-overflow-seh-bypass.html -CVE-2017-17999 - http://packetstormsecurity.com/files/145902/RISE-1.9-SQL-Injection.html -CVE-2017-17999 - https://www.exploit-db.com/exploits/43591/ -CVE-2017-18001 - https://www.exploit-db.com/exploits/44047/ -CVE-2017-18008 - https://github.com/ImageMagick/ImageMagick/issues/921 -CVE-2017-18009 - https://github.com/opencv/opencv/issues/10479 -CVE-2017-18010 - https://packetstormsecurity.com/files/145217/WordPress-Smart-Marketing-SMS-And-Newsletters-Forms-1.1.1-XSS.html -CVE-2017-18010 - https://wpvulndb.com/vulnerabilities/8974 -CVE-2017-18011 - https://packetstormsecurity.com/files/144978/WordPress-Affiliate-Ads-For-Clickbank-Products-1.3-XSS.html -CVE-2017-18011 - https://wpvulndb.com/vulnerabilities/8989 -CVE-2017-18012 - https://packetstormsecurity.com/files/145218/WordPress-Z-URL-Preview-1.6.1-Cross-Site-Scripting.html -CVE-2017-18012 - https://wpvulndb.com/vulnerabilities/8990 -CVE-2017-18013 - https://usn.ubuntu.com/3606-1/ -CVE-2017-18015 - https://packetstormsecurity.com/files/145464/WordPress-Share-This-Image-1.03-Cross-Site-Scripting.html -CVE-2017-18015 - https://wpvulndb.com/vulnerabilities/8991 -CVE-2017-18016 - http://www.openwall.com/lists/oss-security/2018/01/10/1 -CVE-2017-18016 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 -CVE-2017-18016 - https://www.exploit-db.com/exploits/43499/ -CVE-2017-18017 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-18017 - https://usn.ubuntu.com/3583-2/ -CVE-2017-18020 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18021 - https://github.com/IJHack/QtPass/issues/338 -CVE-2017-18022 - https://github.com/ImageMagick/ImageMagick/issues/904 -CVE-2017-18023 - http://packetstormsecurity.com/files/145775/Office-Tracker-11.2.5-Cross-Site-Scripting.html -CVE-2017-18024 - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html -CVE-2017-18025 - https://www.exploit-db.com/exploits/43343/ -CVE-2017-18032 - https://security.dxw.com/advisories/xss-download-manager/ -CVE-2017-18044 - https://www.securifera.com/advisories/sec-2017-0001/ -CVE-2017-18047 - https://www.exploit-db.com/exploits/42011/ -CVE-2017-18047 - https://www.exploit-db.com/exploits/43236/ -CVE-2017-18047 - https://www.exploit-db.com/exploits/43518/ -CVE-2017-18048 - https://securityprince.blogspot.in/2017/12/monstra-cms-304-arbitrary-file-upload.html -CVE-2017-18048 - https://www.exploit-db.com/exploits/43348/ -CVE-2017-18049 - https://www.exploit-db.com/exploits/43396/ -CVE-2017-18071 - http://www.securityfocus.com/bid/103671 -CVE-2017-18072 - http://www.securityfocus.com/bid/103671 -CVE-2017-18073 - http://www.securityfocus.com/bid/103671 -CVE-2017-18074 - http://www.securityfocus.com/bid/103671 -CVE-2017-18078 - http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html -CVE-2017-18078 - http://www.openwall.com/lists/oss-security/2018/01/29/3 -CVE-2017-18078 - https://www.exploit-db.com/exploits/43935/ -CVE-2017-18096 - https://ecosystem.atlassian.net/browse/APL-1359 -CVE-2017-18111 - https://ecosystem.atlassian.net/browse/APL-1338 -CVE-2017-18120 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878739 -CVE-2017-18120 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881120 -CVE-2017-18124 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18125 - http://www.securityfocus.com/bid/103671 -CVE-2017-18126 - http://www.securityfocus.com/bid/103671 -CVE-2017-18127 - http://www.securityfocus.com/bid/103671 -CVE-2017-18128 - http://www.securityfocus.com/bid/103671 -CVE-2017-18129 - http://www.securityfocus.com/bid/103671 -CVE-2017-18130 - http://www.securityfocus.com/bid/103671 -CVE-2017-18131 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18132 - http://www.securityfocus.com/bid/103671 -CVE-2017-18133 - http://www.securityfocus.com/bid/103671 -CVE-2017-18134 - http://www.securityfocus.com/bid/103671 -CVE-2017-18135 - http://www.securityfocus.com/bid/103671 -CVE-2017-18136 - http://www.securityfocus.com/bid/103671 -CVE-2017-18137 - http://www.securityfocus.com/bid/103671 -CVE-2017-18138 - http://www.securityfocus.com/bid/103671 -CVE-2017-18139 - http://www.securityfocus.com/bid/103671 -CVE-2017-18140 - http://www.securityfocus.com/bid/103671 -CVE-2017-18141 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18142 - http://www.securityfocus.com/bid/103671 -CVE-2017-18143 - http://www.securityfocus.com/bid/103671 -CVE-2017-18144 - http://www.securityfocus.com/bid/103671 -CVE-2017-18145 - http://www.securityfocus.com/bid/103671 -CVE-2017-18146 - http://www.securityfocus.com/bid/103671 -CVE-2017-18147 - http://www.securityfocus.com/bid/103671 -CVE-2017-18156 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18157 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18160 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18170 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18171 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18172 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18173 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18175 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html -CVE-2017-18176 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html -CVE-2017-18177 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html -CVE-2017-18178 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html -CVE-2017-18179 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html -CVE-2017-18189 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121 -CVE-2017-18195 - https://www.exploit-db.com/exploits/44194/ -CVE-2017-18198 - https://savannah.gnu.org/bugs/?52265 -CVE-2017-18199 - https://savannah.gnu.org/bugs/?52264 -CVE-2017-18212 - https://github.com/jerryscript-project/jerryscript/issues/2140 -CVE-2017-18214 - https://www.tenable.com/security/tns-2019-02 -CVE-2017-18219 - https://sourceforge.net/p/graphicsmagick/bugs/459/ -CVE-2017-18220 - https://sourceforge.net/p/graphicsmagick/bugs/438/ -CVE-2017-18222 - http://www.securityfocus.com/bid/103349 -CVE-2017-18229 - https://sourceforge.net/p/graphicsmagick/bugs/461/ -CVE-2017-18242 - https://bugzilla.libav.org/show_bug.cgi?id=1093 -CVE-2017-18243 - https://bugzilla.libav.org/show_bug.cgi?id=1088 -CVE-2017-18244 - https://bugzilla.libav.org/show_bug.cgi?id=1105 -CVE-2017-18245 - https://bugzilla.libav.org/show_bug.cgi?id=1094 -CVE-2017-18246 - https://bugzilla.libav.org/show_bug.cgi?id=1095 -CVE-2017-18247 - https://bugzilla.libav.org/show_bug.cgi?id=1089 -CVE-2017-18255 - https://usn.ubuntu.com/3696-1/ -CVE-2017-18256 - https://www.exploit-db.com/exploits/44474/ -CVE-2017-18257 - https://usn.ubuntu.com/3696-1/ -CVE-2017-18258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2017-18263 - https://packetstormsecurity.com/files/147274/Seagate-Media-Server-Path-Traversal.html -CVE-2017-18263 - https://sumofpwn.nl/advisory/2017/seagate-media-server-path-traversal-vulnerability.html -CVE-2017-18267 - https://bugzilla.freedesktop.org/show_bug.cgi?id=103238 -CVE-2017-18274 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18275 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18276 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18277 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18278 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18279 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18280 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18282 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18283 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18285 - https://bugs.gentoo.org/641842 -CVE-2017-18286 - https://packetstormsecurity.com/files/143725/nZEDb-0.7.3.3-Cross-Site-Scripting.html -CVE-2017-18292 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18293 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18294 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18295 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18296 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18297 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18298 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18299 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18300 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18301 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18302 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18303 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18304 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18305 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18308 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18309 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18310 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18311 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18312 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18313 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18314 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18315 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18316 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18317 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18318 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18319 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18320 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18321 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18322 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18323 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18324 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18326 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18327 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18328 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18329 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18330 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18331 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18332 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-18344 - https://www.exploit-db.com/exploits/45175/ -CVE-2017-18345 - https://www.exploit-db.com/exploits/44252 -CVE-2017-18346 - https://vuldb.com/?id.123295 -CVE-2017-18346 - https://www.exploit-db.com/exploits/42577/ -CVE-2017-18347 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html -CVE-2017-18348 - https://korelogic.com/Resources/Advisories/KL-001-2017-022.txt -CVE-2017-18349 - https://fortiguard.com/encyclopedia/ips/44059 -CVE-2017-18357 - http://packetstormsecurity.com/files/152995/Shopware-createInstanceFromNamedArguments-PHP-Object-Instantiation.html -CVE-2017-18358 - https://blog.ripstech.com/2018/limesurvey-persistent-xss-to-code-execution/ -CVE-2017-18362 - https://github.com/kbni/owlky -CVE-2017-18364 - http://packetstormsecurity.com/files/153591/phpFK-lite-version-Cross-Site-Scripting.html -CVE-2017-18364 - https://www.netsparker.com/web-applications-advisories/ns-17-030-multiple-reflected-xss-vulnerabilities-in-phpfkl-lite/ -CVE-2017-18368 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18368 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18368 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18369 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18369 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18369 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18370 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18370 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18370 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18371 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18371 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18371 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18372 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18372 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18372 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18373 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18373 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18373 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18374 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -CVE-2017-18374 - https://seclists.org/fulldisclosure/2017/Jan/40 -CVE-2017-18374 - https://ssd-disclosure.com/index.php/archives/2910 -CVE-2017-18376 - https://gist.github.com/RaJiska/c1b4521aefd77ed43b06045ca05e2591 -CVE-2017-18377 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-root-rce -CVE-2017-18378 - https://kb.netgear.com/000049072/Security-Advisory-for-Command-Injection-in-ReadyNAS-Surveillance-Application-PSV-2017-2653 -CVE-2017-18378 - https://www.exploit-db.com/exploits/42956 -CVE-2017-18483 - https://www.pentestpartners.com/security-blog/nifty-xss-in-annke-sp1-hd-wireless-camera/ -CVE-2017-18486 - https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-Authentication.html -CVE-2017-18486 - https://www.exploit-db.com/exploits/42776 -CVE-2017-18486 - https://www.trustedsec.com/2017/09/full-disclosure-jitbit-helpdesk-authentication-bypass-0-day -CVE-2017-18499 - https://wpvulndb.com/vulnerabilities/9718 -CVE-2017-18508 - https://wpvulndb.com/vulnerabilities/9719 -CVE-2017-18509 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2017-18509 - https://lists.openwall.net/netdev/2017/12/04/40 -CVE-2017-18509 - https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf -CVE-2017-18538 - https://wpvulndb.com/vulnerabilities/9723 -CVE-2017-18539 - https://wpvulndb.com/vulnerabilities/9724 -CVE-2017-18540 - https://wpvulndb.com/vulnerabilities/9725 -CVE-2017-18549 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860 -CVE-2017-18550 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860 -CVE-2017-18551 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa -CVE-2017-18552 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=780e982905bef61d13496d9af5310bf4af3a64d3 -CVE-2017-18559 - https://wpvulndb.com/vulnerabilities/9727 -CVE-2017-18594 - https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF -CVE-2017-18595 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8 -CVE-2017-18596 - https://wpvulndb.com/vulnerabilities/8965 -CVE-2017-18597 - http://lenonleite.com.br/en/2017/09/11/jtrt-responsive-tables-wordpress-plugin-sql-injection/ -CVE-2017-18597 - https://wpvulndb.com/vulnerabilities/8953 -CVE-2017-18598 - https://wpvulndb.com/vulnerabilities/8934 -CVE-2017-18599 - https://wpvulndb.com/vulnerabilities/8900 -CVE-2017-18600 - https://wpvulndb.com/vulnerabilities/8877 -CVE-2017-18601 - https://www.exploit-db.com/exploits/42351 -CVE-2017-18602 - https://www.exploit-db.com/exploits/42351 -CVE-2017-18604 - https://wpvulndb.com/vulnerabilities/8829 -CVE-2017-18605 - https://wpvulndb.com/vulnerabilities/8824 -CVE-2017-18606 - https://wpvulndb.com/vulnerabilities/8801 -CVE-2017-18607 - https://wpvulndb.com/vulnerabilities/8801 -CVE-2017-18608 - https://wpvulndb.com/vulnerabilities/9360 -CVE-2017-18609 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_magic_fields_1_wordpress_plugin.html -CVE-2017-18610 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_magic_fields_1_wordpress_plugin.html -CVE-2017-18611 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_magic_fields_1_wordpress_plugin.html -CVE-2017-18612 - https://rastating.github.io/wp-whois-domain-reflected-xss/ -CVE-2017-18613 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_trust_form_wordpress_plugin.html -CVE-2017-18614 - https://seclists.org/fulldisclosure/2017/Feb/67 -CVE-2017-18635 - https://github.com/ShielderSec/cve-2017-18635 -CVE-2017-18635 - https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ -CVE-2017-18638 - https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf -CVE-2017-18639 - https://www.exploit-db.com/exploits/42792 -CVE-2017-18640 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2017-18643 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18644 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18645 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18646 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18647 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18648 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18649 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18650 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18651 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18652 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18653 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18654 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18655 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18656 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18657 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18658 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18659 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18660 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18661 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18662 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18663 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18664 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18665 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18666 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18667 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18668 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18669 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18670 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18671 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18672 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18673 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18674 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18675 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18676 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18677 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18678 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18679 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18680 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18681 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18682 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18683 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18684 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18685 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18686 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18687 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18688 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18689 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18690 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18691 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18692 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18693 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18694 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18695 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18696 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2017-18697 - https://kb.netgear.com/000053205/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2628 -CVE-2017-18699 - https://kb.netgear.com/000053203/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2595 -CVE-2017-18700 - https://kb.netgear.com/000053202/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-Extenders-PSV-2017-0342 -CVE-2017-18704 - https://kb.netgear.com/000053198/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-and-Gateways-PSV-2017-0590 -CVE-2017-18711 - https://kb.netgear.com/000053137/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2016-0131 -CVE-2017-18712 - https://kb.netgear.com/000053136/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-and-Gateways-PSV-2016-0127 -CVE-2017-18715 - https://kb.netgear.com/000053133/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Extenders-PSV-2016-0075 -CVE-2017-18718 - https://kb.netgear.com/000052279/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2152 -CVE-2017-18722 - https://kb.netgear.com/000052275/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2146 -CVE-2017-18724 - https://kb.netgear.com/000052273/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2144 -CVE-2017-18726 - https://kb.netgear.com/000051529/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2139 -CVE-2017-18728 - https://kb.netgear.com/000051527/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2136 -CVE-2017-18730 - https://kb.netgear.com/000051525/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2134 -CVE-2017-18732 - https://kb.netgear.com/000051523/Security-Advisory-for-Authentication-Bypass-on-R6300v2-PLW1000v2-and-PLW1010v2-PSV-2016-0069 -CVE-2017-18738 - https://kb.netgear.com/000051517/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Extenders-PSV-2017-0706 -CVE-2017-18747 - https://kb.netgear.com/000051507/Security-Advisory-for-Security-Misconfiguration-on-Some-Extenders-PSV-2016-0115 -CVE-2017-18751 - https://kb.netgear.com/000051503/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2517 -CVE-2017-18754 - https://kb.netgear.com/000051494/Security-Advisory-for-Post-Authentication-Command-Injection-on-Routers-PSV-2017-0329 -CVE-2017-18757 - https://kb.netgear.com/000051491/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2016-0120 -CVE-2017-18758 - https://kb.netgear.com/000051487/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2157 -CVE-2017-18759 - https://kb.netgear.com/000051486/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R8300-and-R8500-PSV-2017-2227 -CVE-2017-18761 - https://kb.netgear.com/000051484/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R8000-PSV-2017-2229 -CVE-2017-18765 - https://kb.netgear.com/000051480/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2017-0648 -CVE-2017-18767 - https://kb.netgear.com/000051476/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2017-0320 -CVE-2017-18768 - https://kb.netgear.com/000051475/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Extenders-PSV-2016-0130 -CVE-2017-18770 - https://kb.netgear.com/000051473/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Powerlines-and-a-Router-PSV-2016-0121 -CVE-2017-18775 - https://kb.netgear.com/000049553/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-and-Gateways-PSV-2017-0388 -CVE-2017-18782 - https://kb.netgear.com/000049537/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2017-2953 -CVE-2017-18783 - https://kb.netgear.com/000049536/Security-Advisory-for-Cross-Site-Scripting-on-Some-Routers-PSV-2017-2952 -CVE-2017-18784 - https://kb.netgear.com/000049535/Security-Advisory-for-Cross-Site-Scripting-on-Some-Routers-PSV-2017-2951 -CVE-2017-18788 - https://kb.netgear.com/000049527/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2947 -CVE-2017-18798 - https://kb.netgear.com/000049358/Security-Advisory-for-Security-Misconfiguration-Vulnerability-on-Some-Routers-and-Some-DSL-Modem-Routers-PSV-2017-2159 -CVE-2017-18800 - https://kb.netgear.com/000049356/Security-Advisory-for-Reflected-Cross-Site-Scripting-Vulnerability-on-R6700v2-and-R6800-PSV-2017-2162 -CVE-2017-18801 - https://kb.netgear.com/000049355/Security-Advisory-for-Command-Injection-Vulnerability-on-D7000-and-Some-Routers-PSV-2017-2151 -CVE-2017-18807 - https://kb.netgear.com/000049058/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-2001 -CVE-2017-18809 - https://kb.netgear.com/000049056/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0301 -CVE-2017-18810 - https://kb.netgear.com/000049055/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0300 -CVE-2017-18812 - https://kb.netgear.com/000049053/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0298 -CVE-2017-18813 - https://kb.netgear.com/000049052/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0296 -CVE-2017-18831 - https://kb.netgear.com/000049031/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Fully-Managed-Switches-PSV-2017-1952 -CVE-2017-18833 - https://kb.netgear.com/000049029/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Fully-Managed-Switches-PSV-2017-1955 -CVE-2017-18835 - https://kb.netgear.com/000049027/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Fully-Managed-Switches-PSV-2017-1957 -CVE-2017-18836 - https://kb.netgear.com/000049026/Security-Advisory-for-Denial-of-Service-on-Some-Fully-Managed-Switches-PSV-2017-1959 -CVE-2017-18841 - https://kb.netgear.com/000049018/Security-Advisory-for-Command-Injection-on-Some-Routers-and-a-Modem-Router-PSV-2017-2158 -CVE-2017-18844 - https://kb.netgear.com/000049015/Security-Advisory-for-an-Admin-Credential-Disclosure-on-Some-Routers-PSV-2017-2149 -CVE-2017-18849 - https://kb.netgear.com/000048999/Security-Advisory-for-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2017-1209 -CVE-2017-18851 - https://kb.netgear.com/000045850/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2017-1207 -CVE-2017-18852 - https://kb.netgear.com/000045849/Security-Advisory-for-CSRF-and-Authentication-Bypass-on-Some-Routers-PSV-2017-1206 -CVE-2017-18853 - https://kb.netgear.com/000045848/Security-Advisory-for-Password-Recovery-and-File-Access-on-Some-Routers-and-Modem-Routers-PSV-2017-0677 -CVE-2017-18854 - https://kb.netgear.com/000044333/Security-Advisory-for-Operating-System-Command-Injection-on-ReadyNAS-OS-6-Storage-Systems-PSV-2017-2002 -CVE-2017-18855 - https://kb.netgear.com/000038833/Security-Advisory-for-Unauthenticated-Command-Execution-on-WNR854T-PSV-2017-2317 -CVE-2017-18856 - https://kb.netgear.com/000044333/Security-Advisory-for-Operating-System-Command-Injection-on-ReadyNAS-OS-6-Storage-Systems-PSV-2017-2002 -CVE-2017-18857 - https://kb.netgear.com/000038799/Security-Fix-for-Password-Management-in-NETGEAR-Insight-App-PSV-2017-1978 -CVE-2017-18860 - https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857 -CVE-2017-18861 - https://kb.netgear.com/000038435/Security-Advisory-for-ReadyNAS-Surveillance-CSRF-Remote-Code-Execution-PSV-2017-0578 -CVE-2017-18864 - https://kb.netgear.com/000051495/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Routers-PSV-2017-0791 -CVE-2017-18867 - https://kb.netgear.com/000049554/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2017-2198 -CVE-2017-18870 - https://mattermost.com/security-updates/ -CVE-2017-18871 - https://mattermost.com/security-updates/ -CVE-2017-18872 - https://mattermost.com/security-updates/ -CVE-2017-18873 - https://mattermost.com/security-updates/ -CVE-2017-18874 - https://mattermost.com/security-updates/ -CVE-2017-18875 - https://mattermost.com/security-updates/ -CVE-2017-18876 - https://mattermost.com/security-updates/ -CVE-2017-18877 - https://mattermost.com/security-updates/ -CVE-2017-18878 - https://mattermost.com/security-updates/ -CVE-2017-18879 - https://mattermost.com/security-updates/ -CVE-2017-18880 - https://mattermost.com/security-updates/ -CVE-2017-18881 - https://mattermost.com/security-updates/ -CVE-2017-18882 - https://mattermost.com/security-updates/ -CVE-2017-18883 - https://mattermost.com/security-updates/ -CVE-2017-18884 - https://mattermost.com/security-updates/ -CVE-2017-18885 - https://mattermost.com/security-updates/ -CVE-2017-18886 - https://mattermost.com/security-updates/ -CVE-2017-18887 - https://mattermost.com/security-updates/ -CVE-2017-18888 - https://mattermost.com/security-updates/ -CVE-2017-18889 - https://mattermost.com/security-updates/ -CVE-2017-18890 - https://mattermost.com/security-updates/ -CVE-2017-18891 - https://mattermost.com/security-updates/ -CVE-2017-18892 - https://mattermost.com/security-updates/ -CVE-2017-18893 - https://mattermost.com/security-updates/ -CVE-2017-18894 - https://mattermost.com/security-updates/ -CVE-2017-18895 - https://mattermost.com/security-updates/ -CVE-2017-18896 - https://mattermost.com/security-updates/ -CVE-2017-18897 - https://mattermost.com/security-updates/ -CVE-2017-18898 - https://mattermost.com/security-updates/ -CVE-2017-18899 - https://mattermost.com/security-updates/ -CVE-2017-18900 - https://mattermost.com/security-updates/ -CVE-2017-18901 - https://mattermost.com/security-updates/ -CVE-2017-18902 - https://mattermost.com/security-updates/ -CVE-2017-18903 - https://mattermost.com/security-updates/ -CVE-2017-18904 - https://mattermost.com/security-updates/ -CVE-2017-18905 - https://mattermost.com/security-updates/ -CVE-2017-18906 - https://mattermost.com/security-updates/ -CVE-2017-18907 - https://mattermost.com/security-updates/ -CVE-2017-18908 - https://mattermost.com/security-updates/ -CVE-2017-18909 - https://mattermost.com/security-updates/ -CVE-2017-18910 - https://mattermost.com/security-updates/ -CVE-2017-18911 - https://mattermost.com/security-updates/ -CVE-2017-18912 - https://mattermost.com/security-updates/ -CVE-2017-18913 - https://mattermost.com/security-updates/ -CVE-2017-18914 - https://mattermost.com/security-updates/ -CVE-2017-18915 - https://mattermost.com/security-updates/ -CVE-2017-18916 - https://mattermost.com/security-updates/ -CVE-2017-18917 - https://mattermost.com/security-updates/ -CVE-2017-18918 - https://mattermost.com/security-updates/ -CVE-2017-18919 - https://mattermost.com/security-updates/ -CVE-2017-18920 - https://mattermost.com/security-updates/ -CVE-2017-18921 - https://mattermost.com/security-updates/ -CVE-2017-18923 - https://beronet.atlassian.net/wiki/spaces/PUB/pages/88768529/Security+Issues -CVE-2017-18924 - https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467 -CVE-2017-18926 - https://www.openwall.com/lists/oss-security/2017/06/07/1 -CVE-2017-20004 - https://github.com/rust-lang/rust/pull/41624 -CVE-2017-20008 - https://wpscan.com/vulnerability/3175c56d-27bb-4bf1-b6ba-737541483d40 -CVE-2017-20011 - https://vuldb.com/?id.101969 -CVE-2017-20012 - https://vuldb.com/?id.101969 -CVE-2017-20012 - https://vuldb.com/?id.101970 -CVE-2017-20013 - https://vuldb.com/?id.101969 -CVE-2017-20013 - https://vuldb.com/?id.101971 -CVE-2017-20014 - https://vuldb.com/?id.101969 -CVE-2017-20014 - https://vuldb.com/?id.101972 -CVE-2017-20015 - https://vuldb.com/?id.101969 -CVE-2017-20015 - https://vuldb.com/?id.101973 -CVE-2017-20016 - https://vuldb.com/?id.101969 -CVE-2017-20016 - https://vuldb.com/?id.101974 -CVE-2017-20017 - https://vuldb.com/?id.105833 -CVE-2017-20018 - https://packetstormsecurity.com/files/142406/xampp-dllhijack.txt -CVE-2017-20019 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20020 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20021 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20022 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20023 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20024 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20025 - http://seclists.org/fulldisclosure/2017/Mar/58 -CVE-2017-20026 - http://seclists.org/fulldisclosure/2017/Mar/47 -CVE-2017-20027 - http://seclists.org/fulldisclosure/2017/Mar/47 -CVE-2017-20028 - http://seclists.org/fulldisclosure/2017/Mar/48 -CVE-2017-20029 - http://seclists.org/fulldisclosure/2017/Mar/45 -CVE-2017-20029 - https://vuldb.com/?id.98915 -CVE-2017-20030 - http://seclists.org/fulldisclosure/2017/Mar/45 -CVE-2017-20031 - http://seclists.org/fulldisclosure/2017/Mar/45 -CVE-2017-20031 - https://vuldb.com/?id.98917 -CVE-2017-20032 - http://seclists.org/fulldisclosure/2017/Mar/45 -CVE-2017-20033 - http://seclists.org/fulldisclosure/2017/Mar/46 -CVE-2017-20034 - http://seclists.org/fulldisclosure/2017/Mar/46 -CVE-2017-20035 - http://seclists.org/fulldisclosure/2017/Mar/46 -CVE-2017-20036 - http://seclists.org/fulldisclosure/2017/Mar/46 -CVE-2017-20041 - http://seclists.org/fulldisclosure/2017/Mar/36 -CVE-2017-20041 - https://vuldb.com/?id.98214 -CVE-2017-20042 - http://seclists.org/fulldisclosure/2017/Mar/24 -CVE-2017-20043 - http://seclists.org/fulldisclosure/2017/Mar/24 -CVE-2017-20044 - http://seclists.org/fulldisclosure/2017/Mar/24 -CVE-2017-20045 - http://seclists.org/fulldisclosure/2017/Mar/24 -CVE-2017-20046 - http://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20047 - http://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20047 - https://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20048 - http://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20048 - https://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20049 - http://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20050 - http://seclists.org/fulldisclosure/2017/Mar/41 -CVE-2017-20053 - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html -CVE-2017-20054 - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html -CVE-2017-20055 - http://seclists.org/fulldisclosure/2017/Feb/100 -CVE-2017-20055 - https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html -CVE-2017-20056 - https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_user_login_log_wordpress_plugin.html -CVE-2017-20056 - https://vuldb.com/?id.97386 -CVE-2017-20057 - http://seclists.org/fulldisclosure/2017/Feb/36 -CVE-2017-20058 - http://seclists.org/fulldisclosure/2017/Feb/36 -CVE-2017-20059 - http://seclists.org/fulldisclosure/2017/Feb/36 -CVE-2017-20060 - http://seclists.org/fulldisclosure/2017/Feb/36 -CVE-2017-20061 - http://seclists.org/fulldisclosure/2017/Feb/36 -CVE-2017-20062 - http://seclists.org/fulldisclosure/2017/Feb/37 -CVE-2017-20063 - http://seclists.org/fulldisclosure/2017/Feb/39 -CVE-2017-20064 - http://seclists.org/fulldisclosure/2017/Feb/39 -CVE-2017-20065 - https://vuldb.com/?id.97385 -CVE-2017-20065 - https://www.exploit-db.com/exploits/41485/ -CVE-2017-20066 - https://sumofpwn.nl/advisory/2016/wordpress_adminer_plugin_allows_public__local__database_login.html -CVE-2017-20067 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20068 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20069 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20070 - https://vuldb.com/?id.95410 -CVE-2017-20070 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20071 - https://vuldb.com/?id.95411 -CVE-2017-20071 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20072 - https://vuldb.com/?id.95412 -CVE-2017-20072 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20073 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20074 - https://vuldb.com/?id.95414 -CVE-2017-20074 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20075 - https://vuldb.com/?id.95415 -CVE-2017-20075 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20076 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20077 - https://vuldb.com/?id.95417 -CVE-2017-20077 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20078 - https://vuldb.com/?id.95418 -CVE-2017-20078 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20079 - https://vuldb.com/?id.95419 -CVE-2017-20079 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20080 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20081 - https://www.exploit-db.com/exploits/41044/ -CVE-2017-20082 - http://seclists.org/fulldisclosure/2017/Feb/18 -CVE-2017-20082 - https://vuldb.com/?id.96815 -CVE-2017-20083 - http://seclists.org/fulldisclosure/2017/Feb/18 -CVE-2017-20083 - https://vuldb.com/?id.96816 -CVE-2017-20084 - http://seclists.org/fulldisclosure/2017/Feb/18 -CVE-2017-20084 - https://vuldb.com/?id.96817 -CVE-2017-20100 - https://www.vulnerability-lab.com/get_content.php?id=2035 -CVE-2017-20101 - http://seclists.org/fulldisclosure/2017/Feb/58 -CVE-2017-20101 - https://youtu.be/Xc6Jg9I7Pj4 -CVE-2017-20102 - https://www.vulnerability-lab.com/get_content.php?id=2033 -CVE-2017-20103 - http://seclists.org/fulldisclosure/2017/Feb/67 -CVE-2017-20104 - http://seclists.org/bugtraq/2017/Feb/39 -CVE-2017-20104 - https://vuldb.com/?id.97252 -CVE-2017-20105 - http://seclists.org/bugtraq/2017/Feb/40 -CVE-2017-20106 - https://vuldb.com/?id.97265 -CVE-2017-20106 - https://www.vulnerability-lab.com/get_content.php?id=2030 -CVE-2017-20107 - http://seclists.org/fulldisclosure/2017/Feb/28 -CVE-2017-20107 - https://vuldb.com/?id.97122 -CVE-2017-20108 - http://seclists.org/fulldisclosure/2017/Feb/24 -CVE-2017-20109 - http://seclists.org/fulldisclosure/2017/Feb/13 -CVE-2017-20109 - https://vuldb.com/?id.96805 -CVE-2017-20110 - http://seclists.org/fulldisclosure/2017/Feb/13 -CVE-2017-20111 - http://seclists.org/fulldisclosure/2017/Feb/13 -CVE-2017-20112 - http://seclists.org/fulldisclosure/2017/Feb/14 -CVE-2017-20112 - https://vuldb.com/?id.96655 -CVE-2017-20113 - https://vuldb.com/?id.96627 -CVE-2017-20113 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20114 - https://vuldb.com/?id.96628 -CVE-2017-20114 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20115 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20116 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20117 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20118 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20119 - https://vuldb.com/?id.96633 -CVE-2017-20119 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20120 - https://www.exploit-db.com/exploits/41184/ -CVE-2017-20121 - https://vuldb.com/?id.97279 -CVE-2017-20123 - http://seclists.org/fulldisclosure/2017/Feb/1 -CVE-2017-20124 - https://vuldb.com/?id.96624 -CVE-2017-20124 - https://www.exploit-db.com/exploits/41182/ -CVE-2017-20125 - https://www.exploit-db.com/exploits/41181/ -CVE-2017-20126 - https://www.exploit-db.com/exploits/41166/ -CVE-2017-20127 - https://www.exploit-db.com/exploits/41167/ -CVE-2017-20128 - https://vuldb.com/?id.96619 -CVE-2017-20128 - https://www.exploit-db.com/exploits/41168/ -CVE-2017-20130 - https://www.exploit-db.com/exploits/41195/ -CVE-2017-20131 - https://vuldb.com/?id.96288 -CVE-2017-20131 - https://www.exploit-db.com/exploits/41194/ -CVE-2017-20132 - https://www.exploit-db.com/exploits/41193/ -CVE-2017-20134 - https://vuldb.com/?id.96284 -CVE-2017-20134 - https://www.exploit-db.com/exploits/41191/ -CVE-2017-20135 - https://www.exploit-db.com/exploits/41190/ -CVE-2017-20136 - https://www.exploit-db.com/exploits/41189/ -CVE-2017-20137 - https://vuldb.com/?id.96281 -CVE-2017-20137 - https://www.exploit-db.com/exploits/41188/ -CVE-2017-20139 - https://www.exploit-db.com/exploits/41155/ -CVE-2017-20140 - https://vuldb.com/?id.96254 -CVE-2017-20140 - https://www.exploit-db.com/exploits/41155/ -CVE-2017-20141 - https://vuldb.com/?id.96255 -CVE-2017-20141 - https://www.exploit-db.com/exploits/41155/ -CVE-2017-20142 - https://www.exploit-db.com/exploits/41155/ -CVE-2017-20143 - https://vuldb.com/?id.96257 -CVE-2017-20143 - https://www.exploit-db.com/exploits/41155/ -CVE-2017-20144 - https://www.vulnerability-lab.com/get_content.php?id=2029 -CVE-2017-20145 - http://seclists.org/fulldisclosure/2017/Feb/19 -CVE-2017-20146 - https://github.com/gorilla/handlers/pull/116 -CVE-2017-20149 - https://github.com/BigNerd95/Chimay-Red -CVE-2017-20149 - https://www.bleepingcomputer.com/news/security/hajime-botnet-makes-a-comeback-with-massive-scan-for-mikrotik-routers/ -CVE-2017-20152 - https://github.com/aerouk/imageserve/pull/27 -CVE-2017-20153 - https://github.com/aerouk/imageserve/pull/27 -CVE-2017-20154 - https://github.com/ghostlander/Phoenixcoin/releases/tag/v0.6.6.1-pxc -CVE-2017-20162 - https://github.com/vercel/ms/pull/89 -CVE-2017-20183 - https://github.com/zzxiang/external-media-without-import/releases/tag/v1.0.1 -CVE-2017-20184 - https://www.exploit-db.com/exploits/42705 -CVE-2017-20189 - https://clojure.atlassian.net/browse/CLJ-2204 -CVE-2017-20189 - https://github.com/frohoff/ysoserial/pull/68/files -CVE-2017-20189 - https://hackmd.io/@fe1w0/HyefvRQKp -CVE-2017-20189 - https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378 -CVE-2017-2096 - http://jvn.jp/en/jp/JVN50197114/index.html -CVE-2017-2122 - https://www.tenable.com/security/tns-2017-01 -CVE-2017-2137 - https://kb.netgear.com/000038443/Security-Advisory-for-Insecure-SOAP-Access-in-ProSAFE-Plus-Configuration-Utility-PSV-2017-1997 -CVE-2017-2168 - https://wpvulndb.com/vulnerabilities/8830 -CVE-2017-2176 - http://www.mod.go.jp/asdf/information/index.html -CVE-2017-2178 - http://www.mod.go.jp/atla/souhon/cals/nyusatsu_top.html -CVE-2017-2195 - https://wpvulndb.com/vulnerabilities/8844 -CVE-2017-2208 - http://www.mod.go.jp/atla/souhon/cals/nyusatsu_top.html -CVE-2017-2224 - https://wpvulndb.com/vulnerabilities/8859 -CVE-2017-2284 - https://wpvulndb.com/vulnerabilities/8878 -CVE-2017-2285 - https://wpvulndb.com/vulnerabilities/8879 -CVE-2017-2353 - https://www.exploit-db.com/exploits/41164/ -CVE-2017-2360 - https://www.exploit-db.com/exploits/41165/ -CVE-2017-2361 - https://www.exploit-db.com/exploits/41443/ -CVE-2017-2362 - https://www.exploit-db.com/exploits/41213/ -CVE-2017-2363 - https://www.exploit-db.com/exploits/41449/ -CVE-2017-2364 - https://www.exploit-db.com/exploits/41799/ -CVE-2017-2365 - https://www.exploit-db.com/exploits/41453/ -CVE-2017-2367 - https://www.exploit-db.com/exploits/41801/ -CVE-2017-2369 - https://www.exploit-db.com/exploits/41215/ -CVE-2017-2370 - https://www.exploit-db.com/exploits/41163/ -CVE-2017-2371 - https://www.exploit-db.com/exploits/41451/ -CVE-2017-2373 - https://www.exploit-db.com/exploits/41216/ -CVE-2017-2380 - http://www.securityfocus.com/bid/97138 -CVE-2017-2384 - http://www.securityfocus.com/bid/97138 -CVE-2017-2393 - http://www.securityfocus.com/bid/97138 -CVE-2017-2397 - http://www.securityfocus.com/bid/97138 -CVE-2017-2399 - http://www.securityfocus.com/bid/97138 -CVE-2017-2400 - http://www.securityfocus.com/bid/97138 -CVE-2017-2404 - http://www.securityfocus.com/bid/97138 -CVE-2017-2412 - http://www.securityfocus.com/bid/97138 -CVE-2017-2414 - http://www.securityfocus.com/bid/97138 -CVE-2017-2416 - https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/ -CVE-2017-2426 - https://s1gnalcha0s.github.io/ibooks/epub/2017/03/27/This-book-reads-you-using-JavaScript.html -CVE-2017-2434 - http://www.securityfocus.com/bid/97138 -CVE-2017-2442 - https://www.exploit-db.com/exploits/41800/ -CVE-2017-2443 - https://www.exploit-db.com/exploits/41790/ -CVE-2017-2445 - https://www.exploit-db.com/exploits/41802/ -CVE-2017-2446 - https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/ -CVE-2017-2446 - https://www.exploit-db.com/exploits/41741/ -CVE-2017-2446 - https://www.exploit-db.com/exploits/41742/ -CVE-2017-2447 - https://www.exploit-db.com/exploits/41743/ -CVE-2017-2452 - http://www.securityfocus.com/bid/97138 -CVE-2017-2454 - https://www.exploit-db.com/exploits/41807/ -CVE-2017-2455 - https://www.exploit-db.com/exploits/41809/ -CVE-2017-2456 - https://www.exploit-db.com/exploits/41778/ -CVE-2017-2457 - https://www.exploit-db.com/exploits/41803/ -CVE-2017-2459 - https://www.exploit-db.com/exploits/41810/ -CVE-2017-2460 - https://www.exploit-db.com/exploits/41811/ -CVE-2017-2464 - https://www.exploit-db.com/exploits/41931/ -CVE-2017-2466 - https://www.exploit-db.com/exploits/41812/ -CVE-2017-2468 - https://www.exploit-db.com/exploits/41868/ -CVE-2017-2469 - https://www.exploit-db.com/exploits/41869/ -CVE-2017-2470 - https://www.exploit-db.com/exploits/41867/ -CVE-2017-2471 - https://www.exploit-db.com/exploits/41813/ -CVE-2017-2472 - https://www.exploit-db.com/exploits/41791/ -CVE-2017-2473 - https://www.exploit-db.com/exploits/41792/ -CVE-2017-2474 - https://www.exploit-db.com/exploits/41793/ -CVE-2017-2476 - https://www.exploit-db.com/exploits/41814/ -CVE-2017-2478 - https://www.exploit-db.com/exploits/41794/ -CVE-2017-2479 - https://www.exploit-db.com/exploits/41866/ -CVE-2017-2480 - https://www.exploit-db.com/exploits/41865/ -CVE-2017-2482 - https://www.exploit-db.com/exploits/41796/ -CVE-2017-2483 - https://www.exploit-db.com/exploits/41797/ -CVE-2017-2484 - http://www.securityfocus.com/bid/97138 -CVE-2017-2489 - https://www.exploit-db.com/exploits/41798/ -CVE-2017-2490 - https://www.exploit-db.com/exploits/41804/ -CVE-2017-2491 - https://www.exploit-db.com/exploits/41964/ -CVE-2017-2495 - http://www.securityfocus.com/bid/98474 -CVE-2017-2496 - http://www.securityfocus.com/bid/98474 -CVE-2017-2501 - https://www.exploit-db.com/exploits/42054/ -CVE-2017-2504 - https://www.exploit-db.com/exploits/42064/ -CVE-2017-2506 - http://www.securityfocus.com/bid/98474 -CVE-2017-2508 - http://www.securityfocus.com/bid/98474 -CVE-2017-2508 - https://www.exploit-db.com/exploits/42066/ -CVE-2017-2509 - https://www.exploit-db.com/exploits/42046/ -CVE-2017-2510 - http://www.securityfocus.com/bid/98474 -CVE-2017-2510 - https://www.exploit-db.com/exploits/42067/ -CVE-2017-2514 - http://www.securityfocus.com/bid/98474 -CVE-2017-2514 - https://www.exploit-db.com/exploits/42063/ -CVE-2017-2515 - https://www.exploit-db.com/exploits/42068/ -CVE-2017-2516 - https://www.exploit-db.com/exploits/42047/ -CVE-2017-2521 - https://www.exploit-db.com/exploits/42103/ -CVE-2017-2522 - https://www.exploit-db.com/exploits/42049/ -CVE-2017-2523 - https://www.exploit-db.com/exploits/42050/ -CVE-2017-2524 - https://www.exploit-db.com/exploits/42051/ -CVE-2017-2526 - http://www.securityfocus.com/bid/98474 -CVE-2017-2527 - https://www.exploit-db.com/exploits/42052/ -CVE-2017-2528 - http://www.securityfocus.com/bid/98474 -CVE-2017-2528 - https://www.exploit-db.com/exploits/42105/ -CVE-2017-2531 - https://www.exploit-db.com/exploits/42104/ -CVE-2017-2533 - https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc -CVE-2017-2533 - https://www.exploit-db.com/exploits/42146/ -CVE-2017-2536 - https://www.exploit-db.com/exploits/42125/ -CVE-2017-2538 - http://www.securityfocus.com/bid/98474 -CVE-2017-2539 - http://www.securityfocus.com/bid/98474 -CVE-2017-2544 - http://www.securityfocus.com/bid/98474 -CVE-2017-2547 - http://www.securityfocus.com/bid/98474 -CVE-2017-2547 - https://www.exploit-db.com/exploits/42190/ -CVE-2017-2619 - https://bugzilla.redhat.com/show_bug.cgi?id=1429472 -CVE-2017-2619 - https://www.exploit-db.com/exploits/41740/ -CVE-2017-2619 - https://www.samba.org/samba/security/CVE-2017-2619.html -CVE-2017-2624 - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ -CVE-2017-2625 - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ -CVE-2017-2626 - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ -CVE-2017-2636 - http://www.openwall.com/lists/oss-security/2017/03/07/6 -CVE-2017-2636 - https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html -CVE-2017-2641 - https://moodle.org/mod/forum/discuss.php?d=349419 -CVE-2017-2641 - https://www.exploit-db.com/exploits/41828/ -CVE-2017-2662 - https://access.redhat.com/errata/RHSA-2021:1313 -CVE-2017-2671 - https://github.com/danieljiang0415/android_kernel_crash_poc -CVE-2017-2671 - https://www.exploit-db.com/exploits/42135/ -CVE-2017-2741 - https://www.exploit-db.com/exploits/42176/ -CVE-2017-2741 - https://www.exploit-db.com/exploits/45273/ -CVE-2017-2779 - https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html -CVE-2017-2780 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0276 -CVE-2017-2781 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0277 -CVE-2017-2782 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0278 -CVE-2017-2783 - http://www.talosintelligence.com/reports/TALOS-2017-0279/ -CVE-2017-2784 - http://www.talosintelligence.com/reports/TALOS-2017-0274/ -CVE-2017-2791 - http://www.talosintelligence.com/reports/TALOS-2016-0199/ -CVE-2017-2792 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0284 -CVE-2017-2794 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0286 -CVE-2017-2795 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0288 -CVE-2017-2797 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0290 -CVE-2017-2798 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0291 -CVE-2017-2799 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0292 -CVE-2017-2800 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0293 -CVE-2017-2800 - https://www.exploit-db.com/exploits/41984/ -CVE-2017-2804 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0298 -CVE-2017-2805 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0299 -CVE-2017-2807 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0303 -CVE-2017-2808 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0304 -CVE-2017-2809 - https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04 -CVE-2017-2809 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305 -CVE-2017-2810 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307 -CVE-2017-2814 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311 -CVE-2017-2817 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0318 -CVE-2017-2818 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319 -CVE-2017-2819 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0320 -CVE-2017-2820 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321 -CVE-2017-2821 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0322 -CVE-2017-2823 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0324 -CVE-2017-2824 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 -CVE-2017-2825 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326 -CVE-2017-2826 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 -CVE-2017-2827 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0328 -CVE-2017-2828 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0329 -CVE-2017-2829 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330 -CVE-2017-2830 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0331 -CVE-2017-2831 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0332 -CVE-2017-2832 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0335 -CVE-2017-2833 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334 -CVE-2017-2834 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336 -CVE-2017-2835 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337 -CVE-2017-2836 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338 -CVE-2017-2837 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339 -CVE-2017-2838 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340 -CVE-2017-2839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341 -CVE-2017-2841 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0343 -CVE-2017-2842 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0344 -CVE-2017-2843 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0345 -CVE-2017-2844 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0346 -CVE-2017-2845 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0347 -CVE-2017-2846 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0348 -CVE-2017-2847 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0349 -CVE-2017-2848 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0350 -CVE-2017-2849 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351 -CVE-2017-2850 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0352 -CVE-2017-2851 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0353 -CVE-2017-2853 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0355 -CVE-2017-2854 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0357 -CVE-2017-2855 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0358 -CVE-2017-2856 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0359 -CVE-2017-2857 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0360 -CVE-2017-2861 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0365 -CVE-2017-2863 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0367 -CVE-2017-2867 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0373 -CVE-2017-2868 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0374 -CVE-2017-2869 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0375 -CVE-2017-2871 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0378 -CVE-2017-2872 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0379 -CVE-2017-2873 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0380 -CVE-2017-2874 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0381 -CVE-2017-2875 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0382 -CVE-2017-2876 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0383 -CVE-2017-2877 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0384 -CVE-2017-2878 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0385 -CVE-2017-2879 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0386 -CVE-2017-2882 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0389 -CVE-2017-2883 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0390 -CVE-2017-2885 - http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html -CVE-2017-2885 - http://seclists.org/fulldisclosure/2020/Dec/3 -CVE-2017-2885 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392 -CVE-2017-2890 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0397 -CVE-2017-2891 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0398 -CVE-2017-2892 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0399 -CVE-2017-2893 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0400 -CVE-2017-2894 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0401 -CVE-2017-2895 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0402 -CVE-2017-2896 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0403 -CVE-2017-2897 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0404 -CVE-2017-2898 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 -CVE-2017-2899 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0406 -CVE-2017-2900 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0407 -CVE-2017-2901 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0408 -CVE-2017-2902 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0409 -CVE-2017-2903 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0410 -CVE-2017-2904 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0411 -CVE-2017-2905 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412 -CVE-2017-2906 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413 -CVE-2017-2907 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414 -CVE-2017-2908 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415 -CVE-2017-2910 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0417 -CVE-2017-2915 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0422 -CVE-2017-2916 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0423 -CVE-2017-2917 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0424 -CVE-2017-2918 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425 -CVE-2017-2919 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0426 -CVE-2017-2921 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0428 -CVE-2017-2922 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0429 -CVE-2017-2930 - http://packetstormsecurity.com/files/140463/Adobe-Flash-24.0.0.186-Code-Execution.html -CVE-2017-2930 - https://www.exploit-db.com/exploits/41008/ -CVE-2017-2930 - https://www.exploit-db.com/exploits/41012/ -CVE-2017-2931 - https://www.exploit-db.com/exploits/41608/ -CVE-2017-2932 - https://www.exploit-db.com/exploits/41609/ -CVE-2017-2933 - https://www.exploit-db.com/exploits/41610/ -CVE-2017-2934 - https://www.exploit-db.com/exploits/41611/ -CVE-2017-2935 - https://www.exploit-db.com/exploits/41612/ -CVE-2017-2985 - https://www.exploit-db.com/exploits/41422/ -CVE-2017-2986 - https://www.exploit-db.com/exploits/41423/ -CVE-2017-2988 - https://www.exploit-db.com/exploits/41421/ -CVE-2017-2992 - https://www.exploit-db.com/exploits/41420/ -CVE-2017-3006 - http://hyp3rlinx.altervista.org/advisories/ADOBE-CREATIVE-CLOUD-PRIVILEGE-ESCALATION.txt -CVE-2017-3006 - https://www.exploit-db.com/exploits/41878/ -CVE-2017-3011 - http://www.securityfocus.com/bid/97548 -CVE-2017-3012 - http://www.securityfocus.com/bid/97547 -CVE-2017-3013 - http://www.securityfocus.com/bid/97547 -CVE-2017-3034 - http://www.securityfocus.com/bid/97548 -CVE-2017-3042 - http://www.securityfocus.com/bid/97549 -CVE-2017-3048 - http://www.securityfocus.com/bid/97549 -CVE-2017-3049 - http://www.securityfocus.com/bid/97549 -CVE-2017-3055 - http://www.securityfocus.com/bid/97549 -CVE-2017-3061 - https://www.exploit-db.com/exploits/42018/ -CVE-2017-3064 - https://www.exploit-db.com/exploits/42019/ -CVE-2017-3066 - https://www.exploit-db.com/exploits/43993/ -CVE-2017-3068 - https://www.exploit-db.com/exploits/42017/ -CVE-2017-3076 - https://www.exploit-db.com/exploits/42247/ -CVE-2017-3077 - https://www.exploit-db.com/exploits/42248/ -CVE-2017-3078 - https://www.exploit-db.com/exploits/42249/ -CVE-2017-3106 - https://www.exploit-db.com/exploits/42480/ -CVE-2017-3126 - https://fortiguard.com/psirt/FG-IR-17-014 -CVE-2017-3128 - https://fortiguard.com/psirt/FG-IR-17-057 -CVE-2017-3130 - https://fortiguard.com/advisory/FG-IR-17-073 -CVE-2017-3131 - https://fortiguard.com/advisory/FG-IR-17-104 -CVE-2017-3131 - https://www.exploit-db.com/exploits/42388/ -CVE-2017-3132 - https://fortiguard.com/advisory/FG-IR-17-104 -CVE-2017-3132 - https://www.exploit-db.com/exploits/42388/ -CVE-2017-3133 - https://fortiguard.com/advisory/FG-IR-17-104 -CVE-2017-3133 - https://www.exploit-db.com/exploits/42388/ -CVE-2017-3141 - https://www.exploit-db.com/exploits/42121/ -CVE-2017-3157 - https://www.openoffice.org/security/cves/CVE-2017-3157.html -CVE-2017-3160 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-3164 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-3165 - https://brooklyn.apache.org/community/security/CVE-2017-3165.html -CVE-2017-3167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3169 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3169 - https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 -CVE-2017-3183 - https://www.kb.cert.org/vuls/id/742632 -CVE-2017-3184 - https://www.kb.cert.org/vuls/id/355151 -CVE-2017-3185 - https://www.kb.cert.org/vuls/id/355151 -CVE-2017-3186 - https://www.kb.cert.org/vuls/id/355151 -CVE-2017-3187 - https://www.kb.cert.org/vuls/id/168699 -CVE-2017-3188 - https://www.kb.cert.org/vuls/id/168699 -CVE-2017-3189 - https://www.kb.cert.org/vuls/id/168699 -CVE-2017-3191 - https://www.kb.cert.org/vuls/id/553503 -CVE-2017-3191 - https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ -CVE-2017-3192 - https://www.kb.cert.org/vuls/id/553503 -CVE-2017-3192 - https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ -CVE-2017-3193 - https://www.kb.cert.org/vuls/id/305448 -CVE-2017-3194 - https://www.scmagazine.com/pandora-apple-app-vulnerable-to-mitm-attacks/article/647106/ -CVE-2017-3195 - http://redr2e.com/commvault-edge-cve-2017-3195/ -CVE-2017-3195 - https://www.exploit-db.com/exploits/41823/ -CVE-2017-3195 - https://www.kb.cert.org/vuls/id/214283 -CVE-2017-3196 - http://blog.rewolf.pl/blog/?p=1778 -CVE-2017-3196 - https://www.itsecuritynews.info/vuln-printing-communications-association-rawether-cve-2017-3196-local-privilege-escalation-vulnerability/ -CVE-2017-3196 - https://www.kb.cert.org/vuls/id/600671 -CVE-2017-3197 - https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2017-01-002.md -CVE-2017-3197 - https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html -CVE-2017-3197 - https://www.kb.cert.org/vuls/id/507496 -CVE-2017-3198 - https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html -CVE-2017-3198 - https://www.kb.cert.org/vuls/id/507496 -CVE-2017-3199 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3199 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3199 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3200 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3200 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3200 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3201 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3201 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3201 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3202 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3202 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3202 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3203 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3203 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3203 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3206 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3206 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3206 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3207 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3207 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3207 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3208 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution -CVE-2017-3208 - https://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-3208 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-3209 - https://www.kb.cert.org/vuls/id/334207 -CVE-2017-3216 - http://www.kb.cert.org/vuls/id/350135 -CVE-2017-3218 - https://www.kb.cert.org/vuls/id/846320 -CVE-2017-3219 - https://www.kb.cert.org/vuls/id/489392 -CVE-2017-3223 - https://www.kb.cert.org/vuls/id/547255 -CVE-2017-3224 - https://www.kb.cert.org/vuls/id/793496 -CVE-2017-3225 - https://www.kb.cert.org/vuls/id/166743 -CVE-2017-3226 - https://www.kb.cert.org/vuls/id/166743 -CVE-2017-3230 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3231 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3232 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3233 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3234 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3235 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3236 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3237 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3238 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3239 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3240 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3241 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3241 - https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/ -CVE-2017-3241 - https://www.exploit-db.com/exploits/41145/ -CVE-2017-3242 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3243 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3244 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3245 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3246 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3247 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3248 - http://packetstormsecurity.com/files/152357/Oracle-Weblogic-Server-Deserialization-RMI-UnicastRef-Remote-Code-Execution.html -CVE-2017-3248 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3248 - https://www.exploit-db.com/exploits/44998/ -CVE-2017-3248 - https://www.tenable.com/security/research/tra-2017-07 -CVE-2017-3249 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3250 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3251 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3252 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3253 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3254 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3255 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3256 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3257 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3258 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3259 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3260 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3261 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3262 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3263 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3264 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3265 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3266 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3267 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3268 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3269 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3270 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3271 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3272 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3273 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3274 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3275 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3276 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3277 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3278 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3279 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3280 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3281 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3282 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3283 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3284 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3285 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3286 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3287 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3288 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3289 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3290 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3291 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3292 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3293 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3294 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3294 - https://www.tenable.com/security/research/tra-2017-03 -CVE-2017-3295 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3295 - https://www.tenable.com/security/research/tra-2017-03 -CVE-2017-3296 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3297 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3298 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3299 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3300 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3300 - https://erpscan.io/advisories/erpscan-17-005-oracle-peoplesoft-xss-vulnerability/ -CVE-2017-3301 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3302 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3303 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3304 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3305 - http://riddle.link/ -CVE-2017-3305 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3306 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3307 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3308 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3309 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3310 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3311 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3312 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3313 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3314 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3315 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3316 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3316 - https://www.exploit-db.com/exploits/41196/ -CVE-2017-3317 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3318 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3319 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3320 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3321 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3322 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3323 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3324 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3325 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3326 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3327 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3328 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3329 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3330 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3331 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3332 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3333 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3334 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3335 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3336 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3337 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3338 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3339 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3340 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3341 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3342 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3343 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3344 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3345 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3346 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3347 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3348 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3349 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3350 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3351 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3352 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3353 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3354 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3355 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3356 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3357 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3358 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3359 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3360 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3361 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3362 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3363 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3364 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3365 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3366 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3367 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3368 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3369 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3370 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3371 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3372 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3373 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3374 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3375 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3376 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3377 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3378 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3379 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3380 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3381 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3382 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3383 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3384 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3385 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3386 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3387 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3388 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3389 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3390 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3391 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3392 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3393 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3394 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3395 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3396 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3397 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3398 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3399 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3400 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3401 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3402 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3403 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3404 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3405 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3406 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3407 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3408 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3409 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3410 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3411 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3412 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3413 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3414 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3415 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3416 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3417 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3418 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3419 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3420 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3421 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3422 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3423 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3424 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3425 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3426 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3427 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3428 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3429 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3430 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3431 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3432 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3433 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3434 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3435 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3436 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3437 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3438 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3439 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3440 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3441 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3442 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3443 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html -CVE-2017-3444 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3445 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3446 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3450 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3451 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3452 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3453 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3454 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3455 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3456 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3457 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3458 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3459 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3460 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3461 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3462 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3463 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3464 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3465 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3467 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3468 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3469 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3470 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3471 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3472 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3473 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3474 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3475 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3476 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3477 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3478 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3479 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3480 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3481 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3482 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3483 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3484 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3485 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3486 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3487 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3488 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3489 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3490 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3491 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3492 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3493 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3494 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3495 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3496 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3497 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3498 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3499 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3500 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3501 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3502 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3503 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3504 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3505 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3506 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3507 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3508 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3509 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3510 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3511 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3512 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3513 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3514 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3515 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3516 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3517 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3518 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3519 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3520 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3521 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3522 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3523 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3524 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3525 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3526 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3527 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3528 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3528 - https://www.exploit-db.com/exploits/43592/ -CVE-2017-3529 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3530 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3531 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3531 - https://www.tenable.com/security/research/tra-2017-16 -CVE-2017-3532 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3533 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3534 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3535 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3536 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3537 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3538 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3539 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3540 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3541 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3542 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3543 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3544 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3545 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3546 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3546 - https://erpscan.io/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/ -CVE-2017-3546 - https://www.exploit-db.com/exploits/42034/ -CVE-2017-3547 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3547 - https://erpscan.io/advisories/erpscan-17-023-crlf-injection-peoplesoft-imservlet/ -CVE-2017-3548 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3548 - https://erpscan.io/advisories/erpscan-17-020-xxe-via-doctype-peoplesoft/ -CVE-2017-3548 - https://www.exploit-db.com/exploits/41925/ -CVE-2017-3549 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3549 - https://erpscan.io/advisories/erpscan-17-021-sql-injection-e-business-suite-iesfootprint/ -CVE-2017-3549 - https://www.exploit-db.com/exploits/41926/ -CVE-2017-3550 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3551 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3552 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3553 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3554 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3555 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3555 - https://erpscan.io/advisories/erpscan-17-024-dos-oracle-e-business-suite-anonymouslogin/ -CVE-2017-3556 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3556 - https://erpscan.io/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/ -CVE-2017-3557 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3558 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3558 - https://www.exploit-db.com/exploits/41904/ -CVE-2017-3559 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3560 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3561 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3561 - https://www.exploit-db.com/exploits/41905/ -CVE-2017-3562 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3563 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3563 - https://www.exploit-db.com/exploits/41908/ -CVE-2017-3564 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3565 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3567 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3568 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3569 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3570 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3571 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3572 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3573 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3574 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3575 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3575 - https://www.exploit-db.com/exploits/41906/ -CVE-2017-3576 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3576 - https://www.exploit-db.com/exploits/41907/ -CVE-2017-3577 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3578 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3579 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3580 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3581 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3582 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3583 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3584 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3585 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3586 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3587 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3587 - https://www.exploit-db.com/exploits/41932/ -CVE-2017-3588 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3589 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3590 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3591 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3592 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3593 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3594 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3595 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3596 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3597 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3598 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3599 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3599 - https://www.exploit-db.com/exploits/41954/ -CVE-2017-3599 - https://www.secforce.com/blog/2017/04/cve-2017-3599-pre-auth-mysql-remote-dos/ -CVE-2017-3600 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3601 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3602 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3603 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3604 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3605 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3606 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3607 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3608 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3609 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3610 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3611 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3612 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3613 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3614 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3615 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3616 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3617 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3618 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3619 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3620 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3621 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3622 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3622 - https://www.exploit-db.com/exploits/45479/ -CVE-2017-3623 - http://packetstormsecurity.com/files/155876/EBBISLAND-EBBSHAVE-6100-09-04-1441-Remote-Buffer-Overflow.html -CVE-2017-3623 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3625 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3626 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html -CVE-2017-3629 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html -CVE-2017-3629 - https://www.exploit-db.com/exploits/42270/ -CVE-2017-3629 - https://www.exploit-db.com/exploits/45625/ -CVE-2017-3630 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html -CVE-2017-3630 - https://www.exploit-db.com/exploits/42270/ -CVE-2017-3630 - https://www.exploit-db.com/exploits/45625/ -CVE-2017-3631 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html -CVE-2017-3631 - https://www.exploit-db.com/exploits/42270/ -CVE-2017-3631 - https://www.exploit-db.com/exploits/45625/ -CVE-2017-3632 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3633 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3633 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-3634 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3635 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3636 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3637 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3638 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3639 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3640 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3641 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3642 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3643 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3644 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3645 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3646 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3647 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3648 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3649 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3650 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3651 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3652 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3653 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3730 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3730 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3730 - https://www.exploit-db.com/exploits/41192/ -CVE-2017-3731 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3731 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3731 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3732 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3732 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-3732 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3733 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3733 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-3735 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3735 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-3735 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-3735 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-3735 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-3735 - https://www.tenable.com/security/tns-2017-14 -CVE-2017-3735 - https://www.tenable.com/security/tns-2017-15 -CVE-2017-3736 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3736 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-3736 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-3736 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-3736 - https://www.tenable.com/security/tns-2017-14 -CVE-2017-3736 - https://www.tenable.com/security/tns-2017-15 -CVE-2017-3737 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3737 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-3738 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-3738 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-3738 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-3738 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-3738 - https://www.tenable.com/security/tns-2018-04 -CVE-2017-3738 - https://www.tenable.com/security/tns-2018-06 -CVE-2017-3738 - https://www.tenable.com/security/tns-2018-07 -CVE-2017-3807 - https://www.exploit-db.com/exploits/41369/ -CVE-2017-3813 - https://www.exploit-db.com/exploits/41476/ -CVE-2017-3823 - https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html -CVE-2017-3881 - https://www.exploit-db.com/exploits/41872/ -CVE-2017-3881 - https://www.exploit-db.com/exploits/41874/ -CVE-2017-3891 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 -CVE-2017-3892 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 -CVE-2017-3893 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 -CVE-2017-3912 - https://kc.mcafee.com/corporate/index?page=content&id=SB10224 -CVE-2017-3980 - https://kc.mcafee.com/corporate/index?page=content&id=SB10196 -CVE-2017-4898 - http://www.vmware.com/security/advisories/VMSA-2017-0003.html -CVE-2017-4899 - http://www.vmware.com/security/advisories/VMSA-2017-0003.html -CVE-2017-4900 - http://www.vmware.com/security/advisories/VMSA-2017-0003.html -CVE-2017-4907 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4908 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4909 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4910 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4911 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4912 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4913 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html -CVE-2017-4914 - http://www.vmware.com/security/advisories/VMSA-2017-0010.html -CVE-2017-4914 - https://www.exploit-db.com/exploits/42152/ -CVE-2017-4915 - https://www.exploit-db.com/exploits/42045/ -CVE-2017-4916 - https://www.exploit-db.com/exploits/42140/ -CVE-2017-4917 - http://www.vmware.com/security/advisories/VMSA-2017-0010.html -CVE-2017-4918 - https://www.vmware.com/security/advisories/VMSA-2017-0011.html -CVE-2017-4924 - https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html -CVE-2017-4930 - https://www.vmware.com/us/security/advisories/VMSA-2017-0016.html -CVE-2017-4931 - https://www.vmware.com/us/security/advisories/VMSA-2017-0016.html -CVE-2017-4932 - https://www.vmware.com/us/security/advisories/VMSA-2017-0016.html -CVE-2017-5005 - https://github.com/payatu/QuickHeal -CVE-2017-5031 - https://bugzilla.mozilla.org/show_bug.cgi?id=1328762 -CVE-2017-5116 - https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html -CVE-2017-5123 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51 -CVE-2017-5124 - https://github.com/Bo0oM/CVE-2017-5124 -CVE-2017-5124 - https://www.reddit.com/r/netsec/comments/7cus2h/chrome_61_uxss_exploit_cve20175124/ -CVE-2017-5130 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-5135 - https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication_bypass/ -CVE-2017-5173 - https://www.exploit-db.com/exploits/41360/ -CVE-2017-5174 - https://www.exploit-db.com/exploits/41360/ -CVE-2017-5177 - https://www.exploit-db.com/exploits/42693/ -CVE-2017-5179 - https://www.tenable.com/security/tns-2017-01 -CVE-2017-5184 - https://www.tenable.com/security/research/tra-2017-15 -CVE-2017-5185 - https://www.tenable.com/security/research/tra-2017-15 -CVE-2017-5198 - http://blog.0xlabs.com/2017/03/solarwinds-lem-ssh-jailbreak-and.html -CVE-2017-5199 - http://blog.0xlabs.com/2017/03/solarwinds-lem-ssh-jailbreak-and.html -CVE-2017-5204 - https://hackerone.com/reports/202960 -CVE-2017-5206 - https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51 -CVE-2017-5206 - https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e -CVE-2017-5207 - https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc -CVE-2017-5207 - https://github.com/netblue30/firejail/issues/1023 -CVE-2017-5214 - https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt -CVE-2017-5215 - https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt -CVE-2017-5218 - http://research.aurainfosec.io/disclosures/sagecrm-CVE-2017-5219-CVE-2017-5218/ -CVE-2017-5219 - http://research.aurainfosec.io/disclosures/sagecrm-CVE-2017-5219-CVE-2017-5218/ -CVE-2017-5223 - https://www.exploit-db.com/exploits/43056/ -CVE-2017-5225 - http://bugzilla.maptools.org/show_bug.cgi?id=2656 -CVE-2017-5225 - http://bugzilla.maptools.org/show_bug.cgi?id=2657 -CVE-2017-5226 - https://github.com/projectatomic/bubblewrap/issues/142 -CVE-2017-5227 - https://www.exploit-db.com/exploits/41745/ -CVE-2017-5227 - https://www.qnap.com/en/support/con_show.php?cid=113 -CVE-2017-5244 - https://www.seekurity.com/blog/general/metasploit-web-project-kill-all-running-tasks-csrf-CVE-2017-5244/ -CVE-2017-5255 - https://www.exploit-db.com/exploits/43413/ -CVE-2017-5264 - https://www.exploit-db.com/exploits/43911/ -CVE-2017-5329 - https://www.exploit-db.com/exploits/41176/ -CVE-2017-5340 - https://bugs.php.net/bug.php?id=73832 -CVE-2017-5340 - https://hackerone.com/reports/195950 -CVE-2017-5341 - https://hackerone.com/reports/202965 -CVE-2017-5342 - https://hackerone.com/reports/202968 -CVE-2017-5344 - http://seclists.org/fulldisclosure/2017/Feb/34 -CVE-2017-5344 - https://www.exploit-db.com/exploits/41377/ -CVE-2017-5346 - http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.html -CVE-2017-5358 - http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt -CVE-2017-5358 - http://packetstormsecurity.com/files/141299/EasyCom-AS400-PHP-API-Buffer-Overflow.html -CVE-2017-5358 - http://seclists.org/fulldisclosure/2017/Feb/60 -CVE-2017-5358 - https://www.exploit-db.com/exploits/41425/ -CVE-2017-5359 - http://hyp3rlinx.altervista.org/advisories/EASYCOM-SQL-IPLUG-DENIAL-OF-SERVICE.txt -CVE-2017-5359 - http://packetstormsecurity.com/files/141300/EasyCom-SQL-iPlug-Denial-Of-Service.html -CVE-2017-5359 - http://seclists.org/fulldisclosure/2017/Feb/61 -CVE-2017-5359 - https://www.exploit-db.com/exploits/41426/ -CVE-2017-5367 - http://seclists.org/bugtraq/2017/Feb/6 -CVE-2017-5367 - http://seclists.org/fulldisclosure/2017/Feb/11 -CVE-2017-5368 - http://seclists.org/bugtraq/2017/Feb/6 -CVE-2017-5368 - http://seclists.org/fulldisclosure/2017/Feb/11 -CVE-2017-5371 - http://packetstormsecurity.com/files/140610/SAP-ASE-ODATA-Server-16-Denial-Of-Service.html -CVE-2017-5371 - https://erpscan.io/advisories/erpscan-16-036-sap-ase-odata-server-denial-service/ -CVE-2017-5372 - http://packetstormsecurity.com/files/140611/SAP-NetWeaver-AS-Java-P4-MSPRUNTIMEINTERFACE-Information-Disclosure.html -CVE-2017-5372 - http://seclists.org/fulldisclosure/2017/Jan/50 -CVE-2017-5372 - https://erpscan.io/advisories/erpscan-16-037-sap-java-p4-mspruntimeinterface-information-disclosure/ -CVE-2017-5373 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5375 - https://bugzilla.mozilla.org/show_bug.cgi?id=1325200 -CVE-2017-5375 - https://www.exploit-db.com/exploits/42327/ -CVE-2017-5375 - https://www.exploit-db.com/exploits/44293/ -CVE-2017-5375 - https://www.exploit-db.com/exploits/44294/ -CVE-2017-5375 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5376 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5378 - https://bugzilla.mozilla.org/show_bug.cgi?id=1312001 -CVE-2017-5378 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5380 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5383 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5384 - https://bugzilla.mozilla.org/show_bug.cgi?id=1255474 -CVE-2017-5386 - https://bugzilla.mozilla.org/show_bug.cgi?id=1319070 -CVE-2017-5387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1295023 -CVE-2017-5390 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5394 - https://bugzilla.mozilla.org/show_bug.cgi?id=1222798 -CVE-2017-5395 - https://bugzilla.mozilla.org/show_bug.cgi?id=1293463 -CVE-2017-5396 - https://www.mozilla.org/security/advisories/mfsa2017-03/ -CVE-2017-5400 - https://bugzilla.mozilla.org/show_bug.cgi?id=1334933 -CVE-2017-5404 - https://bugzilla.mozilla.org/show_bug.cgi?id=1340138 -CVE-2017-5404 - https://www.exploit-db.com/exploits/41660/ -CVE-2017-5407 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336622 -CVE-2017-5409 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321814 -CVE-2017-5411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1325511 -CVE-2017-5414 - https://bugzilla.mozilla.org/show_bug.cgi?id=1319370 -CVE-2017-5415 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321719 -CVE-2017-5420 - https://bugzilla.mozilla.org/show_bug.cgi?id=1284395 -CVE-2017-5421 - https://bugzilla.mozilla.org/show_bug.cgi?id=1301876 -CVE-2017-5428 - https://bugzilla.mozilla.org/show_bug.cgi?id=1348168 -CVE-2017-5429 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5430 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5432 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5433 - https://bugzilla.mozilla.org/show_bug.cgi?id=1347168 -CVE-2017-5433 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5434 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5435 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5436 - https://bugzilla.mozilla.org/show_bug.cgi?id=1345461 -CVE-2017-5436 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5438 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336828 -CVE-2017-5438 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5439 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336830 -CVE-2017-5439 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5440 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336832 -CVE-2017-5440 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5441 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5442 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5443 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5444 - https://bugzilla.mozilla.org/show_bug.cgi?id=1344461 -CVE-2017-5444 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5445 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5446 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5447 - https://bugzilla.mozilla.org/show_bug.cgi?id=1343552 -CVE-2017-5447 - https://www.exploit-db.com/exploits/42071/ -CVE-2017-5447 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5448 - https://bugzilla.mozilla.org/show_bug.cgi?id=1346648 -CVE-2017-5448 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5449 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5450 - https://bugzilla.mozilla.org/show_bug.cgi?id=1325955 -CVE-2017-5451 - https://bugzilla.mozilla.org/show_bug.cgi?id=1273537 -CVE-2017-5451 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5454 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5455 - https://bugzilla.mozilla.org/show_bug.cgi?id=1341191 -CVE-2017-5455 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5456 - https://bugzilla.mozilla.org/show_bug.cgi?id=1344415 -CVE-2017-5456 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5459 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5460 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5461 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-5461 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-5461 - https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 -CVE-2017-5461 - https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes -CVE-2017-5461 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-5462 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5464 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5465 - https://bugzilla.mozilla.org/show_bug.cgi?id=1347617 -CVE-2017-5465 - https://www.exploit-db.com/exploits/42072/ -CVE-2017-5465 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5466 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5467 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5469 - https://www.mozilla.org/security/advisories/mfsa2017-12/ -CVE-2017-5473 - https://www.exploit-db.com/exploits/41141/ -CVE-2017-5475 - https://github.com/s9y/Serendipity/issues/439 -CVE-2017-5476 - https://github.com/s9y/Serendipity/issues/439 -CVE-2017-5482 - https://hackerone.com/reports/202969 -CVE-2017-5484 - https://hackerone.com/reports/202967 -CVE-2017-5487 - https://wpvulndb.com/vulnerabilities/8715 -CVE-2017-5487 - https://www.exploit-db.com/exploits/41497/ -CVE-2017-5488 - https://wpvulndb.com/vulnerabilities/8716 -CVE-2017-5489 - https://wpvulndb.com/vulnerabilities/8717 -CVE-2017-5490 - https://wpvulndb.com/vulnerabilities/8718 -CVE-2017-5491 - https://wpvulndb.com/vulnerabilities/8719 -CVE-2017-5492 - https://wpvulndb.com/vulnerabilities/8720 -CVE-2017-5493 - https://wpvulndb.com/vulnerabilities/8721 -CVE-2017-5495 - http://www.securityfocus.com/bid/95745 -CVE-2017-5496 - http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html -CVE-2017-5496 - https://www.exploit-db.com/exploits/41395/ -CVE-2017-5498 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ -CVE-2017-5499 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ -CVE-2017-5500 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ -CVE-2017-5501 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ -CVE-2017-5502 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ -CVE-2017-5503 - http://www.openwall.com/lists/oss-security/2017/01/16/3 -CVE-2017-5503 - https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-write-in-dec_clnpass-jpc_t1dec-c/ -CVE-2017-5504 - https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jpc_undo_roi-jpc_dec-c/ -CVE-2017-5505 - http://www.openwall.com/lists/oss-security/2017/01/16/5 -CVE-2017-5505 - https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jas_matrix_asl-jas_seq-c/ -CVE-2017-5506 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851383 -CVE-2017-5506 - https://github.com/ImageMagick/ImageMagick/issues/354 -CVE-2017-5507 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 -CVE-2017-5508 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851381 -CVE-2017-5509 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851377 -CVE-2017-5509 - https://github.com/ImageMagick/ImageMagick/issues/350 -CVE-2017-5510 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851376 -CVE-2017-5510 - https://github.com/ImageMagick/ImageMagick/issues/348 -CVE-2017-5511 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851374 -CVE-2017-5511 - https://github.com/ImageMagick/ImageMagick/issues/347 -CVE-2017-5516 - https://github.com/semplon/GeniXCMS/issues/65 -CVE-2017-5517 - https://github.com/semplon/GeniXCMS/issues/66 -CVE-2017-5518 - https://github.com/semplon/GeniXCMS/issues/64 -CVE-2017-5520 - https://github.com/semplon/GeniXCMS/issues/62 -CVE-2017-5521 - https://www.exploit-db.com/exploits/41205/ -CVE-2017-5529 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-5529 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-5529 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-5533 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-5533 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-5533 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-5545 - https://github.com/libimobiledevice/libplist/issues/87 -CVE-2017-5554 - https://www.xda-developers.com/oneplus-33t-bootloader-vulnerability-allows-changing-of-selinux-to-permissive-mode-in-fastboot/ -CVE-2017-5563 - http://bugzilla.maptools.org/show_bug.cgi?id=2664 -CVE-2017-5563 - https://usn.ubuntu.com/3606-1/ -CVE-2017-5565 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ -CVE-2017-5565 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ -CVE-2017-5566 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ -CVE-2017-5566 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ -CVE-2017-5567 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ -CVE-2017-5567 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ -CVE-2017-5574 - https://github.com/semplon/GeniXCMS/issues/69 -CVE-2017-5575 - https://github.com/semplon/GeniXCMS/issues/68 -CVE-2017-5585 - http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html -CVE-2017-5586 - http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html -CVE-2017-5586 - https://www.exploit-db.com/exploits/41366/ -CVE-2017-5594 - https://www.exploit-db.com/exploits/41143/ -CVE-2017-5595 - http://seclists.org/bugtraq/2017/Feb/6 -CVE-2017-5595 - http://seclists.org/fulldisclosure/2017/Feb/11 -CVE-2017-5607 - http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt -CVE-2017-5607 - http://seclists.org/fulldisclosure/2017/Mar/89 -CVE-2017-5607 - https://www.exploit-db.com/exploits/41779/ -CVE-2017-5607 - https://www.splunk.com/view/SP-CAAAPZ3#InformationLeakageviaJavaScriptCVE20175607 -CVE-2017-5610 - https://wpvulndb.com/vulnerabilities/8729 -CVE-2017-5611 - https://wpvulndb.com/vulnerabilities/8730 -CVE-2017-5611 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2017-5612 - https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849 -CVE-2017-5612 - https://wpvulndb.com/vulnerabilities/8731 -CVE-2017-5627 - https://bugs.ghostscript.com/show_bug.cgi?id=697497 -CVE-2017-5628 - https://bugs.ghostscript.com/show_bug.cgi?id=697496 -CVE-2017-5630 - https://www.exploit-db.com/exploits/41185/ -CVE-2017-5631 - https://www.exploit-db.com/exploits/42042/ -CVE-2017-5633 - http://seclists.org/fulldisclosure/2017/Feb/70 -CVE-2017-5634 - https://www.youtube.com/watch?v=2j9gP5Qu2WA -CVE-2017-5637 - https://issues.apache.org/jira/browse/ZOOKEEPER-2693 -CVE-2017-5637 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-5637 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-5638 - http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html -CVE-2017-5638 - http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ -CVE-2017-5638 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-5638 - https://github.com/rapid7/metasploit-framework/issues/8064 -CVE-2017-5638 - https://isc.sans.edu/diary/22169 -CVE-2017-5638 - https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt -CVE-2017-5638 - https://www.exploit-db.com/exploits/41614/ -CVE-2017-5641 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-5644 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-5645 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-5645 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-5645 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2017-5645 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-5645 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-5647 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-5650 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-5651 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-5651 - http://www.securityfocus.com/bid/97544 -CVE-2017-5662 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-5662 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-5662 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-5664 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-5664 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-5664 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-5665 - https://blogs.gentoo.org/ago/2017/01/29/mp3splt-null-pointer-dereference-in-splt_cue_export_to_file-cue-c/ -CVE-2017-5666 - https://blogs.gentoo.org/ago/2017/01/29/mp3splt-invalid-free-in-free_options-options_manager-c/ -CVE-2017-5669 - https://bugzilla.kernel.org/show_bug.cgi?id=192931 -CVE-2017-5669 - https://usn.ubuntu.com/3583-2/ -CVE-2017-5671 - https://akerva.com/blog/intermec-industrial-printers-local-root-with-busybox-jailbreak/ -CVE-2017-5671 - https://github.com/kmkz/exploit/blob/master/CVE-2017-5671-Credits.pdf -CVE-2017-5671 - https://www.exploit-db.com/exploits/41754/ -CVE-2017-5672 - http://packetstormsecurity.com/files/142012/Kony-EMM-4.2.0-Private-Key-Disclosure.html -CVE-2017-5673 - http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.html -CVE-2017-5677 - http://seclists.org/fulldisclosure/2017/Feb/12 -CVE-2017-5689 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -CVE-2017-5689 - https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability -CVE-2017-5706 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-5709 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-5715 - http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html -CVE-2017-5715 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html -CVE-2017-5715 - http://www.kb.cert.org/vuls/id/584653 -CVE-2017-5715 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-5715 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-5715 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-5715 - https://cert.vde.com/en-us/advisories/vde-2018-002 -CVE-2017-5715 - https://cert.vde.com/en-us/advisories/vde-2018-003 -CVE-2017-5715 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html -CVE-2017-5715 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2017-5715 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2017-5715 - https://spectreattack.com/ -CVE-2017-5715 - https://usn.ubuntu.com/3540-2/ -CVE-2017-5715 - https://usn.ubuntu.com/3580-1/ -CVE-2017-5715 - https://usn.ubuntu.com/3581-1/ -CVE-2017-5715 - https://usn.ubuntu.com/3582-1/ -CVE-2017-5715 - https://usn.ubuntu.com/3597-2/ -CVE-2017-5715 - https://usn.ubuntu.com/3777-3/ -CVE-2017-5715 - https://www.exploit-db.com/exploits/43427/ -CVE-2017-5715 - https://www.kb.cert.org/vuls/id/180049 -CVE-2017-5715 - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 -CVE-2017-5715 - https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ -CVE-2017-5715 - https://www.synology.com/support/security/Synology_SA_18_01 -CVE-2017-5717 - https://www.exploit-db.com/exploits/43373/ -CVE-2017-5753 - http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html -CVE-2017-5753 - http://www.kb.cert.org/vuls/id/584653 -CVE-2017-5753 - https://cert.vde.com/en-us/advisories/vde-2018-002 -CVE-2017-5753 - https://cert.vde.com/en-us/advisories/vde-2018-003 -CVE-2017-5753 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html -CVE-2017-5753 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2017-5753 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2017-5753 - https://spectreattack.com/ -CVE-2017-5753 - https://usn.ubuntu.com/3540-2/ -CVE-2017-5753 - https://usn.ubuntu.com/3541-1/ -CVE-2017-5753 - https://usn.ubuntu.com/3580-1/ -CVE-2017-5753 - https://usn.ubuntu.com/3597-2/ -CVE-2017-5753 - https://www.exploit-db.com/exploits/43427/ -CVE-2017-5753 - https://www.kb.cert.org/vuls/id/180049 -CVE-2017-5753 - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 -CVE-2017-5753 - https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ -CVE-2017-5753 - https://www.synology.com/support/security/Synology_SA_18_01 -CVE-2017-5754 - http://www.kb.cert.org/vuls/id/584653 -CVE-2017-5754 - https://cert.vde.com/en-us/advisories/vde-2018-002 -CVE-2017-5754 - https://cert.vde.com/en-us/advisories/vde-2018-003 -CVE-2017-5754 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html -CVE-2017-5754 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-5754 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2017-5754 - https://meltdownattack.com/ -CVE-2017-5754 - https://usn.ubuntu.com/3540-2/ -CVE-2017-5754 - https://usn.ubuntu.com/3597-2/ -CVE-2017-5754 - https://usn.ubuntu.com/usn/usn-3525-1/ -CVE-2017-5754 - https://www.kb.cert.org/vuls/id/180049 -CVE-2017-5754 - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 -CVE-2017-5754 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-5754 - https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ -CVE-2017-5754 - https://www.synology.com/support/security/Synology_SA_18_01 -CVE-2017-5787 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -CVE-2017-5789 - https://www.tenable.com/security/research/tra-2017-13 -CVE-2017-5790 - https://www.tenable.com/security/research/tra-2017-12 -CVE-2017-5792 - https://www.exploit-db.com/exploits/43927/ -CVE-2017-5792 - https://www.tenable.com/security/research/tra-2017-18 -CVE-2017-5798 - https://www.exploit-db.com/exploits/41927/ -CVE-2017-5799 - https://www.exploit-db.com/exploits/41927/ -CVE-2017-5802 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03734en_us -CVE-2017-5816 - https://www.exploit-db.com/exploits/43198/ -CVE-2017-5816 - https://www.exploit-db.com/exploits/43493/ -CVE-2017-5817 - https://www.exploit-db.com/exploits/43195/ -CVE-2017-5817 - https://www.exploit-db.com/exploits/43492/ -CVE-2017-5824 - http://www.securityfocus.com/bid/98722 -CVE-2017-5825 - http://www.securityfocus.com/bid/98722 -CVE-2017-5826 - http://www.securityfocus.com/bid/98722 -CVE-2017-5827 - http://www.securityfocus.com/bid/98722 -CVE-2017-5828 - http://www.securityfocus.com/bid/98722 -CVE-2017-5829 - http://www.securityfocus.com/bid/98722 -CVE-2017-5835 - https://github.com/libimobiledevice/libplist/issues/88 -CVE-2017-5837 - https://bugzilla.gnome.org/show_bug.cgi?id=777262 -CVE-2017-5838 - https://bugzilla.gnome.org/show_bug.cgi?id=777263 -CVE-2017-5839 - https://bugzilla.gnome.org/show_bug.cgi?id=777265 -CVE-2017-5840 - https://bugzilla.gnome.org/show_bug.cgi?id=777469 -CVE-2017-5844 - https://bugzilla.gnome.org/show_bug.cgi?id=777525 -CVE-2017-5846 - https://bugzilla.gnome.org/show_bug.cgi?id=777937 -CVE-2017-5847 - https://bugzilla.gnome.org/show_bug.cgi?id=777955#c3 -CVE-2017-5849 - http://bugzilla.maptools.org/show_bug.cgi?id=2654 -CVE-2017-5849 - http://bugzilla.maptools.org/show_bug.cgi?id=2655 -CVE-2017-5850 - http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html -CVE-2017-5850 - http://seclists.org/fulldisclosure/2017/Feb/15 -CVE-2017-5850 - https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html -CVE-2017-5850 - https://www.exploit-db.com/exploits/41278/ -CVE-2017-5851 - https://blogs.gentoo.org/ago/2017/02/01/mp3splt-null-pointer-dereference-in-free_options-options_manager-c/ -CVE-2017-5852 - http://www.openwall.com/lists/oss-security/2017/02/01/12 -CVE-2017-5852 - https://blogs.gentoo.org/ago/2017/02/01/podofo-infinite-loop-in-podofopdfpagegetinheritedkeyfromobject-pdfpage-cpp/ -CVE-2017-5853 - https://blogs.gentoo.org/ago/2017/02/01/podofo-signed-integer-overflow-in-pdfparser-cpp/ -CVE-2017-5854 - http://www.openwall.com/lists/oss-security/2017/02/01/14 -CVE-2017-5854 - https://blogs.gentoo.org/ago/2017/02/01/podofo-null-pointer-dereference-in-pdfoutputstream-cpp/ -CVE-2017-5855 - https://blogs.gentoo.org/ago/2017/02/01/podofo-null-pointer-dereference-in-podofopdfparserreadxrefsubsection-pdfparser-cpp/ -CVE-2017-5856 - https://bugzilla.redhat.com/show_bug.cgi?id=1418342 -CVE-2017-5868 - https://hackerone.com/reports/231508 -CVE-2017-5868 - https://hackerone.com/reports/232327 -CVE-2017-5869 - http://www.openwall.com/lists/oss-security/2017/03/23/6 -CVE-2017-5869 - https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/ -CVE-2017-5869 - https://www.exploit-db.com/exploits/41748/ -CVE-2017-5870 - http://www.openwall.com/lists/oss-security/2017/05/03/8 -CVE-2017-5870 - https://sysdream.com/news/lab/2017-05-03-cve-2017-5870-multiple-xss-vulnerabilities-in-vimbadmin/ -CVE-2017-5871 - https://sysdream.com/news/lab/2017-11-20-cve-2017-5871-odoo-url-redirection-to-distrusted-site-open-redirect/ -CVE-2017-5872 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=42 -CVE-2017-5875 - https://github.com/dotCMS/core/issues/10643 -CVE-2017-5876 - https://github.com/dotCMS/core/issues/10643 -CVE-2017-5877 - https://github.com/dotCMS/core/issues/10643 -CVE-2017-5879 - https://github.com/exponentcms/exponent-cms/issues/73 -CVE-2017-5881 - https://www.exploit-db.com/exploits/41367/ -CVE-2017-5884 - https://bugzilla.gnome.org/show_bug.cgi?id=778048 -CVE-2017-5885 - https://bugzilla.gnome.org/show_bug.cgi?id=778050 -CVE-2017-5886 - https://blogs.gentoo.org/ago/2017/02/03/podofo-heap-based-buffer-overflow-in-podofopdftokenizergetnexttoken-pdftokenizer-cpp/ -CVE-2017-5891 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ -CVE-2017-5892 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ -CVE-2017-5896 - http://www.openwall.com/lists/oss-security/2017/02/06/3 -CVE-2017-5896 - https://bugs.ghostscript.com/show_bug.cgi?id=697515 -CVE-2017-5899 - http://www.openwall.com/lists/oss-security/2017/01/27/7 -CVE-2017-5900 - http://seclists.org/fulldisclosure/2017/Mar/75 -CVE-2017-5925 - https://www.vusec.net/projects/anc -CVE-2017-5926 - https://www.vusec.net/projects/anc -CVE-2017-5927 - https://www.vusec.net/projects/anc -CVE-2017-5928 - https://www.vusec.net/projects/anc -CVE-2017-5940 - https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f -CVE-2017-5940 - https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef -CVE-2017-5940 - https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863 -CVE-2017-5941 - http://packetstormsecurity.com/files/161356/Node.JS-Remote-Code-Execution.html -CVE-2017-5941 - http://packetstormsecurity.com/files/163222/Node.JS-Remote-Code-Execution.html -CVE-2017-5942 - https://cjc.im/advisories/0006/ -CVE-2017-5945 - https://github.com/justinhunt/moodle-filter_poodll/issues/23 -CVE-2017-5946 - https://github.com/rubyzip/rubyzip/issues/315 -CVE-2017-5948 - https://alephsecurity.com/vulns/aleph-2017008 -CVE-2017-5949 - https://bugs.webkit.org/show_bug.cgi?id=167239 -CVE-2017-5951 - https://bugs.ghostscript.com/show_bug.cgi?id=697548 -CVE-2017-5953 - https://usn.ubuntu.com/4016-1/ -CVE-2017-5959 - https://github.com/semplon/GeniXCMS/issues/70 -CVE-2017-5961 - https://github.com/ionize/ionize/issues/393 -CVE-2017-5969 - https://hackerone.com/reports/262665 -CVE-2017-5971 - https://www.exploit-db.com/exploits/41261/ -CVE-2017-5972 - https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html -CVE-2017-5972 - https://www.exploit-db.com/exploits/41350/ -CVE-2017-5974 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c/ -CVE-2017-5975 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get64-fetch-c/ -CVE-2017-5976 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-zzip_mem_entry_extra_block-memdisk-c/ -CVE-2017-5977 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-invalid-memory-read-in-zzip_mem_entry_extra_block-memdisk-c/ -CVE-2017-5978 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-out-of-bounds-read-in-zzip_mem_entry_new-memdisk-c/ -CVE-2017-5979 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-null-pointer-dereference-in-prescan_entry-fseeko-c/ -CVE-2017-5980 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-null-pointer-dereference-in-zzip_mem_entry_new-memdisk-c/ -CVE-2017-5981 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-assertion-failure-in-seeko-c/ -CVE-2017-5982 - http://packetstormsecurity.com/files/141043/Kodi-17.1-Arbitrary-File-Disclosure.html -CVE-2017-5982 - https://www.exploit-db.com/exploits/41312/ -CVE-2017-5983 - http://codewhitesec.blogspot.com/2017/04/amf.html -CVE-2017-5983 - https://www.kb.cert.org/vuls/id/307983 -CVE-2017-5984 - https://bugzilla.libav.org/show_bug.cgi?id=1019 -CVE-2017-5991 - https://bugs.ghostscript.com/show_bug.cgi?id=697500 -CVE-2017-5991 - https://www.exploit-db.com/exploits/42138/ -CVE-2017-5992 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854442 -CVE-2017-5997 - https://erpscan.io/advisories/erpscan-16-038-sap-message-server-http-remote-dos/ -CVE-2017-6008 - https://www.exploit-db.com/exploits/43057/ -CVE-2017-6019 - https://www.exploit-db.com/exploits/41537/ -CVE-2017-6020 - https://www.exploit-db.com/exploits/42885/ -CVE-2017-6026 - https://www.exploit-db.com/exploits/45918/ -CVE-2017-6050 - https://www.tenable.com/security/research/tra-2017-24 -CVE-2017-6056 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-6060 - http://www.openwall.com/lists/oss-security/2017/02/18/1 -CVE-2017-6060 - https://blogs.gentoo.org/ago/2017/02/17/mupdf-mujstest-stack-based-buffer-overflow-in-main-jstest_main-c/ -CVE-2017-6060 - https://bugs.ghostscript.com/show_bug.cgi?id=697551 -CVE-2017-6061 - http://packetstormsecurity.com/files/141349/SAP-BusinessObjects-Financial-Consolidation-10.0.0.1933-Cross-Site-Scripting.html -CVE-2017-6065 - https://github.com/semplon/GeniXCMS/issues/71 -CVE-2017-6070 - https://daylight-it.com/security-advisory-dlcs0001.html -CVE-2017-6071 - https://daylight-it.com/security-advisory-dlcs0001.html -CVE-2017-6072 - https://daylight-it.com/security-advisory-dlcs0001.html -CVE-2017-6074 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-6074 - https://hackerone.com/reports/347282 -CVE-2017-6074 - https://www.exploit-db.com/exploits/41457/ -CVE-2017-6074 - https://www.exploit-db.com/exploits/41458/ -CVE-2017-6077 - https://www.exploit-db.com/exploits/41394/ -CVE-2017-6078 - https://github.com/ilsani/rd/tree/master/security-advisories/faststone/maxview-cve-2017-6078 -CVE-2017-6086 - http://www.openwall.com/lists/oss-security/2017/05/03/7 -CVE-2017-6086 - https://www.exploit-db.com/exploits/41967/ -CVE-2017-6087 - http://www.openwall.com/lists/oss-security/2017/03/23/5 -CVE-2017-6087 - https://sysdream.com/news/lab/2017-03-14-cve-2017-6087-eon-5-0-remote-code-execution/ -CVE-2017-6087 - https://www.exploit-db.com/exploits/41746/ -CVE-2017-6088 - http://www.openwall.com/lists/oss-security/2017/03/23/4 -CVE-2017-6088 - https://sysdream.com/news/lab/2017-03-14-cve-2017-6088-eon-5-0-multiple-sql-injection/ -CVE-2017-6088 - https://www.exploit-db.com/exploits/41747/ -CVE-2017-6089 - https://sysdream.com/news/lab/2017-09-29-cve-2017-6089-phpcollab-2-5-1-multiple-sql-injections-unauthenticated/ -CVE-2017-6089 - https://www.exploit-db.com/exploits/42935/ -CVE-2017-6090 - https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/ -CVE-2017-6090 - https://www.exploit-db.com/exploits/42934/ -CVE-2017-6090 - https://www.exploit-db.com/exploits/43519/ -CVE-2017-6095 - https://wpvulndb.com/vulnerabilities/8740 -CVE-2017-6095 - https://www.exploit-db.com/exploits/41438/ -CVE-2017-6096 - https://wpvulndb.com/vulnerabilities/8740 -CVE-2017-6096 - https://www.exploit-db.com/exploits/41438/ -CVE-2017-6097 - https://wpvulndb.com/vulnerabilities/8740 -CVE-2017-6097 - https://www.exploit-db.com/exploits/41438/ -CVE-2017-6098 - https://wpvulndb.com/vulnerabilities/8740 -CVE-2017-6098 - https://www.exploit-db.com/exploits/41438/ -CVE-2017-6100 - https://sourceforge.net/p/tcpdf/bugs/1005/ -CVE-2017-6102 - https://wpvulndb.com/vulnerabilities/8763 -CVE-2017-6104 - https://wpvulndb.com/vulnerabilities/8743 -CVE-2017-6104 - https://www.exploit-db.com/exploits/41540/ -CVE-2017-6127 - http://seclists.org/fulldisclosure/2017/Feb/66 -CVE-2017-6168 - https://robotattack.org/ -CVE-2017-6168 - https://www.kb.cert.org/vuls/id/144389 -CVE-2017-6178 - http://packetstormsecurity.com/files/141526/USBPcap-1.1.0.0-Privilege-Escalation.html -CVE-2017-6178 - https://www.exploit-db.com/exploits/41542/ -CVE-2017-6181 - https://bugs.ruby-lang.org/issues/13234 -CVE-2017-6182 - https://www.exploit-db.com/exploits/42332/ -CVE-2017-6186 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ -CVE-2017-6186 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ -CVE-2017-6187 - https://www.exploit-db.com/exploits/41436/ -CVE-2017-6189 - http://packetstormsecurity.com/files/141366/Amazon-Kindle-DLL-Hijacking.html -CVE-2017-6189 - http://seclists.org/fulldisclosure/2017/Feb/71 -CVE-2017-6190 - https://cxsecurity.com/blad/WLB-2017040033 -CVE-2017-6190 - https://www.exploit-db.com/exploits/41840/ -CVE-2017-6191 - https://www.exploit-db.com/exploits/41670/ -CVE-2017-6192 - https://www.exploit-db.com/exploits/41668/ -CVE-2017-6192 - https://www.exploit-db.com/exploits/41669/ -CVE-2017-6193 - https://www.exploit-db.com/exploits/41668/ -CVE-2017-6193 - https://www.exploit-db.com/exploits/41669/ -CVE-2017-6194 - https://github.com/radare/radare2/issues/6829 -CVE-2017-6195 - https://www.siberas.de/assets/papers/ssa-1705_IPSWITCH_SQLinjection.txt -CVE-2017-6196 - https://bugs.ghostscript.com/show_bug.cgi?id=697596 -CVE-2017-6197 - https://github.com/radare/radare2/issues/6816 -CVE-2017-6199 - https://sandstorm.io/news/2017-03-02-security-review -CVE-2017-6200 - https://sandstorm.io/news/2017-03-02-security-review -CVE-2017-6201 - https://sandstorm.io/news/2017-03-02-security-review -CVE-2017-6206 - https://github.com/varangamin/CVE-2017-6206 -CVE-2017-6206 - https://www.exploit-db.com/exploits/41662/ -CVE-2017-6266 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6267 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6268 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6269 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6270 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6271 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6272 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6275 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2017-6277 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 -CVE-2017-6297 - https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/ -CVE-2017-6307 - https://github.com/verdammelt/tnef/blob/master/ChangeLog -CVE-2017-6308 - https://github.com/verdammelt/tnef/blob/master/ChangeLog -CVE-2017-6309 - https://github.com/verdammelt/tnef/blob/master/ChangeLog -CVE-2017-6310 - https://github.com/verdammelt/tnef/blob/master/ChangeLog -CVE-2017-6315 - https://www.exploit-db.com/exploits/42726/ -CVE-2017-6316 - https://www.exploit-db.com/exploits/42345/ -CVE-2017-6316 - https://www.exploit-db.com/exploits/42346/ -CVE-2017-6320 - https://www.exploit-db.com/exploits/42333/ -CVE-2017-6326 - https://www.exploit-db.com/exploits/42251/ -CVE-2017-6327 - https://www.exploit-db.com/exploits/42519/ -CVE-2017-6331 - https://www.exploit-db.com/exploits/43134/ -CVE-2017-6334 - https://www.exploit-db.com/exploits/41459/ -CVE-2017-6334 - https://www.exploit-db.com/exploits/41472/ -CVE-2017-6334 - https://www.exploit-db.com/exploits/42257/ -CVE-2017-6351 - https://www.exploit-db.com/exploits/41480/ -CVE-2017-6359 - https://www.exploit-db.com/exploits/41842/ -CVE-2017-6359 - https://www.qnap.com/en/support/con_show.php?cid=113 -CVE-2017-6360 - https://www.exploit-db.com/exploits/41842/ -CVE-2017-6360 - https://www.qnap.com/en/support/con_show.php?cid=113 -CVE-2017-6361 - https://www.exploit-db.com/exploits/41842/ -CVE-2017-6361 - https://www.qnap.com/en/support/con_show.php?cid=113 -CVE-2017-6366 - https://www.exploit-db.com/exploits/41472/ -CVE-2017-6367 - https://www.exploit-db.com/exploits/41596/ -CVE-2017-6369 - http://tracker.firebirdsql.org/browse/CORE-5474 -CVE-2017-6370 - https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request -CVE-2017-6371 - http://packetstormsecurity.com/files/141396/Synchronet-BBS-3.16c-For-Windows-Denial-Of-Service.html -CVE-2017-6371 - https://www.exploit-db.com/exploits/41475/ -CVE-2017-6390 - https://github.com/soruly/whatanime.ga/issues/8 -CVE-2017-6392 - https://github.com/kaltura/server/issues/5303 -CVE-2017-6393 - https://github.com/NagVis/nagvis/issues/91 -CVE-2017-6394 - https://github.com/openemr/openemr/issues/498 -CVE-2017-6395 - https://github.com/jacobwb/hashover-next/issues/152 -CVE-2017-6396 - https://github.com/WPO-Foundation/webpagetest/issues/820 -CVE-2017-6397 - https://github.com/Ysurac/FlightAirMap/issues/275 -CVE-2017-6411 - https://www.exploit-db.com/exploits/41478/ -CVE-2017-6416 - https://www.exploit-db.com/exploits/41479/ -CVE-2017-6417 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ -CVE-2017-6417 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ -CVE-2017-6427 - https://www.exploit-db.com/exploits/41547/ -CVE-2017-6429 - https://github.com/appneta/tcpreplay/issues/278 -CVE-2017-6430 - https://github.com/Ettercap/ettercap/issues/782 -CVE-2017-6432 - https://nullku7.github.io/stuff/exploit/dahua/2017/03/09/dahua-nvr-authbypass.html -CVE-2017-6435 - https://github.com/libimobiledevice/libplist/issues/93 -CVE-2017-6436 - https://github.com/libimobiledevice/libplist/issues/94 -CVE-2017-6438 - https://github.com/libimobiledevice/libplist/issues/98 -CVE-2017-6439 - https://github.com/libimobiledevice/libplist/issues/95 -CVE-2017-6440 - https://github.com/libimobiledevice/libplist/issues/99 -CVE-2017-6443 - http://seclists.org/fulldisclosure/2017/Mar/5 -CVE-2017-6443 - https://www.exploit-db.com/exploits/41502/ -CVE-2017-6444 - https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html -CVE-2017-6444 - https://www.exploit-db.com/exploits/41601/ -CVE-2017-6458 - http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html -CVE-2017-6458 - http://www.ubuntu.com/usn/USN-3349-1 -CVE-2017-6465 - http://packetstormsecurity.com/files/141456/FTPShell-Client-6.53-Buffer-Overflow.html -CVE-2017-6465 - https://www.exploit-db.com/exploits/41511/ -CVE-2017-6481 - https://github.com/phpipam/phpipam/issues/992 -CVE-2017-6483 - https://github.com/atutor/ATutor/issues/129 -CVE-2017-6484 - https://github.com/INTER-Mediator/INTER-Mediator/issues/772 -CVE-2017-6485 - https://github.com/jasonjoh/php-calendar/issues/4 -CVE-2017-6486 - https://github.com/reasoncms/reasoncms/issues/264 -CVE-2017-6492 - https://github.com/hamkovic/Admidio-3.2.5-SQLi -CVE-2017-6506 - http://packetstormsecurity.com/files/141502/Azure-Data-Expert-Ultimate-2.2.16-Buffer-Overflow.html -CVE-2017-6506 - https://www.exploit-db.com/exploits/41545/ -CVE-2017-6513 - https://gist.github.com/sedrubal/a83fa22f1091025a5c1a14aabd711ad7 -CVE-2017-6516 - https://www.exploit-db.com/exploits/44150/ -CVE-2017-6517 - http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html -CVE-2017-6517 - http://seclists.org/fulldisclosure/2017/Mar/44 -CVE-2017-6526 - https://www.exploit-db.com/exploits/41578/ -CVE-2017-6526 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ -CVE-2017-6527 - https://www.exploit-db.com/exploits/41578/ -CVE-2017-6527 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ -CVE-2017-6528 - https://www.exploit-db.com/exploits/41578/ -CVE-2017-6528 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ -CVE-2017-6529 - https://www.exploit-db.com/exploits/41578/ -CVE-2017-6529 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ -CVE-2017-6530 - https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt -CVE-2017-6531 - https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt -CVE-2017-6532 - https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt -CVE-2017-6533 - https://github.com/WPO-Foundation/webpagetest/issues/833 -CVE-2017-6534 - https://github.com/WPO-Foundation/webpagetest/issues/835 -CVE-2017-6535 - https://github.com/WPO-Foundation/webpagetest/issues/832 -CVE-2017-6536 - https://github.com/WPO-Foundation/webpagetest/issues/838 -CVE-2017-6537 - https://github.com/WPO-Foundation/webpagetest/issues/837 -CVE-2017-6538 - https://github.com/WPO-Foundation/webpagetest/issues/836 -CVE-2017-6539 - https://github.com/WPO-Foundation/webpagetest/issues/831 -CVE-2017-6540 - https://github.com/WPO-Foundation/webpagetest/issues/830 -CVE-2017-6541 - https://github.com/WPO-Foundation/webpagetest/issues/834 -CVE-2017-6542 - http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html -CVE-2017-6542 - https://www.exploit-db.com/exploits/42137/ -CVE-2017-6547 - https://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss -CVE-2017-6547 - https://www.exploit-db.com/exploits/41571/ -CVE-2017-6548 - https://bierbaumer.net/security/asuswrt/#remote-code-execution -CVE-2017-6548 - https://www.exploit-db.com/exploits/41573/ -CVE-2017-6549 - https://bierbaumer.net/security/asuswrt/#session-stealing -CVE-2017-6549 - https://www.exploit-db.com/exploits/41572/ -CVE-2017-6550 - http://packetstormsecurity.com/files/141575/Kinseys-Infor-Lawson-SQL-Injection.html -CVE-2017-6550 - http://seclists.org/fulldisclosure/2017/Mar/31 -CVE-2017-6550 - https://www.exploit-db.com/exploits/41577/ -CVE-2017-6552 - https://www.exploit-db.com/exploits/41565/ -CVE-2017-6552 - https://www.youtube.com/watch?v=ShCs5_8mBlM&t=37s -CVE-2017-6553 - https://0xdeadface.wordpress.com/2017/04/07/multiple-vulnerabilities-in-quest-privilege-manager-6-0-0-xx-cve-2017-6553-cve-2017-6554/ -CVE-2017-6553 - https://www.exploit-db.com/exploits/42010/ -CVE-2017-6554 - http://packetstormsecurity.com/files/142095/Quest-Privilege-Manager-6.0.0-Arbitrary-File-Write.html -CVE-2017-6554 - https://0xdeadface.wordpress.com/2017/04/07/multiple-vulnerabilities-in-quest-privilege-manager-6-0-0-xx-cve-2017-6553-cve-2017-6554/ -CVE-2017-6554 - https://www.exploit-db.com/exploits/41861/ -CVE-2017-6558 - https://www.youtube.com/watch?v=8GZg1IuSfCs -CVE-2017-6559 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html -CVE-2017-6560 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html -CVE-2017-6561 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html -CVE-2017-6562 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html -CVE-2017-6590 - https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1668321 -CVE-2017-6622 - https://www.exploit-db.com/exploits/42888/ -CVE-2017-6736 - https://github.com/artkond/cisco-snmp-rce -CVE-2017-6736 - https://www.exploit-db.com/exploits/43450/ -CVE-2017-6802 - https://github.com/Yeraze/ytnef/issues/34 -CVE-2017-6803 - http://hyp3rlinx.altervista.org/advisories/FTP-VOYAGER-SCHEDULER-CSRF-REMOTE-CMD-EXECUTION.txt -CVE-2017-6803 - http://packetstormsecurity.com/files/141567/FTP-Voyager-Scheduler-16.2.0-CSRF-Denial-Of-Service.html -CVE-2017-6803 - https://www.exploit-db.com/exploits/41574/ -CVE-2017-6805 - http://hyp3rlinx.altervista.org/advisories/MOBAXTERM-TFTP-PATH-TRAVERSAL-REMOTE-FILE-ACCESS.txt -CVE-2017-6805 - http://packetstormsecurity.com/files/141582/MobaXterm-Personal-Edition-9.4-Path-Traversal.html -CVE-2017-6805 - http://seclists.org/fulldisclosure/2017/Mar/34 -CVE-2017-6805 - https://www.exploit-db.com/exploits/41592/ -CVE-2017-6814 - http://openwall.com/lists/oss-security/2017/03/06/8 -CVE-2017-6814 - https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html -CVE-2017-6814 - https://wpvulndb.com/vulnerabilities/8765 -CVE-2017-6816 - https://wpvulndb.com/vulnerabilities/8767 -CVE-2017-6817 - https://wpvulndb.com/vulnerabilities/8768 -CVE-2017-6818 - https://wpvulndb.com/vulnerabilities/8769 -CVE-2017-6819 - http://openwall.com/lists/oss-security/2017/03/06/7 -CVE-2017-6819 - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html -CVE-2017-6819 - https://wpvulndb.com/vulnerabilities/8770 -CVE-2017-6823 - https://www.exploit-db.com/exploits/41594/ -CVE-2017-6827 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcminitializecoefficients-msadpcm-cpp/ -CVE-2017-6828 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-readvalue-filehandle-cpp/ -CVE-2017-6829 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-global-buffer-overflow-in-decodesample-ima-cpp/ -CVE-2017-6829 - https://github.com/mpruett/audiofile/issues/33 -CVE-2017-6830 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-alaw2linear_buf-g711-cpp/ -CVE-2017-6830 - https://github.com/mpruett/audiofile/issues/34 -CVE-2017-6831 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/ -CVE-2017-6831 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831 -CVE-2017-6831 - https://github.com/mpruett/audiofile/issues/35 -CVE-2017-6832 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcmdecodeblock-msadpcm-cpp/ -CVE-2017-6832 - https://github.com/mpruett/audiofile/issues/36 -CVE-2017-6833 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecrunpull-blockcodec-cpp/ -CVE-2017-6833 - https://github.com/mpruett/audiofile/issues/37 -CVE-2017-6834 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-ulaw2linear_buf-g711-cpp/ -CVE-2017-6834 - https://github.com/mpruett/audiofile/issues/38 -CVE-2017-6835 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecreset1-blockcodec-cpp/ -CVE-2017-6835 - https://github.com/mpruett/audiofile/issues/39 -CVE-2017-6836 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-expand3to4modulerun-simplemodule-h/ -CVE-2017-6836 - https://github.com/mpruett/audiofile/issues/40 -CVE-2017-6837 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ -CVE-2017-6837 - https://github.com/mpruett/audiofile/issues/41 -CVE-2017-6838 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ -CVE-2017-6838 - https://github.com/mpruett/audiofile/issues/41 -CVE-2017-6839 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ -CVE-2017-6839 - https://github.com/mpruett/audiofile/issues/41 -CVE-2017-6840 - https://blogs.gentoo.org/ago/2017/03/02/podofo-invalid-memory-read-in-colorchangergetcolorfromstack-colorchanger-cpp/ -CVE-2017-6841 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementtgraphicsstackelement-graphicsstack-h/ -CVE-2017-6842 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-colorchangergetcolorfromstack-colorchanger-cpp/ -CVE-2017-6843 - https://blogs.gentoo.org/ago/2017/03/02/podofo-heap-based-buffer-overflow-in-podofopdfvariantdelayedload-pdfvariant-h/ -CVE-2017-6844 - https://blogs.gentoo.org/ago/2017/03/02/podofo-global-buffer-overflow-in-podofopdfparserreadxrefsubsection-pdfparser-cpp/ -CVE-2017-6845 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcoloroperator-pdfcolor-cpp/ -CVE-2017-6846 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementsetnonstrokingcolorspace-graphicsstack-h/ -CVE-2017-6847 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfvariantdelayedload-pdfvariant-h/ -CVE-2017-6848 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfxobjectpdfxobject-pdfxobject-cpp/ -CVE-2017-6849 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcolorgraypdfcolorgray-pdfcolor-cpp/ -CVE-2017-6850 - https://blogs.gentoo.org/ago/2017/01/25/jasper-null-pointer-dereference-in-jp2_cdef_destroy-jp2_cod-c/ -CVE-2017-6850 - https://github.com/mdadams/jasper/issues/112 -CVE-2017-6851 - https://blogs.gentoo.org/ago/2017/01/25/jasper-invalid-memory-read-in-jas_matrix_bindsub-jas_seq-c/ -CVE-2017-6851 - https://github.com/mdadams/jasper/issues/113 -CVE-2017-6852 - https://blogs.gentoo.org/ago/2017/01/25/jasper-heap-based-buffer-overflow-in-jpc_dec_decodepkt-jpc_t2dec-c/ -CVE-2017-6852 - https://github.com/mdadams/jasper/issues/114 -CVE-2017-6862 - https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261 -CVE-2017-6870 - https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf -CVE-2017-6871 - https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf -CVE-2017-6878 - http://packetstormsecurity.com/files/141689/MetInfo-5.3.15-Cross-Site-Scripting.html -CVE-2017-6878 - http://seclists.org/fulldisclosure/2017/Mar/49 -CVE-2017-6880 - https://www.exploit-db.com/exploits/41620/ -CVE-2017-6884 - https://www.exploit-db.com/exploits/41782/ -CVE-2017-6892 - https://usn.ubuntu.com/4013-1/ -CVE-2017-6895 - http://packetstormsecurity.com/files/141652/USB-Pratirodh-XXE-Injection.html -CVE-2017-6895 - http://seclists.org/fulldisclosure/2017/Mar/42 -CVE-2017-6895 - https://secur1tyadvisory.wordpress.com/2017/03/15/usb-pratirodh-xml-external-entity-injection-vulnerability/ -CVE-2017-6896 - http://seclists.org/fulldisclosure/2017/Mar/52 -CVE-2017-6896 - https://drive.google.com/file/d/0B6715xUqH18MX29uRlpaSVJ4OTA/view?usp=sharing -CVE-2017-6896 - https://packetstormsecurity.com/files/141693/digisol-escalate.txt -CVE-2017-6896 - https://www.exploit-db.com/exploits/41633/ -CVE-2017-6906 - https://github.com/Xtraball/SiberianCMS/issues/217 -CVE-2017-6907 - https://github.com/Overv/Open.GL/issues/56 -CVE-2017-6908 - https://github.com/concrete5/concrete5-legacy/issues/1948 -CVE-2017-6909 - https://github.com/shish/shimmie2/issues/597 -CVE-2017-6911 - http://packetstormsecurity.com/files/141651/USB-Pratirodh-Insecure-Password-Storage.html -CVE-2017-6914 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf -CVE-2017-6914 - https://github.com/bigtreecms/BigTree-CMS/issues/275 -CVE-2017-6915 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf -CVE-2017-6915 - https://github.com/bigtreecms/BigTree-CMS/issues/275 -CVE-2017-6916 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf -CVE-2017-6916 - https://github.com/bigtreecms/BigTree-CMS/issues/275 -CVE-2017-6917 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf -CVE-2017-6917 - https://github.com/bigtreecms/BigTree-CMS/issues/275 -CVE-2017-6918 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf -CVE-2017-6918 - https://github.com/bigtreecms/BigTree-CMS/issues/275 -CVE-2017-6950 - https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/ -CVE-2017-6953 - https://www.exploit-db.com/exploits/41972/ -CVE-2017-6956 - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html -CVE-2017-6957 - http://packetstormsecurity.com/files/141803/Broadcom-Stack-Buffer-Overflow.html -CVE-2017-6970 - https://www.exploit-db.com/exploits/42305/ -CVE-2017-6971 - https://www.exploit-db.com/exploits/42306/ -CVE-2017-6972 - https://www.exploit-db.com/exploits/42314/ -CVE-2017-6975 - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html -CVE-2017-6978 - https://www.exploit-db.com/exploits/42056/ -CVE-2017-6979 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6980 - https://www.exploit-db.com/exploits/42189/ -CVE-2017-6982 - https://www.exploit-db.com/exploits/42014/ -CVE-2017-6984 - https://www.exploit-db.com/exploits/42191/ -CVE-2017-6989 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6994 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6995 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6996 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6997 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6998 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-6999 - https://www.exploit-db.com/exploits/42555/ -CVE-2017-7004 - https://www.exploit-db.com/exploits/42145/ -CVE-2017-7005 - https://www.exploit-db.com/exploits/42188/ -CVE-2017-7018 - https://www.exploit-db.com/exploits/42373/ -CVE-2017-7037 - https://www.exploit-db.com/exploits/42378/ -CVE-2017-7039 - https://www.exploit-db.com/exploits/42362/ -CVE-2017-7040 - https://www.exploit-db.com/exploits/42367/ -CVE-2017-7041 - https://www.exploit-db.com/exploits/42366/ -CVE-2017-7042 - https://www.exploit-db.com/exploits/42364/ -CVE-2017-7043 - https://www.exploit-db.com/exploits/42361/ -CVE-2017-7046 - https://www.exploit-db.com/exploits/42365/ -CVE-2017-7047 - https://www.exploit-db.com/exploits/42407/ -CVE-2017-7048 - https://www.exploit-db.com/exploits/42360/ -CVE-2017-7049 - https://www.exploit-db.com/exploits/42363/ -CVE-2017-7056 - https://www.exploit-db.com/exploits/42376/ -CVE-2017-7061 - https://www.exploit-db.com/exploits/42666/ -CVE-2017-7064 - https://www.exploit-db.com/exploits/42375/ -CVE-2017-7115 - https://www.exploit-db.com/exploits/42996/ -CVE-2017-7117 - https://www.exploit-db.com/exploits/42955/ -CVE-2017-7149 - https://nakedsecurity.sophos.com/2017/10/05/urgent-update-your-mac-again-right-now/ -CVE-2017-7149 - https://www.theregister.co.uk/2017/10/05/apple_patches_password_hint_bug_that_revealed_password/ -CVE-2017-7154 - https://www.exploit-db.com/exploits/43521/ -CVE-2017-7175 - https://www.exploit-db.com/exploits/42314/ -CVE-2017-7178 - http://seclists.org/fulldisclosure/2017/Mar/6 -CVE-2017-7180 - https://www.exploit-db.com/exploits/42141/ -CVE-2017-7183 - http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html -CVE-2017-7183 - https://www.exploit-db.com/exploits/41639/ -CVE-2017-7184 - https://blog.trendmicro.com/results-pwn2own-2017-day-one/ -CVE-2017-7185 - https://www.exploit-db.com/exploits/41826/ -CVE-2017-7186 - https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/ -CVE-2017-7187 - https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b -CVE-2017-7188 - https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC -CVE-2017-7189 - https://hackerone.com/reports/305974 -CVE-2017-7202 - https://github.com/slims/slims7_cendana/issues/50 -CVE-2017-7203 - https://github.com/ZoneMinder/ZoneMinder/issues/1797 -CVE-2017-7204 - https://github.com/tboothman/imdbphp/issues/88 -CVE-2017-7205 - https://github.com/devryan/GamePanelX-V3/issues/161 -CVE-2017-7206 - https://bugzilla.libav.org/show_bug.cgi?id=1002 -CVE-2017-7207 - https://bugs.ghostscript.com/show_bug.cgi?id=697676 -CVE-2017-7208 - https://bugzilla.libav.org/show_bug.cgi?id=1000 -CVE-2017-7215 - https://www.misp.software/Changelog.txt -CVE-2017-7220 - http://seclists.org/bugtraq/2017/Apr/61 -CVE-2017-7221 - http://seclists.org/fulldisclosure/2017/Apr/97 -CVE-2017-7221 - https://www.exploit-db.com/exploits/41928/ -CVE-2017-7228 - https://www.exploit-db.com/exploits/41870/ -CVE-2017-7230 - https://www.exploit-db.com/exploits/41666/ -CVE-2017-7231 - https://github.com/Tatsh/pngdefry/issues/1 -CVE-2017-7237 - http://hyp3rlinx.altervista.org/advisories/SPICEWORKS-IMPROPER-ACCESS-CONTROL-FILE-OVERWRITE.txt -CVE-2017-7237 - https://www.exploit-db.com/exploits/41825/ -CVE-2017-7240 - http://seclists.org/fulldisclosure/2017/Mar/63 -CVE-2017-7240 - https://www.exploit-db.com/exploits/41718/ -CVE-2017-7244 - https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/ -CVE-2017-7245 - https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ -CVE-2017-7246 - https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ -CVE-2017-7247 - https://github.com/WhatCD/Gazelle/issues/114 -CVE-2017-7248 - https://github.com/WhatCD/Gazelle/issues/111 -CVE-2017-7249 - https://github.com/WhatCD/Gazelle/issues/112 -CVE-2017-7250 - https://github.com/WhatCD/Gazelle/issues/113 -CVE-2017-7251 - http://www.securityfocus.com/bid/97061 -CVE-2017-7251 - https://github.com/pi-engine/pi/issues/1523 -CVE-2017-7253 - https://gist.github.com/anonymous/16aca69b7dea27cb73ddebb0d9033b02 -CVE-2017-7258 - https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html -CVE-2017-7263 - https://blogs.gentoo.org/ago/2017/03/03/potrace-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c-incomplete-fix-for-cve-2016-8698/ -CVE-2017-7264 - https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/ -CVE-2017-7269 - https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html -CVE-2017-7269 - https://medium.com/@iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 -CVE-2017-7269 - https://www.exploit-db.com/exploits/41738/ -CVE-2017-7269 - https://www.exploit-db.com/exploits/41992/ -CVE-2017-7275 - https://github.com/ImageMagick/ImageMagick/issues/271 -CVE-2017-7277 - https://lkml.org/lkml/2017/3/15/485 -CVE-2017-7285 - https://www.exploit-db.com/exploits/41752/ -CVE-2017-7290 - https://gist.github.com/jk1986/3b304ac6b4ae52ae667bba380c2dce19 -CVE-2017-7293 - https://www.exploit-db.com/exploits/41933/ -CVE-2017-7308 - https://www.exploit-db.com/exploits/41994/ -CVE-2017-7308 - https://www.exploit-db.com/exploits/44654/ -CVE-2017-7310 - https://www.exploit-db.com/exploits/41771/ -CVE-2017-7310 - https://www.exploit-db.com/exploits/41772/ -CVE-2017-7310 - https://www.exploit-db.com/exploits/41773/ -CVE-2017-7310 - https://www.exploit-db.com/exploits/43875/ -CVE-2017-7310 - https://www.exploit-db.com/exploits/44157/ -CVE-2017-7315 - http://seclists.org/fulldisclosure/2017/Jun/45 -CVE-2017-7316 - http://seclists.org/fulldisclosure/2017/Jun/45 -CVE-2017-7317 - http://seclists.org/fulldisclosure/2017/Jun/45 -CVE-2017-7325 - https://browser.yandex.com/security/changelogs/fixed-in-version-16-9 -CVE-2017-7336 - https://fortiguard.com/advisory/FG-IR-17-115 -CVE-2017-7337 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7338 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7339 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7340 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7342 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7343 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7351 - https://labs.nettitude.com/blog/cve-2017-7351-redcap-7-0-0-7-0-10-sql-injection/ -CVE-2017-7358 - https://www.exploit-db.com/exploits/41923/ -CVE-2017-7378 - https://blogs.gentoo.org/ago/2017/03/31/podofo-heap-based-buffer-overflow-in-podofopdfpainterexpandtabs-pdfpainter-cpp -CVE-2017-7379 - https://blogs.gentoo.org/ago/2017/03/31/podofo-heap-based-buffer-overflow-in-podofopdfsimpleencodingconverttoencoding-pdfencoding-cpp -CVE-2017-7380 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference -CVE-2017-7381 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference -CVE-2017-7382 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference -CVE-2017-7383 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference -CVE-2017-7388 - https://github.com/micwallace/wallacepos/issues/84 -CVE-2017-7389 - https://github.com/gunet/openeclass/issues/11 -CVE-2017-7390 - https://github.com/andreas83/SocialNetwork/issues/84 -CVE-2017-7391 - https://github.com/dweeves/magmi-git/issues/522 -CVE-2017-7393 - https://github.com/TigerVNC/tigervnc/pull/438 -CVE-2017-7397 - https://forum.backbox.org/security-advisories/waiting-verification-backbox-os-denial-of-service/msg10218 -CVE-2017-7397 - https://www.exploit-db.com/exploits/41781/ -CVE-2017-7398 - http://seclists.org/fulldisclosure/2017/Apr/4 -CVE-2017-7398 - https://www.exploit-db.com/exploits/41821/ -CVE-2017-7402 - http://rungga.blogspot.co.id/2017/04/remote-file-upload-vulnerability-in.html -CVE-2017-7402 - https://www.exploit-db.com/exploits/41784/ -CVE-2017-7407 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-7411 - http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html -CVE-2017-7411 - https://tuleap.net/plugins/tracker/?aid=10118 -CVE-2017-7411 - https://www.exploit-db.com/exploits/43374/ -CVE-2017-7412 - https://github.com/NixOS/nixpkgs/commit/fa4fe7110566d8370983fa81f2b04a833339236d -CVE-2017-7415 - https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html -CVE-2017-7442 - http://srcincite.io/advisories/src-2017-0005/ -CVE-2017-7442 - https://www.exploit-db.com/exploits/42418/ -CVE-2017-7446 - http://rungga.blogspot.co.id/2017/04/multiple-csrf-remote-code-execution.html -CVE-2017-7446 - https://github.com/albandes/helpdezk/issues/2 -CVE-2017-7446 - https://www.exploit-db.com/exploits/41824/ -CVE-2017-7447 - http://rungga.blogspot.co.id/2017/04/multiple-csrf-remote-code-execution.html -CVE-2017-7447 - https://github.com/albandes/helpdezk/issues/2 -CVE-2017-7447 - https://www.exploit-db.com/exploits/41824/ -CVE-2017-7455 - http://packetstormsecurity.com/files/142074/Moxa-MXview-2.8-Private-Key-Disclosure.html -CVE-2017-7455 - http://seclists.org/fulldisclosure/2017/Apr/49 -CVE-2017-7455 - https://www.exploit-db.com/exploits/41850/ -CVE-2017-7456 - http://hyp3rlinx.altervista.org/advisories/MOXA-MXVIEW-v2.8-DENIAL-OF-SERVICE.txt -CVE-2017-7456 - http://seclists.org/fulldisclosure/2017/Apr/50 -CVE-2017-7456 - https://www.exploit-db.com/exploits/41851/ -CVE-2017-7457 - http://hyp3rlinx.altervista.org/advisories/MOXA-MX-AOPC-SERVER-v1.5-XML-EXTERNAL-ENTITY.txt -CVE-2017-7457 - http://seclists.org/fulldisclosure/2017/Apr/51 -CVE-2017-7457 - https://www.exploit-db.com/exploits/41852/ -CVE-2017-7461 - https://www.exploit-db.com/exploits/41829/ -CVE-2017-7462 - https://www.exploit-db.com/exploits/41829/ -CVE-2017-7467 - http://www.openwall.com/lists/oss-security/2017/04/18/5 -CVE-2017-7472 - https://www.exploit-db.com/exploits/42136/ -CVE-2017-7475 - https://bugs.freedesktop.org/show_bug.cgi?id=100763 -CVE-2017-7478 - https://www.exploit-db.com/exploits/41993/ -CVE-2017-7482 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f2f97656ada8d811d3c1bef503ced266fcd53a0 -CVE-2017-7494 - https://www.exploit-db.com/exploits/42060/ -CVE-2017-7494 - https://www.exploit-db.com/exploits/42084/ -CVE-2017-7502 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-7508 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 -CVE-2017-7515 - https://bugs.freedesktop.org/show_bug.cgi?id=101208 -CVE-2017-7520 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 -CVE-2017-7521 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 -CVE-2017-7522 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 -CVE-2017-7525 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-7525 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-7525 - https://access.redhat.com/errata/RHSA-2017:1835 -CVE-2017-7525 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-7525 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-7529 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2017-7542 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-7542 - https://usn.ubuntu.com/3583-2/ -CVE-2017-7544 - https://sourceforge.net/p/libexif/bugs/130/ -CVE-2017-7551 - https://pagure.io/389-ds-base/issue/49336 -CVE-2017-7571 - http://rungga.blogspot.co.id/2017/04/csrf-privilege-escalation-manipulation.html -CVE-2017-7571 - https://github.com/ladybirdweb/faveo-helpdesk/issues/446 -CVE-2017-7571 - https://www.exploit-db.com/exploits/41830/ -CVE-2017-7581 - https://www.ambionics.io/blog/typo3-news-module-sqli -CVE-2017-7588 - https://cxsecurity.com/blad/WLB-2017040064 -CVE-2017-7588 - https://www.exploit-db.com/exploits/41863/ -CVE-2017-7595 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-divide-by-zero-in-jpegsetupencode-tiff_jpeg-c -CVE-2017-7596 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7597 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7598 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7599 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7600 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7601 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7602 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -CVE-2017-7603 - https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ -CVE-2017-7604 - https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ -CVE-2017-7605 - https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ -CVE-2017-7606 - https://blogs.gentoo.org/ago/2017/04/02/imagemagick-undefined-behavior-in-codersrle-c/ -CVE-2017-7607 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c -CVE-2017-7608 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c -CVE-2017-7609 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c -CVE-2017-7610 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c -CVE-2017-7611 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c -CVE-2017-7612 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c -CVE-2017-7613 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c -CVE-2017-7615 - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt -CVE-2017-7615 - http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html -CVE-2017-7615 - https://www.exploit-db.com/exploits/41890/ -CVE-2017-7620 - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt -CVE-2017-7620 - https://mantisbt.org/bugs/view.php?id=22816 -CVE-2017-7620 - https://www.exploit-db.com/exploits/42043/ -CVE-2017-7621 - https://sudoat.blogspot.in/2017/04/xss-vulnerability-in-multiple-emli.html -CVE-2017-7622 - https://github.com/kings-way/deepinhack/blob/master/dde_daemon_poc.py -CVE-2017-7625 - https://github.com/Xyntax/POC-T/blob/2.0/script/fiyo2.0.7-getshell.py -CVE-2017-7642 - http://seclists.org/fulldisclosure/2017/Jul/29 -CVE-2017-7642 - https://www.exploit-db.com/exploits/42334/ -CVE-2017-7643 - https://www.exploit-db.com/exploits/41854/ -CVE-2017-7645 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e -CVE-2017-7645 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-7650 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 -CVE-2017-7651 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754 -CVE-2017-7652 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=530102 -CVE-2017-7656 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-7656 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-7656 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-7657 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-7657 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-7657 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-7658 - https://hackerone.com/reports/648434 -CVE-2017-7658 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-7658 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-7658 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-7658 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-7668 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-7668 - https://hackerone.com/reports/241610 -CVE-2017-7679 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-7679 - https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679 -CVE-2017-7690 - https://www.exploit-db.com/exploits/43225/ -CVE-2017-7692 - http://openwall.com/lists/oss-security/2017/04/19/6 -CVE-2017-7692 - https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html -CVE-2017-7692 - https://www.exploit-db.com/exploits/41910/ -CVE-2017-7696 - https://erpscan.io/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/ -CVE-2017-7697 - https://github.com/erikd/libsamplerate/issues/11 -CVE-2017-7719 - http://lists.openwall.net/full-disclosure/2017/04/09/1 -CVE-2017-7720 - https://www.exploit-db.com/exploits/41916/ -CVE-2017-7725 - http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt -CVE-2017-7725 - https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html -CVE-2017-7725 - https://www.exploit-db.com/exploits/41885/ -CVE-2017-7731 - https://fortiguard.com/psirt/FG-IR-17-114 -CVE-2017-7734 - https://fortiguard.com/advisory/FG-IR-17-127 -CVE-2017-7735 - https://fortiguard.com/advisory/FG-IR-17-127 -CVE-2017-7736 - https://fortiguard.com/advisory/FG-IR-17-131 -CVE-2017-7737 - https://fortiguard.com/advisory/FG-IR-17-162 -CVE-2017-7739 - https://fortiguard.com/advisory/FG-IR-17-168 -CVE-2017-7741 - https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/ -CVE-2017-7742 - https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/ -CVE-2017-7753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1353312 -CVE-2017-7757 - https://bugzilla.mozilla.org/show_bug.cgi?id=1356824 -CVE-2017-7758 - https://bugzilla.mozilla.org/show_bug.cgi?id=1368490 -CVE-2017-7759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1356893 -CVE-2017-7760 - https://bugzilla.mozilla.org/show_bug.cgi?id=1348645 -CVE-2017-7761 - https://bugzilla.mozilla.org/show_bug.cgi?id=1215648 -CVE-2017-7766 - https://bugzilla.mozilla.org/show_bug.cgi?id=1342742 -CVE-2017-7767 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336964 -CVE-2017-7768 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336979 -CVE-2017-7778 - https://bugzilla.mozilla.org/show_bug.cgi?id=1349310 -CVE-2017-7781 - https://bugzilla.mozilla.org/show_bug.cgi?id=1352039 -CVE-2017-7783 - https://bugzilla.mozilla.org/show_bug.cgi?id=1360842 -CVE-2017-7783 - https://www.exploit-db.com/exploits/43020/ -CVE-2017-7788 - https://bugzilla.mozilla.org/show_bug.cgi?id=1073952 -CVE-2017-7800 - https://bugzilla.mozilla.org/show_bug.cgi?id=1374047 -CVE-2017-7805 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-7808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1367531 -CVE-2017-7817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1356596 -CVE-2017-7821 - https://bugzilla.mozilla.org/show_bug.cgi?id=1346515 -CVE-2017-7830 - https://bugzilla.mozilla.org/show_bug.cgi?id=1408990 -CVE-2017-7833 - https://bugzilla.mozilla.org/show_bug.cgi?id=1370497 -CVE-2017-7836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1401339 -CVE-2017-7838 - https://bugzilla.mozilla.org/show_bug.cgi?id=1399540 -CVE-2017-7842 - https://bugzilla.mozilla.org/show_bug.cgi?id=1397064 -CVE-2017-7845 - https://bugzilla.mozilla.org/show_bug.cgi?id=1402372 -CVE-2017-7846 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411716 -CVE-2017-7847 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411708 -CVE-2017-7848 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411699 -CVE-2017-7849 - https://www.tenable.com/security/tns-2017-10 -CVE-2017-7850 - https://www.tenable.com/security/tns-2017-10 -CVE-2017-7852 - https://www.qualys.com/2017/02/22/qsa-2017-02-22/qsa-2017-02-22.pdf -CVE-2017-7857 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-7858 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-7864 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-7867 - http://bugs.icu-project.org/trac/changeset/39671 -CVE-2017-7868 - http://bugs.icu-project.org/trac/changeset/39671 -CVE-2017-7870 - http://www.securityfocus.com/bid/97671 -CVE-2017-7870 - https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722 -CVE-2017-7877 - https://github.com/flatCore/flatCore-CMS/issues/27 -CVE-2017-7881 - https://www.cdxy.me/?p=765 -CVE-2017-7885 - https://bugs.ghostscript.com/show_bug.cgi?id=697703 -CVE-2017-7889 - https://usn.ubuntu.com/3583-2/ -CVE-2017-7895 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309 -CVE-2017-7897 - https://github.com/mantisbt/mantisbt/pull/1094 -CVE-2017-7911 - https://www.tenable.com/security/research/tra-2017-19 -CVE-2017-7938 - https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html -CVE-2017-7938 - https://www.exploit-db.com/exploits/41898/ -CVE-2017-7948 - https://bugs.ghostscript.com/show_bug.cgi?id=697762 -CVE-2017-7952 - https://www.exploit-db.com/exploits/42028/ -CVE-2017-7953 - http://seclists.org/fulldisclosure/2017/May/54 -CVE-2017-7953 - https://www.exploit-db.com/exploits/42029/ -CVE-2017-7960 - https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ -CVE-2017-7961 - http://openwall.com/lists/oss-security/2017/04/24/2 -CVE-2017-7961 - https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ -CVE-2017-7961 - https://bugzilla.suse.com/show_bug.cgi?id=1034482 -CVE-2017-7962 - https://blogs.gentoo.org/ago/2017/04/17/imageworsener-divide-by-zero-in-iwgif_record_pixel-imagew-gif-c/ -CVE-2017-7962 - https://github.com/jsummers/imageworsener/issues/15 -CVE-2017-7975 - https://bugs.ghostscript.com/show_bug.cgi?id=697693 -CVE-2017-7976 - https://bugs.ghostscript.com/show_bug.cgi?id=697683 -CVE-2017-7981 - https://www.exploit-db.com/exploits/41953/ -CVE-2017-7985 - https://fortiguard.com/zeroday/FG-VD-17-107 -CVE-2017-7990 - https://www.youtube.com/watch?v=pfrIaNvIuFY -CVE-2017-7991 - http://seclists.org/fulldisclosure/2017/Apr/78 -CVE-2017-7991 - https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29 -CVE-2017-7991 - https://packetstormsecurity.com/files/142258/Exponent-CMS-2.4.1-SQL-Injection.html -CVE-2017-7994 - https://github.com/icepng/PoC/tree/master/PoC1 -CVE-2017-7994 - https://icepng.github.io/2017/04/21/PoDoFo-1/ -CVE-2017-7997 - http://seclists.org/fulldisclosure/2018/Jan/14 -CVE-2017-7997 - https://sysdream.com/news/lab/2018-01-02-cve-2017-7997-gespage-sql-injection-vulnerability/ -CVE-2017-7997 - https://www.exploit-db.com/exploits/43447/ -CVE-2017-7998 - http://seclists.org/fulldisclosure/2018/Jan/13 -CVE-2017-7998 - https://sysdream.com/news/lab/2018-01-02-cve-2017-7998-gespage-stored-cross-site-scripting-xss-vulnerability/ -CVE-2017-8013 - http://seclists.org/fulldisclosure/2017/Sep/36 -CVE-2017-8015 - http://seclists.org/fulldisclosure/2017/Sep/14 -CVE-2017-8028 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2017-8046 - https://www.exploit-db.com/exploits/44289/ -CVE-2017-8051 - https://www.exploit-db.com/exploits/41892/ -CVE-2017-8054 - http://qwertwwwe.github.io/2017/04/22/PoDoFo-0-9-5-allows-remote-attackers-to-cause-a-denial-of-service-infinit-loop/ -CVE-2017-8055 - https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt -CVE-2017-8056 - https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt -CVE-2017-8061 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67b0503db9c29b04eadfeede6bebbfe5ddad94ef -CVE-2017-8062 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=606142af57dad981b78707234cfbd15f9f7b7125 -CVE-2017-8063 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f190e3aec212fc8c61e202c51400afa7384d4bc -CVE-2017-8064 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=005145378c9ad7575a01b6ce1ba118fb427f583a -CVE-2017-8065 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b30460c5b0ed762be75a004e924ec3f8711e032 -CVE-2017-8066 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.2 -CVE-2017-8066 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c919a3069c775c1c876bec55e00b2305d5125caa -CVE-2017-8067 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c4baad50297d84bde1a7ad45e50c73adae4a2192 -CVE-2017-8068 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5593523f968bc86d42a035c6df47d5e0979b5ace -CVE-2017-8069 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7926aff5c57b577ab0f43364ff0c59d968f6a414 -CVE-2017-8070 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478 -CVE-2017-8071 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a7b5df84b6b4e5d599c7289526eed96541a0654 -CVE-2017-8072 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8e9faa15469ed7c7467423db4c62aeed3ff4cae3 -CVE-2017-8083 - http://seclists.org/fulldisclosure/2017/Jun/6 -CVE-2017-8083 - https://watchmysys.com/blog/2017/06/cve-2017-8083-compulab-intensepc-lacks-bios-wp/ -CVE-2017-8098 - http://seclists.org/fulldisclosure/2017/Apr/40 -CVE-2017-8099 - http://seclists.org/fulldisclosure/2017/Apr/41 -CVE-2017-8100 - http://seclists.org/fulldisclosure/2017/Apr/42 -CVE-2017-8101 - http://seclists.org/fulldisclosure/2017/Apr/52 -CVE-2017-8102 - http://seclists.org/fulldisclosure/2017/Apr/44 -CVE-2017-8103 - http://seclists.org/fulldisclosure/2017/Apr/53 -CVE-2017-8104 - http://seclists.org/fulldisclosure/2017/Apr/55 -CVE-2017-8105 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-8106 - https://bugzilla.kernel.org/show_bug.cgi?id=195167 -CVE-2017-8106 - https://launchpad.net/bugs/1678676 -CVE-2017-8110 - http://jgj212.blogspot.hk/2017/04/modified-ecommerce-shopsoftware-2022.html -CVE-2017-8114 - https://hackerone.com/reports/242119 -CVE-2017-8116 - https://labs.nettitude.com/blog/cve-2017-8116-teltonika-router-unauthenticated-remote-code-execution/ -CVE-2017-8221 - http://seclists.org/fulldisclosure/2017/Mar/23 -CVE-2017-8221 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#cloud -CVE-2017-8222 - http://seclists.org/fulldisclosure/2017/Mar/23 -CVE-2017-8222 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#rsa-lulz -CVE-2017-8223 - http://seclists.org/fulldisclosure/2017/Mar/23 -CVE-2017-8223 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead -CVE-2017-8224 - http://seclists.org/fulldisclosure/2017/Mar/23 -CVE-2017-8224 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#backdoor-account -CVE-2017-8225 - http://seclists.org/fulldisclosure/2017/Mar/23 -CVE-2017-8225 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead -CVE-2017-8226 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -CVE-2017-8227 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -CVE-2017-8228 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -CVE-2017-8229 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -CVE-2017-8230 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -CVE-2017-8252 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-8260 - https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/blob/master/CVE-2017-8260.c -CVE-2017-8274 - http://www.securityfocus.com/bid/103671 -CVE-2017-8275 - http://www.securityfocus.com/bid/103671 -CVE-2017-8276 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2017-8287 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2017-8289 - https://github.com/RIOT-OS/RIOT/issues/6840 -CVE-2017-8289 - https://github.com/RIOT-OS/RIOT/pull/6961 -CVE-2017-8289 - https://github.com/RIOT-OS/RIOT/pull/6962 -CVE-2017-8290 - http://packetstormsecurity.com/files/143053/TeamSpeak-Client-3.1.4-Buffer-Overflow.html -CVE-2017-8291 - https://www.exploit-db.com/exploits/41955/ -CVE-2017-8295 - https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html -CVE-2017-8295 - https://wpvulndb.com/vulnerabilities/8807 -CVE-2017-8295 - https://www.exploit-db.com/exploits/41963/ -CVE-2017-8298 - https://github.com/cnvs/canvas/issues/331 -CVE-2017-8303 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8304 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8311 - https://www.exploit-db.com/exploits/44514/ -CVE-2017-8325 - https://blogs.gentoo.org/ago/2017/04/27/imageworsener-heap-based-buffer-overflow-in-iw_process_cols_to_intermediate-imagew-main-c/ -CVE-2017-8326 - https://blogs.gentoo.org/ago/2017/04/27/imageworsener-two-left-shift/ -CVE-2017-8327 - https://blogs.gentoo.org/ago/2017/04/27/imageworsener-memory-allocation-failure-in-my_mallocfn-imagew-cmd-c/ -CVE-2017-8328 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8329 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8330 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8331 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8332 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8333 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8334 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8335 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8336 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8337 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -CVE-2017-8338 - http://seclists.org/fulldisclosure/2017/May/59 -CVE-2017-8338 - https://cxsecurity.com/issue/WLB-2017050062 -CVE-2017-8338 - https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html -CVE-2017-8338 - https://www.vulnerability-lab.com/get_content.php?id=2064 -CVE-2017-8339 - https://www.exploit-db.com/exploits/41945/ -CVE-2017-8345 - https://github.com/ImageMagick/ImageMagick/issues/442 -CVE-2017-8360 - https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt -CVE-2017-8361 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/ -CVE-2017-8362 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/ -CVE-2017-8363 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/ -CVE-2017-8364 - https://blogs.gentoo.org/ago/2017/04/29/rzip-heap-based-buffer-overflow-in-read_buf-stream-c/ -CVE-2017-8365 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/ -CVE-2017-8366 - https://blogs.gentoo.org/ago/2017/04/29/ettercap-etterfilter-heap-based-buffer-overflow-write/ -CVE-2017-8367 - https://www.exploit-db.com/exploits/41911/ -CVE-2017-8372 - https://blogs.gentoo.org/ago/2017/04/30/libmad-assertion-failure-in-layer3-c/ -CVE-2017-8373 - https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/ -CVE-2017-8374 - https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_bit_skip-bit-c/ -CVE-2017-8378 - https://github.com/xiangxiaobo/poc_and_report/tree/master/podofo_heapoverflow_PdfParser.ReadObjects -CVE-2017-8382 - http://en.0day.today/exploit/27771 -CVE-2017-8382 - https://github.com/Admidio/admidio/issues/612 -CVE-2017-8382 - https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc -CVE-2017-8382 - https://www.exploit-db.com/exploits/42005/ -CVE-2017-8400 - https://github.com/matthiaskramm/swftools/issues/13 -CVE-2017-8401 - https://github.com/matthiaskramm/swftools/issues/14 -CVE-2017-8403 - https://www.slideshare.net/fuguet/bluediot-when-a-mature-and-immature-technology-mixes-becomes-an-idiot-situation-75529672 -CVE-2017-8404 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8405 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8406 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8407 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8409 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8410 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8411 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8412 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8413 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8414 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8415 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8416 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8417 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -CVE-2017-8418 - http://www.openwall.com/lists/oss-security/2017/05/01/14 -CVE-2017-8418 - https://github.com/bbatsov/rubocop/issues/4336 -CVE-2017-8419 - https://sourceforge.net/p/lame/bugs/458/ -CVE-2017-8422 - http://www.openwall.com/lists/oss-security/2017/05/10/3 -CVE-2017-8422 - https://www.exploit-db.com/exploits/42053/ -CVE-2017-8438 - https://www.elastic.co/community/security -CVE-2017-8439 - https://www.elastic.co/community/security -CVE-2017-8440 - https://www.elastic.co/community/security -CVE-2017-8441 - https://www.elastic.co/community/security -CVE-2017-8442 - https://www.elastic.co/community/security -CVE-2017-8443 - https://www.elastic.co/community/security -CVE-2017-8445 - https://www.elastic.co/community/security -CVE-2017-8446 - https://www.elastic.co/community/security -CVE-2017-8449 - https://www.elastic.co/community/security -CVE-2017-8450 - https://www.elastic.co/community/security -CVE-2017-8451 - https://www.elastic.co/community/security -CVE-2017-8452 - https://www.elastic.co/community/security -CVE-2017-8461 - http://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html -CVE-2017-8462 - https://www.exploit-db.com/exploits/42218/ -CVE-2017-8464 - https://www.exploit-db.com/exploits/42382/ -CVE-2017-8464 - https://www.exploit-db.com/exploits/42429/ -CVE-2017-8469 - https://www.exploit-db.com/exploits/42217/ -CVE-2017-8470 - https://www.exploit-db.com/exploits/42223/ -CVE-2017-8471 - https://www.exploit-db.com/exploits/42224/ -CVE-2017-8472 - https://www.exploit-db.com/exploits/42225/ -CVE-2017-8473 - https://www.exploit-db.com/exploits/42226/ -CVE-2017-8476 - https://www.exploit-db.com/exploits/42229/ -CVE-2017-8477 - https://www.exploit-db.com/exploits/42230/ -CVE-2017-8478 - https://www.exploit-db.com/exploits/42231/ -CVE-2017-8479 - https://www.exploit-db.com/exploits/42232/ -CVE-2017-8480 - https://www.exploit-db.com/exploits/42233/ -CVE-2017-8481 - https://www.exploit-db.com/exploits/42242/ -CVE-2017-8482 - https://www.exploit-db.com/exploits/42220/ -CVE-2017-8483 - https://www.exploit-db.com/exploits/42243/ -CVE-2017-8484 - https://www.exploit-db.com/exploits/42210/ -CVE-2017-8485 - https://www.exploit-db.com/exploits/42228/ -CVE-2017-8487 - https://www.exploit-db.com/exploits/42211/ -CVE-2017-8488 - https://www.exploit-db.com/exploits/42212/ -CVE-2017-8489 - https://www.exploit-db.com/exploits/42213/ -CVE-2017-8490 - https://www.exploit-db.com/exploits/42214/ -CVE-2017-8491 - https://www.exploit-db.com/exploits/42215/ -CVE-2017-8492 - https://www.exploit-db.com/exploits/42216/ -CVE-2017-8496 - https://www.exploit-db.com/exploits/42246/ -CVE-2017-8535 - https://www.exploit-db.com/exploits/42081/ -CVE-2017-8536 - https://www.exploit-db.com/exploits/42081/ -CVE-2017-8537 - https://www.exploit-db.com/exploits/42081/ -CVE-2017-8538 - https://www.exploit-db.com/exploits/42081/ -CVE-2017-8540 - https://www.exploit-db.com/exploits/42088/ -CVE-2017-8541 - https://www.exploit-db.com/exploits/42092/ -CVE-2017-8548 - https://www.exploit-db.com/exploits/42473/ -CVE-2017-8550 - https://www.exploit-db.com/exploits/42316/ -CVE-2017-8558 - https://www.exploit-db.com/exploits/42264/ -CVE-2017-8564 - https://www.exploit-db.com/exploits/42338/ -CVE-2017-8570 - https://github.com/rxwx/CVE-2017-8570 -CVE-2017-8594 - https://www.exploit-db.com/exploits/42336/ -CVE-2017-8601 - https://www.exploit-db.com/exploits/42479/ -CVE-2017-8618 - https://www.exploit-db.com/exploits/42337/ -CVE-2017-8620 - https://threatpost.com/windows-search-bug-worth-watching-and-squashing/127434/ -CVE-2017-8625 - https://msitpros.com/?p=3909 -CVE-2017-8625 - https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/ -CVE-2017-8625 - https://posts.specterops.io/umci-vs-internet-explorer-exploring-cve-2017-8625-3946536c6442 -CVE-2017-8634 - https://www.exploit-db.com/exploits/42474/ -CVE-2017-8635 - https://www.exploit-db.com/exploits/42471/ -CVE-2017-8636 - https://www.exploit-db.com/exploits/42466/ -CVE-2017-8636 - https://www.exploit-db.com/exploits/42467/ -CVE-2017-8636 - https://www.exploit-db.com/exploits/42468/ -CVE-2017-8636 - https://www.exploit-db.com/exploits/42478/ -CVE-2017-8640 - https://www.exploit-db.com/exploits/42476/ -CVE-2017-8641 - https://www.exploit-db.com/exploits/42465/ -CVE-2017-8644 - https://www.exploit-db.com/exploits/42459/ -CVE-2017-8645 - https://www.exploit-db.com/exploits/42469/ -CVE-2017-8646 - https://www.exploit-db.com/exploits/42470/ -CVE-2017-8652 - https://www.exploit-db.com/exploits/42445/ -CVE-2017-8656 - https://www.exploit-db.com/exploits/42464/ -CVE-2017-8657 - https://www.exploit-db.com/exploits/42481/ -CVE-2017-8665 - https://www.exploit-db.com/exploits/42454/ -CVE-2017-8670 - https://www.exploit-db.com/exploits/42477/ -CVE-2017-8671 - https://www.exploit-db.com/exploits/42475/ -CVE-2017-8678 - https://www.exploit-db.com/exploits/42750/ -CVE-2017-8680 - https://www.exploit-db.com/exploits/42741/ -CVE-2017-8681 - https://www.exploit-db.com/exploits/42742/ -CVE-2017-8682 - https://www.exploit-db.com/exploits/42744/ -CVE-2017-8683 - https://www.exploit-db.com/exploits/42746/ -CVE-2017-8684 - https://www.exploit-db.com/exploits/42747/ -CVE-2017-8685 - https://www.exploit-db.com/exploits/42748/ -CVE-2017-8687 - https://www.exploit-db.com/exploits/42749/ -CVE-2017-8708 - https://www.exploit-db.com/exploits/42743/ -CVE-2017-8710 - https://www.vulnerability-lab.com/get_content.php?id=2094 -CVE-2017-8710 - https://www.youtube.com/watch?v=bIFot3a-58I -CVE-2017-8729 - https://www.exploit-db.com/exploits/42763/ -CVE-2017-8731 - https://www.exploit-db.com/exploits/42758/ -CVE-2017-8734 - https://www.exploit-db.com/exploits/42759/ -CVE-2017-8740 - https://www.exploit-db.com/exploits/42764/ -CVE-2017-8751 - https://www.exploit-db.com/exploits/43151/ -CVE-2017-8755 - https://www.exploit-db.com/exploits/42766/ -CVE-2017-8759 - https://www.exploit-db.com/exploits/42711/ -CVE-2017-8760 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8765 - https://github.com/ImageMagick/ImageMagick/issues/466 -CVE-2017-8768 - http://openwall.com/lists/oss-security/2017/05/03/5 -CVE-2017-8768 - http://seclists.org/fulldisclosure/2017/May/10 -CVE-2017-8770 - https://www.exploit-db.com/exploits/42547/ -CVE-2017-8779 - https://www.exploit-db.com/exploits/41974/ -CVE-2017-8782 - http://seclists.org/fulldisclosure/2017/May/106 -CVE-2017-8786 - https://blogs.gentoo.org/ago/2017/04/29/libpcre-heap-based-buffer-overflow-write-in-pcre2test-c/ -CVE-2017-8788 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8789 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8790 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8791 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8792 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8793 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8794 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8795 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8796 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -CVE-2017-8798 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 -CVE-2017-8824 - http://www.openwall.com/lists/oss-security/2017/12/05/1 -CVE-2017-8824 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-8824 - https://usn.ubuntu.com/3581-1/ -CVE-2017-8824 - https://usn.ubuntu.com/3582-1/ -CVE-2017-8824 - https://usn.ubuntu.com/3583-2/ -CVE-2017-8824 - https://www.exploit-db.com/exploits/43234/ -CVE-2017-8829 - https://bugs.debian.org/861958 -CVE-2017-8830 - https://github.com/ImageMagick/ImageMagick/issues/467 -CVE-2017-8832 - https://github.com/s3131212/allendisk/commit/37b6a63b85d5ab3ed81141cadc47489d7571664b -CVE-2017-8833 - https://github.com/zencart/zencart/issues/1431 -CVE-2017-8834 - https://www.exploit-db.com/exploits/42147/ -CVE-2017-8835 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8836 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8837 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8838 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8839 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8840 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8841 - https://www.exploit-db.com/exploits/42130/ -CVE-2017-8842 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-divide-by-zero-in-bufreadget-libzpaq-h/ -CVE-2017-8842 - https://github.com/ckolivas/lrzip/issues/66 -CVE-2017-8843 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-null-pointer-dereference-in-join_pthread-stream-c/ -CVE-2017-8843 - https://github.com/ckolivas/lrzip/issues/69 -CVE-2017-8844 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/ -CVE-2017-8844 - https://github.com/ckolivas/lrzip/issues/70 -CVE-2017-8845 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-invalid-memory-read-in-lzo_decompress_buf-stream-c/ -CVE-2017-8845 - https://github.com/ckolivas/lrzip/issues/68 -CVE-2017-8846 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-use-after-free-in-read_stream-stream-c/ -CVE-2017-8846 - https://github.com/ckolivas/lrzip/issues/71 -CVE-2017-8847 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-null-pointer-dereference-in-bufreadget-libzpaq-h/ -CVE-2017-8847 - https://github.com/ckolivas/lrzip/issues/67 -CVE-2017-8848 - https://github.com/s3131212/allendisk/issues/16 -CVE-2017-8849 - http://www.openwall.com/lists/oss-security/2017/05/10/3 -CVE-2017-8849 - https://www.exploit-db.com/exploits/42053/ -CVE-2017-8850 - https://alephsecurity.com/vulns/aleph-2017020 -CVE-2017-8851 - https://alephsecurity.com/vulns/aleph-2017021 -CVE-2017-8852 - https://www.coresecurity.com/advisories/sap-sapcar-heap-based-buffer-overflow-vulnerability -CVE-2017-8852 - https://www.exploit-db.com/exploits/41991/ -CVE-2017-8869 - https://www.exploit-db.com/exploits/42384/ -CVE-2017-8870 - https://www.exploit-db.com/exploits/42385/ -CVE-2017-8871 - https://www.exploit-db.com/exploits/42147/ -CVE-2017-8872 - https://bugzilla.gnome.org/show_bug.cgi?id=775200 -CVE-2017-8875 - http://seclists.org/fulldisclosure/2017/May/23 -CVE-2017-8877 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ -CVE-2017-8878 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ -CVE-2017-8892 - https://www.tarlogic.com/blog/vulnerabilidades-en-tempobox/ -CVE-2017-8893 - https://www.tarlogic.com/advisories/Tarlogic-2017-001.txt -CVE-2017-8894 - https://www.tarlogic.com/advisories/Tarlogic-2017-001.txt -CVE-2017-8895 - https://www.exploit-db.com/exploits/42282/ -CVE-2017-8908 - https://bugs.ghostscript.com/show_bug.cgi?id=697810 -CVE-2017-8911 - https://github.com/verdammelt/tnef/issues/23 -CVE-2017-8912 - https://www.exploit-db.com/exploits/41997/ -CVE-2017-8913 - https://erpscan.io/advisories/erpscan-17-007-sap-netweaver-java-7-5-xxe-visual-composer-vc70runtime/ -CVE-2017-8914 - https://erpscan.io/advisories/erpscan-17-009-sap-hana-sinopia-default-user-creation-policy-insecure/ -CVE-2017-8915 - https://erpscan.io/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/ -CVE-2017-8917 - https://www.exploit-db.com/exploits/42033/ -CVE-2017-8917 - https://www.exploit-db.com/exploits/44358/ -CVE-2017-8926 - https://www.exploit-db.com/exploits/42001/ -CVE-2017-8927 - https://www.exploit-db.com/exploits/42002/ -CVE-2017-8928 - https://www.exploit-db.com/exploits/42004/ -CVE-2017-8932 - https://groups.google.com/d/msg/golang-announce/B5ww0iFt1_Q/TgUFJV14BgAJ -CVE-2017-8949 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us -CVE-2017-8950 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us -CVE-2017-8951 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us -CVE-2017-8952 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us -CVE-2017-8982 - https://www.exploit-db.com/exploits/44648/ -CVE-2017-8994 - https://www.tenable.com/security/research/tra-2017-25 -CVE-2017-8994 - https://www.tenable.com/security/research/tra-2017-28 -CVE-2017-9024 - http://hyp3rlinx.altervista.org/advisories/SECURE-AUDITOR-v3.0-DIRECTORY-TRAVERSAL.txt -CVE-2017-9024 - https://www.exploit-db.com/exploits/42041/ -CVE-2017-9030 - https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt -CVE-2017-9032 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -CVE-2017-9032 - http://seclists.org/fulldisclosure/2017/May/91 -CVE-2017-9032 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -CVE-2017-9033 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -CVE-2017-9033 - http://seclists.org/fulldisclosure/2017/May/91 -CVE-2017-9033 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -CVE-2017-9034 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -CVE-2017-9034 - http://seclists.org/fulldisclosure/2017/May/91 -CVE-2017-9034 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -CVE-2017-9035 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -CVE-2017-9035 - http://seclists.org/fulldisclosure/2017/May/91 -CVE-2017-9035 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -CVE-2017-9036 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -CVE-2017-9036 - http://seclists.org/fulldisclosure/2017/May/91 -CVE-2017-9036 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -CVE-2017-9037 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -CVE-2017-9037 - http://seclists.org/fulldisclosure/2017/May/91 -CVE-2017-9037 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -CVE-2017-9038 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9039 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9040 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9041 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9042 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9043 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9044 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -CVE-2017-9045 - https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-google-io-2017-android-app/ -CVE-2017-9046 - https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-Execution.html -CVE-2017-9052 - https://www.prevanders.net/dwarfbug.html -CVE-2017-9053 - https://www.prevanders.net/dwarfbug.html -CVE-2017-9054 - https://www.prevanders.net/dwarfbug.html -CVE-2017-9055 - https://www.prevanders.net/dwarfbug.html -CVE-2017-9065 - https://wpvulndb.com/vulnerabilities/8817 -CVE-2017-9072 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-9074 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2017-9080 - http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ -CVE-2017-9080 - https://www.exploit-db.com/exploits/42003/ -CVE-2017-9080 - https://www.exploit-db.com/exploits/44599/ -CVE-2017-9083 - https://bugs.freedesktop.org/show_bug.cgi?id=101084 -CVE-2017-9085 - https://packetstormsecurity.com/files/142587/Kodak-InSite-8.0-Cross-Site-Scripting.html -CVE-2017-9095 - https://www.exploit-db.com/exploits/43187/ -CVE-2017-9096 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-9098 - http://www.securityfocus.com/bid/98593 -CVE-2017-9100 - http://touhidshaikh.com/blog/poc/d-link-dir600-auth-bypass/ -CVE-2017-9100 - https://www.exploit-db.com/exploits/42039/ -CVE-2017-9101 - https://www.exploit-db.com/exploits/42044/ -CVE-2017-9101 - https://www.exploit-db.com/exploits/44598/ -CVE-2017-9117 - http://bugzilla.maptools.org/show_bug.cgi?id=2690 -CVE-2017-9117 - https://usn.ubuntu.com/3606-1/ -CVE-2017-9120 - https://bugs.php.net/bug.php?id=74544 -CVE-2017-9122 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9123 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9124 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9125 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9126 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9127 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9128 - https://www.exploit-db.com/exploits/42148/ -CVE-2017-9129 - https://www.exploit-db.com/exploits/42207/ -CVE-2017-9130 - https://www.exploit-db.com/exploits/42207/ -CVE-2017-9140 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 -CVE-2017-9140 - https://www.veracode.com/blog/research/anatomy-cross-site-scripting-flaw-telerik-reporting-module -CVE-2017-9147 - http://bugzilla.maptools.org/show_bug.cgi?id=2693 -CVE-2017-9147 - https://usn.ubuntu.com/3606-1/ -CVE-2017-9147 - https://www.exploit-db.com/exploits/42301/ -CVE-2017-9148 - http://seclists.org/oss-sec/2017/q2/422 -CVE-2017-9150 - https://www.exploit-db.com/exploits/42048/ -CVE-2017-9151 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9152 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9153 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9154 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9155 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9156 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9157 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9158 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9159 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9160 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9161 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9162 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9163 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9164 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9165 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9166 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9167 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9168 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9169 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9170 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9171 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9172 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9173 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9174 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9175 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9176 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9177 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9178 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9179 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9180 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9181 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9182 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9183 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9184 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9185 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9186 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9187 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9188 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9189 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9190 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9191 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9192 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9193 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9194 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9195 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9196 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9197 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9198 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9199 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9200 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -CVE-2017-9201 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9202 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9203 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9204 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9205 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9206 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9207 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -CVE-2017-9208 - https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ -CVE-2017-9209 - https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ -CVE-2017-9210 - https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ -CVE-2017-9218 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9219 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9220 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9221 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9222 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9223 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9232 - https://www.exploit-db.com/exploits/44023/ -CVE-2017-9233 - http://www.securityfocus.com/bid/99276 -CVE-2017-9239 - https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test(exiv2) -CVE-2017-9243 - http://touhidshaikh.com/blog/poc/qwr-1104-wireless-n-router-xss/ -CVE-2017-9243 - https://www.exploit-db.com/exploits/42075/ -CVE-2017-9248 - https://www.exploit-db.com/exploits/43873/ -CVE-2017-9249 - https://github.com/s3131212/allendisk/issues/21 -CVE-2017-9253 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9254 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9255 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9256 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9257 - http://seclists.org/fulldisclosure/2017/Jun/32 -CVE-2017-9258 - http://seclists.org/fulldisclosure/2017/Jul/62 -CVE-2017-9258 - https://www.exploit-db.com/exploits/42389/ -CVE-2017-9259 - http://seclists.org/fulldisclosure/2017/Jul/62 -CVE-2017-9259 - https://www.exploit-db.com/exploits/42389/ -CVE-2017-9260 - http://seclists.org/fulldisclosure/2017/Jul/62 -CVE-2017-9260 - https://www.exploit-db.com/exploits/42389/ -CVE-2017-9281 - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes -CVE-2017-9282 - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes -CVE-2017-9283 - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes -CVE-2017-9287 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2017-9287 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2017-9288 - http://jgj212.blogspot.kr/2017/05/a-reflected-xss-vulnerability-in.html -CVE-2017-9288 - https://wpvulndb.com/vulnerabilities/8836 -CVE-2017-9299 - http://code610.blogspot.com/2017/05/turnkey-feat-otrs.html -CVE-2017-9300 - http://code610.blogspot.com/2017/04/multiple-crashes-in-vlc-224.html -CVE-2017-9301 - http://code610.blogspot.com/2017/04/multiple-crashes-in-vlc-224.html -CVE-2017-9302 - http://code610.blogspot.com/2017/05/divided-realplayer-160232.html -CVE-2017-9305 - https://www.cdxy.me/?p=763 -CVE-2017-9306 - https://www.cdxy.me/?p=763 -CVE-2017-9313 - http://seclists.org/bugtraq/2017/Jul/3 -CVE-2017-9324 - https://packetstormsecurity.com/files/142862/OTRS-Install-Dialog-Disclosure.html -CVE-2017-9328 - https://gist.github.com/hybriz/63bbe2d963e531357aca353c74dd1ad5 -CVE-2017-9347 - https://www.exploit-db.com/exploits/42124/ -CVE-2017-9353 - https://www.exploit-db.com/exploits/42123/ -CVE-2017-9355 - http://hyp3rlinx.altervista.org/advisories/SUBSONIC-XML-EXTERNAL-ENITITY.txt -CVE-2017-9355 - http://packetstormsecurity.com/files/142795/Subsonic-6.1.1-XML-External-Entity-Attack.html -CVE-2017-9355 - https://www.exploit-db.com/exploits/42119/ -CVE-2017-9356 - http://seclists.org/bugtraq/2017/Jun/43 -CVE-2017-9360 - https://jgj212.blogspot.tw/2017/05/a-sql-injection-vulnerability-in.html -CVE-2017-9361 - https://jgj212.blogspot.tw/2017/05/a-stored-xss-vulnerability-in.html -CVE-2017-9369 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 -CVE-2017-9370 - http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000045350 -CVE-2017-9374 - https://bugzilla.redhat.com/show_bug.cgi?id=1459132 -CVE-2017-9379 - https://github.com/bigtreecms/BigTree-CMS/issues/287 -CVE-2017-9380 - http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html -CVE-2017-9381 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9382 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9383 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9384 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9385 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9386 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9388 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9389 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9390 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9391 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9392 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -CVE-2017-9406 - https://bugs.freedesktop.org/show_bug.cgi?id=100775 -CVE-2017-9408 - https://bugs.freedesktop.org/show_bug.cgi?id=100776 -CVE-2017-9412 - http://seclists.org/fulldisclosure/2017/Jul/63 -CVE-2017-9412 - https://www.exploit-db.com/exploits/42390/ -CVE-2017-9413 - http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html -CVE-2017-9413 - https://www.exploit-db.com/exploits/42118/ -CVE-2017-9414 - http://hyp3rlinx.altervista.org/advisories/SUBSONIC-CSRF-PERSISTENT-XSS.txt -CVE-2017-9414 - http://packetstormsecurity.com/files/142796/Subsonic-6.1.1-Persistent-XSS.html -CVE-2017-9414 - https://www.exploit-db.com/exploits/42120/ -CVE-2017-9415 - https://www.exploit-db.com/exploits/42117/ -CVE-2017-9417 - https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets -CVE-2017-9418 - https://wpvulndb.com/vulnerabilities/8845 -CVE-2017-9418 - https://www.exploit-db.com/exploits/42166/ -CVE-2017-9419 - https://wpvulndb.com/vulnerabilities/8848 -CVE-2017-9420 - https://wpvulndb.com/vulnerabilities/8842 -CVE-2017-9424 - https://www.blackhat.com/us-17/briefings.html#friday-the-13th-json-attacks -CVE-2017-9425 - http://touhidshaikh.com/blog/poc/facetag-ext-piwigo-stored-xss/ -CVE-2017-9425 - https://www.exploit-db.com/exploits/42098/ -CVE-2017-9425 - https://www.youtube.com/watch?v=_ha7XBT_Omo -CVE-2017-9426 - http://touhidshaikh.com/blog/poc/facetag-extension-piwigo-sqli/ -CVE-2017-9426 - https://www.exploit-db.com/exploits/42094/ -CVE-2017-9426 - https://www.youtube.com/watch?v=MVCe_zYtFsQ -CVE-2017-9427 - https://github.com/bigtreecms/BigTree-CMS/issues/288 -CVE-2017-9428 - https://github.com/bigtreecms/BigTree-CMS/issues/289 -CVE-2017-9429 - https://www.exploit-db.com/exploits/42173/ -CVE-2017-9430 - https://packetstormsecurity.com/files/142799/DNSTracer-1.8.1-Buffer-Overflow.html -CVE-2017-9430 - https://www.exploit-db.com/exploits/42115/ -CVE-2017-9430 - https://www.exploit-db.com/exploits/42424/ -CVE-2017-9441 - https://github.com/bigtreecms/BigTree-CMS/issues/290 -CVE-2017-9442 - https://github.com/bigtreecms/BigTree-CMS/issues/291 -CVE-2017-9443 - https://github.com/bigtreecms/BigTree-CMS/issues/292 -CVE-2017-9444 - https://github.com/bigtreecms/BigTree-CMS/issues/293 -CVE-2017-9447 - https://www.exploit-db.com/exploits/442321/ -CVE-2017-9448 - https://github.com/bigtreecms/BigTree-CMS/issues/294 -CVE-2017-9449 - https://github.com/bigtreecms/BigTree-CMS/issues/295 -CVE-2017-9450 - https://sintonen.fi/advisories/aws-cfn-bootstrap-local-code-execution-as-root.txt -CVE-2017-9457 - http://packetstormsecurity.com/files/143481/Compulab-Intense-PC-MintBox-2-Signature-Verification.html -CVE-2017-9457 - http://seclists.org/fulldisclosure/2017/Jul/56 -CVE-2017-9457 - https://watchmysys.com/blog/2017/07/cve-2017-9457-compulab-intense-pc-lacks-firmware-validation/ -CVE-2017-9462 - https://hackerone.com/reports/222020 -CVE-2017-9470 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-null-pointer-dereference-in-mapiprint-ytnef-c/ -CVE-2017-9471 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapword-ytnef-c/ -CVE-2017-9472 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapdword-ytnef-c/ -CVE-2017-9473 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-memory-allocation-failure-in-tneffillmapi-ytnef-c/ -CVE-2017-9474 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-decompressrtf-ytnef-c/ -CVE-2017-9475 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-17.public-wifi-theft-impersonation.txt -CVE-2017-9476 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-18.home-security-wifi-network.txt -CVE-2017-9477 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-19.wifi-dhcp-cm-mac-leak.txt -CVE-2017-9478 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-20.emta-reverse-dns.txt -CVE-2017-9479 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-22.syseventd.txt -CVE-2017-9480 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-23.upnp-directory-write.txt -CVE-2017-9481 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-24.atom-ip-routing.txt -CVE-2017-9482 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-25.atom-telnet.txt -CVE-2017-9483 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-26.arbitrary-command-execution.txt -CVE-2017-9484 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-27.ipv6-cm-mac-leak.txt -CVE-2017-9485 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-28.session-cookie-write.txt -CVE-2017-9486 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-29.password-of-the-day.txt -CVE-2017-9487 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-30.wan0-ipv6-cm-mac.txt -CVE-2017-9488 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-31.stb-remote-webui.txt -CVE-2017-9489 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt -CVE-2017-9490 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt -CVE-2017-9491 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt -CVE-2017-9492 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt -CVE-2017-9493 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-37.rf4ce-forced-pairing.vendor.txt -CVE-2017-9494 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-38.remote-web-inspector.txt -CVE-2017-9495 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-39.arbitrary-file-read.txt -CVE-2017-9496 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-40.ethernet-snmp.txt -CVE-2017-9497 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-41.root-command-execution.txt -CVE-2017-9498 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-42.remote-OTA.txt -CVE-2017-9506 - https://ecosystem.atlassian.net/browse/OAUTH-344 -CVE-2017-9513 - https://ecosystem.atlassian.net/browse/STRM-2350 -CVE-2017-9516 - https://packetstormsecurity.com/files/142851/Craft-CMS-2.6-Cross-Site-Scripting-File-Upload.html -CVE-2017-9516 - https://www.exploit-db.com/exploits/42143/ -CVE-2017-9521 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-32.unnecessary-services.txt -CVE-2017-9522 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-21.default-wifi-credentials.txt -CVE-2017-9526 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-9526 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-9542 - https://www.facebook.com/tigerBOY777/videos/1368513696568992/ -CVE-2017-9543 - https://www.exploit-db.com/exploits/42154/ -CVE-2017-9544 - https://www.exploit-db.com/exploits/42155/ -CVE-2017-9545 - http://seclists.org/fulldisclosure/2017/Jul/65 -CVE-2017-9546 - https://github.com/bigtreecms/BigTree-CMS/issues/298 -CVE-2017-9547 - https://github.com/bigtreecms/BigTree-CMS/issues/297 -CVE-2017-9548 - https://github.com/bigtreecms/BigTree-CMS/issues/296 -CVE-2017-9554 - https://www.exploit-db.com/exploits/43455/ -CVE-2017-9557 - https://www.exploit-db.com/exploits/42153/ -CVE-2017-9558 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9559 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9560 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9561 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9562 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9563 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9564 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9565 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9566 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9567 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9568 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9569 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9570 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9571 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9572 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9573 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9574 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9575 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9576 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9577 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9578 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9579 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9580 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9581 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9582 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9583 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9584 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9585 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9586 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9587 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9588 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9589 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9590 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9591 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9592 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9593 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9594 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9595 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9596 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9597 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9598 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9599 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9600 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9601 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 -CVE-2017-9602 - https://www.exploit-db.com/exploits/42184/ -CVE-2017-9603 - https://wpvulndb.com/vulnerabilities/8847 -CVE-2017-9603 - https://www.exploit-db.com/exploits/42172/ -CVE-2017-9608 - http://www.openwall.com/lists/oss-security/2017/08/14/1 -CVE-2017-9608 - http://www.openwall.com/lists/oss-security/2017/08/15/8 -CVE-2017-9609 - http://packetstormsecurity.com/files/143103/Blackcat-CMS-1.2-Cross-Site-Scripting.html -CVE-2017-9609 - https://github.com/BlackCatDevelopment/BlackCatCMS/issues/373 -CVE-2017-9609 - https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc -CVE-2017-9610 - https://bugs.ghostscript.com/show_bug.cgi?id=698025 -CVE-2017-9611 - https://bugs.ghostscript.com/show_bug.cgi?id=698024 -CVE-2017-9612 - https://bugs.ghostscript.com/show_bug.cgi?id=698026 -CVE-2017-9613 - https://packetstormsecurity.com/files/142952/SAP-Successfactors-b1702p5e.1190658-Cross-Site-Scripting.html -CVE-2017-9614 - http://packetstormsecurity.com/files/143518/libjpeg-turbo-1.5.1-Denial-Of-Service.html -CVE-2017-9614 - http://seclists.org/fulldisclosure/2017/Jul/66 -CVE-2017-9614 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/167 -CVE-2017-9614 - https://www.exploit-db.com/exploits/42391/ -CVE-2017-9616 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 -CVE-2017-9617 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13799 -CVE-2017-9618 - https://bugs.ghostscript.com/show_bug.cgi?id=698044 -CVE-2017-9619 - https://bugs.ghostscript.com/show_bug.cgi?id=698042 -CVE-2017-9620 - https://bugs.ghostscript.com/show_bug.cgi?id=698050 -CVE-2017-9640 - https://www.exploit-db.com/exploits/42543/ -CVE-2017-9644 - https://www.exploit-db.com/exploits/42542/ -CVE-2017-9650 - https://www.exploit-db.com/exploits/42544/ -CVE-2017-9669 - http://www.openwall.com/lists/oss-security/2017/06/25/2 -CVE-2017-9670 - https://sourceforge.net/p/gnuplot/bugs/1933/ -CVE-2017-9671 - http://www.openwall.com/lists/oss-security/2017/06/25/2 -CVE-2017-9673 - https://packetstormsecurity.com/files/142944/SimpleCE-2.3.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2017-9674 - https://packetstormsecurity.com/files/142944/SimpleCE-2.3.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2017-9675 - https://www.exploit-db.com/exploits/43147/ -CVE-2017-9726 - http://bugs.ghostscript.com/show_bug.cgi?id=698055 -CVE-2017-9727 - http://bugs.ghostscript.com/show_bug.cgi?id=698056 -CVE-2017-9728 - http://openwall.com/lists/oss-security/2017/06/16/4 -CVE-2017-9729 - http://openwall.com/lists/oss-security/2017/06/16/4 -CVE-2017-9730 - https://www.exploit-db.com/exploits/42193/ -CVE-2017-9732 - http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html -CVE-2017-9732 - http://seclists.org/fulldisclosure/2018/Nov/65 -CVE-2017-9732 - https://github.com/irsl/knc-memory-exhaustion/ -CVE-2017-9735 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2017-9735 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-9735 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2017-9739 - https://bugs.ghostscript.com/show_bug.cgi?id=698063 -CVE-2017-9740 - https://bugs.ghostscript.com/show_bug.cgi?id=698064 -CVE-2017-9742 - https://www.exploit-db.com/exploits/42203/ -CVE-2017-9746 - https://www.exploit-db.com/exploits/42199/ -CVE-2017-9747 - https://www.exploit-db.com/exploits/42200/ -CVE-2017-9748 - https://www.exploit-db.com/exploits/42202/ -CVE-2017-9749 - https://www.exploit-db.com/exploits/42201/ -CVE-2017-9750 - https://www.exploit-db.com/exploits/42198/ -CVE-2017-9756 - https://www.exploit-db.com/exploits/42204/ -CVE-2017-9757 - https://www.exploit-db.com/exploits/42149/ -CVE-2017-9758 - https://www.kb.cert.org/vuls/id/446847 -CVE-2017-9759 - https://www.vulnerability-lab.com/get_content.php?id=2073 -CVE-2017-9762 - https://github.com/radare/radare2/issues/7726 -CVE-2017-9764 - https://github.com/phantom0301/vulns/blob/master/Metinfo.md -CVE-2017-9766 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13811 -CVE-2017-9767 - http://packetstormsecurity.com/files/143746/Quali-CloudShell-7.1.0.6508-Patch-6-Cross-Site-Scripting.html -CVE-2017-9767 - https://www.exploit-db.com/exploits/42453/ -CVE-2017-9769 - https://www.exploit-db.com/exploits/42368/ -CVE-2017-9772 - https://caml.inria.fr/mantis/view.php?id=7557 -CVE-2017-9775 - https://bugs.freedesktop.org/show_bug.cgi?id=101540 -CVE-2017-9779 - https://caml.inria.fr/mantis/view.php?id=7557 -CVE-2017-9781 - https://www.tenable.com/security/research/tra-2017-21 -CVE-2017-9788 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -CVE-2017-9791 - https://www.exploit-db.com/exploits/42324/ -CVE-2017-9791 - https://www.exploit-db.com/exploits/44643/ -CVE-2017-9798 - http://openwall.com/lists/oss-security/2017/09/18/2 -CVE-2017-9798 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2017-9798 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2017-9798 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2017-9798 - https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html -CVE-2017-9798 - https://github.com/hannob/optionsbleed -CVE-2017-9798 - https://hackerone.com/reports/269568 -CVE-2017-9798 - https://www.exploit-db.com/exploits/42745/ -CVE-2017-9798 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2017-9800 - http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html -CVE-2017-9800 - https://hackerone.com/reports/260005 -CVE-2017-9800 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2017-9802 - http://packetstormsecurity.com/files/143758/Apache-Sling-Servlets-Post-2.3.20-Cross-Site-Scripting.html -CVE-2017-9805 - https://www.exploit-db.com/exploits/42627/ -CVE-2017-9806 - http://www.openoffice.org/security/cves/CVE-2017-9806.html -CVE-2017-9810 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html -CVE-2017-9810 - http://seclists.org/fulldisclosure/2017/Jun/33 -CVE-2017-9810 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities -CVE-2017-9810 - https://www.exploit-db.com/exploits/42269/ -CVE-2017-9811 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html -CVE-2017-9811 - http://seclists.org/fulldisclosure/2017/Jun/33 -CVE-2017-9811 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities -CVE-2017-9811 - https://www.exploit-db.com/exploits/42269/ -CVE-2017-9812 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html -CVE-2017-9812 - http://seclists.org/fulldisclosure/2017/Jun/33 -CVE-2017-9812 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities -CVE-2017-9812 - https://www.exploit-db.com/exploits/42269/ -CVE-2017-9813 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html -CVE-2017-9813 - http://seclists.org/fulldisclosure/2017/Jun/33 -CVE-2017-9813 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities -CVE-2017-9813 - https://www.exploit-db.com/exploits/42269/ -CVE-2017-9814 - https://bugs.freedesktop.org/show_bug.cgi?id=101547 -CVE-2017-9822 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html -CVE-2017-9822 - http://www.dnnsoftware.com/community/security/security-center -CVE-2017-9833 - https://pastebin.com/raw/rt7LJvyF -CVE-2017-9833 - https://www.exploit-db.com/exploits/42290/ -CVE-2017-9834 - https://wpvulndb.com/vulnerabilities/8897 -CVE-2017-9834 - https://www.exploit-db.com/exploits/42291/ -CVE-2017-9835 - https://bugs.ghostscript.com/show_bug.cgi?id=697985 -CVE-2017-9841 - http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/ -CVE-2017-9841 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2017-9843 - https://erpscan.io/advisories/erpscan-17-010-sap-netweaver-abap-dispwork-crash-using-cl_java_script/ -CVE-2017-9844 - https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/ -CVE-2017-9845 - https://erpscan.io/advisories/erpscan-17-015-sap-netweaver-dispwork-anonymous-denial-service/ -CVE-2017-9847 - https://github.com/arvidn/libtorrent/issues/2099 -CVE-2017-9851 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9852 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9853 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9854 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9855 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9856 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9857 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9858 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9859 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9860 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9861 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9862 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9863 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9864 - http://www.sma.de/en/statement-on-cyber-security.html -CVE-2017-9865 - https://bugs.freedesktop.org/show_bug.cgi?id=100774 -CVE-2017-9869 - https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/ -CVE-2017-9869 - https://www.exploit-db.com/exploits/42258/ -CVE-2017-9870 - https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-iii_i_stereo-layer3-c/ -CVE-2017-9871 - https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/ -CVE-2017-9872 - https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_dequantize_sample-layer3-c/ -CVE-2017-9872 - https://www.exploit-db.com/exploits/42259/ -CVE-2017-9935 - http://bugzilla.maptools.org/show_bug.cgi?id=2704 -CVE-2017-9935 - https://usn.ubuntu.com/3606-1/ -CVE-2017-9936 - http://bugzilla.maptools.org/show_bug.cgi?id=2706 -CVE-2017-9936 - https://www.exploit-db.com/exploits/42300/ -CVE-2017-9937 - http://bugzilla.maptools.org/show_bug.cgi?id=2707 -CVE-2017-9938 - https://www.tenable.com/security/research/tra-2017-34 -CVE-2017-9946 - http://packetstormsecurity.com/files/169544/Siemens-APOGEE-PXC-TALON-TC-Authentication-Bypass.html -CVE-2017-9947 - http://packetstormsecurity.com/files/169544/Siemens-APOGEE-PXC-TALON-TC-Authentication-Bypass.html -CVE-2017-9948 - https://www.vulnerability-db.com/?q=articles/2017/05/28/stack-buffer-overflow-zero-day-vulnerability-uncovered-microsoft-skype-v72-v735 -CVE-2017-9948 - https://www.vulnerability-lab.com/get_content.php?id=2071 -CVE-2017-9955 - https://sourceware.org/bugzilla/show_bug.cgi?id=21665 -CVE-2017-9962 - http://www.schneider-electric.com/en/download/document/SEVD-2017-264-01/ -CVE-2017-9978 - http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html -CVE-2017-9978 - http://seclists.org/fulldisclosure/2017/Aug/23 -CVE-2017-9978 - https://www.exploit-db.com/exploits/42517/ -CVE-2017-9979 - http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html -CVE-2017-9979 - http://seclists.org/fulldisclosure/2017/Aug/23 -CVE-2017-9979 - https://www.exploit-db.com/exploits/42517/ -CVE-2017-9982 - https://www.youtube.com/watch?v=8BrQCUOgQL0 -CVE-2017-9987 - https://bugzilla.libav.org/show_bug.cgi?id=1067 -CVE-2017-9988 - https://github.com/libming/libming/issues/85 -CVE-2017-9989 - https://github.com/libming/libming/issues/86 -CVE-2017-9998 - https://bugzilla.redhat.com/show_bug.cgi?id=1465756 -CVE-2018-0101 - https://pastebin.com/YrBcG2Ln -CVE-2018-0101 - https://www.exploit-db.com/exploits/43986/ -CVE-2018-0114 - https://github.com/zi0Black/POC-CVE-2018-0114 -CVE-2018-0114 - https://www.exploit-db.com/exploits/44324/ -CVE-2018-0171 - https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490 -CVE-2018-0202 - https://bugzilla.clamav.net/show_bug.cgi?id=11973 -CVE-2018-0202 - https://bugzilla.clamav.net/show_bug.cgi?id=11980 -CVE-2018-0258 - https://www.tenable.com/security/research/tra-2018-11 -CVE-2018-0296 - http://packetstormsecurity.com/files/154017/Cisco-Adaptive-Security-Appliance-Path-Traversal.html -CVE-2018-0296 - https://www.exploit-db.com/exploits/44956/ -CVE-2018-0437 - https://www.exploit-db.com/exploits/45339/ -CVE-2018-0438 - https://www.exploit-db.com/exploits/45339/ -CVE-2018-0464 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal -CVE-2018-0491 - https://www.exploit-db.com/exploits/44994/ -CVE-2018-0492 - https://www.exploit-db.com/exploits/44452/ -CVE-2018-0494 - https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt -CVE-2018-0494 - https://www.exploit-db.com/exploits/44601/ -CVE-2018-0495 - https://usn.ubuntu.com/3692-1/ -CVE-2018-0576 - https://wpvulndb.com/vulnerabilities/9609 -CVE-2018-0577 - https://wpvulndb.com/vulnerabilities/9610 -CVE-2018-0585 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-0586 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-0587 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-0588 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-0589 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-0590 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-0602 - https://wpvulndb.com/vulnerabilities/9101 -CVE-2018-0603 - https://wpvulndb.com/vulnerabilities/9102 -CVE-2018-0706 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html -CVE-2018-0706 - http://seclists.org/fulldisclosure/2018/Jul/45 -CVE-2018-0706 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities -CVE-2018-0706 - https://www.exploit-db.com/exploits/45015/ -CVE-2018-0706 - https://www.exploit-db.com/exploits/45043/ -CVE-2018-0707 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html -CVE-2018-0707 - http://seclists.org/fulldisclosure/2018/Jul/45 -CVE-2018-0707 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities -CVE-2018-0707 - https://www.exploit-db.com/exploits/45015/ -CVE-2018-0707 - https://www.exploit-db.com/exploits/45043/ -CVE-2018-0708 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html -CVE-2018-0708 - http://seclists.org/fulldisclosure/2018/Jul/45 -CVE-2018-0708 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities -CVE-2018-0708 - https://www.exploit-db.com/exploits/45015/ -CVE-2018-0709 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html -CVE-2018-0709 - http://seclists.org/fulldisclosure/2018/Jul/45 -CVE-2018-0709 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities -CVE-2018-0709 - https://www.exploit-db.com/exploits/45015/ -CVE-2018-0710 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html -CVE-2018-0710 - http://seclists.org/fulldisclosure/2018/Jul/45 -CVE-2018-0710 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities -CVE-2018-0710 - https://www.exploit-db.com/exploits/45015/ -CVE-2018-0715 - https://www.exploit-db.com/exploits/45348/ -CVE-2018-0732 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-0732 - https://usn.ubuntu.com/3692-1/ -CVE-2018-0732 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-0732 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-0732 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-0732 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-0732 - https://www.tenable.com/security/tns-2018-17 -CVE-2018-0733 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-0733 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-0733 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-0733 - https://www.tenable.com/security/tns-2018-04 -CVE-2018-0733 - https://www.tenable.com/security/tns-2018-06 -CVE-2018-0733 - https://www.tenable.com/security/tns-2018-07 -CVE-2018-0734 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-0734 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-0734 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-0734 - https://www.tenable.com/security/tns-2018-16 -CVE-2018-0734 - https://www.tenable.com/security/tns-2018-17 -CVE-2018-0735 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-0735 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-0737 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-0737 - https://usn.ubuntu.com/3692-1/ -CVE-2018-0737 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-0737 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-0737 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-0737 - https://www.tenable.com/security/tns-2018-17 -CVE-2018-0739 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-0739 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-0739 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-0739 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-0739 - https://www.tenable.com/security/tns-2018-04 -CVE-2018-0739 - https://www.tenable.com/security/tns-2018-06 -CVE-2018-0739 - https://www.tenable.com/security/tns-2018-07 -CVE-2018-0743 - https://github.com/saaramar/execve_exploit -CVE-2018-0743 - https://www.exploit-db.com/exploits/43962/ -CVE-2018-0744 - https://www.exploit-db.com/exploits/43446/ -CVE-2018-0745 - https://www.exploit-db.com/exploits/43470/ -CVE-2018-0746 - https://www.exploit-db.com/exploits/43471/ -CVE-2018-0748 - https://www.exploit-db.com/exploits/43514/ -CVE-2018-0749 - https://www.exploit-db.com/exploits/43517/ -CVE-2018-0751 - https://www.exploit-db.com/exploits/43515/ -CVE-2018-0752 - https://www.exploit-db.com/exploits/43516/ -CVE-2018-0758 - https://www.exploit-db.com/exploits/43491/ -CVE-2018-0767 - https://www.exploit-db.com/exploits/43522/ -CVE-2018-0769 - https://www.exploit-db.com/exploits/43710/ -CVE-2018-0770 - https://www.exploit-db.com/exploits/44075/ -CVE-2018-0774 - https://www.exploit-db.com/exploits/43715/ -CVE-2018-0775 - https://www.exploit-db.com/exploits/43717/ -CVE-2018-0776 - https://www.exploit-db.com/exploits/43723/ -CVE-2018-0777 - https://www.exploit-db.com/exploits/43718/ -CVE-2018-0780 - https://www.exploit-db.com/exploits/43720/ -CVE-2018-0802 - https://0patch.blogspot.com/2018/01/the-bug-that-killed-equation-editor-how.html -CVE-2018-0802 - https://github.com/rxwx/CVE-2018-0802 -CVE-2018-0802 - https://github.com/zldww2011/CVE-2018-0802_POC -CVE-2018-0802 - https://research.checkpoint.com/another-office-equation-rce-vulnerability/ -CVE-2018-0821 - https://www.exploit-db.com/exploits/44149/ -CVE-2018-0822 - https://www.exploit-db.com/exploits/44147/ -CVE-2018-0823 - https://www.exploit-db.com/exploits/44148/ -CVE-2018-0824 - https://www.exploit-db.com/exploits/44906/ -CVE-2018-0826 - https://www.exploit-db.com/exploits/44152/ -CVE-2018-0832 - https://www.exploit-db.com/exploits/44146/ -CVE-2018-0833 - https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-0833 -CVE-2018-0833 - https://www.exploit-db.com/exploits/44189/ -CVE-2018-0834 - https://www.exploit-db.com/exploits/44078/ -CVE-2018-0835 - https://www.exploit-db.com/exploits/44079/ -CVE-2018-0837 - https://www.exploit-db.com/exploits/44081/ -CVE-2018-0838 - https://www.exploit-db.com/exploits/44080/ -CVE-2018-0840 - https://www.exploit-db.com/exploits/44077/ -CVE-2018-0860 - https://www.exploit-db.com/exploits/44076/ -CVE-2018-0866 - https://www.exploit-db.com/exploits/44153/ -CVE-2018-0877 - https://www.exploit-db.com/exploits/44313/ -CVE-2018-0878 - https://www.exploit-db.com/exploits/44352/ -CVE-2018-0880 - https://www.exploit-db.com/exploits/44314/ -CVE-2018-0882 - https://www.exploit-db.com/exploits/44315/ -CVE-2018-0886 - https://github.com/preempt/credssp -CVE-2018-0886 - https://www.exploit-db.com/exploits/44453/ -CVE-2018-0891 - https://www.exploit-db.com/exploits/44312/ -CVE-2018-0894 - https://www.exploit-db.com/exploits/44308/ -CVE-2018-0895 - https://www.exploit-db.com/exploits/44309/ -CVE-2018-0897 - https://www.exploit-db.com/exploits/44310/ -CVE-2018-0901 - https://www.exploit-db.com/exploits/44311/ -CVE-2018-0933 - https://www.exploit-db.com/exploits/44396/ -CVE-2018-0934 - https://www.exploit-db.com/exploits/44396/ -CVE-2018-0934 - https://www.exploit-db.com/exploits/44397/ -CVE-2018-0935 - https://www.exploit-db.com/exploits/44404/ -CVE-2018-0946 - https://www.exploit-db.com/exploits/44758/ -CVE-2018-0952 - https://www.exploit-db.com/exploits/45244/ -CVE-2018-0953 - https://www.exploit-db.com/exploits/44694/ -CVE-2018-0966 - https://www.exploit-db.com/exploits/44466/ -CVE-2018-0968 - https://www.exploit-db.com/exploits/44465/ -CVE-2018-0969 - https://www.exploit-db.com/exploits/44459/ -CVE-2018-0970 - https://www.exploit-db.com/exploits/44460/ -CVE-2018-0971 - https://www.exploit-db.com/exploits/44461/ -CVE-2018-0972 - https://www.exploit-db.com/exploits/44462/ -CVE-2018-0973 - https://www.exploit-db.com/exploits/44463/ -CVE-2018-0974 - https://www.exploit-db.com/exploits/44464/ -CVE-2018-0975 - https://www.exploit-db.com/exploits/44458/ -CVE-2018-0980 - https://www.exploit-db.com/exploits/44653/ -CVE-2018-0982 - https://www.exploit-db.com/exploits/44888/ -CVE-2018-0986 - https://www.exploit-db.com/exploits/44402/ -CVE-2018-0988 - http://www.securityfocus.com/bid/103615 -CVE-2018-0991 - http://www.securityfocus.com/bid/103614 -CVE-2018-0997 - http://www.securityfocus.com/bid/103618 -CVE-2018-1000001 - http://seclists.org/oss-sec/2018/q1/38 -CVE-2018-1000001 - https://www.exploit-db.com/exploits/43775/ -CVE-2018-1000001 - https://www.exploit-db.com/exploits/44889/ -CVE-2018-1000001 - https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ -CVE-2018-1000004 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-1000004 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1000006 - https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374 -CVE-2018-1000006 - https://www.exploit-db.com/exploits/43899/ -CVE-2018-1000006 - https://www.exploit-db.com/exploits/44357/ -CVE-2018-1000007 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-1000024 - https://usn.ubuntu.com/3557-1/ -CVE-2018-1000026 - https://usn.ubuntu.com/3620-1/ -CVE-2018-1000027 - https://usn.ubuntu.com/3557-1/ -CVE-2018-1000030 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-1000049 - http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html -CVE-2018-1000049 - http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html -CVE-2018-1000049 - https://www.exploit-db.com/exploits/44638/ -CVE-2018-1000049 - https://www.exploit-db.com/exploits/45044/ -CVE-2018-1000067 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1000068 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1000069 - https://www.youtube.com/watch?v=7IXtiTNilAI -CVE-2018-1000070 - https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments -CVE-2018-1000080 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee -CVE-2018-1000081 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee -CVE-2018-1000082 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee -CVE-2018-1000083 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee -CVE-2018-1000085 - http://www.openwall.com/lists/oss-security/2017/09/29/4 -CVE-2018-1000087 - https://cveexploit.blogspot.in/ -CVE-2018-1000091 - https://github.com/mwarning/KadNode/issues/79 -CVE-2018-1000093 - https://github.com/cryptonotefoundation/cryptonote/issues/172 -CVE-2018-1000093 - https://www.ayrx.me/cryptonote-unauthenticated-json-rpc -CVE-2018-1000094 - http://dev.cmsmadesimple.org/bug/view/11741 -CVE-2018-1000094 - https://www.exploit-db.com/exploits/44976/ -CVE-2018-10001 - http://git.videolan.org/?p=ffmpeg.git;a=commit;h=47b7c68ae54560e2308bdb6be4fb076c73b93081 -CVE-2018-1000115 - https://www.exploit-db.com/exploits/44264/ -CVE-2018-1000115 - https://www.exploit-db.com/exploits/44265/ -CVE-2018-1000120 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1000120 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1000120 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000120 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-1000121 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1000121 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1000121 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000122 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1000122 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1000122 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000124 - https://github.com/mkucej/i-librarian/issues/116 -CVE-2018-1000126 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee -CVE-2018-1000131 - https://wpvulndb.com/vulnerabilities/9041 -CVE-2018-1000136 - https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/ -CVE-2018-1000137 - https://github.com/mkucej/i-librarian/issues/121 -CVE-2018-1000138 - https://github.com/mkucej/i-librarian/issues/120 -CVE-2018-1000139 - https://github.com/mkucej/i-librarian/issues/119 -CVE-2018-1000140 - http://packetstormsecurity.com/files/172829/librelp-Remote-Code-Execution.html -CVE-2018-1000156 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html -CVE-2018-1000156 - http://rachelbythebay.com/w/2018/04/05/bangpatch/ -CVE-2018-1000156 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19 -CVE-2018-1000156 - https://savannah.gnu.org/bugs/index.php?53566 -CVE-2018-1000156 - https://seclists.org/bugtraq/2019/Aug/29 -CVE-2018-1000160 - https://github.com/RisingStack/protect/issues/16 -CVE-2018-1000167 - https://tech.feedyourhead.at/content/remote-code-execution-in-suricata-update -CVE-2018-1000168 - https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html -CVE-2018-1000172 - https://fortiguard.com/zeroday/FG-VD-17-215 -CVE-2018-1000180 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-1000180 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1000180 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-1000180 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000192 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1000193 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1000194 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1000195 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1000203 - https://www.bankinfosecurity.com/exclusive-aussie-firm-loses-5m-to-backdoored-cryptocurrency-a-11057 -CVE-2018-1000204 - https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 -CVE-2018-1000204 - https://usn.ubuntu.com/3696-1/ -CVE-2018-1000206 - https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/ -CVE-2018-1000206 - https://www.jfrog.com/jira/browse/RTFACT-17004 -CVE-2018-1000206 - https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581 -CVE-2018-1000218 - https://github.com/openemr/openemr/issues/1781 -CVE-2018-1000219 - https://github.com/openemr/openemr/issues/1781 -CVE-2018-1000223 - https://gitlab.com/soundtouch/soundtouch/issues/6 -CVE-2018-1000225 - https://github.com/cobbler/cobbler/issues/1917 -CVE-2018-1000225 - https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/ -CVE-2018-1000226 - https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/ -CVE-2018-1000300 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1000300 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1000300 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000301 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1000301 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1000301 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000504 - https://advisories.dxw.com/advisories/ace-file-inclusion-redirection/ -CVE-2018-1000505 - https://advisories.dxw.com/advisories/csrf-in-tooltipy/ -CVE-2018-1000506 - https://advisories.dxw.com/advisories/csrf-metronet-tag-manager/ -CVE-2018-1000507 - https://advisories.dxw.com/advisories/csrf-wp-user-groups/ -CVE-2018-1000508 - https://advisories.dxw.com/advisories/stored-xss-wp-ulike/ -CVE-2018-1000509 - https://advisories.dxw.com/advisories/unserialization-redirection/ -CVE-2018-1000510 - https://advisories.dxw.com/advisories/wp-image-zoom-dos/ -CVE-2018-1000511 - https://advisories.dxw.com/advisories/wp-ulike-delete-rows/ -CVE-2018-1000512 - https://advisories.dxw.com/advisories/xss-in-tooltipy/ -CVE-2018-1000519 - https://github.com/aio-libs/aiohttp-session/issues/272 -CVE-2018-1000520 - https://github.com/ARMmbed/mbedtls/issues/1561 -CVE-2018-1000524 - https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 -CVE-2018-1000524 - https://github.com/fatcerberus/minisphere/pull/268 -CVE-2018-1000529 - https://github.com/martinfrancois/CVE-2018-1000529 -CVE-2018-1000534 - https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 -CVE-2018-1000534 - https://github.com/laurent22/joplin/issues/500 -CVE-2018-1000536 - https://github.com/luin/medis/issues/109 -CVE-2018-1000540 - https://github.com/oswetto/LoboEvolution/issues/38 -CVE-2018-1000542 - https://0dd.zone/2018/06/02/Netbeans-MMD-Plugin-XXE/ -CVE-2018-1000544 - https://access.redhat.com/errata/RHSA-2018:3466 -CVE-2018-1000544 - https://github.com/rubyzip/rubyzip/issues/369 -CVE-2018-1000546 - https://0dd.zone/2018/05/31/TripleA-XXE/ -CVE-2018-1000548 - http://0dd.zone/2018/04/23/UMLet-XXE/ -CVE-2018-1000548 - https://github.com/umlet/umlet/issues/500 -CVE-2018-1000611 - https://github.com/OpenConext/OpenConext-engineblock/pull/563/files -CVE-2018-1000613 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-1000613 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1000613 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-1000613 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000619 - https://drive.google.com/open?id=195h-LirGiIVKxioyusw3SvmLp8BljPxe -CVE-2018-1000621 - https://github.com/Nhoya/MycroftAI-RCE -CVE-2018-1000632 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-1000632 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1000632 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1000632 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1000638 - https://github.com/bg5sbk/MiniCMS/issues/20 -CVE-2018-1000653 - https://gist.github.com/Lz1y/3388fa886a3e10edd2a7e93d3c3e5b6c -CVE-2018-1000654 - https://gitlab.com/gnutls/libtasn1/issues/4 -CVE-2018-1000657 - https://github.com/rust-lang/rust/issues/44800 -CVE-2018-1000666 - https://medium.com/@vrico315/vulnerability-in-jumpscale-portal-7-a88098a1caca -CVE-2018-1000667 - https://bugzilla.nasm.us/show_bug.cgi?id=3392507 -CVE-2018-1000669 - https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=19117 -CVE-2018-1000670 - https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=19086 -CVE-2018-1000773 - https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ -CVE-2018-1000773 - https://youtu.be/GePBmsNJw6Y?t=1763 -CVE-2018-1000801 - https://bugs.kde.org/show_bug.cgi?id=398096 -CVE-2018-1000805 - https://access.redhat.com/errata/RHBA-2018:3497 -CVE-2018-1000811 - https://github.com/bludit/bludit/issues/812 -CVE-2018-1000811 - https://www.exploit-db.com/exploits/46060/ -CVE-2018-1000812 - https://cp270.wordpress.com/2018/05/14/war-story-password-resets/ -CVE-2018-1000812 - https://github.com/fleetcaptain/integria-takeover -CVE-2018-1000814 - https://github.com/aio-libs/aiohttp-session/issues/325 -CVE-2018-1000816 - https://github.com/grafana/grafana/issues/13667 -CVE-2018-1000826 - https://github.com/microweber/microweber/issues/489 -CVE-2018-1000839 - https://0dd.zone/2018/09/03/lh-ehr-RCE-via-picture-upload/ -CVE-2018-1000839 - https://github.com/LibreHealthIO/lh-ehr/issues/1223 -CVE-2018-1000840 - https://github.com/processing/processing/issues/5706 -CVE-2018-1000846 - https://github.com/funzoneq/freshdns/issues/7 -CVE-2018-1000851 - https://github.com/dominictarr/event-stream/issues/116 -CVE-2018-1000852 - https://usn.ubuntu.com/4379-1/ -CVE-2018-1000856 - https://github.com/domainmod/domainmod/issues/80 -CVE-2018-1000857 - https://www.halfdog.net/Security/2018/LogUserSessionLocalRootPrivilegeEscalation/ -CVE-2018-1000861 - http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html -CVE-2018-1000863 - https://www.tenable.com/security/research/tra-2018-43 -CVE-2018-1000869 - https://github.com/phpipam/phpipam/issues/2344 -CVE-2018-1000871 - https://www.exploit-db.com/exploits/45976 -CVE-2018-1000873 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1000873 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-1000873 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-1000874 - https://github.com/cebe/markdown/issues/166 -CVE-2018-1000874 - https://github.com/cebe/markdown/issues/166#issuecomment-508230493 -CVE-2018-1000881 - https://appcheck-ng.com/advisory-remote-code-execution-traccar-server/ -CVE-2018-1000885 - https://tech.feedyourhead.at/content/full-disclosure-remote-command-execution-in-phkp -CVE-2018-1000886 - https://bugzilla.nasm.us/show_bug.cgi?id=3392514 -CVE-2018-1000887 - https://github.com/advisto/peel-shopping/issues/1 -CVE-2018-1000888 - https://www.exploit-db.com/exploits/46108/ -CVE-2018-1000890 - https://github.com/FrontAccountingERP/FA/issues/37 -CVE-2018-1000890 - https://www.exploit-db.com/exploits/46037 -CVE-2018-1000998 - https://www.kvakil.me/posts/cvsweb/ -CVE-2018-10016 - https://bugzilla.nasm.us/show_bug.cgi?id=3392473 -CVE-2018-10018 - http://seclists.org/fulldisclosure/2018/Jul/55 -CVE-2018-10018 - https://www.exploit-db.com/exploits/45017/ -CVE-2018-1002000 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002001 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002002 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002003 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002004 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002005 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002006 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002007 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002008 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-1002009 - https://www.exploit-db.com/exploits/45434/ -CVE-2018-10021 - https://usn.ubuntu.com/3696-1/ -CVE-2018-1002100 - https://github.com/kubernetes/kubernetes/issues/61297 -CVE-2018-1002100 - https://hansmi.ch/articles/2018-04-openshift-s2i-security -CVE-2018-1002105 - https://github.com/evict/poc_CVE-2018-1002105 -CVE-2018-1002105 - https://www.exploit-db.com/exploits/46052/ -CVE-2018-1002105 - https://www.exploit-db.com/exploits/46053/ -CVE-2018-1002203 - https://hackerone.com/reports/362119 -CVE-2018-1002207 - https://github.com/mholt/archiver/pull/65 -CVE-2018-1002208 - https://github.com/icsharpcode/SharpZipLib/issues/232 -CVE-2018-10023 - https://github.com/xwlrbh/Catfish/issues/1 -CVE-2018-10024 - https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt -CVE-2018-10027 - https://pastebin.com/XHMeS7pQ -CVE-2018-10048 - https://pastebin.com/RVdpLAT8 -CVE-2018-10049 - https://pastebin.com/QbhRJp4q -CVE-2018-10050 - https://pastebin.com/UDEsFq3u -CVE-2018-10051 - https://pastebin.com/aQn3Cr2G -CVE-2018-10052 - https://pastebin.com/aeqYLK9u -CVE-2018-10054 - https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html -CVE-2018-10054 - https://www.exploit-db.com/exploits/44422/ -CVE-2018-10057 - http://www.openwall.com/lists/oss-security/2018/06/03/1 -CVE-2018-10057 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2018-10057 -CVE-2018-10058 - http://www.openwall.com/lists/oss-security/2018/06/03/1 -CVE-2018-10058 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2018-10058 -CVE-2018-10063 - https://www.exploit-db.com/exploits/44447/ -CVE-2018-10068 - https://www.exploit-db.com/exploits/44471/ -CVE-2018-10070 - http://packetstormsecurity.com/files/147183/MikroTik-6.41.4-Denial-Of-Service.html -CVE-2018-10070 - https://www.exploit-db.com/exploits/44450/ -CVE-2018-10077 - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html -CVE-2018-10077 - https://www.exploit-db.com/exploits/44493/ -CVE-2018-10078 - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html -CVE-2018-10078 - https://www.exploit-db.com/exploits/44493/ -CVE-2018-10079 - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html -CVE-2018-10079 - https://www.exploit-db.com/exploits/44493/ -CVE-2018-10080 - https://www.exploit-db.com/exploits/44393/ -CVE-2018-10081 - https://github.com/itodaro/cve/blob/master/README.md -CVE-2018-10082 - https://github.com/itodaro/cve/blob/master/README.md -CVE-2018-10083 - https://github.com/itodaro/cve/blob/master/README.md -CVE-2018-10084 - https://github.com/itodaro/cve/blob/master/README.md -CVE-2018-10085 - https://github.com/itodaro/cve/blob/master/README.md -CVE-2018-10086 - https://github.com/itodaro/cve/blob/master/README.md -CVE-2018-10087 - https://usn.ubuntu.com/3696-1/ -CVE-2018-10088 - https://github.com/bitfu/uc-httpd-1.0.0-buffer-overflow-exploit -CVE-2018-10088 - https://www.exploit-db.com/exploits/44864/ -CVE-2018-10091 - http://packetstormsecurity.com/files/151115/AudioCode-400HD-Cross-Site-scripting.html -CVE-2018-10092 - http://www.openwall.com/lists/oss-security/2018/05/21/2 -CVE-2018-10092 - https://sysdream.com/news/lab/2018-05-21-cve-2018-10092-dolibarr-admin-panel-authenticated-remote-code-execution-rce-vulnerability/ -CVE-2018-10093 - http://packetstormsecurity.com/files/151116/AudioCode-400HD-Remote-Command-Injection.html -CVE-2018-10093 - https://www.exploit-db.com/exploits/46164/ -CVE-2018-10094 - http://www.openwall.com/lists/oss-security/2018/05/21/1 -CVE-2018-10094 - https://sysdream.com/news/lab/2018-05-21-cve-2018-10094-dolibarr-sql-injection-vulnerability/ -CVE-2018-10094 - https://www.exploit-db.com/exploits/44805/ -CVE-2018-10095 - http://www.openwall.com/lists/oss-security/2018/05/21/3 -CVE-2018-10095 - https://sysdream.com/news/lab/2018-05-21-cve-2018-10095-dolibarr-xss-injection-vulnerability/ -CVE-2018-10097 - https://packetstormsecurity.com/files/146855/Domaintrader-2.5.3-Cross-Site-Scripting.html -CVE-2018-10099 - https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 -CVE-2018-10099 - https://www.reddit.com/r/netsec/comments/9yiidf/xssearching_googles_bug_tracker_to_find_out/ea2i7wz/ -CVE-2018-10106 - https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md -CVE-2018-10107 - https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md -CVE-2018-10108 - https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md -CVE-2018-10109 - https://www.exploit-db.com/exploits/44502/ -CVE-2018-1011 - http://www.securityfocus.com/bid/103611 -CVE-2018-10110 - http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html -CVE-2018-10110 - https://www.exploit-db.com/exploits/44473/ -CVE-2018-10111 - https://github.com/xiaoqx/pocs/tree/master/gegl -CVE-2018-10112 - https://bugzilla.gnome.org/show_bug.cgi?id=795249 -CVE-2018-10112 - https://github.com/xiaoqx/pocs/tree/master/gegl -CVE-2018-10113 - https://github.com/xiaoqx/pocs/tree/master/gegl -CVE-2018-10114 - https://bugzilla.gnome.org/show_bug.cgi?id=795248 -CVE-2018-10114 - https://github.com/xiaoqx/pocs/tree/master/gegl -CVE-2018-10118 - https://www.exploit-db.com/exploits/44855/ -CVE-2018-10122 - https://github.com/goodrain-apps/chanzhieps/issues/1 -CVE-2018-10123 - https://neonsea.uk/blog/2018/04/15/pwn910nd.html -CVE-2018-10123 - https://www.exploit-db.com/exploits/44635/ -CVE-2018-10124 - https://usn.ubuntu.com/3696-1/ -CVE-2018-10126 - http://bugzilla.maptools.org/show_bug.cgi?id=2786 -CVE-2018-10132 - https://github.com/vQAQv/Request-CVE-ID-PoC/blob/master/PbootCMS/v0.9.8/CSRF.md -CVE-2018-10133 - https://github.com/vQAQv/Request-CVE-ID-PoC/blob/master/PbootCMS/v0.9.8/Getshll.md -CVE-2018-10135 - https://pastebin.com/vVN00qRh -CVE-2018-10136 - https://pastebin.com/TCEWRZEd -CVE-2018-10137 - https://pastebin.com/TCEWRZEd -CVE-2018-10138 - https://cxsecurity.com/issue/WLB-2018040120 -CVE-2018-10143 - https://doddsecurity.com/234/command-injection-on-palo-alto-networks-expedition/ -CVE-2018-10164 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities -CVE-2018-10165 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities -CVE-2018-10166 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities -CVE-2018-10167 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities -CVE-2018-10168 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities -CVE-2018-10173 - http://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html -CVE-2018-10174 - http://packetstormsecurity.com/files/147260/Digital-Guardian-Management-Console-7.1.2.0015-Server-Side-Request-Forgery.html -CVE-2018-10175 - http://packetstormsecurity.com/files/147261/Digital-Guardian-Management-Console-7.1.2.0015-XXE-Injection.html -CVE-2018-10176 - http://packetstormsecurity.com/files/147242/Digital-Guardian-Management-Console-7.1.2.0015-Arbitrary-File-Read.html -CVE-2018-10177 - https://github.com/ImageMagick/ImageMagick/issues/1095 -CVE-2018-1018 - http://www.securityfocus.com/bid/103610 -CVE-2018-10183 - https://github.com/bigtreecms/BigTree-CMS/issues/333 -CVE-2018-10185 - https://github.com/yeyinshi/tuzicms/issues/1 -CVE-2018-10186 - https://github.com/radare/radare2/issues/9915 -CVE-2018-10187 - https://github.com/radare/radare2/issues/9913 -CVE-2018-10188 - https://www.exploit-db.com/exploits/44496/ -CVE-2018-10191 - https://github.com/mruby/mruby/issues/3995 -CVE-2018-10193 - https://www.youtube.com/watch?v=wTcYWZwq3TE -CVE-2018-10197 - http://seclists.org/fulldisclosure/2018/Jul/29 -CVE-2018-1020 - http://www.securityfocus.com/bid/103612 -CVE-2018-10201 - http://www.kwell.net/kwell_blog/?p=5199 -CVE-2018-10201 - https://www.exploit-db.com/exploits/44497/ -CVE-2018-10221 - https://github.com/wuzhicms/wuzhicms/issues/129 -CVE-2018-10223 - https://github.com/yzmcms/yzmcms/issues/1 -CVE-2018-10224 - https://github.com/yzmcms/yzmcms/issues/2 -CVE-2018-10227 - https://github.com/bg5sbk/MiniCMS/issues/15 -CVE-2018-10233 - https://wpvulndb.com/vulnerabilities/9611 -CVE-2018-10235 - https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-10.md -CVE-2018-10236 - https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-18.md -CVE-2018-10237 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-10237 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-10237 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-10237 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-10241 - https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service/ -CVE-2018-10248 - https://github.com/wuzhicms/wuzhicms/issues/130 -CVE-2018-10249 - https://crayon-xin.github.io/2018/04/20/baijiacmsV3-CSRF-add-admin/ -CVE-2018-10252 - https://actiontecsupport.zendesk.com/hc/en-us/articles/115000432163-WCB6200Q-Firmware-Upgrade -CVE-2018-10253 - https://www.exploit-db.com/exploits/44500/ -CVE-2018-10254 - https://sourceforge.net/p/nasm/bugs/561/ -CVE-2018-10255 - http://packetstormsecurity.com/files/147363/Blog-Master-Pro-1.0-CSV-Injection.html -CVE-2018-10255 - https://www.exploit-db.com/exploits/44535/ -CVE-2018-10256 - http://packetstormsecurity.com/files/147366/HRSALE-The-Ultimate-HRM-1.0.2-SQL-Injection.html -CVE-2018-10256 - https://www.exploit-db.com/exploits/44537/ -CVE-2018-10257 - http://packetstormsecurity.com/files/147364/HRSALE-The-Ultimate-HRM-1.0.2-CSV-Injection.html -CVE-2018-10257 - https://www.exploit-db.com/exploits/44536/ -CVE-2018-10258 - http://packetstormsecurity.com/files/147362/Shopy-Point-Of-Sale-1.0-CSV-Injection.html -CVE-2018-10258 - https://www.exploit-db.com/exploits/44534/ -CVE-2018-10259 - http://packetstormsecurity.com/files/147383/HRSALE-The-Ultimate-HRM-1.0.2-Cross-Site-Scripting.html -CVE-2018-10259 - https://www.exploit-db.com/exploits/44538/ -CVE-2018-1026 - http://www.securityfocus.com/bid/103613 -CVE-2018-10260 - http://packetstormsecurity.com/files/147382/HRSALE-The-Ultimate-HRM-1.0.2-Local-File-Inclusion.html -CVE-2018-10260 - https://www.exploit-db.com/exploits/44539/ -CVE-2018-10266 - https://github.com/source-trace/beescms/issues/1 -CVE-2018-1027 - http://www.securityfocus.com/bid/103616 -CVE-2018-10285 - https://www.exploit-db.com/exploits/44515/ -CVE-2018-10286 - https://www.exploit-db.com/exploits/44515/ -CVE-2018-10289 - https://bugs.ghostscript.com/show_bug.cgi?id=699271 -CVE-2018-1029 - http://www.securityfocus.com/bid/103617 -CVE-2018-10294 - http://seclists.org/fulldisclosure/2018/May/3 -CVE-2018-10295 - https://github.com/chemcms/ChemCMS/issues/1 -CVE-2018-10299 - https://medium.com/secbit-media/a-disastrous-vulnerability-found-in-smart-contracts-of-beautychain-bec-dbf24ddbc30e -CVE-2018-10299 - https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/ -CVE-2018-10300 - https://medium.com/@squeal/wd-instagram-feed-1-3-0-xss-vulnerabilities-cve-2018-10300-and-cve-2018-10301-7173ffc4c271 -CVE-2018-10300 - https://wpvulndb.com/vulnerabilities/9393 -CVE-2018-10301 - https://medium.com/@squeal/wd-instagram-feed-1-3-0-xss-vulnerabilities-cve-2018-10300-and-cve-2018-10301-7173ffc4c271 -CVE-2018-10301 - https://wpvulndb.com/vulnerabilities/9393 -CVE-2018-10309 - https://gist.github.com/B0UG/f0cfb356e23be3cd6ebea69566d6100a -CVE-2018-10309 - https://wpvulndb.com/vulnerabilities/9067 -CVE-2018-10309 - https://www.exploit-db.com/exploits/44563/ -CVE-2018-10310 - http://packetstormsecurity.com/files/147333/WordPress-UK-Cookie-Consent-2.3.9-Cross-Site-Scripting.html -CVE-2018-10310 - https://gist.github.com/B0UG/9732614abccaf2893c352d14c822d07b -CVE-2018-10310 - https://www.exploit-db.com/exploits/44503/ -CVE-2018-10311 - https://github.com/wuzhicms/wuzhicms/issues/131 -CVE-2018-10311 - https://www.exploit-db.com/exploits/44618/ -CVE-2018-10312 - https://github.com/wuzhicms/wuzhicms/issues/132 -CVE-2018-10312 - https://www.exploit-db.com/exploits/44504/ -CVE-2018-10313 - https://github.com/wuzhicms/wuzhicms/issues/133 -CVE-2018-10313 - https://www.exploit-db.com/exploits/44617/ -CVE-2018-10314 - https://docs.google.com/document/d/1lUHMAOnbQUfh_yBGdBB1x9n0QdVGeP9Tggu9auqpXNo/edit?usp=sharing -CVE-2018-10314 - https://www.exploit-db.com/exploits/44613/ -CVE-2018-10316 - https://bugzilla.nasm.us/show_bug.cgi?id=3392474 -CVE-2018-10318 - https://github.com/philippe/FrogCMS/issues/6 -CVE-2018-10321 - https://www.exploit-db.com/exploits/44551/ -CVE-2018-10322 - https://bugzilla.kernel.org/show_bug.cgi?id=199377 -CVE-2018-10323 - https://bugzilla.kernel.org/show_bug.cgi?id=199423 -CVE-2018-10361 - http://www.openwall.com/lists/oss-security/2018/04/24/1 -CVE-2018-10361 - https://bugzilla.suse.com/show_bug.cgi?id=1033055 -CVE-2018-10363 - https://gist.github.com/B0UG/68d3161af0c0ec85c615ca7452f9755e -CVE-2018-10365 - https://www.exploit-db.com/exploits/44547/ -CVE-2018-10366 - https://www.exploit-db.com/exploits/44546/ -CVE-2018-10369 - https://medium.com/@julianpedrobraga/router-hacking-destrinchando-o-elo-mais-fraco-de-uma-rede-4d0e7fcfbd9e -CVE-2018-10371 - https://gist.github.com/B0UG/8615df3fe83a4deca07334af783696d6 -CVE-2018-10371 - https://wpvulndb.com/vulnerabilities/9080 -CVE-2018-10371 - https://www.exploit-db.com/exploits/44585/ -CVE-2018-10376 - https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/ -CVE-2018-10377 - https://hackerone.com/reports/337680 -CVE-2018-10377 - https://integritylabs.io/advisories/cve-2018-10377 -CVE-2018-1038 - https://blog.xpnsec.com/total-meltdown-cve-2018-1038/ -CVE-2018-1038 - https://www.exploit-db.com/exploits/44581/ -CVE-2018-10391 - https://github.com/wuzhicms/wuzhicms/issues/134 -CVE-2018-10403 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-10404 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-10405 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-10406 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-10407 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-10408 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-1041 - https://www.exploit-db.com/exploits/44099/ -CVE-2018-1042 - http://packetstormsecurity.com/files/153766/Moodle-Filepicker-3.5.2-Server-Side-Request-Forgery.html -CVE-2018-10425 - https://github.com/rebol0x6c/2345poc -CVE-2018-10428 - http://packetstormsecurity.com/files/147726/ILIAS-5.3.2-5.2.14-5.1.25-Cross-Site-Scripting.html -CVE-2018-10428 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-007.txt -CVE-2018-1043 - https://moodle.org/mod/forum/discuss.php?d=364382 -CVE-2018-10470 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-1050 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-10503 - https://github.com/monburan/attack-baijiacmsV4-with-csrf -CVE-2018-10504 - https://www.exploit-db.com/exploits/44559/ -CVE-2018-10507 - http://hyp3rlinx.altervista.org/advisories/TRENDMICRO-OFFICESCAN-XG-v11.0-UNAUTHORIZED-CHANGE-PREVENTION-SERVICE-BYPASS.txt -CVE-2018-10507 - https://www.exploit-db.com/exploits/44858/ -CVE-2018-10515 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10516 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10517 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10517 - https://www.exploit-db.com/exploits/45793/ -CVE-2018-10518 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10519 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10520 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10521 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10522 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10523 - https://github.com/itodaro/cmsms_cve/blob/master/README.md -CVE-2018-10528 - https://github.com/LibRaw/LibRaw/issues/144 -CVE-2018-10529 - https://github.com/LibRaw/LibRaw/issues/144 -CVE-2018-10532 - https://www.theregister.co.uk/2018/10/26/ee_4gee_hh70_ssh_backdoor/ -CVE-2018-10536 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-10537 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-10538 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-10539 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-10540 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-10546 - https://hackerone.com/reports/505278 -CVE-2018-10548 - https://bugs.php.net/bug.php?id=76248 -CVE-2018-10549 - https://hackerone.com/reports/344035 -CVE-2018-10553 - http://code610.blogspot.com/2018/04/few-bugs-in-latest-nagios-xi-5413.html -CVE-2018-10554 - http://code610.blogspot.com/2018/04/few-bugs-in-latest-nagios-xi-5413.html -CVE-2018-1056 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270 -CVE-2018-1056 - https://sourceforge.net/p/advancemame/bugs/259/ -CVE-2018-10561 - https://www.exploit-db.com/exploits/44576/ -CVE-2018-10562 - https://www.exploit-db.com/exploits/44576/ -CVE-2018-10563 - http://seclists.org/fulldisclosure/2018/May/4 -CVE-2018-10565 - http://seclists.org/fulldisclosure/2018/May/6 -CVE-2018-10566 - http://seclists.org/fulldisclosure/2018/May/7 -CVE-2018-10569 - https://youtu.be/6d4BPbvddkE -CVE-2018-10569 - https://youtu.be/m2to4PWmHkI -CVE-2018-10575 - https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy -CVE-2018-10575 - https://www.exploit-db.com/exploits/45409/ -CVE-2018-10576 - https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy -CVE-2018-10576 - https://www.exploit-db.com/exploits/45409/ -CVE-2018-10577 - https://www.exploit-db.com/exploits/45409/ -CVE-2018-10580 - http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html -CVE-2018-10580 - https://www.exploit-db.com/exploits/44608/ -CVE-2018-10583 - http://seclists.org/fulldisclosure/2020/Oct/26 -CVE-2018-10583 - http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/ -CVE-2018-10583 - https://www.exploit-db.com/exploits/44564/ -CVE-2018-1059 - https://usn.ubuntu.com/3642-2/ -CVE-2018-10594 - https://www.exploit-db.com/exploits/44965/ -CVE-2018-10594 - https://www.exploit-db.com/exploits/45574/ -CVE-2018-1060 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-10607 - http://martem.eu/csa/Martem_CSA_Telem_1805184.pdf -CVE-2018-10608 - http://packetstormsecurity.com/files/152951/SEL-AcSELerator-Architect-2.2.24-Denial-Of-Service.html -CVE-2018-10618 - https://www.exploit-db.com/exploits/45076/ -CVE-2018-10619 - https://www.exploit-db.com/exploits/44892/ -CVE-2018-10641 - https://advancedpersistentsecurity.net/cve-2018-10641/ -CVE-2018-10641 - https://gist.github.com/jocephus/806ff4679cf54af130d69777a551f819 -CVE-2018-10642 - https://github.com/arbahayoub/POC/blob/master/itop_command_injection_1.txt -CVE-2018-10642 - https://sourceforge.net/p/itop/tickets/1585/ -CVE-2018-10653 - http://packetstormsecurity.com/files/156037/Citrix-XenMobile-Server-10.8-XML-Injection.html -CVE-2018-10655 - http://hyp3rlinx.altervista.org/advisories/DEVICELOCK-PLUG-PLAY-AUDITOR-v5.72-UNICODE-BUFFER-OVERFLOW.txt -CVE-2018-10655 - http://packetstormsecurity.com/files/147516/DeviceLock-Plug-And-Play-Auditor-5.72-Buffer-Overflow.html -CVE-2018-10655 - https://www.exploit-db.com/exploits/44590/ -CVE-2018-10658 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10659 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10660 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10660 - https://www.exploit-db.com/exploits/45100/ -CVE-2018-10661 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10661 - https://www.exploit-db.com/exploits/45100/ -CVE-2018-10662 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10662 - https://www.exploit-db.com/exploits/45100/ -CVE-2018-10663 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10664 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -CVE-2018-10666 - https://medium.com/@jonghyk.song/aurora-idex-membership-idxm-erc20-token-allows-attackers-to-acquire-contract-ownership-1ff426cee7c6 -CVE-2018-10675 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-10675 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-10682 - https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt -CVE-2018-10683 - https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt -CVE-2018-10685 - https://github.com/ckolivas/lrzip/issues/95 -CVE-2018-10686 - https://medium.com/@ndrbasi/cve-2018-10686-vestacp-rce-d96d95c2bde2 -CVE-2018-10690 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10690 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10691 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10691 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10692 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10692 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10693 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10693 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10694 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10694 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10695 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10695 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10696 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10696 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10697 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10697 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10698 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10698 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10699 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10699 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10700 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10700 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10701 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10701 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10702 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10702 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10703 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -CVE-2018-10703 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -CVE-2018-10709 - https://www.exploit-db.com/exploits/45716/ -CVE-2018-10710 - https://www.exploit-db.com/exploits/45716/ -CVE-2018-10711 - https://www.exploit-db.com/exploits/45716/ -CVE-2018-10712 - https://www.exploit-db.com/exploits/45716/ -CVE-2018-10716 - https://github.com/rebol0x6c/2345_msg_poc -CVE-2018-10718 - https://github.com/momo5502/cod-exploit -CVE-2018-10718 - https://momo5502.com/blog/?p=34 -CVE-2018-10718 - https://www.exploit-db.com/exploits/44987/ -CVE-2018-10733 - https://bugzilla.redhat.com/show_bug.cgi?id=1574844 -CVE-2018-10734 - https://github.com/hucmosin/Python_Small_Tool/blob/master/other/DVR_POC.py -CVE-2018-10751 - http://packetstormsecurity.com/files/147841/Samsung-Galaxy-S7-Edge-OMACP-WbXml-String-Extension-Processing-Overflow.html -CVE-2018-10751 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-10751 - https://www.exploit-db.com/exploits/44724/ -CVE-2018-10752 - https://pastebin.com/ZGr5tyP2 -CVE-2018-10752 - https://www.exploit-db.com/exploits/45225/ -CVE-2018-10753 - https://github.com/leesavide/abcm2ps/issues/16 -CVE-2018-10757 - https://packetstormsecurity.com/files/147501/cspmysqlum231-sql.txt -CVE-2018-10757 - https://www.exploit-db.com/exploits/44589/ -CVE-2018-10763 - http://packetstormsecurity.com/files/149324/SynaMan-4.0-Build-1488-Cross-Site-Scripting.html -CVE-2018-10763 - https://www.exploit-db.com/exploits/45386/ -CVE-2018-10767 - https://bugzilla.redhat.com/show_bug.cgi?id=1575188 -CVE-2018-10768 - https://bugs.freedesktop.org/show_bug.cgi?id=106408 -CVE-2018-10772 - https://bugzilla.redhat.com/show_bug.cgi?id=1566260 -CVE-2018-10773 - https://docs.google.com/document/d/1k598A16gV9HPwFXnYkyrPwoRbnbFX6LAMRyzb_dxLCM/edit -CVE-2018-10775 - https://drive.google.com/drive/u/1/folders/1qtq272m7jJaEUPGFLvyXmIl5zNJv7rd1 -CVE-2018-10779 - http://bugzilla.maptools.org/show_bug.cgi?id=2788 -CVE-2018-10779 - https://usn.ubuntu.com/3906-1/ -CVE-2018-10780 - https://bugzilla.redhat.com/show_bug.cgi?id=1575201 -CVE-2018-10790 - https://docs.google.com/document/d/1OSwQjtyALgV3OulmWGaTqZrSzk7Ta-xGrcLI0I7SPyM -CVE-2018-10790 - https://github.com/axiomatic-systems/Bento4/issues/390 -CVE-2018-10795 - https://cxsecurity.com/issue/WLB-2018050029 -CVE-2018-10796 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222014 -CVE-2018-10801 - http://bugzilla.maptools.org/show_bug.cgi?id=2790 -CVE-2018-10806 - https://github.com/philippe/FrogCMS/issues/10 -CVE-2018-10809 - http://packetstormsecurity.com/files/147538/2345-Security-Guard-3.7-Denial-Of-Service.html -CVE-2018-10809 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222040 -CVE-2018-10809 - https://www.exploit-db.com/exploits/44600/ -CVE-2018-10814 - http://packetstormsecurity.com/files/149326/SynaMan-40-Build-1488-SMTP-Credential-Disclosure.html -CVE-2018-10814 - https://www.exploit-db.com/exploits/45387/ -CVE-2018-10822 - http://sploit.tech/2018/10/12/D-Link.html -CVE-2018-10822 - https://seclists.org/fulldisclosure/2018/Oct/36 -CVE-2018-10823 - http://sploit.tech/2018/10/12/D-Link.html -CVE-2018-10823 - https://seclists.org/fulldisclosure/2018/Oct/36 -CVE-2018-10824 - http://sploit.tech/2018/10/12/D-Link.html -CVE-2018-10824 - https://seclists.org/fulldisclosure/2018/Oct/36 -CVE-2018-10828 - https://www.exploit-db.com/exploits/44610/ -CVE-2018-10830 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220e0 -CVE-2018-10830 - https://www.exploit-db.com/exploits/44615/ -CVE-2018-10832 - http://packetstormsecurity.com/files/147573/ModbusPal-1.6b-XML-External-Entity-Injection.html -CVE-2018-10832 - https://www.exploit-db.com/exploits/44607/ -CVE-2018-10853 - https://usn.ubuntu.com/3777-1/ -CVE-2018-10858 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2018-10858 - https://usn.ubuntu.com/3738-1/ -CVE-2018-1087 - http://www.openwall.com/lists/oss-security/2018/05/08/5 -CVE-2018-10872 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-10872 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-10876 - https://bugzilla.kernel.org/show_bug.cgi?id=199403 -CVE-2018-10876 - https://usn.ubuntu.com/3753-2/ -CVE-2018-10877 - https://usn.ubuntu.com/3753-2/ -CVE-2018-10878 - https://bugzilla.kernel.org/show_bug.cgi?id=199865 -CVE-2018-10878 - https://usn.ubuntu.com/3753-2/ -CVE-2018-10879 - https://bugzilla.kernel.org/show_bug.cgi?id=200001 -CVE-2018-10879 - https://usn.ubuntu.com/3753-2/ -CVE-2018-10880 - https://bugzilla.kernel.org/show_bug.cgi?id=200005 -CVE-2018-10880 - https://usn.ubuntu.com/3821-1/ -CVE-2018-10880 - https://usn.ubuntu.com/3821-2/ -CVE-2018-10881 - https://bugzilla.kernel.org/show_bug.cgi?id=200015 -CVE-2018-10881 - https://usn.ubuntu.com/3753-2/ -CVE-2018-10882 - https://bugzilla.kernel.org/show_bug.cgi?id=200069 -CVE-2018-10882 - https://usn.ubuntu.com/3753-2/ -CVE-2018-10897 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-10900 - https://www.exploit-db.com/exploits/45313/ -CVE-2018-10901 - https://access.redhat.com/errata/RHSA-2018:2393 -CVE-2018-10901 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-10901 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-10903 - https://usn.ubuntu.com/3720-1/ -CVE-2018-10906 - https://www.exploit-db.com/exploits/45106/ -CVE-2018-10918 - https://usn.ubuntu.com/3738-1/ -CVE-2018-10919 - https://usn.ubuntu.com/3738-1/ -CVE-2018-1093 - https://bugzilla.kernel.org/show_bug.cgi?id=199181 -CVE-2018-10933 - https://www.exploit-db.com/exploits/45638/ -CVE-2018-10933 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1094 - https://bugzilla.kernel.org/show_bug.cgi?id=199183 -CVE-2018-10946 - https://support.polycom.com/PolycomService/home/home.htm -CVE-2018-10947 - https://support.polycom.com/PolycomService/home/home.htm -CVE-2018-1095 - https://bugzilla.kernel.org/show_bug.cgi?id=199185 -CVE-2018-10952 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222088 -CVE-2018-10953 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x0022204C -CVE-2018-10954 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222550 -CVE-2018-10955 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222548 -CVE-2018-10956 - http://packetstormsecurity.com/files/148274/IPConfigure-Orchid-VMS-2.0.5-Directory-Traversal-Information-Disclosure.html -CVE-2018-10956 - https://www.exploit-db.com/exploits/44916/ -CVE-2018-10957 - https://packetstormsecurity.com/files/147525/D-Link-DIR-868L-1.12-Cross-Site-Request-Forgery.html -CVE-2018-10958 - https://github.com/Exiv2/exiv2/issues/302 -CVE-2018-10962 - https://github.com/rebol0x6c/2345_mouse_poc -CVE-2018-10963 - http://bugzilla.maptools.org/show_bug.cgi?id=2795 -CVE-2018-10969 - https://www.exploit-db.com/exploits/44867/ -CVE-2018-10971 - https://github.com/FLIF-hub/FLIF/issues/501 -CVE-2018-10972 - https://github.com/FLIF-hub/FLIF/issues/503 -CVE-2018-10974 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222100 -CVE-2018-10975 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222104 -CVE-2018-10976 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222050 -CVE-2018-10977 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220E4 -CVE-2018-1098 - https://github.com/coreos/etcd/issues/9353 -CVE-2018-10989 - https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c -CVE-2018-1099 - https://github.com/coreos/etcd/issues/9353 -CVE-2018-10990 - https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c -CVE-2018-10997 - https://gist.github.com/dmblbc/14a77036a9562407194c3cf3ee3f265e -CVE-2018-10998 - https://github.com/Exiv2/exiv2/issues/303 -CVE-2018-10999 - https://github.com/Exiv2/exiv2/issues/306 -CVE-2018-11005 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11006 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11007 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11008 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11009 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11010 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11013 - https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/ -CVE-2018-11017 - https://docs.google.com/document/d/18lJc_F5p3HPaMwsUAIwP0zMMhwJs-Snhuj05nhMIgAw/edit -CVE-2018-11018 - https://github.com/zhaoheng521/PbootCMS/blob/master/V1.0.7%20csrf -CVE-2018-11019 - https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11019.md -CVE-2018-11020 - https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11020.md -CVE-2018-11021 - https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11021.md -CVE-2018-11023 - https://github.com/datadancer/HIAFuzz/blob/master/CVEs.md -CVE-2018-11024 - https://github.com/datadancer/HIAFuzz/blob/master/CVEs.md -CVE-2018-11033 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=40842 -CVE-2018-11034 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NsProtect.sys-x64-0x8000200D -CVE-2018-11034 - https://www.exploit-db.com/exploits/44619/ -CVE-2018-11035 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NsProtect.sys-x64-0x80002019 -CVE-2018-11037 - https://github.com/Exiv2/exiv2/issues/307 -CVE-2018-11039 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-11039 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11039 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11039 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-11039 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11040 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-11040 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11040 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11040 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-11040 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11049 - http://seclists.org/fulldisclosure/2018/Jul/23 -CVE-2018-11052 - http://seclists.org/fulldisclosure/2018/Jul/1 -CVE-2018-11054 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11054 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11054 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11054 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-11055 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11055 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11055 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11055 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-11056 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11056 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11056 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11056 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-11057 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11057 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11057 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11057 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-11058 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11058 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11058 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11058 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-1106 - http://www.openwall.com/lists/oss-security/2018/04/23/3 -CVE-2018-11066 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html -CVE-2018-11067 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html -CVE-2018-11073 - https://seclists.org/fulldisclosure/2018/Sep/39 -CVE-2018-11074 - https://seclists.org/fulldisclosure/2018/Sep/39 -CVE-2018-11075 - https://seclists.org/fulldisclosure/2018/Sep/39 -CVE-2018-11076 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html -CVE-2018-11077 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html -CVE-2018-1109 - https://snyk.io/vuln/npm:braces:20180219 -CVE-2018-11090 - http://seclists.org/fulldisclosure/2018/May/32 -CVE-2018-11090 - https://www.sec-consult.com/en/blog/advisories/arbitrary-file-upload-cross-site-scripting-in-mybiz-myprocurenet/ -CVE-2018-11091 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html -CVE-2018-11091 - http://seclists.org/fulldisclosure/2018/May/32 -CVE-2018-11091 - https://www.sec-consult.com/en/blog/advisories/arbitrary-file-upload-cross-site-scripting-in-mybiz-myprocurenet/ -CVE-2018-11092 - https://www.exploit-db.com/exploits/44624/ -CVE-2018-11094 - https://blog.kos-lab.com/Hello-World/ -CVE-2018-11094 - https://www.exploit-db.com/exploits/44637/ -CVE-2018-11096 - https://www.exploit-db.com/exploits/44628/ -CVE-2018-11102 - https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit -CVE-2018-1111 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-1111 - https://www.exploit-db.com/exploits/44652/ -CVE-2018-1111 - https://www.exploit-db.com/exploits/44890/ -CVE-2018-11124 - https://docs.google.com/document/d/1dJP1CQupHGXjsMWthgPGepOkcnxYA4mDfdjOE46nrhM/edit?usp=sharing -CVE-2018-11124 - https://www.exploit-db.com/exploits/45053/ -CVE-2018-11126 - https://github.com/doorgets/CMS/issues/11 -CVE-2018-11132 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11133 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11134 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11135 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11136 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11137 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11138 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11138 - https://www.exploit-db.com/exploits/44950/ -CVE-2018-11139 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11140 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11141 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11142 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -CVE-2018-11143 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11143 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11143 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11144 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11144 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11144 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11145 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11145 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11145 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11146 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11146 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11146 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11147 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11147 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11147 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11148 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11148 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11148 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11149 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11149 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11149 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11150 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11150 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11150 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11151 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11151 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11151 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11152 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11152 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11152 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11153 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11153 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11153 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11154 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11154 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11154 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11155 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11155 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11155 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11156 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11156 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11156 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11157 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11157 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11157 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11158 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11158 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11158 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11159 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11159 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11159 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11160 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11160 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11160 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11161 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11161 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11161 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11162 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11162 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11162 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11163 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11163 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11163 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11164 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11164 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11164 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11165 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11165 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11165 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11166 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11166 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11166 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11167 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11167 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11167 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11168 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11168 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11168 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11169 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11169 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11169 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11170 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11170 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11170 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11171 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11171 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11171 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11172 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11172 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11172 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11173 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11173 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11173 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11174 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11174 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11174 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11175 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11175 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11175 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11176 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11176 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11176 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11177 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11177 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11177 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11178 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11178 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11178 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11179 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11179 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11179 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11180 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11180 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11180 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11181 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11181 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11181 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11182 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11182 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11182 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11183 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11183 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11183 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11184 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11184 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11184 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11185 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11185 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11185 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11186 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11186 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11186 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11187 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11187 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11187 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11188 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11188 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11188 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11189 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11189 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11189 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11190 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11190 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11190 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11191 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11191 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11191 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11192 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11192 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11192 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11193 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11193 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11193 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11194 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -CVE-2018-11194 - http://seclists.org/fulldisclosure/2018/May/71 -CVE-2018-11194 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -CVE-2018-11195 - https://bugs.launchpad.net/mahara/+bug/1770561 -CVE-2018-1120 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1120 - https://www.exploit-db.com/exploits/44806/ -CVE-2018-11202 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 -CVE-2018-11203 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 -CVE-2018-11204 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 -CVE-2018-11205 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 -CVE-2018-11206 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 -CVE-2018-11207 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5#divided-by-zero---divbyzero__h5d_chunk_poc -CVE-2018-11207 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 -CVE-2018-11208 - https://github.com/zblogcn/zblogphp/issues/187 -CVE-2018-11209 - https://github.com/zblogcn/zblogphp/issues/188 -CVE-2018-1121 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1121 - https://www.exploit-db.com/exploits/44806/ -CVE-2018-1121 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -CVE-2018-11212 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-11212 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11218 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES -CVE-2018-11219 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES -CVE-2018-1122 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1122 - https://www.exploit-db.com/exploits/44806/ -CVE-2018-1122 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -CVE-2018-11220 - https://www.exploit-db.com/exploits/44779/ -CVE-2018-11227 - https://github.com/monstra-cms/monstra/issues -CVE-2018-11227 - https://www.exploit-db.com/exploits/44646 -CVE-2018-1123 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1123 - https://www.exploit-db.com/exploits/44806/ -CVE-2018-1123 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -CVE-2018-11232 - https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.2 -CVE-2018-11233 - https://marc.info/?l=git&m=152761328506724&w=2 -CVE-2018-11235 - https://marc.info/?l=git&m=152761328506724&w=2 -CVE-2018-11235 - https://www.exploit-db.com/exploits/44822/ -CVE-2018-11237 - https://www.exploit-db.com/exploits/44750/ -CVE-2018-1124 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1124 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-1124 - https://usn.ubuntu.com/3658-2/ -CVE-2018-1124 - https://www.exploit-db.com/exploits/44806/ -CVE-2018-1124 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -CVE-2018-11242 - https://www.exploit-db.com/exploits/44690/ -CVE-2018-11243 - https://github.com/upx/upx/issues/206 -CVE-2018-11243 - https://github.com/upx/upx/issues/207 -CVE-2018-11244 - https://wpvulndb.com/vulnerabilities/9087 -CVE-2018-11245 - https://zigrin.com/advisories/misp-xss-with-cortex-type-attributes/ -CVE-2018-11246 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-11247 - http://seclists.org/fulldisclosure/2018/Aug/11 -CVE-2018-1125 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1125 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -CVE-2018-11254 - https://bugzilla.redhat.com/show_bug.cgi?id=1576174 -CVE-2018-11255 - https://bugzilla.redhat.com/show_bug.cgi?id=1575502 -CVE-2018-11256 - https://bugzilla.redhat.com/show_bug.cgi?id=1575851 -CVE-2018-11257 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11258 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11259 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1126 - http://seclists.org/oss-sec/2018/q2/122 -CVE-2018-1126 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-1126 - https://usn.ubuntu.com/3658-2/ -CVE-2018-1126 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -CVE-2018-11264 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11267 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11268 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11269 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11271 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11271 -CVE-2018-11277 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11279 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11284 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11285 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11287 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11288 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11289 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1129 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2018-11290 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11291 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11292 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1130 - https://usn.ubuntu.com/3698-1/ -CVE-2018-1130 - https://usn.ubuntu.com/3698-2/ -CVE-2018-11305 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11307 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2018-11307 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11307 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11307 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-11311 - https://www.exploit-db.com/exploits/44656/ -CVE-2018-11314 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -CVE-2018-11315 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -CVE-2018-11316 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -CVE-2018-1132 - https://www.exploit-db.com/exploits/44747/ -CVE-2018-1133 - https://www.exploit-db.com/exploits/46551/ -CVE-2018-11332 - https://www.exploit-db.com/exploits/44775/ -CVE-2018-11335 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-11339 - https://www.exploit-db.com/exploits/44691/ -CVE-2018-11340 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11341 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11342 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11343 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11344 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11345 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11346 - http://seclists.org/fulldisclosure/2018/May/2 -CVE-2018-11347 - https://www.bishopfox.com/news/2018/10/yunohost-2-7-2-to-2-7-14-multiple-vulnerabilities/ -CVE-2018-11348 - https://www.bishopfox.com/news/2018/10/yunohost-2-7-2-to-2-7-14-multiple-vulnerabilities/ -CVE-2018-11363 - https://github.com/ChijinZ/security_advisories/tree/master/PDFgen-206ef1b -CVE-2018-11366 - https://wpvulndb.com/vulnerabilities/9088 -CVE-2018-11371 - https://github.com/zorlan/skycaiji/issues/9 -CVE-2018-11372 - https://github.com/hi-KK/CVE-Hunter/blob/master/1.md -CVE-2018-11373 - https://github.com/hi-KK/CVE-Hunter/blob/master/2.md -CVE-2018-1139 - https://usn.ubuntu.com/3738-1/ -CVE-2018-11392 - http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Shell-Upload.html -CVE-2018-11396 - https://bugzilla.gnome.org/show_bug.cgi?id=795740 -CVE-2018-11403 - https://www.exploit-db.com/exploits/44782/ -CVE-2018-11404 - https://www.exploit-db.com/exploits/44783/ -CVE-2018-11405 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/256 -CVE-2018-11409 - https://github.com/kofa2002/splunk -CVE-2018-11409 - https://www.exploit-db.com/exploits/44865/ -CVE-2018-1141 - https://www.tenable.com/security/tns-2018-01 -CVE-2018-11410 - https://bugzilla.redhat.com/show_bug.cgi?id=1582024 -CVE-2018-11410 - https://docs.google.com/document/d/1Uw3D6ECXZr8S2cWOTY81kg6ivv0WpR4kQqxVpUSyGUA/edit?usp=sharing -CVE-2018-11412 - https://www.exploit-db.com/exploits/44832/ -CVE-2018-11413 - https://github.com/yupoxiong/BearAdmin/issues/5 -CVE-2018-11414 - https://github.com/yupoxiong/BearAdmin/issues/5 -CVE-2018-11415 - https://www.exploit-db.com/exploits/44755/ -CVE-2018-11429 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-1143 - https://www.tenable.com/security/research/tra-2018-08 -CVE-2018-11430 - https://www.exploit-db.com/exploits/44754/ -CVE-2018-11439 - http://seclists.org/fulldisclosure/2018/May/49 -CVE-2018-1144 - https://www.tenable.com/security/research/tra-2018-08 -CVE-2018-11442 - https://gist.github.com/NinjaXshell/a5fae5e2d1031ca59160fbe29d94279c -CVE-2018-11442 - https://www.exploit-db.com/exploits/44763/ -CVE-2018-11443 - https://gist.github.com/NinjaXshell/be613dab99601f6abce884f6bc3d83a8 -CVE-2018-11443 - https://www.exploit-db.com/exploits/44764/ -CVE-2018-11444 - https://gist.github.com/NinjaXshell/4c0509096cb4ec6543b3f8050369920c -CVE-2018-11444 - https://www.exploit-db.com/exploits/44765/ -CVE-2018-11445 - https://gist.github.com/NinjaXshell/a5fae5e2d1031ca59160fbe29d94279c -CVE-2018-11445 - https://www.exploit-db.com/exploits/44763/ -CVE-2018-1145 - https://www.tenable.com/security/research/tra-2018-08 -CVE-2018-11450 - https://github.com/LucvanDonk/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability/wiki -CVE-2018-1146 - https://www.tenable.com/security/research/tra-2018-08 -CVE-2018-1147 - https://www.tenable.com/security/tns-2018-05 -CVE-2018-11470 - https://github.com/hi-KK/CVE-Hunter/blob/master/3.md -CVE-2018-11471 - https://github.com/nikhil1232/Cockpit-CMS-XSS-POC -CVE-2018-11476 - http://seclists.org/fulldisclosure/2018/May/66 -CVE-2018-11476 - https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ -CVE-2018-11477 - http://seclists.org/fulldisclosure/2018/May/66 -CVE-2018-11477 - https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ -CVE-2018-11478 - http://seclists.org/fulldisclosure/2018/May/66 -CVE-2018-11478 - https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ -CVE-2018-11479 - http://packetstormsecurity.com/files/156222/Windscribe-WindscribeService-Named-Pipe-Privilege-Escalation.html -CVE-2018-1148 - https://www.tenable.com/security/tns-2018-05 -CVE-2018-1149 - https://github.com/tenable/poc/tree/master/nuuo/nvrmini2 -CVE-2018-1149 - https://www.nuuo.com/backend/CKEdit/upload/files/NUUO_NVRsolo_v3_9_1_Release%20note.pdf -CVE-2018-1149 - https://www.tenable.com/security/research/tra-2018-25 -CVE-2018-11491 - https://mars-cheng.github.io/blog/2018/CVE-2018-11491/ -CVE-2018-11492 - http://packetstormsecurity.com/files/152542/ASUS-HG100-Denial-Of-Service.html -CVE-2018-11492 - https://mars-cheng.github.io/blog/2018/CVE-2018-11492/ -CVE-2018-11492 - https://www.exploit-db.com/exploits/46720/ -CVE-2018-11493 - https://github.com/wuzhicms/wuzhicms/issues/137 -CVE-2018-11496 - https://github.com/ckolivas/lrzip/issues/96 -CVE-2018-11498 - https://github.com/inikep/lizard/issues/16 -CVE-2018-1150 - https://www.nuuo.com/backend/CKEdit/upload/files/NUUO_NVRsolo_v3_9_1_Release%20note.pdf -CVE-2018-1150 - https://www.tenable.com/security/research/tra-2018-25 -CVE-2018-11500 - https://github.com/sanluan/PublicCMS/issues/11 -CVE-2018-11501 - https://gkaim.com/cve-2018-11501-vikas-chaudhary/ -CVE-2018-11502 - https://packetstormsecurity.com/files/148999/MyBB-Moderator-Log-Notes-1.1-Cross-Site-Request-Forgery.html -CVE-2018-11502 - https://www.exploit-db.com/exploits/45224/ -CVE-2018-11505 - https://pastebin.com/NtPn3jB8 -CVE-2018-11505 - https://www.exploit-db.com/exploits/44776/ -CVE-2018-11508 - https://www.exploit-db.com/exploits/46208/ -CVE-2018-11509 - http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html -CVE-2018-11509 - https://www.exploit-db.com/exploits/45200/ -CVE-2018-1151 - https://www.tenable.com/security/research/tra-2018-14 -CVE-2018-11510 - http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html -CVE-2018-11510 - https://www.exploit-db.com/exploits/45200/ -CVE-2018-11510 - https://www.exploit-db.com/exploits/45212/ -CVE-2018-11511 - http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html -CVE-2018-11511 - https://www.exploit-db.com/exploits/45200/ -CVE-2018-11512 - https://www.exploit-db.com/exploits/44790/ -CVE-2018-11515 - https://github.com/DediData/wpforo/issues/1 -CVE-2018-11515 - https://wpvulndb.com/vulnerabilities/9089 -CVE-2018-11516 - http://code610.blogspot.com/2018/05/make-free-vlc.html -CVE-2018-11518 - http://virgil-cj.blogspot.com/2018/05/0day-legacy-ivr-lets-phreak.html -CVE-2018-11518 - https://datarift.blogspot.com/2018/05/CVE-2018-11518-abusing-ivr-systems.html -CVE-2018-11522 - http://packetstormsecurity.com/files/147978/Yosoro-1.0.4-Remote-Code-Execution.html -CVE-2018-11522 - https://www.exploit-db.com/exploits/44803/ -CVE-2018-11523 - https://github.com/unh3x/just4cve/issues/1 -CVE-2018-11523 - https://www.exploit-db.com/exploits/44794/ -CVE-2018-11525 - https://wpvulndb.com/vulnerabilities/9096 -CVE-2018-11525 - https://www.exploit-db.com/exploits/44931/ -CVE-2018-11526 - https://wpvulndb.com/vulnerabilities/9097 -CVE-2018-11526 - https://www.exploit-db.com/exploits/44940/ -CVE-2018-11527 - https://github.com/fanyibo2009/cscms/blob/master/v4.1%20csrf -CVE-2018-11528 - https://github.com/wuzhicms/wuzhicms/issues/138 -CVE-2018-11529 - http://seclists.org/fulldisclosure/2018/Jul/28 -CVE-2018-11529 - https://www.exploit-db.com/exploits/45626/ -CVE-2018-11532 - https://www.exploit-db.com/exploits/44795/ -CVE-2018-11535 - https://gist.github.com/NinjaXshell/f894bd79f9707a92a7b6934711a8fdc9 -CVE-2018-11535 - https://www.exploit-db.com/exploits/44793/ -CVE-2018-11538 - http://packetstormsecurity.com/files/147977/SearchBlox-8.6.6-Cross-Site-Request-Forgery.html -CVE-2018-11538 - https://gurelahmet.com/cve-2018-11538-csrf-privilege-escalation-creation-of-an-administrator-account-on-searchblox-8-6-6/ -CVE-2018-11538 - https://www.exploit-db.com/exploits/44801/ -CVE-2018-1154 - https://www.tenable.com/security/tns-2018-11 -CVE-2018-11544 - https://pastebin.com/ygwczqpP -CVE-2018-1155 - https://www.tenable.com/security/tns-2018-11 -CVE-2018-11551 - http://seclists.org/fulldisclosure/2018/May/69 -CVE-2018-11555 - https://github.com/xiaoqx/pocs/tree/master/cms -CVE-2018-11556 - https://github.com/xiaoqx/pocs/tree/master/cms -CVE-2018-11558 - https://github.com/domainmod/domainmod/issues/66 -CVE-2018-11559 - https://github.com/domainmod/domainmod/issues/66 -CVE-2018-1156 - https://www.tenable.com/security/research/tra-2018-21 -CVE-2018-11564 - http://ruffsecurity.blogspot.com/2018/05/my-first-cve-found.html -CVE-2018-11564 - https://packetstormsecurity.com/files/148001/PageKit-CMS-1.0.13-Cross-Site-Scripting.html -CVE-2018-11564 - https://www.exploit-db.com/exploits/44837/ -CVE-2018-11567 - https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html -CVE-2018-11568 - https://packetstormsecurity.com/files/143666/WordPress-GamePlan-Event-And-Gym-Fitness-Theme-1.5.13.2-Cross-Site-Scripting.html -CVE-2018-1157 - http://seclists.org/fulldisclosure/2019/Jul/20 -CVE-2018-1157 - https://www.tenable.com/security/research/tra-2018-21 -CVE-2018-11575 - https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib -CVE-2018-11575 - https://github.com/miniupnp/ngiflib/issues/4 -CVE-2018-11576 - https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib -CVE-2018-11576 - https://github.com/miniupnp/ngiflib/issues/6 -CVE-2018-11577 - https://github.com/Edward-L/fuzzing-pocs/tree/master/liblouis -CVE-2018-11577 - https://github.com/liblouis/liblouis/issues/582 -CVE-2018-11578 - https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib -CVE-2018-11578 - https://github.com/miniupnp/ngiflib/issues/5 -CVE-2018-1158 - http://seclists.org/fulldisclosure/2019/Jul/20 -CVE-2018-1158 - https://www.tenable.com/security/research/tra-2018-21 -CVE-2018-11581 - https://www.exploit-db.com/exploits/44839/ -CVE-2018-11586 - http://packetstormsecurity.com/files/148032/SearchBlox-8.6.7-XML-External-Entity-Injection.html -CVE-2018-11586 - https://gurelahmet.com/searchblox-8-6-7-out-of-band-xml-external-entity-oob-xxe-cve-2018-11586/ -CVE-2018-11586 - https://www.exploit-db.com/exploits/44827/ -CVE-2018-1159 - https://www.tenable.com/security/research/tra-2018-21 -CVE-2018-11590 - https://github.com/espruino/Espruino/issues/1427 -CVE-2018-11591 - https://github.com/espruino/Espruino/issues/1420 -CVE-2018-11592 - https://github.com/espruino/Espruino/issues/1421 -CVE-2018-11593 - https://github.com/espruino/Espruino/issues/1426 -CVE-2018-11594 - https://github.com/espruino/Espruino/issues/1434 -CVE-2018-11595 - https://github.com/espruino/Espruino/issues/1425 -CVE-2018-11596 - https://github.com/espruino/Espruino/issues/1435 -CVE-2018-11597 - https://github.com/espruino/Espruino/issues/1448 -CVE-2018-11598 - https://github.com/espruino/Espruino/issues/1437 -CVE-2018-1160 - http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html -CVE-2018-1160 - https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/ -CVE-2018-1160 - https://www.exploit-db.com/exploits/46034/ -CVE-2018-1160 - https://www.exploit-db.com/exploits/46048/ -CVE-2018-1160 - https://www.exploit-db.com/exploits/46675/ -CVE-2018-1160 - https://www.tenable.com/security/research/tra-2018-48 -CVE-2018-11624 - https://github.com/ImageMagick/ImageMagick/issues/1149 -CVE-2018-11625 - https://github.com/ImageMagick/ImageMagick/issues/1156 -CVE-2018-11628 - https://www.exploit-db.com/exploits/44831/ -CVE-2018-11646 - https://bugzilla.gnome.org/show_bug.cgi?id=795740 -CVE-2018-11646 - https://www.exploit-db.com/exploits/44842/ -CVE-2018-11646 - https://www.exploit-db.com/exploits/44876/ -CVE-2018-11647 - https://github.com/jaredhanson/oauth2orize-fprm/commit/2bf9faee787eb004abbdfb6f4cc2fb06653defd5 -CVE-2018-11649 - https://github.com/Blck4/HUE-Exploit -CVE-2018-1165 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11652 - https://www.exploit-db.com/exploits/44899/ -CVE-2018-11654 - https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems/CVE-2018-11654 -CVE-2018-11657 - https://github.com/miniupnp/ngiflib/issues/7 -CVE-2018-11670 - https://www.exploit-db.com/exploits/44825/ -CVE-2018-11671 - https://www.exploit-db.com/exploits/44826/ -CVE-2018-11688 - http://packetstormsecurity.com/files/148057/Ignite-Realtime-Openfire-3.7.1-Cross-Site-Scripting.html -CVE-2018-11688 - http://seclists.org/fulldisclosure/2018/Jun/13 -CVE-2018-11689 - https://seclists.org/bugtraq/2018/Jun/40 -CVE-2018-11689 - https://vulmon.com/vulnerabilitydetails?qid=CVE-2018-11689 -CVE-2018-11690 - http://packetstormsecurity.com/files/148127/Joomla-2.4.0-Gridbox-Cross-Site-Scripting.html -CVE-2018-11690 - http://seclists.org/fulldisclosure/2018/Jun/26 -CVE-2018-11691 - http://www.emerson.com/documents/automation/deltav-smart-switches-en-179014.pdf -CVE-2018-11692 - https://www.exploit-db.com/exploits/44844/ -CVE-2018-11693 - https://github.com/sass/libsass/issues/2661 -CVE-2018-11694 - https://github.com/sass/libsass/issues/2663 -CVE-2018-11695 - https://github.com/sass/libsass/issues/2664 -CVE-2018-11696 - https://github.com/sass/libsass/issues/2665 -CVE-2018-11697 - https://github.com/sass/libsass/issues/2656 -CVE-2018-11698 - https://github.com/sass/libsass/issues/2662 -CVE-2018-11709 - https://wpvulndb.com/vulnerabilities/9090 -CVE-2018-1171 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-11711 - https://www.exploit-db.com/exploits/44845/ -CVE-2018-11714 - https://www.exploit-db.com/exploits/44781/ -CVE-2018-11715 - https://www.exploit-db.com/exploits/44833/ -CVE-2018-11722 - https://github.com/wuzhicms/wuzhicms/issues/141 -CVE-2018-11723 - http://packetstormsecurity.com/files/148113/libpff-2018-04-28-Information-Disclosure.html -CVE-2018-11723 - http://seclists.org/fulldisclosure/2018/Jun/15 -CVE-2018-11724 - http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html -CVE-2018-11725 - http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html -CVE-2018-11726 - http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html -CVE-2018-11727 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html -CVE-2018-11728 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html -CVE-2018-11729 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html -CVE-2018-11730 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html -CVE-2018-11731 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html -CVE-2018-11737 - https://github.com/sleuthkit/sleuthkit/issues/1266 -CVE-2018-11738 - https://github.com/sleuthkit/sleuthkit/issues/1265 -CVE-2018-11739 - https://github.com/sleuthkit/sleuthkit/issues/1267 -CVE-2018-11740 - https://github.com/sleuthkit/sleuthkit/issues/1264 -CVE-2018-11741 - http://hyp3rlinx.altervista.org/advisories/NEC-UNIVERGE-WEBPRO-v6.00-PREDICTABLE-SESSIONID-CLEARTEXT-PASSWORDS.txt -CVE-2018-11741 - http://packetstormsecurity.com/files/150610/NEC-Univerge-Sv9100-WebPro-6.00.00-Predictable-Session-ID-Cleartext-Passwords.html -CVE-2018-11741 - http://seclists.org/fulldisclosure/2018/Dec/1 -CVE-2018-11741 - https://www.exploit-db.com/exploits/45942/ -CVE-2018-11742 - http://hyp3rlinx.altervista.org/advisories/NEC-UNIVERGE-WEBPRO-v6.00-PREDICTABLE-SESSIONID-CLEARTEXT-PASSWORDS.txt -CVE-2018-11742 - http://packetstormsecurity.com/files/150610/NEC-Univerge-Sv9100-WebPro-6.00.00-Predictable-Session-ID-Cleartext-Passwords.html -CVE-2018-11742 - http://seclists.org/fulldisclosure/2018/Dec/1 -CVE-2018-11742 - https://www.exploit-db.com/exploits/45942/ -CVE-2018-11759 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11763 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11771 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2018-11775 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11775 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-11775 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11776 - http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html -CVE-2018-11776 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-11776 - https://cwiki.apache.org/confluence/display/WW/S2-057 -CVE-2018-11776 - https://github.com/hook-s3c/CVE-2018-11776-Python-PoC -CVE-2018-11776 - https://www.exploit-db.com/exploits/45260/ -CVE-2018-11776 - https://www.exploit-db.com/exploits/45262/ -CVE-2018-11776 - https://www.exploit-db.com/exploits/45367/ -CVE-2018-11776 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11776 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11784 - http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html -CVE-2018-11784 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2018-11784 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11784 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-11784 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-11784 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-11790 - https://www.openoffice.org/security/cves/CVE-2018-11790.html -CVE-2018-11797 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-11798 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-11813 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz -CVE-2018-11820 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11821 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11822 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11824 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11828 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1183 - http://seclists.org/fulldisclosure/2018/Apr/61 -CVE-2018-11830 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11838 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2018-11845 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11846 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11847 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11849 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1185 - https://www.exploit-db.com/exploits/44614/ -CVE-2018-11850 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11853 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11854 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11855 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11856 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11857 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11858 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11859 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1186 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1186 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-11861 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11862 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11864 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11865 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11866 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11867 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1187 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1187 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-11870 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11871 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11872 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11873 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11874 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11875 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11876 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11877 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11879 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1188 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1188 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-11880 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11882 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11884 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11888 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1189 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1189 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-11899 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11921 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11928 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11928 -CVE-2018-11931 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11932 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11935 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11936 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11936 -CVE-2018-11938 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11945 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11948 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11950 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11951 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11958 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11966 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11968 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11968 -CVE-2018-11970 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11971 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11976 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11976 -CVE-2018-11980 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2018-11982 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1199 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-11993 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11994 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11996 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11998 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-11999 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-12004 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12004 -CVE-2018-12005 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12005 -CVE-2018-1201 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1201 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-12012 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12012 -CVE-2018-12013 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12013 -CVE-2018-12015 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834 -CVE-2018-12015 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-12018 - https://github.com/ethereum/go-ethereum/pull/16891 -CVE-2018-12019 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-1202 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1202 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-12020 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-12020 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-12021 - http://www.openwall.com/lists/oss-security/2019/05/16/1 -CVE-2018-12022 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2018-12022 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-12022 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-12023 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-12023 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-12023 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-12023 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-12025 - https://medium.com/secbit-media/bugged-smart-contract-f-e-how-could-someone-mess-up-with-boolean-d2251defd6ff -CVE-2018-12029 - https://pulsesecurity.co.nz/advisories/phusion-passenger-priv-esc -CVE-2018-1203 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1203 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-12034 - https://bnbdr.github.io/posts/swisscheese/ -CVE-2018-12034 - https://github.com/VirusTotal/yara/issues/891 -CVE-2018-12034 - https://github.com/bnbdr/swisscheese -CVE-2018-12035 - https://bnbdr.github.io/posts/swisscheese/ -CVE-2018-12035 - https://github.com/VirusTotal/yara/issues/891 -CVE-2018-12035 - https://github.com/bnbdr/swisscheese -CVE-2018-12038 - http://www.kb.cert.org/vuls/id/395981 -CVE-2018-1204 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1204 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-12040 - http://packetstormsecurity.com/files/148125/SensioLabs-Symfony-3.3.6-Cross-Site-Scripting.html -CVE-2018-12045 - https://github.com/SukaraLin/php_code_audit_project/blob/master/dedecms/dedecms%20v5.7%20sp2%20%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md -CVE-2018-12046 - https://github.com/SukaraLin/php_code_audit_project/blob/master/dedecms/dedecms%20v5.7%20sp2%20%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md -CVE-2018-12048 - https://www.exploit-db.com/exploits/44885/ -CVE-2018-12049 - https://www.exploit-db.com/exploits/44886/ -CVE-2018-12051 - https://github.com/unh3x/just4cve/issues/5 -CVE-2018-12052 - https://github.com/unh3x/just4cve/issues/3 -CVE-2018-12052 - https://www.exploit-db.com/exploits/44873/ -CVE-2018-12053 - https://github.com/unh3x/just4cve/issues/6 -CVE-2018-12053 - https://www.exploit-db.com/exploits/44870/ -CVE-2018-12054 - https://github.com/unh3x/just4cve/issues/4 -CVE-2018-12054 - https://www.exploit-db.com/exploits/44874/ -CVE-2018-12055 - https://github.com/unh3x/just4cve/issues/2 -CVE-2018-12055 - https://www.exploit-db.com/exploits/44866/ -CVE-2018-12071 - https://www.codeigniter.com/user_guide/changelog.html -CVE-2018-12076 - https://sorsnce.com/2018/11/13/announcing-cve-2018-12076/ -CVE-2018-12090 - https://www.exploit-db.com/exploits/45153/ -CVE-2018-12094 - https://cxsecurity.com/issue/WLB-2018060091 -CVE-2018-12094 - https://www.exploit-db.com/exploits/44897/ -CVE-2018-12095 - https://cxsecurity.com/issue/WLB-2018060092 -CVE-2018-12095 - https://www.exploit-db.com/exploits/44895/ -CVE-2018-12100 - https://support.sonatype.com/hc/en-us/articles/360018565994-CVE-2018-12100-Nexus-Repository-Manager-3-Cross-Site-Scripting-XSS-June-4th-2018 -CVE-2018-12101 - https://github.com/ClipperCMS/ClipperCMS/issues/487 -CVE-2018-12101 - https://github.com/ClipperCMS/ClipperCMS/issues/488 -CVE-2018-12102 - https://github.com/Edward-L/fuzzing-pocs/tree/master/md4c -CVE-2018-12102 - https://github.com/mity/md4c/issues/41 -CVE-2018-12104 - https://github.com/airbnb/knowledge-repo/issues/431 -CVE-2018-12111 - https://www.exploit-db.com/exploits/44882/ -CVE-2018-12112 - https://github.com/mity/md4c/issues/42 -CVE-2018-12113 - http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html -CVE-2018-12113 - https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa -CVE-2018-12113 - https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9 -CVE-2018-12114 - https://www.exploit-db.com/exploits/44887/ -CVE-2018-12126 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html -CVE-2018-12126 - https://seclists.org/bugtraq/2019/Jun/28 -CVE-2018-12126 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2018-12126 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html -CVE-2018-12127 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html -CVE-2018-12127 - https://seclists.org/bugtraq/2019/Jun/28 -CVE-2018-12127 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2018-12127 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html -CVE-2018-1213 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -CVE-2018-1213 - https://www.exploit-db.com/exploits/44039/ -CVE-2018-12130 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html -CVE-2018-12130 - https://seclists.org/bugtraq/2019/Jun/28 -CVE-2018-12130 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2018-12130 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html -CVE-2018-12169 - https://support.lenovo.com/us/en/solutions/LEN-20527 -CVE-2018-1217 - https://www.exploit-db.com/exploits/44441/ -CVE-2018-1218 - https://www.exploit-db.com/exploits/44332/ -CVE-2018-12207 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-12209 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12209 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12210 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12210 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12211 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12211 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12212 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12212 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12213 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12213 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12214 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12214 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12215 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12215 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12216 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12216 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12217 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12217 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12218 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12218 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12219 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12219 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12220 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12220 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12221 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12221 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12222 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12222 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12223 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12223 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12224 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-12224 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-12229 - https://metamorfosec.com/Files/Advisories/METS-2018-001-A_XSS_Vulnerability_in_OJS_3.0.0_to_3.1.1-1.txt -CVE-2018-12233 - https://usn.ubuntu.com/3753-2/ -CVE-2018-12234 - http://packetstormsecurity.com/files/155231/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html -CVE-2018-12250 - https://cxsecurity.com/issue/WLB-2018060157 -CVE-2018-12254 - https://www.exploit-db.com/exploits/44893/ -CVE-2018-12263 - https://github.com/oyeahtime/test/issues/3 -CVE-2018-12264 - https://github.com/Exiv2/exiv2/issues/366 -CVE-2018-12264 - https://github.com/TeamSeri0us/pocs/blob/master/exiv2/2-out-of-read-Poc -CVE-2018-12265 - https://github.com/Exiv2/exiv2/issues/365 -CVE-2018-12265 - https://github.com/TeamSeri0us/pocs/blob/master/exiv2/1-out-of-read-Poc -CVE-2018-12266 - https://github.com/lzlzh2016/CVE/blob/master/XSS.md -CVE-2018-12271 - https://gist.github.com/tanprathan/6e8ed195a2e05b7f9d9a342dbdacb349 -CVE-2018-12292 - https://www.exploit-db.com/exploits/44900/ -CVE-2018-12293 - http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html -CVE-2018-12293 - https://www.exploit-db.com/exploits/45205/ -CVE-2018-12294 - http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html -CVE-2018-12305 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12306 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12307 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12308 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12309 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12310 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12311 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12312 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12313 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12314 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12315 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12316 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12317 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12318 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12319 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -CVE-2018-12326 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES -CVE-2018-12326 - https://www.exploit-db.com/exploits/44904/ -CVE-2018-12327 - https://usn.ubuntu.com/4229-1/ -CVE-2018-12327 - https://www.exploit-db.com/exploits/44909/ -CVE-2018-1235 - https://www.exploit-db.com/exploits/44920/ -CVE-2018-12353 - https://medium.com/stolabs/security-issue-on-knowage-spagobi-ec539a68e55 -CVE-2018-12354 - https://medium.com/stolabs/security-issue-on-knowage-spagobi-ec539a68e55 -CVE-2018-12355 - https://medium.com/stolabs/security-issue-on-knowage-spagobi-ec539a68e55 -CVE-2018-12356 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-12357 - https://www.arista.com/en/support/advisories-notices -CVE-2018-12359 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12360 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12362 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12363 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12364 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12365 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12366 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12368 - https://bugzilla.mozilla.org/show_bug.cgi?id=1468217 -CVE-2018-12368 - https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 -CVE-2018-12370 - https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 -CVE-2018-12372 - https://bugzilla.mozilla.org/show_bug.cgi?id=1419417 -CVE-2018-12372 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12373 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12374 - https://bugzilla.mozilla.org/show_bug.cgi?id=1462910 -CVE-2018-12374 - https://usn.ubuntu.com/3714-1/ -CVE-2018-12384 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-12386 - https://bugzilla.mozilla.org/show_bug.cgi?id=1493900 -CVE-2018-12402 - https://bugzilla.mozilla.org/show_bug.cgi?id=1447087 -CVE-2018-12402 - https://bugzilla.mozilla.org/show_bug.cgi?id=1469916 -CVE-2018-12403 - https://bugzilla.mozilla.org/show_bug.cgi?id=1484753 -CVE-2018-12404 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12404 -CVE-2018-12404 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-12407 - https://bugzilla.mozilla.org/show_bug.cgi?id=1505973 -CVE-2018-12413 - https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-messaging-apache-kafka-distribution-schema-repository -CVE-2018-12426 - https://wpvulndb.com/vulnerabilities/9697 -CVE-2018-12447 - https://github.com/ebel34/bpg-web-encoder/issues/2 -CVE-2018-12453 - https://www.exploit-db.com/exploits/44908/ -CVE-2018-12454 - https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d -CVE-2018-1246 - https://seclists.org/fulldisclosure/2018/Sep/30 -CVE-2018-12463 - https://www.exploit-db.com/exploits/45027/ -CVE-2018-12464 - https://www.exploit-db.com/exploits/45083/ -CVE-2018-12465 - https://www.exploit-db.com/exploits/45083/ -CVE-2018-1247 - https://www.exploit-db.com/exploits/44634/ -CVE-2018-12481 - https://pastebin.com/sp5nMhvc -CVE-2018-12482 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ -CVE-2018-12483 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ -CVE-2018-12493 - https://github.com/sanluan/PublicCMS/issues/12 -CVE-2018-12494 - https://github.com/sanluan/PublicCMS/issues/12 -CVE-2018-1250 - https://seclists.org/fulldisclosure/2018/Sep/30 -CVE-2018-1251 - https://seclists.org/fulldisclosure/2018/Sep/30 -CVE-2018-12519 - https://cxsecurity.com/issue/WLB-2018060185 -CVE-2018-12519 - https://www.exploit-db.com/exploits/44978/ -CVE-2018-12520 - http://seclists.org/fulldisclosure/2018/Jul/14 -CVE-2018-12520 - https://gist.github.com/Psychotropos/3e8c047cada9b1fb716e6a014a428b7f -CVE-2018-12520 - https://www.exploit-db.com/exploits/44973/ -CVE-2018-12522 - https://pastebin.com/eA5tGKf0 -CVE-2018-12522 - https://www.exploit-db.com/exploits/44910/ -CVE-2018-12523 - https://pastebin.com/eA5tGKf0 -CVE-2018-12523 - https://www.exploit-db.com/exploits/44910/ -CVE-2018-12524 - https://pastebin.com/eA5tGKf0 -CVE-2018-12524 - https://www.exploit-db.com/exploits/44910/ -CVE-2018-12525 - https://pastebin.com/eA5tGKf0 -CVE-2018-12525 - https://www.exploit-db.com/exploits/44910/ -CVE-2018-12528 - https://www.exploit-db.com/exploits/44933/ -CVE-2018-12529 - https://www.exploit-db.com/exploits/44939/ -CVE-2018-12536 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-12536 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-12538 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-12538 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-12545 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-12545 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-12556 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-1257 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1257 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-1257 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1257 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-1257 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-12571 - http://packetstormsecurity.com/files/148389/Microsoft-Forefront-Unified-Access-Gateway-2010-External-DNS-Interaction.html -CVE-2018-12571 - http://seclists.org/fulldisclosure/2018/Jul/2 -CVE-2018-12571 - http://seclists.org/fulldisclosure/2018/Jul/7 -CVE-2018-12572 - http://packetstormsecurity.com/files/151590/Avast-Anti-Virus-Local-Credential-Disclosure.html -CVE-2018-12578 - https://github.com/pts/sam2p/issues/39 -CVE-2018-1258 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1258 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1258 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1258 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-1258 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-1258 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1258 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-1258 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-12582 - https://github.com/p8w/akcms/issues/1 -CVE-2018-12583 - https://github.com/p8w/akcms/issues/2 -CVE-2018-12584 - https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html -CVE-2018-12584 - https://www.exploit-db.com/exploits/45174/ -CVE-2018-12587 - https://metamorfosec.com/Files/Advisories/METS-2018-003-A_XSS_Vulnerability_in_German_Spelling_Dictionary_1.3.txt -CVE-2018-12588 - https://metamorfosec.com/Files/Advisories/METS-2018-002-A_XSS_Vulnerability_in_OMP_1.2.0_to_3.1.1-2.txt -CVE-2018-12589 - http://packetstormsecurity.com/files/148312/Polaris-Office-2017-8.1-Remote-Code-Execution.html -CVE-2018-12589 - https://www.exploit-db.com/exploits/44985/ -CVE-2018-1259 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2018-12596 - http://seclists.org/fulldisclosure/2018/Oct/15 -CVE-2018-12596 - https://medium.com/@alt3kx/ektron-content-management-system-cms-9-20-sp2-remote-re-enabling-users-cve-2018-12596-bdf1e3a05158 -CVE-2018-12596 - https://www.exploit-db.com/exploits/45577/ -CVE-2018-12599 - https://github.com/ImageMagick/ImageMagick/issues/1177 -CVE-2018-12600 - https://github.com/ImageMagick/ImageMagick/issues/1178 -CVE-2018-12601 - https://github.com/pts/sam2p/issues/41 -CVE-2018-12602 - http://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html -CVE-2018-12602 - https://www.exploit-db.com/exploits/44918/ -CVE-2018-12603 - https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html -CVE-2018-12603 - https://www.exploit-db.com/exploits/44919/ -CVE-2018-12604 - https://github.com/GreenCMS/GreenCMS/issues/110 -CVE-2018-12604 - https://www.exploit-db.com/exploits/44922/ -CVE-2018-12607 - https://gitlab.com/gitlab-org/gitlab-ce/issues/45903 -CVE-2018-12609 - http://seclists.org/fulldisclosure/2019/Jan/10 -CVE-2018-12610 - http://seclists.org/fulldisclosure/2019/Jan/10 -CVE-2018-12611 - http://seclists.org/fulldisclosure/2019/Jan/10 -CVE-2018-12613 - http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html -CVE-2018-12613 - https://www.exploit-db.com/exploits/44924/ -CVE-2018-12613 - https://www.exploit-db.com/exploits/44928/ -CVE-2018-12613 - https://www.exploit-db.com/exploits/45020/ -CVE-2018-12617 - https://gist.github.com/fakhrizulkifli/c7740d28efa07dafee66d4da5d857ef6 -CVE-2018-12617 - https://www.exploit-db.com/exploits/44925/ -CVE-2018-12621 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12622 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12623 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12624 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12625 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12626 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12627 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12628 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md -CVE-2018-12630 - https://www.exploit-db.com/exploits/44911/ -CVE-2018-12631 - https://www.exploit-db.com/exploits/44905/ -CVE-2018-12632 - https://www.exploit-db.com/exploits/44905/ -CVE-2018-12634 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -CVE-2018-12634 - https://www.exploit-db.com/exploits/45384/ -CVE-2018-12636 - https://www.exploit-db.com/exploits/44943/ -CVE-2018-12638 - http://packetstormsecurity.com/files/151018/Base-Soundtouch-18.1.4-Cross-Site-Scripting.html -CVE-2018-12648 - https://bugs.freedesktop.org/show_bug.cgi?id=106981 -CVE-2018-12650 - http://packetstormsecurity.com/files/155232/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html -CVE-2018-12651 - https://www.knowcybersec.com/2018/12/CVE-2018-12651-reflected-XSS.html -CVE-2018-12652 - https://www.knowcybersec.com/2019/02/CVE-2018-12652-reflected-XSS.html -CVE-2018-12653 - http://packetstormsecurity.com/files/155244/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html -CVE-2018-12653 - https://www.knowcybersec.com/2019/02/CVE-2018-12653-reflected-XSS.html -CVE-2018-12659 - https://github.com/slims/slims8_akasia/issues/103 -CVE-2018-12666 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12667 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12668 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12669 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12670 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12671 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12672 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12673 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12674 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12675 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ -CVE-2018-12689 - https://www.exploit-db.com/exploits/44926/ -CVE-2018-12692 - https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc -CVE-2018-12692 - https://www.exploit-db.com/exploits/44912/ -CVE-2018-12693 - https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc -CVE-2018-12694 - https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc -CVE-2018-1270 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1270 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1270 - https://www.exploit-db.com/exploits/44796/ -CVE-2018-1270 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1270 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-1270 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-12705 - https://hackings8n.blogspot.com/2018/06/cve-2018-12705-digisol-wireless-router.html -CVE-2018-12705 - https://www.exploit-db.com/exploits/44935/ -CVE-2018-12706 - https://hackings8n.blogspot.com/2018/06/cve-2018-12706-digisol-dg-br4000ng.html -CVE-2018-12706 - https://www.exploit-db.com/exploits/44934/ -CVE-2018-1271 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1271 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1271 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1271 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-1271 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-12710 - https://www.exploit-db.com/exploits/45306/ -CVE-2018-12715 - https://www.exploit-db.com/exploits/44955 -CVE-2018-12716 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -CVE-2018-1272 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1272 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1272 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1272 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-1272 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-1273 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2018-12739 - https://www.exploit-db.com/exploits/44952/ -CVE-2018-1274 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2018-1275 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1275 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-1275 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-1275 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-12812 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-12827 - https://www.exploit-db.com/exploits/45268/ -CVE-2018-1285 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-1285 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1285 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-1288 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-12882 - https://hackerone.com/reports/371135 -CVE-2018-12895 - http://packetstormsecurity.com/files/164633/WordPress-4.9.6-Arbitrary-File-Deletion.html -CVE-2018-12897 - http://packetstormsecurity.com/files/153668/DameWare-Remote-Support-12.0.0.509-Buffer-Overflow.html -CVE-2018-12897 - https://labs.nettitude.com/blog/solarwinds-cve-2018-12897-dameware-mini-remote-control-local-seh-buffer-overflow/ -CVE-2018-12900 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-12900 -CVE-2018-12900 - https://usn.ubuntu.com/3906-1/ -CVE-2018-12903 - http://code610.blogspot.com/2018/06/exploiting-cyberark-1021603.html -CVE-2018-12904 - https://www.exploit-db.com/exploits/44944/ -CVE-2018-12908 - https://cxsecurity.com/issue/WLB-2018060325 -CVE-2018-12908 - https://www.exploit-db.com/exploits/44977/ -CVE-2018-12910 - https://usn.ubuntu.com/3701-1/ -CVE-2018-12912 - https://github.com/Neeke/HongCMS/issues/4 -CVE-2018-12912 - https://www.exploit-db.com/exploits/44953/ -CVE-2018-12913 - https://github.com/richgel999/miniz/issues/90 -CVE-2018-12919 - https://github.com/lzlzh2016/CraftedWeb/blob/master/xss.md -CVE-2018-1292 - http://www.securityfocus.com/bid/104007 -CVE-2018-12971 - https://github.com/teameasy/EasyCMS/issues/3 -CVE-2018-12975 - https://medium.com/@jonghyk.song/create-legendary-champs-by-breaking-prng-of-cryptosaga-an-ethereum-rpg-game-cve-2018-12975-8de733ff8255 -CVE-2018-12977 - https://www.exploit-db.com/exploits/44981/ -CVE-2018-12979 - http://seclists.org/fulldisclosure/2018/Jul/38 -CVE-2018-12979 - https://cert.vde.com/en-us/advisories/vde-2018-010 -CVE-2018-12979 - https://www.exploit-db.com/exploits/45014/ -CVE-2018-12979 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ -CVE-2018-12980 - http://seclists.org/fulldisclosure/2018/Jul/38 -CVE-2018-12980 - https://cert.vde.com/en-us/advisories/vde-2018-010 -CVE-2018-12980 - https://www.exploit-db.com/exploits/45014/ -CVE-2018-12980 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ -CVE-2018-12981 - http://seclists.org/fulldisclosure/2018/Jul/38 -CVE-2018-12981 - https://cert.vde.com/en-us/advisories/vde-2018-010 -CVE-2018-12981 - https://www.exploit-db.com/exploits/45014/ -CVE-2018-12981 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ -CVE-2018-12982 - https://bugzilla.redhat.com/show_bug.cgi?id=1595689 -CVE-2018-12983 - https://bugzilla.redhat.com/show_bug.cgi?id=1595693 -CVE-2018-12984 - https://www.exploit-db.com/exploits/44954/ -CVE-2018-12990 - https://3xpl01tc0d3r.blogspot.com/2018/06/information-disclosure-internal-path.html -CVE-2018-12996 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html -CVE-2018-12996 - http://seclists.org/fulldisclosure/2018/Jul/71 -CVE-2018-12996 - https://github.com/unh3x/just4cve/issues/7 -CVE-2018-12997 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html -CVE-2018-12997 - http://seclists.org/fulldisclosure/2018/Jul/73 -CVE-2018-12997 - https://github.com/unh3x/just4cve/issues/8 -CVE-2018-12998 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html -CVE-2018-12998 - http://seclists.org/fulldisclosure/2018/Jul/75 -CVE-2018-12998 - https://github.com/unh3x/just4cve/issues/10 -CVE-2018-12999 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html -CVE-2018-12999 - http://seclists.org/fulldisclosure/2018/Jul/74 -CVE-2018-12999 - https://github.com/unh3x/just4cve/issues/9 -CVE-2018-13000 - https://www.vulnerability-lab.com/get_content.php?id=2123 -CVE-2018-13001 - https://www.vulnerability-lab.com/get_content.php?id=2122 -CVE-2018-13002 - https://www.vulnerability-lab.com/get_content.php?id=2121 -CVE-2018-13007 - https://github.com/gopro/gpmf-parser/issues/29 -CVE-2018-13008 - https://github.com/gopro/gpmf-parser/issues/29 -CVE-2018-13009 - https://github.com/gopro/gpmf-parser/issues/29 -CVE-2018-13010 - https://github.com/wstmall/wstmall/issues/4 -CVE-2018-13011 - https://github.com/gopro/gpmf-parser/issues/31 -CVE-2018-13022 - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 -CVE-2018-13023 - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 -CVE-2018-13025 - https://github.com/zhaoheng521/yxcms/blob/master/Any%20file%20deletion -CVE-2018-13026 - https://github.com/gopro/gpmf-parser/issues/32 -CVE-2018-13031 - https://github.com/AutismJH/damicms/issues/6 -CVE-2018-13031 - https://www.exploit-db.com/exploits/44960/ -CVE-2018-13032 - https://www.exploit-db.com/exploits/44938/ -CVE-2018-13033 - https://sourceware.org/bugzilla/show_bug.cgi?id=23361 -CVE-2018-1304 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1304 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-13042 - https://www.exploit-db.com/exploits/46165/ -CVE-2018-13042 - https://www.valbrux.it/blog/2019/01/22/cve-2018-13042-1password-android-7-0-denial-of-service/ -CVE-2018-13045 - http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html -CVE-2018-13045 - https://www.exploit-db.com/exploits/46015/ -CVE-2018-13049 - https://github.com/glpi-project/glpi/issues/4270 -CVE-2018-1305 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-1305 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-1305 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-13050 - https://github.com/x-f1v3/ForCve/issues/1 -CVE-2018-13052 - https://www.youtube.com/watch?v=xYRbXBPubaw -CVE-2018-13053 - https://usn.ubuntu.com/3821-1/ -CVE-2018-13053 - https://usn.ubuntu.com/3821-2/ -CVE-2018-13053 - https://usn.ubuntu.com/4118-1/ -CVE-2018-1306 - https://www.exploit-db.com/exploits/45396/ -CVE-2018-13060 - https://sysdream.com/news/lab/ -CVE-2018-13060 - https://sysdream.com/news/lab/2019-10-25-cve-2018-13060-easy-appointments-captcha-bypass/ -CVE-2018-13063 - https://sysdream.com/news/lab/ -CVE-2018-13063 - https://sysdream.com/news/lab/2019-10-25-cve-2018-13063-easy-appointments-multiple-confidential-information-leakage/ -CVE-2018-13065 - https://github.com/SpiderLabs/ModSecurity/issues/1829 -CVE-2018-13065 - https://hackings8n.blogspot.com/2018/07/cve-2018-13065-modsecurity-300-has-xss.html -CVE-2018-13065 - https://www.exploit-db.com/exploits/44970/ -CVE-2018-13066 - https://github.com/libming/libming/issues/146 -CVE-2018-13067 - https://whitehatck01.blogspot.com/2018/06/opencart-v3-0-3-0-user-changes-password.html -CVE-2018-13093 - https://bugzilla.kernel.org/show_bug.cgi?id=199367 -CVE-2018-13093 - https://usn.ubuntu.com/4118-1/ -CVE-2018-13094 - https://bugzilla.kernel.org/show_bug.cgi?id=199969 -CVE-2018-13094 - https://usn.ubuntu.com/3753-2/ -CVE-2018-13095 - https://bugzilla.kernel.org/show_bug.cgi?id=199915 -CVE-2018-13096 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-13096 - https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 -CVE-2018-13096 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 -CVE-2018-13096 - https://usn.ubuntu.com/3821-1/ -CVE-2018-13096 - https://usn.ubuntu.com/3821-2/ -CVE-2018-13096 - https://usn.ubuntu.com/4118-1/ -CVE-2018-13097 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-13097 - https://usn.ubuntu.com/4118-1/ -CVE-2018-13098 - https://bugzilla.kernel.org/show_bug.cgi?id=200173 -CVE-2018-13098 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2 -CVE-2018-13098 - https://usn.ubuntu.com/4118-1/ -CVE-2018-13099 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-13099 - https://bugzilla.kernel.org/show_bug.cgi?id=200179 -CVE-2018-13099 - https://usn.ubuntu.com/4118-1/ -CVE-2018-13100 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-13100 - https://usn.ubuntu.com/4118-1/ -CVE-2018-13103 - http://packetstormsecurity.com/files/151243/Open-Xchange-OX-App-Suite-Cross-Site-Scripting-SSRF.html -CVE-2018-13103 - http://seclists.org/fulldisclosure/2019/Jan/46 -CVE-2018-13104 - http://packetstormsecurity.com/files/151243/Open-Xchange-OX-App-Suite-Cross-Site-Scripting-SSRF.html -CVE-2018-13104 - http://seclists.org/fulldisclosure/2019/Jan/46 -CVE-2018-13106 - https://github.com/ClipperCMS/ClipperCMS/issues/489 -CVE-2018-13108 - http://packetstormsecurity.com/files/148424/ADB-Local-Root-Jailbreak.html -CVE-2018-13108 - http://seclists.org/fulldisclosure/2018/Jul/17 -CVE-2018-13108 - https://www.exploit-db.com/exploits/44983/ -CVE-2018-13108 - https://www.sec-consult.com/en/blog/advisories/local-root-jailbreak-via-network-file-sharing-flaw-in-all-adb-broadband-gateways-routers/ -CVE-2018-13109 - http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html -CVE-2018-13109 - http://seclists.org/fulldisclosure/2018/Jul/18 -CVE-2018-13109 - https://www.exploit-db.com/exploits/44982/ -CVE-2018-13109 - https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/ -CVE-2018-1311 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2018-13110 - http://packetstormsecurity.com/files/148430/ADB-Group-Manipulation-Privilege-Escalation.html -CVE-2018-13110 - http://seclists.org/fulldisclosure/2018/Jul/19 -CVE-2018-13110 - https://www.exploit-db.com/exploits/44984/ -CVE-2018-13110 - https://www.sec-consult.com/en/blog/advisories/privilege-escalation-via-linux-group-manipulation-in-all-adb-broadband-gateways-routers/ -CVE-2018-13111 - https://hackinganarchy.wordpress.com/2018/09/20/cve-2018-13111/ -CVE-2018-13112 - https://github.com/appneta/tcpreplay/issues/477 -CVE-2018-13126 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-13127 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-13128 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-13129 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-1313 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-13130 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-13131 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-13132 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md -CVE-2018-13134 - https://www.exploit-db.com/exploits/45970/ -CVE-2018-13134 - https://www.xc0re.net/2018/05/25/tp-link-wireless-router-archer-c1200-cross-site-scripting/ -CVE-2018-13136 - https://wpvulndb.com/vulnerabilities/9708 -CVE-2018-13137 - https://ansawaf.blogspot.com/2019/04/cve-2018-13137-xss-in-events-manager.html -CVE-2018-13137 - https://gist.github.com/ansarisec/12737c207c0851d52865ed60c08891b7 -CVE-2018-13139 - https://github.com/erikd/libsndfile/issues/397 -CVE-2018-13139 - https://usn.ubuntu.com/4013-1/ -CVE-2018-13140 - http://packetstormsecurity.com/files/149468/Antidote-9.5.1-Code-Execution.html -CVE-2018-13140 - http://seclists.org/fulldisclosure/2018/Sep/38 -CVE-2018-13140 - https://sysdream.com/news/lab/2018-09-21-cve-2018-13140-antidote-remote-code-execution-against-the-update-component/ -CVE-2018-13160 - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/etktokens -CVE-2018-1320 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1320 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-1321 - https://www.exploit-db.com/exploits/45400/ -CVE-2018-1322 - https://www.exploit-db.com/exploits/45400/ -CVE-2018-1324 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2018-13250 - https://github.com/libming/libming/issues/147 -CVE-2018-13251 - https://github.com/libming/libming/issues/149 -CVE-2018-13256 - https://gkaim.com/cve-2018-13256-vikas-chaudhary/ -CVE-2018-13256 - https://www.exploit-db.com/exploits/45125/ -CVE-2018-13257 - https://github.com/gluxon/CVE-2018-13257 -CVE-2018-1327 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-13306 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13307 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13308 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13309 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13310 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13311 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13312 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13313 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13313 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -CVE-2018-13314 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13315 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13316 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13317 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 -CVE-2018-13318 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13319 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13320 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13321 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13322 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13323 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13324 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d -CVE-2018-13329 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13330 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13331 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13332 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13333 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13334 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13335 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13336 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13337 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13338 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13339 - https://github.com/TylerGarlick/angular-redactor/issues/77 -CVE-2018-13340 - https://github.com/gleez/cms/issues/795 -CVE-2018-13349 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-1335 - http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html -CVE-2018-1335 - https://www.exploit-db.com/exploits/46540/ -CVE-2018-13350 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13351 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13352 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13353 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13354 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13355 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13356 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13357 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13358 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13359 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-1336 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-13360 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13361 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13365 - https://fortiguard.com/advisory/FG-IR-18-085 -CVE-2018-13368 - https://fortiguard.com/advisory/FG-IR-18-108 -CVE-2018-13374 - https://fortiguard.com/advisory/FG-IR-18-157 -CVE-2018-13378 - https://fortiguard.com/advisory/FG-IR-18-382 -CVE-2018-13379 - https://fortiguard.com/advisory/FG-IR-18-384 -CVE-2018-13380 - https://fortiguard.com/advisory/FG-IR-18-383 -CVE-2018-13380 - https://fortiguard.com/advisory/FG-IR-20-230 -CVE-2018-13383 - https://fortiguard.com/advisory/FG-IR-18-388 -CVE-2018-13384 - https://fortiguard.com/advisory/FG-IR-19-002 -CVE-2018-13400 - http://www.securityfocus.com/bid/105751 -CVE-2018-13401 - http://www.securityfocus.com/bid/105751 -CVE-2018-13402 - http://www.securityfocus.com/bid/105751 -CVE-2018-13405 - https://usn.ubuntu.com/3753-2/ -CVE-2018-13405 - https://www.exploit-db.com/exploits/45033/ -CVE-2018-13406 - https://usn.ubuntu.com/3753-2/ -CVE-2018-13410 - http://seclists.org/fulldisclosure/2018/Jul/24 -CVE-2018-13415 - http://seclists.org/fulldisclosure/2018/Aug/1 -CVE-2018-13415 - https://www.exploit-db.com/exploits/45146/ -CVE-2018-13416 - http://seclists.org/fulldisclosure/2018/Jul/94 -CVE-2018-13416 - https://www.exploit-db.com/exploits/45133/ -CVE-2018-13417 - http://seclists.org/fulldisclosure/2018/Aug/2 -CVE-2018-13417 - https://www.exploit-db.com/exploits/45145/ -CVE-2018-13418 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -CVE-2018-13419 - https://github.com/erikd/libsndfile/issues/398 -CVE-2018-13434 - https://gist.github.com/tanprathan/f5133651e438b2ad1b39172d52b56115 -CVE-2018-13435 - https://gist.github.com/tanprathan/19165c43ade898ab8b664098fb171f49 -CVE-2018-13439 - https://packetstormsecurity.com/files/148390/WeChat-Pay-SDK-XXE-Injection.html -CVE-2018-13440 - https://github.com/mpruett/audiofile/issues/49 -CVE-2018-13441 - https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8 -CVE-2018-13441 - https://www.exploit-db.com/exploits/45082/ -CVE-2018-13442 - https://labs.nettitude.com/blog/cve-2018-13442-solarwinds-npm-sql-injection/ -CVE-2018-13444 - https://github.com/MichaelWayneLIU/seacms/blob/master/seacms1.md -CVE-2018-13445 - https://github.com/MichaelWayneLIU/seacms/blob/master/seacms1.md -CVE-2018-13457 - https://gist.github.com/fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab -CVE-2018-13457 - https://www.exploit-db.com/exploits/45082/ -CVE-2018-13458 - https://gist.github.com/fakhrizulkifli/40f3daf52950cca6de28ebec2498ff6e -CVE-2018-13458 - https://www.exploit-db.com/exploits/45082/ -CVE-2018-13464 - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/t_swap -CVE-2018-1351 - https://fortiguard.com/advisory/FG-IR-18-006 -CVE-2018-1354 - https://fortiguard.com/advisory/FG-IR-18-014 -CVE-2018-1355 - https://fortiguard.com/advisory/FG-IR-18-022 -CVE-2018-13784 - https://www.exploit-db.com/exploits/45046/ -CVE-2018-13784 - https://www.exploit-db.com/exploits/45047/ -CVE-2018-13785 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-13787 - https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/ -CVE-2018-13800 - https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf -CVE-2018-13818 - https://www.exploit-db.com/exploits/44102/ -CVE-2018-13832 - https://hackpuntes.com/cve-2018-13832-wordpress-plugin-all-in-one-favicon-4-6-autenticado-multiples-cross-site-scripting-persistentes/ -CVE-2018-13832 - https://www.exploit-db.com/exploits/45056/ -CVE-2018-13849 - https://cxsecurity.com/issue/WLB-2018070095 -CVE-2018-13849 - https://www.exploit-db.com/exploits/45003/ -CVE-2018-13850 - https://cxsecurity.com/issue/WLB-2018070096 -CVE-2018-13859 - https://www.exploit-db.com/exploits/45088/ -CVE-2018-13862 - https://www.exploit-db.com/exploits/45063/ -CVE-2018-13863 - https://snyk.io/vuln/npm:bson:20180225 -CVE-2018-13866 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13867 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13868 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13869 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13870 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13871 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13872 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13873 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13874 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13875 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13876 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 -CVE-2018-13877 - https://medium.com/coinmonks/denial-of-service-dos-attack-on-megacryptopolis-an-ethereum-game-cve-2018-13877-cdd7f7ef8b08 -CVE-2018-13885 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13885 -CVE-2018-13886 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13886 -CVE-2018-13887 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13887 -CVE-2018-13888 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13895 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13895 -CVE-2018-13896 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13898 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13901 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13902 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13903 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2018-13904 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13906 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13907 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13908 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13909 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-1391 - http://www.ibm.com/support/docview.wss?uid=swg22013247 -CVE-2018-13910 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13911 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13916 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2018-13918 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13924 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13925 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13925 -CVE-2018-13927 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-13980 - http://packetstormsecurity.com/files/148537/Zeta-Producer-Desktop-CMS-14.2.0-Code-Execution-File-Disclosure.html -CVE-2018-13980 - https://www.exploit-db.com/exploits/45016/ -CVE-2018-13981 - http://packetstormsecurity.com/files/148537/Zeta-Producer-Desktop-CMS-14.2.0-Code-Execution-File-Disclosure.html -CVE-2018-13981 - https://www.exploit-db.com/exploits/45016/ -CVE-2018-13982 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal -CVE-2018-13983 - http://packetstormsecurity.com/files/150990/ImpressCMS-1.3.10-Cross-Site-Scripting.html -CVE-2018-13988 - http://packetstormsecurity.com/files/148661/PDFunite-0.62.0-Buffer-Overflow.html -CVE-2018-13989 - https://packetstormsecurity.com/files/148453/Grundig-Smart-Inter-ctive-3.0-Insecure-Direct-Object-Reference.html -CVE-2018-13989 - https://www.exploit-db.com/exploits/45022/ -CVE-2018-14008 - https://www.arista.com/en/support/advisories-notices -CVE-2018-14009 - http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html -CVE-2018-14010 - https://github.com/cc-crack/router/blob/master/CNVD-2018-04521.py -CVE-2018-14012 - https://www.exploit-db.com/exploits/44997/ -CVE-2018-14013 - http://packetstormsecurity.com/files/151472/Zimbra-Collaboration-Cross-Site-Scripting.html -CVE-2018-14013 - http://seclists.org/fulldisclosure/2019/Feb/3 -CVE-2018-14013 - http://www.openwall.com/lists/oss-security/2019/01/30/1 -CVE-2018-14014 - https://github.com/caokang/waimai/issues/2 -CVE-2018-14015 - https://github.com/radare/radare2/issues/10465 -CVE-2018-14016 - https://github.com/radare/radare2/issues/10464 -CVE-2018-14017 - https://github.com/radare/radare2/issues/10498 -CVE-2018-14020 - https://oxidforge.org/en/security-bulletin-2018-003.html -CVE-2018-14023 - http://n0sign4l.blogspot.com/2018/08/advisory-id-n0sign4l-002-risk-level-4-5.html?m=1 -CVE-2018-14023 - https://www.youtube.com/watch?v=oSJscEei5SE&app=desktop -CVE-2018-14029 - https://github.com/Creatiwity/wityCMS/issues/153 -CVE-2018-14029 - https://www.exploit-db.com/exploits/45127/ -CVE-2018-14037 - http://seclists.org/fulldisclosure/2018/Sep/49 -CVE-2018-14037 - http://seclists.org/fulldisclosure/2018/Sep/50 -CVE-2018-14037 - https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ -CVE-2018-14040 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html -CVE-2018-14040 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -CVE-2018-14040 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2018-14040 - https://seclists.org/bugtraq/2019/May/18 -CVE-2018-14040 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-14041 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html -CVE-2018-14041 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -CVE-2018-14041 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2018-14041 - https://seclists.org/bugtraq/2019/May/18 -CVE-2018-14041 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-14042 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -CVE-2018-14042 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2018-14042 - https://seclists.org/bugtraq/2019/May/18 -CVE-2018-14042 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-14044 - https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/readme.md -CVE-2018-14045 - https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/readme.md -CVE-2018-14046 - https://github.com/Exiv2/exiv2/issues/378 -CVE-2018-14048 - http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html -CVE-2018-14048 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-14054 - http://www.openwall.com/lists/oss-security/2018/07/13/1 -CVE-2018-14057 - http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html -CVE-2018-14057 - http://seclists.org/fulldisclosure/2018/Aug/13 -CVE-2018-14057 - https://www.exploit-db.com/exploits/45208/ -CVE-2018-14057 - https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ -CVE-2018-14058 - http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html -CVE-2018-14058 - http://seclists.org/fulldisclosure/2018/Aug/13 -CVE-2018-14058 - https://www.exploit-db.com/exploits/45208/ -CVE-2018-14058 - https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ -CVE-2018-14059 - http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html -CVE-2018-14059 - http://seclists.org/fulldisclosure/2018/Aug/13 -CVE-2018-14059 - https://www.exploit-db.com/exploits/45208/ -CVE-2018-14059 - https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ -CVE-2018-14060 - https://github.com/cc-crack/router/blob/master/CNVD-2018-04520.py -CVE-2018-14064 - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac -CVE-2018-14064 - https://www.exploit-db.com/exploits/45030/ -CVE-2018-14068 - https://github.com/martinzhou2015/SRCMS/issues/20 -CVE-2018-14069 - https://github.com/martinzhou2015/SRCMS/issues/20 -CVE-2018-14082 - https://gkaim.com/cve-2018-14082-vikas-chaudhary/ -CVE-2018-14082 - https://www.exploit-db.com/exploits/45141/ -CVE-2018-1418 - https://www.exploit-db.com/exploits/45005/ -CVE-2018-1429 - http://www.securityfocus.com/bid/103491 -CVE-2018-14325 - http://www.openwall.com/lists/oss-security/2018/07/16/1 -CVE-2018-14326 - http://www.openwall.com/lists/oss-security/2018/07/16/1 -CVE-2018-14327 - http://packetstormsecurity.com/files/149492/EE-4GEE-Mini-Local-Privilege-Escalation.html -CVE-2018-14327 - https://www.exploit-db.com/exploits/45501/ -CVE-2018-14328 - https://cxsecurity.com/issue/WLB-2018070175 -CVE-2018-14328 - https://www.exploit-db.com/exploits/45094/ -CVE-2018-14333 - https://github.com/vah13/extractTVpasswords -CVE-2018-14335 - https://www.exploit-db.com/exploits/45105/ -CVE-2018-14336 - https://www.exploit-db.com/exploits/45064/ -CVE-2018-14364 - https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 -CVE-2018-14366 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 -CVE-2018-14379 - http://www.openwall.com/lists/oss-security/2018/07/17/1 -CVE-2018-14382 - https://github.com/instantsoft/icms2/issues/892 -CVE-2018-14384 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-005 -CVE-2018-14387 - https://github.com/robiso/wondercms/issues/64 -CVE-2018-14388 - https://github.com/joyplus/joyplus-cms/issues/429 -CVE-2018-14392 - https://www.exploit-db.com/exploits/45057/ -CVE-2018-14401 - https://github.com/jjanier/axml/issues/1 -CVE-2018-14402 - https://github.com/ytsutano/axmldec/issues/4 -CVE-2018-14403 - http://www.openwall.com/lists/oss-security/2018/07/18/3 -CVE-2018-14417 - http://seclists.org/fulldisclosure/2018/Jul/85 -CVE-2018-14417 - https://docs.softnas.com/display/SD/Release+Notes -CVE-2018-14417 - https://www.coresecurity.com/advisories/softnas-cloud-os-command-injection -CVE-2018-14417 - https://www.exploit-db.com/exploits/45097/ -CVE-2018-14418 - https://www.exploit-db.com/exploits/45062/ -CVE-2018-14420 - https://github.com/AvaterXXX/Metinfo---XSS/blob/master/CSRF -CVE-2018-14424 - https://usn.ubuntu.com/3737-1/ -CVE-2018-14429 - http://packetstormsecurity.com/files/148855/man-cgi-Local-File-Inclusion.html -CVE-2018-14430 - https://hackpuntes.com/cve-2018-14430-wordpress-plugin-multi-step-form-125-multiples-xss-reflejados/ -CVE-2018-14430 - https://wpvulndb.com/vulnerabilities/9106 -CVE-2018-14443 - https://github.com/ArchimedesCAD/libredwg/issues/6 -CVE-2018-14445 - https://github.com/axiomatic-systems/Bento4/issues/289 -CVE-2018-14446 - https://github.com/TechSmith/mp4v2/issues/20 -CVE-2018-14447 - https://github.com/martinh/libconfuse/issues/109 -CVE-2018-14448 - https://github.com/ponchio/untrunc/issues/131 -CVE-2018-14471 - https://github.com/LibreDWG/libredwg/issues/32 -CVE-2018-14472 - https://github.com/wuzhicms/wuzhicms/issues/144 -CVE-2018-14473 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ -CVE-2018-14476 - http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html -CVE-2018-14478 - http://packetstormsecurity.com/files/151306/Coppermine-1.5.46-Cross-Site-Scripting.html -CVE-2018-14481 - http://packetstormsecurity.com/files/150643/OSclass-3.7.4-Cross-Site-Scripting.html -CVE-2018-14485 - http://packetstormsecurity.com/files/151063/BlogEngine-3.3-XML-External-Entity-Injection.html -CVE-2018-14485 - https://www.exploit-db.com/exploits/46106/ -CVE-2018-14486 - http://packetstormsecurity.com/files/151304/DNN-9.1-XML-Related-Cross-Site-Scripting.html -CVE-2018-14486 - http://www.dnnsoftware.com/community/security/security-center -CVE-2018-1449 - http://www.ibm.com/support/docview.wss?uid=swg22016181 -CVE-2018-14492 - https://github.com/ZIllR0/Routers/blob/master/Tendaoob1.md -CVE-2018-14493 - https://docs.google.com/document/d/1K3G6a8P_LhYdk5Ddn57Z2aDUpaGAS7I_F8lESVfSFfY/edit -CVE-2018-14493 - https://www.exploit-db.com/exploits/45160/ -CVE-2018-14497 - https://www.exploit-db.com/exploits/45336/ -CVE-2018-14498 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258 -CVE-2018-14498 - https://github.com/mozilla/mozjpeg/issues/299 -CVE-2018-1450 - http://www.ibm.com/support/docview.wss?uid=swg22016181 -CVE-2018-14502 - https://wpvulndb.com/vulnerabilities/9112 -CVE-2018-14505 - https://github.com/mitmproxy/mitmproxy/issues/3234 -CVE-2018-1451 - http://www.ibm.com/support/docview.wss?uid=swg22016181 -CVE-2018-14512 - https://github.com/wuzhicms/wuzhicms/issues/143 -CVE-2018-14513 - https://github.com/wuzhicms/wuzhicms/issues/145 -CVE-2018-14515 - https://github.com/wuzhicms/wuzhicms/issues/146 -CVE-2018-14517 - https://github.com/SecWiki/CMS-Hunter/blob/master/seacms/seacms6.61/seacms661.md -CVE-2018-14519 - https://www.exploit-db.com/exploits/45090 -CVE-2018-1452 - http://www.ibm.com/support/docview.wss?uid=swg22016181 -CVE-2018-14520 - https://www.exploit-db.com/exploits/45068 -CVE-2018-14524 - https://github.com/LibreDWG/libredwg/issues/33 -CVE-2018-14533 - https://neonsea.uk/blog/2018/07/21/tmp-to-rce.html -CVE-2018-14533 - https://www.exploit-db.com/exploits/45089/ -CVE-2018-14541 - https://gkaim.com/cve-2018-14541-vikas-chaudhary/ -CVE-2018-14541 - https://www.exploit-db.com/exploits/45140/ -CVE-2018-14543 - https://github.com/axiomatic-systems/Bento4/issues/292 -CVE-2018-14544 - https://github.com/axiomatic-systems/Bento4/issues/291 -CVE-2018-14545 - https://github.com/axiomatic-systems/Bento4/issues/291 -CVE-2018-14550 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-14550 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-14551 - https://github.com/ImageMagick/ImageMagick/issues/1221 -CVE-2018-14557 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-03/Tenda.md -CVE-2018-14558 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-01/Tenda.md -CVE-2018-14559 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md -CVE-2018-14568 - https://github.com/kirillwow/ids_bypass -CVE-2018-14568 - https://redmine.openinfosecfoundation.org/issues/2501 -CVE-2018-14570 - https://github.com/GitHaaH/issue/blob/master/Niushop.md -CVE-2018-14572 - https://github.com/PyconUK/ConferenceScheduler-cli/issues/19 -CVE-2018-14572 - https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/ -CVE-2018-14575 - http://packetstormsecurity.com/files/151704/MyBB-Trash-Bin-1.1.3-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2018-14575 - https://www.exploit-db.com/exploits/46384/ -CVE-2018-14582 - https://github.com/bagesoft/bagecms/issues/2 -CVE-2018-14584 - https://github.com/axiomatic-systems/Bento4/issues/298 -CVE-2018-14592 - https://www.exploit-db.com/exploits/45447/ -CVE-2018-14605 - https://gitlab.com/gitlab-org/gitlab-ce/issues/47793 -CVE-2018-14606 - https://gitlab.com/gitlab-org/gitlab-ce/issues/48617 -CVE-2018-14609 - https://usn.ubuntu.com/3821-1/ -CVE-2018-14609 - https://usn.ubuntu.com/3821-2/ -CVE-2018-14609 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14610 - https://bugzilla.kernel.org/show_bug.cgi?id=199837 -CVE-2018-14610 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14611 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14612 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14613 - https://bugzilla.kernel.org/show_bug.cgi?id=199849 -CVE-2018-14613 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14613 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-14614 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14615 - https://bugzilla.kernel.org/show_bug.cgi?id=200421 -CVE-2018-14615 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14616 - https://bugzilla.kernel.org/show_bug.cgi?id=200465 -CVE-2018-14616 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14617 - https://bugzilla.kernel.org/show_bug.cgi?id=200297 -CVE-2018-14617 - https://usn.ubuntu.com/3821-1/ -CVE-2018-14617 - https://usn.ubuntu.com/3821-2/ -CVE-2018-14617 - https://usn.ubuntu.com/4118-1/ -CVE-2018-14629 - https://usn.ubuntu.com/3827-2/ -CVE-2018-14630 - https://seclists.org/fulldisclosure/2018/Sep/28 -CVE-2018-14630 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-unserialize-moodle-open-source-learning-platform-cve-2018-14630/ -CVE-2018-14633 - https://usn.ubuntu.com/3777-1/ -CVE-2018-14633 - https://usn.ubuntu.com/3777-3/ -CVE-2018-14634 - http://www.openwall.com/lists/oss-security/2021/07/20/2 -CVE-2018-14634 - https://www.exploit-db.com/exploits/45516/ -CVE-2018-14634 - https://www.openwall.com/lists/oss-security/2018/09/25/4 -CVE-2018-14665 - http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html -CVE-2018-14665 - http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html -CVE-2018-14665 - https://www.exploit-db.com/exploits/45697/ -CVE-2018-14665 - https://www.exploit-db.com/exploits/45742/ -CVE-2018-14665 - https://www.exploit-db.com/exploits/45832/ -CVE-2018-14665 - https://www.exploit-db.com/exploits/45908/ -CVE-2018-14665 - https://www.exploit-db.com/exploits/45922/ -CVE-2018-14665 - https://www.exploit-db.com/exploits/45938/ -CVE-2018-14665 - https://www.exploit-db.com/exploits/46142/ -CVE-2018-14667 - http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html -CVE-2018-14685 - https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 -CVE-2018-14686 - https://github.com/TonyKentClark/MyCodeAudit/blob/master/xycms%20%20v1.7 -CVE-2018-14688 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ -CVE-2018-14689 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ -CVE-2018-14690 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ -CVE-2018-14691 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ -CVE-2018-14695 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14696 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14697 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14698 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14699 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14700 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14701 - http://packetstormsecurity.com/files/156710/Drobo-5N2-4.1.1-Remote-Command-Injection.html -CVE-2018-14701 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14702 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14703 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14704 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14705 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14705 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -CVE-2018-14706 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14707 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14708 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14709 - http://packetstormsecurity.com/files/156710/Drobo-5N2-4.1.1-Remote-Command-Injection.html -CVE-2018-14709 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -CVE-2018-14710 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 -CVE-2018-14711 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 -CVE-2018-14712 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 -CVE-2018-14713 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 -CVE-2018-14714 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 -CVE-2018-14715 - https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-cryptogs-an-ethereum-cve-2018-14715-f63a51ac2eb9 -CVE-2018-14716 - http://ha.cker.info/exploitation-of-server-side-template-injection-with-craft-cms-plguin-seomatic/ -CVE-2018-14716 - https://www.exploit-db.com/exploits/45108/ -CVE-2018-14718 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-14718 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-14718 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-14718 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-14718 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-14719 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-14719 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-14719 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-14720 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-14720 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-14720 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-14721 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-14721 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-14721 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-14722 - https://bugzilla.suse.com/show_bug.cgi?id=1102721 -CVE-2018-14724 - https://www.exploit-db.com/exploits/46347 -CVE-2018-14728 - http://packetstormsecurity.com/files/148742/Responsive-Filemanager-9.13.1-Server-Side-Request-Forgery.html -CVE-2018-14728 - https://www.exploit-db.com/exploits/45103/ -CVE-2018-14731 - https://github.com/parcel-bundler/parcel/pull/1794 -CVE-2018-14745 - https://pastebin.com/tmFrECnZ -CVE-2018-14745 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-14773 - https://www.drupal.org/SA-CORE-2018-005 -CVE-2018-14777 - https://cxsecurity.com/issue/WLB-2018080003 -CVE-2018-14804 - http://www.securityfocus.com/bid/105406 -CVE-2018-14808 - http://www.securityfocus.com/bid/105406 -CVE-2018-14836 - https://github.com/intelliants/subrion/issues/762 -CVE-2018-14838 - https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1 -CVE-2018-14839 - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 -CVE-2018-14840 - https://www.exploit-db.com/exploits/45150/ -CVE-2018-14846 - https://ansawaf.blogspot.com/2018/10/cve-2018-14846-multiple-stored-xss-in.html -CVE-2018-14846 - https://cwatch.comodo.com/blog/website-security/vulnerability-found-in-multiple-stored-xss-form-in-wordpress-version-1-2-5/ -CVE-2018-14846 - https://wpvulndb.com/vulnerabilities/9186 -CVE-2018-14847 - https://github.com/BasuCert/WinboxPoC -CVE-2018-14847 - https://github.com/BigNerd95/WinboxExploit -CVE-2018-14847 - https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf -CVE-2018-14847 - https://github.com/tenable/routeros/tree/master/poc/bytheway -CVE-2018-14847 - https://github.com/tenable/routeros/tree/master/poc/cve_2018_14847 -CVE-2018-14847 - https://www.exploit-db.com/exploits/45578/ -CVE-2018-14851 - https://bugs.php.net/bug.php?id=76557 -CVE-2018-14851 - https://hackerone.com/reports/384214 -CVE-2018-14867 - https://github.com/odoo/odoo/commits/master -CVE-2018-14868 - https://github.com/odoo/odoo/commits/master -CVE-2018-14869 - https://www.exploit-db.com/exploits/45143/ -CVE-2018-14874 - https://neetech18.blogspot.com/2019/03/error-based-sql-injection-vulnerability.html -CVE-2018-14875 - https://neetech18.blogspot.com/2019/03/reflected-xss-vulnerability-in-polaris.html -CVE-2018-14883 - https://hackerone.com/reports/384477 -CVE-2018-14884 - https://bugs.php.net/bug.php?id=75535 -CVE-2018-14885 - https://github.com/odoo/odoo/commits/master -CVE-2018-14886 - https://github.com/odoo/odoo/commits/master -CVE-2018-14887 - https://github.com/odoo/odoo/commits/master -CVE-2018-14888 - http://packetstormsecurity.com/files/148871/MyBB-Thank-You-Like-3.0.0-Cross-Site-Scripting.html -CVE-2018-14888 - https://www.exploit-db.com/exploits/45178/ -CVE-2018-14892 - https://blog.securityevaluators.com/ise-labs-finds-vulnerabilities-in-zyxel-nsa325-945481a699b8 -CVE-2018-14893 - https://blog.securityevaluators.com/ise-labs-finds-vulnerabilities-in-zyxel-nsa325-945481a699b8 -CVE-2018-14894 - http://packetstormsecurity.com/files/152489/CyberArk-EPM-10.2.1.603-Security-Restrictions-Bypass.html -CVE-2018-14894 - https://mustafakemalcan.com/cyberark-epm-file-block-bypass-cve-2018-14894/ -CVE-2018-14894 - https://www.exploit-db.com/exploits/46688/ -CVE-2018-14894 - https://www.youtube.com/watch?v=B0VpK0poTco -CVE-2018-14904 - https://medium.com/stolabs/security-issues-on-samsung-syncthru-web-service-cc86467d2df -CVE-2018-14905 - https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 -CVE-2018-14906 - https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 -CVE-2018-14907 - https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 -CVE-2018-14908 - https://medium.com/stolabs/security-issues-on-samsung-syncthru-web-service-cc86467d2df -CVE-2018-14911 - https://github.com/yxcmf/ukcms/issues/1 -CVE-2018-14912 - https://www.exploit-db.com/exploits/45195/ -CVE-2018-14916 - http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html -CVE-2018-14916 - http://seclists.org/fulldisclosure/2019/Apr/12 -CVE-2018-14916 - https://seclists.org/fulldisclosure/2019/Apr/12 -CVE-2018-14918 - http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html -CVE-2018-14918 - http://seclists.org/fulldisclosure/2019/Apr/12 -CVE-2018-14918 - https://seclists.org/fulldisclosure/2019/Apr/12 -CVE-2018-14919 - http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html -CVE-2018-14919 - http://seclists.org/fulldisclosure/2019/Apr/12 -CVE-2018-14919 - https://seclists.org/fulldisclosure/2019/Apr/12 -CVE-2018-14922 - http://packetstormsecurity.com/files/148836/Monstra-Dev-3.0.4-Cross-Site-Scripting.html -CVE-2018-14922 - https://www.exploit-db.com/exploits/45156/ -CVE-2018-14924 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 -CVE-2018-14925 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 -CVE-2018-14926 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 -CVE-2018-14927 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 -CVE-2018-14928 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 -CVE-2018-14929 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 -CVE-2018-14930 - https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software.html -CVE-2018-14931 - https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html -CVE-2018-14933 - https://www.exploit-db.com/exploits/45070/ -CVE-2018-14933 - https://www.exploit-db.com/exploits/46340/ -CVE-2018-14956 - http://packetstormsecurity.com/files/149571/CMS-ISWEB-3.5.3-SQL-Injection.html -CVE-2018-14956 - https://cxsecurity.com/issue/WLB-2018090249 -CVE-2018-14957 - https://cxsecurity.com/issue/WLB-2018090248 -CVE-2018-14958 - https://github.com/alterebro/WeaselCMS/issues/6 -CVE-2018-14959 - https://github.com/alterebro/WeaselCMS/issues/6 -CVE-2018-14961 - https://blog.csdn.net/weixin_42813492/article/details/81240523 -CVE-2018-14961 - https://github.com/AvaterXXX/ZZCMS/blob/master/README.md -CVE-2018-14962 - https://github.com/AvaterXXX/ZZCMS/blob/master/README.md -CVE-2018-14963 - https://github.com/AvaterXXX/ZZCMS/blob/master/README.md -CVE-2018-15120 - https://www.exploit-db.com/exploits/45263 -CVE-2018-15120 - https://www.exploit-db.com/exploits/45263/ -CVE-2018-15126 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/ -CVE-2018-15127 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/ -CVE-2018-15129 - https://github.com/thinksaas/ThinkSAAS/issues/16 -CVE-2018-1513 - https://www.exploit-db.com/exploits/45190/ -CVE-2018-15130 - https://github.com/thinksaas/ThinkSAAS/issues/18 -CVE-2018-15133 - http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html -CVE-2018-15136 - https://www.fwhibbit.es/bypassing-spam-titan-my-first-cve -CVE-2018-15137 - https://github.com/safakaslan/CelaLinkCLRM20/issues/1 -CVE-2018-15137 - https://www.exploit-db.com/exploits/45021/ -CVE-2018-15138 - https://www.exploit-db.com/exploits/45167/ -CVE-2018-15139 - http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html -CVE-2018-15139 - http://packetstormsecurity.com/files/163482/OpenEMR-5.0.1.3-Shell-Upload.html -CVE-2018-15139 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15140 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15140 - https://www.exploit-db.com/exploits/45202/ -CVE-2018-15141 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15141 - https://www.exploit-db.com/exploits/45202/ -CVE-2018-15142 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15142 - https://www.exploit-db.com/exploits/45202/ -CVE-2018-15143 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15144 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15145 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15146 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15147 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15148 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15149 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15150 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15151 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15152 - http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html -CVE-2018-15152 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15153 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15153 - https://www.exploit-db.com/exploits/45161/ -CVE-2018-15154 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15155 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15156 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ -CVE-2018-15157 - https://github.com/libyal/libfsclfs/issues/3 -CVE-2018-15158 - https://github.com/libyal/libesedb/issues/43 -CVE-2018-15159 - https://github.com/libyal/libesedb/issues/43 -CVE-2018-15160 - https://github.com/libyal/libesedb/issues/43 -CVE-2018-15161 - https://github.com/libyal/libesedb/issues/43 -CVE-2018-15168 - https://github.com/x-f1v3/ForCve/issues/2 -CVE-2018-15169 - https://github.com/x-f1v3/ForCve/issues/3 -CVE-2018-15172 - https://www.exploit-db.com/exploits/45203/ -CVE-2018-15173 - http://code610.blogspot.com/2018/07/crashing-nmap-760.html -CVE-2018-15173 - http://code610.blogspot.com/2018/07/crashing-nmap-770.html -CVE-2018-15174 - http://code610.blogspot.com/2018/08/updating-xnview.html -CVE-2018-15175 - http://code610.blogspot.com/2018/08/updating-xnview.html -CVE-2018-15176 - http://code610.blogspot.com/2018/08/updating-xnview.html -CVE-2018-15178 - https://github.com/gogs/gogs/issues/5364 -CVE-2018-15181 - https://gkaim.com/cve-2018-15181-vikas-chaudhary/ -CVE-2018-15181 - https://www.exploit-db.com/exploits/45199/ -CVE-2018-15182 - https://gkaim.com/cve-2018-15182-vikas-chaudhary/ -CVE-2018-15183 - https://gkaim.com/cve-2018-15183-vikas-chaudhary/ -CVE-2018-15184 - https://gkaim.com/cve-2018-15184-vikas-chaudhary/ -CVE-2018-15185 - https://gkaim.com/cve-2018-15185-vikas-chaudhary/ -CVE-2018-15186 - https://gkaim.com/cve-2018-15186-vikas-chaudhary/ -CVE-2018-15187 - https://gkaim.com/cve-2018-15187-vikas-chaudhary/ -CVE-2018-15188 - https://gkaim.com/cve-2018-15188-vikas-chaudhary/ -CVE-2018-15189 - https://gkaim.com/cve-2018-15189-vikas-chaudhary/ -CVE-2018-15190 - https://gkaim.com/cve-2018-15190-vikas-chaudhary/ -CVE-2018-15191 - https://gkaim.com/cve-2018-15191-vikas-chaudhary/ -CVE-2018-15197 - https://github.com/liu21st/onethink/issues/36 -CVE-2018-15198 - https://github.com/liu21st/onethink/issues/36 -CVE-2018-15202 - https://github.com/Juunan06/eCommerce/issues/1 -CVE-2018-15203 - https://github.com/ignitedcms/ignitedcms/issues/4 -CVE-2018-15206 - https://neetech18.blogspot.com/2019/03/cross-site-request-forgery-smartvista.html -CVE-2018-15207 - https://neetech18.blogspot.com/2019/03/incorrect-access-control-smart-vista.html -CVE-2018-15208 - https://neetech18.blogspot.com/2019/03/session-fixation-smart-vista-svfe-2.html -CVE-2018-15209 - http://bugzilla.maptools.org/show_bug.cgi?id=2808 -CVE-2018-15361 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/ -CVE-2018-15365 - https://github.com/nixwizard/CVE-2018-15365/ -CVE-2018-15378 - https://bugzilla.clamav.net/show_bug.cgi?id=12170 -CVE-2018-15379 - https://www.exploit-db.com/exploits/45555/ -CVE-2018-15437 - https://www.exploit-db.com/exploits/45829/ -CVE-2018-15442 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection -CVE-2018-15442 - https://www.exploit-db.com/exploits/45695/ -CVE-2018-15442 - https://www.exploit-db.com/exploits/45696/ -CVE-2018-15444 - https://www.tenable.com/security/research/tra-2018-36 -CVE-2018-15445 - https://www.tenable.com/security/research/tra-2018-36 -CVE-2018-15465 - https://www.tenable.com/security/research/tra-2018-46 -CVE-2018-15471 - https://usn.ubuntu.com/3820-1/ -CVE-2018-15473 - https://www.exploit-db.com/exploits/45210/ -CVE-2018-15473 - https://www.exploit-db.com/exploits/45233/ -CVE-2018-15473 - https://www.exploit-db.com/exploits/45939/ -CVE-2018-15473 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-15474 - https://github.com/splitbrain/dokuwiki/issues/2450 -CVE-2018-15474 - https://seclists.org/fulldisclosure/2018/Sep/4 -CVE-2018-15474 - https://www.sec-consult.com/en/blog/advisories/dokuwiki-csv-formula-injection-vulnerability/ -CVE-2018-15483 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html -CVE-2018-15484 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html -CVE-2018-15485 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html -CVE-2018-15486 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html -CVE-2018-15490 - https://medium.com/@Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47 -CVE-2018-15491 - https://github.com/mspaling/zemana-exclusions-poc/blob/master/zemana-whitelist-poc.txt -CVE-2018-15493 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-017.txt -CVE-2018-15499 - https://github.com/DownWithUp/CVE-2018-15499 -CVE-2018-15503 - https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/ -CVE-2018-15508 - https://0tkombo.wixsite.com/0tkombo/blog/five9-dos-websocket-access -CVE-2018-15509 - https://0tkombo.wixsite.com/0tkombo/blog/five9-dos-websocket-access -CVE-2018-15514 - https://docs.docker.com/docker-for-windows/release-notes/ -CVE-2018-15514 - https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html -CVE-2018-15515 - http://packetstormsecurity.com/files/150244/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-DLL-Hijacking.html -CVE-2018-15515 - http://seclists.org/fulldisclosure/2018/Nov/29 -CVE-2018-15516 - http://packetstormsecurity.com/files/150242/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-Man-In-The-Middle.html -CVE-2018-15516 - http://seclists.org/fulldisclosure/2018/Nov/27 -CVE-2018-15517 - http://packetstormsecurity.com/files/150243/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-Server-Side-Request-Forgery.html -CVE-2018-15517 - http://seclists.org/fulldisclosure/2018/Nov/28 -CVE-2018-15528 - http://packetstormsecurity.com/files/149007/BMC-MyIT-Java-System-Solutions-SSO-Plugin-4.0.13.1-Cross-Site-Scripting.html -CVE-2018-15528 - http://seclists.org/bugtraq/2018/Aug/41 -CVE-2018-15529 - http://packetstormsecurity.com/files/149065/Mutiny-Monitoring-Appliance-Command-Injection.html -CVE-2018-15530 - https://ysec.ch/?p=94 -CVE-2018-15533 - http://packetstormsecurity.com/files/149003/Geutebruck-re_porter-16-Cross-Site-Scripting.html -CVE-2018-15533 - https://www.exploit-db.com/exploits/45242/ -CVE-2018-15534 - http://packetstormsecurity.com/files/149002/Geutebruck-re_porter-16-Credential-Disclosure.html -CVE-2018-15534 - https://www.exploit-db.com/exploits/45240/ -CVE-2018-15535 - https://www.exploit-db.com/exploits/45271/ -CVE-2018-15536 - https://www.exploit-db.com/exploits/45271/ -CVE-2018-15537 - http://packetstormsecurity.com/files/150330/OCS-Inventory-NG-ocsreports-Shell-Upload.html -CVE-2018-15537 - http://seclists.org/fulldisclosure/2018/Nov/40 -CVE-2018-15542 - https://gist.github.com/tanprathan/18d0f692a2485acfb5693e2f6dabeb5d -CVE-2018-15543 - https://gist.github.com/tanprathan/d286c0d5b02e344606287774304a1ccd -CVE-2018-15555 - http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html -CVE-2018-15555 - http://seclists.org/fulldisclosure/2019/Jun/1 -CVE-2018-15556 - http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html -CVE-2018-15556 - http://seclists.org/fulldisclosure/2019/Jun/1 -CVE-2018-15557 - http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html -CVE-2018-15557 - http://seclists.org/fulldisclosure/2019/Jun/2 -CVE-2018-15560 - https://github.com/Legrandin/pycryptodome/issues/198 -CVE-2018-15562 - http://packetstormsecurity.com/files/149109/CMS-ISWEB-3.5.3-Cross-Site-Scripting.html -CVE-2018-15563 - https://cxsecurity.com/issue/WLB-2018090261 -CVE-2018-15565 - https://github.com/daveismyname/simple-cms/issues/3 -CVE-2018-15568 - https://github.com/fmsdwifull/tp5cms/issues/3 -CVE-2018-15571 - https://hackpuntes.com/cve-2018-15571-wordpress-plugin-export-users-to-csv-1-1-1-csv-injection/ -CVE-2018-15571 - https://www.exploit-db.com/exploits/45206/ -CVE-2018-15572 - https://usn.ubuntu.com/3777-1/ -CVE-2018-15572 - https://usn.ubuntu.com/3777-3/ -CVE-2018-15573 - http://seclists.org/fulldisclosure/2021/Dec/18 -CVE-2018-15576 - http://packetstormsecurity.com/files/149018/Easylogin-Pro-1.3.0-Remote-Code-Execution.html -CVE-2018-15576 - https://www.exploit-db.com/exploits/45227/ -CVE-2018-15582 - https://github.com/gnuboard/gnuboard5/commit/b1fc952c7600b825c4b02e2789ddafdea18c8d13#diff-72e9a967d5cebb96734e6f6984091e66 -CVE-2018-15586 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-15587 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-15587 - https://bugzilla.gnome.org/show_bug.cgi?id=796424 -CVE-2018-15588 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-15588 - https://updates.mailmate-app.com/release_notes -CVE-2018-15590 - http://packetstormsecurity.com/files/149617/Ivanti-Workspace-Control-UNC-Path-Data-Security-Bypass.html -CVE-2018-15590 - http://seclists.org/fulldisclosure/2018/Oct/2 -CVE-2018-15591 - http://packetstormsecurity.com/files/149614/Ivanti-Workspace-Control-Application-PowerGrid-SEE-Whitelist-Bypass.html -CVE-2018-15591 - https://www.securify.nl/en/advisory/SFY20180806/ivanti-workspace-control-application-whitelist-bypass-via-powergrid-_see-command-line-argument.html -CVE-2018-15592 - http://packetstormsecurity.com/files/149615/Ivanti-Workspace-Control-Named-Pipe-Privilege-Escalation.html -CVE-2018-15592 - http://seclists.org/fulldisclosure/2018/Oct/1 -CVE-2018-15593 - http://packetstormsecurity.com/files/149616/Ivanti-Workspace-Control-Registry-Stored-Credentials.html -CVE-2018-15594 - https://usn.ubuntu.com/3777-1/ -CVE-2018-15594 - https://usn.ubuntu.com/3777-3/ -CVE-2018-15596 - https://www.exploit-db.com/exploits/45393/ -CVE-2018-15599 - http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html -CVE-2018-15599 - https://old.reddit.com/r/blackhat/comments/97ywnm/openssh_username_enumeration/e4e05n2/ -CVE-2018-15607 - https://github.com/ImageMagick/ImageMagick/issues/1255 -CVE-2018-15608 - https://www.exploit-db.com/exploits/45254/ -CVE-2018-15610 - https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html -CVE-2018-1563 - https://www.exploit-db.com/exploits/45190/ -CVE-2018-15655 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ -CVE-2018-15656 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ -CVE-2018-15657 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ -CVE-2018-15657 - https://www.exploit-db.com/exploits/46305/ -CVE-2018-15658 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ -CVE-2018-15659 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ -CVE-2018-15671 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5#stack-overflow---stackoverflow_h5p__get_cb -CVE-2018-15676 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15677 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15678 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15679 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15680 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15681 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15682 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15683 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15684 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-15685 - https://www.exploit-db.com/exploits/45272/ -CVE-2018-15686 - https://www.exploit-db.com/exploits/45714/ -CVE-2018-15686 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-15687 - https://www.exploit-db.com/exploits/45715/ -CVE-2018-15691 - https://www.exploit-db.com/exploits/45425/ -CVE-2018-15692 - https://www.kpmg.de/noindex/advisories/KPMG-2018-002.txt -CVE-2018-15693 - https://www.kpmg.de/noindex/advisories/KPMG-2018-001.txt -CVE-2018-15703 - https://www.tenable.com/security/research/tra-2018-33 -CVE-2018-15704 - https://www.tenable.com/security/research/tra-2018-33 -CVE-2018-15705 - https://www.exploit-db.com/exploits/45774/ -CVE-2018-15705 - https://www.tenable.com/security/research/tra-2018-35 -CVE-2018-15706 - https://www.tenable.com/security/research/tra-2018-35 -CVE-2018-15707 - https://www.exploit-db.com/exploits/45774/ -CVE-2018-15707 - https://www.tenable.com/security/research/tra-2018-35 -CVE-2018-15708 - http://packetstormsecurity.com/files/153433/Nagios-XI-Magpie_debug.php-Root-Remote-Code-Execution.html -CVE-2018-15708 - https://www.exploit-db.com/exploits/46221/ -CVE-2018-15708 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15709 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15710 - http://packetstormsecurity.com/files/153433/Nagios-XI-Magpie_debug.php-Root-Remote-Code-Execution.html -CVE-2018-15710 - https://www.exploit-db.com/exploits/46221/ -CVE-2018-15710 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15711 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15712 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15713 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15714 - https://www.tenable.com/security/research/tra-2018-37 -CVE-2018-15715 - https://www.tenable.com/security/research/tra-2018-40 -CVE-2018-15716 - https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716 -CVE-2018-15716 - https://www.exploit-db.com/exploits/45948/ -CVE-2018-15716 - https://www.tenable.com/security/research/tra-2018-41 -CVE-2018-15720 - https://www.tenable.com/security/research/tra-2018-47 -CVE-2018-15721 - https://www.tenable.com/security/research/tra-2018-47 -CVE-2018-15722 - https://www.tenable.com/security/research/tra-2018-47 -CVE-2018-15723 - https://www.tenable.com/security/research/tra-2018-47 -CVE-2018-15726 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 -CVE-2018-15728 - http://seclists.org/bugtraq/2018/Aug/49 -CVE-2018-15729 - https://www.greyhathacker.net -CVE-2018-15730 - https://www.greyhathacker.net -CVE-2018-15731 - https://www.greyhathacker.net -CVE-2018-15732 - https://www.greyhathacker.net -CVE-2018-15733 - https://www.greyhathacker.net -CVE-2018-15734 - https://www.greyhathacker.net -CVE-2018-15735 - https://www.greyhathacker.net -CVE-2018-15736 - https://www.greyhathacker.net -CVE-2018-15737 - https://www.greyhathacker.net -CVE-2018-15738 - https://www.greyhathacker.net -CVE-2018-15740 - http://packetstormsecurity.com/files/149097/ManageEngine-ADManager-Plus-6.5.7-Cross-Site-Scripting.html -CVE-2018-15740 - https://www.exploit-db.com/exploits/45256/ -CVE-2018-15745 - http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt -CVE-2018-15745 - http://packetstormsecurity.com/files/149134/Argus-Surveillance-DVR-4.0.0.0-Directory-Traversal.html -CVE-2018-15745 - https://www.exploit-db.com/exploits/45296/ -CVE-2018-15749 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 -CVE-2018-15752 - https://seclists.org/bugtraq/2018/Oct/3 -CVE-2018-15753 - https://seclists.org/bugtraq/2018/Oct/3 -CVE-2018-15756 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-15756 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-15756 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-15756 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-15756 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-15756 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-15756 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-15764 - https://seclists.org/fulldisclosure/2018/Sep/47 -CVE-2018-15767 - https://www.exploit-db.com/exploits/45852/ -CVE-2018-15768 - https://www.exploit-db.com/exploits/45852/ -CVE-2018-15769 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-15769 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-15769 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-15769 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-15805 - https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c -CVE-2018-15808 - https://versprite.com/advisories/posim-evo-for-windows-2/ -CVE-2018-15811 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html -CVE-2018-15812 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html -CVE-2018-15818 - http://packetstormsecurity.com/files/149981/WordPress-Arforms-3.5.1-Arbitrary-File-Delete.html -CVE-2018-15818 - https://wpvulndb.com/vulnerabilities/9139 -CVE-2018-15819 - https://packetstormsecurity.com/files/152454/EasyIO-30P-Authentication-Bypass-Cross-Site-Scripting.html -CVE-2018-15819 - https://seclists.org/fulldisclosure/2019/Apr/13 -CVE-2018-15820 - https://packetstormsecurity.com/files/152454/EasyIO-30P-Authentication-Bypass-Cross-Site-Scripting.html -CVE-2018-15820 - https://seclists.org/fulldisclosure/2019/Apr/13 -CVE-2018-1583 - http://www.ibm.com/support/docview.wss?uid=swg22016465 -CVE-2018-15832 - https://www.exploit-db.com/exploits/45429/ -CVE-2018-15835 - http://packetstormsecurity.com/files/150284/Android-5.0-Battery-Information-Broadcast-Information-Disclosure.html -CVE-2018-15839 - https://www.exploit-db.com/exploits/45317/ -CVE-2018-15843 - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1293 -CVE-2018-15844 - https://github.com/Vict00r/poc/issues/1 -CVE-2018-15844 - https://www.exploit-db.com/exploits/45314/ -CVE-2018-15845 - https://github.com/gleez/cms/issues/800 -CVE-2018-15845 - https://www.exploit-db.com/exploits/45258/ -CVE-2018-15846 - https://github.com/mattiapazienti/fledrCMS/issues/2 -CVE-2018-15848 - https://github.com/Westbrookadmin/portfolioCMS/issues/1 -CVE-2018-15849 - https://github.com/Westbrookadmin/portfolioCMS/issues/1 -CVE-2018-15850 - https://github.com/redaxo/redaxo4/issues/420 -CVE-2018-15851 - https://github.com/flexocms/flexo1.source/issues/25 -CVE-2018-15852 - https://bkd00r.wordpress.com/2018/08/24/cve-2018-15852-exploit-title-cable-modem-technicolor-tc7200-20-wifi-buffer-overflow/ -CVE-2018-15865 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 -CVE-2018-15870 - https://github.com/libming/libming/issues/122 -CVE-2018-15871 - https://github.com/libming/libming/issues/123 -CVE-2018-15873 - https://hackpuntes.com/cve-2018-15873-sentrifugo-hrms-3-2-blind-sql-injection/ -CVE-2018-15877 - http://packetstormsecurity.com/files/155502/WordPress-Plainview-Activity-Monitor-20161228-Remote-Command-Execution.html -CVE-2018-15877 - http://packetstormsecurity.com/files/163425/WordPress-Plainview-Activity-Monitor-20161228-Remote-Code-Execution.html -CVE-2018-15877 - https://www.exploit-db.com/exploits/45274/ -CVE-2018-15884 - http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html -CVE-2018-15884 - https://www.exploit-db.com/exploits/45264/ -CVE-2018-15890 - https://github.com/frohoff/ysoserial/ -CVE-2018-15893 - https://github.com/wuzhicms/wuzhicms/issues/149 -CVE-2018-15894 - https://github.com/wuzhicms/wuzhicms/issues/150 -CVE-2018-15896 - https://gkaim.com/cve-2018-15896-vikas-chaudhary/ -CVE-2018-15897 - https://gkaim.com/cve-2018-15897-vikas-chaudhary/ -CVE-2018-15898 - http://packetstormsecurity.com/files/149267/Subsonic-Music-Streamer-4.4-For-Android-Improper-Certificate-Validation.html -CVE-2018-15899 - https://github.com/bg5sbk/MiniCMS/issues/21 -CVE-2018-15901 - https://github.com/dhananjay-bajaj/e107_2.1.8_csrf -CVE-2018-15903 - https://seclists.org/fulldisclosure/2018/Oct/12 -CVE-2018-15906 - http://packetstormsecurity.com/files/151473/SolarWinds-Serv-U-FTP-15.1.6-Privilege-Escalation.html -CVE-2018-15906 - http://seclists.org/fulldisclosure/2019/Feb/4 -CVE-2018-15912 - https://lists.manjaro.org/pipermail/manjaro-security/2018-August/000785.html -CVE-2018-15917 - https://github.com/bbalet/jorani/issues/254 -CVE-2018-15917 - https://hackpuntes.com/cve-2018-15917-jorani-leave-management-system-0-6-5-cross-site-scripting-persistente/ -CVE-2018-15917 - https://www.exploit-db.com/exploits/45338/ -CVE-2018-15918 - https://github.com/bbalet/jorani/issues/254 -CVE-2018-15918 - https://hackpuntes.com/cve-2018-15918-jorani-leave-management-system-0-6-5-sql-injection/ -CVE-2018-15918 - https://www.exploit-db.com/exploits/45340/ -CVE-2018-15919 - http://seclists.org/oss-sec/2018/q3/180 -CVE-2018-15961 - https://www.exploit-db.com/exploits/45979/ -CVE-2018-15979 - https://helpx.adobe.com/security/products/acrobat/apsb18-40.html -CVE-2018-15982 - https://www.exploit-db.com/exploits/46051/ -CVE-2018-16042 - https://pdf-insecurity.org/signature/evaluation_2018.html -CVE-2018-16059 - https://cert.vde.com/en-us/advisories/vde-2019-002 -CVE-2018-16059 - https://www.exploit-db.com/exploits/45342/ -CVE-2018-1606 - http://www.ibm.com/support/docview.wss?uid=ibm10738301 -CVE-2018-16060 - http://packetstormsecurity.com/files/164538/Mitsubishi-Electric-INEA-SmartRTU-Source-Code-Disclosure.html -CVE-2018-16061 - http://packetstormsecurity.com/files/164537/Mitsubishi-Electric-INEA-SmartRTU-Cross-Site-Scripting.html -CVE-2018-16071 - https://www.exploit-db.com/exploits/45443/ -CVE-2018-16083 - https://www.exploit-db.com/exploits/45444/ -CVE-2018-16119 - https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day -CVE-2018-1612 - https://www.exploit-db.com/exploits/45005/ -CVE-2018-16130 - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 -CVE-2018-16133 - https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal -CVE-2018-16133 - https://www.exploit-db.com/exploits/45303/ -CVE-2018-16134 - https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Reflected-XSS -CVE-2018-16134 - https://www.exploit-db.com/exploits/45309/ -CVE-2018-16140 - https://sourceforge.net/p/mcj/tickets/28/ -CVE-2018-16141 - https://unothing.github.io/posts/thinkcmfx223/ -CVE-2018-16142 - https://unothing.github.io/posts/phpok48278/ -CVE-2018-16144 - https://seclists.org/fulldisclosure/2018/Sep/3 -CVE-2018-16144 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities -CVE-2018-16145 - https://seclists.org/fulldisclosure/2018/Sep/3 -CVE-2018-16145 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities -CVE-2018-16146 - https://seclists.org/fulldisclosure/2018/Sep/3 -CVE-2018-16146 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities -CVE-2018-16147 - https://seclists.org/fulldisclosure/2018/Sep/3 -CVE-2018-16147 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities -CVE-2018-16148 - https://seclists.org/fulldisclosure/2018/Sep/3 -CVE-2018-16148 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities -CVE-2018-16149 - https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c -CVE-2018-16149 - https://sourceforge.net/p/axtls/mailman/message/36459928/ -CVE-2018-16150 - https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c -CVE-2018-16150 - https://sourceforge.net/p/axtls/mailman/message/36459928/ -CVE-2018-16156 - http://packetstormsecurity.com/files/160832/PaperStream-IP-TWAIN-1.42.0.5685-Local-Privilege-Escalation.html -CVE-2018-16156 - https://www.securifera.com/advisories/cve-2018-16156/ -CVE-2018-16158 - https://www.ctrlu.net/vuln/0006.html -CVE-2018-16159 - https://wpvulndb.com/vulnerabilities/9117 -CVE-2018-16159 - https://www.exploit-db.com/exploits/45255/ -CVE-2018-16164 - https://wpvulndb.com/vulnerabilities/9199 -CVE-2018-16179 - https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking -CVE-2018-16210 - https://www.exploit-db.com/exploits/45581/ -CVE-2018-16216 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf -CVE-2018-16219 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf -CVE-2018-16220 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf -CVE-2018-16222 - http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html -CVE-2018-16222 - http://seclists.org/fulldisclosure/2018/Nov/2 -CVE-2018-16223 - http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html -CVE-2018-16223 - http://seclists.org/fulldisclosure/2018/Nov/2 -CVE-2018-16224 - http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html -CVE-2018-16224 - http://seclists.org/fulldisclosure/2018/Nov/2 -CVE-2018-16225 - https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability/ -CVE-2018-16233 - https://github.com/bg5sbk/MiniCMS/issues/22 -CVE-2018-16247 - https://github.com/yzmcms/yzmcms/issues/3 -CVE-2018-16252 - http://hyp3rlinx.altervista.org/advisories/FSPRO-LABS-EVENT-LOG-EXPLORER-XML-INJECTION-INFO-DISCLOSURE.txt -CVE-2018-16252 - http://packetstormsecurity.com/files/149195/FsPro-Labs-Event-Log-Explorer-4.6.1.2115-XML-Injection.html -CVE-2018-16252 - https://www.exploit-db.com/exploits/45319/ -CVE-2018-16253 - https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c -CVE-2018-16253 - https://sourceforge.net/p/axtls/mailman/message/36459928/ -CVE-2018-16254 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -CVE-2018-16254 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing -CVE-2018-16255 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -CVE-2018-16255 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing -CVE-2018-16256 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -CVE-2018-16256 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing -CVE-2018-16257 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -CVE-2018-16257 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing -CVE-2018-16258 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -CVE-2018-16258 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing -CVE-2018-16259 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -CVE-2018-16259 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing -CVE-2018-16261 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 -CVE-2018-16262 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16263 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16264 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16265 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16266 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16267 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16268 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16269 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16270 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16271 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16272 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be -CVE-2018-16282 - https://gist.github.com/tim124058/5c4babe391a016c771d2cccabead21cb -CVE-2018-16283 - http://seclists.org/fulldisclosure/2018/Sep/32 -CVE-2018-16283 - https://wpvulndb.com/vulnerabilities/9132 -CVE-2018-16283 - https://www.exploit-db.com/exploits/45438/ -CVE-2018-16285 - https://wpvulndb.com/vulnerabilities/9124 -CVE-2018-16288 - https://www.exploit-db.com/exploits/45440/ -CVE-2018-16299 - http://seclists.org/fulldisclosure/2018/Sep/33 -CVE-2018-16299 - https://packetstormsecurity.com/files/149433/WordPress-Localize-My-Post-1.0-Local-File-Inclusion.html -CVE-2018-16299 - https://www.exploit-db.com/exploits/45439/ -CVE-2018-1630 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16302 - https://www.exploit-db.com/exploits/44828/ -CVE-2018-16303 - https://forum.tracker-software.com/viewtopic.php?f=62&t=31419 -CVE-2018-16307 - http://packetstormsecurity.com/files/149196/MIWiFi-Xiaomi_55DD-2.8.50-Out-Of-Band-Resource-Load.html -CVE-2018-16308 - https://packetstormsecurity.com/files/148993/WordPress-Ninja-Forms-3.3.13-CSV-Injection.html -CVE-2018-16308 - https://www.exploit-db.com/exploits/45234/ -CVE-2018-1631 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16310 - http://buddieshub27.blogspot.com/2018/09/cve-2018-16310-technicolor-tg588v-v2.html -CVE-2018-16313 - https://blog.csdn.net/F_carry/article/details/81536424 -CVE-2018-16315 - https://github.com/caokang/waimai/issues/3 -CVE-2018-1632 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16323 - https://www.exploit-db.com/exploits/45890/ -CVE-2018-16324 - https://cxsecurity.com/issue/WLB-2018080098 -CVE-2018-16324 - https://packetstormsecurity.com/files/148887/IceWarp-WebMail-12.0.3.1-Cross-Site-Scripting.html -CVE-2018-1633 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16331 - https://github.com/Vict00r/poc/issues/1 -CVE-2018-16333 - https://github.com/ZIllR0/Routers/blob/master/Tenda/oob1.md -CVE-2018-16334 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md -CVE-2018-16335 - http://bugzilla.maptools.org/show_bug.cgi?id=2809 -CVE-2018-16336 - https://github.com/Exiv2/exiv2/issues/400 -CVE-2018-16337 - https://github.com/chshcms/cscms/issues/2 -CVE-2018-16338 - https://github.com/auracms/AuraCMS/issues/3 -CVE-2018-16339 - https://github.com/sbmzhcn/EmpireCMS/issues/1 -CVE-2018-1634 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16343 - https://github.com/cumtxujiabin/CmsPoc/blob/master/Seacms_v6.61_backend_RCE.md -CVE-2018-16345 - https://github.com/teameasy/EasyCMS/issues/5 -CVE-2018-16346 - https://github.com/chemcms/ChemCMS/issues/2 -CVE-2018-16348 - https://github.com/Jas0nwhy/vulnerability/blob/master/Seacmsxss.md -CVE-2018-16349 - https://github.com/wuzhicms/wuzhicms/issues/147 -CVE-2018-1635 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16350 - https://github.com/wuzhicms/wuzhicms/issues/148 -CVE-2018-1636 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-16361 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ -CVE-2018-16363 - http://blog.51cto.com/010bjsoft/2171087 -CVE-2018-16363 - https://wpvulndb.com/vulnerabilities/9126 -CVE-2018-16364 - https://blog.jamesotten.com/post/applications-manager-rce/ -CVE-2018-16368 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf -CVE-2018-16369 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf -CVE-2018-16381 - https://github.com/dhananjay-bajaj/E107-v2.1.8-XSS-POC -CVE-2018-16382 - https://bugzilla.nasm.us/show_bug.cgi?id=3392503 -CVE-2018-16387 - https://github.com/jbroadway/elefant/issues/285 -CVE-2018-16395 - https://hackerone.com/reports/387250 -CVE-2018-16395 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-16409 - https://github.com/gogs/gogs/issues/5372 -CVE-2018-16412 - https://github.com/ImageMagick/ImageMagick/issues/1250 -CVE-2018-16413 - https://github.com/ImageMagick/ImageMagick/issues/1249 -CVE-2018-16413 - https://github.com/ImageMagick/ImageMagick/issues/1251 -CVE-2018-16416 - https://github.com/daylightstudio/FUEL-CMS/issues/481 -CVE-2018-16428 - https://usn.ubuntu.com/3767-1/ -CVE-2018-16429 - https://usn.ubuntu.com/3767-1/ -CVE-2018-16438 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5/h5stat -CVE-2018-16449 - https://github.com/liu21st/onethink/issues/37 -CVE-2018-16459 - https://hackerone.com/reports/356809 -CVE-2018-16460 - https://hackerone.com/reports/390848 -CVE-2018-16461 - https://hackerone.com/reports/390865 -CVE-2018-16462 - https://hackerone.com/reports/405694 -CVE-2018-16463 - https://hackerone.com/reports/237184 -CVE-2018-16464 - https://hackerone.com/reports/146133 -CVE-2018-16465 - https://hackerone.com/reports/317711 -CVE-2018-16466 - https://hackerone.com/reports/388515 -CVE-2018-16467 - https://hackerone.com/reports/231917 -CVE-2018-16469 - https://hackerone.com/reports/381194 -CVE-2018-16470 - https://hackerone.com/reports/431561 -CVE-2018-16472 - https://hackerone.com/reports/390847 -CVE-2018-16473 - https://hackerone.com/reports/403736 -CVE-2018-16474 - https://hackerone.com/reports/403692 -CVE-2018-16475 - https://hackerone.com/reports/403707 -CVE-2018-16477 - https://hackerone.com/reports/407319 -CVE-2018-16478 - https://hackerone.com/reports/403703 -CVE-2018-16479 - https://hackerone.com/reports/411405 -CVE-2018-16480 - https://hackerone.com/reports/329950 -CVE-2018-16481 - https://hackerone.com/reports/330356 -CVE-2018-16482 - https://hackerone.com/reports/330285 -CVE-2018-16483 - https://hackerone.com/reports/343626 -CVE-2018-16484 - https://hackerone.com/reports/319794 -CVE-2018-16485 - https://hackerone.com/reports/319795 -CVE-2018-16486 - https://hackerone.com/reports/380878 -CVE-2018-16487 - https://hackerone.com/reports/380873 -CVE-2018-16489 - https://hackerone.com/reports/430291 -CVE-2018-16490 - https://hackerone.com/reports/390860 -CVE-2018-16491 - https://hackerone.com/reports/430831 -CVE-2018-16492 - https://hackerone.com/reports/381185 -CVE-2018-16493 - https://hackerone.com/reports/432600 -CVE-2018-16509 - http://seclists.org/oss-sec/2018/q3/142 -CVE-2018-16509 - https://www.exploit-db.com/exploits/45369/ -CVE-2018-16510 - https://bugs.ghostscript.com/show_bug.cgi?id=699671 -CVE-2018-16517 - http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html -CVE-2018-16517 - https://bugzilla.nasm.us/show_bug.cgi?id=3392513 -CVE-2018-16517 - https://www.exploit-db.com/exploits/46726/ -CVE-2018-16519 - http://packetstormsecurity.com/files/151467/COYO-9.0.8-10.0.11-12.0.4-Cross-Site-Scripting.html -CVE-2018-16519 - https://seclists.org/bugtraq/2019/Feb/0 -CVE-2018-16519 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-032.txt -CVE-2018-16529 - https://seclists.org/fulldisclosure/2018/Nov/23 -CVE-2018-16548 - https://github.com/gdraheim/zziplib/issues/58 -CVE-2018-16549 - https://packetstormsecurity.com/files/149204 -CVE-2018-16552 - https://github.com/MicroPyramid/Django-CRM/issues/68 -CVE-2018-16554 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176 -CVE-2018-16590 - https://cyberskr.com/blog/furuno-felcom.html -CVE-2018-16591 - https://cyberskr.com/blog/furuno-felcom.html -CVE-2018-16597 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-16605 - https://www.youtube.com/watch?v=BvZJ_e2BH_M&feature=youtu.be -CVE-2018-16606 - https://packetstormsecurity.com/files/149259/IDOR-On-ProConf-Peer-Review-And-Conference-Management-6.0-File-Disclosure.html -CVE-2018-16607 - https://docs.google.com/document/d/1MKeb9lly_oOrVG0Ja4A-HgwaeXhb_xQHT9IIOee3wi0/edit -CVE-2018-16619 - https://support.sonatype.com/hc/en-us/articles/360010789893-CVE-2018-16619-Nexus-Repository-Manager-XSS-October-17-2018 -CVE-2018-16620 - https://support.sonatype.com/hc/en-us/articles/360010789453-CVE-2018-16620-Nexus-Repository-Manager-Missing-Access-Controls-October-17-2018 -CVE-2018-16621 - https://support.sonatype.com/hc/en-us/articles/360010789153-CVE-2018-16621-Nexus-Repository-Manager-Java-Injection-October-17-2018 -CVE-2018-16622 - https://github.com/doramart/DoraCMS/issues/136 -CVE-2018-16629 - https://github.com/security-breachlock/CVE-2018-16629/blob/master/subrion_cms.pdf -CVE-2018-16636 - https://github.com/NucleusCMS/NucleusCMS/issues/84 -CVE-2018-16646 - https://bugzilla.redhat.com/show_bug.cgi?id=1622951 -CVE-2018-16647 - https://bugs.ghostscript.com/show_bug.cgi?id=699686 -CVE-2018-16648 - https://bugs.ghostscript.com/show_bug.cgi?id=699685 -CVE-2018-16653 - https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1%20%20xss1 -CVE-2018-16656 - https://mars-cheng.github.io/blog/2019/CVE-2018-16656 -CVE-2018-16658 - https://usn.ubuntu.com/3820-1/ -CVE-2018-16658 - https://usn.ubuntu.com/3822-1/ -CVE-2018-16659 - https://www.exploit-db.com/exploits/45500/ -CVE-2018-16660 - https://www.exploit-db.com/exploits/45542/ -CVE-2018-16668 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -CVE-2018-16668 - https://www.exploit-db.com/exploits/45384/ -CVE-2018-16669 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -CVE-2018-16669 - https://www.exploit-db.com/exploits/45384/ -CVE-2018-16670 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -CVE-2018-16670 - https://www.exploit-db.com/exploits/45384/ -CVE-2018-16671 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -CVE-2018-16671 - https://www.exploit-db.com/exploits/45384/ -CVE-2018-16672 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -CVE-2018-16672 - https://www.exploit-db.com/exploits/45384/ -CVE-2018-16703 - https://github.com/gleez/cms/issues/802 -CVE-2018-16705 - https://cyberskr.com/blog/furuno-felcom.html -CVE-2018-16709 - https://www.exploit-db.com/exploits/45332/ -CVE-2018-16718 - https://github.com/grymer/CVE/blob/master/CVE-2018-16718.md -CVE-2018-16724 - https://github.com/xxy961216/attack-baijiacmsV4-with-blind-sql-injection -CVE-2018-16725 - https://github.com/xxy961216/attack-baijiacmsV4-with-xss -CVE-2018-16728 - https://github.com/frozeman/feindura-flat-file-cms/issues/29 -CVE-2018-16732 - https://github.com/AvaterXXX/CScms/blob/master/CScms_csrf.md -CVE-2018-16736 - https://www.exploit-db.com/exploits/45437/ -CVE-2018-16739 - https://sec.maride.cc/posts/abus/ -CVE-2018-16752 - http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.html -CVE-2018-16752 - https://www.exploit-db.com/exploits/45351/ -CVE-2018-16759 - https://github.com/teameasy/EasyCMS/issues/4 -CVE-2018-16763 - http://packetstormsecurity.com/files/153696/fuelCMS-1.4.1-Remote-Code-Execution.html -CVE-2018-16763 - http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html -CVE-2018-16763 - http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html -CVE-2018-16763 - https://0xd0ff9.wordpress.com/2019/07/19/from-code-evaluation-to-pre-auth-remote-code-execution-cve-2018-16763-bypass/ -CVE-2018-16763 - https://www.exploit-db.com/exploits/47138 -CVE-2018-16778 - https://metamorfosec.com/Files/Advisories/METS-2018-004-A_XSS_Vulnerability_in_Jenzabar_8.2.1_to_9.2.0.txt -CVE-2018-16789 - http://packetstormsecurity.com/files/149978/Shell-In-A-Box-2.2.0-Denial-Of-Service.html -CVE-2018-16793 - http://packetstormsecurity.com/files/149411/Rollup-18-For-Microsoft-Exchange-Server-2010-SP3-Server-Side-Request-Forgery.html -CVE-2018-16793 - http://seclists.org/fulldisclosure/2018/Sep/20 -CVE-2018-16793 - https://seclists.org/bugtraq/2018/Sep/38 -CVE-2018-16794 - http://packetstormsecurity.com/files/149376/Microsoft-ADFS-4.0-Windows-Server-2016-Server-Side-Request-Forgery.html -CVE-2018-16794 - http://seclists.org/fulldisclosure/2018/Sep/13 -CVE-2018-16794 - https://seclists.org/bugtraq/2018/Sep/26 -CVE-2018-16795 - https://www.open-emr.org/wiki/images/1/11/Openemr_insecurity.pdf -CVE-2018-16796 - https://seclists.org/bugtraq/2018/Sep/27 -CVE-2018-16796 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-015.txt -CVE-2018-16803 - https://www.linkedin.com/feed/update/urn:li:activity:6489145511902212096/ -CVE-2018-16803 - https://www.websec.nl/news.php -CVE-2018-16806 - https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ -CVE-2018-16821 - http://www.seacms.net/thread-6249-1-1.html -CVE-2018-16831 - https://github.com/smarty-php/smarty/issues/486 -CVE-2018-16832 - https://github.com/ysrc/xunfeng/issues/177 -CVE-2018-16833 - http://packetstormsecurity.com/files/149436/ManageEngine-Desktop-Central-10.0.271-Cross-Site-Scripting.html -CVE-2018-16836 - https://www.exploit-db.com/exploits/45385/ -CVE-2018-16839 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 -CVE-2018-16839 - https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 -CVE-2018-16841 - https://usn.ubuntu.com/3827-2/ -CVE-2018-16842 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-16843 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2018-16844 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2018-16845 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2018-16851 - https://usn.ubuntu.com/3827-2/ -CVE-2018-16858 - http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html -CVE-2018-16858 - https://www.exploit-db.com/exploits/46727/ -CVE-2018-16862 - https://usn.ubuntu.com/4118-1/ -CVE-2018-16864 - http://www.openwall.com/lists/oss-security/2021/07/20/2 -CVE-2018-16864 - https://www.qualys.com/2019/01/09/system-down/system-down.txt -CVE-2018-16865 - http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html -CVE-2018-16865 - http://www.openwall.com/lists/oss-security/2021/07/20/2 -CVE-2018-16865 - https://www.qualys.com/2019/01/09/system-down/system-down.txt -CVE-2018-16866 - http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html -CVE-2018-16866 - https://www.qualys.com/2019/01/09/system-down/system-down.txt -CVE-2018-16868 - http://cat.eyalro.net/ -CVE-2018-16869 - http://cat.eyalro.net/ -CVE-2018-16870 - http://cat.eyalro.net/ -CVE-2018-16884 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-1694 - http://www.ibm.com/support/docview.wss?uid=ibm10738301 -CVE-2018-16946 - https://github.com/EgeBalci/LG-Smart-IP-Device-Backup-Download -CVE-2018-16946 - https://www.exploit-db.com/exploits/45394/ -CVE-2018-16965 - http://packetstormsecurity.com/files/149438/ManageEngine-SupportCenter-Plus-8.1.0-Cross-Site-Scripting.html -CVE-2018-16966 - https://wpvulndb.com/vulnerabilities/9614 -CVE-2018-16967 - https://wpvulndb.com/vulnerabilities/9614 -CVE-2018-16974 - https://github.com/jbroadway/elefant/issues/287 -CVE-2018-16975 - https://github.com/jbroadway/elefant/issues/286 -CVE-2018-16985 - https://github.com/inikep/lizard/issues/18 -CVE-2018-16986 - https://armis.com/bleedingbit/ -CVE-2018-16986 - https://www.kb.cert.org/vuls/id/317277 -CVE-2018-16999 - https://bugzilla.nasm.us/show_bug.cgi?id=3392508 -CVE-2018-17000 - http://bugzilla.maptools.org/show_bug.cgi?id=2811 -CVE-2018-17000 - https://usn.ubuntu.com/3906-1/ -CVE-2018-17001 - http://packetstormsecurity.com/files/149441/RICOH-SP-4510SF-Printer-Cross-Site-Scripting.html -CVE-2018-17002 - http://packetstormsecurity.com/files/149443/RICOH-MP-2001-Printer-Cross-Site-Scripting.html -CVE-2018-17003 - http://packetstormsecurity.com/files/149435/LimeSurvey-3.14.7-Cross-Site-Scripting.html -CVE-2018-17004 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_00/README.md -CVE-2018-17005 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_01/README.md -CVE-2018-17006 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_02/README.md -CVE-2018-17007 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_03/README.md -CVE-2018-17008 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_04/README.md -CVE-2018-17009 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_05/README.md -CVE-2018-17010 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_06/README.md -CVE-2018-17011 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_07/README.md -CVE-2018-17012 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_08/README.md -CVE-2018-17013 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_09/README.md -CVE-2018-17014 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_10/README.md -CVE-2018-17015 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_11/README.md -CVE-2018-17016 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_12/README.md -CVE-2018-17017 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_13/README.md -CVE-2018-17018 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_14/README.md -CVE-2018-17024 - https://github.com/monstra-cms/monstra/issues/452 -CVE-2018-17024 - https://github.com/monstra-cms/monstra/issues/458 -CVE-2018-17025 - https://github.com/monstra-cms/monstra/issues/458 -CVE-2018-17026 - https://github.com/bg5sbk/MiniCMS/issues/25 -CVE-2018-17030 - https://github.com/bigtreecms/BigTree-CMS/issues/342 -CVE-2018-17031 - https://github.com/gogs/gogs/issues/5397 -CVE-2018-17044 - https://github.com/yzmcms/yzmcms/issues/3 -CVE-2018-17045 - https://github.com/maelosoki/MaeloStore/issues/1 -CVE-2018-17049 - https://github.com/TREYWANGCQU/LANKERS/issues/1 -CVE-2018-17053 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ -CVE-2018-17053 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 -CVE-2018-17054 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ -CVE-2018-17054 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 -CVE-2018-17055 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ -CVE-2018-17055 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 -CVE-2018-17056 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ -CVE-2018-17056 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 -CVE-2018-17057 - http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html -CVE-2018-17057 - http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html -CVE-2018-17057 - http://seclists.org/fulldisclosure/2019/Mar/36 -CVE-2018-17057 - https://www.exploit-db.com/exploits/46634/ -CVE-2018-17061 - https://medium.com/@Mthirup/hacking-your-own-antivirus-for-fun-and-profit-safe-browsing-gone-wrong-365db9d1d3f7 -CVE-2018-17062 - https://secwk.blogspot.com/2018/09/seacms-664-xss-vulnerability.html -CVE-2018-17063 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_3 -CVE-2018-17064 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_2 -CVE-2018-17065 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_1 -CVE-2018-17066 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_0 -CVE-2018-17067 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_0 -CVE-2018-17068 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_1 -CVE-2018-17069 - https://github.com/unlcms/UNL-CMS/issues/941 -CVE-2018-17070 - https://github.com/unlcms/UNL-CMS/issues/941 -CVE-2018-17074 - https://wpvulndb.com/vulnerabilities/7543 -CVE-2018-17075 - https://github.com/golang/go/issues/27016 -CVE-2018-17076 - https://github.com/logological/gpp/issues/26 -CVE-2018-17079 - https://github.com/94fzb/zrlog/issues/38 -CVE-2018-17081 - https://github.com/himanshurahi/e107_2.1.9_CSRF_POC -CVE-2018-17082 - https://bugs.php.net/bug.php?id=76582 -CVE-2018-17082 - https://hackerone.com/reports/409986 -CVE-2018-17085 - http://secwk.blogspot.com/2018/09/otcms-361-reflected-xss-usersphp.html -CVE-2018-17086 - http://secwk.blogspot.com/2018/09/otcms-361-reflected-xss-shareswitchphp.html -CVE-2018-17088 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907925 -CVE-2018-17096 - https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03 -CVE-2018-17097 - https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03 -CVE-2018-17098 - https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/2018_09_03 -CVE-2018-17102 - https://github.com/quickapps/cms/issues/199 -CVE-2018-17103 - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1295 -CVE-2018-17104 - https://github.com/microweber/microweber/issues/483 -CVE-2018-17104 - https://github.com/microweber/microweber/issues/484 -CVE-2018-17110 - https://www.exploit-db.com/exploits/45328/ -CVE-2018-17113 - https://github.com/teameasy/EasyCMS/issues/7 -CVE-2018-17127 - https://github.com/PAGalaxyLab/VulInfo/tree/master/ASUS/GT-AC5300/dos1 -CVE-2018-17128 - https://www.exploit-db.com/exploits/45449/ -CVE-2018-17129 - https://github.com/panghusec/exploit/issues/2 -CVE-2018-17136 - https://github.com/TEag1e/zzcms -CVE-2018-17138 - https://www.exploit-db.com/exploits/45305/ -CVE-2018-17139 - https://www.exploit-db.com/exploits/45253/ -CVE-2018-17140 - https://www.exploit-db.com/exploits/45307/ -CVE-2018-17144 - https://github.com/bitcoin/bitcoin/blob/v0.16.3/doc/release-notes.md -CVE-2018-17145 - https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md -CVE-2018-17150 - https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities -CVE-2018-17151 - https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities -CVE-2018-17152 - https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities -CVE-2018-17153 - http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html -CVE-2018-17153 - https://securify.nl/nl/advisory/SFY20180102/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges.html -CVE-2018-17173 - http://packetstormsecurity.com/files/152733/LG-Supersign-EZ-CMS-Remote-Code-Execution.html -CVE-2018-17173 - https://www.exploit-db.com/exploits/45448/ -CVE-2018-17173 - https://www.exploit-db.com/exploits/46795/ -CVE-2018-17174 - https://www.cnblogs.com/tr3e/p/9662324.html -CVE-2018-17182 - https://usn.ubuntu.com/3777-1/ -CVE-2018-17182 - https://usn.ubuntu.com/3777-3/ -CVE-2018-17182 - https://www.exploit-db.com/exploits/45497/ -CVE-2018-17189 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-17190 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-17196 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-17196 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-17197 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1721 - https://www.ibm.com/support/pages/node/1074144 -CVE-2018-17215 - https://seclists.org/bugtraq/2018/Sep/56 -CVE-2018-17215 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-016.txt -CVE-2018-17229 - https://github.com/Exiv2/exiv2/issues/453 -CVE-2018-17230 - https://github.com/Exiv2/exiv2/issues/455 -CVE-2018-17233 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero -CVE-2018-17234 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak -CVE-2018-17235 - https://bugzilla.redhat.com/show_bug.cgi?id=1629451 -CVE-2018-17236 - https://bugzilla.redhat.com/show_bug.cgi?id=1629453 -CVE-2018-17237 - https://github.com/SegfaultMasters/covering360/blob/master/HDF5/README.md#divided-by-zero---h5d__chunk_set_info_real_div_by_zero -CVE-2018-17240 - https://github.com/BBge/CVE-2018-17240 -CVE-2018-17240 - https://github.com/BBge/CVE-2018-17240/blob/main/exploit.py -CVE-2018-17244 - https://www.elastic.co/community/security -CVE-2018-17245 - https://www.elastic.co/community/security -CVE-2018-17246 - https://www.elastic.co/community/security -CVE-2018-17247 - https://www.elastic.co/community/security -CVE-2018-17254 - http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html -CVE-2018-17254 - https://www.exploit-db.com/exploits/45423/ -CVE-2018-17281 - http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html -CVE-2018-17282 - https://github.com/Exiv2/exiv2/issues/457 -CVE-2018-17283 - https://github.com/x-f1v3/ForCve/issues/4 -CVE-2018-17293 - https://github.com/WAVM/WAVM/issues/110#issuecomment-421764693 -CVE-2018-17300 - https://github.com/CuppaCMS/CuppaCMS/issues/4 -CVE-2018-17301 - https://github.com/espocrm/espocrm/issues/1038 -CVE-2018-17302 - https://github.com/espocrm/espocrm/issues/1039 -CVE-2018-17305 - https://www.uipath.com/product/release-notes/uipath-v2018.1.7 -CVE-2018-17309 - http://packetstormsecurity.com/files/149493/RICOH-MP-C406Z-Printer-Cross-Site-Scripting.html -CVE-2018-17310 - http://packetstormsecurity.com/files/149494/RICOH-MP-C1803-JPN-Printer-Cross-Site-Scripting.html -CVE-2018-17310 - https://www.exploit-db.com/exploits/45526/ -CVE-2018-17311 - http://packetstormsecurity.com/files/149495/RICOH-MP-C6503-Plus-Printer-Cross-Site-Scripting.html -CVE-2018-17312 - http://packetstormsecurity.com/files/149496/RICOH-Aficio-MP-301-Printer-Cross-Site-Scripting.html -CVE-2018-17313 - http://packetstormsecurity.com/files/149497/RICOH-MP-C307-Printer-Cross-Site-Scripting.html -CVE-2018-17313 - https://www.exploit-db.com/exploits/45526/ -CVE-2018-17314 - http://packetstormsecurity.com/files/149501/RICOH-MP-305-Printer-Cross-Site-Scripting.html -CVE-2018-17315 - http://packetstormsecurity.com/files/149502/RICOH-MP-C2003-Printer-Cross-Site-Scripting.html -CVE-2018-17316 - http://packetstormsecurity.com/files/149505/RICOH-MP-C6003-Printer-Cross-Site-Scripting.html -CVE-2018-17317 - http://blog.51cto.com/010bjsoft/2175710 -CVE-2018-17321 - https://secwk.blogspot.com/2018/09/seacms-664-xss-vulnerability_14.html -CVE-2018-17322 - https://github.com/source-trace/yunucms/issues/1 -CVE-2018-17332 - https://github.com/agambier/libsvg2/issues/2 -CVE-2018-17333 - https://github.com/agambier/libsvg2/issues/4 -CVE-2018-17334 - https://github.com/agambier/libsvg2/issues/3 -CVE-2018-17358 - https://sourceware.org/bugzilla/show_bug.cgi?id=23686 -CVE-2018-17359 - https://sourceware.org/bugzilla/show_bug.cgi?id=23686 -CVE-2018-17360 - https://sourceware.org/bugzilla/show_bug.cgi?id=23685 -CVE-2018-17365 - https://github.com/sfh320/seacms/issues/1 -CVE-2018-17374 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17374 - https://www.exploit-db.com/exploits/45456 -CVE-2018-17375 - http://packetstormsecurity.com/files/149521/Joomla-Music-Collection-3.0.3-SQL-Injection.html -CVE-2018-17375 - https://www.exploit-db.com/exploits/45465/ -CVE-2018-17376 - http://packetstormsecurity.com/files/149531/Joomla-Reverse-Auction-Factory-4.3.8-SQL-Injection.html -CVE-2018-17376 - https://www.exploit-db.com/exploits/45475/ -CVE-2018-17377 - http://packetstormsecurity.com/files/149523/Joomla-Questions-1.4.3-SQL-Injection.html -CVE-2018-17377 - https://www.exploit-db.com/exploits/45468/ -CVE-2018-17378 - http://packetstormsecurity.com/files/149522/Joomla-Penny-Auction-Factory-2.0.4-SQL-Injection.html -CVE-2018-17378 - https://www.exploit-db.com/exploits/45466/ -CVE-2018-17379 - http://packetstormsecurity.com/files/149520/Joomla-Raffle-Factory-3.5.2-SQL-Injection.html -CVE-2018-17379 - https://www.exploit-db.com/exploits/45464/ -CVE-2018-17380 - http://packetstormsecurity.com/files/149533/Joomla-Article-Factory-Manager-4.3.9-SQL-Injection.html -CVE-2018-17380 - https://www.exploit-db.com/exploits/45477/ -CVE-2018-17381 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17381 - https://www.exploit-db.com/exploits/45462 -CVE-2018-17382 - http://packetstormsecurity.com/files/149524/Joomla-Jobs-Factory-2.0.4-SQL-Injection.html -CVE-2018-17382 - https://www.exploit-db.com/exploits/45469/ -CVE-2018-17383 - http://packetstormsecurity.com/files/149530/Joomla-Collection-Factory-4.1.9-SQL-Injection.html -CVE-2018-17383 - https://www.exploit-db.com/exploits/45474/ -CVE-2018-17384 - http://packetstormsecurity.com/files/149529/Joomla-Swap-Factory-2.2.1-SQL-Injection.html -CVE-2018-17384 - https://www.exploit-db.com/exploits/45473/ -CVE-2018-17385 - http://packetstormsecurity.com/files/149525/Joomla-Social-Factory-3.8.3-SQL-Injection.html -CVE-2018-17385 - https://www.exploit-db.com/exploits/45470/ -CVE-2018-17386 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17386 - https://www.exploit-db.com/exploits/45452 -CVE-2018-17387 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17387 - https://www.exploit-db.com/exploits/42648 -CVE-2018-17388 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17388 - https://www.exploit-db.com/exploits/46139 -CVE-2018-17389 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17389 - https://www.exploit-db.com/exploits/46140 -CVE-2018-17391 - http://packetstormsecurity.com/files/149519/Super-Cms-Blog-Pro-1.0-SQL-Injection.html -CVE-2018-17391 - https://www.exploit-db.com/exploits/45463/ -CVE-2018-17393 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17393 - https://www.exploit-db.com/exploits/46148 -CVE-2018-17394 - http://packetstormsecurity.com/files/149534/Joomla-Timetable-Schedule-3.6.8-SQL-Injection.html -CVE-2018-17394 - https://www.exploit-db.com/exploits/45478/ -CVE-2018-17397 - http://packetstormsecurity.com/files/149532/Joomla-AlphaIndex-Dictionaries-1.0-SQL-Injection.html -CVE-2018-17397 - https://www.exploit-db.com/exploits/45476/ -CVE-2018-17398 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17398 - https://www.exploit-db.com/exploits/45451 -CVE-2018-17399 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17399 - https://www.exploit-db.com/exploits/45524 -CVE-2018-17408 - https://www.exploit-db.com/exploits/45505/ -CVE-2018-17408 - https://www.exploit-db.com/exploits/45560/ -CVE-2018-17412 - https://github.com/seedis/zzcms/blob/master/README.md -CVE-2018-17414 - https://github.com/seedis/zzcms/blob/master/SQL%20injection.md -CVE-2018-17415 - https://github.com/seedis/zzcms/blob/master/SQL%20injection%20in%20zs_elite.php.md -CVE-2018-17416 - https://github.com/seedis/zzcms/blob/master/SQL%20injection%20in%20%20addclass.md -CVE-2018-17419 - https://github.com/miekg/dns/issues/742 -CVE-2018-17420 - https://github.com/94fzb/zrlog/issues/37 -CVE-2018-17421 - https://github.com/94fzb/zrlog/issues/39 -CVE-2018-17423 - https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc -CVE-2018-17423 - https://github.com/e107inc/e107/issues/3414 -CVE-2018-17425 - https://github.com/wuzhicms/wuzhicms/issues/153 -CVE-2018-17426 - https://github.com/wuzhicms/wuzhicms/issues/154 -CVE-2018-17428 - https://www.exploit-db.com/exploits/45518/ -CVE-2018-17431 - http://packetstormsecurity.com/files/159246/Comodo-Unified-Threat-Management-Web-Console-2.7.0-Remote-Code-Execution.html -CVE-2018-17431 - https://github.com/Fadavvi/CVE-2018-17431-PoC#confirmation-than-bug-exist-2018-09-25-ticket-id-xwr-503-79437 -CVE-2018-17432 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode -CVE-2018-17433 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc -CVE-2018-17434 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters -CVE-2018-17435 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln7#heap-overflow-in-h5o_attr_decode -CVE-2018-17436 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#invalid-write-memory-access-in-decompressc -CVE-2018-17437 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper -CVE-2018-17438 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect -CVE-2018-17439 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#stack-overflow-in-h5s_extent_get_dims -CVE-2018-17440 - http://seclists.org/fulldisclosure/2018/Oct/11 -CVE-2018-17440 - https://www.exploit-db.com/exploits/45533/ -CVE-2018-17441 - http://seclists.org/fulldisclosure/2018/Oct/11 -CVE-2018-17441 - https://www.exploit-db.com/exploits/45533/ -CVE-2018-17442 - http://seclists.org/fulldisclosure/2018/Oct/11 -CVE-2018-17442 - https://www.exploit-db.com/exploits/45533/ -CVE-2018-17443 - http://seclists.org/fulldisclosure/2018/Oct/11 -CVE-2018-17443 - https://www.exploit-db.com/exploits/45533/ -CVE-2018-17456 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html -CVE-2018-17456 - https://www.exploit-db.com/exploits/45548/ -CVE-2018-17456 - https://www.exploit-db.com/exploits/45631/ -CVE-2018-17463 - http://packetstormsecurity.com/files/156640/Google-Chrome-67-68-69-Object.create-Type-Confusion.html -CVE-2018-17532 - http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html -CVE-2018-17532 - http://seclists.org/fulldisclosure/2018/Oct/27 -CVE-2018-17532 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection -CVE-2018-17533 - http://packetstormsecurity.com/files/149781/Teltonika-RUT9XX-Reflected-Cross-Site-Scripting.html -CVE-2018-17533 - http://seclists.org/fulldisclosure/2018/Oct/29 -CVE-2018-17533 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180410-01_Teltonika_Cross_Site_Scripting -CVE-2018-17534 - http://packetstormsecurity.com/files/149779/Teltonika-RUT9XX-Missing-Access-Control-To-UART-Root-Terminal.html -CVE-2018-17534 - http://seclists.org/fulldisclosure/2018/Oct/28 -CVE-2018-17534 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-02_Teltonika_Incorrect_Access_Control -CVE-2018-17552 - https://www.exploit-db.com/exploits/45561/ -CVE-2018-17553 - https://www.exploit-db.com/exploits/45561/ -CVE-2018-17558 - https://sec.maride.cc/posts/abus/ -CVE-2018-17559 - https://sec.maride.cc/posts/abus/#cve-2018-17559 -CVE-2018-1756 - https://www.exploit-db.com/exploits/45392/ -CVE-2018-17562 - https://securityshards.wordpress.com/2018/10/02/cve-2018-17562-faxfinder-5-0-5-8-sqlite-inejection-vulnerability/ -CVE-2018-17572 - https://gist.github.com/Raghavrao29/1cb84f1f2d8ce993fd7b2d1366d35f48 -CVE-2018-17573 - https://cxsecurity.com/issue/WLB-2018090255 -CVE-2018-17573 - https://packetstormsecurity.com/files/149568/WordPress-WP-Insert-2.4.2-Arbitrary-File-Upload.html -CVE-2018-17580 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay -CVE-2018-17580 - https://github.com/appneta/tcpreplay/issues/485 -CVE-2018-17581 - https://github.com/Exiv2/exiv2/issues/460 -CVE-2018-17581 - https://github.com/SegfaultMasters/covering360/blob/master/Exiv2 -CVE-2018-17582 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay -CVE-2018-17582 - https://github.com/appneta/tcpreplay/issues/484 -CVE-2018-17583 - https://wpvulndb.com/vulnerabilities/9696 -CVE-2018-17584 - https://wpvulndb.com/vulnerabilities/9696 -CVE-2018-17585 - https://wpvulndb.com/vulnerabilities/9696 -CVE-2018-17586 - https://wpvulndb.com/vulnerabilities/9696 -CVE-2018-17587 - http://packetstormsecurity.com/files/149600/Airties-AIR5750-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17587 - https://www.exploit-db.com/exploits/45525/ -CVE-2018-17588 - http://packetstormsecurity.com/files/149598/Airties-AIR5021-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17588 - https://www.exploit-db.com/exploits/45525/ -CVE-2018-17589 - http://packetstormsecurity.com/files/149599/Airties-AIR5650-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17590 - http://packetstormsecurity.com/files/149594/Airties-AIR5443v2-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17590 - https://www.exploit-db.com/exploits/45525/ -CVE-2018-17591 - http://packetstormsecurity.com/files/149592/Airties-AIR5343v2-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17591 - https://www.exploit-db.com/exploits/45525/ -CVE-2018-17593 - http://packetstormsecurity.com/files/149595/Airties-AIR5453-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17593 - https://www.exploit-db.com/exploits/45525/ -CVE-2018-17594 - http://packetstormsecurity.com/files/149593/Airties-AIR5442-1.0.0.18-Cross-Site-Scripting.html -CVE-2018-17595 - https://packetstormsecurity.com/files/149596/CVE-2018-17595.txt -CVE-2018-17596 - http://packetstormsecurity.com/files/149597/ManageEngine-AssetExplorer-6.2.0-Cross-Site-Scripting.html -CVE-2018-17613 - https://www.inputzero.io/2018/09/telegram-share-password-in-cleartext.html -CVE-2018-17765 - https://youtu.be/gtbS3Gr264w -CVE-2018-17765 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17766 - https://youtu.be/gtbS3Gr264w -CVE-2018-17766 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17767 - https://youtu.be/gtbS3Gr264w -CVE-2018-17767 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17768 - https://youtu.be/gtbS3Gr264w -CVE-2018-17768 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17769 - https://youtu.be/gtbS3Gr264w -CVE-2018-17769 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17770 - https://youtu.be/gtbS3Gr264w -CVE-2018-17770 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17771 - https://youtu.be/gtbS3Gr264w -CVE-2018-17771 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17772 - https://youtu.be/gtbS3Gr264w -CVE-2018-17772 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17773 - https://youtu.be/gtbS3Gr264w -CVE-2018-17773 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17774 - https://youtu.be/gtbS3Gr264w -CVE-2018-17774 - https://youtu.be/oyUD7RDJsJs -CVE-2018-17775 - https://packetstormsecurity.com/files/149586/Seqrite-End-Point-Security-7.4-Privilege-Escalation.html -CVE-2018-17775 - https://www.exploit-db.com/exploits/45568/ -CVE-2018-17776 - https://packetstormsecurity.com/files/149581/PCProtect-4-8.35-Privilege-Escalation.html -CVE-2018-17776 - https://www.exploit-db.com/exploits/45503/ -CVE-2018-17784 - https://www.exploit-db.com/exploits/45594/ -CVE-2018-17784 - https://www.purplemet.com/blog/sugarcrm-multiple-xss-vulnerabilities -CVE-2018-17786 - https://xz.aliyun.com/t/2834 -CVE-2018-17787 - https://xz.aliyun.com/t/2834 -CVE-2018-17789 - http://packetstormsecurity.com/files/154498/Master-Data-Online-Cross-Site-Request-Forgery-Data-Tampering.html -CVE-2018-17789 - https://packetstormsecurity.com/files/cve/CVE-2018-17789 -CVE-2018-17790 - http://packetstormsecurity.com/files/154001/Master-Data-Online-2.0-Cross-Site-Scripting.html -CVE-2018-17790 - https://packetstormsecurity.com/files/cve/CVE-2018-17790 -CVE-2018-17791 - http://packetstormsecurity.com/files/154061/OmniDoc-7.0-Input-Validation.html -CVE-2018-17791 - https://packetstormsecurity.com/files/cve/CVE-2018-17791 -CVE-2018-17792 - http://packetstormsecurity.com/files/153686/WorldClient-14-Cross-Site-Request-Forgery.html -CVE-2018-17792 - https://packetstormsecurity.com/files/cve/CVE-2018-17792 -CVE-2018-17794 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350 -CVE-2018-17795 - http://bugzilla.maptools.org/show_bug.cgi?id=2816 -CVE-2018-17795 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-17795 -CVE-2018-17797 - https://github.com/seedis/zzcms/blob/master/arbitrary_file_deletion1.md -CVE-2018-17798 - https://github.com/seedis/zzcms/blob/master/arbitrary_file_deletion2.md -CVE-2018-17830 - https://github.com/redaxo/redaxo4/issues/421 -CVE-2018-17831 - https://github.com/redaxo/redaxo/issues/2043 -CVE-2018-17832 - https://cxsecurity.com/issue/WLB-2018050139 -CVE-2018-17832 - https://www.exploit-db.com/exploits/45514/ -CVE-2018-17840 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17840 - https://www.exploit-db.com/exploits/45510 -CVE-2018-17841 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17841 - https://www.exploit-db.com/exploits/41674 -CVE-2018-17842 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17842 - https://www.exploit-db.com/exploits/45509 -CVE-2018-17843 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-17843 - https://www.exploit-db.com/exploits/45511 -CVE-2018-17849 - https://cxsecurity.com/issue/WLB-2018100018 -CVE-2018-17852 - https://github.com/wuzhicms/wuzhicms/issues/155 -CVE-2018-17861 - http://packetstormsecurity.com/files/151945/SAP-J2EE-Engine-7.01-Portal-EPP-Protocol-Cross-Site-Scripting.html -CVE-2018-17861 - http://seclists.org/fulldisclosure/2019/Mar/6 -CVE-2018-17861 - https://seclists.org/bugtraq/2019/Mar/4 -CVE-2018-17862 - http://packetstormsecurity.com/files/151946/SAP-J2EE-Engine-7.01-Fiori-test2-Cross-Site-Scripting.html -CVE-2018-17862 - https://seclists.org/bugtraq/2019/Mar/5 -CVE-2018-17866 - https://serhack.me/articles/ultimate-member-xss-security-issue -CVE-2018-17866 - https://wpvulndb.com/vulnerabilities/9615 -CVE-2018-17871 - http://packetstormsecurity.com/files/149651/Collaboration-Compliance-And-Quality-Management-Platform-9.1.1.5482-Disclosure.html -CVE-2018-17871 - https://seclists.org/bugtraq/2018/Oct/12 -CVE-2018-17871 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-023.txt -CVE-2018-17872 - http://packetstormsecurity.com/files/149652/Collaboration-Compliance-And-Quality-Management-Platform-9.1.1.5482-Improper-Access-Control.html -CVE-2018-17872 - https://seclists.org/bugtraq/2018/Oct/13 -CVE-2018-17872 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-024.txt -CVE-2018-17873 - http://packetstormsecurity.com/files/149867/WiFiRanger-7.0.8rc3-Incorrect-Access-Control-Privilege-Escalation.html -CVE-2018-17876 - http://packetstormsecurity.com/files/149647/Coaster-CMS-5.5.0-Cross-Site-Scripting.html -CVE-2018-17878 - https://sec.maride.cc/posts/abus/#cve-2018-17878 -CVE-2018-17879 - https://sec.maride.cc/posts/abus/#cve-2018-17879 -CVE-2018-17880 - https://xz.aliyun.com/t/2834#toc-5 -CVE-2018-17881 - https://xz.aliyun.com/t/2834#toc-5 -CVE-2018-17914 - https://www.tenable.com/security/research/tra-2018-34 -CVE-2018-17916 - https://www.tenable.com/security/research/tra-2018-34 -CVE-2018-17947 - http://www.defensecode.com/advisories/DC-2018-05-006_WordPress_Snazzy_Maps_Plugin_Advisory.pdf -CVE-2018-1796 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2018-17961 - https://www.exploit-db.com/exploits/45573/ -CVE-2018-17964 - https://packetstormsecurity.com/files/149823/HighPortal-12.5-Cross-Site-Scripting.html -CVE-2018-17972 - https://usn.ubuntu.com/3821-1/ -CVE-2018-17972 - https://usn.ubuntu.com/3821-2/ -CVE-2018-17974 - https://github.com/SegfaultMasters/covering360/tree/master/tcpreplay -CVE-2018-17974 - https://github.com/appneta/tcpreplay/issues/486 -CVE-2018-17975 - https://gitlab.com/gitlab-org/gitlab-ce/issues/50744 -CVE-2018-17976 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51581 -CVE-2018-17980 - http://hyp3rlinx.altervista.org/advisories/NOMACHINE-TROJAN-FILE-REMOTE-CODE-EXECUTION.txt -CVE-2018-17980 - http://packetstormsecurity.com/files/149784/NoMachine-5.3.26-Remote-Code-Execution.html -CVE-2018-17980 - https://www.exploit-db.com/exploits/45611/ -CVE-2018-17985 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335 -CVE-2018-17988 - https://github.com/AndyRixon/LayerBB/issues/51 -CVE-2018-17988 - https://www.exploit-db.com/exploits/45530/ -CVE-2018-17996 - http://packetstormsecurity.com/files/151694/LayerBB-1.1.2-Cross-Site-Request-Forgery.html -CVE-2018-17996 - https://www.exploit-db.com/exploits/46379/ -CVE-2018-17997 - http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html -CVE-2018-17997 - https://www.exploit-db.com/exploits/46079/ -CVE-2018-18006 - http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html -CVE-2018-18006 - http://seclists.org/fulldisclosure/2018/Nov/46 -CVE-2018-18013 - https://advisories.dxw.com/advisories/xen-mobile-vulnerable-to-code-execution-via-object-serialisation/ -CVE-2018-18014 - https://advisories.dxw.com/advisories/xen-mobile-backing-service-allows-unauthenticated-local-users-to-execute-system-commands-as-root/ -CVE-2018-18020 - https://github.com/qpdf/qpdf/issues/243 -CVE-2018-18021 - https://usn.ubuntu.com/3821-1/ -CVE-2018-18021 - https://usn.ubuntu.com/3821-2/ -CVE-2018-18023 - https://github.com/ImageMagick/ImageMagick/issues/1336 -CVE-2018-18024 - https://github.com/ImageMagick/ImageMagick/issues/1337 -CVE-2018-18025 - https://github.com/ImageMagick/ImageMagick/issues/1335 -CVE-2018-18035 - https://www.purplemet.com/blog/openemr-xss-vulnerability -CVE-2018-18058 - https://www.bitdefender.com/ -CVE-2018-18059 - https://www.bitdefender.com/ -CVE-2018-18060 - https://www.bitdefender.com/ -CVE-2018-18061 - https://seclists.org/bugtraq/2018/Oct/25 -CVE-2018-18062 - https://seclists.org/bugtraq/2018/Oct/26 -CVE-2018-18064 - https://gitlab.freedesktop.org/cairo/cairo/issues/341 -CVE-2018-18065 - https://dumpco.re/blog/net-snmp-5.7.3-remote-dos -CVE-2018-18065 - https://www.exploit-db.com/exploits/45547/ -CVE-2018-18065 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-18066 - https://dumpco.re/blog/net-snmp-5.7.3-remote-dos -CVE-2018-18066 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-18069 - https://0x62626262.wordpress.com/2018/10/08/sitepress-multilingual-cms-plugin-unauthenticated-stored-xss/ -CVE-2018-18073 - http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html -CVE-2018-18074 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2018-18075 - https://seccops.com/wikidforum-2-20-multiple-sql-injection-vulnerabilities/ -CVE-2018-18075 - https://www.exploit-db.com/exploits/45564/ -CVE-2018-18087 - https://github.com/Bixie/pagekit-portfolio/issues/44 -CVE-2018-18088 - https://github.com/uclouvain/openjpeg/issues/1152 -CVE-2018-18089 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-18089 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-18090 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-18090 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-18091 - https://support.lenovo.com/us/en/product_security/LEN-25084 -CVE-2018-18091 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html -CVE-2018-18198 - https://github.com/redaxo/redaxo4/issues/422 -CVE-2018-18207 - https://0day.today/exploit/description/31282 -CVE-2018-18208 - https://0day.today/exploit/description/31282 -CVE-2018-18209 - https://github.com/chekun/DiliCMS/issues/59 -CVE-2018-1821 - https://www.exploit-db.com/exploits/46017/ -CVE-2018-18210 - https://github.com/chekun/DiliCMS/issues/59 -CVE-2018-18227 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-18252 - https://improsec.com/tech-blog/cam1 -CVE-2018-18253 - https://improsec.com/tech-blog/cam1 -CVE-2018-18254 - https://improsec.com/tech-blog/cam1 -CVE-2018-18255 - https://improsec.com/tech-blog/cam1 -CVE-2018-18256 - https://improsec.com/tech-blog/cam1 -CVE-2018-18258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2018-18259 - http://packetstormsecurity.com/files/149771/LUYA-CMS-1.0.12-Cross-Site-Scripting.html -CVE-2018-18260 - http://packetstormsecurity.com/files/149772/CAMALEON-CMS-2.4-Cross-Site-Scripting.html -CVE-2018-18274 - https://github.com/TeamSeri0us/pocs/tree/master/pdfalto -CVE-2018-18276 - http://www.cinquino.eu/ProFiles%201.5%20Free%20Version%20Component%20Xss.htm -CVE-2018-18281 - http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html -CVE-2018-18287 - https://github.com/remix30303/AsusLeak -CVE-2018-18307 - http://packetstormsecurity.com/files/149787/Alchemy-CMS-4.1-Stable-Cross-Site-Scripting.html -CVE-2018-18308 - http://packetstormsecurity.com/files/149788/BigTree-CMS-4.2.23-Cross-Site-Scripting.html -CVE-2018-18308 - https://www.exploit-db.com/exploits/45628/ -CVE-2018-18309 - https://sourceware.org/bugzilla/show_bug.cgi?id=23770 -CVE-2018-18310 - https://sourceware.org/bugzilla/show_bug.cgi?id=23752 -CVE-2018-18311 - https://hackerone.com/reports/424447 -CVE-2018-18311 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-18311 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-18312 - https://hackerone.com/reports/510887 -CVE-2018-18312 - https://rt.perl.org/Public/Bug/Display.html?id=133423 -CVE-2018-18312 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-18313 - https://hackerone.com/reports/510888 -CVE-2018-18313 - https://rt.perl.org/Ticket/Display.html?id=133192 -CVE-2018-18313 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-18314 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-18318 - https://github.com/datadancer/HIAFuzz/blob/master/360%20Phone%20N6%20Pro%20Kernel%20Vuln.md -CVE-2018-18319 - http://blog.51cto.com/010bjsoft/2298902 -CVE-2018-18319 - https://github.com/qoli/Merlin.PHP/issues/27 -CVE-2018-18320 - https://github.com/qoli/Merlin.PHP/issues/26 -CVE-2018-18322 - https://0day.today/exploit/31304 -CVE-2018-18322 - https://www.exploit-db.com/exploits/45610/ -CVE-2018-18323 - https://0day.today/exploit/31304 -CVE-2018-18323 - https://www.exploit-db.com/exploits/45610/ -CVE-2018-18324 - https://0day.today/exploit/31304 -CVE-2018-18324 - https://www.exploit-db.com/exploits/45610/ -CVE-2018-18325 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html -CVE-2018-18326 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html -CVE-2018-18333 - https://kaganisildak.com/2019/01/17/discovery-of-dll-hijack-on-trend-micro-antivirus-cve-2018-18333/ -CVE-2018-18372 - http://packetstormsecurity.com/files/149805/Library-CMS-2.1.1-Cross-Site-Scripting.html -CVE-2018-18373 - http://packetstormsecurity.com/files/149806/WordPress-Support-Board-1.2.3-Cross-Site-Scripting.html -CVE-2018-18373 - https://wpvulndb.com/vulnerabilities/9707 -CVE-2018-18375 - https://github.com/remix30303/AirBoxAPNLeaks -CVE-2018-18376 - https://github.com/remix30303/AirboxLeak -CVE-2018-18377 - https://github.com/remix30303/AirBoxDoom -CVE-2018-18381 - https://github.com/seedis/Z-BlogPHP/blob/master/Z-BlogPHP_stored_xss.md -CVE-2018-18382 - https://www.exploit-db.com/exploits/45604/ -CVE-2018-18388 - http://blog.escanav.com/2018/11/cve-2018-18388/ -CVE-2018-18397 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 -CVE-2018-18397 - https://usn.ubuntu.com/3901-1/ -CVE-2018-18398 - https://0xd0ff9.wordpress.com/2018/10/18/cve-2018-18398/ -CVE-2018-18399 - http://packetstormsecurity.com/files/150810/KARMA-6.0.0-SQL-Injection.html -CVE-2018-18406 - https://www.exploit-db.com/exploits/45808 -CVE-2018-18407 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#user-content-heap-overflow-in-csum_replace4 -CVE-2018-18407 - https://github.com/appneta/tcpreplay/issues/488 -CVE-2018-18408 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#use-after-free-in-post_args -CVE-2018-18409 - https://github.com/simsong/tcpflow/issues/195 -CVE-2018-18416 - http://packetstormsecurity.com/files/149841/LANGO-Codeigniter-Multilingual-Script-1.0-Cross-Site-Scripting.html -CVE-2018-18416 - https://www.exploit-db.com/exploits/45672/ -CVE-2018-18417 - http://packetstormsecurity.com/files/149842/Ekushey-Project-Manager-CRM-3.1-Cross-Site-Scripting.html -CVE-2018-18417 - https://www.exploit-db.com/exploits/45681/ -CVE-2018-18419 - http://packetstormsecurity.com/files/149850/User-Management-1.1-Cross-Site-Scripting.html -CVE-2018-18419 - https://www.exploit-db.com/exploits/45686/ -CVE-2018-18420 - http://packetstormsecurity.com/files/149851/Zenar-Content-Management-System-8.3-Cross-Site-Request-Forgery.html -CVE-2018-18428 - https://packetstormsecurity.com/files/149843 -CVE-2018-18428 - https://www.exploit-db.com/exploits/45632/ -CVE-2018-18428 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5497.php -CVE-2018-18435 - http://packetstormsecurity.com/files/151031/KioWare-Server-4.9.6-Privilege-Escalation.html -CVE-2018-18435 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-002.md -CVE-2018-18435 - https://www.exploit-db.com/exploits/46093/ -CVE-2018-18436 - https://github.com/w3irdo001/demo/blob/master/1.html -CVE-2018-18437 - http://www.binaryworld.it/guidepoc.asp -CVE-2018-18437 - https://www.exploit-db.com/exploits/45668/ -CVE-2018-18443 - https://github.com/openexr/openexr/issues/350 -CVE-2018-18444 - https://github.com/openexr/openexr/issues/351 -CVE-2018-18449 - https://github.com/w3irdo001/demo/blob/master/3.html -CVE-2018-18454 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -CVE-2018-18455 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -CVE-2018-18456 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -CVE-2018-18457 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -CVE-2018-18458 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -CVE-2018-18459 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -CVE-2018-18460 - https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf -CVE-2018-18471 - https://www.wizcase.com/blog/hack-2018/ -CVE-2018-18472 - https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo -CVE-2018-18472 - https://www.wizcase.com/blog/hack-2018/ -CVE-2018-18475 - http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html -CVE-2018-18478 - https://github.com/librenms/librenms/issues/9170 -CVE-2018-18478 - https://hackpuntes.com/cve-2018-18478-libre-nms-1-43-cross-site-scripting-persistente/ -CVE-2018-18480 - https://github.com/sandyre/libopencad/issues/43 -CVE-2018-18481 - https://github.com/sandyre/libopencad/issues/43 -CVE-2018-18483 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602 -CVE-2018-18483 - https://sourceware.org/bugzilla/show_bug.cgi?id=23767 -CVE-2018-18484 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636 -CVE-2018-18485 - https://gitee.com/koyshe/phpshe/issues/INOG4 -CVE-2018-18489 - https://youtu.be/VGNEYWR9MgY -CVE-2018-18494 - https://bugzilla.mozilla.org/show_bug.cgi?id=1487964 -CVE-2018-18496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1422231 -CVE-2018-18499 - https://bugzilla.mozilla.org/show_bug.cgi?id=1468523 -CVE-2018-18500 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18501 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18502 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18503 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18504 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18505 - https://bugzilla.mozilla.org/show_bug.cgi?id=1087565 -CVE-2018-18505 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18506 - https://usn.ubuntu.com/3874-1/ -CVE-2018-18509 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2018-18511 - https://bugzilla.mozilla.org/show_bug.cgi?id=1526218 -CVE-2018-18520 - https://sourceware.org/bugzilla/show_bug.cgi?id=23787 -CVE-2018-18521 - https://sourceware.org/bugzilla/show_bug.cgi?id=23786 -CVE-2018-18527 - https://www.exploit-db.com/exploits/45637/ -CVE-2018-18535 - http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html -CVE-2018-18535 - http://seclists.org/fulldisclosure/2018/Dec/34 -CVE-2018-18536 - http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html -CVE-2018-18536 - http://seclists.org/fulldisclosure/2018/Dec/34 -CVE-2018-18537 - http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html -CVE-2018-18537 - http://seclists.org/fulldisclosure/2018/Dec/34 -CVE-2018-18547 - http://packetstormsecurity.com/files/149897/VestaCP-0.9.8-22-Cross-Site-Scripting.html -CVE-2018-18548 - http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html -CVE-2018-18548 - https://www.exploit-db.com/exploits/45691/ -CVE-2018-18551 - http://hyp3rlinx.altervista.org/advisories/CVE-2018-18551-SERVERSCHECK-MONITORING-SOFTWARE-CROSS-SITE-SCRIPTING.txt -CVE-2018-18551 - http://packetstormsecurity.com/files/149914/ServersCheck-Monitoring-Software-14.3.3-Cross-Site-Scripting.html -CVE-2018-18552 - http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt -CVE-2018-18552 - http://packetstormsecurity.com/files/149907/ServersCheck-Monitoring-Software-14.3.3-Arbitrary-File-Write-DoS.html -CVE-2018-18555 - https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases -CVE-2018-18556 - http://packetstormsecurity.com/files/159234/VyOS-restricted-shell-Escape-Privilege-Escalation.html -CVE-2018-18556 - https://blog.mirch.io/2018/11/05/cve-2018-18556-vyos-privilege-escalation-via-sudo-pppd-for-operator-users/ -CVE-2018-18556 - https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases -CVE-2018-18557 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-18557 -CVE-2018-18557 - https://www.exploit-db.com/exploits/45694/ -CVE-2018-18561 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 -CVE-2018-18562 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 -CVE-2018-18563 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 -CVE-2018-18564 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 -CVE-2018-18565 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 -CVE-2018-18566 - https://seclists.org/bugtraq/2018/Oct/33 -CVE-2018-18566 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-028.txt -CVE-2018-18567 - https://seclists.org/bugtraq/2018/Oct/32 -CVE-2018-18567 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-026.txt -CVE-2018-18568 - https://seclists.org/bugtraq/2018/Oct/36 -CVE-2018-18568 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt -CVE-2018-18569 - https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/ -CVE-2018-18599 - https://github.com/abeluck/stegdetect/issues/10 -CVE-2018-18600 - https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/ -CVE-2018-18601 - https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/ -CVE-2018-18602 - https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/ -CVE-2018-18605 - https://sourceware.org/bugzilla/show_bug.cgi?id=23804 -CVE-2018-18606 - https://sourceware.org/bugzilla/show_bug.cgi?id=23806 -CVE-2018-18607 - https://sourceware.org/bugzilla/show_bug.cgi?id=23805 -CVE-2018-18619 - http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html -CVE-2018-18619 - http://seclists.org/fulldisclosure/2018/Nov/30 -CVE-2018-18619 - https://www.exploit-db.com/exploits/45853/ -CVE-2018-18621 - http://packetstormsecurity.com/files/149916/CommuniGatePro-Pronto-Webmail-6.2-Cross-Site-Scripting.html -CVE-2018-18629 - https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/ -CVE-2018-18635 - https://github.com/MailCleaner/MailCleaner/issues/53 -CVE-2018-18636 - https://cxsecurity.com/issue/WLB-2018100107 -CVE-2018-18636 - https://packetstormsecurity.com/files/149785/D-Link-DSL-2640T-Cross-Site-Scripting.html -CVE-2018-18640 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51423 -CVE-2018-18644 - https://gitlab.com/gitlab-org/gitlab-ee/issues/7528 -CVE-2018-18646 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51142 -CVE-2018-18650 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 -CVE-2018-18651 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 -CVE-2018-18656 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Credential-Leak-Flaws-in-Windows-PureVPN-Client/ -CVE-2018-18661 - http://bugzilla.maptools.org/show_bug.cgi?id=2819 -CVE-2018-18662 - https://bugs.ghostscript.com/show_bug.cgi?id=700043 -CVE-2018-18662 - https://github.com/TeamSeri0us/pocs/tree/master/mupdf -CVE-2018-18665 - https://etherscan.io/address/0x7627de4b93263a6a7570b8dafa64bae812e5c394#code -CVE-2018-18688 - https://pdf-insecurity.org/signature/evaluation_2018.html -CVE-2018-18689 - https://pdf-insecurity.org/signature/evaluation_2018.html -CVE-2018-18695 - https://github.com/DelspoN/CVE/tree/master/CVE-2018-18695 -CVE-2018-18696 - https://raw.githubusercontent.com/Siros96/MicroStrategy_CSRF/master/PoC -CVE-2018-18696 - https://seclists.org/bugtraq/2018/Dec/3 -CVE-2018-18699 - https://github.com/gopro/gpmf-parser/issues/43 -CVE-2018-18700 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681 -CVE-2018-18701 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675 -CVE-2018-18703 - https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html -CVE-2018-18704 - https://www.exploit-db.com/exploits/45682/ -CVE-2018-18705 - https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html -CVE-2018-18706 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-06/Tenda.md -CVE-2018-18707 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-07/Tenda.md -CVE-2018-18708 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-05/Tenda.md -CVE-2018-18709 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-08/Tenda.md -CVE-2018-18711 - https://github.com/wuzhicms/wuzhicms/issues/156 -CVE-2018-18712 - https://github.com/wuzhicms/wuzhicms/issues/156 -CVE-2018-18715 - http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html -CVE-2018-18715 - http://seclists.org/fulldisclosure/2018/Nov/3 -CVE-2018-18716 - http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html -CVE-2018-18716 - http://seclists.org/fulldisclosure/2018/Nov/6 -CVE-2018-18720 - https://github.com/source-trace/yunucms/issues/2 -CVE-2018-18721 - https://github.com/source-trace/yunucms/issues/7 -CVE-2018-18722 - https://github.com/source-trace/yunucms/issues/6 -CVE-2018-18723 - https://github.com/source-trace/yunucms/issues/3 -CVE-2018-18724 - https://github.com/source-trace/yunucms/issues/5 -CVE-2018-18725 - https://github.com/source-trace/yunucms/issues/4 -CVE-2018-18726 - https://github.com/source-trace/yunucms/issues/8 -CVE-2018-18727 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack1.md -CVE-2018-18728 - https://github.com/ZIllR0/Routers/blob/master/Tenda/rce1.md -CVE-2018-18729 - https://github.com/ZIllR0/Routers/blob/master/Tenda/heapoverflow1.md -CVE-2018-18730 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack3.md -CVE-2018-18731 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack4.md -CVE-2018-18732 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack2.md -CVE-2018-18735 - https://github.com/AvaterXXX/catfish/blob/master/catfishblog.md#csrf -CVE-2018-18736 - https://github.com/AvaterXXX/catfish/blob/master/catfishblog.md#xss -CVE-2018-18737 - https://github.com/AvaterXXX/douchat/blob/master/xxe.md#xxe -CVE-2018-18742 - https://github.com/AvaterXXX/SEMCMS/blob/master/CSRF.md -CVE-2018-18749 - https://github.com/clarkgrubb/data-tools/issues/7 -CVE-2018-18751 - https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree -CVE-2018-18751 - https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption -CVE-2018-18752 - https://packetstormsecurity.com/files/149982/Webiness-Inventory-2.9-Shell-Upload.html -CVE-2018-18753 - https://github.com/wuzhicms/wuzhicms/issues/157 -CVE-2018-18755 - http://packetstormsecurity.com/files/150016/K-iwi-Framework-1775-SQL-Injection.html -CVE-2018-18755 - https://www.exploit-db.com/exploits/45735/ -CVE-2018-18756 - http://packetstormsecurity.com/files/149986/Local-Server-1.0.9-Denial-Of-Service.html -CVE-2018-18757 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-18757 - https://www.exploit-db.com/exploits/45703 -CVE-2018-18758 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-18758 - https://www.exploit-db.com/exploits/45707 -CVE-2018-18759 - http://packetstormsecurity.com/files/150015/Modbus-Slave-7.0.0-Denial-Of-Service.html -CVE-2018-18759 - https://www.exploit-db.com/exploits/45732/ -CVE-2018-18760 - http://packetstormsecurity.com/files/150018/RhinOS-CMS-3.x-Arbitrary-File-Download.html -CVE-2018-18760 - https://www.exploit-db.com/exploits/45729/ -CVE-2018-18761 - https://www.exploit-db.com/exploits/45731/ -CVE-2018-18762 - http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html -CVE-2018-18762 - https://www.exploit-db.com/exploits/45734/ -CVE-2018-18763 - http://packetstormsecurity.com/files/150004/SaltOS-Erp-Crm-3.1-r8126-SQL-Injection.html -CVE-2018-18763 - https://www.exploit-db.com/exploits/45733/ -CVE-2018-18764 - https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow1.md -CVE-2018-18764 - https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow2.md -CVE-2018-18765 - https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20mg_mqtt_next_subscribe_topic%20heap%20buffer%20overflow.md -CVE-2018-18772 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html -CVE-2018-18772 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html -CVE-2018-18772 - https://www.exploit-db.com/exploits/45822/ -CVE-2018-18773 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html -CVE-2018-18773 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html -CVE-2018-18773 - https://www.exploit-db.com/exploits/45822/ -CVE-2018-18774 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html -CVE-2018-18774 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html -CVE-2018-18774 - https://www.exploit-db.com/exploits/45822/ -CVE-2018-18775 - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html -CVE-2018-18775 - https://www.exploit-db.com/exploits/45755/ -CVE-2018-18776 - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html -CVE-2018-18776 - https://www.exploit-db.com/exploits/45755/ -CVE-2018-18777 - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html -CVE-2018-18777 - https://www.exploit-db.com/exploits/45755/ -CVE-2018-18784 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18785 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18786 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18787 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18788 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18789 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18790 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18791 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18792 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -CVE-2018-18793 - http://packetstormsecurity.com/files/150006/School-Event-Management-System-1.0-Shell-Upload.html -CVE-2018-18793 - https://www.exploit-db.com/exploits/45723/ -CVE-2018-18794 - http://packetstormsecurity.com/files/150007/School-Event-Management-System-1.0-Cross-Site-Request-Forgery.html -CVE-2018-18794 - https://www.exploit-db.com/exploits/45724/ -CVE-2018-18795 - http://packetstormsecurity.com/files/150014/School-Event-Management-System-1.0-SQL-Injection.html -CVE-2018-18795 - https://www.exploit-db.com/exploits/45722/ -CVE-2018-18796 - http://packetstormsecurity.com/files/149987/Library-Management-System-1.0-SQL-Injection.html -CVE-2018-18797 - http://packetstormsecurity.com/files/150008/School-Attendance-Monitoring-System-1.0-Cross-Site-Request-Forgery.html -CVE-2018-18797 - https://www.exploit-db.com/exploits/45725/ -CVE-2018-18798 - http://packetstormsecurity.com/files/150010/School-Attendance-Monitoring-System-1.0-SQL-Injection.html -CVE-2018-18798 - https://www.exploit-db.com/exploits/45727/ -CVE-2018-18799 - http://packetstormsecurity.com/files/150009/School-Attendance-Monitoring-System-1.0-Shell-Upload.html -CVE-2018-18799 - https://www.exploit-db.com/exploits/45726/ -CVE-2018-18800 - http://packetstormsecurity.com/files/150019/PayPal-Credit-Card-Debit-Card-Payment-1.0-SQL-Injection.html -CVE-2018-18800 - https://www.exploit-db.com/exploits/45728/ -CVE-2018-18801 - http://packetstormsecurity.com/files/150017/E-Negosyo-System-1.0-SQL-Injection.html -CVE-2018-18801 - https://www.exploit-db.com/exploits/45730/ -CVE-2018-18802 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-18802 - https://www.exploit-db.com/exploits/45718 -CVE-2018-18803 - http://packetstormsecurity.com/files/150011/Curriculum-Evaluation-System-1.0-SQL-Injection.html -CVE-2018-18803 - https://www.exploit-db.com/exploits/45719/ -CVE-2018-18804 - http://packetstormsecurity.com/files/150012/Bakeshop-Inventory-System-In-VB.Net-MS-Access-Database-1.0-SQL-Injection.html -CVE-2018-18804 - https://www.exploit-db.com/exploits/45720/ -CVE-2018-18805 - http://packetstormsecurity.com/files/150013/Point-Of-Sales-POS-In-VB.Net-MYSQL-Database-1.0-SQL-Injection.html -CVE-2018-18805 - https://www.exploit-db.com/exploits/45721/ -CVE-2018-18806 - http://packetstormsecurity.com/files/149996/School-Equipment-Monitoring-System-1.0-SQL-Injection.html -CVE-2018-18809 - http://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html -CVE-2018-18809 - http://seclists.org/fulldisclosure/2019/Sep/17 -CVE-2018-18809 - https://cybersecurityworks.com/zerodays/cve-2018-18809-tibco.html -CVE-2018-18809 - https://security.elarlang.eu/cve-2018-18809-path-traversal-in-tibco-jaspersoft.html -CVE-2018-18822 - https://www.exploit-db.com/exploits/45704/ -CVE-2018-18823 - https://www.linkedin.com/in/subodh-kumar-8a00b1125/ -CVE-2018-18824 - https://www.linkedin.com/in/subodh-kumar-8a00b1125/ -CVE-2018-18826 - https://bugzilla.libav.org/show_bug.cgi?id=1135 -CVE-2018-18827 - https://bugzilla.libav.org/show_bug.cgi?id=1135 -CVE-2018-18828 - https://bugzilla.libav.org/show_bug.cgi?id=1135 -CVE-2018-18829 - https://bugzilla.libav.org/show_bug.cgi?id=1136 -CVE-2018-18831 - https://gitee.com/mingSoft/MCMS/issues/IO0K0 -CVE-2018-18836 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca -CVE-2018-18837 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca -CVE-2018-18838 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca -CVE-2018-18839 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca -CVE-2018-18840 - https://github.com/m3lon/XSS-Expoit/blob/master/SEMCMS%20Stored%20XSS%20Vulnerability.md -CVE-2018-18845 - http://packetstormsecurity.com/files/151799/Advanced-Comment-System-1.0-Cross-Site-Scripting.html -CVE-2018-18845 - http://seclists.org/fulldisclosure/2019/Feb/46 -CVE-2018-18856 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html -CVE-2018-18856 - http://seclists.org/fulldisclosure/2018/Nov/1 -CVE-2018-18856 - https://www.exploit-db.com/exploits/45782/ -CVE-2018-18857 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html -CVE-2018-18857 - http://seclists.org/fulldisclosure/2018/Nov/1 -CVE-2018-18857 - https://www.exploit-db.com/exploits/45782/ -CVE-2018-18858 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html -CVE-2018-18858 - http://seclists.org/fulldisclosure/2018/Nov/1 -CVE-2018-18858 - https://www.exploit-db.com/exploits/45782/ -CVE-2018-18859 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html -CVE-2018-18859 - http://seclists.org/fulldisclosure/2018/Nov/1 -CVE-2018-18859 - https://www.exploit-db.com/exploits/45782/ -CVE-2018-18860 - http://packetstormsecurity.com/files/150323/SwitchVPN-For-MacOS-2.1012.03-Privilege-Escalation.html -CVE-2018-18860 - http://seclists.org/fulldisclosure/2018/Nov/38 -CVE-2018-18860 - https://www.exploit-db.com/exploits/45854/ -CVE-2018-18861 - http://packetstormsecurity.com/files/150174/PCManFTPD-2.0.7-Server-APPE-Command-Buffer-Overflow.html -CVE-2018-18862 - http://packetstormsecurity.com/files/151021/BMC-Remedy-ITAM-7.1.00-9.1.02.003-Information-Disclosure.html -CVE-2018-18864 - http://packetstormsecurity.com/files/150135/Loadbalancer.org-Enterprise-VA-MAX-Cross-Site-Scripting.html -CVE-2018-18864 - http://seclists.org/fulldisclosure/2018/Nov/5 -CVE-2018-18865 - http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html -CVE-2018-18865 - http://seclists.org/fulldisclosure/2018/Nov/25 -CVE-2018-18865 - http://seclists.org/fulldisclosure/2018/Nov/4 -CVE-2018-18865 - https://www.exploit-db.com/exploits/45783/ -CVE-2018-18871 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Gigaset_Maxwell.pdf?_=1541431343 -CVE-2018-18872 - https://wpvulndb.com/vulnerabilities/9141 -CVE-2018-18873 - https://github.com/mdadams/jasper/issues/184 -CVE-2018-18873 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-18874 - https://github.com/gnat/nc-cms/issues/11 -CVE-2018-18890 - https://github.com/AvaterXXX/MiniCms/blob/master/Authentication%20and%20Information%20Exposure.md#information-exposure -CVE-2018-18891 - https://github.com/AvaterXXX/MiniCms/blob/master/Authentication%20and%20Information%20Exposure.md#authentication-vulnerability -CVE-2018-18897 - https://gitlab.freedesktop.org/poppler/poppler/issues/654 -CVE-2018-1890 - https://www.ibm.com/support/docview.wss?uid=ibm10873042 -CVE-2018-18903 - https://open.vanillaforums.com/discussion/36771/security-update-vanilla-2-6-4 -CVE-2018-18903 - https://srcincite.io/blog/2018/10/02/old-school-pwning-with-new-school-tricks-vanilla-forums-remote-code-execution.html -CVE-2018-18909 - https://github.com/yaniswang/xhEditor/issues/37 -CVE-2018-18912 - https://github.com/notkisi/CVE-s/blob/master/CVE-2018-18912.py -CVE-2018-18915 - https://github.com/Exiv2/exiv2/issues/511 -CVE-2018-18919 - https://github.com/JaxsonWang/WP-Editor.md/issues/275 -CVE-2018-18920 - https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx/ -CVE-2018-18921 - https://medium.com/bugbountywriteup/cve-2018-18921-php-server-monitor-3-3-1-cross-site-request-forgery-a73e8dae563 -CVE-2018-18922 - https://0day.today/exploit/31658 -CVE-2018-18922 - https://hackpuntes.com/cve-2018-18922-ticketly-1-0-escalacion-de-privilegios-crear-cuenta-administrador/ -CVE-2018-18922 - https://medium.com/@javierolmedo/cve-2018-18922-ticketly-1-0-privilege-escalation-add-admin-4d1b3696f367 -CVE-2018-18922 - https://www.exploit-db.com/exploits/45892 -CVE-2018-18923 - https://hackpuntes.com/cve-2018-18923-ticketly-1-0-multiples-sql-injections/ -CVE-2018-18923 - https://www.exploit-db.com/exploits/45902/ -CVE-2018-18924 - https://www.exploit-db.com/exploits/45680/ -CVE-2018-18928 - https://unicode-org.atlassian.net/browse/ICU-20246 -CVE-2018-18934 - https://github.com/PopojiCMS/PopojiCMS/issues/13 -CVE-2018-18935 - https://github.com/PopojiCMS/PopojiCMS/issues/14 -CVE-2018-18938 - https://github.com/wuzhicms/wuzhicms/issues/158 -CVE-2018-18939 - https://github.com/wuzhicms/wuzhicms/issues/159 -CVE-2018-18940 - http://packetstormsecurity.com/files/150262/Netscape-Enterprise-3.63-Cross-Site-Scripting.html -CVE-2018-18940 - http://seclists.org/fulldisclosure/2018/Nov/31 -CVE-2018-18941 - http://packetstormsecurity.com/files/150263/Vignette-Content-Management-6-Security-Bypass.html -CVE-2018-18941 - http://seclists.org/fulldisclosure/2018/Nov/32 -CVE-2018-18942 - http://sunu11.com/2018/10/31/baserCMS/ -CVE-2018-18943 - http://sunu11.com/2018/10/31/baserCMS/ -CVE-2018-18944 - https://www.exploit-db.com/author/?a=8844 -CVE-2018-18944 - https://www.exploit-db.com/exploits/45760 -CVE-2018-18952 - https://blog.csdn.net/libieme/article/details/83588929 -CVE-2018-18955 - https://www.exploit-db.com/exploits/45886/ -CVE-2018-18955 - https://www.exploit-db.com/exploits/45915/ -CVE-2018-18957 - https://www.exploit-db.com/exploits/45798/ -CVE-2018-18959 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-18959/poc-cve-2018-18959.py -CVE-2018-18960 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-18960/poc-cve-2018-18960.py -CVE-2018-18975 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic -CVE-2018-18976 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic -CVE-2018-18977 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic -CVE-2018-18978 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic -CVE-2018-18979 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic -CVE-2018-18980 - https://github.com/x-f1v3/ForCve/issues/5 -CVE-2018-18982 - https://www.exploit-db.com/exploits/46449/ -CVE-2018-19005 - https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01 -CVE-2018-19037 - https://www.exploit-db.com/exploits/45776/ -CVE-2018-19039 - https://www.percona.com/blog/2018/11/20/how-cve-2018-19039-affects-percona-monitoring-and-management/ -CVE-2018-19040 - https://www.exploit-db.com/exploits/45809/ -CVE-2018-19041 - https://www.exploit-db.com/exploits/45809/ -CVE-2018-19042 - https://www.exploit-db.com/exploits/45809/ -CVE-2018-19043 - https://www.exploit-db.com/exploits/45809/ -CVE-2018-19047 - https://github.com/mpdf/mpdf/issues/867 -CVE-2018-19058 - https://gitlab.freedesktop.org/poppler/poppler/issues/659 -CVE-2018-19059 - https://gitlab.freedesktop.org/poppler/poppler/issues/661 -CVE-2018-19063 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19064 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19065 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19066 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19067 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19068 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19069 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19070 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19071 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19072 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19073 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19074 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19075 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19076 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19077 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19078 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19079 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19080 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19081 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19082 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -CVE-2018-19092 - https://github.com/yzmcms/yzmcms/issues/7 -CVE-2018-1910 - http://www.ibm.com/support/docview.wss?uid=ibm10875372 -CVE-2018-19105 - https://code610.blogspot.com/2018/11/crashing-librecad-213.html -CVE-2018-19107 - https://github.com/Exiv2/exiv2/pull/518 -CVE-2018-19108 - https://github.com/Exiv2/exiv2/pull/518 -CVE-2018-19113 - http://packetstormsecurity.com/files/153275/Pronestor-Health-Monitoring-Privilege-Escalation.html -CVE-2018-19125 - https://www.exploit-db.com/exploits/45964/ -CVE-2018-19126 - https://www.exploit-db.com/exploits/45964/ -CVE-2018-19128 - https://bugzilla.libav.org/show_bug.cgi?id=1137 -CVE-2018-19129 - https://bugzilla.libav.org/show_bug.cgi?id=1138 -CVE-2018-19130 - https://bugzilla.libav.org/show_bug.cgi?id=1139 -CVE-2018-19135 - https://github.com/ClipperCMS/ClipperCMS/issues/494 -CVE-2018-19135 - https://www.exploit-db.com/exploits/45839/ -CVE-2018-19136 - https://www.exploit-db.com/exploits/45883/ -CVE-2018-19138 - https://www.exploit-db.com/exploits/46036/ -CVE-2018-19139 - https://github.com/mdadams/jasper/issues/188 -CVE-2018-19139 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-1914 - http://www.ibm.com/support/docview.wss?uid=ibm10875372 -CVE-2018-19145 - https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmsxss.html -CVE-2018-19150 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2018-09-19-pdf-architect-corruption.md -CVE-2018-19150 - https://nafiez.github.io/security/integer/2018/09/18/pdf-architect-corruption.html -CVE-2018-19178 - https://github.com/zchuanzhao/jeesns/issues/6 -CVE-2018-19180 - https://github.com/doublefast/yunucms/issues/1 -CVE-2018-19181 - https://github.com/doublefast/yunucms/issues/1 -CVE-2018-19186 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk -CVE-2018-19187 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk -CVE-2018-19188 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk -CVE-2018-19189 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk -CVE-2018-19190 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk -CVE-2018-19191 - http://packetstormsecurity.com/files/151144/Webmin-1.890-Cross-Site-Scripting.html -CVE-2018-19192 - https://github.com/AvaterXXX/XiaoCms/blob/master/CSRF.md -CVE-2018-19196 - https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md -CVE-2018-19207 - https://wpvulndb.com/vulnerabilities/9144 -CVE-2018-19207 - https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/ -CVE-2018-19208 - https://bugzilla.redhat.com/show_bug.cgi?id=1643752 -CVE-2018-19210 - http://bugzilla.maptools.org/show_bug.cgi?id=2820 -CVE-2018-19210 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html -CVE-2018-19210 - https://usn.ubuntu.com/3906-1/ -CVE-2018-19211 - https://bugzilla.redhat.com/show_bug.cgi?id=1643754 -CVE-2018-19213 - https://bugzilla.nasm.us/show_bug.cgi?id=3392524 -CVE-2018-19214 - https://bugzilla.nasm.us/show_bug.cgi?id=3392521 -CVE-2018-19215 - https://bugzilla.nasm.us/show_bug.cgi?id=3392525 -CVE-2018-19217 - https://bugzilla.redhat.com/show_bug.cgi?id=1643753 -CVE-2018-19220 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#getshell -CVE-2018-19221 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#sql-injection -CVE-2018-19222 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#reset-admin-password -CVE-2018-19223 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss2 -CVE-2018-19224 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#unauthorized-access -CVE-2018-19225 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#csrf -CVE-2018-19226 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#info_exp -CVE-2018-19227 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss1 -CVE-2018-19228 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#del-file -CVE-2018-19229 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss3 -CVE-2018-19232 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19232/poc-cve-2018-19232.py -CVE-2018-19233 - http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html -CVE-2018-19233 - http://seclists.org/fulldisclosure/2018/Nov/55 -CVE-2018-19233 - https://seclists.org/bugtraq/2018/Nov/37 -CVE-2018-19233 - https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ -CVE-2018-19234 - http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html -CVE-2018-19234 - http://seclists.org/fulldisclosure/2018/Nov/55 -CVE-2018-19234 - https://seclists.org/bugtraq/2018/Nov/37 -CVE-2018-19234 - https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ -CVE-2018-19239 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html -CVE-2018-19239 - http://seclists.org/fulldisclosure/2018/Dec/21 -CVE-2018-19240 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html -CVE-2018-19240 - http://seclists.org/fulldisclosure/2018/Dec/21 -CVE-2018-19241 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html -CVE-2018-19241 - http://seclists.org/fulldisclosure/2018/Dec/21 -CVE-2018-19242 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html -CVE-2018-19242 - http://seclists.org/fulldisclosure/2018/Dec/21 -CVE-2018-19244 - https://whitehatck01.blogspot.com/2018/11/charles-427-xml-external-entity.html -CVE-2018-19246 - https://github.com/Athlon1600/php-proxy-app/issues/134 -CVE-2018-19246 - https://www.exploit-db.com/exploits/45861/ -CVE-2018-19248 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19248/poc-cve-2018-19248.py -CVE-2018-19275 - https://www.mitel.com/-/media/mitel/pdf/security-advisories/security-bulletin-190002001-v10.pdf -CVE-2018-19276 - http://packetstormsecurity.com/files/151553/OpenMRS-Platform-Insecure-Object-Deserialization.html -CVE-2018-19276 - http://packetstormsecurity.com/files/155691/OpenMRS-Java-Deserialization-Remote-Code-Execution.html -CVE-2018-19276 - https://know.bishopfox.com/advisories/news/2019/02/openmrs-insecure-object-deserialization -CVE-2018-19276 - https://www.exploit-db.com/exploits/46327/ -CVE-2018-19277 - https://www.drupal.org/sa-contrib-2021-043 -CVE-2018-19287 - https://www.exploit-db.com/exploits/45880/ -CVE-2018-19289 - https://github.com/xCss/Valine/issues/127 -CVE-2018-1929 - http://www.ibm.com/support/docview.wss?uid=ibm10875372 -CVE-2018-19290 - http://packetstormsecurity.com/files/150391/Budabot-4.0-Denial-Of-Service.html -CVE-2018-19290 - http://seclists.org/fulldisclosure/2018/Nov/44 -CVE-2018-19291 - https://github.com/chekun/DiliCMS/issues/60 -CVE-2018-19300 - https://community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerability-in-d-link-dwr-and-dap-routers/1772 -CVE-2018-19320 - http://seclists.org/fulldisclosure/2018/Dec/39 -CVE-2018-19320 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities -CVE-2018-19321 - http://seclists.org/fulldisclosure/2018/Dec/39 -CVE-2018-19321 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities -CVE-2018-19322 - http://seclists.org/fulldisclosure/2018/Dec/39 -CVE-2018-19322 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities -CVE-2018-19323 - http://seclists.org/fulldisclosure/2018/Dec/39 -CVE-2018-19323 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities -CVE-2018-19328 - https://github.com/onkyoworm/poc/blob/master/laobancms/poc.md -CVE-2018-19331 - https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmssql-injection.html -CVE-2018-19332 - https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmscsrf.html -CVE-2018-19333 - https://justi.cz/security/2018/11/14/gvisor-lpe.html -CVE-2018-19334 - https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 -CVE-2018-19334 - https://www.reddit.com/r/netsec/comments/9yiidf/xssearching_googles_bug_tracker_to_find_out/ea2i7wz/ -CVE-2018-19335 - https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 -CVE-2018-19335 - https://www.reddit.com/r/netsec/comments/9yiidf/xssearching_googles_bug_tracker_to_find_out/ea2i7wz/ -CVE-2018-19353 - https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-libansilove-1.0.0 -CVE-2018-19353 - https://github.com/ansilove/libansilove/issues/4 -CVE-2018-19357 - https://exploit-db.com/exploits/46020/ -CVE-2018-19358 - https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365 -CVE-2018-19358 - https://github.com/sungjungk/keyring_crack -CVE-2018-19358 - https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550 -CVE-2018-19359 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54189 -CVE-2018-19360 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19360 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-19361 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19361 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-19362 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19362 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-19362 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-19367 - https://github.com/lichti/shodan-portainer/ -CVE-2018-19367 - https://github.com/portainer/portainer/issues/2475 -CVE-2018-19371 - http://packetstormsecurity.com/files/150826/SDL-Web-Content-Manager-8.5.0-XML-Injection.html -CVE-2018-19371 - https://www.exploit-db.com/exploits/46000/ -CVE-2018-19376 - https://github.com/GreenCMS/GreenCMS/issues/114 -CVE-2018-19386 - https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5 -CVE-2018-19393 - https://cyberskr.com/blog/cobham-satcom-800-900.html -CVE-2018-19394 - https://cyberskr.com/blog/cobham-satcom-800-900.html -CVE-2018-19404 - https://github.com/HF9/yxcms-code-audit/blob/master/Any%20PHP%20Code%20Execution -CVE-2018-19406 - https://lkml.org/lkml/2018/11/20/411 -CVE-2018-19409 - https://bugs.ghostscript.com/show_bug.cgi?id=700176 -CVE-2018-19413 - http://packetstormsecurity.com/files/150496/SonarSource-SonarQube-7.3-Information-Disclosure.html -CVE-2018-19413 - https://jira.sonarsource.com/browse/SONAR-11305 -CVE-2018-19414 - http://packetstormsecurity.com/files/150657/Plikli-4.0.0-Cross-Site-Scripting.html -CVE-2018-19416 - https://github.com/sysstat/sysstat/issues/196 -CVE-2018-19422 - http://packetstormsecurity.com/files/162591/Subrion-CMS-4.2.1-Shell-Upload.html -CVE-2018-19422 - http://packetstormsecurity.com/files/173998/Intelliants-Subrion-CMS-4.2.1-Remote-Code-Execution.html -CVE-2018-19423 - http://packetstormsecurity.com/files/162772/Codiad-2.8.4-Shell-Upload.html -CVE-2018-19432 - https://github.com/erikd/libsndfile/issues/427 -CVE-2018-19432 - https://usn.ubuntu.com/4013-1/ -CVE-2018-19439 - http://packetstormsecurity.com/files/150444/Oracle-Secure-Global-Desktop-Administration-Console-4.4-Cross-Site-Scripting.html -CVE-2018-19439 - http://seclists.org/fulldisclosure/2018/Nov/58 -CVE-2018-19442 - https://media.ccc.de/v/eh19-157-smart-vacuum-cleaners-as-remote-wiretapping-devices#t=1779 -CVE-2018-19457 - https://www.exploit-db.com/exploits/45326/ -CVE-2018-19458 - https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html -CVE-2018-19458 - https://www.exploit-db.com/exploits/45780/ -CVE-2018-19459 - https://www.exploit-db.com/exploits/45687/ -CVE-2018-19466 - https://github.com/MauroEldritch/lempo -CVE-2018-19469 - https://github.com/woider/ArticleCMS/issues/5 -CVE-2018-19475 - https://bugs.ghostscript.com/show_bug.cgi?id=700153 -CVE-2018-19487 - https://github.com/Antho59/wp-jobhunt-exploit -CVE-2018-19487 - https://wpvulndb.com/vulnerabilities/9206 -CVE-2018-19488 - https://github.com/Antho59/wp-jobhunt-exploit -CVE-2018-19488 - https://wpvulndb.com/vulnerabilities/9206 -CVE-2018-19493 - https://gitlab.com/gitlab-org/gitlab-ce/issues/53037 -CVE-2018-19495 - https://gitlab.com/gitlab-org/gitlab-ee/issues/8167 -CVE-2018-19497 - https://github.com/sleuthkit/sleuthkit/pull/1374 -CVE-2018-19498 - http://packetstormsecurity.com/files/151466/Pages-For-Bitbucket-Server-2.6.0-Cross-Site-Scripting.html -CVE-2018-19498 - https://seclists.org/bugtraq/2019/Jan/53 -CVE-2018-19498 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-037.txt -CVE-2018-19502 - https://github.com/TeamSeri0us/pocs/tree/master/faad -CVE-2018-19503 - https://github.com/TeamSeri0us/pocs/tree/master/faad -CVE-2018-19504 - https://github.com/TeamSeri0us/pocs/tree/master/faad -CVE-2018-19505 - http://packetstormsecurity.com/files/150492/BMC-Remedy-7.1-User-Impersonation.html -CVE-2018-19505 - http://seclists.org/fulldisclosure/2018/Nov/62 -CVE-2018-19509 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19510 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19511 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19512 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19513 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19514 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19515 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -CVE-2018-19517 - https://github.com/sysstat/sysstat/issues/199 -CVE-2018-19518 - https://antichat.com/threads/463395/#post-4254681 -CVE-2018-19518 - https://bugs.debian.org/913775 -CVE-2018-19518 - https://bugs.debian.org/913835 -CVE-2018-19518 - https://bugs.debian.org/913836 -CVE-2018-19518 - https://www.exploit-db.com/exploits/45914/ -CVE-2018-19518 - https://www.openwall.com/lists/oss-security/2018/11/22/3 -CVE-2018-19519 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2018-19523 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86ahttps://downwithup.github.io/CVEPosts.html -CVE-2018-19524 - http://packetstormsecurity.com/files/151608/Skyworth-GPON-HomeGateways-Optical-Network-Stack-Overflow.html -CVE-2018-19524 - http://seclists.org/fulldisclosure/2019/Feb/30 -CVE-2018-19524 - https://s3curityb3ast.github.io/KSA-Dev-001.md -CVE-2018-19524 - https://seclists.org/bugtraq/2019/Feb/21 -CVE-2018-19524 - https://www.exploit-db.com/exploits/46358/ -CVE-2018-19525 - http://packetstormsecurity.com/files/151647/SYSTORME-ISG-Cross-Site-Request-Forgery.html -CVE-2018-19525 - http://seclists.org/fulldisclosure/2019/Feb/31 -CVE-2018-19525 - https://s3curityb3ast.github.io/KSA-Dev-002.md -CVE-2018-19530 - https://github.com/httl/httl/issues/225 -CVE-2018-19531 - https://github.com/httl/httl/issues/224 -CVE-2018-19532 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-pdftranslatorsettarget-podofo-0-9-6/ -CVE-2018-19532 - https://sourceforge.net/p/podofo/tickets/32/ -CVE-2018-19535 - https://github.com/Exiv2/exiv2/issues/428 -CVE-2018-19537 - https://github.com/JackDoan/TP-Link-ArcherC5-RCE -CVE-2018-19539 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19540 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19541 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19542 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19543 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19550 - http://packetstormsecurity.com/files/153018/Interspire-Email-Marketer-6.20-Remote-Code-Execution.html -CVE-2018-19554 - https://medium.com/@buxuqua/dotcms-xss-65cdc4174815 -CVE-2018-19564 - https://www.exploit-db.com/exploits/45900/ -CVE-2018-19570 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52392 -CVE-2018-19571 - http://packetstormsecurity.com/files/160516/GitLab-11.4.7-Remote-Code-Execution.html -CVE-2018-19571 - http://packetstormsecurity.com/files/160699/GitLab-11.4.7-Remote-Code-Execution.html -CVE-2018-19575 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52523 -CVE-2018-19576 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51238 -CVE-2018-19577 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52444 -CVE-2018-19581 - https://gitlab.com/gitlab-org/gitlab-ee/issues/7696 -CVE-2018-19584 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52522 -CVE-2018-19585 - http://packetstormsecurity.com/files/160516/GitLab-11.4.7-Remote-Code-Execution.html -CVE-2018-19585 - http://packetstormsecurity.com/files/160699/GitLab-11.4.7-Remote-Code-Execution.html -CVE-2018-19588 - https://www.vfxcomputing.com/?CVE-2018-19588 -CVE-2018-19591 - https://sourceware.org/bugzilla/show_bug.cgi?id=23927 -CVE-2018-19600 - https://github.com/rhymix/rhymix/issues/1088 -CVE-2018-19607 - https://github.com/Exiv2/exiv2/issues/561 -CVE-2018-19608 - http://cat.eyalro.net/ -CVE-2018-19609 - https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/IncorrectAccessControl -CVE-2018-19615 - http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html -CVE-2018-19615 - https://www.exploit-db.com/exploits/45928/ -CVE-2018-19616 - http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html -CVE-2018-19616 - https://www.exploit-db.com/exploits/45937/ -CVE-2018-19620 - https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/IncorrectAccessControl#0x02-modify -CVE-2018-19621 - https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/csrf -CVE-2018-19622 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19623 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19624 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280 -CVE-2018-19624 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19625 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19626 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19627 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279 -CVE-2018-19627 - https://www.exploit-db.com/exploits/45951/ -CVE-2018-19627 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19628 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15281 -CVE-2018-19628 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-19629 - https://www.oppositionsecurity.com/imagenow-7-1-4-dos/ -CVE-2018-19646 - https://www.exploit-db.com/exploits/45542 -CVE-2018-19649 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19649 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19650 - http://packetstormsecurity.com/files/150549/ATool-1.0.0.22-Stack-Buffer-Overflow.html -CVE-2018-19651 - https://medium.com/@namhb/ssrf-to-lfi-in-interspire-email-marketer-698a748462a9 -CVE-2018-19655 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890086 -CVE-2018-19655 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906529 -CVE-2018-19659 - http://packetstormsecurity.com/files/150535/Moxa-NPort-W2x50A-2.1-OS-Command-Injection.html -CVE-2018-19659 - http://seclists.org/fulldisclosure/2018/Nov/64 -CVE-2018-19660 - http://packetstormsecurity.com/files/150535/Moxa-NPort-W2x50A-2.1-OS-Command-Injection.html -CVE-2018-19660 - http://seclists.org/fulldisclosure/2018/Nov/64 -CVE-2018-19661 - https://github.com/erikd/libsndfile/issues/429 -CVE-2018-19661 - https://usn.ubuntu.com/4013-1/ -CVE-2018-19662 - https://github.com/erikd/libsndfile/issues/429 -CVE-2018-19662 - https://usn.ubuntu.com/4013-1/ -CVE-2018-19666 - https://github.com/ossec/ossec-hids/issues/1585 -CVE-2018-19693 - https://github.com/fmsdwifull/tp5cms/issues/6 -CVE-2018-19694 - http://packetstormsecurity.com/files/151119/HMS-Netbiter-WS100-3.30.5-Cross-Site-Scripting.html -CVE-2018-19694 - https://seclists.org/bugtraq/2019/Jan/9 -CVE-2018-19749 - https://github.com/domainmod/domainmod/issues/81 -CVE-2018-19749 - https://www.exploit-db.com/exploits/45941/ -CVE-2018-19750 - https://github.com/domainmod/domainmod/issues/82 -CVE-2018-19750 - https://www.exploit-db.com/exploits/45946/ -CVE-2018-19751 - https://github.com/domainmod/domainmod/issues/83 -CVE-2018-19751 - https://www.exploit-db.com/exploits/45947/ -CVE-2018-19752 - https://github.com/domainmod/domainmod/issues/84 -CVE-2018-19752 - https://www.exploit-db.com/exploits/45949/ -CVE-2018-19753 - http://packetstormsecurity.com/files/150541/Tarantella-Enterprise-Directory-Traversal.html -CVE-2018-19753 - http://seclists.org/fulldisclosure/2018/Nov/66 -CVE-2018-19754 - http://packetstormsecurity.com/files/150542/Tarantella-Enterprise-Security-Bypass.html -CVE-2018-19754 - http://seclists.org/fulldisclosure/2018/Nov/67 -CVE-2018-19755 - https://bugzilla.nasm.us/show_bug.cgi?id=3392528 -CVE-2018-19756 - https://bugzilla.redhat.com/show_bug.cgi?id=1649198 -CVE-2018-19757 - https://bugzilla.redhat.com/show_bug.cgi?id=1649197 -CVE-2018-19758 - https://bugzilla.redhat.com/show_bug.cgi?id=1643812 -CVE-2018-19758 - https://usn.ubuntu.com/4013-1/ -CVE-2018-19759 - https://bugzilla.redhat.com/show_bug.cgi?id=1649202 -CVE-2018-19761 - https://bugzilla.redhat.com/show_bug.cgi?id=1649200 -CVE-2018-19762 - https://bugzilla.redhat.com/show_bug.cgi?id=1649199 -CVE-2018-19763 - https://bugzilla.redhat.com/show_bug.cgi?id=1649201 -CVE-2018-19765 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19765 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19766 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19766 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19767 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19767 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19768 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19768 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19769 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19769 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19770 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19770 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19771 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19771 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19772 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19772 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19773 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19773 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19774 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19774 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19775 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19775 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19777 - https://bugs.ghostscript.com/show_bug.cgi?id=700301 -CVE-2018-19782 - http://packetstormsecurity.com/files/150608/FreshRSS-1.11.1-Cross-Site-Scripting.html -CVE-2018-19782 - http://seclists.org/fulldisclosure/2018/Dec/3 -CVE-2018-19782 - https://www.exploit-db.com/exploits/45954/ -CVE-2018-19783 - http://packetstormsecurity.com/files/151237/Kentix-MultiSensor-LAN-5.63.00-Authentication-Bypass.html -CVE-2018-19783 - https://seclists.org/bugtraq/2019/Jan/21 -CVE-2018-19791 - https://github.com/litespeedtech/openlitespeed/issues/117 -CVE-2018-19792 - https://github.com/litespeedtech/openlitespeed/issues/117 -CVE-2018-19794 - https://bugs.internet2.edu/jira/browse/GRP-1838 -CVE-2018-19796 - https://wpvulndb.com/vulnerabilities/9154 -CVE-2018-19798 - https://exploit-db.com/exploits/45927 -CVE-2018-19799 - http://packetstormsecurity.com/files/150623/Dolibarr-ERP-CRM-8.0.3-Cross-Site-Scripting.html -CVE-2018-19799 - https://pentest.com.tr/exploits/Dolibarr-ERP-CRM-8-0-3-Cross-Site-Scripting.html -CVE-2018-19799 - https://www.exploit-db.com/exploits/45945/ -CVE-2018-19809 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19809 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19810 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19810 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19811 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19811 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19812 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19812 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19813 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19813 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19814 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19814 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19815 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19815 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19816 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19816 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19817 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19817 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19818 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19818 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19819 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19819 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19820 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19820 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19821 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19821 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19822 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -CVE-2018-19822 - http://seclists.org/fulldisclosure/2018/Dec/20 -CVE-2018-19828 - https://hackpuntes.com/cve-2018-19828-integria-ims-5-0-83-cross-site-scripting-reflejado/ -CVE-2018-19828 - https://www.exploit-db.com/exploits/46012/ -CVE-2018-19829 - https://hackpuntes.com/cve-2018-19829-integria-ims-5-0-83-cross-site-request-forgery/ -CVE-2018-19829 - https://www.exploit-db.com/exploits/46013/ -CVE-2018-19840 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-19841 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-19854 - https://usn.ubuntu.com/3901-1/ -CVE-2018-19855 - https://www.uipath.com/product/release-notes -CVE-2018-19856 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54857 -CVE-2018-19858 - https://www.youtube.com/watch?v=-7YIzYtWhzM -CVE-2018-19861 - http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html -CVE-2018-19861 - http://seclists.org/fulldisclosure/2018/Dec/19 -CVE-2018-19861 - https://www.exploit-db.com/exploits/45999/ -CVE-2018-19862 - http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html -CVE-2018-19862 - http://seclists.org/fulldisclosure/2018/Dec/19 -CVE-2018-19862 - https://www.exploit-db.com/exploits/45999/ -CVE-2018-19864 - http://packetstormsecurity.com/files/153162/NUUO-NVRMini-2-3.9.1-Stack-Overflow.html -CVE-2018-19877 - https://www.exploit-db.com/exploits/45958/ -CVE-2018-19878 - https://www.triadsec.com/ -CVE-2018-19878 - https://www.triadsec.com/CVE-2018-19878.pdf -CVE-2018-19879 - https://www.triadsec.com/CVE-2018-19879.pdf -CVE-2018-19881 - https://github.com/TeamSeri0us/pocs/tree/master/mupdf/20181203 -CVE-2018-19882 - https://github.com/TeamSeri0us/pocs/tree/master/mupdf/20181203 -CVE-2018-19886 - https://github.com/knik0/faac/issues/23 -CVE-2018-19887 - https://github.com/knik0/faac/issues/21 -CVE-2018-19888 - https://github.com/knik0/faac/issues/25 -CVE-2018-19889 - https://github.com/knik0/faac/issues/22 -CVE-2018-19890 - https://github.com/knik0/faac/issues/20 -CVE-2018-19891 - https://github.com/knik0/faac/issues/24 -CVE-2018-19894 - https://github.com/thinkcmf/cmfx/issues/26 -CVE-2018-19895 - https://github.com/thinkcmf/cmfx/issues/26 -CVE-2018-19896 - https://github.com/thinkcmf/cmfx/issues/26 -CVE-2018-19897 - https://github.com/thinkcmf/cmfx/issues/26 -CVE-2018-19898 - https://github.com/thinkcmf/cmfx/issues/26 -CVE-2018-19908 - https://www.exploit-db.com/exploits/46401/ -CVE-2018-19913 - https://github.com/domainmod/domainmod/issues/86 -CVE-2018-19913 - https://www.exploit-db.com/exploits/45967/ -CVE-2018-19914 - https://github.com/domainmod/domainmod/issues/87 -CVE-2018-19914 - https://www.exploit-db.com/exploits/46375/ -CVE-2018-19915 - https://github.com/domainmod/domainmod/issues/87 -CVE-2018-19915 - https://www.exploit-db.com/exploits/46376/ -CVE-2018-19917 - http://packetstormsecurity.com/files/151005/Microweber-1.0.8-Cross-Site-Scripting.html -CVE-2018-19918 - https://github.com/CuppaCMS/CuppaCMS/issues/3 -CVE-2018-19919 - https://github.com/pixelimity/pixelimity/issues/19 -CVE-2018-19922 - https://github.com/logern5/c1000a_xss/blob/master/README.md -CVE-2018-19923 - https://github.com/Venan24/SCMS/issues/2 -CVE-2018-19924 - https://github.com/Venan24/SCMS/issues/2 -CVE-2018-19933 - https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting -CVE-2018-19933 - https://www.exploit-db.com/exploits/46014/ -CVE-2018-19934 - http://packetstormsecurity.com/files/151474/SolarWinds-Serv-U-FTP-15.1.6.25-Cross-Site-Scripting.html -CVE-2018-19934 - http://seclists.org/fulldisclosure/2019/Feb/5 -CVE-2018-19935 - https://hackerone.com/reports/456727 -CVE-2018-19936 - http://packetstormsecurity.com/files/150750/PrinterOn-Enterprise-4.1.4-Arbitrary-File-Deletion.html -CVE-2018-19936 - https://www.exploit-db.com/exploits/45969 -CVE-2018-19971 - http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html -CVE-2018-19971 - http://www.securityfocus.com/bid/107518 -CVE-2018-19974 - https://bnbdr.github.io/posts/extracheese/ -CVE-2018-19974 - https://github.com/VirusTotal/yara/issues/999 -CVE-2018-19974 - https://github.com/bnbdr/swisscheese/ -CVE-2018-19975 - https://bnbdr.github.io/posts/extracheese/ -CVE-2018-19975 - https://github.com/VirusTotal/yara/issues/999 -CVE-2018-19975 - https://github.com/bnbdr/swisscheese/ -CVE-2018-19976 - https://bnbdr.github.io/posts/extracheese/ -CVE-2018-19976 - https://github.com/VirusTotal/yara/issues/999 -CVE-2018-19976 - https://github.com/bnbdr/swisscheese/ -CVE-2018-19980 - https://github.com/ISCAS-Vulab/PoC_Nebula-Capsule-Pro-Wifi -CVE-2018-19985 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-19985 - https://usn.ubuntu.com/4115-1/ -CVE-2018-19985 - https://usn.ubuntu.com/4118-1/ -CVE-2018-19986 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 -CVE-2018-19987 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 -CVE-2018-19988 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 -CVE-2018-19989 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 -CVE-2018-19990 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 -CVE-2018-1999001 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1999002 - https://www.exploit-db.com/exploits/46453/ -CVE-2018-1999002 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1999003 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1999004 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1999005 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-1999007 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-19991 - https://github.com/alexazhou/VeryNginx/issues/218 -CVE-2018-20001 - https://bugzilla.libav.org/show_bug.cgi?id=1141 -CVE-2018-20002 - https://sourceware.org/bugzilla/show_bug.cgi?id=23952 -CVE-2018-20009 - https://github.com/domainmod/domainmod/issues/88 -CVE-2018-20009 - https://www.exploit-db.com/exploits/46372/ -CVE-2018-20010 - https://github.com/domainmod/domainmod/issues/88 -CVE-2018-20010 - https://www.exploit-db.com/exploits/46373/ -CVE-2018-20011 - https://github.com/domainmod/domainmod/issues/88 -CVE-2018-20011 - https://www.exploit-db.com/exploits/46374/ -CVE-2018-20015 - https://github.com/Jxysir/YZM-CSRF- -CVE-2018-20017 - https://github.com/source-trace/semcms/issues/1 -CVE-2018-20018 - https://github.com/QQ704568679/-/blob/master/README.md -CVE-2018-20019 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/ -CVE-2018-20020 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/ -CVE-2018-20021 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/ -CVE-2018-20022 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/ -CVE-2018-20023 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/ -CVE-2018-20024 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/ -CVE-2018-20027 - https://github.com/lisa-lab/pylearn2/issues/1593 -CVE-2018-20031 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-20032 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-20033 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-20034 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-20050 - https://github.com/iamweifan/jooan/blob/master/es_poc.py -CVE-2018-20051 - https://github.com/iamweifan/jooan/blob/master/ss_poc.py -CVE-2018-20052 - https://www.securifera.com/advisories/cve-2018-20052-20053/ -CVE-2018-20053 - https://www.securifera.com/advisories/cve-2018-20052-20053/ -CVE-2018-20061 - https://github.com/frappe/erpnext/issues/15337 -CVE-2018-20062 - http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html -CVE-2018-20062 - https://github.com/nangge/noneCms/issues/21 -CVE-2018-20063 - https://medium.com/@vrico315/unrestricted-upload-of-file-with-dangerous-type-in-gurocks-testrail-11d9f4d13688 -CVE-2018-20064 - https://github.com/doorgets/CMS/issues/12 -CVE-2018-20095 - https://github.com/axiomatic-systems/Bento4/issues/341 -CVE-2018-20096 - https://github.com/Exiv2/exiv2/issues/590 -CVE-2018-20096 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 -CVE-2018-20097 - https://github.com/Exiv2/exiv2/issues/590 -CVE-2018-20097 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 -CVE-2018-20098 - https://github.com/Exiv2/exiv2/issues/590 -CVE-2018-20098 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 -CVE-2018-20099 - https://github.com/Exiv2/exiv2/issues/590 -CVE-2018-20099 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 -CVE-2018-20101 - https://wpvulndb.com/vulnerabilities/9176 -CVE-2018-20114 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114 -CVE-2018-20121 - http://packetstormsecurity.com/files/151333/Podcast-Generator-2.7-Cross-Site-Scripting.html -CVE-2018-20133 - https://github.com/dexter2206/ymlref/issues/2 -CVE-2018-20135 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-20138 - https://suku90.wordpress.com/2018/12/13/php-b2b-script-stored-xss/ -CVE-2018-20140 - http://packetstormsecurity.com/files/151052/ZenPhoto-1.4.14-Cross-Site-Scripting.html -CVE-2018-20141 - http://packetstormsecurity.com/files/151305/Abantecart-1.2.12-Cross-Site-Scripting.html -CVE-2018-20144 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55200 -CVE-2018-20148 - https://wpvulndb.com/vulnerabilities/9171 -CVE-2018-20159 - https://pentest.com.tr/exploits/i-doit-CMDB-1-11-2-Remote-Code-Execution.html -CVE-2018-20159 - https://www.exploit-db.com/exploits/45957 -CVE-2018-20161 - https://github.com/Jacquais/BlinkVuln -CVE-2018-20162 - http://packetstormsecurity.com/files/151719/Digi-TransPort-LR54-Restricted-Shell-Escape.html -CVE-2018-20162 - https://blog.hackeriet.no/cve-2018-20162-digi-lr54-restricted-shell-escape/ -CVE-2018-20162 - https://seclists.org/bugtraq/2019/Feb/34 -CVE-2018-20164 - https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/ -CVE-2018-20166 - https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-Authenticated-Remote-Code-Execution.html -CVE-2018-20166 - https://www.exploit-db.com/exploits/46011 -CVE-2018-20167 - https://phab.enlightenment.org/T7504 -CVE-2018-20169 - https://usn.ubuntu.com/4118-1/ -CVE-2018-20174 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20175 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20176 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20177 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20178 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20179 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20180 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20181 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20182 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-20186 - https://github.com/axiomatic-systems/Bento4/issues/342 -CVE-2018-20188 - https://github.com/m3lon/CVE/blob/master/CSRF/FUELCMS%20CSRF.md -CVE-2018-20189 - https://sourceforge.net/p/graphicsmagick/bugs/585/ -CVE-2018-20193 - http://seclists.org/fulldisclosure/2018/Dec/37 -CVE-2018-20194 - https://github.com/knik0/faad2/issues/21 -CVE-2018-20195 - https://github.com/knik0/faad2/issues/25 -CVE-2018-20196 - https://github.com/knik0/faad2/issues/19 -CVE-2018-20197 - https://github.com/knik0/faad2/issues/20 -CVE-2018-20198 - https://github.com/knik0/faad2/issues/23 -CVE-2018-20199 - https://github.com/knik0/faad2/issues/24 -CVE-2018-20200 - https://cxsecurity.com/issue/WLB-2018120252 -CVE-2018-20201 - https://github.com/espruino/Espruino/issues/1587 -CVE-2018-20211 - http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html -CVE-2018-20211 - http://seclists.org/fulldisclosure/2018/Dec/44 -CVE-2018-20212 - http://packetstormsecurity.com/files/151028/TWiki-6.0.2-Cross-Site-Scripting.html -CVE-2018-20218 - http://seclists.org/fulldisclosure/2019/Feb/48 -CVE-2018-20219 - http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html -CVE-2018-20219 - http://seclists.org/fulldisclosure/2019/Feb/48 -CVE-2018-20220 - http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html -CVE-2018-20220 - http://seclists.org/fulldisclosure/2019/Feb/48 -CVE-2018-20221 - http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html -CVE-2018-20221 - https://www.exploit-db.com/exploits/46086/ -CVE-2018-20228 - https://www.vulnerability-lab.com/get_content.php?id=2175 -CVE-2018-20230 - https://bugzilla.redhat.com/show_bug.cgi?id=1660318 -CVE-2018-20231 - https://wpvulndb.com/vulnerabilities/9187 -CVE-2018-20231 - https://www.privacy-wise.com/two-factor-authentication-cross-site-request-forgery-csrf-vulnerability-cve-2018-20231/ -CVE-2018-20233 - https://ecosystem.atlassian.net/browse/UPM-5964 -CVE-2018-20234 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html -CVE-2018-20235 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html -CVE-2018-20236 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html -CVE-2018-20239 - https://ecosystem.atlassian.net/browse/APL-1373 -CVE-2018-20250 - http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html -CVE-2018-20250 - https://github.com/blau72/CVE-2018-20250-WinRAR-ACE -CVE-2018-20250 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ -CVE-2018-20250 - https://www.exploit-db.com/exploits/46552/ -CVE-2018-20250 - https://www.exploit-db.com/exploits/46756/ -CVE-2018-20251 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ -CVE-2018-20252 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ -CVE-2018-20253 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ -CVE-2018-20305 - https://github.com/RootSoull/Vuln-Poc/tree/master/D-Link/DIR-816 -CVE-2018-20306 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 -CVE-2018-20307 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 -CVE-2018-20322 - https://bugs.limesurvey.org/view.php?id=14376 -CVE-2018-20323 - http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html -CVE-2018-20323 - https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/ -CVE-2018-20325 - https://github.com/danijar/definitions/issues/14 -CVE-2018-20326 - http://packetstormsecurity.com/files/150918/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Scripting.html -CVE-2018-20326 - https://www.exploit-db.com/exploits/46081/ -CVE-2018-20326 - https://youtu.be/TwNi05yfQks -CVE-2018-20331 - https://packetstormsecurity.com/files/150900 -CVE-2018-20334 - https://starlabs.sg/advisories/18-20334/ -CVE-2018-20335 - https://starlabs.sg/advisories/18-20335/ -CVE-2018-20336 - https://starlabs.sg/advisories/18-20336/ -CVE-2018-20337 - https://github.com/LibRaw/LibRaw/issues/192 -CVE-2018-20340 - https://blog.inhq.net/posts/yubico-libu2f-host-vuln-part1/ -CVE-2018-20343 - https://github.com/Alexandre-Bartel/CVE-2018-20343 -CVE-2018-20346 - https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html -CVE-2018-20346 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2018-20346 - https://news.ycombinator.com/item?id=18685296 -CVE-2018-20346 - https://worthdoingbadly.com/sqlitebug/ -CVE-2018-20346 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20348 - https://github.com/libyal/libpff/issues/48 -CVE-2018-20349 - https://github.com/igraph/igraph/issues/1141 -CVE-2018-20357 - https://github.com/knik0/faad2/issues/28 -CVE-2018-20358 - https://github.com/knik0/faad2/issues/31 -CVE-2018-20359 - https://github.com/knik0/faad2/issues/29 -CVE-2018-20360 - https://github.com/knik0/faad2/issues/32 -CVE-2018-20361 - https://github.com/knik0/faad2/issues/30 -CVE-2018-20362 - https://github.com/knik0/faad2/issues/26 -CVE-2018-20363 - https://github.com/LibRaw/LibRaw/issues/193 -CVE-2018-20364 - https://github.com/LibRaw/LibRaw/issues/194 -CVE-2018-20365 - https://github.com/LibRaw/LibRaw/issues/195 -CVE-2018-20367 - https://github.com/wstmall/wstmart/issues/1 -CVE-2018-20368 - https://www.vulnerability-lab.com/get_content.php?id=2158 -CVE-2018-20369 - https://www.vulnerability-lab.com/get_content.php?id=2168 -CVE-2018-20370 - https://www.vulnerability-lab.com/get_content.php?id=2171 -CVE-2018-20371 - https://www.vulnerability-lab.com/get_content.php?id=2110 -CVE-2018-20372 - https://www.vulnerability-lab.com/get_content.php?id=1990 -CVE-2018-20372 - https://www.youtube.com/watch?v=HUM5myJWbvc -CVE-2018-20373 - https://www.vulnerability-lab.com/get_content.php?id=1990 -CVE-2018-20373 - https://www.youtube.com/watch?v=HUM5myJWbvc -CVE-2018-20377 - https://github.com/zadewg/LIVEBOX-0DAY -CVE-2018-20406 - https://bugs.python.org/issue34656 -CVE-2018-20406 - https://usn.ubuntu.com/4127-2/ -CVE-2018-20407 - https://github.com/axiomatic-systems/Bento4/issues/343 -CVE-2018-20408 - https://github.com/axiomatic-systems/Bento4/issues/343 -CVE-2018-20409 - https://github.com/axiomatic-systems/Bento4/issues/345 -CVE-2018-20410 - https://github.com/flypuma/vul/blob/master/kingview/copy_argumengt_overflow/poc.py -CVE-2018-20418 - https://github.com/rdincel1/Craft-CMS-3.0.25---Cross-Site-Scripting -CVE-2018-20418 - https://www.exploit-db.com/exploits/46054/ -CVE-2018-20419 - https://github.com/Jxysir/Douphpcms/blob/master/POC -CVE-2018-20425 - https://github.com/libming/libming/issues/163 -CVE-2018-20426 - https://github.com/libming/libming/issues/162 -CVE-2018-20427 - https://github.com/libming/libming/issues/164 -CVE-2018-20428 - https://github.com/libming/libming/issues/161 -CVE-2018-20429 - https://github.com/libming/libming/issues/160 -CVE-2018-20432 - http://packetstormsecurity.com/files/159058/COVR-3902-1.01B0-Hardcoded-Credentials.html -CVE-2018-20432 - https://cybersecurityworks.com/zerodays/cve-2018-20432-dlink.html -CVE-2018-20434 - http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html -CVE-2018-20434 - http://packetstormsecurity.com/files/153448/LibreNMS-1.46-addhost-Remote-Code-Execution.html -CVE-2018-20448 - https://www.exploit-db.com/exploits/46067/ -CVE-2018-20450 - https://github.com/evanmiller/libxls/issues/34 -CVE-2018-20451 - https://github.com/uvoteam/libdoc/issues/2 -CVE-2018-20452 - https://github.com/evanmiller/libxls/issues/35 -CVE-2018-20453 - https://github.com/uvoteam/libdoc/issues/1 -CVE-2018-20454 - https://github.com/coolboy0816/audit/issues/1 -CVE-2018-20462 - https://wpvulndb.com/vulnerabilities/9196 -CVE-2018-20463 - https://wpvulndb.com/vulnerabilities/9197 -CVE-2018-20468 - https://barriersec.com/2019/06/cve-2018-20468-sahi-pro/ -CVE-2018-20469 - http://packetstormsecurity.com/files/153331/Sahi-Pro-8.x-SQL-Injection.html -CVE-2018-20469 - https://barriersec.com/2019/06/cve-2018-20469-sahi-pro/ -CVE-2018-20470 - http://packetstormsecurity.com/files/153330/Sahi-Pro-7.x-8.x-Directory-Traversal.html -CVE-2018-20470 - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ -CVE-2018-20472 - http://packetstormsecurity.com/files/153332/Sahi-Pro-8.x-Cross-Site-Scripting.html -CVE-2018-20472 - https://barriersec.com/2019/06/cve-2018-20472-sahi-pro/ -CVE-2018-20483 - https://usn.ubuntu.com/3943-1/ -CVE-2018-20484 - http://packetstormsecurity.com/files/152793/Zoho-ManageEngine-ADSelfService-Plus-5.7-Cross-Site-Scripting.html -CVE-2018-20485 - http://packetstormsecurity.com/files/152793/Zoho-ManageEngine-ADSelfService-Plus-5.7-Cross-Site-Scripting.html -CVE-2018-20486 - https://github.com/Ppsoft1990/Metinfo6.1.3/issues/2 -CVE-2018-20487 - https://neonsea.uk/blog/2018/12/26/firewall-includes.html -CVE-2018-20498 - https://gitlab.com/gitlab-org/gitlab-ce/issues/50995 -CVE-2018-20502 - https://github.com/axiomatic-systems/Bento4/issues/349 -CVE-2018-20503 - http://packetstormsecurity.com/files/151327/SirsiDynix-e-Library-3.5.x-Cross-Site-Scripting.html -CVE-2018-20503 - https://pentest.com.tr/exploits/Allied-Telesis-8100L-8-Cross-Site-Scripting.html -CVE-2018-20503 - https://www.exploit-db.com/exploits/46237/ -CVE-2018-20506 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2018-20506 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20511 - https://usn.ubuntu.com/4118-1/ -CVE-2018-20512 - https://www.reddit.com/r/networking/comments/abu4kq/vulnerability_in_cdata_technologies_epon_cpewifi/ -CVE-2018-20523 - http://packetstormsecurity.com/files/163796/Xiaomi-10.2.4.g-Information-Disclosure.html -CVE-2018-20523 - https://vishwarajbhattrai.wordpress.com/2019/03/22/content-provider-injection-in-xiaomi-stock-browser -CVE-2018-20524 - https://vul.su.ki/posts/Chat_Anywhere_2.4.0_XSS.md/ -CVE-2018-20525 - http://packetstormsecurity.com/files/151033/Roxy-Fileman-1.4.5-File-Upload-Directory-Traversal.html -CVE-2018-20525 - http://packetstormsecurity.com/files/166585/Roxy-File-Manager-1.4.5-PHP-File-Upload-Restriction-Bypass.html -CVE-2018-20525 - https://www.exploit-db.com/exploits/46085/ -CVE-2018-20526 - http://packetstormsecurity.com/files/151033/Roxy-Fileman-1.4.5-File-Upload-Directory-Traversal.html -CVE-2018-20526 - https://www.exploit-db.com/exploits/46085/ -CVE-2018-20535 - https://bugzilla.nasm.us/show_bug.cgi?id=3392530 -CVE-2018-20538 - https://bugzilla.nasm.us/show_bug.cgi?id=3392531 -CVE-2018-20541 - https://bugzilla.redhat.com/show_bug.cgi?id=1652632 -CVE-2018-20542 - https://bugzilla.redhat.com/show_bug.cgi?id=1652633 -CVE-2018-20542 - https://bugzilla.redhat.com/show_bug.cgi?id=1652635 -CVE-2018-20543 - https://bugzilla.redhat.com/show_bug.cgi?id=1652634 -CVE-2018-20552 - https://github.com/appneta/tcpreplay/issues/530 -CVE-2018-20553 - https://github.com/appneta/tcpreplay/issues/530 -CVE-2018-20555 - https://github.com/fs0c131y/CVE-2018-20555 -CVE-2018-20555 - https://wpvulndb.com/vulnerabilities/9204 -CVE-2018-20556 - http://packetstormsecurity.com/files/151692/WordPress-Booking-Calendar-8.4.3-SQL-Injection.html -CVE-2018-20556 - https://gist.github.com/B0UG/a750c2c204825453e6faf898ea6d09f6 -CVE-2018-20556 - https://vulners.com/exploitdb/EDB-ID:46377 -CVE-2018-20556 - https://www.exploit-db.com/exploits/46377/ -CVE-2018-20568 - https://github.com/nabby27/CMS/pull/2 -CVE-2018-20569 - https://github.com/nabby27/CMS/pull/2 -CVE-2018-20570 - https://github.com/mdadams/jasper/issues/191 -CVE-2018-20570 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20572 - https://github.com/wuzhicms/wuzhicms/issues/166 -CVE-2018-20573 - https://github.com/jbeder/yaml-cpp/issues/655 -CVE-2018-20574 - https://github.com/jbeder/yaml-cpp/issues/654 -CVE-2018-20575 - https://github.com/zadewg/LIVEBOX-0DAY -CVE-2018-20576 - https://gbhackers.com/orange-adsl-modems/ -CVE-2018-20576 - https://github.com/zadewg/LIVEBOX-0DAY -CVE-2018-20577 - https://github.com/zadewg/LIVEBOX-0DAY -CVE-2018-20580 - http://packetstormsecurity.com/files/152731/ReadyAPI-2.5.0-2.6.0-Remote-Code-Execution.html -CVE-2018-20580 - https://github.com/gscamelo/CVE-2018-20580 -CVE-2018-20580 - https://www.exploit-db.com/exploits/46796/ -CVE-2018-20582 - https://medium.com/@beefaaubee/dissecting-into-gree-android-application-43892d54b006 -CVE-2018-20584 - https://github.com/mdadams/jasper/issues/192 -CVE-2018-20584 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20587 - https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b -CVE-2018-20588 - https://github.com/caryll/otfcc/issues/59 -CVE-2018-20589 - https://github.com/nabby27/CMS/pull/3 -CVE-2018-20590 - https://github.com/nabby27/CMS/pull/3 -CVE-2018-20591 - https://github.com/libming/libming/issues/168 -CVE-2018-20592 - https://github.com/michaelrsweet/mxml/issues/237 -CVE-2018-20593 - https://github.com/michaelrsweet/mxml/issues/237 -CVE-2018-20597 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss1 -CVE-2018-20598 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#csrf -CVE-2018-20599 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#getshell -CVE-2018-20600 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss2 -CVE-2018-20601 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss3 -CVE-2018-20602 - https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#information_disclosure -CVE-2018-20603 - https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#csrf -CVE-2018-20604 - https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#directory-traversal -CVE-2018-20616 - https://github.com/brackeen/ok-file-formats/issues/4 -CVE-2018-20617 - https://github.com/brackeen/ok-file-formats/issues/5 -CVE-2018-20618 - https://github.com/brackeen/ok-file-formats/issues/6 -CVE-2018-20621 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-20621 -CVE-2018-20622 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20626 - https://gkaim.com/cve-2018-20626-vikas-chaudhary/ -CVE-2018-20627 - https://gkaim.com/cve-2018-20627-vikas-chaudhary/ -CVE-2018-20628 - https://gkaim.com/cve-2018-20628-vikas-chaudhary/ -CVE-2018-20629 - https://gkaim.com/cve-2018-20629-vikas-chaudhary/ -CVE-2018-20630 - https://gkaim.com/cve-2018-20630-vikas-chaudhary/ -CVE-2018-20631 - https://gkaim.com/cve-2018-20631-vikas-chaudhary/ -CVE-2018-20632 - https://gkaim.com/cve-2018-20632-vikas-chaudhary/ -CVE-2018-20633 - https://gkaim.com/cve-2018-20633-vikas-chaudhary/ -CVE-2018-20634 - https://gkaim.com/cve-2018-20634-vikas-chaudhary/ -CVE-2018-20635 - https://gkaim.com/cve-2018-20635-vikas-chaudhary/ -CVE-2018-20636 - https://gkaim.com/cve-2018-20636-vikas-chaudhary/ -CVE-2018-20637 - https://gkaim.com/cve-2018-20637-vikas-chaudhary/ -CVE-2018-20638 - https://gkaim.com/cve-2018-20638-vikas-chaudhary/ -CVE-2018-20639 - https://gkaim.com/cve-2018-20639-vikas-chaudhary/ -CVE-2018-20640 - https://gkaim.com/cve-2018-20640-vikas-chaudhary/ -CVE-2018-20641 - https://gkaim.com/cve-2018-20641-vikas-chaudhary/ -CVE-2018-20642 - https://gkaim.com/cve-2018-20642-vikas-chaudhary/ -CVE-2018-20643 - https://gkaim.com/cve-2018-20643-vikas-chaudhary/ -CVE-2018-20644 - https://gkaim.com/cve-2018-20644-vikas-chaudhary/ -CVE-2018-20645 - https://gkaim.com/cve-2018-20645-vikas-chaudhary/ -CVE-2018-20646 - https://gkaim.com/cve-2018-20646-vikas-chaudhary/ -CVE-2018-20648 - https://gkaim.com/cve-2018-20648-vikas-chaudhary/ -CVE-2018-20651 - https://sourceware.org/bugzilla/show_bug.cgi?id=24041 -CVE-2018-20652 - https://github.com/syoyo/tinyexr/issues/104 -CVE-2018-20657 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 -CVE-2018-20658 - https://www.exploit-db.com/exploits/45091 -CVE-2018-20659 - https://github.com/axiomatic-systems/Bento4/issues/350 -CVE-2018-20662 - https://gitlab.freedesktop.org/poppler/poppler/issues/706 -CVE-2018-20673 - https://sourceware.org/bugzilla/show_bug.cgi?id=24039 -CVE-2018-20676 - https://access.redhat.com/errata/RHSA-2020:0133 -CVE-2018-20677 - https://access.redhat.com/errata/RHSA-2020:0133 -CVE-2018-20679 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2018-20679 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2018-20679 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2018-20681 - https://github.com/mate-desktop/mate-screensaver/issues/155 -CVE-2018-20683 - https://groups.google.com/forum/#!topic/gitolite-announce/6xbjjmpLePQ -CVE-2018-20684 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2018-20684 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-20685 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2018-20685 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-20687 - http://packetstormsecurity.com/files/155359/Raritan-CommandCenter-Secure-Gateway-XML-Injection.html -CVE-2018-20712 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 -CVE-2018-20712 - https://sourceware.org/bugzilla/show_bug.cgi?id=24043 -CVE-2018-20716 - https://blog.ripstech.com/2018/cubecart-admin-authentication-bypass/ -CVE-2018-20717 - https://blog.ripstech.com/2018/prestashop-remote-code-execution/ -CVE-2018-20735 - https://www.exploit-db.com/exploits/46556/ -CVE-2018-20736 - https://wso2.com/security-patch-releases/api-manager -CVE-2018-20737 - https://wso2.com/security-patch-releases/api-manager -CVE-2018-20748 - https://github.com/LibVNC/libvncserver/issues/273 -CVE-2018-20749 - https://github.com/LibVNC/libvncserver/issues/273 -CVE-2018-20750 - https://github.com/LibVNC/libvncserver/issues/273 -CVE-2018-20751 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-crop_page-podofo-0-9-6/ -CVE-2018-20751 - https://sourceforge.net/p/podofo/tickets/33/ -CVE-2018-20764 - https://community.helpsystems.com/knowledge-base/fox-technologies/hotfix/515/ -CVE-2018-20779 - https://packetstormsecurity.com/files/149894 -CVE-2018-20780 - https://packetstormsecurity.com/files/149894 -CVE-2018-20781 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-20782 - https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3 -CVE-2018-20782 - https://www.exploit-db.com/exploits/46414/ -CVE-2018-20783 - https://hackerone.com/reports/477344 -CVE-2018-20784 - https://usn.ubuntu.com/4115-1/ -CVE-2018-20784 - https://usn.ubuntu.com/4118-1/ -CVE-2018-20784 - https://usn.ubuntu.com/4211-2/ -CVE-2018-20789 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20790 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20791 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20792 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20793 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20794 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20795 - https://www.exploit-db.com/exploits/45987 -CVE-2018-20801 - https://snyk.io/vuln/npm:highcharts:20180225 -CVE-2018-20806 - https://github.com/lota/phamm/issues/24 -CVE-2018-20807 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730/ -CVE-2018-20808 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20809 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20810 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20811 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20812 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20813 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20814 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ -CVE-2018-20817 - https://github.com/RektInator/cod-steamauth-rce -CVE-2018-20817 - https://github.com/momo5502/cod-exploits/tree/master/steam-auth -CVE-2018-20818 - https://arxiv.org/pdf/1809.07477 -CVE-2018-20819 - https://github.com/dropbox/lepton/issues/112 -CVE-2018-20820 - https://github.com/dropbox/lepton/issues/111 -CVE-2018-20823 - https://hackaday.com/2018/07/17/freak-out-your-smartphone-with-ultrasound/ -CVE-2018-20823 - https://medium.com/@juliodellaflora/ultrassom-pode-causar-anomalias-no-girosc%C3%B3pio-do-xiaomi-mi5s-plus-4050d718bc7f -CVE-2018-20836 - https://usn.ubuntu.com/4076-1/ -CVE-2018-20838 - https://ampforwp.com/critical-security-issues-has-been-fixed-in-0-9-97-20-version/ -CVE-2018-20840 - https://github.com/google/google-api-cpp-client/issues/57 -CVE-2018-20840 - https://github.com/google/google-api-cpp-client/pull/58 -CVE-2018-20841 - https://ioactive.com/hootoo-tripmate-routers-are-cute-but/ -CVE-2018-20841 - https://www.exploit-db.com/exploits/46143 -CVE-2018-20843 - https://seclists.org/bugtraq/2019/Jun/39 -CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-20846 - https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc -CVE-2018-20848 - https://packetstormsecurity.com/files/147467/Peel-Shopping-Cart-9.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2018-20849 - https://packetstormsecurity.com/files/147470/Arastta-1.6.2-Cross-Site-Scripting.html -CVE-2018-20850 - https://advisories.stormshield.eu/2018-006/ -CVE-2018-20852 - https://usn.ubuntu.com/4127-2/ -CVE-2018-20852 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-20856 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-20856 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html -CVE-2018-20856 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2018-20856 - https://usn.ubuntu.com/4118-1/ -CVE-2018-20895 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20896 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20897 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20898 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20899 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20900 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20901 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20902 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20903 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20904 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20905 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20906 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20907 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20908 - https://documentation.cpanel.net/display/CL/72+Change+Log -CVE-2018-20961 - http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-20961 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2018-20965 - https://wpvulndb.com/vulnerabilities/9608 -CVE-2018-20969 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html -CVE-2018-20969 - https://github.com/irsl/gnu-patch-vulnerabilities -CVE-2018-20969 - https://seclists.org/bugtraq/2019/Aug/29 -CVE-2018-20976 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2018-20976 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2018-20987 - https://wpvulndb.com/vulnerabilities/9627 -CVE-2018-21003 - https://wpvulndb.com/vulnerabilities/9829 -CVE-2018-21004 - https://wpvulndb.com/vulnerabilities/9831 -CVE-2018-21007 - https://wpvulndb.com/vulnerabilities/9847 -CVE-2018-21008 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2018-21010 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-21013 - https://wpvulndb.com/vulnerabilities/9024 -CVE-2018-21014 - https://wpvulndb.com/vulnerabilities/9007 -CVE-2018-21015 - https://github.com/gpac/gpac/issues/1179 -CVE-2018-21016 - https://github.com/gpac/gpac/issues/1180 -CVE-2018-21017 - https://github.com/gpac/gpac/issues/1183 -CVE-2018-21018 - https://github.com/tootsuite/mastodon/pull/9329 -CVE-2018-21018 - https://github.com/tootsuite/mastodon/pull/9381 -CVE-2018-21029 - https://github.com/systemd/systemd/issues/9397 -CVE-2018-21031 - https://www.elladodelmal.com/2018/08/shodan-es-de-cine-hacking-tautulli-un.html -CVE-2018-21031 - https://www.exploit-db.com/docs/47790 -CVE-2018-21034 - https://www.soluble.ai/blog/argo-cves-2020 -CVE-2018-21037 - https://github.com/intelliants/subrion/issues/638 -CVE-2018-21038 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21039 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21040 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21041 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21042 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21043 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21044 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21045 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21046 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21047 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21048 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21049 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21050 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21051 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21052 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21053 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21054 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21055 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21056 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21057 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21058 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21059 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21060 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21061 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21062 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21063 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21064 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21065 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21066 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21067 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21068 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21069 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21070 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21071 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21072 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21073 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21074 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21075 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21076 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21077 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21078 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21079 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21080 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21081 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21082 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21083 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21084 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21085 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21086 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21087 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21088 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21089 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21090 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21091 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21092 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-21096 - https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096 -CVE-2018-21102 - https://kb.netgear.com/000060454/Security-Advisory-for-Cross-Site-Request-Forgery-on-ReadyNAS-OS-6-PSV-2018-0373 -CVE-2018-21112 - https://kb.netgear.com/000060439/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2018-0093 -CVE-2018-21113 - https://kb.netgear.com/000060438/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2018-0033 -CVE-2018-21123 - https://kb.netgear.com/000060235/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Wireless-Controllers-PSV-2018-0230 -CVE-2018-21124 - https://kb.netgear.com/000060234/Security-Advisory-for-a-Vertical-Privilege-Escalation-on-WAC510-PSV-2018-0260 -CVE-2018-21128 - https://kb.netgear.com/000060230/Security-Advisory-for-Authentication-Bypass-on-Some-Wireless-Access-Points-PSV-2018-0264 -CVE-2018-21130 - https://kb.netgear.com/000060229/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Wireless-Access-Points-PSV-2018-0267 -CVE-2018-21135 - https://kb.netgear.com/000060225/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-3165 -CVE-2018-21136 - https://kb.netgear.com/000060224/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Modem-Routers-PSV-2018-0100 -CVE-2018-21138 - https://kb.netgear.com/000060222/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2018-0098 -CVE-2018-21140 - https://kb.netgear.com/000060221/Security-Advisory-for-Security-Misconfiguration-on-Some-Modem-Routers-PSV-2018-0097 -CVE-2018-21146 - https://kb.netgear.com/000059487/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Gateways-and-Routers-PSV-2017-3159 -CVE-2018-21149 - https://kb.netgear.com/000059484/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3156 -CVE-2018-21151 - https://kb.netgear.com/000059482/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3154 -CVE-2018-21159 - https://kb.netgear.com/000059471/Security-Advisory-for-Security-Misconfiguration-on-ReadyNAS-OS-6-PSV-2017-1999 -CVE-2018-21160 - https://kb.netgear.com/000059470/Security-Advisory-for-Cross-Site-Request-Forgery-on-ReadyNAS-OS-6-PSV-2017-1998 -CVE-2018-21167 - https://kb.netgear.com/000055191/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Routers-Gateways-Extenders-and-DSL-Modems-PSV-2017-3093 -CVE-2018-21171 - https://kb.netgear.com/000055187/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2632 -CVE-2018-21173 - https://kb.netgear.com/000055185/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2627 -CVE-2018-21175 - https://kb.netgear.com/000055183/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2624 -CVE-2018-21176 - https://kb.netgear.com/000055182/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2623 -CVE-2018-21183 - https://kb.netgear.com/000055175/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2616 -CVE-2018-21189 - https://kb.netgear.com/000055168/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2606 -CVE-2018-21190 - https://kb.netgear.com/000055167/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2605 -CVE-2018-21194 - https://kb.netgear.com/000055163/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2601 -CVE-2018-21195 - https://kb.netgear.com/000055162/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2600 -CVE-2018-21197 - https://kb.netgear.com/000055152/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2596 -CVE-2018-21202 - https://kb.netgear.com/000055147/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2590 -CVE-2018-21203 - https://kb.netgear.com/000055146/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2589 -CVE-2018-21205 - https://kb.netgear.com/000055144/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2568 -CVE-2018-21207 - https://kb.netgear.com/000055142/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2566 -CVE-2018-21211 - https://kb.netgear.com/000055138/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2491 -CVE-2018-21212 - https://kb.netgear.com/000055137/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2490 -CVE-2018-21214 - https://kb.netgear.com/000055123/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2488 -CVE-2018-21215 - https://kb.netgear.com/000055122/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2486 -CVE-2018-21216 - https://kb.netgear.com/000055121/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2485 -CVE-2018-21217 - https://kb.netgear.com/000055120/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2484 -CVE-2018-21218 - https://kb.netgear.com/000055119/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2483 -CVE-2018-21221 - https://kb.netgear.com/000055116/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2459 -CVE-2018-21224 - https://kb.netgear.com/000055113/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2456 -CVE-2018-21231 - https://kb.netgear.com/000055103/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Gateways-and-Extenders-PSV-2016-0102 -CVE-2018-21246 - https://bugs.gentoo.org/715214 -CVE-2018-21248 - https://mattermost.com/security-updates/ -CVE-2018-21249 - https://mattermost.com/security-updates/ -CVE-2018-21250 - https://mattermost.com/security-updates/ -CVE-2018-21251 - https://mattermost.com/security-updates/ -CVE-2018-21252 - https://mattermost.com/security-updates/ -CVE-2018-21253 - https://mattermost.com/security-updates/ -CVE-2018-21254 - https://mattermost.com/security-updates/ -CVE-2018-21255 - https://mattermost.com/security-updates/ -CVE-2018-21256 - https://mattermost.com/security-updates/ -CVE-2018-21257 - https://mattermost.com/security-updates/ -CVE-2018-21258 - https://mattermost.com/security-updates/ -CVE-2018-21259 - https://mattermost.com/security-updates/ -CVE-2018-21260 - https://mattermost.com/security-updates/ -CVE-2018-21261 - https://mattermost.com/security-updates/ -CVE-2018-21262 - https://mattermost.com/security-updates/ -CVE-2018-21263 - https://mattermost.com/security-updates/ -CVE-2018-21264 - https://mattermost.com/security-updates/ -CVE-2018-21265 - https://mattermost.com/security-updates/ -CVE-2018-21268 - https://medium.com/@shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3 -CVE-2018-21268 - https://snyk.io/vuln/npm:traceroute:20160311 -CVE-2018-2364 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2364 - https://launchpad.support.sap.com/#/notes/2541700 -CVE-2018-2365 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2367 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2368 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2369 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2370 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2371 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2372 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2373 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2374 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2375 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2376 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2377 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2378 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2379 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2380 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2380 - https://github.com/erpscanteam/CVE-2018-2380 -CVE-2018-2380 - https://www.exploit-db.com/exploits/44292/ -CVE-2018-2381 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2382 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2383 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2384 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2385 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2386 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2387 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2388 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2389 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2390 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2391 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2392 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2393 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2394 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2395 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2396 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ -CVE-2018-2415 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2416 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2417 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2418 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2419 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2420 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2421 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2421 - https://launchpad.support.sap.com/#/notes/2616599 -CVE-2018-2422 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2423 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ -CVE-2018-2452 - https://launchpad.support.sap.com/#/notes/2623846 -CVE-2018-2473 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2476 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2477 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2478 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2479 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2481 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2482 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2483 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2485 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2487 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2488 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2489 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2490 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-2491 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 -CVE-2018-25002 - https://www.drupal.org/sa-contrib-2018-024 -CVE-2018-25019 - https://lists.openwall.net/full-disclosure/2018/01/10/17 -CVE-2018-25019 - https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a -CVE-2018-25020 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html -CVE-2018-25031 - https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885 -CVE-2018-25032 - https://github.com/madler/zlib/issues/605 -CVE-2018-25032 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2018-25034 - https://vuldb.com/?id.126695 -CVE-2018-25035 - https://vuldb.com/?id.126696 -CVE-2018-25036 - https://vuldb.com/?id.126697 -CVE-2018-25037 - https://vuldb.com/?id.126698 -CVE-2018-25038 - https://vuldb.com/?id.126699 -CVE-2018-25043 - https://vuldb.com/?id.113806 -CVE-2018-25055 - https://github.com/jeffcoughlin/farcrysolrpro/issues/78 -CVE-2018-25080 - https://vuldb.com/?id.220061 -CVE-2018-25081 - https://flashpoint.io/blog/bitwarden-password-pilfering/ -CVE-2018-25083 - https://security.snyk.io/vuln/npm:pullit:20180214 -CVE-2018-25095 - https://wpscan.com/vulnerability/16cc47aa-cb31-4114-b014-7ac5fbc1d3ee -CVE-2018-2560 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2561 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2562 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2564 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2565 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2566 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2567 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2568 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2569 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2570 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2571 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2573 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2574 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2575 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2576 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2577 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2578 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2579 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2579 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2579 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2580 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2581 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2581 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2582 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2582 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2583 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2584 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2585 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2586 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2587 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-2588 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2588 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2588 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2589 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2590 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2591 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2592 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2593 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2594 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2595 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2596 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2597 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2598 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2599 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2599 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2599 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2600 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2601 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2602 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2602 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2602 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2603 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2603 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2603 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2604 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2605 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2605 - https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/ -CVE-2018-2606 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2607 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2608 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2609 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2610 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2611 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2612 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2613 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2614 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2615 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2616 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2617 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2618 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2618 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2618 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2619 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2620 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2621 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2622 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2623 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2624 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2625 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2626 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2627 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2627 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2628 - https://www.exploit-db.com/exploits/44553/ -CVE-2018-2628 - https://www.exploit-db.com/exploits/45193/ -CVE-2018-2628 - https://www.exploit-db.com/exploits/46513/ -CVE-2018-2629 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2629 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2629 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2630 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2631 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2632 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2633 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2633 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2633 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2634 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2634 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2634 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2635 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2636 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2636 - https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/ -CVE-2018-2636 - https://github.com/erpscanteam/CVE-2018-2636 -CVE-2018-2636 - https://www.exploit-db.com/exploits/43960/ -CVE-2018-2637 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2637 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2637 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2638 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2638 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2639 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2639 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2640 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2641 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2641 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2641 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2642 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2643 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2644 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2645 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2646 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2647 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2648 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2649 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2650 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2651 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2652 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2653 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2654 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2655 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2656 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2657 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2657 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2658 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2659 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2660 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2661 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2662 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2663 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2663 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2663 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2664 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2665 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2666 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2667 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2668 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2669 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2670 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2671 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2672 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2673 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2674 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2675 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2676 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2677 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2677 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2677 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2678 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2678 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2678 - https://usn.ubuntu.com/3614-1/ -CVE-2018-2679 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2680 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2681 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2682 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2683 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2684 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2685 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2686 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2687 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2688 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2689 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2690 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2691 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2692 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2693 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2694 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2695 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2696 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2697 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2698 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2698 - https://www.exploit-db.com/exploits/43878/ -CVE-2018-2699 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2700 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2701 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2702 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2703 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2704 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2705 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2706 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2707 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2708 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2709 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2710 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2711 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2712 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2713 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2714 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2715 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2716 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2717 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2719 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2720 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2721 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2722 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2723 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2724 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2725 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2726 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2727 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2728 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2729 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2730 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2731 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2732 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2733 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -CVE-2018-2765 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-2767 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2767 - https://usn.ubuntu.com/3725-1/ -CVE-2018-2783 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2790 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2791 - https://www.exploit-db.com/exploits/44752/ -CVE-2018-2794 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2795 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2796 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2797 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2798 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2799 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2800 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2811 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2814 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2815 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2825 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2826 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-2844 - https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html -CVE-2018-2875 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-2879 - http://packetstormsecurity.com/files/152551/OAMbuster-Multi-Threaded-CVE-2018-2879-Scanner.html -CVE-2018-2879 - https://www.sec-consult.com/en/blog/2018/05/oracle-access-managers-identity-crisis/ -CVE-2018-2880 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2018-2881 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2882 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2883 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2018-2887 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2888 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2889 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2891 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2892 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2892 - https://www.exploit-db.com/exploits/45126/ -CVE-2018-2893 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2894 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2895 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2896 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2897 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2898 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2899 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2900 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2901 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2902 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2903 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2904 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2905 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2906 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2907 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2908 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2909 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2911 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2912 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2912 - https://www.tenable.com/security/research/tra-2018-31 -CVE-2018-2913 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2913 - https://www.tenable.com/security/research/tra-2018-31 -CVE-2018-2914 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2914 - https://www.tenable.com/security/research/tra-2018-31 -CVE-2018-2915 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2916 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2917 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2918 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2919 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2920 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2921 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2922 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2923 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2924 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2925 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2926 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2927 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2928 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2929 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2930 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2932 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2933 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2934 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2935 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2936 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2937 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2938 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2939 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2940 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2941 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2942 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2943 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2944 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2945 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2946 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2947 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2948 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2949 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2950 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2951 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2952 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2953 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2954 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2955 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2956 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2957 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2958 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2959 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2960 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2961 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2962 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2963 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2964 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2965 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2966 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2967 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2968 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2969 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2970 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2971 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-2972 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2973 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2974 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2975 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2976 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2977 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2978 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2979 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2980 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2981 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2982 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2984 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2985 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2986 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2987 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2988 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2989 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2990 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2991 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2992 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2993 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2994 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2995 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2996 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2997 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2998 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-2999 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3000 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3001 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3002 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3003 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3004 - http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html -CVE-2018-3004 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3005 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3006 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3007 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3008 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3009 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3010 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3011 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3012 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3013 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3014 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3015 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3016 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3017 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3018 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3019 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3020 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3021 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3022 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3023 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3024 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3025 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3026 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3027 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3028 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3029 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3030 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3031 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3032 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3033 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3034 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3035 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3036 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3037 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3038 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3039 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3040 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3041 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3042 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3043 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3044 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3045 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3046 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3047 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3048 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3049 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3050 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3051 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3052 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3053 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3054 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3054 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3055 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3056 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3056 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3057 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3058 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3058 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3059 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3060 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3060 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3061 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3061 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3062 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3062 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3063 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3063 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3064 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3064 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3065 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3065 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3066 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3066 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3067 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3068 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3069 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3070 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3070 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3071 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3071 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3072 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3073 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3074 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3075 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3076 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3077 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3077 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3078 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3079 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3080 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3081 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3081 - https://usn.ubuntu.com/3725-1/ -CVE-2018-3082 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3084 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3085 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3086 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3087 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3088 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3089 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3090 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3091 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3092 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3093 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3094 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3095 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3096 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3097 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3098 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3099 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3100 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3101 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3102 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3103 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3104 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3105 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3108 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3109 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-3111 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2018-3115 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3120 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2018-3122 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3123 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2018-3125 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3126 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3127 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3128 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3129 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3130 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3131 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3132 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3133 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3134 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3135 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3136 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3137 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3138 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3139 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3140 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3141 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3142 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3143 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3144 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3145 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3146 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3147 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3147 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3148 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3149 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3150 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3151 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3152 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3153 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3154 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3155 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3156 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3157 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3158 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3159 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3160 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3161 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3162 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3163 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3164 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3165 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3166 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3168 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3169 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3170 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3171 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3172 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3173 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3174 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3175 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3176 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3177 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3178 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3179 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3180 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3184 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3185 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3186 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3187 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3188 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3189 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3190 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3191 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3192 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3193 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3194 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3196 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3198 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3200 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3201 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3202 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3203 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3204 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3205 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3206 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3207 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3208 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3209 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3210 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3211 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3212 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3213 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3214 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3215 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3217 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3218 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3219 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3220 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3221 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3222 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3223 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3224 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3225 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3226 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3227 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3228 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3229 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3230 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3231 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3232 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3233 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3234 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3236 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3237 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3238 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3239 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3241 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3242 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3243 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3244 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3245 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3245 - https://www.exploit-db.com/exploits/46513/ -CVE-2018-3246 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3246 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3247 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3248 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3249 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3250 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3251 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3252 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3253 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3254 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3255 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3256 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3257 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3258 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3259 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3261 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3262 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3263 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3264 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3265 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3266 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3267 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3268 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3269 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3270 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3271 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3272 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3273 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3274 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3276 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3277 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3278 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3279 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3280 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3281 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3282 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3283 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3284 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3288 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3289 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3290 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3291 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3297 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3298 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3299 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3300 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-3301 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-3303 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3304 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3305 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3309 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3311 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3312 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2018-3314 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2018-3315 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2018-3316 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2018-3574 - https://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000049462 -CVE-2018-3588 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-3589 - http://www.securityfocus.com/bid/103671 -CVE-2018-3590 - http://www.securityfocus.com/bid/103671 -CVE-2018-3591 - http://www.securityfocus.com/bid/103671 -CVE-2018-3592 - http://www.securityfocus.com/bid/103671 -CVE-2018-3593 - http://www.securityfocus.com/bid/103671 -CVE-2018-3594 - http://www.securityfocus.com/bid/103671 -CVE-2018-3595 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-3609 - https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt -CVE-2018-3615 - https://www.kb.cert.org/vuls/id/982149 -CVE-2018-3620 - https://access.redhat.com/errata/RHSA-2018:2393 -CVE-2018-3620 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-3620 - https://www.kb.cert.org/vuls/id/982149 -CVE-2018-3620 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-3639 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-3639 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2018-3639 - https://usn.ubuntu.com/3777-3/ -CVE-2018-3639 - https://www.exploit-db.com/exploits/44695/ -CVE-2018-3639 - https://www.kb.cert.org/vuls/id/180049 -CVE-2018-3639 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-3639 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3640 - https://www.kb.cert.org/vuls/id/180049 -CVE-2018-3646 - https://access.redhat.com/errata/RHSA-2018:2393 -CVE-2018-3646 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-3646 - https://www.kb.cert.org/vuls/id/982149 -CVE-2018-3646 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-3646 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-3665 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-3665 - https://usn.ubuntu.com/3696-1/ -CVE-2018-3665 - https://usn.ubuntu.com/3698-1/ -CVE-2018-3665 - https://usn.ubuntu.com/3698-2/ -CVE-2018-3665 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-3693 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-3693 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-3693 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-3710 - https://gitlab.com/gitlab-org/gitlab-ce/issues/41757 -CVE-2018-3711 - https://hackerone.com/reports/303632 -CVE-2018-3712 - https://hackerone.com/reports/307666 -CVE-2018-3713 - https://hackerone.com/reports/309120 -CVE-2018-3714 - https://hackerone.com/reports/309124 -CVE-2018-3715 - https://hackerone.com/reports/310106 -CVE-2018-3716 - https://hackerone.com/reports/309648 -CVE-2018-3717 - https://hackerone.com/reports/309394 -CVE-2018-3717 - https://hackerone.com/reports/309641 -CVE-2018-3718 - https://hackerone.com/reports/308721 -CVE-2018-3719 - https://hackerone.com/reports/311236 -CVE-2018-3720 - https://hackerone.com/reports/310707 -CVE-2018-3721 - https://hackerone.com/reports/310443 -CVE-2018-3722 - https://hackerone.com/reports/310708 -CVE-2018-3723 - https://hackerone.com/reports/310514 -CVE-2018-3724 - https://hackerone.com/reports/310943 -CVE-2018-3725 - https://hackerone.com/reports/311218 -CVE-2018-3726 - https://hackerone.com/reports/311101 -CVE-2018-3727 - https://hackerone.com/reports/311216 -CVE-2018-3728 - https://hackerone.com/reports/310439 -CVE-2018-3728 - https://snyk.io/vuln/npm:hoek:20180212 -CVE-2018-3729 - https://hackerone.com/reports/312889 -CVE-2018-3730 - https://hackerone.com/reports/312907 -CVE-2018-3731 - https://hackerone.com/reports/312918 -CVE-2018-3732 - https://hackerone.com/reports/315760 -CVE-2018-3733 - https://hackerone.com/reports/310690 -CVE-2018-3734 - https://hackerone.com/reports/319003 -CVE-2018-3738 - https://hackerone.com/reports/319576 -CVE-2018-3741 - https://hackerone.com/reports/328270 -CVE-2018-3743 - https://hackerone.com/reports/320693 -CVE-2018-3744 - https://hackerone.com/reports/306607 -CVE-2018-3745 - https://hackerone.com/reports/321686 -CVE-2018-3746 - https://hackerone.com/reports/330957 -CVE-2018-3747 - https://hackerone.com/reports/316346 -CVE-2018-3748 - https://hackerone.com/reports/310133 -CVE-2018-3749 - https://hackerone.com/reports/310446 -CVE-2018-3750 - https://hackerone.com/reports/311333 -CVE-2018-3751 - https://hackerone.com/reports/311337 -CVE-2018-3752 - https://hackerone.com/reports/311336 -CVE-2018-3753 - https://hackerone.com/reports/310706 -CVE-2018-3754 - https://hackerone.com/reports/311244 -CVE-2018-3755 - https://hackerone.com/reports/328210 -CVE-2018-3757 - https://hackerone.com/reports/340208 -CVE-2018-3758 - https://hackerone.com/reports/343726 -CVE-2018-3760 - https://hackerone.com/reports/307808 -CVE-2018-3761 - https://hackerone.com/reports/343111 -CVE-2018-3762 - https://hackerone.com/reports/358339 -CVE-2018-3766 - https://hackerone.com/reports/358112 -CVE-2018-3767 - https://hackerone.com/reports/319809 -CVE-2018-3769 - https://github.com/ruby-grape/grape/issues/1762 -CVE-2018-3770 - https://hackerone.com/reports/360727 -CVE-2018-3771 - https://hackerone.com/reports/355458 -CVE-2018-3772 - https://hackerone.com/reports/319476 -CVE-2018-3773 - https://hackerone.com/reports/309367 -CVE-2018-3774 - https://hackerone.com/reports/384029 -CVE-2018-3775 - https://hackerone.com/reports/248656 -CVE-2018-3776 - https://hackerone.com/reports/232347 -CVE-2018-3779 - https://hackerone.com/reports/392311 -CVE-2018-3780 - https://hackerone.com/reports/383117 -CVE-2018-3781 - https://hackerone.com/reports/383117 -CVE-2018-3783 - https://hackerone.com/reports/386807 -CVE-2018-3784 - https://hackerone.com/reports/350418 -CVE-2018-3785 - https://hackerone.com/reports/341710 -CVE-2018-3786 - https://hackerone.com/reports/388936 -CVE-2018-3787 - https://hackerone.com/reports/357109 -CVE-2018-3809 - https://hackerone.com/reports/330650 -CVE-2018-3810 - https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html -CVE-2018-3810 - https://wpvulndb.com/vulnerabilities/8987 -CVE-2018-3810 - https://www.exploit-db.com/exploits/43420/ -CVE-2018-3811 - https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html -CVE-2018-3811 - https://wpvulndb.com/vulnerabilities/8988 -CVE-2018-3811 - https://www.exploit-db.com/exploits/43420/ -CVE-2018-3814 - https://github.com/Snowty/myCVE/blob/master/CraftCMS-2.6.3000/README.md -CVE-2018-3815 - https://packetstormsecurity.com/files/145724/communigatepro62-spoof -CVE-2018-3823 - https://www.elastic.co/community/security -CVE-2018-3824 - https://www.elastic.co/community/security -CVE-2018-3825 - https://www.elastic.co/community/security -CVE-2018-3826 - https://www.elastic.co/community/security -CVE-2018-3827 - https://www.elastic.co/community/security -CVE-2018-3828 - https://www.elastic.co/community/security -CVE-2018-3829 - https://www.elastic.co/community/security -CVE-2018-3830 - https://www.elastic.co/community/security -CVE-2018-3831 - https://www.elastic.co/community/security -CVE-2018-3832 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0511 -CVE-2018-3833 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 -CVE-2018-3836 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516 -CVE-2018-3839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0521 -CVE-2018-3840 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0523 -CVE-2018-3841 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0524 -CVE-2018-3844 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0527 -CVE-2018-3845 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0528 -CVE-2018-3850 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0532 -CVE-2018-3851 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0534 -CVE-2018-3852 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0535 -CVE-2018-3853 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0536 -CVE-2018-3855 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0538 -CVE-2018-3856 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0539 -CVE-2018-3857 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0541 -CVE-2018-3858 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0542 -CVE-2018-3859 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0543 -CVE-2018-3860 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0544 -CVE-2018-3861 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0546 -CVE-2018-3862 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0547 -CVE-2018-3863 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0548 -CVE-2018-3864 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 -CVE-2018-3865 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 -CVE-2018-3866 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 -CVE-2018-3867 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0549 -CVE-2018-3868 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0550 -CVE-2018-3870 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0552 -CVE-2018-3871 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0553 -CVE-2018-3872 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0554 -CVE-2018-3873 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -CVE-2018-3874 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -CVE-2018-3875 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -CVE-2018-3876 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -CVE-2018-3877 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -CVE-2018-3878 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -CVE-2018-3879 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0556 -CVE-2018-3880 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0557 -CVE-2018-3882 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 -CVE-2018-3883 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 -CVE-2018-3884 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 -CVE-2018-3885 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 -CVE-2018-3886 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0561 -CVE-2018-3887 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0562 -CVE-2018-3888 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0563 -CVE-2018-3889 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0564 -CVE-2018-3893 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 -CVE-2018-3894 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 -CVE-2018-3895 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 -CVE-2018-3896 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 -CVE-2018-3897 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 -CVE-2018-3902 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0573 -CVE-2018-3903 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0574 -CVE-2018-3904 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0574 -CVE-2018-3905 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0575 -CVE-2018-3906 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0576 -CVE-2018-3907 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 -CVE-2018-3908 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 -CVE-2018-3909 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 -CVE-2018-3911 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0578 -CVE-2018-3913 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 -CVE-2018-3914 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 -CVE-2018-3915 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 -CVE-2018-3916 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 -CVE-2018-3918 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0582 -CVE-2018-3919 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0583 -CVE-2018-3921 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0585 -CVE-2018-3922 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0586 -CVE-2018-3924 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0588 -CVE-2018-3926 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593 -CVE-2018-3927 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0594 -CVE-2018-3934 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0601 -CVE-2018-3937 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0604 -CVE-2018-3939 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0606 -CVE-2018-3940 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0607 -CVE-2018-3941 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0608 -CVE-2018-3942 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0609 -CVE-2018-3943 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610 -CVE-2018-3944 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611 -CVE-2018-3945 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0612 -CVE-2018-3946 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0613 -CVE-2018-3947 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0616 -CVE-2018-3948 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617 -CVE-2018-3949 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0618 -CVE-2018-3950 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0619 -CVE-2018-3951 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620 -CVE-2018-3952 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0622 -CVE-2018-3953 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 -CVE-2018-3954 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 -CVE-2018-3955 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 -CVE-2018-3957 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 -CVE-2018-3958 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 -CVE-2018-3959 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 -CVE-2018-3960 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 -CVE-2018-3961 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 -CVE-2018-3962 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 -CVE-2018-3963 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0627 -CVE-2018-3964 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0629 -CVE-2018-3965 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0630 -CVE-2018-3966 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0631 -CVE-2018-3967 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0632 -CVE-2018-3968 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 -CVE-2018-3969 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634 -CVE-2018-3970 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0635 -CVE-2018-3971 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0636 -CVE-2018-3973 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0638 -CVE-2018-3974 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0640 -CVE-2018-3975 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0641 -CVE-2018-3976 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0642 -CVE-2018-3977 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0645 -CVE-2018-3978 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646 -CVE-2018-3979 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0647 -CVE-2018-3980 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0648 -CVE-2018-3981 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0649 -CVE-2018-3981 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0651 -CVE-2018-3982 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0650 -CVE-2018-3983 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0651 -CVE-2018-3984 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0652 -CVE-2018-3985 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0653 -CVE-2018-3986 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0654 -CVE-2018-3987 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0655 -CVE-2018-3989 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657 -CVE-2018-3990 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0658 -CVE-2018-3991 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 -CVE-2018-3992 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0660 -CVE-2018-3993 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0661 -CVE-2018-3994 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0662 -CVE-2018-3995 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0663 -CVE-2018-3996 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0664 -CVE-2018-3997 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0665 -CVE-2018-3998 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666 -CVE-2018-3999 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0667 -CVE-2018-4000 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0668 -CVE-2018-4001 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0669 -CVE-2018-4002 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0671 -CVE-2018-4003 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0672 -CVE-2018-4004 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0673 -CVE-2018-4005 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0674 -CVE-2018-4006 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0675 -CVE-2018-4007 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0676 -CVE-2018-4008 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0677 -CVE-2018-4009 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0678 -CVE-2018-4010 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0679 -CVE-2018-4011 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681 -CVE-2018-4012 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0683 -CVE-2018-4013 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684 -CVE-2018-4014 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0685 -CVE-2018-4015 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0686 -CVE-2018-4016 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0687 -CVE-2018-4017 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688 -CVE-2018-4018 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0689 -CVE-2018-4019 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 -CVE-2018-4020 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 -CVE-2018-4021 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 -CVE-2018-4022 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0694 -CVE-2018-4023 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0695 -CVE-2018-4024 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0696 -CVE-2018-4025 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0697 -CVE-2018-4026 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0698 -CVE-2018-4027 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0699 -CVE-2018-4028 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0700 -CVE-2018-4029 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0701 -CVE-2018-4030 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0702 -CVE-2018-4031 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703 -CVE-2018-4032 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0705 -CVE-2018-4033 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0706 -CVE-2018-4034 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0707 -CVE-2018-4035 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0708 -CVE-2018-4036 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0709 -CVE-2018-4037 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0710 -CVE-2018-4038 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0711 -CVE-2018-4039 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0712 -CVE-2018-4040 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0713 -CVE-2018-4041 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0715 -CVE-2018-4042 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0716 -CVE-2018-4043 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0717 -CVE-2018-4044 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0718 -CVE-2018-4045 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0719 -CVE-2018-4046 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0720 -CVE-2018-4047 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0721 -CVE-2018-4048 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0722 -CVE-2018-4049 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0723 -CVE-2018-4050 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0724 -CVE-2018-4052 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0726 -CVE-2018-4053 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0727 -CVE-2018-4054 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0728 -CVE-2018-4055 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0729 -CVE-2018-4056 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 -CVE-2018-4058 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0732 -CVE-2018-4059 - https://hackerone.com/reports/843263 -CVE-2018-4059 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0733 -CVE-2018-4061 - http://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html -CVE-2018-4061 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746 -CVE-2018-4062 - http://packetstormsecurity.com/files/152647/Sierra-Wireless-AirLink-ES450-SNMPD-Hard-Coded-Credentials.html -CVE-2018-4062 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747 -CVE-2018-4063 - http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html -CVE-2018-4063 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 -CVE-2018-4064 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0749 -CVE-2018-4065 - http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html -CVE-2018-4065 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750 -CVE-2018-4066 - http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html -CVE-2018-4066 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751 -CVE-2018-4067 - http://packetstormsecurity.com/files/152652/Sierra-Wireless-AirLink-ES450-ACEManager-template_load.cgi-Information-Disclosure.html -CVE-2018-4067 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0752 -CVE-2018-4068 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0753 -CVE-2018-4069 - http://packetstormsecurity.com/files/152654/Sierra-Wireless-AirLink-ES450-ACEManager-Information-Exposure.html -CVE-2018-4069 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0754 -CVE-2018-4070 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755 -CVE-2018-4071 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755 -CVE-2018-4072 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756 -CVE-2018-4073 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756 -CVE-2018-4083 - https://www.exploit-db.com/exploits/44007/ -CVE-2018-4087 - https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/ -CVE-2018-4087 - https://www.exploit-db.com/exploits/44215/ -CVE-2018-4089 - https://www.exploit-db.com/exploits/43937/ -CVE-2018-4090 - https://www.exploit-db.com/exploits/43923/ -CVE-2018-4095 - https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/ -CVE-2018-4121 - https://github.com/mwrlabs/CVE-2018-4121 -CVE-2018-4121 - https://www.exploit-db.com/exploits/44427/ -CVE-2018-4124 - https://nakedsecurity.sophos.com/2018/02/20/apple-fixes-that-1-character-to-crash-your-mac-and-iphone-bug/ -CVE-2018-4139 - https://www.exploit-db.com/exploits/44561/ -CVE-2018-4162 - http://packetstormsecurity.com/files/158874/Safari-Webkit-For-iOS-7.1.2-JIT-Optimization-Bug.html -CVE-2018-4192 - https://www.exploit-db.com/exploits/45048/ -CVE-2018-4193 - https://www.exploit-db.com/exploits/46428/ -CVE-2018-4200 - https://www.exploit-db.com/exploits/44566/ -CVE-2018-4206 - https://www.exploit-db.com/exploits/44562/ -CVE-2018-4218 - https://www.exploit-db.com/exploits/44861/ -CVE-2018-4222 - https://www.exploit-db.com/exploits/44859/ -CVE-2018-4230 - https://www.exploit-db.com/exploits/44847/ -CVE-2018-4233 - http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html -CVE-2018-4233 - https://www.exploit-db.com/exploits/45998/ -CVE-2018-4237 - https://www.exploit-db.com/exploits/45916/ -CVE-2018-4240 - https://www.exploit-db.com/exploits/45391/ -CVE-2018-4241 - https://www.exploit-db.com/exploits/44849/ -CVE-2018-4243 - https://www.exploit-db.com/exploits/44848/ -CVE-2018-4249 - http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html -CVE-2018-4259 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html -CVE-2018-4286 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html -CVE-2018-4287 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html -CVE-2018-4288 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html -CVE-2018-4291 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html -CVE-2018-4386 - http://packetstormsecurity.com/files/155871/Sony-Playstation-4-Webkit-Code-Execution.html -CVE-2018-4404 - https://www.exploit-db.com/exploits/45998/ -CVE-2018-4407 - http://packetstormsecurity.com/files/172832/iOS-11.4.1-macOS-10.13.6-icmp_error-Heap-Buffer-Overflow.html -CVE-2018-4832 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2018-4863 - http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-v10.7-TAMPER-PROTECTION-BYPASS-CVE-2018-4863.txt -CVE-2018-4863 - http://seclists.org/fulldisclosure/2018/Apr/6 -CVE-2018-4863 - https://www.exploit-db.com/exploits/44410/ -CVE-2018-4868 - https://github.com/Exiv2/exiv2/issues/202 -CVE-2018-4878 - https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign -CVE-2018-4878 - https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day -CVE-2018-4878 - https://github.com/vysec/CVE-2018-4878 -CVE-2018-4878 - https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/ -CVE-2018-4878 - https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139 -CVE-2018-4878 - https://www.exploit-db.com/exploits/44412/ -CVE-2018-4934 - https://www.exploit-db.com/exploits/44528/ -CVE-2018-4935 - https://www.exploit-db.com/exploits/44527/ -CVE-2018-4936 - https://www.exploit-db.com/exploits/44526/ -CVE-2018-4937 - https://www.exploit-db.com/exploits/44529/ -CVE-2018-4947 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4948 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4949 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4950 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4951 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4952 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4953 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4954 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4955 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4956 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4957 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4958 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4959 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4960 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4961 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4962 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4963 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4964 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4965 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4966 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4967 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4968 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4969 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4970 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4971 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4972 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4973 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4974 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4975 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4976 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4977 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4978 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4979 - http://www.securityfocus.com/bid/104168 -CVE-2018-4979 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4980 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4981 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4982 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4983 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4984 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4985 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4986 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4987 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4988 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4989 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4990 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4993 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4995 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-4996 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html -CVE-2018-5072 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5073 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5074 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5075 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5076 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5077 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5078 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2018-5079 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002130 -CVE-2018-5080 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x830020FC -CVE-2018-5081 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x830020F0 -CVE-2018-5082 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002128 -CVE-2018-5083 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300215B -CVE-2018-5084 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300212C -CVE-2018-5085 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002124 -CVE-2018-5086 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300215F -CVE-2018-5087 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002100 -CVE-2018-5088 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300211C -CVE-2018-5091 - https://bugzilla.mozilla.org/show_bug.cgi?id=1423086 -CVE-2018-5095 - https://bugzilla.mozilla.org/show_bug.cgi?id=1418447 -CVE-2018-5105 - https://bugzilla.mozilla.org/show_bug.cgi?id=1390882 -CVE-2018-5106 - https://bugzilla.mozilla.org/show_bug.cgi?id=1408708 -CVE-2018-5111 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321619 -CVE-2018-5112 - https://bugzilla.mozilla.org/show_bug.cgi?id=1425224 -CVE-2018-5113 - https://bugzilla.mozilla.org/show_bug.cgi?id=1425267 -CVE-2018-5114 - https://bugzilla.mozilla.org/show_bug.cgi?id=1421324 -CVE-2018-5116 - https://bugzilla.mozilla.org/show_bug.cgi?id=1396399 -CVE-2018-5117 - https://bugzilla.mozilla.org/show_bug.cgi?id=1395508 -CVE-2018-5123 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123 -CVE-2018-5129 - https://bugzilla.mozilla.org/show_bug.cgi?id=1428947 -CVE-2018-5134 - https://bugzilla.mozilla.org/show_bug.cgi?id=1429379 -CVE-2018-5135 - https://bugzilla.mozilla.org/show_bug.cgi?id=1431371 -CVE-2018-5136 - https://bugzilla.mozilla.org/show_bug.cgi?id=1419166 -CVE-2018-5137 - https://bugzilla.mozilla.org/show_bug.cgi?id=1432870 -CVE-2018-5138 - https://bugzilla.mozilla.org/show_bug.cgi?id=1432624 -CVE-2018-5140 - https://bugzilla.mozilla.org/show_bug.cgi?id=1424261 -CVE-2018-5142 - https://bugzilla.mozilla.org/show_bug.cgi?id=1366357 -CVE-2018-5143 - https://bugzilla.mozilla.org/show_bug.cgi?id=1422643 -CVE-2018-5146 - https://bugzilla.mozilla.org/show_bug.cgi?id=1446062 -CVE-2018-5152 - https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 -CVE-2018-5157 - https://bugzilla.mozilla.org/show_bug.cgi?id=1449898 -CVE-2018-5158 - https://bugzilla.mozilla.org/show_bug.cgi?id=1452075 -CVE-2018-5159 - https://bugzilla.mozilla.org/show_bug.cgi?id=1441941 -CVE-2018-5159 - https://www.exploit-db.com/exploits/44759/ -CVE-2018-5162 - https://bugzilla.mozilla.org/show_bug.cgi?id=1457721 -CVE-2018-5164 - https://bugzilla.mozilla.org/show_bug.cgi?id=1416045 -CVE-2018-5166 - https://bugzilla.mozilla.org/show_bug.cgi?id=1437325 -CVE-2018-5168 - https://bugzilla.mozilla.org/show_bug.cgi?id=1449548 -CVE-2018-5172 - https://bugzilla.mozilla.org/show_bug.cgi?id=1436482 -CVE-2018-5173 - https://bugzilla.mozilla.org/show_bug.cgi?id=1438025 -CVE-2018-5175 - https://bugzilla.mozilla.org/show_bug.cgi?id=1432358 -CVE-2018-5176 - https://bugzilla.mozilla.org/show_bug.cgi?id=1442840 -CVE-2018-5181 - https://bugzilla.mozilla.org/show_bug.cgi?id=1424107 -CVE-2018-5188 - https://usn.ubuntu.com/3714-1/ -CVE-2018-5189 - https://www.exploit-db.com/exploits/43494/ -CVE-2018-5189 - https://www.fidusinfosec.com/jungo-windriver-code-execution-cve-2018-5189/ -CVE-2018-5210 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-5211 - https://www.exploit-db.com/exploits/43409/ -CVE-2018-5217 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_95002578 -CVE-2018-5218 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_950025b0 -CVE-2018-5219 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_83002168 -CVE-2018-5220 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_95002610 -CVE-2018-5221 - http://hyp3rlinx.altervista.org/advisories/BARCODEWIZ-v6.7-ACTIVEX-COMPONENT-BUFFER-OVERFLOW.txt -CVE-2018-5221 - http://packetstormsecurity.com/files/145731/BarcodeWiz-ActiveX-Control-Buffer-Overflow.html -CVE-2018-5227 - https://ecosystem.atlassian.net/browse/APL-1361 -CVE-2018-5229 - https://ecosystem.atlassian.net/browse/UPM-5871 -CVE-2018-5233 - http://www.openwall.com/lists/oss-security/2018/03/15/1 -CVE-2018-5233 - https://sysdream.com/news/lab/2018-03-15-cve-2018-5233-grav-cms-admin-plugin-reflected-cross-site-scripting-xss-vulnerability/ -CVE-2018-5234 - https://www.exploit-db.com/exploits/44574/ -CVE-2018-5246 - https://github.com/ImageMagick/ImageMagick/issues/929 -CVE-2018-5247 - https://github.com/ImageMagick/ImageMagick/issues/928 -CVE-2018-5248 - https://github.com/ImageMagick/ImageMagick/issues/927 -CVE-2018-5251 - https://github.com/libming/libming/issues/97 -CVE-2018-5252 - https://github.com/jsummers/imageworsener/issues/34 -CVE-2018-5253 - https://github.com/axiomatic-systems/Bento4/issues/233 -CVE-2018-5262 - http://packetstormsecurity.com/files/145825/DiskBoss-Enterprise-8.8.16-Buffer-Overflow.html -CVE-2018-5262 - https://www.exploit-db.com/exploits/43478/ -CVE-2018-5263 - https://www.exploit-db.com/exploits/43488/ -CVE-2018-5270 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e010 -CVE-2018-5271 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e008 -CVE-2018-5272 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e004 -CVE-2018-5273 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e014 -CVE-2018-5274 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E024 -CVE-2018-5275 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E020 -CVE-2018-5276 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e018 -CVE-2018-5277 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e000 -CVE-2018-5278 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e00c -CVE-2018-5279 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e02c -CVE-2018-5280 - https://www.vulnerability-lab.com/get_content.php?id=1725 -CVE-2018-5281 - https://www.vulnerability-lab.com/get_content.php?id=1729 -CVE-2018-5282 - https://www.exploit-db.com/exploits/43547/ -CVE-2018-5282 - https://www.vulnerability-lab.com/get_content.php?id=1943 -CVE-2018-5283 - https://www.vulnerability-lab.com/get_content.php?id=1600 -CVE-2018-5284 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ImageInject.md -CVE-2018-5284 - https://wpvulndb.com/vulnerabilities/8994 -CVE-2018-5285 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ImageInject.md -CVE-2018-5285 - https://wpvulndb.com/vulnerabilities/8994 -CVE-2018-5286 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5286 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5287 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5287 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5288 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5288 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5289 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5289 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5290 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5290 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5291 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5291 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5292 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5292 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5293 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -CVE-2018-5293 - https://wpvulndb.com/vulnerabilities/8995 -CVE-2018-5294 - https://github.com/libming/libming/issues/98 -CVE-2018-5295 - https://bugzilla.redhat.com/show_bug.cgi?id=1531897 -CVE-2018-5296 - https://bugzilla.redhat.com/show_bug.cgi?id=1531956 -CVE-2018-5306 - http://seclists.org/fulldisclosure/2018/Feb/23 -CVE-2018-5306 - https://support.sonatype.com/hc/en-us/articles/360000134968 -CVE-2018-5307 - http://seclists.org/fulldisclosure/2018/Feb/23 -CVE-2018-5307 - https://support.sonatype.com/hc/en-us/articles/360000134928 -CVE-2018-5308 - https://bugzilla.redhat.com/show_bug.cgi?id=1532390 -CVE-2018-5309 - https://bugzilla.redhat.com/show_bug.cgi?id=1532381 -CVE-2018-5313 - http://packetstormsecurity.com/files/146668/Rapid-Scada-5.5.0-Insecure-Permissions.html -CVE-2018-5315 - http://packetstormsecurity.com/files/145833/WordPress-Events-Calendar-1.0-SQL-Injection.html -CVE-2018-5315 - https://www.exploit-db.com/exploits/43479/ -CVE-2018-5316 - https://packetstormsecurity.com/files/145459/WordPress-Sagepay-Server-Gateway-For-WooCommerce-1.0.7-XSS.html -CVE-2018-5319 - https://www.exploit-db.com/exploits/43856/ -CVE-2018-5330 - http://packetstormsecurity.com/files/145863/ZyXEL-P-660HW-UDP-Denial-Of-Service.html -CVE-2018-5332 - https://usn.ubuntu.com/3620-1/ -CVE-2018-5333 - http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html -CVE-2018-5333 - https://usn.ubuntu.com/3583-2/ -CVE-2018-5344 - https://usn.ubuntu.com/3583-2/ -CVE-2018-5347 - https://www.exploit-db.com/exploits/43659/ -CVE-2018-5353 - https://github.com/missing0x00/CVE-2018-5353 -CVE-2018-5354 - https://github.com/missing0x00/CVE-2018-5354 -CVE-2018-5357 - https://github.com/ImageMagick/ImageMagick/issues/941 -CVE-2018-5359 - http://packetstormsecurity.com/files/145900/SysGauge-Server-3.6.18-Buffer-Overflow.html -CVE-2018-5359 - https://www.exploit-db.com/exploits/43588/ -CVE-2018-5360 - https://sourceforge.net/p/graphicsmagick/bugs/540/ -CVE-2018-5361 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5361 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5362 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5362 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5363 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5363 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5364 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5364 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5365 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5365 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5366 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5366 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5367 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md -CVE-2018-5367 - https://wpvulndb.com/vulnerabilities/9003 -CVE-2018-5368 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/SrbTransLatin.md -CVE-2018-5368 - https://wpvulndb.com/vulnerabilities/9004 -CVE-2018-5369 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/SrbTransLatin.md -CVE-2018-5369 - https://wpvulndb.com/vulnerabilities/9004 -CVE-2018-5370 - http://packetstormsecurity.com/files/145872/Xnami-Image-Sharing-1.0-Cross-Site-Scripting.html -CVE-2018-5370 - https://www.exploit-db.com/exploits/43535/ -CVE-2018-5378 - http://www.kb.cert.org/vuls/id/940439 -CVE-2018-5379 - http://www.kb.cert.org/vuls/id/940439 -CVE-2018-5380 - http://www.kb.cert.org/vuls/id/940439 -CVE-2018-5381 - http://www.kb.cert.org/vuls/id/940439 -CVE-2018-5382 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-5383 - https://usn.ubuntu.com/4118-1/ -CVE-2018-5383 - https://www.kb.cert.org/vuls/id/304725 -CVE-2018-5384 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 -CVE-2018-5384 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html -CVE-2018-5385 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 -CVE-2018-5385 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html -CVE-2018-5386 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 -CVE-2018-5386 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html -CVE-2018-5387 - https://github.com/GoGentoOSS/SAMLBase/issues/3 -CVE-2018-5387 - https://www.kb.cert.org/vuls/id/475445 -CVE-2018-5388 - http://packetstormsecurity.com/files/172833/strongSwan-VPN-Charon-Server-Buffer-Overflow.html -CVE-2018-5388 - http://www.kb.cert.org/vuls/id/338343 -CVE-2018-5389 - https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html -CVE-2018-5389 - https://www.kb.cert.org/vuls/id/857035 -CVE-2018-5390 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-5390 - https://www.kb.cert.org/vuls/id/962459 -CVE-2018-5390 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-5390 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-5393 - https://www.kb.cert.org/vuls/id/581311 -CVE-2018-5403 - https://www.exploit-db.com/exploits/45542 -CVE-2018-5404 - https://www.kb.cert.org/vuls/id/877837/ -CVE-2018-5405 - http://packetstormsecurity.com/files/153150/Dell-KACE-System-Management-Appliance-SMA-XSS-SQL-Injection.html -CVE-2018-5405 - https://www.kb.cert.org/vuls/id/877837/ -CVE-2018-5406 - http://packetstormsecurity.com/files/153150/Dell-KACE-System-Management-Appliance-SMA-XSS-SQL-Injection.html -CVE-2018-5406 - https://www.kb.cert.org/vuls/id/877837/ -CVE-2018-5407 - https://github.com/bbbrumley/portsmash -CVE-2018-5407 - https://www.exploit-db.com/exploits/45785/ -CVE-2018-5407 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-5407 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-5407 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-5407 - https://www.tenable.com/security/tns-2018-16 -CVE-2018-5407 - https://www.tenable.com/security/tns-2018-17 -CVE-2018-5410 - https://www.exploit-db.com/exploits/46155/ -CVE-2018-5411 - https://www.kb.cert.org/vuls/id/756913/ -CVE-2018-5412 - https://www.exploit-db.com/exploits/45132 -CVE-2018-5413 - https://www.exploit-db.com/exploits/45130 -CVE-2018-5430 - https://www.exploit-db.com/exploits/44623/ -CVE-2018-5441 - https://cert.vde.com/en-us/advisories/vde-2018-001 -CVE-2018-5479 - https://www.exploit-db.com/exploits/43567/ -CVE-2018-5511 - http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html -CVE-2018-5511 - https://www.exploit-db.com/exploits/46600/ -CVE-2018-5529 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt -CVE-2018-5546 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt -CVE-2018-5650 - https://github.com/ckolivas/lrzip/issues/88 -CVE-2018-5651 - https://wpvulndb.com/vulnerabilities/9008 -CVE-2018-5652 - https://wpvulndb.com/vulnerabilities/9008 -CVE-2018-5653 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md -CVE-2018-5653 - https://wpvulndb.com/vulnerabilities/9009 -CVE-2018-5654 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md -CVE-2018-5654 - https://wpvulndb.com/vulnerabilities/9009 -CVE-2018-5655 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md -CVE-2018-5656 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md -CVE-2018-5657 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5657 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5658 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5658 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5659 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5659 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5660 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5660 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5661 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5661 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5662 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5662 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5663 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5663 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5664 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5664 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5665 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5665 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5666 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -CVE-2018-5666 - https://wpvulndb.com/vulnerabilities/9010 -CVE-2018-5667 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/read-and-understood.md -CVE-2018-5668 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/read-and-understood.md -CVE-2018-5669 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/read-and-understood.md -CVE-2018-5670 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md -CVE-2018-5670 - https://wpvulndb.com/vulnerabilities/9012 -CVE-2018-5671 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md -CVE-2018-5671 - https://wpvulndb.com/vulnerabilities/9012 -CVE-2018-5672 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md -CVE-2018-5672 - https://wpvulndb.com/vulnerabilities/9012 -CVE-2018-5673 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md -CVE-2018-5673 - https://wpvulndb.com/vulnerabilities/9012 -CVE-2018-5684 - https://bugzilla.libav.org/show_bug.cgi?id=1110 -CVE-2018-5685 - https://sourceforge.net/p/graphicsmagick/bugs/541/ -CVE-2018-5686 - https://bugs.ghostscript.com/show_bug.cgi?id=698860 -CVE-2018-5688 - https://www.exploit-db.com/exploits/43595/ -CVE-2018-5691 - https://www.vulnerability-lab.com/get_content.php?id=1819 -CVE-2018-5692 - https://www.vulnerability-lab.com/get_content.php?id=2005 -CVE-2018-5693 - https://www.vulnerability-lab.com/get_content.php?id=2113 -CVE-2018-5694 - https://www.vulnerability-lab.com/get_content.php?id=1907 -CVE-2018-5695 - https://www.vulnerability-lab.com/get_content.php?id=1940 -CVE-2018-5696 - https://www.vulnerability-lab.com/get_content.php?id=1927 -CVE-2018-5697 - https://www.vulnerability-lab.com/get_content.php?id=2006 -CVE-2018-5698 - https://github.com/WizardMac/ReadStat/issues/108 -CVE-2018-5701 - http://packetstormsecurity.com/files/146165/System-Shield-5.0.0.136-Privilege-Escalation.html -CVE-2018-5701 - https://www.exploit-db.com/exploits/43929/ -CVE-2018-5701 - https://www.greyhathacker.net/?p=1006 -CVE-2018-5702 - https://github.com/transmission/transmission/pull/468 -CVE-2018-5702 - https://www.exploit-db.com/exploits/43665/ -CVE-2018-5704 - https://sourceforge.net/p/openocd/mailman/message/36188041/ -CVE-2018-5705 - http://packetstormsecurity.com/files/145940/Reservo-Image-Hosting-Script-1.5-Cross-Site-Scripting.html -CVE-2018-5705 - https://www.exploit-db.com/exploits/43676/ -CVE-2018-5708 - http://seclists.org/fulldisclosure/2018/Mar/66 -CVE-2018-5708 - https://www.exploit-db.com/exploits/44388/ -CVE-2018-5711 - https://bugs.php.net/bug.php?id=75571 -CVE-2018-5711 - https://hackerone.com/reports/305972 -CVE-2018-5711 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-5712 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-5713 - https://github.com/whiteHat001/DRIVER_POC/tree/master/malwarefox/0x80002010 -CVE-2018-5714 - https://github.com/whiteHat001/DRIVER_POC/tree/master/malwarefox/0x80002054 -CVE-2018-5715 - https://www.exploit-db.com/exploits/43683/ -CVE-2018-5720 - https://www.exploit-db.com/exploits/43898/ -CVE-2018-5723 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html -CVE-2018-5723 - https://www.exploit-db.com/exploits/43693/ -CVE-2018-5724 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html -CVE-2018-5724 - https://www.exploit-db.com/exploits/43693/ -CVE-2018-5725 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html -CVE-2018-5725 - https://www.exploit-db.com/exploits/43693/ -CVE-2018-5726 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html -CVE-2018-5726 - https://www.exploit-db.com/exploits/43693/ -CVE-2018-5727 - https://github.com/uclouvain/openjpeg/issues/1053 -CVE-2018-5731 - https://improsec.com/blog/heimdal-advisory-2 -CVE-2018-5737 - https://kb.isc.org/docs/aa-01606 -CVE-2018-5747 - https://github.com/ckolivas/lrzip/issues/90 -CVE-2018-5750 - https://usn.ubuntu.com/3698-1/ -CVE-2018-5750 - https://usn.ubuntu.com/3698-2/ -CVE-2018-5751 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2018-5751 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2018-5751 - https://www.exploit-db.com/exploits/44881/ -CVE-2018-5752 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2018-5752 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2018-5752 - https://www.exploit-db.com/exploits/44881/ -CVE-2018-5753 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2018-5753 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2018-5753 - https://www.exploit-db.com/exploits/44881/ -CVE-2018-5754 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2018-5754 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2018-5754 - https://www.exploit-db.com/exploits/44881/ -CVE-2018-5755 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2018-5755 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2018-5755 - https://www.exploit-db.com/exploits/44881/ -CVE-2018-5756 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -CVE-2018-5756 - http://seclists.org/fulldisclosure/2018/Jun/23 -CVE-2018-5756 - https://www.exploit-db.com/exploits/44881/ -CVE-2018-5757 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 -CVE-2018-5759 - https://bugs.ghostscript.com/show_bug.cgi?id=698868 -CVE-2018-5759 - https://www.exploit-db.com/exploits/43904/ -CVE-2018-5761 - https://support.rubrik.com/articles/How_To/000001135 -CVE-2018-5766 - https://bugzilla.libav.org/show_bug.cgi?id=1112 -CVE-2018-5767 - https://www.exploit-db.com/exploits/44253/ -CVE-2018-5767 - https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/ -CVE-2018-5772 - https://github.com/Exiv2/exiv2/issues/216 -CVE-2018-5773 - https://github.com/trentm/python-markdown2/issues/285 -CVE-2018-5782 - https://github.com/twosevenzero/shoretel-mitel-rce -CVE-2018-5782 - https://www.exploit-db.com/exploits/46174/ -CVE-2018-5783 - https://bugzilla.redhat.com/show_bug.cgi?id=1536179 -CVE-2018-5783 - https://sourceforge.net/p/podofo/tickets/27/ -CVE-2018-5784 - http://bugzilla.maptools.org/show_bug.cgi?id=2772 -CVE-2018-5784 - https://usn.ubuntu.com/3606-1/ -CVE-2018-5785 - https://github.com/uclouvain/openjpeg/issues/1057 -CVE-2018-5786 - https://github.com/ckolivas/lrzip/issues/91 -CVE-2018-5787 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5788 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5789 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5790 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5791 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5792 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5793 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5794 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5795 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5796 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5797 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 -CVE-2018-5799 - http://seclists.org/fulldisclosure/2018/Mar/58 -CVE-2018-5803 - https://usn.ubuntu.com/3698-1/ -CVE-2018-5803 - https://usn.ubuntu.com/3698-2/ -CVE-2018-5803 - https://www.spinics.net/lists/netdev/msg482523.html -CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43 -CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11 -CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133 -CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102 -CVE-2018-5814 - https://usn.ubuntu.com/3696-1/ -CVE-2018-5837 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5838 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5839 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5866 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5867 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5868 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5869 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5870 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5871 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5874 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5875 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5876 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5877 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5878 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5879 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5880 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5881 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5882 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5884 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5885 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5891 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5892 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5894 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5912 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5913 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5914 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5915 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5916 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5917 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5918 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2018-5924 - https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/ -CVE-2018-5925 - https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/ -CVE-2018-5950 - http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html -CVE-2018-5951 - https://github.com/Nat-Lab/CVE-2018-5951 -CVE-2018-5954 - http://packetstormsecurity.com/files/146037/PHPFreeChat-1.7-Denial-Of-Service.html -CVE-2018-5954 - https://www.exploit-db.com/exploits/43852/ -CVE-2018-5955 - https://www.exploit-db.com/exploits/44356/ -CVE-2018-5956 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402414 -CVE-2018-5957 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C40242C -CVE-2018-5958 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402424 -CVE-2018-5960 - https://www.vulnerability-lab.com/get_content.php?id=2043 -CVE-2018-5961 - https://www.vulnerability-lab.com/get_content.php?id=1835 -CVE-2018-5962 - https://www.vulnerability-lab.com/get_content.php?id=1836 -CVE-2018-5963 - http://packetstormsecurity.com/files/146033/CMS-Made-Simple-2.2.5-Persistent-Cross-Site-Scripting.html -CVE-2018-5963 - http://seclists.org/fulldisclosure/2018/Jan/80 -CVE-2018-5964 - http://packetstormsecurity.com/files/146034/CMS-Made-Simple-2.2.5-moduleinterface.php-title-Cross-Site-Scripting.html -CVE-2018-5964 - http://seclists.org/fulldisclosure/2018/Jan/82 -CVE-2018-5965 - http://packetstormsecurity.com/files/146035/CMS-Made-Simple-2.2.5-moduleinterface.php-m1_errors-Cross-Site-Scripting.html -CVE-2018-5965 - http://seclists.org/fulldisclosure/2018/Jan/83 -CVE-2018-5967 - https://packetstormsecurity.com/files/145513/Netis-WF2419-HTML-Injection.html -CVE-2018-5968 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-5969 - https://www.exploit-db.com/exploits/43867/ -CVE-2018-5970 - https://exploit-db.com/exploits/44116 -CVE-2018-5971 - https://exploit-db.com/exploits/44122 -CVE-2018-5972 - https://www.exploit-db.com/exploits/43868/ -CVE-2018-5973 - http://packetstormsecurity.com/files/146071/Professional-Local-Directory-Script-1.0-SQL-Injection.html -CVE-2018-5973 - https://www.exploit-db.com/exploits/43870/ -CVE-2018-5974 - https://exploit-db.com/exploits/44126 -CVE-2018-5975 - https://exploit-db.com/exploits/44127 -CVE-2018-5976 - https://www.exploit-db.com/exploits/43862/ -CVE-2018-5977 - https://www.exploit-db.com/exploits/43861/ -CVE-2018-5978 - https://www.exploit-db.com/exploits/43865/ -CVE-2018-5979 - https://www.exploit-db.com/exploits/43864/ -CVE-2018-5980 - https://exploit-db.com/exploits/44128 -CVE-2018-5981 - https://exploit-db.com/exploits/44112 -CVE-2018-5982 - https://exploit-db.com/exploits/44105 -CVE-2018-5983 - https://exploit-db.com/exploits/44118 -CVE-2018-5984 - https://www.exploit-db.com/exploits/43866/ -CVE-2018-5985 - https://www.exploit-db.com/exploits/43860/ -CVE-2018-5986 - https://www.exploit-db.com/exploits/43863/ -CVE-2018-5987 - https://exploit-db.com/exploits/44131 -CVE-2018-5988 - https://www.exploit-db.com/exploits/43869/ -CVE-2018-5989 - https://exploit-db.com/exploits/44132 -CVE-2018-5990 - https://exploit-db.com/exploits/44107 -CVE-2018-5991 - https://exploit-db.com/exploits/44111 -CVE-2018-5992 - https://exploit-db.com/exploits/44129 -CVE-2018-5993 - https://exploit-db.com/exploits/44106 -CVE-2018-5994 - https://exploit-db.com/exploits/44120 -CVE-2018-5997 - https://www.exploit-db.com/exploits/43871/ -CVE-2018-5999 - https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt -CVE-2018-5999 - https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb -CVE-2018-5999 - https://www.exploit-db.com/exploits/43881/ -CVE-2018-5999 - https://www.exploit-db.com/exploits/44176/ -CVE-2018-6000 - https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt -CVE-2018-6000 - https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb -CVE-2018-6000 - https://www.exploit-db.com/exploits/43881/ -CVE-2018-6000 - https://www.exploit-db.com/exploits/44176/ -CVE-2018-6004 - https://exploit-db.com/exploits/44110 -CVE-2018-6005 - https://exploit-db.com/exploits/44125 -CVE-2018-6006 - https://exploit-db.com/exploits/44119 -CVE-2018-6007 - https://packetstormsecurity.com/files/146135/Joomla-JS-Support-Ticket-1.1.0-Cross-Site-Request-Forgery.html -CVE-2018-6007 - https://www.exploit-db.com/exploits/43912/ -CVE-2018-6008 - https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html -CVE-2018-6008 - https://www.exploit-db.com/exploits/43913/ -CVE-2018-6013 - https://github.com/bigtreecms/BigTree-CMS/issues/327 -CVE-2018-6014 - https://www.youtube.com/watch?v=t3nYuhAHOMg -CVE-2018-6015 - https://www.exploit-db.com/exploits/43872/ -CVE-2018-6017 - https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/ -CVE-2018-6018 - https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/ -CVE-2018-6022 - http://blackwolfsec.cc/2018/01/22/Nonecms/ -CVE-2018-6023 - http://packetstormsecurity.com/files/147571/Fastweb-FASTGate-0.00.47-Cross-Site-Request-Forgery.html -CVE-2018-6023 - https://www.exploit-db.com/exploits/44606/ -CVE-2018-6024 - http://packetstormsecurity.com/files/146454/Joomla-Project-Log-1.5.3-SQL-Injection.html -CVE-2018-6024 - https://www.exploit-db.com/exploits/44124/ -CVE-2018-6064 - https://www.exploit-db.com/exploits/44394/ -CVE-2018-6065 - https://www.exploit-db.com/exploits/44584/ -CVE-2018-6084 - https://www.exploit-db.com/exploits/44307/ -CVE-2018-6092 - https://www.exploit-db.com/exploits/44860/ -CVE-2018-6126 - https://www.exploit-db.com/exploits/45098/ -CVE-2018-6180 - http://packetstormsecurity.com/files/146254/Online-Voting-System-Authentication-Bypass.html -CVE-2018-6180 - https://www.exploit-db.com/exploits/43967/ -CVE-2018-6187 - https://bugs.ghostscript.com/show_bug.cgi?id=698908 -CVE-2018-6190 - https://packetstormsecurity.com/files/146032/Netis-WF2419-3.2.41381-Cross-Site-Scripting.html -CVE-2018-6190 - https://www.exploit-db.com/exploits/43981/ -CVE-2018-6191 - https://bugs.ghostscript.com/show_bug.cgi?id=698920 -CVE-2018-6191 - https://www.exploit-db.com/exploits/43903/ -CVE-2018-6192 - https://bugs.ghostscript.com/show_bug.cgi?id=698916 -CVE-2018-6193 - https://www.exploit-db.com/exploits/44216/ -CVE-2018-6194 - http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html -CVE-2018-6194 - http://seclists.org/fulldisclosure/2018/Jan/91 -CVE-2018-6194 - https://wpvulndb.com/vulnerabilities/9016 -CVE-2018-6195 - http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html -CVE-2018-6195 - http://seclists.org/fulldisclosure/2018/Jan/91 -CVE-2018-6195 - https://wpvulndb.com/vulnerabilities/9015 -CVE-2018-6200 - https://cxsecurity.com/issue/WLB-2018010251 -CVE-2018-6201 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020E0_0x830020E4 -CVE-2018-6202 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020F8 -CVE-2018-6203 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x8300210C -CVE-2018-6204 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/SDActMon -CVE-2018-6205 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x220009 -CVE-2018-6206 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x220011 -CVE-2018-6207 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_220019 -CVE-2018-6208 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x22000d -CVE-2018-6209 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxCryptMon -CVE-2018-6211 - https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html -CVE-2018-6211 - https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/ -CVE-2018-6212 - https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html -CVE-2018-6212 - https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/ -CVE-2018-6213 - https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html -CVE-2018-6213 - https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/ -CVE-2018-6217 - https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180122 -CVE-2018-6219 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6219 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6220 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6220 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6221 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6221 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6222 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6222 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6223 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6223 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6224 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6224 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6225 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6225 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6226 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6226 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6227 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6227 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6228 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6228 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6229 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6229 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6230 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -CVE-2018-6230 - https://www.exploit-db.com/exploits/44166/ -CVE-2018-6237 - https://www.tenable.com/security/research/tra-2018-10 -CVE-2018-6240 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2018-6241 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2018-6253 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0522 -CVE-2018-6260 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2018-6263 - https://support.lenovo.com/us/en/product_security/LEN-25444 -CVE-2018-6265 - https://support.lenovo.com/us/en/product_security/LEN-25444 -CVE-2018-6266 - https://support.lenovo.com/us/en/product_security/LEN-25444 -CVE-2018-6267 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2018-6268 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2018-6269 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2018-6288 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 -CVE-2018-6288 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities -CVE-2018-6289 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 -CVE-2018-6289 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities -CVE-2018-6290 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 -CVE-2018-6290 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities -CVE-2018-6291 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 -CVE-2018-6291 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities -CVE-2018-6306 - https://support.kaspersky.com/vulnerability.aspx?el=12430#120418 -CVE-2018-6307 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/ -CVE-2018-6311 - https://gist.github.com/DrmnSamoLiu/cd1d6fa59501f161616686296aa4a6c8 -CVE-2018-6312 - https://gist.github.com/DrmnSamoLiu/cd1d6fa59501f161616686296aa4a6c8 -CVE-2018-6315 - https://github.com/libming/libming/issues/101 -CVE-2018-6317 - https://medium.com/@res1n/claymore-dual-gpu-miner-10-5-format-strings-vulnerability-916ab3d2db30 -CVE-2018-6317 - https://www.exploit-db.com/exploits/43972/ -CVE-2018-6320 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 -CVE-2018-6323 - https://sourceware.org/bugzilla/show_bug.cgi?id=22746 -CVE-2018-6323 - https://www.exploit-db.com/exploits/44035/ -CVE-2018-6328 - https://www.exploit-db.com/exploits/44297/ -CVE-2018-6328 - https://www.exploit-db.com/exploits/45559/ -CVE-2018-6329 - https://www.exploit-db.com/exploits/44297/ -CVE-2018-6329 - https://www.exploit-db.com/exploits/45913/ -CVE-2018-6336 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -CVE-2018-6350 - https://www.facebook.com/security/advisories/cve-2018-6350/ -CVE-2018-6352 - https://bugzilla.redhat.com/show_bug.cgi?id=1539237 -CVE-2018-6353 - https://github.com/spesmilo/electrum/issues/3678 -CVE-2018-6353 - https://github.com/spesmilo/electrum/pull/3700 -CVE-2018-6356 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-6357 - http://lists.openwall.net/full-disclosure/2018/01/10/8 -CVE-2018-6358 - https://github.com/libming/libming/issues/104 -CVE-2018-6359 - https://github.com/libming/libming/issues/105 -CVE-2018-6361 - http://packetstormsecurity.com/files/147553/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Scripting-Add-FTP-Account.html -CVE-2018-6362 - http://packetstormsecurity.com/files/147554/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Scripting-Cookie-Theft.html -CVE-2018-6363 - https://packetstormsecurity.com/files/146131/Task-Rabbit-Clone-1.0-SQL-Injection.html -CVE-2018-6363 - https://www.exploit-db.com/exploits/43914/ -CVE-2018-6364 - https://packetstormsecurity.com/files/146130/Multilanguage-Real-Estate-MLM-Script-3.0-SQL-Injection.html -CVE-2018-6364 - https://www.exploit-db.com/exploits/43917/ -CVE-2018-6365 - https://packetstormsecurity.com/files/146128/TSiteBuilder-1.0-SQL-Injection.html -CVE-2018-6365 - https://www.exploit-db.com/exploits/43915/ -CVE-2018-6367 - https://packetstormsecurity.com/files/146136/Vastal-I-Tech-Facebook-Clone-2.9.9-SQL-Injection.html -CVE-2018-6367 - https://www.exploit-db.com/exploits/43918/ -CVE-2018-6368 - https://exploit-db.com/exploits/44117 -CVE-2018-6370 - https://exploit-db.com/exploits/44123 -CVE-2018-6372 - https://exploit-db.com/exploits/44115 -CVE-2018-6373 - https://exploit-db.com/exploits/44109 -CVE-2018-6374 - http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43620 -CVE-2018-6381 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-6381 -CVE-2018-6381 - https://github.com/gdraheim/zziplib/issues/12 -CVE-2018-6383 - http://packetstormsecurity.com/files/162968/Monstra-CMS-3.0.4-Remote-Code-Execution.html -CVE-2018-6389 - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html -CVE-2018-6389 - https://github.com/WazeHell/CVE-2018-6389 -CVE-2018-6389 - https://thehackernews.com/2018/02/wordpress-dos-exploit.html -CVE-2018-6389 - https://www.exploit-db.com/exploits/43968/ -CVE-2018-6390 - https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180129 -CVE-2018-6391 - https://0day.today/exploit/29659 -CVE-2018-6391 - https://packetstormsecurity.com/files/146117/netiswf2419-xsrf.txt -CVE-2018-6391 - https://www.exploit-db.com/exploits/43919/ -CVE-2018-6392 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/c6939f65a116b1ffed345d29d8621ee4ffb32235 -CVE-2018-6393 - http://code610.blogspot.com/2018/01/post-auth-sql-injection-in-freepbx.html -CVE-2018-6393 - https://github.com/c610/tmp/blob/master/sqlipoc-freepbx-14.0.1.24-req.txt -CVE-2018-6394 - https://exploit-db.com/exploits/44114 -CVE-2018-6395 - https://www.exploit-db.com/exploits/43933/ -CVE-2018-6396 - https://exploit-db.com/exploits/44113 -CVE-2018-6397 - https://www.exploit-db.com/exploits/43931/ -CVE-2018-6398 - https://www.exploit-db.com/exploits/43932/ -CVE-2018-6407 - https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/ -CVE-2018-6408 - https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/ -CVE-2018-6409 - https://metalamin.github.io/MachForm-not-0-day-EN/ -CVE-2018-6409 - https://www.exploit-db.com/exploits/44804/ -CVE-2018-6410 - https://metalamin.github.io/MachForm-not-0-day-EN/ -CVE-2018-6410 - https://www.exploit-db.com/exploits/44804/ -CVE-2018-6411 - https://metalamin.github.io/MachForm-not-0-day-EN/ -CVE-2018-6411 - https://www.exploit-db.com/exploits/44804/ -CVE-2018-6443 - http://packetstormsecurity.com/files/153035/Brocade-Network-Advisor-14.4.1-Unauthenticated-Remote-Code-Execution.html -CVE-2018-6458 - http://packetstormsecurity.com/files/147555/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Request-Forgery.html -CVE-2018-6460 - https://www.exploit-db.com/exploits/44042/ -CVE-2018-6461 - http://hyp3rlinx.altervista.org/advisories/CVS-SUITE-2009R2-INSECURE-LIBRARY-LOADING-CVE-2018-6461.txt -CVE-2018-6461 - http://packetstormsecurity.com/files/146267/WINCVS-2009R2-DLL-Hijacking.html -CVE-2018-6461 - http://seclists.org/fulldisclosure/2018/Feb/24 -CVE-2018-6465 - https://packetstormsecurity.com/files/146174/WordPress-Propertyhive-1.4.14-Cross-Site-Scripting.html -CVE-2018-6465 - https://wpvulndb.com/vulnerabilities/9020 -CVE-2018-6466 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss -CVE-2018-6467 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss -CVE-2018-6468 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss -CVE-2018-6469 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss -CVE-2018-6471 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402078 -CVE-2018-6472 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C40204c -CVE-2018-6473 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402080 -CVE-2018-6474 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402148 -CVE-2018-6475 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/getshell -CVE-2018-6476 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402114_9C402124_9C40207c -CVE-2018-6479 - https://github.com/dreadlocked/netwave-dosvulnerability -CVE-2018-6481 - http://packetstormsecurity.com/files/146541/Disk-Savvy-Enterprise-10.4.18-Buffer-Overflow.html -CVE-2018-6481 - https://www.exploit-db.com/exploits/44156/ -CVE-2018-6484 - https://github.com/gdraheim/zziplib/issues/14 -CVE-2018-6490 - https://www.tenable.com/security/research/tra-2018-05 -CVE-2018-6506 - https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/ -CVE-2018-6522 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKRgFtXp_0x220408 -CVE-2018-6523 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x22045c -CVE-2018-6524 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x220c20 -CVE-2018-6525 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x220458 -CVE-2018-6527 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto -CVE-2018-6528 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto -CVE-2018-6529 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto -CVE-2018-6530 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto -CVE-2018-6537 - https://www.exploit-db.com/exploits/43936/ -CVE-2018-6540 - https://github.com/gdraheim/zziplib/issues/15 -CVE-2018-6541 - https://github.com/gdraheim/zziplib/issues/16 -CVE-2018-6542 - https://github.com/gdraheim/zziplib/issues/17 -CVE-2018-6543 - https://sourceware.org/bugzilla/show_bug.cgi?id=22769 -CVE-2018-6544 - https://bugs.ghostscript.com/show_bug.cgi?id=698830 -CVE-2018-6544 - https://bugs.ghostscript.com/show_bug.cgi?id=698965 -CVE-2018-6546 - https://github.com/securifera/CVE-2018-6546-Exploit/ -CVE-2018-6546 - https://www.exploit-db.com/exploits/44476/ -CVE-2018-6546 - https://www.securifera.com/advisories/CVE-2018-6546/ -CVE-2018-6547 - https://www.securifera.com/advisories/CVE-2018-6547/ -CVE-2018-6554 - https://usn.ubuntu.com/3777-1/ -CVE-2018-6554 - https://usn.ubuntu.com/3777-3/ -CVE-2018-6555 - https://usn.ubuntu.com/3777-1/ -CVE-2018-6555 - https://usn.ubuntu.com/3777-3/ -CVE-2018-6559 - https://launchpad.net/bugs/1793458 -CVE-2018-6562 - http://packetstormsecurity.com/files/147637/Totemomail-Encryption-Gateway-6.0.0_Build_371-JSONP-Hijacking.html -CVE-2018-6562 - https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-002_totemo_json_hijacking.txt -CVE-2018-6563 - http://packetstormsecurity.com/files/147648/Totemomail-Encryption-Gateway-6.0.0_Build_371-Cross-Site-Request-Forgery.html -CVE-2018-6563 - https://www.exploit-db.com/exploits/44631/ -CVE-2018-6574 - https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574 -CVE-2018-6575 - https://www.exploit-db.com/exploits/43957 -CVE-2018-6576 - https://www.exploit-db.com/exploits/43949 -CVE-2018-6577 - https://www.exploit-db.com/exploits/43940 -CVE-2018-6578 - https://www.exploit-db.com/exploits/43948 -CVE-2018-6579 - https://www.exploit-db.com/exploits/43950 -CVE-2018-6580 - https://www.exploit-db.com/exploits/43958 -CVE-2018-6581 - https://www.exploit-db.com/exploits/43959 -CVE-2018-6582 - https://www.exploit-db.com/exploits/43976/ -CVE-2018-6583 - https://exploit-db.com/exploits/44130 -CVE-2018-6584 - https://exploit-db.com/exploits/44108 -CVE-2018-6585 - https://exploit-db.com/exploits/44121 -CVE-2018-6593 - https://www.exploit-db.com/exploits/43973/ -CVE-2018-6594 - https://github.com/dlitz/pycrypto/issues/253 -CVE-2018-6596 - https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5 -CVE-2018-6604 - https://www.exploit-db.com/exploits/43975/ -CVE-2018-6605 - https://www.exploit-db.com/exploits/43974/ -CVE-2018-6606 - https://www.exploit-db.com/exploits/43987/ -CVE-2018-6608 - https://docs.google.com/spreadsheets/d/1Nm7mxfFvmdn-3Az-BtE5O0BIdbJiIAWUnkoAF_v_0ug/edit?usp=sharing -CVE-2018-6608 - https://voidsec.com/vpn-leak/ -CVE-2018-6608 - https://www.bleepingcomputer.com/news/security/many-vpn-providers-leak-customers-ip-address-via-webrtc-bug/ -CVE-2018-6609 - https://www.exploit-db.com/exploits/43978 -CVE-2018-6610 - https://www.exploit-db.com/exploits/43977 -CVE-2018-6612 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272 -CVE-2018-6616 - https://github.com/uclouvain/openjpeg/issues/1059 -CVE-2018-6616 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-6617 - http://packetstormsecurity.com/files/147558/Easy-Hosting-Control-Panel-0.37.12.b-Unverified-Password-Change.html -CVE-2018-6618 - http://packetstormsecurity.com/files/147557/Easy-Hosting-Control-Panel-0.37.12.b-Clear-Text-Password-Storage.html -CVE-2018-6619 - http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-INSECURE-CRYPTO.txt -CVE-2018-6619 - http://packetstormsecurity.com/files/147556/Easy-Hosting-Control-Panel-0.37.12.b-Insecure-Cryptography.html -CVE-2018-6621 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/118e1b0b3370dd1c0da442901b486689efd1654b -CVE-2018-6621 - https://github.com/FFmpeg/FFmpeg/commit/22aa37c0fedf14531783189a197542a055959b6c -CVE-2018-6625 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/WatchDog_AntiMalware_POC/tree/master/0x80002010 -CVE-2018-6626 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000035 -CVE-2018-6627 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/WatchDog_AntiMalware_POC/tree/master/0x80002054 -CVE-2018-6628 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000010c -CVE-2018-6629 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000118 -CVE-2018-6630 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000014c -CVE-2018-6631 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110009/0x80000170 -CVE-2018-6632 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000110 -CVE-2018-6633 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000038 -CVE-2018-6635 - https://downloads.avaya.com/css/P8/documents/101038598 -CVE-2018-6651 - https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7 -CVE-2018-6656 - https://github.com/zblogcn/zblogphp/issues/175 -CVE-2018-6659 - https://kc.mcafee.com/corporate/index?page=content&id=SB10228 -CVE-2018-6660 - https://kc.mcafee.com/corporate/index?page=content&id=SB10228 -CVE-2018-6664 - https://kc.mcafee.com/corporate/index?page=content&id=SB10237 -CVE-2018-6671 - https://kc.mcafee.com/corporate/index?page=content&id=SB10240 -CVE-2018-6671 - https://www.exploit-db.com/exploits/46518/ -CVE-2018-6672 - https://kc.mcafee.com/corporate/index?page=content&id=SB10240 -CVE-2018-6674 - https://kc.mcafee.com/corporate/index?page=content&id=SB10237 -CVE-2018-6686 - https://kc.mcafee.com/corporate/index?page=content&id=SB10242 -CVE-2018-6693 - https://kc.mcafee.com/corporate/index?page=content&id=SB10248 -CVE-2018-6700 - https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102846 -CVE-2018-6703 - https://kc.mcafee.com/corporate/index?page=content&id=SB10258 -CVE-2018-6755 - https://www.exploit-db.com/exploits/45961/ -CVE-2018-6756 - https://www.exploit-db.com/exploits/45961/ -CVE-2018-6757 - https://www.exploit-db.com/exploits/45961/ -CVE-2018-6759 - https://sourceware.org/bugzilla/show_bug.cgi?id=22794 -CVE-2018-6767 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-6767 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276 -CVE-2018-6767 - https://github.com/dbry/WavPack/issues/27 -CVE-2018-6768 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008090 -CVE-2018-6769 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008020 -CVE-2018-6770 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008210 -CVE-2018-6771 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008224 -CVE-2018-6772 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008208 -CVE-2018-6773 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008084 -CVE-2018-6774 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008088 -CVE-2018-6775 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_990081C8 -CVE-2018-6776 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00813C -CVE-2018-6777 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_220400 -CVE-2018-6778 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008268 -CVE-2018-6779 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008240 -CVE-2018-6780 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A0081E4 -CVE-2018-6781 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008264 -CVE-2018-6782 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A0081DC -CVE-2018-6783 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00825C -CVE-2018-6784 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00824C -CVE-2018-6785 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008254 -CVE-2018-6786 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_220840 -CVE-2018-6787 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_221808 -CVE-2018-6788 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_2208C0 -CVE-2018-6789 - http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html -CVE-2018-6789 - https://www.exploit-db.com/exploits/44571/ -CVE-2018-6789 - https://www.exploit-db.com/exploits/45671/ -CVE-2018-6792 - https://www.tarlogic.com/advisories/Tarlogic-2018-001.txt -CVE-2018-6794 - https://www.exploit-db.com/exploits/44247/ -CVE-2018-6797 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-6798 - https://hackerone.com/reports/480778 -CVE-2018-6798 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-6829 - https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki -CVE-2018-6829 - https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html -CVE-2018-6829 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-6830 - https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ -CVE-2018-6831 - https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ -CVE-2018-6832 - https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ -CVE-2018-6834 - https://github.com/ether/etherpad-lite/releases/tag/1.6.3 -CVE-2018-6835 - https://github.com/ether/etherpad-lite/releases/tag/1.6.3 -CVE-2018-6836 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397 -CVE-2018-6844 - https://websecnerd.blogspot.com/2018/02/mybb-forum-1.html -CVE-2018-6845 - https://www.exploit-db.com/exploits/44016 -CVE-2018-6846 - https://github.com/zblogcn/zblogphp/issues/176 -CVE-2018-6849 - https://voidsec.com/vpn-leak/ -CVE-2018-6849 - https://www.exploit-db.com/exploits/44403/ -CVE-2018-6851 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6851 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6852 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6852 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6853 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6853 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6854 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6854 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6855 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6855 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6856 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6856 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6857 - http://seclists.org/fulldisclosure/2018/Jul/20 -CVE-2018-6857 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -CVE-2018-6858 - https://www.exploit-db.com/exploits/44010 -CVE-2018-6859 - https://www.exploit-db.com/exploits/44185/ -CVE-2018-6860 - https://www.exploit-db.com/exploits/44011 -CVE-2018-6861 - https://www.exploit-db.com/exploits/44012 -CVE-2018-6862 - https://www.exploit-db.com/exploits/44013 -CVE-2018-6863 - https://www.exploit-db.com/exploits/44014 -CVE-2018-6864 - https://www.exploit-db.com/exploits/44015 -CVE-2018-6869 - https://github.com/gdraheim/zziplib/issues/22 -CVE-2018-6871 - https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure -CVE-2018-6871 - https://www.exploit-db.com/exploits/44022/ -CVE-2018-6876 - https://github.com/ImageMagick/ImageMagick/issues/973 -CVE-2018-6878 - https://www.exploit-db.com/exploits/43991/ -CVE-2018-6880 - https://kongxin.gitbook.io/empirecms/ -CVE-2018-6881 - https://kongxin.gitbook.io/dedecms-5-7-bug/ -CVE-2018-6881 - https://kongxin.gitbook.io/empirecms/ -CVE-2018-6882 - https://www.securify.nl/advisory/SFY20180101/cross-site-scripting-vulnerability-in-zimbra-collaboration-suite-due-to-the-way-it-handles-attachment-links.html -CVE-2018-6883 - https://github.com/Piwigo/Piwigo/issues/839 -CVE-2018-6883 - https://pastebin.com/tPebQFy4 -CVE-2018-6888 - https://www.exploit-db.com/exploits/44029/ -CVE-2018-6889 - https://www.exploit-db.com/exploits/44028/ -CVE-2018-6890 - https://github.com/pradeepjairamani/WolfCMS-XSS-POC -CVE-2018-6890 - https://github.com/pradeepjairamani/WolfCMS-XSS-POC/blob/master/Wolfcms%20v0.8.3.1%20xss%20POC%20by%20Pradeep%20Jairamani.pdf -CVE-2018-6891 - https://www.gubello.me/blog/bookly-blind-stored-xss/ -CVE-2018-6892 - http://hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txt -CVE-2018-6892 - http://packetstormsecurity.com/files/157407/CloudMe-1.11.2-Buffer-Overflow.html -CVE-2018-6892 - http://packetstormsecurity.com/files/158716/CloudMe-1.11.2-SEH-Buffer-Overflow.html -CVE-2018-6892 - http://packetstormsecurity.com/files/159327/CloudMe-1.11.2-Buffer-Overflow.html -CVE-2018-6892 - https://www.exploit-db.com/exploits/44027/ -CVE-2018-6892 - https://www.exploit-db.com/exploits/44175/ -CVE-2018-6892 - https://www.exploit-db.com/exploits/45197/ -CVE-2018-6892 - https://www.exploit-db.com/exploits/46250/ -CVE-2018-6892 - https://www.exploit-db.com/exploits/48840 -CVE-2018-6905 - https://github.com/pradeepjairamani/TYPO3-XSS-POC -CVE-2018-6910 - https://kongxin.gitbook.io/dedecms-5-7-bug/ -CVE-2018-6911 - https://www.exploit-db.com/exploits/44031/ -CVE-2018-6913 - https://hackerone.com/reports/354650 -CVE-2018-6913 - https://rt.perl.org/Public/Bug/Display.html?id=131844 -CVE-2018-6913 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-6914 - https://hackerone.com/reports/302298 -CVE-2018-6922 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-6927 - https://usn.ubuntu.com/3698-1/ -CVE-2018-6927 - https://usn.ubuntu.com/3698-2/ -CVE-2018-6928 - https://www.exploit-db.com/exploits/44030/ -CVE-2018-6936 - https://www.exploit-db.com/exploits/44219/ -CVE-2018-6940 - http://hyp3rlinx.altervista.org/advisories/NAT32-REMOTE-COMMAND-EXECUTION-CVE-2018-6940.txt -CVE-2018-6940 - http://packetstormsecurity.com/files/146373/NAT32-Build-22284-Remote-Command-Execution.html -CVE-2018-6940 - https://www.exploit-db.com/exploits/44033/ -CVE-2018-6941 - http://hyp3rlinx.altervista.org/advisories/NAT32-REMOTE-COMMAND-EXECUTION-CSRF-CVE-2018-6941.txt -CVE-2018-6941 - http://packetstormsecurity.com/files/146402/NAT32-Build-22284-Remote-Command-Execution-CSRF.html -CVE-2018-6941 - https://www.exploit-db.com/exploits/44034/ -CVE-2018-6942 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-6943 - https://packetstormsecurity.com/files/146403/WordPress-UltimateMember-2.0-Cross-Site-Scripting.html -CVE-2018-6943 - https://wpvulndb.com/vulnerabilities/9705 -CVE-2018-6944 - https://packetstormsecurity.com/files/146403/WordPress-UltimateMember-2.0-Cross-Site-Scripting.html -CVE-2018-6944 - https://wpvulndb.com/vulnerabilities/9705 -CVE-2018-6947 - https://www.exploit-db.com/exploits/44167/ -CVE-2018-6947 - https://www.exploit-db.com/exploits/44168/ -CVE-2018-6954 - https://github.com/systemd/systemd/issues/7986 -CVE-2018-6961 - https://www.exploit-db.com/exploits/44959/ -CVE-2018-6975 - https://www.vmware.com/security/advisories/VMSA-2018-0023.html -CVE-2018-6976 - https://www.vmware.com/security/advisories/VMSA-2018-0023.html -CVE-2018-7032 - https://bugs.debian.org/840014 -CVE-2018-7072 - https://www.tenable.com/security/research/tra-2018-15 -CVE-2018-7073 - https://www.tenable.com/security/research/tra-2018-15 -CVE-2018-7077 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03860en_us -CVE-2018-7081 - https://x-c3ll.github.io/posts/CVE-2018-7081-RCE-ArubaOS/ -CVE-2018-7117 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us -CVE-2018-7119 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03910en_us -CVE-2018-7121 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2018-7122 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2018-7123 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2018-7124 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2018-7125 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2018-7160 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-7170 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html -CVE-2018-7171 - http://packetstormsecurity.com/files/146938/TwonkyMedia-Server-7.0.11-8.5-Directory-Traversal.html -CVE-2018-7171 - https://www.exploit-db.com/exploits/44350/ -CVE-2018-7172 - http://foreversong.cn/archives/1070 -CVE-2018-7175 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 -CVE-2018-7176 - https://www.exploit-db.com/exploits/44137/ -CVE-2018-7177 - https://www.exploit-db.com/exploits/44134 -CVE-2018-7178 - https://www.exploit-db.com/exploits/44136 -CVE-2018-7179 - https://www.exploit-db.com/exploits/44135 -CVE-2018-7180 - https://www.exploit-db.com/exploits/44133 -CVE-2018-7182 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html -CVE-2018-7182 - https://www.exploit-db.com/exploits/45846/ -CVE-2018-7183 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2018-7184 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html -CVE-2018-7185 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html -CVE-2018-7185 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-7187 - https://github.com/golang/go/issues/23867 -CVE-2018-7198 - https://www.exploit-db.com/exploits/44144/ -CVE-2018-7203 - http://packetstormsecurity.com/files/146939/TwonkyMedia-Server-7.0.11-8.5-Cross-Site-Scripting.html -CVE-2018-7203 - https://www.exploit-db.com/exploits/44351/ -CVE-2018-7204 - https://wpvulndb.com/vulnerabilities/9036 -CVE-2018-7209 - https://membership.backbox.org/idashboards-9-6b-multiple-vulnerabilities/ -CVE-2018-7210 - https://membership.backbox.org/idashboards-9-6b-multiple-vulnerabilities/ -CVE-2018-7211 - https://membership.backbox.org/idashboards-9-6b-multiple-vulnerabilities/ -CVE-2018-7212 - https://github.com/sinatra/sinatra/pull/1379 -CVE-2018-7213 - http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html -CVE-2018-7213 - http://seclists.org/fulldisclosure/2019/Mar/33 -CVE-2018-7216 - http://seclists.org/fulldisclosure/2018/Feb/44 -CVE-2018-7216 - https://packetstormsecurity.com/files/146409/Tejari-Cross-Site-Request-Forgery.html -CVE-2018-7216 - https://www.exploit-db.com/exploits/44256/ -CVE-2018-7217 - https://packetstormsecurity.com/files/146425/Tejari-Arbitrary-File-Upload.html -CVE-2018-7219 - http://foreversong.cn/archives/1081 -CVE-2018-7248 - https://medium.com/@esterling_/cve-2018-7248-enumerating-active-directory-users-via-unauthenticated-manageengine-servicedesk-a1eda2942eb0 -CVE-2018-7249 - https://github.com/Elvin9/NotSecDrv/blob/master/README.md -CVE-2018-7250 - https://github.com/Elvin9/SecDrvPoolLeak/blob/master/README.md -CVE-2018-7251 - http://packetstormsecurity.com/files/154723/Anchor-CMS-0.12.3a-Information-Disclosure.html -CVE-2018-7251 - http://www.andmp.com/2018/02/advisory-assigned-CVE-2018-7251-in-anchorcms.html -CVE-2018-7253 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-7253 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559 -CVE-2018-7253 - https://github.com/dbry/WavPack/issues/28 -CVE-2018-7254 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -CVE-2018-7254 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274 -CVE-2018-7254 - https://github.com/dbry/WavPack/issues/26 -CVE-2018-7254 - https://www.exploit-db.com/exploits/44154/ -CVE-2018-7259 - https://medium.com/@lukegorman97/flightsimlabs-alleged-malware-analysis-1427c4d23368 -CVE-2018-7264 - https://www.exploit-db.com/exploits/44251/ -CVE-2018-7268 - http://packetstormsecurity.com/files/147687/MagniComp-SysInfo-Information-Exposure.html -CVE-2018-7273 - https://www.exploit-db.com/exploits/44325/ -CVE-2018-7284 - https://www.exploit-db.com/exploits/44184/ -CVE-2018-7286 - https://www.exploit-db.com/exploits/44181/ -CVE-2018-7289 - https://www.exploit-db.com/exploits/44169/ -CVE-2018-7297 - http://atomic111.github.io/article/homematic-ccu2-remote-code-execution -CVE-2018-7297 - https://www.exploit-db.com/exploits/44368/ -CVE-2018-7300 - http://atomic111.github.io/article/homematic-ccu2-filewrite -CVE-2018-7300 - https://www.exploit-db.com/exploits/44361/ -CVE-2018-7302 - https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html -CVE-2018-7303 - https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html -CVE-2018-7304 - https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html -CVE-2018-7305 - https://websecnerd.blogspot.in/2018/02/mybb-forum-1_21.html -CVE-2018-7308 - http://www.andmp.com/2018/02/advisory-assigned-cve-2018-7308-csrf.html -CVE-2018-7312 - https://exploit-db.com/exploits/44162 -CVE-2018-7313 - https://www.exploit-db.com/exploits/44158/ -CVE-2018-7314 - https://exploit-db.com/exploits/44160 -CVE-2018-7315 - https://exploit-db.com/exploits/44161 -CVE-2018-7316 - https://exploit-db.com/exploits/44164 -CVE-2018-7317 - https://exploit-db.com/exploits/44159 -CVE-2018-7318 - https://exploit-db.com/exploits/44163 -CVE-2018-7318 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-7319 - https://exploit-db.com/exploits/44165 -CVE-2018-7340 - https://www.kb.cert.org/vuls/id/475445 -CVE-2018-7355 - https://www.exploit-db.com/exploits/46102/ -CVE-2018-7357 - https://www.exploit-db.com/exploits/45972/ -CVE-2018-7358 - https://www.exploit-db.com/exploits/45972/ -CVE-2018-7364 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-34f2-7h57-rg7p -CVE-2018-7408 - https://github.com/npm/npm/issues/19883 -CVE-2018-7409 - http://www.unixodbc.org/unixODBC-2.3.5.tar.gz -CVE-2018-7422 - http://seclists.org/fulldisclosure/2018/Mar/40 -CVE-2018-7422 - https://wpvulndb.com/vulnerabilities/9044 -CVE-2018-7422 - https://www.exploit-db.com/exploits/44340/ -CVE-2018-7434 - https://kongxin.gitbook.io/zzcms-8-2-bug/ -CVE-2018-7435 - https://bugzilla.redhat.com/show_bug.cgi?id=1547879 -CVE-2018-7435 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE -CVE-2018-7436 - https://bugzilla.redhat.com/show_bug.cgi?id=1547883 -CVE-2018-7436 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE -CVE-2018-7437 - https://bugzilla.redhat.com/show_bug.cgi?id=1547885 -CVE-2018-7437 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE -CVE-2018-7438 - https://bugzilla.redhat.com/show_bug.cgi?id=1547889 -CVE-2018-7438 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE -CVE-2018-7439 - https://bugzilla.redhat.com/show_bug.cgi?id=1547892 -CVE-2018-7439 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE -CVE-2018-7445 - http://seclists.org/fulldisclosure/2018/Mar/38 -CVE-2018-7445 - https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow -CVE-2018-7445 - https://www.exploit-db.com/exploits/44290/ -CVE-2018-7448 - https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html -CVE-2018-7448 - https://www.exploit-db.com/exploits/44192/ -CVE-2018-7449 - http://hyp3rlinx.altervista.org/advisories/SEGGER-embOS-FTP-SERVER-v3.22-FTP-COMMANDS-DENIAL-OF-SERVICE.txt -CVE-2018-7449 - https://www.exploit-db.com/exploits/44221/ -CVE-2018-7452 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 -CVE-2018-7454 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 -CVE-2018-7456 - http://bugzilla.maptools.org/show_bug.cgi?id=2778 -CVE-2018-7456 - https://github.com/xiaoqx/pocs/tree/master/libtiff -CVE-2018-7465 - https://www.exploit-db.com/exploits/44625/ -CVE-2018-7466 - https://www.exploit-db.com/exploits/44226/ -CVE-2018-7466 - https://www.exploit-db.com/exploits/44349/ -CVE-2018-7469 - https://neetech18.blogspot.in/2018/02/stored-xss-vulnerability-in-php-scripts.html -CVE-2018-7470 - https://github.com/ImageMagick/ImageMagick/issues/998 -CVE-2018-7474 - http://seclists.org/fulldisclosure/2018/Mar/34 -CVE-2018-7474 - https://www.exploit-db.com/exploits/44277/ -CVE-2018-7475 - https://0xd0ff9.wordpress.com/2018/06/21/cve-2018-7475/ -CVE-2018-7476 - https://www.from0to1.me/index.php/archives/22/ -CVE-2018-7477 - https://exploit-db.com/exploits/44191 -CVE-2018-7479 - https://kongxin.gitbook.io/yzmcms-3-6-bug/ -CVE-2018-7487 - https://github.com/pts/sam2p/issues/18 -CVE-2018-7489 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-7489 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-7489 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-7489 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-7490 - https://www.exploit-db.com/exploits/44223/ -CVE-2018-7502 - https://srcincite.io/advisories/src-2018-0007/ -CVE-2018-7538 - http://seclists.org/fulldisclosure/2018/Mar/20 -CVE-2018-7538 - https://www.exploit-db.com/exploits/44286/ -CVE-2018-7543 - https://www.exploit-db.com/exploits/44288/ -CVE-2018-7544 - http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html -CVE-2018-7550 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f49v-45qp-cv53 -CVE-2018-7551 - https://github.com/pts/sam2p/issues/28 -CVE-2018-7552 - https://github.com/pts/sam2p/issues/30 -CVE-2018-7553 - https://github.com/pts/sam2p/issues/32 -CVE-2018-7554 - https://github.com/pts/sam2p/issues/29 -CVE-2018-7557 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/7414d0bda7763f9bd69c26c068e482ab297c1c96 -CVE-2018-7557 - https://github.com/FFmpeg/FFmpeg/commit/e724bd1dd9efea3abb8586d6644ec07694afceae -CVE-2018-7561 - https://github.com/VulDetailsPublication/Poc/tree/master/Tenda/AC9 -CVE-2018-7562 - https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ -CVE-2018-7563 - https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ -CVE-2018-7566 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-7566 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-7567 - https://0day.today/exploit/29938 -CVE-2018-7568 - https://sourceware.org/bugzilla/show_bug.cgi?id=22894 -CVE-2018-7569 - https://sourceware.org/bugzilla/show_bug.cgi?id=22895 -CVE-2018-7573 - https://www.exploit-db.com/exploits/44596/ -CVE-2018-7573 - https://www.exploit-db.com/exploits/44968/ -CVE-2018-7580 - http://packetstormsecurity.com/files/160724/Philips-Hue-Denial-Of-Service.html -CVE-2018-7580 - http://seclists.org/fulldisclosure/2020/Dec/51 -CVE-2018-7580 - https://www.iliashn.com/CVE-2018-7580/ -CVE-2018-7581 - http://hyp3rlinx.altervista.org/advisories/WEBLOG-EXPERT-WEB-SERVER-ENTERPRISE-v9.4-AUTHENTICATION-BYPASS.txt -CVE-2018-7581 - http://packetstormsecurity.com/files/146697/WebLog-Expert-Web-Server-Enterprise-9.4-Weak-Permissions.html -CVE-2018-7581 - https://www.exploit-db.com/exploits/44270/ -CVE-2018-7582 - http://hyp3rlinx.altervista.org/advisories/WEBLOG-EXPERT-WEB-SERVER-ENTERPRISE-v9.4-DENIAL-OF-SERVICE.txt -CVE-2018-7582 - http://packetstormsecurity.com/files/146698/WebLog-Expert-Web-Server-Enterprise-9.4-Denial-Of-Service.html -CVE-2018-7582 - https://www.exploit-db.com/exploits/44271/ -CVE-2018-7583 - https://www.exploit-db.com/exploits/44222/ -CVE-2018-7584 - https://bugs.php.net/bug.php?id=75981 -CVE-2018-7584 - https://hackerone.com/reports/320222 -CVE-2018-7584 - https://www.exploit-db.com/exploits/44846/ -CVE-2018-7584 - https://www.tenable.com/security/tns-2018-03 -CVE-2018-7586 - https://wpvulndb.com/vulnerabilities/9033 -CVE-2018-7589 - https://github.com/dtschump/CImg/issues/184 -CVE-2018-7600 - https://blog.appsecco.com/remote-code-execution-with-drupal-core-sa-core-2018-002-95e6ecc0c714 -CVE-2018-7600 - https://github.com/a2u/CVE-2018-7600 -CVE-2018-7600 - https://github.com/g0rx/CVE-2018-7600-Drupal-RCE -CVE-2018-7600 - https://greysec.net/showthread.php?tid=2912&pid=10561 -CVE-2018-7600 - https://groups.drupal.org/security/faq-2018-002 -CVE-2018-7600 - https://research.checkpoint.com/uncovering-drupalgeddon-2/ -CVE-2018-7600 - https://www.exploit-db.com/exploits/44448/ -CVE-2018-7600 - https://www.exploit-db.com/exploits/44449/ -CVE-2018-7600 - https://www.exploit-db.com/exploits/44482/ -CVE-2018-7600 - https://www.tenable.com/blog/critical-drupal-core-vulnerability-what-you-need-to-know -CVE-2018-7602 - https://www.exploit-db.com/exploits/44542/ -CVE-2018-7602 - https://www.exploit-db.com/exploits/44557/ -CVE-2018-7634 - https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/ -CVE-2018-7642 - https://sourceware.org/bugzilla/show_bug.cgi?id=22887 -CVE-2018-7643 - https://sourceware.org/bugzilla/show_bug.cgi?id=22905 -CVE-2018-7650 - https://neetech18.blogspot.in/2018/03/stored-xss-vulnerability-in-hot-scripts.html -CVE-2018-7653 - https://packetstormsecurity.com/files/147065/YzmCMS-3.6-Cross-Site-Scripting.html -CVE-2018-7653 - https://www.exploit-db.com/exploits/44405/ -CVE-2018-7654 - https://medium.com/stolabs/path-traversal-in-3cx-7421a8ffdb7a -CVE-2018-7658 - http://packetstormsecurity.com/files/146645/Softros-Network-Time-System-Server-2.3.4-Denial-Of-Service.html -CVE-2018-7658 - https://www.exploit-db.com/exploits/44255/ -CVE-2018-7659 - https://vipinxsec.blogspot.com/2018/04/stored-xss-in-documentum-d2-steps-to.html -CVE-2018-7660 - https://vipinxsec.blogspot.com/2018/04/reflected-xss-in-documentum-d2.html -CVE-2018-7661 - https://blog.manchestergreyhats.co.uk/2018/02/25/eavesdropping-on-wifi-baby-monitor/ -CVE-2018-7661 - https://www.exploit-db.com/exploits/442322/ -CVE-2018-7664 - http://lists.openwall.net/full-disclosure/2018/02/27/1 -CVE-2018-7665 - http://lists.openwall.net/full-disclosure/2018/02/27/1 -CVE-2018-7666 - http://lists.openwall.net/full-disclosure/2018/02/27/1 -CVE-2018-7667 - http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt -CVE-2018-7668 - http://lists.openwall.net/full-disclosure/2018/02/28/1 -CVE-2018-7669 - https://www.exploit-db.com/exploits/45152/ -CVE-2018-7690 - https://www.exploit-db.com/exploits/45989/ -CVE-2018-7691 - https://www.exploit-db.com/exploits/45990/ -CVE-2018-7700 - https://laworigin.github.io/2018/03/07/CVE-2018-7700-dedecms%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C/ -CVE-2018-7701 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7701 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7702 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7702 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7703 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7703 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7704 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7704 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7705 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7705 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7706 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7706 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7707 - http://seclists.org/fulldisclosure/2018/Mar/29 -CVE-2018-7707 - https://www.exploit-db.com/exploits/44285/ -CVE-2018-7719 - https://www.exploit-db.com/exploits/44345/ -CVE-2018-7720 - https://github.com/Kyhvedn/CVE_Description/blob/master/CVE-2018-7720_Description.md -CVE-2018-7725 - https://github.com/gdraheim/zziplib/issues/39 -CVE-2018-7726 - https://github.com/gdraheim/zziplib/issues/41 -CVE-2018-7727 - https://github.com/gdraheim/zziplib/issues/40 -CVE-2018-7728 - https://bugs.freedesktop.org/show_bug.cgi?id=105205 -CVE-2018-7729 - https://bugs.freedesktop.org/show_bug.cgi?id=105206 -CVE-2018-7730 - https://bugs.freedesktop.org/show_bug.cgi?id=105204 -CVE-2018-7731 - https://bugs.freedesktop.org/show_bug.cgi?id=105247 -CVE-2018-7736 - https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md -CVE-2018-7736 - https://packetstormsecurity.com/files/147066/Z-Blog-1.5.1.1740-Cross-Site-Scripting.html -CVE-2018-7736 - https://www.exploit-db.com/exploits/44406/ -CVE-2018-7737 - https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md#web-site-physical-path-leakage -CVE-2018-7737 - https://packetstormsecurity.com/files/147063/Z-Blog-1.5.1.1740-Full-Path-Disclosure.html -CVE-2018-7737 - https://www.exploit-db.com/exploits/44407/ -CVE-2018-7739 - http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html -CVE-2018-7739 - https://www.exploit-db.com/exploits/44220/ -CVE-2018-7739 - https://www.exploit-db.com/exploits/44262/ -CVE-2018-7745 - https://www.exploit-db.com/exploits/44419/ -CVE-2018-7746 - https://www.exploit-db.com/exploits/44416/ -CVE-2018-7747 - http://packetstormsecurity.com/files/147257/WordPress-Caldera-Forms-1.5.9.1-Cross-Site-Scripting.html -CVE-2018-7747 - https://www.exploit-db.com/exploits/44489/ -CVE-2018-7750 - https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst -CVE-2018-7750 - https://www.exploit-db.com/exploits/45712/ -CVE-2018-7751 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/a6cba062051f345e8ebfdff34aba071ed73d923f -CVE-2018-7752 - https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 -CVE-2018-7752 - https://github.com/gpac/gpac/issues/997 -CVE-2018-7755 - https://usn.ubuntu.com/3696-1/ -CVE-2018-7755 - https://usn.ubuntu.com/3698-1/ -CVE-2018-7755 - https://usn.ubuntu.com/3698-2/ -CVE-2018-7756 - http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt -CVE-2018-7756 - https://www.exploit-db.com/exploits/44275/ -CVE-2018-7757 - https://usn.ubuntu.com/3698-1/ -CVE-2018-7757 - https://usn.ubuntu.com/3698-2/ -CVE-2018-7765 - http://seclists.org/fulldisclosure/2019/May/26 -CVE-2018-7777 - http://packetstormsecurity.com/files/156184/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html -CVE-2018-7801 - http://seclists.org/fulldisclosure/2021/Jul/32 -CVE-2018-7806 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes -CVE-2018-7807 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-7809 - https://www.tenable.com/security/research/tra-2018-38 -CVE-2018-7810 - https://www.tenable.com/security/research/tra-2018-38 -CVE-2018-7811 - https://www.tenable.com/security/research/tra-2018-38 -CVE-2018-7812 - https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems/CVE-2018-7812 -CVE-2018-7816 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ -CVE-2018-7825 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ -CVE-2018-7826 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ -CVE-2018-7827 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ -CVE-2018-7828 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ -CVE-2018-7829 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ -CVE-2018-7830 - https://www.tenable.com/security/research/tra-2018-38 -CVE-2018-7831 - https://www.tenable.com/security/research/tra-2018-38 -CVE-2018-7841 - http://packetstormsecurity.com/files/152862/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html -CVE-2018-7841 - http://seclists.org/fulldisclosure/2019/May/26 -CVE-2018-7842 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0741 -CVE-2018-7843 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0738 -CVE-2018-7844 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0739 -CVE-2018-7845 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0745 -CVE-2018-7846 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0735 -CVE-2018-7848 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0740 -CVE-2018-7849 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0737 -CVE-2018-7852 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0763 -CVE-2018-7853 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0764 -CVE-2018-7854 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0765 -CVE-2018-7855 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0766 -CVE-2018-7855 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0767 -CVE-2018-7856 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0767 -CVE-2018-7857 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0768 -CVE-2018-7866 - https://github.com/libming/libming/issues/118 -CVE-2018-7867 - https://github.com/libming/libming/issues/116 -CVE-2018-7868 - https://github.com/libming/libming/issues/113 -CVE-2018-7869 - https://github.com/libming/libming/issues/119 -CVE-2018-7870 - https://github.com/libming/libming/issues/117 -CVE-2018-7871 - https://github.com/libming/libming/issues/120 -CVE-2018-7872 - https://github.com/libming/libming/issues/114 -CVE-2018-7873 - https://github.com/libming/libming/issues/111 -CVE-2018-7874 - https://github.com/libming/libming/issues/115 -CVE-2018-7875 - https://github.com/libming/libming/issues/112 -CVE-2018-7876 - https://github.com/libming/libming/issues/109 -CVE-2018-7877 - https://github.com/libming/libming/issues/110 -CVE-2018-7884 - http://seclists.org/fulldisclosure/2018/Jun/1 -CVE-2018-7886 - https://www.exploit-db.com/exploits/44470/ -CVE-2018-7889 - https://bugs.launchpad.net/calibre/+bug/1753870 -CVE-2018-7890 - https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/ -CVE-2018-7890 - https://www.exploit-db.com/exploits/44274/ -CVE-2018-7893 - https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md -CVE-2018-7900 - https://blog.newskysecurity.com/information-disclosure-vulnerability-cve-2018-7900-makes-it-easy-for-attackers-to-find-huawei-3e7039b6f44f -CVE-2018-7921 - https://www.exploit-db.com/exploits/45971/ -CVE-2018-7999 - https://github.com/silnrsi/graphite/issues/22 -CVE-2018-8000 - https://bugzilla.redhat.com/show_bug.cgi?id=1548918 -CVE-2018-8000 - https://sourceforge.net/p/podofo/tickets/13/ -CVE-2018-8001 - https://bugzilla.redhat.com/show_bug.cgi?id=1549469 -CVE-2018-8002 - https://bugzilla.redhat.com/show_bug.cgi?id=1548930 -CVE-2018-8002 - https://www.exploit-db.com/exploits/44946/ -CVE-2018-8007 - https://www.mdsec.co.uk/2018/08/advisory-cve-2018-8007-apache-couchdb-remote-code-execution/ -CVE-2018-8012 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-8013 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -CVE-2018-8013 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-8013 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-8013 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-8013 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-8014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-8014 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-8021 - https://www.exploit-db.com/exploits/45933/ -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-8032 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-8034 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-8034 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-8034 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-8036 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-8037 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -CVE-2018-8037 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-8037 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2018-8039 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-8039 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2018-8044 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-8046 - http://seclists.org/fulldisclosure/2018/Jul/8 -CVE-2018-8050 - https://github.com/sshock/AFFLIBv3/commit/435a2ca802358a3debb6d164d2c33049131df81c -CVE-2018-8056 - https://www.exploit-db.com/exploits/44495/ -CVE-2018-8057 - https://github.com/Kyhvedn/CVE_Description/blob/master/Cobub_Razor_0.8.0_SQL_injection_description.md -CVE-2018-8057 - https://www.exploit-db.com/exploits/44454/ -CVE-2018-8058 - https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS%202.md -CVE-2018-8060 - https://github.com/otavioarj/SIOCtl -CVE-2018-8061 - https://github.com/otavioarj/SIOCtl -CVE-2018-8062 - http://packetstormsecurity.com/files/159618/Comtrend-AR-5387un-Cross-Site-Scripting.html -CVE-2018-8065 - http://packetstormsecurity.com/files/172676/Flexense-HTTP-Server-10.6.24-Buffer-Overflow-Denial-Of-Service.html -CVE-2018-8072 - https://gitlab.com/nemux/CVE-2018-8072/blob/master/CVE-2018-8072_PoC.txt -CVE-2018-8072 - https://www.nemux.org/2018/04/24/cve-2018-8072/ -CVE-2018-8088 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2018-8088 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2018-8088 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2018-8096 - https://medium.com/stolabs/bypass-admin-authentication-on-seq-17f0f9e02732 -CVE-2018-8096 - https://www.exploit-db.com/exploits/45136/ -CVE-2018-8108 - https://github.com/zlgxzswjy/BUI-select-xss -CVE-2018-8120 - https://www.exploit-db.com/exploits/45653/ -CVE-2018-8133 - https://www.exploit-db.com/exploits/44817/ -CVE-2018-8134 - https://www.exploit-db.com/exploits/44630/ -CVE-2018-8139 - https://www.exploit-db.com/exploits/45012/ -CVE-2018-8145 - https://www.exploit-db.com/exploits/45011/ -CVE-2018-8174 - https://blog.0patch.com/2018/05/a-single-instruction-micropatch-for.html -CVE-2018-8174 - https://www.exploit-db.com/exploits/44741/ -CVE-2018-8208 - https://www.exploit-db.com/exploits/44914/ -CVE-2018-8214 - https://www.exploit-db.com/exploits/44915/ -CVE-2018-8229 - https://www.exploit-db.com/exploits/45013/ -CVE-2018-8269 - https://www.exploit-db.com/exploits/46101/ -CVE-2018-8275 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8275 -CVE-2018-8279 - https://www.exploit-db.com/exploits/45214/ -CVE-2018-8288 - https://www.exploit-db.com/exploits/45213/ -CVE-2018-8291 - https://www.exploit-db.com/exploits/45215/ -CVE-2018-8298 - https://www.exploit-db.com/exploits/45217/ -CVE-2018-8353 - https://www.exploit-db.com/exploits/45279/ -CVE-2018-8355 - https://www.exploit-db.com/exploits/45432/ -CVE-2018-8384 - https://www.exploit-db.com/exploits/45431/ -CVE-2018-8410 - https://www.exploit-db.com/exploits/45436/ -CVE-2018-8411 - https://www.exploit-db.com/exploits/45624/ -CVE-2018-8413 - http://packetstormsecurity.com/files/156027/Microsoft-Windows-Theme-API-File-Parsing.html -CVE-2018-8423 - https://blog.0patch.com/2018/09/outrunning-attackers-on-jet-database.html -CVE-2018-8423 - https://blog.0patch.com/2018/10/patching-re-patching-and-meta-patching.html -CVE-2018-8440 - https://blog.0patch.com/2018/08/how-we-micropatched-publicly-dropped.html -CVE-2018-8440 - https://blog.0patch.com/2018/09/comparing-our-micropatch-with.html -CVE-2018-8449 - https://www.exploit-db.com/exploits/45435/ -CVE-2018-8453 - http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html -CVE-2018-8453 - https://securelist.com/cve-2018-8453-used-in-targeted-attack -CVE-2018-8463 - https://www.exploit-db.com/exploits/45502/ -CVE-2018-8466 - https://www.exploit-db.com/exploits/45571/ -CVE-2018-8467 - https://www.exploit-db.com/exploits/45572/ -CVE-2018-8468 - https://www.exploit-db.com/exploits/45502/ -CVE-2018-8469 - https://www.exploit-db.com/exploits/45502/ -CVE-2018-8474 - https://www.exploit-db.com/exploits/45936/ -CVE-2018-8476 - https://research.checkpoint.com/2019/pxe-dust-finding-a-vulnerability-in-windows-servers-deployment-services/ -CVE-2018-8495 - https://leucosite.com/Microsoft-Edge-RCE/ -CVE-2018-8527 - https://www.exploit-db.com/exploits/45585/ -CVE-2018-8532 - https://www.exploit-db.com/exploits/45587/ -CVE-2018-8533 - https://www.exploit-db.com/exploits/45583/ -CVE-2018-8544 - https://www.exploit-db.com/exploits/45923/ -CVE-2018-8550 - https://www.exploit-db.com/exploits/45893/ -CVE-2018-8552 - https://www.exploit-db.com/exploits/45924/ -CVE-2018-8584 - https://www.exploit-db.com/exploits/46104/ -CVE-2018-8617 - https://www.exploit-db.com/exploits/46202/ -CVE-2018-8619 - https://www.exploit-db.com/exploits/46023/ -CVE-2018-8625 - https://www.exploit-db.com/exploits/46022/ -CVE-2018-8631 - https://www.exploit-db.com/exploits/46001/ -CVE-2018-8712 - https://www.7elements.co.uk/resources/technical-advisories/webmin-1-840-1-880-unrestricted-access-arbitrary-files-using-local-file-include/ -CVE-2018-8716 - http://packetstormsecurity.com/files/147330/WSO2-Identity-Server-5.3.0-Cross-Site-Scripting.html -CVE-2018-8716 - http://seclists.org/fulldisclosure/2018/Apr/45 -CVE-2018-8716 - https://www.exploit-db.com/exploits/44531/ -CVE-2018-8718 - https://www.exploit-db.com/exploits/44843/ -CVE-2018-8719 - https://www.exploit-db.com/exploits/44371/ -CVE-2018-8720 - https://packetstormsecurity.com/files/137427/ServiceNow-ITSM-Cross-Site-Scripting.html -CVE-2018-8724 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-8725 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-8726 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-8729 - https://www.exploit-db.com/exploits/44437/ -CVE-2018-8732 - https://www.exploit-db.com/exploits/44384/ -CVE-2018-8733 - https://www.exploit-db.com/exploits/44560/ -CVE-2018-8733 - https://www.exploit-db.com/exploits/44969/ -CVE-2018-8734 - https://www.exploit-db.com/exploits/44560/ -CVE-2018-8734 - https://www.exploit-db.com/exploits/44969/ -CVE-2018-8735 - https://www.exploit-db.com/exploits/44560/ -CVE-2018-8735 - https://www.exploit-db.com/exploits/44969/ -CVE-2018-8736 - https://www.exploit-db.com/exploits/44560/ -CVE-2018-8736 - https://www.exploit-db.com/exploits/44969/ -CVE-2018-8737 - https://neetech18.blogspot.in/2018/03/stored-xss-vulnerability-in-bookme_17.html -CVE-2018-8738 - https://www.exploit-db.com/exploits/44986/ -CVE-2018-8739 - https://github.com/VerSprite/research/blob/master/advisories/VS-2018-014.md -CVE-2018-8763 - http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html -CVE-2018-8764 - http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html -CVE-2018-8765 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222018 -CVE-2018-8769 - https://sourceware.org/bugzilla/show_bug.cgi?id=22976 -CVE-2018-8770 - https://www.exploit-db.com/exploits/44495/ -CVE-2018-8778 - https://hackerone.com/reports/298246 -CVE-2018-8779 - https://hackerone.com/reports/302997 -CVE-2018-8780 - https://hackerone.com/reports/302338 -CVE-2018-8784 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8785 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8786 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8787 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8788 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8789 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8791 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8792 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8793 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8794 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8795 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8796 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8797 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8798 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8799 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8800 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2018-8802 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=49 -CVE-2018-8804 - https://github.com/ImageMagick/ImageMagick/issues/1025 -CVE-2018-8805 - https://github.com/QQ704568679/YXcms-Code-audit/blob/master/Yxcms%20Code%20audit -CVE-2018-8806 - https://github.com/libming/libming/issues/128 -CVE-2018-8807 - https://github.com/libming/libming/issues/129 -CVE-2018-8808 - https://github.com/radare/radare2/issues/9725 -CVE-2018-8809 - https://github.com/radare/radare2/issues/9726 -CVE-2018-8810 - https://github.com/radare/radare2/issues/9727 -CVE-2018-8811 - https://www.exploit-db.com/exploits/44391/ -CVE-2018-8813 - https://www.exploit-db.com/exploits/44421/ -CVE-2018-8814 - https://www.exploit-db.com/exploits/44418/ -CVE-2018-8815 - https://www.exploit-db.com/exploits/44392/ -CVE-2018-8817 - https://seclists.org/bugtraq/2019/Jun/10 -CVE-2018-8817 - https://www.exploit-db.com/exploits/44385/ -CVE-2018-8819 - http://packetstormsecurity.com/files/148126/WebCTRL-Out-Of-Band-XML-Injection.html -CVE-2018-8819 - http://seclists.org/fulldisclosure/2018/Jun/21 -CVE-2018-8820 - http://seclists.org/fulldisclosure/2018/Mar/57 -CVE-2018-8821 - https://github.com/bigric3/poc -CVE-2018-8823 - https://ia-informatica.com/it/CVE-2018-8823 -CVE-2018-8824 - https://ia-informatica.com/it/CVE-2018-8824 -CVE-2018-8831 - http://seclists.org/fulldisclosure/2018/Apr/36 -CVE-2018-8831 - https://www.exploit-db.com/exploits/44487/ -CVE-2018-8840 - https://www.tenable.com/security/research/tra-2018-07 -CVE-2018-8873 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222040 -CVE-2018-8874 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222054 -CVE-2018-8875 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x0022209c -CVE-2018-8876 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222098 -CVE-2018-8880 - https://www.exploit-db.com/exploits/44488/ -CVE-2018-8881 - https://bugzilla.nasm.us/show_bug.cgi?id=3392446 -CVE-2018-8882 - https://bugzilla.nasm.us/show_bug.cgi?id=3392445 -CVE-2018-8883 - https://bugzilla.nasm.us/show_bug.cgi?id=3392447 -CVE-2018-8888 - http://support.blackberry.com/kb/articleDetail?articleNumber=000054162 -CVE-2018-8891 - http://support.blackberry.com/kb/articleDetail?articleNumber=000054162 -CVE-2018-8892 - http://support.blackberry.com/kb/articleDetail?articleNumber=000054162 -CVE-2018-8894 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222108 -CVE-2018-8895 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/2345DumpBlock.sys-0x00222040 -CVE-2018-8896 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/2345DumpBlock.sys-0x00222044 -CVE-2018-8897 - http://openwall.com/lists/oss-security/2018/05/08/4 -CVE-2018-8897 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -CVE-2018-8897 - https://www.exploit-db.com/exploits/44697/ -CVE-2018-8897 - https://www.exploit-db.com/exploits/45024/ -CVE-2018-8897 - https://www.kb.cert.org/vuls/id/631579 -CVE-2018-8898 - http://packetstormsecurity.com/files/147708/D-Link-DSL-3782-Authentication-Bypass.html -CVE-2018-8898 - https://www.exploit-db.com/exploits/44657/ -CVE-2018-8903 - https://nileshsapariya.blogspot.ae/2018/03/csrf-to-xss-open-auditit-professional-21.html -CVE-2018-8903 - https://www.exploit-db.com/exploits/44354/ -CVE-2018-8904 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002000 -CVE-2018-8905 - http://bugzilla.maptools.org/show_bug.cgi?id=2780 -CVE-2018-8905 - https://github.com/halfbitteam/POCs/tree/master/libtiff-4.08_tiff2ps_heap_overflow -CVE-2018-8906 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug.md -CVE-2018-8908 - https://www.exploit-db.com/exploits/44383/ -CVE-2018-8909 - https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Android.pdf -CVE-2018-8930 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8931 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8932 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8933 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8934 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8935 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8936 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -CVE-2018-8937 - https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html -CVE-2018-8940 - https://seclists.org/fulldisclosure/2019/May/9 -CVE-2018-8941 - https://github.com/SECFORCE/CVE-2018-8941 -CVE-2018-8945 - https://sourceware.org/bugzilla/show_bug.cgi?id=22809 -CVE-2018-8947 - https://www.exploit-db.com/exploits/44343/ -CVE-2018-8955 - http://packetstormsecurity.com/files/149900/Bitdefender-GravityZone-Installer-Signature-Bypass-Code-Execution.html -CVE-2018-8955 - https://labs.nettitude.com/blog/cve-2018-8955-bitdefender-gravityzone-arbitrary-code-execution/ -CVE-2018-8960 - https://github.com/ImageMagick/ImageMagick/issues/1020 -CVE-2018-8961 - https://github.com/libming/libming/issues/130 -CVE-2018-8962 - https://github.com/libming/libming/issues/130 -CVE-2018-8963 - https://github.com/libming/libming/issues/130 -CVE-2018-8964 - https://github.com/libming/libming/issues/130 -CVE-2018-8965 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/ppsave.php.md -CVE-2018-8966 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/install.md -CVE-2018-8967 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/adv2.php.md -CVE-2018-8968 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/manage.php.md -CVE-2018-8969 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/licence_save.php.md -CVE-2018-8970 - https://hackerone.com/reports/329645 -CVE-2018-8973 - https://github.com/yaxuan404/OTCMS_3.2 -CVE-2018-8974 - https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-8974.md -CVE-2018-8975 - https://github.com/xiaoqx/pocs/blob/master/netpbm -CVE-2018-8976 - https://github.com/Exiv2/exiv2/issues/246 -CVE-2018-8977 - https://github.com/Exiv2/exiv2/issues/247 -CVE-2018-8978 - https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html -CVE-2018-8979 - https://nileshsapariya.blogspot.ae/2018/03/csrf-to-xss-open-auditit-professional-21.html -CVE-2018-8979 - https://www.exploit-db.com/exploits/44360/ -CVE-2018-8988 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002008 -CVE-2018-8989 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002006 -CVE-2018-8990 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002010 -CVE-2018-8991 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002009 -CVE-2018-8992 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002005 -CVE-2018-8993 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002001 -CVE-2018-8994 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002003 -CVE-2018-8995 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002002 -CVE-2018-8996 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002007 -CVE-2018-8997 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004 -CVE-2018-8998 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060cc -CVE-2018-8999 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060c4 -CVE-2018-9000 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c402004 -CVE-2018-9001 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402000 -CVE-2018-9002 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060cc -CVE-2018-9003 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c402000 -CVE-2018-9004 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060d0 -CVE-2018-9005 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060d0 -CVE-2018-9006 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402004 -CVE-2018-9007 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060c4 -CVE-2018-9009 - https://github.com/libming/libming/issues/131 -CVE-2018-9010 - https://www.exploit-db.com/exploits/44317/ -CVE-2018-9014 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug4.md -CVE-2018-9015 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug5.md -CVE-2018-9016 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug2.md -CVE-2018-9017 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug3.md -CVE-2018-9018 - https://sourceforge.net/p/graphicsmagick/bugs/554/ -CVE-2018-9019 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2018-9020 - https://www.gubello.me/blog/events-manager-authenticated-stored-xss/ -CVE-2018-9020 - https://www.youtube.com/watch?v=40d7uXl36O4 -CVE-2018-9021 - http://packetstormsecurity.com/files/155576/Broadcom-CA-Privileged-Access-Manager-2.8.2-Remote-Command-Execution.html -CVE-2018-9022 - http://packetstormsecurity.com/files/155576/Broadcom-CA-Privileged-Access-Manager-2.8.2-Remote-Command-Execution.html -CVE-2018-9032 - https://www.exploit-db.com/exploits/44378/ -CVE-2018-9032 - https://www.youtube.com/watch?v=Wmm4p8znS3s -CVE-2018-9034 - https://www.exploit-db.com/exploits/44366/ -CVE-2018-9035 - https://www.exploit-db.com/exploits/44367/ -CVE-2018-9037 - https://www.exploit-db.com/exploits/44621/ -CVE-2018-9038 - https://www.exploit-db.com/exploits/44512/ -CVE-2018-9040 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060c4 -CVE-2018-9041 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c402004 -CVE-2018-9042 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c402000 -CVE-2018-9043 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060d0 -CVE-2018-9044 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060cc -CVE-2018-9045 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002849 -CVE-2018-9046 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100282d -CVE-2018-9047 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002841 -CVE-2018-9048 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100282C -CVE-2018-9049 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002833 -CVE-2018-9050 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100202D -CVE-2018-9051 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002021 -CVE-2018-9052 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100283c -CVE-2018-9053 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf10026cc -CVE-2018-9054 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100284c -CVE-2018-9055 - https://github.com/mdadams/jasper/issues/172 -CVE-2018-9055 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-9056 - http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf -CVE-2018-9058 - https://github.com/ckolivas/lrzip/issues/93 -CVE-2018-9059 - http://packetstormsecurity.com/files/147246/Easy-File-Sharing-Web-Server-7.2-Buffer-Overflow.html -CVE-2018-9059 - https://www.exploit-db.com/exploits/44485/ -CVE-2018-9059 - https://www.exploit-db.com/exploits/44522/ -CVE-2018-9062 - https://support.lenovo.com/us/en/solutions/LEN-20527 -CVE-2018-9092 - https://github.com/bg5sbk/MiniCMS/issues/14 -CVE-2018-9092 - https://www.exploit-db.com/exploits/44362/ -CVE-2018-9101 - https://www.mitel.com/mitel-product-security-advisory-18-0003 -CVE-2018-9102 - https://www.mitel.com/mitel-product-security-advisory-18-0003 -CVE-2018-9103 - https://www.mitel.com/mitel-product-security-advisory-18-0003 -CVE-2018-9104 - https://www.mitel.com/mitel-product-security-advisory-18-0003 -CVE-2018-9106 - https://www.exploit-db.com/exploits/44370/ -CVE-2018-9107 - https://www.exploit-db.com/exploits/44369/ -CVE-2018-9113 - https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-9113.md -CVE-2018-9115 - https://packetstormsecurity.com/files/146982 -CVE-2018-9115 - https://www.exploit-db.com/exploits/44375/ -CVE-2018-9118 - https://wpvulndb.com/vulnerabilities/9056 -CVE-2018-9118 - https://www.exploit-db.com/exploits/44417/ -CVE-2018-9119 - https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html -CVE-2018-9119 - https://www.elttam.com/blog/fuzereview/#content -CVE-2018-9119 - https://www.reddit.com/r/netsec/comments/89qrp1/stealing_credit_cards_from_fuze_via_bluetooth/ -CVE-2018-9120 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ -CVE-2018-9121 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ -CVE-2018-9122 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ -CVE-2018-9123 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ -CVE-2018-9126 - http://packetstormsecurity.com/files/146999/DotNetNuke-DNNarticle-Directory-Traversal.html -CVE-2018-9126 - https://www.exploit-db.com/exploits/44414/ -CVE-2018-9128 - http://packetstormsecurity.com/files/152177/DVD-X-Player-5.5.3-Buffer-Overflow.html -CVE-2018-9128 - https://www.exploit-db.com/exploits/44438/ -CVE-2018-9128 - https://www.exploit-db.com/exploits/46584/ -CVE-2018-9130 - https://github.com/cnonce/IBOS_4.4.3/blob/master/Cross%20Site%20Scripting.md -CVE-2018-9132 - https://github.com/libming/libming/issues/133 -CVE-2018-9133 - https://github.com/ImageMagick/ImageMagick/issues/1072 -CVE-2018-9134 - https://xz.aliyun.com/t/2234 -CVE-2018-9135 - https://github.com/ImageMagick/ImageMagick/issues/1009 -CVE-2018-9136 - https://github.com/bigric3/poc2 -CVE-2018-9137 - https://www.exploit-db.com/exploits/44511/ -CVE-2018-9138 - https://sourceware.org/bugzilla/show_bug.cgi?id=23008 -CVE-2018-9139 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-9140 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-9141 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-9142 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-9143 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2018-9144 - https://github.com/xiaoqx/pocs/tree/master/exiv2 -CVE-2018-9145 - https://github.com/xiaoqx/pocs/tree/master/exiv2 -CVE-2018-9148 - https://exploit-db.com/exploits/44350/ -CVE-2018-9149 - https://www.slideshare.net/secret/qrHwDOJ71eLg7f -CVE-2018-9154 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-9155 - https://docs.google.com/document/d/1ZG1qiwpECbVnv92yNckDn7yyuluKoC2_ON-eLhAY97Q/edit?usp=sharing -CVE-2018-9155 - https://www.exploit-db.com/exploits/44612/ -CVE-2018-9160 - https://www.exploit-db.com/exploits/44545/ -CVE-2018-9161 - https://www.exploit-db.com/exploits/44276/ -CVE-2018-9161 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php -CVE-2018-9162 - https://www.exploit-db.com/exploits/44295/ -CVE-2018-9163 - https://www.exploit-db.com/exploits/44666/ -CVE-2018-9165 - https://github.com/libming/libming/issues/121 -CVE-2018-9172 - https://www.exploit-db.com/exploits/44443/ -CVE-2018-9173 - https://www.exploit-db.com/exploits/44408/ -CVE-2018-9183 - https://www.exploit-db.com/exploits/44401/ -CVE-2018-9185 - https://fortiguard.com/advisory/FG-IR-18-027 -CVE-2018-9190 - https://fortiguard.com/advisory/FG-IR-18-092 -CVE-2018-9191 - https://fortiguard.com/advisory/FG-IR-18-108 -CVE-2018-9192 - https://fortiguard.com/advisory/FG-IR-17-302 -CVE-2018-9192 - https://robotattack.org/ -CVE-2018-9192 - https://www.kb.cert.org/vuls/id/144389 -CVE-2018-9193 - https://fortiguard.com/advisory/FG-IR-18-108 -CVE-2018-9194 - https://fortiguard.com/advisory/FG-IR-17-302 -CVE-2018-9194 - https://robotattack.org/ -CVE-2018-9194 - https://www.kb.cert.org/vuls/id/144389 -CVE-2018-9205 - https://www.exploit-db.com/exploits/44501/ -CVE-2018-9206 - https://wpvulndb.com/vulnerabilities/9136 -CVE-2018-9206 - https://www.exploit-db.com/exploits/45790/ -CVE-2018-9206 - https://www.exploit-db.com/exploits/46182/ -CVE-2018-9206 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2018-9233 - https://www.exploit-db.com/exploits/44411/ -CVE-2018-9235 - https://pastebin.com/caQW37fY -CVE-2018-9235 - https://www.exploit-db.com/exploits/44434/ -CVE-2018-9236 - https://pastebin.com/Amw08sAj -CVE-2018-9236 - https://www.exploit-db.com/exploits/44436/ -CVE-2018-9237 - https://pastebin.com/9C0QBs8u -CVE-2018-9237 - https://www.exploit-db.com/exploits/44436/ -CVE-2018-9238 - https://pastebin.com/ia7U4vi9 -CVE-2018-9238 - https://www.exploit-db.com/exploits/44424/ -CVE-2018-9243 - https://gitlab.com/gitlab-org/gitlab-ce/issues/42028 -CVE-2018-9244 - https://gitlab.com/gitlab-org/gitlab-ce/issues/41838 -CVE-2018-9245 - https://www.exploit-db.com/exploits/44515/ -CVE-2018-9248 - https://www.exploit-db.com/exploits/44413/ -CVE-2018-9251 - https://bugzilla.gnome.org/show_bug.cgi?id=794914 -CVE-2018-9252 - https://github.com/mdadams/jasper/issues/173 -CVE-2018-9252 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2018-9259 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 -CVE-2018-9276 - http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html -CVE-2018-9276 - http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html -CVE-2018-9276 - https://www.exploit-db.com/exploits/46527/ -CVE-2018-9279 - https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities/ -CVE-2018-9280 - https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities/ -CVE-2018-9281 - https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities/ -CVE-2018-9282 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ -CVE-2018-9284 - https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in--d-link-router-dir868.html -CVE-2018-9285 - http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html -CVE-2018-9302 - https://www.exploit-db.com/exploits/44567/ -CVE-2018-9303 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md -CVE-2018-9304 - https://github.com/Exiv2/exiv2/issues/262 -CVE-2018-9304 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md -CVE-2018-9305 - https://github.com/Exiv2/exiv2/issues/263 -CVE-2018-9305 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md -CVE-2018-9307 - https://github.com/xuheunbaicai/cangku/blob/master/cve/%E9%AD%94%E6%96%B9%E5%8A%A8%E5%8A%9B_Latest%20version_bug.md -CVE-2018-9309 - https://github.com/lihonghuyang/vulnerability/blob/master/dl_sendsms.php.md -CVE-2018-9311 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9312 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9313 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9314 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9318 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9320 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9322 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -CVE-2018-9328 - https://pastebin.com/SbjwbYVr -CVE-2018-9331 - https://github.com/cherryla/zzcms/blob/master/adv.php.md -CVE-2018-9332 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-9333 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -CVE-2018-9363 - https://usn.ubuntu.com/3820-1/ -CVE-2018-9363 - https://usn.ubuntu.com/3822-1/ -CVE-2018-9445 - https://www.exploit-db.com/exploits/45192/ -CVE-2018-9473 - https://android.googlesource.com/platform/external/libhevc/+/9f0fb67540d2259e4930d9bd5f1a1a6fb95af862 -CVE-2018-9488 - https://www.exploit-db.com/exploits/45379/ -CVE-2018-9496 - https://android.googlesource.com/platform/external/libxaac/+/04e8cd58f075bec5892e369c8deebca9c67e855c -CVE-2018-9499 - https://android.googlesource.com/platform/frameworks/av/+/bf7a67c33c0f044abeef3b9746f434b7f3295bb1 -CVE-2018-9506 - https://android.googlesource.com/platform/system/bt/+/830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 -CVE-2018-9515 - https://www.exploit-db.com/exploits/45558/ -CVE-2018-9842 - http://seclists.org/fulldisclosure/2018/Apr/19 -CVE-2018-9842 - https://www.exploit-db.com/exploits/44428/ -CVE-2018-9842 - https://www.exploit-db.com/exploits/44829/ -CVE-2018-9842 - https://www.exploit-db.com/exploits/45926/ -CVE-2018-9842 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-015/-cyberark-password-vault-memory-disclosure -CVE-2018-9843 - http://seclists.org/fulldisclosure/2018/Apr/18 -CVE-2018-9843 - https://www.exploit-db.com/exploits/44429/ -CVE-2018-9843 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-014/-cyberark-password-vault-web-access-remote-code-execution -CVE-2018-9844 - https://www.exploit-db.com/exploits/44444/ -CVE-2018-9846 - https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a -CVE-2018-9849 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 -CVE-2018-9853 - https://medium.com/@TheWindowsTwin/vulnerability-in-freesshd-5a0abc147d7a -CVE-2018-9856 - https://github.com/Kotti/Kotti/issues/551 -CVE-2018-9857 - https://pastebin.com/Y9uEC4nu -CVE-2018-9857 - https://www.exploit-db.com/exploits/44486/ -CVE-2018-9861 - https://github.com/ckeditor/ckeditor-dev/blob/master/CHANGES.md -CVE-2018-9864 - https://www.gubello.me/blog/wp-live-chat-support-8-0-05-stored-xss/ -CVE-2018-9864 - https://www.youtube.com/watch?v=eHG1pWaez9w -CVE-2018-9867 - https://www.tenable.com/security/research/tra-2019-08 -CVE-2018-9918 - https://github.com/qpdf/qpdf/issues/202 -CVE-2018-9926 - https://github.com/wuzhicms/wuzhicms/issues/128 -CVE-2018-9926 - https://www.exploit-db.com/exploits/44439/ -CVE-2018-9927 - https://github.com/wuzhicms/wuzhicms/issues/128 -CVE-2018-9948 - https://www.exploit-db.com/exploits/44941/ -CVE-2018-9948 - https://www.exploit-db.com/exploits/45269/ -CVE-2018-9958 - http://packetstormsecurity.com/files/160240/Foxit-Reader-9.0.1.1049-Arbitrary-Code-Execution.html -CVE-2018-9958 - https://www.exploit-db.com/exploits/44941/ -CVE-2018-9958 - https://www.exploit-db.com/exploits/45269/ -CVE-2018-9985 - https://github.com/learnsec6/test/issues/1 -CVE-2018-9995 - https://www.bleepingcomputer.com/news/security/new-hacking-tool-lets-users-access-a-bunch-of-dvrs-and-their-video-feeds/ -CVE-2018-9995 - https://www.exploit-db.com/exploits/44577/ -CVE-2018-9996 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 -CVE-2018-9997 - http://packetstormsecurity.com/files/154127/Open-Xchange-OX-Guard-Cross-Site-Scripting-Signature-Validation.html -CVE-2018-9997 - http://seclists.org/fulldisclosure/2018/Jul/12 -CVE-2018-9998 - http://seclists.org/fulldisclosure/2018/Jul/12 -CVE-2019-0028 - http://www.securityfocus.com/bid/107892 -CVE-2019-0053 - http://packetstormsecurity.com/files/153746/FreeBSD-Security-Advisory-FreeBSD-SA-19-12.telnet.html -CVE-2019-0053 - https://www.exploit-db.com/exploits/45982 -CVE-2019-0129 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00229.html -CVE-2019-0130 - https://support.lenovo.com/us/en/product_security/LEN-27843 -CVE-2019-0135 - https://support.lenovo.com/us/en/product_security/LEN-27843 -CVE-2019-0136 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-0136 - https://usn.ubuntu.com/4115-1/ -CVE-2019-0136 - https://usn.ubuntu.com/4118-1/ -CVE-2019-0154 - http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-0155 - http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-0177 - https://www.intel.com/content/www/us/en/security-center/advisory/in -CVE-2019-0186 - http://packetstormsecurity.com/files/152642/Apache-Pluto-3.0.0-3.0.1-Cross-Site-Scripting.html -CVE-2019-0186 - https://www.exploit-db.com/exploits/46759/ -CVE-2019-0188 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-0188 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-0188 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0190 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-0192 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-0196 - https://hackerone.com/reports/527042 -CVE-2019-0196 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0196 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0197 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0197 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0199 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0199 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-0201 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-0201 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-0201 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-0205 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-0210 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-0211 - http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html -CVE-2019-0211 - http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html -CVE-2019-0211 - http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html -CVE-2019-0211 - https://hackerone.com/reports/520903 -CVE-2019-0211 - https://www.exploit-db.com/exploits/46676/ -CVE-2019-0211 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0211 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0213 - http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html -CVE-2019-0214 - http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html -CVE-2019-0215 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0215 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-0215 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0217 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0217 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0219 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-0219 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0219 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-0220 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0220 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-0220 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-0220 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0221 - http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html -CVE-2019-0221 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0221 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0221 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-0222 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0222 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-0227 - https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/ -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-0227 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0228 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-0228 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0228 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0228 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-0230 - http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html -CVE-2019-0230 - http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html -CVE-2019-0230 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0230 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-0230 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-0232 - http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html -CVE-2019-0232 - http://seclists.org/fulldisclosure/2019/May/4 -CVE-2019-0232 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0232 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-0232 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-0232 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-0232 - https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/ -CVE-2019-0233 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-0233 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-0233 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-0235 - http://packetstormsecurity.com/files/157514/Apache-OFBiz-17.12.03-Cross-Site-Request-Forgery.html -CVE-2019-0241 - https://launchpad.support.sap.com/#/notes/2725538 -CVE-2019-0267 - http://www.securityfocus.com/bid/106990 -CVE-2019-0285 - http://packetstormsecurity.com/files/153471/SAP-Crystal-Reports-Information-Disclosure.html -CVE-2019-0319 - http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html -CVE-2019-0319 - https://cxsecurity.com/ascii/WLB-2019050283 -CVE-2019-0363 - https://launchpad.support.sap.com/#/notes/2817491 -CVE-2019-0364 - https://launchpad.support.sap.com/#/notes/2817491 -CVE-2019-0367 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0368 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0369 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0370 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0374 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0375 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0376 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0377 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0378 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0379 - https://launchpad.support.sap.com/#/notes/2826015 -CVE-2019-0379 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0380 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0381 - https://launchpad.support.sap.com/#/notes/2792430 -CVE-2019-0381 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 -CVE-2019-0539 - https://www.exploit-db.com/exploits/46203/ -CVE-2019-0539 - https://www.exploit-db.com/exploits/46204/ -CVE-2019-0539 - https://www.exploit-db.com/exploits/46485/ -CVE-2019-0541 - https://www.exploit-db.com/exploits/46536/ -CVE-2019-0543 - https://www.exploit-db.com/exploits/46156/ -CVE-2019-0552 - https://www.exploit-db.com/exploits/46162/ -CVE-2019-0555 - https://www.exploit-db.com/exploits/46185/ -CVE-2019-0566 - https://www.exploit-db.com/exploits/46161/ -CVE-2019-0567 - https://www.exploit-db.com/exploits/46203/ -CVE-2019-0568 - https://www.exploit-db.com/exploits/46205/ -CVE-2019-0570 - https://www.exploit-db.com/exploits/46184/ -CVE-2019-0571 - https://www.exploit-db.com/exploits/46159/ -CVE-2019-0572 - https://www.exploit-db.com/exploits/46157/ -CVE-2019-0573 - https://www.exploit-db.com/exploits/46158/ -CVE-2019-0574 - https://www.exploit-db.com/exploits/46160/ -CVE-2019-0708 - http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html -CVE-2019-0708 - http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html -CVE-2019-0708 - http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html -CVE-2019-0708 - http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html -CVE-2019-0708 - http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html -CVE-2019-0730 - http://packetstormsecurity.com/files/152533/Microsoft-Windows-LUAFV-Delayed-Virtualization-MAXIMUM_ACCESS-DesiredAccess-Privilege-Escalation.html -CVE-2019-0730 - https://www.exploit-db.com/exploits/46713/ -CVE-2019-0731 - http://packetstormsecurity.com/files/152534/Microsoft-Windows-LUAFV-Delayed-Virtualization-Cross-Process-Handle-Duplication-Privilege-Escalation.html -CVE-2019-0731 - https://www.exploit-db.com/exploits/46714/ -CVE-2019-0732 - http://packetstormsecurity.com/files/152536/Microsoft-Windows-LUAFV-NtSetCachedSigningLevel-Device-Guard-Bypass.html -CVE-2019-0732 - https://www.exploit-db.com/exploits/46716/ -CVE-2019-0735 - http://packetstormsecurity.com/files/152532/Microsoft-Windows-CSRSS-SxSSrv-Cached-Manifest-Privilege-Escalation.html -CVE-2019-0735 - https://www.exploit-db.com/exploits/46712/ -CVE-2019-0752 - http://packetstormsecurity.com/files/153078/Microsoft-Internet-Explorer-Windows-10-1809-17763.316-Memory-Corruption.html -CVE-2019-0755 - http://packetstormsecurity.com/files/153407/Microsoft-Windows-CmpAddRemoveContainerToCLFSLog-Arbitrary-File-Directory-Creation.html -CVE-2019-0755 - http://packetstormsecurity.com/files/153408/Microsoft-Windows-Font-Cache-Service-Insecure-Sections.html -CVE-2019-0796 - http://packetstormsecurity.com/files/152535/Microsoft-Windows-LUAFV-LuafvCopyShortName-Arbitrary-Short-Name-Privilege-Escalation.html -CVE-2019-0796 - https://www.exploit-db.com/exploits/46715/ -CVE-2019-0803 - http://packetstormsecurity.com/files/153034/Microsoft-Windows-Win32k-Privilege-Escalation.html -CVE-2019-0805 - http://packetstormsecurity.com/files/152537/Microsoft-Windows-LUAFV-Delayed-Virtualization-Cache-Manager-Poisoning-Privilege-Escalation.html -CVE-2019-0805 - https://www.exploit-db.com/exploits/46717/ -CVE-2019-0808 - http://packetstormsecurity.com/files/157616/Microsoft-Windows-NtUserMNDragOver-Local-Privilege-Escalation.html -CVE-2019-0836 - http://packetstormsecurity.com/files/152538/Microsoft-Windows-LUAFV-PostLuafvPostReadWrite-SECTION_OBJECT_POINTERS-Race-Condition.html -CVE-2019-0836 - https://www.exploit-db.com/exploits/46718/ -CVE-2019-0841 - http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html -CVE-2019-0841 - http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html -CVE-2019-0841 - http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html -CVE-2019-0841 - http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html -CVE-2019-0841 - http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html -CVE-2019-0841 - https://www.exploit-db.com/exploits/46683/ -CVE-2019-0863 - http://packetstormsecurity.com/files/153008/Angry-Polar-Bear-2-Microsoft-Windows-Error-Reporting-Local-Privilege-Escalation.html -CVE-2019-0881 - http://packetstormsecurity.com/files/152988/Microsoft-Windows-CmKeyBodyRemapToVirtualForEnum-Arbitrary-Key-Enumeration.html -CVE-2019-0887 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -CVE-2019-1000003 - https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ -CVE-2019-1000003 - https://wpvulndb.com/vulnerabilities/9198 -CVE-2019-1000005 - https://github.com/mpdf/mpdf/issues/949 -CVE-2019-1000006 - https://github.com/RIOT-OS/RIOT/issues/10739 -CVE-2019-1000010 - https://github.com/phpipam/phpipam/issues/2327 -CVE-2019-1000018 - http://seclists.org/fulldisclosure/2021/May/78 -CVE-2019-1000023 - https://inf0seq.github.io/cve/2019/01/20/SQL-Injection-in-OPTOSS-Next-Gen-Network-Management-System-(NG-NetMS).html -CVE-2019-1000024 - https://inf0seq.github.io/cve/2019/01/20/Cross-site-scripting-(XSS)-in-OPTOSS-Next-Gen-Network-Management-System-(NG-NetMS).html -CVE-2019-1000031 - http://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html -CVE-2019-1000031 - https://wpvulndb.com/vulnerabilities/9246 -CVE-2019-10008 - https://www.exploit-db.com/exploits/46659 -CVE-2019-10009 - http://packetstormsecurity.com/files/152244/Titan-FTP-Server-2019-Build-3505-Directory-Traversal.html -CVE-2019-10009 - http://seclists.org/fulldisclosure/2019/Mar/47 -CVE-2019-10009 - https://seclists.org/fulldisclosure/2019/Mar/47 -CVE-2019-10009 - https://www.exploit-db.com/exploits/46611 -CVE-2019-10009 - https://www.exploit-db.com/exploits/46611/ -CVE-2019-10011 - https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-create-your-own-accounts-d865bd22cdd8 -CVE-2019-10012 - https://medium.com/@mdavis332/critical-vulnerability-in-higher-ed-erp-55580f8880c -CVE-2019-10013 - http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html -CVE-2019-10013 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 -CVE-2019-10018 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 -CVE-2019-10019 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275 -CVE-2019-10020 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 -CVE-2019-10021 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 -CVE-2019-10022 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41273 -CVE-2019-10023 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 -CVE-2019-10024 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 -CVE-2019-10025 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 -CVE-2019-10026 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 -CVE-2019-10027 - https://github.com/sharemice/phpcms_xss/blob/master/index.html -CVE-2019-10027 - https://sharemice.github.io/phpcms_xss/ -CVE-2019-1003000 - http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html -CVE-2019-1003000 - https://www.exploit-db.com/exploits/46453/ -CVE-2019-1003000 - https://www.exploit-db.com/exploits/46572/ -CVE-2019-1003001 - http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html -CVE-2019-1003001 - https://www.exploit-db.com/exploits/46572/ -CVE-2019-1003002 - http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html -CVE-2019-1003002 - https://www.exploit-db.com/exploits/46572/ -CVE-2019-1003005 - http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html -CVE-2019-1003029 - http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html -CVE-2019-1003030 - http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html -CVE-2019-1003049 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-1003050 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-10039 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_web_and_sys_account/README.md -CVE-2019-10040 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/remote_cmd_exec_0/README.md -CVE-2019-10041 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_sys_account/README.md -CVE-2019-10042 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/reset_router/README.md -CVE-2019-10062 - https://www.gosecure.net/blog/2021/05/12/aurelia-framework-insecure-default-allows-xss/ -CVE-2019-10064 - http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html -CVE-2019-10068 - http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html -CVE-2019-10068 - https://devnet.kentico.com/download/hotfixes#securityBugs-v12 -CVE-2019-10072 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10072 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10072 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10072 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10072 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10080 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10081 - https://hackerone.com/reports/677557 -CVE-2019-10081 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10081 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10081 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10082 - https://hackerone.com/reports/680415 -CVE-2019-10082 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10082 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10082 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-10082 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-10082 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10086 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-10088 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10088 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10092 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd -CVE-2019-10092 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10092 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10092 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10092 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10093 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10093 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10094 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10094 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10097 - https://hackerone.com/reports/674540 -CVE-2019-10097 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10097 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10097 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10097 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10098 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10098 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10098 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10098 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-1010004 - https://sourceforge.net/p/sox/bugs/299/ -CVE-2019-1010005 - https://github.com/Moeditor/Moeditor/issues/156 -CVE-2019-1010005 - https://github.com/zhuzhuyule/HexoEditor/issues/3 -CVE-2019-1010006 - http://bugzilla.maptools.org/show_bug.cgi?id=2745 -CVE-2019-1010006 - https://bugzilla.gnome.org/show_bug.cgi?id=788980 -CVE-2019-1010022 - https://sourceware.org/bugzilla/show_bug.cgi?id=22850 -CVE-2019-1010022 - https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 -CVE-2019-1010023 - https://sourceware.org/bugzilla/show_bug.cgi?id=22851 -CVE-2019-1010025 - https://sourceware.org/bugzilla/show_bug.cgi?id=22853 -CVE-2019-1010034 - https://wpvulndb.com/vulnerabilities/9553 -CVE-2019-1010054 - https://github.com/lucasgcilento/CVE/blob/master/Dolibarr_CSRF -CVE-2019-1010060 - https://github.com/astropy/astropy/pull/7274 -CVE-2019-1010084 - https://github.com/bigpresh/Dancer-Plugin-SimpleCRUD/pull/109 -CVE-2019-1010091 - https://github.com/tinymce/tinymce/issues/4394 -CVE-2019-10101 - https://medium.com/bugbountywriteup/want-to-take-over-the-java-ecosystem-all-you-need-is-a-mitm-1fc329d898fb -CVE-2019-1010104 - https://metalamin.github.io/Quick-Chat-SQLi-EN/ -CVE-2019-1010112 - https://github.com/LiodAir/images/blob/master/csrf.md -CVE-2019-1010124 - http://packetstormsecurity.com/files/154263/WordPress-WooCommerce-Product-Feed-2.2.18-Cross-Site-Scripting.html -CVE-2019-1010124 - https://wpvulndb.com/vulnerabilities/9856 -CVE-2019-1010124 - https://www.youtube.com/watch?v=T-sqQDFRRBg -CVE-2019-1010127 - https://docs.google.com/document/d/e/2PACX-1vQJveVcGMp_NMdBY5Je2K2k63RoCYznvKjJk5u1wJRmLotvwQkG5qiqZjpABcOkjzj49wkwGweiFwrc/pub -CVE-2019-1010136 - https://www.exploit-db.com/exploits/45187/ -CVE-2019-1010148 - https://gist.github.com/Lz1y/acd1bfd0cc0e0f53b8f781840e7bf368 -CVE-2019-1010149 - https://gist.github.com/Lz1y/e82eb9cc776e629b9d1874dc689421eb -CVE-2019-1010150 - https://gist.github.com/Lz1y/7ab529230c43dfc5441ac32dd13e3e5b -CVE-2019-1010151 - https://gist.github.com/Lz1y/24a6368c7ffdc1af7292035dd16a97f5 -CVE-2019-1010152 - https://gist.github.com/Lz1y/cfb2f8179003b91404ad029333508f4c -CVE-2019-1010153 - https://gist.github.com/Lz1y/31595b060cd6a031896fdf2b3a1273f5 -CVE-2019-1010155 - https://www.youtube.com/watch?v=7sk6agpcA_s -CVE-2019-1010155 - https://youtu.be/BQQbp2vn_wY -CVE-2019-1010163 - https://packetstormsecurity.com/files/145181/SocuSoft-Co.-Photo-2-Video-Converter-8.0.0-Code-Execution-DoS.html -CVE-2019-1010163 - https://ret2eax.github.io/posts/socusoft-bof.html -CVE-2019-1010163 - https://www.exploit-db.com/exploits/43208/ -CVE-2019-1010178 - https://www.youtube.com/watch?v=vOlw2DP9WbE -CVE-2019-1010193 - https://github.com/hisiphp/hisiphp/issues/3 -CVE-2019-1010207 - https://0day.today/exploit/31255 -CVE-2019-1010207 - https://packetstormsecurity.com/files/149665/wppieregister3015-xss.txt -CVE-2019-1010209 - https://gist.github.com/pouyadarabi/467d3167551fb0712d3264c72db092af -CVE-2019-1010238 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-1010239 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-1010241 - https://docs.google.com/document/d/1MBEoJSMvkjp5Kua0bRD_kiDBisL0fOCwTL9uMWj4lGA/edit?usp=sharing -CVE-2019-1010248 - https://sourceforge.net/projects/i-doit/files/i-doit/1.12.1/CHANGELOG/download -CVE-2019-1010257 - https://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html -CVE-2019-1010257 - https://wpvulndb.com/vulnerabilities/9246 -CVE-2019-1010258 - https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg/ -CVE-2019-1010258 - https://github.com/memononen/nanosvg/issues/136 -CVE-2019-1010260 - https://github.com/shyiko/ktlint/pull/332 -CVE-2019-1010266 - https://snyk.io/vuln/SNYK-JS-LODASH-73639 -CVE-2019-1010268 - https://www.exploit-db.com/exploits/43113 -CVE-2019-1010279 - https://redmine.openinfosecfoundation.org/issues/2770 -CVE-2019-1010283 - https://forge.univention.org/bugzilla/show_bug.cgi?id=48427 -CVE-2019-1010290 - https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/ -CVE-2019-1010301 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251 -CVE-2019-1010305 - https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d -CVE-2019-1010305 - https://github.com/kyz/libmspack/issues/27 -CVE-2019-10109 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54220 -CVE-2019-10109 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55469 -CVE-2019-10126 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-10126 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-10126 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-10126 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-10126 - https://usn.ubuntu.com/4118-1/ -CVE-2019-10131 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10131 -CVE-2019-10143 - http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html -CVE-2019-10143 - http://seclists.org/fulldisclosure/2019/Nov/14 -CVE-2019-10149 - http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html -CVE-2019-10149 - http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html -CVE-2019-10149 - http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html -CVE-2019-10149 - http://seclists.org/fulldisclosure/2019/Jun/16 -CVE-2019-10149 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2019-10160 - https://usn.ubuntu.com/4127-2/ -CVE-2019-10173 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-10173 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10173 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10173 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-10173 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10181 - http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html -CVE-2019-10181 - https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344 -CVE-2019-10181 - https://seclists.org/bugtraq/2019/Oct/5 -CVE-2019-10182 - http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html -CVE-2019-10182 - https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344 -CVE-2019-10182 - https://seclists.org/bugtraq/2019/Oct/5 -CVE-2019-10185 - http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html -CVE-2019-10185 - https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344 -CVE-2019-10185 - https://seclists.org/bugtraq/2019/Oct/5 -CVE-2019-1019 - http://packetstormsecurity.com/files/153639/Microsoft-Windows-HTTP-To-SMB-NTLM-Reflection-Privilege-Escalation.html -CVE-2019-10192 - https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES -CVE-2019-10192 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES -CVE-2019-10192 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10193 - https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES -CVE-2019-10193 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES -CVE-2019-10193 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-1020002 - https://github.com/pterodactyl/panel/security/advisories/GHSA-vcm9-hx3q-qwj8 -CVE-2019-1020010 - https://github.com/syuilo/misskey/security/advisories/GHSA-6qw9-6jxq-xj3p -CVE-2019-10219 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-10226 - http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html -CVE-2019-10226 - https://www.exploit-db.com/exploits/46617/ -CVE-2019-10239 - https://blog.to.com/advisory-runasspc-cve-2019-10239/ -CVE-2019-10241 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10241 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10246 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10246 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10246 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10246 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-10246 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10246 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10246 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10247 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-10249 - https://github.com/eclipse/xtext-xtend/issues/759 -CVE-2019-10250 - https://www.bleepingcomputer.com/news/security/uc-browser-for-android-desktop-exposes-500-million-users-to-mitm-attacks/ -CVE-2019-10251 - https://www.bleepingcomputer.com/news/security/uc-browser-for-android-desktop-exposes-500-million-users-to-mitm-attacks/ -CVE-2019-10253 - http://packetstormsecurity.com/files/154294/Wolters-Kluwer-TeamMate-3.1-Cross-Site-Request-Forgery.html -CVE-2019-10253 - http://www.teammatesolutions.com/ -CVE-2019-10261 - https://packetstormsecurity.com/files/152303/CentOS-Web-Panel-0.9.8.789-Cross-Site-Scripting.html -CVE-2019-10261 - https://www.exploit-db.com/exploits/46629 -CVE-2019-10266 - http://packetstormsecurity.com/files/153772/Ahsay-Backup-7.x-8.x-XML-Injection.html -CVE-2019-10267 - http://packetstormsecurity.com/files/153770/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html -CVE-2019-10267 - http://packetstormsecurity.com/files/153771/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html -CVE-2019-10269 - https://coreymhudson.github.io/bwa_vulnerabilties/ -CVE-2019-10273 - http://packetstormsecurity.com/files/152439/ManageEngine-ServiceDesk-Plus-9.3-User-Enumeration.html -CVE-2019-10273 - https://www.exploit-db.com/exploits/46674/ -CVE-2019-10276 - https://github.com/cobub/razor/issues/168 -CVE-2019-10276 - https://github.com/kyrie403/Vuln/blob/master/Cobub%20Razor/Cobub%20Razor%20-%20file%20upload%20vulnerability.md -CVE-2019-10309 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0783 -CVE-2019-10320 - http://seclists.org/fulldisclosure/2019/May/39 -CVE-2019-10321 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 -CVE-2019-10322 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 -CVE-2019-10349 - http://packetstormsecurity.com/files/153610/Jenkins-Dependency-Graph-View-0.13-Cross-Site-Scripting.html -CVE-2019-10352 - https://www.tenable.com/security/research/tra-2019-35 -CVE-2019-10383 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-10384 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-10475 - http://packetstormsecurity.com/files/155200/Jenkins-Build-Metrics-1.3-Cross-Site-Scripting.html -CVE-2019-10478 - https://github.com/warringaa/CVEs#glory-systems-rbw-100 -CVE-2019-10479 - https://github.com/warringaa/CVEs#glory-systems-rbw-100 -CVE-2019-10480 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10481 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10482 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10483 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10484 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10485 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10486 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10487 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10489 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-10490 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10493 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10494 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10498 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-10500 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10503 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10511 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10513 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10516 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10517 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10518 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10523 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10525 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10526 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10527 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-10532 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10535 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10536 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10537 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10539 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-10540 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-10544 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10545 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10546 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10547 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10548 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10549 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10550 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10551 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10552 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10553 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10554 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10555 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10556 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10557 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10558 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10559 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10561 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10562 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-10563 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10564 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10565 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10566 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10567 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-10569 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10571 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10572 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10574 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10575 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10577 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10578 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10579 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10580 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-10581 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10582 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10583 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10584 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10585 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10586 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10587 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10588 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10589 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10590 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-10591 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10592 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10593 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10594 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10595 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10596 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-10597 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-10598 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10600 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10601 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10602 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10603 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10604 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10605 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10606 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10607 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10608 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10609 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10610 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10611 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-10612 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10614 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-10615 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-10616 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-10617 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10618 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-10620 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10621 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10622 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10623 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10624 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10625 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-10626 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-10627 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-10628 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-10629 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-10630 - http://maxwelldulin.com/BlogPost?post=3236967424 -CVE-2019-10631 - http://maxwelldulin.com/BlogPost?post=3236967424 -CVE-2019-10632 - http://maxwelldulin.com/BlogPost?post=3236967424 -CVE-2019-10633 - http://maxwelldulin.com/BlogPost?post=3236967424 -CVE-2019-10634 - http://maxwelldulin.com/BlogPost?post=3236967424 -CVE-2019-10638 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-10638 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 -CVE-2019-10638 - https://usn.ubuntu.com/4115-1/ -CVE-2019-10638 - https://usn.ubuntu.com/4118-1/ -CVE-2019-10638 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10639 - https://usn.ubuntu.com/4115-1/ -CVE-2019-10639 - https://usn.ubuntu.com/4118-1/ -CVE-2019-10639 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-10644 - https://github.com/hyyyp/HYBBS2/issues/3 -CVE-2019-10647 - https://github.com/kyrie403/Vuln/blob/master/zzzcms/zzzphp%20v1.6.3%20write%20file%20with%20dangerous%20type.md -CVE-2019-10649 - https://github.com/ImageMagick/ImageMagick/issues/1533 -CVE-2019-10650 - https://github.com/ImageMagick/ImageMagick/issues/1532 -CVE-2019-10654 - https://github.com/ckolivas/lrzip/issues/108 -CVE-2019-10655 - http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-Command-Execution.html -CVE-2019-10655 - http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-Unauthenticated-Command-Execution.html -CVE-2019-10655 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10655 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10656 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10656 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10657 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10657 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10658 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10658 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10659 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10659 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10660 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10660 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10661 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10661 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10662 - https://github.com/scarvell/grandstream_exploits -CVE-2019-10662 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10663 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -CVE-2019-10664 - http://packetstormsecurity.com/files/152678/Domoticz-4.10577-Unauthenticated-Remote-Command-Execution.html -CVE-2019-10664 - https://www.exploit-db.com/exploits/46773/ -CVE-2019-10669 - http://packetstormsecurity.com/files/154391/LibreNMS-Collectd-Command-Injection.html -CVE-2019-10673 - http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html -CVE-2019-10673 - https://wpvulndb.com/vulnerabilities/9250 -CVE-2019-10676 - https://packetstormsecurity.com/files/152410/Uniqkey-Password-Manager-1.14-Credential-Disclosure.html -CVE-2019-10676 - https://seclists.org/fulldisclosure/2019/Apr/1 -CVE-2019-10677 - http://packetstormsecurity.com/files/154357/DASAN-Zhone-ZNID-GPON-2426A-EU-Cross-Site-Scripting.html -CVE-2019-10677 - https://adamziaja.com/poc/201903-xss-zhone.html -CVE-2019-10677 - https://redteam.pl/poc/dasan-zhone-znid-gpon-2426a-eu.html -CVE-2019-10678 - http://packetstormsecurity.com/files/152678/Domoticz-4.10577-Unauthenticated-Remote-Command-Execution.html -CVE-2019-10678 - https://www.exploit-db.com/exploits/46773/ -CVE-2019-10679 - http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-File-Permissions.html -CVE-2019-10679 - http://seclists.org/fulldisclosure/2020/Aug/19 -CVE-2019-10679 - https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-service-executable-in-eikon-thomson-reuters-cve-2019-10679/ -CVE-2019-10684 - https://github.com/kyrie403/Vuln/blob/master/74cms/74cms%20v5.0.1%20remote%20code%20execution.md -CVE-2019-10685 - https://github.com/alt3kx/CVE-2019-10685 -CVE-2019-10685 - https://medium.com/@alt3kx/a-reflected-xss-in-print-archive-system-v2015-release-2-6-cve-2019-10685-b60763b7768b -CVE-2019-10686 - https://github.com/ctripcorp/apollo/issues/2103 -CVE-2019-10687 - http://packetstormsecurity.com/files/154184/KBPublisher-6.0.2.1-SQL-Injection.html -CVE-2019-1069 - https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html -CVE-2019-1069 - https://www.kb.cert.org/vuls/id/119704 -CVE-2019-10692 - http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html -CVE-2019-10705 - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd -CVE-2019-10705 - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd -CVE-2019-10706 - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd -CVE-2019-10706 - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd -CVE-2019-10709 - http://packetstormsecurity.com/files/154259/Asus-Precision-TouchPad-11.0.0.25-Denial-Of-Service-Privilege-Escalation.html -CVE-2019-10709 - https://blog.telspace.co.za/2019/08/tsa-2019-001-asus-precision-touchpad.html -CVE-2019-10710 - https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/ -CVE-2019-10711 - https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/ -CVE-2019-10716 - http://packetstormsecurity.com/files/156214/Verodin-Director-Web-Console-3.5.4.0-Password-Disclosure.html -CVE-2019-10717 - http://seclists.org/fulldisclosure/2019/Jun/44 -CVE-2019-10718 - http://packetstormsecurity.com/files/153364/BlogEngine.NET-3.3.6-3.3.7-XML-Injection.html -CVE-2019-10719 - http://packetstormsecurity.com/files/153347/BlogEngine.NET-3.3.6-3.3.7-dirPath-Directory-Traversal-Remote-Code-Execution.html -CVE-2019-10720 - http://packetstormsecurity.com/files/153348/BlogEngine.NET-3.3.6-3.3.7-Theme-Cookie-Directory-Traversal-Remote-Code-Execution.html -CVE-2019-10723 - https://sourceforge.net/p/podofo/tickets/46/ -CVE-2019-10732 - https://bugs.kde.org/show_bug.cgi?id=404698 -CVE-2019-10734 - https://bugs.kde.org/show_bug.cgi?id=404697 -CVE-2019-10735 - https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159 -CVE-2019-10742 - https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505 -CVE-2019-10744 - https://snyk.io/vuln/SNYK-JS-LODASH-450202 -CVE-2019-10744 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-10744 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-10745 - https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211 -CVE-2019-10746 - https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212 -CVE-2019-10746 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-10747 - https://snyk.io/vuln/SNYK-JS-SETVALUE-450213 -CVE-2019-10748 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221 -CVE-2019-10749 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222 -CVE-2019-10750 - https://snyk.io/vuln/SNYK-JS-DEEPLY-451026 -CVE-2019-10751 - https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107 -CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467402 -CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467404 -CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467406 -CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468868 -CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468869 -CVE-2019-10755 - https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407 -CVE-2019-10756 - https://snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-471939 -CVE-2019-10758 - https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215 -CVE-2019-10761 - https://github.com/patriksimek/vm2/issues/197 -CVE-2019-10761 - https://snyk.io/vuln/SNYK-JS-VM2-473188 -CVE-2019-10764 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-10766 - https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879 -CVE-2019-10768 - https://snyk.io/vuln/SNYK-JS-ANGULAR-534884 -CVE-2019-10769 - https://snyk.io/vuln/SNYK-JS-SAFEREVAL-534901 -CVE-2019-10770 - https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882 -CVE-2019-10772 - https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969 -CVE-2019-10773 - https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/ -CVE-2019-10775 - https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354 -CVE-2019-10777 - https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839 -CVE-2019-10778 - https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926 -CVE-2019-10779 - https://snyk.io/vuln/SNYK-JAVA-STROOM-541182 -CVE-2019-10780 - https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602 -CVE-2019-10781 - https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970 -CVE-2019-10783 - https://snyk.io/vuln/SNYK-JS-LSOF-543632 -CVE-2019-10784 - https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885 -CVE-2019-10786 - https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035 -CVE-2019-10787 - https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183 -CVE-2019-10788 - https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184 -CVE-2019-10789 - https://snyk.io/vuln/SNYK-JS-CURLING-546484 -CVE-2019-10790 - https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450 -CVE-2019-10790 - https://snyk.io/vuln/SNYK-JS-TAFFY-546521 -CVE-2019-10791 - https://snyk.io/vuln/SNYK-JS-PROMISEPROBE-546816 -CVE-2019-10792 - https://snyk.io/vuln/SNYK-JS-BODYMEN-548897 -CVE-2019-10793 - https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905 -CVE-2019-10794 - https://snyk.io/vuln/SNYK-JS-COMPONENTFLATTEN-548907 -CVE-2019-10795 - https://snyk.io/vuln/SNYK-JS-UNDEFSAFE-548940 -CVE-2019-10796 - https://snyk.io/vuln/SNYK-JS-RPI-548942 -CVE-2019-10797 - https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944 -CVE-2019-10798 - https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803 -CVE-2019-10799 - https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804 -CVE-2019-10800 - https://snyk.io/vuln/SNYK-PYTHON-CODECOV-552149 -CVE-2019-10801 - https://snyk.io/vuln/SNYK-JS-ENPEEM-559007 -CVE-2019-10802 - https://snyk.io/vuln/SNYK-JS-GITING-559008 -CVE-2019-10803 - https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009 -CVE-2019-10804 - https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010 -CVE-2019-10805 - https://snyk.io/vuln/SNYK-JS-VALIB-559015 -CVE-2019-10806 - https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223 -CVE-2019-10807 - https://snyk.io/vuln/SNYK-JS-BLAMER-559541 -CVE-2019-10808 - https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497 -CVE-2019-10842 - https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093 -CVE-2019-10844 - https://github.com/sony/nnabla/issues/209 -CVE-2019-10845 - http://packetstormsecurity.com/files/152452/Uniqkey-Password-Manager-1.14-Denial-Of-Service.html -CVE-2019-10845 - https://vuldb.com/?id.132960 -CVE-2019-10846 - http://packetstormsecurity.com/files/155257/Computrols-CBAS-Web-19.0.0-Cross-Site-Scripting.html -CVE-2019-10847 - http://packetstormsecurity.com/files/155247/Computrols-CBAS-Web-19.0.0-Cross-Site-Request-Forgery.html -CVE-2019-10848 - http://packetstormsecurity.com/files/155266/Computrols-CBAS-Web-19.0.0-Username-Enumeration.html -CVE-2019-10849 - http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html -CVE-2019-10850 - https://applied-risk.com/labs/advisories -CVE-2019-10851 - https://applied-risk.com/labs/advisories -CVE-2019-10852 - http://packetstormsecurity.com/files/155251/Computrols-CBAS-Web-19.0.0-Blind-SQL-Injection.html -CVE-2019-10853 - https://applied-risk.com/labs/advisories -CVE-2019-10854 - https://applied-risk.com/labs/advisories -CVE-2019-10855 - https://applied-risk.com/labs/advisories -CVE-2019-10863 - https://pentest.com.tr/exploits/TeemIp-IPAM-2-4-0-new-config-Command-Injection-Metasploit.html -CVE-2019-10863 - https://www.exploit-db.com/exploits/46641 -CVE-2019-10863 - https://www.exploit-db.com/exploits/46641/ -CVE-2019-10864 - https://medium.com/@aramburu/cve-2019-10864-wordpress-7aebc24751c4 -CVE-2019-10866 - http://seclists.org/fulldisclosure/2019/May/8 -CVE-2019-10866 - https://wpvulndb.com/vulnerabilities/9286 -CVE-2019-10867 - http://packetstormsecurity.com/files/152667/Pimcore-Unserialize-Remote-Code-Execution.html -CVE-2019-10867 - https://www.exploit-db.com/exploits/46783/ -CVE-2019-10869 - https://wpvulndb.com/vulnerabilities/9272 -CVE-2019-10871 - https://gitlab.freedesktop.org/poppler/poppler/issues/751 -CVE-2019-10872 - https://gitlab.freedesktop.org/poppler/poppler/issues/750 -CVE-2019-10873 - https://gitlab.freedesktop.org/poppler/poppler/issues/748 -CVE-2019-10874 - http://packetstormsecurity.com/files/152429/Bolt-CMS-3.6.6-Cross-Site-Request-Forgery-Code-Execution.html -CVE-2019-10874 - https://www.exploit-db.com/exploits/46664/ -CVE-2019-10875 - http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.html -CVE-2019-10875 - https://thehackernews.com/2019/04/xiaomi-browser-vulnerability.html -CVE-2019-10875 - https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html -CVE-2019-10883 - https://www.tenable.com/security/research -CVE-2019-10884 - https://vuldb.com/?id.133069 -CVE-2019-10885 - http://packetstormsecurity.com/files/156792/Ivanti-Workspace-Manager-Security-Bypass.html -CVE-2019-10886 - http://packetstormsecurity.com/files/152612/Sony-Smart-TV-Information-Disclosure-File-Read.html -CVE-2019-10887 - http://packetstormsecurity.com/files/152435/SaLICru-SLC-20-cube3-5-HTML-Injection.html -CVE-2019-10887 - https://www.exploit-db.com/exploits/46667/ -CVE-2019-1089 - http://packetstormsecurity.com/files/153683/Microsoft-Windows-RPCSS-Activation-Kernel-Security-Callback-Privilege-Escalation.html -CVE-2019-10893 - http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0.9.8.793-Free-0.9.8.753-Pro-Cross-Site-Scripting.html -CVE-2019-10893 - https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt -CVE-2019-10893 - https://www.exploit-db.com/exploits/46669 -CVE-2019-10893 - https://www.exploit-db.com/exploits/46669/ -CVE-2019-10898 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585 -CVE-2019-10900 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612 -CVE-2019-10903 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 -CVE-2019-10906 - https://usn.ubuntu.com/4011-1/ -CVE-2019-10909 - https://www.drupal.org/sa-core-2019-005 -CVE-2019-10919 - http://packetstormsecurity.com/files/153123/Siemens-LOGO-8-Missing-Authentication.html -CVE-2019-10919 - http://seclists.org/fulldisclosure/2019/May/45 -CVE-2019-10919 - https://seclists.org/bugtraq/2019/May/73 -CVE-2019-10920 - http://packetstormsecurity.com/files/153122/Siemens-LOGO-8-Hard-Coded-Cryptographic-Key.html -CVE-2019-10920 - http://seclists.org/fulldisclosure/2019/May/44 -CVE-2019-10920 - https://seclists.org/bugtraq/2019/May/72 -CVE-2019-10921 - http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html -CVE-2019-10921 - http://seclists.org/fulldisclosure/2019/May/49 -CVE-2019-10921 - https://seclists.org/bugtraq/2019/May/74 -CVE-2019-10929 - https://cert-portal.siemens.com/productcert/pdf/ssa-273799.pdf -CVE-2019-10945 - http://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html -CVE-2019-10945 - https://www.exploit-db.com/exploits/46710/ -CVE-2019-10963 - http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html -CVE-2019-10969 - http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html -CVE-2019-10999 - https://github.com/fuzzywalls/CVE-2019-10999 -CVE-2019-11001 - https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py -CVE-2019-11001 - https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ -CVE-2019-11002 - https://github.com/Dogfalo/materialize/issues/6286 -CVE-2019-11003 - https://github.com/Dogfalo/materialize/issues/6286 -CVE-2019-11004 - https://github.com/Dogfalo/materialize/issues/6286 -CVE-2019-11013 - http://packetstormsecurity.com/files/154196/Nimble-Streamer-3.x-Directory-Traversal.html -CVE-2019-11013 - https://mayaseven.com/nimble-directory-traversal-in-nimble-streamer-version-3-0-2-2-to-3-5-4-9/ -CVE-2019-11015 - https://www.andmp.com/2019/04/unpatched-vulnerability-in-xiaomi-miui-os-lock-screen.html -CVE-2019-11017 - http://packetstormsecurity.com/files/152465/D-Link-DI-524-2.06RU-Cross-Site-Scripting.html -CVE-2019-11017 - https://www.exploit-db.com/exploits/46687 -CVE-2019-11018 - https://github.com/zoujingli/ThinkAdmin/issues/173 -CVE-2019-11023 - https://gitlab.com/graphviz/graphviz/issues/1517 -CVE-2019-11023 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/ -CVE-2019-11024 - https://github.com/saitoha/libsixel/issues/85 -CVE-2019-11024 - https://research.loginsoft.com/bugs/1501/ -CVE-2019-11026 - https://gitlab.freedesktop.org/poppler/poppler/issues/752 -CVE-2019-11026 - https://research.loginsoft.com/bugs/1508/ -CVE-2019-11028 - http://packetstormsecurity.com/files/152643/GAT-Ship-Web-Module-Unrestricted-File-Upload.html -CVE-2019-11029 - https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution -CVE-2019-11030 - https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution -CVE-2019-11031 - https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution -CVE-2019-11033 - https://support.applaudsolutions.com/hc/en-us/articles/203794318-Download-latest-Applaud-HCM-patch -CVE-2019-11034 - https://usn.ubuntu.com/3953-2/ -CVE-2019-11035 - https://usn.ubuntu.com/3953-2/ -CVE-2019-11038 - https://bugzilla.suse.com/show_bug.cgi?id=1140118 -CVE-2019-11038 - https://hackerone.com/reports/623588 -CVE-2019-11039 - https://bugs.php.net/bug.php?id=78069 -CVE-2019-11039 - https://hackerone.com/reports/593229 -CVE-2019-11040 - https://hackerone.com/reports/665330 -CVE-2019-11041 - https://hackerone.com/reports/675578 -CVE-2019-11042 - https://hackerone.com/reports/675580 -CVE-2019-11043 - http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html -CVE-2019-11043 - https://hackerone.com/reports/722327 -CVE-2019-11044 - https://bugs.php.net/bug.php?id=78862 -CVE-2019-11045 - https://bugs.php.net/bug.php?id=78863 -CVE-2019-11048 - https://bugs.php.net/bug.php?id=78875 -CVE-2019-11048 - https://bugs.php.net/bug.php?id=78876 -CVE-2019-11048 - https://hackerone.com/reports/905015 -CVE-2019-11048 - https://usn.ubuntu.com/4375-1/ -CVE-2019-11048 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-11048 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11057 - https://cybersecurityworks.com/zerodays/cve-2019-11057-vtiger.html -CVE-2019-11057 - https://medium.com/@mohnishdhage/sql-injection-vtiger-crm-v7-1-0-cve-2019-11057-245f84fc5c2c -CVE-2019-11059 - https://github.com/u-boot/u-boot/commits/master -CVE-2019-11060 - https://www.exploit-db.com/exploits/46720 -CVE-2019-11064 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md -CVE-2019-11068 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-11070 - http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html -CVE-2019-11073 - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ -CVE-2019-11074 - https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html -CVE-2019-11074 - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ -CVE-2019-11076 - https://github.com/livehybrid/poc-cribl-rce -CVE-2019-11080 - http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html -CVE-2019-11085 - https://usn.ubuntu.com/4068-1/ -CVE-2019-11085 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11091 - https://seclists.org/bugtraq/2019/Jun/28 -CVE-2019-11091 - https://seclists.org/bugtraq/2019/Jun/36 -CVE-2019-11091 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html -CVE-2019-11117 - https://www.intel.com/content/www/us/en/security-center/advisory/in -CVE-2019-11128 - https://www.intel.com/content/www/us/en/security-center/advisory/in -CVE-2019-11135 - http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-11135 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html -CVE-2019-11135 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-11157 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html -CVE-2019-11185 - https://wpvulndb.com/vulnerabilities/9320 -CVE-2019-11190 - https://usn.ubuntu.com/4008-1/ -CVE-2019-11190 - https://www.openwall.com/lists/oss-security/2019/04/03/4 -CVE-2019-11190 - https://www.openwall.com/lists/oss-security/2019/04/03/4/1 -CVE-2019-11191 - https://usn.ubuntu.com/4008-1/ -CVE-2019-11191 - https://www.openwall.com/lists/oss-security/2019/04/03/4 -CVE-2019-11191 - https://www.openwall.com/lists/oss-security/2019/04/03/4/1 -CVE-2019-11193 - http://packetstormsecurity.com/files/152494/DirectAdmin-1.561-Cross-Site-Scripting.html -CVE-2019-11193 - https://www.exploit-db.com/exploits/46694 -CVE-2019-11198 - https://outpost24.com/blog -CVE-2019-11199 - https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities -CVE-2019-11200 - https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities -CVE-2019-11201 - https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities -CVE-2019-11213 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 -CVE-2019-11213 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114/ -CVE-2019-11213 - https://www.kb.cert.org/vuls/id/192371 -CVE-2019-11216 - http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html -CVE-2019-11216 - http://seclists.org/fulldisclosure/2019/Dec/7 -CVE-2019-11223 - https://wpvulndb.com/vulnerabilities/9488 -CVE-2019-11226 - http://packetstormsecurity.com/files/153071/CMS-Made-Simple-2.2.10-Cross-Site-Scripting.html -CVE-2019-11226 - http://seclists.org/fulldisclosure/2019/May/36 -CVE-2019-11229 - http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html -CVE-2019-11231 - http://packetstormsecurity.com/files/152961/GetSimpleCMS-3.3.15-Remote-Code-Execution.html -CVE-2019-11231 - https://ssd-disclosure.com/?p=3899&preview=true -CVE-2019-1125 - http://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.html -CVE-2019-11253 - https://github.com/kubernetes/kubernetes/issues/83253 -CVE-2019-11255 - https://groups.google.com/forum/#!topic/kubernetes-security-announce/aXiYN0q4uIw -CVE-2019-11269 - http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html -CVE-2019-11269 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-11275 - https://pivotal.io/security/cve-2019-11275 -CVE-2019-11287 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin -CVE-2019-11288 - https://pivotal.io/security/cve-2019-11288 -CVE-2019-11325 - https://github.com/symfony/symfony/releases/tag/v4.3.8 -CVE-2019-11326 - https://mezdanak.de/2019/06/21/iot-full-disclosure-topcon-positioning-net-g5-receiver/ -CVE-2019-11327 - https://mezdanak.de/2019/06/21/iot-full-disclosure-topcon-positioning-net-g5-receiver/ -CVE-2019-11328 - http://www.openwall.com/lists/oss-security/2019/05/16/1 -CVE-2019-11332 - https://cisk123456.blogspot.com/2019/04/mkcms-v50.html -CVE-2019-11334 - http://packetstormsecurity.com/files/153280/Tzumi-Electronics-Klic-Lock-Authentication-Bypass.html -CVE-2019-11336 - http://packetstormsecurity.com/files/152612/Sony-Smart-TV-Information-Disclosure-File-Read.html -CVE-2019-11338 - https://github.com/FFmpeg/FFmpeg/commit/54655623a82632e7624714d7b2a3e039dc5faa7e -CVE-2019-11338 - https://github.com/FFmpeg/FFmpeg/commit/9ccc633068c6fe76989f487c8932bd11886ad65b -CVE-2019-11341 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-11351 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-004.md -CVE-2019-11353 - https://securityshards.wordpress.com/2019/04/21/cve-2019-11353-engenius-ews660ap-arbitrary-code-execution/ -CVE-2019-11354 - http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html -CVE-2019-11354 - http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html -CVE-2019-11354 - https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/ -CVE-2019-11354 - https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien -CVE-2019-11354 - https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client -CVE-2019-11354 - https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/ -CVE-2019-11358 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html -CVE-2019-11358 - http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html -CVE-2019-11358 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -CVE-2019-11358 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2019-11358 - https://hackerone.com/reports/454365 -CVE-2019-11358 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2019-11358 - https://seclists.org/bugtraq/2019/May/18 -CVE-2019-11358 - https://snyk.io/vuln/SNYK-JS-JQUERY-174006 -CVE-2019-11358 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-11358 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-11358 - https://www.tenable.com/security/tns-2019-08 -CVE-2019-11358 - https://www.tenable.com/security/tns-2020-02 -CVE-2019-11359 - https://github.com/mkucej/i-librarian/issues/138 -CVE-2019-11360 - https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/ -CVE-2019-11363 - https://prophecyinternational.atlassian.net/wiki/spaces/SC7/pages/158760961/Release+Notes+for+Snare+Central+v7.4.5 -CVE-2019-11364 - https://prophecyinternational.atlassian.net/wiki/spaces/SC7/pages/158760961/Release+Notes+for+Snare+Central+v7.4.5 -CVE-2019-11365 - https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities -CVE-2019-11365 - https://seclists.org/bugtraq/2019/May/16 -CVE-2019-11365 - https://sourceforge.net/p/atftp/code/ci/abed7d245d8e8bdfeab24f9f7f55a52c3140f96b/ -CVE-2019-11366 - https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities -CVE-2019-11366 - https://seclists.org/bugtraq/2019/May/16 -CVE-2019-11367 - http://packetstormsecurity.com/files/153151/AUO-Solar-Data-Recorder-Incorrect-Access-Control.html -CVE-2019-11367 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11367 -CVE-2019-11368 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11368 -CVE-2019-11369 - http://seclists.org/fulldisclosure/2019/Oct/45 -CVE-2019-11369 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11369 -CVE-2019-11370 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11370 -CVE-2019-11372 - https://sourceforge.net/p/mediainfo/bugs/1101/ -CVE-2019-11373 - https://sourceforge.net/p/mediainfo/bugs/1101/ -CVE-2019-11374 - http://packetstormsecurity.com/files/152603/74CMS-5.0.1-Cross-Site-Request-Forgery.html -CVE-2019-11374 - https://www.exploit-db.com/exploits/46738/ -CVE-2019-11375 - http://packetstormsecurity.com/files/152604/Msvod-10-Cross-Site-Request-Forgery.html -CVE-2019-11375 - https://www.exploit-db.com/exploits/46739/ -CVE-2019-11377 - https://github.com/vedees/wcms/issues/2 -CVE-2019-11383 - https://pastebin.com/6uT9jhDR -CVE-2019-11384 - https://pastebin.com/c90h9WfB -CVE-2019-11393 - https://www.exploit-db.com/exploits/46404 -CVE-2019-11395 - http://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html -CVE-2019-11395 - http://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html -CVE-2019-11395 - http://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html -CVE-2019-11395 - http://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html -CVE-2019-11395 - http://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html -CVE-2019-11395 - https://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html -CVE-2019-11395 - https://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html -CVE-2019-11395 - https://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html -CVE-2019-11395 - https://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html -CVE-2019-11395 - https://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html -CVE-2019-11396 - http://packetstormsecurity.com/files/153868/Avira-Free-Security-Suite-2019-Software-Updater-2.0.6.13175-Improper-Access-Control.html -CVE-2019-11397 - https://medium.com/@javarmutt/rapid4-local-file-inclusion-0day-151c830ac74a -CVE-2019-11398 - http://packetstormsecurity.com/files/153219/UliCMS-2019.1-Cross-Site-Scripting.html -CVE-2019-11398 - https://www.exploit-db.com/exploits/46741/ -CVE-2019-11401 - https://github.com/siteserver/cms/issues/1858 -CVE-2019-11404 - https://github.com/arrow-kt/ank/issues/35 -CVE-2019-11404 - https://github.com/arrow-kt/arrow/issues/1310 -CVE-2019-11405 - https://github.com/OpenAPITools/openapi-generator/issues/2253 -CVE-2019-11406 - https://github.com/intelliants/subrion/issues/821 -CVE-2019-11407 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html -CVE-2019-11408 - http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html -CVE-2019-11408 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html -CVE-2019-11409 - http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html -CVE-2019-11409 - http://packetstormsecurity.com/files/155344/FusionPBX-Operator-Panel-exec.php-Command-Execution.html -CVE-2019-11409 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html -CVE-2019-11410 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html -CVE-2019-11415 - http://packetstormsecurity.com/files/152680/Intelbras-IWR-3000N-Denial-Of-Service.html -CVE-2019-11415 - https://www.exploit-db.com/exploits/46768/ -CVE-2019-11416 - http://packetstormsecurity.com/files/152682/Intelbras-IWR-3000N-1.5.0-Cross-Site-Request-Forgery.html -CVE-2019-11416 - https://www.exploit-db.com/exploits/46770/ -CVE-2019-11419 - http://packetstormsecurity.com/files/152947/WeChat-7.0.4-Denial-Of-Service.html -CVE-2019-11419 - https://awakened1712.github.io/hacking/hacking-wechat-dos/ -CVE-2019-11419 - https://www.exploit-db.com/exploits/46853 -CVE-2019-11428 - https://github.com/mkucej/i-librarian/issues/139 -CVE-2019-11429 - http://packetstormsecurity.com/files/152696/CentOS-Web-Panel-Domain-Field-Cross-Site-Scripting.html -CVE-2019-11429 - https://www.exploit-db.com/exploits/46784/ -CVE-2019-1144 - http://packetstormsecurity.com/files/154085/Microsoft-Font-Subsetting-DLL-MergeFormat12Cmap-MakeFormat12MergedGlyphList-Double-Free.html -CVE-2019-11444 - https://pentest.com.tr/exploits/Liferay-CE-Portal-Tomcat-7-1-2-ga3-Groovy-Console-Remote-Command-Execution-Metasploit.html -CVE-2019-11444 - https://www.exploit-db.com/exploits/46525 -CVE-2019-11445 - https://pentest.com.tr/exploits/OpenKM-DM-6-3-7-Remote-Command-Execution-Metasploit.html -CVE-2019-11445 - https://www.exploit-db.com/exploits/46526 -CVE-2019-11446 - http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html -CVE-2019-11446 - https://www.exploit-db.com/exploits/46691/ -CVE-2019-11447 - http://packetstormsecurity.com/files/159134/CuteNews-2.1.2-Remote-Code-Execution.html -CVE-2019-11447 - http://pentest.com.tr/exploits/CuteNews-2-1-2-Remote-Code-Execution-Metasploit.html -CVE-2019-11447 - https://www.exploit-db.com/exploits/46698/ -CVE-2019-11448 - https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-SQLi-Remote-Code-Execution.html -CVE-2019-11448 - https://www.exploit-db.com/exploits/46725 -CVE-2019-11448 - https://www.exploit-db.com/exploits/46725/ -CVE-2019-1145 - http://packetstormsecurity.com/files/154081/Microsoft-Font-Subsetting-DLL-MergeFontPackage-Dangling-Pointer.html -CVE-2019-11455 - https://github.com/dzflack/exploits/blob/master/unix/monit_buffer_overread.py -CVE-2019-11456 - https://cisk123456.blogspot.com/2019/04/gila-cms-1101-csrf.html -CVE-2019-11457 - http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html -CVE-2019-11469 - http://packetstormsecurity.com/files/152607/ManageEngine-Applications-Manager-14.0-SQL-Injection-Command-Injection.html -CVE-2019-11469 - https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-Auth-Bypass-Remote-Command-Execution.html -CVE-2019-11469 - https://www.exploit-db.com/exploits/46740 -CVE-2019-11469 - https://www.exploit-db.com/exploits/46740/ -CVE-2019-11476 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html -CVE-2019-11476 - https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863 -CVE-2019-11477 - http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html -CVE-2019-11477 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-11477 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 -CVE-2019-11477 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-11477 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11478 - http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html -CVE-2019-11478 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html -CVE-2019-11478 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-11478 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 -CVE-2019-11478 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-11478 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11479 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 -CVE-2019-11479 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-11479 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-1148 - http://packetstormsecurity.com/files/154084/Microsoft-Font-Subsetting-DLL-GetGlyphId-Out-Of-Bounds-Read.html -CVE-2019-11481 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html -CVE-2019-11484 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html -CVE-2019-11486 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-11487 - https://usn.ubuntu.com/4115-1/ -CVE-2019-11487 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11487 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-1149 - http://packetstormsecurity.com/files/154086/Microsoft-Font-Subsetting-DLL-FixSbitSubTables-Heap-Corruption.html -CVE-2019-11490 - https://github.com/nmap/nmap/issues/1568 -CVE-2019-1150 - http://packetstormsecurity.com/files/154087/Microsoft-Font-Subsetting-DLL-ReadTableIntoStructure-Heap-Corruption.html -CVE-2019-1150 - http://packetstormsecurity.com/files/154093/Microsoft-Font-Subsetting-DLL-WriteTableFromStructure-Out-Of-Bounds-Read.html -CVE-2019-11502 - http://www.openwall.com/lists/oss-security/2019/04/25/7 -CVE-2019-11502 - https://www.openwall.com/lists/oss-security/2019/04/18/4 -CVE-2019-11503 - http://www.openwall.com/lists/oss-security/2019/04/25/7 -CVE-2019-11503 - https://www.openwall.com/lists/oss-security/2019/04/18/4 -CVE-2019-11504 - http://packetstormsecurity.com/files/152717/Zotonic-0.46-mod_admin-Cross-Site-Scripting.html -CVE-2019-11504 - https://www.exploit-db.com/exploits/46788/ -CVE-2019-11507 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11507 - https://kb.pulsesecure.net/?atype=sa -CVE-2019-11507 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2019-11508 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11508 - https://kb.pulsesecure.net/?atype=sa -CVE-2019-11509 - https://kb.pulsesecure.net/?atype=sa -CVE-2019-1151 - http://packetstormsecurity.com/files/154092/Microsoft-Font-Subsetting-DLL-ReadAllocFormat12CharGlyphMapList-Heap-Corruption.html -CVE-2019-11510 - http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html -CVE-2019-11510 - http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html -CVE-2019-11510 - https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/ -CVE-2019-11510 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11510 - https://kb.pulsesecure.net/?atype=sa -CVE-2019-11511 - https://zeroauth.ltd/blog/2019/05/26/cve-2019-11511-zoho-manageengine-adselfservice-plus-xss/ -CVE-2019-11515 - https://cisk123456.blogspot.com/2019/04/gila-cms-1101.html -CVE-2019-11516 - https://www.techrepublic.com/article/android-security-bulletin-august-2019-what-you-need-to-know/ -CVE-2019-11517 - https://seclists.org/bugtraq/2019/Jun/10 -CVE-2019-1152 - http://packetstormsecurity.com/files/154096/Microsoft-Font-Subsetting-DLL-MakeFormat12MergedGlyphList-Heap-Corruption.html -CVE-2019-11521 - http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html -CVE-2019-11522 - http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html -CVE-2019-11523 - https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc -CVE-2019-11526 - https://security.mioso.com/CVE-2019-11526-en.html -CVE-2019-11527 - https://security.mioso.com/CVE-2019-11527-en.html -CVE-2019-11528 - https://security.mioso.com/CVE-2019-11528-en.html -CVE-2019-1153 - http://packetstormsecurity.com/files/154098/Microsoft-Font-Subsetting-DLL-FixSbitSubTableFormat1-Out-Of-Bounds-Read.html -CVE-2019-11537 - https://www.exploit-db.com/exploits/46753 -CVE-2019-11537 - https://www.exploit-db.com/exploits/46753/ -CVE-2019-11538 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11539 - http://packetstormsecurity.com/files/154376/Pulse-Secure-8.1R15.1-8.2-8.3-9.0-SSL-VPN-Remote-Code-Execution.html -CVE-2019-11539 - http://packetstormsecurity.com/files/155277/Pulse-Secure-VPN-Arbitrary-Command-Execution.html -CVE-2019-11539 - http://packetstormsecurity.com/files/162092/Pulse-Secure-VPN-Arbitrary-Command-Execution.html -CVE-2019-11539 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11540 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11542 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -CVE-2019-11549 - https://gitlab.com/gitlab-org/gitlab-ce/issues/57779 -CVE-2019-11552 - https://bordplate.no/blog/en/post/crashplan-privilege-escalation/ -CVE-2019-11555 - https://usn.ubuntu.com/3969-2/ -CVE-2019-11557 - https://lists.openwall.net/full-disclosure/2019/04/23/1 -CVE-2019-11557 - https://wpvulndb.com/vulnerabilities/9260 -CVE-2019-11559 - http://seclists.org/fulldisclosure/2019/Sep/28 -CVE-2019-11564 - https://www.exploit-db.com/exploits/46771/ -CVE-2019-11565 - http://dumpco.re/bugs/wp-plugin-print-my-blog-ssrf -CVE-2019-11565 - https://wpvulndb.com/vulnerabilities/9263 -CVE-2019-11569 - https://www.exploit-db.com/exploits/46765 -CVE-2019-11580 - http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html -CVE-2019-11590 - http://seclists.org/fulldisclosure/2019/Apr/36 -CVE-2019-11590 - https://lists.openwall.net/full-disclosure/2019/04/05/11 -CVE-2019-11591 - http://seclists.org/fulldisclosure/2019/Apr/37 -CVE-2019-11591 - https://lists.openwall.net/full-disclosure/2019/04/05/12 -CVE-2019-11591 - https://wpvulndb.com/vulnerabilities/9252 -CVE-2019-11593 - https://adblockplus.org/releases/adblock-plus-352-for-chrome-firefox-and-opera-released -CVE-2019-11597 - https://github.com/ImageMagick/ImageMagick/issues/1555 -CVE-2019-11598 - https://github.com/ImageMagick/ImageMagick/issues/1540 -CVE-2019-11599 - http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html -CVE-2019-11599 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-11599 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-11599 - https://usn.ubuntu.com/4115-1/ -CVE-2019-11599 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11599 - https://www.exploit-db.com/exploits/46781/ -CVE-2019-11599 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-11600 - http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html -CVE-2019-11600 - http://seclists.org/fulldisclosure/2019/May/7 -CVE-2019-11600 - https://seclists.org/bugtraq/2019/May/22 -CVE-2019-11604 - http://packetstormsecurity.com/files/153053/Quest-KACE-Systems-Management-Appliance-9.0-Cross-Site-Scripting.html -CVE-2019-11604 - http://seclists.org/fulldisclosure/2019/May/40 -CVE-2019-11604 - https://www.rcesecurity.com/ -CVE-2019-11606 - https://github.com/itodaro/doorGets_cve -CVE-2019-11607 - https://github.com/itodaro/doorGets_cve -CVE-2019-11608 - https://github.com/itodaro/doorGets_cve -CVE-2019-11609 - https://github.com/itodaro/doorGets_cve -CVE-2019-11610 - https://github.com/itodaro/doorGets_cve -CVE-2019-11611 - https://github.com/itodaro/doorGets_cve -CVE-2019-11612 - https://github.com/itodaro/doorGets_cve -CVE-2019-11613 - https://github.com/itodaro/doorGets_cve -CVE-2019-11614 - https://github.com/itodaro/doorGets_cve -CVE-2019-11615 - https://github.com/itodaro/doorGets_cve -CVE-2019-11616 - https://github.com/itodaro/doorGets_cve -CVE-2019-11617 - https://github.com/itodaro/doorGets_cve -CVE-2019-11618 - https://github.com/itodaro/doorGets_cve -CVE-2019-11619 - https://github.com/itodaro/doorGets_cve -CVE-2019-11620 - https://github.com/itodaro/doorGets_cve -CVE-2019-11621 - https://github.com/itodaro/doorGets_cve -CVE-2019-11622 - https://github.com/itodaro/doorGets_cve -CVE-2019-11623 - https://github.com/itodaro/doorGets_cve -CVE-2019-11624 - https://github.com/itodaro/doorGets_cve -CVE-2019-11625 - https://github.com/itodaro/doorGets_cve -CVE-2019-11626 - https://github.com/itodaro/doorGets_cve -CVE-2019-11629 - https://support.sonatype.com/hc/en-us/articles/360022528733-CVE-2019-11629-Nexus-Repository-Manager-2-Cross-Site-Scripting-XSS-2019-05-02 -CVE-2019-11636 - https://github.com/zcash/zcash/issues/3955 -CVE-2019-11636 - https://saplingwoodchipper.github.io -CVE-2019-11637 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils -CVE-2019-11637 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/rec2csv -CVE-2019-11638 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils -CVE-2019-11638 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/rec2csv -CVE-2019-11639 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils -CVE-2019-11639 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/recfix -CVE-2019-11640 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils/ -CVE-2019-11640 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/recfix -CVE-2019-11642 - http://seclists.org/fulldisclosure/2019/May/1 -CVE-2019-11643 - http://seclists.org/fulldisclosure/2019/May/2 -CVE-2019-11660 - http://packetstormsecurity.com/files/155076/Micro-Focus-HPE-Data-Protector-SUID-Privilege-Escalation.html -CVE-2019-11682 - https://packetstormsecurity.com/files/152694/MailCarrier-2.51-HELP-Remote-Buffer-Overflow.html -CVE-2019-11686 - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd -CVE-2019-11686 - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-s -CVE-2019-11687 - https://github.com/d00rt/pedicom -CVE-2019-11687 - https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_(DICOM)_file_format_standard_-_Markel_Picado_Ortiz_(d00rt).pdf -CVE-2019-11687 - https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware -CVE-2019-11688 - https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md -CVE-2019-11689 - https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md -CVE-2019-11693 - https://bugzilla.mozilla.org/show_bug.cgi?id=1532525 -CVE-2019-11697 - https://bugzilla.mozilla.org/show_bug.cgi?id=1440079 -CVE-2019-11698 - https://bugzilla.mozilla.org/show_bug.cgi?id=1543191 -CVE-2019-11699 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528939 -CVE-2019-1170 - http://packetstormsecurity.com/files/154192/Microsoft-Windows-SET_REPARSE_POINT_EX-Mount-Point-Security-Feature-Bypass.html -CVE-2019-11700 - https://bugzilla.mozilla.org/show_bug.cgi?id=1549833 -CVE-2019-11701 - https://bugzilla.mozilla.org/show_bug.cgi?id=1518627 -CVE-2019-11703 - https://bugzilla.mozilla.org/show_bug.cgi?id=1553820 -CVE-2019-11707 - https://bugzilla.mozilla.org/show_bug.cgi?id=1544386 -CVE-2019-11708 - http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html -CVE-2019-11712 - https://bugzilla.mozilla.org/show_bug.cgi?id=1543804 -CVE-2019-11715 - https://bugzilla.mozilla.org/show_bug.cgi?id=1555523 -CVE-2019-11720 - https://bugzilla.mozilla.org/show_bug.cgi?id=1556230 -CVE-2019-11725 - https://bugzilla.mozilla.org/show_bug.cgi?id=1483510 -CVE-2019-11730 - https://bugzilla.mozilla.org/show_bug.cgi?id=1558299 -CVE-2019-11736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1551913 -CVE-2019-11736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1552206 -CVE-2019-11737 - https://bugzilla.mozilla.org/show_bug.cgi?id=1388015 -CVE-2019-11738 - https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 -CVE-2019-11739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1571481 -CVE-2019-11739 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11740 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11742 - https://bugzilla.mozilla.org/show_bug.cgi?id=1559715 -CVE-2019-11742 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11743 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11744 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11745 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-11746 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1568397 -CVE-2019-11751 - https://bugzilla.mozilla.org/show_bug.cgi?id=1572838 -CVE-2019-11752 - https://bugzilla.mozilla.org/show_bug.cgi?id=1501152 -CVE-2019-11752 - https://www.mozilla.org/security/advisories/mfsa2019-29/ -CVE-2019-11753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1574980 -CVE-2019-11755 - https://usn.ubuntu.com/4202-1/ -CVE-2019-11756 - https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 -CVE-2019-11759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1577953 -CVE-2019-11765 - https://bugzilla.mozilla.org/show_bug.cgi?id=1562582 -CVE-2019-11769 - https://blog.to.com/advisory-teamviewer-cve-2019-11769-2/ -CVE-2019-11770 - https://github.com/eclipse/buildship/issues/855 -CVE-2019-11783 - https://github.com/odoo/odoo/issues/63708 -CVE-2019-11806 - http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html -CVE-2019-11807 - https://wpvulndb.com/vulnerabilities/9262 -CVE-2019-11810 - https://usn.ubuntu.com/4008-1/ -CVE-2019-11810 - https://usn.ubuntu.com/4115-1/ -CVE-2019-11810 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11815 - http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html -CVE-2019-11815 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-11815 - https://usn.ubuntu.com/4008-1/ -CVE-2019-11815 - https://usn.ubuntu.com/4068-1/ -CVE-2019-11815 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11823 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1051 -CVE-2019-11833 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-11833 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-11833 - https://usn.ubuntu.com/4068-1/ -CVE-2019-11833 - https://usn.ubuntu.com/4076-1/ -CVE-2019-11833 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11834 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11835 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11841 - http://packetstormsecurity.com/files/152840/Go-Cryptography-Libraries-Cleartext-Message-Spoofing.html -CVE-2019-11841 - https://sec-consult.com/ -CVE-2019-11844 - http://packetstormsecurity.com/files/152790/RICOH-SP-4520DN-Printer-HTML-Injection.html -CVE-2019-11845 - http://packetstormsecurity.com/files/152789/RICOH-SP-4510DN-Printer-HTML-Injection.html -CVE-2019-11846 - http://packetstormsecurity.com/files/152788/dotCMS-5.1.1-HTML-Injection.html -CVE-2019-11847 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11848 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11849 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11850 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11852 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11853 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11855 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11856 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11857 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11858 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11859 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ -CVE-2019-11869 - https://wpvulndb.com/vulnerabilities/9254 -CVE-2019-11869 - https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild/ -CVE-2019-11871 - https://wpvulndb.com/vulnerabilities/9273 -CVE-2019-11872 - https://wpvulndb.com/vulnerabilities/9326 -CVE-2019-11873 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 -CVE-2019-11875 - http://packetstormsecurity.com/files/153007/Blue-Prism-Robotic-Process-Automation-RPA-Privilege-Escalation.html -CVE-2019-11875 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-002.txt -CVE-2019-11877 - https://medium.com/@igor.lrgomes/cve-2019-11877-credentials-stealing-through-xss-on-pix-link-repeater-9a98c344f58e -CVE-2019-11878 - https://www.youtube.com/watch?v=SnyPJtDDMFQ -CVE-2019-11880 - http://packetstormsecurity.com/files/152910/CommSy-8.6.5-SQL-Injection.html -CVE-2019-11881 - https://github.com/MauroEldritch/VanCleef -CVE-2019-11884 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-11884 - https://usn.ubuntu.com/4068-1/ -CVE-2019-11884 - https://usn.ubuntu.com/4076-1/ -CVE-2019-11884 - https://usn.ubuntu.com/4118-1/ -CVE-2019-11886 - https://wpvulndb.com/vulnerabilities/9256 -CVE-2019-11886 - https://www.wordfence.com/blog/2019/04/zero-day-vulnerability-in-yellow-pencil-visual-theme-customizer-exploited-in-the-wild/ -CVE-2019-11889 - http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html -CVE-2019-11889 - http://seclists.org/fulldisclosure/2019/Jul/8 -CVE-2019-11890 - http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html -CVE-2019-11890 - http://seclists.org/fulldisclosure/2019/Jul/8 -CVE-2019-11922 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-11924 - https://www.facebook.com/security/advisories/cve-2019-11924 -CVE-2019-11931 - https://www.facebook.com/security/advisories/cve-2019-11931 -CVE-2019-11932 - http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html -CVE-2019-11932 - http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html -CVE-2019-11932 - https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263 -CVE-2019-11941 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11942 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11943 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11944 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11945 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11946 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11947 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11948 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11949 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11950 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11951 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11952 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11953 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11954 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11955 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11956 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11957 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11958 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11959 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11960 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11961 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11962 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11963 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11964 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11965 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11966 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11967 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11968 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11969 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11970 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11971 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11972 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11973 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11974 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11975 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11976 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11977 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11978 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11979 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11980 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11982 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us -CVE-2019-11983 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us -CVE-2019-11984 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11985 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-11986 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-12041 - https://github.com/jonschlinkert/remarkable/issues/331 -CVE-2019-12042 - https://github.com/SouhailHammou/Panda-Antivirus-LPE -CVE-2019-12046 - https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742 -CVE-2019-12068 - https://usn.ubuntu.com/4191-1/ -CVE-2019-12086 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-12086 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-12086 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12086 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-12087 - https://github.com/fs0c131y/SamsungLocker -CVE-2019-12094 - https://bugs.horde.org/ticket/14926 -CVE-2019-12094 - https://cxsecurity.com/issue/WLB-2019050199 -CVE-2019-12094 - https://packetstormsecurity.com/files/152975/Horde-Webmail-5.2.22-XSS-CSRF-SQL-Injection-Code-Execution.html -CVE-2019-12094 - https://www.exploit-db.com/exploits/46903 -CVE-2019-12095 - https://bugs.horde.org/ticket/14926 -CVE-2019-12095 - https://cxsecurity.com/issue/WLB-2019050199 -CVE-2019-12095 - https://packetstormsecurity.com/files/152975/Horde-Webmail-5.2.22-XSS-CSRF-SQL-Injection-Code-Execution.html -CVE-2019-12095 - https://www.exploit-db.com/exploits/46903 -CVE-2019-12098 - https://seclists.org/bugtraq/2019/Jun/1 -CVE-2019-12099 - https://www.exploit-db.com/exploits/46839 -CVE-2019-12099 - https://www.pentest.com.tr/exploits/PHP-Fusion-9-03-00-Edit-Profile-Remote-Code-Execution.html -CVE-2019-12102 - https://devnet.kentico.com/download/hotfixes -CVE-2019-12106 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -CVE-2019-12107 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -CVE-2019-12108 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -CVE-2019-12109 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -CVE-2019-12110 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -CVE-2019-12111 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -CVE-2019-12133 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md -CVE-2019-12134 - https://sinfosec757.blogspot.com/2019/06/exploit-title-workday-32-csv-injection.html -CVE-2019-12137 - http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html -CVE-2019-12137 - https://github.com/typora/typora-issues/issues/2505 -CVE-2019-12138 - https://github.com/MacDownApp/macdown/issues/1076 -CVE-2019-12147 - http://packetstormsecurity.com/files/154914/Sangoma-SBC-2.3.23-119-GA-Unauthenticated-User-Creation.html -CVE-2019-12147 - http://seclists.org/fulldisclosure/2019/Oct/40 -CVE-2019-12148 - http://packetstormsecurity.com/files/154915/Sangoma-SBC-2.3.23-119-GA-Authentication-Bypass.html -CVE-2019-12148 - http://seclists.org/fulldisclosure/2019/Oct/41 -CVE-2019-12155 - https://usn.ubuntu.com/4191-1/ -CVE-2019-12162 - https://support.upwork.com/hc/en-us/categories/360001180954 -CVE-2019-12163 - http://packetstormsecurity.com/files/152964/GAT-Ship-Web-Module-1.30-Information-Disclosure.html -CVE-2019-12163 - http://seclists.org/fulldisclosure/2019/May/32 -CVE-2019-12163 - https://seclists.org/fulldisclosure/2019/May/29 -CVE-2019-12164 - https://github.com/status-im/react-native-desktop/pull/475/commits/f6945f1e4b157c69e414cd94fe5cde1876aabcc1 -CVE-2019-12168 - https://medium.com/@bertinjoseb/four-faith-industrial-routers-command-injection-rce-reverse-shell-121c4dedb0d8 -CVE-2019-12169 - http://packetstormsecurity.com/files/153870/ATutor-2.2.4-Arbitrary-File-Upload-Command-Execution.html -CVE-2019-12169 - http://packetstormsecurity.com/files/158246/ATutor-2.2.4-Directory-Traversal-Remote-Code-Execution.html -CVE-2019-12169 - https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit -CVE-2019-12170 - http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html -CVE-2019-12170 - https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File -CVE-2019-12171 - https://drive.google.com/open?id=1msz6pb08crPC0VT7s_Z_KTsKm9CbLJEXNsmRwzoNLy8 -CVE-2019-12172 - https://github.com/typora/typora-issues/issues/2166 -CVE-2019-12173 - https://github.com/MacDownApp/macdown/issues/1050 -CVE-2019-12176 - https://huskersec.com/privilege-escalation-via-htc-viveport-desktop-c93471ff87c8 -CVE-2019-12177 - https://huskersec.com/privilege-escalation-via-htc-viveport-desktop-c93471ff87c8 -CVE-2019-12177 - https://posts.specterops.io/razer-synapse-3-elevation-of-privilege-6d2802bd0585 -CVE-2019-12180 - https://lab.mediaservice.net/advisory/2020-04-readyapi-soapui.txt -CVE-2019-12181 - http://packetstormsecurity.com/files/153333/Serv-U-FTP-Server-15.1.6-Privilege-Escalation.html -CVE-2019-12181 - http://packetstormsecurity.com/files/153505/Serv-U-FTP-Server-prepareinstallation-Privilege-Escalation.html -CVE-2019-12182 - https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ -CVE-2019-12183 - https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ -CVE-2019-12189 - http://packetstormsecurity.com/files/153028/Zoho-ManageEngine-ServiceDesk-Plus-9.3-Cross-Site-Scripting.html -CVE-2019-12195 - http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripting.html -CVE-2019-12215 - https://github.com/matomo-org/matomo/issues/14464 -CVE-2019-12216 - https://bugzilla.libsdl.org/show_bug.cgi?id=4619 -CVE-2019-12217 - https://bugzilla.libsdl.org/show_bug.cgi?id=4626 -CVE-2019-12218 - https://bugzilla.libsdl.org/show_bug.cgi?id=4620 -CVE-2019-12219 - https://bugzilla.libsdl.org/show_bug.cgi?id=4625 -CVE-2019-12220 - https://bugzilla.libsdl.org/show_bug.cgi?id=4627 -CVE-2019-12221 - https://bugzilla.libsdl.org/show_bug.cgi?id=4628 -CVE-2019-12222 - https://bugzilla.libsdl.org/show_bug.cgi?id=4621 -CVE-2019-12223 - https://medium.com/@noe.dustin/samsung-webviewer-remote-dos-vulberability-cve-2019-12223-5f4afbc83fbd -CVE-2019-12239 - https://wpvulndb.com/vulnerabilities/9284 -CVE-2019-12240 - https://wpvulndb.com/vulnerabilities/9291 -CVE-2019-12241 - https://wpvulndb.com/vulnerabilities/9292 -CVE-2019-12252 - http://packetstormsecurity.com/files/153029/Zoho-ManageEngine-ServiceDesk-Plus-Privilege-Escalation.html -CVE-2019-12255 - http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html -CVE-2019-12260 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-12260 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12261 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12266 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-wyze-cam-iot-device/ -CVE-2019-12270 - https://packetstormsecurity.com/files/150125/Brava-Enterprise-Server-16.4-Information-Disclosure.html -CVE-2019-12271 - http://packetstormsecurity.com/files/155355/Centraleyezer-Shell-Upload.html -CVE-2019-12276 - http://packetstormsecurity.com/files/153373/GrandNode-4.40-Path-Traversal-File-Download.html -CVE-2019-12279 - http://packetstormsecurity.com/files/153040/Nagios-XI-5.6.1-SQL-Injection.html -CVE-2019-12279 - https://github.com/JameelNabbo/exploits/blob/master/nagiosxi%20username%20sql%20injection.txt -CVE-2019-12280 - http://packetstormsecurity.com/files/153374/PC-Doctor-Toolbox-DLL-Hijacking.html -CVE-2019-12280 - https://safebreach.com/Press-Post/SafeBreach-Identifies-Serious-Vulnerability-In-PC-Doctor-Software -CVE-2019-12288 - http://f1security.co.kr/cve/cve_190314.htm -CVE-2019-12289 - http://f1security.co.kr/cve/cve_190314.htm -CVE-2019-12299 - https://medium.com/insidersec0x42/centraleyezer-stored-xss-using-html-entities-cve-2019-12299-5c295ae54ef -CVE-2019-1230 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1230 -CVE-2019-12301 - https://jira.percona.com/browse/PS-5640 -CVE-2019-12301 - https://www.percona.com/blog/2019/05/17/percona-server-for-mysql-5-6-44-85-0-is-now-available/ -CVE-2019-12311 - https://medium.com/insidersec0x42/centraleyezer-unrestricted-file-upload-cve-2019-12311-7cad12e95165 -CVE-2019-12314 - http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html -CVE-2019-12314 - https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt -CVE-2019-12323 - http://hyp3rlinx.altervista.org -CVE-2019-12323 - http://seclists.org/fulldisclosure/2019/Jun/28 -CVE-2019-12331 - https://herolab.usd.de/security-advisories/usd-2019-0046/ -CVE-2019-12345 - https://wpvulndb.com/vulnerabilities/9289 -CVE-2019-12346 - https://wpvulndb.com/vulnerabilities/9397 -CVE-2019-12346 - https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss/ -CVE-2019-12347 - http://packetstormsecurity.com/files/153112/pfSense-2.4.4-p3-Cross-Site-Scripting.html -CVE-2019-12347 - https://redmine.pfsense.org/issues/9554#change-40729 -CVE-2019-12348 - https://github.com/cby234/zzcms/issues/1 -CVE-2019-12349 - https://github.com/cby234/zzcms/issues/2 -CVE-2019-12350 - https://github.com/cby234/zzcms/issues/4 -CVE-2019-12351 - https://github.com/cby234/zzcms/issues/3 -CVE-2019-12352 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12353 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12354 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12355 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12356 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12357 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12358 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12359 - https://github.com/cby234/zzcms/issues/5 -CVE-2019-12363 - https://seekurity.com/blog/advisories/mybb-two-factor-authentication-extension-vulnerabilities/ -CVE-2019-12365 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -CVE-2019-12366 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -CVE-2019-12367 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -CVE-2019-12368 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -CVE-2019-12369 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -CVE-2019-12370 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -CVE-2019-12372 - http://packetstormsecurity.com/files/153084/Petraware-pTransformer-ADC-SQL-Injection.html -CVE-2019-12372 - https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html -CVE-2019-12380 - https://usn.ubuntu.com/4414-1/ -CVE-2019-12382 - https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382 -CVE-2019-12384 - https://doyensec.com/research.html -CVE-2019-12384 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12384 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-12384 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12384 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12384 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-12385 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ -CVE-2019-12386 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ -CVE-2019-12387 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12388 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12389 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12390 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12391 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12392 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12393 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12394 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-12395 - https://github.com/webbukkit/dynmap/issues/2474 -CVE-2019-12399 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-12399 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12399 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-12399 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-12400 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-12401 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12401-XML%20Bomb-Apache%20Solr -CVE-2019-12402 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-12406 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12406 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12406 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-12409 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12409-RCE%20Vulnerability%20Due%20to%20Bad%20Defalut%20Config-Apache%20Solr -CVE-2019-1241 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12415 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-12418 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12419 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12419 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12419 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-12419 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12423 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-12423 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12423 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12439 - https://github.com/projectatomic/bubblewrap/issues/304 -CVE-2019-12457 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ -CVE-2019-12457 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 -CVE-2019-12458 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ -CVE-2019-12458 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 -CVE-2019-12459 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ -CVE-2019-12459 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 -CVE-2019-12460 - http://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.html -CVE-2019-12460 - https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/ -CVE-2019-12461 - http://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.html -CVE-2019-12461 - https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/ -CVE-2019-12476 - https://github.com/0katz/CVE-2019-12476 -CVE-2019-12477 - http://packetstormsecurity.com/files/153191/Supra-Smart-Cloud-TV-Remote-File-Inclusion.html -CVE-2019-12479 - https://security401.com/twentytwenty-storage-path-traversal/ -CVE-2019-12480 - http://packetstormsecurity.com/files/153716/BACnet-Stack-0.8.6-Denial-Of-Service.html -CVE-2019-12480 - https://1modm.github.io/CVE-2019-12480.html -CVE-2019-12481 - https://github.com/gpac/gpac/issues/1249 -CVE-2019-12482 - https://github.com/gpac/gpac/issues/1249 -CVE-2019-12483 - https://github.com/gpac/gpac/issues/1249 -CVE-2019-12489 - https://www.exploit-db.com/exploits/47654 -CVE-2019-12490 - https://www.youtube.com/watch?v=gCVeFoxZ1DI -CVE-2019-12499 - https://github.com/netblue30/firejail/issues/2401 -CVE-2019-12500 - https://blog.zimperium.com/dont-give-me-a-brake-xiaomi-scooter-hack-enables-dangerous-accelerations-and-stops-for-unsuspecting-riders/ -CVE-2019-12502 - https://gist.github.com/llandeilocymro/55a61e3730cdef56ab5806a677ba0891 -CVE-2019-12503 - http://packetstormsecurity.com/files/155503/Inateck-BCST-60-Barcode-Scanner-Keystroke-Injection.html -CVE-2019-12503 - http://seclists.org/fulldisclosure/2019/Nov/30 -CVE-2019-12503 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-027.txt -CVE-2019-12504 - http://packetstormsecurity.com/files/153185/Inateck-2.4-GHz-Wearable-Wireless-Presenter-WP2002-Keystroke-Injection.html -CVE-2019-12504 - http://seclists.org/fulldisclosure/2019/Jun/14 -CVE-2019-12504 - https://seclists.org/bugtraq/2019/Jun/3 -CVE-2019-12504 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-008.txt -CVE-2019-12505 - http://packetstormsecurity.com/files/153184/Inateck-2.4-GHz-Wireless-Presenter-WP1001-Keystroke-Injection.html -CVE-2019-12505 - http://seclists.org/fulldisclosure/2019/Jun/4 -CVE-2019-12505 - https://seclists.org/bugtraq/2019/Jun/2 -CVE-2019-12505 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-007.txt -CVE-2019-12506 - http://packetstormsecurity.com/files/153186/Logitech-R700-Laser-Presentation-Remote-Keystroke-Injection.html -CVE-2019-12506 - http://seclists.org/fulldisclosure/2019/Jun/15 -CVE-2019-12506 - https://seclists.org/bugtraq/2019/Jun/4 -CVE-2019-12506 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-015.txt -CVE-2019-12510 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -CVE-2019-12511 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -CVE-2019-12512 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -CVE-2019-12513 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -CVE-2019-12516 - http://packetstormsecurity.com/files/154440/WordPress-SlickQuiz-1.3.7.1-SQL-Injection.html -CVE-2019-12517 - http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-Site-Scripting.html -CVE-2019-12518 - http://packetstormsecurity.com/files/156335/Anviz-CrossChex-Buffer-Overflow.html -CVE-2019-12518 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -CVE-2019-1253 - http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html -CVE-2019-12549 - https://cert.vde.com/en-us/advisories/vde-2019-013 -CVE-2019-12550 - https://cert.vde.com/en-us/advisories/vde-2019-013 -CVE-2019-12551 - https://ereisr00.github.io/ -CVE-2019-12551 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor -CVE-2019-12552 - https://ereisr00.github.io/ -CVE-2019-12552 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor -CVE-2019-12553 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor/strcat_heap_overflow.bt -CVE-2019-12554 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor/WSubStr.bt -CVE-2019-12555 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor/SubStr.bt -CVE-2019-12562 - http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html -CVE-2019-12562 - https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/ -CVE-2019-12564 - https://github.com/srsec/-srsec-/issues/1 -CVE-2019-12569 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-006.md -CVE-2019-12570 - https://wpvulndb.com/vulnerabilities/9964 -CVE-2019-12573 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12573.txt -CVE-2019-12574 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12574.txt -CVE-2019-12576 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12576.txt -CVE-2019-12577 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12577.txt -CVE-2019-12581 - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ -CVE-2019-12583 - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ -CVE-2019-12586 - https://github.com/Matheus-Garbelini/esp32_esp8266_attacks -CVE-2019-12586 - https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ -CVE-2019-12587 - https://github.com/Matheus-Garbelini/esp32_esp8266_attacks -CVE-2019-12587 - https://matheus-garbelini.github.io/home/post/zero-pmk-installation/ -CVE-2019-12588 - https://github.com/Matheus-Garbelini/esp32_esp8266_attacks -CVE-2019-12588 - https://matheus-garbelini.github.io/home/post/esp8266-beacon-frame-crash/ -CVE-2019-12589 - https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134 -CVE-2019-12589 - https://github.com/netblue30/firejail/issues/2718 -CVE-2019-12589 - https://github.com/netblue30/firejail/releases/tag/0.9.60 -CVE-2019-12592 - https://www.techrepublic.com/article/evernote-chrome-extension-vulnerability-allowed-attackers-to-steal-4-7m-users-data/ -CVE-2019-12593 - http://packetstormsecurity.com/files/153161/IceWarp-10.4.4-Local-File-Inclusion.html -CVE-2019-12593 - https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt -CVE-2019-12614 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-12614 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-12614 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-12616 - http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html -CVE-2019-1262 - http://packetstormsecurity.com/files/154591/Microsoft-SharePoint-2013-SP1-Cross-Site-Scripting.html -CVE-2019-12643 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass -CVE-2019-12708 - https://www.tenable.com/security/research/tra-2019-44 -CVE-2019-12719 - https://drive.google.com/open?id=1Khz7x6b32g7JYCyA6ZQ6NGEc4I0yFA45 -CVE-2019-12719 - https://www.exploit-db.com/exploits/47541 -CVE-2019-12720 - https://drive.google.com/file/d/1QYgj4FU0MjSIhgXwddg4L5no9KYn8E9v/view -CVE-2019-12720 - https://www.exploit-db.com/exploits/47542 -CVE-2019-12725 - http://packetstormsecurity.com/files/160211/ZeroShell-3.9.0-Remote-Command-Execution.html -CVE-2019-12725 - http://packetstormsecurity.com/files/162561/ZeroShell-3.9.0-Remote-Command-Execution.html -CVE-2019-12725 - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt -CVE-2019-12727 - https://github.com/X-C3LL/PoC-CVEs/blob/master/Aircam-DoS/Aircam-DoS.py -CVE-2019-12728 - https://github.com/grails/grails-core/issues/11250 -CVE-2019-12730 - https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n4.1.4 -CVE-2019-12731 - https://www.detack.de/en/cve-2019-12731 -CVE-2019-12733 - http://packetstormsecurity.com/files/155585/SiteVision-4.x-5.x-Remote-Code-Execution.html -CVE-2019-12733 - http://seclists.org/fulldisclosure/2019/Dec/12 -CVE-2019-12734 - http://packetstormsecurity.com/files/155584/SiteVision-4.x-5.x-Insufficient-Module-Access-Control.html -CVE-2019-12734 - http://seclists.org/fulldisclosure/2019/Dec/12 -CVE-2019-12735 - https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md -CVE-2019-12735 - https://seclists.org/bugtraq/2019/Jun/33 -CVE-2019-12735 - https://usn.ubuntu.com/4016-1/ -CVE-2019-12739 - https://www.secsignal.org/news/a-tale-of-rce-nextcloud-extract-app/ -CVE-2019-12744 - http://packetstormsecurity.com/files/153383/SeedDMS-Remote-Command-Execution.html -CVE-2019-12744 - http://packetstormsecurity.com/files/163283/Seeddms-5.1.10-Remote-Command-Execution.html -CVE-2019-12745 - http://packetstormsecurity.com/files/153382/SeedDMS-out.UsrMgr.php-Cross-Site-Scripting.html -CVE-2019-12750 - http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html -CVE-2019-12758 - https://safebreach.com/Post/Symantec-Endpoint-Protection-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-12758 -CVE-2019-12760 - https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7 -CVE-2019-12760 - https://github.com/davidhalter/parso/issues/75 -CVE-2019-12761 - https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba -CVE-2019-12761 - https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562 -CVE-2019-12762 - https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/ -CVE-2019-12762 - https://medium.com/@juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607 -CVE-2019-12769 - https://medium.com/@clod81/cve-2019-12769-solarwinds-serv-u-managed-file-transfer-mft-web-client-15-1-6-a2dab98d668d -CVE-2019-12771 - https://github.com/Thinstation/thinstation/issues/427 -CVE-2019-12773 - http://packetstormsecurity.com/files/158411/Verint-Impact-360-15.1-Script-Insertion-HTML-Injection.html -CVE-2019-12773 - https://seclists.org/fulldisclosure/2020/Jul/15 -CVE-2019-12779 - https://github.com/ClusterLabs/libqb/issues/338 -CVE-2019-12780 - https://www.exploit-db.com/exploits/46436 -CVE-2019-12783 - http://packetstormsecurity.com/files/158412/Verint-Impact-360-15.1-Open-Redirect.html -CVE-2019-12783 - https://seclists.org/fulldisclosure/2020/Jul/16 -CVE-2019-12784 - http://packetstormsecurity.com/files/158413/Verint-Impact-360-15.1-Cross-Site-Request-Forgery.html -CVE-2019-12784 - https://seclists.org/fulldisclosure/2020/Jul/17 -CVE-2019-12786 - https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-protected.pdf -CVE-2019-12787 - https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-2-protected.pdf -CVE-2019-12788 - http://packetstormsecurity.com/files/153249/ProShow-9.0.3797-Privilege-Escalation.html -CVE-2019-12789 - http://seclists.org/fulldisclosure/2019/Jun/10 -CVE-2019-12801 - http://packetstormsecurity.com/files/153384/SeedDMS-out.GroupMgr.php-Cross-Site-Scripting.html -CVE-2019-12813 - https://github.com/sungjungk/fp-scanner-hacking -CVE-2019-12813 - https://www.youtube.com/watch?v=Grirez2xeas -CVE-2019-12813 - https://www.youtube.com/watch?v=wEXJDyEOatM -CVE-2019-12814 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-12814 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12814 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12814 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-12815 - https://seclists.org/bugtraq/2019/Aug/3 -CVE-2019-12816 - https://seclists.org/bugtraq/2019/Jun/23 -CVE-2019-12817 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15 -CVE-2019-12817 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc -CVE-2019-12818 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-12818 - https://usn.ubuntu.com/4118-1/ -CVE-2019-12819 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-12819 - https://usn.ubuntu.com/4118-1/ -CVE-2019-12826 - https://wpvulndb.com/vulnerabilities/9403 -CVE-2019-12826 - https://wpvulndb.com/vulnerabilities/9413 -CVE-2019-12828 - http://packetstormsecurity.com/files/153385/EA-Origin-Remote-Code-Execution.html -CVE-2019-12828 - https://www.bleepingcomputer.com/news/security/qt5-based-gui-apps-susceptible-to-remote-code-execution/ -CVE-2019-12828 - https://www.youtube.com/watch?v=E9vCx9KsF3c -CVE-2019-12834 - https://github.com/miruser/Roche-CVEs/blob/master/CVE-2019-12834.md -CVE-2019-12836 - https://github.com/9lyph/CVE-2019-12836/blob/master/README.md -CVE-2019-12840 - http://packetstormsecurity.com/files/153372/Webmin-1.910-Remote-Command-Execution.html -CVE-2019-12840 - https://pentest.com.tr/exploits/Webmin-1910-Package-Updates-Remote-Command-Execution.html -CVE-2019-12840 - https://www.exploit-db.com/exploits/46984 -CVE-2019-12855 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-12863 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-12863-stored-html-injection-vulnerability-in-solarwinds-orion-platform-2018-4-hf3-npm-12-4-netpath-1-1-4/ -CVE-2019-12863 - https://www.solarwinds.com/network-performance-monitor -CVE-2019-12864 - https://www.esecforte.com/network-performance-monitor-india-esec-forte-technologies/ -CVE-2019-12864 - https://www.solarwinds.com/network-performance-monitor -CVE-2019-12868 - https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/ -CVE-2019-12869 - https://cert.vde.com/en-us/advisories/vde-2019-014 -CVE-2019-12870 - https://cert.vde.com/en-us/advisories/vde-2019-014 -CVE-2019-12871 - https://cert.vde.com/en-us/advisories/vde-2019-014 -CVE-2019-12880 - http://packetstormsecurity.com/files/153405/Quarking-Password-Manager-3.1.84-Clickjacking.html -CVE-2019-12890 - https://www.exploit-db.com/exploits/46992 -CVE-2019-12890 - https://www.youtube.com/watch?v=MK9AvoJDtxY -CVE-2019-12893 - https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html -CVE-2019-12894 - https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html -CVE-2019-12895 - https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html -CVE-2019-12896 - https://code610.blogspot.com/2019/05/crashing-edraw-max.html -CVE-2019-12897 - https://code610.blogspot.com/2019/05/crashing-edraw-max.html -CVE-2019-12898 - https://code610.blogspot.com/2019/05/crashing-devicenet-builder.html -CVE-2019-12899 - https://code610.blogspot.com/2019/05/crashing-devicenet-builder.html -CVE-2019-12900 - http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html -CVE-2019-12900 - http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html -CVE-2019-12900 - https://seclists.org/bugtraq/2019/Aug/4 -CVE-2019-12900 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-12904 - https://dev.gnupg.org/T4541 -CVE-2019-12905 - http://packetstormsecurity.com/files/158173/FileRun-2019.05.21-Cross-Site-Scripting.html -CVE-2019-12905 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ -CVE-2019-12905 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 -CVE-2019-12919 - https://www.exploit-db.com/exploits/46993 -CVE-2019-12920 - https://www.exploit-db.com/exploits/46993 -CVE-2019-12921 - https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md -CVE-2019-12922 - http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html -CVE-2019-12922 - http://seclists.org/fulldisclosure/2019/Sep/23 -CVE-2019-12922 - https://www.exploit-db.com/exploits/47385 -CVE-2019-12934 - https://zeroauth.ltd/blog/2019/07/17/cve-2019-12934-wp-code-highlightjs-wordpress-plugin-csrf-leads-to-blog-wide-injected-script-html/ -CVE-2019-12935 - http://packetstormsecurity.com/files/153145/Shopware-5.5.6-Cross-Site-Scripting.html -CVE-2019-12938 - https://bitbucket.org/analogic/mailserver/issues/665/posteio-logs-leak -CVE-2019-12942 - https://www.kth.se/polopoly_fs/1.923565.1568098364!/Vulnerability_Report_TTLock_State_Consistency.pdf -CVE-2019-12943 - https://www.kth.se/polopoly_fs/1.923564.1568098316!/Vulnerability_Report_TTLock_Password_Reset.pdf -CVE-2019-12944 - https://www.kth.se/polopoly_fs/1.931930.1571073241!/Vulnerability_Report_Glue_State_Consistency.pdf -CVE-2019-12949 - https://github.com/tarantula-team/CVE-2019-12949 -CVE-2019-12954 - https://www.esecforte.com/cve-2019-12954-solarwinds-network-performance-monitor-orion-platform-2018-npm-12-3-netpath-1-1-3-vulnerable-for-stored-xss/ -CVE-2019-12962 - http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html -CVE-2019-12966 - https://github.com/zxlie/FeHelper/issues/63 -CVE-2019-12967 - https://securiteam.io/2019/10/20/cve-2019-12967-moolticute-improper-access-control/ -CVE-2019-12970 - http://packetstormsecurity.com/files/153495/SquirrelMail-1.4.22-Cross-Site-Scripting.html -CVE-2019-12970 - https://seclists.org/bugtraq/2019/Jul/0 -CVE-2019-12970 - https://seclists.org/bugtraq/2019/Jul/50 -CVE-2019-12970 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-016.txt -CVE-2019-12971 - https://seclists.org/bugtraq/2019/Jul/6 -CVE-2019-12971 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-017.txt -CVE-2019-12972 - https://sourceware.org/bugzilla/show_bug.cgi?id=24689 -CVE-2019-12973 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-12973 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-12984 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-12984 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 -CVE-2019-12984 - https://usn.ubuntu.com/4118-1/ -CVE-2019-12985 - https://www.tenable.com/security/research/tra-2019-31 -CVE-2019-12986 - https://www.tenable.com/security/research/tra-2019-31 -CVE-2019-12987 - https://www.tenable.com/security/research/tra-2019-31 -CVE-2019-12988 - https://www.tenable.com/security/research/tra-2019-31 -CVE-2019-12989 - http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html -CVE-2019-12989 - https://www.tenable.com/security/research/tra-2019-32 -CVE-2019-12990 - https://www.tenable.com/security/research/tra-2019-31 -CVE-2019-12991 - http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html -CVE-2019-12991 - https://www.tenable.com/security/research/tra-2019-32 -CVE-2019-12992 - https://www.tenable.com/security/research/tra-2019-31 -CVE-2019-12997 - https://github.com/icon-project/loopchain/issues/231 -CVE-2019-13021 - https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ -CVE-2019-13022 - https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ -CVE-2019-13023 - https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ -CVE-2019-13024 - http://packetstormsecurity.com/files/153504/Centreon-19.04-Remote-Code-Execution.html -CVE-2019-13025 - https://xitan.me/posts/connect-box-ch7465lg-rce/ -CVE-2019-13029 - http://packetstormsecurity.com/files/153691/REDCap-Cross-Site-Scripting.html -CVE-2019-13030 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-06-29-CVE-2019-13030.md -CVE-2019-13035 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-008.md -CVE-2019-13038 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-13045 - http://packetstormsecurity.com/files/153480/Slackware-Security-Advisory-irssi-Updates.html -CVE-2019-13045 - https://seclists.org/bugtraq/2019/Jun/41 -CVE-2019-13050 - https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f -CVE-2019-13052 - https://www.youtube.com/watch?v=GRJ7i2J_Y80 -CVE-2019-13053 - https://www.youtube.com/watch?v=EksyCO0DzYs -CVE-2019-13055 - https://www.youtube.com/watch?v=5z_PEZ5PyeA -CVE-2019-13056 - http://packetstormsecurity.com/files/153492/CyberPanel-1.8.4-Cross-Site-Request-Forgery.html -CVE-2019-13057 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-13057 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-13057 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-13063 - https://www.exploit-db.com/exploits/47062 -CVE-2019-13066 - https://packetstormsecurity.com/files/154985/Sahi-Pro-8.x-Cross-Site-Scripting.html -CVE-2019-13068 - http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html -CVE-2019-13069 - https://www.fobz.net/adv/ag47ex/info.html -CVE-2019-13070 - https://www.exploit-db.com/exploits/47059 -CVE-2019-13071 - http://packetstormsecurity.com/files/153581/PowerPanel-Business-Edition-3.4.0-Cross-Site-Request-Forgery.html -CVE-2019-13072 - https://www.exploit-db.com/exploits/47060 -CVE-2019-13075 - https://hackerone.com/reports/588239 -CVE-2019-13096 - https://pastebin.com/raw/08REmV1X -CVE-2019-13096 - https://pastebin.com/raw/J9B8Lh0j -CVE-2019-13097 - https://pastebin.com/WkkGk0tw -CVE-2019-13098 - https://pastebin.com/a5VhaxYn -CVE-2019-13098 - https://pastebin.com/raw/rVGbwSw0 -CVE-2019-13099 - https://pastebin.com/SgVPb7Lb -CVE-2019-13100 - https://pastebin.com/Gdd0Shgr -CVE-2019-13101 - http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html -CVE-2019-13103 - https://github.com/u-boot/u-boot/commits/master -CVE-2019-13104 - https://github.com/u-boot/u-boot/commits/master -CVE-2019-13105 - https://github.com/u-boot/u-boot/commits/master -CVE-2019-13106 - https://github.com/u-boot/u-boot/commits/master -CVE-2019-13108 - https://github.com/Exiv2/exiv2/issues/789 -CVE-2019-13109 - https://github.com/Exiv2/exiv2/issues/790 -CVE-2019-13110 - https://github.com/Exiv2/exiv2/issues/843 -CVE-2019-13111 - https://github.com/Exiv2/exiv2/issues/791 -CVE-2019-13112 - https://github.com/Exiv2/exiv2/issues/845 -CVE-2019-13113 - https://github.com/Exiv2/exiv2/issues/841 -CVE-2019-13115 - http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html -CVE-2019-13117 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-13118 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-13127 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-032.txt -CVE-2019-13131 - https://www.exploit-db.com/exploits/47030 -CVE-2019-13132 - https://github.com/zeromq/libzmq/issues/3558 -CVE-2019-13132 - https://usn.ubuntu.com/4050-1/ -CVE-2019-13140 - http://packetstormsecurity.com/files/154494/Inteno-IOPSYS-Gateway-3DES-Key-Extraction-Improper-Access.html -CVE-2019-13140 - https://www.exploit-db.com/docs/47397 -CVE-2019-13140 - https://www.exploit-db.com/exploits/47390 -CVE-2019-13143 - http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure/ -CVE-2019-13147 - https://github.com/mpruett/audiofile/issues/54 -CVE-2019-13164 - https://usn.ubuntu.com/4191-1/ -CVE-2019-13181 - http://packetstormsecurity.com/files/155673/Serv-U-FTP-Server-15.1.7-CSV-Injection.html -CVE-2019-13181 - http://seclists.org/fulldisclosure/2019/Dec/33 -CVE-2019-13182 - http://packetstormsecurity.com/files/155672/Serv-U-FTP-Server-15.1.7-Persistent-Cross-Site-Scripting.html -CVE-2019-13182 - http://seclists.org/fulldisclosure/2019/Dec/32 -CVE-2019-13183 - https://discuss.flarum.org/d/20606-flarum-0-1-0-beta-9-released -CVE-2019-13186 - https://github.com/bg5sbk/MiniCMS/issues/31 -CVE-2019-13208 - https://versprite.com/blog/security-research/windows-registry/ -CVE-2019-1322 - http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html -CVE-2019-13226 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 -CVE-2019-13227 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 -CVE-2019-13228 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 -CVE-2019-13229 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 -CVE-2019-13233 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html -CVE-2019-13233 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 -CVE-2019-13233 - https://usn.ubuntu.com/4118-1/ -CVE-2019-13234 - http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html -CVE-2019-13235 - http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html -CVE-2019-13236 - http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html -CVE-2019-13237 - http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html -CVE-2019-13241 - https://github.com/Sigil-Ebook/flightcrew/issues/52 -CVE-2019-13242 - https://github.com/apriorit/pentesting/blob/master/bugs/irfanview/0x0000000000013a98.md -CVE-2019-13272 - http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html -CVE-2019-13272 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-13272 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-13272 - http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html -CVE-2019-13272 - http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html -CVE-2019-13272 - http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html -CVE-2019-13272 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 -CVE-2019-13272 - https://usn.ubuntu.com/4118-1/ -CVE-2019-13275 - https://wpvulndb.com/vulnerabilities/9412 -CVE-2019-13285 - https://www.esecforte.com/endpoint-protector-india-cososys-dlp/ -CVE-2019-13291 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41818 -CVE-2019-13292 - https://www.exploit-db.com/exploits/47013 -CVE-2019-13294 - http://www.pentest.com.tr/exploits/AROX-School-ERP-Pro-Unauthenticated-RCE-Metasploit.html -CVE-2019-13294 - https://www.exploit-db.com/exploits/46999 -CVE-2019-13299 - https://github.com/ImageMagick/ImageMagick/issues/1610 -CVE-2019-1332 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-1332-Cross-Site%20Scripting-Microsoft%20SQL%20Server%20Reporting%20Services -CVE-2019-13336 - http://noahclements.com/Improper-Input-Validation-on-dbell-Smart-Doorbell-Can-Lead-To-Attackers-Remotely-Unlocking-Door/ -CVE-2019-13336 - https://www.reddit.com/r/AskNetsec/comments/c9p22m/company_threatening_to_sue_me_if_i_publicly/ -CVE-2019-13336 - https://www.youtube.com/watch?v=SkTKt1nV57I -CVE-2019-13339 - https://github.com/bg5sbk/MiniCMS/issues/32 -CVE-2019-13340 - https://github.com/bg5sbk/MiniCMS/issues/32 -CVE-2019-13341 - https://github.com/bg5sbk/MiniCMS/issues/32 -CVE-2019-13343 - https://www.gosecure.net/blog/2019/09/30/butor-portal-arbitrary-file-download-vulnerability-cve-2019-13343 -CVE-2019-13344 - http://packetstormsecurity.com/files/153541/WordPress-Like-Button-1.6.0-Authentication-Bypass.html -CVE-2019-13344 - https://limbenjamin.com/articles/wp-like-button-auth-bypass.html -CVE-2019-13344 - https://wpvulndb.com/vulnerabilities/9432 -CVE-2019-13346 - https://www.exploit-db.com/exploits/47109 -CVE-2019-13347 - https://marketplace.atlassian.com/apps/1212129/saml-single-sign-on-sso-confluence?hosting=server&tab=overview -CVE-2019-13352 - http://packetstormsecurity.com/files/153530/WolfVision-Cynap-1.18g-1.28j-Hardcoded-Credential.html -CVE-2019-13352 - http://seclists.org/fulldisclosure/2019/Jul/9 -CVE-2019-13352 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt -CVE-2019-13358 - http://packetstormsecurity.com/files/164253/OpenCats-0.9.4-2-XML-Injection.html -CVE-2019-13359 - http://packetstormsecurity.com/files/153666/CentOS-Control-Web-Panel-0.9.8.836-Privilege-Escalation.html -CVE-2019-13360 - http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html -CVE-2019-13361 - https://github.com/lodi-g/CVE-2019-13361/ -CVE-2019-13363 - http://packetstormsecurity.com/files/154484/Piwigo-2.9.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2019-13364 - http://packetstormsecurity.com/files/154484/Piwigo-2.9.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2019-13370 - https://github.com/ignitedcms/ignitedcms/issues/7 -CVE-2019-13372 - http://packetstormsecurity.com/files/158904/D-Link-Central-WiFi-Manager-CWM-100-Remote-Code-Execution.html -CVE-2019-13372 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md -CVE-2019-13372 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ -CVE-2019-13373 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md -CVE-2019-13373 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ -CVE-2019-13374 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md -CVE-2019-13374 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ -CVE-2019-13375 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md -CVE-2019-13375 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ -CVE-2019-13376 - https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss -CVE-2019-13379 - https://jordonlovik.wordpress.com/2019/07/06/roomalert-by-avtech-critical-vulnerability-disclosure/ -CVE-2019-13379 - https://www.youtube.com/watch?v=X1PY7kMFkVg -CVE-2019-13382 - https://posts.specterops.io/cve-2019-13382-local-privilege-escalation-in-snagit-abe5f31c349 -CVE-2019-13383 - http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-User-Enumeration.html -CVE-2019-13385 - http://packetstormsecurity.com/files/153877/CentOS-Control-Web-Panel-0.9.8.840-User-Enumeration.html -CVE-2019-13386 - http://packetstormsecurity.com/files/153876/CentOS-Control-Web-Panel-0.9.8.836-Remote-Command-Execution.html -CVE-2019-13387 - http://packetstormsecurity.com/files/153878/CentOS-Control-Web-Panel-0.9.8.846-Cross-Site-Scripting.html -CVE-2019-13396 - http://getflightpath.com/node/2650 -CVE-2019-13396 - http://packetstormsecurity.com/files/153626/FlightPath-Local-File-Inclusion.html -CVE-2019-13397 - https://medium.com/@sarapremashish/osticket-1-10-1-unauthenticated-stored-xss-allows-an-attacker-to-gain-admin-privileges-6a0348761a3a -CVE-2019-13398 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ -CVE-2019-13399 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ -CVE-2019-13400 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ -CVE-2019-13401 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ -CVE-2019-13402 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ -CVE-2019-13403 - https://github.com/B3Bo1d/CVE-2019-13403/ -CVE-2019-13405 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md -CVE-2019-13406 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md -CVE-2019-13407 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md -CVE-2019-13408 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md -CVE-2019-13413 - https://wpvulndb.com/vulnerabilities/9430 -CVE-2019-13414 - https://wpvulndb.com/vulnerabilities/9430 -CVE-2019-13415 - https://search-guard.com/cve-advisory/ -CVE-2019-13416 - https://search-guard.com/cve-advisory/ -CVE-2019-13417 - https://search-guard.com/cve-advisory/ -CVE-2019-13418 - https://search-guard.com/cve-advisory/ -CVE-2019-13419 - https://search-guard.com/cve-advisory/ -CVE-2019-13420 - https://search-guard.com/cve-advisory/ -CVE-2019-13421 - https://search-guard.com/cve-advisory/ -CVE-2019-13421 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SySS-2018-025.txt -CVE-2019-13422 - https://search-guard.com/cve-advisory/ -CVE-2019-13423 - https://search-guard.com/cve-advisory/ -CVE-2019-1343 - http://packetstormsecurity.com/files/154798/Microsoft-Windows-Kernel-nt-MiOffsetToProtos-NULL-Pointer-Dereference.html -CVE-2019-1344 - http://packetstormsecurity.com/files/154799/Microsoft-Windows-Kernel-CI-CipFixImageType-Out-Of-Bounds-Read.html -CVE-2019-13449 - https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5 -CVE-2019-1345 - http://packetstormsecurity.com/files/154800/Microsoft-Windows-Kernel-nt-MiParseImageLoadConfig-Out-Of-Bounds-Read.html -CVE-2019-13450 - https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5 -CVE-2019-13450 - https://news.ycombinator.com/item?id=20387298 -CVE-2019-1346 - http://packetstormsecurity.com/files/154801/Microsoft-Windows-Kernel-CI-HashKComputeFirstPageHash-Out-Of-Bounds-Read.html -CVE-2019-13462 - https://www.lansweeper.com/forum/yaf_topics33_Announcements.aspx -CVE-2019-13466 - https://www.westerndigital.com/support/productsecurity/wdc-19009-sandisk-and-western-digital-ssd-dashboard-vulnerabilities -CVE-2019-13467 - https://www.westerndigital.com/support/productsecurity/wdc-19009-sandisk-and-western-digital-ssd-dashboard-vulnerabilities -CVE-2019-1347 - http://packetstormsecurity.com/files/154802/Microsoft-Windows-Kernel-nt-MiRelocateImage-Out-Of-Bounds-Read.html -CVE-2019-13472 - https://www.vulnerability-lab.com/get_content.php?id=2184 -CVE-2019-13473 - http://packetstormsecurity.com/files/154416/Dabman-And-Imperial-Web-Radio-Devices-Undocumented-Telnet-Backdoor.html -CVE-2019-13473 - http://packetstormsecurity.com/files/174503/Internet-Radio-auna-IR-160-SE-UIProto-DoS-XSS-Missing-Authentication.html -CVE-2019-13473 - https://www.vulnerability-lab.com/get_content.php?id=2183 -CVE-2019-13474 - http://packetstormsecurity.com/files/174503/Internet-Radio-auna-IR-160-SE-UIProto-DoS-XSS-Missing-Authentication.html -CVE-2019-13474 - http://seclists.org/fulldisclosure/2019/Sep/12 -CVE-2019-13474 - https://www.vulnerability-lab.com/get_content.php?id=2183 -CVE-2019-13475 - https://www.vulnerability-lab.com/get_content.php?id=2186 -CVE-2019-13476 - http://packetstormsecurity.com/files/154216/CentOS-7.6.1810-Control-Web-Panel-0.9.8.837-Cross-Site-Scripting.html -CVE-2019-13477 - http://packetstormsecurity.com/files/154217/CentOS-7.6.1810-Control-Web-Panel-0.9.8.837-Cross-Site-Request-Forgery.html -CVE-2019-13477 - https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13477.md -CVE-2019-13478 - https://wpvulndb.com/vulnerabilities/9445 -CVE-2019-13481 - https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-3.pdf -CVE-2019-13488 - https://github.com/jofpin/trape/issues/169 -CVE-2019-13489 - https://github.com/jofpin/trape/issues/168 -CVE-2019-13493 - http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html -CVE-2019-13494 - http://packetstormsecurity.com/files/153612/SNMPc-Enterprise-Edition-9-10-Mapping-Filename-Buffer-Overflow.html -CVE-2019-13494 - https://www.mogozobo.com/?p=3534 -CVE-2019-13505 - https://wpvulndb.com/vulnerabilities/9458 -CVE-2019-13506 - https://github.com/nuxt/devalue/pull/8 -CVE-2019-13507 - https://www.exploit-db.com/exploits/47034 -CVE-2019-13529 - http://packetstormsecurity.com/files/154789/SMA-Solar-Technology-AG-Sunny-WebBox-1.6-Cross-Site-Request-Forgery.html -CVE-2019-13549 - http://seclists.org/fulldisclosure/2019/Oct/46 -CVE-2019-13553 - http://seclists.org/fulldisclosure/2019/Oct/45 -CVE-2019-13564 - http://packetstormsecurity.com/files/154274/Ping-Identity-Agentless-Integration-Kit-Cross-Site-Scripting.html -CVE-2019-13564 - http://seclists.org/fulldisclosure/2019/Aug/33 -CVE-2019-13564 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190305-01_Ping_Identity_Agentless_Integration_Kit_Reflected_XSS -CVE-2019-13565 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-13565 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-13566 - https://github.com/ros/ros_comm/issues/1752 -CVE-2019-13567 - https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b -CVE-2019-13569 - https://wpvulndb.com/vulnerabilities/9467 -CVE-2019-13570 - https://ajdg.solutions/2019/07/11/adrotate-pro-5-3-important-update-for-security-and-ads-txt/ -CVE-2019-13570 - https://wpvulndb.com/vulnerabilities/9475 -CVE-2019-13571 - https://github.com/beerpwn/ctf/blob/master/CVE/CVE-2019-13571/report.pdf -CVE-2019-13571 - https://github.com/beerpwn/ctf/tree/master/CVE/CVE-2019-13571 -CVE-2019-13571 - https://wpvulndb.com/vulnerabilities/9479 -CVE-2019-13572 - https://wpvulndb.com/vulnerabilities/9476 -CVE-2019-13573 - https://wpvulndb.com/vulnerabilities/9451 -CVE-2019-13575 - https://wpvulndb.com/vulnerabilities/9466 -CVE-2019-13577 - http://hyp3rlinx.altervista.org -CVE-2019-13577 - http://packetstormsecurity.com/files/153675/MAPLE-Computer-WBT-SNMP-Administrator-2.0.195.15-Buffer-Overflow.html -CVE-2019-13577 - http://seclists.org/fulldisclosure/2019/Jul/17 -CVE-2019-13577 - https://seclists.org/bugtraq/2019/Jul/29 -CVE-2019-13578 - https://wpvulndb.com/vulnerabilities/9504 -CVE-2019-13584 - http://packetstormsecurity.com/files/153672/FANUC-Robotics-Virtual-Robot-Controller-8.23-Path-Traversal.html -CVE-2019-13584 - https://seclists.org/bugtraq/2019/Jul/23 -CVE-2019-13584 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-025.txt -CVE-2019-13585 - http://packetstormsecurity.com/files/153671/FANUC-Robotics-Virtual-Robot-Controller-8.23-Buffer-Overflow.html -CVE-2019-13585 - https://seclists.org/bugtraq/2019/Jul/24 -CVE-2019-13585 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-024.txt -CVE-2019-13597 - https://pentest.com.tr/exploits/Sahi-Pro-v8-x-Unauthenticated-RCE-Exploit-Python.html -CVE-2019-13597 - https://www.exploit-db.com/exploits/47110 -CVE-2019-13599 - http://packetstormsecurity.com/files/154164/CentOS-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html -CVE-2019-13599 - http://packetstormsecurity.com/files/154164/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html -CVE-2019-13599 - http://packetstormsecurity.com/files/154164/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html -CVE-2019-13603 - https://github.com/sungjungk/fp-scanner-hacking -CVE-2019-13603 - https://www.youtube.com/watch?v=Grirez2xeas -CVE-2019-13603 - https://www.youtube.com/watch?v=wEXJDyEOatM -CVE-2019-13604 - https://github.com/sungjungk/fp-img-key-crack -CVE-2019-13604 - https://www.youtube.com/watch?v=7tKJQdKRm2k -CVE-2019-13604 - https://www.youtube.com/watch?v=BwYK_xZlKi4 -CVE-2019-13605 - http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html -CVE-2019-13605 - https://www.exploit-db.com/exploits/47123 -CVE-2019-13607 - https://blog.rakeshmane.com/2019/07/u-xss-in-operamini-for-ios-browser-0-day.html -CVE-2019-13612 - http://lists.altn.com/WebX/.59862f3c -CVE-2019-13616 - https://bugzilla.libsdl.org/show_bug.cgi?id=4538 -CVE-2019-13617 - https://github.com/nginx/njs/issues/174 -CVE-2019-13623 - http://packetstormsecurity.com/files/154015/Ghidra-Linux-9.0.4-Arbitrary-Code-Execution.html -CVE-2019-13625 - https://github.com/NationalSecurityAgency/ghidra/issues/71 -CVE-2019-13625 - https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/ -CVE-2019-13626 - https://bugzilla.libsdl.org/show_bug.cgi?id=4522 -CVE-2019-13627 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-13628 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-13628 - https://tches.iacr.org/index.php/TCHES/article/view/7337 -CVE-2019-13629 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-13629 - https://tches.iacr.org/index.php/TCHES/article/view/7337 -CVE-2019-13631 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-13631 - https://usn.ubuntu.com/4115-1/ -CVE-2019-13631 - https://usn.ubuntu.com/4118-1/ -CVE-2019-13633 - https://github.com/Security-AVS/CVE-2019-13633 -CVE-2019-13635 - http://packetstormsecurity.com/files/153821/WordPress-WP-Fastest-Cache-0.8.9.5-Directory-Traversal.html -CVE-2019-13635 - https://wpvulndb.com/vulnerabilities/9507 -CVE-2019-13636 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html -CVE-2019-13636 - https://github.com/irsl/gnu-patch-vulnerabilities -CVE-2019-13636 - https://seclists.org/bugtraq/2019/Aug/29 -CVE-2019-13637 - https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-009.md -CVE-2019-13638 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html -CVE-2019-13638 - https://github.com/irsl/gnu-patch-vulnerabilities -CVE-2019-13638 - https://seclists.org/bugtraq/2019/Aug/29 -CVE-2019-1364 - http://packetstormsecurity.com/files/154797/Microsoft-Windows-Kernel-win32k.sys-TTF-Font-Processing-win32k-ulClearTypeFilter-Pool-Corruption.html -CVE-2019-13643 - https://github.com/espocrm/espocrm/issues/1349 -CVE-2019-13644 - https://github.com/firefly-iii/firefly-iii/issues/2335 -CVE-2019-13645 - https://github.com/firefly-iii/firefly-iii/issues/2337 -CVE-2019-13646 - https://github.com/firefly-iii/firefly-iii/issues/2339 -CVE-2019-13647 - https://github.com/firefly-iii/firefly-iii/issues/2338 -CVE-2019-13648 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-13648 - https://usn.ubuntu.com/4115-1/ -CVE-2019-13656 - http://packetstormsecurity.com/files/154418/CA-Common-Services-Distributed-Intelligence-Architecture-DIA-Code-Execution.html -CVE-2019-13657 - http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitary-Command-Execution.html -CVE-2019-13657 - http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitrary-Command-Execution.html -CVE-2019-13658 - http://packetstormsecurity.com/files/154739/CA-Network-Flow-Analysis-9.x-10.0.x-Remote-Command-Execution.html -CVE-2019-13720 - http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html -CVE-2019-13734 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-13767 - http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html -CVE-2019-13916 - https://github.com/seemoo-lab/frankenstein/blob/master/doc/CVE_2019_13916.md -CVE-2019-13954 - http://packetstormsecurity.com/files/153733/Mikrotik-RouterOS-Resource-Stack-Exhaustion.html -CVE-2019-13954 - https://seclists.org/fulldisclosure/2019/Jul/20 -CVE-2019-13955 - http://packetstormsecurity.com/files/153733/Mikrotik-RouterOS-Resource-Stack-Exhaustion.html -CVE-2019-13955 - https://seclists.org/fulldisclosure/2019/Jul/20 -CVE-2019-13961 - https://github.com/flatCore/flatCore-CMS/issues/39 -CVE-2019-13971 - https://cisk123456.blogspot.com/2019/05/otcms-xss.html -CVE-2019-13972 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ -CVE-2019-13973 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ -CVE-2019-13974 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ -CVE-2019-13976 - https://medium.com/@dr.spitfire/bypass-file-upload-restrictions-cve-2019-13976-35682bd1fdd3 -CVE-2019-13977 - http://packetstormsecurity.com/files/153737/Ovidentia-8.4.3-Cross-Site-Scripting.html -CVE-2019-13977 - https://github.com/Kitsun3Sec/exploits/blob/master/cms/ovidentia/exploitXSSOvidentia.txt -CVE-2019-13978 - http://packetstormsecurity.com/files/153738/Ovidentia-8.4.3-SQL-Injection.html -CVE-2019-13978 - https://github.com/Kitsun3Sec/exploits/blob/master/cms/ovidentia/exploitSQLIOvidentia.txt -CVE-2019-13990 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-13990 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-13990 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-13990 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-13990 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-13990 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-13992 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-13994 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-13995 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-13998 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-13999 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14000 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14001 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14002 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14003 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14004 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14005 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14006 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14007 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14008 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14009 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14010 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14011 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14012 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14013 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14014 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14015 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14016 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14017 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14018 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14019 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14020 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14021 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14022 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14023 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14024 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14025 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14026 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14027 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14028 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14029 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14030 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14031 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14032 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14033 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14034 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14036 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-14037 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14038 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14039 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14040 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14041 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14042 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14043 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14044 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14045 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14046 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14047 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14048 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14049 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-1405 - http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html -CVE-2019-14050 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14051 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14052 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14053 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14054 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14055 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14056 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14057 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14060 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14061 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14062 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14063 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14065 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14066 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14067 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14068 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14070 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14071 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14072 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14073 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14074 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14075 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14076 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14077 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14078 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14079 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14080 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14081 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14082 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14083 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14085 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14086 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14087 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2019-14088 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin -CVE-2019-14089 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14091 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14092 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14093 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14094 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2019-14095 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14097 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14098 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-14099 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14100 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14101 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14104 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14105 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14110 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14111 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14112 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14113 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14114 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14115 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14116 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14117 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14119 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2019-14122 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14123 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14124 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14127 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14130 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2019-14131 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14132 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14134 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14135 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2019-14205 - https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown -CVE-2019-14205 - https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html -CVE-2019-14205 - https://wpvulndb.com/vulnerabilities/9468 -CVE-2019-14206 - https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown -CVE-2019-14206 - https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html -CVE-2019-14206 - https://wpvulndb.com/vulnerabilities/9468 -CVE-2019-14216 - https://wpvulndb.com/vulnerabilities/9510 -CVE-2019-14216 - https://zeroauth.ltd/blog/2019/08/09/cve-2019-14216-svg-vector-icon-plugin-wordpress-plugin-vulnerable-to-csrf-and-arbitrary-file-upload-leading-to-remote-code-execution/ -CVE-2019-14221 - https://github.com/cccaaasser/1CRM-CVE/blob/master/CVE-2019-14221.md -CVE-2019-14221 - https://www.exploit-db.com/exploits/47206 -CVE-2019-14225 - http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html -CVE-2019-14225 - https://seclists.org/fulldisclosure/2019/Oct/25 -CVE-2019-14226 - http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html -CVE-2019-14226 - https://seclists.org/fulldisclosure/2019/Oct/25 -CVE-2019-14227 - http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html -CVE-2019-14227 - http://seclists.org/fulldisclosure/2019/Oct/25 -CVE-2019-14228 - https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ -CVE-2019-14230 - http://www.openwall.com/lists/oss-security/2019/07/23/1 -CVE-2019-14230 - https://www.openwall.com/lists/oss-security/2019/07/21/1 -CVE-2019-14231 - http://www.openwall.com/lists/oss-security/2019/07/23/1 -CVE-2019-14231 - https://www.openwall.com/lists/oss-security/2019/07/21/1 -CVE-2019-14243 - https://caddy.community/t/dos-in-http-proxyprotocol-plugin/6014 -CVE-2019-14245 - http://packetstormsecurity.com/files/154155/CentOS-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html -CVE-2019-14245 - http://packetstormsecurity.com/files/154155/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html -CVE-2019-14245 - http://packetstormsecurity.com/files/154155/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html -CVE-2019-14246 - http://packetstormsecurity.com/files/154156/CentOS-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html -CVE-2019-14246 - http://packetstormsecurity.com/files/154156/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html -CVE-2019-14246 - http://packetstormsecurity.com/files/154156/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html -CVE-2019-14248 - https://bugzilla.nasm.us/show_bug.cgi?id=3392576 -CVE-2019-14250 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 -CVE-2019-14251 - https://github.com/kmkz/exploit/blob/master/CVE-2019-14251-TEMENOS-T24.txt -CVE-2019-14252 - https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt -CVE-2019-14253 - https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt -CVE-2019-14254 - https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt -CVE-2019-14257 - https://www.coalfire.com/The-Coalfire-Blog -CVE-2019-14257 - https://www.coalfire.com/The-Coalfire-Blog/August-2019/Getting-more-from-a-compliance-test -CVE-2019-14258 - https://www.coalfire.com/The-Coalfire-Blog -CVE-2019-14258 - https://www.coalfire.com/The-Coalfire-Blog/August-2019/Getting-more-from-a-compliance-test -CVE-2019-14261 - http://packetstormsecurity.com/files/153780/ABUS-Secvest-3.01.01-Unchecked-Message-Transmission-Error-Condition.html -CVE-2019-14261 - http://seclists.org/fulldisclosure/2019/Jul/30 -CVE-2019-14261 - https://seclists.org/bugtraq/2019/Jul/52 -CVE-2019-14261 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-004.txt -CVE-2019-14267 - http://packetstormsecurity.com/files/153767/pdfresurrect-0.15-Buffer-Overflow.html -CVE-2019-14277 - https://www.exploit-db.com/exploits/47150 -CVE-2019-14280 - http://packetstormsecurity.com/files/154276/Craft-CMS-2.7.9-3.2.5-Information-Disclosure.html -CVE-2019-14283 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-14283 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html -CVE-2019-14283 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-14283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-14283 - https://usn.ubuntu.com/4115-1/ -CVE-2019-14283 - https://usn.ubuntu.com/4118-1/ -CVE-2019-14284 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-14284 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html -CVE-2019-14284 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-14284 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-14284 - https://usn.ubuntu.com/4115-1/ -CVE-2019-14284 - https://usn.ubuntu.com/4118-1/ -CVE-2019-14287 - http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html -CVE-2019-14288 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14288 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-14289 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14289 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-1429 - http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html -CVE-2019-14290 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14290 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-14291 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14291 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-14292 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14292 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-14293 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14293 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-14294 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -CVE-2019-14294 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -CVE-2019-14295 - https://github.com/upx/upx/issues/286 -CVE-2019-14296 - https://github.com/upx/upx/issues/287 -CVE-2019-14297 - https://www.exploit-db.com/exploits/46767 -CVE-2019-14298 - https://www.exploit-db.com/exploits/46766 -CVE-2019-14312 - http://packetstormsecurity.com/files/153985/Aptana-Jaxer-1.0.3.4547-Local-File-Inclusion.html -CVE-2019-14313 - https://wpvulndb.com/vulnerabilities/9480 -CVE-2019-14314 - https://wpvulndb.com/vulnerabilities/9816 -CVE-2019-14318 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-14318 - https://tches.iacr.org/index.php/TCHES/article/view/7337 -CVE-2019-14319 - https://play.google.com/store/apps/details?id=com.zhiliaoapp.musically&hl=en_US -CVE-2019-14322 - http://packetstormsecurity.com/files/163398/Pallets-Werkzeug-0.15.4-Path-Traversal.html -CVE-2019-14326 - https://github.com/seqred-s-a/cve-2019-14326 -CVE-2019-14327 - https://wpvulndb.com/vulnerabilities/9483 -CVE-2019-14328 - http://packetstormsecurity.com/files/153801/WordPress-Simple-Membership-3.8.4-Cross-Site-Request-Forgery.html -CVE-2019-14328 - https://wpvulndb.com/vulnerabilities/9482 -CVE-2019-14329 - http://www.cinquino.eu/EspoCRM.htm -CVE-2019-14330 - http://www.cinquino.eu/EspoCRM.htm -CVE-2019-14331 - http://www.cinquino.eu/EspoCRM.htm -CVE-2019-14332 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14333 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14334 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14335 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14336 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14337 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14338 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -CVE-2019-14339 - http://packetstormsecurity.com/files/154266/Canon-PRINT-2.5.5-URI-Injection.html -CVE-2019-14343 - http://packetstormsecurity.com/files/155376/TemaTres-3.0-Cross-Site-Scripting.html -CVE-2019-14343 - https://medium.com/@Pablo0xSantiago/cve-2019-14343-ebc120800053 -CVE-2019-14344 - https://medium.com/@Pablo0xSantiago/cve-2019-14344-tematres-3-0-cross-site-scripting-reflected-xss-3826a23c7fff -CVE-2019-14345 - https://medium.com/@Pablo0xSantiago/cve-2019-14345-ff6f6d9fd30f -CVE-2019-14346 - http://packetstormsecurity.com/files/153989/Adive-Framework-2.0.7-Cross-Site-Request-Forgery.html -CVE-2019-14347 - http://packetstormsecurity.com/files/155213/Adive-Framework-2.0.7-Privilege-Escalation.html -CVE-2019-14347 - https://hackpuntes.com/cve-2019-14347-escalacion-de-privilegios-en-adive/ -CVE-2019-14348 - http://packetstormsecurity.com/files/153963/WordPress-JoomSport-3.3-SQL-Injection.html -CVE-2019-14348 - https://wpvulndb.com/vulnerabilities/9499 -CVE-2019-14349 - https://github.com/espocrm/espocrm/issues/1358 -CVE-2019-14350 - https://github.com/espocrm/espocrm/issues/1356 -CVE-2019-14351 - https://github.com/espocrm/espocrm/issues/1357 -CVE-2019-14353 - https://blog.trezor.io/details-of-the-oled-vulnerability-and-its-mitigation-d331c4e2001a -CVE-2019-14355 - https://medium.com/shapeshift-stories/shapeshift-security-update-5b0dd45c93db -CVE-2019-14356 - https://blog.coinkite.com/noise-troll/ -CVE-2019-14363 - https://github.com/reevesrs24/CVE/blob/master/Netgear_WNDR2400v3/upnp_stack_overflow/upnp_stack_overflow.md -CVE-2019-14364 - https://github.com/ivoschyk-cs/CVE-s/blob/master/Email%20Subscribers%20%26%20Newsletters%20Wordpress%20Plugin%20(XSS) -CVE-2019-14364 - https://wpvulndb.com/vulnerabilities/9508 -CVE-2019-14368 - https://github.com/Exiv2/exiv2/issues/952 -CVE-2019-14369 - https://github.com/Exiv2/exiv2/issues/953 -CVE-2019-14370 - https://github.com/Exiv2/exiv2/issues/954 -CVE-2019-14371 - https://bugzilla.libav.org/show_bug.cgi?id=1163 -CVE-2019-14372 - https://bugzilla.libav.org/show_bug.cgi?id=1165 -CVE-2019-14373 - https://github.com/FLIF-hub/FLIF/issues/541 -CVE-2019-14378 - http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html -CVE-2019-14378 - https://usn.ubuntu.com/4191-1/ -CVE-2019-14379 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-14379 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-14379 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-14379 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-14379 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-14379 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-14415 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html -CVE-2019-14416 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html -CVE-2019-14417 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html -CVE-2019-14418 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html -CVE-2019-14422 - http://seclists.org/fulldisclosure/2019/Aug/7 -CVE-2019-14422 - https://www.vulnerability-lab.com/get_content.php?id=2188 -CVE-2019-14423 - https://noskill1337.github.io/homematic-with-cux-daemon-remote-code-execution -CVE-2019-14424 - https://noskill1337.github.io/homematic-with-cux-daemon-local-file-inclusion -CVE-2019-14427 - https://www.exploit-db.com/exploits/47198 -CVE-2019-14430 - https://www.exploit-db.com/exploits/47294 -CVE-2019-14432 - https://thomask.sdf.org/blog/2019/08/07/cve-2019-14432-loom-desktop-rce-vulnerability.html -CVE-2019-14439 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-14439 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-14439 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-14439 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-14441 - https://bugzilla.libav.org/show_bug.cgi?id=1161#c0 -CVE-2019-14442 - https://bugzilla.libav.org/show_bug.cgi?id=1159 -CVE-2019-14443 - https://bugzilla.libav.org/show_bug.cgi?id=1161#c1 -CVE-2019-14444 - https://sourceware.org/bugzilla/show_bug.cgi?id=24829 -CVE-2019-14452 - https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505967936 -CVE-2019-14452 - https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505997355 -CVE-2019-14467 - http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-Remote-Code-Execution.html -CVE-2019-14467 - https://seclists.org/fulldisclosure/2019/Nov/13 -CVE-2019-14467 - https://wpvulndb.com/vulnerabilities/9952 -CVE-2019-14469 - https://support.sonatype.com/hc/en-us/articles/360033999733-CVE-2019-14469-Nexus-Repository-Manager-3-Cross-Site-Scripting-XSS-2019-07-26 -CVE-2019-14470 - http://packetstormsecurity.com/files/154206/WordPress-UserPro-4.9.32-Cross-Site-Scripting.html -CVE-2019-14470 - https://wpvulndb.com/vulnerabilities/9815 -CVE-2019-14470 - https://www.exploit-db.com/exploits/47304 -CVE-2019-14471 - https://code610.blogspot.com/2019/07/xss-in-testlink-1919.html -CVE-2019-14472 - https://code610.blogspot.com/2019/07/xss-in-zurmo-crm.html -CVE-2019-14478 - https://compass-security.com/fileadmin/Research/Advisories/2020-12_CSNC-2019-013_AdRem_NetCrunch_Cross-Site_Scripting_XSS.txt -CVE-2019-14481 - https://compass-security.com/fileadmin/Research/Advisories/2020-15_CSNC-2019-016_AdRem_NetCrunch_Cross-Site_Request_Forgery_CSRF.txt -CVE-2019-14492 - https://github.com/opencv/opencv/issues/15124 -CVE-2019-14494 - https://gitlab.freedesktop.org/poppler/poppler/issues/802 -CVE-2019-14510 - https://lockstepgroup.com/blog/abusing-the-kaseya-lan-cache-fsadmin/ -CVE-2019-14511 - https://sphinxsearch.com/blog/ -CVE-2019-14513 - https://github.com/Slovejoy/dnsmasq-pre2.76 -CVE-2019-14517 - https://github.com/pandao/editor.md/issues/709 -CVE-2019-14518 - https://github.com/evolution-cms/evolution/issues/1041 -CVE-2019-14518 - https://github.com/evolution-cms/evolution/issues/1042 -CVE-2019-14525 - https://github.com/OctopusDeploy/Issues/issues/5754 -CVE-2019-14530 - http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html -CVE-2019-14530 - http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html -CVE-2019-14531 - https://github.com/sleuthkit/sleuthkit/issues/1576 -CVE-2019-14532 - https://github.com/sleuthkit/sleuthkit/issues/1575 -CVE-2019-14537 - https://github.com/Wocanilo/CVE-2019-14537 -CVE-2019-14540 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-14540 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-14540 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-14540 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-14540 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-14546 - https://gauravnarwani.com/publications/CVE-2019-14546/ -CVE-2019-14547 - https://gauravnarwani.com/publications/cve-2019-14547/ -CVE-2019-14548 - https://gauravnarwani.com/publications/cve-2019-14548/ -CVE-2019-14549 - https://gauravnarwani.com/publications/cve-2019-14549/ -CVE-2019-14550 - https://gauravnarwani.com/publications/cve-2019-14550/ -CVE-2019-14551 - https://griffinbyatt.com/2019/08/02/Das-Vulnerabilities.html -CVE-2019-1458 - http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html -CVE-2019-1458 - http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html -CVE-2019-14615 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-14615 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html -CVE-2019-14615 - https://usn.ubuntu.com/4253-1/ -CVE-2019-14615 - https://usn.ubuntu.com/4287-2/ -CVE-2019-14664 - https://sourceforge.net/p/enigmail/bugs/984/ -CVE-2019-14666 - https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt -CVE-2019-14667 - https://github.com/firefly-iii/firefly-iii/issues/2363 -CVE-2019-14668 - https://github.com/firefly-iii/firefly-iii/issues/2364 -CVE-2019-14669 - https://github.com/firefly-iii/firefly-iii/issues/2366 -CVE-2019-14670 - https://github.com/firefly-iii/firefly-iii/issues/2365 -CVE-2019-14678 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14678-Unsafe%20XML%20Parsing-SAS%20XML%20Mapper -CVE-2019-14680 - https://wpvulndb.com/vulnerabilities/9551 -CVE-2019-14682 - https://wpvulndb.com/vulnerabilities/9399 -CVE-2019-14683 - https://wpvulndb.com/vulnerabilities/9392 -CVE-2019-14684 - https://safebreach.com/Post/Trend-Micro-Password-Manager-Privilege-Escalation-to-SYSTEM -CVE-2019-14685 - http://packetstormsecurity.com/files/154200/Trend-Maximum-Security-2019-Unquoted-Search-Path.html -CVE-2019-14685 - http://seclists.org/fulldisclosure/2019/Aug/26 -CVE-2019-14685 - https://medium.com/sidechannel-br/vulnerabilidade-no-trend-micro-maximum-security-2019-permite-a-escala%C3%A7%C3%A3o-de-privil%C3%A9gios-no-windows-471403d53b68 -CVE-2019-14687 - https://medium.com/@infiniti_css/fa839acaad59 -CVE-2019-14694 - http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html -CVE-2019-14694 - https://github.com/SouhailHammou/Exploits/blob/master/CVE-2019-14694%20-%20Comodo%20AV%20Sandbox%20Race%20Condition%20UAF/comodo_av_uaf_poc.c -CVE-2019-14695 - https://wpvulndb.com/vulnerabilities/9495 -CVE-2019-14696 - http://packetstormsecurity.com/files/153984/Open-School-3.0-Community-Edition-2.3-Cross-Site-Scripting.html -CVE-2019-14698 - https://pastebin.com/PSyqqs1g -CVE-2019-14699 - https://pastebin.com/PSyqqs1g -CVE-2019-14700 - https://pastebin.com/PSyqqs1g -CVE-2019-14701 - https://pastebin.com/PSyqqs1g -CVE-2019-14702 - https://pastebin.com/PSyqqs1g -CVE-2019-14703 - https://pastebin.com/PSyqqs1g -CVE-2019-14704 - https://pastebin.com/PSyqqs1g -CVE-2019-14705 - https://pastebin.com/PSyqqs1g -CVE-2019-14706 - https://pastebin.com/PSyqqs1g -CVE-2019-14707 - https://pastebin.com/PSyqqs1g -CVE-2019-14708 - https://pastebin.com/PSyqqs1g -CVE-2019-14709 - https://pastebin.com/PSyqqs1g -CVE-2019-14721 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14722 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14723 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14724 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14725 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14726 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14727 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14728 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14729 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14730 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -CVE-2019-14737 - https://www.exploit-db.com/exploits/47493 -CVE-2019-14743 - https://amonitoring.ru/article/steamclient-0day/ -CVE-2019-14743 - https://habr.com/ru/company/pm/blog/462479/ -CVE-2019-14744 - http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html -CVE-2019-14744 - https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/ -CVE-2019-14745 - https://bananamafia.dev/post/r2-pwndebian/ -CVE-2019-14745 - https://github.com/radare/radare2/releases/tag/3.7.0 -CVE-2019-14747 - https://github.com/wkeyuan/DWSurvey/issues/47 -CVE-2019-14748 - http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html -CVE-2019-14748 - https://www.exploit-db.com/exploits/47224 -CVE-2019-14749 - http://packetstormsecurity.com/files/154004/osTicket-1.12-Formula-Injection.html -CVE-2019-14749 - https://www.exploit-db.com/exploits/47225 -CVE-2019-14750 - http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html -CVE-2019-14750 - https://www.exploit-db.com/exploits/47226 -CVE-2019-14751 - https://github.com/mssalvatore/CVE-2019-14751_PoC -CVE-2019-14751 - https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/ -CVE-2019-14756 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ -CVE-2019-14757 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ -CVE-2019-14758 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ -CVE-2019-1476 - http://packetstormsecurity.com/files/155653/AppXSvc-17763-Arbitrary-File-Overwrite.html -CVE-2019-14760 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ -CVE-2019-14761 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ -CVE-2019-14763 - https://usn.ubuntu.com/4115-1/ -CVE-2019-14763 - https://usn.ubuntu.com/4118-1/ -CVE-2019-14765 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 -CVE-2019-14766 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 -CVE-2019-14767 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 -CVE-2019-14768 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 -CVE-2019-14774 - https://wpvulndb.com/vulnerabilities/9855 -CVE-2019-14782 - https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html -CVE-2019-14783 - http://packetstormsecurity.com/files/154615/Samsung-Mobile-Android-FotaAgent-Arbitrary-File-Creation.html -CVE-2019-14783 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-14786 - https://wpvulndb.com/vulnerabilities/9375 -CVE-2019-14787 - https://wpvulndb.com/vulnerabilities/9447 -CVE-2019-14788 - https://wpvulndb.com/vulnerabilities/9447 -CVE-2019-14790 - https://wpvulndb.com/vulnerabilities/9517 -CVE-2019-14791 - https://wpvulndb.com/vulnerabilities/9426 -CVE-2019-14792 - https://wpvulndb.com/vulnerabilities/9442 -CVE-2019-14795 - https://wpvulndb.com/vulnerabilities/9516 -CVE-2019-14796 - https://wpvulndb.com/vulnerabilities/9515 -CVE-2019-14798 - https://wpvulndb.com/vulnerabilities/9361 -CVE-2019-14799 - https://wpvulndb.com/vulnerabilities/9278 -CVE-2019-14804 - http://packetstormsecurity.com/files/154018/UNA-10.0.0-RC1-Cross-Site-Scripting.html -CVE-2019-14808 - http://packetstormsecurity.com/files/154772/RENPHO-3.0.0-Information-Disclosure.html -CVE-2019-14810 - https://www.arista.com/en/support/advisories-notices -CVE-2019-14814 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-14814 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-14816 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-14816 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-14821 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-14821 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-14821 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-14822 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-14835 - http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html -CVE-2019-14835 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-14835 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-14835 - http://www.openwall.com/lists/oss-security/2019/09/24/1 -CVE-2019-14836 - https://bugzilla.redhat.com/show_bug.cgi?id=1847605 -CVE-2019-14862 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-14862 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-14862 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-14868 - http://seclists.org/fulldisclosure/2020/May/53 -CVE-2019-14882 - https://moodle.org/mod/forum/discuss.php?d=393585#p1586747 -CVE-2019-14889 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-14892 - https://github.com/FasterXML/jackson-databind/issues/2462 -CVE-2019-14893 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-14893 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-14895 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html -CVE-2019-14895 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-14896 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html -CVE-2019-14896 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-14897 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html -CVE-2019-14897 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-14898 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-14901 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html -CVE-2019-14901 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-14911 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-14912 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-14913 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-14914 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-14915 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-14916 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-14923 - https://www.exploit-db.com/exploits/47280 -CVE-2019-14925 - https://www.mogozobo.com/ -CVE-2019-14925 - https://www.mogozobo.com/?p=3593 -CVE-2019-14926 - https://www.mogozobo.com/ -CVE-2019-14926 - https://www.mogozobo.com/?p=3593 -CVE-2019-14927 - https://www.mogozobo.com/ -CVE-2019-14927 - https://www.mogozobo.com/?p=3593 -CVE-2019-14928 - https://www.mogozobo.com/ -CVE-2019-14928 - https://www.mogozobo.com/?p=3593 -CVE-2019-14929 - https://www.mogozobo.com/ -CVE-2019-14929 - https://www.mogozobo.com/?p=3593 -CVE-2019-14930 - https://www.mogozobo.com/ -CVE-2019-14930 - https://www.mogozobo.com/?p=3593 -CVE-2019-14931 - https://www.mogozobo.com/ -CVE-2019-14931 - https://www.mogozobo.com/?p=3593 -CVE-2019-14935 - https://www.3cx.com/community/threads/security-issue-with-3cx-windows-client-install.64432/ -CVE-2019-14943 - https://gitlab.com/gitlab-org/omnibus-gitlab/issues/4530 -CVE-2019-14945 - https://wpvulndb.com/vulnerabilities/9506 -CVE-2019-14946 - https://wpvulndb.com/vulnerabilities/9449 -CVE-2019-14947 - https://wpvulndb.com/vulnerabilities/9449 -CVE-2019-14948 - https://wpvulndb.com/vulnerabilities/9502 -CVE-2019-14949 - https://wpvulndb.com/vulnerabilities/9548 -CVE-2019-14969 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-010.md -CVE-2019-14973 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html -CVE-2019-14974 - https://www.exploit-db.com/exploits/47247 -CVE-2019-14978 - https://gkaim.com/cve-2019-14978-vikas-chaudhary/ -CVE-2019-14978 - https://wpvulndb.com/vulnerabilities/9959 -CVE-2019-14979 - https://gkaim.com/cve-2019-14979-vikas-chaudhary/ -CVE-2019-14982 - https://github.com/Exiv2/exiv2/issues/960 -CVE-2019-14994 - http://packetstormsecurity.com/files/154574/Jira-Service-Desk-Server-And-Data-Center-Path-Traversal.html -CVE-2019-14994 - https://samcurry.net/analysis-of-cve-2019-14994/ -CVE-2019-14995 - https://jira.atlassian.com/browse/JRASERVER-69792 -CVE-2019-14995 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836 -CVE-2019-14995 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837 -CVE-2019-14998 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 -CVE-2019-14999 - https://ecosystem.atlassian.net/browse/UPM-6044 -CVE-2019-15000 - http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html -CVE-2019-15001 - http://packetstormsecurity.com/files/154611/Jira-Server-Data-Center-Template-Injection.html -CVE-2019-15003 - http://packetstormsecurity.com/files/155214/Jira-Service-Desk-Server-Data-Center-Path-Traversal.html -CVE-2019-15004 - http://packetstormsecurity.com/files/155214/Jira-Service-Desk-Server-Data-Center-Path-Traversal.html -CVE-2019-15005 - https://herolab.usd.de/security-advisories/usd-2019-0016/ -CVE-2019-15006 - http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html -CVE-2019-15011 - https://ecosystem.atlassian.net/browse/APL-1386 -CVE-2019-15030 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 -CVE-2019-15031 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97 -CVE-2019-15033 - https://heitorgouvea.me/2019/09/17/CVE-2019-15033 -CVE-2019-15039 - http://packetstormsecurity.com/files/155874/JetBrains-TeamCity-2018.2.4-Remote-Code-Execution.html -CVE-2019-15043 - https://community.grafana.com/t/release-notes-v6-3-x/19202 -CVE-2019-15045 - http://packetstormsecurity.com/files/154183/Zoho-Corporation-ManageEngine-ServiceDesk-Plus-Information-Disclosure.html -CVE-2019-15045 - http://seclists.org/fulldisclosure/2019/Aug/17 -CVE-2019-15046 - http://packetstormsecurity.com/files/154183/Zoho-Corporation-ManageEngine-ServiceDesk-Plus-Information-Disclosure.html -CVE-2019-15046 - http://seclists.org/fulldisclosure/2019/Aug/17 -CVE-2019-15046 - https://seclists.org/bugtraq/2019/Aug/37 -CVE-2019-15047 - https://github.com/axiomatic-systems/bento4/issues/408 -CVE-2019-15048 - https://github.com/axiomatic-systems/bento4/issues/409 -CVE-2019-15049 - https://github.com/axiomatic-systems/bento4/issues/408 -CVE-2019-15050 - https://github.com/axiomatic-systems/bento4/issues/409 -CVE-2019-15051 - https://security.mioso.com/CVE-2019-15051-en.html -CVE-2019-15052 - https://github.com/gradle/gradle/pull/10176 -CVE-2019-15053 - https://github.com/l0nax/CVE-2019-15053 -CVE-2019-15054 - https://startrekdude.github.io/mailbird.html -CVE-2019-15055 - https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055 -CVE-2019-15055 - https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 -CVE-2019-15058 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973 -CVE-2019-15058 - https://github.com/nothings/stb/issues/790 -CVE-2019-15058 - https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1695025.html -CVE-2019-15062 - https://gauravnarwani.com/publications/CVE-2019-15062/ -CVE-2019-15081 - http://packetstormsecurity.com/files/154286/Opencart-3.x-Cross-Site-Scripting.html -CVE-2019-15081 - https://github.com/nipunsomani/Opencart-3.x.x-Authenticated-Stored-XSS/blob/master/README.md -CVE-2019-15082 - https://wpvulndb.com/vulnerabilities/9405 -CVE-2019-15083 - http://packetstormsecurity.com/files/157717/ManageEngine-Service-Desk-10.0-Cross-Site-Scripting.html -CVE-2019-15083 - https://www.exploit-db.com/exploits/48473 -CVE-2019-15084 - https://www.exploit-db.com/exploits/46416 -CVE-2019-15085 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-15086 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-15087 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-15088 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-15089 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas -CVE-2019-15090 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12 -CVE-2019-15090 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15090 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15092 - http://packetstormsecurity.com/files/154203/WordPress-Import-Export-WordPress-Users-1.3.1-CSV-Injection.html -CVE-2019-15092 - https://hackpuntes.com/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection/ -CVE-2019-15092 - https://wpvulndb.com/vulnerabilities/9704 -CVE-2019-15095 - https://github.com/wkeyuan/DWSurvey/issues/48 -CVE-2019-15098 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-15099 - https://usn.ubuntu.com/4287-2/ -CVE-2019-15102 - https://barriersec.com/2019/08/cve-2019-15102-sahi-pro/ -CVE-2019-15104 - http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Privilege-Escalation-Remote-Command-Execution.html -CVE-2019-15104 - https://www.exploit-db.com/exploits/47227 -CVE-2019-15105 - http://pentest.com.tr/exploits/DEFCON-ManageEngine-APM-v14-Privilege-Escalation-Remote-Command-Execution.html -CVE-2019-15105 - https://www.exploit-db.com/exploits/47228 -CVE-2019-15106 - http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html -CVE-2019-15106 - https://www.exploit-db.com/exploits/47229 -CVE-2019-15107 - http://packetstormsecurity.com/files/154141/Webmin-1.920-Remote-Command-Execution.html -CVE-2019-15107 - http://packetstormsecurity.com/files/154141/Webmin-Remote-Comman-Execution.html -CVE-2019-15107 - http://packetstormsecurity.com/files/154197/Webmin-1.920-password_change.cgi-Backdoor.html -CVE-2019-15107 - http://packetstormsecurity.com/files/154485/Webmin-1.920-Remote-Code-Execution.html -CVE-2019-15107 - http://www.pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html -CVE-2019-15107 - https://attackerkb.com/topics/hxx3zmiCkR/webmin-password-change-cgi-command-injection -CVE-2019-15107 - https://www.exploit-db.com/exploits/47230 -CVE-2019-15109 - https://wpvulndb.com/vulnerabilities/9554 -CVE-2019-15112 - https://wpvulndb.com/vulnerabilities/9285 -CVE-2019-15116 - https://wpvulndb.com/vulnerabilities/9334 -CVE-2019-15117 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-15118 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-15120 - https://github.com/h3llraiser/CVE-2019-15120 -CVE-2019-15123 - https://www.gosecure.net/blog/2020/06/11/vera-vulnerable-to-authenticated-remote-code-execution-cve-2019-15123/ -CVE-2019-15126 - http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html -CVE-2019-15126 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt -CVE-2019-15126 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure -CVE-2019-15128 - https://zeroauth.ltd/blog/2019/08/23/cve-2019-15128-if-svnadmin-through-1-6-2-allows-svnadmin-usercreate-php-csrf-to-create-a-user/ -CVE-2019-15129 - https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd -CVE-2019-15130 - https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd -CVE-2019-15134 - https://github.com/RIOT-OS/RIOT/pull/12001 -CVE-2019-15140 - https://github.com/ImageMagick/ImageMagick/issues/1554 -CVE-2019-15142 - https://usn.ubuntu.com/4198-1/ -CVE-2019-15143 - https://usn.ubuntu.com/4198-1/ -CVE-2019-15144 - https://usn.ubuntu.com/4198-1/ -CVE-2019-15145 - https://usn.ubuntu.com/4198-1/ -CVE-2019-15146 - https://github.com/gopro/gpmf-parser/issues/60 -CVE-2019-15147 - https://github.com/gopro/gpmf-parser/issues/60 -CVE-2019-15148 - https://github.com/gopro/gpmf-parser/issues/60 -CVE-2019-15150 - http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html -CVE-2019-15161 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15162 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15163 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15164 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15165 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15211 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 -CVE-2019-15211 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c666355e60ddb4748ead3bdd983e3f7f2224aaf0 -CVE-2019-15211 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15211 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15212 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 -CVE-2019-15212 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f -CVE-2019-15212 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15212 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15213 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-15213 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7 -CVE-2019-15214 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac -CVE-2019-15214 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7 -CVE-2019-15214 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15214 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15215 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 -CVE-2019-15215 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eff73de2b1600ad8230692f00bc0ab49b166512a -CVE-2019-15215 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15215 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15216 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef61eb43ada6c1d6b94668f0f514e4c268093ff3 -CVE-2019-15216 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15216 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15217 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-15217 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e -CVE-2019-15218 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 -CVE-2019-15218 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e -CVE-2019-15218 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15218 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15218 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-15219 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 -CVE-2019-15219 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a -CVE-2019-15220 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.1 -CVE-2019-15220 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e41e2257f1094acc37618bf6c856115374c6922 -CVE-2019-15220 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15220 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15221 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 -CVE-2019-15221 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710 -CVE-2019-15221 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15221 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15222 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.8 -CVE-2019-15222 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d78e1c2b7f4be00bbe62141603a631dc7812f35 -CVE-2019-15223 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 -CVE-2019-15223 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b074ab7fc0d575247b9cc9f93bb7e007ca38840 -CVE-2019-15229 - https://www.sevenlayers.com/index.php/238-fuelcms-1-4-4-csrf -CVE-2019-15233 - https://github.com/l0nax/CVE-2019-15233 -CVE-2019-15235 - https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html -CVE-2019-15238 - https://wpvulndb.com/vulnerabilities/9505 -CVE-2019-15239 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f582b248d0a86bae5788c548d7bb5bca6f7691a -CVE-2019-15239 - https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf -CVE-2019-15239 - https://salsa.debian.org/kernel-team/kernel-sec/blob/f6273af2d956a87296b6b60379d0a186c9be4bbc/active/CVE-2019-15239 -CVE-2019-15253 - http://packetstormsecurity.com/files/157668/Cisco-Digital-Network-Architecture-Center-1.3.1.4-Cross-Site-Scripting.html -CVE-2019-15257 - https://www.tenable.com/security/research/tra-2019-44 -CVE-2019-15258 - https://www.tenable.com/security/research/tra-2019-44 -CVE-2019-15276 - http://packetstormsecurity.com/files/155554/Cisco-WLC-2504-8.9-Denial-Of-Service.html -CVE-2019-15291 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-15291 - https://usn.ubuntu.com/4287-2/ -CVE-2019-15292 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6377f787aeb945cae7abbb6474798de129e1f3ac -CVE-2019-15292 - https://usn.ubuntu.com/4115-1/ -CVE-2019-15292 - https://usn.ubuntu.com/4118-1/ -CVE-2019-15295 - https://safebreach.com/Post/BitDefender-Antivirus-Free-2020-Privilege-Escalation-to-SYSTEM -CVE-2019-15297 - http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html -CVE-2019-15297 - http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html -CVE-2019-15299 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html -CVE-2019-15300 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html -CVE-2019-15301 - https://medium.com/@sorokinpf/bpmonline-sql-injection-607916447e30 -CVE-2019-15304 - http://packetstormsecurity.com/files/154221/ProGrade-Lierda-Grill-Temperature-1.00_50006-Hardcoded-Credentials.html -CVE-2019-15304 - https://www.joesandbox.com/analysis/287596/0/html -CVE-2019-15310 - https://labs.mwrinfosecurity.com/advisories/ -CVE-2019-15311 - https://labs.mwrinfosecurity.com/advisories/ -CVE-2019-15312 - https://labs.mwrinfosecurity.com/advisories/ -CVE-2019-15314 - https://pastebin.com/wEM7rnG7 -CVE-2019-15316 - https://www.youtube.com/watch?v=I93aH86BUaE -CVE-2019-15316 - https://www.youtube.com/watch?v=ZCHrjP0cMew -CVE-2019-15317 - https://wpvulndb.com/vulnerabilities/9584 -CVE-2019-15318 - https://wpvulndb.com/vulnerabilities/9583 -CVE-2019-15319 - https://wpvulndb.com/vulnerabilities/9599 -CVE-2019-15320 - https://wpvulndb.com/vulnerabilities/9600 -CVE-2019-15321 - https://wpvulndb.com/vulnerabilities/9600 -CVE-2019-15323 - https://wpvulndb.com/vulnerabilities/9453 -CVE-2019-15324 - https://wpvulndb.com/vulnerabilities/9455 -CVE-2019-15326 - https://wpvulndb.com/vulnerabilities/9392 -CVE-2019-1543 - https://hackerone.com/reports/506040 -CVE-2019-1543 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-1543 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-1543 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-1547 - http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html -CVE-2019-1547 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-1547 - https://seclists.org/bugtraq/2019/Oct/1 -CVE-2019-1547 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-1547 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-1547 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-1547 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-1547 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-1547 - https://www.tenable.com/security/tns-2019-08 -CVE-2019-1549 - https://seclists.org/bugtraq/2019/Oct/1 -CVE-2019-1549 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-1549 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-1549 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-1549 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-1549 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-15499 - https://github.com/hackmdio/codimd/issues/1263 -CVE-2019-15501 - http://packetstormsecurity.com/files/154202/LSoft-ListServ-Cross-Site-Scripting.html -CVE-2019-15501 - https://www.exploit-db.com/exploits/47302 -CVE-2019-15502 - https://r4p3.net/threads/teamkilled-new-teamspeak-crash.8144/ -CVE-2019-15502 - https://www.youtube.com/watch?v=PlVbPIs75D4 -CVE-2019-15505 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-1551 - http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html -CVE-2019-1551 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-1551 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-1551 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-1551 - https://www.tenable.com/security/tns-2020-11 -CVE-2019-1551 - https://www.tenable.com/security/tns-2021-10 -CVE-2019-15510 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-15510-manageengine-desktopcentral-v-10-vulnerable-to-html-injection/ -CVE-2019-15511 - https://cqureacademy.com/cqure-labs/cqlabs-cve-2019-15511-broken-access-control-in-gog-galaxy -CVE-2019-1552 - https://hackerone.com/reports/683318 -CVE-2019-1552 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-1552 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-1552 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-1552 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-1552 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-1552 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-1552 - https://www.tenable.com/security/tns-2019-08 -CVE-2019-15562 - https://github.com/go-gorm/gorm/pull/2519 -CVE-2019-15575 - https://hackerone.com/reports/682442 -CVE-2019-15576 - https://hackerone.com/reports/633001 -CVE-2019-15577 - https://hackerone.com/reports/636560 -CVE-2019-15580 - https://hackerone.com/reports/667408 -CVE-2019-15584 - https://hackerone.com/reports/670572 -CVE-2019-15588 - https://hackerone.com/reports/688270 -CVE-2019-15588 - https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09 -CVE-2019-15589 - https://hackerone.com/reports/497047 -CVE-2019-1559 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-1559 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-1559 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-1559 - https://www.tenable.com/security/tns-2019-02 -CVE-2019-15591 - https://hackerone.com/reports/676976 -CVE-2019-15593 - https://hackerone.com/reports/557154 -CVE-2019-15595 - https://hackerone.com/reports/544928 -CVE-2019-15596 - https://hackerone.com/reports/695416 -CVE-2019-15597 - https://hackerone.com/reports/703412 -CVE-2019-15598 - https://hackerone.com/reports/703415 -CVE-2019-15599 - https://hackerone.com/reports/701183 -CVE-2019-15600 - https://hackerone.com/reports/692262 -CVE-2019-15602 - https://hackerone.com/reports/507159 -CVE-2019-15603 - https://hackerone.com/reports/665302 -CVE-2019-15604 - https://hackerone.com/reports/746733 -CVE-2019-15604 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-15604 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15605 - https://hackerone.com/reports/735748 -CVE-2019-15605 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-15605 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15606 - https://hackerone.com/reports/730779 -CVE-2019-15606 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-15606 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15607 - https://hackerone.com/reports/681986 -CVE-2019-15608 - https://hackerone.com/reports/703138 -CVE-2019-15609 - https://hackerone.com/reports/661959 -CVE-2019-15610 - https://hackerone.com/reports/673724 -CVE-2019-15611 - https://hackerone.com/reports/672623 -CVE-2019-15613 - https://hackerone.com/reports/697959 -CVE-2019-15614 - https://hackerone.com/reports/575562 -CVE-2019-15616 - https://hackerone.com/reports/592864 -CVE-2019-15617 - https://hackerone.com/reports/722748 -CVE-2019-15618 - https://hackerone.com/reports/515484 -CVE-2019-15619 - https://hackerone.com/reports/662204 -CVE-2019-15620 - https://hackerone.com/reports/662218 -CVE-2019-15621 - https://hackerone.com/reports/619484 -CVE-2019-15622 - https://hackerone.com/reports/518669 -CVE-2019-15623 - https://hackerone.com/reports/508490 -CVE-2019-15624 - https://hackerone.com/reports/508493 -CVE-2019-15627 - http://packetstormsecurity.com/files/155579/Trend-Micro-Deep-Security-Agent-11-Arbitrary-File-Overwrite.html -CVE-2019-15628 - https://safebreach.com/Post/Trend-Micro-Security-16-DLL-Search-Order-Hijacking-and-Potential-Abuses-CVE-2019-15628 -CVE-2019-1563 - http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html -CVE-2019-1563 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-1563 - https://seclists.org/bugtraq/2019/Oct/1 -CVE-2019-1563 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-1563 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-1563 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-1563 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-1563 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-15637 - https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html -CVE-2019-15639 - http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html -CVE-2019-15643 - https://wpvulndb.com/vulnerabilities/9833 -CVE-2019-15644 - https://wpvulndb.com/vulnerabilities/9433 -CVE-2019-15645 - https://wpvulndb.com/vulnerabilities/9433 -CVE-2019-15646 - https://wpvulndb.com/vulnerabilities/9830 -CVE-2019-15647 - https://wpvulndb.com/vulnerabilities/9834 -CVE-2019-15648 - https://wpvulndb.com/vulnerabilities/9416 -CVE-2019-15649 - https://wpvulndb.com/vulnerabilities/9415 -CVE-2019-15650 - https://wpvulndb.com/vulnerabilities/9837 -CVE-2019-15652 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 -CVE-2019-15653 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 -CVE-2019-15654 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 -CVE-2019-15655 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26165 -CVE-2019-15656 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26165 -CVE-2019-15659 - https://wpvulndb.com/vulnerabilities/9835 -CVE-2019-1566 - https://www.purplemet.com/blog/palo-alto-firewall-multiple-xss-vulnerabilities -CVE-2019-15661 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0005/FEYE-2019-0005.md -CVE-2019-15662 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0006/FEYE-2019-0006.md -CVE-2019-15663 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0007/FEYE-2019-0007.md -CVE-2019-15664 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0008/FEYE-2019-0008.md -CVE-2019-15665 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0009/FEYE-2019-0009.md -CVE-2019-15666 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427 -CVE-2019-15682 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/ -CVE-2019-15684 - https://hackerone.com/reports/470519 -CVE-2019-15684 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 -CVE-2019-15685 - https://hackerone.com/reports/470544 -CVE-2019-15685 - https://hackerone.com/reports/470547 -CVE-2019-15685 - https://hackerone.com/reports/470553 -CVE-2019-15685 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 -CVE-2019-15686 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 -CVE-2019-15687 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 -CVE-2019-15688 - https://hackerone.com/reports/469372 -CVE-2019-15688 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 -CVE-2019-15689 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219 -CVE-2019-15701 - https://github.com/BloodHoundAD/BloodHound/issues/267 -CVE-2019-15702 - https://github.com/RIOT-OS/RIOT/issues/12086 -CVE-2019-15708 - https://fortiguard.com/psirt/FG-IR-19-209 -CVE-2019-15711 - https://fortiguard.com/psirt/FG-IR-19-238 -CVE-2019-15714 - https://github.com/entropic-dev/entropic/issues/251 -CVE-2019-15715 - http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html -CVE-2019-15719 - http://packetstormsecurity.com/files/154782/PBS-Professional-19.2.3-Authentication-Bypass.html -CVE-2019-15720 - https://www.sevenlayers.com/index.php/243-cloudberry-backup-local-privilege-escalation -CVE-2019-15721 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15722 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15723 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15724 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15725 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15725 - https://gitlab.com/gitlab-org/gitlab-ee/issues/11431 -CVE-2019-15726 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15727 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15728 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15729 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-1573 - https://www.kb.cert.org/vuls/id/192371 -CVE-2019-15730 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15731 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15732 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15733 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15734 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15736 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15737 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15738 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15739 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15740 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15741 - http://packetstormsecurity.com/files/154734/GitLab-Omnibus-12.2.1-Logrotate-Privilege-Escalation.html -CVE-2019-15741 - http://seclists.org/fulldisclosure/2019/Oct/7 -CVE-2019-15741 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ -CVE-2019-15741 - https://gitlab.com/gitlab-org/omnibus-gitlab/issues/4380 -CVE-2019-15742 - http://packetstormsecurity.com/files/155952/Plantronics-Hub-SpokesUpdateService-Privilege-Escalation.html -CVE-2019-15752 - http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-Privilege-Escalation.html -CVE-2019-15752 - https://medium.com/@morgan.henry.roman/elevation-of-privilege-in-docker-for-windows-2fd8450b478e -CVE-2019-15758 - https://github.com/WebAssembly/binaryen/issues/2288 -CVE-2019-15759 - https://github.com/WebAssembly/binaryen/issues/2288 -CVE-2019-15766 - https://rastating.github.io/ksweb-android-remote-code-execution/ -CVE-2019-15769 - https://wpvulndb.com/vulnerabilities/9848 -CVE-2019-15770 - https://wpvulndb.com/vulnerabilities/9849 -CVE-2019-15771 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ -CVE-2019-15771 - https://wpvulndb.com/vulnerabilities/9485 -CVE-2019-15772 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ -CVE-2019-15772 - https://wpvulndb.com/vulnerabilities/9493 -CVE-2019-15773 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ -CVE-2019-15773 - https://wpvulndb.com/vulnerabilities/9491 -CVE-2019-15774 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ -CVE-2019-15774 - https://wpvulndb.com/vulnerabilities/9494 -CVE-2019-15775 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ -CVE-2019-15775 - https://wpvulndb.com/vulnerabilities/9496 -CVE-2019-15776 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ -CVE-2019-15776 - https://wpvulndb.com/vulnerabilities/9503 -CVE-2019-15777 - https://wpvulndb.com/vulnerabilities/9850 -CVE-2019-15778 - https://wpvulndb.com/vulnerabilities/9852 -CVE-2019-15779 - https://wpvulndb.com/vulnerabilities/9853 -CVE-2019-15780 - https://wpvulndb.com/vulnerabilities/9935 -CVE-2019-15781 - https://wpvulndb.com/vulnerabilities/9851 -CVE-2019-15782 - https://hackerone.com/reports/681617 -CVE-2019-15789 - https://pulsesecurity.co.nz/advisories/microk8s-privilege-escalation -CVE-2019-1579 - https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study/ -CVE-2019-15790 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html -CVE-2019-15790 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1839795 -CVE-2019-15791 - https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1 -CVE-2019-15792 - https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=5df147c8140efc71ac0879ae3b0057f577226d4c -CVE-2019-15805 - https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 -CVE-2019-15806 - https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 -CVE-2019-15807 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 -CVE-2019-15807 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d -CVE-2019-15809 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-15809 - https://tches.iacr.org/index.php/TCHES/article/view/7337 -CVE-2019-15811 - http://packetstormsecurity.com/files/154270/DomainMod-4.13-Cross-Site-Scripting.html -CVE-2019-15813 - http://packetstormsecurity.com/files/159712/Sentrifugo-3.2-Shell-Upload-Restriction-Bypass.html -CVE-2019-15813 - https://www.exploit-db.com/exploits/47323 -CVE-2019-15814 - https://www.exploit-db.com/exploits/47324 -CVE-2019-15816 - https://wpvulndb.com/vulnerabilities/9817 -CVE-2019-15817 - https://wpvulndb.com/vulnerabilities/9511 -CVE-2019-15818 - https://wpvulndb.com/vulnerabilities/9503 -CVE-2019-15819 - https://wpvulndb.com/vulnerabilities/9501 -CVE-2019-15820 - https://wpvulndb.com/vulnerabilities/9500 -CVE-2019-15821 - https://wpvulndb.com/vulnerabilities/9703 -CVE-2019-15822 - https://wpvulndb.com/vulnerabilities/9470 -CVE-2019-15823 - https://wpvulndb.com/vulnerabilities/9469 -CVE-2019-15824 - https://wpvulndb.com/vulnerabilities/9469 -CVE-2019-15825 - https://wpvulndb.com/vulnerabilities/9469 -CVE-2019-15826 - https://wpvulndb.com/vulnerabilities/9469 -CVE-2019-15827 - https://wpvulndb.com/vulnerabilities/9478 -CVE-2019-15827 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5530.php -CVE-2019-15828 - https://wpvulndb.com/vulnerabilities/9448 -CVE-2019-15829 - https://wpvulndb.com/vulnerabilities/9443 -CVE-2019-15830 - https://wpvulndb.com/vulnerabilities/9440 -CVE-2019-15831 - https://wpvulndb.com/vulnerabilities/9420 -CVE-2019-15832 - https://wpvulndb.com/vulnerabilities/9420 -CVE-2019-15833 - https://wpvulndb.com/vulnerabilities/9418 -CVE-2019-15834 - https://wpvulndb.com/vulnerabilities/9400 -CVE-2019-15835 - https://wpvulndb.com/vulnerabilities/9398 -CVE-2019-15836 - https://wpvulndb.com/vulnerabilities/9394 -CVE-2019-15837 - https://wpvulndb.com/vulnerabilities/9389 -CVE-2019-15838 - https://wpvulndb.com/vulnerabilities/9857 -CVE-2019-15839 - https://wpvulndb.com/vulnerabilities/9368 -CVE-2019-15845 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-15846 - http://exim.org/static/doc/security/CVE-2019-15846.txt -CVE-2019-15846 - https://exim.org/static/doc/security/CVE-2019-15846.txt -CVE-2019-15846 - https://www.kb.cert.org/vuls/id/672565 -CVE-2019-15848 - https://gist.github.com/JLLeitschuh/fe6784391254b58de680bbda78a04a70 -CVE-2019-15848 - https://www.softwaresecured.com/jetbrains-teamcity-reflected-xss/ -CVE-2019-15849 - https://noskill1337.github.io/homematic-ccu3-session-fixation -CVE-2019-15850 - https://noskill1337.github.io/homematic-ccu3-remote-code-execution -CVE-2019-15858 - https://wpvulndb.com/vulnerabilities/9490 -CVE-2019-15859 - http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html -CVE-2019-15860 - https://gist.github.com/RootUp/b5de893bb2e51a4c846c5a0caa13b666 -CVE-2019-15864 - https://wpvulndb.com/vulnerabilities/9338 -CVE-2019-15865 - https://wpvulndb.com/vulnerabilities/9338 -CVE-2019-15867 - https://wpvulndb.com/vulnerabilities/9317 -CVE-2019-15868 - https://wpvulndb.com/vulnerabilities/9335 -CVE-2019-15869 - https://wpvulndb.com/vulnerabilities/9322 -CVE-2019-15870 - https://wpvulndb.com/vulnerabilities/9258 -CVE-2019-15873 - https://wpvulndb.com/vulnerabilities/9086 -CVE-2019-15889 - http://packetstormsecurity.com/files/154356/WordPress-Download-Manager-2.9.93-Cross-Site-Scripting.html -CVE-2019-15889 - https://packetstormsecurity.com/files/152511/WordPress-Download-Manager-2.9.92-Cross-Site-Scripting.html -CVE-2019-15889 - https://packetstormsecurity.com/files/152552/WordPress-Download-Manager-2.9.93-Cross-Site-Scripting.html -CVE-2019-15889 - https://wpvulndb.com/vulnerabilities/9257 -CVE-2019-15889 - https://www.cybersecurity-help.cz/vdb/SB2019041819 -CVE-2019-15890 - https://usn.ubuntu.com/4191-1/ -CVE-2019-15893 - https://hackerone.com/reports/683965 -CVE-2019-15893 - https://support.sonatype.com/hc/en-us/articles/360035055794 -CVE-2019-15894 - https://www.espressif.com/en/news/Espressif_Security_Advisory_Concerning_Fault_Injection_and_Secure_Boot -CVE-2019-15895 - https://wpvulndb.com/vulnerabilities/9870 -CVE-2019-15896 - https://wpvulndb.com/vulnerabilities/9871 -CVE-2019-15897 - http://packetstormsecurity.com/files/155573/BeeGFS-7.1.3-Privilege-Escalation.html -CVE-2019-15903 - http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html -CVE-2019-15903 - http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html -CVE-2019-15903 - http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html -CVE-2019-15903 - https://usn.ubuntu.com/4202-1/ -CVE-2019-15903 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-15903 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-15910 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15910.md -CVE-2019-15911 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15911.md -CVE-2019-15912 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15912_1.md -CVE-2019-15912 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15912_2.md -CVE-2019-15913 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15913.md -CVE-2019-15914 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15914_1.md -CVE-2019-15914 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15914_2.md -CVE-2019-15915 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15915.md -CVE-2019-15916 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab -CVE-2019-15917 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-15925 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-15925 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f25edb48c441fc278ecc154c270f16966cbb90 -CVE-2019-15926 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-15926 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab -CVE-2019-15927 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46 -CVE-2019-15929 - http://packetstormsecurity.com/files/155012/Craft-CMS-Rate-Limiting-Brute-Force.html -CVE-2019-15930 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15931 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15932 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15933 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15934 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15935 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15936 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-15940 - https://blog.avira.com/victure-pc530-home-insecurity-you-can-install-yourself/ -CVE-2019-15942 - https://trac.ffmpeg.org/ticket/8093 -CVE-2019-15943 - http://packetstormsecurity.com/files/154705/Counter-Strike-Global-Offensive-Code-Execution-Denial-Of-Service.html -CVE-2019-15943 - https://github.com/bi7s/CVE/blob/master/CVE-2019-15943/README.md -CVE-2019-15947 - https://github.com/bitcoin/bitcoin/issues/16824 -CVE-2019-15948 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/ti_wl18xx_adv_rce.py -CVE-2019-15948 - https://www.youtube.com/watch?v=bk5lOxieqbA -CVE-2019-15949 - http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html -CVE-2019-15949 - http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html -CVE-2019-15949 - https://github.com/jakgibb/nagiosxi-root-rce-exploit -CVE-2019-15950 - https://github.com/zerohax/RedmineUP-XSS/blob/master/vcard-upload-xss -CVE-2019-15952 - http://packetstormsecurity.com/files/154340/Totaljs-CMS-12.0-Path-Traversal.html -CVE-2019-15954 - http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html -CVE-2019-15955 - https://seclists.org/fulldisclosure/2019/Sep/3 -CVE-2019-15961 - https://bugzilla.clamav.net/show_bug.cgi?id=12380 -CVE-2019-15975 - http://packetstormsecurity.com/files/156238/Cisco-Data-Center-Network-Manager-11.2-Remote-Code-Execution.html -CVE-2019-15975 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass -CVE-2019-15976 - http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html -CVE-2019-15976 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass -CVE-2019-15977 - http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html -CVE-2019-15977 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass -CVE-2019-15978 - http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html -CVE-2019-15978 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject -CVE-2019-15979 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject -CVE-2019-15980 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav -CVE-2019-15981 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav -CVE-2019-15982 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav -CVE-2019-15983 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-xml-ext-entity -CVE-2019-15984 - http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html -CVE-2019-15984 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-inject -CVE-2019-15985 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-inject -CVE-2019-15992 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce -CVE-2019-15993 - http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html -CVE-2019-15999 - http://packetstormsecurity.com/files/155870/Cisco-DCNM-JBoss-10.4-Credential-Leakage.html -CVE-2019-15999 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-unauth-access -CVE-2019-16056 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-16056 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-16057 - https://blog.cystack.net/d-link-dns-320-rce/ -CVE-2019-16061 - https://www.mogozobo.com/?p=3647 -CVE-2019-16062 - https://www.mogozobo.com/?p=3647 -CVE-2019-16063 - https://www.mogozobo.com/?p=3647 -CVE-2019-16064 - https://www.mogozobo.com/?p=3647 -CVE-2019-16065 - https://www.mogozobo.com/?p=3647 -CVE-2019-16066 - https://www.mogozobo.com/?p=3647 -CVE-2019-16067 - https://www.mogozobo.com/?p=3647 -CVE-2019-16068 - https://www.mogozobo.com/?p=3647 -CVE-2019-16069 - https://www.mogozobo.com/?p=3647 -CVE-2019-16070 - https://www.mogozobo.com/?p=3647 -CVE-2019-16071 - https://www.mogozobo.com/?p=3647 -CVE-2019-16072 - https://www.mogozobo.com/?p=3647 -CVE-2019-16088 - https://gist.github.com/RootUp/3d9e90ea5ae0799305b4c7ec66e19387 -CVE-2019-16089 - https://usn.ubuntu.com/4414-1/ -CVE-2019-16096 - https://github.com/antirez/kilo/issues/60 -CVE-2019-16097 - https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ -CVE-2019-16098 - https://github.com/Barakat/CVE-2019-16098 -CVE-2019-16108 - https://hackerone.com/reports/587727 -CVE-2019-16112 - https://www.exploit-db.com/exploits/48462 -CVE-2019-16113 - http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html -CVE-2019-16113 - http://packetstormsecurity.com/files/157988/Bludit-3.9.12-Directory-Traversal.html -CVE-2019-16113 - http://packetstormsecurity.com/files/158569/Bludit-3.9.2-Directory-Traversal.html -CVE-2019-16113 - https://github.com/bludit/bludit/issues/1081 -CVE-2019-16116 - https://rhinosecuritylabs.com/application-security/completeftp-server-local-privesc-cve-2019-16116/ -CVE-2019-16117 - http://packetstormsecurity.com/files/154433/WordPress-Photo-Gallery-1.5.34-Cross-Site-Scripting.html -CVE-2019-16117 - https://wpvulndb.com/vulnerabilities/9872 -CVE-2019-16118 - http://packetstormsecurity.com/files/154433/WordPress-Photo-Gallery-1.5.34-Cross-Site-Scripting.html -CVE-2019-16118 - https://wpvulndb.com/vulnerabilities/9872 -CVE-2019-16119 - http://packetstormsecurity.com/files/154432/WordPress-Photo-Gallery-1.5.34-SQL-Injection.html -CVE-2019-16119 - https://wpvulndb.com/vulnerabilities/9872 -CVE-2019-16120 - https://wpvulndb.com/vulnerabilities/9858 -CVE-2019-16120 - https://www.exploit-db.com/exploits/47335 -CVE-2019-16123 - https://www.exploit-db.com/exploits/47315 -CVE-2019-16124 - https://www.exploit-db.com/exploits/47326 -CVE-2019-16125 - https://www.exploit-db.com/exploits/47314 -CVE-2019-16130 - https://github.com/weison-tech/yii2-cms/issues/2 -CVE-2019-16152 - https://fortiguard.com/psirt/FG-IR-19-238 -CVE-2019-16155 - https://fortiguard.com/psirt/FG-IR-19-238 -CVE-2019-16156 - https://fortiguard.com/advisory/FG-IR-19-265 -CVE-2019-16161 - https://github.com/k-takata/Onigmo/issues/132 -CVE-2019-16162 - https://github.com/k-takata/Onigmo/issues/139 -CVE-2019-16163 - https://github.com/kkos/oniguruma/issues/147 -CVE-2019-16164 - https://github.com/lexborisov/myhtml/issues/175 -CVE-2019-16165 - https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00001.html -CVE-2019-16166 - https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html -CVE-2019-16167 - https://github.com/sysstat/sysstat/issues/230 -CVE-2019-16168 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-16168 - https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg116312.html -CVE-2019-16168 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-16168 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16172 - http://packetstormsecurity.com/files/154479/LimeSurvey-3.17.13-Cross-Site-Scripting.html -CVE-2019-16172 - http://seclists.org/fulldisclosure/2019/Sep/22 -CVE-2019-16172 - https://seclists.org/bugtraq/2019/Sep/27 -CVE-2019-16173 - http://packetstormsecurity.com/files/154479/LimeSurvey-3.17.13-Cross-Site-Scripting.html -CVE-2019-16173 - http://seclists.org/fulldisclosure/2019/Sep/22 -CVE-2019-16173 - https://seclists.org/bugtraq/2019/Sep/27 -CVE-2019-1619 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html -CVE-2019-1619 - http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1619 - http://seclists.org/fulldisclosure/2019/Jul/7 -CVE-2019-1619 - https://seclists.org/bugtraq/2019/Jul/11 -CVE-2019-1619 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass -CVE-2019-16193 - https://www.facebook.com/Huang.YuHsiang.Phone/posts/1795457353931689 -CVE-2019-16197 - http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html -CVE-2019-16198 - https://rastating.github.io/ksweb-android-remote-code-execution/ -CVE-2019-1620 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html -CVE-2019-1620 - http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1620 - http://seclists.org/fulldisclosure/2019/Jul/7 -CVE-2019-1620 - https://seclists.org/bugtraq/2019/Jul/11 -CVE-2019-1620 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-codex -CVE-2019-16201 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-1621 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html -CVE-2019-1621 - http://seclists.org/fulldisclosure/2019/Jul/7 -CVE-2019-1621 - https://seclists.org/bugtraq/2019/Jul/11 -CVE-2019-1621 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-file-dwnld -CVE-2019-16214 - https://blog.openzeppelin.com/libra-vulnerability-summary/ -CVE-2019-16218 - https://wpvulndb.com/vulnerabilities/9861 -CVE-2019-16219 - https://wpvulndb.com/vulnerabilities/9864 -CVE-2019-1622 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html -CVE-2019-1622 - http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1622 - http://seclists.org/fulldisclosure/2019/Jul/7 -CVE-2019-1622 - https://seclists.org/bugtraq/2019/Jul/11 -CVE-2019-1622 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-infodiscl -CVE-2019-16220 - https://wpvulndb.com/vulnerabilities/9863 -CVE-2019-16221 - https://wpvulndb.com/vulnerabilities/9865 -CVE-2019-16223 - http://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.html -CVE-2019-16223 - https://wpvulndb.com/vulnerabilities/9862 -CVE-2019-16224 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20initialization%20vuln -CVE-2019-16225 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20write%20to%20illegal%20address -CVE-2019-16226 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memory%20corruption%20vuln -CVE-2019-16227 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memcpy%20illegal%20dst -CVE-2019-16228 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/FPE -CVE-2019-16229 - https://usn.ubuntu.com/4287-2/ -CVE-2019-16231 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html -CVE-2019-16232 - https://usn.ubuntu.com/4287-2/ -CVE-2019-16234 - https://usn.ubuntu.com/4342-1/ -CVE-2019-16235 - https://usn.ubuntu.com/4306-1/ -CVE-2019-16236 - https://usn.ubuntu.com/4306-1/ -CVE-2019-16237 - https://usn.ubuntu.com/4306-1/ -CVE-2019-16239 - https://t2.fi/schedule/2019/ -CVE-2019-16246 - https://know.bishopfox.com/advisories -CVE-2019-16246 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-16247 - https://code610.blogspot.com/2019/09/crashing-dcisoft-121.html -CVE-2019-16248 - https://github.com/RootUp/PersonalStuff/blob/master/Telegram_Privacy.pdf -CVE-2019-16248 - https://www.inputzero.io/2019/09/telegram-privacy-fails-again.html -CVE-2019-16250 - https://blog.nintechnet.com/settings-change-and-css-injection-in-wordpress-ocean-extra-plugin/ -CVE-2019-16251 - https://wpvulndb.com/vulnerabilities/9932 -CVE-2019-16252 - https://arxiv.org/pdf/2005.08208.pdf -CVE-2019-16253 - http://packetstormsecurity.com/files/154614/Samsung-Mobile-Android-SamsungTTS-Privilege-Escalation.html -CVE-2019-16253 - https://blog.flanker017.me/text-to-speech-speaks-pwned/ -CVE-2019-16253 - https://github.com/flankerhqd/vendor-android-cves/tree/master/SMT-CVE-2019-16253 -CVE-2019-16254 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16255 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16258 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-026.txt -CVE-2019-16263 - https://blog.appicaptor.com/2019/10/04/vulnerable-library-warning-twitterkit-for-ios/ -CVE-2019-16264 - https://infayer.com/?p=43 -CVE-2019-16268 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-16268-html-injection-vulnerability-in-manageengine-remote-access-plus/ -CVE-2019-16278 - http://packetstormsecurity.com/files/155045/Nostromo-1.9.6-Directory-Traversal-Remote-Command-Execution.html -CVE-2019-16278 - http://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Execution.html -CVE-2019-16282 - https://www.exploit-db.com/exploits/47496 -CVE-2019-16285 - http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html -CVE-2019-16285 - http://seclists.org/fulldisclosure/2020/Mar/30 -CVE-2019-16286 - http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html -CVE-2019-16286 - http://seclists.org/fulldisclosure/2020/Mar/37 -CVE-2019-16287 - http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html -CVE-2019-16287 - http://seclists.org/fulldisclosure/2020/Mar/38 -CVE-2019-16289 - https://generaleg0x01.com/2019/09/13/xss-woody/ -CVE-2019-16289 - https://wpvulndb.com/vulnerabilities/9880 -CVE-2019-16294 - http://packetstormsecurity.com/files/154706/Notepad-Code-Execution-Denial-Of-Service.html -CVE-2019-16294 - https://github.com/bi7s/CVE/tree/master/CVE-2019-16294 -CVE-2019-16295 - http://packetstormsecurity.com/files/154990/CWP-0.9.8.885-Cross-Site-Scripting.html -CVE-2019-16303 - https://github.com/jhipster/generator-jhipster/issues/10401 -CVE-2019-16303 - https://github.com/jhipster/jhipster-kotlin/issues/183 -CVE-2019-16305 - https://freetom.github.io/0day/2019/09/14/MobaXterm-command-exec-in-protocol-handler.html -CVE-2019-16307 - https://gist.github.com/izadgot/3efc75f62f9c9567c8f11bad74165425 -CVE-2019-16326 - https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ -CVE-2019-16327 - https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ -CVE-2019-16330 - https://www.exploit-db.com/exploits/47505 -CVE-2019-16332 - https://packetstormsecurity.com/files/154369/WordPress-API-Bearer-Auth-20181229-Cross-Site-Scripting.html -CVE-2019-16332 - https://wpvulndb.com/vulnerabilities/9868 -CVE-2019-16335 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-16335 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16335 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-16335 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-16335 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-16336 - https://www.youtube.com/watch?v=Iw8sIBLWE_w -CVE-2019-16337 - https://starlabs.sg/advisories/ -CVE-2019-16338 - https://starlabs.sg/advisories/ -CVE-2019-16340 - https://puzzor.github.io/Linksys-Velop-Authentication-bypass -CVE-2019-16346 - https://github.com/miniupnp/ngiflib/issues/11 -CVE-2019-16347 - https://github.com/miniupnp/ngiflib/issues/12 -CVE-2019-16348 - https://github.com/marc-q/libwav/issues/24 -CVE-2019-16349 - https://github.com/axiomatic-systems/Bento4/issues/422 -CVE-2019-16350 - https://github.com/rockcarry/ffjpeg/issues/10 -CVE-2019-16351 - https://github.com/rockcarry/ffjpeg/issues/11 -CVE-2019-16352 - https://github.com/rockcarry/ffjpeg/issues/12 -CVE-2019-16383 - http://packetstormsecurity.com/files/157208/MOVEit-Transfer-11.1.1-SQL-Injection.html -CVE-2019-16384 - https://labs.nettitude.com/blog/cve-2019-16384-85-cyblesoft-thinfinity-virtualui-path-traversal-http-header-injection/ -CVE-2019-16385 - https://labs.nettitude.com/blog/cve-2019-16384-85-cyblesoft-thinfinity-virtualui-path-traversal-http-header-injection/ -CVE-2019-16399 - http://packetstormsecurity.com/files/154524/Western-Digital-My-Book-World-II-NAS-1.02.12-Hardcoded-Credential.html -CVE-2019-16404 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16404/README.md -CVE-2019-16405 - http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html -CVE-2019-16405 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html -CVE-2019-16413 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5e3cc1ee1405a7eb3487ed24f786dec01b4cbe1f -CVE-2019-16414 - http://packetstormsecurity.com/files/154678/GFI-Kerio-Control-9.3.0-Cross-Site-Scripting.html -CVE-2019-16414 - http://seclists.org/fulldisclosure/2019/Sep/35 -CVE-2019-16414 - https://www.youtube.com/watch?v=ZqqR89vzZ_I -CVE-2019-16416 - https://gist.github.com/svennergr/501409fbdb0ef4a8b0f07a26a2815fbb -CVE-2019-16417 - https://gist.github.com/svennergr/204038bda1849ebce9af32eea9e55038 -CVE-2019-1642 - https://www.exploit-db.com/exploits/46263/ -CVE-2019-1649 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot -CVE-2019-16512 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -CVE-2019-16512 - https://know.bishopfox.com/advisories -CVE-2019-16512 - https://know.bishopfox.com/advisories/connectwise-control -CVE-2019-16513 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -CVE-2019-16513 - https://know.bishopfox.com/advisories -CVE-2019-16513 - https://know.bishopfox.com/advisories/connectwise-control -CVE-2019-16514 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -CVE-2019-16514 - https://know.bishopfox.com/advisories -CVE-2019-16514 - https://know.bishopfox.com/advisories/connectwise-control -CVE-2019-16515 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -CVE-2019-16515 - https://know.bishopfox.com/advisories -CVE-2019-16515 - https://know.bishopfox.com/advisories/connectwise-control -CVE-2019-16515 - https://wpvulndb.com/vulnerabilities/10013 -CVE-2019-16516 - http://packetstormsecurity.com/files/165432/ConnectWise-Control-19.2.24707-Username-Enumeration.html -CVE-2019-16516 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -CVE-2019-16516 - https://know.bishopfox.com/advisories -CVE-2019-16516 - https://know.bishopfox.com/advisories/connectwise-control -CVE-2019-16517 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -CVE-2019-16517 - https://know.bishopfox.com/advisories -CVE-2019-16517 - https://know.bishopfox.com/advisories/connectwise-control -CVE-2019-1652 - http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html -CVE-2019-1652 - http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1652 - http://seclists.org/fulldisclosure/2019/Mar/61 -CVE-2019-1652 - https://seclists.org/bugtraq/2019/Mar/55 -CVE-2019-1652 - https://www.exploit-db.com/exploits/46243/ -CVE-2019-1652 - https://www.exploit-db.com/exploits/46655/ -CVE-2019-16520 - http://www.openwall.com/lists/oss-security/2019/10/16/5 -CVE-2019-16520 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-04_WordPress_Plugin_All_in_One_SEO_Pack -CVE-2019-16520 - https://wpvulndb.com/vulnerabilities/9915 -CVE-2019-16521 - http://www.openwall.com/lists/oss-security/2019/10/16/3 -CVE-2019-16521 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker -CVE-2019-16521 - https://wpvulndb.com/vulnerabilities/9917 -CVE-2019-16522 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-01_WordPress_Plugin_EU_Cookie_Law -CVE-2019-16522 - https://wpvulndb.com/vulnerabilities/9918 -CVE-2019-16523 - http://www.openwall.com/lists/oss-security/2019/10/16/4 -CVE-2019-16523 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-03_WordPress_Plugin_Events_Manager -CVE-2019-16523 - https://wpvulndb.com/vulnerabilities/9916 -CVE-2019-16524 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190911-01_Easy_FancyBox_WP_Plugin_Stored_XSS -CVE-2019-16524 - https://wpvulndb.com/vulnerabilities/9891 -CVE-2019-16525 - https://packetstormsecurity.com/files/154436/WordPress-Checklist-1.1.5-Cross-Site-Scripting.html -CVE-2019-16525 - https://wpvulndb.com/vulnerabilities/9877 -CVE-2019-1653 - http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html -CVE-2019-1653 - http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html -CVE-2019-1653 - http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1653 - http://seclists.org/fulldisclosure/2019/Mar/59 -CVE-2019-1653 - http://seclists.org/fulldisclosure/2019/Mar/60 -CVE-2019-1653 - https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/ -CVE-2019-1653 - https://seclists.org/bugtraq/2019/Mar/53 -CVE-2019-1653 - https://seclists.org/bugtraq/2019/Mar/54 -CVE-2019-1653 - https://threatpost.com/scans-cisco-routers-code-execution/141218/ -CVE-2019-1653 - https://www.exploit-db.com/exploits/46262/ -CVE-2019-1653 - https://www.exploit-db.com/exploits/46655/ -CVE-2019-1653 - https://www.youtube.com/watch?v=bx0RQJDlGbY -CVE-2019-1653 - https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/ -CVE-2019-16530 - https://support.sonatype.com/hc/en-us/articles/360036132453 -CVE-2019-16531 - http://packetstormsecurity.com/files/154549/LayerBB-1.1.3-Cross-Site-Request-Forgery.html -CVE-2019-16531 - https://github.com/0xB9/LayerBB-1.1.3-CSRF/blob/master/README.md -CVE-2019-16532 - https://github.com/yzmcms/yzmcms/issues/28 -CVE-2019-16532 - https://www.exploit-db.com/exploits/47422 -CVE-2019-16533 - https://www.facebook.com/Huang.YuHsiang.Phone/posts/1815316691945755 -CVE-2019-16534 - https://www.facebook.com/Huang.YuHsiang.Phone/posts/1815316691945755 -CVE-2019-1663 - http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html -CVE-2019-1663 - http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html -CVE-2019-1663 - http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html -CVE-2019-1663 - https://www.exploit-db.com/exploits/46705/ -CVE-2019-16645 - http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html -CVE-2019-16645 - https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection -CVE-2019-16647 - https://safebreach.com/Post/Maxthon-Browser-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-16647 -CVE-2019-16649 - https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/ -CVE-2019-16649 - https://github.com/eclypsium/USBAnywhere -CVE-2019-16650 - https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/ -CVE-2019-16650 - https://github.com/eclypsium/USBAnywhere -CVE-2019-16651 - https://fidusinfosec.com/silently-unmasking-virgin-media-vpn-users-in-seconds-cve-2019-16651/ -CVE-2019-16651 - https://portswigger.net/daily-swig/vpn-users-unmasked-by-zero-day-vulnerability-in-virgin-media-routers -CVE-2019-16662 - http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html -CVE-2019-16662 - http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html -CVE-2019-16667 - http://packetstormsecurity.com/files/158614/pfSense-2.4.4-p3-Cross-Site-Request-Forgery.html -CVE-2019-16667 - https://pastebin.com/TEJdu9LN -CVE-2019-16670 - https://cert.vde.com/en-us/advisories -CVE-2019-16670 - https://cert.vde.com/en-us/advisories/vde-2019-018 -CVE-2019-16671 - https://cert.vde.com/en-us/advisories -CVE-2019-16671 - https://cert.vde.com/en-us/advisories/vde-2019-018 -CVE-2019-16672 - https://cert.vde.com/en-us/advisories -CVE-2019-16672 - https://cert.vde.com/en-us/advisories/vde-2019-018 -CVE-2019-16673 - https://cert.vde.com/en-us/advisories -CVE-2019-16673 - https://cert.vde.com/en-us/advisories/vde-2019-018 -CVE-2019-16674 - https://cert.vde.com/en-us/advisories -CVE-2019-16674 - https://cert.vde.com/en-us/advisories/vde-2019-018 -CVE-2019-16675 - https://cert.vde.com/en-us/advisories -CVE-2019-16678 - https://github.com/yzmcms/yzmcms/issues/27 -CVE-2019-16679 - http://packetstormsecurity.com/files/154578/Gila-CMS-Local-File-Inclusion.html -CVE-2019-16680 - https://bugzilla.gnome.org/show_bug.cgi?id=794337 -CVE-2019-16681 - https://github.com/tarantula-team/Traveloka-Android-App-Critical-Vulnerability -CVE-2019-16685 - http://verneet.com/cve-2019-16685/ -CVE-2019-16686 - http://verneet.com/cve-2019-16686 -CVE-2019-16687 - http://verneet.com/cve-2019-16687 -CVE-2019-16688 - http://verneet.com/cve-2019-16688 -CVE-2019-16692 - http://packetstormsecurity.com/files/154651/phpIPAM-1.4-SQL-Injection.html -CVE-2019-16701 - http://packetstormsecurity.com/files/154587/pfSense-2.3.4-2.4.4-p3-Remote-Code-Injection.html -CVE-2019-16702 - http://packetstormsecurity.com/files/155578/Integard-Pro-NoJs-2.2.0.9026-Remote-Buffer-Overflow.html -CVE-2019-16705 - https://github.com/libming/libming/issues/178 -CVE-2019-16714 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.14 -CVE-2019-16716 - http://packetstormsecurity.com/files/155813/OX-App-Suite-7.10.2-Cross-Site-Scripting-Improper-Access-Control.html -CVE-2019-16716 - http://seclists.org/fulldisclosure/2020/Jan/7 -CVE-2019-16717 - http://packetstormsecurity.com/files/155813/OX-App-Suite-7.10.2-Cross-Site-Scripting-Improper-Access-Control.html -CVE-2019-16717 - http://seclists.org/fulldisclosure/2020/Jan/7 -CVE-2019-16724 - http://packetstormsecurity.com/files/154586/File-Sharing-Wizard-1.5.0-SEH-Buffer-Overflow.html -CVE-2019-16724 - http://packetstormsecurity.com/files/154777/File-Sharing-Wizard-1.5.0-POST-SEH-Overflow.html -CVE-2019-16724 - https://www.exploit-db.com/exploits/47412 -CVE-2019-16730 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16730 - https://www.securityevaluators.com/research/ -CVE-2019-16731 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16732 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16733 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16734 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16735 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16736 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-16737 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-1674 - https://www.exploit-db.com/exploits/46479/ -CVE-2019-16743 - http://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html -CVE-2019-16744 - https://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html -CVE-2019-16745 - https://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html -CVE-2019-16746 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-16746 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-16754 - https://github.com/RIOT-OS/RIOT/pull/12293 -CVE-2019-16758 - http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html -CVE-2019-16758 - http://seclists.org/fulldisclosure/2019/Nov/17 -CVE-2019-16759 - http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html -CVE-2019-16759 - http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html -CVE-2019-16759 - http://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.html -CVE-2019-16759 - http://packetstormsecurity.com/files/158829/vBulletin-5.x-Remote-Code-Execution.html -CVE-2019-16759 - http://packetstormsecurity.com/files/158830/vBulletin-5.x-Remote-Code-Execution.html -CVE-2019-16759 - http://packetstormsecurity.com/files/158866/vBulletin-5.x-Remote-Code-Execution.html -CVE-2019-16759 - https://seclists.org/fulldisclosure/2019/Sep/31 -CVE-2019-16759 - https://www.theregister.co.uk/2019/09/24/vbulletin_vbug_zeroday/ -CVE-2019-16773 - https://hackerone.com/reports/509930 -CVE-2019-16775 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16775 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-16776 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16777 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16780 - https://wpvulndb.com/vulnerabilities/9976 -CVE-2019-16781 - https://wpvulndb.com/vulnerabilities/9976 -CVE-2019-16785 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-16786 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-16789 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-16792 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-16862 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16862/README.md -CVE-2019-16864 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-16864 -CVE-2019-16868 - https://github.com/emlog/emlog/issues/48 -CVE-2019-16872 - https://fortiguard.com/zeroday/FG-VD-19-120 -CVE-2019-16874 - https://fortiguard.com/zeroday/FG-VD-19-121 -CVE-2019-16884 - https://github.com/opencontainers/runc/issues/2128 -CVE-2019-16885 - http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html -CVE-2019-16885 - http://seclists.org/fulldisclosure/2019/Dec/15 -CVE-2019-16885 - https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms -CVE-2019-16891 - https://dappsec.substack.com/p/an-advisory-for-cve-2019-16891-from -CVE-2019-16891 - https://sec.vnpt.vn/2019/09/liferay-deserialization-json-deserialization-part-4/ -CVE-2019-16891 - https://www.youtube.com/watch?v=DjMEfQW3bf0 -CVE-2019-16892 - https://github.com/rubyzip/rubyzip/pull/403 -CVE-2019-16893 - https://exploit-db.com/exploits/47958 -CVE-2019-16894 - https://www.exploit-db.com/exploits/47426 -CVE-2019-16897 - https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md -CVE-2019-16899 - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html -CVE-2019-16900 - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html -CVE-2019-16901 - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html -CVE-2019-16906 - http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html -CVE-2019-16907 - http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html -CVE-2019-16908 - http://packetstormsecurity.com/files/154992/Infosysta-Jira-1.6.13_J8-Project-List-Authentication-Bypass.html -CVE-2019-16909 - http://packetstormsecurity.com/files/154992/Infosysta-Jira-1.6.13_J8-Project-List-Authentication-Bypass.html -CVE-2019-16913 - https://flipflopsecurity.wordpress.com/2019/10/07/pc-protect-v4-14-31-privilege-esclation/ -CVE-2019-16917 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-16920 - https://www.kb.cert.org/vuls/id/766427 -CVE-2019-16931 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf -CVE-2019-16931 - https://wpvulndb.com/vulnerabilities/9893 -CVE-2019-16932 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf -CVE-2019-16932 - https://wpvulndb.com/vulnerabilities/9892 -CVE-2019-16935 - https://bugs.python.org/issue38243 -CVE-2019-16935 - https://hackerone.com/reports/705420 -CVE-2019-16935 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-16941 - https://github.com/purpleracc00n/CVE-2019-16941 -CVE-2019-16942 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2019-16942 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-16942 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-16942 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-16942 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16942 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-16942 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-16943 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2019-16943 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-16943 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-16943 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-16943 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-16943 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-16948 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ -CVE-2019-16949 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ -CVE-2019-16950 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ -CVE-2019-16951 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ -CVE-2019-16954 - https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/ -CVE-2019-16955 - https://www.esecforte.com/cross-site-scripting-via-file-upload-vulnerability-in-solarwinds-web-help-desk/ -CVE-2019-16956 - https://www.esecforte.com/cross-site-scripting-vulnerability-india-responsible-vulnerability-disclosure/ -CVE-2019-16957 - https://www.esecforte.com/cross-site-scripting-vulnerability-in-solarwinds-web-help-desk/ -CVE-2019-16958 - https://www.esecforte.com/cross-site-scripting-vulnerability-with-solarwinds-web-help-desk/ -CVE-2019-16959 - https://www.esecforte.com/formula-injection-vulnerability-india-in-solarwinds-web-help-desk/ -CVE-2019-16960 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-16960-cross-site-scripting-vulnerability-in-solarwinds-web-help-desk/ -CVE-2019-16961 - https://www.esecforte.com/cross-site-scripting-vulnerability-in-solarwinds-web-help-desk-cve-2019-16961-responsible-vulnerability-disclosure/ -CVE-2019-16962 - https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/ -CVE-2019-16999 - https://github.com/idcos/Cloudboot/issues/22 -CVE-2019-17000 - https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 -CVE-2019-17001 - https://bugzilla.mozilla.org/show_bug.cgi?id=1587976 -CVE-2019-17003 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2019-17003 -CVE-2019-17005 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-17008 - https://bugzilla.mozilla.org/show_bug.cgi?id=1546331 -CVE-2019-17008 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-17009 - https://bugzilla.mozilla.org/show_bug.cgi?id=1510494 -CVE-2019-17009 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-17010 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-17011 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-17012 - https://www.mozilla.org/security/advisories/mfsa2019-38/ -CVE-2019-17014 - https://bugzilla.mozilla.org/show_bug.cgi?id=1322864 -CVE-2019-17015 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -CVE-2019-17015 - https://bugzilla.mozilla.org/show_bug.cgi?id=1599005 -CVE-2019-17016 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -CVE-2019-17016 - https://bugzilla.mozilla.org/show_bug.cgi?id=1599181 -CVE-2019-17017 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -CVE-2019-17017 - https://bugzilla.mozilla.org/show_bug.cgi?id=1603055 -CVE-2019-17021 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -CVE-2019-17021 - https://bugzilla.mozilla.org/show_bug.cgi?id=1599008 -CVE-2019-17022 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -CVE-2019-17022 - https://bugzilla.mozilla.org/show_bug.cgi?id=1602843 -CVE-2019-17023 - https://usn.ubuntu.com/4397-1/ -CVE-2019-17024 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -CVE-2019-17026 - http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html -CVE-2019-17026 - https://bugzilla.mozilla.org/show_bug.cgi?id=1607443 -CVE-2019-17045 - https://syhack.wordpress.com/2019/09/29/ilch-content-management-system-v-2-1-22-vulnerability-disclosure/ -CVE-2019-17046 - https://syhack.wordpress.com/2019/09/29/ilch-content-management-system-v-2-1-22-insecure-file-upload-lfi-remote-code-execution-critical-vulnerability-disclosure/ -CVE-2019-17052 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17052 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0614e2b73768b502fc32a75349823356d98aae2c -CVE-2019-17052 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b -CVE-2019-17053 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17053 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b -CVE-2019-17053 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef -CVE-2019-17054 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b -CVE-2019-17054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac -CVE-2019-17055 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html -CVE-2019-17055 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b -CVE-2019-17055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80 -CVE-2019-17056 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17056 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b -CVE-2019-17056 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a359798b176183ef09efb7a3dc59abad1cc7104 -CVE-2019-17059 - https://thebestvpn.com/cyberoam-preauth-rce/ -CVE-2019-17062 - https://oxidforge.org/en/security-bulletin-2019-002.html -CVE-2019-17064 - http://packetstormsecurity.com/files/154713/Xpdf-4.02-NULL-Pointer-Dereference.html -CVE-2019-17064 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41890 -CVE-2019-17073 - https://github.com/emlog/emlog/issues/49 -CVE-2019-17075 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17075 - https://usn.ubuntu.com/4208-1/ -CVE-2019-17075 - https://usn.ubuntu.com/4211-2/ -CVE-2019-17075 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17080 - http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html -CVE-2019-17091 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=548244 -CVE-2019-17091 - https://github.com/eclipse-ee4j/mojarra/files/3039198/advisory.txt -CVE-2019-17091 - https://github.com/eclipse-ee4j/mojarra/issues/4556 -CVE-2019-17091 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17091 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17091 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-17092 - http://packetstormsecurity.com/files/154851/OpenProject-10.0.1-9.0.3-Cross-Site-Scripting.html -CVE-2019-17092 - http://seclists.org/fulldisclosure/2019/Oct/29 -CVE-2019-17092 - https://seclists.org/bugtraq/2019/Oct/19 -CVE-2019-17093 - https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses -CVE-2019-17094 - https://labs.bitdefender.com/2019/12/multiple-vulnerabilities-in-belkin-wemo-insight-switch/ -CVE-2019-17098 - https://labs.bitdefender.com/2020/08/smart-locks-not-so-smart-with-wi-fi-security/ -CVE-2019-17101 - https://labs.bitdefender.com/2020/04/cracking-the-netatmo-smart-indoor-security-camera/ -CVE-2019-17114 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17115 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17116 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17117 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17118 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17119 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17120 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -CVE-2019-17123 - https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8 -CVE-2019-17124 - http://packetstormsecurity.com/files/166541/Kramer-VIAware-2.5.0719.1034-Remote-Code-Execution.html -CVE-2019-17124 - https://github.com/hessandrew/CVE-2019-17124 -CVE-2019-17128 - http://packetstormsecurity.com/files/154763/OmniCenter-12.1.1-SQL-Injection.html -CVE-2019-17132 - http://packetstormsecurity.com/files/154759/vBulletin-5.5.4-Remote-Code-Execution.html -CVE-2019-17132 - http://seclists.org/fulldisclosure/2019/Oct/9 -CVE-2019-17133 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-17133 - https://usn.ubuntu.com/4208-1/ -CVE-2019-17133 - https://usn.ubuntu.com/4211-2/ -CVE-2019-17133 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17176 - https://gist.github.com/MortalP0ison/5fd584b4c85fa13281fdc918913446fa -CVE-2019-17177 - https://github.com/FreeRDP/FreeRDP/issues/5645 -CVE-2019-17177 - https://usn.ubuntu.com/4379-1/ -CVE-2019-17178 - https://github.com/FreeRDP/FreeRDP/issues/5645 -CVE-2019-17179 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17179/README.md -CVE-2019-17180 - https://habr.com/ru/company/pm/blog/469507/ -CVE-2019-17181 - https://cxsecurity.com/issue/WLB-2019100164 -CVE-2019-17190 - http://packetstormsecurity.com/files/156844/Avast-Secure-Browser-76.0.1659.101-Local-Privilege-Escalation.html -CVE-2019-17195 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-17195 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-17195 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-17206 - https://github.com/frostming/rediswrapper/pull/1 -CVE-2019-17207 - http://packetstormsecurity.com/files/154875/WordPress-Broken-Link-Checker-1.11.8-Cross-Site-Scripting.html -CVE-2019-17207 - http://seclists.org/fulldisclosure/2019/Oct/31 -CVE-2019-17207 - https://wpvulndb.com/vulnerabilities/9917 -CVE-2019-17213 - https://packetstormsecurity.com/files/149573/WordPress-WebARX-Website-Firewall-4.9.8-XSS-Bypass.html -CVE-2019-17214 - https://packetstormsecurity.com/files/149573/WordPress-WebARX-Website-Firewall-4.9.8-XSS-Bypass.html -CVE-2019-17215 - https://vuldb.com/?id.140463 -CVE-2019-17216 - https://vuldb.com/?id.134117 -CVE-2019-17217 - https://vuldb.com/?id.140464 -CVE-2019-17218 - https://vuldb.com/?id.134116 -CVE-2019-17219 - https://vuldb.com/?id.134115 -CVE-2019-17220 - http://packetstormsecurity.com/files/154944/Rocket.Chat-2.1.0-Cross-Site-Scripting.html -CVE-2019-17220 - https://www.nezami.me/ -CVE-2019-17222 - https://www.youtube.com/watch?v=e3sozdDExTM -CVE-2019-17223 - https://medium.com/@k43p/cve-2019-17223-stored-html-injection-dolibarr-crm-erp-ad1e064d0ca5 -CVE-2019-17224 - https://vulnerabilities.home.blog/2019/10/27/again-a-vunerability-in-cable-router-ch7465lg-cve-2019-17224/ -CVE-2019-17225 - http://packetstormsecurity.com/files/154746/Subrion-4.2.1-Cross-Site-Scripting.html -CVE-2019-17225 - https://github.com/intelliants/subrion/issues/845 -CVE-2019-17228 - https://wpvulndb.com/vulnerabilities/9884 -CVE-2019-17229 - https://wpvulndb.com/vulnerabilities/9884 -CVE-2019-17232 - https://wpvulndb.com/vulnerabilities/9883 -CVE-2019-17233 - https://wpvulndb.com/vulnerabilities/9883 -CVE-2019-17239 - https://wpvulndb.com/vulnerabilities/9896 -CVE-2019-17240 - http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html -CVE-2019-17240 - http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-Bypass.html -CVE-2019-17240 - https://github.com/bludit/bludit/pull/1090 -CVE-2019-17240 - https://rastating.github.io/bludit-brute-force-mitigation-bypass/ -CVE-2019-17263 - http://packetstormsecurity.com/files/154774/libyal-libfwsi-Buffer-Overread.html -CVE-2019-17263 - https://github.com/libyal/libfwsi/issues/13 -CVE-2019-17264 - https://github.com/libyal/liblnk/issues/38 -CVE-2019-17266 - https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md -CVE-2019-17267 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-17267 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17267 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17270 - http://packetstormsecurity.com/files/155582/Yachtcontrol-2019-10-06-Remote-Code-Execution.html -CVE-2019-17270 - https://www.exploit-db.com/exploits/47760 -CVE-2019-17271 - http://packetstormsecurity.com/files/154758/vBulletin-5.5.4-SQL-Injection.html -CVE-2019-17351 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -CVE-2019-17355 - https://pastebin.com/GgpFz3ZW -CVE-2019-17356 - https://bit.ly/2kfL7xE -CVE-2019-17356 - https://pastebin.com/yUFxs2J7 -CVE-2019-17359 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-17359 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-17359 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-17359 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17359 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17361 - https://github.com/saltstack/salt/commits/master -CVE-2019-17362 - https://github.com/libtom/libtomcrypt/issues/507 -CVE-2019-17362 - https://github.com/libtom/libtomcrypt/pull/508 -CVE-2019-17362 - https://vuldb.com/?id.142995 -CVE-2019-17364 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 -CVE-2019-17371 - https://github.com/glennrp/libpng/issues/307 -CVE-2019-17371 - https://github.com/glennrp/libpng/issues/307#issuecomment-544779431 -CVE-2019-17371 - https://gitlab.com/esr/gif2png/issues/8 -CVE-2019-17372 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/netgear_cgi_unauthorized_access_vulnerability.md -CVE-2019-17373 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md -CVE-2019-17382 - https://www.exploit-db.com/exploits/47467 -CVE-2019-17384 - https://wpvulndb.com/vulnerabilities/9900 -CVE-2019-17385 - https://wpvulndb.com/vulnerabilities/9900 -CVE-2019-17386 - https://wpvulndb.com/vulnerabilities/9900 -CVE-2019-17387 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html -CVE-2019-17387 - https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/ -CVE-2019-17388 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html -CVE-2019-17388 - https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/ -CVE-2019-17389 - https://github.com/RIOT-OS/RIOT/pull/12382 -CVE-2019-17390 - https://improsec.com -CVE-2019-17391 - https://www.espressif.com/en/news/Security_Advisory_Concerning_Fault_Injection_and_eFuse_Protections -CVE-2019-17392 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-November-2019 -CVE-2019-17393 - http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html -CVE-2019-17393 - http://seclists.org/fulldisclosure/2019/Oct/33 -CVE-2019-17394 - https://pastebin.com/h8v0qxZH -CVE-2019-17395 - https://pastebin.com/8dvs5RcJ -CVE-2019-17396 - https://pastebin.com/9VBiRpAR -CVE-2019-17397 - https://pastebin.com/hGg5efMe -CVE-2019-17398 - https://pastebin.com/5ZDDCqgL -CVE-2019-17400 - https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ -CVE-2019-17401 - https://github.com/libyal/liblnk/issues/40 -CVE-2019-17402 - https://github.com/Exiv2/exiv2/issues/1019 -CVE-2019-17403 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-17404 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-17405 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-17406 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-17408 - https://github.com/Tardis07/CVE_GO/blob/master/zzzphp_code_execution_v1.7.3.md -CVE-2019-17409 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17409/README.md -CVE-2019-17415 - https://packetstormsecurity.com/files/154738/File-Sharing-Wizard-1.5.0-DELETE-SEH-Buffer-Overflow.html -CVE-2019-17424 - http://packetstormsecurity.com/files/155378/nipper-ng-0.11.10-Remote-Buffer-Overflow.html -CVE-2019-17426 - https://github.com/Automattic/mongoose/issues/8222 -CVE-2019-17427 - https://github.com/RealLinkers/CVE-2019-17427 -CVE-2019-17428 - https://know.bishopfox.com/advisories -CVE-2019-17428 - https://know.bishopfox.com/advisories/solismed-critical -CVE-2019-17430 - https://github.com/eyoucms/eyoucms/issues/1 -CVE-2019-17449 - https://safebreach.com/Post/Avira-Antivirus-2019-4-Services-DLL-Preloading-and-Potential-Abuses-CVE-2019-17449 -CVE-2019-17450 - https://sourceware.org/bugzilla/show_bug.cgi?id=25078 -CVE-2019-17451 - https://sourceware.org/bugzilla/show_bug.cgi?id=25070 -CVE-2019-17452 - https://github.com/axiomatic-systems/Bento4/issues/434 -CVE-2019-17453 - https://github.com/axiomatic-systems/Bento4/issues/436 -CVE-2019-17453 - https://github.com/axiomatic-systems/Bento4/issues/437 -CVE-2019-17454 - https://github.com/axiomatic-systems/Bento4/issues/435 -CVE-2019-17455 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942145 -CVE-2019-17455 - https://gitlab.com/jas/libntlm/issues/2 -CVE-2019-17489 - https://github.com/shi-yang/jnoj/issues/51 -CVE-2019-17490 - https://github.com/shi-yang/jnoj/issues/51 -CVE-2019-17491 - https://github.com/shi-yang/jnoj/issues/51 -CVE-2019-17493 - https://github.com/shi-yang/jnoj/issues/51 -CVE-2019-17495 - https://github.com/tarantula-team/CSS-injection-in-Swagger-UI -CVE-2019-17495 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17495 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-17495 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-17495 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17498 - http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html -CVE-2019-17502 - https://gist.github.com/fxb6476/0b9883a88ff2ca40de46a8469834e16c -CVE-2019-17503 - http://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html -CVE-2019-17504 - http://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html -CVE-2019-17505 - https://github.com/dahua966/Routers-vuls/blob/master/DAP-1320/vuls_poc.md -CVE-2019-17509 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/vuls_info.md -CVE-2019-17510 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/vuls_info.md -CVE-2019-17511 - https://github.com/dahua966/Routers-vuls -CVE-2019-17512 - https://github.com/dahua966/Routers-vuls -CVE-2019-17515 - https://wpvulndb.com/vulnerabilities/9949 -CVE-2019-17520 - https://www.youtube.com/watch?v=Iw8sIBLWE_w -CVE-2019-17521 - https://github.com/Elias-Black/Landing-CMS/issues/8 -CVE-2019-17524 - https://gitlab.com/luiss/cve_repo/blob/master/CVE-2019-17523/README.md -CVE-2019-17525 - http://packetstormsecurity.com/files/157936/D-Link-DIR-615-T1-20.10-CAPTCHA-Bypass.html -CVE-2019-17526 - https://sethsec.blogspot.com/2016/11/exploiting-python-code-injection-in-web.html -CVE-2019-17531 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2019-17531 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-17531 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-17531 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-17531 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17531 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17535 - https://rastating.github.io/gila-cms-reflected-xss/ -CVE-2019-17536 - https://rastating.github.io/gila-cms-upload-filter-bypass-and-rce/ -CVE-2019-17541 - https://github.com/ImageMagick/ImageMagick/issues/1641 -CVE-2019-17543 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-17543 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17545 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-17550 - https://wpvulndb.com/vulnerabilities/9948 -CVE-2019-17554 - http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html -CVE-2019-17558 - http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html -CVE-2019-17558 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17560 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17561 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17563 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-17563 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-17563 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17566 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-17566 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17566 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-17566 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2019-17566 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-17566 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-17567 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-17569 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-17569 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17569 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17570 - http://www.openwall.com/lists/oss-security/2020/01/24/2 -CVE-2019-17570 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp -CVE-2019-17571 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17571 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-17571 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-17571 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17571 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-17573 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17573 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-17574 - https://wpvulndb.com/vulnerabilities/9907 -CVE-2019-17576 - https://mycvee.blogspot.com/p/blog-page.html -CVE-2019-17577 - https://mycvee.blogspot.com/p/cve-2019-17576.html -CVE-2019-17578 - https://mycvee.blogspot.com/p/cve-2019-17578.html -CVE-2019-17582 - https://github.com/nih-at/libzip/issues/5 -CVE-2019-17584 - https://w1n73r.de/CVE/2019/17584/ -CVE-2019-17594 - https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html -CVE-2019-17595 - https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html -CVE-2019-17598 - https://www.playframework.com/security/vulnerability -CVE-2019-17599 - https://wpvulndb.com/vulnerabilities/9977 -CVE-2019-17600 - https://www.exploit-db.com/exploits/46770/ -CVE-2019-17601 - https://packetstormsecurity.com/files/154819/MiniShare-1.4.1-CONNECT-Remote-Buffer-Overflow.html -CVE-2019-17603 - http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html -CVE-2019-17603 - https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/ -CVE-2019-17604 - https://gist.github.com/AhMyth/b0f7e4b8244def8eb8d7d8c61fa6d4e5 -CVE-2019-17605 - https://gist.github.com/AhMyth/6d9c5e15d943dd092ccca19fca8d5d37 -CVE-2019-17612 - https://github.com/Ers4tz/vuln/blob/master/74cms_5.2.8_SQLI.md -CVE-2019-17613 - https://github.com/Ers4tz/vuln/blob/master/qibosoft/qibosoft_v7_remote_code_execution.md -CVE-2019-17621 - http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html -CVE-2019-17621 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104 -CVE-2019-17621 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9 -CVE-2019-17624 - http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html -CVE-2019-17624 - https://www.exploit-db.com/exploits/47507 -CVE-2019-17625 - https://github.com/ramboxapp/community-edition/issues/2418 -CVE-2019-17632 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17632 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17633 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=551596 -CVE-2019-17636 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747 -CVE-2019-17637 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=458571 -CVE-2019-17638 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-17638 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-17643 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 -CVE-2019-17645 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 -CVE-2019-17646 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 -CVE-2019-17647 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 -CVE-2019-17650 - https://fortiguard.com/advisory/FG-IR-19-210 -CVE-2019-17652 - https://fortiguard.com/psirt/FG-IR-19-238 -CVE-2019-17655 - https://fortiguard.com/psirt/FG-IR-20-224 -CVE-2019-17656 - https://fortiguard.com/advisory/FG-IR-21-007 -CVE-2019-17658 - https://fortiguard.com/advisory/FG-IR-19-281 -CVE-2019-17662 - http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html -CVE-2019-17662 - https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py -CVE-2019-17662 - https://redteamzone.com/ThinVNC/ -CVE-2019-17666 - https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/ -CVE-2019-17669 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-17670 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-17671 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-17672 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-17673 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-17674 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-17675 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -CVE-2019-1785 - https://bugzilla.clamav.net/show_bug.cgi?id=12284 -CVE-2019-1791 - http://www.securityfocus.com/bid/108390 -CVE-2019-18194 - https://www.youtube.com/watch?v=88qeaLq98Gc -CVE-2019-18196 - https://safebreach.com/Post/TeamViewer-Windows-Client-v11-to-v14-DLL-Preloading-and-Potential-Abuses-CVE-2019-18196 -CVE-2019-18197 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-18198 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 -CVE-2019-18199 - http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html -CVE-2019-18199 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt -CVE-2019-18199 - https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ -CVE-2019-18200 - http://packetstormsecurity.com/files/154956/Fujitsu-Wireless-Keyboard-Set-LX390-Keystroke-Injection.html -CVE-2019-18200 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt -CVE-2019-18200 - https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ -CVE-2019-18201 - http://packetstormsecurity.com/files/154955/Fujitsu-Wireless-Keyboard-Set-LX390-Missing-Encryption.html -CVE-2019-18201 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-010.txt -CVE-2019-18201 - https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ -CVE-2019-18203 - https://medium.com/zero2flag/cve-2019-18203-bfa65918e591 -CVE-2019-1821 - http://packetstormsecurity.com/files/153350/Cisco-Prime-Infrastructure-Health-Monitor-TarArchive-Directory-Traversal.html -CVE-2019-18212 - https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/ -CVE-2019-18213 - https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/ -CVE-2019-18215 - https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215 -CVE-2019-18216 - https://blog.modpr0.be/2019/10/18/asus-rog-bios-reset-on-lost-battery-power/ -CVE-2019-18221 - https://vuldb.com/?id.144170 -CVE-2019-18276 - http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html -CVE-2019-18276 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-18276 - https://www.youtube.com/watch?v=-wGtxJ8opa8 -CVE-2019-18277 - https://nathandavison.com/blog/haproxy-http-request-smuggling -CVE-2019-18278 - https://code610.blogspot.com/2019/10/random-bytes-in-vlc-308.html -CVE-2019-18279 - https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf -CVE-2019-18282 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10 -CVE-2019-18283 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18284 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18285 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18286 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18287 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18288 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18289 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18290 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18291 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18292 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18293 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18294 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18295 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18296 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18297 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18298 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18299 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18300 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18301 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18302 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18303 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18304 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18305 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18306 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18307 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -CVE-2019-18344 - https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli -CVE-2019-18345 - http://packetstormsecurity.com/files/155630/DAViCal-CalDAV-Server-1.1.8-Reflective-Cross-Site-Scripting.html -CVE-2019-18345 - https://hackdefense.com/publications/cve-2019-18345-davical-caldav-server-vulnerability/ -CVE-2019-18346 - http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html -CVE-2019-18346 - http://seclists.org/fulldisclosure/2019/Dec/17 -CVE-2019-18346 - http://seclists.org/fulldisclosure/2019/Dec/19 -CVE-2019-18347 - http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html -CVE-2019-18347 - http://seclists.org/fulldisclosure/2019/Dec/17 -CVE-2019-18347 - http://seclists.org/fulldisclosure/2019/Dec/19 -CVE-2019-18347 - https://hackdefense.com/publications/cve-2019-18347-davical-caldav-server-vulnerability/ -CVE-2019-18348 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-18350 - https://github.com/ant-design/ant-design-pro/pull/5461 -CVE-2019-18359 - https://sourceforge.net/p/mp3gain/bugs/46/ -CVE-2019-18370 - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py -CVE-2019-18371 - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/arbitrary_file_read_vulnerability.py -CVE-2019-18387 - https://www.sevenlayers.com/index.php/266-hotel-and-lodge-management-system-1-0-sqli -CVE-2019-18396 - http://packetstormsecurity.com/files/155296/Technicolor-TD5130.2-Remote-Command-Execution.html -CVE-2019-18396 - https://medium.com/@c4pt41nnn/cve-2019-18396-command-injection-in-technicolor-router-da5dd2134052 -CVE-2019-18409 - https://github.com/zenspider/ruby_parser-legacy/issues/1 -CVE-2019-18411 - https://gist.github.com/aliceicl/e32fb4a17277c7db9e0256185ac03dae -CVE-2019-18413 - https://github.com/typestack/class-validator/issues/438 -CVE-2019-18413 - https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 -CVE-2019-18418 - http://packetstormsecurity.com/files/154986/ClonOs-WEB-UI-19.09-Improper-Access-Control.html -CVE-2019-18426 - http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html -CVE-2019-1854 - http://packetstormsecurity.com/files/152963/Cisco-Expressway-Gateway-11.5.1-Directory-Traversal.html -CVE-2019-1854 - http://seclists.org/fulldisclosure/2019/May/28 -CVE-2019-1854 - https://seclists.org/bugtraq/2019/May/49 -CVE-2019-18567 - https://airbus-cyber-security.com/dive-into-a-kernel-bromium-race-condition-cve-2019-18567 -CVE-2019-18608 - https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md -CVE-2019-18624 - http://firstsight.me/2019/10/illegal-rendered-at-download-feature-in-several-apps-including-opera-mini-that-lead-to-extension-manipulation-with-rtlo/ -CVE-2019-18624 - https://medium.com/@YoKoKho/illegal-rendered-at-download-feature-in-opera-mini-that-lead-to-extension-manipulation-with-rtlo-685bf2d77d51 -CVE-2019-18634 - http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html -CVE-2019-18634 - http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html -CVE-2019-18634 - https://seclists.org/bugtraq/2020/Feb/2 -CVE-2019-18641 - http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html -CVE-2019-18641 - http://seclists.org/fulldisclosure/2021/Jan/1 -CVE-2019-18642 - http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html -CVE-2019-18643 - http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html -CVE-2019-18653 - http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ -CVE-2019-18653 - https://medium.com/@YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968 -CVE-2019-18654 - http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ -CVE-2019-18654 - https://medium.com/@YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968 -CVE-2019-18655 - https://www.0xhuesca.com/2019/11/cve-2019-18655.html -CVE-2019-18657 - https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md -CVE-2019-18660 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-18660 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1 -CVE-2019-18660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad -CVE-2019-18662 - http://packetstormsecurity.com/files/155564/YouPHPTube-7.7-SQL-Injection.html -CVE-2019-18662 - https://github.com/YouPHPTube/YouPHPTube/issues/2202 -CVE-2019-18668 - https://wpvulndb.com/vulnerabilities/9936 -CVE-2019-18671 - https://blog.inhq.net/posts/keepkey-CVE-2019-18671/ -CVE-2019-18671 - https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 -CVE-2019-18672 - https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ -CVE-2019-18672 - https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 -CVE-2019-18675 - https://deshal3v.github.io/blog/kernel-research/mmap_exploitation -CVE-2019-18675 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429 -CVE-2019-18680 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.195 -CVE-2019-18683 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-18683 - http://www.openwall.com/lists/oss-security/2019/11/05/1 -CVE-2019-18683 - https://usn.ubuntu.com/4287-2/ -CVE-2019-18683 - https://www.openwall.com/lists/oss-security/2019/11/02/1 -CVE-2019-18684 - https://gist.github.com/oxagast/51171aa161074188a11d96cbef884bbd -CVE-2019-18786 - https://usn.ubuntu.com/4287-2/ -CVE-2019-18793 - http://packetstormsecurity.com/files/155175/Parallels-Plesk-Panel-9.5-Cross-Site-Scripting.html -CVE-2019-18794 - https://github.com/staufnic/CVE/tree/master/CVE-2019-18794 -CVE-2019-18795 - https://github.com/staufnic/CVE/tree/master/CVE-2019-18795 -CVE-2019-18796 - https://github.com/staufnic/CVE/tree/master/CVE-2019-18796 -CVE-2019-18797 - https://github.com/sass/libsass/issues/3000 -CVE-2019-18798 - https://github.com/sass/libsass/issues/2999 -CVE-2019-18799 - https://github.com/sass/libsass/issues/3001 -CVE-2019-18801 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-gxvv-x4p2-rppp -CVE-2019-18804 - https://usn.ubuntu.com/4198-1/ -CVE-2019-18805 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html -CVE-2019-18805 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78 -CVE-2019-18806 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 -CVE-2019-18807 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 -CVE-2019-18808 - https://usn.ubuntu.com/4526-1/ -CVE-2019-18809 - https://usn.ubuntu.com/4287-2/ -CVE-2019-18810 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 -CVE-2019-18810 - https://usn.ubuntu.com/4208-1/ -CVE-2019-18818 - http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html -CVE-2019-18818 - http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html -CVE-2019-18818 - http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html -CVE-2019-18818 - https://github.com/strapi/strapi/pull/4443 -CVE-2019-18818 - https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5 -CVE-2019-18819 - https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html -CVE-2019-18820 - https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html -CVE-2019-18821 - https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html -CVE-2019-18824 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18825 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18827 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18828 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18829 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18830 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18831 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18832 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18833 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ -CVE-2019-18836 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xvf-4396-cj46 -CVE-2019-18839 - https://packetstormsecurity.com/files/155261/FUDForum-3.0.9-Code-Execution-Cross-Site-Scripting.html -CVE-2019-18842 - https://www.tildeho.me/theres-javascript-in-my-power-plug/ -CVE-2019-18845 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-012.md -CVE-2019-18846 - http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html -CVE-2019-18846 - http://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -CVE-2019-18852 - https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf -CVE-2019-18854 - https://fortiguard.com/zeroday/FG-VD-19-113 -CVE-2019-18854 - https://wordpress.org/plugins/safe-svg/#developers -CVE-2019-18854 - https://wpvulndb.com/vulnerabilities/9937 -CVE-2019-18855 - https://fortiguard.com/zeroday/FG-VD-19-113 -CVE-2019-18855 - https://wordpress.org/plugins/safe-svg/#developers -CVE-2019-18855 - https://wpvulndb.com/vulnerabilities/9937 -CVE-2019-18856 - https://fortiguard.com/zeroday/FG-VD-19-115 -CVE-2019-18858 - https://www.tenable.com/security/research/tra-2019-48 -CVE-2019-18859 - http://packetstormsecurity.com/files/155926/Digi-AnywhereUSB-14-Cross-Site-Scripting.html -CVE-2019-18859 - https://gist.github.com/RNPG/e0d25ad51aa5c288b9005900f88a4f03 -CVE-2019-18862 - http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html -CVE-2019-18883 - http://packetstormsecurity.com/files/155241/LavaLite-CMS-5.7-Cross-Site-Scripting.html -CVE-2019-18884 - http://packetstormsecurity.com/files/155242/RISE-Ultimate-Project-Manager-2.3-Cross-Site-Request-Forgery.html -CVE-2019-18885 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-18885 - https://github.com/bobfuzzer/CVE-2019-18885 -CVE-2019-18885 - https://usn.ubuntu.com/4287-2/ -CVE-2019-18885 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-18886 - https://github.com/symfony/symfony/releases/tag/v4.3.8 -CVE-2019-18887 - https://github.com/symfony/symfony/releases/tag/v4.3.8 -CVE-2019-18888 - https://github.com/symfony/symfony/releases/tag/v4.3.8 -CVE-2019-18889 - https://github.com/symfony/symfony/releases/tag/v4.3.8 -CVE-2019-18890 - https://github.com/RealLinkers/CVE-2019-18890 -CVE-2019-18893 - https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/ -CVE-2019-18894 - https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/ -CVE-2019-18895 - http://hyp3rlinx.altervista.org -CVE-2019-18895 - http://seclists.org/fulldisclosure/2019/Nov/5 -CVE-2019-18895 - https://packetstormsecurity.com/files/155319/ScanGuard-Antivirus-Insecure-Permissions.html -CVE-2019-18897 - https://bugzilla.suse.com/show_bug.cgi?id=1157465 -CVE-2019-18898 - https://bugzilla.suse.com/show_bug.cgi?id=1157651 -CVE-2019-18909 - http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html -CVE-2019-18909 - http://seclists.org/fulldisclosure/2020/Mar/39 -CVE-2019-18910 - http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html -CVE-2019-18910 - http://seclists.org/fulldisclosure/2020/Mar/40 -CVE-2019-18922 - http://packetstormsecurity.com/files/155504/Allied-Telesis-AT-GS950-8-Directory-Traversal.html -CVE-2019-18929 - https://github.com/DelspoN/CVE/tree/master/CVE-2019-18929 -CVE-2019-18930 - https://github.com/DelspoN/CVE/tree/master/CVE-2019-18930 -CVE-2019-18931 - https://github.com/DelspoN/CVE/tree/master/CVE-2019-18931 -CVE-2019-18932 - https://bugzilla.suse.com/show_bug.cgi?id=1150554 -CVE-2019-18935 - http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html -CVE-2019-18935 - http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html -CVE-2019-18935 - https://github.com/noperator/CVE-2019-18935 -CVE-2019-18935 - https://www.bleepingcomputer.com/news/security/us-federal-agency-hacked-using-old-telerik-bug-to-steal-data/ -CVE-2019-18951 - http://packetstormsecurity.com/files/155324/Xfilesharing-2.5.1-Local-File-Inclusion-Shell-Upload.html -CVE-2019-18952 - http://packetstormsecurity.com/files/155324/Xfilesharing-2.5.1-Local-File-Inclusion-Shell-Upload.html -CVE-2019-18954 - https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation -CVE-2019-18956 - https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956 -CVE-2019-18957 - http://packetstormsecurity.com/files/155320/MicroStrategy-Library-Cross-Site-Scripting.html -CVE-2019-18958 - https://a-man-in-the-cookie.blogspot.com/2019/11/nitro-pro-vulnerability.html -CVE-2019-1897 - https://www.tenable.com/security/research/tra-2019-29 -CVE-2019-18976 - https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html -CVE-2019-18976 - https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1 -CVE-2019-18979 - https://medium.com/@kusolwatcharaapanukorn/0-days-adaware-antivirus-quarantine-flaws-allow-privilege-escalation-3d1f3c8214ec -CVE-2019-1898 - https://www.tenable.com/security/research/tra-2019-29 -CVE-2019-18989 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ -CVE-2019-1899 - https://www.tenable.com/security/research/tra-2019-29 -CVE-2019-18990 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ -CVE-2019-18991 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ -CVE-2019-19000 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19001 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19002 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19003 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19004 - https://github.com/autotrace/autotrace/pull/40 -CVE-2019-19005 - https://github.com/autotrace/autotrace/pull/40 -CVE-2019-19006 - https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-001/62772 -CVE-2019-19007 - https://medium.com/@rsantos_14778/1500b407dccc -CVE-2019-19011 - https://github.com/miniupnp/ngiflib/issues/16 -CVE-2019-19012 - https://github.com/kkos/oniguruma/issues/164 -CVE-2019-19012 - https://github.com/tarantula-team/CVE-2019-19012 -CVE-2019-19013 - https://packetstormsecurity.com/files/155426/Pagekit-CMS-1.0.17-Cross-Site-Request-Forgery.html -CVE-2019-19014 - https://write-up.github.io/webtitan/ -CVE-2019-19015 - https://write-up.github.io/webtitan/ -CVE-2019-19016 - https://write-up.github.io/webtitan/ -CVE-2019-19017 - https://write-up.github.io/webtitan/ -CVE-2019-19018 - https://write-up.github.io/webtitan/ -CVE-2019-19019 - https://write-up.github.io/webtitan/ -CVE-2019-19020 - https://write-up.github.io/webtitan/ -CVE-2019-19021 - https://write-up.github.io/webtitan/ -CVE-2019-19031 - http://packetstormsecurity.com/files/155996/Easy-XML-Editor-1.7.8-XML-Injection.html -CVE-2019-19032 - http://packetstormsecurity.com/files/156139/XMLBlueprint-16.191112-XML-Injection.html -CVE-2019-19033 - http://packetstormsecurity.com/files/155419/Jalios-JCMS-10-Backdoor-Account-Authentication-Bypass.html -CVE-2019-19034 - http://packetstormsecurity.com/files/157731/ManageEngine-AssetExplorer-Authenticated-Command-Execution.html -CVE-2019-19034 - http://seclists.org/fulldisclosure/2020/May/36 -CVE-2019-19035 - https://bugzilla.redhat.com/show_bug.cgi?id=1765647 -CVE-2019-19036 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036 -CVE-2019-19036 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19037 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19037 -CVE-2019-19039 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039 -CVE-2019-19039 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19044 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19045 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19045 - https://github.com/torvalds/linux/commit/c8c2a057fdc7de1cd16f4baa51425b932a42eb39 -CVE-2019-19047 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19048 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19048 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19049 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10 -CVE-2019-19050 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html -CVE-2019-19051 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19052 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19052 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19054 - https://usn.ubuntu.com/4526-1/ -CVE-2019-19057 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-19057 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19060 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19060 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19061 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19061 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19061 - https://usn.ubuntu.com/4526-1/ -CVE-2019-19062 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-19062 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19063 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-19063 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19063 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19065 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19065 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19066 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19067 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 -CVE-2019-19067 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19067 - https://usn.ubuntu.com/4526-1/ -CVE-2019-19069 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19069 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19071 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19073 - https://usn.ubuntu.com/4526-1/ -CVE-2019-19073 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19074 - https://usn.ubuntu.com/4526-1/ -CVE-2019-19074 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19075 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 -CVE-2019-19075 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19076 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6 -CVE-2019-19078 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19078 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19079 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3 -CVE-2019-19080 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 -CVE-2019-19081 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 -CVE-2019-19082 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19083 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 -CVE-2019-19083 - https://usn.ubuntu.com/4208-1/ -CVE-2019-19089 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19090 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19091 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19092 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19093 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19094 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19095 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19096 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19097 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2019-19113 - https://github.com/newbee-ltd/newbee-mall/issues/1 -CVE-2019-19115 - https://safebreach.com/Post/Nahimic-APO-Software-Component-Driver-Deployed-with-MSI-Computers-DLL-Search-Order-Hijacking-and-Potential-Abuses-CVE-2019-19115 -CVE-2019-1912 - http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html -CVE-2019-19127 - http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html -CVE-2019-1913 - http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html -CVE-2019-19133 - http://packetstormsecurity.com/files/155558/WordPress-CSS-Hero-4.0.3-Cross-Site-Scripting.html -CVE-2019-19133 - http://seclists.org/fulldisclosure/2019/Dec/6 -CVE-2019-19133 - https://wpvulndb.com/vulnerabilities/9966 -CVE-2019-19134 - https://wpvulndb.com/vulnerabilities/10095 -CVE-2019-19135 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf -CVE-2019-19135 - https://opcfoundation.org/security-bulletins/ -CVE-2019-1914 - http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html -CVE-2019-19142 - http://packetstormsecurity.com/files/156589/Intelbras-Wireless-N-150Mbps-WRN240-Authentication-Bypass.html -CVE-2019-19142 - https://fireshellsecurity.team/hack-n-routers/ -CVE-2019-19143 - http://packetstormsecurity.com/files/156586/TP-Link-TL-WR849N-0.9.1-4.16-Authentication-Bypass.html -CVE-2019-19143 - https://fireshellsecurity.team/hack-n-routers/ -CVE-2019-19191 - https://bugzilla.suse.com/show_bug.cgi?id=1157471 -CVE-2019-19191 - https://issues.shibboleth.net/jira/browse/SSPCPP-874 -CVE-2019-19195 - https://www.microchip.com/wwwproducts/en/ATSAMB11 -CVE-2019-19197 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-11-16-kyrol-internet-security-driver-issue.md -CVE-2019-19197 - https://nafiez.github.io/security/vulnerability/2019/11/16/kyrol-internet-security-driver-issue.html -CVE-2019-19198 - http://packetstormsecurity.com/files/155615/WordPress-Scoutnet-Kalender-1.1.0-Cross-Site-Scripting.html -CVE-2019-19198 - https://wpvulndb.com/vulnerabilities/9969 -CVE-2019-19198 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-045.txt -CVE-2019-19199 - http://seclists.org/fulldisclosure/2020/Sep/49 -CVE-2019-19199 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-049.txt -CVE-2019-19199 - https://www.syss.de/pentest-blog/ -CVE-2019-19200 - http://packetstormsecurity.com/files/159455/MailDepot-2032-SP2-2.2.1242-Authorization-Bypass.html -CVE-2019-19200 - https://www.syss.de/pentest-blog/ -CVE-2019-19203 - https://github.com/ManhNDd/CVE-2019-19203 -CVE-2019-19203 - https://github.com/kkos/oniguruma/issues/163 -CVE-2019-19203 - https://github.com/tarantula-team/CVE-2019-19203 -CVE-2019-19204 - https://github.com/ManhNDd/CVE-2019-19204 -CVE-2019-19204 - https://github.com/kkos/oniguruma/issues/162 -CVE-2019-19204 - https://github.com/tarantula-team/CVE-2019-19204 -CVE-2019-19208 - http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html -CVE-2019-19208 - https://herolab.usd.de/en/security-advisories/ -CVE-2019-19208 - https://herolab.usd.de/security-advisories/usd-2019-0049/ -CVE-2019-19208 - https://www.exploit-db.com/exploits/49902 -CVE-2019-19209 - https://herolab.usd.de/en/security-advisories/ -CVE-2019-19209 - https://herolab.usd.de/security-advisories/usd-2019-0051/ -CVE-2019-19210 - https://herolab.usd.de/en/security-advisories/ -CVE-2019-19210 - https://herolab.usd.de/security-advisories/usd-2019-0052/ -CVE-2019-19211 - https://herolab.usd.de/en/security-advisories/ -CVE-2019-19211 - https://herolab.usd.de/en/security-advisories/usd-2019-0053/ -CVE-2019-19212 - https://herolab.usd.de/en/security-advisories/ -CVE-2019-19212 - https://herolab.usd.de/security-advisories/usd-2019-0054/ -CVE-2019-19215 - https://herolab.usd.de/en/security-advisories/ -CVE-2019-19227 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-19227 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 -CVE-2019-19227 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc -CVE-2019-19227 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19228 - http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html -CVE-2019-19228 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/ -CVE-2019-19228 - https://seclists.org/bugtraq/2019/Dec/5 -CVE-2019-19229 - http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html -CVE-2019-19229 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/ -CVE-2019-19229 - https://seclists.org/bugtraq/2019/Dec/5 -CVE-2019-19230 - http://packetstormsecurity.com/files/155631/CA-Nolio-6.6-Arbitrary-Code-Execution.html -CVE-2019-19231 - http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html -CVE-2019-19231 - http://seclists.org/fulldisclosure/2020/Jan/5 -CVE-2019-19232 - https://www.tenable.com/plugins/nessus/133936 -CVE-2019-19241 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 -CVE-2019-19241 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=181e448d8709e517c9c7b523fcd209f24eb38ca7 -CVE-2019-19241 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d69e07793f891524c6bbf1e75b9ae69db4450953 -CVE-2019-19242 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19244 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19245 - http://hyp3rlinx.altervista.org -CVE-2019-19245 - https://packetstormsecurity.com/files/155505/Xinet-Elegant-6-Asset-Library-Web-Interface-6.1.655-SQL-Injection.html -CVE-2019-19262 - https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-2-released/ -CVE-2019-19265 - http://seclists.org/fulldisclosure/2020/Jan/0 -CVE-2019-19265 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-015/-icewarp-cross-site-scripting-in-notes-for-contacts -CVE-2019-19266 - http://seclists.org/fulldisclosure/2020/Jan/1 -CVE-2019-19266 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-016/-icewarp-cross-site-scripting-in-notes -CVE-2019-19269 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19273 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-19306 - https://cybersecurityworks.com/zerodays/cve-2019-19306-zoho.html -CVE-2019-19306 - https://github.com/cybersecurityworks/Disclosed/issues/16 -CVE-2019-19306 - https://wpvulndb.com/vulnerabilities/9919 -CVE-2019-19311 - https://gitlab.com/gitlab-org/gitlab/issues/31536 -CVE-2019-19315 - https://github.com/monoxgas/mailorder -CVE-2019-19317 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19318 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318 -CVE-2019-19318 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19319 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30 -CVE-2019-19319 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319 -CVE-2019-19332 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-19332 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19346 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19346 -CVE-2019-1935 - http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html -CVE-2019-1935 - http://packetstormsecurity.com/files/154305/Cisco-UCS-Director-Default-scpuser-Password.html -CVE-2019-1935 - http://seclists.org/fulldisclosure/2019/Aug/36 -CVE-2019-1935 - https://seclists.org/bugtraq/2019/Aug/49 -CVE-2019-19356 - http://packetstormsecurity.com/files/156588/Netis-WF2419-2.2.36123-Remote-Code-Execution.html -CVE-2019-1936 - http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html -CVE-2019-1936 - http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1936 - http://seclists.org/fulldisclosure/2019/Aug/36 -CVE-2019-1936 - https://seclists.org/bugtraq/2019/Aug/49 -CVE-2019-19363 - http://packetstormsecurity.com/files/156082/Ricoh-Printer-Driver-Local-Privilege-Escalation.html -CVE-2019-19363 - http://packetstormsecurity.com/files/156251/Ricoh-Driver-Privilege-Escalation.html -CVE-2019-19363 - http://seclists.org/fulldisclosure/2020/Jan/34 -CVE-2019-19366 - https://gist.github.com/xax007/94183b11bdfe579fd860a37e74cd3a8e -CVE-2019-19367 - https://gist.github.com/xax007/94183b11bdfe579fd860a37e74cd3a8e -CVE-2019-19368 - http://packetstormsecurity.com/files/155719/Rumpus-FTP-Web-File-Manager-8.2.9.1-Cross-Site-Scripting.html -CVE-2019-1937 - http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html -CVE-2019-1937 - http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html -CVE-2019-1937 - http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html -CVE-2019-1937 - http://seclists.org/fulldisclosure/2019/Aug/36 -CVE-2019-1937 - https://seclists.org/bugtraq/2019/Aug/49 -CVE-2019-19373 - http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html -CVE-2019-19374 - http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html -CVE-2019-19377 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377 -CVE-2019-19377 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19378 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378 -CVE-2019-19382 - http://hyp3rlinx.altervista.org -CVE-2019-19382 - http://packetstormsecurity.com/files/155506/Max-Secure-Anti-Virus-Plus-19.0.4.020-Insecure-Permissions.html -CVE-2019-19384 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 -CVE-2019-19385 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 -CVE-2019-19386 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 -CVE-2019-19387 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 -CVE-2019-19388 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 -CVE-2019-19389 - https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737 -CVE-2019-19390 - https://seclists.org/fulldisclosure/2020/Apr/10 -CVE-2019-19391 - https://github.com/LuaJIT/LuaJIT/pull/526 -CVE-2019-19393 - https://github.com/miguelhamal/CVE-2019-19393 -CVE-2019-19447 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447 -CVE-2019-19448 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448 -CVE-2019-19449 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 -CVE-2019-19452 - https://www.coresecurity.com/advisories/viper-rgb-driver-multiple-vulnerabilities -CVE-2019-19453 - https://www.gruppotim.it/redteam -CVE-2019-19454 - https://www.gruppotim.it/redteam -CVE-2019-19455 - https://www.gruppotim.it/redteam -CVE-2019-19456 - https://www.gruppotim.it/redteam -CVE-2019-19457 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html -CVE-2019-19458 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html -CVE-2019-19458 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ -CVE-2019-19459 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html -CVE-2019-19459 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ -CVE-2019-19460 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html -CVE-2019-19460 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ -CVE-2019-19462 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19468 - https://code610.blogspot.com/2019/11/from-0-to-0day-quick-fuzzing-lesson.html -CVE-2019-19469 - https://github.com/robertchrk/zmanda_exploit -CVE-2019-19484 - https://medium.com/@mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd -CVE-2019-19486 - https://medium.com/@mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd -CVE-2019-19487 - https://medium.com/@mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd -CVE-2019-19489 - https://www.exploit-db.com/exploits/47709 -CVE-2019-19490 - https://www.exploit-db.com/exploits/47706 -CVE-2019-19491 - https://www.exploit-db.com/exploits/47702 -CVE-2019-19492 - https://www.exploit-db.com/exploits/47698 -CVE-2019-19493 - http://packetstormsecurity.com/files/159525/Kentico-CMS-9.0-12.0.49-Cross-Site-Scripting.html -CVE-2019-19493 - https://devnet.kentico.com/download/hotfixes -CVE-2019-19494 - https://github.com/Lyrebirds/Fast8690-exploit -CVE-2019-19495 - https://github.com/Lyrebirds/Fast8690-exploit -CVE-2019-19496 - https://github.com/vipinxsec/Alfresco_XSS/blob/master/README.md -CVE-2019-19496 - https://vipinxsec.blogspot.com/2019/11/alfresco-stored-xss-vulnerability-blind.html -CVE-2019-19500 - http://packetstormsecurity.com/files/157232/Matrix42-Workspace-Management-9.1.2.2765-Cross-Site-Scripting.html -CVE-2019-19500 - http://seclists.org/fulldisclosure/2020/Apr/8 -CVE-2019-19502 - https://visat.me/security/cve-2019-19502/ -CVE-2019-19509 - http://packetstormsecurity.com/files/156146/rConfig-3.9.3-Remote-Code-Execution.html -CVE-2019-19509 - http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html -CVE-2019-19509 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html -CVE-2019-19513 - https://github.com/staufnic/CVE/tree/master/CVE-2019-19513 -CVE-2019-19516 - http://packetstormsecurity.com/files/155557/Intelbras-Router-RF1200-1.1.3-Cross-Site-Request-Forgery.html -CVE-2019-19516 - https://www.exploit-db.com/exploits/47545 -CVE-2019-19519 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html -CVE-2019-19520 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html -CVE-2019-19521 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html -CVE-2019-19522 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html -CVE-2019-19523 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 -CVE-2019-19523 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0 -CVE-2019-19524 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-19524 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12 -CVE-2019-19524 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86 -CVE-2019-19525 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6 -CVE-2019-19525 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fd25e6fc035f4b04b75bca6d7e8daa069603a76 -CVE-2019-19526 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19526 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc -CVE-2019-19527 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 -CVE-2019-19527 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49 -CVE-2019-19527 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d -CVE-2019-19528 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 -CVE-2019-19528 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c468a8aa790e0dfe0a7f8a39db282d39c2c00b46 -CVE-2019-19528 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=edc4746f253d907d048de680a621e121517f484b -CVE-2019-19529 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19529 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d6636498c41891d0482a914dd570343a838ad79 -CVE-2019-19530 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 -CVE-2019-19530 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625 -CVE-2019-19531 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 -CVE-2019-19531 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc05481b2fcabaaeccf63e32ac1baab54e5b6963 -CVE-2019-19532 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19532 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d9d4b1e46d9543a82c23f6df03f4ad697dab361b -CVE-2019-19533 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 -CVE-2019-19533 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1 -CVE-2019-19534 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19534 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7a1337f0d29b98733c8824e165fca3371d7d4fd -CVE-2019-19535 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 -CVE-2019-19535 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9 -CVE-2019-19535 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19536 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 -CVE-2019-19536 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69 -CVE-2019-19537 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 -CVE-2019-19537 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff -CVE-2019-19538 - https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00 -CVE-2019-19540 - https://wpvulndb.com/vulnerabilities/9974 -CVE-2019-19541 - https://wpvulndb.com/vulnerabilities/9974 -CVE-2019-19542 - https://wpvulndb.com/vulnerabilities/9974 -CVE-2019-19543 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 -CVE-2019-19543 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=56cd26b618855c9af48c8301aa6754ced8dd0beb -CVE-2019-19550 - https://github.com/underprotection/CVE-2019-19550/ -CVE-2019-19553 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19576 - http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html -CVE-2019-19576 - https://github.com/jra89/CVE-2019-19576 -CVE-2019-19576 - https://medium.com/@jra8908/cve-2019-19576-e9da712b779 -CVE-2019-19585 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html -CVE-2019-19590 - https://github.com/radareorg/radare2/issues/15543 -CVE-2019-19592 - https://sumukh30.blogspot.com/2020/01/normal-0-false-false-false-en-us-x-none.html?m=1 -CVE-2019-19594 - https://ia-informatica.com/it/CVE-2019-19594 -CVE-2019-19595 - https://ia-informatica.com/it/CVE-2019-19595 -CVE-2019-19597 - https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ -CVE-2019-19598 - https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ -CVE-2019-19602 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 -CVE-2019-19603 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19603 - https://www.sqlite.org/ -CVE-2019-19605 - https://blog.0xlabs.com/2020/03/x-plane-1141-remote-command-execution.html -CVE-2019-19606 - https://blog.0xlabs.com/2020/03/x-plane-1141-remote-command-execution.html -CVE-2019-19609 - http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html -CVE-2019-19609 - http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html -CVE-2019-19609 - https://github.com/strapi/strapi/pull/4636 -CVE-2019-19610 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2019-19612 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2019-19613 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2019-19614 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2019-19615 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities -CVE-2019-19620 - https://medium.com/@CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e -CVE-2019-19631 - https://know.bishopfox.com/advisories -CVE-2019-19631 - https://know.bishopfox.com/advisories/big-monitoring-fabric -CVE-2019-19632 - https://know.bishopfox.com/advisories -CVE-2019-19632 - https://know.bishopfox.com/advisories/big-monitoring-fabric -CVE-2019-19634 - https://github.com/jra89/CVE-2019-19634 -CVE-2019-19634 - https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e -CVE-2019-19642 - https://www.dark-sec.net/2019/12/supermicro-ipmi-exploitation.html -CVE-2019-19645 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19646 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19646 - https://www.sqlite.org/ -CVE-2019-19648 - https://github.com/VirusTotal/yara/issues/1178 -CVE-2019-19676 - https://www2.deloitte.com/de/de/pages/risk/articles/arxes-tolina-csv-injection.html -CVE-2019-19681 - https://medium.com/@k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a -CVE-2019-19697 - http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt -CVE-2019-19697 - https://seclists.org/bugtraq/2020/Jan/29 -CVE-2019-19699 - https://github.com/SpengeSec/CVE-2019-19699 -CVE-2019-19708 - https://phabricator.wikimedia.org/T239209 -CVE-2019-19726 - http://packetstormsecurity.com/files/155658/Qualys-Security-Advisory-OpenBSD-Dynamic-Loader-Privilege-Escalation.html -CVE-2019-19726 - http://packetstormsecurity.com/files/155764/OpenBSD-Dynamic-Loader-chpass-Privilege-Escalation.html -CVE-2019-19726 - http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html -CVE-2019-19726 - http://seclists.org/fulldisclosure/2019/Dec/31 -CVE-2019-19726 - http://seclists.org/fulldisclosure/2023/Oct/11 -CVE-2019-19726 - http://www.openwall.com/lists/oss-security/2023/10/03/2 -CVE-2019-19726 - https://seclists.org/bugtraq/2019/Dec/25 -CVE-2019-19726 - https://www.openwall.com/lists/oss-security/2019/12/11/9 -CVE-2019-19731 - http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html -CVE-2019-19732 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19733 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19734 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19735 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19736 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19737 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19738 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19739 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19740 - http://packetstormsecurity.com/files/156113/Octeth-Oempro-4.8-SQL-Injection.html -CVE-2019-19741 - https://medium.com/@tobiasgyoerfi/ea-origin-10-5-55-33574-createdirectory-arbitrary-dacl-write-privilege-escalation-cve-2019-19741-5f18adfabb27 -CVE-2019-19742 - https://infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-router.html -CVE-2019-19742 - https://medium.com/@infosecsanyam/d-link-dir-615-wireless-router-persistent-cross-site-scripting-6ee00f5c694d -CVE-2019-19742 - https://www.exploit-db.com/exploits/47776 -CVE-2019-19743 - https://www.exploit-db.com/exploits/47778 -CVE-2019-19743 - https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html -CVE-2019-19746 - https://sourceforge.net/p/mcj/tickets/57/ -CVE-2019-19766 - https://github.com/bitwarden/jslib/issues/52 -CVE-2019-19766 - https://github.com/bitwarden/server/issues/589 -CVE-2019-19767 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 -CVE-2019-19767 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19768 - https://usn.ubuntu.com/4342-1/ -CVE-2019-19774 - http://packetstormsecurity.com/files/156485/ManageEngine-EventLog-Analyzer-10.0-Information-Disclosure.html -CVE-2019-19777 - https://github.com/saitoha/libsixel/issues/109 -CVE-2019-19778 - https://github.com/saitoha/libsixel/issues/110 -CVE-2019-19781 - http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html -CVE-2019-19781 - http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html -CVE-2019-19781 - http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html -CVE-2019-19781 - http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html -CVE-2019-19781 - http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html -CVE-2019-19781 - https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/ -CVE-2019-19782 - https://github.com/sketler/sketler.github.io/blob/master/_posts/2019-11-11-AceaXeftp-RCE-Via-Buffer-Overflow.markdown -CVE-2019-19782 - https://sketler.github.io/cve_research/AceaXeftp-RCE-Via-Buffer-Overflow/ -CVE-2019-19800 - https://www.manageengine.com -CVE-2019-19805 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19806 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -CVE-2019-19807 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -CVE-2019-19813 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813 -CVE-2019-19813 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19814 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814 -CVE-2019-19815 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19815 -CVE-2019-19816 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816 -CVE-2019-19816 - https://usn.ubuntu.com/4414-1/ -CVE-2019-19820 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-12-04-kyrol-internet-security-invalid-pointer-vulnerability.md -CVE-2019-19820 - https://nafiez.github.io/security/vulnerability/2019/12/04/kyrol-internet-security-invalid-pointer-vulnerability.html -CVE-2019-19822 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html -CVE-2019-19822 - http://seclists.org/fulldisclosure/2020/Jan/36 -CVE-2019-19822 - http://seclists.org/fulldisclosure/2020/Jan/38 -CVE-2019-19823 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html -CVE-2019-19823 - http://seclists.org/fulldisclosure/2020/Jan/36 -CVE-2019-19823 - http://seclists.org/fulldisclosure/2020/Jan/38 -CVE-2019-19824 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html -CVE-2019-19824 - http://seclists.org/fulldisclosure/2020/Jan/36 -CVE-2019-19824 - http://seclists.org/fulldisclosure/2020/Jan/38 -CVE-2019-19825 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html -CVE-2019-19825 - http://seclists.org/fulldisclosure/2020/Jan/36 -CVE-2019-19825 - http://seclists.org/fulldisclosure/2020/Jan/38 -CVE-2019-19826 - https://www.drupal.org/project/views_dynamic_fields/issues/3056600 -CVE-2019-19829 - http://packetstormsecurity.com/files/155708/Serv-U-FTP-Server-15.1.7-Cross-Site-Scripting.html -CVE-2019-19832 - http://packetstormsecurity.com/files/155709/Xerox-AltaLink-C8035-Printer-Cross-Site-Request-Forgery.html -CVE-2019-19833 - http://packetstormsecurity.com/files/155710/Tautulli-2.1.9-Cross-Site-Request-Forgery.html -CVE-2019-19833 - http://packetstormsecurity.com/files/155974/Tautulli-2.1.9-Denial-Of-Service.html -CVE-2019-19844 - http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html -CVE-2019-19851 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities -CVE-2019-19852 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities -CVE-2019-19854 - https://websec.nl/news.php -CVE-2019-19855 - https://websec.nl/news.php -CVE-2019-19856 - https://websec.nl/news.php -CVE-2019-19857 - https://websec.nl/news.php -CVE-2019-19858 - https://websec.nl/news.php -CVE-2019-19859 - https://www.websec.nl/news.php -CVE-2019-19880 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19885 - https://cert.vde.com/en-us/advisories/vde-2020-043 -CVE-2019-19887 - https://github.com/rockcarry/ffjpeg/issues/14 -CVE-2019-19888 - https://github.com/rockcarry/ffjpeg/issues/13 -CVE-2019-19889 - https://github.com/V1n1v131r4/HGB10R-2 -CVE-2019-19890 - https://github.com/V1n1v131r4/HGB10R-2 -CVE-2019-19906 - https://www.openldap.org/its/index.cgi/Incoming?id=9123 -CVE-2019-19912 - http://packetstormsecurity.com/files/156951/codeBeamer-9.5-Cross-Site-Scripting.html -CVE-2019-19913 - http://packetstormsecurity.com/files/156951/codeBeamer-9.5-Cross-Site-Scripting.html -CVE-2019-19913 - http://seclists.org/fulldisclosure/2020/Apr/9 -CVE-2019-19915 - https://wpvulndb.com/vulnerabilities/9979 -CVE-2019-19916 - https://github.com/V1n1v131r4/MIME-Confusion-Attack-on-Midori-Browser/blob/master/README.md -CVE-2019-19916 - https://portswigger.net/research/bypassing-csp-using-polyglot-jpegs -CVE-2019-19921 - https://github.com/opencontainers/runc/issues/2197 -CVE-2019-19922 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -CVE-2019-19922 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-19923 - https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35 -CVE-2019-19923 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19924 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19925 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19926 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19927 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927 -CVE-2019-19929 - https://www.bleepingcomputer.com/news/software/adwcleaner-801-fixes-dll-hijacking-vulnerability/ -CVE-2019-19930 - https://github.com/mz-automation/libiec61850/issues/193 -CVE-2019-19931 - https://github.com/mz-automation/libiec61850/issues/194 -CVE-2019-19935 - http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html -CVE-2019-19935 - https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/ -CVE-2019-19935 - https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt -CVE-2019-19935 - https://snyk.io/vuln/npm:froala-editor -CVE-2019-19940 - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt -CVE-2019-19941 - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt -CVE-2019-19942 - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt -CVE-2019-19943 - https://www.exploit-db.com/exploits/48111 -CVE-2019-19944 - https://github.com/mz-automation/libiec61850/issues/196 -CVE-2019-19945 - https://github.com/openwrt/openwrt/commits/master -CVE-2019-19945 - https://openwrt.org/advisory/2020-01-13-1 -CVE-2019-19946 - https://know.bishopfox.com/advisories -CVE-2019-19946 - https://know.bishopfox.com/advisories/dradis-pro-3-4-1 -CVE-2019-19948 - https://github.com/ImageMagick/ImageMagick/issues/1562 -CVE-2019-19949 - https://github.com/ImageMagick/ImageMagick/issues/1561 -CVE-2019-19950 - https://sourceforge.net/p/graphicsmagick/bugs/603/ -CVE-2019-19952 - https://github.com/ImageMagick/ImageMagick/issues/1791 -CVE-2019-19954 - https://blog.mirch.io/2019/12/18/signal-desktop-windows-lpe/ -CVE-2019-19956 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-19957 - https://github.com/mz-automation/libiec61850/issues/197 -CVE-2019-19958 - https://github.com/mz-automation/libiec61850/issues/198 -CVE-2019-19959 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-19965 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f -CVE-2019-19965 - https://usn.ubuntu.com/4287-2/ -CVE-2019-19966 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 -CVE-2019-19966 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd -CVE-2019-19967 - https://github.com/filipi86/ConnectBoxDOCSIS-3.0 -CVE-2019-19979 - https://wpvulndb.com/vulnerabilities/9954 -CVE-2019-19979 - https://www.wordfence.com/blog/2019/11/high-severity-vulnerability-patched-in-wp-maintenance-plugin/ -CVE-2019-19980 - https://wpvulndb.com/vulnerabilities/9946 -CVE-2019-19981 - https://wpvulndb.com/vulnerabilities/9946 -CVE-2019-19982 - https://wpvulndb.com/vulnerabilities/9946 -CVE-2019-19983 - https://wpvulndb.com/vulnerabilities/9914 -CVE-2019-19984 - https://wpvulndb.com/vulnerabilities/9946 -CVE-2019-19985 - http://packetstormsecurity.com/files/158563/WordPress-Email-Subscribers-And-Newsletters-4.2.2-File-Disclosure.html -CVE-2019-19985 - https://wpvulndb.com/vulnerabilities/9946 -CVE-2019-19986 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19987 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19988 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19989 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-1999 - https://www.exploit-db.com/exploits/46357/ -CVE-2019-19990 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19991 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19992 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19993 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19994 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2019-19995 - https://medium.com/@rsantos_14778/csrf-cve-2019-19995-96c1a2dcc182 -CVE-2019-19996 - https://medium.com/@rsantos_14778/dos-cve-2019-19996-5ad1be772179 -CVE-2019-2000 - https://www.exploit-db.com/exploits/46356/ -CVE-2019-20002 - https://medium.com/@ayaan.saikia91/formula-injection-vulnerability-on-solarwinds-webhelpdesk-12-7-1-37569cd4cdc1 -CVE-2019-20004 - https://medium.com/@rsantos_14778/remote-control-cve-2019-20004-21f77e976715 -CVE-2019-20009 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20009 - https://github.com/LibreDWG/libredwg/issues/176#issue-541977765 -CVE-2019-20010 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20010 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383 -CVE-2019-20011 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20011 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 -CVE-2019-20012 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20012 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088 -CVE-2019-20013 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20013 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060 -CVE-2019-20014 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20014 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172 -CVE-2019-20015 - https://github.com/LibreDWG/libredwg/issues/176 -CVE-2019-20015 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028 -CVE-2019-20016 - https://github.com/hoene/libmysofa/issues/83 -CVE-2019-20016 - https://github.com/hoene/libmysofa/issues/84 -CVE-2019-20017 - https://github.com/tbeu/matio/issues/127 -CVE-2019-20018 - https://github.com/tbeu/matio/issues/129 -CVE-2019-20019 - https://github.com/tbeu/matio/issues/130 -CVE-2019-20020 - https://github.com/tbeu/matio/issues/128 -CVE-2019-20021 - https://github.com/upx/upx/issues/315 -CVE-2019-20022 - https://github.com/saitoha/libsixel/issues/108 -CVE-2019-20023 - https://github.com/saitoha/libsixel/issues/120 -CVE-2019-20024 - https://github.com/saitoha/libsixel/issues/121 -CVE-2019-20044 - http://seclists.org/fulldisclosure/2020/May/53 -CVE-2019-20044 - http://seclists.org/fulldisclosure/2020/May/55 -CVE-2019-20044 - http://seclists.org/fulldisclosure/2020/May/59 -CVE-2019-20047 - https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html -CVE-2019-20047 - https://www.exploit-db.com/exploits/47761 -CVE-2019-20048 - https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html -CVE-2019-20048 - https://www.exploit-db.com/exploits/47761 -CVE-2019-20049 - https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html -CVE-2019-20049 - https://www.exploit-db.com/exploits/47761 -CVE-2019-20051 - https://github.com/upx/upx/issues/313 -CVE-2019-20052 - https://github.com/tbeu/matio/issues/131 -CVE-2019-20053 - https://github.com/upx/upx/issues/314 -CVE-2019-20054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23da9588037ecdd4901db76a5b79a42b529c4ec3 -CVE-2019-20054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4 -CVE-2019-20055 - https://code610.blogspot.com/2019/12/testing-ssrf-in-liquifireos.html -CVE-2019-20056 - https://github.com/saitoha/libsixel/issues/126 -CVE-2019-20057 - https://github.com/ProxymanApp/Proxyman/issues/364 -CVE-2019-20059 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad -CVE-2019-20060 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad -CVE-2019-20061 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad -CVE-2019-20062 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad -CVE-2019-20063 - https://github.com/hoene/libmysofa/issues/67 -CVE-2019-20071 - https://drive.google.com/open?id=1p4HJ5C20TqY0rVNffdD5Zd7S_bGvDhnk -CVE-2019-20072 - https://drive.google.com/open?id=1IGRYVci8fxic0jJJb-pAfAK1kJ4V2yGM -CVE-2019-20073 - https://drive.google.com/open?id=1CxLrSKAczEZpm_7FERIrCGGJAs2mp6Go -CVE-2019-20074 - https://drive.google.com/open?id=1MH6DMhP1JsV_RptGXDze0Vo9MDuCH9se -CVE-2019-20074 - https://fatihhcelik.blogspot.com/2019/12/clear-text-password-netis-dl4323.html -CVE-2019-20075 - https://drive.google.com/open?id=1795_joGaL3QXMFeJoJPiNgB_d913XePx -CVE-2019-20076 - https://drive.google.com/open?id=1HrYqVKlSxhQqB5tNhhLIgpyfi0Y2ZL80 -CVE-2019-20079 - https://packetstormsecurity.com/files/154898 -CVE-2019-20082 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-20082 -CVE-2019-20085 - http://packetstormsecurity.com/files/157196/TVT-NVMS-1000-Directory-Traversal.html -CVE-2019-20085 - https://www.exploit-db.com/exploits/47774 -CVE-2019-20086 - https://github.com/gopro/gpmf-parser/issues/74 -CVE-2019-20087 - https://github.com/gopro/gpmf-parser/issues/76 -CVE-2019-20088 - https://github.com/gopro/gpmf-parser/issues/77 -CVE-2019-20089 - https://github.com/gopro/gpmf-parser/issues/75 -CVE-2019-20090 - https://github.com/axiomatic-systems/Bento4/issues/461 -CVE-2019-20091 - https://github.com/axiomatic-systems/Bento4/issues/462 -CVE-2019-20092 - https://github.com/axiomatic-systems/Bento4/issues/462 -CVE-2019-20093 - https://sourceforge.net/p/podofo/tickets/75/ -CVE-2019-20094 - https://github.com/saitoha/libsixel/issues/125 -CVE-2019-20095 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 -CVE-2019-20095 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc -CVE-2019-20096 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html -CVE-2019-20096 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 -CVE-2019-20096 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d3ff0950e2b40dc861b1739029649d03f591820 -CVE-2019-20096 - https://usn.ubuntu.com/4287-2/ -CVE-2019-20098 - https://www.tenable.com/security/research/tra-2020-05 -CVE-2019-20099 - https://www.tenable.com/security/research/tra-2020-05 -CVE-2019-20100 - https://ecosystem.atlassian.net/browse/APL-1390 -CVE-2019-20100 - https://www.tenable.com/security/research/tra-2020-06 -CVE-2019-20101 - https://ecosystem.atlassian.net/browse/AW-20 -CVE-2019-20104 - https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/ -CVE-2019-20105 - https://ecosystem.atlassian.net/browse/APL-1391 -CVE-2019-20139 - https://code610.blogspot.com/2019/12/multiple-xss-bugs-in-nagios-569.html -CVE-2019-20140 - https://github.com/saitoha/libsixel/issues/122 -CVE-2019-20153 - https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ -CVE-2019-20154 - https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ -CVE-2019-20155 - https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ -CVE-2019-20159 - https://github.com/gpac/gpac/issues/1321 -CVE-2019-20160 - https://github.com/gpac/gpac/issues/1334 -CVE-2019-20161 - https://github.com/gpac/gpac/issues/1320 -CVE-2019-20162 - https://github.com/gpac/gpac/issues/1327 -CVE-2019-20163 - https://github.com/gpac/gpac/issues/1335 -CVE-2019-20164 - https://github.com/gpac/gpac/issues/1332 -CVE-2019-20165 - https://github.com/gpac/gpac/issues/1338 -CVE-2019-20166 - https://github.com/gpac/gpac/issues/1331 -CVE-2019-20167 - https://github.com/gpac/gpac/issues/1330 -CVE-2019-20168 - https://github.com/gpac/gpac/issues/1333 -CVE-2019-20169 - https://github.com/gpac/gpac/issues/1329 -CVE-2019-20170 - https://github.com/gpac/gpac/issues/1328 -CVE-2019-20171 - https://github.com/gpac/gpac/issues/1337 -CVE-2019-20173 - https://wpvulndb.com/vulnerabilities/10059 -CVE-2019-20175 - https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html -CVE-2019-20175 - https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html -CVE-2019-20175 - https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html -CVE-2019-20178 - https://medium.com/@Pablo0xSantiago/cve-2019-20178-peel-shopping-ecommerce-shopping-cart-9-2-1-cross-site-request-forgery-17fc49ab5a65 -CVE-2019-20179 - https://medium.com/@Pablo0xSantiago/cve-2019-20179-so-planning-1-45-sql-injection-5f0050ad81d1 -CVE-2019-20180 - https://medium.com/@Pablo0xSantiago/cve-2019-20180-tablepress-version-1-9-2-csv-injection-65309fcc8be8 -CVE-2019-20181 - https://medium.com/@Pablo0xSantiago/cve-2019-20181-awesome-support-wordpress-helpdesk-support-plugin-5-8-0-84a0c022cf53 -CVE-2019-20182 - https://medium.com/@Pablo0xSantiago/cve-2019-20182-foogallery-image-gallery-wordpress-plugin-1-8-12-stored-cross-site-scripting-d5864f1259f -CVE-2019-20183 - https://medium.com/@Pablo0xSantiago/cve-2019-20183-employee-records-system-bypass-file-upload-to-rce-ea2653660b34 -CVE-2019-20184 - https://medium.com/@Pablo0xSantiago/cve-2019-20184-keepass-2-4-1-csv-injection-33f08de3c11a -CVE-2019-20191 - https://medium.com/@Pablo0xSantiago/cve-2019-20191-oxygen-xml-editor-21-1-1-allows-xxe-216b816f312b -CVE-2019-20197 - https://code610.blogspot.com/2019/12/postauth-rce-in-latest-nagiosxi.html -CVE-2019-20203 - https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md -CVE-2019-20203 - https://wpvulndb.com/vulnerabilities/10002 -CVE-2019-20204 - http://packetstormsecurity.com/files/155973/WordPress-Postie-1.9.40-Cross-Site-Scripting.html -CVE-2019-20204 - https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md -CVE-2019-20204 - https://wpvulndb.com/vulnerabilities/10002 -CVE-2019-20205 - https://github.com/saitoha/libsixel/issues/127 -CVE-2019-20208 - https://github.com/gpac/gpac/issues/1348 -CVE-2019-20209 - https://cxsecurity.com/issue/WLB-2019120110 -CVE-2019-20209 - https://cxsecurity.com/issue/WLB-2019120111 -CVE-2019-20209 - https://cxsecurity.com/issue/WLB-2019120112 -CVE-2019-20209 - https://wpvulndb.com/vulnerabilities/10013 -CVE-2019-20209 - https://wpvulndb.com/vulnerabilities/10014 -CVE-2019-20209 - https://wpvulndb.com/vulnerabilities/10018 -CVE-2019-20210 - https://cxsecurity.com/issue/WLB-2019120110 -CVE-2019-20210 - https://cxsecurity.com/issue/WLB-2019120111 -CVE-2019-20210 - https://cxsecurity.com/issue/WLB-2019120112 -CVE-2019-20210 - https://wpvulndb.com/vulnerabilities/10013 -CVE-2019-20210 - https://wpvulndb.com/vulnerabilities/10014 -CVE-2019-20210 - https://wpvulndb.com/vulnerabilities/10018 -CVE-2019-20211 - https://cxsecurity.com/issue/WLB-2019120110 -CVE-2019-20211 - https://cxsecurity.com/issue/WLB-2019120111 -CVE-2019-20211 - https://cxsecurity.com/issue/WLB-2019120112 -CVE-2019-20211 - https://wpvulndb.com/vulnerabilities/10013 -CVE-2019-20211 - https://wpvulndb.com/vulnerabilities/10014 -CVE-2019-20211 - https://wpvulndb.com/vulnerabilities/10018 -CVE-2019-20212 - https://cxsecurity.com/issue/WLB-2019120110 -CVE-2019-20212 - https://cxsecurity.com/issue/WLB-2019120111 -CVE-2019-20212 - https://cxsecurity.com/issue/WLB-2019120112 -CVE-2019-20212 - https://wpvulndb.com/vulnerabilities/10013 -CVE-2019-20212 - https://wpvulndb.com/vulnerabilities/10014 -CVE-2019-20212 - https://wpvulndb.com/vulnerabilities/10018 -CVE-2019-20213 - https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-information-disclosure-en-faf1a9a13f3f -CVE-2019-20213 - https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-information-disclosure-es-6540f7f55b03 -CVE-2019-20215 - http://packetstormsecurity.com/files/156250/D-Link-ssdpcgi-Unauthenticated-Remote-Command-Execution.html -CVE-2019-20215 - https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-rce-in-ssdpcgi-http-st-cve-2019-20215-en-2e799acb8a73 -CVE-2019-20216 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae -CVE-2019-20216 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-es-e11ca6168d35 -CVE-2019-20217 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae -CVE-2019-20217 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-es-e11ca6168d35 -CVE-2019-20218 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-20219 - https://github.com/miniupnp/ngiflib/issues/15 -CVE-2019-20224 - http://packetstormsecurity.com/files/155897/Pandora-7.0NG-Remote-Code-Execution.html -CVE-2019-2024 - https://usn.ubuntu.com/4118-1/ -CVE-2019-20326 - https://github.com/Fysac/CVE-2019-20326 -CVE-2019-20330 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-20330 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-20330 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-20330 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-20334 - https://bugzilla.nasm.us/show_bug.cgi?id=3392548#c4 -CVE-2019-20334 - https://bugzilla.nasm.us/show_bug.cgi?id=3392638 -CVE-2019-20336 - https://github.com/Mad-robot/CVE-List/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2019-20337 - https://github.com/Mad-robot/CVE-List/blob/master/Advanced%20Real%20Estate%20Script.md -CVE-2019-20348 - https://gist.github.com/tanprathan/24cab2eb02937f86961c6380b47ce385 -CVE-2019-20352 - https://bugzilla.nasm.us/show_bug.cgi?id=3392636 -CVE-2019-20354 - http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html -CVE-2019-20357 - http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt -CVE-2019-20357 - https://seclists.org/bugtraq/2020/Jan/28 -CVE-2019-20358 - http://seclists.org/fulldisclosure/2020/Jan/50 -CVE-2019-20358 - https://seclists.org/bugtraq/2020/Jan/55 -CVE-2019-20360 - https://wpvulndb.com/vulnerabilities/9889 -CVE-2019-20361 - http://packetstormsecurity.com/files/158568/WordPress-Email-Subscribers-And-Newsletters-4.2.2-SQL-Injection.html -CVE-2019-20361 - https://wpvulndb.com/vulnerabilities/9947 -CVE-2019-20363 - https://cybersecurityworks.com/zerodays/cve-2019-20363-openfire.html -CVE-2019-20363 - https://issues.igniterealtime.org/browse/OF-1955 -CVE-2019-20364 - https://cybersecurityworks.com/zerodays/cve-2019-20364-openfire.html -CVE-2019-20364 - https://issues.igniterealtime.org/browse/OF-1955 -CVE-2019-20365 - https://cybersecurityworks.com/zerodays/cve-2019-20365-openfire.html -CVE-2019-20365 - https://issues.igniterealtime.org/browse/OF-1955 -CVE-2019-20366 - https://cybersecurityworks.com/zerodays/cve-2019-20366-openfire.html -CVE-2019-20366 - https://issues.igniterealtime.org/browse/OF-1955 -CVE-2019-20372 - http://seclists.org/fulldisclosure/2021/Sep/36 -CVE-2019-20374 - https://github.com/typora/typora-issues/issues/3124 -CVE-2019-20384 - https://bugs.gentoo.org/692492 -CVE-2019-20388 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-20388 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-20388 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-20388 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-20389 - http://packetstormsecurity.com/files/157699/Subrion-CMS-4.2.1-Cross-Site-Scripting.html -CVE-2019-20390 - http://packetstormsecurity.com/files/157700/Subrion-CMS-4.2.1-Cross-Site-Request-Forgery.html -CVE-2019-20397 - https://github.com/CESNET/libyang/issues/739 -CVE-2019-20421 - https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8 -CVE-2019-20421 - https://github.com/Exiv2/exiv2/issues/1011 -CVE-2019-20422 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 -CVE-2019-20423 - http://lustre.org/ -CVE-2019-20423 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20424 - http://lustre.org/ -CVE-2019-20424 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20425 - http://lustre.org/ -CVE-2019-20425 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20426 - http://lustre.org/ -CVE-2019-20426 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20427 - http://lustre.org/ -CVE-2019-20427 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20428 - http://lustre.org/ -CVE-2019-20428 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20429 - http://lustre.org/ -CVE-2019-20429 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20430 - http://lustre.org/ -CVE-2019-20430 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20431 - http://lustre.org/ -CVE-2019-20431 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20432 - http://lustre.org/ -CVE-2019-20432 - http://wiki.lustre.org/Lustre_2.12.3_Changelog -CVE-2019-20434 - https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html -CVE-2019-20434 - https://github.com/cybersecurityworks/Disclosed/issues/17 -CVE-2019-20435 - https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html -CVE-2019-20435 - https://github.com/cybersecurityworks/Disclosed/issues/18 -CVE-2019-20436 - https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html -CVE-2019-20436 - https://github.com/cybersecurityworks/Disclosed/issues/19 -CVE-2019-20437 - https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html -CVE-2019-20437 - https://github.com/cybersecurityworks/Disclosed/issues/20 -CVE-2019-20438 - https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html -CVE-2019-20438 - https://github.com/cybersecurityworks/Disclosed/issues/22 -CVE-2019-20439 - https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html -CVE-2019-20439 - https://github.com/cybersecurityworks/Disclosed/issues/21 -CVE-2019-20440 - https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html -CVE-2019-20440 - https://github.com/cybersecurityworks/Disclosed/issues/24 -CVE-2019-20441 - https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html -CVE-2019-20441 - https://github.com/cybersecurityworks/Disclosed/issues/23 -CVE-2019-20442 - https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html -CVE-2019-20442 - https://github.com/cybersecurityworks/Disclosed/issues/25 -CVE-2019-20443 - https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html -CVE-2019-20443 - https://github.com/cybersecurityworks/Disclosed/issues/26 -CVE-2019-20447 - https://packetstormsecurity.com/files/152503/Jobberbase-CMS-2.0-SQL-Injection.html -CVE-2019-20447 - https://www.exploit-db.com/exploits/47311 -CVE-2019-20451 - https://www.exploit-db.com/papers/47535 -CVE-2019-20455 - https://github.com/globalpayments/php-sdk/pull/8 -CVE-2019-20477 - https://www.exploit-db.com/download/47655 -CVE-2019-20478 - https://www.exploit-db.com/exploits/47655 -CVE-2019-20480 - https://cert.vde.com/en-us/advisories/vde-2019-010 -CVE-2019-20481 - https://cert.vde.com/en-us/advisories/vde-2019-010 -CVE-2019-20483 - https://www.gosecure.net/blog/2020/12/15/vera-stored-xss-improper-access-control/ -CVE-2019-20484 - https://www.gosecure.net/blog/2020/12/15/vera-stored-xss-improper-access-control/ -CVE-2019-20499 - http://packetstormsecurity.com/files/156952/DLINK-DWL-2600-Authenticated-Remote-Command-Injection.html -CVE-2019-20499 - https://www.exploit-db.com/exploits/46841 -CVE-2019-20500 - https://www.exploit-db.com/exploits/46841 -CVE-2019-20501 - https://www.exploit-db.com/exploits/46841 -CVE-2019-20502 - https://github.com/s1kr10s/EasyChatServer-DOS -CVE-2019-20503 - http://seclists.org/fulldisclosure/2020/May/52 -CVE-2019-20503 - http://seclists.org/fulldisclosure/2020/May/55 -CVE-2019-20503 - http://seclists.org/fulldisclosure/2020/May/59 -CVE-2019-20503 - https://usn.ubuntu.com/4328-1/ -CVE-2019-20530 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20531 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20532 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20533 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20534 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20535 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20536 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20537 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20538 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20539 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-2054 - http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html -CVE-2019-2054 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-2054 - https://usn.ubuntu.com/4076-1/ -CVE-2019-20540 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20541 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20542 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20543 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20544 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20545 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20546 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20547 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20548 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20549 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20550 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20551 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20552 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20553 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20554 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20555 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20556 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20557 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20558 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20559 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20560 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20561 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20562 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20563 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20564 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20565 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20566 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20567 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20568 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20569 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20570 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20571 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20572 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20573 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20574 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20575 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20576 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20577 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20578 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20579 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20580 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20581 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20582 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20583 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20584 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20585 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20586 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20587 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20588 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20589 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20590 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20591 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20592 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20593 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20594 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20595 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20596 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20597 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20598 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20599 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20600 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20601 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20602 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20603 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20604 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20605 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20606 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20607 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20608 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20609 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20610 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20611 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20612 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20613 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20614 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20615 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20616 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20617 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20618 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20619 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20620 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20621 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20622 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20623 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20624 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20625 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-20626 - https://medium.com/@victor_14768/replay-attacks-en-autos-206481dcfee1 -CVE-2019-20628 - https://github.com/gpac/gpac/issues/1269 -CVE-2019-20629 - https://github.com/gpac/gpac/issues/1264 -CVE-2019-20630 - https://github.com/gpac/gpac/issues/1268 -CVE-2019-20631 - https://github.com/gpac/gpac/issues/1270 -CVE-2019-20632 - https://github.com/gpac/gpac/issues/1271 -CVE-2019-20633 - https://savannah.gnu.org/bugs/index.php?56683 -CVE-2019-20636 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12 -CVE-2019-20636 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784 -CVE-2019-20639 - https://kb.netgear.com/000061505/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0543 -CVE-2019-20641 - https://kb.netgear.com/000061501/Security-Advisory-for-Missing-Function-Level-Access-Control-on-RAX40-PSV-2019-0285 -CVE-2019-20645 - https://kb.netgear.com/000061497/Security-Advisory-for-Stored-Cross-Site-Scripting-on-RAX40-PSV-2019-0243 -CVE-2019-20646 - https://kb.netgear.com/000061496/Security-Advisory-for-Admin-Credential-Disclosure-on-RAX40-PSV-2019-0237 -CVE-2019-20649 - https://kb.netgear.com/000061493/Security-Advisory-for-Sensitive-Information-Disclosure-on-MR1100-PSV-2019-0204 -CVE-2019-20650 - https://kb.netgear.com/000061492/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2019-0197 -CVE-2019-20653 - https://kb.netgear.com/000061488/Security-Advisory-for-Denial-of-Service-on-WAC505-and-WAC510-PSV-2019-0083 -CVE-2019-20654 - https://kb.netgear.com/000061487/Security-Advisory-for-Security-Misconfiguration-on-WAC505-and-WAC510-PSV-2019-0061 -CVE-2019-20656 - https://kb.netgear.com/000061483/Security-Advisory-for-Hardcoded-Password-on-Some-Routers-and-Gateways-PSV-2018-0623 -CVE-2019-20659 - https://kb.netgear.com/000061480/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0567 -CVE-2019-20661 - https://kb.netgear.com/000061478/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0561 -CVE-2019-20668 - https://kb.netgear.com/000061471/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0551 -CVE-2019-20675 - https://kb.netgear.com/000061464/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0544 -CVE-2019-20679 - https://kb.netgear.com/000061460/Security-Advisory-for-Missing-Function-Level-Access-Control-on-MR1100-PSV-2018-0537 -CVE-2019-20686 - https://kb.netgear.com/000061453/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0239 -CVE-2019-20688 - https://kb.netgear.com/000061451/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0142 -CVE-2019-20689 - https://kb.netgear.com/000061450/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0132 -CVE-2019-20690 - https://kb.netgear.com/000061449/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-and-Gateways-PSV-2018-0073 -CVE-2019-20693 - https://kb.netgear.com/000061236/Security-Advisory-for-Security-Misconfiguration-on-WAC505-and-WAC510-PSV-2019-0084 -CVE-2019-20695 - https://kb.netgear.com/000061234/Security-Advisory-for-Sensitive-Information-Disclosure-on-Orbi-Pro-WiFi-System-PSV-2019-0158 -CVE-2019-20700 - https://kb.netgear.com/000061194/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2018 -CVE-2019-20706 - https://kb.netgear.com/000061223/Security-Advisory-for-Post-Authentication-Command-Injection-on-R7800-and-XR500-PSV-2018-0354 -CVE-2019-20708 - https://kb.netgear.com/000061221/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0340 -CVE-2019-20718 - https://kb.netgear.com/000061210/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0195 -CVE-2019-20719 - https://kb.netgear.com/000061209/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0194 -CVE-2019-20722 - https://kb.netgear.com/000061206/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0148 -CVE-2019-20724 - https://kb.netgear.com/000061204/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0144 -CVE-2019-20726 - https://kb.netgear.com/000061202/Security-Advisory-for-Post-Authentication-Command-on-Some-Routers-and-Gateways-PSV-2018-0141 -CVE-2019-20731 - https://kb.netgear.com/000061196/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2254 -CVE-2019-20732 - https://kb.netgear.com/000061195/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2228 -CVE-2019-20733 - https://kb.netgear.com/000061193/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2017 -CVE-2019-20734 - https://kb.netgear.com/000061192/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-0791 -CVE-2019-20737 - https://kb.netgear.com/000061188/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2016 -CVE-2019-20739 - https://kb.netgear.com/000061179/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-R8500-PSV-2017-0636 -CVE-2019-20740 - https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258 -CVE-2019-20741 - https://kb.netgear.com/000060982/Security-Advisory-for-Sensitive-Information-Disclosure-on-WAC510-PSV-2018-0635 -CVE-2019-20746 - https://kb.netgear.com/000060973/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0252 -CVE-2019-20748 - https://kb.netgear.com/000060963/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0147 -CVE-2019-20751 - https://kb.netgear.com/000060964/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Extenders-Gateways-and-Routers-PSV-2018-0171 -CVE-2019-20752 - https://kb.netgear.com/000060967/Security-Advisory-for-Site-Stored-Cross-Scripting-on-Some-Gateways-Routers-and-WiFi-Systems-PSV-2018-0250 -CVE-2019-20760 - https://kb.netgear.com/000060639/Security-Advisory-for-Authentication-Bypass-on-R9000-PSV-2018-0615 -CVE-2019-20761 - https://kb.netgear.com/000060638/Security-Advisory-for-Post-Authentication-Command-Injection-on-R7800-PSV-2018-0383 -CVE-2019-20762 - https://kb.netgear.com/000060637/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Modem-Routers-and-Gateways-PSV-2018-0197 -CVE-2019-20763 - https://kb.netgear.com/000060636/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R7800-PSV-2018-0145 -CVE-2019-20764 - https://kb.netgear.com/000060635/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R7800-PSV-2018-0137 -CVE-2019-20798 - https://github.com/cherokee/webserver/issues/1227 -CVE-2019-20798 - https://logicaltrust.net/blog/2019/11/cherokee.html -CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1221 -CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1222 -CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1225 -CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1226 -CVE-2019-20799 - https://logicaltrust.net/blog/2019/11/cherokee.html -CVE-2019-20800 - https://github.com/cherokee/webserver/issues/1224 -CVE-2019-20800 - https://logicaltrust.net/blog/2019/11/cherokee.html -CVE-2019-20801 - https://logicaltrust.net/blog/2019/12/documents.html#authorization -CVE-2019-20802 - https://logicaltrust.net/blog/2019/12/documents.html#xss -CVE-2019-20803 - http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2019-20804 - http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2019-20804 - https://github.com/GilaCMS/gila/issues/57 -CVE-2019-20806 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 -CVE-2019-20810 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 -CVE-2019-20810 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 -CVE-2019-20811 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e -CVE-2019-20812 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7 -CVE-2019-20812 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b43d1f9f7067c6759b1051e8ecb84e82cef569fe -CVE-2019-20812 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-20841 - https://mattermost.com/security-updates/ -CVE-2019-20842 - https://mattermost.com/security-updates/ -CVE-2019-20843 - https://mattermost.com/security-updates/ -CVE-2019-20844 - https://mattermost.com/security-updates/ -CVE-2019-20845 - https://mattermost.com/security-updates/ -CVE-2019-20846 - https://mattermost.com/security-updates/ -CVE-2019-20847 - https://mattermost.com/security-updates/ -CVE-2019-20848 - https://mattermost.com/security-updates/ -CVE-2019-20849 - https://mattermost.com/security-updates/ -CVE-2019-20850 - https://mattermost.com/security-updates/ -CVE-2019-20851 - https://mattermost.com/security-updates/ -CVE-2019-20852 - https://mattermost.com/security-updates/ -CVE-2019-20853 - https://mattermost.com/security-updates/ -CVE-2019-20854 - https://mattermost.com/security-updates/ -CVE-2019-20855 - https://mattermost.com/security-updates/ -CVE-2019-20856 - https://mattermost.com/security-updates/ -CVE-2019-20857 - https://mattermost.com/security-updates/ -CVE-2019-20858 - https://mattermost.com/security-updates/ -CVE-2019-20859 - https://mattermost.com/security-updates/ -CVE-2019-20860 - https://mattermost.com/security-updates/ -CVE-2019-20861 - https://mattermost.com/security-updates/ -CVE-2019-20862 - https://mattermost.com/security-updates/ -CVE-2019-20863 - https://mattermost.com/security-updates/ -CVE-2019-20864 - https://mattermost.com/security-updates/ -CVE-2019-20865 - https://mattermost.com/security-updates/ -CVE-2019-20866 - https://mattermost.com/security-updates/ -CVE-2019-20867 - https://mattermost.com/security-updates/ -CVE-2019-20868 - https://mattermost.com/security-updates/ -CVE-2019-20869 - https://mattermost.com/security-updates/ -CVE-2019-20870 - https://mattermost.com/security-updates/ -CVE-2019-20871 - https://mattermost.com/security-updates/ -CVE-2019-20872 - https://mattermost.com/security-updates/ -CVE-2019-20873 - https://mattermost.com/security-updates/ -CVE-2019-20874 - https://mattermost.com/security-updates/ -CVE-2019-20875 - https://mattermost.com/security-updates/ -CVE-2019-20876 - https://mattermost.com/security-updates/ -CVE-2019-20877 - https://mattermost.com/security-updates/ -CVE-2019-20878 - https://mattermost.com/security-updates/ -CVE-2019-20879 - https://mattermost.com/security-updates/ -CVE-2019-20880 - https://mattermost.com/security-updates/ -CVE-2019-20881 - https://mattermost.com/security-updates/ -CVE-2019-20882 - https://mattermost.com/security-updates/ -CVE-2019-20883 - https://mattermost.com/security-updates/ -CVE-2019-20884 - https://mattermost.com/security-updates/ -CVE-2019-20885 - https://mattermost.com/security-updates/ -CVE-2019-20886 - https://mattermost.com/security-updates/ -CVE-2019-20887 - https://mattermost.com/security-updates/ -CVE-2019-20888 - https://mattermost.com/security-updates/ -CVE-2019-20889 - https://mattermost.com/security-updates/ -CVE-2019-20890 - https://mattermost.com/security-updates/ -CVE-2019-20892 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-20907 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-20908 - http://www.openwall.com/lists/oss-security/2020/07/20/6 -CVE-2019-20908 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4 -CVE-2019-20908 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e -CVE-2019-20908 - https://usn.ubuntu.com/4426-1/ -CVE-2019-20909 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20910 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20911 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20912 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20913 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20914 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20915 - https://github.com/LibreDWG/libredwg/issues/178 -CVE-2019-20916 - https://github.com/pypa/pip/issues/6413 -CVE-2019-20916 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-20916 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-20919 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-... -CVE-2019-20920 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478 -CVE-2019-20921 - https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457 -CVE-2019-20934 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 -CVE-2019-20934 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16d51a590a8ce3befb1308e0e7ab77f3b661af33 -CVE-2019-2101 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-2101 - https://usn.ubuntu.com/4118-1/ -CVE-2019-2107 - http://packetstormsecurity.com/files/153628/Android-VideoPlayer-ihevcd_parse_pps-Out-Of-Bounds-Write.html -CVE-2019-2107 - http://seclists.org/fulldisclosure/2019/Jul/18 -CVE-2019-2181 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-2214 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -CVE-2019-2215 - http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html -CVE-2019-2215 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-2215 - http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html -CVE-2019-2235 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2236 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2237 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2238 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2239 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2240 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2241 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2242 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-2243 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2244 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2019-2244 -CVE-2019-2245 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2019-2245 -CVE-2019-2250 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2019-2250 -CVE-2019-2251 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2252 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2253 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2254 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2255 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2256 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2257 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2259 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2261 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2266 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2267 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin -CVE-2019-2268 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2271 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2273 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2274 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-2275 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2281 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2288 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2289 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2294 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2295 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2297 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2298 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2300 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-2302 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2303 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2304 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin -CVE-2019-2310 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2311 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-2315 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2317 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin -CVE-2019-2318 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2319 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2320 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2321 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2322 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2327 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2329 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2334 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2335 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2336 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2337 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2338 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin -CVE-2019-2339 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin -CVE-2019-2343 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2346 - https://www.qualcomm.com/company/product-security/bulletins -CVE-2019-2386 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829 -CVE-2019-2395 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2396 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2397 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2398 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2399 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2400 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2401 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2402 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2403 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2404 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2405 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2406 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2407 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2408 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2409 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2410 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2411 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2412 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2413 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2413 - https://www.exploit-db.com/exploits/46187/ -CVE-2019-2414 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2414 - http://www.securityfocus.com/bid/106621 -CVE-2019-2415 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2416 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2417 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2418 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2419 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2420 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2421 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2422 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2422 - https://usn.ubuntu.com/3942-1/ -CVE-2019-2423 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2424 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2425 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2426 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2427 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2429 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2430 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2431 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2432 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2433 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2434 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2435 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2436 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2437 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2438 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2439 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2440 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2441 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2442 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2443 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2444 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2445 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2446 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2447 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2448 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2449 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2450 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2451 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2452 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2453 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2455 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2456 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2457 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2458 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2459 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2460 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2461 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2462 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2463 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2464 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2465 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2466 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2467 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2468 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2469 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2470 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2471 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2472 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2473 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2474 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2475 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2476 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2477 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2478 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2479 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2480 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2481 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2482 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2484 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2485 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2486 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2487 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2488 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2489 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2490 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2491 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2492 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2493 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2494 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2495 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2496 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2497 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2498 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2499 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2500 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2501 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25011 - http://www.cinquino.eu/NetBox.htm -CVE-2019-25011 - https://github.com/netbox-community/netbox/issues/3471 -CVE-2019-25013 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-25014 - https://bugzilla.redhat.com/show_bug.cgi?id=1919066 -CVE-2019-25017 - https://bugzilla.suse.com/show_bug.cgi?id=1131109 -CVE-2019-25018 - https://bugzilla.suse.com/show_bug.cgi?id=1131109 -CVE-2019-2502 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25023 - https://suid.ch/research/CVE-2019-25023.html -CVE-2019-25027 - https://github.com/vaadin/flow/pull/5498 -CVE-2019-2503 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25031 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25032 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25033 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25034 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25035 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25036 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25037 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25038 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25039 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-2504 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25040 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25041 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25042 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -CVE-2019-25044 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 -CVE-2019-25044 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 -CVE-2019-25045 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399 -CVE-2019-2505 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25053 - https://www.on-x.com/wp-content/uploads/2023/01/on-x_-_security_advisory_-_sage_frp_1000_-_cve-2019-25053.pdf -CVE-2019-25056 - https://github.com/bromite/bromite/issues/2#issuecomment-524102774 -CVE-2019-2506 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25060 - https://wpscan.com/vulnerability/393be73a-f8dc-462f-8670-f20ab89421fc -CVE-2019-25061 - https://stackoverflow.com/questions/42170239/security-of-rand-in-ruby-compared-to-other-methods/42170560 -CVE-2019-25062 - https://www.exploit-db.com/exploits/47477 -CVE-2019-25064 - https://vuldb.com/?id.146832 -CVE-2019-25065 - https://0day.today/exploit/33544 -CVE-2019-25065 - https://vuldb.com/?id.146798 -CVE-2019-25066 - https://vuldb.com/?id.143950 -CVE-2019-25066 - https://www.exploit-db.com/exploits/47497 -CVE-2019-25067 - https://vuldb.com/?id.143949 -CVE-2019-25067 - https://www.exploit-db.com/exploits/47500 -CVE-2019-2507 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25070 - https://vuldb.com/?id.135125 -CVE-2019-25071 - https://youtu.be/AeuGjMbAirU -CVE-2019-25075 - https://medium.com/@maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f -CVE-2019-25076 - https://www.youtube.com/watch?v=5cHpzVK0D28 -CVE-2019-25076 - https://www.youtube.com/watch?v=DSC3m-Bww64 -CVE-2019-2508 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2509 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25090 - https://vuldb.com/?ctiid.216878 -CVE-2019-25096 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 -CVE-2019-25097 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 -CVE-2019-25098 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 -CVE-2019-2510 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25102 - https://vuldb.com/?id.220638 -CVE-2019-2511 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2512 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2513 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-25137 - https://0xdf.gitlab.io/2020/09/05/htb-remote.html -CVE-2019-25137 - https://github.com/Ickarah/CVE-2019-25137-Version-Research -CVE-2019-25137 - https://github.com/noraj/Umbraco-RCE -CVE-2019-25137 - https://www.exploit-db.com/exploits/46153 -CVE-2019-25138 - https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin/ -CVE-2019-25139 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ -CVE-2019-25140 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ -CVE-2019-25141 - https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ -CVE-2019-2516 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2517 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2518 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2519 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2520 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2521 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2522 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2523 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2524 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2525 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2526 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2527 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2528 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2529 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2530 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2531 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2532 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2533 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2534 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2535 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2536 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2537 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2538 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2539 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2540 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2541 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2543 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2544 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2545 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2546 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2547 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2548 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2549 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2550 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2551 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2552 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2553 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2554 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2555 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2556 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -CVE-2019-2557 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2558 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2561 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2564 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2565 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2566 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2567 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2568 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2569 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2570 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2571 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2572 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2573 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2574 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2575 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2576 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2577 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2578 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2579 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2580 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2581 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2582 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2583 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2584 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2585 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2586 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2587 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2588 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2589 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2590 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2591 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2592 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2593 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2594 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2595 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2596 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2597 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2598 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2599 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2600 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2601 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2602 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2602 - https://usn.ubuntu.com/3975-1/ -CVE-2019-2603 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2604 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2605 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2606 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2607 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2608 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2609 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2610 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2611 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2612 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2613 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2614 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2615 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2616 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2617 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2618 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2619 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2620 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2621 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2622 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2623 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2624 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2625 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2626 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2627 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2628 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2629 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2630 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2631 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2632 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2633 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2634 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2635 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2636 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2637 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2638 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2639 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2640 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2641 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2642 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2643 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2644 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2645 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2646 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2647 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2648 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2649 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2650 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2651 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2652 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2653 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2654 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2655 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2656 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2657 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2658 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2659 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2660 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2661 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2662 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2663 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2664 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2665 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2666 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2668 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2669 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2670 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2671 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2672 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2673 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2674 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2675 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2676 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2677 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2678 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2679 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2680 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2681 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2682 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2683 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2684 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2684 - https://usn.ubuntu.com/3975-1/ -CVE-2019-2685 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2686 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2687 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2688 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2689 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2690 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2691 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2692 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2693 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2694 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2695 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2696 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2697 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2697 - https://usn.ubuntu.com/3975-1/ -CVE-2019-2698 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2698 - https://usn.ubuntu.com/3975-1/ -CVE-2019-2699 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2700 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2701 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2702 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2703 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2704 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2705 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2706 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2707 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2708 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2709 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2712 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2713 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2719 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2720 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2721 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2721 - https://www.exploit-db.com/exploits/46747/ -CVE-2019-2722 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2723 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2725 - http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html -CVE-2019-2725 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2725 - https://www.exploit-db.com/exploits/46780/ -CVE-2019-2725 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-2726 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -CVE-2019-2727 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2728 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2729 - http://packetstormsecurity.com/files/155886/Oracle-Weblogic-10.3.6.0.0-Remote-Command-Execution.html -CVE-2019-2729 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2729 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-2729 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-2729 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-2729 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2019-2730 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2731 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2732 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2733 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2734 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2735 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2736 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2737 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html -CVE-2019-2737 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2738 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2739 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html -CVE-2019-2739 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2740 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html -CVE-2019-2740 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2741 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2742 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2743 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2744 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2745 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2746 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2747 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2748 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2749 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2750 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2751 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2752 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2753 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2754 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2755 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2756 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2757 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2758 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2759 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2760 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2761 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2762 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2763 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2764 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2765 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2766 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2767 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2768 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2769 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2770 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2771 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2772 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2773 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2774 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2775 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2776 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2777 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2778 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2779 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2780 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2781 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2782 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2783 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2784 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2785 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2786 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2787 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2788 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2789 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2790 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2791 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2792 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2792 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2019-2793 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2794 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2795 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2796 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2797 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2798 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2799 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2800 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2801 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2802 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2803 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2804 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2805 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html -CVE-2019-2805 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2807 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2808 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2809 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2810 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2811 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2812 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2813 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2814 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2815 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2816 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2817 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2818 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2819 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2820 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2821 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2822 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2823 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2824 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2825 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2826 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2827 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2828 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2829 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2830 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2831 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2832 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2833 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2834 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2835 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2836 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2837 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2838 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2839 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2840 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2841 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2842 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2843 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2844 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2845 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2846 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2847 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2848 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2850 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2852 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2853 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2853 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-2854 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2855 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2856 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2857 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2858 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2859 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2860 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2861 - http://packetstormsecurity.com/files/153841/Oracle-Hyperion-Planning-11.1.2.3-XML-Injection.html -CVE-2019-2861 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2862 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2863 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2864 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2865 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2866 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2867 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2868 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2869 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2870 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2871 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2872 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2873 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2874 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2875 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2876 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2877 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2878 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2879 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html -CVE-2019-2880 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-2883 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2884 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2886 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2887 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2888 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2889 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2890 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2891 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2894 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2894 - https://minerva.crocs.fi.muni.cz/ -CVE-2019-2895 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2896 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2897 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2897 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2019-2897 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-2898 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2899 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2899 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-2900 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2901 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2902 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2903 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2904 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2904 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-2904 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2019-2904 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-2904 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-2904 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-2905 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2906 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2907 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2909 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2910 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2911 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2913 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2914 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2915 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2920 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2922 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2923 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2924 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2925 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2926 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2927 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2929 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2930 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2931 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2932 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2933 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2934 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2935 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2936 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2937 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2938 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2938 - https://usn.ubuntu.com/4195-2/ -CVE-2019-2939 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2940 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2941 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2942 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2943 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2944 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2945 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2946 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2947 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2948 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2949 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2950 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2951 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2952 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2953 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2954 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2955 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2956 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2957 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2958 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2959 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2960 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2961 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2962 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2963 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2964 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2965 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2966 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2967 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2968 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2969 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2970 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2971 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2972 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2973 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2974 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2974 - https://usn.ubuntu.com/4195-2/ -CVE-2019-2975 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2976 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2977 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2978 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2979 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2980 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2981 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2982 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2983 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2984 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2985 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2986 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2987 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2988 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2989 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2990 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2991 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2992 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2993 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2994 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2995 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2996 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2997 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2998 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-2999 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3000 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3001 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3002 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3003 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3004 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3005 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3008 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3009 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3010 - http://packetstormsecurity.com/files/154960/Solaris-xscreensaver-Privilege-Escalation.html -CVE-2019-3010 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3011 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3012 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3015 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3016 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html -CVE-2019-3017 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3018 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3019 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3020 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3021 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3022 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3023 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3024 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3025 - http://packetstormsecurity.com/files/157746/Oracle-Hospitality-RES-3700-5.7-Remote-Code-Execution.html -CVE-2019-3025 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3026 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3027 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3028 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3031 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3396 - http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html -CVE-2019-3396 - http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html -CVE-2019-3396 - https://jira.atlassian.com/browse/CONFSERVER-57974 -CVE-2019-3396 - https://www.exploit-db.com/exploits/46731/ -CVE-2019-3398 - http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html -CVE-2019-3398 - http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html -CVE-2019-3398 - http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html -CVE-2019-3422 - http://packetstormsecurity.com/files/158990/ZTE-Mobile-Hotspot-MS910S-Backdoor-Hardcoded-Password.html -CVE-2019-3422 - http://seclists.org/fulldisclosure/2020/Aug/20 -CVE-2019-3463 - http://seclists.org/fulldisclosure/2021/May/78 -CVE-2019-3464 - http://seclists.org/fulldisclosure/2021/May/78 -CVE-2019-3466 - https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/ -CVE-2019-3474 - https://www.exploit-db.com/exploits/46450/ -CVE-2019-3475 - https://www.exploit-db.com/exploits/46450/ -CVE-2019-3495 - http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html -CVE-2019-3496 - http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html -CVE-2019-3497 - http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html -CVE-2019-3501 - https://www.exploit-db.com/exploits/46080/ -CVE-2019-3560 - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html -CVE-2019-3565 - https://www.facebook.com/security/advisories/cve-2019-3565 -CVE-2019-3572 - https://github.com/libming/libming/issues/169 -CVE-2019-3575 - https://github.com/schettino72/sqla_yaml_fixtures/issues/20 -CVE-2019-3576 - https://gitee.com/inxeduopen/inxedu/issues/IQIIV -CVE-2019-3582 - https://kc.mcafee.com/corporate/index?page=content&id=SB10254 -CVE-2019-3585 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302 -CVE-2019-3586 - https://kc.mcafee.com/corporate/index?page=content&id=SB10280 -CVE-2019-3588 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302 -CVE-2019-3592 - https://kc.mcafee.com/corporate/index?page=content&id=SB10288 -CVE-2019-3613 - https://kc.mcafee.com/corporate/index?page=content&id=SB10320 -CVE-2019-3621 - https://kc.mcafee.com/corporate/index?page=content&id=SB10290 -CVE-2019-3622 - https://kc.mcafee.com/corporate/index?page=content&id=SB10290 -CVE-2019-3628 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2019-3629 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2019-3630 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2019-3631 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2019-3632 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 -CVE-2019-3633 - https://kc.mcafee.com/corporate/index?page=content&id=SB10295 -CVE-2019-3634 - https://kc.mcafee.com/corporate/index?page=content&id=SB10295 -CVE-2019-3637 - https://kc.mcafee.com/corporate/index?page=content&id=SB10291 -CVE-2019-3638 - https://kc.mcafee.com/corporate/index?page=content&id=SB10294 -CVE-2019-3641 - https://kc.mcafee.com/corporate/index?page=content&id=SB10303 -CVE-2019-3648 - https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648 -CVE-2019-3649 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3650 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3651 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3652 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299 -CVE-2019-3653 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299 -CVE-2019-3654 - https://kc.mcafee.com/corporate/index?page=content&id=SB10305 -CVE-2019-3660 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3661 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3662 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3663 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 -CVE-2019-3691 - https://bugzilla.suse.com/show_bug.cgi?id=1155075 -CVE-2019-3692 - https://bugzilla.suse.com/show_bug.cgi?id=1154302 -CVE-2019-3693 - https://bugzilla.suse.com/show_bug.cgi?id=1154328 -CVE-2019-3694 - https://bugzilla.suse.com/show_bug.cgi?id=1155078 -CVE-2019-3697 - https://bugzilla.suse.com/show_bug.cgi?id=1154229 -CVE-2019-3701 - https://bugzilla.suse.com/show_bug.cgi?id=1120386 -CVE-2019-3701 - https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 -CVE-2019-3701 - https://marc.info/?l=linux-netdev&m=154661373531512&w=2 -CVE-2019-3701 - https://usn.ubuntu.com/4115-1/ -CVE-2019-3701 - https://usn.ubuntu.com/4118-1/ -CVE-2019-3738 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-3738 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-3739 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-3739 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-3740 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-3740 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-3759 - http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html -CVE-2019-3759 - https://community.rsa.com/docs/DOC-106943 -CVE-2019-3760 - https://community.rsa.com/docs/DOC-106943 -CVE-2019-3761 - https://community.rsa.com/docs/DOC-106943 -CVE-2019-3763 - https://community.rsa.com/docs/DOC-106943 -CVE-2019-3773 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-3773 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-3773 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-3778 - http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html -CVE-2019-3778 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-3799 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-3810 - http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html -CVE-2019-3814 - https://hackerone.com/reports/480928 -CVE-2019-3814 - https://www.dovecot.org/list/dovecot/2019-February/114575.html -CVE-2019-3819 - https://usn.ubuntu.com/4115-1/ -CVE-2019-3819 - https://usn.ubuntu.com/4118-1/ -CVE-2019-3822 - http://www.securityfocus.com/bid/106950 -CVE-2019-3823 - http://www.securityfocus.com/bid/106950 -CVE-2019-3828 - http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html -CVE-2019-3832 - https://github.com/erikd/libsndfile/issues/456 -CVE-2019-3832 - https://usn.ubuntu.com/4013-1/ -CVE-2019-3835 - http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html -CVE-2019-3835 - https://bugs.ghostscript.com/show_bug.cgi?id=700585 -CVE-2019-3838 - http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html -CVE-2019-3838 - https://bugs.ghostscript.com/show_bug.cgi?id=700576 -CVE-2019-3842 - http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html -CVE-2019-3842 - https://www.exploit-db.com/exploits/46743/ -CVE-2019-3846 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-3846 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -CVE-2019-3846 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -CVE-2019-3846 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-3846 - https://usn.ubuntu.com/4118-1/ -CVE-2019-3855 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html -CVE-2019-3855 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3856 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3857 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3858 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html -CVE-2019-3858 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3859 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html -CVE-2019-3859 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3860 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3861 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3862 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html -CVE-2019-3862 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-3862 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3863 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-3870 - https://www.synology.com/security/advisory/Synology_SA_19_15 -CVE-2019-3874 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-3880 - https://www.synology.com/security/advisory/Synology_SA_19_15 -CVE-2019-3883 - https://pagure.io/389-ds-base/issue/50329 -CVE-2019-3900 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -CVE-2019-3900 - https://usn.ubuntu.com/4115-1/ -CVE-2019-3900 - https://usn.ubuntu.com/4118-1/ -CVE-2019-3900 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-3906 - http://www.securityfocus.com/bid/106552 -CVE-2019-3907 - http://www.securityfocus.com/bid/106552 -CVE-2019-3908 - http://www.securityfocus.com/bid/106552 -CVE-2019-3909 - http://www.securityfocus.com/bid/106552 -CVE-2019-3910 - https://www.tenable.com/security/research/tra-2019-02 -CVE-2019-3911 - https://www.tenable.com/security/research/tra-2019-03 -CVE-2019-3912 - https://www.tenable.com/security/research/tra-2019-03 -CVE-2019-3913 - https://www.tenable.com/security/research/tra-2019-03 -CVE-2019-3914 - https://www.tenable.com/security/research/tra-2019-17 -CVE-2019-3915 - https://www.tenable.com/security/research/tra-2019-17 -CVE-2019-3916 - https://www.tenable.com/security/research/tra-2019-17 -CVE-2019-3917 - https://www.tenable.com/security/research/tra-2019-09 -CVE-2019-3918 - https://www.tenable.com/security/research/tra-2019-09 -CVE-2019-3919 - https://www.tenable.com/security/research/tra-2019-09 -CVE-2019-3920 - https://www.tenable.com/security/research/tra-2019-09 -CVE-2019-3921 - https://www.exploit-db.com/exploits/46469/ -CVE-2019-3921 - https://www.tenable.com/security/research/tra-2019-09 -CVE-2019-3922 - https://www.tenable.com/security/research/tra-2019-09 -CVE-2019-3924 - https://www.exploit-db.com/exploits/46444/ -CVE-2019-3924 - https://www.tenable.com/security/research/tra-2019-07 -CVE-2019-3925 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3926 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3927 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3928 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3929 - http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html -CVE-2019-3929 - http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html -CVE-2019-3929 - https://www.exploit-db.com/exploits/46786/ -CVE-2019-3929 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3930 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3931 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3932 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3933 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3934 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3935 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3936 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3937 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3938 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3939 - https://www.tenable.com/security/research/tra-2019-20 -CVE-2019-3943 - https://www.tenable.com/security/research/tra-2019-16 -CVE-2019-3946 - https://www.tenable.com/security/research/tra-2019-27 -CVE-2019-3947 - https://www.tenable.com/security/research/tra-2019-27 -CVE-2019-3948 - http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html -CVE-2019-3948 - https://www.tenable.com/security/research/tra-2019-36 -CVE-2019-3949 - https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms -CVE-2019-3950 - https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms -CVE-2019-3953 - https://www.tenable.com/security/research/tra-2019-17 -CVE-2019-3958 - https://www.tenable.com/security/research/tra-2019-37 -CVE-2019-3959 - https://www.tenable.com/security/research/tra-2019-37 -CVE-2019-3960 - https://www.tenable.com/security/research/tra-2019-37 -CVE-2019-3961 - https://www.tenable.com/security/tns-2019-04 -CVE-2019-3962 - https://www.tenable.com/security/tns-2019-04 -CVE-2019-3963 - https://www.tenable.com/security/research/tra-2019-40 -CVE-2019-3964 - https://www.tenable.com/security/research/tra-2019-40 -CVE-2019-3965 - https://www.tenable.com/security/research/tra-2019-40 -CVE-2019-3966 - https://www.tenable.com/security/research/tra-2019-40 -CVE-2019-3967 - https://www.tenable.com/security/research/tra-2019-40 -CVE-2019-3968 - https://www.tenable.com/security/research/tra-2019-40 -CVE-2019-3969 - https://www.tenable.com/security/research/tra-2019-34 -CVE-2019-3970 - https://www.tenable.com/security/research/tra-2019-34 -CVE-2019-3971 - https://www.tenable.com/security/research/tra-2019-34 -CVE-2019-3972 - https://www.tenable.com/security/research/tra-2019-34 -CVE-2019-3973 - https://www.tenable.com/security/research/tra-2019-34 -CVE-2019-3974 - https://www.tenable.com/security/tns-2019-05 -CVE-2019-3976 - https://www.tenable.com/security/research/tra-2019-46 -CVE-2019-3977 - https://www.tenable.com/security/research/tra-2019-46 -CVE-2019-3978 - http://packetstormsecurity.com/files/155036/MikroTik-RouterOS-6.45.6-DNS-Cache-Poisoning.html -CVE-2019-3978 - https://www.tenable.com/security/research/tra-2019-46 -CVE-2019-3979 - https://www.tenable.com/security/research/tra-2019-46 -CVE-2019-3980 - https://www.tenable.com/security/research/tra-2019-43 -CVE-2019-3980 - https://www.tenable.com/security/research/tra-227-43 -CVE-2019-3981 - https://www.tenable.com/security/research/tra-2020-01 -CVE-2019-3982 - https://www.tenable.com/security/tns-2019-06 -CVE-2019-3992 - https://www.tenable.com/security/research/tra-2019-53 -CVE-2019-3993 - https://www.tenable.com/security/research/tra-2019-53 -CVE-2019-3994 - https://www.tenable.com/security/research/tra-2019-53 -CVE-2019-3995 - https://www.tenable.com/security/research/tra-2019-53 -CVE-2019-3996 - https://www.tenable.com/security/research/tra-2019-53 -CVE-2019-3997 - https://www.tenable.com/security/research/tra-2020-03 -CVE-2019-3998 - https://www.tenable.com/security/research/tra-2020-09 -CVE-2019-3999 - http://packetstormsecurity.com/files/157493/Druva-inSync-Windows-Client-6.5.2-Privilege-Escalation.html -CVE-2019-3999 - http://packetstormsecurity.com/files/157680/Druva-inSync-inSyncCPHwnet64.exe-RPC-Type-5-Privilege-Escalation.html -CVE-2019-3999 - https://www.tenable.com/security/research/tra-2020-12 -CVE-2019-4000 - https://www.tenable.com/security/research/tra-2020-12 -CVE-2019-4001 - https://www.tenable.com/security/research/tra-2020-12 -CVE-2019-4013 - http://packetstormsecurity.com/files/154747/IBM-Bigfix-Platform-9.5.9.62-Arbitary-File-Upload-Code-Execution.html -CVE-2019-4047 - https://www.ibm.com/support/docview.wss?uid=ibm10882262 -CVE-2019-4149 - https://www.ibm.com/support/docview.wss?uid=ibm10885104 -CVE-2019-4178 - http://www.ibm.com/support/docview.wss?uid=ibm10879079 -CVE-2019-4253 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 -CVE-2019-4334 - https://www.ibm.com/support/pages/node/1074144 -CVE-2019-4426 - https://www.ibm.com/support/pages/node/1116087 -CVE-2019-4444 - https://www.ibm.com/support/pages/node/1126833 -CVE-2019-4471 - https://www.ibm.com/support/pages/node/6451705 -CVE-2019-4556 - https://www.ibm.com/support/pages/node/1102443 -CVE-2019-4635 - https://www.ibm.com/support/pages/node/1283212 -CVE-2019-4645 - https://www.ibm.com/support/pages/node/1074144 -CVE-2019-4653 - https://www.ibm.com/support/pages/node/6451705 -CVE-2019-4716 - http://packetstormsecurity.com/files/156953/IBM-Cognos-TM1-IBM-Planning-Analytics-Server-Configuration-Overwrite-Code-Execution.html -CVE-2019-4716 - http://seclists.org/fulldisclosure/2020/Mar/44 -CVE-2019-4722 - https://www.ibm.com/support/pages/node/6451705 -CVE-2019-4723 - https://www.ibm.com/support/pages/node/6451705 -CVE-2019-4724 - https://www.ibm.com/support/pages/node/6451705 -CVE-2019-4730 - https://www.ibm.com/support/pages/node/6451705 -CVE-2019-5009 - http://lists.vtigercrm.com/pipermail/vtigercrm-developers/2019-January/037852.html -CVE-2019-5009 - https://pentest.com.tr/exploits/Vtiger-CRM-7-1-0-Remote-Code-Execution.html -CVE-2019-5009 - https://www.exploit-db.com/exploits/46065 -CVE-2019-5010 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758 -CVE-2019-5011 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0759 -CVE-2019-5012 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0760 -CVE-2019-5013 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0761 -CVE-2019-5014 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0772 -CVE-2019-5015 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0773 -CVE-2019-5016 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0775 -CVE-2019-5017 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0776 -CVE-2019-5018 - http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html -CVE-2019-5018 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777 -CVE-2019-5019 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0780 -CVE-2019-5020 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0781 -CVE-2019-5021 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0782 -CVE-2019-5023 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0784 -CVE-2019-5024 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 -CVE-2019-5029 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0790 -CVE-2019-5030 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0792 -CVE-2019-5031 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0793 -CVE-2019-5034 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0797 -CVE-2019-5035 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0798 -CVE-2019-5036 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0799 -CVE-2019-5037 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0800 -CVE-2019-5038 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0801 -CVE-2019-5039 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0802 -CVE-2019-5040 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0803 -CVE-2019-5042 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0809 -CVE-2019-5043 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0810 -CVE-2019-5045 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0814 -CVE-2019-5046 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0815 -CVE-2019-5047 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0816 -CVE-2019-5048 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0817 -CVE-2019-5049 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0818 -CVE-2019-5050 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0819 -CVE-2019-5051 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820 -CVE-2019-5052 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821 -CVE-2019-5053 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0830 -CVE-2019-5054 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0831 -CVE-2019-5055 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0832 -CVE-2019-5057 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0841 -CVE-2019-5058 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0842 -CVE-2019-5059 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843 -CVE-2019-5060 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0844 -CVE-2019-5061 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0849 -CVE-2019-5062 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850 -CVE-2019-5063 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852 -CVE-2019-5063 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-5063 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-5064 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853 -CVE-2019-5064 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2019-5064 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-5065 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0854 -CVE-2019-5068 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 -CVE-2019-5069 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0858 -CVE-2019-5070 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0859 -CVE-2019-5071 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 -CVE-2019-5072 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 -CVE-2019-5073 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0862 -CVE-2019-5074 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0863 -CVE-2019-5075 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0864 -CVE-2019-5076 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0865 -CVE-2019-5077 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0869 -CVE-2019-5078 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0870 -CVE-2019-5079 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0871 -CVE-2019-5080 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0872 -CVE-2019-5081 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0873 -CVE-2019-5082 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0874 -CVE-2019-5083 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0875 -CVE-2019-5084 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0876 -CVE-2019-5085 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0877 -CVE-2019-5086 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0878 -CVE-2019-5086 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0878 -CVE-2019-5087 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0879 -CVE-2019-5088 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0880 -CVE-2019-5089 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0881 -CVE-2019-5090 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0882 -CVE-2019-5091 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0883 -CVE-2019-5092 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0884 -CVE-2019-5093 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0885 -CVE-2019-5094 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887 -CVE-2019-5095 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0838 -CVE-2019-5096 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888 -CVE-2019-5097 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889 -CVE-2019-5098 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0890 -CVE-2019-5099 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0891 -CVE-2019-5100 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0892 -CVE-2019-5101 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0893 -CVE-2019-5102 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0893 -CVE-2019-5105 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0897 -CVE-2019-5106 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898 -CVE-2019-5107 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899 -CVE-2019-5108 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html -CVE-2019-5108 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900 -CVE-2019-5108 - https://usn.ubuntu.com/4287-2/ -CVE-2019-5108 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-5109 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0902 -CVE-2019-5110 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0903 -CVE-2019-5111 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904 -CVE-2019-5112 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904 -CVE-2019-5114 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0906 -CVE-2019-5116 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0907 -CVE-2019-5117 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0908 -CVE-2019-5119 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0909 -CVE-2019-5120 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0910 -CVE-2019-5121 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 -CVE-2019-5122 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 -CVE-2019-5123 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 -CVE-2019-5124 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0913 -CVE-2019-5125 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0916 -CVE-2019-5126 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0915 -CVE-2019-5127 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 -CVE-2019-5128 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 -CVE-2019-5129 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 -CVE-2019-5130 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0935 -CVE-2019-5131 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0920 -CVE-2019-5132 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0921 -CVE-2019-5133 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0922 -CVE-2019-5134 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0923 -CVE-2019-5135 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0924 -CVE-2019-5136 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0925 -CVE-2019-5137 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0926 -CVE-2019-5138 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0927 -CVE-2019-5139 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0928 -CVE-2019-5140 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0929 -CVE-2019-5141 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0930 -CVE-2019-5142 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0931 -CVE-2019-5143 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0932 -CVE-2019-5144 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0933 -CVE-2019-5145 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0934 -CVE-2019-5146 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0937 -CVE-2019-5147 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0936 -CVE-2019-5148 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0938 -CVE-2019-5149 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0939 -CVE-2019-5150 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0940 -CVE-2019-5151 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0941 -CVE-2019-5152 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942 -CVE-2019-5153 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0944 -CVE-2019-5154 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0945 -CVE-2019-5155 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0948 -CVE-2019-5156 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0949 -CVE-2019-5157 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0950 -CVE-2019-5158 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951 -CVE-2019-5159 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0952 -CVE-2019-5160 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0953 -CVE-2019-5161 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0954 -CVE-2019-5162 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0955 -CVE-2019-5163 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956 -CVE-2019-5164 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 -CVE-2019-5165 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0960 -CVE-2019-5166 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0961 -CVE-2019-5167 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5168 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5169 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5170 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5171 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5172 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5173 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5174 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5175 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 -CVE-2019-5176 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5177 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5178 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5179 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5180 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5181 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5182 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 -CVE-2019-5183 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0964 -CVE-2019-5184 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0965 -CVE-2019-5185 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0966 -CVE-2019-5186 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0966 -CVE-2019-5187 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0972 -CVE-2019-5188 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973 -CVE-2019-5338 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5339 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5340 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5341 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5342 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5343 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5344 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5345 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5346 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5347 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5348 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5349 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5350 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5351 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5352 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5353 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5354 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5355 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5356 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5357 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5358 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5359 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5360 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5361 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5362 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5363 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5364 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5365 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5366 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5367 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5368 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5369 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5370 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5371 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5372 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5373 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5374 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5375 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5376 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5377 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5378 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5379 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5380 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5381 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5382 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5383 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5384 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5385 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5386 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5387 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5388 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5389 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5390 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5390 - https://www.tenable.com/security/research/tra-2019-42 -CVE-2019-5391 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5391 - https://www.tenable.com/security/research/tra-2019-42 -CVE-2019-5392 - http://packetstormsecurity.com/files/154580/HPE-Intelligent-Management-Center-Information-Disclosure.html -CVE-2019-5392 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5393 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us -CVE-2019-5401 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03944en_us -CVE-2019-5413 - https://hackerone.com/reports/390881 -CVE-2019-5414 - https://hackerone.com/reports/389561 -CVE-2019-5415 - https://hackerone.com/reports/330724 -CVE-2019-5416 - https://hackerone.com/reports/334837 -CVE-2019-5417 - https://hackerone.com/reports/358645 -CVE-2019-5418 - http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html -CVE-2019-5418 - https://www.exploit-db.com/exploits/46585/ -CVE-2019-5420 - http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html -CVE-2019-5420 - https://hackerone.com/reports/473888 -CVE-2019-5420 - https://www.exploit-db.com/exploits/46785/ -CVE-2019-5422 - https://hackerone.com/reports/331110 -CVE-2019-5423 - https://hackerone.com/reports/384939 -CVE-2019-5424 - https://hackerone.com/reports/508256 -CVE-2019-5425 - https://hackerone.com/reports/511025 -CVE-2019-5426 - https://hackerone.com/reports/512958 -CVE-2019-5427 - https://hackerone.com/reports/509315 -CVE-2019-5427 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-5427 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-5427 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-5427 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-5427 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-5429 - https://www.tenable.com/security/research/tra-2019-14 -CVE-2019-5430 - https://hackerone.com/reports/329749 -CVE-2019-5432 - https://hackerone.com/reports/541354 -CVE-2019-5433 - https://hackerone.com/reports/390663 -CVE-2019-5434 - http://packetstormsecurity.com/files/155559/Revive-Adserver-4.2-Remote-Code-Execution.html -CVE-2019-5435 - https://hackerone.com/reports/547630 -CVE-2019-5435 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-5435 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-5435 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-5436 - https://hackerone.com/reports/550696 -CVE-2019-5436 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-5436 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-5436 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-5437 - https://hackerone.com/reports/453820 -CVE-2019-5438 - https://hackerone.com/reports/530289 -CVE-2019-5439 - https://hackerone.com/reports/484398 -CVE-2019-5441 - https://hackerone.com/reports/546753 -CVE-2019-5442 - https://hackerone.com/reports/506791 -CVE-2019-5443 - http://www.openwall.com/lists/oss-security/2019/06/24/1 -CVE-2019-5443 - https://curl.haxx.se/docs/CVE-2019-5443.html -CVE-2019-5443 - https://hackerone.com/reports/608577 -CVE-2019-5443 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-5443 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-5443 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-5444 - https://hackerone.com/reports/569966 -CVE-2019-5447 - https://hackerone.com/reports/570133 -CVE-2019-5448 - https://hackerone.com/reports/640904 -CVE-2019-5449 - https://hackerone.com/reports/231917 -CVE-2019-5449 - https://hackerone.com/reports/476615 -CVE-2019-5450 - https://hackerone.com/reports/631227 -CVE-2019-5451 - https://hackerone.com/reports/507172 -CVE-2019-5452 - https://hackerone.com/reports/534541 -CVE-2019-5453 - https://hackerone.com/reports/331489 -CVE-2019-5454 - https://hackerone.com/reports/291764 -CVE-2019-5455 - https://hackerone.com/reports/490946 -CVE-2019-5456 - https://hackerone.com/reports/519582 -CVE-2019-5457 - https://hackerone.com/reports/570568 -CVE-2019-5458 - https://hackerone.com/reports/570563 -CVE-2019-5459 - https://hackerone.com/reports/502816 -CVE-2019-5460 - https://hackerone.com/reports/503208 -CVE-2019-5461 - https://gitlab.com//gitlab-org/gitlab-ce/issues/54649 -CVE-2019-5461 - https://hackerone.com/reports/446593 -CVE-2019-5463 - https://hackerone.com/reports/477222 -CVE-2019-5464 - https://gitlab.com/gitlab-org/gitlab-ce/issues/63959 -CVE-2019-5464 - https://hackerone.com/reports/632101 -CVE-2019-5467 - https://hackerone.com/reports/526325 -CVE-2019-5468 - https://gitlab.com/gitlab-org/gitlab-ce/issues/57556 -CVE-2019-5469 - https://hackerone.com/reports/534794 -CVE-2019-5471 - https://hackerone.com/reports/496973 -CVE-2019-5473 - https://hackerone.com/reports/565883 -CVE-2019-5475 - https://hackerone.com/reports/654888 -CVE-2019-5476 - https://hackerone.com/reports/508487 -CVE-2019-5479 - https://hackerone.com/reports/566056 -CVE-2019-5480 - https://hackerone.com/reports/570035 -CVE-2019-5481 - https://hackerone.com/reports/686823 -CVE-2019-5481 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-5481 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-5481 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-5482 - https://hackerone.com/reports/684603 -CVE-2019-5482 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-5482 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-5482 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-5483 - https://hackerone.com/reports/526258 -CVE-2019-5484 - https://hackerone.com/reports/473811 -CVE-2019-5484 - https://hackerone.com/reports/492512 -CVE-2019-5484 - https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction -CVE-2019-5485 - http://packetstormsecurity.com/files/154598/NPMJS-gitlabhook-0.0.17-Remote-Command-Execution.html -CVE-2019-5485 - https://hackerone.com/reports/685447 -CVE-2019-5486 - https://hackerone.com/reports/617896 -CVE-2019-5487 - https://hackerone.com/reports/692252 -CVE-2019-5489 - https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e -CVE-2019-5489 - https://seclists.org/bugtraq/2019/Jun/26 -CVE-2019-5489 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-5489 - https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/ -CVE-2019-5514 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -CVE-2019-5515 - https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -CVE-2019-5518 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -CVE-2019-5519 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -CVE-2019-5523 - http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html -CVE-2019-5524 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -CVE-2019-5526 - http://packetstormsecurity.com/files/152946/VMware-Workstation-DLL-Hijacking.html -CVE-2019-5532 - http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html -CVE-2019-5534 - http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html -CVE-2019-5537 - https://www.vmware.com/security/advisories/VMSA-2019-0018.html -CVE-2019-5538 - https://www.vmware.com/security/advisories/VMSA-2019-0018.html -CVE-2019-5544 - http://www.vmware.com/security/advisories/VMSA-2019-0022.html -CVE-2019-5585 - https://fortiguard.com/advisory/FG-IR-19-003 -CVE-2019-5587 - https://fortiguard.com/advisory/FG-IR-19-017 -CVE-2019-5590 - https://fortiguard.com/advisory/FG-IR-19-070 -CVE-2019-5592 - https://fortiguard.com/advisory/FG-IR-19-145 -CVE-2019-5593 - https://fortiguard.com/psirt/FG-IR-19-134 -CVE-2019-5596 - http://packetstormsecurity.com/files/155790/FreeBSD-fd-Privilege-Escalation.html -CVE-2019-5597 - http://packetstormsecurity.com/files/152933/FreeBSD-Security-Advisory-FreeBSD-SA-19-05.pf.html -CVE-2019-5598 - http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html -CVE-2019-5598 - https://www.synacktiv.com/posts/systems/icmp-reachable.html -CVE-2019-5599 - http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html -CVE-2019-5599 - http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html -CVE-2019-5599 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 -CVE-2019-5599 - https://seclists.org/bugtraq/2019/Jun/27 -CVE-2019-5600 - http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SA-19-09.iconv.html -CVE-2019-5601 - http://packetstormsecurity.com/files/153523/FreeBSD-Security-Advisory-FreeBSD-SA-19-10.ufs.html -CVE-2019-5602 - http://packetstormsecurity.com/files/153522/FreeBSD-Security-Advisory-FreeBSD-SA-19-11.cd_ioctl.html -CVE-2019-5603 - http://packetstormsecurity.com/files/153752/FreeBSD-Security-Advisory-FreeBSD-SA-19-15.mqueuefs.html -CVE-2019-5603 - http://packetstormsecurity.com/files/154172/FreeBSD-Security-Advisory-FreeBSD-SA-19-24.mqueuefs.html -CVE-2019-5604 - http://packetstormsecurity.com/files/153753/FreeBSD-Security-Advisory-FreeBSD-SA-19-16.bhyve.html -CVE-2019-5605 - http://packetstormsecurity.com/files/153749/FreeBSD-Security-Advisory-FreeBSD-SA-19-14.freebsd32.html -CVE-2019-5606 - http://packetstormsecurity.com/files/153748/FreeBSD-Security-Advisory-FreeBSD-SA-19-13.pts.html -CVE-2019-5607 - http://packetstormsecurity.com/files/153755/FreeBSD-Security-Advisory-FreeBSD-SA-19-17.fd.html -CVE-2019-5610 - http://packetstormsecurity.com/files/153959/FreeBSD-Security-Advisory-FreeBSD-SA-19-20.bsnmp.html -CVE-2019-5611 - http://packetstormsecurity.com/files/154170/FreeBSD-Security-Advisory-FreeBSD-SA-19-22.mbuf.html -CVE-2019-5624 - https://blog.doyensec.com/2019/04/24/rubyzip-bug.html -CVE-2019-5629 - http://packetstormsecurity.com/files/153159/Rapid7-Windows-InsightIDR-Agent-2.6.3.14-Local-Privilege-Escalation.html -CVE-2019-5629 - http://seclists.org/fulldisclosure/2019/Jun/13 -CVE-2019-5629 - https://bogner.sh/2019/06/local-privilege-escalation-in-rapid7s-windows-insight-idr-agent/ -CVE-2019-5629 - https://seclists.org/bugtraq/2019/Jun/0 -CVE-2019-5665 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5665 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5666 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5666 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5667 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5667 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5668 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5668 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5669 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5669 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5670 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5670 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5671 - http://support.lenovo.com/us/en/solutions/LEN-26250 -CVE-2019-5671 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 -CVE-2019-5676 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 -CVE-2019-5676 - https://support.lenovo.com/us/en/product_security/LEN-27815 -CVE-2019-5678 - https://support.lenovo.com/us/en/product_security/LEN-27815 -CVE-2019-5679 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2019-5680 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2019-5681 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2019-5682 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 -CVE-2019-5683 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 -CVE-2019-5684 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 -CVE-2019-5685 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 -CVE-2019-5686 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 -CVE-2019-5687 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 -CVE-2019-5694 - https://safebreach.com/Post/NVIDIA-GPU-Display-Drivers-for-Windows-and-GFE-Software-DLL-Preloading-and-Potential-Abuses-CVE-2019-5694-CVE-2019-5695 -CVE-2019-5695 - https://safebreach.com/Post/NVIDIA-GPU-Display-Drivers-for-Windows-and-GFE-Software-DLL-Preloading-and-Potential-Abuses-CVE-2019-5694-CVE-2019-5695 -CVE-2019-5701 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md -CVE-2019-5718 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373 -CVE-2019-5718 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-5720 - https://github.com/FrontAccountingERP/FA/issues/38 -CVE-2019-5722 - http://packetstormsecurity.com/files/151117/PORTIER-4.4.4.2-4.4.4.6-SQL-Injection.html -CVE-2019-5722 - https://seclists.org/bugtraq/2019/Jan/7 -CVE-2019-5722 - https://www.exploit-db.com/exploits/46163/ -CVE-2019-5722 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-012.txt -CVE-2019-5723 - http://packetstormsecurity.com/files/151118/PORTIER-4.4.4.2-4.4.4.6-Cryptographic-Issues.html -CVE-2019-5723 - https://seclists.org/bugtraq/2019/Jan/8 -CVE-2019-5723 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-011.txt -CVE-2019-5736 - http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html -CVE-2019-5736 - http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html -CVE-2019-5736 - https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/ -CVE-2019-5736 - https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/ -CVE-2019-5736 - https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html -CVE-2019-5736 - https://github.com/Frichetten/CVE-2019-5736-PoC -CVE-2019-5736 - https://github.com/q3k/cve-2019-5736-poc -CVE-2019-5736 - https://github.com/rancher/runc-cve -CVE-2019-5736 - https://hackerone.com/reports/495495 -CVE-2019-5736 - https://www.exploit-db.com/exploits/46359/ -CVE-2019-5736 - https://www.exploit-db.com/exploits/46369/ -CVE-2019-5747 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -CVE-2019-5747 - http://seclists.org/fulldisclosure/2019/Sep/7 -CVE-2019-5747 - https://seclists.org/bugtraq/2019/Sep/7 -CVE-2019-5825 - http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html -CVE-2019-5831 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0791 -CVE-2019-5893 - https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection -CVE-2019-5893 - https://www.exploit-db.com/exploits/46118/ -CVE-2019-5916 - https://poweregg.d-circle.com/support/package/important/20190204_000780/ -CVE-2019-5918 - https://nablarch.atlassian.net/projects/NAB/issues/NAB-295 -CVE-2019-5919 - https://nablarch.atlassian.net/browse/NAB-313 -CVE-2019-5920 - https://wpvulndb.com/vulnerabilities/9231 -CVE-2019-5924 - https://wpvulndb.com/vulnerabilities/9232 -CVE-2019-5953 - https://access.redhat.com/errata/RHSA-2019:3168 -CVE-2019-5962 - https://wpvulndb.com/vulnerabilities/9433 -CVE-2019-5963 - https://wpvulndb.com/vulnerabilities/9433 -CVE-2019-5970 - https://wpvulndb.com/vulnerabilities/9434 -CVE-2019-5971 - https://wpvulndb.com/vulnerabilities/9434 -CVE-2019-5972 - https://wpvulndb.com/vulnerabilities/9435 -CVE-2019-5973 - https://wpvulndb.com/vulnerabilities/9435 -CVE-2019-5974 - https://wpvulndb.com/vulnerabilities/9436 -CVE-2019-5979 - https://wpvulndb.com/vulnerabilities/9437 -CVE-2019-5980 - https://wpvulndb.com/vulnerabilities/9336 -CVE-2019-5983 - https://wpvulndb.com/vulnerabilities/9438 -CVE-2019-5984 - https://wpvulndb.com/vulnerabilities/9439 -CVE-2019-5994 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -CVE-2019-5995 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -CVE-2019-5997 - http://downloadvi.com/downloads/IPServer/v7.6/760272/v760272RN.pdf -CVE-2019-5998 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -CVE-2019-5999 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -CVE-2019-6000 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -CVE-2019-6001 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -CVE-2019-6109 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2019-6109 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-6110 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2019-6110 - https://www.exploit-db.com/exploits/46193/ -CVE-2019-6111 - https://bugzilla.redhat.com/show_bug.cgi?id=1677794 -CVE-2019-6111 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2019-6111 - https://www.exploit-db.com/exploits/46193/ -CVE-2019-6111 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-6112 - https://metamorfosec.com/Files/Advisories/METS-2020-001-A_XSS_Vulnerability_in_Sell_Media_Plugin_v2.4.1_for_WordPress.txt -CVE-2019-6114 - https://github.com/ereisr00/bagofbugz/tree/master/CorelPaintShop2019 -CVE-2019-6116 - http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html -CVE-2019-6116 - http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html -CVE-2019-6116 - https://www.exploit-db.com/exploits/46242/ -CVE-2019-6120 - https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ -CVE-2019-6121 - https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ -CVE-2019-6122 - https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ -CVE-2019-6126 - https://github.com/Mad-robot/CVE-List/blob/master/Advance%20Peer%20to%20Peer%20MLM%20Script.md -CVE-2019-6128 - http://bugzilla.maptools.org/show_bug.cgi?id=2836 -CVE-2019-6128 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html -CVE-2019-6128 - https://usn.ubuntu.com/3906-1/ -CVE-2019-6129 - https://github.com/glennrp/libpng/issues/269 -CVE-2019-6132 - https://github.com/axiomatic-systems/Bento4/issues/357 -CVE-2019-6133 - https://usn.ubuntu.com/3901-1/ -CVE-2019-6145 - https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 -CVE-2019-6146 - http://packetstormsecurity.com/files/156274/Forcepoint-WebSecurity-8.5-Cross-Site-Scripting.html -CVE-2019-6163 - https://support.lenovo.com/solutions/LEN-27348 -CVE-2019-6170 - https://support.lenovo.com/us/en/product_security/LEN-27714 -CVE-2019-6172 - https://support.lenovo.com/us/en/product_security/LEN-27714 -CVE-2019-6184 - https://support.lenovo.com/solutions/LEN-29289 -CVE-2019-6188 - https://support.lenovo.com/us/en/product_security/LEN-27714 -CVE-2019-6192 - http://packetstormsecurity.com/files/155656/Lenovo-Power-Management-Driver-Buffer-Overflow.html -CVE-2019-6205 - http://packetstormsecurity.com/files/156051/XNU-vm_map_copy-Insufficient-Fix.html -CVE-2019-6205 - https://www.exploit-db.com/exploits/46299/ -CVE-2019-6208 - https://www.exploit-db.com/exploits/46296/ -CVE-2019-6209 - https://www.exploit-db.com/exploits/46285/ -CVE-2019-6213 - https://www.exploit-db.com/exploits/46300/ -CVE-2019-6214 - https://www.exploit-db.com/exploits/46298/ -CVE-2019-6215 - https://www.exploit-db.com/exploits/46448/ -CVE-2019-6218 - https://www.exploit-db.com/exploits/46297/ -CVE-2019-6224 - https://www.exploit-db.com/exploits/46433/ -CVE-2019-6225 - https://www.exploit-db.com/exploits/46248/ -CVE-2019-6244 - https://github.com/fdbao/UsualToolCMS/issues/1 -CVE-2019-6245 - https://github.com/svgpp/svgpp/issues/70 -CVE-2019-6246 - https://github.com/svgpp/svgpp/issues/70 -CVE-2019-6247 - https://github.com/svgpp/svgpp/issues/70 -CVE-2019-6249 - https://www.exploit-db.com/exploits/46149/ -CVE-2019-6250 - https://hackerone.com/reports/477073 -CVE-2019-6251 - http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html -CVE-2019-6256 - https://github.com/rgaufman/live555/issues/19 -CVE-2019-6258 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-6258 -CVE-2019-6260 - https://www.flamingspork.com/blog/2019/01/23/cve-2019-6260:-gaining-control-of-bmc-from-the-host-processor/ -CVE-2019-6263 - https://www.exploit-db.com/exploits/46200/ -CVE-2019-6265 - https://www.detack.de/en/cve-2019-6265-6266 -CVE-2019-6266 - https://www.detack.de/en/cve-2019-6265-6266 -CVE-2019-6267 - https://wpvulndb.com/vulnerabilities/9203 -CVE-2019-6268 - https://packetstormsecurity.com/files/177440/RAD-SecFlow-2-Path-Traversal.html -CVE-2019-6272 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html -CVE-2019-6272 - https://www.exploit-db.com/exploits/46179/ -CVE-2019-6273 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html -CVE-2019-6273 - https://www.exploit-db.com/exploits/46179/ -CVE-2019-6274 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html -CVE-2019-6274 - https://www.exploit-db.com/exploits/46179/ -CVE-2019-6275 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html -CVE-2019-6275 - https://www.exploit-db.com/exploits/46179/ -CVE-2019-6279 - http://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html -CVE-2019-6279 - http://packetstormsecurity.com/files/152166/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html -CVE-2019-6279 - https://www.exploit-db.com/exploits/46580/ -CVE-2019-6279 - https://www.youtube.com/watch?v=-cw04rOYREQ -CVE-2019-6282 - http://packetstormsecurity.com/files/151275/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html -CVE-2019-6282 - http://packetstormsecurity.com/files/152167/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html -CVE-2019-6282 - https://www.exploit-db.com/exploits/46581/ -CVE-2019-6282 - https://www.youtube.com/watch?v=x-r4lnWPdzY -CVE-2019-6283 - https://github.com/sass/libsass/issues/2814 -CVE-2019-6284 - https://github.com/sass/libsass/issues/2816 -CVE-2019-6285 - https://github.com/jbeder/yaml-cpp/issues/660 -CVE-2019-6286 - https://github.com/sass/libsass/issues/2815 -CVE-2019-6290 - https://bugzilla.nasm.us/show_bug.cgi?id=3392548 -CVE-2019-6291 - https://bugzilla.nasm.us/show_bug.cgi?id=3392549 -CVE-2019-6292 - https://github.com/jbeder/yaml-cpp/issues/657 -CVE-2019-6293 - https://github.com/westes/flex/issues/414 -CVE-2019-6294 - https://github.com/TeamEasy/EasyCMS/issues/8 -CVE-2019-6333 - https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333 -CVE-2019-6338 - https://www.drupal.org/sa-core-2019-001 -CVE-2019-6340 - https://www.exploit-db.com/exploits/46452/ -CVE-2019-6340 - https://www.exploit-db.com/exploits/46459/ -CVE-2019-6340 - https://www.exploit-db.com/exploits/46510/ -CVE-2019-6441 - http://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html -CVE-2019-6441 - https://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html -CVE-2019-6441 - https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180 -CVE-2019-6441 - https://www.exploit-db.com/exploits/46180 -CVE-2019-6441 - https://www.exploit-db.com/exploits/46180/ -CVE-2019-6442 - https://dumpco.re/bugs/ntpsec-authed-oobwrite -CVE-2019-6442 - https://www.exploit-db.com/exploits/46178/ -CVE-2019-6443 - https://dumpco.re/bugs/ntpsec-oobread1 -CVE-2019-6443 - https://www.exploit-db.com/exploits/46175/ -CVE-2019-6444 - https://dumpco.re/bugs/ntpsec-oobread2 -CVE-2019-6444 - https://www.exploit-db.com/exploits/46176/ -CVE-2019-6445 - https://dumpco.re/bugs/ntpsec-authed-npe -CVE-2019-6445 - https://www.exploit-db.com/exploits/46177/ -CVE-2019-6447 - http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html -CVE-2019-6447 - https://github.com/fs0c131y/ESFileExplorerOpenPortVuln -CVE-2019-6452 - https://github.com/cvereveal/CVEs/tree/master/CVE-2019-6452 -CVE-2019-6453 - https://github.com/proofofcalc/cve-2019-6453-poc -CVE-2019-6453 - https://proofofcalc.com/advisories/20190218.txt -CVE-2019-6453 - https://proofofcalc.com/cve-2019-6453-mIRC/ -CVE-2019-6453 - https://www.exploit-db.com/exploits/46392/ -CVE-2019-6454 - http://www.openwall.com/lists/oss-security/2021/07/20/2 -CVE-2019-6455 - https://github.com/TeamSeri0us/pocs/tree/master/recutils -CVE-2019-6456 - https://github.com/TeamSeri0us/pocs/tree/master/recutils -CVE-2019-6457 - https://github.com/TeamSeri0us/pocs/tree/master/recutils -CVE-2019-6458 - https://github.com/TeamSeri0us/pocs/tree/master/recutils -CVE-2019-6459 - https://github.com/TeamSeri0us/pocs/tree/master/recutils -CVE-2019-6460 - https://github.com/TeamSeri0us/pocs/tree/master/recutils -CVE-2019-6461 - https://github.com/TeamSeri0us/pocs/tree/master/gerbv -CVE-2019-6462 - https://github.com/TeamSeri0us/pocs/tree/master/gerbv -CVE-2019-6481 - http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html -CVE-2019-6481 - http://seclists.org/fulldisclosure/2019/Mar/33 -CVE-2019-6487 - https://github.com/0xcc-Since2016/TP-Link-WDR-Router-Command-injection_POC/blob/master/poc.py -CVE-2019-6496 - https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/ -CVE-2019-6498 - https://github.com/labapart/gattlib/issues/81 -CVE-2019-6498 - https://github.com/labapart/gattlib/issues/82 -CVE-2019-6498 - https://www.exploit-db.com/exploits/46215/ -CVE-2019-6504 - https://communities.ca.com/community/product-vulnerability-response/blog/2019/01/24/ca20190124-01-security-notice-for-ca-automic-workload-automation -CVE-2019-6504 - https://packetstormsecurity.com/files/151325/CA-Automic-Workload-Automation-12.x-Cross-Site-Scripting.html -CVE-2019-6507 - https://github.com/creditease-sec/insight/issues/42 -CVE-2019-6508 - https://github.com/creditease-sec/insight/issues/42 -CVE-2019-6509 - https://github.com/creditease-sec/insight/issues/42 -CVE-2019-6510 - https://github.com/creditease-sec/insight/issues/42 -CVE-2019-6512 - https://wso2.com/security-patch-releases/api-manager -CVE-2019-6515 - https://wso2.com/security-patch-releases/api-manager -CVE-2019-6543 - https://www.exploit-db.com/exploits/46342/ -CVE-2019-6545 - https://www.exploit-db.com/exploits/46342/ -CVE-2019-6551 - http://www.securityfocus.com/bid/107031 -CVE-2019-6555 - https://ics-cert.us-cert.gov/advisories/ICSA-19-050-03 -CVE-2019-6588 - http://packetstormsecurity.com/files/153252/Liferay-Portal-7.1-CE-GA4-Cross-Site-Scripting.html -CVE-2019-6617 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2019-6617.txt -CVE-2019-6690 - http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html -CVE-2019-6690 - https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/ -CVE-2019-6690 - https://seclists.org/bugtraq/2019/Jan/41 -CVE-2019-6691 - https://github.com/Veeeooo/phpwind/blob/master/README.md -CVE-2019-6695 - https://fortiguard.com/advisory/FG-IR-19-017 -CVE-2019-6698 - https://fortiguard.com/advisory/FG-IR-19-185 -CVE-2019-6699 - https://fortiguard.com/advisory/FG-IR-19-220 -CVE-2019-6700 - https://fortiguard.com/advisory/FG-IR-19-100 -CVE-2019-6702 - http://packetstormsecurity.com/files/151524/Qkr-With-MasterPass-Man-In-The-Middle.html -CVE-2019-6703 - https://wpvulndb.com/vulnerabilities/9208 -CVE-2019-6706 - http://packetstormsecurity.com/files/151335/Lua-5.3.5-Use-After-Free.html -CVE-2019-6706 - https://www.exploit-db.com/exploits/46246/ -CVE-2019-6707 - https://github.com/kk98kk0/exploit/issues/1 -CVE-2019-6708 - https://github.com/kk98kk0/exploit/issues/2 -CVE-2019-6710 - https://www.exploit-db.com/exploits/46240/ -CVE-2019-6714 - http://packetstormsecurity.com/files/151628/BlogEngine.NET-3.3.6-Directory-Traversal-Remote-Code-Execution.html -CVE-2019-6714 - https://www.exploit-db.com/exploits/46353/ -CVE-2019-6715 - http://packetstormsecurity.com/files/160674/WordPress-W3-Total-Cache-0.9.3-File-Read-Directory-Traversal.html -CVE-2019-6715 - https://vinhjaxt.github.io/2019/03/cve-2019-6715 -CVE-2019-6716 - http://packetstormsecurity.com/files/151373/LongBox-Limited-Access-Manager-Insecure-Direct-Object-Reference.html -CVE-2019-6716 - https://www.exploit-db.com/exploits/46254/ -CVE-2019-6716 - https://www.logonbox.com/en/ -CVE-2019-6724 - https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/ -CVE-2019-6726 - https://packetstormsecurity.com/files/152042 -CVE-2019-6744 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2019-6779 - https://github.com/chshcms/cscms/issues/3 -CVE-2019-6780 - https://www.exploit-db.com/exploits/46247/ -CVE-2019-6785 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52212 -CVE-2019-6793 - https://gitlab.com/gitlab-org/gitlab-ce/issues/50748 -CVE-2019-6804 - https://www.exploit-db.com/exploits/46251/ -CVE-2019-6806 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0769 -CVE-2019-6807 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0770 -CVE-2019-6815 - https://www.schneider-electric.com/en/download/document/SEVD-2019-134-09/ -CVE-2019-6816 - https://www.schneider-electric.com/en/download/document/SEVD-2019-134-09/ -CVE-2019-6956 - https://github.com/TeamSeri0us/pocs/blob/master/faad/global-buffer-overflow%40ps_mix_phase.md -CVE-2019-6961 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open -CVE-2019-6962 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open -CVE-2019-6963 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open -CVE-2019-6964 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open -CVE-2019-6966 - https://github.com/axiomatic-systems/Bento4/issues/361 -CVE-2019-6967 - http://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.html -CVE-2019-6967 - https://www.exploit-db.com/exploits/46253/ -CVE-2019-6971 - https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf -CVE-2019-6972 - https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf -CVE-2019-6973 - http://packetstormsecurity.com/files/151377/Sricam-gSOAP-2.8-Denial-Of-Service.html -CVE-2019-6973 - https://github.com/bitfu/sricam-gsoap2.8-dos-exploit -CVE-2019-6973 - https://www.exploit-db.com/exploits/46261/ -CVE-2019-6974 - https://www.exploit-db.com/exploits/46388/ -CVE-2019-6976 - https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/ -CVE-2019-6977 - http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html -CVE-2019-6977 - https://bugs.php.net/bug.php?id=77270 -CVE-2019-6977 - https://hackerone.com/reports/478368 -CVE-2019-6977 - https://www.exploit-db.com/exploits/46677/ -CVE-2019-6979 - https://www.exploit-db.com/exploits/46273/ -CVE-2019-6986 - http://packetstormsecurity.com/files/172838/VIVO-SPARQL-Injection.html -CVE-2019-6988 - https://github.com/uclouvain/openjpeg/issues/1178 -CVE-2019-6989 - http://packetstormsecurity.com/files/152458/TP-LINK-TL-WR940N-TL-WR941ND-Buffer-Overflow.html -CVE-2019-6989 - https://www.exploit-db.com/exploits/46678/ -CVE-2019-7004 - http://packetstormsecurity.com/files/156476/Avaya-IP-Office-Application-Server-11.0.0.0-Cross-Site-Scripting.html -CVE-2019-7140 - http://www.securityfocus.com/bid/108326 -CVE-2019-7141 - http://www.securityfocus.com/bid/108326 -CVE-2019-7142 - http://www.securityfocus.com/bid/108326 -CVE-2019-7143 - http://www.securityfocus.com/bid/108326 -CVE-2019-7144 - http://www.securityfocus.com/bid/108326 -CVE-2019-7145 - http://www.securityfocus.com/bid/108326 -CVE-2019-7146 - https://sourceware.org/bugzilla/show_bug.cgi?id=24075 -CVE-2019-7146 - https://sourceware.org/bugzilla/show_bug.cgi?id=24081 -CVE-2019-7147 - https://bugzilla.nasm.us/show_bug.cgi?id=3392544 -CVE-2019-7148 - https://sourceware.org/bugzilla/show_bug.cgi?id=24085 -CVE-2019-7149 - https://sourceware.org/bugzilla/show_bug.cgi?id=24102 -CVE-2019-7150 - https://sourceware.org/bugzilla/show_bug.cgi?id=24103 -CVE-2019-7151 - https://github.com/WebAssembly/binaryen/issues/1881 -CVE-2019-7152 - https://github.com/WebAssembly/binaryen/issues/1880 -CVE-2019-7153 - https://github.com/WebAssembly/binaryen/issues/1879 -CVE-2019-7154 - https://github.com/WebAssembly/binaryen/issues/1876 -CVE-2019-7156 - https://github.com/uvoteam/libdoc/issues/5 -CVE-2019-7164 - https://github.com/sqlalchemy/sqlalchemy/issues/4481 -CVE-2019-7164 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-7167 - http://fortune.com/2019/02/05/zcash-vulnerability-cryptocurrency/ -CVE-2019-7181 - http://packetstormsecurity.com/files/152570/QNAP-myQNAPcloud-Connect-1.3.4.0317-Username-Password-Denial-Of-Service.html -CVE-2019-7181 - https://www.exploit-db.com/exploits/46733/ -CVE-2019-7192 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html -CVE-2019-7193 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html -CVE-2019-7194 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html -CVE-2019-7195 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html -CVE-2019-7214 - http://packetstormsecurity.com/files/160416/SmarterMail-6985-Remote-Code-Execution.html -CVE-2019-7214 - http://packetstormsecurity.com/files/173388/SmarterTools-SmarterMail-Remote-Code-Execution.html -CVE-2019-7215 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-For-Resolving-Security-Vulnerabilities-May-2019 -CVE-2019-7216 - https://github.com/ekultek/cve-2019-7216 -CVE-2019-7221 - http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html -CVE-2019-7221 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65f -CVE-2019-7221 - https://github.com/torvalds/linux/commits/master/arch/x86/kvm -CVE-2019-7222 - http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html -CVE-2019-7222 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a -CVE-2019-7222 - https://github.com/torvalds/linux/commits/master/arch/x86/kvm -CVE-2019-7223 - https://cxsecurity.com/issue/WLB-2019020191 -CVE-2019-7225 - http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html -CVE-2019-7226 - http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html -CVE-2019-7226 - http://seclists.org/fulldisclosure/2019/Jun/39 -CVE-2019-7227 - http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html -CVE-2019-7227 - http://seclists.org/fulldisclosure/2019/Jun/37 -CVE-2019-7228 - http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html -CVE-2019-7228 - http://seclists.org/fulldisclosure/2019/Jun/43 -CVE-2019-7229 - http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-Verification.html -CVE-2019-7229 - http://seclists.org/fulldisclosure/2019/Jun/34 -CVE-2019-7230 - http://packetstormsecurity.com/files/153386/ABB-IDAL-FTP-Server-Uncontrolled-Format-String.html -CVE-2019-7230 - http://seclists.org/fulldisclosure/2019/Jun/33 -CVE-2019-7231 - http://packetstormsecurity.com/files/153395/ABB-IDAL-FTP-Server-Buffer-Overflow.html -CVE-2019-7231 - http://seclists.org/fulldisclosure/2019/Jun/35 -CVE-2019-7232 - http://packetstormsecurity.com/files/153403/ABB-IDAL-HTTP-Server-Stack-Based-Buffer-Overflow.html -CVE-2019-7232 - http://seclists.org/fulldisclosure/2019/Jun/40 -CVE-2019-7233 - https://github.com/uvoteam/libdoc/issues/6 -CVE-2019-7238 - https://support.sonatype.com/hc/en-us/articles/360017310793-CVE-2019-7238-Nexus-Repository-Manager-3-Missing-Access-Controls-and-Remote-Code-Execution-February-5th-2019 -CVE-2019-7249 - https://hackerone.com/reports/471739 -CVE-2019-7252 - https://applied-risk.com/labs/advisories -CVE-2019-7253 - https://applied-risk.com/labs/advisories -CVE-2019-7254 - http://packetstormsecurity.com/files/155252/Linear-eMerge-E3-1.00-06-Directory-Traversal.html -CVE-2019-7255 - http://packetstormsecurity.com/files/155253/Linear-eMerge-E3-1.00-06-Cross-Site-Scripting.html -CVE-2019-7256 - http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html -CVE-2019-7256 - http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Injection.html -CVE-2019-7256 - http://packetstormsecurity.com/files/155272/Linear-eMerge-E3-Access-Controller-Command-Injection.html -CVE-2019-7256 - http://packetstormsecurity.com/files/170372/Linear-eMerge-E3-Series-Access-Controller-Command-Injection.html -CVE-2019-7257 - http://packetstormsecurity.com/files/155254/Linear-eMerge-E3-1.00-06-Arbitrary-File-Upload-Remote-Root-Code-Execution.html -CVE-2019-7258 - http://packetstormsecurity.com/files/155260/Linear-eMerge-E3-1.00-06-Privilege-Escalation.html -CVE-2019-7259 - http://packetstormsecurity.com/files/155260/Linear-eMerge-E3-1.00-06-Privilege-Escalation.html -CVE-2019-7260 - https://applied-risk.com/labs/advisories -CVE-2019-7261 - http://packetstormsecurity.com/files/155267/Nortek-Linear-eMerge-E3-Access-Controller-1.00-06-SSH-FTP-Remote-Root.html -CVE-2019-7262 - http://packetstormsecurity.com/files/155263/Nortek-Linear-eMerge-E3-Access-Control-Cross-Site-Request-Forgery.html -CVE-2019-7263 - https://applied-risk.com/labs/advisories -CVE-2019-7264 - https://applied-risk.com/labs/advisories -CVE-2019-7265 - http://packetstormsecurity.com/files/155267/Nortek-Linear-eMerge-E3-Access-Controller-1.00-06-SSH-FTP-Remote-Root.html -CVE-2019-7266 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html -CVE-2019-7267 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html -CVE-2019-7268 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html -CVE-2019-7269 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html -CVE-2019-7270 - https://applied-risk.com/labs/advisories -CVE-2019-7271 - https://applied-risk.com/labs/advisories -CVE-2019-7272 - http://packetstormsecurity.com/files/155259/Optergy-BMS-2.0.3a-Account-Reset-Username-Disclosure.html -CVE-2019-7273 - http://packetstormsecurity.com/files/155265/Optergy-Proton-Enterprise-BMS-2.0.3a-Cross-Site-Request-Forgery.html -CVE-2019-7274 - http://packetstormsecurity.com/files/155269/Optergy-2.3.0a-Remote-Root.html -CVE-2019-7275 - http://packetstormsecurity.com/files/155268/Optergy-Proton-Enterprise-BMS-2.3.0a-Open-Redirect.html -CVE-2019-7276 - http://packetstormsecurity.com/files/171564/Optergy-Proton-And-Enterprise-BMS-2.0.3a-Command-Injection.html -CVE-2019-7276 - https://applied-risk.com/labs/advisories -CVE-2019-7277 - https://applied-risk.com/labs/advisories -CVE-2019-7278 - https://applied-risk.com/labs/advisories -CVE-2019-7279 - https://applied-risk.com/labs/advisories -CVE-2019-7280 - https://applied-risk.com/labs/advisories -CVE-2019-7281 - https://applied-risk.com/labs/advisories -CVE-2019-7282 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2019-7283 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -CVE-2019-7295 - https://github.com/typora/typora-issues/issues/2129 -CVE-2019-7296 - https://github.com/typora/typora-issues/issues/2131 -CVE-2019-7297 - https://github.com/leonW7/D-Link/blob/master/Vul_1.md -CVE-2019-7298 - https://github.com/leonW7/D-Link/blob/master/Vul_2.md -CVE-2019-7299 - https://wpvulndb.com/vulnerabilities/9235 -CVE-2019-7300 - https://code610.blogspot.com/2019/01/rce-in-artica.html -CVE-2019-7300 - https://github.com/c610/tmp/blob/master/aRtiCE.py -CVE-2019-7301 - https://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html -CVE-2019-7303 - https://www.exploit-db.com/exploits/46594 -CVE-2019-7304 - https://www.exploit-db.com/exploits/46361 -CVE-2019-7304 - https://www.exploit-db.com/exploits/46362 -CVE-2019-7305 - https://launchpad.net/bugs/1822013 -CVE-2019-7306 - https://bugs.launchpad.net/ubuntu/+source/byobu/+bug/1827202 -CVE-2019-7307 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html -CVE-2019-7307 - https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858 -CVE-2019-7315 - https://labs.nettitude.com/blog/cve-2019-7315-genie-access-wip3bvaf-ip-camera-directory-traversal/ -CVE-2019-7316 - https://kc.mcafee.com/corporate/index?page=content&id=SB10330 -CVE-2019-7316 - https://packetstormsecurity.com/files/125780 -CVE-2019-7317 - http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html -CVE-2019-7317 - https://usn.ubuntu.com/3991-1/ -CVE-2019-7317 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-7317 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2019-7323 - https://bmantra.github.io/logmx/logmx.html -CVE-2019-7323 - https://github.com/bmantra/bmantra.github.io/blob/master/logmx/logmx.html -CVE-2019-7324 - http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html -CVE-2019-7383 - http://packetstormsecurity.com/files/151648/SYSTORME-ISG-Command-Injection.html -CVE-2019-7383 - http://seclists.org/fulldisclosure/2019/Feb/32 -CVE-2019-7384 - http://packetstormsecurity.com/files/151649/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html -CVE-2019-7384 - http://seclists.org/fulldisclosure/2019/Feb/33 -CVE-2019-7384 - https://s3curityb3ast.github.io/KSA-Dev-005.md -CVE-2019-7385 - http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html -CVE-2019-7385 - http://seclists.org/fulldisclosure/2019/Feb/34 -CVE-2019-7385 - https://s3curityb3ast.github.io -CVE-2019-7385 - https://s3curityb3ast.github.io/KSA-Dev-006.md -CVE-2019-7386 - http://packetstormsecurity.com/files/151651/Nokia-8810-Denial-Of-Service.html -CVE-2019-7386 - http://seclists.org/fulldisclosure/2019/Feb/35 -CVE-2019-7386 - https://s3curityb3ast.github.io -CVE-2019-7386 - https://s3curityb3ast.github.io/KSA-Dev-007.md -CVE-2019-7387 - https://s3curityb3ast.github.io/KSA-Dev-004.md -CVE-2019-7388 - https://github.com/leonW7/D-Link/blob/master/Vul_3.md -CVE-2019-7389 - https://github.com/leonW7/D-Link/blob/master/Vul_4.md -CVE-2019-7390 - https://github.com/leonW7/D-Link/blob/master/Vul_5.md -CVE-2019-7391 - http://packetstormsecurity.com/files/151550/Zyxel-VMG3312-B10B-DSL-491HNU-B1-V2-Cross-Site-Request-Forgery.html -CVE-2019-7391 - https://www.exploit-db.com/exploits/46326/ -CVE-2019-7391 - https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) -CVE-2019-7393 - http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html -CVE-2019-7394 - http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html -CVE-2019-7400 - http://packetstormsecurity.com/files/152248/Rukovoditel-ERP-And-CRM-2.4.1-Cross-Site-Scripting.html -CVE-2019-7400 - https://hackpuntes.com/cve-2019-7400-rukovoditel-erp-crm-2-4-1-cross-site-scripting-reflejado/ -CVE-2019-7400 - https://www.exploit-db.com/exploits/46608/ -CVE-2019-7402 - https://github.com/panghusec/exploit/issues/8 -CVE-2019-7404 - https://github.com/epistemophilia/CVEs/blob/master/LG-GAMP-Routers/CVE-2019-7404/poc-cve-2019-7404.py -CVE-2019-7409 - https://metamorfosec.com/Files/Advisories/METS-2019-001-Multiple_XSS_Vulnerabilities_in_ProfileDesign_CMS_v6.0.2.5.txt -CVE-2019-7410 - https://metamorfosec.com/Files/Advisories/METS-2020-002-A_Stored_XSS_Vulnerability_in_Galileo_CMS_v0.042.txt -CVE-2019-7411 - https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_Vulnerabilities_in_the_MyThemeShop_Launcher_plugin_v1.0.8_for_WordPress.txt -CVE-2019-7411 - https://wpvulndb.com/vulnerabilities/9275 -CVE-2019-7412 - https://metamorfosec.com/Files/Advisories/METS-2019-003-Denial_of_Service_in_PS_PHPCaptcha_WP_before_v1.2.0.txt -CVE-2019-7413 - https://metamorfosec.com/Files/Advisories/METS-2019-004-A_XSS_Vulnerability_in_Parallax_Scroll_plugin_before_v2.1_for_WordPress.txt -CVE-2019-7416 - http://packetstormsecurity.com/files/151582/OpenText-Documentum-Webtop-5.3-SP2-Open-Redirect.html -CVE-2019-7416 - http://seclists.org/fulldisclosure/2019/Feb/26 -CVE-2019-7417 - http://packetstormsecurity.com/files/151583/Ericsson-Active-Library-Explorer-ALEX-14.3-Cross-Site-Scripting.html -CVE-2019-7417 - http://seclists.org/fulldisclosure/2019/Feb/27 -CVE-2019-7418 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html -CVE-2019-7418 - http://seclists.org/fulldisclosure/2019/Feb/28 -CVE-2019-7419 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html -CVE-2019-7419 - http://seclists.org/fulldisclosure/2019/Feb/28 -CVE-2019-7420 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html -CVE-2019-7420 - http://seclists.org/fulldisclosure/2019/Feb/28 -CVE-2019-7421 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html -CVE-2019-7421 - http://seclists.org/fulldisclosure/2019/Feb/28 -CVE-2019-7422 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -CVE-2019-7422 - http://seclists.org/fulldisclosure/2019/Feb/29 -CVE-2019-7423 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -CVE-2019-7423 - http://seclists.org/fulldisclosure/2019/Feb/29 -CVE-2019-7424 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -CVE-2019-7424 - http://seclists.org/fulldisclosure/2019/Feb/29 -CVE-2019-7425 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -CVE-2019-7425 - http://seclists.org/fulldisclosure/2019/Feb/29 -CVE-2019-7426 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -CVE-2019-7426 - http://seclists.org/fulldisclosure/2019/Feb/29 -CVE-2019-7427 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -CVE-2019-7427 - http://seclists.org/fulldisclosure/2019/Feb/29 -CVE-2019-7429 - https://gkaim.com/cve-2019-7429-vikas-chaudhary/ -CVE-2019-7430 - https://gkaim.com/cve-2019-7430-vikas-chaudhary/ -CVE-2019-7431 - https://gkaim.com/cve-2019-7431-vikas-chaudhary/ -CVE-2019-7432 - https://gkaim.com/cve-2019-7432-vikas-chaudhary/ -CVE-2019-7433 - https://gkaim.com/cve-2019-7433-vikas-chaudhary/ -CVE-2019-7434 - https://gkaim.com/cve-2019-7434-vikas-chaudhary/ -CVE-2019-7435 - https://gkaim.com/cve-2019-7435-vikas-chaudhary/ -CVE-2019-7436 - https://gkaim.com/cve-2019-7436-vikas-chaudhary/ -CVE-2019-7437 - https://gkaim.com/cve-2019-7437-vikas-chaudhary/ -CVE-2019-7438 - http://packetstormsecurity.com/files/152625/JioFi-4G-M2S-1.0.2-Cross-Site-Scripting.html -CVE-2019-7438 - https://gkaim.com/cve-2019-7438-html-vikas-chaudhary/ -CVE-2019-7438 - https://gkaim.com/cve-2019-7438-xss-vikas-chaudhary/ -CVE-2019-7438 - https://www.exploit-db.com/exploits/46751/ -CVE-2019-7439 - http://packetstormsecurity.com/files/152626/JioFi-4G-M2S-1.0.2-Denial-Of-Service.html -CVE-2019-7439 - https://gkaim.com/cve-2019-7439-vikas-chaudhary/ -CVE-2019-7439 - https://www.exploit-db.com/exploits/46752/ -CVE-2019-7440 - http://packetstormsecurity.com/files/152361/JioFi-4G-M2S-1.0.2-Cross-Site-Request-Forgery.html -CVE-2019-7440 - https://gkaim.com/cve-2019-7440-vikas-chaudhary/ -CVE-2019-7440 - https://www.exploit-db.com/exploits/46633/ -CVE-2019-7441 - http://packetstormsecurity.com/files/152362/WordPress-PayPal-Checkout-Payment-Gateway-1.6.8-Parameter-Tampering.html -CVE-2019-7441 - https://gkaim.com/cve-2019-7441-vikas-chaudhary/ -CVE-2019-7441 - https://www.exploit-db.com/exploits/46632/ -CVE-2019-7442 - http://packetstormsecurity.com/files/152801/CyberArk-Enterprise-Password-Vault-10.7-XML-External-Entity-Injection.html -CVE-2019-7442 - https://www.octority.com/2019/05/07/cyberark-enterprise-password-vault-xml-external-entity-xxe-injection/ -CVE-2019-7537 - https://github.com/pytroll/donfig/issues/5 -CVE-2019-7541 - http://packetstormsecurity.com/files/151657/Rukovoditel-Project-Management-CRM-2.4.1-Cross-Site-Scripting.html -CVE-2019-7541 - https://www.exploit-db.com/exploits/46366/ -CVE-2019-7548 - https://github.com/no-security/sqlalchemy_test -CVE-2019-7548 - https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518 -CVE-2019-7548 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-7552 - https://securityhitlist.blogspot.com/2019/02/cve-2019-7552-php-scripts-mall.html -CVE-2019-7553 - https://securityhitlist.blogspot.com/2019/02/cve-2019-7553-stores-xss-in-php-scripts.html -CVE-2019-7554 - https://securityhitlist.blogspot.com/2019/02/cve-2019-7554-reflected-xss-in-api.html -CVE-2019-7564 - http://packetstormsecurity.com/files/151595/Coship-Wireless-Router-4.0.0.x-5.0.0.x-Authentication-Bypass.html -CVE-2019-7566 - https://github.com/cskaza/cszcms/issues/17 -CVE-2019-7568 - https://github.com/baijiacms/baijiacmsV4/issues/2 -CVE-2019-7569 - https://github.com/millken/doyocms/issues/1 -CVE-2019-7570 - https://blog.csdn.net/yangfan0502/article/details/86189065 -CVE-2019-7572 - https://bugzilla.libsdl.org/show_bug.cgi?id=4495 -CVE-2019-7573 - https://bugzilla.libsdl.org/show_bug.cgi?id=4491 -CVE-2019-7574 - https://bugzilla.libsdl.org/show_bug.cgi?id=4496 -CVE-2019-7575 - https://bugzilla.libsdl.org/show_bug.cgi?id=4493 -CVE-2019-7576 - https://bugzilla.libsdl.org/show_bug.cgi?id=4490 -CVE-2019-7577 - https://bugzilla.libsdl.org/show_bug.cgi?id=4492 -CVE-2019-7578 - https://bugzilla.libsdl.org/show_bug.cgi?id=4494 -CVE-2019-7579 - http://www.x0rsecurity.com/2019/06/09/my-second-cve-linksys-wrt-acs-cve-2019-7579-or-as-i-call-it-acceptance-no-one-considers-security-by-design/ -CVE-2019-7580 - https://github.com/shadowsock5/ThinkCMF-5.0.190111/blob/master/README.md -CVE-2019-7580 - https://xz.aliyun.com/t/3997 -CVE-2019-7581 - https://github.com/libming/libming/issues/173 -CVE-2019-7582 - https://github.com/libming/libming/issues/172 -CVE-2019-7588 - https://packetstormsecurity.com/files/151691/exacqvisionesm5122-escalate.txt -CVE-2019-7590 - https://packetstormsecurity.com/files/152128/exacqVision-9.8-Unquoted-Service-Path-Privilege-Escalation.html -CVE-2019-7590 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5515.php -CVE-2019-7608 - https://www.elastic.co/community/security -CVE-2019-7609 - http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Pollution-Remote-Code-Execution.html -CVE-2019-7609 - https://www.elastic.co/community/security -CVE-2019-7610 - https://www.elastic.co/community/security -CVE-2019-7611 - https://www.elastic.co/community/security -CVE-2019-7612 - https://www.elastic.co/community/security -CVE-2019-7613 - https://www.elastic.co/community/security -CVE-2019-7614 - https://www.elastic.co/community/security/ -CVE-2019-7615 - https://www.elastic.co/community/security/ -CVE-2019-7616 - https://www.elastic.co/community/security/ -CVE-2019-7617 - https://www.elastic.co/community/security/ -CVE-2019-7618 - https://staging-website.elastic.co/community/security -CVE-2019-7619 - https://www.elastic.co/community/security -CVE-2019-7620 - https://www.elastic.co/community/security -CVE-2019-7621 - https://www.elastic.co/community/security/ -CVE-2019-7629 - https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ -CVE-2019-7632 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=22113 -CVE-2019-7634 - https://medium.com/@crhenr/cve-2019-7634-my-first-cve-61db875dc94a -CVE-2019-7635 - https://bugzilla.libsdl.org/show_bug.cgi?id=4498 -CVE-2019-7636 - https://bugzilla.libsdl.org/show_bug.cgi?id=4499 -CVE-2019-7637 - https://bugzilla.libsdl.org/show_bug.cgi?id=4497 -CVE-2019-7638 - https://bugzilla.libsdl.org/show_bug.cgi?id=4500 -CVE-2019-7646 - http://packetstormsecurity.com/files/151630/CentOS-Web-Panel-0.9.8.763-Cross-Site-Scripting.html -CVE-2019-7646 - https://www.exploit-db.com/exploits/46349/ -CVE-2019-7651 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-01-09-emsisoft-Anti-Malware-bypass.md -CVE-2019-7651 - https://nafiez.github.io/security/bypass/2019/01/08/emsisoft-Anti-Malware-bypass.html -CVE-2019-7652 - http://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html -CVE-2019-7656 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-7656-PrivEscal-Wowza -CVE-2019-7659 - https://outpost24.com/blog/gsoap-vulnerability-identified -CVE-2019-7662 - https://github.com/WebAssembly/binaryen/issues/1872 -CVE-2019-7663 - http://bugzilla.maptools.org/show_bug.cgi?id=2833 -CVE-2019-7663 - https://usn.ubuntu.com/3906-1/ -CVE-2019-7664 - https://sourceware.org/bugzilla/show_bug.cgi?id=24084 -CVE-2019-7665 - https://sourceware.org/bugzilla/show_bug.cgi?id=24089 -CVE-2019-7666 - http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html -CVE-2019-7667 - http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html -CVE-2019-7668 - https://applied-risk.com/labs/advisories -CVE-2019-7669 - http://packetstormsecurity.com/files/155270/FlexAir-Access-Control-2.3.38-Command-Injection.html -CVE-2019-7670 - http://packetstormsecurity.com/files/155271/FlexAir-Access-Control-2.3.38-Remote-Root.html -CVE-2019-7671 - http://packetstormsecurity.com/files/155274/Prima-Access-Control-2.3.35-Cross-Site-Scripting.html -CVE-2019-7672 - https://applied-risk.com/labs/advisories -CVE-2019-7673 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb -CVE-2019-7674 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb -CVE-2019-7675 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb -CVE-2019-7684 - https://gitee.com/inxeduopen/inxedu/issues/IQJUH -CVE-2019-7687 - http://packetstormsecurity.com/files/151654/Jiofi-4-JMR-1140-Cross-Site-Scripting.html -CVE-2019-7687 - https://www.exploit-db.com/exploits/46363/ -CVE-2019-7690 - https://github.com/yogeshshe1ke/CVE/blob/master/2019-7690/mobaxterm_exploit.py -CVE-2019-7693 - https://pastebin.com/raw/nQ648Dif -CVE-2019-7697 - https://github.com/axiomatic-systems/Bento4/issues/351 -CVE-2019-7698 - https://github.com/axiomatic-systems/Bento4/issues/354 -CVE-2019-7699 - https://github.com/axiomatic-systems/Bento4/issues/355 -CVE-2019-7700 - https://github.com/WebAssembly/binaryen/issues/1864 -CVE-2019-7701 - https://github.com/WebAssembly/binaryen/issues/1863 -CVE-2019-7702 - https://github.com/WebAssembly/binaryen/issues/1867 -CVE-2019-7703 - https://github.com/WebAssembly/binaryen/issues/1865 -CVE-2019-7704 - https://github.com/WebAssembly/binaryen/issues/1866 -CVE-2019-7718 - https://github.com/jadacheng/vulnerability/blob/master/Metinfo6.x/MetInfo.md -CVE-2019-7730 - https://github.com/eddietcc/CVEnotes/blob/master/MyWebSQL/CSRF/readme.md -CVE-2019-7737 - https://github.com/Verytops/verydows/issues/10 -CVE-2019-7738 - https://github.com/cooltey/C.P.Sub/issues/3 -CVE-2019-7745 - http://packetstormsecurity.com/files/151655/Jiofi-4-JMR-1140-WiFi-Password-Cross-Site-Request-Forgery.html -CVE-2019-7745 - https://www.exploit-db.com/exploits/46364/ -CVE-2019-7746 - http://packetstormsecurity.com/files/151656/Jiofi-4-JMR-1140-Admin-Token-Disclosure-Cross-Site-Request-Forgery.html -CVE-2019-7746 - https://www.exploit-db.com/exploits/46365/ -CVE-2019-7751 - https://packetstormsecurity.com/files/151963/MarcomCentral-FusionPro-VDP-Creator-Directory-Traversal.html -CVE-2019-7751 - https://www.exploit-db.com/exploits/46494 -CVE-2019-7755 - https://www.exploit-database.net/?id=101060 -CVE-2019-7755 - https://www.exploit-db.com/exploits/46431/ -CVE-2019-7758 - http://www.securityfocus.com/bid/108326 -CVE-2019-7761 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0778 -CVE-2019-7769 - http://www.securityfocus.com/bid/108326 -CVE-2019-7770 - http://www.securityfocus.com/bid/108326 -CVE-2019-7771 - http://www.securityfocus.com/bid/108326 -CVE-2019-7773 - http://www.securityfocus.com/bid/108326 -CVE-2019-7774 - http://www.securityfocus.com/bid/108326 -CVE-2019-7775 - http://www.securityfocus.com/bid/108326 -CVE-2019-7776 - http://www.securityfocus.com/bid/108326 -CVE-2019-7777 - http://www.securityfocus.com/bid/108326 -CVE-2019-7778 - http://www.securityfocus.com/bid/108326 -CVE-2019-7780 - http://www.securityfocus.com/bid/108326 -CVE-2019-7787 - http://www.securityfocus.com/bid/108326 -CVE-2019-7789 - http://www.securityfocus.com/bid/108326 -CVE-2019-7790 - http://www.securityfocus.com/bid/108326 -CVE-2019-7793 - http://www.securityfocus.com/bid/108326 -CVE-2019-7794 - http://www.securityfocus.com/bid/108326 -CVE-2019-7795 - http://www.securityfocus.com/bid/108326 -CVE-2019-7798 - http://www.securityfocus.com/bid/108326 -CVE-2019-7799 - http://www.securityfocus.com/bid/108326 -CVE-2019-7801 - http://www.securityfocus.com/bid/108326 -CVE-2019-7802 - http://www.securityfocus.com/bid/108326 -CVE-2019-7803 - http://www.securityfocus.com/bid/108326 -CVE-2019-7810 - http://www.securityfocus.com/bid/108326 -CVE-2019-7811 - http://www.securityfocus.com/bid/108326 -CVE-2019-7812 - http://www.securityfocus.com/bid/108326 -CVE-2019-7813 - http://www.securityfocus.com/bid/108326 -CVE-2019-7826 - http://www.securityfocus.com/bid/108326 -CVE-2019-7831 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0796 -CVE-2019-7836 - http://www.securityfocus.com/bid/108326 -CVE-2019-7839 - http://packetstormsecurity.com/files/153439/Coldfusion-JNBridge-Remote-Code-Execution.html -CVE-2019-7839 - https://seclists.org/bugtraq/2019/Jun/38 -CVE-2019-7841 - http://www.securityfocus.com/bid/108326 -CVE-2019-8195 - http://packetstormsecurity.com/files/155224/Adobe-Acrobat-Reader-DC-For-Windows-Malformed-JBIG2Globals-Stream-Uninitialized-Pointer.html -CVE-2019-8196 - http://packetstormsecurity.com/files/155225/Adobe-Acrobat-Reader-DC-For-Windows-Malformed-OTF-Font-Uninitialized-Pointer.html -CVE-2019-8258 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/ -CVE-2019-8259 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/ -CVE-2019-8260 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/ -CVE-2019-8261 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/ -CVE-2019-8262 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/ -CVE-2019-8263 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/ -CVE-2019-8263 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/ -CVE-2019-8264 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/ -CVE-2019-8265 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/ -CVE-2019-8266 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/ -CVE-2019-8267 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/ -CVE-2019-8268 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/ -CVE-2019-8269 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/ -CVE-2019-8270 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/ -CVE-2019-8271 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/ -CVE-2019-8272 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/ -CVE-2019-8273 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/ -CVE-2019-8274 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/ -CVE-2019-8275 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/ -CVE-2019-8276 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/ -CVE-2019-8277 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/ -CVE-2019-8280 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/ -CVE-2019-8285 - https://support.kaspersky.com/vulnerability.aspx?el=12430#080519 -CVE-2019-8286 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#110719 -CVE-2019-8320 - https://hackerone.com/reports/317321 -CVE-2019-8331 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -CVE-2019-8331 - http://seclists.org/fulldisclosure/2019/May/13 -CVE-2019-8331 - https://seclists.org/bugtraq/2019/May/18 -CVE-2019-8331 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2019-8334 - https://github.com/gongfuxiang/schoolcms/issues/1 -CVE-2019-8335 - https://github.com/gongfuxiang/schoolcms/issues/1 -CVE-2019-8338 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -CVE-2019-8339 - https://sysdig.com/blog/cve-2019-8339-falco-vulnerability/ -CVE-2019-8341 - https://www.exploit-db.com/exploits/46386/ -CVE-2019-8345 - https://www.youtube.com/watch?v=BtLUO-ujJ7I -CVE-2019-8347 - https://github.com/source-trace/beescms/issues/4 -CVE-2019-8349 - http://packetstormsecurity.com/files/151733/HTMLy-2.7.4-Cross-Site-Scripting.html -CVE-2019-8349 - http://seclists.org/fulldisclosure/2019/Feb/40 -CVE-2019-8349 - https://www.netsparker.com/web-applications-advisories/ -CVE-2019-8351 - https://support.heimdalsecurity.com/hc/en-us/articles/360001084158-Release-2-5-172-PROD-Update -CVE-2019-8352 - https://www.securifera.com/advisories/CVE-2019-8352/ -CVE-2019-8360 - https://packetstormsecurity.com/files/151706/Find-A-Place-CMS-Directory-1.5-SQL-Injection.html -CVE-2019-8368 - https://know.bishopfox.com/advisories/openemr-5-0-16-remote-code-execution-cross-site-scripting -CVE-2019-8371 - https://know.bishopfox.com/advisories/openemr-5-0-16-remote-code-execution-cross-site-scripting -CVE-2019-8372 - http://www.jackson-t.ca/lg-driver-lpe.html -CVE-2019-8375 - https://www.exploit-db.com/exploits/46465/ -CVE-2019-8375 - https://www.inputzero.io/2019/02/fuzzing-webkit.html -CVE-2019-8376 - https://github.com/appneta/tcpreplay/issues/537 -CVE-2019-8376 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_layer4_v6-tcpreplay-4-3-1/ -CVE-2019-8377 - https://github.com/appneta/tcpreplay/issues/536 -CVE-2019-8377 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_ipv6_l4proto-tcpreplay-4-3-1/ -CVE-2019-8378 - https://github.com/axiomatic-systems/Bento4/issues/363 -CVE-2019-8378 - https://research.loginsoft.com/bugs/a-heap-buffer-overflow-vulnerability-in-the-function-ap4_bitstreamreadbytes-bento4-1-5-1-628/ -CVE-2019-8379 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/ -CVE-2019-8379 - https://sourceforge.net/p/advancemame/bugs/271/ -CVE-2019-8380 - https://github.com/axiomatic-systems/Bento4/issues/366 -CVE-2019-8380 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_trackgetsampleindexfortimestampms-bento4-1-5-1-628/ -CVE-2019-8381 - https://github.com/appneta/tcpreplay/issues/538 -CVE-2019-8381 - https://research.loginsoft.com/bugs/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/ -CVE-2019-8382 - https://github.com/axiomatic-systems/Bento4/issues/364 -CVE-2019-8382 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_listfind-bento4-1-5-1-628/ -CVE-2019-8383 - https://research.loginsoft.com/bugs/invalid-memory-access-in-adv_png_unfilter_8-advancecomp/ -CVE-2019-8383 - https://sourceforge.net/p/advancemame/bugs/272/ -CVE-2019-8385 - http://packetstormsecurity.com/files/152298/Thomson-Reuters-Concourse-And-Firm-Central-Local-File-Inclusion-Directory-Traversal.html -CVE-2019-8387 - http://packetstormsecurity.com/files/151725/Master-IP-CAM-01-3.3.4.2103-Remote-Command-Execution.html -CVE-2019-8387 - https://www.exploit-db.com/exploits/46400/ -CVE-2019-8389 - https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465 -CVE-2019-8390 - http://packetstormsecurity.com/files/151723/qdPM-9.1-Cross-Site-Scripting.html -CVE-2019-8390 - https://www.exploit-db.com/exploits/46399/ -CVE-2019-8391 - http://packetstormsecurity.com/files/151723/qdPM-9.1-Cross-Site-Scripting.html -CVE-2019-8391 - https://www.exploit-db.com/exploits/46398/ -CVE-2019-8392 - https://github.com/leonW7/D-Link/blob/master/Vul_6.md -CVE-2019-8394 - https://www.exploit-db.com/exploits/46413/ -CVE-2019-8400 - https://www.youtube.com/watch?v=RIyZLeKEC8E -CVE-2019-8404 - http://packetstormsecurity.com/files/151763/Webiness-Inventory-2.3-Arbitrary-File-Upload.html -CVE-2019-8404 - https://www.exploit-db.com/exploits/46405/ -CVE-2019-8410 - https://github.com/holychang/maccms8/blob/master/xss2 -CVE-2019-8421 - https://github.com/bagesoft/bagecms/issues/5 -CVE-2019-8422 - https://github.com/wowwooo/vnotes/blob/master/PbootCMS%20SQL%20Injection%20Description.md -CVE-2019-8423 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewseventsphp-line-44-sql-injection -CVE-2019-8424 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-276-orderby-sql-injection -CVE-2019-8425 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#sql-query-error-reflected-xss -CVE-2019-8426 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolcapphp-reflected-xss -CVE-2019-8427 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#includesfunctionsphp-daemoncontrol-command-injection -CVE-2019-8428 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolphp-line-35-second-order-sqli -CVE-2019-8429 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-393-sql-injection -CVE-2019-8437 - https://github.com/beyond7176/njiandan-cms/issues/1 -CVE-2019-8444 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833 -CVE-2019-8445 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840 -CVE-2019-8446 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839 -CVE-2019-8449 - http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html -CVE-2019-8452 - http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html -CVE-2019-8457 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2019-8457 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-8457 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-8457 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2019-8457 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-8461 - https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM -CVE-2019-8921 - https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/ -CVE-2019-8922 - https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/ -CVE-2019-8923 - http://packetstormsecurity.com/files/151756/XAMPP-5.6.8-Cross-Site-Scripting-SQL-Injection.html -CVE-2019-8923 - http://seclists.org/fulldisclosure/2019/Feb/43 -CVE-2019-8923 - https://www.exploit-db.com/exploits/46424/ -CVE-2019-8924 - http://packetstormsecurity.com/files/151756/XAMPP-5.6.8-Cross-Site-Scripting-SQL-Injection.html -CVE-2019-8924 - http://seclists.org/fulldisclosure/2019/Feb/43 -CVE-2019-8924 - https://www.exploit-db.com/exploits/46424/ -CVE-2019-8925 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html -CVE-2019-8925 - http://seclists.org/fulldisclosure/2019/Feb/45 -CVE-2019-8925 - https://www.exploit-db.com/exploits/46425/ -CVE-2019-8926 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html -CVE-2019-8926 - http://seclists.org/fulldisclosure/2019/Feb/45 -CVE-2019-8926 - https://www.exploit-db.com/exploits/46425/ -CVE-2019-8927 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html -CVE-2019-8927 - http://seclists.org/fulldisclosure/2019/Feb/45 -CVE-2019-8927 - https://www.exploit-db.com/exploits/46425/ -CVE-2019-8928 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html -CVE-2019-8928 - http://seclists.org/fulldisclosure/2019/Feb/45 -CVE-2019-8928 - https://www.exploit-db.com/exploits/46425/ -CVE-2019-8929 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html -CVE-2019-8929 - http://seclists.org/fulldisclosure/2019/Feb/45 -CVE-2019-8929 - https://www.exploit-db.com/exploits/46425/ -CVE-2019-8933 - https://blog.csdn.net/qq_36093477/article/details/86681178 -CVE-2019-8936 - http://bugs.ntp.org/show_bug.cgi?id=3565 -CVE-2019-8936 - http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html -CVE-2019-8937 - http://packetstormsecurity.com/files/151779/HotelDruid-2.3-Cross-Site-Scripting.html -CVE-2019-8937 - https://www.exploit-db.com/exploits/46429/ -CVE-2019-8938 - http://packetstormsecurity.com/files/151800/VertrigoServ-2.17-Cross-Site-Scripting.html -CVE-2019-8938 - http://seclists.org/fulldisclosure/2019/Feb/47 -CVE-2019-8942 - http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html -CVE-2019-8942 - https://wpvulndb.com/vulnerabilities/9222 -CVE-2019-8942 - https://www.exploit-db.com/exploits/46511/ -CVE-2019-8942 - https://www.exploit-db.com/exploits/46662/ -CVE-2019-8943 - http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html -CVE-2019-8943 - http://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html -CVE-2019-8943 - https://www.exploit-db.com/exploits/46511/ -CVE-2019-8943 - https://www.exploit-db.com/exploits/46662/ -CVE-2019-8953 - https://www.exploit-db.com/exploits/46538/ -CVE-2019-8978 - http://packetstormsecurity.com/files/152856/Ellucian-Banner-Web-Tailor-Banner-Enterprise-Identity-Services-Improper-Authentication.html -CVE-2019-8981 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 -CVE-2019-8981 - https://www.telekom.com/resource/blob/566546/276aaa2eab781729f2544d62edecf002/dl-190322-remote-buffer-overflow-in-a-axtls-data.pdf -CVE-2019-8982 - https://www.exploit-db.com/exploits/45158 -CVE-2019-8997 - http://support.blackberry.com/kb/articleDetail?articleNumber=000047227 -CVE-2019-9002 - https://github.com/mikelbring/tinyissue/issues/237 -CVE-2019-9003 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5 -CVE-2019-9005 - https://www.detack.de/en/cve-2019-9005 -CVE-2019-9017 - http://packetstormsecurity.com/files/152721/SolarWinds-DameWare-Mini-Remote-Control-10.0-Denial-Of-Service.html -CVE-2019-9017 - http://www.binaryworld.it/guidepoc.asp -CVE-2019-9017 - https://www.exploit-db.com/exploits/46793/ -CVE-2019-9019 - https://www.linkedin.com/pulse/buffer-overflow-exploitation-british-airways-system-marco-gisbert/ -CVE-2019-9020 - https://hackerone.com/reports/477896 -CVE-2019-9020 - https://usn.ubuntu.com/3902-1/ -CVE-2019-9021 - https://bugs.php.net/bug.php?id=77247 -CVE-2019-9021 - https://hackerone.com/reports/475499 -CVE-2019-9021 - https://usn.ubuntu.com/3902-1/ -CVE-2019-9022 - https://usn.ubuntu.com/3902-1/ -CVE-2019-9023 - https://hackerone.com/reports/476168 -CVE-2019-9023 - https://usn.ubuntu.com/3902-1/ -CVE-2019-9024 - https://hackerone.com/reports/477897 -CVE-2019-9024 - https://usn.ubuntu.com/3902-1/ -CVE-2019-9025 - https://hackerone.com/reports/476178 -CVE-2019-9041 - https://www.exploit-db.com/exploits/46454/ -CVE-2019-9048 - https://github.com/pluck-cms/pluck/issues/69 -CVE-2019-9049 - https://github.com/pluck-cms/pluck/issues/69 -CVE-2019-9050 - https://github.com/pluck-cms/pluck/issues/70 -CVE-2019-9051 - https://github.com/pluck-cms/pluck/issues/69 -CVE-2019-9052 - https://github.com/pluck-cms/pluck/issues/69 -CVE-2019-9053 - http://packetstormsecurity.com/files/152356/CMS-Made-Simple-SQL-Injection.html -CVE-2019-9053 - https://www.exploit-db.com/exploits/46635/ -CVE-2019-9055 - http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html -CVE-2019-9062 - https://hackingvila.wordpress.com/2019/02/19/php-scripts-mall-online-food-ordering-script-has-cross-site-request-forgery-csrf-php-script-mall/ -CVE-2019-9081 - https://github.com/Laworigin/Laworigin.github.io/blob/master/2019/02/21/laravelv5-7%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96rce/index.html -CVE-2019-9081 - https://laworigin.github.io/2019/02/21/laravelv5-7%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96rce/ -CVE-2019-9082 - http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html -CVE-2019-9082 - https://github.com/xiayulei/open_source_bms/issues/33 -CVE-2019-9082 - https://www.exploit-db.com/exploits/46488/ -CVE-2019-9083 - http://seclists.org/fulldisclosure/2019/Feb/51 -CVE-2019-9084 - https://metamorfosec.com/Files/Advisories/METS-2019-005-A_division_by_zero_in_Hoteldruid_before_v2.3.1.txt -CVE-2019-9085 - https://metamorfosec.com/Files/Advisories/METS-2019-006-An_Invalid_Arguments_in_Hoteldruid_before_v2.3.1.txt -CVE-2019-9086 - https://metamorfosec.com/Files/Advisories/METS-2019-007-A_SQL_Injection_in_HotelDruid_before_v2.3.1.txt -CVE-2019-9087 - https://metamorfosec.com/Files/Advisories/METS-2019-008-A_SQL_Injection_in_HotelDruid_before_v2.3.1.txt -CVE-2019-9095 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9096 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9097 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9098 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9099 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9101 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9102 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9103 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9104 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities -CVE-2019-9105 - https://members.backbox.org/saet-tebe-small-supervisor-multiple-vulnerabilities/ -CVE-2019-9106 - https://members.backbox.org/saet-tebe-small-supervisor-multiple-vulnerabilities/ -CVE-2019-9107 - https://gist.github.com/redeye5/ccbbc43330cc9821062249b78c916317 -CVE-2019-9107 - https://github.com/wuzhicms/wuzhicms/issues/169 -CVE-2019-9108 - https://gist.github.com/redeye5/ebfef23f0a063b82779151f9cde8e480 -CVE-2019-9108 - https://github.com/wuzhicms/wuzhicms/issues/171 -CVE-2019-9109 - https://gist.github.com/redeye5/57ccafea7263efec67c82b0503c72480 -CVE-2019-9109 - https://github.com/wuzhicms/wuzhicms/issues/172 -CVE-2019-9110 - https://gist.github.com/redeye5/470708bd27ed115b29d0434255b9f7a0 -CVE-2019-9110 - https://github.com/wuzhicms/wuzhicms/issues/170 -CVE-2019-9113 - https://github.com/libming/libming/issues/171 -CVE-2019-9114 - https://github.com/libming/libming/issues/170 -CVE-2019-9124 - https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/blankpassword.md -CVE-2019-9143 - https://github.com/Exiv2/exiv2/issues/711 -CVE-2019-9143 - https://research.loginsoft.com/bugs/uncontrolled-recursion-loop-in-exiv2imageprinttiffstructure-exiv2-0-27/ -CVE-2019-9144 - https://github.com/Exiv2/exiv2/issues/712 -CVE-2019-9144 - https://research.loginsoft.com/bugs/uncontrolled-recursion-loop-in-exiv2anonymous-namespacebigtiffimageprintifd-exiv2-0-27/ -CVE-2019-9151 - https://github.com/magicSwordsMan/PAAFS/tree/master/vul7 -CVE-2019-9153 - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html -CVE-2019-9153 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ -CVE-2019-9154 - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html -CVE-2019-9154 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ -CVE-2019-9155 - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html -CVE-2019-9155 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ -CVE-2019-9156 - http://seclists.org/fulldisclosure/2019/May/6 -CVE-2019-9157 - http://seclists.org/fulldisclosure/2019/May/6 -CVE-2019-9158 - http://seclists.org/fulldisclosure/2019/May/6 -CVE-2019-9162 - https://www.exploit-db.com/exploits/46477/ -CVE-2019-9164 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9165 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9166 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9167 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9169 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2019-9172 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54795 -CVE-2019-9176 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55664 -CVE-2019-9184 - https://www.exploit-db.com/exploits/46467/ -CVE-2019-9189 - http://packetstormsecurity.com/files/155273/Prima-Access-Control-2.3.35-Script-Upload-Remote-Code-Execution.html -CVE-2019-9193 - http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html -CVE-2019-9193 - http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html -CVE-2019-9193 - http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html -CVE-2019-9193 - https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 -CVE-2019-9194 - https://www.exploit-db.com/exploits/46481/ -CVE-2019-9194 - https://www.exploit-db.com/exploits/46539/ -CVE-2019-9197 - https://unity3d.com/security#CVE-2019-9197 -CVE-2019-9199 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-setsource-podofo-0-9-6-trunk-r1967/ -CVE-2019-9199 - https://sourceforge.net/p/podofo/tickets/40/ -CVE-2019-9200 - https://gitlab.freedesktop.org/poppler/poppler/issues/728 -CVE-2019-9200 - https://research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/ -CVE-2019-9201 - https://medium.com/@SergiuSechel/misconfiguration-in-ilc-gsm-gprs-devices-leaves-over-1-200-ics-devices-vulnerable-to-attacks-over-82c2d4a91561 -CVE-2019-9202 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9203 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9204 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -CVE-2019-9206 - https://packetstormsecurity.com/files/151925/PRTG-Network-Monitor-7.1.3.3378-Cross-Site-Scripting.html -CVE-2019-9206 - https://seclists.org/fulldisclosure/2019/Mar/3 -CVE-2019-9207 - https://packetstormsecurity.com/files/151925/PRTG-Network-Monitor-7.1.3.3378-Cross-Site-Scripting.html -CVE-2019-9207 - https://seclists.org/fulldisclosure/2019/Mar/3 -CVE-2019-9208 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-9209 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447 -CVE-2019-9210 - https://sourceforge.net/p/advancemame/bugs/277/ -CVE-2019-9211 - https://bugzilla.redhat.com/show_bug.cgi?id=1683499 -CVE-2019-9212 - https://github.com/alipay/sofa-hessian/issues/34 -CVE-2019-9213 - http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html -CVE-2019-9213 - https://www.exploit-db.com/exploits/46502/ -CVE-2019-9220 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55653 -CVE-2019-9226 - https://github.com/baigoStudio/baigoCMS/issues/7 -CVE-2019-9227 - https://github.com/baigoStudio/baigoCMS/issues/8 -CVE-2019-9228 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf -CVE-2019-9229 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf -CVE-2019-9230 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf -CVE-2019-9231 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf -CVE-2019-9445 - https://usn.ubuntu.com/4526-1/ -CVE-2019-9483 - https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts -CVE-2019-9491 - http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-ANTI-THREAT-TOOLKIT-(ATTK)-REMOTE-CODE-EXECUTION.txt -CVE-2019-9491 - http://packetstormsecurity.com/files/156160/TrendMicro-Anti-Threat-Toolkit-Improper-Fix.html -CVE-2019-9491 - http://seclists.org/fulldisclosure/2019/Oct/42 -CVE-2019-9491 - http://seclists.org/fulldisclosure/2020/Jan/50 -CVE-2019-9491 - https://seclists.org/bugtraq/2019/Oct/30 -CVE-2019-9491 - https://seclists.org/bugtraq/2020/Jan/55 -CVE-2019-9493 - https://www.kb.cert.org/vuls/id/174715/ -CVE-2019-9494 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html -CVE-2019-9495 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html -CVE-2019-9496 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html -CVE-2019-9497 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html -CVE-2019-9500 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html -CVE-2019-9500 - https://kb.cert.org/vuls/id/166939/ -CVE-2019-9501 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html -CVE-2019-9501 - https://kb.cert.org/vuls/id/166939/ -CVE-2019-9502 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html -CVE-2019-9502 - https://kb.cert.org/vuls/id/166939/ -CVE-2019-9503 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html -CVE-2019-9503 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f -CVE-2019-9503 - https://kb.cert.org/vuls/id/166939/ -CVE-2019-9506 - https://usn.ubuntu.com/4115-1/ -CVE-2019-9506 - https://usn.ubuntu.com/4118-1/ -CVE-2019-9510 - https://www.kb.cert.org/vuls/id/576688/ -CVE-2019-9511 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9511 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-9511 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-9511 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-9512 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9513 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9513 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2019-9513 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2019-9514 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9515 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9516 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9517 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9517 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-9517 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-9518 - https://kb.cert.org/vuls/id/605641/ -CVE-2019-9535 - https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/ -CVE-2019-9535 - https://kb.cert.org/vuls/id/763073/ -CVE-2019-9537 - https://www.kb.cert.org/vuls/id/873161/ -CVE-2019-9538 - https://www.kb.cert.org/vuls/id/873161/ -CVE-2019-9539 - https://www.kb.cert.org/vuls/id/873161/ -CVE-2019-9540 - https://www.kb.cert.org/vuls/id/873161/ -CVE-2019-9541 - https://www.kb.cert.org/vuls/id/873161/ -CVE-2019-9542 - https://www.kb.cert.org/vuls/id/873161/ -CVE-2019-9543 - https://gitlab.freedesktop.org/poppler/poppler/issues/730 -CVE-2019-9543 - https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/ -CVE-2019-9544 - https://github.com/axiomatic-systems/Bento4/issues/374 -CVE-2019-9544 - https://research.loginsoft.com/bugs/out-of-bounds-write-in-function-ap4_cttstableentryap4_cttstableentry-bento4-1-5-1-0/ -CVE-2019-9545 - https://gitlab.freedesktop.org/poppler/poppler/issues/731 -CVE-2019-9545 - https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/ -CVE-2019-9546 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-005.md -CVE-2019-9553 - https://packetstormsecurity.com/files/151943/Bold-CMS-3.6.4-Cross-Site-Scripting.html -CVE-2019-9553 - https://www.exploit-db.com/exploits/46495 -CVE-2019-9554 - https://packetstormsecurity.com/files/151944/Craft-CMS-3.1.12-Pro-Cross-Site-Scripting.html -CVE-2019-9554 - https://www.exploit-db.com/exploits/46496 -CVE-2019-9555 - https://seclists.org/fulldisclosure/2019/Mar/12 -CVE-2019-9556 - https://packetstormsecurity.com/files/151959/Fiberhome-AN5506-04-F-RP2669-Cross-Site-Scripting.html -CVE-2019-9556 - https://www.exploit-db.com/exploits/46498 -CVE-2019-9557 - https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html -CVE-2019-9558 - https://packetstormsecurity.com/files/151957/Mailtraq-WebMail-2.17.7.3550-Cross-Site-Scripting.html -CVE-2019-9564 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-wyze-cam-iot-device/ -CVE-2019-9567 - https://lists.openwall.net/full-disclosure/2019/02/05/4 -CVE-2019-9567 - https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/ -CVE-2019-9567 - https://wpvulndb.com/vulnerabilities/9215 -CVE-2019-9568 - https://lists.openwall.net/full-disclosure/2019/02/05/4 -CVE-2019-9568 - https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/ -CVE-2019-9568 - https://wpvulndb.com/vulnerabilities/9215 -CVE-2019-9570 - https://github.com/yzmcms/yzmcms/issues/11 -CVE-2019-9575 - https://lists.openwall.net/full-disclosure/2019/02/05/5 -CVE-2019-9575 - https://security-consulting.icu/blog/2019/02/wordpress-quiz-and-survey-master-xss/ -CVE-2019-9576 - https://lists.openwall.net/full-disclosure/2019/02/05/6 -CVE-2019-9576 - https://security-consulting.icu/blog/2019/02/wordpress-blog2social-xss/ -CVE-2019-9579 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2019-9581 - http://packetstormsecurity.com/files/165263/Booked-Scheduler-2.7.5-Shell-Upload.html -CVE-2019-9581 - https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html -CVE-2019-9581 - https://www.exploit-db.com/exploits/46486 -CVE-2019-9582 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9582.md -CVE-2019-9583 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md -CVE-2019-9584 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md -CVE-2019-9585 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md -CVE-2019-9587 - https://research.loginsoft.com/bugs/stack-based-buffer-overflow-vulnerability-in-function-md5round1-xpdf-4-01/ -CVE-2019-9588 - https://research.loginsoft.com/bugs/invalid-memory-access-in-gatomiccounter-gatomicincrement-xpdf-4-01/ -CVE-2019-9589 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/ -CVE-2019-9591 - http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html -CVE-2019-9591 - https://www.exploit-db.com/exploits/46666/ -CVE-2019-9592 - http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html -CVE-2019-9592 - https://www.exploit-db.com/exploits/46666/ -CVE-2019-9593 - http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html -CVE-2019-9593 - https://www.exploit-db.com/exploits/46666/ -CVE-2019-9596 - http://packetstormsecurity.com/files/152986/Darktrace-Enterpise-Immune-System-3.0.9-3.0.10-Cross-Site-Request-Forgery.html -CVE-2019-9596 - https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html -CVE-2019-9596 - https://seclists.org/bugtraq/2019/May/54 -CVE-2019-9597 - http://packetstormsecurity.com/files/152986/Darktrace-Enterpise-Immune-System-3.0.9-3.0.10-Cross-Site-Request-Forgery.html -CVE-2019-9597 - https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html -CVE-2019-9597 - https://seclists.org/bugtraq/2019/May/54 -CVE-2019-9598 - https://github.com/chshcms/cscms/issues/4 -CVE-2019-9599 - https://www.exploit-db.com/exploits/46337 -CVE-2019-9599 - https://www.youtube.com/watch?v=0QDM224_6DM -CVE-2019-9600 - https://www.exploit-db.com/exploits/46464 -CVE-2019-9600 - https://www.youtube.com/watch?v=C8Nz3YmVc_g -CVE-2019-9601 - https://www.exploit-db.com/exploits/46380 -CVE-2019-9603 - https://github.com/bg5sbk/MiniCMS/issues/29 -CVE-2019-9604 - https://hackingvila.wordpress.com/2019/03/06/php-scripts-mall-online-lottery-php-readymade-script-1-7-0-has-cross-site-request-forgery-csrf-for-edit-profile-actionscve-2019-9604/ -CVE-2019-9617 - https://www.seebug.org/vuldb/ssvid-97831 -CVE-2019-9618 - http://seclists.org/fulldisclosure/2019/Mar/26 -CVE-2019-9618 - https://wpvulndb.com/vulnerabilities/9234 -CVE-2019-9621 - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html -CVE-2019-9621 - http://packetstormsecurity.com/files/153190/Zimbra-XML-Injection-Server-Side-Request-Forgery.html -CVE-2019-9621 - https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html -CVE-2019-9621 - https://www.exploit-db.com/exploits/46693/ -CVE-2019-9622 - https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html -CVE-2019-9622 - https://www.exploit-db.com/exploits/46109 -CVE-2019-9623 - https://pentest.com.tr/exploits/Feng-Office-3-7-0-5-Unauthenticated-Remote-Command-Execution-Metasploit.html -CVE-2019-9623 - https://www.exploit-db.com/exploits/46471 -CVE-2019-9624 - https://pentest.com.tr/exploits/Webmin-1900-Remote-Command-Execution.html -CVE-2019-9624 - https://www.exploit-db.com/exploits/46201 -CVE-2019-9625 - https://www.exploit-db.com/exploits/46520/ -CVE-2019-9626 - https://gitee.com/koyshe/phpshe/issues/ISW87 -CVE-2019-9628 - https://wiki.shibboleth.net/confluence/display/SP3/SecurityAdvisories -CVE-2019-9636 - https://usn.ubuntu.com/4127-2/ -CVE-2019-9636 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-9636 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-9638 - https://hackerone.com/reports/516237 -CVE-2019-9640 - https://hackerone.com/reports/510025 -CVE-2019-9641 - https://hackerone.com/reports/510336 -CVE-2019-9646 - https://lists.openwall.net/full-disclosure/2019/02/05/7 -CVE-2019-9646 - https://security-consulting.icu/blog/2019/02/wordpress-contact-form-email-xss-csrf/ -CVE-2019-9647 - http://packetstormsecurity.com/files/152153/Gila-CMS-1.9.1-Cross-Site-Scripting.html -CVE-2019-9648 - http://packetstormsecurity.com/files/154204/CoreFTP-Server-SIZE-Directory-Traversal.html -CVE-2019-9648 - https://seclists.org/fulldisclosure/2019/Mar/23 -CVE-2019-9648 - https://www.exploit-db.com/exploits/46535 -CVE-2019-9649 - http://packetstormsecurity.com/files/154205/CoreFTP-Server-MDTM-Directory-Traversal.html -CVE-2019-9649 - https://seclists.org/fulldisclosure/2019/Mar/25 -CVE-2019-9649 - https://www.exploit-db.com/exploits/46534 -CVE-2019-9650 - http://packetstormsecurity.com/files/152152/MyBB-Upcoming-Events-1.32-Cross-Site-Scripting.html -CVE-2019-9650 - https://github.com/vintagedaddyo/MyBB_Plugin-Upcoming_Events/pull/1/commits/d0a0e1c6e56f248613e0150344ebea8764bba5fa -CVE-2019-9650 - https://www.exploit-db.com/exploits/46558/ -CVE-2019-9656 - https://github.com/TeamSeri0us/pocs/tree/master/libofx -CVE-2019-9656 - https://github.com/libofx/libofx/issues/22 -CVE-2019-9657 - https://www.vfxcomputing.com/?CVE-2019-9657 -CVE-2019-9659 - https://github.com/RiieCco/write-ups/tree/master/CVE-2019-9659 -CVE-2019-9660 - https://github.com/yzmcms/yzmcms/issues/12 -CVE-2019-9661 - https://github.com/yzmcms/yzmcms/issues/13 -CVE-2019-9668 - https://packetstormsecurity.com/files/152058/robinbhandari-FTP-Remote-Denial-Of-Service.html -CVE-2019-9670 - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html -CVE-2019-9670 - https://www.exploit-db.com/exploits/46693/ -CVE-2019-9675 - https://hackerone.com/reports/504761 -CVE-2019-9687 - https://sourceforge.net/p/podofo/code/1969 -CVE-2019-9688 - https://github.com/forgeekscn/sftnow/issues/6 -CVE-2019-9689 - http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html -CVE-2019-9689 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 -CVE-2019-9692 - http://packetstormsecurity.com/files/152269/CMS-Made-Simple-CMSMS-Showtime2-File-Upload-Remote-Command-Execution.html -CVE-2019-9692 - https://www.exploit-db.com/exploits/46546/ -CVE-2019-9692 - https://www.exploit-db.com/exploits/46627/ -CVE-2019-9701 - http://packetstormsecurity.com/files/153512/Symantec-DLP-15.5-MP1-Cross-Site-Scripting.html -CVE-2019-9725 - https://medium.com/@bertinjoseb/korenix-jetport-web-manager-persistent-xss-6cf7e2a38634 -CVE-2019-9729 - https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation -CVE-2019-9733 - http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html -CVE-2019-9734 - https://github.com/aquaverde/aquarius-core/commit/d1dfa5b8280388a0b6f2f341f0681522dbea03b0 -CVE-2019-9738 - https://github.com/jimmykuu/gopher/issues/88 -CVE-2019-9740 - http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html -CVE-2019-9740 - http://www.openwall.com/lists/oss-security/2021/02/04/2 -CVE-2019-9740 - https://bugs.python.org/issue36276 -CVE-2019-9740 - https://usn.ubuntu.com/4127-2/ -CVE-2019-9740 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2019-9742 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-03-13-gdata-total-security-acl-bypass.md -CVE-2019-9742 - https://nafiez.github.io/security/bypass/2019/03/12/gdata-total-security-acl-bypass.html -CVE-2019-9745 - https://github.com/KPN-CISO/CVE-2019-9745/blob/master/README.md -CVE-2019-9757 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9757 -CVE-2019-9757 - https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce -CVE-2019-9758 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9758 -CVE-2019-9758 - https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce -CVE-2019-9760 - https://github.com/w4fz5uck5/FTPGetter/blob/master/xpl.py -CVE-2019-9760 - https://www.exploit-db.com/exploits/46543/ -CVE-2019-9761 - https://gitee.com/koyshe/phpshe/issues/ITC0C -CVE-2019-9762 - https://gitee.com/koyshe/phpshe/issues/ITC0C -CVE-2019-9766 - https://www.exploit-db.com/exploits/45403 -CVE-2019-9767 - http://packetstormsecurity.com/files/160157/Free-MP3-CD-Ripper-2.8-Buffer-Overflow.html -CVE-2019-9767 - https://packetstormsecurity.com/files/149371/Free-MP3-CD-Ripper-2.6-Local-Buffer-Overflow.html -CVE-2019-9767 - https://www.exploit-db.com/exploits/45412 -CVE-2019-9768 - http://packetstormsecurity.com/files/152182/Canarytokens-2019-03-01-Detection-Bypass.html -CVE-2019-9768 - https://www.exploit-db.com/exploits/46589/ -CVE-2019-9769 - https://www.exploit-db.com/exploits/46531 -CVE-2019-9785 - https://github.com/CCCCCrash/POCs/tree/master/Web/gitnote -CVE-2019-9787 - https://wpvulndb.com/vulnerabilities/9230 -CVE-2019-9790 - https://bugzilla.mozilla.org/show_bug.cgi?id=1525145 -CVE-2019-9791 - https://bugzilla.mozilla.org/show_bug.cgi?id=1530958 -CVE-2019-9792 - http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html -CVE-2019-9792 - https://bugzilla.mozilla.org/show_bug.cgi?id=1532599 -CVE-2019-9797 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528909 -CVE-2019-9801 - https://bugzilla.mozilla.org/show_bug.cgi?id=1527717 -CVE-2019-9807 - https://bugzilla.mozilla.org/show_bug.cgi?id=1362050 -CVE-2019-9808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1434634 -CVE-2019-9809 - https://bugzilla.mozilla.org/show_bug.cgi?id=1282430 -CVE-2019-9810 - http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html -CVE-2019-9811 - https://bugzilla.mozilla.org/show_bug.cgi?id=1563327 -CVE-2019-9812 - https://bugzilla.mozilla.org/show_bug.cgi?id=1538015 -CVE-2019-9813 - https://bugzilla.mozilla.org/show_bug.cgi?id=1538006 -CVE-2019-9815 - https://mdsattacks.com/ -CVE-2019-9826 - http://www.openwall.com/lists/oss-security/2019/04/29/3 -CVE-2019-9831 - https://www.exploit-db.com/exploits/46381 -CVE-2019-9831 - https://www.youtube.com/watch?v=FJmZ_FfcdoU -CVE-2019-9832 - https://www.exploit-db.com/exploits/46445 -CVE-2019-9833 - https://www.exploit-db.com/exploits/46443 -CVE-2019-9834 - https://www.exploit-db.com/exploits/46545 -CVE-2019-9834 - https://www.youtube.com/watch?v=zSG93yX0B8k -CVE-2019-9835 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-033.txt -CVE-2019-9836 - http://packetstormsecurity.com/files/153436/AMD-Secure-Encrypted-Virtualization-SEV-Key-Recovery.html -CVE-2019-9836 - https://seclists.org/fulldisclosure/2019/Jun/46 -CVE-2019-9838 - http://packetstormsecurity.com/files/153104/VFront-0.99.5-Persistent-Cross-Site-Scripting.html -CVE-2019-9838 - https://www.netsparker.com/web-applications-advisories/ -CVE-2019-9839 - http://packetstormsecurity.com/files/153103/VFront-0.99.5-Reflective-Cross-Site-Scripting.html -CVE-2019-9839 - https://www.netsparker.com/web-applications-advisories/ -CVE-2019-9841 - https://cardaci.xyz/advisories/2019/04/15/vesta-control-panel-0.9.8-23-reflected-xss-in-file-manager-api/ -CVE-2019-9842 - https://rastating.github.io/miniblog-remote-code-execution/ -CVE-2019-9845 - https://rastating.github.io/miniblog-remote-code-execution/ -CVE-2019-9851 - http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html -CVE-2019-9853 - http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html -CVE-2019-9858 - http://packetstormsecurity.com/files/152476/Horde-Form-Shell-Upload.html -CVE-2019-9858 - https://seclists.org/bugtraq/2019/Jun/31 -CVE-2019-9858 - https://ssd-disclosure.com/?p=3814&preview=true -CVE-2019-9860 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-036.txt -CVE-2019-9861 - http://packetstormsecurity.com/files/152714/ABUS-Secvest-3.01.01-Cryptographic-Issues.html -CVE-2019-9861 - http://seclists.org/fulldisclosure/2019/May/3 -CVE-2019-9861 - https://seclists.org/bugtraq/2019/May/1 -CVE-2019-9861 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-005.txt -CVE-2019-9862 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-035.txt -CVE-2019-9863 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-034.txt -CVE-2019-9866 - https://gitlab.com/gitlab-org/gitlab-ce/issues/59003 -CVE-2019-9877 - https://research.loginsoft.com/bugs/invalid-memory-access-in-textpagefindgaps-xpdf-4-01/ -CVE-2019-9878 - https://github.com/kermitt2/pdfalto/issues/46 -CVE-2019-9878 - https://research.loginsoft.com/bugs/invalid-memory-access-in-gfxindexedcolorspacemapcolortobase-pdfalto-0-2/ -CVE-2019-9879 - http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html -CVE-2019-9879 - https://wpvulndb.com/vulnerabilities/9282 -CVE-2019-9879 - https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ -CVE-2019-9880 - http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html -CVE-2019-9880 - https://wpvulndb.com/vulnerabilities/9282 -CVE-2019-9880 - https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ -CVE-2019-9881 - http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html -CVE-2019-9881 - https://wpvulndb.com/vulnerabilities/9282 -CVE-2019-9881 - https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ -CVE-2019-9885 - https://zeroday.hitcon.org/vulnerability/ZD-2019-00333 -CVE-2019-9891 - https://www.redteam-pentesting.de/advisories/rt-sa-2019-007 -CVE-2019-9900 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h -CVE-2019-9900 - https://hackerone.com/reports/536954 -CVE-2019-9901 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w -CVE-2019-9903 - https://gitlab.freedesktop.org/poppler/poppler/issues/741 -CVE-2019-9903 - https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/ -CVE-2019-9904 - https://gitlab.com/graphviz/graphviz/issues/1512 -CVE-2019-9904 - https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/ -CVE-2019-9908 - https://lists.openwall.net/full-disclosure/2019/02/05/8 -CVE-2019-9908 - https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/ -CVE-2019-9908 - https://wpvulndb.com/vulnerabilities/9239 -CVE-2019-9909 - https://lists.openwall.net/full-disclosure/2019/02/05/9 -CVE-2019-9909 - https://security-consulting.icu/blog/2019/02/wordpress-give-xss/ -CVE-2019-9909 - https://wpvulndb.com/vulnerabilities/9240 -CVE-2019-9910 - https://lists.openwall.net/full-disclosure/2019/02/05/11 -CVE-2019-9910 - https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/ -CVE-2019-9911 - https://lists.openwall.net/full-disclosure/2019/02/05/12 -CVE-2019-9911 - https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/ -CVE-2019-9912 - https://lists.openwall.net/full-disclosure/2019/02/05/13 -CVE-2019-9912 - https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/ -CVE-2019-9913 - https://lists.openwall.net/full-disclosure/2019/02/05/14 -CVE-2019-9913 - https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/ -CVE-2019-9914 - https://lists.openwall.net/full-disclosure/2019/02/05/15 -CVE-2019-9914 - https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/ -CVE-2019-9917 - https://seclists.org/bugtraq/2019/Jun/23 -CVE-2019-9919 - https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9919.md -CVE-2019-9926 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9926 -CVE-2019-9926 - https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce/ -CVE-2019-9936 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-9936 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-9937 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2019-9937 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -CVE-2019-9938 - https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ -CVE-2019-9939 - https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ -CVE-2019-9947 - http://www.openwall.com/lists/oss-security/2021/02/04/2 -CVE-2019-9947 - https://bugs.python.org/issue35906 -CVE-2019-9947 - https://hackerone.com/reports/590020 -CVE-2019-9947 - https://usn.ubuntu.com/4127-2/ -CVE-2019-9948 - http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html -CVE-2019-9948 - https://bugs.python.org/issue35907 -CVE-2019-9948 - https://usn.ubuntu.com/4127-2/ -CVE-2019-9949 - https://bnbdr.github.io/posts/wd/ -CVE-2019-9949 - https://github.com/bnbdr/wd-rce/ -CVE-2019-9950 - https://bnbdr.github.io/posts/wd/ -CVE-2019-9950 - https://github.com/bnbdr/wd-rce/ -CVE-2019-9951 - https://bnbdr.github.io/posts/wd/ -CVE-2019-9951 - https://github.com/bnbdr/wd-rce/ -CVE-2019-9955 - http://packetstormsecurity.com/files/152525/Zyxel-ZyWall-Cross-Site-Scripting.html -CVE-2019-9955 - https://www.exploit-db.com/exploits/46706/ -CVE-2019-9956 - https://github.com/ImageMagick/ImageMagick/issues/1523 -CVE-2019-9962 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9963 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9964 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9965 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9966 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9967 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9968 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9969 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html -CVE-2019-9971 - https://www.gosecure.net/blog -CVE-2019-9971 - https://www.gosecure.net/blog/2022/05/31/security-advisory-multiple-vulnerabilities-impact-3cx-phone-system/ -CVE-2019-9972 - https://www.gosecure.net/blog -CVE-2019-9972 - https://www.gosecure.net/blog/2022/05/31/security-advisory-multiple-vulnerabilities-impact-3cx-phone-system/ -CVE-2019-9974 - http://packetstormsecurity.com/files/152232/DASAN-H660RM-Information-Disclosure-Hardcoded-Key.html -CVE-2019-9974 - https://blog.burghardt.pl/2019/03/diag_tool-cgi-on-dasan-h660rm-devices-with-firmware-1-03-0022-allows-spawning-ping-processes-without-any-authorization-leading-to-information-disclosure-and-dos-attacks/ -CVE-2019-9974 - https://seclists.org/bugtraq/2019/Mar/41 -CVE-2019-9975 - http://packetstormsecurity.com/files/152232/DASAN-H660RM-Information-Disclosure-Hardcoded-Key.html -CVE-2019-9975 - https://seclists.org/bugtraq/2019/Mar/41 -CVE-2019-9978 - http://packetstormsecurity.com/files/152722/Wordpress-Social-Warfare-Remote-Code-Execution.html -CVE-2019-9978 - http://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html -CVE-2019-9978 - https://blog.sucuri.net/2019/03/zero-day-stored-xss-in-social-warfare.html -CVE-2019-9978 - https://wpvulndb.com/vulnerabilities/9238 -CVE-2019-9978 - https://www.cybersecurity-help.cz/vdb/SB2019032105 -CVE-2019-9978 - https://www.exploit-db.com/exploits/46794/ -CVE-2020-0009 - http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html -CVE-2020-0022 - http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html -CVE-2020-0022 - http://seclists.org/fulldisclosure/2020/Feb/10 -CVE-2020-0067 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html -CVE-2020-0258 - http://packetstormsecurity.com/files/158869/Android-App-Zygotes-Improper-Guarding.html -CVE-2020-0404 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-0427 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html -CVE-2020-0510 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-0512 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-0513 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-0515 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-0516 - http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html -CVE-2020-0531 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0532 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0533 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0534 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0535 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0536 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0537 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0538 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0539 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0540 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0541 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0542 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0543 - https://usn.ubuntu.com/4385-1/ -CVE-2020-0545 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0548 - https://usn.ubuntu.com/4385-1/ -CVE-2020-0548 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html -CVE-2020-0549 - https://usn.ubuntu.com/4385-1/ -CVE-2020-0549 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html -CVE-2020-0566 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0586 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0594 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0594 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-0595 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0595 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-0596 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0597 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-0597 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-0601 - http://packetstormsecurity.com/files/155960/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html -CVE-2020-0601 - http://packetstormsecurity.com/files/155961/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html -CVE-2020-0618 - http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html -CVE-2020-0618 - http://packetstormsecurity.com/files/159216/Microsoft-SQL-Server-Reporting-Services-2016-Remote-Code-Execution.html -CVE-2020-0642 - http://packetstormsecurity.com/files/158729/Microsoft-Windows-Win32k-Privilege-Escalation.html -CVE-2020-0646 - http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html -CVE-2020-0668 - http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html -CVE-2020-0668 - http://packetstormsecurity.com/files/157615/Service-Tracing-Privilege-Escalation.html -CVE-2020-0674 - http://packetstormsecurity.com/files/159137/Microsoft-Internet-Explorer-11-Use-After-Free.html -CVE-2020-0674 - http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html -CVE-2020-0674 - http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html -CVE-2020-0683 - http://packetstormsecurity.com/files/156373/Microsoft-Windows-10-MSI-Privilege-Escalation.html -CVE-2020-0683 - https://github.com/nu11secur1ty/Windows10Exploits/blob/master/Undefined/CVE-2020-0683/README.md -CVE-2020-0688 - http://packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html -CVE-2020-0688 - http://packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html -CVE-2020-0728 - http://packetstormsecurity.com/files/156394/Microsoft-Windows-Modules-Installer-Service-Information-Disclosure.html -CVE-2020-0728 - http://seclists.org/fulldisclosure/2020/Feb/16 -CVE-2020-0728 - https://seclists.org/bugtraq/2020/Feb/21 -CVE-2020-0787 - http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html -CVE-2020-0796 - http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html -CVE-2020-0796 - http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html -CVE-2020-0796 - http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html -CVE-2020-0796 - http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html -CVE-2020-0796 - http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html -CVE-2020-0796 - http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html -CVE-2020-0938 - http://packetstormsecurity.com/files/161299/Apple-CoreText-libFontParser.dylib-Stack-Corruption.html -CVE-2020-0981 - http://packetstormsecurity.com/files/157248/Microsoft-Windows-NtFilterToken-ParentTokenId-Incorrect-Setting-Privilege-Escalation.html -CVE-2020-0986 - http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html -CVE-2020-10005 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246 -CVE-2020-10019 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25 -CVE-2020-10021 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26 -CVE-2020-10022 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28 -CVE-2020-10023 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29 -CVE-2020-10024 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30 -CVE-2020-10027 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35 -CVE-2020-10028 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32 -CVE-2020-10029 - https://sourceware.org/bugzilla/show_bug.cgi?id=25487 -CVE-2020-10057 - https://github.com/J3rryBl4nks/GenixCMS/blob/master/CreateAdminBAC.md -CVE-2020-10058 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34 -CVE-2020-10059 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36 -CVE-2020-10060 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37 -CVE-2020-10061 - https://github.com/zephyrproject-rtos/zephyr/pull/23091 -CVE-2020-10061 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75 -CVE-2020-10062 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment -CVE-2020-10062 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84 -CVE-2020-10063 - https://github.com/zephyrproject-rtos/zephyr/pull/24535 -CVE-2020-10063 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55 -CVE-2020-10067 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27 -CVE-2020-10068 - https://github.com/zephyrproject-rtos/zephyr/pull/23091 -CVE-2020-10068 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78 -CVE-2020-10070 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment -CVE-2020-10070 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85 -CVE-2020-10071 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment -CVE-2020-10071 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86 -CVE-2020-10108 - https://know.bishopfox.com/advisories -CVE-2020-10108 - https://know.bishopfox.com/advisories/twisted-version-19.10.0 -CVE-2020-10108 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10109 - https://know.bishopfox.com/advisories -CVE-2020-10109 - https://know.bishopfox.com/advisories/twisted-version-19.10.0 -CVE-2020-10110 - http://packetstormsecurity.com/files/156656/Citrix-Gateway-11.1-12.0-12.1-Information-Disclosure.html -CVE-2020-10110 - https://seclists.org/fulldisclosure/2020/Mar/7 -CVE-2020-10111 - http://packetstormsecurity.com/files/156661/Citrix-Gateway-11.1-12.0-12.1-Cache-Bypass.html -CVE-2020-10111 - http://seclists.org/fulldisclosure/2020/Mar/11 -CVE-2020-10112 - http://packetstormsecurity.com/files/156660/Citrix-Gateway-11.1-12.0-12.1-Cache-Poisoning.html -CVE-2020-10112 - http://seclists.org/fulldisclosure/2020/Mar/8 -CVE-2020-10135 - http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html -CVE-2020-10135 - http://seclists.org/fulldisclosure/2020/Jun/5 -CVE-2020-10136 - https://kb.cert.org/vuls/id/636397/ -CVE-2020-10136 - https://www.digi.com/resources/security -CVE-2020-10136 - https://www.kb.cert.org/vuls/id/636397 -CVE-2020-10137 - https://github.com/CNK2100/VFuzz-public -CVE-2020-10146 - https://github.com/oskarsve/ms-teams-rce -CVE-2020-10173 - https://www.exploit-db.com/exploits/48142 -CVE-2020-10174 - http://www.openwall.com/lists/oss-security/2020/03/06/3 -CVE-2020-10174 - https://bugzilla.suse.com/show_bug.cgi?id=1165802 -CVE-2020-10180 - https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html -CVE-2020-10181 - http://packetstormsecurity.com/files/156746/Enhanced-Multimedia-Router-3.0.4.27-Cross-Site-Request-Forgery.html -CVE-2020-10181 - https://www.youtube.com/watch?v=Ufcj4D9eA5o -CVE-2020-10188 - https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html -CVE-2020-10188 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telnetd-EFJrEzPx -CVE-2020-10188 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-10189 - http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html -CVE-2020-10189 - https://srcincite.io/advisories/src-2020-0011/ -CVE-2020-10189 - https://srcincite.io/pocs/src-2020-0011.py.txt -CVE-2020-10189 - https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/ -CVE-2020-10190 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-10191 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-10192 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-10193 - https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html -CVE-2020-10195 - https://wpvulndb.com/vulnerabilities/10127 -CVE-2020-10196 - https://wpvulndb.com/vulnerabilities/10127 -CVE-2020-10199 - http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html -CVE-2020-10199 - http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html -CVE-2020-10199 - https://support.sonatype.com/hc/en-us/articles/360044882533 -CVE-2020-10203 - https://support.sonatype.com/hc/en-us/articles/360044361594 -CVE-2020-10204 - https://support.sonatype.com/hc/en-us/articles/360044356194 -CVE-2020-1021 - http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html -CVE-2020-10218 - https://www.exploit-db.com/exploits/48179 -CVE-2020-10220 - http://packetstormsecurity.com/files/156688/rConfig-3.9-SQL-Injection.html -CVE-2020-10220 - http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html -CVE-2020-10220 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html -CVE-2020-10220 - https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2020-10220.py -CVE-2020-10220 - https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_sqli.py -CVE-2020-10221 - http://packetstormsecurity.com/files/156687/rConfig-3.93-Authenticated-Remote-Code-Execution.html -CVE-2020-10222 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md -CVE-2020-10222 - https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html -CVE-2020-10223 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md -CVE-2020-10223 - https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html -CVE-2020-10224 - https://www.exploit-db.com/exploits/47887 -CVE-2020-10225 - https://www.exploit-db.com/exploits/47881 -CVE-2020-10227 - https://www.exploit-db.com/exploits/48804 -CVE-2020-10228 - https://www.exploit-db.com/exploits/48804 -CVE-2020-10229 - https://www.exploit-db.com/exploits/48804 -CVE-2020-10230 - https://www.exploit-db.com/exploits/48212 -CVE-2020-10231 - http://packetstormsecurity.com/files/157048/TP-LINK-Cloud-Cameras-NCXXX-Remote-NULL-Pointer-Dereference.html -CVE-2020-10231 - http://seclists.org/fulldisclosure/2020/Apr/5 -CVE-2020-10231 - http://seclists.org/fulldisclosure/2020/Mar/54 -CVE-2020-10233 - https://github.com/sleuthkit/sleuthkit/issues/1829 -CVE-2020-10234 - https://github.com/FULLSHADE/Kernel-exploits -CVE-2020-10234 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys -CVE-2020-10235 - https://bugzilla.suse.com/show_bug.cgi?id=1165721 -CVE-2020-10245 - https://www.tenable.com/security/research/tra-2020-16 -CVE-2020-10248 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html -CVE-2020-10249 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html -CVE-2020-10250 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html -CVE-2020-10251 - https://github.com/ImageMagick/ImageMagick/issues/1859 -CVE-2020-10255 - https://thehackernews.com/2020/03/rowhammer-vulnerability-ddr4-dram.html -CVE-2020-10256 - https://support.1password.com/kb/202010/ -CVE-2020-10257 - https://www.wordfence.com/blog/2020/03/zero-day-vulnerability-in-themerex-addons-now-patched/ -CVE-2020-10262 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10262.md -CVE-2020-10262 - https://www.youtube.com/watch?v=Cr5DupGxmL4 -CVE-2020-10263 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10263.md -CVE-2020-10263 - https://www.youtube.com/watch?v=Cr5DupGxmL4 -CVE-2020-1027 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html -CVE-2020-10283 - https://github.com/aliasrobotics/RVD/issues/3316 -CVE-2020-10289 - https://github.com/ros/actionlib/pull/171 -CVE-2020-10290 - https://github.com/aliasrobotics/RVD/issues/1495 -CVE-2020-1032 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 -CVE-2020-1036 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 -CVE-2020-10364 - https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html -CVE-2020-10364 - https://www.exploit-db.com/exploits/48228 -CVE-2020-10365 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities -CVE-2020-10366 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities -CVE-2020-10375 - https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/ -CVE-2020-10376 - https://medium.com/@felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3 -CVE-2020-10385 - https://packetstormsecurity.com/files/156910/WordPress-WP-Forms-1.5.8.2-Cross-Site-Scripting.html -CVE-2020-10385 - https://wpvulndb.com/vulnerabilities/10114 -CVE-2020-10386 - http://packetstormsecurity.com/files/156757/PHPKB-Multi-Language-9-image-upload.php-Code-Execution.html -CVE-2020-10386 - https://antoniocannito.it/phpkb1#remote-code-execution-cve-2020-10386 -CVE-2020-10386 - https://www.exploit-db.com/exploits/48221 -CVE-2020-10387 - http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-Authenticated-Directory-Traversal.html -CVE-2020-10387 - https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-10387 -CVE-2020-10387 - https://www.exploit-db.com/exploits/48220 -CVE-2020-10388 - https://antoniocannito.it/phpkb1#blind-cross-site-scripting-cve-2020-10388 -CVE-2020-10389 - http://packetstormsecurity.com/files/156751/PHPKB-Multi-Language-9-Authenticated-Remote-Code-Execution.html -CVE-2020-10389 - https://antoniocannito.it/phpkb1#authenticated-remote-code-execution-cve-2020-10389 -CVE-2020-10389 - https://www.exploit-db.com/exploits/48219 -CVE-2020-10390 - https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390 -CVE-2020-10391 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10392 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10393 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10394 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10395 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10396 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10397 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10398 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10399 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-1040 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 -CVE-2020-10400 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10401 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10402 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10403 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10404 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10405 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10406 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10407 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10408 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10409 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-1041 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 -CVE-2020-10410 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10411 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10412 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10413 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10414 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10415 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10416 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10417 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10418 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10419 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-1042 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 -CVE-2020-10420 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10421 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10422 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10423 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10424 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10425 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10426 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10427 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10428 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10429 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-1043 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 -CVE-2020-10430 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10431 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10432 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10433 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10434 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10435 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10436 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10437 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10438 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10439 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10440 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10441 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10442 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10443 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10444 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10445 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10446 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10447 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10448 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10449 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10450 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10451 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10452 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10453 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10454 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10455 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10456 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 -CVE-2020-10457 - https://antoniocannito.it/phpkb1#arbitrary-file-renaming-cve-2020-10457 -CVE-2020-10458 - https://antoniocannito.it/phpkb1#arbitrary-folder-deletion-cve-2020-10458 -CVE-2020-10459 - https://antoniocannito.it/phpkb1#arbitrary-file-listing-cve-2020-10459 -CVE-2020-10460 - https://antoniocannito.it/phpkb1#csv-injection-cve-2020-10460 -CVE-2020-10461 - https://antoniocannito.it/phpkb1#blind-cross-site-scripting-2-cve-2020-10461 -CVE-2020-10462 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-custom-field-cve-2020-10462 -CVE-2020-10463 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-template-cve-2020-10463 -CVE-2020-10464 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-an-article-cve-2020-10464 -CVE-2020-10465 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-category-cve-2020-10465 -CVE-2020-10466 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-cve-2020-10466 -CVE-2020-10467 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-comment-cve-2020-10467 -CVE-2020-10468 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-news-article-cve-2020-10468 -CVE-2020-10469 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-department-cve-2020-10469 -CVE-2020-10470 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-custom-fields-cve-2020-10470 -CVE-2020-10471 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-articles-cve-2020-10471 -CVE-2020-10472 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-templates-cve-2020-10472 -CVE-2020-10473 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-category-cve-2020-10473 -CVE-2020-10474 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-comment-cve-2020-10474 -CVE-2020-10475 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-ticket-cve-2020-10475 -CVE-2020-10476 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-2-cve-2020-10476 -CVE-2020-10477 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-news-article-cve-2020-10477 -CVE-2020-10478 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-changing-settings-cve-2020-10478 -CVE-2020-10479 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-news-article-cve-2020-10479 -CVE-2020-1048 - http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html -CVE-2020-1048 - http://packetstormsecurity.com/files/159217/Microsoft-Spooler-Local-Privilege-Elevation.html -CVE-2020-10480 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-category-cve-2020-10480 -CVE-2020-10481 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-glossary-term-cve-2020-10481 -CVE-2020-10482 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-article-template-cve-2020-10482 -CVE-2020-10483 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-posting-a-comment-cve-2020-10483 -CVE-2020-10484 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-new-custom-field-cve-2020-10484 -CVE-2020-10485 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-an-article-cve-2020-10485 -CVE-2020-10486 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-comment-cve-2020-10486 -CVE-2020-10487 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-glossary-term-cve-2020-10487 -CVE-2020-10488 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-news-article-cve-2020-10488 -CVE-2020-10489 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-ticket-cve-2020-10489 -CVE-2020-10490 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-department-cve-2020-10490 -CVE-2020-10491 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-department-cve-2020-10491 -CVE-2020-10492 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-an-article-template-cve-2020-10492 -CVE-2020-10493 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-glossary-term-cve-2020-10493 -CVE-2020-10494 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-news-article-cve-2020-10494 -CVE-2020-10495 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-an-article-template-cve-2020-10495 -CVE-2020-10496 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-an-article-cve-2020-10496 -CVE-2020-10497 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-category-cve-2020-10497 -CVE-2020-10498 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-category-cve-2020-10498 -CVE-2020-10499 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-closing-a-ticket-cve-2020-10499 -CVE-2020-10500 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-replying-to-a-ticket-cve-2020-10500 -CVE-2020-10501 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-department-cve-2020-10501 -CVE-2020-10502 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-approving-a-new-comment-cve-2020-10502 -CVE-2020-10503 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-disapproving-a-new-comment-cve-2020-10503 -CVE-2020-10504 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-comment-cve-2020-10504 -CVE-2020-10515 - https://herolab.usd.de/security-advisories/ -CVE-2020-10531 - https://unicode-org.atlassian.net/browse/ICU-20958 -CVE-2020-10531 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-10531 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-10531 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10532 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component -CVE-2020-1054 - http://packetstormsecurity.com/files/160515/Microsoft-Windows-DrawIconEx-Local-Privilege-Escalation.html -CVE-2020-10543 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-10543 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10543 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10558 - https://cylect.io/blog/Tesla_Model_3_Vuln/ -CVE-2020-10560 - https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery -CVE-2020-10564 - https://github.com/beerpwn/CVE/tree/master/WP-File-Upload_disclosure_report/ -CVE-2020-10564 - https://wpvulndb.com/vulnerabilities/10132 -CVE-2020-10567 - http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html -CVE-2020-10567 - https://github.com/trippo/ResponsiveFilemanager/issues/600 -CVE-2020-10568 - https://medium.com/@arall/sitepress-multilingual-cms-wplugin-wpml-4-3-7-b-2-9c9486c13577 -CVE-2020-10568 - https://wpvulndb.com/vulnerabilities/10131 -CVE-2020-10569 - http://packetstormsecurity.com/files/157314/Sysaid-20.1.11-b26-Remote-Command-Execution.html -CVE-2020-10570 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-10570 -CVE-2020-10591 - https://github.com/walmartlabs/concord/issues/22 -CVE-2020-10596 - http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html -CVE-2020-10644 - http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html -CVE-2020-10648 - https://github.com/u-boot/u-boot/commits/master -CVE-2020-10650 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2020-10665 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md -CVE-2020-10665 - https://github.com/spaceraccoon/CVE-2020-10665 -CVE-2020-10666 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities -CVE-2020-10667 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html -CVE-2020-10668 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html -CVE-2020-10669 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html -CVE-2020-10670 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html -CVE-2020-10671 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html -CVE-2020-10672 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-10672 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10672 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-10672 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10672 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10673 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-10673 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10673 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-10673 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10673 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10683 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10690 - https://usn.ubuntu.com/4419-1/ -CVE-2020-10693 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-10711 - https://usn.ubuntu.com/4413-1/ -CVE-2020-10711 - https://usn.ubuntu.com/4414-1/ -CVE-2020-10711 - https://usn.ubuntu.com/4419-1/ -CVE-2020-10713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY -CVE-2020-10720 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef -CVE-2020-10722 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10722 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10723 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10723 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10724 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10724 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10725 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10726 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10735 - https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y -CVE-2020-10751 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6 -CVE-2020-10751 - https://usn.ubuntu.com/4413-1/ -CVE-2020-10751 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-10757 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9 -CVE-2020-10757 - https://usn.ubuntu.com/4426-1/ -CVE-2020-10759 - https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md -CVE-2020-10766 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e -CVE-2020-10767 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada -CVE-2020-10768 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf -CVE-2020-10769 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-10770 - http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html -CVE-2020-10773 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f -CVE-2020-10777 - https://bugzilla.redhat.com/show_bug.cgi?id=1847605 -CVE-2020-10781 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680 -CVE-2020-10786 - https://gitlab.com/snippets/1954764 -CVE-2020-10787 - https://gitlab.com/snippets/1954764 -CVE-2020-10793 - https://medium.com/@vbharad/account-takeover-via-modifying-email-id-codeigniter-framework-ca30741ad297 -CVE-2020-10807 - https://github.com/mitre/caldera/issues/1405 -CVE-2020-10808 - http://packetstormsecurity.com/files/157111/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html -CVE-2020-10808 - http://packetstormsecurity.com/files/157219/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html -CVE-2020-10808 - https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/ -CVE-2020-10809 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_1 -CVE-2020-10809 - https://research.loginsoft.com/bugs/heap-overflow-in-decompress-c-hdf5-1-13-0/ -CVE-2020-10810 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_3 -CVE-2020-10810 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5ac-c-hdf5-1-13-0/ -CVE-2020-10811 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_2 -CVE-2020-10811 - https://research.loginsoft.com/bugs/heap-buffer-overflow-in-h5olayout-c-hdf5-1-13-0/ -CVE-2020-10812 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_4 -CVE-2020-10812 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/ -CVE-2020-10818 - https://code610.blogspot.com/2020/03/rce-in-artica-426.html -CVE-2020-10819 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html -CVE-2020-1082 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1082 -CVE-2020-10820 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html -CVE-2020-10821 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html -CVE-2020-10823 - https://slashd.ga/2020/03/draytek-vulnerabilities/ -CVE-2020-10824 - https://slashd.ga/2020/03/draytek-vulnerabilities/ -CVE-2020-10825 - https://slashd.ga/2020/03/draytek-vulnerabilities/ -CVE-2020-10826 - https://slashd.ga/2020/03/draytek-vulnerabilities/ -CVE-2020-10827 - https://slashd.ga/2020/03/draytek-vulnerabilities/ -CVE-2020-10828 - https://slashd.ga/2020/03/draytek-vulnerabilities/ -CVE-2020-10829 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10830 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10831 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10832 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10833 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10834 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10835 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10836 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10837 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10838 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10839 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10840 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10841 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10842 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10843 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10844 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10845 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10846 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10847 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10848 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10849 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10850 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10851 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10852 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10853 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10854 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10855 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-10874 - https://www.youtube.com/watch?v=Lv-STOyQCVY -CVE-2020-10875 - https://www.youtube.com/watch?v=Lv-STOyQCVY -CVE-2020-10878 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-10878 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10878 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10879 - https://www.exploit-db.com/exploits/48241 -CVE-2020-10882 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html -CVE-2020-10883 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html -CVE-2020-10884 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html -CVE-2020-10914 - http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html -CVE-2020-10915 - http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html -CVE-2020-10931 - https://github.com/memcached/memcached/issues/629 -CVE-2020-10935 - https://www.coresecurity.com/advisories/zulip-account-takeover-stored-xss -CVE-2020-10936 - https://sysdream.com/news/lab/ -CVE-2020-10936 - https://sysdream.com/news/lab/2020-05-25-cve-2020-10936-sympa-privileges-escalation-to-root/ -CVE-2020-10939 - https://cert.vde.com/en-us/advisories/vde-2020-012 -CVE-2020-10940 - https://cert.vde.com/en-us/advisories/vde-2020-013 -CVE-2020-10942 - https://usn.ubuntu.com/4342-1/ -CVE-2020-10945 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10945-centreon-session-id-exposure -CVE-2020-10946 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ -CVE-2020-10947 - https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation -CVE-2020-10951 - https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-portal-websites-clickjacking-vulnerability -CVE-2020-10951 - https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-websites-2-2-0 -CVE-2020-10957 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html -CVE-2020-10957 - https://hackerone.com/reports/827729 -CVE-2020-10958 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html -CVE-2020-10958 - https://hackerone.com/reports/827051 -CVE-2020-10963 - http://packetstormsecurity.com/files/160243/Laravel-Administrator-4-File-Upload.html -CVE-2020-10967 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html -CVE-2020-10968 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-10968 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10968 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-10968 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10968 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10969 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-10969 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-10969 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-10969 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-10969 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-10977 - http://packetstormsecurity.com/files/160441/GitLab-File-Read-Remote-Code-Execution.html -CVE-2020-10982 - https://herolab.usd.de/security-advisories/ -CVE-2020-10982 - https://herolab.usd.de/security-advisories/usd-2020-0033/ -CVE-2020-10983 - https://herolab.usd.de/security-advisories/ -CVE-2020-10983 - https://herolab.usd.de/security-advisories/usd-2020-0034/ -CVE-2020-10984 - https://herolab.usd.de/security-advisories/ -CVE-2020-10984 - https://herolab.usd.de/security-advisories/usd-2020-0031/ -CVE-2020-10985 - https://herolab.usd.de/security-advisories/ -CVE-2020-10985 - https://herolab.usd.de/security-advisories/usd-2020-0035/ -CVE-2020-10986 - https://www.ise.io/research/ -CVE-2020-10987 - https://www.ise.io/research/ -CVE-2020-10988 - https://www.ise.io/research/ -CVE-2020-10989 - https://www.ise.io/research/ -CVE-2020-10996 - https://jira.percona.com/browse/PXC-3117 -CVE-2020-10996 - https://www.percona.com/blog/2020/04/20/cve-2020-10996-percona-xtradb-cluster-sst-script-static-key/ -CVE-2020-10997 - https://jira.percona.com/browse/PXB-2142 -CVE-2020-10997 - https://www.percona.com/blog/2020/04/16/cve-2020-10997-percona-xtrabackup-information-disclosure-of-command-line-arguments/ -CVE-2020-11022 - http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html -CVE-2020-11022 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11022 - https://www.tenable.com/security/tns-2020-10 -CVE-2020-11022 - https://www.tenable.com/security/tns-2020-11 -CVE-2020-11022 - https://www.tenable.com/security/tns-2021-02 -CVE-2020-11022 - https://www.tenable.com/security/tns-2021-10 -CVE-2020-11023 - http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html -CVE-2020-11023 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11023 - https://www.tenable.com/security/tns-2021-02 -CVE-2020-11023 - https://www.tenable.com/security/tns-2021-10 -CVE-2020-11026 - https://hackerone.com/reports/179695 -CVE-2020-11027 - http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html -CVE-2020-11042 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11044 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11045 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11046 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11047 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11048 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11049 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11058 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11060 - http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html -CVE-2020-11080 - https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr -CVE-2020-11080 - https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html -CVE-2020-11080 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11080 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-11080 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11080 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11080 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11083 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -CVE-2020-11083 - http://seclists.org/fulldisclosure/2020/Aug/2 -CVE-2020-11090 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123 -CVE-2020-11093 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1124 -CVE-2020-11093 - https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w-39f4-rpv2 -CVE-2020-11095 - https://usn.ubuntu.com/4481-1/ -CVE-2020-11096 - https://usn.ubuntu.com/4481-1/ -CVE-2020-11097 - https://usn.ubuntu.com/4481-1/ -CVE-2020-11098 - https://usn.ubuntu.com/4481-1/ -CVE-2020-11099 - https://usn.ubuntu.com/4481-1/ -CVE-2020-11100 - http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html -CVE-2020-11107 - http://packetstormsecurity.com/files/164292/XAMPP-7.4.3-Privilege-Escalation.html -CVE-2020-11108 - http://packetstormsecurity.com/files/157623/Pi-hole-4.4-Remote-Code-Execution.html -CVE-2020-11108 - http://packetstormsecurity.com/files/157624/Pi-hole-4.4-Remote-Code-Execution-Privilege-Escalation.html -CVE-2020-11108 - http://packetstormsecurity.com/files/157748/Pi-Hole-heisenbergCompensator-Blocklist-OS-Command-Execution.html -CVE-2020-11108 - http://packetstormsecurity.com/files/157839/Pi-hole-4.4.0-Remote-Code-Execution.html -CVE-2020-11108 - https://frichetten.com/blog/cve-2020-11108-pihole-rce/ -CVE-2020-11108 - https://github.com/Frichetten/CVE-2020-11108-PoC -CVE-2020-11110 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md -CVE-2020-11111 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-11111 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11111 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11111 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11111 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11112 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-11112 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11112 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11112 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11112 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11113 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-11113 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11113 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11113 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11113 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11114 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11115 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11116 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11117 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11118 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11119 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11120 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11121 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11122 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11123 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11124 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-11125 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11126 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11127 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11128 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11129 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-11130 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11131 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11132 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11133 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11134 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11135 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-11136 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11137 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11138 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11139 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11140 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11141 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11143 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11144 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11145 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11146 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11147 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11148 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11149 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11150 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11151 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11152 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11153 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11154 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11155 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11156 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11157 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11158 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-11159 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11160 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11161 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11162 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11163 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11164 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11165 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11166 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11167 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11168 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11169 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11170 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11171 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11172 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11173 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11174 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-11175 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11176 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11177 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11178 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11179 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11180 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11181 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11182 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11183 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11184 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11185 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11186 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11187 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11188 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11189 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11190 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11191 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11192 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11193 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11194 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11195 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11196 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11197 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11198 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11199 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11200 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11201 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -CVE-2020-11201 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11202 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -CVE-2020-11202 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11203 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11204 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11205 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11206 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -CVE-2020-11206 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11207 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -CVE-2020-11207 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11208 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -CVE-2020-11208 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11209 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -CVE-2020-11209 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-11210 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11212 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11213 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11214 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11215 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11216 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11217 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11218 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11220 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11221 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11222 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11223 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11225 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-11226 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11227 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11228 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11230 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11231 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11233 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11234 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11235 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11236 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11237 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11238 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11239 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11240 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11241 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11242 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11243 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11245 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11246 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11247 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11250 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11251 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11252 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11253 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11254 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11255 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2020-11256 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11257 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11258 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11259 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11260 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11261 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11262 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11263 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2020-11264 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2020-11265 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11266 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin -CVE-2020-11267 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11268 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11269 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11270 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11271 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11272 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11273 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11274 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11275 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11276 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11277 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11278 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11279 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11280 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11281 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11282 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11283 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11284 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11285 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11286 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11287 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11288 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11289 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11290 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11291 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11292 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11293 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11294 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11295 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2020-11296 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11297 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-11298 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11299 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11301 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2020-11303 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2020-11304 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11305 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11306 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2020-11307 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2020-11308 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11309 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin -CVE-2020-11415 - https://support.sonatype.com/hc/en-us/articles/360045360854 -CVE-2020-11436 - https://know.bishopfox.com/advisories -CVE-2020-11436 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 -CVE-2020-11437 - https://know.bishopfox.com/advisories -CVE-2020-11437 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 -CVE-2020-11438 - https://know.bishopfox.com/advisories -CVE-2020-11438 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 -CVE-2020-11439 - https://know.bishopfox.com/advisories -CVE-2020-11439 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 -CVE-2020-11441 - https://github.com/phpmyadmin/phpmyadmin/issues/16056 -CVE-2020-11444 - https://support.sonatype.com -CVE-2020-11444 - https://support.sonatype.com/hc/en-us/articles/360046133553 -CVE-2020-11449 - https://github.com/RioIsDown/TC7337 -CVE-2020-11450 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html -CVE-2020-11451 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html -CVE-2020-11452 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html -CVE-2020-11453 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html -CVE-2020-11454 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html -CVE-2020-11455 - http://packetstormsecurity.com/files/157112/LimeSurvey-4.1.11-Path-Traversal.html -CVE-2020-11455 - https://www.exploit-db.com/exploits/48297 -CVE-2020-11456 - http://packetstormsecurity.com/files/157114/LimeSurvey-4.1.11-Cross-Site-Scripting.html -CVE-2020-11456 - https://www.exploit-db.com/exploits/48289 -CVE-2020-11457 - http://packetstormsecurity.com/files/157104/pfSense-2.4.4-P3-User-Manager-Cross-Site-Scripting.html -CVE-2020-11457 - https://www.exploit-db.com/exploits/48300 -CVE-2020-11458 - https://matthias.sdfeu.org/misp-poc.py -CVE-2020-11463 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ -CVE-2020-11464 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ -CVE-2020-11465 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ -CVE-2020-11466 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ -CVE-2020-11467 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ -CVE-2020-1147 - http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html -CVE-2020-1147 - http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html -CVE-2020-1147 - http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html -CVE-2020-11474 - https://herolab.usd.de/security-advisories/ -CVE-2020-11474 - https://herolab.usd.de/security-advisories/usd-2020-0038/ -CVE-2020-11476 - https://herolab.usd.de/security-advisories/ -CVE-2020-11476 - https://herolab.usd.de/security-advisories/usd-2020-0041/ -CVE-2020-11490 - http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html -CVE-2020-11490 - https://github.com/c610/tmp/blob/master/zenload4patreons.zip -CVE-2020-11491 - http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html -CVE-2020-11491 - https://github.com/c610/tmp/blob/master/zenload4patreons.zip -CVE-2020-11492 - https://docs.docker.com/docker-for-windows/release-notes/ -CVE-2020-11492 - https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/ -CVE-2020-11494 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html -CVE-2020-11497 - http://packetstormsecurity.com/files/158931/WordPress-NAB-Transact-WooCommerce-2.1.0-Payment-Bypass.html -CVE-2020-11497 - http://seclists.org/fulldisclosure/2020/Aug/13 -CVE-2020-11501 - https://usn.ubuntu.com/4322-1/ -CVE-2020-11503 - https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503 -CVE-2020-11507 - https://forums.malwarebytes.com/topic/258140-release-adwcleaner-804/ -CVE-2020-11511 - http://packetstormsecurity.com/files/163538/WordPress-LearnPress-Privilege-Escalation.html -CVE-2020-11521 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11522 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11523 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11524 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11525 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11526 - https://usn.ubuntu.com/4379-1/ -CVE-2020-11528 - https://github.com/14isnot40/vul_discovery/blob/06d04dbbc6f792a82321c00376d4dbf3add00f4f/poc/bit2spr%20vulnerability%20discovery.md.pdf -CVE-2020-11529 - https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7 -CVE-2020-11530 - http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html -CVE-2020-11530 - http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html -CVE-2020-11531 - http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html -CVE-2020-11531 - http://seclists.org/fulldisclosure/2020/May/27 -CVE-2020-11532 - http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html -CVE-2020-11532 - http://seclists.org/fulldisclosure/2020/May/28 -CVE-2020-11539 - https://github.com/the-girl-who-lived/CVE-2020-11539/ -CVE-2020-11539 - https://medium.com/@sayliambure/hacking-a-5-smartband-824763ab6e8f -CVE-2020-11546 - https://blog.to.com/advisory-superwebmailer-cve-2020-11546/ -CVE-2020-11548 - https://www.exploit-db.com/exploits/48197 -CVE-2020-11549 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security -CVE-2020-11549 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt -CVE-2020-11550 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security -CVE-2020-11550 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt -CVE-2020-11551 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security -CVE-2020-11551 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt -CVE-2020-11552 - http://packetstormsecurity.com/files/158820/ManageEngine-ADSelfService-Plus-6000-Remote-Code-Execution.html -CVE-2020-11552 - http://seclists.org/fulldisclosure/2020/Aug/4 -CVE-2020-11552 - http://seclists.org/fulldisclosure/2020/Aug/6 -CVE-2020-11552 - https://www.exploit-db.com/exploits/48739 -CVE-2020-11552 - https://www.manageengine.com -CVE-2020-11553 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee -CVE-2020-11554 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee -CVE-2020-11555 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee -CVE-2020-11556 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee -CVE-2020-11557 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee -CVE-2020-11558 - https://github.com/gpac/gpac/issues/1440 -CVE-2020-11560 - http://packetstormsecurity.com/files/173117/NCH-Express-Invoice-7.25-Cleartext-Password.html -CVE-2020-11560 - https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11560-title-clear-text.html -CVE-2020-11560 - https://www.youtube.com/watch?v=V0BWq33qVCs&feature=youtu.be -CVE-2020-11561 - https://tejaspingulkar.blogspot.com -CVE-2020-11561 - https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11561-title-escalation-via.html -CVE-2020-11561 - https://youtu.be/-i2KtBgO3Kw -CVE-2020-11576 - https://www.soluble.ai/blog/argo-cves-2020 -CVE-2020-11579 - https://shielder.it/ -CVE-2020-11579 - https://www.shielder.it/blog/mysql-and-cve-2020-11579-exploitation/ -CVE-2020-11583 - https://medium.com/@0x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5 -CVE-2020-11584 - https://medium.com/@0x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5 -CVE-2020-11601 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11602 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11603 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11604 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11605 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11606 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11607 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-11608 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 -CVE-2020-11609 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 -CVE-2020-11610 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe -CVE-2020-11611 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client -CVE-2020-11612 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11612 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11612 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-11612 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11619 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-11619 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11619 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11619 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11620 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-11620 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11620 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11620 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11622 - https://www.arista.com/en/support/advisories-notices -CVE-2020-11651 - http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html -CVE-2020-11651 - http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html -CVE-2020-11652 - http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html -CVE-2020-11652 - http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html -CVE-2020-11655 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11655 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11655 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11655 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11656 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11656 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11656 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-11656 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11658 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11659 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11660 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11661 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11661 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11662 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11662 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11663 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11663 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11664 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11664 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11665 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11665 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11666 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11666 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -CVE-2020-11668 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 -CVE-2020-11669 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 -CVE-2020-11673 - https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459 -CVE-2020-11679 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html -CVE-2020-11680 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html -CVE-2020-11681 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html -CVE-2020-11682 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html -CVE-2020-11698 - http://packetstormsecurity.com/files/159470/SpamTitan-7.07-Remote-Code-Execution.html -CVE-2020-11698 - http://packetstormsecurity.com/files/160809/SpamTitan-7.07-Command-Injection.html -CVE-2020-11698 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-11699 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html -CVE-2020-11699 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-1170 - http://packetstormsecurity.com/files/160919/Cloud-Filter-Arbitrary-File-Creation-Privilege-Escalation.html -CVE-2020-11700 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html -CVE-2020-11700 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-11709 - https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495 -CVE-2020-11709 - https://github.com/yhirose/cpp-httplib/issues/425 -CVE-2020-11711 - https://advisories.stormshield.eu/2020-011/ -CVE-2020-11712 - https://github.com/jenaye/cve/blob/master/readme.MD -CVE-2020-11713 - https://gist.github.com/pietroborrello/7c5be2d1dc15349c4ffc8671f0aad04f -CVE-2020-11714 - https://github.com/leona4040/PSG-6528VM-xss/blob/master/README.md -CVE-2020-11717 - http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html -CVE-2020-11717 - https://seclists.org/fulldisclosure/2020/Dec/36 -CVE-2020-11718 - http://packetstormsecurity.com/files/160627/Programi-Bilanc-Build-007-Release-014-31.01.2020-Insecure-Downloads.html -CVE-2020-11718 - http://seclists.org/fulldisclosure/2020/Dec/39 -CVE-2020-11719 - http://packetstormsecurity.com/files/160625/Programi-Bilanc-Build-007-Release-014-31.01.2020-Static-Key.html -CVE-2020-11719 - http://seclists.org/fulldisclosure/2020/Dec/35 -CVE-2020-11720 - http://packetstormsecurity.com/files/160623/Programi-Bilanc-Build-007-Release-014-31.01.2020-Weak-Default-Password.html -CVE-2020-11720 - http://seclists.org/fulldisclosure/2020/Dec/34 -CVE-2020-11721 - https://github.com/saitoha/libsixel/issues/134 -CVE-2020-11723 - http://packetstormsecurity.com/files/157217/Cellebrite-UFED-7.29-Hardcoded-ADB-Authentication-Keys.html -CVE-2020-11727 - http://packetstormsecurity.com/files/157557/WordPress-WooCommerce-Advanced-Order-Export-3.1.3-Cross-Site-Scripting.html -CVE-2020-11738 - http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html -CVE-2020-11738 - http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html -CVE-2020-11749 - https://medium.com/@tehwinsam/multiple-xss-on-pandorafms-7-0-ng-744-64b244b8523c -CVE-2020-11749 - https://packetstormsecurity.com/files/158389/Pandora-FMS-7.0-NG-746-Script-Insertion-Code-Execution.htmlPoC -CVE-2020-11749 - https://www.exploit-db.com/exploits/48707 -CVE-2020-11753 - https://support.sonatype.com/hc/en-us/articles/360046233714 -CVE-2020-11771 - https://kb.netgear.com/000061759/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0519 -CVE-2020-11773 - https://kb.netgear.com/000061757/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0521 -CVE-2020-11774 - https://kb.netgear.com/000061756/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0522 -CVE-2020-11775 - https://kb.netgear.com/000061755/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0523 -CVE-2020-11776 - https://kb.netgear.com/000061754/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0524 -CVE-2020-11777 - https://kb.netgear.com/000061753/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateway-PSV-2018-0525 -CVE-2020-11780 - https://kb.netgear.com/000061750/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0528 -CVE-2020-11782 - https://kb.netgear.com/000061748/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0530 -CVE-2020-11783 - https://kb.netgear.com/000061747/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0531 -CVE-2020-11786 - https://kb.netgear.com/000061744/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0535 -CVE-2020-11789 - https://kb.netgear.com/000061741/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0051 -CVE-2020-11798 - http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html -CVE-2020-11803 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html -CVE-2020-11803 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-11804 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html -CVE-2020-11804 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-11811 - https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html -CVE-2020-11827 - https://www.gog.com/galaxy -CVE-2020-11853 - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html -CVE-2020-11853 - http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html -CVE-2020-11854 - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html -CVE-2020-11857 - http://packetstormsecurity.com/files/162407/Micro-Focus-Operations-Bridge-Reporter-shrboadmin-Default-Password.html -CVE-2020-11858 - http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html -CVE-2020-11868 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11879 - https://gitlab.gnome.org/GNOME/evolution/issues/784 -CVE-2020-11882 - http://packetstormsecurity.com/files/158302/Android-o2-Business-1.2.0-Open-Redirect.html -CVE-2020-11884 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f -CVE-2020-11884 - https://usn.ubuntu.com/4342-1/ -CVE-2020-11886 - https://issues.opennms.org/browse/NMS-12572 -CVE-2020-11888 - https://github.com/trentm/python-markdown2/issues/348 -CVE-2020-11894 - https://github.com/libming/libming/issues/196 -CVE-2020-11895 - https://github.com/libming/libming/issues/197 -CVE-2020-11896 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11896 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11896 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11896 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11897 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11897 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11897 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11897 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11898 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11898 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11898 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11898 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11899 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11899 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11899 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11899 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11900 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11900 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11900 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11900 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11901 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11901 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11901 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11901 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11902 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11902 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11902 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11902 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11903 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11903 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11903 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11903 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11904 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11904 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11904 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11904 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11905 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11905 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11905 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11905 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11906 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11906 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11906 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11906 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11907 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11907 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11907 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11907 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11908 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11908 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11908 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11908 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11909 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11909 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11909 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11909 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11910 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11910 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11910 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11910 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11911 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11911 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11911 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11911 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11912 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11912 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11912 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11912 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11913 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11913 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11913 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11913 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11914 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC -CVE-2020-11914 - https://www.jsof-tech.com/ripple20/ -CVE-2020-11914 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-11914 - https://www.kb.cert.org/vuls/id/257161/ -CVE-2020-11915 - https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/ -CVE-2020-11920 - https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/ -CVE-2020-11930 - https://wpvulndb.com/vulnerabilities/10181 -CVE-2020-11935 - https://ubuntu.com/security/CVE-2020-11935 -CVE-2020-11937 - https://github.com/sungjungk/whoopsie_killer -CVE-2020-11937 - https://launchpad.net/bugs/1881982 -CVE-2020-11941 - http://packetstormsecurity.com/files/157476/Open-AudIT-3.2.2-Command-Injection-SQL-Injection.html -CVE-2020-11941 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities -CVE-2020-11942 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities -CVE-2020-11943 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities -CVE-2020-11945 - https://github.com/squid-cache/squid/pull/585 -CVE-2020-11951 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ -CVE-2020-11952 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ -CVE-2020-11953 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ -CVE-2020-11955 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ -CVE-2020-11956 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ -CVE-2020-11958 - https://github.com/skvadrik/re2c/commit/c4603ba5ce229db83a2a4fb93e6d4b4e3ec3776a -CVE-2020-11959 - https://privacy.mi.com/trust#/security/vulnerability-management/vulnerability-announcement/detail?id=14 -CVE-2020-11971 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-11971 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11971 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11972 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11972 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11973 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11973 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11973 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11973 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11978 - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html -CVE-2020-11978 - http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html -CVE-2020-11979 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-11979 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11979 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11984 - http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html -CVE-2020-11984 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11984 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11985 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11987 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11987 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11987 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-11987 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-11987 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11988 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11988 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11993 - http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html -CVE-2020-11993 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11993 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11994 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11994 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11994 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-11996 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11996 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-11998 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-11998 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-11998 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-11998 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-12004 - http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html -CVE-2020-12027 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html -CVE-2020-12028 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html -CVE-2020-12029 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html -CVE-2020-12049 - http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html -CVE-2020-12049 - https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 -CVE-2020-12049 - https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak -CVE-2020-12050 - https://bugzilla.redhat.com/show_bug.cgi?id=1825762 -CVE-2020-12050 - https://sysdream.com/news/lab/ -CVE-2020-12050 - https://sysdream.com/news/lab/2020-05-25-cve-2020-12050-fedora-red-hat-centos-local-privilege-escalation-through-a-race-condition-in-the-sqliteodbc-installer-script/ -CVE-2020-12052 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2020-12054 - https://cxsecurity.com/issue/WLB-2020040144 -CVE-2020-12054 - https://wpvulndb.com/vulnerabilities/10184 -CVE-2020-1206 - http://packetstormsecurity.com/files/158053/SMBleed-Uninitialized-Kernel-Memory-Read-Proof-Of-Concept.html -CVE-2020-12061 - https://eprint.iacr.org/2021/640.pdf -CVE-2020-12074 - https://www.wordfence.com/blog/2020/03/vulnerability-patched-in-import-export-wordpress-users/ -CVE-2020-12078 - http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html -CVE-2020-12078 - https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/ -CVE-2020-12080 - https://www.tenable.com/security/research/tra-2020-28 -CVE-2020-12101 - http://packetstormsecurity.com/files/157534/xt-Commerce-5.4.1-6.2.1-6.2.2-Improper-Access-Control.html -CVE-2020-12101 - http://seclists.org/fulldisclosure/2020/May/0 -CVE-2020-12101 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-012.txt -CVE-2020-12102 - https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/ -CVE-2020-12102 - https://github.com/prasathmani/tinyfilemanager/issues/357 -CVE-2020-12103 - https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/ -CVE-2020-12103 - https://github.com/prasathmani/tinyfilemanager/issues/357 -CVE-2020-12104 - https://wpvulndb.com/vulnerabilities/10199 -CVE-2020-12109 - http://packetstormsecurity.com/files/157531/TP-LINK-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html -CVE-2020-12109 - http://packetstormsecurity.com/files/159222/TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html -CVE-2020-12110 - http://packetstormsecurity.com/files/157532/TP-LINK-Cloud-Cameras-NCXXX-Hardcoded-Encryption-Key.html -CVE-2020-12111 - http://packetstormsecurity.com/files/157533/TP-LINK-Cloud-Cameras-NCXXX-SetEncryptKey-Command-Injection.html -CVE-2020-12112 - https://github.com/tchenu/CVE-2020-12112 -CVE-2020-12114 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html -CVE-2020-12114 - http://www.openwall.com/lists/oss-security/2020/05/04/2 -CVE-2020-12114 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-12117 - https://blog.scadafence.com/technical-blog-cve-2020-12117-industrial-iot-insecure-default-configurations -CVE-2020-12120 - https://ia-informatica.com/it/CVE-2020-12120 -CVE-2020-12122 - https://github.com/FULLSHADE/Kernel-exploits -CVE-2020-12122 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/MaxProc64.sys -CVE-2020-12125 - https://cerne.xyz/bugs/CVE-2020-12125 -CVE-2020-12128 - https://www.vulnerability-lab.com/get_content.php?id=2199 -CVE-2020-12129 - https://www.vulnerability-lab.com/get_content.php?id=2203 -CVE-2020-12130 - https://www.vulnerability-lab.com/get_content.php?id=2203 -CVE-2020-12131 - https://www.vulnerability-lab.com/get_content.php?id=2203 -CVE-2020-12132 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php -CVE-2020-12133 - http://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html -CVE-2020-12134 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5562.php -CVE-2020-12138 - https://eclypsium.com/2019/11/12/mother-of-all-drivers/ -CVE-2020-12138 - https://h0mbre.github.io/atillk64_exploit/ -CVE-2020-12243 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-12243 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-12244 - https://hackerone.com/reports/858854 -CVE-2020-12245 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2020-12245 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23 -CVE-2020-12245 - https://github.com/grafana/grafana/pull/23816 -CVE-2020-12246 - https://medium.com/@Pavel.Step/security-analysis-of-the-smart-box-router-932f86dc8a9e -CVE-2020-12246 - https://yadi.sk/i/YdfXr-ofAN2ZWA -CVE-2020-12246 - https://yadi.sk/i/iIUCJVaGEuSaAw -CVE-2020-12246 - https://yadi.sk/i/jXV87yn4ZJfSHA -CVE-2020-12251 - http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html -CVE-2020-12252 - http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html -CVE-2020-12261 - http://packetstormsecurity.com/files/157401/Open-AudIT-3.3.0-Cross-Site-Scripting.html -CVE-2020-12261 - https://www.exploit-db.com/exploits/48516 -CVE-2020-12262 - https://lucxs.medium.com/cve-2020-12262-xss-voip-intelbras-d5697e31fbf6 -CVE-2020-12262 - https://www.youtube.com/watch?v=rihboOgiJRs -CVE-2020-12265 - https://github.com/kevva/decompress/issues/71 -CVE-2020-12265 - https://github.com/kevva/decompress/pull/73 -CVE-2020-12351 - http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html -CVE-2020-12352 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html -CVE-2020-12352 - http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html -CVE-2020-12387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1545345 -CVE-2020-12388 - http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html -CVE-2020-12388 - https://bugzilla.mozilla.org/show_bug.cgi?id=1618911 -CVE-2020-12393 - https://bugzilla.mozilla.org/show_bug.cgi?id=1615471 -CVE-2020-12404 - https://bugzilla.mozilla.org/show_bug.cgi?id=1631739 -CVE-2020-12405 - https://bugzilla.mozilla.org/show_bug.cgi?id=1631618 -CVE-2020-12412 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528587 -CVE-2020-12418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1641303 -CVE-2020-12422 - https://bugzilla.mozilla.org/show_bug.cgi?id=1450353 -CVE-2020-12425 - https://bugzilla.mozilla.org/show_bug.cgi?id=1634738 -CVE-2020-12427 - https://www.westerndigital.com/support/productsecurity/wdc-20004-wd-discovery-cross-site-request-forgery-csrf -CVE-2020-12429 - https://www.exploit-db.com/exploits/48385 -CVE-2020-12431 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-splashtop-streamer -CVE-2020-12432 - https://github.com/d7x/CVE-2020-12432 -CVE-2020-12432 - https://www.youtube.com/watch?v=_tkRnSr6yc0 -CVE-2020-12443 - https://github.com/mclab-hbrs/BBB-POC -CVE-2020-12446 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-003.md -CVE-2020-12460 - https://github.com/trusteddomainproject/OpenDMARC/issues/64 -CVE-2020-12464 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 -CVE-2020-12474 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-12474 -CVE-2020-12480 - https://www.playframework.com/security/vulnerability -CVE-2020-12494 - https://cert.vde.com/en-us/advisories/vde-2020-019 -CVE-2020-12495 - https://cert.vde.com/en-us/advisories/vde-2020-021 -CVE-2020-12496 - https://cert.vde.com/en-us/advisories/vde-2020-022 -CVE-2020-12499 - https://cert.vde.com/en-us/advisories/vde-2020-025 -CVE-2020-12500 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html -CVE-2020-12500 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -CVE-2020-12500 - http://seclists.org/fulldisclosure/2021/Jun/0 -CVE-2020-12500 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ -CVE-2020-12501 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html -CVE-2020-12501 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -CVE-2020-12501 - http://packetstormsecurity.com/files/167409/Korenix-JetPort-5601V3-Backdoor-Account.html -CVE-2020-12501 - http://seclists.org/fulldisclosure/2021/Jun/0 -CVE-2020-12501 - http://seclists.org/fulldisclosure/2022/Jun/3 -CVE-2020-12501 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ -CVE-2020-12502 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html -CVE-2020-12502 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -CVE-2020-12502 - http://seclists.org/fulldisclosure/2021/Jun/0 -CVE-2020-12502 - https://cert.vde.com/en-us/advisories/vde-2020-053 -CVE-2020-12502 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ -CVE-2020-12503 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html -CVE-2020-12503 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -CVE-2020-12503 - http://seclists.org/fulldisclosure/2021/Jun/0 -CVE-2020-12503 - https://cert.vde.com/en-us/advisories/vde-2020-053 -CVE-2020-12503 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ -CVE-2020-12504 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html -CVE-2020-12504 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -CVE-2020-12504 - http://seclists.org/fulldisclosure/2021/Jun/0 -CVE-2020-12504 - https://cert.vde.com/en-us/advisories/vde-2020-053 -CVE-2020-12504 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ -CVE-2020-12505 - https://cert.vde.com/en-us/advisories/vde-2020-027 -CVE-2020-12506 - https://cert.vde.com/en-us/advisories/vde-2020-028 -CVE-2020-12510 - https://cert.vde.com/en-us/advisories/vde-2020-037 -CVE-2020-12511 - https://cert.vde.com/en-us/advisories/vde-2020-038 -CVE-2020-12512 - https://cert.vde.com/en-us/advisories/vde-2020-038 -CVE-2020-12513 - https://cert.vde.com/en-us/advisories/vde-2020-038 -CVE-2020-12514 - https://cert.vde.com/en-us/advisories/vde-2020-038 -CVE-2020-12516 - https://cert.vde.com/en-us/advisories/vde-2020-042 -CVE-2020-12517 - https://cert.vde.com/en-us/advisories/vde-2020-049 -CVE-2020-12518 - https://cert.vde.com/en-us/advisories/vde-2020-049 -CVE-2020-12519 - https://cert.vde.com/en-us/advisories/vde-2020-049 -CVE-2020-12521 - https://cert.vde.com/en-us/advisories/vde-2020-049 -CVE-2020-12522 - https://cert.vde.com/en-us/advisories/vde-2020-045 -CVE-2020-12523 - https://cert.vde.com/en-us/advisories/vde-2020-046 -CVE-2020-12524 - https://cert.vde.com/en-us/advisories/vde-2020-047 -CVE-2020-12525 - https://cert.vde.com/en-us/advisories/vde-2020-038 -CVE-2020-12526 - https://cert.vde.com/en-us/advisories/vde-2020-051 -CVE-2020-12606 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-12606 -CVE-2020-12607 - https://github.com/AntonKueltz/fastecdsa/issues/52 -CVE-2020-12608 - http://packetstormsecurity.com/files/157591/SolarWinds-MSP-PME-Cache-Service-Insecure-File-Permissions-Code-Execution.html -CVE-2020-12608 - http://seclists.org/fulldisclosure/2020/May/23 -CVE-2020-12608 - https://github.com/jensregel/Advisories/tree/master/CVE-2020-12608 -CVE-2020-12619 - https://updates.mailmate-app.com/2.0/release_notes -CVE-2020-12624 - https://push32.com/post/dating-app-fail/ -CVE-2020-12625 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube -CVE-2020-12626 - https://github.com/roundcube/roundcubemail/pull/7302 -CVE-2020-12629 - https://www.exploit-db.com/exploits/48413 -CVE-2020-12638 - https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors -CVE-2020-12640 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube -CVE-2020-12641 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube -CVE-2020-12643 - http://seclists.org/fulldisclosure/2020/Aug/14 -CVE-2020-12647 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55 -CVE-2020-12648 - https://labs.bishopfox.com/advisories/tinymce-version-5.2.1 -CVE-2020-12652 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14 -CVE-2020-12657 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 -CVE-2020-12659 - https://bugzilla.kernel.org/show_bug.cgi?id=207225 -CVE-2020-12659 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.7 -CVE-2020-12673 - https://hackerone.com/reports/866597 -CVE-2020-12674 - https://hackerone.com/reports/866605 -CVE-2020-12676 - http://packetstormsecurity.com/files/159454/FusionAuth-SAMLv2-0.2.3-Message-Forging.html -CVE-2020-12676 - http://seclists.org/fulldisclosure/2020/Oct/1 -CVE-2020-12695 - http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html -CVE-2020-12695 - https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/ -CVE-2020-12695 - https://github.com/corelight/callstranger-detector -CVE-2020-12695 - https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of -CVE-2020-12702 - https://www.youtube.com/watch?v=DghYH7WY6iE&feature=youtu.be -CVE-2020-12706 - https://www.exploit-db.com/exploits/48404 -CVE-2020-12712 - http://packetstormsecurity.com/files/158112/SOS-JobScheduler-1.13.3-Stored-Password-Decryption.html -CVE-2020-12713 - http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html -CVE-2020-12713 - https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities -CVE-2020-12714 - https://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html -CVE-2020-12714 - https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities -CVE-2020-12717 - https://medium.com/@wabz/covidsafe-ios-vulnerability-cve-2020-12717-30dc003f9708 -CVE-2020-12720 - http://packetstormsecurity.com/files/157716/vBulletin-5.6.1-SQL-Injection.html -CVE-2020-12720 - http://packetstormsecurity.com/files/157904/vBulletin-5.6.1-SQL-Injection.html -CVE-2020-12720 - https://attackerkb.com/topics/RSDAFLik92/cve-2020-12720-vbulletin-incorrect-access-control -CVE-2020-12723 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-12723 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-12723 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-12740 - https://github.com/appneta/tcpreplay/issues/576 -CVE-2020-12745 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12746 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12747 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12748 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12749 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12750 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12751 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12752 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-12753 - https://douevenknow.us/post/619763074822520832/an-el1el3-coldboot-vulnerability -CVE-2020-12753 - https://www.zdnet.com/article/new-cold-boot-attack-affects-seven-years-of-lg-android-smartphones/ -CVE-2020-12760 - https://issues.opennms.org/browse/NMS-12673 -CVE-2020-12762 - https://github.com/json-c/json-c/pull/592 -CVE-2020-12762 - https://github.com/rsyslog/libfastjson/issues/161 -CVE-2020-12763 - https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability -CVE-2020-12768 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 -CVE-2020-12768 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d80b64ff297e40c2b6f7d7abc1b3eba70d22a068 -CVE-2020-12768 - https://usn.ubuntu.com/4413-1/ -CVE-2020-12769 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17 -CVE-2020-12769 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19b61392c5a852b4e8a0bf35aecb969983c5932d -CVE-2020-12770 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee -CVE-2020-12770 - https://usn.ubuntu.com/4413-1/ -CVE-2020-12770 - https://usn.ubuntu.com/4414-1/ -CVE-2020-12770 - https://usn.ubuntu.com/4419-1/ -CVE-2020-12771 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-12783 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2020-12783 - https://bugs.exim.org/show_bug.cgi?id=2571 -CVE-2020-12790 - https://isec.pl/en/vulnerabilities/isec-0028-seomatic-ssti-23032020.txt -CVE-2020-12798 - http://packetstormsecurity.com/files/157715/Cellebrite-UFED-7.5.0.845-Desktop-Escape-Privilege-Escalation.html -CVE-2020-12798 - https://korelogic.com/Resources/Advisories/KL-001-2020-002.txt -CVE-2020-12798 - https://twitter.com/thatguylevel -CVE-2020-12800 - https://packetstormsecurity.com/files/157951/WordPress-Drag-And-Drop-Multi-File-Uploader-Remote-Code-Execution.html -CVE-2020-1281 - http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html -CVE-2020-12811 - https://fortiguard.com/advisory/FG-IR-20-005 -CVE-2020-12814 - https://fortiguard.com/advisory/FG-IR-20-092 -CVE-2020-12815 - https://fortiguard.com/advisory/FG-IR-20-054 -CVE-2020-12816 - https://fortiguard.com/advisory/FG-IR-20-002 -CVE-2020-12817 - https://fortiguard.com/advisory/FG-IR-20-054 -CVE-2020-12825 - https://gitlab.gnome.org/GNOME/libcroco/-/issues/8 -CVE-2020-12826 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 -CVE-2020-12826 - https://lists.openwall.net/linux-kernel/2020/03/24/1803 -CVE-2020-12826 - https://www.openwall.com/lists/kernel-hardening/2020/03/25/1 -CVE-2020-12827 - http://packetstormsecurity.com/files/158111/MJML-4.6.2-Path-Traversal.html -CVE-2020-12830 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -CVE-2020-12835 - http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html -CVE-2020-12835 - http://seclists.org/fulldisclosure/2020/May/38 -CVE-2020-12835 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt -CVE-2020-12835 - https://www.syss.de/pentest-blog/ -CVE-2020-12847 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12847 - https://www.coresecurity.com/advisories -CVE-2020-12847 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12848 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12848 - https://www.coresecurity.com/advisories -CVE-2020-12848 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12849 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12849 - https://www.coresecurity.com/advisories -CVE-2020-12849 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12850 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12850 - https://www.coresecurity.com/advisories -CVE-2020-12850 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12851 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12851 - https://www.coresecurity.com/advisories -CVE-2020-12851 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12852 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12852 - https://www.coresecurity.com/advisories -CVE-2020-12852 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12853 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -CVE-2020-12853 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -CVE-2020-12854 - http://packetstormsecurity.com/files/158434/SecZetta-NEProfile-3.3.11-Remote-Code-Execution.html -CVE-2020-12855 - http://packetstormsecurity.com/files/158965/SecZetta-NEProfile-3.3.11-Host-Header-Injection.html -CVE-2020-12856 - https://github.com/alwentiu/COVIDSafe-CVE-2020-12856/blob/master/README.md -CVE-2020-12861 - http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html -CVE-2020-12861 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12862 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12863 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12864 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12865 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12866 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12867 - https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read -CVE-2020-12867 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane -CVE-2020-12872 - https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70 -CVE-2020-12872 - https://sweet32.info/ -CVE-2020-12880 - https://kb.pulsesecure.net/?atype=sa -CVE-2020-12880 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-12882 - http://packetstormsecurity.com/files/157756/Submitty-20.04.01-Cross-Site-Scripting.html -CVE-2020-12888 - https://usn.ubuntu.com/4526-1/ -CVE-2020-13094 - http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html -CVE-2020-13101 - https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=dss-x -CVE-2020-13109 - https://cturt.github.io/shogihax.html -CVE-2020-13109 - https://github.com/CTurt/shogihax -CVE-2020-13110 - https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd -CVE-2020-13110 - https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/ -CVE-2020-13117 - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html -CVE-2020-13118 - http://packetstormsecurity.com/files/157733/Mikrotik-Router-Monitoring-System-1.2.3-SQL-Injection.html -CVE-2020-13118 - https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4 -CVE-2020-13125 - https://wpvulndb.com/vulnerabilities/10214 -CVE-2020-13125 - https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/ -CVE-2020-13126 - https://wpvulndb.com/vulnerabilities/10214 -CVE-2020-13126 - https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/ -CVE-2020-1313 - http://packetstormsecurity.com/files/159305/Microsoft-Windows-Update-Orchestrator-Unchecked-ScheduleWork-Call.html -CVE-2020-13131 - https://blog.inhq.net/posts/yubico-libykpiv-vuln/ -CVE-2020-13132 - https://blog.inhq.net/posts/yubico-libykpiv-vuln/ -CVE-2020-13143 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f -CVE-2020-13143 - https://usn.ubuntu.com/4413-1/ -CVE-2020-13143 - https://usn.ubuntu.com/4414-1/ -CVE-2020-13143 - https://usn.ubuntu.com/4419-1/ -CVE-2020-13144 - http://packetstormsecurity.com/files/157785/OpenEDX-Ironwood-2.5-Remote-Code-Execution.html -CVE-2020-13149 - https://github.com/rishaldwivedi/Public_Disclosure/blob/master/README.md#msi-dragon-center-eop -CVE-2020-13151 - http://packetstormsecurity.com/files/160106/Aerospike-Database-5.1.0.3-Remote-Command-Execution.html -CVE-2020-13151 - http://packetstormsecurity.com/files/160451/Aerospike-Database-UDF-Lua-Code-Execution.html -CVE-2020-13151 - https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html -CVE-2020-13152 - http://packetstormsecurity.com/files/159898/Amarok-2.8.0-Denial-Of-Service.html -CVE-2020-13155 - https://www.exploit-db.com/exploits/48489 -CVE-2020-13156 - https://www.exploit-db.com/exploits/48489 -CVE-2020-13157 - https://www.exploit-db.com/exploits/48489 -CVE-2020-13160 - http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html -CVE-2020-13160 - http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html -CVE-2020-13160 - https://devel0pment.de/?p=1881 -CVE-2020-13162 - http://packetstormsecurity.com/files/158117/Pulse-Secure-Client-For-Windows-Local-Privilege-Escalation.html -CVE-2020-13162 - http://packetstormsecurity.com/files/159065/Pulse-Secure-Windows-Client-Privilege-Escalation.html -CVE-2020-13162 - https://kb.pulsesecure.net/?atype=sa -CVE-2020-13162 - https://www.redtimmy.com/privilege-escalation/pulse-secure-client-for-windows-9-1-6-toctou-privilege-escalation-cve-2020-13162/ -CVE-2020-13166 - http://packetstormsecurity.com/files/157808/Plesk-myLittleAdmin-ViewState-.NET-Deserialization.html -CVE-2020-13168 - https://github.com/lodestone-security/CVEs/tree/master/CVE-2020-13168 -CVE-2020-13224 - http://packetstormsecurity.com/files/158115/TP-LINK-Cloud-Cameras-NCXXX-Stack-Overflow.html -CVE-2020-13225 - https://github.com/phpipam/phpipam/issues/3025 -CVE-2020-13225 - https://www.youtube.com/watch?v=SpFmM03Jl40 -CVE-2020-13227 - https://github.com/wrongsid3 -CVE-2020-13227 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md -CVE-2020-13228 - http://packetstormsecurity.com/files/158062/Sysax-MultiServer-6.90-Cross-Site-Scripting.html -CVE-2020-13228 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md -CVE-2020-13229 - https://github.com/wrongsid3 -CVE-2020-13229 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md -CVE-2020-13245 - https://iot-lab-fh-ooe.github.io/netgear_update_vulnerability/ -CVE-2020-13247 - https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/ -CVE-2020-13248 - https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/ -CVE-2020-13252 - https://github.com/centreon/centreon/compare/19.04.13...19.04.15 -CVE-2020-13254 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-13258 - https://github.com/contentful/the-example-app.py/issues/44 -CVE-2020-13259 - https://cxsecurity.com/issue/WLB-2020090064 -CVE-2020-13259 - https://www.exploit-db.com/exploits/48809 -CVE-2020-13260 - https://cxsecurity.com/issue/WLB-2020090063 -CVE-2020-13260 - https://www.exploit-db.com/exploits/48807 -CVE-2020-13265 - https://gitlab.com/gitlab-org/gitlab/-/issues/121664 -CVE-2020-13267 - https://gitlab.com/gitlab-org/gitlab/-/issues/211956 -CVE-2020-13269 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13269.json -CVE-2020-13269 - https://gitlab.com/gitlab-org/gitlab/-/issues/216528 -CVE-2020-13277 - https://gitlab.com/gitlab-org/gitlab/-/issues/220972 -CVE-2020-13278 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/282 -CVE-2020-13290 - https://gitlab.com/gitlab-org/gitlab/-/issues/32291 -CVE-2020-13301 - https://gitlab.com/gitlab-org/gitlab/-/issues/219378 -CVE-2020-13311 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13311.json -CVE-2020-13315 - https://hackerone.com/reports/463010 -CVE-2020-13316 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13316.json -CVE-2020-13316 - https://gitlab.com/gitlab-org/gitlab/-/issues/220137 -CVE-2020-13324 - https://gitlab.com/gitlab-org/gitlab/-/issues/24542 -CVE-2020-13330 - https://gitlab.com/gitlab-org/gitlab/issues/30017 -CVE-2020-13331 - https://gitlab.com/gitlab-org/gitlab/-/issues/219010 -CVE-2020-13335 - https://gitlab.com/gitlab-org/gitlab/-/issues/27231 -CVE-2020-13337 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13337.json -CVE-2020-13340 - https://hackerone.com/reports/950190 -CVE-2020-13343 - https://hackerone.com/reports/689314 -CVE-2020-13346 - https://gitlab.com/gitlab-org/gitlab/-/issues/219496 -CVE-2020-13350 - https://hackerone.com/reports/415238 -CVE-2020-13351 - https://gitlab.com/gitlab-org/gitlab/-/issues/239369 -CVE-2020-13351 - https://hackerone.com/reports/962462 -CVE-2020-1337 - http://packetstormsecurity.com/files/160028/Microsoft-Windows-Local-Spooler-Bypass.html -CVE-2020-1337 - http://packetstormsecurity.com/files/160993/Microsoft-Spooler-Local-Privilege-Elevation.html -CVE-2020-13376 - https://sidechannel.tempestsi.com/path-traversal-vulnerability-in-securenvoy-impacts-on-remote-command-execution-through-file-upload-ec2e731bd50a -CVE-2020-13377 - https://inf0seq.github.io/cve/2020/04/21/Path-Traversal-in-Enterprise-loadbalancer-VA-MAX-v8.3.8-and-earlier.html -CVE-2020-13378 - https://inf0seq.github.io/cve/2020/04/21/OS.html -CVE-2020-13379 - http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html -CVE-2020-13379 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2020-13379 - https://community.grafana.com/t/release-notes-v7-0-x/29381 -CVE-2020-13379 - https://mostwanted002.cf/post/grafanados/ -CVE-2020-13380 - https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html -CVE-2020-13381 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html -CVE-2020-13381 - https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html -CVE-2020-13382 - http://packetstormsecurity.com/files/158255/openSIS-7.4-Incorrect-Access-Control.html -CVE-2020-13382 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html -CVE-2020-13383 - http://packetstormsecurity.com/files/158256/openSIS-7.4-Local-File-Inclusion.html -CVE-2020-13383 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html -CVE-2020-13384 - https://www.exploit-db.com/exploits/48479 -CVE-2020-13388 - https://joel-malwarebenchmark.github.io -CVE-2020-13388 - https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/ -CVE-2020-13389 - https://joel-malwarebenchmark.github.io -CVE-2020-13389 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13389-Tenda-vulnerability/ -CVE-2020-13390 - https://joel-malwarebenchmark.github.io -CVE-2020-13390 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13390-Tenda-vulnerability/ -CVE-2020-13391 - https://joel-malwarebenchmark.github.io -CVE-2020-13391 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13391-Tenda-vulnerability/ -CVE-2020-13392 - https://joel-malwarebenchmark.github.io -CVE-2020-13392 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13392-Tenda-vulnerability/ -CVE-2020-13393 - https://joel-malwarebenchmark.github.io -CVE-2020-13393 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13393-Tenda-vulnerability/ -CVE-2020-13394 - https://joel-malwarebenchmark.github.io -CVE-2020-13394 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13394-Tenda-vulnerability/ -CVE-2020-13396 - https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc -CVE-2020-13396 - https://usn.ubuntu.com/4379-1/ -CVE-2020-13397 - https://usn.ubuntu.com/4379-1/ -CVE-2020-13398 - https://usn.ubuntu.com/4379-1/ -CVE-2020-13404 - https://github.com/quadra-informatique/Atos-Magento/releases -CVE-2020-13404 - https://sysdream.com/news/lab/ -CVE-2020-13404 - https://sysdream.com/news/lab/2020-06-09-cve-2020-13404-remote-system-command-injection-in-atos-magento-module/ -CVE-2020-13412 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#cross-site-request-forgery-csrf -CVE-2020-13413 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#observable-response-discrepancy-from-api -CVE-2020-13414 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#clean-up-old-code -CVE-2020-13415 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml -CVE-2020-13416 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#csrf-on-password-reset -CVE-2020-13417 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-client-elevation-of-privilege -CVE-2020-13426 - https://0day.today/exploit/34496 -CVE-2020-13426 - https://cxsecurity.com/issue/WLB-2020050235 -CVE-2020-13426 - https://infayer.com/archivos/448 -CVE-2020-13426 - https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html -CVE-2020-13426 - https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user -CVE-2020-13426 - https://www.exploit-db.com/exploits/48532 -CVE-2020-13427 - https://www.exploit-db.com/exploits/48511 -CVE-2020-13431 - https://blog.blazeinfosec.com/security-advisory-i2p-for-windows-local-privilege-escalation/ -CVE-2020-13432 - http://hyp3rlinx.altervista.org/advisories/HFS-HTTP-FILE-SERVER-v2.3-REMOTE-BUFFER-OVERFLOW-DoS.txt -CVE-2020-13432 - http://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html -CVE-2020-13432 - http://seclists.org/fulldisclosure/2020/Jun/13 -CVE-2020-13432 - http://seclists.org/fulldisclosure/2021/Apr/12 -CVE-2020-13432 - https://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html -CVE-2020-13433 - https://news.websec.nl/news-cve-report-0.html -CVE-2020-13434 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-13434 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13434 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-13434 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-13434 - https://www.sqlite.org/src/info/23439ea582241138 -CVE-2020-13435 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-13435 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13435 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-13435 - https://www.sqlite.org/src/info/7a5279a25c57adf1 -CVE-2020-13438 - https://github.com/rockcarry/ffjpeg/issues/23 -CVE-2020-13443 - https://gist.github.com/mariuszpoplwski/51604d8a6d7d78fffdf590c25e844e09 -CVE-2020-13444 - https://issues.liferay.com/browse/LPE-17009 -CVE-2020-13445 - https://issues.liferay.com/browse/LPE-17023 -CVE-2020-13448 - http://packetstormsecurity.com/files/157898/QuickBox-Pro-2.1.8-Remote-Code-Execution.html -CVE-2020-13449 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html -CVE-2020-13450 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html -CVE-2020-13451 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html -CVE-2020-13452 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html -CVE-2020-13463 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13464 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13465 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13466 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13467 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13468 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13469 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13470 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13471 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13472 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -CVE-2020-13473 - https://cvewalkthrough.com/cve-2020-13473-nch-account-clear-text-password-storage/ -CVE-2020-13473 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13473-nch-account-clear-text.html -CVE-2020-13474 - https://cvewalkthrough.com/cve-2020-13474-nch-express-accounts-privilege-escalation/ -CVE-2020-13474 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13474-nch-express-accounts.html -CVE-2020-13476 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13475-nch-accounts-cross-site.html -CVE-2020-13480 - http://cvewalkthrough.com/cve-2020-13480html-injection -CVE-2020-13480 - https://tejaspingulkar.blogspot.com/2020/06/cve-2020-13480-verint-html-injection.html -CVE-2020-13487 - https://www.youtube.com/watch?v=3rXP8CGTe08 -CVE-2020-1349 - http://packetstormsecurity.com/files/169959/Microsoft-Outlook-2019-16.0.12624.20424-Remote-Code-Execution.html -CVE-2020-13493 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 -CVE-2020-13494 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1103 -CVE-2020-13495 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1104 -CVE-2020-13496 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 -CVE-2020-13497 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 -CVE-2020-13498 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 -CVE-2020-13499 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 -CVE-2020-1350 - http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html -CVE-2020-13500 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 -CVE-2020-13501 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 -CVE-2020-13504 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1108 -CVE-2020-13505 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1108 -CVE-2020-13509 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 -CVE-2020-13510 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 -CVE-2020-13511 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 -CVE-2020-13512 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111 -CVE-2020-13513 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111 -CVE-2020-13514 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111 -CVE-2020-13515 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1112 -CVE-2020-13516 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1113 -CVE-2020-13517 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1114 -CVE-2020-13518 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1115 -CVE-2020-13519 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1116 -CVE-2020-13520 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1120 -CVE-2020-13522 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1121 -CVE-2020-13523 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1122 -CVE-2020-13524 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1125 -CVE-2020-13525 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126 -CVE-2020-13526 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126 -CVE-2020-13527 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1135 -CVE-2020-13528 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1136 -CVE-2020-13529 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 -CVE-2020-13530 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1143 -CVE-2020-13531 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1145 -CVE-2020-13532 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 -CVE-2020-13533 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 -CVE-2020-13534 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 -CVE-2020-13535 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1147 -CVE-2020-13536 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 -CVE-2020-13537 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 -CVE-2020-13539 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150 -CVE-2020-13540 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150 -CVE-2020-13541 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1151 -CVE-2020-13542 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154 -CVE-2020-13543 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155 -CVE-2020-13543 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-13544 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1161 -CVE-2020-13545 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1162 -CVE-2020-13546 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1163 -CVE-2020-13547 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1165 -CVE-2020-13548 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1166 -CVE-2020-13549 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1167 -CVE-2020-13550 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1168 -CVE-2020-13551 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 -CVE-2020-13552 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 -CVE-2020-13553 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 -CVE-2020-13554 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 -CVE-2020-13555 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 -CVE-2020-13556 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1170 -CVE-2020-13557 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1171 -CVE-2020-13558 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172 -CVE-2020-13559 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1174 -CVE-2020-13560 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1175 -CVE-2020-13561 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1176 -CVE-2020-13562 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 -CVE-2020-13563 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 -CVE-2020-13564 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 -CVE-2020-13565 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1178 -CVE-2020-13566 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 -CVE-2020-13567 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 -CVE-2020-13568 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 -CVE-2020-13569 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1180 -CVE-2020-13570 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1181 -CVE-2020-13571 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1182 -CVE-2020-13572 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1183 -CVE-2020-13573 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1184 -CVE-2020-13574 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1185 -CVE-2020-13575 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186 -CVE-2020-13576 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187 -CVE-2020-13577 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1188 -CVE-2020-13578 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189 -CVE-2020-13579 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1190 -CVE-2020-13580 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 -CVE-2020-13581 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1192 -CVE-2020-13582 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1193 -CVE-2020-13583 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1194 -CVE-2020-13584 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1195 -CVE-2020-13585 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1196 -CVE-2020-13586 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1197 -CVE-2020-13587 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1198 -CVE-2020-13588 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 -CVE-2020-13589 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 -CVE-2020-13590 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 -CVE-2020-13591 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1200 -CVE-2020-13592 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1201 -CVE-2020-13596 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-13619 - https://reallinkers.github.io/CVE-2020-13619/ -CVE-2020-13620 - https://lucadidomenico.medium.com/fastgate-gpon-cross-site-request-forgery-cve-2020-13620-e279f3fbaee4 -CVE-2020-13620 - https://members.backbox.org/fastgate-gpon-cross-site-request-forgery/ -CVE-2020-13623 - https://github.com/jerryscript-project/jerryscript/issues/3785 -CVE-2020-13626 - https://medium.com/@bugsbunnyy1107/the-tell-tale-of-cve-in-oneplus-phones-91e97342a8b5 -CVE-2020-13627 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ -CVE-2020-13628 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ -CVE-2020-13630 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-13630 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-13630 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-13631 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-13631 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-13631 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-13632 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-13632 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-13640 - http://www.openwall.com/lists/oss-security/2020/07/06/1 -CVE-2020-13642 - https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ -CVE-2020-13643 - https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ -CVE-2020-13650 - https://know.bishopfox.com/advisories/digdash-version-2018 -CVE-2020-13651 - https://know.bishopfox.com/advisories/digdash-version-2018 -CVE-2020-13652 - https://know.bishopfox.com/advisories/digdash-version-2018 -CVE-2020-13656 - https://know.bishopfox.com/advisories/oob-to-rce-exploitation-of-the-hobbes-functional-interpreter -CVE-2020-13658 - https://research.nccgroup.com/2020/09/25/technical-advisory-lansweeper-privilege-escalation-via-csrf-using-http-method-interchange/ -CVE-2020-13660 - http://dev.cmsmadesimple.org/bug/view/12312 -CVE-2020-13660 - https://www.youtube.com/watch?v=Q6RMhmpScho -CVE-2020-13661 - https://www.nagenrauft-consulting.com/blog/ -CVE-2020-13693 - http://packetstormsecurity.com/files/157885/WordPress-BBPress-2.5-Privilege-Escalation.html -CVE-2020-13756 - http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html -CVE-2020-13756 - http://seclists.org/fulldisclosure/2020/Jun/7 -CVE-2020-13757 - https://github.com/sybrenstuvel/python-rsa/issues/146 -CVE-2020-13757 - https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 -CVE-2020-13758 - https://blog.deteact.com/bitrix-waf-bypass/ -CVE-2020-1377 - http://packetstormsecurity.com/files/158938/Microsoft-Windows-CmpDoReDoCreateKey-Arbitrary-Registry-Key-Creation-Privilege-Escalation.html -CVE-2020-1378 - http://packetstormsecurity.com/files/158939/Microsoft-Windows-CmpDoReadTxRBigLogRecord-Memory-Corruption-Privilege-Escalation.html -CVE-2020-13788 - https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 -CVE-2020-13788 - https://www.youtube.com/watch?v=v8Isqy4yR3Q -CVE-2020-13795 - http://packetstormsecurity.com/files/157940/Navigate-CMS-2.8.7-Directory-Traversal.html -CVE-2020-13799 - https://www.westerndigital.com/support/productsecurity/wdc-20008-replay-attack-vulnerabilities-rpmb-protocol-applications -CVE-2020-1380 - http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html -CVE-2020-13802 - http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html -CVE-2020-13802 - https://github.com/vulnbe/poc-rebar3.git -CVE-2020-13802 - https://vuln.be/post/rebar3-command-injection/ -CVE-2020-13817 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-13820 - https://medium.com/@0x00crash/xss-reflected-in-extreme-management-center-8-4-1-24-cve-2020-13820-c6febe951219 -CVE-2020-13822 - https://github.com/indutny/elliptic/issues/226 -CVE-2020-13822 - https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4 -CVE-2020-13825 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-005 -CVE-2020-13826 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-006 -CVE-2020-13827 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-004 -CVE-2020-13828 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-002 -CVE-2020-13829 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13830 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13831 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13832 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13833 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13834 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13835 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13836 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13837 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13838 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-13850 - https://www.coresecurity.com/advisories -CVE-2020-13850 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -CVE-2020-13851 - http://packetstormsecurity.com/files/158390/Pandora-FMS-7.0-NG-7XX-Remote-Command-Execution.html -CVE-2020-13851 - https://www.coresecurity.com/advisories -CVE-2020-13851 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -CVE-2020-13852 - https://www.coresecurity.com/advisories -CVE-2020-13852 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -CVE-2020-13853 - https://www.coresecurity.com/advisories -CVE-2020-13853 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -CVE-2020-13854 - https://www.coresecurity.com/advisories -CVE-2020-13854 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -CVE-2020-13855 - https://www.coresecurity.com/advisories -CVE-2020-13855 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -CVE-2020-13864 - https://www.softwaresecured.com/elementor-page-builder-stored-xss/ -CVE-2020-13865 - https://www.softwaresecured.com/elementor-page-builder-stored-xss/ -CVE-2020-13866 - http://hyp3rlinx.altervista.org/advisories/WINGATE-INSECURE-PERMISSIONS-LOCAL-PRIVILEGE-ESCALATION.txt -CVE-2020-13866 - http://packetstormsecurity.com/files/157958/WinGate-9.4.1.5998-Insecure-Permissions-Privilege-Escalation.html -CVE-2020-13866 - http://seclists.org/fulldisclosure/2020/Jun/11 -CVE-2020-13871 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13871 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-13871 - https://www.sqlite.org/src/info/c8d3b9f0a750a529 -CVE-2020-13871 - https://www.sqlite.org/src/info/cd708fa84d2aaaea -CVE-2020-13872 - http://packetstormsecurity.com/files/158000/RoyalTS-SSH-Tunnel-Authentication-Bypass.html -CVE-2020-13872 - http://seclists.org/fulldisclosure/2020/Jun/14 -CVE-2020-13877 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/807698439/v1.8+HF+1+2+3+OnPrem+v5.3 -CVE-2020-13886 - https://github.com/lucxssouza/CVE-2020-13886 -CVE-2020-13890 - https://jizen0x01.blogspot.com/2020/06/neon-dashboard-xss.html -CVE-2020-13891 - https://mattermost.com/security-updates/ -CVE-2020-13892 - https://wpvulndb.com/vulnerabilities/10257 -CVE-2020-13895 - https://github.com/FGasper/p5-Crypt-Perl/issues/14 -CVE-2020-13898 - https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898 -CVE-2020-13899 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13899 -CVE-2020-13900 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900 -CVE-2020-13901 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13901 -CVE-2020-13904 - https://trac.ffmpeg.org/ticket/8673 -CVE-2020-13911 - https://gist.github.com/kdrypr/5dac91c2d27c4dc82b1225dffa38f7a8 -CVE-2020-13920 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-13927 - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html -CVE-2020-13927 - http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html -CVE-2020-13934 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-13934 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13934 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-13934 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-13934 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-13935 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-13935 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-13935 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-13935 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-13936 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-13936 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-13943 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13945 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html -CVE-2020-13947 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13947 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-13949 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-13949 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-13950 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-13951 - http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html -CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-13954 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-13956 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-13956 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-13961 - https://github.com/strapi/strapi/pull/6599 -CVE-2020-13961 - https://github.com/strapi/strapi/releases/tag/v3.0.2 -CVE-2020-13965 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube -CVE-2020-13974 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae -CVE-2020-13974 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-13976 - https://svn.dd-wrt.com/ticket/7039 -CVE-2020-13977 - https://anhtai.me/nagios-core-4-4-5-url-injection/ -CVE-2020-13992 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise -CVE-2020-13993 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ -CVE-2020-13994 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ -CVE-2020-13995 - https://www.riverloopsecurity.com/blog/2020/09/nitf-extract75-cve-2020-13995/ -CVE-2020-14000 - https://github.com/LLK/scratch-vm/pull/2476 -CVE-2020-14000 - https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443 -CVE-2020-14004 - http://www.openwall.com/lists/oss-security/2020/06/12/1 -CVE-2020-14006 - https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 -CVE-2020-14007 - https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 -CVE-2020-14008 - http://packetstormsecurity.com/files/159066/ManageEngine-Applications-Manager-Authenticated-Remote-Code-Execution.html -CVE-2020-14008 - https://www.manageengine.com -CVE-2020-14011 - http://packetstormsecurity.com/files/158205/Lansweeper-7.2-Default-Account-Remote-Code-Execution.html -CVE-2020-14014 - https://cxsecurity.com/issue/WLB-2018090182 -CVE-2020-14021 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14021-Arbitrary%20File%20Read-Ozeki%20SMS%20Gateway -CVE-2020-14022 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14022-Dangerous%20File%20Upload-Ozeki%20SMS%20Gateway -CVE-2020-14023 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14023-Server%20Side%20Request%20Forgery-Ozeki%20SMS%20Gateway -CVE-2020-14024 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14024-Multiple%20XSS-Ozeki%20SMS%20Gateway -CVE-2020-14025 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14025-Cross-Site%20Request%20Forgery-Ozeki%20SMS%20Gateway -CVE-2020-14026 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14026-Formula%20Injection-Ozeki%20SMS%20Gateway -CVE-2020-14027 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14027-MySQL%20LOAD%20DATA%20LOCAL%20INFILE%20Attack-Ozeki%20SMS%20Gateway -CVE-2020-14028 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14028-Arbitary%20File%20Write-Ozeki%20SMS%20Gateway -CVE-2020-14029 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway -CVE-2020-14030 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway -CVE-2020-14031 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14031-Arbitary%20File%20Delete-Ozeki%20SMS%20Gateway -CVE-2020-14032 - https://dannyodler.medium.com/attacking-the-golden-ring-on-amd-mini-pc-b7bfb217b437 -CVE-2020-14033 - https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117 -CVE-2020-14033 - https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166 -CVE-2020-14039 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-14042 - https://github.com/Codiad/Codiad/issues/1122 -CVE-2020-14043 - https://github.com/Codiad/Codiad/issues/1122 -CVE-2020-14044 - https://github.com/Codiad/Codiad/issues/1122 -CVE-2020-14055 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191211-01_Monsta_FTP_Stored_XSS -CVE-2020-14056 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery -CVE-2020-14057 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-01_Monsta_FTP_Arbitrary_File_Read_and_Write -CVE-2020-14060 - https://github.com/FasterXML/jackson-databind/issues/2688 -CVE-2020-14060 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-14060 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-14060 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-14061 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-14061 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-14061 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-14062 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-14062 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-14062 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-14068 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 -CVE-2020-14069 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 -CVE-2020-14070 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 -CVE-2020-14071 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 -CVE-2020-14072 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 -CVE-2020-14073 - http://packetstormsecurity.com/files/160312/PRTG-Network-Monitor-20.4.63.1412-Cross-Site-Scripting.html -CVE-2020-14092 - https://wpvulndb.com/vulnerabilities/10287 -CVE-2020-14144 - http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html -CVE-2020-14144 - https://docs.gitlab.com/ee/administration/server_hooks.html -CVE-2020-14146 - https://github.com/jenaye/KumbiaPHP- -CVE-2020-14147 - https://github.com/antirez/redis/pull/6875 -CVE-2020-14147 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14152 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz -CVE-2020-14153 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz -CVE-2020-14153 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445 -CVE-2020-14155 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-14157 - http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html -CVE-2020-14157 - http://seclists.org/fulldisclosure/2020/Jun/26 -CVE-2020-14157 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt -CVE-2020-14157 - https://www.youtube.com/watch?v=kCqAVYyahLc -CVE-2020-14158 - http://packetstormsecurity.com/files/158692/ABUS-Secvest-Hybrid-Module-FUMO50110-Authentication-Bypass.html -CVE-2020-14158 - http://seclists.org/fulldisclosure/2020/Jul/36 -CVE-2020-14158 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-015.txt -CVE-2020-14163 - https://github.com/jerryscript-project/jerryscript/issues/3804 -CVE-2020-14166 - http://packetstormsecurity.com/files/162107/Atlassian-Jira-Service-Desk-4.9.1-Cross-Site-Scripting.html -CVE-2020-14181 - http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html -CVE-2020-14195 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-14195 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-14198 - https://github.com/bitcoin/bitcoin/commits/master -CVE-2020-14201 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-011 -CVE-2020-14208 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-008 -CVE-2020-14209 - http://packetstormsecurity.com/files/161955/Dolibarr-ERP-CRM-11.0.4-Bypass-Code-Execution.html -CVE-2020-14209 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-012 -CVE-2020-14293 - http://seclists.org/fulldisclosure/2020/Sep/51 -CVE-2020-14293 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-025.txt -CVE-2020-14293 - https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata -CVE-2020-14294 - http://seclists.org/fulldisclosure/2020/Sep/50 -CVE-2020-14294 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-024.txt -CVE-2020-14294 - https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata -CVE-2020-14295 - http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html -CVE-2020-14295 - http://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html -CVE-2020-14314 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1 -CVE-2020-14315 - https://www.openwall.com/lists/oss-security/2020/07/09/2 -CVE-2020-14315 - https://www.x41-dsec.de/lab/advisories/x41-2020-006-bspatch/ -CVE-2020-14331 - https://www.openwall.com/lists/oss-security/2020/07/28/2 -CVE-2020-14335 - https://access.redhat.com/errata/RHSA-2021:1313 -CVE-2020-14340 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-14340 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-14343 - https://github.com/yaml/pyyaml/issues/420 -CVE-2020-14343 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-14343 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-14354 - https://packetstormsecurity.com/files/158755/GS20200804145053.txt -CVE-2020-14356 - https://usn.ubuntu.com/4526-1/ -CVE-2020-14363 - https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt -CVE-2020-14372 - https://bugzilla.redhat.com/show_bug.cgi?id=1873150 -CVE-2020-14373 - https://bugs.ghostscript.com/show_bug.cgi?id=702851 -CVE-2020-14375 - https://bugzilla.redhat.com/show_bug.cgi?id=1879468 -CVE-2020-14381 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254 -CVE-2020-14385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 -CVE-2020-14386 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html -CVE-2020-14386 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386 -CVE-2020-14386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06 -CVE-2020-14387 - https://bugzilla.redhat.com/show_bug.cgi?id=1875549 -CVE-2020-14392 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 -CVE-2020-14393 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 -CVE-2020-14408 - https://github.com/agentejo/cockpit/issues/1310 -CVE-2020-14409 - https://bugzilla.libsdl.org/show_bug.cgi?id=5200 -CVE-2020-14410 - https://bugzilla.libsdl.org/show_bug.cgi?id=5200 -CVE-2020-14416 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16 -CVE-2020-14416 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd -CVE-2020-14418 - https://labs.nettitude.com/blog/cve-2020-14418-madcodehook-library-local-privilege-escalation/ -CVE-2020-14421 - http://packetstormsecurity.com/files/159575/aaPanel-6.6.6-Privilege-Escalation.html -CVE-2020-14421 - https://forum.aapanel.com -CVE-2020-14421 - https://github.com/jenaye/aapanel -CVE-2020-14422 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14425 - http://packetstormsecurity.com/files/159784/Foxit-Reader-9.7.1-Remote-Command-Execution.html -CVE-2020-14425 - https://www.exploit-db.com/exploits/48982 -CVE-2020-14428 - https://kb.netgear.com/000061936/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0044 -CVE-2020-14429 - https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050 -CVE-2020-14431 - https://kb.netgear.com/000061944/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0068 -CVE-2020-14439 - https://kb.netgear.com/000061942/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0064 -CVE-2020-14444 - https://cybersecurityworks.com/zerodays/cve-2020-14444-wso2.html -CVE-2020-14445 - https://cybersecurityworks.com/zerodays/cve-2020-14445-wso2.html -CVE-2020-14446 - https://cybersecurityworks.com/zerodays/cve-2020-14446-wso2.html -CVE-2020-14447 - https://mattermost.com/security-updates/ -CVE-2020-14448 - https://mattermost.com/security-updates/ -CVE-2020-14449 - https://mattermost.com/security-updates/ -CVE-2020-14450 - https://mattermost.com/security-updates/ -CVE-2020-14451 - https://mattermost.com/security-updates/ -CVE-2020-14452 - https://mattermost.com/security-updates/ -CVE-2020-14453 - https://mattermost.com/security-updates/ -CVE-2020-14454 - https://mattermost.com/security-updates/ -CVE-2020-14455 - https://mattermost.com/security-updates/ -CVE-2020-14456 - https://mattermost.com/security-updates/ -CVE-2020-14457 - https://mattermost.com/security-updates/ -CVE-2020-14458 - https://mattermost.com/security-updates/ -CVE-2020-14459 - https://mattermost.com/security-updates/ -CVE-2020-14460 - https://mattermost.com/security-updates/ -CVE-2020-14461 - http://packetstormsecurity.com/files/158428/Zyxel-Armor-X1-WAP6806-Directory-Traversal.html -CVE-2020-14473 - https://github.com/Cossack9989/Vulns/blob/master/IoT/CVE-2020-14473.md -CVE-2020-14474 - http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html -CVE-2020-14474 - http://seclists.org/fulldisclosure/2020/Jun/31 -CVE-2020-14474 - https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt -CVE-2020-14527 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14528 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14529 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14530 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14531 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14532 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14533 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14534 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14535 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14536 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14537 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14539 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14540 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14541 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14542 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14543 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14544 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14545 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14546 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14547 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14548 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14549 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14550 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14551 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14552 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14553 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14554 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14555 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14556 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14557 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14558 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14559 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14560 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14561 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14562 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14563 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14564 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14565 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14566 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14567 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14568 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14569 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14570 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14571 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14572 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14573 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-14573 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14574 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14575 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14576 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14577 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14578 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-14578 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14579 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-14579 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14580 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14581 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-14581 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14582 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14583 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14584 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14585 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14586 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14587 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14588 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14589 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14590 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14591 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14592 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14593 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14594 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14595 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14596 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14597 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14598 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14599 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14600 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14601 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14602 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14603 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14604 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14605 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14606 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14607 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14608 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14609 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14610 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14611 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14612 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14613 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14614 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14615 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14616 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14617 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14618 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14619 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14620 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14621 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-14621 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14622 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14623 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14624 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14625 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14626 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14627 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14628 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14629 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14630 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14631 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14632 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14633 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14634 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14635 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14636 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14637 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14638 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14639 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1464 - https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ -CVE-2020-1464 - https://medium.com/@TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd -CVE-2020-14640 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14641 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14642 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14643 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14644 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14645 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14646 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14647 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14648 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14649 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14650 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14651 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14652 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14653 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14654 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14655 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14656 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14657 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14658 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14659 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14660 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14661 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14662 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14663 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14664 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14665 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14666 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14667 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14668 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14669 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14670 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14671 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14672 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14673 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14674 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14675 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14676 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14677 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14678 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14679 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14680 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14681 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14682 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14684 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14685 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14686 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14687 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14688 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14690 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14691 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14692 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14693 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14694 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14695 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14696 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14697 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14698 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14699 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14700 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14701 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14702 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14703 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14704 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14705 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14706 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14707 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14708 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14709 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14710 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14711 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14712 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14713 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14714 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14715 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14716 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14717 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14718 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14719 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1472 - http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html -CVE-2020-1472 - http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html -CVE-2020-1472 - https://usn.ubuntu.com/4559-1/ -CVE-2020-1472 - https://www.kb.cert.org/vuls/id/490028 -CVE-2020-1472 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-14720 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14721 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14722 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14723 - https://cybersecurityworks.com/zerodays/cve-2020-14723-oracle.html -CVE-2020-14723 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14724 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14725 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-14731 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14732 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14734 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14735 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14736 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14740 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14741 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14742 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14743 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14744 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14745 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14746 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14750 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html -CVE-2020-14752 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14753 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14754 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14756 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14756 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-14757 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14758 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14759 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14760 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14761 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14762 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14763 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14764 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14765 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14766 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14767 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14768 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14769 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14770 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14771 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14772 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14773 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14774 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14775 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14776 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14777 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14778 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14779 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14780 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14781 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14782 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14783 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14784 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14785 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14786 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14787 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14788 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14789 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14790 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14791 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14792 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14793 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14794 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14795 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14796 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14797 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14798 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14799 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14800 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14801 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14802 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14803 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-14803 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14804 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14805 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14806 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14807 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14808 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14809 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14810 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14811 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14812 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14813 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14814 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14815 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14816 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14817 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14818 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14819 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14820 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14821 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14822 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14823 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14824 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14825 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14826 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14827 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14828 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14829 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14830 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14831 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14832 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14833 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14834 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14835 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14836 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14837 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14838 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14839 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14840 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14841 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14842 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14843 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14844 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14845 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14846 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14847 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14848 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14849 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14850 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14851 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14852 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14853 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14854 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14855 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14856 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14857 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14858 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14859 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14860 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14861 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14862 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14863 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14864 - http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html -CVE-2020-14864 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14865 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14866 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14867 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14868 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14869 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14870 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14871 - http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html -CVE-2020-14871 - http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html -CVE-2020-14871 - http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html -CVE-2020-14871 - http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html -CVE-2020-14871 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14872 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14873 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14875 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14876 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14877 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14878 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14879 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14880 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14881 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14882 - http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html -CVE-2020-14882 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html -CVE-2020-14882 - http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html -CVE-2020-14882 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14883 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html -CVE-2020-14883 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14884 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14885 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14886 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14887 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14888 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14889 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14890 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14891 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14892 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14893 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14894 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14895 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14896 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14897 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14898 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14899 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14900 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14901 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-14928 - https://bugzilla.suse.com/show_bug.cgi?id=1173910 -CVE-2020-1493 - http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html -CVE-2020-14930 - https://www.exploit-db.com/exploits/48196 -CVE-2020-14930 - https://www.pentest.com.tr/exploits/CTROMS-Terminal-OS-Port-Portal-Password-Reset-Authentication-Bypass.html -CVE-2020-14931 - https://github.com/jaygreig86/dmitry/issues/4 -CVE-2020-14938 - https://bugs.freedroid.org/b/issue951 -CVE-2020-14939 - https://bugs.freedroid.org/b/issue953 -CVE-2020-14940 - https://sourceforge.net/p/tuxguitar/bugs/126/ -CVE-2020-14943 - http://packetstormsecurity.com/files/158217/BSA-Radar-1.6.7234.24750-Cross-Site-Scripting.html -CVE-2020-14943 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14943%20-%20Stored%20XSS.md -CVE-2020-14943 - https://www.exploit-db.com/exploits/48619 -CVE-2020-14944 - http://packetstormsecurity.com/files/158372/BSA-Radar-1.6.7234.24750-Cross-Site-Request-Forgery.html -CVE-2020-14944 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14944%20-%20Access%20Control%20Vulnerabilities.md -CVE-2020-14945 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14945%20-%20Privilege%20Escalation.md -CVE-2020-14945 - https://www.exploit-db.com/exploits/48649 -CVE-2020-14946 - http://packetstormsecurity.com/files/158420/BSA-Radar-1.6.7234.24750-Local-File-Inclusion.html -CVE-2020-14946 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14946%20-%20Local%20File%20Inclusion.md -CVE-2020-14947 - http://packetstormsecurity.com/files/158293/OCS-Inventory-NG-2.7-Remote-Code-Execution.html -CVE-2020-14950 - https://github.com/jenaye/aapanel -CVE-2020-14959 - https://wpvulndb.com/vulnerabilities/10223 -CVE-2020-14960 - https://www.exploit-db.com/exploits/48487 -CVE-2020-14962 - https://wpvulndb.com/vulnerabilities/10241 -CVE-2020-14966 - https://github.com/kjur/jsrsasign/issues/437 -CVE-2020-14967 - https://github.com/kjur/jsrsasign/issues/439 -CVE-2020-14968 - https://github.com/kjur/jsrsasign/issues/438 -CVE-2020-14972 - https://www.exploit-db.com/exploits/48439 -CVE-2020-14973 - https://packetstormsecurity.com/files/157608/WebTareas-2.0p8-Cross-Site-Scripting.html -CVE-2020-14979 - https://posts.specterops.io/cve-2020-14979-local-privilege-escalation-in-evga-precisionx1-cf63c6b95896 -CVE-2020-14980 - http://packetstormsecurity.com/files/158322/Sophos-Secure-Email-Android-Application-3.9.4-Man-In-The-Middle.html -CVE-2020-14981 - http://packetstormsecurity.com/files/158323/VIPRE-Password-Vault-1.100.1090-Man-In-The-Middle.html -CVE-2020-14982 - https://www.mindpointgroup.com/blog/webta-sqli-vulnerability/ -CVE-2020-14983 - https://github.com/chocolate-doom/chocolate-doom/issues/1293 -CVE-2020-14990 - https://daniels-it-blog.blogspot.com/2020/06/arbitrary-file-deletion-in-iobit.html -CVE-2020-14990 - https://github.com/Daniel-itsec/AdvancedSystemCare -CVE-2020-14993 - https://github.com/dexterone/Vigor-poc -CVE-2020-15002 - https://seclists.org/fulldisclosure/2020/Oct/20 -CVE-2020-15003 - https://seclists.org/fulldisclosure/2020/Oct/20 -CVE-2020-15004 - https://seclists.org/fulldisclosure/2020/Oct/20 -CVE-2020-15012 - https://support.sonatype.com/hc/en-us/articles/360051068253 -CVE-2020-15014 - https://github.com/pramodmahato/BlogCMS/issues/1 -CVE-2020-15020 - http://hidden-one.co.in/2020/07/07/cve-2020-1020-stored-xss-on-elementor-wordpress-plugin/ -CVE-2020-15023 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d -CVE-2020-15023 - https://www.askey.com.tw/Products/wifi.html -CVE-2020-15023 - https://www.askey.com.tw/incident_report_notifications.html -CVE-2020-15025 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-15027 - https://slagle.tech/2020/07/06/cve-2020-15027/ -CVE-2020-15038 - http://packetstormsecurity.com/files/158649/WordPress-Maintenance-Mode-By-SeedProd-5.1.1-Cross-Site-Scripting.html -CVE-2020-15038 - https://wpvulndb.com/vulnerabilities/10283 -CVE-2020-15046 - http://packetstormsecurity.com/files/158373/SuperMicro-IPMI-03.40-Cross-Site-Request-Forgery.html -CVE-2020-15050 - http://packetstormsecurity.com/files/158576/Bio-Star-2.8.2-Local-File-Inclusion.html -CVE-2020-15069 - https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal -CVE-2020-15078 - https://community.openvpn.net/openvpn/wiki/CVE-2020-15078 -CVE-2020-15103 - https://usn.ubuntu.com/4481-1/ -CVE-2020-15117 - https://github.com/symless/synergy-core/security/advisories/GHSA-chfm-333q-gfpp -CVE-2020-15123 - https://github.com/advisories/GHSA-5q88-cjfq-g2mh -CVE-2020-15135 - https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f -CVE-2020-15135 - https://www.npmjs.com/package/save-server -CVE-2020-15149 - http://packetstormsecurity.com/files/159560/NodeBB-Forum-1.14.2-Account-Takeover.html -CVE-2020-15149 - https://zeroauth.ltd/blog/2020/08/20/proof-of-concept-exploit-for-cve-2020-15149-nodebb-arbitrary-user-password-change/ -CVE-2020-15152 - https://www.npmjs.com/package/ftp-srv -CVE-2020-15160 - http://packetstormsecurity.com/files/162140/PrestaShop-1.7.6.7-SQL-Injection.html -CVE-2020-15180 - https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/ -CVE-2020-15182 - https://youtu.be/ffvKH3gwyRE -CVE-2020-15188 - https://www.youtube.com/watch?v=zAE4Swjc-GU&feature=youtu.be -CVE-2020-15189 - https://youtu.be/FWIDFNXmr9g -CVE-2020-15209 - https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8 -CVE-2020-15226 - https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc -CVE-2020-15228 - http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html -CVE-2020-15238 - http://packetstormsecurity.com/files/159740/Blueman-Local-Root-Privilege-Escalation.html -CVE-2020-15238 - https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/1897287 -CVE-2020-15246 - https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 -CVE-2020-15249 - https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 -CVE-2020-15250 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-15253 - https://www.exploit-db.com/exploits/48792 -CVE-2020-15255 - http://packetstormsecurity.com/files/159996/Anuko-Time-Tracker-1.19.23.5325-CSV-Injection.html -CVE-2020-15255 - https://www.exploit-db.com/exploits/49027 -CVE-2020-15261 - http://packetstormsecurity.com/files/162873/Veyon-4.4.1-Unquoted-Service-Path.html -CVE-2020-15261 - https://github.com/veyon/veyon/issues/657 -CVE-2020-15261 - https://www.exploit-db.com/exploits/48246 -CVE-2020-15261 - https://www.exploit-db.com/exploits/49925 -CVE-2020-15266 - https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845 -CVE-2020-15300 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-009 -CVE-2020-15301 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-010 -CVE-2020-15302 - https://blog.openzeppelin.com/argent-vulnerability-report/ -CVE-2020-15304 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md -CVE-2020-15305 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md -CVE-2020-15306 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md -CVE-2020-15307 - https://www2.deloitte.com/de/de/pages/risk/articles/nozomi-stored-xss.html?nc=1 -CVE-2020-15308 - https://code610.blogspot.com/2020/06/postauth-sqli-in-sitracker-v367-p2.html -CVE-2020-15350 - https://github.com/RIOT-OS/RIOT/pull/14400 -CVE-2020-15351 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-004.md -CVE-2020-15352 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-15357 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d -CVE-2020-15357 - https://starlabs.sg/advisories/ -CVE-2020-15357 - https://www.askey.com.tw/incident_report_notifications.html -CVE-2020-15358 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-15358 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-15358 - https://www.sqlite.org/src/tktview?name=8f157e8010 -CVE-2020-15360 - https://docs.docker.com/docker-for-windows/release-notes/ -CVE-2020-15360 - https://whitehatck01.blogspot.com/2020/06/dockers-latest-version-of-privilege.html -CVE-2020-15363 - http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html -CVE-2020-15364 - http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html -CVE-2020-15365 - https://github.com/LibRaw/LibRaw/issues/301 -CVE-2020-15367 - https://github.com/inflixim4be/CVE-2020-15367 -CVE-2020-15368 - https://codetector.org/post/asrock_rgb_driver/ -CVE-2020-15368 - https://github.com/stong/CVE-2020-15368?tab=readme-ov-file -CVE-2020-15389 - https://github.com/uclouvain/openjpeg/issues/1261 -CVE-2020-15389 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-15389 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-15392 - https://github.com/inflixim4be/CVE-2020-15392 -CVE-2020-15393 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba -CVE-2020-15394 - https://www.manageengine.com -CVE-2020-15395 - https://sourceforge.net/p/mediainfo/bugs/1127/ -CVE-2020-15396 - https://bugzilla.suse.com/show_bug.cgi?id=1173521 -CVE-2020-15397 - https://bugzilla.suse.com/show_bug.cgi?id=1173519 -CVE-2020-15401 - http://daniels-it-blog.blogspot.com/2020/06/when-your-anti-virus-turns-against-you.html -CVE-2020-15408 - https://kb.pulsesecure.net/?atype=sa -CVE-2020-15408 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-15415 - https://github.com/CLP-team/Vigor-Commond-Injection -CVE-2020-15468 - https://www.exploit-db.com/exploits/48190 -CVE-2020-15470 - https://github.com/rockcarry/ffjpeg/issues/26 -CVE-2020-15487 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/ -CVE-2020-15488 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/ -CVE-2020-15492 - http://packetstormsecurity.com/files/158556/INNEO-Startup-TOOLS-2018-M040-13.0.70.3804-Remote-Code-Execution.html -CVE-2020-15492 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-028.txt -CVE-2020-15492 - https://www.syss.de/pentest-blog/2020/syss-2020-028-sicherheitsschwachstelle-in-inneo-startup-tools-2017-und-2018/ -CVE-2020-15498 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440 -CVE-2020-15499 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440 -CVE-2020-15500 - http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html -CVE-2020-15504 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-via-sqli-cve-2020-15504 -CVE-2020-15505 - http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html -CVE-2020-15505 - https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/ -CVE-2020-15518 - https://zwclose.github.io/veeamon -CVE-2020-15521 - https://www.manageengine.com -CVE-2020-15528 - http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html -CVE-2020-15529 - http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html -CVE-2020-15530 - http://daniels-it-blog.blogspot.com/2020/07/steam-arbitrary-code-execution-part-2.html -CVE-2020-15531 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py -CVE-2020-15531 - https://www.youtube.com/watch?v=saoTr1NwdzM -CVE-2020-15532 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_dos.py -CVE-2020-15533 - https://www.manageengine.com -CVE-2020-15535 - https://packetstormsecurity.com/files/157118/WordPress-Car-Rental-System-1.3-Cross-Site-Scripting.html -CVE-2020-15535 - https://wpvulndb.com/vulnerabilities/10172 -CVE-2020-15536 - https://packetstormsecurity.com/files/157116/WordPress-Hotel-Booking-System-Pro-1.1-Cross-Site-Scripting.html -CVE-2020-15536 - https://wpvulndb.com/vulnerabilities/10171 -CVE-2020-15537 - https://cxsecurity.com/issue/WLB-2020040032 -CVE-2020-15537 - https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html -CVE-2020-15538 - https://cxsecurity.com/issue/WLB-2020060011 -CVE-2020-15538 - https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html -CVE-2020-15539 - https://cxsecurity.com/issue/WLB-2020060011 -CVE-2020-15539 - https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html -CVE-2020-15540 - https://cxsecurity.com/issue/WLB-2020060010 -CVE-2020-15540 - https://packetstormsecurity.com/files/157887/We-Com-OpenData-CMS-2.0-SQL-Injection.html -CVE-2020-15570 - https://github.com/sungjungk/whoopsie_killer2/blob/master/README.md -CVE-2020-15570 - https://github.com/sungjungk/whoopsie_killer2/blob/master/whoopsie_killer2.py -CVE-2020-15570 - https://www.youtube.com/watch?v=oZXGwC7PWYE -CVE-2020-15577 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15578 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15579 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15580 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15581 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15582 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15583 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15584 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-15586 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-15590 - https://github.com/sickcodes -CVE-2020-15598 - http://packetstormsecurity.com/files/159185/ModSecurity-3.0.x-Denial-Of-Service.html -CVE-2020-15598 - http://seclists.org/fulldisclosure/2020/Sep/32 -CVE-2020-15598 - https://coreruleset.org/20200914/cve-2020-15598/ -CVE-2020-15599 - https://www.exploit-db.com/exploits/48626 -CVE-2020-15600 - http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html -CVE-2020-15600 - https://github.com/boiteasite/cmsuno/issues/15 -CVE-2020-15636 - https://kb.netgear.com/000062128/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-R6700v3-PSV-2020-0224 -CVE-2020-15643 - https://www.tenable.com/security/research/tra-2020-56 -CVE-2020-15644 - https://www.tenable.com/security/research/tra-2020-56 -CVE-2020-15645 - https://www.tenable.com/security/research/tra-2020-56 -CVE-2020-15647 - https://bugzilla.mozilla.org/show_bug.cgi?id=1647078 -CVE-2020-15650 - https://bugzilla.mozilla.org/show_bug.cgi?id=1652360 -CVE-2020-15655 - https://bugzilla.mozilla.org/show_bug.cgi?id=1645204 -CVE-2020-15657 - https://bugzilla.mozilla.org/show_bug.cgi?id=1644954 -CVE-2020-15663 - https://bugzilla.mozilla.org/show_bug.cgi?id=1643199 -CVE-2020-15667 - https://bugzilla.mozilla.org/show_bug.cgi?id=1653371 -CVE-2020-15676 - https://bugzilla.mozilla.org/show_bug.cgi?id=1646140 -CVE-2020-15677 - https://bugzilla.mozilla.org/show_bug.cgi?id=1641487 -CVE-2020-15680 - https://bugzilla.mozilla.org/show_bug.cgi?id=1658881 -CVE-2020-15682 - https://bugzilla.mozilla.org/show_bug.cgi?id=1636654 -CVE-2020-15685 - https://bugzilla.mozilla.org/show_bug.cgi?id=1622640 -CVE-2020-15688 - http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html -CVE-2020-15690 - http://www.openwall.com/lists/oss-security/2021/02/04/3 -CVE-2020-15690 - https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/ -CVE-2020-15690 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690 -CVE-2020-15692 - http://www.openwall.com/lists/oss-security/2021/02/04/1 -CVE-2020-15692 - https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/ -CVE-2020-15693 - http://www.openwall.com/lists/oss-security/2021/02/04/2 -CVE-2020-15693 - https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/ -CVE-2020-15694 - http://www.openwall.com/lists/oss-security/2021/02/04/2 -CVE-2020-15694 - https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/ -CVE-2020-15716 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 -CVE-2020-15717 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 -CVE-2020-15718 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 -CVE-2020-15719 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 -CVE-2020-15719 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-15721 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 -CVE-2020-15744 - https://www.bitdefender.com/blog/labs/cracking-the-victure-pc420-camera -CVE-2020-15780 - http://www.openwall.com/lists/oss-security/2020/07/20/7 -CVE-2020-15780 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7 -CVE-2020-15780 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354 -CVE-2020-15780 - https://usn.ubuntu.com/4426-1/ -CVE-2020-15780 - https://www.openwall.com/lists/oss-security/2020/06/15/3 -CVE-2020-15797 - https://www.siemens-healthineers.com/support-documentation/security-advisory -CVE-2020-15803 - https://support.zabbix.com/browse/ZBX-18057 -CVE-2020-15806 - https://www.tenable.com/security/research/tra-2020-46 -CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/186 -CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/189 -CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/190 -CVE-2020-15816 - https://www.westerndigital.com/support/productsecurity/wdc-20005-wd-discovery-remote-command-execution-vulnerability -CVE-2020-15824 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-15824 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-15839 - https://issues.liferay.com/browse/LPE-17029 -CVE-2020-15839 - https://issues.liferay.com/browse/LPE-17055 -CVE-2020-15840 - https://issues.liferay.com/browse/LPE-17046 -CVE-2020-15841 - https://issues.liferay.com/browse/LPE-16928 -CVE-2020-15842 - https://issues.liferay.com/browse/LPE-16963 -CVE-2020-15843 - https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/ -CVE-2020-15849 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/ -CVE-2020-15850 - https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities -CVE-2020-15851 - https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities -CVE-2020-15858 - http://packetstormsecurity.com/files/171978/Telit-Cinterion-IoT-Traversal-Escalation-Bypass-Heap-Overflow.html -CVE-2020-15858 - http://seclists.org/fulldisclosure/2023/Apr/11 -CVE-2020-15860 - https://www.coresecurity.com/core-labs/advisories/parallels-ras-os-command-execution -CVE-2020-15862 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965166 -CVE-2020-15863 - https://git.qemu.org/?p=qemu.git;a=commitdiff;h=5519724a13664b43e225ca05351c60b4468e4555 -CVE-2020-15864 - https://www.quali.com/products/cloudshell-pro/ -CVE-2020-15866 - https://github.com/mruby/mruby/issues/5042 -CVE-2020-15867 - http://packetstormsecurity.com/files/162123/Gogs-Git-Hooks-Remote-Code-Execution.html -CVE-2020-15868 - https://support.sonatype.com/hc/en-us/articles/360052192533 -CVE-2020-15869 - https://support.sonatype.com -CVE-2020-15869 - https://support.sonatype.com/hc/en-us/articles/360051424554 -CVE-2020-15870 - https://support.sonatype.com -CVE-2020-15870 - https://support.sonatype.com/hc/en-us/articles/360051424754 -CVE-2020-15871 - https://hackerone.com/reports/917843 -CVE-2020-15871 - https://support.sonatype.com -CVE-2020-15871 - https://support.sonatype.com/hc/en-us/articles/360052192693 -CVE-2020-15873 - https://research.loginsoft.com/bugs/blind-sql-injection-in-librenms/ -CVE-2020-15877 - https://shielder.it/blog -CVE-2020-15881 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15882 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-15882 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15883 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15884 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-15884 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15885 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15886 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-15886 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15887 - https://github.com/munkireport/munkireport-php/releases -CVE-2020-15887 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 -CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00053.html -CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00054.html -CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00071.html -CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00079.html -CVE-2020-15889 - http://lua-users.org/lists/lua-l/2020-07/msg00078.html -CVE-2020-15890 - https://github.com/LuaJIT/LuaJIT/issues/601 -CVE-2020-15893 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ -CVE-2020-15894 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ -CVE-2020-15895 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ -CVE-2020-15896 - https://research.loginsoft.com/bugs/authentication-bypass-in-d-link-firmware-dap-1522/ -CVE-2020-15906 - http://packetstormsecurity.com/files/159663/Tiki-Wiki-CMS-Groupware-21.1-Authentication-Bypass.html -CVE-2020-15912 - https://www.youtube.com/watch?v=VYKsfgox-bs -CVE-2020-15912 - https://www.youtube.com/watch?v=kQWg-Ywv3S4 -CVE-2020-15912 - https://www.youtube.com/watch?v=nn-_3AbtEkI -CVE-2020-15918 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15919 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15920 - http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html -CVE-2020-15920 - http://packetstormsecurity.com/files/159194/Mida-Solutions-eFramework-ajaxreq.php-Command-Injection.html -CVE-2020-15920 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15921 - http://packetstormsecurity.com/files/159239/Mida-eFramework-2.9.0-Backdoor-Access.html -CVE-2020-15921 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15922 - http://packetstormsecurity.com/files/159314/Mida-eFramework-2.8.9-Remote-Code-Execution.html -CVE-2020-15922 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15923 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15924 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -CVE-2020-15927 - https://www.manageengine.com -CVE-2020-15928 - https://www.exploit-db.com/exploits/49078 -CVE-2020-15929 - https://www.exploit-db.com/exploits/49077 -CVE-2020-15930 - http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html -CVE-2020-15930 - https://github.com/laurent22/joplin/issues/3552 -CVE-2020-15930 - https://github.com/laurent22/joplin/releases/tag/v1.1.4 -CVE-2020-15931 - https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability -CVE-2020-15932 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-005.md -CVE-2020-15936 - https://fortiguard.com/advisory/FG-IR-20-091 -CVE-2020-15943 - http://packetstormsecurity.com/files/158751/Gantt-Chart-For-Jira-5.5.3-Missing-Privilege-Check.html -CVE-2020-15943 - http://seclists.org/fulldisclosure/2020/Aug/0 -CVE-2020-15943 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-029.txt -CVE-2020-15944 - http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html -CVE-2020-15944 - http://seclists.org/fulldisclosure/2020/Aug/1 -CVE-2020-15944 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt -CVE-2020-15945 - http://lua-users.org/lists/lua-l/2020-07/msg00123.html -CVE-2020-15948 - http://packetstormsecurity.com/files/163687/eGain-Chat-15.5.5-Cross-Site-Scripting.html -CVE-2020-15949 - https://labs.bishopfox.com/advisories -CVE-2020-15949 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 -CVE-2020-15950 - https://labs.bishopfox.com/advisories -CVE-2020-15950 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 -CVE-2020-15951 - https://labs.bishopfox.com/advisories -CVE-2020-15951 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 -CVE-2020-15952 - https://labs.bishopfox.com/advisories -CVE-2020-15952 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 -CVE-2020-15956 - http://packetstormsecurity.com/files/158771/ACTi-NVR3-Standard-Professional-Server-3.0.12.42-Denial-Of-Service.html -CVE-2020-15956 - https://github.com/megamagnus/cve-2020-15956 -CVE-2020-15957 - https://github.com/DP-3T/dp3t-sdk-backend/security/advisories/GHSA-5m5q-3qw2-3xf3 -CVE-2020-15958 - http://packetstormsecurity.com/files/159193/1CRM-8.6.7-Insecure-Direct-Object-Reference.html -CVE-2020-15958 - http://seclists.org/fulldisclosure/2020/Sep/31 -CVE-2020-15972 - http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html -CVE-2020-15999 - https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html -CVE-2020-16009 - http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html -CVE-2020-16011 - http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html -CVE-2020-16024 - http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html -CVE-2020-16025 - http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html -CVE-2020-16040 - http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html -CVE-2020-16040 - http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html -CVE-2020-16040 - http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html -CVE-2020-16041 - http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html -CVE-2020-16094 - https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4313 -CVE-2020-16116 - https://kde.org/info/security/advisory-20200730-1.txt -CVE-2020-16119 - https://launchpad.net/bugs/1883840 -CVE-2020-16125 - https://gitlab.gnome.org/GNOME/gdm/-/issues/642 -CVE-2020-16126 - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS -CVE-2020-16127 - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS -CVE-2020-16134 - https://www.swisscom.ch -CVE-2020-16135 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-16137 - https://packetstormsecurity.com/files/158818/Cisco-7937G-Privilege-Escalation.html -CVE-2020-16138 - https://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html -CVE-2020-16139 - http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html -CVE-2020-16140 - https://cybersecurityworks.com/zerodays/cve-2020-16140-thembay.html -CVE-2020-16142 - https://medium.com/@reliable_lait_mouse_975/mercedes-comand-infotainment-improper-format-strings-handling-4c67063d744e -CVE-2020-16143 - https://github.com/haiwen/seafile-client/issues/1309 -CVE-2020-16147 - https://podalirius.net/cves/2020-16147/ -CVE-2020-16147 - https://podalirius.net/en/cves/2020-16147/ -CVE-2020-16148 - https://podalirius.net/cves/2020-16148/ -CVE-2020-16148 - https://podalirius.net/en/cves/2020-16148/ -CVE-2020-16152 - http://packetstormsecurity.com/files/164957/Aerohive-NetConfig-10.0r8a-Local-File-Inclusion-Remote-Code-Execution.html -CVE-2020-16154 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ -CVE-2020-16155 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ -CVE-2020-16156 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ -CVE-2020-16157 - http://packetstormsecurity.com/files/158992/Nagios-Log-Server-2.1.6-Cross-Site-Scripting.html -CVE-2020-16158 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ -CVE-2020-16159 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ -CVE-2020-16160 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ -CVE-2020-16161 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ -CVE-2020-16166 - https://arxiv.org/pdf/2012.07432.pdf -CVE-2020-16166 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638 -CVE-2020-16166 - https://usn.ubuntu.com/4526-1/ -CVE-2020-16166 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-16167 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ -CVE-2020-16168 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ -CVE-2020-16169 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ -CVE-2020-16170 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ -CVE-2020-16171 - http://seclists.org/fulldisclosure/2020/Sep/33 -CVE-2020-16194 - https://github.com/login-securite/CVE/blob/main/CVE-2020-16194.md -CVE-2020-16204 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html -CVE-2020-16204 - http://seclists.org/fulldisclosure/2020/Sep/6 -CVE-2020-16205 - http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html -CVE-2020-16206 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html -CVE-2020-16206 - http://seclists.org/fulldisclosure/2020/Sep/6 -CVE-2020-16208 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html -CVE-2020-16208 - http://seclists.org/fulldisclosure/2020/Sep/6 -CVE-2020-16210 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html -CVE-2020-16210 - http://seclists.org/fulldisclosure/2020/Sep/6 -CVE-2020-16250 - http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html -CVE-2020-16251 - http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html -CVE-2020-16256 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16257 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16258 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16259 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16260 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16261 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16262 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16263 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -CVE-2020-16266 - https://mantisbt.org/bugs/view.php?id=27056 -CVE-2020-16267 - https://www.manageengine.com -CVE-2020-16269 - https://github.com/radareorg/radare2/issues/17383 -CVE-2020-16270 - https://github.com/Security-AVS/CVE-2020-16270 -CVE-2020-16271 - https://danzinger.wien/exploiting-keepassrpc/ -CVE-2020-16271 - https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 -CVE-2020-16272 - https://danzinger.wien/exploiting-keepassrpc/ -CVE-2020-16272 - https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 -CVE-2020-16287 - https://bugs.ghostscript.com/show_bug.cgi?id=701785 -CVE-2020-16288 - https://bugs.ghostscript.com/show_bug.cgi?id=701791 -CVE-2020-16289 - https://bugs.ghostscript.com/show_bug.cgi?id=701788 -CVE-2020-16290 - https://bugs.ghostscript.com/show_bug.cgi?id=701786 -CVE-2020-16291 - https://bugs.ghostscript.com/show_bug.cgi?id=701787 -CVE-2020-16292 - https://bugs.ghostscript.com/show_bug.cgi?id=701793 -CVE-2020-16293 - https://bugs.ghostscript.com/show_bug.cgi?id=701795 -CVE-2020-16294 - https://bugs.ghostscript.com/show_bug.cgi?id=701794 -CVE-2020-16295 - https://bugs.ghostscript.com/show_bug.cgi?id=701796 -CVE-2020-16296 - https://bugs.ghostscript.com/show_bug.cgi?id=701792 -CVE-2020-16297 - https://bugs.ghostscript.com/show_bug.cgi?id=701800 -CVE-2020-16298 - https://bugs.ghostscript.com/show_bug.cgi?id=701799 -CVE-2020-16299 - https://bugs.ghostscript.com/show_bug.cgi?id=701801 -CVE-2020-16300 - https://bugs.ghostscript.com/show_bug.cgi?id=701807 -CVE-2020-16301 - https://bugs.ghostscript.com/show_bug.cgi?id=701808 -CVE-2020-16302 - https://bugs.ghostscript.com/show_bug.cgi?id=701815 -CVE-2020-16303 - https://bugs.ghostscript.com/show_bug.cgi?id=701818 -CVE-2020-16304 - https://bugs.ghostscript.com/show_bug.cgi?id=701816 -CVE-2020-16305 - https://bugs.ghostscript.com/show_bug.cgi?id=701819 -CVE-2020-16306 - https://bugs.ghostscript.com/show_bug.cgi?id=701821 -CVE-2020-16307 - https://bugs.ghostscript.com/show_bug.cgi?id=701822 -CVE-2020-16308 - https://bugs.ghostscript.com/show_bug.cgi?id=701829 -CVE-2020-16309 - https://bugs.ghostscript.com/show_bug.cgi?id=701827 -CVE-2020-16310 - https://bugs.ghostscript.com/show_bug.cgi?id=701828 -CVE-2020-1639 - https://kb.juniper.net/ -CVE-2020-1652 - https://kb.juniper.net/ -CVE-2020-16587 - https://github.com/AcademySoftwareFoundation/openexr/issues/491 -CVE-2020-16588 - https://github.com/AcademySoftwareFoundation/openexr/issues/493 -CVE-2020-16589 - https://github.com/AcademySoftwareFoundation/openexr/issues/494 -CVE-2020-16590 - https://sourceware.org/bugzilla/show_bug.cgi?id=25821 -CVE-2020-16591 - https://sourceware.org/bugzilla/show_bug.cgi?id=25822 -CVE-2020-16592 - https://sourceware.org/bugzilla/show_bug.cgi?id=25823 -CVE-2020-16593 - https://sourceware.org/bugzilla/show_bug.cgi?id=25827 -CVE-2020-16599 - https://sourceware.org/bugzilla/show_bug.cgi?id=25842 -CVE-2020-16600 - https://bugs.ghostscript.com/show_bug.cgi?id=702253 -CVE-2020-16602 - http://packetstormsecurity.com/files/160225/Razer-Chroma-SDK-Server-3.16.02-Race-Condition.html -CVE-2020-16602 - https://www.angelystor.com/2020/09/cve-2020-16602-remote-file-execution-on.html -CVE-2020-16602 - https://www.youtube.com/watch?v=fkESBVhIdIA -CVE-2020-16608 - https://sghosh2402.medium.com/cve-2020-16608-8cdad9f4d9b4 -CVE-2020-16630 - https://www.usenix.org/system/files/sec20-zhang-yue.pdf -CVE-2020-1667 - https://kb.juniper.net/ -CVE-2020-1670 - https://kb.juniper.net/ -CVE-2020-16843 - https://github.com/firecracker-microvm/firecracker/issues/2057 -CVE-2020-16845 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-16846 - http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html -CVE-2020-16846 - https://github.com/saltstack/salt/releases -CVE-2020-16849 - https://blog.scadafence.com/vulnerability-report-cve-2020-16849 -CVE-2020-16850 - https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series -CVE-2020-16875 - http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html -CVE-2020-1693 - https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ -CVE-2020-16947 - http://packetstormsecurity.com/files/169961/Microsoft-Outlook-2019-16.0.13231.20262-Remote-Code-Execution.html -CVE-2020-16952 - http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html -CVE-2020-16984 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1128 -CVE-2020-16985 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1130 -CVE-2020-16990 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1089 -CVE-2020-16991 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1090 -CVE-2020-1700 - https://usn.ubuntu.com/4304-1/ -CVE-2020-1711 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711 -CVE-2020-17113 - http://packetstormsecurity.com/files/160054/Microsoft-Windows-WindowsCodecsRaw-CCanonRawImageRep-GetNamedWhiteBalances-Out-Of-Bounds-Read.html -CVE-2020-1721 - https://bugzilla.redhat.com/show_bug.cgi?id=1777579 -CVE-2020-1730 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-1731 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731 -CVE-2020-1735 - https://github.com/ansible/ansible/issues/67793 -CVE-2020-17352 - https://community.sophos.com/b/security-blog -CVE-2020-17352 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-authenticated-rce-issues-in-user-portal-cve-2020-17352 -CVE-2020-17354 - https://phabricator.wikimedia.org/T259210 -CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Aug/8 -CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/11 -CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/13 -CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/14 -CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Aug/10 -CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/11 -CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/13 -CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/14 -CVE-2020-17364 - https://sysdream.com/news/lab/ -CVE-2020-17365 - https://cymptom.com/cve-2020-17365-hotspot-shield-vpn-new-privilege-escalation-vulnerability/2020/10/ -CVE-2020-17367 - https://github.com/netblue30/firejail -CVE-2020-17368 - https://github.com/netblue30/firejail/ -CVE-2020-17372 - http://packetstormsecurity.com/files/158847/SugarCRM-Cross-Site-Scripting.html -CVE-2020-17372 - http://seclists.org/fulldisclosure/2020/Aug/7 -CVE-2020-17373 - http://packetstormsecurity.com/files/158848/SugarCRM-SQL-Injection.html -CVE-2020-17373 - http://seclists.org/fulldisclosure/2020/Aug/9 -CVE-2020-17381 - https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-17381.md -CVE-2020-17381 - https://github.com/an0ry/advisories/blob/main/CVE-2020-17381.md -CVE-2020-17382 - http://packetstormsecurity.com/files/159315/MSI-Ambient-Link-Driver-1.0.0.8-Privilege-Escalation.html -CVE-2020-17382 - https://www.coresecurity.com/core-labs/advisories/msi-ambient-link-multiple-vulnerabilities -CVE-2020-17448 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram-CVE-2020-17448 -CVE-2020-17449 - https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/ -CVE-2020-1745 - https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/ -CVE-2020-1745 - https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 -CVE-2020-17450 - https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/ -CVE-2020-17451 - https://lists.openwall.net/full-disclosure/2020/08/07/1 -CVE-2020-17451 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/ -CVE-2020-17452 - https://lists.openwall.net/full-disclosure/2020/08/07/1 -CVE-2020-17452 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/ -CVE-2020-17453 - https://github.com/JHHAX/CVE-2020-17453-PoC -CVE-2020-17456 - http://packetstormsecurity.com/files/158933/Seowon-SlC-130-Router-Remote-Code-Execution.html -CVE-2020-17456 - http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html -CVE-2020-17456 - https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated -CVE-2020-17456 - https://www.exploit-db.com/exploits/50821 -CVE-2020-17457 - https://www.gruppotim.it/redteam -CVE-2020-17458 - https://www.gruppotim.it/redteam -CVE-2020-17462 - https://www.exploit-db.com/exploits/48742 -CVE-2020-17463 - http://packetstormsecurity.com/files/158840/Fuel-CMS-1.4.7-SQL-Injection.html -CVE-2020-17466 - https://cxsecurity.com/issue/WLB-2020080046 -CVE-2020-1747 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-17473 - https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8131/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-long-lasting-token-vulnerability -CVE-2020-17479 - https://blog.sonatype.com/cve-2020-17479 -CVE-2020-17479 - https://github.com/manvel-khnkoyan/jpv/issues/10 -CVE-2020-17487 - https://github.com/radareorg/radare2/issues/17431 -CVE-2020-17496 - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ -CVE-2020-17498 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-17505 - http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html -CVE-2020-17506 - http://packetstormsecurity.com/files/158868/Artica-Proxy-4.3.0-Authentication-Bypass.html -CVE-2020-17506 - http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html -CVE-2020-17519 - http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html -CVE-2020-17521 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-17527 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-17527 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-17527 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-17527 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-1753 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753 -CVE-2020-17530 - http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html -CVE-2020-17530 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-17530 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-17530 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-17538 - https://bugs.ghostscript.com/show_bug.cgi?id=701792 -CVE-2020-17541 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 -CVE-2020-1757 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1757 -CVE-2020-17752 - https://github.com/hellowuzekai/blockchains/blob/master/balance.md -CVE-2020-17753 - https://etherscan.io/address/0x340DbA127F099DAB9DC8599C75b16e44D9b02Fdb -CVE-2020-17753 - https://etherscan.io/address/0x5a50C7D96fC68ea2F0bEE06D86CD971c31F85604 -CVE-2020-17753 - https://etherscan.io/address/0xD7aA007C3e7ab454FFE3E20F0b28F926Db295477 -CVE-2020-1790 - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-gauss-en -CVE-2020-17901 - https://github.com/AvaterXXX/PbootCMS/blob/master/CSRF.md -CVE-2020-17952 - https://github.com/twothink/twothink/issues/1 -CVE-2020-18020 - https://gitee.com/koyshe/phpshe/issues/IQ8S8 -CVE-2020-18065 - https://github.com/PopojiCMS/PopojiCMS/issues/16 -CVE-2020-18077 - https://github.com/cve-vul/vul/blob/master/FTPShell/FTPShell_Server_6.83_DOS.md -CVE-2020-18084 - https://github.com/yzmcms/yzmcms/issues/9 -CVE-2020-18114 - https://blog.csdn.net/qq_36093477/article/details/86681178 -CVE-2020-18116 - https://blog.csdn.net/qq_36093477/article/details/98035255 -CVE-2020-18121 - https://github.com/Indexhibit/indexhibit/issues/17 -CVE-2020-18123 - https://github.com/Indexhibit/indexhibit/issues/18 -CVE-2020-18124 - https://github.com/Indexhibit/indexhibit/issues/19 -CVE-2020-18126 - https://github.com/Indexhibit/indexhibit/issues/21 -CVE-2020-18127 - https://github.com/Indexhibit/indexhibit/issues/22 -CVE-2020-18155 - https://github.com/intelliants/subrion/issues/817 -CVE-2020-18157 - https://github.com/je6k/ctf-challenges/blob/master/poc.txt -CVE-2020-18158 - https://www.cnblogs.com/echod/articles/10380909.html -CVE-2020-18175 - https://github.com/sword1991912/metinfo/issues/1 -CVE-2020-18184 - https://github.com/pluxml/PluXml/issues/320 -CVE-2020-18185 - https://github.com/pluxml/PluXml/issues/321 -CVE-2020-18195 - https://github.com/pluck-cms/pluck/issues/69 -CVE-2020-18198 - https://github.com/pluck-cms/pluck/issues/69 -CVE-2020-18215 - https://gitee.com/koyshe/phpshe/issues/ITLK2 -CVE-2020-18215 - https://github.com/lemon666/vuln/blob/master/Phpshe1.7_sql1.md -CVE-2020-18221 - https://github.com/typora/typora-issues/issues/2204 -CVE-2020-18259 - https://github.com/chilin89117/ED01-CMS/issues/1 -CVE-2020-18261 - https://github.com/chilin89117/ED01-CMS/issues/2 -CVE-2020-18265 - https://github.com/github123abc123/bird/issues/1 -CVE-2020-18268 - https://github.com/zblogcn/zblogphp/issues/209 -CVE-2020-18305 - https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c -CVE-2020-18324 - https://github.com/hamm0nz/CVE-2020-18324 -CVE-2020-18325 - https://github.com/hamm0nz/CVE-2020-18325 -CVE-2020-18326 - https://github.com/hamm0nz/CVE-2020-18326 -CVE-2020-18327 - https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8 -CVE-2020-18378 - https://github.com/WebAssembly/binaryen/issues/1900 -CVE-2020-18382 - https://github.com/WebAssembly/binaryen/issues/1900 -CVE-2020-18395 - http://lists.gnu.org/archive/html/bug-gama/2019-04/msg00001.html -CVE-2020-18404 - https://github.com/source-hunter/espcms/issues/1 -CVE-2020-18409 - https://github.com/xwlrbh/Catfish/issues/5 -CVE-2020-18410 - https://github.com/GodEpic/chaojicms/issues/6 -CVE-2020-18413 - https://github.com/GodEpic/chaojicms/issues/5 -CVE-2020-18414 - https://github.com/GodEpic/chaojicms/issues/3 -CVE-2020-18416 - https://github.com/dtorp06/jymusic/issues/1 -CVE-2020-18418 - https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/FeiFeiCMS_4.1_csrf.doc -CVE-2020-18418 - https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/poc -CVE-2020-18442 - https://github.com/gdraheim/zziplib/issues/68 -CVE-2020-18454 - https://github.com/hillerlin/bycms/issues/1 -CVE-2020-18457 - https://github.com/hillerlin/bycms/issues/3 -CVE-2020-18458 - https://github.com/AutismJH/damicms/issues/5 -CVE-2020-18463 - https://github.com/Richard1266/aikcms/issues/2 -CVE-2020-18464 - https://github.com/Richard1266/aikcms/issues/2 -CVE-2020-18467 - https://github.com/bigtreecms/BigTree-CMS/issues/364 -CVE-2020-18568 - https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a -CVE-2020-18568 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-18648 - https://github.com/GodEpic/JuQingCMS/issues/1 -CVE-2020-18651 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/13 -CVE-2020-18652 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/12 -CVE-2020-18654 - https://github.com/wuzhicms/wuzhicms/issues/174 -CVE-2020-18662 - https://www.seebug.org/vuldb/ssvid-97927 -CVE-2020-18668 - https://www.seebug.org/vuldb/ssvid-97996 -CVE-2020-18694 - https://github.com/ignitedcms/ignitedcms/issues/5 -CVE-2020-18713 - https://www.seebug.org/vuldb/ssvid-97859 -CVE-2020-18723 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html -CVE-2020-18724 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html -CVE-2020-18734 - https://github.com/eclipse-cyclonedds/cyclonedds -CVE-2020-18734 - https://github.com/eclipse-cyclonedds/cyclonedds/issues/476 -CVE-2020-18735 - https://github.com/eclipse-cyclonedds/cyclonedds -CVE-2020-18735 - https://github.com/eclipse-cyclonedds/cyclonedds/issues/501 -CVE-2020-18737 - https://github.com/typora/typora-issues/issues/2289 -CVE-2020-18746 - https://github.com/kk98kk0/exploit/issues/3 -CVE-2020-18748 - https://github.com/typora -CVE-2020-18753 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_start-stop.md -CVE-2020-18754 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak.md -CVE-2020-18756 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_read.md -CVE-2020-18757 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_DOS.md -CVE-2020-18758 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_upload.md -CVE-2020-18759 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak2.md -CVE-2020-18766 - https://github.com/AntSwordProject/antSword/issues/147 -CVE-2020-18770 - https://github.com/gdraheim/zziplib/issues/69 -CVE-2020-18771 - https://github.com/Exiv2/exiv2/issues/756 -CVE-2020-18773 - https://github.com/Exiv2/exiv2/issues/760 -CVE-2020-18774 - https://github.com/Exiv2/exiv2/issues/759 -CVE-2020-18775 - https://bugzilla.libav.org/show_bug.cgi?id=1152 -CVE-2020-18776 - https://bugzilla.libav.org/show_bug.cgi?id=1153 -CVE-2020-18778 - https://bugzilla.libav.org/show_bug.cgi?id=1155 -CVE-2020-18781 - https://github.com/mpruett/audiofile/issues/56 -CVE-2020-18831 - https://github.com/Exiv2/exiv2/issues/828 -CVE-2020-18839 - https://gitlab.freedesktop.org/poppler/poppler/issues/742 -CVE-2020-1885 - https://www.facebook.com/security/advisories/cve-2020-1885 -CVE-2020-1887 - https://github.com/osquery/osquery/pull/6197 -CVE-2020-18878 - https://github.com/zorlan/skycaiji/issues/13 -CVE-2020-18889 - https://github.com/choregus/puppyCMS/issues/13 -CVE-2020-18897 - https://github.com/libyal/libpff/issues/61 -CVE-2020-18897 - https://github.com/libyal/libpff/issues/62 -CVE-2020-18898 - https://github.com/Exiv2/exiv2/issues/741 -CVE-2020-18899 - https://github.com/Exiv2/exiv2/issues/742 -CVE-2020-18900 - https://github.com/libyal/libexe/issues/1 -CVE-2020-18964 - https://github.com/saysky/ForestBlog/issues/20 -CVE-2020-18971 - https://sourceforge.net/p/podofo/tickets/48/ -CVE-2020-18972 - https://sourceforge.net/p/podofo/tickets/49/ -CVE-2020-18974 - https://bugzilla.nasm.us/show_bug.cgi?id=3392568 -CVE-2020-18976 - https://github.com/appneta/tcpreplay/issues/556 -CVE-2020-18984 - https://github.com/buxu/bug/issues/2 -CVE-2020-19107 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/9 -CVE-2020-19108 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10 -CVE-2020-19109 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12 -CVE-2020-19110 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11 -CVE-2020-19112 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/13 -CVE-2020-19113 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/15 -CVE-2020-19114 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/8 -CVE-2020-19118 - https://github.com/yzmcms/yzmcms/issues/14 -CVE-2020-1913 - https://www.facebook.com/security/advisories/cve-2020-1913 -CVE-2020-19131 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/ -CVE-2020-19131 - http://bugzilla.maptools.org/show_bug.cgi?id=2831 -CVE-2020-1915 - https://www.facebook.com/security/advisories/cve-2020-1915 -CVE-2020-19150 - https://www.seebug.org/vuldb/ssvid-97885 -CVE-2020-19151 - https://www.seebug.org/vuldb/ssvid-97881 -CVE-2020-19154 - https://www.seebug.org/vuldb/ssvid-97882 -CVE-2020-19165 - https://github.com/Mint60/PHP/issues/1 -CVE-2020-19185 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md -CVE-2020-19186 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md -CVE-2020-19187 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md -CVE-2020-19188 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md -CVE-2020-19189 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md -CVE-2020-19190 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md -CVE-2020-19199 - https://github.com/qinggan/phpok/issues/5 -CVE-2020-19263 - https://github.com/sansanyun/mipcms5/issues/4 -CVE-2020-19264 - https://github.com/sansanyun/mipcms5/issues/4 -CVE-2020-19265 - https://github.com/tifaweb/Dswjcms/issues/4 -CVE-2020-19266 - https://github.com/tifaweb/Dswjcms/issues/5 -CVE-2020-1927 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-1927 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1927 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-19280 - https://github.com/zchuanzhao/jeesns/issues/9 -CVE-2020-19280 - https://www.seebug.org/vuldb/ssvid-97938 -CVE-2020-19283 - https://www.seebug.org/vuldb/ssvid-97939 -CVE-2020-19284 - https://www.seebug.org/vuldb/ssvid-97944 -CVE-2020-19286 - https://www.seebug.org/vuldb/ssvid-97942 -CVE-2020-19290 - https://www.seebug.org/vuldb/ssvid-97949 -CVE-2020-19292 - https://www.seebug.org/vuldb/ssvid-97953 -CVE-2020-19294 - https://www.seebug.org/vuldb/ssvid-97952 -CVE-2020-19295 - https://www.seebug.org/vuldb/ssvid-97950 -CVE-2020-19301 - https://github.com/tingyuu/vaeThink/issues/1 -CVE-2020-19302 - https://github.com/tingyuu/vaeThink/issues/2 -CVE-2020-19305 - https://github.com/MRdoulestar/CodeAnalyse/issues/2 -CVE-2020-19316 - http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/ -CVE-2020-19319 - https://github.com/hhhhu8045759/dir_619l-buffer-overflow -CVE-2020-19320 - https://github.com/hhhhu8045759/dlink-619l-buffer_overflow -CVE-2020-19320 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-19323 - https://github.com/hhhhu8045759/619L_upnpd_heapoverflow -CVE-2020-19323 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-1934 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1935 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-1935 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1935 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-19360 - https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability -CVE-2020-19361 - https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability -CVE-2020-19362 - https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/ -CVE-2020-19363 - https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/ -CVE-2020-19364 - https://github.com/EmreOvunc/OpenEMR_Vulnerabilities -CVE-2020-1938 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-1938 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1938 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-1941 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-1941 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-1941 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1941 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-19417 - http://packetstormsecurity.com/files/161700/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Privilege-Escalation.html -CVE-2020-19419 - http://packetstormsecurity.com/files/161701/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Missing-Authentication.html -CVE-2020-1945 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-19463 - https://github.com/flexpaper/pdf2json/issues/24 -CVE-2020-19464 - https://github.com/flexpaper/pdf2json/issues/25 -CVE-2020-19465 - https://github.com/flexpaper/pdf2json/issues/26 -CVE-2020-19466 - https://github.com/flexpaper/pdf2json/issues/27 -CVE-2020-19467 - https://github.com/flexpaper/pdf2json/issues/28 -CVE-2020-19468 - https://github.com/flexpaper/pdf2json/issues/29 -CVE-2020-19469 - https://github.com/flexpaper/pdf2json/issues/30 -CVE-2020-19470 - https://github.com/flexpaper/pdf2json/issues/31 -CVE-2020-19471 - https://github.com/flexpaper/pdf2json/issues/32 -CVE-2020-19472 - https://github.com/flexpaper/pdf2json/issues/33 -CVE-2020-19473 - https://github.com/flexpaper/pdf2json/issues/34 -CVE-2020-19474 - https://github.com/flexpaper/pdf2json/issues/35 -CVE-2020-19475 - https://github.com/flexpaper/pdf2json/issues/36 -CVE-2020-19481 - https://github.com/gpac/gpac/issues/1265 -CVE-2020-19481 - https://github.com/gpac/gpac/issues/1266 -CVE-2020-19481 - https://github.com/gpac/gpac/issues/1267 -CVE-2020-19488 - https://github.com/gpac/gpac/issues/1263 -CVE-2020-19490 - https://github.com/syoyo/tinyexr/issues/124 -CVE-2020-19491 - https://github.com/pts/sam2p/issues/67 -CVE-2020-19492 - https://github.com/pts/sam2p/issues/66 -CVE-2020-19497 - https://github.com/tbeu/matio/issues/121 -CVE-2020-19498 - https://github.com/strukturag/libheif/issues/139 -CVE-2020-19499 - https://github.com/strukturag/libheif/issues/138 -CVE-2020-1950 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1950 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-1951 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1951 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-19513 - https://www.exploit-db.com/exploits/46991 -CVE-2020-1953 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-1954 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-19559 - https://medium.com/nightst0rm/t%E1%BA%A3n-m%E1%BA%A1n-v%E1%BB%81-l%E1%BB%97-h%E1%BB%95ng-trong-atm-diebold-f1040a70f2c9 -CVE-2020-19609 - https://bugs.ghostscript.com/show_bug.cgi?id=701176 -CVE-2020-19613 - https://github.com/sunkaifei/FlyCms/issues/1 -CVE-2020-19616 - https://github.com/langhsu/mblog/issues/27 -CVE-2020-19617 - https://github.com/langhsu/mblog/issues/27 -CVE-2020-19618 - https://github.com/langhsu/mblog/issues/27 -CVE-2020-19619 - https://github.com/langhsu/mblog/issues/27 -CVE-2020-19626 - http://mayoterry.com/file/cve/XSS_vuluerability_in_Craftcms_3.1.31.pdf -CVE-2020-1963 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-19639 - https://xn--sb-lka.org/cve/INSMA.txt -CVE-2020-19640 - https://xn--sb-lka.org/cve/INSMA.txt -CVE-2020-19641 - https://xn--sb-lka.org/cve/INSMA.txt -CVE-2020-19642 - https://xn--sb-lka.org/cve/INSMA.txt -CVE-2020-19643 - https://xn--sb-lka.org/cve/INSMA.txt -CVE-2020-19664 - https://github.com/minghangshen/bug_poc -CVE-2020-19664 - https://nosec.org/home/detail/4631.html -CVE-2020-19667 - https://github.com/ImageMagick/ImageMagick/issues/1895 -CVE-2020-19668 - https://github.com/saitoha/libsixel/issues/136 -CVE-2020-19669 - https://github.com/eyoucms/eyoucms/issues/4 -CVE-2020-1967 - http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html -CVE-2020-1967 - http://seclists.org/fulldisclosure/2020/May/5 -CVE-2020-1967 - https://github.com/irsl/CVE-2020-1967 -CVE-2020-1967 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-1967 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-1967 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-1967 - https://www.tenable.com/security/tns-2020-04 -CVE-2020-1967 - https://www.tenable.com/security/tns-2020-11 -CVE-2020-1967 - https://www.tenable.com/security/tns-2021-10 -CVE-2020-19670 - https://github.com/bluecity/CMS/blob/master/niushop%20v1.11-passwd/Niushop%20V1.11.md -CVE-2020-19672 - https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md -CVE-2020-19678 - https://pastebin.com/8dj59053 -CVE-2020-1968 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-1968 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-19682 - https://zhhhy.github.io/2019/06/28/zzzcms/ -CVE-2020-19683 - https://zhhhy.github.io/2019/06/28/zzzcms/ -CVE-2020-19692 - https://github.com/nginx/njs/issues/187 -CVE-2020-19693 - https://github.com/espruino/Espruino/issues/1684 -CVE-2020-19695 - https://github.com/nginx/njs/issues/188 -CVE-2020-19698 - https://github.com/pandao/editor.md/issues/700 -CVE-2020-1971 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-1971 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-1971 - https://www.tenable.com/security/tns-2020-11 -CVE-2020-1971 - https://www.tenable.com/security/tns-2021-09 -CVE-2020-1971 - https://www.tenable.com/security/tns-2021-10 -CVE-2020-19716 - https://github.com/Exiv2/exiv2/issues/980 -CVE-2020-19717 - https://github.com/axiomatic-systems/Bento4/issues/416 -CVE-2020-19718 - https://github.com/axiomatic-systems/Bento4/issues/417 -CVE-2020-19719 - https://github.com/axiomatic-systems/Bento4/issues/414 -CVE-2020-19720 - https://github.com/axiomatic-systems/Bento4/issues/413 -CVE-2020-19721 - https://github.com/axiomatic-systems/Bento4/issues/415 -CVE-2020-19722 - https://github.com/axiomatic-systems/Bento4/issues/418 -CVE-2020-19724 - https://sourceware.org/bugzilla/show_bug.cgi?id=25362 -CVE-2020-19725 - https://github.com/Z3Prover/z3/issues/3363 -CVE-2020-19726 - https://sourceware.org/bugzilla/show_bug.cgi?id=26240 -CVE-2020-19726 - https://sourceware.org/bugzilla/show_bug.cgi?id=26241 -CVE-2020-19752 - https://github.com/kohler/gifsicle/issues/140 -CVE-2020-19762 - https://github.com/ismailerkek/CVEs/blob/main/CVE-2020-19762-RESERVED.md -CVE-2020-19877 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#1 -CVE-2020-19878 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#2 -CVE-2020-19879 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#3 -CVE-2020-19880 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#4 -CVE-2020-19881 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#6 -CVE-2020-19882 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#7 -CVE-2020-19883 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#5 -CVE-2020-19884 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#8 -CVE-2020-19885 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#9 -CVE-2020-19886 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#12 -CVE-2020-19887 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#10 -CVE-2020-19888 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#13 -CVE-2020-19889 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#11 -CVE-2020-19890 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#15 -CVE-2020-19891 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#14 -CVE-2020-19897 - https://github.com/wuzhicms/wuzhicms/issues/183 -CVE-2020-19902 - https://github.com/vedees/wcms/issues/3 -CVE-2020-19914 - https://kevinoclam.github.io/blog/2019/07/31/xiunobbs-upload/ -CVE-2020-19915 - https://gist.github.com/feixuezhi/7a1b117e1a4800efb3b6fffe76ca0e97 -CVE-2020-19915 - https://github.com/wuzhicms/wuzhicms/issues/173 -CVE-2020-19949 - https://github.com/yzmcms/yzmcms/issues/21 -CVE-2020-19950 - https://github.com/yzmcms/yzmcms/issues/22 -CVE-2020-19951 - https://github.com/yzmcms/yzmcms/issues/43 -CVE-2020-19962 - https://github.com/zhuxianjin/vuln_repo/blob/master/chaojicms_stored_xss.md -CVE-2020-19964 - https://github.com/gaozhifeng/PHPMyWind -CVE-2020-19964 - https://github.com/gaozhifeng/PHPMyWind/issues/9 -CVE-2020-20021 - https://www.exploit-db.com/exploits/48228 -CVE-2020-20067 - https://github.com/a932278490/ebcms/issues/1 -CVE-2020-20070 - https://github.com/wkeyuan/DWSurvey/issues/48 -CVE-2020-20093 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html -CVE-2020-20093 - https://github.com/zadewg/RIUS -CVE-2020-20094 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html -CVE-2020-20094 - https://github.com/zadewg/RIUS -CVE-2020-20095 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html -CVE-2020-20095 - https://github.com/zadewg/RIUS -CVE-2020-20096 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html -CVE-2020-20096 - https://github.com/zadewg/RIUS -CVE-2020-20124 - https://github.com/wuzhicms/wuzhicms/issues/188 -CVE-2020-20136 - https://github.com/QuantConnect/Lean/issues/3537 -CVE-2020-20138 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html -CVE-2020-20139 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html -CVE-2020-20140 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html -CVE-2020-20141 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html -CVE-2020-20142 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html -CVE-2020-20184 - https://github.com/liftoff/GateOne/issues/736 -CVE-2020-20211 - http://seclists.org/fulldisclosure/2021/May/0 -CVE-2020-20212 - http://seclists.org/fulldisclosure/2021/May/0 -CVE-2020-20213 - http://seclists.org/fulldisclosure/2021/May/10 -CVE-2020-20214 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html -CVE-2020-20214 - http://seclists.org/fulldisclosure/2021/May/15 -CVE-2020-20215 - http://seclists.org/fulldisclosure/2021/May/10 -CVE-2020-20216 - http://seclists.org/fulldisclosure/2021/May/10 -CVE-2020-20217 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20217/README.md -CVE-2020-20218 - https://seclists.org/fulldisclosure/2021/May/1 -CVE-2020-20219 - https://seclists.org/fulldisclosure/2021/May/2 -CVE-2020-20220 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html -CVE-2020-20220 - http://seclists.org/fulldisclosure/2021/May/23 -CVE-2020-20221 - https://seclists.org/fulldisclosure/2021/May/1 -CVE-2020-20222 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html -CVE-2020-20222 - http://seclists.org/fulldisclosure/2021/May/15 -CVE-2020-20225 - http://seclists.org/fulldisclosure/2021/May/12 -CVE-2020-20227 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html -CVE-2020-20227 - http://seclists.org/fulldisclosure/2021/May/23 -CVE-2020-2023 - https://github.com/kata-containers/runtime/pull/2477 -CVE-2020-20230 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20230/README.md -CVE-2020-20231 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20231/README.md -CVE-2020-20236 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html -CVE-2020-20236 - http://seclists.org/fulldisclosure/2021/May/15 -CVE-2020-20237 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html -CVE-2020-20237 - http://seclists.org/fulldisclosure/2021/May/15 -CVE-2020-2024 - https://github.com/kata-containers/runtime/issues/2474 -CVE-2020-20245 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html -CVE-2020-20245 - http://seclists.org/fulldisclosure/2021/May/23 -CVE-2020-20246 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html -CVE-2020-20246 - http://seclists.org/fulldisclosure/2021/May/23 -CVE-2020-20248 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20248/README.md -CVE-2020-20249 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20249/README.md -CVE-2020-20250 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20250/README.md -CVE-2020-20252 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20252/README.md -CVE-2020-20253 - http://seclists.org/fulldisclosure/2021/May/14 -CVE-2020-20253 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_4/README.md -CVE-2020-20254 - http://seclists.org/fulldisclosure/2021/May/14 -CVE-2020-20254 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_2/README.md -CVE-2020-20262 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_ipsec/README.md -CVE-2020-20262 - https://seclists.org/fulldisclosure/2021/May/2 -CVE-2020-20264 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_netwatch/README.md -CVE-2020-20264 - https://seclists.org/fulldisclosure/2021/May/11 -CVE-2020-20265 - http://seclists.org/fulldisclosure/2021/May/12 -CVE-2020-20265 - https://seclists.org/fulldisclosure/2021/May/11 -CVE-2020-20266 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_dot1x/README.md -CVE-2020-20266 - https://seclists.org/fulldisclosure/2021/May/11 -CVE-2020-20267 - http://seclists.org/fulldisclosure/2021/May/12 -CVE-2020-20269 - http://packetstormsecurity.com/files/161072/Caret-Editor-4.0.0-rc21-Remote-Code-Execution.html -CVE-2020-20276 - https://arinerron.com/blog/posts/6 -CVE-2020-20277 - http://packetstormsecurity.com/files/167908/uftpd-2.10-Directory-Traversal.html -CVE-2020-20277 - https://arinerron.com/blog/posts/6 -CVE-2020-20285 - https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md -CVE-2020-20335 - https://github.com/antirez/kilo/issues/60 -CVE-2020-20340 - https://github.com/mntn0x/POC/blob/master/S-CMS/S-CMS-SQL%E6%B3%A8%E5%85%A5.md -CVE-2020-20343 - https://github.com/taosir/wtcms/issues/8 -CVE-2020-20344 - https://github.com/taosir/wtcms/issues/9 -CVE-2020-20345 - https://github.com/taosir/wtcms -CVE-2020-20345 - https://github.com/taosir/wtcms/issues/10 -CVE-2020-20347 - https://github.com/taosir/wtcms/issues/11 -CVE-2020-20348 - https://github.com/taosir/wtcms/issues/11 -CVE-2020-20349 - https://github.com/taosir/wtcms/issues/11 -CVE-2020-2035 - https://www.mnemonic.no/blog/introducing-snicat/ -CVE-2020-2036 - https://security.paloaltonetworks.com/CVE-2020-2036 -CVE-2020-2037 - https://security.paloaltonetworks.com/CVE-2020-2037 -CVE-2020-2038 - http://packetstormsecurity.com/files/168008/PAN-OS-10.0-Remote-Code-Execution.html -CVE-2020-2038 - http://packetstormsecurity.com/files/168408/Palo-Alto-Networks-Authenticated-Remote-Code-Execution.html -CVE-2020-2038 - https://security.paloaltonetworks.com/CVE-2020-2038 -CVE-2020-2039 - https://security.paloaltonetworks.com/CVE-2020-2039 -CVE-2020-20412 - https://github.com/stepmania/stepmania/issues/1890 -CVE-2020-20444 - https://github.com/jact/openclinic/issues/8 -CVE-2020-20451 - https://trac.ffmpeg.org/ticket/8094 -CVE-2020-20466 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20467 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20468 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20469 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20470 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20471 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20472 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20473 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20474 - https://github.com/itodaro/WhiteSharkSystem_cve -CVE-2020-20502 - https://github.com/yzmcms/yzmcms/issues/27 -CVE-2020-20514 - https://github.com/magicblack/maccms10/issues/76 -CVE-2020-20521 - https://github.com/Kitesky/KiteCMS/issues/1 -CVE-2020-20522 - https://github.com/Kitesky/KiteCMS/issues/1 -CVE-2020-20582 - https://github.com/sansanyun/mipcms5/issues/5 -CVE-2020-20583 - https://github.com/0xyu/PHP_Learning/issues/1 -CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO -CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO/ -CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO/issues/13 -CVE-2020-20585 - https://github.com/0xyu/PHP_Learning/issues/3 -CVE-2020-20586 - https://github.com/0xyu/PHP_Learning/issues/4 -CVE-2020-20589 - https://github.com/liufee/cms/issues/45 -CVE-2020-20593 - https://github.com/alixiaowei/alixiaowei.github.io/issues/1 -CVE-2020-20595 - https://github.com/lock-upme/OPMS/issues/25 -CVE-2020-20597 - https://github.com/xuhuisheng/lemon/issues/198 -CVE-2020-20598 - https://github.com/xuhuisheng/lemon/issues/199 -CVE-2020-20600 - https://github.com/alixiaowei/cve_test/issues/2 -CVE-2020-20640 - https://www.jianshu.com/p/219755c047a1 -CVE-2020-20642 - https://github.com/eyoucms/eyoucms/issues/5 -CVE-2020-20670 - https://github.com/yilezhu/Czar.Cms/issues/6 -CVE-2020-20671 - https://github.com/Kitesky/KiteCMS/issues/3 -CVE-2020-20672 - https://github.com/Kitesky/KiteCMS/issues/3 -CVE-2020-20693 - https://github.com/GilaCMS/gila/issues/51 -CVE-2020-20695 - https://github.com/GilaCMS/gila/issues/52 -CVE-2020-20703 - https://github.com/vim/vim/issues/5041 -CVE-2020-20726 - https://github.com/GilaCMS/gila/issues/51 -CVE-2020-20740 - https://github.com/enferex/pdfresurrect/issues/14 -CVE-2020-20797 - https://github.com/FlameNET/FlameCMS/issues/26 -CVE-2020-20799 - https://github.com/blackjliuyun/cvetest/issues/1 -CVE-2020-20808 - https://github.com/alorfm/vuln/blob/master/qibosoft_cross_Site_Scripting.md -CVE-2020-20891 - https://trac.ffmpeg.org/ticket/8282 -CVE-2020-20892 - https://trac.ffmpeg.org/ticket/8265 -CVE-2020-20896 - https://trac.ffmpeg.org/ticket/8273 -CVE-2020-20898 - https://trac.ffmpeg.org/ticket/8263 -CVE-2020-20902 - https://trac.ffmpeg.org/ticket/8176 -CVE-2020-20907 - https://github.com/cby234/cve_request/issues/1 -CVE-2020-20907 - https://github.com/cby234/cve_request/issues/2 -CVE-2020-20908 - https://packetstormsecurity.com/files/154691/Akaunting-1.3.17-Cross-Site-Scripting.html -CVE-2020-20943 - https://blog.csdn.net/he_and/article/details/102698171 -CVE-2020-20944 - https://blog.csdn.net/he_and/article/details/102698171 -CVE-2020-20945 - https://blog.csdn.net/he_and/article/details/102698171 -CVE-2020-20946 - https://blog.csdn.net/he_and/article/details/102698171 -CVE-2020-20949 - https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb -CVE-2020-20950 - http://microchip.com -CVE-2020-20950 - https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb -CVE-2020-2096 - http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html -CVE-2020-20971 - https://github.com/TplusSs/PbootCMS/issues/1 -CVE-2020-20975 - https://blog.csdn.net/qq_41770175/article/details/93486383 -CVE-2020-20988 - https://mycvee.blogspot.com/p/xss2.html -CVE-2020-20989 - https://mycvee.blogspot.com/p/csrf.html -CVE-2020-20990 - https://mycvee.blogspot.com/p/xss1.html -CVE-2020-21012 - https://github.com/hitIer/web_test/tree/master/hotel -CVE-2020-21013 - https://github.com/emlog/emlog/issues/52 -CVE-2020-21014 - https://github.com/emlog/emlog/issues/53 -CVE-2020-21016 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/GuestWLanSetting_RCE.md -CVE-2020-21016 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-21038 - https://github.com/typecho/typecho/issues/952 -CVE-2020-21046 - https://medium.com/@n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0 -CVE-2020-21048 - https://github.com/saitoha/libsixel/blob/master/ChangeLog -CVE-2020-21048 - https://github.com/saitoha/libsixel/issues/73 -CVE-2020-21049 - https://github.com/saitoha/libsixel/blob/master/ChangeLog -CVE-2020-21049 - https://github.com/saitoha/libsixel/issues/74 -CVE-2020-21050 - https://github.com/saitoha/libsixel/blob/master/ChangeLog -CVE-2020-21050 - https://github.com/saitoha/libsixel/issues/75 -CVE-2020-21058 - https://github.com/typora/typora-issues/issues/2959 -CVE-2020-21060 - https://github.com/gaozhifeng/PHPMyWind/issues/10 -CVE-2020-21066 - https://github.com/axiomatic-systems/Bento4/issues/408 -CVE-2020-21120 - https://github.com/alixiaowei/cve_test/issues/3 -CVE-2020-21126 - https://github.com/Echox1/metinfo_csrf/issues/1 -CVE-2020-21130 - https://github.com/hisiphp/hisiphp/issues/7 -CVE-2020-21139 - https://github.com/Ryan0lb/EC-cloud-e-commerce-system-CVE-application/blob/master/README.md -CVE-2020-21141 - https://github.com/hxcc/just_for_fun/blob/master/ICMS%20CSRF -CVE-2020-21142 - https://bugzilla.ipfire.org/show_bug.cgi?id=12226 -CVE-2020-21146 - https://github.com/liufee/cms/issues/43 -CVE-2020-21147 - https://blog.csdn.net/adminxw/article/details/102881463 -CVE-2020-21147 - https://github.com/alixiaowei/alixiaowei.github.io/issues/2 -CVE-2020-21161 - https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html -CVE-2020-21179 - https://github.com/wclimb/Koa2-blog/issues/40 -CVE-2020-21180 - https://github.com/wclimb/Koa2-blog/issues/41 -CVE-2020-21228 - https://github.com/Cherry-toto/jizhicms -CVE-2020-21236 - https://github.com/wind-cyber/DamiCMS-v6.0.0-have-csrf-and-xss-Vulnerabilities-/blob/master/README.md -CVE-2020-21246 - https://github.com/yongshengli/yiicms/issues/6 -CVE-2020-21268 - https://github.com/easysoft/zentaopms/issues/40 -CVE-2020-21325 - https://github.com/wuzhicms/wuzhicms/issues/188 -CVE-2020-21356 - https://github.com/PopojiCMS/PopojiCMS/issues/23 -CVE-2020-21357 - https://github.com/PopojiCMS/PopojiCMS/issues/24 -CVE-2020-21366 - https://github.com/GreenCMS/GreenCMS/issues/115 -CVE-2020-21400 - https://github.com/gaozhifeng/PHPMyWind/issues/11 -CVE-2020-21480 - https://www.porlockz.com/A-arbitrary-file-write-vulnerability-in-RGCMS-V1-06/ -CVE-2020-21481 - https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-RGCMS-V1-06/ -CVE-2020-21482 - https://www.porlockz.com/A-xss-vulnerability-in-RGCMS-V1-06/ -CVE-2020-21483 - https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-jizhicms-v1-5/ -CVE-2020-21485 - https://github.com/Alluxio/alluxio/issues/10552 -CVE-2020-21493 - https://github.com/wanghaiwei/xiuno-docker/issues/3 -CVE-2020-21494 - https://github.com/wanghaiwei/xiuno-docker/issues/4 -CVE-2020-21495 - https://github.com/wanghaiwei/xiuno-docker/issues/5 -CVE-2020-21496 - https://github.com/wanghaiwei/xiuno-docker/issues/5 -CVE-2020-21503 - https://github.com/caokang/waimai/issues/15 -CVE-2020-21517 - https://github.com/lvyyevd/cms/blob/master/metinfo/metinfo7.0.0.md -CVE-2020-21529 - https://sourceforge.net/p/mcj/tickets/65/ -CVE-2020-21530 - https://sourceforge.net/p/mcj/tickets/61/ -CVE-2020-21531 - https://sourceforge.net/p/mcj/tickets/63/ -CVE-2020-21532 - https://sourceforge.net/p/mcj/tickets/64/ -CVE-2020-21533 - https://sourceforge.net/p/mcj/tickets/59/ -CVE-2020-21534 - https://sourceforge.net/p/mcj/tickets/58/ -CVE-2020-21535 - https://sourceforge.net/p/mcj/tickets/62/ -CVE-2020-21547 - https://github.com/saitoha/libsixel/issues/114 -CVE-2020-21548 - https://github.com/saitoha/libsixel/issues/116 -CVE-2020-21564 - https://github.com/pluck-cms/pluck/issues/83 -CVE-2020-21583 - https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html -CVE-2020-21585 - https://github.com/pwnninja/emlog/issues/1 -CVE-2020-21594 - https://github.com/strukturag/libde265/issues/233 -CVE-2020-21595 - https://github.com/strukturag/libde265/issues/239 -CVE-2020-21596 - https://github.com/strukturag/libde265/issues/236 -CVE-2020-21597 - https://github.com/strukturag/libde265/issues/238 -CVE-2020-21598 - https://github.com/strukturag/libde265/issues/237 -CVE-2020-21599 - https://github.com/strukturag/libde265/issues/235 -CVE-2020-21600 - https://github.com/strukturag/libde265/issues/243 -CVE-2020-21601 - https://github.com/strukturag/libde265/issues/241 -CVE-2020-21602 - https://github.com/strukturag/libde265/issues/242 -CVE-2020-21603 - https://github.com/strukturag/libde265/issues/240 -CVE-2020-21604 - https://github.com/strukturag/libde265/issues/231 -CVE-2020-21605 - https://github.com/strukturag/libde265/issues/234 -CVE-2020-21606 - https://github.com/strukturag/libde265/issues/232 -CVE-2020-21643 - https://github.com/Neeke/HongCMS/issues/15 -CVE-2020-21658 - https://github.com/shadoweb/wdja/issues/10 -CVE-2020-21667 - https://github.com/che-my/fastadmin-tp6/issues/2 -CVE-2020-21675 - https://sourceforge.net/p/mcj/tickets/78/ -CVE-2020-21676 - https://sourceforge.net/p/mcj/tickets/76/ -CVE-2020-21677 - https://github.com/saitoha/libsixel/issues/123 -CVE-2020-21678 - https://sourceforge.net/p/mcj/tickets/71/ -CVE-2020-21679 - https://sourceforge.net/p/graphicsmagick/bugs/619/ -CVE-2020-21680 - https://sourceforge.net/p/mcj/tickets/74/ -CVE-2020-21681 - https://sourceforge.net/p/mcj/tickets/73/ -CVE-2020-21682 - https://sourceforge.net/p/mcj/tickets/72/ -CVE-2020-21683 - https://sourceforge.net/p/mcj/tickets/77/ -CVE-2020-21684 - https://sourceforge.net/p/mcj/tickets/75/ -CVE-2020-21688 - https://trac.ffmpeg.org/ticket/8186 -CVE-2020-21697 - https://trac.ffmpeg.org/ticket/8188 -CVE-2020-21699 - https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx -CVE-2020-21710 - https://bugs.ghostscript.com/show_bug.cgi?id=701843 -CVE-2020-21725 - https://github.com/CoColizdf/CVE/issues/1 -CVE-2020-21726 - https://github.com/CoColizdf/CVE/issues/2 -CVE-2020-21729 - https://github.com/CoColizdf/CVE/issues/3 -CVE-2020-21806 - https://github.com/ectouch/ectouch/issues/5 -CVE-2020-21808 - https://whitehub.net/submissions/1516 -CVE-2020-21809 - https://whitehub.net/submissions/1517 -CVE-2020-21809 - https://whitehub.net/submissions/1518 -CVE-2020-21813 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890969 -CVE-2020-21814 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083 -CVE-2020-21815 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932 -CVE-2020-21816 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 -CVE-2020-21817 - https://github.com/LibreDWG/libredwg/issues/182#issue-547887727 -CVE-2020-21818 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053 -CVE-2020-21819 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901 -CVE-2020-21827 - https://github.com/LibreDWG/libredwg/issues/183 -CVE-2020-21830 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493134 -CVE-2020-21831 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267 -CVE-2020-21832 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492612 -CVE-2020-21833 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493364 -CVE-2020-21834 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 -CVE-2020-21835 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046 -CVE-2020-21836 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493437 -CVE-2020-21838 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492816 -CVE-2020-21839 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492707 -CVE-2020-21840 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493513 -CVE-2020-21841 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493775 -CVE-2020-21842 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684 -CVE-2020-21843 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857 -CVE-2020-21844 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607 -CVE-2020-21845 - https://vyshnavvizz.blogspot.com/2020/01/html-injection-in-codoforum-v483.html -CVE-2020-21881 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG -CVE-2020-21883 - https://s3curityb3ast.github.io/KSA-Dev-009.txt -CVE-2020-21883 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07140.html -CVE-2020-21884 - https://s3curityb3ast.github.io/KSA-Dev-008.txt -CVE-2020-21884 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07139.html -CVE-2020-21890 - https://bugs.ghostscript.com/show_bug.cgi?id=701846 -CVE-2020-21896 - https://bugs.ghostscript.com/show_bug.cgi?id=701294 -CVE-2020-21913 - https://unicode-org.atlassian.net/browse/ICU-20850 -CVE-2020-21929 - https://github.com/eyoucms/eyoucms/issues/8 -CVE-2020-21930 - https://github.com/eyoucms/eyoucms/issues/9 -CVE-2020-21932 - https://github.com/cc-crack/router/blob/master/motocx2.md -CVE-2020-21932 - https://l0n0l.xyz/post/motocx2/ -CVE-2020-21933 - https://github.com/cc-crack/router/blob/master/motocx2.md -CVE-2020-21933 - https://l0n0l.xyz/post/motocx2/ -CVE-2020-21934 - https://github.com/cc-crack/router/blob/master/motocx2.md -CVE-2020-21934 - https://l0n0l.xyz/post/motocx2/ -CVE-2020-21935 - https://github.com/cc-crack/router/blob/master/motocx2.md -CVE-2020-21935 - https://l0n0l.xyz/post/motocx2/ -CVE-2020-21936 - https://github.com/cc-crack/router/blob/master/motocx2.md -CVE-2020-21936 - https://l0n0l.xyz/post/motocx2/ -CVE-2020-21937 - https://github.com/cc-crack/router/blob/master/motocx2.md -CVE-2020-21937 - https://l0n0l.xyz/post/motocx2/ -CVE-2020-21967 - http://packetstormsecurity.com/files/167742/PrestaShop-1.7.6.7-Cross-Site-Scripting.html -CVE-2020-21976 - https://cxsecurity.com/issue/WLB-2020010143 -CVE-2020-21987 - https://www.exploit-db.com/exploits/47806 -CVE-2020-21987 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5556.php -CVE-2020-21989 - https://www.exploit-db.com/exploits/47808 -CVE-2020-21989 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php -CVE-2020-21990 - https://www.exploit-db.com/exploits/47824 -CVE-2020-21990 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php -CVE-2020-21991 - https://www.exploit-db.com/exploits/47822 -CVE-2020-21991 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5549.php -CVE-2020-21992 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5544.php -CVE-2020-21993 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php -CVE-2020-21994 - https://www.exploit-db.com/exploits/47819 -CVE-2020-21994 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php -CVE-2020-21995 - https://www.exploit-db.com/exploits/47763 -CVE-2020-21995 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.php -CVE-2020-21996 - https://www.exploit-db.com/exploits/47820 -CVE-2020-21996 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php -CVE-2020-21997 - https://www.exploit-db.com/exploits/47596 -CVE-2020-21997 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5541.php -CVE-2020-21998 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php -CVE-2020-21999 - https://www.exploit-db.com/exploits/47066 -CVE-2020-21999 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php -CVE-2020-22000 - https://www.exploit-db.com/exploits/47809 -CVE-2020-22000 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php -CVE-2020-22001 - https://www.exploit-db.com/exploits/47807 -CVE-2020-22001 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php -CVE-2020-22002 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php -CVE-2020-22007 - https://gist.github.com/tanprathan/69fbf6fbac11988e12f44069ec5b18ea#file-cve-2020-22007-txt -CVE-2020-22015 - https://trac.ffmpeg.org/ticket/8190 -CVE-2020-22016 - https://trac.ffmpeg.org/ticket/8183 -CVE-2020-22017 - https://trac.ffmpeg.org/ticket/8309 -CVE-2020-22019 - https://trac.ffmpeg.org/ticket/8241 -CVE-2020-22020 - https://trac.ffmpeg.org/ticket/8239 -CVE-2020-22021 - https://trac.ffmpeg.org/ticket/8240 -CVE-2020-22022 - https://trac.ffmpeg.org/ticket/8264 -CVE-2020-22023 - https://trac.ffmpeg.org/ticket/8244 -CVE-2020-22024 - https://trac.ffmpeg.org/ticket/8310 -CVE-2020-22025 - https://trac.ffmpeg.org/ticket/8260 -CVE-2020-22026 - https://trac.ffmpeg.org/ticket/8317 -CVE-2020-22027 - https://trac.ffmpeg.org/ticket/8242 -CVE-2020-22028 - https://trac.ffmpeg.org/ticket/8274 -CVE-2020-22029 - https://trac.ffmpeg.org/ticket/8250 -CVE-2020-22031 - https://trac.ffmpeg.org/ticket/8243 -CVE-2020-22032 - https://trac.ffmpeg.org/ticket/8275 -CVE-2020-22033 - https://trac.ffmpeg.org/ticket/8246 -CVE-2020-22034 - https://trac.ffmpeg.org/ticket/8236 -CVE-2020-22035 - https://trac.ffmpeg.org/ticket/8262 -CVE-2020-22036 - https://trac.ffmpeg.org/ticket/8261 -CVE-2020-22037 - https://trac.ffmpeg.org/ticket/8281 -CVE-2020-22038 - https://trac.ffmpeg.org/ticket/8285 -CVE-2020-22039 - https://trac.ffmpeg.org/ticket/8302 -CVE-2020-22040 - https://trac.ffmpeg.org/ticket/8283 -CVE-2020-22041 - https://trac.ffmpeg.org/ticket/8296 -CVE-2020-22042 - https://trac.ffmpeg.org/ticket/8267 -CVE-2020-22043 - https://trac.ffmpeg.org/ticket/8284 -CVE-2020-22044 - https://trac.ffmpeg.org/ticket/8295 -CVE-2020-22046 - https://trac.ffmpeg.org/ticket/8294 -CVE-2020-22048 - https://trac.ffmpeg.org/ticket/8303 -CVE-2020-22049 - https://trac.ffmpeg.org/ticket/8314 -CVE-2020-22051 - https://trac.ffmpeg.org/ticket/8313 -CVE-2020-22054 - https://trac.ffmpeg.org/ticket/8315 -CVE-2020-22056 - https://trac.ffmpeg.org/ticket/8304 -CVE-2020-22079 - https://github.com/Lyc-heng/routers/blob/main/routers/stack1.md -CVE-2020-22122 - https://github.com/876054426/vul/blob/master/ljcms_sql.md -CVE-2020-22148 - https://github.com/Piwigo/Piwigo/issues/1157 -CVE-2020-22150 - https://github.com/Piwigo/Piwigo/issues/1158 -CVE-2020-22158 - https://sku11army.blogspot.com/2020/02/ericsson-multiple-stored-reflected-xss.html -CVE-2020-22159 - https://sku11army.blogspot.com/2020/02/evertz-path-transversal-arbitrary-file.html -CVE-2020-22198 - http://www.hackdig.com/?02/hack-8391.htm -CVE-2020-22198 - https://github.com/blindkey/DedeCMSv5/issues/1 -CVE-2020-22200 - https://github.com/blindkey/cve_like/issues/2 -CVE-2020-22201 - https://github.com/blindkey/cve_like/issues/4 -CVE-2020-22203 - https://github.com/blindkey/cve_like/issues/6 -CVE-2020-22208 - https://github.com/blindkey/cve_like/issues/10 -CVE-2020-22209 - https://github.com/blindkey/cve_like/issues/12 -CVE-2020-22210 - https://github.com/blindkey/cve_like/issues/11 -CVE-2020-22211 - https://github.com/blindkey/cve_like/issues/13 -CVE-2020-22249 - https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 -CVE-2020-22251 - https://github.com/phpList/phplist3/issues/660 -CVE-2020-2229 - http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html -CVE-2020-2230 - http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html -CVE-2020-2231 - http://packetstormsecurity.com/files/160616/Jenkins-2.251-LTS-2.235.3-Cross-Site-Scripting.html -CVE-2020-22312 - https://github.com/wlx65003/HZNUOJ/issues/17 -CVE-2020-22334 - https://github.com/source-trace/beescms/issues/5 -CVE-2020-22352 - https://github.com/gpac/gpac/issues/1423 -CVE-2020-22403 - https://github.com/mrvautin/expressCart/issues/120 -CVE-2020-22421 - https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/74cms.docx -CVE-2020-22425 - https://code610.blogspot.com/2020/04/postauth-sqli-in-centreon-1910-1el7.html, -CVE-2020-22425 - https://github.com/c610/free/ -CVE-2020-22427 - https://code610.blogspot.com/2020/03/postauth-rce-bugs-in-nagiosxi-5611.html -CVE-2020-22428 - https://github.com/matrix -CVE-2020-22428 - https://www.linkedin.com/in/gabrielegristina -CVE-2020-22453 - https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/ -CVE-2020-22475 - https://www.exploit-db.com/exploits/49563 -CVE-2020-22550 - https://gist.github.com/Sp3eD-X/22640377f96340544baf12891f708b8f -CVE-2020-22552 - https://sourceforge.net/p/snap7/discussion/bugfix/thread/456d76fdde/ -CVE-2020-22628 - https://github.com/LibRaw/LibRaw/issues/269 -CVE-2020-22669 - https://github.com/coreruleset/coreruleset/pull/1793 -CVE-2020-22673 - https://github.com/gpac/gpac/issues/1342 -CVE-2020-22674 - https://github.com/gpac/gpac/issues/1346 -CVE-2020-22675 - https://github.com/gpac/gpac/issues/1344 -CVE-2020-22677 - https://github.com/gpac/gpac/issues/1341 -CVE-2020-22678 - https://github.com/gpac/gpac/issues/1339 -CVE-2020-22679 - https://github.com/gpac/gpac/issues/1345 -CVE-2020-22721 - https://syhack.wordpress.com/2020/04/18/pnotes-insecure-file-upload-vulnerability-code-execution/ -CVE-2020-22722 - https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ -CVE-2020-22807 - https://cloud.tencent.com/developer/article/1612208 -CVE-2020-22809 - https://www.exploit-db.com/exploits/48306 -CVE-2020-22818 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html -CVE-2020-22819 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html -CVE-2020-22820 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html -CVE-2020-22839 - http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html -CVE-2020-22839 - https://sohambakore.medium.com/b2evolution-cms-reflected-xss-in-tab-type-parameter-in-evoadm-php-38886216cdd3 -CVE-2020-22839 - https://www.exploit-db.com/exploits/49555 -CVE-2020-22840 - http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html -CVE-2020-22840 - https://www.exploit-db.com/exploits/49554 -CVE-2020-22841 - http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html -CVE-2020-22841 - https://www.exploit-db.com/exploits/49551 -CVE-2020-22844 - https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md -CVE-2020-22845 - https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md -CVE-2020-22864 - https://github.com/froala/wysiwyg-editor/issues/3880 -CVE-2020-22864 - https://www.youtube.com/watch?v=WE3b1iSnWJY -CVE-2020-22874 - https://github.com/pcmacdon/jsish/issues/5 -CVE-2020-22875 - https://github.com/pcmacdon/jsish/issues/10 -CVE-2020-22876 - https://github.com/ldarren/QuickJS/issues/11 -CVE-2020-22882 - https://github.com/Moddable-OpenSource/moddable/issues/351 -CVE-2020-22884 - https://github.com/espruino/Espruino/issues/1799 -CVE-2020-22885 - https://github.com/ccxvii/mujs/issues/133 -CVE-2020-22886 - https://github.com/ccxvii/mujs/issues/134 -CVE-2020-22907 - https://github.com/pcmacdon/jsish/issues/16 -CVE-2020-22916 - http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability -CVE-2020-22916 - https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability -CVE-2020-22983 - https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 -CVE-2020-22984 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d -CVE-2020-22985 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d -CVE-2020-22986 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d -CVE-2020-22987 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d -CVE-2020-23014 - https://seekurity.com/blog/2020/04/19/admin/advisories/apfell-post-exploitation-red-team-framework-authenticated-cross-site-scripting-vulnerability -CVE-2020-23036 - https://www.vulnerability-lab.com/get_content.php?id=2211 -CVE-2020-23037 - https://www.vulnerability-lab.com/get_content.php?id=2198 -CVE-2020-23038 - https://www.vulnerability-lab.com/get_content.php?id=2205 -CVE-2020-23039 - https://www.vulnerability-lab.com/get_content.php?id=2210 -CVE-2020-23040 - https://www.vulnerability-lab.com/get_content.php?id=2207 -CVE-2020-23041 - https://www.vulnerability-lab.com/get_content.php?id=2204 -CVE-2020-23042 - https://www.vulnerability-lab.com/get_content.php?id=2201 -CVE-2020-23043 - https://www.vulnerability-lab.com/get_content.php?id=2212 -CVE-2020-23044 - https://www.vulnerability-lab.com/get_content.php?id=2195 -CVE-2020-23045 - https://www.vulnerability-lab.com/get_content.php?id=2206 -CVE-2020-23046 - https://www.vulnerability-lab.com/get_content.php?id=2194 -CVE-2020-23047 - https://www.vulnerability-lab.com/get_content.php?id=2206 -CVE-2020-23048 - https://www.vulnerability-lab.com/get_content.php?id=2209 -CVE-2020-23049 - https://www.vulnerability-lab.com/get_content.php?id=2208 -CVE-2020-23050 - https://www.vulnerability-lab.com/get_content.php?id=2215 -CVE-2020-23051 - https://www.vulnerability-lab.com/get_content.php?id=2216 -CVE-2020-23052 - https://www.vulnerability-lab.com/get_content.php?id=2217 -CVE-2020-23054 - https://www.vulnerability-lab.com/get_content.php?id=2189 -CVE-2020-23055 - https://www.vulnerability-lab.com/get_content.php?id=2196 -CVE-2020-23058 - https://www.vulnerability-lab.com/get_content.php?id=2219 -CVE-2020-23060 - https://www.vulnerability-lab.com/get_content.php?id=2236 -CVE-2020-23061 - https://www.vulnerability-lab.com/get_content.php?id=2200 -CVE-2020-23064 - https://snyk.io/vuln/SNYK-JS-JQUERY-565129 -CVE-2020-23069 - https://www.exploit-db.com/exploits/48312 -CVE-2020-23109 - https://github.com/strukturag/libheif/issues/207 -CVE-2020-23127 - https://toandak.blogspot.com/2020/05/csrf-vulnerbility-in-chamilo-lms.html -CVE-2020-23128 - https://toandak.blogspot.com/2020/05/improper-privilege-management-in.html -CVE-2020-23160 - https://github.com/Outpost24/Pyrescom-Termod-PoC -CVE-2020-23160 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device -CVE-2020-23161 - https://github.com/Outpost24/Pyrescom-Termod-PoC -CVE-2020-23161 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device -CVE-2020-23162 - https://github.com/Outpost24/Pyrescom-Termod-PoC -CVE-2020-23162 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device -CVE-2020-23171 - https://github.com/nim-lang/zip/issues/54 -CVE-2020-23172 - https://github.com/kuba--/zip/issues/123 -CVE-2020-23178 - https://github.com/PHPFusion/PHPFusion/issues/2314 -CVE-2020-23182 - https://github.com/phpfusion/PHPFusion/issues/2329 -CVE-2020-23208 - https://github.com/phpList/phplist3/issues/665 -CVE-2020-23209 - https://github.com/phpList/phplist3/issues/666 -CVE-2020-23214 - https://github.com/phpList/phplist3/issues/669 -CVE-2020-23217 - https://github.com/phpList/phplist3/issues/672 -CVE-2020-23257 - https://github.com/espruino/Espruino/issues/1820 -CVE-2020-23258 - https://github.com/pcmacdon/jsish/issues/12 -CVE-2020-23259 - https://github.com/pcmacdon/jsish/issues/13 -CVE-2020-23260 - https://github.com/pcmacdon/jsish/issues/14 -CVE-2020-23260 - https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1 -CVE-2020-23266 - https://github.com/gpac/gpac/issues/1481 -CVE-2020-23267 - https://github.com/gpac/gpac/issues/1479 -CVE-2020-23269 - https://github.com/gpac/gpac/issues/1482 -CVE-2020-23273 - https://github.com/appneta/tcpreplay/issues/579 -CVE-2020-23283 - https://www.linkedin.com/pulse/descobrindo-usu%C3%A1rios-brute-force-iran/ -CVE-2020-23342 - http://packetstormsecurity.com/files/161048/Anchor-CMS-0.12.7-Cross-Site-Request-Forgery.html -CVE-2020-23363 - https://github.com/Verytops/verydows/issues/17 -CVE-2020-23369 - https://github.com/yzmcms/yzmcms/issues/46 -CVE-2020-23370 - https://github.com/yzmcms/yzmcms/issues/45 -CVE-2020-23371 - https://github.com/nangge/noneCms/issues/30 -CVE-2020-23373 - https://github.com/nangge/noneCms/issues/33 -CVE-2020-23374 - https://github.com/nangge/noneCms/issues/32 -CVE-2020-23376 - https://github.com/nangge/noneCms/issues/35 -CVE-2020-23446 - http://cvewalkthrough.com/variant-unauthenticated-information-disclosure-via-api/ -CVE-2020-23446 - https://tejaspingulkar.blogspot.com/2020/09/cve-2020-23446-verint-workforce.html -CVE-2020-23450 - https://abuyv.com -CVE-2020-23466 - https://www.exploit-db.com/exploits/48522 -CVE-2020-23517 - https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html -CVE-2020-23518 - https://www.exploit-db.com/exploits/47289 -CVE-2020-23522 - http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html -CVE-2020-23522 - https://github.com/pixelimity/pixelimity/issues/20 -CVE-2020-23533 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 -CVE-2020-23534 - https://github.com/gopeak/masterlab/issues/254 -CVE-2020-23539 - https://github.com/pokerfacett/MY_REQUEST/blob/df73fe140655ea44542b03ac186e6c2b47e97540/Realtek%208723ds%20BLE%20SDK%20denial%20of%20service%20attack.md -CVE-2020-23565 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3 -CVE-2020-23566 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/1 -CVE-2020-23567 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/2 -CVE-2020-23575 - https://www.exploit-db.com/exploits/48561 -CVE-2020-23580 - https://github.com/DengyigeFeng/vuln/issues/1 -CVE-2020-23595 - https://github.com/yzmcms/yzmcms/issues/47 -CVE-2020-23622 - https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of?tns_redirect=true -CVE-2020-23630 - https://github.com/Pandora1m2/zzcms201910/issues/1 -CVE-2020-23643 - https://github.com/Cherry-toto/jizhicms/issues/29 -CVE-2020-23644 - https://github.com/Cherry-toto/jizhicms/issues/28 -CVE-2020-23648 - https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb -CVE-2020-23653 - https://github.com/zoujingli/ThinkAdmin/issues/238 -CVE-2020-23686 - https://github.com/loadream/AyaCMS/issues/1 -CVE-2020-23705 - https://github.com/rockcarry/ffjpeg/issues/25 -CVE-2020-23706 - https://github.com/brackeen/ok-file-formats/issues/7 -CVE-2020-23707 - https://github.com/brackeen/ok-file-formats/issues/8 -CVE-2020-23715 - https://github.com/luuthehienhbit/LFI-Vulnerability-Webport-CMS-version-1.19.10.17121/blob/master/README.md -CVE-2020-23721 - https://github.com/daylightstudio/FUEL-CMS/issues/559 -CVE-2020-23761 - http://hidden-one.co.in/2021/04/09/cve-2020-23761-stored-xss-vulnerability-in-subrion-cms-version/ -CVE-2020-23762 - http://hidden-one.co.in/2021/04/09/cve-2020-23762-stored-xss-vulnerability-in-the-larsens-calender-plugin-version/ -CVE-2020-23763 - http://hidden-one.co.in/2021/04/09/cve-2020-23763-sql-injection-leading-to-authentication-bypass-in-online-book-store-1-0/ -CVE-2020-23790 - https://github.com/vladvector/vladvector.github.io/blob/master/exploit/2020-07-02-golo-business-listing-city-travel-guide-laravel-theme-v1-1-5.txt -CVE-2020-23814 - https://github.com/xuxueli/xxl-job/issues/1866 -CVE-2020-23824 - https://github.com/V1n1v131r4/CSRF-on-ArGoSoft-Mail-Server/blob/master/README.md -CVE-2020-23826 - https://whiterosezex.blogspot.com/2021/01/cve-2020-23826-rce-vulnerability-in.html -CVE-2020-23828 - https://www.exploit-db.com/exploits/48704 -CVE-2020-23829 - https://www.exploit-db.com/exploits/48702 -CVE-2020-23830 - https://www.exploit-db.com/exploits/48783 -CVE-2020-23831 - https://packetstormsecurity.com/files/158813/Tailor-MS-1.0-Cross-Site-Scripting.html -CVE-2020-23832 - https://github.com/projectworlds32/Car-Rental-Syatem-PHP-MYSQL/archive/master.zip -CVE-2020-23832 - https://packetstormsecurity.com/files/158795/Car-Rental-Management-System-1.0-Cross-Site-Scripting.html -CVE-2020-23833 - https://packetstormsecurity.com/files/158811/House-Rental-1.0-SQL-Injection.html -CVE-2020-23834 - https://www.exploit-db.com/exploits/48789 -CVE-2020-23835 - https://www.exploit-db.com/exploits/48813 -CVE-2020-23836 - https://www.exploit-db.com/exploits/48738 -CVE-2020-23837 - https://www.exploit-db.com/exploits/48745 -CVE-2020-23839 - http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html -CVE-2020-23839 - https://github.com/boku7/CVE-2020-23839 -CVE-2020-23839 - https://www.exploit-db.com/exploits/49726 -CVE-2020-23849 - https://github.com/josdejong/jsoneditor/issues/1029 -CVE-2020-23851 - https://github.com/rockcarry/ffjpeg/issues/27 -CVE-2020-23852 - https://github.com/rockcarry/ffjpeg/issues/28 -CVE-2020-23856 - https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 -CVE-2020-23856 - https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html -CVE-2020-23861 - https://github.com/LibreDWG/libredwg/issues/248 -CVE-2020-23864 - http://daniels-it-blog.blogspot.com/2020/07/iobit-malware-fighter-arbitrary-code.html -CVE-2020-23872 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml -CVE-2020-23872 - https://github.com/kermitt2/pdf2xml/issues/10 -CVE-2020-23873 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml -CVE-2020-23873 - https://github.com/kermitt2/pdf2xml/issues/11 -CVE-2020-23874 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml -CVE-2020-23874 - https://github.com/kermitt2/pdf2xml/issues/12 -CVE-2020-23876 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml -CVE-2020-23876 - https://github.com/kermitt2/pdf2xml/issues/14 -CVE-2020-23877 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml -CVE-2020-23877 - https://github.com/kermitt2/pdf2xml/issues/15 -CVE-2020-23878 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2json -CVE-2020-23878 - https://github.com/flexpaper/pdf2json/issues/45 -CVE-2020-23879 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2json -CVE-2020-23879 - https://github.com/flexpaper/pdf2json/issues/44 -CVE-2020-23910 - https://github.com/vlm/asn1c/issues/396 -CVE-2020-23911 - https://github.com/vlm/asn1c/issues/394 -CVE-2020-23912 - https://github.com/axiomatic-systems/Bento4/issues/540 -CVE-2020-23914 - https://github.com/yhirose/cpp-peglib/issues/121 -CVE-2020-23915 - https://github.com/yhirose/cpp-peglib/issues/122 -CVE-2020-23921 - https://github.com/Samuel-Tyler/fast_ber/issues/30 -CVE-2020-23928 - https://github.com/gpac/gpac/issues/1568 -CVE-2020-23928 - https://github.com/gpac/gpac/issues/1569 -CVE-2020-23930 - https://github.com/gpac/gpac/issues/1565 -CVE-2020-23931 - https://github.com/gpac/gpac/issues/1564 -CVE-2020-23931 - https://github.com/gpac/gpac/issues/1567 -CVE-2020-23932 - https://github.com/gpac/gpac/issues/1566 -CVE-2020-23934 - https://www.exploit-db.com/exploits/48636 -CVE-2020-23935 - http://packetstormsecurity.com/files/165215/Kabir-Alhasan-Student-Management-System-1.0-SQL-Injection.html -CVE-2020-23945 - https://github.com/VictorAlagwu/CMSsite/issues/14 -CVE-2020-23957 - https://jayaramyalla.medium.com/cross-site-scripting-in-pega-cve-2020-23957-16d1c417da5f -CVE-2020-23966 - https://github.com/VictorAlagwu/CMSsite/issues/15 -CVE-2020-23967 - https://www.youtube.com/watch?v=q7Kqi7kE59U -CVE-2020-23971 - https://packetstormsecurity.com/files/156889/Joomla-GMapFP-3.30-Arbitrary-File-Upload.html -CVE-2020-23972 - http://packetstormsecurity.com/files/159072/Joomla-GMapFP-J3.5-J3.5F-Arbitrary-File-Upload.html -CVE-2020-23972 - https://raw.githubusercontent.com/me4yoursecurity/Reports/master/README.md -CVE-2020-23973 - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html -CVE-2020-23974 - https://cxsecurity.com/issue/WLB-2020050071 -CVE-2020-23974 - https://packetstormsecurity.com/files/157599/Create-Project-Manager-1.07-Cross-Site-Scripting-HTML-Injection.html -CVE-2020-23975 - https://cxsecurity.com/issue/WLB-2020030174 -CVE-2020-23975 - https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html -CVE-2020-23976 - https://cxsecurity.com/issue/WLB-2020030174 -CVE-2020-23976 - https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html -CVE-2020-23977 - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html -CVE-2020-23978 - https://cxsecurity.com/issue/WLB-2020030150 -CVE-2020-23978 - https://packetstormsecurity.com/files/156939/Soluzione-Globale-Ecommerce-CMS-1-SQL-Injection.html -CVE-2020-23979 - https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html -CVE-2020-23980 - https://cxsecurity.com/issue/WLB-2020030177 -CVE-2020-23980 - https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html -CVE-2020-23981 - https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html -CVE-2020-23982 - https://cxsecurity.com/issue/WLB-2020030177 -CVE-2020-23982 - https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html -CVE-2020-23983 - https://packetstormsecurity.com/files/157594/iChat-1.6-Cross-Site-Scripting.html -CVE-2020-23984 - https://packetstormsecurity.com/files/157117/Online-Hotel-Booking-System-Pro-1.3-Cross-Site-Scripting.html -CVE-2020-23989 - https://gist.github.com/harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b -CVE-2020-23992 - https://github.com/EmreOvunc/Nagios-XI-Reflected-XSS -CVE-2020-24000 - https://github.com/eyoucms/eyoucms/issues/13 -CVE-2020-24003 - https://www.hdwsec.fr/blog/20200608-skype/ -CVE-2020-24007 - https://github.com/inflixim4be/Brute-Force-on-Umanni-RH -CVE-2020-24008 - https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH -CVE-2020-24026 - https://github.com/jianyan74/TinyShop -CVE-2020-24026 - https://github.com/jianyan74/TinyShop/issues/14 -CVE-2020-24027 - http://lists.live555.com/pipermail/live-devel/2020-July/021662.html -CVE-2020-24033 - https://github.com/M0NsTeRRR/CVE-2020-24033 -CVE-2020-24033 - https://github.com/M0NsTeRRR/S3900-24T4S-CSRF-vulnerability -CVE-2020-24034 - http://packetstormsecurity.com/files/159026/Sagemcom-F-ST-5280-Privilege-Escalation.html -CVE-2020-24034 - http://seclists.org/fulldisclosure/2020/Sep/3 -CVE-2020-24034 - https://seclists.org/fulldisclosure/2020/Sep/3 -CVE-2020-24036 - http://seclists.org/fulldisclosure/2021/Mar/31 -CVE-2020-24036 - https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036 -CVE-2020-24036 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04 -CVE-2020-24038 - https://github.com/Dmitriy-area51/Exploit/tree/master/CVE-2020-24038 -CVE-2020-24045 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-24046 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -CVE-2020-24088 - http://blog.rewolf.pl/blog/?p=1630 -CVE-2020-24104 - http://n0hat.blogspot.com/2020/07/stored-cross-site-scripting-xss-at-pix.html -CVE-2020-24119 - https://github.com/upx/upx/issues/388 -CVE-2020-24135 - https://github.com/vedees/wcms/issues/9 -CVE-2020-24136 - https://github.com/vedees/wcms/issues/12 -CVE-2020-24137 - https://github.com/vedees/wcms/issues/7 -CVE-2020-24138 - https://github.com/vedees/wcms/issues/10 -CVE-2020-24139 - https://github.com/vedees/wcms/issues/8 -CVE-2020-24140 - https://github.com/vedees/wcms/issues/11 -CVE-2020-24175 - https://gist.github.com/illikainen/ced14e08e00747fef613ba619bb25bb4 -CVE-2020-24175 - https://illikainen.dev/advisories/014-yz1-izarc -CVE-2020-24186 - http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html -CVE-2020-24186 - http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html -CVE-2020-24186 - http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html -CVE-2020-24186 - https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ -CVE-2020-24187 - https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type -CVE-2020-24193 - https://www.exploit-db.com/exploits/48787 -CVE-2020-24194 - https://cxsecurity.com/issue/WLB-2020090030 -CVE-2020-24195 - https://packetstormsecurity.com/files/158704/Online-Bike-Rental-1.0-Shell-Upload.html -CVE-2020-24196 - https://packetstormsecurity.com/files/158683/Online-Bike-Rental-1.0-Shell-Upload.html -CVE-2020-24208 - https://packetstormsecurity.com/files/158684/Online-Shopping-Alphaware-1.0-SQL-Injection.html -CVE-2020-24208 - https://www.exploit-db.com/exploits/48725 -CVE-2020-24213 - https://github.com/Fluorohydride/ygopro/issues/2314 -CVE-2020-24214 - http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html -CVE-2020-24215 - http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html -CVE-2020-24217 - http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html -CVE-2020-24217 - http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html -CVE-2020-24219 - http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html -CVE-2020-24221 - https://github.com/miniupnp/ngiflib/issues/17 -CVE-2020-24223 - http://packetstormsecurity.com/files/158728/Mara-CMS-7.5-Cross-Site-Scripting.html -CVE-2020-24223 - https://github.com/FreySolarEye/CVE/blob/master/Mara%20CMS%207.5%20-%20Cross%20Site%20Scripting -CVE-2020-24223 - https://www.exploit-db.com/exploits/48777 -CVE-2020-24240 - https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html -CVE-2020-24241 - https://bugzilla.nasm.us/show_bug.cgi?id=3392707 -CVE-2020-24242 - https://bugzilla.nasm.us/show_bug.cgi?id=3392708 -CVE-2020-24265 - https://github.com/appneta/tcpreplay/issues/616 -CVE-2020-24266 - https://github.com/appneta/tcpreplay/issues/617 -CVE-2020-24275 - https://github.com/swoole/swoole-src/pull/3539 -CVE-2020-24285 - https://github.com/SecLoop/CVE/blob/main/telefone_ip_tip200.md -CVE-2020-24297 - https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ -CVE-2020-24301 - https://github.com/jamesagnew/hapi-fhir/issues/2026 -CVE-2020-24303 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01 -CVE-2020-24307 - https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html -CVE-2020-24333 - https://www.arista.com/en/support/advisories-notices -CVE-2020-24342 - http://lua-users.org/lists/lua-l/2020-07/msg00052.html -CVE-2020-24343 - https://github.com/ccxvii/mujs/issues/136 -CVE-2020-24344 - https://github.com/jerryscript-project/jerryscript/issues/3976 -CVE-2020-24345 - https://github.com/jerryscript-project/jerryscript/issues/3977 -CVE-2020-24346 - https://github.com/nginx/njs/issues/325 -CVE-2020-24347 - https://github.com/nginx/njs/issues/323 -CVE-2020-24348 - https://github.com/nginx/njs/issues/322 -CVE-2020-24349 - https://github.com/nginx/njs/issues/324 -CVE-2020-24365 - http://packetstormsecurity.com/files/160136/Gemtek-WVRTM-127ACN-01.01.02.141-Command-Injection.html -CVE-2020-24370 - http://lua-users.org/lists/lua-l/2020-07/msg00324.html -CVE-2020-24372 - https://github.com/LuaJIT/LuaJIT/issues/603 -CVE-2020-24379 - https://github.com/vulnbe/poc-yaws-dav-xxe -CVE-2020-24379 - https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html -CVE-2020-24379 - https://vuln.be/post/yaws-xxe-and-shell-injections/ -CVE-2020-24381 - https://emaragkos.gr/cve-2020-24381/ -CVE-2020-24381 - https://github.com/gunet/openeclass/issues/39 -CVE-2020-24385 - http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:02.txt -CVE-2020-24386 - http://packetstormsecurity.com/files/160842/Dovecot-2.3.11.3-Access-Bypass.html -CVE-2020-24387 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln/ -CVE-2020-24388 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln/ -CVE-2020-24394 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8 -CVE-2020-24394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832 -CVE-2020-24394 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-24395 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-026.txt -CVE-2020-24395 - https://www.syss.de/pentest-blog/ -CVE-2020-24396 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-027.txt -CVE-2020-24396 - https://www.syss.de/pentest-blog/ -CVE-2020-24437 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1156 -CVE-2020-24548 - http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html -CVE-2020-24548 - https://www.youtube.com/watch?v=oDTd-yRxVJ0 -CVE-2020-24549 - https://www.exploit-db.com/exploits/48866 -CVE-2020-24550 - https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/ -CVE-2020-24553 - http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html -CVE-2020-24553 - http://seclists.org/fulldisclosure/2020/Sep/5 -CVE-2020-24553 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-24553 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-24553 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 -CVE-2020-24567 - https://www.cymaera.com/articles/everything.html -CVE-2020-24574 - https://github.com/jtesta/gog_galaxy_client_service_poc -CVE-2020-24574 - https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218 -CVE-2020-24574 - https://www.gog.com/galaxy -CVE-2020-24574 - https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/ -CVE-2020-24576 - https://www.netskope.com -CVE-2020-24577 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ -CVE-2020-24577 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2020-24577 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241 -CVE-2020-24578 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ -CVE-2020-24578 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2020-24579 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ -CVE-2020-24579 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2020-24580 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ -CVE-2020-24580 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2020-24581 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ -CVE-2020-24581 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2020-24583 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-24584 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-24586 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-24587 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-24588 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-24600 - https://cybersecurityworks.com/zerodays/cve-2020-24600-sql-injection-in-capexweb.html -CVE-2020-24601 - https://cybersecurityworks.com/zerodays/cve-2020-24601-ignite-realtime-openfire.html -CVE-2020-24601 - https://issues.igniterealtime.org/browse/OF-1963 -CVE-2020-24602 - https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html -CVE-2020-24602 - https://issues.igniterealtime.org/browse/OF-1963 -CVE-2020-24604 - https://cybersecurityworks.com/zerodays/cve-2020-24604-ignite-realtime-openfire.html -CVE-2020-24604 - https://issues.igniterealtime.org/browse/OF-1963 -CVE-2020-24609 - https://www.exploit-db.com/exploits/48753 -CVE-2020-24609 - https://www.exploit-db.com/exploits/48785 -CVE-2020-24613 - https://research.nccgroup.com/2020/08/24/technical-advisory-wolfssl-tls-1-3-client-man-in-the-middle-attack/ -CVE-2020-24616 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-24616 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-24616 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-24616 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-24621 - https://issues.openmrs.org/browse/HTML-730 -CVE-2020-24622 - https://support.sonatype.com/hc/en-us/articles/360053516793 -CVE-2020-24654 - https://kde.org/info/security/advisory-20200827-1.txt -CVE-2020-24700 - http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2020-24700 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html -CVE-2020-24700 - http://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2020-24701 - http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2020-24701 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html -CVE-2020-24701 - http://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2020-24707 - https://herolab.usd.de/security-advisories/usd-2020-0052/ -CVE-2020-24708 - https://herolab.usd.de/security-advisories/usd-2020-0048/ -CVE-2020-24709 - https://herolab.usd.de/security-advisories/usd-2020-0049/ -CVE-2020-24710 - https://herolab.usd.de/security-advisories/usd-2020-0054/ -CVE-2020-24711 - https://herolab.usd.de/security-advisories/usd-2020-0051/ -CVE-2020-24712 - https://herolab.usd.de/security-advisories/usd-2020-0050/ -CVE-2020-24713 - https://herolab.usd.de/security-advisories/usd-2020-0053/ -CVE-2020-24716 - https://jira.ixsystems.com/browse/NAS-107270 -CVE-2020-24717 - https://jira.ixsystems.com/browse/NAS-107270 -CVE-2020-24721 - http://packetstormsecurity.com/files/159419/Corona-Exposure-Notifications-API-Data-Leakage.html -CVE-2020-24722 - http://packetstormsecurity.com/files/159496/GAEN-Protocol-Metadata-Deanonymization-Risk-Score-Inflation.html -CVE-2020-24723 - https://phpgurukul.com/ -CVE-2020-24723 - https://systemweakness.com/cve-2020-24723-89ea76588286 -CVE-2020-24740 - https://github.com/pluck-cms/pluck/issues/81 -CVE-2020-24750 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-24750 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-24750 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-24753 - https://warcollar.com/cve-2020-24753.html -CVE-2020-24755 - https://www.youtube.com/watch?v=T41h4yeh9dk -CVE-2020-24765 - https://github.com/trump88/CVE-2020-24765 -CVE-2020-24772 - https://github.com/Dreamacro/clash/issues/910 -CVE-2020-24786 - https://medium.com/@frycos/another-zoho-manageengine-story-7b472f1515f5 -CVE-2020-24791 - https://github.com/daylightstudio/FUEL-CMS/issues/561 -CVE-2020-24791 - https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt -CVE-2020-24791 - https://www.exploit-db.com/exploits/48778 -CVE-2020-24794 - https://devnet.kentico.com/download/hotfixes -CVE-2020-24821 - https://github.com/aclements/libelfin/issues/52 -CVE-2020-24841 - https://www.exploit-db.com/exploits/48757 -CVE-2020-24842 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-288-01 -CVE-2020-24847 - https://github.com/xtr4nge/FruityWifi/issues/277 -CVE-2020-24860 - http://packetstormsecurity.com/files/159434/CMS-Made-Simple-2.2.14-Cross-Site-Scripting.html -CVE-2020-24860 - https://www.exploit-db.com/exploits/48851 -CVE-2020-24860 - https://www.youtube.com/watch?v=M6D7DmmjLak&t=22s -CVE-2020-24861 - https://www.exploit-db.com/exploits/48850 -CVE-2020-24861 - https://www.youtube.com/watch?v=8IMfD5KGt_U -CVE-2020-24862 - https://www.exploit-db.com/exploits/48752 -CVE-2020-24870 - https://github.com/LibRaw/LibRaw/issues/330 -CVE-2020-24876 - https://www.vaadata.com/blog/hardcoded-secret-leads-to-account-takeover/ -CVE-2020-24881 - http://packetstormsecurity.com/files/160995/osTicket-1.14.2-Server-Side-Request-Forgery.html -CVE-2020-24881 - https://blackbatsec.medium.com/cve-2020-24881-server-side-request-forgery-in-osticket-eea175e147f0 -CVE-2020-24889 - https://github.com/LibRaw/LibRaw/issues/334 -CVE-2020-24890 - https://github.com/LibRaw/LibRaw/issues/335 -CVE-2020-24897 - https://stiltsoft.atlassian.net/browse/VD-2 -CVE-2020-24898 - https://stiltsoft.atlassian.net/browse/VD-1 -CVE-2020-24899 - https://code610.blogspot.com/2020/08/postauth-rce-in-nagios-572.html -CVE-2020-24900 - https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html -CVE-2020-24901 - https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html -CVE-2020-24902 - https://dl.packetstormsecurity.net/1804-exploits/quixplorer241beta-xss.txt -CVE-2020-24903 - https://seclists.org/bugtraq/2016/Mar/104 -CVE-2020-24904 - https://github.com/davesteele/gnome-gmail/issues/84 -CVE-2020-24908 - https://compass-security.com/fileadmin/Research/Advisories/2020-05_CSNC-2020-005_Checkmk_Local_Privilege_Escalation.txt -CVE-2020-24912 - http://seclists.org/fulldisclosure/2021/Mar/30 -CVE-2020-24912 - https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912 -CVE-2020-24912 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 -CVE-2020-24913 - http://seclists.org/fulldisclosure/2021/Mar/30 -CVE-2020-24916 - https://github.com/vulnbe/poc-yaws-cgi-shell-injection -CVE-2020-24916 - https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html -CVE-2020-24916 - https://vuln.be/post/yaws-xxe-and-shell-injections/ -CVE-2020-24918 - https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1 -CVE-2020-24918 - https://www.somersetrecon.com/blog -CVE-2020-24922 - https://github.com/xuxueli/xxl-job/issues/1921 -CVE-2020-24930 - https://github.com/wuzhicms/wuzhicms/issues/191 -CVE-2020-24932 - https://www.exploit-db.com/exploits/48758 -CVE-2020-24939 - https://github.com/stampit-org/supermixer/issues/9 -CVE-2020-24948 - http://packetstormsecurity.com/files/160850/WordPress-Autoptimize-Shell-Upload.html -CVE-2020-24948 - https://wpvulndb.com/vulnerabilities/10372 -CVE-2020-24949 - http://packetstormsecurity.com/files/162852/PHPFusion-9.03.50-Remote-Code-Execution.html -CVE-2020-24955 - https://www.youtube.com/watch?v=jdcqbev-H5I -CVE-2020-24963 - https://medium.com/@ex.mi/php-best-support-system-v3-0-4-authenticated-persistent-xss-dfe6d4a06f75 -CVE-2020-24977 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 -CVE-2020-24977 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-24977 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-24977 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-24978 - https://bugzilla.nasm.us/show_bug.cgi?id=3392712 -CVE-2020-24982 - https://c41nc.co.uk/cve-2020-24982/ -CVE-2020-24983 - https://c41nc.co.uk/cve-2020-24983/ -CVE-2020-24985 - https://c41nc.co.uk/cve-2020-24985/ -CVE-2020-24990 - http://packetstormsecurity.com/files/159699/QSC-Q-SYS-Core-Manager-8.2.1-Directory-Traversal.html -CVE-2020-24994 - https://github.com/libass/libass/issues/422 -CVE-2020-24994 - https://github.com/libass/libass/issues/422#issuecomment-806002919 -CVE-2020-24994 - https://github.com/libass/libass/issues/423 -CVE-2020-24996 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42028 -CVE-2020-24999 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42029 -CVE-2020-25004 - https://www.exploit-db.com/ -CVE-2020-25005 - https://www.exploit-db.com/ -CVE-2020-25006 - https://www.exploit-db.com/ -CVE-2020-25010 - https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25010.md -CVE-2020-25011 - https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25011.md -CVE-2020-25015 - http://packetstormsecurity.com/files/159936/Genexis-Platinum-4410-P4410-V2-1.28-Missing-Access-Control-CSRF.html -CVE-2020-25019 - https://security.stackexchange.com/questions/225799 -CVE-2020-25020 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-25021 - http://packetstormsecurity.com/files/159057/Noise-Java-ChaChaPolyCipherState.encryptWithAd-Insufficient-Boundary-Checks.html -CVE-2020-25021 - http://seclists.org/fulldisclosure/2020/Sep/14 -CVE-2020-25022 - http://packetstormsecurity.com/files/159055/Noise-Java-AESGCMFallbackCipherState.encryptWithAd-Insufficient-Boundary-Checks.html -CVE-2020-25022 - http://seclists.org/fulldisclosure/2020/Sep/11 -CVE-2020-25023 - http://packetstormsecurity.com/files/159056/Noise-Java-AESGCMOnCtrCipherState.encryptWithAd-Insufficient-Boundary-Checks.html -CVE-2020-25023 - http://seclists.org/fulldisclosure/2020/Sep/13 -CVE-2020-25034 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-031.txt -CVE-2020-25042 - http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html -CVE-2020-25042 - https://www.exploit-db.com/exploits/48780 -CVE-2020-25043 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 -CVE-2020-25044 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 -CVE-2020-25045 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 -CVE-2020-25046 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25047 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25048 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25049 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25050 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25051 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25052 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25053 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25054 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25055 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25056 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25068 - https://www.youtube.com/watch?v=CLAHE0qUHXs -CVE-2020-25071 - https://medium.com/@muffydium/a-tale-of-reflected-xss-to-stored-which-ultimately-resulted-into-a-cve-82981f8648d7 -CVE-2020-2510 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25106 - http://packetstormsecurity.com/files/160666/SUPREMO-4.1.3.2348-Privilege-Escalation.html -CVE-2020-25106 - https://seclists.org/fulldisclosure/2020/Dec/42 -CVE-2020-2511 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2512 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2513 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2514 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-25142 - https://gist.github.com/ahpaleus/76aa81ec82644a89c2088ab3ea99f07c -CVE-2020-2515 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2516 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2517 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2518 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2519 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25203 - http://packetstormsecurity.com/files/159264/Framer-Preview-12-Content-Injection.html -CVE-2020-25204 - http://packetstormsecurity.com/files/159747/God-Kings-0.60.1-Notification-Spoofing.html -CVE-2020-25205 - https://labs.f-secure.com/advisories/ -CVE-2020-25206 - https://labs.f-secure.com/advisories/ -CVE-2020-25211 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6 -CVE-2020-25212 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3 -CVE-2020-25212 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21 -CVE-2020-25213 - http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html -CVE-2020-25213 - http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html -CVE-2020-25213 - https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html -CVE-2020-25213 - https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ -CVE-2020-25213 - https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/ -CVE-2020-2522 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-25220 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.194 -CVE-2020-25220 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.233 -CVE-2020-25221 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.7 -CVE-2020-25223 - http://packetstormsecurity.com/files/164697/Sophos-UTM-WebAdmin-SID-Command-Injection.html -CVE-2020-25223 - https://community.sophos.com/b/security-blog -CVE-2020-25223 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-in-sg-utm-webadmin-cve-2020-25223 -CVE-2020-2524 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-25247 - http://seclists.org/fulldisclosure/2020/Oct/9 -CVE-2020-25248 - http://seclists.org/fulldisclosure/2020/Oct/9 -CVE-2020-25248 - https://seclists.org/fulldisclosure/2020/Oct/9 -CVE-2020-25254 - http://seclists.org/fulldisclosure/2020/Oct/9 -CVE-2020-25254 - https://seclists.org/fulldisclosure/2020/Oct/9 -CVE-2020-25265 - https://github.com/refi64/CVE-2020-25265-25266 -CVE-2020-25266 - https://github.com/refi64/CVE-2020-25265-25266 -CVE-2020-25267 - https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620 -CVE-2020-25268 - https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620 -CVE-2020-2527 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25270 - http://packetstormsecurity.com/files/159614/Hostel-Management-System-2.1-Cross-Site-Scripting.html -CVE-2020-25270 - https://phpgurukul.com -CVE-2020-25271 - https://phpgurukul.com -CVE-2020-25275 - http://packetstormsecurity.com/files/160841/Dovecot-2.3.11.3-Denial-Of-Service.html -CVE-2020-25278 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25279 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25280 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-25284 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a -CVE-2020-25285 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8 -CVE-2020-25285 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467 -CVE-2020-25287 - https://github.com/jenaye/pligg/blob/master/README.md -CVE-2020-25288 - https://mantisbt.org/bugs/view.php?id=27275 -CVE-2020-25289 - http://zeifan.my/security/arbitrary%20file/eop/2020/07/21/avast-secureline-vpn-arb-file-eop.html -CVE-2020-25291 - http://zeifan.my/security/rce/heap/2020/09/03/wps-rce-heap.html -CVE-2020-2530 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2531 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2533 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2534 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25343 - https://www.exploit-db.com/exploits/48773 -CVE-2020-2535 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2536 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25362 - https://www.exploit-db.com/exploits/48771 -CVE-2020-25366 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-25367 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-25368 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-2537 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25374 - https://medium.com/@virajmota38/full-path-disclosure-8a9358e5a867 -CVE-2020-2538 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25385 - https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting -CVE-2020-2539 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25398 - https://github.com/h3llraiser/CVE-2020-25398 -CVE-2020-25399 - https://github.com/h3llraiser/CVE-2020-25399 -CVE-2020-2540 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25408 - https://nikhilkumar01.medium.com/cve-2020-25408-97eb7bcc23a6 -CVE-2020-25409 - https://nikhilkumar01.medium.com/cve-2020-25409-5ecbe735c004 -CVE-2020-2541 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25411 - https://nikhilkumar01.medium.com/cve-2020-25411-a245bdf88fb5 -CVE-2020-25412 - https://sourceforge.net/p/gnuplot/bugs/2303/ -CVE-2020-2542 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25427 - https://github.com/gpac/gpac/issues/1406 -CVE-2020-2543 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2544 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25444 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e -CVE-2020-25445 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e -CVE-2020-25449 - https://packetstormsecurity.com/files/159070/Cabot-0.11.12-Cross-Site-Scripting.html -CVE-2020-25449 - https://www.exploit-db.com/exploits/48791 -CVE-2020-25449 - https://www.exploitalert.com/view-details.html?id=36106 -CVE-2020-2545 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25453 - http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html -CVE-2020-25453 - https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389 -CVE-2020-25454 - http://packetstormsecurity.com/files/160107/Grocy-Household-Management-Solution-2.7.1-Cross-Site-Scripting.html -CVE-2020-2546 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25461 - https://github.com/Moddable-OpenSource/moddable/issues/441 -CVE-2020-25462 - https://github.com/Moddable-OpenSource/moddable/issues/432 -CVE-2020-25463 - https://github.com/Moddable-OpenSource/moddable/issues/440 -CVE-2020-25464 - https://github.com/Moddable-OpenSource/moddable/issues/431 -CVE-2020-25465 - https://github.com/Moddable-OpenSource/moddable/issues/442 -CVE-2020-25466 - https://github.com/crmeb/CRMEB/issues/22 -CVE-2020-25467 - https://bugs.launchpad.net/ubuntu/+source/lrzip/+bug/1893641 -CVE-2020-25467 - https://github.com/ckolivas/lrzip/issues/163 -CVE-2020-2547 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25472 - https://news.websec.nl -CVE-2020-25472 - https://websec.nl -CVE-2020-25472 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 -CVE-2020-25473 - https://news.websec.nl/ -CVE-2020-25473 - https://websec.nl/ -CVE-2020-25473 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 -CVE-2020-25474 - https://news.websec.nl -CVE-2020-25474 - https://websec.nl -CVE-2020-25474 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 -CVE-2020-25475 - https://websec.nl/ -CVE-2020-25475 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 -CVE-2020-2548 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2549 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25494 - http://packetstormsecurity.com/files/160635/SCO-Openserver-5.0.7-Command-Injection.html -CVE-2020-25494 - https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20OS%20Command%20Injection%20Vulnerability -CVE-2020-25495 - http://packetstormsecurity.com/files/160634/SCO-Openserver-5.0.7-Cross-Site-Scripting.html -CVE-2020-25495 - https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20XSS%20%26%20HTML%20Injection%20vulnerability -CVE-2020-25498 - https://github.com/the-girl-who-lived/CVE-2020-25498 -CVE-2020-25498 - https://youtu.be/qeVHvmS5wtI -CVE-2020-25498 - https://youtu.be/u_6yBIMF74A -CVE-2020-2550 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25506 - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 -CVE-2020-25506 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-25507 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-002.md -CVE-2020-25507 - https://sick.codes/sick-2020-002/ -CVE-2020-2551 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25516 - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0781 -CVE-2020-25516 - https://github.com/piuppi/Proof-of-Concepts/blob/main/WSO2/CVE-2020-25516.md -CVE-2020-2552 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2553 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-25538 - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html -CVE-2020-25538 - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution_30.html -CVE-2020-25540 - http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html -CVE-2020-2555 - http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html -CVE-2020-2555 - http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html -CVE-2020-2555 - http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html -CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2020-2555 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-25557 - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html -CVE-2020-25557 - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution.html -CVE-2020-2556 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25560 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25560-sapphireims-unauthenticated-remote-command-execution-on-server/ -CVE-2020-25561 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25561-sapphireims-hardcoded-credentials/ -CVE-2020-25562 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25562-sapphireims-csrf/ -CVE-2020-25563 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25563-sapphireims-unauthenticated-remote-command-execution-create-local-admin-on-clients/ -CVE-2020-25564 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25564-sapphireims-unprivileged-user-remote-command-execution-create-local-admin-on-clients/ -CVE-2020-25565 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ -CVE-2020-25566 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25566-sapphireims-unauthenticated-account-takeover/ -CVE-2020-2557 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2558 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2559 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25592 - http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html -CVE-2020-25593 - https://www.acronis.com/en-us/blog/ -CVE-2020-2560 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2561 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2562 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2563 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25638 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-25638 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-25638 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-2564 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25641 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124 -CVE-2020-25643 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 -CVE-2020-25645 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html -CVE-2020-25648 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-25648 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-25648 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-25649 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-25649 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-25649 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-2565 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25656 - https://lkml.org/lkml/2020/10/16/84 -CVE-2020-25659 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-25659 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-2566 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25663 - https://bugzilla.redhat.com/show_bug.cgi?id=1891601 -CVE-2020-25663 - https://github.com/ImageMagick/ImageMagick/issues/1723 -CVE-2020-25663 - https://github.com/ImageMagick/ImageMagick/issues/1723#issuecomment-718275153 -CVE-2020-25668 - http://www.openwall.com/lists/oss-security/2020/10/30/1 -CVE-2020-25668 - http://www.openwall.com/lists/oss-security/2020/11/04/3 -CVE-2020-25668 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220 -CVE-2020-25668 - https://www.openwall.com/lists/oss-security/2020/10/30/1, -CVE-2020-25668 - https://www.openwall.com/lists/oss-security/2020/11/04/3, -CVE-2020-25669 - http://www.openwall.com/lists/oss-security/2020/11/05/2 -CVE-2020-25669 - http://www.openwall.com/lists/oss-security/2020/11/20/5 -CVE-2020-25669 - https://www.openwall.com/lists/oss-security/2020/11/05/2, -CVE-2020-25669 - https://www.openwall.com/lists/oss-security/2020/11/20/5, -CVE-2020-2567 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2568 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2569 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2570 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25704 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00 -CVE-2020-2571 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2572 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2573 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25733 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a -CVE-2020-25733 - https://sourceforge.net/projects/webtareas/files/ -CVE-2020-25734 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a -CVE-2020-25734 - https://sourceforge.net/projects/webtareas/files/ -CVE-2020-25735 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a -CVE-2020-25735 - https://sourceforge.net/projects/webtareas/files/ -CVE-2020-25736 - http://packetstormsecurity.com/files/170246/Acronis-TrueImage-XPC-Privilege-Escalation.html -CVE-2020-25736 - https://www.acronis.com/en-us/blog/ -CVE-2020-2574 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25744 - https://medium.com/@thebinary0x1/safervpn-for-windows-arbitrary-file-overwrite-dos-bdc88fdb5ead -CVE-2020-25744 - https://www.youtube.com/watch?v=0QdRJdA_aos -CVE-2020-25746 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 -CVE-2020-2575 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-25751 - https://geekwire.eu/2020/09/14/joomla-pago-commerce-2-5-9-0-sql-injection-authenticated/ -CVE-2020-25751 - https://www.exploit-db.com/exploits/48811 -CVE-2020-25752 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a -CVE-2020-25753 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a -CVE-2020-25754 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a -CVE-2020-25755 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a -CVE-2020-25757 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/ -CVE-2020-25758 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/ -CVE-2020-25759 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/ -CVE-2020-2576 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25760 - http://packetstormsecurity.com/files/159262/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html -CVE-2020-25760 - http://packetstormsecurity.com/files/159637/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html -CVE-2020-25760 - http://seclists.org/fulldisclosure/2020/Sep/43 -CVE-2020-25760 - https://packetstormsecurity.com/files/author/15149/ -CVE-2020-25761 - http://packetstormsecurity.com/files/159263/Visitor-Management-System-In-PHP-1.0-Cross-Site-Scripting.html -CVE-2020-25761 - http://seclists.org/fulldisclosure/2020/Sep/45 -CVE-2020-25761 - https://packetstormsecurity.com/files/author/15149/ -CVE-2020-25762 - http://packetstormsecurity.com/files/159261/Seat-Reservation-System-1.0-SQL-Injection.html -CVE-2020-25762 - http://seclists.org/fulldisclosure/2020/Sep/42 -CVE-2020-25762 - https://packetstormsecurity.com/files/author/15149 -CVE-2020-25763 - http://packetstormsecurity.com/files/159260/Seat-Reservation-System-1.0-Shell-Upload.html -CVE-2020-25763 - http://seclists.org/fulldisclosure/2020/Sep/41 -CVE-2020-25763 - https://packetstormsecurity.com/files/author/15149 -CVE-2020-25765 - https://www.westerndigital.com/support/productsecurity -CVE-2020-25765 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -CVE-2020-25767 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-25767 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-2577 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2578 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25782 - https://github.com/tezeb/accfly/blob/master/Readme.md -CVE-2020-25783 - https://github.com/tezeb/accfly/blob/master/Readme.md -CVE-2020-25784 - https://github.com/tezeb/accfly/blob/master/Readme.md -CVE-2020-25785 - https://github.com/tezeb/accfly/blob/master/Readme.md -CVE-2020-25786 - https://github.com/sek1th/iot/blob/master/DIR-816L_XSS.md -CVE-2020-25786 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10190 -CVE-2020-25787 - http://packetstormsecurity.com/files/161606/TinyTinyRSS-Remote-Code-Execution.html -CVE-2020-2579 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25790 - http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html -CVE-2020-25790 - http://packetstormsecurity.com/files/159615/Typesetter-CMS-5.1-Remote-Code-Execution.html -CVE-2020-25790 - https://github.com/Typesetter/Typesetter/issues/674 -CVE-2020-2580 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2581 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2582 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25820 - http://packetstormsecurity.com/files/159667/BigBlueButton-2.2.25-File-Disclosure-Server-Side-Request-Forgery.html -CVE-2020-25820 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-005 -CVE-2020-2583 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25830 - https://mantisbt.org/bugs/view.php?id=27304 -CVE-2020-2584 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2585 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25858 - http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities -CVE-2020-25859 - http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities -CVE-2020-2586 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25860 - https://github.com/rauc/rauc/security/advisories/GHSA-cgf3-h62j-w9vv -CVE-2020-25860 - https://www.vdoo.com/blog/cve-2020-25860-significant-vulnerability-discovered-rauc-embedded-firmware-update-framework -CVE-2020-25862 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-25863 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-25866 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-2587 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2588 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25889 - http://packetstormsecurity.com/files/160397/Online-Bus-Booking-System-Project-Using-PHP-MySQL-1.0-SQL-Injection.html -CVE-2020-25889 - http://seclists.org/fulldisclosure/2020/Dec/4 -CVE-2020-25889 - https://seclists.org/fulldisclosure/2020/Dec/4 -CVE-2020-2589 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25890 - https://vitor-santos.medium.com/xss-in-kyocera-printer-ecosys-m2640idw-cf6d3bc525e3 -CVE-2020-2590 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25901 - http://packetstormsecurity.com/files/160631/Spiceworks-7.5-HTTP-Header-Injection.html -CVE-2020-25901 - https://frontend.spiceworks.com/topic/2309457-desktop-host-header-injection-vulnerability -CVE-2020-25905 - https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html -CVE-2020-25905 - https://www.exploit-db.com/exploits/48916 -CVE-2020-2591 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25915 - https://github.com/thinkcmf/thinkcmf/issues/675 -CVE-2020-25917 - http://packetstormsecurity.com/files/160652/Stratodesk-NoTouch-Center-Privilege-Escalation.html -CVE-2020-2592 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25925 - https://ashketchum.medium.com/cross-site-scripting-xss-in-webmail-calender-in-icewarp-webclient-cve-2020-25925-67e1cbc40bd9 -CVE-2020-25926 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-25926 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-25927 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-25927 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-25928 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-25928 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-2593 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2594 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2595 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25950 - https://www.exploit-db.com/exploits/49369 -CVE-2020-25952 - https://phpgurukul.com/ -CVE-2020-25952 - https://systemweakness.com/cve-2020-25952-f60fff8ffac -CVE-2020-25952 - https://www.exploit-db.com/exploits/49052 -CVE-2020-25955 - http://packetstormsecurity.com/files/160398/Student-Management-System-Project-PHP-1.0-Cross-Site-Scripting.html -CVE-2020-25955 - http://seclists.org/fulldisclosure/2020/Dec/4 -CVE-2020-25955 - https://seclists.org/fulldisclosure/2020/Dec/4 -CVE-2020-2596 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25967 - https://www.cnpanda.net/codeaudit/777.html -CVE-2020-2597 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2598 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25985 - https://www.exploit-db.com/exploits/48848 -CVE-2020-25986 - http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html -CVE-2020-25987 - http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html -CVE-2020-25988 - https://medium.com/@niteshsurana/424f0db73129 -CVE-2020-25988 - https://www.exploit-db.com/exploits/49075 -CVE-2020-25988 - https://youtu.be/GOMLavacqSI -CVE-2020-25989 - https://vkas-afk.github.io/vuln-disclosures/ -CVE-2020-2599 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-25990 - https://www.exploit-db.com/exploits/48849 -CVE-2020-2600 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26006 - https://nikhilkumar01.medium.com/cve-2020-26006-31f847e16019 -CVE-2020-2601 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2602 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2603 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2604 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2604 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2020-26045 - https://github.com/daylightstudio/FUEL-CMS/issues/575 -CVE-2020-26048 - https://github.com/CuppaCMS/CuppaCMS/issues/7 -CVE-2020-26049 - https://hardik-solanki.medium.com/html-injection-stored-which-ultimately-resulted-into-a-cve-2020-26049-61c1a47dc2e8 -CVE-2020-2605 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26050 - https://thebinary0x1.medium.com/cve-2020-26050-safervpn-for-windows-local-privilege-escalation-da069bb1373c -CVE-2020-26051 - https://www.exploit-db.com/exploits/48593 -CVE-2020-26052 - https://www.exploit-db.com/exploits/48522 -CVE-2020-2606 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26061 - https://github.com/missing0x00/CVE-2020-26061 -CVE-2020-2607 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2608 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26088 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 -CVE-2020-2609 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2610 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2611 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26116 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-2612 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26124 - http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html -CVE-2020-2613 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26130 - https://github.com/an0ry/advisories -CVE-2020-26131 - https://github.com/an0ry/advisories -CVE-2020-26132 - https://github.com/an0ry/advisories -CVE-2020-26133 - https://github.com/an0ry/advisories -CVE-2020-26137 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-26137 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-26139 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-2614 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26140 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-26141 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-26142 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-26143 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-26144 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-26146 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-26147 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -CVE-2020-2615 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26153 - https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/ -CVE-2020-2616 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26164 - https://github.com/KDE/kdeconnect-kde/commit/8112729eb0f13e6947984416118531078e65580d -CVE-2020-26165 - http://packetstormsecurity.com/files/160733/qdPM-9.1-PHP-Object-Injection.html -CVE-2020-26165 - http://seclists.org/fulldisclosure/2021/Jan/10 -CVE-2020-26167 - https://github.com/daylightstudio/FUEL-CMS/ -CVE-2020-26168 - https://hazelcast.zendesk.com/hc/en-us/articles/360050161951--IMDG-Enterprise-4-0-4-0-1-4-0-2-LDAP-Authentication-Bypass -CVE-2020-2617 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26171 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26172 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26173 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26174 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26175 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26176 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26177 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-26178 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -CVE-2020-2618 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26184 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-26185 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-2619 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2620 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26200 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221 -CVE-2020-26201 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d -CVE-2020-26201 - https://www.askey.com.tw/ -CVE-2020-26201 - https://www.askey.com.tw/incident_report_notifications.html -CVE-2020-26205 - https://hackerone.com/reports/995995 -CVE-2020-26208 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821 -CVE-2020-26208 - https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc -CVE-2020-26208 - https://github.com/Matthias-Wandel/jhead/issues/7 -CVE-2020-2621 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26217 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-26217 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-2622 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26223 - https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status -CVE-2020-2623 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26235 - https://github.com/time-rs/time/issues/293 -CVE-2020-26237 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-26238 - https://github.com/jmrozanec/cron-utils/issues/461 -CVE-2020-2624 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26248 - http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html -CVE-2020-2625 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26251 - https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17 -CVE-2020-26257 - https://github.com/matrix-org/synapse/blob/develop/CHANGES.md#synapse-1231-2020-12-09 -CVE-2020-2626 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2627 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2628 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26280 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-043.txt -CVE-2020-26282 - https://securitylab.github.com/research/bean-validation-RCE -CVE-2020-26287 - https://github.com/hackmdio/codimd/issues/1630 -CVE-2020-26287 - https://github.com/hedgedoc/hedgedoc/commit/58276ebbf4504a682454a3686dcaff88bc1069d4 -CVE-2020-2629 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26299 - https://www.npmjs.com/package/ftp-srv -CVE-2020-2630 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26301 - https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/ -CVE-2020-26302 - https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js -CVE-2020-2631 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26312 - https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh/ -CVE-2020-2632 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2633 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2634 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2635 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2636 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2637 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2638 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2639 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2640 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26409 - https://gitlab.com/gitlab-org/gitlab/-/issues/259626 -CVE-2020-2641 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26418 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-26419 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-2642 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26420 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-26421 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-26422 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-2643 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2644 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2645 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2646 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2647 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2648 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2649 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2650 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26508 - https://www.syss.de/pentest-blog/ -CVE-2020-26509 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt -CVE-2020-2651 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26510 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt -CVE-2020-26511 - https://wpvulndb.com/vulnerabilities/10418 -CVE-2020-26511 - https://www.wpo365.com/change-log/ -CVE-2020-26515 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-09_CSNC-2020-010-codebeamer_ALM_Insecure-RememberMe.txt -CVE-2020-26516 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt -CVE-2020-2652 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26522 - http://packetstormsecurity.com/files/159520/Garfield-Petshop-2020-10-01-Cross-Site-Request-Forgery.html -CVE-2020-2653 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2654 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26542 - https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/ -CVE-2020-2655 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26554 - http://packetstormsecurity.com/files/160077/MailDepot-2033-2.3.3022-Cross-Site-Scripting.html -CVE-2020-26554 - https://www.syss.de/pentest-blog/syss-2020-037-persistent-cross-site-scripting-schwachstelle-in-reddoxx-maildepot -CVE-2020-26555 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2020-26556 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2020-26557 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2020-26558 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2020-26559 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2020-2656 - http://packetstormsecurity.com/files/155990/Solaris-xlock-Information-Disclosure.html -CVE-2020-2656 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26560 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2020-26561 - https://research.nccgroup.com/2020/10/20/wrt160nl-cve-2020-26561-bof/ -CVE-2020-26563 - https://packetstormsecurity.com/files/163699/ObjectPlanet-Opinio-7.12-Cross-Site-Scripting.html -CVE-2020-26564 - https://packetstormsecurity.com/files/163707/ObjectPlanet-Opinio-7.13-7.14-XML-Injection.html -CVE-2020-26565 - https://packetstormsecurity.com/files/163708/ObjectPlanet-Opinio-7.13-Expression-Language-Injection.html -CVE-2020-26566 - https://github.com/Motion-Project/motion/issues/1227#issuecomment-715927776 -CVE-2020-26567 - http://packetstormsecurity.com/files/159516/D-Link-DSR-250N-Denial-Of-Service.html -CVE-2020-26567 - http://seclists.org/fulldisclosure/2020/Oct/14 -CVE-2020-26567 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-002 -CVE-2020-2657 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26574 - https://adepts.of0x.cc/leostream-xss-to-rce/ -CVE-2020-26574 - https://www.leostream.com/resources/product-lifecycle/ -CVE-2020-26575 - https://gitlab.com/wireshark/wireshark/-/issues/16887 -CVE-2020-26575 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-2658 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26583 - https://seclists.org/fulldisclosure/2020/Oct/17 -CVE-2020-26584 - https://seclists.org/fulldisclosure/2020/Oct/17 -CVE-2020-2659 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26599 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-2660 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26600 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26601 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26602 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26603 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26604 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26605 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26606 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-26607 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-2661 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2662 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26623 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html -CVE-2020-26624 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html -CVE-2020-26625 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html -CVE-2020-26627 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html -CVE-2020-26628 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html -CVE-2020-26629 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html -CVE-2020-2663 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26630 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html -CVE-2020-2664 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2665 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26652 - https://github.com/aircrack-ng/rtl8812au/issues/730 -CVE-2020-2666 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26668 - https://www.exploit-db.com/exploits/48831 -CVE-2020-26669 - https://www.exploit-db.com/exploits/48831 -CVE-2020-2667 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26670 - https://www.exploit-db.com/exploits/48831 -CVE-2020-26672 - https://wpvulndb.com/vulnerabilities/10272 -CVE-2020-2668 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26682 - https://github.com/libass/libass/issues/431 -CVE-2020-2669 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2670 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26701 - http://packetstormsecurity.com/files/160082/Kaa-IoT-Platform-1.2.0-Cross-Site-Scripting.html -CVE-2020-26705 - https://github.com/darkfoxprime/python-easy_xml/issues/1 -CVE-2020-26707 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-26708 - https://github.com/erinxocon/requests-xml/issues/7 -CVE-2020-26709 - https://github.com/PinaeOS/py-xml/issues/2 -CVE-2020-2671 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26710 - https://github.com/uncmath25/easy-parse/issues/3 -CVE-2020-26712 - https://github.com/vuongdq54/RedCap -CVE-2020-26713 - https://github.com/vuongdq54/RedCap -CVE-2020-2672 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26728 - https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md -CVE-2020-26728 - https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md -CVE-2020-2673 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26732 - https://github.com/swzhouu/CVE-2020-26732 -CVE-2020-26733 - https://github.com/swzhouu/CVE-2020-26733 -CVE-2020-2674 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2675 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2676 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26766 - https://www.exploit-db.com/exploits/49180 -CVE-2020-2677 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26773 - https://packetstormsecurity.com/files/159475/Restaurant-Reservation-System-1.0-SQL-Injection.html -CVE-2020-2678 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2679 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26797 - https://sourceforge.net/p/mediainfo/bugs/1154/ -CVE-2020-2680 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26802 - https://www.exploit-db.com/exploits/48494 -CVE-2020-26806 - https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html -CVE-2020-26808 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2020-26808 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2020-26809 - http://packetstormsecurity.com/files/163146/SAP-Hybris-eCommerce-Information-Disclosure.html -CVE-2020-2681 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26811 - http://packetstormsecurity.com/files/163143/SAP-Hybris-eCommerce-Server-Side-Request-Forgery.html -CVE-2020-2682 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26820 - http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html -CVE-2020-26829 - http://packetstormsecurity.com/files/163166/SAP-Netweaver-JAVA-7.50-Missing-Authorization.html -CVE-2020-2683 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26830 - http://packetstormsecurity.com/files/163161/SAP-Solution-Manager-7.2-Missing-Authorization.html -CVE-2020-26832 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2020-26832 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2020-26836 - http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html -CVE-2020-26837 - http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html -CVE-2020-2684 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2685 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2686 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26867 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/ -CVE-2020-26868 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/ -CVE-2020-26869 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/ -CVE-2020-2687 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26870 - https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d -CVE-2020-26870 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-26878 - https://adepts.of0x.cc -CVE-2020-26878 - https://adepts.of0x.cc/ruckus-vriot-rce/ -CVE-2020-26878 - https://support.ruckuswireless.com/documents -CVE-2020-26878 - https://x-c3ll.github.io -CVE-2020-26879 - https://adepts.of0x.cc -CVE-2020-26879 - https://adepts.of0x.cc/ruckus-vriot-rce/ -CVE-2020-26879 - https://support.ruckuswireless.com/documents -CVE-2020-26879 - https://x-c3ll.github.io -CVE-2020-2688 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26880 - https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420 -CVE-2020-26880 - https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235 -CVE-2020-26882 - https://www.playframework.com/security/vulnerability -CVE-2020-26883 - https://www.playframework.com/security/vulnerability -CVE-2020-26885 - https://2SXC.org/en/blog/post/2sxc-security-notification-2021-001 -CVE-2020-26886 - https://vulnerable.af -CVE-2020-26886 - https://vulnerable.af/posts/cve-2020-26886/ -CVE-2020-26887 - http://packetstormsecurity.com/files/159606/FRITZ-Box-7.20-DNS-Rebinding-Protection-Bypass.html -CVE-2020-26887 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2020-2689 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26899 - https://kb.netgear.com/000062355/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2020-0030 -CVE-2020-2690 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26905 - https://kb.netgear.com/000062349/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0047 -CVE-2020-26907 - https://kb.netgear.com/000062347/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0264 -CVE-2020-2691 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26912 - https://kb.netgear.com/000062341/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2019-0018 -CVE-2020-26913 - https://kb.netgear.com/000062340/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2018-0140 -CVE-2020-26916 - https://kb.netgear.com/000062337/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2019-0012 -CVE-2020-26917 - https://kb.netgear.com/000062336/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Extender-and-Routers-PSV-2018-0242 -CVE-2020-26918 - https://kb.netgear.com/000062335/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Extenders-and-Routers-PSV-2018-0243 -CVE-2020-26919 - https://kb.netgear.com/000062334/Security-Advisory-for-Missing-Function-Level-Access-Control-on-JGS516PE-PSV-2020-0377 -CVE-2020-2692 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26921 - https://kb.netgear.com/000062332/Security-Advisory-for-Authentication-Bypass-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0305 -CVE-2020-26922 - https://kb.netgear.com/000062330/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Wireless-Controllers-PSV-2020-0139 -CVE-2020-26924 - https://kb.netgear.com/000062328/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Wireless-Access-Points-PSV-2020-0141 -CVE-2020-2693 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26930 - https://kb.netgear.com/000062322/Security-Advisory-for-Security-Misconfiguration-on-EX7700-PSV-2020-0109 -CVE-2020-2694 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26943 - https://launchpad.net/bugs/1895688 -CVE-2020-26947 - https://github.com/monero-project/monero-gui/issues/3142#issuecomment-705940446 -CVE-2020-2695 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26950 - http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html -CVE-2020-26950 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675905 -CVE-2020-26953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1656741 -CVE-2020-26959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1669466 -CVE-2020-2696 - http://packetstormsecurity.com/files/155963/SunOS-5.10-Generic_147148-26-Local-Privilege-Escalation.html -CVE-2020-2696 - http://packetstormsecurity.com/files/155991/Common-Desktop-Environment-2.3.1-Buffer-Overflow.html -CVE-2020-2696 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26960 - https://bugzilla.mozilla.org/show_bug.cgi?id=1670358 -CVE-2020-26962 - https://bugzilla.mozilla.org/show_bug.cgi?id=610997 -CVE-2020-26966 - https://bugzilla.mozilla.org/show_bug.cgi?id=1663571 -CVE-2020-2697 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26971 - https://bugzilla.mozilla.org/show_bug.cgi?id=1663466 -CVE-2020-26975 - https://bugzilla.mozilla.org/show_bug.cgi?id=1661071 -CVE-2020-26977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1676311 -CVE-2020-2698 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-26989 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf -CVE-2020-2699 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2700 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2701 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27016 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -CVE-2020-27017 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -CVE-2020-27018 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -CVE-2020-27019 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -CVE-2020-2702 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27020 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#270421 -CVE-2020-2703 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2704 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2705 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2706 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2707 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2709 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2710 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2711 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2712 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2713 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2714 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27149 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities -CVE-2020-2715 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27150 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities -CVE-2020-27151 - https://bugs.launchpad.net/katacontainers.io/+bug/1878234 -CVE-2020-27151 - https://github.com/kata-containers/kata-containers/releases/tag/2.0.0 -CVE-2020-27152 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.2 -CVE-2020-27152 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77377064c3a94911339f13ce113b3abf265e06da -CVE-2020-27158 - https://www.westerndigital.com/support/productsecurity -CVE-2020-27158 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -CVE-2020-27159 - https://www.westerndigital.com/support/productsecurity -CVE-2020-27159 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -CVE-2020-2716 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27160 - https://www.westerndigital.com/support/productsecurity -CVE-2020-27160 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -CVE-2020-2717 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27170 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2020-27170 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 -CVE-2020-27170 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76 -CVE-2020-27170 - https://www.openwall.com/lists/oss-security/2021/03/19/2 -CVE-2020-27171 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2020-27171 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 -CVE-2020-27171 - https://www.openwall.com/lists/oss-security/2021/03/19/3 -CVE-2020-27176 - https://github.com/marktext/marktext/issues/2360 -CVE-2020-27179 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ -CVE-2020-27179 - https://seclists.org/fulldisclosure/2020/Oct/28 -CVE-2020-2718 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27180 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ -CVE-2020-27180 - https://seclists.org/fulldisclosure/2020/Oct/28 -CVE-2020-27181 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ -CVE-2020-27181 - https://seclists.org/fulldisclosure/2020/Oct/28 -CVE-2020-27182 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ -CVE-2020-27182 - https://seclists.org/fulldisclosure/2020/Oct/28 -CVE-2020-27183 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ -CVE-2020-27183 - https://seclists.org/fulldisclosure/2020/Oct/28 -CVE-2020-27184 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities -CVE-2020-27185 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities -CVE-2020-2719 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27191 - https://www.junebug.site/blog/cve-2020-27191-lionwiki-3-2-11-lfi -CVE-2020-27193 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27193 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27193 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-27194 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15 -CVE-2020-27196 - https://www.playframework.com/security/vulnerability -CVE-2020-27197 - http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html -CVE-2020-27197 - https://github.com/eclecticiq/OpenTAXII/issues/176 -CVE-2020-27199 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/magic-home-pro-mobile-application-authentication-bypass-cve-2020-27199/ -CVE-2020-2720 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27207 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 -CVE-2020-27208 - https://eprint.iacr.org/2021/640 -CVE-2020-27208 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html -CVE-2020-27209 - https://eprint.iacr.org/2021/640 -CVE-2020-27209 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html -CVE-2020-2721 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27211 - https://eprint.iacr.org/2021/640 -CVE-2020-27211 - https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ -CVE-2020-27211 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html -CVE-2020-27212 - https://eprint.iacr.org/2021/640 -CVE-2020-27212 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html -CVE-2020-27216 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27216 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27216 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-27216 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-27216 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-27218 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-2722 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27223 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27224 - https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/ -CVE-2020-27226 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1202 -CVE-2020-27227 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1203 -CVE-2020-27228 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1204 -CVE-2020-27229 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 -CVE-2020-2723 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27230 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 -CVE-2020-27231 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 -CVE-2020-27232 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1206 -CVE-2020-27233 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27234 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27235 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27236 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27237 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27238 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27239 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-2724 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27240 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27241 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 -CVE-2020-27242 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 -CVE-2020-27243 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 -CVE-2020-27244 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 -CVE-2020-27245 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 -CVE-2020-27246 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 -CVE-2020-27247 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 -CVE-2020-27248 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 -CVE-2020-27249 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 -CVE-2020-2725 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27250 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 -CVE-2020-2726 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2727 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2728 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2729 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2730 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-27301 - https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day -CVE-2020-27302 - https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day -CVE-2020-2731 - https://www.oracle.com/security-alerts/cpujan2020.html -CVE-2020-2733 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2734 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27348 - https://bugs.launchpad.net/bugs/1901572 -CVE-2020-27349 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1899193 -CVE-2020-2735 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27350 - https://bugs.launchpad.net/bugs/1899193 -CVE-2020-27351 - https://bugs.launchpad.net/bugs/1899193 -CVE-2020-27368 - https://github.com/swzhouu/CVE-2020-27368 -CVE-2020-2737 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27373 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c -CVE-2020-27374 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c -CVE-2020-27375 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c -CVE-2020-27376 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c -CVE-2020-27379 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e -CVE-2020-2738 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27383 - https://github.com/FreySolarEye/CVE/blob/master/Battle%20Net%20Launcher%20Local%20Privilege%20Escalation -CVE-2020-27384 - https://github.com/FreySolarEye/CVE/blob/master/Guild%20Wars%202%20-%20Local%20Privilege%20Escalation -CVE-2020-27385 - https://blog.vonahi.io/whats-in-a-re-name/ -CVE-2020-27386 - http://packetstormsecurity.com/files/160411/FlexDotnetCMS-1.5.8-Arbitrary-ASP-File-Upload.html -CVE-2020-27386 - https://blog.vonahi.io/whats-in-a-re-name/ -CVE-2020-27387 - http://packetstormsecurity.com/files/160046/HorizontCMS-1.0.0-beta-Shell-Upload.html -CVE-2020-27387 - https://blog.vonahi.io/whats-in-a-re-name/ -CVE-2020-27388 - http://yourls.com -CVE-2020-2739 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27397 - https://packetstormsecurity.com/files/160337/Online-Matrimonial-Project-1.0-Remote-Code-Execution.html -CVE-2020-2740 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27402 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-004.md -CVE-2020-27402 - https://sick.codes/sick-2020-004/ -CVE-2020-27402 - https://threatpost.com/authentication-bug-android-smart-tv-data-theft/160025/ -CVE-2020-27402 - https://www.cybersecurity-help.cz/vdb/SB2020101404 -CVE-2020-27402 - https://www.securitylab.ru/news/513051.php -CVE-2020-27403 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-009.md -CVE-2020-27403 - https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/ -CVE-2020-27403 - https://sick.codes/sick-2020-009 -CVE-2020-27406 - https://www.exploit-db.com/exploits/48865 -CVE-2020-2741 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27413 - https://cvewalkthrough.com/cve-2020-27413-mahavitaran-android-application-clear-text-password-storage/ -CVE-2020-27414 - https://cvewalkthrough.com/cve-2020-27414-mahavitaran-android-application-insecure-communication-of-sensitive-dat/ -CVE-2020-27416 - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/ -CVE-2020-2742 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27422 - https://packetstormsecurity.com/files/160051/Anuko-Time-Tracker-1.19.23.5311-Password-Reset.html -CVE-2020-27423 - https://packetstormsecurity.com/files/160052/Anuko-Time-Tracker-1.19.23.5311-Missing-Rate-Limiting.html -CVE-2020-2743 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2744 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2745 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27459 - https://github.com/nugmubs/chronoforums-cve/wiki/Stored-XSS-Vulnerability-in-Chronoforum-v2.0.11-(Joomla-plugin) -CVE-2020-2746 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27461 - https://www.exploit-db.com/exploits/48862 -CVE-2020-27467 - https://github.com/ceng-yildirim/LFI-processwire -CVE-2020-2747 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27478 - https://github.com/simplcommerce/SimplCommerce/issues/943 -CVE-2020-2748 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27481 - https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070 -CVE-2020-27484 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0004.md -CVE-2020-27488 - https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/ -CVE-2020-27488 - https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/ -CVE-2020-2749 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2750 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27509 - https://medium.com/@tomhulme_74888/persistent-cross-site-scripting-leading-to-full-account-takeover-on-galaxkey-v5-6-11-4-8bf96be35b54 -CVE-2020-2751 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27511 - https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md -CVE-2020-27515 - https://www.exploit-db.com/exploits/49208 -CVE-2020-27518 - https://jeffs.sh/CVEs/CVE-2020-27518.txt -CVE-2020-2752 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27523 - https://www.youtube.com/watch?v=EGW_M1MqAG0 -CVE-2020-27524 - https://www.youtube.com/watch?v=BQUVgAdhwQs -CVE-2020-2753 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27533 - http://packetstormsecurity.com/files/159772/DedeCMS-5.8-Cross-Site-Scripting.html -CVE-2020-27539 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 -CVE-2020-2754 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-2754 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27540 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 -CVE-2020-27541 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 -CVE-2020-27542 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 -CVE-2020-27543 - https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate -CVE-2020-27545 - https://www.prevanders.net/dwarfbug.html#DW202010-001 -CVE-2020-2755 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-2755 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27553 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -CVE-2020-27554 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -CVE-2020-27555 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -CVE-2020-27556 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -CVE-2020-27557 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -CVE-2020-27558 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -CVE-2020-2756 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-2756 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27568 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#insecure-file-permissions -CVE-2020-27569 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-abitrary-file-write -CVE-2020-2757 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-2757 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27574 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html -CVE-2020-27575 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html -CVE-2020-27576 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html -CVE-2020-2758 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27583 - https://n4nj0.github.io/advisories/ibm-infosphere-java-deserialization/ -CVE-2020-2759 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2760 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27600 - https://github.com/pwnninja/dlink/blob/main/DIR-846_SetMasterWLanSettingsCI.md -CVE-2020-27600 - https://www.dlink.com/en/security-bulletin/ -CVE-2020-2761 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27615 - https://wpdeeply.com/loginizer-before-1-6-4-sqli-injection/ -CVE-2020-27615 - https://wpscan.com/vulnerability/10441 -CVE-2020-27615 - https://www.zdnet.com/article/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/ -CVE-2020-27618 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-27618 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-27619 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-2762 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27621 - https://phabricator.wikimedia.org/T265810 -CVE-2020-2763 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27637 - https://labs.bishopfox.com/advisories/cran-version-4.0.2 -CVE-2020-2764 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-2764 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2765 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27652 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061 -CVE-2020-27653 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061 -CVE-2020-27659 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087 -CVE-2020-2766 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27660 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087 -CVE-2020-27664 - https://github.com/strapi/strapi/pull/8442 -CVE-2020-27664 - https://github.com/strapi/strapi/releases/tag/v3.2.5 -CVE-2020-27665 - https://github.com/strapi/strapi/pull/8439 -CVE-2020-27665 - https://github.com/strapi/strapi/releases/tag/v3.2.5 -CVE-2020-27666 - https://github.com/strapi/strapi/pull/8440 -CVE-2020-27666 - https://github.com/strapi/strapi/releases/tag/v3.2.5 -CVE-2020-2767 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2768 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27687 - https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936 -CVE-2020-27688 - https://github.com/matthiasmaes/CVE-2020-27688 -CVE-2020-27689 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf -CVE-2020-2769 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27690 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf -CVE-2020-27691 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf -CVE-2020-27692 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf -CVE-2020-27693 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -CVE-2020-27694 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -CVE-2020-2770 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2771 - http://packetstormsecurity.com/files/157282/Oracle-Solaris-11.x-10-whodo-w-Buffer-Overflow.html -CVE-2020-2771 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2772 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2773 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-2773 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27735 - https://wshenk.blogspot.com/2021/01/xss-in-wing-ftps-web-interface-cve-2020.html -CVE-2020-2774 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27744 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -CVE-2020-2775 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2776 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2777 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2778 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27783 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27784 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8d5f92b8d30bb4ade76494490c3c065e12411b1 -CVE-2020-27786 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d -CVE-2020-27787 - https://github.com/upx/upx/issues/333 -CVE-2020-27788 - https://github.com/upx/upx/issues/332 -CVE-2020-2779 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27790 - https://github.com/upx/upx/issues/331 -CVE-2020-27792 - https://bugs.ghostscript.com/show_bug.cgi?id=701844 -CVE-2020-27796 - https://github.com/upx/upx/issues/392 -CVE-2020-27797 - https://github.com/upx/upx/issues/390 -CVE-2020-27798 - https://github.com/upx/upx/issues/396 -CVE-2020-27799 - https://github.com/upx/upx/issues/391 -CVE-2020-2780 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27800 - https://github.com/upx/upx/issues/395 -CVE-2020-27801 - https://github.com/upx/upx/issues/394 -CVE-2020-27802 - https://github.com/upx/upx/issues/393 -CVE-2020-2781 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27813 - https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh -CVE-2020-27814 - https://github.com/uclouvain/openjpeg/issues/1283 -CVE-2020-27814 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27815 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c -CVE-2020-2782 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27820 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-27824 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-27828 - https://github.com/jasper-software/jasper/issues/252 -CVE-2020-27829 - https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0 -CVE-2020-2783 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2784 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27841 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27841 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27842 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27842 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27843 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27843 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27844 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27844 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-27845 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-27845 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-2785 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2786 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2787 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27885 - https://www.rodrigofavarini.com.br/cybersecurity/multiple-xss-on-api-manager-3-1-0/ -CVE-2020-2789 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2790 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2791 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2793 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27930 - http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html -CVE-2020-27932 - http://packetstormsecurity.com/files/161295/XNU-Kernel-Turnstiles-Type-Confusion.html -CVE-2020-2794 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2795 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27950 - http://packetstormsecurity.com/files/161296/XNU-Kernel-Mach-Message-Trailers-Memory-Disclosure.html -CVE-2020-27955 - http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html -CVE-2020-27955 - http://packetstormsecurity.com/files/164180/Git-git-lfs-Remote-Code-Execution.html -CVE-2020-27955 - http://seclists.org/fulldisclosure/2020/Nov/1 -CVE-2020-27955 - https://exploitbox.io -CVE-2020-27955 - https://legalhackers.com -CVE-2020-27955 - https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html -CVE-2020-27956 - https://www.exploit-db.com/exploits/48931 -CVE-2020-2796 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2797 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27974 - https://herolab.usd.de/security-advisories/usd-2020-0029/ -CVE-2020-27975 - https://herolab.usd.de/security-advisories/usd-2020-0027/ -CVE-2020-27976 - https://herolab.usd.de/security-advisories/usd-2020-0026/ -CVE-2020-2798 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27980 - https://www.exploit-db.com/exploits/48948 -CVE-2020-27982 - http://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html -CVE-2020-27982 - https://cxsecurity.com/issue/WLB-2020100161 -CVE-2020-2799 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-27992 - https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html -CVE-2020-27993 - https://www.exploit-db.com/exploits/48920 -CVE-2020-27994 - http://packetstormsecurity.com/files/161399/SolarWinds-Serv-U-FTP-Server-15.2.1-Path-Traversal.html -CVE-2020-27994 - http://seclists.org/fulldisclosure/2021/Feb/36 -CVE-2020-27996 - https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET -CVE-2020-27997 - https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET -CVE-2020-2800 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28001 - http://packetstormsecurity.com/files/161400/SolarWinds-Serv-U-FTP-Server-15.2.1-Cross-Site-Scripting.html -CVE-2020-28001 - http://seclists.org/fulldisclosure/2021/Feb/37 -CVE-2020-28005 - https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ -CVE-2020-28007 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt -CVE-2020-28008 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt -CVE-2020-28009 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt -CVE-2020-2801 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28010 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt -CVE-2020-28011 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt -CVE-2020-28012 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt -CVE-2020-28013 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt -CVE-2020-28014 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt -CVE-2020-28015 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt -CVE-2020-28016 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt -CVE-2020-28017 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt -CVE-2020-28018 - http://www.openwall.com/lists/oss-security/2021/05/11/5 -CVE-2020-28018 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt -CVE-2020-28019 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt -CVE-2020-2802 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28020 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt -CVE-2020-28021 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt -CVE-2020-28022 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt -CVE-2020-28023 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt -CVE-2020-28024 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt -CVE-2020-28025 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt -CVE-2020-28026 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt -CVE-2020-2803 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28030 - https://gitlab.com/wireshark/wireshark/-/issues/16887 -CVE-2020-28032 - https://wpscan.com/vulnerability/10446 -CVE-2020-28036 - https://wpscan.com/vulnerability/10449 -CVE-2020-28037 - https://wpscan.com/vulnerability/10450 -CVE-2020-28038 - https://blog.ripstech.com -CVE-2020-28039 - https://wpscan.com/vulnerability/10452 -CVE-2020-2804 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28041 - https://github.com/samyk/slipstream -CVE-2020-28041 - https://samy.pl/slipstream/ -CVE-2020-28042 - https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/ -CVE-2020-28047 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/Reflected-XSS.md -CVE-2020-28049 - https://github.com/sddm/sddm/releases -CVE-2020-2805 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28052 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-28052 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-28052 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-28054 - https://voidsec.com -CVE-2020-28054 - https://voidsec.com/tivoli-madness/ -CVE-2020-28055 - https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/ -CVE-2020-28055 - https://sick.codes/sick-2020-012 -CVE-2020-2806 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28062 - https://github.com/hisiphp/hisiphp/issues/10 -CVE-2020-2807 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28070 - http://packetstormsecurity.com/files/160583/Alumni-Management-System-1.0-Blind-SQL-Injection.html -CVE-2020-28071 - http://packetstormsecurity.com/files/160591/Alumni-Management-System-1.0-Cross-Site-Scripting.html -CVE-2020-28072 - http://packetstormsecurity.com/files/160508/Alumni-Management-System-1.0-Shell-Upload.html -CVE-2020-28073 - http://packetstormsecurity.com/files/160606/Library-Management-System-1.0-SQL-Injection.html -CVE-2020-28074 - http://packetstormsecurity.com/files/160599/Online-Health-Card-System-1.0-SQL-Injection.html -CVE-2020-2808 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2809 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28091 - http://packetstormsecurity.com/files/160129/xuucms-3-SQL-Injection.html -CVE-2020-28092 - http://packetstormsecurity.com/files/160128/PESCMS-TEAM-2.3.2-Cross-Site-Scripting.html -CVE-2020-28097 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10 -CVE-2020-28097 - https://seclists.org/oss-sec/2020/q3/176 -CVE-2020-2810 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2811 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28115 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/README.md -CVE-2020-28119 - https://github.com/i900008/panexiang.github.io/blob/gh-pages/CVE-2020-28119.md -CVE-2020-2812 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28129 - https://www.exploit-db.com/exploits/48941 -CVE-2020-2813 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28130 - https://www.exploit-db.com/exploits/48928 -CVE-2020-28133 - https://www.exploit-db.com/exploits/48879 -CVE-2020-28136 - https://www.exploit-db.com/exploits/48892 -CVE-2020-28137 - https://www.exploit-db.com/exploits/48972 -CVE-2020-28138 - https://www.exploit-db.com/exploits/48429 -CVE-2020-28139 - https://www.exploit-db.com/exploits/48426 -CVE-2020-2814 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28140 - https://www.exploit-db.com/exploits/48438 -CVE-2020-28141 - https://www.exploit-db.com/exploits/48897 -CVE-2020-28145 - https://github.com/wuzhicms/wuzhicms/issues/191 -CVE-2020-28146 - https://github.com/eyoucms/eyoucms/issues/12 -CVE-2020-28146 - https://www.exploit-db.com/exploits/48530 -CVE-2020-28149 - https://c41nc.co.uk/cve-2020-28149/ -CVE-2020-2815 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28150 - https://c41nc.co.uk/?page_id=85 -CVE-2020-2816 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28163 - https://www.prevanders.net/dwarfbug.html#DW202010-003 -CVE-2020-28169 - http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html -CVE-2020-28169 - https://github.com/fluent/fluentd/issues/3201 -CVE-2020-2817 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28172 - https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py -CVE-2020-28172 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip -CVE-2020-28173 - https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py -CVE-2020-28173 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip -CVE-2020-2818 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28183 - https://www.exploit-db.com/exploits/49032 -CVE-2020-28184 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-28185 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-28186 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-28187 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-28188 - http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html -CVE-2020-28188 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-2819 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28190 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-28196 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-28196 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-28196 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-28198 - https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py -CVE-2020-28198 - https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager -CVE-2020-28199 - https://aramido.de/media/aramido-2020-006-disclosure-amazon-secret-access-key.md -CVE-2020-2820 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28206 - https://justrealstag.medium.com/user-enumeration-improper-restriction-of-excessive-authentication-attempts-in-bitrix-98933a97e0e6 -CVE-2020-28208 - http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html -CVE-2020-28208 - http://seclists.org/fulldisclosure/2021/Jan/32 -CVE-2020-28208 - http://seclists.org/fulldisclosure/2021/Jan/43 -CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/07/1 -CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/08/1 -CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/13/1 -CVE-2020-28208 - https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt -CVE-2020-28208 - https://trovent.io/security-advisory-2010-01 -CVE-2020-2821 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2822 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2823 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2824 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28241 - https://github.com/maxmind/libmaxminddb/issues/236 -CVE-2020-28243 - https://sec.stealthcopter.com/cve-2020-28243/ -CVE-2020-28249 - https://github.com/fhlip0/JopinXSS -CVE-2020-28249 - https://github.com/laurent22/joplin/releases -CVE-2020-2825 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2826 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28267 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28267 -CVE-2020-28268 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268 -CVE-2020-28269 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269 -CVE-2020-2827 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28270 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270 -CVE-2020-28271 - https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20 -CVE-2020-28271 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271 -CVE-2020-28272 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28272 -CVE-2020-28273 - https://www.whitesourcesoftware.com/vulnerability-database -CVE-2020-28273 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273 -CVE-2020-28276 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28276 -CVE-2020-28277 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28277 -CVE-2020-28278 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28278 -CVE-2020-28279 - https://github.com/sahellebusch/flattenizer/pull/13 -CVE-2020-28279 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28279 -CVE-2020-2828 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28280 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280 -CVE-2020-28281 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281 -CVE-2020-28282 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282 -CVE-2020-2829 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2830 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2831 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2832 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28328 - http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html -CVE-2020-28328 - http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html -CVE-2020-28328 - http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html -CVE-2020-28328 - https://github.com/mcorybillington/SuiteCRM-RCE -CVE-2020-28329 - https://korelogic.com/Resources/Advisories/KL-001-2020-004.txt -CVE-2020-2833 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28330 - https://korelogic.com/Resources/Advisories/KL-001-2020-005.txt -CVE-2020-28331 - http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html -CVE-2020-28331 - https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt -CVE-2020-28332 - http://packetstormsecurity.com/files/160164/Barco-wePresent-Insecure-Firmware-Image.html -CVE-2020-28332 - https://korelogic.com/Resources/Advisories/KL-001-2020-009.txt -CVE-2020-28333 - http://packetstormsecurity.com/files/160161/Barco-wePresent-Authentication-Bypass.html -CVE-2020-28333 - https://korelogic.com/Resources/Advisories/KL-001-2020-006.txt -CVE-2020-28334 - http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-Root-SSH-Password.html -CVE-2020-28334 - https://korelogic.com/Resources/Advisories/KL-001-2020-008.txt -CVE-2020-28337 - http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html -CVE-2020-28337 - https://sl1nki.page/advisories/CVE-2020-28337 -CVE-2020-28337 - https://sl1nki.page/blog/2021/02/01/microweber-zip-slip -CVE-2020-2834 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28340 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-28341 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-28342 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-28343 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-28347 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2019/lao_bomb/lao_bomb.md -CVE-2020-28347 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/minesweeper.md -CVE-2020-28347 - https://github.com/rapid7/metasploit-framework/pull/14365 -CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2019/lao_bomb.md -CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2020/minesweeper.md -CVE-2020-28349 - https://www.cyberark.com/resources/threat-research-blog/lorawan-mqtt-what-to-know-when-securing-your-iot-network -CVE-2020-2835 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28351 - http://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html -CVE-2020-2836 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28361 - https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html -CVE-2020-28362 - https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI -CVE-2020-2837 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28373 - https://github.com/cpeggg/Netgear-upnpd-poc -CVE-2020-28374 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html -CVE-2020-28374 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7 -CVE-2020-2838 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28381 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf -CVE-2020-28382 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf -CVE-2020-28383 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf -CVE-2020-28384 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf -CVE-2020-28386 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf -CVE-2020-2839 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2840 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28408 - https://mattschmidt.net/2020/11/10/dundas-persistent-xss/ -CVE-2020-28409 - https://mattschmidt.net/2020/11/10/dundas-persistent-xss/ -CVE-2020-2841 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28413 - http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html -CVE-2020-28413 - https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d -CVE-2020-2842 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28423 - https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392 -CVE-2020-28424 - https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396 -CVE-2020-28425 - https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404 -CVE-2020-28426 - https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458 -CVE-2020-28429 - https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 -CVE-2020-2843 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28433 - https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426 -CVE-2020-28434 - https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430 -CVE-2020-28435 - https://security.snyk.io/vuln/SNYK-JS-FFMPEGSDK-1050429 -CVE-2020-28436 - https://security.snyk.io/vuln/SNYK-JS-GOOGLECLOUDSTORAGECOMMANDS-1050431 -CVE-2020-28437 - https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432 -CVE-2020-28438 - https://security.snyk.io/vuln/SNYK-JS-DEFERREDEXEC-1050433 -CVE-2020-28439 - https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434 -CVE-2020-2844 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28440 - https://snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435 -CVE-2020-28441 - https://security.snyk.io/vuln/SNYK-JS-CONFCFGINI-1048973 -CVE-2020-28442 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1050978 -CVE-2020-28442 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050979 -CVE-2020-28442 - https://snyk.io/vuln/SNYK-JS-JSDATA-1023655 -CVE-2020-28443 - https://security.snyk.io/vuln/SNYK-JS-SONARWRAPPER-1050980 -CVE-2020-28445 - https://security.snyk.io/vuln/SNYK-JS-NPMHELP-1050983 -CVE-2020-28446 - https://security.snyk.io/vuln/SNYK-JS-NTESSERACT-1050982 -CVE-2020-28447 - https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981 -CVE-2020-28448 - https://github.com/evangelion1204/multi-ini/pull/37 -CVE-2020-28448 - https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969 -CVE-2020-28449 - https://snyk.io/vuln/SNYK-JS-DECAL-1051007 -CVE-2020-2845 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28450 - https://snyk.io/vuln/SNYK-JS-DECAL-1051028 -CVE-2020-28451 - https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029 -CVE-2020-28453 - https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031 -CVE-2020-28455 - https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067 -CVE-2020-28456 - https://github.com/s-cart/s-cart/issues/52 -CVE-2020-28457 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-1047342 -CVE-2020-28458 - https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806 -CVE-2020-28459 - https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITDECORATE-1044068 -CVE-2020-2846 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28460 - https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229 -CVE-2020-28461 - https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970 -CVE-2020-28462 - https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971 -CVE-2020-28463 - https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145 -CVE-2020-28464 - https://github.com/korzio/djv/pull/98/files -CVE-2020-28464 - https://snyk.io/vuln/SNYK-JS-DJV-1014545 -CVE-2020-28468 - https://github.com/Gallopsled/pwntools/issues/1427 -CVE-2020-28468 - https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345 -CVE-2020-28469 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093 -CVE-2020-28469 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092 -CVE-2020-28469 - https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905 -CVE-2020-28469 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-2847 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28470 - https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829 -CVE-2020-28471 - https://github.com/steveukx/properties/issues/40 -CVE-2020-28471 - https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968 -CVE-2020-28472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426 -CVE-2020-28472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425 -CVE-2020-28472 - https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424 -CVE-2020-28472 - https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304 -CVE-2020-28473 - https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108 -CVE-2020-28477 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986 -CVE-2020-28477 - https://snyk.io/vuln/SNYK-JS-IMMER-1019369 -CVE-2020-28478 - https://snyk.io/vuln/SNYK-JS-GSAP-1054614 -CVE-2020-28479 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040 -CVE-2020-28479 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039 -CVE-2020-28479 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038 -CVE-2020-2848 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28480 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037 -CVE-2020-28480 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036 -CVE-2020-28480 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444 -CVE-2020-28481 - https://github.com/socketio/socket.io/issues/3671 -CVE-2020-28481 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358 -CVE-2020-28481 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357 -CVE-2020-28481 - https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859 -CVE-2020-28487 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 -CVE-2020-28487 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 -CVE-2020-28487 - https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 -CVE-2020-2849 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28491 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-28493 - https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994 -CVE-2020-28494 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672 -CVE-2020-28495 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671 -CVE-2020-28496 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972 -CVE-2020-28496 - https://snyk.io/vuln/SNYK-JS-THREE-1064931 -CVE-2020-28499 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049 -CVE-2020-28499 - https://snyk.io/vuln/SNYK-JS-MERGE-1042987 -CVE-2020-2850 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896 -CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894 -CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892 -CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895 -CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893 -CVE-2020-28500 - https://snyk.io/vuln/SNYK-JS-LODASH-1018905 -CVE-2020-28500 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-28500 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-28500 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-28500 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-28502 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937 -CVE-2020-28502 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938 -CVE-2020-28502 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935 -CVE-2020-28502 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936 -CVE-2020-28503 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047 -CVE-2020-28503 - https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870 -CVE-2020-2851 - http://packetstormsecurity.com/files/157281/Common-Desktop-Environment-2.3.1-1.6-libDtSvc-Buffer-Overflow.html -CVE-2020-2851 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2852 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2853 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2854 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2855 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2856 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2857 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28574 - https://www.tenable.com/security/research/tra-2020-62 -CVE-2020-28578 - https://www.tenable.com/security/research/tra-2020-63 -CVE-2020-28579 - https://www.tenable.com/security/research/tra-2020-63 -CVE-2020-2858 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28580 - https://www.tenable.com/security/research/tra-2020-63 -CVE-2020-28581 - https://www.tenable.com/security/research/tra-2020-63 -CVE-2020-28587 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 -CVE-2020-28588 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211 -CVE-2020-28589 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212 -CVE-2020-2859 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28590 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1213 -CVE-2020-28591 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215 -CVE-2020-28592 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1216 -CVE-2020-28593 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1217 -CVE-2020-28594 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1218 -CVE-2020-28595 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219 -CVE-2020-28596 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220 -CVE-2020-28597 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221 -CVE-2020-28598 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1222 -CVE-2020-28599 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223 -CVE-2020-2860 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28600 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1224 -CVE-2020-28601 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28602 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28603 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28604 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28605 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28606 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28607 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28608 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28609 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-2861 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28610 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28611 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28612 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28613 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28614 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28615 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28616 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28617 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28618 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28619 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-2862 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28620 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28621 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28622 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28623 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28624 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28625 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28626 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28627 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28628 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28629 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-2863 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28630 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28631 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28632 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28633 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28634 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28635 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-28636 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-2864 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28647 - https://labs.secforce.com/posts/progress-moveit-transfer-2020.1-stored-xss-cve-2020-28647/ -CVE-2020-28648 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28648 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-2865 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28653 - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html -CVE-2020-28657 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-28657 -CVE-2020-2866 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2867 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28672 - https://github.com/fortest-1/vuln/blob/main/MonoCMS%20Blog/MonoCMS%20Blog%201.0_remote_code_execution.md -CVE-2020-2868 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28687 - https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html -CVE-2020-28688 - https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html -CVE-2020-2869 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28695 - https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b -CVE-2020-2870 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28705 - https://github.com/daylightstudio/FUEL-CMS/issues/576 -CVE-2020-28707 - https://jondow.eu/cve-2020-28707-xss-in-stockdio-historical-chart-plugin-for-wordpress-before-version-281/ -CVE-2020-2871 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28717 - https://github.com/kindsoft/kindeditor/issues/321 -CVE-2020-2872 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28722 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro -CVE-2020-2873 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2874 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2875 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28759 - https://github.com/OAID/Tengine/issues/476 -CVE-2020-2876 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2877 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2878 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2879 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2880 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2881 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2882 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2883 - http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html -CVE-2020-2883 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28838 - https://www.exploit-db.com/exploits/49228 -CVE-2020-2884 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28840 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 -CVE-2020-28841 - https://github.com/datadancer/WinSysVuln/blob/main/DriverGenius-MyDrivers64.md -CVE-2020-28845 - http://the-it-wonders.blogspot.com/2020/11/netskope-csv-injection-in-admin-ui.html -CVE-2020-28849 - https://github.com/ChurchCRM/CRM/issues/5477 -CVE-2020-2885 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28856 - http://packetstormsecurity.com/files/160453/OpenAsset-Digital-Asset-Management-IP-Access-Control-Bypass.html -CVE-2020-28856 - http://seclists.org/fulldisclosure/2020/Dec/17 -CVE-2020-28857 - http://packetstormsecurity.com/files/160455/OpenAsset-Digital-Asset-Management-Cross-Site-Scripting.html -CVE-2020-28857 - http://seclists.org/fulldisclosure/2020/Dec/18 -CVE-2020-28858 - http://packetstormsecurity.com/files/160458/OpenAsset-Digital-Asset-Management-Cross-Site-Request-Forgery.html -CVE-2020-28858 - http://seclists.org/fulldisclosure/2020/Dec/19 -CVE-2020-2886 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28860 - http://packetstormsecurity.com/files/160459/OpenAsset-Digital-Asset-Management-SQL-Injection.html -CVE-2020-28860 - http://seclists.org/fulldisclosure/2020/Dec/21 -CVE-2020-28861 - http://packetstormsecurity.com/files/160457/OpenAsset-Digital-Asset-Management-Insecure-Direct-Object-Reference.html -CVE-2020-28861 - http://seclists.org/fulldisclosure/2020/Dec/22 -CVE-2020-28864 - https://winscp.net/forum/viewtopic.php?t=30085 -CVE-2020-2887 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28870 - https://www.exploit-db.com/exploits/48946 -CVE-2020-28871 - http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html -CVE-2020-28871 - http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html -CVE-2020-28871 - http://packetstormsecurity.com/files/171429/Monitorr-1.7.6m-1.7.7d-Remote-Code-Execution.html -CVE-2020-28871 - https://www.exploit-db.com/exploits/48980 -CVE-2020-28872 - http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html -CVE-2020-28872 - https://www.exploit-db.com/exploits/48981 -CVE-2020-28877 - https://github.com/peanuts62/TP-Link-poc -CVE-2020-2888 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28884 - https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3 -CVE-2020-28885 - https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3 -CVE-2020-2889 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28895 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-28898 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/1318289409/v2021.2+-+March+2021 -CVE-2020-2890 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28900 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28900 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28901 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28901 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28902 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28902 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28903 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28903 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28904 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28904 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28905 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28905 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28906 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28906 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28907 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28907 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28908 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28908 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28909 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28909 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-2891 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28910 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28910 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28911 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -CVE-2020-28911 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -CVE-2020-28915 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15 -CVE-2020-28915 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262 -CVE-2020-28915 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16 -CVE-2020-2892 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28923 - https://www.playframework.com/security/vulnerability -CVE-2020-28926 - https://www.rootshellsecurity.net/remote-heap-corruption-bug-discovery-minidlna/ -CVE-2020-28928 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-28928 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-2893 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28937 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 -CVE-2020-28938 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 -CVE-2020-28939 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 -CVE-2020-2894 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28940 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 -CVE-2020-28941 - http://www.openwall.com/lists/oss-security/2020/11/19/5 -CVE-2020-28941 - https://www.openwall.com/lists/oss-security/2020/11/19/3 -CVE-2020-28943 - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -CVE-2020-28944 - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -CVE-2020-28945 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -CVE-2020-28948 - https://github.com/pear/Archive_Tar/issues/33 -CVE-2020-28949 - http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html -CVE-2020-28949 - https://github.com/pear/Archive_Tar/issues/33 -CVE-2020-2895 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28950 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 -CVE-2020-28955 - https://www.vulnerability-lab.com/get_content.php?id=2257 -CVE-2020-28956 - https://www.vulnerability-lab.com/get_content.php?id=2249 -CVE-2020-28957 - https://www.vulnerability-lab.com/get_content.php?id=2241 -CVE-2020-2896 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28960 - https://www.vulnerability-lab.com/get_content.php?id=2259 -CVE-2020-28961 - https://www.vulnerability-lab.com/get_content.php?id=2231 -CVE-2020-28963 - https://www.vulnerability-lab.com/get_content.php?id=2258 -CVE-2020-28964 - https://www.vulnerability-lab.com/get_content.php?id=2236 -CVE-2020-28967 - https://www.vulnerability-lab.com/get_content.php?id=2248 -CVE-2020-28968 - https://www.vulnerability-lab.com/get_content.php?id=2244 -CVE-2020-2897 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28970 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 -CVE-2020-28971 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 -CVE-2020-28974 - http://www.openwall.com/lists/oss-security/2020/11/25/1 -CVE-2020-28974 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7 -CVE-2020-28974 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804 -CVE-2020-28974 - https://seclists.org/oss-sec/2020/q4/104 -CVE-2020-28975 - http://packetstormsecurity.com/files/160281/SciKit-Learn-0.23.2-Denial-Of-Service.html -CVE-2020-28975 - https://github.com/scikit-learn/scikit-learn/issues/18891 -CVE-2020-28976 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html -CVE-2020-28977 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html -CVE-2020-28978 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html -CVE-2020-2898 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2899 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-28993 - https://www.exploit-db.com/exploits/49124 -CVE-2020-28994 - https://gist.github.com/wes4m/e32080b02c2cd668d50eeac66613ca1d -CVE-2020-2900 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29007 - https://github.com/seqred-s-a/cve-2020-29007 -CVE-2020-2901 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29013 - https://fortiguard.com/advisory/FG-IR-20-178 -CVE-2020-2902 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29020 - https://www.secomea.com/support/cybersecurity-advisory/#3217 -CVE-2020-29021 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2020-29022 - https://www.secomea.com/support/cybersecurity-advisory/#2923 -CVE-2020-29023 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2020-29023 - https://www.secomea.com/support/cybersecurity-advisory/#2418 -CVE-2020-29024 - https://www.secomea.com/support/cybersecurity-advisory/#2418 -CVE-2020-29025 - https://www.secomea.com/support/cybersecurity-advisory/#3042 -CVE-2020-29026 - https://www.secomea.com/support/cybersecurity-advisory/#2918 -CVE-2020-29027 - https://www.secomea.com/support/cybersecurity-advisory/#3042 -CVE-2020-29028 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2020-29029 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2020-2903 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29030 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2020-29031 - https://www.secomea.com/support/cybersecurity-advisory/#2920 -CVE-2020-29032 - https://www.secomea.com/support/cybersecurity-advisory/#3737 -CVE-2020-29032 - https://www.tenable.com/security/research/tra-2021-06 -CVE-2020-2904 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29042 - http://packetstormsecurity.com/files/160238/BigBlueButton-2.2.29-Brute-Force.html -CVE-2020-29043 - http://packetstormsecurity.com/files/160239/BigBlueButton-2.2.29-E-mail-Validation-Bypass.html -CVE-2020-2905 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29053 - https://grimthereaperteam.medium.com/hrsale-v-2-0-0-reflected-cross-site-scripting-17a5617e2c6e -CVE-2020-2906 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2907 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29071 - https://lean0x2f.github.io/liquidfiles_advisory -CVE-2020-29072 - https://lean0x2f.github.io/liquidfiles_advisory -CVE-2020-2908 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2909 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2910 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2911 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2912 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29127 - http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html -CVE-2020-2913 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29134 - https://systemweakness.com/cve-2020-29134-totvs-fluig-platform-f298ea84b507 -CVE-2020-29134 - https://www.exploit-db.com/exploits/49622 -CVE-2020-29138 - https://medium.com/@alexandrevvo/improper-access-control-in-the-sagemcom-router-model-f-st3486-net-797968e8adc8 -CVE-2020-2914 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29144 - http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html -CVE-2020-29145 - http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html -CVE-2020-2915 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29163 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d -CVE-2020-29164 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d -CVE-2020-29165 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d -CVE-2020-29166 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d -CVE-2020-29168 - https://www.exploit-db.com/exploits/49059 -CVE-2020-29189 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -CVE-2020-2920 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29203 - https://github.com/armink/struct2json/issues/13 -CVE-2020-29204 - https://github.com/xuxueli/xxl-job/issues/2083 -CVE-2020-29205 - https://nikhilkumar01.medium.com/cve-2020-29205-a7ab5cbcd156 -CVE-2020-29205 - https://www.exploit-db.com/exploits/48969 -CVE-2020-2921 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29214 - https://www.exploit-db.com/exploits/48883 -CVE-2020-29215 - https://www.exploit-db.com/exploits/48881 -CVE-2020-2922 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29227 - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 -CVE-2020-29228 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29228.md -CVE-2020-2923 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29230 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29230.md -CVE-2020-29231 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29231.md -CVE-2020-29233 - https://www.exploit-db.com/exploits/49085 -CVE-2020-29238 - http://packetstormsecurity.com/files/162152/ExpressVPN-VPN-Router-1.0-Integer-Overflow.html -CVE-2020-29239 - https://www.exploit-db.com/exploits/49159 -CVE-2020-2924 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29240 - https://www.exploit-db.com/exploits/49137 -CVE-2020-29247 - https://systemweakness.com/cve-2020-29247-wondercms-3-1-3-page-persistent-cross-site-scripting-3dd2bb210beb -CVE-2020-29247 - https://www.exploit-db.com/exploits/49102 -CVE-2020-2925 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29254 - https://youtu.be/Uc3sRBitu50 -CVE-2020-29257 - https://asfiyashaikh20.medium.com/exploit-for-cve-2020-29257-reflected-cross-site-scripting-xss-vulnerability-4a7bf9ae7d80 -CVE-2020-29258 - https://asfiyashaikh20.medium.com/exploit-for-cve-2020-29258-reflected-cross-site-scripting-xss-vulnerability-957f365a1f3b -CVE-2020-29259 - https://asfiyashaikh20.medium.com/cve-2020-29259-persistent-xss-2ef63cc5cee6 -CVE-2020-2926 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2927 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29279 - https://github.com/BigTiger2020/74CMS/blob/main/README.md -CVE-2020-2928 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29280 - https://github.com/BigTiger2020/Victor-CMS-/blob/main/README.md -CVE-2020-29280 - https://www.exploit-db.com/exploits/48734 -CVE-2020-29282 - https://github.com/BigTiger2020/BloodX-CMS/blob/main/README.md -CVE-2020-29282 - https://www.exploit-db.com/exploits/48786 -CVE-2020-29283 - https://github.com/BigTiger2020/Online-Doctor-Appointment-Booking-System-PHP/blob/main/README.md -CVE-2020-29284 - https://www.exploit-db.com/exploits/48984 -CVE-2020-29285 - https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md -CVE-2020-29287 - https://www.exploit-db.com/exploits/49056 -CVE-2020-29288 - https://www.exploit-db.com/exploits/48936 -CVE-2020-2929 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2930 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29303 - http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html -CVE-2020-29303 - http://seclists.org/fulldisclosure/2020/Dec/14 -CVE-2020-29304 - http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html -CVE-2020-29304 - http://seclists.org/fulldisclosure/2020/Dec/15 -CVE-2020-2931 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29315 - https://github.com/zoujingli/ThinkAdmin/issues/255 -CVE-2020-2932 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29321 - https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html -CVE-2020-29322 - https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html -CVE-2020-29323 - https://cybersecurityworks.com/zerodays/cve-2020-29323-telnet-hardcoded-credentials.html -CVE-2020-29324 - https://cybersecurityworks.com/zerodays/cve-2020-29324-d-link-router-dir-895l-mfc-telnet-hardcoded-credentials.html -CVE-2020-2933 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2934 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2934 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-2935 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2936 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29363 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-29364 - https://github.com/aslanemre/CVE-2020-29364/blob/main/CVE-2020-29364 -CVE-2020-29368 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.5 -CVE-2020-29368 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c444eb564fb16645c172d550359cb3d75fe8a040 -CVE-2020-29369 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.11 -CVE-2020-29369 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=246c320a8cfe0b11d81a4af38fa9985ef0cc9a4c -CVE-2020-2937 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29370 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd4d9c7d0c71866ec0c2825189ebd2ce35bd95b8 -CVE-2020-29371 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.4 -CVE-2020-29371 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2935e0a3cec1ffa558eea90db6279cff83aa3592 -CVE-2020-29371 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcf85fcedfdd17911982a3e3564fcfec7b01eebd -CVE-2020-29372 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2020-29372 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 -CVE-2020-29372 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0c4d1e176eeb614dc8734fc3ace34292771f11 -CVE-2020-29373 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 -CVE-2020-29373 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d30cdfbca316dadd099c3ca0d739c -CVE-2020-29374 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2020-29374 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3 -CVE-2020-29374 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f -CVE-2020-2938 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29384 - https://gist.github.com/mmmdzz/03df5177afd04b32ac190eb7907f3834 -CVE-2020-2939 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29392 - https://i.blackhat.com/asia-20/Friday/asia-20-Loke-Patching-Loopholes-Finding-Backdoors-In-Applications.pdf -CVE-2020-29394 - https://github.com/GENIVI/dlt-daemon/issues/274 -CVE-2020-29395 - http://packetstormsecurity.com/files/160282/WordPress-EventON-Calendar-3.0.5-Cross-Site-Scripting.html -CVE-2020-29396 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-2940 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2941 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2942 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2943 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29436 - https://support.sonatype.com/hc/en-us/articles/1500000415082-CVE-2020-29436-Nexus-Repository-Manager-3-XML-External-Entities-injection-2020-12-15 -CVE-2020-29437 - https://github.com/orangehrm/orangehrm/issues/695 -CVE-2020-29437 - https://www.horizon3.ai/disclosures/orangehrm-sqli.html -CVE-2020-2944 - http://packetstormsecurity.com/files/157280/Common-Desktop-Environment-1.6-Local-Privilege-Escalation.html -CVE-2020-2944 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2945 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29456 - https://github.com/ciur/papermerge/issues/228 -CVE-2020-29457 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf -CVE-2020-29458 - https://www.exploit-db.com/exploits/48907 -CVE-2020-2946 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29469 - https://www.exploit-db.com/exploits/49164 -CVE-2020-2947 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29470 - https://www.exploit-db.com/exploits/49099 -CVE-2020-29471 - https://www.exploit-db.com/exploits/49098 -CVE-2020-29472 - https://systemweakness.com/cve-2020-29472-under-construction-page-with-cpanel-1-0-sql-injection-18a6508c9683 -CVE-2020-29472 - https://www.exploit-db.com/exploits/49150 -CVE-2020-29474 - https://systemweakness.com/cve-2020-29474-egavilanmedia-address-book-1-0-exploit-sqli-auth-bypass-228cd4864262 -CVE-2020-29474 - https://www.exploit-db.com/exploits/49182 -CVE-2020-29475 - https://www.exploit-db.com/exploits/49093 -CVE-2020-29477 - https://www.exploit-db.com/exploits/49188 -CVE-2020-2949 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29499 - https://www.dell.com/support/kbdoc/000180775 -CVE-2020-2950 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29500 - https://www.dell.com/support/kbdoc/000180775 -CVE-2020-29501 - https://www.dell.com/support/kbdoc/000180775 -CVE-2020-29502 - https://www.dell.com/support/kbdoc/000180775 -CVE-2020-29503 - https://www.dell.com/support/kbdoc/000180775 -CVE-2020-29505 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-29506 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-29507 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-29508 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-2951 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2952 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29529 - https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug -CVE-2020-2953 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29534 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.3 -CVE-2020-29534 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f2122045b946241a9e549c2a76cea54fa58a7ff -CVE-2020-29535 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2020-29536 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2020-29537 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2020-29538 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2020-29539 - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14 -CVE-2020-2954 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29540 - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14 -CVE-2020-29547 - http://uncensored.citadel.org/msg/4576039 -CVE-2020-2955 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29550 - http://packetstormsecurity.com/files/160726/URVE-Software-Build-24.03.2020-Information-Disclosure.html -CVE-2020-29550 - http://seclists.org/fulldisclosure/2020/Dec/49 -CVE-2020-29550 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-042.txt -CVE-2020-29551 - http://packetstormsecurity.com/files/160725/URVE-Software-Build-24.03.2020-Missing-Authorization.html -CVE-2020-29551 - http://seclists.org/fulldisclosure/2020/Dec/48 -CVE-2020-29551 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-041.txt -CVE-2020-29552 - http://packetstormsecurity.com/files/160722/URVE-Software-Build-24.03.2020-Authentication-Bypass-Remote-Code-Execution.html -CVE-2020-29552 - http://seclists.org/fulldisclosure/2020/Dec/47 -CVE-2020-29552 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-040.txt -CVE-2020-2956 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29563 - https://www.westerndigital.com/support/productsecurity/wdc-20010-my-cloud-os5-firmware-5-07-118 -CVE-2020-29574 - https://www.bleepingcomputer.com/news/security/sophos-fixes-sql-injection-vulnerability-in-their-cyberoam-os/ -CVE-2020-2958 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29582 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-29582 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-29582 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-29587 - https://github.com/simplcommerce/SimplCommerce/issues/969 -CVE-2020-2959 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29596 - https://packetstormsecurity.com/files/160470/MiniWeb-HTTP-Server-0.8.19-Buffer-Overflow.html -CVE-2020-29596 - https://www.exploit-db.com/exploits/49247 -CVE-2020-29597 - http://packetstormsecurity.com/files/160784/Incom-CMS-2.0-File-Upload.html -CVE-2020-29599 - https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html -CVE-2020-29603 - https://mantisbt.org/bugs/view.php?id=27357 -CVE-2020-29604 - https://mantisbt.org/bugs/view.php?id=27357 -CVE-2020-29605 - https://mantisbt.org/bugs/view.php?id=27357 -CVE-2020-29607 - http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html -CVE-2020-2961 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2963 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-2964 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-29651 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-29654 - https://www.westerndigital.com/support/productsecurity/wdc-20011-western-digital-dashboard-privilege-escalation -CVE-2020-29655 - https://vuldb.com/?id.165678 -CVE-2020-29656 - https://vuldb.com/?id.165677 -CVE-2020-29659 - https://www.exploit-db.com/exploits/49217 -CVE-2020-2966 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-29660 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html -CVE-2020-29660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9 -CVE-2020-29661 - http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html -CVE-2020-29661 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html -CVE-2020-29661 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc -CVE-2020-29661 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-29664 - http://hacktheplanet.nu/djihax.pdf -CVE-2020-29669 - http://packetstormsecurity.com/files/160478/Macally-WIFISD2-2A82-2.000.010-Privilege-Escalation.html -CVE-2020-29669 - https://github.com/S1lkys/CVE-2020-29669 -CVE-2020-2967 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2968 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2969 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2971 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2972 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2973 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2974 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2975 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2976 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2977 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2978 - http://packetstormsecurity.com/files/172183/Oracle-RMAN-Missing-Auditing.html -CVE-2020-2978 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2981 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2982 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2983 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-2984 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-3110 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html -CVE-2020-3111 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html -CVE-2020-3118 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html -CVE-2020-3119 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html -CVE-2020-3120 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html -CVE-2020-3153 - http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html -CVE-2020-3153 - http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html -CVE-2020-3153 - http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html -CVE-2020-3161 - http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html -CVE-2020-3161 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs -CVE-2020-3187 - http://packetstormsecurity.com/files/158648/Cisco-Adaptive-Security-Appliance-Software-9.7-Arbitrary-File-Deletion.html -CVE-2020-3235 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-3239 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3240 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3243 - http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html -CVE-2020-3243 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3247 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3248 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3249 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3250 - http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html -CVE-2020-3250 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3251 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3252 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E -CVE-2020-3264 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r -CVE-2020-3268 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ -CVE-2020-3269 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ -CVE-2020-3274 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 -CVE-2020-3275 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 -CVE-2020-3276 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 -CVE-2020-3277 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 -CVE-2020-3278 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 -CVE-2020-3279 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 -CVE-2020-3286 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3287 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3288 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3289 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3290 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3291 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3292 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3293 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3294 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3295 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3296 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz -CVE-2020-3347 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-NBmqM9vt -CVE-2020-3350 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy -CVE-2020-3387 - http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html -CVE-2020-3433 - http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html -CVE-2020-3433 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW -CVE-2020-3437 - http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html -CVE-2020-3452 - http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html -CVE-2020-3452 - http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html -CVE-2020-3452 - http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html -CVE-2020-3452 - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html -CVE-2020-35012 - https://wpscan.com/vulnerability/323140b1-66c4-4e7d-85a4-1c922e40866f -CVE-2020-35037 - https://wpscan.com/vulnerability/937b9bdb-7e8e-4ea8-82ec-aa5f6bd70619 -CVE-2020-35124 - https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce -CVE-2020-35125 - https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce -CVE-2020-35126 - https://www.exploit-db.com/exploits/48852 -CVE-2020-35128 - https://labs.bishopfox.com/advisories/mautic-version-3.2.2 -CVE-2020-35129 - https://labs.bishopfox.com/advisories/mautic-version-3.2.2 -CVE-2020-35131 - https://www.exploit-db.com/exploits/49390 -CVE-2020-35151 - https://www.exploit-db.com/exploits/49307 -CVE-2020-35163 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35164 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35166 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35167 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35168 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35169 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35175 - https://github.com/frappe/frappe/pull/11237 -CVE-2020-35198 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-35199 - https://www.exploit-db.com/exploits/49233 -CVE-2020-35201 - https://www.exploit-db.com/exploits/49234 -CVE-2020-35202 - https://www.exploit-db.com/exploits/49235 -CVE-2020-35208 - https://youtu.be/63PfHVSr8iw -CVE-2020-35211 - https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing -CVE-2020-35214 - https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing -CVE-2020-35221 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35223 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35224 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35225 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35226 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35227 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35228 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35229 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35230 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35231 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35233 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35240 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35240.md -CVE-2020-35240 - https://github.com/hemantsolo/CVE-Reference/issues/1 -CVE-2020-35241 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35241.md -CVE-2020-35242 - https://github.com/balloonwj/flamingo/issues/47 -CVE-2020-35243 - https://github.com/balloonwj/flamingo/issues/47 -CVE-2020-35244 - https://github.com/balloonwj/flamingo/issues/47 -CVE-2020-35245 - https://github.com/balloonwj/flamingo/issues/47 -CVE-2020-35249 - https://www.exploit-db.com/exploits/48756 -CVE-2020-35252 - https://www.exploit-db.com/exploits/49153 -CVE-2020-35261 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 -CVE-2020-35261 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html -CVE-2020-35261 - https://www.exploit-db.com/exploits/49135 -CVE-2020-35262 - https://github.com/the-girl-who-lived/CVE-2020-35262 -CVE-2020-35262 - https://youtu.be/E5wEzf-gkOE -CVE-2020-35263 - https://www.exploit-db.com/exploits/49058 -CVE-2020-35269 - https://gist.github.com/MoSalah20/d1d40b43eafba0bd22ee4cddecad3cbc -CVE-2020-35270 - https://www.exploit-db.com/exploits/49152 -CVE-2020-35271 - https://riteshgohil-25.medium.com/employee-performance-evaluation-system-1-0-first-and-last-name-persistent-cross-site-scripting-7f319775e96f -CVE-2020-35272 - https://www.exploit-db.com/exploits/49215 -CVE-2020-35273 - https://www.exploit-db.com/exploits/49151 -CVE-2020-35274 - https://www.exploit-db.com/exploits/49168 -CVE-2020-35275 - https://www.exploit-db.com/exploits/49181 -CVE-2020-35276 - https://hardik-solanki.medium.com/authentication-admin-panel-bypass-which-leads-to-full-admin-access-control-c10ec4ab4255 -CVE-2020-35284 - https://github.com/balloonwj/flamingo/issues/48 -CVE-2020-35296 - https://github.com/zoujingli/ThinkAdmin -CVE-2020-35309 - https://www.exploit-db.com/exploits/49161 -CVE-2020-35313 - https://packetstormsecurity.com/files/160310/WonderCMS-3.1.3-Code-Execution-Server-Side-Request-Forgery.html -CVE-2020-35314 - https://packetstormsecurity.com/files/160311/WonderCMS-3.1.3-Remote-Code-Execution.html -CVE-2020-35327 - https://www.exploit-db.com/exploits/49243 -CVE-2020-35328 - https://www.exploit-db.com/exploits/49241 -CVE-2020-35329 - https://www.exploit-db.com/exploits/49242 -CVE-2020-35337 - https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html -CVE-2020-35337 - https://github.com/thinksaas/ThinkSAAS/issues/24 -CVE-2020-35338 - https://jeyaseelans.medium.com/cve-2020-35338-9e841f48defa -CVE-2020-35339 - https://github.com/BigTiger2020/74cms-rce/blob/main/README.md -CVE-2020-35342 - https://sourceware.org/bugzilla/show_bug.cgi?id=25319 -CVE-2020-35346 - https://github.com/cbkhwx/cxuucmsv3/issues/4 -CVE-2020-35347 - https://github.com/cbkhwx/cxuucmsv3/issues/5 -CVE-2020-35349 - https://www.exploit-db.com/exploits/49196 -CVE-2020-35359 - https://www.exploit-db.com/exploits/49105 -CVE-2020-35362 - https://github.com/kbgsft/vuln-dext5upload/wiki/File-Download-Vulnerability-in-DEXT5Upload-2.7.1262310-by-xcuter -CVE-2020-35364 - https://github.com/yangfan6888/PoC -CVE-2020-35364 - https://github.com/yangfan6888/PoC/blob/main/PoC.cpp -CVE-2020-35370 - https://www.exploit-db.com/exploits/49265 -CVE-2020-35376 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42066 -CVE-2020-35378 - https://www.exploit-db.com/exploits/49212 -CVE-2020-35388 - https://github.com/xuechengen/xinhu-oa/blob/main/README.md -CVE-2020-35391 - http://packetstormsecurity.com/files/171773/Tenda-N300-F3-12.01.01.48-Header-Processing.html -CVE-2020-35391 - https://medium.com/@signalhilltech/tenda-n300-authentication-bypass-via-malformed-http-request-header-5b8744ca685e -CVE-2020-35395 - https://nikhilkumar01.medium.com/cve-2020-35395-cd393ac8371c -CVE-2020-35395 - https://www.exploit-db.com/exploits/49146 -CVE-2020-35396 - https://nikhilkumar01.medium.com/cve-2020-35396-f4b5675fb168 -CVE-2020-35396 - https://www.exploit-db.com/exploits/49227 -CVE-2020-35398 - https://cvewalkthrough.com/cve-2020-35398-uti-mutual-fund-android-application-username-enumeration/ -CVE-2020-35416 - http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html -CVE-2020-35416 - http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html -CVE-2020-35416 - https://www.exploit-db.com/exploits/49281 -CVE-2020-35418 - https://fatihhcelik.blogspot.com/2020/12/group-office-crm-stored-xss-via-svg-file.html -CVE-2020-35419 - https://fatihhcelik.github.io/posts/Group-Office-CRM-Stored-XSS-via-SVG-File/ -CVE-2020-35427 - https://phpgurukul.com/ -CVE-2020-35427 - https://www.exploit-db.com/exploits/49165 -CVE-2020-35430 - https://gitee.com/inxeduopen/inxedu/issues/I294XL -CVE-2020-35437 - http://packetstormsecurity.com/files/160783/Subrion-CMS-4.2.1-Cross-Site-Scripting.html -CVE-2020-35448 - https://sourceware.org/bugzilla/show_bug.cgi?id=26574 -CVE-2020-35452 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-35460 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-35470 - https://github.com/envoyproxy/envoy/issues/14087 -CVE-2020-35470 - https://github.com/envoyproxy/envoy/pull/14131 -CVE-2020-35471 - https://github.com/envoyproxy/envoy/pull/14122 -CVE-2020-35473 - https://www.sigsac.org/ccs/CCS2022/proceedings/ccs-proceedings.html -CVE-2020-35476 - http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html -CVE-2020-35476 - https://github.com/OpenTSDB/opentsdb/issues/2051 -CVE-2020-35488 - https://github.com/GuillaumePetit84/CVE-2020-35488 -CVE-2020-35489 - https://wpscan.com/vulnerability/10508 -CVE-2020-35489 - https://www.jinsonvarghese.com/unrestricted-file-upload-in-contact-form-7/ -CVE-2020-35490 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-35490 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-35490 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-35490 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-35491 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-35491 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-35491 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-35491 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-35505 - https://bugzilla.redhat.com/show_bug.cgi?id=1909769 -CVE-2020-35530 - https://github.com/LibRaw/LibRaw/issues/272 -CVE-2020-35531 - https://github.com/LibRaw/LibRaw/issues/270 -CVE-2020-35532 - https://github.com/LibRaw/LibRaw/issues/271 -CVE-2020-35533 - https://github.com/LibRaw/LibRaw/issues/273 -CVE-2020-35534 - https://github.com/LibRaw/LibRaw/issues/279 -CVE-2020-35535 - https://github.com/LibRaw/LibRaw/issues/283 -CVE-2020-35539 - https://seclists.org/fulldisclosure/2021/Mar/24 -CVE-2020-35548 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-35549 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-35550 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-35551 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-35552 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-35553 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-35556 - https://www.acronis.com -CVE-2020-3556 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK -CVE-2020-35575 - http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html -CVE-2020-35575 - https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip -CVE-2020-35577 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-35577 -CVE-2020-35578 - http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html -CVE-2020-35578 - http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html -CVE-2020-35581 - http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html -CVE-2020-35582 - http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html -CVE-2020-35589 - https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/ -CVE-2020-35590 - https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/ -CVE-2020-35591 - https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ -CVE-2020-35592 - https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ -CVE-2020-35593 - https://www.securifera.com/advisories/ -CVE-2020-35597 - https://cxsecurity.com/issue/WLB-2020120118 -CVE-2020-35597 - https://www.exploit-db.com/exploits/49282 -CVE-2020-35606 - http://packetstormsecurity.com/files/160676/Webmin-1.962-Remote-Command-Execution.html -CVE-2020-35606 - https://www.exploit-db.com/exploits/49318 -CVE-2020-35606 - https://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html -CVE-2020-35608 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134 -CVE-2020-35608 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134 -CVE-2020-35609 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1117 -CVE-2020-35625 - https://phabricator.wikimedia.org/T269718 -CVE-2020-35627 - https://gist.github.com/bc0d3/cbc458f0fcbe0f897e529c7f3d77c9d6 -CVE-2020-35628 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35629 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35630 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35631 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35632 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35633 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35634 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35635 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35636 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 -CVE-2020-35660 - https://www.huntr.dev/bounties/1-other-monica/ -CVE-2020-35664 - https://www.acronis.com -CVE-2020-35665 - http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html -CVE-2020-35665 - https://www.exploit-db.com/exploits/49330 -CVE-2020-35665 - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html -CVE-2020-35677 - https://labs.ingredous.com/2020/07/13/ois-groupedit-xss/ -CVE-2020-35679 - https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/ -CVE-2020-35680 - https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/ -CVE-2020-35683 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-35683 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-35684 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-35684 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-35685 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2020-35685 - https://www.kb.cert.org/vuls/id/608209 -CVE-2020-35687 - https://www.exploit-db.com/exploits/49426 -CVE-2020-35693 - https://github.com/alwentiu/contact-tracing-research/blob/main/samsung.pdf -CVE-2020-35700 - https://www.horizon3.ai/disclosures/librenms-second-order-sqli -CVE-2020-35702 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 -CVE-2020-35710 - https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html -CVE-2020-35713 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions -CVE-2020-35713 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html -CVE-2020-35714 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions -CVE-2020-35714 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html -CVE-2020-35715 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions -CVE-2020-35715 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html -CVE-2020-35716 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions -CVE-2020-35716 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html -CVE-2020-35717 - https://medium.com/bugbountywriteup/remote-code-execution-through-cross-site-scripting-in-electron-f3b891ad637 -CVE-2020-35728 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-35728 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-35728 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-35728 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-35729 - http://packetstormsecurity.com/files/160798/Klog-Server-2.4.1-Command-Injection.html -CVE-2020-35729 - http://packetstormsecurity.com/files/161123/Klog-Server-2.4.1-Command-Injection.html -CVE-2020-35729 - http://packetstormsecurity.com/files/161410/Klog-Server-2.4.1-Command-Injection.html -CVE-2020-35734 - http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html -CVE-2020-35737 - http://packetstormsecurity.com/files/160826/Newgen-Correspondence-Management-System-eGov-12.0-Insecure-Direct-Object-Reference.html -CVE-2020-35737 - https://www.exploit-db.com/exploits/49378 -CVE-2020-35738 - https://github.com/dbry/WavPack/issues/91 -CVE-2020-35745 - https://medium.com/@ashketchum/privilege-escalation-unauthenticated-access-to-admin-portal-cve-2020-35745-bb5d5dca97a0 -CVE-2020-35745 - https://www.youtube.com/watch?v=vnSsg6iwV9Y&feature=youtu.be&ab_channel=ashketchum -CVE-2020-35749 - http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html -CVE-2020-35749 - http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html -CVE-2020-35752 - https://www.exploit-db.com/exploits/49358 -CVE-2020-35754 - http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html -CVE-2020-35759 - https://github.com/alexlang24/bloofoxCMS/issues/10 -CVE-2020-35760 - https://github.com/alexlang24/bloofoxCMS/issues/9 -CVE-2020-35761 - https://github.com/alexlang24/bloofoxCMS/issues/8 -CVE-2020-35762 - https://github.com/alexlang24/bloofoxCMS/issues/11 -CVE-2020-35765 - https://www.manageengine.com -CVE-2020-35775 - http://packetstormsecurity.com/files/162181/CITSmart-ITSM-9.1.2.22-LDAP-Injection.html -CVE-2020-35775 - https://rdstation-static.s3.amazonaws.com/cms/files/86153/1597862259Ebook-Whatsnew-CITSmart.pdf -CVE-2020-35776 - http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html -CVE-2020-35776 - https://issues.asterisk.org/ -CVE-2020-35778 - https://kb.netgear.com/000062721/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Smart-Managed-Pro-Switches-PSV-2020-0368 -CVE-2020-35779 - https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500 -CVE-2020-35781 - https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561 -CVE-2020-35782 - https://kb.netgear.com/000062636/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0378 -CVE-2020-35782 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35783 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35786 - https://kb.netgear.com/000062718/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R7800-PSV-2020-0218 -CVE-2020-35789 - https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559 -CVE-2020-35791 - https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079 -CVE-2020-35793 - https://kb.netgear.com/000062725/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0185 -CVE-2020-35801 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -CVE-2020-35809 - https://kb.netgear.com/000062674/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-PSV-2018-0510 -CVE-2020-35810 - https://kb.netgear.com/000062645/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-System-PSV-2018-0491 -CVE-2020-35817 - https://kb.netgear.com/000062668/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0493 -CVE-2020-35819 - https://kb.netgear.com/000062648/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0495 -CVE-2020-35825 - https://kb.netgear.com/000062642/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0502 -CVE-2020-35826 - https://kb.netgear.com/000062647/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0503 -CVE-2020-35830 - https://kb.netgear.com/000062672/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0507 -CVE-2020-35831 - https://kb.netgear.com/000062679/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0508 -CVE-2020-35837 - https://kb.netgear.com/000062650/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2018-0499 -CVE-2020-35846 - http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html -CVE-2020-35847 - http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html -CVE-2020-35847 - http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html -CVE-2020-35848 - http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html -CVE-2020-35849 - https://mantisbt.org/bugs/view.php?id=27370 -CVE-2020-35850 - https://github.com/cockpit-project/cockpit/issues/15077 -CVE-2020-35850 - https://github.com/passtheticket/vulnerability-research/blob/main/cockpitProject/README.md -CVE-2020-35852 - https://github.com/riteshgohil/My_CVE/blob/main/CVE-2020-35852.md -CVE-2020-35853 - https://www.exploit-db.com/exploits/49339 -CVE-2020-35854 - https://riteshgohil-25.medium.com/textpattern-4-8-4-is-affected-by-cross-site-scripting-xss-in-the-body-parameter-b9a3d7da2a88 -CVE-2020-35930 - https://github.com/seopanel/Seo-Panel/issues/201 -CVE-2020-35944 - https://wpscan.com/vulnerability/10240 -CVE-2020-35944 - https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ -CVE-2020-35945 - https://wpscan.com/vulnerability/10342 -CVE-2020-35945 - https://www.wordfence.com/blog/2020/08/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder/ -CVE-2020-35946 - https://wpscan.com/vulnerability/10320 -CVE-2020-35946 - https://www.wordfence.com/blog/2020/07/2-million-users-affected-by-vulnerability-in-all-in-one-seo-pack/ -CVE-2020-35947 - https://wpscan.com/vulnerability/10239 -CVE-2020-35947 - https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ -CVE-2020-35948 - http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html -CVE-2020-35948 - https://wpscan.com/vulnerability/10412 -CVE-2020-35949 - https://wpscan.com/vulnerability/10349 -CVE-2020-35949 - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ -CVE-2020-35950 - https://wpscan.com/vulnerability/10413 -CVE-2020-35951 - https://wpscan.com/vulnerability/10348 -CVE-2020-35951 - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ -CVE-2020-35962 - https://blocksecteam.medium.com/loopring-lrc-protocol-incident-66e9470bd51f -CVE-2020-35972 - https://github.com/yzmcms/yzmcms/issues/55 -CVE-2020-35973 - https://github.com/BLL-l/vulnerability_wiki/blob/main/zzcms/user_manage_xss.md -CVE-2020-35979 - https://github.com/gpac/gpac/issues/1662 -CVE-2020-35980 - https://github.com/gpac/gpac/issues/1661 -CVE-2020-35981 - https://github.com/gpac/gpac/issues/1659 -CVE-2020-35982 - https://github.com/gpac/gpac/issues/1660 -CVE-2020-36002 - https://github.com/BigTiger2020/Seat-Reservation-System -CVE-2020-36002 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/seat-reservation-system-using-php_0.zip -CVE-2020-36009 - https://github.com/SomeBottle/OBottle/issues/6 -CVE-2020-36011 - https://www.exploit-db.com/exploits/49290 -CVE-2020-36012 - https://kislay00.medium.com/m-store-multi-store-inventory-management-system-add-customer-stored-xss-875a376770ec -CVE-2020-36023 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1013 -CVE-2020-36024 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016 -CVE-2020-36037 - https://github.com/wuzhicms/wuzhicms/issues/192 -CVE-2020-36048 - https://blog.caller.xyz/socketio-engineio-dos/ -CVE-2020-36049 - https://blog.caller.xyz/socketio-engineio-dos/ -CVE-2020-36056 - https://www.linkedin.com/in/vivek-panday-796768149 -CVE-2020-36062 - https://github.com/VivekPanday12/CVE-/issues/3 -CVE-2020-36062 - https://phpgurukul.com -CVE-2020-36064 - https://github.com/VivekPanday12/CVE-/issues/2 -CVE-2020-36065 - https://github.com/sunkaifei/FlyCms/issues/8 -CVE-2020-36066 - https://github.com/tidwall/gjson/issues/195 -CVE-2020-36079 - http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html -CVE-2020-3610 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-3611 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36112 - https://www.exploit-db.com/exploits/49314 -CVE-2020-36115 - https://www.exploit-db.com/exploits/49484 -CVE-2020-36120 - https://github.com/saitoha/libsixel/issues/143 -CVE-2020-36123 - https://github.com/saitoha/libsixel/issues/144 -CVE-2020-3613 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36139 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html -CVE-2020-3614 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36140 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html -CVE-2020-36141 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html -CVE-2020-36142 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html -CVE-2020-3615 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-36154 - https://www.exploit-db.com/exploits/49143 -CVE-2020-36155 - https://wpscan.com/vulnerability/cf13b0f8-5815-4d27-a276-5eff8985fc0b -CVE-2020-36156 - https://wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53 -CVE-2020-36157 - https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b -CVE-2020-3616 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-3617 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-36179 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36179 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36179 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36179 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-3618 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-36180 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36180 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36180 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36180 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36181 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36181 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36181 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36181 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36182 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36182 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36182 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36182 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36183 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36183 - https://github.com/FasterXML/jackson-databind/issues/3003 -CVE-2020-36183 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36183 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36183 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36184 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36184 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36184 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36184 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36185 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36185 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36185 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36185 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36186 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36186 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36186 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36186 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36187 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36187 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36187 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36187 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36188 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36188 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36188 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36188 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-36189 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-36189 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36189 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-36189 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-3619 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36197 - http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html -CVE-2020-36198 - http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html -CVE-2020-3620 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3621 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3622 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36221 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36221 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36222 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36222 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36223 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36223 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36224 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36224 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36225 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36225 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36226 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36226 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36227 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36227 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36228 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36228 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36229 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36229 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-3623 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-36230 - http://seclists.org/fulldisclosure/2021/May/64 -CVE-2020-36230 - http://seclists.org/fulldisclosure/2021/May/65 -CVE-2020-36233 - https://jira.atlassian.com/browse/BSERV-12753 -CVE-2020-3624 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36241 - https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7 -CVE-2020-36242 - https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst -CVE-2020-36242 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36242 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36244 - https://github.com/GENIVI/dlt-daemon/issues/265 -CVE-2020-3625 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-3626 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-3628 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36280 - https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c -CVE-2020-36284 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 -CVE-2020-36285 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 -CVE-2020-3629 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3630 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-36310 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 -CVE-2020-36310 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e -CVE-2020-36311 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9 -CVE-2020-36311 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03 -CVE-2020-36312 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10 -CVE-2020-36312 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f65886606c2d3b562716de030706dfe1bea4ed5e -CVE-2020-36313 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7 -CVE-2020-36313 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0774a964ef561b7170d8d1b1bfe6f88002b6d219 -CVE-2020-36314 - https://gitlab.gnome.org/GNOME/file-roller/-/issues/108 -CVE-2020-36315 - https://github.com/relic-toolkit/relic/ -CVE-2020-36315 - https://github.com/relic-toolkit/relic/issues/154 -CVE-2020-36316 - https://github.com/relic-toolkit/relic/ -CVE-2020-36316 - https://github.com/relic-toolkit/relic/issues/155 -CVE-2020-3632 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-36322 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6 -CVE-2020-36322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454 -CVE-2020-3633 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-36333 - https://www.openwall.com/lists/oss-security/2020/02/19/1 -CVE-2020-36334 - https://www.openwall.com/lists/oss-security/2020/02/19/1 -CVE-2020-3634 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-3635 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-3636 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36367 - https://github.com/cesanta/mjs/issues/135 -CVE-2020-36368 - https://github.com/cesanta/mjs/issues/135 -CVE-2020-36369 - https://github.com/cesanta/mjs/issues/135 -CVE-2020-36370 - https://github.com/cesanta/mjs/issues/136 -CVE-2020-36371 - https://github.com/cesanta/mjs/issues/136 -CVE-2020-36372 - https://github.com/cesanta/mjs/issues/136 -CVE-2020-36373 - https://github.com/cesanta/mjs/issues/136 -CVE-2020-36374 - https://github.com/cesanta/mjs/issues/136 -CVE-2020-36375 - https://github.com/cesanta/mjs/issues/136 -CVE-2020-36376 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-36377 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-36378 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-36379 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-3638 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-36380 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-36381 - https://github.com/shenzhim/aaptjs/issues/2 -CVE-2020-36385 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10 -CVE-2020-36385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1 -CVE-2020-36386 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1 -CVE-2020-36386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101 -CVE-2020-36387 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 -CVE-2020-36387 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d816e088c359866f9867057e04f244c608c42fe -CVE-2020-3639 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin -CVE-2020-3640 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3641 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-3642 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36420 - https://www.openwall.com/lists/oss-security/2020/11/18/1 -CVE-2020-3643 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3644 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3645 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-3646 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36461 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/noise_search/RUSTSEC-2020-0141.md -CVE-2020-36461 - https://rustsec.org/advisories/RUSTSEC-2020-0141.html -CVE-2020-36462 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md -CVE-2020-36462 - https://rustsec.org/advisories/RUSTSEC-2020-0142.html -CVE-2020-36464 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/heapless/RUSTSEC-2020-0145.md -CVE-2020-36464 - https://rustsec.org/advisories/RUSTSEC-2020-0145.html -CVE-2020-3647 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36473 - https://medium.com/@ciph3r/why-you-should-not-use-uc-browser-54558916d020 -CVE-2020-3648 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36485 - https://www.vulnerability-lab.com/get_content.php?id=2198 -CVE-2020-36486 - https://www.vulnerability-lab.com/get_content.php?id=2205 -CVE-2020-36488 - https://www.vulnerability-lab.com/get_content.php?id=2207 -CVE-2020-36489 - https://www.vulnerability-lab.com/get_content.php?id=2204 -CVE-2020-36490 - https://www.vulnerability-lab.com/get_content.php?id=2195 -CVE-2020-36491 - https://www.vulnerability-lab.com/get_content.php?id=2195 -CVE-2020-36492 - https://www.vulnerability-lab.com/get_content.php?id=2195 -CVE-2020-36493 - https://www.vulnerability-lab.com/get_content.php?id=2195 -CVE-2020-36494 - https://www.vulnerability-lab.com/get_content.php?id=2194 -CVE-2020-36495 - https://www.vulnerability-lab.com/get_content.php?id=2194 -CVE-2020-36496 - https://www.vulnerability-lab.com/get_content.php?id=2194 -CVE-2020-36497 - https://www.vulnerability-lab.com/get_content.php?id=2194 -CVE-2020-36498 - https://www.vulnerability-lab.com/get_content.php?id=2206 -CVE-2020-36499 - https://www.vulnerability-lab.com/get_content.php?id=2215 -CVE-2020-36501 - https://www.vulnerability-lab.com/get_content.php?id=2249 -CVE-2020-36502 - https://www.vulnerability-lab.com/get_content.php?id=2205 -CVE-2020-36503 - https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec -CVE-2020-36504 - https://medium.com/@hoanhp/0-days-story-1-wp-pro-quiz-2115dd77a6d4 -CVE-2020-36504 - https://wpscan.com/vulnerability/83679b90-faa5-454e-924c-89f388eccbd1 -CVE-2020-36505 - https://medium.com/@hoanhp/0-day-story-2-delete-all-comments-easily-a854e52a7d50 -CVE-2020-36505 - https://wpscan.com/vulnerability/239f8efa-8fa4-4274-904f-708e65083821 -CVE-2020-3651 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2020-36510 - https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95 -CVE-2020-36518 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-36518 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-36519 - https://wesleyk.me/2020/01/10/my-first-vulnerability-mimecast-sender-address-verification/ -CVE-2020-3652 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2020-36523 - https://seclists.org/fulldisclosure/2020/Oct/15 -CVE-2020-36523 - https://vuldb.com/?id.164509 -CVE-2020-36524 - https://seclists.org/fulldisclosure/2020/Oct/15 -CVE-2020-36524 - https://vuldb.com/?id.164510 -CVE-2020-36525 - https://seclists.org/fulldisclosure/2020/Oct/15 -CVE-2020-36525 - https://vuldb.com/?id.164511 -CVE-2020-36526 - https://seclists.org/fulldisclosure/2020/Oct/15 -CVE-2020-36526 - https://vuldb.com/?id.164512 -CVE-2020-36527 - https://seclists.org/fulldisclosure/2020/Oct/15 -CVE-2020-36527 - https://vuldb.com/?id.164513 -CVE-2020-36528 - http://seclists.org/fulldisclosure/2020/Oct/4 -CVE-2020-36528 - https://vuldb.com/?id.162264 -CVE-2020-36529 - http://seclists.org/fulldisclosure/2020/Oct/5 -CVE-2020-36529 - https://vuldb.com/?id.162261 -CVE-2020-3653 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin -CVE-2020-36530 - http://seclists.org/fulldisclosure/2020/Oct/5 -CVE-2020-36530 - https://vuldb.com/?id.162262 -CVE-2020-36531 - http://seclists.org/fulldisclosure/2020/Oct/5 -CVE-2020-36531 - https://vuldb.com/?id.162263 -CVE-2020-36534 - https://vuldb.com/?id.160278 -CVE-2020-36536 - https://vuldb.com/?id.159956 -CVE-2020-3654 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-36540 - https://vuldb.com/?id.159438 -CVE-2020-36541 - https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian -CVE-2020-36541 - https://vuldb.com/?id.159434 -CVE-2020-36542 - https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian -CVE-2020-36542 - https://vuldb.com/?id.159435 -CVE-2020-36543 - https://vuldb.com/?id.159429 -CVE-2020-36544 - https://vuldb.com/?id.159430 -CVE-2020-36547 - https://vuldb.com/?id.129833 -CVE-2020-36550 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 -CVE-2020-36550 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html -CVE-2020-36550 - https://www.exploit-db.com/exploits/49135 -CVE-2020-36551 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 -CVE-2020-36551 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html -CVE-2020-36551 - https://www.exploit-db.com/exploits/49135 -CVE-2020-36552 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 -CVE-2020-36552 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html -CVE-2020-36552 - https://www.exploit-db.com/exploits/49135 -CVE-2020-36553 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 -CVE-2020-36553 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html -CVE-2020-36553 - https://www.exploit-db.com/exploits/49135 -CVE-2020-36557 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.2 -CVE-2020-36557 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220 -CVE-2020-36558 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb -CVE-2020-3656 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-36560 - https://github.com/artdarek/go-unzip/pull/2 -CVE-2020-36561 - https://github.com/yi-ge/unzip/pull/1 -CVE-2020-36564 - https://github.com/justinas/nosurf/pull/60 -CVE-2020-36565 - https://github.com/labstack/echo/pull/1718 -CVE-2020-3657 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3658 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-3660 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36603 - https://github.com/kkent030315/evil-mhyprot-cli -CVE-2020-36603 - https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html -CVE-2020-36603 - https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html -CVE-2020-36603 - https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims -CVE-2020-36604 - https://github.com/hapijs/hoek/issues/352 -CVE-2020-36607 - https://github.com/liufee/cms/issues/45 -CVE-2020-36609 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG -CVE-2020-36609 - https://vuldb.com/?id.215115 -CVE-2020-3661 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36610 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG -CVE-2020-36610 - https://vuldb.com/?id.215116 -CVE-2020-3662 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36629 - https://github.com/SimbCo/httpster/pull/36 -CVE-2020-3663 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-3664 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin -CVE-2020-36642 - https://github.com/trampgeek/jobe/issues/39 -CVE-2020-3665 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36651 - https://github.com/youngerheart/nodeserver/pull/6 -CVE-2020-36656 - https://wpscan.com/vulnerability/10f7e892-7a91-4292-b03e-6ad75756488b -CVE-2020-3666 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36666 - https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96 -CVE-2020-3667 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3668 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3669 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-36691 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 -CVE-2020-36694 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10 -CVE-2020-36694 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12 -CVE-2020-36696 - https://wpscan.com/vulnerability/15f345e6-fc53-4bac-bc5a-de898181ea74 -CVE-2020-3670 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3671 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-36718 - https://wpscan.com/vulnerability/92f1d6fb-c665-419e-a13b-688b1df6c395 -CVE-2020-3673 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3674 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-3675 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3676 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin -CVE-2020-36763 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG -CVE-2020-36766 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.6 -CVE-2020-36771 - http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html -CVE-2020-36771 - http://seclists.org/fulldisclosure/2024/Jan/24 -CVE-2020-36771 - https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure -CVE-2020-36772 - http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html -CVE-2020-36772 - http://seclists.org/fulldisclosure/2024/Jan/25 -CVE-2020-36772 - https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-02_CloudLinux_CageFS_Insufficiently_Restricted_Proxy_Commands -CVE-2020-3678 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3679 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin -CVE-2020-3680 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin -CVE-2020-3681 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-3684 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3685 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-3686 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-3687 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-3688 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-3690 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3691 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin -CVE-2020-3692 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3693 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3694 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3696 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3698 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-3699 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-3700 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-3701 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin -CVE-2020-3702 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin -CVE-2020-3703 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3704 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin -CVE-2020-3811 - https://www.openwall.com/lists/oss-security/2020/05/19/8 -CVE-2020-3812 - https://www.openwall.com/lists/oss-security/2020/05/19/8 -CVE-2020-3843 - http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html -CVE-2020-3909 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-3931 - https://www.acronis.com/en-us/blog/posts/backdoor-wide-open-critical-vulnerabilities-uncovered-geovision -CVE-2020-3950 - http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html -CVE-2020-3950 - http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html -CVE-2020-3952 - http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html -CVE-2020-3956 - http://packetstormsecurity.com/files/157909/vCloud-Director-9.7.0.15498291-Remote-Code-Execution.html -CVE-2020-3956 - https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956/ -CVE-2020-3956 - https://github.com/aaronsvk/CVE-2020-3956 -CVE-2020-3957 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html -CVE-2020-3958 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html -CVE-2020-3959 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html -CVE-2020-3963 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html -CVE-2020-3964 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html -CVE-2020-3965 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html -CVE-2020-3976 - https://www.vmware.com/security/advisories/VMSA-2020-0018.html -CVE-2020-3984 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html -CVE-2020-3985 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html -CVE-2020-4000 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html -CVE-2020-4001 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html -CVE-2020-4002 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html -CVE-2020-4003 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html -CVE-2020-4016 - https://jira.atlassian.com/browse/FE-7285 -CVE-2020-4030 - https://usn.ubuntu.com/4481-1/ -CVE-2020-4031 - https://usn.ubuntu.com/4481-1/ -CVE-2020-4032 - https://usn.ubuntu.com/4481-1/ -CVE-2020-4033 - https://usn.ubuntu.com/4481-1/ -CVE-2020-4040 - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html -CVE-2020-4041 - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html -CVE-2020-4044 - https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c -CVE-2020-4051 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-4206 - https://www.ibm.com/support/pages/node/6114130 -CVE-2020-4208 - https://www.ibm.com/support/pages/node/6114130 -CVE-2020-4214 - https://www.ibm.com/support/pages/node/6114130 -CVE-2020-4241 - https://www.ibm.com/support/pages/node/6114130 -CVE-2020-4242 - https://www.ibm.com/support/pages/node/6114130 -CVE-2020-4269 - http://packetstormsecurity.com/files/157328/QRadar-Community-Edition-7.3.1.6-Default-Credentials.html -CVE-2020-4270 - http://packetstormsecurity.com/files/157335/QRadar-Community-Edition-7.3.1.6-Insecure-File-Permissions.html -CVE-2020-4271 - http://packetstormsecurity.com/files/157336/QRadar-Community-Edition-7.3.1.6-PHP-Object-Injection.html -CVE-2020-4272 - http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html -CVE-2020-4274 - http://packetstormsecurity.com/files/157338/QRadar-Community-Edition-7.3.1.6-Authorization-Bypass.html -CVE-2020-4280 - http://packetstormsecurity.com/files/159589/QRadar-RemoteJavaScript-Deserialization.html -CVE-2020-4280 - http://seclists.org/fulldisclosure/2020/Oct/18 -CVE-2020-4294 - http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html -CVE-2020-4300 - https://www.ibm.com/support/pages/node/6451705 -CVE-2020-4315 - https://www.ibm.com/support/pages/node/6334813 -CVE-2020-4354 - https://www.ibm.com/support/pages/node/6451705 -CVE-2020-4379 - https://www.ibm.com/support/pages/node/6214483 -CVE-2020-4432 - https://www.ibm.com/support/pages/node/6221324 -CVE-2020-4433 - https://www.ibm.com/support/pages/node/6221324 -CVE-2020-4434 - https://www.ibm.com/support/pages/node/6221324 -CVE-2020-4435 - https://www.ibm.com/support/pages/node/6221324 -CVE-2020-4436 - https://www.ibm.com/support/pages/node/6221324 -CVE-2020-4469 - https://www.tenable.com/security/research/tra-2020-37 -CVE-2020-4470 - https://www.tenable.com/security/research/tra-2020-37 -CVE-2020-4471 - https://www.tenable.com/security/research/tra-2020-37 -CVE-2020-4510 - https://www.ibm.com/support/pages/node/6246133 -CVE-2020-4516 - https://www.ibm.com/support/pages/node/6326901 -CVE-2020-4520 - https://www.ibm.com/support/pages/node/6451705 -CVE-2020-4559 - https://www.ibm.com/support/pages/node/6323757 -CVE-2020-4561 - https://www.ibm.com/support/pages/node/6451705 -CVE-2020-4567 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4569 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4572 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4573 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4574 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4576 - https://www.ibm.com/support/pages/node/6339807 -CVE-2020-4757 - https://www.gosecure.net/blog/2022/06/21/xss-vulnerability-in-ibm-content-navigator-cve-2020-4757/ -CVE-2020-4766 - https://www.ibm.com/support/pages/node/6406254 -CVE-2020-4782 - https://www.ibm.com/support/pages/node/6356083 -CVE-2020-4788 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-4845 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4846 - https://www.ibm.com/support/pages/node/6253781 -CVE-2020-4854 - https://www.tenable.com/security/research/tra-2020-66 -CVE-2020-4856 - https://www.ibm.com/support/pages/node/6417585 -CVE-2020-4857 - https://www.ibm.com/support/pages/node/6417585 -CVE-2020-4863 - https://www.ibm.com/support/pages/node/6417585 -CVE-2020-4866 - https://www.ibm.com/support/pages/node/6417585 -CVE-2020-4949 - https://www.ibm.com/support/pages/node/6408244 -CVE-2020-4975 - https://www.ibm.com/support/pages/node/6417585 -CVE-2020-5024 - https://www.ibm.com/support/pages/node/6427861 -CVE-2020-5147 - http://packetstormsecurity.com/files/163857/SonicWall-NetExtender-10.2.0.300-Unquoted-Service-Path.html -CVE-2020-5183 - http://packetstormsecurity.com/files/155832/FTPGetter-Professional-5.97.0.223-Denial-Of-Service.html -CVE-2020-5183 - https://www.exploit-db.com/exploits/47871 -CVE-2020-5186 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 -CVE-2020-5186 - https://packetstormsecurity.com/files/156483/DotNetNuke-CMS-9.5.0-Cross-Site-Scripting.html -CVE-2020-5187 - http://packetstormsecurity.com/files/156489/DotNetNuke-CMS-9.4.4-Zip-Directory-Traversal.html -CVE-2020-5187 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 -CVE-2020-5188 - http://packetstormsecurity.com/files/156484/DotNetNuke-CMS-9.5.0-File-Extension-Check-Bypass.html -CVE-2020-5188 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 -CVE-2020-5191 - https://www.exploit-db.com/exploits/47841 -CVE-2020-5192 - https://www.exploit-db.com/exploits/47840 -CVE-2020-5193 - http://packetstormsecurity.com/files/155929/Hospital-Management-System-4.0-Cross-Site-Scripting.html -CVE-2020-5202 - http://www.openwall.com/lists/oss-security/2020/01/20/4 -CVE-2020-5202 - https://seclists.org/oss-sec/2020/q1/21 -CVE-2020-5223 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 -CVE-2020-5237 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt -CVE-2020-5245 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-5258 - https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2 -CVE-2020-5258 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-5258 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-5260 - http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html -CVE-2020-5295 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -CVE-2020-5295 - http://seclists.org/fulldisclosure/2020/Aug/2 -CVE-2020-5296 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -CVE-2020-5296 - http://seclists.org/fulldisclosure/2020/Aug/2 -CVE-2020-5297 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -CVE-2020-5297 - http://seclists.org/fulldisclosure/2020/Aug/2 -CVE-2020-5298 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -CVE-2020-5298 - http://seclists.org/fulldisclosure/2020/Aug/2 -CVE-2020-5299 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -CVE-2020-5299 - http://seclists.org/fulldisclosure/2020/Aug/2 -CVE-2020-5304 - https://medium.com/@venkatajayaram.yalla/whitesource-log-injection-vulnerability-cve-2020-5304-e543b7943c2b -CVE-2020-5305 - https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in_2.html -CVE-2020-5306 - https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in.html -CVE-2020-5306 - https://www.exploit-db.com/exploits/47886 -CVE-2020-5307 - https://www.exploit-db.com/exploits/47846 -CVE-2020-5308 - http://packetstormsecurity.com/files/155861/Dairy-Farm-Shop-Management-System-1.0-Cross-Site-Scripting.html -CVE-2020-5330 - http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html -CVE-2020-5359 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5360 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5377 - http://packetstormsecurity.com/files/162110/Dell-OpenManage-Server-Administrator-9.4.0.0-File-Read.html -CVE-2020-5393 - https://sumukh30.blogspot.com/2020/01/cross-site-scripting-vulnerability-in.html -CVE-2020-5397 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-5397 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-5397 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-5398 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-5407 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5407 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-5407 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-5408 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5408 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-5408 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-5413 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-5421 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-5421 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-5421 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-5497 - http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html -CVE-2020-5499 - https://github.com/wssgcsc58/CVEs/tree/master/baidurustsgxsdk_enclaveid_race -CVE-2020-5504 - https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html -CVE-2020-5505 - http://packetstormsecurity.com/files/155922/Freelancy-1.0.0-Remote-Code-Execution.html -CVE-2020-5509 - http://packetstormsecurity.com/files/155925/Car-Rental-Project-1.0-Remote-Code-Execution.html -CVE-2020-5510 - https://www.exploit-db.com/exploits/47854 -CVE-2020-5511 - https://www.exploit-db.com/exploits/47874 -CVE-2020-5513 - https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-cm-deletet-lfi-local-file-inclusion-and-rce/ -CVE-2020-5514 - https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-remote-code-execution/ -CVE-2020-5515 - http://packetstormsecurity.com/files/158114/Gila-CMS-1.11.8-SQL-Injection.html -CVE-2020-5515 - http://packetstormsecurity.com/files/158140/Gila-CMS-1.1.18.1-SQL-Injection-Shell-Upload.html -CVE-2020-5530 - https://wpvulndb.com/vulnerabilities/10075 -CVE-2020-5665 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-018_en.pdf -CVE-2020-5720 - https://www.tenable.com/security/research/tra-2020-07 -CVE-2020-5722 - http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html -CVE-2020-5722 - http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html -CVE-2020-5722 - https://www.tenable.com/security/research/tra-2020-15 -CVE-2020-5723 - https://www.tenable.com/security/research/tra-2020-17 -CVE-2020-5724 - https://www.tenable.com/security/research/tra-2020-17 -CVE-2020-5725 - http://packetstormsecurity.com/files/156976/Grandstream-UCM6200-Series-WebSocket-1.0.20.20-SQL-Injection.html -CVE-2020-5725 - https://www.tenable.com/security/research/tra-2020-17 -CVE-2020-5726 - http://packetstormsecurity.com/files/156977/Grandstream-UCM6200-Series-CTI-Interface-SQL-Injection.html -CVE-2020-5726 - https://www.tenable.com/security/research/tra-2020-17 -CVE-2020-5727 - https://www.tenable.com/security/research/tra-2020-29 -CVE-2020-5734 - https://www.tenable.com/security/research/tra-2020-19 -CVE-2020-5735 - http://packetstormsecurity.com/files/157164/Amcrest-Dahua-NVR-Camera-IP2M-841-Denial-Of-Service.html -CVE-2020-5735 - https://www.tenable.com/security/research/tra-2020-20 -CVE-2020-5736 - https://www.tenable.com/security/research/tra-2020-20 -CVE-2020-5737 - https://www.tenable.com/security/tns-2020-02 -CVE-2020-5738 - https://www.tenable.com/security/research/tra-2020-22 -CVE-2020-5739 - https://www.tenable.com/security/research/tra-2020-22 -CVE-2020-5740 - https://www.tenable.com/security/research/tra-2020-25 -CVE-2020-5741 - http://packetstormsecurity.com/files/158470/Plex-Unpickle-Dict-Windows-Remote-Code-Execution.html -CVE-2020-5741 - https://www.tenable.com/security/research/tra-2020-32 -CVE-2020-5742 - https://www.tenable.com/security/research/tra-2020-35 -CVE-2020-5743 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5744 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5745 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5746 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5747 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5748 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5749 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5750 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5751 - https://www.tenable.com/security/research/tra-2020-31 -CVE-2020-5752 - http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html -CVE-2020-5752 - http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html -CVE-2020-5752 - https://www.tenable.com/security/research/tra-2020-34 -CVE-2020-5756 - https://www.tenable.com/security/research/tra-2020-41 -CVE-2020-5757 - https://www.tenable.com/security/research/tra-2020-42 -CVE-2020-5758 - https://www.tenable.com/security/research/tra-2020-42 -CVE-2020-5759 - https://www.tenable.com/security/research/tra-2020-42 -CVE-2020-5760 - https://www.tenable.com/security/research/tra-2020-43 -CVE-2020-5760 - https://www.tenable.com/security/research/tra-2020-47 -CVE-2020-5761 - https://www.tenable.com/security/research/tra-2020-43 -CVE-2020-5761 - https://www.tenable.com/security/research/tra-2020-47 -CVE-2020-5762 - https://www.tenable.com/security/research/tra-2020-43 -CVE-2020-5762 - https://www.tenable.com/security/research/tra-2020-47 -CVE-2020-5763 - https://www.tenable.com/security/research/tra-2020-43 -CVE-2020-5763 - https://www.tenable.com/security/research/tra-2020-47 -CVE-2020-5764 - https://www.tenable.com/security/research/tra-2020-41 -CVE-2020-5765 - https://www.tenable.com/security/tns-2020-05 -CVE-2020-5766 - https://www.tenable.com/security/research/tra-2020-42 -CVE-2020-5767 - https://www.tenable.com/security/research/tra-2020-44-0 -CVE-2020-5768 - https://www.tenable.com/security/research/tra-2020-44-0 -CVE-2020-5769 - https://www.tenable.com/security/research/tra-2020-43-0 -CVE-2020-5770 - https://www.tenable.com/security/research/tra-2020-48 -CVE-2020-5771 - https://www.tenable.com/security/research/tra-2020-48 -CVE-2020-5772 - https://www.tenable.com/security/research/tra-2020-48 -CVE-2020-5773 - https://www.tenable.com/security/research/tra-2020-48 -CVE-2020-5774 - https://www.tenable.com/security/tns-2020-06 -CVE-2020-5775 - https://www.tenable.com/security/research/tra-2020-49 -CVE-2020-5776 - https://www.tenable.com/security/research/tra-2020-51 -CVE-2020-5777 - https://www.tenable.com/security/research/tra-2020-51 -CVE-2020-5780 - https://www.tenable.com/security/research/tra-2020-53 -CVE-2020-5781 - https://www.tenable.com/security/research/tra-2020-55 -CVE-2020-5782 - https://www.tenable.com/security/research/tra-2020-55 -CVE-2020-5783 - https://www.tenable.com/security/research/tra-2020-55 -CVE-2020-5784 - https://www.tenable.com/security/research/tra-2020-57 -CVE-2020-5785 - https://www.tenable.com/security/research/tra-2020-57 -CVE-2020-5786 - https://www.tenable.com/security/research/tra-2020-57 -CVE-2020-5787 - https://www.tenable.com/security/research/tra-2020-57 -CVE-2020-5788 - https://www.tenable.com/security/research/tra-2020-57 -CVE-2020-5789 - https://www.tenable.com/security/research/tra-2020-57 -CVE-2020-5790 - https://www.tenable.com/security/research/tra-2020-58 -CVE-2020-5791 - http://packetstormsecurity.com/files/159743/Nagios-XI-5.7.3-Remote-Command-Injection.html -CVE-2020-5791 - http://packetstormsecurity.com/files/162235/Nagios-XI-5.7.3-Remote-Code-Execution.html -CVE-2020-5791 - https://www.tenable.com/security/research/tra-2020-58 -CVE-2020-5792 - http://packetstormsecurity.com/files/162284/Nagios-XI-5.7.3-Remote-Code-Execution.html -CVE-2020-5792 - https://www.tenable.com/security/research/tra-2020-58 -CVE-2020-5793 - https://www.tenable.com/security/tns-2020-07 -CVE-2020-5793 - https://www.tenable.com/security/tns-2020-08 -CVE-2020-5794 - https://www.tenable.com/security/tns-2020-09 -CVE-2020-5795 - https://www.tenable.com/security/research/tra-2020-60 -CVE-2020-5796 - https://www.tenable.com/security/research/tra-2020-61 -CVE-2020-5797 - https://www.tenable.com/security/research/tra-2020-60 -CVE-2020-5798 - https://www.tenable.com/security/research/tra-2020-67 -CVE-2020-5798 - https://www.tenable.com/security/research/tra-2020-67,https://docs.druva.com/001_inSync_Cloud/Cloud/010_Release_Details/010_inSync_Cloud_Updates -CVE-2020-5801 - https://www.tenable.com/security/research/tra-2020-71 -CVE-2020-5802 - https://www.tenable.com/security/research/tra-2020-71 -CVE-2020-5803 - https://www.tenable.com/security/research/tra-2020-56 -CVE-2020-5806 - https://www.tenable.com/security/research/tra-2020-71 -CVE-2020-5807 - https://www.tenable.com/security/research/tra-2020-71 -CVE-2020-5808 - https://www.tenable.com/security/tns-2020-11 -CVE-2020-5809 - https://www.tenable.com/security/research/tra-2020-59 -CVE-2020-5810 - https://www.tenable.com/security/research/tra-2020-59 -CVE-2020-5811 - http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html -CVE-2020-5811 - https://www.tenable.com/security/research/tra-2020-59 -CVE-2020-5812 - https://www.tenable.com/security/tns-2021-01 -CVE-2020-5841 - https://medium.com/@ph0rensic/sql-injection-opmon-9-3-1-1-770bd7e7ad1 -CVE-2020-5842 - https://www.exploit-db.com/exploits/47876 -CVE-2020-5844 - http://packetstormsecurity.com/files/167503/Pandora-FMS-7.0NG.742-Remote-Code-Execution.html -CVE-2020-5844 - https://github.com/TheCyberGeek/CVE-2020-5844 -CVE-2020-5847 - http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html -CVE-2020-5847 - https://sysdream.com/news/lab/ -CVE-2020-5849 - http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html -CVE-2020-5849 - https://sysdream.com/news/lab/ -CVE-2020-5902 - http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html -CVE-2020-5902 - http://packetstormsecurity.com/files/158334/BIG-IP-TMUI-Remote-Code-Execution.html -CVE-2020-5902 - http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html -CVE-2020-5902 - http://packetstormsecurity.com/files/158414/Checker-CVE-2020-5902.html -CVE-2020-5902 - http://packetstormsecurity.com/files/158581/F5-Big-IP-13.1.3-Build-0.0.6-Local-File-Inclusion.html -CVE-2020-5902 - http://packetstormsecurity.com/files/175671/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html -CVE-2020-5902 - https://badpackets.net/over-3000-f5-big-ip-endpoints-vulnerable-to-cve-2020-5902/ -CVE-2020-5902 - https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902 -CVE-2020-5902 - https://swarm.ptsecurity.com/rce-in-f5-big-ip/ -CVE-2020-5902 - https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/ -CVE-2020-5962 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5963 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5964 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5965 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5966 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5967 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5968 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5969 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5970 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5971 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5972 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5973 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 -CVE-2020-5975 - https://nvidia.custhelp.com/app/answers/detail/a_id/5052 -CVE-2020-5976 - https://nvidia.custhelp.com/app/answers/detail/a_id/5052 -CVE-2020-5992 - https://nvidia.custhelp.com/app/answers/detail/a_id/5096 -CVE-2020-6007 - https://research.checkpoint.com/2020/dont-be-silly-its-only-a-lightbulb/ -CVE-2020-6010 - http://packetstormsecurity.com/files/163536/WordPress-LearnPress-SQL-Injection.html -CVE-2020-6019 - https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678 -CVE-2020-6058 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0975 -CVE-2020-6059 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0976 -CVE-2020-6060 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0977 -CVE-2020-6061 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984 -CVE-2020-6062 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0985 -CVE-2020-6063 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0986 -CVE-2020-6064 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0987 -CVE-2020-6065 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0989 -CVE-2020-6066 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0990 -CVE-2020-6067 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0991 -CVE-2020-6068 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0992 -CVE-2020-6069 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0993 -CVE-2020-6070 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0988 -CVE-2020-6071 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994 -CVE-2020-6072 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995 -CVE-2020-6073 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996 -CVE-2020-6074 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0997 -CVE-2020-6075 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0998 -CVE-2020-6076 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0999 -CVE-2020-6077 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000 -CVE-2020-6078 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001 -CVE-2020-6079 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002 -CVE-2020-6080 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002 -CVE-2020-6081 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1003 -CVE-2020-6082 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1004 -CVE-2020-6083 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1005 -CVE-2020-6084 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 -CVE-2020-6085 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 -CVE-2020-6086 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 -CVE-2020-6087 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 -CVE-2020-6088 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1008 -CVE-2020-6089 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1009 -CVE-2020-6090 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1010 -CVE-2020-6091 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1011 -CVE-2020-6092 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1013 -CVE-2020-6093 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1014 -CVE-2020-6094 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1017 -CVE-2020-6097 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029 -CVE-2020-6098 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1030 -CVE-2020-6099 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1032 -CVE-2020-6100 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040 -CVE-2020-6101 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1041 -CVE-2020-6102 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1042 -CVE-2020-6103 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1043 -CVE-2020-6104 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046 -CVE-2020-6105 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047 -CVE-2020-6106 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048 -CVE-2020-6107 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049 -CVE-2020-6108 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050 -CVE-2020-6109 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055 -CVE-2020-6110 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056 -CVE-2020-6111 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1057 -CVE-2020-6112 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1062 -CVE-2020-6113 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1063 -CVE-2020-6114 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1067 -CVE-2020-6115 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068 -CVE-2020-6116 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070 -CVE-2020-6117 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 -CVE-2020-6118 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 -CVE-2020-6119 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 -CVE-2020-6120 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 -CVE-2020-6121 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 -CVE-2020-6122 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 -CVE-2020-6123 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 -CVE-2020-6124 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 -CVE-2020-6125 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1074 -CVE-2020-6126 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075 -CVE-2020-6127 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075 -CVE-2020-6128 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075 -CVE-2020-6129 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076 -CVE-2020-6130 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076 -CVE-2020-6131 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076 -CVE-2020-6132 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077 -CVE-2020-6133 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077 -CVE-2020-6134 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077 -CVE-2020-6135 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1078 -CVE-2020-6136 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1079 -CVE-2020-6137 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 -CVE-2020-6138 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 -CVE-2020-6139 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 -CVE-2020-6140 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 -CVE-2020-6141 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1081 -CVE-2020-6142 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1082 -CVE-2020-6143 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083 -CVE-2020-6144 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083 -CVE-2020-6145 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1091 -CVE-2020-6146 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1084 -CVE-2020-6147 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 -CVE-2020-6148 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 -CVE-2020-6149 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 -CVE-2020-6150 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 -CVE-2020-6151 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1095 -CVE-2020-6152 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1096 -CVE-2020-6155 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1101 -CVE-2020-6156 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 -CVE-2020-6166 - https://wpvulndb.com/vulnerabilities/10009 -CVE-2020-6166 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ -CVE-2020-6167 - https://wpvulndb.com/vulnerabilities/10007 -CVE-2020-6167 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ -CVE-2020-6168 - https://wpvulndb.com/vulnerabilities/10008 -CVE-2020-6168 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ -CVE-2020-6170 - http://packetstormsecurity.com/files/156075/Genexis-Platinum-4410-2.1-Authentication-Bypass.html -CVE-2020-6171 - https://www.deepcode.ca/index.php/2020/04/07/cve-2020-xss-in-clink-office-v2/ -CVE-2020-6173 - https://github.com/theupdateframework/tuf/commits/develop -CVE-2020-6178 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6184 - https://launchpad.support.sap.com/#/notes/2863397 -CVE-2020-6196 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6197 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6198 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6199 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6200 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6201 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6202 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6203 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6204 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6205 - https://launchpad.support.sap.com/#/notes/2884910 -CVE-2020-6205 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6206 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6207 - http://packetstormsecurity.com/files/161993/SAP-Solution-Manager-7.2-Remote-Command-Execution.html -CVE-2020-6207 - http://packetstormsecurity.com/files/162083/SAP-SMD-Agent-Unauthenticated-Remote-Code-Execution.html -CVE-2020-6207 - http://packetstormsecurity.com/files/163168/SAP-Solution-Manager-7.20-Missing-Authorization.html -CVE-2020-6207 - http://seclists.org/fulldisclosure/2021/Apr/4 -CVE-2020-6207 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6208 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6209 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6210 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 -CVE-2020-6215 - http://packetstormsecurity.com/files/174985/SAP-Application-Server-ABAP-Open-Redirection.html -CVE-2020-6215 - http://seclists.org/fulldisclosure/2023/Oct/13 -CVE-2020-6234 - http://packetstormsecurity.com/files/162084/SAP-Host-Control-Local-Privilege-Escalation.html -CVE-2020-6287 - http://packetstormsecurity.com/files/162085/SAP-JAVA-Configuration-Task-Execution.html -CVE-2020-6287 - http://seclists.org/fulldisclosure/2021/Apr/6 -CVE-2020-6307 - https://launchpad.support.sap.com/#/notes/2863397 -CVE-2020-6318 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2020-6318 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2020-6364 - http://packetstormsecurity.com/files/163153/SAP-Wily-Introscope-Enterprise-OS-Command-Injection.html -CVE-2020-6367 - https://launchpad.support.sap.com/#/notes/2972661 -CVE-2020-6369 - http://packetstormsecurity.com/files/163159/SAP-Wily-Introscope-Enterprise-Default-Hard-Coded-Credentials.html -CVE-2020-6388 - http://packetstormsecurity.com/files/157376/Chrome-AudioArray-Allocate-Data-Race-Out-Of-Bounds-Access.html -CVE-2020-6390 - http://packetstormsecurity.com/files/157419/Chrome-ReadableStream-Close-Out-Of-Bounds-Access.html -CVE-2020-6418 - http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html -CVE-2020-6449 - http://packetstormsecurity.com/files/172843/Chrome-WebAudio-Use-After-Free.html -CVE-2020-6458 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044 -CVE-2020-6507 - http://packetstormsecurity.com/files/162088/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html -CVE-2020-6507 - http://packetstormsecurity.com/files/162105/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html -CVE-2020-6513 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092 -CVE-2020-6514 - http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html -CVE-2020-6519 - http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html -CVE-2020-6541 - http://packetstormsecurity.com/files/159610/Chrome-USB-OnServiceConnectionError-Use-After-Free.html -CVE-2020-6542 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127 -CVE-2020-6549 - http://packetstormsecurity.com/files/159558/Chrome-MediaElementEventListener-UpdateSources-Use-After-Free.html -CVE-2020-6550 - http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html -CVE-2020-6551 - http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html -CVE-2020-6555 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1123 -CVE-2020-6577 - https://herolab.usd.de/security-advisories/ -CVE-2020-6577 - https://herolab.usd.de/security-advisories/usd-2019-0072/ -CVE-2020-6578 - https://herolab.usd.de/security-advisories/ -CVE-2020-6578 - https://herolab.usd.de/security-advisories/usd-2019-0069/ -CVE-2020-6579 - https://herolab.usd.de/security-advisories/usd-2019-0070/ -CVE-2020-6581 - https://herolab.usd.de/security-advisories/ -CVE-2020-6581 - https://herolab.usd.de/security-advisories/usd-2020-0002/ -CVE-2020-6582 - https://herolab.usd.de/security-advisories/ -CVE-2020-6582 - https://herolab.usd.de/security-advisories/usd-2020-0001/ -CVE-2020-6584 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60 -CVE-2020-6585 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60 -CVE-2020-6586 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60 -CVE-2020-6609 - https://github.com/LibreDWG/libredwg/issues/179#issue-544834443 -CVE-2020-6610 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120 -CVE-2020-6611 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190 -CVE-2020-6612 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169 -CVE-2020-6613 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025 -CVE-2020-6614 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 -CVE-2020-6615 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 -CVE-2020-6616 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-6617 - https://github.com/nothings/stb/issues/864 -CVE-2020-6618 - https://github.com/nothings/stb/issues/866 -CVE-2020-6619 - https://github.com/nothings/stb/issues/863 -CVE-2020-6620 - https://github.com/nothings/stb/issues/868 -CVE-2020-6621 - https://github.com/nothings/stb/issues/867 -CVE-2020-6622 - https://github.com/nothings/stb/issues/869 -CVE-2020-6623 - https://github.com/nothings/stb/issues/865 -CVE-2020-6624 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858744 -CVE-2020-6625 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858746 -CVE-2020-6627 - http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html -CVE-2020-6627 - https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/ -CVE-2020-6628 - https://github.com/libming/libming/issues/191 -CVE-2020-6629 - https://github.com/libming/libming/issues/190 -CVE-2020-6630 - https://github.com/gpac/gpac/issues/1377 -CVE-2020-6631 - https://github.com/gpac/gpac/issues/1378 -CVE-2020-6637 - https://cinzinga.com/CVE-2020-6637/ -CVE-2020-6640 - https://fortiguard.com/advisory/FG-IR-20-003 -CVE-2020-6643 - https://fortiguard.com/advisory/FG-IR-19-270 -CVE-2020-6649 - https://fortiguard.com/advisory/FG-IR-20-011 -CVE-2020-6756 - http://packetstormsecurity.com/files/155898/PixelStor-5000-K-4.0.1580-20150629-Remote-Code-Execution.html -CVE-2020-6792 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6793 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6794 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6795 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6796 - https://bugzilla.mozilla.org/show_bug.cgi?id=1610426 -CVE-2020-6797 - https://bugzilla.mozilla.org/show_bug.cgi?id=1596668 -CVE-2020-6798 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6799 - https://bugzilla.mozilla.org/show_bug.cgi?id=1606596 -CVE-2020-6800 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6802 - https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach -CVE-2020-6805 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6806 - http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html -CVE-2020-6806 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6807 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1247968 -CVE-2020-6811 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6812 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6813 - https://bugzilla.mozilla.org/show_bug.cgi?id=1605814 -CVE-2020-6814 - https://usn.ubuntu.com/4328-1/ -CVE-2020-6816 - https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach -CVE-2020-6817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 -CVE-2020-6828 - https://bugzilla.mozilla.org/show_bug.cgi?id=1617928 -CVE-2020-6830 - https://bugzilla.mozilla.org/show_bug.cgi?id=1632387 -CVE-2020-6831 - http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html -CVE-2020-6836 - https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/ -CVE-2020-6838 - https://github.com/mruby/mruby/issues/4926 -CVE-2020-6839 - https://github.com/mruby/mruby/issues/4929 -CVE-2020-6840 - https://github.com/mruby/mruby/issues/4927 -CVE-2020-6843 - http://packetstormsecurity.com/files/156050/ZOHO-ManageEngine-ServiceDeskPlus-11.0-Build-11007-Cross-Site-Scripting.html -CVE-2020-6843 - http://seclists.org/fulldisclosure/2020/Jan/32 -CVE-2020-6843 - https://seclists.org/bugtraq/2020/Jan/34 -CVE-2020-6844 - https://websec.nl/news.php -CVE-2020-6844 - https://www.exploit-db.com/exploits/47960 -CVE-2020-6845 - https://websec.nl/news.php -CVE-2020-6845 - https://www.exploit-db.com/exploits/47960 -CVE-2020-6847 - https://gist.github.com/Marshall-Hallenbeck/bf6a4a4f408bb7a5e0a47cb39dc1dbbe -CVE-2020-6849 - https://wpvulndb.com/vulnerabilities/10031 -CVE-2020-6849 - https://zeroauth.ltd/blog/ -CVE-2020-6850 - https://zeroauth.ltd/blog/ -CVE-2020-6850 - https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response/ -CVE-2020-6851 - https://github.com/uclouvain/openjpeg/issues/1228 -CVE-2020-6851 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-6857 - http://hyp3rlinx.altervista.org -CVE-2020-6857 - http://packetstormsecurity.com/files/156015/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html -CVE-2020-6857 - http://packetstormsecurity.com/files/157321/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html -CVE-2020-6857 - http://seclists.org/fulldisclosure/2020/Jan/29 -CVE-2020-6857 - http://seclists.org/fulldisclosure/2020/Jan/35 -CVE-2020-6857 - https://seclists.org/bugtraq/2020/Jan/30 -CVE-2020-6858 - https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v -CVE-2020-6859 - https://wpvulndb.com/vulnerabilities/10041 -CVE-2020-6860 - https://github.com/hoene/libmysofa/issues/96 -CVE-2020-6861 - https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html -CVE-2020-6862 - http://packetstormsecurity.com/files/159135/ZTE-F602W-CAPTCHA-Bypass.html -CVE-2020-6950 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-6950 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-6950 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-6954 - https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html -CVE-2020-6955 - https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html -CVE-2020-6956 - https://www.kpmg.de/noindex/advisories/KPMG-2019-001.txt -CVE-2020-6958 - https://github.com/NationalSecurityAgency/ghidra/issues/943 -CVE-2020-6958 - https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md -CVE-2020-6958 - https://sourceforge.net/p/yajsw/bugs/166/ -CVE-2020-7009 - https://www.elastic.co/community/security/ -CVE-2020-7010 - https://www.elastic.co/community/security/ -CVE-2020-7011 - https://www.elastic.co/community/security/ -CVE-2020-7012 - https://www.elastic.co/community/security/ -CVE-2020-7013 - https://www.elastic.co/community/security/ -CVE-2020-7014 - https://www.elastic.co/community/security/ -CVE-2020-7015 - https://www.elastic.co/community/security/ -CVE-2020-7016 - https://www.elastic.co/community/security/ -CVE-2020-7016 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-7017 - https://www.elastic.co/community/security/ -CVE-2020-7017 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-7020 - https://staging-website.elastic.co/community/security/ -CVE-2020-7030 - http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html -CVE-2020-7032 - http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html -CVE-2020-7032 - http://seclists.org/fulldisclosure/2020/Nov/31 -CVE-2020-7032 - https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ -CVE-2020-7044 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-7047 - https://wpvulndb.com/vulnerabilities/10028 -CVE-2020-7048 - https://wpvulndb.com/vulnerabilities/10027 -CVE-2020-7050 - https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/ -CVE-2020-7051 - https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/ -CVE-2020-7052 - https://www.tenable.com/security/research/tra-2020-04 -CVE-2020-7053 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html -CVE-2020-7053 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522 -CVE-2020-7053 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 -CVE-2020-7053 - https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks@canonical.com -CVE-2020-7053 - https://usn.ubuntu.com/4287-2/ -CVE-2020-7054 - https://github.com/mz-automation/libiec61850/issues/200 -CVE-2020-7059 - https://hackerone.com/reports/778834 -CVE-2020-7059 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7059 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-7060 - https://bugs.php.net/bug.php?id=79037 -CVE-2020-7060 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7060 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-7062 - https://bugs.php.net/bug.php?id=79221 -CVE-2020-7064 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-7065 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-7067 - https://bugs.php.net/bug.php?id=79465 -CVE-2020-7067 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7067 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-7068 - https://bugs.php.net/bug.php?id=79797 -CVE-2020-7069 - https://usn.ubuntu.com/4583-1/ -CVE-2020-7069 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7069 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-7070 - https://usn.ubuntu.com/4583-1/ -CVE-2020-7070 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-7071 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-7104 - https://wpvulndb.com/vulnerabilities/10029 -CVE-2020-7107 - https://wpvulndb.com/vulnerabilities/10006 -CVE-2020-7108 - http://packetstormsecurity.com/files/156275/LearnDash-WordPress-LMS-3.1.2-Cross-Site-Scripting.html -CVE-2020-7108 - https://wpvulndb.com/vulnerabilities/10026 -CVE-2020-7115 - http://packetstormsecurity.com/files/158368/ClearPass-Policy-Manager-Unauthenticated-Remote-Command-Execution.html -CVE-2020-7200 - http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html -CVE-2020-7209 - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html -CVE-2020-7209 - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html -CVE-2020-7210 - http://packetstormsecurity.com/files/156062/Umbraco-CMS-8.2.2-Cross-Site-Request-Forgery.html -CVE-2020-7210 - http://seclists.org/fulldisclosure/2020/Jan/33 -CVE-2020-7210 - https://sec-consult.com/en/blog/advisories/cross-site-request-forgery-csrf-in-umbraco-cms/ -CVE-2020-7210 - https://seclists.org/bugtraq/2020/Jan/35 -CVE-2020-7213 - http://almorabea.net/en/2020/01/19/write-up-for-the-parallel-vulnerability-cve-2020-7213/ -CVE-2020-7222 - https://sku11army.blogspot.com/2020/01/amcrest-2520ac0018r-login-bypass.html -CVE-2020-7224 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html -CVE-2020-7224 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001 -CVE-2020-7226 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-7226 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-7228 - https://wpvulndb.com/vulnerabilities/10043 -CVE-2020-7229 - https://github.com/niteosoft/simplejobscript/issues/7 -CVE-2020-7231 - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html -CVE-2020-7232 - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html -CVE-2020-7233 - https://sku11army.blogspot.com/2020/01/kms-controls-backdoor-in-bacnet.html -CVE-2020-7234 - https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html -CVE-2020-7239 - https://wpvulndb.com/vulnerabilities/10035 -CVE-2020-7240 - https://sku11army.blogspot.com/2020/01/heinberg-lantime-m1000-rce.html -CVE-2020-7241 - https://github.com/V1n1v131r4/Exploiting-WP-Database-Backup-WordPress-Plugin/blob/master/README.md -CVE-2020-7241 - https://zeroauth.ltd/blog/2020/01/21/analysis-on-cve-2020-7241-misrepresenting-a-security-vulnerability/ -CVE-2020-7242 - https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html -CVE-2020-7246 - http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html -CVE-2020-7246 - http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html -CVE-2020-7246 - http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html -CVE-2020-7246 - http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html -CVE-2020-7246 - https://docs.google.com/document/d/13ZZSm0DL1Ie6r_fU5ZdDKGZ4defFqiFXMG--zDo8S10/edit?usp=sharing -CVE-2020-7247 - http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html -CVE-2020-7247 - http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html -CVE-2020-7247 - http://packetstormsecurity.com/files/156249/OpenSMTPD-MAIL-FROM-Remote-Code-Execution.html -CVE-2020-7247 - http://packetstormsecurity.com/files/156295/OpenSMTPD-6.6.1-Local-Privilege-Escalation.html -CVE-2020-7247 - http://packetstormsecurity.com/files/162093/OpenBSD-OpenSMTPD-6.6-Remote-Code-Execution.html -CVE-2020-7247 - http://seclists.org/fulldisclosure/2020/Jan/49 -CVE-2020-7247 - http://www.openwall.com/lists/oss-security/2020/01/28/3 -CVE-2020-7248 - https://github.com/openwrt/openwrt/commits/master -CVE-2020-7250 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7251 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299 -CVE-2020-7252 - https://kc.mcafee.com/corporate/index?page=content&id=SB10307 -CVE-2020-7253 - https://kc.mcafee.com/corporate/index?page=content&id=SB10312 -CVE-2020-7254 - https://kc.mcafee.com/corporate/index?page=content&id=SB10311 -CVE-2020-7255 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7259 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7260 - https://kc.mcafee.com/corporate/index?page=content&id=SB10313 -CVE-2020-7261 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7262 - https://kc.mcafee.com/corporate/index?page=content&id=SB10319 -CVE-2020-7263 - https://kc.mcafee.com/corporate/index?page=content&id=SB10314 -CVE-2020-7268 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7269 - https://kc.mcafee.com/corporate/index?page=content&id=SB10336 -CVE-2020-7270 - https://kc.mcafee.com/corporate/index?page=content&id=SB10336 -CVE-2020-7273 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7274 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7275 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7276 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7277 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7278 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 -CVE-2020-7279 - https://kc.mcafee.com/corporate/index?page=content&id=SB10320 -CVE-2020-7280 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302 -CVE-2020-7292 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7293 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7294 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7295 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7296 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7297 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 -CVE-2020-7300 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7301 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7302 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7303 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7304 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7305 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7306 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7307 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 -CVE-2020-7308 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354 -CVE-2020-7309 - https://kc.mcafee.com/corporate/index?page=content&id=SB10324 -CVE-2020-7311 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 -CVE-2020-7312 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 -CVE-2020-7314 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 -CVE-2020-7315 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 -CVE-2020-7316 - https://kc.mcafee.com/corporate/index?page=content&id=SB10330 -CVE-2020-7317 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-7318 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-7319 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 -CVE-2020-7320 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 -CVE-2020-7322 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 -CVE-2020-7323 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 -CVE-2020-7324 - https://kc.mcafee.com/corporate/index?page=content&id=SB10328 -CVE-2020-7325 - https://kc.mcafee.com/corporate/index?page=content&id=SB10328 -CVE-2020-7326 - https://kc.mcafee.com/corporate/index?page=content&id=SB10331 -CVE-2020-7327 - https://kc.mcafee.com/corporate/index?page=content&id=SB10331 -CVE-2020-7328 - https://kc.mcafee.com/corporate/index?page=content&id=SB10334 -CVE-2020-7329 - https://kc.mcafee.com/corporate/index?page=content&id=SB10334 -CVE-2020-7331 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335 -CVE-2020-7332 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335 -CVE-2020-7333 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335 -CVE-2020-7336 - https://kc.mcafee.com/corporate/index?page=content&id=SB10341 -CVE-2020-7337 - https://kc.mcafee.com/corporate/index?page=content&id=SB10338 -CVE-2020-7339 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340 -CVE-2020-7343 - https://kc.mcafee.com/corporate/index?page=content&id=SB10343 -CVE-2020-7346 - https://kc.mcafee.com/corporate/index?page=content&id=SB10344 -CVE-2020-7350 - https://github.com/rapid7/metasploit-framework/issues/13026 -CVE-2020-7351 - http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html -CVE-2020-7352 - https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/ -CVE-2020-7354 - https://avalz.it/research/metasploit-pro-xss-to-rce/ -CVE-2020-7355 - https://avalz.it/research/metasploit-pro-xss-to-rce/ -CVE-2020-7356 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php -CVE-2020-7357 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php -CVE-2020-7361 - https://github.com/rapid7/metasploit-framework/pull/13828 -CVE-2020-7363 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ -CVE-2020-7363 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html -CVE-2020-7364 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ -CVE-2020-7364 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html -CVE-2020-7369 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ -CVE-2020-7369 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html -CVE-2020-7370 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ -CVE-2020-7370 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html -CVE-2020-7371 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ -CVE-2020-7371 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html -CVE-2020-7373 - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ -CVE-2020-7377 - https://github.com/rapid7/metasploit-framework/issues/14015 -CVE-2020-7384 - http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html -CVE-2020-7384 - http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html -CVE-2020-7457 - http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html -CVE-2020-7470 - https://sku11army.blogspot.com/2020/01/sonoff-sonoff-th-module-vuln-xss.html -CVE-2020-7483 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 -CVE-2020-7484 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 -CVE-2020-7485 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 -CVE-2020-7486 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 -CVE-2020-7491 - https://www.se.com/ww/en/download/document/SESB-2020-105-01/ -CVE-2020-7499 - https://www.se.com/ww/en/download/document/SEVD-2020-133-03/ -CVE-2020-7500 - https://www.se.com/ww/en/download/document/SEVD-2020-133-03/ -CVE-2020-7590 - https://www.siemens-healthineers.com/support-documentation/security-advisory -CVE-2020-7593 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069 -CVE-2020-7594 - https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html -CVE-2020-7595 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-7595 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-7595 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-7595 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-7596 - https://snyk.io/vuln/SNYK-JS-CODECOV-543183 -CVE-2020-7597 - https://snyk.io/vuln/SNYK-JS-CODECOV-548879 -CVE-2020-7598 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764 -CVE-2020-7600 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867 -CVE-2020-7601 - https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114 -CVE-2020-7602 - https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115 -CVE-2020-7603 - https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123 -CVE-2020-7604 - https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122 -CVE-2020-7605 - https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124 -CVE-2020-7606 - https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125 -CVE-2020-7607 - https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126 -CVE-2020-7608 - https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381 -CVE-2020-7609 - https://snyk.io/vuln/SNYK-JS-NODERULES-560426 -CVE-2020-7611 - https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342 -CVE-2020-7613 - https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113 -CVE-2020-7614 - https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115 -CVE-2020-7615 - https://snyk.io/vuln/SNYK-JS-FSA-564118 -CVE-2020-7616 - https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120 -CVE-2020-7617 - https://snyk.io/vuln/SNYK-JS-INIPARSER-564122 -CVE-2020-7618 - https://snyk.io/vuln/SNYK-JS-SDS-564123 -CVE-2020-7619 - https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222 -CVE-2020-7620 - https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695 -CVE-2020-7621 - https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248 -CVE-2020-7623 - https://snyk.io/vuln/SNYK-JS-JSCOVER-564250 -CVE-2020-7624 - https://snyk.io/vuln/SNYK-JS-EFFECT-564256 -CVE-2020-7625 - https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259 -CVE-2020-7626 - https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260 -CVE-2020-7627 - https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261 -CVE-2020-7628 - https://snyk.io/vuln/SNYK-JS-UMOUNT-564265 -CVE-2020-7629 - https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267 -CVE-2020-7630 - https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269 -CVE-2020-7631 - https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425 -CVE-2020-7632 - https://snyk.io/vuln/SNYK-JS-NODEMPV-564426 -CVE-2020-7633 - https://snyk.io/vuln/SNYK-JS-APICONNECTCLIPLUGINS-564427 -CVE-2020-7634 - https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428 -CVE-2020-7635 - https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429 -CVE-2020-7636 - https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430 -CVE-2020-7637 - https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431 -CVE-2020-7638 - https://snyk.io/vuln/SNYK-JS-CONFINIT-564433 -CVE-2020-7639 - https://snyk.io/vuln/SNYK-JS-EIVIFJDOT-564435 -CVE-2020-7640 - https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968 -CVE-2020-7641 - https://security.snyk.io/vuln/SNYK-JS-GRUNTUTILPROPERTY-565088 -CVE-2020-7642 - https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144 -CVE-2020-7643 - https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089 -CVE-2020-7644 - https://snyk.io/vuln/SNYK-JS-FUNMAP-564436 -CVE-2020-7645 - http://snyk.io/vuln/SNYK-JS-CHROMELAUNCHER-537575 -CVE-2020-7646 - https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274 -CVE-2020-7648 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607 -CVE-2020-7649 - https://security.snyk.io/vuln/SNYK-JS-SNYKBROKER-570608 -CVE-2020-7650 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609 -CVE-2020-7651 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610 -CVE-2020-7652 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611 -CVE-2020-7653 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570612 -CVE-2020-7655 - https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141 -CVE-2020-7656 - https://snyk.io/vuln/SNYK-JS-JQUERY-569619 -CVE-2020-7656 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-7658 - https://snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140 -CVE-2020-7659 - https://snyk.io/vuln/SNYK-RUBY-REEL-569135 -CVE-2020-7661 - https://snyk.io/vuln/SNYK-JS-URLREGEX-569472 -CVE-2020-7662 - https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623 -CVE-2020-7663 - https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830 -CVE-2020-7664 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383 -CVE-2020-7665 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441 -CVE-2020-7666 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGCPIO-570440 -CVE-2020-7667 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427 -CVE-2020-7668 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384 -CVE-2020-7669 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428 -CVE-2020-7670 - https://github.com/ohler55/agoo/issues/88 -CVE-2020-7670 - https://snyk.io/vuln/SNYK-RUBY-AGOO-569137 -CVE-2020-7671 - https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136 -CVE-2020-7672 - https://snyk.io/vuln/SNYK-JS-MOSC-571492 -CVE-2020-7673 - https://snyk.io/vuln/SNYK-JS-NODEEXTEND-571491 -CVE-2020-7674 - https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490 -CVE-2020-7675 - https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493 -CVE-2020-7677 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-572317 -CVE-2020-7677 - https://security.snyk.io/vuln/SNYK-JS-THENIFY-571690 -CVE-2020-7678 - https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691 -CVE-2020-7679 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-572804 -CVE-2020-7679 - https://snyk.io/vuln/SNYK-JS-CASPERJS-572803 -CVE-2020-7680 - http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html -CVE-2020-7680 - http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html -CVE-2020-7680 - https://github.com/docsifyjs/docsify/issues/1126 -CVE-2020-7680 - https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099 -CVE-2020-7681 - https://snyk.io/vuln/SNYK-JS-MARSCODE-590122 -CVE-2020-7682 - https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121 -CVE-2020-7683 - https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123 -CVE-2020-7685 - https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765 -CVE-2020-7686 - https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124 -CVE-2020-7687 - https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892 -CVE-2020-7688 - https://github.com/418sec/huntr/pull/102 -CVE-2020-7688 - https://snyk.io/vuln/SNYK-JS-MVERSION-573174 -CVE-2020-7690 - https://snyk.io/vuln/SNYK-JS-JSPDF-575256 -CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255 -CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253 -CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254 -CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252 -CVE-2020-7691 - https://snyk.io/vuln/SNYK-JS-JSPDF-568273 -CVE-2020-7693 - https://github.com/andsnw/sockjs-dos-py -CVE-2020-7693 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448 -CVE-2020-7693 - https://snyk.io/vuln/SNYK-JS-SOCKJS-575261 -CVE-2020-7694 - https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560 -CVE-2020-7695 - https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471 -CVE-2020-7699 - https://github.com/richardgirges/express-fileupload/issues/236 -CVE-2020-7699 - https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969 -CVE-2020-7700 - https://snyk.io/vuln/SNYK-JS-PHPJS-598681 -CVE-2020-7701 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676 -CVE-2020-7702 - https://snyk.io/vuln/SNYK-JS-TEMPL8-598770 -CVE-2020-7703 - https://snyk.io/vuln/SNYK-JS-NISUTILS-598799 -CVE-2020-7704 - https://snyk.io/vuln/SNYK-JS-LINUXCMDLINE-598674 -CVE-2020-7705 - https://snyk.io/research/sour-mint-malicious-sdk/ -CVE-2020-7706 - https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853 -CVE-2020-7707 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857 -CVE-2020-7707 - https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800 -CVE-2020-7708 - https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672 -CVE-2020-7708 - https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673 -CVE-2020-7709 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598862 -CVE-2020-7709 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925 -CVE-2020-7710 - https://github.com/hacksparrow/safe-eval/issues/19 -CVE-2020-7710 - https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076 -CVE-2020-7711 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-608301 -CVE-2020-7712 - https://github.com/trentm/json/issues/144 -CVE-2020-7712 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931 -CVE-2020-7712 - https://snyk.io/vuln/SNYK-JS-JSON-597481 -CVE-2020-7712 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-7712 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-7712 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-7713 - https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396 -CVE-2020-7714 - https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665 -CVE-2020-7715 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666 -CVE-2020-7716 - https://snyk.io/vuln/SNYK-JS-DEEPS-598667 -CVE-2020-7717 - https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668 -CVE-2020-7718 - https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670 -CVE-2020-7719 - https://github.com/kvz/locutus/pull/418/ -CVE-2020-7719 - https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675 -CVE-2020-7720 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293 -CVE-2020-7720 - https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677 -CVE-2020-7721 - https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678 -CVE-2020-7722 - https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679 -CVE-2020-7723 - https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686 -CVE-2020-7724 - https://snyk.io/vuln/SNYK-JS-TINYCONF-598792 -CVE-2020-7725 - https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798 -CVE-2020-7726 - https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801 -CVE-2020-7727 - https://snyk.io/vuln/SNYK-JS-GEDI-598803 -CVE-2020-7729 - https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7 -CVE-2020-7731 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302 -CVE-2020-7733 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666 -CVE-2020-7733 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665 -CVE-2020-7733 - https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226 -CVE-2020-7733 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-7734 - https://github.com/arachnys/cabot/pull/694 -CVE-2020-7734 - https://snyk.io/vuln/SNYK-PYTHON-CABOT-609862 -CVE-2020-7734 - https://www.exploit-db.com/exploits/48791 -CVE-2020-7736 - https://snyk.io/vuln/SNYK-JS-BMOOR-598664 -CVE-2020-7737 - https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687 -CVE-2020-7739 - https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638 -CVE-2020-7740 - https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636 -CVE-2020-7742 - https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157 -CVE-2020-7744 - https://snyk.io/blog/remote-code-execution-rce-sourmint/ -CVE-2020-7744 - https://snyk.io/research/sour-mint-malicious-sdk/ -CVE-2020-7745 - https://snyk.io/blog/remote-code-execution-rce-sourmint/ -CVE-2020-7745 - https://snyk.io/research/sour-mint-malicious-sdk/%23rce -CVE-2020-7745 - https://www.youtube.com/watch?v=n-mEMkeoUqs -CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375 -CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376 -CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374 -CVE-2020-7746 - https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716 -CVE-2020-7747 - https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381 -CVE-2020-7748 - https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382 -CVE-2020-7749 - https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637 -CVE-2020-7750 - https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497 -CVE-2020-7751 - https://snyk.io/vuln/SNYK-JS-PATHVAL-596926 -CVE-2020-7752 - https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909 -CVE-2020-7753 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132 -CVE-2020-7753 - https://snyk.io/vuln/SNYK-JS-TRIM-1017038 -CVE-2020-7755 - https://snyk.io/vuln/SNYK-JS-DATGUI-1016275 -CVE-2020-7757 - https://snyk.io/vuln/SNYK-JS-DROPPY-1023656 -CVE-2020-7758 - https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657 -CVE-2020-7759 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447 -CVE-2020-7760 - https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937 -CVE-2020-7760 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-7760 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7760 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-7762 - https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310 -CVE-2020-7763 - https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598 -CVE-2020-7764 - https://hackerone.com/reports/1025575 -CVE-2020-7764 - https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269 -CVE-2020-7765 - https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324 -CVE-2020-7766 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396 -CVE-2020-7766 - https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939 -CVE-2020-7767 - https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404 -CVE-2020-7768 - https://github.com/grpc/grpc-node/pull/1606 -CVE-2020-7768 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819 -CVE-2020-7768 - https://snyk.io/vuln/SNYK-JS-GRPC-598671 -CVE-2020-7768 - https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818 -CVE-2020-7769 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742 -CVE-2020-7769 - https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834 -CVE-2020-7771 - https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799 -CVE-2020-7772 - https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952 -CVE-2020-7773 - https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461 -CVE-2020-7774 - https://github.com/yargs/y18n/issues/96 -CVE-2020-7774 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306 -CVE-2020-7774 - https://snyk.io/vuln/SNYK-JS-Y18N-1021887 -CVE-2020-7774 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7775 - https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716 -CVE-2020-7776 - https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856 -CVE-2020-7777 - https://snyk.io/vuln/SNYK-JS-JSEN-1014670 -CVE-2020-7778 - https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753 -CVE-2020-7781 - https://snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337 -CVE-2020-7782 - https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333 -CVE-2020-7784 - https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334 -CVE-2020-7785 - https://snyk.io/vuln/SNYK-JS-NODEPS-1048335 -CVE-2020-7786 - https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336 -CVE-2020-7787 - https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907 -CVE-2020-7788 - https://snyk.io/vuln/SNYK-JS-INI-1048974 -CVE-2020-7793 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388 -CVE-2020-7793 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387 -CVE-2020-7793 - https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599 -CVE-2020-7794 - https://snyk.io/vuln/SNYK-JS-BUNS-1050389 -CVE-2020-7795 - https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390 -CVE-2020-7799 - http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html -CVE-2020-7799 - https://lab.mediaservice.net/advisory/2020-03-fusionauth.txt -CVE-2020-7915 - https://sku11army.blogspot.com/2020/01/eaton-authenticated-stored-cross-site.html -CVE-2020-7919 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-7920 - https://jira.percona.com/browse/PMM-5232 -CVE-2020-7920 - https://jira.percona.com/browse/PMM-5233 -CVE-2020-7920 - https://www.percona.com/blog/2020/02/03/improvements-in-pmm-bug-fixes-in-percona-server-percona-backup-for-mongodb-alert-release-roundup-2-3-2020/ -CVE-2020-7934 - http://packetstormsecurity.com/files/160168/LifeRay-7.2.1-GA2-Cross-Site-Scripting.html -CVE-2020-7934 - https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 -CVE-2020-7934 - https://semanticbits.com/liferay-portal-authenticated-xss-disclosure/ -CVE-2020-7953 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 -CVE-2020-7954 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 -CVE-2020-7959 - https://www.exploit-db.com/exploits/48090 -CVE-2020-7961 - http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html -CVE-2020-7961 - http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html -CVE-2020-7980 - http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html -CVE-2020-7980 - https://github.com/Xh4H/Satellian-CVE-2020-7980 -CVE-2020-7981 - https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613 -CVE-2020-7982 - https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982 -CVE-2020-7982 - https://github.com/openwrt/openwrt/commits/master -CVE-2020-7984 - https://blog.huntresslabs.com/validating-the-solarwinds-n-central-dumpster-diver-vulnerability-5e3a045982e5 -CVE-2020-7984 - https://packetstormsecurity.com/files/156033 -CVE-2020-7984 - https://www.crn.com/news/managed-services/solarwinds-rmm-tool-has-open-zero-day-exploit-huntress-labs -CVE-2020-7988 - https://pastebin.com/ZPECbgZb -CVE-2020-7989 - https://www.exploit-db.com/exploits/47946 -CVE-2020-7990 - https://www.exploit-db.com/exploits/47946 -CVE-2020-7991 - http://packetstormsecurity.com/files/156106/Adive-Framework-2.0.8-Cross-Site-Request-Forgery.html -CVE-2020-7991 - https://www.exploit-db.com/exploits/47946 -CVE-2020-7995 - http://packetstormsecurity.com/files/163541/Dolibarr-ERP-CRM-10.0.6-Login-Brute-Forcer.html -CVE-2020-7997 - https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68 -CVE-2020-7998 - https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f -CVE-2020-7999 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html -CVE-2020-8000 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html -CVE-2020-8001 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html -CVE-2020-8010 - http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html -CVE-2020-8012 - http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html -CVE-2020-8012 - http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html -CVE-2020-8014 - https://bugzilla.suse.com/show_bug.cgi?id=1164131 -CVE-2020-8015 - https://bugzilla.suse.com/show_bug.cgi?id=1154183 -CVE-2020-8016 - https://bugzilla.suse.com/show_bug.cgi?id=1159740 -CVE-2020-8019 - https://bugzilla.suse.com/show_bug.cgi?id=1169385 -CVE-2020-8023 - https://bugzilla.suse.com/show_bug.cgi?id=1172698 -CVE-2020-8029 - https://bugzilla.suse.com/show_bug.cgi?id=1177362 -CVE-2020-8091 - https://www.purplemet.com/blog/typo3-xss-vulnerability -CVE-2020-8101 - https://labs.bitdefender.com/2021/01/cracking-the-lifeshield-unauthorized-live-streaming-in-your-home/ -CVE-2020-8105 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-theabode-iota-security-system-fake-image-injectioninto-timeline -CVE-2020-8112 - https://github.com/uclouvain/openjpeg/issues/1231 -CVE-2020-8112 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-8115 - https://hackerone.com/reports/775693 -CVE-2020-8116 - https://hackerone.com/reports/719856 -CVE-2020-8117 - https://hackerone.com/reports/439828 -CVE-2020-8118 - https://hackerone.com/reports/427835 -CVE-2020-8119 - https://hackerone.com/reports/719426 -CVE-2020-8120 - https://hackerone.com/reports/605915 -CVE-2020-8121 - https://hackerone.com/reports/452854 -CVE-2020-8122 - https://hackerone.com/reports/447494 -CVE-2020-8123 - https://hackerone.com/reports/768574 -CVE-2020-8124 - https://hackerone.com/reports/496293 -CVE-2020-8125 - https://hackerone.com/reports/778414 -CVE-2020-8126 - https://hackerone.com/reports/197958 -CVE-2020-8127 - https://hackerone.com/reports/691977 -CVE-2020-8128 - https://hackerone.com/reports/660565 -CVE-2020-8129 - https://hackerone.com/reports/660563 -CVE-2020-8130 - https://hackerone.com/reports/651518 -CVE-2020-8131 - https://hackerone.com/reports/730239 -CVE-2020-8132 - https://hackerone.com/reports/781664 -CVE-2020-8133 - https://hackerone.com/reports/661051 -CVE-2020-8134 - https://hackerone.com/reports/793704 -CVE-2020-8134 - https://hackerone.com/reports/815084 -CVE-2020-8135 - https://hackerone.com/reports/786956 -CVE-2020-8136 - https://hackerone.com/reports/804772 -CVE-2020-8137 - https://hackerone.com/reports/772448 -CVE-2020-8138 - https://hackerone.com/reports/736867 -CVE-2020-8139 - https://hackerone.com/reports/788257 -CVE-2020-8140 - https://hackerone.com/reports/633266 -CVE-2020-8141 - https://hackerone.com/reports/390929 -CVE-2020-8142 - https://hackerone.com/reports/792895 -CVE-2020-8143 - https://hackerone.com/reports/794144 -CVE-2020-8144 - https://hackerone.com/reports/330051 -CVE-2020-8145 - https://hackerone.com/reports/329659 -CVE-2020-8146 - https://hackerone.com/reports/530967 -CVE-2020-8147 - https://hackerone.com/reports/801522 -CVE-2020-8148 - https://hackerone.com/reports/802079 -CVE-2020-8149 - https://hackerone.com/reports/825729 -CVE-2020-8150 - https://hackerone.com/reports/742588 -CVE-2020-8151 - https://hackerone.com/reports/800231 -CVE-2020-8151 - https://hackerone.com/reports/803922 -CVE-2020-8152 - http://seclists.org/fulldisclosure/2020/Dec/54 -CVE-2020-8152 - https://hackerone.com/reports/743505 -CVE-2020-8153 - https://hackerone.com/reports/642515 -CVE-2020-8154 - https://hackerone.com/reports/819807 -CVE-2020-8155 - https://hackerone.com/reports/819863 -CVE-2020-8156 - https://hackerone.com/reports/803734 -CVE-2020-8158 - https://hackerone.com/reports/869574 -CVE-2020-8159 - https://hackerone.com/reports/519220 -CVE-2020-8160 - https://hackerone.com/reports/838178 -CVE-2020-8162 - https://hackerone.com/reports/789579 -CVE-2020-8163 - http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html -CVE-2020-8164 - https://hackerone.com/reports/292797 -CVE-2020-8165 - https://hackerone.com/reports/413388 -CVE-2020-8166 - https://hackerone.com/reports/732415 -CVE-2020-8167 - https://hackerone.com/reports/189878 -CVE-2020-8168 - https://hackerone.com/reports/323852 -CVE-2020-8168 - https://hackerone.com/reports/661647 -CVE-2020-8168 - https://hackerone.com/reports/703659 -CVE-2020-8169 - https://hackerone.com/reports/874778 -CVE-2020-8170 - https://hackerone.com/reports/386570 -CVE-2020-8170 - https://hackerone.com/reports/661647 -CVE-2020-8170 - https://hackerone.com/reports/703659 -CVE-2020-8172 - https://hackerone.com/reports/811502 -CVE-2020-8172 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8172 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8172 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-8172 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-8172 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-8173 - https://hackerone.com/reports/852841 -CVE-2020-8174 - https://hackerone.com/reports/784186 -CVE-2020-8174 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8174 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8174 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-8174 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-8175 - https://hackerone.com/reports/842462 -CVE-2020-8177 - https://hackerone.com/reports/887462 -CVE-2020-8177 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-8178 - https://hackerone.com/reports/690010 -CVE-2020-8179 - https://hackerone.com/reports/867052 -CVE-2020-8180 - https://hackerone.com/reports/851807 -CVE-2020-8181 - https://hackerone.com/reports/808287 -CVE-2020-8182 - https://hackerone.com/reports/827816 -CVE-2020-8183 - https://hackerone.com/reports/885041 -CVE-2020-8184 - https://hackerone.com/reports/895727 -CVE-2020-8185 - https://hackerone.com/reports/899069 -CVE-2020-8186 - https://hackerone.com/reports/863544 -CVE-2020-8189 - https://hackerone.com/reports/685552 -CVE-2020-8192 - https://hackerone.com/reports/903521 -CVE-2020-8193 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html -CVE-2020-8195 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html -CVE-2020-8196 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html -CVE-2020-8201 - https://hackerone.com/reports/922597 -CVE-2020-8202 - https://hackerone.com/reports/840598 -CVE-2020-8203 - https://hackerone.com/reports/712065 -CVE-2020-8203 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8203 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-8204 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8205 - https://hackerone.com/reports/891270 -CVE-2020-8206 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8214 - https://hackerone.com/reports/355501 -CVE-2020-8215 - https://hackerone.com/reports/315037 -CVE-2020-8216 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8217 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8218 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8218 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/ -CVE-2020-8219 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8220 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8221 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8222 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 -CVE-2020-8223 - https://hackerone.com/reports/889243 -CVE-2020-8224 - https://hackerone.com/reports/622170 -CVE-2020-8225 - https://hackerone.com/reports/685990 -CVE-2020-8227 - https://hackerone.com/reports/590319 -CVE-2020-8228 - https://hackerone.com/reports/922470 -CVE-2020-8229 - https://hackerone.com/reports/588562 -CVE-2020-8230 - https://hackerone.com/reports/380102 -CVE-2020-8231 - https://hackerone.com/reports/948876 -CVE-2020-8231 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8235 - https://hackerone.com/reports/916704 -CVE-2020-8236 - https://hackerone.com/reports/924393 -CVE-2020-8237 - https://hackerone.com/reports/916430 -CVE-2020-8238 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588 -CVE-2020-8238 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/ -CVE-2020-8239 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8240 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8241 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8244 - https://hackerone.com/reports/966347 -CVE-2020-8248 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8249 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8250 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8251 - https://hackerone.com/reports/868834 -CVE-2020-8252 - https://hackerone.com/reports/965914 -CVE-2020-8254 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8255 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8256 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588 -CVE-2020-8256 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/ -CVE-2020-8259 - https://hackerone.com/reports/732431 -CVE-2020-8260 - http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html -CVE-2020-8260 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8261 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8262 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8263 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8265 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-8268 - https://hackerone.com/reports/980649 -CVE-2020-8276 - https://hackerone.com/reports/1024668 -CVE-2020-8277 - https://hackerone.com/reports/1033107 -CVE-2020-8277 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8277 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-8278 - https://hackerone.com/reports/921717 -CVE-2020-8279 - https://hackerone.com/reports/915585 -CVE-2020-8284 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8284 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-8284 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8284 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-8285 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8285 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-8285 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8285 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-8286 - https://hackerone.com/reports/1048457 -CVE-2020-8286 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8286 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-8286 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8287 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-8289 - https://github.com/geffner/CVE-2020-8289/blob/master/README.md -CVE-2020-8289 - https://youtu.be/W0THXbcX5V8 -CVE-2020-8290 - https://github.com/geffner/CVE-2020-8290/blob/master/README.md -CVE-2020-8290 - https://youtu.be/OpC6neWd2aM -CVE-2020-8298 - https://github.com/pillys/fs-path/pull/6 -CVE-2020-8416 - http://packetstormsecurity.com/files/156170/BearFTP-0.1.0-Denial-Of-Service.html -CVE-2020-8416 - https://pastebin.com/wqNWnCuN -CVE-2020-8417 - https://wpvulndb.com/vulnerabilities/10050 -CVE-2020-8423 - https://ktln2.org/2020/03/29/exploiting-mips-router/ -CVE-2020-8424 - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html -CVE-2020-8424 - https://github.com/J3rryBl4nks/CUPSEasyExploits -CVE-2020-8425 - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html -CVE-2020-8425 - https://github.com/J3rryBl4nks/CUPSEasyExploits -CVE-2020-8426 - https://wpvulndb.com/vulnerabilities/10051 -CVE-2020-8428 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html -CVE-2020-8434 - https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80 -CVE-2020-8439 - http://uploadboy.me/cn40ne6p89t6/POC.mp4.html -CVE-2020-8440 - https://github.com/niteosoft/simplejobscript/issues/10 -CVE-2020-8461 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -CVE-2020-8462 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -CVE-2020-8463 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -CVE-2020-8464 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -CVE-2020-8465 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -CVE-2020-8466 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -CVE-2020-8492 - https://github.com/python/cpython/pull/18284 -CVE-2020-8493 - http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html -CVE-2020-8495 - http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html -CVE-2020-8498 - https://wpvulndb.com/vulnerabilities/10053 -CVE-2020-8504 - https://github.com/J3rryBl4nks/SchoolERPCSRF -CVE-2020-8505 - https://github.com/J3rryBl4nks/SchoolERPCSRF -CVE-2020-8506 - http://packetstormsecurity.com/files/156425/Global-TV-Unencrypted-Analytics.html -CVE-2020-8507 - http://packetstormsecurity.com/files/156426/Citytv-Video-Unencrypted-Analytics.html -CVE-2020-8512 - http://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html -CVE-2020-8512 - https://cxsecurity.com/issue/WLB-2020010205 -CVE-2020-8512 - https://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html -CVE-2020-8515 - http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html -CVE-2020-8515 - https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html -CVE-2020-8518 - http://packetstormsecurity.com/files/156872/Horde-5.2.22-CSV-Import-Code-Execution.html -CVE-2020-8541 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -CVE-2020-8542 - http://packetstormsecurity.com/files/158932/OX-App-Suite-OX-Documents-XSS-SSRF-Bypass.html -CVE-2020-8542 - http://seclists.org/fulldisclosure/2020/Aug/14 -CVE-2020-8542 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -CVE-2020-8543 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -CVE-2020-8544 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -CVE-2020-8547 - https://www.exploit-db.com/exploits/47989 -CVE-2020-8549 - http://packetstormsecurity.com/files/156369/WordPress-Strong-Testimonials-2.40.1-Cross-Site-Scripting.html -CVE-2020-8549 - https://wpvulndb.com/vulnerabilities/10056 -CVE-2020-8551 - https://hackerone.com/reports/774896 -CVE-2020-8553 - https://hackerone.com/reports/778803 -CVE-2020-8554 - https://github.com/kubernetes/kubernetes/issues/97076 -CVE-2020-8554 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8554 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8554 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-8555 - https://hackerone.com/reports/776017 -CVE-2020-8557 - https://hackerone.com/reports/867699 -CVE-2020-8559 - https://github.com/kubernetes/kubernetes/issues/92914 -CVE-2020-8559 - https://hackerone.com/reports/863979 -CVE-2020-8563 - https://hackerone.com/reports/966383 -CVE-2020-8565 - https://hackerone.com/reports/952771 -CVE-2020-8568 - https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378 -CVE-2020-8569 - https://hackerone.com/reports/1032086 -CVE-2020-8594 - https://wpvulndb.com/vulnerabilities/10070 -CVE-2020-8595 - https://github.com/istio/istio/commits/master -CVE-2020-8596 - https://blog.impenetrable.tech/cve-2020-8596 -CVE-2020-8596 - https://wpvulndb.com/vulnerabilities/10068 -CVE-2020-8597 - http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html -CVE-2020-8597 - http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html -CVE-2020-8597 - https://www.kb.cert.org/vuls/id/782301 -CVE-2020-8604 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html -CVE-2020-8604 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html -CVE-2020-8605 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html -CVE-2020-8605 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html -CVE-2020-8606 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html -CVE-2020-8606 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html -CVE-2020-8615 - http://packetstormsecurity.com/files/156585/WordPress-Tutor-LMS-1.5.3-Cross-Site-Request-Forgery.html -CVE-2020-8615 - https://wpvulndb.com/vulnerabilities/10058 -CVE-2020-8617 - http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html -CVE-2020-8622 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-8631 - https://github.com/canonical/cloud-init/pull/204 -CVE-2020-8636 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 -CVE-2020-8639 - http://packetstormsecurity.com/files/161401/TestLink-1.9.20-Shell-Upload.html -CVE-2020-8641 - https://www.exploit-db.com/exploits/47985 -CVE-2020-8644 - http://packetstormsecurity.com/files/157106/PlaySMS-index.php-Unauthenticated-Template-Injection-Code-Execution.html -CVE-2020-8644 - https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/ -CVE-2020-8645 - https://github.com/niteosoft/simplejobscript/issues/9 -CVE-2020-8648 - https://usn.ubuntu.com/4342-1/ -CVE-2020-8654 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html -CVE-2020-8654 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html -CVE-2020-8655 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html -CVE-2020-8655 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html -CVE-2020-8656 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html -CVE-2020-8656 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html -CVE-2020-8657 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html -CVE-2020-8658 - https://github.com/V1n1v131r4/Exploiting-WP-Htaccess-by-BestWebSoft-Plugin/blob/master/README.md -CVE-2020-8658 - https://wpvulndb.com/vulnerabilities/10060 -CVE-2020-8674 - https://support.lenovo.com/de/en/product_security/len-30041 -CVE-2020-8674 - https://www.kb.cert.org/vuls/id/257161 -CVE-2020-8679 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-8680 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-8681 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-8682 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-8683 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html -CVE-2020-8771 - https://wpvulndb.com/vulnerabilities/10010 -CVE-2020-8772 - https://wpvulndb.com/vulnerabilities/10011 -CVE-2020-8776 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html -CVE-2020-8777 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html -CVE-2020-8778 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html -CVE-2020-8789 - http://packetstormsecurity.com/files/157787/Composr-CMS-10.0.30-Cross-Site-Scripting.html -CVE-2020-8789 - http://seclists.org/fulldisclosure/2020/May/39 -CVE-2020-8793 - http://seclists.org/fulldisclosure/2020/Feb/28 -CVE-2020-8793 - http://www.openwall.com/lists/oss-security/2020/02/24/4 -CVE-2020-8794 - http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html -CVE-2020-8794 - http://www.openwall.com/lists/oss-security/2021/05/04/7 -CVE-2020-8799 - https://wpvulndb.com/vulnerabilities/10210 -CVE-2020-8800 - http://packetstormsecurity.com/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html -CVE-2020-8801 - http://packetstormsecurity.com/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html -CVE-2020-8802 - http://packetstormsecurity.com/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html -CVE-2020-8803 - http://packetstormsecurity.com/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html -CVE-2020-8804 - http://packetstormsecurity.com/files/156331/SuiteCRM-7.11.10-SQL-Injection.html -CVE-2020-8808 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-001.md -CVE-2020-8812 - https://github.com/bludit/bludit/issues/1132 -CVE-2020-8813 - http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html -CVE-2020-8813 - http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html -CVE-2020-8813 - http://packetstormsecurity.com/files/156593/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html -CVE-2020-8813 - http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html -CVE-2020-8813 - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ -CVE-2020-8816 - http://packetstormsecurity.com/files/157861/Pi-Hole-4.3.2-DHCP-MAC-OS-Command-Execution.html -CVE-2020-8816 - http://packetstormsecurity.com/files/158737/Pi-hole-4.3.2-Remote-Code-Execution.html -CVE-2020-8818 - http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html -CVE-2020-8818 - https://github.com/cardgate/magento2/issues/54 -CVE-2020-8819 - http://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html -CVE-2020-8819 - https://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442 -CVE-2020-8819 - https://github.com/cardgate/woocommerce/issues/18 -CVE-2020-8819 - https://wpvulndb.com/vulnerabilities/10097 -CVE-2020-8819 - https://www.exploit-db.com/exploits/48134 -CVE-2020-8822 - https://sku11army.blogspot.com/2020/02/digi-transport-stored-xss-on-wr-family.html -CVE-2020-8823 - https://snyk.io/vuln/SNYK-JS-SOCKJS-548397 -CVE-2020-8824 - https://gist.github.com/9thplayer/df042fe48c314dbc1afad80ffed8387d -CVE-2020-8825 - http://packetstormsecurity.com/files/156281/Vanilla-Forum-2.6.3-Cross-Site-Scripting.html -CVE-2020-8825 - https://github.com/hacky1997/CVE-2020-8825 -CVE-2020-8826 - https://www.soluble.ai/blog/argo-cves-2020 -CVE-2020-8827 - https://www.soluble.ai/blog/argo-cves-2020 -CVE-2020-8828 - https://www.soluble.ai/blog/argo-cves-2020 -CVE-2020-8832 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840 -CVE-2020-8833 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1862933 -CVE-2020-8835 - http://www.openwall.com/lists/oss-security/2021/07/20/1 -CVE-2020-8835 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2d67fec0b43edce8c416101cdc52e71145b5fef -CVE-2020-8838 - http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html -CVE-2020-8838 - http://seclists.org/fulldisclosure/2020/May/29 -CVE-2020-8839 - http://packetstormsecurity.com/files/156289/CHIYU-BF430-TCP-IP-Converter-Cross-Site-Scripting.html -CVE-2020-8839 - https://drive.google.com/open?id=1eDN0rsGPs4-yxeMxl7MGh__yjdbl-wON -CVE-2020-8840 - https://www.oracle.com/security-alerts/cpuapr2020.html -CVE-2020-8840 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-8843 - https://github.com/istio/istio/commits/master -CVE-2020-8860 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-8867 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf -CVE-2020-8887 - https://github.com/google/security-research/security/advisories/GHSA-g69r-8jwh-2462 -CVE-2020-8893 - https://zigrin.com/advisories/misp-bruteforce-protection-not-working-in-very-specific-environments/ -CVE-2020-8893 - https://zigrin.com/advisories/misp-reflected-xss-in-galaxy-view/ -CVE-2020-8899 - http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html -CVE-2020-8899 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2020-8899 - https://www.kb.cert.org/vuls/id/366027 -CVE-2020-8903 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 -CVE-2020-8907 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 -CVE-2020-8908 - https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415 -CVE-2020-8908 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-8908 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-8911 - https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9 -CVE-2020-8912 - https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw -CVE-2020-8913 - https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ -CVE-2020-8916 - https://github.com/openthread/wpantund/pull/468/commits/0e5d1601febb869f583e944785e5685c6c747be7 -CVE-2020-8933 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 -CVE-2020-8946 - https://sku11army.blogspot.com/2020/02/netis-authenticated-rce-on-wf2471.html -CVE-2020-8947 - http://packetstormsecurity.com/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html -CVE-2020-8948 - https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2020-002-cve-2020-8948/#sthash.ByZB8ifG.dpbs -CVE-2020-8950 - https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html -CVE-2020-8950 - https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html -CVE-2020-8956 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 -CVE-2020-8958 - https://github.com/qurbat/gpon -CVE-2020-8958 - https://www.karansaini.com/os-command-injection-v-sol/ -CVE-2020-8959 - https://www.westerndigital.com/support/productsecurity/wdc-20001-ssd-dashboard-setup-privilege-escalation -CVE-2020-8960 - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-site-version-2-2-0-134 -CVE-2020-8960 - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-xss-vulnerability -CVE-2020-8963 - https://sku11army.blogspot.com/2020/02/timetools-sr-sc-series-network-time.html -CVE-2020-8964 - https://sku11army.blogspot.com/2020/02/timetools-sr-sc-series-network-time.html -CVE-2020-8990 - https://www.westerndigital.com/support/productsecurity/wdc-19013-my-cloud-home-and-ibi-session-invalidation-vulnerability -CVE-2020-8992 - https://usn.ubuntu.com/4342-1/ -CVE-2020-8992 - https://usn.ubuntu.com/4419-1/ -CVE-2020-8994 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-8994.md -CVE-2020-8994 - https://youtu.be/yCadG38yZW8 -CVE-2020-8995 - http://seclists.org/fulldisclosure/2020/Dec/38 -CVE-2020-8995 - https://packetstormsecurity.com/files/160626/Programi-Bilanc-Build-007-Release-014-31.01.2020-Hardcoded-Credentials.html -CVE-2020-9000 - https://websec.nl/blog/ -CVE-2020-9000 - https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/ -CVE-2020-9002 - https://websec.nl/blog/ -CVE-2020-9002 - https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/ -CVE-2020-9003 - https://wpvulndb.com/vulnerabilities/10077 -CVE-2020-9006 - https://wpvulndb.com/vulnerabilities/10073 -CVE-2020-9006 - https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/ -CVE-2020-9013 - https://www.exploit-db.com/docs/48175 -CVE-2020-9014 - https://github.com/FULLSHADE/Kernel-exploits -CVE-2020-9014 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/EMP_NSAU.sys -CVE-2020-9015 - http://packetstormsecurity.com/files/158119/Arista-Restricted-Shell-Escape-Privilege-Escalation.html -CVE-2020-9015 - https://securitybytes.me -CVE-2020-9015 - https://securitybytes.me/posts/cve-2020-9015/ -CVE-2020-9016 - https://code610.blogspot.com/2020/02/this-time-i-tried-to-check-one-of.html -CVE-2020-9019 - https://wpvulndb.com/vulnerabilities/10113 -CVE-2020-9021 - https://sku11army.blogspot.com/2020/01/post-oak-traffic-systems-awam-bluetooth.html -CVE-2020-9023 - https://sku11army.blogspot.com/2020/01/iteris-vantage-velocity-field-unit-no.html -CVE-2020-9026 - https://sku11army.blogspot.com/2020/01/eltex-devices-ntp-rg-1402g-ntp-2-os.html -CVE-2020-9027 - https://sku11army.blogspot.com/2020/01/eltex-devices-ntp-rg-1402g-ntp-2-os.html -CVE-2020-9029 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html -CVE-2020-9030 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html -CVE-2020-9031 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html -CVE-2020-9032 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html -CVE-2020-9033 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html -CVE-2020-9036 - https://sysdream.com/news/lab/2020-08-05-cve-2020-9036-jeedom-xss-leading-to-remote-code-execution/ -CVE-2020-9038 - http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html -CVE-2020-9038 - https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc -CVE-2020-9038 - https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20 -CVE-2020-9043 - https://wpvulndb.com/vulnerabilities/10074 -CVE-2020-9054 - https://kb.cert.org/artifacts/cve-2020-9054.html -CVE-2020-9054 - https://kb.cert.org/vuls/id/498544/ -CVE-2020-9054 - https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/ -CVE-2020-9055 - https://kb.cert.org/vuls/id/962085/ -CVE-2020-9056 - https://kb.cert.org/vuls/id/660597/ -CVE-2020-9057 - https://github.com/CNK2100/VFuzz-public -CVE-2020-9058 - https://github.com/CNK2100/VFuzz-public -CVE-2020-9059 - https://github.com/CNK2100/VFuzz-public -CVE-2020-9060 - https://github.com/CNK2100/VFuzz-public -CVE-2020-9061 - https://github.com/CNK2100/VFuzz-public -CVE-2020-9206 - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-resourcemanagement-en -CVE-2020-9264 - https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html -CVE-2020-9265 - https://github.com/J3rryBl4nks/PHPMyChatPlus/blob/master/SQLi.md -CVE-2020-9266 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/AdminPasswordChangeCSRF.md -CVE-2020-9267 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/AddUserCSRF.md -CVE-2020-9269 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/InjectionIcalShell.md -CVE-2020-9270 - https://github.com/J3rryBl4nks/IceHRM/blob/master/ChangeUserPasswordCSRF.md -CVE-2020-9271 - https://github.com/J3rryBl4nks/IceHRM/blob/master/AddNewUserCSRF.md -CVE-2020-9273 - https://github.com/proftpd/proftpd/issues/903 -CVE-2020-9275 - https://raelize.com/advisories/CVE-2020-9275_D-Link-DSL-2640B_Remote-Credentials-Exfiltration_v1.0.txt -CVE-2020-9277 - https://raelize.com/advisories/CVE-2020-9277_D-Link-DSL-2640B_CGI-Authentication-bypass_v1.0.txt -CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-9281 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9281 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-9283 - http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html -CVE-2020-9287 - https://fortiguard.com/psirt/FG-IR-19-060 -CVE-2020-9288 - https://fortiguard.com/advisory/FG-IR-20-016 -CVE-2020-9290 - https://fortiguard.com/psirt/FG-IR-19-060 -CVE-2020-9291 - https://fortiguard.com/psirt/FG-IR-20-040 -CVE-2020-9292 - https://fortiguard.com/advisory/FG-IR-20-021 -CVE-2020-9306 - https://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html -CVE-2020-9314 - https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf -CVE-2020-9315 - https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf -CVE-2020-9320 - http://packetstormsecurity.com/files/156472/AVIRA-Generic-Malformed-Container-Bypass.html -CVE-2020-9320 - http://seclists.org/fulldisclosure/2020/Feb/31 -CVE-2020-9320 - https://blog.zoller.lu/p/from-low-hanging-fruit-department-avira.html -CVE-2020-9327 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-9327 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9327 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-9327 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9327 - https://www.sqlite.org/cgi/src/info/4374860b29383380 -CVE-2020-9329 - https://github.com/gogs/gogs/issues/5926 -CVE-2020-9331 - https://www.youtube.com/watch?v=b5vPDmMtzwQ -CVE-2020-9332 - https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/ -CVE-2020-9334 - https://wpvulndb.com/vulnerabilities/10089 -CVE-2020-9335 - https://wpvulndb.com/vulnerabilities/10088 -CVE-2020-9339 - https://github.com/0xEmma/CVEs/blob/master/CVEs/2020-02-14-SoPlanning-Status-XSS.md -CVE-2020-9341 - https://github.com/J3rryBl4nks/CandidATS/blob/master/AddAdminUserCSRF.md -CVE-2020-9342 - http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html -CVE-2020-9342 - https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html -CVE-2020-9343 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.txt -CVE-2020-9344 - https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin -CVE-2020-9344 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt -CVE-2020-9345 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-052.txt -CVE-2020-9361 - https://www.youtube.com/watch?v=b5vPDmMtzwQ -CVE-2020-9362 - http://packetstormsecurity.com/files/156580/QuickHeal-Generic-Malformed-Archive-Bypass.html -CVE-2020-9362 - https://blog.zoller.lu/p/from-low-hanging-fruit-department_24.html -CVE-2020-9362 - https://blog.zoller.lu/p/tzo-20-2020-quickheal-malformed-archive.html -CVE-2020-9363 - https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html -CVE-2020-9363 - https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363 -CVE-2020-9364 - http://packetstormsecurity.com/files/156655/Creative-Contact-Form-4.6.2-Directory-Traversal.html -CVE-2020-9368 - https://www.intrinsec.com/publications/ -CVE-2020-9370 - https://medium.com/@rsantos_14778/hijacked-session-cve-2020-9370-255bbd02975a -CVE-2020-9371 - http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html -CVE-2020-9371 - https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 -CVE-2020-9371 - https://wpvulndb.com/vulnerabilities/10110 -CVE-2020-9372 - http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html -CVE-2020-9372 - https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 -CVE-2020-9374 - http://packetstormsecurity.com/files/156584/TP-Link-TL-WR849N-Remote-Code-Execution.html -CVE-2020-9374 - https://fireshellsecurity.team/hack-n-routers/ -CVE-2020-9374 - https://github.com/ElberTavares/routers-exploit/tree/master/tp-link -CVE-2020-9375 - http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html -CVE-2020-9375 - https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html -CVE-2020-9376 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 -CVE-2020-9377 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 -CVE-2020-9380 - https://github.com/migueltarga/CVE-2020-9380 -CVE-2020-9383 - https://usn.ubuntu.com/4342-1/ -CVE-2020-9384 - http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html -CVE-2020-9385 - https://sourceforge.net/p/zint/tickets/181/ -CVE-2020-9388 - https://support.squaredup.com/hc/en-us/articles/360017568238 -CVE-2020-9388 - https://support.squaredup.com/hc/en-us/articles/360019427218-CVE-2020-9388-API-Endpoints-are-not-protected-against-CSRF -CVE-2020-9389 - https://support.squaredup.com/hc/en-us/articles/360017255858 -CVE-2020-9389 - https://support.squaredup.com/hc/en-us/articles/360019427238-CVE-2020-9389-Username-enumeration-possible-via-a-timing-attack -CVE-2020-9390 - https://support.squaredup.com/hc/en-us/articles/360017568258 -CVE-2020-9390 - https://support.squaredup.com/hc/en-us/articles/360019427258-CVE-2020-9390-Stored-cross-site-scripting -CVE-2020-9391 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a -CVE-2020-9392 - https://www.wordfence.com/blog/2020/02/multiple-vulnerabilities-patched-in-pricing-table-by-supsystic-plugin/ -CVE-2020-9399 - https://blog.zoller.lu/p/tzo-23-2020-avast-generic-archive.html -CVE-2020-9409 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9410 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9423 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities -CVE-2020-9426 - http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html -CVE-2020-9427 - http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html -CVE-2020-9435 - http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html -CVE-2020-9435 - http://seclists.org/fulldisclosure/2020/Mar/15 -CVE-2020-9435 - https://cert.vde.com/en-us/advisories/ -CVE-2020-9435 - https://cert.vde.com/en-us/advisories/vde-2020-003 -CVE-2020-9436 - http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html -CVE-2020-9436 - http://seclists.org/fulldisclosure/2020/Mar/15 -CVE-2020-9436 - https://cert.vde.com/en-us/advisories/ -CVE-2020-9436 - https://cert.vde.com/en-us/advisories/vde-2020-003 -CVE-2020-9437 - https://know.bishopfox.com/advisories -CVE-2020-9437 - https://labs.bishopfox.com/advisories/secureauth-version-9.3 -CVE-2020-9438 - https://medium.com/@avishek_75733/smart-products-are-always-not-that-smart-tinxy-smart-door-lock-vulnerability-97f91e435e06 -CVE-2020-9447 - https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality -CVE-2020-9450 - https://www.acronis.com -CVE-2020-9451 - https://www.acronis.com -CVE-2020-9452 - https://www.acronis.com -CVE-2020-9453 - https://github.com/FULLSHADE/Kernel-exploits -CVE-2020-9453 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/EMP_MPAU.sys -CVE-2020-9454 - https://wpvulndb.com/vulnerabilities/10116 -CVE-2020-9455 - https://wpvulndb.com/vulnerabilities/10116 -CVE-2020-9456 - https://wpvulndb.com/vulnerabilities/10116 -CVE-2020-9457 - https://wpvulndb.com/vulnerabilities/10116 -CVE-2020-9458 - https://wpvulndb.com/vulnerabilities/10116 -CVE-2020-9459 - https://wpvulndb.com/vulnerabilities/10100 -CVE-2020-9461 - https://guilhermerubert.com/blog/cve-2020-9460/ -CVE-2020-9463 - https://code610.blogspot.com/2020/02/postauth-rce-in-centreon-1910.html -CVE-2020-9464 - https://cert.vde.com/en-us/advisories/vde-2020-005 -CVE-2020-9466 - https://wpvulndb.com/vulnerabilities/10094 -CVE-2020-9467 - http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html -CVE-2020-9476 - https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9476-494a08298c6b -CVE-2020-9477 - https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9477-29d0ca48d4fa -CVE-2020-9480 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-9484 - http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html -CVE-2020-9484 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 -CVE-2020-9484 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2020-9488 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9488 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-9489 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2020-9489 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2020-9489 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9490 - http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html -CVE-2020-9490 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9490 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9492 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2020-9496 - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html -CVE-2020-9496 - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html -CVE-2020-9496 - http://packetstormsecurity.com/files/163730/Apache-OfBiz-17.12.01-Remote-Command-Execution.html -CVE-2020-9497 - https://research.checkpoint.com/2020/apache-guacamole-rce/ -CVE-2020-9498 - https://research.checkpoint.com/2020/apache-guacamole-rce/ -CVE-2020-9520 - http://seclists.org/fulldisclosure/2020/Mar/50 -CVE-2020-9546 - https://github.com/FasterXML/jackson-databind/issues/2631 -CVE-2020-9546 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-9546 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9546 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-9546 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9546 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-9547 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-9547 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9547 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-9547 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9547 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-9548 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 -CVE-2020-9548 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2020-9548 - https://www.oracle.com/security-alerts/cpujul2020.html -CVE-2020-9548 - https://www.oracle.com/security-alerts/cpuoct2020.html -CVE-2020-9548 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2020-9549 - https://github.com/enferex/pdfresurrect/issues/8 -CVE-2020-9756 - https://www.coresecurity.com/advisories/viper-rgb-driver-multiple-vulnerabilities -CVE-2020-9876 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9906 - http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html -CVE-2020-9948 - http://seclists.org/fulldisclosure/2020/Nov/18 -CVE-2020-9951 - http://seclists.org/fulldisclosure/2020/Nov/18 -CVE-2020-9951 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9952 - http://seclists.org/fulldisclosure/2020/Nov/18 -CVE-2020-9952 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9961 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9967 - http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html -CVE-2020-9968 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9973 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1104 -CVE-2020-9976 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9979 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2020-9983 - http://seclists.org/fulldisclosure/2020/Nov/18 -CVE-2020-9983 - http://seclists.org/fulldisclosure/2020/Nov/19 -CVE-2021-0146 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html -CVE-2021-0252 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gr7j-26pv-5v57 -CVE-2021-0253 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr -CVE-2021-0278 - https://kb.juniper.net/JSA11182 -CVE-2021-0430 - http://packetstormsecurity.com/files/162380/Android-NFC-Stack-Out-Of-Bounds-Write.html -CVE-2021-0870 - http://packetstormsecurity.com/files/164704/Android-NFC-Type-Confusion.html -CVE-2021-1050 - http://packetstormsecurity.com/files/175260/PowerVR-Out-Of-Bounds-Access-Information-Leak.html -CVE-2021-1051 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1052 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1053 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1054 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1055 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1056 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1057 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1058 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1059 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1060 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1061 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1062 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1063 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1064 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1065 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1066 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 -CVE-2021-1067 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148 -CVE-2021-1068 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148 -CVE-2021-1069 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148 -CVE-2021-1089 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1090 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1091 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1092 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1093 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1094 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1095 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1096 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1097 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1098 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1099 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1100 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1101 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1102 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1103 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 -CVE-2021-1167 - http://packetstormsecurity.com/files/160953/Cisco-RV110W-1.2.1.7-Denial-Of-Service.html -CVE-2021-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 -CVE-2021-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 -CVE-2021-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 -CVE-2021-1258 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-fileread-PbHbgHMj -CVE-2021-1382 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 -CVE-2021-1383 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r -CVE-2021-1384 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232 -CVE-2021-1385 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hhfw-6cm2-v3w5 -CVE-2021-1450 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-55AYyxYr -CVE-2021-1472 - http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html -CVE-2021-1473 - http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html -CVE-2021-1497 - http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html -CVE-2021-1498 - http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html -CVE-2021-1499 - http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html -CVE-2021-1519 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-AggMUCDg -CVE-2021-1531 - http://packetstormsecurity.com/files/163265/Cisco-Modeling-Labs-2.1.1-b19-Remote-Command-Execution.html -CVE-2021-1585 - https://github.com/jbaines-r7/staystaystay -CVE-2021-1616 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q -CVE-2021-1629 - http://packetstormsecurity.com/files/162138/Tableau-Server-Open-Redirection.html -CVE-2021-1629 - http://seclists.org/fulldisclosure/2021/Apr/22 -CVE-2021-1645 - http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html -CVE-2021-1645 - http://seclists.org/fulldisclosure/2021/Mar/33 -CVE-2021-1675 - http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html -CVE-2021-1675 - http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html -CVE-2021-1675 - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html -CVE-2021-1732 - http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html -CVE-2021-1732 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html -CVE-2021-1810 - http://packetstormsecurity.com/files/164375/Gatekeeper-Bypass-Proof-Of-Concept.html -CVE-2021-1886 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1887 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1888 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1889 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1890 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1891 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1892 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin -CVE-2021-1894 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-1895 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1896 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1897 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1898 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1899 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1900 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2021-1901 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1903 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1904 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1905 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1906 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1907 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1909 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1910 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1912 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1913 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1914 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1915 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1916 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1917 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1918 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-1919 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1920 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1921 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1923 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1924 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1925 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1927 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin -CVE-2021-1928 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1929 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1930 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1931 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1932 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1933 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1934 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1935 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1936 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1937 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin -CVE-2021-1938 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1939 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1940 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html -CVE-2021-1940 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1941 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1942 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-1943 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1945 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1946 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1947 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1948 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1949 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1950 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-1952 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1953 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1954 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1955 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1956 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1957 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1958 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1959 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1960 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1961 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1962 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1963 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1964 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1965 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1966 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1967 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1968 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html -CVE-2021-1968 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1969 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html -CVE-2021-1969 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1970 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin -CVE-2021-1971 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1972 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1973 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1974 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-1975 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1976 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-1977 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1979 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1980 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1981 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1982 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-1983 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1984 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1985 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-1993 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-1994 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-1995 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-1996 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-1997 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-1998 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-1999 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2000 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2001 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2002 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2003 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20031 - http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html -CVE-2021-20034 - http://packetstormsecurity.com/files/164564/SonicWall-SMA-10.2.1.0-17sv-Password-Reset.html -CVE-2021-20039 - http://packetstormsecurity.com/files/165563/SonicWall-SMA-100-Series-Authenticated-Command-Injection.html -CVE-2021-2004 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2005 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2006 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20067 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20068 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20069 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-2007 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20070 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20071 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20072 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20073 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20074 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20075 - https://www.tenable.com/security/research/tra-2021-04 -CVE-2021-20076 - https://www.tenable.com/security/tns-2021-03 -CVE-2021-20077 - https://www.tenable.com/security/tns-2021-07 -CVE-2021-20078 - https://www.tenable.com/security/research/tra-2021-10 -CVE-2021-20079 - https://www.tenable.com/security/tns-2021-07 -CVE-2021-2008 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-20080 - https://www.tenable.com/security/research/tra-2021-11 -CVE-2021-20081 - https://www.tenable.com/security/research/tra-2021-22 -CVE-2021-20083 - http://packetstormsecurity.com/files/166299/WordPress-Core-5.9.0-5.9.1-Cross-Site-Scripting.html -CVE-2021-20083 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md -CVE-2021-20084 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-sparkle.md -CVE-2021-20085 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md -CVE-2021-20086 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md -CVE-2021-20087 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md -CVE-2021-20088 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/mootools-more.md -CVE-2021-20089 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/purl.md -CVE-2021-2009 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20090 - https://www.tenable.com/security/research/tra-2021-13 -CVE-2021-20091 - https://www.tenable.com/security/research/tra-2021-13 -CVE-2021-20092 - https://www.tenable.com/security/research/tra-2021-13 -CVE-2021-20093 - https://www.tenable.com/security/research/tra-2021-24 -CVE-2021-20094 - https://www.tenable.com/security/research/tra-2021-24 -CVE-2021-20096 - https://www.tenable.com/security/research/tra-2021-18 -CVE-2021-2010 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20106 - https://www.tenable.com/security/tns-2021-13 -CVE-2021-20107 - https://www.tenable.com/security/research/tra-2021-26-0 -CVE-2021-2011 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2012 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20120 - https://www.tenable.com/security/research/tra-2021-45 -CVE-2021-20121 - https://www.tenable.com/security/research/tra-2021-41 -CVE-2021-20122 - https://www.tenable.com/security/research/tra-2021-41 -CVE-2021-20123 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-20124 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-20125 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-20126 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-20127 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-20128 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-20129 - https://www.tenable.com/security/research/tra-2021-42 -CVE-2021-2013 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20132 - https://www.tenable.com/security/research/tra-2021-44 -CVE-2021-20133 - https://www.tenable.com/security/research/tra-2021-44 -CVE-2021-20134 - https://www.tenable.com/security/research/tra-2021-44 -CVE-2021-20136 - https://www.tenable.com/security/research/tra-2021-48 -CVE-2021-20137 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20138 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20139 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-2014 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20140 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20141 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20142 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20143 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20144 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20145 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20146 - https://www.tenable.com/security/research/tra-2021-51 -CVE-2021-20149 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-2015 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20150 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20151 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20152 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20153 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20154 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20155 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20156 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20157 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20158 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20159 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-2016 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20160 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20161 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20162 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20163 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20164 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20165 - https://www.tenable.com/security/research/tra-2021-54 -CVE-2021-20166 - https://www.tenable.com/security/research/tra-2021-55 -CVE-2021-20167 - https://www.tenable.com/security/research/tra-2021-55 -CVE-2021-20168 - https://www.tenable.com/security/research/tra-2021-55 -CVE-2021-20169 - https://www.tenable.com/security/research/tra-2021-55 -CVE-2021-2017 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20170 - https://www.tenable.com/security/research/tra-2021-55 -CVE-2021-20171 - https://www.tenable.com/security/research/tra-2021-55 -CVE-2021-2018 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2019 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20190 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-20193 - https://bugzilla.redhat.com/show_bug.cgi?id=1917565 -CVE-2021-20193 - https://savannah.gnu.org/bugs/?59897 -CVE-2021-2020 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2021 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2022 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20227 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-20227 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-20227 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2023 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2024 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2025 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2026 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20261 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a -CVE-2021-20265 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa0dc04df259ba2df3ce1920e9690c7842f8fa4b -CVE-2021-20265 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2027 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20270 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2028 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20280 - http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html -CVE-2021-20285 - https://github.com/upx/upx/issues/421 -CVE-2021-20289 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2029 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2030 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20304 - https://github.com/AcademySoftwareFoundation/openexr/pull/849 -CVE-2021-20308 - https://github.com/michaelrsweet/htmldoc/issues/423 -CVE-2021-2031 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20316 - https://www.samba.org/samba/security/CVE-2021-20316.html -CVE-2021-2032 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810 -CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1 -CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e -CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43 -CVE-2021-20322 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-2033 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2034 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20340 - https://www.ibm.com/support/pages/node/6417585 -CVE-2021-2035 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20350 - https://www.ibm.com/support/pages/node/6417585 -CVE-2021-20351 - https://www.ibm.com/support/pages/node/6417585 -CVE-2021-2036 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20365 - https://www.ibm.com/support/pages/node/6471345 -CVE-2021-2038 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2039 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2040 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2041 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2042 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2043 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2044 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2045 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2046 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2047 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2048 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2049 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2050 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2051 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2052 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2053 - https://blog.stmcyber.com/vulns/cve-2021-2053/ -CVE-2021-2053 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2054 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2055 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2056 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20562 - http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html -CVE-2021-20562 - http://seclists.org/fulldisclosure/2021/Nov/16 -CVE-2021-2057 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2058 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2059 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2060 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2061 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2062 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2063 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2064 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2065 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20654 - https://jvn.jp/en/jp/JVN80785288/ -CVE-2021-20654 - https://wekan.github.io/hall-of-fame/fieldbleed/ -CVE-2021-20656 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-20657 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-20658 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-20659 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-2066 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20660 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-20661 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-20662 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf -CVE-2021-2067 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2068 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2069 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2070 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20700 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20701 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20702 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20703 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20704 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20705 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20706 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-20707 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html -CVE-2021-2071 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20718 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-2072 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2073 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2074 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2075 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2076 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2077 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2078 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2079 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2080 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2081 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2082 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2083 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20834 - https://play.google.com/store/apps/details?id=com.nike.omega -CVE-2021-20837 - http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html -CVE-2021-20837 - http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html -CVE-2021-20837 - https://jvn.jp/en/jp/JVN41119755/index.html -CVE-2021-2084 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2085 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2086 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2087 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20873 - https://support.yappli.co.jp/hc/ja/articles/4410249902745 -CVE-2021-2088 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2089 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2090 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2091 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2092 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2093 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2094 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2096 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2097 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2098 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20986 - https://cert.vde.com/en-us/advisories/vde-2021-006 -CVE-2021-20987 - https://cert.vde.com/en-us/advisories/vde-2021-007 -CVE-2021-20989 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html -CVE-2021-20989 - http://seclists.org/fulldisclosure/2021/Apr/27 -CVE-2021-20989 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ -CVE-2021-2099 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-20990 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html -CVE-2021-20990 - http://seclists.org/fulldisclosure/2021/Apr/27 -CVE-2021-20990 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ -CVE-2021-20991 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html -CVE-2021-20991 - http://seclists.org/fulldisclosure/2021/Apr/27 -CVE-2021-20991 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ -CVE-2021-20992 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html -CVE-2021-20992 - http://seclists.org/fulldisclosure/2021/Apr/27 -CVE-2021-20992 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ -CVE-2021-20993 - https://cert.vde.com/en-us/advisories/vde-2021-013 -CVE-2021-20994 - https://cert.vde.com/en-us/advisories/vde-2021-013 -CVE-2021-20995 - https://cert.vde.com/en-us/advisories/vde-2021-013 -CVE-2021-20996 - https://cert.vde.com/en-us/advisories/vde-2021-013 -CVE-2021-20997 - https://cert.vde.com/en-us/advisories/vde-2021-013 -CVE-2021-20998 - https://cert.vde.com/en-us/advisories/vde-2021-013 -CVE-2021-20999 - https://cert.vde.com/en-us/advisories/vde-2021-016 -CVE-2021-2100 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21000 - https://cert.vde.com/en-us/advisories/vde-2021-014 -CVE-2021-21001 - https://cert.vde.com/en-us/advisories/vde-2021-014 -CVE-2021-21002 - https://cert.vde.com/en-us/advisories/vde-2021-022 -CVE-2021-21003 - https://cert.vde.com/en-us/advisories/vde-2021-023 -CVE-2021-21004 - https://cert.vde.com/en-us/advisories/vde-2021-023 -CVE-2021-21005 - https://cert.vde.com/en-us/advisories/vde-2021-023 -CVE-2021-2101 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2102 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2103 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2104 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2105 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2106 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2107 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2108 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2109 - http://packetstormsecurity.com/files/161053/Oracle-WebLogic-Server-14.1.1.0-Remote-Code-Execution.html -CVE-2021-2109 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2110 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2111 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2112 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2113 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2114 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21148 - http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html -CVE-2021-2115 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21156 - http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html -CVE-2021-2116 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21160 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235 -CVE-2021-2117 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2118 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2119 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21198 - http://packetstormsecurity.com/files/162973/Chrome-Legacy-ipc-Message-Passed-Via-Shared-Memory.html -CVE-2021-2120 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2121 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2122 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21220 - http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html -CVE-2021-21220 - http://packetstormsecurity.com/files/176210/Chrome-V8-JIT-XOR-Arbitrary-Code-Execution.html -CVE-2021-2123 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2124 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21242 - https://github.com/theonedev/onedev/security/advisories/GHSA-5q3q-f373-2jv8 -CVE-2021-21243 - https://github.com/theonedev/onedev/security/advisories/GHSA-9mmq-fm8c-q4fv -CVE-2021-2125 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21259 - https://github.com/hackmdio/codimd/issues/1648 -CVE-2021-2126 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21267 - https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f -CVE-2021-21267 - https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr -CVE-2021-2127 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21275 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21275 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-21276 - http://packetstormsecurity.com/files/171743/POLR-URL-2.3.0-Shortener-Admin-Takeover.html -CVE-2021-2128 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-2129 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21290 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21293 - https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc -CVE-2021-21294 - https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc -CVE-2021-21295 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2130 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21300 - http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html -CVE-2021-21305 - https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4 -CVE-2021-21307 - http://packetstormsecurity.com/files/163864/Lucee-Administrator-imgProcess.cfm-Arbitrary-File-Write.html -CVE-2021-21307 - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md -CVE-2021-2131 - https://www.oracle.com/security-alerts/cpujan2021.html -CVE-2021-21310 - https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q -CVE-2021-21322 - https://www.npmjs.com/package/fastify-http-proxy -CVE-2021-21327 - http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html -CVE-2021-21337 - http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html -CVE-2021-2134 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21341 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21341 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21341 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21342 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21342 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21342 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21343 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21343 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21343 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21344 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21344 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21344 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21345 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21345 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-21345 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21345 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21346 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21346 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21346 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21347 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21347 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21347 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21348 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21348 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21348 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21349 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21349 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21349 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2135 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21350 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21350 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21350 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21351 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21351 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21351 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21353 - https://github.com/pugjs/pug/issues/3312 -CVE-2021-21354 - https://bugzilla.mozilla.org/show_bug.cgi?id=1694684 -CVE-2021-21354 - https://github.com/mozilla/PollBot/pull/333 -CVE-2021-2136 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2137 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21372 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ -CVE-2021-21373 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ -CVE-2021-21374 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ -CVE-2021-21382 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0732 -CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-engine -CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-font -CVE-2021-2140 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21405 - https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754 -CVE-2021-21405 - https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh -CVE-2021-21409 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-21409 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21409 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2141 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21411 - https://docs.gitlab.com/ee/user/group/ -CVE-2021-2142 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21425 - http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html -CVE-2021-21425 - http://packetstormsecurity.com/files/162457/GravCMS-1.10.7-Remote-Command-Execution.html -CVE-2021-21425 - https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/ -CVE-2021-21430 - https://github.com/OpenAPITools/openapi-generator/pull/8791 -CVE-2021-21431 - https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m -CVE-2021-2144 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2145 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2146 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21465 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2021-21465 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2021-21466 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2021-21466 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2021-21468 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2021-21468 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2021-2147 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21473 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2021-21473 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2021-21480 - http://packetstormsecurity.com/files/163164/SAP-XMII-Remote-Code-Execution.html -CVE-2021-21480 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2021-2149 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21495 - https://gist.github.com/alacerda/98853283be6009e75b7d94968d50b88e -CVE-2021-2150 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21503 - https://www.dell.com/support/kbdoc/000183717 -CVE-2021-21506 - https://www.dell.com/support/kbdoc/000183717 -CVE-2021-2151 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21513 - https://www.tenable.com/security/research/tra-2021-07 -CVE-2021-2152 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2153 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2154 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2155 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21551 - http://packetstormsecurity.com/files/162604/Dell-DBUtil_2_3.sys-IOCTL-Memory-Read-Write.html -CVE-2021-21551 - http://packetstormsecurity.com/files/162739/DELL-dbutil_2_3.sys-2.3-Arbitrary-Write-Privilege-Escalation.html -CVE-2021-2156 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21568 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-2157 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2158 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2159 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21592 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-21594 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-21595 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-21599 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-2160 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2161 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-2161 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2162 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2163 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2164 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2166 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21660 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-21660 -CVE-2021-2167 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2169 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2170 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21702 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21703 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-21703 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21704 - https://bugs.php.net/bug.php?id=76449 -CVE-2021-21704 - https://bugs.php.net/bug.php?id=76450 -CVE-2021-21705 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21707 - https://bugs.php.net/bug.php?id=79971 -CVE-2021-21708 - https://bugs.php.net/bug.php?id=81708 -CVE-2021-2171 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2172 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2173 - http://packetstormsecurity.com/files/171344/Oracle-DB-Broken-PDB-Isolation-Metadata-Exposure.html -CVE-2021-2173 - https://github.com/emad-almousa/CVE-2021-2173 -CVE-2021-2173 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2174 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2175 - http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html -CVE-2021-2175 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2177 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21772 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226 -CVE-2021-21773 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1227 -CVE-2021-21775 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229 -CVE-2021-21776 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1232 -CVE-2021-21777 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1234 -CVE-2021-21778 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1236 -CVE-2021-21779 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238 -CVE-2021-2178 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21781 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243 -CVE-2021-21781 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-21782 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1244 -CVE-2021-21783 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245 -CVE-2021-21783 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-21783 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-21784 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1248 -CVE-2021-21786 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1253 -CVE-2021-21787 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 -CVE-2021-21788 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 -CVE-2021-21789 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 -CVE-2021-2179 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21790 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 -CVE-2021-21791 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 -CVE-2021-21792 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 -CVE-2021-21793 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1257 -CVE-2021-21794 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1261 -CVE-2021-21795 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1264 -CVE-2021-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1265 -CVE-2021-21797 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 -CVE-2021-21798 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1267 -CVE-2021-21799 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1270 -CVE-2021-2180 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21800 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1271 -CVE-2021-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 -CVE-2021-21802 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 -CVE-2021-21803 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 -CVE-2021-21804 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 -CVE-2021-21805 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1274 -CVE-2021-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214 -CVE-2021-21807 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1275 -CVE-2021-21808 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1276 -CVE-2021-21809 - http://packetstormsecurity.com/files/164481/Moodle-SpellChecker-Path-Authenticated-Remote-Command-Execution.html -CVE-2021-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277 -CVE-2021-2181 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21810 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1278 -CVE-2021-21811 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1279 -CVE-2021-21812 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 -CVE-2021-21813 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 -CVE-2021-21814 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 -CVE-2021-21815 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 -CVE-2021-21816 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 -CVE-2021-21817 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1282 -CVE-2021-21818 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283 -CVE-2021-21819 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1284 -CVE-2021-2182 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21820 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1285 -CVE-2021-21821 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1286 -CVE-2021-21822 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1287 -CVE-2021-21823 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1288 -CVE-2021-21824 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1289 -CVE-2021-21825 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1290 -CVE-2021-21826 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291 -CVE-2021-21827 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291 -CVE-2021-21828 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291 -CVE-2021-21829 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1292 -CVE-2021-2183 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21830 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1293 -CVE-2021-21831 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1294 -CVE-2021-21832 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1295 -CVE-2021-21833 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1296 -CVE-2021-21834 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21835 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21836 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21837 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21837 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21838 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21838 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21839 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-2184 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21840 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21841 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21842 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21843 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21843 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21844 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21844 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21845 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21845 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21846 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21846 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21847 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21847 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21848 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21849 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-2185 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21850 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21851 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21851 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21852 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21852 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -CVE-2021-21853 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -CVE-2021-21854 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -CVE-2021-21855 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -CVE-2021-21856 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -CVE-2021-21857 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -CVE-2021-21858 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -CVE-2021-21859 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 -CVE-2021-2186 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21860 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 -CVE-2021-21861 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 -CVE-2021-21862 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 -CVE-2021-21864 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301 -CVE-2021-21865 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301 -CVE-2021-21866 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301 -CVE-2021-21867 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1304 -CVE-2021-21868 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1305 -CVE-2021-21869 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1306 -CVE-2021-2187 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21870 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1307 -CVE-2021-21871 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1308 -CVE-2021-21872 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1312 -CVE-2021-21873 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314 -CVE-2021-21874 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314 -CVE-2021-21875 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314 -CVE-2021-21876 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315 -CVE-2021-21877 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315 -CVE-2021-21878 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1322 -CVE-2021-21879 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1323 -CVE-2021-2188 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21880 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1324 -CVE-2021-21881 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1325 -CVE-2021-21882 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1326 -CVE-2021-21883 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1327 -CVE-2021-21884 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1328 -CVE-2021-21885 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1329 -CVE-2021-21886 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1330 -CVE-2021-21887 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1331 -CVE-2021-21888 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1332 -CVE-2021-21889 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1333 -CVE-2021-2189 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21890 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334 -CVE-2021-21891 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334 -CVE-2021-21892 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1335 -CVE-2021-21893 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1336 -CVE-2021-21894 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337 -CVE-2021-21895 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337 -CVE-2021-21896 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1338 -CVE-2021-21897 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1346 -CVE-2021-21898 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349 -CVE-2021-21899 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350 -CVE-2021-2190 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21900 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351 -CVE-2021-21901 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1353 -CVE-2021-21902 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1354 -CVE-2021-21903 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1355 -CVE-2021-21904 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1356 -CVE-2021-21905 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357 -CVE-2021-21906 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357 -CVE-2021-21907 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1358 -CVE-2021-21908 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359 -CVE-2021-21909 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359 -CVE-2021-2191 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21910 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 -CVE-2021-21911 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 -CVE-2021-21912 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 -CVE-2021-21913 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1361 -CVE-2021-21914 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1362 -CVE-2021-21915 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 -CVE-2021-21916 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 -CVE-2021-21917 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 -CVE-2021-21918 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 -CVE-2021-21919 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 -CVE-2021-2192 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21920 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 -CVE-2021-21921 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 -CVE-2021-21922 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 -CVE-2021-21923 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 -CVE-2021-21924 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21925 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21926 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21927 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21928 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21929 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-2193 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21930 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21931 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21932 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21933 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21934 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21935 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21936 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21937 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 -CVE-2021-21938 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1367 -CVE-2021-21939 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1368 -CVE-2021-2194 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21940 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1369 -CVE-2021-21941 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1370 -CVE-2021-21942 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1371 -CVE-2021-21943 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1373 -CVE-2021-21944 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374 -CVE-2021-21945 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374 -CVE-2021-21946 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375 -CVE-2021-21947 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375 -CVE-2021-21948 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1376 -CVE-2021-21949 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1377 -CVE-2021-2195 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21950 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378 -CVE-2021-21951 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378 -CVE-2021-21952 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1379 -CVE-2021-21953 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1380 -CVE-2021-21954 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1381 -CVE-2021-21955 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1382 -CVE-2021-21956 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1383 -CVE-2021-21957 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1384 -CVE-2021-21958 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1386 -CVE-2021-21959 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1388 -CVE-2021-2196 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21960 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389 -CVE-2021-21961 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389 -CVE-2021-21962 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1390 -CVE-2021-21963 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1391 -CVE-2021-21964 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392 -CVE-2021-21965 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392 -CVE-2021-21966 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1393 -CVE-2021-21967 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1394 -CVE-2021-21968 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395 -CVE-2021-21969 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396 -CVE-2021-2197 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21970 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396 -CVE-2021-21971 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1406 -CVE-2021-21972 - http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html -CVE-2021-21972 - http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html -CVE-2021-21972 - http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html -CVE-2021-21974 - http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html -CVE-2021-21975 - http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html -CVE-2021-21978 - http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html -CVE-2021-2198 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21983 - http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html -CVE-2021-21985 - http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html -CVE-2021-21985 - http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html -CVE-2021-21986 - http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html -CVE-2021-2199 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-21990 - https://herolab.usd.de/security-advisories/usd-2021-0008/ -CVE-2021-21991 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-21992 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-21993 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-2200 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22000 - http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html -CVE-2021-22005 - http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html -CVE-2021-22005 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22006 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22007 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22008 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22009 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-2201 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22010 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22011 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22012 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22013 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22014 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22015 - http://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html -CVE-2021-22015 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22016 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22017 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22018 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-22019 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-2202 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22020 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html -CVE-2021-2203 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2204 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22045 - http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html -CVE-2021-22045 - https://www.vmware.com/security/advisories/VMSA-2022-0001.html -CVE-2021-22048 - http://packetstormsecurity.com/files/167733/VMware-Security-Advisory-2022-0025.2.html -CVE-2021-22048 - http://packetstormsecurity.com/files/167795/VMware-Security-Advisory-2021-0025.3.html -CVE-2021-2205 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22056 - https://www.vmware.com/security/advisories/VMSA-2021-0030.html -CVE-2021-22057 - https://www.vmware.com/security/advisories/VMSA-2021-0030.html -CVE-2021-2206 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22060 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2207 - http://packetstormsecurity.com/files/174448/Oracle-RMAN-Missing-Auditing.html -CVE-2021-2207 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2208 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2209 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22096 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2210 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2211 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22112 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22112 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-22112 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22118 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22118 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22118 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22118 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-22118 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22119 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22119 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-2212 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2213 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22132 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22134 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2214 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22141 - https://www.elastic.co/community/security/ -CVE-2021-22142 - https://www.elastic.co/community/security -CVE-2021-22143 - https://www.elastic.co/community/security -CVE-2021-22144 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22145 - http://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html -CVE-2021-22145 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22146 - http://packetstormsecurity.com/files/163655/Elasticsearch-ECE-7.13.3-Database-Disclosure.html -CVE-2021-22147 - https://www.elastic.co/community/security/ -CVE-2021-22148 - https://www.elastic.co/community/security/ -CVE-2021-22149 - https://www.elastic.co/community/security/ -CVE-2021-2215 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22150 - https://www.elastic.co/community/security -CVE-2021-22151 - https://www.elastic.co/community/security -CVE-2021-2216 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2217 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22171 - https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262 -CVE-2021-22173 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-22174 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-22175 - https://gitlab.com/gitlab-org/gitlab/-/issues/294178 -CVE-2021-2218 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2219 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22191 - https://gitlab.com/wireshark/wireshark/-/issues/17232 -CVE-2021-22191 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-22195 - https://gitlab.com/gitlab-org/gitlab-vscode-extension/-/issues/325 -CVE-2021-2220 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22204 - http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html -CVE-2021-22204 - http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html -CVE-2021-22204 - http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html -CVE-2021-22204 - http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html -CVE-2021-22204 - http://www.openwall.com/lists/oss-security/2021/05/10/5 -CVE-2021-22205 - http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html -CVE-2021-22205 - http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html -CVE-2021-22207 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2221 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22213 - https://gitlab.com/gitlab-org/gitlab/-/issues/300308 -CVE-2021-22214 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22214.json -CVE-2021-2222 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22222 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22224 - https://gitlab.com/gitlab-org/gitlab/-/issues/324397 -CVE-2021-22225 - https://gitlab.com/gitlab-org/gitlab/-/issues/331051 -CVE-2021-2223 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22238 - https://gitlab.com/gitlab-org/gitlab/-/issues/332420 -CVE-2021-2224 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22241 - https://gitlab.com/gitlab-org/gitlab/-/issues/336460 -CVE-2021-22245 - https://gitlab.com/gitlab-org/gitlab/-/issues/255612 -CVE-2021-2225 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2226 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22261 - https://gitlab.com/gitlab-org/gitlab/-/issues/328389 -CVE-2021-2227 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2228 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2229 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22298 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-2230 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2231 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2232 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2233 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2234 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2235 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2236 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2237 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2238 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2239 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2240 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2241 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2242 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2244 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2244 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2245 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2246 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2247 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2248 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2249 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22492 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-22494 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-22495 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-2250 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22502 - http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html -CVE-2021-2251 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2252 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2253 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2254 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22543 - https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584 -CVE-2021-2255 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22555 - http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html -CVE-2021-22555 - http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html -CVE-2021-22555 - http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html -CVE-2021-22555 - http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html -CVE-2021-22555 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html -CVE-2021-22555 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 -CVE-2021-22555 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d -CVE-2021-22555 - https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 -CVE-2021-22557 - http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html -CVE-2021-2256 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22569 - http://www.openwall.com/lists/oss-security/2022/01/12/4 -CVE-2021-22569 - http://www.openwall.com/lists/oss-security/2022/01/12/7 -CVE-2021-22569 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2257 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22570 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22571 - https://github.com/google/sa360-webquery-bigquery/pull/15 -CVE-2021-2258 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2259 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2260 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22600 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 -CVE-2021-2261 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2262 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2263 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2264 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22652 - http://packetstormsecurity.com/files/161937/Advantech-iView-Unauthenticated-Remote-Code-Execution.html -CVE-2021-2266 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2267 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2268 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2269 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22696 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22696 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2270 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2271 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22716 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-103-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2021-103-01_C-Bus_Toolkit_C-Gate_Server_Security_Notification.pdf -CVE-2021-2272 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2273 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2274 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2275 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2276 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2277 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2278 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2279 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2280 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2281 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2282 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2283 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2284 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2285 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2286 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2287 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22871 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html -CVE-2021-22872 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html -CVE-2021-22872 - https://hackerone.com/reports/986365 -CVE-2021-22873 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html -CVE-2021-22876 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-2288 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22883 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22883 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-22883 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22884 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22884 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-22884 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22887 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712 -CVE-2021-2289 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22890 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22894 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY -CVE-2021-22897 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22897 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22897 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22898 - https://curl.se/docs/CVE-2021-22898.html -CVE-2021-22898 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22898 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22898 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22899 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY -CVE-2021-2290 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22900 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY -CVE-2021-22901 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-22901 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22901 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-2291 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22911 - http://packetstormsecurity.com/files/162997/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html -CVE-2021-22911 - http://packetstormsecurity.com/files/163419/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html -CVE-2021-2292 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22922 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22923 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22924 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22924 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22925 - http://seclists.org/fulldisclosure/2021/Sep/39 -CVE-2021-22925 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22925 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22926 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22926 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2293 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22931 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22931 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-22931 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22939 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22939 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-22939 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2294 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22940 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22940 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-22940 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22945 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22946 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22946 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22946 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-22946 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-22947 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-22947 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-22947 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2295 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22959 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-2296 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22960 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-2297 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2298 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-22986 - http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html -CVE-2021-22986 - http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html -CVE-2021-2299 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2300 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2301 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23017 - http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html -CVE-2021-23017 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-23017 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-23017 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2302 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23024 - http://packetstormsecurity.com/files/163264/F5-BIG-IQ-VE-8.0.0-2923215-Remote-Root.html -CVE-2021-2303 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2304 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2305 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2306 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2307 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2308 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2309 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2310 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2311 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2312 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23133 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b -CVE-2021-23133 - https://www.openwall.com/lists/oss-security/2021/04/18/2 -CVE-2021-2314 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2315 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23158 - https://github.com/michaelrsweet/htmldoc/issues/414 -CVE-2021-2316 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23165 - https://github.com/michaelrsweet/htmldoc/issues/413 -CVE-2021-2317 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2318 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23180 - https://github.com/michaelrsweet/htmldoc/issues/418 -CVE-2021-2319 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23191 - https://github.com/michaelrsweet/htmldoc/issues/415 -CVE-2021-2320 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-23206 - https://github.com/michaelrsweet/htmldoc/issues/416 -CVE-2021-2321 - https://www.oracle.com/security-alerts/cpuapr2021.html -CVE-2021-2323 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2324 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2326 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2328 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2329 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2330 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2332 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23327 - https://github.com/apexcharts/apexcharts.js/pull/2158 -CVE-2021-23327 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616 -CVE-2021-23327 - https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708 -CVE-2021-23328 - https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989 -CVE-2021-23329 - https://github.com/Geta/NestedObjectAssign/pull/11 -CVE-2021-23329 - https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977 -CVE-2021-2333 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23330 - https://github.com/bitovi/launchpad/pull/124 -CVE-2021-23331 - https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988 -CVE-2021-23335 - https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766 -CVE-2021-23336 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-23336 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-23336 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-23336 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932 -CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930 -CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928 -CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931 -CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929 -CVE-2021-23337 - https://snyk.io/vuln/SNYK-JS-LODASH-1040724 -CVE-2021-23337 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-23337 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-23337 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-23337 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23338 - https://github.com/418sec/huntr/pull/1329 -CVE-2021-23338 - https://snyk.io/vuln/SNYK-PYTHON-QLIB-1054635 -CVE-2021-2334 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23340 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132 -CVE-2021-23341 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583 -CVE-2021-23341 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582 -CVE-2021-23341 - https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581 -CVE-2021-23342 - http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html -CVE-2021-23342 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593 -CVE-2021-23342 - https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017 -CVE-2021-23343 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028 -CVE-2021-23343 - https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067 -CVE-2021-23344 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069 -CVE-2021-23346 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633 -CVE-2021-23346 - https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306 -CVE-2021-23346 - https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307 -CVE-2021-23348 - https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm -CVE-2021-23348 - https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536 -CVE-2021-2335 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23352 - https://snyk.io/vuln/SNYK-JS-MADGE-1082875 -CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289 -CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287 -CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288 -CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286 -CVE-2021-23353 - https://snyk.io/vuln/SNYK-JS-JSPDF-1073626 -CVE-2021-23355 - https://snyk.io/vuln/SNYK-JS-PSKILL-1078529 -CVE-2021-23356 - https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534 -CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504 -CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505 -CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503 -CVE-2021-23358 - https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984 -CVE-2021-23359 - https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533 -CVE-2021-2336 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23360 - https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535 -CVE-2021-23362 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356 -CVE-2021-23362 - https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355 -CVE-2021-23363 - https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531 -CVE-2021-23364 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182 -CVE-2021-23364 - https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194 -CVE-2021-23368 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795 -CVE-2021-23368 - https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595 -CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950 -CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951 -CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952 -CVE-2021-23369 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767 -CVE-2021-2337 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698 -CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699 -CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697 -CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696 -CVE-2021-23370 - https://snyk.io/vuln/SNYK-JS-SWIPER-1088062 -CVE-2021-23373 - https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231 -CVE-2021-23374 - https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544 -CVE-2021-23375 - https://snyk.io/vuln/SNYK-JS-PSNODE-1078543 -CVE-2021-23376 - https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542 -CVE-2021-23377 - https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808 -CVE-2021-23378 - https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539 -CVE-2021-23379 - https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537 -CVE-2021-2338 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23380 - https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 -CVE-2021-23381 - https://snyk.io/vuln/SNYK-JS-KILLING-1078532 -CVE-2021-23382 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641 -CVE-2021-23382 - https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640 -CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031 -CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032 -CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030 -CVE-2021-23383 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029 -CVE-2021-23384 - https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708 -CVE-2021-23385 - https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234 -CVE-2021-23385 - https://snyk.io/blog/url-confusion-vulnerabilities/ -CVE-2021-23387 - https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707 -CVE-2021-23389 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607 -CVE-2021-2339 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23390 - https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527 -CVE-2021-23391 - https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555 -CVE-2021-23392 - https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597 -CVE-2021-23393 - https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189 -CVE-2021-23394 - https://github.com/Studio-42/elFinder -CVE-2021-23394 - https://github.com/Studio-42/elFinder/issues/3295 -CVE-2021-23394 - https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554 -CVE-2021-23395 - https://snyk.io/vuln/SNYK-JS-NEDB-1305279 -CVE-2021-23396 - https://snyk.io/vuln/SNYK-JS-LUTILS-1311023 -CVE-2021-23397 - https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022 -CVE-2021-23398 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286 -CVE-2021-23398 - https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285 -CVE-2021-23399 - https://snyk.io/vuln/SNYK-JS-WINCRED-1078538 -CVE-2021-2340 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23400 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737 -CVE-2021-23400 - https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415 -CVE-2021-23401 - https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188 -CVE-2021-23402 - https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024 -CVE-2021-23403 - https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009 -CVE-2021-23404 - https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324 -CVE-2021-23405 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297 -CVE-2021-23406 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506 -CVE-2021-23406 - https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857 -CVE-2021-23407 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152 -CVE-2021-23408 - https://snyk.io/vuln/SNYK-JAVA-COMGRAPHHOPPER-1320114 -CVE-2021-2341 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2341 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23411 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695 -CVE-2021-23411 - https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008 -CVE-2021-23412 - https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832 -CVE-2021-23413 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499 -CVE-2021-23413 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498 -CVE-2021-23413 - https://snyk.io/vuln/SNYK-JS-JSZIP-1251497 -CVE-2021-23414 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588 -CVE-2021-23414 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587 -CVE-2021-23414 - https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429 -CVE-2021-23415 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153 -CVE-2021-23416 - https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106 -CVE-2021-23417 - https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984 -CVE-2021-23419 - https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747 -CVE-2021-2342 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23420 - https://github.com/JinYiTong/poc -CVE-2021-23420 - https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585 -CVE-2021-23424 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198 -CVE-2021-23424 - https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849 -CVE-2021-23425 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197 -CVE-2021-23425 - https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850 -CVE-2021-23426 - https://snyk.io/vuln/SNYK-JS-PROTO-1316301 -CVE-2021-23427 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778 -CVE-2021-23428 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838 -CVE-2021-23429 - https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774 -CVE-2021-2343 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23430 - https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388 -CVE-2021-23431 - https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e -CVE-2021-23432 - https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536 -CVE-2021-23433 - https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421 -CVE-2021-23434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423 -CVE-2021-23434 - https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453 -CVE-2021-23436 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266 -CVE-2021-23436 - https://snyk.io/vuln/SNYK-JS-IMMER-1540542 -CVE-2021-23438 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548 -CVE-2021-23438 - https://snyk.io/vuln/SNYK-JS-MPATH-1577289 -CVE-2021-23439 - https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492 -CVE-2021-2344 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23440 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212 -CVE-2021-23440 - https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541 -CVE-2021-23440 - https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/ -CVE-2021-23440 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-23442 - https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793 -CVE-2021-23443 - https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556 -CVE-2021-23444 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817 -CVE-2021-23444 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816 -CVE-2021-23444 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578 -CVE-2021-23445 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371 -CVE-2021-23445 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376 -CVE-2021-23445 - https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544 -CVE-2021-23447 - https://snyk.io/vuln/SNYK-JS-TEDDY-1579557 -CVE-2021-23448 - https://github.com/jarradseers/config-handler/issues/1 -CVE-2021-23449 - https://snyk.io/vuln/SNYK-JS-VM2-1585918 -CVE-2021-2345 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036 -CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035 -CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034 -CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033 -CVE-2021-23450 - https://snyk.io/vuln/SNYK-JS-DOJO-1535223 -CVE-2021-23450 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-23450 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-23452 - https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314 -CVE-2021-2346 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23460 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2342127 -CVE-2021-23460 - https://snyk.io/vuln/SNYK-JS-MINDASH-2340605 -CVE-2021-23463 - https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238 -CVE-2021-23463 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2347 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23470 - https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487 -CVE-2021-23472 - https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 -CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 -CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 -CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 -CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 -CVE-2021-23472 - https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 -CVE-2021-2348 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23484 - https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477 -CVE-2021-2349 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23490 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973 -CVE-2021-23490 - https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783 -CVE-2021-23497 - https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945 -CVE-2021-2350 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23507 - https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 -CVE-2021-23509 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1767165 -CVE-2021-23509 - https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291 -CVE-2021-2351 - http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html -CVE-2021-2351 - http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html -CVE-2021-2351 - http://seclists.org/fulldisclosure/2021/Dec/19 -CVE-2021-2351 - http://seclists.org/fulldisclosure/2021/Dec/20 -CVE-2021-2351 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-2351 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23514 - https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336163 -CVE-2021-23518 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2348246 -CVE-2021-23518 - https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653 -CVE-2021-2352 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2353 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2354 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23543 - https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908 -CVE-2021-2355 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23555 - https://snyk.io/vuln/SNYK-JS-VM2-2309905 -CVE-2021-23556 - https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334 -CVE-2021-23558 - https://snyk.io/vuln/SNYK-JS-BMOOR-2342622 -CVE-2021-2356 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23561 - https://snyk.io/vuln/SNYK-JS-COMB-1730083 -CVE-2021-23566 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550 -CVE-2021-23566 - https://snyk.io/vuln/SNYK-JS-NANOID-2332193 -CVE-2021-23568 - https://snyk.io/vuln/SNYK-JS-EXTEND2-2320315 -CVE-2021-2357 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23574 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790 -CVE-2021-23574 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791 -CVE-2021-23574 - https://snyk.io/vuln/SNYK-JS-JSDATA-1584361 -CVE-2021-2358 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2359 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23592 - https://snyk.io/vuln/SNYK-PHP-TOPTHINKFRAMEWORK-2385695 -CVE-2021-23594 - https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907 -CVE-2021-23597 - https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 -CVE-2021-2360 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2361 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2362 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23624 - https://snyk.io/vuln/SNYK-JS-DOTTY-1577292 -CVE-2021-2363 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23631 - https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14 -CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785 -CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245 -CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244 -CVE-2021-23632 - https://snyk.io/vuln/SNYK-JS-GIT-1568518 -CVE-2021-23639 - https://github.com/simonhaenisch/md-to-pdf/issues/99 -CVE-2021-23639 - https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880 -CVE-2021-2364 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23648 - https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882 -CVE-2021-2365 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23654 - https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py -CVE-2021-2366 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23663 - https://snyk.io/vuln/SNYK-JS-SEY-1727592 -CVE-2021-23664 - https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788 -CVE-2021-2367 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23673 - https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360 -CVE-2021-2368 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23682 - https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250 -CVE-2021-23682 - https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820 -CVE-2021-2369 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2369 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2370 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23700 - https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593 -CVE-2021-23702 - https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470 -CVE-2021-2371 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23718 - https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362 -CVE-2021-2372 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23727 - https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 -CVE-2021-2373 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2374 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2375 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23758 - http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html -CVE-2021-2376 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23760 - https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 -CVE-2021-2377 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23771 - https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587 -CVE-2021-23771 - https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946 -CVE-2021-23772 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 -CVE-2021-23772 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 -CVE-2021-2378 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23784 - https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633 -CVE-2021-23797 - https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656 -CVE-2021-2380 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23803 - https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226 -CVE-2021-23807 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273 -CVE-2021-23807 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288 -CVE-2021-2381 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2382 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23820 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910686 -CVE-2021-23820 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287 -CVE-2021-23824 - https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336164 -CVE-2021-2383 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23835 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html -CVE-2021-23835 - https://sec-consult.com/vulnerability-lab/ -CVE-2021-23836 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html -CVE-2021-23836 - https://sec-consult.com/vulnerability-lab/ -CVE-2021-23837 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html -CVE-2021-23837 - https://sec-consult.com/vulnerability-lab/ -CVE-2021-23838 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html -CVE-2021-23838 - https://sec-consult.com/vulnerability-lab/ -CVE-2021-23839 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 -CVE-2021-23839 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-2384 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23840 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 -CVE-2021-23840 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-23840 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-23840 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23840 - https://www.tenable.com/security/tns-2021-03 -CVE-2021-23840 - https://www.tenable.com/security/tns-2021-09 -CVE-2021-23840 - https://www.tenable.com/security/tns-2021-10 -CVE-2021-23841 - http://seclists.org/fulldisclosure/2021/May/67 -CVE-2021-23841 - http://seclists.org/fulldisclosure/2021/May/68 -CVE-2021-23841 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 -CVE-2021-23841 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23841 - https://www.tenable.com/security/tns-2021-03 -CVE-2021-23841 - https://www.tenable.com/security/tns-2021-09 -CVE-2021-2385 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2386 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2387 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23878 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 -CVE-2021-23879 - https://kc.mcafee.com/corporate/index?page=content&id=SB10351 -CVE-2021-2388 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2388 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23880 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 -CVE-2021-23881 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 -CVE-2021-23882 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 -CVE-2021-23883 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 -CVE-2021-23884 - https://kc.mcafee.com/corporate/index?page=content&id=SB10353 -CVE-2021-23885 - https://kc.mcafee.com/corporate/index?page=content&id=SB10349 -CVE-2021-23886 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354 -CVE-2021-23886 - https://kc.mcafee.com/corporate/index?page=content&id=SB10357 -CVE-2021-23887 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354 -CVE-2021-23887 - https://kc.mcafee.com/corporate/index?page=content&id=SB10357 -CVE-2021-23888 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 -CVE-2021-23889 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 -CVE-2021-2389 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23890 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 -CVE-2021-23892 - https://kc.mcafee.com/corporate/index?page=content&id=SB10355 -CVE-2021-23893 - https://kc.mcafee.com/corporate/index?page=content&id=SB10361 -CVE-2021-23894 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 -CVE-2021-23895 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 -CVE-2021-23896 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 -CVE-2021-2390 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2391 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2392 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23926 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-23926 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-23927 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23928 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23929 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-2393 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23930 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23931 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23932 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23933 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23934 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23935 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-23936 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -CVE-2021-2394 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2395 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1683940 -CVE-2021-23955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1684837 -CVE-2021-23956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1338637 -CVE-2021-2396 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23960 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675755 -CVE-2021-2397 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23971 - https://bugzilla.mozilla.org/show_bug.cgi?id=1678545 -CVE-2021-23977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1684761 -CVE-2021-2398 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23980 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980 -CVE-2021-23981 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692832 -CVE-2021-23986 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692623 -CVE-2021-2399 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-23991 - https://bugzilla.mozilla.org/show_bug.cgi?id=1673240 -CVE-2021-23994 - https://bugzilla.mozilla.org/show_bug.cgi?id=1699077 -CVE-2021-23997 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701942 -CVE-2021-23999 - https://bugzilla.mozilla.org/show_bug.cgi?id=1691153 -CVE-2021-2400 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24000 - https://bugzilla.mozilla.org/show_bug.cgi?id=1694698 -CVE-2021-24002 - https://bugzilla.mozilla.org/show_bug.cgi?id=1702374 -CVE-2021-2401 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2402 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2403 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24033 - https://github.com/facebook/create-react-app/pull/10644 -CVE-2021-2404 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24040 - http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html -CVE-2021-24045 - https://www.facebook.com/security/advisories/cve-2021-24045 -CVE-2021-2405 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2406 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2407 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2408 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24086 - http://packetstormsecurity.com/files/163499/Windows-TCP-IP-Denial-Of-Service.html -CVE-2021-2409 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24091 - http://packetstormsecurity.com/files/161713/Microsoft-Windows-WindowsCodecsRaw-COlympusE300LoadRaw-Out-Of-Bounds-Write.html -CVE-2021-24093 - http://packetstormsecurity.com/files/161582/Microsoft-DirectWrite-fsg_ExecuteGlyph-Buffer-Overflow.html -CVE-2021-2410 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2411 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2412 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24122 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-24123 - https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36 -CVE-2021-24124 - https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee -CVE-2021-24125 - https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178 -CVE-2021-24126 - https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3 -CVE-2021-24127 - https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6 -CVE-2021-24128 - https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864 -CVE-2021-24129 - https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6 -CVE-2021-24130 - https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8 -CVE-2021-24131 - https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8 -CVE-2021-24132 - https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c -CVE-2021-24133 - https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120 -CVE-2021-24134 - https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b -CVE-2021-24135 - https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3 -CVE-2021-24136 - https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1 -CVE-2021-24137 - https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3 -CVE-2021-24138 - https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151 -CVE-2021-24139 - https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28 -CVE-2021-2414 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24140 - https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056 -CVE-2021-24141 - https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93 -CVE-2021-24142 - https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14 -CVE-2021-24143 - https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b -CVE-2021-24144 - https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48 -CVE-2021-24145 - http://packetstormsecurity.com/files/163346/WordPress-Modern-Events-Calendar-5.16.2-Shell-Upload.html -CVE-2021-24145 - http://packetstormsecurity.com/files/163672/WordPress-Modern-Events-Calendar-Remote-Code-Execution.html -CVE-2021-24145 - https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610 -CVE-2021-24146 - http://packetstormsecurity.com/files/163345/WordPress-Modern-Events-Calendar-5.16.2-Information-Disclosure.html -CVE-2021-24146 - https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc -CVE-2021-24147 - https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f -CVE-2021-24148 - https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882 -CVE-2021-24149 - https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0 -CVE-2021-2415 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24150 - https://wpscan.com/vulnerability/6bc6023f-a5e7-4665-896c-95afa5b638fb -CVE-2021-24151 - https://wpscan.com/vulnerability/5ee77dd7-5a73-4d4e-8038-23e6e763e20c/ -CVE-2021-24152 - https://wpscan.com/vulnerability/597e9686-f4e2-43bf-85ef-c5967e5652bd -CVE-2021-24153 - https://packetstormsecurity.com/files/138192/ -CVE-2021-24154 - https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e -CVE-2021-24155 - http://packetstormsecurity.com/files/163382/WordPress-Backup-Guard-1.5.8-Shell-Upload.html -CVE-2021-24155 - http://packetstormsecurity.com/files/163623/WordPress-Backup-Guard-Authenticated-Remote-Code-Execution.html -CVE-2021-24155 - https://wpscan.com/vulnerability/d442acac-4394-45e4-b6bb-adf4a40960fb -CVE-2021-24156 - https://wpscan.com/vulnerability/8b6f4a77-4008-4730-9a91-fa055a8b3e68 -CVE-2021-24157 - https://wpscan.com/vulnerability/28e42f4e-e38a-4bf4-b51b-d8f21c40f037 -CVE-2021-24158 - https://wpscan.com/vulnerability/d81d0e72-9bb5-47ef-a796-3b305a4b604f -CVE-2021-24159 - https://wpscan.com/vulnerability/363182f1-9fda-4363-8f6a-be37c4c07aa9 -CVE-2021-2416 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24160 - https://wpscan.com/vulnerability/066ba5d4-4aaa-4462-b106-500c1f291c37 -CVE-2021-24161 - https://wpscan.com/vulnerability/efca27e0-bdb6-4497-8330-081f909d6933 -CVE-2021-24162 - https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 -CVE-2021-24163 - https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2 -CVE-2021-24164 - https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89 -CVE-2021-24165 - https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818 -CVE-2021-24166 - https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6 -CVE-2021-24168 - https://wpscan.com/vulnerability/bfaa7d79-904e-45f1-bc42-ddd90a65ce74 -CVE-2021-24169 - http://packetstormsecurity.com/files/164263/WordPress-Advanced-Order-Export-For-WooCommerce-3.1.7-Cross-Site-Scripting.html -CVE-2021-24169 - https://wpscan.com/vulnerability/09681a6c-57b8-4448-982a-fe8d28c87fc3 -CVE-2021-2417 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24170 - https://wpscan.com/vulnerability/29fc5b0e-0a5f-4484-a1e6-a0a1206726cc -CVE-2021-24171 - https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/ -CVE-2021-24172 - https://wpscan.com/vulnerability/187e6967-6961-4843-a9d5-866f6ebdb7bc -CVE-2021-24173 - https://wpscan.com/vulnerability/b69ea1bc-3c9b-47d7-a164-c860ee46a9af -CVE-2021-24174 - http://packetstormsecurity.com/files/163091/WordPress-Database-Backups-1.2.2.6-Cross-Site-Request-Forgery.html -CVE-2021-24174 - https://wpscan.com/vulnerability/350c3e9a-bcc2-486a-90e6-d1dc13ce1bd5 -CVE-2021-24175 - https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89 -CVE-2021-24175 - https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/ -CVE-2021-24176 - https://ganofins.com/blog/my-first-cve-2021-24176/ -CVE-2021-24176 - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 -CVE-2021-24177 - https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i/ -CVE-2021-24178 - https://wpscan.com/vulnerability/700f3b04-8298-447c-8d3c-4581880a63b5 -CVE-2021-24179 - https://wpscan.com/vulnerability/c0a5cdde-732a-432a-86c2-776df5d130a7 -CVE-2021-2418 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24180 - https://wpscan.com/vulnerability/7593d5c8-cbc2-4469-b36b-5d4fb6d49718 -CVE-2021-24181 - https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17 -CVE-2021-24182 - https://wpscan.com/vulnerability/f74dfc52-46ba-41e3-994b-23115a22984f -CVE-2021-24183 - https://wpscan.com/vulnerability/9b8da6b7-f1d6-4a7d-a621-4ca01e4b7496 -CVE-2021-24184 - https://wpscan.com/vulnerability/5e85917c-7a58-49cb-b8b3-05aa18ffff3e -CVE-2021-24185 - https://wpscan.com/vulnerability/0cba5349-e916-43f0-a1fe-62cf73e352a2 -CVE-2021-24186 - https://wpscan.com/vulnerability/5f5c0c6c-6f76-4366-b590-0aab557f8c60 -CVE-2021-24187 - https://wpscan.com/vulnerability/c234700e-61dd-46a0-90fb-609e704269a9 -CVE-2021-24188 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24189 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-2419 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24190 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24191 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24192 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24193 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24194 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24195 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -CVE-2021-24196 - https://purinechu.github.io/posts/social_slider_widget_reflected_xss/ -CVE-2021-24196 - https://wpscan.com/vulnerability/bb20d732-a5e4-4140-ab51-b2aa1a53db12 -CVE-2021-24197 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ -CVE-2021-24198 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ -CVE-2021-24199 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ -CVE-2021-2420 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24200 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ -CVE-2021-24201 - https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0 -CVE-2021-24202 - https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb -CVE-2021-24203 - https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e -CVE-2021-24204 - https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf -CVE-2021-24205 - https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9 -CVE-2021-24206 - https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309 -CVE-2021-24207 - https://wpscan.com/vulnerability/21e7a46f-e9a3-4b20-b44a-a5b6ce7b7ce6 -CVE-2021-24209 - https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3 -CVE-2021-2421 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24210 - https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb -CVE-2021-24211 - https://wpscan.com/vulnerability/37e0a033-3dee-476d-ae86-68354e8f0b1c -CVE-2021-24212 - https://wpscan.com/vulnerability/cf9305e8-f5bc-45c3-82db-0ef00fd46129 -CVE-2021-24213 - https://bentl.ee/posts/cve-givewp/ -CVE-2021-24213 - https://wpscan.com/vulnerability/da4ab508-a423-4c7f-a1d4-42ec6f989309 -CVE-2021-24214 - https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10 -CVE-2021-24215 - https://wpscan.com/vulnerability/eec0f29f-a985-4285-8eed-d1855d204a20 -CVE-2021-24216 - https://wpscan.com/vulnerability/87c6052c-2628-4987-a9a3-a03b5ca1e083 -CVE-2021-24217 - https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a -CVE-2021-24218 - https://wpscan.com/vulnerability/169d21fc-d191-46ff-82e8-9ac887aed8a4 -CVE-2021-24219 - https://wpscan.com/vulnerability/35acd2d8-85fc-4af5-8f6c-224fa7d92900 -CVE-2021-24219 - https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild -CVE-2021-2422 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24220 - https://wpscan.com/vulnerability/a2424354-2639-4f53-a24f-afc11f6c4cac -CVE-2021-24220 - https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild -CVE-2021-24221 - https://wpscan.com/vulnerability/3b52b25c-82a1-41c7-83ac-92e244f7c5ab -CVE-2021-24222 - https://wpscan.com/vulnerability/4d715de6-8595-4da9-808a-04a28e409900 -CVE-2021-24223 - https://wpscan.com/vulnerability/d7a72183-0cd1-45de-b98b-2e295b27e5db -CVE-2021-24224 - https://wpscan.com/vulnerability/ed0c054b-54bf-4df8-9015-c76704c93484 -CVE-2021-24225 - https://wpscan.com/vulnerability/25ca8af5-ab48-4e6d-b2ef-fc291742f1d5 -CVE-2021-24226 - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 -CVE-2021-2423 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24232 - https://wpscan.com/vulnerability/f06629b5-8b15-48eb-a7a7-78b693e06b71 -CVE-2021-24233 - https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0 -CVE-2021-24233 - https://www.getastra.com/blog/911/reflected-xss-found-in-cooked-pro-recipe-plugin-for-wordpress/ -CVE-2021-24234 - https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835 -CVE-2021-24235 - https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139 -CVE-2021-24236 - https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea -CVE-2021-24237 - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e -CVE-2021-24238 - https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5 -CVE-2021-24239 - https://wpscan.com/vulnerability/f1b67f40-642f-451e-a67a-b7487918ee34 -CVE-2021-2424 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24240 - https://wpscan.com/vulnerability/10528cb2-12a1-43f7-9b7d-d75d18fdf5bb -CVE-2021-24241 - https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f -CVE-2021-24242 - https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c -CVE-2021-24243 - https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3 -CVE-2021-24244 - https://wpscan.com/vulnerability/354b98d8-46a1-4189-b347-198701ea59b9 -CVE-2021-24245 - http://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html -CVE-2021-24245 - https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735 -CVE-2021-24246 - https://wpscan.com/vulnerability/2365a9d0-f6f4-4602-9804-5af23d0cb11d -CVE-2021-24247 - https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3 -CVE-2021-24248 - https://wpscan.com/vulnerability/ca886a34-cd2b-4032-9de1-8089b5cf3001 -CVE-2021-24249 - https://wpscan.com/vulnerability/fc4cf749-34ef-43b8-a529-5065d698ab81 -CVE-2021-2425 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24250 - https://wpscan.com/vulnerability/e23bf712-d891-4df7-99cc-9ef64f19f685 -CVE-2021-24251 - https://wpscan.com/vulnerability/c9911236-4af3-4557-9bc0-217face534e1 -CVE-2021-24252 - https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c -CVE-2021-24253 - https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079 -CVE-2021-24254 - https://wpscan.com/vulnerability/bb3e56dd-ae2e-45c2-a6c9-a59ae5fc1dc4 -CVE-2021-24255 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24256 - https://wpscan.com/vulnerability/a9412fed-aed3-4931-a504-1a86f876892e -CVE-2021-24256 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24257 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24258 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24259 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-2426 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24260 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24261 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24262 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24263 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24264 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24265 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24266 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24267 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24268 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24269 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-2427 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24270 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24271 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24272 - http://packetstormsecurity.com/files/164261/WordPress-Fitness-Calculators-1.9.5-Cross-Site-Request-Forgery.html -CVE-2021-24272 - https://wpscan.com/vulnerability/e643040b-1f3b-4c13-8a20-acfd069dcc4f -CVE-2021-24273 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24274 - http://packetstormsecurity.com/files/164316/WordPress-Ultimate-Maps-1.2.4-Cross-Site-Scripting.html -CVE-2021-24274 - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d -CVE-2021-24275 - http://packetstormsecurity.com/files/164311/WordPress-Popup-1.10.4-Cross-Site-Scripting.html -CVE-2021-24275 - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f -CVE-2021-24276 - http://packetstormsecurity.com/files/164308/WordPress-Contact-Form-1.7.14-Cross-Site-Scripting.html -CVE-2021-24276 - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c -CVE-2021-24277 - https://wpscan.com/vulnerability/8ebf56be-46c0-4435-819f-dc30370eafa4 -CVE-2021-24278 - https://wpscan.com/vulnerability/99f30604-d62b-4e30-afcd-b482f8d66413 -CVE-2021-24279 - https://wpscan.com/vulnerability/75f7690d-7f6b-48a8-a9d1-95578a657920 -CVE-2021-2428 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24280 - https://wpscan.com/vulnerability/db4ba6b0-887e-4ec1-8935-ab21d369b329 -CVE-2021-24281 - https://wpscan.com/vulnerability/daf12b85-f5ad-4261-ab39-be6840ad3cdc -CVE-2021-24283 - https://wpscan.com/vulnerability/6ccd9990-e15f-4800-b499-f7c74b480051 -CVE-2021-24284 - http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html -CVE-2021-24284 - https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 -CVE-2021-24285 - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 -CVE-2021-24286 - http://packetstormsecurity.com/files/164328/WordPress-Redirect-404-To-Parent-1.3.0-Cross-Site-Scripting.html -CVE-2021-24286 - https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27 -CVE-2021-24287 - http://packetstormsecurity.com/files/164327/WordPress-Select-All-Categories-And-Taxonomies-1.3.1-Cross-Site-Scripting.html -CVE-2021-24287 - https://wpscan.com/vulnerability/56e1bb56-bfc5-40dd-b2d0-edef43d89bdf -CVE-2021-24288 - https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 -CVE-2021-24289 - https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62 -CVE-2021-2429 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24290 - https://wpscan.com/vulnerability/dc368484-f2fe-4c76-ba3d-e00e7f633719 -CVE-2021-24291 - https://packetstormsecurity.com/files/162227/ -CVE-2021-24291 - https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a -CVE-2021-24292 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ -CVE-2021-24293 - https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7 -CVE-2021-24294 - https://wpscan.com/vulnerability/43b8cfb4-f875-432b-8e3b-52653fdee87c -CVE-2021-24295 - https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/ -CVE-2021-24296 - https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e -CVE-2021-24297 - https://wpscan.com/vulnerability/a64a3b2e-7924-47aa-96e8-3aa02a6cdccc -CVE-2021-24298 - https://codevigilant.com/disclosure/2021/wp-plugin-giveasap-xss/ -CVE-2021-24298 - https://wpscan.com/vulnerability/30aebded-3eb3-4dda-90b5-12de5e622c91 -CVE-2021-24299 - http://packetstormsecurity.com/files/162756/WordPress-ReDi-Restaurant-Reservation-21.0307-Cross-Site-Scripting.html -CVE-2021-24299 - https://wpscan.com/vulnerability/fd6ce00b-8c5f-4180-b648-f47b37303670 -CVE-2021-2430 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24300 - https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837 -CVE-2021-24301 - https://wpscan.com/vulnerability/eb8e2b9d-f153-49c9-862a-5c016934f9ad -CVE-2021-24302 - https://wpscan.com/vulnerability/372a66ca-1c3c-4429-86a5-81dbdaa9ec7d -CVE-2021-24303 - https://github.com/ja9er/CVEProject/blob/main/wordpress_jiangqie-official-website-mini-program_sqli.md -CVE-2021-24303 - https://wpscan.com/vulnerability/cbd65b7d-d3c3-4ee3-8e5e-ff0eeeaa7b30 -CVE-2021-24304 - https://wpscan.com/vulnerability/bb71f2f9-76bd-43f4-a8c9-35771dd28dff -CVE-2021-24305 - https://wpscan.com/vulnerability/4d55d1f5-a7b8-4029-942d-7a13e2498f64 -CVE-2021-24306 - https://wpscan.com/vulnerability/35516555-c50c-486a-886c-df49c9e51e2c -CVE-2021-24307 - https://wpscan.com/vulnerability/ab2c94d2-f6c4-418b-bd14-711ed164bcf1 -CVE-2021-24308 - http://packetstormsecurity.com/files/162856/WordPress-LifterLMS-4.21.0-Cross-Site-Scripting.html -CVE-2021-24308 - https://wpscan.com/vulnerability/f29f68a5-6575-441d-98c9-867145f2b082 -CVE-2021-24309 - https://wpscan.com/vulnerability/ba1d01dc-16e4-464f-94be-ed311ff6ccf9 -CVE-2021-2431 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24310 - https://wpscan.com/vulnerability/f34096ec-b1b0-471d-88a4-4699178a3165 -CVE-2021-24311 - https://wpscan.com/vulnerability/4fb90999-6f91-4200-a0cc-bfe9b34a5de9 -CVE-2021-24312 - https://wpscan.com/vulnerability/2142c3d3-9a7f-4e3c-8776-d469a355d62f -CVE-2021-24313 - https://bastijnouwendijk.com/cve-2021-24313/ -CVE-2021-24313 - https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586 -CVE-2021-24314 - https://m0ze.ru/vulnerability/%5B2021-03-24%5D-%5BWordPress%5D-%5BCWE-89%5D-Goto-WordPress-Theme-v2.0.txt -CVE-2021-24314 - https://wpscan.com/vulnerability/1cc6dc17-b019-49dd-8149-c8bba165eb30 -CVE-2021-24315 - https://m0ze.ru/vulnerability/%5B2021-04-02%5D-%5BWordPress%5D-%5BCWE-79%5D-GiveWP-WordPress-Plugin-v2.10.3.txt -CVE-2021-24315 - https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2 -CVE-2021-24316 - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt -CVE-2021-24316 - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e -CVE-2021-24317 - https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-79%5D-Listeo-WordPress-Theme-v1.6.10.txt -CVE-2021-24317 - https://wpscan.com/vulnerability/704d8886-df9e-4217-88d1-a72a71924174 -CVE-2021-24318 - https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-639%5D-Listeo-WordPress-Theme-v1.6.10.txt -CVE-2021-24318 - https://wpscan.com/vulnerability/9afa7e11-68b3-4196-975e-8b3f8e68ce56 -CVE-2021-24319 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-1021%5D-Bello-WordPress-Theme-v1.5.9.txt -CVE-2021-24319 - https://wpscan.com/vulnerability/2c274eb7-25f1-49d4-a2c8-8ce8cecebe68 -CVE-2021-2432 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-2432 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-2432 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24320 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt -CVE-2021-24320 - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb -CVE-2021-24321 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-89%5D-Bello-WordPress-Theme-v1.5.9.txt -CVE-2021-24321 - https://wpscan.com/vulnerability/7314f9fa-c047-4e0c-b145-940240a50c02 -CVE-2021-24322 - https://m0ze.ru/vulnerability/%5B2021-04-04%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-DB-Backup-WordPress-Plugin-v2.3.3.txt -CVE-2021-24322 - https://wpscan.com/vulnerability/6bea6301-0762-45c3-a4eb-15d6ac4f9f37 -CVE-2021-24323 - https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010 -CVE-2021-24324 - https://wpscan.com/vulnerability/63a24890-3735-4016-b4b7-4b070a842664 -CVE-2021-24325 - https://wpscan.com/vulnerability/96e9a7fd-9ab8-478e-9420-4bca2a0b23a1 -CVE-2021-24326 - https://wpscan.com/vulnerability/63d6ca03-e0df-40db-9839-531c13619094 -CVE-2021-24327 - https://wpscan.com/vulnerability/ca8068f7-dcf0-44fd-841d-d02987220d79 -CVE-2021-24328 - https://m0ze.ru/exploit/csrf-wp-login-security-and-history-v1.0.html -CVE-2021-24328 - https://m0ze.ru/vulnerability/%5B2021-03-29%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-Login-Security-and-History-WordPress-Plugin-v1.0.txt -CVE-2021-24328 - https://wpscan.com/vulnerability/eeb41d7b-8f9e-4a12-b65f-f310f08e4ace -CVE-2021-24329 - https://wpscan.com/vulnerability/9df86d05-1408-4c22-af55-5e3d44249fd0 -CVE-2021-2433 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24330 - https://wpscan.com/vulnerability/b9748066-83b7-4762-9124-de021f687477 -CVE-2021-24331 - https://wpscan.com/vulnerability/2c7ca586-def8-4723-b779-09d7f37fa1ab -CVE-2021-24332 - https://wpscan.com/vulnerability/6678e064-ce21-4bb2-8c50-061073fb22fb -CVE-2021-24333 - https://m0ze.ru/exploit/csrf-prevent-content-copy-image-save-v1.3.html -CVE-2021-24333 - https://wpscan.com/vulnerability/c722f8d0-f86b-41c2-9f1f-48e475e22864 -CVE-2021-24334 - https://wpscan.com/vulnerability/ae79189a-6b63-4110-9567-cd7c97d71e4f -CVE-2021-24335 - https://wpscan.com/vulnerability/39258aba-2449-4214-a490-b8e46945117d -CVE-2021-24336 - https://codevigilant.com/disclosure/2021/wp-plugin-flightlog-sql-injection/ -CVE-2021-24336 - https://wpscan.com/vulnerability/dda0593e-cd97-454e-a8c8-15d7f690311c -CVE-2021-24337 - https://codevigilant.com/disclosure/2021/wp-plugin-video-embed-box/ -CVE-2021-24337 - https://wpscan.com/vulnerability/a8fd8dd4-5b5e-462e-8dae-065d5e2d003a -CVE-2021-24338 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24338 -CVE-2021-24339 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24339 -CVE-2021-2434 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24340 - https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c -CVE-2021-24341 - https://wpscan.com/vulnerability/1eba1c73-a19b-4226-afec-d27c48388a04 -CVE-2021-24342 - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e -CVE-2021-24343 - https://wpscan.com/vulnerability/d6c72d90-e321-47b9-957a-6fea7c944293 -CVE-2021-24344 - https://wpscan.com/vulnerability/6d6c1d46-5c3d-4d56-9728-2f94064132aa -CVE-2021-24345 - https://codevigilant.com/disclosure/2021/wp-plugin-sendit/ -CVE-2021-24345 - https://wpscan.com/vulnerability/02ba4d8b-f4d2-42cd-9fae-b543e112fa04 -CVE-2021-24346 - https://codevigilant.com/disclosure/2021/wp-plugin-stock-in/ -CVE-2021-24346 - https://wpscan.com/vulnerability/c25146fd-4143-463c-8c85-05dd33e9a77b -CVE-2021-24347 - http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html -CVE-2021-24347 - http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html -CVE-2021-24347 - https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a -CVE-2021-24348 - https://codevigilant.com/disclosure/2021/wp-plugin-side-menu/ -CVE-2021-24348 - https://wpscan.com/vulnerability/e0ca257e-6e78-4611-a9ad-be43d37cf474 -CVE-2021-24349 - https://wpscan.com/vulnerability/6bb4eb71-d702-4732-b01f-b723077d66ca -CVE-2021-2435 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24350 - https://wpscan.com/vulnerability/06f1889d-8e2f-481a-b91b-3a8008e00ffc -CVE-2021-24351 - https://wpscan.com/vulnerability/2ee62f85-7aea-4b7d-8b2d-5d86d9fb8016 -CVE-2021-24352 - https://wpscan.com/vulnerability/d770f1fa-7652-465a-833c-b7178146847d -CVE-2021-24353 - https://wpscan.com/vulnerability/74c23d56-e81f-47e9-bf8b-33d3f0e81894 -CVE-2021-24354 - https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668 -CVE-2021-24355 - https://wpscan.com/vulnerability/ce8f9648-30fb-4fb9-894e-879dc0f26f98 -CVE-2021-24356 - https://wpscan.com/vulnerability/be356530-5e00-4f27-8177-b80f3c1ae6e8 -CVE-2021-24357 - https://wpscan.com/vulnerability/950f46ae-4476-4969-863a-0e55752953b3 -CVE-2021-24358 - https://wpscan.com/vulnerability/fd4352ad-dae0-4404-94d1-11083cb1f44d -CVE-2021-24359 - https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92 -CVE-2021-2436 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24360 - https://wpscan.com/vulnerability/d9586453-cc5c-4d26-bb45-a6370c9427fe -CVE-2021-24361 - https://wpscan.com/vulnerability/5aff50fc-ac96-4076-a07c-bb145ae37025 -CVE-2021-24362 - https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a -CVE-2021-24363 - https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974 -CVE-2021-24364 - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 -CVE-2021-24365 - https://wpscan.com/vulnerability/fdbeb137-b404-46c7-85fb-394a3bdac388 -CVE-2021-24365 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-032.txt -CVE-2021-24366 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24366 -CVE-2021-24367 - https://wpscan.com/vulnerability/f35b7c8f-cfb6-42b6-8a3a-8c07cd1e9da0 -CVE-2021-24368 - https://wpscan.com/vulnerability/7f2fda5b-45a5-4fc6-968f-90bc9674c999 -CVE-2021-24369 - https://wpscan.com/vulnerability/1d1a731b-78f7-4d97-b40d-80f66700edae -CVE-2021-2437 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24370 - https://lists.openwall.net/full-disclosure/2020/11/17/2 -CVE-2021-24370 - https://seclists.org/fulldisclosure/2020/Nov/30 -CVE-2021-24370 - https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38 -CVE-2021-24370 - https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/ -CVE-2021-24371 - https://codevigilant.com/disclosure/2021/wp-plugin-rsvpmaker/ -CVE-2021-24371 - https://wpscan.com/vulnerability/63be225c-ebee-4cac-b43e-cf033ee7425d -CVE-2021-24372 - https://wpscan.com/vulnerability/5340ae4e-95ba-4a69-beb1-3459cac17782 -CVE-2021-24373 - https://wpscan.com/vulnerability/fcf17278-609f-4f75-8a87-9b4579dee1c8 -CVE-2021-24374 - https://wpscan.com/vulnerability/08a8a51c-49d3-4bce-b7e0-e365af1d8f33 -CVE-2021-24375 - https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/ -CVE-2021-24375 - https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f -CVE-2021-24376 - https://wpscan.com/vulnerability/93edcc23-894a-46c2-84d2-407dcb64ba1e -CVE-2021-24377 - https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4 -CVE-2021-24378 - https://wpscan.com/vulnerability/375bd694-1a30-41af-bbd4-8a8ee54f0dbf -CVE-2021-24379 - https://wpscan.com/vulnerability/aae7a889-195c-45a3-bbe4-e6d4cd2d7fd9 -CVE-2021-2438 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24380 - https://wpscan.com/vulnerability/1dd0f9a8-22ab-4ecc-a925-605822739000 -CVE-2021-24381 - https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d -CVE-2021-24382 - https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d -CVE-2021-24383 - http://packetstormsecurity.com/files/163261/WordPress-WP-Google-Maps-8.1.11-Cross-Site-Scripting.html -CVE-2021-24383 - https://wpscan.com/vulnerability/1270588c-53fe-447e-b83c-1b877dc7a954 -CVE-2021-24384 - https://wpscan.com/vulnerability/fb6c407c-713c-4e83-92ce-4e5f791be696 -CVE-2021-24385 - https://wpscan.com/vulnerability/754ac750-0262-4f65-b23e-d5523995fbfa -CVE-2021-24386 - https://wpscan.com/vulnerability/e9b48b19-14cc-41ad-a029-f7f9ae236e4e -CVE-2021-24387 - https://wpscan.com/vulnerability/27264f30-71d5-4d2b-8f36-4009a2be6745 -CVE-2021-24388 - https://wpscan.com/vulnerability/e3f6576f-08cb-4278-8c79-3ef4d0b85cd9 -CVE-2021-24389 - https://wpscan.com/vulnerability/23b8b8c4-cded-4887-a021-5f3ea610213b -CVE-2021-2439 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24390 - https://codevigilant.com/disclosure/2021/wp-plugin-alipay/ -CVE-2021-24390 - https://wpscan.com/vulnerability/92b0abec-082f-4545-9636-1b2f4dac66fe -CVE-2021-24391 - https://codevigilant.com/disclosure/2021/wp-plugin-cashtomer/ -CVE-2021-24391 - https://wpscan.com/vulnerability/0c26ee50-df3d-438a-93bb-faa88b7983af -CVE-2021-24392 - https://codevigilant.com/disclosure/2021/wp-plugin-club-management-software/ -CVE-2021-24392 - https://wpscan.com/vulnerability/68530e63-bba3-4a9a-ae83-516684aa5dc6 -CVE-2021-24393 - https://codevigilant.com/disclosure/2021/wp-plugin-comment-highlighter/ -CVE-2021-24393 - https://wpscan.com/vulnerability/24969766-19e3-47cd-b32c-6c3330651d1f -CVE-2021-24394 - https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/ -CVE-2021-24394 - https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3 -CVE-2021-24395 - https://codevigilant.com/disclosure/2021/wp-plugin-embed-youtube-video/ -CVE-2021-24395 - https://wpscan.com/vulnerability/6cd9ebcf-e78f-4f97-a8f9-b7e4ceab66b7 -CVE-2021-24396 - https://codevigilant.com/disclosure/2021/wp-plugin-gseor/ -CVE-2021-24396 - https://wpscan.com/vulnerability/28687291-2369-49e0-8905-dc4359454830 -CVE-2021-24397 - https://codevigilant.com/disclosure/2021/wp-plugin-microcopy/ -CVE-2021-24397 - https://wpscan.com/vulnerability/2edab2b0-d4fd-4d50-aca0-2a1b7b37c23d -CVE-2021-24398 - https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/ -CVE-2021-24398 - https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5 -CVE-2021-24399 - https://codevigilant.com/disclosure/2021/wp-plugin-the-sorter/ -CVE-2021-24399 - https://wpscan.com/vulnerability/f7af0795-f111-4acc-9b1e-63cae5862f8b -CVE-2021-2440 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24400 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-display-users/ -CVE-2021-24400 - https://wpscan.com/vulnerability/614cf338-c8cf-4570-ae83-4f79cbdcc9d5 -CVE-2021-24401 - https://codevigilant.com/disclosure/2021/wp-plugins-domain-redirect/ -CVE-2021-24401 - https://wpscan.com/vulnerability/f9ae34a9-84c9-4d48-af6a-9e6c786f856e -CVE-2021-24402 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-icommerce/ -CVE-2021-24402 - https://wpscan.com/vulnerability/7840e664-907f-42d1-950d-8c919032b707 -CVE-2021-24403 - https://codevigilant.com/disclosure/2021/wp-plugin-wpagecontact/ -CVE-2021-24403 - https://wpscan.com/vulnerability/a87040c1-58fc-4bf7-8bfa-0b9712a62ba8 -CVE-2021-24404 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-board/ -CVE-2021-24404 - https://wpscan.com/vulnerability/a86240e1-f064-4972-9f97-6b349fdd57f6 -CVE-2021-24405 - http://packetstormsecurity.com/files/166543/WordPress-Easy-Cookie-Policy-1.6.2-Cross-Site-Scripting.html -CVE-2021-24405 - https://wpscan.com/vulnerability/9157d6d2-4bda-4fcd-8192-363a63a51ff5 -CVE-2021-24406 - https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388 -CVE-2021-24407 - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 -CVE-2021-24408 - https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d -CVE-2021-24409 - https://wpscan.com/vulnerability/ae3cd3ed-aecd-4d8c-8a2b-2936aaaef0cf -CVE-2021-2441 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24410 - https://wpscan.com/vulnerability/b47ea36e-f37c-4745-b750-31f5b91f543f -CVE-2021-24411 - https://wpscan.com/vulnerability/ebe7f625-67e1-4df5-a569-20526dd57b24 -CVE-2021-24412 - https://wpscan.com/vulnerability/c4ed3e52-cbe0-46dc-ab43-65de78cfb225 -CVE-2021-24413 - https://wpscan.com/vulnerability/ce6d17c3-6741-4c80-ab13-e1824960ae24 -CVE-2021-24414 - https://wpscan.com/vulnerability/e20b805d-eb11-4702-9803-77de276000ac -CVE-2021-24415 - https://wpscan.com/vulnerability/fd312bfd-7c98-4682-877d-846442e9c6a2 -CVE-2021-24416 - https://wpscan.com/vulnerability/260c7e2d-d48c-42d6-ae05-bad3f3bac01d -CVE-2021-24418 - https://wpscan.com/vulnerability/1512bba9-89e2-493d-b85d-10c7acb903db -CVE-2021-24419 - https://wpscan.com/vulnerability/0eeff1ee-d11e-4d52-a032-5f5bd8a6a2d7 -CVE-2021-2442 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24420 - https://wpscan.com/vulnerability/426eafb1-0261-4e7e-8c70-75bf4c476f18 -CVE-2021-24421 - https://wpscan.com/vulnerability/b378d36d-66d9-4373-a628-e379e4766375 -CVE-2021-24423 - https://wpscan.com/vulnerability/541974d6-2df8-4497-9aee-afd3b9024102 -CVE-2021-24424 - https://wpscan.com/vulnerability/90cf8f9d-4d37-405d-b161-239bdb281828 -CVE-2021-24425 - https://wpscan.com/vulnerability/14632fa8-597e-49ff-8583-9797208a3583 -CVE-2021-24426 - https://wpscan.com/vulnerability/48464b3f-fe57-40fe-8868-398a36099fb9 -CVE-2021-24427 - https://wpscan.com/vulnerability/5da5ce9a-82a6-404f-8dec-795d7905b3f9 -CVE-2021-24428 - https://wpscan.com/vulnerability/9fcf6ebe-01d9-4730-a20e-58b192bb6d87 -CVE-2021-24429 - https://wpscan.com/vulnerability/e922b788-7da5-43b4-9b05-839c8610252a -CVE-2021-2443 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24430 - https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df -CVE-2021-24431 - https://wpscan.com/vulnerability/ae50cec9-5f80-4221-b6a8-4593ab66c37b -CVE-2021-24432 - https://wpscan.com/vulnerability/b92ec5f7-d6a8-476f-a01e-21001a558914/ -CVE-2021-24433 - https://wpscan.com/vulnerability/2ce8c786-ba82-427c-b5e7-e3b300a24c5f/ -CVE-2021-24434 - https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39 -CVE-2021-24435 - https://wpscan.com/vulnerability/a88ffc42-6611-406e-8660-3af24c9cc5e8 -CVE-2021-24436 - https://wpscan.com/vulnerability/05988ebb-7378-4a3a-9d2d-30f8f58fe9ef -CVE-2021-24437 - https://wpscan.com/vulnerability/ed9d26be-cc96-4274-a05b-0b7ad9d8cfd9 -CVE-2021-24438 - https://wpscan.com/vulnerability/af472879-9328-45c2-957f-e7bed77e4c2d -CVE-2021-24439 - https://wpscan.com/vulnerability/9c538c51-ae58-461d-b93b-cc9dfebf2bc0 -CVE-2021-2444 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24440 - https://wpscan.com/vulnerability/ba4503f7-684e-4274-bc53-3aa848712496 -CVE-2021-24441 - https://wpscan.com/vulnerability/ec9292b1-5cbd-4332-bdb6-2351c94f5ac6 -CVE-2021-24442 - https://wpscan.com/vulnerability/7376666e-9b2a-4239-b11f-8544435b444a -CVE-2021-24443 - https://wpscan.com/vulnerability/a4432acd-df49-4a4f-8184-b55cdd5d4d34 -CVE-2021-24444 - http://packetstormsecurity.com/files/164604/WordPress-TaxoPress-3.0.7.1-Cross-Site-Scripting.html -CVE-2021-24444 - https://wpscan.com/vulnerability/a31321fe-adc6-4480-a220-35aedca52b8b -CVE-2021-24445 - https://wpscan.com/vulnerability/d60634a3-ca39-43be-893b-ff9ba625360f -CVE-2021-24446 - https://wpscan.com/vulnerability/be55131b-d9f2-4ac1-b667-c544c066887f -CVE-2021-24447 - https://wpscan.com/vulnerability/fb9dbcdf-4ffd-484d-9b67-283683d050fd -CVE-2021-24448 - https://wpscan.com/vulnerability/81e42812-93eb-480d-a2d2-5ba5e02dd0ba -CVE-2021-2445 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24450 - https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92 -CVE-2021-24451 - https://wpscan.com/vulnerability/40603382-404b-44a2-8212-f2008366891c -CVE-2021-24452 - https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0 -CVE-2021-24453 - https://wpscan.com/vulnerability/78575072-4e04-4a8a-baec-f313cfffe829 -CVE-2021-24454 - https://wpscan.com/vulnerability/48ade7a5-5abb-4267-b9b6-13e31e1b3e91 -CVE-2021-24455 - https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9 -CVE-2021-24456 - https://wpscan.com/vulnerability/929ad37d-9cdb-4117-8cd3-cf7130a7c9d4 -CVE-2021-24457 - https://wpscan.com/vulnerability/97f4f7da-22a8-42a6-88ac-82e95a6c06dd -CVE-2021-24458 - https://wpscan.com/vulnerability/8a588266-54cd-4779-adcf-f9b9e226c297 -CVE-2021-24459 - https://wpscan.com/vulnerability/3fafbec0-55e4-41cf-8402-1b57b6615225 -CVE-2021-2446 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24460 - https://wpscan.com/vulnerability/9c0164f2-464b-4876-a48f-c0ebd63cf397 -CVE-2021-24461 - https://wpscan.com/vulnerability/311974b5-6d6e-4b47-a33d-6d8f468aa528 -CVE-2021-24462 - https://wpscan.com/vulnerability/e24dac6d-de48-42c1-bdde-4a45fb331376 -CVE-2021-24463 - https://wpscan.com/vulnerability/994e6198-f0e9-4e30-989f-b5a3dfe95ded -CVE-2021-24464 - https://wpscan.com/vulnerability/531b3fac-48b9-4821-a3aa-4db073d43aae -CVE-2021-24465 - https://wpscan.com/vulnerability/08dbe202-0136-4502-87e7-5e984dc27b16 -CVE-2021-24466 - https://wpscan.com/vulnerability/37c7bdbb-f27f-47d3-9886-69d2e83d7581 -CVE-2021-24467 - https://wpscan.com/vulnerability/ac32d265-066e-49ec-9042-3145cd99e2e8 -CVE-2021-24468 - https://wpscan.com/vulnerability/4b7c61da-952c-492a-8ce6-3c2126942a7c -CVE-2021-2447 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24470 - https://wpscan.com/vulnerability/b01a85cc-0e45-4183-a916-19476354d5d4 -CVE-2021-24471 - https://wpscan.com/vulnerability/a8ccb09a-9f8c-448f-b2d0-9b01c3a748ac -CVE-2021-24472 - https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a -CVE-2021-24473 - https://wpscan.com/vulnerability/79982ea9-4733-4b1e-a43e-17629c1136de -CVE-2021-24474 - https://wpscan.com/vulnerability/49bc46a8-9d55-4fa1-8e0d-0556a6336fa0 -CVE-2021-24476 - https://wpscan.com/vulnerability/d1885641-9547-4dd5-84be-ba4a160ee1f5 -CVE-2021-24477 - https://wpscan.com/vulnerability/7915070f-1d9b-43c3-b01e-fec35f633a4d -CVE-2021-24478 - https://wpscan.com/vulnerability/c73818e5-0734-46c9-9703-d211b4f58664 -CVE-2021-24479 - https://wpscan.com/vulnerability/5fd2246a-fbd9-4f2a-8b0b-a64c3f91157c -CVE-2021-2448 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24480 - https://wpscan.com/vulnerability/243d417a-6fb9-4e17-9e12-a8c605f9af8a -CVE-2021-24481 - https://wpscan.com/vulnerability/a4c352de-9815-4dfe-ac51-65b5bfb37438 -CVE-2021-24482 - https://wpscan.com/vulnerability/2f86e418-22fd-4cb8-8de1-062b17cf20a7 -CVE-2021-24483 - https://wpscan.com/vulnerability/0dc931c6-1fce-4d70-a658-a4bbab10dab3 -CVE-2021-24484 - https://wpscan.com/vulnerability/9ce0153d-4a8b-4215-b6b6-15ca68c4f52c -CVE-2021-24485 - https://wpscan.com/vulnerability/4a6b278a-4c11-4624-86bf-754212979643 -CVE-2021-24486 - https://wpscan.com/vulnerability/324e6b7b-a2ac-4c08-8b97-0967513f7328 -CVE-2021-24487 - https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4 -CVE-2021-24488 - https://wpscan.com/vulnerability/1fc0aace-ba85-4939-9007-d150960add4a -CVE-2021-24489 - https://wpscan.com/vulnerability/36e8efe8-b29f-4c9e-9dd5-3e317aa43e0c -CVE-2021-2449 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24490 - https://wpscan.com/vulnerability/4ea0127e-afef-41bf-a005-c57432f9f58c -CVE-2021-24491 - https://wpscan.com/vulnerability/ddd37827-f4c1-4806-8846-d06d9fbf23dd -CVE-2021-24492 - https://codevigilant.com/disclosure/2021/wp-plugin-handsome-testimonials/ -CVE-2021-24492 - https://wpscan.com/vulnerability/42760007-0e59-4d45-8d64-86bc0b8dacea -CVE-2021-24493 - https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e -CVE-2021-24494 - https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160 -CVE-2021-24495 - https://wpscan.com/vulnerability/d11b79a3-f762-49ab-b7c8-3174624d7638 -CVE-2021-24496 - https://wpscan.com/vulnerability/5fd1cb7f-a036-4c5b-9557-0ffd4ef6b834 -CVE-2021-24497 - https://wpscan.com/vulnerability/a1cf08fe-943a-4f14-beb0-25216011b538 -CVE-2021-24498 - https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 -CVE-2021-24499 - http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html -CVE-2021-24499 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ -CVE-2021-24499 - https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb -CVE-2021-2450 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24500 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ -CVE-2021-24500 - https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56 -CVE-2021-24501 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ -CVE-2021-24501 - https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e -CVE-2021-24502 - https://wpscan.com/vulnerability/f95c3a48-5228-4047-9b92-de985741d157 -CVE-2021-24503 - https://wpscan.com/vulnerability/18ab1570-2b4a-48a4-86e6-c1d368563691 -CVE-2021-24504 - https://wpscan.com/vulnerability/e0182508-23f4-4bdb-a1ef-1d1be38f3ad1 -CVE-2021-24505 - https://wpscan.com/vulnerability/550e08ac-4c3a-4e22-8e98-bc5bfc020ca9 -CVE-2021-24506 - https://wpscan.com/vulnerability/52c8755c-46b9-4383-8c8d-8816f03456b0 -CVE-2021-24507 - https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c -CVE-2021-24508 - https://wpscan.com/vulnerability/2b543740-d4b0-49b5-a021-454a3a72162f -CVE-2021-24509 - https://wpscan.com/vulnerability/06df2729-21da-4c22-ae1e-dda1f15bdf8f -CVE-2021-2451 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24510 - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 -CVE-2021-24511 - https://codevigilant.com/disclosure/2021/wp-plugin-purple-xmls-google-product-feed-for-woocommerce/ -CVE-2021-24511 - https://wpscan.com/vulnerability/0fa114a0-29df-4312-9138-eb9f0aedb3c5 -CVE-2021-24512 - https://wpscan.com/vulnerability/458a576e-a7ed-4758-a80c-cd08c370aaf4 -CVE-2021-24513 - https://wpscan.com/vulnerability/a1dc0ea9-51dd-43c3-bfd9-c5106193aeb6 -CVE-2021-24514 - https://wpscan.com/vulnerability/0afa78d3-2403-4e0c-8f16-5b7874b03cd2 -CVE-2021-24515 - https://wpscan.com/vulnerability/6bbea7fe-e966-406b-ad06-0206fcc6f0a0 -CVE-2021-24516 - https://wpscan.com/vulnerability/88d70e35-4c22-4bc7-b1a5-24068d55257c -CVE-2021-24517 - https://wpscan.com/vulnerability/f440edd8-94fe-440a-8a5b-e3d24dcfcbc1 -CVE-2021-24518 - https://packetstormsecurity.com/files/163472/ -CVE-2021-24518 - https://wpscan.com/vulnerability/53103cdc-a4bf-40fa-aeb1-790fc7a65f0a -CVE-2021-24519 - https://wpscan.com/vulnerability/368828f9-fdd1-4a82-8658-20e0f4c4da0c -CVE-2021-2452 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24520 - https://wpscan.com/vulnerability/f903aadd-17af-4ddf-8635-abb3338ac815 -CVE-2021-24521 - https://github.com/pang0lin/CVEproject/blob/main/wordpress_side-menu-lite_sqli.md -CVE-2021-24521 - https://wpscan.com/vulnerability/eb21ebc5-265c-4378-b2c6-62f6bc2f69cd -CVE-2021-24522 - https://wpscan.com/vulnerability/25b51add-197c-4aff-b1a8-b92fb11d8697 -CVE-2021-24523 - https://wpscan.com/vulnerability/832fe086-1d33-430b-bdb5-e444761576b2 -CVE-2021-24524 - https://wpscan.com/vulnerability/5a4774ec-c0ee-4c6b-92a6-fa10821ec336 -CVE-2021-24525 - https://wpscan.com/vulnerability/7f5659bd-50c3-4725-95f4-cf88812acf1c -CVE-2021-24526 - https://wpscan.com/vulnerability/17287d8a-ba27-42dc-9370-a931ef404995 -CVE-2021-24527 - https://wpscan.com/vulnerability/c142e738-bc4b-4058-a03e-1be6fca47207 -CVE-2021-24528 - https://wpscan.com/vulnerability/8b8d316b-96b2-4cdc-9da5-c9ea6108a85b -CVE-2021-24529 - https://wpscan.com/vulnerability/8953d931-19f9-4b73-991c-9c48db1af8b5 -CVE-2021-2453 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24530 - https://wpscan.com/vulnerability/caf36ca5-aafd-48bd-a1e5-30f3973d8eb8 -CVE-2021-24531 - https://wpscan.com/vulnerability/a5837621-ee6e-4876-9f65-82658fc0341f -CVE-2021-24533 - https://wpscan.com/vulnerability/174b2119-b806-4da4-a23d-c19b552c86cb -CVE-2021-24534 - https://wpscan.com/vulnerability/b968b9a1-67f3-4bef-a3d3-6e8942bb6570 -CVE-2021-24535 - https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f -CVE-2021-24536 - https://wpscan.com/vulnerability/e1ca9978-a44d-4717-b963-acaf56258fc9 -CVE-2021-24537 - https://wpscan.com/vulnerability/0d6b46cb-5244-486f-ad70-4023907ac9eb -CVE-2021-24538 - https://wpscan.com/vulnerability/f9911a43-0f4c-403f-9fca-7822eb693317 -CVE-2021-24539 - https://wpscan.com/vulnerability/4bda5dff-f577-4cd8-a225-c6b4c32f22b4 -CVE-2021-2454 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24540 - https://wpscan.com/vulnerability/67910e5d-ea93-418b-af81-c50d0e05d213 -CVE-2021-24541 - https://wpscan.com/vulnerability/e6602369-87f4-4454-8298-89cc69f8375c -CVE-2021-24543 - https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312 -CVE-2021-24544 - https://wpscan.com/vulnerability/4a2dddfc-6ce2-4edd-aaaa-4c130a9356d0 -CVE-2021-24545 - https://wpscan.com/vulnerability/64267134-9d8c-4e0c-b24f-d18692a5775e -CVE-2021-24546 - https://wpscan.com/vulnerability/bdc36f6a-682d-4d66-b587-92e86085d971 -CVE-2021-24547 - https://wpscan.com/vulnerability/faaeb685-ea02-4a5a-ac5f-87081efe94e0 -CVE-2021-24548 - https://wpscan.com/vulnerability/10660c95-d366-4152-9ce8-b57c57a2ec6c -CVE-2021-24549 - https://codevigilant.com/disclosure/2021/wp-plugin-aceide/ -CVE-2021-24549 - https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a -CVE-2021-2455 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24550 - https://codevigilant.com/disclosure/2021/wp-plugin-broken-link-manager/ -CVE-2021-24550 - https://wpscan.com/vulnerability/1bf65448-689c-474d-a566-c9b6797d3e4a -CVE-2021-24551 - https://codevigilant.com/disclosure/2021/wp-plugin-edit-comments/ -CVE-2021-24551 - https://wpscan.com/vulnerability/e62fb8db-384f-4384-ad24-e10eb9058ed5 -CVE-2021-24552 - https://codevigilant.com/disclosure/2021/wp-plugin-simple-events-calendar/ -CVE-2021-24552 - https://wpscan.com/vulnerability/3482a015-a5ed-4913-b516-9eae2b3f89db -CVE-2021-24553 - https://codevigilant.com/disclosure/2021/wp-plugin-timeline-calendar/ -CVE-2021-24553 - https://wpscan.com/vulnerability/14c75a00-a52b-430b-92da-5145e5aee30a -CVE-2021-24554 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/ -CVE-2021-24554 - https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad -CVE-2021-24555 - https://codevigilant.com/disclosure/2021/wp-plugin-diary-availability-calendar/ -CVE-2021-24555 - https://wpscan.com/vulnerability/8eafd84b-6214-450b-869b-0afe7cca4c5f -CVE-2021-24556 - https://codevigilant.com/disclosure/2021/wp-plugin-email-subscriber/ -CVE-2021-24556 - https://wpscan.com/vulnerability/f050aedc-f79f-4b27-acac-0cdb33b25af8 -CVE-2021-24557 - https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/ -CVE-2021-24557 - https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef -CVE-2021-24558 - https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ -CVE-2021-24558 - https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff -CVE-2021-24559 - https://wpscan.com/vulnerability/65a29976-163a-4bbf-a4e8-590ddc4b83f2/ -CVE-2021-2456 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24560 - https://wpscan.com/vulnerability/d51fcd97-e535-42dd-997a-edc2f5f12269 -CVE-2021-24561 - https://wpscan.com/vulnerability/5433ef4c-4451-4b6e-992b-69c5eccabf90 -CVE-2021-24562 - https://wpscan.com/vulnerability/d45bb744-4a0d-4af0-aa16-71f7e3ea6e00 -CVE-2021-24563 - http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html -CVE-2021-24563 - https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1 -CVE-2021-24564 - https://wpscan.com/vulnerability/b25af0e1-392f-4305-ad44-50e64ef3dbdf -CVE-2021-24565 - https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 -CVE-2021-24566 - https://jetpack.com/2021/07/22/severe-vulnerability-patched-in-woocommerce-currency-switcher/ -CVE-2021-24567 - https://wpscan.com/vulnerability/a3cd3115-2181-4e14-8b39-4de096433847/ -CVE-2021-24568 - https://wpscan.com/vulnerability/cf7c0207-adb2-44c6-9469-2b24dbfec83a -CVE-2021-24569 - https://wpscan.com/vulnerability/38053e05-4b17-4fa9-acd3-85d8529b202b -CVE-2021-2457 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24570 - https://wpscan.com/vulnerability/5c73754c-eebe-424a-9d3b-ca83eb53bf87 -CVE-2021-24571 - https://wpscan.com/vulnerability/377fd65f-3a8c-4f7a-9e40-046d52ec0eef -CVE-2021-24572 - https://wpscan.com/vulnerability/7b1ebd26-ea8b-448c-a775-66a04102e44f -CVE-2021-24574 - https://wpscan.com/vulnerability/9adf7022-5108-43b7-bf0e-a42593185b74 -CVE-2021-24575 - https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a -CVE-2021-24576 - https://wpscan.com/vulnerability/4d0c60d1-db5a-4c4f-9bdb-669975ac7210 -CVE-2021-24577 - https://wpscan.com/vulnerability/d453b547-41a8-4a6b-8349-8686b7054805 -CVE-2021-24578 - https://wpscan.com/vulnerability/69351798-c790-42d4-9485-1813cd325769 -CVE-2021-24579 - https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 -CVE-2021-2458 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24580 - https://wpscan.com/vulnerability/2faccd1b-4b1c-4b3e-b917-de2d05e860f8 -CVE-2021-24581 - https://wpscan.com/vulnerability/75abd073-b45f-4fe6-8501-7a6d0163f78d -CVE-2021-24582 - https://wpscan.com/vulnerability/5a5293ed-ddcb-4a63-9420-09942e7d69c2 -CVE-2021-24583 - https://wpscan.com/vulnerability/7aec4ef4-db3b-41fb-9177-88ce9d37bca6 -CVE-2021-24584 - https://wpscan.com/vulnerability/60eadf75-8298-49de-877e-ce103fc34d58 -CVE-2021-24585 - https://wpscan.com/vulnerability/cd288a92-903b-47c9-83ac-8e5b677e949b -CVE-2021-24586 - https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85 -CVE-2021-24587 - https://wpscan.com/vulnerability/bb5d94ad-e1ce-44e2-8403-d73fe75a146a -CVE-2021-24588 - https://wpscan.com/vulnerability/dc2ce546-9da1-442c-8ee2-cd660634501f -CVE-2021-24590 - https://wpscan.com/vulnerability/d6846774-1958-4c8d-bb64-af0d8c46e6e7 -CVE-2021-24591 - https://wpscan.com/vulnerability/c5cbe3b4-2829-4fd2-8194-4b3a2ae0e257 -CVE-2021-24592 - https://wpscan.com/vulnerability/9579ff13-9597-4a77-8cb9-997e35265d22 -CVE-2021-24593 - https://wpscan.com/vulnerability/309296d4-c397-4fc7-85fb-a28b5b5b6a8d -CVE-2021-24594 - https://wpscan.com/vulnerability/cf7b0f07-8b9b-40a1-ba7b-e8d34f515a6b -CVE-2021-24595 - https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052 -CVE-2021-24596 - https://wpscan.com/vulnerability/b5def0e7-2b4a-43e0-8175-28b28aa2f8ae -CVE-2021-24597 - https://wpscan.com/vulnerability/37554d0e-68e2-4df9-8c59-65f5cd7f184e -CVE-2021-24598 - https://wpscan.com/vulnerability/365c09a7-0b10-4145-a415-5c0e9f429ae0 -CVE-2021-24599 - https://wpscan.com/vulnerability/625a272f-5c69-4f6a-8eee-32f70cd4a558 -CVE-2021-2460 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24600 - https://wpscan.com/vulnerability/413b3a2e-1c05-45ec-b00f-1c137a1ae33e -CVE-2021-24601 - https://wpscan.com/vulnerability/bb437706-a918-4d66-b027-b083ab486074 -CVE-2021-24602 - https://wpscan.com/vulnerability/5fd2548a-08de-4417-bff1-f174dab718d5 -CVE-2021-24603 - https://wpscan.com/vulnerability/72aea0e5-1fa7-4827-a173-59982202d323 -CVE-2021-24604 - https://wpscan.com/vulnerability/d084c5b1-45f1-4e7e-b3e9-3c98ae4bce9c -CVE-2021-24605 - https://wpscan.com/vulnerability/e0be384c-3e63-49f6-b2ab-3024dcd88686 -CVE-2021-24606 - https://wpscan.com/vulnerability/fe49f48a-f97a-44fe-8d71-be08e7ce4f83 -CVE-2021-24607 - https://wpscan.com/vulnerability/efa7d91a-447b-4fd8-aa21-5364b177fee9 -CVE-2021-24608 - https://wpscan.com/vulnerability/75305ea8-730b-4caf-a3c6-cb94adee683c -CVE-2021-24609 - https://wpscan.com/vulnerability/8b639743-3eb5-4f74-a156-76cb657bbe05 -CVE-2021-2461 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24610 - http://packetstormsecurity.com/files/164306/WordPress-TranslatePress-2.0.8-Cross-Site-Scripting.html -CVE-2021-24610 - https://wpscan.com/vulnerability/b87fcc2f-c2eb-4e23-9757-d1c590f26d3f -CVE-2021-24611 - https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd -CVE-2021-24612 - https://wpscan.com/vulnerability/12f1ed97-d392-449d-b25c-42d241693888 -CVE-2021-24613 - https://wpscan.com/vulnerability/0b8c5947-bc73-448e-8f10-a4f4456e4000 -CVE-2021-24614 - https://wpscan.com/vulnerability/e8b5c609-dc67-4dce-b6bb-7d63c0c2a014 -CVE-2021-24615 - https://wpscan.com/vulnerability/9d48313b-76d7-4252-9b81-2fdd0373561b -CVE-2021-24616 - https://wpscan.com/vulnerability/04eaf380-c345-425f-8800-142e3f4745a9 -CVE-2021-24617 - https://wpscan.com/vulnerability/3e262cd7-ca64-4190-8d8c-38b07bbe63e0 -CVE-2021-24618 - https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49 -CVE-2021-24619 - https://wpscan.com/vulnerability/f360f383-0646-44ca-b49e-e2258dfbf3a6 -CVE-2021-2462 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24620 - https://wpscan.com/vulnerability/1f2b3c4a-f7e9-4d22-b71e-f6b051fd8349 -CVE-2021-24621 - https://wpscan.com/vulnerability/bfbb32ac-9ef9-46de-8e5e-7d6d6fb868d8 -CVE-2021-24622 - https://wpscan.com/vulnerability/41a2c72c-7db1-473a-8844-47f6ae9d0594 -CVE-2021-24623 - https://wpscan.com/vulnerability/41d9027c-a982-44c7-889e-721333496b5c -CVE-2021-24624 - https://wpscan.com/vulnerability/d79d2f6a-257a-4c9e-b971-9837abd4211c -CVE-2021-24625 - https://codevigilant.com/disclosure/2021/wp-plugin-catalog/ -CVE-2021-24625 - https://wpscan.com/vulnerability/33e4d7c6-fa6f-459f-84b9-732ec40088b8 -CVE-2021-24626 - https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/ -CVE-2021-24626 - https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165 -CVE-2021-24627 - https://codevigilant.com/disclosure/2021/wp-plugin-g-auto-hyperlink/ -CVE-2021-24627 - https://wpscan.com/vulnerability/c04ea768-150f-41b8-b08c-78d1ae006bbb -CVE-2021-24628 - https://codevigilant.com/disclosure/2021/wp-plugin-mwp-forms/ -CVE-2021-24628 - https://wpscan.com/vulnerability/d742ab35-4e2d-42a8-bebc-b953b2e10e3c -CVE-2021-24629 - https://codevigilant.com/disclosure/2021/wp-plugin-post-content-xmlrpc/ -CVE-2021-24629 - https://wpscan.com/vulnerability/fb42980c-93e5-42d5-a478-c2b348eaea67 -CVE-2021-2463 - https://www.oracle.com/security-alerts/cpujul2021.html -CVE-2021-24630 - https://codevigilant.com/disclosure/2021/wp-plugin-schreikasten/ -CVE-2021-24630 - https://wpscan.com/vulnerability/a0787dae-a4b7-4248-9960-aaffabfaeb9f -CVE-2021-24631 - https://codevigilant.com/disclosure/2021/wp-plugin-unlimited-popups/ -CVE-2021-24631 - https://wpscan.com/vulnerability/9841176d-1d37-4636-9144-0ca42b6f3605 -CVE-2021-24632 - https://wpscan.com/vulnerability/55cd6d5e-92c1-407a-8c0f-f89d415ebb66 -CVE-2021-24633 - https://wpscan.com/vulnerability/431901eb-0f95-4033-b943-324e6d3844a5 -CVE-2021-24634 - https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288 -CVE-2021-24635 - https://wpscan.com/vulnerability/854b23d9-e3f8-4835-8d29-140c580f11c9 -CVE-2021-24636 - https://wpscan.com/vulnerability/db8ace7b-7a44-4620-9fe8-ddf0ad520f5e -CVE-2021-24637 - https://wpscan.com/vulnerability/dd2b3f22-5e8b-41cf-bcb8-d2e673e1d21e -CVE-2021-24638 - https://wpscan.com/vulnerability/c783a746-f1fe-4d68-9d0a-477de5dbb35c -CVE-2021-24639 - https://wpscan.com/vulnerability/1ada2a96-32aa-4e37-809c-705db6026e0b -CVE-2021-2464 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-24640 - https://wpscan.com/vulnerability/e61dd498-5d0e-45ce-b660-a36c576f8d78 -CVE-2021-24641 - https://wpscan.com/vulnerability/972f8c5d-22b7-42de-a981-2e5acb72297b -CVE-2021-24642 - https://wpscan.com/vulnerability/8d9129ab-33c3-44ee-b150-f7552d88e658 -CVE-2021-24643 - https://wpscan.com/vulnerability/240ddde9-095f-4919-832a-50279196dac5 -CVE-2021-24644 - https://wpscan.com/vulnerability/5a363eeb-9510-4535-97e2-9dfd3b10d511 -CVE-2021-24645 - https://wpscan.com/vulnerability/b15744de-bf56-4e84-9427-b5652d123c15 -CVE-2021-24646 - https://wpscan.com/vulnerability/36aae14e-4bdf-4da6-a0f9-d71935105d45 -CVE-2021-24647 - https://wpscan.com/vulnerability/40d347b1-b86e-477d-b4c6-da105935ce37 -CVE-2021-24648 - https://wpscan.com/vulnerability/a3573212-2a98-4504-b8f4-b4d46655e17c -CVE-2021-24649 - https://wpscan.com/vulnerability/9486744e-ab24-44e4-b06e-9e0b4be132e2 -CVE-2021-24651 - https://wpscan.com/vulnerability/24f933b0-ad57-4ed3-817d-d637256e2fb1 -CVE-2021-24652 - https://wpscan.com/vulnerability/5375bd3e-a30d-4f24-9b17-470b28a8231c -CVE-2021-24653 - https://wpscan.com/vulnerability/bfa8f46f-d323-4a2d-b875-39cd9b4cee0a -CVE-2021-24654 - https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2 -CVE-2021-24655 - https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f -CVE-2021-24656 - https://wpscan.com/vulnerability/8e897dcc-6e52-440b-83ad-b119c55751c7 -CVE-2021-24657 - https://wpscan.com/vulnerability/c789ca04-d88c-4789-8be1-812888f0c8f8 -CVE-2021-24658 - https://wpscan.com/vulnerability/ec70f02b-02a1-4511-949e-68f2d9d37ca8 -CVE-2021-24659 - https://wpscan.com/vulnerability/5f2fe510-7513-4d33-82d9-3107b3b3f2ae -CVE-2021-24660 - https://wpscan.com/vulnerability/af14ac23-843d-4f80-beaf-237618109edd -CVE-2021-24661 - https://wpscan.com/vulnerability/8d966ff1-9c88-43c7-8f4b-93c88e214677 -CVE-2021-24662 - https://wpscan.com/vulnerability/8a74a2a0-3d8c-427f-9a83-0160d652c5f0 -CVE-2021-24663 - https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a -CVE-2021-24664 - http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html -CVE-2021-24664 - https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669 -CVE-2021-24665 - https://wpscan.com/vulnerability/42a8947f-2ae5-4f12-bd3d-ab3716501df5 -CVE-2021-24666 - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe -CVE-2021-24667 - https://wpscan.com/vulnerability/5925b263-6d6f-4a03-a98a-620150dff8f7 -CVE-2021-24668 - https://wpscan.com/vulnerability/519205ff-2ff6-41e4-9e95-475ab2ce35b9 -CVE-2021-24669 - https://wpscan.com/vulnerability/b97afbe8-c9ae-40a2-81e5-b1d7a6b31831 -CVE-2021-24670 - https://wpscan.com/vulnerability/a092548f-1ad5-44d3-9901-cdf4ebcee40a -CVE-2021-24671 - https://wpscan.com/vulnerability/4e51dffa-027d-4f3d-a190-dcc5269f6435 -CVE-2021-24672 - https://wpscan.com/vulnerability/762c506a-f57d-450f-99c0-32d750306ddc -CVE-2021-24673 - https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755 -CVE-2021-24674 - https://wpscan.com/vulnerability/26965878-c4c9-4f43-9e9a-6e58d6b46ef2 -CVE-2021-24675 - https://wpscan.com/vulnerability/9b9a55d5-c121-4b5b-80df-f9f419c0dc55 -CVE-2021-24676 - https://wpscan.com/vulnerability/59589e74-f901-4f4d-81de-26ad19d1b7fd -CVE-2021-24677 - https://wpscan.com/vulnerability/40c7e424-9a97-41ab-a312-2a06b607609a -CVE-2021-24678 - https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd -CVE-2021-24679 - https://wpscan.com/vulnerability/7c6c0aac-1733-4abc-8e95-05416636a127 -CVE-2021-24680 - https://wpscan.com/vulnerability/30f2a0d5-7959-436c-9860-2535020e82d3 -CVE-2021-24681 - https://wpscan.com/vulnerability/9ebdd1df-1d6f-4399-8b0f-77a79f841464 -CVE-2021-24682 - https://wpscan.com/vulnerability/7dfdd50d-77f9-4f0a-8673-8f033c0b0e05 -CVE-2021-24683 - https://wpscan.com/vulnerability/54f95b51-5804-4bee-9e4a-f73b8ef9bbd5 -CVE-2021-24684 - https://wpscan.com/vulnerability/b5295bf9-8cf6-416e-b215-074742a5fc63 -CVE-2021-24685 - https://wpscan.com/vulnerability/972ecde8-3d44-4dd9-81e3-643d8737434f -CVE-2021-24686 - https://wpscan.com/vulnerability/38018695-901d-48d9-b39a-7c00df7f0a4b -CVE-2021-24687 - https://wpscan.com/vulnerability/300ba418-63ed-4c03-9031-263742ed522e -CVE-2021-24688 - https://wpscan.com/vulnerability/78bc7cf1-7563-4ada-aec9-af4c943e3e2c -CVE-2021-24689 - https://wpscan.com/vulnerability/31824250-e0d4-4285-97fa-9880b363e075 -CVE-2021-24690 - https://wpscan.com/vulnerability/b2f473b4-268c-48b7-95e8-0a8eeaa3fc28 -CVE-2021-24691 - https://wpscan.com/vulnerability/ecf6a082-b563-42c4-9d8c-3757aa6b696f -CVE-2021-24692 - https://wpscan.com/vulnerability/4c9fe97e-3d9b-4079-88d9-34e2d0605215 -CVE-2021-24693 - https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7 -CVE-2021-24694 - https://wpscan.com/vulnerability/9d0d8f8c-f8fb-457f-b557-255a052ccc32 -CVE-2021-24695 - https://wpscan.com/vulnerability/d7bdaf2b-cdd9-4aee-b1bb-01728160ff25 -CVE-2021-24696 - https://wpscan.com/vulnerability/e94772af-39ac-4743-a556-52351ebda9fe -CVE-2021-24697 - https://wpscan.com/vulnerability/ef9ae513-6c29-45c2-b5ae-4a06a217c499 -CVE-2021-24698 - https://wpscan.com/vulnerability/1fda1356-77d8-4e77-9ee6-8f9ceeb3d380 -CVE-2021-24699 - https://wpscan.com/vulnerability/4f5c3f75-0501-4a1a-95ea-cbfd3fc96852 -CVE-2021-24700 - https://wpscan.com/vulnerability/1d489b05-296e-4268-8082-9737608f9b41 -CVE-2021-24701 - https://wpscan.com/vulnerability/f7b95789-43f2-42a5-95e6-eb7accbd5ed3 -CVE-2021-24702 - https://wpscan.com/vulnerability/30635cc9-4415-48bb-9c67-ea670ea1b942 -CVE-2021-24703 - https://wpscan.com/vulnerability/4ed8296e-1306-481f-9a22-723b051122c0 -CVE-2021-24704 - https://wpscan.com/vulnerability/60843022-fe43-4608-8859-9c9109b35b42 -CVE-2021-24705 - https://wpscan.com/vulnerability/eca883d8-9499-4dbd-8fe1-4447fc2ca28a -CVE-2021-24706 - https://wpscan.com/vulnerability/ecddb611-de75-41d5-a470-8fc2cf0780a4 -CVE-2021-24707 - https://wpscan.com/vulnerability/0be5e06e-4ff1-43d2-8ba7-2530519d517e -CVE-2021-24708 - https://wpscan.com/vulnerability/4560eef4-253b-49a4-8e20-9520c45c6f7f -CVE-2021-24709 - https://wpscan.com/vulnerability/df74ed76-af9e-47a8-9a4d-c5c57e9e0f91 -CVE-2021-2471 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-2471 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24710 - https://wpscan.com/vulnerability/84e83d52-f69a-4de2-80c8-7c1996b30a04 -CVE-2021-24711 - https://wpscan.com/vulnerability/3351bc30-e5ff-471f-8d1c-b1bcdf419937 -CVE-2021-24712 - https://wpscan.com/vulnerability/e677e51b-0d3f-44a5-9fcd-c159786b9926 -CVE-2021-24713 - https://wpscan.com/vulnerability/4a90be69-41eb-43e9-962d-34316497b4df -CVE-2021-24714 - https://wpscan.com/vulnerability/a8d314b9-26ac-4b56-a85c-a2528e55e73a -CVE-2021-24715 - https://wpscan.com/vulnerability/da66d54e-dda8-4aa8-8d27-b8b87100bb21 -CVE-2021-24716 - https://wpscan.com/vulnerability/576cc93d-1499-452b-97dd-80f69002e2a0 -CVE-2021-24717 - https://wpscan.com/vulnerability/5916ea42-eb33-463d-8528-2a142805c91f -CVE-2021-24718 - https://wpscan.com/vulnerability/60c9d78f-ae2c-49e0-aca3-6dce1bd8f697 -CVE-2021-24719 - http://packetstormsecurity.com/files/164548/WordPress-Enfold-Theme-4.8.3-Cross-Site-Scripting.html -CVE-2021-24719 - https://wpscan.com/vulnerability/a53e213f-6011-47f8-93e6-aa5ad30e857e -CVE-2021-24720 - https://wpscan.com/vulnerability/9de5cc51-f64c-4475-a0f4-d932dc4364a6 -CVE-2021-24721 - https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 -CVE-2021-24722 - https://wpscan.com/vulnerability/14b29450-2450-4b5f-8630-bb2cbfbd0a83 -CVE-2021-24723 - https://wpscan.com/vulnerability/0a46ae96-41e5-4b52-91c3-409f7387aecc -CVE-2021-24724 - https://wpscan.com/vulnerability/c1194a1e-bf33-4f3f-a4a6-27b76b1b1eeb -CVE-2021-24724 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29235 -CVE-2021-24725 - https://wpscan.com/vulnerability/01483284-57f5-4ae9-b5f1-ae26b623571f -CVE-2021-24725 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29225 -CVE-2021-24726 - https://wpscan.com/vulnerability/f85b6033-d7c1-45b7-b3b0-8967f7373bb8 -CVE-2021-24726 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29176 -CVE-2021-24727 - https://wpscan.com/vulnerability/ffa1f718-f2c5-48ef-8eea-33a18a628a2c -CVE-2021-24727 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29174 -CVE-2021-24728 - https://wpscan.com/vulnerability/2277d335-1c90-4fa8-b0bf-25873c039c38 -CVE-2021-24728 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29172 -CVE-2021-24729 - https://wpscan.com/vulnerability/5d70818e-730d-40c9-a2db-652052a5fd5c -CVE-2021-24730 - https://wpscan.com/vulnerability/d5534ff9-c4af-46b7-8852-0f3dfd644855 -CVE-2021-24731 - https://wpscan.com/vulnerability/6bed00e4-b363-43b8-a392-d068d342151a -CVE-2021-24732 - https://wpscan.com/vulnerability/9425a9b2-e9b8-41f5-a3ca-623b6da0297c -CVE-2021-24733 - https://wpscan.com/vulnerability/a7fa5896-5a1d-44c6-985c-e4abcc53da0e -CVE-2021-24734 - https://wpscan.com/vulnerability/fb007191-b008-4d19-b896-55fbee2a3cf7 -CVE-2021-24735 - https://wpscan.com/vulnerability/dcbcf6e7-e5b3-498b-9f5e-7896d309441f -CVE-2021-24736 - https://wpscan.com/vulnerability/d72275bd-0c66-4b2a-940d-d5256b5426cc -CVE-2021-24737 - https://wpscan.com/vulnerability/f51a350c-c46d-4d52-b787-762283625d0b -CVE-2021-24738 - https://wpscan.com/vulnerability/2c3d8c21-ecd4-41ba-8183-2ecbd9a3df25 -CVE-2021-24739 - https://wpscan.com/vulnerability/2afadc76-93ad-47e1-a224-e442ac41cbce -CVE-2021-2474 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24740 - https://wpscan.com/vulnerability/e6cf694d-c4ae-4b91-97c0-a6bdbafc7d60 -CVE-2021-24741 - https://medium.com/@lijohnjefferson/multiple-sql-injection-unauthenticated-in-support-board-v-3-3-3-3e9b4214a4f9 -CVE-2021-24741 - https://wpscan.com/vulnerability/ccf293ec-7607-412b-b662-5e237b8690ca -CVE-2021-24742 - https://wpscan.com/vulnerability/8dfc86e4-56a0-4e30-9050-cf3f328ff993 -CVE-2021-24743 - https://wpscan.com/vulnerability/998395f0-f176-45b9-baf7-b50d30538c7d -CVE-2021-24744 - https://wpscan.com/vulnerability/702a4283-1fd6-4186-9db7-6ad387d714ea -CVE-2021-24745 - https://wpscan.com/vulnerability/a965aeca-d8f9-4070-aa0d-9c9b95493dda -CVE-2021-24746 - https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa -CVE-2021-24747 - https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea -CVE-2021-24748 - https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 -CVE-2021-24749 - https://wpscan.com/vulnerability/4b4e417d-0ae2-4c3c-81e6-4dcf39eb5697 -CVE-2021-2475 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24750 - http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html -CVE-2021-24750 - https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de -CVE-2021-24751 - https://wpscan.com/vulnerability/e0131980-d2d3-4780-8a68-a81ee8c90b7a -CVE-2021-24752 - https://wpscan.com/vulnerability/181a729e-fffe-457c-9e8d-a4343fd2e630 -CVE-2021-24753 - https://wpscan.com/vulnerability/be7b102f-3982-46bd-a79c-203498f7c820 -CVE-2021-24754 - https://wpscan.com/vulnerability/132118aa-4b72-4eaa-8aa1-6ad7b0c7f495 -CVE-2021-24755 - https://wpscan.com/vulnerability/01419d03-54d6-413d-9a67-64c63c26d741 -CVE-2021-24756 - https://wpscan.com/vulnerability/0cea0717-8f54-4f1c-b3ee-aff7dd91bf59 -CVE-2021-24757 - https://wpscan.com/vulnerability/352a9e05-2d5f-4bf7-8da9-85621fb15d91 -CVE-2021-24758 - https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 -CVE-2021-24759 - https://wpscan.com/vulnerability/38274ef2-5100-4669-9544-a42346b6727d -CVE-2021-2476 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24760 - https://wpscan.com/vulnerability/aebf821f-1724-4e4c-8d42-5a94e509d271 -CVE-2021-24761 - https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2 -CVE-2021-24762 - http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html -CVE-2021-24762 - https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad -CVE-2021-24763 - https://wpscan.com/vulnerability/c73c7694-1cee-4f26-a425-9c336adce52b -CVE-2021-24764 - https://wpscan.com/vulnerability/c2f8e9b9-c044-4c45-8d17-e628e9cb5d59 -CVE-2021-24765 - https://wpscan.com/vulnerability/4440e7ca-1a55-444d-8f6c-04153302d750 -CVE-2021-24766 - https://wpscan.com/vulnerability/cc13db1e-5f7f-49b2-81da-f913cfe70543 -CVE-2021-24767 - https://wpscan.com/vulnerability/0b35ad4a-3d94-49b1-a98d-07acf8dd4962 -CVE-2021-24768 - https://wpscan.com/vulnerability/3673e13f-7ce6-4d72-b179-ae4bab55514c -CVE-2021-24769 - https://wpscan.com/vulnerability/a2f211af-5373-425f-9964-ebbf5efde87b -CVE-2021-2477 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24770 - https://wpscan.com/vulnerability/4365c813-4bd7-4c7c-a15b-ef9a42d32b26 -CVE-2021-24771 - https://wpscan.com/vulnerability/a6d57fda-79a7-4bf8-b18e-8cf0a4efd1b3 -CVE-2021-24772 - https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d -CVE-2021-24773 - https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 -CVE-2021-24774 - https://wpscan.com/vulnerability/f80ef09a-d3e2-4d62-8532-f0ebe59ae110 -CVE-2021-24775 - https://wpscan.com/vulnerability/c6f24afe-d273-4f87-83ca-a791a385b06b -CVE-2021-24776 - https://wpscan.com/vulnerability/a59ebab8-5df7-4093-b853-da9472f53508 -CVE-2021-24777 - https://wpscan.com/vulnerability/2dfde2ef-1b33-4dc9-aa3e-02d319effb3a -CVE-2021-24778 - https://wpscan.com/vulnerability/e37f9aa6-e409-4155-b8e4-566c5bce58d6 -CVE-2021-24779 - https://wpscan.com/vulnerability/8d0e65ee-fdd1-4fd6-9a27-01664c703d90 -CVE-2021-2478 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24780 - https://wpscan.com/vulnerability/8764e550-4127-471e-84e6-494d6106a3b0 -CVE-2021-24781 - https://wpscan.com/vulnerability/3550ba54-7786-4ad9-aeb1-1c0750f189d0 -CVE-2021-24782 - https://wpscan.com/vulnerability/5cd846df-1d8b-488d-a691-b76850e8687a -CVE-2021-24783 - https://wpscan.com/vulnerability/de51b970-ab13-41a6-a479-a92cd0e70b71 -CVE-2021-24784 - https://wpscan.com/vulnerability/2e9132b5-f8cd-4acc-839c-188d79277270 -CVE-2021-24785 - https://wpscan.com/vulnerability/3957056c-df25-41f7-ab0d-1d09222f2fa5 -CVE-2021-24786 - https://wpscan.com/vulnerability/a6571f16-66d2-449e-af83-1c6ddd56edfa -CVE-2021-24787 - https://wpscan.com/vulnerability/c89bf498-f384-49de-820e-6cbd70390db2 -CVE-2021-24788 - https://wpscan.com/vulnerability/f8fdff8a-f158-46e8-94f1-f051a6c5608b -CVE-2021-24789 - https://wpscan.com/vulnerability/e8550ccd-3898-4e27-aca9-ade89823ff4d -CVE-2021-2479 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24790 - https://wpscan.com/vulnerability/adc5dd9b-0781-4cea-8cc5-2c10ac35b968 -CVE-2021-24791 - https://wpscan.com/vulnerability/d55caa9b-d50f-4c13-bc69-dc475641735f -CVE-2021-24792 - https://wpscan.com/vulnerability/29514d8e-9d1c-4fb6-b378-f6b7374989ca -CVE-2021-24793 - https://wpscan.com/vulnerability/eeedbb3b-ae10-4472-a1d3-f196f95b9d96 -CVE-2021-24794 - https://wpscan.com/vulnerability/651dc567-943e-4f57-8ec4-6eee466785f5 -CVE-2021-24795 - https://wpscan.com/vulnerability/ef3c1d4f-53a4-439e-9434-b3b4adb687a4 -CVE-2021-24796 - https://wpscan.com/vulnerability/d973dc0f-3cb4-408d-a8b0-01abeb9ef951 -CVE-2021-24797 - https://wpscan.com/vulnerability/0eb07cc8-8a19-4e01-ab90-844495413453 -CVE-2021-24798 - https://wpscan.com/vulnerability/58c9a007-42db-4142-b096-0b9ba8850f87 -CVE-2021-24799 - https://wpscan.com/vulnerability/6010ce4e-3e46-4cc1-96d8-560b30b605ed -CVE-2021-2480 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24800 - https://wpscan.com/vulnerability/cd37ca81-d683-4955-bc97-60204cb9c346 -CVE-2021-24801 - https://wpscan.com/vulnerability/78405609-2105-4011-b18e-1ba5f438972d -CVE-2021-24802 - https://wpscan.com/vulnerability/d92db61f-341c-4f3f-b962-326194ddbd1e -CVE-2021-24803 - https://wpscan.com/vulnerability/97adac02-4163-48d4-ba14-0b1badfd3d42 -CVE-2021-24804 - https://wpscan.com/vulnerability/6f015e8e-462b-4ef7-a9a1-bb91e7d28e37 -CVE-2021-24805 - https://wpscan.com/vulnerability/a6be3fcf-60f7-4f13-b773-871a7296113c -CVE-2021-24806 - https://wpscan.com/vulnerability/2746101e-e993-42b9-bd6f-dfd5544fa3fe -CVE-2021-24807 - https://medium.com/@lijohnjefferson/cve-2021-24807-6bc22af2a444 -CVE-2021-24807 - https://wpscan.com/vulnerability/19d101aa-4b60-4db4-a33b-86c826b288b0 -CVE-2021-24808 - https://wpscan.com/vulnerability/53ff82ec-00ec-4b20-8f60-db9db8c025b4 -CVE-2021-24809 - https://wpscan.com/vulnerability/e186fef4-dca0-461f-b539-082c13a68d13 -CVE-2021-2481 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24810 - https://wpscan.com/vulnerability/94670822-0251-4e77-8d7f-b47aa7232e52 -CVE-2021-24811 - https://wpscan.com/vulnerability/000e65f1-89cd-4dd5-a09d-5febd9fdfbdb -CVE-2021-24812 - https://wpscan.com/vulnerability/6bc8fff1-ff10-4175-8a46-563f0f26f96a -CVE-2021-24813 - https://wpscan.com/vulnerability/a1fe0783-7a88-4d75-967f-cef970b73752 -CVE-2021-24814 - https://wpscan.com/vulnerability/94ab34f6-86a9-4e14-bf86-26ff6cb4383e -CVE-2021-24815 - https://wpscan.com/vulnerability/08f4ebf5-6bbe-4fb0-a9d2-c8a994afe39b -CVE-2021-24816 - https://wpscan.com/vulnerability/5f63d677-20f3-4fe0-bb90-048b6898e6cd -CVE-2021-24817 - https://wpscan.com/vulnerability/ccb27d2e-2d2a-40d3-ba7e-bcd5e5012a9a -CVE-2021-24818 - https://wpscan.com/vulnerability/7cd524ed-5eb9-4d6b-b4d2-3d4be6b57879 -CVE-2021-24819 - https://wpscan.com/vulnerability/c97b218c-b430-4301-884f-f64d0dd08f07 -CVE-2021-2482 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24820 - https://wpscan.com/vulnerability/47652b24-a6f0-4bbc-834e-496b88523fe7 -CVE-2021-24821 - https://wpscan.com/vulnerability/f0915b66-0b99-4aeb-9fba-759cafaeb0cb -CVE-2021-24822 - https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e -CVE-2021-24823 - https://wpscan.com/vulnerability/1bdebd9e-a7f2-4f55-b5b0-185eb619ebaf -CVE-2021-24824 - https://wpscan.com/vulnerability/7b4d4675-6089-4435-9b56-31496adc4767 -CVE-2021-24825 - https://wpscan.com/vulnerability/be9d6f82-c972-459a-bacf-65b3dfb11a09 -CVE-2021-24826 - https://wpscan.com/vulnerability/e247d78a-7243-486c-a017-7471a8dcb800 -CVE-2021-24827 - https://wpscan.com/vulnerability/36cc5151-1d5e-4874-bcec-3b6326235db1 -CVE-2021-24828 - https://wpscan.com/vulnerability/6f9d1ee5-7ed7-4304-96a2-611b2f0081d2 -CVE-2021-24829 - https://wpscan.com/vulnerability/cc6585c8-5798-48a1-89f7-a3337f56df3f -CVE-2021-2483 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24830 - https://wpscan.com/vulnerability/1c46373b-d43d-4d18-b0ae-3711fb0be0f9 -CVE-2021-24831 - https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900 -CVE-2021-24832 - https://wpscan.com/vulnerability/cf031259-b76e-475c-8a8e-fa6a0d9e7bb4 -CVE-2021-24833 - https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34 -CVE-2021-24835 - https://wpscan.com/vulnerability/c493ac9c-67d1-48a9-be21-824b1a1d56c2 -CVE-2021-24836 - https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f -CVE-2021-24837 - https://wpscan.com/vulnerability/5fea3ac3-d599-41f3-8f76-08f0d3552af1 -CVE-2021-24838 - https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82 -CVE-2021-24839 - https://wpscan.com/vulnerability/5e6e63c2-2675-4b8d-9b94-c16c525a1a0e -CVE-2021-2484 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24840 - https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef -CVE-2021-24841 - https://mikadmin.fr/tech/XSS-Stored-Helpful-5b10bc7f40ab319f9797eb4abad4f420660.pdf -CVE-2021-24841 - https://wpscan.com/vulnerability/55d11acf-8c47-40da-be47-24f74fd7566e -CVE-2021-24842 - https://wpscan.com/vulnerability/054bd981-dbdd-47dd-bad0-fa327e5860a2 -CVE-2021-24843 - https://wpscan.com/vulnerability/b71f53d7-6b9e-458c-8754-576ad2a52f7d -CVE-2021-24844 - https://wpscan.com/vulnerability/ebd6d13c-572e-4861-b7d1-a7a87332ce0d -CVE-2021-24845 - https://wpscan.com/vulnerability/ab857454-7c7c-454d-9c7f-1db767961e5f -CVE-2021-24846 - https://wpscan.com/vulnerability/a1e7cd2b-8400-4c5d-8b47-a8ccd1e21675 -CVE-2021-24847 - https://wpscan.com/vulnerability/679ca6ed-2343-43f3-9c3e-2c12e12407c1 -CVE-2021-24848 - https://wpscan.com/vulnerability/156d4faf-7d34-4d9f-a654-9064d4eb3aea -CVE-2021-24849 - https://wpscan.com/vulnerability/763c08a0-4b2b-4487-b91c-be6cc2b9322e -CVE-2021-2485 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-24850 - https://wpscan.com/vulnerability/2d6f9be0-b9fd-48e5-bd68-94eeb3822c0a -CVE-2021-24851 - https://wpscan.com/vulnerability/919e67a1-3a50-4940-bb4f-5c5cc2017a83 -CVE-2021-24852 - https://wpscan.com/vulnerability/1069fb40-44f0-468e-9fd4-7a0fb8cde5a5 -CVE-2021-24853 - https://wpscan.com/vulnerability/240bed24-0315-4bbf-ba17-e4947e5ecacb -CVE-2021-24854 - https://wpscan.com/vulnerability/0d422397-69ff-4d05-aafa-7a572e460e5f -CVE-2021-24855 - https://wpscan.com/vulnerability/49328498-d3a0-4d27-8a52-24054b5e42f3 -CVE-2021-24856 - https://wpscan.com/vulnerability/8fd483fb-d399-4b4f-b4ef-bbfad1b5cf1b -CVE-2021-24857 - https://wpscan.com/vulnerability/518204d8-fbf5-4bfa-9db5-835f908f8d8e -CVE-2021-24858 - https://wpscan.com/vulnerability/9bd1c040-09cc-4c2d-88c9-8406a653a48b -CVE-2021-24859 - https://wpscan.com/vulnerability/958f44a5-07e7-4349-9212-2a039a082ba0 -CVE-2021-24860 - https://wpscan.com/vulnerability/d5891973-37d0-48cb-a5a3-a26c771b3369 -CVE-2021-24861 - https://wpscan.com/vulnerability/9a50d5d0-7a50-47d1-a8f9-e0eb217919d9 -CVE-2021-24862 - http://packetstormsecurity.com/files/165746/WordPress-RegistrationMagic-V-5.0.1.5-SQL-Injection.html -CVE-2021-24862 - https://wpscan.com/vulnerability/7d3af3b5-5548-419d-aa32-1f7b51622615 -CVE-2021-24863 - https://wpscan.com/vulnerability/1e4dd002-6c96-44f9-bd55-61359265f7ae -CVE-2021-24864 - https://wpscan.com/vulnerability/e3b9ee9f-602d-4e9d-810c-e1e3ba604464 -CVE-2021-24865 - https://wpscan.com/vulnerability/055a2dcf-77ec-4e54-be7d-9c47f7730d1b -CVE-2021-24866 - https://wpscan.com/vulnerability/a9073616-ffd6-4956-b2e7-0fb2eac6e9b5 -CVE-2021-24868 - https://wpscan.com/vulnerability/45a43927-a427-46bc-9c61-e0b8532c8138 -CVE-2021-24869 - https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/ -CVE-2021-24870 - https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/ -CVE-2021-24871 - https://wpscan.com/vulnerability/28007c80-dc14-4987-a52c-f2a05cfe5905 -CVE-2021-24872 - https://wpscan.com/vulnerability/ec23734a-5ea7-4e46-aba9-3dee4e6dffb6 -CVE-2021-24873 - https://wpscan.com/vulnerability/19980b57-1954-4a29-b2c2-43eadf758ed3 -CVE-2021-24874 - https://wpscan.com/vulnerability/28d34cc1-2294-4409-a60f-c8c441eb3f2d -CVE-2021-24875 - https://wpscan.com/vulnerability/652efc4a-f931-4668-ae74-a58b288a5715 -CVE-2021-24876 - https://wpscan.com/vulnerability/e77c2493-993d-418d-9629-a1f07b5a2b6f -CVE-2021-24877 - https://wpscan.com/vulnerability/b09fe120-ab9b-44f2-b50d-3b4b299d6d15 -CVE-2021-24878 - https://wpscan.com/vulnerability/d2f1fd60-5e5e-4e38-9559-ba2d14ae37bf -CVE-2021-24879 - https://wpscan.com/vulnerability/6dfb4f61-c8cb-40ad-812f-139482be0fb4 -CVE-2021-24880 - https://wpscan.com/vulnerability/09226067-0289-4d4f-9450-6f2c2ba058a0 -CVE-2021-24881 - https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 -CVE-2021-24882 - https://wpscan.com/vulnerability/6d71816c-8267-4b84-9087-191fbb976e72 -CVE-2021-24884 - https://wpscan.com/vulnerability/b57dacdd-43c2-48f8-ac1e-eb8306b22533 -CVE-2021-24885 - https://wpscan.com/vulnerability/d0b312f8-8b16-45be-b5e5-bf9d4b3e9b1e -CVE-2021-24888 - https://wpscan.com/vulnerability/19bffa71-705c-42fc-b2ca-bf62fabb70a0 -CVE-2021-24889 - https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495 -CVE-2021-24890 - https://wpscan.com/vulnerability/f3b450d2-84ce-4c13-ad6a-b60785dee7e7 -CVE-2021-24891 - https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d -CVE-2021-24892 - https://wpscan.com/vulnerability/364b0843-a990-4204-848a-60c928cc5bc0 -CVE-2021-24893 - https://wpscan.com/vulnerability/05d3af69-20b4-499a-8322-2b53674d6a58 -CVE-2021-24894 - https://wpscan.com/vulnerability/79bb5acb-ea56-41a9-83a1-28a181ae41e2 -CVE-2021-24895 - https://wpscan.com/vulnerability/be7bbf4f-6f6a-4a44-bf86-2f096351ae08 -CVE-2021-24896 - https://wpscan.com/vulnerability/2c469e8b-c761-460b-b31d-9219a43006ff -CVE-2021-24897 - https://wpscan.com/vulnerability/a0dd1da8-f8d2-453d-a2f2-711a49fb6466 -CVE-2021-24898 - https://wpscan.com/vulnerability/10fdc464-0ddc-4919-8f21-969fff854011 -CVE-2021-24899 - https://wpscan.com/vulnerability/cf4b266c-d68e-4add-892a-d01a31987a4b -CVE-2021-24900 - https://packetstormsecurity.com/files/164632/ -CVE-2021-24900 - https://wpscan.com/vulnerability/213d7c08-a37c-49d0-a072-24db711da5ec -CVE-2021-24901 - https://wpscan.com/vulnerability/9c315404-b66a-448c-a3b7-367a37b53435 -CVE-2021-24902 - https://wpscan.com/vulnerability/2bde2030-2dfe-4dd3-afc1-36f7031a91ea -CVE-2021-24903 - https://wpscan.com/vulnerability/ad67e45e-254a-46ce-a243-bfc86839446e -CVE-2021-24904 - https://wpscan.com/vulnerability/7b80f89b-e724-41c5-aa03-21d1eef50f21 -CVE-2021-24905 - https://wpscan.com/vulnerability/cf022415-6614-4b95-913b-802186766ae6 -CVE-2021-24906 - https://wpscan.com/vulnerability/4204682b-f657-42e1-941c-bee7a245e9fd -CVE-2021-24907 - https://wpscan.com/vulnerability/56dae1ae-d5d2-45d3-8991-db69cc47ddb7 -CVE-2021-24908 - https://wpscan.com/vulnerability/77f50129-4b1f-4e50-8321-9dd32deba6e1 -CVE-2021-24909 - https://wpscan.com/vulnerability/5855f1fe-28f6-4cd6-a83c-95c23d809b79 -CVE-2021-24910 - https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17 -CVE-2021-24911 - https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 -CVE-2021-24912 - https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d -CVE-2021-24913 - https://wpscan.com/vulnerability/2f499945-1924-49f0-ad6e-9192273a5c05 -CVE-2021-24914 - https://wpscan.com/vulnerability/39392055-8cd3-452f-8bcb-a650f5bddc2e -CVE-2021-24915 - https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 -CVE-2021-24915 - https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac -CVE-2021-24916 - https://wpscan.com/vulnerability/93b893be-59ad-4500-8edb-9fa7a45304d5 -CVE-2021-24917 - https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375 -CVE-2021-24919 - https://wpscan.com/vulnerability/f472ec7d-765c-4266-ab9c-e2d06703ebb4 -CVE-2021-24920 - https://wpscan.com/vulnerability/b00b5037-8ce4-4f61-b2ce-33315b39454e -CVE-2021-24921 - https://wpscan.com/vulnerability/43ab0997-4d15-4ff7-af41-7b528b0ba3c7 -CVE-2021-24922 - https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2 -CVE-2021-24923 - https://wpscan.com/vulnerability/3afef591-9e00-4af8-a8a6-e04ec5e61795 -CVE-2021-24924 - https://wpscan.com/vulnerability/4621e86e-aba4-429c-8e08-32cf9b4c65e6 -CVE-2021-24925 - https://wpscan.com/vulnerability/82233588-6033-462d-b886-a8ef5ee9adb0 -CVE-2021-24926 - https://wpscan.com/vulnerability/8cc7cbbd-f74f-4f30-9483-573641fea733 -CVE-2021-24927 - https://wpscan.com/vulnerability/86f3acc7-8902-4215-bd75-6105d601524e -CVE-2021-24928 - https://wpscan.com/vulnerability/3762a77c-b8c9-428f-877c-bbfd7958e7be -CVE-2021-24930 - https://wpscan.com/vulnerability/479704d8-057b-4642-b84a-4a78567ba20b -CVE-2021-24931 - http://packetstormsecurity.com/files/165946/WordPress-Secure-Copy-Content-Protection-And-Content-Locking-2.8.1-SQL-Injection.html -CVE-2021-24931 - https://wpscan.com/vulnerability/1cd52d61-af75-43ed-9b99-b46c471c4231 -CVE-2021-24932 - https://wpscan.com/vulnerability/575c02ea-4fe9-428c-bbc8-e161af679b6d -CVE-2021-24933 - https://wpscan.com/vulnerability/b8e6f0d3-a7d1-4ca8-aba8-0d5075167d55 -CVE-2021-24934 - https://wpscan.com/vulnerability/0aa5a8d5-e736-4cd3-abfd-8e0a356bb6ef -CVE-2021-24935 - https://wpscan.com/vulnerability/53702281-1bd5-4828-b7a4-9f81cf0b6bb6 -CVE-2021-24936 - https://wpscan.com/vulnerability/4fb61b84-ff5f-4b4c-a516-54b749f9611e -CVE-2021-24937 - https://wpscan.com/vulnerability/dde3c119-dad9-4205-a931-d49bbf3b6b87 -CVE-2021-24938 - https://wpscan.com/vulnerability/df8a6f2c-e075-45d5-9262-b4eb63c9351e -CVE-2021-24939 - https://wpscan.com/vulnerability/1a46cfec-24ad-4619-8579-f09bbd8ee748 -CVE-2021-24940 - https://wpscan.com/vulnerability/1980c5ca-447d-4875-b542-9212cc7ff77f -CVE-2021-24941 - https://wpscan.com/vulnerability/beca7afd-8f03-4909-bea0-77b63513564b -CVE-2021-24942 - https://wpscan.com/vulnerability/eaa28832-74c1-4cd5-9b0f-02338e23b418 -CVE-2021-24943 - https://wpscan.com/vulnerability/ba50c590-42ee-4523-8aa0-87ac644b77ed -CVE-2021-24944 - https://wpscan.com/vulnerability/d1bfdce3-89bd-441f-8ebb-02cf0ff8b6cc -CVE-2021-24945 - https://wpscan.com/vulnerability/d7618061-a7fa-4da4-9384-be19bc5e8548 -CVE-2021-24946 - http://packetstormsecurity.com/files/165742/WordPress-Modern-Events-Calendar-6.1-SQL-Injection.html -CVE-2021-24946 - https://wpscan.com/vulnerability/09871847-1d6a-4dfe-8a8c-f2f53ff87445 -CVE-2021-24947 - https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18 -CVE-2021-24948 - https://wpscan.com/vulnerability/2b67005a-476e-4772-b15c-3191911a50b0 -CVE-2021-24949 - https://wpscan.com/vulnerability/9d7f8ba8-a5d5-4ec3-a48f-5cd4b115e8d5 -CVE-2021-24950 - https://wpscan.com/vulnerability/01d430ea-ef85-4529-9ae4-c1f70016bb75 -CVE-2021-24951 - https://wpscan.com/vulnerability/0a16ddc5-5ab9-4a8f-86b5-41edcbeafc50 -CVE-2021-24952 - https://wpscan.com/vulnerability/cbb8fa9f-1c84-4410-ae86-64cb1771ce78 -CVE-2021-24953 - https://wpscan.com/vulnerability/0529261d-65e1-4c64-b8ed-ecb7356d9067 -CVE-2021-24954 - https://wpscan.com/vulnerability/54ff0db8-1d9e-4e67-b71a-142a9e5ed851 -CVE-2021-24955 - https://wpscan.com/vulnerability/e8005d4d-41c3-451d-b85a-2626decaa080 -CVE-2021-24956 - https://wpscan.com/vulnerability/5882ea89-f463-4f0b-a624-150bbaf967c2 -CVE-2021-24957 - https://wpscan.com/vulnerability/a282606f-6abf-4f75-99c9-dab0bea8cc96 -CVE-2021-24958 - https://wpscan.com/vulnerability/011c2519-fd84-4c95-b8b8-23654af59d70 -CVE-2021-24959 - https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 -CVE-2021-24960 - https://plugins.trac.wordpress.org/changeset/2677722 -CVE-2021-24960 - https://wpscan.com/vulnerability/18902832-2973-498d-808e-c75d1aedc11e -CVE-2021-24961 - https://plugins.trac.wordpress.org/changeset/2677722 -CVE-2021-24961 - https://wpscan.com/vulnerability/c911bbbd-0196-4e3d-ada3-4efb8a339954 -CVE-2021-24962 - https://plugins.trac.wordpress.org/changeset/2677722 -CVE-2021-24962 - https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 -CVE-2021-24963 - https://wpscan.com/vulnerability/7f8b4275-7586-4e04-afd9-d12bdab6ba9b -CVE-2021-24964 - https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc -CVE-2021-24965 - https://wpscan.com/vulnerability/306ecf09-fdf0-449c-930c-9dfa58f0efc2 -CVE-2021-24966 - https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0 -CVE-2021-24967 - https://wpscan.com/vulnerability/4e165122-4746-42de-952e-a3bf51393a74 -CVE-2021-24968 - https://wpscan.com/vulnerability/f0a9e6cc-46cc-4ac2-927a-c006b8e8aa68 -CVE-2021-24969 - https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114ee -CVE-2021-24970 - https://wpscan.com/vulnerability/9b15d47e-43b6-49a8-b2c3-b99c92101e10 -CVE-2021-24971 - https://wpscan.com/vulnerability/661cb7e3-d7bd-4bc1-bf78-bdb4ba9610d7 -CVE-2021-24972 - https://wpscan.com/vulnerability/b960cb36-62de-4b9f-a35d-144a34a4c63d -CVE-2021-24973 - https://wpscan.com/vulnerability/0118f245-0e6f-44c1-9bdb-5b3a5d2403d6 -CVE-2021-24974 - https://wpscan.com/vulnerability/8ed549fe-7d27-4a7a-b226-c20252964b29 -CVE-2021-24975 - https://wpscan.com/vulnerability/b99dae3d-8230-4427-adc5-4ef9cbfb8ba1 -CVE-2021-24976 - https://wpscan.com/vulnerability/7d5f58a8-bee4-46be-9c08-d272678338f0 -CVE-2021-24977 - https://wpscan.com/vulnerability/739831e3-cdfb-4a22-9abf-6c594d7e3d75 -CVE-2021-24978 - https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86 -CVE-2021-24979 - https://wpscan.com/vulnerability/fc011990-4ec1-4553-901d-4ff1f482cb79 -CVE-2021-24980 - https://wpscan.com/vulnerability/e50bcb39-9a01-433f-81b3-fd4018672b85 -CVE-2021-24981 - https://wpscan.com/vulnerability/4c45df6d-b3f6-49e5-8b1f-edd32a12d71c -CVE-2021-24982 - https://wpscan.com/vulnerability/8e53f15e-8b6a-4d47-a40d-4ebbe6934286 -CVE-2021-24983 - https://wpscan.com/vulnerability/31fdabb0-bc74-4d25-b0cd-c872aae6cb2f -CVE-2021-24984 - https://wpscan.com/vulnerability/96bb2fba-4b18-4c29-8344-3ba4d2f06a19 -CVE-2021-24985 - https://wpscan.com/vulnerability/50be0ebf-fe6d-41e5-8af9-0d74f33aeb57 -CVE-2021-24986 - https://wpscan.com/vulnerability/51e57f25-b8b2-44ca-9162-d7328eac64eb -CVE-2021-24987 - https://wpscan.com/vulnerability/a14b668f-812f-46ee-827e-0996b378f7f0 -CVE-2021-24988 - https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845 -CVE-2021-24989 - https://wpscan.com/vulnerability/82c2ead1-1d3c-442a-ae68-359a4748447f -CVE-2021-24991 - https://wpscan.com/vulnerability/88e706df-ae03-4665-94a3-db226e1f31a9 -CVE-2021-24992 - https://wpscan.com/vulnerability/db0b9480-2ff4-423c-a745-68e983ffa12b -CVE-2021-24993 - https://wpscan.com/vulnerability/514416fa-d915-4953-bf1b-6dbf40b4d7e5 -CVE-2021-24994 - https://wpscan.com/vulnerability/ea74257a-f6b0-49e9-a81f-53c0eb81b1da -CVE-2021-24995 - https://wpscan.com/vulnerability/3caf0de0-57f2-4c87-8713-d00a7db9eeef -CVE-2021-24996 - https://wpscan.com/vulnerability/6ee14423-f7ff-4433-987a-a1a6b7bd65e3 -CVE-2021-24997 - https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900 -CVE-2021-24999 - https://wpscan.com/vulnerability/8527f4fe-312f-45c1-ae4c-7e799702fc26 -CVE-2021-25000 - https://wpscan.com/vulnerability/bc167b3a-24ee-4988-9934-189b6216ce40 -CVE-2021-25001 - https://wpscan.com/vulnerability/76f0257d-aae7-4054-9b3d-ba10b4005cf1 -CVE-2021-25002 - https://wpscan.com/vulnerability/b14f476e-3124-4cbf-91b4-ae53c4dabd7c -CVE-2021-25003 - https://wpscan.com/vulnerability/5c21ad35-b2fb-4a51-858f-8ffff685de4a -CVE-2021-25004 - https://wpscan.com/vulnerability/cfbc2b43-b8f8-4bcb-a3d3-39d217afa530 -CVE-2021-25005 - https://wpscan.com/vulnerability/af7d62ca-09b3-41c8-b771-be936ce8f6b2 -CVE-2021-25006 - https://wpscan.com/vulnerability/dbe2c6ca-d2f1-40a2-83d5-4623c22d4d61 -CVE-2021-25007 - https://wpscan.com/vulnerability/cf907d53-cc4a-4b02-bed3-64754128112c -CVE-2021-25008 - https://wpscan.com/vulnerability/cb232354-f74d-48bb-b437-7bdddd1df42a -CVE-2021-25009 - https://wpscan.com/vulnerability/ce2e3503-9a06-4f5c-ae0f-f40e7dfb2903 -CVE-2021-25010 - https://wpscan.com/vulnerability/d1ebd15a-72ab-4ba2-a212-7e2eea0b0fb0 -CVE-2021-25011 - https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833 -CVE-2021-25012 - https://wpscan.com/vulnerability/b126d2fc-6cc7-4c18-b95e-d32c2effcc4f -CVE-2021-25013 - https://wpscan.com/vulnerability/e88b7a70-ee71-439f-b3c6-0300adb980b0 -CVE-2021-25014 - https://wpscan.com/vulnerability/63c58d7f-8e0b-4aa5-b3c8-8726b4f19bf1 -CVE-2021-25015 - https://wpscan.com/vulnerability/7608829d-2820-49e2-a10e-e93eb3005f68 -CVE-2021-25016 - https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0 -CVE-2021-25017 - https://wpscan.com/vulnerability/2d0c4872-a341-4974-926c-10b094a5d13c -CVE-2021-25018 - https://wpscan.com/vulnerability/9e092aad-0b36-45a9-8987-8d904b34fbb2 -CVE-2021-25019 - https://wpscan.com/vulnerability/cea0ce4b-886a-47cc-8653-a297e9759d09 -CVE-2021-25020 - https://wpscan.com/vulnerability/67398332-b93e-46ae-8904-68419949a124 -CVE-2021-25021 - https://wpscan.com/vulnerability/92db763c-ca6b-43cf-87ff-c1678cf4ade5 -CVE-2021-25022 - https://wpscan.com/vulnerability/1801c7ae-2b5c-493f-969d-4bb19a9feb15 -CVE-2021-25023 - https://wpscan.com/vulnerability/4a27d374-f690-4a8a-987a-9e0f56bbe143 -CVE-2021-25024 - https://wpscan.com/vulnerability/08864b76-d898-4dfe-970d-d7cc1b1115a7 -CVE-2021-25025 - https://wpscan.com/vulnerability/24fb4eb4-9fe1-4433-8844-8904eaf13c0e -CVE-2021-25026 - https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe -CVE-2021-25027 - https://wpscan.com/vulnerability/48612c44-151d-4438-b91c-c27e96174270 -CVE-2021-25028 - https://wpscan.com/vulnerability/80b0682e-2c3b-441b-9628-6462368e5fc7 -CVE-2021-25029 - https://wpscan.com/vulnerability/723d0d07-c48b-4fe3-9fb2-7dae3c7d3cfb -CVE-2021-25030 - https://wpscan.com/vulnerability/bc7058b1-ca93-4c45-9ced-7848c7ae4150 -CVE-2021-25031 - https://wpscan.com/vulnerability/1fbcf5ec-498e-4d40-8577-84b8c7ac3201 -CVE-2021-25032 - https://wpscan.com/vulnerability/2f0f1a32-0c7a-48e6-8617-e0b2dcf62727 -CVE-2021-25033 - https://wpscan.com/vulnerability/c2d2384c-41b9-4aaf-b918-c1cfda58af5c -CVE-2021-25034 - https://wpscan.com/vulnerability/c4e50dd2-450f-413d-b15f-ece413e42157 -CVE-2021-25035 - https://wpscan.com/vulnerability/f426360e-5ba0-4d6b-bfd4-61bc54be3469 -CVE-2021-25038 - https://wpscan.com/vulnerability/72ccdcb9-3d24-41d7-b9fa-c8bd73d30aa6 -CVE-2021-25039 - https://wpscan.com/vulnerability/c92eb2bf-0a5d-40b9-b0be-1820e7b9bebb -CVE-2021-25040 - https://wpscan.com/vulnerability/3ed821a6-c3e2-4964-86f8-d14c4a54708a -CVE-2021-25041 - https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f -CVE-2021-25042 - https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4 -CVE-2021-25043 - https://wpscan.com/vulnerability/8601bd21-becf-4809-8c11-d053d1121eae -CVE-2021-25044 - https://wpscan.com/vulnerability/dc1507c1-8894-4ab6-b25f-c5e26a425b03 -CVE-2021-25045 - https://wpscan.com/vulnerability/c60a3d40-449c-4c84-8d13-68c04267c1d7 -CVE-2021-25046 - https://wpscan.com/vulnerability/19c2f456-a41e-4755-912d-13683719bae6 -CVE-2021-25047 - https://wpscan.com/vulnerability/d33241cc-17b6-491a-b836-dd9368652316 -CVE-2021-25048 - https://wpscan.com/vulnerability/5687e5db-d987-416d-a7f4-036cce4d56cb -CVE-2021-25049 - https://wpscan.com/vulnerability/227cbf50-59da-4f4c-85da-1959a108ae7e -CVE-2021-25050 - https://wpscan.com/vulnerability/25a28adb-794f-4bdb-89e8-060296b45b38 -CVE-2021-25051 - https://wpscan.com/vulnerability/566ff8dc-f820-412b-b2d3-fa789bce528e -CVE-2021-25052 - https://wpscan.com/vulnerability/a01844a0-0c43-4d96-b738-57fe5bfbd67a -CVE-2021-25053 - https://wpscan.com/vulnerability/a5448599-64de-43b0-b04d-c6492366eab1 -CVE-2021-25054 - https://wpscan.com/vulnerability/200969eb-e2a4-4200-82d7-0c313de089af -CVE-2021-25055 - https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 -CVE-2021-25056 - https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de -CVE-2021-25057 - https://wpscan.com/vulnerability/c0dd3ef1-579d-43a4-801a-660c41495d58 -CVE-2021-25058 - https://wpscan.com/vulnerability/fd5271ef-1da5-4d09-888e-f1fd71820cde -CVE-2021-25059 - https://wpscan.com/vulnerability/b125a765-a6b6-421b-bd8a-effec12bc629 -CVE-2021-25060 - https://wpscan.com/vulnerability/9e1ac711-1f65-49fa-b007-66170a77b265 -CVE-2021-25061 - https://wpscan.com/vulnerability/bd9dc754-08a4-4bfc-8dda-3f5c0e070f7e -CVE-2021-25062 - https://wpscan.com/vulnerability/dc9a5d36-7453-46a8-a17f-712449d7987d -CVE-2021-25063 - https://wpscan.com/vulnerability/e2185887-3e53-4089-aa3f-981c944ee0bb -CVE-2021-25064 - https://wpscan.com/vulnerability/30c70315-3c17-41f0-a12f-7e3f793e259c -CVE-2021-25065 - https://wpscan.com/vulnerability/ae1aab4e-b00a-458b-a176-85761655bdcc -CVE-2021-25066 - https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d -CVE-2021-25067 - https://wpscan.com/vulnerability/365007f0-61ac-4e81-8a3a-3a068f2c84bc -CVE-2021-25068 - https://wpscan.com/vulnerability/32799efd-99dc-46dd-8648-e9eb872a0371 -CVE-2021-25069 - https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8 -CVE-2021-25070 - https://wpscan.com/vulnerability/e00b2946-15e5-4458-9b13-2e272630a36f -CVE-2021-25071 - https://wpscan.com/vulnerability/53085936-fa07-4f00-a7dc-bbe98c51320e -CVE-2021-25072 - https://wpscan.com/vulnerability/53d2c61d-ce73-40e0-a113-9d76d8fecc91 -CVE-2021-25073 - https://wpscan.com/vulnerability/922a2037-9b5e-4c94-83d9-99efc494e9e2 -CVE-2021-25074 - https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164 -CVE-2021-25075 - https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b -CVE-2021-25076 - http://packetstormsecurity.com/files/166071/WordPress-WP-User-Frontend-3.5.25-SQL-Injection.html -CVE-2021-25076 - https://wpscan.com/vulnerability/6d3eeba6-5560-4380-a6e9-f008a9112ac6 -CVE-2021-25077 - https://wpscan.com/vulnerability/53868650-aba0-4d07-89d2-a998bb0ee5f6 -CVE-2021-25078 - https://wpscan.com/vulnerability/d4edb5f2-aa1b-4e2d-abb4-76c46def6c6e -CVE-2021-25079 - https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63 -CVE-2021-25080 - https://wpscan.com/vulnerability/acd3d98a-aab8-49be-b77e-e8c6ede171ac -CVE-2021-25081 - https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e -CVE-2021-25082 - https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132 -CVE-2021-25083 - https://wpscan.com/vulnerability/9b69544d-6a08-4757-901b-6ccf1cd00ecc -CVE-2021-25084 - https://wpscan.com/vulnerability/7c5c602f-499f-431b-80bc-507053984a06 -CVE-2021-25085 - https://wpscan.com/vulnerability/b7dd81c6-6af1-4976-b928-421ca69bfa90 -CVE-2021-25086 - https://wpscan.com/vulnerability/2cf9e517-d882-4af2-bd12-e700b75e7a11 -CVE-2021-25087 - https://wpscan.com/vulnerability/d7ceafae-65ec-4e05-9ed1-59470771bf07 -CVE-2021-25088 - https://wpscan.com/vulnerability/820c51d6-186e-4d63-b4a7-bd0a59c02cc8 -CVE-2021-25089 - https://wpscan.com/vulnerability/5adb977e-f7bf-4d36-b625-87bc23d379c8 -CVE-2021-25090 - https://wpscan.com/vulnerability/32a4a2b5-ef65-4e29-af4a-f003dbd0809c -CVE-2021-25091 - https://wpscan.com/vulnerability/96204946-0b10-4a2c-8079-473883ff95b6 -CVE-2021-25092 - https://wpscan.com/vulnerability/1cd30913-67c7-46c3-a2de-dcca0c332323 -CVE-2021-25093 - https://wpscan.com/vulnerability/7a7603ce-d76d-4c49-a886-67653bed8cd3 -CVE-2021-25094 - http://packetstormsecurity.com/files/167190/WordPress-Tatsu-Builder-Remote-Code-Execution.html -CVE-2021-25094 - https://wpscan.com/vulnerability/fb0097a0-5d7b-4e5b-97de-aacafa8fffcd -CVE-2021-25095 - https://wpscan.com/vulnerability/cbfa7211-ac1f-4cf2-bd79-ebce2fc4baa1 -CVE-2021-25096 - https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1 -CVE-2021-25097 - https://wpscan.com/vulnerability/67f5beb8-2cb0-4b43-87c7-dead9c005f9c -CVE-2021-25098 - https://wpscan.com/vulnerability/960a634d-a88a-4d90-9ac3-7d24b1fe07fe -CVE-2021-25099 - https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f -CVE-2021-25100 - https://wpscan.com/vulnerability/fe2c02bf-207c-43da-98bd-4c85d235de8b -CVE-2021-25101 - https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba -CVE-2021-25102 - https://wpscan.com/vulnerability/9b8a00a6-622b-4309-bbbf-fe2c7fc9f8b6 -CVE-2021-25103 - https://wpscan.com/vulnerability/90067336-c039-4cbe-aa9f-5eab5d1e1c3d -CVE-2021-25104 - https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558 -CVE-2021-25105 - https://wpscan.com/vulnerability/a9ab9e84-7f5e-4e7c-8647-114d9e02e59f -CVE-2021-25106 - https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e -CVE-2021-25107 - https://wpscan.com/vulnerability/3999a1b9-df85-43b1-b412-dc8a6f71cc5d -CVE-2021-25108 - https://wpscan.com/vulnerability/9d416ca3-bd02-4fcf-b3b8-f2f2280d02d2 -CVE-2021-25109 - https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 -CVE-2021-25110 - https://wpscan.com/vulnerability/b655fc21-47a1-4786-8911-d78ab823c153 -CVE-2021-25111 - https://wpscan.com/vulnerability/af548fab-96c2-4129-b609-e24aad0b1fc4 -CVE-2021-25112 - https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c -CVE-2021-25113 - https://wpscan.com/vulnerability/7a5078db-e0d4-4076-9de9-5401c3ca0d65 -CVE-2021-25114 - https://wpscan.com/vulnerability/6c25a5f0-a137-4ea5-9422-8ae393d7b76b -CVE-2021-25115 - https://wpscan.com/vulnerability/dbc18c2c-7547-44fc-8a41-c819757e47a7 -CVE-2021-25116 - https://wpscan.com/vulnerability/140a15b6-12c8-4f03-a877-3876db866852 -CVE-2021-25117 - https://wpscan.com/vulnerability/d2d9a789-edae-4ae1-92af-e6132db7efcd/ -CVE-2021-25118 - https://wpscan.com/vulnerability/2c3f9038-632d-40ef-a099-6ea202efb550 -CVE-2021-25119 - https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a -CVE-2021-25120 - https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6 -CVE-2021-25121 - https://wpscan.com/vulnerability/efb1ddef-2123-416c-a932-856d41ed836d -CVE-2021-25122 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-25122 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-25122 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-25142 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-25155 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25155 - http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html -CVE-2021-25156 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25157 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25158 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25159 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25160 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25161 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25162 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -CVE-2021-25168 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-25169 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-25170 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-25171 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-25172 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-25179 - https://www.linkedin.com/in/gabrielegristina -CVE-2021-25215 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-25219 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-25264 - https://community.sophos.com/b/security-blog -CVE-2021-25264 - https://community.sophos.com/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264 -CVE-2021-25265 - https://community.sophos.com/b/security-blog -CVE-2021-25265 - https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265 -CVE-2021-25273 - http://seclists.org/fulldisclosure/2021/Dec/3 -CVE-2021-25274 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ -CVE-2021-25275 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ -CVE-2021-25276 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ -CVE-2021-25277 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25277 -CVE-2021-25281 - http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html -CVE-2021-25281 - https://github.com/saltstack/salt/releases -CVE-2021-25282 - http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html -CVE-2021-25282 - https://github.com/saltstack/salt/releases -CVE-2021-25283 - https://github.com/saltstack/salt/releases -CVE-2021-25284 - https://github.com/saltstack/salt/releases -CVE-2021-25287 - https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470 -CVE-2021-25288 - https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470 -CVE-2021-25296 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25296 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25296 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md -CVE-2021-25296 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and -CVE-2021-25297 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25297 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25297 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md -CVE-2021-25297 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and -CVE-2021-25298 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25298 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25298 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md -CVE-2021-25298 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and -CVE-2021-25299 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html -CVE-2021-25299 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md -CVE-2021-25306 - https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/ -CVE-2021-25309 - https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/ -CVE-2021-25310 - https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/ -CVE-2021-25310 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2021-25316 - https://bugzilla.suse.com/show_bug.cgi?id=1182777 -CVE-2021-25326 - http://packetstormsecurity.com/files/162455/Shenzhen-Skyworth-RN510-Information-Disclosure.html -CVE-2021-25326 - http://seclists.org/fulldisclosure/2021/May/8 -CVE-2021-25326 - https://s3curityb3ast.github.io/KSA-Dev-013.md -CVE-2021-25327 - http://packetstormsecurity.com/files/162454/Shenzhen-Skyworth-RN510-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2021-25327 - http://seclists.org/fulldisclosure/2021/May/6 -CVE-2021-25327 - https://s3curityb3ast.github.io/KSA-Dev-012.md -CVE-2021-25328 - http://packetstormsecurity.com/files/162450/Shenzhen-Skyworth-RN510-Buffer-Overflow.html -CVE-2021-25328 - http://seclists.org/fulldisclosure/2021/May/5 -CVE-2021-25328 - https://s3curityb3ast.github.io/KSA-Dev-011.md -CVE-2021-25329 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-25329 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-25329 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-25330 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25334 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25335 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25336 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25337 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25338 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25339 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25340 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25344 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25345 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25346 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25347 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25356 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25356 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25357 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25358 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25359 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25360 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25361 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25362 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25363 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25364 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25365 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25369 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25370 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25371 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25372 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-25382 - https://security.samsungmobile.com/securityUpdate.smsb?year=2020&month=10 -CVE-2021-25383 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25384 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25385 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25386 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25387 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25388 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25388 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25389 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25390 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25390 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25391 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25391 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25392 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25392 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25393 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25393 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25394 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25395 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25396 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25397 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -CVE-2021-25397 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 -CVE-2021-25407 - http://packetstormsecurity.com/files/163198/Samsung-NPU-npu_session_format-Out-Of-Bounds-Write.html -CVE-2021-25407 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25408 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25409 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25410 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ -CVE-2021-25410 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25411 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25412 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25413 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ -CVE-2021-25413 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25414 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ -CVE-2021-25414 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25415 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25416 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25417 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 -CVE-2021-25426 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ -CVE-2021-25426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 -CVE-2021-25427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 -CVE-2021-25428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 -CVE-2021-25429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 -CVE-2021-25430 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 -CVE-2021-25440 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ -CVE-2021-25443 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=8 -CVE-2021-25444 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=8 -CVE-2021-25449 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25450 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25451 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25452 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25453 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25454 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25455 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25456 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25457 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25458 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25459 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25460 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25461 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25462 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 -CVE-2021-25467 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25468 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25469 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25470 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25471 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25472 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25473 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25474 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25475 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25476 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25477 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25478 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25479 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25480 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25481 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25482 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25483 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25484 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25485 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25486 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25487 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25488 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25489 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25490 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25491 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 -CVE-2021-25500 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 -CVE-2021-25501 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 -CVE-2021-25502 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 -CVE-2021-25503 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 -CVE-2021-25510 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25511 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25512 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25513 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25514 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25515 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25516 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25517 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25518 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25519 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 -CVE-2021-25631 - https://positive.security/blog/url-open-rce#open-libreoffice -CVE-2021-25646 - http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html -CVE-2021-25659 - https://cert-portal.siemens.com/productcert/pdf/ssa-158827.pdf -CVE-2021-25679 - http://packetstormsecurity.com/files/162268/Adtran-Personal-Phone-Manager-10.8.1-Persistent-Cross-Site-Scripting.html -CVE-2021-25679 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25679.md -CVE-2021-25680 - http://packetstormsecurity.com/files/162269/Adtran-Personal-Phone-Manager-10.8.1-Cross-Site-Scripting.html -CVE-2021-25680 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25680.md -CVE-2021-25681 - http://packetstormsecurity.com/files/162280/Adtran-Personal-Phone-Manager-10.8.1-DNS-Exfiltration.html -CVE-2021-25681 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25681.md -CVE-2021-25682 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 -CVE-2021-25683 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 -CVE-2021-25684 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 -CVE-2021-25783 - https://github.com/taogogo/taocms/issues/5 -CVE-2021-25784 - https://github.com/taogogo/taocms/issues/4 -CVE-2021-25785 - https://github.com/taogogo/taocms/issues/3 -CVE-2021-25786 - https://github.com/qpdf/qpdf/issues/492 -CVE-2021-25790 - https://www.exploit-db.com/exploits/49352 -CVE-2021-25791 - https://www.exploit-db.com/exploits/49396 -CVE-2021-25829 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25829 -CVE-2021-25830 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830 -CVE-2021-25831 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25831 -CVE-2021-25832 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25832 -CVE-2021-25833 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833 -CVE-2021-25856 - https://github.com/pcmt/superMicro-CMS/issues/1 -CVE-2021-25857 - https://github.com/pcmt/superMicro-CMS/issues/2 -CVE-2021-25863 - https://github.com/open5gs/open5gs/issues/764 -CVE-2021-25864 - https://github.com/Foddy/node-red-contrib-huemagic/issues/217 -CVE-2021-25893 - https://www.itas.vn/itas-security-team-found-multi-vulnerabilities-on-magnolia-cms-platform/ -CVE-2021-25894 - https://www.itas.vn/itas-security-team-found-multi-vulnerabilities-on-magnolia-cms-platform/ -CVE-2021-25898 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ -CVE-2021-25898 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 -CVE-2021-25899 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ -CVE-2021-25899 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 -CVE-2021-25912 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912 -CVE-2021-25913 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913 -CVE-2021-25914 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914 -CVE-2021-25915 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25915 -CVE-2021-25916 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916 -CVE-2021-25917 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25917 -CVE-2021-25918 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25918 -CVE-2021-25919 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25919 -CVE-2021-25921 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921 -CVE-2021-25922 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25922 -CVE-2021-25923 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25923 -CVE-2021-25924 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924, -CVE-2021-25925 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925 -CVE-2021-25926 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926, -CVE-2021-25927 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927 -CVE-2021-25928 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928 -CVE-2021-25929 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929 -CVE-2021-25931 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931 -CVE-2021-25932 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25932 -CVE-2021-25933 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933 -CVE-2021-25934 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25934 -CVE-2021-25935 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25935 -CVE-2021-25938 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25938 -CVE-2021-25939 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939 -CVE-2021-25940 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25940 -CVE-2021-25941 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941 -CVE-2021-25943 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943 -CVE-2021-25944 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25944 -CVE-2021-25945 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945 -CVE-2021-25946 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946 -CVE-2021-25947 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947 -CVE-2021-25948 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948 -CVE-2021-25949 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949 -CVE-2021-25951 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951 -CVE-2021-25952 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952 -CVE-2021-25953 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953 -CVE-2021-25954 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954 -CVE-2021-25955 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955 -CVE-2021-25956 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956 -CVE-2021-25957 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957 -CVE-2021-25958 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25958 -CVE-2021-25959 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959 -CVE-2021-25960 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25960 -CVE-2021-25961 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25961 -CVE-2021-25962 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962 -CVE-2021-25963 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963 -CVE-2021-25964 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964 -CVE-2021-25965 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25965 -CVE-2021-25966 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25966 -CVE-2021-25967 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967 -CVE-2021-25968 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25968 -CVE-2021-25969 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969 -CVE-2021-25970 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970 -CVE-2021-25971 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971 -CVE-2021-25972 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972 -CVE-2021-25973 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973 -CVE-2021-25974 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974 -CVE-2021-25975 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974 -CVE-2021-25976 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976 -CVE-2021-25977 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977 -CVE-2021-25980 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 -CVE-2021-25981 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981 -CVE-2021-25982 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982 -CVE-2021-25983 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983 -CVE-2021-25984 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984 -CVE-2021-25985 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 -CVE-2021-25986 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986 -CVE-2021-25987 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987 -CVE-2021-25988 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25988 -CVE-2021-25989 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25989 -CVE-2021-25990 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25990 -CVE-2021-25991 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25991 -CVE-2021-25992 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992 -CVE-2021-25993 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25993 -CVE-2021-25994 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994 -CVE-2021-26078 - http://packetstormsecurity.com/files/163289/Atlassian-Jira-Server-Data-Center-8.16.0-Cross-Site-Scripting.html -CVE-2021-26084 - http://packetstormsecurity.com/files/164013/Confluence-Server-7.12.4-OGNL-Injection-Remote-Code-Execution.html -CVE-2021-26084 - http://packetstormsecurity.com/files/164122/Atlassian-Confluence-WebWork-OGNL-Injection.html -CVE-2021-26084 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html -CVE-2021-26085 - http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html -CVE-2021-26086 - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html -CVE-2021-26104 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f73m-fvj3-m2pm -CVE-2021-26117 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-26117 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-26117 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-26194 - https://github.com/jerryscript-project/jerryscript/issues/4445 -CVE-2021-26200 - https://www.exploit-db.com/exploits/49462 -CVE-2021-26201 - https://www.exploit-db.com/exploits/49463 -CVE-2021-26215 - https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822 -CVE-2021-26216 - https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91 -CVE-2021-26228 - https://github.com/BigTiger2020/CASAP-Automated-Enrollment-System/blob/main/README.md -CVE-2021-26233 - https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -CVE-2021-26234 - https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -CVE-2021-26235 - https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -CVE-2021-26236 - https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/ -CVE-2021-26236 - https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236 -CVE-2021-26236 - https://www.exploit-db.com/exploits/49660 -CVE-2021-26237 - https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -CVE-2021-26259 - https://github.com/michaelrsweet/htmldoc/issues/417 -CVE-2021-26260 - https://bugzilla.redhat.com/show_bug.cgi?id=1947582 -CVE-2021-26271 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-26271 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-26272 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-26272 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-26272 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-26273 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm -CVE-2021-26274 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm -CVE-2021-26291 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-26291 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-26291 - https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/ -CVE-2021-26295 - http://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html -CVE-2021-26296 - http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html -CVE-2021-26296 - http://seclists.org/fulldisclosure/2021/Feb/66 -CVE-2021-26303 - https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html -CVE-2021-26304 - https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html -CVE-2021-26333 - http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html -CVE-2021-26333 - http://seclists.org/fulldisclosure/2021/Sep/24 -CVE-2021-26414 - http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html -CVE-2021-26419 - http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html -CVE-2021-26504 - https://github.com/Foddy/node-red-contrib-huemagic/issues/217 -CVE-2021-26549 - http://packetstormsecurity.com/files/161335/SmartFoxServer-2X-2.17.0-God-Mode-Console-WebSocket-Cross-Site-Scripting.html -CVE-2021-26549 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-26549 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.php -CVE-2021-26550 - http://packetstormsecurity.com/files/161337/SmartFoxServer-2X-2.17.0-Credential-Disclosure.html -CVE-2021-26550 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-26550 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5627.php -CVE-2021-26551 - http://packetstormsecurity.com/files/161340/SmartFoxServer-2X-2.17.0-Remote-Code-Execution.html -CVE-2021-26551 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-26563 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1158 -CVE-2021-26570 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26571 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26572 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26573 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26574 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26575 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26576 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26577 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us -CVE-2021-26596 - https://www.gruppotim.it/redteam -CVE-2021-26597 - https://www.gruppotim.it/redteam -CVE-2021-26598 - https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html -CVE-2021-26599 - http://packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.html -CVE-2021-26600 - http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html -CVE-2021-26600 - https://hackerone.com/reports/1081986 -CVE-2021-26601 - http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html -CVE-2021-26690 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-26691 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-26691 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-26698 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html -CVE-2021-26698 - http://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2021-26699 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html -CVE-2021-26699 - http://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2021-26699 - https://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2021-26705 - https://www.exploit-db.com/exploits/49621 -CVE-2021-26708 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13 -CVE-2021-26708 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c518adafa39f37858697ac9309c6cf1805581446 -CVE-2021-26709 - http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.html -CVE-2021-26712 - http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html -CVE-2021-26716 - https://github.com/emoncms/emoncms/issues/1652 -CVE-2021-26717 - http://packetstormsecurity.com/files/161471/Asterisk-Project-Security-Advisory-AST-2021-002.html -CVE-2021-26718 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310321 -CVE-2021-26723 - http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html -CVE-2021-26723 - https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328 -CVE-2021-26751 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ -CVE-2021-26752 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ -CVE-2021-26753 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ -CVE-2021-26754 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-i/ -CVE-2021-26758 - https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758 -CVE-2021-26758 - https://github.com/litespeedtech/openlitespeed/issues/217 -CVE-2021-26758 - https://www.exploit-db.com/exploits/49556 -CVE-2021-26762 - https://phpgurukul.com/ -CVE-2021-26762 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip -CVE-2021-26762 - https://www.exploit-db.com/exploits/49513 -CVE-2021-26764 - https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html -CVE-2021-26764 - https://phpgurukul.com/ -CVE-2021-26764 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip -CVE-2021-26765 - https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html -CVE-2021-26765 - https://phpgurukul.com/ -CVE-2021-26765 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip -CVE-2021-26776 - https://github.com/cskaza/cszcms/issues/29 -CVE-2021-26787 - http://genesys.com -CVE-2021-26787 - https://medium.com/@reliable_lait_mouse_975/cross-site-scripting-vulnerability-within-genesys-workforce-management-version-8-5-214-20-a68500cf5e18 -CVE-2021-26795 - http://packetstormsecurity.com/files/164961/Talariax-sendQuick-Alertplus-Server-Admin-4.3-SQL-Injection.html -CVE-2021-26795 - http://seclists.org/fulldisclosure/2021/Nov/37 -CVE-2021-26797 - https://le0nc.blogspot.com/2021/04/cve-2021-26797-access-control.html -CVE-2021-26799 - https://github.com/omeka/Omeka/issues/935 -CVE-2021-26804 - https://medium.com/@pedro.ferreira.phf/vulnerability-affecting-some-versions-of-centreon-2b34bd6dc621 -CVE-2021-26805 - https://github.com/justdan96/tsMuxer/issues/395 -CVE-2021-26807 - https://illuminati.services/2021/04/29/cve-2021-26807-gog-galaxy-v2-0-35-dll-load-order-hijacking/ -CVE-2021-26809 - https://packetstormsecurity.com/files/161267/Car-Rental-Project-2.0-Shell-Upload.html -CVE-2021-26809 - https://www.exploit-db.com/exploits/49520 -CVE-2021-26810 - https://github.com/GD008/vuln/blob/main/DIR-816.md -CVE-2021-26810 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-26812 - https://github.com/udima-university/moodle-mod_jitsi/issues/67 -CVE-2021-26822 - https://www.exploit-db.com/exploits/49562 -CVE-2021-26824 - https://sites.google.com/view/boss-lab -CVE-2021-26825 - https://github.com/godotengine/godot/pull/45702 -CVE-2021-26825 - https://github.com/godotengine/godot/pull/45702/files -CVE-2021-26826 - https://github.com/godotengine/godot/pull/45701 -CVE-2021-26826 - https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a -CVE-2021-26827 - https://github.com/GD008/vuln/blob/main/tplink_wr2041/tplink_WR2041pv1.md -CVE-2021-26828 - http://packetstormsecurity.com/files/162564/ScadaBR-1.0-1.1CE-Linux-Shell-Upload.html -CVE-2021-26828 - https://youtu.be/k1teIStQr1A -CVE-2021-26829 - https://youtu.be/Xh6LPCiLMa8 -CVE-2021-26834 - https://github.com/alagrede/znote-app/issues/5 -CVE-2021-26855 - http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html -CVE-2021-26855 - http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html -CVE-2021-26855 - http://packetstormsecurity.com/files/162610/Microsoft-Exchange-2019-Unauthenticated-Email-Download.html -CVE-2021-26855 - http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html -CVE-2021-26863 - http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html -CVE-2021-26906 - http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html -CVE-2021-26910 - http://www.openwall.com/lists/oss-security/2021/02/09/1 -CVE-2021-26910 - https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b -CVE-2021-26910 - https://github.com/netblue30/firejail/releases/tag/0.9.64.4 -CVE-2021-26910 - https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt -CVE-2021-26912 - https://ssd-disclosure.com/?p=4676 -CVE-2021-26912 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ -CVE-2021-26912 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 -CVE-2021-26913 - https://ssd-disclosure.com/?p=4676 -CVE-2021-26913 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ -CVE-2021-26913 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 -CVE-2021-26914 - http://packetstormsecurity.com/files/162617/NetMotion-Mobility-Server-MvcUtil-Java-Deserialization.html -CVE-2021-26914 - https://ssd-disclosure.com/?p=4676 -CVE-2021-26914 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ -CVE-2021-26914 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 -CVE-2021-26915 - https://ssd-disclosure.com/?p=4676 -CVE-2021-26915 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ -CVE-2021-26915 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 -CVE-2021-26916 - https://github.com/nopSolutions/nopCommerce/issues/5322 -CVE-2021-26918 - http://packetstormsecurity.com/files/161347/Discord-Probot-Arbitrary-File-Upload.html -CVE-2021-26918 - https://raw.githubusercontent.com/TheLastVvV/Vulnerability-Reports-and-CVE/main/Reports/Discord%20Probot%20-%20Unrestricted%20File%20Upload.txt -CVE-2021-26926 - https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b -CVE-2021-26926 - https://github.com/jasper-software/jasper/issues/264 -CVE-2021-26927 - https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b -CVE-2021-26927 - https://github.com/jasper-software/jasper/issues/265 -CVE-2021-26928 - https://www.cyberark.com/resources/threat-research-blog/attacking-kubernetes-clusters-through-your-network-plumbing-part-2 -CVE-2021-26929 - http://packetstormsecurity.com/files/162187/Webmail-Edition-5.2.22-XSS-Remote-Code-Execution.html -CVE-2021-26929 - http://packetstormsecurity.com/files/162194/Horde-Groupware-Webmail-5.2.22-Cross-Site-Scripting.html -CVE-2021-26935 - https://www.exploit-db.com/exploits/49657 -CVE-2021-26943 - https://www.youtube.com/watch?v=1H3AfaVyeuk -CVE-2021-27065 - http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html -CVE-2021-27065 - http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html -CVE-2021-27086 - http://packetstormsecurity.com/files/162157/Microsoft-Windows-SCM-Remote-Access-Check-Limit-Bypass-Privilege-Escalation.html -CVE-2021-27097 - https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 -CVE-2021-27113 - https://github.com/GD008/vuln/blob/main/DIR-816_2.md -CVE-2021-27113 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-27114 - https://github.com/GD008/vuln/blob/main/DIR-816_stackoverflow.md -CVE-2021-27114 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-27116 - https://github.com/beego/beego/issues/4484 -CVE-2021-27117 - https://github.com/beego/beego/issues/4484 -CVE-2021-27124 - http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html -CVE-2021-27124 - https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-dios-7689b1d30f5f -CVE-2021-27129 - https://packetstormsecurity.com/files/161080/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html -CVE-2021-27130 - https://packetstormsecurity.com/files/161219/Online-Reviewer-System-1.0-SQL-Injection-Shell-Upload.html -CVE-2021-27135 - http://seclists.org/fulldisclosure/2021/May/52 -CVE-2021-27138 - https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 -CVE-2021-27184 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server.txt -CVE-2021-27185 - https://www.npmjs.com/package/samba-client -CVE-2021-27189 - http://packetstormsecurity.com/files/161507/CIRA-Canadian-Shield-Man-In-The-Middle.html -CVE-2021-27190 - https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611 -CVE-2021-27190 - https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS -CVE-2021-27190 - https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS -CVE-2021-27190 - https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/ -CVE-2021-27192 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight -CVE-2021-27193 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight -CVE-2021-27194 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight -CVE-2021-27195 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight -CVE-2021-27197 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server_AFW.txt -CVE-2021-27198 - http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html -CVE-2021-27198 - http://seclists.org/fulldisclosure/2021/Feb/81 -CVE-2021-27198 - https://www.securifera.com/advisories/cve-2021-27198/ -CVE-2021-27200 - https://www.exploit-db.com/exploits/49989 -CVE-2021-27201 - https://github.com/MucahitSaratar/endian_firewall_authenticated_rce -CVE-2021-27201 - https://www.endian.com/company/news/endian-community-releases-new-version-332-148/ -CVE-2021-27203 - https://www.rootshellsecurity.net/rootshell-discover-denial-of-service-flaw-dekart-private-disk-encryption-software/ -CVE-2021-27204 - https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html -CVE-2021-27204 - https://www.youtube.com/watch?v=zEt-_5b4OaA -CVE-2021-27205 - https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html -CVE-2021-27205 - https://www.youtube.com/watch?v=Go-4srm_1fQ -CVE-2021-27211 - http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html -CVE-2021-27215 - https://sec-consult.com/vulnerability-lab/advisory/authentication-bypass-genua-genugate/ -CVE-2021-27216 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt -CVE-2021-27217 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln2 -CVE-2021-27219 - https://gitlab.gnome.org/GNOME/glib/-/issues/2319 -CVE-2021-27223 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_1 -CVE-2021-27224 - http://packetstormsecurity.com/files/161449/IrfanView-4.57-Denial-Of-Service-Code-Execution.html -CVE-2021-27224 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ -CVE-2021-27230 - http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html -CVE-2021-27231 - https://sick.codes/sick-2021-006 -CVE-2021-27232 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server-RSTPLive555%20Activex%20Buffer%20overflow.txt -CVE-2021-27237 - https://www.exploit-db.com/exploits/49565 -CVE-2021-27251 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27252 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27253 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27254 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27255 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27256 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27257 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders -CVE-2021-27273 - https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559 -CVE-2021-27275 - https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561 -CVE-2021-27276 - https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500 -CVE-2021-27290 - https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf -CVE-2021-27290 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-27306 - https://medium.com/@sew.campos/cve-2021-27306-access-an-authenticated-route-on-kong-api-gateway-6ae3d81968a3 -CVE-2021-27308 - http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html -CVE-2021-27308 - https://github.com/4images/4images/issues/3 -CVE-2021-27309 - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md -CVE-2021-27310 - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md -CVE-2021-27312 - https://gist.github.com/LioTree/8d10d123d31f50db05a25586e62a87ba -CVE-2021-27314 - https://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html -CVE-2021-27315 - http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html -CVE-2021-27316 - http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html -CVE-2021-27317 - http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html -CVE-2021-27318 - http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html -CVE-2021-27319 - http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html -CVE-2021-27320 - http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html -CVE-2021-27328 - http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html -CVE-2021-27328 - https://github.com/SQSamir/CVE-2021-27328 -CVE-2021-27330 - http://packetstormsecurity.com/files/161570/Triconsole-3.75-Cross-Site-Scripting.html -CVE-2021-27330 - https://www.exploit-db.com/exploits/49597 -CVE-2021-27335 - https://hacked0x90.net/index.php/2021/02/15/kollectapp-insecure-java-deserialization/ -CVE-2021-27340 - https://github.com/OS4ED/openSIS-Classic/issues/158 -CVE-2021-27341 - https://github.com/OS4ED/openSIS-Classic/issues/158 -CVE-2021-27345 - https://github.com/ckolivas/lrzip/issues/164 -CVE-2021-27347 - https://github.com/ckolivas/lrzip/issues/165 -CVE-2021-27351 - https://0ffsecninja.github.io/Telegram:CVE-2021-2735.html -CVE-2021-27352 - https://drive.google.com/file/d/1kSDlPASBCgJEINxTSIsjMWrU4u4T5XCc/view?usp=sharing -CVE-2021-27352 - https://github.com/xoffense/POC/blob/main/Ilch%202.1.42%20Open%20redirect -CVE-2021-27357 - https://github.com/RIOT-OS/RIOT/issues/16018 -CVE-2021-27358 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md -CVE-2021-27358 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17 -CVE-2021-27362 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ -CVE-2021-27363 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2021-27363 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html -CVE-2021-27363 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa -CVE-2021-27364 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2021-27364 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html -CVE-2021-27364 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa -CVE-2021-27364 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-27365 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2021-27365 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html -CVE-2021-27365 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee -CVE-2021-27365 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5 -CVE-2021-27365 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-27368 - https://github.com/monicahq/monica/issues/4888 -CVE-2021-27368 - https://github.com/monicahq/monica/pull/4543 -CVE-2021-27369 - https://github.com/monicahq/monica/issues/4888 -CVE-2021-27369 - https://github.com/monicahq/monica/pull/4543 -CVE-2021-27370 - http://packetstormsecurity.com/files/161501/Monica-2.19.1-Cross-Site-Scripting.html -CVE-2021-27370 - https://github.com/monicahq/monica/issues/4888 -CVE-2021-27370 - https://github.com/monicahq/monica/pull/4543 -CVE-2021-27371 - https://github.com/monicahq/monica/issues/4888 -CVE-2021-27371 - https://github.com/monicahq/monica/pull/4543 -CVE-2021-27405 - https://github.com/progfay/scrapbox-parser/pull/519 -CVE-2021-27405 - https://github.com/progfay/scrapbox-parser/pull/539 -CVE-2021-27414 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7777&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-27416 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7777&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-27427 - https://github.com/RIOT-OS/RIOT -CVE-2021-27433 - https://github.com/ARMmbed/mbed-os/pull/14408 -CVE-2021-27435 - https://github.com/ARMmbed/mbed-os/pull/14408 -CVE-2021-27513 - https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py -CVE-2021-27514 - https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py -CVE-2021-27519 - http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html -CVE-2021-27519 - https://github.com/fudforum/FUDforum/issues/2 -CVE-2021-27520 - http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html -CVE-2021-27520 - https://github.com/fudforum/FUDforum/issues/2 -CVE-2021-27526 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20page%20parameter -CVE-2021-27527 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20valueID%20parameter -CVE-2021-27528 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20refID%20parameter -CVE-2021-27529 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20limit%20parameter -CVE-2021-27530 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20index.php%20URI -CVE-2021-27531 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20query%20parameter -CVE-2021-27544 - https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html -CVE-2021-27545 - https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html -CVE-2021-27545 - https://www.exploit-db.com/exploits/49580 -CVE-2021-27549 - https://www.genymotion.com/download/ -CVE-2021-27549 - https://www.youtube.com/watch?v=Tod8Q6sf0P8 -CVE-2021-27550 - https://gist.github.com/sqrtrev/1f9986d4bdd1393832c60a97b56e170a -CVE-2021-27559 - https://github.com/monicahq/monica/issues/4888 -CVE-2021-27559 - https://github.com/monicahq/monica/pull/4543 -CVE-2021-27561 - https://ssd-disclosure.com/?p=4688 -CVE-2021-27565 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-27565 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-27568 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-27568 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-27568 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-27597 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html -CVE-2021-27597 - https://launchpad.support.sap.com/#/notes/3020209 -CVE-2021-27606 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html -CVE-2021-27607 - http://packetstormsecurity.com/files/164591/SAP-NetWeaver-ABAP-Dispatcher-Service-Memory-Corruption.html -CVE-2021-27620 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html -CVE-2021-27622 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html -CVE-2021-27624 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html -CVE-2021-27625 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html -CVE-2021-27626 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html -CVE-2021-27627 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html -CVE-2021-27628 - http://packetstormsecurity.com/files/164591/SAP-NetWeaver-ABAP-Dispatcher-Service-Memory-Corruption.html -CVE-2021-27629 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html -CVE-2021-27630 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html -CVE-2021-27631 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html -CVE-2021-27632 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html -CVE-2021-27633 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html -CVE-2021-27633 - https://launchpad.support.sap.com/#/notes/3020209 -CVE-2021-27634 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html -CVE-2021-27634 - https://launchpad.support.sap.com/#/notes/3020209 -CVE-2021-27635 - http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html -CVE-2021-27673 - http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html -CVE-2021-27691 - https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/rkhTCGzMd -CVE-2021-27692 - https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu -CVE-2021-27695 - https://www.exploit-db.com/exploits/49649 -CVE-2021-27697 - https://github.com/RIOT-OS/RIOT/issues/16062 -CVE-2021-27698 - https://github.com/RIOT-OS/RIOT/issues/16085 -CVE-2021-27705 - https://hackmd.io/Zb7lfFaNR0ScpaTssECFbg -CVE-2021-27706 - https://hackmd.io/BhzJ4H20TjqKUiBrDOIKaw -CVE-2021-27707 - https://hackmd.io/U7OVgYIuRcOKV7SW5-euHw -CVE-2021-27708 - https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA -CVE-2021-27708 - https://hackmd.io/mDgIBvoxSPCZrZiZjfQGhw -CVE-2021-27710 - https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw -CVE-2021-27710 - https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A -CVE-2021-27722 - https://www.exploit-db.com/exploits/49590 -CVE-2021-27722 - https://www.exploit-db.com/exploits/49638 -CVE-2021-27804 - http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html -CVE-2021-27804 - http://seclists.org/fulldisclosure/2021/Mar/2 -CVE-2021-27807 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-27807 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-27807 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-27815 - https://github.com/libexif/exif/issues/4 -CVE-2021-27822 - https://www.exploit-db.com/exploits/49595 -CVE-2021-27825 - http://packetstormsecurity.com/files/171771/MAC-1200R-Directory-Traversal.html -CVE-2021-27828 - https://www.exploit-db.com/exploits/49884 -CVE-2021-27836 - https://github.com/libxls/libxls/issues/94 -CVE-2021-27853 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX -CVE-2021-27855 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5685.php -CVE-2021-27856 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php -CVE-2021-27857 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5683.php -CVE-2021-27858 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5682.php -CVE-2021-27859 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php -CVE-2021-27876 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html -CVE-2021-27877 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html -CVE-2021-27878 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html -CVE-2021-27885 - http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html -CVE-2021-27886 - http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html -CVE-2021-27889 - http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html -CVE-2021-27890 - http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html -CVE-2021-27906 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-27906 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-27906 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-27913 - https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 -CVE-2021-27918 - https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw -CVE-2021-27919 - https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw -CVE-2021-27928 - http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html -CVE-2021-27931 - https://github.com/sl4cky/LumisXP-XXE---POC/blob/main/poc.txt -CVE-2021-27932 - https://advisories.stormshield.eu/2021-004/ -CVE-2021-27933 - http://seclists.org/fulldisclosure/2021/Apr/61 -CVE-2021-27940 - https://www.youtube.com/watch?v=DOYm0DIS3Us -CVE-2021-27945 - https://squirro.atlassian.net/wiki/spaces/DOC/pages/2389672672/CVE-2021-27945+-+Cross-Site+Scripting -CVE-2021-27946 - http://packetstormsecurity.com/files/161918/MyBB-1.8.25-SQL-Injection.html -CVE-2021-27956 - https://raxis.com/blog/cve-2021-27956-manage-engine-xss -CVE-2021-27956 - https://www.manageengine.com -CVE-2021-27962 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 -CVE-2021-27962 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2021-27963 - https://github.com/erberkan/SonLogger-vulns -CVE-2021-27964 - http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html -CVE-2021-27964 - https://github.com/erberkan/SonLogger-vulns -CVE-2021-27969 - https://www.exploit-db.com/exploits/49670 -CVE-2021-27971 - http://packetstormsecurity.com/files/165690/Alps-Alpine-Touchpad-Driver-DLL-Injection.html -CVE-2021-27973 - http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html -CVE-2021-27983 - https://github.com/maxsite/cms/issues/430 -CVE-2021-27984 - https://github.com/pluck-cms/pluck/issues/98 -CVE-2021-27989 - https://github.com/syedsohaibkarim/PoC-StoredXSS-Appspace6.2.4 -CVE-2021-27990 - https://github.com/syedsohaibkarim/PoC-BrokenAuth-AppSpace6.2.4 -CVE-2021-27999 - https://medium.com/@tusharvaidya16/authenticated-blind-error-based-sql-injection-on-local-services-search-engine-management-system-3e99779f0850 -CVE-2021-28000 - https://tusharvaidya16.medium.com/local-services-search-engine-management-system-project-lssmes-1-0-af2cae7cbbf -CVE-2021-28001 - https://www.exploit-db.com/exploits/49616 -CVE-2021-28002 - https://www.exploit-db.com/exploits/49617 -CVE-2021-28006 - https://www.exploit-db.com/exploits/49605 -CVE-2021-28007 - https://www.exploit-db.com/exploits/49607 -CVE-2021-28021 - https://github.com/nothings/stb/issues/1108 -CVE-2021-28026 - https://gitlab.com/wg1/jpeg-xl/-/issues/163 -CVE-2021-28040 - https://github.com/ossec/ossec-hids/issues/1953 -CVE-2021-28041 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-28042 - https://herolab.usd.de/security-advisories/usd-2020-0028/ -CVE-2021-28060 - https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/ -CVE-2021-28070 - https://github.com/PopojiCMS/PopojiCMS/issues/31 -CVE-2021-28079 - https://github.com/theart42/cves/blob/master/CVE-2021-28079/CVE-2021-28079.md -CVE-2021-28088 - https://anotepad.com/note/read/s3kkk6h7 -CVE-2021-28093 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html -CVE-2021-28094 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html -CVE-2021-28095 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html -CVE-2021-28113 - http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html -CVE-2021-28114 - https://labs.bishopfox.com/advisories -CVE-2021-28114 - https://labs.bishopfox.com/advisories/froala-editor-v3.2.6 -CVE-2021-28115 - http://packetstormsecurity.com/files/161746/MyBB-OUGC-Feedback-1.8.22-Cross-Site-Scripting.html -CVE-2021-28127 - https://advisories.stormshield.eu -CVE-2021-28127 - https://advisories.stormshield.eu/2021-006 -CVE-2021-28128 - https://github.com/strapi/strapi/releases -CVE-2021-28128 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt -CVE-2021-28132 - https://abuyv.com/cve/lucy-file-upload-RCE -CVE-2021-28133 - http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html -CVE-2021-28133 - http://seclists.org/fulldisclosure/2021/Mar/48 -CVE-2021-28133 - https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html -CVE-2021-28133 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt -CVE-2021-28133 - https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133 -CVE-2021-28133 - https://www.youtube.com/watch?v=SonmmgQlLzg -CVE-2021-28135 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-28136 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-28139 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-28142 - http://packetstormsecurity.com/files/162182/CITSmart-ITSM-9.1.2.27-SQL-Injection.html -CVE-2021-28143 - https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt -CVE-2021-28144 - http://packetstormsecurity.com/files/161757/D-Link-DIR-3060-1.11b04-Command-Injection.html -CVE-2021-28144 - http://seclists.org/fulldisclosure/2021/Mar/23 -CVE-2021-28146 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 -CVE-2021-28146 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2021-28147 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 -CVE-2021-28147 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2021-28148 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 -CVE-2021-28148 - https://community.grafana.com/t/release-notes-v6-7-x/27119 -CVE-2021-28153 - https://gitlab.gnome.org/GNOME/glib/-/issues/2325 -CVE-2021-28155 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-28160 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -CVE-2021-28161 - https://github.com/eclipse-theia/theia/issues/8794 -CVE-2021-28162 - https://github.com/eclipse-theia/theia/issues/7283 -CVE-2021-28163 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28163 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-28163 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28164 - http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html -CVE-2021-28164 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28164 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-28164 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28165 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-28165 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28165 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-28165 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28168 - https://github.com/eclipse-ee4j/jersey/pull/4712 -CVE-2021-28168 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28169 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28169 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-28169 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28170 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28211 - https://bugzilla.tianocore.org/show_bug.cgi?id=1816 -CVE-2021-28233 - https://github.com/brackeen/ok-file-formats/issues/11 -CVE-2021-28236 - https://github.com/LibreDWG/libredwg/issues/324 -CVE-2021-28237 - https://github.com/LibreDWG/libredwg/issues/325 -CVE-2021-28242 - http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html -CVE-2021-28242 - https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644 -CVE-2021-28246 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ -CVE-2021-28247 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ -CVE-2021-28248 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ -CVE-2021-28249 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ -CVE-2021-28250 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ -CVE-2021-28269 - https://www.exploit-db.com/exploits/49679 -CVE-2021-28269 - https://www.zeroscience.mk/en/vulnerabilities -CVE-2021-28269 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5634.php -CVE-2021-28271 - https://www.exploit-db.com/exploits/49678 -CVE-2021-28271 - https://www.zeroscience.mk/en/vulnerabilities -CVE-2021-28271 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5633.php -CVE-2021-28275 - https://github.com/Matthias-Wandel/jhead/issues/17 -CVE-2021-28277 - https://github.com/Matthias-Wandel/jhead/issues/16 -CVE-2021-28278 - https://github.com/Matthias-Wandel/jhead/issues/15 -CVE-2021-28280 - https://anotepad.com/notes/2skndayt -CVE-2021-28293 - https://0xdb9.in/2021/06/07/cve-2021-28293.html -CVE-2021-28294 - https://www.exploit-db.com/exploits/49615 -CVE-2021-28295 - https://www.exploit-db.com/exploits/49618 -CVE-2021-28300 - https://github.com/gpac/gpac/issues/1702 -CVE-2021-28302 - https://github.com/pupnp/pupnp/issues/249 -CVE-2021-28313 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html -CVE-2021-28313 - http://seclists.org/fulldisclosure/2021/Apr/40 -CVE-2021-28321 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html -CVE-2021-28321 - http://seclists.org/fulldisclosure/2021/Apr/40 -CVE-2021-28322 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html -CVE-2021-28322 - http://seclists.org/fulldisclosure/2021/Apr/40 -CVE-2021-28323 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html -CVE-2021-28323 - http://seclists.org/fulldisclosure/2021/Apr/40 -CVE-2021-28363 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28376 - https://herolab.usd.de/en/security-advisories/usd-2021-0006 -CVE-2021-28377 - https://herolab.usd.de/en/security-advisories/usd-2021-0007/ -CVE-2021-28378 - https://github.com/go-gitea/gitea/pull/14898 -CVE-2021-28379 - http://packetstormsecurity.com/files/161836/VestaCP-0.9.8-Cross-Site-Request-Forgery.html -CVE-2021-28382 - https://raxis.com/blog/cve-2021-28382 -CVE-2021-28417 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html -CVE-2021-28417 - https://github.com/seopanel/Seo-Panel/issues/208 -CVE-2021-28418 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html -CVE-2021-28418 - https://github.com/seopanel/Seo-Panel/issues/207 -CVE-2021-28419 - http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html -CVE-2021-28419 - https://github.com/seopanel/Seo-Panel/issues/209 -CVE-2021-28420 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html -CVE-2021-28420 - https://github.com/seopanel/Seo-Panel/issues/206 -CVE-2021-28423 - https://nhattruong.blog/2021/05/22/cve-2021-28423-teachers-record-management-system-1-0-searchdata-error-based-sql-injection-authenticated/ -CVE-2021-28423 - https://packetstormsecurity.com/files/163172/Teachers-Record-Management-System-1.0-SQL-Injection.html -CVE-2021-28423 - https://www.exploit-db.com/exploits/50018 -CVE-2021-28424 - https://nhattruong.blog/2021/05/22/cve-2021-28424-teachers-record-management-system-1-0-email-stored-cross-site-scripting-xss-vulnerability-authenticated/ -CVE-2021-28424 - https://packetstormsecurity.com/files/163171/Teachers-Record-Management-System-1.0-Cross-Site-Scripting.html -CVE-2021-28424 - https://www.exploit-db.com/exploits/50019 -CVE-2021-28429 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/c94875471e3ba3dc396c6919ff3ec9b14539cd71 -CVE-2021-28459 - http://packetstormsecurity.com/files/162190/Microsoft-Azure-DevOps-Server-2020.0.1-Cross-Site-Scripting.html -CVE-2021-28459 - http://seclists.org/fulldisclosure/2021/Apr/25 -CVE-2021-28476 - http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html -CVE-2021-28485 - https://www.ericsson.com/en/about-us/security/psirt -CVE-2021-28485 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2021-28488 - https://www.ericsson.com -CVE-2021-28488 - https://www.ericsson.com/en/about-us/enterprise-security/psirt -CVE-2021-28488 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2021-28653 - https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability -CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7 -CVE-2021-28661 - https://github.com/silverstripe/silverstripe-graphql/releases -CVE-2021-28663 - https://github.com/lntrx/CVE-2021-28663 -CVE-2021-28665 - https://advisories.stormshield.eu/ -CVE-2021-28680 - https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/ -CVE-2021-28684 - https://peterka.tech/blog/posts/cve-2021-28684/ -CVE-2021-28807 - https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/ -CVE-2021-28807 - https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/ -CVE-2021-28838 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-28839 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-28840 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-28855 - https://fatihhcelik.github.io/posts/NULL-Pointer-Dereference-Deark/ -CVE-2021-28856 - https://fatihhcelik.github.io/posts/Division-By-Zero-Deark/ -CVE-2021-28857 - https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-credentials-in-cookie-7516a2649394 -CVE-2021-28858 - https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 -CVE-2021-28861 - https://bugs.python.org/issue43223 -CVE-2021-28903 - https://github.com/CESNET/libyang/issues/1453 -CVE-2021-28918 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md -CVE-2021-28918 - https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/ -CVE-2021-28927 - http://libretro.com -CVE-2021-28927 - https://labs.bishopfox.com/advisories/retroarch-for-windows-version-1.9.0 -CVE-2021-28935 - http://packetstormsecurity.com/files/162287/CMS-Made-Simple-2.2.15-Cross-Site-Scripting.html -CVE-2021-28936 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -CVE-2021-28937 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -CVE-2021-28940 - https://www.exploit-db.com/exploits/49643 -CVE-2021-28950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 -CVE-2021-28950 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed -CVE-2021-28957 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-28958 - https://blog.stmcyber.com/vulns/cve-2021-28958/ -CVE-2021-28958 - https://www.manageengine.com -CVE-2021-28959 - https://www.manageengine.com -CVE-2021-28960 - https://www.manageengine.com -CVE-2021-28962 - https://advisories.stormshield.eu/ -CVE-2021-28963 - https://issues.shibboleth.net/jira/browse/SSPCPP-922 -CVE-2021-28964 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5 -CVE-2021-28969 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-005.txt -CVE-2021-28970 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt -CVE-2021-28971 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea -CVE-2021-28972 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678 -CVE-2021-28975 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-18_CSNC-2021-018-WPMailster_XSS_CSRF.txt -CVE-2021-28979 - https://www.gruppotim.it/redteam -CVE-2021-28998 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/file_upload_RCE/File_upload_to_RCE.md -CVE-2021-28998 - https://seclists.org/fulldisclosure/2021/Mar/50 -CVE-2021-28999 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md -CVE-2021-28999 - https://seclists.org/fulldisclosure/2021/Mar/49 -CVE-2021-29002 - https://github.com/plone/Products.CMFPlone/issues/3255 -CVE-2021-29002 - https://www.exploit-db.com/exploits/49668 -CVE-2021-29003 - http://packetstormsecurity.com/files/162174/Genexis-PLATINUM-4410-2.1-P4410-V2-1.28-Remote-Command-Execution.html -CVE-2021-29004 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29004-POC-req.txt -CVE-2021-29004 - https://github.com/mrojz/rconfig-exploit/blob/main/README.md -CVE-2021-29005 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29005-POC.sh -CVE-2021-29006 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29006-POC.py -CVE-2021-29008 - https://github.com/seopanel/Seo-Panel/issues/211 -CVE-2021-29009 - https://github.com/seopanel/Seo-Panel/issues/210 -CVE-2021-29010 - https://github.com/seopanel/Seo-Panel/issues/212 -CVE-2021-29011 - http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html -CVE-2021-29011 - https://github.com/1d8/publications/tree/main/cve-2021-29011 -CVE-2021-29012 - http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html -CVE-2021-29012 - https://github.com/1d8/publications/tree/main/cve-2021-29012 -CVE-2021-29022 - https://notnnor.github.io/research/2021/03/17/full-path-discloure-in-invoiceplane.html -CVE-2021-29023 - https://notnnor.github.io/research/2021/03/16/weak-password-recovery-mechanism-in-invoiceplane.html -CVE-2021-29025 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29026 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29027 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29028 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29029 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29030 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29031 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29032 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29033 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -CVE-2021-29041 - https://issues.liferay.com/browse/LPE-17131 -CVE-2021-29049 - https://issues.liferay.com/browse/LPE-17211 -CVE-2021-29054 - https://packetstormsecurity.com/files/162077/Papoo-CMS-Cross-Site-Request-Forgery.html -CVE-2021-29055 - https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html -CVE-2021-29056 - https://github.com/pixelimity/pixelimity/issues/21 -CVE-2021-29059 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md -CVE-2021-29060 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md -CVE-2021-29061 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md -CVE-2021-29061 - https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md -CVE-2021-29063 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md -CVE-2021-29067 - https://kb.netgear.com/000063017/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0492 -CVE-2021-29068 - https://kb.netgear.com/000063021/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0155 -CVE-2021-29070 - https://kb.netgear.com/000063019/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Routers-PSV-2020-0530 -CVE-2021-29072 - https://kb.netgear.com/000063018/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0493 -CVE-2021-29075 - https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466 -CVE-2021-29099 - https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-e21-03-server-sql/ -CVE-2021-29100 - https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update -CVE-2021-29154 - http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html -CVE-2021-29154 - https://news.ycombinator.com/item?id=26757760 -CVE-2021-29154 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-29155 - https://www.kernel.org -CVE-2021-29155 - https://www.openwall.com/lists/oss-security/2021/04/18/4 -CVE-2021-29158 - https://support.sonatype.com/hc/en-us/articles/1500006126462 -CVE-2021-29158 - https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base -CVE-2021-29159 - https://support.sonatype.com/hc/en-us/articles/1500005031082 -CVE-2021-29159 - https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base -CVE-2021-29252 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2021-29253 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2021-29265 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 -CVE-2021-29266 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9 -CVE-2021-29267 - https://github.com/Security-AVS/CVE-2021-29267 -CVE-2021-29281 - https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload -CVE-2021-29281 - https://www.exploit-db.com/exploits/50181 -CVE-2021-29294 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-29295 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-29296 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-29302 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 -CVE-2021-29323 - https://github.com/Moddable-OpenSource/moddable/issues/5 -CVE-2021-29324 - https://github.com/Moddable-OpenSource/moddable/issues/586 -CVE-2021-29325 - https://github.com/Moddable-OpenSource/moddable/issues/582 -CVE-2021-29326 - https://github.com/Moddable-OpenSource/moddable/issues/583 -CVE-2021-29327 - https://github.com/Moddable-OpenSource/moddable/issues/580 -CVE-2021-29328 - https://github.com/Moddable-OpenSource/moddable/issues/585 -CVE-2021-29329 - https://github.com/Moddable-OpenSource/moddable/issues/587 -CVE-2021-29337 - https://github.com/rjt-gupta/CVE-2021-29337 -CVE-2021-29338 - https://github.com/uclouvain/openjpeg/issues/1338 -CVE-2021-29343 - https://www.exploit-db.com/exploits/49707 -CVE-2021-29349 - https://github.com/0xBaz/CVE-2021-29349/issues/1 -CVE-2021-29369 - https://www.npmjs.com/package/@rkesters/gnuplot -CVE-2021-29370 - https://medium.com/@kunal94/indirect-uxss-issues-on-a-private-integrated-browser-219f6b809b6c -CVE-2021-29376 - https://www.openwall.com/lists/oss-security/2021/03/24/2 -CVE-2021-29378 - https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DIEC -CVE-2021-29379 - https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection -CVE-2021-29379 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-29387 - https://www.exploit-db.com/exploits/49722 -CVE-2021-29388 - https://www.exploit-db.com/exploits/49723 -CVE-2021-29390 - https://bugzilla.redhat.com/show_bug.cgi?id=1943797 -CVE-2021-29393 - https://ardent-security.com -CVE-2021-29393 - https://ardent-security.com/en/advisory/asa-2021-01/ -CVE-2021-29394 - https://ardent-security.com -CVE-2021-29394 - https://ardent-security.com/en/advisory/asa-2021-02/ -CVE-2021-29395 - https://ardent-security.com/en/advisory/asa-2021-03/ -CVE-2021-29396 - https://ardent-security.com/en/advisory/asa-2021-04/ -CVE-2021-29397 - https://ardent-security.com/en/advisory/asa-2021-05/ -CVE-2021-29398 - https://ardent-security.com/en/advisory/asa-2021-06/ -CVE-2021-29414 - https://eprint.iacr.org/2021/640 -CVE-2021-29415 - https://eprint.iacr.org/2021/640 -CVE-2021-29425 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-29425 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-29425 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-29425 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-29439 - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities -CVE-2021-29440 - http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html -CVE-2021-29440 - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities -CVE-2021-29442 - https://github.com/alibaba/nacos/issues/4463 -CVE-2021-29447 - http://packetstormsecurity.com/files/163148/XML-External-Entity-Via-MP3-File-Upload-On-WordPress.html -CVE-2021-29447 - http://packetstormsecurity.com/files/164198/WordPress-5.7-Media-Library-XML-Injection.html -CVE-2021-29447 - https://blog.sonarsource.com/wordpress-xxe-security-vulnerability/ -CVE-2021-29449 - http://packetstormsecurity.com/files/163715/Pi-Hole-Remove-Commands-Linux-Privilege-Escalation.html -CVE-2021-29458 - https://github.com/Exiv2/exiv2/pull/1536 -CVE-2021-29460 - http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html -CVE-2021-29473 - https://github.com/Exiv2/exiv2/security/policy -CVE-2021-29474 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87 -CVE-2021-29475 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pxxg-px9v-6qf3 -CVE-2021-29484 - https://blog.sonarsource.com/ghost-admin-takeover -CVE-2021-29486 - https://www.npmjs.com/package/cumulative-distribution-function -CVE-2021-29505 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-29505 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-29505 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-29505 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-29623 - https://github.com/Exiv2/exiv2/pull/1627 -CVE-2021-29624 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html -CVE-2021-29641 - http://packetstormsecurity.com/files/162118/Monospace-Directus-Headless-CMS-File-Upload-Rule-Bypass.html -CVE-2021-29641 - http://seclists.org/fulldisclosure/2021/Apr/14 -CVE-2021-29641 - https://sec-consult.com/vulnerability-lab/advisory/arbitrary-file-upload-and-bypassing-htaccess-rules-in-monospace-directus-headless-cms/ -CVE-2021-29643 - https://raxis.com/blog/prtg-network-monitor-cve-2021-29643 -CVE-2021-29646 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 -CVE-2021-29646 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0217ed2848e8538bcf9172d97ed2eeb4a26041bb -CVE-2021-29647 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 -CVE-2021-29647 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160 -CVE-2021-29648 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 -CVE-2021-29648 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef -CVE-2021-29649 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 -CVE-2021-29649 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8 -CVE-2021-29650 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 -CVE-2021-29650 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1 -CVE-2021-29657 - http://packetstormsecurity.com/files/163324/KVM-nested_svm_vmrun-Double-Fetch.html -CVE-2021-29657 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.12 -CVE-2021-29657 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a58d9166a756a0f4a6618e4f593232593d6df134 -CVE-2021-29660 - https://www.gruppotim.it/redteam -CVE-2021-29661 - https://www.gruppotim.it/redteam -CVE-2021-29662 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md -CVE-2021-29662 - https://sick.codes/sick-2021-018/ -CVE-2021-29663 - http://sourceforge.net/projects/coursems -CVE-2021-29700 - https://www.ibm.com/support/pages/node/6496749 -CVE-2021-29921 - https://github.com/python/cpython/pull/12577 -CVE-2021-29921 - https://github.com/python/cpython/pull/25099 -CVE-2021-29921 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md -CVE-2021-29921 - https://sick.codes/sick-2021-014 -CVE-2021-29921 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-29922 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md -CVE-2021-29923 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md -CVE-2021-29923 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-29944 - https://bugzilla.mozilla.org/show_bug.cgi?id=1697604 -CVE-2021-29951 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690062 -CVE-2021-29953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701684 -CVE-2021-29955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692972 -CVE-2021-29957 - https://bugzilla.mozilla.org/show_bug.cgi?id=1673241 -CVE-2021-29962 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701673 -CVE-2021-29964 - https://bugzilla.mozilla.org/show_bug.cgi?id=1706501 -CVE-2021-29965 - https://bugzilla.mozilla.org/show_bug.cgi?id=1709257 -CVE-2021-29983 - https://bugzilla.mozilla.org/show_bug.cgi?id=1719088 -CVE-2021-29985 - https://bugzilla.mozilla.org/show_bug.cgi?id=1722083 -CVE-2021-29995 - http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html -CVE-2021-29995 - https://support1.cloverdx.com/hc/en-us/articles/360021006520 -CVE-2021-29996 - https://github.com/marktext/marktext/issues/2548 -CVE-2021-30002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3 -CVE-2021-30002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899 -CVE-2021-3002 - http://www.cinquino.eu/SeoPanelReflect.htm -CVE-2021-3002 - https://github.com/seopanel/Seo-Panel/issues/202 -CVE-2021-30028 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -CVE-2021-3003 - https://fibonhack.github.io/2021/desktop-telematico-mitm-to-rce -CVE-2021-30030 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html -CVE-2021-30034 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html -CVE-2021-30039 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html -CVE-2021-30042 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html -CVE-2021-30044 - http://packetstormsecurity.com/files/162262/RemoteClinic-2-Cross-Site-Scripting.html -CVE-2021-30046 - https://github.com/ukoethe/vigra/issues/494 -CVE-2021-30047 - https://www.exploit-db.com/exploits/49719 -CVE-2021-30048 - https://github.com/201206030/novel-plus/issues/39 -CVE-2021-30048 - https://www.exploit-db.com/exploits/49724 -CVE-2021-30055 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/SQLi-KnowageSuite.md -CVE-2021-30056 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite.md -CVE-2021-30057 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/HTLM-Injection-KnowageSuite.md -CVE-2021-30058 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSSI-KnowageSuite.md -CVE-2021-3007 - https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md -CVE-2021-30072 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-30083 - https://github.com/WebFairyNet/Mediat/issues/3 -CVE-2021-3010 - https://www.exploit-db.com/exploits/49578 -CVE-2021-30108 - https://github.com/liufee/cms/issues/57 -CVE-2021-30109 - https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md -CVE-2021-30110 - https://blog.grimm-co.com/2021/04/time-for-upgrade.html -CVE-2021-30111 - https://github.com/0xrayan/CVEs/issues/4 -CVE-2021-30112 - https://github.com/0xrayan/CVEs/issues/3 -CVE-2021-30113 - https://github.com/0xrayan/CVEs/issues/1 -CVE-2021-30114 - https://github.com/0xrayan/CVEs/issues/2 -CVE-2021-30117 - https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021 -CVE-2021-30123 - https://trac.ffmpeg.org/ticket/8863 -CVE-2021-30129 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-30129 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-30133 - https://support1.cloverdx.com/hc/en-us/articles/360021006520 -CVE-2021-30134 - https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7 -CVE-2021-3014 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md -CVE-2021-3014 - https://m4dm0e.github.io/2021/01/04/mikrotik-xss-reflected.html -CVE-2021-30140 - http://packetstormsecurity.com/files/167228/LiquidFiles-3.4.15-Cross-Site-Scripting.html -CVE-2021-30145 - https://devel0pment.de/?p=2217 -CVE-2021-30146 - https://github.com/Security-AVS/CVE-2021-30146 -CVE-2021-30147 - http://packetstormsecurity.com/files/162136/DMA-Radius-Manager-4.4.0-Cross-Site-Request-Forgery.html -CVE-2021-30149 - http://packetstormsecurity.com/files/162128/Composr-10.0.36-Shell-Upload.html -CVE-2021-30150 - http://packetstormsecurity.com/files/162111/Composr-CMS-10.0.36-Cross-Site-Scripting.html -CVE-2021-30151 - https://github.com/mperham/sidekiq/issues/4852 -CVE-2021-30178 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=919f4ebc598701670e80e31573a58f1f2d2bf918 -CVE-2021-3018 - http://packetstormsecurity.com/files/160815/IPeakCMS-3.5-SQL-Injection.html -CVE-2021-3018 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2020-12-07-ipeak-cms-sqli.md -CVE-2021-3018 - https://m4dm0e.github.io/2020/12/07/ipeak-cms-sqli.html -CVE-2021-30201 - https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021 -CVE-2021-30203 - https://github.com/zyx0814/dzzoffice/issues/183 -CVE-2021-30211 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-surname.md -CVE-2021-30212 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-notes.md -CVE-2021-30213 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md -CVE-2021-30214 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/CSTI-KnowageSuite7-3.md -CVE-2021-30224 - https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760 -CVE-2021-3025 - http://packetstormsecurity.com/files/160830/IPS-Community-Suite-4.5.4-SQL-Injection.html -CVE-2021-30254 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30255 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30256 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30257 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30258 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30259 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30260 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-30261 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin -CVE-2021-30262 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30263 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30264 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30265 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30266 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30267 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30268 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30269 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30270 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30271 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30272 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30273 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30274 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30275 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30276 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30278 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30279 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30282 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30283 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30284 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30285 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30287 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30288 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30289 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30290 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-30291 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30292 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30293 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30294 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-30295 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin -CVE-2021-30297 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30298 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30300 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30301 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30302 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30303 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30304 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30305 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30306 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30307 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30308 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30309 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30310 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30311 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30312 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30313 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30314 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30315 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30316 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin -CVE-2021-30317 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30318 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30319 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30321 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin -CVE-2021-30322 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30323 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30324 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30325 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30326 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-30328 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-30329 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-30330 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30331 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-30332 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-30333 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-30335 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30336 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30337 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30348 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30351 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-30353 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin -CVE-2021-30468 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-30468 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-30480 - https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own -CVE-2021-30481 - https://news.ycombinator.com/item?id=26762170 -CVE-2021-30481 - https://www.youtube.com/watch?v=rNQn--9xR1Q -CVE-2021-30493 - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ -CVE-2021-30493 - https://versprite.com/security-resources/ -CVE-2021-30494 - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ -CVE-2021-30494 - https://versprite.com/security-resources/ -CVE-2021-30496 - https://t.me/joinchat/bJ9cnUosVh03ZTI0 -CVE-2021-30498 - https://github.com/cacalabs/libcaca/issues/53 -CVE-2021-30499 - https://github.com/cacalabs/libcaca/issues/54 -CVE-2021-30500 - https://github.com/upx/upx/issues/485 -CVE-2021-30501 - https://github.com/upx/upx/issues/486 -CVE-2021-30522 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1251 -CVE-2021-30528 - http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html -CVE-2021-30561 - http://packetstormsecurity.com/files/163835/Chrome-JS-WasmJs-InstallConditionalFeatures-Object-Corruption.html -CVE-2021-3060 - https://security.paloaltonetworks.com/CVE-2021-3060 -CVE-2021-30602 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348 -CVE-2021-30603 - http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html -CVE-2021-30625 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352 -CVE-2021-30632 - http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html -CVE-2021-30635 - https://support.sonatype.com/hc/en-us/articles/1500006879561 -CVE-2021-30637 - http://packetstormsecurity.com/files/162195/htmly-2.8.0-Cross-Site-Scripting.html -CVE-2021-30639 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-30639 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-30640 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-30640 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-30640 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-30641 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/25 -CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/27 -CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/29 -CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/38 -CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/39 -CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/25 -CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/26 -CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/27 -CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/28 -CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/38 -CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/39 -CVE-2021-30917 - http://packetstormsecurity.com/files/165075/Apple-ColorSync-CMMNDimLinear-Interpolate-Uninitialized-Memory.html -CVE-2021-30934 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-30936 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-30937 - http://packetstormsecurity.com/files/165475/XNU-inm_merge-Heap-Use-After-Free.html -CVE-2021-30939 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1414 -CVE-2021-30942 - http://packetstormsecurity.com/files/165559/Apple-ColorSync-Out-Of-Bounds-Read.html -CVE-2021-30949 - http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html -CVE-2021-30951 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-30952 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-30953 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-30954 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-30984 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-3100 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities -CVE-2021-3101 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities -CVE-2021-3110 - https://medium.com/@gondaliyajaimin797/cve-2021-3110-75a24943ca5e -CVE-2021-3110 - https://www.exploit-db.com/exploits/49410 -CVE-2021-3111 - http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html -CVE-2021-3111 - http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html -CVE-2021-3113 - https://www.exploit-db.com/exploits/49435 -CVE-2021-3113 - https://www.netsia.com/#netsiaseba -CVE-2021-3113 - https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html -CVE-2021-31152 - http://packetstormsecurity.com/files/162258/Multilaser-Router-RE018-AC1200-Cross-Site-Request-Forgery.html -CVE-2021-31152 - https://www.youtube.com/watch?v=zN3DVrcu6Eg -CVE-2021-31156 - https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8 -CVE-2021-31159 - http://packetstormsecurity.com/files/163192/Zoho-ManageEngine-ServiceDesk-Plus-9.4-User-Enumeration.html -CVE-2021-31159 - https://www.manageengine.com -CVE-2021-31159 - https://www.manageengine.com/products/service-desk-msp/readme.html#10519 -CVE-2021-3116 - https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/ -CVE-2021-31160 - https://www.manageengine.com/products/service-desk-msp/readme.html#10521 -CVE-2021-31162 - https://github.com/rust-lang/rust/issues/83618 -CVE-2021-31165 - http://packetstormsecurity.com/files/162555/Windows-Container-Manager-Service-CmsRpcSrv_CreateContainer-Privilege-Escalation.html -CVE-2021-31166 - http://packetstormsecurity.com/files/162722/Microsoft-HTTP-Protocol-Stack-Remote-Code-Execution.html -CVE-2021-31167 - http://packetstormsecurity.com/files/162559/Windows-Container-Manager-Service-CmsRpcSrv_MapNamedPipeToContainer-Privilege-Escalation.html -CVE-2021-31168 - http://packetstormsecurity.com/files/162556/Windows-Container-Manager-Service-CmsRpcSrv_MapVirtualDiskToContainer-Privilege-Escalation.html -CVE-2021-31169 - http://packetstormsecurity.com/files/162557/Windows-Container-Manager-Service-Arbitrary-Object-Directory-Creation-Privilege-Escalation.html -CVE-2021-3118 - https://www.exploit-db.com/exploits/49392 -CVE-2021-31181 - http://packetstormsecurity.com/files/163208/Microsoft-SharePoint-Unsafe-Control-And-ViewState-Remote-Code-Execution.html -CVE-2021-3120 - https://github.com/guy-liu/yith-giftdrop -CVE-2021-31207 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html -CVE-2021-3122 - https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 -CVE-2021-3122 - https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/ -CVE-2021-31220 - https://advisories.stormshield.eu -CVE-2021-31220 - https://advisories.stormshield.eu/2021-022/ -CVE-2021-31221 - https://advisories.stormshield.eu -CVE-2021-31221 - https://advisories.stormshield.eu/2021-023/ -CVE-2021-31222 - https://advisories.stormshield.eu -CVE-2021-31222 - https://advisories.stormshield.eu/2021-024/ -CVE-2021-31223 - https://advisories.stormshield.eu -CVE-2021-31223 - https://advisories.stormshield.eu/2021-025/ -CVE-2021-31224 - https://advisories.stormshield.eu -CVE-2021-31224 - https://advisories.stormshield.eu/2021-026/ -CVE-2021-31225 - https://advisories.stormshield.eu -CVE-2021-31225 - https://advisories.stormshield.eu/2021-027/ -CVE-2021-31226 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-31226 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-31227 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-31227 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-31228 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-31228 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-31239 - https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239 -CVE-2021-31239 - https://www.sqlite.org/forum/forumpost/d9fce1a89b -CVE-2021-3124 - https://www.exploit-db.com/exploits/49406 -CVE-2021-31240 - https://github.com/libming/libming/issues/218 -CVE-2021-31245 - https://medium.com/d3crypt/timing-attack-on-openmptcprouter-vps-admin-authentication-cve-2021-31245-12dd92303e1 -CVE-2021-31249 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249 -CVE-2021-31250 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250 -CVE-2021-31251 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251 -CVE-2021-31252 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31252 -CVE-2021-31254 - https://github.com/gpac/gpac/issues/1703 -CVE-2021-31255 - https://github.com/gpac/gpac/issues/1733 -CVE-2021-31256 - https://github.com/gpac/gpac/issues/1705 -CVE-2021-31257 - https://github.com/gpac/gpac/issues/1734 -CVE-2021-31258 - https://github.com/gpac/gpac/issues/1706 -CVE-2021-31259 - https://github.com/gpac/gpac/issues/1735 -CVE-2021-31260 - https://github.com/gpac/gpac/issues/1736 -CVE-2021-31261 - https://github.com/gpac/gpac/issues/1737 -CVE-2021-31262 - https://github.com/gpac/gpac/issues/1738 -CVE-2021-31280 - https://github.com/fmsdwifull/tp5cms/issues/8 -CVE-2021-3129 - http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html -CVE-2021-3129 - http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html -CVE-2021-31315 - https://www.shielder.it/advisories/telegram-rlottie-blit-stack-buffer-overflow/ -CVE-2021-31316 - https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/ -CVE-2021-31317 - https://www.shielder.it/advisories/telegram-rlottie-vdasher-vdasher-type-confusion/ -CVE-2021-31318 - https://www.shielder.it/advisories/telegram-rlottie-lotcomplayeritem-lotcomplayeritem-type-confusion/ -CVE-2021-31319 - https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-integer-overflow/ -CVE-2021-31320 - https://www.shielder.it/advisories/telegram-rlottie-vgradientcache-generategradientcolortable-heap-buffer-overflow/ -CVE-2021-31321 - https://www.shielder.it/advisories/telegram-rlottie-gray_split_cubic-stack-buffer-overflow/ -CVE-2021-31322 - https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-heap-buffer-overflow/ -CVE-2021-31323 - https://www.shielder.it/advisories/telegram-rlottie-lottieparserimpl-parsedashproperty-heap-buffer-overflow/ -CVE-2021-31324 - https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/ -CVE-2021-31326 - https://github.com/GD008/vuln/blob/main/DIR-816_reset.md -CVE-2021-31326 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-31329 - https://github.com/remoteclinic/RemoteClinic/issues/16 -CVE-2021-31330 - https://mattschmidt.net/2021/04/14/review-board-xss-discovered/ -CVE-2021-3137 - https://www.exploit-db.com/exploits/49437 -CVE-2021-3138 - http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html -CVE-2021-3138 - https://github.com/Mesh3l911/Disource -CVE-2021-31384 - https://kb.juniper.net/ -CVE-2021-31400 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-31400 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-31401 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-31401 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-31408 - https://github.com/vaadin/flow/pull/10577 -CVE-2021-3144 - https://github.com/saltstack/salt/releases -CVE-2021-31440 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36 -CVE-2021-3145 - http://packetstormsecurity.com/files/164085/Ionic-Identity-Vault-4.7-Android-Biometric-Authentication-Bypass.html -CVE-2021-31476 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-3148 - https://github.com/saltstack/salt/releases -CVE-2021-3149 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 -CVE-2021-3150 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 -CVE-2021-31505 - https://kb.arlo.com/000062592/Security-Advisory-for-Arlo-Q-Plus-SSH-Use-of-Hard-coded-Credentials-Allowing-Privilege-Escalation -CVE-2021-3151 - http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html -CVE-2021-3151 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 -CVE-2021-31530 - https://www.manageengine.com/products/service-desk-msp/readme.html#10522 -CVE-2021-31531 - https://www.manageengine.com/products/service-desk-msp/readme.html#10521 -CVE-2021-31532 - https://oxide.computer/blog/lpc55/ -CVE-2021-31535 - http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html -CVE-2021-31535 - http://seclists.org/fulldisclosure/2021/May/52 -CVE-2021-31535 - https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ -CVE-2021-31535 - https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt -CVE-2021-31537 - http://seclists.org/fulldisclosure/2021/May/20 -CVE-2021-31538 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-010.txt -CVE-2021-31539 - https://www.gruppotim.it/redteam -CVE-2021-31540 - https://www.gruppotim.it/redteam -CVE-2021-31552 - https://phabricator.wikimedia.org/T152394 -CVE-2021-3156 - http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html -CVE-2021-3156 - http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html -CVE-2021-3156 - http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html -CVE-2021-3156 - http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html -CVE-2021-3156 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html -CVE-2021-3156 - http://seclists.org/fulldisclosure/2024/Feb/3 -CVE-2021-3156 - http://www.openwall.com/lists/oss-security/2024/01/30/6 -CVE-2021-3156 - http://www.openwall.com/lists/oss-security/2024/01/30/8 -CVE-2021-3156 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-3156 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3156 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-31583 - http://packetstormsecurity.com/files/162316/Sipwise-C5-NGCP-CSC-Cross-Site-Scripting.html -CVE-2021-31583 - https://www.zeroscience.mk/en/vulnerabilities -CVE-2021-31583 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5648.php -CVE-2021-31584 - http://packetstormsecurity.com/files/162318/Sipwise-C5-NGCP-CSC-Cross-Site-Request-Forgery.html -CVE-2021-31584 - https://www.zeroscience.mk/en/vulnerabilities -CVE-2021-31584 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5649.php -CVE-2021-31589 - http://packetstormsecurity.com/files/165408/BeyondTrust-Remote-Support-6.0-Cross-Site-Scripting.html -CVE-2021-31589 - https://cxsecurity.com/issue/WLB-2022010013 -CVE-2021-31599 - http://packetstormsecurity.com/files/164772/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Remote-Code-Execution.html -CVE-2021-31600 - http://packetstormsecurity.com/files/164787/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-User-Enumeration.html -CVE-2021-31601 - http://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html -CVE-2021-31602 - http://packetstormsecurity.com/files/164784/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Authentication-Bypass.html -CVE-2021-31604 - http://packetstormsecurity.com/files/164281/OpenVPN-Monitor-1.1.3-Cross-Site-Request-Forgery.html -CVE-2021-31605 - http://packetstormsecurity.com/files/164278/OpenVPN-Monitor-1.1.3-Command-Injection.html -CVE-2021-31606 - http://packetstormsecurity.com/files/164274/OpenVPN-Monitor-1.1.3-Authorization-Bypass-Denial-Of-Service.html -CVE-2021-31607 - https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/ -CVE-2021-31609 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31610 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31611 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31612 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31613 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31616 - https://blog.inhq.net/posts/keepkey-CVE-2021-31616/ -CVE-2021-31617 - https://advisories.stormshield.eu/ -CVE-2021-31617 - https://advisories.stormshield.eu/2021-020/ -CVE-2021-31618 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-31624 - https://github.com/Lyc-heng/routers/blob/main/routers/stack2.md -CVE-2021-31627 - https://github.com/Lyc-heng/routers/blob/main/routers/stack3.md -CVE-2021-3163 - https://github.com/quilljs/quill/issues/3364 -CVE-2021-31630 - https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html -CVE-2021-31630 - https://www.youtube.com/watch?v=l08DHB08Gow -CVE-2021-3164 - https://github.com/rmccarth/cve-2021-3164 -CVE-2021-31641 - http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html -CVE-2021-31641 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641 -CVE-2021-31642 - http://packetstormsecurity.com/files/162934/CHIYU-IoT-Denial-Of-Service.html -CVE-2021-31642 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642 -CVE-2021-31643 - http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html -CVE-2021-31643 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31643 -CVE-2021-31645 - https://www.exploit-db.com/exploits/49773 -CVE-2021-3165 - https://packetstormsecurity.com/files/160906/SmartAgent-3.1.0-Privilege-Escalation.html -CVE-2021-31650 - https://www.exploit-db.com/exploits/49493 -CVE-2021-31655 - https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md -CVE-2021-31658 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31658 -CVE-2021-31659 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31659 -CVE-2021-3166 - https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-17-dsl-n14u.md -CVE-2021-3166 - https://kaisersource.github.io/dsl-n14u -CVE-2021-31660 - https://github.com/RIOT-OS/RIOT/commit/85da504d2dc30188b89f44c3276fc5a25b31251f -CVE-2021-31660 - https://github.com/RIOT-OS/RIOT/pull/15947 -CVE-2021-31661 - https://github.com/RIOT-OS/RIOT/commit/609c9ada34da5546cffb632a98b7ba157c112658 -CVE-2021-31661 - https://github.com/RIOT-OS/RIOT/pull/15945 -CVE-2021-31662 - https://github.com/RIOT-OS/RIOT/commit/07f1254d8537497552e7dce80364aaead9266bbe -CVE-2021-31662 - https://github.com/RIOT-OS/RIOT/pull/15930 -CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/commit/bc59d60be60dfc0a05def57d74985371e4f22d79 -CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/issues/15927 -CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/pull/15929 -CVE-2021-31664 - https://github.com/RIOT-OS/RIOT/commit/44741ff99f7a71df45420635b238b9c22093647a -CVE-2021-31664 - https://github.com/RIOT-OS/RIOT/pull/15345 -CVE-2021-31673 - http://packetstormsecurity.com/files/167040/Cyclos-4.14.7-Cross-Site-Scripting.html -CVE-2021-31674 - https://www.exploit-db.com/exploits/50908 -CVE-2021-31676 - https://github.com/RO6OTXX/pescms_vulnerability -CVE-2021-31676 - https://github.com/lazyphp/PESCMS-TEAM/issues/7 -CVE-2021-31676 - https://github.com/two-kisses/pescms_vulnerability, -CVE-2021-31677 - https://github.com/RO6OTXX/pescms_vulnerability -CVE-2021-31677 - https://github.com/lazyphp/PESCMS-TEAM/issues/7, -CVE-2021-31677 - https://github.com/two-kisses/pescms_vulnerability, -CVE-2021-31678 - https://github.com/RO6OTXX/pescms_vulnerability -CVE-2021-31678 - https://github.com/lazyphp/PESCMS-TEAM/issues/7 -CVE-2021-31678 - https://github.com/two-kisses/pescms_vulnerability -CVE-2021-31679 - https://github.com/RO6OTXX/pescms_vulnerability -CVE-2021-31679 - https://github.com/lazyphp/PESCMS-TEAM/issues/7 -CVE-2021-31679 - https://github.com/two-kisses/pescms_vulnerability, -CVE-2021-31680 - https://huntr.dev/bounties/1-other-yolov5/ -CVE-2021-31681 - https://huntr.dev/bounties/1-other-yolov3/ -CVE-2021-31682 - http://packetstormsecurity.com/files/164707/WebCTRL-OEM-6.5-Cross-Site-Scripting.html -CVE-2021-31684 - https://github.com/netplex/json-smart-v2/issues/67 -CVE-2021-31684 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-31684 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3169 - https://mp.weixin.qq.com/s/5tgcaIrnDnGP-LvWPw9YCg -CVE-2021-31693 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html -CVE-2021-31721 - http://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html -CVE-2021-31721 - https://www.exploit-db.com/exploits/49859 -CVE-2021-31727 - https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31727.md -CVE-2021-31728 - https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31728.md -CVE-2021-31738 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-024.txt -CVE-2021-31755 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3 -CVE-2021-31756 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1 -CVE-2021-31757 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4 -CVE-2021-31758 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_2 -CVE-2021-31760 - https://github.com/Mesh3l911/CVE-2021-31760 -CVE-2021-31760 - https://github.com/electronicbots/CVE-2021-31760 -CVE-2021-31760 - https://youtu.be/D45FN8QrzDo -CVE-2021-31761 - http://packetstormsecurity.com/files/163559/Webmin-1.973-Cross-Site-Request-Forgery.html -CVE-2021-31761 - https://github.com/Mesh3l911/CVE-2021-31761 -CVE-2021-31761 - https://github.com/electronicbots/CVE-2021-31761 -CVE-2021-31762 - http://packetstormsecurity.com/files/163492/Webmin-1.973-Cross-Site-Request-Forgery.html -CVE-2021-31762 - https://github.com/Mesh3l911/CVE-2021-31762 -CVE-2021-31762 - https://github.com/electronicbots/CVE-2021-31762 -CVE-2021-31762 - https://youtu.be/qCvEXwyaF5U -CVE-2021-31769 - https://gist.github.com/bc0d3/6d55866a78f66569383241406e18794f -CVE-2021-3177 - https://bugs.python.org/issue42938 -CVE-2021-3177 - https://news.ycombinator.com/item?id=26185005 -CVE-2021-3177 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-3177 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3177 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3177 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-31777 - http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html -CVE-2021-31777 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2021-3178 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6 -CVE-2021-31785 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31786 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-31787 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-3179 - https://medium.com/@ksteo11/yet-another-password-manager-app-how-to-better-secure-it-8e9df2ce35c8 -CVE-2021-31793 - https://gist.github.com/tj-oconnor/16a4116050bbcb4717315f519b944f1f -CVE-2021-31795 - https://mcyoloswagham.github.io/linux/ -CVE-2021-31796 - http://packetstormsecurity.com/files/164023/CyberArk-Credential-File-Insufficient-Effective-Key-Space.html -CVE-2021-31796 - http://seclists.org/fulldisclosure/2021/Sep/1 -CVE-2021-31796 - https://korelogic.com/Resources/Advisories/KL-001-2021-008.txt -CVE-2021-31797 - http://packetstormsecurity.com/files/164033/CyberArk-Credential-Provider-Race-Condition-Authorization-Bypass.html -CVE-2021-31797 - http://seclists.org/fulldisclosure/2021/Sep/2 -CVE-2021-31797 - https://korelogic.com/Resources/Advisories/KL-001-2021-009.txt -CVE-2021-31798 - http://packetstormsecurity.com/files/164035/CyberArk-Credential-Provider-Local-Cache-Decryption.html -CVE-2021-31798 - http://seclists.org/fulldisclosure/2021/Sep/3 -CVE-2021-31798 - https://korelogic.com/Resources/Advisories/KL-001-2021-010.txt -CVE-2021-31799 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-31800 - https://github.com/SecureAuthCorp/impacket/releases -CVE-2021-31805 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-31810 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-31811 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-31811 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-31811 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-31811 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-31811 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-31812 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-31812 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-31812 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-31812 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-31813 - https://raxis.com/blog/cve-2021-31813 -CVE-2021-31814 - https://advisories.stormshield.eu/ -CVE-2021-31814 - https://advisories.stormshield.eu/2021-019/ -CVE-2021-31815 - https://themarkup.org/privacy/2021/04/27/google-promised-its-contact-tracing-app-was-completely-private-but-it-wasnt -CVE-2021-31826 - https://issues.shibboleth.net/jira/browse/SSPCPP-927 -CVE-2021-31829 - http://www.openwall.com/lists/oss-security/2021/05/04/4 -CVE-2021-3183 - https://seclists.org/fulldisclosure/2021/Jan/20 -CVE-2021-31830 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 -CVE-2021-31831 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 -CVE-2021-31832 - https://kc.mcafee.com/corporate/index?page=content&id=SB10360 -CVE-2021-31833 - https://kc.mcafee.com/corporate/index?page=content&id=SB10370 -CVE-2021-31834 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-31835 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-31836 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 -CVE-2021-31837 - https://kc.mcafee.com/corporate/index?page=content&id=SB10363 -CVE-2021-31838 - https://kc.mcafee.com/corporate/index?page=content&id=SB10342 -CVE-2021-31839 - https://kc.mcafee.com/corporate/index?page=content&id=SB10362 -CVE-2021-31840 - https://kc.mcafee.com/corporate/index?page=content&id=SB10362 -CVE-2021-31841 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 -CVE-2021-31842 - https://kc.mcafee.com/corporate/index?page=content&id=SB10367 -CVE-2021-31843 - https://kc.mcafee.com/corporate/index?page=content&id=SB10367 -CVE-2021-31844 - https://kc.mcafee.com/corporate/index?page=content&id=SB10368 -CVE-2021-31845 - https://kc.mcafee.com/corporate/index?page=content&id=SB10368 -CVE-2021-31847 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 -CVE-2021-31848 - https://kc.mcafee.com/corporate/index?page=content&id=SB10371 -CVE-2021-31849 - https://kc.mcafee.com/corporate/index?page=content&id=SB10371 -CVE-2021-31850 - https://kc.mcafee.com/corporate/index?page=content&id=SB10358 -CVE-2021-31851 - https://kc.mcafee.com/corporate/index?page=content&id=SB10372 -CVE-2021-31852 - https://kc.mcafee.com/corporate/index?page=content&id=SB10372 -CVE-2021-31853 - https://kc.mcafee.com/corporate/index?page=content&id=SB10374 -CVE-2021-31854 - https://kc.mcafee.com/corporate/index?page=content&id=SB10378 -CVE-2021-31857 - https://www.manageengine.com -CVE-2021-31859 - https://www.ysoft.com/en -CVE-2021-31859 - https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler -CVE-2021-3186 - http://packetstormsecurity.com/files/161119/Tenda-AC5-AC1200-Wireless-Cross-Site-Scripting.html -CVE-2021-31862 - https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md -CVE-2021-31867 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-31869 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-31874 - https://blog.stmcyber.com/vulns/cve-2021-31874/ -CVE-2021-31876 - https://github.com/bitcoin/bitcoin -CVE-2021-31878 - http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html -CVE-2021-3188 - https://wehackmx.com/security-research/WeHackMX-2021-001/ -CVE-2021-31916 - https://seclists.org/oss-sec/2021/q1/268 -CVE-2021-31923 - https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html -CVE-2021-31932 - http://packetstormsecurity.com/files/165964/Nokia-Transport-Module-Authentication-Bypass.html -CVE-2021-31933 - http://packetstormsecurity.com/files/162572/Chamilo-LMS-1.11.14-Remote-Code-Execution.html -CVE-2021-31934 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -CVE-2021-31935 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -CVE-2021-3195 - https://github.com/bitcoin/bitcoin/issues/20866 -CVE-2021-31950 - http://packetstormsecurity.com/files/163080/Microsoft-SharePoint-Server-16.0.10372.20060-Server-Side-Request-Forgery.html -CVE-2021-31959 - http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html -CVE-2021-31962 - http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html -CVE-2021-3197 - https://github.com/saltstack/salt/releases -CVE-2021-31970 - http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html -CVE-2021-3198 - https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/ -CVE-2021-31985 - http://packetstormsecurity.com/files/163443/MpEngine-ASProtect-Embedded-Runtime-DLL-Memory-Corruption.html -CVE-2021-31987 - https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf -CVE-2021-3199 - https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFile.py -CVE-2021-3199 - https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py -CVE-2021-3200 - https://github.com/openSUSE/libsolv/issues/416 -CVE-2021-3200 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334 -CVE-2021-3200 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32002 - https://www.secomea.com/support/cybersecurity-advisory -CVE-2021-32003 - https://www.secomea.com/support/cybersecurity-advisory -CVE-2021-32004 - https://www.secomea.com/support/cybersecurity-advisory/#4578 -CVE-2021-32005 - https://www.secomea.com/support/cybersecurity-advisory/#5017 -CVE-2021-32006 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2021-32008 - https://www.secomea.com/support/cybersecurity-advisory -CVE-2021-32009 - https://www.secomea.com/support/cybersecurity-advisory -CVE-2021-32010 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2021-32012 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32013 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32014 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32021 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685 -CVE-2021-32022 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685 -CVE-2021-32023 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685 -CVE-2021-32033 - http://packetstormsecurity.com/files/163223/Protectimus-SLIM-NFC-Time-Manipulation.html -CVE-2021-32033 - http://seclists.org/fulldisclosure/2021/Jun/39 -CVE-2021-32033 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt -CVE-2021-32051 - http://packetstormsecurity.com/files/162534/Hexagon-G-nius-Auskunftsportal-SQL-Injection.html -CVE-2021-32051 - https://gist.githubusercontent.com/mke1985/a21a71098f48829916dfec74eff1e24a/raw/f635b060ad03e23fd887de48a79b70040daadadb/CVE-2021-32051 -CVE-2021-32066 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32089 - https://www.securifera.com/advisories/cve-2021-32089/ -CVE-2021-32089 - https://www.zebra.com/us/en/support-downloads/rfid/rfid-readers/fx9500.html -CVE-2021-32098 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack -CVE-2021-32099 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack -CVE-2021-3210 - https://github.com/BloodHoundAD/BloodHound/issues/338 -CVE-2021-32100 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack -CVE-2021-32132 - https://github.com/gpac/gpac/issues/1753 -CVE-2021-32134 - https://github.com/gpac/gpac/issues/1756 -CVE-2021-32135 - https://github.com/gpac/gpac/issues/1757 -CVE-2021-32136 - https://github.com/gpac/gpac/issues/1765 -CVE-2021-32137 - https://github.com/gpac/gpac/issues/1766 -CVE-2021-32138 - https://github.com/gpac/gpac/issues/1767 -CVE-2021-32139 - https://github.com/gpac/gpac/issues/1768 -CVE-2021-32142 - https://github.com/LibRaw/LibRaw/issues/400 -CVE-2021-32156 - https://github.com/Mesh3l911/CVE-2021-32156 -CVE-2021-32157 - https://github.com/Mesh3l911/CVE-2021-32157 -CVE-2021-32158 - https://github.com/Mesh3l911/CVE-2021-32158 -CVE-2021-32159 - https://github.com/Mesh3l911/CVE-2021-32159 -CVE-2021-32160 - https://github.com/Mesh3l911/CVE-2021-32160 -CVE-2021-32161 - https://github.com/Mesh3l911/CVE-2021-32161 -CVE-2021-32162 - https://github.com/Mesh3l911/CVE-2021-32162 -CVE-2021-32172 - http://packetstormsecurity.com/files/164445/Maian-Cart-3.8-Remote-Code-Execution.html -CVE-2021-32172 - https://dreyand.github.io/maian-cart-rce/ -CVE-2021-32172 - https://github.com/DreyAnd/maian-cart-rce -CVE-2021-32238 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-32238 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5651.php -CVE-2021-3224 - https://github.com/cskaza/cszcms/issues/28 -CVE-2021-32256 - https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 -CVE-2021-32263 - https://github.com/brackeen/ok-file-formats/issues/13 -CVE-2021-32265 - https://github.com/axiomatic-systems/Bento4/issues/545 -CVE-2021-32268 - https://github.com/gpac/gpac/issues/1587 -CVE-2021-32269 - https://github.com/gpac/gpac/issues/1574 -CVE-2021-32270 - https://github.com/gpac/gpac/issues/1586 -CVE-2021-32271 - https://github.com/gpac/gpac/issues/1575 -CVE-2021-32272 - https://github.com/knik0/faad2/issues/57 -CVE-2021-32273 - https://github.com/knik0/faad2/issues/56 -CVE-2021-32274 - https://github.com/knik0/faad2/issues/60 -CVE-2021-32275 - https://github.com/grame-cncm/faust/issues/482 -CVE-2021-32276 - https://github.com/knik0/faad2/issues/58 -CVE-2021-32277 - https://github.com/knik0/faad2/issues/59 -CVE-2021-32278 - https://github.com/knik0/faad2/issues/62 -CVE-2021-32281 - https://github.com/marcobambini/gravity/issues/313 -CVE-2021-32282 - https://github.com/marcobambini/gravity/issues/315 -CVE-2021-32283 - https://github.com/marcobambini/gravity/issues/314 -CVE-2021-32284 - https://github.com/marcobambini/gravity/issues/321 -CVE-2021-32285 - https://github.com/marcobambini/gravity/issues/319 -CVE-2021-32286 - https://github.com/ZerBea/hcxtools/issues/155 -CVE-2021-32287 - https://github.com/nokiatech/heif/issues/86 -CVE-2021-32288 - https://github.com/nokiatech/heif/issues/87 -CVE-2021-32289 - https://github.com/nokiatech/heif/issues/85 -CVE-2021-32292 - https://github.com/json-c/json-c/issues/654 -CVE-2021-32294 - https://github.com/drbye78/libgig/issues/1 -CVE-2021-32297 - https://github.com/lief-project/LIEF/issues/449 -CVE-2021-32298 - https://github.com/svanderburg/libiff/issues/10 -CVE-2021-32299 - https://github.com/mmp/pbrt-v3/issues/296 -CVE-2021-32305 - http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html -CVE-2021-3236 - https://github.com/vim/vim/issues/7674 -CVE-2021-3239 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101821 -CVE-2021-3239 - https://packetstormsecurity.com/files/160966/E-Learning-System-1.0-SQL-Injection-Shell-Upload.html -CVE-2021-3239 - https://www.exploit-db.com/exploits/49434 -CVE-2021-32399 - http://www.openwall.com/lists/oss-security/2021/05/11/2 -CVE-2021-32403 - http://packetstormsecurity.com/files/163023/Intelbras-Router-RF-301K-Cross-Site-Request-Forgery.html -CVE-2021-32403 - https://www.youtube.com/watch?v=1Ed-2xBFG3M -CVE-2021-32415 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm -CVE-2021-32426 - https://github.com/Galapag0s/Trendnet_TW100-S4W1CA/blob/main/writeup_XSS.txt -CVE-2021-3243 - https://drivertom.blogspot.com/2021/01/wfilter-icf-0day-rce.html -CVE-2021-32434 - https://github.com/leesavide/abcm2ps/issues/83 -CVE-2021-32435 - https://github.com/leesavide/abcm2ps/issues/84 -CVE-2021-32436 - https://github.com/leesavide/abcm2ps/issues/85 -CVE-2021-32437 - https://github.com/gpac/gpac/issues/1770 -CVE-2021-32438 - https://github.com/gpac/gpac/issues/1769 -CVE-2021-32439 - https://github.com/gpac/gpac/issues/1774 -CVE-2021-32440 - https://github.com/gpac/gpac/issues/1772 -CVE-2021-32457 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230 -CVE-2021-32458 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1231 -CVE-2021-32459 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 -CVE-2021-3246 - https://github.com/libsndfile/libsndfile/issues/687 -CVE-2021-32467 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-32468 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-32469 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-32489 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln2/#second-attack-variant-cve-pending -CVE-2021-3252 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01 -CVE-2021-32537 - http://packetstormsecurity.com/files/163498/Realtek-RTKVHD64.sys-Out-Of-Bounds-Access.html -CVE-2021-3254 - https://kaisersource.github.io/dsl-n14u-syn -CVE-2021-32547 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32548 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32549 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32550 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32551 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32552 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32553 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32554 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32555 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32556 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32557 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -CVE-2021-32558 - http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html -CVE-2021-3256 - https://github.com/poropro/kuaifan/issues/3 -CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/1 -CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/2 -CVE-2021-32568 - https://huntr.dev/bounties/04fc04b3-2dc1-4cad-a090-e403cd66b5ad -CVE-2021-32569 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html -CVE-2021-32570 - https://www.ericsson.com -CVE-2021-32570 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2021-32571 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html -CVE-2021-32604 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29000 -CVE-2021-32605 - https://srcincite.io/advisories/src-2021-0015/ -CVE-2021-32612 - http://seclists.org/fulldisclosure/2021/Jun/45 -CVE-2021-32612 - https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt -CVE-2021-32612 - https://trovent.io/security-advisory-2105-01 -CVE-2021-32617 - https://github.com/Exiv2/exiv2/pull/1657 -CVE-2021-32618 - https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c -CVE-2021-3262 - https://susos.co/blog/f/cve-disclosureuncovered-sql-injection-in-tripspark-veo-transport -CVE-2021-32626 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32627 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32628 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32633 - https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/ -CVE-2021-32640 - https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff -CVE-2021-32640 - https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 -CVE-2021-32672 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32675 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32682 - http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html -CVE-2021-32687 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32695 - https://hackerone.com/reports/1142918 -CVE-2021-32706 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-5cm9-6p3m-v259 -CVE-2021-3271 - https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/ -CVE-2021-32718 - http://seclists.org/fulldisclosure/2021/Dec/3 -CVE-2021-32719 - https://herolab.usd.de/security-advisories/usd-2021-0011/ -CVE-2021-3272 - https://github.com/jasper-software/jasper/issues/259 -CVE-2021-32723 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32749 - https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm -CVE-2021-3275 - http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html -CVE-2021-3275 - https://github.com/smriti548/CVE/blob/main/CVE-2021-3275 -CVE-2021-3275 - https://seclists.org/fulldisclosure/2021/Mar/67 -CVE-2021-32751 - https://medium.com/dot-debug/the-perils-of-bash-eval-cc5f9e309cae -CVE-2021-32762 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3278 - http://packetstormsecurity.com/files/162919/Local-Service-Search-Engine-Management-System-1.0-SQL-Injection.html -CVE-2021-3278 - https://www.exploit-db.com/exploits/49163 -CVE-2021-32785 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32786 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3279 - https://borrachariadofael.sz.chat/webchat/conversation/6009c625415e206dc77172d3 -CVE-2021-32791 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32792 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-32803 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-32804 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-32808 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32808 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-32809 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32809 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-32816 - https://securitylab.github.com/advisories/GHSL-2021-027-redos-ProtonMail/ -CVE-2021-32817 - https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/ -CVE-2021-32818 - https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/ -CVE-2021-32819 - https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ -CVE-2021-32820 - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ -CVE-2021-32821 - https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ -CVE-2021-32822 - https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/ -CVE-2021-32824 - https://securitylab.github.com/advisories/GHSL-2021-034_043-apache-dubbo/ -CVE-2021-32825 - https://securitylab.github.com/advisories/GHSL-2020-258-zipslip-bblfshd/ -CVE-2021-32826 - https://securitylab.github.com/advisories/GHSL-2021-053-proxyee-down/ -CVE-2021-32827 - https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/ -CVE-2021-32827 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-32829 - https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html -CVE-2021-32829 - https://securitylab.github.com/advisories/GHSL-2021-065-zstack/ -CVE-2021-32830 - https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/ -CVE-2021-32831 - https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/ -CVE-2021-32833 - https://securitylab.github.com/advisories/GHSL-2021-051-emby/ -CVE-2021-32834 - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ -CVE-2021-32835 - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ -CVE-2021-32843 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ -CVE-2021-32844 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ -CVE-2021-32845 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ -CVE-2021-32846 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ -CVE-2021-32847 - https://securitylab.github.com/advisories/GHSL-2021-058-moby-hyperkit/ -CVE-2021-32850 - https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/ -CVE-2021-32851 - https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/ -CVE-2021-32854 - https://securitylab.github.com/advisories/GHSL-2021-1001-textAngular/ -CVE-2021-32855 - https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/ -CVE-2021-32856 - https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/ -CVE-2021-32857 - https://securitylab.github.com/advisories/GHSL-2021-1035_Cockpit_Next/ -CVE-2021-32858 - https://securitylab.github.com/advisories/GHSL-2021-1034_esdoc-publish-html-plugin/ -CVE-2021-32859 - https://securitylab.github.com/advisories/GHSL-2021-1042_Baremetrics_Date_Range_Picker/ -CVE-2021-32860 - https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/ -CVE-2021-32862 - https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq -CVE-2021-3287 - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html -CVE-2021-3291 - http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html -CVE-2021-3291 - https://github.com/MucahitSaratar/zencart_auth_rce_poc -CVE-2021-32917 - http://www.openwall.com/lists/oss-security/2021/05/13/1 -CVE-2021-32917 - http://www.openwall.com/lists/oss-security/2021/05/14/2 -CVE-2021-32918 - http://www.openwall.com/lists/oss-security/2021/05/13/1 -CVE-2021-32918 - http://www.openwall.com/lists/oss-security/2021/05/14/2 -CVE-2021-32919 - http://www.openwall.com/lists/oss-security/2021/05/13/1 -CVE-2021-32919 - http://www.openwall.com/lists/oss-security/2021/05/14/2 -CVE-2021-32920 - http://www.openwall.com/lists/oss-security/2021/05/13/1 -CVE-2021-32920 - http://www.openwall.com/lists/oss-security/2021/05/14/2 -CVE-2021-32921 - http://www.openwall.com/lists/oss-security/2021/05/13/1 -CVE-2021-32921 - http://www.openwall.com/lists/oss-security/2021/05/14/2 -CVE-2021-32924 - http://packetstormsecurity.com/files/162868/IPS-Community-Suite-4.5.4.2-PHP-Code-Injection.html -CVE-2021-32924 - http://seclists.org/fulldisclosure/2021/May/80 -CVE-2021-3293 - https://github.com/thinkgad/Bugs/blob/main/emlog%20v5.3.1%20has%20Full%20Path%20Disclosure%20vulnerability.md -CVE-2021-3294 - http://packetstormsecurity.com/files/161421/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html -CVE-2021-3294 - https://www.exploit-db.com/exploits/49469 -CVE-2021-32942 - https://www.aveva.com/en/support/cyber-security-updates/ -CVE-2021-3298 - https://www.exploit-db.com/exploits/49468 -CVE-2021-33032 - https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ -CVE-2021-33032 - https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf -CVE-2021-33033 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14 -CVE-2021-33033 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 -CVE-2021-33033 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 -CVE-2021-33033 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08 -CVE-2021-33034 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4 -CVE-2021-33034 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3 -CVE-2021-33037 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-33037 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-33037 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-33037 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-33037 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-33041 - https://github.com/yoshuawuyts/vmd/issues/137 -CVE-2021-33044 - http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html -CVE-2021-33044 - http://seclists.org/fulldisclosure/2021/Oct/13 -CVE-2021-33045 - http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html -CVE-2021-33045 - http://seclists.org/fulldisclosure/2021/Oct/13 -CVE-2021-3305 - https://github.com/liong007/Feishu/issues/1 -CVE-2021-33055 - https://blog.stmcyber.com/vulns/cve-2021-33055/ -CVE-2021-33057 - https://arxiv.org/pdf/2205.15202.pdf -CVE-2021-3310 - https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122 -CVE-2021-3313 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt -CVE-2021-3314 - https://n4nj0.github.io/advisories/oracle-glassfish-reflected-xss/ -CVE-2021-3314 - https://www.gruppotim.it/redteam -CVE-2021-3317 - http://packetstormsecurity.com/files/161208/Klog-Server-2.4.1-Command-Injection.html -CVE-2021-3318 - http://packetstormsecurity.com/files/162314/DzzOffice-2.02.1-Cross-Site-Scripting.html -CVE-2021-33183 - https://www.synology.com/security/advisory/Synology_SA_21_08 -CVE-2021-33193 - https://portswigger.net/research/http2 -CVE-2021-33193 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-33193 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-33205 - https://www.westerndigital.com/support/productsecurity/wdc-21007-edgerover-windows-app-ver-0-25 -CVE-2021-33207 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33207 -CVE-2021-33208 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33208 -CVE-2021-3321 - http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99 -CVE-2021-33211 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-021.txt -CVE-2021-33211 - https://www.syss.de/pentest-blog/ -CVE-2021-33212 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-020.txt -CVE-2021-33212 - https://www.syss.de/pentest-blog/ -CVE-2021-33213 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-027.txt -CVE-2021-33213 - https://www.syss.de/pentest-blog/ -CVE-2021-33214 - https://labs.bishopfox.com/advisories -CVE-2021-33214 - https://labs.bishopfox.com/advisories/ecatcher-desktop-version-6.6.4 -CVE-2021-33215 - http://seclists.org/fulldisclosure/2021/May/76 -CVE-2021-33216 - http://seclists.org/fulldisclosure/2021/May/78 -CVE-2021-33217 - http://seclists.org/fulldisclosure/2021/May/77 -CVE-2021-33218 - https://seclists.org/fulldisclosure/2021/May/74 -CVE-2021-33219 - https://seclists.org/fulldisclosure/2021/May/75 -CVE-2021-33220 - http://seclists.org/fulldisclosure/2021/May/73 -CVE-2021-33221 - http://seclists.org/fulldisclosure/2021/May/72 -CVE-2021-33235 - https://github.com/michaelrsweet/htmldoc/issues/426 -CVE-2021-33236 - https://github.com/michaelrsweet/htmldoc/issues/425 -CVE-2021-3325 - https://github.com/mikaku/Monitorix/issues/309 -CVE-2021-33254 - https://awxylitol.github.io/2021/05/09/embedthis-appweb-npd-bug.html -CVE-2021-33256 - https://docs.unsafe-inline.com/0day/manageengine-adselfservice-plus-6.1-csv-injection -CVE-2021-33259 - https://github.com/jayus0821/uai-poc/blob/main/D-Link/DIR-868L/webaccess_UAI.md -CVE-2021-33259 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-3326 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3326 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-33265 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln05 -CVE-2021-33265 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33266 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln04 -CVE-2021-33266 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33267 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln02 -CVE-2021-33267 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33268 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln03 -CVE-2021-33268 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33269 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln01 -CVE-2021-33269 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33270 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln06 -CVE-2021-33270 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33271 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln11 -CVE-2021-33271 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33274 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln07 -CVE-2021-33274 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-3328 - https://jankopecky.net/index.php/2021/04/08/cve-2021-3328-abyss-web-server-remote-dos/ -CVE-2021-3329 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117 -CVE-2021-33293 - https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74 -CVE-2021-33294 - https://sourceware.org/bugzilla/show_bug.cgi?id=27501 -CVE-2021-33295 - https://github.com/laurent22/joplin/commit/9c20d5947d1fa4678a8b640792ff3d31224f0adf -CVE-2021-33295 - https://github.com/laurent22/joplin/releases/tag/v1.8.5 -CVE-2021-33295 - https://the-it-wonders.blogspot.com/2021/05/joplin-app-desktop-version-vulnerable.html -CVE-2021-33318 - https://github.com/kaoudis/advisories/blob/main/0-2021.md -CVE-2021-33320 - https://issues.liferay.com/browse/LPE-17007 -CVE-2021-33321 - https://help.liferay.com/hc/en-us/articles/360050785632 -CVE-2021-33322 - https://issues.liferay.com/browse/LPE-16981 -CVE-2021-33323 - https://issues.liferay.com/browse/LPE-17049 -CVE-2021-33324 - https://issues.liferay.com/browse/LPE-17001 -CVE-2021-33325 - https://issues.liferay.com/browse/LPE-17042 -CVE-2021-33326 - https://issues.liferay.com/browse/LPE-17093 -CVE-2021-33327 - https://issues.liferay.com/browse/LPE-17075 -CVE-2021-33328 - https://issues.liferay.com/browse/LPE-17100 -CVE-2021-33330 - https://issues.liferay.com/browse/LPE-17127 -CVE-2021-33331 - https://issues.liferay.com/browse/LPE-17022 -CVE-2021-33332 - https://issues.liferay.com/browse/LPE-17053 -CVE-2021-33333 - https://issues.liferay.com/browse/LPE-17032 -CVE-2021-33334 - https://issues.liferay.com/browse/LPE-17039 -CVE-2021-33335 - https://issues.liferay.com/browse/LPE-17103 -CVE-2021-33336 - https://issues.liferay.com/browse/LPE-17078 -CVE-2021-33337 - https://issues.liferay.com/browse/LPE-17101 -CVE-2021-33338 - https://issues.liferay.com/browse/LPE-17030 -CVE-2021-33339 - https://issues.liferay.com/browse/LPE-17102 -CVE-2021-33346 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-33351 - https://www.exploit-db.com/exploits/50113 -CVE-2021-33352 - https://www.exploit-db.com/exploits/50113 -CVE-2021-33353 - https://www.exploit-db.com/exploits/50113 -CVE-2021-33354 - https://github.com/danpros/htmly/issues/462 -CVE-2021-33361 - https://github.com/gpac/gpac/issues/1782 -CVE-2021-33362 - https://github.com/gpac/gpac/issues/1780 -CVE-2021-33363 - https://github.com/gpac/gpac/issues/1786 -CVE-2021-33364 - https://github.com/gpac/gpac/issues/1783 -CVE-2021-33365 - https://github.com/gpac/gpac/issues/1784 -CVE-2021-33366 - https://github.com/gpac/gpac/issues/1785 -CVE-2021-3337 - http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html -CVE-2021-33371 - https://www.exploit-db.com/exploits/49865 -CVE-2021-3339 - https://appsource.microsoft.com/en-us/product/web-apps/acctech-systems-pty-ltd.modernflow-saas?tab=overview -CVE-2021-33393 - http://packetstormsecurity.com/files/163158/IPFire-2.25-Remote-Code-Execution.html -CVE-2021-33394 - https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md -CVE-2021-33396 - https://github.com/baijiacms/baijiacmsV4/issues/7 -CVE-2021-33403 - https://cn.etherscan.com/address/0x63e634330a20150dbb61b15648bc73855d6ccf07#code -CVE-2021-33408 - https://www.abinitio.com/en/security-advisories/ab-2021-001/ -CVE-2021-33436 - https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md -CVE-2021-33437 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33437 - https://github.com/cesanta/mjs/issues/160 -CVE-2021-33438 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33438 - https://github.com/cesanta/mjs/issues/158 -CVE-2021-33439 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33439 - https://github.com/cesanta/mjs/issues/159 -CVE-2021-33440 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33440 - https://github.com/cesanta/mjs/issues/163 -CVE-2021-33441 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33441 - https://github.com/cesanta/mjs/issues/165 -CVE-2021-33442 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33442 - https://github.com/cesanta/mjs/issues/161 -CVE-2021-33443 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33443 - https://github.com/cesanta/mjs/issues/167 -CVE-2021-33444 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33444 - https://github.com/cesanta/mjs/issues/166 -CVE-2021-33445 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33445 - https://github.com/cesanta/mjs/issues/169 -CVE-2021-33446 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33446 - https://github.com/cesanta/mjs/issues/168 -CVE-2021-33447 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33447 - https://github.com/cesanta/mjs/issues/164 -CVE-2021-33448 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33448 - https://github.com/cesanta/mjs/issues/170 -CVE-2021-33449 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33449 - https://github.com/cesanta/mjs/issues/162 -CVE-2021-3345 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-33450 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33451 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33451 - https://github.com/ckolivas/lrzip/issues/198 -CVE-2021-33452 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33453 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33453 - https://github.com/ckolivas/lrzip/issues/199 -CVE-2021-33454 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33454 - https://github.com/yasm/yasm/issues/166 -CVE-2021-33455 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33455 - https://github.com/yasm/yasm/issues/169 -CVE-2021-33456 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33456 - https://github.com/yasm/yasm/issues/175 -CVE-2021-33457 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33457 - https://github.com/yasm/yasm/issues/171 -CVE-2021-33458 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33458 - https://github.com/yasm/yasm/issues/170 -CVE-2021-33459 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33459 - https://github.com/yasm/yasm/issues/167 -CVE-2021-3346 - https://gitlab.nic.cz/turris/foris/foris/-/issues/201 -CVE-2021-33460 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33460 - https://github.com/yasm/yasm/issues/168 -CVE-2021-33461 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33461 - https://github.com/yasm/yasm/issues/161 -CVE-2021-33462 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33462 - https://github.com/yasm/yasm/issues/165 -CVE-2021-33463 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33463 - https://github.com/yasm/yasm/issues/174 -CVE-2021-33464 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33464 - https://github.com/yasm/yasm/issues/164 -CVE-2021-33465 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33465 - https://github.com/yasm/yasm/issues/173 -CVE-2021-33466 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33466 - https://github.com/yasm/yasm/issues/172 -CVE-2021-33467 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33467 - https://github.com/yasm/yasm/issues/163 -CVE-2021-33468 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -CVE-2021-33468 - https://github.com/yasm/yasm/issues/162 -CVE-2021-33469 - https://phpgurukul.com/ -CVE-2021-33469 - https://www.exploit-db.com/exploits/49887 -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307 -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9 -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697 -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7 -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120 -CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2 -CVE-2021-33470 - http://packetstormsecurity.com/files/163014/COVID-19-Testing-Management-System-1.0-SQL-Injection.html -CVE-2021-33470 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-04 -CVE-2021-33470 - https://phpgurukul.com/ -CVE-2021-33470 - https://www.exploit-db.com/exploits/49886 -CVE-2021-33477 - https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html -CVE-2021-33477 - https://www.openwall.com/lists/oss-security/2021/05/17/1 -CVE-2021-3348 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 -CVE-2021-33483 - https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html -CVE-2021-33484 - https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html -CVE-2021-33488 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33488 - http://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33489 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33489 - http://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33490 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33490 - https://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33491 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33491 - https://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33492 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33492 - https://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33493 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33493 - https://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33494 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33494 - https://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33495 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -CVE-2021-33495 - https://seclists.org/fulldisclosure/2021/Nov/42 -CVE-2021-33501 - https://github.com/swordbytes/Advisories/blob/master/2021/Advisory_CVE-2021-33501.pdf -CVE-2021-33501 - https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/ -CVE-2021-33503 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-33514 - https://gynvael.coldwind.pl/?lang=en&id=733 -CVE-2021-33514 - https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071 -CVE-2021-33515 - https://www.openwall.com/lists/oss-security/2021/06/28/2 -CVE-2021-33516 - https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536 -CVE-2021-33523 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33523 -CVE-2021-33528 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33529 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33530 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33531 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33532 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33533 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33534 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33535 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33536 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33537 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33538 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33539 - https://cert.vde.com/en-us/advisories/vde-2021-026 -CVE-2021-33540 - https://cert.vde.com/en-us/advisories/vde-2021-021 -CVE-2021-33541 - https://cert.vde.com/en-us/advisories/vde-2021-019 -CVE-2021-33542 - https://cert.vde.com/en-us/advisories/vde-2021-020 -CVE-2021-33543 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33544 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33545 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33546 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33547 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33548 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33549 - http://packetstormsecurity.com/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html -CVE-2021-33549 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-3355 - http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html -CVE-2021-3355 - https://www.exploit-db.com/exploits/49598 -CVE-2021-33550 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33551 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33552 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33553 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33554 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ -CVE-2021-33555 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-33558 - https://github.com/mdanzaruddin/CVE-2021-33558. -CVE-2021-33558 - https://github.com/mdanzaruddin/CVE-2021-33558./issues/1 -CVE-2021-33560 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-33560 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-33560 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-33560 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-33561 - https://www.exploit-db.com/exploits/49901 -CVE-2021-33562 - https://www.exploit-db.com/exploits/49901 -CVE-2021-33563 - https://huntr.dev/bounties/1-other-koel/koel/ -CVE-2021-33564 - https://github.com/mlr0p/CVE-2021-33564 -CVE-2021-33564 - https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/ -CVE-2021-33570 - http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html -CVE-2021-33570 - http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html -CVE-2021-33570 - https://github.com/Paxa/postbird/issues/132 -CVE-2021-33570 - https://github.com/Paxa/postbird/issues/133 -CVE-2021-33570 - https://github.com/Paxa/postbird/issues/134 -CVE-2021-33570 - https://tridentsec.io/blogs/postbird-cve-2021-33570/ -CVE-2021-33570 - https://www.exploit-db.com/exploits/49910 -CVE-2021-33571 - https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo -CVE-2021-33572 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33575 - https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24 -CVE-2021-33581 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33581 -CVE-2021-33582 - https://github.com/cyrusimap/cyrus-imapd/commits/master -CVE-2021-33594 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33595 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33596 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33597 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33598 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33600 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600 -CVE-2021-33601 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601 -CVE-2021-33602 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-33616 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2021-33617 - https://herolab.usd.de/security-advisories/usd-2021-0015/ -CVE-2021-33617 - https://www.manageengine.com -CVE-2021-33618 - http://seclists.org/fulldisclosure/2021/Nov/38 -CVE-2021-33618 - https://trovent.github.io/security-advisories/TRSA-2105-02/TRSA-2105-02.txt -CVE-2021-33618 - https://trovent.io/security-advisory-2105-02 -CVE-2021-33655 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 -CVE-2021-33670 - http://packetstormsecurity.com/files/166965/SAP-NetWeaver-Java-Denial-Of-Service.html -CVE-2021-33678 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -CVE-2021-33678 - http://seclists.org/fulldisclosure/2022/May/42 -CVE-2021-33687 - http://packetstormsecurity.com/files/164600/SAP-Enterprise-Portal-Sensitive-Data-Disclosure.html -CVE-2021-3370 - https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/douphp_xss.docx -CVE-2021-33701 - http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html -CVE-2021-33701 - http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html -CVE-2021-33701 - http://seclists.org/fulldisclosure/2021/Dec/35 -CVE-2021-33701 - http://seclists.org/fulldisclosure/2021/Dec/36 -CVE-2021-33702 - http://packetstormsecurity.com/files/165737/SAP-Enterprise-Portal-NavigationReporter-Cross-Site-Scripting.html -CVE-2021-33703 - http://packetstormsecurity.com/files/165740/SAP-Enterprise-Portal-RunContentCreation-Cross-Site-Scripting.html -CVE-2021-33705 - http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html -CVE-2021-33707 - http://packetstormsecurity.com/files/165748/SAP-Enterprise-Portal-Open-Redirect.html -CVE-2021-3375 - https://code610.blogspot.com/2021/01/crashing-activepresenter.html -CVE-2021-3376 - https://github.com/CuppaCMS/CuppaCMS/issues/12 -CVE-2021-3378 - http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html -CVE-2021-3378 - http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html -CVE-2021-3378 - https://github.com/erberkan/fortilogger_arbitrary_fileupload -CVE-2021-33797 - https://github.com/ccxvii/mujs/issues/148 -CVE-2021-33798 - https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74 -CVE-2021-3380 - https://www.exploit-db.com/exploits/49508 -CVE-2021-33813 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-33813 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-33816 - http://seclists.org/fulldisclosure/2021/Nov/39 -CVE-2021-33816 - https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt -CVE-2021-33816 - https://trovent.io/security-advisory-2106-01 -CVE-2021-33818 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33818.md -CVE-2021-33820 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33820.md -CVE-2021-33822 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33822.md -CVE-2021-33823 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33823.md -CVE-2021-33824 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33824.md -CVE-2021-33829 - https://www.drupal.org/sa-core-2021-003 -CVE-2021-33833 - http://www.openwall.com/lists/oss-security/2021/06/09/1 -CVE-2021-33839 - https://youtu.be/jWyDfEB0m08 -CVE-2021-33840 - https://gitlab.com/lucaapp/web/-/issues/1#note_560963608 -CVE-2021-33849 - https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html -CVE-2021-33849 - https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html -CVE-2021-33850 - https://cybersecurityworks.com/zerodays/cve-2021-33850-stored-cross-site-scripting-xss-in-wordpress-microsoft-clarity-plugin.html -CVE-2021-33851 - https://cybersecurityworks.com/zerodays/cve-2021-33851-stored-cross-site-scripting-in-wordpress-customize-login-image.html -CVE-2021-33852 - https://cybersecurityworks.com/zerodays/cve-2021-33852-stored-cross-site-scripting-in-wordpress-post-duplicator-plugin-2-23.html -CVE-2021-33853 - https://cybersecurityworks.com/zerodays/cve-2021-33853-stored-cross-site-scripting-in-x2crm.html -CVE-2021-33880 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-33880 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-33887 - https://youtu.be/RLjXfvb0ADw -CVE-2021-33904 - http://packetstormsecurity.com/files/163093/Accela-Civic-Platorm-21.1-Cross-Site-Scripting.html -CVE-2021-33909 - http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html -CVE-2021-33909 - http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html -CVE-2021-33909 - http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html -CVE-2021-33909 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html -CVE-2021-33909 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -CVE-2021-33909 - https://www.openwall.com/lists/oss-security/2021/07/20/1 -CVE-2021-33909 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-33910 - http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html -CVE-2021-33910 - https://www.openwall.com/lists/oss-security/2021/07/20/2 -CVE-2021-33923 - https://confluent.io -CVE-2021-33923 - https://www.detack.de/en/cve-2021-33923 -CVE-2021-33924 - https://confluent.io -CVE-2021-33924 - https://www.detack.de/en/cve-2021-33924 -CVE-2021-33925 - https://github.com/nitinp1232/cms-corephp/issues/1 -CVE-2021-33928 - https://github.com/openSUSE/libsolv/issues/417 -CVE-2021-33929 - https://github.com/openSUSE/libsolv/issues/417 -CVE-2021-33930 - https://github.com/openSUSE/libsolv/issues/417 -CVE-2021-33938 - https://github.com/openSUSE/libsolv/issues/420 -CVE-2021-3394 - http://packetstormsecurity.com/files/161334/Millewin-13.39.028-Unquoted-Service-Path-Insecure-Permissions.html -CVE-2021-3394 - https://www.exploit-db.com/exploits/49530 -CVE-2021-33945 - https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1 -CVE-2021-33966 - https://packetstormsecurity.com/files/162731/Spotweb-Develop-1.4.9-Cross-Site-Scripting.html -CVE-2021-33970 - https://pastebin.com/Qug7tquW -CVE-2021-33971 - https://pastebin.com/31v5JMcG -CVE-2021-33972 - https://pastebin.com/qDedtZf3 -CVE-2021-33973 - https://pastebin.com/fsLDebg5 -CVE-2021-33974 - https://pastebin.com/ms1ivjYe -CVE-2021-33975 - https://pastebin.com/ivNL7s0n -CVE-2021-33983 - https://github.com/dvidelabs/flatcc/issues/188 -CVE-2021-33988 - https://github.com/nck0099/osTicket/issues/2 -CVE-2021-33990 - http://packetstormsecurity.com/files/171701/Liferay-Portal-6.2.5-Insecure-Permissions.html -CVE-2021-33990 - https://github.com/fu2x2000/Liferay_exploit_Poc -CVE-2021-3401 - https://github.com/bitcoin/bitcoin/pull/16578 -CVE-2021-3402 - https://www.openwall.com/lists/oss-security/2021/01/29/2 -CVE-2021-3402 - https://www.x41-dsec.de/lab/advisories/x41-2021-001-yara/ -CVE-2021-3405 - https://github.com/Matroska-Org/libebml/issues/74 -CVE-2021-34055 - https://github.com/Matthias-Wandel/jhead/issues/36 -CVE-2021-34066 - https://github.com/EdgeGallery/developer-be/issues/1 -CVE-2021-34067 - https://github.com/justdan96/tsMuxer/issues/424 -CVE-2021-34068 - https://github.com/justdan96/tsMuxer/issues/427 -CVE-2021-34069 - https://github.com/justdan96/tsMuxer/issues/428 -CVE-2021-34070 - https://github.com/justdan96/tsMuxer/issues/426 -CVE-2021-34071 - https://github.com/justdan96/tsMuxer/issues/423 -CVE-2021-34073 - https://www.exploit-db.com/exploits/49904 -CVE-2021-34076 - https://github.com/HolaAsuka/CVE/issues/1 -CVE-2021-34085 - https://drive.google.com/drive/folders/1epm65c4_iC0zE5V_leoet4Jyk1Prz2p5?usp=sharing -CVE-2021-3410 - https://bugzilla.redhat.com/show_bug.cgi?id=1928437 -CVE-2021-34110 - https://packetstormsecurity.com/files/163335/WinWaste.NET-1.0.6183.16475-Local-Privilege-Escalation.html -CVE-2021-34110 - https://www.exploit-db.com/exploits/50083 -CVE-2021-34119 - https://github.com/michaelrsweet/htmldoc/issues/431 -CVE-2021-34121 - https://github.com/michaelrsweet/htmldoc/issues/433 -CVE-2021-34122 - https://github.com/rockcarry/ffjpeg/issues/36 -CVE-2021-34125 - https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac -CVE-2021-34125 - https://github.com/PX4/PX4-Autopilot/issues/17062 -CVE-2021-34125 - https://www.st.com/resource/en/application_note/dm00493651-introduction-to-stm32-microcontrollers-security-stmicroelectronics.pdf -CVE-2021-34128 - https://github.com/bettershop/LaikeTui/issues/8 -CVE-2021-34141 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-34143 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34144 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34145 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34146 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34147 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34148 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34149 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34150 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -CVE-2021-34164 - https://github.com/lizhipay/faka/issues/22 -CVE-2021-34165 - https://www.exploit-db.com/exploits/49741 -CVE-2021-34166 - https://www.exploit-db.com/exploits/49740 -CVE-2021-34167 - https://github.com/taogogo/taocms/issues/6 -CVE-2021-34170 - https://www.reddit.com/r/darksouls3/comments/n1235k/potential_pc_security_exploit_spreading/ -CVE-2021-34173 - https://github.com/E7mer/OWFuzz -CVE-2021-34174 - https://github.com/E7mer/OWFuzz -CVE-2021-34187 - https://murat.one/?p=118 -CVE-2021-34190 - https://www.youtube.com/watch?v=apJH_D68lZI -CVE-2021-34201 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34201 -CVE-2021-34201 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-34202 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34202 -CVE-2021-34202 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-34203 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34203 -CVE-2021-34203 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-34204 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-34235 - http://packetstormsecurity.com/files/165944/Tokheim-Profleet-DiaLOG-Fuel-Management-System-11.005.02-SQL-Injection-Code-Execution.html -CVE-2021-34243 - https://github.com/xoffense/POC/blob/main/Stored%20XSS%20via%20malicious%20file%20upload%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -CVE-2021-34244 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20using%20CSRF%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -CVE-2021-34248 - https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html -CVE-2021-34248 - https://www.exploit-db.com/exploits/48916 -CVE-2021-34249 - https://packetstormsecurity.com/files/159000/Online-Book-Store-1.0-SQL-Injection.html -CVE-2021-34249 - https://www.exploit-db.com/exploits/48775 -CVE-2021-34250 - https://github.com/baijiacms/baijiacmsV4/issues/7 -CVE-2021-34257 - https://github.com/Sentinal920/WPanel4-Authenticated-RCE -CVE-2021-34257 - https://latestpcsolution.wordpress.com/2021/06/05/wpanel4-cms-authenticated-rce/ -CVE-2021-3426 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3426 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3427 - https://groups.google.com/g/deluge-dev/c/e5zh7wT0rEg -CVE-2021-3428 - https://ubuntu.com/security/CVE-2021-3428 -CVE-2021-34338 - https://github.com/libming/libming/issues/201 -CVE-2021-34339 - https://github.com/libming/libming/issues/202 -CVE-2021-34340 - https://github.com/libming/libming/issues/203 -CVE-2021-34341 - https://github.com/libming/libming/issues/204 -CVE-2021-34342 - https://github.com/libming/libming/issues/205 -CVE-2021-34369 - http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html -CVE-2021-34370 - http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html -CVE-2021-34371 - https://www.exploit-db.com/exploits/50170 -CVE-2021-34372 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34373 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34374 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34375 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34376 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34377 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34378 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34379 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34380 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34381 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34382 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34383 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34384 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34385 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34386 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34387 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34388 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34389 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34390 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34391 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34392 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34393 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34394 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34395 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34396 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34397 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 -CVE-2021-34420 - https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e -CVE-2021-34423 - http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html -CVE-2021-34424 - http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html -CVE-2021-34427 - http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html -CVE-2021-34427 - http://seclists.org/fulldisclosure/2022/Dec/30 -CVE-2021-34427 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142 -CVE-2021-34428 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-34428 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-34428 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-34429 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-34429 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-34429 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-34430 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=568803 -CVE-2021-34435 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018 -CVE-2021-3444 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -CVE-2021-3444 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html -CVE-2021-3444 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809 -CVE-2021-34470 - http://packetstormsecurity.com/files/163706/Microsoft-Exchange-AD-Schema-Misconfiguration-Privilege-Escalation.html -CVE-2021-34473 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html -CVE-2021-3448 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-34480 - http://packetstormsecurity.com/files/164121/Internet-Explorer-JIT-Optimization-Memory-Corruption.html -CVE-2021-3449 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 -CVE-2021-3449 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd -CVE-2021-3449 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3449 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3449 - https://www.tenable.com/security/tns-2021-05 -CVE-2021-3449 - https://www.tenable.com/security/tns-2021-06 -CVE-2021-3449 - https://www.tenable.com/security/tns-2021-09 -CVE-2021-3449 - https://www.tenable.com/security/tns-2021-10 -CVE-2021-3450 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 -CVE-2021-3450 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd -CVE-2021-3450 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuApr2021.html -CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3450 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3450 - https://www.tenable.com/security/tns-2021-05 -CVE-2021-3450 - https://www.tenable.com/security/tns-2021-09 -CVE-2021-34523 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html -CVE-2021-34527 - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html -CVE-2021-34543 - https://drive.google.com/file/d/1z1TaANlDyX4SOP2vjNzkPQI3nETL9kZM/view?usp=sharing -CVE-2021-34543 - https://www.exploit-db.com/exploits/49986 -CVE-2021-34544 - https://drive.google.com/file/d/1N8Ch1UGNcoocUaPhOe_1mAECOe5kr4pt/view?usp=sharing -CVE-2021-34544 - https://www.exploit-db.com/exploits/49987 -CVE-2021-34546 - http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html -CVE-2021-34548 - http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html -CVE-2021-34553 - https://support.sonatype.com/hc/en-us/articles/4402433828371 -CVE-2021-34558 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-34558 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-34559 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34560 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34561 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34562 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34563 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34564 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34565 - https://cert.vde.com/en-us/advisories/vde-2021-027 -CVE-2021-34578 - https://cert.vde.com/en-us/advisories/vde-2020-044 -CVE-2021-34581 - https://cert.vde.com/en-us/advisories/vde-2021-038 -CVE-2021-34587 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34588 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34589 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34590 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34591 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34592 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34593 - http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html -CVE-2021-34593 - http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html -CVE-2021-34593 - http://seclists.org/fulldisclosure/2021/Oct/64 -CVE-2021-34600 - https://www.x41-dsec.de/lab/advisories/x41-2021-003-telenot-complex-insecure-keygen/ -CVE-2021-34601 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34602 - https://cert.vde.com/en/advisories/VDE-2021-047 -CVE-2021-34605 - https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ -CVE-2021-34606 - https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ -CVE-2021-34621 - http://packetstormsecurity.com/files/163973/WordPress-ProfilePress-3.1.3-Privilege-Escalation.html -CVE-2021-34657 - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34657 -CVE-2021-3466 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334XJNDJPYQNFE6S3S2KUJJ7TMHYCWL/ -CVE-2021-34675 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675 -CVE-2021-34676 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34676 -CVE-2021-34682 - https://www.youtube.com/watch?v=vClCaAAfzGg -CVE-2021-34684 - http://packetstormsecurity.com/files/164791/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-SQL-Injection.html -CVE-2021-34685 - http://packetstormsecurity.com/files/164775/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Filename-Bypass.html -CVE-2021-34693 - http://www.openwall.com/lists/oss-security/2021/06/15/1 -CVE-2021-34746 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh -CVE-2021-34749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN -CVE-2021-34759 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-4HnZFewr -CVE-2021-34784 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-U2JK537j -CVE-2021-34790 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng -CVE-2021-34791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng -CVE-2021-34798 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-34798 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-34805 - http://packetstormsecurity.com/files/165701/FAUST-iServer-9.0.018.018.4-Local-File-Inclusion.html -CVE-2021-34805 - https://sec-consult.com/vulnerability-lab/ -CVE-2021-34816 - https://github.com/ether/etherpad-lite/releases -CVE-2021-34817 - https://github.com/ether/etherpad-lite/releases/tag/1.8.14 -CVE-2021-34820 - http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html -CVE-2021-34823 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2021-34823 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105 -CVE-2021-34831 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34832 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34833 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34834 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34835 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34836 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34837 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34838 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34839 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34840 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34841 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34842 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34843 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34844 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34845 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34846 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34847 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34848 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34849 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-3485 - https://herolab.usd.de/security-advisories/usd-2021-0014/ -CVE-2021-34850 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34851 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34852 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34853 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-34870 - https://kb.netgear.com/000063967/Security-Advisory-for-a-Security-Misconfiguration-Vulnerability-on-the-XR1000-PSV-2021-0101 -CVE-2021-34874 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34875 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34876 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34877 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34878 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34880 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34885 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34888 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34889 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34890 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34891 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34892 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34894 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34895 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34898 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34899 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-3490 - http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html -CVE-2021-34901 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34909 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-3491 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db -CVE-2021-34911 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-34912 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34913 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-3492 - http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html -CVE-2021-34920 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34921 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34922 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34923 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34924 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34925 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34926 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34927 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34928 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34929 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-3493 - http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html -CVE-2021-3493 - http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html -CVE-2021-3493 - http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html -CVE-2021-3493 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 -CVE-2021-34930 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34931 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34932 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34933 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34934 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34935 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34936 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34937 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34938 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34939 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34940 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34941 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34942 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34943 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34944 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34945 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-34946 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-3496 - https://github.com/Matthias-Wandel/jhead/issues/33 -CVE-2021-34978 - https://kb.netgear.com/000064258/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-DSL-Modem-Routers-and-Access-Points-PSV-2021-0151-and-PSV-2021-0170?article=000064258 -CVE-2021-3498 - http://packetstormsecurity.com/files/162952/Gstreamer-Matroska-Demuxing-Use-After-Free.html -CVE-2021-34980 - https://kb.netgear.com/000064262/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-PSV-2021-0150?article=000064262 -CVE-2021-34991 - https://kb.netgear.com/000064361/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Multiple-Products-PSV-2021-0168 -CVE-2021-3501 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a -CVE-2021-35039 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14 -CVE-2021-35039 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75 -CVE-2021-35043 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-35043 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35043 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-35043 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35045 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -CVE-2021-35046 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -CVE-2021-35052 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#221121 -CVE-2021-35053 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021 -CVE-2021-35055 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-35061 - https://github.com/sthierolf/security/blob/main/CVE-2021-35061.md -CVE-2021-35062 - https://github.com/sthierolf/security/blob/main/CVE-2021-35062.md -CVE-2021-35064 - http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html -CVE-2021-35065 - https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 -CVE-2021-35068 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-35069 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-35074 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-35075 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-35077 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin -CVE-2021-3508 - https://github.com/enferex/pdfresurrect/issues/17 -CVE-2021-35088 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-35089 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-3509 - https://bugzilla.redhat.com/show_bug.cgi?id=1950116 -CVE-2021-35093 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin -CVE-2021-35103 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-35105 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-35106 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-35110 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-35115 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-35117 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin -CVE-2021-3516 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 -CVE-2021-3516 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3517 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3517 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3517 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3517 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3518 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3518 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3518 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35193 - https://github.com/jshafer817/Eaglesoft -CVE-2021-35196 - https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/ -CVE-2021-3520 - https://www.oracle.com//security-alerts/cpujul2021.html -CVE-2021-3520 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3520 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35211 - https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211 -CVE-2021-3522 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35296 - https://github.com/afaq1337/CVE-2021-35296 -CVE-2021-35306 - https://github.com/axiomatic-systems/Bento4/issues/615 -CVE-2021-35307 - https://github.com/axiomatic-systems/Bento4/issues/616 -CVE-2021-35312 - http://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html -CVE-2021-35312 - https://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html -CVE-2021-35323 - http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html -CVE-2021-35323 - https://github.com/bludit/bludit/issues/1327 -CVE-2021-35324 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_login_bypass.md -CVE-2021-35325 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_cookie_overflow.md -CVE-2021-35326 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_leak_config_file.md -CVE-2021-35327 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_default_telnet_info.md -CVE-2021-35336 - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c -CVE-2021-35337 - https://www.exploit-db.com/exploits/50050 -CVE-2021-35343 - https://medium.com/@cyberdivision/cve-2021-35343-c5c298cbb2d4 -CVE-2021-35344 - https://github.com/justdan96/tsMuxer/issues/432 -CVE-2021-35346 - https://github.com/justdan96/tsMuxer/issues/436 -CVE-2021-3537 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3537 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3537 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35380 - https://www.exploit-db.com/exploits/50638 -CVE-2021-35380 - https://www.swascan.com/solari-di-udine/ -CVE-2021-3539 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-35391 - https://sayaanalam.github.io/CVE-2021-35391.html -CVE-2021-35392 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain -CVE-2021-35393 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain -CVE-2021-35394 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain -CVE-2021-35395 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain -CVE-2021-3540 - https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/ -CVE-2021-3541 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35438 - https://github.com/phpipam/phpipam/issues/3351 -CVE-2021-35448 - https://www.exploit-db.com/exploits/50047 -CVE-2021-35449 - http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html -CVE-2021-35450 - https://www.swascan.com/entando/ -CVE-2021-35452 - https://github.com/strukturag/libde265/issues/298 -CVE-2021-35456 - https://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html -CVE-2021-35458 - http://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html -CVE-2021-35458 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-35458 -CVE-2021-35464 - http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html -CVE-2021-35464 - http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html -CVE-2021-35475 - http://packetstormsecurity.com/files/163294/SAS-Environment-Manager-2.5-Cross-Site-Scripting.html -CVE-2021-35475 - https://github.com/saitamang/CVE-2021-35475/blob/main/README.md -CVE-2021-35478 - https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/ -CVE-2021-35478 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2021-35479 - https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/ -CVE-2021-35479 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2021-35487 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2021-35488 - https://www.gruppotim.it/redteam -CVE-2021-35489 - https://www.gruppotim.it/redteam -CVE-2021-35490 - https://www.gruppotim.it/redteam -CVE-2021-35491 - https://n4nj0.github.io/advisories/wowza-streaming-engine-i/ -CVE-2021-35491 - https://www.gruppotim.it/redteam -CVE-2021-35492 - https://n4nj0.github.io/advisories/wowza-streaming-engine-i/ -CVE-2021-35492 - https://www.gruppotim.it/redteam -CVE-2021-35501 - http://packetstormsecurity.com/files/163466/Pandora-FMS-7.54-Cross-Site-Scripting.html -CVE-2021-35503 - https://syntegris-sec.github.io/filerun-advisory -CVE-2021-35504 - https://syntegris-sec.github.io/filerun-advisory -CVE-2021-35505 - https://syntegris-sec.github.io/filerun-advisory -CVE-2021-35506 - https://syntegris-sec.github.io/filerun-advisory -CVE-2021-35508 - https://www.linkedin.com/pulse/cve-2021-35508-privilege-escalation-via-weak-windows-marshall-mba -CVE-2021-35512 - https://www.esecforte.com/server-side-request-forgery-india-ssrf-rvd-manage-engine/ -CVE-2021-35515 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-35515 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35515 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-35515 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35516 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-35516 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35516 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-35516 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35517 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-35517 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35517 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-35517 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35523 - http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html -CVE-2021-35528 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000068&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-35536 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35537 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35538 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35539 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35540 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35541 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35542 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35543 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35545 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35546 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35549 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3555 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera/ -CVE-2021-35550 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35551 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35552 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35553 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35554 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35556 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35557 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35558 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35559 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35560 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35561 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35562 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35563 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35564 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35565 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35566 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35567 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35568 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35569 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35570 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35571 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35572 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35573 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35574 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-35574 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35575 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35576 - http://packetstormsecurity.com/files/170354/Oracle-Unified-Audit-Policy-Bypass.html -CVE-2021-35576 - http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html -CVE-2021-35576 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35577 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35578 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35580 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35581 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35582 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35583 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35584 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35585 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35586 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35587 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35588 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35589 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35590 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35591 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35592 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35593 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35594 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35595 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35596 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35597 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35598 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35599 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3560 - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html -CVE-2021-3560 - https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ -CVE-2021-35601 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35602 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35603 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35604 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35606 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35607 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35608 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35609 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35610 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35611 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35612 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35613 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35616 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35617 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35618 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35619 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35620 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35621 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35622 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35623 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35624 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35625 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35626 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35627 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35628 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35629 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35630 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35631 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35632 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35633 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35634 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35635 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35636 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35637 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35638 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35639 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3564 - http://www.openwall.com/lists/oss-security/2021/05/25/1 -CVE-2021-3564 - http://www.openwall.com/lists/oss-security/2021/06/01/2 -CVE-2021-3564 - https://www.openwall.com/lists/oss-security/2021/05/25/1 -CVE-2021-35640 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35641 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35642 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35643 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35644 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35645 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35646 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35647 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35648 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35649 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35650 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35651 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35652 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35653 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35654 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35655 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35656 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35657 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35658 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35659 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35660 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35661 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35662 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35665 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35666 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-35683 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35686 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-35687 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3572 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3572 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3573 - http://www.openwall.com/lists/oss-security/2023/07/02/1 -CVE-2021-3573 - https://www.openwall.com/lists/oss-security/2021/06/08/2 -CVE-2021-3574 - https://github.com/ImageMagick/ImageMagick/issues/3540 -CVE-2021-3575 - https://github.com/uclouvain/openjpeg/issues/1347 -CVE-2021-3578 - https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ -CVE-2021-35940 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-35941 - https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo -CVE-2021-35956 - http://packetstormsecurity.com/files/163343/AKCP-sensorProbe-SPX476-Cross-Site-Scripting.html -CVE-2021-35956 - https://tbutler.org/2021/06/28/cve-2021-35956 -CVE-2021-35957 - https://advisories.stormshield.eu -CVE-2021-3596 - https://github.com/ImageMagick/ImageMagick/issues/2624 -CVE-2021-35973 - https://gynvael.coldwind.pl/?lang=en&id=736 -CVE-2021-35975 - https://github.com/fbkcs/CVE-2021-35975 -CVE-2021-35978 - https://digi.com -CVE-2021-3603 - https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ -CVE-2021-36088 - https://github.com/fluent/fluent-bit/pull/3453 -CVE-2021-3609 - https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md -CVE-2021-36090 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-36090 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-36090 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-36090 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3612 - https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/ -CVE-2021-3612 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-36146 - https://github.com/projectacrn/acrn-hypervisor/pull/6173/commits/330359921e2e4c2f3f3a10b5bab86942d63c4428 -CVE-2021-36150 - https://github.com/silverstripe/silverstripe-framework/releases -CVE-2021-36159 - https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749 -CVE-2021-36160 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-36160 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-36221 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-36222 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-36224 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md -CVE-2021-36224 - https://www.youtube.com/watch?v=vsg9YgvGBec -CVE-2021-36225 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md -CVE-2021-36225 - https://www.youtube.com/watch?v=vsg9YgvGBec -CVE-2021-36226 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md -CVE-2021-36226 - https://www.youtube.com/watch?v=vsg9YgvGBec -CVE-2021-36231 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-035.txt -CVE-2021-36232 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-036.txt -CVE-2021-36233 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-037.txt -CVE-2021-36234 - https://www.syss.de -CVE-2021-36234 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-039.txt -CVE-2021-36260 - http://packetstormsecurity.com/files/164603/Hikvision-Web-Server-Build-210702-Command-Injection.html -CVE-2021-36260 - http://packetstormsecurity.com/files/166167/Hikvision-IP-Camera-Unauthenticated-Command-Injection.html -CVE-2021-36278 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-36279 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-36280 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-36281 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-36282 - https://www.dell.com/support/kbdoc/000190408 -CVE-2021-3634 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-36351 - https://www.exploit-db.com/exploits/50165 -CVE-2021-36352 - https://www.exploit-db.com/exploits/50197 -CVE-2021-36356 - http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html -CVE-2021-36359 - http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html -CVE-2021-36359 - http://seclists.org/fulldisclosure/2021/Aug/23 -CVE-2021-36368 - https://docs.ssh-mitm.at/trivialauth.html -CVE-2021-36373 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-36373 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-36373 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-36373 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-36374 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-36374 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-36374 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-36374 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-36380 - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ -CVE-2021-36383 - https://github.com/vatesfr/xen-orchestra/issues/5712 -CVE-2021-36387 - http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html -CVE-2021-36387 - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html -CVE-2021-36388 - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html -CVE-2021-36389 - http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html -CVE-2021-3640 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951 -CVE-2021-3640 - https://ubuntu.com/security/CVE-2021-3640 -CVE-2021-3640 - https://www.openwall.com/lists/oss-security/2021/07/22/1 -CVE-2021-36408 - https://github.com/strukturag/libde265/issues/299 -CVE-2021-36409 - https://github.com/strukturag/libde265/issues/300 -CVE-2021-36410 - https://github.com/strukturag/libde265/issues/301 -CVE-2021-36411 - https://github.com/strukturag/libde265/issues/302 -CVE-2021-36412 - https://github.com/gpac/gpac/issues/1838 -CVE-2021-36414 - https://github.com/gpac/gpac/issues/1840 -CVE-2021-36417 - https://github.com/gpac/gpac/issues/1846 -CVE-2021-36426 - https://github.com/slackero/phpwcms/issues/312 -CVE-2021-36440 - https://github.com/star7th/showdoc/issues/1406 -CVE-2021-3645 - https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262 -CVE-2021-36450 - https://medium.com/@1nf0sk/cve-2021-36450-cross-site-scripting-xss-6f5d8d7db740 -CVE-2021-36450 - https://sushantvkamble.blogspot.com/2021/11/cross-site-scripting-xss.html -CVE-2021-3646 - https://huntr.dev/bounties/32e30ecf-31fa-45f6-8552-47250ef0e613 -CVE-2021-36460 - https://github.com/martinfrancois/CVE-2021-36460 -CVE-2021-3647 - https://huntr.dev/bounties/1625558772840-medialize/URI.js -CVE-2021-3649 - https://huntr.dev/bounties/1625088985607-chatwoot/chatwoot -CVE-2021-36493 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42160 -CVE-2021-36520 - http://packetstormsecurity.com/files/171731/itech-TrainSmart-r1044-SQL-Injection.html -CVE-2021-3653 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html -CVE-2021-36530 - https://github.com/miniupnp/ngiflib/issues/19 -CVE-2021-36531 - https://github.com/miniupnp/ngiflib/issues/18 -CVE-2021-36532 - https://github.com/excellentoldtv/portfolioCMS-issues/issues/1 -CVE-2021-36535 - https://github.com/cesanta/mjs/issues/175 -CVE-2021-36539 - https://github.com/gaukas/instructure-canvas-file-oracle -CVE-2021-36543 - https://cyberdivision.medium.com/cve-2021-36543-9622f50c6dc -CVE-2021-36546 - https://github.com/Kitesky/KiteCMS/issues/10 -CVE-2021-36550 - https://github.com/r0ck3t1973/xss_payload/issues/6 -CVE-2021-36551 - https://github.com/r0ck3t1973/xss_payload/issues/7 -CVE-2021-36563 - https://github.com/Edgarloyola/CVE-2021-36563 -CVE-2021-36564 - https://github.com/top-think/framework/issues/2559 -CVE-2021-36568 - https://blog.hackingforce.com.br/en/cve-2021-36568/ -CVE-2021-36569 - https://github.com/daylightstudio/FUEL-CMS/issues/578 -CVE-2021-36570 - https://github.com/daylightstudio/FUEL-CMS/issues/579 -CVE-2021-36572 - https://github.com/liufee/cms/issues/58 -CVE-2021-36573 - https://github.com/liufee/cms/issues/59 -CVE-2021-36580 - http://icewarp.com -CVE-2021-36584 - https://github.com/gpac/gpac/issues/1842 -CVE-2021-3659 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 -CVE-2021-36608 - https://sourceforge.net/p/webtareas/tickets/44/ -CVE-2021-36609 - https://sourceforge.net/p/webtareas/tickets/43/ -CVE-2021-36613 - http://seclists.org/fulldisclosure/2022/Jun/2 -CVE-2021-36613 - https://seclists.org/fulldisclosure/2021/Jul/0 -CVE-2021-36614 - http://seclists.org/fulldisclosure/2022/Jun/2 -CVE-2021-36614 - https://seclists.org/fulldisclosure/2021/Jul/0 -CVE-2021-36621 - http://packetstormsecurity.com/files/164324/Covid-Vaccination-Scheduler-System-1.0-SQL-Injection-Cross-Site-Scripting.html -CVE-2021-36621 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821 -CVE-2021-36621 - https://www.exploit-db.com/exploits/50109 -CVE-2021-36622 - https://www.exploit-db.com/exploits/50114 -CVE-2021-36623 - https://www.exploit-db.com/exploits/50106 -CVE-2021-36624 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-36624 -CVE-2021-36624 - https://www.exploit-db.com/exploits/50105 -CVE-2021-3664 - https://huntr.dev/bounties/1625557993985-unshiftio/url-parse -CVE-2021-36646 - https://github.com/kalcaddle/KodExplorer/issues/482 -CVE-2021-36654 - http://packetstormsecurity.com/files/163737/CMSuno-1.7-Cross-Site-Scripting.html -CVE-2021-3666 - https://huntr.dev/bounties/1-other-fiznool/body-parser-xml -CVE-2021-36665 - https://imhotepisinvisible.com/druva-lpe/ -CVE-2021-36666 - https://imhotepisinvisible.com/druva-lpe/ -CVE-2021-36667 - https://imhotepisinvisible.com/druva-lpe/ -CVE-2021-36668 - https://imhotepisinvisible.com/druva-lpe/ -CVE-2021-36689 - https://vrls.ws/posts/2021/08/samourai-wallet-bitcoin-pin-authentication-bypass-crypto/ -CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/47 -CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2021-36690 - https://www.sqlite.org/forum/forumpost/718c0a8d17 -CVE-2021-36691 - https://github.com/libjxl/libjxl/issues/422 -CVE-2021-36695 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor1 -CVE-2021-36696 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor2 -CVE-2021-36705 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#tr069-command-injection -CVE-2021-36706 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection -CVE-2021-36707 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#ledonoff-command-injection -CVE-2021-36708 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#sysinit-password-reset -CVE-2021-36711 - http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-Code-Execution.html -CVE-2021-36711 - https://github.com/Drakkar-Software/OctoBot/issues/1966 -CVE-2021-36711 - https://github.com/Nwqda/Sashimi-Evil-OctoBot-Tentacle -CVE-2021-36711 - https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.html -CVE-2021-36713 - https://gist.github.com/walhajri/711af9b62f6fb25e66a5d9a490deab98 -CVE-2021-3672 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3674 - https://gist.github.com/netspooky/61101e191afee95feda7dbd2f6b061c4 -CVE-2021-3674 - https://github.com/rizinorg/rizin/pull/1313 -CVE-2021-36748 - https://blog.sorcery.ie -CVE-2021-36748 - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ -CVE-2021-36761 - https://www.cyberiskvision.com/advisory/ -CVE-2021-36762 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ -CVE-2021-36762 - https://www.kb.cert.org/vuls/id/608209 -CVE-2021-36766 - http://packetstormsecurity.com/files/163564/Concrete5-8.5.5-Phar-Deserialization.html -CVE-2021-36773 - https://news.ycombinator.com/item?id=27833752 -CVE-2021-3678 - https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4 -CVE-2021-36787 - http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html -CVE-2021-36787 - http://seclists.org/fulldisclosure/2022/Jan/53 -CVE-2021-3679 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a -CVE-2021-36797 - https://github.com/victronenergy/venus/issues/836 -CVE-2021-36798 - https://labs.sentinelone.com/hotcobalt-new-cobalt-strike-dos-vulnerability-that-lets-you-halt-operations/ -CVE-2021-36799 - http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html -CVE-2021-36799 - https://github.com/robertguetzkow/ets5-password-recovery -CVE-2021-3680 - https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2 -CVE-2021-36800 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-36801 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-36802 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-36803 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-36804 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-36805 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -CVE-2021-3683 - https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134 -CVE-2021-3689 - https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f -CVE-2021-3692 - https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba -CVE-2021-36934 - http://packetstormsecurity.com/files/164006/HiveNightmare-AKA-SeriousSAM.html -CVE-2021-36942 - https://www.kb.cert.org/vuls/id/405600 -CVE-2021-36977 - https://github.com/HDFGroup/hdf5/issues/272 -CVE-2021-36978 - https://github.com/qpdf/qpdf/issues/492 -CVE-2021-36981 - https://github.com/0xBrAinsTorM/CVE-2021-36981 -CVE-2021-3706 - https://huntr.dev/bounties/ac7fd77b-b31b-4d02-aebd-f89ecbae3fce -CVE-2021-3707 - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md -CVE-2021-3708 - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md -CVE-2021-3709 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308 -CVE-2021-3710 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 -CVE-2021-3711 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3711 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3711 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3712 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 -CVE-2021-3712 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-3712 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-3712 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-37136 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-37136 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-37136 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37137 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-37137 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-37137 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37144 - https://github.com/cskaza/cszcms/issues/32 -CVE-2021-37145 - https://support.polycom.com/content/support.html -CVE-2021-3715 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 -CVE-2021-37152 - https://support.sonatype.com -CVE-2021-37152 - https://support.sonatype.com/hc/en-us/articles/4404115639827 -CVE-2021-37157 - https://www.exploit-db.com/exploits/50373 -CVE-2021-37158 - https://www.exploit-db.com/exploits/50373 -CVE-2021-37159 - https://bugzilla.suse.com/show_bug.cgi?id=1188601 -CVE-2021-37159 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37160 - https://www.armis.com/PwnedPiper -CVE-2021-37161 - https://www.armis.com/PwnedPiper -CVE-2021-37161 - https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37161-bulletin---underflow-in-udprxthread.pdf?rev=9395dad86d0b4811ae4a9e37f0568c2e&hash=3D8571C7A3DCC8B7D8DCB89C2DA4BB8D -CVE-2021-37162 - https://www.armis.com/PwnedPiper -CVE-2021-37163 - https://www.armis.com/PwnedPiper -CVE-2021-37164 - https://www.armis.com/PwnedPiper -CVE-2021-37165 - https://www.armis.com/PwnedPiper -CVE-2021-37166 - https://www.armis.com/PwnedPiper -CVE-2021-37167 - https://www.armis.com/PwnedPiper -CVE-2021-37187 - https://www.digi.com/search/results?q=transport -CVE-2021-37188 - https://www.digi.com/search/results?q=transport -CVE-2021-37189 - https://www.digi.com/search/results?q=transport -CVE-2021-37220 - https://bugs.ghostscript.com/show_bug.cgi?id=703791 -CVE-2021-37221 - https://www.exploit-db.com/exploits/50046 -CVE-2021-37253 - http://packetstormsecurity.com/files/165139/M-Files-Web-Denial-Of-Service.html -CVE-2021-37253 - http://seclists.org/fulldisclosure/2021/Dec/1 -CVE-2021-37253 - https://www.tenable.com/cve/CVE-2021-37253 -CVE-2021-3728 - https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d -CVE-2021-3729 - https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76 -CVE-2021-37291 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-37292 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-37293 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2021-3730 - https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7 -CVE-2021-37315 - https://robertchen.cc/blog/2021/03/31/asus-rce -CVE-2021-37316 - https://robertchen.cc/blog/2021/03/31/asus-rce -CVE-2021-37317 - https://robertchen.cc/blog/2021/03/31/asus-rce -CVE-2021-3732 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 -CVE-2021-37322 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188 -CVE-2021-37330 - https://www.navidkagalwalla.com/booking-core-vulnerabilities -CVE-2021-37331 - https://www.navidkagalwalla.com/booking-core-vulnerabilities -CVE-2021-37333 - https://www.navidkagalwalla.com/booking-core-vulnerabilities -CVE-2021-3734 - https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd -CVE-2021-37343 - http://packetstormsecurity.com/files/165978/Nagios-XI-Autodiscovery-Shell-Upload.html -CVE-2021-37354 - https://github.com/Ainevsia/CVE-Request/tree/main/Xerox/1 -CVE-2021-37363 - https://www.exploit-db.com/exploits/50449 -CVE-2021-37364 - https://www.exploit-db.com/exploits/50448 -CVE-2021-3737 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37371 - http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html -CVE-2021-37371 - https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf -CVE-2021-37372 - http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html -CVE-2021-37372 - https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf -CVE-2021-37373 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37374 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37375 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37376 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37377 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37378 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37379 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -CVE-2021-37381 - https://github.com/caiteli/poc_information/blob/main/southsoft_GMIS.txt -CVE-2021-37381 - https://github.com/caiteli/poc_information/issues/1 -CVE-2021-37388 - https://github.com/noobexploiter/IOTHACKS/blob/main/vuln1.md -CVE-2021-37388 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-37389 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities -CVE-2021-3739 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 -CVE-2021-3739 - https://ubuntu.com/security/CVE-2021-3739 -CVE-2021-37390 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities -CVE-2021-37391 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities -CVE-2021-37402 - http://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2021-37403 - http://seclists.org/fulldisclosure/2021/Jul/33 -CVE-2021-37412 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-040.txt -CVE-2021-37415 - https://www.manageengine.com -CVE-2021-37416 - https://blog.stmcyber.com/vulns/cve-2021-37416/ -CVE-2021-37417 - https://blog.stmcyber.com/vulns/cve-2021-37417/ -CVE-2021-37419 - https://blog.stmcyber.com/vulns/cve-2021-37419/ -CVE-2021-37419 - https://www.manageengine.com -CVE-2021-37420 - https://blog.stmcyber.com/vulns/cve-2021-37420/ -CVE-2021-37420 - https://www.manageengine.com -CVE-2021-37421 - https://blog.stmcyber.com/vulns/cve-2021-37421/ -CVE-2021-37424 - https://www.manageengine.com -CVE-2021-37425 - http://seclists.org/fulldisclosure/2021/Aug/12 -CVE-2021-37425 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 -CVE-2021-37425 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2021-3743 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117 -CVE-2021-3743 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37439 - https://github.com/0xfml/poc/blob/main/NCH/Flexiserver_6.00_LFI.md -CVE-2021-3744 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37440 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md -CVE-2021-37441 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md -CVE-2021-37442 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md -CVE-2021-37443 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md -CVE-2021-37444 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md -CVE-2021-37445 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md -CVE-2021-37446 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md -CVE-2021-37447 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md -CVE-2021-37448 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md -CVE-2021-37449 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md -CVE-2021-3745 - https://huntr.dev/bounties/7879ab3d-8018-402a-aa0b-131bdbd1966c -CVE-2021-37450 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md -CVE-2021-37451 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md -CVE-2021-37452 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_CC.md -CVE-2021-37453 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37454 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37455 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37456 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37457 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37458 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37459 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37460 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37461 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37462 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -CVE-2021-37463 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md -CVE-2021-37464 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md -CVE-2021-37465 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md -CVE-2021-37466 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md -CVE-2021-37467 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md -CVE-2021-37468 - https://github.com/0xfml/poc/blob/main/NCH/ReflectCRM_3.01_CC.md -CVE-2021-37469 - https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_LFI.md -CVE-2021-37470 - https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_XSS.md -CVE-2021-3749 - https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31 -CVE-2021-3749 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37491 - https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3 -CVE-2021-37492 - https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3 -CVE-2021-37497 - https://github.com/penson233/Vuln/issues/3 -CVE-2021-37501 - https://github.com/HDFGroup/hdf5 -CVE-2021-37501 - https://github.com/HDFGroup/hdf5/issues/2458 -CVE-2021-37501 - https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md -CVE-2021-3751 - https://huntr.dev/bounties/fcb4383c-bc27-4b89-bfce-6b041f0cb769 -CVE-2021-37519 - https://github.com/memcached/memcached/issues/805 -CVE-2021-3752 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37529 - https://sourceforge.net/p/mcj/tickets/125/ -CVE-2021-37531 - http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html -CVE-2021-37538 - https://blog.sorcery.ie/posts/smartblog_sqli/ -CVE-2021-37539 - https://www.manageengine.com -CVE-2021-3756 - https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1 -CVE-2021-37560 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37561 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37562 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37563 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37564 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37565 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37566 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37567 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37568 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37569 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-3757 - https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa -CVE-2021-37570 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37571 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37572 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37573 - http://packetstormsecurity.com/files/163825/Tiny-Java-Web-Server-1.115-Cross-Site-Scripting.html -CVE-2021-37573 - http://seclists.org/fulldisclosure/2021/Aug/13 -CVE-2021-37573 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-042.txt -CVE-2021-37576 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a -CVE-2021-3758 - https://huntr.dev/bounties/a8d7fb24-9a69-42f3-990a-2db93b53f76b -CVE-2021-37583 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37584 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 -CVE-2021-37589 - http://packetstormsecurity.com/files/167480/Virtua-Software-Cobranca-12S-SQL-Injection.html -CVE-2021-37589 - https://github.com/luca-regne/my-cves/tree/main/CVE-2021-37589 -CVE-2021-3759 - https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ -CVE-2021-37593 - http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/ -CVE-2021-37593 - https://github.com/advisto/peel-shopping/issues/3 -CVE-2021-37593 - https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md -CVE-2021-37605 - https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf -CVE-2021-37606 - https://peter.website/meow-hash-cryptanalysis -CVE-2021-37613 - https://advisories.stormshield.eu -CVE-2021-37623 - https://github.com/Exiv2/exiv2/pull/1790 -CVE-2021-37624 - http://packetstormsecurity.com/files/164628/FreeSWITCH-1.10.6-Missing-SIP-MESSAGE-Authentication.html -CVE-2021-3765 - https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9 -CVE-2021-3766 - https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc -CVE-2021-3767 - https://huntr.dev/bounties/7ec92c85-30eb-4071-8891-6183446ca980 -CVE-2021-3768 - https://huntr.dev/bounties/64a0229f-ff5e-4c64-b83e-9bfc0698a78e -CVE-2021-37695 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-37695 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-3770 - http://www.openwall.com/lists/oss-security/2021/10/01/1 -CVE-2021-3770 - https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365 -CVE-2021-37701 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-37706 - http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html -CVE-2021-37712 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-37713 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-37714 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-37714 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-37714 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df -CVE-2021-3772 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3773 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-37740 - https://github.com/robertguetzkow/CVE-2021-37740 -CVE-2021-37741 - https://www.manageengine.com -CVE-2021-37748 - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/ -CVE-2021-37749 - https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/ -CVE-2021-3775 - https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3 -CVE-2021-37750 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3776 - https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304 -CVE-2021-37761 - https://www.manageengine.com -CVE-2021-37762 - https://www.manageengine.com -CVE-2021-37764 - https://github.com/XOS-Shop/xos_shop_system/issues/1 -CVE-2021-3777 - https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df -CVE-2021-37774 - https://github.com/fishykz/TP-POC -CVE-2021-37777 - https://www.navidkagalwalla.com/gila-cms-vulnerabilities -CVE-2021-3778 - http://www.openwall.com/lists/oss-security/2021/10/01/1 -CVE-2021-3778 - https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 -CVE-2021-37788 - https://gist.github.com/rvismit/67bc11dd9ccb7423827564cb81d25740 -CVE-2021-37789 - https://github.com/nothings/stb/issues/1178 -CVE-2021-37791 - https://github.com/cdfan/my-admin/issues/3 -CVE-2021-3780 - https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6 -CVE-2021-3780 - https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65 -CVE-2021-37803 - https://packetstormsecurity.com/files/163415/Online-Covid-Vaccination-Scheduler-System-1.0-SQL-Injection.html -CVE-2021-37805 - https://packetstormsecurity.com/files/163625/Vehicle-Parking-Management-System-1.0-Cross-Site-Scripting.html -CVE-2021-37806 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37806 -CVE-2021-37806 - https://packetstormsecurity.com/files/163626/Vehicle-Parking-Management-System-1.0-SQL-Injection.html -CVE-2021-37807 - https://packetstormsecurity.com/files/163574/Online-Shopping-Portal-3.1-SQL-Injection.html -CVE-2021-37808 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808 -CVE-2021-37808 - https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html -CVE-2021-37819 - https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21/diffs?commit_id=9b0cbb76c8434a8505f02ada02a94263dcae9247#diff-content-b3cfd29983c793bcae2375502abd5baa8f5d1081 -CVE-2021-37840 - https://github.com/aaPanel/aaPanel/issues/74 -CVE-2021-37841 - https://docs.docker.com/docker-for-windows/release-notes/ -CVE-2021-3785 - https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638 -CVE-2021-37859 - https://mattermost.com/security-updates/ -CVE-2021-37860 - https://mattermost.com/security-updates/ -CVE-2021-37861 - https://mattermost.com/security-updates/ -CVE-2021-37862 - https://mattermost.com/security-updates/ -CVE-2021-37863 - https://mattermost.com/security-updates/ -CVE-2021-37864 - https://mattermost.com/security-updates/ -CVE-2021-37865 - https://mattermost.com/security-updates/ -CVE-2021-37866 - https://mattermost.com/security-updates/ -CVE-2021-37866 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-37866 -CVE-2021-37867 - https://mattermost.com/security-updates/ -CVE-2021-37914 - https://github.com/argoproj/argo-workflows/issues/6441 -CVE-2021-37914 - https://github.com/argoproj/argo-workflows/pull/6442 -CVE-2021-37915 - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/ -CVE-2021-37916 - https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26 -CVE-2021-37916 - https://github.com/laurent22/joplin/releases/tag/v2.0.9 -CVE-2021-37918 - https://www.manageengine.com -CVE-2021-37919 - https://www.manageengine.com -CVE-2021-37920 - https://www.manageengine.com -CVE-2021-37921 - https://www.manageengine.com -CVE-2021-37922 - https://www.manageengine.com -CVE-2021-37923 - https://www.manageengine.com -CVE-2021-37924 - https://www.manageengine.com -CVE-2021-37925 - https://www.manageengine.com -CVE-2021-37926 - https://www.manageengine.com -CVE-2021-37927 - https://www.manageengine.com -CVE-2021-37928 - https://www.manageengine.com -CVE-2021-37929 - https://www.manageengine.com -CVE-2021-37930 - https://www.manageengine.com -CVE-2021-37931 - https://www.manageengine.com -CVE-2021-37936 - https://www.elastic.co/community/security/ -CVE-2021-37937 - https://www.elastic.co/community/security -CVE-2021-3794 - https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7 -CVE-2021-37942 - https://www.elastic.co/community/security -CVE-2021-3796 - http://www.openwall.com/lists/oss-security/2021/10/01/1 -CVE-2021-3796 - https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d -CVE-2021-3797 - https://huntr.dev/bounties/c24fb15c-3c84-45c8-af04-a660f8da388f -CVE-2021-37975 - http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html -CVE-2021-37979 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1372 -CVE-2021-3799 - https://huntr.dev/bounties/d73f24a8-302b-4f9f-abb8-54688abd9813 -CVE-2021-3801 - https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a -CVE-2021-3802 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt -CVE-2021-3803 - https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0 -CVE-2021-3804 - https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414 -CVE-2021-3805 - https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053 -CVE-2021-3806 - https://pentest.blog/pardus-21-linux-distro-remote-code-execution-0day-2021/ -CVE-2021-3807 - https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 -CVE-2021-3807 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-38085 - http://packetstormsecurity.com/files/163795/Canon-TR150-Driver-3.71.2.10-Privilege-Escalation.html -CVE-2021-38085 - https://www.youtube.com/watch?v=vdesswZYz-8 -CVE-2021-38090 - https://trac.ffmpeg.org/ticket/8263 -CVE-2021-38091 - https://trac.ffmpeg.org/ticket/8263 -CVE-2021-38092 - https://trac.ffmpeg.org/ticket/8263 -CVE-2021-38093 - https://trac.ffmpeg.org/ticket/8263 -CVE-2021-38094 - https://trac.ffmpeg.org/ticket/8263 -CVE-2021-38095 - https://github.com/FlaviuPopescu/Spigit-PoC -CVE-2021-3810 - https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223 -CVE-2021-3811 - https://huntr.dev/bounties/fa38c61f-4043-4872-bc85-7fe5ae5cc2e8 -CVE-2021-38112 - https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/ -CVE-2021-38113 - https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387 -CVE-2021-3812 - https://huntr.dev/bounties/875a6885-9a64-46f3-94ad-92f40f989200 -CVE-2021-3813 - https://huntr.dev/bounties/36f02c4f-cf1c-479e-a1ad-091a1ac7cb56 -CVE-2021-38136 - https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapshot-path-traversal/ -CVE-2021-38137 - https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/ -CVE-2021-38138 - http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html -CVE-2021-38143 - https://bernardofsr.github.io/blog/2021/form-tools/ -CVE-2021-38143 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md -CVE-2021-38144 - https://bernardofsr.github.io/blog/2021/form-tools/ -CVE-2021-38144 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md -CVE-2021-38145 - https://bernardofsr.github.io/blog/2021/form-tools/ -CVE-2021-38145 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md -CVE-2021-38146 - http://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html -CVE-2021-38147 - http://packetstormsecurity.com/files/165039/Wipro-Holmes-Orchestrator-20.4.1-Report-Disclosure.html -CVE-2021-38149 - https://github.com/jboogie15/CVE-2021-38149 -CVE-2021-3815 - https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0 -CVE-2021-38151 - https://github.com/jboogie15/CVE-2021-38149 -CVE-2021-38152 - http://packetstormsecurity.com/files/163816/Chikitsa-2.0.0-Cross-Site-Scripting.html -CVE-2021-38152 - https://github.com/jboogie15/CVE-2021-38149 -CVE-2021-38153 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-38153 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-38153 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-38156 - https://raxis.com/blog/cve-2021-38156 -CVE-2021-38157 - https://gist.github.com/erud1te-sec/5c85924cb78ba85af42e0b7b62a5ec91 -CVE-2021-38157 - https://leostream.com -CVE-2021-38157 - https://www.leostream.com/resources-2/product-lifecycle/ -CVE-2021-38160 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -CVE-2021-38162 - http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html -CVE-2021-3817 - http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html -CVE-2021-3817 - https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7 -CVE-2021-38177 - http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html -CVE-2021-38178 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-38179 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-3818 - https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea -CVE-2021-38180 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-38181 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-38183 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-38185 - https://github.com/fangqyi/cpiopwn -CVE-2021-38198 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11 -CVE-2021-38199 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -CVE-2021-3820 - https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a -CVE-2021-38200 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 -CVE-2021-38201 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -CVE-2021-38202 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -CVE-2021-38203 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -CVE-2021-38204 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6 -CVE-2021-38205 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 -CVE-2021-38206 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 -CVE-2021-38207 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 -CVE-2021-38208 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 -CVE-2021-38209 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2 -CVE-2021-3822 - https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73 -CVE-2021-38221 - https://github.com/mlogclub/bbs-go/issues/112 -CVE-2021-38241 - https://www.du1ge.com/archives/CVE-2021-38241 -CVE-2021-38244 - https://github.com/cBioPortal/cbioportal/issues/8680 -CVE-2021-3825 - https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ -CVE-2021-38263 - https://issues.liferay.com/browse/LPE-17061 -CVE-2021-38266 - https://issues.liferay.com/browse/LPE-17191 -CVE-2021-38278 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-2-strcpy-buffer-overflow-92cd88e1d503 -CVE-2021-3828 - https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32 -CVE-2021-38283 - http://packetstormsecurity.com/files/165031/Wipro-Holmes-Orchestrator-20.4.1-File-Disclosure.html -CVE-2021-38289 - https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation -CVE-2021-3829 - https://huntr.dev/bounties/6b8acb0c-8b5d-461e-9b46-b1bfb5a8ccdf -CVE-2021-38291 - https://trac.ffmpeg.org/ticket/9312 -CVE-2021-38294 - http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html -CVE-2021-38296 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3830 - https://huntr.dev/bounties/0fcdee5f-1f07-47ce-b650-ea8b4a7d35d8 -CVE-2021-38300 - http://www.openwall.com/lists/oss-security/2021/09/15/5 -CVE-2021-38300 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 -CVE-2021-38300 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b -CVE-2021-3831 - https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04 -CVE-2021-3836 - https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4 -CVE-2021-38362 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2021-3837 - https://huntr.dev/bounties/d66f90d6-1b5f-440d-8be6-cdffc9d4587e -CVE-2021-38371 - https://www.exim.org -CVE-2021-38374 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html -CVE-2021-38374 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html -CVE-2021-38374 - http://seclists.org/fulldisclosure/2021/Nov/43 -CVE-2021-38374 - http://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2021-38375 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html -CVE-2021-38375 - https://seclists.org/fulldisclosure/2021/Nov/43 -CVE-2021-38376 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html -CVE-2021-38376 - https://seclists.org/fulldisclosure/2021/Nov/43 -CVE-2021-38377 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html -CVE-2021-38377 - https://seclists.org/fulldisclosure/2021/Nov/43 -CVE-2021-38378 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html -CVE-2021-38378 - https://seclists.org/fulldisclosure/2021/Nov/43 -CVE-2021-38380 - http://lists.live555.com/pipermail/live-devel/2021-August/021954.html -CVE-2021-38381 - http://lists.live555.com/pipermail/live-devel/2021-August/021961.html -CVE-2021-38382 - http://lists.live555.com/pipermail/live-devel/2021-August/021959.html -CVE-2021-38410 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ -CVE-2021-3842 - https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a -CVE-2021-38425 - https://github.com/eProsima/Fast-DDS -CVE-2021-3845 - https://huntr.dev/bounties/dc7fc98f-4f4f-440a-b6f6-124a56ea36ef -CVE-2021-3846 - https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18 -CVE-2021-38490 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 -CVE-2021-38496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1725335 -CVE-2021-38498 - https://bugzilla.mozilla.org/show_bug.cgi?id=1729642 -CVE-2021-3850 - https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c -CVE-2021-38503 - https://bugzilla.mozilla.org/show_bug.cgi?id=1729517 -CVE-2021-38509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1718571 -CVE-2021-38520 - https://kb.netgear.com/000063763/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0565 -CVE-2021-38522 - https://kb.netgear.com/000063767/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0058 -CVE-2021-38523 - https://kb.netgear.com/000063771/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0166 -CVE-2021-3853 - https://huntr.dev/bounties/2b6a7647-8f2b-4510-b40f-c52aedc2820d -CVE-2021-38530 - https://kb.netgear.com/000063770/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2019-0151 -CVE-2021-38531 - https://kb.netgear.com/000063769/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2019-0113 -CVE-2021-38532 - https://kb.netgear.com/000063787/Security-Advisory-for-Security-Misconfiguration-on-WAC104-PSV-2021-0124 -CVE-2021-38535 - https://kb.netgear.com/000063773/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0192 -CVE-2021-38536 - https://kb.netgear.com/000063774/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0193 -CVE-2021-3855 - https://docs.liman.dev/baslangic/guvenlik -CVE-2021-3857 - https://huntr.dev/bounties/18f7eaee-6309-40cb-aed3-d5ac0af03cf3 -CVE-2021-3858 - https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b -CVE-2021-3860 - http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html -CVE-2021-38603 - http://packetstormsecurity.com/files/163823/PluXML-5.8.7-Cross-Site-Scripting.html -CVE-2021-38604 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-38615 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2021-38616 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2021-38617 - https://excellium-services.com/cert-xlm-advisory/ -CVE-2021-3862 - https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601 -CVE-2021-3863 - https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0 -CVE-2021-3864 - https://www.openwall.com/lists/oss-security/2021/10/20/2 -CVE-2021-38647 - http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html -CVE-2021-38648 - http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html -CVE-2021-3866 - https://huntr.dev/bounties/5f48dac5-e112-4b23-bbbf-cc00ba83bcf2 -CVE-2021-3869 - https://huntr.dev/bounties/2f8baf6c-14b3-420d-8ede-9805797cd324 -CVE-2021-38699 - http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html -CVE-2021-38699 - https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS -CVE-2021-38699 - https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS -CVE-2021-38702 - http://packetstormsecurity.com/files/163859/Cyberoam-NetGenie-Cross-Site-Scripting.html -CVE-2021-38702 - http://seclists.org/fulldisclosure/2021/Aug/20 -CVE-2021-38702 - https://seclists.org/fulldisclosure/2021/Aug/20 -CVE-2021-38703 - https://7bits.nl/journal/posts/cve-2021-38703-kpn-experia-wifi-root-shell/ -CVE-2021-38714 - https://sourceforge.net/p/plib/bugs/55/ -CVE-2021-3872 - https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 -CVE-2021-38721 - https://github.com/daylightstudio/FUEL-CMS/issues/584 -CVE-2021-38727 - https://www.nu11secur1ty.com/2021/10/cve-2021-38727.html -CVE-2021-3874 - https://huntr.dev/bounties/ac268a17-72b5-446f-a09a-9945ef58607a -CVE-2021-3875 - https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53 -CVE-2021-38752 - https://github.com/dumpling-soup/Online-Catering-Reservation/blob/main/README.md -CVE-2021-38753 - https://github.com/dumpling-soup/Simple-Image-Gallery-Web-App/blob/main/README.md -CVE-2021-38757 - http://packetstormsecurity.com/files/163869/Hospital-Management-System-Cross-Site-Scripting.html -CVE-2021-38758 - https://attackerkb.com/topics/XuEb81tsid/online-catering-reservation-dt-food-catering-by-oretnom23-v1-0-sql-injection---login -CVE-2021-38758 - https://github.com/dumpling-soup/Online-Catering-Reservation-DT/blob/main/README.md -CVE-2021-38758 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/Online-Catering-Reservation-DT-Food-Catering -CVE-2021-38759 - http://packetstormsecurity.com/files/165211/Raspberry-Pi-5.10-Default-Credentials.html -CVE-2021-38772 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-3-yet-another-buffer-overflow-4eb322f64823 -CVE-2021-3878 - https://huntr.dev/bounties/a11c889b-ccff-4fea-9e29-963a23a63dd2 -CVE-2021-38789 - https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9Aaw_display%20service%20has%20EoP%20Vulnerability.md -CVE-2021-3879 - https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe -CVE-2021-3881 - https://huntr.dev/bounties/540fd115-7de4-4e19-a918-5ee61f5157c1 -CVE-2021-38819 - https://github.com/m4sk0ff/CVE-2021-38819/blob/main/CVE-2021-38819.md -CVE-2021-3882 - https://huntr.dev/bounties/7061d97a-98a5-495a-8ba0-3a4c66091e9d -CVE-2021-38822 - https://www.navidkagalwalla.com/icehrm-vulnerabilities -CVE-2021-38823 - https://www.navidkagalwalla.com/icehrm-vulnerabilities -CVE-2021-38833 - https://www.exploit-db.com/exploits/50288 -CVE-2021-38834 - https://www.exploit-db.com/exploits/50194 -CVE-2021-38840 - https://www.exploit-db.com/exploits/50204 -CVE-2021-38840 - https://www.exploit-db.com/exploits/50205 -CVE-2021-38841 - https://www.exploit-db.com/exploits/50205 -CVE-2021-3888 - https://huntr.dev/bounties/722b3acb-792b-4429-a98d-bb80efb8938d -CVE-2021-3889 - https://huntr.dev/bounties/efb3e261-3f7d-4a45-8114-e0ace6b21516 -CVE-2021-38926 - https://www.ibm.com/support/pages/node/6523808 -CVE-2021-3899 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 -CVE-2021-3900 - https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76 -CVE-2021-3901 - https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464 -CVE-2021-3903 - https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 -CVE-2021-3904 - https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d -CVE-2021-39118 - https://jira.atlassian.com/browse/JRASERVER-72736 -CVE-2021-39131 - https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9 -CVE-2021-39134 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-39135 - https://www.oracle.com/security-alerts/cpuoct2021.html -CVE-2021-39139 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39139 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39139 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39140 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39140 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39140 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39141 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39141 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39141 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39144 - http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html -CVE-2021-39144 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39144 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39144 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39145 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39145 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39145 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39146 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39146 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39146 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39147 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39147 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39147 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39148 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39148 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39148 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39149 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39149 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39149 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-3915 - https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079 -CVE-2021-39150 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39150 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39150 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39151 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39151 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39151 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39152 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39152 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39152 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39153 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39153 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39153 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39154 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39154 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39154 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-39157 - https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr -CVE-2021-3916 - https://huntr.dev/bounties/0be32e6b-7c48-43f0-9cec-433000ad8f64 -CVE-2021-39170 - https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/ -CVE-2021-39171 - https://github.com/node-saml/passport-saml/pull/595 -CVE-2021-39172 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ -CVE-2021-39173 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ -CVE-2021-39174 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ -CVE-2021-39176 - https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj -CVE-2021-3918 - https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9 -CVE-2021-39189 - https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/ -CVE-2021-39193 - https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm -CVE-2021-3920 - https://huntr.dev/bounties/ab564760-90c6-4e1d-80c2-852f45034cd1 -CVE-2021-39243 - http://seclists.org/fulldisclosure/2021/Aug/21 -CVE-2021-39244 - https://seclists.org/fulldisclosure/2021/Aug/21 -CVE-2021-39245 - https://seclists.org/fulldisclosure/2021/Aug/21 -CVE-2021-39246 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md -CVE-2021-39246 - https://sick.codes/sick-2021-111 -CVE-2021-39249 - https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/ -CVE-2021-39250 - https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/ -CVE-2021-39251 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39252 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39253 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39254 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39255 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39256 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39257 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39258 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39259 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39260 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39261 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39262 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39263 - https://github.com/tuxera/ntfs-3g/releases -CVE-2021-39267 - https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/ -CVE-2021-39268 - https://thanhlocpanda.wordpress.com/2021/07/31/stored-xss-via-svg-on-suitecrm/ -CVE-2021-3927 - https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 -CVE-2021-39271 - http://packetstormsecurity.com/files/163989/BSCW-Server-Remote-Code-Execution.html -CVE-2021-39271 - https://seclists.org/fulldisclosure/2021/Aug/24 -CVE-2021-39275 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-39275 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-39278 - http://packetstormsecurity.com/files/164014 -CVE-2021-3928 - https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd -CVE-2021-39280 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -CVE-2021-39282 - http://lists.live555.com/pipermail/live-devel/2021-August/021970.html -CVE-2021-39283 - http://lists.live555.com/pipermail/live-devel/2021-August/021969.html -CVE-2021-39285 - https://github.com/pbgt/CVEs/blob/main/CVE-2021-39285.md -CVE-2021-39289 - http://seclists.org/fulldisclosure/2021/Aug/22 -CVE-2021-39290 - https://seclists.org/fulldisclosure/2021/Aug/22 -CVE-2021-39291 - https://seclists.org/fulldisclosure/2021/Aug/22 -CVE-2021-39295 - https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q -CVE-2021-39296 - https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q -CVE-2021-39307 - https://research.nccgroup.com/2021/09/14/technical-advisory-pdftron-javascript-urls-allowed-in-webviewer-ui-cve-2021-39307/ -CVE-2021-39307 - https://www.pdftron.com/webviewer/ -CVE-2021-3931 - https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f -CVE-2021-39312 - http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html -CVE-2021-39316 - http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html -CVE-2021-39320 - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 -CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html -CVE-2021-39327 - https://www.exploit-db.com/exploits/50382 -CVE-2021-39352 - http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html -CVE-2021-39352 - http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html -CVE-2021-39352 - https://www.exploit-db.com/exploits/50580 -CVE-2021-39363 - https://www.honeywell.com/us/en/product-security -CVE-2021-39364 - https://www.honeywell.com/us/en/product-security -CVE-2021-39369 - https://www.youtube.com/watch?v=7zC84TNpIxw -CVE-2021-39375 - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/ -CVE-2021-39376 - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/ -CVE-2021-3938 - https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063 -CVE-2021-39383 - https://github.com/wkeyuan/DWSurvey/issues/81 -CVE-2021-3939 - http://packetstormsecurity.com/files/172848/Ubuntu-accountsservice-Double-Free-Memory-Corruption.html -CVE-2021-39428 - https://github.com/eyoucms/eyoucms/issues/14 -CVE-2021-39432 - https://github.com/DIPlib/diplib/issues/80 -CVE-2021-3944 - https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9 -CVE-2021-3945 - https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4 -CVE-2021-39458 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39458 -CVE-2021-39459 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459 -CVE-2021-39474 - https://saikotwolf.medium.com/f9ed24e14e51 -CVE-2021-39480 - https://github.com/m4b/bingrep/issues/30 -CVE-2021-39486 - https://www.navidkagalwalla.com/gila-cms-vulnerabilities -CVE-2021-39499 - https://github.com/eyoucms/eyoucms/issues/18 -CVE-2021-3950 - https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e -CVE-2021-39501 - https://github.com/eyoucms/eyoucms/issues/17 -CVE-2021-39503 - https://github.com/gaozhifeng/PHPMyWind/issues/15 -CVE-2021-39509 - https://github.com/doudoudedi/main-DIR-816_A2_Command-injection -CVE-2021-39509 - https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md -CVE-2021-39509 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-39510 - https://github.com/doudoudedi/main-DIR-816_A1_Command-injection -CVE-2021-39510 - https://github.com/doudoudedi/main-DIR-816_A1_Command-injection/blob/main/injection_A1.md -CVE-2021-39510 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-39514 - https://github.com/thorfdbg/libjpeg/issues/36 -CVE-2021-39515 - https://github.com/thorfdbg/libjpeg/issues/37 -CVE-2021-39516 - https://github.com/thorfdbg/libjpeg/issues/42 -CVE-2021-39517 - https://github.com/thorfdbg/libjpeg/issues/33 -CVE-2021-39518 - https://github.com/thorfdbg/libjpeg/issues/35 -CVE-2021-39519 - https://github.com/thorfdbg/libjpeg/issues/28 -CVE-2021-39520 - https://github.com/thorfdbg/libjpeg/issues/34 -CVE-2021-39521 - https://github.com/LibreDWG/libredwg/issues/262 -CVE-2021-39522 - https://github.com/LibreDWG/libredwg/issues/255 -CVE-2021-39523 - https://github.com/LibreDWG/libredwg/issues/251 -CVE-2021-39525 - https://github.com/LibreDWG/libredwg/issues/261 -CVE-2021-39527 - https://github.com/LibreDWG/libredwg/issues/252 -CVE-2021-39528 - https://github.com/LibreDWG/libredwg/issues/256 -CVE-2021-39530 - https://github.com/LibreDWG/libredwg/issues/258 -CVE-2021-39531 - https://github.com/Juniper/libslax/issues/53 -CVE-2021-39532 - https://github.com/Juniper/libslax/issues/50 -CVE-2021-39533 - https://github.com/Juniper/libslax/issues/51 -CVE-2021-39534 - https://github.com/Juniper/libslax/issues/52 -CVE-2021-39535 - https://github.com/hfp/libxsmm/issues/398 -CVE-2021-39536 - https://github.com/hfp/libxsmm/issues/402 -CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2021-39537 - https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html -CVE-2021-39538 - https://github.com/leonhad/pdftools/issues/4 -CVE-2021-39539 - https://github.com/leonhad/pdftools/issues/6 -CVE-2021-39540 - https://github.com/leonhad/pdftools/issues/2 -CVE-2021-39541 - https://github.com/leonhad/pdftools/issues/3 -CVE-2021-39542 - https://github.com/leonhad/pdftools/issues/5 -CVE-2021-39543 - https://github.com/leonhad/pdftools/issues/1 -CVE-2021-39544 - https://github.com/sahaRatul/sela/issues/25 -CVE-2021-39545 - https://github.com/sahaRatul/sela/issues/31 -CVE-2021-39546 - https://github.com/sahaRatul/sela/issues/29 -CVE-2021-39547 - https://github.com/sahaRatul/sela/issues/32 -CVE-2021-39548 - https://github.com/sahaRatul/sela/issues/28 -CVE-2021-39549 - https://github.com/sahaRatul/sela/issues/27 -CVE-2021-39550 - https://github.com/sahaRatul/sela/issues/30 -CVE-2021-39551 - https://github.com/sahaRatul/sela/issues/26 -CVE-2021-39552 - https://github.com/sahaRatul/sela/issues/23 -CVE-2021-39553 - https://github.com/matthiaskramm/swftools/issues/103 -CVE-2021-39554 - https://github.com/matthiaskramm/swftools/issues/100 -CVE-2021-39555 - https://github.com/matthiaskramm/swftools/issues/99 -CVE-2021-39556 - https://github.com/matthiaskramm/swftools/issues/105 -CVE-2021-39557 - https://github.com/matthiaskramm/swftools/issues/97 -CVE-2021-39558 - https://github.com/matthiaskramm/swftools/issues/106 -CVE-2021-39559 - https://github.com/matthiaskramm/swftools/issues/101 -CVE-2021-39561 - https://github.com/matthiaskramm/swftools/issues/102 -CVE-2021-39562 - https://github.com/matthiaskramm/swftools/issues/98 -CVE-2021-39563 - https://github.com/matthiaskramm/swftools/issues/115 -CVE-2021-39564 - https://github.com/matthiaskramm/swftools/issues/116 -CVE-2021-39569 - https://github.com/matthiaskramm/swftools/issues/114 -CVE-2021-3957 - https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691 -CVE-2021-39574 - https://github.com/matthiaskramm/swftools/issues/124 -CVE-2021-39575 - https://github.com/matthiaskramm/swftools/issues/128 -CVE-2021-39577 - https://github.com/matthiaskramm/swftools/issues/121 -CVE-2021-39579 - https://github.com/matthiaskramm/swftools/issues/125 -CVE-2021-3958 - https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt -CVE-2021-39582 - https://github.com/matthiaskramm/swftools/issues/122 -CVE-2021-39583 - https://github.com/matthiaskramm/swftools/issues/136 -CVE-2021-39584 - https://github.com/matthiaskramm/swftools/issues/130 -CVE-2021-39585 - https://github.com/matthiaskramm/swftools/issues/133 -CVE-2021-39587 - https://github.com/matthiaskramm/swftools/issues/129 -CVE-2021-39588 - https://github.com/matthiaskramm/swftools/issues/131 -CVE-2021-39589 - https://github.com/matthiaskramm/swftools/issues/132 -CVE-2021-39590 - https://github.com/matthiaskramm/swftools/issues/137 -CVE-2021-39591 - https://github.com/matthiaskramm/swftools/issues/135 -CVE-2021-39592 - https://github.com/matthiaskramm/swftools/issues/138 -CVE-2021-39593 - https://github.com/matthiaskramm/swftools/issues/139 -CVE-2021-39594 - https://github.com/matthiaskramm/swftools/issues/142 -CVE-2021-39595 - https://github.com/matthiaskramm/swftools/issues/141 -CVE-2021-39596 - https://github.com/matthiaskramm/swftools/issues/146 -CVE-2021-39597 - https://github.com/matthiaskramm/swftools/issues/143 -CVE-2021-39598 - https://github.com/matthiaskramm/swftools/issues/145 -CVE-2021-39599 - https://github.com/cbkhwx/cxuucmsv3/issues/7 -CVE-2021-39608 - http://packetstormsecurity.com/files/164047/FlatCore-CMS-2.0.7-Remote-Code-Execution.html -CVE-2021-39608 - https://github.com/flatCore/flatCore-CMS/issues/52 -CVE-2021-39609 - https://github.com/flatCore/flatCore-CMS/issues/53 -CVE-2021-3961 - https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10 -CVE-2021-39613 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-39613 - https://www.nussko.com/advisories/advisory-2021-08-01.txt -CVE-2021-39614 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-39614 - https://www.nussko.com/advisories/advisory-2021-08-01.txt -CVE-2021-39615 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-39615 - https://www.nussko.com/advisories/advisory-2021-08-02.txt -CVE-2021-3962 - https://github.com/ImageMagick/ImageMagick/issues/4446 -CVE-2021-3963 - https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8 -CVE-2021-3967 - https://huntr.dev/bounties/2928a625-0467-4a0a-b4e2-e27322786686 -CVE-2021-3968 - https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528 -CVE-2021-39713 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -CVE-2021-3973 - https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e -CVE-2021-3974 - https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 -CVE-2021-3976 - https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406 -CVE-2021-3977 - https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde -CVE-2021-3980 - https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac -CVE-2021-3983 - https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413 -CVE-2021-3984 - https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a -CVE-2021-3985 - https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4 -CVE-2021-39868 - https://gitlab.com/gitlab-org/gitlab/-/issues/24649 -CVE-2021-39877 - https://gitlab.com/gitlab-org/gitlab/-/issues/300095 -CVE-2021-39881 - https://gitlab.com/gitlab-org/gitlab/-/issues/26695 -CVE-2021-3989 - https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5 -CVE-2021-39892 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39892.json -CVE-2021-39892 - https://gitlab.com/gitlab-org/gitlab/-/issues/28440 -CVE-2021-39895 - https://gitlab.com/gitlab-org/gitlab/-/issues/337824 -CVE-2021-3990 - https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f -CVE-2021-39905 - https://gitlab.com/gitlab-org/gitlab/-/issues/28226 -CVE-2021-39914 - https://gitlab.com/gitlab-org/gitlab/-/issues/289948 -CVE-2021-3992 - https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93 -CVE-2021-3993 - https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871 -CVE-2021-3993 - https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9 -CVE-2021-39936 - https://gitlab.com/gitlab-org/gitlab/-/issues/241767 -CVE-2021-3994 - https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd -CVE-2021-39946 - https://gitlab.com/gitlab-org/gitlab/-/issues/345657 -CVE-2021-3995 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html -CVE-2021-3996 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html -CVE-2021-3998 - https://www.openwall.com/lists/oss-security/2022/01/24/4 -CVE-2021-3999 - https://www.openwall.com/lists/oss-security/2022/01/24/4 -CVE-2021-4000 - https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962 -CVE-2021-4002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea -CVE-2021-4002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 -CVE-2021-4002 - https://www.openwall.com/lists/oss-security/2021/11/25/1 -CVE-2021-4002 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-4005 - https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff -CVE-2021-40085 - https://launchpad.net/bugs/1939733 -CVE-2021-40091 - https://support.squaredup.com -CVE-2021-40091 - https://support.squaredup.com/hc/en-us/articles/4410656394129-CVE-2021-40091-SSRF-issue -CVE-2021-40092 - https://support.squaredup.com -CVE-2021-40092 - https://support.squaredup.com/hc/en-us/articles/4410635417233-CVE-2021-40092-Stored-cross-site-scripting-Image-tile- -CVE-2021-40093 - https://support.squaredup.com -CVE-2021-40093 - https://support.squaredup.com/hc/en-us/articles/4410635418257-CVE-2021-40093-Stored-cross-site-scripting-Action-Buttons- -CVE-2021-40094 - https://support.squaredup.com -CVE-2021-40094 - https://support.squaredup.com/hc/en-us/articles/4410656395537-CVE-2021-40094-DOM-based-stored-cross-site-scripting -CVE-2021-40095 - https://support.squaredup.com -CVE-2021-40095 - https://support.squaredup.com/hc/en-us/articles/4410635419153-CVE-2021-40095-Reading-arbitrary-files -CVE-2021-40096 - https://support.squaredup.com -CVE-2021-40096 - https://support.squaredup.com/hc/en-us/articles/4410656396817-CVE-2021-40096-Stored-cross-site-scripting-provider-configuration- -CVE-2021-40104 - https://hackerone.com/reports/1102088 -CVE-2021-40142 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2021-40142.pdf -CVE-2021-40142 - https://opcfoundation.org/security-bulletins/ -CVE-2021-40143 - https://support.sonatype.com/hc/en-us/articles/4405941762579 -CVE-2021-40145 - https://github.com/libgd/libgd/issues/700 -CVE-2021-40145 - https://github.com/libgd/libgd/pull/713 -CVE-2021-40149 - http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html -CVE-2021-4015 - https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1 -CVE-2021-40153 - https://github.com/plougher/squashfs-tools/issues/72 -CVE-2021-40154 - https://github.com/Xen1thLabs-AE/CVE-2021-40154 -CVE-2021-4017 - https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871 -CVE-2021-4017 - https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd -CVE-2021-4018 - https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54 -CVE-2021-40180 - https://arxiv.org/pdf/2205.15202.pdf -CVE-2021-40186 - https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186 -CVE-2021-4019 - https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 -CVE-2021-4020 - https://huntr.dev/bounties/9814baa8-7bdd-4e31-a132-d9d15653409e -CVE-2021-40212 - https://a-man-in-the-cookie.blogspot.com -CVE-2021-40212 - https://a-man-in-the-cookie.blogspot.com/2021/08/PotPlayer-Critical-Memory-Access-Violation-Vulnerability.html -CVE-2021-40219 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219 -CVE-2021-40222 - https://github.com/asang17/CVE-2021-RCE -CVE-2021-4026 - https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d -CVE-2021-40279 - https://gist.github.com/aaaahuia/b99596c6de9bd6f60e0ddb7bf0bd13c4 -CVE-2021-4028 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74 -CVE-2021-40280 - https://gist.github.com/aaaahuia/1fd31c1ebcddfe4c95268fa4f31fc312 -CVE-2021-40281 - https://gist.github.com/aaaahuia/583b062b686cdff27554e3c6fa5ac94e -CVE-2021-40282 - https://gist.github.com/aaaahuia/1343e3aa06b031ea621b5701cebcee3e -CVE-2021-40284 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-40285 - https://github.com/danpros/htmly/issues/462 -CVE-2021-40292 - https://github.com/zyx0814/dzzoffice/issues/195 -CVE-2021-40303 - https://www.exploit-db.com/exploits/50097 -CVE-2021-40309 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md -CVE-2021-40309 - https://www.exploit-db.com/exploits/50249 -CVE-2021-40310 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md -CVE-2021-40310 - https://www.youtube.com/watch?v=aPKPUDmmYpc -CVE-2021-4032 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee -CVE-2021-40326 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-4033 - https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7 -CVE-2021-40337 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-40338 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-40339 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-4034 - http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html -CVE-2021-4034 - http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html -CVE-2021-4034 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-40340 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch -CVE-2021-40352 - http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html -CVE-2021-4037 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e -CVE-2021-4037 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848 -CVE-2021-40371 - http://packetstormsecurity.com/files/164621/GridPro-Request-Management-For-Windows-Azure-Pack-2.0.7905-Directory-Traversal.html -CVE-2021-40371 - http://seclists.org/fulldisclosure/2021/Oct/33 -CVE-2021-40376 - https://www.tuv.com/landingpage/en/vulnerability-disclosure/ -CVE-2021-40378 - http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html -CVE-2021-40379 - http://packetstormsecurity.com/files/164026/Compro-Technology-IP-Camera-RTSP-Stream-Disclosure.html -CVE-2021-40380 - http://packetstormsecurity.com/files/164027/Compro-Technology-IP-Camera-Credential-Disclosure.html -CVE-2021-40381 - http://packetstormsecurity.com/files/164031/Compro-Technology-IP-Camera-Stream-Disclosure.html -CVE-2021-40382 - http://packetstormsecurity.com/files/164032/Compro-Technology-IP-Camera-Screenshot-Disclosure.html -CVE-2021-40388 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1399 -CVE-2021-40389 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1400 -CVE-2021-4039 - http://packetstormsecurity.com/files/166752/Zyxel-NWA-1100-NH-Command-Injection.html -CVE-2021-40390 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1401 -CVE-2021-40391 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402 -CVE-2021-40392 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403 -CVE-2021-40393 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 -CVE-2021-40394 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 -CVE-2021-40396 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1408 -CVE-2021-40397 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1409 -CVE-2021-40398 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1411 -CVE-2021-40399 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412 -CVE-2021-40400 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413 -CVE-2021-40401 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415 -CVE-2021-40402 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416 -CVE-2021-40403 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417 -CVE-2021-40404 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1420 -CVE-2021-40405 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1422 -CVE-2021-40406 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1423 -CVE-2021-40407 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 -CVE-2021-40408 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 -CVE-2021-40409 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 -CVE-2021-40410 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 -CVE-2021-40411 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 -CVE-2021-40412 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 -CVE-2021-40413 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 -CVE-2021-40414 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 -CVE-2021-40415 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 -CVE-2021-40416 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 -CVE-2021-40417 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426 -CVE-2021-40418 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427 -CVE-2021-40419 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1428 -CVE-2021-40420 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429 -CVE-2021-40422 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431 -CVE-2021-40423 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1432 -CVE-2021-40424 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 -CVE-2021-40425 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 -CVE-2021-40426 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 -CVE-2021-4043 - https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47 -CVE-2021-40438 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-40438 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-40444 - http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html -CVE-2021-40444 - http://packetstormsecurity.com/files/165214/Microsoft-Office-Word-MSHTML-Remote-Code-Execution.html -CVE-2021-40444 - http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html -CVE-2021-40449 - http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html -CVE-2021-4045 - http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html -CVE-2021-40476 - http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html -CVE-2021-4049 - https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e -CVE-2021-40495 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-40496 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-40497 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-40498 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-40499 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-4050 - https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05 -CVE-2021-40500 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 -CVE-2021-40509 - http://packetstormsecurity.com/files/164045/jforum-2.7.0-Cross-Site-Scripting.html -CVE-2021-40509 - http://seclists.org/fulldisclosure/2021/Sep/13 -CVE-2021-40509 - https://lists.openwall.net/full-disclosure/2021/09/03/7 -CVE-2021-40510 - https://www.cyberiskvision.com/advisory/ -CVE-2021-40511 - https://www.cyberiskvision.com/advisory/ -CVE-2021-40528 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 -CVE-2021-40529 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 -CVE-2021-40530 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 -CVE-2021-40531 - https://jonpalmisc.com/2021/11/22/cve-2021-40531 -CVE-2021-40539 - http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html -CVE-2021-40539 - https://www.manageengine.com -CVE-2021-40540 - http://packetstormsecurity.com/files/164152/Ulfius-Web-Framework-Remote-Memory-Corruption.html -CVE-2021-40546 - https://github.com/doudoudedi/buffer_overflow/blob/main/Tenda%20AC6%20V4.0-Denial%20of%20Service%20Vulnerability.md -CVE-2021-40555 - https://github.com/flatCore/flatCore-CMS/issues/56 -CVE-2021-40556 - https://x1ng.top/2021/10/14/ASUS%E6%A0%88%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ -CVE-2021-40559 - https://github.com/gpac/gpac/issues/1886 -CVE-2021-40562 - https://github.com/gpac/gpac/issues/1901 -CVE-2021-40563 - https://github.com/gpac/gpac/issues/1892 -CVE-2021-40564 - https://github.com/gpac/gpac/issues/1898 -CVE-2021-40565 - https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b -CVE-2021-40565 - https://github.com/gpac/gpac/issues/1902 -CVE-2021-40566 - https://github.com/gpac/gpac/issues/1887 -CVE-2021-40567 - https://github.com/gpac/gpac/issues/1889 -CVE-2021-40568 - https://github.com/gpac/gpac/issues/1900 -CVE-2021-40569 - https://github.com/gpac/gpac/issues/1890 -CVE-2021-4057 - http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html -CVE-2021-40570 - https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302 -CVE-2021-40570 - https://github.com/gpac/gpac/issues/1899 -CVE-2021-40571 - https://github.com/gpac/gpac/issues/1895 -CVE-2021-40572 - https://github.com/gpac/gpac/issues/1893 -CVE-2021-40573 - https://github.com/gpac/gpac/issues/1891 -CVE-2021-40574 - https://github.com/gpac/gpac/issues/1897 -CVE-2021-40575 - https://github.com/gpac/gpac/issues/1905 -CVE-2021-40576 - https://github.com/gpac/gpac/issues/1904 -CVE-2021-40577 - http://packetstormsecurity.com/files/165106/Online-Enrollment-Management-System-In-PHP-And-PayPal-1.0-Cross-Site-Scripting.html -CVE-2021-40577 - https://medium.com/@J03KR/cve-2021-40577-ec96a831ba71 -CVE-2021-40578 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System -CVE-2021-40595 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-03 -CVE-2021-40596 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07 -CVE-2021-40606 - https://github.com/gpac/gpac/issues/1885 -CVE-2021-40607 - https://github.com/gpac/gpac/issues/1879 -CVE-2021-40608 - https://github.com/gpac/gpac/issues/1883 -CVE-2021-40609 - https://github.com/gpac/gpac/issues/1894 -CVE-2021-40617 - https://github.com/OS4ED/openSIS-Classic/issues/192 -CVE-2021-40618 - https://github.com/OS4ED/openSIS-Classic/issues/193 -CVE-2021-40639 - https://github.com/jflyfox/jfinal_cms/issues/27 -CVE-2021-40644 - https://github.com/novysodope/VulReq/blob/main/oa_system -CVE-2021-40645 - https://github.com/novysodope/VulReq/blob/main/JFinalOA -CVE-2021-40651 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md -CVE-2021-40651 - https://www.exploit-db.com/exploits/50259 -CVE-2021-40651 - https://youtu.be/wFwlbXANRCo -CVE-2021-40654 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-40655 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-40656 - https://github.com/libsixel/libsixel/issues/25 -CVE-2021-40660 - https://github.com/javadelight/delight-nashorn-sandbox/issues/117 -CVE-2021-40661 - https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr -CVE-2021-40662 - https://febinj.medium.com/cve-2021-40662-chamilo-lms-1-11-14-rce-5301bad245d7 -CVE-2021-40663 - https://github.com/janbialostok/deep-assign/issues/1 -CVE-2021-40669 - https://github.com/wuzhicms/wuzhicms/issues/196 -CVE-2021-40670 - https://github.com/wuzhicms/wuzhicms/issues/197 -CVE-2021-40674 - https://github.com/wuzhicms/wuzhicms/issues/198 -CVE-2021-40680 - http://seclists.org/fulldisclosure/2022/Apr/39 -CVE-2021-4069 - https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 -CVE-2021-40690 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-40690 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-4070 - https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877 -CVE-2021-4080 - https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db -CVE-2021-40813 - https://www.exploit-db.com/exploits/50645 -CVE-2021-40814 - https://www.getastra.com/blog/911/plugin-exploit/prestashops-customer-photo-gallery-module-vulnerable-to-sql-injection-attacks/ -CVE-2021-4082 - https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092 -CVE-2021-40822 - https://osgeo-org.atlassian.net/browse/GEOS-10229 -CVE-2021-40822 - https://osgeo-org.atlassian.net/browse/GEOS-10229?focusedCommentId=83508 -CVE-2021-40826 - https://voidsec.com/advisories/cve-2021-40826/ -CVE-2021-40827 - https://voidsec.com/advisories/cve-2021-40827/ -CVE-2021-40828 - https://github.com/aws/aws-iot-device-sdk-python-v2 -CVE-2021-40829 - https://github.com/aws/aws-iot-device-sdk-python-v2 -CVE-2021-4083 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9 -CVE-2021-4083 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-40830 - https://github.com/aws/aws-iot-device-sdk-python-v2 -CVE-2021-40831 - https://github.com/aws/aws-iot-device-sdk-python-v2 -CVE-2021-40835 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-40836 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-40837 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories -CVE-2021-4084 - https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266 -CVE-2021-40845 - http://packetstormsecurity.com/files/164149/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html -CVE-2021-40845 - http://packetstormsecurity.com/files/164160/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html -CVE-2021-40845 - https://github.com/ricardojoserf/CVE-2021-40845 -CVE-2021-40845 - https://ricardojoserf.github.io/CVE-2021-40845/ -CVE-2021-40847 - https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html -CVE-2021-40847 - https://kb.netgear.com/000064039/Security-Advisory-for-Remote-Code-Execution-on-Some-Routers-PSV-2021-0204 -CVE-2021-40856 - http://packetstormsecurity.com/files/165162/Auerswald-COMfortel-1400-2600-3600-IP-2.8F-Authentication-Bypass.html -CVE-2021-40856 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2021-40856 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass -CVE-2021-40857 - http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html -CVE-2021-40857 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-005 -CVE-2021-40857 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2021-40858 - http://packetstormsecurity.com/files/165166/Auerswald-COMpact-8.0B-Arbitrary-File-Disclosure.html -CVE-2021-40858 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-006 -CVE-2021-40858 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2021-40859 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2021-40859 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/-auerswald-compact-multiple-backdoors -CVE-2021-40866 - https://gynvael.coldwind.pl/?id=740 -CVE-2021-40867 - https://gynvael.coldwind.pl/?id=741 -CVE-2021-40868 - http://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html -CVE-2021-40868 - https://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html -CVE-2021-40870 - http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html -CVE-2021-40870 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021 -CVE-2021-40870 - https://wearetradecraft.com/advisories/tc-2021-0002/ -CVE-2021-40875 - http://packetstormsecurity.com/files/164270/Gurock-Testrail-7.2.0.3014-Improper-Access-Control.html -CVE-2021-40875 - https://github.com/SakuraSamuraii/derailed -CVE-2021-4088 - https://kc.mcafee.com/corporate/index?page=content&id=SB10376 -CVE-2021-40888 - https://github.com/projectsend/projectsend/issues/995 -CVE-2021-40889 - https://github.com/boiteasite/cmsuno/issues/19 -CVE-2021-4089 - https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862 -CVE-2021-40903 - https://packetstormsecurity.com/files/164048/Antminer-Monitor-0.5.0-Authentication-Bypass.html -CVE-2021-40903 - https://www.exploit-db.com/exploits/50267 -CVE-2021-40904 - https://github.com/Edgarloyola/CVE-2021-40904 -CVE-2021-40906 - https://github.com/Edgarloyola/CVE-2021-40906 -CVE-2021-40907 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-08-09072021 -CVE-2021-40908 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-09 -CVE-2021-40909 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-10-09102021 -CVE-2021-4092 - https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e -CVE-2021-40940 - https://github.com/monstra-cms/monstra/issues/471 -CVE-2021-40943 - https://github.com/axiomatic-systems/Bento4/issues/643 -CVE-2021-40960 - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/ -CVE-2021-40961 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md -CVE-2021-40961 - https://packetstormsecurity.com/files/161895/CMS-Made-Simple-2.2.15-SQL-Injection.html -CVE-2021-40961 - https://seclists.org/fulldisclosure/2021/Mar/49 -CVE-2021-40961 - https://www.soteritsecurity.com/blog/2023/01/CMS-Made-Simple_CVE-2021-40961.html -CVE-2021-40964 - http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html -CVE-2021-4097 - https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43 -CVE-2021-40978 - https://github.com/nisdn/CVE-2021-40978 -CVE-2021-40978 - https://github.com/nisdn/CVE-2021-40978/issues/1 -CVE-2021-40985 - https://github.com/michaelrsweet/htmldoc/issues/444 -CVE-2021-4103 - https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225 -CVE-2021-41038 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924 -CVE-2021-4104 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4104 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-4104 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41043 - https://github.com/the-tcpdump-group/tcpslice/issues/11 -CVE-2021-41054 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 -CVE-2021-41061 - https://github.com/RIOT-OS/RIOT/issues/16844 -CVE-2021-41063 - https://www.xylem.com -CVE-2021-41063 - https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-aanderaa-psa-2021-003.pdf -CVE-2021-41065 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e -CVE-2021-41066 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e -CVE-2021-41067 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e -CVE-2021-4107 - https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8 -CVE-2021-41072 - https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405 -CVE-2021-41073 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc -CVE-2021-4108 - https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4 -CVE-2021-41090 - https://github.com/grafana/agent/pull/1152 -CVE-2021-41097 - https://github.com/aurelia/path/issues/44 -CVE-2021-41099 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4110 - https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20 -CVE-2021-4111 - https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a -CVE-2021-41110 - https://www.fatalerrors.org/a/analysis-of-the-snakeyaml-deserialization-in-java-security.html -CVE-2021-41116 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ -CVE-2021-41131 - https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr -CVE-2021-41146 - https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430 -CVE-2021-4115 - http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html -CVE-2021-4115 - https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 -CVE-2021-4115 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41150 - https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr -CVE-2021-4116 - https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c -CVE-2021-41164 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41164 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-41164 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41165 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41165 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-41165 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41168 - https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6 -CVE-2021-41171 - https://www.exploit-db.com/docs/50436 -CVE-2021-41172 - https://github.com/AntSword-Store/AS_Redis/issues/1 -CVE-2021-41173 - https://github.com/ethereum/go-ethereum/pull/23801 -CVE-2021-4118 - https://huntr.dev/bounties/31832f0c-e5bb-4552-a12c-542f81f111e6 -CVE-2021-41182 - https://www.drupal.org/sa-contrib-2022-004 -CVE-2021-41182 - https://www.drupal.org/sa-core-2022-002 -CVE-2021-41182 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41182 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41183 - https://www.drupal.org/sa-contrib-2022-004 -CVE-2021-41183 - https://www.drupal.org/sa-core-2022-001 -CVE-2021-41183 - https://www.drupal.org/sa-core-2022-002 -CVE-2021-41183 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41183 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41184 - https://www.drupal.org/sa-core-2022-001 -CVE-2021-41184 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41184 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-4119 - https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca -CVE-2021-4121 - https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d -CVE-2021-4123 - https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba -CVE-2021-4124 - https://huntr.dev/bounties/a6ca142e-60aa-4d6f-b231-5d1bcd1b7190 -CVE-2021-41245 - https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae -CVE-2021-41249 - https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad -CVE-2021-41253 - https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784 -CVE-2021-41256 - https://github.com/nextcloud/news-android/blob/master/security/GHSL-2021-1033_Nextcloud_News_for_Android.md -CVE-2021-41269 - https://github.com/jmrozanec/cron-utils/issues/461 -CVE-2021-41282 - http://packetstormsecurity.com/files/166208/pfSense-2.5.2-Shell-Upload.html -CVE-2021-41282 - https://www.shielder.it/advisories/pfsense-remote-command-execution/ -CVE-2021-41285 - https://github.com/VoidSec/Exploit-Development/blob/master/windows/x64/kernel/crucial_Ballistix_MOD_Utility_v.2.0.2.5/crucial_Ballistix_MOD_Utility_v.2.0.2.5_memory_dump_PoC.cpp -CVE-2021-41285 - https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/ -CVE-2021-41286 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt -CVE-2021-4130 - https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e -CVE-2021-41303 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-4131 - https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43 -CVE-2021-41314 - https://gynvael.coldwind.pl/?id=742 -CVE-2021-41318 - http://packetstormsecurity.com/files/164359/WhatsUpGold-21.0.3-Cross-Site-Scripting.html -CVE-2021-4132 - https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2 -CVE-2021-41322 - https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html -CVE-2021-41322 - https://support.polycom.com/content/support.html -CVE-2021-41323 - https://charonv.net/Pydio-Broken-Access-Control/ -CVE-2021-41324 - https://charonv.net/Pydio-Broken-Access-Control/ -CVE-2021-41325 - https://charonv.net/Pydio-Broken-Access-Control/ -CVE-2021-4133 - https://github.com/keycloak/keycloak/issues/9247 -CVE-2021-4133 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41355 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-4136 - https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938 -CVE-2021-4138 - https://bugzilla.mozilla.org/show_bug.cgi?id=1652612 -CVE-2021-41381 - http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html -CVE-2021-41381 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html -CVE-2021-41381 - http://seclists.org/fulldisclosure/2022/Nov/11 -CVE-2021-41381 - https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC -CVE-2021-41381 - https://www.exploit-db.com/exploits/50371 -CVE-2021-41381 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt -CVE-2021-41382 - http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Improper-Access-Control.html -CVE-2021-41382 - http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Insecure-Direct-Object-Reference.html -CVE-2021-41388 - https://www.netskope.com/company/security-compliance-and-assurance/netskope-security-advisory-nskpsa-2021-002 -CVE-2021-4139 - https://huntr.dev/bounties/6ec59e43-095f-4ba3-8b75-e92250da8e3a -CVE-2021-41390 - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content_17.html -CVE-2021-41391 - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content.html -CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v4.4.11 -CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v5.2.4 -CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v6.2.12 -CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v7.1.1 -CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v4.4.11 -CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v5.2.4 -CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v6.2.12 -CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v7.1.1 -CVE-2021-41395 - https://github.com/gravitational/teleport/releases/tag/v6.2.12 -CVE-2021-41395 - https://github.com/gravitational/teleport/releases/tag/v7.1.1 -CVE-2021-41413 - https://github.com/brackeen/ok-file-formats/issues/20 -CVE-2021-41415 - https://github.com/youranreus/Subscription-Manager/issues/2 -CVE-2021-41419 - https://gist.github.com/Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee/712ac36c8a08e2698e875169442a23a4 -CVE-2021-41426 - https://youtu.be/HL73yOW7YWU?t=540 -CVE-2021-41426 - https://youtu.be/WtcyIVImcwc -CVE-2021-41427 - https://youtu.be/CbWI-JQteRo -CVE-2021-41427 - https://youtu.be/HL73yOW7YWU?t=520 -CVE-2021-4143 - https://huntr.dev/bounties/e67603e6-8497-4ab6-b93a-02c26407d443 -CVE-2021-41441 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-41442 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-41445 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-41456 - https://github.com/gpac/gpac/issues/1911 -CVE-2021-41458 - https://github.com/gpac/gpac/issues/1910 -CVE-2021-41459 - https://github.com/gpac/gpac/issues/1912 -CVE-2021-4146 - https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760 -CVE-2021-41461 - https://github.com/concrete5/concrete5-legacy/issues/2006 -CVE-2021-41462 - https://github.com/concrete5/concrete5-legacy/issues/2006 -CVE-2021-41463 - https://github.com/concrete5/concrete5-legacy/issues/2006 -CVE-2021-41464 - https://github.com/concrete5/concrete5-legacy/issues/2006 -CVE-2021-41465 - https://github.com/concrete5/concrete5-legacy/issues/2006 -CVE-2021-41471 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-12-09162021 -CVE-2021-41472 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/razormist -CVE-2021-41487 - https://www.exploit-db.com/exploits/48528 -CVE-2021-41492 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41492 -CVE-2021-41495 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41496 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41497 - https://github.com/RaRe-Technologies/bounter/issues/47 -CVE-2021-41503 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-41504 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-41506 - https://github.com/Snawoot/hisilicon-dvr-telnet -CVE-2021-41506 - https://github.com/tothi/hs-dvr-telnet -CVE-2021-41506 - https://habr.com/en/post/486856/ -CVE-2021-41511 - http://packetstormsecurity.com/files/164366/Lodging-Reservation-Management-System-1.0-SQL-Injection.html -CVE-2021-41511 - https://github.com/Ni7inSharma/CVE-2021-41511 -CVE-2021-41511 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41511 -CVE-2021-41511 - https://www.exploit-db.com/exploits/50372 -CVE-2021-41524 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-41526 - http://seclists.org/fulldisclosure/2024/Apr/24 -CVE-2021-4154 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b -CVE-2021-4155 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79 -CVE-2021-41550 - https://leostream.com/wp-content/uploads/2018/11/Leostream_release_notes.pdf -CVE-2021-41550 - https://www.leostream.com/resource/leostream-connection-broker-9-0/ -CVE-2021-41551 - https://leostream.com/wp-content/uploads/2018/11/Leostream_release_notes.pdf -CVE-2021-41551 - https://www.leostream.com/resource/leostream-connection-broker-9-0/ -CVE-2021-41553 - https://www.gruppotim.it/redteam -CVE-2021-41554 - https://www.gruppotim.it/redteam -CVE-2021-41555 - https://www.gruppotim.it/redteam -CVE-2021-41556 - https://blog.sonarsource.com/squirrel-vm-sandbox-escape/ -CVE-2021-41557 - http://packetstormsecurity.com/files/165278/Sofico-Miles-RIA-2020.2-Build-127964T-Cross-Site-Scripting.html -CVE-2021-41559 - https://github.com/silverstripe/silverstripe-framework/releases -CVE-2021-4156 - https://github.com/libsndfile/libsndfile/issues/731 -CVE-2021-4157 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-4159 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd -CVE-2021-41591 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing -CVE-2021-41592 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing -CVE-2021-41593 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing -CVE-2021-41594 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2021-41594 - https://www.rsa.com/en-us/company/vulnerability-response-policy -CVE-2021-4160 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4160 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41615 - https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true -CVE-2021-41617 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41617 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-4162 - https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32 -CVE-2021-41634 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -CVE-2021-41635 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -CVE-2021-41636 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -CVE-2021-41637 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -CVE-2021-41638 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -CVE-2021-41639 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -CVE-2021-4164 - https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758 -CVE-2021-41641 - https://github.com/denoland/deno/issues/12152 -CVE-2021-41643 - https://www.exploit-db.com/exploits/50306 -CVE-2021-41644 - https://www.exploit-db.com/exploits/50305 -CVE-2021-41645 - https://www.exploit-db.com/exploits/50308 -CVE-2021-41646 - https://www.exploit-db.com/exploits/50319 -CVE-2021-41647 - http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html -CVE-2021-41647 - https://github.com/MobiusBinary/CVE-2021-41647 -CVE-2021-41647 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 -CVE-2021-41648 - http://packetstormsecurity.com/files/165036/PuneethReddyHC-Online-Shopping-System-Advanced-1.0-SQL-Injection.html -CVE-2021-41648 - https://github.com/MobiusBinary/CVE-2021-41648 -CVE-2021-41648 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41648 -CVE-2021-41649 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41649 -CVE-2021-41651 - https://github.com/MobiusBinary/CVE-2021-41651/ -CVE-2021-41653 - https://k4m1ll0.com/cve-2021-41653.html -CVE-2021-41654 - https://github.com/wuzhicms/wuzhicms/issues/198 -CVE-2021-41657 - https://gist.github.com/rvismit/2b1a10a48104e01f575cc948da69df19 -CVE-2021-41658 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-15-092121 -CVE-2021-41659 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-16-092421 -CVE-2021-4166 - https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 -CVE-2021-41660 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-06-092421 -CVE-2021-41663 - http://minicms.com -CVE-2021-41672 - https://github.com/advisto/peel-shopping/issues/5 -CVE-2021-41674 - https://github.com/janikwehrli1/0dayHunt/blob/main/E-Negosyo-System-SQLi.txt -CVE-2021-41674 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41674 -CVE-2021-41675 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41675 -CVE-2021-41677 - https://github.com/OS4ED/openSIS-Classic/issues/202 -CVE-2021-41678 - https://github.com/OS4ED/openSIS-Classic/issues/203 -CVE-2021-41679 - https://github.com/OS4ED/openSIS-Classic/issues/204 -CVE-2021-4169 - https://huntr.dev/bounties/91bbb411-6502-4dc1-8b59-b31f7d1c1f72 -CVE-2021-41694 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ -CVE-2021-41695 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ -CVE-2021-41696 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ -CVE-2021-41697 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ -CVE-2021-4170 - https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0 -CVE-2021-4171 - https://huntr.dev/bounties/1117f439-133c-4563-afb2-6cd80607bd5c -CVE-2021-41715 - https://github.com/libsixel/libsixel/issues/27 -CVE-2021-41716 - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/ -CVE-2021-41729 - https://github.com/meiko-S/BaiCloud-cms/issues/3 -CVE-2021-4173 - https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766 -CVE-2021-41731 - http://packetstormsecurity.com/files/168384/News247-News-Magazine-1.0-Cross-Site-Scripting.html -CVE-2021-41732 - https://github.com/zeek/zeek/issues/1798 -CVE-2021-41738 - https://medium.com/@rootless724 -CVE-2021-41739 - https://medium.com/@rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a868c695 -CVE-2021-4175 - https://huntr.dev/bounties/8a7d16e0-9a46-4710-a029-c89c33c01528 -CVE-2021-4176 - https://huntr.dev/bounties/8b531ae9-2d36-43ff-af33-4d81acfb2f27 -CVE-2021-41765 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/ -CVE-2021-4177 - https://huntr.dev/bounties/ac641425-1c64-4874-95e7-c7805c72074e -CVE-2021-41771 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41772 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41773 - http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html -CVE-2021-41773 - http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html -CVE-2021-41773 - http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html -CVE-2021-41773 - http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html -CVE-2021-41773 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-41780 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-41781 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-41782 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-41783 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-41784 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-41785 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-4179 - https://huntr.dev/bounties/8df06513-c57d-4a55-9798-0a1f6c153535 -CVE-2021-41794 - https://research.nccgroup.com/2021/10/06/technical-advisory-open5gs-stack-buffer-overflow-during-pfcp-session-establishment-on-upf-cve-2021-41794 -CVE-2021-4181 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4182 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41821 - https://documentation.wazuh.com/current/release-notes/release_4_2_0.html -CVE-2021-41823 - https://pastebin.com/kpx9Nvbf -CVE-2021-41825 - https://0xy37.medium.com/my-first-cve-cve-2021-41825-verint-workforce-optimization-html-injection-6dd450e7f2af -CVE-2021-41826 - http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html -CVE-2021-41827 - https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e -CVE-2021-41828 - https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e -CVE-2021-4183 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4184 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41843 - http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html -CVE-2021-41843 - http://seclists.org/fulldisclosure/2021/Dec/38 -CVE-2021-41843 - https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt -CVE-2021-41843 - https://trovent.io/security-advisory-2109-01 -CVE-2021-41847 - https://grant-rose.com/infinias-access-control-vulnerability/ -CVE-2021-4185 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41861 - https://pikabu.ru/story/konfidentsialnost_polzovateley_telegram_snova_narushena_predstaviteli_messendzhera_trebuyut_ne_raskryivat_podrobnostey_8511495 -CVE-2021-41864 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12 -CVE-2021-41867 - https://www.ihteam.net/advisory/onionshare/ -CVE-2021-41868 - https://www.ihteam.net/advisory/onionshare/ -CVE-2021-4187 - https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e -CVE-2021-41870 - https://f20.be/cves/socomec -CVE-2021-41871 - https://f20.be/cves/socomec -CVE-2021-41878 - http://packetstormsecurity.com/files/164519/i-Panel-Administration-System-2.0-Cross-Site-Scripting.html -CVE-2021-41878 - https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html -CVE-2021-41878 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41878 -CVE-2021-4188 - https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28 -CVE-2021-4190 - https://gitlab.com/wireshark/wireshark/-/issues/17811 -CVE-2021-41916 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ -CVE-2021-41917 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ -CVE-2021-41918 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ -CVE-2021-41919 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ -CVE-2021-4192 - https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22 -CVE-2021-41920 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ -CVE-2021-41928 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921 -CVE-2021-41929 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-19-302021 -CVE-2021-4193 - https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0 -CVE-2021-41930 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821 -CVE-2021-41931 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-20-100121 -CVE-2021-4194 - https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114 -CVE-2021-41943 - https://medium.com/@idema16/how-i-found-a-cve-in-logrhythm-cve-2021-41943-61cef1797cb -CVE-2021-41945 - https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 -CVE-2021-41946 - https://github.com/afaq1337/CVE-2021-41946 -CVE-2021-41947 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41947 -CVE-2021-41950 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/ -CVE-2021-41951 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/ -CVE-2021-41965 - https://www.alexbilz.com/post/2022-05-14-cve-2021-41965/ -CVE-2021-4197 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-41973 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-41987 - https://teamt5.org/en/posts/vulnerability-mikrotik-cve-2021-41987/ -CVE-2021-42006 - https://github.com/gpertea/gclib/issues/11 -CVE-2021-42008 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13 -CVE-2021-42008 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793 -CVE-2021-42013 - http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html -CVE-2021-42013 - http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html -CVE-2021-42013 - http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html -CVE-2021-42013 - http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html -CVE-2021-42013 - http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html -CVE-2021-42013 - http://packetstormsecurity.com/files/167397/Apache-2.4.50-Remote-Code-Execution.html -CVE-2021-42013 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-42013 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-4203 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-42050 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/ -CVE-2021-42051 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/ -CVE-2021-42052 - https://nxnjz.net/2022/08/cve-2021-42052-full-disclosure/ -CVE-2021-42053 - http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html -CVE-2021-42056 - https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056 -CVE-2021-42057 - https://github.com/blacksmithgu/obsidian-dataview/issues/615 -CVE-2021-42063 - http://packetstormsecurity.com/files/166369/SAP-Knowledge-Warehouse-7.50-7.40-7.31-7.30-Cross-Site-Scripting.html -CVE-2021-42063 - http://seclists.org/fulldisclosure/2022/Mar/32 -CVE-2021-42071 - https://www.exploit-db.com/exploits/50098 -CVE-2021-42071 - https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/ -CVE-2021-42077 - http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html -CVE-2021-42077 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt -CVE-2021-42078 - http://seclists.org/fulldisclosure/2021/Nov/24 -CVE-2021-42078 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-049.txt -CVE-2021-4208 - https://wpscan.com/vulnerability/0cf63b44-f709-4ba4-be14-1eea934c2007 -CVE-2021-4209 - https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568 -CVE-2021-42099 - https://www.manageengine.com -CVE-2021-42110 - https://excellium-services.com/cert-xlm-advisory/CVE-2021-42110 -CVE-2021-42112 - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf -CVE-2021-42136 - http://packetstormsecurity.com/files/166723/REDCap-Cross-Site-Scripting.html -CVE-2021-42141 - http://packetstormsecurity.com/files/176625/Contiki-NG-tinyDTLS-Denial-Of-Service.html -CVE-2021-42165 - https://packetstormsecurity.com/files/164333/Mitrastar-GPT-2541GNAC-N1-Privilege-Escalation.html -CVE-2021-42165 - https://www.exploit-db.com/exploits/50351 -CVE-2021-42168 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921 -CVE-2021-42169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-21-100521 -CVE-2021-42169 - https://www.exploit-db.com/exploits/50403 -CVE-2021-42171 - http://packetstormsecurity.com/files/166617/Zenario-CMS-9.0.54156-Remote-Code-Execution.html -CVE-2021-42171 - https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74 -CVE-2021-42192 - https://www.exploit-db.com/exploits/50521 -CVE-2021-42194 - https://github.com/eyoucms/eyoucms/issues/19 -CVE-2021-42195 - https://github.com/matthiaskramm/swftools/issues/174 -CVE-2021-42196 - https://github.com/matthiaskramm/swftools/issues/172 -CVE-2021-42197 - https://github.com/matthiaskramm/swftools/issues/177 -CVE-2021-42198 - https://github.com/matthiaskramm/swftools/issues/168 -CVE-2021-42199 - https://github.com/matthiaskramm/swftools/issues/173 -CVE-2021-42200 - https://github.com/matthiaskramm/swftools/issues/170 -CVE-2021-42201 - https://github.com/matthiaskramm/swftools/issues/175 -CVE-2021-42202 - https://github.com/matthiaskramm/swftools/issues/171 -CVE-2021-42203 - https://github.com/matthiaskramm/swftools/issues/176 -CVE-2021-42204 - https://github.com/matthiaskramm/swftools/issues/169 -CVE-2021-4221 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704422 -CVE-2021-42216 - https://huntr.dev/bounties/419f4e8a-ee15-4f80-bcbf-5c83513515dd -CVE-2021-4222 - https://packetstormsecurity.com/files/160800/ -CVE-2021-4222 - https://wpscan.com/vulnerability/6df5f5b1-f10b-488e-80b3-2c024bbb8c78 -CVE-2021-42220 - https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html -CVE-2021-42220 - https://truedigitalsecurity.com/advisory-summary-2021 -CVE-2021-42223 - https://www.exploit-db.com/exploits/50386 -CVE-2021-42224 - http://packetstormsecurity.com/files/164514/IFSC-Code-Finder-Project-1.0-SQL-Injection.html -CVE-2021-42224 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42224 -CVE-2021-42224 - https://www.exploit-db.com/exploits/50391 -CVE-2021-42230 - https://www.exploit-db.com/exploits/50295 -CVE-2021-42237 - http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html -CVE-2021-42244 - https://github.com/PaquitoSoft/Notimoo/issues/3 -CVE-2021-42245 - https://github.com/flatCore/flatCore-CMS/issues/69 -CVE-2021-4225 - https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md -CVE-2021-4225 - https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd -CVE-2021-42252 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6 -CVE-2021-42252 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96 -CVE-2021-42258 - https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware -CVE-2021-4226 - https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 -CVE-2021-4227 - https://wpscan.com/vulnerability/8d015eba-31dc-44cb-a051-4e95df782b75/ -CVE-2021-4229 - https://github.com/faisalman/ua-parser-js/issues/536 -CVE-2021-4229 - https://vuldb.com/?id.185453 -CVE-2021-4232 - https://vuldb.com/?id.178254 -CVE-2021-42321 - http://packetstormsecurity.com/files/166153/Microsoft-Exchange-Server-Remote-Code-Execution.html -CVE-2021-42321 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html -CVE-2021-42325 - http://packetstormsecurity.com/files/164800/Froxlor-0.10.29.1-SQL-Injection.html -CVE-2021-42325 - https://www.exploit-db.com/exploits/50502 -CVE-2021-42340 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-42340 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-42340 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-42343 - https://docs.dask.org/en/latest/changelog.html -CVE-2021-42362 - http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html -CVE-2021-42369 - https://www.imagicle.com/en/resources/download/ -CVE-2021-42371 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5 -CVE-2021-42372 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p -CVE-2021-42373 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42373 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42374 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42374 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42375 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42375 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42376 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42376 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42377 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42377 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42378 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42378 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42379 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42379 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42380 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42380 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42381 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42381 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42382 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42382 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42383 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42383 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42384 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42384 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42385 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42385 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42386 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -CVE-2021-42386 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -CVE-2021-42392 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4240 - https://huntr.dev/bounties/2-phpservermon/phpservermon/ -CVE-2021-4240 - https://vuldb.com/?id.213717 -CVE-2021-4241 - https://github.com/phpservermon/phpservermon/commit/bb10a5f3c68527c58073258cb12446782d223bc3 -CVE-2021-4241 - https://huntr.dev/bounties/1-phpservermon/phpservermon/ -CVE-2021-4241 - https://vuldb.com/?id.213744 -CVE-2021-4242 - https://blog.csdn.net/qq_44159028/article/details/114590267 -CVE-2021-4242 - https://vuldb.com/?id.214592 -CVE-2021-4243 - https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/ -CVE-2021-4245 - https://github.com/chbrown/rfc6902/pull/76 -CVE-2021-4245 - https://vuldb.com/?id.215883 -CVE-2021-4250 - https://vuldb.com/?id.216207 -CVE-2021-42550 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html -CVE-2021-42550 - http://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2021-42551 - https://www.redguard.ch/advisories/netbiblio_webopac.txt -CVE-2021-42552 - https://it-sec.de/schwachstelle-in-archivista-dms/ -CVE-2021-42556 - https://rasa.com -CVE-2021-42558 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera -CVE-2021-42559 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera -CVE-2021-42560 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42560-Unsafe%20XML%20Parsing-MITRE%20Caldera -CVE-2021-42561 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42561-Command%20Injection%20Via%20the%20Human%20Plugin-MITRE%20Caldera -CVE-2021-42562 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42562-Improper%20Access%20Control-MITRE%20Caldera -CVE-2021-42564 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-057.txt -CVE-2021-42565 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 -CVE-2021-42566 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 -CVE-2021-42568 - https://support.sonatype.com -CVE-2021-42568 - https://support.sonatype.com/hc/en-us/articles/4408801690515-CVE-2021-42568-Nexus-Repository-Manager-3-Incorrect-Access-Control-October-27-2021 -CVE-2021-42575 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-42575 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-42580 - http://packetstormsecurity.com/files/164985/Online-Learning-System-2.0-Remote-Code-Execution.html -CVE-2021-42580 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07 -CVE-2021-42581 - https://github.com/ramda/ramda/pull/3192 -CVE-2021-42584 - https://dev696.github.io/Writeup/ -CVE-2021-42584 - https://github.com/convos-chat/convos/issues/623 -CVE-2021-42585 - https://github.com/LibreDWG/libredwg/issues/351 -CVE-2021-42586 - https://github.com/LibreDWG/libredwg/issues/350 -CVE-2021-42612 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-text-uaf -CVE-2021-42613 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-winhelp-df -CVE-2021-42614 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-info-uaf -CVE-2021-42627 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-42631 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42631 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42631 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42633 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42633 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42633 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42635 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42635 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42635 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42637 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42637 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42637 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42638 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42638 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42638 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42639 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42639 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42639 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-4264 - https://vuldb.com/?id.216464 -CVE-2021-42640 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42640 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42640 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42641 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42641 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42641 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42642 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -CVE-2021-42642 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -CVE-2021-42642 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite -CVE-2021-42643 - https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ -CVE-2021-42644 - https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ -CVE-2021-42646 - http://packetstormsecurity.com/files/167465/WSO2-Management-Console-XML-Injection.html -CVE-2021-42646 - https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1289/ -CVE-2021-42659 - https://github.com/Lyc-heng/routers/blob/main/routers/stack4.md -CVE-2021-42662 - http://packetstormsecurity.com/files/164615/Online-Event-Booking-And-Reservation-System-1.0-Cross-Site-Scripting.html -CVE-2021-42662 - https://github.com/TheHackingRabbi/CVE-2021-42662 -CVE-2021-42662 - https://www.exploit-db.com/exploits/50450 -CVE-2021-42663 - https://github.com/TheHackingRabbi/CVE-2021-42663 -CVE-2021-42664 - http://packetstormsecurity.com/files/164618/Engineers-Online-Portal-1.0-SQL-Injection.html -CVE-2021-42664 - https://github.com/TheHackingRabbi/CVE-2021-42664 -CVE-2021-42664 - https://www.exploit-db.com/exploits/50451 -CVE-2021-42665 - https://github.com/TheHackingRabbi/CVE-2021-42665 -CVE-2021-42665 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42665 -CVE-2021-42665 - https://www.exploit-db.com/exploits/50452 -CVE-2021-42666 - https://github.com/TheHackingRabbi/CVE-2021-42666 -CVE-2021-42666 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321 -CVE-2021-42666 - https://www.exploit-db.com/exploits/50453 -CVE-2021-42667 - https://github.com/TheHackingRabbi/CVE-2021-42667 -CVE-2021-42667 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42667 -CVE-2021-42668 - https://github.com/TheHackingRabbi/CVE-2021-42668 -CVE-2021-42668 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42668 -CVE-2021-42669 - https://github.com/TheHackingRabbi/CVE-2021-42669 -CVE-2021-42669 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671 -CVE-2021-42670 - https://github.com/TheHackingRabbi/CVE-2021-42670 -CVE-2021-42670 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321 -CVE-2021-42671 - https://github.com/TheHackingRabbi/CVE-2021-42671 -CVE-2021-42671 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671 -CVE-2021-42681 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42682 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42683 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42685 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42686 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42687 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42688 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42697 - http://packetstormsecurity.com/files/167018/Akka-HTTP-10.1.14-Denial-Of-Service.html -CVE-2021-42715 - https://github.com/nothings/stb/issues/1224 -CVE-2021-42716 - https://github.com/nothings/stb/issues/1166 -CVE-2021-42716 - https://github.com/nothings/stb/issues/1225 -CVE-2021-42717 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-4273 - https://vuldb.com/?id.216478 -CVE-2021-42739 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-42750 - https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html -CVE-2021-42751 - https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html -CVE-2021-4276 - https://vuldb.com/?id.216746 -CVE-2021-42770 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r32j-xgg3-w2rw -CVE-2021-42771 - https://www.tenable.com/security/research/tra-2021-14 -CVE-2021-42777 - http://burninatorsec.blogspot.com/2022/04/library-rce-object-chaining-cve-2021.html -CVE-2021-4279 - https://github.com/Starcounter-Jack/JSON-Patch/pull/262 -CVE-2021-42794 - https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf -CVE-2021-42840 - http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html -CVE-2021-42847 - http://packetstormsecurity.com/files/172258/ManageEngine-ADAudit-Plus-Remote-Code-Execution.html -CVE-2021-42859 - https://github.com/michaelrsweet/mxml/issues/286 -CVE-2021-42860 - https://github.com/michaelrsweet/mxml/issues/286 -CVE-2021-42863 - https://github.com/jerryscript-project/jerryscript/issues/4793 -CVE-2021-42870 - https://github.com/xebd/accel-ppp/issues/158 -CVE-2021-42872 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_NoticeUrl_rce4.md -CVE-2021-42875 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_ipdoamin_rce.md -CVE-2021-42877 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_reboot.md -CVE-2021-4288 - https://github.com/openmrs/openmrs-module-referenceapplication/pull/92 -CVE-2021-42884 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicename_rce.md -CVE-2021-42885 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicemac_rce.md -CVE-2021-42886 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md -CVE-2021-42887 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_login_bypass.md -CVE-2021-42888 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_langtype_rce.md -CVE-2021-42889 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_getWiFiApConfig_leak.md -CVE-2021-4289 - https://issues.openmrs.org/browse/RA-1875 -CVE-2021-42890 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_hosttime_rce.md -CVE-2021-42891 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_easywizard_leak.md -CVE-2021-42892 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_telnet_default.md -CVE-2021-42893 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_sysstatus_leak.md -CVE-2021-42897 - https://github.com/FeMiner/wms/issues/12 -CVE-2021-42911 - https://gist.github.com/Cossack9989/e9c1c2d2e69b773ca4251acdd77f2835 -CVE-2021-42912 - https://medium.com/@windsormoreira/fiberhome-an5506-os-command-injection-cve-2021-42912-10b64fd10ce2 -CVE-2021-42913 - https://medium.com/@windsormoreira/samsung-printer-scx-6x55x-improper-access-control-cve-2021-42913-bd50837e5e9a -CVE-2021-42913 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-42917 - https://github.com/xbmc/xbmc/issues/20305 -CVE-2021-42917 - https://github.com/xbmc/xbmc/pull/20306 -CVE-2021-42940 - https://truedigitalsecurity.com/services/penetration-testing-services/advisory-summary-2.2022-cve-2021-42940 -CVE-2021-42943 - https://devbrain.com.br/index.php/2022/05/16/cve-2021-42943/ -CVE-2021-42950 - http://zepl.com -CVE-2021-42951 - http://algorithmia.com -CVE-2021-42952 - http://zepl.com -CVE-2021-42954 - https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51 -CVE-2021-42955 - https://medium.com/nestedif/vulnerability-disclosure-improper-acl-unauthorized-password-reset-zoho-r-a-p-62efcdceb7a6 -CVE-2021-42970 - https://github.com/cbkhwx/cxuucmsv3/issues/8 -CVE-2021-42972 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42973 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42976 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42977 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42979 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42980 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42983 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42986 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42987 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42988 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42990 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42993 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42994 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-42996 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43000 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43002 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43003 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43006 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43009 - http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html -CVE-2021-43009 - https://www.exploit-db.com/exploits/50857 -CVE-2021-43032 - https://github.com/SakuraSamuraii/CVE-2021-43032 -CVE-2021-43033 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43033 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43033 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43034 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43034 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43034 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43035 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43035 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43035 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43036 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43036 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43036 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43037 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43037 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43037 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43038 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43038 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43038 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43039 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43039 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43039 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43040 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43040 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43040 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43041 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43041 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43041 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43042 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43042 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43042 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43043 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43043 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43043 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-43044 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 -CVE-2021-43044 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -CVE-2021-43044 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -CVE-2021-4305 - https://vuldb.com/?id.217448 -CVE-2021-43056 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 -CVE-2021-43057 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8 -CVE-2021-43057 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7 -CVE-2021-43062 - http://packetstormsecurity.com/files/166055/Fortinet-Fortimail-7.0.1-Cross-Site-Scripting.html -CVE-2021-43065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8wx4-g5p9-348h -CVE-2021-4307 - https://github.com/Yomguithereal/baobab/pull/511 -CVE-2021-4308 - https://github.com/WebPA/WebPA/commit/8836c4f549181e885a68e0e7ca561fdbcbd04bf0 -CVE-2021-43091 - https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/ -CVE-2021-43094 - https://issues.openmrs.org/browse/TRUNK-6043 -CVE-2021-43097 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43098 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43099 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43100 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43101 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43102 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43103 - https://github.com/diyhi/bbs/issues/51 -CVE-2021-43109 - https://github.com/PuneethReddyHC/online-shopping-system/issues/17 -CVE-2021-43110 - https://github.com/PuneethReddyHC/online-shopping-system/issues/17 -CVE-2021-43113 - https://pastebin.com/BXnkY9YY -CVE-2021-43116 - http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html -CVE-2021-43118 - https://gist.github.com/Cossack9989/6034c077f46e4f06d0992e9f2fae7f26 -CVE-2021-43129 - https://github.com/Skotizo/CVE-2021-43129 -CVE-2021-43130 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43130 -CVE-2021-43130 - https://www.exploit-db.com/exploits/50158 -CVE-2021-43136 - http://packetstormsecurity.com/files/164930/FormaLMS-2.4.4-Authentication-Bypass.html -CVE-2021-43136 - https://blog.hacktivesecurity.com -CVE-2021-43136 - https://blog.hacktivesecurity.com/index.php/2021/10/05/cve-2021-43136-formalms-the-evil-default-value-that-leads-to-authentication-bypass/ -CVE-2021-43137 - https://www.exploit-db.com/exploits/50461 -CVE-2021-43140 - http://packetstormsecurity.com/files/164968/Simple-Subscription-Website-1.0-SQL-Injection.html -CVE-2021-43140 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43140 -CVE-2021-43141 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43141 -CVE-2021-43142 - https://novysodope.github.io/2021/10/29/64/ -CVE-2021-4315 - https://vuldb.com/?id.219676 -CVE-2021-43155 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18 -CVE-2021-43156 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19 -CVE-2021-43157 - https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1 -CVE-2021-43158 - https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2 -CVE-2021-43159 - http://ruijie.com -CVE-2021-43160 - http://ruijie.com -CVE-2021-43161 - http://ruijie.com -CVE-2021-43162 - http://ruijie.com -CVE-2021-43163 - http://ruijie.com -CVE-2021-43164 - http://packetstormsecurity.com/files/167099/Ruijie-Reyee-Mesh-Router-Remote-Code-Execution.html -CVE-2021-43164 - http://ruijie.com -CVE-2021-43257 - https://www.mantisbt.org/bugs/view.php?id=29130 -CVE-2021-43267 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16 -CVE-2021-4328 - https://hammerking.top/index.php/archives/104/ -CVE-2021-43282 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ -CVE-2021-43283 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ -CVE-2021-43284 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ -CVE-2021-43286 - https://blog.sonarsource.com/gocd-vulnerability-chain -CVE-2021-43288 - https://blog.sonarsource.com/gocd-vulnerability-chain -CVE-2021-43289 - https://blog.sonarsource.com/gocd-vulnerability-chain -CVE-2021-43290 - https://blog.sonarsource.com/gocd-vulnerability-chain -CVE-2021-43293 - https://support.sonatype.com/hc/en-us/articles/4409326330003 -CVE-2021-43306 - https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/ -CVE-2021-43307 - https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/ -CVE-2021-43308 - https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/ -CVE-2021-43309 - https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ -CVE-2021-43311 - https://github.com/upx/upx/issues/380 -CVE-2021-43312 - https://github.com/upx/upx/issues/379 -CVE-2021-43313 - https://github.com/upx/upx/issues/378 -CVE-2021-43314 - https://github.com/upx/upx/issues/380 -CVE-2021-43315 - https://github.com/upx/upx/issues/380 -CVE-2021-43316 - https://github.com/upx/upx/issues/381 -CVE-2021-43317 - https://github.com/upx/upx/issues/380 -CVE-2021-43326 - http://packetstormsecurity.com/files/165449/Automox-Agent-32-Local-Privilege-Escalation.html -CVE-2021-43329 - https://cxsecurity.com/issue/WLB-2021110057 -CVE-2021-43329 - https://packetstormsecurity.com/files/164947/Mumara-Classic-2.93-SQL-Injection.html -CVE-2021-43329 - https://packetstormsecurity.com/files/164947/mumaraclassic293-sql.txt -CVE-2021-43329 - https://vulners.com/zdt/1337DAY-ID-37036 -CVE-2021-43329 - https://www.cyberdetails.org/2021/11/mumara-classic-293-sql-injection.html -CVE-2021-43329 - https://www.exploit-db.com/exploits/50518 -CVE-2021-43329 - https://www.gen.net.uk/about-us/news/50-exploit-db/18335-webapps-mumara-classic-293-license-sql-injection-unauthenticated -CVE-2021-43334 - https://www.cygenta.co.uk/post/buddyboss -CVE-2021-43339 - https://www.exploit-db.com/exploits/50468 -CVE-2021-43339 - https://www.exploit-db.com/exploits/50469 -CVE-2021-43389 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 -CVE-2021-43389 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d -CVE-2021-43389 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-43395 - https://jgardner100.wordpress.com/2022/01/20/security-heads-up/ -CVE-2021-43395 - https://kebe.com/blog/?p=505 -CVE-2021-43395 - https://www.illumos.org/issues/14424 -CVE-2021-43395 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-43396 - https://sourceware.org/bugzilla/show_bug.cgi?id=28524 -CVE-2021-43396 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-43397 - http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html -CVE-2021-43399 - https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ -CVE-2021-43405 - http://packetstormsecurity.com/files/164795/FusionPBX-4.5.29-Remote-Code-Execution.html -CVE-2021-43409 - https://appcheck-ng.com/wordpress-microsoft-office-365-azure-ad-login-persistent-cross-site-scripting/ -CVE-2021-43409 - https://www.wpo365.com/change-log/ -CVE-2021-43419 - https://www.youtube.com/watch?v=HJUj3PgH7Ag -CVE-2021-43429 - https://github.com/Seagate/cortx-s3server/issues/1037 -CVE-2021-43436 - https://medium.com/@mayhem7999/cve-2021-43436-56dc43aeac81 -CVE-2021-43437 - https://medium.com/@mayhem7999/cve-2021-43437-5c5e3b977e84 -CVE-2021-43439 - https://medium.com/@mayhem7999/cve-2021-43439-79c8ff1801fc -CVE-2021-43440 - https://medium.com/@mayhem7999/cve-2021-43439-d04781bca6ce -CVE-2021-43441 - https://medium.com/@mayhem7999/cve-2021-43441-2fcc857cb6bb -CVE-2021-43442 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5688.php -CVE-2021-43444 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -CVE-2021-43445 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -CVE-2021-43446 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -CVE-2021-43447 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -CVE-2021-43448 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -CVE-2021-43449 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -CVE-2021-43451 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection -CVE-2021-43451 - https://www.exploit-db.com/exploits/50467 -CVE-2021-43453 - https://github.com/jerryscript-project/jerryscript/issues/4754 -CVE-2021-43454 - https://www.exploit-db.com/exploits/49549 -CVE-2021-43455 - https://www.exploit-db.com/exploits/49630 -CVE-2021-43456 - https://www.exploit-db.com/exploits/49203 -CVE-2021-43457 - https://www.exploit-db.com/exploits/49632 -CVE-2021-43458 - https://www.exploit-db.com/exploits/49641 -CVE-2021-43459 - https://www.exploit-db.com/exploits/49254 -CVE-2021-43460 - https://www.exploit-db.com/exploits/49248 -CVE-2021-43461 - https://www.exploit-db.com/exploits/49253 -CVE-2021-43462 - https://www.exploit-db.com/exploits/49255 -CVE-2021-43463 - https://www.exploit-db.com/exploits/49706 -CVE-2021-43474 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-43481 - http://packetstormsecurity.com/files/167026/WebTareas-2.4-SQL-Injection.html -CVE-2021-43481 - https://behradtaher.dev/2021/11/05/Discovering-a-Blind-SQL-Injection-Whitebox-Approach/ -CVE-2021-43484 - https://www.exploit-db.com/exploits/50094 -CVE-2021-43492 - https://github.com/AlquistManager/alquist/issues/42 -CVE-2021-43493 - https://github.com/cksgf/ServerManagement/issues/21 -CVE-2021-43495 - https://github.com/AlquistManager/alquist/issues/43 -CVE-2021-43496 - https://github.com/varun-suresh/Clustering/issues/12 -CVE-2021-43498 - https://packetstormsecurity.com/files/157563/ATutor-LMS-2.2.4-Weak-Password-Reset-Hash.html -CVE-2021-43505 - https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/xss.txt -CVE-2021-43506 - https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/sql.txt -CVE-2021-43509 - https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43509 -CVE-2021-43509 - https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26 -CVE-2021-43510 - https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43510 -CVE-2021-43510 - https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26 -CVE-2021-43512 - https://medium.com/@janmejayaswainofficial/advisory-of-cve-2021-43512-5e54e6a93101 -CVE-2021-43517 - https://habr.com/ru/post/486856/ -CVE-2021-43527 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-43530 - https://bugzilla.mozilla.org/show_bug.cgi?id=1736886 -CVE-2021-43532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 -CVE-2021-43536 - https://bugzilla.mozilla.org/show_bug.cgi?id=1730120 -CVE-2021-43537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1738237 -CVE-2021-43538 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739091 -CVE-2021-43540 - https://bugzilla.mozilla.org/show_bug.cgi?id=1636629 -CVE-2021-43544 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739934 -CVE-2021-43566 - https://bugzilla.samba.org/show_bug.cgi?id=13979 -CVE-2021-43566 - https://www.samba.org/samba/security/CVE-2021-43566.html -CVE-2021-43568 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ -CVE-2021-43569 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ -CVE-2021-43570 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ -CVE-2021-43571 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ -CVE-2021-43572 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ -CVE-2021-43574 - https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e -CVE-2021-43575 - https://github.com/robertguetzkow/ets5-password-recovery -CVE-2021-43579 - https://github.com/michaelrsweet/htmldoc/issues/453 -CVE-2021-43579 - https://github.com/michaelrsweet/htmldoc/issues/456 -CVE-2021-4360 - https://wpscan.com/vulnerability/5ddc0a9d-c081-4bef-aa87-3b10d037379c -CVE-2021-43609 - https://github.com/d5sec/CVE-2021-43609-POC -CVE-2021-43609 - https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe -CVE-2021-43616 - https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0 -CVE-2021-43628 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2 -CVE-2021-43629 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3 -CVE-2021-43630 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4 -CVE-2021-43631 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5 -CVE-2021-43633 - https://medium.com/@shaunwhorton/how-i-found-two-different-xss-vulnerabilities-a491144e8494 -CVE-2021-43637 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43638 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -CVE-2021-43650 - https://www.exploit-db.com/exploits/50542 -CVE-2021-43657 - https://github.com/c0n5n3d/CVE-2021-43657/blob/main/Info.txt -CVE-2021-43683 - https://github.com/HaschekSolutions/pictshare/issues/133 -CVE-2021-43691 - https://github.com/toocool/tripexpress/issues/40 -CVE-2021-43700 - https://github.com/gongwalker/ApiManager/issues/26 -CVE-2021-43701 - http://packetstormsecurity.com/files/166535/CSZ-CMS-1.2.9-SQL-Injection.html -CVE-2021-43701 - https://github.com/cskaza/cszcms/issues/31 -CVE-2021-43701 - https://www.exploit-db.com/exploits/50846 -CVE-2021-43702 - https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch -CVE-2021-43708 - https://medium.com/@way2goraj/bypass-data-classification-labelling-tool-aa037ff86dee -CVE-2021-43711 - https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md -CVE-2021-43722 - https://github.com/luqiut/iot/blob/main/DIR-645%20Stack%20overflow.md -CVE-2021-43722 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-43724 - https://github.com/intelliants/subrion/issues/890 -CVE-2021-43728 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -CVE-2021-43729 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -CVE-2021-43734 - https://github.com/kekingcn/kkFileView/issues/304 -CVE-2021-43737 - https://github.com/hiliqi/xiaohuanxiong/issues/28 -CVE-2021-43738 - https://github.com/hiliqi/xiaohuanxiong/issues/28 -CVE-2021-43741 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43741 -CVE-2021-43742 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43742 -CVE-2021-4377 - https://wpscan.com/vulnerability/36afc442-9634-498e-961e-4c935880cd2b -CVE-2021-43778 - https://github.com/hansmach1ne/MyExploits/tree/main/Path%20Traversal%20in%20GLPI%20Barcode%20plugin -CVE-2021-43779 - https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin -CVE-2021-43797 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-43797 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-43798 - http://packetstormsecurity.com/files/165198/Grafana-Arbitrary-File-Reading.html -CVE-2021-43798 - http://packetstormsecurity.com/files/165221/Grafana-8.3.0-Directory-Traversal-Arbitrary-File-Read.html -CVE-2021-43802 - https://github.com/ether/etherpad-lite/releases/tag/1.8.16 -CVE-2021-43809 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ -CVE-2021-43818 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-43818 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-43828 - https://huntr.dev/bounties/fe6248f1-603d-43df-816c-c75534a56f72 -CVE-2021-43829 - https://huntr.dev/bounties/17324785-f83a-4058-ac40-03f2bfa16399/ -CVE-2021-43837 - https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ -CVE-2021-43847 - https://huntr.dev/bounties/943dad83-f0ed-4c74-ba81-7dfce7ca0ef2/ -CVE-2021-43857 - http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html -CVE-2021-43859 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-43859 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-43862 - https://github.com/jcubic/jquery.terminal/issues/727 -CVE-2021-43863 - https://github.com/nextcloud/android/security/advisories/GHSA-vjp2-f63v-w479 -CVE-2021-43890 - https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks/ -CVE-2021-43893 - http://packetstormsecurity.com/files/165560/Microsoft-Windows-EFSRPC-Arbitrary-File-Upload-Privilege-Escalation.html -CVE-2021-43936 - http://packetstormsecurity.com/files/165252/WebHMI-4.0-Remote-Code-Execution.html -CVE-2021-43960 - https://www.surecloud.com/resources/blog/lorensbergs-connect2-cross-site-scripting -CVE-2021-43961 - https://support.sonatype.com/hc/en-us/articles/4412183372307 -CVE-2021-43969 - https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/ -CVE-2021-43970 - https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/ -CVE-2021-43971 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md -CVE-2021-43972 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md -CVE-2021-43973 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md -CVE-2021-43974 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md -CVE-2021-43976 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-43979 - https://github.com/hkerma/opa-gatekeeper-concurrency-issue -CVE-2021-43991 - https://appcheck-ng.com/persistent-xss-kentico-cms/ -CVE-2021-44032 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md -CVE-2021-44033 - http://packetstormsecurity.com/files/165027/Ionic-Identity-Vault-5.0.4-PIN-Unlock-Lockout-Bypass.html -CVE-2021-44035 - https://www.wolterskluwer.com/en/solutions/teammate -CVE-2021-44036 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-059.txt -CVE-2021-44037 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-060.txt -CVE-2021-44041 - https://docs.uipath.com/robot/docs/release-notes-2021-10-4 -CVE-2021-44041 - https://docs.uipath.com/robot/docs/uipath-assistant -CVE-2021-44042 - https://docs.uipath.com/robot/docs/release-notes-2021-10-4 -CVE-2021-44042 - https://docs.uipath.com/robot/docs/uipath-assistant -CVE-2021-44043 - https://docs.uipath.com/apps/v2021.10/docs/2021-10-1 -CVE-2021-44043 - https://docs.uipath.com/robot/docs/uipath-assistant -CVE-2021-44049 - https://hencohen10.medium.com/cyberark-endpoint-manager-local-privilege-escalation-cve-2021-44049-67cd5e62c3d2 -CVE-2021-44076 - https://labs.nettitude.com/blog/cve-2021-44076-cross-site-scripting-xss-in-crushftp/ -CVE-2021-44077 - http://packetstormsecurity.com/files/165400/ManageEngine-ServiceDesk-Plus-Remote-Code-Execution.html -CVE-2021-44080 - https://research.nccgroup.com/2022/05/24/technical-advisory-sercomm-h500s-authenticated-remote-command-execution-cve-2021-44080/ -CVE-2021-44087 - https://www.exploit-db.com/exploits/50801 -CVE-2021-44087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip -CVE-2021-44088 - https://www.exploit-db.com/exploits/50802 -CVE-2021-44088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip -CVE-2021-44091 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Multi%20Restaurant%20Table%20Reservation%20System -CVE-2021-44092 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/code-projects/Pharmacy-Management -CVE-2021-44095 - https://medium.com/@shubhamvpandey/cve-2021-44095-481059d14470 -CVE-2021-44097 - https://medium.com/@shubhamvpandey/cve-2021-44097-d51c11258571 -CVE-2021-44098 - https://medium.com/@shubhamvpandey/cve-2021-44098-8dbaced8b854 -CVE-2021-44103 - https://www.exploit-db.com/exploits/50521 -CVE-2021-44108 - https://github.com/open5gs/open5gs/issues/1247 -CVE-2021-44109 - https://github.com/open5gs/open5gs/issues/1247 -CVE-2021-44111 - https://github.com/s-cart/s-cart/issues/102 -CVE-2021-44114 - https://medium.com/@mayhem7999/cve-2021-44114-957145c1773 -CVE-2021-44117 - https://github.com/warmachine-57/CVE-2021-44117/blob/main/CSRF%20in%20FuelCMS -CVE-2021-44127 - https://github.com/tgp-top/DAP-1360/blob/main/README.md -CVE-2021-44127 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-44142 - https://bugzilla.samba.org/show_bug.cgi?id=14914 -CVE-2021-44151 - http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html -CVE-2021-44152 - http://packetstormsecurity.com/files/165186/Reprise-License-Manager-14.2-Unauthenticated-Password-Change.html -CVE-2021-44153 - http://packetstormsecurity.com/files/165194/Reprise-License-Manager-14.2-Remote-Binary-Execution.html -CVE-2021-44154 - http://packetstormsecurity.com/files/165193/Reprise-License-Manager-14.2-Buffer-Overflow.html -CVE-2021-44155 - http://packetstormsecurity.com/files/165182/Reprise-License-Manager-14.2-User-Enumeration.html -CVE-2021-44208 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -CVE-2021-44209 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -CVE-2021-44210 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -CVE-2021-44211 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -CVE-2021-44212 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -CVE-2021-44213 - https://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -CVE-2021-44223 - https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-update-can-get-you-pwned/ -CVE-2021-44224 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44224 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-44226 - http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html -CVE-2021-44226 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html -CVE-2021-44226 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html -CVE-2021-44226 - http://seclists.org/fulldisclosure/2022/Mar/51 -CVE-2021-44226 - http://seclists.org/fulldisclosure/2023/Jan/26 -CVE-2021-44226 - http://seclists.org/fulldisclosure/2023/Sep/6 -CVE-2021-44226 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt -CVE-2021-44228 - http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html -CVE-2021-44228 - http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html -CVE-2021-44228 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html -CVE-2021-44228 - http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html -CVE-2021-44228 - http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html -CVE-2021-44228 - http://seclists.org/fulldisclosure/2022/Dec/2 -CVE-2021-44228 - http://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2021-44228 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 -CVE-2021-44228 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd -CVE-2021-44228 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44228 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-44244 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Simple-Logistic-Hub-Parcels-Management -CVE-2021-44245 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/unyasoft/CTMS -CVE-2021-44249 - https://www.exploit-db.com/exploits/50429 -CVE-2021-44255 - https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/ -CVE-2021-44259 - https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_second.md -CVE-2021-44260 - https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_first.md -CVE-2021-44261 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_first.md -CVE-2021-44262 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_second.md -CVE-2021-44280 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44280 -CVE-2021-44315 - https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/blob/master/Directory%20listing/Report_Directory%20listing.pdf -CVE-2021-44315 - https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/tree/master/Directory%20listing -CVE-2021-4432 - https://0day.today/exploit/description/36412 -CVE-2021-4432 - https://packetstormsecurity.com/files/163104/PCMan-FTP-Server-2.0.7-Denial-Of-Service.html -CVE-2021-4432 - https://vuldb.com/?id.250719 -CVE-2021-4433 - https://packetstormsecurity.com/files/163138/Sami-HTTP-Server-2.0-Denial-Of-Service.html -CVE-2021-44331 - https://github.com/ARM-software/astc-encoder/issues/294 -CVE-2021-44334 - https://github.com/brackeen/ok-file-formats/issues/12 -CVE-2021-44335 - https://github.com/brackeen/ok-file-formats/issues/17 -CVE-2021-44339 - https://github.com/brackeen/ok-file-formats/issues/15 -CVE-2021-4434 - https://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html -CVE-2021-44340 - https://github.com/brackeen/ok-file-formats/issues/11 -CVE-2021-44342 - https://github.com/brackeen/ok-file-formats/issues/19 -CVE-2021-44343 - https://github.com/brackeen/ok-file-formats/issues/18 -CVE-2021-44347 - https://github.com/yeyinshi/tuzicms/issues/7 -CVE-2021-44348 - https://github.com/yeyinshi/tuzicms/issues/9 -CVE-2021-44349 - https://github.com/yeyinshi/tuzicms/issues/8 -CVE-2021-44352 - https://github.com/zhlu32/cve/blob/main/tenda/Tenda-ac15-buffer-overflow.md -CVE-2021-44354 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44355 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44356 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44357 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44358 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44359 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-4436 - https://wpscan.com/vulnerability/c46ecd0d-a132-4ad6-b936-8acde3a09282/ -CVE-2021-44360 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44361 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44362 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44363 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44364 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44365 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44366 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44367 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44368 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44369 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44370 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44371 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44372 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44373 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44374 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44375 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44376 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44377 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44378 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44379 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44380 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44381 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44382 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44383 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44384 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44385 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44386 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44387 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44388 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44389 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44390 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44391 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44392 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44393 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44394 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44395 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44396 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44397 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44398 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44399 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44400 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44401 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44402 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44403 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44404 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44405 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44406 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44407 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44408 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44409 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44410 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44411 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44412 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44413 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44414 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44415 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44416 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44417 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44418 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44419 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 -CVE-2021-44427 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/328 -CVE-2021-44428 - https://www.exploit-db.com/exploits/50535 -CVE-2021-44429 - https://packetstormsecurity.com/files/165058/Serva-4.4.0-TFTP-Remote-Buffer-Overflow.html -CVE-2021-44444 - http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html -CVE-2021-44460 - https://github.com/odoo/odoo/issues/107685 -CVE-2021-44479 - https://github.com/Xen1thLabs-AE/CVE-2021-40154 -CVE-2021-44521 - https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/ -CVE-2021-44529 - http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html -CVE-2021-44529 - http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html -CVE-2021-44531 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44531 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-44532 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44532 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-44533 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44533 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-44565 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/307 -CVE-2021-44567 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/308 -CVE-2021-44568 - https://github.com/openSUSE/libsolv/issues/425 -CVE-2021-44568 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940 -CVE-2021-44568 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995 -CVE-2021-44586 - https://github.com/qinming99/dst-admin/issues/28 -CVE-2021-44590 - https://github.com/libming/libming/issues/236 -CVE-2021-44591 - https://github.com/libming/libming/issues/235 -CVE-2021-44593 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44593 -CVE-2021-44595 - http://packetstormsecurity.com/files/167036/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html -CVE-2021-44595 - https://medium.com/@tomerp_77017/wondershell-a82372914f26 -CVE-2021-44596 - http://packetstormsecurity.com/files/167035/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html -CVE-2021-44596 - https://medium.com/@tomerp_77017/wondershell-a82372914f26 -CVE-2021-44598 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44598 -CVE-2021-44599 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System -CVE-2021-44600 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS -CVE-2021-44617 - http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html -CVE-2021-44622 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkRegVeriRegister -CVE-2021-44623 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkResetVeriRegister -CVE-2021-44625 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/deviceInfoRegister -CVE-2021-44626 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getRegVeriRegister -CVE-2021-44627 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getResetVeriRegister -CVE-2021-44628 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/loginRegister -CVE-2021-44629 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/registerRegister -CVE-2021-44630 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/modifyAccPwdRegister -CVE-2021-44631 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/resetCloudPwdRegister -CVE-2021-44632 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/upgradeInfoRegister -CVE-2021-44648 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 -CVE-2021-44648 - https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ -CVE-2021-44649 - https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/ -CVE-2021-44651 - https://sahildhar.github.io/blogpost/Zoho-ManageEngine-CloudSecurityPlus-Remote-Code-Execution-via-Security-Misconfiguration/ -CVE-2021-44653 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44653 -CVE-2021-44653 - https://www.exploit-db.com/exploits/50561 -CVE-2021-44655 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44655 -CVE-2021-44655 - https://www.exploit-db.com/exploits/50560 -CVE-2021-44657 - https://github.com/pallets/jinja/issues/549 -CVE-2021-44657 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/ -CVE-2021-44659 - https://youtu.be/WW_a3znugl0 -CVE-2021-44663 - https://riklutz.nl/2021/10/30/unauthenticated-file-upload-to-remote-code-execution-in-xerte/ -CVE-2021-44664 - http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html -CVE-2021-44664 - https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ -CVE-2021-44665 - http://packetstormsecurity.com/files/166181/Xerte-3.10.3-Directory-Traversal.html -CVE-2021-44676 - https://www.manageengine.com -CVE-2021-44684 - https://github.com/dwisiswant0/advisory/issues/5 -CVE-2021-44685 - https://github.com/dwisiswant0/advisory/issues/3 -CVE-2021-44686 - https://bugs.launchpad.net/calibre/+bug/1951979 -CVE-2021-44686 - https://github.com/dwisiswant0/advisory/issues/18 -CVE-2021-44692 - https://www.cygenta.co.uk/post/buddyboss -CVE-2021-44720 - https://kb.pulsesecure.net/?atype=sa -CVE-2021-44730 - http://www.openwall.com/lists/oss-security/2022/02/23/1 -CVE-2021-44731 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html -CVE-2021-44731 - http://www.openwall.com/lists/oss-security/2022/02/23/1 -CVE-2021-44733 - https://github.com/pjlantz/optee-qemu/blob/main/README.md -CVE-2021-44790 - http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html -CVE-2021-44790 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44790 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-44827 - https://Full-Disclosure.eu -CVE-2021-44827 - https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html -CVE-2021-44829 - http://packetstormsecurity.com/files/165684/WebACMS-2.1.0-Cross-Site-Scripting.html -CVE-2021-44829 - http://seclists.org/fulldisclosure/2022/Jan/41 -CVE-2021-44829 - https://blog.to.com/advisory-webacms-2-1-0-cross-site-scripting/ -CVE-2021-44832 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd -CVE-2021-44832 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-44832 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-44832 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-44835 - https://gist.github.com/rntcruz23/199782fb65b7dc3c4492d168770b71e5 -CVE-2021-44848 - http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html -CVE-2021-44864 - https://github.com/zhlu32/cve/blob/main/tplink/wr886n/Tplink-wr886n-V3-Ping-DOS.md -CVE-2021-44868 - https://github.com/ming-soft/MCMS/issues/58 -CVE-2021-44879 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 -CVE-2021-44879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f -CVE-2021-44880 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-44881 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-44882 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-44899 - https://voidsec.com -CVE-2021-44899 - https://voidsec.com/advisories/cve-2021-44899/ -CVE-2021-44900 - https://voidsec.com -CVE-2021-44900 - https://voidsec.com/advisories/cve-2021-44900/ -CVE-2021-44901 - https://voidsec.com -CVE-2021-44901 - https://voidsec.com/advisories/cve-2021-44901/ -CVE-2021-44903 - https://voidsec.com -CVE-2021-44903 - https://voidsec.com/advisories/cve-2021-44903/ -CVE-2021-44906 - https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip -CVE-2021-44906 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764 -CVE-2021-44908 - https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip -CVE-2021-44908 - https://github.com/balderdashy/sails/issues/7209 -CVE-2021-44915 - https://github.com/taogogo/taocms/issues/8 -CVE-2021-44916 - http://packetstormsecurity.com/files/165502/Open-AudIT-Community-4.2.0-Cross-Site-Scripting.html -CVE-2021-44917 - https://sourceforge.net/p/gnuplot/bugs/2358/ -CVE-2021-44918 - https://github.com/gpac/gpac/issues/1968 -CVE-2021-44920 - https://github.com/gpac/gpac/issues/1957 -CVE-2021-44921 - https://github.com/gpac/gpac/issues/1964 -CVE-2021-44922 - https://github.com/gpac/gpac/issues/1969 -CVE-2021-44924 - https://github.com/gpac/gpac/issues/1959 -CVE-2021-44925 - https://github.com/gpac/gpac/issues/1967 -CVE-2021-44942 - https://github.com/glFusion/glfusion/issues/486 -CVE-2021-44956 - https://github.com/rockcarry/ffjpeg/issues/43 -CVE-2021-44957 - https://github.com/rockcarry/ffjpeg/issues/44 -CVE-2021-44964 - http://lua-users.org/lists/lua-l/2021-11/msg00186.html -CVE-2021-44965 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System -CVE-2021-44966 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection-Bypass-Authentication -CVE-2021-44967 - https://github.com/Y1LD1R1M-1337/Limesurvey-RCE -CVE-2021-44967 - https://www.exploit-db.com/exploits/50573 -CVE-2021-44971 - https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md -CVE-2021-44981 - https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server -CVE-2021-44988 - https://github.com/jerryscript-project/jerryscript/issues/4890 -CVE-2021-44988 - https://github.com/jerryscript-project/jerryscript/issues/4891 -CVE-2021-44988 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-44992 - https://github.com/jerryscript-project/jerryscript/issues/4875 -CVE-2021-44992 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-44993 - https://github.com/jerryscript-project/jerryscript/issues/4876 -CVE-2021-44993 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-44994 - https://github.com/jerryscript-project/jerryscript/issues/4894 -CVE-2021-44994 - https://github.com/jerryscript-project/jerryscript/issues/4895 -CVE-2021-44994 - https://security.samsungmobile.com/securityUpdate.smsb -CVE-2021-45010 - http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html -CVE-2021-45010 - https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce/ -CVE-2021-45010 - https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh -CVE-2021-45010 - https://raw.githubusercontent.com/febinrev/tinyfilemanager-2.4.6-exploit/main/exploit.sh -CVE-2021-45010 - https://sploitus.com/exploit?id=1337DAY-ID-37364&utm_source=rss&utm_medium=rss -CVE-2021-45024 - http://asg.com -CVE-2021-45025 - http://asg.com -CVE-2021-45026 - http://asg.com -CVE-2021-45027 - https://www.exploit-db.com/exploits/50599 -CVE-2021-45034 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html -CVE-2021-45034 - http://seclists.org/fulldisclosure/2022/Apr/20 -CVE-2021-45041 - https://github.com/manuelz120/CVE-2021-45041 -CVE-2021-45046 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd -CVE-2021-45046 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-45046 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-45046 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-45078 - https://sourceware.org/bugzilla/show_bug.cgi?id=28694 -CVE-2021-45085 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 -CVE-2021-45086 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 -CVE-2021-45087 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 -CVE-2021-45088 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 -CVE-2021-45092 - http://packetstormsecurity.com/files/166068/Thinfinity-VirtualUI-2.5.41.0-IFRAME-Injection.html -CVE-2021-45098 - https://redmine.openinfosecfoundation.org/issues/4710 -CVE-2021-45099 - https://gist.github.com/Eriner/0872628519f70556d2c26c83439a9f67 -CVE-2021-45105 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd -CVE-2021-45105 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2021-45105 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2021-45105 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-45117 - https://www.youtube.com/watch?v=qv-RBdCaV4k -CVE-2021-45222 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45222 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-029.txt -CVE-2021-45222 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 -CVE-2021-45223 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45223 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-028.txt -CVE-2021-45223 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 -CVE-2021-45224 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45224 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt -CVE-2021-45224 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 -CVE-2021-45225 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45225 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-052.txt -CVE-2021-45225 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 -CVE-2021-45226 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45226 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-051.txt -CVE-2021-45226 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 -CVE-2021-45227 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45227 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-030.txt -CVE-2021-45228 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -CVE-2021-45228 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-031.txt -CVE-2021-45252 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Forum-Discussion-System-1.0 -CVE-2021-45253 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0 -CVE-2021-45255 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website -CVE-2021-45256 - https://bugzilla.nasm.us/show_bug.cgi?id=3392789 -CVE-2021-45257 - https://bugzilla.nasm.us/show_bug.cgi?id=3392790 -CVE-2021-45258 - https://github.com/gpac/gpac/issues/1970 -CVE-2021-45259 - https://github.com/gpac/gpac/issues/1986 -CVE-2021-45260 - https://github.com/gpac/gpac/issues/1979 -CVE-2021-45262 - https://github.com/gpac/gpac/issues/1980 -CVE-2021-45263 - https://github.com/gpac/gpac/issues/1975 -CVE-2021-45267 - https://github.com/gpac/gpac/issues/1965 -CVE-2021-45268 - https://github.com/V1n1v131r4/CSRF-to-RCE-on-Backdrop-CMS -CVE-2021-45268 - https://www.exploit-db.com/exploits/50323 -CVE-2021-45281 - https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box -CVE-2021-45286 - https://github.com/Boomingjacob/ZZCMS2021#readme -CVE-2021-45288 - https://github.com/gpac/gpac/issues/1956 -CVE-2021-45289 - https://github.com/gpac/gpac/issues/1972 -CVE-2021-45291 - https://github.com/gpac/gpac/issues/1955 -CVE-2021-45292 - https://github.com/gpac/gpac/issues/1958 -CVE-2021-45297 - https://github.com/gpac/gpac/issues/1973 -CVE-2021-45330 - https://github.com/go-gitea/gitea/issues/4336 -CVE-2021-45334 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-45334 -CVE-2021-45334 - https://packetstormsecurity.com/files/165272/Online-Thesis-Archiving-System-1.0-SQL-Injection-Cross-Site-Scripting.html -CVE-2021-45334 - https://www.exploit-db.com/exploits/50597 -CVE-2021-45340 - https://github.com/libsixel/libsixel/issues/51 -CVE-2021-45341 - https://github.com/LibreCAD/LibreCAD/issues/1462 -CVE-2021-45342 - https://github.com/LibreCAD/LibreCAD/issues/1464 -CVE-2021-45343 - https://github.com/LibreCAD/LibreCAD/issues/1468 -CVE-2021-45345 - https://gist.github.com/0xHop/0d065694d56ac3943d8e8c239d80c63f -CVE-2021-45346 - https://github.com/guyinatuxedo/sqlite3_record_leaking -CVE-2021-45382 - https://github.com/doudoudedi/D-LINK_Command_Injection1/blob/main/D-LINK_Command_injection.md -CVE-2021-45385 - https://github.com/rockcarry/ffjpeg/issues/47 -CVE-2021-45386 - https://github.com/appneta/tcpreplay/issues/687 -CVE-2021-45387 - https://github.com/appneta/tcpreplay/issues/687 -CVE-2021-45391 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/1 -CVE-2021-45392 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2 -CVE-2021-45401 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf -CVE-2021-45406 - https://www.exploit-db.com/exploits/50659 -CVE-2021-45411 - https://www.exploit-db.com/exploits/49877 -CVE-2021-45414 - http://packetstormsecurity.com/files/166073/Datarobot-Remote-Code-Execution.html -CVE-2021-45416 - https://github.com/86x/CVE-2021-45416 -CVE-2021-45417 - http://www.openwall.com/lists/oss-security/2022/01/20/3 -CVE-2021-45417 - https://www.ipi.fi/pipermail/aide/2022-January/001713.html -CVE-2021-45417 - https://www.openwall.com/lists/oss-security/2022/01/20/3 -CVE-2021-45418 - https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45418.md -CVE-2021-45419 - https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45419.md -CVE-2021-45420 - https://www.swascan.com/emerson -CVE-2021-45421 - https://www.swascan.com/emerson -CVE-2021-45422 - https://seclists.org/fulldisclosure/2022/Jan/31 -CVE-2021-45422 - https://www.getinfosec.news/13202933/reprise-license-manager-142-reflected-cross-site-scripting#/ -CVE-2021-45423 - https://github.com/merces/libpe/issues/35 -CVE-2021-45425 - http://packetstormsecurity.com/files/165439/Safari-Montage-8.5-Cross-Site-Scripting.html -CVE-2021-45427 - https://drive.google.com/file/d/1iusYdheb62dom0DnvAzEiNR-e4EXSf2k/view?usp=sharing -CVE-2021-45428 - http://packetstormsecurity.com/files/167101/TLR-2005KSH-Arbitrary-File-Upload.html -CVE-2021-45429 - https://github.com/VirusTotal/yara/issues/1616 -CVE-2021-45459 - https://github.com/dwisiswant0/advisory/issues/4 -CVE-2021-45461 - https://community.freepbx.org/t/0-day-freepbx-exploit/80092 -CVE-2021-45463 - https://gitlab.gnome.org/GNOME/gegl/-/issues/298 -CVE-2021-45466 - https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/ -CVE-2021-45467 - https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/ -CVE-2021-45469 - https://bugzilla.kernel.org/show_bug.cgi?id=215235 -CVE-2021-45480 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11 -CVE-2021-45481 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-45482 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-45483 - http://www.openwall.com/lists/oss-security/2022/01/21/2 -CVE-2021-45485 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 -CVE-2021-45485 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99 -CVE-2021-45485 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-45486 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4 -CVE-2021-45486 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-45490 - https://packetstormsecurity.com/files/166376/3CX-Client-Missing-TLS-Validation.html -CVE-2021-45491 - http://packetstormsecurity.com/files/166386/3CX-Phone-System-Cleartext-Passwords.html -CVE-2021-45494 - https://kb.netgear.com/000064160/Security-Advisory-for-Arbitrary-File-Read-on-Some-WiFi-Systems-PSV-2021-0044 -CVE-2021-45496 - https://kb.netgear.com/000064529/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2021-0060 -CVE-2021-45497 - https://kb.netgear.com/000064533/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2021-0155 -CVE-2021-45499 - https://kb.netgear.com/000064445/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2019-0027 -CVE-2021-45501 - https://kb.netgear.com/000064532/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2021-0154 -CVE-2021-45502 - https://kb.netgear.com/000064126/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0473 -CVE-2021-45507 - https://kb.netgear.com/000064131/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0487 -CVE-2021-45515 - https://kb.netgear.com/000064484/Security-Advisory-for-Denial-of-Service-on-Some-Extenders-and-WiFi-Systems-PSV-2020-0286 -CVE-2021-45516 - https://kb.netgear.com/000064060/Security-Advisory-for-Denial-of-Service-on-Some-Routers-and-WiFi-Systems-PSV-2019-0115 -CVE-2021-45519 - https://kb.netgear.com/000064158/Security-Advisory-for-Denial-of-Service-on-XR1000-PSV-2021-0033 -CVE-2021-45522 - https://kb.netgear.com/000064155/Security-Advisory-for-Hardcoded-Password-on-XR1000-PSV-2021-0030 -CVE-2021-45523 - https://kb.netgear.com/000064442/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R7000-PSV-2018-0418 -CVE-2021-45524 - https://kb.netgear.com/000064123/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R8000-PSV-2020-0315 -CVE-2021-45526 - https://kb.netgear.com/000064446/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Extenders-PSV-2019-0078 -CVE-2021-45532 - https://kb.netgear.com/000064454/Security-Advisory-for-Post-Authentication-Command-Injection-on-R8000-PSV-2019-0294 -CVE-2021-45535 - https://kb.netgear.com/000064457/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0052 -CVE-2021-45536 - https://kb.netgear.com/000064080/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0056 -CVE-2021-45541 - https://kb.netgear.com/000064479/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0246 -CVE-2021-45542 - https://kb.netgear.com/000064143/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0540 -CVE-2021-45543 - https://kb.netgear.com/000064517/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0541 -CVE-2021-45563 - https://kb.netgear.com/000064084/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0066 -CVE-2021-45567 - https://kb.netgear.com/000064089/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0075 -CVE-2021-45570 - https://kb.netgear.com/000064092/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0078 -CVE-2021-45574 - https://kb.netgear.com/000064096/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0082 -CVE-2021-45576 - https://kb.netgear.com/000064098/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0084 -CVE-2021-45577 - https://kb.netgear.com/000064099/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0085 -CVE-2021-45587 - https://kb.netgear.com/000064109/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0095 -CVE-2021-45590 - https://kb.netgear.com/000064112/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0098 -CVE-2021-45591 - https://kb.netgear.com/000064113/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0099 -CVE-2021-45594 - https://kb.netgear.com/000064475/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0183 -CVE-2021-45607 - https://kb.netgear.com/000064531/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2021-0128 -CVE-2021-45608 - https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/ -CVE-2021-45612 - https://kb.netgear.com/000064515/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0524 -CVE-2021-45614 - https://kb.netgear.com/000064141/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0520 -CVE-2021-45615 - https://kb.netgear.com/000064514/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0521 -CVE-2021-45619 - https://kb.netgear.com/000064492/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0435 -CVE-2021-45631 - https://kb.netgear.com/000064136/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0504 -CVE-2021-45638 - https://kb.netgear.com/000064496/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2020-0464 -CVE-2021-45643 - https://kb.netgear.com/000064159/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2021-0035 -CVE-2021-45653 - https://kb.netgear.com/000064163/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2021-0047 -CVE-2021-45657 - https://kb.netgear.com/000064067/Security-Advisory-for-Server-Side-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2019-0141 -CVE-2021-45658 - https://kb.netgear.com/000064062/Security-Advisory-for-Server-Side-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2019-0125 -CVE-2021-45659 - https://kb.netgear.com/000064063/Security-Advisory-for-Server-Side-Injection-on-Some-WiFi-Systems-PSV-2019-0126 -CVE-2021-45664 - https://kb.netgear.com/000064076/Security-Advisory-for-Stored-Cross-Site-Scripting-on-R7000-PSV-2020-0011 -CVE-2021-45667 - https://kb.netgear.com/000064481/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0256 -CVE-2021-45670 - https://kb.netgear.com/000064480/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0255 -CVE-2021-45679 - https://kb.netgear.com/000064528/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-PSV-2021-0043 -CVE-2021-45760 - https://github.com/gpac/gpac/issues/1966 -CVE-2021-45761 - https://github.com/Boyan-MILANOV/ropium/issues/32 -CVE-2021-45762 - https://github.com/gpac/gpac/issues/1978 -CVE-2021-45763 - https://github.com/gpac/gpac/issues/1974 -CVE-2021-45764 - https://github.com/gpac/gpac/issues/1971 -CVE-2021-45767 - https://github.com/gpac/gpac/issues/1982 -CVE-2021-45769 - https://github.com/mz-automation/libiec61850/issues/368 -CVE-2021-45783 - http://packetstormsecurity.com/files/167016/Bookeen-Notea-BK_R_1.0.5_20210608-Directory-Traversal.html -CVE-2021-45786 - https://github.com/magicblack/maccms10/issues/747 -CVE-2021-45802 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#file-cve-2021-45802-md -CVE-2021-45803 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-45803 -CVE-2021-45811 - https://members.backbox.org/osticket-sql-injection/ -CVE-2021-45812 - https://drive.google.com/drive/folders/18YCKzFnS5CZRmzgcwc8g7jvLpmqgy68B?usp=sharing -CVE-2021-45814 - http://packetstormsecurity.com/files/165438/Nettmp-NNT-5.1-SQL-Injection.html -CVE-2021-45821 - https://emaragkos.gr/infosec-adventures/xbtit-3-1-sql-njection/ -CVE-2021-45821 - https://github.com/btiteam/xbtit-3.1/issues/6 -CVE-2021-45822 - https://emaragkos.gr/infosec-adventures/xbtit-3-1-xss-stored-amp-reflected/ -CVE-2021-45822 - https://github.com/btiteam/xbtit-3.1/issues/7 -CVE-2021-45829 - https://github.com/HDFGroup/hdf5/issues/1317 -CVE-2021-45830 - https://github.com/HDFGroup/hdf5/issues/1314 -CVE-2021-45832 - https://github.com/HDFGroup/hdf5/issues/1315 -CVE-2021-45833 - https://github.com/HDFGroup/hdf5/issues/1313 -CVE-2021-45835 - https://www.exploit-db.com/exploits/50623 -CVE-2021-45837 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html -CVE-2021-45839 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html -CVE-2021-45841 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html -CVE-2021-45843 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/glfusion/XSS-Reflected -CVE-2021-45844 - https://forum.freecadweb.org/viewtopic.php?t=64733 -CVE-2021-45844 - https://tracker.freecad.org/view.php?id=4809 -CVE-2021-45846 - https://github.com/slic3r/Slic3r/issues/5117 -CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5118 -CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5119 -CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5120 -CVE-2021-45851 - https://www.youtube.com/watch?v=JE1Kcq3iJpc -CVE-2021-45856 - https://packetstormsecurity.com/files/165392/Accu-Time-Systems-MAXIMUS-1.0-Buffer-Overflow-Denial-Of-Service.html -CVE-2021-45860 - https://github.com/justdan96/tsMuxer/issues/510 -CVE-2021-45861 - https://github.com/justdan96/tsMuxer/issues/478 -CVE-2021-45863 - https://github.com/justdan96/tsMuxer/issues/509 -CVE-2021-45864 - https://github.com/justdan96/tsMuxer/issues/476 -CVE-2021-45868 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3 -CVE-2021-45868 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050 -CVE-2021-45868 - https://www.openwall.com/lists/oss-security/2022/03/17/1 -CVE-2021-45868 - https://www.openwall.com/lists/oss-security/2022/03/17/2 -CVE-2021-45876 - https://github.com/delikely/advisory/tree/main/GARO -CVE-2021-45877 - https://github.com/delikely/advisory/tree/main/GARO -CVE-2021-45878 - https://github.com/delikely/advisory/tree/main/GARO -CVE-2021-45884 - https://github.com/brave/brave-core/pull/10742 -CVE-2021-45885 - https://advisories.stormshield.eu -CVE-2021-45885 - https://advisories.stormshield.eu/2021-069/ -CVE-2021-45886 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-080.txt -CVE-2021-45887 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-077.txt -CVE-2021-45888 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-079.txt -CVE-2021-45889 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-078.txt -CVE-2021-45891 - https://syss.de -CVE-2021-45891 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-063.txt -CVE-2021-45892 - https://syss.de -CVE-2021-45892 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-064.txt -CVE-2021-45893 - https://syss.de -CVE-2021-45893 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-065.txt -CVE-2021-45894 - https://syss.de -CVE-2021-45894 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt -CVE-2021-45897 - https://github.com/manuelz120/CVE-2021-45897 -CVE-2021-45901 - http://packetstormsecurity.com/files/165989/ServiceNow-Orlando-Username-Enumeration.html -CVE-2021-45901 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/servicenow-username-enumeration-vulnerability-cve-2021-45901/ -CVE-2021-45901 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2021-45904 - https://bugs.openwrt.org/index.php?do=details&task_id=4199 -CVE-2021-45905 - https://bugs.openwrt.org/index.php?do=details&task_id=4199 -CVE-2021-45906 - https://bugs.openwrt.org/index.php?do=details&task_id=4199 -CVE-2021-45907 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 -CVE-2021-45908 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 -CVE-2021-45909 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002668 -CVE-2021-45910 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002667 -CVE-2021-45911 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002687 -CVE-2021-45919 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-stored-xss-to-rce-using-beef-and-elfinder-cve-2021-45919/ -CVE-2021-45935 - https://github.com/osamu620/OpenHTJ2K -CVE-2021-45943 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2021-45966 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html -CVE-2021-45967 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html -CVE-2021-45968 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html -CVE-2021-45972 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002739 -CVE-2021-45978 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-45979 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-45980 - https://www.foxit.com/support/security-bulletins.html -CVE-2021-45998 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46005 - https://www.exploit-db.com/exploits/49546 -CVE-2021-46006 - https://hackmd.io/vS-OfUEzSqqKh8e1PKce5A -CVE-2021-46007 - https://hackmd.io/t_nRWxS2Q2O7GV2E5BhQMg -CVE-2021-46008 - https://hackmd.io/ZkeEB-VvRiWBS53rFKG8DQ -CVE-2021-46009 - https://hackmd.io/-riYp6Q-ReCx-dKKWFBTLg -CVE-2021-46010 - https://hackmd.io/Ynwm8NnQSiK0xm7QKuNteg -CVE-2021-46013 - https://www.exploit-db.com/exploits/50587 -CVE-2021-46019 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00009.html -CVE-2021-46020 - https://github.com/mruby/mruby/issues/5613 -CVE-2021-46021 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00008.html -CVE-2021-46022 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00007.html -CVE-2021-46023 - https://github.com/mruby/mruby/issues/5613 -CVE-2021-46027 - https://github.com/wangl1989/mysiteforme/issues/40 -CVE-2021-46028 - https://github.com/langhsu/mblog/issues/50 -CVE-2021-46039 - https://github.com/gpac/gpac/issues/1999 -CVE-2021-46061 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/RSMS-1.0 -CVE-2021-46062 - https://github.com/ming-soft/MCMS/issues/59 -CVE-2021-46063 - https://github.com/ming-soft/MCMS/issues/59 -CVE-2021-46088 - https://github.com/paalbra/zabbix-zbxsec-7 -CVE-2021-46089 - https://github.com/jeecgboot/jeecg-boot/issues/3331 -CVE-2021-46097 - https://gist.github.com/w4nd3r-hya/784a86dda91bdcb3071892e56aacdee2 -CVE-2021-46101 - https://github.com/0xADY/git_rce -CVE-2021-46102 - https://github.com/solana-labs/rbpf/blob/c14764850f0b83b58aa013248eaf6d65836c1218/src/elf.rs#L609-L630 -CVE-2021-46108 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46109 - https://drive.google.com/drive/folders/1GAOuZwPB-upkpjPgjB8qLIKl9Mh3IVfl?usp=sharing -CVE-2021-46113 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-46113 -CVE-2021-46113 - https://www.youtube.com/watch?v=gnSMrvV5e9w -CVE-2021-46122 - https://k4m1ll0.com/cve-tplink-tlwr840n-euV620-password-reset.html -CVE-2021-46167 - http://wizplat.com/PRODUCT1_3/?idx=217 -CVE-2021-46168 - https://github.com/nimble-code/Spin/issues/56 -CVE-2021-46169 - https://github.com/nimble-code/Modex/issues/10 -CVE-2021-46170 - https://github.com/jerryscript-project/jerryscript/issues/4917 -CVE-2021-46171 - https://github.com/nimble-code/Modex/issues/8 -CVE-2021-46179 - https://github.com/upx/upx/issues/545 -CVE-2021-46195 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841 -CVE-2021-46198 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Courier-Management-System -CVE-2021-46200 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Music-Cloud-Community-System -CVE-2021-46201 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Resort-Management-System-1.0 -CVE-2021-46203 - https://github.com/taogogo/taocms/issues/13 -CVE-2021-46204 - https://github.com/taogogo/taocms/issues/14 -CVE-2021-46226 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46227 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46228 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46229 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46230 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46231 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46232 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46233 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46242 - https://github.com/HDFGroup/hdf5/issues/1329 -CVE-2021-46243 - https://github.com/HDFGroup/hdf5/issues/1326 -CVE-2021-46244 - https://github.com/HDFGroup/hdf5/issues/1327 -CVE-2021-46247 - https://drive.google.com/drive/folders/1lSaxWKiNKRkeZxQanEMpt906aUgDGUk_?usp=sharing -CVE-2021-46255 - https://github.com/eyoucms/eyoucms/issues/21 -CVE-2021-46262 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/7 -CVE-2021-46263 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/11 -CVE-2021-46264 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/9 -CVE-2021-46265 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/13 -CVE-2021-46283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 -CVE-2021-46283 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9f151e560b016b6ad3280b48e42fa11e1a5440 -CVE-2021-46307 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Projectworlds/2022/Online%20Examination%20System -CVE-2021-46308 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Railway-Reservation -CVE-2021-46309 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Employee-and-Visitor-Gate-Pass-Logging -CVE-2021-46310 - https://sourceforge.net/p/djvu/bugs/345/ -CVE-2021-46312 - https://sourceforge.net/p/djvu/bugs/344/ -CVE-2021-46314 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md -CVE-2021-46314 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46315 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md -CVE-2021-46315 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46319 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md -CVE-2021-46319 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46321 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/15 -CVE-2021-46322 - https://github.com/svaarala/duktape/issues/2448 -CVE-2021-46323 - https://github.com/espruino/Espruino/issues/2122 -CVE-2021-46324 - https://github.com/espruino/Espruino/issues/2121 -CVE-2021-46325 - https://github.com/espruino/Espruino/issues/2114 -CVE-2021-46326 - https://github.com/Moddable-OpenSource/moddable/issues/759 -CVE-2021-46327 - https://github.com/Moddable-OpenSource/moddable/issues/766 -CVE-2021-46329 - https://github.com/Moddable-OpenSource/moddable/issues/768 -CVE-2021-46330 - https://github.com/Moddable-OpenSource/moddable/issues/774 -CVE-2021-46331 - https://github.com/Moddable-OpenSource/moddable/issues/750 -CVE-2021-46332 - https://github.com/Moddable-OpenSource/moddable/issues/749 -CVE-2021-46332 - https://github.com/Moddable-OpenSource/moddable/issues/752 -CVE-2021-46333 - https://github.com/Moddable-OpenSource/moddable/issues/769 -CVE-2021-46334 - https://github.com/Moddable-OpenSource/moddable/issues/760 -CVE-2021-46335 - https://github.com/Moddable-OpenSource/moddable/issues/748 -CVE-2021-46335 - https://github.com/Moddable-OpenSource/moddable/issues/767 -CVE-2021-46336 - https://github.com/jerryscript-project/jerryscript/issues/4927 -CVE-2021-46337 - https://github.com/jerryscript-project/jerryscript/issues/4930 -CVE-2021-46338 - https://github.com/jerryscript-project/jerryscript/issues/4900 -CVE-2021-46339 - https://github.com/jerryscript-project/jerryscript/issues/4935 -CVE-2021-46340 - https://github.com/jerryscript-project/jerryscript/issues/4924 -CVE-2021-46342 - https://github.com/jerryscript-project/jerryscript/issues/4934 -CVE-2021-46343 - https://github.com/jerryscript-project/jerryscript/issues/4921 -CVE-2021-46344 - https://github.com/jerryscript-project/jerryscript/issues/4928 -CVE-2021-46345 - https://github.com/jerryscript-project/jerryscript/issues/4920 -CVE-2021-46346 - https://github.com/jerryscript-project/jerryscript/issues/4939 -CVE-2021-46347 - https://github.com/jerryscript-project/jerryscript/issues/4938 -CVE-2021-46348 - https://github.com/jerryscript-project/jerryscript/issues/4941 -CVE-2021-46349 - https://github.com/jerryscript-project/jerryscript/issues/4937 -CVE-2021-46350 - https://github.com/jerryscript-project/jerryscript/issues/4936 -CVE-2021-46351 - https://github.com/jerryscript-project/jerryscript/issues/4940 -CVE-2021-46353 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46354 - http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html -CVE-2021-46355 - https://medium.com/@windsormoreira/ocs-inventory-2-9-1-cross-site-scripting-xss-cve-2021-46355-a88d72606b7e -CVE-2021-46360 - http://packetstormsecurity.com/files/171489/Composr-CMS-10.0.39-Remote-Code-Execution.html -CVE-2021-46361 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS -CVE-2021-46362 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46362-Unauthenticated%20SSTI-Magnolia%20CMS -CVE-2021-46363 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS -CVE-2021-46364 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364-YAML%20Deserialization-Magnolia%20CMS -CVE-2021-46365 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS -CVE-2021-46366 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS -CVE-2021-46367 - https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597 -CVE-2021-46367 - https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html -CVE-2021-46367 - https://www.exploit-db.com/exploits/50616 -CVE-2021-46368 - https://packetstormsecurity.com/files/165404/TRIGONE-Remote-System-Monitor-3.61-Unquoted-Service-Path.html -CVE-2021-46368 - https://www.exploit-db.com/exploits/50633 -CVE-2021-46371 - https://github.com/zuiidea/antd-admin/issues/1127 -CVE-2021-46372 - https://www.huntr.dev/bounties/eb681144-04f2-4eaa-98b6-c8cffbcb1601/ -CVE-2021-46378 - http://packetstormsecurity.com/files/167042/DLINK-DIR850-Insecure-Direct-Object-Reference.html -CVE-2021-46378 - https://drive.google.com/file/d/1S69wOovVa8NRVUXcB0PkVvZHFxREcD4Y/view?usp=sharing -CVE-2021-46378 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46379 - http://packetstormsecurity.com/files/167041/DLINK-DIR850-Open-Redirection.html -CVE-2021-46379 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46381 - http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html -CVE-2021-46381 - https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing -CVE-2021-46381 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46382 - https://drive.google.com/drive/folders/1NOIoT8yE_HDoLVYhchml5E2Za3Oo6V9Y?usp=sharing -CVE-2021-46387 - http://packetstormsecurity.com/files/166189/Zyxel-ZyWALL-2-Plus-Cross-Site-Scripting.html -CVE-2021-46387 - https://drive.google.com/drive/folders/1_XfWBLqxT2Mqt7uB663Sjlc62pE8-rcN?usp=sharing -CVE-2021-46388 - https://drive.google.com/drive/folders/1FDtxZayLeSITcqP72c7FsTOpAFGFePVE -CVE-2021-46393 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/3 -CVE-2021-46394 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/4 -CVE-2021-46398 - http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html -CVE-2021-46398 - https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html -CVE-2021-46398 - https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/ -CVE-2021-46398 - https://febinj.medium.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 -CVE-2021-46398 - https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 -CVE-2021-46408 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2 -CVE-2021-46416 - http://packetstormsecurity.com/files/166670/SAM-SUNNY-TRIPOWER-5.0-Insecure-Direct-Object-Reference.html -CVE-2021-46416 - https://drive.google.com/drive/folders/1BPULhDC_g__seH_VnQlVtkrKdOLkXdzV?usp=sharing -CVE-2021-46417 - http://packetstormsecurity.com/files/166610/FFS-Colibri-Controller-Module-1.8.19.8580-Directory-Traversal.html -CVE-2021-46417 - http://packetstormsecurity.com/files/166671/Franklin-Fueling-Systems-Colibri-Controller-Module-1.8.19.8580-Local-File-Inclusion.html -CVE-2021-46417 - https://drive.google.com/drive/folders/1Yu4aVDdrgvs-F9jP3R8Cw7qo_TC7VB-R -CVE-2021-46418 - http://packetstormsecurity.com/files/166674/Telesquare-TLR-2855KS6-Arbitrary-File-Creation.html -CVE-2021-46419 - http://packetstormsecurity.com/files/166675/Telesquare-TLR-2855KS6-Arbitrary-File-Deletion.html -CVE-2021-46421 - https://drive.google.com/file/d/17y764rRfgab2EhYMEqCIYh__5sOTigqe/view?usp=sharing -CVE-2021-46422 - http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html -CVE-2021-46422 - http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html -CVE-2021-46422 - https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing -CVE-2021-46423 - https://drive.google.com/drive/folders/1iY4QqzZLdYgwD0LYc74M4Gm2wSC6Be1u?usp=sharing -CVE-2021-46424 - http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html -CVE-2021-46426 - http://packetstormsecurity.com/files/167227/PHPIPAM-1.4.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -CVE-2021-46427 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple%20ChatBot -CVE-2021-46427 - https://www.exploit-db.com/exploits/50673 -CVE-2021-46428 - https://cxsecurity.com/issue/WLB-2022010093 -CVE-2021-46428 - https://www.exploit-db.com/exploits/50672 -CVE-2021-46436 - https://github.com/xunyang1/ZZCMS/issues/1 -CVE-2021-46437 - https://github.com/xunyang1/ZZCMS/issues/2 -CVE-2021-46440 - http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html -CVE-2021-46440 - https://github.com/strapi/strapi/pull/12246 -CVE-2021-46441 - https://github.com/tgp-top/D-Link-DIR-825 -CVE-2021-46441 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46442 - https://github.com/tgp-top/D-Link-DIR-825 -CVE-2021-46442 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46451 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Project-Time-Management -CVE-2021-46452 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46453 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46454 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46455 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46456 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46457 - https://www.dlink.com/en/security-bulletin/ -CVE-2021-46461 - https://github.com/nginx/njs/issues/450 -CVE-2021-46462 - https://github.com/nginx/njs/issues/449 -CVE-2021-46463 - https://github.com/nginx/njs/issues/447 -CVE-2021-46474 - https://github.com/pcmacdon/jsish/issues/57 -CVE-2021-46475 - https://github.com/pcmacdon/jsish/issues/64 -CVE-2021-46477 - https://github.com/pcmacdon/jsish/issues/63 -CVE-2021-46478 - https://github.com/pcmacdon/jsish/issues/60 -CVE-2021-46480 - https://github.com/pcmacdon/jsish/issues/61 -CVE-2021-46481 - https://github.com/pcmacdon/jsish/issues/55 -CVE-2021-46482 - https://github.com/pcmacdon/jsish/issues/66 -CVE-2021-46483 - https://github.com/pcmacdon/jsish/issues/62 -CVE-2021-46484 - https://github.com/pcmacdon/jsish/issues/73 -CVE-2021-46485 - https://github.com/pcmacdon/jsish/issues/70 -CVE-2021-46486 - https://github.com/pcmacdon/jsish/issues/65 -CVE-2021-46487 - https://github.com/pcmacdon/jsish/issues/72 -CVE-2021-46488 - https://github.com/pcmacdon/jsish/issues/68 -CVE-2021-46489 - https://github.com/pcmacdon/jsish/issues/74 -CVE-2021-46490 - https://github.com/pcmacdon/jsish/issues/67 -CVE-2021-46491 - https://github.com/pcmacdon/jsish/issues/69 -CVE-2021-46494 - https://github.com/pcmacdon/jsish/issues/78 -CVE-2021-46495 - https://github.com/pcmacdon/jsish/issues/82 -CVE-2021-46496 - https://github.com/pcmacdon/jsish/issues/83 -CVE-2021-46497 - https://github.com/pcmacdon/jsish/issues/84 -CVE-2021-46498 - https://github.com/pcmacdon/jsish/issues/81 -CVE-2021-46499 - https://github.com/pcmacdon/jsish/issues/76 -CVE-2021-46500 - https://github.com/pcmacdon/jsish/issues/85 -CVE-2021-46501 - https://github.com/pcmacdon/jsish/issues/86 -CVE-2021-46502 - https://github.com/pcmacdon/jsish/issues/87 -CVE-2021-46503 - https://github.com/pcmacdon/jsish/issues/88 -CVE-2021-46504 - https://github.com/pcmacdon/jsish/issues/51 -CVE-2021-46505 - https://github.com/pcmacdon/jsish/issues/53 -CVE-2021-46506 - https://github.com/pcmacdon/jsish/issues/52 -CVE-2021-46507 - https://github.com/pcmacdon/jsish/issues/54 -CVE-2021-46508 - https://github.com/cesanta/mjs/issues/188 -CVE-2021-46509 - https://github.com/cesanta/mjs/issues/200 -CVE-2021-46510 - https://github.com/cesanta/mjs/issues/185 -CVE-2021-46511 - https://github.com/cesanta/mjs/issues/183 -CVE-2021-46512 - https://github.com/cesanta/mjs/issues/202 -CVE-2021-46513 - https://github.com/cesanta/mjs/issues/189 -CVE-2021-46514 - https://github.com/cesanta/mjs/issues/187 -CVE-2021-46515 - https://github.com/cesanta/mjs/issues/186 -CVE-2021-46516 - https://github.com/cesanta/mjs/issues/201 -CVE-2021-46517 - https://github.com/cesanta/mjs/issues/184 -CVE-2021-46518 - https://github.com/cesanta/mjs/issues/195 -CVE-2021-46519 - https://github.com/cesanta/mjs/issues/194 -CVE-2021-46520 - https://github.com/cesanta/mjs/issues/193 -CVE-2021-46521 - https://github.com/cesanta/mjs/issues/190 -CVE-2021-46522 - https://github.com/cesanta/mjs/issues/196 -CVE-2021-46523 - https://github.com/cesanta/mjs/issues/198 -CVE-2021-46524 - https://github.com/cesanta/mjs/issues/192 -CVE-2021-46525 - https://github.com/cesanta/mjs/issues/199 -CVE-2021-46526 - https://github.com/cesanta/mjs/issues/191 -CVE-2021-46527 - https://github.com/cesanta/mjs/issues/197 -CVE-2021-46528 - https://github.com/cesanta/mjs/issues/208 -CVE-2021-46529 - https://github.com/cesanta/mjs/issues/210 -CVE-2021-46530 - https://github.com/cesanta/mjs/issues/206 -CVE-2021-46531 - https://github.com/cesanta/mjs/issues/211 -CVE-2021-46532 - https://github.com/cesanta/mjs/issues/203 -CVE-2021-46534 - https://github.com/cesanta/mjs/issues/204 -CVE-2021-46535 - https://github.com/cesanta/mjs/issues/209 -CVE-2021-46537 - https://github.com/cesanta/mjs/issues/212 -CVE-2021-46538 - https://github.com/cesanta/mjs/issues/216 -CVE-2021-46539 - https://github.com/cesanta/mjs/issues/217 -CVE-2021-46540 - https://github.com/cesanta/mjs/issues/214 -CVE-2021-46541 - https://github.com/cesanta/mjs/issues/222 -CVE-2021-46542 - https://github.com/cesanta/mjs/issues/215 -CVE-2021-46543 - https://github.com/cesanta/mjs/issues/219 -CVE-2021-46544 - https://github.com/cesanta/mjs/issues/220 -CVE-2021-46545 - https://github.com/cesanta/mjs/issues/218 -CVE-2021-46546 - https://github.com/cesanta/mjs/issues/213 -CVE-2021-46547 - https://github.com/cesanta/mjs/issues/221 -CVE-2021-46548 - https://github.com/cesanta/mjs/issues/228 -CVE-2021-46549 - https://github.com/cesanta/mjs/issues/224 -CVE-2021-46550 - https://github.com/cesanta/mjs/issues/230 -CVE-2021-46553 - https://github.com/cesanta/mjs/issues/226 -CVE-2021-46554 - https://github.com/cesanta/mjs/issues/229 -CVE-2021-46556 - https://github.com/cesanta/mjs/issues/227 -CVE-2021-46557 - https://github.com/Zeyad-Azima/Vicidial-stored-XSS -CVE-2021-46558 - https://github.com/Zeyad-Azima/Issabel-stored-XSS -CVE-2021-46562 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46563 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46564 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46565 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46566 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46567 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46568 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46569 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46570 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46571 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46572 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46573 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46574 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46575 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46576 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46577 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46578 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46579 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46580 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46581 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46585 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46586 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46587 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46588 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46590 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46591 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46592 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46595 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46597 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46598 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46600 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46601 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46602 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46607 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46610 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46621 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46623 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 -CVE-2021-46625 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46634 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46655 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46656 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 -CVE-2021-46700 - https://github.com/saitoha/libsixel/issues/158 -CVE-2021-46702 - https://www.sciencedirect.com/science/article/pii/S0167404821001358 -CVE-2021-46708 - https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884 -CVE-2021-46743 - https://github.com/firebase/php-jwt/issues/351 -CVE-2021-46780 - https://wpscan.com/vulnerability/cba4ccdd-9331-4ca0-b910-8f427ed9b540 -CVE-2021-46781 - https://wpscan.com/vulnerability/49589867-f764-4c4a-b640-84973c673b23 -CVE-2021-46782 - https://wpscan.com/vulnerability/39e69487-aa53-4b78-a422-12515a6449bf -CVE-2021-46820 - https://github.com/XOS-Shop/xos_shop_system/issues/1 -CVE-2021-46824 - https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html -CVE-2021-46824 - https://www.exploit-db.com/exploits/49559 -CVE-2021-46829 - http://www.openwall.com/lists/oss-security/2022/07/25/1 -CVE-2021-46829 - https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md -CVE-2021-46829 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 -CVE-2021-46850 - https://www.exploit-db.com/exploits/49674 -CVE-2021-46888 - https://www.youtube.com/watch?v=QnRO-VkfIic -CVE-2021-46889 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html -CVE-2021-46898 - https://github.com/sehmaschine/django-grappelli/issues/975 -CVE-2022-0001 - https://www.kb.cert.org/vuls/id/155143 -CVE-2022-0001 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-0002 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-0020 - http://packetstormsecurity.com/files/171782/Palo-Alto-Cortex-XSOAR-6.5.0-Cross-Site-Scripting.html -CVE-2022-0070 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities -CVE-2022-0071 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities -CVE-2022-0079 - https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee -CVE-2022-0080 - https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e -CVE-2022-0083 - https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736 -CVE-2022-0085 - https://huntr.dev/bounties/73dbcc78-5ba9-492f-9133-13bbc9f31236 -CVE-2022-0086 - https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122 -CVE-2022-0087 - https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e -CVE-2022-0088 - https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29 -CVE-2022-0090 - https://gitlab.com/gitlab-org/gitaly/-/issues/3948 -CVE-2022-0121 - https://huntr.dev/bounties/b70a6191-8226-4ac6-b817-cae7332a68ee -CVE-2022-0122 - https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae -CVE-2022-0125 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0125.json -CVE-2022-0128 - https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba -CVE-2022-0132 - https://huntr.dev/bounties/77ec5308-5561-4664-af21-d780df2d1e4b -CVE-2022-0133 - https://huntr.dev/bounties/80aabdc1-89fe-47b8-87ca-9d68107fc0b4 -CVE-2022-0134 - https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85 -CVE-2022-0137 - https://github.com/michaelrsweet/htmldoc/issues/461 -CVE-2022-0139 - https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0 -CVE-2022-0140 - https://wpscan.com/vulnerability/9fa2b3b6-2fe3-40f0-8f71-371dd58fe336 -CVE-2022-0141 - https://wpscan.com/vulnerability/2adc8390-bb19-4adf-9805-e9c462d14d22 -CVE-2022-0142 - https://wpscan.com/vulnerability/03210390-2054-40c0-9508-39d168087878 -CVE-2022-0144 - https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c -CVE-2022-0145 - https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba -CVE-2022-0147 - https://wpscan.com/vulnerability/2c735365-69c0-4652-b48e-c4a192dfe0d1 -CVE-2022-0148 - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd -CVE-2022-0149 - https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c -CVE-2022-0150 - https://wpscan.com/vulnerability/7142a538-7c3d-4dd0-bd2c-cbd2efaf53c5 -CVE-2022-0153 - https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb -CVE-2022-0156 - https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36 -CVE-2022-0157 - https://huntr.dev/bounties/2c0fe81b-0977-4e1e-b5d8-7646c9a7ebbd -CVE-2022-0158 - https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b -CVE-2022-0159 - https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b -CVE-2022-0161 - https://wpscan.com/vulnerability/6b37fa17-0dcb-47a7-b1eb-f9f6abb458c0 -CVE-2022-0163 - https://wpscan.com/vulnerability/2b6b0731-4515-498a-82bd-d416f5885268 -CVE-2022-0164 - https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51 -CVE-2022-0165 - https://wpscan.com/vulnerability/906d0c31-370e-46b4-af1f-e52fbddd00cb -CVE-2022-0166 - https://kc.mcafee.com/corporate/index?page=content&id=SB10378 -CVE-2022-0168 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6f5e358452479fa8a773b5c6ccc9e4ec5a20880 -CVE-2022-0169 - https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c -CVE-2022-0170 - https://huntr.dev/bounties/f2a003fc-b911-43b6-81ec-f856cdfeaefc -CVE-2022-0171 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=683412ccf61294d727ead4a73d97397396e69a6b -CVE-2022-0173 - https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5 -CVE-2022-0174 - https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db -CVE-2022-0176 - https://wpscan.com/vulnerability/564a66d5-7fab-4de0-868a-e19466a507af -CVE-2022-0178 - https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368 -CVE-2022-0179 - https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7 -CVE-2022-0185 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2 -CVE-2022-0185 - https://www.willsroot.io/2022/01/cve-2022-0185.html -CVE-2022-0186 - https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720 -CVE-2022-0188 - https://wpscan.com/vulnerability/50b6f770-6f53-41ef-b2f3-2a58e9afd332 -CVE-2022-0189 - https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014 -CVE-2022-0190 - https://wpscan.com/vulnerability/ae322f11-d8b4-4b69-9efa-0fb87475fa44 -CVE-2022-0191 - https://wpscan.com/vulnerability/d4c32a02-810f-43d8-946a-b7e18ac54f55 -CVE-2022-0193 - https://plugins.trac.wordpress.org/changeset/2654225 -CVE-2022-0193 - https://wpscan.com/vulnerability/30d1d328-9f19-4c4c-b90a-04937d617864 -CVE-2022-0196 - https://huntr.dev/bounties/3675eec7-bbce-4dfd-a2d3-d6862dce9ea6 -CVE-2022-0197 - https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2 -CVE-2022-0198 - https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763 -CVE-2022-0199 - https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714 -CVE-2022-0200 - https://wpscan.com/vulnerability/bbc0b812-7b30-4ab4-bac8-27c706b3f146 -CVE-2022-0201 - https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4 -CVE-2022-0203 - https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406 -CVE-2022-0204 - https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q -CVE-2022-0205 - https://wpscan.com/vulnerability/446de364-720e-41ec-b80e-7678c8f4ad80 -CVE-2022-0206 - https://wpscan.com/vulnerability/ce12437a-d440-4c4a-9247-95a8f39d00b9 -CVE-2022-0208 - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc -CVE-2022-0209 - https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe -CVE-2022-0211 - https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679 -CVE-2022-0212 - https://wpscan.com/vulnerability/15be2d2b-baa3-4845-82cf-3c351c695b47 -CVE-2022-0213 - https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed -CVE-2022-0214 - https://wpscan.com/vulnerability/ca2e8feb-15d6-4965-ad9c-8da1bc01e0f4 -CVE-2022-0216 - https://starlabs.sg/advisories/22/22-0216/ -CVE-2022-0217 - https://prosody.im/security/advisory_20220113/ -CVE-2022-0217 - https://prosody.im/security/advisory_20220113/1.patch -CVE-2022-0219 - https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e -CVE-2022-0220 - https://wpscan.com/vulnerability/a91a01b9-7e36-4280-bc50-f6cff3e66059 -CVE-2022-0224 - https://huntr.dev/bounties/f1d1ce3e-ca92-4c7b-b1b8-934e28eaa486 -CVE-2022-0226 - https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f -CVE-2022-0228 - https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9 -CVE-2022-0229 - https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351 -CVE-2022-0230 - https://wpscan.com/vulnerability/c73316d2-ae6a-42db-935b-b8b03a7e4363 -CVE-2022-0231 - https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf -CVE-2022-0234 - https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b -CVE-2022-0236 - https://github.com/qurbat/CVE-2022-0236 -CVE-2022-0238 - https://huntr.dev/bounties/63f24b24-4af2-47b8-baea-7ad5f4db3633 -CVE-2022-0239 - https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3 -CVE-2022-0240 - https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb -CVE-2022-0242 - https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94 -CVE-2022-0243 - https://huntr.dev/bounties/fa538421-ae55-4288-928f-4e96aaed5803 -CVE-2022-0245 - https://huntr.dev/bounties/6a6aca72-32b7-45b3-a8ba-9b400b2d669c -CVE-2022-0246 - https://wpscan.com/vulnerability/892802b1-26e2-4ce1-be6f-71ce29687776 -CVE-2022-0248 - https://wpscan.com/vulnerability/d02cf542-2d75-46bc-a0df-67bbe501cc89 -CVE-2022-0250 - https://wpscan.com/vulnerability/05700942-3143-4978-89eb-814ceff74867 -CVE-2022-0252 - https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a -CVE-2022-0253 - https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303 -CVE-2022-0254 - https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997 -CVE-2022-0255 - https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa -CVE-2022-0256 - https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1 -CVE-2022-0257 - https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6 -CVE-2022-0258 - https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802 -CVE-2022-0261 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0261 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0261 - https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82 -CVE-2022-0262 - https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d -CVE-2022-0263 - https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6 -CVE-2022-0265 - https://huntr.dev/bounties/d63972a2-b910-480a-a86b-d1f75d24d563 -CVE-2022-0267 - https://wpscan.com/vulnerability/7df70f49-547f-4bdb-bf9b-2e06f93488c6 -CVE-2022-0268 - https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39 -CVE-2022-0269 - https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0 -CVE-2022-0271 - https://wpscan.com/vulnerability/ad07d9cd-8a75-4f7c-bbbe-3b6b89b699f2 -CVE-2022-0272 - https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44 -CVE-2022-0273 - https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13 -CVE-2022-0274 - https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764 -CVE-2022-0277 - https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316 -CVE-2022-0278 - https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030 -CVE-2022-0279 - https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865 -CVE-2022-0281 - https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505 -CVE-2022-0282 - https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd -CVE-2022-0284 - https://github.com/ImageMagick/ImageMagick/issues/4729 -CVE-2022-0285 - https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c -CVE-2022-0286 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40 -CVE-2022-0286 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-0287 - https://wpscan.com/vulnerability/6cd7cd6d-1cc1-472c-809b-b66389f149b0 -CVE-2022-0288 - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42 -CVE-2022-0289 - http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html -CVE-2022-0290 - http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html -CVE-2022-0306 - http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html -CVE-2022-0313 - https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c -CVE-2022-0314 - https://wpscan.com/vulnerability/17585f16-c62c-422d-ad9c-9138b6da97b7 -CVE-2022-0316 - https://wpscan.com/vulnerability/9ab3d6cf-aad7-41bc-9aae-dc5313f12f7c -CVE-2022-0318 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0318 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0318 - https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08 -CVE-2022-0319 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0319 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0319 - https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b -CVE-2022-0320 - https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95 -CVE-2022-0321 - https://wpscan.com/vulnerability/286b81a0-6f6d-4024-9bbc-6cb373990a7a -CVE-2022-0322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c -CVE-2022-0322 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-0323 - https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7 -CVE-2022-0326 - https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976 -CVE-2022-0327 - https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883 -CVE-2022-0328 - https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9 -CVE-2022-0339 - https://huntr.dev/bounties/499688c4-6ac4-4047-a868-7922c3eab369 -CVE-2022-0341 - https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628 -CVE-2022-0345 - https://wpscan.com/vulnerability/b3b523b9-6c92-4091-837a-d34e3174eb19 -CVE-2022-0346 - https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6 -CVE-2022-0347 - https://wpscan.com/vulnerability/a5084367-842b-496a-a23c-24dbebac1e8b -CVE-2022-0348 - https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4 -CVE-2022-0349 - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a -CVE-2022-0350 - https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c -CVE-2022-0351 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0351 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0351 - https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161 -CVE-2022-0352 - https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717 -CVE-2022-0359 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0359 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0359 - https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def -CVE-2022-0360 - https://wpscan.com/vulnerability/d718b993-4de5-499c-84c9-69801396f51f -CVE-2022-0361 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0361 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0361 - https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b -CVE-2022-0362 - https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091 -CVE-2022-0363 - https://wpscan.com/vulnerability/a438a951-497c-43cd-822f-1a48d4315191 -CVE-2022-0364 - https://wpscan.com/vulnerability/0eb40cd5-838e-4b53-994d-22cf7c8a6c50 -CVE-2022-0367 - https://github.com/stephane/libmodbus/issues/614 -CVE-2022-0368 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0368 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0368 - https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 -CVE-2022-0370 - https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca -CVE-2022-0372 - https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1 -CVE-2022-0374 - https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef -CVE-2022-0376 - https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932 -CVE-2022-0377 - https://wpscan.com/vulnerability/0d95ada6-53e3-4a80-a395-eacd7b090f26 -CVE-2022-0378 - https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31 -CVE-2022-0379 - https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6 -CVE-2022-0381 - https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3 -CVE-2022-0383 - https://wpscan.com/vulnerability/e0402753-3a80-455b-9fab-a7d2a7687193 -CVE-2022-0384 - https://wpscan.com/vulnerability/91c44c45-994b-4aed-b9f9-7db45924eeb4 -CVE-2022-0385 - https://wpscan.com/vulnerability/60067b8b-9fa5-40d1-817a-929779947891 -CVE-2022-0387 - https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98 -CVE-2022-0388 - https://wpscan.com/vulnerability/7d4ad1f3-6d27-4655-9796-ce370ef5fced -CVE-2022-0389 - https://wpscan.com/vulnerability/788ead78-9aa2-49a3-b191-12114be8270b -CVE-2022-0391 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-0392 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0392 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-0392 - https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126 -CVE-2022-0393 - https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba -CVE-2022-0394 - https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272 -CVE-2022-0397 - https://wpscan.com/vulnerability/c8091254-1ced-4363-ab7f-5b880447713d -CVE-2022-0398 - https://wpscan.com/vulnerability/21aec131-91ff-4300-ac7a-0bf31d6b2b24 -CVE-2022-0399 - https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164 -CVE-2022-0401 - https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d -CVE-2022-0402 - https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/ -CVE-2022-0403 - https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e -CVE-2022-0404 - https://wpscan.com/vulnerability/6d0932bb-d515-4432-b67b-16aba34bd285 -CVE-2022-0405 - https://huntr.dev/bounties/370538f6-5312-4c15-9fc0-b4c36ac236fe -CVE-2022-0406 - https://huntr.dev/bounties/d7498799-4797-4751-b5e2-b669e729d5db -CVE-2022-0407 - https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c -CVE-2022-0408 - https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d -CVE-2022-0409 - https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7 -CVE-2022-0410 - https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20 -CVE-2022-0411 - https://wpscan.com/vulnerability/35272197-c973-48ad-8405-538bfbafa172 -CVE-2022-0412 - https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 -CVE-2022-0413 - https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38 -CVE-2022-0414 - https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f -CVE-2022-0415 - https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902 -CVE-2022-0417 - https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a -CVE-2022-0418 - https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0 -CVE-2022-0419 - https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa -CVE-2022-0420 - https://wpscan.com/vulnerability/056b5167-3cbc-47d1-9917-52a434796151 -CVE-2022-0421 - https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9 -CVE-2022-0422 - https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc -CVE-2022-0423 - https://wpscan.com/vulnerability/7dde0b9d-9b86-4961-b005-a11b6ffba952 -CVE-2022-0424 - https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f -CVE-2022-0426 - https://wpscan.com/vulnerability/de69bcd1-b0b1-4b16-9655-776ee57ad90a -CVE-2022-0427 - https://gitlab.com/gitlab-org/gitlab/-/issues/347284 -CVE-2022-0428 - https://wpscan.com/vulnerability/071a2f69-9cd6-42a8-a56c-264a589784ab -CVE-2022-0429 - https://wpscan.com/vulnerability/d1b6f438-f737-4b18-89cf-161238a7421b -CVE-2022-0430 - https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f -CVE-2022-0431 - https://wpscan.com/vulnerability/52bd94df-8816-48fd-8788-38d045eb57ca -CVE-2022-0432 - https://huntr.dev/bounties/d06da292-7716-4d74-a129-dd04773398d7 -CVE-2022-0434 - https://wpscan.com/vulnerability/be895016-7365-4ce4-a54f-f36d0ef2d6f1 -CVE-2022-0436 - https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b -CVE-2022-0437 - https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885 -CVE-2022-0439 - https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095 -CVE-2022-0440 - https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1 -CVE-2022-0441 - https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed -CVE-2022-0442 - https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692 -CVE-2022-0443 - https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51 -CVE-2022-0444 - https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b -CVE-2022-0445 - https://wpscan.com/vulnerability/d9f28255-0026-4c42-9e67-d17b618c2285 -CVE-2022-0446 - https://wpscan.com/vulnerability/3fc7986e-3b38-4e16-9516-2ae00bc7a581 -CVE-2022-0447 - https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe -CVE-2022-0448 - https://wpscan.com/vulnerability/d4ff63ee-28e6-486e-9aa7-c878b97f707c -CVE-2022-0449 - https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387 -CVE-2022-0450 - https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a -CVE-2022-0471 - https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66 -CVE-2022-0472 - https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713 -CVE-2022-0476 - https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d -CVE-2022-0478 - https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431f -CVE-2022-0479 - https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816 -CVE-2022-0480 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042 -CVE-2022-0480 - https://github.com/kata-containers/kata-containers/issues/3373 -CVE-2022-0480 - https://ubuntu.com/security/CVE-2022-0480 -CVE-2022-0481 - https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027 -CVE-2022-0482 - http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html -CVE-2022-0482 - https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466 -CVE-2022-0482 - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26 -CVE-2022-0487 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39 -CVE-2022-0489 - https://gitlab.com/gitlab-org/gitlab/-/issues/341832 -CVE-2022-0492 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html -CVE-2022-0492 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -CVE-2022-0492 - http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html -CVE-2022-0492 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af -CVE-2022-0493 - https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed -CVE-2022-0496 - https://github.com/openscad/openscad/issues/4037 -CVE-2022-0497 - https://github.com/openscad/openscad/issues/4043 -CVE-2022-0499 - https://wpscan.com/vulnerability/e9ccf1fc-1dbf-4a41-bf4a-90af20b286d6 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841 -CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57 -CVE-2022-0503 - https://wpscan.com/vulnerability/b6d38e23-3761-4447-a794-1e5077fd953a -CVE-2022-0505 - https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968 -CVE-2022-0506 - https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f -CVE-2022-0507 - https://khoori.org/posts/cve-2022-0507/ -CVE-2022-0509 - https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b -CVE-2022-0510 - https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe -CVE-2022-0511 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-0512 - https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b -CVE-2022-0514 - https://huntr.dev/bounties/af08000d-9f4a-4743-865d-5d5cdaf7fb27 -CVE-2022-0515 - https://huntr.dev/bounties/efb93f1f-1896-4a4c-a059-9ecadac1c4de -CVE-2022-0516 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55 -CVE-2022-0518 - https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184 -CVE-2022-0519 - https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3 -CVE-2022-0520 - https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6 -CVE-2022-0521 - https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca -CVE-2022-0522 - https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9 -CVE-2022-0523 - https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69 -CVE-2022-0524 - https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d -CVE-2022-0525 - https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9 -CVE-2022-0526 - https://huntr.dev/bounties/d8f5ce74-2a00-4813-b220-70af771b0edd -CVE-2022-0529 - https://bugzilla.redhat.com/show_bug.cgi?id=2051402 -CVE-2022-0529 - https://github.com/ByteHackr/unzip_poc -CVE-2022-0530 - https://bugzilla.redhat.com/show_bug.cgi?id=2051395 -CVE-2022-0530 - https://github.com/ByteHackr/unzip_poc -CVE-2022-0531 - https://wpscan.com/vulnerability/ac5c2a5d-09b6-470b-a598-2972183413ca -CVE-2022-0533 - https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74 -CVE-2022-0534 - https://github.com/michaelrsweet/htmldoc/issues/463 -CVE-2022-0535 - https://wpscan.com/vulnerability/a4162e96-a3c5-4f38-a60b-aa3ed9508985 -CVE-2022-0537 - https://wpscan.com/vulnerability/abfbba70-5158-4990-98e5-f302361db367 -CVE-2022-0539 - https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af -CVE-2022-0541 - https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce -CVE-2022-0542 - https://huntr.dev/bounties/e6469ba6-03a2-4b17-8b4e-8932ecd0f7ac -CVE-2022-0543 - http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html -CVE-2022-0543 - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce -CVE-2022-0554 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0554 - https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71 -CVE-2022-0557 - http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html -CVE-2022-0557 - https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8 -CVE-2022-0557 - https://www.exploit-db.com/exploits/50768 -CVE-2022-0558 - https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c -CVE-2022-0559 - https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e -CVE-2022-0560 - https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25 -CVE-2022-0561 - https://gitlab.com/libtiff/libtiff/-/issues/362 -CVE-2022-0562 - https://gitlab.com/libtiff/libtiff/-/issues/362 -CVE-2022-0565 - https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5 -CVE-2022-0570 - https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1 -CVE-2022-0571 - https://huntr.dev/bounties/a5039485-6e48-4313-98ad-915506c19ae8 -CVE-2022-0572 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0572 - https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf -CVE-2022-0574 - https://huntr.dev/bounties/6f322c84-9e20-4df6-97e8-92bc271ede3f -CVE-2022-0575 - https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d -CVE-2022-0576 - https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177 -CVE-2022-0578 - https://huntr.dev/bounties/02c81928-eb47-476f-8000-e93dc796dbcc -CVE-2022-0579 - https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849 -CVE-2022-0580 - https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3 -CVE-2022-0583 - https://gitlab.com/wireshark/wireshark/-/issues/17840 -CVE-2022-0586 - https://gitlab.com/wireshark/wireshark/-/issues/17813 -CVE-2022-0587 - https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469 -CVE-2022-0588 - https://huntr.dev/bounties/caab3310-0d70-4c8a-8768-956f8dd3326d -CVE-2022-0589 - https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768 -CVE-2022-0590 - https://wpscan.com/vulnerability/08b66b69-3c69-4a1e-9c0a-5697e31bc04e -CVE-2022-0591 - https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47 -CVE-2022-0592 - https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b -CVE-2022-0593 - https://wpscan.com/vulnerability/76a50157-04b5-43e8-afbc-a6ddf6d1cba3 -CVE-2022-0594 - https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1 -CVE-2022-0595 - https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de -CVE-2022-0596 - https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5 -CVE-2022-0597 - https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813 -CVE-2022-0598 - https://wpscan.com/vulnerability/4688d39e-ac9b-47f5-a4c1-f9548b63c68c -CVE-2022-0599 - https://wpscan.com/vulnerability/4f1d45bc-d3bd-472c-959d-05abeff32765 -CVE-2022-0600 - https://wpscan.com/vulnerability/5dd6f625-6738-4e6a-81dc-21c0add4368d -CVE-2022-0601 - https://wpscan.com/vulnerability/6ec62eae-2072-4098-8f77-b22d61a89cbf -CVE-2022-0602 - https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010 -CVE-2022-0611 - https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b -CVE-2022-0613 - https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083 -CVE-2022-0614 - https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879 -CVE-2022-0616 - https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0 -CVE-2022-0617 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee -CVE-2022-0617 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f -CVE-2022-0619 - https://wpscan.com/vulnerability/d18892c6-2b19-4037-bc39-5d170adaf3d9 -CVE-2022-0620 - https://wpscan.com/vulnerability/77b92130-167c-4e8a-bde5-3fd1bd6982c6 -CVE-2022-0621 - https://wpscan.com/vulnerability/b5578747-298d-4f4b-867e-46b767485a98 -CVE-2022-0623 - https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580 -CVE-2022-0624 - https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388 -CVE-2022-0625 - https://wpscan.com/vulnerability/ec5c331c-fb74-4ccc-a4d4-446c2b4e703a -CVE-2022-0626 - https://wpscan.com/vulnerability/d72164e2-8449-4fb1-aad3-bfa86d645e47 -CVE-2022-0627 - https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4 -CVE-2022-0628 - https://wpscan.com/vulnerability/af9787ee-c496-4f02-a22c-c8f8a97ad902 -CVE-2022-0629 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0629 - https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877 -CVE-2022-0630 - https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32 -CVE-2022-0631 - https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40 -CVE-2022-0632 - https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b -CVE-2022-0633 - http://packetstormsecurity.com/files/166059/WordPress-UpdraftPlus-1.22.2-Backup-Disclosure.html -CVE-2022-0633 - https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3 -CVE-2022-0634 - https://wpscan.com/vulnerability/7e11aeb0-b231-407d-86ec-9018c2c7eee3 -CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753838 -CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2022-0637 -CVE-2022-0639 - https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155 -CVE-2022-0640 - https://wpscan.com/vulnerability/f8405e06-9cf3-4acb-aebb-e80fb402daa9 -CVE-2022-0641 - https://wpscan.com/vulnerability/0a9830df-5f5d-40a3-9841-40994275136f -CVE-2022-0642 - https://wpscan.com/vulnerability/099cf9b4-0b3a-43c6-8ca9-7c2d50f86425 -CVE-2022-0643 - https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24c -CVE-2022-0645 - https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6 -CVE-2022-0647 - https://wpscan.com/vulnerability/4a585d5f-72ba-43e3-b04f-8b3e1b84444a -CVE-2022-0648 - https://wpscan.com/vulnerability/90f9ad6a-4855-4a8e-97f6-5f403eb6455d -CVE-2022-0649 - https://wpscan.com/vulnerability/284fbc98-803d-4da5-8920-411eeae4bac8 -CVE-2022-0651 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 -CVE-2022-0654 - https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc -CVE-2022-0656 - https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 -CVE-2022-0657 - https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6 -CVE-2022-0658 - https://wpscan.com/vulnerability/d7f0805a-61ce-454a-96fb-5ecacd767578 -CVE-2022-0659 - https://wpscan.com/vulnerability/22dc2661-ba64-49e7-af65-892a617ab02c -CVE-2022-0660 - https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291 -CVE-2022-0661 - https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd -CVE-2022-0662 - https://wpscan.com/vulnerability/27ad58ba-b648-41d9-8074-16e4feeaee69 -CVE-2022-0663 - https://wpscan.com/vulnerability/b586b217-f91e-42d3-81f1-cc3ee3a4b01e -CVE-2022-0664 - https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac -CVE-2022-0665 - https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3 -CVE-2022-0666 - https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55 -CVE-2022-0674 - https://wpscan.com/vulnerability/332e1e1e-7420-4605-99bc-4074e212ff9b -CVE-2022-0676 - https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485 -CVE-2022-0678 - https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0 -CVE-2022-0679 - https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 -CVE-2022-0680 - https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded -CVE-2022-0681 - https://wpscan.com/vulnerability/c5765816-4439-4c14-a847-044248ada0ef -CVE-2022-0684 - https://wpscan.com/vulnerability/69b178f3-5951-4879-9bbe-183951d002ec -CVE-2022-0685 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0685 - https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782 -CVE-2022-0686 - https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c -CVE-2022-0687 - https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c -CVE-2022-0689 - https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649 -CVE-2022-0690 - https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9 -CVE-2022-0691 - https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4 -CVE-2022-0692 - https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203 -CVE-2022-0693 - https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643 -CVE-2022-0694 - https://wpscan.com/vulnerability/990d1b0a-dbd1-42d0-9a40-c345407c6fe0 -CVE-2022-0695 - https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea -CVE-2022-0696 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0696 - https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f -CVE-2022-0697 - https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b -CVE-2022-0700 - https://wpscan.com/vulnerability/1bf1f255-1571-425c-92b1-02833f6a44a7 -CVE-2022-0701 - https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1 -CVE-2022-0702 - https://wpscan.com/vulnerability/bf6f897b-af65-4122-802c-ae6d4f2346f9 -CVE-2022-0703 - https://wpscan.com/vulnerability/fa34beff-c8ab-4297-9c59-b3b0c52f0536 -CVE-2022-0704 - https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6 -CVE-2022-0705 - https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b -CVE-2022-0706 - https://wpscan.com/vulnerability/598d5c1b-7930-46a6-9a31-5e08a5f14907 -CVE-2022-0707 - https://wpscan.com/vulnerability/50680797-61e4-4737-898f-e5b394d89117 -CVE-2022-0708 - https://mattermost.com/security-updates/ -CVE-2022-0709 - https://wpscan.com/vulnerability/3cd1d8d2-d2a4-45a9-9b5f-c2a56f08be85 -CVE-2022-0712 - https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466 -CVE-2022-0713 - https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c -CVE-2022-0714 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0714 - https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3 -CVE-2022-0715 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02 -CVE-2022-0717 - https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9 -CVE-2022-0719 - https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312 -CVE-2022-0720 - https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf -CVE-2022-0721 - https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb -CVE-2022-0723 - https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5 -CVE-2022-0724 - https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062 -CVE-2022-0725 - https://bugzilla.redhat.com/show_bug.cgi?id=2052696 -CVE-2022-0726 - https://huntr.dev/bounties/8928ab08-7fcb-475e-8da7-18e8412c1ac3 -CVE-2022-0727 - https://huntr.dev/bounties/d1faa10f-0640-480c-bb52-089adb351e6e -CVE-2022-0728 - https://wpscan.com/vulnerability/c6d3d308-4bf1-493f-86e9-dd623526e3c6 -CVE-2022-0729 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0729 - https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea -CVE-2022-0731 - https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8 -CVE-2022-0732 - https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ -CVE-2022-0737 - https://wpscan.com/vulnerability/a5c9fa61-e6f1-4460-84fe-977a203bd4bc -CVE-2022-0739 - https://wpscan.com/vulnerability/388cd42d-b61a-42a4-8604-99b812db2357 -CVE-2022-0742 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d3916f3189172d5c69d33065c3c21119fe539fc -CVE-2022-0743 - https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293 -CVE-2022-0745 - https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a -CVE-2022-0746 - https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd -CVE-2022-0747 - https://wpscan.com/vulnerability/a8575322-c2cf-486a-9c37-71a22167aac3 -CVE-2022-0748 - https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737 -CVE-2022-0749 - https://github.com/SinGooCMS/SinGooCMSUtility/issues/1 -CVE-2022-0749 - https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979 -CVE-2022-0751 - https://gitlab.com/gitlab-org/gitlab/-/issues/349382 -CVE-2022-0752 - https://huntr.dev/bounties/49940dd2-72c2-4607-857a-1fade7e8f080 -CVE-2022-0753 - https://huntr.dev/bounties/8ce4b776-1c53-45ec-bc5f-783077e2d324 -CVE-2022-0754 - https://huntr.dev/bounties/8afb7991-c6ed-42d9-bd9b-1cc83418df88 -CVE-2022-0755 - https://huntr.dev/bounties/cc767dbc-c676-44c1-a9d1-cd17ae77ee7e -CVE-2022-0756 - https://huntr.dev/bounties/55164a63-62e4-4fb6-b4ca-87eca14f6f31 -CVE-2022-0760 - https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210 -CVE-2022-0762 - https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48 -CVE-2022-0763 - https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6 -CVE-2022-0764 - https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c -CVE-2022-0764 - https://github.com/strapi/strapi/issues/12879 -CVE-2022-0764 - https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5 -CVE-2022-0765 - https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587 -CVE-2022-0766 - https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b -CVE-2022-0767 - https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e -CVE-2022-0768 - https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903 -CVE-2022-0769 - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141 -CVE-2022-0770 - https://wpscan.com/vulnerability/49abe79c-ab1c-4dbf-824c-8daaac7e079d -CVE-2022-0771 - https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75 -CVE-2022-0773 - https://wpscan.com/vulnerability/55b89de0-30ed-4f98-935e-51f069faf6fc -CVE-2022-0775 - https://wpscan.com/vulnerability/b76dbf37-a0a2-48cf-bd85-3ebbc2f394dd/ -CVE-2022-0776 - https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001 -CVE-2022-0777 - https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7 -CVE-2022-0778 - http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html -CVE-2022-0778 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-0778 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-0779 - https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd -CVE-2022-0780 - https://wpscan.com/vulnerability/0ee7d1a8-9782-4db5-b055-e732f2763825 -CVE-2022-0781 - https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161 -CVE-2022-0782 - https://wpscan.com/vulnerability/b81e824c-d2b1-4381-abee-18c42bb5c2f5 -CVE-2022-0783 - https://wpscan.com/vulnerability/4d594424-8048-482d-b61c-45be1e97a8ba -CVE-2022-0784 - https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f -CVE-2022-0785 - https://wpscan.com/vulnerability/e1e09f56-89a4-4d6f-907b-3fb2cb825255 -CVE-2022-0786 - https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30 -CVE-2022-0787 - https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd -CVE-2022-0788 - https://wpscan.com/vulnerability/fbc71710-123f-4c61-9796-a6a4fd354828 -CVE-2022-0812 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1 -CVE-2022-0812 - https://ubuntu.com/security/CVE-2022-0812 -CVE-2022-0814 - https://wpscan.com/vulnerability/fd84dc08-0079-4fcf-81c3-a61d652e3269 -CVE-2022-0817 - https://wpscan.com/vulnerability/69263610-f454-4f27-80af-be523d25659e -CVE-2022-0818 - https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b -CVE-2022-0819 - https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5 -CVE-2022-0821 - https://huntr.dev/bounties/0019eb1c-8bf9-4bd0-a27f-aadc173515cb -CVE-2022-0822 - https://huntr.dev/bounties/06971613-b6ab-4b96-8aa6-4982bfcfeb73 -CVE-2022-0824 - http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html -CVE-2022-0824 - http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html -CVE-2022-0824 - https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295 -CVE-2022-0824 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html -CVE-2022-0825 - https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e -CVE-2022-0826 - https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5 -CVE-2022-0827 - https://wpscan.com/vulnerability/0d208ebc-7805-457b-aa5f-ffd5adb2f3be -CVE-2022-0828 - https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb -CVE-2022-0829 - https://huntr.dev/bounties/f2d0389f-d7d1-4f34-9f9d-268b0a0da05e -CVE-2022-0829 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html -CVE-2022-0830 - https://wpscan.com/vulnerability/114c0202-39f8-4748-ac0d-013d2d6f02f7 -CVE-2022-0833 - https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d -CVE-2022-0836 - https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f -CVE-2022-0837 - https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a -CVE-2022-0838 - https://huntr.dev/bounties/bd2fb1f1-cc8b-4ef7-8e2b-4ca686d8d614 -CVE-2022-0839 - https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70 -CVE-2022-0839 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-0840 - https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df -CVE-2022-0841 - https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1 -CVE-2022-0845 - https://huntr.dev/bounties/a795bf93-c91e-4c79-aae8-f7d8bda92e2a -CVE-2022-0846 - https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4 -CVE-2022-0847 - http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html -CVE-2022-0847 - http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html -CVE-2022-0847 - http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html -CVE-2022-0847 - http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html -CVE-2022-0847 - https://dirtypipe.cm4all.com/ -CVE-2022-0848 - http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html -CVE-2022-0848 - https://huntr.dev/bounties/3e91685f-cfb9-4ee4-abaf-9b712a8fd5a6 -CVE-2022-0849 - https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 -CVE-2022-0849 - https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6 -CVE-2022-0850 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe -CVE-2022-0854 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13 -CVE-2022-0856 - https://github.com/cacalabs/libcaca/issues/65 -CVE-2022-0860 - https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d -CVE-2022-0863 - https://wpscan.com/vulnerability/a30212a0-c910-4657-aee1-4a2d72c77983 -CVE-2022-0864 - http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html -CVE-2022-0864 - https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872 -CVE-2022-0865 - https://gitlab.com/libtiff/libtiff/-/issues/385 -CVE-2022-0867 - https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494 -CVE-2022-0868 - https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02 -CVE-2022-0869 - https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342 -CVE-2022-0870 - https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531 -CVE-2022-0871 - https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62 -CVE-2022-0873 - https://wpscan.com/vulnerability/d5ce4b8a-9aa5-4df8-b521-c2105990a87e -CVE-2022-0874 - https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810 -CVE-2022-0875 - https://wpscan.com/vulnerability/fefc1411-594d-465b-aeb9-78c141b23762 -CVE-2022-0876 - https://wpscan.com/vulnerability/73be6e92-ea37-4416-977d-52ee2afa022a -CVE-2022-0877 - https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c -CVE-2022-0879 - https://wpscan.com/vulnerability/c12f6087-1875-4edf-ac32-bec6f712968d -CVE-2022-0881 - https://huntr.dev/bounties/2628431e-6a98-4063-a0e3-a8b1d9ebaa9c -CVE-2022-0884 - https://wpscan.com/vulnerability/af06b96c-105f-429c-b2ad-c8c823897dba -CVE-2022-0885 - https://wpscan.com/vulnerability/8b08b72e-5584-4f25-ab73-5ab0f47412df -CVE-2022-0887 - https://wpscan.com/vulnerability/a6c1676d-9dcb-45f6-833a-9545bccd0ad6 -CVE-2022-0888 - https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607 -CVE-2022-0890 - https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276 -CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/380 -CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/382 -CVE-2022-0892 - https://wpscan.com/vulnerability/e5d95261-a243-493f-be6a-3c15ccb65435 -CVE-2022-0893 - https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9 -CVE-2022-0894 - https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95 -CVE-2022-0895 - https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d -CVE-2022-0896 - https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0 -CVE-2022-0898 - https://wpscan.com/vulnerability/f51d8345-3927-4be2-8145-e201371c8c43 -CVE-2022-0899 - https://wpscan.com/vulnerability/1772417a-1abb-4d97-9694-1254840defd1 -CVE-2022-0901 - http://packetstormsecurity.com/files/166626/WordPress-Ad-Inserter-Cross-Site-Scripting.html -CVE-2022-0901 - https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba -CVE-2022-0903 - https://mattermost.com/security-updates/ -CVE-2022-0904 - https://mattermost.com/security-updates/ -CVE-2022-0905 - https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb -CVE-2022-0906 - https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8 -CVE-2022-0907 - https://gitlab.com/libtiff/libtiff/-/issues/392 -CVE-2022-0908 - https://gitlab.com/libtiff/libtiff/-/issues/383 -CVE-2022-0909 - https://gitlab.com/libtiff/libtiff/-/issues/393 -CVE-2022-0911 - https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77 -CVE-2022-0912 - https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54 -CVE-2022-0913 - https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f -CVE-2022-0914 - https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930 -CVE-2022-0919 - https://wpscan.com/vulnerability/e8f32e0b-4a89-460b-bb78-7c83ef5e16b4 -CVE-2022-0920 - https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0 -CVE-2022-0921 - https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622 -CVE-2022-0924 - https://gitlab.com/libtiff/libtiff/-/issues/278 -CVE-2022-0926 - https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17 -CVE-2022-0928 - https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd -CVE-2022-0929 - https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03 -CVE-2022-0930 - https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993 -CVE-2022-0935 - https://huntr.dev/bounties/a7e40fdf-a333-4a50-8a53-d11b16ce3ec2 -CVE-2022-0936 - https://huntr.dev/bounties/90701766-bfed-409e-b3dd-6ff884373968 -CVE-2022-0937 - https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5 -CVE-2022-0938 - https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e -CVE-2022-0939 - https://huntr.dev/bounties/768fd7e2-a767-4d8d-a517-e9dda849c6e4 -CVE-2022-0940 - https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782 -CVE-2022-0941 - https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc -CVE-2022-0942 - https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9 -CVE-2022-0943 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-0943 - https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1 -CVE-2022-0944 - https://huntr.dev/bounties/46630727-d923-4444-a421-537ecd63e7fb -CVE-2022-0945 - https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e -CVE-2022-0946 - https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1 -CVE-2022-0948 - https://wpscan.com/vulnerability/daad48df-6a25-493f-9d1d-17b897462576 -CVE-2022-0949 - https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb -CVE-2022-0950 - https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc -CVE-2022-0951 - https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932 -CVE-2022-0952 - https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b -CVE-2022-0953 - https://wpscan.com/vulnerability/29ab3c7b-58e0-4a72-b7b4-ab12a6d54f5a -CVE-2022-0954 - https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26 -CVE-2022-0955 - https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df -CVE-2022-0956 - https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2 -CVE-2022-0957 - https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21 -CVE-2022-0958 - https://wpscan.com/vulnerability/05034521-6eb9-43b9-8f03-7e0de60e3022 -CVE-2022-0960 - https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e -CVE-2022-0961 - https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436 -CVE-2022-0962 - https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908 -CVE-2022-0963 - https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c -CVE-2022-0964 - https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0 -CVE-2022-0965 - https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347 -CVE-2022-0966 - https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe -CVE-2022-0967 - http://packetstormsecurity.com/files/167198/Showdoc-2.10.3-Cross-Site-Scripting.html -CVE-2022-0967 - https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a -CVE-2022-0968 - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e -CVE-2022-0969 - https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf -CVE-2022-0970 - https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec -CVE-2022-0986 - https://huntr.dev/bounties/57635c78-303f-412f-b75a-623df9fa9edd -CVE-2022-0989 - https://wpscan.com/vulnerability/a6bfc150-8e3f-4b2d-a6e1-09406af41dd4 -CVE-2022-0990 - https://huntr.dev/bounties/31649903-c19c-4dae-aee0-a04b095855c5 -CVE-2022-0991 - https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4 -CVE-2022-0994 - https://wpscan.com/vulnerability/e9dd62fc-bb79-4a6b-b99c-60e40f010d7a -CVE-2022-0995 - http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html -CVE-2022-0995 - http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html -CVE-2022-0995 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb -CVE-2022-0996 - https://github.com/ByteHackr/389-ds-base -CVE-2022-1000 - https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424 -CVE-2022-1001 - https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb -CVE-2022-1002 - https://mattermost.com/security-updates/ -CVE-2022-1003 - https://mattermost.com/security-updates/ -CVE-2022-1005 - https://wpscan.com/vulnerability/f37d1d55-10cc-4202-8d16-9ec2128f54f9 -CVE-2022-1006 - https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68 -CVE-2022-1007 - https://wpscan.com/vulnerability/6f5b764b-d13b-4371-9cc5-91204d9d6358 -CVE-2022-1008 - https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082 -CVE-2022-1009 - https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e -CVE-2022-1010 - https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b -CVE-2022-1011 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-1013 - https://wpscan.com/vulnerability/eed70659-9e3e-42a2-b427-56c52e0fbc0d -CVE-2022-1014 - https://wpscan.com/vulnerability/eb9e202d-04aa-4343-86a2-4aa2edaa7f6b -CVE-2022-1015 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ -CVE-2022-1015 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html -CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/01/13/2 -CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/02/23/1 -CVE-2022-1016 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ -CVE-2022-1020 - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 -CVE-2022-1021 - https://huntr.dev/bounties/a8187478-75e1-4d62-b894-651269401ca3 -CVE-2022-1022 - https://huntr.dev/bounties/2e4ac6b5-7357-415d-9633-65c636b20e94 -CVE-2022-1023 - https://wpscan.com/vulnerability/163069cd-98a8-4cfb-8b58-a6727a7d5c48 -CVE-2022-1026 - https://www.rapid7.com/blog/post/2022/03/29/cve-2022-1026-kyocera-net-view-address-book-exposure/ -CVE-2022-1027 - https://wpscan.com/vulnerability/9dbb0d6d-bc84-4b85-8aa5-fa2a8e6fa5e3 -CVE-2022-1028 - https://wpscan.com/vulnerability/16fc08ec-8476-4f3c-93ea-6a51ed880dd5 -CVE-2022-1029 - https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba -CVE-2022-1031 - https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457 -CVE-2022-1032 - https://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622 -CVE-2022-1033 - https://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045 -CVE-2022-1034 - https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7 -CVE-2022-1037 - https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957 -CVE-2022-1040 - http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html -CVE-2022-1040 - https://www.exploit-db.com/exploits/51006 -CVE-2022-1043 - http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html -CVE-2022-1044 - https://huntr.dev/bounties/ff878be9-563a-4d0e-99c1-fc3c767f6d3e -CVE-2022-1045 - https://huntr.dev/bounties/b0c4f992-4ac8-4479-82f4-367ed1a2a826 -CVE-2022-1046 - https://wpscan.com/vulnerability/a1ae4512-0b5b-4f36-8334-14633bf24758 -CVE-2022-1047 - https://wpscan.com/vulnerability/078bd5f6-64f7-4665-825b-9fd0c2b7b91b -CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5 -CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5/ -CVE-2022-1051 - https://wpscan.com/vulnerability/cb2fa587-da2f-460e-a402-225df7744765 -CVE-2022-1052 - https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7 -CVE-2022-1054 - https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d -CVE-2022-1055 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -CVE-2022-1055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 -CVE-2022-1056 - https://gitlab.com/libtiff/libtiff/-/issues/391 -CVE-2022-1057 - https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243 -CVE-2022-1058 - https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d -CVE-2022-1061 - https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 -CVE-2022-1061 - https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7 -CVE-2022-1062 - https://wpscan.com/vulnerability/e770ba87-95d2-40c9-89cc-5d7390e9cbb0 -CVE-2022-1063 - https://wpscan.com/vulnerability/f90c528b-8c3a-4f9a-aa36-099c24abe082 -CVE-2022-1064 - https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40 -CVE-2022-1065 - https://www.redguard.ch/advisories/abacus_mfa_bypass.txt -CVE-2022-1071 - https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3 -CVE-2022-1073 - https://vuldb.com/?id.194839 -CVE-2022-1074 - https://vuldb.com/?id.194845 -CVE-2022-1075 - https://vuldb.com/?id.194846 -CVE-2022-1077 - https://vuldb.com/?id.194848 -CVE-2022-1078 - https://vuldb.com/?id.194856 -CVE-2022-1079 - https://vuldb.com/?id.195426 -CVE-2022-1081 - https://vuldb.com/?id.195640 -CVE-2022-1082 - https://vuldb.com/?id.195641 -CVE-2022-1083 - https://vuldb.com/?id.195642 -CVE-2022-1084 - https://vuldb.com/?id.195643 -CVE-2022-1085 - https://vuldb.com/?id.194857 -CVE-2022-1086 - https://github.com/xiahao90/CVEproject/blob/main/DolphinPHPV1.5.0_xss.md -CVE-2022-1086 - https://vuldb.com/?id.195368 -CVE-2022-1087 - https://github.com/liaojia-99/project/blob/main/htmly/1.md -CVE-2022-1087 - https://vuldb.com/?id.195203 -CVE-2022-1088 - https://wpscan.com/vulnerability/e86d456d-7a54-43e8-acf1-0b6a0a8bb41b -CVE-2022-1089 - https://wpscan.com/vulnerability/75a9fd23-7fa9-4cb1-a55b-ec5deae5d6fa -CVE-2022-1090 - https://wpscan.com/vulnerability/3993fa42-b4c3-462b-b568-0a08fe112c19 -CVE-2022-1091 - https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3 -CVE-2022-1092 - https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc546af61 -CVE-2022-1093 - https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553 -CVE-2022-1094 - https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329 -CVE-2022-1095 - https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b -CVE-2022-1103 - https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18 -CVE-2022-1104 - https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52 -CVE-2022-1106 - https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f -CVE-2022-1112 - https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 -CVE-2022-1113 - https://wpscan.com/vulnerability/ea438e84-f842-4cb9-b6c0-550cd8187701 -CVE-2022-1115 - https://github.com/ImageMagick/ImageMagick/issues/4974 -CVE-2022-1116 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -CVE-2022-1119 - https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit -CVE-2022-1119 - https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606 -CVE-2022-1122 - https://github.com/uclouvain/openjpeg/issues/1368 -CVE-2022-1123 - https://wpscan.com/vulnerability/03e0d4d5-0184-4a15-b8ac-fdc2010e4812 -CVE-2022-1134 - http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html -CVE-2022-1148 - https://gitlab.com/gitlab-org/gitlab/-/issues/350687 -CVE-2022-1152 - https://wpscan.com/vulnerability/1c55fda9-e938-4267-be77-a6d73ee46af3 -CVE-2022-1153 - https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 -CVE-2022-1154 - https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 -CVE-2022-1154 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-1155 - https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1 -CVE-2022-1156 - https://wpscan.com/vulnerability/76ad4273-6bf4-41e9-99a8-bf6d634608ac -CVE-2022-1160 - https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c -CVE-2022-1162 - http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html -CVE-2022-1163 - http://packetstormsecurity.com/files/166629/minewebcms-1.15.2-Cross-Site-Scripting.html -CVE-2022-1163 - https://huntr.dev/bounties/44d40f34-c391-40c0-a517-12a2c0258149 -CVE-2022-1163 - https://www.exploit-db.com/exploits/50853 -CVE-2022-1164 - https://wpscan.com/vulnerability/157a9a76-3e5f-4d27-aefc-cb9cb88b3286 -CVE-2022-1165 - https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 -CVE-2022-1166 - https://wpscan.com/vulnerability/ea6646ac-f71f-4340-965d-fab272da5189 -CVE-2022-1167 - https://wpscan.com/vulnerability/a30a1430-c474-4cd1-877c-35c4ab624170 -CVE-2022-1168 - https://wpscan.com/vulnerability/bcf38e87-011e-4540-8bfb-c93443a4a490 -CVE-2022-1169 - https://wpscan.com/vulnerability/f3a1dcad-528a-4ecc-ac8e-728caa7c9878 -CVE-2022-1170 - https://wpscan.com/vulnerability/2ecb18e6-b575-4a20-bd31-94d24f1d1efc -CVE-2022-1171 - https://wpscan.com/vulnerability/dc5eace4-542f-47e9-b870-a6aae6a38b0f -CVE-2022-1172 - https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264 -CVE-2022-1173 - https://huntr.dev/bounties/b6016e95-9f48-4945-89cb-199b6e072218 -CVE-2022-1174 - https://gitlab.com/gitlab-org/gitlab/-/issues/338721 -CVE-2022-1175 - http://packetstormsecurity.com/files/166829/Gitlab-14.9-Cross-Site-Scripting.html -CVE-2022-1176 - https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3 -CVE-2022-1182 - https://wpscan.com/vulnerability/01d108bb-d134-4651-9c74-babcc88da177 -CVE-2022-1185 - https://gitlab.com/gitlab-org/gitlab/-/issues/349148 -CVE-2022-1191 - https://huntr.dev/bounties/7264a2e1-17e7-4244-93e4-49ec14f282b3 -CVE-2022-1192 - https://wpscan.com/vulnerability/18660c71-5a89-4ef6-b0dd-7a166e3449d6 -CVE-2022-1193 - https://gitlab.com/gitlab-org/gitlab/-/issues/351823 -CVE-2022-1194 - https://wpscan.com/vulnerability/62be0991-f095-43cf-a167-3daaed254594 -CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8 -CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469 -CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71 -CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e -CVE-2022-1196 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750679 -CVE-2022-1201 - https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b -CVE-2022-1202 - https://wpscan.com/vulnerability/53c8190c-baef-4807-970b-f01ab440576a -CVE-2022-1203 - https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820 -CVE-2022-1207 - https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb -CVE-2022-1210 - https://gitlab.com/libtiff/libtiff/-/issues/402 -CVE-2022-1210 - https://vuldb.com/?id.196363 -CVE-2022-1211 - https://github.com/tildearrow/furnace/issues/325 -CVE-2022-1211 - https://vuldb.com/?id.196371 -CVE-2022-1212 - https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe -CVE-2022-1213 - https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1 -CVE-2022-1216 - https://wpscan.com/vulnerability/31a5b138-3d9e-4cd6-b85c-d20406ab51bd -CVE-2022-1217 - https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c -CVE-2022-1218 - https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65 -CVE-2022-1219 - https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6 -CVE-2022-1220 - https://wpscan.com/vulnerability/eb58f43e-4304-40e7-9e0f-d0d6fe049724 -CVE-2022-1221 - https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9 -CVE-2022-1222 - https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d -CVE-2022-1223 - https://huntr.dev/bounties/baec4c23-2466-4b13-b3c0-eaf1d000d4ab -CVE-2022-1224 - https://huntr.dev/bounties/cd9e1508-5682-427e-a921-14b4f520b85a -CVE-2022-1225 - https://huntr.dev/bounties/49b44cfa-d142-4d79-b529-7805507169d2 -CVE-2022-1231 - https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604 -CVE-2022-1233 - https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c -CVE-2022-1235 - https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705 -CVE-2022-1237 - https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 -CVE-2022-1238 - https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200 -CVE-2022-1239 - https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee -CVE-2022-1240 - https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc -CVE-2022-1241 - https://wpscan.com/vulnerability/3258393a-eafb-4356-994e-2ff8ce223c9b -CVE-2022-1243 - https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7 -CVE-2022-1244 - https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 -CVE-2022-1247 - https://bugzilla.redhat.com/show_bug.cgi?id=2066799 -CVE-2022-1248 - http://packetstormsecurity.com/files/166609/SAP-Information-System-1.0.0-Missing-Authorization.html -CVE-2022-1248 - https://vuldb.com/?id.196550 -CVE-2022-1250 - https://wpscan.com/vulnerability/1f8cb0b9-7447-44db-8d13-292db5b17718 -CVE-2022-1251 - https://wpscan.com/vulnerability/34b3fc35-381a-4bd7-87e3-f1ef0a15a349 -CVE-2022-1252 - https://0g.vc/posts/insecure-cipher-gnuboard5/ -CVE-2022-1252 - https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb -CVE-2022-1253 - https://huntr.dev/bounties/1-other-strukturag/libde265 -CVE-2022-1255 - https://wpscan.com/vulnerability/22fe68c4-8f47-491e-be87-5e8e40535a82 -CVE-2022-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 -CVE-2022-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 -CVE-2022-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 -CVE-2022-1263 - https://www.openwall.com/lists/oss-security/2022/04/07/1 -CVE-2022-1265 - https://wpscan.com/vulnerability/9b66819d-8479-4c0b-b206-7f7ff769f758 -CVE-2022-1266 - https://wpscan.com/vulnerability/7800d583-fcfc-4360-9dc3-af3f73e12ab4 -CVE-2022-1267 - https://wpscan.com/vulnerability/ed2971c2-b99c-4320-ac46-bea5a0a493ed -CVE-2022-1268 - https://wpscan.com/vulnerability/6d596afb-cac3-4ef2-9742-235c068d1006 -CVE-2022-1269 - https://wpscan.com/vulnerability/65ff0e71-0fcd-4357-9b00-143cb18901bf -CVE-2022-1273 - https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603 -CVE-2022-1274 - https://herolab.usd.de/security-advisories/usd-2021-0033/ -CVE-2022-1275 - https://wpscan.com/vulnerability/bc2e5be3-cd2b-4ee9-8d7a-cabce46b7092 -CVE-2022-1276 - https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25 -CVE-2022-1280 - https://www.openwall.com/lists/oss-security/2022/04/12/3 -CVE-2022-1281 - https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de -CVE-2022-1282 - https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6 -CVE-2022-1283 - https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013 -CVE-2022-1284 - https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 -CVE-2022-1285 - https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d -CVE-2022-1286 - https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189 -CVE-2022-1287 - https://vuldb.com/?id.196750 -CVE-2022-1288 - https://vuldb.com/?id.196751 -CVE-2022-1289 - https://github.com/tildearrow/furnace/issues/325#issuecomment-1094139655 -CVE-2022-1290 - https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed -CVE-2022-1291 - https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5 -CVE-2022-1292 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-1294 - https://wpscan.com/vulnerability/205a24b8-6d14-4458-aecd-79748e1324c7 -CVE-2022-1295 - https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a -CVE-2022-1296 - https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0 -CVE-2022-1297 - https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac -CVE-2022-1298 - https://wpscan.com/vulnerability/e124d1ab-3e02-4ca5-8218-ce635e8bf074 -CVE-2022-1299 - https://wpscan.com/vulnerability/8c46adb1-82d7-4621-a8c3-15cd90e98b96 -CVE-2022-1301 - https://wpscan.com/vulnerability/69b75983-1010-453e-bf67-27b4a2a327a8 -CVE-2022-1303 - https://wpscan.com/vulnerability/590b446d-f8bc-49b0-93e7-2a6f2e6f62f1 -CVE-2022-1316 - https://huntr.dev/bounties/e7835226-1b20-4546-b256-3f625badb022 -CVE-2022-1320 - https://wpscan.com/vulnerability/43581d6b-333a-48d9-a1ae-b9479da8ff87 -CVE-2022-1321 - https://wpscan.com/vulnerability/b8784995-0deb-4c83-959f-52b37881e05c -CVE-2022-1322 - https://wpscan.com/vulnerability/e1724471-26bd-4cb3-a279-51783102ed0c -CVE-2022-1323 - https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b -CVE-2022-1324 - https://wpscan.com/vulnerability/2ce2a387-acc8-482a-9452-a4d9acb187fd -CVE-2022-1325 - https://github.com/GreycLab/CImg/issues/343 -CVE-2022-1325 - https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/ -CVE-2022-1326 - https://wpscan.com/vulnerability/f57615d9-a567-4c2a-9f06-2c6b61f56074 -CVE-2022-1327 - https://wpscan.com/vulnerability/6b71eb38-0a4a-49d1-96bc-84bbe675be1e -CVE-2022-1328 - http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html -CVE-2022-1329 - http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html -CVE-2022-1332 - https://mattermost.com/security-updates/ -CVE-2022-1333 - https://mattermost.com/security-updates/ -CVE-2022-1334 - https://wpscan.com/vulnerability/af3b32c9-f386-4bb6-a362-86a27f49a739 -CVE-2022-1335 - https://wpscan.com/vulnerability/cfc80857-8674-478f-9604-7a8849e5b85e -CVE-2022-1336 - https://wpscan.com/vulnerability/39e127f1-c36e-4699-892f-3755ee17bab6 -CVE-2022-1337 - https://mattermost.com/security-updates/ -CVE-2022-1338 - https://wpscan.com/vulnerability/51b91d0e-33af-41ce-b95f-d422586f1d5f -CVE-2022-1339 - https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9 -CVE-2022-1340 - https://huntr.dev/bounties/4746f149-fc55-48a1-a7ab-fd7c7412c05a -CVE-2022-1344 - https://huntr.dev/bounties/35f66966-af13-4f07-9734-0c50fdfc3a8c -CVE-2022-1345 - https://huntr.dev/bounties/781b5c2a-bc98-41a0-a276-ea12399e5a25 -CVE-2022-1346 - https://huntr.dev/bounties/8fe435b0-192f-41ca-b41e-580fcd34892f -CVE-2022-1347 - https://huntr.dev/bounties/6059501f-05d2-4e76-ae03-5eb64835e6bf -CVE-2022-1349 - https://wpscan.com/vulnerability/7ee95a53-5fe9-404c-a77a-d1218265e4aa -CVE-2022-1351 - https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615 -CVE-2022-1354 - https://gitlab.com/libtiff/libtiff/-/issues/319 -CVE-2022-1355 - https://gitlab.com/libtiff/libtiff/-/issues/400 -CVE-2022-1379 - https://huntr.dev/bounties/0d737527-86e1-41d1-9d37-b2de36bc063a -CVE-2022-1380 - https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12 -CVE-2022-1381 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1381 - https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4 -CVE-2022-1382 - https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1 -CVE-2022-1383 - https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9 -CVE-2022-1384 - https://mattermost.com/security-updates/ -CVE-2022-1385 - https://mattermost.com/security-updates/ -CVE-2022-1386 - https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b -CVE-2022-1386 - https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/ -CVE-2022-1387 - https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347 -CVE-2022-1388 - http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html -CVE-2022-1388 - http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html -CVE-2022-1388 - http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html -CVE-2022-1390 - https://packetstormsecurity.com/files/166476/ -CVE-2022-1390 - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 -CVE-2022-1391 - https://packetstormsecurity.com/files/166533/ -CVE-2022-1391 - https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac -CVE-2022-1392 - https://packetstormsecurity.com/files/166534/ -CVE-2022-1392 - https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815 -CVE-2022-1393 - https://wpscan.com/vulnerability/3491b889-94dd-4507-9fed-58f48d8275cf -CVE-2022-1394 - https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3 -CVE-2022-1395 - https://wpscan.com/vulnerability/e5c06b38-fab8-44af-84dc-df94eb72ce80 -CVE-2022-1396 - https://packetstormsecurity.com/files/166531/ -CVE-2022-1396 - https://wpscan.com/vulnerability/721ddc3e-ab24-4834-bd47-4eb6700439a9 -CVE-2022-1397 - https://huntr.dev/bounties/5f69e094-ab8c-47a3-b01d-8c12a3b14c61 -CVE-2022-1398 - https://wpscan.com/vulnerability/5440d177-e995-403e-b2c9-42ceda14579e -CVE-2022-1399 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ -CVE-2022-1400 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ -CVE-2022-1401 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ -CVE-2022-1407 - https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d -CVE-2022-1408 - https://wpscan.com/vulnerability/48dccf4c-07e0-4877-867d-f8f43aeb5705 -CVE-2022-1409 - https://wpscan.com/vulnerability/1330f8f7-4a59-4e9d-acae-21656a4101fe -CVE-2022-1410 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ -CVE-2022-1411 - https://huntr.dev/bounties/75c7cf09-d118-4f91-9686-22b142772529 -CVE-2022-1412 - https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2 -CVE-2022-1416 - https://gitlab.com/gitlab-org/gitlab/-/issues/342988 -CVE-2022-1417 - https://hackerone.com/reports/1075586 -CVE-2022-1418 - https://wpscan.com/vulnerability/3851e61e-f462-4259-af0a-8d832809d559 -CVE-2022-1420 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1420 - https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326 -CVE-2022-1421 - https://wpscan.com/vulnerability/a7a24e8e-9056-4967-bcad-b96cc0c5b249 -CVE-2022-1422 - https://wpscan.com/vulnerability/29aff4bf-1691-4dc1-a670-1f2c9a765a3b -CVE-2022-1424 - https://wpscan.com/vulnerability/147b4097-dec8-4542-b122-7b237db81c05 -CVE-2022-1425 - https://wpscan.com/vulnerability/b110e2f7-4aa3-47b5-a8f2-0a7fe53cc467 -CVE-2022-1427 - https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301 -CVE-2022-1429 - https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e -CVE-2022-1430 - https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541 -CVE-2022-1432 - https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf -CVE-2022-1435 - https://wpscan.com/vulnerability/ef5aa8a7-23a7-4ce0-bb09-d9c986386114 -CVE-2022-1436 - https://wpscan.com/vulnerability/d5c6f894-6ad1-46f4-bd77-17ad9234cfc3 -CVE-2022-1437 - https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038 -CVE-2022-1439 - https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0 -CVE-2022-1440 - https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 -CVE-2022-1441 - https://github.com/gpac/gpac/issues/2175 -CVE-2022-1442 - https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf -CVE-2022-1444 - https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa -CVE-2022-1445 - https://huntr.dev/bounties/f4420149-5236-4051-a458-5d4f1d5b7abd -CVE-2022-1451 - https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 -CVE-2022-1452 - https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6 -CVE-2022-1455 - https://wpscan.com/vulnerability/8267046e-870e-4ccd-b920-340233ed3b93 -CVE-2022-1456 - https://wpscan.com/vulnerability/1f41fc5c-18d0-493d-9a7d-8b521ab49f85 -CVE-2022-1457 - https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046 -CVE-2022-1458 - https://huntr.dev/bounties/78674078-0796-4102-a81e-f699cd6981b0 -CVE-2022-1462 - https://seclists.org/oss-sec/2022/q2/155 -CVE-2022-1464 - https://huntr.dev/bounties/34a12146-3a5d-4efc-a0f8-7a3ae04b198d -CVE-2022-1465 - https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7 -CVE-2022-1466 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt -CVE-2022-1466 - https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076 -CVE-2022-1467 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ -CVE-2022-1469 - https://wpscan.com/vulnerability/88869380-173d-4d4f-81d8-3c20add5f98d -CVE-2022-1470 - https://wpscan.com/vulnerability/13bb796f-7a17-47c9-a46f-a1d6ca4b6b91 -CVE-2022-1471 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html -CVE-2022-1471 - https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2 -CVE-2022-1472 - https://wpscan.com/vulnerability/9c608b14-dc5e-469e-b97a-84696fae804c -CVE-2022-1474 - https://wpscan.com/vulnerability/2d821464-c502-4f71-afee-97b3dea16612 -CVE-2022-1503 - https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md -CVE-2022-1503 - https://vuldb.com/?id.198542 -CVE-2022-1504 - https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6 -CVE-2022-1506 - https://wpscan.com/vulnerability/ee4f6786-27e4-474c-85e0-715b0c0f2776 -CVE-2022-1507 - https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95 -CVE-2022-1508 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 -CVE-2022-1509 - https://huntr.dev/bounties/09e69dff-f281-4e51-8312-ed7ab7606338 -CVE-2022-1511 - https://huntr.dev/bounties/4a1723e9-5bc4-4c4b-bceb-1c45964cc71d -CVE-2022-1512 - https://packetstormsecurity.com/files/166820/ -CVE-2022-1512 - https://wpscan.com/vulnerability/a754a516-07fc-44f1-9c34-31e963460301 -CVE-2022-1514 - https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c -CVE-2022-1526 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md -CVE-2022-1527 - https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16 -CVE-2022-1528 - https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f -CVE-2022-1529 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770048 -CVE-2022-1530 - https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6 -CVE-2022-1531 - https://huntr.dev/bounties/fc4eb544-ef1e-412d-9fdb-0ceb04e038fe -CVE-2022-1532 - https://wpscan.com/vulnerability/d106cd93-cb9b-4558-9a29-0d556fd7c9e1 -CVE-2022-1533 - https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3 -CVE-2022-1534 - https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d -CVE-2022-1536 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/automad%3C%3D1.10.9%20Stored%20Cross-Site%20Scripting(XSS).md -CVE-2022-1536 - https://vuldb.com/?id.198706 -CVE-2022-1537 - https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d -CVE-2022-1538 - https://wpscan.com/vulnerability/b19adf7c-3983-487b-9b46-0f2922b08c1c/ -CVE-2022-1539 - https://wpscan.com/vulnerability/50f70927-9677-4ba4-a388-0a41ed356523 -CVE-2022-1540 - https://wpscan.com/vulnerability/77a524d8-0b1a-407a-98d2-d8d0ed78fa0f -CVE-2022-1541 - https://wpscan.com/vulnerability/053a9815-cf0a-472e-844a-3dea407ce022 -CVE-2022-1542 - https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359 -CVE-2022-1543 - https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9f -CVE-2022-1544 - https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4 -CVE-2022-1546 - https://wpscan.com/vulnerability/5ec6182c-6917-4c48-90ce-e0ebe38e7595 -CVE-2022-1547 - https://wpscan.com/vulnerability/83eca346-7045-414e-81fc-e0d9b735f0bd -CVE-2022-1548 - https://mattermost.com/security-updates/ -CVE-2022-1549 - https://wpscan.com/vulnerability/afef06f5-71a6-4372-9648-0db59f9b254f -CVE-2022-1551 - https://wpscan.com/vulnerability/51b4752a-7922-444d-a022-f1c7159b5d84 -CVE-2022-1553 - https://huntr.dev/bounties/b398e4c9-6cdf-4973-ad86-da796cde221f -CVE-2022-1554 - https://huntr.dev/bounties/7acac778-5ba4-4f02-99e2-e4e17a81e600 -CVE-2022-1555 - https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687 -CVE-2022-1556 - https://packetstormsecurity.com/files/166918/ -CVE-2022-1556 - https://wpscan.com/vulnerability/04890549-6bd1-44dd-8bce-7125c01be5d4 -CVE-2022-1557 - https://packetstormsecurity.com/files/166564/ -CVE-2022-1557 - https://wpscan.com/vulnerability/e2b6dbf5-8709-4a2c-90be-3214ff55ed56 -CVE-2022-1558 - https://packetstormsecurity.com/files/166839/ -CVE-2022-1558 - https://wpscan.com/vulnerability/0414dad4-e90b-4122-8b77-a8a958ab824d -CVE-2022-1559 - https://packetstormsecurity.com/files/166530/ -CVE-2022-1559 - https://wpscan.com/vulnerability/99059337-c3cd-4e91-9a03-df32a05b719c -CVE-2022-1560 - https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de -CVE-2022-1562 - https://wpscan.com/vulnerability/8e5b1e4f-c132-42ee-b2d0-7306ab4ab615 -CVE-2022-1563 - https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456/ -CVE-2022-1564 - https://wpscan.com/vulnerability/a487c7e7-667c-4c92-a427-c43cc13b348d -CVE-2022-1565 - http://packetstormsecurity.com/files/171578/WordPress-WP-All-Import-3.6.7-Remote-Code-Execution.html -CVE-2022-1566 - https://wpscan.com/vulnerability/0af030d8-b676-4826-91c0-98706b816f3c -CVE-2022-1568 - https://wpscan.com/vulnerability/88328d17-ffc9-4b94-8b01-ad2fd3047fbc -CVE-2022-1569 - https://wpscan.com/vulnerability/5a2756c1-9abf-4fd6-8ce2-9f840514dfcc -CVE-2022-1570 - https://wpscan.com/vulnerability/c0257564-48ee-4d02-865f-82c8b5e793c9 -CVE-2022-1571 - https://huntr.dev/bounties/4578a690-73e5-4313-840c-ee15e5329741 -CVE-2022-1572 - https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5 -CVE-2022-1573 - https://wpscan.com/vulnerability/9c1acd9c-999f-4a35-a272-1ad31552e685 -CVE-2022-1574 - https://wpscan.com/vulnerability/c36d0ea8-bf5c-4af9-bd3d-911eb02adc14 -CVE-2022-1575 - https://huntr.dev/bounties/033d3423-eb05-4b53-a747-1bfcba873127 -CVE-2022-1576 - https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf -CVE-2022-1577 - https://wpscan.com/vulnerability/39388900-266d-4308-88e7-d40ca6bbe346 -CVE-2022-1578 - https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b -CVE-2022-1579 - https://wpscan.com/vulnerability/6f3d40fa-458b-44f0-9407-763e80b29668 -CVE-2022-1580 - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a -CVE-2022-1582 - https://wpscan.com/vulnerability/cbb75383-4351-4488-aaca-ddb0f6f120cd -CVE-2022-1583 - https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9 -CVE-2022-1584 - https://huntr.dev/bounties/69f4ca67-d615-4f25-b2d1-19df7bf1107d -CVE-2022-1585 - https://wpscan.com/vulnerability/e709958c-7bce-45d7-9a0a-6e0ed12cd03f -CVE-2022-1589 - https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633 -CVE-2022-1590 - https://github.com/joinia/webray.com.cn/blob/main/Bludit/Bluditreadme.md -CVE-2022-1590 - https://vuldb.com/?id.199060 -CVE-2022-1591 - https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa -CVE-2022-1592 - https://huntr.dev/bounties/352b39da-0f2e-415a-9793-5480cae8bd27 -CVE-2022-1593 - https://wpscan.com/vulnerability/67678666-402b-4010-ac56-7067a0f40185 -CVE-2022-1594 - https://wpscan.com/vulnerability/bb0efc5e-044b-47dc-9101-9aae40cdbaa5 -CVE-2022-1595 - https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b -CVE-2022-1597 - https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e -CVE-2022-1598 - https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8 -CVE-2022-1599 - https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6 -CVE-2022-1600 - https://wpscan.com/vulnerability/2b7445fd-0992-47cd-9a48-f5f18d8171f7 -CVE-2022-1601 - https://wpscan.com/vulnerability/f6d3408c-2ceb-4a89-822b-13f5272a5fce -CVE-2022-1603 - https://wpscan.com/vulnerability/0e12ba6f-a86f-4cc6-9013-8a15586098d0 -CVE-2022-1604 - https://wpscan.com/vulnerability/557c1c49-7195-4085-b67a-9fd8aca57845 -CVE-2022-1605 - https://wpscan.com/vulnerability/a1b69615-690a-423b-afdf-729dcd32bc2f -CVE-2022-1608 - https://wpscan.com/vulnerability/56d2d55b-bd09-47af-988c-7f47eec4151f -CVE-2022-1609 - https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/ -CVE-2022-1610 - https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93 -CVE-2022-1611 - https://wpscan.com/vulnerability/3843b867-7784-4976-b5ab-8a1e7d45618a -CVE-2022-1612 - https://wpscan.com/vulnerability/a8cec792-6435-4047-bca8-597c104dbc1f -CVE-2022-1613 - https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b -CVE-2022-1614 - https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 -CVE-2022-1616 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1616 - https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2 -CVE-2022-1617 - https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/ -CVE-2022-1618 - https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d/ -CVE-2022-1619 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1619 - https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 -CVE-2022-1620 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1620 - https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51 -CVE-2022-1621 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1621 - https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb -CVE-2022-1622 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1624 - https://wpscan.com/vulnerability/06e547fd-cddf-4294-87be-54f58d6138a7 -CVE-2022-1625 - https://wpscan.com/vulnerability/e1693318-900c-47f1-bb77-008b0d33327f -CVE-2022-1626 - https://wpscan.com/vulnerability/3d1f90d9-45da-42f8-93f8-15c8a4ff90ca -CVE-2022-1627 - https://wpscan.com/vulnerability/70ce3654-8fd9-4c33-b594-fac13ec26137 -CVE-2022-1629 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1629 - https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee -CVE-2022-1630 - https://wpscan.com/vulnerability/178d0c49-3a93-4948-8734-f3d7518361b3 -CVE-2022-1631 - http://packetstormsecurity.com/files/167376/Microweber-CMS-1.2.15-Account-Takeover.html -CVE-2022-1631 - https://huntr.dev/bounties/5494e258-5c7b-44b4-b443-85cff7ae0ba4 -CVE-2022-1643 - https://wpscan.com/vulnerability/73111c7e-c772-4bed-b282-854c1ae57444 -CVE-2022-1644 - https://wpscan.com/vulnerability/0184d70a-548c-4258-b01d-7477f03cc346 -CVE-2022-1645 - https://wpscan.com/vulnerability/915b7d79-f9dd-451d-bf8f-6d14ec3e67d2 -CVE-2022-1646 - https://wpscan.com/vulnerability/8a32896d-bf1b-4d7b-8d84-dc38b877928b -CVE-2022-1647 - https://wpscan.com/vulnerability/8e8f6b08-90ab-466a-9828-dca0c0da2c9c -CVE-2022-1649 - https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449 -CVE-2022-1650 - https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e -CVE-2022-1651 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b -CVE-2022-1653 - https://wpscan.com/vulnerability/52eff451-8ce3-4ac4-b530-3196aa82db48 -CVE-2022-1663 - https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70 -CVE-2022-1671 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff8376ade4f668130385839cef586a0990f8ef87 -CVE-2022-1672 - https://wpscan.com/vulnerability/5c5955d7-24f0-45e6-9c27-78ef50446dad -CVE-2022-1673 - https://wpscan.com/vulnerability/14283389-a6b8-4dd8-9441-f16fcc4ab3c0 -CVE-2022-1674 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1674 - https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385 -CVE-2022-1681 - https://huntr.dev/bounties/591b11e1-7504-4a96-99c6-08f2b419e767 -CVE-2022-1682 - https://huntr.dev/bounties/e962d191-93e2-405e-a6af-b4a4e4d02527 -CVE-2022-1683 - https://wpscan.com/vulnerability/359d145b-c365-4e7c-a12e-c26b7b8617ce -CVE-2022-1684 - https://bulletin.iese.de/post/cube-slider_1-2 -CVE-2022-1684 - https://wpscan.com/vulnerability/db7fb815-945a-41c7-8932-834cc646a806 -CVE-2022-1685 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1 -CVE-2022-1685 - https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97 -CVE-2022-1686 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2 -CVE-2022-1686 - https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71 -CVE-2022-1687 - https://bulletin.iese.de/post/logo-slider_1-4-8 -CVE-2022-1687 - https://wpscan.com/vulnerability/e7506906-5c3d-4963-ae24-55f18c3e5081 -CVE-2022-1688 - https://bulletin.iese.de/post/note-press_0-1-10_1 -CVE-2022-1688 - https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92 -CVE-2022-1689 - https://bulletin.iese.de/post/note-press_0-1-10_2 -CVE-2022-1689 - https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28 -CVE-2022-1690 - https://bulletin.iese.de/post/note-press_0-1-10_3 -CVE-2022-1690 - https://wpscan.com/vulnerability/54e16f0a-667c-44ea-98ad-0306c4a35d9d -CVE-2022-1691 - https://bulletin.iese.de/post/realty-workstation_1-0-6 -CVE-2022-1691 - https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049 -CVE-2022-1692 - https://bulletin.iese.de/post/cp-image-store_1-0-67 -CVE-2022-1692 - https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571 -CVE-2022-1694 - https://wpscan.com/vulnerability/169a6c81-6c76-4f29-8f60-b2551042b962 -CVE-2022-1695 - https://wpscan.com/vulnerability/2ac5b87b-1390-41ce-af6e-c50e5709baaa -CVE-2022-1697 - https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm -CVE-2022-1698 - https://huntr.dev/bounties/f4ab747b-e89a-4514-9432-ac1ea56639f3 -CVE-2022-1699 - https://huntr.dev/bounties/3024b2bb-50ca-46a2-85db-1cc916791cda -CVE-2022-1709 - https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc -CVE-2022-1710 - https://wpscan.com/vulnerability/ed162ccc-88e6-41e8-b24d-1b9f77a038b6 -CVE-2022-1711 - https://huntr.dev/bounties/c32afff5-6ad5-4d4d-beea-f55ab4925797 -CVE-2022-1712 - https://wpscan.com/vulnerability/9ab9626f-66d5-47e4-bdb8-d8fb519f9515 -CVE-2022-1713 - https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11 -CVE-2022-1714 - https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0 -CVE-2022-1715 - https://huntr.dev/bounties/58918962-ccb5-47f9-bb43-ffd8cae1ef24 -CVE-2022-1716 - https://fluidattacks.com/advisories/tyler/ -CVE-2022-1717 - https://wpscan.com/vulnerability/79a532e9-bc6e-4722-8d67-9c15720d06a6 -CVE-2022-1718 - https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e -CVE-2022-1719 - https://huntr.dev/bounties/790ba3fd-41e9-4393-8e2f-71161b56279b -CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-1720 - https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8 -CVE-2022-1721 - https://huntr.dev/bounties/000931cc-6d0e-4a4f-b4d8-4ba46ba0e699 -CVE-2022-1722 - https://huntr.dev/bounties/c903d563-ba97-44e9-b421-22bfab1e0cbd -CVE-2022-1723 - https://huntr.dev/bounties/619851a4-2a08-4196-80e9-ab41953491d8 -CVE-2022-1724 - https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae -CVE-2022-1725 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1725 - https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c -CVE-2022-1726 - https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea -CVE-2022-1727 - https://huntr.dev/bounties/b242e806-fc8c-41c0-aad7-e0c9c37ecdee -CVE-2022-1728 - https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519 -CVE-2022-1729 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 -CVE-2022-1730 - https://huntr.dev/bounties/fded4835-bd49-4533-8311-1d71e0ed7c00 -CVE-2022-1731 - https://www.tenable.com/security/research/tra-2022-17 -CVE-2022-1732 - https://wpscan.com/vulnerability/3620a087-032e-4a5f-99c8-f9e7e9c29813 -CVE-2022-1733 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1733 - https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a -CVE-2022-1734 - https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 -CVE-2022-1735 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1735 - https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9 -CVE-2022-1752 - https://huntr.dev/bounties/66e9bfa9-598f-49ab-a472-752911df3f2d -CVE-2022-1753 - https://vuldb.com/?id.199974 -CVE-2022-1753 - https://www.youtube.com/watch?v=tIzOZtp2fxA -CVE-2022-1753 - https://youtu.be/tIzOZtp2fxA -CVE-2022-1754 - https://huntr.dev/bounties/2f65af7c-a74b-46a6-8847-5db6785f1cf2 -CVE-2022-1755 - https://wpscan.com/vulnerability/62b2548e-6b59-48b8-b1c2-9bd47e634982 -CVE-2022-1756 - https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072 -CVE-2022-1757 - https://wpscan.com/vulnerability/e648633e-868b-45b2-870a-308a2f9cb7f5 -CVE-2022-1758 - https://wpscan.com/vulnerability/211816ce-d2bc-469b-9a8e-e0c2a5c4461b -CVE-2022-1759 - https://wpscan.com/vulnerability/d8e63f78-f38a-4f68-96ba-8059d175cea8 -CVE-2022-1760 - https://wpscan.com/vulnerability/c7906b1d-25c9-4f34-bd02-66824878b88e/ -CVE-2022-1761 - https://wpscan.com/vulnerability/31b413e1-d4b5-463e-9910-37876881c062 -CVE-2022-1762 - https://wpscan.com/vulnerability/03254977-37cc-4365-979b-326f9637be85 -CVE-2022-1763 - https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8 -CVE-2022-1764 - https://wpscan.com/vulnerability/04305e4e-37e3-4f35-bf66-3b79b99d2868 -CVE-2022-1765 - https://wpscan.com/vulnerability/b50e7622-c1dc-485b-a5f5-b010b40eef20 -CVE-2022-1767 - https://huntr.dev/bounties/b1ce040c-9ed1-4d36-9b48-82df42310868 -CVE-2022-1768 - http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html -CVE-2022-1768 - https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc -CVE-2022-1769 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1769 - https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c -CVE-2022-1770 - https://huntr.dev/bounties/74a252a2-8bf6-4f88-a180-b90338a239fa -CVE-2022-1771 - https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb -CVE-2022-1772 - https://wpscan.com/vulnerability/02addade-d191-4e45-b7b5-2f3f673679ab -CVE-2022-1773 - https://wpscan.com/vulnerability/c2cc3d8e-f3ac-46c6-871e-894cf3ba67f6 -CVE-2022-1774 - https://huntr.dev/bounties/6ac07c49-bb7f-47b5-b361-33e6757b8757 -CVE-2022-1775 - https://huntr.dev/bounties/0966043c-602f-463e-a6e5-9a1745f4fbfa -CVE-2022-1776 - https://wpscan.com/vulnerability/46ed56db-9b9d-4390-80fc-343a01fcc3c9 -CVE-2022-1777 - https://wpscan.com/vulnerability/a50dc7f8-a9e6-41fa-a047-ad1c3bc309b4 -CVE-2022-1779 - https://wpscan.com/vulnerability/45117646-88ff-41d4-8abd-e2f18d4b693e -CVE-2022-1780 - https://wpscan.com/vulnerability/dd22ea1e-49a9-4b06-8dd9-bb224110f98a -CVE-2022-1781 - https://wpscan.com/vulnerability/7f2ae2c9-57d4-46a0-a9a1-585ec543b153 -CVE-2022-1782 - https://huntr.dev/bounties/7555693f-94e4-4183-98cb-3497da6df028 -CVE-2022-1784 - https://huntr.dev/bounties/d1330ce8-cccb-4bae-b9a9-a03b97f444a5 -CVE-2022-1785 - https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109 -CVE-2022-1787 - https://wpscan.com/vulnerability/b85920b3-dfc1-4112-abd8-ce6a5d91ae0d -CVE-2022-1788 - https://wpscan.com/vulnerability/c39719e5-dadd-4414-a96d-5e70a1e3d462 -CVE-2022-1790 - https://wpscan.com/vulnerability/176d5761-4f01-4173-a70c-6052a6a9963e -CVE-2022-1791 - https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431 -CVE-2022-1792 - https://wpscan.com/vulnerability/44555c79-480d-4b6a-9fda-988183c06909 -CVE-2022-1793 - https://wpscan.com/vulnerability/fd8b84b4-6944-4638-bdc1-1cb6aaabd42c -CVE-2022-1795 - https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc -CVE-2022-1796 - https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e -CVE-2022-1800 - https://wpscan.com/vulnerability/4267109c-0ca2-441d-889d-fb39c235f128 -CVE-2022-1801 - https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06 -CVE-2022-1803 - https://huntr.dev/bounties/47cc6621-2474-40f9-ab68-3cf62389a124 -CVE-2022-1806 - https://huntr.dev/bounties/101a2a31-0b27-433a-ad3a-a216238ca4d1 -CVE-2022-1809 - https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17 -CVE-2022-1810 - https://huntr.dev/bounties/9b2d7579-032e-42da-b736-4b10a868eacb -CVE-2022-1811 - https://huntr.dev/bounties/4d97f665-c9f1-4c38-b774-692255a7c44c -CVE-2022-1812 - https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3 -CVE-2022-1813 - https://huntr.dev/bounties/b255cf59-9ecd-4255-b9a2-b40b5ec6c572 -CVE-2022-1814 - https://wpscan.com/vulnerability/b5624fb3-b110-4b36-a00f-20bbc3a8fdb9 -CVE-2022-1815 - https://huntr.dev/bounties/6e856a25-9117-47c6-9375-52f78876902f -CVE-2022-1816 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md -CVE-2022-1817 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md -CVE-2022-1817 - https://vuldb.com/?id.200559 -CVE-2022-1818 - https://wpscan.com/vulnerability/9d6c628f-cdea-481c-a2e5-101dc167718d -CVE-2022-1819 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Student%20Information%20System/SIS_Stored_Cross_Site_Scripting(XSS).md -CVE-2022-1825 - https://huntr.dev/bounties/c6ad4cef-1b3d-472f-af0e-68e46341dfe5 -CVE-2022-1826 - https://wpscan.com/vulnerability/b9dba241-d94c-4ce5-8730-445ba8005e66 -CVE-2022-1827 - https://wpscan.com/vulnerability/0bd25283-e079-4010-b139-cce9afb1d54d -CVE-2022-1828 - https://wpscan.com/vulnerability/877ce7a5-b1ff-4d03-9cd8-6beed5595af8 -CVE-2022-1829 - https://wpscan.com/vulnerability/8353aa12-dbb7-433f-9dd9-d61a3f303d4b -CVE-2022-1830 - https://wpscan.com/vulnerability/a6b3e927-41e2-4e48-b9e1-8c58a1b9a933 -CVE-2022-1831 - https://wpscan.com/vulnerability/91c44a4f-b599-46c0-a8df-d1fb87472abe -CVE-2022-1832 - https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275 -CVE-2022-1837 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md -CVE-2022-1837 - https://vuldb.com/?id.200582 -CVE-2022-1838 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_admin_SQL_Inject.md -CVE-2022-1838 - https://vuldb.com/?id.200583 -CVE-2022-1839 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_login_email_SQL_injection.md -CVE-2022-1839 - https://vuldb.com/?id.200584 -CVE-2022-1840 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/Home%20Clean%20Services%20Management%20System%20Stored%20Cross-Site%20Scripting(XSS).md -CVE-2022-1842 - https://wpscan.com/vulnerability/77aafeb9-af80-490a-b3d7-4fa973bab61c -CVE-2022-1843 - https://wpscan.com/vulnerability/aa59f811-2375-4593-93d4-f587f9870ed1 -CVE-2022-1844 - https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d -CVE-2022-1845 - https://wpscan.com/vulnerability/6ee3e9e2-ff57-41c4-8cc5-b258801a8a02 -CVE-2022-1846 - https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a -CVE-2022-1847 - https://wpscan.com/vulnerability/d34ed713-4cca-4cef-b431-f132f1b10aa6 -CVE-2022-1848 - https://huntr.dev/bounties/8dfe0877-e44b-4a1a-8eee-5c03c93ae90a -CVE-2022-1849 - https://huntr.dev/bounties/881f8f36-d5c8-470d-8261-f109e6d5db4b -CVE-2022-1850 - https://huntr.dev/bounties/07755f07-a412-4911-84a4-2f8c03c8f7ce -CVE-2022-1851 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1851 - https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d -CVE-2022-1883 - https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7 -CVE-2022-1885 - https://wpscan.com/vulnerability/8416cbcf-086d-42ff-b2a4-f3954c8ff0c8 -CVE-2022-1886 - https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a -CVE-2022-1889 - https://wpscan.com/vulnerability/ee3832e2-ce40-4063-a23e-44c7f7f5f46a -CVE-2022-1893 - https://huntr.dev/bounties/a1cfe61b-5248-4a73-9a80-0b764edc9b26 -CVE-2022-1894 - https://wpscan.com/vulnerability/68af14ef-ca66-40d6-a1e5-09f74e2cd971 -CVE-2022-1895 - https://wpscan.com/vulnerability/bd9ef7e0-ebbb-4b91-8c58-265218a3c536 -CVE-2022-1896 - https://wpscan.com/vulnerability/3e8bd875-2435-4a15-8ee8-8a00882b499c -CVE-2022-1897 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1897 - https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118 -CVE-2022-1898 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1898 - https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea -CVE-2022-1899 - https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04 -CVE-2022-1903 - https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08 -CVE-2022-1904 - https://wpscan.com/vulnerability/92215d07-d129-49b4-a838-0de1a944c06b -CVE-2022-1905 - https://wpscan.com/vulnerability/ff5fd894-aff3-400a-8eec-fad9d50f788e -CVE-2022-1906 - https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338 -CVE-2022-1907 - https://huntr.dev/bounties/4eb0fa3e-4480-4fb5-8ec0-fbcd71de6012 -CVE-2022-1908 - https://huntr.dev/bounties/a7436e88-0488-4bd4-816f-2e2c803e93e8 -CVE-2022-1909 - https://huntr.dev/bounties/8f83eb8f-51a8-41c0-bc7d-077f48faebdc -CVE-2022-1910 - https://wpscan.com/vulnerability/8afe1638-66fa-44c7-9d02-c81573193b47 -CVE-2022-1913 - https://wpscan.com/vulnerability/2cafef43-e64a-4897-8c41-f0ed473d7ead -CVE-2022-1914 - https://wpscan.com/vulnerability/8c8dad47-8591-47dc-b84f-8c5cb18b2d78 -CVE-2022-1915 - https://wpscan.com/vulnerability/c3c28edf-19bc-4f3a-b58e-f1c67557aa29 -CVE-2022-1916 - https://wpscan.com/vulnerability/d16a0c3d-4318-4ecd-9e65-fc4165af8808 -CVE-2022-1921 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224 -CVE-2022-1922 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 -CVE-2022-1923 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 -CVE-2022-1924 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 -CVE-2022-1925 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 -CVE-2022-1926 - https://huntr.dev/bounties/3fda8902-68ee-4734-86a3-9551ab17c893 -CVE-2022-1927 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1927 - https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777 -CVE-2022-1928 - https://huntr.dev/bounties/6336ec42-5c4d-4f61-ae38-2bb539f433d2 -CVE-2022-1929 - https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/ -CVE-2022-1930 - https://research.jfrog.com/vulnerabilities/eth-account-redos-xray-248681/ -CVE-2022-1931 - https://huntr.dev/bounties/50c4cb63-65db-41c5-a16d-0560d7131fde -CVE-2022-1932 - https://wpscan.com/vulnerability/005c2300-f6bd-416e-97a6-d42284bbb093 -CVE-2022-1933 - https://wpscan.com/vulnerability/6cedb27f-6140-4cba-836f-63de98e521bf -CVE-2022-1934 - https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f -CVE-2022-1937 - https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9 -CVE-2022-1938 - https://wpscan.com/vulnerability/70aed824-c53e-4672-84c9-039dc34ed5fa -CVE-2022-1939 - https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f -CVE-2022-1940 - https://gitlab.com/gitlab-org/gitlab/-/issues/359142 -CVE-2022-1941 - http://www.openwall.com/lists/oss-security/2022/09/27/1 -CVE-2022-1941 - https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf -CVE-2022-1942 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1942 - https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071 -CVE-2022-1943 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1ad35dd0548ce947d97aaf92f7f2f9a202951cf -CVE-2022-1945 - https://wpscan.com/vulnerability/4ad297e5-c92d-403c-abf4-9decf7e8378b -CVE-2022-1946 - https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940 -CVE-2022-1947 - https://huntr.dev/bounties/cb4d0ab3-51ba-4a42-9e38-ac0e544266f1 -CVE-2022-1948 - https://gitlab.com/gitlab-org/security/gitlab/-/issues/673 -CVE-2022-1950 - https://wpscan.com/vulnerability/4352283f-dd43-4827-b417-0c55d0f4637d -CVE-2022-1951 - https://wpscan.com/vulnerability/f56f7244-e8ec-4a87-9419-643bc13b45a0 -CVE-2022-1952 - https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 -CVE-2022-1953 - https://wpscan.com/vulnerability/b66d6682-edbc-435f-a73a-dced32a32770 -CVE-2022-1955 - https://fluidattacks.com/advisories/tempest/ -CVE-2022-1955 - https://github.com/oxen-io/session-android/pull/897 -CVE-2022-1956 - https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a -CVE-2022-1957 - https://wpscan.com/vulnerability/ad3f6f3d-e12c-4867-906c-73aa001c7351 -CVE-2022-1958 - https://vuldb.com/?id.201960 -CVE-2022-1960 - https://wpscan.com/vulnerability/bc97dd57-e9f6-4bc3-a4c2-40303786ae4a -CVE-2022-1961 - https://gist.github.com/Xib3rR4dAr/02a21cd0ea0b7bf586131c5eebb69f1d -CVE-2022-1964 - https://wpscan.com/vulnerability/52cf7e3c-2a0c-45c4-be27-be87424f1338 -CVE-2022-1967 - https://wpscan.com/vulnerability/02d25736-c796-49bd-b774-66e0e3fcf4c9 -CVE-2022-1968 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-1968 - https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b -CVE-2022-1971 - https://wpscan.com/vulnerability/1bffbbef-7876-43a6-9cb0-6e09bb4ff2b0 -CVE-2022-1977 - https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d -CVE-2022-1979 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Message'%20Stored%20Cross-Site%20Scripting(XSS).md -CVE-2022-1979 - https://vuldb.com/?id.200950 -CVE-2022-1980 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Telephone'%20Stored%20Cross-Site%20Scripting(XSS).md -CVE-2022-1980 - https://vuldb.com/?id.200951 -CVE-2022-1982 - https://mattermost.com/security-updates/ -CVE-2022-1986 - https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930 -CVE-2022-1987 - https://huntr.dev/bounties/e8197737-7557-443e-a59f-2a86e8dda75f -CVE-2022-1988 - https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c -CVE-2022-1990 - https://wpscan.com/vulnerability/42f1bf1f-95a8-41ee-a637-88deb80ab870 -CVE-2022-1991 - https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 -CVE-2022-1991 - https://vuldb.com/?id.201276 -CVE-2022-1992 - https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab -CVE-2022-1993 - https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d -CVE-2022-1994 - https://wpscan.com/vulnerability/114d94be-b567-4b4b-9a44-f2c05cdbe18e -CVE-2022-1995 - https://wpscan.com/vulnerability/62fb399d-3327-45d0-b10f-769d2d164903 -CVE-2022-1996 - https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1 -CVE-2022-1997 - https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d -CVE-2022-1998 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d -CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-2000 - https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0 -CVE-2022-2014 - https://huntr.dev/bounties/911a4ada-7fd6-467a-a464-b88604b16ffc -CVE-2022-2015 - https://huntr.dev/bounties/0d32f448-155c-4b71-9291-9e8bcd522b37 -CVE-2022-2016 - https://huntr.dev/bounties/5fa17e9b-c767-46b4-af64-aafb8c2aa521 -CVE-2022-2017 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI)2.md -CVE-2022-2017 - https://vuldb.com/?id.201365 -CVE-2022-2018 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI).md -CVE-2022-2018 - https://vuldb.com/?id.201366 -CVE-2022-20186 - http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html -CVE-2022-2019 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System--.md -CVE-2022-2019 - https://vuldb.com/?id.201367 -CVE-2022-2020 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(XSS).md -CVE-2022-2020 - https://vuldb.com/?id.201368 -CVE-2022-2022 - https://huntr.dev/bounties/f6082949-40d3-411c-b613-23ada2691913 -CVE-2022-2023 - https://huntr.dev/bounties/0f35b1d3-56e6-49e4-bc5a-830f52e094b3 -CVE-2022-2024 - https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97 -CVE-2022-2026 - https://huntr.dev/bounties/dcfa6790-c609-4ed5-ba5e-8f31f98e5e11 -CVE-2022-2027 - https://huntr.dev/bounties/fb99c27c-7eaa-48db-be39-b804cb83871d -CVE-2022-2028 - https://huntr.dev/bounties/588fb241-bc8f-40fc-82a4-df249956d69f -CVE-2022-2029 - https://huntr.dev/bounties/9052a874-634c-473e-a2b3-65112181543f -CVE-2022-2034 - https://wpscan.com/vulnerability/aba3dd58-7a8e-4129-add5-4dd5972c0426 -CVE-2022-2035 - https://www.tenable.com/security/research/tra-2022-21 -CVE-2022-2036 - https://huntr.dev/bounties/c7715149-f99c-4d62-a5c6-c78bfdb41905 -CVE-2022-2037 - https://huntr.dev/bounties/4431ef84-93f2-4bc5-bc1a-97d7f229b28e -CVE-2022-2040 - https://wpscan.com/vulnerability/ab53a70c-57d5-400f-b11f-b1b7b2b0cf01 -CVE-2022-2041 - https://wpscan.com/vulnerability/8edb11bc-9e8d-4a98-8538-aaff0f072109 -CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-2042 - https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba -CVE-2022-2046 - https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 -CVE-2022-2050 - https://wpscan.com/vulnerability/016453e3-803b-4a67-8ea7-2d228c2998d4 -CVE-2022-2054 - https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7 -CVE-2022-2056 - https://gitlab.com/libtiff/libtiff/-/issues/415 -CVE-2022-2057 - https://gitlab.com/libtiff/libtiff/-/issues/427 -CVE-2022-2058 - https://gitlab.com/libtiff/libtiff/-/issues/428 -CVE-2022-2060 - https://huntr.dev/bounties/2acfc8fe-247c-4f88-aeaa-042b6b8690a0 -CVE-2022-2061 - https://huntr.dev/bounties/365ab61f-9a63-421c-97e6-21d4653021f0 -CVE-2022-20612 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-20613 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-20614 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-20615 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-2062 - https://huntr.dev/bounties/35593b4c-f127-4699-8ad3-f0b2203a8ef6 -CVE-2022-2063 - https://huntr.dev/bounties/156f405b-21d6-4384-9bff-17ebfe484e20 -CVE-2022-2064 - https://huntr.dev/bounties/39523d51-fc5c-48b8-a082-171da79761bb -CVE-2022-20659 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW -CVE-2022-2066 - https://huntr.dev/bounties/da4bbbfd-501f-4c7e-be83-47778103cb59 -CVE-2022-20660 - http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html -CVE-2022-20660 - http://seclists.org/fulldisclosure/2022/Jan/34 -CVE-2022-2067 - https://huntr.dev/bounties/a85a53a4-3009-4f41-ac33-8bed8bbe16a8 -CVE-2022-20699 - http://packetstormsecurity.com/files/167113/Cisco-RV340-SSL-VPN-Unauthenticated-Remote-Code-Execution.html -CVE-2022-20699 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20700 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20701 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20702 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20703 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20704 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20705 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html -CVE-2022-20705 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20706 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20707 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html -CVE-2022-20707 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20708 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20709 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-2071 - https://wpscan.com/vulnerability/d3653976-9e0a-4f2b-87f7-26b5e7a74b9d -CVE-2022-20710 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20711 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20712 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20713 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO -CVE-2022-20713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO -CVE-2022-20718 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc -CVE-2022-20719 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj -CVE-2022-2072 - https://wpscan.com/vulnerability/3014540c-21b3-481c-83a1-ce3017151af4 -CVE-2022-2073 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66 -CVE-2022-20738 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p -CVE-2022-20749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -CVE-2022-20759 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24 -CVE-2022-20775 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc -CVE-2022-20777 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g -CVE-2022-20779 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492 -CVE-2022-2078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85 -CVE-2022-20780 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg -CVE-2022-2079 - https://huntr.dev/bounties/2615adf2-ff40-4623-97fb-2e4a3800202a -CVE-2022-20791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd -CVE-2022-20795 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV -CVE-2022-2080 - https://wpscan.com/vulnerability/5395d196-a39a-4a58-913e-5b5b9d6123a5 -CVE-2022-20816 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE -CVE-2022-20822 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM -CVE-2022-20822 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/ -CVE-2022-20828 - http://packetstormsecurity.com/files/168256/Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection.html -CVE-2022-20829 - https://github.com/jbaines-r7/theway -CVE-2022-2083 - https://wpscan.com/vulnerability/2bbfc855-6901-462f-8a93-120d7fb5d268 -CVE-2022-2085 - https://bugs.ghostscript.com/show_bug.cgi?id=704945 -CVE-2022-2086 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbanksql.md -CVE-2022-2086 - https://vuldb.com/?id.202034 -CVE-2022-2087 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbankxss.md -CVE-2022-2087 - https://vuldb.com/?id.202035 -CVE-2022-2089 - https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8 -CVE-2022-2090 - https://wpscan.com/vulnerability/0201f365-7acb-4640-bd3f-7119432f4917 -CVE-2022-2091 - https://wpscan.com/vulnerability/03e7c2dc-1c6d-4cff-af59-6b41ead74978 -CVE-2022-20917 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM -CVE-2022-2092 - https://wpscan.com/vulnerability/87546554-276a-45fe-b2aa-b18bfc55db2d -CVE-2022-20921 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs -CVE-2022-20929 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-4f6q-86ww-gmcr -CVE-2022-2093 - https://wpscan.com/vulnerability/a11628e4-f47b-42d8-9c09-7536d49fce4c -CVE-2022-2094 - https://wpscan.com/vulnerability/c9a106e1-29ae-47ad-907b-01086af3d3fb -CVE-2022-20956 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx -CVE-2022-20956 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx -CVE-2022-20956 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-broken-access-control/ -CVE-2022-20959 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M -CVE-2022-20959 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/ -CVE-2022-20964 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx -CVE-2022-20964 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ -CVE-2022-20965 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx -CVE-2022-20965 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ -CVE-2022-20966 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx -CVE-2022-20966 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ -CVE-2022-20967 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx -CVE-2022-20967 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ -CVE-2022-20968 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U -CVE-2022-20968 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U -CVE-2022-2098 - https://huntr.dev/bounties/a5d6c854-e158-49e9-bf40-bddc93dda7e6 -CVE-2022-2099 - https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b -CVE-2022-2100 - https://wpscan.com/vulnerability/7d8b7871-baa5-4a54-a9e9-2c9d302cdd12 -CVE-2022-2101 - https://medium.com/%40andreabocchetti88/download-manager-3-2-43-contributor-cross-site-scripting-fa4970fba45c -CVE-2022-2101 - https://packetstormsecurity.com/files/167573/ -CVE-2022-2111 - https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1 -CVE-2022-2112 - https://huntr.dev/bounties/e57c36e7-fa39-435f-944a-3a52ee066f73 -CVE-2022-21122 - https://snyk.io/vuln/SNYK-JS-METACALC-2826197 -CVE-2022-21129 - https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747 -CVE-2022-2113 - https://huntr.dev/bounties/4cae8442-c042-43c2-ad89-6f666eaf3d57 -CVE-2022-21134 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1447 -CVE-2022-2114 - https://wpscan.com/vulnerability/59911ba4-fa06-498a-9e7c-0c337cce691c -CVE-2022-21144 - https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756 -CVE-2022-21145 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442 -CVE-2022-21147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1452 -CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036 -CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035 -CVE-2022-2115 - https://wpscan.com/vulnerability/1f0ae535-c560-4510-ae9a-059e2435ad39 -CVE-2022-21154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1464 -CVE-2022-21159 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467 -CVE-2022-21159 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1467 -CVE-2022-2116 - https://wpscan.com/vulnerability/01568da4-2ecf-4cf9-8030-31868ce0a87a -CVE-2022-21164 - https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723 -CVE-2022-21165 - https://security.snyk.io/vuln/SNYK-JS-FONTCONVERTER-2976194 -CVE-2022-21169 - https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 -CVE-2022-21169 - https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 -CVE-2022-21178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1457 -CVE-2022-2118 - https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c -CVE-2022-21182 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1472 -CVE-2022-21184 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1461 -CVE-2022-21186 - https://security.snyk.io/vuln/SNYK-JS-ACRONTUMFILESYSTEMTEMPLATE-2419071 -CVE-2022-21187 - https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204 -CVE-2022-21189 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308 -CVE-2022-21189 - https://snyk.io/vuln/SNYK-JS-DEXIE-2607042 -CVE-2022-21190 - https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808 -CVE-2022-21190 - https://snyk.io/vuln/SNYK-JS-CONVICT-2774757 -CVE-2022-21191 - https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 -CVE-2022-21192 - https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0 -CVE-2022-21192 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916 -CVE-2022-21195 - https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643 -CVE-2022-21199 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1448 -CVE-2022-21201 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1456 -CVE-2022-21208 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 -CVE-2022-21210 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444 -CVE-2022-21211 - https://snyk.io/vuln/SNYK-JS-POSIX-2400719 -CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623 -CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622 -CVE-2022-21213 - https://snyk.io/vuln/SNYK-JS-MOUT-2342654 -CVE-2022-21217 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1445 -CVE-2022-2122 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 -CVE-2022-21222 - https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488 -CVE-2022-21223 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280 -CVE-2022-21225 - http://packetstormsecurity.com/files/170180/Intel-Data-Center-Manager-4.1-SQL-Injection.html -CVE-2022-21225 - http://seclists.org/fulldisclosure/2022/Dec/1 -CVE-2022-21227 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470 -CVE-2022-21227 - https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645 -CVE-2022-2123 - https://wpscan.com/vulnerability/46b634f6-92bc-4e00-a4c0-c25135c61922 -CVE-2022-21231 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655 -CVE-2022-21234 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443 -CVE-2022-21235 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078 -CVE-2022-21236 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446 -CVE-2022-21238 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1469 -CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-2124 - https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42 -CVE-2022-21242 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21243 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21244 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21245 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21246 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21247 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21248 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21249 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-2125 - https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705 -CVE-2022-21250 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21251 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21252 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21253 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21254 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21255 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21256 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21257 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21258 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21259 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-2126 - https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e -CVE-2022-21260 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21261 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21262 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21263 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21264 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21265 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21266 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21267 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21268 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21269 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21270 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21271 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21271 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21272 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21273 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21274 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21275 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21276 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21277 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21278 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21279 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2128 - https://huntr.dev/bounties/ec40ec76-c7db-4384-a33b-024f3dd21d75 -CVE-2022-21280 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21281 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21282 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21283 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21284 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21285 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21286 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21287 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21288 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21289 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2129 - https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352 -CVE-2022-21290 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21291 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21292 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21293 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21294 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21295 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21296 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21297 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21298 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21299 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2130 - https://huntr.dev/bounties/0142970a-5cb8-4dba-8bbc-4fa2f3bee65c -CVE-2022-21300 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21301 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21302 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21303 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21304 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21305 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21306 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21307 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21308 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21309 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21310 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21311 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21312 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21313 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21314 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21315 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21316 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21317 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21318 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21319 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21320 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21321 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21322 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21323 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21324 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21325 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21326 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21327 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21328 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21329 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2133 - https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de -CVE-2022-21330 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21331 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21332 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21333 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21334 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21335 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21336 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21337 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21338 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21339 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-2134 - https://huntr.dev/bounties/57b0f272-a97f-4cb3-b546-c863c68a561a -CVE-2022-21340 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21341 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21342 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21344 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21345 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21346 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21347 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21348 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21349 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21350 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21351 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21352 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21353 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21354 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21355 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21356 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21357 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21358 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21359 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21360 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21361 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21362 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21363 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21364 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21365 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21366 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21367 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21368 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21369 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21370 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21371 - http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html -CVE-2022-21371 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21372 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21373 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21374 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21375 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21375 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21376 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21377 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21378 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21379 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21380 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21381 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21382 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21383 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea010070d0a7497253d5a6f919f6dd107450b31a -CVE-2022-21386 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21387 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21388 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21389 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21390 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21391 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21392 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21393 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21394 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21395 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21396 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21397 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21398 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21399 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21400 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21401 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21402 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21403 - https://www.oracle.com/security-alerts/cpujan2022.html -CVE-2022-21404 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21405 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21410 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21411 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21412 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21413 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21414 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21415 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21416 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21417 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21418 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21419 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21420 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21421 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21422 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21423 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21424 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21425 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21426 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21427 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21428 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21429 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2143 - http://packetstormsecurity.com/files/168108/Advantech-iView-NetworkServlet-Command-Injection.html -CVE-2022-21430 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21431 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21432 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21434 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21435 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21436 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21437 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21438 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21439 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2144 - https://wpscan.com/vulnerability/419054d4-95e8-4f4a-b864-a98b3e18435a -CVE-2022-21440 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21441 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21442 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21443 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21444 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21445 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21446 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21447 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21448 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21449 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21450 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21451 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21452 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21453 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21454 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21455 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21456 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21457 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21458 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21459 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-2146 - https://wpscan.com/vulnerability/adc1d752-331e-44af-b5dc-b463d56c2cb4 -CVE-2022-21460 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21461 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21462 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21463 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21464 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21465 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21466 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21467 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21468 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21469 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21470 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21471 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21472 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21473 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21474 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21475 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21476 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21477 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21478 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21479 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-2148 - https://wpscan.com/vulnerability/92214311-da6d-49a8-95c9-86f47635264f -CVE-2022-21480 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21481 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21482 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21483 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21484 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21485 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21486 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21487 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21488 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21489 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-2149 - https://wpscan.com/vulnerability/40191e87-8648-47ef-add0-d7180e8ffe13 -CVE-2022-21490 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21491 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21492 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21493 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21494 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21496 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21497 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21498 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21499 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html -CVE-2022-21500 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21508 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21509 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2151 - https://wpscan.com/vulnerability/7c08e4c1-57c5-471c-a990-dcb9fd7ce0f4 -CVE-2022-21510 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21511 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21512 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21513 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21514 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21515 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21516 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21517 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21518 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21519 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2152 - https://wpscan.com/vulnerability/e972e2c5-0d56-4d2a-81cc-2b0dff750124 -CVE-2022-21520 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21521 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21522 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21523 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21524 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21525 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21526 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21527 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21528 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21529 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2153 - https://www.openwall.com/lists/oss-security/2022/06/22/1 -CVE-2022-21530 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21531 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21532 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21533 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21534 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21535 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21536 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21537 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21538 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21539 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21540 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21541 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21542 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21543 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21544 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21545 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21547 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21548 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21549 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21550 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21551 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21552 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21553 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21554 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21555 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21556 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21557 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21558 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21559 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21560 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21561 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21562 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21563 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21564 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21565 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21566 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21567 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21568 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21569 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21570 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21571 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21572 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21573 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21574 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21575 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21576 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21577 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21578 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21579 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21580 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21581 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21582 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21583 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21584 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21585 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21586 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-21587 - http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html -CVE-2022-21587 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21589 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21590 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21591 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21592 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21593 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21594 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21595 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21596 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21597 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21598 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21599 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21600 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21601 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21602 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21603 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21604 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21605 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21606 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21607 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21608 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21609 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21610 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21611 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21612 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21613 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21614 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21615 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21616 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21617 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21618 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21619 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21620 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21621 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21622 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21623 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21624 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21625 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21626 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21627 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21628 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21629 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21630 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21631 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21632 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21633 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21634 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21635 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21636 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21637 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21638 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21639 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21640 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21641 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-21649 - https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/ -CVE-2022-21650 - https://www.huntr.dev/bounties/ae424798-de01-4972-b73b-2db674f82368/ -CVE-2022-21658 - https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946 -CVE-2022-2166 - https://huntr.dev/bounties/2f96f990-01c2-44ea-ae47-58bdb3aa455b -CVE-2022-21661 - http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html -CVE-2022-21661 - https://www.exploit-db.com/exploits/50663 -CVE-2022-2167 - https://wpscan.com/vulnerability/ad35fbae-1e90-47a0-b1d2-f8d91a5db90e -CVE-2022-21677 - https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27 -CVE-2022-2168 - https://wpscan.com/vulnerability/66789b32-049e-4440-8b19-658649851010 -CVE-2022-21680 - https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf -CVE-2022-21681 - https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj -CVE-2022-21689 - https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc -CVE-2022-2169 - https://wpscan.com/vulnerability/a9f4aab7-b42b-4bb6-b05d-05407f935230 -CVE-2022-21694 - https://github.com/onionshare/onionshare/issues/1389 -CVE-2022-21699 - https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x -CVE-2022-2170 - https://wpscan.com/vulnerability/6eaef938-ce98-4d57-8a1d-fa9d1ae3d6ed -CVE-2022-2171 - https://wpscan.com/vulnerability/11937296-7ecf-4b94-b274-06f7990dbede -CVE-2022-21711 - https://github.com/liyansong2018/elfspirit/issues/1 -CVE-2022-21716 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-2172 - https://wpscan.com/vulnerability/bfb6ed12-ae64-4075-9d0b-5620e998df74 -CVE-2022-21720 - https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83 -CVE-2022-21723 - http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html -CVE-2022-2173 - https://wpscan.com/vulnerability/86bfe0cc-a579-43d6-a26b-6e06000251f6 -CVE-2022-2174 - https://huntr.dev/bounties/ac68e3fc-8cf1-4a62-90ee-95c4b2bad607 -CVE-2022-2175 - https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55 -CVE-2022-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1451 -CVE-2022-21797 - https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033 -CVE-2022-2180 - https://wpscan.com/vulnerability/c330f92b-1e21-414f-b316-d5e97cb62bd1 -CVE-2022-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1450 -CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781 -CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960 -CVE-2022-21803 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2632450 -CVE-2022-21803 - https://snyk.io/vuln/SNYK-JS-NCONF-2395478 -CVE-2022-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1440 -CVE-2022-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1468 -CVE-2022-2181 - https://wpscan.com/vulnerability/68ddf343-6e69-44a7-bd33-72004053d41e -CVE-2022-21810 - https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 -CVE-2022-21817 - https://nvidia.custhelp.com/app/answers/detail/a_id/5318 -CVE-2022-2182 - https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8 -CVE-2022-21820 - http://packetstormsecurity.com/files/167396/NVIDIA-Data-Center-GPU-Manager-Remote-Memory-Corruption.html -CVE-2022-21824 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-21824 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2183 - https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975 -CVE-2022-2184 - https://wpscan.com/vulnerability/e777784f-5ba0-4966-be27-e0a0cbbfe056 -CVE-2022-2186 - https://wpscan.com/vulnerability/b766103a-7f91-4d91-9f9c-bff4bfd53f57 -CVE-2022-2187 - https://wpscan.com/vulnerability/4fd2f1ef-39c6-4425-8b4d-1a332dabac8d -CVE-2022-2188 - https://kcm.trellix.com/corporate/index?page=content&id=SB10383 -CVE-2022-21881 - http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html -CVE-2022-21882 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html -CVE-2022-2189 - https://wpscan.com/vulnerability/b6ed4d64-ee98-41bd-a97a-8350c2a8a546 -CVE-2022-2190 - https://wpscan.com/vulnerability/1af4beb6-ba16-429b-acf2-43f9594f5ace -CVE-2022-21907 - http://packetstormsecurity.com/files/165566/HTTP-Protocol-Stack-Denial-Of-Service-Remote-Code-Execution.html -CVE-2022-21907 - http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html -CVE-2022-21907 - https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907 -CVE-2022-2194 - https://wpscan.com/vulnerability/ecf4b707-dea9-42d0-9ade-d788a9f97190 -CVE-2022-21948 - https://bugzilla.suse.com/show_bug.cgi?id=1197930 -CVE-2022-21952 - https://bugzilla.suse.com/show_bug.cgi?id=1199512 -CVE-2022-2196 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 -CVE-2022-2198 - https://wpscan.com/vulnerability/867248f2-d497-4ea8-b3f8-0f2e8aaaa2bd -CVE-2022-21999 - http://packetstormsecurity.com/files/166344/Windows-SpoolFool-Privilege-Escalation.html -CVE-2022-22026 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html -CVE-2022-22031 - http://packetstormsecurity.com/files/168094/Windows-Credential-Guard-Domain-Joined-Device-Public-Key-Privilege-Escalation.html -CVE-2022-22049 - http://packetstormsecurity.com/files/168069/Windows-sxssrv-BaseSrvActivationContextCacheDuplicateUnicodeString-Heap-Buffer-Overflow.html -CVE-2022-22057 - http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html -CVE-2022-2206 - https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668 -CVE-2022-2207 - https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9 -CVE-2022-2208 - https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1 -CVE-2022-2210 - https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25 -CVE-2022-22107 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107 -CVE-2022-22108 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108 -CVE-2022-22109 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109 -CVE-2022-22110 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110 -CVE-2022-22111 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111 -CVE-2022-22112 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22112 -CVE-2022-22113 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22113 -CVE-2022-22114 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22114 -CVE-2022-22115 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22115 -CVE-2022-22116 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116 -CVE-2022-22117 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22117 -CVE-2022-2212 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/File_Upload/POC.md -CVE-2022-2212 - https://vuldb.com/?id.202758 -CVE-2022-22120 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22120 -CVE-2022-22121 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22121 -CVE-2022-22123 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123 -CVE-2022-22124 - https://github.com/halo-dev/halo/issues/1575 -CVE-2022-22124 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124 -CVE-2022-22125 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125 -CVE-2022-2213 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md -CVE-2022-2213 - https://vuldb.com/?id.202759 -CVE-2022-22137 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1449 -CVE-2022-22138 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367 -CVE-2022-2214 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Sql%20Injection/POC.md -CVE-2022-2214 - https://vuldb.com/?id.202760 -CVE-2022-22140 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1458 -CVE-2022-22143 - https://snyk.io/vuln/SNYK-JS-CONVICT-2340604 -CVE-2022-22144 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1459 -CVE-2022-22149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441 -CVE-2022-2215 - https://wpscan.com/vulnerability/daa9b6c1-1ee1-434c-9f88-fd273b7e20bb -CVE-2022-22150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439 -CVE-2022-2216 - https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1 -CVE-2022-2217 - https://huntr.dev/bounties/4e046c63-b1ca-4bcc-b418-29796918a71b -CVE-2022-2218 - https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5 -CVE-2022-2219 - https://wpscan.com/vulnerability/1240797c-7f45-4c36-83f0-501c544ce76a -CVE-2022-2222 - https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b -CVE-2022-22263 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22264 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22265 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22266 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22267 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22268 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22269 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22270 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22271 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22272 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 -CVE-2022-22291 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-22292 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-22293 - https://github.com/Dolibarr/dolibarr/issues/20237 -CVE-2022-2231 - https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5 -CVE-2022-22312 - https://www.ibm.com/support/pages/node/6574671 -CVE-2022-22323 - https://www.ibm.com/support/pages/node/6574671 -CVE-2022-2239 - https://wpscan.com/vulnerability/42127d96-547f-46cb-95d0-a19a8fe7580e -CVE-2022-2241 - https://wpscan.com/vulnerability/8670d196-972b-491b-8d9b-25994a345f57 -CVE-2022-2242 - https://www.kuka.com/advisories-CVE-2022-2242 -CVE-2022-2245 - https://wpscan.com/vulnerability/33705003-1f82-4b0c-9b4b-d4de75da309c -CVE-2022-2250 - https://gitlab.com/gitlab-org/gitlab/-/issues/355509 -CVE-2022-2251 - https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27386 -CVE-2022-2252 - https://huntr.dev/bounties/4d394bcc-a000-4f96-8cd2-8c565e1347e8 -CVE-2022-22521 - http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html -CVE-2022-22521 - http://seclists.org/fulldisclosure/2022/Apr/42 -CVE-2022-22528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22530 - https://launchpad.support.sap.com/#/notes/3112928 -CVE-2022-22531 - https://launchpad.support.sap.com/#/notes/3112928 -CVE-2022-22532 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22533 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22534 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22535 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22536 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22537 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22538 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22539 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22540 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22541 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22542 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22543 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22544 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22545 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22546 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-22547 - http://packetstormsecurity.com/files/167562/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Information-Disclosure.html -CVE-2022-2257 - https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89 -CVE-2022-2260 - https://wpscan.com/vulnerability/831b3afa-8fa3-4cb7-8374-36d0c368292f -CVE-2022-2261 - https://wpscan.com/vulnerability/f6091d7b-97b5-42f2-b2f4-09a0fe6d5a21 -CVE-2022-2262 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_all_room.php%20id%20SQL%20inject.md -CVE-2022-2262 - https://vuldb.com/?id.202981 -CVE-2022-2263 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_room_cat.php%20id%20SQL%20inject.md -CVE-2022-2263 - https://vuldb.com/?id.202982 -CVE-2022-2264 - https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c -CVE-2022-22666 - http://packetstormsecurity.com/files/167144/AppleVideoDecoder-CreateHeaderBuffer-Out-Of-Bounds-Free.html -CVE-2022-2267 - https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870 -CVE-2022-2268 - https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7 -CVE-2022-2269 - https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 -CVE-2022-22700 - https://fluidattacks.com/advisories/porter/ -CVE-2022-22701 - https://fluidattacks.com/advisories/hendrix/ -CVE-2022-22702 - https://fluidattacks.com/advisories/joplin/ -CVE-2022-2271 - https://wpscan.com/vulnerability/b064940f-9614-4b7b-b2c4-e79528746833 -CVE-2022-22719 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-22720 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-22720 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22721 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-22721 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2273 - https://wpscan.com/vulnerability/724729d9-1c4a-485c-9c90-a27664c47c84 -CVE-2022-22734 - https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251 -CVE-2022-22735 - https://wpscan.com/vulnerability/6940a97e-5a75-405c-be74-bedcc3a8ee00 -CVE-2022-22737 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745874 -CVE-2022-22739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1744158 -CVE-2022-22740 - https://bugzilla.mozilla.org/show_bug.cgi?id=1742334 -CVE-2022-22744 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737252 -CVE-2022-22748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1705211 -CVE-2022-2275 - https://wpscan.com/vulnerability/07757d1e-39ad-4199-bc7a-ecb821dfc996 -CVE-2022-22753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1732435 -CVE-2022-22753 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22754 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750565 -CVE-2022-22754 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22755 - https://bugzilla.mozilla.org/show_bug.cgi?id=1309630 -CVE-2022-22755 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22756 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317873 -CVE-2022-22756 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22757 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22758 - https://bugzilla.mozilla.org/show_bug.cgi?id=1728742 -CVE-2022-22758 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739957 -CVE-2022-22759 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-2276 - https://wpscan.com/vulnerability/92de9c1b-48dd-4a5f-bbb3-455f8f172b09 -CVE-2022-22760 - https://bugzilla.mozilla.org/show_bug.cgi?id=1740985 -CVE-2022-22760 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22761 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745566 -CVE-2022-22761 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22762 - https://bugzilla.mozilla.org/show_bug.cgi?id=1743931 -CVE-2022-22762 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-22764 - https://www.mozilla.org/security/advisories/mfsa2022-04/ -CVE-2022-2278 - https://wpscan.com/vulnerability/4481731d-4dbf-4bfa-b4cc-64f10bb7e7bf -CVE-2022-22787 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html -CVE-2022-2279 - https://huntr.dev/bounties/68c249e2-779d-4871-b7e3-851f03aca2de -CVE-2022-22805 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02 -CVE-2022-22806 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02 -CVE-2022-22819 - https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom -CVE-2022-22831 - http://packetstormsecurity.com/files/165863/Servisnet-Tessa-Authentication-Bypass.html -CVE-2022-22831 - https://www.exploit-db.com/exploits/50714 -CVE-2022-22831 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html -CVE-2022-22832 - http://packetstormsecurity.com/files/165873/Servisnet-Tessa-Privilege-Escalation.html -CVE-2022-22832 - https://www.exploit-db.com/exploits/50712 -CVE-2022-22832 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html -CVE-2022-22833 - http://packetstormsecurity.com/files/165867/Servisnet-Tessa-MQTT-Credential-Disclosure.html -CVE-2022-22833 - https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html -CVE-2022-22833 - https://www.exploit-db.com/exploits/50713 -CVE-2022-22834 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/ -CVE-2022-22835 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/ -CVE-2022-22836 - https://yoursecuritybores.me/coreftp-vulnerabilities/ -CVE-2022-2284 - https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874 -CVE-2022-22844 - https://gitlab.com/libtiff/libtiff/-/issues/355 -CVE-2022-2285 - https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736 -CVE-2022-22853 - https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System -CVE-2022-22853 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hprms_0.zip -CVE-2022-2286 - https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8 -CVE-2022-2287 - https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284 -CVE-2022-2288 - https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad -CVE-2022-2289 - https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64 -CVE-2022-22890 - https://github.com/jerryscript-project/jerryscript/issues/4847 -CVE-2022-22891 - https://github.com/jerryscript-project/jerryscript/issues/4871 -CVE-2022-22892 - https://github.com/jerryscript-project/jerryscript/issues/4872 -CVE-2022-22893 - https://github.com/jerryscript-project/jerryscript/issues/4901 -CVE-2022-22894 - https://github.com/jerryscript-project/jerryscript/issues/4890 -CVE-2022-22895 - https://github.com/jerryscript-project/jerryscript/issues/4882 -CVE-2022-22897 - http://packetstormsecurity.com/files/168148/PrestaShop-Ap-Pagebuilder-2.4.4-SQL-Injection.html -CVE-2022-22897 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/05/appagebuilder.html -CVE-2022-22899 - https://yoursecuritybores.me/coreftp-vulnerabilities/ -CVE-2022-2290 - https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf -CVE-2022-22901 - https://github.com/jerryscript-project/jerryscript/issues/4916 -CVE-2022-22909 - https://github.com/0z09e/CVE-2022-22909 -CVE-2022-2291 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Refelected)/POC.md -CVE-2022-2291 - https://vuldb.com/?id.203165 -CVE-2022-22916 - https://github.com/wendell1224/O2OA-POC/blob/main/POC.md -CVE-2022-2292 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Stored)/POC.md -CVE-2022-2292 - https://vuldb.com/?id.203166 -CVE-2022-22922 - https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md -CVE-2022-2293 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Simple%20Sales%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md -CVE-2022-22934 - https://github.com/saltstack/salt/releases, -CVE-2022-22935 - https://github.com/saltstack/salt/releases, -CVE-2022-22936 - https://github.com/saltstack/salt/releases, -CVE-2022-22941 - https://github.com/saltstack/salt/releases, -CVE-2022-22946 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22947 - http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html -CVE-2022-22947 - http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html -CVE-2022-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-22947 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22954 - http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html -CVE-2022-22956 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html -CVE-2022-22956 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html -CVE-2022-22957 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html -CVE-2022-22957 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html -CVE-2022-22960 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html -CVE-2022-22960 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html -CVE-2022-22960 - http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html -CVE-2022-22963 - http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html -CVE-2022-22963 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH -CVE-2022-22963 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-22963 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22965 - http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html -CVE-2022-22965 - http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html -CVE-2022-22965 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-22965 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22968 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22969 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2297 - https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/CVE/Clinic's%20Patient%20Management%20System/Unrestricted%20file%20upload%20(RCE)/POC.md -CVE-2022-2297 - https://vuldb.com/?id.203178 -CVE-2022-22970 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22971 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22976 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-22978 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2298 - https://github.com/CyberThoth/CVE/blob/63e283e7d7dad3783237f15cdae2bb649bc1e198/CVE/Clinic's%20Patient%20Management%20System/SQLi/POC.md -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625 -CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680 -CVE-2022-22988 - https://www.westerndigital.com/support/product-security/wdc-22003-edgerover-desktop-app-version-1-5-0-576 -CVE-2022-22989 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 -CVE-2022-2299 - https://wpscan.com/vulnerability/29015c35-0470-41b8-b197-c71b800ae2a9 -CVE-2022-22990 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 -CVE-2022-22991 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 -CVE-2022-22992 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 -CVE-2022-22993 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 -CVE-2022-22994 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 -CVE-2022-22995 - https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities -CVE-2022-22996 - https://www.westerndigital.com/support/product-security/wdc-22007-sandisk-professional-g-raid-4-8-software-utility-setup-for-windows-privilege-escalation -CVE-2022-22997 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107 -CVE-2022-22998 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107 -CVE-2022-22999 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114 -CVE-2022-2300 - https://huntr.dev/bounties/882d6cf9-64f5-4614-a873-a3030473c817 -CVE-2022-23000 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114 -CVE-2022-23001 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities -CVE-2022-23002 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities -CVE-2022-23003 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities -CVE-2022-23004 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities -CVE-2022-23005 - https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf -CVE-2022-23005 - https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature -CVE-2022-2301 - https://huntr.dev/bounties/f6b9114b-671d-4948-b946-ffe5c9aeb816 -CVE-2022-2304 - https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a -CVE-2022-23043 - https://fluidattacks.com/advisories/simone/ -CVE-2022-23045 - https://fluidattacks.com/advisories/osbourne/ -CVE-2022-23046 - http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.html -CVE-2022-23046 - https://fluidattacks.com/advisories/mercury/ -CVE-2022-23047 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459 -CVE-2022-23047 - https://fluidattacks.com/advisories/franklin/ -CVE-2022-23048 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460 -CVE-2022-23048 - https://fluidattacks.com/advisories/dylan/ -CVE-2022-23049 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461 -CVE-2022-23049 - https://fluidattacks.com/advisories/cobain/ -CVE-2022-2305 - https://wpscan.com/vulnerability/ea0180cd-e018-43ea-88b9-fa8e71bf34bf -CVE-2022-23050 - https://fluidattacks.com/advisories/cerati/ -CVE-2022-23051 - https://fluidattacks.com/advisories/brown/ -CVE-2022-23052 - https://fluidattacks.com/advisories/jett/ -CVE-2022-23055 - https://www.mend.io/vulnerability-database/CVE-2022-23055 -CVE-2022-23056 - https://www.mend.io/vulnerability-database/CVE-2022-23056 -CVE-2022-23057 - https://www.mend.io/vulnerability-database/CVE-2022-23057 -CVE-2022-23058 - https://www.mend.io/vulnerability-database/CVE-2022-23058 -CVE-2022-23059 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059 -CVE-2022-2306 - https://huntr.dev/bounties/35acf263-6db4-4310-ab27-4c3c3a53f796 -CVE-2022-23060 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23060 -CVE-2022-23061 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23061 -CVE-2022-23063 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23063 -CVE-2022-23064 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064 -CVE-2022-23065 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065 -CVE-2022-23066 - https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a701870e1324 -CVE-2022-23066 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23066 -CVE-2022-23067 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23067 -CVE-2022-23068 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23068 -CVE-2022-23071 - https://www.mend.io/vulnerability-database/CVE-2022-23071 -CVE-2022-23072 - https://www.mend.io/vulnerability-database/CVE-2022-23072 -CVE-2022-23073 - https://www.mend.io/vulnerability-database/CVE-2022-23073 -CVE-2022-23074 - https://www.mend.io/vulnerability-database/CVE-2022-23074 -CVE-2022-23077 - https://www.mend.io/vulnerability-database/CVE-2022-23077 -CVE-2022-23078 - https://www.mend.io/vulnerability-database/CVE-2022-23078 -CVE-2022-23079 - https://www.mend.io/vulnerability-database/CVE-2022-23079 -CVE-2022-23080 - https://www.mend.io/vulnerability-database/CVE-2022-23080 -CVE-2022-23081 - https://www.mend.io/vulnerability-database/CVE-2022-23081 -CVE-2022-23082 - https://www.mend.io/vulnerability-database/CVE-2022-23082 -CVE-2022-2309 - https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba -CVE-2022-23099 - https://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2022-2310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10384&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US -CVE-2022-23100 - https://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2022-23101 - https://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2022-23102 - http://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html -CVE-2022-23102 - http://seclists.org/fulldisclosure/2022/Feb/20 -CVE-2022-23103 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1462 -CVE-2022-2311 - https://wpscan.com/vulnerability/287a14dc-d1fc-481d-84af-7eb172dc68c9 -CVE-2022-23119 - https://success.trendmicro.com/solution/000290104 -CVE-2022-23119 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt -CVE-2022-2312 - https://wpscan.com/vulnerability/7548c1fb-77b5-4290-a297-35820edfe0f8 -CVE-2022-23120 - https://success.trendmicro.com/solution/000290104 -CVE-2022-23120 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt -CVE-2022-2313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US -CVE-2022-2314 - https://wpscan.com/vulnerability/b22fe77c-844e-4c24-8023-014441cc1e82 -CVE-2022-2317 - https://wpscan.com/vulnerability/77b7ca19-294c-4480-8f57-6fddfc67fffb -CVE-2022-23178 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-009 -CVE-2022-23179 - https://wpscan.com/vulnerability/90b8af99-e4a1-4076-99fa-efe805dd4be4/ -CVE-2022-2318 - https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6 -CVE-2022-23180 - https://wpscan.com/vulnerability/da87358a-3a72-4cf7-a2af-a266dd9b4290/ -CVE-2022-23181 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23181 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2321 - https://huntr.dev/bounties/3055b3f5-6b80-4d47-8e00-3500dfb458bc -CVE-2022-23218 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23219 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23221 - http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html -CVE-2022-23221 - http://seclists.org/fulldisclosure/2022/Jan/39 -CVE-2022-23221 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23221 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23227 - https://github.com/pedrib/PoC/blob/master/advisories/NUUO/nuuo_nvrmini_round2.mkd -CVE-2022-23227 - https://github.com/rapid7/metasploit-framework/pull/16044 -CVE-2022-23227 - https://portswigger.net/daily-swig/researcher-discloses-alleged-zero-day-vulnerabilities-in-nuuo-nvrmini2-recording-device -CVE-2022-2325 - https://wpscan.com/vulnerability/c8dcd7a7-5ad4-452c-a6a5-2362986656e4 -CVE-2022-2326 - https://gitlab.com/gitlab-org/gitlab/-/issues/356665 -CVE-2022-23277 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html -CVE-2022-2328 - https://wpscan.com/vulnerability/dbac391b-fc48-4e5e-b63a-2b3ddb0d5552 -CVE-2022-2330 - https://kcm.trellix.com/corporate/index?page=content&id=SB10386 -CVE-2022-23302 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23302 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23305 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23305 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23307 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23307 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23308 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23316 - https://github.com/taogogo/taocms/issues/15 -CVE-2022-23320 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/ -CVE-2022-23321 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/ -CVE-2022-23332 - https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332 -CVE-2022-23334 - https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf -CVE-2022-23340 - https://github.com/laurent22/joplin/issues/6004 -CVE-2022-23342 - https://github.com/InitRoot/CVE-2022-23342 -CVE-2022-23345 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23345 -CVE-2022-23346 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23346 -CVE-2022-23347 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347 -CVE-2022-23348 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23348 -CVE-2022-23349 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23349 -CVE-2022-23350 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23350 -CVE-2022-23352 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352 -CVE-2022-23366 - http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html -CVE-2022-23366 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366 -CVE-2022-23367 - https://gist.github.com/bincat99/311aff295c270371dc8ee89599b016f1 -CVE-2022-23377 - https://www.exploit-db.com/exploits/50665 -CVE-2022-23378 - https://github.com/TheGetch/CVE-2022-23378 -CVE-2022-2339 - https://huntr.dev/bounties/fff06de8-2a82-49b1-8e81-968731e87eef -CVE-2022-23390 - https://github.com/diyhi/bbs/issues/51 -CVE-2022-23399 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1454 -CVE-2022-2340 - https://packetstormsecurity.com/files/167595/ -CVE-2022-2340 - https://wpscan.com/vulnerability/306ea895-0b90-4276-bb97-eecb34f9bfae -CVE-2022-23400 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1465 -CVE-2022-23409 - http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html -CVE-2022-23409 - https://sec-consult.com/vulnerability-lab/ -CVE-2022-2341 - https://packetstormsecurity.com/files/167597/ -CVE-2022-2341 - https://wpscan.com/vulnerability/4a98a024-1f84-482f-9dc9-4714ac42c094 -CVE-2022-2342 - https://huntr.dev/bounties/b2caceaa-5b28-40ba-9980-70144159efba -CVE-2022-23425 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-2343 - https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5 -CVE-2022-23431 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23432 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23437 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23437 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2344 - https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996 -CVE-2022-2345 - https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f -CVE-2022-23457 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23458 - https://securitylab.github.com/advisories/GHSL-2022-029_nhn_tui_grid/ -CVE-2022-23459 - https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx -CVE-2022-23461 - https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/ -CVE-2022-23463 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/ -CVE-2022-23464 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/ -CVE-2022-23474 - https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/ -CVE-2022-2350 - https://wpscan.com/vulnerability/de28543b-c110-4a9f-bfe9-febccfba3a96 -CVE-2022-23507 - https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5 -CVE-2022-2351 - https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87 -CVE-2022-23512 - https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27 -CVE-2022-23513 - http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html -CVE-2022-23513 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497 -CVE-2022-2352 - https://wpscan.com/vulnerability/dc99ac40-646a-4f8e-b2b9-dc55d6d4c55c -CVE-2022-23520 - https://hackerone.com/reports/1654310 -CVE-2022-23522 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp -CVE-2022-23529 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 -CVE-2022-2353 - https://huntr.dev/bounties/7782c095-9e8c-48b0-a7f5-3a8f52e8af52 -CVE-2022-23530 - https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v -CVE-2022-23539 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 -CVE-2022-2354 - https://wpscan.com/vulnerability/1c8c5861-ce87-4813-9e26-470d63c1903a -CVE-2022-23540 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 -CVE-2022-23541 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 -CVE-2022-23544 - https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj -CVE-2022-2355 - https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826 -CVE-2022-23553 - https://securitylab.github.com/advisories/GHSL-2021-1009-Alpine/ -CVE-2022-23555 - https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h -CVE-2022-2356 - https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43 -CVE-2022-2357 - https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553 -CVE-2022-23596 - https://github.com/junrar/junrar/issues/73 -CVE-2022-23608 - http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html -CVE-2022-2361 - https://wpscan.com/vulnerability/aa69377d-ba9e-4a2f-921c-be2ab5edcb4e -CVE-2022-2362 - https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653 -CVE-2022-23626 - http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html -CVE-2022-2363 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Refelected)/POC.md -CVE-2022-23632 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2364 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md -CVE-2022-23642 - http://packetstormsecurity.com/files/167506/Sourcegraph-Gitserver-3.36.3-Remote-Code-Execution.html -CVE-2022-23642 - http://packetstormsecurity.com/files/167741/Sourcegraph-gitserver-sshCommand-Remote-Command-Execution.html -CVE-2022-23648 - http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html -CVE-2022-2366 - https://mattermost.com/security-updates/ -CVE-2022-2367 - https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f -CVE-2022-2368 - https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452 -CVE-2022-2369 - https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d -CVE-2022-2370 - https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334 -CVE-2022-2371 - https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7 -CVE-2022-23712 - https://www.elastic.co/community/security/ -CVE-2022-23713 - https://www.elastic.co/community/security -CVE-2022-23714 - https://www.elastic.co/community/security -CVE-2022-23715 - https://www.elastic.co/community/security -CVE-2022-23716 - https://www.elastic.co/community/security/ -CVE-2022-2372 - https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45 -CVE-2022-2373 - https://wpscan.com/vulnerability/6aa9aa0d-b447-4584-a07e-b8a0d1b83a31 -CVE-2022-2374 - https://wpscan.com/vulnerability/12062d78-7a0d-4dc1-9bd6-6c54aa6bc761 -CVE-2022-2375 - https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81 -CVE-2022-2376 - https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad -CVE-2022-2377 - https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530 -CVE-2022-23772 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23773 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-23774 - https://docs.docker.com/docker-for-windows/release-notes/ -CVE-2022-2378 - https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596 -CVE-2022-2379 - https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6 -CVE-2022-23793 - http://packetstormsecurity.com/files/166546/Joomla-4.1.0-Zip-Slip-File-Overwrite-Path-Traversal.html -CVE-2022-23803 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ -CVE-2022-23803 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453 -CVE-2022-23804 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ -CVE-2022-23804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453 -CVE-2022-23806 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2381 - https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f -CVE-2022-2382 - https://wpscan.com/vulnerability/777d4637-444b-4eda-bc21-95d3a3bf6cd3 -CVE-2022-2383 - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531 -CVE-2022-2384 - https://wpscan.com/vulnerability/0917b964-f347-487e-b8d7-c4f09c290fe5 -CVE-2022-23850 - https://github.com/kevinboone/epub2txt2/issues/17 -CVE-2022-23852 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23854 - https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal -CVE-2022-2386 - https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886 -CVE-2022-23865 - https://www.exploit-db.com/exploits/50674 -CVE-2022-2387 - https://wpscan.com/vulnerability/db3c3c78-1724-4791-9ab6-ebb2e8a4c8b8 -CVE-2022-23878 - https://blog.csdn.net/miuzzx/article/details/122249953 -CVE-2022-2388 - https://wpscan.com/vulnerability/50acd35f-eb31-4aba-bf32-b390e9514beb -CVE-2022-23881 - https://github.com/metaStor/Vuls/blob/main/zzzcms/zzzphp%20V2.1.0%20RCE/zzzphp%20V2.1.0%20RCE.md -CVE-2022-23882 - https://github.com/yeyinshi/tuzicms/issues/10 -CVE-2022-23887 - https://github.com/yzmcms/yzmcms/issues/59 -CVE-2022-23888 - https://github.com/yzmcms/yzmcms/issues/60 -CVE-2022-2389 - https://wpscan.com/vulnerability/e70f00b7-6251-476e-9297-60af509e6ad9 -CVE-2022-23896 - https://huntr.dev/bounties/79c2d16c-bae2-417f-ab50-10c52707a30f/ -CVE-2022-23900 - https://stigward.medium.com/wavlink-command-injection-cve-2022-23900-51988f6f15df -CVE-2022-23907 - http://dev.cmsmadesimple.org/bug/view/12503 -CVE-2022-23909 - http://packetstormsecurity.com/files/166574/Sherpa-Connector-Service-2020.2.20328.2050-Unquoted-Service-Path.html -CVE-2022-2391 - https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3 -CVE-2022-23911 - https://wpscan.com/vulnerability/77fd6749-4fb2-48fa-a191-437b442f28e9 -CVE-2022-23912 - https://wpscan.com/vulnerability/09512431-aa33-4514-8b20-1963c5d89f33 -CVE-2022-23915 - https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088 -CVE-2022-23918 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455 -CVE-2022-23919 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455 -CVE-2022-2392 - https://wpscan.com/vulnerability/5001ed18-858e-4c9d-9d7b-a1305fcdf61b -CVE-2022-23923 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254 -CVE-2022-23923 - https://snyk.io/vuln/SNYK-JS-JAILED-2391490 -CVE-2022-23935 - https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429 -CVE-2022-23940 - https://github.com/manuelz120 -CVE-2022-23943 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23946 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ -CVE-2022-23946 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460 -CVE-2022-23947 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ -CVE-2022-23947 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460 -CVE-2022-2395 - https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b -CVE-2022-2396 - https://github.com/CyberThoth/CVE/blob/83c243538386cd0761025f85eb747eab7cae5c21/CVE/Simple%20e-Learning%20System/Cross%20Site%20Scripting(Stored)/POC.md -CVE-2022-2396 - https://vuldb.com/?id.203779 -CVE-2022-23967 - https://github.com/MaherAzzouzi/CVE-2022-23967 -CVE-2022-23968 - https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/ -CVE-2022-2398 - https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672 -CVE-2022-23987 - https://wpscan.com/vulnerability/1697351b-c201-4e85-891e-94fdccbdfb55 -CVE-2022-23988 - https://wpscan.com/vulnerability/9d5738f9-9a2e-4878-8a03-745894420bf6 -CVE-2022-23990 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-23994 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23995 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23996 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23997 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-23999 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-2400 - https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a -CVE-2022-24000 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 -CVE-2022-24004 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/ -CVE-2022-24005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-2401 - https://mattermost.com/security-updates/ -CVE-2022-24010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-24029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 -CVE-2022-2404 - https://wpscan.com/vulnerability/0d889dde-b9d5-46cf-87d3-4f8a85cf9b98 -CVE-2022-2405 - https://wpscan.com/vulnerability/50037028-2790-47ee-aae1-faf0724eb917 -CVE-2022-2406 - https://mattermost.com/security-updates/ -CVE-2022-24065 - https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281 -CVE-2022-24066 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820 -CVE-2022-24066 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306 -CVE-2022-2407 - https://wpscan.com/vulnerability/5be611e8-5b7a-4579-9757-45a4c94a53ca -CVE-2022-2408 - https://mattermost.com/security-updates/ -CVE-2022-24082 - http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html -CVE-2022-2409 - https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea -CVE-2022-2410 - https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18 -CVE-2022-24108 - http://packetstormsecurity.com/files/167197/OpenCart-So-Listing-Tabs-2.2.0-Unsafe-Deserialization.html -CVE-2022-2411 - https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294 -CVE-2022-24112 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html -CVE-2022-24112 - http://packetstormsecurity.com/files/166328/Apache-APISIX-2.12.1-Remote-Code-Execution.html -CVE-2022-2412 - https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6 -CVE-2022-24121 - https://www.coresecurity.com/core-labs/advisories/unified-office-total-connect-sql-injection -CVE-2022-24124 - http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html -CVE-2022-24124 - https://github.com/casdoor/casdoor/issues/439 -CVE-2022-24124 - https://github.com/casdoor/casdoor/pull/442 -CVE-2022-24125 - https://github.com/tremwil/ds3-nrssr-rce -CVE-2022-24126 - https://github.com/tremwil/ds3-nrssr-rce -CVE-2022-24127 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/ -CVE-2022-24129 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF -CVE-2022-2413 - https://wpscan.com/vulnerability/2e38b1bb-4410-45e3-87ca-d47a2cce9e22/ -CVE-2022-24138 - https://github.com/tomerpeled92/CVE/ -CVE-2022-24139 - https://github.com/tomerpeled92/CVE/ -CVE-2022-24140 - https://github.com/tomerpeled92/CVE/ -CVE-2022-24141 - https://github.com/tomerpeled92/CVE/ -CVE-2022-2415 - http://packetstormsecurity.com/files/167972/Chrome-WebGL-Uniform-Integer-Overflows.html -CVE-2022-2417 - https://gitlab.com/gitlab-org/gitlab/-/issues/361179 -CVE-2022-2418 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20img_upload.php%20File%20upload%20vulnerability.md -CVE-2022-24187 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html -CVE-2022-24188 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html -CVE-2022-24189 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html -CVE-2022-2419 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20upload.php%20File%20upload%20vulnerability.md -CVE-2022-2419 - https://vuldb.com/?id.203902 -CVE-2022-24190 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html -CVE-2022-24191 - https://github.com/michaelrsweet/htmldoc/issues/470 -CVE-2022-24196 - https://github.com/itext/itext7/pull/78 -CVE-2022-24196 - https://github.com/itext/itext7/pull/78#issuecomment-1089279222 -CVE-2022-24197 - https://github.com/itext/itext7/pull/78 -CVE-2022-24197 - https://github.com/itext/itext7/pull/78#issuecomment-1089282165 -CVE-2022-24198 - https://github.com/itext/itext7/pull/78 -CVE-2022-24198 - https://github.com/itext/itext7/pull/78#issuecomment-1089287808 -CVE-2022-2420 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20uploader.php%20%20File%20upload%20vulnerability.md -CVE-2022-2420 - https://vuldb.com/?id.203903 -CVE-2022-24223 - http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html -CVE-2022-2423 - https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2 -CVE-2022-24231 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Student-Information -CVE-2022-2424 - https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909 -CVE-2022-24247 - https://cxsecurity.com/issue/WLB-2022010019 -CVE-2022-24247 - https://www.exploit-db.com/exploits/50614 -CVE-2022-24248 - https://en.0day.today/exploit/description/37177 -CVE-2022-24248 - https://www.exploit-db.com/exploits/50615 -CVE-2022-24249 - https://github.com/gpac/gpac/issues/2081 -CVE-2022-2425 - https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d -CVE-2022-24251 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ -CVE-2022-24252 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ -CVE-2022-24253 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ -CVE-2022-24254 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ -CVE-2022-24255 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ -CVE-2022-2426 - https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422 -CVE-2022-24263 - http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html -CVE-2022-24263 - https://github.com/kishan0725/Hospital-Management-System/issues/17 -CVE-2022-24263 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263 -CVE-2022-24264 - https://github.com/CuppaCMS/CuppaCMS/issues/13 -CVE-2022-24265 - https://github.com/CuppaCMS/CuppaCMS/issues/14 -CVE-2022-24266 - https://github.com/CuppaCMS/CuppaCMS/issues/17 -CVE-2022-24278 - https://github.com/neocotic/convert-svg/issues/86 -CVE-2022-24278 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830 -CVE-2022-24279 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572 -CVE-2022-24298 - https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720 -CVE-2022-24302 - https://www.paramiko.org/changelog.html -CVE-2022-2431 - https://packetstormsecurity.com/files/167920/wpdownloadmanager3250-filedelete.txt -CVE-2022-24329 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-24329 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24356 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24357 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24358 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24359 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24360 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24361 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24362 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24363 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24364 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24365 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24366 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24367 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24368 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24369 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24370 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24372 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-046.txt -CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382 -CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa -CVE-2022-24373 - https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEREANIMATED-2949507 -CVE-2022-24375 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725 -CVE-2022-24376 - https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310 -CVE-2022-24377 - https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955 -CVE-2022-24381 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988735 -CVE-2022-24396 - http://packetstormsecurity.com/files/167560/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Missing-Authentication.html -CVE-2022-24396 - http://seclists.org/fulldisclosure/2022/Jun/38 -CVE-2022-24399 - http://packetstormsecurity.com/files/167559/SAP-FRUN-2.00-3.00-Cross-Site-Scripting.html -CVE-2022-24399 - http://seclists.org/fulldisclosure/2022/Jun/37 -CVE-2022-24400 - https://tetraburst.com/ -CVE-2022-24401 - https://tetraburst.com/ -CVE-2022-24402 - https://tetraburst.com/ -CVE-2022-24403 - https://tetraburst.com/ -CVE-2022-24404 - https://tetraburst.com/ -CVE-2022-24405 - https://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2022-24406 - https://seclists.org/fulldisclosure/2022/Jul/11 -CVE-2022-24407 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2441 - https://www.exploit-db.com/exploits/51025 -CVE-2022-24428 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities -CVE-2022-24429 - https://github.com/neocotic/convert-svg/issues/84 -CVE-2022-24429 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212 -CVE-2022-24431 - https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950 -CVE-2022-24433 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245 -CVE-2022-24433 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199 -CVE-2022-24434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865 -CVE-2022-24434 - https://snyk.io/vuln/SNYK-JS-DICER-2311764 -CVE-2022-24437 - https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b -CVE-2022-24437 - https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307 -CVE-2022-24439 - https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858 -CVE-2022-24440 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278 -CVE-2022-24448 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 -CVE-2022-24448 - https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/ -CVE-2022-24449 - https://github.com/jet-pentest/CVE-2022-24449 -CVE-2022-2448 - https://wpscan.com/vulnerability/a4599942-2878-4da4-b55d-077775323b61 -CVE-2022-2449 - https://wpscan.com/vulnerability/6e42f26b-3403-4d55-99ad-2c8e2d76e537 -CVE-2022-2450 - https://wpscan.com/vulnerability/1b3ff124-f973-4584-a7d7-26cc404bfe2b -CVE-2022-2453 - https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a -CVE-2022-2454 - https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f -CVE-2022-24545 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html -CVE-2022-24562 - http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html -CVE-2022-24562 - https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d -CVE-2022-24571 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24571 -CVE-2022-24574 - https://huntr.dev/bounties/a08437cc-25aa-4116-8069-816f78a2247c/ -CVE-2022-24575 - https://github.com/gpac/gpac/issues/2058 -CVE-2022-24575 - https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/ -CVE-2022-24576 - https://github.com/gpac/gpac/issues/2061 -CVE-2022-24576 - https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/ -CVE-2022-24577 - https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/ -CVE-2022-24578 - https://huntr.dev/bounties/1691cca3-ab54-4259-856b-751be2395b11/ -CVE-2022-24582 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Accounting-Journal-Management -CVE-2022-24594 - https://github.com/walinejs/waline/issues/785 -CVE-2022-24595 - https://youtu.be/E-ZTuWSg-JU -CVE-2022-24599 - https://github.com/mpruett/audiofile/issues/60 -CVE-2022-2460 - https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db -CVE-2022-2461 - https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt -CVE-2022-2461 - https://www.exploitalert.com/view-details.html?id=38891 -CVE-2022-24613 - https://github.com/drewnoakes/metadata-extractor/issues/561 -CVE-2022-24614 - https://github.com/drewnoakes/metadata-extractor/issues/561 -CVE-2022-2462 - https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt -CVE-2022-24620 - https://github.com/Piwigo/Piwigo/issues/1605 -CVE-2022-24637 - http://packetstormsecurity.com/files/169811/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html -CVE-2022-24637 - http://packetstormsecurity.com/files/171389/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html -CVE-2022-24644 - https://github.com/gerr-re/cve-2022-24644/blob/main/cve-2022-24644_public-advisory.pdf -CVE-2022-24646 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263 -CVE-2022-24647 - https://github.com/CuppaCMS/CuppaCMS/issues/23 -CVE-2022-24654 - https://github.com/leonardobg/CVE-2022-24654 -CVE-2022-24654 - https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html -CVE-2022-24655 - https://kb.netgear.com/000064615/Security-Advisory-for-Pre-Authentication-Command-Injection-on-EX6100v1-and-Pre-Authentication-Stack-Overflow-on-Multiple-Products-PSV-2021-0282-PSV-2021-0288 -CVE-2022-24656 - https://github.com/zhuzhuyule/HexoEditor/issues/3 -CVE-2022-2467 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md -CVE-2022-24676 - https://github.com/hyyyp/HYBBS2/issues/33 -CVE-2022-24677 - https://github.com/hyyyp/HYBBS2/issues/34 -CVE-2022-2468 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md -CVE-2022-2468 - https://vuldb.com/?id.204161 -CVE-2022-24681 - https://raxis.com/blog/cve-2022-24681 -CVE-2022-2470 - https://huntr.dev/bounties/3f1f679c-c243-431c-8ed0-e61543b9921b -CVE-2022-24706 - http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html -CVE-2022-24706 - http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html -CVE-2022-24706 - https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd -CVE-2022-24707 - http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html -CVE-2022-2471 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams -CVE-2022-24715 - http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html -CVE-2022-24716 - http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html -CVE-2022-2472 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams -CVE-2022-24723 - https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/ -CVE-2022-24724 - http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html -CVE-2022-24728 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24729 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2473 - https://packetstormsecurity.com/files/167864/wpuseronline2876-xss.txt -CVE-2022-2473 - https://www.exploit-db.com/exploits/50988 -CVE-2022-2473 - https://youtu.be/Q3zInrUnAV0 -CVE-2022-24734 - http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html -CVE-2022-24734 - http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html -CVE-2022-24735 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24736 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24755 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/ -CVE-2022-24756 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/ -CVE-2022-2476 - https://github.com/dbry/WavPack/issues/121 -CVE-2022-24760 - https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/ -CVE-2022-24780 - http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html -CVE-2022-24780 - https://markus-krell.de/itop-template-injection-inside-customer-portal/ -CVE-2022-24799 - https://github.com/wireapp/wire-webapp/releases/tag/2022-03-30-production.0 -CVE-2022-2480 - http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html -CVE-2022-24801 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24823 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24833 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw -CVE-2022-24836 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-24839 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-24844 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425 -CVE-2022-24851 - https://github.com/LDAPAccountManager/lam/issues/170 -CVE-2022-2486 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md -CVE-2022-2486 - https://vuldb.com/?id.204537 -CVE-2022-24860 - https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png -CVE-2022-24865 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76/ -CVE-2022-2487 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md -CVE-2022-2487 - https://vuldb.com/?id.204538 -CVE-2022-2488 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20touchlist_sync.cgi.md -CVE-2022-2489 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md -CVE-2022-2489 - https://vuldb.com/?id.204551 -CVE-2022-24891 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2490 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php -CVE-2022-2490 - https://vuldb.com/?id.204552 -CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/issues/350 -CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/pull/351 -CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4 -CVE-2022-2491 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md -CVE-2022-2491 - https://vuldb.com/?id.204574 -CVE-2022-24910 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471 -CVE-2022-2492 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md#index.php -CVE-2022-2492 - https://vuldb.com/?id.204575 -CVE-2022-24928 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-24929 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-24930 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-24931 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-24932 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-2494 - https://huntr.dev/bounties/74ddb017-c1fd-4e72-bd30-3b2033911472 -CVE-2022-24949 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxg8-4r3q-p9rv -CVE-2022-2495 - https://huntr.dev/bounties/00affb69-275d-4f4c-b419-437922bc7798 -CVE-2022-24950 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3 -CVE-2022-24951 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q -CVE-2022-24952 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw -CVE-2022-24954 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24955 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24956 - https://syss.de -CVE-2022-24956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-018.txt -CVE-2022-24957 - https://syss.de -CVE-2022-24957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-019.txt -CVE-2022-24958 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda -CVE-2022-24959 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 -CVE-2022-24971 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-24976 - https://www.openwall.com/lists/oss-security/2022/01/30/4 -CVE-2022-24977 - https://r0.haxors.org/posts?id=8 -CVE-2022-24989 - https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990 -CVE-2022-24989 - https://packetstormsecurity.com/files/172904 -CVE-2022-24990 - http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html -CVE-2022-24995 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/7 -CVE-2022-24999 - https://github.com/n8tz/CVE-2022-24999 -CVE-2022-25003 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25003 -CVE-2022-25004 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25004/ -CVE-2022-25012 - https://www.exploit-db.com/exploits/50130 -CVE-2022-25013 - https://github.com/gamonoid/icehrm/issues/284 -CVE-2022-25014 - https://github.com/gamonoid/icehrm/issues/283 -CVE-2022-25015 - https://github.com/gamonoid/icehrm/issues/285 -CVE-2022-25017 - https://gist.github.com/zaee-k/390b2f8e50407e4b199df806baa7e4ef -CVE-2022-25020 - https://youtu.be/TsGp-QB5XWI -CVE-2022-25022 - http://danpros.com -CVE-2022-25022 - https://youtu.be/acookTqf3Nc -CVE-2022-25023 - https://github.com/adamstark/AudioFile/issues/58 -CVE-2022-25026 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/ -CVE-2022-25027 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/ -CVE-2022-2503 - https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m -CVE-2022-25044 - https://github.com/espruino/Espruino/issues/2142 -CVE-2022-25045 - https://github.com/VivekPanday12/CVE-/issues/6 -CVE-2022-25045 - https://www.linkedin.com/in/vivek-panday-796768149/ -CVE-2022-25046 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel -CVE-2022-25047 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel -CVE-2022-25048 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel -CVE-2022-2505 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-25072 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/Archer%20A54 -CVE-2022-25073 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841N -CVE-2022-25074 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC -CVE-2022-25075 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3000RU/README.md -CVE-2022-25076 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A800R/README.md -CVE-2022-25077 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3100R/README.md -CVE-2022-25078 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3600R/README.md -CVE-2022-25079 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A810R/README.md -CVE-2022-25080 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A830R/README.md -CVE-2022-25081 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T10/README.md -CVE-2022-25082 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A950RG/README.md -CVE-2022-25083 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A860R/README.md -CVE-2022-25084 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T6/README.md -CVE-2022-25089 - http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html -CVE-2022-25089 - https://www.exploit-db.com/exploits/50798 -CVE-2022-25090 - http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html -CVE-2022-25090 - http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html -CVE-2022-25090 - https://github.com/ComparedArray/printix-CVE-2022-25090 -CVE-2022-25090 - https://www.exploit-db.com/exploits/50812 -CVE-2022-25094 - https://www.exploit-db.com/exploits/50731 -CVE-2022-25095 - https://www.exploit-db.com/exploits/50730 -CVE-2022-25096 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management -CVE-2022-25096 - https://www.exploit-db.com/exploits/50732 -CVE-2022-25104 - https://github.com/ttimot24/HorizontCMS/issues/43 -CVE-2022-25106 - https://github.com/chunklhit/cve/blob/master/dlink/DIR859/BufferOverflow.md -CVE-2022-25106 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-25108 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-25114 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PuneethReddyHC/event-management-1.0 -CVE-2022-25115 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management -CVE-2022-25131 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md -CVE-2022-25139 - https://github.com/nginx/njs/issues/451 -CVE-2022-2514 - https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 -CVE-2022-25148 - http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html -CVE-2022-25148 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 -CVE-2022-25149 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 -CVE-2022-2515 - https://gist.github.com/Xib3rR4dAr/6aa9e730c1d030a5ee9f9d1eae6fbd5e -CVE-2022-25164 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-25165 - https://github.com/RhinoSecurityLabs/CVEs -CVE-2022-25165 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ -CVE-2022-25166 - https://github.com/RhinoSecurityLabs/CVEs -CVE-2022-25166 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ -CVE-2022-25169 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-25171 - https://security.snyk.io/vuln/SNYK-JS-P4-3167330 -CVE-2022-25172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 -CVE-2022-25216 - https://www.tenable.com/security/research/tra-2022-07 -CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 -CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/ -CVE-2022-25220 - https://fluidattacks.com/advisories/armstrong/ -CVE-2022-25220 - https://github.com/1modm/petereport/issues/35 -CVE-2022-25221 - https://fluidattacks.com/advisories/charles/ -CVE-2022-25222 - https://fluidattacks.com/advisories/berry/ -CVE-2022-25223 - https://fluidattacks.com/advisories/jagger/ -CVE-2022-25224 - https://fluidattacks.com/advisories/lennon/ -CVE-2022-25225 - https://fluidattacks.com/advisories/spinetta/ -CVE-2022-25226 - https://fluidattacks.com/advisories/sinatra/ -CVE-2022-25227 - https://fluidattacks.com/advisories/clapton/ -CVE-2022-25228 - https://fluidattacks.com/advisories/jackson/ -CVE-2022-25229 - https://fluidattacks.com/advisories/bowie/ -CVE-2022-25229 - https://github.com/popcorn-official/popcorn-desktop/issues/2491 -CVE-2022-2523 - https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f -CVE-2022-25231 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724 -CVE-2022-25235 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-25236 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html -CVE-2022-25236 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-25237 - https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/ -CVE-2022-25241 - http://packetstormsecurity.com/files/166074/FileCloud-21.2-Cross-Site-Request-Forgery.html -CVE-2022-25241 - https://herolab.usd.de/security-advisories/ -CVE-2022-25242 - https://herolab.usd.de/security-advisories/ -CVE-2022-25245 - https://raxis.com/blog/cve-2022-25245 -CVE-2022-25258 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 -CVE-2022-25265 - https://github.com/x0reaxeax/exec-prot-bypass -CVE-2022-25276 - https://www.drupal.org/sa-core-2022-015 -CVE-2022-25295 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177 -CVE-2022-25296 - https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623 -CVE-2022-25297 - https://snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-2407243 -CVE-2022-25298 - https://snyk.io/vuln/SNYK-UNMANAGED-SPRINFALLWEBCC-2404182 -CVE-2022-25299 - https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180 -CVE-2022-25301 - https://github.com/metabench/jsgui-lang-essentials/issues/1 -CVE-2022-25301 - https://snyk.io/vuln/SNYK-JS-JSGUILANGESSENTIALS-2316897 -CVE-2022-25302 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988732 -CVE-2022-25303 - https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 -CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731 -CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730 -CVE-2022-25305 - https://gist.github.com/Xib3rR4dAr/af90cef7867583ab2de4cccea2a8c87d -CVE-2022-25306 - https://gist.github.com/Xib3rR4dAr/89fc87ea1d62348c21c99fc11a3bfd88 -CVE-2022-25307 - https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb -CVE-2022-25308 - https://github.com/fribidi/fribidi/issues/181 -CVE-2022-25309 - https://github.com/fribidi/fribidi/issues/182 -CVE-2022-2531 - https://gitlab.com/gitlab-org/gitlab/-/issues/364252 -CVE-2022-25310 - https://github.com/fribidi/fribidi/issues/183 -CVE-2022-25313 - https://github.com/libexpat/libexpat/pull/558 -CVE-2022-25313 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-25314 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-25315 - https://github.com/libexpat/libexpat/pull/559 -CVE-2022-25315 - https://www.oracle.com/security-alerts/cpuapr2022.html -CVE-2022-2532 - https://wpscan.com/vulnerability/07278b12-58e6-4230-b2fb-19237e9785d8 -CVE-2022-25324 - https://snyk.io/vuln/SNYK-JS-BIGNUM-2388581 -CVE-2022-25329 - https://www.tenable.com/security/research/tra-2022-05 -CVE-2022-25330 - https://www.tenable.com/security/research/tra-2022-05 -CVE-2022-25331 - https://www.tenable.com/security/research/tra-2022-05 -CVE-2022-25332 - https://tetraburst.com/ -CVE-2022-25333 - https://tetraburst.com/ -CVE-2022-25334 - https://tetraburst.com/ -CVE-2022-25342 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-25343 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-25344 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-25345 - https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100 -CVE-2022-25349 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498 -CVE-2022-25349 - https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800 -CVE-2022-2535 - https://wpscan.com/vulnerability/0e13c375-044c-4c2e-ab8e-48cb89d90d02 -CVE-2022-25350 - https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616 -CVE-2022-25352 - https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117 -CVE-2022-25354 - https://snyk.io/vuln/SNYK-JS-SETIN-2388571 -CVE-2022-25356 - https://www.swascan.com/security-advisory-alt-n-security-gateway/ -CVE-2022-25359 - https://packetstormsecurity.com/files/166103/ICL-ScadaFlex-II-SCADA-Controllers-SC-1-SC-2-1.03.07-Remote-File-Modification.html -CVE-2022-2536 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-2536.txt -CVE-2022-2536 - https://packetstormsecurity.com/files/168120/wptransposh1081-authz.txt -CVE-2022-2536 - https://www.exploitalert.com/view-details.html?id=38949 -CVE-2022-2536 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2536 -CVE-2022-2537 - https://wpscan.com/vulnerability/ae613148-85d8-47a0-952d-49c29584676f -CVE-2022-25373 - https://raxis.com/blog/cve-2022-25373 -CVE-2022-25375 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 -CVE-2022-25377 - https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/ -CVE-2022-2538 - https://wpscan.com/vulnerability/afa1e159-30bc-42d2-b3f8-8c868b113d3e -CVE-2022-25389 - https://www.adminxe.com/3246.html -CVE-2022-25390 - https://www.adminxe.com/3276.html -CVE-2022-25393 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Bakery-Shop-Management -CVE-2022-25394 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/abhisheks008/2022/Medical-Store-Management-System -CVE-2022-25395 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store -CVE-2022-25396 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store/SQL-Injection -CVE-2022-25398 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/pavanpatil45/Auto-Spare-Parts-Management -CVE-2022-25399 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Real-Estate-Portal-System -CVE-2022-25402 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md -CVE-2022-25403 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md -CVE-2022-25407 - https://github.com/kishan0725/Hospital-Management-System/issues/21 -CVE-2022-25408 - https://github.com/kishan0725/Hospital-Management-System/issues/22 -CVE-2022-25409 - https://github.com/kishan0725/Hospital-Management-System/issues/20 -CVE-2022-25411 - https://github.com/maxsite/cms/issues/487 -CVE-2022-25412 - https://github.com/maxsite/cms/issues/486 -CVE-2022-25414 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1 -CVE-2022-25417 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3 -CVE-2022-25418 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2 -CVE-2022-25427 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2 -CVE-2022-25428 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3 -CVE-2022-25429 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1 -CVE-2022-2543 - https://wpscan.com/vulnerability/5dc8b671-f2fa-47be-8664-9005c4fdbea8 -CVE-2022-25431 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/4 -CVE-2022-25433 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/5 -CVE-2022-25434 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/6 -CVE-2022-25435 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/7 -CVE-2022-25437 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/9 -CVE-2022-25438 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/11 -CVE-2022-25439 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/8 -CVE-2022-2544 - https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053 -CVE-2022-25440 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/13 -CVE-2022-25441 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/12 -CVE-2022-25445 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/1 -CVE-2022-25446 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/3 -CVE-2022-25447 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/4 -CVE-2022-25448 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/2 -CVE-2022-25449 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/5 -CVE-2022-25450 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/8 -CVE-2022-25451 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/9 -CVE-2022-25452 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/7 -CVE-2022-25453 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/6 -CVE-2022-25454 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/10 -CVE-2022-25455 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/11 -CVE-2022-25456 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/12 -CVE-2022-25457 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/14 -CVE-2022-25458 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/13 -CVE-2022-25459 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/15 -CVE-2022-2546 - https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 -CVE-2022-25460 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/17 -CVE-2022-25461 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/16 -CVE-2022-25465 - https://github.com/espruino/Espruino/issues/2136 -CVE-2022-25481 - https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md -CVE-2022-25484 - https://github.com/appneta/tcpreplay/issues/715 -CVE-2022-25485 - https://github.com/CuppaCMS/CuppaCMS/issues/24 -CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/15 -CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/25 -CVE-2022-25486 - https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts -CVE-2022-25487 - http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html -CVE-2022-25487 - https://github.com/thedigicraft/Atom.CMS/issues/256 -CVE-2022-25488 - https://github.com/thedigicraft/Atom.CMS/issues/257 -CVE-2022-2549 - https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537 -CVE-2022-25494 - https://github.com/g33kyrash/Online-Banking-system/issues/16 -CVE-2022-25495 - https://github.com/CuppaCMS/CuppaCMS/issues/26 -CVE-2022-25497 - https://github.com/CuppaCMS/CuppaCMS/issues/28 -CVE-2022-25498 - https://github.com/CuppaCMS/CuppaCMS/issues/29 -CVE-2022-2550 - https://huntr.dev/bounties/6ab4384d-bcbe-4d98-bf67-35c3535fc5c7 -CVE-2022-25506 - https://github.com/FreeTAKTeam/UI/issues/27 -CVE-2022-2551 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551 -CVE-2022-2551 - https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0 -CVE-2022-25511 - https://github.com/FreeTAKTeam/UI/issues/29 -CVE-2022-25514 - https://github.com/nothings/stb/issues/1286 -CVE-2022-25515 - https://github.com/nothings/stb/issues/1286 -CVE-2022-25515 - https://github.com/nothings/stb/issues/1288 -CVE-2022-25516 - https://github.com/nothings/stb/issues/1286 -CVE-2022-25516 - https://github.com/nothings/stb/issues/1287 -CVE-2022-2552 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2552 -CVE-2022-2552 - https://wpscan.com/vulnerability/6b540712-fda5-4be6-ae4b-bd30a9d9d698 -CVE-2022-25521 - https://medium.com/@dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0 -CVE-2022-25523 - https://github.com/Typesetter/Typesetter/issues/697 -CVE-2022-2554 - https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9 -CVE-2022-25546 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/6 -CVE-2022-25548 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/5 -CVE-2022-25549 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4 -CVE-2022-2555 - https://wpscan.com/vulnerability/7ec9e493-bc48-4a5d-8c7e-34beaba892ae -CVE-2022-25550 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/9 -CVE-2022-25551 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/8 -CVE-2022-25552 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/3 -CVE-2022-25553 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/7 -CVE-2022-25554 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/10 -CVE-2022-25555 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/2 -CVE-2022-25556 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/6 -CVE-2022-25557 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/11 -CVE-2022-25558 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/13 -CVE-2022-2556 - https://wpscan.com/vulnerability/f2a59eaa-6b44-4098-912f-823289cf33b0 -CVE-2022-25560 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/4 -CVE-2022-25561 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/5 -CVE-2022-25566 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/12 -CVE-2022-25568 - https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/ -CVE-2022-2557 - https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e -CVE-2022-25576 - https://github.com/butterflyhack/anchorcms-0.12.7-CSRF -CVE-2022-25577 - https://github.com/ph0nkybit/proof-of-concepts/tree/main/Use_Of_Hardcoded_Password_In_ALF-BanCO_8.2.x -CVE-2022-2558 - https://wpscan.com/vulnerability/6e096269-eedc-4614-88ce-6795c4adf32f -CVE-2022-2559 - https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec -CVE-2022-2563 - https://wpscan.com/vulnerability/98cd761c-7527-4224-965d-d34472b5c19f -CVE-2022-25630 - http://packetstormsecurity.com/files/171781/Symantec-Messaging-Gateway-10.7.4-Cross-Site-Scripting.html -CVE-2022-25636 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html -CVE-2022-25636 - https://github.com/Bonfee/CVE-2022-25636 -CVE-2022-25636 - https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ -CVE-2022-25636 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2564 - https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd -CVE-2022-25641 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-25644 - https://security.snyk.io/vuln/SNYK-JS-PENDO324GETPROCESSBYNAME-2419094 -CVE-2022-25645 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974 -CVE-2022-25645 - https://snyk.io/vuln/SNYK-JS-DSET-2330881 -CVE-2022-25646 - https://github.com/myliang/x-spreadsheet/issues/580 -CVE-2022-25646 - https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381 -CVE-2022-25646 - https://youtu.be/Ij-8VVKNh7U -CVE-2022-25647 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-25648 - https://snyk.io/vuln/SNYK-RUBY-GIT-2421270 -CVE-2022-2565 - https://wpscan.com/vulnerability/d89eff7d-a3e6-4876-aa0e-6d17e206af83 -CVE-2022-25664 - http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html -CVE-2022-2567 - https://wpscan.com/vulnerability/dfa21dde-a9fc-4a35-9602-c3fde907ca54 -CVE-2022-2571 - https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571 -CVE-2022-2574 - https://wpscan.com/vulnerability/9dec8ac7-befd-4c9d-9a9e-7da9e395dbf2 -CVE-2022-25743 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html -CVE-2022-2575 - https://wpscan.com/vulnerability/e934af78-9dfd-4e14-853d-dc453de6e365 -CVE-2022-25758 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782 -CVE-2022-25758 - https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884 -CVE-2022-25759 - https://github.com/neocotic/convert-svg/issues/81 -CVE-2022-25759 - https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633 -CVE-2022-25760 - https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 -CVE-2022-25761 - https://security.snyk.io/vuln/SNYK-UNMANAGED-OPEN62541OPEN62541-2988719 -CVE-2022-25762 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-25765 - http://packetstormsecurity.com/files/171746/pdfkit-0.8.7.2-Command-Injection.html -CVE-2022-25765 - https://security.snyk.io/vuln/SNYK-RUBY-PDFKIT-2869795 -CVE-2022-25766 - https://github.com/FredrikNoren/ungit/pull/1510 -CVE-2022-25766 - https://snyk.io/vuln/SNYK-JS-UNGIT-2414099 -CVE-2022-25767 - https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018 -CVE-2022-2577 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(SQLI).md -CVE-2022-2577 - https://vuldb.com/?id.205300 -CVE-2022-25778 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25779 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-2578 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System--.md -CVE-2022-25780 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25781 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25782 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25783 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25784 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25785 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25786 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-25787 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-2579 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(XSS).md -CVE-2022-2579 - https://vuldb.com/?id.205302 -CVE-2022-2580 - https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249 -CVE-2022-2581 - https://huntr.dev/bounties/0bedbae2-82ae-46ae-aa68-1c28b309b60b -CVE-2022-25810 - https://wpscan.com/vulnerability/9a934a84-f0c7-42ed-b980-bb168b2c5892 -CVE-2022-25811 - https://wpscan.com/vulnerability/0e0d2c5f-3396-4a0a-a5c6-6a98de3802c9 -CVE-2022-25812 - https://wpscan.com/vulnerability/1f6bd346-4743-44b8-86d7-4fbe09bad657 -CVE-2022-25814 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25815 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25816 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25817 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25818 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25819 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25820 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 -CVE-2022-25831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-25832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-25833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-25836 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2022-25837 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -CVE-2022-25839 - https://snyk.io/vuln/SNYK-JS-URLJS-2414030 -CVE-2022-25842 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874 -CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736 -CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738 -CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737 -CVE-2022-25844 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735 -CVE-2022-25845 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 -CVE-2022-25845 - https://www.ddosi.org/fastjson-poc/ -CVE-2022-25845 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-25847 - https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c -CVE-2022-25847 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915 -CVE-2022-25848 - https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd -CVE-2022-25848 - https://security.snyk.io/vuln/SNYK-JS-STATICDEVSERVER-3149917 -CVE-2022-25849 - https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544 -CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5564-1 -CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5565-1 -CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5566-1 -CVE-2022-2585 - https://www.openwall.com/lists/oss-security/2022/08/09/7 -CVE-2022-25850 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228 -CVE-2022-25851 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295 -CVE-2022-25851 - https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218 -CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-LIBPQ-2392366 -CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-PGNATIVE-2392365 -CVE-2022-25853 - https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612 -CVE-2022-25854 - https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/ -CVE-2022-25855 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951 -CVE-2022-25858 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 -CVE-2022-25858 - https://snyk.io/vuln/SNYK-JS-TERSER-2806366 -CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5560-2 -CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5562-1 -CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5564-1 -CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5565-1 -CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5566-1 -CVE-2022-2586 - https://www.openwall.com/lists/oss-security/2022/08/09/5 -CVE-2022-25860 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391 -CVE-2022-25862 - https://snyk.io/vuln/SNYK-JS-SDS-2385944 -CVE-2022-25863 - https://snyk.io/vuln/SNYK-JS-GATSBYPLUGINMDX-2405699 -CVE-2022-25865 - https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201 -CVE-2022-25866 - https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 -CVE-2022-25867 - https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 -CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783 -CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2949784 -CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949782 -CVE-2022-25869 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2949781 -CVE-2022-25871 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488 -CVE-2022-25872 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368 -CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407 -CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406 -CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858 -CVE-2022-25875 - https://snyk.io/vuln/SNYK-JS-SVELTE-2931080 -CVE-2022-25876 - https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520 -CVE-2022-25878 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 -CVE-2022-25878 - https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 -CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5560-2 -CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5562-1 -CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5564-1 -CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5565-1 -CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5566-1 -CVE-2022-2588 - https://www.openwall.com/lists/oss-security/2022/08/09/6 -CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 -CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 -CVE-2022-25882 - https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856 -CVE-2022-25882 - https://github.com/onnx/onnx/issues/3991 -CVE-2022-25882 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 -CVE-2022-25883 - https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 -CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091139 -CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3091137 -CVE-2022-25888 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751 -CVE-2022-2589 - https://huntr.dev/bounties/8705800d-cf2f-433d-9c3e-dbef6a3f7e08 -CVE-2022-25890 - https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 -CVE-2022-25891 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINRRRSHOUTRRRPKGUTIL-2849059 -CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138 -CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320 -CVE-2022-25893 - https://security.snyk.io/vuln/SNYK-JS-VM2-2990237 -CVE-2022-25894 - https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112 -CVE-2022-25895 - https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120 -CVE-2022-25895 - https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718 -CVE-2022-25897 - https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191 -CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898 -CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897 -CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896 -CVE-2022-25898 - https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122 -CVE-2022-25900 - https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308 -CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681 -CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984 -CVE-2022-25903 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750 -CVE-2022-25904 - https://github.com/hacksparrow/safe-eval/issues/26 -CVE-2022-25904 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701 -CVE-2022-25906 - https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878 -CVE-2022-25907 - https://security.snyk.io/vuln/SNYK-JS-TSDEEPMERGE-2959975 -CVE-2022-25908 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953 -CVE-2022-2591 - http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html -CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 -CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 -CVE-2022-25914 - https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECLOUDTOOLS-2968871 -CVE-2022-25916 - https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394 -CVE-2022-25918 - https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108 -CVE-2022-25921 - https://security.snyk.io/vuln/SNYK-JS-MORGANJSON-2976193 -CVE-2022-25923 - https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 -CVE-2022-25926 - https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345 -CVE-2022-25927 - https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450 -CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-3177369 -CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-3177368 -CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JS-SMOOTHIE-3177364 -CVE-2022-2593 - https://wpscan.com/vulnerability/229a065e-1062-44d4-818d-29aa3b6b6d41 -CVE-2022-25931 - https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9 -CVE-2022-25931 - https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539 -CVE-2022-25932 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1523 -CVE-2022-25936 - https://gist.github.com/lirantal/691d02d607753d54856f9335f9a1692f -CVE-2022-25936 - https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896 -CVE-2022-25937 - https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395 -CVE-2022-2594 - https://wpscan.com/vulnerability/3fde5336-552c-4861-8b4d-89a16735c0e2 -CVE-2022-25940 - https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb -CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3175617 -CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JS-LITESERVER-3153540 -CVE-2022-25942 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1486 -CVE-2022-25943 - https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE -CVE-2022-2595 - https://huntr.dev/bounties/1c6afb84-2025-46d8-9e9f-cbfc20e5d04d -CVE-2022-2596 - https://huntr.dev/bounties/a7e6a136-0a4b-46c4-ad20-802f1dd60bf7 -CVE-2022-25962 - https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614 -CVE-2022-25967 - https://security.snyk.io/vuln/SNYK-JS-ETA-2936803 -CVE-2022-2597 - https://wpscan.com/vulnerability/3ffcee7c-1e03-448c-8006-a9405658cdb7 -CVE-2022-25972 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1485 -CVE-2022-25973 - https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070 -CVE-2022-25978 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070 -CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331 -CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764 -CVE-2022-2598 - https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e -CVE-2022-25989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1479 -CVE-2022-2599 - https://wpscan.com/vulnerability/276a7fc5-3d0d-446d-92cf-20060aecd0ef -CVE-2022-25995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1477 -CVE-2022-25996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1482 -CVE-2022-26002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476 -CVE-2022-26007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1475 -CVE-2022-26009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1483 -CVE-2022-2602 - http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html -CVE-2022-2602 - https://ubuntu.com/security/notices/USN-5693-1 -CVE-2022-26020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1474 -CVE-2022-26023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520 -CVE-2022-26026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1491 -CVE-2022-26042 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1478 -CVE-2022-26043 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1489 -CVE-2022-26061 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487 -CVE-2022-26067 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1492 -CVE-2022-26068 - https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332 -CVE-2022-26073 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1480 -CVE-2022-26075 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1500 -CVE-2022-26077 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1490 -CVE-2022-26082 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493 -CVE-2022-26085 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1473 -CVE-2022-26088 - http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html -CVE-2022-26088 - http://seclists.org/fulldisclosure/2022/Nov/10 -CVE-2022-26088 - https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/ -CVE-2022-26090 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26091 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26092 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26093 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26094 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26095 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26096 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26097 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26098 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26099 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-26101 - http://packetstormsecurity.com/files/167561/SAP-Fiori-Launchpad-Cross-Site-Scripting.html -CVE-2022-26101 - http://seclists.org/fulldisclosure/2022/Jun/39 -CVE-2022-26105 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-26106 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-26107 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-26108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-26109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-26117 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47 -CVE-2022-26134 - http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html -CVE-2022-26134 - http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html -CVE-2022-26134 - http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html -CVE-2022-26134 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html -CVE-2022-26143 - https://team-cymru.com/blog/2022/03/08/record-breaking-ddos-potential-discovered-cve-2022-26143/ -CVE-2022-26149 - http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html -CVE-2022-26159 - https://podalirius.net/en/cves/2022-26159/ -CVE-2022-26169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Air-Cargo-Management-System -CVE-2022-26170 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Mobile-Comparison-Website -CVE-2022-26171 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/campcodes.com/Bank-Management-System -CVE-2022-26173 - http://jforum.com -CVE-2022-26173 - https://github.com/WULINPIN/CVE/blob/main/JForum/poc.html -CVE-2022-26180 - http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html -CVE-2022-26180 - https://www.exploit-db.com/exploits/50854 -CVE-2022-26181 - https://github.com/dropbox/lepton/issues/154 -CVE-2022-26183 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ -CVE-2022-26184 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ -CVE-2022-26186 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ -CVE-2022-26187 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ -CVE-2022-26188 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ -CVE-2022-26189 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ -CVE-2022-26197 - https://gist.github.com/CrimsonHamster/1aeec6db0d740de6ed4690f6a975f377 -CVE-2022-26211 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_25/25.md -CVE-2022-26233 - http://packetstormsecurity.com/files/166577/Barco-Control-Room-Management-Suite-Directory-Traversal.html -CVE-2022-26233 - http://seclists.org/fulldisclosure/2022/Apr/0 -CVE-2022-26235 - https://pastebin.com/amgw9pE7 -CVE-2022-26236 - https://pastebin.com/hwrvFix5 -CVE-2022-26237 - https://pastebin.com/DREqM7AT -CVE-2022-26238 - https://pastebin.com/23N5wcC7 -CVE-2022-26239 - https://pastebin.com/1QEHrj01 -CVE-2022-26240 - https://pastebin.com/Bsy6KTxJ -CVE-2022-26243 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-4-sscanf-buffer-overflow-75ae0e06abb6 -CVE-2022-26244 - https://github.com/kishan0725/Hospital-Management-System/issues/23 -CVE-2022-26250 - https://www.bencteux.fr/posts/synaman/ -CVE-2022-26251 - https://www.bencteux.fr/posts/synaman/ -CVE-2022-26252 - https://www.exploit-db.com/exploits/50780 -CVE-2022-26254 - https://youtu.be/b665r1ZfCg4 -CVE-2022-26255 - https://github.com/Fndroid/clash_for_windows_pkg/issues/2710 -CVE-2022-26258 - https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md -CVE-2022-26258 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-2626 - https://huntr.dev/bounties/704aacc9-edff-4da5-90a6-4adf8dbf36fe -CVE-2022-26260 - https://github.com/wollardj/simple-plist/issues/60 -CVE-2022-26269 - https://github.com/nsbogam/CVE-2022-26269/blob/main/README.md -CVE-2022-2627 - https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea -CVE-2022-26278 - https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9 -CVE-2022-26279 - https://github.com/eyoucms/eyoucms/issues/22 -CVE-2022-2628 - https://wpscan.com/vulnerability/e712f83e-b437-4bc6-9511-2b0290ed315d -CVE-2022-26281 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-26281 -CVE-2022-2629 - https://wpscan.com/vulnerability/25a0d41f-3b6f-4d18-b4d5-767ac60ee8a8 -CVE-2022-26291 - https://github.com/ckolivas/lrzip/issues/206 -CVE-2022-26293 - https://www.exploit-db.com/exploits/50682 -CVE-2022-26295 - https://www.exploit-db.com/exploits/50683 -CVE-2022-26296 - https://github.com/riscv-boom/riscv-boom/issues/577 -CVE-2022-26301 - https://github.com/yeyinshi/tuzicms/issues/11 -CVE-2022-26303 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1488 -CVE-2022-2631 - https://huntr.dev/bounties/86881f9e-ca48-49b5-9782-3c406316930c -CVE-2022-26315 - https://github.com/claudiodangelis/qrcp/issues/223 -CVE-2022-26332 - https://www.exploit-db.com/exploits/50788 -CVE-2022-26342 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1484 -CVE-2022-26346 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1507 -CVE-2022-2635 - https://wpscan.com/vulnerability/219767a8-2427-42d5-8734-bd197d9ab46b -CVE-2022-26352 - http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html -CVE-2022-2636 - https://huntr.dev/bounties/357c0390-631c-4684-b6e1-a6d8b2453d66 -CVE-2022-26362 - http://packetstormsecurity.com/files/167718/Xen-TLB-Flush-Bypass.html -CVE-2022-26364 - http://packetstormsecurity.com/files/167710/Xen-PV-Guest-Non-SELFSNOOP-CPU-Memory-Corruption.html -CVE-2022-26376 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511 -CVE-2022-2638 - https://wpscan.com/vulnerability/70840a72-ccdc-4eee-9ad2-874809e5de11 -CVE-2022-26382 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741888 -CVE-2022-26385 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747526 -CVE-2022-26387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1752979 -CVE-2022-26420 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499 -CVE-2022-2643 - https://vuldb.com/?id.205564 -CVE-2022-2645 - https://vuldb.com/?id.205573 -CVE-2022-26479 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/ -CVE-2022-26481 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-command-injection-in-poly-studio/ -CVE-2022-26482 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/ -CVE-2022-26495 - https://lists.debian.org/nbd/2022/01/msg00037.html -CVE-2022-26496 - http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html -CVE-2022-26496 - https://lists.debian.org/nbd/2022/01/msg00037.html -CVE-2022-26497 - http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html -CVE-2022-26498 - http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html -CVE-2022-26498 - http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html -CVE-2022-26499 - http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html -CVE-2022-2650 - https://huntr.dev/bounties/f0d85efa-4e78-4b1d-848f-edea115af64b -CVE-2022-26507 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-02 -CVE-2022-2651 - http://packetstormsecurity.com/files/168423/Bookwyrm-0.4.3-Authentication-Bypass.html -CVE-2022-26510 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1495 -CVE-2022-26518 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501 -CVE-2022-2652 - https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5 -CVE-2022-26521 - http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html -CVE-2022-2653 - https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 -CVE-2022-26531 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html -CVE-2022-26531 - http://packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html -CVE-2022-26532 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html -CVE-2022-2654 - https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993 -CVE-2022-2655 - https://wpscan.com/vulnerability/acc9675a-56f6-411a-9594-07144c2aad1b -CVE-2022-2656 - https://vuldb.com/?id.205596 -CVE-2022-26562 - https://kopano.com/ -CVE-2022-26565 - https://bug.pocas.kr/2022/03/01/2022-03-05-CVE-2022-26565/ -CVE-2022-26565 - https://github.com/totaljs/cms/issues/35 -CVE-2022-2657 - https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a -CVE-2022-26579 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -CVE-2022-2658 - https://wpscan.com/vulnerability/e72fa040-3ca5-4570-9a3c-c704574b1ca3 -CVE-2022-26580 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -CVE-2022-26581 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -CVE-2022-26582 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -CVE-2022-26588 - http://packetstormsecurity.com/files/166627/ICEHRM-31.0.0.0S-Cross-Site-Request-Forgery.html -CVE-2022-26588 - https://medium.com/@devansh3008/csrf-in-icehrm-31-0-0-0s-in-delete-user-endpoint-86a39ecf253f -CVE-2022-26589 - https://medium.com/@devansh3008/pluck-cms-v4-7-15-csrf-vulnerability-at-delete-page-9fff0309f9c -CVE-2022-26589 - https://owasp.org/www-community/attacks/csrf -CVE-2022-26592 - https://github.com/sass/libsass/issues/3174 -CVE-2022-26607 - https://github.com/baigoStudio/baigoCMS/issues/9 -CVE-2022-26613 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613 -CVE-2022-26624 - https://drive.google.com/file/d/1Dp0dD9PNcwamjRi0ldD0hUOEivu48SR6/view?usp=sharing -CVE-2022-26628 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/vetbossel.in/2022/Matrimony -CVE-2022-26629 - https://github.com/sysenter-eip/CVE-2022-26629 -CVE-2022-2663 - https://www.youtube.com/watch?v=WIq-YgQuYCA -CVE-2022-26632 - https://www.exploit-db.com/exploits/50739 -CVE-2022-26633 - https://www.exploit-db.com/exploits/50740 -CVE-2022-26634 - https://www.exploit-db.com/exploits/50765 -CVE-2022-26635 - https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/ -CVE-2022-26639 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_DNSServers%3D.pdf -CVE-2022-26640 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_minAddress%3D.pdf -CVE-2022-26641 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_httpRemotePort%3D.pdf -CVE-2022-26642 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_X_TP_ClonedMACAddress%3D.pdf -CVE-2022-2665 - https://vuldb.com/?id.205615 -CVE-2022-26651 - http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html -CVE-2022-26653 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777 -CVE-2022-26659 - https://docs.docker.com/docker-for-windows/release-notes/ -CVE-2022-2667 - https://vuldb.com/?id.205619 -CVE-2022-2669 - https://wpscan.com/vulnerability/792d9f22-abf6-47b2-a247-d0cdb705cd81 -CVE-2022-26702 - http://seclists.org/fulldisclosure/2023/Mar/21 -CVE-2022-2671 - https://vuldb.com/?id.205655 -CVE-2022-2672 - https://vuldb.com/?id.205656 -CVE-2022-26744 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-2675 - https://fccid.io/2A5PE-YUSHU001/Users-Manual/User-Manual-5810729 -CVE-2022-26757 - http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html -CVE-2022-2676 - https://vuldb.com/?id.205664 -CVE-2022-2677 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-SQL%20injections.md -CVE-2022-2677 - https://vuldb.com/?id.205665 -CVE-2022-26777 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777 -CVE-2022-26779 - https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-vpcc-9rh2-8jfp -CVE-2022-26780 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 -CVE-2022-26781 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 -CVE-2022-26782 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 -CVE-2022-2679 - https://vuldb.com/?id.205667 -CVE-2022-2681 - https://vuldb.com/?id.205669 -CVE-2022-2683 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md -CVE-2022-2683 - https://vuldb.com/?id.205671 -CVE-2022-26833 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513 -CVE-2022-2684 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-XSS.md -CVE-2022-26842 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537 -CVE-2022-2685 - https://vuldb.com/?id.205673 -CVE-2022-26851 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities -CVE-2022-26852 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities -CVE-2022-26854 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities -CVE-2022-26855 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities -CVE-2022-26873 - https://www.binarly.io/advisories/BRLY-2022-027 -CVE-2022-26877 - https://asana.com -CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17 -CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 -CVE-2022-26878 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d0688421449718c6c5f46e458a378c9b530ba18 -CVE-2022-2690 - https://vuldb.com/?id.205813 -CVE-2022-2691 - https://vuldb.com/?id.205814 -CVE-2022-2692 - https://vuldb.com/?id.205815 -CVE-2022-2694 - https://vuldb.com/?id.205817 -CVE-2022-26941 - https://tetraburst.com/ -CVE-2022-26942 - https://tetraburst.com/ -CVE-2022-26943 - https://tetraburst.com/ -CVE-2022-26947 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2022-26948 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2022-26949 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2022-26950 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2022-26951 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 -CVE-2022-26952 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md -CVE-2022-26953 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md -CVE-2022-26959 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1842675717/CVE-2022-26959+Northstar+Club+Management+software+version+6.3+-+Full+Blind+Time-based+SQL+Injection -CVE-2022-26965 - https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html -CVE-2022-26965 - https://youtu.be/sN6J_X4mEbY -CVE-2022-26966 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 -CVE-2022-26966 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062 -CVE-2022-26967 - https://github.com/gpac/gpac/issues/2138 -CVE-2022-26979 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-2698 - https://vuldb.com/?id.205819 -CVE-2022-26980 - https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca -CVE-2022-26981 - https://github.com/liblouis/liblouis/issues/1171 -CVE-2022-26982 - http://packetstormsecurity.com/files/171486/SimpleMachinesForum-2.1.1-Remote-Code-Execution.html -CVE-2022-26986 - http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html -CVE-2022-2699 - https://vuldb.com/?id.205820 -CVE-2022-26990 - https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_2/2.md -CVE-2022-27003 - https://github.com/wudipjq/my_vuln/blob/main/totolink/vuln_32/32.md -CVE-2022-27007 - https://github.com/nginx/njs/issues/469 -CVE-2022-27008 - https://github.com/nginx/njs/issues/471 -CVE-2022-27016 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/10 -CVE-2022-2702 - https://vuldb.com/?id.205826 -CVE-2022-27022 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14 -CVE-2022-2703 - https://vuldb.com/?id.205827 -CVE-2022-2704 - https://vuldb.com/?id.205828 -CVE-2022-27041 - https://github.com/OS4ED/openSIS-Classic/issues/248 -CVE-2022-27044 - https://github.com/saitoha/libsixel/issues/156 -CVE-2022-27046 - https://github.com/saitoha/libsixel/issues/157 -CVE-2022-2705 - https://vuldb.com/?id.205829 -CVE-2022-2706 - https://vuldb.com/?id.205830 -CVE-2022-27061 - http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html -CVE-2022-27061 - https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC -CVE-2022-27062 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html -CVE-2022-27062 - https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc -CVE-2022-27063 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html -CVE-2022-27063 - https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc -CVE-2022-27064 - http://packetstormsecurity.com/files/166653/Musical-World-1-Shell-Upload.html -CVE-2022-27064 - https://github.com/D4rkP0w4r/Musical-World-Unrestricted-File-Upload-RCE-POC -CVE-2022-2707 - https://vuldb.com/?id.205831 -CVE-2022-2708 - https://vuldb.com/?id.205833 -CVE-2022-27083 - https://github.com/GD008/vuln/blob/main/tenda_M3_uploadAccessCodePic/M3_uploadAccessCodePic.md -CVE-2022-2709 - https://wpscan.com/vulnerability/1c551234-9c59-41a0-ab74-beea2d27df6b -CVE-2022-27092 - https://www.exploit-db.com/exploits/50804 -CVE-2022-27094 - https://www.exploit-db.com/exploits/50817 -CVE-2022-27095 - https://www.exploit-db.com/exploits/50815 -CVE-2022-2710 - https://wpscan.com/vulnerability/f730f584-2370-49f9-a094-a5bc521671c1 -CVE-2022-27104 - https://www.swascan.com/security-advisory-forma-lms/ -CVE-2022-2711 - https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1 -CVE-2022-27114 - https://github.com/michaelrsweet/htmldoc/issues/471 -CVE-2022-2713 - https://huntr.dev/bounties/3080fc96-75d7-4868-84de-9fc8c9b90290 -CVE-2022-27134 - https://github.com/Kenun99/CVE-batdappboomx -CVE-2022-27135 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232 -CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/pic_ppm.png -CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/poc_ppm -CVE-2022-27139 - http://ghost.org/docs/security/#privilege-escalation-attacks -CVE-2022-27145 - https://github.com/gpac/gpac/issues/2108 -CVE-2022-27146 - https://github.com/gpac/gpac/issues/2120 -CVE-2022-27147 - https://github.com/gpac/gpac/issues/2109 -CVE-2022-27148 - https://github.com/gpac/gpac/issues/2067 -CVE-2022-27169 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1494 -CVE-2022-27172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496 -CVE-2022-27178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1506 -CVE-2022-27185 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1505 -CVE-2022-27192 - https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md -CVE-2022-27193 - https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2 -CVE-2022-27223 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 -CVE-2022-27226 - http://packetstormsecurity.com/files/166396/iRZ-Mobile-Router-Cross-Site-Request-Forgery-Remote-Code-Execution.html -CVE-2022-27226 - https://github.com/SakuraSamuraii/ez-iRZ -CVE-2022-27226 - https://johnjhacking.com/blog/cve-2022-27226/ -CVE-2022-2723 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20eprocess.php%20SQL%20Injection/ -CVE-2022-2724 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20aprocess.php%20SQL%20Injection/ -CVE-2022-2724 - https://vuldb.com/?id.205837 -CVE-2022-27248 - http://packetstormsecurity.com/files/166560/IdeaRE-RefTree-Path-Traversal.html -CVE-2022-27249 - http://packetstormsecurity.com/files/166559/IdeaRE-RefTree-Shell-Upload.html -CVE-2022-27254 - https://github.com/nonamecoder/CVE-2022-27254 -CVE-2022-27254 - https://news.ycombinator.com/item?id=30804702 -CVE-2022-27254 - https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/ -CVE-2022-27254 - https://www.theregister.com/2022/03/25/honda_civic_hack/ -CVE-2022-27256 - https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/ -CVE-2022-2726 - https://vuldb.com/?id.205839 -CVE-2022-27260 - http://buttercms.com -CVE-2022-27263 - https://github.com/strapi/strapi -CVE-2022-27268 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27269 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27270 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27271 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27272 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27273 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27274 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27275 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27276 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing -CVE-2022-27286 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27287 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27288 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27289 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-2729 - https://huntr.dev/bounties/13b58e74-2dd0-4eec-9f3a-554485701540 -CVE-2022-27290 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27291 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27292 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27293 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27294 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-27295 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-2730 - https://huntr.dev/bounties/a81f39ab-092b-4941-b9ca-c4c8f2191504 -CVE-2022-27304 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Student-Grading-System -CVE-2022-27308 - http://packetstormsecurity.com/files/166966/PHProjekt-PhpSimplyGest-MyProjects-1.3.0-Cross-Site-Scripting.html -CVE-2022-2731 - https://huntr.dev/bounties/20b8d5c5-0764-4f0b-8ab3-b9f6b857175e -CVE-2022-2732 - https://huntr.dev/bounties/8773e0d1-5f1a-4e87-8998-f5ec45f6d533 -CVE-2022-2733 - https://huntr.dev/bounties/25b91301-dfb0-4353-a732-e051bbe8420c -CVE-2022-27330 - https://github.com/CP04042K/Full-Ecommece-Website-Add_Product-Stored_XSS-POC -CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230 -CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230#note_1372177 -CVE-2022-2734 - https://huntr.dev/bounties/d8e4c70c-788b-47e9-8141-a08db751d4e6 -CVE-2022-27346 - http://packetstormsecurity.com/files/166654/E-Commerce-Website-1.1.0-Shell-Upload.html -CVE-2022-27346 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC -CVE-2022-27348 - http://packetstormsecurity.com/files/166650/Social-Codia-SMS-1-Cross-Site-Scripting.html -CVE-2022-27348 - https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC -CVE-2022-27349 - http://packetstormsecurity.com/files/166655/Social-Codia-SMS-1-Shell-Upload.html -CVE-2022-27349 - https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC -CVE-2022-2735 - https://www.openwall.com/lists/oss-security/2022/09/01/4 -CVE-2022-27351 - http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html -CVE-2022-27351 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md -CVE-2022-27352 - http://packetstormsecurity.com/files/166656/Simple-House-Rental-System-1-Shell-Upload.html -CVE-2022-27352 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md -CVE-2022-27357 - http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html -CVE-2022-27357 - https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md -CVE-2022-27365 - https://github.com/chshcms/cscms/issues/12#issue-1170440183 -CVE-2022-2737 - https://wpscan.com/vulnerability/91bbdeb0-f2df-4500-b856-af0ff68fbb12 -CVE-2022-27374 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12.md -CVE-2022-27375 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12-2.md -CVE-2022-27378 - https://jira.mariadb.org/browse/MDEV-26423 -CVE-2022-27382 - https://jira.mariadb.org/browse/MDEV-26402 -CVE-2022-27385 - https://jira.mariadb.org/browse/MDEV-26415 -CVE-2022-27386 - https://jira.mariadb.org/browse/MDEV-26406 -CVE-2022-27387 - https://jira.mariadb.org/browse/MDEV-26422 -CVE-2022-27411 - https://github.com/ejdhssh/IOT_Vul -CVE-2022-27412 - http://packetstormsecurity.com/files/166694/Explore-CMS-1.0-SQL-Injection.html -CVE-2022-27431 - https://github.com/wuzhicms/wuzhicms/issues/200 -CVE-2022-27432 - https://owasp.org/www-community/attacks/csrf -CVE-2022-27432 - https://www.exploit-db.com/exploits/50831 -CVE-2022-27435 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC -CVE-2022-27436 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC -CVE-2022-27438 - https://gerr.re/posts/cve-2022-27438/ -CVE-2022-2744 - https://vuldb.com/?id.206012 -CVE-2022-27444 - https://jira.mariadb.org/browse/MDEV-28080 -CVE-2022-27445 - https://jira.mariadb.org/browse/MDEV-28081 -CVE-2022-27446 - https://jira.mariadb.org/browse/MDEV-28082 -CVE-2022-27447 - https://jira.mariadb.org/browse/MDEV-28099 -CVE-2022-27448 - https://jira.mariadb.org/browse/MDEV-28095 -CVE-2022-27449 - https://jira.mariadb.org/browse/MDEV-28089 -CVE-2022-2745 - https://vuldb.com/?id.206013 -CVE-2022-27451 - https://jira.mariadb.org/browse/MDEV-28094 -CVE-2022-27452 - https://jira.mariadb.org/browse/MDEV-28090 -CVE-2022-27455 - https://jira.mariadb.org/browse/MDEV-28097 -CVE-2022-27456 - https://jira.mariadb.org/browse/MDEV-28093 -CVE-2022-27457 - https://jira.mariadb.org/browse/MDEV-28098 -CVE-2022-27458 - https://jira.mariadb.org/browse/MDEV-28099 -CVE-2022-2747 - https://vuldb.com/?id.206015 -CVE-2022-27474 - https://github.com/Mount4in/Mount4in.github.io/blob/master/poc.py -CVE-2022-2748 - https://vuldb.com/?id.206016 -CVE-2022-27480 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html -CVE-2022-27480 - http://seclists.org/fulldisclosure/2022/Apr/20 -CVE-2022-27481 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf -CVE-2022-27498 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531 -CVE-2022-2750 - https://vuldb.com/?id.206022 -CVE-2022-2752 - https://www.secomea.com/support/cybersecurity-advisory -CVE-2022-2753 - https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182 -CVE-2022-27531 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010 -CVE-2022-27532 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010 -CVE-2022-27534 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_2 -CVE-2022-27535 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822 -CVE-2022-2754 - https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5 -CVE-2022-2756 - https://huntr.dev/bounties/95e7c181-9d80-4428-aebf-687ac55a9216 -CVE-2022-27567 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27568 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27569 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27570 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27571 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27572 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27573 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27574 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27575 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27576 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27607 - https://github.com/axiomatic-systems/Bento4/issues/677 -CVE-2022-2762 - https://wpscan.com/vulnerability/cf0b3893-3283-46d6-a497-f3110a35d42a -CVE-2022-2763 - https://wpscan.com/vulnerability/36a7b872-31fa-4375-9be7-8f787e616ed5 -CVE-2022-27630 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1504 -CVE-2022-27631 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510 -CVE-2022-27633 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1503 -CVE-2022-27642 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327 -CVE-2022-27645 - https://kb.netgear.com/000064722/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-Fixed-Wireless-Products-PSV-2021-0325 -CVE-2022-27647 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327 -CVE-2022-2765 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS--.md -CVE-2022-27654 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27655 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27656 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27657 - http://packetstormsecurity.com/files/167563/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Directory-Traversal.html -CVE-2022-27657 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27658 - https://launchpad.support.sap.com/#/notes/3165856 -CVE-2022-2766 - https://vuldb.com/?id.206162 -CVE-2022-27660 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1502 -CVE-2022-27666 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.15 -CVE-2022-27667 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27668 - http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html -CVE-2022-27668 - http://seclists.org/fulldisclosure/2022/Sep/17 -CVE-2022-27668 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27669 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27670 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-27671 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-2769 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS(XSS).md -CVE-2022-2770 - https://vuldb.com/?id.206166 -CVE-2022-2772 - https://vuldb.com/?id.206168 -CVE-2022-2774 - https://vuldb.com/?id.206170 -CVE-2022-2775 - https://wpscan.com/vulnerability/7101ce04-670e-4ce0-9f60-e00494ff379d -CVE-2022-2776 - https://vuldb.com/?id.206172 -CVE-2022-2777 - https://huntr.dev/bounties/13dd2f4d-0c7f-483e-a771-e1ed2ff1c36f -CVE-2022-27778 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-27782 - https://hackerone.com/reports/1555796 -CVE-2022-27804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567 -CVE-2022-27805 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1552 -CVE-2022-27813 - https://tetraburst.com/ -CVE-2022-27821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27823 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27824 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27825 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27826 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27827 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27828 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27829 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27830 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27834 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27835 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27836 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 -CVE-2022-27881 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html -CVE-2022-27882 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html -CVE-2022-27888 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md -CVE-2022-27889 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md -CVE-2022-27890 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md -CVE-2022-27895 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md -CVE-2022-27896 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md -CVE-2022-27907 - https://support.sonatype.com/hc/en-us/articles/5011047953555 -CVE-2022-27925 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html -CVE-2022-27927 - http://packetstormsecurity.com/files/167017/Microfinance-Management-System-1.0-SQL-Injection.html -CVE-2022-27927 - https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated -CVE-2022-27938 - https://github.com/saitoha/libsixel/issues/163 -CVE-2022-27939 - https://github.com/appneta/tcpreplay/issues/717 -CVE-2022-27940 - https://github.com/appneta/tcpreplay/issues/718 -CVE-2022-27941 - https://github.com/appneta/tcpreplay/issues/716 -CVE-2022-27942 - https://github.com/appneta/tcpreplay/issues/719 -CVE-2022-27944 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-27946 - https://github.com/donothingme/VUL/blob/main/vul3/3.md -CVE-2022-27950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11 -CVE-2022-27958 - https://github.com/afeng2016-s/CVE-Request/blob/main/febs-security/febs.md -CVE-2022-2796 - https://huntr.dev/bounties/69d56ec3-8370-44cf-9732-4065e3076097 -CVE-2022-27978 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md -CVE-2022-27979 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220321-tooljet-xss.md -CVE-2022-2798 - https://wpscan.com/vulnerability/f169567d-c682-4abe-94df-a9d00be90edd -CVE-2022-27982 - https://www.adminxe.com/3651.html -CVE-2022-27983 - https://www.adminxe.com/3687.html -CVE-2022-27984 - https://github.com/CuppaCMS/CuppaCMS/issues/30 -CVE-2022-27985 - https://github.com/CuppaCMS/CuppaCMS/issues/31 -CVE-2022-2799 - https://wpscan.com/vulnerability/4385370e-cf99-4249-b2c1-90cbfa8378a4 -CVE-2022-27991 - https://github.com/D4rkP0w4r/CVEs/blob/main/Online-Banking_SQLI/POC.md -CVE-2022-27992 - http://packetstormsecurity.com/files/166648/PHPGurukul-Zoo-Management-System-1.0-SQL-Injection.html -CVE-2022-27992 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md -CVE-2022-28000 - http://packetstormsecurity.com/files/166657/Car-Rental-System-1.0-SQL-Injection.html -CVE-2022-28000 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20SQLI/POC.md -CVE-2022-28001 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html -CVE-2022-28001 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20SQLI/POC.md -CVE-2022-28002 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html -CVE-2022-28002 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20File%20Disclosure/POC.md -CVE-2022-28005 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 -CVE-2022-28006 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip -CVE-2022-2801 - https://vuldb.com/?id.206247 -CVE-2022-28021 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/RCE-1.md -CVE-2022-28022 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-1.md -CVE-2022-28023 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-2.md -CVE-2022-28024 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-1.md -CVE-2022-28025 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-2.md -CVE-2022-28026 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-3.md -CVE-2022-28028 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-1.md -CVE-2022-28029 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md -CVE-2022-28030 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-3.md -CVE-2022-2804 - https://vuldb.com/?id.206250 -CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/blob/main/CVE-2022-28051/README.md -CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28051 -CVE-2022-28060 - https://github.com/JiuBanSec/CVE/blob/main/VictorCMS%20SQL.md -CVE-2022-28062 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20Upload%20%2B%20RCE/POC.md -CVE-2022-28063 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20Bakery%20Shop%20Management%20System%20File%20Disclosure/POC.md -CVE-2022-28079 - http://packetstormsecurity.com/files/167131/College-Management-System-1.0-SQL-Injection.html -CVE-2022-28079 - https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated -CVE-2022-28080 - http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html -CVE-2022-28080 - https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated -CVE-2022-28080 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip -CVE-2022-28085 - https://github.com/michaelrsweet/htmldoc/issues/480 -CVE-2022-28099 - https://github.com/IbrahimEkimIsik/CVE-2022-28099/blob/main/SQL%20Injection%20For%20Poultry%20Farm%20Management%20system%201.0 -CVE-2022-28099 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip -CVE-2022-28102 - https://github.com/housamz/php-mysql-admin-panel-generator/issues/19 -CVE-2022-28104 - https://packetstormsecurity.com/files/166430 -CVE-2022-28108 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ -CVE-2022-28109 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ -CVE-2022-28110 - https://medium.com/@honeyakshat999/hotel-management-system-sql-injection-on-login-page-a1ca87a31176 -CVE-2022-28117 - http://packetstormsecurity.com/files/167063/Navigate-CMS-2.9.4-Server-Side-Request-Forgery.html -CVE-2022-28127 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1571 -CVE-2022-28132 - https://www.exploit-db.com/exploits/50939 -CVE-2022-2814 - https://vuldb.com/?id.206401 -CVE-2022-2816 - https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58 -CVE-2022-2817 - https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f -CVE-2022-28171 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html -CVE-2022-28171 - http://packetstormsecurity.com/files/173653/Hikvision-Hybrid-SAN-Ds-a71024-SQL-Injection.html -CVE-2022-28172 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html -CVE-2022-2818 - https://huntr.dev/bounties/ee27e5df-516b-4cf4-9f28-346d907b5491 -CVE-2022-28181 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28182 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28183 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28184 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28185 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28186 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28187 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28188 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28189 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-2819 - https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59 -CVE-2022-28190 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28191 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28192 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 -CVE-2022-28193 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 -CVE-2022-28194 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 -CVE-2022-28195 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 -CVE-2022-28196 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 -CVE-2022-28197 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 -CVE-2022-28199 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8 -CVE-2022-2820 - https://huntr.dev/bounties/df06b7d7-6077-43a5-bd81-3cc66f0d4d19 -CVE-2022-2821 - https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069 -CVE-2022-28213 - http://packetstormsecurity.com/files/167046/SAP-BusinessObjects-Intelligence-4.3-XML-Injection.html -CVE-2022-28213 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28216 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28217 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28219 - http://packetstormsecurity.com/files/167997/ManageEngine-ADAudit-Plus-Path-Traversal-XML-Injection.html -CVE-2022-28219 - https://www.horizon3.ai/red-team-blog-cve-2022-28219/ -CVE-2022-28219 - https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html -CVE-2022-2823 - https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-af6bce6bb4ef -CVE-2022-2824 - https://huntr.dev/bounties/1ccb2d1c-6881-4813-a5bc-1603d29b7141 -CVE-2022-28282 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751609 -CVE-2022-28286 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735265 -CVE-2022-28287 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741515 -CVE-2022-2829 - https://huntr.dev/bounties/d6eaa453-9758-41b7-8c38-fd878d6aeab4 -CVE-2022-28290 - https://cybersecurityworks.com/zerodays/cve-2022-28290-reflected-cross-site-scripting-in-welaunch.html -CVE-2022-28291 - https://cybersecurityworks.com/blog/zero-days/csw-expert-discovers-a-zero-day-vulnerability-in-tenables-nessus-scanner.html -CVE-2022-2831 - https://developer.blender.org/T99705 -CVE-2022-2832 - https://developer.blender.org/D15463 -CVE-2022-2832 - https://developer.blender.org/T99706 -CVE-2022-28321 - http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/ -CVE-2022-28328 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf -CVE-2022-28329 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf -CVE-2022-2833 - https://developer.blender.org/T99711 -CVE-2022-2834 - https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae -CVE-2022-28345 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-42.md -CVE-2022-28345 - https://github.com/zadewg/RIUS -CVE-2022-28345 - https://sick.codes/sick-2022-42 -CVE-2022-28353 - http://packetstormsecurity.com/files/171403/MyBB-External-Redirect-Warning-1.3-Cross-Site-Scripting.html -CVE-2022-28354 - http://packetstormsecurity.com/files/171402/MyBB-Active-Threads-1.3.0-Cross-Site-Scripting.html -CVE-2022-28356 - http://www.openwall.com/lists/oss-security/2022/04/06/1 -CVE-2022-28356 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 -CVE-2022-28363 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html -CVE-2022-28363 - https://seclists.org/fulldisclosure/2022/Apr/1 -CVE-2022-28364 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html -CVE-2022-28364 - https://seclists.org/fulldisclosure/2022/Apr/1 -CVE-2022-28365 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html -CVE-2022-28365 - https://seclists.org/fulldisclosure/2022/Apr/1 -CVE-2022-28368 - http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html -CVE-2022-28381 - http://packetstormsecurity.com/files/166573/ALLMediaServer-1.6-Buffer-Overflow.html -CVE-2022-28382 - http://packetstormsecurity.com/files/167491/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-ECB-Issue.html -CVE-2022-28382 - http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html -CVE-2022-28382 - http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html -CVE-2022-28382 - http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html -CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/18 -CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/22 -CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/24 -CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/9 -CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Oct/4 -CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt -CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt -CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt -CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt -CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt -CVE-2022-28383 - http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Missing-Control.html -CVE-2022-28383 - http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html -CVE-2022-28383 - http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html -CVE-2022-28383 - http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html -CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/10 -CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/12 -CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/19 -CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/25 -CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Oct/5 -CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.txt -CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.txt -CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.txt -CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.txt -CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.txt -CVE-2022-28384 - http://packetstormsecurity.com/files/167481/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Cryptography-Issue.html -CVE-2022-28384 - http://packetstormsecurity.com/files/167499/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html -CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/17 -CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/8 -CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Oct/3 -CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt -CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt -CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt -CVE-2022-28385 - http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html -CVE-2022-28385 - http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html -CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/23 -CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/26 -CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-013.txt -CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-017.txt -CVE-2022-28386 - http://packetstormsecurity.com/files/167492/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Passcode-Retry.html -CVE-2022-28386 - http://packetstormsecurity.com/files/167509/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Behavior-Violation.html -CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/11 -CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/20 -CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Oct/6 -CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-004.txt -CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-008.txt -CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-046.txt -CVE-2022-28387 - http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html -CVE-2022-28387 - http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html -CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/13 -CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/21 -CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-009.txt -CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-014.txt -CVE-2022-2839 - https://wpscan.com/vulnerability/82e01f95-81c2-46d8-898e-07b3b8a3f8c9 -CVE-2022-28397 - https://ghost.org/docs/security/#privilege-escalation-attacks -CVE-2022-2840 - http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html -CVE-2022-2840 - https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c -CVE-2022-2841 - https://www.modzero.com/advisories/MZ-22-02-CrowdStrike-FalconSensor.txt -CVE-2022-2841 - https://www.modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html -CVE-2022-2841 - https://youtu.be/3If-Fqwx-4s -CVE-2022-28410 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-4.md -CVE-2022-28411 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-5.md -CVE-2022-28412 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-1.md -CVE-2022-28413 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-2.md -CVE-2022-2842 - https://vuldb.com/?id.206451 -CVE-2022-2843 - https://vuldb.com/?id.206486 -CVE-2022-2845 - https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445 -CVE-2022-28452 - https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL -CVE-2022-28452 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-28452 -CVE-2022-2846 - http://packetstormsecurity.com/files/171697/Calendar-Event-Multi-View-1.4.07-Cross-Site-Scripting.html -CVE-2022-2846 - https://wpscan.com/vulnerability/95f92062-08ce-478a-a2bc-6d026adf657c -CVE-2022-28463 - https://github.com/ImageMagick/ImageMagick/issues/4988 -CVE-2022-28468 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Payroll-Management-System -CVE-2022-2847 - https://vuldb.com/?id.206489 -CVE-2022-28471 - https://github.com/rockcarry/ffjpeg/issues/49 -CVE-2022-28478 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 -CVE-2022-28479 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28479 -CVE-2022-28480 - https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html -CVE-2022-28488 - https://github.com/marc-q/libwav/issues/29 -CVE-2022-28488 - https://github.com/tin-z/Stuff_and_POCs/blob/main/poc_libwav/POC -CVE-2022-2849 - https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e -CVE-2022-28491 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md -CVE-2022-28492 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/8/8.md -CVE-2022-28494 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md -CVE-2022-28495 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md -CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png -CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/giflib_poc -CVE-2022-28506 - https://sourceforge.net/p/giflib/bugs/159/ -CVE-2022-28507 - https://youtu.be/Ra7tWMs5dkk -CVE-2022-2852 - http://packetstormsecurity.com/files/169457/Chrome-AccountSelectionBubbleView-OnAccountImageFetched-Heap-Use-After-Free.html -CVE-2022-28521 - https://github.com/zhendezuile/bug_report/blob/main/zcms%EF%BC%9Aphp%20file%20inclusion -CVE-2022-28522 - https://github.com/zhendezuile/bug_report/blob/main/zcms -CVE-2022-2853 - http://packetstormsecurity.com/files/169459/Chrome-offline_items_collection-OfflineContentAggregator-OnItemRemoved-Heap-Buffer-Overflow.html -CVE-2022-28530 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html -CVE-2022-28531 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html -CVE-2022-28533 - https://packetstormsecurity.com/files/166539 -CVE-2022-28560 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/Tenda%20AC9 -CVE-2022-28561 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/AX12 -CVE-2022-28571 - https://github.com/F0und-icu/TempName/tree/main/Dlink-882 -CVE-2022-28571 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28572 - https://github.com/F0und-icu/TempName/tree/main/TendaAX18 -CVE-2022-28573 - https://github.com/F0und-icu/TempName/tree/main/Dlink-823pro -CVE-2022-28573 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28575 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1 -CVE-2022-28577 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/3 -CVE-2022-28578 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2 -CVE-2022-28579 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/4 -CVE-2022-28580 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/5 -CVE-2022-28581 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/9 -CVE-2022-28582 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6 -CVE-2022-28583 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7 -CVE-2022-28584 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/8 -CVE-2022-28586 - https://github.com/havok89/Hoosk/issues/63 -CVE-2022-28589 - https://github.com/pixelimity/pixelimity/issues/23 -CVE-2022-28598 - http://packetstormsecurity.com/files/171730/ERPNext-12.29-Cross-Site-Scripting.html -CVE-2022-28599 - https://github.com/daylightstudio/FUEL-CMS/issues/595 -CVE-2022-28601 - https://github.com/FlaviuPopescu/CVE-2022-28601 -CVE-2022-2862 - https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765 -CVE-2022-2863 - http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html -CVE-2022-2863 - https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5 -CVE-2022-28637 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us -CVE-2022-28638 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us -CVE-2022-28639 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us -CVE-2022-28640 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us -CVE-2022-28664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509 -CVE-2022-28665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509 -CVE-2022-28669 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28670 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28671 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28672 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28673 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28674 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28675 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28676 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28677 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28678 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28679 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28680 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28681 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28682 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28683 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-28689 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521 -CVE-2022-28703 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532 -CVE-2022-2871 - https://huntr.dev/bounties/61126c07-22ac-4961-a198-1aa33060b373 -CVE-2022-28710 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550 -CVE-2022-28711 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512 -CVE-2022-28712 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540 -CVE-2022-2872 - https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56 -CVE-2022-2873 - https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/ -CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/30 -CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/42 -CVE-2022-2874 - https://huntr.dev/bounties/95f97dfe-247d-475d-9740-b7adc71f4c79 -CVE-2022-2877 - https://wpscan.com/vulnerability/f1af4267-3a43-4b88-a8b9-c1d5b2aa9d68 -CVE-2022-28770 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28771 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28772 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28773 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28774 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-28780 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28781 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28782 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28783 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28784 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28785 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28786 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28787 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28788 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 -CVE-2022-28794 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-28795 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2022-28796 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 -CVE-2022-28802 - https://www.zenity.io/blog/zapescape-vulnerability-disclosure/ -CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00001.html -CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00070.html -CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-04/msg00009.html -CVE-2022-28810 - http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html -CVE-2022-28810 - https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/ -CVE-2022-2884 - http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html -CVE-2022-2884 - https://gitlab.com/gitlab-org/gitlab/-/issues/371098 -CVE-2022-2885 - https://huntr.dev/bounties/edeed309-be07-4373-b15e-2d1eb415eb89 -CVE-2022-2886 - https://vuldb.com/?id.206688 -CVE-2022-28862 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-28862 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2022-28863 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-28864 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-28865 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-28866 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-28866 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html -CVE-2022-28867 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-2887 - https://wpscan.com/vulnerability/237541d5-c1a5-44f2-8e5f-82457b8f9497 -CVE-2022-2888 - https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629 -CVE-2022-28888 - http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html -CVE-2022-28888 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html -CVE-2022-28888 - http://seclists.org/fulldisclosure/2022/Jul/4 -CVE-2022-28888 - https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ -CVE-2022-2889 - https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa -CVE-2022-28893 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a -CVE-2022-28895 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/1 -CVE-2022-28895 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28896 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/2 -CVE-2022-28896 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-2890 - https://huntr.dev/bounties/5d228a33-eda3-4cff-91da-7bc43e6636da -CVE-2022-28901 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/3 -CVE-2022-28901 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28905 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/1 -CVE-2022-28906 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/2 -CVE-2022-28907 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/5 -CVE-2022-28908 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/4 -CVE-2022-28909 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/3 -CVE-2022-28910 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/9 -CVE-2022-28911 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/7 -CVE-2022-28912 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/8 -CVE-2022-28913 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/10 -CVE-2022-28915 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/1 -CVE-2022-28915 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28917 - https://github.com/NSSCYCTFER/SRC-CVE -CVE-2022-28921 - https://www.0xlanks.me/blog/cve-2022-28921-advisory/ -CVE-2022-28924 - https://suumcuique.org/blog/posts/information-disclosure-vulnerability-universis -CVE-2022-28927 - https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03 -CVE-2022-28932 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28944 - https://github.com/gerr-re/cve-2022-28944/blob/main/cve-2022-28944_public-advisory.pdf -CVE-2022-28955 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28956 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-28958 - https://vulncheck.com/blog/moobot-uses-fake-vulnerability -CVE-2022-28959 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ -CVE-2022-28960 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ -CVE-2022-28961 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ -CVE-2022-28962 - https://packetstormsecurity.com/files/166598/Online-Sports-Complex-Booking-System-1.0-SQL-Injection.html -CVE-2022-28966 - https://github.com/wasm3/wasm3/issues/320 -CVE-2022-28969 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetWifiGusetBasic -CVE-2022-28970 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/GetParentControlInfo/readme.md -CVE-2022-28971 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md -CVE-2022-28972 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/form_fast_setting_wifi_set/readme.md -CVE-2022-28973 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromAdvSetMacMtuWan/readme.md -CVE-2022-28975 - https://piotrryciak.com/posts/xss-infoblox/ -CVE-2022-28979 - https://issues.liferay.com/browse/LPE-17381 -CVE-2022-28986 - https://github.com/FlaviuPopescu/CVE-2022-28986 -CVE-2022-28987 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.md -CVE-2022-28990 - https://github.com/wasm3/wasm3/issues/323 -CVE-2022-28991 - https://packetstormsecurity.com/files/166590/Multi-Store-Inventory-Management-System-1.0-Information-Disclosure.html -CVE-2022-28992 - https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html -CVE-2022-28993 - https://packetstormsecurity.com/files/166591/Multi-Store-Inventory-Management-System-1.0-Account-Takeover.html -CVE-2022-28994 - https://packetstormsecurity.com/files/166622/Small-HTTP-Server-3.06-Remote-Buffer-Overflow.html -CVE-2022-28997 - https://packetstormsecurity.com/files/166613/CSZCMS-1.3.0-SSRF-LFI-Remote-Code-Execution.html -CVE-2022-28998 - https://packetstormsecurity.com/files/166381/Xlight-FTP-3.9.3.2-Buffer-Overflow.html -CVE-2022-29002 - https://github.com/xuxueli/xxl-job/issues/2821 -CVE-2022-29006 - https://www.exploit-db.com/exploits/50370 -CVE-2022-29007 - https://www.exploit-db.com/exploits/50365 -CVE-2022-29008 - https://www.exploit-db.com/exploits/50263 -CVE-2022-29009 - https://www.exploit-db.com/exploits/50355 -CVE-2022-2901 - https://huntr.dev/bounties/cf46e0a6-f1b5-4959-a952-be9e4bac03fe -CVE-2022-29013 - https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-Injection.html -CVE-2022-29013 - https://www.exploit-db.com/exploits/50865 -CVE-2022-29014 - https://packetstormsecurity.com/files/166683/Razer-Sila-2.0.418-Local-File-Inclusion.html -CVE-2022-29014 - https://www.exploit-db.com/exploits/50864 -CVE-2022-29017 - https://github.com/axiomatic-systems/Bento4/issues/691 -CVE-2022-29021 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities -CVE-2022-29022 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities -CVE-2022-29023 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities -CVE-2022-2903 - https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864 -CVE-2022-29034 - http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html -CVE-2022-29034 - http://seclists.org/fulldisclosure/2022/Jun/35 -CVE-2022-29072 - http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html -CVE-2022-29072 - https://github.com/kagancapar/CVE-2022-29072 -CVE-2022-29072 - https://news.ycombinator.com/item?id=31070256 -CVE-2022-29072 - https://www.youtube.com/watch?v=sT1cvbu7ZTA -CVE-2022-29078 - https://eslam.io/posts/ejs-server-side-template-injection-rce/ -CVE-2022-29080 - https://github.com/barneycarroll/npm-dependency-versions/issues/6 -CVE-2022-29081 - https://www.tenable.com/security/research/tra-2022-14 -CVE-2022-2909 - https://vuldb.com/?id.206845 -CVE-2022-2912 - https://wpscan.com/vulnerability/fd9853e8-b3ae-4a10-8389-8a4a11a8297c -CVE-2022-2913 - https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1 -CVE-2022-29156 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 -CVE-2022-29181 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-29181 - https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/ -CVE-2022-2921 - https://huntr.dev/bounties/51b32a1c-946b-4390-a212-b6c4b6e4115c -CVE-2022-29217 - https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc -CVE-2022-29217 - https://github.com/jpadilla/pyjwt/releases/tag/2.4.0 -CVE-2022-29217 - https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24 -CVE-2022-2922 - https://huntr.dev/bounties/74918f40-dc11-4218-abef-064eb71a0703 -CVE-2022-29224 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49 -CVE-2022-29225 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh -CVE-2022-29226 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh -CVE-2022-29227 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6 -CVE-2022-29228 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6 -CVE-2022-2923 - https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2 -CVE-2022-2924 - https://huntr.dev/bounties/f0f3aded-6e97-4cf2-980a-c90f2c6ca0e0 -CVE-2022-2925 - https://huntr.dev/bounties/a3b4148f-165f-4583-abed-5568696d99dc -CVE-2022-2926 - https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785 -CVE-2022-29269 - https://github.com/4LPH4-NL/CVEs -CVE-2022-29269 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi -CVE-2022-2927 - https://huntr.dev/bounties/7fa956dd-f541-4dcd-987d-ba15caa6a886 -CVE-2022-29270 - https://github.com/4LPH4-NL/CVEs -CVE-2022-29270 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi -CVE-2022-29271 - https://github.com/4LPH4-NL/CVEs -CVE-2022-29271 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi -CVE-2022-29272 - https://github.com/4LPH4-NL/CVEs -CVE-2022-29272 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi -CVE-2022-29287 - https://devnet.kentico.com/download/hotfixes -CVE-2022-29296 - http://packetstormsecurity.com/files/167341/Avantune-Genialcloud-ProJ-10-Cross-Site-Scripting.html -CVE-2022-29296 - https://dl.packetstormsecurity.net/2206-exploits/avantunegenialcloudproj10-xss.txt -CVE-2022-29298 - http://packetstormsecurity.com/files/167383/SolarView-Compact-6.00-Directory-Traversal.html -CVE-2022-2930 - https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477 -CVE-2022-29303 - http://packetstormsecurity.com/files/167183/SolarView-Compact-6.0-Command-Injection.html -CVE-2022-29303 - https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing -CVE-2022-29305 - https://github.com/helloxz/imgurl/issues/75 -CVE-2022-29315 - https://the-it-wonders.blogspot.com/2022/04/csv-injection-in-acunetix-version.html -CVE-2022-2932 - https://huntr.dev/bounties/2-other-bustle/mobiledoc-kit -CVE-2022-29320 - https://www.exploit-db.com/exploits/50859 -CVE-2022-29321 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/4 -CVE-2022-29321 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29322 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/5 -CVE-2022-29322 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29323 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/3 -CVE-2022-29323 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29324 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/6 -CVE-2022-29324 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29325 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/8 -CVE-2022-29325 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29326 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/7 -CVE-2022-29326 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29327 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/9 -CVE-2022-29327 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29328 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/1 -CVE-2022-29328 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29329 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/2 -CVE-2022-29329 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29332 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf -CVE-2022-29333 - https://www.youtube.com/watch?v=r75k-ae3_ng -CVE-2022-29333 - https://youtu.be/B46wtd-ZNog -CVE-2022-29339 - https://github.com/gpac/gpac/issues/2165 -CVE-2022-29340 - https://github.com/gpac/gpac/issues/2163 -CVE-2022-29347 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2022-29347 -CVE-2022-29349 - https://github.com/kekingcn/kkFileView/issues/347 -CVE-2022-29351 - https://www.youtube.com/watch?v=F_DBx4psWns -CVE-2022-29358 - https://github.com/kevinboone/epub2txt2/issues/22 -CVE-2022-29360 - https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/ -CVE-2022-29363 - https://github.com/qinggan/phpok/issues/12 -CVE-2022-29368 - https://github.com/Moddable-OpenSource/moddable/issues/896 -CVE-2022-29369 - https://github.com/nginx/njs/issues/467 -CVE-2022-2938 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848 -CVE-2022-29380 - https://www.exploit-db.com/exploits/49298 -CVE-2022-29391 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/5.setStaticDhcpConfig -CVE-2022-29392 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/2.setPortForwardRules -CVE-2022-29393 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules -CVE-2022-29394 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/1.setWiFiAclAddConfig -CVE-2022-29395 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/6.setWiFiRepeaterConfig -CVE-2022-29396 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/8.setIpPortFilterRules -CVE-2022-29397 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/4.setMacFilterRules -CVE-2022-29398 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/7.UploadCustomModule -CVE-2022-29399 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/9.setUrlFilterRules -CVE-2022-2941 - http://packetstormsecurity.com/files/168479/WordPress-WP-UserOnline-2.88.0-Cross-Site-Scripting.html -CVE-2022-2941 - https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt -CVE-2022-2943 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 -CVE-2022-2945 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 -CVE-2022-29455 - https://rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor -CVE-2022-29457 - http://packetstormsecurity.com/files/167051/ManageEngine-ADSelfService-Plus-Build-6118-NTLMv2-Hash-Exposure.html -CVE-2022-29458 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html -CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html -CVE-2022-2946 - https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 -CVE-2022-29464 - http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html -CVE-2022-29464 - http://www.openwall.com/lists/oss-security/2022/04/22/7 -CVE-2022-29464 - https://github.com/hakivvi/CVE-2022-29464 -CVE-2022-29465 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1526 -CVE-2022-29468 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1534 -CVE-2022-2947 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 -CVE-2022-29472 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566 -CVE-2022-29475 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1553 -CVE-2022-29477 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554 -CVE-2022-29481 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518 -CVE-2022-2949 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 -CVE-2022-29496 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1524 -CVE-2022-2950 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 -CVE-2022-29503 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517 -CVE-2022-2951 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 -CVE-2022-29511 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530 -CVE-2022-29517 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1529 -CVE-2022-29520 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1561 -CVE-2022-2953 - https://gitlab.com/libtiff/libtiff/-/issues/414 -CVE-2022-29537 - https://github.com/gpac/gpac/issues/2173 -CVE-2022-29538 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-29539 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-29540 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-29548 - http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html -CVE-2022-29549 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html -CVE-2022-29549 - https://blog.qualys.com/vulnerabilities-threat-research -CVE-2022-29550 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html -CVE-2022-29550 - https://blog.qualys.com/vulnerabilities-threat-research -CVE-2022-29557 - https://github.com/Q2Flc2FySec/CVE-List/blob/main/CVE-2022-29557.txt -CVE-2022-29566 - https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/ -CVE-2022-29577 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-2958 - https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a -CVE-2022-29581 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -CVE-2022-29581 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html -CVE-2022-29581 - http://www.openwall.com/lists/oss-security/2022/05/18/2 -CVE-2022-29581 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8 -CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/04/22/4 -CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/08/08/3 -CVE-2022-29582 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3 -CVE-2022-29582 - https://www.openwall.com/lists/oss-security/2022/04/22/3 -CVE-2022-29586 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/ -CVE-2022-29587 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/ -CVE-2022-29588 - http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html -CVE-2022-2959 - https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a -CVE-2022-29592 - https://github.com/H4niz/Vulnerability/blob/main/Tenda-TX9-V22.03.02.10-19042022-3.md -CVE-2022-29593 - http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html -CVE-2022-29593 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ -CVE-2022-29593 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2022-29596 - https://github.com/haxpunk1337/Microstrategy-Poc/blob/main/poc -CVE-2022-29597 - https://github.com/TheGetch/CVE-2022-29597 -CVE-2022-29598 - https://github.com/TheGetch/CVE-2022-29598 -CVE-2022-29603 - https://suumcuique.org/blog/posts/sql-injection-vulnerability-universis/ -CVE-2022-29610 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29611 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29612 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29613 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29614 - http://packetstormsecurity.com/files/168409/SAP-SAPControl-Web-Service-Interface-Local-Privilege-Escalation.html -CVE-2022-29614 - http://seclists.org/fulldisclosure/2022/Sep/18 -CVE-2022-29614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29619 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-29620 - https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643 -CVE-2022-29620 - https://youtu.be/ErZl1i7McHk -CVE-2022-29622 - https://medium.com/@zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 -CVE-2022-29622 - https://www.youtube.com/watch?v=C6QPKooxhAo -CVE-2022-29631 - https://github.com/oblac/jodd-http/issues/9 -CVE-2022-29631 - https://github.com/oblac/jodd/issues/787 -CVE-2022-29633 - https://github.com/awake1t/linglong -CVE-2022-29638 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md -CVE-2022-29640 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/3.md -CVE-2022-29641 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/4.md -CVE-2022-29642 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/5.md -CVE-2022-29643 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/6.md -CVE-2022-29646 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/9.md -CVE-2022-2965 - https://huntr.dev/bounties/61e3bdf7-3548-45ea-b105-967abc0977f4 -CVE-2022-29650 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Unauthenticated_Sql_Injection -CVE-2022-29651 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Remote_Code_Execution -CVE-2022-29652 - https://packetstormsecurity.com/files/166641/Online-Sports-Complex-Booking-System-1.0-Cross-Site-Scripting.html -CVE-2022-29654 - https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f -CVE-2022-29659 - https://packetstormsecurity.com/files/158391/responsiveonlineblog10poc-sql.txt -CVE-2022-29660 - https://github.com/chshcms/cscms/issues/25#issue-1207649017 -CVE-2022-29661 - https://github.com/chshcms/cscms/issues/21#issue-1207638326 -CVE-2022-29663 - https://github.com/chshcms/cscms/issues/22#issue-1207641519 -CVE-2022-29664 - https://github.com/chshcms/cscms/issues/23#issue-1207644525 -CVE-2022-29666 - https://github.com/chshcms/cscms/issues/24#issue-1207646618 -CVE-2022-29667 - https://github.com/chshcms/cscms/issues/26#issue-1207651726 -CVE-2022-29669 - https://github.com/chshcms/cscms/issues/20#issue-1207634969 -CVE-2022-29670 - https://github.com/chshcms/cscms/issues/21#issue-1207638326 -CVE-2022-29676 - https://github.com/chshcms/cscms/issues/24#issue-1207646618 -CVE-2022-29680 - https://github.com/chshcms/cscms/issues/31#issue-1209052957 -CVE-2022-29681 - https://github.com/chshcms/cscms/issues/35#issue-1209058818 -CVE-2022-29682 - https://github.com/chshcms/cscms/issues/36#issue-1209060196 -CVE-2022-29683 - https://github.com/chshcms/cscms/issues/34#issue-1209056912 -CVE-2022-29684 - https://github.com/chshcms/cscms/issues/33#issue-1209055493 -CVE-2022-29685 - https://github.com/chshcms/cscms/issues/32#issue-1209054307 -CVE-2022-29686 - https://github.com/chshcms/cscms/issues/29#issue-1209046027 -CVE-2022-29687 - https://github.com/chshcms/cscms/issues/30#issue-1209049714 -CVE-2022-29688 - https://github.com/chshcms/cscms/issues/27#issue-1209040138 -CVE-2022-29689 - https://github.com/chshcms/cscms/issues/28#issue-1209044410 -CVE-2022-29692 - https://github.com/unicorn-engine/unicorn/issues/1578 -CVE-2022-29693 - https://github.com/unicorn-engine/unicorn/issues/1586 -CVE-2022-29694 - https://github.com/unicorn-engine/unicorn/issues/1588 -CVE-2022-29695 - https://github.com/unicorn-engine/unicorn/issues/1595 -CVE-2022-29704 - https://www.youtube.com/watch?v=ECTu2QVAl1c -CVE-2022-29709 - https://packetstormsecurity.com/files/167240/CLink-Office-2.0-SQL-Injection.html -CVE-2022-29721 - https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/2 -CVE-2022-29727 - http://packetstormsecurity.com/files/167187/Survey-Sparrow-Enterprise-Survey-Software-2022-Cross-Site-Scripting.html -CVE-2022-29729 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php -CVE-2022-29730 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php -CVE-2022-29731 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5700.php -CVE-2022-29732 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5703.php -CVE-2022-29733 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5704.php -CVE-2022-29734 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5699.php -CVE-2022-29735 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5702.php -CVE-2022-2977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f -CVE-2022-29770 - https://github.com/xuxueli/xxl-job/issues/2836 -CVE-2022-29776 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29776 -CVE-2022-29777 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29777 -CVE-2022-29778 - https://github.com/TyeYeah/DIR-890L-1.20-RCE -CVE-2022-29778 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-29779 - https://github.com/nginx/njs/issues/485 -CVE-2022-29780 - https://github.com/nginx/njs/issues/486 -CVE-2022-2980 - https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea -CVE-2022-29804 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ -CVE-2022-29806 - http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html -CVE-2022-29806 - https://krastanoel.com/cve/2022-29806 -CVE-2022-2981 - https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305 -CVE-2022-2982 - https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be -CVE-2022-29824 - http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html -CVE-2022-29824 - http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html -CVE-2022-29824 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-29825 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29826 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29827 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29828 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29829 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-2983 - https://wpscan.com/vulnerability/e2af8c7f-9bd4-4902-8df8-72ffb414fdbf -CVE-2022-29830 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29831 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29832 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29833 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf -CVE-2022-29835 - https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396 -CVE-2022-29836 - https://www.westerndigital.com/support/product-security/wdc-22016-my-cloud-home-ibi-firmware-version-8-11-0-113 -CVE-2022-29837 - https://www.westerndigital.com/support/product-security/wdc-22018-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-8-12-0-178 -CVE-2022-29838 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124 -CVE-2022-29839 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124 -CVE-2022-29840 - https://www.westerndigital.com/support/product-security -CVE-2022-29841 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119 -CVE-2022-29842 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119 -CVE-2022-29851 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html -CVE-2022-29854 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html -CVE-2022-29854 - http://seclists.org/fulldisclosure/2022/Jun/32 -CVE-2022-29854 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 -CVE-2022-29855 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html -CVE-2022-29855 - http://seclists.org/fulldisclosure/2022/Jun/32 -CVE-2022-29855 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 -CVE-2022-29856 - https://dolosgroup.io/blog -CVE-2022-29858 - https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/ -CVE-2022-29862 - https://opcfoundation.org/security/ -CVE-2022-29863 - https://opcfoundation.org/security/ -CVE-2022-29864 - https://opcfoundation.org/security/ -CVE-2022-29865 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf -CVE-2022-29865 - https://opcfoundation.org/security/ -CVE-2022-29866 - https://opcfoundation.org/security/ -CVE-2022-2987 - https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67 -CVE-2022-29875 - https://www.siemens-healthineers.com/support-documentation/cybersecurity/shsa-455016 -CVE-2022-29885 - http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html -CVE-2022-29885 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-29886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1533 -CVE-2022-29888 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1522 -CVE-2022-29889 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1569 -CVE-2022-2989 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ -CVE-2022-29894 - https://github.com/strapi/strapi -CVE-2022-2990 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ -CVE-2022-29909 - https://bugzilla.mozilla.org/show_bug.cgi?id=1755081 -CVE-2022-29912 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692655 -CVE-2022-29914 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746448 -CVE-2022-29915 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751678 -CVE-2022-29916 - https://bugzilla.mozilla.org/show_bug.cgi?id=1760674 -CVE-2022-2992 - http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html -CVE-2022-29932 - https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md -CVE-2022-29933 - http://packetstormsecurity.com/files/166989/Craft-CMS-3.7.36-Password-Reset-Poisoning-Attack.html -CVE-2022-29933 - https://sec-consult.com/vulnerability-lab/advisory/password-reset-poisoning-attack-craft-cms/ -CVE-2022-29938 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r -CVE-2022-29939 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r -CVE-2022-29940 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r -CVE-2022-29945 - https://www.theverge.com/2022/4/28/23046916/dji-aeroscope-signals-not-encrypted-drone-tracking -CVE-2022-29948 - http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html -CVE-2022-29948 - http://seclists.org/fulldisclosure/2022/Jun/27 -CVE-2022-29948 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt -CVE-2022-2995 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ -CVE-2022-29950 - https://gist.github.com/Voidager88/73c2d512a72cceb0ef84dbf87a497d10 -CVE-2022-29951 - https://www.forescout.com/blog/ -CVE-2022-29952 - https://www.forescout.com/blog/ -CVE-2022-29953 - https://www.forescout.com/blog/ -CVE-2022-29957 - https://www.forescout.com/blog/ -CVE-2022-29958 - https://www.forescout.com/blog/ -CVE-2022-29959 - https://www.forescout.com/blog/ -CVE-2022-29960 - https://www.forescout.com/blog/ -CVE-2022-29962 - https://www.forescout.com/blog/ -CVE-2022-29963 - https://www.forescout.com/blog/ -CVE-2022-29964 - https://www.forescout.com/blog/ -CVE-2022-29965 - https://www.forescout.com/blog/ -CVE-2022-2997 - https://huntr.dev/bounties/c09bf21b-50d2-49f0-8c92-49f6b3c358d8 -CVE-2022-29971 - https://www.magnitude.com/products/data-connectivity -CVE-2022-29972 - https://www.magnitude.com/products/data-connectivity -CVE-2022-29975 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20CC%20endpoint -CVE-2022-29976 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20BCC%20endpoint -CVE-2022-29977 - https://github.com/saitoha/libsixel/issues/165 -CVE-2022-29978 - https://github.com/saitoha/libsixel/issues/166 -CVE-2022-3000 - https://huntr.dev/bounties/a060d3dd-6fdd-4958-82a9-364df1cb770c -CVE-2022-30003 - https://packetstormsecurity.com/files/168250/omps10-xss.txt -CVE-2022-30004 - https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html -CVE-2022-30014 - https://github.com/offsecin/bugsdisclose/blob/main/csrf -CVE-2022-3002 - https://huntr.dev/bounties/d213d7ea-fe92-40b2-a1f9-2ba32dec50f5 -CVE-2022-30036 - https://parzival.sh/posts/Pwning-a-Lighting-Console-in-a-Few-Minutes/ -CVE-2022-30037 - https://weltolk.github.io/p/xunruicms-v4.3.3-to-v4.5.1-backstage-code-injection-vulnerabilityfile-write-and-file-inclusion/ -CVE-2022-3004 - https://huntr.dev/bounties/461e5f8f-17cf-4be4-9149-111d0bd92d14 -CVE-2022-30040 - https://github.com/Le1a/CVE-2022-30040 -CVE-2022-30040 - https://github.com/Le1a/Tenda-AX1803-Denial-of-service -CVE-2022-30045 - https://sourceforge.net/p/ezxml/bugs/29/ -CVE-2022-3005 - https://huntr.dev/bounties/4b144433-a979-4c4e-a627-659838acc217 -CVE-2022-30052 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/acetech/2022/Home-Clean-Service-System -CVE-2022-30053 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Toll-Tax-Management-System -CVE-2022-30054 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Covid-19-Travel-Pass-Management -CVE-2022-30055 - https://packetstormsecurity.com/files/166840/Prime95-30.7-Build-9-Buffer-Overflow.html -CVE-2022-30067 - https://gitlab.gnome.org/GNOME/gimp/-/issues/8120 -CVE-2022-30075 - http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html -CVE-2022-30075 - https://github.com/aaronsvk -CVE-2022-30075 - https://github.com/aaronsvk/CVE-2022-30075 -CVE-2022-30075 - https://www.exploit-db.com/exploits/50962 -CVE-2022-30076 - http://packetstormsecurity.com/files/171777/ENTAB-ERP-1.0-Information-Disclosure.html -CVE-2022-30078 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md -CVE-2022-30079 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30079/CVE-2022-30079.md -CVE-2022-3008 - https://github.com/syoyo/tinygltf/issues/368 -CVE-2022-30105 - https://www.exploitee.rs/index.php/Belkin_N300#Remote_Root -CVE-2022-30111 - https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html -CVE-2022-30111 - https://www.youtube.com/watch?v=EruaGuE-cWI -CVE-2022-30114 - https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/ -CVE-2022-3012 - https://vuldb.com/?id.207422 -CVE-2022-30126 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-3013 - https://vuldb.com/?id.207423 -CVE-2022-3014 - https://vuldb.com/?id.207424 -CVE-2022-3015 - https://vuldb.com/?id.207425 -CVE-2022-30150 - http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html -CVE-2022-30155 - http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html -CVE-2022-3016 - https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371 -CVE-2022-30164 - http://packetstormsecurity.com/files/167716/Windows-Kerberos-KerbRetrieveEncodedTicketMessage-AppContainer-Privilege-Escalation.html -CVE-2022-30165 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html -CVE-2022-30166 - http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html -CVE-2022-30168 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30168 -CVE-2022-3017 - https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0 -CVE-2022-30174 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30174 -CVE-2022-30190 - http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html -CVE-2022-3021 - https://wpscan.com/vulnerability/3c5ff229-85c2-49c2-8fb9-6419a8002a4e -CVE-2022-30239 - https://www.magnitude.com/products/data-connectivity -CVE-2022-3024 - https://wpscan.com/vulnerability/7f43cb8e-0c1b-4528-8c5c-b81ab42778dc -CVE-2022-30240 - https://www.magnitude.com/products/data-connectivity -CVE-2022-30242 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities -CVE-2022-30242 - https://www.honeywell.com/us/en/product-security -CVE-2022-30243 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities -CVE-2022-30243 - https://www.honeywell.com/us/en/product-security -CVE-2022-30244 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities -CVE-2022-30244 - https://www.honeywell.com/us/en/product-security -CVE-2022-30245 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities -CVE-2022-30245 - https://www.honeywell.com/us/en/product-security -CVE-2022-3025 - https://wpscan.com/vulnerability/66bc783b-67e1-4bd0-99c0-322873b3a22a -CVE-2022-30262 - https://www.forescout.com/blog/ -CVE-2022-30264 - https://www.forescout.com/blog/ -CVE-2022-30269 - https://www.forescout.com/blog/ -CVE-2022-30270 - https://www.forescout.com/blog/ -CVE-2022-30271 - https://www.forescout.com/blog/ -CVE-2022-30272 - https://www.forescout.com/blog/ -CVE-2022-30273 - https://www.forescout.com/blog/ -CVE-2022-30274 - https://www.forescout.com/blog/ -CVE-2022-30275 - https://www.forescout.com/blog/ -CVE-2022-30276 - https://www.forescout.com/blog/ -CVE-2022-30280 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-30284 - https://www.swascan.com/security-advisory-libnmap-2/ -CVE-2022-30286 - http://packetstormsecurity.com/files/167069/PyScript-2022-05-04-Alpha-Source-Code-Disclosure.html -CVE-2022-30286 - https://cyber-guy.gitbook.io/cyber-guy/pocs/pyscript-file-read -CVE-2022-30286 - https://www.exploit-db.com/exploits/50918 -CVE-2022-30292 - https://github.com/sprushed/CVE-2022-30292 -CVE-2022-30293 - https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.36.0 -CVE-2022-3030 - https://gitlab.com/gitlab-org/gitlab/-/issues/37959 -CVE-2022-30312 - https://www.forescout.com/blog/ -CVE-2022-30313 - https://www.forescout.com/blog/ -CVE-2022-30314 - https://www.forescout.com/blog/ -CVE-2022-30315 - https://www.forescout.com/blog/ -CVE-2022-30316 - https://www.forescout.com/blog/ -CVE-2022-30317 - https://www.forescout.com/blog/ -CVE-2022-30318 - https://www.forescout.com/blog/ -CVE-2022-30319 - https://www.forescout.com/blog/ -CVE-2022-30320 - https://www.forescout.com/blog/ -CVE-2022-30325 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ -CVE-2022-30325 - https://research.nccgroup.com/?research=Technical+advisories -CVE-2022-30326 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ -CVE-2022-30326 - https://research.nccgroup.com/?research=Technical+advisories -CVE-2022-30327 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ -CVE-2022-30327 - https://research.nccgroup.com/?research=Technical+advisories -CVE-2022-30328 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ -CVE-2022-30328 - https://research.nccgroup.com/?research=Technical+advisories -CVE-2022-30329 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ -CVE-2022-30329 - https://research.nccgroup.com/?research=Technical+advisories -CVE-2022-30330 - https://blog.inhq.net/posts/keepkey-CVE-2022-30330/ -CVE-2022-30333 - http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html -CVE-2022-30333 - https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ -CVE-2022-30335 - https://gist.github.com/aliceicl/b2f25f3a0a3ba9973e4977f922d04008 -CVE-2022-3035 - https://huntr.dev/bounties/0bbb1046-ea9e-4cb9-bc91-b294a72d1902 -CVE-2022-30352 - https://www.exploit-db.com/exploits/50071 -CVE-2022-3036 - https://wpscan.com/vulnerability/0dbc85dd-736c-492e-9db8-acb7195771aa -CVE-2022-3037 - https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5 -CVE-2022-3038 - http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html -CVE-2022-30422 - https://www.swascan.com/it/security-advisory-proietti-planet-time-enterprise-cve-2022-30422/ -CVE-2022-30425 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5706.php -CVE-2022-30426 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md -CVE-2022-30427 - https://github.com/gphper/ginadmin/issues/8 -CVE-2022-30428 - https://github.com/gphper/ginadmin/issues/9 -CVE-2022-30466 - https://github.com/nsbogam/ebike -CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer -CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer/blob/main/README.md -CVE-2022-30469 - https://github.com/blockomat2100/PoCs/blob/main/filerun/CVE-2022-30469.md -CVE-2022-30472 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1 -CVE-2022-30473 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/2 -CVE-2022-30474 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5 -CVE-2022-30475 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/3 -CVE-2022-30476 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6 -CVE-2022-30477 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/4 -CVE-2022-30490 - https://github.com/yasinyildiz26/Badminton-Center-Management-System -CVE-2022-30503 - https://github.com/nginx/njs/issues/478 -CVE-2022-30508 - https://github.com/1security/Vulnerability/blob/master/web/dedecms/1.md -CVE-2022-30515 - https://codingkoala.eu/posts/CVE202230515/ -CVE-2022-30518 - https://packetstormsecurity.com/files/166984/ChatBot-Application-With-A-Suggestion-Feature-1.0-SQL-Injection.html -CVE-2022-30519 - http://packetstormsecurity.com/files/171627/Reprise-Software-RLM-14.2BL4-Cross-Site-Scripting.html -CVE-2022-30519 - https://github.com/earth2sky/Disclosed/blob/main/CVE-2022-30519 -CVE-2022-30521 - https://github.com/winmt/CVE/blob/main/DIR-890L/README.md -CVE-2022-30521 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-30524 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42261 -CVE-2022-30525 - http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html -CVE-2022-30525 - http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html -CVE-2022-30525 - http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html -CVE-2022-30525 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html -CVE-2022-30526 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html -CVE-2022-30534 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1546 -CVE-2022-30541 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1557 -CVE-2022-30543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519 -CVE-2022-30547 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547 -CVE-2022-30551 - https://opcfoundation.org -CVE-2022-30552 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ -CVE-2022-30557 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-30580 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ -CVE-2022-30584 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341 -CVE-2022-30585 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341 -CVE-2022-30594 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -CVE-2022-30594 - http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html -CVE-2022-30594 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 -CVE-2022-3060 - https://gitlab.com/gitlab-org/gitlab/-/issues/365427 -CVE-2022-30603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1562 -CVE-2022-30605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535 -CVE-2022-30607 - https://www.ibm.com/support/pages/node/6595759 -CVE-2022-3062 - https://wpscan.com/vulnerability/2e829bbe-1843-496d-a852-4150fa6d1f7a -CVE-2022-30629 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ -CVE-2022-30634 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ -CVE-2022-3065 - https://huntr.dev/bounties/5f3bc4b6-1d53-46b7-a23d-70f5faaf0c76 -CVE-2022-3068 - https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884 -CVE-2022-30688 - https://github.com/liske/needrestart/releases/tag/v3.6 -CVE-2022-3069 - https://wpscan.com/vulnerability/a9918dfd-389c-43eb-afcc-03d29b42b369 -CVE-2022-30690 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1539 -CVE-2022-3070 - https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c -CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin -CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin/blob/main/exploit.py -CVE-2022-30708 - https://github.com/webmin/webmin/issues/1635 -CVE-2022-30709 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30710 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30711 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30712 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30713 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30714 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30715 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30716 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30717 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30719 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-3072 - https://huntr.dev/bounties/9755ae6a-b08b-40a0-8089-c723b2d9ca52 -CVE-2022-30720 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30721 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30722 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30723 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30724 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30725 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30726 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30727 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30728 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-30729 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 -CVE-2022-3074 - https://wpscan.com/vulnerability/90ebaedc-89df-413f-b22e-753d4dd5e1c3 -CVE-2022-30759 - https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html -CVE-2022-3076 - https://wpscan.com/vulnerability/d18e695b-4d6e-4ff6-a060-312594a0d2bd -CVE-2022-30763 - https://blog.convisoappsec.com/en/bug-hunting-in-the-janet-language-interpreter/ -CVE-2022-30768 - https://medium.com/@dk50u1/stored-xss-in-zoneminder-up-to-v1-36-12-f26b4bb68c31 -CVE-2022-30769 - https://medium.com/@dk50u1/session-fixation-in-zoneminder-up-to-v1-36-12-3c850b1fbbf3 -CVE-2022-30775 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264 -CVE-2022-30776 - https://medium.com/@bhattronit96/cve-2022-30776-cd34f977c2b9 -CVE-2022-30777 - https://medium.com/@bhattronit96/cve-2022-30777-45725763ab59 -CVE-2022-30778 - https://github.com/1nhann/vulns/issues/1 -CVE-2022-30779 - https://github.com/1nhann/vulns/issues/2 -CVE-2022-3078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e6a21a14106d9718aa4f8e115b1e474888eeba44 -CVE-2022-30780 - https://podalirius.net/en/cves/2022-30780/ -CVE-2022-30781 - http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html -CVE-2022-30781 - http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html -CVE-2022-30783 - http://www.openwall.com/lists/oss-security/2022/06/07/4 -CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 -CVE-2022-30784 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30785 - http://www.openwall.com/lists/oss-security/2022/06/07/4 -CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 -CVE-2022-30786 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30787 - http://www.openwall.com/lists/oss-security/2022/06/07/4 -CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 -CVE-2022-30788 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30789 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-30790 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ -CVE-2022-3082 - https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f -CVE-2022-30852 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ -CVE-2022-30858 - https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md -CVE-2022-30858 - https://github.com/miniupnp/ngiflib/issues/22 -CVE-2022-30860 - https://github.com/fudforum/FUDforum/issues/23 -CVE-2022-30861 - https://github.com/fudforum/FUDforum/issues/24 -CVE-2022-30863 - https://github.com/fudforum/FUDforum/issues/24 -CVE-2022-30874 - https://blog.stmcyber.com/vulns/cve-2022-30874/ -CVE-2022-30874 - https://whitehub.net/submissions/2968 -CVE-2022-30886 - https://packetstormsecurity.com/files/167001/School-Dormitory-Management-System-1.0-SQL-Injection.html -CVE-2022-30887 - https://packetstormsecurity.com/files/166786/Pharmacy-Management-System-1.0-Shell-Upload.html -CVE-2022-30898 - https://github.com/chshcms/cscms/issues/37 -CVE-2022-30903 - https://medium.com/@shubhamvpandey/xss-found-in-nokia-g-2425g-a-home-wifi-router-f4fae083ed97 -CVE-2022-30903 - https://youtu.be/CxBo_gQffOY -CVE-2022-30909 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/3 -CVE-2022-30910 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/1 -CVE-2022-30912 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/4 -CVE-2022-30913 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/7 -CVE-2022-30914 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/5 -CVE-2022-30915 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/6 -CVE-2022-30916 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/9 -CVE-2022-30917 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/10 -CVE-2022-30918 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/8 -CVE-2022-30919 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/13 -CVE-2022-30920 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/12 -CVE-2022-30921 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/14 -CVE-2022-30922 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/11 -CVE-2022-30923 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/16 -CVE-2022-30924 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/15 -CVE-2022-30925 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/17 -CVE-2022-30926 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/18 -CVE-2022-30927 - https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated -CVE-2022-30927 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tss.zip -CVE-2022-30929 - https://github.com/AgainstTheLight/CVE-2022-30929 -CVE-2022-30930 - https://medium.com/@pmmali/my-second-cve-2022-30930-4f9aab047518 -CVE-2022-30931 - https://medium.com/@niteshbiwal2011/my-first-cve-2022-30931-e70b9cbecbba -CVE-2022-3096 - https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d -CVE-2022-3097 - https://wpscan.com/vulnerability/9ebb8318-ebaf-4de7-b337-c91327685a43 -CVE-2022-30974 - https://github.com/ccxvii/mujs/issues/162 -CVE-2022-30975 - https://github.com/ccxvii/mujs/issues/161 -CVE-2022-30976 - https://github.com/gpac/gpac/issues/2179 -CVE-2022-3098 - https://wpscan.com/vulnerability/f4fcf41b-c05d-4236-8e67-a52d0f94c80a -CVE-2022-30981 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/ -CVE-2022-30982 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/ -CVE-2022-3099 - https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e -CVE-2022-3104 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2 -CVE-2022-3105 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531 -CVE-2022-31056 - http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html -CVE-2022-3106 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9 -CVE-2022-31062 - http://packetstormsecurity.com/files/171654/GLPI-Glpiinventory-1.0.1-Local-File-Inclusion.html -CVE-2022-31064 - http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html -CVE-2022-31064 - http://seclists.org/fulldisclosure/2022/Jun/52 -CVE-2022-3107 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a -CVE-2022-3108 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e -CVE-2022-3110 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95 -CVE-2022-31101 - http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html -CVE-2022-31108 - https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf -CVE-2022-3111 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078 -CVE-2022-31110 - https://github.com/DIYgod/RSSHub/issues/10045 -CVE-2022-3112 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99 -CVE-2022-31125 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html -CVE-2022-31129 - https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/ -CVE-2022-3113 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0 -CVE-2022-31133 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76 -CVE-2022-31137 - http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html -CVE-2022-31137 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html -CVE-2022-31137 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html -CVE-2022-31137 - http://packetstormsecurity.com/files/172547/Roxy-WI-6.1.0.0-Remote-Command-Execution.html -CVE-2022-31138 - https://github.com/ly1g3/Mailcow-CVE-2022-31138 -CVE-2022-3114 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037 -CVE-2022-3115 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33 -CVE-2022-31160 - https://www.drupal.org/sa-contrib-2022-052 -CVE-2022-31161 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html -CVE-2022-31173 - https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j -CVE-2022-3118 - https://vuldb.com/?id.207845 -CVE-2022-31188 - http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html -CVE-2022-3119 - https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5 -CVE-2022-3120 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpms.md -CVE-2022-3120 - https://vuldb.com/?id.207847 -CVE-2022-31201 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/ -CVE-2022-31202 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/ -CVE-2022-31204 - https://www.forescout.com/blog/ -CVE-2022-31205 - https://www.forescout.com/blog/ -CVE-2022-31206 - https://www.forescout.com/blog/ -CVE-2022-31207 - https://www.forescout.com/blog/ -CVE-2022-31208 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ -CVE-2022-31209 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ -CVE-2022-3121 - https://vuldb.com/?id.207853 -CVE-2022-31210 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ -CVE-2022-31211 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ -CVE-2022-31212 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ -CVE-2022-31213 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ -CVE-2022-31214 - https://www.openwall.com/lists/oss-security/2022/06/08/10 -CVE-2022-3122 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpmssql.md -CVE-2022-3122 - https://vuldb.com/?id.207854 -CVE-2022-3123 - https://huntr.dev/bounties/d72a979b-57db-4201-9500-66b49a5c1345 -CVE-2022-31237 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en -CVE-2022-31239 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en -CVE-2022-3124 - https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608 -CVE-2022-31244 - https://packetstormsecurity.com/files/171970/Nokia-OneNDS-17-Insecure-Permissions-Privilege-Escalation.html -CVE-2022-31245 - https://github.com/ly1g3/Mailcow-CVE-2022-31245 -CVE-2022-3125 - https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e -CVE-2022-31250 - https://bugzilla.suse.com/show_bug.cgi?id=1200885 -CVE-2022-31251 - https://bugzilla.suse.com/show_bug.cgi?id=1201674 -CVE-2022-31254 - https://bugzilla.suse.com/show_bug.cgi?id=1204285 -CVE-2022-3126 - https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8 -CVE-2022-31262 - https://github.com/secure-77/CVE-2022-31262 -CVE-2022-31262 - https://secure77.de/category/subjects/researches/ -CVE-2022-31262 - https://secure77.de/gog-galaxy-cve-2022-31262/ -CVE-2022-31262 - https://www.youtube.com/watch?v=Bgdbx5TJShI -CVE-2022-31264 - https://github.com/Ainevsia/CVE-Request/tree/main/Solana/1 -CVE-2022-31266 - https://medium.com/@bcksec/in-ilias-through-7-10-620c0de685ee -CVE-2022-31268 - https://github.com/metaStor/Vuls/blob/main/gitblit/gitblit%20V1.9.3%20path%20traversal/gitblit%20V1.9.3%20path%20traversal.md -CVE-2022-31269 - http://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html -CVE-2022-31269 - https://eg.linkedin.com/in/omar-1-hashem -CVE-2022-31269 - https://gist.github.com/omarhashem123/71ec9223e90ea76a76096d777d9b945c -CVE-2022-3127 - https://huntr.dev/bounties/6cea89d1-39dc-4023-82fa-821f566b841a -CVE-2022-3128 - https://wpscan.com/vulnerability/97201998-1859-4428-9b81-9c2748806cf4 -CVE-2022-31282 - https://github.com/axiomatic-systems/Bento4/issues/708 -CVE-2022-31285 - https://github.com/axiomatic-systems/Bento4/issues/702 -CVE-2022-31287 - https://github.com/axiomatic-systems/Bento4/issues/703 -CVE-2022-3129 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md -CVE-2022-3129 - https://vuldb.com/?id.207872 -CVE-2022-31290 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ -CVE-2022-3130 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md -CVE-2022-3130 - https://vuldb.com/?id.207873 -CVE-2022-31306 - https://github.com/nginx/njs/issues/481 -CVE-2022-31307 - https://github.com/nginx/njs/issues/482 -CVE-2022-31308 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200.md -CVE-2022-31309 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md -CVE-2022-3131 - https://wpscan.com/vulnerability/b6c62e53-ae49-4fe0-aed9-0c493fc4442d -CVE-2022-31311 - https://github.com/pghuanghui/CVE_Request/blob/main/AERIAL%20X%201200_Command%20Execution%20Vulnerability.md -CVE-2022-3132 - https://wpscan.com/vulnerability/ed2dc1b9-f9f9-4e99-87b3-a614c223dd64 -CVE-2022-31322 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb -CVE-2022-31324 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb -CVE-2022-31325 - http://packetstormsecurity.com/files/167483/ChurchCRM-4.4.5-SQL-Injection.html -CVE-2022-31325 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-31325 -CVE-2022-31325 - https://www.nu11secur1ty.com/2022/06/cve-2022-31325.htm -CVE-2022-3133 - https://huntr.dev/bounties/2d93052f-efc6-4647-9a6d-8b08dc251223 -CVE-2022-3134 - https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc -CVE-2022-3135 - https://wpscan.com/vulnerability/3505481d-141a-4516-bdbb-d4dad4e1eb01 -CVE-2022-31358 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ -CVE-2022-3136 - https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649 -CVE-2022-31361 - https://www.swascan.com/security-advisory-docebo-community-edition/ -CVE-2022-31362 - https://www.swascan.com/security-advisory-docebo-community-edition/ -CVE-2022-31366 - https://erpaciocco.github.io/2022/eve-ng-rce/ -CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v3.6.10 -CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v4.1.10 -CVE-2022-3137 - https://wpscan.com/vulnerability/524928d6-d4e9-4a2f-b410-46958da549d8 -CVE-2022-31373 - https://github.com/badboycxcc/SolarView_Compact_6.0_xss -CVE-2022-3138 - https://huntr.dev/bounties/1816a207-6abf-408c-b19a-e497e24172b3 -CVE-2022-31382 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31382.txt -CVE-2022-31383 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31383.txt -CVE-2022-31384 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31384.txt -CVE-2022-31386 - https://github.com/Fanli2012/nbnbk/issues/5 -CVE-2022-3139 - https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db -CVE-2022-31390 - https://github.com/Cherry-toto/jizhicms/issues/75 -CVE-2022-31393 - https://github.com/Cherry-toto/jizhicms/issues/76 -CVE-2022-31395 - https://n0ur5sec.medium.com/achievement-unlocked-cve-2022-31395-33299f32cc00 -CVE-2022-31398 - https://youtu.be/OungdOub18c -CVE-2022-31400 - https://youtu.be/uqO6hluHDB4 -CVE-2022-3141 - http://packetstormsecurity.com/files/171479/WordPress-Translatepress-Multilingual-SQL-Injection.html -CVE-2022-3141 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-translatepress-multilingual-wordpress-plugin-effc08eda514 -CVE-2022-3141 - https://wpscan.com/vulnerability/1fa355d1-cca8-4b27-9d21-0b420a2e1bf3 -CVE-2022-31414 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-31415 - https://researchinthebin.org/posts/ofrs-sql-injection/ -CVE-2022-3142 - http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html -CVE-2022-3142 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5 -CVE-2022-3142 - https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328 -CVE-2022-31446 - https://github.com/wshidamowang/Router/blob/main/Tenda/AC18/RCE_1.md -CVE-2022-31464 - https://r0h1rr1m.medium.com/adaware-protect-local-privilege-escalation-through-insecure-service-permissions-44d0eeb6c933 -CVE-2022-31468 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html -CVE-2022-31469 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-3147 - https://mattermost.com/security-updates/ -CVE-2022-31470 - http://packetstormsecurity.com/files/174551/Axigen-10.5.0-4370c946-Cross-Site-Scripting.html -CVE-2022-31478 - https://medium.com/@bcksec/ilias-lms-usertakeover-4-0-1-vulnerability-b2824679403 -CVE-2022-3148 - https://huntr.dev/bounties/1f730015-b4d0-4f84-8cac-9cf1e57a091a -CVE-2022-3149 - https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f -CVE-2022-31492 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31493 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31494 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31495 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31496 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31497 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31498 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -CVE-2022-31499 - http://packetstormsecurity.com/files/167991/Nortek-Linear-eMerge-E3-Series-Command-Injection.html -CVE-2022-31499 - https://eg.linkedin.com/in/omar-1-hashem -CVE-2022-31499 - https://gist.github.com/omarhashem123/5f0c6f1394099b555740fdc5c7651ee2 -CVE-2022-3150 - https://wpscan.com/vulnerability/bb0806d7-21e3-4a65-910c-bf0625c338ec -CVE-2022-31501 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31502 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31503 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31504 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31505 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31506 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31507 - https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c -CVE-2022-31507 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31508 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31509 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-3151 - https://wpscan.com/vulnerability/27816c70-58ad-4ffb-adcc-69eb1b210744 -CVE-2022-31510 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31510 - https://github.com/sergeKashkin/Simple-RAT/pull/11 -CVE-2022-31511 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31512 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31513 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31514 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31515 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31516 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31517 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31518 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31519 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-3152 - https://huntr.dev/bounties/b3f888d2-5c71-4682-8287-42613401fd5a -CVE-2022-31520 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31521 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31522 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31523 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31524 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31525 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31526 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31527 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31528 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31529 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-3153 - https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a -CVE-2022-31530 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31531 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31532 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31533 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31534 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31535 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31536 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31537 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31538 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31539 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-3154 - https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd -CVE-2022-31540 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31541 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31542 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31543 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31544 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31545 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31546 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31547 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31548 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31549 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31549 - https://github.com/olmax99/helm-flask-celery/commit/28c985d712d7ac26893433e8035e2e3678fcae9f -CVE-2022-3155 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789061 -CVE-2022-31550 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31551 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31552 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31553 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31554 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31555 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31556 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31557 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31558 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31559 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31560 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31561 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31562 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31563 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31564 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31564 - https://github.com/woduq1414/munhak-moa/commit/e8f800373b20cb22de70c7a994325b8903877da0 -CVE-2022-31565 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31566 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31567 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31568 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31570 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31571 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31572 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31573 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31574 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31575 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31576 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31577 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31578 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31579 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31580 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31581 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31581 - https://github.com/scorelab/OpenMF/issues/262 -CVE-2022-31582 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31583 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31584 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31585 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31586 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31587 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31588 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -CVE-2022-31589 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31590 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31591 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31592 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31593 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31594 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31595 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31596 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31597 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31598 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-31620 - https://github.com/thorfdbg/libjpeg/issues/70 -CVE-2022-31628 - https://bugs.php.net/bug.php?id=81726 -CVE-2022-31629 - http://www.openwall.com/lists/oss-security/2024/04/12/11 -CVE-2022-31647 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 -CVE-2022-31650 - https://sourceforge.net/p/sox/bugs/360/ -CVE-2022-31651 - https://sourceforge.net/p/sox/bugs/360/ -CVE-2022-31656 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31657 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31658 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31659 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31660 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31661 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31662 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31663 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31664 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-31665 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html -CVE-2022-3167 - https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c -CVE-2022-31678 - https://www.vmware.com/security/advisories/VMSA-2022-0027.html -CVE-2022-31680 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587 -CVE-2022-31704 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html -CVE-2022-31706 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html -CVE-2022-31711 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html -CVE-2022-3173 - https://huntr.dev/bounties/6d8ffcc6-c6e3-4385-8ead-bdbbbacf79e9 -CVE-2022-31736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735923 -CVE-2022-31739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1765049 -CVE-2022-3174 - https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce -CVE-2022-31741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767590 -CVE-2022-31743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747388 -CVE-2022-3175 - https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159 -CVE-2022-3178 - https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0 -CVE-2022-31782 - https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8 -CVE-2022-31783 - https://github.com/liblouis/liblouis/issues/1214 -CVE-2022-31786 - https://gist.github.com/RNPG/e10524f1781a9981b50fb27bb473b0fe -CVE-2022-31787 - https://gist.github.com/RNPG/ef10c0acceb650d43625a77d3472dd84 -CVE-2022-31787 - https://gist.github.com/This-is-Neo/c91e1a0ed5d40fbcf0dada43ea1d7479 -CVE-2022-31788 - https://gist.github.com/RNPG/b154f4b2e90340d2f39605989af06bee -CVE-2022-31788 - https://gist.github.com/This-is-Neo/cc5b08ad8a3a60cd81fd1b9c1cb573b4 -CVE-2022-3179 - https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe -CVE-2022-31790 - https://www.ambionics.io/blog/hacking-watchguard-firewalls -CVE-2022-31793 - https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/ -CVE-2022-31793 - https://derekabdine.com/blog/2022-arris-advisory -CVE-2022-31794 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/ -CVE-2022-31795 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/ -CVE-2022-31796 - https://github.com/thorfdbg/libjpeg/issues/71 -CVE-2022-31798 - http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html -CVE-2022-31798 - https://eg.linkedin.com/in/omar-1-hashem -CVE-2022-31798 - https://gist.github.com/omarhashem123/bccdcec70ab7e8f00519d56ea2e3fd79 -CVE-2022-31814 - http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html -CVE-2022-31814 - http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html -CVE-2022-31814 - https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/ -CVE-2022-31827 - https://github.com/zer0yu/CVE_Request/blob/master/MonstaFTP/MonstaFTP_v2_10_3_SSRF.md -CVE-2022-31830 - https://github.com/fex-team/kityminder/issues/345 -CVE-2022-31845 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_live.md -CVE-2022-31846 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__live_mfg.md -CVE-2022-31847 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__Sensitive%20information%20leakage.md -CVE-2022-31854 - http://packetstormsecurity.com/files/167782/CodoForum-5.1-Remote-Code-Execution.html -CVE-2022-31856 - https://www.exploit-db.com/exploits/50942 -CVE-2022-31860 - https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html -CVE-2022-31861 - https://securityblog101.blogspot.com/2022/09/cve-2022-31861.html -CVE-2022-31873 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md -CVE-2022-31874 - https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md -CVE-2022-31875 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md -CVE-2022-31876 - https://github.com/jayus0821/uai-poc/blob/main/Netgear/WNAP320/unauth.md -CVE-2022-31877 - https://patsch.dev/2022/07/08/cve-2022-31877-privilege-escalation-in-msi-centers-msi-terminalserver-exe/ -CVE-2022-31879 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting -CVE-2022-31884 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/unauthorized-delete-add-api-users-api-keys -CVE-2022-31885 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/os-command-injection -CVE-2022-31886 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/2fa-bypass-via-x-csrf -CVE-2022-31887 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover -CVE-2022-31888 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ -CVE-2022-31889 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ -CVE-2022-31890 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ -CVE-2022-31897 - https://packetstormsecurity.com/files/167572/Zoo-Management-System-1.0-Cross-Site-Scripting.html -CVE-2022-31898 - https://boschko.ca/glinet-router -CVE-2022-31901 - https://github.com/CDACesec/CVE-2022-31901 -CVE-2022-31902 - https://github.com/CDACesec/CVE-2022-31902 -CVE-2022-3194 - https://wpscan.com/vulnerability/85e32913-dc2a-44c9-addd-7abde618e995/ -CVE-2022-3199 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html -CVE-2022-32030 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetQosBand -CVE-2022-32031 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetRouteStatic -CVE-2022-32032 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/A18/formAddMacfilterRule -CVE-2022-32033 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetVirtualSer -CVE-2022-32034 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formdelMasteraclist -CVE-2022-32035 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng -CVE-2022-32036 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetStoreWeb -CVE-2022-32037 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAPCfg -CVE-2022-32039 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/fromDhcpListClient -CVE-2022-32040 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetCfm -CVE-2022-32041 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formGetPassengerAnalyseData -CVE-2022-32043 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAccessCodeInfo -CVE-2022-32044 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/5.setWiFiRepeaterCfg -CVE-2022-32045 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/4.setWiFiScheduleCfg -CVE-2022-32046 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/8.setMacFilterRules -CVE-2022-32047 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/1.setIpPortFilterRules -CVE-2022-32048 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/10.setTracerouteCfg -CVE-2022-32049 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/7.setUrlFilterRules -CVE-2022-3205 - https://bugzilla.redhat.com/show_bug.cgi?id=2120597 -CVE-2022-32050 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/9.setWanCfg -CVE-2022-32051 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/2.setParentalRules -CVE-2022-32052 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/3.setWiFiAclRules -CVE-2022-32053 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/6.setWizardCfg -CVE-2022-32055 - https://github.com/bigb0x/CVEs/blob/main/Inout-Homestay-2-2-sqli.md -CVE-2022-32056 - https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi -CVE-2022-32060 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-b15becc1a5ea -CVE-2022-32061 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab -CVE-2022-32065 - https://gitee.com/y_project/RuoYi/issues/I57IME -CVE-2022-32065 - https://github.com/yangzongzhuan/RuoYi/issues/118 -CVE-2022-3207 - https://wpscan.com/vulnerability/b57272ea-9a8a-482a-bbaa-5f202ca5b9aa -CVE-2022-3208 - https://wpscan.com/vulnerability/80d475ca-b475-4789-8eef-9c4d880853b7 -CVE-2022-32081 - https://jira.mariadb.org/browse/MDEV-26420 -CVE-2022-32085 - https://jira.mariadb.org/browse/MDEV-26407 -CVE-2022-32086 - https://jira.mariadb.org/browse/MDEV-26412 -CVE-2022-32088 - https://jira.mariadb.org/browse/MDEV-26419 -CVE-2022-32089 - https://jira.mariadb.org/browse/MDEV-26410 -CVE-2022-3209 - https://wpscan.com/vulnerability/7a244fb1-fa0b-4294-9b51-588bf5d673a2 -CVE-2022-32092 - https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645 -CVE-2022-32092 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-3211 - https://huntr.dev/bounties/31ac0506-ae38-4128-a46d-71d5d079f8b7 -CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14 -CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33 -CVE-2022-32114 - https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e -CVE-2022-32115 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ -CVE-2022-3212 - https://research.jfrog.com/vulnerabilities/axum-core-dos/ -CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2 -CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750 -CVE-2022-32159 - https://www.mend.io/vulnerability-database/CVE-2022-32159 -CVE-2022-3216 - https://vuldb.com/?id.208606 -CVE-2022-32167 - https://www.mend.io/vulnerability-database/CVE-2022-32167 -CVE-2022-32168 - https://www.mend.io/vulnerability-database/CVE-2022-32168 -CVE-2022-32169 - https://www.mend.io/vulnerability-database/CVE-2022-32169 -CVE-2022-3217 - https://www.tenable.com/security/research/tra-2022-31 -CVE-2022-32170 - https://www.mend.io/vulnerability-database/CVE-2022-32170 -CVE-2022-32171 - https://www.mend.io/vulnerability-database/CVE-2022-32171 -CVE-2022-32172 - https://www.mend.io/vulnerability-database/CVE-2022-32172 -CVE-2022-32173 - https://www.mend.io/vulnerability-database/CVE-2022-32173 -CVE-2022-32174 - https://www.mend.io/vulnerability-database/CVE-2022-32174 -CVE-2022-32175 - https://www.mend.io/vulnerability-database/CVE-2022-32175 -CVE-2022-32176 - https://www.mend.io/vulnerability-database/CVE-2022-32176 -CVE-2022-32177 - https://www.mend.io/vulnerability-database/CVE-2022-32177 -CVE-2022-3218 - http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html -CVE-2022-3218 - https://www.exploit-db.com/exploits/49601 -CVE-2022-3218 - https://www.exploit-db.com/exploits/50972 -CVE-2022-32199 - https://github.com/Toxich4/CVE-2022-32199 -CVE-2022-3220 - https://wpscan.com/vulnerability/cb6f4953-e68b-48f3-a821-a1d77e5476ef -CVE-2022-32200 - https://github.com/davea42/libdwarf-code/issues/116 -CVE-2022-32200 - https://www.prevanders.net/dwarfbug.html -CVE-2022-32201 - https://github.com/thorfdbg/libjpeg/issues/73 -CVE-2022-32202 - https://github.com/thorfdbg/libjpeg/issues/74 -CVE-2022-32205 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32206 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32207 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32208 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-3221 - https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d -CVE-2022-3222 - https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235 -CVE-2022-32221 - http://seclists.org/fulldisclosure/2023/Jan/19 -CVE-2022-3223 - https://huntr.dev/bounties/125791b6-3a68-4235-8866-6bc3a52332ba -CVE-2022-32230 - https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/ -CVE-2022-32235 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32236 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32237 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32238 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32239 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-3224 - https://huntr.dev/bounties/3587a567-7fcd-4702-b7c9-d9ca565e3c62 -CVE-2022-32240 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32241 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32242 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32243 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32244 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32245 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32246 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32247 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32248 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32249 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/06/03/1 -CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/08/25/1 -CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/09/02/9 -CVE-2022-32250 - https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/ -CVE-2022-32250 - https://bugzilla.redhat.com/show_bug.cgi?id=2092427 -CVE-2022-32250 - https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd -CVE-2022-32250 - https://www.openwall.com/lists/oss-security/2022/05/31/1 -CVE-2022-32269 - https://github.com/Edubr2020/RealPlayer_G2_RCE -CVE-2022-32269 - https://www.youtube.com/watch?v=9c9Q4VZQOUk -CVE-2022-32270 - https://github.com/Edubr2020/RP_Import_RCE -CVE-2022-32270 - https://youtu.be/CONlijEgDLc -CVE-2022-32271 - https://github.com/Edubr2020/RP_DCP_Code_Exec -CVE-2022-32271 - https://youtu.be/AMODp3iTnqY -CVE-2022-32272 - http://packetstormsecurity.com/files/171549/OPSWAT-Metadefender-Core-4.21.1-Privilege-Escalation.html -CVE-2022-32274 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-040.txt -CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana -CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md -CVE-2022-32276 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md -CVE-2022-32277 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/squiz-matrix-cms-authenticated-privilege-escalation-through-idor/ -CVE-2022-32282 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1545 -CVE-2022-3229 - https://github.com/rapid7/metasploit-framework/pull/16989 -CVE-2022-32294 - https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e -CVE-2022-32296 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9 -CVE-2022-32298 - https://github.com/landley/toybox/issues/346 -CVE-2022-32308 - https://github.com/uBlockOrigin/uBlock-issues/issues/1992 -CVE-2022-3231 - https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f -CVE-2022-32310 - https://packetstormsecurity.com/files/167291/Ingredient-Stock-Management-System-1.0-Account-Takeover.html -CVE-2022-32311 - https://packetstormsecurity.com/files/167290/Ingredient-Stock-Management-System-1.0-SQL-Injection.html -CVE-2022-32317 - https://bugs.gentoo.org/show_bug.cgi?id=858107 -CVE-2022-32317 - https://github.com/b17fr13nds/MPlayer_cve_poc -CVE-2022-32318 - https://packetstormsecurity.com/files/167309/Fast-Food-Ordering-System-1.0-Cross-Site-Scripting.html -CVE-2022-3232 - https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c -CVE-2022-3233 - https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3 -CVE-2022-3234 - https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da -CVE-2022-3235 - https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af -CVE-2022-32353 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/product-show-room-site/SQLi-1.md -CVE-2022-3237 - https://wpscan.com/vulnerability/cd2fd6cd-a839-4de8-af28-b5134873c40e -CVE-2022-32387 - https://devnet.kentico.com/download/hotfixes -CVE-2022-3239 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d -CVE-2022-32391 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32391.md -CVE-2022-32392 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32392.md -CVE-2022-32393 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32393.md -CVE-2022-32394 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32394.md -CVE-2022-32395 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32395.md -CVE-2022-32396 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32396.md -CVE-2022-32397 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32397.md -CVE-2022-32398 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32398.md -CVE-2022-32399 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32399.md -CVE-2022-32400 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32400.md -CVE-2022-32401 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32401.md -CVE-2022-32402 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32402.md -CVE-2022-32403 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32403.md -CVE-2022-32404 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32404.md -CVE-2022-32405 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32405.md -CVE-2022-32407 - https://riteshgohil-25.medium.com/softr-version-2-0-33463a6bf766 -CVE-2022-32409 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt -CVE-2022-32409 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion -CVE-2022-3241 - https://wpscan.com/vulnerability/a995dd67-43fc-4087-a7f1-5db57f4c828c -CVE-2022-32414 - https://github.com/nginx/njs/issues/483 -CVE-2022-3242 - https://huntr.dev/bounties/3e6b218a-a5a6-40d9-9f7e-5ab0c6214faf -CVE-2022-32429 - http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html -CVE-2022-32429 - https://elifulkerson.com/CVE-2022-32429/ -CVE-2022-3243 - https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a -CVE-2022-32434 - https://github.com/EIPStackGroup/OpENer/issues/374 -CVE-2022-32441 - https://code610.blogspot.com/2022/06/night-fuzzing-session-idapro-66-part-2.html -CVE-2022-32449 - https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md -CVE-2022-3245 - https://huntr.dev/bounties/747c2924-95ca-4311-9e69-58ee0fb440a0 -CVE-2022-32450 - http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html -CVE-2022-32450 - http://seclists.org/fulldisclosure/2022/Jul/9 -CVE-2022-32450 - https://seclists.org/fulldisclosure/2022/Jun/44 -CVE-2022-32454 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560 -CVE-2022-3246 - https://wpscan.com/vulnerability/ece049b2-9a21-463d-9e8b-b4ce61919f0c -CVE-2022-3247 - https://wpscan.com/vulnerability/ee312f22-ca58-451d-a1cb-3f78a6e5ecaf -CVE-2022-32480 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en -CVE-2022-3249 - https://wpscan.com/vulnerability/6503da78-a2bf-4b4c-b56d-21c8c55b076e -CVE-2022-3250 - https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23 -CVE-2022-32502 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32503 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32504 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32505 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32506 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32507 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32508 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-32509 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-3251 - https://huntr.dev/bounties/b9a1b411-060b-4235-9426-e39bd0a1d6d9 -CVE-2022-32510 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -CVE-2022-3254 - https://wpscan.com/vulnerability/546c47c2-5b4b-46db-b754-c6b43aef2660 -CVE-2022-32543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1527 -CVE-2022-32548 - https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers -CVE-2022-3255 - https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902 -CVE-2022-3256 - https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3 -CVE-2022-32567 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-039.txt -CVE-2022-3257 - https://mattermost.com/security-updates/ -CVE-2022-32572 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548 -CVE-2022-32573 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528 -CVE-2022-32574 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1565 -CVE-2022-32585 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1570 -CVE-2022-32586 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1563 -CVE-2022-32588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1544 -CVE-2022-3267 - https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2 -CVE-2022-3268 - https://huntr.dev/bounties/00e464ce-53b9-485d-ac62-6467881654c2 -CVE-2022-3269 - https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6 -CVE-2022-3272 - https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38 -CVE-2022-3273 - https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6 -CVE-2022-3274 - https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f -CVE-2022-32760 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1555 -CVE-2022-32761 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549 -CVE-2022-32763 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1541 -CVE-2022-32765 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1576 -CVE-2022-32768 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536 -CVE-2022-32769 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536 -CVE-2022-32770 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 -CVE-2022-32771 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 -CVE-2022-32772 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 -CVE-2022-32773 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1556 -CVE-2022-32774 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1600 -CVE-2022-32775 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564 -CVE-2022-32777 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542 -CVE-2022-32778 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542 -CVE-2022-3278 - https://huntr.dev/bounties/a9fad77e-f245-4ce9-ba15-c7d4c86c4612 -CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-3282 - https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c -CVE-2022-32827 - http://packetstormsecurity.com/files/169929/AppleAVD-deallocateKernelMemoryInternal-Missing-Surface-Lock.html -CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/47 -CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/50 -CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-3288 - https://gitlab.com/gitlab-org/gitlab/-/issues/354948 -CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32893 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/1 -CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/2 -CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/09/13/1 -CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2022-3290 - https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5 -CVE-2022-32907 - http://packetstormsecurity.com/files/169930/AppleAVD-AppleAVDUserClient-decodeFrameFig-Memory-Corruption.html -CVE-2022-32908 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32911 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/47 -CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/49 -CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/50 -CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/39 -CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/40 -CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/43 -CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/45 -CVE-2022-3292 - https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d -CVE-2022-32924 - http://packetstormsecurity.com/files/170010/XNU-Dangling-PTE-Entry.html -CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-3295 - https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233 -CVE-2022-3296 - https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077 -CVE-2022-3297 - https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c -CVE-2022-32978 - https://github.com/thorfdbg/libjpeg/issues/75 -CVE-2022-3298 - https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7 -CVE-2022-32985 - https://sec-consult.com/vulnerability-lab/advisory/hardcoded-backdoor-user-outdated-software-components-nexans-ftto-gigaswitch/ -CVE-2022-32988 - https://github.com/FedericoHeichou/CVE-2022-32988 -CVE-2022-32988 - https://github.com/FedericoHeichou/DSL-N14U-XSS -CVE-2022-32993 - https://github.com/laotun-s/POC/blob/main/CVE-2022-32993.txt -CVE-2022-32994 - https://github.com/zongdeiqianxing/cve-reports/issues/1 -CVE-2022-32995 - https://github.com/zongdeiqianxing/cve-reports/issues/2 -CVE-2022-3300 - https://wpscan.com/vulnerability/ddc9ed69-d942-4fad-bbf4-1be3b86460d9 -CVE-2022-3301 - https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a -CVE-2022-33011 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ -CVE-2022-33012 - https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/ -CVE-2022-3302 - https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b -CVE-2022-33024 - https://github.com/LibreDWG/libredwg/issues/492 -CVE-2022-33025 - https://github.com/LibreDWG/libredwg/issues/487 -CVE-2022-33026 - https://github.com/LibreDWG/libredwg/issues/484 -CVE-2022-33027 - https://github.com/LibreDWG/libredwg/issues/490 -CVE-2022-33028 - https://github.com/LibreDWG/libredwg/issues/489 -CVE-2022-3303 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d -CVE-2022-33032 - https://github.com/LibreDWG/libredwg/issues/488 -CVE-2022-33033 - https://github.com/LibreDWG/libredwg/issues/493 -CVE-2022-33034 - https://github.com/LibreDWG/libredwg/issues/494 -CVE-2022-33043 - https://github.com/chen-jerry-php/vim/blob/main/core_tmp.md -CVE-2022-33047 - https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing -CVE-2022-33065 - https://github.com/libsndfile/libsndfile/issues/789 -CVE-2022-33075 - https://packetstormsecurity.com/files/167603/Zoo-Management-System-1.0-Cross-Site-Scripting.html -CVE-2022-33077 - https://medium.com/@rohan_pagey/cve-2022-33077-idor-to-change-address-of-any-customer-via-parameter-pollution-in-nopcommerce-4-5-2fa4bc763cc6 -CVE-2022-33087 - https://github.com/cilan2/iot/blob/main/4.md -CVE-2022-33099 - https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf -CVE-2022-33099 - https://lua-users.org/lists/lua-l/2022-05/msg00035.html -CVE-2022-33103 - https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/ -CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284 -CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286 -CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287 -CVE-2022-33116 - https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/ -CVE-2022-33119 - https://github.com/badboycxcc/nuuo-xss/blob/main/README.md -CVE-2022-33121 - https://github.com/bg5sbk/MiniCMS/issues/45 -CVE-2022-33122 - https://github.com/eyoucms/eyoucms/issues/24 -CVE-2022-33124 - https://github.com/aio-libs/aiohttp/issues/6772 -CVE-2022-33147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 -CVE-2022-33148 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 -CVE-2022-33149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 -CVE-2022-33150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1577 -CVE-2022-33171 - http://packetstormsecurity.com/files/168096/TypeORM-0.3.7-Information-Disclosure.html -CVE-2022-33174 - https://gynvael.coldwind.pl/?lang=en&id=748 -CVE-2022-33175 - https://gynvael.coldwind.pl/?lang=en&id=748 -CVE-2022-33189 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558 -CVE-2022-33192 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 -CVE-2022-33193 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 -CVE-2022-33194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 -CVE-2022-33195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 -CVE-2022-33204 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 -CVE-2022-33205 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 -CVE-2022-33206 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 -CVE-2022-33207 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 -CVE-2022-3323 - https://www.tenable.com/security/research/tra-2022-32 -CVE-2022-3324 - https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c -CVE-2022-3326 - https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97 -CVE-2022-3327 - https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1 -CVE-2022-33312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 -CVE-2022-33313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 -CVE-2022-33314 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 -CVE-2022-33321 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-010.pdf -CVE-2022-33322 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf -CVE-2022-33325 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 -CVE-2022-33326 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 -CVE-2022-33327 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 -CVE-2022-33328 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 -CVE-2022-33329 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 -CVE-2022-3333 - https://wpscan.com/vulnerability/bfd8a7aa-5977-4fe5-b2fc-12bf93caf3ed -CVE-2022-3334 - https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9 -CVE-2022-3335 - https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d -CVE-2022-3336 - https://wpscan.com/vulnerability/57bc6633-1aeb-4c20-a2a5-9b3fa10ba95d -CVE-2022-3338 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387 -CVE-2022-3339 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387 -CVE-2022-3343 - https://wpscan.com/vulnerability/e507b1b5-1a56-4b2f-b7e7-e22f6da1e32a -CVE-2022-3350 - https://wpscan.com/vulnerability/6d796b83-03c0-49f8-8d07-5c63ce8a32b9 -CVE-2022-3352 - https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60 -CVE-2022-3354 - https://vuldb.com/?id.209686 -CVE-2022-3355 - https://huntr.dev/bounties/4b7fb92c-f06b-4bbf-82dc-9f013b30b6a6 -CVE-2022-3357 - https://wpscan.com/vulnerability/2e28a4e7-e7d3-485c-949c-e300e5b66cbd -CVE-2022-3359 - https://wpscan.com/vulnerability/08f3ce22-94a0-496a-aaf9-d35b6b0f5bb6 -CVE-2022-3360 - https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3 -CVE-2022-3362 - https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1 -CVE-2022-3363 - https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e -CVE-2022-3364 - https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720 -CVE-2022-3366 - https://wpscan.com/vulnerability/72639924-e7a7-4f7d-bd50-015d05ffd4fb -CVE-2022-3368 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2022-3371 - https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce -CVE-2022-3374 - https://wpscan.com/vulnerability/22fd3f28-9036-4bd5-ad98-ff78bd1b51bc -CVE-2022-3376 - https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed -CVE-2022-3380 - https://wpscan.com/vulnerability/a42272a2-f9ce-4aab-9a94-8a4d85008746 -CVE-2022-3389 - https://huntr.dev/bounties/f7d2a6ab-2faf-4719-bdb6-e4e5d6065752 -CVE-2022-33891 - http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html -CVE-2022-33896 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574 -CVE-2022-33897 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1579 -CVE-2022-3391 - https://wpscan.com/vulnerability/ecc51420-ee50-4e39-a38d-09686f1996f2 -CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=29135 -CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=30384 -CVE-2022-33916 - https://opcfoundation.org -CVE-2022-33917 - http://packetstormsecurity.com/files/168147/Arm-Mali-CSF-VMA-Split-Mishandling.html -CVE-2022-3392 - https://wpscan.com/vulnerability/2296156e-b177-478e-a01c-b1ea4fee0aca -CVE-2022-3393 - https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e -CVE-2022-33932 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en -CVE-2022-33938 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584 -CVE-2022-3394 - https://wpscan.com/vulnerability/3266eb59-a8b2-4a5a-ab48-01a9af631b2c -CVE-2022-3395 - https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 -CVE-2022-33981 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6 -CVE-2022-33981 - https://seclists.org/oss-sec/2022/q2/66 -CVE-2022-34000 - https://github.com/libjxl/libjxl/issues/1477 -CVE-2022-34001 - https://prisminfosec.com/cve-2022-34001/ -CVE-2022-34002 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1843134469/CVE-2022-34002+Personnel+Data+Systems+PDS+Vista+7+-+Local+File+Inclusion -CVE-2022-34005 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf -CVE-2022-34006 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf -CVE-2022-34007 - https://packetstormsecurity.com/files/167706/EQS-Integrity-Line-Cross-Site-Scripting-Information-Disclosure.html -CVE-2022-34008 - https://r0h1rr1m.medium.com/comodo-antivirus-local-privilege-escalation-through-insecure-file-move-476a4601d9b8 -CVE-2022-34020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html -CVE-2022-34020 - https://securityblog101.blogspot.com/2022/09/cve-2022-34020.html -CVE-2022-34021 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34021.html -CVE-2022-34022 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34022.html -CVE-2022-34027 - https://github.com/nginx/njs/issues/504 -CVE-2022-34028 - https://github.com/nginx/njs/issues/522 -CVE-2022-34029 - https://github.com/nginx/njs/issues/506 -CVE-2022-34030 - https://github.com/nginx/njs/issues/540 -CVE-2022-34031 - https://github.com/nginx/njs/issues/523 -CVE-2022-34032 - https://github.com/nginx/njs/issues/524 -CVE-2022-34033 - https://github.com/michaelrsweet/htmldoc/issues/425 -CVE-2022-34035 - https://github.com/michaelrsweet/htmldoc/issues/426 -CVE-2022-34046 - http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html -CVE-2022-34047 - http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html -CVE-2022-3405 - https://herolab.usd.de/security-advisories/usd-2022-0008/ -CVE-2022-34067 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System -CVE-2022-3408 - https://wpscan.com/vulnerability/395bc893-2067-4f76-b49f-9ed8e1e8f330 -CVE-2022-34092 - https://github.com/edmarmoretti/i3geo/issues/3 -CVE-2022-34092 - https://github.com/saladesituacao/i3geo/issues/3 -CVE-2022-34092 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23 -CVE-2022-34093 - https://github.com/edmarmoretti/i3geo/issues/4 -CVE-2022-34093 - https://github.com/saladesituacao/i3geo/issues/4 -CVE-2022-34093 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44 -CVE-2022-34094 - https://github.com/edmarmoretti/i3geo/issues/5 -CVE-2022-34094 - https://github.com/saladesituacao/i3geo/issues/5 -CVE-2022-34094 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65 -CVE-2022-34100 - https://www.crestron.com/Security/Security_Advisories -CVE-2022-34101 - https://www.crestron.com/Security/Security_Advisories -CVE-2022-34102 - https://www.crestron.com/Security/Security_Advisories -CVE-2022-34113 - https://github.com/dataease/dataease/issues/2431 -CVE-2022-34121 - https://github.com/CuppaCMS/CuppaCMS/issues/18 -CVE-2022-34121 - https://github.com/hansmach1ne/MyExploits/tree/main/LFI_in_CuppaCMS_templates -CVE-2022-34125 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ -CVE-2022-34126 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ -CVE-2022-34127 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ -CVE-2022-34128 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ -CVE-2022-3414 - https://vuldb.com/?id.210246 -CVE-2022-34140 - http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html -CVE-2022-34140 - http://packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.html -CVE-2022-3415 - https://wpscan.com/vulnerability/012c5b64-ef76-4539-afd8-40f6c329ae88 -CVE-2022-3416 - https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6 -CVE-2022-34169 - http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html -CVE-2022-34169 - https://www.oracle.com/security-alerts/cpujul2022.html -CVE-2022-3418 - https://wpscan.com/vulnerability/ccbb74f5-1b8f-4ea6-96bc-ddf62af7f94d -CVE-2022-3419 - https://wpscan.com/vulnerability/5909a423-9841-449c-a569-f687c609817b -CVE-2022-3420 - https://wpscan.com/vulnerability/ce5fac6e-8da1-4042-9cf8-7988613f92a5 -CVE-2022-3422 - https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551 -CVE-2022-3423 - https://huntr.dev/bounties/94639d8e-8301-4432-ab80-e76e1346e631 -CVE-2022-3425 - https://wpscan.com/vulnerability/df1c36bb-9861-4272-89c9-ae76e62f687c -CVE-2022-3426 - https://wpscan.com/vulnerability/bc90594e-1018-494a-b473-6416e274c59f -CVE-2022-34267 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver -CVE-2022-34268 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver -CVE-2022-34269 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver -CVE-2022-34270 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver -CVE-2022-34292 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 -CVE-2022-34296 - https://github.com/zalando/skipper/releases/tag/v0.13.218 -CVE-2022-34299 - https://github.com/davea42/libdwarf-code/issues/119 -CVE-2022-34300 - https://github.com/syoyo/tinyexr/issues/167 -CVE-2022-34328 - https://github.com/jenaye/PMB -CVE-2022-3434 - https://vuldb.com/?id.210356 -CVE-2022-3436 - http://packetstormsecurity.com/files/176007/Online-Student-Clearance-System-1.0-Shell-Upload.html -CVE-2022-3438 - https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67 -CVE-2022-3439 - https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7 -CVE-2022-34393 - https://www.dell.com/support/kbdoc/000204686 -CVE-2022-3440 - https://wpscan.com/vulnerability/e39fcf30-1e69-4399-854c-4c5b6ccc22a2 -CVE-2022-3441 - https://wpscan.com/vulnerability/7b51b1f0-17ca-46b7-ada1-20bd926f3023 -CVE-2022-3442 - https://vuldb.com/?id.210374 -CVE-2022-3442 - https://www.pentagrid.ch/en/blog/reflected-xss-vulnerability-in-crealogix-ebics-implementation/ -CVE-2022-34446 - https://www.dell.com/support/kbdoc/000205404 -CVE-2022-34447 - https://www.dell.com/support/kbdoc/000205404 -CVE-2022-34448 - https://www.dell.com/support/kbdoc/000205404 -CVE-2022-34449 - https://www.dell.com/support/kbdoc/000205404 -CVE-2022-34450 - https://www.dell.com/support/kbdoc/000205404 -CVE-2022-34451 - https://www.dell.com/support/kbdoc/000205404 -CVE-2022-34460 - https://www.dell.com/support/kbdoc/000204686 -CVE-2022-34468 - https://bugzilla.mozilla.org/show_bug.cgi?id=1768537 -CVE-2022-34474 - https://bugzilla.mozilla.org/show_bug.cgi?id=1677138 -CVE-2022-34482 - https://bugzilla.mozilla.org/show_bug.cgi?id=845880 -CVE-2022-34494 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 -CVE-2022-34495 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 -CVE-2022-34496 - https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading -CVE-2022-34502 - https://github.com/radareorg/radare2/issues/20336 -CVE-2022-3451 - https://wpscan.com/vulnerability/d8005cd0-8232-4d43-a4e4-14728eaf1300 -CVE-2022-3452 - https://vuldb.com/?id.210436 -CVE-2022-34520 - https://github.com/radareorg/radare2/issues/20354 -CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/433 -CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/486 -CVE-2022-34527 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-34528 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-34529 - https://github.com/wasm3/wasm3/issues/337 -CVE-2022-3453 - https://vuldb.com/?id.210437 -CVE-2022-34549 - https://github.com/rawchen/sims/issues/6 -CVE-2022-34550 - https://github.com/rawchen/sims/issues/8 -CVE-2022-34551 - https://github.com/rawchen/sims/issues/7 -CVE-2022-3456 - https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce -CVE-2022-34567 - https://www.redteam.tips/mango-vulnerability-disclosure-report/ -CVE-2022-34570 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__messages.md -CVE-2022-34571 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_syslog.shtml.md -CVE-2022-34572 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md -CVE-2022-34573 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_mb_wifibasic.assets/WiFi-Repeater_mb_wifibasic.md -CVE-2022-34574 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_Tftpd32.assets/WiFi-Repeater_Tftpd32.md -CVE-2022-34575 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_fctest.assets/WiFi-Repeater_fctest.md -CVE-2022-34576 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Sensitive%20information%20leakage.md -CVE-2022-34577 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Command%20Execution%20Vulnerability.md -CVE-2022-34578 - https://grimthereaperteam.medium.com/open-source-point-of-sale-v3-3-7-file-upload-cross-site-scripting-4900d717b2c3 -CVE-2022-34592 - https://github.com/winmt/CVE/blob/main/WAVLINK%20WL-WN575A3/README.md -CVE-2022-34592 - https://github.com/winmt/my-vuls/tree/main/WAVLINK%20WL-WN575A3 -CVE-2022-34593 - https://github.com/Liyou-ZY/POC/issues/1 -CVE-2022-34595 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/readme_en.md -CVE-2022-34596 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/2/readme_en.md -CVE-2022-34597 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/TendaAX1806/readme_en.md -CVE-2022-34599 - https://github.com/Darry-lang1/vuln/tree/main/H3C/1 -CVE-2022-34600 - https://github.com/Darry-lang1/vuln/tree/main/H3C/3 -CVE-2022-34601 - https://github.com/Darry-lang1/vuln/tree/main/H3C/2 -CVE-2022-34602 - https://github.com/Darry-lang1/vuln/tree/main/H3C/4 -CVE-2022-34603 - https://github.com/Darry-lang1/vuln/tree/main/H3C/5 -CVE-2022-34604 - https://github.com/Darry-lang1/vuln/tree/main/H3C/11 -CVE-2022-34605 - https://github.com/Darry-lang1/vuln/tree/main/H3C/10 -CVE-2022-34606 - https://github.com/Darry-lang1/vuln/tree/main/H3C/6 -CVE-2022-34607 - https://github.com/Darry-lang1/vuln/tree/main/H3C/8 -CVE-2022-34608 - https://github.com/Darry-lang1/vuln/tree/main/H3C/7 -CVE-2022-34609 - https://github.com/Darry-lang1/vuln/tree/main/H3C/9 -CVE-2022-34610 - https://github.com/Darry-lang1/vuln/tree/main/H3C/12 -CVE-2022-34618 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/ -CVE-2022-34619 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/ -CVE-2022-3462 - https://wpscan.com/vulnerability/b583de48-1332-4984-8c0c-a7ed4a2397cd -CVE-2022-3463 - https://wpscan.com/vulnerability/e2a59481-db45-4b8e-b17a-447303469364 -CVE-2022-3464 - https://vuldb.com/?id.210699 -CVE-2022-34652 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 -CVE-2022-34668 - http://packetstormsecurity.com/files/171483/NVFLARE-Unsafe-Deserialization.html -CVE-2022-34669 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34670 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34671 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1719 -CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1720 -CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1721 -CVE-2022-34672 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34673 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34674 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34675 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34676 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34677 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34678 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34679 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34680 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34681 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34682 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34683 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-34684 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-3469 - https://wpscan.com/vulnerability/017ca231-e019-4694-afa2-ab7f8481ae63 -CVE-2022-3470 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20sc%20parameter%20is%20injected.pdf -CVE-2022-34704 - http://packetstormsecurity.com/files/168329/Windows-Credential-Guard-Non-Constant-Time-Comparison-Information-Disclosure.html -CVE-2022-34705 - http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html -CVE-2022-34707 - http://packetstormsecurity.com/files/168311/Windows-Kernel-Refcount-Overflow-Use-After-Free.html -CVE-2022-34708 - http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html -CVE-2022-34709 - http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html -CVE-2022-3471 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20searccity%20parameter%20is%20injected.pdf -CVE-2022-3471 - https://vuldb.com/?id.210715 -CVE-2022-34710 - http://packetstormsecurity.com/files/168318/Windows-Credential-Guard-Insufficient-Checks-On-Kerberos-Encryption-Type-Use.html -CVE-2022-34711 - http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html -CVE-2022-34712 - http://packetstormsecurity.com/files/168326/Windows-Credential-Guard-KerbIumGetNtlmSupplementalCredential-Information-Disclosure.html -CVE-2022-34716 - http://packetstormsecurity.com/files/168332/.NET-XML-Signature-Verification-External-Entity-Injection.html -CVE-2022-3472 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20cityedit%20parameter%20is%20injected.pdf -CVE-2022-3472 - https://vuldb.com/?id.210716 -CVE-2022-3473 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20ci%20parameter%20is%20injected.pdf -CVE-2022-3473 - https://vuldb.com/?id.210717 -CVE-2022-34753 - http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html -CVE-2022-34756 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf -CVE-2022-34757 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf -CVE-2022-34758 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf -CVE-2022-3477 - https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef -CVE-2022-3481 - https://wpscan.com/vulnerability/c5e395f8-257e-49eb-afbd-9c1e26045373 -CVE-2022-3484 - https://wpscan.com/vulnerability/3afaed61-6187-4915-acf0-16e79d5c2464 -CVE-2022-34845 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1580 -CVE-2022-34850 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1578 -CVE-2022-3486 - https://gitlab.com/gitlab-org/gitlab/-/issues/377810 -CVE-2022-34873 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-34874 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-34875 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-3489 - https://wpscan.com/vulnerability/36d78b6c-0da5-44f8-b7b3-eae78edac505 -CVE-2022-3490 - https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136 -CVE-2022-34903 - http://www.openwall.com/lists/oss-security/2022/07/02/1 -CVE-2022-34903 - https://www.openwall.com/lists/oss-security/2022/06/30/1 -CVE-2022-34906 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/ -CVE-2022-34906 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244 -CVE-2022-34907 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/ -CVE-2022-34907 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244 -CVE-2022-3491 - https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb -CVE-2022-34914 - https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914 -CVE-2022-34918 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html -CVE-2022-34918 - http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html -CVE-2022-34918 - http://www.openwall.com/lists/oss-security/2022/07/05/1 -CVE-2022-34918 - https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u -CVE-2022-34918 - https://www.openwall.com/lists/oss-security/2022/07/02/3 -CVE-2022-34918 - https://www.randorisec.fr/crack-linux-firewall/ -CVE-2022-34937 - https://github.com/u5cms/u5cms/issues/51 -CVE-2022-3494 - https://wpscan.com/vulnerability/71db75c0-5907-4237-884f-8db88b1a9b34 -CVE-2022-3495 - https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC -CVE-2022-3495 - https://vuldb.com/?id.210784 -CVE-2022-34955 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 -CVE-2022-34956 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 -CVE-2022-34961 - https://grimthereaperteam.medium.com/cve-2022-34961-ossn-6-3-lts-stored-xss-vulnerability-at-users-timeline-819a9d4e5e6c -CVE-2022-34962 - https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034 -CVE-2022-34963 - https://grimthereaperteam.medium.com/cve-2022-34963-ossn-6-3-lts-stored-xss-vulnerability-at-news-feed-b8ae8f2fa5f3 -CVE-2022-34964 - https://grimthereaperteam.medium.com/ossn-6-3-lts-stored-xss-vulnerability-at-sitepages-ba91bbeccf1c -CVE-2022-34965 - https://grimthereaperteam.medium.com/cve-2022-34965-open-source-social-network-6-3-3f61db82880 -CVE-2022-34966 - https://grimthereaperteam.medium.com/cve-2022-34966-ossn-6-3-lts-html-injection-vulnerability-at-location-parameter-3fe791dd22c6 -CVE-2022-34968 - https://jira.percona.com/browse/PS-8294 -CVE-2022-34970 - https://github.com/0xhebi/CVE-2022-34970/blob/master/report.md -CVE-2022-34972 - https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html -CVE-2022-34973 - https://github.com/1759134370/iot/blob/main/DIR-820L.md -CVE-2022-34973 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-34974 - https://github.com/1759134370/iot/blob/main/DIR-810L.md -CVE-2022-34974 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-34988 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js -CVE-2022-34989 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar -CVE-2022-35014 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md -CVE-2022-35015 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md -CVE-2022-35016 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md -CVE-2022-35017 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md -CVE-2022-35018 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md -CVE-2022-35019 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md -CVE-2022-3502 - https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss -CVE-2022-35020 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md -CVE-2022-35021 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md -CVE-2022-35022 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35022.md -CVE-2022-35023 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35023.md -CVE-2022-35024 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35024.md -CVE-2022-35025 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35025.md -CVE-2022-35026 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35026.md -CVE-2022-35027 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35027.md -CVE-2022-35028 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35028.md -CVE-2022-35029 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35029.md -CVE-2022-3503 - https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC -CVE-2022-35030 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35030.md -CVE-2022-35031 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35031.md -CVE-2022-35032 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35032.md -CVE-2022-35034 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35034.md -CVE-2022-35035 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35035.md -CVE-2022-35036 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35036.md -CVE-2022-35037 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35037.md -CVE-2022-35038 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35038.md -CVE-2022-35039 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35039.md -CVE-2022-35040 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35040.md -CVE-2022-35041 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35041.md -CVE-2022-35042 - https://drive.google.com/file/d/1Gj8rA1kD89lxUZVb_t-s3-18-ospJRJC/view?usp=sharing -CVE-2022-35042 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35042.md -CVE-2022-35043 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35043.md -CVE-2022-35044 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35044.md -CVE-2022-35045 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md -CVE-2022-35046 - https://drive.google.com/file/d/1M8imA5zUlsMA6lgUbvLQ6rbEn6CO6QKq/view?usp=sharing -CVE-2022-35046 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35046.md -CVE-2022-35047 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35047.md -CVE-2022-35048 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md -CVE-2022-35049 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35049.md -CVE-2022-35050 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35050.md -CVE-2022-35051 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35051.md -CVE-2022-35052 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35052.md -CVE-2022-35053 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35053.md -CVE-2022-35054 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35054.md -CVE-2022-35055 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35055.md -CVE-2022-35056 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35056.md -CVE-2022-35058 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35058.md -CVE-2022-35059 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35059.md -CVE-2022-3506 - https://huntr.dev/bounties/08251542-88f6-4264-9074-a89984034828 -CVE-2022-35060 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35060.md -CVE-2022-35061 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35061.md -CVE-2022-35062 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35062.md -CVE-2022-35063 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35063.md -CVE-2022-35064 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35064.md -CVE-2022-35065 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35065.md -CVE-2022-35066 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35066.md -CVE-2022-35067 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35067.md -CVE-2022-35068 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35068.md -CVE-2022-35069 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35069.md -CVE-2022-35070 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35070.md -CVE-2022-35080 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35080.md -CVE-2022-35081 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35081.md -CVE-2022-35085 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35085.md -CVE-2022-35086 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35086.md -CVE-2022-35087 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35087.md -CVE-2022-35088 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35088.md -CVE-2022-35089 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md -CVE-2022-35090 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35090.md -CVE-2022-35091 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35091.md -CVE-2022-35092 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35092.md -CVE-2022-35093 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35093.md -CVE-2022-35094 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35094.md -CVE-2022-35095 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35095.md -CVE-2022-35096 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35096.md -CVE-2022-35097 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35097.md -CVE-2022-35098 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35098.md -CVE-2022-35099 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35099.md -CVE-2022-35107 - https://github.com/matthiaskramm/swftools/issues/184 -CVE-2022-35108 - https://github.com/matthiaskramm/swftools/issues/184 -CVE-2022-35109 - https://github.com/matthiaskramm/swftools/issues/184 -CVE-2022-3511 - https://wpscan.com/vulnerability/9e57285a-0023-4711-874c-6e7b3c2673d1 -CVE-2022-35110 - https://github.com/matthiaskramm/swftools/issues/184 -CVE-2022-35111 - https://github.com/matthiaskramm/swftools/issues/184 -CVE-2022-35122 - https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/ -CVE-2022-35131 - https://github.com/laurent22/joplin/releases/tag/v2.9.1 -CVE-2022-35131 - https://github.com/ly1g3/Joplin-CVE-2022-35131 -CVE-2022-35134 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35134.html -CVE-2022-35135 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html -CVE-2022-35136 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html -CVE-2022-35137 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-35137.html -CVE-2022-3514 - https://gitlab.com/gitlab-org/gitlab/-/issues/377978 -CVE-2022-35147 - https://github.com/doramart/DoraCMS/issues/256 -CVE-2022-35150 - https://github.com/To-LingJing/CVE-Issues/blob/main/baijiacms/upload_file.md -CVE-2022-35151 - https://github.com/kekingcn/kkFileView/issues/366 -CVE-2022-35154 - https://github.com/secf0ra11/secf0ra11.github.io/blob/main/Shopro_SQL_injection.md -CVE-2022-35155 - https://github.com/shellshok3/Cross-Site-Scripting-XSS/blob/main/Bus%20Pass%20Management%20System%201.0.md -CVE-2022-35156 - https://packetstormsecurity.com/files/168555/Bus-Pass-Management-System-1.0-Cross-Site-Scripting.html -CVE-2022-3516 - https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748 -CVE-2022-35164 - https://github.com/LibreDWG/libredwg/issues/497 -CVE-2022-35165 - https://github.com/axiomatic-systems/Bento4/issues/712 -CVE-2022-35166 - https://github.com/thorfdbg/libjpeg/issues/76 -CVE-2022-35168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35173 - https://github.com/nginx/njs/issues/553 -CVE-2022-35174 - https://www.youtube.com/watch?v=0lngc_zPTSg -CVE-2022-3518 - https://github.com/lohith19/CVE-2022-3518/blob/main/POC -CVE-2022-35191 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-35192 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-35193 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35193 -CVE-2022-35194 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35194 -CVE-2022-35195 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35195 -CVE-2022-35196 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35196 -CVE-2022-3520 - https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246 -CVE-2022-35203 - https://medium.com/@shrutukapoor25/cve-2022-35203-2372a0728279 -CVE-2022-35204 - https://github.com/vitejs/vite/issues/8498 -CVE-2022-35206 - https://sourceware.org/bugzilla/show_bug.cgi?id=29290 -CVE-2022-3521 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec7eede369fe5b0d085ac51fdbb95184f87bfc6c -CVE-2022-35224 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35225 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35226 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35227 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35228 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-3523 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16ce101db85db694a91380aa4c89b25530871d33 -CVE-2022-3524 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11 -CVE-2022-35244 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1582 -CVE-2022-3525 - https://huntr.dev/bounties/ed048e8d-87af-440a-a91f-be1e65a40330 -CVE-2022-35260 - http://seclists.org/fulldisclosure/2023/Jan/19 -CVE-2022-35261 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35262 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35263 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35264 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35265 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35266 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35267 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35268 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35269 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35270 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35271 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 -CVE-2022-35290 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35291 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35292 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35293 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35294 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35295 - http://packetstormsecurity.com/files/170233/SAP-Host-Agent-Privilege-Escalation.html -CVE-2022-35295 - http://seclists.org/fulldisclosure/2022/Dec/12 -CVE-2022-35295 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35296 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35297 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35298 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-35299 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-3536 - https://wpscan.com/vulnerability/6af63aab-b7a6-4ef6-8604-4b4b99467a34 -CVE-2022-3537 - https://wpscan.com/vulnerability/696868f7-409d-422d-87f4-92fc6bf6e74e -CVE-2022-3538 - https://wpscan.com/vulnerability/337ee7ed-9ade-4567-b976-88386cbcf036 -CVE-2022-3539 - https://wpscan.com/vulnerability/ab3b0052-1a74-4ba3-b6d2-78cfe56029db -CVE-2022-35401 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1586 -CVE-2022-35405 - http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html -CVE-2022-35405 - https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html -CVE-2022-35411 - http://packetstormsecurity.com/files/167872/rpc.py-0.6.0-Remote-Code-Execution.html -CVE-2022-35411 - https://medium.com/@elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30 -CVE-2022-35413 - https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview -CVE-2022-35413 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb -CVE-2022-35414 - https://sick.codes/sick-2022-113 -CVE-2022-3546 - https://github.com/thehackingverse/Stored-xss-/blob/main/Poc -CVE-2022-3547 - https://github.com/lakshaya0557/POCs/blob/main/POC -CVE-2022-3548 - https://github.com/Ramansh123454/POCs/blob/main/POC -CVE-2022-3548 - https://vuldb.com/?id.211048 -CVE-2022-3549 - https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE -CVE-2022-35493 - https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS/blob/main/README.md -CVE-2022-35503 - https://osm.etsi.org/ -CVE-2022-35503 - https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure -CVE-2022-35505 - https://github.com/h3xduck/TripleCross/issues/40 -CVE-2022-35506 - https://github.com/h3xduck/TripleCross/issues/40 -CVE-2022-35507 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ -CVE-2022-35508 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ -CVE-2022-35513 - http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html -CVE-2022-35513 - https://github.com/p1ckzi/CVE-2022-35513 -CVE-2022-35516 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.93/Login.poc.md -CVE-2022-35517 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi -CVE-2022-35518 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-nas_diskshtml-command-injection-in-nascgi -CVE-2022-35519 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-deleting-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi -CVE-2022-3552 - http://packetstormsecurity.com/files/171542/BoxBilling-4.22.1.5-Remote-Code-Execution.html -CVE-2022-3552 - https://huntr.dev/bounties/c6e2973d-386d-4667-9426-10d10828539b -CVE-2022-35520 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-hidden-parameter-ufconf-command-injection-in-apicgi -CVE-2022-35521 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-man_securityshtml-command-injection-in-firewallcgi -CVE-2022-35522 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wanshtml-command-injection-in-admcgi -CVE-2022-35523 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi -CVE-2022-35524 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi -CVE-2022-35525 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-command-injection-in-admcgi -CVE-2022-35526 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-loginshtml-command-injection-in-logincgi -CVE-2022-35533 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-hidden-parameters-command-injection-in-qoscgi -CVE-2022-35534 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_multi_ssidshtml-command-injection-in-wirelesscgi -CVE-2022-35535 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-adding-extender-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi -CVE-2022-35536 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-command-injection-in-qoscgi -CVE-2022-35537 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_meshshtml-hidden-parameter-command-injection-in-wirelesscgi -CVE-2022-35538 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-clicking-the-button-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi -CVE-2022-35540 - https://github.com/dotnetcore/AgileConfig/issues/91 -CVE-2022-3558 - https://wpscan.com/vulnerability/e3d72e04-9cdf-4b7d-953e-876e26abdfc6 -CVE-2022-35582 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb -CVE-2022-35583 - http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html -CVE-2022-35583 - https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing -CVE-2022-35585 - https://huntr.dev/bounties/5-other-forkcms/ -CVE-2022-35587 - https://huntr.dev/bounties/6-other-forkcms/ -CVE-2022-35589 - https://huntr.dev/bounties/7-other-forkcms/ -CVE-2022-35590 - https://huntr.dev/bounties/4-other-forkcms/ -CVE-2022-35598 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35599 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35601 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35602 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35603 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35604 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35605 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35606 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-35611 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35611.html -CVE-2022-35612 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35612.html -CVE-2022-35619 - https://github.com/1759134370/iot/blob/main/DIR-818L.md -CVE-2022-35619 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-3562 - https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657 -CVE-2022-35620 - https://github.com/1759134370/iot/blob/main/DIR-818L.md -CVE-2022-35620 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-35621 - https://github.com/MacherCS/CVE_Evoh_Contract -CVE-2022-3569 - http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html -CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/381 -CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/386 -CVE-2022-35737 - https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/ -CVE-2022-35739 - https://raxis.com/blog/cve-2022-35739 -CVE-2022-3574 - https://wpscan.com/vulnerability/0eae5189-81af-4344-9e96-dd1f4e223d41 -CVE-2022-35768 - http://packetstormsecurity.com/files/168313/Windows-Kernel-Registry-Hive-Memory-Problems.html -CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=945a9a8e448b65bec055d37eba58f711b39f66f0 -CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc4ef9d5724973193bfa5ebed181dba6de3a56db -CVE-2022-35771 - http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html -CVE-2022-3578 - https://wpscan.com/vulnerability/17596b0e-ff45-4d0c-8e57-a31101e30345 -CVE-2022-3579 - https://github.com/DisguisedRoot/Exploit/blob/main/SQLInj/POC -CVE-2022-3579 - https://vuldb.com/?id.211186 -CVE-2022-3582 - https://github.com/jusstSahil/CSRF-/blob/main/POC -CVE-2022-35822 - http://packetstormsecurity.com/files/168331/Windows-Credential-Guard-TGT-Renewal-Information-Disclosure.html -CVE-2022-3583 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql1.md -CVE-2022-3583 - https://vuldb.com/?id.211192 -CVE-2022-3584 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql2.md -CVE-2022-3585 - https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System/blob/main/PoC -CVE-2022-35866 - http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html -CVE-2022-3587 - https://github.com/rsrahulsingh05/POC/blob/main/Stored%20XSS -CVE-2022-35874 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 -CVE-2022-35875 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 -CVE-2022-35876 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 -CVE-2022-35877 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 -CVE-2022-35878 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 -CVE-2022-35879 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 -CVE-2022-35880 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 -CVE-2022-35881 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 -CVE-2022-35884 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 -CVE-2022-35885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 -CVE-2022-35886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 -CVE-2022-35887 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 -CVE-2022-35890 - https://github.com/sourceincite/randy -CVE-2022-35899 - https://github.com/AngeloPioAmirante/CVE-2022-35899 -CVE-2022-35899 - https://packetstormsecurity.com/files/167763/Asus-GameSDK-1.0.0.4-Unquoted-Service-Path.html -CVE-2022-35899 - https://www.exploit-db.com/exploits/50985 -CVE-2022-3590 - https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11 -CVE-2022-3591 - https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921 -CVE-2022-35911 - https://packetstormsecurity.com/files/167797/Patlite-1.46-Buffer-Overflow.html -CVE-2022-35913 - https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html -CVE-2022-35914 - http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html -CVE-2022-35919 - http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html -CVE-2022-35923 - https://huntr.dev/bounties/2d92f644-593b-43b4-bfd1-c8042ac60609/ -CVE-2022-35925 - https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/ -CVE-2022-35953 - https://huntr.dev/bounties/67ca22bd-19c6-466b-955a-b1ee2da0c575/ -CVE-2022-3597 - https://gitlab.com/libtiff/libtiff/-/issues/413 -CVE-2022-3598 - https://gitlab.com/libtiff/libtiff/-/issues/435 -CVE-2022-3599 - https://gitlab.com/libtiff/libtiff/-/issues/398 -CVE-2022-3600 - https://wpscan.com/vulnerability/16e2d970-19d0-42d1-8fb1-e7cb14ace1d0 -CVE-2022-3601 - https://wpscan.com/vulnerability/28b7ee77-5826-4c98-b09a-8f197e1a6d18 -CVE-2022-3602 - http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html -CVE-2022-3603 - https://wpscan.com/vulnerability/376e2bc7-2eb9-4e0a-809c-1582940ebdc7 -CVE-2022-3604 - https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de/ -CVE-2022-3605 - https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2 -CVE-2022-36067 - https://github.com/patriksimek/vm2/issues/467 -CVE-2022-36067 - https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067 -CVE-2022-36069 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ -CVE-2022-3608 - https://huntr.dev/bounties/8f0f3635-9d81-4c55-9826-2ba955c3a850 -CVE-2022-36082 - https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw -CVE-2022-36087 - https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7 -CVE-2022-3609 - https://wpscan.com/vulnerability/b893cac2-6511-4e2a-9eff-baf0f3cc9d7e -CVE-2022-3610 - https://wpscan.com/vulnerability/33b52dd7-613f-46e4-b8ee-beddd31689eb -CVE-2022-36111 - https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake -CVE-2022-36115 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36116 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36117 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36118 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36119 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36120 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36121 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise -CVE-2022-36123 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.13 -CVE-2022-36123 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-128.md -CVE-2022-36123 - https://sick.codes/sick-2022-128 -CVE-2022-36126 - https://github.com/sourceincite/randy -CVE-2022-36126 - https://srcincite.io/advisories/src-2022-0014/ -CVE-2022-36131 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-038.txt -CVE-2022-36136 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-deposit-commend-839d2c587d6e -CVE-2022-36137 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-sheader-2ed4184030f7 -CVE-2022-36139 - https://github.com/djcsdy/swfmill/issues/56 -CVE-2022-36140 - https://github.com/djcsdy/swfmill/issues/57 -CVE-2022-36141 - https://github.com/djcsdy/swfmill/issues/58 -CVE-2022-36142 - https://github.com/djcsdy/swfmill/issues/61 -CVE-2022-36143 - https://github.com/djcsdy/swfmill/issues/62 -CVE-2022-36144 - https://github.com/djcsdy/swfmill/issues/63 -CVE-2022-36145 - https://github.com/djcsdy/swfmill/issues/64 -CVE-2022-36146 - https://github.com/djcsdy/swfmill/issues/65 -CVE-2022-36148 - https://github.com/nu774/fdkaac/issues/52 -CVE-2022-36161 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0 -CVE-2022-36170 - https://github.com/prismbreak/vulnerabilities/issues/2 -CVE-2022-36171 - https://github.com/prismbreak/vulnerabilities/issues/2 -CVE-2022-36173 - https://public-exposure.inform.social/post/integrity-checking/ -CVE-2022-36174 - https://public-exposure.inform.social/post/integrity-checking/ -CVE-2022-36179 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ -CVE-2022-3618 - https://wpscan.com/vulnerability/2011dc7b-8e8c-4190-ab34-de288e14685b -CVE-2022-36180 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ -CVE-2022-36182 - https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html -CVE-2022-36186 - https://github.com/gpac/gpac/issues/2223 -CVE-2022-36190 - https://github.com/gpac/gpac/issues/2220 -CVE-2022-36191 - https://github.com/gpac/gpac/issues/2218 -CVE-2022-36193 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-36193/POC.md -CVE-2022-36194 - http://packetstormsecurity.com/files/168149/Centreon-22.04.0-Cross-Site-Scripting.html -CVE-2022-36194 - https://github.com/amdsyad/poc-dump/blob/main/Stored%20XSS%20in%20name%20parameter%20in%20Centreon%20version%2022.04.0 -CVE-2022-36197 - https://github.com/bigtreecms/BigTree-CMS/issues/392 -CVE-2022-36198 - https://github.com/jcarabantes/Bus-Vulnerabilities -CVE-2022-36200 - https://github.com/afaq1337/CVE-2022-36200 -CVE-2022-36201 - http://packetstormsecurity.com/files/168212/Doctors-Appointment-System-1.0-SQL-Injection.html -CVE-2022-36203 - http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html -CVE-2022-36215 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedebiz/6.0.0/sys_info.poc.md -CVE-2022-36216 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.94/member_toadmin.poc.md -CVE-2022-36223 - https://medium.com/@cupc4k3/administrator-account-takeover-in-emby-media-server-616fc2a6704f -CVE-2022-36224 - https://github.com/dayrui/xunruicms/issues/1 -CVE-2022-36225 - https://github.com/weng-xianhu/eyoucms/issues/26 -CVE-2022-36226 - https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell -CVE-2022-36227 - https://github.com/libarchive/libarchive/issues/1754 -CVE-2022-36231 - https://github.com/affix/CVE-2022-36231 -CVE-2022-36234 - https://github.com/kashimAstro/SimpleNetwork/issues/22 -CVE-2022-36251 - https://github.com/ZhenKaiHe/bug_report/blob/main/vendors/onetnom23/clinics-patient-management-system/XSS-1.md -CVE-2022-36254 - https://gist.github.com/ziyishen97/c464b459df73c4cef241e7ec774b7cf6 -CVE-2022-36255 - https://gist.github.com/ziyishen97/268678bca3034c64861b135946ee9fc3 -CVE-2022-36255 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-36256 - https://gist.github.com/ziyishen97/0fd90a5939ffb401e8a74f4a415e1610 -CVE-2022-36256 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-36257 - https://gist.github.com/ziyishen97/ff3816032a76796f45368ed243ab3343 -CVE-2022-36257 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-36258 - https://gist.github.com/ziyishen97/3553468b534c250f7b0d47e8a4c5fa52 -CVE-2022-36258 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-36259 - https://gist.github.com/ziyishen97/47666f584cd4cdad1d0f6af5f33a56db -CVE-2022-36259 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -CVE-2022-3626 - https://gitlab.com/libtiff/libtiff/-/issues/426 -CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34 -CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34?by=xboy(topsec) -CVE-2022-36266 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html -CVE-2022-36267 - http://packetstormsecurity.com/files/168047/AirSpot-5410-0.3.4.1-4-Remote-Command-Injection.html -CVE-2022-36271 - https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271 -CVE-2022-36273 - https://github.com/F0und-icu/CVEIDs/tree/main/TendaAC9 -CVE-2022-36279 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605 -CVE-2022-36280 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2071 -CVE-2022-36306 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 -CVE-2022-36309 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4 -CVE-2022-3631 - https://wpscan.com/vulnerability/13966b61-7e65-4493-8bd8-828d6d4441d5 -CVE-2022-36310 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm -CVE-2022-36314 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-36315 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-36316 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-36317 - https://bugzilla.mozilla.org/show_bug.cgi?id=1759951 -CVE-2022-36317 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-36318 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-36319 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737722 -CVE-2022-36319 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-3632 - https://wpscan.com/vulnerability/4c1b0e5e-245a-4d1f-a561-e91af906e62d -CVE-2022-36320 - https://www.mozilla.org/security/advisories/mfsa2022-28/ -CVE-2022-36329 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191 -CVE-2022-36330 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191 -CVE-2022-3634 - https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10 -CVE-2022-36354 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1629 -CVE-2022-36402 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2072 -CVE-2022-36429 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597 -CVE-2022-3643 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2022-36436 - https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-bypass/ -CVE-2022-36440 - https://github.com/spwpun/pocs -CVE-2022-36440 - https://github.com/spwpun/pocs/blob/main/frr-bgpd.md -CVE-2022-36442 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html -CVE-2022-36443 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html -CVE-2022-36446 - http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html -CVE-2022-36446 - http://packetstormsecurity.com/files/168049/Webmin-Package-Updates-Command-Injection.html -CVE-2022-36446 - https://www.exploit-db.com/exploits/50998 -CVE-2022-36447 - https://www.chia.net/2022/07/25/upgrading-the-cat-standard.en.html -CVE-2022-36449 - http://packetstormsecurity.com/files/168431/Arm-Mali-Released-Buffer-Use-After-Free.html -CVE-2022-36449 - http://packetstormsecurity.com/files/168432/Arm-Mali-Physical-Address-Exposure.html -CVE-2022-36449 - http://packetstormsecurity.com/files/168433/Arm-Mali-Race-Condition.html -CVE-2022-36449 - http://packetstormsecurity.com/files/168434/Arm-Mali-CSF-Missing-Buffer-Size-Check.html -CVE-2022-36455 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3600R/1/readme.md -CVE-2022-36456 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A720R/1 -CVE-2022-36458 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/2/readme.md -CVE-2022-36459 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/3/readme.md -CVE-2022-36460 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/4/readme.md -CVE-2022-36461 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/5/readme.md -CVE-2022-36462 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/6/readme.md -CVE-2022-36463 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/8/readme.md -CVE-2022-36464 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/10/readme.md -CVE-2022-36465 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/9/readme.md -CVE-2022-36466 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/7/readme.md -CVE-2022-36467 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md -CVE-2022-36468 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/5/readme.md -CVE-2022-36469 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/7/readme.md -CVE-2022-36470 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/6/readme.md -CVE-2022-36471 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/2/readme.md -CVE-2022-36472 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/8/readme.md -CVE-2022-36473 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/10/readme.md -CVE-2022-36474 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/9/readme.md -CVE-2022-36475 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/3/readme.md -CVE-2022-36477 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/12/readme.md -CVE-2022-36478 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/11/readme.md -CVE-2022-36479 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/3 -CVE-2022-36480 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/8 -CVE-2022-36481 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/1 -CVE-2022-36482 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/6 -CVE-2022-36483 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/9 -CVE-2022-36484 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7 -CVE-2022-36485 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/5 -CVE-2022-36486 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/4 -CVE-2022-36487 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/2 -CVE-2022-36488 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10 -CVE-2022-36489 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/1 -CVE-2022-36490 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5 -CVE-2022-36491 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/2 -CVE-2022-36492 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/4 -CVE-2022-36493 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/8 -CVE-2022-36494 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/7 -CVE-2022-36495 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/6 -CVE-2022-36496 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/9 -CVE-2022-36497 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/10 -CVE-2022-36498 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/3 -CVE-2022-36499 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/19 -CVE-2022-3650 - https://seclists.org/oss-sec/2022/q4/41 -CVE-2022-36500 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/13 -CVE-2022-36501 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/16 -CVE-2022-36502 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/18 -CVE-2022-36503 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/17 -CVE-2022-36504 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/11 -CVE-2022-36505 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/20 -CVE-2022-36506 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/14 -CVE-2022-36507 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/12 -CVE-2022-36508 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/15 -CVE-2022-36509 - https://github.com/Darry-lang1/vuln/blob/main/H3C/GR3200/1/readme.md -CVE-2022-36510 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR2200/1 -CVE-2022-36511 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/2 -CVE-2022-36513 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/5 -CVE-2022-36514 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/1 -CVE-2022-36515 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/4 -CVE-2022-36516 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/3 -CVE-2022-36517 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7 -CVE-2022-36518 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8 -CVE-2022-36519 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/9 -CVE-2022-36520 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/10 -CVE-2022-36522 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-36522/README.md -CVE-2022-36522 - https://seclists.org/fulldisclosure/2021/Jul/0 -CVE-2022-36523 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36524 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36525 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36526 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36532 - https://lutrasecurity.com/en/articles/cve-2022-36532/ -CVE-2022-36534 - http://packetstormsecurity.com/files/170245/Syncovery-For-Linux-Web-GUI-Authenticated-Remote-Command-Execution.html -CVE-2022-36537 - https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/ -CVE-2022-3654 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html -CVE-2022-36543 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md -CVE-2022-36544 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md -CVE-2022-36545 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md -CVE-2022-36546 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md -CVE-2022-36551 - http://packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html -CVE-2022-36561 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308 -CVE-2022-36568 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/3/tenda_ac9_setPptpUserList.md -CVE-2022-36569 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/4/tenda_ac9_setMacFilterCfg.md -CVE-2022-36570 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/1/tenda_ac9_SetLEDCfg.md -CVE-2022-36571 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/2/tenda_ac9_WanParameterSetting.md -CVE-2022-36572 - https://github.com/BreakALegCml/try/blob/main/SinSiuEnterpriseWebsiteSystem -CVE-2022-36577 - https://github.com/Cherry-toto/jizhicms/issues/77 -CVE-2022-36579 - https://github.com/wellcms/wellcms/issues/11 -CVE-2022-36580 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/Arbitrary-File-Upload-Vulnerability.md -CVE-2022-36581 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/SQL-Injection-Vulnerability.md -CVE-2022-36582 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Garage-Management-System/Arbitrary-File-Upload-Vulnerability.md -CVE-2022-36588 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36593 - https://github.com/kekingcn/kkFileView/issues/370 -CVE-2022-36606 - https://github.com/cloudwebsoft/ywoa/issues/25 -CVE-2022-36617 - https://startrekdude.github.io/arqbackup.html -CVE-2022-36619 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/setmac/readme.md -CVE-2022-36619 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-3662 - https://github.com/axiomatic-systems/Bento4/issues/802 -CVE-2022-36620 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting -CVE-2022-36620 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md -CVE-2022-36620 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-3663 - https://github.com/axiomatic-systems/Bento4/issues/800 -CVE-2022-3663 - https://vuldb.com/?id.212003 -CVE-2022-36633 - http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html -CVE-2022-36633 - https://github.com/gravitational/teleport -CVE-2022-36633 - https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html -CVE-2022-36634 - https://seclists.org/fulldisclosure/2022/Sep/29 -CVE-2022-36636 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ -CVE-2022-36637 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ -CVE-2022-36638 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ -CVE-2022-36639 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ -CVE-2022-3664 - https://github.com/axiomatic-systems/Bento4/issues/794 -CVE-2022-36640 - http://influxdata.com -CVE-2022-36640 - http://influxdb.com -CVE-2022-36640 - https://www.influxdata.com/ -CVE-2022-36642 - https://cyber-guy.gitbook.io/cyber-guy/pocs/omnia-node-mpx-auth-bypass-via-lfd -CVE-2022-36642 - https://www.exploit-db.com/exploits/50996 -CVE-2022-36647 - https://github.com/pkuvcl/davs2/issues/29 -CVE-2022-3665 - https://github.com/axiomatic-systems/Bento4/issues/794 -CVE-2022-36657 - https://github.com/z1pwn/bug_report/blob/main/vendors/kingbhob02/library-management-system/XSS-1.md -CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip -CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/issues/793 -CVE-2022-36664 - https://packetstormsecurity.com/files/168599/Password-Manager-For-IIS-2.0-Cross-Site-Scripting.html -CVE-2022-36667 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md -CVE-2022-36668 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md -CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md -CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System -CVE-2022-36669 - https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html -CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip -CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/issues/776 -CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip -CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/issues/776 -CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip -CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/issues/776 -CVE-2022-36736 - https://github.com/UditChavda/Udit-Chavda-CVE/blob/main/CVE-2022-36736 -CVE-2022-36755 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36756 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-36759 - https://hackmd.io/@hieuleuxuan/OFOS_Sql_Injection -CVE-2022-3677 - https://wpscan.com/vulnerability/5a7c6367-a3e6-4411-8865-2a9dbc9f1450 -CVE-2022-36788 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 -CVE-2022-3679 - https://wpscan.com/vulnerability/ec4b9bf7-71d6-4528-9dd1-cc7779624760 -CVE-2022-36804 - http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html -CVE-2022-36804 - http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html -CVE-2022-36879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901 -CVE-2022-3688 - https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848 -CVE-2022-3689 - https://wpscan.com/vulnerability/e9c551a3-7482-4421-8197-5886d028776c -CVE-2022-3690 - https://wpscan.com/vulnerability/725f6ae4-7ec5-4d7c-9533-c9b61b59cc2b -CVE-2022-3691 - https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560 -CVE-2022-3694 - https://wpscan.com/vulnerability/ad12bab7-9baf-4646-a93a-0d3286407c1e -CVE-2022-36943 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-vgvw-6xcf-qqfc -CVE-2022-37030 - http://www.openwall.com/lists/oss-security/2022/08/04/1 -CVE-2022-37030 - https://bugzilla.suse.com/show_bug.cgi?id=1201949 -CVE-2022-37035 - https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing -CVE-2022-37035 - https://github.com/FRRouting/frr/issues/11698 -CVE-2022-3704 - https://github.com/rails/rails/issues/46244 -CVE-2022-37042 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html -CVE-2022-37047 - https://github.com/appneta/tcpreplay/issues/734 -CVE-2022-37048 - https://github.com/appneta/tcpreplay/issues/735 -CVE-2022-37049 - https://github.com/appneta/tcpreplay/issues/736 -CVE-2022-3705 - http://seclists.org/fulldisclosure/2023/Jan/19 -CVE-2022-37050 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274 -CVE-2022-37051 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276 -CVE-2022-37052 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278 -CVE-2022-37055 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37056 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37057 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37060 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html -CVE-2022-37060 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php -CVE-2022-37061 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html -CVE-2022-37061 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html -CVE-2022-37061 - http://packetstormsecurity.com/files/169701/FLIR-AX8-1.46.16-Remote-Command-Injection.html -CVE-2022-37061 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5491.php -CVE-2022-37062 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html -CVE-2022-37063 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html -CVE-2022-37066 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/15 -CVE-2022-37067 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/17 -CVE-2022-37068 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/14 -CVE-2022-37069 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/12 -CVE-2022-37070 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/19 -CVE-2022-37071 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/18 -CVE-2022-37072 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/16 -CVE-2022-37073 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/13 -CVE-2022-37074 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/11 -CVE-2022-37075 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/7 -CVE-2022-37076 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/4 -CVE-2022-37077 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/9 -CVE-2022-37078 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6 -CVE-2022-37079 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/5 -CVE-2022-37080 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/8 -CVE-2022-37081 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/2 -CVE-2022-37082 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3 -CVE-2022-37083 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/1 -CVE-2022-37084 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/10 -CVE-2022-37085 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/9 -CVE-2022-37086 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/3 -CVE-2022-37087 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/6 -CVE-2022-37088 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/4 -CVE-2022-37089 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/2 -CVE-2022-37090 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/8 -CVE-2022-37091 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/10 -CVE-2022-37092 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/5 -CVE-2022-37093 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/1 -CVE-2022-37094 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/7 -CVE-2022-37095 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/16 -CVE-2022-37096 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/11 -CVE-2022-37097 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/13 -CVE-2022-37098 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12 -CVE-2022-37099 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/14 -CVE-2022-37100 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/15 -CVE-2022-37109 - http://packetstormsecurity.com/files/171478/Raspberry-Pi-Camera-Server-1.0-Authentication-Bypass.html -CVE-2022-37109 - https://medium.com/@elias.hohl/authentication-bypass-vulnerability-in-camp-a-raspberry-pi-camera-server-477e5d270904 -CVE-2022-37122 - https://packetstormsecurity.com/files/167684/ -CVE-2022-37122 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5709.php -CVE-2022-37123 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2userconfig_cgi/readme.md -CVE-2022-37123 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37125 - https://github.com/z1r00/IOT_Vul/tree/main/dlink/Dir816/form2systime_cgi -CVE-2022-37125 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37128 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/wizard_end/readme.md -CVE-2022-37128 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37129 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md -CVE-2022-37129 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37130 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis -CVE-2022-37130 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md -CVE-2022-37130 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37133 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/doReboot/readme.md -CVE-2022-37133 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37134 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2Wan_cgi/readme.md -CVE-2022-37134 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-37137 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney -CVE-2022-37138 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md -CVE-2022-37139 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md -CVE-2022-37140 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney -CVE-2022-37149 - https://github.com/fxc233/iot-vul/blob/main/WAVLINK/WN575A3/Readme.md -CVE-2022-37155 - https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.2/SPIP_4.1.2_AUTH_RCE/SPIP_4.1.2_AUTH_RCE_Abyss_Watcher_12_07_22.md -CVE-2022-37155 - https://spawnzii.github.io/posts/2022/07/how-we-have-pwned-root-me-in-2022/ -CVE-2022-37159 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/rce/rce_file_upload.md -CVE-2022-37160 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/csrf/csrf.md -CVE-2022-37161 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/svg_xss/svg_xss.md -CVE-2022-37162 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/calendar_xss/calendar_xss.md -CVE-2022-37175 - https://www.cnblogs.com/Amalll/p/16527552.html -CVE-2022-37176 - https://drive.google.com/drive/folders/1L6ojSooP8sbZLQYRsAxlb0IWVAZef8Z7?usp=sharing -CVE-2022-37183 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Piwigo/2022/12.3.0 -CVE-2022-37184 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Garage-Management-System-1.0-SFU -CVE-2022-37191 - https://github.com/CuppaCMS/CuppaCMS/issues/20 -CVE-2022-37191 - https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability -CVE-2022-37197 - https://www.exploit-db.com/exploits/51029 -CVE-2022-3720 - https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5 -CVE-2022-37201 - https://github.com/AgainstTheLight/CVE-2022-37201/blob/main/README.md -CVE-2022-37201 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql4.md -CVE-2022-37202 - https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md -CVE-2022-37202 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md -CVE-2022-37203 - https://github.com/AgainstTheLight/CVE-2022-37203/blob/main/README.md -CVE-2022-37203 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md -CVE-2022-37204 - https://github.com/AgainstTheLight/CVE-2022-37204/blob/main/README.md -CVE-2022-37204 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md -CVE-2022-37205 - https://github.com/AgainstTheLight/CVE-2022-37205/blob/main/README.md -CVE-2022-37205 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql8.md -CVE-2022-37207 - https://github.com/AgainstTheLight/CVE-2022-37207/blob/main/README.md -CVE-2022-37207 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql10.md -CVE-2022-37208 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql5.md -CVE-2022-37209 - https://github.com/AgainstTheLight/CVE-2022-37209/tree/main -CVE-2022-37209 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md -CVE-2022-3721 - https://huntr.dev/bounties/a3c506f0-5f8a-4eaa-b8cc-46fb9e35cf7a -CVE-2022-37237 - https://github.com/ZLMediaKit/ZLMediaKit/issues/1839 -CVE-2022-3725 - https://gitlab.com/wireshark/wireshark/-/issues/18378 -CVE-2022-37253 - https://packetstormsecurity.com/files/167875/Crime-Reporting-System-1.0-Cross-Site-Scripting.html -CVE-2022-37255 - http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html -CVE-2022-37292 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/1 -CVE-2022-37298 - https://github.com/dbyio/cve-2022-37298 -CVE-2022-3730 - https://vuldb.com/?id.212412 -CVE-2022-37301 - https://www.se.com/us/en/download/document/SEVD-2022-221-02/ -CVE-2022-37306 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html -CVE-2022-37307 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37308 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37309 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37310 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37311 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37312 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37313 - https://seclists.org/fulldisclosure/2022/Nov/18 -CVE-2022-37326 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 -CVE-2022-37331 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672 -CVE-2022-37332 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1602 -CVE-2022-37337 - https://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187 -CVE-2022-37337 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596 -CVE-2022-3739 - https://wpscan.com/vulnerability/b9f39ced-1e0f-4559-b861-39ddcbcd1249/ -CVE-2022-37393 - https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis -CVE-2022-37400 - https://www.openoffice.org/security/cves/CVE-2022-37400.html -CVE-2022-37401 - https://www.openoffice.org/security/cves/CVE-2022-37401.html -CVE-2022-3741 - https://huntr.dev/bounties/46f6e07e-f438-4540-938a-510047f987d0 -CVE-2022-37415 - https://gist.github.com/alfarom256/220cb75816ca2b5556e7fc8d8d2803a0 -CVE-2022-37416 - https://issuetracker.google.com/issues/231026247 -CVE-2022-37424 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/ -CVE-2022-37425 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/ -CVE-2022-37426 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/ -CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/37 -CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/38 -CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/41 -CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/42 -CVE-2022-37434 - https://github.com/ivd38/zlib_overflow -CVE-2022-37450 - https://medium.com/@aviv.yaish/uncle-maker-time-stamping-out-the-competition-in-ethereum-d27c1cb62fef -CVE-2022-37454 - https://mouha.be/sha-3-buffer-overflow/ -CVE-2022-37461 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=30693 -CVE-2022-37462 - https://www.campusguard.com/post/going-beyond-pen-testing-to-identify-zero-day-exploits -CVE-2022-3747 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt -CVE-2022-3750 - https://wpscan.com/vulnerability/5019db80-0356-497d-b488-a26a5de78676 -CVE-2022-3751 - https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9 -CVE-2022-3753 - https://wpscan.com/vulnerability/8e88a5b9-6f1d-40de-99fc-8e1e66646c2b -CVE-2022-3754 - https://huntr.dev/bounties/f4711d7f-1368-48ab-9bef-45f32e356c47 -CVE-2022-37599 - https://github.com/webpack/loader-utils/issues/216 -CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212 -CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884 -CVE-2022-37601 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 -CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L11 -CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L16 -CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436 -CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 -CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 -CVE-2022-3762 - https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac -CVE-2022-3763 - https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f -CVE-2022-3764 - https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/ -CVE-2022-3765 - https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d -CVE-2022-3766 - https://huntr.dev/bounties/d9666520-4ff5-43bb-aacf-50c8e5570983 -CVE-2022-37661 - http://packetstormsecurity.com/files/168336/SmartRG-Router-2.6.13-Remote-Code-Execution.html -CVE-2022-37661 - http://packetstormsecurity.com/files/169816/SmartRG-Router-SR510n-2.6.13-Remote-Code-Execution.html -CVE-2022-37661 - https://packetstormsecurity.com/files/cve/CVE-2022-37661 -CVE-2022-3768 - https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/ -CVE-2022-3768 - https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3 -CVE-2022-3769 - https://bulletin.iese.de/post/owm-weather_5-6-8/ -CVE-2022-3769 - https://wpscan.com/vulnerability/2f9ffc1e-c8a9-47bb-a76b-d043c93e63f8 -CVE-2022-37700 - https://medium.com/@sc0p3hacker/cve-2022-37700-directory-transversal-in-zentao-easy-soft-alm-2573c1f0fc21 -CVE-2022-37703 - https://github.com/MaherAzzouzi/CVE-2022-37703 -CVE-2022-37704 - https://github.com/MaherAzzouzi/CVE-2022-37704 -CVE-2022-37705 - https://github.com/MaherAzzouzi/CVE-2022-37705 -CVE-2022-37706 - https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit -CVE-2022-37709 - https://github.com/fmsh-seclab/TesMla -CVE-2022-37709 - https://youtu.be/cPhYW5FzA9A -CVE-2022-37718 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html -CVE-2022-37719 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html -CVE-2022-37731 - https://github.com/whiex/webvue2/blob/gh-pages/ftcmsxss.md -CVE-2022-3774 - http://packetstormsecurity.com/files/169604/Train-Scheduler-App-1.0-Insecure-Direct-Object-Reference.html -CVE-2022-3774 - https://github.com/rohit0x5/poc/blob/main/idor -CVE-2022-3774 - https://vuldb.com/?id.212504 -CVE-2022-37768 - https://github.com/thorfdbg/libjpeg/issues/77 -CVE-2022-37769 - https://github.com/thorfdbg/libjpeg/issues/78 -CVE-2022-37770 - https://github.com/thorfdbg/libjpeg/issues/79 -CVE-2022-37771 - https://packetstormsecurity.com/files/167913/IObit-Malware-Fighter-9.2-Tampering-Privilege-Escalation.html -CVE-2022-37775 - http://genesys.com -CVE-2022-37775 - http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html -CVE-2022-37781 - https://github.com/nu774/fdkaac/issues/54 -CVE-2022-37794 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md -CVE-2022-37797 - https://redmine.lighttpd.net/issues/3165 -CVE-2022-37798 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5 -CVE-2022-37799 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/2 -CVE-2022-37800 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/7 -CVE-2022-37801 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/9 -CVE-2022-37802 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/6 -CVE-2022-37803 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/8 -CVE-2022-37804 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3 -CVE-2022-37805 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/1 -CVE-2022-37806 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/4 -CVE-2022-37807 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/10 -CVE-2022-37808 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/15 -CVE-2022-37809 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/11 -CVE-2022-37810 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/19 -CVE-2022-37811 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/17 -CVE-2022-37812 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12 -CVE-2022-37813 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/16 -CVE-2022-37814 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/14 -CVE-2022-37815 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/18 -CVE-2022-37816 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/13 -CVE-2022-37817 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/4 -CVE-2022-37818 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/2 -CVE-2022-37819 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/7 -CVE-2022-37820 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/8 -CVE-2022-37821 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/6 -CVE-2022-37822 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/3 -CVE-2022-37823 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/1 -CVE-2022-37824 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/5 -CVE-2022-37839 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/5.md -CVE-2022-3784 - https://github.com/axiomatic-systems/Bento4/issues/806 -CVE-2022-3784 - https://vuldb.com/?id.212563 -CVE-2022-37840 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/3.md -CVE-2022-37842 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/1.md -CVE-2022-37843 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/4.md -CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip -CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/issues/780 -CVE-2022-37956 - http://packetstormsecurity.com/files/168723/Windows-Kernel-Registry-Subkey-Lists-Integer-Overflow.html -CVE-2022-3797 - https://vuldb.com/?id.212633 -CVE-2022-3798 - https://github.com/IBAX-io/go-ibax/issues/2060 -CVE-2022-37988 - http://packetstormsecurity.com/files/169731/Windows-Kernel-Registry-Use-After-Free.html -CVE-2022-3799 - https://github.com/IBAX-io/go-ibax/issues/2060 -CVE-2022-37991 - http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html -CVE-2022-3800 - https://github.com/IBAX-io/go-ibax/issues/2061 -CVE-2022-3801 - https://github.com/IBAX-io/go-ibax/issues/2062 -CVE-2022-3802 - https://github.com/IBAX-io/go-ibax/issues/2063 -CVE-2022-38037 - http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html -CVE-2022-38038 - http://packetstormsecurity.com/files/169805/Windows-Kernel-Long-Registry-Path-Memory-Corruption.html -CVE-2022-38060 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589 -CVE-2022-38065 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599 -CVE-2022-38066 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615 -CVE-2022-3807 - https://vuldb.com/?id.212660 -CVE-2022-38072 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 -CVE-2022-38088 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609 -CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip -CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/issues/779 -CVE-2022-38096 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2073 -CVE-2022-38097 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601 -CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip -CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/issues/779 -CVE-2022-38105 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1590 -CVE-2022-38108 - http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html -CVE-2022-3811 - https://wpscan.com/vulnerability/262924da-e269-4008-a24f-9f26a033b23e -CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip -CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/issues/792 -CVE-2022-38123 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-38124 - https://www.secomea.com/support/cybersecurity-advisory/ -CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip -CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/issues/792 -CVE-2022-3813 - https://vuldb.com/?id.212679 -CVE-2022-38131 - https://support.posit.co/hc/en-us/articles/10983374992023 -CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip -CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/issues/792 -CVE-2022-3814 - https://vuldb.com/?id.212680 -CVE-2022-38143 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630 -CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip -CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/issues/792 -CVE-2022-38152 - http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html -CVE-2022-38152 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ -CVE-2022-38153 - http://packetstormsecurity.com/files/170605/wolfSSL-5.3.0-Denial-Of-Service.html -CVE-2022-38153 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ -CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip -CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/issues/792 -CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip -CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/issues/792 -CVE-2022-38171 - https://github.com/jeffssh/CVE-2021-30860 -CVE-2022-38176 - https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation -CVE-2022-38181 - http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html -CVE-2022-38181 - https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ -CVE-2022-38183 - https://herolab.usd.de/security-advisories/usd-2022-0015/ -CVE-2022-38201 - https://www.esri.com/arcgis-blog/products/product/uncategorized/portal-for-arcgis-quick-capture-security-patch-is-now-available -CVE-2022-3822 - https://wpscan.com/vulnerability/48ec2e4a-0190-4f36-afd1-d5799ba28c13 -CVE-2022-38222 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42320 -CVE-2022-38223 - https://github.com/tats/w3m/issues/242 -CVE-2022-3823 - https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e -CVE-2022-3824 - https://wpscan.com/vulnerability/3ca6d724-cd79-4e07-b8d0-a8c1688abf16 -CVE-2022-38256 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005 -CVE-2022-38258 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-3828 - https://wpscan.com/vulnerability/4188ed01-b64b-4aba-a215-e8dc5b308486 -CVE-2022-3829 - https://wpscan.com/vulnerability/684941ad-541f-43f9-a7ef-d26c0f4e6e21/ -CVE-2022-38295 - https://github.com/CuppaCMS/CuppaCMS/issues/34 -CVE-2022-38296 - https://github.com/CuppaCMS/CuppaCMS/issues/33 -CVE-2022-3830 - https://wpscan.com/vulnerability/98b2321d-fb66-4e02-9906-63af7b08d647 -CVE-2022-38305 - https://github.com/MegaTKC/AeroCMS/issues/3 -CVE-2022-38306 - https://github.com/lief-project/LIEF/issues/763 -CVE-2022-38307 - https://github.com/lief-project/LIEF/issues/764 -CVE-2022-38308 - https://github.com/WhoisZkuan/TOTOlink-A700RU -CVE-2022-38309 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/4 -CVE-2022-3831 - https://wpscan.com/vulnerability/fa23bd68-69f3-440e-902c-a3bb6c8a40b8 -CVE-2022-38310 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/6 -CVE-2022-38311 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/5 -CVE-2022-38312 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/3 -CVE-2022-38313 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/2 -CVE-2022-38314 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/1 -CVE-2022-3832 - https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92 -CVE-2022-38325 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_expandDlnaFile.md -CVE-2022-38326 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_NatStaticSetting.md -CVE-2022-38329 - https://albert5888.github.io/posts/CVE-2022-38329/ -CVE-2022-38329 - https://github.com/albert5888/CVE-Issues/blob/main/CVE-2022-38329/file.md -CVE-2022-38329 - https://github.com/zhangqiquan/shopxian_cms/issues/4 -CVE-2022-3833 - https://wpscan.com/vulnerability/41096d40-83d4-40b4-9632-afef51e8b00e -CVE-2022-38334 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42122 -CVE-2022-38335 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting -CVE-2022-3834 - https://wpscan.com/vulnerability/1dbe0f24-b757-49fe-846f-7c259df9f361 -CVE-2022-38349 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282 -CVE-2022-3835 - https://wpscan.com/vulnerability/514ffd28-f2c2-4c95-87b5-d05ce0746f89 -CVE-2022-38351 - https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/ -CVE-2022-38357 - https://www.tenable.com/security/research/tra-2022-29 -CVE-2022-38358 - https://www.tenable.com/security/research/tra-2022-29 -CVE-2022-38359 - https://www.tenable.com/security/research/tra-2022-29 -CVE-2022-3836 - https://wpscan.com/vulnerability/64e144fb-aa9f-4cfe-9c44-a4e1fa2e8dd5/ -CVE-2022-38368 - https://docs.aviatrix.com/HowTos/PSIRT_Advisories.html#aviatrix-controller-and-gateways-unauthorized-access -CVE-2022-3837 - https://wpscan.com/vulnerability/8554ca79-5a4b-49df-a75f-5faa4136bb8c -CVE-2022-3838 - https://wpscan.com/vulnerability/2dc82bd7-651f-4af0-ad2a-c20a38eea0d0 -CVE-2022-3839 - https://wpscan.com/vulnerability/809cea63-9dbe-495c-8388-e294299d3e90 -CVE-2022-38393 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1592 -CVE-2022-3840 - https://wpscan.com/vulnerability/71414436-ef54-4ce6-94e2-62e68d1a371d -CVE-2022-38451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642 -CVE-2022-38452 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1595 -CVE-2022-38457 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2074 -CVE-2022-38458 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1598 -CVE-2022-38459 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608 -CVE-2022-3846 - https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af -CVE-2022-3847 - https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/ -CVE-2022-3847 - https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6 -CVE-2022-38473 - https://bugzilla.mozilla.org/show_bug.cgi?id=1771685 -CVE-2022-3848 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_2/ -CVE-2022-3848 - https://wpscan.com/vulnerability/da1f0313-2576-490e-a95f-bf12de340610 -CVE-2022-38488 - https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example -CVE-2022-3849 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_3/ -CVE-2022-3849 - https://wpscan.com/vulnerability/511327d3-499b-4ad9-8fd3-99f9f7deb4f5 -CVE-2022-38495 - https://github.com/lief-project/LIEF/issues/767 -CVE-2022-38496 - https://github.com/lief-project/LIEF/issues/765 -CVE-2022-38497 - https://github.com/lief-project/LIEF/issues/766 -CVE-2022-3850 - https://wpscan.com/vulnerability/8ae42ec0-7e3a-4ea5-8e76-0aae7b92a8e9 -CVE-2022-38510 - https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md -CVE-2022-38511 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A810R/downloadFile.md -CVE-2022-38528 - https://github.com/assimp/assimp/issues/4662 -CVE-2022-38529 - https://github.com/syoyo/tinyexr/issues/169 -CVE-2022-3853 - https://wpscan.com/vulnerability/c2bc7d23-5bfd-481c-b42b-da7ee80d9514 -CVE-2022-38530 - https://github.com/gpac/gpac/issues/2216 -CVE-2022-38532 - https://github.com/nam3lum/msi-central_privesc -CVE-2022-38534 - https://github.com/Jfox816/TOTOLINK-720R/blob/fb6ba109ba9c5bd1b0d8e22c88ee14bdc4a75e6b/TOTOLINK%20720%20RCode%20Execution.md -CVE-2022-38535 - https://github.com/Jfox816/TOTOLINK-720R/blob/177ee39a5a8557a6bd19586731b0e624548b67ee/totolink%20720%20RCode%20Execution2.md -CVE-2022-3855 - https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb -CVE-2022-38553 - https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md -CVE-2022-38555 - https://github.com/xxy1126/Vuln/tree/main/1 -CVE-2022-38556 - https://github.com/xxy1126/Vuln/tree/main/2 -CVE-2022-38557 - https://github.com/xxy1126/Vuln/tree/main/3 -CVE-2022-38557 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-3856 - https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ -CVE-2022-3856 - https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 -CVE-2022-38562 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_lan -CVE-2022-38563 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_Mac -CVE-2022-38564 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetPicListItem -CVE-2022-38565 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailpwd -CVE-2022-38566 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailname -CVE-2022-38567 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetAdConfigInfo_ -CVE-2022-38568 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_hostname -CVE-2022-38569 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelAd -CVE-2022-3857 - https://sourceforge.net/p/libpng/bugs/300/ -CVE-2022-38570 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelPushedAd -CVE-2022-38571 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem -CVE-2022-38573 - https://packetstormsecurity.com -CVE-2022-38573 - https://packetstormsecurity.com/files/168133/10-Strike-Network-Inventory-Explorer-9.3-Buffer-Overflow.html -CVE-2022-38577 - http://packetstormsecurity.com/files/168427/ProcessMaker-Privilege-Escalation.html -CVE-2022-3858 - https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec -CVE-2022-38580 - http://packetstormsecurity.com/files/171546/X-Skipper-Proxy-0.13.237-Server-Side-Request-Forgery.html -CVE-2022-38582 - https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30 -CVE-2022-3859 - https://kcm.trellix.com/corporate/index?page=content&id=SB10391 -CVE-2022-38599 - https://gist.github.com/arleyna/20d858e11c48984d00926fa8cc0c2722 -CVE-2022-3860 - https://wpscan.com/vulnerability/d99ce21f-fbb6-429c-aa3b-19c4a5eb7557 -CVE-2022-38604 - https://github.com/LucaBarile/CVE-2022-38604 -CVE-2022-38604 - https://lucabarile.github.io/Blog/CVE-2022-38604/index.html -CVE-2022-3861 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt -CVE-2022-38611 - https://gist.github.com/dru1d-foofus/835423de77c3522d53b9e7bdf5a28dfe -CVE-2022-3862 - https://wpscan.com/vulnerability/3db9a8f5-3335-4b8d-a067-091cbfed1efc -CVE-2022-38621 - https://github.com/Doufox/Doufox/issues/7 -CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.txt -CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.yaml -CVE-2022-38628 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt -CVE-2022-38637 - https://www.youtube.com/watch?v=m8nW0p69UHU -CVE-2022-3865 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_1/ -CVE-2022-3865 - https://wpscan.com/vulnerability/fbe4aed8-964a-4774-bbc3-d432792bfeb6 -CVE-2022-38668 - https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.md -CVE-2022-38668 - https://gynvael.coldwind.pl/?id=752 -CVE-2022-3869 - https://huntr.dev/bounties/7de20f21-4a9b-445d-ae2b-15ade648900b -CVE-2022-38715 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1610 -CVE-2022-3873 - https://huntr.dev/bounties/52a4085e-b687-489b-9ed6-f0987583ed77 -CVE-2022-38730 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 -CVE-2022-38745 - https://www.openoffice.org/security/cves/CVE-2022-38745.html -CVE-2022-3875 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-3875 - https://vuldb.com/?id.216244 -CVE-2022-38756 - http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html -CVE-2022-38756 - http://seclists.org/fulldisclosure/2023/Jan/28 -CVE-2022-3876 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-3876 - https://vuldb.com/?id.216245 -CVE-2022-38766 - https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 -CVE-2022-3877 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-38774 - https://www.elastic.co/community/security -CVE-2022-38775 - https://www.elastic.co/community/security -CVE-2022-38777 - https://www.elastic.co/community/security -CVE-2022-38778 - https://www.elastic.co/community/security -CVE-2022-38779 - https://www.elastic.co/community/security -CVE-2022-3878 - https://vuldb.com/?id.213039 -CVE-2022-38784 - https://github.com/jeffssh/CVE-2021-30860 -CVE-2022-3879 - https://wpscan.com/vulnerability/0db1762e-1401-4006-88ed-d09a4bc6585b -CVE-2022-38796 - https://www.youtube.com/watch?v=k8dp0FJnSsI -CVE-2022-3880 - https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14e -CVE-2022-38808 - https://github.com/cloudwebsoft/ywoa/issues/26 -CVE-2022-3881 - https://wpscan.com/vulnerability/c2a9cf01-051a-429a-82ca-280885114b5a -CVE-2022-38813 - https://drive.google.com/file/d/1iMswKzoUvindXUGh1cuAmi-0R84tLDaH/view?usp=sharing -CVE-2022-38813 - https://github.com/RashidKhanPathan/CVE-2022-38813 -CVE-2022-38813 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0 -CVE-2022-38814 - https://packetstormsecurity.com/files/168065/Fiberhome-AN5506-02-B-Cross-Site-Scripting.html -CVE-2022-3882 - https://wpscan.com/vulnerability/a39c643f-eaa4-4c71-b75d-2c4fe34ac875 -CVE-2022-38826 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setStaticDhcpRules_1.md -CVE-2022-38827 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_2.md -CVE-2022-38828 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_1.md -CVE-2022-38829 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md -CVE-2022-3883 - https://wpscan.com/vulnerability/8695b157-abac-4aa6-a022-e3ae41c03544 -CVE-2022-38830 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md -CVE-2022-38831 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/SetNetControlList.md -CVE-2022-38840 - http://packetstormsecurity.com/files/171439/MAN-EAM-0003-3.2.4-XML-Injection.html -CVE-2022-38841 - http://packetstormsecurity.com/files/171433/Linksys-AX3200-1.1.00-Command-Injection.html -CVE-2022-38843 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-unrestricted-file-upload-7860b15d12bc -CVE-2022-38844 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76 -CVE-2022-38846 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-missing-secure-flag-1664bac5ffe4 -CVE-2022-38867 - https://github.com/zhaojh329/rttys/issues/117 -CVE-2022-38868 - https://github.com/seccome/Ehoney/issues/59 -CVE-2022-38873 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-38890 - https://github.com/nginx/njs/issues/569 -CVE-2022-3891 - https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1 -CVE-2022-3892 - https://wpscan.com/vulnerability/33dddaec-a32a-4fce-89d6-164565be13e1 -CVE-2022-38922 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md -CVE-2022-38923 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md -CVE-2022-38928 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421 -CVE-2022-38931 - https://github.com/zer0yu/CVE_Request/blob/master/baijiacms/baijiacmsv4_ssrf.md -CVE-2022-38932 - https://github.com/klange/toaruos/issues/243 -CVE-2022-38934 - https://github.com/klange/toaruos/issues/244 -CVE-2022-38935 - https://github.com/yourkevin/NiterForum/issues/25 -CVE-2022-38936 - https://github.com/cloudwu/pbc/issues/158 -CVE-2022-3894 - https://wpscan.com/vulnerability/298487b2-4141-4c9f-9bb2-e1450aefc1a8 -CVE-2022-38970 - https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/ -CVE-2022-3899 - https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/ -CVE-2022-3900 - https://wpscan.com/vulnerability/c969c4bc-82d7-46a0-88ba-e056c0b27de7 -CVE-2022-39013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39028 - https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html -CVE-2022-3904 - https://wpscan.com/vulnerability/244d9ef1-335c-4f65-94ad-27c0c633f6ad -CVE-2022-39045 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1611 -CVE-2022-39046 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html -CVE-2022-39046 - http://seclists.org/fulldisclosure/2024/Feb/3 -CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/6 -CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/8 -CVE-2022-3906 - https://wpscan.com/vulnerability/fee8652d-cd50-4cb0-b94d-2d124f56af1a -CVE-2022-3907 - https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c -CVE-2022-3908 - https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505 -CVE-2022-3909 - https://wpscan.com/vulnerability/8d57a534-7630-491a-a0fd-90430f85ae78 -CVE-2022-3911 - https://wpscan.com/vulnerability/c47fdca8-74ac-48a4-9780-556927fb4e52 -CVE-2022-3912 - https://wpscan.com/vulnerability/968c677c-1beb-459b-8fd1-7f70bcaa4f74 -CVE-2022-3915 - https://wpscan.com/vulnerability/fd416d99-1970-418f-81f5-8438490d4479 -CVE-2022-39164 - https://www.ibm.com/support/pages/node/6847947 -CVE-2022-39165 - https://www.ibm.com/support/pages/node/6847947 -CVE-2022-39170 - https://github.com/davea42/libdwarf-code/issues/132 -CVE-2022-39172 - https://sec-consult.com/vulnerability-lab/advisory/stored-cross-site-scripting-in-mb-support-broker-management-solution-openviva-c2/ -CVE-2022-39173 - http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html -CVE-2022-39173 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ -CVE-2022-39188 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 -CVE-2022-39189 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17 -CVE-2022-3919 - https://wpscan.com/vulnerability/fe2f1d52-8421-4b46-b829-6953a0472dcb -CVE-2022-39190 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6 -CVE-2022-39195 - https://packetstormsecurity.com/2301-exploits/listserv17-xss.txt -CVE-2022-39197 - https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/ -CVE-2022-39197 - https://www.cobaltstrike.com/blog/tag/release/ -CVE-2022-3921 - https://wpscan.com/vulnerability/e39b59b0-f24f-4de5-a21c-c4de34c3a14f -CVE-2022-3922 - https://wpscan.com/vulnerability/78054bd7-cdc2-4b14-9b5c-30f10e802d6b -CVE-2022-3923 - https://wpscan.com/vulnerability/6536946a-7ebf-4f8f-9446-36ec2a2a3ad2 -CVE-2022-3925 - https://bulletin.iese.de/post/buddybadges_1-0-0/ -CVE-2022-3925 - https://wpscan.com/vulnerability/178499a3-97d1-4ab2-abbe-4a9d2ebc85da -CVE-2022-3926 - https://wpscan.com/vulnerability/e1fcde2a-91a5-40cb-876b-884f01c80336 -CVE-2022-39261 - https://www.drupal.org/sa-core-2022-016 -CVE-2022-39262 - https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/ -CVE-2022-39276 - https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/ -CVE-2022-39277 - https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/ -CVE-2022-39285 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html -CVE-2022-39288 - https://github.com/fastify/fastify/security/policy -CVE-2022-39290 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html -CVE-2022-39291 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html -CVE-2022-39299 - http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html -CVE-2022-3930 - https://wpscan.com/vulnerability/8728d02a-51db-4447-a843-0264b6ceb413 -CVE-2022-39305 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2 -CVE-2022-39321 - https://github.com/actions/runner/pull/2108 -CVE-2022-3933 - https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4 -CVE-2022-3934 - https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a -CVE-2022-3935 - https://wpscan.com/vulnerability/906c5122-dd6d-494b-b66c-4162e234ea05 -CVE-2022-3936 - https://wpscan.com/vulnerability/921daea1-a06d-4310-8bd9-4db32605e500 -CVE-2022-3937 - https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af -CVE-2022-39399 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39400 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39401 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39402 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39403 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39404 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39405 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39406 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39407 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39408 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39409 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39410 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39411 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39412 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39417 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39419 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39420 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39421 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39422 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39423 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39424 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39425 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39426 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39427 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39428 - https://www.oracle.com/security-alerts/cpuoct2022.html -CVE-2022-39429 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2022-3944 - https://github.com/jerryhanjj/ERP/issues/3 -CVE-2022-3945 - https://huntr.dev/bounties/55cd91b3-1d94-4d34-8d7f-86660b41fd65 -CVE-2022-3946 - https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0 -CVE-2022-3955 - https://github.com/tholum/crm42/issues/1 -CVE-2022-3956 - https://github.com/tsruban/HHIMS/issues/1 -CVE-2022-3961 - https://wpscan.com/vulnerability/6aad6454-de1b-4304-9c14-05e28d08b253 -CVE-2022-3972 - https://github.com/Pingkon/HMS-PHP/issues/1 -CVE-2022-3973 - https://github.com/Pingkon/HMS-PHP/issues/1 -CVE-2022-3973 - https://vuldb.com/?id.213552 -CVE-2022-3974 - https://github.com/axiomatic-systems/Bento4/issues/812 -CVE-2022-3977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89 -CVE-2022-39799 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39800 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39801 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39802 - http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html -CVE-2022-39802 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39803 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39804 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39805 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39806 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39807 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39808 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-39809 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-3981 - https://wpscan.com/vulnerability/78054d08-0227-426c-903d-d146e0919028 -CVE-2022-39810 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39811 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39812 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39813 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39814 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39815 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39816 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39817 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39818 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39819 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-3982 - https://wpscan.com/vulnerability/4d91f3e1-4de9-46c1-b5ba-cc55b7726867 -CVE-2022-39820 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39821 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39822 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-39824 - https://github.com/FCncdn/Appsmith-Js-Injection-POC -CVE-2022-3983 - https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1 -CVE-2022-39831 - https://savannah.gnu.org/bugs/?62977 -CVE-2022-39832 - https://savannah.gnu.org/bugs/index.php?63000 -CVE-2022-39833 - https://gist.github.com/DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c -CVE-2022-39836 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ -CVE-2022-39836 - https://seclists.org/fulldisclosure/2022/Sep/24 -CVE-2022-39837 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ -CVE-2022-39837 - https://seclists.org/fulldisclosure/2022/Sep/24 -CVE-2022-39838 - https://github.com/jet-pentest/CVE-2022-39838 -CVE-2022-39839 - https://github.com/Cotonti/Cotonti/issues/1661 -CVE-2022-3984 - https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa -CVE-2022-39840 - https://github.com/Cotonti/Cotonti/issues/1660 -CVE-2022-39842 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 -CVE-2022-3985 - https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc -CVE-2022-3986 - https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a -CVE-2022-3987 - https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29 -CVE-2022-3989 - https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091 -CVE-2022-3993 - https://huntr.dev/bounties/bebd0cd6-18ec-469c-b6ca-19ffa9db0699 -CVE-2022-3994 - https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa -CVE-2022-39960 - https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e -CVE-2022-39974 - https://github.com/wasm3/wasm3/issues/379 -CVE-2022-3998 - https://github.com/MonikaBrzica/scm/issues/1 -CVE-2022-39983 - https://www.swascan.com/it/vulnerability-report-instant-developer/ -CVE-2022-39986 - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html -CVE-2022-39986 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2 -CVE-2022-39987 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2 -CVE-2022-39988 - http://packetstormsecurity.com/files/168585/Centreon-22.04.0-Cross-Site-Scripting.html -CVE-2022-3999 - https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643 -CVE-2022-4000 - https://wpscan.com/vulnerability/5563c030-bd62-4839-98e8-84bc8191e242 -CVE-2022-40005 - https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/ -CVE-2022-40005 - https://seclists.org/fulldisclosure/2022/Dec/13 -CVE-2022-40008 - https://github.com/matthiaskramm/swftools/issues/188 -CVE-2022-40009 - https://github.com/matthiaskramm/swftools/issues/190 -CVE-2022-40010 - http://packetstormsecurity.com/files/173029/Tenda-AC6-AC1200-15.03.06.50_multi-Cross-Site-Scripting.html -CVE-2022-40016 - https://github.com/ireader/media-server/issues/235 -CVE-2022-40021 - https://www.securifera.com/advisories/CVE-2022-40021/ -CVE-2022-40022 - http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html -CVE-2022-40022 - https://www.securifera.com/advisories/CVE-2022-40022/ -CVE-2022-40023 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ -CVE-2022-40032 - http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html -CVE-2022-40032 - https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated -CVE-2022-4004 - https://wpscan.com/vulnerability/6a3bcfb3-3ede-459d-969f-b7b30dafd098 -CVE-2022-40043 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/ -CVE-2022-40044 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/ -CVE-2022-4005 - https://wpscan.com/vulnerability/61d5c9b8-5c21-4ab5-b31c-e13ca19ea25c -CVE-2022-40055 - https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055 -CVE-2022-40067 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/9 -CVE-2022-40068 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/10 -CVE-2022-40069 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/6 -CVE-2022-40070 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8 -CVE-2022-40071 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/2 -CVE-2022-40072 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/7 -CVE-2022-40073 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/5 -CVE-2022-40074 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/3 -CVE-2022-40075 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/1 -CVE-2022-40076 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/4 -CVE-2022-40087 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-unauthenticated-arbitrary-file-upload-rce-44341831bec8 -CVE-2022-40087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip -CVE-2022-40088 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-xss-1f13228233a -CVE-2022-40088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip -CVE-2022-40089 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip -CVE-2022-40090 - https://gitlab.com/libtiff/libtiff/-/issues/455 -CVE-2022-4010 - https://wpscan.com/vulnerability/bed8c81c-04c7-412d-9563-ce4eb64b7754 -CVE-2022-4011 - https://vuldb.com/?id.213785 -CVE-2022-40110 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/2.md -CVE-2022-40112 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/3.md -CVE-2022-40113 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection3.md -CVE-2022-40113 - https://github.com/zakee94/online-banking-system/issues/18 -CVE-2022-40114 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection5.md -CVE-2022-40114 - https://github.com/zakee94/online-banking-system/issues/16 -CVE-2022-40115 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection1.md -CVE-2022-40115 - https://github.com/zakee94/online-banking-system/issues/10 -CVE-2022-40116 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection9.md -CVE-2022-40116 - https://github.com/zakee94/online-banking-system/issues/13 -CVE-2022-40117 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection2.md -CVE-2022-40117 - https://github.com/zakee94/online-banking-system/issues/17 -CVE-2022-40118 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection4.md -CVE-2022-40118 - https://github.com/zakee94/online-banking-system/issues/19 -CVE-2022-40119 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection6.md -CVE-2022-40119 - https://github.com/zakee94/online-banking-system/issues/11 -CVE-2022-4012 - https://github.com/golamsarwar08/hms/issues/1 -CVE-2022-4012 - https://vuldb.com/?id.213786 -CVE-2022-40120 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection7.md -CVE-2022-40120 - https://github.com/zakee94/online-banking-system/issues/14 -CVE-2022-40121 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection8.md -CVE-2022-40121 - https://github.com/zakee94/online-banking-system/issues/12 -CVE-2022-40122 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection10.md -CVE-2022-40122 - https://github.com/zakee94/online-banking-system/issues/15 -CVE-2022-40123 - https://weed-1.gitbook.io/cve/mojoportal/directory-traversal-in-mojoportal-v2.7-cve-2022-40123 -CVE-2022-40129 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1614 -CVE-2022-4013 - https://github.com/golamsarwar08/hms/issues/2 -CVE-2022-4013 - https://vuldb.com/?id.213787 -CVE-2022-40133 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2075 -CVE-2022-4014 - https://vuldb.com/?id.213788 -CVE-2022-4015 - https://github.com/shreyansh225/Sports-Club-Management-System/issues/6 -CVE-2022-4015 - https://vuldb.com/?id.213789 -CVE-2022-4016 - https://wpscan.com/vulnerability/9b77044c-fd3f-4e6f-a759-dcc3082dcbd6 -CVE-2022-4017 - https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4 -CVE-2022-4018 - https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5 -CVE-2022-4019 - https://mattermost.com/security-updates/ -CVE-2022-40220 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612 -CVE-2022-40222 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638 -CVE-2022-40224 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618 -CVE-2022-4023 - https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/ -CVE-2022-4023 - https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee -CVE-2022-40233 - https://www.ibm.com/support/pages/node/6847947 -CVE-2022-4024 - https://wpscan.com/vulnerability/a087fb45-6f6c-40ac-b48b-2cbceda86cbe -CVE-2022-40250 - https://www.binarly.io/advisories/BRLY-2022-016 -CVE-2022-40277 - https://github.com/laurent22/joplin -CVE-2022-40282 - http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html -CVE-2022-40282 - http://seclists.org/fulldisclosure/2022/Nov/19 -CVE-2022-40284 - https://github.com/tuxera/ntfs-3g/releases -CVE-2022-40297 - https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc -CVE-2022-40298 - https://www.crestron.com/Security/Security_Advisories -CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-40305 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt -CVE-2022-40306 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt -CVE-2022-40319 - https://packetstormsecurity.com/2301-exploits/listserv17-idor.txt -CVE-2022-40320 - https://github.com/libconfuse/libconfuse/issues/163 -CVE-2022-40347 - http://packetstormsecurity.com/files/171740/Intern-Record-System-1.0-SQL-Injection.html -CVE-2022-40347 - https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated -CVE-2022-40348 - https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated -CVE-2022-40357 - https://github.com/zblogcn/zblogphp/issues/336 -CVE-2022-40359 - https://cxsecurity.com/issue/WLB-2022090057 -CVE-2022-40363 - https://github.com/flipperdevices/flipperzero-firmware/pull/1697 -CVE-2022-4042 - https://wpscan.com/vulnerability/8ec76242-717d-4d2d-9c0f-3056cd7c2c90 -CVE-2022-4043 - https://wpscan.com/vulnerability/ffff8c83-0a59-450a-9b40-c7f3af7205fc -CVE-2022-40434 - https://isaghojaria.medium.com/softr-v2-0-was-discovered-to-be-vulnerable-to-html-injection-via-the-name-field-of-the-account-page-c6fbd3162254 -CVE-2022-40439 - https://github.com/axiomatic-systems/Bento4/issues/750 -CVE-2022-4044 - https://mattermost.com/security-updates/ -CVE-2022-40440 - https://github.com/SxB64/mxgraph-xss-vul/wiki -CVE-2022-40443 - https://github.com/liong007/ZZCMS/issues/1 -CVE-2022-40444 - https://github.com/liong007/ZZCMS/issues/2 -CVE-2022-4045 - https://mattermost.com/security-updates/ -CVE-2022-40469 - https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469 -CVE-2022-4047 - https://wpscan.com/vulnerability/8965a87c-5fe5-4b39-88f3-e00966ca1d94 -CVE-2022-40470 - https://drive.google.com/file/d/1UDuez2CTscdWXYzyXLi3x8CMs9IWLL11/view?usp=sharing -CVE-2022-40471 - https://drive.google.com/file/d/1m-wTfOL5gY3huaSEM3YPSf98qIrkl-TW/view?usp=sharing -CVE-2022-40471 - https://github.com/RashidKhanPathan/CVE-2022-40471 -CVE-2022-40476 - https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62 -CVE-2022-40482 - https://ephort.dk/blog/laravel-timing-attack-vulnerability/ -CVE-2022-40482 - https://github.com/ephort/laravel-user-enumeration-demo -CVE-2022-40486 - https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md -CVE-2022-40489 - https://github.com/thinkcmf/thinkcmf/issues/736 -CVE-2022-4049 - https://wpscan.com/vulnerability/9b0781e2-ad62-4308-bafc-d45b9a2472be -CVE-2022-40494 - https://blog.carrot2.cn/2022/08/cve-2022-40494.html -CVE-2022-4050 - https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f -CVE-2022-4051 - https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1 -CVE-2022-4052 - https://vuldb.com/?id.213845 -CVE-2022-4053 - https://vuldb.com/?id.213846 -CVE-2022-4057 - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af -CVE-2022-4058 - https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4 -CVE-2022-4059 - https://wpscan.com/vulnerability/d94bb664-261a-4f3f-8cc3-a2db8230895d -CVE-2022-4060 - https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e -CVE-2022-4061 - https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665 -CVE-2022-40621 - https://www.malbytes.net/2022/07/wavlink-quantum-d4g-zero-day-part-01.html -CVE-2022-40622 - https://youtu.be/cSileV8YbsQ?t=655 -CVE-2022-40623 - https://youtu.be/cSileV8YbsQ?t=1028 -CVE-2022-40624 - https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 -CVE-2022-4063 - https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7 -CVE-2022-4064 - https://github.com/petergoldstein/dalli/issues/932 -CVE-2022-4067 - https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72 -CVE-2022-4068 - https://huntr.dev/bounties/becfecc4-22a6-4f94-bf83-d6030b625fdc -CVE-2022-40684 - http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html -CVE-2022-40684 - http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html -CVE-2022-4069 - https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5 -CVE-2022-40691 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621 -CVE-2022-40693 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616 -CVE-2022-4070 - https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775 -CVE-2022-40701 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1606 -CVE-2022-40711 - https://verneet.com/cve-2022-40711/ -CVE-2022-40712 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-40713 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-40714 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-40715 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150 -CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966 -CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417 -CVE-2022-40735 - https://dheatattack.gitlab.io/ -CVE-2022-40735 - https://github.com/mozilla/ssl-config-generator/issues/162 -CVE-2022-40735 - https://ieeexplore.ieee.org/document/10374117 -CVE-2022-40735 - https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf -CVE-2022-40735 - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf -CVE-2022-40736 - https://github.com/axiomatic-systems/Bento4/issues/755 -CVE-2022-40737 - https://github.com/axiomatic-systems/Bento4/issues/756 -CVE-2022-40738 - https://github.com/axiomatic-systems/Bento4/issues/756 -CVE-2022-40755 - https://github.com/jasper-software/jasper/issues/338 -CVE-2022-40761 - https://github.com/Samsung/mTower/issues/83 -CVE-2022-40769 - https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c -CVE-2022-40774 - https://github.com/axiomatic-systems/Bento4/issues/757 -CVE-2022-40775 - https://github.com/axiomatic-systems/Bento4/issues/758 -CVE-2022-40797 - http://packetstormsecurity.com/files/169964/Roxy-Fileman-1.4.6-Remote-Shell-Upload.html -CVE-2022-40798 - https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc -CVE-2022-40839 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40839/poc.txt -CVE-2022-40840 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40840/poc.txt -CVE-2022-40841 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40841/poc.txt -CVE-2022-40842 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40842/poc.txt -CVE-2022-40843 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-40844 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-40845 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-40846 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-40847 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-40849 - https://github.com/thinkcmf/thinkcmf/issues/737 -CVE-2022-40851 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/addressNat.md -CVE-2022-40853 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/form_fast_setting_wifi_set.md -CVE-2022-40854 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md -CVE-2022-40855 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md -CVE-2022-40860 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/formSetQosBand.md -CVE-2022-40861 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/formSetQosBand.md -CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromNatStaticSetting.md -CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromNatStaticSetting.md -CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSmartPowerManagement.md -CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSmartPowerManagement.md -CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSchedWifi.md -CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSchedWifi.md -CVE-2022-40866 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/setDebugCfg.md -CVE-2022-40867 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formIPMacBindDel.md -CVE-2022-40868 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formDelDhcpRule.md -CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromDhcpListClient-list.md -CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromDhcpListClient-list.md -CVE-2022-40871 - https://github.com/youncyb/dolibarr-rce -CVE-2022-40874 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html -CVE-2022-40875 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html -CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html -CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16704071.html -CVE-2022-40877 - https://www.exploit-db.com/exploits/50725 -CVE-2022-40878 - https://www.exploit-db.com/exploits/50726 -CVE-2022-40879 - https://github.com/kekingcn/kkFileView/issues/389 -CVE-2022-4088 - https://github.com/rickxy/Stock-Management-System/issues/2 -CVE-2022-40881 - https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php -CVE-2022-40884 - https://github.com/yangfar/CVE/blob/main/CVE-2022-40884.md -CVE-2022-40887 - https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester/blob/main/Best-Student-Result-Management-System_1.0.poc.md -CVE-2022-4089 - https://github.com/rickxy/Stock-Management-System/issues/3 -CVE-2022-40890 - https://github.com/ToughRunner/Open5gs_bugreport -CVE-2022-40896 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2/ -CVE-2022-40897 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ -CVE-2022-40898 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ -CVE-2022-40899 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ -CVE-2022-4090 - https://github.com/rickxy/Stock-Management-System/issues/4 -CVE-2022-40912 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php -CVE-2022-40918 - https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368 -CVE-2022-40922 - https://github.com/lief-project/LIEF/issues/781 -CVE-2022-40923 - https://github.com/lief-project/LIEF/issues/784 -CVE-2022-4093 - https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788 -CVE-2022-40931 - https://github.com/dutchcoders/transfer.sh/issues/500 -CVE-2022-40943 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/bwdate-report-ds-sql(CVE-2022-40943).md -CVE-2022-40944 - https://caicaizi.top/archives/9/ -CVE-2022-40944 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/sales-report-ds-sql(CVE-2022-40944).md -CVE-2022-40946 - http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html -CVE-2022-40946 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4095 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73 -CVE-2022-40956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770094 -CVE-2022-40959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1782211 -CVE-2022-4096 - https://huntr.dev/bounties/7969e834-5982-456e-9683-861a7a5e2d22 -CVE-2022-40969 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607 -CVE-2022-4097 - https://wpscan.com/vulnerability/15819d33-7497-4f7d-bbb8-b3ab147806c4 -CVE-2022-40982 - https://downfall.page -CVE-2022-40983 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617 -CVE-2022-40985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40986 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40987 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-4099 - https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028 -CVE-2022-40990 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40993 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40994 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40997 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40998 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-40999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41000 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41001 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41003 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41004 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-4101 - https://wpscan.com/vulnerability/2ce4c837-c62c-41ac-95ca-54bb1a6d1eeb -CVE-2022-41010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-4102 - https://wpscan.com/vulnerability/c177f763-0bb5-4734-ba2e-7ba816578937 -CVE-2022-41020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-41029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-4103 - https://wpscan.com/vulnerability/5e1244f7-39b5-4f37-8fef-e3f35fc388f1 -CVE-2022-41030 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 -CVE-2022-4104 - https://tenable.com/security/research/TRA-2022-35 -CVE-2022-41040 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html -CVE-2022-41040 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/ -CVE-2022-4105 - https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 -CVE-2022-41057 - http://packetstormsecurity.com/files/170128/SentinelOne-sentinelagent-22.3.2.5-Privilege-Escalation.html -CVE-2022-41057 - http://packetstormsecurity.com/files/170128/Windows-HTTP.SYS-Kerberos-PAC-Verification-Bypass-Privilege-Escalation.html -CVE-2022-4106 - https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed -CVE-2022-4107 - https://wpscan.com/vulnerability/0b432858-722c-4bda-aa95-ad48e2097302 -CVE-2022-41073 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html -CVE-2022-4108 - https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470 -CVE-2022-41082 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html -CVE-2022-41082 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/ -CVE-2022-4109 - https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670 -CVE-2022-4110 - https://wpscan.com/vulnerability/037a81b2-8fd8-4898-bb5b-d15d9a38778c -CVE-2022-4111 - https://huntr.dev/bounties/5596d072-66d2-4361-8cac-101c9c781c3d -CVE-2022-4112 - https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e -CVE-2022-41128 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/ -CVE-2022-41138 - https://bugs.gentoo.org/868495 -CVE-2022-41139 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-7344-4pg9-qf45 -CVE-2022-4114 - https://wpscan.com/vulnerability/7569f4ac-05c9-43c9-95e0-5cc360524bbd -CVE-2022-41142 - https://github.com/centreon/centreon/security/policy -CVE-2022-4115 - https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4 -CVE-2022-41154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1637 -CVE-2022-41166 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41167 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-4117 - https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193 -CVE-2022-41170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41173 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41174 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41175 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41176 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41177 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41178 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41179 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-4118 - https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4 -CVE-2022-41180 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41181 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41182 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41183 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41184 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-4119 - https://wpscan.com/vulnerability/11040133-c134-4f96-8421-edd04901ed0d -CVE-2022-41190 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41191 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41192 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41193 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41194 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41195 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41196 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41197 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41198 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41199 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-4120 - https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf -CVE-2022-41200 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41201 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41202 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41203 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41204 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41205 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41206 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41207 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41208 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41209 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-4121 - https://github.com/dinhvh/libetpan/issues/420 -CVE-2022-41210 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41211 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41212 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/23/4 -CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/24/1 -CVE-2022-41221 - https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability -CVE-2022-41222 - http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html -CVE-2022-41222 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html -CVE-2022-41222 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 -CVE-2022-4124 - https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2 -CVE-2022-4125 - https://wpscan.com/vulnerability/7862084a-2821-4ef1-8d01-c9c8b3f28b05 -CVE-2022-41258 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41259 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41260 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41261 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41262 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41263 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41264 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41266 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41272 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41273 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41274 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41275 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2022-41311 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 -CVE-2022-41312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 -CVE-2022-41313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 -CVE-2022-41322 - https://bugs.gentoo.org/868543 -CVE-2022-41333 - http://packetstormsecurity.com/files/171766/FortiRecorder-6.4.3-Denial-Of-Service.html -CVE-2022-41343 - https://tantosec.com/blog/cve-2022-41343/ -CVE-2022-41352 - http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html -CVE-2022-41358 - http://packetstormsecurity.com/files/168718/Garage-Management-System-1.0-Cross-Site-Scripting.html -CVE-2022-41358 - https://cxsecurity.com/issue/WLB-2022100037 -CVE-2022-41358 - https://github.com/thecasual/CVE-2022-41358 -CVE-2022-41358 - https://vulmon.com/vulnerabilitydetails?qid=CVE-2022-41358 -CVE-2022-4136 - https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 -CVE-2022-41376 - https://alicangonullu.org/konu/138 -CVE-2022-4138 - https://gitlab.com/gitlab-org/gitlab/-/issues/383709 -CVE-2022-41392 - https://www.edoardoottavianelli.it/CVE-2022-41392/ -CVE-2022-41392 - https://www.youtube.com/watch?v=BOPLYnveBqk -CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router -CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router -CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-4140 - https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7 -CVE-2022-41401 - https://github.com/ixSly/CVE-2022-41401 -CVE-2022-41403 - https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html -CVE-2022-41404 - https://sourceforge.net/p/ini4j/bugs/56/ -CVE-2022-4141 - https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f -CVE-2022-41412 - http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html -CVE-2022-41412 - https://github.com/renmizo/CVE-2022-41412 -CVE-2022-41413 - http://packetstormsecurity.com/files/170070/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html -CVE-2022-41413 - http://packetstormsecurity.com/files/171629/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html -CVE-2022-41413 - https://github.com/renmizo/CVE-2022-41413 -CVE-2022-41415 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-41415/CVE-2022-41415.md -CVE-2022-41419 - https://github.com/axiomatic-systems/Bento4/issues/766 -CVE-2022-4142 - https://wpscan.com/vulnerability/8c2adadd-0684-49a8-9185-0c7d9581aef1 -CVE-2022-41423 - https://github.com/axiomatic-systems/Bento4/issues/767 -CVE-2022-41424 - https://github.com/axiomatic-systems/Bento4/issues/768 -CVE-2022-41425 - https://github.com/axiomatic-systems/Bento4/issues/772 -CVE-2022-41426 - https://github.com/axiomatic-systems/Bento4/issues/772 -CVE-2022-41427 - https://github.com/axiomatic-systems/Bento4/issues/772 -CVE-2022-41428 - https://github.com/axiomatic-systems/Bento4/issues/773 -CVE-2022-41429 - https://github.com/axiomatic-systems/Bento4/issues/773 -CVE-2022-41430 - https://github.com/axiomatic-systems/Bento4/issues/773 -CVE-2022-41441 - http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html -CVE-2022-41441 - https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/ -CVE-2022-41445 - https://github.com/RashidKhanPathan/CVE-2022-41445 -CVE-2022-41445 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor -CVE-2022-41446 - https://github.com/RashidKhanPathan/CVE-2022-41446 -CVE-2022-41446 - https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor -CVE-2022-41473 - https://github.com/ralap-z/rpcms/issues/1 -CVE-2022-41474 - https://github.com/ralap-z/rpcms/issues/3 -CVE-2022-41475 - https://github.com/ralap-z/rpcms/issues/2 -CVE-2022-41477 - https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md -CVE-2022-4148 - https://wpscan.com/vulnerability/be9b25c8-b0d7-4c22-81ff-e41650a4ed41 -CVE-2022-41495 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF2.md -CVE-2022-41496 - https://github.com/jayus0821/insight/blob/master/iCMS%20SSRF.md -CVE-2022-41497 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md -CVE-2022-4150 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_13 -CVE-2022-4150 - https://wpscan.com/vulnerability/d5d39138-a216-46cd-9e5f-fc706a2c93da -CVE-2022-4151 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_2 -CVE-2022-4151 - https://wpscan.com/vulnerability/e1320c2a-818d-4e91-8dc9-ba95a1dc4377 -CVE-2022-4152 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_4 -CVE-2022-4152 - https://wpscan.com/vulnerability/4b058966-0859-42ed-a796-b6c6cb08a9fc -CVE-2022-4153 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_7 -CVE-2022-4153 - https://wpscan.com/vulnerability/35b0126d-9293-4e64-a00f-0903303f960a -CVE-2022-4154 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5 -CVE-2022-4154 - https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a -CVE-2022-41540 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption -CVE-2022-41541 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay -CVE-2022-41542 - https://medium.com/@sc0p3hacker/cve-2022-41542-session-mis-configuration-in-devhub-application-ca956bb9027a -CVE-2022-41544 - http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html -CVE-2022-41547 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166 -CVE-2022-4155 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6 -CVE-2022-4155 - https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d -CVE-2022-4156 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1 -CVE-2022-4156 - https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0 -CVE-2022-4157 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3 -CVE-2022-4157 - https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6 -CVE-2022-4158 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_15 -CVE-2022-4158 - https://wpscan.com/vulnerability/1b3b51af-ad73-4f8e-ba97-375b8a363b64 -CVE-2022-4159 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8 -CVE-2022-4159 - https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965 -CVE-2022-4160 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_14 -CVE-2022-4160 - https://wpscan.com/vulnerability/813de343-4814-42b8-b8df-1695320512cd -CVE-2022-4161 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_16 -CVE-2022-4161 - https://wpscan.com/vulnerability/a66af8f7-1d5f-4fe5-a2ba-03337064583b -CVE-2022-4162 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_9 -CVE-2022-4162 - https://wpscan.com/vulnerability/011500ac-17e4-4d4f-bbd9-1fec70511776 -CVE-2022-4163 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_10 -CVE-2022-4163 - https://wpscan.com/vulnerability/de0d7db7-f911-4f5f-97f6-885ca60822d1 -CVE-2022-41639 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633 -CVE-2022-4164 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_11 -CVE-2022-4164 - https://wpscan.com/vulnerability/57fff222-2c64-4b52-86cd-ab8db4541627 -CVE-2022-41649 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1631 -CVE-2022-4165 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17 -CVE-2022-4165 - https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0 -CVE-2022-41654 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624 -CVE-2022-4166 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_12 -CVE-2022-4166 - https://wpscan.com/vulnerability/6e7de2bb-5f71-4c27-ae79-4f6b2ba7f86f -CVE-2022-41666 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ -CVE-2022-41667 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ -CVE-2022-41668 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ -CVE-2022-41669 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ -CVE-2022-41670 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ -CVE-2022-41671 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ -CVE-2022-41674 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html -CVE-2022-41674 - https://www.openwall.com/lists/oss-security/2022/10/13/5 -CVE-2022-41684 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1632 -CVE-2022-41697 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625 -CVE-2022-4173 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2022-41760 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-41761 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-41762 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-41763 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-41793 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667 -CVE-2022-41793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667 -CVE-2022-41794 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1626 -CVE-2022-41837 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636 -CVE-2022-41838 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1634 -CVE-2022-41841 - https://github.com/axiomatic-systems/Bento4/issues/779 -CVE-2022-41842 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928 -CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42344 -CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421 -CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928 -CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844 -CVE-2022-41845 - https://github.com/axiomatic-systems/Bento4/issues/770 -CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/342 -CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/770 -CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/750 -CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/775 -CVE-2022-41884 - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636 -CVE-2022-41912 - http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html -CVE-2022-41924 - https://emily.id.au/tailscale -CVE-2022-41924 - https://tailscale.com/security-bulletins/#ts-2022-004 -CVE-2022-41925 - https://emily.id.au/tailscale -CVE-2022-41925 - https://tailscale.com/security-bulletins/#ts-2022-005 -CVE-2022-41945 - https://github.com/4ra1n/super-xray/releases/tag/0.2-beta -CVE-2022-41950 - https://github.com/4ra1n/super-xray/releases/tag/0.3-beta -CVE-2022-41952 - https://github.com/matrix-org/synapse/pull/11936 -CVE-2022-41955 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ -CVE-2022-41956 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ -CVE-2022-41958 - https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr -CVE-2022-4196 - https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88 -CVE-2022-4197 - https://wpscan.com/vulnerability/96818024-57ab-419d-bd46-7d2da98269e6 -CVE-2022-41973 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html -CVE-2022-41973 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html -CVE-2022-41974 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html -CVE-2022-41974 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html -CVE-2022-41976 - https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html -CVE-2022-41977 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627 -CVE-2022-4198 - https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2 -CVE-2022-41981 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628 -CVE-2022-41985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680 -CVE-2022-41988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1643 -CVE-2022-4199 - https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d -CVE-2022-41991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1639 -CVE-2022-41992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644 -CVE-2022-41999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1635 -CVE-2022-4200 - https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf -CVE-2022-4201 - https://gitlab.com/gitlab-org/gitlab/-/issues/30376 -CVE-2022-4202 - https://github.com/gpac/gpac/issues/2333 -CVE-2022-42045 - https://github.com/ReCryptLLC/CVE-2022-42045/tree/main -CVE-2022-42046 - https://github.com/kkent030315/CVE-2022-42046 -CVE-2022-42053 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-42054 - https://boschko.ca/glinet-router -CVE-2022-42055 - https://boschko.ca/glinet-router -CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router -CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-4206 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4206.json -CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router -CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router/ -CVE-2022-42064 - https://packetstormsecurity.com/files/168498/Online-Diagnostic-Lab-Management-System-1.0-SQL-Injection-Shell-Upload.html -CVE-2022-42066 - https://packetstormsecurity.com/files/168549/Online-Examination-System-1.0-Cross-Site-Scripting.html -CVE-2022-42067 - https://packetstormsecurity.com/files/168524/Online-Birth-Certificate-Management-System-1.0-Insecure-Direct-Object-Reference.html -CVE-2022-42069 - https://packetstormsecurity.com/files/168529/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html -CVE-2022-42070 - https://packetstormsecurity.com/files/168522/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Request-Forgery.html -CVE-2022-42071 - https://packetstormsecurity.com/files/168533/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html -CVE-2022-42077 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md -CVE-2022-42078 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md -CVE-2022-42079 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-3.md -CVE-2022-4208 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42080 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md -CVE-2022-42081 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md -CVE-2022-42086 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md -CVE-2022-42087 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md -CVE-2022-4209 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42092 - https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c -CVE-2022-42094 - https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xss-at-cards-84266b5250f1 -CVE-2022-42095 - https://grimthereaperteam.medium.com/declined-backdrop-xss-at-pages-26e5d63686bc -CVE-2022-42096 - https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xss-at-posts-437c305036e2 -CVE-2022-42097 - https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xss-at-comments-2ea536ec55e1 -CVE-2022-42098 - https://grimthereaperteam.medium.com/cve-2022-42098-klik-sql-injection-6a9299621789 -CVE-2022-42099 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-forum-subject-a453789736f2 -CVE-2022-4210 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42100 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-reply-form-b189147c1f93 -CVE-2022-42109 - https://medium.com/@grimthereaperteam/online-shopping-system-advanced-sql-injection-at-product-php-c55c435c35c2 -CVE-2022-4211 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42110 - https://issues.liferay.com/browse/LPE-17403 -CVE-2022-42111 - https://issues.liferay.com/browse/LPE-17379 -CVE-2022-42118 - https://issues.liferay.com/browse/LPE-17342 -CVE-2022-42119 - https://issues.liferay.com/browse/LPE-17632 -CVE-2022-4212 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42120 - https://issues.liferay.com/browse/LPE-17513 -CVE-2022-42121 - https://issues.liferay.com/browse/LPE-17414 -CVE-2022-42122 - https://issues.liferay.com/browse/LPE-17520 -CVE-2022-42123 - https://issues.liferay.com/browse/LPE-17518 -CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17435 -CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17535 -CVE-2022-42125 - https://issues.liferay.com/browse/LPE-17517 -CVE-2022-42126 - https://issues.liferay.com/browse/LPE-17593 -CVE-2022-42127 - https://issues.liferay.com/browse/LPE-17607 -CVE-2022-42128 - https://issues.liferay.com/browse/LPE-17595 -CVE-2022-42129 - https://issues.liferay.com/browse/LPE-17448 -CVE-2022-42130 - https://issues.liferay.com/browse/LPE-17447 -CVE-2022-42131 - https://issues.liferay.com/browse/LPE-17377 -CVE-2022-42132 - https://issues.liferay.com/browse/LPE-17438 -CVE-2022-42139 - https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/ -CVE-2022-4214 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-4214 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4214 -CVE-2022-42140 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/ -CVE-2022-42141 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/ -CVE-2022-4215 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42150 - https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements -CVE-2022-42150 - https://hackmd.io/@UR9gnr32QymtmtZHnZceOw/ry428EZGo -CVE-2022-42156 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf -CVE-2022-42156 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-42159 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf -CVE-2022-42159 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4216 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42160 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf -CVE-2022-42160 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-42161 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf -CVE-2022-42161 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-42163 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md -CVE-2022-42164 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md -CVE-2022-42165 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md -CVE-2022-42166 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetSpeedWan/readme.md -CVE-2022-42167 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetFirewallCfg/readme.md -CVE-2022-42168 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromSetIpMacBind/readme.md -CVE-2022-42169 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/addWifiMacFilter/readme.md -CVE-2022-4217 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42170 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formWifiWpsStart/readme.md -CVE-2022-42171 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/saveParentControlInfo/readme.md -CVE-2022-42176 - https://github.com/soy-oreocato/CVE-2022-42176 -CVE-2022-42176 - https://github.com/soy-oreocato/CVE-Advisories/tree/main/PapiQuieroPollo00 -CVE-2022-4218 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-4219 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-42199 - https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE/blob/main/CVE-2022-42199.md -CVE-2022-42199 - https://github.com/ciph0x01/poc/blob/main/poc.html -CVE-2022-4220 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -CVE-2022-4222 - https://vuldb.com/?id.214523 -CVE-2022-42221 - https://github.com/Cj775995/CVE_Report/tree/main/Netgear/R6220 -CVE-2022-42235 - https://github.com/draco1725/Stored-XSS/blob/main/poc -CVE-2022-42236 - https://github.com/draco1725/vloggers/blob/main/poc -CVE-2022-42237 - https://github.com/draco1725/sqlinj/blob/main/poc -CVE-2022-42238 - https://github.com/draco1725/localpriv/blob/main/poc -CVE-2022-42245 - https://packetstormsecurity.com/files/171585/Dreamer-CMS-4.0.0-SQL-Injection.html -CVE-2022-42246 - https://github.com/farliy-hacker/Doufoxcms/issues/1 -CVE-2022-42254 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42255 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42256 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42257 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42258 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42259 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-4226 - https://wpscan.com/vulnerability/c5ca22e0-b7a5-468d-8366-1855ff33851b -CVE-2022-42260 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42261 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42262 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42263 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42264 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42265 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42266 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42267 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 -CVE-2022-42271 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42272 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42273 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42274 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42275 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42276 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42277 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42278 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42279 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-4228 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash -CVE-2022-4228 - https://vuldb.com/?id.214587 -CVE-2022-42280 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42281 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42282 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42283 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42284 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42285 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42286 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42287 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42288 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-42289 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-4229 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control -CVE-2022-42290 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 -CVE-2022-4230 - https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312 -CVE-2022-42300 - https://www.veritas.com/content/support/en_US/security/VTS22-013#M2 -CVE-2022-4231 - https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation -CVE-2022-4233 - https://vuldb.com/?id.214591 -CVE-2022-4235 - https://fluidattacks.com/advisories/miller/ -CVE-2022-4236 - https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 -CVE-2022-4237 - https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f -CVE-2022-4239 - https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c -CVE-2022-4242 - https://wpscan.com/vulnerability/d7f89335-630c-47c6-bebf-92f556caa087 -CVE-2022-4243 - https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0 -CVE-2022-42457 - https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution -CVE-2022-4246 - https://seclists.org/fulldisclosure/2022/Nov/16 -CVE-2022-4247 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/1 -CVE-2022-4248 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/3 -CVE-2022-4248 - https://vuldb.com/?id.214625 -CVE-2022-42484 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1641 -CVE-2022-42490 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 -CVE-2022-42491 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 -CVE-2022-42492 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 -CVE-2022-42493 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 -CVE-2022-4250 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/2 -CVE-2022-4251 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/4 -CVE-2022-4256 - https://wpscan.com/vulnerability/f5b17c68-c2b0-4d0d-bb7b-19dc30511a89 -CVE-2022-4257 - https://vuldb.com/?id.214631 -CVE-2022-4260 - https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db -CVE-2022-4265 - https://wpscan.com/vulnerability/095cba08-7edd-41fb-9776-da151c0885dd -CVE-2022-4266 - https://wpscan.com/vulnerability/1bcda9d3-c573-441e-828f-055fbec2e08d -CVE-2022-4267 - https://wpscan.com/vulnerability/e09754f2-e241-4bf8-8c95-a3fbc0ba7585 -CVE-2022-4268 - https://bulletin.iese.de/post/plugin-logic_1-0-7/ -CVE-2022-4268 - https://wpscan.com/vulnerability/bde93d90-1178-4d55-aea9-e02c4f8bcaa2 -CVE-2022-42703 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.7 -CVE-2022-42703 - https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html -CVE-2022-4271 - https://huntr.dev/bounties/a11c922f-255a-412a-aa87-7f3bd7121599 -CVE-2022-42710 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-42710/CVE-2022-42710.txt -CVE-2022-42716 - http://packetstormsecurity.com/files/170420/Arm-Mali-CSF-KBASE_REG_NO_USER_FREE-Unsafe-Use-Use-After-Free.html -CVE-2022-42719 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html -CVE-2022-42719 - http://www.openwall.com/lists/oss-security/2022/10/13/5 -CVE-2022-4272 - https://github.com/FeMiner/wms/issues/14 -CVE-2022-42720 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html -CVE-2022-42720 - http://www.openwall.com/lists/oss-security/2022/10/13/5 -CVE-2022-42721 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html -CVE-2022-42721 - http://www.openwall.com/lists/oss-security/2022/10/13/5 -CVE-2022-42722 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html -CVE-2022-42722 - http://www.openwall.com/lists/oss-security/2022/10/13/5 -CVE-2022-4273 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/bypass-fileupload-rce -CVE-2022-4273 - https://vuldb.com/?id.214769 -CVE-2022-42732 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-42733 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-42734 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-4274 - https://github.com/nikeshtiwari1/House-Rental-System/issues/6 -CVE-2022-4274 - https://vuldb.com/?id.214770 -CVE-2022-4275 - https://github.com/nikeshtiwari1/House-Rental-System/issues/7 -CVE-2022-4276 - https://github.com/nikeshtiwari1/House-Rental-System/issues/8 -CVE-2022-4276 - https://vuldb.com/?id.214772 -CVE-2022-4278 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employeeadd-sqli -CVE-2022-4279 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss -CVE-2022-4279 - https://vuldb.com/?id.214776 -CVE-2022-4280 - https://vuldb.com/?id.214778 -CVE-2022-42801 - http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html -CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42844 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42847 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-4285 - https://sourceware.org/bugzilla/show_bug.cgi?id=29699 -CVE-2022-42850 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-42853 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42855 - http://packetstormsecurity.com/files/170518/libCoreEntitlements-CEContextQuery-Arbitrary-Entitlement-Returns.html -CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/22 -CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-42885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668 -CVE-2022-42889 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html -CVE-2022-42889 - http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html -CVE-2022-42891 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-42892 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-42893 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-42894 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 -CVE-2022-42905 - http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html -CVE-2022-42905 - http://seclists.org/fulldisclosure/2023/Jan/11 -CVE-2022-42905 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ -CVE-2022-4291 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2022-42915 - http://seclists.org/fulldisclosure/2023/Jan/19 -CVE-2022-42916 - http://seclists.org/fulldisclosure/2023/Jan/19 -CVE-2022-4292 - https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b -CVE-2022-42927 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789128 -CVE-2022-4293 - https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143 -CVE-2022-4294 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2022-42948 - https://www.cobaltstrike.com/blog/ -CVE-2022-4295 - https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56 -CVE-2022-42953 - https://seclists.org/fulldisclosure/2022/Oct/23 -CVE-2022-42953 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2022-42964 - https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/ -CVE-2022-42965 - https://research.jfrog.com/vulnerabilities/snowflake-connector-python-redos-xray-257185/ -CVE-2022-42966 - https://research.jfrog.com/vulnerabilities/cleo-redos-xray-257186/ -CVE-2022-42967 - https://research.jfrog.com/vulnerabilities/caret-xss-rce/ -CVE-2022-42969 - https://github.com/pytest-dev/py/issues/287 -CVE-2022-4297 - http://packetstormsecurity.com/files/173293/WordPress-WP-AutoComplete-Search-1.0.4-SQL-Injection.html -CVE-2022-4297 - https://wpscan.com/vulnerability/e2dcc76c-65ac-4cd6-a5c9-6d813b5ac26d -CVE-2022-42979 - https://medium.com/@jalee0606/how-i-found-my-first-one-click-account-takeover-via-deeplink-in-ryde-5406010c36d8 -CVE-2022-4298 - https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478 -CVE-2022-42980 - https://github.com/go-admin-team/go-admin/issues/716 -CVE-2022-4299 - https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303 -CVE-2022-42991 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Public%20Access%20Catalog/XSS -CVE-2022-42992 - https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS -CVE-2022-42993 - https://github.com/draco1725/POC/blob/main/Exploit/Password%20Storage%20Application/XSS -CVE-2022-42998 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd -CVE-2022-42998 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-42999 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm -CVE-2022-42999 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4300 - https://vuldb.com/?id.214901 -CVE-2022-43000 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4 -CVE-2022-43000 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-43001 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity -CVE-2022-43001 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-43002 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54 -CVE-2022-43002 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-43003 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity -CVE-2022-43003 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4301 - https://wpscan.com/vulnerability/a8dca528-fb70-44f3-8149-21385039179d -CVE-2022-43014 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_joborderID.md -CVE-2022-43015 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_entriesPerPage.md -CVE-2022-43016 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_callback.md -CVE-2022-43017 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_indexFile.md -CVE-2022-43018 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_checkEmail.md -CVE-2022-4302 - https://wpscan.com/vulnerability/b7707a15-0987-4051-a8ac-7be2424bcb01 -CVE-2022-43020 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_in_Tag_Updates.md -CVE-2022-43021 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_JobOrders.md -CVE-2022-43022 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_tag_deletion.md -CVE-2022-43023 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_imports_errors.md -CVE-2022-43024 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-6.md -CVE-2022-43025 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-1.md -CVE-2022-43026 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-2.md -CVE-2022-43027 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-5.md -CVE-2022-43028 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-3.md -CVE-2022-43029 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-4.md -CVE-2022-4303 - https://wpscan.com/vulnerability/8428a5e1-dbef-4516-983f-f95605c6dd09 -CVE-2022-43039 - https://github.com/gpac/gpac/issues/2281 -CVE-2022-43040 - https://github.com/gpac/gpac/issues/2280 -CVE-2022-43042 - https://github.com/gpac/gpac/issues/2278 -CVE-2022-43043 - https://github.com/gpac/gpac/issues/2276 -CVE-2022-43044 - https://github.com/gpac/gpac/issues/2282 -CVE-2022-43045 - https://github.com/gpac/gpac/issues/2277 -CVE-2022-43046 - https://github.com/Oudaorui/bug_report/blob/main/vendors/oretnom23/Food%20Ordering%20Management%20System/XSS-1.md -CVE-2022-4305 - https://wpscan.com/vulnerability/286d972d-7bda-455c-a226-fd9ce5f925bd -CVE-2022-4306 - https://wpscan.com/vulnerability/18d7f9af-7267-4723-9d6f-05b895c94dbe -CVE-2022-4307 - https://wpscan.com/vulnerability/4000ba69-d73f-4c5b-a299-82898304cebb -CVE-2022-43071 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42349&p=43959#p43959 -CVE-2022-43076 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-1.md -CVE-2022-43078 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-2.md -CVE-2022-43079 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-3.md -CVE-2022-43081 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-3.md -CVE-2022-43082 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-4.md -CVE-2022-43083 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-2.md -CVE-2022-43084 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-5.md -CVE-2022-43085 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-3.md -CVE-2022-43086 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-4.md -CVE-2022-4309 - https://wpscan.com/vulnerability/1965f53d-c94e-4322-9059-49de69df1051 -CVE-2022-4310 - https://wpscan.com/vulnerability/b1aef75d-0c84-4702-83fc-11f0e98a0821 -CVE-2022-43101 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetdevicenameset_device_namesprintfv4-s1-a1 -CVE-2022-43102 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetsystimesub_496104strcpychar-v6-s -CVE-2022-43103 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetqosband -CVE-2022-43104 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwirelessrepeatsub_45cd64sub_45cad8sub_45bb10 -CVE-2022-43105 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwifigusetbasic -CVE-2022-43106 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setschedwifi-strcpychar-ptr--2-v8 -CVE-2022-43107 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setsmartpowermanagement -CVE-2022-43108 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetfirewallcfg -CVE-2022-43109 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-43117 - https://drive.google.com/file/d/1ZmAuKMVzUpL8pt5KXQJk8IyPECoVP9xw/view?usp=sharing -CVE-2022-43117 - https://github.com/RashidKhanPathan/CVE-2022-43117 -CVE-2022-43119 - https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md -CVE-2022-43138 - https://www.exploit-db.com/exploits/50248 -CVE-2022-4314 - https://huntr.dev/bounties/b2dc504d-92ae-4221-a096-12ff223d95a8 -CVE-2022-43140 - https://github.com/kekingcn/kkFileView/issues/392 -CVE-2022-43143 - https://github.com/beekeeper-studio/beekeeper-studio/issues/1393 -CVE-2022-43144 - https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS -CVE-2022-43146 - https://medium.com/@syedmudassiruddinalvi/cve-2022-43146-rce-via-arbitrary-file-upload-28dfa77c5de7 -CVE-2022-43148 - https://github.com/lvu/rtf2html/issues/11 -CVE-2022-43151 - https://github.com/hzeller/timg/issues/92 -CVE-2022-43152 - https://github.com/justdan96/tsMuxer/issues/641 -CVE-2022-43164 - https://github.com/anhdq201/rukovoditel/issues/4 -CVE-2022-43165 - https://github.com/anhdq201/rukovoditel/issues/5 -CVE-2022-43166 - https://github.com/anhdq201/rukovoditel/issues/2 -CVE-2022-43167 - https://github.com/anhdq201/rukovoditel/issues/7 -CVE-2022-43168 - https://github.com/anhdq201/rukovoditel/issues/1 -CVE-2022-43169 - https://github.com/anhdq201/rukovoditel/issues/3 -CVE-2022-43170 - https://github.com/anhdq201/rukovoditel/issues/6 -CVE-2022-43171 - https://github.com/lief-project/LIEF/issues/782 -CVE-2022-43183 - https://github.com/xuxueli/xxl-job/issues/3002 -CVE-2022-43184 - https://github.com/HuangPayoung/CVE-request/tree/main/DLink/vuln2 -CVE-2022-43184 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-43192 - https://github.com/linchuzhu/Dedecms-v5.7.101-RCE -CVE-2022-4320 - https://wpscan.com/vulnerability/f1244c57-d886-4a6e-8cdb-18404e8c153c -CVE-2022-4321 - https://wpscan.com/vulnerability/6ac1259c-86d9-428b-ba98-7f3d07910644 -CVE-2022-43216 - https://github.com/blackarrowsec/advisories/tree/master/2022/CVE-2022-43216 -CVE-2022-43221 - https://github.com/ToughRunner/Open5gs_bugreport3 -CVE-2022-43222 - https://github.com/ToughRunner/Open5gs_bugreport4 -CVE-2022-43223 - https://github.com/ToughRunner/Open5gs_bugreport2 -CVE-2022-43229 - http://packetstormsecurity.com/files/169605/Simple-Cold-Storage-Management-System-1.0-SQL-Injection.html -CVE-2022-4323 - https://wpscan.com/vulnerability/ce8027b8-9473-463e-ba80-49b3d6d16228 -CVE-2022-43235 - https://github.com/strukturag/libde265/issues/337 -CVE-2022-43236 - https://github.com/strukturag/libde265/issues/343 -CVE-2022-43237 - https://github.com/strukturag/libde265/issues/344 -CVE-2022-43238 - https://github.com/strukturag/libde265/issues/336 -CVE-2022-43239 - https://github.com/strukturag/libde265/issues/341 -CVE-2022-4324 - https://wpscan.com/vulnerability/70c39236-f7ae-49bf-a2f0-7cb9aa983e45 -CVE-2022-43240 - https://github.com/strukturag/libde265/issues/335 -CVE-2022-43241 - https://github.com/strukturag/libde265/issues/338 -CVE-2022-43242 - https://github.com/strukturag/libde265/issues/340 -CVE-2022-43243 - https://github.com/strukturag/libde265/issues/339 -CVE-2022-43244 - https://github.com/strukturag/libde265/issues/342 -CVE-2022-43245 - https://github.com/strukturag/libde265/issues/352 -CVE-2022-43248 - https://github.com/strukturag/libde265/issues/349 -CVE-2022-43249 - https://github.com/strukturag/libde265/issues/345 -CVE-2022-4325 - https://wpscan.com/vulnerability/5b983c48-6b05-47cf-85cb-28bbeec17395 -CVE-2022-43250 - https://github.com/strukturag/libde265/issues/346 -CVE-2022-43252 - https://github.com/strukturag/libde265/issues/347 -CVE-2022-43253 - https://github.com/strukturag/libde265/issues/348 -CVE-2022-43254 - https://github.com/gpac/gpac/issues/2284 -CVE-2022-43255 - https://github.com/gpac/gpac/issues/2285 -CVE-2022-43256 - https://github.com/seacms-com/seacms/issues/23 -CVE-2022-43263 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/ -CVE-2022-43264 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/ -CVE-2022-43265 - https://10degres.net/cves/cve-2022-43265/ -CVE-2022-4328 - https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed -CVE-2022-43280 - https://github.com/WebAssembly/wabt/issues/1982 -CVE-2022-43281 - https://github.com/WebAssembly/wabt/issues/1981 -CVE-2022-43282 - https://github.com/WebAssembly/wabt/issues/1983 -CVE-2022-43283 - https://github.com/WebAssembly/wabt/issues/1985 -CVE-2022-43284 - https://github.com/nginx/njs/issues/470 -CVE-2022-43284 - https://github.com/nginx/njs/issues/529 -CVE-2022-43285 - https://github.com/nginx/njs/issues/533 -CVE-2022-43286 - https://github.com/nginx/njs/issues/480 -CVE-2022-43288 - https://github.com/Kubozz/rukovoditel-3.2.1/issues/2 -CVE-2022-43289 - https://github.com/jsummers/deark/issues/52 -CVE-2022-4329 - https://wpscan.com/vulnerability/d7f2c1c1-75b7-4aec-8574-f38d506d064a -CVE-2022-43293 - https://github.com/LucaBarile/CVE-2022-43293 -CVE-2022-43293 - https://lucabarile.github.io/Blog/CVE-2022-43293/index.html -CVE-2022-4330 - https://wpscan.com/vulnerability/d3c39e17-1dc3-4275-97d8-543ca7226772 -CVE-2022-43308 - https://github.com/vitorespf/Advisories/blob/master/Intelbras-switch.txt -CVE-2022-4331 - https://gitlab.com/gitlab-org/gitlab/-/issues/385050 -CVE-2022-43317 - https://github.com/ImaizumiYui/bug_report/blob/main/vendors/oretnom23/Human%20Resource%20Management%20System/XSS-1.md -CVE-2022-43320 - https://github.com/liufee/feehicms/issues/4 -CVE-2022-43321 - https://github.com/shopwind/yii-shopwind/issues/1 -CVE-2022-43325 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325 -CVE-2022-43326 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43326 -CVE-2022-43333 - https://www.swascan.com/it/security-advisory-telenia-software-tvox/ -CVE-2022-43340 - https://github.com/zyx0814/dzzoffice/issues/223 -CVE-2022-43342 - https://discussions.eramba.org/t/question-stored-xss-vulnerability/2326 -CVE-2022-4335 - https://gitlab.com/gitlab-org/gitlab/-/issues/353018 -CVE-2022-43357 - https://github.com/sass/libsass/issues/3177 -CVE-2022-43358 - https://github.com/sass/libsass/issues/3178 -CVE-2022-43372 - https://github.com/emlog/emlog/issues/195 -CVE-2022-43380 - https://www.ibm.com/support/pages/node/6847947 -CVE-2022-4340 - https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7 -CVE-2022-43403 - https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/ -CVE-2022-43441 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645 -CVE-2022-4346 - https://wpscan.com/vulnerability/cc05f760-983d-4dc1-afbb-6b4965aa8abe -CVE-2022-43467 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671 -CVE-2022-4347 - https://vuldb.com/?id.215107 -CVE-2022-43473 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685 -CVE-2022-43484 - http://terasolunaorg.github.io/vulnerability/cve-2022-43484.html -CVE-2022-43484 - https://osdn.net/projects/terasoluna/wiki/cve-2022-43484 -CVE-2022-4349 - https://gitee.com/CTF-hacker/pwn/issues/I5WAAB -CVE-2022-4350 - https://vuldb.com/?id.215112 -CVE-2022-4351 - https://wpscan.com/vulnerability/2138f736-8a50-4390-a239-fcd1d736670a -CVE-2022-4352 - https://wpscan.com/vulnerability/325874f4-2482-4ae5-b5cf-cb9ff0843067 -CVE-2022-4355 - https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759 -CVE-2022-4356 - https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b -CVE-2022-4357 - https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626 -CVE-2022-4358 - https://wpscan.com/vulnerability/0076a3b8-9a25-41c9-bb07-36ffe2c8c37d -CVE-2022-43588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647 -CVE-2022-43589 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1648 -CVE-2022-4359 - https://wpscan.com/vulnerability/8472dd40-27e3-4084-907a-e251a2a0f339 -CVE-2022-43590 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1649 -CVE-2022-43591 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650 -CVE-2022-43592 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651 -CVE-2022-43593 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652 -CVE-2022-43594 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653 -CVE-2022-43595 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653 -CVE-2022-43596 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1654 -CVE-2022-43597 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655 -CVE-2022-43598 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655 -CVE-2022-43599 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 -CVE-2022-4360 - https://wpscan.com/vulnerability/40c420aa-5da0-42f9-a94f-f68ef57fcdae -CVE-2022-43600 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 -CVE-2022-43601 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 -CVE-2022-43602 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 -CVE-2022-43603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1657 -CVE-2022-43604 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1661 -CVE-2022-43605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1662 -CVE-2022-43606 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1663 -CVE-2022-43607 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664 -CVE-2022-4362 - https://wpscan.com/vulnerability/2660225a-e4c8-40f2-8c98-775ef2301212 -CVE-2022-4364 - https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md -CVE-2022-4365 - https://hackerone.com/reports/1792626 -CVE-2022-4366 - https://huntr.dev/bounties/f225d69a-d971-410d-a8f9-b0026143aed8 -CVE-2022-43663 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674 -CVE-2022-43664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 -CVE-2022-43665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1682 -CVE-2022-43675 - https://www.gruppotim.it/redteam -CVE-2022-4368 - https://wpscan.com/vulnerability/fa7e2b64-ca48-4b76-a2c2-f5e31e42eab7 -CVE-2022-43684 - http://packetstormsecurity.com/files/173354/ServiceNow-Insecure-Access-Control-Full-Admin-Compromise.html -CVE-2022-4369 - https://wpscan.com/vulnerability/460a01e5-7ce5-4d49-b068-a93ea1fba0e3 -CVE-2022-4370 - https://bulletin.iese.de/post/multimedial-images_1-0b -CVE-2022-4370 - https://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8 -CVE-2022-43701 - https://developer.arm.com/documentation/ka005596/latest -CVE-2022-43702 - https://developer.arm.com/documentation/ka005596/latest -CVE-2022-43703 - https://developer.arm.com/documentation/ka005596/latest -CVE-2022-43704 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/ -CVE-2022-4371 - https://bulletin.iese.de/post/web-invoice_2-1-3_1 -CVE-2022-4371 - https://wpscan.com/vulnerability/45f43359-98c2-4447-b51b-2d466bad8261 -CVE-2022-4372 - https://bulletin.iese.de/post/web-invoice_2-1-3_2 -CVE-2022-4372 - https://wpscan.com/vulnerability/218f8015-e14b-46a8-889d-08b2b822f8ae -CVE-2022-4373 - https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02 -CVE-2022-4374 - https://wpscan.com/vulnerability/bbaa808d-47b1-4c70-b157-f8297f627a07 -CVE-2022-4375 - https://gitee.com/mingSoft/MCMS/issues/I61TG5 -CVE-2022-43750 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15 -CVE-2022-43753 - https://bugzilla.suse.com/show_bug.cgi?id=1204716 -CVE-2022-43769 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html -CVE-2022-43774 - https://www.tenable.com/security/research/tra-2022-33 -CVE-2022-43775 - https://www.tenable.com/security/research/tra-2022-33 -CVE-2022-43776 - https://www.tenable.com/security/research/tra-2022-34 -CVE-2022-4378 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html -CVE-2022-4378 - https://seclists.org/oss-sec/2022/q4/178 -CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0 -CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da -CVE-2022-4381 - https://wpscan.com/vulnerability/8bf8ebe8-1063-492d-a0f9-2f824408d0df -CVE-2022-4383 - https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035 -CVE-2022-4384 - https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5 -CVE-2022-43848 - https://www.ibm.com/support/pages/node/6847947 -CVE-2022-43849 - https://www.ibm.com/support/pages/node/6847947 -CVE-2022-4385 - https://wpscan.com/vulnerability/8f900d37-6eee-4434-8b9b-d10cc4a9167c -CVE-2022-4386 - https://wpscan.com/vulnerability/734064e3-afe9-4dfd-8d76-8a757cc94815 -CVE-2022-4391 - https://wpscan.com/vulnerability/c0c37787-3c4c-42d5-bb75-5d4ed3e7aa2b -CVE-2022-4392 - https://wpscan.com/vulnerability/c298e3dc-09a7-40bb-a361-f49af4bce77e -CVE-2022-4393 - https://wpscan.com/vulnerability/0bd4f370-f9f8-43ee-8f20-96e899a1efb5 -CVE-2022-43939 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html -CVE-2022-4394 - https://wpscan.com/vulnerability/8edbdea1-f9bb-407a-bcd1-fff3e146984c -CVE-2022-43945 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html -CVE-2022-43945 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8 -CVE-2022-4395 - https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40 -CVE-2022-43970 - https://youtu.be/73-1lhvJPNg -CVE-2022-43970 - https://youtu.be/RfWVYCUBNZ0 -CVE-2022-43970 - https://youtu.be/TeWAmZaKQ_w -CVE-2022-43971 - https://youtu.be/73-1lhvJPNg -CVE-2022-43971 - https://youtu.be/RfWVYCUBNZ0 -CVE-2022-43971 - https://youtu.be/TeWAmZaKQ_w -CVE-2022-43972 - https://youtu.be/73-1lhvJPNg -CVE-2022-43972 - https://youtu.be/RfWVYCUBNZ0 -CVE-2022-43972 - https://youtu.be/TeWAmZaKQ_w -CVE-2022-43973 - https://youtu.be/73-1lhvJPNg -CVE-2022-43973 - https://youtu.be/RfWVYCUBNZ0 -CVE-2022-43973 - https://youtu.be/TeWAmZaKQ_w -CVE-2022-43974 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 -CVE-2022-4398 - https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2 -CVE-2022-43996 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json -CVE-2022-43997 - https://winternl.com/cve-2022-43997/ -CVE-2022-43999 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-034.txt -CVE-2022-43999 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44000 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-032.txt -CVE-2022-44000 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44001 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt -CVE-2022-44001 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44002 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44003 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt -CVE-2022-44003 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44004 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt -CVE-2022-44004 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44005 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt -CVE-2022-44005 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44006 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-031.txt -CVE-2022-44006 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44007 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt -CVE-2022-44007 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 -CVE-2022-44008 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-037.txt -CVE-2022-44012 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -CVE-2022-44013 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -CVE-2022-44014 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -CVE-2022-44015 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -CVE-2022-44016 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -CVE-2022-44017 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -CVE-2022-44019 - https://www.edoardoottavianelli.it/CVE-2022-44019/ -CVE-2022-44019 - https://www.youtube.com/watch?v=x-u3eS8-xJg -CVE-2022-4403 - https://vuldb.com/?id.215272 -CVE-2022-44037 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037 -CVE-2022-44038 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44038 -CVE-2022-4407 - https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b -CVE-2022-44079 - https://github.com/zrax/pycdc/issues/291 -CVE-2022-4408 - https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea -CVE-2022-44081 - https://github.com/lvandeve/lodepng/issues/177 -CVE-2022-4409 - https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c -CVE-2022-44096 - https://github.com/upasvi/CVE-/issues/1 -CVE-2022-44097 - https://github.com/upasvi/CVE-/issues/2 -CVE-2022-44108 - https://github.com/ldenoue/pdftojson/issues/3 -CVE-2022-44109 - https://github.com/ldenoue/pdftojson/issues/4 -CVE-2022-44118 - https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b -CVE-2022-4413 - https://huntr.dev/bounties/70ac720d-c932-4ed3-98b1-dd2cbcb90185 -CVE-2022-4414 - https://huntr.dev/bounties/131a41e5-c936-4c3f-84fc-e0e1f0e090b5 -CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html -CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-80.103.2.5045-Remote-Code-Execution.html -CVE-2022-44149 - https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html -CVE-2022-4415 - https://www.openwall.com/lists/oss-security/2022/12/21/3 -CVE-2022-44156 - https://drive.google.com/file/d/1dbMwByl40uqMiSv_DOEW8pFjRhGX-j97/view?usp=sharing -CVE-2022-44158 - https://drive.google.com/file/d/11PSsUpLmLCl0-eO565TLbVavzfP5aWdG/view?usp=sharing -CVE-2022-44167 - https://drive.google.com/file/d/1Jq8Tm_2FDS4WDD_afdhg1LnA3VcvZdjS/view?usp=sharing -CVE-2022-4417 - https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5 -CVE-2022-44201 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44202 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44204 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3060/5.md -CVE-2022-44204 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44215 - https://github.com/JBalanza/CVE-2022-44215 -CVE-2022-44235 - https://github.com/liong007/Zed-3/issues/1 -CVE-2022-4426 - https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38 -CVE-2022-44262 - https://github.com/ff4j/ff4j/issues/624 -CVE-2022-44267 - https://www.metabaseq.com/imagemagick-zero-days/ -CVE-2022-44268 - http://packetstormsecurity.com/files/171727/ImageMagick-7.1.0-48-Arbitrary-File-Read.html -CVE-2022-44268 - https://www.metabaseq.com/imagemagick-zero-days/ -CVE-2022-44276 - https://github.com/HerrLeStrate/CVE-2022-44276-PoC -CVE-2022-44279 - https://github.com/Onetpaer/bug_report/blob/main/vendors/mayuri_k/garage-management-system/xss1.md -CVE-2022-44283 - https://packetstormsecurity.com/files/169427/AVS-Audio-Converter-10.3-Stack-Overflow.html -CVE-2022-44284 - https://packetstormsecurity.com/files/169531/Dinstar-FXO-Analog-VoIP-Gateway-DAG2000-16O-Cross-Site-Scripting.html -CVE-2022-4429 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2022-44290 - https://github.com/anhdq201/webtareas/issues/2 -CVE-2022-44291 - https://github.com/anhdq201/webtareas/issues/1 -CVE-2022-44298 - https://github.com/siteserver/cms/issues/3492 -CVE-2022-4431 - https://wpscan.com/vulnerability/860b882b-983c-44b5-8c09-b6890df8a0da -CVE-2022-4431 - https://wpscan.com/vulnerability/c7d12fd4-7346-4727-9f6c-7e7e5524a932 -CVE-2022-44354 - https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md -CVE-2022-44355 - https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md -CVE-2022-44356 - https://github.com/strik3r0x1/Vulns/blob/main/Wavlink%20WL-WN531G3.md -CVE-2022-44362 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formAddSysLogRule/readme.md -CVE-2022-44363 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSnmpInfo/readme.md -CVE-2022-44365 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md -CVE-2022-44366 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetDiagnoseInfo/readme.md -CVE-2022-44367 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetUplinkInfo/readme.md -CVE-2022-44373 - https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md -CVE-2022-44380 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/ -CVE-2022-44381 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/ -CVE-2022-44384 - https://www.exploit-db.com/exploits/49783 -CVE-2022-4442 - https://wpscan.com/vulnerability/12766537-df59-49d6-815a-4d68265a4c4a -CVE-2022-4443 - https://wpscan.com/vulnerability/1e621d62-13c7-4b2f-96ca-3617a796d037 -CVE-2022-4445 - https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8 -CVE-2022-44451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669 -CVE-2022-4446 - https://huntr.dev/bounties/718f1be6-3834-4ef2-8134-907a52009894 -CVE-2022-4447 - https://wpscan.com/vulnerability/6939c405-ac62-4144-bd86-944d7b89d0ad -CVE-2022-4448 - https://wpscan.com/vulnerability/ce467a2e-081e-4a6c-bfa4-29e4447ebd3b -CVE-2022-4449 - https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d -CVE-2022-4451 - https://wpscan.com/vulnerability/a28f52a4-fd57-4f46-8983-f34c71ec88d5 -CVE-2022-4453 - https://wpscan.com/vulnerability/120bdcb3-4288-4101-b738-cc84d02da171 -CVE-2022-4458 - https://wpscan.com/vulnerability/c85ceab3-7e79-402d-ad48-a028f1ee070c -CVE-2022-4459 - https://wpscan.com/vulnerability/3ef4783b-4e4a-4691-b858-a7fa8dada4ec -CVE-2022-4460 - https://wpscan.com/vulnerability/034c4c75-42a4-4884-b63f-f9d4d2d6aebc -CVE-2022-44638 - http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html -CVE-2022-44638 - https://gitlab.freedesktop.org/pixman/pixman/-/issues/63 -CVE-2022-4464 - https://wpscan.com/vulnerability/1d3636c1-976f-4c84-8cca-413e38170d0c -CVE-2022-4465 - https://wpscan.com/vulnerability/28abe589-1371-4ed2-90b6-2bb96c93832c -CVE-2022-4466 - https://wpscan.com/vulnerability/497d0bf9-b750-4293-9662-1722a74442e2 -CVE-2022-44666 - http://packetstormsecurity.com/files/171047/Microsoft-Windows-Contact-File-Remote-Code-Execution.html -CVE-2022-44666 - http://seclists.org/fulldisclosure/2023/Feb/14 -CVE-2022-4467 - https://wpscan.com/vulnerability/54168861-c0b8-4de6-a9af-0ad5c20b4a45 -CVE-2022-4468 - https://wpscan.com/vulnerability/a3bf24af-417e-4ca2-886c-bb36bb2d952b -CVE-2022-44683 - http://packetstormsecurity.com/files/170466/Windows-Kernel-NtNotifyChangeMultipleKeys-Use-After-Free.html -CVE-2022-4469 - https://wpscan.com/vulnerability/b195c373-1db9-4fd7-98d0-0860dacd189e -CVE-2022-4470 - https://wpscan.com/vulnerability/7c4e51b3-87ef-4afc-ab53-9a9bbdcfc9d7 -CVE-2022-4471 - https://wpscan.com/vulnerability/c6cf792b-054c-4d77-bcae-3b700f42130b -CVE-2022-4472 - https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a -CVE-2022-44724 - https://stiltsoft.atlassian.net/browse/VD-3 -CVE-2022-44724 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-049.txt -CVE-2022-44725 - https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/ -CVE-2022-44726 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-050.txt -CVE-2022-44727 - https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf -CVE-2022-4473 - https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3 -CVE-2022-4474 - https://wpscan.com/vulnerability/3acc6940-13ec-40fb-8471-6b2f0445c543 -CVE-2022-4475 - https://wpscan.com/vulnerability/3b5c377c-3148-4373-996c-89851d5e39e5 -CVE-2022-4476 - https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45 -CVE-2022-4477 - https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41 -CVE-2022-4478 - https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 -CVE-2022-4479 - https://wpscan.com/vulnerability/10f63d30-1b36-459b-80eb-509caaf5d377 -CVE-2022-44792 - https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 -CVE-2022-44792 - https://github.com/net-snmp/net-snmp/issues/474 -CVE-2022-44793 - https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f -CVE-2022-44793 - https://github.com/net-snmp/net-snmp/issues/475 -CVE-2022-4480 - https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124 -CVE-2022-44801 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44804 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44806 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44807 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-44808 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1 -CVE-2022-44808 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4481 - https://wpscan.com/vulnerability/9dc9d377-635d-4d4f-9916-33bcedbba6f0 -CVE-2022-4482 - https://wpscan.com/vulnerability/389b71d6-b0e6-4e36-b9ca-9d8dab75bb0a -CVE-2022-4483 - https://wpscan.com/vulnerability/a1786400-dc62-489c-b986-ba17c9833179 -CVE-2022-44830 - https://github.com/RashidKhanPathan/CVE-2022-44830 -CVE-2022-44832 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3040/6.md -CVE-2022-44832 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4484 - https://wpscan.com/vulnerability/91252899-029d-49be-859e-7d2c4a70efea -CVE-2022-44843 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1 -CVE-2022-44844 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2 -CVE-2022-4485 - https://wpscan.com/vulnerability/685b068e-0727-45fb-bd8c-66bb1dc3a8e7 -CVE-2022-4486 - https://wpscan.com/vulnerability/d0afd17c-09cd-4ab5-95a5-6ac8c3c0a50b -CVE-2022-4487 - https://wpscan.com/vulnerability/6130958f-f549-4885-adb1-093aa025920e -CVE-2022-44870 - https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md -CVE-2022-44877 - http://packetstormsecurity.com/files/170388/Control-Web-Panel-7-Remote-Code-Execution.html -CVE-2022-44877 - http://packetstormsecurity.com/files/170820/Control-Web-Panel-Unauthenticated-Remote-Command-Execution.html -CVE-2022-44877 - http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html -CVE-2022-44877 - http://seclists.org/fulldisclosure/2023/Jan/1 -CVE-2022-44877 - https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386 -CVE-2022-44877 - https://www.youtube.com/watch?v=kiLfSvc1SYY -CVE-2022-4488 - https://wpscan.com/vulnerability/e52c18a9-550a-40b1-a413-0e06e5b4aabc -CVE-2022-4489 - https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f -CVE-2022-44897 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-44897/poc.txt -CVE-2022-44898 - http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html -CVE-2022-44898 - https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/ -CVE-2022-44900 - http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html -CVE-2022-4491 - https://wpscan.com/vulnerability/b62d8fa6-d546-4794-8f7a-c5e4a7f607dc -CVE-2022-44910 - https://github.com/yangfar/CVE/blob/main/Reference%20of%20Binbloom.md -CVE-2022-44928 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44928 -CVE-2022-44929 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44929 -CVE-2022-44930 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44930 -CVE-2022-44931 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md -CVE-2022-44932 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md -CVE-2022-44937 - https://github.com/5497lvren/Zhenhao/issues/1 -CVE-2022-44938 - https://pwnit.io/2022/11/23/weak-password-reset-token-leads-to-account-takeover-in-seeddms/ -CVE-2022-44939 - https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt -CVE-2022-44942 - https://github.com/casdoor/casdoor/issues/1171 -CVE-2022-44944 - https://github.com/anhdq201/rukovoditel/issues/14 -CVE-2022-44945 - https://github.com/anhdq201/rukovoditel/issues/16 -CVE-2022-44946 - https://github.com/anhdq201/rukovoditel/issues/15 -CVE-2022-44947 - https://github.com/anhdq201/rukovoditel/issues/13 -CVE-2022-44948 - https://github.com/anhdq201/rukovoditel/issues/8 -CVE-2022-44949 - https://github.com/anhdq201/rukovoditel/issues/12 -CVE-2022-44950 - https://github.com/anhdq201/rukovoditel/issues/10 -CVE-2022-44951 - https://github.com/anhdq201/rukovoditel/issues/11 -CVE-2022-44952 - https://github.com/anhdq201/rukovoditel/issues/9 -CVE-2022-44953 - https://github.com/anhdq201/webtareas/issues/8 -CVE-2022-44954 - https://github.com/anhdq201/webtareas/issues/10 -CVE-2022-44955 - https://github.com/anhdq201/webtareas/issues/5 -CVE-2022-44956 - https://github.com/anhdq201/webtareas/issues/3 -CVE-2022-44957 - https://github.com/anhdq201/webtareas/issues/11 -CVE-2022-44959 - https://github.com/anhdq201/webtareas/issues/6 -CVE-2022-44960 - https://github.com/anhdq201/webtareas/issues/4 -CVE-2022-44961 - https://github.com/anhdq201/webtareas/issues/7 -CVE-2022-44962 - https://github.com/anhdq201/webtareas/issues/12 -CVE-2022-4497 - https://wpscan.com/vulnerability/3fa6c8b3-6b81-4fe3-b997-25c9e5fdec86 -CVE-2022-4502 - https://huntr.dev/bounties/5bdef791-6886-4008-b9ba-045cb4524114 -CVE-2022-45025 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639 -CVE-2022-45026 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640 -CVE-2022-45027 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/ -CVE-2022-45028 - https://seanpesce.blogspot.com/2022/11/unauthenticated-stored-xss-in-arris.html -CVE-2022-4503 - https://huntr.dev/bounties/4cba644c-a2f5-4ed7-af5d-f2cab1895e13 -CVE-2022-45030 - http://packetstormsecurity.com/files/171613/rconfig-3.9.7-SQL-Injection.html -CVE-2022-45030 - https://www.rconfig.com/downloads/rconfig-3.9.7.zip -CVE-2022-45033 - https://github.com/cyb3r-n3rd/cve-request/blob/main/cve-poc-payload -CVE-2022-4504 - https://huntr.dev/bounties/f50538cb-99d3-411d-bd1a-5f36d1fa9f5d -CVE-2022-45043 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2 -CVE-2022-45045 - https://vulncheck.com/blog/xiongmai-iot-exploitation -CVE-2022-4505 - https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92 -CVE-2022-4506 - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942 -CVE-2022-45062 - https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390 -CVE-2022-4507 - https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6 -CVE-2022-4508 - https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab -CVE-2022-4509 - https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910 -CVE-2022-4510 - https://github.com/ReFirmLabs/binwalk/pull/617 -CVE-2022-45115 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1684 -CVE-2022-4512 - https://wpscan.com/vulnerability/7957f355-c767-4f59-bb28-0302d33386a6 -CVE-2022-45124 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1683 -CVE-2022-45129 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html -CVE-2022-45129 - http://seclists.org/fulldisclosure/2022/Nov/11 -CVE-2022-45130 - https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/ -CVE-2022-45132 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/ -CVE-2022-45144 - https://herolab.usd.de/security-advisories/usd-2022-0048/ -CVE-2022-45163 - https://research.nccgroup.com/2022/11/17/cve-2022-45163/ -CVE-2022-45163 - https://research.nccgroup.com/category/technical-advisory/ -CVE-2022-45169 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45170 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45171 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45172 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45173 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45174 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45175 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45177 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45178 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45179 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45180 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-45202 - https://github.com/gpac/gpac/issues/2296 -CVE-2022-45204 - https://github.com/gpac/gpac/issues/2307 -CVE-2022-45205 - https://github.com/jeecgboot/jeecg-boot/issues/4128 -CVE-2022-45207 - https://github.com/jeecgboot/jeecg-boot/issues/4127 -CVE-2022-45208 - https://github.com/jeecgboot/jeecg-boot/issues/4126 -CVE-2022-45210 - https://github.com/jeecgboot/jeecg-boot/issues/4125 -CVE-2022-45213 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/ -CVE-2022-45218 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hrm.zip -CVE-2022-45221 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124 -CVE-2022-45223 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124 -CVE-2022-45224 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e -CVE-2022-45225 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e -CVE-2022-45283 - https://github.com/gpac/gpac/issues/2295 -CVE-2022-45290 - https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability/blob/main/README.md -CVE-2022-45297 - http://packetstormsecurity.com/files/171615/EQ-Enterprise-Management-System-2.2.0-SQL-Injection.html -CVE-2022-45297 - https://github.com/tlfyyds/EQ -CVE-2022-45299 - https://github.com/offalltn/CVE-2022-45299 -CVE-2022-45313 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md -CVE-2022-45315 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md -CVE-2022-45326 - https://www.navsec.net/2022/11/12/kwoksys-xxe.html -CVE-2022-45329 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/search_sql_injection/search_sql_injection.md -CVE-2022-45330 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/category_sql_injection/category_sql_injection.md -CVE-2022-45331 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_sql_injection/post_sql_injection.md -CVE-2022-45332 - https://github.com/LibreDWG/libredwg/issues/524 -CVE-2022-45337 - https://github.com/no1rr/Vulnerability/tree/master/Tenda/TX9Pro/1 -CVE-2022-45343 - https://github.com/gpac/gpac/issues/2315 -CVE-2022-45411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790311 -CVE-2022-45413 - https://bugzilla.mozilla.org/show_bug.cgi?id=1791201 -CVE-2022-45415 - https://bugzilla.mozilla.org/show_bug.cgi?id=1793551 -CVE-2022-45418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795815 -CVE-2022-4542 - https://wpscan.com/vulnerability/f0bef96f-dfe2-4988-adf8-e1bd493c5242 -CVE-2022-4543 - https://www.willsroot.io/2022/12/entrybleed.html -CVE-2022-4544 - https://wpscan.com/vulnerability/96e34d3d-627f-42f2-bfdb-c9d47dbf396c -CVE-2022-4545 - https://wpscan.com/vulnerability/19f482cb-fcfd-43e6-9a04-143e06351a70 -CVE-2022-4546 - https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8 -CVE-2022-45460 - https://github.com/tothi/pwn-hisilicon-dvr/blob/master/pwn_hisilicon_dvr.py -CVE-2022-4547 - https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99 -CVE-2022-45477 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-45478 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-45479 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-4548 - https://wpscan.com/vulnerability/0ff435bc-ea20-4993-98ae-1f61b1732b59 -CVE-2022-45480 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-45481 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-45482 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-45483 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ -CVE-2022-4549 - https://wpscan.com/vulnerability/06e1be38-fc1a-4799-a006-556b678ae701 -CVE-2022-45497 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/exeCommand/readme.md -CVE-2022-45498 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolReboot/readme.md -CVE-2022-45499 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/WifiMacFilterGet/readme.md -CVE-2022-4550 - https://wpscan.com/vulnerability/a1179959-2044-479f-a5ca-3c9ffc46d00e -CVE-2022-45501 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/wifiSSIDset/readme.md -CVE-2022-45503 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/setAutoPing/readme.md -CVE-2022-45504 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolRestoreSet/readme.md -CVE-2022-45505 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md -CVE-2022-45506 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/delFileName/readme.md -CVE-2022-45507 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editFileName/readme.md -CVE-2022-45508 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editUserName/readme.md -CVE-2022-45509 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addUserName/readme.md -CVE-2022-4551 - https://wpscan.com/vulnerability/91c00b17-00ba-4c3f-8587-d54449a02659 -CVE-2022-45510 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/AdvSetWrlsafeset/readme.md -CVE-2022-45511 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/QuickIndex/readme.md -CVE-2022-45512 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeEmailFilter/readme.md -CVE-2022-45513 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/P2pListFilter/readme.md -CVE-2022-45514 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/webExcptypemanFilter/readme.md -CVE-2022-45515 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addressNat/readme.md -CVE-2022-45516 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/NatStaticSetting/readme.md -CVE-2022-45517 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/VirtualSer/readme.md -CVE-2022-45518 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SetIpBind/readme.md -CVE-2022-45519 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeMacFilter/readme.md -CVE-2022-4552 - https://wpscan.com/vulnerability/307b0fe4-39de-4fbb-8bb0-f7f15ec6ef52 -CVE-2022-45520 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/qossetting/readme.md -CVE-2022-45521 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeUrlFilter/readme.md -CVE-2022-45522 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeClientFilter/readme.md -CVE-2022-45523 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/L7Im/readme.md -CVE-2022-45524 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/IPSECsave/readme.md -CVE-2022-45525 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/CertListInfo/readme.md -CVE-2022-45526 - https://github.com/Future-Depth/IMS/issues/1 -CVE-2022-45527 - https://github.com/Future-Depth/IMS/issues/2 -CVE-2022-45529 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/edit_post_post_category_id_sql_injection/edit_post_post_category_id_sql_injection.md -CVE-2022-4553 - https://wpscan.com/vulnerability/483ed482-a1d1-44f6-8b99-56e653d3e45f -CVE-2022-45535 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/update_categories_sql_injection/update_categories_sql_injection.md -CVE-2022-45535 - https://rdyx0.github.io/2018/09/06/AeroCMS-v0.0.1-SQLi%20update_categories_sql_injection/ -CVE-2022-45536 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_comments_sql_injection/post_comments_sql_injection.md -CVE-2022-45536 - https://rdyx0.github.io/2018/09/07/AeroCMS-v0.0.1-SQLi%20post_comments_sql_injection/ -CVE-2022-45537 - https://github.com/weng-xianhu/eyoucms/issues/34 -CVE-2022-45538 - https://github.com/weng-xianhu/eyoucms/issues/35 -CVE-2022-45539 - https://github.com/weng-xianhu/eyoucms/issues/38 -CVE-2022-45540 - https://github.com/weng-xianhu/eyoucms/issues/37 -CVE-2022-45541 - https://github.com/weng-xianhu/eyoucms/issues/36 -CVE-2022-45542 - https://github.com/weng-xianhu/eyoucms/issues/33 -CVE-2022-45543 - https://srpopty.github.io/2023/02/15/Vulnerability-Discuz-X3.4-Reflected-XSS-(CVE-2022-45543)/ -CVE-2022-45544 - https://blog.tristaomarinho.com/schlix-cms-2-2-7-2-arbitrary-file-upload/ -CVE-2022-45544 - https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md -CVE-2022-45546 - https://lgnas.gitbook.io/cve-2022-45546/ -CVE-2022-45557 - https://github.com/hundredrabbits/Left/issues/167 -CVE-2022-45558 - https://github.com/hundredrabbits/Left/issues/168 -CVE-2022-45562 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562 -CVE-2022-45586 - https://forum.xpdfreader.com/viewtopic.php?t=42361 -CVE-2022-45587 - https://forum.xpdfreader.com/viewtopic.php?t=42361 -CVE-2022-45598 - https://github.com/laurent22/joplin/commit/a2de167b95debad83a0f0c7925a88c0198db812e -CVE-2022-45598 - https://github.com/laurent22/joplin/releases/tag/v2.9.17 -CVE-2022-45599 - https://github.com/ethancunt/CVE-2022-45599 -CVE-2022-45600 - https://github.com/ethancunt/CVE-2022-45600 -CVE-2022-45613 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss -CVE-2022-45613 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e -CVE-2022-45614 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash -CVE-2022-4562 - https://wpscan.com/vulnerability/2013d79b-e9f6-4a5a-b421-e840a3bae063 -CVE-2022-45634 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45634 -CVE-2022-45635 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45635 -CVE-2022-45636 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636 -CVE-2022-45636 - https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co -CVE-2022-45637 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45637 -CVE-2022-45639 - http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html -CVE-2022-45639 - http://www.binaryworld.it/ -CVE-2022-45639 - https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639 -CVE-2022-45640 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6v1.0_vuln/Tenda%20AC6V1.0%20V15.03.05.19%20Stack%20overflow%20vulnerability.md -CVE-2022-45640 - https://vulncheck.com/blog/xiongmai-iot-exploitation -CVE-2022-45641 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetMacFilterCfg/formSetMacFilterCfg.md -CVE-2022-45643 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md -CVE-2022-45644 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md -CVE-2022-45645 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceMac/addWifiMacFilter_derviceMac.md -CVE-2022-45646 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeedUp/formSetClientState_limitSpeed.md -CVE-2022-45647 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md -CVE-2022-45648 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetDeviceName/formSetDeviceName.md -CVE-2022-45649 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_endIp/formSetPPTPServer_endIp.md -CVE-2022-45650 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetFirewallCfg/formSetFirewallCfg.md -CVE-2022-45651 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md -CVE-2022-45652 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_startIp/formSetPPTPServer_startIp.md -CVE-2022-45653 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromNatStaticSetting/fromNatStaticSetting_page.md -CVE-2022-45654 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_ssid/form_fast_setting_wifi_set_ssid.md -CVE-2022-45655 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_timeZone/form_fast_setting_wifi_set_timeZone.md -CVE-2022-45656 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetSysTime/fromSetSysTime.md -CVE-2022-45657 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetIpMacBind/fromSetIpMacBind.md -CVE-2022-45658 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedEndTime/setSchedWifi_schedEndTime.md -CVE-2022-45659 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetWirelessRepeat/fromSetWirelessRepeat.md -CVE-2022-4566 - https://gitee.com/y_project/RuoYi/issues/I65V2B -CVE-2022-4566 - https://github.com/luelueking/ruoyi-4.7.5-vuln-poc -CVE-2022-45660 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedStartTime/setSchedWifi_schedStartTime.md -CVE-2022-45661 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSmartPowerManagement/setSmartPowerManagement.md -CVE-2022-45663 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWifiMacFilterSet/formWifiMacFilterSet.md -CVE-2022-45664 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDget/formWifiMacFilterGet.md -CVE-2022-45665 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetCfm/formWifiMacFilterSet.md -CVE-2022-45666 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDset/formwrlSSIDset.md -CVE-2022-45667 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md -CVE-2022-45668 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolReboot/fromSysToolReboot.md -CVE-2022-45669 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formWifiMacFilterGet/formWifiMacFilterGet.md -CVE-2022-4567 - https://huntr.dev/bounties/1ac677c4-ec0a-4788-9465-51d9b6bd8fd2 -CVE-2022-45670 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formSetAutoPing_ping1/formSetAutoPing_ping1.md -CVE-2022-45671 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md -CVE-2022-45672 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWx3AuthorizeSet/formWx3AuthorizeSet.md -CVE-2022-45673 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolRestoreSet/fromSysToolRestoreSet.md -CVE-2022-45674 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolReboot/fromSysToolReboot.md -CVE-2022-45677 - https://github.com/yukar1z0e/temp/blob/main/README.md -CVE-2022-45685 - https://github.com/jettison-json/jettison/issues/54 -CVE-2022-45688 - https://github.com/stleary/JSON-java/issues/708 -CVE-2022-45690 - https://github.com/stleary/JSON-java/issues/654 -CVE-2022-45693 - https://github.com/jettison-json/jettison/issues/52 -CVE-2022-45697 - https://github.com/Wh04m1001/CVE -CVE-2022-45699 - https://www.youtube.com/watch?v=YNeeaDPJOBY -CVE-2022-4570 - https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef -CVE-2022-45701 - https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701 -CVE-2022-45703 - https://sourceware.org/bugzilla/show_bug.cgi?id=29799 -CVE-2022-45706 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SJZx0L0Sj -CVE-2022-45707 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HyEfIEpBj -CVE-2022-45708 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1rR3UArj -CVE-2022-45709 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BkFpXcsSs -CVE-2022-4571 - https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00 -CVE-2022-45710 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1XG-5iSo -CVE-2022-45711 - https://hackmd.io/dLM8vDnwQOup8mmDbHJRHQ?both -CVE-2022-45712 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/r1pG4cori -CVE-2022-45714 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/S1QhLw0Ss -CVE-2022-45715 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HkJ_o8Arj -CVE-2022-45716 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/rywHivCBo -CVE-2022-45717 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/By3Y6DRrj -CVE-2022-45718 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/Hkb38vELj -CVE-2022-45719 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJ8I_DCBi -CVE-2022-45720 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SkCD5PEUo -CVE-2022-45721 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJUfyuABo -CVE-2022-45748 - https://github.com/assimp/assimp/issues/4286 -CVE-2022-4576 - https://wpscan.com/vulnerability/0d679e0e-891b-44f1-ac7f-a766e12956e0 -CVE-2022-45768 - https://github.com/Erebua/CVE/blob/main/Edimax.md -CVE-2022-45768 - https://www.lovesandy.cc/2022/11/20/EDIMAX%E6%BC%8F%E6%B4%9E/ -CVE-2022-4577 - https://wpscan.com/vulnerability/85d9fad7-ba3d-4140-ae05-46262d2643e6 -CVE-2022-45770 - https://hackmag.com/security/aguard-cve/ -CVE-2022-45770 - https://xakep.ru/2023/01/27/aguard-cve/ -CVE-2022-45771 - https://github.com/pwndoc/pwndoc/issues/401 -CVE-2022-4578 - https://wpscan.com/vulnerability/fad16c68-9f14-4866-b241-40468fb71494 -CVE-2022-45781 - https://www.cnblogs.com/FALL3N/p/16813932.html -CVE-2022-4580 - https://wpscan.com/vulnerability/e54804c7-68a9-4c4c-94f9-1c3c9b97e8ca -CVE-2022-4584 - https://vuldb.com/?id.216170 -CVE-2022-45868 - https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243 -CVE-2022-45869 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15 -CVE-2022-45889 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45890 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45891 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45892 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45893 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45894 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45895 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -CVE-2022-45896 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/- -CVE-2022-45914 - http://packetstormsecurity.com/files/170177/Zhuhai-Suny-Technology-ESL-Tag-Forgery-Replay-Attacks.html -CVE-2022-45914 - http://seclists.org/fulldisclosure/2022/Dec/6 -CVE-2022-45915 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html -CVE-2022-45915 - http://seclists.org/fulldisclosure/2022/Dec/7 -CVE-2022-45915 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ -CVE-2022-45916 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html -CVE-2022-45916 - http://seclists.org/fulldisclosure/2022/Dec/7 -CVE-2022-45916 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ -CVE-2022-45917 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html -CVE-2022-45917 - http://seclists.org/fulldisclosure/2022/Dec/7 -CVE-2022-45917 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ -CVE-2022-45918 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html -CVE-2022-45918 - http://seclists.org/fulldisclosure/2022/Dec/7 -CVE-2022-45918 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ -CVE-2022-45922 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html -CVE-2022-45922 - http://seclists.org/fulldisclosure/2023/Jan/14 -CVE-2022-45922 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ -CVE-2022-45923 - http://packetstormsecurity.com/files/170613/OpenText-Extended-ECM-22.3-cs.exe-Remote-Code-Execution.html -CVE-2022-45923 - http://seclists.org/fulldisclosure/2023/Jan/10 -CVE-2022-45923 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-in-csexe-opentext-server-component/ -CVE-2022-45924 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html -CVE-2022-45924 - http://seclists.org/fulldisclosure/2023/Jan/14 -CVE-2022-45924 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ -CVE-2022-45925 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html -CVE-2022-45925 - http://seclists.org/fulldisclosure/2023/Jan/14 -CVE-2022-45925 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ -CVE-2022-45926 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html -CVE-2022-45926 - http://seclists.org/fulldisclosure/2023/Jan/14 -CVE-2022-45926 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ -CVE-2022-45927 - http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html -CVE-2022-45927 - http://seclists.org/fulldisclosure/2023/Jan/13 -CVE-2022-45927 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ -CVE-2022-45928 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html -CVE-2022-45928 - http://seclists.org/fulldisclosure/2023/Jan/14 -CVE-2022-45928 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ -CVE-2022-45942 - https://github.com/This-is-Y/baijiacms-RCE -CVE-2022-45942 - https://this-is-y.xyz/2022/11/20/baijiacmsV4-RCE/ -CVE-2022-45956 - https://packetstormsecurity.com/files/169962/Boa-Web-Server-0.94.13-0.94.14-Authentication-Bypass.html -CVE-2022-45957 - https://packetstormsecurity.com/files/169949/ZTE-ZXHN-H108NS-Stack-Buffer-Overflow-Denial-Of-Service.html -CVE-2022-45957 - https://packetstormsecurity.com/files/169958/ZTE-ZXHN-H108NS-Authentication-Bypass.html -CVE-2022-4596 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-45962 - https://ccat.gitbook.io/cyber-sec/cve/cve-2022-45962-postauth-sqli -CVE-2022-4597 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-45977 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/3 -CVE-2022-45979 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/4 -CVE-2022-4598 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-45980 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/6 -CVE-2022-4599 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-45995 - https://github.com/bugfinder0/public_bug/tree/main/tenda/ax12/1 -CVE-2022-45996 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2 -CVE-2022-45997 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/1 -CVE-2022-4600 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-4601 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-4602 - https://seclists.org/fulldisclosure/2022/Dec/11 -CVE-2022-46047 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/categories_delete_sql_injection/categories_delete_sql_injection.md -CVE-2022-4605 - https://huntr.dev/bounties/df455d44-0dec-470c-b576-8ea86ec5a367 -CVE-2022-46051 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/view_all_comments_update/view_all_comments_update.MD -CVE-2022-46059 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-CSRF/add_user_csrf/add_user_csrf.md -CVE-2022-4606 - https://huntr.dev/bounties/3dab0466-c35d-4163-b3c7-a8666e2f7d95 -CVE-2022-46062 - https://github.com/rdyx0/CVE/blob/master/Gym%20Management%20System/CSRF/delete_user/delete_user.md -CVE-2022-46071 - https://yuyudhn.github.io/CVE-2022-46071/ -CVE-2022-46072 - https://yuyudhn.github.io/CVE-2022-46072/ -CVE-2022-46073 - https://yuyudhn.github.io/CVE-2022-46073/ -CVE-2022-46074 - https://www.youtube.com/watch?v=5Q3vyTo02bc&ab_channel=IkariShinji -CVE-2022-46074 - https://yuyudhn.github.io/CVE-2022-46074/ -CVE-2022-46076 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-869 -CVE-2022-46076 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46087 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-46087/poc.md -CVE-2022-46088 - https://packetstormsecurity.com -CVE-2022-4609 - https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce -CVE-2022-46093 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Hospital-Management-System/Hospital-Management-System.md -CVE-2022-46095 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc/covid-19-vaccination.md -CVE-2022-46096 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc2/covid-19-vaccination2.md -CVE-2022-4610 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-46109 - https://github.com/z1r00/IOT_Vul/tree/main/Tenda/AC10/formSetClientState -CVE-2022-4611 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-4612 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-4613 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -CVE-2022-4613 - https://vuldb.com/?id.216275 -CVE-2022-46135 - https://github.com/MegaTKC/AeroCMS/issues/5 -CVE-2022-4614 - https://huntr.dev/bounties/8b429330-3096-4fe4-85e0-1a9143e4dca5 -CVE-2022-4615 - https://huntr.dev/bounties/9c66ece4-bcaa-417d-8b98-e8daff8a728b -CVE-2022-46152 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1 -CVE-2022-46161 - https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/ -CVE-2022-4617 - https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df -CVE-2022-46172 - https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5 -CVE-2022-46179 - https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf -CVE-2022-4621 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04 -CVE-2022-4622 - https://wpscan.com/vulnerability/ea055ed4-324d-4d77-826a-b6f814413eb2 -CVE-2022-4623 - https://wpscan.com/vulnerability/1b3201da-f254-406f-9b4a-cd5025b6b03d -CVE-2022-4624 - https://wpscan.com/vulnerability/e7dc0202-6be4-46fc-a451-fb3a25727b51 -CVE-2022-4625 - https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15 -CVE-2022-4626 - https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d -CVE-2022-4627 - https://wpscan.com/vulnerability/be9e8870-0682-441d-8955-d096d1346bd1 -CVE-2022-4628 - https://wpscan.com/vulnerability/6ae719da-c43c-4b3a-bb8a-efa1de20100a -CVE-2022-46280 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670 -CVE-2022-46289 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665 -CVE-2022-4629 - https://wpscan.com/vulnerability/cf0a51f9-21d3-4ae8-b7d2-361921038fe8 -CVE-2022-46290 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665 -CVE-2022-46291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 -CVE-2022-46292 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 -CVE-2022-46293 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 -CVE-2022-46294 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 -CVE-2022-46295 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 -CVE-2022-4630 - https://huntr.dev/bounties/401661ee-40e6-4ee3-a925-3716b96ece5c -CVE-2022-4636 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01 -CVE-2022-46377 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 -CVE-2022-46378 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 -CVE-2022-46381 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-46381/CVE-2022-46381.txt -CVE-2022-46395 - http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html -CVE-2022-4640 - https://gitee.com/mingSoft/MCMS/issues/I65KI5 -CVE-2022-46407 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-46408 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-46428 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1hP34Hvj -CVE-2022-46430 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi -CVE-2022-46432 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/B1Vgv1uwo -CVE-2022-46434 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/rJl69Icws -CVE-2022-46435 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SyvnlO9Pi -CVE-2022-4644 - https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0 -CVE-2022-46440 - https://github.com/keepinggg/poc -CVE-2022-46440 - https://github.com/matthiaskramm/swftools/issues/194 -CVE-2022-46443 - https://www.youtube.com/watch?v=Dmjk6uOU8vY -CVE-2022-46443 - https://yuyudhn.github.io/CVE-2022-46443/ -CVE-2022-4645 - https://gitlab.com/libtiff/libtiff/-/issues/277 -CVE-2022-4646 - https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10 -CVE-2022-4647 - https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242 -CVE-2022-46475 - https://github.com/Insight8991/iot/blob/main/DIR-645%20genacgi%20Stack%20overflow.md -CVE-2022-46476 - https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md -CVE-2022-46478 - https://github.com/WeiYe-Jing/datax-web/issues/587 -CVE-2022-4648 - https://wpscan.com/vulnerability/9bbfb664-5b83-452b-82bb-562a1e18eb65 -CVE-2022-46485 - https://github.com/WodenSec/CVE-2022-46485 -CVE-2022-46486 - https://jovanbulck.github.io/files/ccs19-tale.pdf -CVE-2022-46489 - https://github.com/gpac/gpac/issues/2328 -CVE-2022-4649 - https://wpscan.com/vulnerability/0d9ba176-97be-4b6b-9cf1-6c3047321a1e -CVE-2022-46490 - https://github.com/gpac/gpac/issues/2327 -CVE-2022-46491 - https://github.com/Fanli2012/nbnbk/issues/2 -CVE-2022-4650 - https://wpscan.com/vulnerability/b430fdaa-191a-429e-b6d2-479b32bb1075 -CVE-2022-4651 - https://wpscan.com/vulnerability/d8182075-7472-48c8-8e9d-94b12ab6fcf6 -CVE-2022-4652 - https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc -CVE-2022-4653 - https://wpscan.com/vulnerability/fa44ed44-9dac-4b4f-aaa3-503b76034578 -CVE-2022-46530 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/GetParentControlInfo/GetParentControlInfo.md -CVE-2022-46531 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md -CVE-2022-46532 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceMac/addWifiMacFilter_deviceMac.md -CVE-2022-46533 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md -CVE-2022-46534 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetSpeedWan/formSetSpeedWan.md -CVE-2022-46535 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_deviceId/formSetClientState_deviceId.md -CVE-2022-46536 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeedUp/formSetClientState_limitSpeedUp.md -CVE-2022-46537 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security/formWifiBasicSet_security.md -CVE-2022-46538 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWriteFacMac/formWriteFacMac.md -CVE-2022-46539 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security%20_5g/formWifiBasicSet_security_5g.md -CVE-2022-4654 - https://wpscan.com/vulnerability/a29744cd-b760-4757-8564-883d59fa4881 -CVE-2022-46540 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_entrys/fromAddressNat_entrys.md -CVE-2022-46541 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/form_fast_setting_wifi_set/form_fast_setting_wifi_set.md -CVE-2022-46542 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_page/fromAddressNat_page.md -CVE-2022-46543 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_mitInterface/fromAddressNat_mitInterface.md -CVE-2022-46544 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formexeCommand/formexeCommand.md -CVE-2022-46545 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromNatStaticSetting/fromNatStaticSetting.md -CVE-2022-46546 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromRouteStatic/fromRouteStatic.md -CVE-2022-46547 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromVirtualSer/fromVirtualSer.md -CVE-2022-46548 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromDhcpListClient/fromDhcpListClient.md -CVE-2022-46549 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_deviceId/saveParentControlInfo_deviceId.md -CVE-2022-4655 - https://wpscan.com/vulnerability/a1c70c80-e952-4cc7-aca0-c2dde3fa08a9 -CVE-2022-46550 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md -CVE-2022-46551 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_time/saveParentControlInfo_time.md -CVE-2022-46552 - http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html -CVE-2022-46552 - https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e -CVE-2022-46552 - https://github.com/c2dc/cve-reported/blob/main/CVE-2022-46552/CVE-2022-46552.md -CVE-2022-46552 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4656 - https://wpscan.com/vulnerability/05976ed8-5a26-4eae-adb2-0ea3b2722391 -CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp -CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe -CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pptp -CVE-2022-46560 - https://hackmd.io/@0dayResearch/rkXr4BQPi -CVE-2022-46560 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_L2TP -CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPPoE -CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPTP -CVE-2022-46561 - https://hackmd.io/@0dayResearch/ry55QVQvj -CVE-2022-46561 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46562 - https://hackmd.io/@0dayResearch/B1C9jeXDi -CVE-2022-46562 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_PSK -CVE-2022-46562 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46563 - https://hackmd.io/@0dayResearch/HkDzZLCUo -CVE-2022-46563 - https://hackmd.io/@0dayResearch/SetDynamicDNSSettings -CVE-2022-46563 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46566 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_Password -CVE-2022-46566 - https://hackmd.io/@0dayResearch/SyhDme7wo -CVE-2022-46566 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46568 - https://hackmd.io/@0dayResearch/B1SZP0aIo -CVE-2022-46568 - https://hackmd.io/@0dayResearch/SetSysEmailSettings -CVE-2022-46568 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46569 - https://hackmd.io/@0dayResearch/SetWLanRadioSecurity -CVE-2022-46569 - https://hackmd.io/@0dayResearch/r1R6sWRUs -CVE-2022-46569 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4657 - https://wpscan.com/vulnerability/a90a413d-0e00-4da8-a339-d6cdfba70bb3 -CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp -CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe -CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pptp -CVE-2022-46570 - https://hackmd.io/@0dayResearch/r1zsTSmDs -CVE-2022-46570 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4658 - https://wpscan.com/vulnerability/c7a17eb9-2811-45ba-bab3-f53b2fa7d051 -CVE-2022-46581 - https://brief-nymphea-813.notion.site/Vul5-TEW755-bof-tools_nslookup-c83bac14fe0f4f729535053459479fd1 -CVE-2022-46603 - https://github.com/10cks/inkdropPoc -CVE-2022-46604 - http://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html -CVE-2022-46604 - https://medium.com/@_sadshade/file-extention-bypass-in-responsive-filemanager-9-5-5-leading-to-rce-authenticated-3290eddc54e7 -CVE-2022-4661 - https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f -CVE-2022-46631 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6 -CVE-2022-46634 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7 -CVE-2022-46637 - https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.html -CVE-2022-46637 - https://prolink2u.com/product/prs1841/ -CVE-2022-46639 - https://ia-informatica.com/it/CVE-2022-46639 -CVE-2022-4664 - https://wpscan.com/vulnerability/d6a9cfaa-d3fa-442e-a9a1-b06588723e39 -CVE-2022-46640 - https://pwning.tech/cve-2022-46640/ -CVE-2022-46641 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetIpMacBindSettings%20Command%20Injection%20Vulnerability.md -CVE-2022-46641 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-46642 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetAutoUpgradeInfo%20command%20injection%20vulnerability.md -CVE-2022-46642 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4665 - https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f -CVE-2022-4666 - https://wpscan.com/vulnerability/a6d23f2f-9504-40da-9b71-189033d8bd1d -CVE-2022-4667 - https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d -CVE-2022-4668 - https://wpscan.com/vulnerability/3e43156a-b784-4066-be69-23b139aafbad -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/24 -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/25 -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-4669 - https://wpscan.com/vulnerability/79f011e4-3422-4307-8736-f27048796aae -CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-46697 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-4670 - https://wpscan.com/vulnerability/2a67c290-2a27-44fe-95ae-2d427e9d7548 -CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/21 -CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/27 -CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/28 -CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/23 -CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/26 -CVE-2022-46702 - http://seclists.org/fulldisclosure/2022/Dec/20 -CVE-2022-4671 - https://wpscan.com/vulnerability/14c83830-3207-4f92-b8f5-afd7cc93af88 -CVE-2022-4672 - https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d -CVE-2022-4673 - https://wpscan.com/vulnerability/1c4f379d-252a-487b-81c9-bf711ab71dff -CVE-2022-4674 - https://wpscan.com/vulnerability/eda64678-81ae-4be3-941e-a1e26e54029b -CVE-2022-46741 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md -CVE-2022-4675 - https://wpscan.com/vulnerability/21f4cc5d-c4b4-495f-acf3-9fdf53591052 -CVE-2022-4676 - https://wpscan.com/vulnerability/1df3c17c-990d-4074-b1d5-b26da880d88e -CVE-2022-46764 - https://vuldb.com/?diff.216845 -CVE-2022-4677 - https://wpscan.com/vulnerability/9c293098-de54-4a04-b13d-2a702200f02e -CVE-2022-46770 - http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html -CVE-2022-46770 - https://github.com/mirage/qubes-mirage-firewall/issues/166 -CVE-2022-4678 - https://wpscan.com/vulnerability/6a36d665-a0ca-4346-8e55-cf9ba45966cc -CVE-2022-46786 - https://support.squaredup.com -CVE-2022-4679 - https://wpscan.com/vulnerability/c817c4af-cff2-4720-944d-c59e27544d41 -CVE-2022-4680 - https://wpscan.com/vulnerability/f4197386-975d-4e53-8fc9-9425732da9af -CVE-2022-4681 - https://wpscan.com/vulnerability/5a4096e8-abe4-41c4-b741-c44e740e8689 -CVE-2022-4682 - https://wpscan.com/vulnerability/5fc92954-20cf-4563-806e-e7a8e5ccfc72 -CVE-2022-4683 - https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef -CVE-2022-4686 - https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637 -CVE-2022-4687 - https://huntr.dev/bounties/b908377f-a61b-432c-8e6a-c7498da69788 -CVE-2022-46874 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746139 -CVE-2022-46875 - https://bugzilla.mozilla.org/show_bug.cgi?id=1786188 -CVE-2022-46887 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities -CVE-2022-46888 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities -CVE-2022-46889 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities -CVE-2022-4689 - https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3 -CVE-2022-46890 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities -CVE-2022-4690 - https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335 -CVE-2022-4691 - https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f -CVE-2022-46910 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BkwzORiDo -CVE-2022-46912 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/Sk6sfbTPi -CVE-2022-46914 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJ4czlpwi -CVE-2022-4692 - https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74 -CVE-2022-4693 - https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea -CVE-2022-46934 - https://github.com/kekingcn/kkFileView/issues/411 -CVE-2022-4694 - https://huntr.dev/bounties/a4d865c2-1a2b-4e3a-aaae-915b0dfc3f22 -CVE-2022-4695 - https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789 -CVE-2022-46957 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tracking.zip -CVE-2022-46965 - https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-hg7m-23j3-rf56 -CVE-2022-46966 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html -CVE-2022-46967 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html -CVE-2022-46968 - https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html -CVE-2022-4699 - https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9 -CVE-2022-47027 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2022-47027/CVE%20detail.md -CVE-2022-47028 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47028/CVE%20detailed.md -CVE-2022-47029 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md -CVE-2022-47035 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-47036 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html -CVE-2022-47037 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html -CVE-2022-4706 - https://wpscan.com/vulnerability/30882a45-ca03-4ff1-a36d-758d9b9b641c -CVE-2022-47065 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/01/README.md -CVE-2022-47069 - https://sourceforge.net/p/p7zip/bugs/241/ -CVE-2022-47070 - https://github.com/Sylon001/NVS-365-Camera/tree/master/NVS365%20Network%20Video%20Server%20Password%20Information%20Unauthorized%20Access%20Vulnerability -CVE-2022-47072 - https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection -CVE-2022-47073 - https://medium.com/@shiva.infocop/stored-xss-found-in-small-crm-phpgurukul-7890ea3c04df -CVE-2022-47073 - https://packetstormsecurity.com -CVE-2022-47075 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html -CVE-2022-47075 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/ -CVE-2022-47076 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html -CVE-2022-47076 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/ -CVE-2022-47083 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5720.php -CVE-2022-47085 - https://doc.rust-lang.org/std/macro.eprintln.html -CVE-2022-47086 - https://github.com/gpac/gpac/issues/2337 -CVE-2022-47087 - https://github.com/gpac/gpac/issues/2339 -CVE-2022-47088 - https://github.com/gpac/gpac/issues/2340 -CVE-2022-47089 - https://github.com/gpac/gpac/issues/2338 -CVE-2022-47091 - https://github.com/gpac/gpac/issues/2343 -CVE-2022-47092 - https://github.com/gpac/gpac/issues/2347 -CVE-2022-47093 - https://github.com/gpac/gpac/issues/2344 -CVE-2022-47094 - https://github.com/gpac/gpac/issues/2345 -CVE-2022-47095 - https://github.com/gpac/gpac/issues/2346 -CVE-2022-47102 - https://github.com/sudoninja-noob/CVE-2022-47102/blob/main/CVE-2022-47102 -CVE-2022-47130 - https://portswigger.net/web-security/csrf -CVE-2022-47130 - https://xpsec.co/blog/academy-lms-5-10-coupon-csrf -CVE-2022-47131 - https://portswigger.net/web-security/csrf -CVE-2022-47131 - https://portswigger.net/web-security/csrf/xss-vs-csrf -CVE-2022-47131 - https://xpsec.co/blog/academy-lms-5-10-add-page-csrf-xss -CVE-2022-47132 - https://portswigger.net/web-security/csrf -CVE-2022-47132 - https://xpsec.co/blog/academy-lms-5-10-add-admin-csrf -CVE-2022-4714 - https://wpscan.com/vulnerability/61b475f1-bbfb-4450-a3b2-b8caf5df2340 -CVE-2022-4715 - https://wpscan.com/vulnerability/4394fe86-4240-4454-b724-81464b04123a -CVE-2022-4716 - https://wpscan.com/vulnerability/24176ad3-2317-4853-b4db-8394384d52cd -CVE-2022-4717 - https://wpscan.com/vulnerability/14b679f5-44a8-46d4-89dd-94eb647cb672 -CVE-2022-4718 - https://wpscan.com/vulnerability/04d7cd44-9e18-42b9-9f79-cc9cd6980526 -CVE-2022-4719 - https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09 -CVE-2022-47194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 -CVE-2022-47195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 -CVE-2022-47196 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 -CVE-2022-47197 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 -CVE-2022-4720 - https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70 -CVE-2022-4721 - https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720 -CVE-2022-4722 - https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58 -CVE-2022-4723 - https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c -CVE-2022-4724 - https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445 -CVE-2022-4730 - https://vuldb.com/?id.216744 -CVE-2022-4732 - https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa -CVE-2022-4733 - https://huntr.dev/bounties/f353adfb-e5b8-43e7-957a-894670fd4ccd -CVE-2022-4744 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html -CVE-2022-4745 - https://wpscan.com/vulnerability/9703f42e-bdfe-4787-92c9-47963d9af425 -CVE-2022-4746 - https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32 -CVE-2022-4747 - https://wpscan.com/vulnerability/004f1872-1576-447f-8837-f29fa319cbdc -CVE-2022-4749 - https://wpscan.com/vulnerability/8afc3b2a-81e5-4b6f-8f4c-c48492843569 -CVE-2022-4750 - https://wpscan.com/vulnerability/7bdc1324-8d08-4185-971f-8d49367702cf -CVE-2022-47502 - https://www.openoffice.org/security/cves/CVE-2022-47502.html -CVE-2022-4751 - https://wpscan.com/vulnerability/dd5cc04a-042d-402a-ab7a-96aff3d57478 -CVE-2022-47514 - https://github.com/jumpycastle/xmlrpc.net-poc -CVE-2022-4752 - https://wpscan.com/vulnerability/309799dd-dea7-489d-8d18-b6014534f5af -CVE-2022-47529 - http://seclists.org/fulldisclosure/2023/Mar/26 -CVE-2022-47529 - http://seclists.org/fulldisclosure/2024/Apr/17 -CVE-2022-47529 - https://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt -CVE-2022-47529 - https://packetstormsecurity.com/files/171476/RSA-NetWitness-Endpoint-EDR-Agent-12.x-Incorrect-Access-Control-Code-Execution.html -CVE-2022-4753 - https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126 -CVE-2022-47531 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2022-47532 - https://herolab.usd.de/security-advisories/usd-2022-0064/ -CVE-2022-4754 - https://wpscan.com/vulnerability/d2cc0ab2-9bfd-4a09-ac31-bd90e6da12db -CVE-2022-47547 - https://arxiv.org/pdf/2212.05197.pdf -CVE-2022-4756 - https://wpscan.com/vulnerability/d67b0f7a-fdb1-4305-9976-c5f77b0e3b61 -CVE-2022-4757 - https://wpscan.com/vulnerability/30211ffd-8751-4354-96d3-69b0106100b1 -CVE-2022-47577 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a -CVE-2022-47578 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a -CVE-2022-4758 - https://wpscan.com/vulnerability/c2c89234-5e9c-47c8-9827-8ab0b10fb7d6 -CVE-2022-47583 - https://dgl.cx/2023/09/ansi-terminal-security#mintty -CVE-2022-4759 - https://wpscan.com/vulnerability/63328927-5614-4fa1-8f46-46ff0c8eb959 -CVE-2022-4760 - https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d -CVE-2022-4761 - https://wpscan.com/vulnerability/ad163020-8b9c-42cb-a55f-b137b224bafb -CVE-2022-4762 - https://wpscan.com/vulnerability/4500566a-e5f2-40b8-a185-2bcace221b4e -CVE-2022-4763 - https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5 -CVE-2022-47630 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html -CVE-2022-47631 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html -CVE-2022-47631 - http://seclists.org/fulldisclosure/2023/Sep/6 -CVE-2022-47631 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-002.txt -CVE-2022-47632 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html -CVE-2022-47632 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html -CVE-2022-47632 - http://seclists.org/fulldisclosure/2023/Sep/6 -CVE-2022-47632 - https://syss.de -CVE-2022-47632 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt -CVE-2022-47635 - https://wildix.atlassian.net/wiki/spaces/DOC/pages/30279136/Changelogs -CVE-2022-47636 - http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html -CVE-2022-47636 - https://www.exploit-db.com/exploits/51678 -CVE-2022-4764 - https://wpscan.com/vulnerability/788c6aa2-14cc-411f-95e8-5994f8c82d70 -CVE-2022-4765 - https://wpscan.com/vulnerability/a21dc4a3-a4f3-4619-b8a3-493a27e14ccb -CVE-2022-47653 - https://github.com/gpac/gpac/issues/2349 -CVE-2022-47654 - https://github.com/gpac/gpac/issues/2350 -CVE-2022-47655 - https://github.com/strukturag/libde265/issues/367 -CVE-2022-47656 - https://github.com/gpac/gpac/issues/2353 -CVE-2022-47657 - https://github.com/gpac/gpac/issues/2355 -CVE-2022-47658 - https://github.com/gpac/gpac/issues/2356 -CVE-2022-47659 - https://github.com/gpac/gpac/issues/2354 -CVE-2022-47660 - https://github.com/gpac/gpac/issues/2357 -CVE-2022-47661 - https://github.com/gpac/gpac/issues/2358 -CVE-2022-47662 - https://github.com/gpac/gpac/issues/2359 -CVE-2022-47663 - https://github.com/gpac/gpac/issues/2360 -CVE-2022-47664 - https://github.com/strukturag/libde265/issues/368 -CVE-2022-47665 - https://github.com/strukturag/libde265/issues/369 -CVE-2022-47673 - https://sourceware.org/bugzilla/show_bug.cgi?id=29876 -CVE-2022-4769 - https://support.pentaho.com/hc/en-us/articles/14452244712589--Resolved-Pentaho-BA-Server-Generation-of-Error-Message-Containing-Sensitive-Information-Versions-before-9-4-0-0-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-4769- -CVE-2022-47695 - https://sourceware.org/bugzilla/show_bug.cgi?id=29846 -CVE-2022-47696 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677 -CVE-2022-47732 - https://www.swascan.com/security-advisory-yeastar-n412-and-n824-configuration-panel/ -CVE-2022-4774 - https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e -CVE-2022-4775 - https://wpscan.com/vulnerability/5ab3fc58-7d1c-4bcd-8bbd-86c62a3f979c -CVE-2022-47758 - https://pwning.tech/cve-2022-47758 -CVE-2022-47758 - https://pwning.tech/cve-2022-47758/ -CVE-2022-4776 - https://wpscan.com/vulnerability/d5ea8f7f-7d5a-4b2e-a070-a9aef7cac58a -CVE-2022-47767 - https://www.swascan.com/security-advisory-solar-log/ -CVE-2022-47768 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ -CVE-2022-47769 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ -CVE-2022-4777 - https://wpscan.com/vulnerability/b4c53bef-e868-46f1-965d-720b5b9a931e -CVE-2022-47770 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ -CVE-2022-4781 - https://wpscan.com/vulnerability/a2803027-b822-4bf9-8d1d-6f538681af9d -CVE-2022-4782 - https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5 -CVE-2022-4783 - https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252 -CVE-2022-4784 - https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9 -CVE-2022-4785 - https://wpscan.com/vulnerability/61873267-9f4f-4be5-bad6-95229ad54b99 -CVE-2022-47853 - https://github.com/Am1ngl/ttt/tree/main/16 -CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155 -CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155#issue-1501906608 -CVE-2022-4786 - https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0 -CVE-2022-4787 - https://wpscan.com/vulnerability/2ab59972-ccfd-48f6-b879-58fb38823ca5 -CVE-2022-47870 - https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html -CVE-2022-47873 - https://fordefence.com/cve-2022-47873-keos-software-xx/ -CVE-2022-47874 - http://packetstormsecurity.com/files/172156/Jedox-2020.2.5-Database-Credential-Disclosure.html -CVE-2022-47875 - http://packetstormsecurity.com/files/172152/Jedox-2022.4.2-Directory-Traversal-Remote-Code-Execution.html -CVE-2022-47876 - http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html -CVE-2022-47877 - http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html -CVE-2022-47878 - http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html -CVE-2022-4788 - https://wpscan.com/vulnerability/2a162365-5a86-423d-b7c4-55c9b4d8b024 -CVE-2022-47881 - https://www.foxit.com/support/security-bulletins.html -CVE-2022-4789 - https://wpscan.com/vulnerability/5e816e9a-84e5-42d2-a7ff-e46be9072278 -CVE-2022-4790 - https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1 -CVE-2022-4791 - https://wpscan.com/vulnerability/0a6e4c45-3f6d-4150-9546-141c2e3a1782 -CVE-2022-4792 - https://wpscan.com/vulnerability/13304aca-0722-4bd9-b443-a5fed1ce22da -CVE-2022-47924 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json -CVE-2022-47925 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json -CVE-2022-47929 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407 -CVE-2022-4793 - https://wpscan.com/vulnerability/00c34ba8-b82e-4bb9-90b1-1afefae75948 -CVE-2022-47930 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b -CVE-2022-47931 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b -CVE-2022-47938 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 -CVE-2022-47939 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 -CVE-2022-4794 - https://wpscan.com/vulnerability/feb4580d-df15-45c8-b59e-ad406e4b064c -CVE-2022-47940 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18 -CVE-2022-47941 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 -CVE-2022-47942 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 -CVE-2022-47943 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 -CVE-2022-47949 - https://github.com/PabloMK7/ENLBufferPwn -CVE-2022-4795 - https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639 -CVE-2022-4796 - https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6 -CVE-2022-47966 - http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html -CVE-2022-47966 - http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html -CVE-2022-47966 - http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html -CVE-2022-47966 - https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis -CVE-2022-47966 - https://github.com/horizon3ai/CVE-2022-47966 -CVE-2022-47966 - https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/ -CVE-2022-4797 - https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b -CVE-2022-4798 - https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae -CVE-2022-47986 - http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html -CVE-2022-4799 - https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79 -CVE-2022-4800 - https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8 -CVE-2022-48006 - https://github.com/taogogo/taocms/issues/35 -CVE-2022-4801 - https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593 -CVE-2022-48011 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-sql%20injection%20in%20viewerrors-importID.md -CVE-2022-48012 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Reflected%20XSS%20in%20onChangeTag.md -CVE-2022-48013 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md -CVE-2022-48019 - https://github.com/kkent030315/CVE-2022-42046 -CVE-2022-4802 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956 -CVE-2022-4803 - https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286 -CVE-2022-4805 - https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873 -CVE-2022-4806 - https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be -CVE-2022-48063 - https://sourceware.org/bugzilla/show_bug.cgi?id=29924 -CVE-2022-48064 - https://sourceware.org/bugzilla/show_bug.cgi?id=29922 -CVE-2022-48065 - https://sourceware.org/bugzilla/show_bug.cgi?id=29925 -CVE-2022-4807 - https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954 -CVE-2022-48078 - https://github.com/zrax/pycdc/issues/295 -CVE-2022-48079 - https://thanatosxingyu.github.io/ -CVE-2022-4808 - https://huntr.dev/bounties/11877cbf-fcaf-42ef-813e-502c7293f2b5 -CVE-2022-48085 - http://google.com -CVE-2022-4809 - https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29 -CVE-2022-48090 - https://github.com/tramyardg/hotel-mgmt-system/issues/21 -CVE-2022-48091 - https://github.com/tramyardg/hotel-mgmt-system/issues/22 -CVE-2022-4810 - https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e -CVE-2022-48107 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20IPAddress -CVE-2022-48107 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-48108 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20Netmask -CVE-2022-48108 - https://www.dlink.com/en/security-bulletin/ -CVE-2022-4811 - https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c -CVE-2022-48110 - https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html -CVE-2022-48111 - https://devisions.github.io/blog/cve-2022-48111 -CVE-2022-48111 - https://labs.yarix.com/2023/02/siri-wi400-xss-on-login-page-cve-2022-48111/ -CVE-2022-48113 - https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html -CVE-2022-48114 - https://gitee.com/y_project/RuoYi/issues/I65V2B -CVE-2022-48116 - https://github.com/loadream/AyaCMS/issues/10 -CVE-2022-4812 - https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c -CVE-2022-48121 - https://github.com/Am1ngl/ttt/tree/main/16 -CVE-2022-48122 - https://github.com/Am1ngl/ttt/tree/main/17 -CVE-2022-48123 - https://github.com/Am1ngl/ttt/tree/main/15 -CVE-2022-48124 - https://github.com/Am1ngl/ttt/tree/main/14 -CVE-2022-48125 - https://github.com/Am1ngl/ttt/tree/main/13 -CVE-2022-48126 - https://github.com/Am1ngl/ttt/tree/main/12 -CVE-2022-4813 - https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc -CVE-2022-48130 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md -CVE-2022-4814 - https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4 -CVE-2022-48150 - https://github.com/sahilop123/-CVE-2022-48150 -CVE-2022-48164 - https://docs.google.com/document/d/1JgqpBYRxyU0WKDSqkvi4Yo0723k7mrIUeuH9i1eEs8U/edit?usp=sharing -CVE-2022-48164 - https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WN533A8.md -CVE-2022-48177 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html -CVE-2022-48178 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html -CVE-2022-48194 - http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html -CVE-2022-48196 - https://www.bleepingcomputer.com/news/security/netgear-warns-users-to-patch-recently-fixed-wifi-router-bug/ -CVE-2022-48197 - http://packetstormsecurity.com/files/171633/Yahoo-User-Interface-TreeView-2.8.2-Cross-Site-Scripting.html -CVE-2022-48199 - https://giuliamelottigaribaldi.com/cve-2022-48199/ -CVE-2022-48216 - https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae -CVE-2022-4824 - https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0 -CVE-2022-4825 - https://wpscan.com/vulnerability/a2758983-d3a7-4718-b5b8-30169df6780a -CVE-2022-48251 - https://eshard.com/posts/sca-attacks-on-armv8 -CVE-2022-48252 - https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r -CVE-2022-48253 - https://www.soteritsecurity.com/blog/2023/01/nostromo_from_directory_traversal_to_RCE.html -CVE-2022-4826 - https://wpscan.com/vulnerability/59fa32d2-aa66-4980-9ee5-0a7513f3a2b0 -CVE-2022-4827 - https://wpscan.com/vulnerability/f2a922ac-6bc9-4caa-b1cc-9ca9cff4bd51 -CVE-2022-4828 - https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948 -CVE-2022-48281 - https://gitlab.com/libtiff/libtiff/-/issues/488 -CVE-2022-4829 - https://wpscan.com/vulnerability/57e528ce-ec8c-4734-8903-926be36f91e7 -CVE-2022-4830 - https://wpscan.com/vulnerability/ae103336-a411-4ebf-a5f0-2f35701e364c -CVE-2022-48303 - https://savannah.gnu.org/bugs/?62387 -CVE-2022-48306 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-09.md -CVE-2022-48307 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md -CVE-2022-48308 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md -CVE-2022-4831 - https://wpscan.com/vulnerability/872fc8e6-4035-4e5a-9f30-16c482c48c7c -CVE-2022-48311 - https://github.com/swzhouu/CVE-2022-48311 -CVE-2022-4832 - https://wpscan.com/vulnerability/735a33e1-63fb-4f17-812c-3e68709b5c2c -CVE-2022-48323 - https://asec.ahnlab.com/en/47088/ -CVE-2022-4833 - https://wpscan.com/vulnerability/35ba38cf-4f23-4344-8de3-cf3004ebf84c -CVE-2022-48331 - https://cyberintel.es/cve/CVE-2022-48331_Buffer_Overflow_in_Widevine_drm_save_keys_0x69b0/ -CVE-2022-48332 - https://cyberintel.es/cve/CVE-2022-48332_Buffer_Overflow_in_Widevine_drm_save_keys_0x6a18/ -CVE-2022-48333 - https://cyberintel.es/cve/CVE-2022-48333_Buffer_Overflow_in_Widevine_drm_verify_keys_0x730c/ -CVE-2022-48334 - https://cyberintel.es/cve/CVE-2022-48334_Buffer_Overflow_in_Widevine_drm_verify_keys_0x7370/ -CVE-2022-48335 - https://cyberintel.es/cve/CVE-2022-48335_Buffer_Overflow_in_Widevine_PRDiagVerifyProvisioning_0x5f90/ -CVE-2022-48336 - https://cyberintel.es/cve/CVE-2022-48336_Buffer_Overflow_in_Widevine_PRDiagParseAndStoreData_0x5cc8/ -CVE-2022-4834 - https://wpscan.com/vulnerability/6183318f-0230-47a1-87f2-3c5aaef678a5 -CVE-2022-4835 - https://wpscan.com/vulnerability/23c22f46-19a2-4a1a-aaef-0a4007eda031 -CVE-2022-4836 - https://wpscan.com/vulnerability/e9a228dc-d32e-4918-898d-4d7af4662a14 -CVE-2022-4837 - https://wpscan.com/vulnerability/41abeacb-ef3e-4621-89bb-df0f2eb617da -CVE-2022-4838 - https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc -CVE-2022-4839 - https://huntr.dev/bounties/ad954cab-f026-4895-8003-99f5e3b507ed -CVE-2022-4840 - https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01 -CVE-2022-4841 - https://huntr.dev/bounties/fa46b3ef-c621-443a-be3a-0a83fb78ba62 -CVE-2022-4843 - https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f -CVE-2022-4844 - https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3 -CVE-2022-4845 - https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b -CVE-2022-4846 - https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3 -CVE-2022-4847 - https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73 -CVE-2022-4848 - https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc -CVE-2022-48482 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 -CVE-2022-48483 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 -CVE-2022-4849 - https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c -CVE-2022-4850 - https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346 -CVE-2022-48502 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 -CVE-2022-48506 - https://dvsorder.org -CVE-2022-48506 - https://freedom-to-tinker.com/2023/06/14/security-analysis-of-the-dominion-imagecast-x/ -CVE-2022-4851 - https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f -CVE-2022-48545 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42092 -CVE-2022-48547 - https://github.com/Cacti/cacti/issues/1882 -CVE-2022-4855 - https://github.com/joinia/webray.com.cn/blob/main/lead-management-system/leadmanasql.md -CVE-2022-48554 - https://bugs.astron.com/view.php?id=310 -CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/Modbus%20Slave%20(version%207.5.1%20and%20earlier)%20mbs%20file%20has%20a%20buffer%20overflow%20vulnerability.md -CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/poc/poc.mbs -CVE-2022-4856 - https://vuldb.com/?id.217021 -CVE-2022-48560 - https://bugs.python.org/issue39421 -CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md -CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp -CVE-2022-48579 - https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee -CVE-2022-48580 - https://www.securifera.com/advisories/cve-2022-48580/ -CVE-2022-48581 - https://www.securifera.com/advisories/cve-2022-48581/ -CVE-2022-48582 - https://www.securifera.com/advisories/cve-2022-48582/ -CVE-2022-48583 - https://www.securifera.com/advisories/cve-2022-48583/ -CVE-2022-48584 - https://www.securifera.com/advisories/cve-2022-48584/ -CVE-2022-48585 - https://www.securifera.com/advisories/cve-2022-48585/ -CVE-2022-48586 - https://www.securifera.com/advisories/cve-2022-48586/ -CVE-2022-48587 - https://www.securifera.com/advisories/cve-2022-48587/ -CVE-2022-48588 - https://www.securifera.com/advisories/cve-2022-48588/ -CVE-2022-48589 - https://www.securifera.com/advisories/cve-2022-48589/ -CVE-2022-48590 - https://www.securifera.com/advisories/cve-2022-48590/ -CVE-2022-48591 - https://www.securifera.com/advisories/cve-2022-48591/ -CVE-2022-48592 - https://www.securifera.com/advisories/cve-2022-48592/ -CVE-2022-48593 - https://www.securifera.com/advisories/cve-2022-48593/ -CVE-2022-48594 - https://www.securifera.com/advisories/cve-2022-48594/ -CVE-2022-48595 - https://www.securifera.com/advisories/cve-2022-48595/ -CVE-2022-48596 - https://www.securifera.com/advisories/cve-2022-48596/ -CVE-2022-48597 - https://www.securifera.com/advisories/cve-2022-48597/ -CVE-2022-48598 - https://www.securifera.com/advisories/cve-2022-48598/ -CVE-2022-48599 - https://www.securifera.com/advisories/cve-2022-48599/ -CVE-2022-48600 - https://www.securifera.com/advisories/cve-2022-48600/ -CVE-2022-48601 - https://www.securifera.com/advisories/cve-2022-48601/ -CVE-2022-48602 - https://www.securifera.com/advisories/cve-2022-48602/ -CVE-2022-48603 - https://www.securifera.com/advisories/cve-2022-48603/ -CVE-2022-48604 - https://www.securifera.com/advisories/cve-2022-48604/ -CVE-2022-48612 - https://blog.zerdle.net/classlink/ -CVE-2022-48615 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/ -CVE-2022-48616 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/ -CVE-2022-48619 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10 -CVE-2022-48622 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 -CVE-2022-4863 - https://huntr.dev/bounties/42751929-e511-49a9-888d-d5b610da2a45 -CVE-2022-4864 - https://huntr.dev/bounties/b7140709-8f84-4f19-9463-78669fa2175b -CVE-2022-4865 - https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be -CVE-2022-4866 - https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff -CVE-2022-4867 - https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa -CVE-2022-4868 - https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b -CVE-2022-48682 - https://bugzilla.suse.com/show_bug.cgi?id=1200381 -CVE-2022-4872 - https://wpscan.com/vulnerability/c76a1c0b-8a5b-4639-85b6-9eebc63c3aa6 -CVE-2022-4882 - https://vuldb.com/?id.217664 -CVE-2022-4888 - https://wpscan.com/vulnerability/2c2379d0-e373-4587-a747-429d7ee8f6cc -CVE-2022-4897 - https://wpscan.com/vulnerability/7b0eeafe-b9bc-43b2-8487-a23d3960f73f -CVE-2022-4944 - https://github.com/kalcaddle/KodExplorer/issues/512 -CVE-2022-4944 - https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file -CVE-2022-4946 - https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0 -CVE-2022-4953 - http://packetstormsecurity.com/files/174550/WordPress-Elementor-Iframe-Injection.html -CVE-2022-4953 - https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7 -CVE-2022-4956 - https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/ -CVE-2022-4964 - https://bugs.launchpad.net/ubuntu/+source/pipewire/+bug/1995707/ -CVE-2023-0005 - https://security.paloaltonetworks.com/CVE-2023-0005 -CVE-2023-0012 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0016 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0017 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0018 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0019 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0020 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0021 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0022 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0024 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0025 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-0028 - https://huntr.dev/bounties/bfd935f4-2d1d-4d3f-8b59-522abe7dd065 -CVE-2023-0029 - https://vuldb.com/?id.217169 -CVE-2023-0033 - https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0 -CVE-2023-0034 - https://wpscan.com/vulnerability/ffbdb8a1-19c3-45e9-81b0-ad47a0791c4a -CVE-2023-0037 - https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56 -CVE-2023-0043 - https://wpscan.com/vulnerability/e012f23a-7daf-4ef3-b116-d0e2ed5bd0a3 -CVE-2023-0045 - https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8 -CVE-2023-0046 - https://huntr.dev/bounties/2214dc41-f283-4342-95b1-34a2f4fea943 -CVE-2023-0048 - https://huntr.dev/bounties/57abd666-4b9c-4f59-825d-1ec832153e79 -CVE-2023-0049 - https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9 -CVE-2023-0051 - https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9 -CVE-2023-0054 - https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d -CVE-2023-0055 - https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce -CVE-2023-0057 - https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d -CVE-2023-0058 - https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2 -CVE-2023-0059 - https://wpscan.com/vulnerability/5e26c485-9a5a-44a3-95b3-6c063a1c321c -CVE-2023-0060 - https://wpscan.com/vulnerability/be2fc859-3158-4f06-861d-382381a7551b -CVE-2023-0061 - https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb -CVE-2023-0062 - https://wpscan.com/vulnerability/450f94a3-56b1-41c7-ac29-fbda1dc04794 -CVE-2023-0063 - https://wpscan.com/vulnerability/2262f2fc-8122-46ed-8e67-8c34ee35fc97 -CVE-2023-0064 - https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a -CVE-2023-0065 - https://wpscan.com/vulnerability/42c3ac68-4bbc-4d47-ad53-2c9ed48cd677 -CVE-2023-0066 - https://wpscan.com/vulnerability/545c9e2f-bacd-4f30-ae01-de1583e26d32 -CVE-2023-0067 - https://wpscan.com/vulnerability/92f43da9-9903-4bcf-99e8-0e269072d389 -CVE-2023-0068 - https://wpscan.com/vulnerability/4abd1454-380c-4c23-8474-d7da4b2f3b8e -CVE-2023-0069 - https://wpscan.com/vulnerability/d9f00bcb-3746-4a9d-a222-4d532e84615f -CVE-2023-0070 - https://wpscan.com/vulnerability/0d8fbd1a-9fac-42ac-94e0-f8921deb1696 -CVE-2023-0071 - https://wpscan.com/vulnerability/3834a162-2cdc-41e9-9c9d-2b576eed4db9 -CVE-2023-0072 - https://wpscan.com/vulnerability/bb2b876f-7216-4f31-9d1f-a45405c545ce -CVE-2023-0073 - https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987 -CVE-2023-0074 - https://wpscan.com/vulnerability/82f543e3-9397-4364-9546-af5ea134fcd4 -CVE-2023-0075 - https://wpscan.com/vulnerability/097acd6f-3291-4cdc-a054-4432b6350411 -CVE-2023-0076 - https://wpscan.com/vulnerability/a0a44f8a-877c-40df-a3ba-b9b806ffb772/ -CVE-2023-0078 - https://wpscan.com/vulnerability/e667854f-56f8-4dbe-9573-6652a8aacc2c -CVE-2023-0079 - https://wpscan.com/vulnerability/fdaba4d1-950d-4512-95de-cd43fe9e73e5/ -CVE-2023-0080 - https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 -CVE-2023-0081 - https://wpscan.com/vulnerability/76d2963c-ebff-498f-9484-3c3008750c14 -CVE-2023-0082 - https://wpscan.com/vulnerability/e1ba5047-0c39-478f-89c7-b0bb638efdff -CVE-2023-0094 - https://wpscan.com/vulnerability/1453471f-164d-4487-a736-8cea086212fe/ -CVE-2023-0095 - https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f -CVE-2023-0096 - https://wpscan.com/vulnerability/b28150e7-214b-4bcd-85c0-e819c4223484 -CVE-2023-0097 - https://wpscan.com/vulnerability/19379f08-d667-4b1e-a774-0f4a17ad7bff -CVE-2023-0098 - https://wpscan.com/vulnerability/db0b3275-40df-404e-aa8d-53558f0122d8 -CVE-2023-0099 - http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html -CVE-2023-0099 - https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8 -CVE-2023-0106 - https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb -CVE-2023-0107 - https://huntr.dev/bounties/0b28fa57-acb0-47c8-ac48-962ff3898156 -CVE-2023-0108 - https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944 -CVE-2023-0111 - https://huntr.dev/bounties/70da256c-977a-487e-8a6a-9ae22caedbe3 -CVE-2023-0112 - https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6 -CVE-2023-0113 - https://vuldb.com/?id.217591 -CVE-2023-0114 - https://vuldb.com/?id.217592 -CVE-2023-0122 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168 -CVE-2023-0125 - https://vuldb.com/?id.217717 -CVE-2023-0143 - https://wpscan.com/vulnerability/c4cd3d98-9678-49cb-9d1a-551ef8a810b9 -CVE-2023-0144 - https://wpscan.com/vulnerability/d7b3917a-d11f-4216-9d2c-30771d83a7b4 -CVE-2023-0145 - https://wpscan.com/vulnerability/f4e4b4a2-c7cb-42ce-9d5b-bd84efcbf54d -CVE-2023-0146 - https://wpscan.com/vulnerability/d1218c69-4f6a-4b2d-a537-5cc16a46ba7b -CVE-2023-0147 - https://wpscan.com/vulnerability/af9cbb4a-42fc-43c5-88f3-349b417f1a6a -CVE-2023-0148 - https://wpscan.com/vulnerability/f15f2f2c-2053-4b93-8064-15b5243a4021 -CVE-2023-0149 - https://wpscan.com/vulnerability/6b6f9e42-7f7f-4daa-99c9-14a24a6d76b0 -CVE-2023-0150 - https://wpscan.com/vulnerability/517154dc-d6bd-462d-b955-061a7b7f8da5 -CVE-2023-0151 - https://wpscan.com/vulnerability/d9fc6f5f-efc1-4e23-899b-e9a49330ed13 -CVE-2023-0152 - https://wpscan.com/vulnerability/8281fce2-6f24-4d3f-895f-4d8694806609 -CVE-2023-0153 - https://wpscan.com/vulnerability/f3459868-28aa-4a5d-94d8-bbc17e3ce653 -CVE-2023-0154 - https://wpscan.com/vulnerability/5e66e173-776d-4423-b4a2-eb7316b2502f -CVE-2023-0155 - https://gitlab.com/gitlab-org/gitlab/-/issues/387638 -CVE-2023-0156 - https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f2360a759 -CVE-2023-0157 - https://wpscan.com/vulnerability/8248b550-6485-4108-a701-8446ffa35f06 -CVE-2023-0159 - https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809 -CVE-2023-0160 - https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/ -CVE-2023-0164 - https://fluidattacks.com/advisories/queen/ -CVE-2023-0165 - https://wpscan.com/vulnerability/f00b82f7-d8ad-4f6b-b791-81cc16b6336b -CVE-2023-0166 - https://wpscan.com/vulnerability/f5d43062-4ef3-4dd1-b916-0127f0016f5c -CVE-2023-0167 - https://wpscan.com/vulnerability/fafbf666-b908-48ef-9041-fea653e9bfeb -CVE-2023-0168 - https://wpscan.com/vulnerability/e854efee-16fc-4379-9e66-d2883e01fb32 -CVE-2023-0169 - https://wpscan.com/vulnerability/178d71f2-4666-4f7e-ada5-cb72a50fd663 -CVE-2023-0170 - https://wpscan.com/vulnerability/19ee5e33-acc8-40c5-8f54-c9cb0fa491f0 -CVE-2023-0171 - https://wpscan.com/vulnerability/32324655-ff91-4a53-a2c5-ebe6678d4a9d -CVE-2023-0172 - https://wpscan.com/vulnerability/c8982b8d-985f-4a5d-840d-e8be7c3405bd -CVE-2023-0173 - https://wpscan.com/vulnerability/c543b6e2-a7c0-4ba7-a308-e9951dd59fb9 -CVE-2023-0174 - https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3 -CVE-2023-0175 - https://wpscan.com/vulnerability/cdcd3c2c-cb29-4b21-8d3d-7eafbc1d3098 -CVE-2023-0176 - https://wpscan.com/vulnerability/a762c25b-5c47-400e-8964-407cf4c94e9f -CVE-2023-0177 - https://wpscan.com/vulnerability/712c2154-37f4-424c-ba3b-26ba6aa95bca -CVE-2023-0178 - https://wpscan.com/vulnerability/cc308e15-7937-4d41-809d-74f8c13bee23 -CVE-2023-0179 - http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html -CVE-2023-0179 - https://seclists.org/oss-sec/2023/q1/20 -CVE-2023-0210 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit -CVE-2023-0210 - https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/ -CVE-2023-0210 - https://www.openwall.com/lists/oss-security/2023/01/04/1 -CVE-2023-0212 - https://wpscan.com/vulnerability/5fdd44aa-7f3f-423a-9fb0-dc9dc36f33a3 -CVE-2023-0214 - https://kcm.trellix.com/corporate/index?page=content&id=SB10393 -CVE-2023-0219 - https://wpscan.com/vulnerability/71662b72-311c-42db-86c5-a0276d25535c -CVE-2023-0220 - https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c -CVE-2023-0221 - https://kcm.trellix.com/corporate/index?page=content&id=SB10370 -CVE-2023-0224 - https://wpscan.com/vulnerability/d8da539d-0a1b-46ef-b48d-710c59cf68e1/ -CVE-2023-0227 - https://huntr.dev/bounties/af3101d7-fea6-463a-b7e4-a48be219e31b -CVE-2023-0230 - https://wpscan.com/vulnerability/a4ad73b2-6a70-48ff-bf4c-28f81b193748 -CVE-2023-0231 - https://wpscan.com/vulnerability/533c19d5-219c-4389-a8bf-8b3a35b33b20 -CVE-2023-0233 - https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130 -CVE-2023-0234 - https://wpscan.com/vulnerability/acf3e369-1290-4b3f-83bf-2209b9dd06e1 -CVE-2023-0236 - https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8 -CVE-2023-0243 - https://github.com/yeyinshi/tuzicms/issues/12 -CVE-2023-0244 - https://github.com/yeyinshi/tuzicms/issues/13 -CVE-2023-0244 - https://vuldb.com/?id.218152 -CVE-2023-0247 - https://huntr.dev/bounties/cab50e44-0995-4ac1-a5d5-889293b9704f -CVE-2023-0252 - https://wpscan.com/vulnerability/5754a4fd-1adf-47aa-976f-3b28750058c2 -CVE-2023-0255 - https://wpscan.com/vulnerability/b0239208-1e23-4774-9b8c-9611704a07a0 -CVE-2023-0259 - https://wpscan.com/vulnerability/d3bb0eac-1f4e-4191-8f3b-104a5bb54558 -CVE-2023-0260 - https://wpscan.com/vulnerability/9165d46b-2a27-4e83-a096-73ffe9057c80 -CVE-2023-0261 - https://wpscan.com/vulnerability/6a3b6752-8d72-4ab4-9d49-b722a947d2b0 -CVE-2023-0262 - https://wpscan.com/vulnerability/5d8c28ac-a46c-45d3-acc9-2cd2e6356ba2 -CVE-2023-0263 - https://wpscan.com/vulnerability/2b4a6459-3e49-4048-8a9f-d7bb350aa2f6 -CVE-2023-0267 - https://wpscan.com/vulnerability/7ba7849d-e07b-465a-bfb7-10c8186be140 -CVE-2023-0268 - https://wpscan.com/vulnerability/99389641-ad1e-45c1-a42f-2a010ee22d76 -CVE-2023-0270 - https://wpscan.com/vulnerability/ca3ca694-54ca-4e7e-82e6-33aa240754e1 -CVE-2023-0271 - https://wpscan.com/vulnerability/fd7aaf06-4be7-48d6-83a1-cd5cd6c3d9c2 -CVE-2023-0272 - https://wpscan.com/vulnerability/047b50c0-0eb3-4371-9e5d-3778fdafc66b -CVE-2023-0273 - https://wpscan.com/vulnerability/5cafbba6-478f-4f5d-a2d4-60c6a22f2f1e -CVE-2023-0274 - https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812 -CVE-2023-0275 - https://wpscan.com/vulnerability/aab5d803-d621-4b12-a901-ff4447334d88 -CVE-2023-0276 - https://wpscan.com/vulnerability/d00824a3-7df5-4b52-a31b-5fdfb19c970f -CVE-2023-0277 - https://wpscan.com/vulnerability/69ffb2f1-b291-49bf-80a8-08d03ceca53b -CVE-2023-0278 - https://wpscan.com/vulnerability/98deb84e-01ca-4b70-a8f8-0a226daa85a6 -CVE-2023-0279 - https://wpscan.com/vulnerability/42db1ba5-1b14-41bd-a2b3-7243a84c9d3d -CVE-2023-0280 - https://wpscan.com/vulnerability/cb7ed9e6-0fa0-4ebb-9109-8f33defc8b32 -CVE-2023-0282 - https://wpscan.com/vulnerability/93693d45-5217-4571-bae5-aab8878cfe62 -CVE-2023-0285 - https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348 -CVE-2023-0288 - https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3 -CVE-2023-0289 - https://huntr.dev/bounties/b9584c87-60e8-4a03-9e79-5f1e2d595361 -CVE-2023-0291 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt -CVE-2023-0292 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt -CVE-2023-0297 - http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html -CVE-2023-0297 - http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html -CVE-2023-0297 - https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65 -CVE-2023-0298 - https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed -CVE-2023-0299 - https://huntr.dev/bounties/0049774b-1857-46dc-a834-f1fb15138c53 -CVE-2023-0300 - https://huntr.dev/bounties/0a91fec7-a76e-4ca3-80ba-81de1f10d59d -CVE-2023-0301 - https://huntr.dev/bounties/8a91e127-2903-4c6b-9a66-e4d2e30f8dec -CVE-2023-0302 - https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e -CVE-2023-0306 - https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde -CVE-2023-0307 - https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215 -CVE-2023-0308 - https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69 -CVE-2023-0309 - https://huntr.dev/bounties/c03c5925-43ff-450d-9827-2b65a3307ed6 -CVE-2023-0310 - https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a -CVE-2023-0311 - https://huntr.dev/bounties/82b0b629-c56b-4651-af3f-17f749751857 -CVE-2023-0312 - https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9 -CVE-2023-0313 - https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256 -CVE-2023-0314 - https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67 -CVE-2023-0315 - http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html -CVE-2023-0315 - http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html -CVE-2023-0315 - https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943 -CVE-2023-0316 - https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244 -CVE-2023-0321 - https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html -CVE-2023-0323 - https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343 -CVE-2023-0324 - https://vuldb.com/?id.218426 -CVE-2023-0326 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132 -CVE-2023-0328 - https://wpscan.com/vulnerability/3c4318a9-a3c5-409b-a52e-edd8583c3c43 -CVE-2023-0329 - http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html -CVE-2023-0329 - https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493 -CVE-2023-0330 - https://bugzilla.redhat.com/show_bug.cgi?id=2160151 -CVE-2023-0331 - https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b -CVE-2023-0332 - https://vuldb.com/?id.218472 -CVE-2023-0333 - https://wpscan.com/vulnerability/e86ff4d5-d549-4c71-b80e-6a9b3bfddbfc -CVE-2023-0334 - https://wpscan.com/vulnerability/b027a8db-0fd6-444d-b14a-0ae58f04f931 -CVE-2023-0335 - https://wpscan.com/vulnerability/f7a20bea-c3d5-431b-bdcf-e189c81a561a -CVE-2023-0336 - https://wpscan.com/vulnerability/ac74df9a-6fbf-4411-a501-97eba1ad1895 -CVE-2023-0340 - https://wpscan.com/vulnerability/71956598-90aa-4557-947a-c4716674543d -CVE-2023-0341 - https://litios.github.io/2023/01/14/CVE-2023-0341.html -CVE-2023-0358 - https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 -CVE-2023-0360 - https://wpscan.com/vulnerability/ba653457-415f-4ab3-a792-42640b59302b -CVE-2023-0362 - https://wpscan.com/vulnerability/95ee3257-cfda-480d-b3f7-28235564cf6d -CVE-2023-0363 - https://wpscan.com/vulnerability/6d332a47-e96c-455b-9e8f-db6dbb59b518 -CVE-2023-0364 - https://wpscan.com/vulnerability/e56759ae-7530-467a-b9ba-e9a404afb872 -CVE-2023-0365 - https://wpscan.com/vulnerability/d268d7a3-82fd-4444-bc0e-27c7cc279b5a -CVE-2023-0366 - https://wpscan.com/vulnerability/7d68b0df-7169-46b2-b8e3-4d0c2aa8d605 -CVE-2023-0367 - https://wpscan.com/vulnerability/d7685af2-6034-49ea-93ef-4debe72689bc -CVE-2023-0368 - https://wpscan.com/vulnerability/b41e5c09-1034-48a7-ac0f-d4db6e7a3b3e -CVE-2023-0369 - https://wpscan.com/vulnerability/351f31e0-cd13-4079-8fd1-447f319133c9 -CVE-2023-0370 - https://wpscan.com/vulnerability/4f5597f9-ab27-42d2-847c-14455b7d0849 -CVE-2023-0371 - https://wpscan.com/vulnerability/0b6381cd-fa31-4cc7-8b42-063a4c545577 -CVE-2023-0372 - https://wpscan.com/vulnerability/9cf90ad8-4aa4-466c-a33e-4f2706815765 -CVE-2023-0373 - https://wpscan.com/vulnerability/fe60ea83-b584-465a-8128-b7358d8da3af -CVE-2023-0374 - https://wpscan.com/vulnerability/ddb10f2e-73b8-444c-90b2-5c84cdf6de5c -CVE-2023-0375 - https://wpscan.com/vulnerability/915d6add-d3e2-4ced-969e-9523981ac886 -CVE-2023-0376 - https://wpscan.com/vulnerability/b1aa6f32-c1d5-4fc6-9a4e-d4c5fae78389/ -CVE-2023-0377 - https://wpscan.com/vulnerability/5b1aacd1-3f75-4a6f-8146-cbb98a713724 -CVE-2023-0378 - https://wpscan.com/vulnerability/3313cc05-2267-4d93-a8a8-2c0701c21f66 -CVE-2023-0379 - https://wpscan.com/vulnerability/14b4f0c5-c7b1-4ac4-8c9c-f8c35ca5de4a -CVE-2023-0380 - https://wpscan.com/vulnerability/3256e090-1131-459d-ade5-f052cd5d189f -CVE-2023-0381 - https://wpscan.com/vulnerability/39c964fa-6d8d-404d-ac38-72f6f88d203c -CVE-2023-0386 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -CVE-2023-0386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a -CVE-2023-0388 - https://wpscan.com/vulnerability/77861a2e-879a-4bd0-b4c0-cd19481ace5d -CVE-2023-0389 - https://wpscan.com/vulnerability/090a3922-febc-4294-82d2-d8339d461893/ -CVE-2023-0391 - https://www.bleepingcomputer.com/news/security/cloudpanel-installations-use-the-same-ssl-certificate-private-key/ -CVE-2023-0394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17 -CVE-2023-0395 - https://wpscan.com/vulnerability/3f2565cd-7050-4ebd-9a50-cd9b9f7c3341 -CVE-2023-0398 - https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58 -CVE-2023-0399 - https://wpscan.com/vulnerability/702d7bbe-93cc-4bc2-b41d-cb66e08c99a7 -CVE-2023-0400 - https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US -CVE-2023-0405 - https://wpscan.com/vulnerability/3ca9ac21-2bce-4480-9079-b4045b261273 -CVE-2023-0406 - https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c -CVE-2023-0410 - https://huntr.dev/bounties/2da583f0-7f66-4ba7-9bed-8e7229aa578e -CVE-2023-0418 - https://wpscan.com/vulnerability/821751bb-feaf-45b8-91a9-e173cb0c05fc -CVE-2023-0419 - https://wpscan.com/vulnerability/5ccfee43-920d-4613-b976-2ea8966696ba -CVE-2023-0420 - https://wpscan.com/vulnerability/266e417f-ece7-4ff5-a724-4d9c8e2f3faa -CVE-2023-0421 - https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c -CVE-2023-0422 - https://wpscan.com/vulnerability/d57f2fb2-5251-4069-8c9a-a4af269c5e62 -CVE-2023-0423 - https://wpscan.com/vulnerability/73d588d7-26ae-42e2-8282-aa02bcb109b6 -CVE-2023-0424 - https://wpscan.com/vulnerability/b0f8713f-54b2-4ab2-a475-60a1692a50e9 -CVE-2023-0428 - https://wpscan.com/vulnerability/c933460b-f77d-4986-9f5a-32d9f3f8b412 -CVE-2023-0429 - https://wpscan.com/vulnerability/67d84549-d368-4504-9fa9-b1fce63cb967 -CVE-2023-0431 - https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af -CVE-2023-0432 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-05 -CVE-2023-0433 - http://seclists.org/fulldisclosure/2023/Mar/21 -CVE-2023-0433 - https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e -CVE-2023-0434 - https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4 -CVE-2023-0435 - https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d -CVE-2023-0438 - https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3 -CVE-2023-0439 - https://wpscan.com/vulnerability/04cea9aa-b21c-49f8-836b-2d312253e09a -CVE-2023-0440 - https://huntr.dev/bounties/208a096f-7986-4eed-8629-b7285348a686 -CVE-2023-0441 - https://wpscan.com/vulnerability/11703e49-c042-4eb6-9a5f-6e006e3725a0 -CVE-2023-0442 - https://wpscan.com/vulnerability/34d95d88-4114-4597-b4db-e9f5ef80d322 -CVE-2023-0443 - https://wpscan.com/vulnerability/471f3226-8f90-43d1-b826-f11ef4bbd602 -CVE-2023-0448 - https://www.tenable.com/security/research/tra-2023-3 -CVE-2023-0453 - https://wpscan.com/vulnerability/f915e5ac-e216-4d1c-aec1-c3be11e2a6de -CVE-2023-0455 - http://packetstormsecurity.com/files/172674/Bumsys-Business-Management-System-1.0.3-beta-Shell-Upload.html -CVE-2023-0455 - https://huntr.dev/bounties/b5e9c578-1a33-4745-bf6b-e7cdb89793f7 -CVE-2023-0461 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c -CVE-2023-0467 - https://wpscan.com/vulnerability/8eb431a6-59a5-4cee-84e0-156c0b31cfc4 -CVE-2023-0470 - https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b -CVE-2023-0477 - https://wpscan.com/vulnerability/e5ef74a2-e04a-4a14-bd0e-d6910cd1c4b4 -CVE-2023-0479 - https://wpscan.com/vulnerability/50963747-ae8e-42b4-bb42-cc848be7b92e/ -CVE-2023-0484 - https://wpscan.com/vulnerability/e61fb245-0d7f-42b0-9b96-c17ade8c04c5 -CVE-2023-0487 - https://wpscan.com/vulnerability/0e874a1d-c866-45fa-b456-c8012dca32af -CVE-2023-0488 - https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a -CVE-2023-0489 - https://wpscan.com/vulnerability/238842ee-6392-4eb2-96cb-08e4ece6fca1 -CVE-2023-0490 - https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63 -CVE-2023-0491 - https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60 -CVE-2023-0492 - https://wpscan.com/vulnerability/ea3b129d-32d8-40e3-b1af-8b92a760db23 -CVE-2023-0493 - http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html -CVE-2023-0493 - https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f -CVE-2023-0495 - https://wpscan.com/vulnerability/2e3af480-b1a4-404c-b0fc-2b7b6a6b9c27 -CVE-2023-0496 - https://wpscan.com/vulnerability/451b47d5-7bd2-4a82-9c8e-fe6601bcd2ab -CVE-2023-0497 - https://wpscan.com/vulnerability/ae5b7776-9d0d-4db8-81c3-237b16cd9c62 -CVE-2023-0498 - https://wpscan.com/vulnerability/8fa051ad-5b35-46d8-be95-0ac4e73d5eff -CVE-2023-0499 - https://wpscan.com/vulnerability/9342470a-a0ad-4f0b-b95f-7daa39a6362b -CVE-2023-0500 - https://wpscan.com/vulnerability/95a6a11e-da5d-4fac-aff6-a3f7624682b7 -CVE-2023-0501 - https://wpscan.com/vulnerability/36fd6c0d-3f0c-4f7d-aa17-5b2d084ab94c -CVE-2023-0502 - https://wpscan.com/vulnerability/c959f4ce-b6ea-4aee-9a98-aa98d2a62138 -CVE-2023-0503 - https://wpscan.com/vulnerability/3cb148fb-1f30-4316-a421-10da51d849f3 -CVE-2023-0504 - https://wpscan.com/vulnerability/b427841d-a3ad-4e3a-8964-baad90a9aedb -CVE-2023-0505 - https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354 -CVE-2023-0509 - https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839 -CVE-2023-0512 - http://seclists.org/fulldisclosure/2023/Mar/21 -CVE-2023-0512 - https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74 -CVE-2023-0513 - https://vuldb.com/?id.219334 -CVE-2023-0514 - https://wpscan.com/vulnerability/c6cc400a-9bfb-417d-9206-5582a49d0f05 -CVE-2023-0519 - https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129 -CVE-2023-0520 - https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e -CVE-2023-0522 - https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54 -CVE-2023-0526 - https://wpscan.com/vulnerability/0ec58310-243d-40c8-9fa6-8753947bfa89 -CVE-2023-0527 - http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html -CVE-2023-0527 - https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md -CVE-2023-0528 - https://vuldb.com/?id.219597 -CVE-2023-0531 - https://vuldb.com/?id.219600 -CVE-2023-0532 - https://vuldb.com/?id.219601 -CVE-2023-0533 - https://vuldb.com/?id.219602 -CVE-2023-0535 - https://wpscan.com/vulnerability/8c50321a-dba8-4379-9b9c-4c349e44b2ed -CVE-2023-0536 - https://wpscan.com/vulnerability/7b19d792-8083-4c0c-a45e-a99c1f5f0df0 -CVE-2023-0537 - https://wpscan.com/vulnerability/d7369f1d-d1a0-4576-a676-c70525a6c743 -CVE-2023-0538 - https://wpscan.com/vulnerability/4869fdc7-4fc7-4917-bc00-b6ced9ccc871 -CVE-2023-0539 - https://wpscan.com/vulnerability/a4b6a83a-6394-4dfc-8bb3-4982867dab7d -CVE-2023-0540 - https://wpscan.com/vulnerability/b35b3da2-468d-4fe5-bff6-812432197a38 -CVE-2023-0541 - https://wpscan.com/vulnerability/8453e587-cc8c-491a-af09-fc4ab215134b -CVE-2023-0542 - https://wpscan.com/vulnerability/17de2f77-3e6c-4c22-9196-6e5577ee7fcf -CVE-2023-0543 - https://wpscan.com/vulnerability/e3771938-40b5-4e8b-bb5a-847131a2b4a7 -CVE-2023-0544 - https://wpscan.com/vulnerability/8ef9585f-67d7-4651-977a-fcad113882bd -CVE-2023-0545 - https://wpscan.com/vulnerability/b604afc8-61d0-4e98-8950-f3d29f9e9ee1 -CVE-2023-0546 - https://wpscan.com/vulnerability/078f33cd-0f5c-46fe-b858-2107a09c6b69 -CVE-2023-0548 - https://wpscan.com/vulnerability/b6c1ed7a-5b2d-4985-847d-56586b1aae9b -CVE-2023-0549 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5 -CVE-2023-0551 - https://wpscan.com/vulnerability/de162a46-1fdb-47b9-9a61-f12a2c655a7d -CVE-2023-0552 - https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551 -CVE-2023-0559 - https://wpscan.com/vulnerability/e5549261-66e2-4a5e-8781-bc555b629ccc -CVE-2023-0562 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md -CVE-2023-0563 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md -CVE-2023-0567 - https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4 -CVE-2023-0569 - https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9 -CVE-2023-0571 - https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md -CVE-2023-0571 - https://vuldb.com/?id.219730 -CVE-2023-0579 - https://wpscan.com/vulnerability/574f7607-96d8-4ef8-b96c-0425ad7e7690 -CVE-2023-0587 - https://www.tenable.com/security/research/tra-2023-5 -CVE-2023-0588 - https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f -CVE-2023-0589 - https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7 -CVE-2023-0591 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/ -CVE-2023-0592 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/ -CVE-2023-0593 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/ -CVE-2023-0597 - http://www.openwall.com/lists/oss-security/2023/07/28/1 -CVE-2023-0600 - https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4 -CVE-2023-0602 - https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255 -CVE-2023-0603 - https://wpscan.com/vulnerability/1c93ea8f-4e68-4da1-994e-35a5873278ba -CVE-2023-0604 - https://wpscan.com/vulnerability/4492b5ad-c339-47f5-9003-a9c5f23efdd9 -CVE-2023-0605 - https://wpscan.com/vulnerability/57267c3c-d55e-4b37-a6d0-c5cd8569625c -CVE-2023-0606 - https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b -CVE-2023-0608 - https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c -CVE-2023-0609 - https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0 -CVE-2023-0610 - https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926 -CVE-2023-0611 - https://vuldb.com/?id.219935 -CVE-2023-0612 - https://vuldb.com/?id.219936 -CVE-2023-0617 - https://vuldb.com/?id.219957 -CVE-2023-0630 - https://wpscan.com/vulnerability/b82bdd02-b699-4527-86cc-d60b56ab0c55 -CVE-2023-0631 - https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79 -CVE-2023-0638 - https://vuldb.com/?id.220018 -CVE-2023-0641 - https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md -CVE-2023-0642 - https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d -CVE-2023-0643 - https://huntr.dev/bounties/ea90f8b9-d8fe-4432-9a52-4d663400c52f -CVE-2023-0644 - https://wpscan.com/vulnerability/08f5089c-36f3-4d12-bca5-99cd3ae78f67 -CVE-2023-0647 - https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md -CVE-2023-0650 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m -CVE-2023-0660 - https://wpscan.com/vulnerability/3fe712bc-ce7f-4b30-9fc7-1ff15aa5b6ce -CVE-2023-0663 - https://vuldb.com/?id.220175 -CVE-2023-0666 - https://gitlab.com/wireshark/wireshark/-/issues/19085 -CVE-2023-0666 - https://takeonme.org/cves/CVE-2023-0666.html -CVE-2023-0667 - https://gitlab.com/wireshark/wireshark/-/issues/19086 -CVE-2023-0667 - https://takeonme.org/cves/CVE-2023-0667.html -CVE-2023-0668 - https://gitlab.com/wireshark/wireshark/-/issues/19087 -CVE-2023-0668 - https://takeonme.org/cves/CVE-2023-0668.html -CVE-2023-0669 - http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html -CVE-2023-0669 - https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis -CVE-2023-0669 - https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html -CVE-2023-0671 - https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de -CVE-2023-0673 - https://vuldb.com/?id.220195 -CVE-2023-0674 - https://github.com/boyi0508/xxl-job-explain/blob/main/README.md -CVE-2023-0675 - https://www.youtube.com/watch?v=eoPuINHWjHo -CVE-2023-0676 - https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b -CVE-2023-0677 - https://huntr.dev/bounties/d280ae81-a1c9-4a50-9aa4-f98f1f9fd2c0 -CVE-2023-0679 - https://vuldb.com/?id.220220 -CVE-2023-0698 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693 -CVE-2023-0732 - https://vuldb.com/?id.220369 -CVE-2023-0733 - https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a -CVE-2023-0734 - https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b -CVE-2023-0736 - https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e -CVE-2023-0738 - https://fluidattacks.com/advisories/eilish/ -CVE-2023-0739 - https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae -CVE-2023-0740 - https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110 -CVE-2023-0741 - https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809 -CVE-2023-0742 - https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544 -CVE-2023-0743 - https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863 -CVE-2023-0744 - http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html -CVE-2023-0744 - https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434 -CVE-2023-0747 - https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff -CVE-2023-0748 - https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86 -CVE-2023-0749 - https://wpscan.com/vulnerability/9caa8d2e-383b-47d7-8d21-d2ed6b1664cb -CVE-2023-0756 - https://gitlab.com/gitlab-org/gitlab/-/issues/390910 -CVE-2023-0758 - https://vuldb.com/?id.220469 -CVE-2023-0759 - https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347 -CVE-2023-0760 - https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 -CVE-2023-0761 - https://wpscan.com/vulnerability/88fb064e-0001-446c-8e43-9fe3feff6c1f -CVE-2023-0762 - https://wpscan.com/vulnerability/9be952e0-d8ae-440f-8819-cb19485f35f3 -CVE-2023-0763 - https://wpscan.com/vulnerability/4b55f868-62f8-43a1-9817-68cd1fc6190f -CVE-2023-0764 - https://wpscan.com/vulnerability/d48c6c50-3734-4191-9833-0d9b09b1bd8a -CVE-2023-0765 - https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25 -CVE-2023-0766 - https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88 -CVE-2023-0768 - https://wpscan.com/vulnerability/03d061b4-1b71-44f5-b3dc-f82a5fcd92eb -CVE-2023-0769 - https://wpscan.com/vulnerability/1d4a2f0e-a371-4e27-98de-528e070f41b0/ -CVE-2023-0770 - https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd -CVE-2023-0771 - https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1 -CVE-2023-0772 - https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c -CVE-2023-0774 - https://www.youtube.com/watch?v=s3oK5jebx_I -CVE-2023-0777 - http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html -CVE-2023-0777 - https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7 -CVE-2023-0779 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549 -CVE-2023-0780 - https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4 -CVE-2023-0782 - https://github.com/jingping911/tendaAC23overflow/blob/main/README.md -CVE-2023-0783 - https://vuldb.com/?id.220641 -CVE-2023-0784 - https://vuldb.com/?id.220644 -CVE-2023-0787 - https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024 -CVE-2023-0789 - https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5 -CVE-2023-0790 - https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156 -CVE-2023-0793 - https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9 -CVE-2023-0794 - https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb -CVE-2023-0795 - https://gitlab.com/libtiff/libtiff/-/issues/493 -CVE-2023-0796 - https://gitlab.com/libtiff/libtiff/-/issues/499 -CVE-2023-0797 - https://gitlab.com/libtiff/libtiff/-/issues/495 -CVE-2023-0798 - https://gitlab.com/libtiff/libtiff/-/issues/492 -CVE-2023-0799 - https://gitlab.com/libtiff/libtiff/-/issues/494 -CVE-2023-0800 - https://gitlab.com/libtiff/libtiff/-/issues/496 -CVE-2023-0801 - https://gitlab.com/libtiff/libtiff/-/issues/498 -CVE-2023-0802 - https://gitlab.com/libtiff/libtiff/-/issues/500 -CVE-2023-0803 - https://gitlab.com/libtiff/libtiff/-/issues/501 -CVE-2023-0804 - https://gitlab.com/libtiff/libtiff/-/issues/497 -CVE-2023-0810 - https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68 -CVE-2023-0812 - https://wpscan.com/vulnerability/0ed5e1b3-f2a3-4eb1-b8ae-d3a62f600107 -CVE-2023-0816 - https://wpscan.com/vulnerability/a281f63f-e295-4666-8a08-01b23cd5a744 -CVE-2023-0817 - https://huntr.dev/bounties/cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3 -CVE-2023-0818 - https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a -CVE-2023-0819 - https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef -CVE-2023-0820 - https://wpscan.com/vulnerability/b93d9f9d-0fd9-49b8-b465-d32b95351912 -CVE-2023-0823 - https://wpscan.com/vulnerability/83f23a9f-9ace-47d2-a5f3-a4915129b16c -CVE-2023-0824 - https://wpscan.com/vulnerability/48a3a542-9130-4524-9d19-ff9eccecb148/ -CVE-2023-0827 - https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422 -CVE-2023-0841 - https://github.com/gpac/gpac/issues/2396 -CVE-2023-0841 - https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3 -CVE-2023-0844 - https://wpscan.com/vulnerability/8d8e5852-3787-47f9-9931-8308bb81beb1 -CVE-2023-0848 - https://vuldb.com/?id.221147 -CVE-2023-0860 - https://huntr.dev/bounties/64f3ab93-1357-4468-8ff4-52bbcec18cca -CVE-2023-0865 - https://wpscan.com/vulnerability/e39c0171-ed4a-4143-9a31-c407e3555eec -CVE-2023-0866 - https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f -CVE-2023-0873 - https://wpscan.com/vulnerability/8816d4c1-9e8e-4b6f-a36a-10a98a7ccfcd -CVE-2023-0874 - https://wpscan.com/vulnerability/495e39db-793d-454b-9ef1-dd91cae2c49b -CVE-2023-0875 - https://wpscan.com/vulnerability/d44e9a45-cbdf-46b1-8b48-7d934b617534 -CVE-2023-0876 - https://wpscan.com/vulnerability/1a8c97f9-98fa-4e29-b7f7-bb9abe0c42ea -CVE-2023-0877 - https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8 -CVE-2023-0878 - https://huntr.dev/bounties/a892caf7-b8c2-4638-8cee-eb779d51066a -CVE-2023-0879 - https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541 -CVE-2023-0880 - https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c -CVE-2023-0887 - https://vuldb.com/?id.221351 -CVE-2023-0888 - https://www.bbraun.com/productsecurity -CVE-2023-0888 - https://www.bbraunusa.com/productsecurity -CVE-2023-0889 - https://wpscan.com/vulnerability/c39473a7-47fc-4bce-99ad-28d03f41e74e -CVE-2023-0890 - https://wpscan.com/vulnerability/8a466f15-f112-4527-8b02-4544a8032671 -CVE-2023-0891 - https://wpscan.com/vulnerability/72397fee-9768-462b-933c-400181a5487c -CVE-2023-0892 - https://wpscan.com/vulnerability/54150be5-a53f-4b94-8ce5-04e073e3ab1f -CVE-2023-0893 - https://wpscan.com/vulnerability/fd6ef6ee-15e9-44ac-a2db-976393a3b71a -CVE-2023-0894 - https://wpscan.com/vulnerability/d42eff41-096f-401d-bbfb-dcd6e08faca5 -CVE-2023-0897 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-0899 - https://wpscan.com/vulnerability/e95f925f-118e-4fa1-8e8f-9dc1bc698f12 -CVE-2023-0900 - https://wpscan.com/vulnerability/f601e637-a486-4f3a-9077-4f294ace7ea1 -CVE-2023-0901 - https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010 -CVE-2023-0902 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Simple%20Food%20Ordering%20System%20-%20Authenticated%20Reflected%20XSS.md -CVE-2023-0903 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md -CVE-2023-0904 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md -CVE-2023-0905 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md -CVE-2023-0907 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0907 -CVE-2023-0908 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908 -CVE-2023-0911 - https://wpscan.com/vulnerability/35404d16-7213-4293-ac0d-926bd6c17444 -CVE-2023-0912 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md -CVE-2023-0913 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md -CVE-2023-0914 - https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec -CVE-2023-0915 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md -CVE-2023-0916 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md -CVE-2023-0916 - https://vuldb.com/?id.221491 -CVE-2023-0919 - https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f -CVE-2023-0924 - https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4 -CVE-2023-0937 - https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162 -CVE-2023-0938 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md -CVE-2023-0940 - https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5 -CVE-2023-0943 - https://vuldb.com/?id.221591 -CVE-2023-0947 - https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496 -CVE-2023-0948 - https://wpscan.com/vulnerability/a78d75b2-85a0-41eb-9720-c726ca2e8718 -CVE-2023-0949 - https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19 -CVE-2023-0955 - https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8 -CVE-2023-0961 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md -CVE-2023-0962 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md -CVE-2023-0962 - https://vuldb.com/?id.221632 -CVE-2023-0963 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md -CVE-2023-0964 - https://vuldb.com/?id.221634 -CVE-2023-0975 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396 -CVE-2023-0976 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398 -CVE-2023-0977 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396 -CVE-2023-0978 - https://kcm.trellix.com/corporate/index?page=content&id=SB10397 -CVE-2023-0983 - https://wpscan.com/vulnerability/73353221-3e6d-44e8-bf41-55a0fe57d81f -CVE-2023-0994 - https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad -CVE-2023-0995 - https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f -CVE-2023-0999 - https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md -CVE-2023-0999 - https://vuldb.com/?id.221734 -CVE-2023-1003 - https://github.com/typora/typora-issues/issues/5623 -CVE-2023-1004 - https://github.com/marktext/marktext/issues/3575 -CVE-2023-1005 - https://github.com/JP1016/Markdown-Electron/issues/3 -CVE-2023-1006 - https://vuldb.com/?id.221739 -CVE-2023-1007 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007 -CVE-2023-1008 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1008 -CVE-2023-1009 - https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md -CVE-2023-1010 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md -CVE-2023-1011 - https://wpscan.com/vulnerability/d1784446-b3da-4175-9dac-20b030f19984 -CVE-2023-1019 - https://wpscan.com/vulnerability/a6331ca8-9603-4134-af39-8e77ac9d511c -CVE-2023-1020 - https://wpscan.com/vulnerability/4e5aa9a3-65a0-47d6-bc26-a2fb6cb073ff -CVE-2023-1021 - https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3 -CVE-2023-1025 - https://wpscan.com/vulnerability/13621b13-8d31-4214-a665-cb15981f3ec1 -CVE-2023-1030 - https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected -CVE-2023-1031 - https://fluidattacks.com/advisories/napoli -CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6024-1 -CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6033-1 -CVE-2023-1033 - https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387 -CVE-2023-1034 - https://huntr.dev/bounties/0c1365bc-8d9a-4ae0-8b55-615d492b3730 -CVE-2023-1036 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/XSS-1.md -CVE-2023-1037 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/SQLi-1.md -CVE-2023-1037 - https://vuldb.com/?id.221795 -CVE-2023-1044 - https://vuldb.com/?id.221803 -CVE-2023-1063 - https://vuldb.com/?id.221827 -CVE-2023-1067 - https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045 -CVE-2023-1069 - https://wpscan.com/vulnerability/caacc50c-822e-46e9-bc0b-681349fd0dda -CVE-2023-1070 - https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c -CVE-2023-1086 - https://wpscan.com/vulnerability/e2bda716-76dc-4a26-b26a-7a2a764757b0 -CVE-2023-1087 - https://wpscan.com/vulnerability/356c89a1-81b6-4600-9291-1a74788af7f9 -CVE-2023-1088 - https://wpscan.com/vulnerability/a956f1cd-fce4-4235-b1af-4b7675a60ca2 -CVE-2023-1089 - https://wpscan.com/vulnerability/9787e26f-33fe-4c65-abb3-7f5c76ae8d6f -CVE-2023-1090 - https://github.com/youki992/youki992.github.io/blob/master/others/apply.md -CVE-2023-1090 - https://wpscan.com/vulnerability/d470dd6c-dcac-4a3e-b42a-2489a31aca45 -CVE-2023-1092 - https://wpscan.com/vulnerability/52e29f16-b6dd-4132-9bb8-ad10bd3c39d7 -CVE-2023-1092 - https://wpscan.com/vulnerability/5eb85df5-8aab-4f30-a401-f776a310b09c -CVE-2023-1092 - https://wpscan.com/vulnerability/8fbf7efe-0bf2-42c6-aef1-7fcf2708b31b -CVE-2023-1092 - https://wpscan.com/vulnerability/f6e165d9-2193-4c76-ae2d-618a739fe4fb -CVE-2023-1093 - https://wpscan.com/vulnerability/1e13b9ea-a3ef-483b-b967-6ec14bd6d54d -CVE-2023-1094 - https://fluidattacks.com/advisories/napoli -CVE-2023-1103 - https://huntr.dev/bounties/4c5a8af6-3078-4180-bb30-33b57a5540e6 -CVE-2023-1104 - https://huntr.dev/bounties/a4909b4e-ab3c-41d6-b0d8-1c6e933bf758 -CVE-2023-1105 - https://huntr.dev/bounties/4089a63f-cffd-42f3-b8d8-e80b6bd9c80f -CVE-2023-1106 - https://huntr.dev/bounties/1288ec00-f69d-4b84-abce-efc9a97941a0 -CVE-2023-1107 - https://huntr.dev/bounties/4b880868-bd28-4fd0-af56-7686e55d3762 -CVE-2023-1110 - https://wpscan.com/vulnerability/1830e829-4a43-4d98-8214-eecec6bef694 -CVE-2023-1115 - https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17 -CVE-2023-1116 - https://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1 -CVE-2023-1119 - https://wpscan.com/vulnerability/2e78735a-a7fc-41fe-8284-45bf451eff06 -CVE-2023-1120 - https://wpscan.com/vulnerability/c2defd30-7e4c-4a28-8a68-282429061f3f -CVE-2023-1121 - https://wpscan.com/vulnerability/7ead9fb9-d81f-47c6-a1b4-21f29183cc15 -CVE-2023-1122 - https://wpscan.com/vulnerability/71f5d630-2726-48c7-b9e5-7bebc786b561 -CVE-2023-1124 - https://wpscan.com/vulnerability/229b93cd-544b-4877-8d9f-e6debda9511c -CVE-2023-1125 - https://wpscan.com/vulnerability/e8a4b6ab-47f8-495d-a22c-dcf914dfb58c -CVE-2023-1126 - https://wpscan.com/vulnerability/87ce3c59-b234-47bf-abca-e690b53bbe82 -CVE-2023-1127 - https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb -CVE-2023-1129 - https://wpscan.com/vulnerability/d40479de-fb04-41b8-9fb0-41b9eefbd8af -CVE-2023-1131 - https://vuldb.com/?id.222106 -CVE-2023-1133 - http://packetstormsecurity.com/files/172799/Delta-Electronics-InfraSuite-Device-Master-Deserialization.html -CVE-2023-1146 - https://huntr.dev/bounties/d6d1e1e2-2f67-4d28-aa84-b30fb1d2e737 -CVE-2023-1147 - https://huntr.dev/bounties/187f5353-f866-4d26-a5ba-fca378520020 -CVE-2023-1148 - https://huntr.dev/bounties/f0cc2c4b-fdf9-483b-9a83-4e0dfeb4dac7 -CVE-2023-1149 - https://huntr.dev/bounties/2e734209-d7b0-4f57-a8be-c65c82208f2f -CVE-2023-1151 - https://vuldb.com/?id.222163 -CVE-2023-1157 - https://github.com/10cksYiqiyinHangzhouTechnology/elf-parser_segments_poc -CVE-2023-1160 - https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87 -CVE-2023-1162 - https://github.com/xxy1126/Vuln/blob/main/Draytek/2.md -CVE-2023-1163 - https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md -CVE-2023-1163 - https://vuldb.com/?id.222259 -CVE-2023-1164 - https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md -CVE-2023-1166 - https://wpscan.com/vulnerability/825eccf9-f351-4a5b-b238-9969141b94fa -CVE-2023-1170 - https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4 -CVE-2023-1175 - https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e -CVE-2023-1176 - https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085 -CVE-2023-1177 - https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28 -CVE-2023-1178 - https://gitlab.com/gitlab-org/gitlab/-/issues/381815 -CVE-2023-1181 - https://huntr.dev/bounties/f5cb8816-fc12-4282-9571-81f25670e04a -CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2023/12/28/4 -CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2024/01/03/4 -CVE-2023-1186 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186 -CVE-2023-1187 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187 -CVE-2023-1188 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1188 -CVE-2023-1189 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1189 -CVE-2023-1189 - https://vuldb.com/?id.222361 -CVE-2023-1190 - https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc -CVE-2023-1190 - https://github.com/xiaozhuai/imageinfo/issues/1 -CVE-2023-1196 - https://wpscan.com/vulnerability/8e5ec88e-0e66-44e4-bbf2-74155d849ede -CVE-2023-1196 - https://wpscan.com/vulnerability/cf376ca2-92f6-44ff-929a-ace809460a33 -CVE-2023-1197 - https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26 -CVE-2023-1200 - https://vuldb.com/?id.222388 -CVE-2023-1207 - https://wpscan.com/vulnerability/6f3f460b-542a-4d32-8feb-afa1aef57e37 -CVE-2023-1208 - https://wpscan.com/vulnerability/e0cc6740-866a-4a81-a93d-ff486b79b7f7 -CVE-2023-1211 - https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd -CVE-2023-1212 - https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499 -CVE-2023-1219 - http://packetstormsecurity.com/files/171795/Chrome-base-debug-ActivityUserData-ActivityUserData-Heap-Buffer-Overflow.html -CVE-2023-1220 - http://packetstormsecurity.com/files/171796/Chrome-base-SampleVectorBase-MoveSingleSampleToCounts-Heap-Buffer-Overflow.html -CVE-2023-1238 - https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d -CVE-2023-1239 - https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8 -CVE-2023-1241 - https://huntr.dev/bounties/e0e9b1bb-3025-4b9f-acb4-16a5da28aa3c -CVE-2023-1242 - https://huntr.dev/bounties/71c24c5e-ceb2-45cf-bda7-fa195d37e289 -CVE-2023-1243 - https://huntr.dev/bounties/1d62d35a-b096-4b76-a021-347c3f1c570c -CVE-2023-1244 - https://huntr.dev/bounties/bcab9555-8a35-42b2-a7de-0a79fd710b52 -CVE-2023-1245 - https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004 -CVE-2023-1247 - https://huntr.dev/bounties/04447124-c7d4-477f-8364-91fe5b59cda0 -CVE-2023-1249 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html -CVE-2023-1258 - http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html -CVE-2023-1264 - https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815 -CVE-2023-1265 - https://gitlab.com/gitlab-org/gitlab/-/issues/394960 -CVE-2023-1270 - https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b -CVE-2023-1273 - https://wpscan.com/vulnerability/0805ed7e-395d-48de-b484-6c3ec1cd4b8e -CVE-2023-1274 - https://wpscan.com/vulnerability/267acb2c-1a95-487f-a714-516de05d2b2f -CVE-2023-1277 - https://github.com/cn-lwj/vuldb/blob/master/kylin-system-updater_vuln.md -CVE-2023-1277 - https://vuldb.com/?id.222600 -CVE-2023-1281 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2 -CVE-2023-1282 - https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a -CVE-2023-1282 - https://wpscan.com/vulnerability/f4b2617f-5235-4587-9eaf-d0f6bb23dc27 -CVE-2023-1283 - https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8 -CVE-2023-1286 - https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c -CVE-2023-1289 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr -CVE-2023-1304 - https://docs.divvycloud.com/changelog/23321-release-notes -CVE-2023-1305 - https://docs.divvycloud.com/changelog/23321-release-notes -CVE-2023-1306 - https://docs.divvycloud.com/changelog/23321-release-notes -CVE-2023-1307 - https://huntr.dev/bounties/5fe85af4-a667-41a9-a00d-f99e07c5e2f1 -CVE-2023-1311 - https://vuldb.com/?id.222699 -CVE-2023-1312 - https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356 -CVE-2023-1313 - https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61 -CVE-2023-1315 - https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e -CVE-2023-1316 - https://huntr.dev/bounties/c6353bab-c382-47f6-937b-56d253f2e8d3 -CVE-2023-1317 - https://huntr.dev/bounties/c3e27af2-358b-490b-9baf-e451663e4e5f -CVE-2023-1318 - https://huntr.dev/bounties/e58b38e0-4897-4bb0-84e8-a7ad8efab338 -CVE-2023-1319 - https://huntr.dev/bounties/a822067a-d90d-4c3e-b9ef-9b2a5c2bc97f -CVE-2023-1320 - https://huntr.dev/bounties/c2bb34ac-452d-4624-a1b9-c5b54f52f0cd -CVE-2023-1323 - https://wpscan.com/vulnerability/d3a2af00-719c-4b86-8877-b1d68a589192 -CVE-2023-1324 - https://wpscan.com/vulnerability/8f510b8c-b97a-44c9-a36d-2d775a4f7b81 -CVE-2023-1325 - https://wpscan.com/vulnerability/5f37cbf3-2388-4582-876c-6a7b0943c2a7 -CVE-2023-1326 - https://github.com/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb -CVE-2023-1330 - https://wpscan.com/vulnerability/de4cff6d-0030-40e6-8221-fef56e12b4de -CVE-2023-1331 - https://wpscan.com/vulnerability/f81d9340-cf7e-46c4-b669-e61f2559cb8c -CVE-2023-1347 - https://wpscan.com/vulnerability/356a5977-c90c-4fc6-98ed-032d5b27f272 -CVE-2023-1349 - https://vuldb.com/?id.222842 -CVE-2023-1350 - https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59 -CVE-2023-1353 - https://vuldb.com/?id.222852 -CVE-2023-1355 - https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9 -CVE-2023-1361 - https://huntr.dev/bounties/1b1dbc5a-df16-421f-9a0d-de83e43146c4 -CVE-2023-1362 - https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac -CVE-2023-1367 - https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2 -CVE-2023-1369 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369 -CVE-2023-1370 - https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/ -CVE-2023-1371 - https://wpscan.com/vulnerability/ad5c167e-77f7-453c-9443-df6e07705d89 -CVE-2023-1372 - https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/ -CVE-2023-1373 - https://wpscan.com/vulnerability/fa38f3e6-e04c-467c-969b-0f6736087589 -CVE-2023-1374 - https://danielkelley.me/solidres-hotel-booking-plugin-for-wordpress-post-based-xss-vulnerability-in-add-new-currency-feature/ -CVE-2023-1377 - https://wpscan.com/vulnerability/c346ff80-c16b-4219-8983-708c64fa4a61 -CVE-2023-1380 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -CVE-2023-1380 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -CVE-2023-1381 - https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/ -CVE-2023-1381 - https://wpscan.com/vulnerability/f140a928-d297-4bd1-8552-bfebcedba536 -CVE-2023-1383 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ -CVE-2023-1384 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ -CVE-2023-1385 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ -CVE-2023-1387 - https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j -CVE-2023-1388 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398 -CVE-2023-1389 - http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html -CVE-2023-1389 - https://www.tenable.com/security/research/tra-2023-11 -CVE-2023-1390 - https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5 -CVE-2023-1391 - https://blog.csdn.net/Dwayne_Wade/article/details/129526901 -CVE-2023-1394 - https://blog.csdn.net/Dwayne_Wade/article/details/129522869 -CVE-2023-1395 - https://blog.csdn.net/Dwayne_Wade/article/details/129496689 -CVE-2023-1396 - https://blog.csdn.net/Dwayne_Wade/article/details/129524104 -CVE-2023-1400 - https://wpscan.com/vulnerability/c7feceef-28f1-4cac-b124-4b95e3f17b07 -CVE-2023-1405 - https://wpscan.com/vulnerability/8c727a31-ff65-4472-8191-b1becc08192a/ -CVE-2023-1406 - https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65 -CVE-2023-1408 - https://wpscan.com/vulnerability/baf7ef4d-b2ba-48e0-9c17-74fa27e0c15b -CVE-2023-1410 - https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76 -CVE-2023-1413 - https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881 -CVE-2023-1414 - https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e -CVE-2023-1420 - https://wpscan.com/vulnerability/a9a54ee5-2b80-4f55-894c-1047030eea7f -CVE-2023-1421 - https://mattermost.com/security-updates/ -CVE-2023-1425 - https://wpscan.com/vulnerability/578f4179-e7be-4963-9379-5e694911b451 -CVE-2023-1426 - https://wpscan.com/vulnerability/fdd79bb4-d434-4635-bb2b-84d079ecc746 -CVE-2023-1427 - https://wpscan.com/vulnerability/c8917ba2-4cb3-4b09-8a49-b7c612254946 -CVE-2023-1429 - https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f -CVE-2023-1435 - https://wpscan.com/vulnerability/0ca62908-4ef5-41e0-9223-f77ad2c333d7 -CVE-2023-1436 - https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/ -CVE-2023-1442 - https://vuldb.com/?id.223287 -CVE-2023-1443 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443 -CVE-2023-1444 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444 -CVE-2023-1445 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1445 -CVE-2023-1446 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446 -CVE-2023-1448 - https://github.com/gpac/gpac/issues/2388 -CVE-2023-1449 - https://github.com/gpac/gpac/issues/2387 -CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc -CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16 -CVE-2023-1450 - https://vuldb.com/?id.223295 -CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc -CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8 -CVE-2023-1452 - https://github.com/gpac/gpac/issues/2386 -CVE-2023-1453 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1453 -CVE-2023-1459 - https://vuldb.com/?id.223304 -CVE-2023-1460 - https://vuldb.com/?id.223305 -CVE-2023-1463 - https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6 -CVE-2023-1465 - https://wpscan.com/vulnerability/13f59eb4-0744-4fdb-94b5-886ee6bdd867 -CVE-2023-1473 - https://wpscan.com/vulnerability/a6e6c67b-7d9b-4fdb-8115-c33add7bfc3d -CVE-2023-1478 - https://wpscan.com/vulnerability/512a9ba4-01c0-4614-a991-efdc7fe51abe -CVE-2023-1486 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1486 -CVE-2023-1487 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1487 -CVE-2023-1487 - https://vuldb.com/?id.223373 -CVE-2023-1488 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1488 -CVE-2023-1489 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1489 -CVE-2023-1490 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1490 -CVE-2023-1491 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491 -CVE-2023-1492 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1492 -CVE-2023-1493 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1493 -CVE-2023-1494 - https://gitee.com/cui-yiwei/cve-number/blob/master/images/IBOS%20oa%20v4.5.5.md/1.md -CVE-2023-1496 - https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2 -CVE-2023-1515 - https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282 -CVE-2023-1517 - https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d -CVE-2023-1523 - https://marc.info/?l=oss-security&m=167879021709955&w=2 -CVE-2023-1524 - https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e -CVE-2023-1525 - https://wpscan.com/vulnerability/4ae6bf90-b100-4bb5-bdd7-8acdbd950596 -CVE-2023-1527 - https://huntr.dev/bounties/f0272a31-9944-4545-8428-a26154d20348 -CVE-2023-1531 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724 -CVE-2023-1532 - http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html -CVE-2023-1534 - http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html -CVE-2023-1534 - http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html -CVE-2023-1535 - https://huntr.dev/bounties/4d4b0caa-6d8c-4574-ae7e-e9ef5e2e1a40 -CVE-2023-1536 - https://huntr.dev/bounties/538207f4-f805-419a-a314-51716643f05e -CVE-2023-1537 - https://huntr.dev/bounties/171cde18-a447-446c-a9ab-297953ad9b86 -CVE-2023-1538 - https://huntr.dev/bounties/ac0271eb-660f-4966-8b57-4bc660a9a1a0 -CVE-2023-1539 - https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28 -CVE-2023-1540 - https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4 -CVE-2023-1541 - https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92 -CVE-2023-1542 - https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f -CVE-2023-1543 - https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683 -CVE-2023-1545 - https://huntr.dev/bounties/942c015f-7486-49b1-94ae-b1538d812bc2 -CVE-2023-1546 - https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0 -CVE-2023-1549 - https://wpscan.com/vulnerability/c94b3a68-673b-44d7-9251-f3590cc5ee9e -CVE-2023-1554 - https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e -CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF -CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8 -CVE-2023-1560 - https://vuldb.com/?id.223553 -CVE-2023-1562 - https://mattermost.com/security-updates/ -CVE-2023-1568 - https://vuldb.com/?id.223560 -CVE-2023-1570 - https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1 -CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/28 -CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/29 -CVE-2023-1571 - https://vuldb.com/?id.223563 -CVE-2023-1576 - https://sourceforge.net/p/p7zip/bugs/241/ -CVE-2023-1578 - https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e -CVE-2023-1579 - https://sourceware.org/bugzilla/show_bug.cgi?id=29988 -CVE-2023-1585 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2023-1586 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2023-1587 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2023-1590 - https://blog.csdn.net/weixin_43864034/article/details/129730106 -CVE-2023-1594 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf -CVE-2023-1594 - https://vuldb.com/?id.223662 -CVE-2023-1595 - https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md -CVE-2023-1596 - https://wpscan.com/vulnerability/cada9be9-522a-4ce8-847d-c8fff2ddcc07 -CVE-2023-1597 - https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b -CVE-2023-1605 - https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2 -CVE-2023-1606 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf -CVE-2023-1614 - https://wpscan.com/vulnerability/56abd1e2-0ea9-47f7-9a1b-2093ac15d39c -CVE-2023-1616 - https://vuldb.com/?id.223800 -CVE-2023-1621 - https://gitlab.com/gitlab-org/gitlab/-/issues/399774 -CVE-2023-1623 - https://wpscan.com/vulnerability/a04d3808-f4fc-4d77-a1bd-be623cd7053e -CVE-2023-1624 - https://wpscan.com/vulnerability/132b70e5-4368-43b4-81f6-2d01bc09dc8f -CVE-2023-1629 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629 -CVE-2023-1630 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630 -CVE-2023-1631 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1631 -CVE-2023-1634 - https://github.com/BigTiger2020/2023-1/blob/main/ssrf/ssrf.md -CVE-2023-1634 - https://vuldb.com/?id.224016 -CVE-2023-1635 - https://github.com/BigTiger2020/2023/blob/main/XSS.md -CVE-2023-1637 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463 -CVE-2023-1638 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638 -CVE-2023-1639 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639 -CVE-2023-1640 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640 -CVE-2023-1641 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641 -CVE-2023-1642 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642 -CVE-2023-1643 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643 -CVE-2023-1644 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644 -CVE-2023-1645 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645 -CVE-2023-1646 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646 -CVE-2023-1647 - https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6 -CVE-2023-1648 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132 -CVE-2023-1649 - https://wpscan.com/vulnerability/ea806115-14ab-4bc4-a272-2141cb14454a -CVE-2023-1650 - https://wpscan.com/vulnerability/7d7fe498-0aa3-4fa7-b560-610b42b2abed -CVE-2023-1651 - https://wpscan.com/vulnerability/c88b22ba-4fc2-49ad-a457-224157521bad -CVE-2023-1654 - https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14 -CVE-2023-1655 - https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9 -CVE-2023-1660 - https://wpscan.com/vulnerability/1a5cbcfc-fa55-433a-a76b-3881b6c4bea2 -CVE-2023-1665 - https://huntr.dev/bounties/db8fcbab-6ef0-44ba-b5c6-3b0f17ca22a2 -CVE-2023-1669 - https://wpscan.com/vulnerability/fb8791f5-2879-431e-9afc-06d5839e4b9d -CVE-2023-1671 - http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html -CVE-2023-1674 - https://vuldb.com/?id.224231 -CVE-2023-1676 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676 -CVE-2023-1677 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677 -CVE-2023-1678 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678 -CVE-2023-1679 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679 -CVE-2023-1685 - https://vuldb.com/?id.224242 -CVE-2023-1687 - https://vuldb.com/?id.224244 -CVE-2023-1701 - https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256 -CVE-2023-1702 - https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19 -CVE-2023-1704 - https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f -CVE-2023-1708 - https://gitlab.com/gitlab-org/gitlab/-/issues/387185 -CVE-2023-1712 - https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829 -CVE-2023-1713 - https://starlabs.sg/advisories/23/23-1713/ -CVE-2023-1714 - https://starlabs.sg/advisories/23/23-1714/ -CVE-2023-1715 - https://starlabs.sg/advisories/23/23-1715/ -CVE-2023-1717 - https://starlabs.sg/advisories/23/23-1717/ -CVE-2023-1718 - https://starlabs.sg/advisories/23/23-1718/ -CVE-2023-1719 - https://starlabs.sg/advisories/23/23-1719/ -CVE-2023-1720 - https://starlabs.sg/advisories/23/23-1720/ -CVE-2023-1721 - https://fluidattacks.com/advisories/blessd/ -CVE-2023-1722 - https://fluidattacks.com/advisories/wyckoff/ -CVE-2023-1729 - https://github.com/LibRaw/LibRaw/issues/557 -CVE-2023-1730 - https://wpscan.com/vulnerability/44b51a56-ff05-4d50-9327-fc9bab74d4b7 -CVE-2023-1741 - https://vuldb.com/?id.224629 -CVE-2023-1742 - https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md -CVE-2023-1745 - https://github.com/10cksYiqiyinHangzhouTechnology/KMPlayer_Poc -CVE-2023-1745 - https://youtu.be/7bh2BQOqxFo -CVE-2023-1754 - https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28 -CVE-2023-1755 - https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a -CVE-2023-1756 - https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9 -CVE-2023-1757 - https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c -CVE-2023-1758 - https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c -CVE-2023-1759 - https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1 -CVE-2023-1760 - https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5 -CVE-2023-1762 - https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a -CVE-2023-1767 - https://weizman.github.io/2023/04/10/snyk-xss/ -CVE-2023-1774 - https://mattermost.com/security-updates/ -CVE-2023-1775 - https://mattermost.com/security-updates/ -CVE-2023-1776 - https://mattermost.com/security-updates/ -CVE-2023-1777 - https://mattermost.com/security-updates/ -CVE-2023-1780 - https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3 -CVE-2023-1783 - https://fluidattacks.com/advisories/stirling/ -CVE-2023-1788 - https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2 -CVE-2023-1789 - https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d -CVE-2023-1798 - https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md -CVE-2023-1804 - https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b -CVE-2023-1805 - https://wpscan.com/vulnerability/46b4582f-7651-4b74-a00b-1788587ecfa8 -CVE-2023-1806 - https://wpscan.com/vulnerability/38d99c7d-2d10-4910-b95a-1cb545b813c4 -CVE-2023-1809 - https://wpscan.com/vulnerability/57f0a078-fbeb-4b05-8892-e6d99edb82c1 -CVE-2023-1826 - http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html -CVE-2023-1829 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28 -CVE-2023-1831 - https://mattermost.com/security-updates/ -CVE-2023-1835 - https://wpscan.com/vulnerability/b5fc223c-5ec0-44b2-b2f6-b35f9942d341 -CVE-2023-1836 - https://gitlab.com/gitlab-org/gitlab/-/issues/404613 -CVE-2023-1839 - https://wpscan.com/vulnerability/fddc5a1c-f267-4ef4-8acf-731dbecac450 -CVE-2023-1841 - https://https://www.honeywell.com/us/en/product-security -CVE-2023-1850 - https://vuldb.com/?id.224990 -CVE-2023-1856 - https://vuldb.com/?id.224995 -CVE-2023-1861 - https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810 -CVE-2023-1872 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -CVE-2023-1874 - http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html -CVE-2023-1875 - https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61 -CVE-2023-1876 - https://huntr.dev/bounties/15b06488-5849-47ce-aaf4-81d4c3c202e2 -CVE-2023-1877 - https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55 -CVE-2023-1878 - https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc -CVE-2023-1879 - https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334 -CVE-2023-1880 - https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e -CVE-2023-1881 - https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344 -CVE-2023-1882 - https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957 -CVE-2023-1883 - https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191 -CVE-2023-1884 - https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e -CVE-2023-1887 - https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1 -CVE-2023-1890 - http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html -CVE-2023-1890 - https://wpscan.com/vulnerability/8ef64490-30cd-4e07-9b7c-64f551944f3d -CVE-2023-1891 - https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828 -CVE-2023-1892 - https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777 -CVE-2023-1893 - http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html -CVE-2023-1893 - https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7 -CVE-2023-1900 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2023-1903 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-1905 - https://wpscan.com/vulnerability/b6ac3e15-6f39-4514-a50d-cca7b9457736 -CVE-2023-1906 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247 -CVE-2023-1911 - https://wpscan.com/vulnerability/e7c52af0-b210-4e7d-a5e0-ee0645ddc08c -CVE-2023-1912 - http://packetstormsecurity.com/files/171824/WordPress-Limit-Login-Attempts-1.7.1-Cross-Site-Scripting.html -CVE-2023-1915 - https://wpscan.com/vulnerability/0487c3f6-1a3c-4089-a614-15138f52f69b -CVE-2023-1916 - https://gitlab.com/libtiff/libtiff/-/issues/537 -CVE-2023-1934 - http://packetstormsecurity.com/files/172511/PnPSCADA-2.x-SQL-Injection.html -CVE-2023-1936 - https://gitlab.com/gitlab-org/gitlab/-/issues/405150 -CVE-2023-1938 - https://wpscan.com/vulnerability/92b1c6d8-51db-46aa-bde6-abdfb091aab5 -CVE-2023-1947 - https://gitee.com/misak7in/cve/blob/master/taocms.md -CVE-2023-1956 - https://vuldb.com/?id.225343 -CVE-2023-1960 - https://vuldb.com/?id.225347 -CVE-2023-1965 - https://gitlab.com/gitlab-org/gitlab/-/issues/406235 -CVE-2023-1974 - https://huntr.dev/bounties/852781c6-9cc8-4d25-9336-bf3cb8ee3439 -CVE-2023-1977 - https://wpscan.com/vulnerability/842f3b1f-395a-4ea2-b7df-a36f70e8c790 -CVE-2023-1982 - https://wpscan.com/vulnerability/51987966-8007-4e12-bc2e-997b92054739 -CVE-2023-1985 - https://vuldb.com/?id.225533 -CVE-2023-1988 - https://vuldb.com/?id.225536 -CVE-2023-1998 - https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx -CVE-2023-20009 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8 -CVE-2023-2002 - https://www.openwall.com/lists/oss-security/2023/04/16/3 -CVE-2023-20024 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20025 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 -CVE-2023-20026 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 -CVE-2023-2003 - https://www.hackplayers.com/2023/07/vulnerabilidad-vision1210-unitronics.html -CVE-2023-20032 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy -CVE-2023-2004 - https://bugzilla.redhat.com/show_bug.cgi?id=2186428 -CVE-2023-20046 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j7p3-gjw6-pp4r -CVE-2023-20046 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h -CVE-2023-20065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qrpq-fp26-7v9r -CVE-2023-20065 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-priv-escalate-Xg8zkyPk -CVE-2023-20075 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8 -CVE-2023-2009 - https://wpscan.com/vulnerability/f7988a18-ba9d-4ead-82c8-30ea8223846f -CVE-2023-20098 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch -CVE-2023-2010 - https://wpscan.com/vulnerability/d0da4c0d-622f-4310-a867-6bfdb474073a -CVE-2023-20116 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-4Ag3yWbD -CVE-2023-20118 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 -CVE-2023-2014 - https://huntr.dev/bounties/a77bf7ed-6b61-452e-b5ee-e20017e28d1a -CVE-2023-20156 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20157 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20158 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20159 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20160 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20161 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20162 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-2017 - https://starlabs.sg/advisories/23/23-2017/ -CVE-2023-20178 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw -CVE-2023-20189 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -CVE-2023-20197 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee -CVE-2023-20198 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html -CVE-2023-20198 - https://www.darkreading.com/vulnerabilities-threats/critical-unpatched-cisco-zero-day-bug-active-exploit -CVE-2023-20209 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ -CVE-2023-2021 - https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0 -CVE-2023-20211 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2 -CVE-2023-20217 - http://packetstormsecurity.com/files/174232/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Read.html -CVE-2023-20217 - http://seclists.org/fulldisclosure/2023/Aug/19 -CVE-2023-2022 - https://gitlab.com/gitlab-org/gitlab/-/issues/407166 -CVE-2023-20224 - http://packetstormsecurity.com/files/174233/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Privilege-Escalation.html -CVE-2023-20224 - http://seclists.org/fulldisclosure/2023/Aug/20 -CVE-2023-2023 - https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317 -CVE-2023-20235 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn -CVE-2023-2026 - https://wpscan.com/vulnerability/2b59f640-5568-42bb-87b7-36eb448db5be -CVE-2023-20273 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html -CVE-2023-2028 - https://wpscan.com/vulnerability/0f1c1f1c-acdd-4c8a-bd5e-a21f4915e69f -CVE-2023-2029 - http://packetstormsecurity.com/files/173729/WordPress-PrePost-SEO-3.0-Cross-Site-Scripting.html -CVE-2023-2029 - https://wpscan.com/vulnerability/4889ad5a-c8c4-4958-b176-64560490497b -CVE-2023-2032 - https://wpscan.com/vulnerability/17acde5d-44ea-4e77-8670-260d22e28ffe -CVE-2023-2034 - https://huntr.dev/bounties/aba6beaa-570e-4523-8128-da4d8e374ef6 -CVE-2023-2035 - https://vuldb.com/?id.225913 -CVE-2023-2036 - https://vuldb.com/?id.225914 -CVE-2023-2037 - https://vuldb.com/?id.225915 -CVE-2023-2042 - https://vuldb.com/?id.225920 -CVE-2023-2050 - https://github.com/E1CHO/cve_hub/blob/main/Advanced%20Online%20Voting%20System/Advanced%20Online%20Voting%20System%20-%20vuln%204.pdf -CVE-2023-2051 - https://vuldb.com/?id.225936 -CVE-2023-2054 - https://vuldb.com/?id.225939 -CVE-2023-2055 - https://vuldb.com/?id.225940 -CVE-2023-20569 - https://comsec.ethz.ch/research/microarch/inception/ -CVE-2023-2057 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS1.md -CVE-2023-2057 - https://vuldb.com/?id.225942 -CVE-2023-2058 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS2.md -CVE-2023-2058 - https://vuldb.com/?id.225943 -CVE-2023-20593 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-20593 - http://www.openwall.com/lists/oss-security/2023/07/24/3 -CVE-2023-2068 - http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html -CVE-2023-2068 - https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056 -CVE-2023-2069 - https://gitlab.com/gitlab-org/gitlab/-/issues/407374 -CVE-2023-2074 - https://github.com/E1CHO/cve_hub/blob/main/Online%20Traffic%20Offense%20Management%20System/Online%20Traffic%20Offense%20Management%20System%20-%20vuln%202.pdf -CVE-2023-2074 - https://vuldb.com/?id.226052 -CVE-2023-20854 - https://www.vmware.com/security/advisories/VMSA-2023-0003.html -CVE-2023-20857 - http://packetstormsecurity.com/files/171158/VMware-Security-Advisory-2023-0006.html -CVE-2023-20887 - http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html -CVE-2023-2089 - https://vuldb.com/?id.226097 -CVE-2023-20891 - https://www.vmware.com/security/advisories/VMSA-2023-0016.html -CVE-2023-20894 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658 -CVE-2023-20895 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740 -CVE-2023-20902 - https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf -CVE-2023-20928 - http://packetstormsecurity.com/files/170855/Android-Binder-VMA-Management-Security-Issues.html -CVE-2023-20937 - http://packetstormsecurity.com/files/171239/Android-GKI-Kernels-Contain-Broken-Non-Upstream-Speculative-Page-Faults-MM-Code.html -CVE-2023-2097 - https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%206.pdf -CVE-2023-2102 - https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44 -CVE-2023-2103 - https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc -CVE-2023-2105 - https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1 -CVE-2023-2107 - https://vuldb.com/?id.226110 -CVE-2023-2109 - https://huntr.dev/bounties/fd5999fd-b1fd-44b4-ae2e-8f95b5c3d1b6 -CVE-2023-2110 - https://starlabs.sg/advisories/23/23-2110/ -CVE-2023-2111 - https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2 -CVE-2023-2113 - https://wpscan.com/vulnerability/ddb4c95d-bbee-4095-aed6-25f6b8e63011 -CVE-2023-2114 - https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d -CVE-2023-2117 - https://wpscan.com/vulnerability/44024299-ba40-4da7-81e1-bd44d10846f3 -CVE-2023-2122 - https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78 -CVE-2023-2123 - https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin -CVE-2023-2123 - https://wpscan.com/vulnerability/44448888-cd5d-482e-859e-123e442ce5c1 -CVE-2023-21238 - https://android.googlesource.com/platform/frameworks/base/+/91bfcbbd87886049778142618a655352b16cd911 -CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3 -CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad -CVE-2023-21255 - https://android.googlesource.com/kernel/common/+/1ca1130ec62d -CVE-2023-21274 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/2bffd7f5e66dd0cf7e5668fb65c4f2b2e9f87cf7 -CVE-2023-21282 - https://android.googlesource.com/platform/external/aac/+/4242f97d149b0bf0cd96f00cd1e9d30d5922cd46 -CVE-2023-21285 - https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1 -CVE-2023-21292 - https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670d -CVE-2023-2138 - https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6 -CVE-2023-21400 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-2143 - https://wpscan.com/vulnerability/91898762-aa7d-4fbc-a016-3de48901e5de -CVE-2023-2150 - https://youtu.be/o46oHLvY2-E -CVE-2023-2152 - https://vuldb.com/?id.226273 -CVE-2023-21521 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406 -CVE-2023-21522 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406 -CVE-2023-2154 - https://youtu.be/teK82KkWtdA -CVE-2023-2156 - http://www.openwall.com/lists/oss-security/2023/05/19/1 -CVE-2023-2160 - https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b -CVE-2023-2164 - https://gitlab.com/gitlab-org/gitlab/-/issues/407783 -CVE-2023-21665 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html -CVE-2023-21666 - http://packetstormsecurity.com/files/172664/Qualcomm-Adreno-KGSL-Data-Leakage.html -CVE-2023-21670 - http://packetstormsecurity.com/files/173296/Qualcomm-Adreno-KGSL-Insecure-Execution.html -CVE-2023-21675 - http://packetstormsecurity.com/files/170852/Windows-Kernel-Registry-Virtualization-Memory-Corruption.html -CVE-2023-21747 - http://packetstormsecurity.com/files/170933/Windows-Kernel-Dangling-Registry-Link-Node-Use-After-Free.html -CVE-2023-21748 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html -CVE-2023-21748 - http://packetstormsecurity.com/files/170949/Windows-Kernel-Registry-Virtualization-Incompatibility.html -CVE-2023-21749 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html -CVE-2023-21750 - http://packetstormsecurity.com/files/170948/Windows-Kernel-Virtualizable-Hive-Key-Deletion.html -CVE-2023-21768 - http://packetstormsecurity.com/files/171606/Ancillary-Function-Driver-AFD-For-Winsock-Privilege-Escalation.html -CVE-2023-21772 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html -CVE-2023-21773 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html -CVE-2023-21774 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html -CVE-2023-21776 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html -CVE-2023-21776 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html -CVE-2023-2178 - https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb -CVE-2023-2179 - https://wpscan.com/vulnerability/fbc56973-4225-4f44-8c38-d488e57cd551 -CVE-2023-2180 - https://wpscan.com/vulnerability/4d3b90d8-8a6d-4b72-8bc7-21f861259a1b -CVE-2023-21824 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21825 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21826 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21827 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21828 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21829 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-2183 - https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3 -CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21831 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21832 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21834 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21835 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21836 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21837 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21838 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21839 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html -CVE-2023-21839 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21840 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21841 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21842 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21843 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21844 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21845 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21846 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21847 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21848 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21849 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21850 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21851 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21852 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21853 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21854 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21855 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21856 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21857 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21858 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21859 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-2186 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html -CVE-2023-21860 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21861 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21862 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21863 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21864 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21865 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21866 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21867 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21868 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21869 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-2187 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html -CVE-2023-21870 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21871 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21872 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21873 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21874 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21875 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21876 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21877 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21878 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21879 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21880 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21881 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21882 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21883 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21884 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21885 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21886 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21887 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21888 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21889 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21890 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21891 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21892 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21893 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21894 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21896 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21898 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21899 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21900 - https://www.oracle.com/security-alerts/cpujan2023.html -CVE-2023-21902 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21903 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21904 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21905 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21906 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21907 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21908 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21909 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-2191 - https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31 -CVE-2023-21910 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21911 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21912 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21913 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21915 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21916 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21917 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21918 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21919 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21920 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21921 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21922 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21923 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21924 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21925 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21926 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21927 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21928 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21929 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-2193 - https://mattermost.com/security-updates/ -CVE-2023-21930 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21931 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html -CVE-2023-21931 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21932 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21933 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21934 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21935 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21936 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21937 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21938 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21939 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21940 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21941 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21942 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21943 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21944 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21945 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21946 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21947 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21948 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21949 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21950 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21952 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21953 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21954 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21955 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21956 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21959 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21960 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21961 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21962 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21963 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21964 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21965 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21966 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21967 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21968 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21969 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21970 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21971 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21971 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21972 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21973 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21974 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21975 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21976 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21977 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21978 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21979 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21980 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21981 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21982 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21983 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21984 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21985 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21986 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21987 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21988 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21989 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21990 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21991 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21992 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21993 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21994 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-21996 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21997 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21998 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-21999 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-22000 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-22001 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-22002 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-22003 - https://www.oracle.com/security-alerts/cpuapr2023.html -CVE-2023-22004 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22005 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22006 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22007 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22008 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22009 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22010 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22011 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22012 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22013 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22014 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22016 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22017 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22018 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22020 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22021 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22022 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22023 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22027 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22031 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22033 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22034 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22035 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22036 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22037 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22038 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22039 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22040 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22041 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22042 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22043 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22044 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22045 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22046 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22047 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22048 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22049 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22050 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22051 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22052 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22053 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22054 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22055 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22056 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22057 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22058 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22060 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22061 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22062 - https://www.oracle.com/security-alerts/cpujul2023.html -CVE-2023-22074 - http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html -CVE-2023-2212 - https://vuldb.com/?id.226977 -CVE-2023-2216 - https://vuldb.com/?id.226981 -CVE-2023-2221 - https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657 -CVE-2023-2223 - http://packetstormsecurity.com/files/173726/WordPress-Login-Rebuilder-Cross-Site-Scripting.html -CVE-2023-2223 - https://wpscan.com/vulnerability/7b356b82-5d03-4f70-b4ce-f1405304bb52 -CVE-2023-22232 - http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html -CVE-2023-2224 - http://packetstormsecurity.com/files/173725/WordPress-Seo-By-10Web-Cross-Site-Scripting.html -CVE-2023-2224 - https://wpscan.com/vulnerability/a76b6d22-1e00-428a-8a04-12162bd0d992 -CVE-2023-2225 - https://wpscan.com/vulnerability/0af475ba-5c02-4f62-876d-6235a745bbd6 -CVE-2023-2227 - https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3 -CVE-2023-2228 - https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9 -CVE-2023-22291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1687 -CVE-2023-22299 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1712 -CVE-2023-22306 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1698 -CVE-2023-22308 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737 -CVE-2023-2231 - https://vuldb.com/?id.227001 -CVE-2023-22319 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701 -CVE-2023-22325 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736 -CVE-2023-2233 - https://gitlab.com/gitlab-org/gitlab/-/issues/408359 -CVE-2023-2235 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2 -CVE-2023-2236 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4 -CVE-2023-22365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1711 -CVE-2023-22371 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1703 -CVE-2023-2239 - https://huntr.dev/bounties/edeff16b-fc71-4e26-8d2d-dfe7bb5e7868 -CVE-2023-2240 - https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203 -CVE-2023-2241 - https://github.com/podofo/podofo/files/11260976/poc-file.zip -CVE-2023-2241 - https://github.com/podofo/podofo/issues/69 -CVE-2023-2241 - https://vuldb.com/?id.227226 -CVE-2023-2242 - https://docs.google.com/document/d/1GZt9MKB2K-nDrg0cnrnU6_z9wDd9xPE-YJbPV2Qgqg4/edit -CVE-2023-2245 - https://github.com/MorStardust/hansuncmswebshell/blob/main/README.md -CVE-2023-2245 - https://vuldb.com/?id.227230 -CVE-2023-22451 - https://huntr.dev/bounties/32a873c8-f605-4aae-9272-d80985ef2b73 -CVE-2023-2246 - http://packetstormsecurity.com/files/172182/Online-Pizza-Ordering-System-1.0-Shell-Upload.html -CVE-2023-2248 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d -CVE-2023-22481 - https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8vvv-jxg6-8578 -CVE-2023-22483 - https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c -CVE-2023-22484 - https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r -CVE-2023-22485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr -CVE-2023-22486 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p -CVE-2023-2251 - https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c -CVE-2023-22515 - http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html -CVE-2023-22518 - http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html -CVE-2023-2252 - https://wpscan.com/vulnerability/9da6eede-10d0-4609-8b97-4a5d38fa8e69/ -CVE-2023-22527 - http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html -CVE-2023-2254 - https://wpscan.com/vulnerability/8886ec5f-8465-448f-adbd-68a3e84c5dec -CVE-2023-2256 - https://wpscan.com/vulnerability/1187e041-3be2-4613-8d56-c2394fcc75fb -CVE-2023-2258 - https://huntr.dev/bounties/31eaf0fe-4d91-4022-aa9b-802bc6eafb8f -CVE-2023-2259 - https://huntr.dev/bounties/e753bce0-ce82-463b-b344-2f67b39b60ff -CVE-2023-22612 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ -CVE-2023-22613 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ -CVE-2023-22614 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ -CVE-2023-22616 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ -CVE-2023-22620 - http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html -CVE-2023-22620 - http://seclists.org/fulldisclosure/2023/Apr/7 -CVE-2023-22620 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt -CVE-2023-22621 - https://github.com/strapi/strapi/releases -CVE-2023-22621 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve -CVE-2023-22621 - https://www.ghostccamm.com/blog/multi_strapi_vulns/ -CVE-2023-22622 - https://www.tenable.com/plugins/was/113449 -CVE-2023-22629 - http://packetstormsecurity.com/files/171737/Titan-FTP-Path-Traversal.html -CVE-2023-22629 - https://f20.be/cves/titan-ftp-vulnerabilities -CVE-2023-22629 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf -CVE-2023-22630 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j94f-5cg6-6j9j -CVE-2023-22653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1714 -CVE-2023-22659 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1699 -CVE-2023-22660 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1722 -CVE-2023-22671 - https://github.com/NationalSecurityAgency/ghidra/issues/4869 -CVE-2023-2271 - https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b -CVE-2023-22710 - https://patchstack.com/database/vulnerability/wc-return-warrranty/wordpress-return-and-warranty-management-system-for-woocommerce-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve -CVE-2023-2272 - https://wpscan.com/vulnerability/dba60216-2753-40b7-8f2b-6caeba684b2e -CVE-2023-22726 - https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff -CVE-2023-22726 - https://securitylab.github.com/advisories/GHSL-2023-004_act/ -CVE-2023-22741 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54 -CVE-2023-22745 - https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67 -CVE-2023-22809 - http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html -CVE-2023-22809 - http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html -CVE-2023-22809 - http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html -CVE-2023-22809 - http://seclists.org/fulldisclosure/2023/Aug/21 -CVE-2023-22809 - http://www.openwall.com/lists/oss-security/2023/01/19/1 -CVE-2023-2281 - https://mattermost.com/security-updates/ -CVE-2023-22812 - https://www.westerndigital.com/support/product-security/wdc-23005-sandisk-privateaccess-software-update -CVE-2023-22813 - https://www.westerndigital.com/support/product-security/wdc-23004-western-digital-my-cloud-os-5-my-cloud-home-sandisk-ibi-and-wd-cloud-mobile-and-web-app-update -CVE-2023-2283 - http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html -CVE-2023-22833 - https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae -CVE-2023-22834 - https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8 -CVE-2023-22835 - https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d -CVE-2023-22844 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700 -CVE-2023-22845 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1708 -CVE-2023-22855 - http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html -CVE-2023-22855 - http://packetstormsecurity.com/files/171689/Kardex-Mlog-MCC-5.7.12-Remote-Code-Execution.html -CVE-2023-22855 - http://seclists.org/fulldisclosure/2023/Feb/10 -CVE-2023-22855 - https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md -CVE-2023-22855 - https://www.exploit-db.com/exploits/51239 -CVE-2023-2287 - https://wpscan.com/vulnerability/1b36a184-2138-4a65-8940-07e7764669bb -CVE-2023-2288 - https://wpscan.com/vulnerability/93acb4ee-1053-48e1-8b69-c09dc3b2f302 -CVE-2023-22893 - https://github.com/strapi/strapi/releases -CVE-2023-22893 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve -CVE-2023-22893 - https://www.ghostccamm.com/blog/multi_strapi_vulns/ -CVE-2023-22894 - https://github.com/strapi/strapi/releases -CVE-2023-22894 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve -CVE-2023-22894 - https://www.ghostccamm.com/blog/multi_strapi_vulns/ -CVE-2023-22897 - http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html -CVE-2023-22897 - http://seclists.org/fulldisclosure/2023/Apr/8 -CVE-2023-22897 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt -CVE-2023-22899 - https://breakingthe3ma.app -CVE-2023-22899 - https://breakingthe3ma.app/files/Threema-PST22.pdf -CVE-2023-22906 - https://github.com/nonamecoder/CVE-2023-22906 -CVE-2023-2291 - https://tenable.com/security/research/tra-2023-16 -CVE-2023-22947 - https://shibboleth.atlassian.net/browse/SSPCPP-961 -CVE-2023-22947 - https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs -CVE-2023-22952 - http://packetstormsecurity.com/files/171320/SugarCRM-12.x-Remote-Code-Execution-Shell-Upload.html -CVE-2023-22955 - http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html -CVE-2023-22955 - http://seclists.org/fulldisclosure/2023/Aug/17 -CVE-2023-22955 - https://syss.de -CVE-2023-22955 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-055.txt -CVE-2023-22956 - http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html -CVE-2023-22956 - http://seclists.org/fulldisclosure/2023/Aug/16 -CVE-2023-22956 - https://syss.de -CVE-2023-22956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-054.txt -CVE-2023-22957 - http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html -CVE-2023-22957 - http://seclists.org/fulldisclosure/2023/Aug/15 -CVE-2023-22957 - https://syss.de -CVE-2023-22957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt -CVE-2023-22958 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md -CVE-2023-22959 - https://github.com/chenan224/webchess_sqli_poc -CVE-2023-2296 - https://wpscan.com/vulnerability/8126ff73-c0e5-4c1b-ba10-2e51f690521e -CVE-2023-2297 - https://www.wordfence.com/blog/2023/03/vulnerability-patched-in-cozmolabs-profile-builder-plugin-information-disclosure-leads-to-account-takeover/ -CVE-2023-22971 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5743.php -CVE-2023-2298 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-22984 - https://d0ub1e-d.github.io/2022/12/30/exploit-db-1/ -CVE-2023-2299 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-22995 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 -CVE-2023-22996 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 -CVE-2023-22997 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2 -CVE-2023-22999 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 -CVE-2023-2300 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-23000 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 -CVE-2023-23001 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 -CVE-2023-23002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 -CVE-2023-23003 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16 -CVE-2023-23004 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 -CVE-2023-23005 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 -CVE-2023-23006 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13 -CVE-2023-2301 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-2302 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-2303 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-23040 - https://midist0xf.medium.com/tl-wr940n-uses-weak-md5-hashing-algorithm-ae7b589860d2 -CVE-2023-23059 - https://packetstormsecurity.com/files/172141/GV-Edge-Recording-Manager-2.2.3.0-Privilege-Escalation.html -CVE-2023-23063 - https://github.com/ahmedalroky/CVEs/tree/cellinx -CVE-2023-23064 - https://github.com/shellpei/TOTOLINK-Unauthorized/blob/main/CVE-2023-23064 -CVE-2023-2307 - https://huntr.dev/bounties/204ea12e-9e5c-4166-bf0e-fd49c8836917 -CVE-2023-23073 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459171?tab=originator -CVE-2023-23074 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459195?tab=originator -CVE-2023-23075 - https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator -CVE-2023-23076 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459751?tab=originator -CVE-2023-23077 - https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator -CVE-2023-23078 - https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator -CVE-2023-23080 - https://github.com/fxc233/iot-vul/tree/main/Tenda/IPC -CVE-2023-2309 - https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d -CVE-2023-2315 - https://starlabs.sg/advisories/23/23-2315/ -CVE-2023-2316 - https://starlabs.sg/advisories/23/23-2316/ -CVE-2023-23161 - http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html -CVE-2023-23162 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html -CVE-2023-23163 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html -CVE-2023-23169 - https://github.com/S4nshine/CVE-2023-23169 -CVE-2023-2317 - https://starlabs.sg/advisories/23/23-2317/ -CVE-2023-2318 - https://github.com/marktext/marktext/issues/3618 -CVE-2023-2318 - https://starlabs.sg/advisories/23/23-2318/ -CVE-2023-2320 - https://wpscan.com/vulnerability/f17ccbaa-2fcd-4f17-a4da-73f2bc8a4fe9 -CVE-2023-2321 - https://wpscan.com/vulnerability/79a56359-f7e8-4c8c-b0aa-6300f5d57880 -CVE-2023-2322 - https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67 -CVE-2023-2323 - https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3 -CVE-2023-2324 - https://wpscan.com/vulnerability/50d81eec-f324-4445-b10f-96e94153917e -CVE-2023-2326 - https://wpscan.com/vulnerability/f922695a-b803-4edf-aadc-80c79d99bebb -CVE-2023-2327 - https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6 -CVE-2023-23277 - https://github.com/pawelmalak/snippet-box/issues/57 -CVE-2023-23279 - https://hackmd.io/mG658E9iSW6TkbS8xAuUNg -CVE-2023-2328 - https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6 -CVE-2023-23286 - http://packetstormsecurity.com/files/171734/Provide-Server-14.4-XSS-Cross-Site-Request-Forgery-Code-Execution.html -CVE-2023-23286 - https://f20.be/cves/provide-server-v-14-4 -CVE-2023-2329 - https://wpscan.com/vulnerability/6e58f099-e8d6-49e4-9f02-d6a556c5b1d2 -CVE-2023-23294 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ -CVE-2023-23295 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ -CVE-2023-23296 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ -CVE-2023-23298 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23298.md -CVE-2023-23299 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23299.md -CVE-2023-2330 - https://wpscan.com/vulnerability/fa8ccdd0-7b23-4b12-9aa9-4b29d47256b8 -CVE-2023-23300 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23300.md -CVE-2023-23301 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23301.md -CVE-2023-23302 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23302.md -CVE-2023-23303 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23303.md -CVE-2023-23304 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23304.md -CVE-2023-23305 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23305.md -CVE-2023-23306 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23306.md -CVE-2023-23315 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/01/stripejs.html -CVE-2023-23326 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md -CVE-2023-23327 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md -CVE-2023-23328 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md -CVE-2023-2333 - https://wpscan.com/vulnerability/13c4e065-fde6-41a4-a22b-bca1b10e0d30 -CVE-2023-23330 - https://medium.com/@saleh.py/amano-xparc-local-file-inclusion-cve-2023-23330-672ae8fbfd1e -CVE-2023-23331 - https://0xhunter20.medium.com/how-i-found-my-first-blind-sql-injection-cve-2023-23331-aef103a7f73c -CVE-2023-23333 - http://packetstormsecurity.com/files/174537/SolarView-Compact-6.00-Remote-Command-Execution.html -CVE-2023-23333 - https://github.com/Timorlover/CVE-2023-23333 -CVE-2023-2336 - https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14 -CVE-2023-2337 - https://wpscan.com/vulnerability/e5a6f834-80a4-406b-acae-57ffeec2e689 -CVE-2023-2338 - https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462 -CVE-2023-2339 - https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2 -CVE-2023-23399 - http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html -CVE-2023-2340 - https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b -CVE-2023-23408 - http://packetstormsecurity.com/files/173134/Azure-Apache-Ambari-2302250400-Spoofing.html -CVE-2023-2341 - https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d -CVE-2023-2342 - https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829 -CVE-2023-23420 - http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html -CVE-2023-23420 - http://packetstormsecurity.com/files/171867/Microsoft-Windows-Kernel-New-Registry-Key-name-Insufficient-Validation.html -CVE-2023-23421 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html -CVE-2023-23422 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html -CVE-2023-23423 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html -CVE-2023-2343 - https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2 -CVE-2023-23454 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12 -CVE-2023-23455 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b -CVE-2023-23456 - https://github.com/upx/upx/issues/632 -CVE-2023-23457 - https://github.com/upx/upx/issues/631 -CVE-2023-23488 - http://packetstormsecurity.com/files/171661/WordPress-Paid-Memberships-Pro-2.9.8-SQL-Injection.html -CVE-2023-23488 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-23489 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-23490 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-23491 - https://www.tenable.com/security/research/tra-2023-3 -CVE-2023-23492 - https://www.tenable.com/security/research/tra-2023-3 -CVE-2023-23514 - http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html -CVE-2023-23514 - http://seclists.org/fulldisclosure/2023/Mar/21 -CVE-2023-23529 - http://seclists.org/fulldisclosure/2023/Mar/20 -CVE-2023-23546 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1705 -CVE-2023-23547 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1695 -CVE-2023-23550 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694 -CVE-2023-2356 - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896 -CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository -CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md -CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository -CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md -CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository -CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md -CVE-2023-23567 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1729 -CVE-2023-23571 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1696 -CVE-2023-23581 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1741 -CVE-2023-2359 - https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65 -CVE-2023-23596 - https://advisory.dw1.io/57 -CVE-2023-23599 - https://bugzilla.mozilla.org/show_bug.cgi?id=1777800 -CVE-2023-23607 - https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq -CVE-2023-23608 - https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v -CVE-2023-2361 - https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7 -CVE-2023-23614 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-33w4-xf7m-f82m -CVE-2023-2362 - https://wpscan.com/vulnerability/27e70507-fd68-4915-88cf-0b96ed55208e -CVE-2023-2363 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-SQL-Injection-1.md -CVE-2023-23634 - https://herolab.usd.de/en/security-advisories/usd-2022-0066/ -CVE-2023-23635 - https://herolab.usd.de/security-advisories/usd-2022-0031/ -CVE-2023-23636 - https://herolab.usd.de/security-advisories/usd-2022-0030/ -CVE-2023-2364 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-Stored-Cross-Site-Scripting-1.md -CVE-2023-2366 - https://vuldb.com/?id.227642 -CVE-2023-2374 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/6 -CVE-2023-2374 - https://vuldb.com/?id.227650 -CVE-2023-23770 - https://tetraburst.com/ -CVE-2023-23771 - https://tetraburst.com/ -CVE-2023-23772 - https://tetraburst.com/ -CVE-2023-23773 - https://tetraburst.com/ -CVE-2023-23774 - https://tetraburst.com/ -CVE-2023-2378 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/4 -CVE-2023-2380 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/17 -CVE-2023-2382 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/1 -CVE-2023-2382 - https://vuldb.com/?id.227660 -CVE-2023-2383 - https://vuldb.com/?id.227661 -CVE-2023-2384 - https://vuldb.com/?id.227662 -CVE-2023-2385 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/5 -CVE-2023-23851 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23852 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23853 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23854 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23855 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23856 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23857 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23858 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23859 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-23860 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-2389 - https://vuldb.com/?id.227667 -CVE-2023-2390 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/10 -CVE-2023-23902 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1697 -CVE-2023-23907 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702 -CVE-2023-2391 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/11 -CVE-2023-2392 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/12 -CVE-2023-2392 - https://vuldb.com/?id.227670 -CVE-2023-23924 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg -CVE-2023-23927 - https://github.com/craftcms/cms/security/advisories/GHSA-qcrj-6ffc-v7hq -CVE-2023-2393 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/13 -CVE-2023-2393 - https://vuldb.com/?id.227671 -CVE-2023-2394 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/14 -CVE-2023-23948 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/ -CVE-2023-2395 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/15 -CVE-2023-2395 - https://vuldb.com/?id.227673 -CVE-2023-23956 - http://packetstormsecurity.com/files/173038/Symantec-SiteMinder-WebAgent-12.52-Cross-Site-Scripting.html -CVE-2023-2396 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/16 -CVE-2023-2398 - https://wpscan.com/vulnerability/16d47d20-58aa-4d04-9275-fd91ce926ff3 -CVE-2023-2399 - https://wpscan.com/vulnerability/deca3cd3-f7cf-469f-9f7e-3612f7ae514d -CVE-2023-2401 - https://wpscan.com/vulnerability/0746ea56-dd88-4fc3-86a3-54408eef1f94 -CVE-2023-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715 -CVE-2023-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718 -CVE-2023-24033 - http://packetstormsecurity.com/files/172137/Shannon-Baseband-accept-type-SDP-Attribute-Memory-Corruption.html -CVE-2023-24039 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt -CVE-2023-24039 - https://security.humanativaspa.it/nothing-new-under-the-sun/ -CVE-2023-2404 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-24040 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt -CVE-2023-24040 - https://security.humanativaspa.it/nothing-new-under-the-sun/ -CVE-2023-24044 - https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae -CVE-2023-24044 - https://medium.com/@jetnipat.tho/cve-2023-24044-10e48ab940d8 -CVE-2023-24045 - https://dataiku.com -CVE-2023-24045 - https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b -CVE-2023-24046 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-24047 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-24048 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-24049 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-2405 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-24050 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-24051 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-24052 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -CVE-2023-24055 - https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/ -CVE-2023-2406 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-24068 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/ -CVE-2023-24069 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/ -CVE-2023-2407 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-24078 - http://packetstormsecurity.com/files/173279/FuguHub-8.1-Remote-Code-Execution.html -CVE-2023-24078 - https://github.com/ojan2021/Fuguhub-8.1-RCE -CVE-2023-24095 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md -CVE-2023-24096 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md -CVE-2023-24097 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/03/README.md -CVE-2023-24098 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/04/README.md -CVE-2023-24099 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md -CVE-2023-24114 - https://github.com/typecho/typecho/issues/1523 -CVE-2023-24117 - https://oxnan.com/posts/WifiBasic_wepauth_5g_DoS -CVE-2023-24118 - https://oxnan.com/posts/WifiBasic_security_DoS -CVE-2023-24119 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS -CVE-2023-24120 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS -CVE-2023-24121 - https://oxnan.com/posts/WifiBasic_security_5g_DoS -CVE-2023-24122 - https://oxnan.com/posts/WifiBasic_ssid_5g_DoS -CVE-2023-24123 - https://oxnan.com/posts/WifiBasic_wepauth_DoS -CVE-2023-24124 - https://oxnan.com/posts/WifiBasic_wrlEn_DoS -CVE-2023-24125 - https://oxnan.com/posts/WifiBasic_wepkey2_5g_DoS -CVE-2023-24126 - https://oxnan.com/posts/WifiBasic_wepkey4_5g_DoS -CVE-2023-24127 - https://oxnan.com/posts/WifiBasic_wepkey1_DoS -CVE-2023-24128 - https://oxnan.com/posts/WifiBasic_wepkey2_DoS -CVE-2023-24129 - https://oxnan.com/posts/WifiBasic_wepkey4_DoS -CVE-2023-24130 - https://oxnan.com/posts/WifiBasic_wepkey_DoS -CVE-2023-24131 - https://oxnan.com/posts/WifiBasic_wepkey1_5g_DoS -CVE-2023-24132 - https://oxnan.com/posts/WifiBasic_wepkey3_5g_DoS -CVE-2023-24133 - https://oxnan.com/posts/WifiBasic_wepkey_5g_DoS -CVE-2023-24134 - https://oxnan.com/posts/WifiBasic_wepkey3_DoS -CVE-2023-24135 - https://oxnan.com/posts/WriteFacMac-Command-Injection -CVE-2023-24138 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/NTPSyncWithHost/NTPSyncWithHost.md -CVE-2023-2414 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-2415 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-24150 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveDlfw/meshSlaveDlfw.md -CVE-2023-24151 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md -CVE-2023-24152 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveUpdate/meshSlaveUpdate.md -CVE-2023-24153 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md -CVE-2023-24154 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/setUpgradeFW/setUpgradeFW.md -CVE-2023-24156 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveUpgstatus/recvSlaveUpgstatus.md -CVE-2023-24157 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/updateWifiInfo/updateWifiInfo.md -CVE-2023-24159 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md -CVE-2023-2416 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -CVE-2023-24160 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admuser/setPasswordCfg_admuser.md -CVE-2023-24164 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/4/4.md -CVE-2023-24165 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/7/7.md -CVE-2023-24166 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md -CVE-2023-24167 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/1/1.md -CVE-2023-24169 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/6/6.md -CVE-2023-2417 - http://packetstormsecurity.com/files/172105/Advanced-Host-Monitor-12.56-Unquoted-Service-Path.html -CVE-2023-24170 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/3/3.md -CVE-2023-24181 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-9gqg-pp5p-q9hg -CVE-2023-24182 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-7vqh-2r8q-rjg2 -CVE-2023-24205 - https://github.com/Fndroid/clash_for_windows_pkg/issues/3891 -CVE-2023-2421 - https://youtu.be/4JOLhAuoizE -CVE-2023-24212 - https://github.com/Venus-WQLab/bug_report/blob/main/Tenda/CVE-2023-24212.md -CVE-2023-24212 - https://github.com/w0x68y/cve-lists/blob/main/Tenda/vuln/readme.md -CVE-2023-24217 - http://packetstormsecurity.com/files/171252/Agilebio-Lab-Collector-4.234-Remote-Code-Execution.html -CVE-2023-24229 - https://github.com/sadwwcxz/Vul -CVE-2023-24229 - https://web.archive.org/web/20230315181013/https://github.com/sadwwcxz/Vul -CVE-2023-24230 - https://medium.com/@0x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a -CVE-2023-24231 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b -CVE-2023-24232 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b -CVE-2023-24233 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b -CVE-2023-24234 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b -CVE-2023-24236 - https://github.com/Am1ngl/ttt/tree/main/19 -CVE-2023-24238 - https://github.com/Am1ngl/ttt/tree/main/20 -CVE-2023-24249 - https://flyd.uk/post/cve-2023-24249/ -CVE-2023-24251 - https://github.com/Cutegod/CMS_0_day/issues/2 -CVE-2023-2426 - https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425 -CVE-2023-24261 - https://justinapplegate.me/2023/glinet-CVE-2023-24261/ -CVE-2023-24269 - https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md -CVE-2023-2427 - https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d -CVE-2023-24276 - https://github.com/Am1ngl/ttt/tree/main/18 -CVE-2023-24279 - https://www.edoardoottavianelli.it/CVE-2023-24279 -CVE-2023-24279 - https://www.youtube.com/watch?v=1mSXzzwcGMM -CVE-2023-2428 - https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e -CVE-2023-24282 - https://www.cryptnetix.com/blog/2023/01/19/Polycom-Trio-Vulnerability-Disclosure.html -CVE-2023-2429 - https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540 -CVE-2023-24317 - https://packetstormsecurity.com/files/170205/Judging-Management-System-1.0-Shell-Upload.html -CVE-2023-24320 - https://yuyudhn.github.io/CVE-2023-24320/ -CVE-2023-24322 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md -CVE-2023-24323 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md -CVE-2023-24329 - https://github.com/python/cpython/issues/102153 -CVE-2023-24330 - https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330 -CVE-2023-24331 - https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331 -CVE-2023-24332 - https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332 -CVE-2023-24333 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333 -CVE-2023-24334 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334 -CVE-2023-24343 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/01 -CVE-2023-24344 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01 -CVE-2023-24345 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/03 -CVE-2023-24346 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/02 -CVE-2023-24347 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/02 -CVE-2023-24348 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/02 -CVE-2023-24349 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/04 -CVE-2023-24350 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03 -CVE-2023-24351 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/01 -CVE-2023-24352 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/03 -CVE-2023-24364 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md -CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md -CVE-2023-2437 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html -CVE-2023-2437 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2438 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2439 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2440 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2446 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html -CVE-2023-2446 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2447 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-24472 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709 -CVE-2023-24473 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707 -CVE-2023-24479 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762 -CVE-2023-2448 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html -CVE-2023-2448 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2449 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html -CVE-2023-2449 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-24496 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 -CVE-2023-24497 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 -CVE-2023-2451 - https://vuldb.com/?id.227795 -CVE-2023-24519 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706 -CVE-2023-24520 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706 -CVE-2023-24521 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24522 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24523 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24524 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24525 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24526 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24527 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24529 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24530 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-24582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710 -CVE-2023-24583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710 -CVE-2023-24585 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725 -CVE-2023-24595 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713 -CVE-2023-24609 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 -CVE-2023-24620 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md -CVE-2023-24621 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md -CVE-2023-24626 - https://www.exploit-db.com/exploits/51252 -CVE-2023-24651 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24652 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24653 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24654 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24656 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24671 - https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae -CVE-2023-24671 - https://packetstormsecurity.com/files/171300/VX-Search-13.8-Unquoted-Service-Path.html -CVE-2023-24674 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107 -CVE-2023-24674 - https://medium.com/@cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107 -CVE-2023-24675 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107 -CVE-2023-24684 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md -CVE-2023-24685 - http://packetstormsecurity.com/files/172047/ChurchCRM-4.5.3-SQL-Injection.html -CVE-2023-24685 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md -CVE-2023-24686 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md -CVE-2023-24687 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md -CVE-2023-24688 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md -CVE-2023-24689 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md -CVE-2023-24690 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md -CVE-2023-24698 - https://foswiki.org/Support/SecurityAlert-CVE-2023-24698 -CVE-2023-2470 - https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04 -CVE-2023-24709 - http://packetstormsecurity.com/files/171783/Paradox-Security-Systems-IPR512-Denial-Of-Service.html -CVE-2023-24709 - https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 -CVE-2023-24709 - https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 -CVE-2023-2472 - https://wpscan.com/vulnerability/b0e7665a-c8c3-4132-b8d7-8677a90118df -CVE-2023-24720 - https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss -CVE-2023-24721 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-24721/CVE-2023-24721.md -CVE-2023-24728 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24729 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24730 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24731 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24732 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip -CVE-2023-24733 - https://github.com/AetherBlack/CVE/tree/main/PMB -CVE-2023-24734 - https://github.com/AetherBlack/CVE/tree/main/PMB -CVE-2023-24735 - https://github.com/AetherBlack/CVE/tree/main/PMB -CVE-2023-24736 - https://github.com/AetherBlack/CVE/tree/main/PMB -CVE-2023-24737 - https://github.com/AetherBlack/CVE/tree/main/PMB -CVE-2023-2474 - https://vuldb.com/?id.227866 -CVE-2023-24751 - https://github.com/strukturag/libde265/issues/379 -CVE-2023-24752 - https://github.com/strukturag/libde265/issues/378 -CVE-2023-24754 - https://github.com/strukturag/libde265/issues/382 -CVE-2023-24755 - https://github.com/strukturag/libde265/issues/384 -CVE-2023-24756 - https://github.com/strukturag/libde265/issues/380 -CVE-2023-24757 - https://github.com/strukturag/libde265/issues/385 -CVE-2023-24758 - https://github.com/strukturag/libde265/issues/383 -CVE-2023-2476 - https://vuldb.com/?id.227868 -CVE-2023-24762 - https://hackmd.io/@uuXne2y3RjOdpWM87fw6_A/HyPK04zho -CVE-2023-24763 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/06/xenforum.html -CVE-2023-24769 - https://www.edoardoottavianelli.it/CVE-2023-24769 -CVE-2023-24769 - https://www.youtube.com/watch?v=TRTpRlkU3Hc -CVE-2023-24773 - https://github.com/funadmin/funadmin/issues/4 -CVE-2023-24774 - https://github.com/funadmin/funadmin/issues/12 -CVE-2023-24775 - https://github.com/funadmin/funadmin/issues/9 -CVE-2023-24780 - https://github.com/funadmin/funadmin/issues/6 -CVE-2023-24781 - https://github.com/funadmin/funadmin/issues/8 -CVE-2023-24782 - https://github.com/funadmin/funadmin/issues/3 -CVE-2023-24785 - https://sourceforge.net/p/peazip/tickets/734/ -CVE-2023-24788 - http://packetstormsecurity.com/files/171804/NotrinosERP-0.7-SQL-Injection.html -CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.md -CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.py -CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/NotrinosERP/POC.md -CVE-2023-24797 - https://github.com/DrizzlingSun/D-link/blob/main/Dir882/1/1.md -CVE-2023-24798 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/2/2.md -CVE-2023-24799 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/1/1.md -CVE-2023-24800 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/3/3.md -CVE-2023-24804 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/ -CVE-2023-24805 - https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x -CVE-2023-24808 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf -CVE-2023-24815 - https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38 -CVE-2023-24816 - https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7 -CVE-2023-2482 - https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5 -CVE-2023-24824 - https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh -CVE-2023-2485 - https://gitlab.com/gitlab-org/gitlab/-/issues/407830 -CVE-2023-2488 - https://wpscan.com/vulnerability/60226669-0b7b-441f-93d4-b5933e69478f -CVE-2023-2489 - https://wpscan.com/vulnerability/dcbe3334-357a-4744-b50c-309d10cca30d -CVE-2023-2492 - https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 -CVE-2023-2493 - https://wpscan.com/vulnerability/a9a205a4-eef9-4f30-877a-4c562930650c -CVE-2023-2495 - https://wpscan.com/vulnerability/45878983-7e9b-49c2-8f99-4c28aab24f09 -CVE-2023-2497 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-2503 - https://wpscan.com/vulnerability/07b1caf1-d00b-4075-b71a-0516d5604286 -CVE-2023-2507 - https://fluidattacks.com/advisories/maiden/ -CVE-2023-25076 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731 -CVE-2023-25081 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25082 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25083 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25084 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25085 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25086 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25087 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25088 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25089 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25090 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25091 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25092 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25093 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25094 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25095 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25096 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25097 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25098 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25099 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25100 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25101 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25102 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25103 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25104 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25105 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25106 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25107 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25108 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25109 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25110 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25111 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25112 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25113 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25114 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25115 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25116 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25117 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25118 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25119 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25120 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25121 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25122 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25123 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -CVE-2023-25135 - https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable -CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/13/1 -CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/22/1 -CVE-2023-25136 - https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/ -CVE-2023-25136 - https://news.ycombinator.com/item?id=34711565 -CVE-2023-25156 - https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/ -CVE-2023-2516 - https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716 -CVE-2023-25171 - https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e -CVE-2023-25173 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ -CVE-2023-2518 - https://wpscan.com/vulnerability/ca120255-2c50-4906-97f3-ea660486db4c -CVE-2023-25181 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726 -CVE-2023-25187 - http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html -CVE-2023-2519 - https://vuldb.com/?id.228010 -CVE-2023-25194 - http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html -CVE-2023-25199 - https://summitinfosec.com/blog/x-ray-vision-identifying-cve-2023-25199-and-cve-2023-25200-in-manufacturing-equipment/ -CVE-2023-25200 - https://summitinfosec.com/blog/x-ray-vision-identifying-cve-2023-25199-and-cve-2023-25200-in-manufacturing-equipment/ -CVE-2023-25206 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html -CVE-2023-25207 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/09/dpdfrance.html -CVE-2023-25210 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/1/1.md -CVE-2023-25211 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md -CVE-2023-25212 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/6/6.md -CVE-2023-25213 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/5/5.md -CVE-2023-25214 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/4/4.md -CVE-2023-25215 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/3/3.md -CVE-2023-25216 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md -CVE-2023-25217 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/10/10.md -CVE-2023-25218 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/8/8.md -CVE-2023-25219 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/11/11.md -CVE-2023-25220 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/7/7.md -CVE-2023-25221 - https://github.com/strukturag/libde265/issues/388 -CVE-2023-25222 - https://github.com/LibreDWG/libredwg/issues/615 -CVE-2023-2523 - https://github.com/RCEraser/cve/blob/main/Weaver.md -CVE-2023-25231 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104 -CVE-2023-25233 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113 -CVE-2023-25234 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_1 -CVE-2023-25235 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2 -CVE-2023-25240 - https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions -CVE-2023-25260 - https://cves.at/posts/cve-2023-25260/writeup/ -CVE-2023-25261 - https://cves.at/posts/cve-2023-25261/writeup/ -CVE-2023-25262 - https://cves.at/posts/cve-2023-25262/writeup/ -CVE-2023-25263 - https://cves.at/posts/cve-2023-25263/writeup/ -CVE-2023-25264 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html -CVE-2023-25265 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html -CVE-2023-25266 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html -CVE-2023-25267 - https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599 -CVE-2023-2527 - https://wpscan.com/vulnerability/8051142a-4e55-4dc2-9cb1-1b724c67574f -CVE-2023-25279 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20In%20tools_AccountName -CVE-2023-25280 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20in%20pingV4Msg -CVE-2023-25281 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing -CVE-2023-25282 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo -CVE-2023-25283 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20%20in%20reserveDHCP_HostName_1.1.1.0 -CVE-2023-25289 - https://www.exploit-db.com/exploits/51142 -CVE-2023-2529 - https://wpscan.com/vulnerability/4ac03907-2373-48f0-bca1-8f7073c06b18 -CVE-2023-25309 - https://cxsecurity.com/issue/WLB-2023050012 -CVE-2023-25309 - https://packetstormsecurity.com/files/172185/Rollout-UI-0.5-Cross-Site-Scripting.html -CVE-2023-2531 - https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02 -CVE-2023-25313 - https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw -CVE-2023-25330 - https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md -CVE-2023-25344 - https://github.com/node-swig/swig-templates/issues/89 -CVE-2023-25344 - https://www.gem-love.com/2023/02/01/Swig%E6%A8%A1%E6%9D%BF%E5%BC%95%E6%93%8E0day%E6%8C%96%E6%8E%98-%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E5%92%8C%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/ -CVE-2023-25345 - https://github.com/node-swig/swig-templates/issues/88 -CVE-2023-25346 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25346 -CVE-2023-25347 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25347 -CVE-2023-25348 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25348 -CVE-2023-25355 - https://seclists.org/fulldisclosure/2023/Mar/5 -CVE-2023-25356 - https://seclists.org/fulldisclosure/2023/Mar/5 -CVE-2023-25366 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25366.md -CVE-2023-25367 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md -CVE-2023-25368 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md -CVE-2023-25369 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25369.md -CVE-2023-25394 - https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/ -CVE-2023-25395 - https://github.com/Am1ngl/ttt/tree/main/22 -CVE-2023-25403 - https://github.com/CleverStupidDog/yf-exam/issues/2 -CVE-2023-25428 - https://packetstormsecurity.com/files/172259/Soft-o-Free-Password-Manager-1.1.20-DLL-Hijacking.html -CVE-2023-25431 - https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md -CVE-2023-25433 - https://gitlab.com/libtiff/libtiff/-/issues/520 -CVE-2023-25434 - https://gitlab.com/libtiff/libtiff/-/issues/519 -CVE-2023-25435 - https://gitlab.com/libtiff/libtiff/-/issues/518 -CVE-2023-25438 - https://packetstormsecurity.com/files/172052/MilleGPG5-5.9.2-Local-Privilege-Escalation.html -CVE-2023-25439 - https://packetstormsecurity.com/files/172556/FusionInvoice-2023-1.0-Cross-Site-Scripting.html -CVE-2023-25440 - https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html -CVE-2023-2550 - https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b -CVE-2023-2551 - https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c -CVE-2023-2552 - https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32 -CVE-2023-2553 - https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf -CVE-2023-2554 - https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b -CVE-2023-25572 - https://github.com/marmelab/react-admin/pull/8644 -CVE-2023-25572 - https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v -CVE-2023-25582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723 -CVE-2023-25583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723 -CVE-2023-25585 - https://sourceware.org/bugzilla/show_bug.cgi?id=29892 -CVE-2023-25586 - https://sourceware.org/bugzilla/show_bug.cgi?id=29855 -CVE-2023-25588 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677 -CVE-2023-25614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-25615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-25616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-25617 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-25618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-2564 - https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461 -CVE-2023-2566 - https://huntr.dev/bounties/47d6fc2a-989a-44eb-9cb7-ab4f8bd44496 -CVE-2023-2568 - https://wpscan.com/vulnerability/b1704a12-459b-4f5d-aa2d-a96646ddaf3e -CVE-2023-25690 - http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html -CVE-2023-2571 - https://wpscan.com/vulnerability/2dc02e5c-1c89-4053-a6a7-29ee7b996183 -CVE-2023-25717 - https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ -CVE-2023-25718 - https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/ -CVE-2023-25718 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity -CVE-2023-25719 - https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/ -CVE-2023-25719 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity -CVE-2023-2572 - https://wpscan.com/vulnerability/2f7fe6e6-c3d0-4e27-8222-572d7a420153 -CVE-2023-25728 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790345 -CVE-2023-25729 - https://bugzilla.mozilla.org/show_bug.cgi?id=1792138 -CVE-2023-2573 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html -CVE-2023-2573 - http://seclists.org/fulldisclosure/2023/May/4 -CVE-2023-2573 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ -CVE-2023-25732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1804564 -CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1809923 -CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810143 -CVE-2023-2574 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html -CVE-2023-2574 - http://seclists.org/fulldisclosure/2023/May/4 -CVE-2023-2574 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ -CVE-2023-25741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813376 -CVE-2023-25743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1800203 -CVE-2023-25748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1798798 -CVE-2023-25749 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810705 -CVE-2023-2575 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html -CVE-2023-2575 - http://seclists.org/fulldisclosure/2023/May/4 -CVE-2023-2575 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ -CVE-2023-25750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1814733 -CVE-2023-25774 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743 -CVE-2023-2578 - https://wpscan.com/vulnerability/4dad1c0d-bcf9-4486-bd8e-387ac8e6c892 -CVE-2023-2579 - https://github.com/daniloalbuqrque/poc-cve-xss-inventory-press-plugin -CVE-2023-2579 - https://wpscan.com/vulnerability/3cfcb8cc-9c4f-409c-934f-9f3f043de6fe -CVE-2023-2580 - https://wpscan.com/vulnerability/7ee1efb1-9969-40b2-8ab2-ea427091bbd8 -CVE-2023-25810 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296 -CVE-2023-25811 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp -CVE-2023-25814 - https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j -CVE-2023-2582 - https://www.tenable.com/security/research/tra-2023-18 -CVE-2023-25826 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html -CVE-2023-2583 - https://huntr.dev/bounties/397ea68d-1e28-44ff-b830-c8883d067d96 -CVE-2023-25848 - https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/ -CVE-2023-2590 - https://huntr.dev/bounties/a4238a30-3ddb-4415-9055-e179c3d4dea7 -CVE-2023-2591 - https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b -CVE-2023-2592 - https://wpscan.com/vulnerability/d4298960-eaba-4185-a730-3e621d9680e1 -CVE-2023-2598 - https://www.openwall.com/lists/oss-security/2023/05/08/3 -CVE-2023-2600 - https://wpscan.com/vulnerability/8e1d65c3-14e4-482f-ae9e-323e847a8613 -CVE-2023-2601 - http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html -CVE-2023-2601 - https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd -CVE-2023-26033 - https://github.com/gentoo/soko/security/advisories/GHSA-gp8g-jfq9-5q2g -CVE-2023-26034 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrx -CVE-2023-26035 - http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html -CVE-2023-26043 - https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8 -CVE-2023-2605 - http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html -CVE-2023-2605 - https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb -CVE-2023-2606 - https://wpscan.com/vulnerability/62deb3ed-a7e4-4cdc-a615-cad2ec2e1e8f -CVE-2023-26067 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html -CVE-2023-26068 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html -CVE-2023-26071 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2023-26072 - http://packetstormsecurity.com/files/171378/Shannon-Baseband-NrmmMsgCodec-Emergency-Number-List-Heap-Buffer-Overflow.html -CVE-2023-26073 - http://packetstormsecurity.com/files/171380/Shannon-Baseband-NrmmMsgCodec-Extended-Emergency-Number-List-Heap-Buffer-Overflow.html -CVE-2023-26074 - http://packetstormsecurity.com/files/171383/Shannon-Baseband-NrmmMsgCodec-Access-Category-Definitions-Heap-Buffer-Overflow.html -CVE-2023-26075 - http://packetstormsecurity.com/files/171387/Shannon-Baseband-NrmmMsgCodec-Intra-Object-Overflow.html -CVE-2023-26076 - http://packetstormsecurity.com/files/171400/Shannon-Baseband-NrSmPcoCodec-Intra-Object-Overflow.html -CVE-2023-26081 - https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x -CVE-2023-2609 - https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622 -CVE-2023-2610 - https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d -CVE-2023-26102 - https://github.com/timdown/rangy/issues/478 -CVE-2023-26102 - https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 -CVE-2023-26103 - https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970 -CVE-2023-26104 - https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde -CVE-2023-26104 - https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703 -CVE-2023-26105 - https://github.com/mde/utilities/issues/29 -CVE-2023-26105 - https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491 -CVE-2023-26106 - https://security.snyk.io/vuln/SNYK-JS-DOTLENS-3227646 -CVE-2023-26107 - https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969 -CVE-2023-26109 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTHSERIALPORT-3311820 -CVE-2023-26110 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821 -CVE-2023-26111 - https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc -CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928 -CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927 -CVE-2023-26112 - https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 -CVE-2023-26113 - https://github.com/kobezzza/Collection/issues/27 -CVE-2023-26113 - https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148 -CVE-2023-26114 - https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148 -CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657 -CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973 -CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320 -CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322 -CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321 -CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 -CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323 -CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325 -CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324 -CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 -CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326 -CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328 -CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327 -CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 -CVE-2023-26119 - https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEHTMLUNIT-3252500 -CVE-2023-2612 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -CVE-2023-2612 - https://ubuntu.com/security/CVE-2023-2612 -CVE-2023-2612 - https://ubuntu.com/security/notices/USN-6127-1 -CVE-2023-26120 - https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764 -CVE-2023-26121 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373062 -CVE-2023-26122 - https://github.com/hacksparrow/safe-eval/issues/27 -CVE-2023-26122 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064 -CVE-2023-26123 - https://security.snyk.io/vuln/SNYK-UNMANAGED-RAYSAN5RAYLIB-5421188 -CVE-2023-26125 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285 -CVE-2023-26126 - https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998 -CVE-2023-26126 - https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915 -CVE-2023-26127 - https://security.snyk.io/vuln/SNYK-JS-N158-3183746 -CVE-2023-26128 - https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165 -CVE-2023-26129 - https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876 -CVE-2023-26130 - https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280 -CVE-2023-26130 - https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194 -CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111 -CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112 -CVE-2023-26132 - https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763 -CVE-2023-26133 - https://security.snyk.io/vuln/SNYK-JS-PROGRESSBARJS-3184152 -CVE-2023-26134 - https://github.com/JPeer264/node-git-commit-info/issues/24 -CVE-2023-26134 - https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174 -CVE-2023-26135 - https://github.com/brycebaril/node-flatnest/issues/4 -CVE-2023-26135 - https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149 -CVE-2023-26136 - https://github.com/salesforce/tough-cookie/issues/282 -CVE-2023-26136 - https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873 -CVE-2023-26137 - https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a -CVE-2023-26137 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 -CVE-2023-26138 - https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b -CVE-2023-26138 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555 -CVE-2023-26139 - https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252 -CVE-2023-26139 - https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714 -CVE-2023-2614 - https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6 -CVE-2023-26140 - https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658 -CVE-2023-26141 - https://gist.github.com/keeganparr1/1dffd3c017339b7ed5371ed3d81e6b2a -CVE-2023-26141 - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107 -CVE-2023-26142 - https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c -CVE-2023-26142 - https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 -CVE-2023-26143 - https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318 -CVE-2023-26144 - https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181 -CVE-2023-26145 - https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca -CVE-2023-26145 - https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 -CVE-2023-26146 - https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20 -CVE-2023-26146 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766 -CVE-2023-26147 - https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b -CVE-2023-26147 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 -CVE-2023-26148 - https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e -CVE-2023-26148 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769 -CVE-2023-26149 - https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549 -CVE-2023-2615 - https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a -CVE-2023-26150 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673435 -CVE-2023-26151 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 -CVE-2023-26152 - https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d -CVE-2023-26152 - https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341 -CVE-2023-26153 - https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d -CVE-2023-26153 - https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 -CVE-2023-26155 - https://github.com/nrhirani/node-qpdf/issues/23 -CVE-2023-26155 - https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 -CVE-2023-26156 - https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18 -CVE-2023-26156 - https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539 -CVE-2023-26157 - https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730 -CVE-2023-26158 - https://security.snyk.io/vuln/SNYK-JS-MOCKJS-6051365 -CVE-2023-26159 - https://github.com/follow-redirects/follow-redirects/issues/235 -CVE-2023-26159 - https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137 -CVE-2023-2616 - https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801 -CVE-2023-2617 - https://github.com/opencv/opencv_contrib/pull/3480 -CVE-2023-2620 - https://gitlab.com/gitlab-org/gitlab/-/issues/410433 -CVE-2023-26213 - http://seclists.org/fulldisclosure/2023/Mar/2 -CVE-2023-26213 - https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ -CVE-2023-2623 - https://wpscan.com/vulnerability/85cc39b1-416f-4d23-84c1-fdcbffb0dda0 -CVE-2023-2624 - http://packetstormsecurity.com/files/174895/WordPress-KiviCare-3.2.0-Cross-Site-Scripting.html -CVE-2023-2624 - https://wpscan.com/vulnerability/dc3a841d-a95b-462e-be4b-acaa44e77264 -CVE-2023-26255 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md -CVE-2023-26256 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26256.md -CVE-2023-2627 - https://wpscan.com/vulnerability/162d0029-2adc-4925-9985-1d5d672dbe75 -CVE-2023-2628 - https://wpscan.com/vulnerability/e0741e2c-c529-4815-8744-16e01cdb0aed -CVE-2023-2629 - https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01 -CVE-2023-2630 - https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e -CVE-2023-26314 - https://www.openwall.com/lists/oss-security/2023/01/05/1 -CVE-2023-26325 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-26326 - https://www.tenable.com/security/research/tra-2023-7 -CVE-2023-2634 - https://wpscan.com/vulnerability/1df111aa-6057-47a2-8e8b-9ef5ec3bb472 -CVE-2023-2635 - https://wpscan.com/vulnerability/81b89613-18d0-4c13-84e3-9e2e1802fd7c -CVE-2023-2636 - http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html -CVE-2023-2636 - https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5 -CVE-2023-26360 - http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html -CVE-2023-26427 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26428 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26429 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26430 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26431 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26432 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26433 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26434 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26435 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26436 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -CVE-2023-26438 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26439 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26440 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26441 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26442 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26443 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26445 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26446 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26447 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26448 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26449 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26450 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26451 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -CVE-2023-26457 - https://launchpad.support.sap.com/#/notes/3281484 -CVE-2023-26457 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-26458 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-26459 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-26460 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-26461 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-26469 - http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html -CVE-2023-26469 - https://github.com/Orange-Cyberdefense/CVE-repository/tree/master -CVE-2023-2647 - https://github.com/sunyixuan1228/cve/blob/main/weaver%20exec.md -CVE-2023-26475 - https://jira.xwiki.org/browse/XWIKI-20360 -CVE-2023-2648 - https://github.com/sunyixuan1228/cve/blob/main/weaver.md -CVE-2023-26484 - https://github.com/kubevirt/kubevirt/issues/9109 -CVE-2023-26485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5 -CVE-2023-26486 - https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4 -CVE-2023-26487 - https://github.com/vega/vega/security/advisories/GHSA-w5m3-xh75-mp55 -CVE-2023-2649 - https://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md -CVE-2023-26490 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3j2f-wf52-cjg7 -CVE-2023-26492 - https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h -CVE-2023-26493 - https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/ -CVE-2023-26494 - https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/ -CVE-2023-26510 - https://ghost.org/docs/security/ -CVE-2023-26510 - https://gist.github.com/yurahod/2e11eabbe4b92ef1d44b08e37023ecfb -CVE-2023-26510 - https://gist.github.com/yurahod/828d5e6a077c12f3f74c6485d1c7f0e7 -CVE-2023-2652 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md#2classesmasterphpfdelete_item -CVE-2023-2653 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md -CVE-2023-2653 - https://vuldb.com/?id.228781 -CVE-2023-2654 - https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e -CVE-2023-2655 - https://wpscan.com/vulnerability/b3f2d38f-8eeb-45e9-bb58-2957e416e1cd/ -CVE-2023-26556 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b -CVE-2023-26557 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b -CVE-2023-2656 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/AC-Repair-and-Services-System---SQL-injections.md -CVE-2023-2657 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#1xss-vulnerability-in-productsphp -CVE-2023-2658 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#2sql-injection-vulnerability-in-productsphp -CVE-2023-2658 - https://vuldb.com/?id.228800 -CVE-2023-2659 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#3sql-injection-vulnerability-in-view_productphp -CVE-2023-2660 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#4sql-injection-vulnerability-in-view_categoriesphp -CVE-2023-2660 - https://vuldb.com/?id.228802 -CVE-2023-26602 - http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html -CVE-2023-26602 - http://seclists.org/fulldisclosure/2023/Feb/15 -CVE-2023-26602 - https://nwsec.de/NWSSA-002-2023.txt -CVE-2023-26604 - http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html -CVE-2023-26604 - https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/ -CVE-2023-26609 - http://packetstormsecurity.com/files/171136/ABUS-Security-Camera-TVIP-20000-21150-LFI-Remote-Code-Execution.html -CVE-2023-26609 - http://seclists.org/fulldisclosure/2023/Feb/16 -CVE-2023-26609 - https://nwsec.de/NWSSA-001-2023.txt -CVE-2023-2661 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#5sql-injection-vulnerability-in-classesmasterphp -CVE-2023-26612 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo -CVE-2023-26613 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell -CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1 -CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetMultipleActions -CVE-2023-26616 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo -CVE-2023-2662 - https://forum.xpdfreader.com/viewtopic.php?t=42505 -CVE-2023-2663 - https://forum.xpdfreader.com/viewtopic.php?t=42421 -CVE-2023-2664 - https://forum.xpdfreader.com/viewtopic.php?t=42422 -CVE-2023-2666 - https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f -CVE-2023-2667 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2667.md -CVE-2023-2668 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2668.md -CVE-2023-2669 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2669.md -CVE-2023-26692 - http://packetstormsecurity.com/files/171787/ZCBS-ZBBS-ZPBS-4.14k-Cross-Site-Scripting.html -CVE-2023-2670 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2670.md -CVE-2023-2670 - https://vuldb.com/?id.228886 -CVE-2023-2671 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md -CVE-2023-2672 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md -CVE-2023-26733 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md -CVE-2023-26733 - https://github.com/jkriege2/TinyTIFF/issues/19 -CVE-2023-26735 - https://github.com/prometheus/blackbox_exporter/issues/1024 -CVE-2023-2674 - https://huntr.dev/bounties/af73e913-730c-4245-88ce-26fc908d3644 -CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755 -CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955 -CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813 -CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351 -CVE-2023-26756 - https://googleinformationsworld.blogspot.com/2023/04/revive-adserver-541-vulnerable-to-brute.html -CVE-2023-26756 - https://www.esecforte.com/login-page-brute-force-attack/ -CVE-2023-26756 - https://www.revive-adserver.com/security/response-to-cve-2023-26756/ -CVE-2023-26758 - https://www.swascan.com/it/security-advisory-sme-up-erp/ -CVE-2023-26759 - https://www.swascan.com/it/security-advisory-sme-up-erp/ -CVE-2023-2676 - https://github.com/xinzhihen06/dxq-cve/blob/main/h3cr160.md -CVE-2023-26760 - https://www.swascan.com/it/security-advisory-sme-up-erp/ -CVE-2023-26762 - https://www.swascan.com/it/security-advisory-sme-up-erp/ -CVE-2023-26767 - https://github.com/liblouis/liblouis/issues/1292 -CVE-2023-26768 - https://github.com/liblouis/liblouis/issues/1301 -CVE-2023-26773 - https://packetstormsecurity.com/files/171686/Sales-Tracker-Management-System-1.0-Cross-Site-Scripting.html -CVE-2023-26774 - https://packetstormsecurity.com/files/171692/Sales-Tracker-Management-System-1.0-Insecure-Direct-Object-Reference.html -CVE-2023-26775 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html -CVE-2023-26776 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html -CVE-2023-26777 - http://packetstormsecurity.com/files/171699/Uptime-Kuma-1.19.6-Cross-Site-Scripting.html -CVE-2023-26793 - https://github.com/stephane/libmodbus/issues/683 -CVE-2023-26800 - https://github.com/winmt/my-vuls/tree/main/RG-EW1200 -CVE-2023-26801 - https://github.com/winmt/my-vuls/tree/main/LB-LINK%20BL-AC1900%2C%20BL-WR9000%2C%20BL-X26%20and%20BL-LTE300%20Wireless%20Routers -CVE-2023-26802 - https://github.com/winmt/my-vuls/tree/main/DCN%20DCBI-Netlog-LAB -CVE-2023-26805 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formIPMacBindModify.md -CVE-2023-26806 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/SetSysTime.md -CVE-2023-26817 - https://github.com/PGYER/codefever/issues/140 -CVE-2023-26820 - https://github.com/netptop/siteproxy/issues/67 -CVE-2023-26822 - https://github.com/yzskyt/Vuln/blob/main/Go-RT-AC750/Go-RT-AC750.md -CVE-2023-26839 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26839 -CVE-2023-2684 - https://wpscan.com/vulnerability/42b1f017-c497-4825-b12a-8dce3e108a55 -CVE-2023-26840 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26840 -CVE-2023-26841 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26841 -CVE-2023-26842 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842 -CVE-2023-26843 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26843 -CVE-2023-26848 - https://github.com/Am1ngl/ttt/tree/main/23 -CVE-2023-26858 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html -CVE-2023-26860 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/04/lgbudget.html -CVE-2023-26864 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/17/smplredirectionsmanager.html -CVE-2023-26865 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/20/bdroppy.html -CVE-2023-26876 - http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html -CVE-2023-26876 - https://gist.github.com/rodnt/a190d14d1715890d8df19bad58b90693 -CVE-2023-2690 - https://vuldb.com/?id.228971 -CVE-2023-2691 - https://vuldb.com/?id.228972 -CVE-2023-26912 - https://github.com/xenv/S-mall-ssm/issues/37 -CVE-2023-26913 - https://wanheiqiyihu.top/2023/02/13/Evolucare-Ecsimaging-new-movie-php%E5%8F%8D%E5%B0%84%E6%80%A7xss/ -CVE-2023-26918 - http://packetstormsecurity.com/files/171879/File-Replication-Pro-7.5.0-Insecure-Permissions-Privilege-Escalation.html -CVE-2023-26919 - https://github.com/javadelight/delight-nashorn-sandbox/issues/135 -CVE-2023-26921 - https://github.com/closethe/AG550QCN_CommandInjection_ql_atfwd/blob/main/README.md -CVE-2023-26922 - https://github.com/varigit/matrix-gui-v2/issues/1 -CVE-2023-26923 - https://github.com/musescore/MuseScore/issues/16346 -CVE-2023-26925 - https://github.com/laotun-s/POC/blob/main/CVE-2023-26925.txt -CVE-2023-2693 - https://vuldb.com/?id.228974 -CVE-2023-26934 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy -CVE-2023-26935 - https://github.com/huanglei3/xpdf_heapoverflow -CVE-2023-26936 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString -CVE-2023-26937 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring -CVE-2023-26938 - https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock -CVE-2023-26949 - https://github.com/keheying/onekeyadmin/issues/1 -CVE-2023-26950 - https://github.com/keheying/onekeyadmin/issues/9 -CVE-2023-26952 - https://github.com/keheying/onekeyadmin/issues/7 -CVE-2023-26953 - https://github.com/keheying/onekeyadmin/issues/8 -CVE-2023-26954 - https://github.com/keheying/onekeyadmin/issues/11 -CVE-2023-26956 - https://github.com/keheying/onekeyadmin/issues/4 -CVE-2023-26958 - https://medium.com/@shiva.infocop/stored-xss-park-ticketing-management-system-phpgurukul-893583dc2e20 -CVE-2023-26959 - https://medium.com/@shiva.infocop/authentication-bypass-park-ticketing-management-system-phpgurukul-427045159c05 -CVE-2023-2696 - https://vuldb.com/?id.228977 -CVE-2023-26961 - https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3 -CVE-2023-26966 - https://gitlab.com/libtiff/libtiff/-/issues/530 -CVE-2023-26974 - https://github.com/overXsky/IrfanviewPoc -CVE-2023-26976 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/AC6/205_1 -CVE-2023-26978 - https://github.com/Am1ngl/ttt/tree/main/28 -CVE-2023-26984 - https://github.com/Peppermint-Lab/peppermint/tree/master -CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw -CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw/edit -CVE-2023-2699 - https://vuldb.com/?id.228980 -CVE-2023-26991 - https://github.com/matthiaskramm/swftools/issues/196 -CVE-2023-26998 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/ -CVE-2023-26999 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/ -CVE-2023-27000 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/ -CVE-2023-27008 - https://plantplants213607121.wordpress.com/2023/02/16/atutor-2-2-1-cross-site-scripting-via-the-token-body-parameter/ -CVE-2023-2701 - https://wpscan.com/vulnerability/298fbe34-62c2-4e56-9bdb-90da570c5bbe -CVE-2023-27010 - https://packetstormsecurity.com/files/171301/Wondershare-Dr-Fone-12.9.6-Weak-Permissions-Privilege-Escalation.html -CVE-2023-27012 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/5/5.md -CVE-2023-27013 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/2/2.md -CVE-2023-27014 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/10/10.md -CVE-2023-27015 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/4/4.md -CVE-2023-27016 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/3/3.md -CVE-2023-27017 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/6/6.md -CVE-2023-27018 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/7/7.md -CVE-2023-27019 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/8/8.md -CVE-2023-27020 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/1/1.md -CVE-2023-27021 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/9/9.md -CVE-2023-27032 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/11/advancedpopupcreator.html -CVE-2023-27035 - https://forum.obsidian.md/t/embedded-web-pages-in-obsidian-canvas-can-use-sensitive-web-apis-without-the-users-permission-grant/54509 -CVE-2023-27035 - https://github.com/fivex3/CVE-2023-27035 -CVE-2023-27040 - https://www.exploit-db.com/exploits/50214 -CVE-2023-27042 - https://github.com/hujianjie123/vuln/blob/main/Tenda/SetFirewallCfg/readme.md -CVE-2023-2705 - https://wpscan.com/vulnerability/0b3c83ad-d490-4ca3-8589-39163ea5e24b -CVE-2023-27054 - https://github.com/miroslavpejic85/mirotalk/issues/139 -CVE-2023-27055 - https://github.com/StolidWaffle/AVer-PTZApp2 -CVE-2023-27059 - https://github.com/ChurchCRM/CRM/issues/6450 -CVE-2023-27061 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formWifiFilterRulesModify.md -CVE-2023-27062 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formPortalAuth.md -CVE-2023-27063 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formModifyDnsForward.md -CVE-2023-27064 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelDnsForward.md -CVE-2023-27065 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelWewifiPic.md -CVE-2023-27069 - https://www.edoardoottavianelli.it/CVE-2023-27069/ -CVE-2023-27069 - https://www.youtube.com/watch?v=Ryuz1gymiw8 -CVE-2023-2707 - https://wpscan.com/vulnerability/e5664da4-5b78-4e42-be6b-e0d7b73a85b0 -CVE-2023-27070 - https://www.edoardoottavianelli.it/CVE-2023-27070/ -CVE-2023-27070 - https://www.youtube.com/watch?v=4WJqcseH5qk -CVE-2023-27073 - https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt -CVE-2023-27077 - https://github.com/B2eFly/Router/blob/main/360/360D901.md -CVE-2023-27078 - https://github.com/B2eFly/Router/blob/main/TPLINK/MR3020/1.md -CVE-2023-27079 - https://github.com/B2eFly/Router/blob/main/Tenda/G103/2.md -CVE-2023-2709 - https://wpscan.com/vulnerability/2504dadb-1086-4fa9-8fc7-b93018423515 -CVE-2023-27098 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098 -CVE-2023-27100 - http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html -CVE-2023-27102 - https://github.com/strukturag/libde265/issues/393 -CVE-2023-27103 - https://github.com/strukturag/libde265/issues/394 -CVE-2023-27107 - https://gist.github.com/smidtbx10/f8ff1c4977b7f54886c6a52e9ef4e816 -CVE-2023-2711 - https://wpscan.com/vulnerability/71c5b5b5-8694-4738-8e4b-8670a8d21c86 -CVE-2023-27114 - https://github.com/radareorg/radare2/issues/21363 -CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1938 -CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1992 -CVE-2023-27116 - https://github.com/WebAssembly/wabt/issues/1984 -CVE-2023-27117 - https://github.com/WebAssembly/wabt/issues/1989 -CVE-2023-27119 - https://github.com/WebAssembly/wabt/issues/1990 -CVE-2023-27121 - https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/ -CVE-2023-27130 - https://github.com/typecho/typecho/issues/1535 -CVE-2023-27131 - https://github.com/typecho/typecho/issues/1536 -CVE-2023-27132 - https://packetstormsecurity.com/files/174271 -CVE-2023-27133 - https://packetstormsecurity.com/files/174272 -CVE-2023-27135 - https://github.com/Am1ngl/ttt/tree/main/29 -CVE-2023-27150 - https://www.esecforte.com/cve-2023-27150-cross-site-scripting-xss/ -CVE-2023-27151 - https://www.esecforte.com/cve-2023-27151-html-injection-activity-tracker/ -CVE-2023-27152 - https://www.esecforte.com/cve-2023-27152-opnsense-brute-force/ -CVE-2023-27159 - https://gist.github.com/b33t1e/43b26c31e895baf7e7aea2dbf9743a9a -CVE-2023-27159 - https://gist.github.com/b33t1e/e9e8192317c111e7897e04d2f9bf5fdb -CVE-2023-27160 - https://gist.github.com/b33t1e/6172286862a4486b5888f3cbbdc6316d -CVE-2023-27161 - https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952 -CVE-2023-27162 - https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08 -CVE-2023-27163 - http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html -CVE-2023-27163 - http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html -CVE-2023-27163 - https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3 -CVE-2023-27164 - https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867 -CVE-2023-27167 - https://packetstormsecurity.com/files/171523/Suprema-BioStar-2-2.8.16-SQL-Injection.html -CVE-2023-27179 - http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html -CVE-2023-2718 - https://wpscan.com/vulnerability/8ad824a6-2d49-4f02-8252-393c59aa9705 -CVE-2023-2718 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins -CVE-2023-2719 - https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35 -CVE-2023-27191 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security -CVE-2023-27191 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27191/CVE%20detail.md -CVE-2023-27192 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security -CVE-2023-27192 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.md -CVE-2023-27193 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27193/CVE%20detail.md -CVE-2023-27225 - https://packetstormsecurity.com -CVE-2023-27229 - https://github.com/Am1ngl/ttt/tree/main/30 -CVE-2023-27231 - https://github.com/Am1ngl/ttt/tree/main/31 -CVE-2023-27232 - https://github.com/Am1ngl/ttt/tree/main/32 -CVE-2023-27233 - https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245 -CVE-2023-27234 - https://github.com/Cherry-toto/jizhicms/issues/85 -CVE-2023-27235 - https://github.com/Cherry-toto/jizhicms/issues/85 -CVE-2023-2724 - http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html -CVE-2023-27249 - https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc -CVE-2023-27249 - https://github.com/keepinggg/poc/tree/main/poc_of_swfdump -CVE-2023-27249 - https://github.com/matthiaskramm/swftools/issues/197 -CVE-2023-27253 - http://packetstormsecurity.com/files/173487/pfSense-Restore-RRD-Data-Command-Injection.html -CVE-2023-27263 - https://mattermost.com/security-updates/ -CVE-2023-27264 - https://mattermost.com/security-updates/ -CVE-2023-27265 - https://mattermost.com/security-updates/ -CVE-2023-27266 - https://mattermost.com/security-updates/ -CVE-2023-27267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27269 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27270 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27290 - http://packetstormsecurity.com/files/171770/IBM-Instana-243-0-Missing-Authentication.html -CVE-2023-27292 - https://www.tenable.com/security/research/tra-2023-8 -CVE-2023-27293 - https://www.tenable.com/security/research/tra-2023-8 -CVE-2023-27294 - https://www.tenable.com/security/research/tra-2023-8 -CVE-2023-27295 - https://www.tenable.com/security/research/tra-2023-8 -CVE-2023-2730 - https://huntr.dev/bounties/6c6f5c26-d545-4e7b-82bb-1fe28006c885 -CVE-2023-2731 - https://gitlab.com/libtiff/libtiff/-/issues/548 -CVE-2023-27350 - http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html -CVE-2023-27350 - http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html -CVE-2023-27350 - http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html -CVE-2023-27350 - http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html -CVE-2023-27350 - https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/ -CVE-2023-27372 - http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html -CVE-2023-27372 - http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html -CVE-2023-27379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1756 -CVE-2023-2738 - https://github.com/RCEraser/cve/blob/main/tongda.md -CVE-2023-27380 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780 -CVE-2023-27390 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744 -CVE-2023-27390 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744 -CVE-2023-27395 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735 -CVE-2023-27396 - https://www.fa.omron.co.jp/product/vulnerability/OMSR-2023-003_ja.pdf -CVE-2023-27396 - https://www.ia.omron.com/product/vulnerability/OMSR-2023-003_en.pdf -CVE-2023-2742 - https://wpscan.com/vulnerability/f689442a-a851-4140-a10c-ac579f9da142 -CVE-2023-2743 - https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db -CVE-2023-2744 - http://packetstormsecurity.com/files/175106/WordPress-WP-ERP-1.12.2-SQL-Injection.html -CVE-2023-2744 - https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731 -CVE-2023-2745 - http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html -CVE-2023-27479 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv -CVE-2023-27482 - https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md -CVE-2023-27482 - https://www.elttam.com/blog/pwnassistant/ -CVE-2023-27487 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g -CVE-2023-27488 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph -CVE-2023-27491 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp -CVE-2023-27492 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 -CVE-2023-27493 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q -CVE-2023-27496 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5 -CVE-2023-27497 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27498 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27499 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27500 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27501 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-2751 - https://wpscan.com/vulnerability/1b0fe0ac-d0d1-473d-af5b-dad6217933d4 -CVE-2023-27516 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754 -CVE-2023-2752 - https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4 -CVE-2023-27524 - http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html -CVE-2023-27524 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html -CVE-2023-27524 - https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html -CVE-2023-27524 - https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html -CVE-2023-2753 - https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628 -CVE-2023-2756 - https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44 -CVE-2023-27561 - https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9 -CVE-2023-27561 - https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334 -CVE-2023-27561 - https://github.com/opencontainers/runc/issues/3751 -CVE-2023-27566 - https://github.com/openl2d/moc3ingbird -CVE-2023-27568 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html -CVE-2023-27569 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/ -CVE-2023-27570 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/ -CVE-2023-27571 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/ -CVE-2023-27572 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/ -CVE-2023-2758 - https://www.tenable.com/security/research/tra-2023-21 -CVE-2023-27581 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2023-27586 - https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv -CVE-2023-27598 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-27599 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-27600 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-27601 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-2761 - https://wpscan.com/vulnerability/8c82d317-f9f9-4e25-a7f1-43edb77e8aba -CVE-2023-27635 - https://bugs.debian.org/1031267 -CVE-2023-27637 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html -CVE-2023-27638 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html -CVE-2023-27639 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html -CVE-2023-27640 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html -CVE-2023-27641 - https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD -CVE-2023-27643 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27643/CVE%20detail.md -CVE-2023-27645 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27645/CVE%20detail.md -CVE-2023-27647 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md -CVE-2023-27648 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27648/CVE%20detail.md -CVE-2023-27649 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27649/CVE%20detail.md -CVE-2023-2765 - https://github.com/eckert-lcc/cve/blob/main/Weaver%20oa.md -CVE-2023-2765 - https://vuldb.com/?id.229270 -CVE-2023-27651 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27651/CVE%20detail.md -CVE-2023-27652 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27652/CVE%20detail.md -CVE-2023-27655 - https://forum.xpdfreader.com/viewtopic.php?t=42398 -CVE-2023-27655 - https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2 -CVE-2023-27655 - https://github.com/keepinggg/poc/tree/main/poc_of_xpdf -CVE-2023-2766 - https://github.com/8079048q/cve/blob/main/weaveroa.md -CVE-2023-2769 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Serviced-Providerd-Managementd-Systemd--d-SQLd-injections.md -CVE-2023-2770 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md -CVE-2023-27707 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-group/ -CVE-2023-27709 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-story/ -CVE-2023-2771 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md -CVE-2023-27711 - https://github.com/typecho/typecho/issues/1539 -CVE-2023-27711 - https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/ -CVE-2023-27718 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/1.md -CVE-2023-27719 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/2.md -CVE-2023-27720 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/4.md -CVE-2023-27727 - https://github.com/nginx/njs/issues/617 -CVE-2023-27728 - https://github.com/nginx/njs/issues/618 -CVE-2023-27729 - https://github.com/nginx/njs/issues/619 -CVE-2023-27730 - https://github.com/nginx/njs/issues/615 -CVE-2023-27739 - https://threeshield.ca/easyxdm-2.5.20.html -CVE-2023-27742 - https://github.com/G37SYS73M/CVE-2023-27742 -CVE-2023-27744 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf -CVE-2023-27745 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf -CVE-2023-27754 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc -CVE-2023-27775 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-27775/CVE-2023-27775.md -CVE-2023-27779 - https://docs.google.com/document/d/1kGzmc6AOCfRzJf9mDz4emkhQj84Y1XemmAMZjYK32-o/edit?usp=sharing -CVE-2023-27781 - https://github.com/tjko/jpegoptim/issues/132 -CVE-2023-27783 - https://github.com/appneta/tcpreplay/issues/780 -CVE-2023-27784 - https://github.com/appneta/tcpreplay/issues/787 -CVE-2023-2779 - http://packetstormsecurity.com/files/173053/WordPress-Super-Socializer-7.13.52-Cross-Site-Scripting.html -CVE-2023-2779 - https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5 -CVE-2023-27796 - https://github.com/winmt/my-vuls/tree/main/RG-EW%20PRO%20Series -CVE-2023-2780 - https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689 -CVE-2023-27801 - https://hackmd.io/@0dayResearch/DelDNSHnList -CVE-2023-27802 - https://hackmd.io/@0dayResearch/EditvsList -CVE-2023-27803 - https://hackmd.io/@0dayResearch/EdittriggerList -CVE-2023-27804 - https://hackmd.io/@0dayResearch/DelvsList -CVE-2023-27805 - https://hackmd.io/@0dayResearch/EditSTList -CVE-2023-27806 - https://hackmd.io/@0dayResearch/ipqos_lanip_dellist -CVE-2023-27807 - https://hackmd.io/@0dayResearch/Delstlist -CVE-2023-27808 - https://hackmd.io/@0dayResearch/DeltriggerList -CVE-2023-27810 - https://hackmd.io/@0dayResearch/ipqos_lanip_editlist -CVE-2023-27821 - https://github.com/luelueking/Databasir-1.0.7-vuln-poc -CVE-2023-27821 - https://github.com/vran-dev/databasir/issues/269 -CVE-2023-27823 - https://packetstormsecurity.com/files/172276/Optoma-1080PSTX-Firmware-C02-Authentication-Bypass.html -CVE-2023-27826 - https://www.exploit-db.com/exploits/51311 -CVE-2023-27830 - https://medium.com/nestedif/vulnerability-disclosure-privilege-escalation-tightvnc-8165208cce -CVE-2023-27842 - http://blog.tristaomarinho.com/extplorer-2-1-15-insecure-permissions-following-remote-code-execution/ -CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842 -CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842/blob/main/README.md -CVE-2023-27843 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/25/askforaquote.html -CVE-2023-27847 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/23/xipblog.html -CVE-2023-27848 - https://github.com/omnitaint/Vulnerability-Reports/blob/9d65add2bca71ed6d6b2e281ee6790a12504ff8e/reports/broccoli-compass/report.md -CVE-2023-27849 - https://github.com/omnitaint/Vulnerability-Reports/blob/2211ea4712f24d20b7f223fb737910fdfb041edb/reports/rails-routes-to-json/report.md -CVE-2023-2787 - https://mattermost.com/security-updates/ -CVE-2023-2788 - https://mattermost.com/security-updates/ -CVE-2023-27882 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733 -CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.md -CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.zip -CVE-2023-2789 - https://vuldb.com/?id.229373 -CVE-2023-27890 - http://packetstormsecurity.com/files/171421/MyBB-Export-User-2.0-Cross-Site-Scripting.html -CVE-2023-27892 - https://blog.inhq.net/posts/keepkey-CVE-2023-27892/ -CVE-2023-27893 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27894 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27895 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27896 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-27897 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-2791 - https://mattermost.com/security-updates/ -CVE-2023-2792 - https://mattermost.com/security-updates/ -CVE-2023-2793 - https://mattermost.com/security-updates/ -CVE-2023-27935 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1676 -CVE-2023-2795 - https://wpscan.com/vulnerability/2d6ecd21-3dd4-423d-80e7-277c45080a9f -CVE-2023-2796 - http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html -CVE-2023-2796 - https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d -CVE-2023-2797 - https://mattermost.com/security-updates/ -CVE-2023-27974 - https://flashpoint.io/blog/bitwarden-password-pilfering/ -CVE-2023-2802 - https://wpscan.com/vulnerability/c5cc136a-2fa6-44ff-b5b5-26d367937df9 -CVE-2023-2803 - https://wpscan.com/vulnerability/ec640d47-bb22-478d-9668-1dab72f12f8d -CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118 -CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675 -CVE-2023-2805 - https://wpscan.com/vulnerability/bdb75c8c-87e2-4358-ad3b-f4236e9a43c0 -CVE-2023-2808 - https://mattermost.com/security-updates/ -CVE-2023-28095 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-28096 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-28097 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-28098 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -CVE-2023-28100 - https://marc.info/?l=oss-security&m=167879021709955&w=2 -CVE-2023-28102 - https://securitylab.github.com/advisories/GHSL-2022-094_discordrb/ -CVE-2023-28106 - https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a -CVE-2023-2811 - https://wpscan.com/vulnerability/82a81721-0435-45a6-bd5b-dc90186cf803 -CVE-2023-28115 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc -CVE-2023-2812 - https://wpscan.com/vulnerability/7de4c313-359e-4450-85f5-d29f3c2f046a -CVE-2023-28121 - https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/ -CVE-2023-28128 - http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html -CVE-2023-2813 - https://wpscan.com/vulnerability/f434afd3-7de4-4bf4-a9bb-9f9aeaae1dc5 -CVE-2023-28130 - http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html -CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Aug/4 -CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-28131 - https://www.darkreading.com/endpoint/oauth-flaw-in-expo-platform-affects-hundreds-of-third-party-sites-apps -CVE-2023-2814 - https://vuldb.com/?id.229428 -CVE-2023-28140 - https://www.qualys.com/security-advisories/ -CVE-2023-28141 - https://www.qualys.com/security-advisories/ -CVE-2023-28142 - https://www.qualys.com/security-advisories/ -CVE-2023-28143 - https://qualys.com/security-advisories -CVE-2023-28153 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/ -CVE-2023-28159 - https://bugzilla.mozilla.org/show_bug.cgi?id=1783561 -CVE-2023-28163 - https://bugzilla.mozilla.org/show_bug.cgi?id=1817768 -CVE-2023-2817 - https://www.tenable.com/security/research/tra-2023-20, -CVE-2023-28180 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1679 -CVE-2023-28248 - http://packetstormsecurity.com/files/172283/Windows-Kernel-CmpCleanupLightWeightPrepare-Use-After-Free.html -CVE-2023-28252 - http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html -CVE-2023-2826 - https://vuldb.com/?id.229612 -CVE-2023-2827 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-28271 - http://packetstormsecurity.com/files/172298/Windows-Kernel-Uninitialized-Memory-Pointer-Disclosure.html -CVE-2023-28285 - http://packetstormsecurity.com/files/173127/Microsoft-Office-Remote-Code-Execution.html -CVE-2023-28285 - http://packetstormsecurity.com/files/173140/Microsoft-365-MSO-2305-Build-16.0.16501.20074-Remote-Code-Execution.html -CVE-2023-28288 - http://packetstormsecurity.com/files/173126/Microsoft-SharePoint-Enterprise-Server-2016-Spoofing.html -CVE-2023-28293 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html -CVE-2023-28293 - http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html -CVE-2023-2831 - https://mattermost.com/security-updates/ -CVE-2023-2832 - https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb -CVE-2023-28343 - http://packetstormsecurity.com/files/171775/Altenergy-Power-Control-Software-C1.2.5-Command-Injection.html -CVE-2023-28343 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/os_command_injection.md -CVE-2023-28344 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28344 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28345 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28345 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28346 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28346 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28347 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28347 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28348 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28348 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28349 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28349 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28350 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28350 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28351 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28351 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28352 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28352 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28353 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -CVE-2023-28353 - https://research.nccgroup.com/?research=Technical%20advisories -CVE-2023-28365 - https://community.ui.com/releases/Security-Advisory-Bulletin-031-031/8c85fc64-e9a8-4082-9ec4-56b14effd545 -CVE-2023-2837 - https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17 -CVE-2023-28379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738 -CVE-2023-2838 - https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f -CVE-2023-28381 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779 -CVE-2023-2839 - https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f -CVE-2023-28391 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732 -CVE-2023-28393 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1742 -CVE-2023-2840 - https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257 -CVE-2023-2842 - https://wpscan.com/vulnerability/0357ecc7-56f5-4843-a928-bf2d3ce75596 -CVE-2023-28428 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-68x8-9phf-j7jf -CVE-2023-2843 - https://wpscan.com/vulnerability/8e713eaf-f332-47e2-a131-c14222201fdc -CVE-2023-28430 - https://securitylab.github.com/advisories/GHSL-2023-051_React_Native_OneSignal_SDK/ -CVE-2023-28436 - https://tailscale.com/security-bulletins/#ts-2023-003 -CVE-2023-2844 - https://huntr.dev/bounties/6644b36e-603d-4dbe-8ee2-5df8b8fb2e22 -CVE-2023-28443 - https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc -CVE-2023-28443 - https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7 -CVE-2023-28446 - https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf -CVE-2023-2845 - https://huntr.dev/bounties/ac10e81c-998e-4425-9d74-b985d9b0254c -CVE-2023-28450 - https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG -CVE-2023-28466 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 -CVE-2023-28485 - http://packetstormsecurity.com/files/172649/Wekan-6.74-Cross-Site-Scripting.html -CVE-2023-28485 - https://wekan.github.io/hall-of-fame/filebleed/ -CVE-2023-28488 - https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488 -CVE-2023-28489 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html -CVE-2023-28489 - http://seclists.org/fulldisclosure/2023/Jul/14 -CVE-2023-2850 - https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359 -CVE-2023-28501 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28502 - http://packetstormsecurity.com/files/171853/Rocket-Software-Unidata-8.2.4-Build-3003-Buffer-Overflow.html -CVE-2023-28502 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28503 - http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html -CVE-2023-28503 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28504 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28505 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28506 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28507 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28508 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28509 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -CVE-2023-28528 - http://packetstormsecurity.com/files/172458/IBM-AIX-7.2-inscout-Privilege-Escalation.html -CVE-2023-2859 - https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba -CVE-2023-28613 - http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html -CVE-2023-28616 - https://advisories.stormshield.eu/2023-006 -CVE-2023-28627 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-6589-x6f5-cgg9 -CVE-2023-28628 - https://github.com/lambdaisland/uri/security/advisories/GHSA-cp4w-6x4w-v2h5 -CVE-2023-2863 - https://www.youtube.com/watch?v=V0u9C5RVSic -CVE-2023-28637 - https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 -CVE-2023-28659 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-28660 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-28661 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-28662 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-28663 - https://www.tenable.com/security/research/tra-2023-2 -CVE-2023-28664 - https://www.tenable.com/security/research/tra-2023-3 -CVE-2023-28665 - https://www.tenable.com/security/research/tra-2023-3 -CVE-2023-28666 - https://www.tenable.com/security/research/tra-2023-3 -CVE-2023-28667 - https://www.tenable.com/security/research/tra-2023-7 -CVE-2023-2870 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2870 -CVE-2023-2871 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2871 -CVE-2023-2872 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2872 -CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023 -CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS -CVE-2023-2873 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2873 -CVE-2023-2874 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2874 -CVE-2023-28744 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739 -CVE-2023-2875 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2875 -CVE-2023-28761 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-28762 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-28763 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-28764 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-28765 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-2877 - https://wpscan.com/vulnerability/33765da5-c56e-42c1-83dd-fcaad976b402 -CVE-2023-28770 - http://packetstormsecurity.com/files/172277/Zyxel-Chained-Remote-Code-Execution.html -CVE-2023-28771 - http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html -CVE-2023-28772 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 -CVE-2023-28809 - http://packetstormsecurity.com/files/174506/Hikvision-Access-Control-Session-Hijacking.html -CVE-2023-2881 - https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416 -CVE-2023-28848 - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f -CVE-2023-28850 - https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/ -CVE-2023-28853 - http://www.openwall.com/lists/oss-security/2023/07/06/6 -CVE-2023-28853 - https://github.com/mastodon/mastodon/security/advisories/GHSA-38g9-pfm9-gfqv -CVE-2023-28868 - https://herolab.usd.de/en/security-advisories/usd-2022-0002/ -CVE-2023-28869 - https://herolab.usd.de/en/security-advisories/usd-2022-0003/ -CVE-2023-28870 - https://herolab.usd.de/en/security-advisories/usd-2022-0004/ -CVE-2023-28871 - https://herolab.usd.de/en/security-advisories/usd-2022-0005/ -CVE-2023-28872 - https://herolab.usd.de/en/security-advisories/usd-2022-0006/ -CVE-2023-28873 - https://herolab.usd.de/en/security-advisories/usd-2022-0032/ -CVE-2023-28874 - https://herolab.usd.de/en/security-advisories/usd-2022-0033/ -CVE-2023-28875 - https://herolab.usd.de/security-advisories/usd-2022-0009/ -CVE-2023-28876 - https://herolab.usd.de/security-advisories/usd-2022-0010/ -CVE-2023-28879 - http://www.openwall.com/lists/oss-security/2023/04/12/4 -CVE-2023-28879 - https://bugs.ghostscript.com/show_bug.cgi?id=706494 -CVE-2023-28968 - https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf -CVE-2023-2899 - https://wpscan.com/vulnerability/92dcbeb3-17db-4d10-8ae7-c99acdb48c78 -CVE-2023-2900 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md -CVE-2023-29004 - https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv -CVE-2023-2901 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20User-GetGridJson%20has%20unauthorized%20access%20vulnerability.md -CVE-2023-2901 - https://vuldb.com/?id.229975 -CVE-2023-29010 - https://github.com/Budibase/budibase/security/advisories/GHSA-9xg2-9mcv-985p -CVE-2023-29017 - https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d -CVE-2023-29017 - https://github.com/patriksimek/vm2/issues/515 -CVE-2023-29017 - https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv -CVE-2023-2902 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The%20NFine%20rapid%20development%20platform%20Organize-GetTreeGridJson%20has%20unauthorized%20access%20vulnerability.md -CVE-2023-2902 - https://vuldb.com/?id.229976 -CVE-2023-29020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern -CVE-2023-29020 - https://owasp.org/www-community/attacks/csrf -CVE-2023-2903 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20Role-GetGridJson%20has%20unauthorized%20access%20vulnerability.md -CVE-2023-2903 - https://vuldb.com/?id.229977 -CVE-2023-2904 - https://www.hidglobal.com/security-center -CVE-2023-29048 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html -CVE-2023-29049 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html -CVE-2023-2905 - https://takeonme.org/cves/CVE-2023-2905.html -CVE-2023-29050 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html -CVE-2023-29051 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html -CVE-2023-29052 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html -CVE-2023-2906 - https://gitlab.com/wireshark/wireshark/-/issues/19229 -CVE-2023-2906 - https://takeonme.org/cves/CVE-2023-2906.html -CVE-2023-2908 - https://gitlab.com/libtiff/libtiff/-/merge_requests/479 -CVE-2023-29084 - http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html -CVE-2023-29085 - http://packetstormsecurity.com/files/172288/Shannon-Baseband-SIP-Status-Line-Stack-Buffer-Overflow.html -CVE-2023-29086 - http://packetstormsecurity.com/files/172293/Shannon-Baseband-SIP-Min-SE-Header-Stack-Buffer-Overflow.html -CVE-2023-29087 - http://packetstormsecurity.com/files/172295/Shannon-Baseband-SIP-Retry-After-Header-Heap-Buffer-Overflow.html -CVE-2023-29088 - http://packetstormsecurity.com/files/172289/Shannon-Baseband-SIP-Session-Expires-Header-Stack-Buffer-Overflow.html -CVE-2023-29089 - http://packetstormsecurity.com/files/172292/Shannon-Baseband-Negative-Size-Memcpy-Out-Of-Bounds-Read.html -CVE-2023-29090 - http://packetstormsecurity.com/files/172287/Shannon-Baseband-Via-Header-Decoder-Stack-Buffer-Overflow.html -CVE-2023-29091 - http://packetstormsecurity.com/files/172282/Shannon-Baseband-SIP-URI-Decoder-Stack-Buffer-Overflow.html -CVE-2023-29108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29110 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29159 - https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px -CVE-2023-29185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-29199 - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c -CVE-2023-29199 - https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985 -CVE-2023-29205 - https://jira.xwiki.org/browse/XWIKI-18568 -CVE-2023-29209 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q -CVE-2023-29210 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x -CVE-2023-29211 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w7v9-fc49-4qg4 -CVE-2023-29212 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475 -CVE-2023-29214 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qx9h-c5v6-ghqh -CVE-2023-2923 - https://github.com/GleamingEyes/vul/blob/main/1.md -CVE-2023-2924 - https://github.com/RCEraser/cve/blob/main/SimField.md -CVE-2023-2925 - https://vuldb.com/?id.230079 -CVE-2023-2927 - https://github.com/HuBenLab/HuBenVulList/blob/main/JiZhiCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md -CVE-2023-2928 - https://vuldb.com/?id.230083 -CVE-2023-2934 - http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html -CVE-2023-2935 - http://packetstormsecurity.com/files/173196/Chrome-v8-internal-Object-SetPropertyWithAccessor-Type-Confusion.html -CVE-2023-2936 - http://packetstormsecurity.com/files/173197/Chrome-V8-Type-Confusion.html -CVE-2023-29374 - https://github.com/hwchase17/langchain/issues/1026 -CVE-2023-29383 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/ -CVE-2023-29383 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797 -CVE-2023-29401 - https://github.com/gin-gonic/gin/issues/3555 -CVE-2023-2942 - https://huntr.dev/bounties/dd56e7a0-9dff-48fc-bc59-9a22d91869eb -CVE-2023-2943 - https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9 -CVE-2023-29439 - https://lourcode.kr/posts/CVE-2023-29439-Analysis?_s_id=cve -CVE-2023-2944 - https://huntr.dev/bounties/0d67dcb1-acc0-4d5d-bb69-a09d1bc9fa1d -CVE-2023-2945 - https://huntr.dev/bounties/62de71bd-333d-4593-91a5-534ef7f0c435 -CVE-2023-29459 - http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html -CVE-2023-2946 - https://huntr.dev/bounties/e550f4b0-945c-4886-af7f-ee0dc30b2a08 -CVE-2023-29465 - https://github.com/sagemath/FlintQS/issues/3 -CVE-2023-2947 - https://huntr.dev/bounties/52534def-acab-4200-a79a-89ef4ce6a0b0 -CVE-2023-29478 - https://github.com/Exopteron/BiblioRCE -CVE-2023-2948 - https://huntr.dev/bounties/2393e4d9-9e9f-455f-bf50-f20f77b0a64d -CVE-2023-29483 - https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713 -CVE-2023-29489 - https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/ -CVE-2023-2949 - https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4 -CVE-2023-29491 - http://www.openwall.com/lists/oss-security/2023/04/19/11 -CVE-2023-2950 - https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86 -CVE-2023-29505 - https://excellium-services.com/cert-xlm-advisory/CVE-2023-29505 -CVE-2023-29506 - https://jira.xwiki.org/browse/XWIKI-20335 -CVE-2023-29510 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4v38-964c-xjmw -CVE-2023-29517 - https://jira.xwiki.org/browse/XWIKI-20324 -CVE-2023-29519 - https://jira.xwiki.org/browse/XWIKI-20364 -CVE-2023-29523 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx -CVE-2023-29528 - https://jira.xwiki.org/browse/XWIKI-20348 -CVE-2023-29532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 -CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816007 -CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816059 -CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821155 -CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821576 -CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821906 -CVE-2023-29537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823365 -CVE-2023-2954 - https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d -CVE-2023-29541 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810191 -CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810793 -CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1815062 -CVE-2023-29548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1822754 -CVE-2023-29562 - https://github.com/lzd521/IOT/tree/main/TP-Link%20WPA7510 -CVE-2023-29566 - https://github.com/omnitaint/Vulnerability-Reports/blob/ec3645003c7f8996459b5b24c722474adc2d599f/reports/dawnsparks-node-tesseract/report.md -CVE-2023-29569 - https://github.com/cesanta/mjs/issues/239 -CVE-2023-29569 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md -CVE-2023-29570 - https://github.com/cesanta/mjs/issues/240 -CVE-2023-29570 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md -CVE-2023-29571 - https://github.com/cesanta/mjs/issues/241 -CVE-2023-29571 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md -CVE-2023-29573 - https://github.com/axiomatic-systems/Bento4/issues/840 -CVE-2023-29573 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/readme.md -CVE-2023-29574 - https://github.com/axiomatic-systems/Bento4/issues/841 -CVE-2023-29574 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/readme.md -CVE-2023-29575 - https://github.com/axiomatic-systems/Bento4/issues/842 -CVE-2023-29575 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md -CVE-2023-29576 - https://github.com/axiomatic-systems/Bento4/issues/844 -CVE-2023-29576 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/readme.md -CVE-2023-29578 - https://github.com/TechSmith/mp4v2/issues/74 -CVE-2023-29578 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/mp4property.cpp/readme.md -CVE-2023-29579 - https://github.com/yasm/yasm/issues/214 -CVE-2023-29579 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md -CVE-2023-29580 - https://github.com/yasm/yasm/issues/215 -CVE-2023-29580 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/readmd.md -CVE-2023-29581 - https://github.com/yasm/yasm/issues/216 -CVE-2023-29581 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md -CVE-2023-29582 - https://github.com/yasm/yasm/issues/217 -CVE-2023-29582 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md -CVE-2023-29583 - https://github.com/yasm/yasm/issues/218 -CVE-2023-29583 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/readme.md -CVE-2023-29584 - https://github.com/enzo1982/mp4v2/issues/30 -CVE-2023-29584 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/MP4GetVideoProfileLevel/readme.md -CVE-2023-29586 - https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html -CVE-2023-29623 - https://portswigger.net/web-security/cross-site-scripting/reflected -CVE-2023-29631 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmsslider.html -CVE-2023-2964 - https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f -CVE-2023-29656 - https://ramihub.github.io/ -CVE-2023-29657 - http://blog.tristaomarinho.com/extplorer-2-1-15-arbitrary-file-upload/ -CVE-2023-29659 - https://github.com/strukturag/libheif/issues/794 -CVE-2023-29665 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/boSetPasswdSettings -CVE-2023-2967 - https://wpscan.com/vulnerability/9afec4aa-1210-4c40-b566-64e37acf2b64 -CVE-2023-2968 - https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917 -CVE-2023-29680 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62 -CVE-2023-29680 - https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta -CVE-2023-29681 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62 -CVE-2023-29681 - https://www.youtube.com/watch?v=Xy9_hmpvvA4&ab_channel=0ta -CVE-2023-29689 - http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html -CVE-2023-29693 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/SetTftpUpgrad.md -CVE-2023-29696 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md -CVE-2023-2971 - https://starlabs.sg/advisories/23/23-2971/ -CVE-2023-29712 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf -CVE-2023-29712 - https://labs.yarix.com/2023/05/vade-secure-gateway-multiple-xss-cve-2023-29712-cve-2023-29713-cve-2023-29714/ -CVE-2023-29713 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf -CVE-2023-29714 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf -CVE-2023-2972 - https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef -CVE-2023-29722 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md -CVE-2023-29724 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29724/CVE%20detail.md -CVE-2023-29725 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29725/CVE%20detail.md -CVE-2023-29726 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md -CVE-2023-29731 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29731/CVE%20detail.md -CVE-2023-29732 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29732/CVE%20detail.md -CVE-2023-29733 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md -CVE-2023-29734 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29734/CVE%20detail.md -CVE-2023-29735 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29735/CVE%20detail.md -CVE-2023-29736 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md -CVE-2023-29737 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29737/CVE%20detail.md -CVE-2023-29738 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29738/CVE%20detail.md -CVE-2023-29738 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid -CVE-2023-29739 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29739/CVE%20detail.md -CVE-2023-29739 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid -CVE-2023-29740 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29740/CVE%20detail.md -CVE-2023-29740 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid -CVE-2023-29741 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29741/CVE%20detail.md -CVE-2023-29742 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md -CVE-2023-29743 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29743/CVE%20detail.md -CVE-2023-29745 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29745/CVE%20detail.md -CVE-2023-29746 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29746/CVE%20detail.md -CVE-2023-29747 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29747/CVE%20detail.md -CVE-2023-29748 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md -CVE-2023-29749 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29749/CVE%20detailed.md -CVE-2023-29751 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29751/CVE%20detailed.md -CVE-2023-29752 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29752/CVE%20detailed.md -CVE-2023-29753 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29753/CVE%20detailed.md -CVE-2023-29756 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29756/CVE%20detailed.md -CVE-2023-29757 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29757/CVE%20detailed.md -CVE-2023-29758 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29758/CVE%20detailed.md -CVE-2023-29759 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29759/CVE%20detailed.md -CVE-2023-29766 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md -CVE-2023-29767 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29767/CVE%20detailed.md -CVE-2023-29770 - https://github.com/sapplica/sentrifugo/issues/384 -CVE-2023-2978 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be -CVE-2023-2979 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be -CVE-2023-2980 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be -CVE-2023-29808 - https://packetstormsecurity.com/files/172145/Companymaps-8.0-Cross-Site-Scripting.html -CVE-2023-29809 - https://packetstormsecurity.com/files/172146/Companymaps-8.0-SQL-Injection.html -CVE-2023-29809 - https://www.exploit-db.com/exploits/51422 -CVE-2023-2981 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be -CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713 -CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713#issuecomment-1629468565 -CVE-2023-29827 - https://github.com/mde/ejs/issues/720 -CVE-2023-2983 - https://huntr.dev/bounties/6b2f33d3-2fd0-4d2d-ad7b-2c1e2417eeb1 -CVE-2023-2984 - https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191 -CVE-2023-29842 - http://packetstormsecurity.com/files/175105/ChurchCRM-4.5.4-SQL-Injection.html -CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.md -CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.py -CVE-2023-29847 - https://github.com/MegaTKC/AeroCMS/issues/11 -CVE-2023-29848 - http://packetstormsecurity.com/files/171899/Bang-Resto-1.0-Cross-Site-Scripting.html -CVE-2023-29849 - http://packetstormsecurity.com/files/171900/Bang-Resto-1.0-SQL-Injection.html -CVE-2023-29850 - https://github.com/slims/slims9_bulian/issues/186 -CVE-2023-2986 - http://packetstormsecurity.com/files/172966/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html -CVE-2023-2986 - http://packetstormsecurity.com/files/173018/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html -CVE-2023-2986 - https://github.com/Ayantaker/CVE-2023-2986 -CVE-2023-2986 - https://github.com/TycheSoftwares/woocommerce-abandoned-cart/pull/885#issuecomment-1601813615 -CVE-2023-29863 - https://medium.com/@waadalbyalii5/sql-injection-in-wsdl-file-c66fa00042f5 -CVE-2023-2989 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ -CVE-2023-2990 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ -CVE-2023-29905 - https://hackmd.io/@0dayResearch/H1IFt1Jgn -CVE-2023-29906 - https://hackmd.io/@0dayResearch/rk1uu20Jh -CVE-2023-29907 - https://hackmd.io/@0dayResearch/rk-6aRRyn -CVE-2023-29908 - https://hackmd.io/@0dayResearch/Ski-S20J2 -CVE-2023-29909 - https://hackmd.io/@0dayResearch/r1FC0AAy2 -CVE-2023-2991 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ -CVE-2023-29910 - https://hackmd.io/@0dayResearch/S1aGs1Jl2 -CVE-2023-29911 - https://hackmd.io/@0dayResearch/SyTaRoCJn -CVE-2023-29912 - https://hackmd.io/@0dayResearch/S1TusiR1n -CVE-2023-29913 - https://hackmd.io/@0dayResearch/HyvnMn013 -CVE-2023-29914 - https://hackmd.io/@0dayResearch/H1Cn2sAk3 -CVE-2023-29915 - https://hackmd.io/@0dayResearch/HJBc2lyl2 -CVE-2023-29916 - https://hackmd.io/@0dayResearch/rkpbC1Jgh -CVE-2023-29917 - https://hackmd.io/@0dayResearch/rJJzEg1e3 -CVE-2023-29918 - https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing -CVE-2023-29919 - https://github.com/xiaosed/CVE-2023-29919/ -CVE-2023-29931 - https://github.com/hhxsv5/laravel-s/issues/437 -CVE-2023-2995 - https://wpscan.com/vulnerability/762ff2ca-5c1f-49ae-b83c-1c22bacbc82f -CVE-2023-29950 - https://github.com/matthiaskramm/swftools/issues/198 -CVE-2023-2996 - https://wpscan.com/vulnerability/52d221bd-ae42-435d-a90a-60a5ae530663 -CVE-2023-29963 - https://github.com/superjock1988/debug/blob/main/s-cms_rce.md -CVE-2023-29973 - https://www.esecforte.com/cve-2023-29973-no-rate-limit/ -CVE-2023-29974 - https://www.esecforte.com/cve-2023-29974-weak-password-policy/ -CVE-2023-29975 - https://www.esecforte.com/cve-2023-29975-unverified-password-changed/ -CVE-2023-2998 - https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78 -CVE-2023-29983 - https://packetstormsecurity.com/files/172075/CompanyMaps-8.0-Cross-Site-Scripting.html -CVE-2023-29983 - https://www.exploit-db.com/exploits/51417 -CVE-2023-29985 - https://liaorj.github.io/2023/03/17/admin-reports-date-from-has-sql-injection-vulnerability/#more -CVE-2023-29998 - https://labs.yarix.com/2023/07/gis3w-persistent-xss-in-g3wsuite-3-5-cve-2023-29998/ -CVE-2023-30013 - http://packetstormsecurity.com/files/174799/TOTOLINK-Wireless-Routers-Remote-Command-Execution.html -CVE-2023-30013 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2 -CVE-2023-30053 - https://github.com/Am1ngl/ttt/tree/main/160 -CVE-2023-30054 - https://github.com/Am1ngl/ttt/tree/main/161 -CVE-2023-30056 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html -CVE-2023-30057 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html -CVE-2023-30061 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-879 -CVE-2023-3007 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/student-management-system/password_reset.md -CVE-2023-30082 - https://blog.manavparekh.com/2023/06/cve-2023-30082.html -CVE-2023-30082 - https://github.com/manavparekh/CVEs/blob/main/CVE-2023-30082/Steps%20to%20reproduce.txt -CVE-2023-30083 - https://github.com/libming/libming/issues/266 -CVE-2023-30084 - https://github.com/libming/libming/issues/268 -CVE-2023-30085 - https://github.com/libming/libming/issues/267 -CVE-2023-30086 - https://gitlab.com/libtiff/libtiff/-/issues/538 -CVE-2023-30087 - https://github.com/cesanta/mjs/issues/244 -CVE-2023-30088 - https://github.com/cesanta/mjs/issues/243 -CVE-2023-3009 - https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f -CVE-2023-30093 - https://www.edoardoottavianelli.it/CVE-2023-30093/ -CVE-2023-30093 - https://www.youtube.com/watch?v=jZr2JhDd_S8 -CVE-2023-30094 - https://www.edoardoottavianelli.it/CVE-2023-30094/ -CVE-2023-30094 - https://www.youtube.com/watch?v=vOb9Fyg3iVo -CVE-2023-30095 - https://www.edoardoottavianelli.it/CVE-2023-30095/ -CVE-2023-30095 - https://www.youtube.com/watch?v=2k7e9E0Cw0Y -CVE-2023-30096 - https://www.edoardoottavianelli.it/CVE-2023-30096/ -CVE-2023-30096 - https://www.youtube.com/watch?v=ZA7R001kE2w -CVE-2023-30097 - https://www.edoardoottavianelli.it/CVE-2023-30097/ -CVE-2023-30097 - https://www.youtube.com/watch?v=VAlbkvOm_DU -CVE-2023-30106 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip -CVE-2023-30111 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip -CVE-2023-30112 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip -CVE-2023-3012 - https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 -CVE-2023-30123 - https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937 -CVE-2023-3013 - https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073 -CVE-2023-30135 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/8/8.md -CVE-2023-30145 - http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html -CVE-2023-30145 - https://github.com/paragbagul111/CVE-2023-30145 -CVE-2023-30146 - https://github.com/L1-0/CVE-2023-30146 -CVE-2023-30148 - https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html -CVE-2023-30149 - https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html -CVE-2023-30150 - https://friends-of-presta.github.io/security-advisories/module/2023/06/06/leocustomajax.html -CVE-2023-3017 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0 -CVE-2023-3018 - http://packetstormsecurity.com/files/172653/Lost-And-Found-Information-System-1.0-Broken-Access-Control-Privilege-Escalation.html -CVE-2023-3018 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d -CVE-2023-30184 - https://github.com/typecho/typecho/issues/1546 -CVE-2023-30185 - https://github.com/c7w1n/CVE-2023-30185/blob/main/CVE-2023-30185.md -CVE-2023-30189 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html -CVE-2023-30191 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/17/cdesigner-89.html -CVE-2023-30192 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/11/possearchproducts.html -CVE-2023-30194 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/09/posstaticfooter.html -CVE-2023-30198 - http://packetstormsecurity.com/files/173136/PrestaShop-Winbiz-Payment-Improper-Limitation.html -CVE-2023-3020 - https://huntr.dev/bounties/92cbe37c-33fa-43bf-8d5b-69aebf51d32c -CVE-2023-3021 - https://huntr.dev/bounties/9d289d3a-2931-4e94-b61c-449581736eff -CVE-2023-30222 - https://packetstormsecurity.com -CVE-2023-30223 - https://packetstormsecurity.com -CVE-2023-30237 - https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/ -CVE-2023-30253 - https://www.swascan.com/security-advisory-dolibarr-17-0-0/ -CVE-2023-30256 - http://packetstormsecurity.com/files/172542/Webkul-Qloapps-1.5.2-Cross-Site-Scripting.html -CVE-2023-30256 - https://github.com/ahrixia/CVE-2023-30256 -CVE-2023-30257 - https://github.com/stigward/PoCs-and-Exploits/tree/main/fiio_LPE_0day -CVE-2023-30257 - https://stigward.github.io/posts/fiio-m6-exploit/ -CVE-2023-30258 - http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Execution.html -CVE-2023-30258 - https://eldstal.se/advisories/230327-magnusbilling.html -CVE-2023-30259 - https://github.com/LibreCAD/LibreCAD/issues/1481 -CVE-2023-3026 - https://huntr.dev/bounties/9bbcc127-1e69-4c88-b318-d2afef48eff0 -CVE-2023-30264 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%202.md -CVE-2023-30267 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Reflected%20cross-site%20scripting(XSS).md -CVE-2023-30268 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Improper%20Input%20Validation%202.md -CVE-2023-30285 - https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md -CVE-2023-30328 - https://github.com/rand0mIdas/randomideas/blob/main/ShimoVPN.md -CVE-2023-30328 - https://raw.githubusercontent.com/rand0mIdas/randomideas/main/ShimoVPN.md?token=GHSAT0AAAAAACA3WX4SPH2YYOCWGV6LLVSGZBIEKEQ -CVE-2023-30330 - https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0 -CVE-2023-30330 - https://www.exploit-db.com/exploits/51404 -CVE-2023-30331 - https://github.com/luelueking/Beetl-3.15.0-vuln-poc -CVE-2023-30347 - https://github.com/huzefa2212/CVE-2023-30347/blob/main/poc.txt -CVE-2023-30349 - https://github.com/jflyfox/jfinal_cms/issues/54 -CVE-2023-30350 - http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html -CVE-2023-30362 - https://github.com/obgm/libcoap/issues/1063 -CVE-2023-30363 - https://github.com/Tencent/vConsole/issues/616 -CVE-2023-30367 - http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html -CVE-2023-30367 - https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper -CVE-2023-30368 - https://github.com/2205794866/Tenda/blob/main/AC5/1.md -CVE-2023-30369 - https://github.com/2205794866/Tenda/blob/main/AC15/3.md -CVE-2023-30370 - https://github.com/2205794866/Tenda/blob/main/AC15/7.md -CVE-2023-30371 - https://github.com/2205794866/Tenda/blob/main/AC15/4.md -CVE-2023-30372 - https://github.com/2205794866/Tenda/blob/main/AC15/10.md -CVE-2023-30373 - https://github.com/2205794866/Tenda/blob/main/AC15/8.md -CVE-2023-30375 - https://github.com/2205794866/Tenda/blob/main/AC15/1.md -CVE-2023-30376 - https://github.com/2205794866/Tenda/blob/main/AC15/9.md -CVE-2023-30378 - https://github.com/2205794866/Tenda/blob/main/AC15/5.md -CVE-2023-30380 - https://github.com/Howard512966/DedeCMS-v5.7.107-Directory-Traversal -CVE-2023-30399 - https://github.com/Yof3ng/IoT/blob/master/Garo/CVE-2023-30399.md -CVE-2023-30402 - https://github.com/yasm/yasm/issues/206 -CVE-2023-30405 - https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html -CVE-2023-3041 - https://wpscan.com/vulnerability/93cad990-b6be-4ee1-9cdf-0211a7fe6c96 -CVE-2023-30415 - http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html -CVE-2023-30415 - https://robsware.github.io/2023/09/01/firstcve -CVE-2023-3044 - https://github.com/baker221/poc-xpdf -CVE-2023-30440 - https://www.ibm.com/support/pages/node/6997133 -CVE-2023-30445 - https://www.ibm.com/support/pages/node/7010557 -CVE-2023-30446 - https://www.ibm.com/support/pages/node/7010557 -CVE-2023-30447 - https://www.ibm.com/support/pages/node/7010557 -CVE-2023-30448 - https://www.ibm.com/support/pages/node/7010557 -CVE-2023-30449 - https://www.ibm.com/support/pages/node/7010557 -CVE-2023-30451 - http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html -CVE-2023-30453 - https://y-security.de/news-en/reminder-for-jira-cross-site-scripting-cve-2023-30453/index.html -CVE-2023-30454 - https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html -CVE-2023-30455 - https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html -CVE-2023-30456 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -CVE-2023-30456 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8 -CVE-2023-30459 - https://github.com/Toxich4/CVE-2023-30459 -CVE-2023-30459 - https://smartptt.com -CVE-2023-30534 - https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p -CVE-2023-30544 - https://huntr.dev/bounties/1714df73-e639-4d64-ab25-ced82dad9f85/ -CVE-2023-30547 - https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244 -CVE-2023-30547 - https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m -CVE-2023-30550 - https://github.com/metersphere/metersphere/security/advisories/GHSA-j5cq-cpw2-gp2q -CVE-2023-3056 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%201.md -CVE-2023-3057 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%202.md -CVE-2023-30577 - https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3 -CVE-2023-30591 - https://starlabs.sg/advisories/23/23-30591/ -CVE-2023-30613 - https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c -CVE-2023-30620 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx -CVE-2023-30623 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2023-30625 - http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html -CVE-2023-30625 - https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/ -CVE-2023-30628 - https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx -CVE-2023-30628 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2023-3067 - https://huntr.dev/bounties/4772ceb7-1594-414d-9b20-5b82029da7b6 -CVE-2023-3069 - https://huntr.dev/bounties/00544982-365a-476b-b5fe-42f02f11d367 -CVE-2023-3070 - https://huntr.dev/bounties/e193068e-0b95-403a-8453-e015241b8f1b -CVE-2023-3071 - https://huntr.dev/bounties/3e8d5166-9bc6-46e7-94a8-cad52434a39e -CVE-2023-3073 - https://huntr.dev/bounties/a4d6a082-2ea8-49a5-8e48-6d39b5cc62e1 -CVE-2023-30740 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-30741 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-30742 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-30743 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-30744 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-3076 - https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b -CVE-2023-30769 - https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks -CVE-2023-30769 - https://www.halborn.com/disclosures -CVE-2023-3077 - https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432 -CVE-2023-30772 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 -CVE-2023-30772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=06615d11cc78162dfd5116efb71f29eb29502d37 -CVE-2023-30774 - https://gitlab.com/libtiff/libtiff/-/issues/463 -CVE-2023-30775 - https://gitlab.com/libtiff/libtiff/-/issues/464 -CVE-2023-30777 - https://patchstack.com/articles/reflected-xss-in-advanced-custom-fields-plugins-affecting-2-million-sites?_s_id=cve -CVE-2023-30787 - https://fluidattacks.com/advisories/napoli -CVE-2023-30788 - https://fluidattacks.com/advisories/napoli -CVE-2023-30789 - https://fluidattacks.com/advisories/napoli -CVE-2023-3079 - http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html -CVE-2023-3079 - http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html -CVE-2023-30790 - https://fluidattacks.com/advisories/napoli -CVE-2023-30799 - https://github.com/MarginResearch/FOISted -CVE-2023-30802 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 -CVE-2023-30803 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 -CVE-2023-30804 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 -CVE-2023-30805 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 -CVE-2023-30806 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 -CVE-2023-3083 - https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab -CVE-2023-3084 - https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a -CVE-2023-30858 - https://huntr.dev/bounties/444f2255-5085-466f-ba0e-5549fa8846a3/ -CVE-2023-30859 - https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r -CVE-2023-3086 - https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20 -CVE-2023-30860 - https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm -CVE-2023-30868 - http://packetstormsecurity.com/files/172730/WordPress-Tree-Page-View-1.6.7-Cross-Site-Scripting.html -CVE-2023-3090 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-3090 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-3094 - https://vuldb.com/?id.230670 -CVE-2023-30945 - https://palantir.safebase.us/?tcuUid=e62e4dad-b39b-48ba-ba30-7b7c83406ad9 -CVE-2023-30946 - https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3 -CVE-2023-30948 - https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62 -CVE-2023-30949 - https://palantir.safebase.us/?tcuUid=bbc1772c-e10a-45cc-b89f-48cc1a8b2cfc -CVE-2023-3095 - https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4 -CVE-2023-30950 - https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a -CVE-2023-30951 - https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced -CVE-2023-30952 - https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4 -CVE-2023-30955 - https://palantir.safebase.us/?tcuUid=0c3f6c33-4eb0-48b5-ab87-fe48c46a4170 -CVE-2023-30956 - https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a -CVE-2023-30958 - https://palantir.safebase.us/?tcuUid=5764b094-d3c0-4380-90f2-234f36116c9b -CVE-2023-30959 - https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63 -CVE-2023-3096 - https://github.com/i900008/vulndb/blob/main/kylinos_vul1.md -CVE-2023-30960 - https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b -CVE-2023-30961 - https://palantir.safebase.us/?tcuUid=2755c49f-2c30-459e-8bdf-f95ef3692da4 -CVE-2023-30962 - https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0 -CVE-2023-30963 - https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a -CVE-2023-30967 - https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79 -CVE-2023-30969 - https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7 -CVE-2023-3097 - https://github.com/i900008/vulndb/blob/main/kylinos_vul2.md -CVE-2023-3099 - https://github.com/i900008/vulndb/blob/main/kylinos_vul4.md -CVE-2023-31059 - https://cybir.com/2023/cve/poc-repetier-server-140/ -CVE-2023-31060 - https://cybir.com/2023/cve/poc-repetier-server-140/ -CVE-2023-31061 - https://cybir.com/2023/cve/poc-repetier-server-140/ -CVE-2023-31067 - http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html -CVE-2023-31067 - https://www.exploit-db.com/exploits/51679 -CVE-2023-31068 - http://packetstormsecurity.com/files/174272/TSPlus-16.0.0.0-Insecure-Permissions.html -CVE-2023-31068 - https://www.exploit-db.com/exploits/51680 -CVE-2023-31069 - http://packetstormsecurity.com/files/174271/TSPlus-16.0.0.0-Insecure-Credential-Storage.html -CVE-2023-31069 - https://www.exploit-db.com/exploits/51681 -CVE-2023-3109 - https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123 -CVE-2023-31096 - https://cschwarz1.github.io/posts/0x04/ -CVE-2023-31102 - https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/ -CVE-2023-31128 - https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h -CVE-2023-31128 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2023-31132 - https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876 -CVE-2023-31137 - https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c -CVE-2023-3115 - https://gitlab.com/gitlab-org/gitlab/-/issues/414367 -CVE-2023-3118 - https://wpscan.com/vulnerability/8a9efc8d-561a-42c6-8e61-ae5c3be581ea -CVE-2023-3119 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md -CVE-2023-31192 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768 -CVE-2023-31194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1745 -CVE-2023-31194 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1745 -CVE-2023-3120 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md -CVE-2023-31223 - https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/ -CVE-2023-31242 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769 -CVE-2023-31247 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746 -CVE-2023-31248 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -CVE-2023-31248 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-31272 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765 -CVE-2023-31275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1748 -CVE-2023-3128 - https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp -CVE-2023-31285 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html -CVE-2023-31285 - http://seclists.org/fulldisclosure/2023/May/14 -CVE-2023-31286 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html -CVE-2023-31286 - http://seclists.org/fulldisclosure/2023/May/14 -CVE-2023-31287 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html -CVE-2023-31287 - http://seclists.org/fulldisclosure/2023/May/14 -CVE-2023-3129 - https://wpscan.com/vulnerability/5717d729-c24b-4415-bb99-fcdd259328c4 -CVE-2023-31292 - https://herolab.usd.de/en/security-advisories/usd-2022-0051/ -CVE-2023-31293 - https://herolab.usd.de/en/security-advisories/usd-2022-0061/ -CVE-2023-31294 - https://herolab.usd.de/en/security-advisories/usd-2022-0052/ -CVE-2023-31295 - https://herolab.usd.de/en/security-advisories/usd-2022-0053/ -CVE-2023-31296 - https://herolab.usd.de/en/security-advisories/usd-2022-0054/ -CVE-2023-31297 - https://herolab.usd.de/en/security-advisories/usd-2022-0058/ -CVE-2023-31298 - https://herolab.usd.de/en/security-advisories/usd-2022-0060/ -CVE-2023-31299 - https://herolab.usd.de/en/security-advisories/usd-2022-0055/ -CVE-2023-3130 - https://wpscan.com/vulnerability/6e167864-c304-402e-8b2d-d47b5a3767d1 -CVE-2023-31300 - https://herolab.usd.de/en/security-advisories/usd-2022-0057/ -CVE-2023-31301 - https://herolab.usd.de/en/security-advisories/usd-2022-0059/ -CVE-2023-31302 - https://herolab.usd.de/en/security-advisories/usd-2022-0056/ -CVE-2023-3131 - https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c -CVE-2023-3133 - https://wpscan.com/vulnerability/3b6969a7-5cbc-4e16-8f27-5dde481237f5 -CVE-2023-3134 - https://wpscan.com/vulnerability/6d50d3cc-7563-42c4-977b-f834fee711da -CVE-2023-3134 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins -CVE-2023-3139 - https://wpscan.com/vulnerability/f8a29aee-19cd-4e62-b829-afc9107f69bd -CVE-2023-31404 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-31405 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-31406 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-31407 - https://launchpad.support.sap.com/#/notes/3312892 -CVE-2023-31407 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-31413 - https://www.elastic.co/community/security/ -CVE-2023-31414 - https://www.elastic.co/community/security/ -CVE-2023-31415 - https://www.elastic.co/community/security/ -CVE-2023-31416 - https://www.elastic.co/community/security -CVE-2023-31417 - https://www.elastic.co/community/security -CVE-2023-31418 - https://www.elastic.co/community/security -CVE-2023-31419 - https://www.elastic.co/community/security -CVE-2023-3142 - https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5 -CVE-2023-31421 - https://www.elastic.co/community/security -CVE-2023-31422 - https://www.elastic.co/community/security -CVE-2023-3143 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#11xss-vulnerability-in-adminpostsmanage_postphpcontent -CVE-2023-31433 - https://cves.at/posts/cve-2023-31433/writeup/ -CVE-2023-31434 - https://cves.at/posts/cve-2023-31434/writeup/ -CVE-2023-31435 - https://cves.at/posts/cve-2023-31435/writeup/ -CVE-2023-31436 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -CVE-2023-31436 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -CVE-2023-31436 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-31436 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 -CVE-2023-31439 - https://github.com/systemd/systemd/pull/28885 -CVE-2023-3144 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#10xss-vulnerability-in-adminpostsmanage_postphptitle -CVE-2023-31445 - https://blog.kscsc.online/cves/202331445/md.html -CVE-2023-31445 - https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure -CVE-2023-31445 - https://www.swiruhack.online/cves/202331445/md.html -CVE-2023-3145 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#9sql-injection-vulnerability-in-classesusersphppost -CVE-2023-3146 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#8sql-injection-vulnerability-in-admincategoriesmanage_categoryphp -CVE-2023-31465 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31465.md -CVE-2023-31466 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31466.md -CVE-2023-31468 - http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html -CVE-2023-31468 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03 -CVE-2023-31468 - https://www.exploit-db.com/exploits/51682 -CVE-2023-31468 - https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H -CVE-2023-3147 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-admincategoriesview_categoryphp -CVE-2023-31471 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Abuse_of_Functionality_leads_to_RCE.md -CVE-2023-31472 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Creation.md -CVE-2023-31473 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Read.md -CVE-2023-31474 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Directory_Listing.md -CVE-2023-31475 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Buffer_Overflow.md -CVE-2023-31475 - https://justinapplegate.me/2023/glinet-CVE-2023-31475/ -CVE-2023-31476 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/GL-MV1000_Arbitrary_File_Creation.md -CVE-2023-31477 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Path_Traversal.md -CVE-2023-31478 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/SSID_Key_Disclosure.md -CVE-2023-3148 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#6sql-injection-vulnerability-in-adminpostsmanage_postphp -CVE-2023-31483 - https://github.com/CauldronDevelopmentLLC/cbang/issues/115 -CVE-2023-31489 - https://github.com/FRRouting/frr/issues/13098 -CVE-2023-3149 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp -CVE-2023-31490 - https://github.com/FRRouting/frr/issues/13099 -CVE-2023-31492 - http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html -CVE-2023-31492 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md -CVE-2023-31497 - https://github.com/0xInfection/EPScalate -CVE-2023-31498 - https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832 -CVE-2023-3150 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md -CVE-2023-31502 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD -CVE-2023-31505 - https://m3n0sd0n4ld.github.io/patoHackventuras/cve-2023-31505 -CVE-2023-3151 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md -CVE-2023-3152 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#5sql-injection-vulnerability-in-adminpostsview_postphp -CVE-2023-31530 - https://github.com/leetsun/IoT/tree/main/Motorola-CX2L/CI4 -CVE-2023-3154 - https://wpscan.com/vulnerability/ed099489-1db4-4b42-9f72-77de39c9e01e -CVE-2023-31543 - https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe -CVE-2023-31543 - https://github.com/bndr/pipreqs/pull/364 -CVE-2023-31548 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548 -CVE-2023-3155 - https://wpscan.com/vulnerability/5c8473f4-4b52-430b-9140-b81b0a0901da -CVE-2023-31554 - https://forum.xpdfreader.com/viewtopic.php?t=42421 -CVE-2023-31555 - https://github.com/podofo/podofo/issues/67 -CVE-2023-31556 - https://github.com/podofo/podofo/issues/66 -CVE-2023-31557 - https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748 -CVE-2023-31566 - https://github.com/podofo/podofo/issues/70 -CVE-2023-31567 - https://github.com/podofo/podofo/issues/71 -CVE-2023-31568 - https://github.com/podofo/podofo/issues/72 -CVE-2023-31587 - https://github.com/yanbushuang/CVE/blob/main/TendaAC5.md -CVE-2023-31594 - https://github.com/Yozarseef95/CVE-2023-31594 -CVE-2023-31595 - https://github.com/Yozarseef95/CVE-2023-31595 -CVE-2023-31607 - https://github.com/openlink/virtuoso-opensource/issues/1120 -CVE-2023-31608 - https://github.com/openlink/virtuoso-opensource/issues/1123 -CVE-2023-31609 - https://github.com/openlink/virtuoso-opensource/issues/1126 -CVE-2023-31610 - https://github.com/openlink/virtuoso-opensource/issues/1118 -CVE-2023-31611 - https://github.com/openlink/virtuoso-opensource/issues/1119 -CVE-2023-31612 - https://github.com/openlink/virtuoso-opensource/issues/1125 -CVE-2023-31613 - https://github.com/openlink/virtuoso-opensource/issues/1121 -CVE-2023-31615 - https://github.com/openlink/virtuoso-opensource/issues/1124 -CVE-2023-31616 - https://github.com/openlink/virtuoso-opensource/issues/1122 -CVE-2023-31617 - https://github.com/openlink/virtuoso-opensource/issues/1127 -CVE-2023-31618 - https://github.com/openlink/virtuoso-opensource/issues/1136 -CVE-2023-31619 - https://github.com/openlink/virtuoso-opensource/issues/1133 -CVE-2023-31620 - https://github.com/openlink/virtuoso-opensource/issues/1128 -CVE-2023-31621 - https://github.com/openlink/virtuoso-opensource/issues/1130 -CVE-2023-31622 - https://github.com/openlink/virtuoso-opensource/issues/1135 -CVE-2023-31623 - https://github.com/openlink/virtuoso-opensource/issues/1131 -CVE-2023-31624 - https://github.com/openlink/virtuoso-opensource/issues/1134 -CVE-2023-31625 - https://github.com/openlink/virtuoso-opensource/issues/1132 -CVE-2023-31626 - https://github.com/openlink/virtuoso-opensource/issues/1129 -CVE-2023-31627 - https://github.com/openlink/virtuoso-opensource/issues/1140 -CVE-2023-31628 - https://github.com/openlink/virtuoso-opensource/issues/1141 -CVE-2023-31629 - https://github.com/openlink/virtuoso-opensource/issues/1139 -CVE-2023-3163 - https://gitee.com/y_project/RuoYi/issues/I78DOR -CVE-2023-31630 - https://github.com/openlink/virtuoso-opensource/issues/1138 -CVE-2023-31631 - https://github.com/openlink/virtuoso-opensource/issues/1137 -CVE-2023-31634 - https://github.com/XC9409/CVE-2023-31634/blob/main/PoC -CVE-2023-3164 - https://gitlab.com/libtiff/libtiff/-/issues/542 -CVE-2023-3165 - https://vuldb.com/?id.231109 -CVE-2023-31664 - https://github.com/adilkhan7/CVE-2023-31664 -CVE-2023-31677 - https://github.com/zzh-newlearner/record/blob/main/luowice.md -CVE-2023-31678 - https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md -CVE-2023-31679 - https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md -CVE-2023-31689 - https://github.com/vedees/wcms/issues/15 -CVE-2023-3169 - https://wpscan.com/vulnerability/e6d8216d-ace4-48ba-afca-74da0dc5abb5 -CVE-2023-31698 - http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html -CVE-2023-31698 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 -CVE-2023-31698 - https://github.com/bludit/bludit/issues/1509 -CVE-2023-31699 - https://github.com/ChurchCRM/CRM/issues/6471 -CVE-2023-3170 - https://wpscan.com/vulnerability/e95ff3c6-283b-4e5e-bea0-1f1375da08da -CVE-2023-31700 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md -CVE-2023-31701 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md -CVE-2023-31702 - http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html -CVE-2023-31703 - http://packetstormsecurity.com/files/172540/eScan-Management-Console-14.0.1400.2281-Cross-Site-Scripting.html -CVE-2023-31705 - https://github.com/d34dun1c02n/CVE-2023-31705 -CVE-2023-31708 - https://github.com/weng-xianhu/eyoucms/issues/41 -CVE-2023-31714 - https://www.exploit-db.com/exploits/51383 -CVE-2023-31718 - https://youtu.be/VCQkEGntN04 -CVE-2023-3172 - https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e -CVE-2023-31723 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md -CVE-2023-31723 - https://github.com/yasm/yasm/issues/220 -CVE-2023-31724 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive -CVE-2023-31724 - https://github.com/yasm/yasm/issues/222 -CVE-2023-31725 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params -CVE-2023-31725 - https://github.com/yasm/yasm/issues/221 -CVE-2023-31726 - https://github.com/J6451/CVE-2023-31726 -CVE-2023-31729 - https://github.com/D2y6p/CVE/blob/2bac2c96e24229fa99e0254eaac1b8809e424b4b/Totolink/CVE-2023-31729/CVE-2023-31729.md -CVE-2023-3173 - https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14 -CVE-2023-31740 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf -CVE-2023-31741 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf -CVE-2023-31747 - https://packetstormsecurity.com/files/172464/Filmora-12-Build-1.0.0.7-Unquoted-Service-Path.html -CVE-2023-31748 - https://packetstormsecurity.com/files/172466/MobileTrans-4.0.11-Weak-Service-Permissions.html -CVE-2023-3175 - https://wpscan.com/vulnerability/7643980b-eaa2-45d1-bd9d-9afae0943f43 -CVE-2023-31753 - https://github.com/khmk2k/CVE-2023-31753/ -CVE-2023-31754 - https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss -CVE-2023-31757 - https://github.com/sleepyvv/vul_report/blob/main/DedeCMS/XSS.md -CVE-2023-3176 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-adminusermanage_userphp -CVE-2023-3177 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-admininquiriesview_inquiryphp -CVE-2023-3177 - https://vuldb.com/?id.231151 -CVE-2023-3178 - https://wpscan.com/vulnerability/5341cb5d-d204-49e1-b013-f8959461995f/ -CVE-2023-3179 - https://wpscan.com/vulnerability/542caa40-b199-4397-90bb-4fdb693ebb24 -CVE-2023-3182 - https://wpscan.com/vulnerability/655a68ee-9447-41ca-899e-986a419fb7ed -CVE-2023-3184 - http://packetstormsecurity.com/files/172908/Sales-Tracker-Management-System-1.0-HTML-Injection.html -CVE-2023-3184 - https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md -CVE-2023-31851 - https://github.com/CalfCrusher/CVE-2023-31851 -CVE-2023-31852 - https://github.com/CalfCrusher/CVE-2023-31852 -CVE-2023-31853 - https://github.com/CalfCrusher/CVE-2023-31853 -CVE-2023-31856 - https://github.com/xiangbulala/CVE/blob/main/totlink.md -CVE-2023-3186 - https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c -CVE-2023-3187 - http://packetstormsecurity.com/files/172909/Teachers-Record-Management-System-1.0-Validation-Bypass.html -CVE-2023-3187 - https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md -CVE-2023-31871 - https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7 -CVE-2023-31873 - http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html -CVE-2023-31874 - http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html -CVE-2023-3188 - https://huntr.dev/bounties/0d0d526a-1c39-4e6a-b081-d3914468e495 -CVE-2023-31893 - https://medium.com/@shooterRX/dns-recursion-leads-to-dos-attack-vivo-play-iptv-cve-2023-31893-b5ac45f38f -CVE-2023-3190 - https://huntr.dev/bounties/5562c4c4-0475-448f-a451-7c4666bc7180 -CVE-2023-31902 - https://www.exploit-db.com/exploits/51010 -CVE-2023-31902 - https://www.redpacketsecurity.com/mobile-mouse-code-execution/ -CVE-2023-31903 - https://www.exploit-db.com/exploits/51052 -CVE-2023-31904 - https://www.exploit-db.com/exploits/51015 -CVE-2023-31907 - https://github.com/jerryscript-project/jerryscript/issues/5073 -CVE-2023-31908 - https://github.com/jerryscript-project/jerryscript/issues/5067 -CVE-2023-3191 - https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a -CVE-2023-31910 - https://github.com/jerryscript-project/jerryscript/issues/5076 -CVE-2023-31913 - https://github.com/jerryscript-project/jerryscript/issues/5061 -CVE-2023-31916 - https://github.com/jerryscript-project/jerryscript/issues/5062 -CVE-2023-31918 - https://github.com/jerryscript-project/jerryscript/issues/5064 -CVE-2023-31919 - https://github.com/jerryscript-project/jerryscript/issues/5069 -CVE-2023-3192 - https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551 -CVE-2023-31920 - https://github.com/jerryscript-project/jerryscript/issues/5070 -CVE-2023-31921 - https://github.com/jerryscript-project/jerryscript/issues/5068 -CVE-2023-31922 - https://github.com/bellard/quickjs/issues/178 -CVE-2023-31923 - https://nobugescapes.com/blog/creating-a-new-user-with-admin-privilege/ -CVE-2023-31940 - https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug7-SQL-Injection-page_id.md -CVE-2023-31972 - https://github.com/yasm/yasm/issues/209 -CVE-2023-31973 - https://github.com/yasm/yasm/issues/207 -CVE-2023-31974 - https://github.com/yasm/yasm/issues/208 -CVE-2023-31979 - https://github.com/petewarden/catdoc/issues/9 -CVE-2023-31981 - https://github.com/irontec/sngrep/issues/430 -CVE-2023-31982 - https://github.com/irontec/sngrep/issues/431 -CVE-2023-31983 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/2/Readme.md -CVE-2023-31985 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/3/Readme.md -CVE-2023-31986 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/4/Readme.md -CVE-2023-32019 - http://packetstormsecurity.com/files/173310/Windows-Kernel-KTM-Registry-Transactions-Non-Atomic-Outcomes.html -CVE-2023-32046 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-3206 - https://github.com/shulao2020/cve/blob/main/Flying%20Fish.md -CVE-2023-32068 - https://jira.xwiki.org/browse/XWIKI-20096 -CVE-2023-32071 - https://jira.xwiki.org/browse/XWIKI-20340 -CVE-2023-32073 - https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx -CVE-2023-3209 - https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c -CVE-2023-3211 - https://wpscan.com/vulnerability/873824f0-e8b1-45bd-8579-bc3c649a54e5/ -CVE-2023-32111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-32112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-32113 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-32114 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-32115 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-3217 - http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html -CVE-2023-3218 - https://huntr.dev/bounties/94d50b11-20ca-46e3-9086-dd6836421675 -CVE-2023-32183 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32183 -CVE-2023-32184 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32184 -CVE-2023-3219 - http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html -CVE-2023-3219 - https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd -CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753339 -CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753341 -CVE-2023-32207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826116 -CVE-2023-32209 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767194 -CVE-2023-32211 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823379 -CVE-2023-32212 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826622 -CVE-2023-32233 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -CVE-2023-32233 - https://news.ycombinator.com/item?id=35879660 -CVE-2023-3224 - https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87 -CVE-2023-32243 - http://packetstormsecurity.com/files/172457/WordPress-Elementor-Lite-5.7.1-Arbitrary-Password-Reset.html -CVE-2023-3225 - https://wpscan.com/vulnerability/3c76d0f4-2ea8-433d-afb2-e35e45630899 -CVE-2023-3226 - https://wpscan.com/vulnerability/941a9aa7-f4b2-474a-84d9-9a74c99079e2 -CVE-2023-3227 - https://huntr.dev/bounties/97ecf4b8-7eeb-4e39-917c-2660262ff9ba -CVE-2023-32271 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774 -CVE-2023-32275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1753 -CVE-2023-3228 - https://huntr.dev/bounties/0a7ee1fb-e693-4259-abf8-a2c3218c1647 -CVE-2023-32284 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1750 -CVE-2023-3229 - https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170 -CVE-2023-3230 - https://huntr.dev/bounties/390643f0-106b-4424-835d-52610aefa4c7 -CVE-2023-32307 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-rm4c-ccvf-ff9c -CVE-2023-32309 - https://github.com/facelessuser/pymdown-extensions/security/advisories/GHSA-jh85-wwv9-24hv -CVE-2023-32313 - https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550 -CVE-2023-32313 - https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v -CVE-2023-32314 - https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac -CVE-2023-32314 - https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5 -CVE-2023-32315 - http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html -CVE-2023-32317 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/ -CVE-2023-3232 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Broken%20Access%20Control.md -CVE-2023-32321 - https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst -CVE-2023-32322 - https://github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp -CVE-2023-32324 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7 -CVE-2023-3233 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md -CVE-2023-3234 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20deserialization.md -CVE-2023-3235 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%201.md -CVE-2023-3236 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%202.md -CVE-2023-3237 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20contains%20a%20weak%20default%20password%20which%20gives%20attackers%20to%20access%20backstage%20management%20system.md -CVE-2023-3238 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md -CVE-2023-3239 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20obtain%20the%20web%20directory%20path%20and%20other%20information%20leaked%20.md -CVE-2023-3240 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20download%20vulenrability%20via%20the%20filename.md -CVE-2023-3241 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20read%20vulenrability%20via%20the%20filename.md -CVE-2023-3243 - https://www.honeywell.com/us/en/product-security -CVE-2023-3245 - https://wpscan.com/vulnerability/f9f8ae7e-6621-4e29-9257-b8306dbe8811 -CVE-2023-3247 - https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw -CVE-2023-3248 - https://wpscan.com/vulnerability/90c7496b-552f-4566-b7ae-8c953c965352 -CVE-2023-32486 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32487 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32488 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32489 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32490 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32491 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32492 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32493 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32494 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32495 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities -CVE-2023-32521 - https://www.tenable.com/security/research/tra-2023-17 -CVE-2023-32522 - https://www.tenable.com/security/research/tra-2023-17 -CVE-2023-32541 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759 -CVE-2023-32560 - http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html -CVE-2023-32560 - http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html -CVE-2023-32571 - https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/ -CVE-2023-32614 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1749 -CVE-2023-32615 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771 -CVE-2023-32616 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837 -CVE-2023-32629 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-32632 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767 -CVE-2023-32634 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755 -CVE-2023-32645 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752 -CVE-2023-32653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802 -CVE-2023-32664 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1795 -CVE-2023-32676 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/ -CVE-2023-32679 - https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c -CVE-2023-3269 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/07/28/1 -CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/08/25/4 -CVE-2023-32698 - https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c -CVE-2023-32699 - https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7 -CVE-2023-32707 - http://packetstormsecurity.com/files/174602/Splunk-Enterprise-Account-Takeover.html -CVE-2023-32707 - http://packetstormsecurity.com/files/175386/Splunk-edit_user-Capability-Privilege-Escalation.html -CVE-2023-32741 - http://packetstormsecurity.com/files/175654/WordPress-Contact-Form-To-Any-API-1.1.2-SQL-Injection.html -CVE-2023-32749 - http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html -CVE-2023-32749 - http://seclists.org/fulldisclosure/2023/May/18 -CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments -CVE-2023-32750 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-005/ -CVE-2023-32750 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2023-32751 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-004/ -CVE-2023-32751 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2023-3276 - https://vuldb.com/?id.231626 -CVE-2023-32767 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-014.txt -CVE-2023-32781 - http://packetstormsecurity.com/files/176677/PRTG-Authenticated-Remote-Code-Execution.html -CVE-2023-32784 - https://github.com/keepassxreboot/keepassxc/discussions/9433 -CVE-2023-32784 - https://github.com/vdohney/keepass-password-dumper -CVE-2023-32784 - https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/ -CVE-2023-3279 - https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635 -CVE-2023-32832 - http://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html -CVE-2023-32837 - http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html -CVE-2023-3291 - https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5 -CVE-2023-3292 - https://wpscan.com/vulnerability/d993c385-c3ad-49a6-b079-3a1b090864c8 -CVE-2023-3294 - https://huntr.dev/bounties/9d308ebb-4289-411f-ac22-990383d98932 -CVE-2023-32961 - https://lourcode.kr/posts/CVE-2023-32961-Analysis/ -CVE-2023-3304 - https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17 -CVE-2023-3305 - https://github.com/sleepyvv/vul_report/blob/main/C-data/BrokenAccessControl.md -CVE-2023-3307 - https://github.com/ctflearner/Vulnerability/blob/main/MINICAL/minical.md -CVE-2023-3308 - https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md -CVE-2023-3309 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309 -CVE-2023-3311 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3311 -CVE-2023-3313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403 -CVE-2023-33131 - http://packetstormsecurity.com/files/173361/Microsoft-365-MSO-2306-Build-16.0.16529.20100-Remote-Code-Execution.html -CVE-2023-3314 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403 -CVE-2023-33140 - http://packetstormsecurity.com/files/173064/Microsoft-OneNote-2305-Build-16.0.16501.20074-Spoofing.html -CVE-2023-33148 - http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.html -CVE-2023-3316 - https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/ -CVE-2023-3318 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318 -CVE-2023-33185 - https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md -CVE-2023-33190 - https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62 -CVE-2023-33194 - https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9 -CVE-2023-33195 - https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x -CVE-2023-33196 - https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5 -CVE-2023-33197 - https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr -CVE-2023-3320 - http://packetstormsecurity.com/files/173048/WordPress-WP-Sticky-Social-1.0.1-CSRF-Cross-Site-Scripting.html -CVE-2023-33203 - https://bugzilla.suse.com/show_bug.cgi?id=1210685 -CVE-2023-33203 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 -CVE-2023-33237 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-33238 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-33239 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-33241 - https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc -CVE-2023-33241 - https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ -CVE-2023-33242 - https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc -CVE-2023-33242 - https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/ -CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses -CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2022-004/-starface-authentication-with-password-hash-possible -CVE-2023-33246 - http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html -CVE-2023-33253 - https://github.com/Toxich4/CVE-2023-33253 -CVE-2023-33255 - http://packetstormsecurity.com/files/172644/Papaya-Medical-Viewer-1.0-Cross-Site-Scripting.html -CVE-2023-33263 - https://packetstormsecurity.com/files/172560/WFTPD-3.25-Credential-Disclosure.html -CVE-2023-33268 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33268.md -CVE-2023-33269 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33269.md -CVE-2023-33270 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33270.md -CVE-2023-33271 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33271.md -CVE-2023-33272 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33272.md -CVE-2023-33273 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33273.md -CVE-2023-33274 - https://gist.github.com/pedromonteirobb/a0584095b46141702c8cae0f3f1b6759 -CVE-2023-33276 - https://www.syss.de/en/responsible-disclosure-policy -CVE-2023-33276 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt -CVE-2023-33277 - https://www.syss.de/en/responsible-disclosure-policy -CVE-2023-33277 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt -CVE-2023-3328 - https://wpscan.com/vulnerability/d8b76875-cf7f-43a9-b88b-d8aefefab131 -CVE-2023-33284 - https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html -CVE-2023-33288 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 -CVE-2023-33289 - https://gist.github.com/6en6ar/b118888dc739e8979038f24c8ac33611 -CVE-2023-33291 - http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html -CVE-2023-33335 - https://inf0seq.github.io/cve/2023/05/03/Cross-Site-scripting-(XSS)-in-Sophos-iView.html -CVE-2023-33336 - https://inf0seq.github.io/cve/2023/04/30/Cross-site-scripting-(XSS)-in-Sophos-Web-Appliance-4.1.1-0.9.html -CVE-2023-33356 - https://github.com/Thecosy/IceCMS/issues/8 -CVE-2023-33359 - https://github.com/Piwigo/Piwigo/issues/1908 -CVE-2023-3338 - https://seclists.org/oss-sec/2023/q2/276 -CVE-2023-33383 - http://packetstormsecurity.com/files/173954/Shelly-PRO-4PM-0.11.0-Authentication-Bypass.html -CVE-2023-33383 - https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability -CVE-2023-33386 - https://github.com/b1ackc4t/MarsCTF/issues/10 -CVE-2023-33387 - https://www.tuv.com/landingpage/de/schwachstelle/ -CVE-2023-33408 - https://github.com/Thirukrishnan/CVE-2023-33408 -CVE-2023-33409 - https://github.com/Thirukrishnan/CVE-2023-33409 -CVE-2023-33410 - https://github.com/Thirukrishnan/CVE-2023-33410 -CVE-2023-3342 - http://packetstormsecurity.com/files/173434/WordPress-User-Registration-3.0.2-Arbitrary-File-Upload.html -CVE-2023-3344 - https://wpscan.com/vulnerability/d27bc628-3de1-421e-8a67-150e9d7a96dd -CVE-2023-33440 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html -CVE-2023-33443 - https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras/ -CVE-2023-3345 - https://wpscan.com/vulnerability/0d07423e-98d2-43a3-824d-562747a3d65a -CVE-2023-3346 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-007_en.pdf -CVE-2023-33478 - https://github.com/remoteclinic/RemoteClinic/issues/22 -CVE-2023-33479 - https://github.com/remoteclinic/RemoteClinic/issues/23 -CVE-2023-33480 - https://github.com/remoteclinic/RemoteClinic/issues/24 -CVE-2023-33485 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/5 -CVE-2023-33486 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3 -CVE-2023-33487 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/4 -CVE-2023-33496 - https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md -CVE-2023-33510 - https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/ -CVE-2023-33518 - https://github.com/emoncms/emoncms/issues/1856 -CVE-2023-33534 - https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696 -CVE-2023-33537 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/1/TL-WR940N_TL-WR841N_TL-WR740N_userRpm_FixMapCfgRpm.md -CVE-2023-33538 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md -CVE-2023-33544 - https://github.com/hawtio/hawtio/issues/2832 -CVE-2023-33546 - https://github.com/janino-compiler/janino/issues/201 -CVE-2023-33553 - https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md -CVE-2023-33556 - https://github.com/Am1ngl/ttt/tree/main/37 -CVE-2023-33558 - https://github.com/ninj4c0d3r/OcoMon-Research/commit/6357def478b11119270b89329fceb115f12c69fc -CVE-2023-3356 - https://wpscan.com/vulnerability/93faad5b-e1e8-4e49-b19e-b91343d68b51 -CVE-2023-33568 - https://www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dump/ -CVE-2023-33570 - https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490 -CVE-2023-33580 - http://packetstormsecurity.com/files/173030/Student-Study-Center-Management-System-1.0-Cross-Site-Scripting.html -CVE-2023-33580 - https://www.exploit-db.com/exploits/51528 -CVE-2023-33584 - http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html -CVE-2023-33584 - https://packetstormsecurity.com/files/cve/CVE-2023-33584 -CVE-2023-33584 - https://www.exploit-db.com/exploits/51501 -CVE-2023-33592 - http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html -CVE-2023-33595 - https://github.com/python/cpython/issues/103824 -CVE-2023-33621 - https://justinapplegate.me/2023/glinet-CVE-2023-33621/ -CVE-2023-33625 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md -CVE-2023-33625 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/cmd%20injection -CVE-2023-33626 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md -CVE-2023-33626 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow -CVE-2023-33627 - https://hackmd.io/@0dayResearch/UpdateSnat -CVE-2023-33628 - https://hackmd.io/@0dayResearch/DelvsList_R300 -CVE-2023-33629 - https://hackmd.io/@0dayResearch/r1UjggZfh -CVE-2023-33630 - https://hackmd.io/@0dayResearch/HkUA31-Mh -CVE-2023-33631 - https://hackmd.io/@0dayResearch/DelSTList -CVE-2023-33632 - https://hackmd.io/@0dayResearch/r1N7fg-fn -CVE-2023-33633 - https://hackmd.io/@0dayResearch/UpdateWanParams -CVE-2023-33634 - https://hackmd.io/@0dayResearch/r1g5bl-Mn -CVE-2023-33635 - https://hackmd.io/@0dayResearch/UpdateMacClone -CVE-2023-33636 - https://hackmd.io/@0dayResearch/HyX6mgWz2 -CVE-2023-33637 - https://hackmd.io/@0dayResearch/r1azLeWz3 -CVE-2023-33638 - https://hackmd.io/@0dayResearch/ryyALdiV3 -CVE-2023-33639 - https://hackmd.io/@0dayResearch/Bk2hvYkH3 -CVE-2023-33640 - https://hackmd.io/@0dayResearch/S1twOtyrh -CVE-2023-33641 - https://hackmd.io/@0dayResearch/SycYkOj42 -CVE-2023-33642 - https://hackmd.io/@0dayResearch/Skg0zOsVh -CVE-2023-33643 - https://hackmd.io/@0dayResearch/S1N5bdsE2 -CVE-2023-3365 - https://wpscan.com/vulnerability/21ce5baa-8085-4053-8d8b-f7d3e2ae70c1 -CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1164 -CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127 -CVE-2023-33657 - https://github.com/emqx/nanomq/issues/1165#issue-1668648319 -CVE-2023-33658 - https://github.com/emqx/nanomq/issues/1153 -CVE-2023-33659 - https://github.com/emqx/nanomq/issues/1154 -CVE-2023-3366 - https://wpscan.com/vulnerability/b2f06223-9352-4227-ae94-32061e2c5611 -CVE-2023-33660 - https://github.com/emqx/nanomq/issues/1155 -CVE-2023-33661 - https://github.com/ChurchCRM/CRM/issues/6474 -CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N1/README.md -CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N1 -CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N3/README.md -CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N3 -CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N4/README.md -CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N4 -CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N2/README.md -CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N2 -CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N6/README.md -CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N6 -CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N5/README.md -CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N5 -CVE-2023-3368 - https://starlabs.sg/advisories/23/23-3368/ -CVE-2023-33684 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php -CVE-2023-33690 - https://github.com/lane711/sonicjs/pull/183 -CVE-2023-33690 - https://youtu.be/6ZuwA9CkQLg -CVE-2023-33693 - https://github.com/tsingsee/EasyPlayerPro-Win/pull/24 -CVE-2023-33716 - https://github.com/enzo1982/mp4v2/issues/36 -CVE-2023-33717 - https://github.com/enzo1982/mp4v2/issues/37 -CVE-2023-33718 - https://github.com/enzo1982/mp4v2/issues/37 -CVE-2023-33719 - https://github.com/enzo1982/mp4v2/issues/37 -CVE-2023-3372 - https://wpscan.com/vulnerability/3396b734-9a10-4070-802d-f9d01cc6eb74/ -CVE-2023-33720 - https://github.com/enzo1982/mp4v2/issues/36 -CVE-2023-33733 - https://github.com/c53elyas/CVE-2023-33733 -CVE-2023-33740 - https://github.com/zzh-newlearner/record/blob/main/luowice_warning.md -CVE-2023-33741 - https://github.com/zzh-newlearner/record/blob/main/macrovideo_share.md -CVE-2023-33742 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html -CVE-2023-33743 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html -CVE-2023-33744 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html -CVE-2023-33745 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html -CVE-2023-33747 - http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html -CVE-2023-33747 - https://github.com/EagleTube/CloudPanel -CVE-2023-33754 - https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md -CVE-2023-33757 - https://github.com/twignet/splicecom -CVE-2023-33758 - https://github.com/twignet/splicecom -CVE-2023-33759 - https://github.com/twignet/splicecom -CVE-2023-33760 - https://github.com/twignet/splicecom -CVE-2023-33761 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33761 -CVE-2023-33763 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33763 -CVE-2023-33764 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764 -CVE-2023-33778 - https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef -CVE-2023-33780 - https://github.com/invernyx/smartcars-3-bugs/security/advisories/GHSA-hx8p-f8h7-5h78 -CVE-2023-33781 - https://github.com/s0tr/CVE-2023-33781 -CVE-2023-33782 - https://github.com/s0tr/CVE-2023-33782 -CVE-2023-33785 - https://github.com/anhdq201/netbox/issues/8 -CVE-2023-33786 - https://github.com/anhdq201/netbox/issues/2 -CVE-2023-33787 - https://github.com/anhdq201/netbox/issues/6 -CVE-2023-33788 - https://github.com/anhdq201/netbox/issues/3 -CVE-2023-33789 - https://github.com/anhdq201/netbox/issues/7 -CVE-2023-33790 - https://github.com/anhdq201/netbox/issues/9 -CVE-2023-33791 - https://github.com/anhdq201/netbox/issues/4 -CVE-2023-33792 - https://github.com/anhdq201/netbox/issues/10 -CVE-2023-33793 - https://github.com/anhdq201/netbox/issues/1 -CVE-2023-33794 - https://github.com/anhdq201/netbox/issues/5 -CVE-2023-33795 - https://github.com/anhdq201/netbox/issues/15 -CVE-2023-33796 - https://github.com/anhdq201/netbox/issues/16 -CVE-2023-33797 - https://github.com/anhdq201/netbox/issues/12 -CVE-2023-33798 - https://github.com/anhdq201/netbox/issues/13 -CVE-2023-33799 - https://github.com/anhdq201/netbox/issues/14 -CVE-2023-3380 - https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md -CVE-2023-33800 - https://github.com/anhdq201/netbox/issues/11 -CVE-2023-33817 - https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5 -CVE-2023-33829 - http://packetstormsecurity.com/files/172588/SCM-Manager-1.60-Cross-Site-Scripting.html -CVE-2023-33829 - https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60 -CVE-2023-33849 - https://www.ibm.com/support/pages/node/7001687 -CVE-2023-3385 - https://gitlab.com/gitlab-org/gitlab/-/issues/416161 -CVE-2023-33863 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html -CVE-2023-33863 - http://seclists.org/fulldisclosure/2023/Jun/2 -CVE-2023-33863 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt -CVE-2023-33864 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html -CVE-2023-33864 - http://seclists.org/fulldisclosure/2023/Jun/2 -CVE-2023-33864 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt -CVE-2023-33865 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html -CVE-2023-33865 - http://seclists.org/fulldisclosure/2023/Jun/2 -CVE-2023-33865 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt -CVE-2023-33866 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757 -CVE-2023-33873 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ -CVE-2023-33876 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796 -CVE-2023-3389 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-3390 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-33919 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html -CVE-2023-33919 - http://seclists.org/fulldisclosure/2023/Jul/14 -CVE-2023-3392 - https://wpscan.com/vulnerability/1e733ccf-8026-4831-9863-e505c2aecba6 -CVE-2023-33920 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html -CVE-2023-33920 - http://seclists.org/fulldisclosure/2023/Jul/14 -CVE-2023-33921 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html -CVE-2023-33921 - http://seclists.org/fulldisclosure/2023/Jul/14 -CVE-2023-3393 - https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914 -CVE-2023-3394 - https://huntr.dev/bounties/84bf3e85-cdeb-4b8d-9ea4-74156dbda83f -CVE-2023-33956 - https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2 -CVE-2023-33968 - https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr -CVE-2023-33969 - https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9 -CVE-2023-33970 - https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286 -CVE-2023-33971 - https://github.com/pluginsGLPI/formcreator/security/advisories/GHSA-777g-3848-8r3g -CVE-2023-33977 - https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/ -CVE-2023-3398 - https://huntr.dev/bounties/aa087215-80e1-433d-b870-650705630e69 -CVE-2023-33984 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33985 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33986 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33987 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33988 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33989 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33990 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33991 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-33992 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-3401 - https://gitlab.com/gitlab-org/gitlab/-/issues/416252 -CVE-2023-34039 - http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html -CVE-2023-34039 - http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html -CVE-2023-34044 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html -CVE-2023-34045 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html -CVE-2023-34046 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html -CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/10/27/3 -CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/11/26/1 -CVE-2023-34092 - https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67 -CVE-2023-34093 - https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de -CVE-2023-34093 - https://github.com/strapi/strapi/releases/tag/v4.10.8 -CVE-2023-34093 - https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf -CVE-2023-34096 - http://packetstormsecurity.com/files/172822/Thruk-Monitoring-Web-Interface-3.06-Path-Traversal.html -CVE-2023-34096 - https://galogetlatorre.blogspot.com/2023/06/cve-2023-34096-path-traversal-thruk.html -CVE-2023-34096 - https://github.com/galoget/Thruk-CVE-2023-34096 -CVE-2023-34096 - https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h -CVE-2023-34096 - https://www.exploit-db.com/exploits/51509 -CVE-2023-34097 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833 -CVE-2023-34102 - https://github.com/avo-hq/avo/security/advisories/GHSA-86h2-2g4g-29qx -CVE-2023-34103 - https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39 -CVE-2023-34105 - https://github.com/ossrs/srs/security/advisories/GHSA-vpr5-779c-cx62 -CVE-2023-34111 - https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr -CVE-2023-34111 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2023-34112 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2023-34124 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html -CVE-2023-34127 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html -CVE-2023-34132 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html -CVE-2023-34133 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html -CVE-2023-34151 - https://github.com/ImageMagick/ImageMagick/issues/6341 -CVE-2023-34152 - https://github.com/ImageMagick/ImageMagick/issues/6339 -CVE-2023-34153 - https://github.com/ImageMagick/ImageMagick/issues/6338 -CVE-2023-34188 - https://github.com/cesanta/mongoose/pull/2197 -CVE-2023-34198 - https://advisories.stormshield.eu/2023-019 -CVE-2023-34204 - https://github.com/imapsync/imapsync/issues/399 -CVE-2023-34205 - https://github.com/moov-io/signedxml/issues/23 -CVE-2023-3421 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751 -CVE-2023-34213 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-34214 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-34215 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-34216 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-34217 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities -CVE-2023-3423 - https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139 -CVE-2023-34235 - https://github.com/strapi/strapi/releases/tag/v4.10.8 -CVE-2023-34235 - https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f -CVE-2023-34251 - https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5 -CVE-2023-34253 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/ -CVE-2023-34259 - https://seclists.org/fulldisclosure/2023/Jul/15 -CVE-2023-34260 - https://seclists.org/fulldisclosure/2023/Jul/15 -CVE-2023-34261 - https://seclists.org/fulldisclosure/2023/Jul/15 -CVE-2023-3431 - https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c -CVE-2023-34312 - https://github.com/vi3t1/qq-tim-elevation -CVE-2023-34317 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772 -CVE-2023-34319 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-3432 - https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51 -CVE-2023-34346 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764 -CVE-2023-3435 - https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b -CVE-2023-34353 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776 -CVE-2023-34354 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781 -CVE-2023-34356 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778 -CVE-2023-3436 - https://forum.xpdfreader.com/viewtopic.php?t=42618 -CVE-2023-34362 - http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html -CVE-2023-34362 - http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html -CVE-2023-34365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763 -CVE-2023-34366 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758 -CVE-2023-34366 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1758 -CVE-2023-34367 - http://blog.pi3.com.pl/?p=850 -CVE-2023-34367 - https://portswigger.net/daily-swig/blind-tcp-ip-hijacking-is-resurrected-for-windows-7 -CVE-2023-3438 - https://kcm.trellix.com/corporate/index?page=content&id=SB10404 -CVE-2023-3439 - http://www.openwall.com/lists/oss-security/2023/07/02/1 -CVE-2023-3439 - https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 -CVE-2023-34407 - https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/ -CVE-2023-34408 - https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/ -CVE-2023-34409 - https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/ -CVE-2023-34426 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766 -CVE-2023-34434 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-34448 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/ -CVE-2023-3445 - https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070 -CVE-2023-34452 - https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc -CVE-2023-34457 - https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4 -CVE-2023-34467 - https://jira.xwiki.org/browse/XWIKI-20333 -CVE-2023-34468 - http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html -CVE-2023-34488 - https://github.com/emqx/nanomq/issues/1181 -CVE-2023-34494 - https://github.com/emqx/nanomq/issues/1180 -CVE-2023-34553 - https://ashallen.net/wireless-smart-lock-vulnerability-disclosure -CVE-2023-34561 - https://www.youtube.com/watch?v=DMxucOWfLPc -CVE-2023-34561 - https://www.youtube.com/watch?v=ev0VXbiduuQ -CVE-2023-34561 - https://www.youtube.com/watch?v=kAeJvY6BBps -CVE-2023-34563 - https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-34563/EN.md -CVE-2023-34565 - https://github.com/grayfullbuster0804/netbox/issues/1 -CVE-2023-34566 - https://hackmd.io/@0dayResearch/rk8hQf5rh -CVE-2023-34567 - https://hackmd.io/@0dayResearch/H1xUqzfHh -CVE-2023-34568 - https://hackmd.io/@0dayResearch/ryR8IzMH2 -CVE-2023-34569 - https://hackmd.io/@0dayResearch/HymuzffSh -CVE-2023-34570 - https://hackmd.io/@0dayResearch/S1eI91_l2 -CVE-2023-34571 - https://hackmd.io/@0dayResearch/S1GcUxzSn -CVE-2023-34581 - https://packetstormsecurity.com/files/172559/Service-Provider-Management-System-1.0-SQL-Injection.html -CVE-2023-34581 - https://vulners.com/packetstorm/PACKETSTORM:172559 -CVE-2023-34581 - https://www.exploit-db.com/exploits/51482 -CVE-2023-34598 - https://github.com/maddsec/CVE-2023-34598 -CVE-2023-34599 - https://github.com/maddsec/CVE-2023-34599 -CVE-2023-3460 - https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7 -CVE-2023-34602 - https://github.com/jeecgboot/jeecg-boot/issues/4983 -CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/48/ -CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/49/ -CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/50/ -CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/51/ -CVE-2023-34610 - https://github.com/jdereg/json-io/issues/169 -CVE-2023-34611 - https://github.com/bolerio/mjson/issues/40 -CVE-2023-34612 - https://github.com/phax/ph-commons/issues/35 -CVE-2023-34613 - https://github.com/maddingo/sojo/issues/15 -CVE-2023-34614 - https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij -CVE-2023-34615 - https://github.com/billdavidson/JSONUtil/issues/10 -CVE-2023-34616 - https://github.com/InductiveComputerScience/pbJson/issues/2 -CVE-2023-34617 - https://github.com/owlike/genson/issues/191 -CVE-2023-34620 - https://github.com/hjson/hjson-java/issues/24 -CVE-2023-34623 - https://github.com/trajano/jtidy/issues/4 -CVE-2023-34624 - https://github.com/amplafi/htmlcleaner/issues/13 -CVE-2023-34625 - https://packetstormsecurity.com/2307-exploits/mojobox14-replay.txt -CVE-2023-34625 - https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock -CVE-2023-34634 - http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html -CVE-2023-34634 - http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html -CVE-2023-34634 - https://greenshot.atlassian.net/browse/BUG-3061 -CVE-2023-34634 - https://www.exploit-db.com/exploits/51633 -CVE-2023-34635 - http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html -CVE-2023-34635 - https://www.exploit-db.com/exploits/51610 -CVE-2023-34644 - https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/ -CVE-2023-34645 - https://github.com/jflyfox/jfinal_cms/issues/57 -CVE-2023-3465 - https://vuldb.com/?id.232711 -CVE-2023-34654 - https://github.com/ae6e361b/taocms-XSS -CVE-2023-34666 - https://www.exploit-db.com/exploits/49204 -CVE-2023-3469 - https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca -CVE-2023-34723 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html -CVE-2023-34723 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 -CVE-2023-34724 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html -CVE-2023-34724 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 -CVE-2023-34725 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html -CVE-2023-34725 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 -CVE-2023-34733 - https://github.com/zj3t/Automotive-vulnerabilities/tree/main/VW/jetta2021 -CVE-2023-34734 - https://github.com/prismbreak/vulnerabilities/issues/3 -CVE-2023-34735 - https://github.com/prismbreak/vulnerabilities/issues/4 -CVE-2023-34736 - https://github.com/prismbreak/vulnerabilities/issues/5 -CVE-2023-34750 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34751 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34752 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34753 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34754 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34755 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34756 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -CVE-2023-34758 - https://github.com/advisories/GHSA-8jxm-xp43-qh3q -CVE-2023-34758 - https://github.com/tangent65536/Slivjacker -CVE-2023-3479 - https://huntr.dev/bounties/6ac5cf87-6350-4645-8930-8f2876427723 -CVE-2023-34795 - https://github.com/brechtsanders/xlsxio/issues/121 -CVE-2023-34800 - https://github.com/Tyaoo/IoT-Vuls/blob/main/dlink/Go-RT-AC750/vul.md -CVE-2023-34830 - https://medium.com/@ray.999/cve-2023-34830-reflected-xss-on-i-doit-open-v24-and-below-ad58036f5407 -CVE-2023-34832 - http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html -CVE-2023-34834 - https://www.exploit-db.com/exploits/51542 -CVE-2023-34845 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 -CVE-2023-34849 - https://github.com/cczzmm/IOT-POC/tree/main/Ikuai -CVE-2023-3486 - https://www.tenable.com/security/research/tra-2023-23 -CVE-2023-34867 - https://github.com/jerryscript-project/jerryscript/issues/5084 -CVE-2023-34868 - https://github.com/jerryscript-project/jerryscript/issues/5083 -CVE-2023-34872 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399 -CVE-2023-3490 - https://huntr.dev/bounties/4e60ebc1-e00f-48cb-b011-3cefce688ecd -CVE-2023-3491 - https://huntr.dev/bounties/043bd900-ac78-44d2-a340-84ddd0bc4a1d -CVE-2023-34916 - https://github.com/fuge/cms/issues/4 -CVE-2023-34917 - https://github.com/fuge/cms/issues/3 -CVE-2023-3492 - https://wpscan.com/vulnerability/01b9b1c2-439e-44df-bf01-026cb13d7d40 -CVE-2023-34924 - https://github.com/ChrisL0tus/CVE-2023-34924 -CVE-2023-34927 - https://github.com/casdoor/casdoor/issues/1531 -CVE-2023-34928 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34928.md -CVE-2023-34929 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34929.md -CVE-2023-34930 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34930.md -CVE-2023-34931 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md -CVE-2023-34932 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34932.md -CVE-2023-34933 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34933.md -CVE-2023-34934 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34934.md -CVE-2023-34935 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34935.md -CVE-2023-34936 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md -CVE-2023-34937 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md -CVE-2023-34939 - https://github.com/firsov/onlyoffice -CVE-2023-34939 - https://github.com/firsov/onlyoffice/blob/main/CVE-2023-34939-PoC.md -CVE-2023-34960 - http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html -CVE-2023-34982 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ -CVE-2023-3499 - https://wpscan.com/vulnerability/ea29413b-494e-410e-ae42-42f96284899c -CVE-2023-34994 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773 -CVE-2023-34998 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770 -CVE-2023-35001 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -CVE-2023-35001 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-35002 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760 -CVE-2023-3501 - https://wpscan.com/vulnerability/d3fb4a2b-ed51-4654-b7c1-4b0f59cd1ecf -CVE-2023-35016 - https://www.ibm.com/support/pages/node/7014397 -CVE-2023-35019 - https://www.ibm.com/support/pages/node/7014397 -CVE-2023-35055 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 -CVE-2023-35056 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 -CVE-2023-35057 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821 -CVE-2023-35057 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1821 -CVE-2023-3507 - https://wpscan.com/vulnerability/e72bbe9b-e51d-40ab-820d-404e0cb86ee6 -CVE-2023-3508 - https://wpscan.com/vulnerability/064c7acb-db57-4537-8a6d-32f7ea31c738 -CVE-2023-35088 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-3509 - https://gitlab.com/gitlab-org/gitlab/-/issues/416945 -CVE-2023-3510 - https://wpscan.com/vulnerability/76abf4ac-5cc1-41a0-84c3-dff42c659581 -CVE-2023-3511 - https://gitlab.com/gitlab-org/gitlab/-/issues/416961 -CVE-2023-35110 - https://github.com/grobmeier/jjson/issues/2 -CVE-2023-35116 - https://github.com/FasterXML/jackson-databind/issues/3972 -CVE-2023-35124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775 -CVE-2023-35126 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825 -CVE-2023-35126 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825 -CVE-2023-3513 - https://starlabs.sg/advisories/23/23-3513/ -CVE-2023-3514 - https://starlabs.sg/advisories/23/23-3514/ -CVE-2023-3515 - https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053 -CVE-2023-35153 - https://jira.xwiki.org/browse/XWIKI-20365 -CVE-2023-35155 - https://jira.xwiki.org/browse/XWIKI-20370 -CVE-2023-35156 - https://jira.xwiki.org/browse/XWIKI-20341 -CVE-2023-35157 - https://jira.xwiki.org/browse/XWIKI-20339 -CVE-2023-35158 - https://jira.xwiki.org/browse/XWIKI-20352 -CVE-2023-35160 - https://jira.xwiki.org/browse/XWIKI-20343 -CVE-2023-35162 - https://jira.xwiki.org/browse/XWIKI-20342 -CVE-2023-35169 - https://github.com/Webklex/php-imap/security/advisories/GHSA-47p7-xfcc-4pv9 -CVE-2023-3519 - http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html -CVE-2023-35193 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782 -CVE-2023-35194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782 -CVE-2023-3520 - https://huntr.dev/bounties/f3b277bb-91db-419e-bcc4-fe0b055d2551 -CVE-2023-3521 - https://huntr.dev/bounties/76a3441d-7f75-4a8d-a7a0-95a7f5456eb0 -CVE-2023-3523 - https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac -CVE-2023-3524 - https://wpscan.com/vulnerability/89570379-769b-4684-b8a7-28c37b408e5d -CVE-2023-3526 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html -CVE-2023-3526 - http://seclists.org/fulldisclosure/2023/Aug/12 -CVE-2023-3528 - https://vuldb.com/?id.233252 -CVE-2023-3531 - https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414 -CVE-2023-3532 - https://huntr.dev/bounties/ebd2428a-e2cb-480e-ba37-dd89ad62cf1b -CVE-2023-3533 - https://starlabs.sg/advisories/23/23-3533/ -CVE-2023-35356 - http://packetstormsecurity.com/files/174115/Microsoft-Windows-Kernel-Arbitrary-Read.html -CVE-2023-35356 - http://packetstormsecurity.com/files/174118/Microsoft-Windows-Kernel-Security-Descriptor-Use-After-Free.html -CVE-2023-35356 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html -CVE-2023-35357 - http://packetstormsecurity.com/files/174116/Microsoft-Windows-Kernel-Unsafe-Reference.html -CVE-2023-35358 - http://packetstormsecurity.com/files/174117/Microsoft-Windows-Kernel-Unsafe-Reference.html -CVE-2023-35359 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html -CVE-2023-3537 - https://vuldb.com/?id.233289 -CVE-2023-35382 - http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html -CVE-2023-35386 - http://packetstormsecurity.com/files/174567/Microsoft-Windows-Kernel-Integer-Overflow-Out-Of-Bounds-Read.html -CVE-2023-3545 - https://starlabs.sg/advisories/23/23-3545/ -CVE-2023-3547 - https://wpscan.com/vulnerability/3cfb6696-18ad-4a38-9ca3-992f0b768b78 -CVE-2023-3551 - https://huntr.dev/bounties/cf8878ff-6cd9-49be-b313-7ac2a94fc7f7 -CVE-2023-3552 - https://huntr.dev/bounties/aeb2f43f-0602-4ac6-9685-273e87ff4ded -CVE-2023-3553 - https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870 -CVE-2023-3559 - https://vuldb.com/?id.233353 -CVE-2023-35633 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html -CVE-2023-3565 - https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530 -CVE-2023-3566 - https://github.com/ctflearner/Vulnerability/blob/main/WALLABAG/NAME-LIMIT.md -CVE-2023-3566 - https://youtu.be/ouwud0PlHkE -CVE-2023-35668 - https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd -CVE-2023-3567 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-3567 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-3568 - https://huntr.dev/bounties/f3782eb1-049b-4998-aac4-d9798ec1c123 -CVE-2023-3569 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html -CVE-2023-3569 - http://seclists.org/fulldisclosure/2023/Aug/12 -CVE-2023-35695 - https://www.tenable.com/security/research/tra-2023-17 -CVE-2023-35719 - https://www.manageengine.com/products/self-service-password/kb/our-response-to-CVE-2023-35719.html -CVE-2023-3574 - https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6 -CVE-2023-3575 - https://wpscan.com/vulnerability/6f884688-2c0d-4844-bd31-ef7085edf112 -CVE-2023-3575 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins -CVE-2023-35759 - http://packetstormsecurity.com/files/176978/WhatsUp-Gold-2022-22.1.0-Build-39-Cross-Site-Scripting.html -CVE-2023-35788 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -CVE-2023-35788 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 -CVE-2023-3579 - https://github.com/nightcloudos/cve/blob/main/CSRF.md -CVE-2023-35799 - https://advisories.stormshield.eu/2023-022/ -CVE-2023-3580 - https://huntr.dev/bounties/4eed53ca-06c2-43aa-aea8-c03ea5f13ce4 -CVE-2023-35800 - https://advisories.stormshield.eu/2023-021/ -CVE-2023-35808 - http://packetstormsecurity.com/files/174300/SugarCRM-12.2.0-Shell-Upload.html -CVE-2023-35808 - http://seclists.org/fulldisclosure/2023/Aug/26 -CVE-2023-35809 - http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html -CVE-2023-35810 - http://packetstormsecurity.com/files/174302/SugarCRM-12.2.0-PHP-Object-Injection.html -CVE-2023-35810 - http://seclists.org/fulldisclosure/2023/Aug/28 -CVE-2023-35811 - http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html -CVE-2023-35811 - http://seclists.org/fulldisclosure/2023/Aug/29 -CVE-2023-35818 - https://espressif.com -CVE-2023-35839 - https://github.com/noear/solon/issues/145 -CVE-2023-35841 - https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html -CVE-2023-35843 - https://advisory.dw1.io/60 -CVE-2023-35844 - https://advisory.dw1.io/59 -CVE-2023-35861 - https://blog.freax13.de/cve/cve-2023-35861 -CVE-2023-35863 - https://ctrl-c.club/~blue/nfsdk.html -CVE-2023-35863 - https://www.michaelrowley.dev/research/posts/nfsdk/nfsdk.html -CVE-2023-35866 - https://medium.com/@cybercitizen.tech/keepassxc-vulnerability-cve-2023-35866-dc7d447c4903 -CVE-2023-35870 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-35871 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-35872 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-35873 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-35874 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-35885 - https://github.com/datackmy/FallingSkies-CVE-2023-35885 -CVE-2023-35885 - https://www.datack.my/fallingskies-cloudpanel-0-day/ -CVE-2023-35925 - https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp -CVE-2023-35932 - https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q -CVE-2023-35937 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r -CVE-2023-35941 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 -CVE-2023-35942 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 -CVE-2023-35943 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq -CVE-2023-35944 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g -CVE-2023-35945 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r -CVE-2023-35965 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 -CVE-2023-35966 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 -CVE-2023-35967 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 -CVE-2023-35968 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 -CVE-2023-35985 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834 -CVE-2023-3599 - https://github.com/movonow/demo/blob/main/click_fees.md -CVE-2023-3601 - https://wpscan.com/vulnerability/c0cc513e-c306-4920-9afb-e33d95a7292f -CVE-2023-3604 - https://wpscan.com/vulnerability/8f6615e8-f607-4ce4-a0e0-d5fc841ead16 -CVE-2023-3607 - https://github.com/mohdkey/cve/blob/main/kodbox.md -CVE-2023-36085 - http://packetstormsecurity.com/files/176991/SISQUAL-WFM-7.1.319.103-Host-Header-Injection.html -CVE-2023-36085 - https://github.com/omershaik0/Handmade_Exploits/tree/main/SISQUALWFM-Host-Header-Injection-CVE-2023-36085 -CVE-2023-3609 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-3609 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-36093 - https://github.com/weng-xianhu/eyoucms/issues/44 -CVE-2023-36095 - http://langchain.com -CVE-2023-36109 - https://github.com/Limesss/CVE-2023-36109/tree/main -CVE-2023-36118 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html -CVE-2023-36118 - https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7 -CVE-2023-36119 - https://nvd.nist.gov/vuln/detail/CVE-2023-0527 -CVE-2023-36121 - https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/e107%20v2.3.2.md -CVE-2023-36121 - https://www.chtsecurity.com/news/0a4743a5-491e-4685-95ee-df8316ab5284 -CVE-2023-36121 - https://www.exploit-db.com/exploits/51449 -CVE-2023-36123 - https://github.com/9Bakabaka/CVE-2023-36123 -CVE-2023-36143 - https://github.com/leonardobg/CVE-2023-36143 -CVE-2023-36144 - https://github.com/leonardobg/CVE-2023-36144 -CVE-2023-36146 - https://github.com/leonardobg/CVE-2023-36146/#readme -CVE-2023-36158 - https://cyberredteam.tech/posts/cve-2023-36158/ -CVE-2023-36158 - https://github.com/unknown00759/CVE-2023-36158/blob/main/CVE-2023-36158.md -CVE-2023-36159 - https://cyberredteam.tech/posts/cve-2023-36159/ -CVE-2023-36162 - https://github.com/779789571/zzcms/blob/main/README.md -CVE-2023-36163 - http://packetstormsecurity.com/files/173366/BuildaGate5-Cross-Site-Scripting.html -CVE-2023-3617 - https://github.com/movonow/demo/blob/main/kruxton.md -CVE-2023-36177 - https://oxnan.com/posts/Snapcast_jsonrpc_rce -CVE-2023-36183 - https://github.com/OpenImageIO/oiio/issues/3871 -CVE-2023-36184 - https://medium.com/@Beosin_com/critical-vulnerability-in-move-vm-can-cause-total-network-shutdown-and-potential-hard-fork-in-sui-49d0d942801c -CVE-2023-3620 - https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9 -CVE-2023-36210 - https://www.exploit-db.com/exploits/51499 -CVE-2023-36211 - https://www.exploit-db.com/exploits/51502 -CVE-2023-36212 - https://packetstormsecurity.com/files/172687/Total-CMS-1.7.4-Shell-Upload.html -CVE-2023-36212 - https://www.exploit-db.com/exploits/51500 -CVE-2023-36213 - https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html -CVE-2023-36213 - https://www.exploit-db.com/exploits/51504 -CVE-2023-36217 - https://www.exploit-db.com/exploits/51520 -CVE-2023-36220 - https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html -CVE-2023-36239 - https://github.com/libming/libming/issues/273 -CVE-2023-36243 - https://github.com/noirotm/flvmeta/issues/19 -CVE-2023-3625 - https://github.com/MoeMion233/cve/blob/main/1.md -CVE-2023-36250 - https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md -CVE-2023-36252 - https://www.zeroscience.mk/en/vulnerabilities/ -CVE-2023-36255 - https://trovent.github.io/security-advisories/TRSA-2303-01/TRSA-2303-01.txt -CVE-2023-36255 - https://trovent.io/security-advisory-2303-01/ -CVE-2023-36256 - https://www.exploit-db.com/exploits/51511 -CVE-2023-36256 - https://www.hackersnotes.com/blog/pentest/online-examination-system-project-1-0-cross-site-request-forgery-csrf/ -CVE-2023-3626 - https://github.com/MoeMion233/cve/blob/main/2.md -CVE-2023-36266 - http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html -CVE-2023-3627 - https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1 -CVE-2023-36271 - https://github.com/LibreDWG/libredwg/issues/681#BUG2 -CVE-2023-36272 - https://github.com/LibreDWG/libredwg/issues/681#BUG1 -CVE-2023-36273 - https://github.com/LibreDWG/libredwg/issues/677#BUG1 -CVE-2023-36274 - https://github.com/LibreDWG/libredwg/issues/677#BUG2 -CVE-2023-36306 - https://www.exploit-db.com/exploits/51643 -CVE-2023-36308 - https://github.com/disintegration/imaging/issues/165 -CVE-2023-36344 - https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html -CVE-2023-36345 - https://youtu.be/KxjsEqNWU9E -CVE-2023-36345 - https://yuyudhn.github.io/pos-codekop-vulnerability/ -CVE-2023-36346 - http://packetstormsecurity.com/files/173280/Sales-Of-Cashier-Goods-1.0-Cross-Site-Scripting.html -CVE-2023-36346 - https://www.youtube.com/watch?v=bbbA-q1syrA -CVE-2023-36346 - https://yuyudhn.github.io/pos-codekop-vulnerability/ -CVE-2023-36347 - https://www.youtube.com/watch?v=7qaIeE2cyO4 -CVE-2023-36347 - https://yuyudhn.github.io/pos-codekop-vulnerability/ -CVE-2023-36348 - http://packetstormsecurity.com/files/173278/POS-Codekop-2.0-Shell-Upload.html -CVE-2023-36348 - https://www.youtube.com/watch?v=Ge0zqY0sGiQ -CVE-2023-36348 - https://yuyudhn.github.io/pos-codekop-vulnerability/ -CVE-2023-3635 - https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/ -CVE-2023-36354 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md -CVE-2023-36355 - http://packetstormsecurity.com/files/173294/TP-Link-TL-WR940N-4-Buffer-Overflow.html -CVE-2023-36357 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md -CVE-2023-36359 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/8/TP-Link%20TL-WR940N%20TL-WR841N%20TL-WR941ND%20wireless%20router%20userRpmQoSRuleListRpm%20buffer%20read%20out-of-bounds%20vulnerability.md -CVE-2023-36375 - https://packetstormsecurity.com -CVE-2023-36376 - https://packetstormsecurity.com -CVE-2023-3638 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05 -CVE-2023-36403 - http://packetstormsecurity.com/files/176209/Windows-Kernel-Race-Conditions.html -CVE-2023-36404 - http://packetstormsecurity.com/files/176110/Windows-Kernel-Information-Disclosure.html -CVE-2023-3643 - https://drive.google.com/file/d/1RXmDUAjqZvWSvHUrfRerz7My6M3KX7YG/view -CVE-2023-3645 - https://wpscan.com/vulnerability/58c11f1e-6ea0-468c-b974-4aea9eb94b82 -CVE-2023-36463 - https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7 -CVE-2023-3647 - https://wpscan.com/vulnerability/6df05333-b1f1-4324-a1ba-dd36fbf1778c/ -CVE-2023-36472 - https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 -CVE-2023-3650 - https://wpscan.com/vulnerability/0a0ecdff-c961-4947-bf7e-bd2392501e33 -CVE-2023-36542 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-36546 - https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/ -CVE-2023-36576 - http://packetstormsecurity.com/files/175659/Windows-Kernel-Containerized-Registry-Escape.html -CVE-2023-36618 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html -CVE-2023-36618 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/ -CVE-2023-36619 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html -CVE-2023-36619 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/ -CVE-2023-36620 - https://seclists.org/fulldisclosure/2023/Jul/12 -CVE-2023-36621 - https://seclists.org/fulldisclosure/2023/Jul/12 -CVE-2023-36622 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-012.txt -CVE-2023-36622 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 -CVE-2023-36623 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-013.txt -CVE-2023-36623 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 -CVE-2023-36624 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-004.txt -CVE-2023-36624 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 -CVE-2023-36629 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hunting-for-android-privilege-escalation-with-a-32-line-fuzzer/ -CVE-2023-36629 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-007_Xiaomi_Redmi_10sNote-1.txt -CVE-2023-36630 - https://github.com/yunaranyancat/poc-dump/blob/main/cloudpanel/README.md -CVE-2023-36631 - https://www.bencteux.fr/posts/malwarebytes_wfc/ -CVE-2023-36632 - https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py -CVE-2023-3664 - https://wpscan.com/vulnerability/d59e6eac-3ebf-40e0-800c-8cbef345423f -CVE-2023-36644 - https://github.com/caffeinated-labs/CVE-2023-36644 -CVE-2023-3665 - https://kcm.trellix.com/corporate/index?page=content&id=SB10405 -CVE-2023-36656 - https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r -CVE-2023-36665 - https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665 -CVE-2023-36669 - https://kratosdefense.com -CVE-2023-3667 - https://wpscan.com/vulnerability/9f2f3f85-6812-46b5-9175-c56f6852afd7 -CVE-2023-36670 - https://kratosdefense.com -CVE-2023-36672 - https://mullvad.net/de/blog/2023/8/9/response-to-tunnelcrack-vulnerability-disclosure/ -CVE-2023-3671 - https://wpscan.com/vulnerability/8b765f39-38e0-49c7-843a-a5b9375a32e7 -CVE-2023-3672 - https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa -CVE-2023-3673 - https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9 -CVE-2023-36803 - http://packetstormsecurity.com/files/175109/Microsoft-Windows-Kernel-Out-Of-Bounds-Reads-Memory-Disclosure.html -CVE-2023-36806 - https://herolab.usd.de/security-advisories/usd-2023-0020/ -CVE-2023-36809 - https://huntr.dev/bounties/c6eeb346-fa99-4d41-bc40-b68f8d689223/ -CVE-2023-36812 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html -CVE-2023-36812 - https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9 -CVE-2023-36813 - https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx -CVE-2023-36815 - https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w -CVE-2023-36816 - https://github.com/Bubka/2FAuth/security/advisories/GHSA-cwhq-2mcq-pp9q -CVE-2023-36820 - https://github.com/micronaut-projects/micronaut-security/security/advisories/GHSA-qw22-8w9r-864h -CVE-2023-36821 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96 -CVE-2023-36822 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 -CVE-2023-36828 - https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g -CVE-2023-36844 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html -CVE-2023-36844 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html -CVE-2023-36845 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html -CVE-2023-36845 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html -CVE-2023-36845 - http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html -CVE-2023-36846 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html -CVE-2023-36847 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html -CVE-2023-36864 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797 -CVE-2023-36864 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1797 -CVE-2023-3687 - https://vuldb.com/?id.234233 -CVE-2023-36874 - http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html -CVE-2023-36884 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-36887 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1747 -CVE-2023-36917 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-36918 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-36919 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-3692 - https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12 -CVE-2023-36921 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-36922 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-36924 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-36925 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html -CVE-2023-36936 - https://packetstormsecurity.com -CVE-2023-36939 - https://packetstormsecurity.com -CVE-2023-36940 - https://packetstormsecurity.com -CVE-2023-36941 - https://packetstormsecurity.com -CVE-2023-36942 - https://packetstormsecurity.com -CVE-2023-36947 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/UploadCustomModule.md -CVE-2023-36950 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/loginauth.md -CVE-2023-36954 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_3.md -CVE-2023-3696 - https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467 -CVE-2023-36968 - https://okankurtulus.com.tr/2023/06/21/food-ordering-system-v1-0-authenticated-sql-injection/ -CVE-2023-36969 - https://okankurtulus.com.tr/2023/06/26/cms-made-simple-v2-2-17-file-upload-remote-code-execution-rce-authenticated/ -CVE-2023-36970 - https://okankurtulus.com.tr/2023/06/27/cms-made-simple-v2-2-17-stored-cross-site-scripting-xss-authenticated/ -CVE-2023-37049 - https://github.com/Num-Nine/CVE/issues/1 -CVE-2023-3706 - https://wpscan.com/vulnerability/daa4d93a-f8b1-4809-a18e-8ab63a05de5a -CVE-2023-3707 - https://wpscan.com/vulnerability/541bbe4c-3295-4073-901d-763556269f48 -CVE-2023-37070 - https://github.com/InfoSecWarrior/Offensive-Payloads/blob/main/Cross-Site-Scripting-XSS-Payloads.txt -CVE-2023-3710 - https://www.honeywell.com/us/en/product-security -CVE-2023-3711 - https://www.honeywell.com/us/en/product-security -CVE-2023-3712 - https://www.honeywell.com/us/en/product-security -CVE-2023-37139 - https://github.com/chakra-core/ChakraCore/issues/6884 -CVE-2023-37140 - https://github.com/chakra-core/ChakraCore/issues/6885 -CVE-2023-37141 - https://github.com/chakra-core/ChakraCore/issues/6886 -CVE-2023-37142 - https://github.com/chakra-core/ChakraCore/issues/6887 -CVE-2023-37143 - https://github.com/chakra-core/ChakraCore/issues/6888 -CVE-2023-37144 - https://github.com/DaDong-G/Vulnerability_info/blob/main/ac10_command_injection/Readme.md -CVE-2023-37145 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/1/Readme.md -CVE-2023-37146 - https://github.com/DaDong-G/Vulnerability_info/tree/main/TOTOLINK/lr350/2 -CVE-2023-37148 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/3/README.md -CVE-2023-37149 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/4/README.md -CVE-2023-37150 - https://www.chtsecurity.com/news/57fd2fe6-11d9-421d-9087-88b4d5090452 -CVE-2023-37151 - https://www.exploit-db.com/exploits/51431 -CVE-2023-37152 - https://github.com/Trinity-SYT-SECURITY/arbitrary-file-upload-RCE/blob/main/Online%20Art%20gallery%20project%201.0.md -CVE-2023-37152 - https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20 -CVE-2023-37152 - https://www.exploit-db.com/exploits/51524 -CVE-2023-37153 - https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/KodExplorer4.51.03.md -CVE-2023-37153 - https://www.chtsecurity.com/news/13a86b33-7e49-4167-9682-7ff3f51cbcba%20 -CVE-2023-37164 - https://www.exploit-db.com/exploits/51529 -CVE-2023-37165 - https://www.exploit-db.com/exploits/51450 -CVE-2023-37170 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_1 -CVE-2023-37171 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_2 -CVE-2023-37172 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_3 -CVE-2023-37173 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_4 -CVE-2023-37174 - https://github.com/gpac/gpac/issues/2505 -CVE-2023-37177 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -CVE-2023-37192 - https://satoshihunter1.blogspot.com/2023/06/the-bitcoin-app-is-vulnerable-to-hackers.html -CVE-2023-37192 - https://www.youtube.com/watch?v=oEl4M1oZim0 -CVE-2023-3720 - https://wpscan.com/vulnerability/16375a7f-0a9f-4961-8510-d047ffbf3954 -CVE-2023-37201 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826002 -CVE-2023-37202 - https://bugzilla.mozilla.org/show_bug.cgi?id=1834711 -CVE-2023-37205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704420 -CVE-2023-37206 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813299 -CVE-2023-37207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816287 -CVE-2023-37208 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837675 -CVE-2023-3721 - https://wpscan.com/vulnerability/3f90347a-6586-4648-9f2c-d4f321bf801a -CVE-2023-37210 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821886 -CVE-2023-3725 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-3725 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3 -CVE-2023-3726 - https://fluidattacks.com/advisories/creed/ -CVE-2023-37261 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2 -CVE-2023-37262 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2 -CVE-2023-37263 - https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc -CVE-2023-37264 - https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53 -CVE-2023-37268 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-868r-97g5-r9g4 -CVE-2023-37269 - http://packetstormsecurity.com/files/173520/WinterCMS-1.2.2-Cross-Site-Scripting.html -CVE-2023-37270 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-934w-qj9p-3qcx -CVE-2023-37279 - https://github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv -CVE-2023-37298 - https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83 -CVE-2023-37298 - https://github.com/laurent22/joplin/releases/tag/v2.11.5 -CVE-2023-37299 - https://github.com/laurent22/joplin/commit/9e90d9016daf79b5414646a93fd369aedb035071 -CVE-2023-37299 - https://github.com/laurent22/joplin/releases/tag/v2.11.5 -CVE-2023-37302 - https://phabricator.wikimedia.org/T339111 -CVE-2023-37304 - https://phabricator.wikimedia.org/T323651 -CVE-2023-37305 - https://phabricator.wikimedia.org/T326952 -CVE-2023-37306 - https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle -CVE-2023-37307 - http://packetstormsecurity.com/files/176975/MISP-2.4.171-Cross-Site-Scripting.html -CVE-2023-3732 - http://packetstormsecurity.com/files/174223/Chrome-IPCZ-FragmentDescriptors-Missing-Validation.html -CVE-2023-37361 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=32305 -CVE-2023-37456 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795496 -CVE-2023-3746 - https://wpscan.com/vulnerability/c15a6032-6495-47a8-828c-37e55ed9665a -CVE-2023-37460 - https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m -CVE-2023-37461 - https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v -CVE-2023-37463 - https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5 -CVE-2023-37466 - https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5 -CVE-2023-37474 - http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html -CVE-2023-37474 - https://github.com/9001/copyparty/security/advisories/GHSA-pxfv-7rr3-2qjg -CVE-2023-37475 - https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45 -CVE-2023-37477 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5 -CVE-2023-37478 - https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7 -CVE-2023-3752 - https://vuldb.com/?id.234422 -CVE-2023-37543 - https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed -CVE-2023-37569 - http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html -CVE-2023-37581 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-37596 - https://github.com/sahiloj/CVE-2023-37596/blob/main/README.md -CVE-2023-37597 - https://github.com/sahiloj/CVE-2023-37597/blob/main/README.md -CVE-2023-37598 - https://github.com/sahiloj/CVE-2023-37598 -CVE-2023-37600 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html -CVE-2023-37601 - https://packetstormsecurity.com/files/173146/Office-Suite-Premium-10.9.1.42602-Local-File-Inclusion.html -CVE-2023-37602 - https://www.exploit-db.com/exploits/51564 -CVE-2023-37605 - https://medium.com/@david_42/complex-password-vs-buffer-overflow-and-the-winner-is-decbc56db5e3 -CVE-2023-37607 - https://github.com/CQURE/CVEs/blob/main/CVE-2023-37607/README.md -CVE-2023-37608 - https://github.com/CQURE/CVEs/tree/main/CVE-2023-37608 -CVE-2023-3761 - https://vuldb.com/?id.234446 -CVE-2023-3761 - https://youtu.be/bMJwSCps0Lc -CVE-2023-37611 - https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b -CVE-2023-37627 - https://gist.github.com/1337kid/d3e7702bd19cc9355a6b3f153eb2fe8e -CVE-2023-37628 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37628 -CVE-2023-37629 - http://packetstormsecurity.com/files/173656/Online-Piggery-Management-System-1.0-Shell-Upload.html -CVE-2023-37629 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37629 -CVE-2023-37630 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37630 -CVE-2023-37644 - https://github.com/matthiaskramm/swftools/issues/202 -CVE-2023-37649 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/ -CVE-2023-3765 - https://huntr.dev/bounties/4be5fd63-8a0a-490d-9ee1-f33dc768ed76 -CVE-2023-37650 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/ -CVE-2023-37679 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html -CVE-2023-37679 - https://www.ihteam.net/advisory/mirth-connect -CVE-2023-37683 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37683.txt -CVE-2023-37684 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37684.txt -CVE-2023-37685 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37685.txt -CVE-2023-37686 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37686.txt -CVE-2023-37687 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37687.txt -CVE-2023-37688 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37688.txt -CVE-2023-37689 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37689.txt -CVE-2023-37690 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37690.txt -CVE-2023-37692 - https://okankurtulus.com.tr/2023/07/24/october-cms-v3-4-4-stored-cross-site-scripting-xss-authenticated/ -CVE-2023-3771 - https://wpscan.com/vulnerability/7c6fc499-de09-4874-ab96-bdc24d550cfb/ -CVE-2023-37710 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetWirelessRepeat -CVE-2023-37711 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/saveParentControlInfo -CVE-2023-37712 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetIpBind -CVE-2023-37714 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromRouteStatic/report.md -CVE-2023-37715 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fmL7ProtForm/reprot.md -CVE-2023-37716 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromNatStaticSetting/report.md -CVE-2023-37717 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.md -CVE-2023-37718 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeClientFilter/report.md -CVE-2023-37719 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromP2pListFilter/report.md -CVE-2023-3772 - http://www.openwall.com/lists/oss-security/2023/08/10/1 -CVE-2023-3772 - https://bugzilla.redhat.com/show_bug.cgi?id=2218943 -CVE-2023-37721 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeMacFilter/report.md -CVE-2023-37722 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeUrlFilter/report.md -CVE-2023-37723 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromqossetting/report.md -CVE-2023-37728 - http://icewarp.com -CVE-2023-3773 - https://bugzilla.redhat.com/show_bug.cgi?id=2218944 -CVE-2023-37732 - https://github.com/yasm/yasm/issues/233 -CVE-2023-37734 - https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911 -CVE-2023-37734 - https://www.exploit-db.com/exploits/10374 -CVE-2023-37748 - https://github.com/miniupnp/ngiflib/issues/25 -CVE-2023-37758 - https://hackmd.io/@pSgS7xsnS5a4K7Y0yiB43g/rJr8oNn_n -CVE-2023-37759 - https://packetstormsecurity.com/files/174240/Crypto-Currency-Tracker-CCT-9.5-Add-Administrator.html -CVE-2023-3776 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-3776 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-37765 - https://github.com/gpac/gpac/issues/2515 -CVE-2023-37766 - https://github.com/gpac/gpac/issues/2516 -CVE-2023-37767 - https://github.com/gpac/gpac/issues/2514 -CVE-2023-3777 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-3777 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-37770 - https://github.com/grame-cncm/faust/issues/922 -CVE-2023-37785 - https://github.com/CrownZTX/cve-description -CVE-2023-37786 - https://github.com/CrownZTX/reflectedxss1 -CVE-2023-37787 - https://github.com/CrownZTX/storedXSS -CVE-2023-37790 - https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html -CVE-2023-37791 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-619L/overflow -CVE-2023-37793 - https://github.com/PwnYouLin/IOT_vul/blob/main/wayos/2/readme.md -CVE-2023-37794 - https://github.com/PwnYouLin/IOT_vul/tree/main/wayos/1 -CVE-2023-37798 - https://www.cyderes.com/blog/cve-2023-37798-stored-cross-site-scripting-in-vanderbilt-redcap/ -CVE-2023-3782 - https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/ -CVE-2023-3783 - https://seclists.org/fulldisclosure/2023/Jul/38 -CVE-2023-3783 - https://www.vulnerability-lab.com/get_content.php?id=2321 -CVE-2023-37831 - https://github.com/strik3r0x1/Vulns/blob/main/User%20enumeration%20-%20Elenos.md -CVE-2023-37832 - https://github.com/strik3r0x1/Vulns/blob/main/Lack%20of%20resources%20and%20rate%20limiting%20-%20Elenos.md -CVE-2023-37833 - https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to%20access%20Traps%20configurations.md -CVE-2023-37836 - https://github.com/thorfdbg/libjpeg/issues/87#BUG1 -CVE-2023-37837 - https://github.com/thorfdbg/libjpeg/issues/87#BUG0 -CVE-2023-3784 - https://seclists.org/fulldisclosure/2023/Jul/37 -CVE-2023-3784 - https://www.vulnerability-lab.com/get_content.php?id=2317 -CVE-2023-37849 - https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/ -CVE-2023-3785 - https://seclists.org/fulldisclosure/2023/Jul/39 -CVE-2023-3785 - https://www.vulnerability-lab.com/get_content.php?id=2285 -CVE-2023-3786 - https://seclists.org/fulldisclosure/2023/Jul/40 -CVE-2023-3786 - https://www.vulnerability-lab.com/get_content.php?id=2323 -CVE-2023-3787 - https://seclists.org/fulldisclosure/2023/Jul/35 -CVE-2023-3787 - https://vuldb.com/?id.235054 -CVE-2023-3787 - https://www.vulnerability-lab.com/get_content.php?id=2276 -CVE-2023-3788 - https://seclists.org/fulldisclosure/2023/Jul/34 -CVE-2023-3788 - https://www.vulnerability-lab.com/get_content.php?id=2278 -CVE-2023-3789 - https://seclists.org/fulldisclosure/2023/Jul/36 -CVE-2023-3789 - https://www.vulnerability-lab.com/get_content.php?id=2286 -CVE-2023-37895 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-3790 - https://seclists.org/fulldisclosure/2023/Jul/33 -CVE-2023-3790 - https://www.vulnerability-lab.com/get_content.php?id=2274 -CVE-2023-37900 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf -CVE-2023-37903 - https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4 -CVE-2023-37907 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-9c9p-c3mg-hpjq -CVE-2023-37910 - https://jira.xwiki.org/browse/XWIKI-20334 -CVE-2023-37915 - https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9 -CVE-2023-37916 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h -CVE-2023-37917 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r -CVE-2023-37918 - https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj -CVE-2023-37927 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ -CVE-2023-37928 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ -CVE-2023-37941 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html -CVE-2023-3797 - https://github.com/segonse/cve/blob/main/sichuang/sichuang.md -CVE-2023-37979 - http://packetstormsecurity.com/files/173983/WordPress-Ninja-Forms-3.6.25-Cross-Site-Scripting.html -CVE-2023-3798 - https://github.com/RCEraser/cve/blob/main/wanjiang.md -CVE-2023-37988 - http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html -CVE-2023-3801 - https://vuldb.com/?id.235069 -CVE-2023-3802 - https://github.com/GUIqizsq/cve/blob/main/upload_1.md -CVE-2023-3802 - https://vuldb.com/?id.235070 -CVE-2023-38022 - https://jovanbulck.github.io/files/ccs19-tale.pdf -CVE-2023-38035 - http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html -CVE-2023-3804 - https://github.com/yueying638/cve/blob/main/upload.md -CVE-2023-38043 - https://northwave-cybersecurity.com/vulnerability-notice/arbitrary-kernel-function-call-in-ivanti-secure-access-client -CVE-2023-3811 - https://vuldb.com/?id.235079 -CVE-2023-38127 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808 -CVE-2023-38127 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1808 -CVE-2023-38128 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809 -CVE-2023-38128 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809 -CVE-2023-38139 - http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html -CVE-2023-3814 - https://wpscan.com/vulnerability/ca954ec6-6ebd-4d72-a323-570474e2e339 -CVE-2023-38140 - http://packetstormsecurity.com/files/175108/Microsoft-Windows-Kernel-Paged-Pool-Memory-Disclosure.html -CVE-2023-38141 - http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html -CVE-2023-38146 - http://packetstormsecurity.com/files/176391/Themebleed-Windows-11-Themes-Arbitrary-Code-Execution.html -CVE-2023-38154 - http://packetstormsecurity.com/files/174568/Microsoft-Windows-Kernel-Recovery-Memory-Corruption.html -CVE-2023-3817 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-3819 - https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c -CVE-2023-38190 - https://herolab.usd.de/security-advisories/usd-2023-0014/ -CVE-2023-38191 - https://herolab.usd.de/security-advisories/usd-2023-0012/ -CVE-2023-38192 - https://herolab.usd.de/security-advisories/usd-2023-0011/ -CVE-2023-38193 - https://herolab.usd.de/en/security-advisories/usd-2023-0015/ -CVE-2023-38194 - https://herolab.usd.de/security-advisories/usd-2023-0013/ -CVE-2023-3820 - https://huntr.dev/bounties/b00a38b6-d040-494d-bf46-38f46ac1a1db -CVE-2023-38203 - https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html -CVE-2023-3821 - https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa -CVE-2023-3822 - https://huntr.dev/bounties/2a3a13fe-2a9a-4d1a-8814-fd8ed1e3b1d5 -CVE-2023-3823 - https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr -CVE-2023-3824 - https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv -CVE-2023-38252 - https://github.com/tats/w3m/issues/270 -CVE-2023-38253 - https://github.com/tats/w3m/issues/271 -CVE-2023-38286 - https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI -CVE-2023-3830 - https://vuldb.com/?id.235151 -CVE-2023-38328 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2023-38334 - http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html -CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/42 -CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-38334 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt -CVE-2023-38335 - http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html -CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/41 -CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-38335 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt -CVE-2023-38346 - https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ -CVE-2023-38351 - https://0dr3f.github.io/cve/ -CVE-2023-38352 - https://0dr3f.github.io/cve/ -CVE-2023-38353 - https://0dr3f.github.io/cve/ -CVE-2023-38354 - https://0dr3f.github.io/cve/ -CVE-2023-38355 - https://0dr3f.github.io/cve/ -CVE-2023-38356 - https://0dr3f.github.io/cve/ -CVE-2023-38357 - http://packetstormsecurity.com/files/173609/RWS-WorldServer-11.7.3-Session-Token-Enumeration.html -CVE-2023-38357 - http://seclists.org/fulldisclosure/2023/Jul/30 -CVE-2023-38357 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-001/-session-token-enumeration-in-rws-worldserver -CVE-2023-38378 - https://news.ycombinator.com/item?id=36745664 -CVE-2023-38378 - https://tortel.li/post/insecure-scope/ -CVE-2023-38379 - https://news.ycombinator.com/item?id=36745664 -CVE-2023-38379 - https://tortel.li/post/insecure-scope/ -CVE-2023-38403 - https://github.com/esnet/iperf/issues/1542 -CVE-2023-38408 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html -CVE-2023-38408 - https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent -CVE-2023-38408 - https://news.ycombinator.com/item?id=36790196 -CVE-2023-38409 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12 -CVE-2023-3843 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-3843 - https://vuldb.com/?id.235194 -CVE-2023-38434 - https://github.com/cozis/xHTTP/issues/1 -CVE-2023-38435 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-3844 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-3844 - https://vuldb.com/?id.235195 -CVE-2023-3845 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-3846 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-3847 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-3848 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-38487 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg -CVE-2023-3849 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -CVE-2023-38495 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf -CVE-2023-38501 - http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html -CVE-2023-38501 - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh -CVE-2023-38502 - https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf -CVE-2023-38507 - https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r -CVE-2023-3853 - https://vuldb.com/?id.235205 -CVE-2023-38543 - https://northwave-cybersecurity.com/vulnerability-notice/denial-of-service-in-ivanti-secure-access-client-driver -CVE-2023-38573 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839 -CVE-2023-38617 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html -CVE-2023-38633 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-38633 - https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/ -CVE-2023-38646 - http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html -CVE-2023-38646 - http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html -CVE-2023-38666 - https://github.com/axiomatic-systems/Bento4/issues/784 -CVE-2023-38669 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md -CVE-2023-38670 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md -CVE-2023-38671 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md -CVE-2023-38672 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md -CVE-2023-38673 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md -CVE-2023-38674 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md -CVE-2023-38675 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md -CVE-2023-38676 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md -CVE-2023-38677 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md -CVE-2023-38678 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md -CVE-2023-38687 - https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq -CVE-2023-38688 - https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx -CVE-2023-38698 - https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3 -CVE-2023-38701 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18 -CVE-2023-38701 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6 -CVE-2023-38702 - https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc -CVE-2023-3878 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2010.pdf -CVE-2023-38817 - https://ioctl.fail/echo-ac-writeup/ -CVE-2023-3882 - https://vuldb.com/?id.235244 -CVE-2023-38823 - https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md -CVE-2023-38829 - https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E -CVE-2023-3883 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2015.pdf -CVE-2023-38831 - http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html -CVE-2023-38831 - https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ -CVE-2023-38836 - http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html -CVE-2023-3884 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2016.pdf -CVE-2023-38840 - https://github.com/bitwarden/clients/pull/5813 -CVE-2023-38840 - https://github.com/markuta/bw-dump -CVE-2023-38840 - https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/ -CVE-2023-38843 - https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1 -CVE-2023-38844 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -CVE-2023-38861 - https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3 -CVE-2023-38862 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject1 -CVE-2023-38863 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject4 -CVE-2023-38864 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject3 -CVE-2023-38865 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject5 -CVE-2023-38866 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2 -CVE-2023-3887 - https://vuldb.com/?id.235249 -CVE-2023-38870 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38870 -CVE-2023-38872 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38872 -CVE-2023-38874 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38874 -CVE-2023-38876 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38876 -CVE-2023-38879 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38879 -CVE-2023-38882 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38882 -CVE-2023-38886 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38886_Dolibarr_RCE-1.pdf -CVE-2023-38888 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38888_Dolibarr_XSS.pdf -CVE-2023-38890 - https://github.com/akshadjoshi/CVE-2023-38890 -CVE-2023-38891 - https://github.com/jselliott/CVE-2023-38891 -CVE-2023-38902 - https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37 -CVE-2023-38904 - https://www.exploit-db.com/exploits/51576 -CVE-2023-38905 - https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642 -CVE-2023-3891 - https://fluidattacks.com/advisories/aerosmith -CVE-2023-38910 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md -CVE-2023-38911 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38911/Readme.md -CVE-2023-38912 - https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html -CVE-2023-38921 - https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler -CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727 -CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727/issues/160 -CVE-2023-38947 - https://gitee.com/CTF-hacker/pwn/issues/I7LH2N -CVE-2023-38948 - https://gitee.com/CTF-hacker/pwn/issues/I7LI4E -CVE-2023-3896 - https://github.com/vim/vim/issues/12528 -CVE-2023-38960 - https://rodelllemit.medium.com/insecure-permissions-vulnerability-in-raidenftpd-v2-4-build-4005-2016-04-01-ea7389be3d33 -CVE-2023-38961 - https://github.com/jerryscript-project/jerryscript/issues/5092 -CVE-2023-38965 - http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html -CVE-2023-38969 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books -CVE-2023-3897 - http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html -CVE-2023-38970 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-new-member -CVE-2023-38971 - https://panda002.hashnode.dev/badaso-version-297-has-xss-vulnerability-in-add-ranks -CVE-2023-38973 - https://github.com/anh91/uasoft-indonesia--badaso/blob/main/xss5.md -CVE-2023-38975 - https://github.com/qdrant/qdrant/issues/2268 -CVE-2023-38996 - https://gist.github.com/RNPG/53b579da330ba896aa8dc2d901e5e400 -CVE-2023-38997 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-38998 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-38999 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-3900 - https://gitlab.com/gitlab-org/gitlab/-/issues/418770 -CVE-2023-39000 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39001 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39002 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39003 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39004 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39005 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39006 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39007 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39008 - https://logicaltrust.net/blog/2023/08/opnsense.html -CVE-2023-39010 - https://github.com/lessthanoptimal/BoofCV/issues/406 -CVE-2023-39017 - https://github.com/quartz-scheduler/quartz/issues/943 -CVE-2023-39026 - http://packetstormsecurity.com/files/174491/FileMage-Gateway-1.10.9-Local-File-Inclusion.html -CVE-2023-39026 - https://raindayzz.com/technicalblog/2023/08/20/FileMage-Vulnerability.html -CVE-2023-3904 - https://gitlab.com/gitlab-org/gitlab/-/issues/418226 -CVE-2023-39063 - https://github.com/AndreGNogueira/CVE-2023-39063 -CVE-2023-39070 - https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/ -CVE-2023-39073 - https://gist.github.com/ph4nt0mbyt3/9456312e867c10de8f808250ec0b12d3 -CVE-2023-39075 - https://blog.dhjeong.kr/posts/automotive/2023/12/how-to-fuzzing-realcars/ -CVE-2023-39075 - https://blog.dhjeong.kr/posts/vuln/202307/renault-zoe/ -CVE-2023-39075 - https://blog.jhyeon.dev/posts/vuln/202307/renault-zoe/ -CVE-2023-39076 - https://blog.dhjeong.kr/posts/vuln/202307/gm-chevrolet/ -CVE-2023-39076 - https://blog.jhyeon.dev/posts/vuln/202307/gm-chevrolet/ -CVE-2023-39107 - https://www.ns-echo.com/posts/nomachine_afo.html -CVE-2023-39108 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_b.md -CVE-2023-39109 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_a.md -CVE-2023-39110 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_%20ajaxGetFileByPath.md -CVE-2023-39113 - https://github.com/miniupnp/ngiflib/issues/27 -CVE-2023-39114 - https://github.com/miniupnp/ngiflib/issues/29 -CVE-2023-39115 - http://packetstormsecurity.com/files/173950/Campcodes-Online-Matrimonial-Website-System-3.3-Cross-Site-Scripting.html -CVE-2023-39115 - https://github.com/Raj789-sec/CVE-2023-39115 -CVE-2023-39115 - https://www.exploit-db.com/exploits/51656 -CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1 -CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1#issue-1817133689 -CVE-2023-39122 - https://github.com/DojoSecurity/BMC-Control-M-Unauthenticated-SQL-Injection -CVE-2023-39125 - https://github.com/LMP88959/NTSC-CRT/issues/32 -CVE-2023-39135 - https://blog.ostorlab.co/zip-packages-exploitation.html -CVE-2023-39136 - https://blog.ostorlab.co/zip-packages-exploitation.html -CVE-2023-39136 - https://github.com/ZipArchive/ZipArchive/issues/680 -CVE-2023-39137 - https://blog.ostorlab.co/zip-packages-exploitation.html -CVE-2023-39137 - https://github.com/brendan-duncan/archive/issues/266 -CVE-2023-39138 - https://blog.ostorlab.co/zip-packages-exploitation.html -CVE-2023-39139 - https://blog.ostorlab.co/zip-packages-exploitation.html -CVE-2023-3914 - https://gitlab.com/gitlab-org/gitlab/-/issues/418115 -CVE-2023-39141 - https://gist.github.com/JafarAkhondali/528fe6c548b78f454911fb866b23f66e -CVE-2023-39143 - https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/ -CVE-2023-39147 - http://packetstormsecurity.com/files/173878/Uvdesk-1.1.3-Shell-Upload.html -CVE-2023-39167 - https://seclists.org/fulldisclosure/2023/Nov/5 -CVE-2023-39169 - https://seclists.org/fulldisclosure/2023/Nov/3 -CVE-2023-3917 - https://gitlab.com/gitlab-org/gitlab/-/issues/417896 -CVE-2023-39171 - https://seclists.org/fulldisclosure/2023/Nov/2 -CVE-2023-39172 - https://seclists.org/fulldisclosure/2023/Nov/4 -CVE-2023-3920 - https://gitlab.com/gitlab-org/gitlab/-/issues/417481 -CVE-2023-39265 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html -CVE-2023-3932 - https://gitlab.com/gitlab-org/gitlab/-/issues/417594 -CVE-2023-39325 - https://go.dev/issue/63417 -CVE-2023-39341 - https://www.sourcenext.com/support/i/2023/230718_01 -CVE-2023-39350 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh -CVE-2023-39351 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq -CVE-2023-39352 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj -CVE-2023-39353 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f -CVE-2023-39354 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6 -CVE-2023-39355 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h -CVE-2023-39356 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m -CVE-2023-39357 - https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg -CVE-2023-39358 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g -CVE-2023-39359 - https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h -CVE-2023-3936 - https://wpscan.com/vulnerability/6d09a5d3-046d-47ef-86b4-c024ea09dc0f -CVE-2023-39360 - https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4 -CVE-2023-39361 - https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg -CVE-2023-39362 - http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html -CVE-2023-39362 - https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp -CVE-2023-39364 - https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x -CVE-2023-39365 - https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22 -CVE-2023-39366 - https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv -CVE-2023-39420 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/ -CVE-2023-39421 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained -CVE-2023-39422 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained -CVE-2023-39423 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained -CVE-2023-39424 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained -CVE-2023-39443 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826 -CVE-2023-39444 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826 -CVE-2023-39453 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1830 -CVE-2023-3946 - https://kcm.trellix.com/corporate/index?page=content&id=SB10402 -CVE-2023-39508 - http://seclists.org/fulldisclosure/2023/Jul/43 -CVE-2023-39510 - https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h -CVE-2023-39511 - https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42 -CVE-2023-39512 - https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7 -CVE-2023-39513 - https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2 -CVE-2023-39514 - https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7 -CVE-2023-39515 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h -CVE-2023-39516 - https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv -CVE-2023-39520 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-62gx-54j7-mjh3 -CVE-2023-39523 - https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f -CVE-2023-39534 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-fcr6-x23w-94wp -CVE-2023-3954 - https://wpscan.com/vulnerability/b463ccbb-2dc1-479f-bc88-becd204b2dc0 -CVE-2023-39542 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832 -CVE-2023-39551 - https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/Online%20Security%20Guards%20Hiring%20System%201.0.md -CVE-2023-39551 - https://www.chtsecurity.com/news/0dbe8e1d-0a6c-4604-9cf1-778ddc86a8c1 -CVE-2023-39558 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39558.md -CVE-2023-39559 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39559.md -CVE-2023-39560 - https://github.com/Luci4n555/cve_ectouch -CVE-2023-39562 - https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8 -CVE-2023-39562 - https://github.com/gpac/gpac/issues/2537 -CVE-2023-39578 - https://panda002.hashnode.dev/a-stored-cross-site-scripting-xss-vulnerability-in-the-create-the-function-of-zenario-cms-v94 -CVE-2023-39584 - https://www.gem-love.com/2023/07/25/hexo%E5%8D%9A%E5%AE%A2%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E5%92%8C%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/#undefined -CVE-2023-39598 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-39598-9598b92da49c -CVE-2023-39599 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-39599/Readme.md -CVE-2023-39600 - https://icewarp.com -CVE-2023-39610 - https://github.com/zn9988/publications/tree/main/1.TP-Link%20Tapo%20C100%20-%20HTTP%20Denial-Of-Service -CVE-2023-39611 - https://medium.com/@arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9 -CVE-2023-39612 - https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/ -CVE-2023-39612 - https://github.com/filebrowser/filebrowser/issues/2570 -CVE-2023-39615 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 -CVE-2023-39619 - https://gist.github.com/6en6ar/712a4c1eab0324f15e09232c77ea08f8 -CVE-2023-39631 - https://github.com/langchain-ai/langchain/issues/8363 -CVE-2023-39631 - https://github.com/pydata/numexpr/issues/442 -CVE-2023-39639 - https://security.friendsofpresta.org/modules/2023/08/31/leoblog.html -CVE-2023-3964 - https://gitlab.com/gitlab-org/gitlab/-/issues/419857 -CVE-2023-39641 - https://security.friendsofpresta.org/modules/2023/08/31/psaffiliate.html -CVE-2023-39642 - https://security.friendsofpresta.org/modules/2023/08/29/cartsguru.html -CVE-2023-39643 - https://security.friendsofpresta.org/modules/2023/08/29/xmlfeeds.html -CVE-2023-39654 - https://github.com/Leeyangee/leeya_bug/blob/main/%5BWarning%5DSQL%20Injection%20in%20abupy%20%3C=%20v0.4.0.md -CVE-2023-39659 - https://github.com/langchain-ai/langchain/issues/7700 -CVE-2023-39660 - https://github.com/gventuri/pandas-ai/issues/399 -CVE-2023-39661 - https://github.com/gventuri/pandas-ai/issues/410 -CVE-2023-39662 - https://github.com/jerryjliu/llama_index/issues/7054 -CVE-2023-39675 - https://blog.sorcery.ie/posts/simpleimportproduct_sqli/ -CVE-2023-39676 - https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/ -CVE-2023-39677 - https://blog.sorcery.ie/posts/myprestamodules_phpinfo/ -CVE-2023-39681 - https://github.com/yanbochen97/CuppaCMS_RCE -CVE-2023-39683 - https://medium.com/@vificatem/cve-2023-39683-dom-xss-on-json-source-code-panel-in-zalify-easy-email-3fa08f3e0d49 -CVE-2023-39685 - https://github.com/hjson/hjson-java/issues/27 -CVE-2023-39695 - https://github.com/strik3r0x1/Vulns/blob/35fe4fb3d5945b5df2a87aab0cf9ec6137bcf976/Insufficient%20Session%20Expiration%20-%20Elenos.md -CVE-2023-39699 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion -CVE-2023-3970 - https://vuldb.com/?id.235569 -CVE-2023-39726 - https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50 -CVE-2023-39741 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 -CVE-2023-39741 - https://github.com/ckolivas/lrzip/issues/246 -CVE-2023-39741 - https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow -CVE-2023-39742 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 -CVE-2023-39743 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 -CVE-2023-39743 - https://github.com/huanglei3/lrzip-next-poc/tree/main -CVE-2023-39743 - https://github.com/pete4abw/lrzip-next/issues/132 -CVE-2023-39777 - https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c -CVE-2023-39785 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/2 -CVE-2023-39786 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/3 -CVE-2023-3979 - https://gitlab.com/gitlab-org/gitlab/-/issues/419972 -CVE-2023-3980 - https://huntr.dev/bounties/6eb3cb9a-5c78-451f-ae76-0b1e62fe5e54 -CVE-2023-3981 - https://huntr.dev/bounties/f5018226-0063-415d-9675-d7e30934ff78 -CVE-2023-39810 - https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/ -CVE-2023-3982 - https://huntr.dev/bounties/e5e889ee-5947-4c2a-a72e-9c90e2e2a845 -CVE-2023-39827 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formAddMacfilterRule -CVE-2023-39828 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formWifiBasicSet -CVE-2023-39829 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/fromSetWirelessRepeat -CVE-2023-3983 - https://www.tenable.com/security/research/tra-2023-24 -CVE-2023-39834 - https://github.com/Pbootcms/Pbootcms/issues/8 -CVE-2023-3986 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/Stored%20XSS -CVE-2023-3987 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/SQL%20Injection -CVE-2023-39908 - https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/ -CVE-2023-39909 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2023-39910 - https://news.ycombinator.com/item?id=37054862 -CVE-2023-3992 - https://wpscan.com/vulnerability/c43b669f-0377-4402-833c-817b75001888 -CVE-2023-39928 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831 -CVE-2023-39945 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9 -CVE-2023-39946 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx -CVE-2023-39947 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv -CVE-2023-39948 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-x9pj-vrgf-f68f -CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/issues/3236 -CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg -CVE-2023-39951 - https://github.com/open-telemetry/opentelemetry-java-instrumentation/security/advisories/GHSA-hghr-r469-gfq6 -CVE-2023-39964 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5 -CVE-2023-39965 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 -CVE-2023-39966 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4 -CVE-2023-39967 - https://github.com/wiremock/wiremock/security/advisories/GHSA-676j-xrv3-73vc -CVE-2023-39979 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities -CVE-2023-39980 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities -CVE-2023-39981 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities -CVE-2023-39982 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities -CVE-2023-39983 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities -CVE-2023-40013 - https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8 -CVE-2023-40021 - https://github.com/oppia/oppia/security/advisories/GHSA-49jp-pjc3-2532 -CVE-2023-40024 - https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj -CVE-2023-40031 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ -CVE-2023-40035 - https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw -CVE-2023-40036 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ -CVE-2023-4004 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-4004 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-40044 - http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html -CVE-2023-40044 - https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044 -CVE-2023-40044 - https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044 -CVE-2023-40044 - https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/ -CVE-2023-40044 - https://www.theregister.com/2023/10/02/ws_ftp_update/ -CVE-2023-4005 - https://huntr.dev/bounties/f0aacce1-79bc-4765-95f1-7e824433b9e4 -CVE-2023-4007 - https://huntr.dev/bounties/e891dcbc-2092-49d3-9518-23e37187a5ea -CVE-2023-40085 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/ed6ee1f7eca7b33160e36ac6d730a9ef395ca4f1 -CVE-2023-40121 - https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253 -CVE-2023-40123 - https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9 -CVE-2023-4013 - https://wpscan.com/vulnerability/54e4494c-a280-4d91-803d-7d55159cdbc5 -CVE-2023-40133 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40134 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40135 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40136 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40137 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40138 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40139 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -CVE-2023-40163 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836 -CVE-2023-40164 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ -CVE-2023-40166 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ -CVE-2023-40178 - https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw -CVE-2023-40181 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8 -CVE-2023-40186 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v -CVE-2023-40187 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f -CVE-2023-40188 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq -CVE-2023-4019 - https://wpscan.com/vulnerability/0d323b07-c6e7-4aba-85bc-64659ad0c85d -CVE-2023-40194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833 -CVE-2023-4022 - https://wpscan.com/vulnerability/c4ac0b19-58b1-4620-b3b7-fbe6dd6c8dd5 -CVE-2023-4023 - https://wpscan.com/vulnerability/682c0226-28bd-4051-830d-8b679626213d -CVE-2023-40238 - https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html -CVE-2023-40274 - https://github.com/getzola/zola/issues/2257 -CVE-2023-40280 - https://github.com/BugBountyHunterCVE/CVE-2023-40280/blob/main/CVE-2023-40280_Authenticated-Directory-Path-Traversal_OpenClinic-GA_5.247.01_Report.md -CVE-2023-40283 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-40283 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-40291 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ -CVE-2023-40292 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ -CVE-2023-40293 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ -CVE-2023-40305 - https://savannah.gnu.org/bugs/index.php?64503 -CVE-2023-4033 - https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321 -CVE-2023-4035 - https://wpscan.com/vulnerability/8fd9192a-2d08-4127-adcd-87fb1ea8d6fc -CVE-2023-4036 - https://wpscan.com/vulnerability/de3e1718-c358-4510-b142-32896ffeb03f -CVE-2023-40361 - https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md -CVE-2023-40362 - https://github.com/ally-petitt/CVE-2023-40362 -CVE-2023-4039 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf -CVE-2023-40459 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs -CVE-2023-40461 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs -CVE-2023-40462 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs -CVE-2023-40463 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs -CVE-2023-40464 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs -CVE-2023-40465 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs -CVE-2023-4047 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839073 -CVE-2023-4051 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821884 -CVE-2023-40519 - https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa -CVE-2023-4052 - https://bugzilla.mozilla.org/show_bug.cgi?id=1824420 -CVE-2023-4053 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839079 -CVE-2023-4054 - https://bugzilla.mozilla.org/show_bug.cgi?id=1840777 -CVE-2023-40567 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp -CVE-2023-40569 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp -CVE-2023-40574 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw -CVE-2023-40575 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v -CVE-2023-40576 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2 -CVE-2023-40586 - https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h -CVE-2023-40589 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x -CVE-2023-4059 - https://wpscan.com/vulnerability/fc719d12-2f58-4d1f-b696-0f937e706842 -CVE-2023-40590 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4 -CVE-2023-4060 - https://wpscan.com/vulnerability/88745c9b-1c20-4004-89f6-d9ee223651f2 -CVE-2023-40610 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f678-j579-4xf5 -CVE-2023-40660 - http://www.openwall.com/lists/oss-security/2023/12/13/2 -CVE-2023-40660 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 -CVE-2023-40661 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 -CVE-2023-40748 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40749 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40750 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40751 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40752 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40753 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40754 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40755 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40756 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40757 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40758 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40759 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40760 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40761 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40762 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40763 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40764 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40765 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40766 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40767 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -CVE-2023-40779 - https://medium.com/@muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710 -CVE-2023-40781 - https://github.com/libming/libming/issues/288 -CVE-2023-40791 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 -CVE-2023-40796 - https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2 -CVE-2023-40797 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_4781A4 -CVE-2023-40798 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/formSetIPv6status-formGetWanParameter -CVE-2023-40799 - https://github.com/lst-oss/Vulnerability/blob/main/Tenda/AC23/sub_450A4C -CVE-2023-40800 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time -CVE-2023-40801 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_451784 -CVE-2023-40802 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/get_parentControl_list_Info -CVE-2023-40809 - https://www.esecforte.com/cve-2023-40809-html-injection-search/ -CVE-2023-40810 - https://www.esecforte.com/cve-2023-40810-html-injection-product-creation/ -CVE-2023-40812 - https://www.esecforte.com/cve-2023-40812-html-injection-accounts-group/ -CVE-2023-40813 - https://www.esecforte.com/cve-2023-40813-html-injection-saved-search/ -CVE-2023-40814 - https://www.esecforte.com/cve-2023-40814-html-injection-accounts/ -CVE-2023-40815 - https://www.esecforte.com/cve-2023-40815-html-injection-category/ -CVE-2023-40816 - https://www.esecforte.com/cve-2023-40816-html-injection-activity-milestone/ -CVE-2023-40817 - https://www.esecforte.com/cve-2023-40817-html-injection-product-configuration/ -CVE-2023-40829 - https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9 -CVE-2023-40834 - https://packetstormsecurity.com/files/174525/OpenCart-CMS-4.0.2.2-Brute-Force.html -CVE-2023-40843 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/8/8.md -CVE-2023-40845 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/14/14.md -CVE-2023-40847 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/12/12.md -CVE-2023-40851 - https://www.exploit-db.com/exploits/51694 -CVE-2023-40852 - https://www.exploit-db.com/exploits/51695 -CVE-2023-40857 - https://github.com/VirusTotal/yara/issues/1945 -CVE-2023-40868 - https://github.com/MinoTauro2020/CVE-2023-40868 -CVE-2023-40869 - https://github.com/MinoTauro2020/CVE-2023-40869 -CVE-2023-40889 - https://hackmd.io/@cspl/B1ZkFZv23 -CVE-2023-40890 - https://hackmd.io/@cspl/H1PxPAUnn -CVE-2023-40942 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md -CVE-2023-40953 - https://gist.github.com/ChubbyZ/e1e5c1858c389334dcf581a19c741308 -CVE-2023-40954 - https://github.com/luvsn/OdZoo/tree/main/exploits/web_progress -CVE-2023-40955 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2 -CVE-2023-40956 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_job_search -CVE-2023-40957 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/3 -CVE-2023-40958 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1 -CVE-2023-40968 - https://github.com/hzeller/timg/issues/115 -CVE-2023-40969 - https://github.com/slims/slims9_bulian/issues/204 -CVE-2023-40970 - https://github.com/slims/slims9_bulian/issues/205 -CVE-2023-41000 - https://github.com/gpac/gpac/issues/2550 -CVE-2023-41011 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4 -CVE-2023-41012 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws -CVE-2023-41013 - https://medium.com/@katikitala.sushmitha078/cve-2023-41013-789841dcad91 -CVE-2023-41036 - https://github.com/macvim-dev/macvim/security/advisories/GHSA-9jgj-jfwg-99fv -CVE-2023-4104 - https://github.com/mozilla-mobile/mozilla-vpn-client/pull/7110 -CVE-2023-41040 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c -CVE-2023-41041 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3fqm-frhg-7c85 -CVE-2023-41045 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3 -CVE-2023-41054 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf -CVE-2023-41055 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc -CVE-2023-4109 - https://wpscan.com/vulnerability/558e06ab-704b-4bb1-ba7f-b5f6bbbd68d9 -CVE-2023-4110 - http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html -CVE-2023-41107 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt -CVE-2023-41107 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021 -CVE-2023-41108 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt -CVE-2023-41108 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021 -CVE-2023-41109 - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html -CVE-2023-41109 - http://seclists.org/fulldisclosure/2023/Nov/12 -CVE-2023-41109 - https://www.syss.de/ -CVE-2023-41109 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt -CVE-2023-4111 - http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html -CVE-2023-4111 - http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html -CVE-2023-4112 - http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html -CVE-2023-4113 - http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html -CVE-2023-4114 - http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html -CVE-2023-4115 - http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html -CVE-2023-4116 - http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html -CVE-2023-41165 - https://advisories.stormshield.eu/2023-020/ -CVE-2023-41166 - https://advisories.stormshield.eu/2023-027 -CVE-2023-4117 - http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html -CVE-2023-4117 - https://vuldb.com/?id.235964 -CVE-2023-4119 - http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html -CVE-2023-4120 - https://github.com/RCEraser/cve/blob/main/rce.md -CVE-2023-4121 - https://github.com/torres14852/cve/blob/main/upload.md -CVE-2023-4124 - https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348 -CVE-2023-4125 - https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28 -CVE-2023-41257 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838 -CVE-2023-4126 - https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5 -CVE-2023-4127 - https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba -CVE-2023-41270 - https://www.slideshare.net/fuguet/smold-tv-old-smart -CVE-2023-41270 - https://www.youtube.com/watch?v=MdIT4mPTX3s -CVE-2023-4128 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -CVE-2023-41316 - https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg -CVE-2023-41325 - https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm -CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj -CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc -CVE-2023-41334 - https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf -CVE-2023-41336 - https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax -CVE-2023-4136 - http://packetstormsecurity.com/files/174304/CrafterCMS-4.0.2-Cross-Site-Scripting.html -CVE-2023-41362 - https://blog.sorcery.ie/posts/mybb_acp_rce/ -CVE-2023-41364 - https://herolab.usd.de/security-advisories/usd-2023-0002/ -CVE-2023-4138 - https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed -CVE-2023-41387 - https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data -CVE-2023-41425 - https://gist.github.com/prodigiousMind/fc69a79629c4ba9ee88a7ad526043413 -CVE-2023-41436 - https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md -CVE-2023-41442 - https://writeups.ayyappan.me/v/tor-iot-mqtt/ -CVE-2023-41443 - https://github.com/Deng-JunFeng/cve-lists/tree/main/novel-plus/vuln -CVE-2023-41444 - https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 -CVE-2023-41444 - https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 -CVE-2023-41445 - https://gist.github.com/RNPG/84cac1b949bab0e4c587a668385b052d -CVE-2023-41446 - https://gist.github.com/RNPG/4bb91170f8ee50b395427f26bc96a1f2 -CVE-2023-41447 - https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3 -CVE-2023-41448 - https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0 -CVE-2023-41449 - https://gist.github.com/RNPG/c1ae240f2acec138132aa64ce3faa2e0 -CVE-2023-4145 - https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0 -CVE-2023-41450 - https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589 -CVE-2023-41451 - https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde -CVE-2023-41452 - https://gist.github.com/RNPG/32be1c4bae6f9378d4f382ba0c92b367 -CVE-2023-41453 - https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783 -CVE-2023-4148 - https://wpscan.com/vulnerability/aa39de78-55b3-4237-84db-6fdf6820c58d -CVE-2023-4150 - https://wpscan.com/vulnerability/381ef15b-aafe-4ef4-a0bc-867d891f7f44 -CVE-2023-41507 - https://github.com/redblueteam/CVE-2023-41507/ -CVE-2023-41508 - https://github.com/redblueteam/CVE-2023-41508/ -CVE-2023-4151 - https://wpscan.com/vulnerability/c9d80aa4-a26d-4b3f-b7bf-9d2fb0560d7b -CVE-2023-4157 - https://huntr.dev/bounties/abc3521b-1238-4c4e-97f1-2957db670014 -CVE-2023-41575 - https://github.com/soundarkutty/Stored-xss/blob/main/poc -CVE-2023-4158 - https://huntr.dev/bounties/e0e462ae-d7cb-4a84-b6fe-5f5de20e3d15 -CVE-2023-41580 - https://github.com/ehtec/phpipam-exploit -CVE-2023-4159 - https://huntr.dev/bounties/e2e2365e-6a5f-4ca4-9ef1-297e3ed41f9c -CVE-2023-41593 - https://portswigger.net/web-security/cross-site-scripting -CVE-2023-41599 - http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/ -CVE-2023-41601 - https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md -CVE-2023-41613 - https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html -CVE-2023-41615 - https://medium.com/@guravtushar231/sql-injection-in-login-field-a9073780f7e8 -CVE-2023-41616 - https://medium.com/@guravtushar231/reflected-xss-in-admin-panel-7a459dcb9476 -CVE-2023-41627 - https://jira.o-ran-sc.org/browse/RIC-1001 -CVE-2023-41628 - https://jira.o-ran-sc.org/browse/RIC-1002 -CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md -CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md -CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection(1).md -CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection(1).md -CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md -CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md -CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41638%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md -CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md -CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41640%20%7C%20RealGimm%20-%20Information%20disclosure.md -CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md -CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41642%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md -CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md -CVE-2023-41646 - https://github.com/tristao-marinho/CVE-2023-41646/ -CVE-2023-4165 - https://github.com/nagenanhai/cve/blob/main/sql.md -CVE-2023-4168 - http://packetstormsecurity.com/files/174015/Adlisting-Classified-Ads-2.14.0-Information-Disclosure.html -CVE-2023-4169 - https://vuldb.com/?id.236185 -CVE-2023-41703 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html -CVE-2023-41704 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html -CVE-2023-41705 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html -CVE-2023-41706 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html -CVE-2023-41707 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html -CVE-2023-41708 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html -CVE-2023-4171 - https://github.com/nagenanhai/cve/blob/main/duqu.md -CVE-2023-41710 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html -CVE-2023-41717 - https://github.com/federella/CVE-2023-41717 -CVE-2023-4172 - https://vuldb.com/?id.236207 -CVE-2023-4173 - http://packetstormsecurity.com/files/174016/mooSocial-3.1.8-Cross-Site-Scripting.html -CVE-2023-4174 - http://packetstormsecurity.com/files/174017/Social-Commerce-3.1.6-Cross-Site-Scripting.html -CVE-2023-4175 - https://vuldb.com/?id.236210 -CVE-2023-4176 - https://vuldb.com/?id.236211 -CVE-2023-4179 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20doctors.php/vuln.md -CVE-2023-4180 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20login.php/vuln.md -CVE-2023-4181 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/vertical%20privilege%20escalation/vuln.md -CVE-2023-4182 - https://vuldb.com/?id.236217 -CVE-2023-4183 - https://vuldb.com/?id.236218 -CVE-2023-4184 - https://vuldb.com/?id.236219 -CVE-2023-4185 - https://vuldb.com/?id.236220 -CVE-2023-4187 - https://huntr.dev/bounties/14941381-b669-4756-94fc-cce172472f8b -CVE-2023-41879 - https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp -CVE-2023-4188 - https://huntr.dev/bounties/fe9809b6-40ad-4e81-9197-a9aa42e8a7bf -CVE-2023-41885 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-h7cm-mrvq-wcfr -CVE-2023-41886 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m -CVE-2023-41887 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5 -CVE-2023-41889 - https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r -CVE-2023-4189 - https://huntr.dev/bounties/b00e6986-64e7-464e-ba44-e42476bfcdc4 -CVE-2023-41892 - http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html -CVE-2023-4190 - https://huntr.dev/bounties/71bc75d2-320c-4332-ad11-9de535a06d92 -CVE-2023-4191 - https://github.com/Yesec/Resort-Reservation-System/blob/main/local%20file%20inclusion/vuln.md -CVE-2023-4192 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20manage_user.php/vuln.md -CVE-2023-4193 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20view_fee.php/vuln.md -CVE-2023-4195 - https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6 -CVE-2023-4196 - https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0 -CVE-2023-41966 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 -CVE-2023-41966 - https://www.sielco.org/en/contacts -CVE-2023-4197 - https://starlabs.sg/advisories/23/23-4197 -CVE-2023-4198 - https://starlabs.sg/advisories/23/23-4198 -CVE-2023-4199 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20catagory_data.php/vuln.md -CVE-2023-41998 - https://www.tenable.com/security/research/tra-2023-37 -CVE-2023-41999 - https://www.tenable.com/security/research/tra-2023-37 -CVE-2023-4200 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20product_data.php/vuln.md -CVE-2023-42000 - https://www.tenable.com/security/research/tra-2023-37 -CVE-2023-4201 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20ex_catagory_data.php/vuln.md -CVE-2023-4202 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html -CVE-2023-4202 - http://seclists.org/fulldisclosure/2023/Aug/13 -CVE-2023-4202 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/ -CVE-2023-4203 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html -CVE-2023-4203 - http://seclists.org/fulldisclosure/2023/Aug/13 -CVE-2023-4203 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/ -CVE-2023-4209 - https://wpscan.com/vulnerability/b2c6fa7d-1b0f-444b-8ca5-8c1c06cea1d9 -CVE-2023-42134 - https://blog.stmcyber.com/pax-pos-cves-2023/ -CVE-2023-42135 - https://blog.stmcyber.com/pax-pos-cves-2023/ -CVE-2023-42136 - https://blog.stmcyber.com/pax-pos-cves-2023/ -CVE-2023-42137 - https://blog.stmcyber.com/pax-pos-cves-2023/ -CVE-2023-42143 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 -CVE-2023-42144 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 -CVE-2023-4216 - https://wpscan.com/vulnerability/8189afc4-17b3-4696-89e1-731011cb9e2b -CVE-2023-4219 - https://github.com/Yesec/-Doctor-s-Appointment-System/blob/main/SQL%20Injection%20in%20login.php/vuln.md -CVE-2023-4220 - https://starlabs.sg/advisories/23/23-4220 -CVE-2023-4221 - https://starlabs.sg/advisories/23/23-4221 -CVE-2023-4222 - https://starlabs.sg/advisories/23/23-4222 -CVE-2023-42222 - http://packetstormsecurity.com/files/176957/WebCatalog-48.4-Arbitrary-Protocol-Execution-Code-Execution.html -CVE-2023-42222 - https://github.com/itssixtyn3in/CVE-2023-42222 -CVE-2023-4223 - https://starlabs.sg/advisories/23/23-4223 -CVE-2023-4224 - https://starlabs.sg/advisories/23/23-4224 -CVE-2023-4225 - https://starlabs.sg/advisories/23/23-4225 -CVE-2023-4226 - https://starlabs.sg/advisories/23/23-4226 -CVE-2023-42270 - http://packetstormsecurity.com/files/176958/Grocy-4.0.2-Cross-Site-Request-Forgery.html -CVE-2023-42270 - http://xploit.sh/posts/cve-2023-xxxxx/ -CVE-2023-42278 - https://github.com/dromara/hutool/issues/3289 -CVE-2023-42282 - https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html -CVE-2023-42283 - https://github.com/andreysanyuk/CVE-2023-42283 -CVE-2023-42284 - https://github.com/andreysanyuk/CVE-2023-42284 -CVE-2023-42286 - https://github.com/Nacl122/CVEReport/blob/main/CVE-2023-42286/CVE-2023-42286.md -CVE-2023-42295 - https://github.com/OpenImageIO/oiio/issues/3947 -CVE-2023-42298 - https://github.com/gpac/gpac/issues/2567 -CVE-2023-42299 - https://github.com/OpenImageIO/oiio/issues/3840 -CVE-2023-42320 - https://github.com/aixiao0621/Tenda/blob/main/AC10/0.md -CVE-2023-42323 - https://github.com/mnbvcxz131421/douhaocms/blob/main/README.md -CVE-2023-42358 - https://jira.o-ran-sc.org/browse/RIC-1009 -CVE-2023-42361 - https://gccybermonks.com/posts/pdfjira/ -CVE-2023-42362 - https://github.com/Mr-n0b3dy/CVE-2023-42362 -CVE-2023-42374 - https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US -CVE-2023-4238 - https://wpscan.com/vulnerability/53816136-4b1a-4b7d-b73b-08a90c2a638f -CVE-2023-42405 - https://github.com/fit2cloud/rackshift/issues/79 -CVE-2023-42406 - https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md -CVE-2023-42406 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md -CVE-2023-42448 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03 -CVE-2023-42448 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-mgcx-6p7h-5996 -CVE-2023-42449 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03 -CVE-2023-42449 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p -CVE-2023-42459 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm -CVE-2023-42468 - https://github.com/actuator/com.cutestudio.colordialer/blob/main/CWE-284.md -CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted -CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/dial.gif -CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/poc.apk -CVE-2023-42469 - https://github.com/actuator/cve/blob/main/CVE-2023-42469 -CVE-2023-42470 - https://github.com/actuator/cve/blob/main/CVE-2023-42470 -CVE-2023-42470 - https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md -CVE-2023-42470 - https://github.com/actuator/imou/blob/main/poc.apk -CVE-2023-42471 - https://github.com/actuator/cve/blob/main/CVE-2023-42471 -CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md -CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/poc.apk -CVE-2023-4250 - https://wpscan.com/vulnerability/9c271619-f478-45c3-91d9-be0f55ee06a2 -CVE-2023-4251 - https://wpscan.com/vulnerability/ce564628-3d15-4bc5-8b8e-60b71786ac19 -CVE-2023-4252 - https://wpscan.com/vulnerability/d2019e59-db6c-4014-8057-0644c9a00665 -CVE-2023-4253 - https://wpscan.com/vulnerability/1cbbab9e-be3d-4081-bc0e-c52d500d9871 -CVE-2023-4254 - https://wpscan.com/vulnerability/0dfffe48-e60d-4bab-b194-8a63554246c3 -CVE-2023-4255 - https://github.com/tats/w3m/issues/268 -CVE-2023-4256 - https://github.com/appneta/tcpreplay/issues/813 -CVE-2023-4257 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4257 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j -CVE-2023-4259 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4259 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4 -CVE-2023-4260 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4260 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh -CVE-2023-4262 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4262 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-56p9-5p3v-hhrc -CVE-2023-4263 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4263 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf -CVE-2023-4264 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4264 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j -CVE-2023-4265 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-4265 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh -CVE-2023-4269 - https://wpscan.com/vulnerability/db3e4336-117c-47f2-9b43-2ca115525297 -CVE-2023-4270 - https://wpscan.com/vulnerability/04560bf1-676b-46fb-9344-4150862f2686 -CVE-2023-42752 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-42753 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-42753 - https://seclists.org/oss-sec/2023/q3/216 -CVE-2023-42753 - https://www.openwall.com/lists/oss-security/2023/09/22/10 -CVE-2023-42754 - https://seclists.org/oss-sec/2023/q4/14 -CVE-2023-42755 - https://seclists.org/oss-sec/2023/q3/229 -CVE-2023-42756 - https://seclists.org/oss-sec/2023/q3/242 -CVE-2023-42769 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 -CVE-2023-42769 - https://www.sielco.org/en/contacts -CVE-2023-4278 - http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html -CVE-2023-4278 - https://wpscan.com/vulnerability/cb3173ec-9891-4bd8-9d05-24fe805b5235 -CVE-2023-42787 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr -CVE-2023-42788 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p -CVE-2023-4279 - https://wpscan.com/vulnerability/2bd2579e-b383-4d12-b207-6fc32cfb82bc -CVE-2023-42793 - http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html -CVE-2023-42793 - https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793 -CVE-2023-42793 - https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ -CVE-2023-42799 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-r8cf-45f4-vf8m -CVE-2023-42800 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-4927-23jw-rq62 -CVE-2023-42808 - https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/ -CVE-2023-4281 - https://wpscan.com/vulnerability/f5ea6c8a-6b07-4263-a1be-dd033f078d49 -CVE-2023-42811 - https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq -CVE-2023-42812 - https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh -CVE-2023-42821 - https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2 -CVE-2023-4284 - https://wpscan.com/vulnerability/1c126869-0afa-456f-94cc-10334964e5f9 -CVE-2023-42882 - http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html -CVE-2023-4289 - https://wpscan.com/vulnerability/38c337c6-048f-4009-aef8-29c18afa6fdc -CVE-2023-4290 - https://wpscan.com/vulnerability/5fad5245-a089-4ba3-9958-1e2c3d066eea -CVE-2023-42926 - http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html -CVE-2023-4294 - https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776 -CVE-2023-42940 - http://seclists.org/fulldisclosure/2023/Dec/20 -CVE-2023-4295 - http://packetstormsecurity.com/files/176109/Arm-Mali-CSF-Overflow-Use-After-Free.html -CVE-2023-4296 - http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html -CVE-2023-4296 - http://seclists.org/fulldisclosure/2023/Sep/10 -CVE-2023-4297 - https://wpscan.com/vulnerability/9ff85b06-819c-459e-90a9-6151bfd70978 -CVE-2023-4298 - https://wpscan.com/vulnerability/36285052-8464-4fd6-b4b1-c175e730edad -CVE-2023-4300 - https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42 -CVE-2023-4304 - https://huntr.dev/bounties/59fe5037-b253-4b0f-be69-1d2e4af8b4a9 -CVE-2023-4307 - https://wpscan.com/vulnerability/06f7aa45-b5d0-4afb-95cc-8f1c82f6f8b3 -CVE-2023-4309 - https://www.youtube.com/watch?v=yeG1xZkHc64 -CVE-2023-4311 - https://wpscan.com/vulnerability/21950116-1a69-4848-9da0-e912096c0fce -CVE-2023-43116 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md -CVE-2023-43131 - https://www.exploit-db.com/exploits/51641 -CVE-2023-4314 - https://wpscan.com/vulnerability/1ab192d7-72ac-4f12-8a51-f28ee4db91bc -CVE-2023-43144 - https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2 -CVE-2023-43147 - https://github.com/MinoTauro2020/CVE-2023-43147/ -CVE-2023-43148 - https://github.com/MinoTauro2020/CVE-2023-43148 -CVE-2023-43149 - https://github.com/MinoTauro2020/CVE-2023-43149 -CVE-2023-43154 - https://cxsecurity.com/issue/WLB-2023090075 -CVE-2023-43154 - https://github.com/ally-petitt/macs-cms-auth-bypass -CVE-2023-43176 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1 -CVE-2023-43177 - https://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered/ -CVE-2023-4318 - https://wpscan.com/vulnerability/93b40030-3706-4063-bf59-4ec983afdbb6 -CVE-2023-43183 - http://seclists.org/fulldisclosure/2024/Jan/43 -CVE-2023-43183 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html -CVE-2023-43196 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug4.md -CVE-2023-43197 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug1.md -CVE-2023-43198 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug5.md -CVE-2023-43199 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug6.md -CVE-2023-43200 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug3.md -CVE-2023-43201 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug2.md -CVE-2023-43208 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html -CVE-2023-43208 - https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/ -CVE-2023-4321 - https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc -CVE-2023-4322 - https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd -CVE-2023-43222 - https://blog.csdn.net/weixin_51394168/article/details/132817842 -CVE-2023-43226 - https://github.com/zzq66/cve/ -CVE-2023-43235 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWifiDownSettings/1.md -CVE-2023-43236 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/dir_setWanWifi/1.md -CVE-2023-43237 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/setMAC/1.md -CVE-2023-43238 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2Dhcpip_cgi/1.md -CVE-2023-43239 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/showMACfilterMAC/1.md -CVE-2023-43240 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/ipportFilter/1.md -CVE-2023-43241 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWLanRadioSecurity/1.md -CVE-2023-43242 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2IPQoSTcDel/1.md -CVE-2023-43250 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html -CVE-2023-43250 - http://seclists.org/fulldisclosure/2023/Oct/15 -CVE-2023-43251 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html -CVE-2023-43251 - http://seclists.org/fulldisclosure/2023/Oct/15 -CVE-2023-43252 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html -CVE-2023-43252 - http://seclists.org/fulldisclosure/2023/Oct/15 -CVE-2023-43260 - https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13 -CVE-2023-43261 - http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html -CVE-2023-43261 - https://github.com/win3zz/CVE-2023-43261 -CVE-2023-43275 - https://github.com/thedarknessdied/dedecms/blob/main/v5.7_110-CSRF.md -CVE-2023-43278 - https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501 -CVE-2023-43284 - https://github.com/MateusTesser/CVE-2023-43284 -CVE-2023-43291 - https://gist.github.com/Dar1in9s/e3db6b04daacb68633a97581bbd5921b -CVE-2023-43309 - https://github.com/TishaManandhar/Webmin_xss_POC/blob/main/XSS -CVE-2023-43318 - https://seclists.org/fulldisclosure/2024/Mar/9 -CVE-2023-43319 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-43319-c2ad758ac2bc -CVE-2023-43320 - http://packetstormsecurity.com/files/176967/Proxmox-VE-7.4-1-TOTP-Brute-Force.html -CVE-2023-43321 - https://github.com/Push3AX/vul/blob/main/DCN/DCFW_1800_SDC_CommandInjection.md -CVE-2023-43323 - https://github.com/ahrixia/CVE-2023-43323 -CVE-2023-43325 - https://github.com/ahrixia/CVE-2023-43325 -CVE-2023-43326 - https://github.com/ahrixia/CVE-2023-43326 -CVE-2023-43336 - https://medium.com/@janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826 -CVE-2023-43338 - https://github.com/cesanta/mjs/issues/250 -CVE-2023-43339 - https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md -CVE-2023-43339 - https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md -CVE-2023-43340 - https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options -CVE-2023-43340 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Admin-Options -CVE-2023-43341 - https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection- -CVE-2023-43341 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection- -CVE-2023-43342 - https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend -CVE-2023-43342 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Frontend -CVE-2023-43343 - https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files -CVE-2023-43343 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files -CVE-2023-43344 - https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description -CVE-2023-43345 - https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content -CVE-2023-43346 - https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend -CVE-2023-43346 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Backend -CVE-2023-43352 - https://github.com/sromanhu/CMSmadesimple-SSTI--Content -CVE-2023-43352 - https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content -CVE-2023-43353 - https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra -CVE-2023-43354 - https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension -CVE-2023-43355 - https://github.com/sromanhu/CMSmadesimple-Reflected-XSS---Add-user -CVE-2023-43355 - https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user -CVE-2023-43356 - https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings -CVE-2023-43357 - https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut -CVE-2023-43358 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---News -CVE-2023-43358 - https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News -CVE-2023-43359 - https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager -CVE-2023-43360 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---File-Picker-extension -CVE-2023-43360 - https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension -CVE-2023-43361 - https://github.com/xiph/vorbis-tools/issues/41 -CVE-2023-43364 - https://github.com/advisories/GHSA-66m2-493m-crh2 -CVE-2023-43364 - https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit- -CVE-2023-43364 - https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection -CVE-2023-4347 - https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f -CVE-2023-43470 - https://github.com/ae6e361b/Online-Voting-System -CVE-2023-43477 - https://www.tenable.com/security/research/tra-2023-19 -CVE-2023-43478 - https://www.tenable.com/security/research/tra-2023-19 -CVE-2023-43481 - https://github.com/actuator/com.tcl.browser/blob/main/CWE-94.md -CVE-2023-43491 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1863 -CVE-2023-4352 - http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html -CVE-2023-4354 - http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html -CVE-2023-4355 - http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html -CVE-2023-43567 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43568 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43569 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43570 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43571 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43572 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43573 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43574 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43575 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43576 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43577 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43578 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43579 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43580 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43581 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-43608 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1845 -CVE-2023-43628 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 -CVE-2023-43641 - http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html -CVE-2023-43641 - https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/ -CVE-2023-43641 - https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj -CVE-2023-43642 - https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv -CVE-2023-43646 - https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5 -CVE-2023-43654 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html -CVE-2023-43661 - https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p -CVE-2023-43741 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md -CVE-2023-4376 - https://wpscan.com/vulnerability/13910e52-5302-4252-8bee-49dd1f0e180a -CVE-2023-43787 - https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/ -CVE-2023-43791 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m -CVE-2023-43809 - https://github.com/charmbracelet/soft-serve/issues/389 -CVE-2023-4381 - https://huntr.dev/bounties/666c2617-e3e9-4955-9c97-2f8ed5262cc3 -CVE-2023-43810 - https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v -CVE-2023-4382 - http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html -CVE-2023-43828 - https://github.com/al3zx/xss_languages_subrion_4.2.1 -CVE-2023-4383 - https://gist.github.com/dmknght/ac489cf3605ded09b3925521afee3003 -CVE-2023-43830 - https://github.com/al3zx/xss_financial_subrion_4.2.1 -CVE-2023-43835 - https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html -CVE-2023-43860 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43861 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43862 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43863 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43864 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43865 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43866 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43867 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43868 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43869 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -CVE-2023-43871 - https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media/blob/main/README.md -CVE-2023-43871 - https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md -CVE-2023-43872 - https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager -CVE-2023-43873 - https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage/blob/main/README.md -CVE-2023-43874 - https://github.com/sromanhu/e107-CMS-Stored-XSS---MetaCustomTags/blob/main/README.md -CVE-2023-43875 - https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md -CVE-2023-43875 - https://github.com/sromanhu/Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md -CVE-2023-43876 - https://github.com/sromanhu/October-CMS-Reflected-XSS---Installation/blob/main/README.md -CVE-2023-43877 - https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu/blob/main/README.md -CVE-2023-43877 - https://github.com/sromanhu/RiteCMS-Stored-XSS---Home -CVE-2023-43878 - https://github.com/sromanhu/RiteCMS-Stored-XSS---MainMenu/blob/main/README.md -CVE-2023-43879 - https://github.com/sromanhu/RiteCMS-Stored-XSS---GlobalContent/tree/main -CVE-2023-4388 - https://wpscan.com/vulnerability/4086b62c-c527-4721-af63-7f2687c98648 -CVE-2023-43884 - https://github.com/dpuenteramirez/XSS-ReferenceID-Subrion_4.2.1 -CVE-2023-43887 - https://github.com/strukturag/libde265/issues/418 -CVE-2023-43890 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20bypass%20filter.md -CVE-2023-43891 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20in%20changing%20password%20feature.md -CVE-2023-43892 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20hostname%20parameter%20in%20wan%20settings.md -CVE-2023-43893 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md -CVE-2023-4390 - https://wpscan.com/vulnerability/9fd2eb81-185d-4d42-8acf-925664b7cb2f -CVE-2023-43906 - https://github.com/Playful-CR/CVE-paddle-/blob/main/CVE-2023-43906 -CVE-2023-43907 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md -CVE-2023-4395 - https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da -CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser -CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/CWE-94.md -CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk -CVE-2023-43959 - https://hackmd.io/@tahaafarooq/auth_rce_voip -CVE-2023-43959 - https://www.exploit-db.com/exploits/50509 -CVE-2023-43960 - https://hackmd.io/@tahaafarooq/dlink-dph-400se-cwe-200 -CVE-2023-43960 - https://www.exploit-db.com/exploits/51709 -CVE-2023-44008 - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008 -CVE-2023-44013 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md -CVE-2023-44014 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md -CVE-2023-44015 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md -CVE-2023-44016 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md -CVE-2023-44017 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/6/0.md -CVE-2023-44018 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md -CVE-2023-44019 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/5/0.md -CVE-2023-44020 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md -CVE-2023-44021 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/2/0.md -CVE-2023-44022 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md -CVE-2023-44023 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md -CVE-2023-44031 - http://seclists.org/fulldisclosure/2024/Jan/43 -CVE-2023-44031 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html -CVE-2023-44042 - https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1 -CVE-2023-44043 - https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1 -CVE-2023-44044 - https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL -CVE-2023-44047 - https://github.com/xcodeOn1/SQLI-TollTax/blob/main/README.md -CVE-2023-44047 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44047.md -CVE-2023-44048 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main -CVE-2023-44048 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44048.md -CVE-2023-44061 - https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md -CVE-2023-4407 - http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQL-Injection.html -CVE-2023-4409 - https://vuldb.com/?id.237512 -CVE-2023-4414 - https://github.com/RCEraser/cve/blob/main/S85F.md -CVE-2023-44216 - https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/ -CVE-2023-44216 - https://github.com/UT-Security/gpu-zip -CVE-2023-44216 - https://news.ycombinator.com/item?id=37663159 -CVE-2023-44216 - https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/ -CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/ -CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf -CVE-2023-4422 - https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e -CVE-2023-44249 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj -CVE-2023-44253 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-25j8-69h7-83h2 -CVE-2023-44256 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh -CVE-2023-4427 - http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html -CVE-2023-44275 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense -CVE-2023-44276 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense -CVE-2023-4432 - https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f -CVE-2023-4433 - https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a -CVE-2023-4434 - https://huntr.dev/bounties/19e68377-e071-4a8e-aa4c-cd84a426602e -CVE-2023-4435 - https://huntr.dev/bounties/1875ee85-4b92-4aa4-861e-094137a29276 -CVE-2023-4437 - https://vuldb.com/?id.237558 -CVE-2023-44372 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842 -CVE-2023-4439 - https://vuldb.com/?id.237560 -CVE-2023-44393 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg -CVE-2023-44398 - https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5 -CVE-2023-44400 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g -CVE-2023-4441 - https://vuldb.com/?id.237562 -CVE-2023-44466 - https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph -CVE-2023-44467 - https://github.com/langchain-ai/langchain/commit/4c97a10bd0d9385cfee234a63b5bd826a295e483 -CVE-2023-44469 - https://security.lauritz-holtmann.de/post/sso-security-ssrf/ -CVE-2023-4448 - https://vuldb.com/?id.237569 -CVE-2023-44487 - https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ -CVE-2023-44487 - https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/ -CVE-2023-44487 - https://github.com/Azure/AKS/issues/3947 -CVE-2023-44487 - https://github.com/advisories/GHSA-qppj-fm5r-hxr3 -CVE-2023-44487 - https://github.com/akka/akka-http/issues/4323 -CVE-2023-44487 - https://github.com/alibaba/tengine/issues/1872 -CVE-2023-44487 - https://github.com/apache/apisix/issues/10320 -CVE-2023-44487 - https://github.com/apache/httpd-site/pull/10 -CVE-2023-44487 - https://github.com/apache/trafficserver/pull/10564 -CVE-2023-44487 - https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 -CVE-2023-44487 - https://github.com/caddyserver/caddy/issues/5877 -CVE-2023-44487 - https://github.com/eclipse/jetty.project/issues/10679 -CVE-2023-44487 - https://github.com/envoyproxy/envoy/pull/30055 -CVE-2023-44487 - https://github.com/etcd-io/etcd/issues/16740 -CVE-2023-44487 - https://github.com/facebook/proxygen/pull/466 -CVE-2023-44487 - https://github.com/golang/go/issues/63417 -CVE-2023-44487 - https://github.com/grpc/grpc-go/pull/6703 -CVE-2023-44487 - https://github.com/h2o/h2o/pull/3291 -CVE-2023-44487 - https://github.com/haproxy/haproxy/issues/2312 -CVE-2023-44487 - https://github.com/kazu-yamamoto/http2/issues/93 -CVE-2023-44487 - https://github.com/kubernetes/kubernetes/pull/121120 -CVE-2023-44487 - https://github.com/line/armeria/pull/5232 -CVE-2023-44487 - https://github.com/micrictor/http2-rst-stream -CVE-2023-44487 - https://github.com/microsoft/CBL-Mariner/pull/6381 -CVE-2023-44487 - https://github.com/nghttp2/nghttp2/pull/1961 -CVE-2023-44487 - https://github.com/ninenines/cowboy/issues/1615 -CVE-2023-44487 - https://github.com/nodejs/node/pull/50121 -CVE-2023-44487 - https://github.com/openresty/openresty/issues/930 -CVE-2023-44487 - https://github.com/opensearch-project/data-prepper/issues/3474 -CVE-2023-44487 - https://github.com/projectcontour/contour/pull/5826 -CVE-2023-44487 - https://github.com/tempesta-tech/tempesta/issues/1986 -CVE-2023-44487 - https://github.com/varnishcache/varnish-cache/issues/3996 -CVE-2023-44487 - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event -CVE-2023-4451 - https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa -CVE-2023-4453 - https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993 -CVE-2023-4454 - https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299 -CVE-2023-4455 - https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a -CVE-2023-4460 - https://wpscan.com/vulnerability/82f8d425-449a-471f-94df-8439924fd628 -CVE-2023-4462 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-4463 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-4464 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-4465 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-4466 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-4466 - https://vuldb.com/?id.249259 -CVE-2023-4467 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-4468 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -CVE-2023-44693 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_sql_%20importexport.md -CVE-2023-44694 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md -CVE-2023-44709 - https://github.com/sammycage/plutosvg/issues/7 -CVE-2023-4473 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ -CVE-2023-4474 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ -CVE-2023-44758 - https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main -CVE-2023-4476 - https://wpscan.com/vulnerability/3ca22b22-fe89-42be-94ec-b164838bcf50 -CVE-2023-44760 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes -CVE-2023-44761 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms -CVE-2023-44762 - https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags -CVE-2023-44763 - https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail -CVE-2023-44764 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation -CVE-2023-44765 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations -CVE-2023-44766 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO -CVE-2023-44767 - https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md -CVE-2023-44769 - https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main -CVE-2023-44769 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main -CVE-2023-44770 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md -CVE-2023-44771 - https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout -CVE-2023-44796 - https://github.com/Hebing123/CVE-2023-44796/issues/1 -CVE-2023-44796 - https://github.com/Hebing123/cve/issues/4 -CVE-2023-44807 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug2.md -CVE-2023-44808 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md -CVE-2023-44809 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md -CVE-2023-44811 - https://github.com/ahrixia/CVE-2023-44811 -CVE-2023-44812 - https://github.com/ahrixia/CVE-2023-44812 -CVE-2023-44813 - https://github.com/ahrixia/CVE-2023-44813 -CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/195 -CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/65 -CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501 -CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 -CVE-2023-44847 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 -CVE-2023-44848 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 -CVE-2023-44860 - https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md -CVE-2023-4490 - https://wpscan.com/vulnerability/986024f0-3c8d-44d8-a9c9-1dd284d7db0d -CVE-2023-44954 - https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md -CVE-2023-44961 - https://github.com/ggb0n/CVE-2023-44961 -CVE-2023-44962 - https://github.com/ggb0n/CVE-2023-44962 -CVE-2023-4502 - https://wpscan.com/vulnerability/e4804850-2ac2-4cec-bc27-07ed191d96da -CVE-2023-4504 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h -CVE-2023-4504 - https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 -CVE-2023-4504 - https://takeonme.org/cves/CVE-2023-4504.html -CVE-2023-4505 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 -CVE-2023-4506 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 -CVE-2023-45075 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-45076 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-45077 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-45078 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-45079 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a -CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/dfb5aac533a3f9e8ccd93ca217a753258cba4fe5 -CVE-2023-4508 - https://github.com/gerbv/gerbv/issues/191 -CVE-2023-4511 - https://gitlab.com/wireshark/wireshark/-/issues/19258 -CVE-2023-4512 - https://gitlab.com/wireshark/wireshark/-/issues/19144 -CVE-2023-4513 - https://gitlab.com/wireshark/wireshark/-/issues/19259 -CVE-2023-45139 - https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5 -CVE-2023-4514 - https://wpscan.com/vulnerability/365b15e6-3755-4ed5-badd-c9dd962bd9fa -CVE-2023-45142 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr -CVE-2023-45146 - https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/ -CVE-2023-45152 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf -CVE-2023-45160 - https://www.1e.com/vulnerability-disclosure-policy/ -CVE-2023-4517 - https://huntr.dev/bounties/508d1d21-c45d-47ff-833f-50c671882e51 -CVE-2023-45208 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection -CVE-2023-45209 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1865 -CVE-2023-4521 - https://wpscan.com/vulnerability/de2cdb38-3a9f-448e-b564-a798d1e93481 -CVE-2023-45228 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 -CVE-2023-45228 - https://www.sielco.org/en/contacts -CVE-2023-45229 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-4523 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01 -CVE-2023-45230 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-45231 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-45232 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-45233 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-45234 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-45235 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -CVE-2023-45252 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/ -CVE-2023-45253 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/ -CVE-2023-45277 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies -CVE-2023-45278 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies -CVE-2023-45279 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies -CVE-2023-45280 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies -CVE-2023-45281 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies -CVE-2023-45303 - https://herolab.usd.de/security-advisories/usd-2023-0010/ -CVE-2023-45312 - https://medium.com/@_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b -CVE-2023-45317 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 -CVE-2023-45317 - https://www.sielco.org/en/contacts -CVE-2023-45318 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843 -CVE-2023-45318 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1843 -CVE-2023-4532 - https://gitlab.com/gitlab-org/gitlab/-/issues/423357 -CVE-2023-4534 - https://vuldb.com/?id.238026 -CVE-2023-4535 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 -CVE-2023-45357 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 -CVE-2023-45358 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 -CVE-2023-4536 - https://wpscan.com/vulnerability/80e0e21c-9e6e-406d-b598-18eb222b3e3e/ -CVE-2023-45375 - https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html -CVE-2023-45376 - https://security.friendsofpresta.org/modules/2023/10/19/hicarouselspack.html -CVE-2023-45386 - https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html -CVE-2023-45396 - https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md -CVE-2023-4542 - https://github.com/PumpkinBridge/cve/blob/main/rce.md -CVE-2023-4543 - https://github.com/spcck/cve/blob/main/sql.md -CVE-2023-4544 - https://vuldb.com/?id.238049 -CVE-2023-45463 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md -CVE-2023-45464 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md -CVE-2023-45465 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md -CVE-2023-45466 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md -CVE-2023-45467 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md -CVE-2023-45468 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md -CVE-2023-4547 - http://packetstormsecurity.com/files/174343/SPA-Cart-eCommerce-CMS-1.9.0.3-Cross-Site-Scripting.html -CVE-2023-45471 - https://github.com/itsAptx/CVE-2023-45471 -CVE-2023-45479 - https://github.com/l3m0nade/IOTvul/blob/master/sub_49E098.md -CVE-2023-4548 - http://packetstormsecurity.com/files/174344/SPA-Cart-eCommerce-CMS-1.9.0.3-SQL-Injection.html -CVE-2023-45480 - https://github.com/l3m0nade/IOTvul/blob/master/sub_47D878.md -CVE-2023-45481 - https://github.com/l3m0nade/IOTvul/blob/master/SetFirewallCfg.md -CVE-2023-45482 - https://github.com/l3m0nade/IOTvul/blob/master/get_parentControl_list_Info.md -CVE-2023-45483 - https://github.com/l3m0nade/IOTvul/blob/master/compare_parentcontrol_time.md -CVE-2023-45484 - https://github.com/l3m0nade/IOTvul/blob/master/fromSetWifiGusetBasic.md -CVE-2023-4549 - https://wpscan.com/vulnerability/8aebead0-0eab-4d4e-8ceb-8fea0760374f -CVE-2023-45498 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html -CVE-2023-45498 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html -CVE-2023-45498 - http://seclists.org/fulldisclosure/2023/Oct/31 -CVE-2023-45498 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/ -CVE-2023-45499 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html -CVE-2023-45499 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html -CVE-2023-45499 - http://seclists.org/fulldisclosure/2023/Oct/31 -CVE-2023-45499 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/ -CVE-2023-45510 - https://github.com/justdan96/tsMuxer/issues/778 -CVE-2023-45511 - https://github.com/justdan96/tsMuxer/issues/780 -CVE-2023-45540 - https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md -CVE-2023-45542 - https://github.com/ahrixia/CVE-2023-45542 -CVE-2023-45554 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md -CVE-2023-45555 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md -CVE-2023-4560 - https://huntr.dev/bounties/86f06e28-ed8d-4f96-b4ad-e47f2fe94ba6 -CVE-2023-4561 - https://huntr.dev/bounties/d4302a0d-db62-4d76-93dd-e6e6473e057a -CVE-2023-45659 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x -CVE-2023-45670 - https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/ -CVE-2023-45670 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h -CVE-2023-45670 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ -CVE-2023-45671 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ -CVE-2023-45672 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-qp3h-4q62-p428 -CVE-2023-45672 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ -CVE-2023-4568 - https://www.tenable.com/security/research/tra-2023-31 -CVE-2023-45685 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -CVE-2023-45686 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -CVE-2023-45687 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -CVE-2023-45688 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -CVE-2023-45689 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -CVE-2023-45690 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -CVE-2023-45744 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1866 -CVE-2023-45779 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 -CVE-2023-45779 - https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html -CVE-2023-45805 - https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 -CVE-2023-45805 - https://peps.python.org/pep-0440/#post-release-spelling -CVE-2023-45811 - https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx -CVE-2023-45813 - https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff -CVE-2023-4582 - https://bugzilla.mozilla.org/show_bug.cgi?id=1773874 -CVE-2023-45820 - https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m -CVE-2023-45827 - https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47 -CVE-2023-45838 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 -CVE-2023-45839 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 -CVE-2023-45840 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 -CVE-2023-45841 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 -CVE-2023-45842 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 -CVE-2023-45852 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md -CVE-2023-45862 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5 -CVE-2023-45863 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3 -CVE-2023-45866 - https://github.com/skysafe/reblog/tree/main/cve-2023-45866 -CVE-2023-45867 - https://rehmeinfosec.de/labor/cve-2023-45867 -CVE-2023-45868 - https://rehmeinfosec.de/labor/cve-2023-45867 -CVE-2023-45869 - https://rehmeinfosec.de/labor/cve-2023-45869 -CVE-2023-45878 - https://herolab.usd.de/security-advisories/usd-2023-0025/ -CVE-2023-45879 - https://herolab.usd.de/security-advisories/usd-2023-0019/ -CVE-2023-45880 - https://herolab.usd.de/security-advisories/usd-2023-0022/ -CVE-2023-45881 - https://herolab.usd.de/security-advisories/usd-2023-0024/ -CVE-2023-45887 - http://packetstormsecurity.com/files/177135/DS-Wireless-Communication-Code-Execution.html -CVE-2023-45889 - https://blog.zerdle.net/classlink/ -CVE-2023-45889 - https://blog.zerdle.net/classlink2/ -CVE-2023-45892 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md -CVE-2023-45893 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45893.md -CVE-2023-45897 - https://dfir.ru/2023/11/01/cve-2023-45897-a-vulnerability-in-the-linux-exfat-userspace-tools/ -CVE-2023-45898 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4 -CVE-2023-4596 - https://www.exploit-db.com/exploits/51664 -CVE-2023-4597 - http://packetstormsecurity.com/files/174604/WordPress-Slimstat-Analytics-5.0.9-Cross-Site-Scripting-SQL-Injection.html -CVE-2023-45990 - https://github.com/PwnCYN/Wenwenai/issues/2 -CVE-2023-45992 - https://github.com/harry935/CVE-2023-45992 -CVE-2023-46001 - https://github.com/gpac/gpac/issues/2629 -CVE-2023-46004 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/Arbitrary-File-Upload-Vulnerability.md -CVE-2023-46005 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability.md -CVE-2023-46006 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-2.md -CVE-2023-46007 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-3.md -CVE-2023-46009 - https://github.com/kohler/gifsicle/issues/196 -CVE-2023-46010 - https://blog.csdn.net/DGS666/article/details/133795200?spm=1001.2014.3001.5501 -CVE-2023-46012 - https://github.com/dest-3/CVE-2023-46012/tree/main -CVE-2023-46014 - https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -CVE-2023-46015 - https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability -CVE-2023-46016 - https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability -CVE-2023-46017 - https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -CVE-2023-46018 - https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -CVE-2023-46019 - https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability -CVE-2023-46020 - https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability -CVE-2023-46021 - https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -CVE-2023-46022 - https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability -CVE-2023-46023 - https://github.com/ersinerenler/Code-Projects-Simple-Task-List-1.0/blob/main/CVE-2023-46023-Code-Projects-Simple-Task-List-1.0-SQL-Injection-Vulnerability.md -CVE-2023-46024 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46024-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md -CVE-2023-46025 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46025-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md -CVE-2023-46026 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46026-PHPGurukul-Teacher-Subject-Allocation-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md -CVE-2023-46047 - https://gitlab.com/sane-project/backends/-/issues/708 -CVE-2023-46048 - https://tug.org/pipermail/tex-live/2023-August/049400.html -CVE-2023-46052 - https://gitlab.com/sane-project/backends/-/issues/709 -CVE-2023-46055 - https://gist.github.com/GroundCTL2MajorTom/eef0d55f5df77cc911d84392acdbf625 -CVE-2023-46058 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md -CVE-2023-46059 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/reflected_XSS_in_editservice.md -CVE-2023-46060 - https://github.com/peris-navince/founded-0-days/blob/main/Tenda/ac500/fromSetVlanInfo/1.md -CVE-2023-46116 - https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644 -CVE-2023-46118 - https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg -CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 -CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h -CVE-2023-46132 - https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m -CVE-2023-46139 - https://github.com/tiann/KernelSU/security/advisories/GHSA-86cp-3prf-pwqq -CVE-2023-4620 - https://wpscan.com/vulnerability/084e9494-2f9e-4420-9bf7-78a1a41433d7 -CVE-2023-4622 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-4623 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-4624 - https://huntr.dev/bounties/9ce5cef6-e546-44e7-addf-a2726fa4e60c -CVE-2023-46245 - https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw -CVE-2023-46246 - https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm -CVE-2023-46256 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw -CVE-2023-46277 - https://github.com/rustsec/advisory-db/pull/1798 -CVE-2023-46288 - http://www.openwall.com/lists/oss-security/2024/04/17/10 -CVE-2023-4631 - https://wpscan.com/vulnerability/28613fc7-1400-4553-bcc3-24df1cee418e -CVE-2023-46316 - http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html -CVE-2023-46324 - https://www.gsma.com/security/wp-content/uploads/2023/10/0073-invalid_curve.pdf -CVE-2023-46331 - https://github.com/WebAssembly/wabt/issues/2310 -CVE-2023-46332 - https://github.com/WebAssembly/wabt/issues/2311 -CVE-2023-4634 - https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz -CVE-2023-4634 - https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ -CVE-2023-46344 - https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS -CVE-2023-46346 - https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html -CVE-2023-46347 - https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html -CVE-2023-46356 - https://security.friendsofpresta.org/modules/2023/10/26/csvfeeds-89.html -CVE-2023-46358 - https://security.friendsofpresta.org/modules/2023/10/24/referralbyphone.html -CVE-2023-46361 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md -CVE-2023-46362 - https://github.com/agl/jbig2enc/issues/84 -CVE-2023-46363 - https://github.com/agl/jbig2enc/issues/85 -CVE-2023-46380 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html -CVE-2023-46381 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html -CVE-2023-46382 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html -CVE-2023-46383 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html -CVE-2023-46384 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html -CVE-2023-46385 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html -CVE-2023-46386 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html -CVE-2023-46387 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html -CVE-2023-46388 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html -CVE-2023-46389 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html -CVE-2023-46402 - https://gist.github.com/6en6ar/7c2424c93e7fbf2b6fc44e7fb9acb95d -CVE-2023-46404 - https://github.com/windecks/CVE-2023-46404 -CVE-2023-4642 - https://wpscan.com/vulnerability/6f481d34-6feb-4af2-914c-1f3288f69207 -CVE-2023-46426 - https://github.com/gpac/gpac/issues/2642 -CVE-2023-46427 - https://github.com/gpac/gpac/issues/2641 -CVE-2023-4643 - https://wpscan.com/vulnerability/d9125604-2236-435c-a67c-07951a1fc5b1 -CVE-2023-46442 - https://github.com/JAckLosingHeart/CVE-2023-46442_POC/tree/main -CVE-2023-46445 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html -CVE-2023-46445 - https://github.com/advisories/GHSA-cfc2-wr2v-gxm5 -CVE-2023-46445 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst -CVE-2023-46445 - https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5 -CVE-2023-46446 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html -CVE-2023-46446 - https://github.com/advisories/GHSA-c35q-ffpf-5qpm -CVE-2023-46446 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst -CVE-2023-46446 - https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm -CVE-2023-46448 - https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/ -CVE-2023-46449 - https://github.com/sajaljat/CVE-2023-46449/tree/main -CVE-2023-46449 - https://www.youtube.com/watch?v=H5QnsOKjs3s -CVE-2023-46450 - https://github.com/yte121/-CVE-2023-46450/ -CVE-2023-46450 - https://youtu.be/LQy0_xIK2q0 -CVE-2023-46451 - https://github.com/sajaljat/CVE-2023-46451 -CVE-2023-46451 - https://youtu.be/f8B3_m5YfqI -CVE-2023-4646 - https://wpscan.com/vulnerability/c34f8dcc-3be6-44ad-91a4-7c3a0ce2f9d7 -CVE-2023-46468 - https://www.sumor.top/index.php/archives/875/ -CVE-2023-46475 - https://github.com/elementalSec/CVE-Disclosures/blob/main/ZentaoPMS/CVE-2023-46475/CVE-2023-46475%20-%20Cross-Site%20Scripting%20(Stored).md -CVE-2023-46478 - https://github.com/mr-xmen786/CVE-2023-46478/tree/main -CVE-2023-46480 - https://github.com/shahzaibak96/CVE-2023-46480 -CVE-2023-46484 - https://815yang.github.io/2023/10/29/x6000r/setLedCfg/TOTOlink%20X6000R%20setLedCfg%20e/ -CVE-2023-46485 - https://815yang.github.io/2023/10/29/x6000r/TOTOlink%20X6000R%20V9.1.0cu.2350_B20230313-rsetTracerouteCfg/ -CVE-2023-4649 - https://huntr.dev/bounties/069bb1f3-0805-480d-a6e1-b3345cdc60f3 -CVE-2023-46490 - https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53 -CVE-2023-4650 - https://huntr.dev/bounties/d92e8985-9d9d-4a62-92e8-ada014ee3b17 -CVE-2023-4651 - https://huntr.dev/bounties/beba9b98-2a5c-4629-987d-b67f47ba9437 -CVE-2023-4652 - https://huntr.dev/bounties/7869e4af-fad9-48c3-9e4f-c949e54cbb41 -CVE-2023-4653 - https://huntr.dev/bounties/e0bf7e95-fc8c-4fd4-8575-8b46b9431c6d -CVE-2023-4654 - https://huntr.dev/bounties/56432a75-af43-4b1a-9307-bd8de568351b -CVE-2023-4655 - https://huntr.dev/bounties/e2189ad5-b665-4ba5-b6c4-112e58ae9a97 -CVE-2023-46569 - https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8 -CVE-2023-46569 - https://github.com/radareorg/radare2/issues/22334 -CVE-2023-46570 - https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6 -CVE-2023-46570 - https://github.com/radareorg/radare2/issues/22333 -CVE-2023-46574 - https://github.com/OraclePi/repo/blob/main/totolink%20A3700R/1/A3700R%20%20V9.1.2u.6165_20211012%20vuln.md -CVE-2023-4658 - https://gitlab.com/gitlab-org/gitlab/-/issues/423835 -CVE-2023-46580 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46580-Code-Projects-Inventory-Management-1.0-Stored-Cross-Site-Scripting-Vulnerability.md -CVE-2023-46581 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46581-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md -CVE-2023-46582 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46582-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md -CVE-2023-46587 - https://github.com/nasroabd/vulns/tree/main/XnView/2.51.5 -CVE-2023-46602 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 -CVE-2023-46603 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 -CVE-2023-46604 - http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html -CVE-2023-46604 - http://seclists.org/fulldisclosure/2024/Apr/18 -CVE-2023-46604 - https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html -CVE-2023-4666 - https://wpscan.com/vulnerability/c6597e36-02d6-46b4-89db-52c160f418be -CVE-2023-46661 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-46662 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-46663 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-46664 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-46665 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-46666 - https://www.elastic.co/community/security -CVE-2023-46667 - https://www.elastic.co/community/security -CVE-2023-46668 - https://www.elastic.co/community/security -CVE-2023-46672 - https://www.elastic.co/community/security -CVE-2023-46673 - https://www.elastic.co/community/security -CVE-2023-46694 - https://github.com/invisiblebyte/CVE-2023-46694 -CVE-2023-46722 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-jfxw-6c5v-c42f -CVE-2023-46730 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfv -CVE-2023-46736 - https://github.com/espocrm/espocrm/security/advisories/GHSA-g955-rwxx-jvf6 -CVE-2023-46744 - https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m -CVE-2023-46745 - https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx -CVE-2023-46747 - http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html -CVE-2023-4678 - https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877 -CVE-2023-46805 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html -CVE-2023-4681 - https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e -CVE-2023-46813 - https://bugzilla.suse.com/show_bug.cgi?id=1212649 -CVE-2023-46817 - http://seclists.org/fulldisclosure/2023/Oct/30 -CVE-2023-46817 - https://karmainsecurity.com/KIS-2023-12 -CVE-2023-46817 - https://karmainsecurity.com/pocs/CVE-2023-46817.php -CVE-2023-46818 - http://packetstormsecurity.com/files/176126/ISPConfig-3.2.11-PHP-Code-Injection.html -CVE-2023-46818 - http://seclists.org/fulldisclosure/2023/Dec/2 -CVE-2023-4682 - https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c -CVE-2023-4683 - https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922 -CVE-2023-46857 - https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/ -CVE-2023-46858 - https://packetstormsecurity.com/files/175277/Moodle-4.3-Cross-Site-Scripting.html -CVE-2023-46864 - https://github.com/Peppermint-Lab/peppermint/issues/171 -CVE-2023-46865 - https://github.com/asylumdx/Crater-CVE-2023-46865-RCE -CVE-2023-46865 - https://github.com/crater-invoice/crater/issues/1267 -CVE-2023-46865 - https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html -CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 -CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 -CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 -CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 -CVE-2023-4687 - https://wpscan.com/vulnerability/31596fc5-4203-40c4-9b0a-e8a37faafddd -CVE-2023-46871 - https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486 -CVE-2023-46871 - https://github.com/gpac/gpac/issues/2658 -CVE-2023-46889 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 -CVE-2023-46892 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 -CVE-2023-4691 - https://wpscan.com/vulnerability/5085ec75-0795-4004-955d-e71b3d2c26c6 -CVE-2023-46916 - http://packetstormsecurity.com/files/175660 -CVE-2023-46927 - https://github.com/gpac/gpac/issues/2657 -CVE-2023-46928 - https://github.com/gpac/gpac/issues/2661 -CVE-2023-46929 - https://github.com/gpac/gpac/issues/2662 -CVE-2023-46930 - https://github.com/gpac/gpac/issues/2666 -CVE-2023-46931 - https://github.com/gpac/gpac/issues/2664 -CVE-2023-46932 - https://github.com/gpac/gpac/issues/2669 -CVE-2023-46935 - https://github.com/weng-xianhu/eyoucms/issues/55 -CVE-2023-46950 - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 -CVE-2023-46951 - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 -CVE-2023-4696 - https://huntr.dev/bounties/4747a485-77c3-4bb5-aab0-21253ef303ca -CVE-2023-4697 - https://huntr.dev/bounties/3ff3325a-1dcb-4da7-894d-81a9cf726d81 -CVE-2023-46974 - https://github.com/yte121/CVE-2023-46974/ -CVE-2023-46974 - https://youtu.be/5oVfJHT_-Ys -CVE-2023-46976 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20A3300R/1/README.md -CVE-2023-46977 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20LR1200GB/1/README.md -CVE-2023-46978 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/1/README.md -CVE-2023-46979 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/2/README.md -CVE-2023-4698 - https://huntr.dev/bounties/e1107d79-1d63-4238-90b7-5cc150512654 -CVE-2023-46980 - https://github.com/sajaljat/CVE-2023-46980/tree/main -CVE-2023-46980 - https://youtu.be/3Mz2lSElg7Y -CVE-2023-46981 - https://github.com/JunFengDeng/Cve-List/blob/main/novel-plus/20231027/vuln/readme.md -CVE-2023-46987 - https://blog.csdn.net/weixin_72610998/article/details/133420747?spm=1001.2014.3001.5501 -CVE-2023-46992 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R/readme.md -CVE-2023-46993 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%20Injection/readme.md -CVE-2023-46998 - https://github.com/soy-oreocato/CVE-2023-46998/ -CVE-2023-47004 - https://github.com/RedisGraph/RedisGraph/issues/3178 -CVE-2023-47014 - https://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS/blob/main/README.md -CVE-2023-47016 - https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa -CVE-2023-47016 - https://github.com/radareorg/radare2/issues/22349 -CVE-2023-47025 - https://github.com/free5gc/free5gc/issues/501 -CVE-2023-4703 - https://wpscan.com/vulnerability/83278bbb-90e6-4465-a46d-60b4c703c11a/ -CVE-2023-4704 - https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a -CVE-2023-4707 - http://packetstormsecurity.com/files/174444/Clcknshop-1.0.0-Cross-Site-Scripting.html -CVE-2023-4708 - http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html -CVE-2023-47091 - https://advisories.stormshield.eu/2023-024/ -CVE-2023-47102 - https://quantiano.github.io/cve-2023-47102/ -CVE-2023-47106 - https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm -CVE-2023-47108 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw -CVE-2023-47115 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x -CVE-2023-47116 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r -CVE-2023-47117 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw -CVE-2023-4712 - https://github.com/wpay65249519/cve/blob/main/SQL_injection.md -CVE-2023-47128 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-xq59-7jf3-rjc6 -CVE-2023-47130 - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection -CVE-2023-4714 - http://packetstormsecurity.com/files/174446/PlayTube-3.0.1-Information-Disclosure.html -CVE-2023-47171 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1869 -CVE-2023-4720 - https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad -CVE-2023-4721 - https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc -CVE-2023-47218 - https://www.rapid7.com/blog/post/2024/02/13/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed/ -CVE-2023-4722 - https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830 -CVE-2023-4724 - https://wpscan.com/vulnerability/48820f1d-45cb-4f1f-990d-d132bfc5536f -CVE-2023-47249 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 -CVE-2023-4725 - https://wpscan.com/vulnerability/e9b9a594-c960-4692-823e-23fc60cca7e7 -CVE-2023-47250 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -CVE-2023-47250 - http://seclists.org/fulldisclosure/2023/Nov/13 -CVE-2023-47250 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ -CVE-2023-47251 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -CVE-2023-47251 - http://seclists.org/fulldisclosure/2023/Nov/13 -CVE-2023-47251 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ -CVE-2023-47254 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt -CVE-2023-47254 - https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023 -CVE-2023-47256 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 -CVE-2023-47257 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 -CVE-2023-47271 - http://packetstormsecurity.com/files/176255/PKP-WAL-3.4.0-3-Remote-Code-Execution.html -CVE-2023-47271 - http://seclists.org/fulldisclosure/2023/Dec/23 -CVE-2023-47308 - https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2023-11-09-newsletterpop.md -CVE-2023-47320 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320 -CVE-2023-47321 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47321 -CVE-2023-47322 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47322 -CVE-2023-47323 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323 -CVE-2023-47324 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47324 -CVE-2023-47325 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47325 -CVE-2023-47326 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47326 -CVE-2023-47327 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47327 -CVE-2023-4733 - https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c -CVE-2023-4733 - https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217 -CVE-2023-4734 - https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217 -CVE-2023-47345 - https://github.com/free5gc/free5gc/issues/483 -CVE-2023-47346 - https://github.com/free5gc/free5gc/issues/482 -CVE-2023-47347 - https://github.com/free5gc/free5gc/issues/496 -CVE-2023-4735 - https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51 -CVE-2023-47350 - https://mechaneus.github.io/CVE-2023-47350.html -CVE-2023-47353 - https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md -CVE-2023-47354 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md -CVE-2023-47355 - https://github.com/actuator/com.eypcnnapps.quickreboot/blob/main/CWE-925.md -CVE-2023-4736 - https://huntr.dev/bounties/e1ce0995-4df4-4dec-9cd7-3136ac3e8e71 -CVE-2023-4738 - https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1 -CVE-2023-4738 - https://huntr.dev/bounties/9fc7dced-a7bb-4479-9718-f956df20f612 -CVE-2023-47384 - https://github.com/gpac/gpac/issues/2672 -CVE-2023-4739 - https://github.com/Meizhi-hua/cve/blob/main/upload_file.md -CVE-2023-47397 - https://liotree.github.io/2023/webid.html -CVE-2023-4740 - https://vuldb.com/?id.238629 -CVE-2023-4744 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md -CVE-2023-47444 - https://0xbro.red/disclosures/disclosed-vulnerabilities/opencart-cve-2023-47444/ -CVE-2023-47445 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47445%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20SQL%20Injection.md -CVE-2023-47446 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47446%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20Stored%20XSS%20Vulnerability.md -CVE-2023-4745 - https://github.com/Jacky-Y/vuls/blob/main/vul6.md -CVE-2023-47452 - https://github.com/xieqiang11/poc-1/tree/main -CVE-2023-47453 - https://github.com/xieqiang11/poc-2/tree/main -CVE-2023-47454 - https://github.com/xieqiang11/poc-3/tree/main -CVE-2023-47455 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/setSchedWifi.md -CVE-2023-47456 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/fromSetWirelessRepeat.md -CVE-2023-47462 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary%20File%20Read%20through%20file%20share.md -CVE-2023-47464 - https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Creation%20Through%20API%20upload.md -CVE-2023-47465 - https://github.com/gpac/gpac/issues/2652 -CVE-2023-47470 - https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 -CVE-2023-47470 - https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael@niedermayer.cc/ -CVE-2023-47471 - https://github.com/strukturag/libde265/issues/426 -CVE-2023-47473 - https://github.com/THMOAS0/SSR123/blob/main/%E4%BC%81%E8%AF%ADiFair%20Any%20file%20read.pdf -CVE-2023-47488 - https://bugplorer.github.io/cve-xss-itop/ -CVE-2023-47488 - https://nitipoom-jar.github.io/CVE-2023-47488/ -CVE-2023-47489 - https://bugplorer.github.io/cve-csv-itop/ -CVE-2023-47489 - https://nitipoom-jar.github.io/CVE-2023-47489/ -CVE-2023-4749 - https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/ -CVE-2023-4750 - https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed -CVE-2023-4750 - https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea -CVE-2023-4751 - https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378 -CVE-2023-4752 - https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139 -CVE-2023-4752 - https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757 -CVE-2023-4754 - https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c -CVE-2023-4755 - https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3 -CVE-2023-4756 - https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05 -CVE-2023-4757 - https://wpscan.com/vulnerability/0b953413-cf41-4de7-ac1f-c6cb995fb158/ -CVE-2023-4758 - https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6 -CVE-2023-4759 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11 -CVE-2023-47619 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ -CVE-2023-47620 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/ -CVE-2023-47623 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/ -CVE-2023-47624 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ -CVE-2023-47625 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82 -CVE-2023-47627 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg -CVE-2023-47628 - https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx -CVE-2023-47629 - https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8 -CVE-2023-47633 - https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p -CVE-2023-47637 - https://github.com/pimcore/pimcore/security/advisories/GHSA-72hh-xf79-429p -CVE-2023-47640 - https://github.com/datahub-project/datahub/security/advisories/GHSA-fg9x-wvqw-6gmw -CVE-2023-47641 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j -CVE-2023-47643 - https://github.com/salesagility/SuiteCRM-Core/security/advisories/GHSA-fxww-jqfv-9rrr -CVE-2023-4776 - https://wpscan.com/vulnerability/59dd3917-01cb-479f-a557-021b2a5147df -CVE-2023-4777 - https://www.qualys.com/security-advisories/ -CVE-2023-4778 - https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397 -CVE-2023-47800 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-006.txt -CVE-2023-47804 - https://www.openoffice.org/security/cves/CVE-2023-47804.html -CVE-2023-4781 - https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93 -CVE-2023-4781 - https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883 -CVE-2023-4783 - https://wpscan.com/vulnerability/02928db8-ceb3-471a-b626-ca661d073e4f -CVE-2023-47861 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1884 -CVE-2023-47861 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1884 -CVE-2023-47882 - https://github.com/actuator/yi/blob/main/CWE-319.md -CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/AFC-POC.apk -CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/CWE-94.md -CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/TVBrowserDemo.gif -CVE-2023-47889 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md -CVE-2023-47890 - https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2 -CVE-2023-4795 - https://wpscan.com/vulnerability/b8390b4a-b43f-4bf6-a61b-dfcbc7b2e7a0 -CVE-2023-4797 - https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ -CVE-2023-4798 - https://wpscan.com/vulnerability/273a95bf-39fe-4ba7-bc14-9527acfd9f42 -CVE-2023-4799 - https://wpscan.com/vulnerability/04c71873-5ae7-4f94-8ba9-03e03ff55180 -CVE-2023-47992 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47992 -CVE-2023-47993 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47993 -CVE-2023-47994 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994 -CVE-2023-47995 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995 -CVE-2023-47996 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47996 -CVE-2023-47997 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997 -CVE-2023-4800 - https://wpscan.com/vulnerability/7eae1434-8c7a-4291-912d-a4a07b73ee56 -CVE-2023-48003 - https://docs.unsafe-inline.com/0day/asp.net-zero-v12.3.0-html-injection-leads-to-open-redirect-via-websockets-cve-2023-48003 -CVE-2023-48003 - https://github.com/passtheticket/vulnerability-research/blob/main/aspnetzero_html_injection_via_websockets_messages.md -CVE-2023-48011 - https://github.com/gpac/gpac/issues/2611 -CVE-2023-48013 - https://github.com/gpac/gpac/issues/2612 -CVE-2023-48014 - https://github.com/gpac/gpac/issues/2613 -CVE-2023-48016 - https://github.com/Serhatcck/cves/blob/main/CVE-2023-48016-restaurant-table-booking-system-SQLInjection.md -CVE-2023-48022 - https://www.vicarius.io/vsociety/posts/shadowray-cve-2023-48022-exploit -CVE-2023-48028 - https://nitipoom-jar.github.io/CVE-2023-48028/ -CVE-2023-48029 - https://nitipoom-jar.github.io/CVE-2023-48029/ -CVE-2023-48031 - https://nitipoom-jar.github.io/CVE-2023-48031/ -CVE-2023-48039 - https://github.com/gpac/gpac/issues/2679 -CVE-2023-48049 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog -CVE-2023-4805 - https://wpscan.com/vulnerability/1049e940-49b1-4236-bea2-c636f35c5647 -CVE-2023-48050 - https://github.com/luvsn/OdZoo/tree/main/exploits/odoo-biometric-attendance -CVE-2023-48058 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20task%20management%20execution%20task%20location.md -CVE-2023-48060 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20location%20where%20task%20management%20adds%20tasks.md -CVE-2023-48063 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/There%20is%20a%20CSRF%20vulnerability%20at%20th%20menu%20management%20location.md -CVE-2023-48068 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/dedevCMS/dedeCMS_XSS.md -CVE-2023-48078 - https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC -CVE-2023-4808 - https://wpscan.com/vulnerability/bb8e9f06-477b-4da3-b5a6-4f06084ecd57 -CVE-2023-48090 - https://github.com/gpac/gpac/issues/2680 -CVE-2023-4810 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2023-4810 - https://wpscan.com/vulnerability/dfde5436-dd5c-4c70-a9c2-3cb85cc99c0a -CVE-2023-48104 - https://github.com/E1tex/CVE-2023-48104 -CVE-2023-48104 - https://habr.com/ru/articles/804863/ -CVE-2023-48105 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726 -CVE-2023-48106 - https://github.com/zlib-ng/minizip-ng/issues/740 -CVE-2023-48107 - https://github.com/zlib-ng/minizip-ng/issues/739 -CVE-2023-4811 - https://wpscan.com/vulnerability/7f9271f2-4de4-4be3-8746-2a3f149eb1d1 -CVE-2023-48118 - https://github.com/el-dud3rino/CVE-Disclosures/blob/main/Quest%20Analytics%20IQCRM/Proof%20of%20Concept -CVE-2023-48121 - https://joerngermany.github.io/ezviz_vulnerability/ -CVE-2023-48122 - https://github.com/microweber/microweber/issues/1042 -CVE-2023-4814 - https://kcm.trellix.com/corporate/index?page=content&id=SB10407 -CVE-2023-4815 - https://huntr.dev/bounties/4cd3eeb4-57c9-4af2-ad19-2166c9e0fd2c -CVE-2023-4816 - https://images.go.hitachienergy.com/Web/ABBEnterpriseSoftware/%7B70b3d323-4866-42e1-8a75-58996729c1d4%7D_8DBD000172-VU-2023-23_Asset_Suite_Tagout_vulnerability_Rev1.pdf -CVE-2023-48161 - https://github.com/tacetool/TACE#cve-2023-48161 -CVE-2023-48161 - https://sourceforge.net/p/giflib/bugs/167/ -CVE-2023-48172 - http://packetstormsecurity.com/files/175800 -CVE-2023-4818 - https://blog.stmcyber.com/pax-pos-cves-2023/ -CVE-2023-4819 - https://wpscan.com/vulnerability/4423b023-cf4a-46cb-b314-7a09ac08b29a -CVE-2023-48192 - https://github.com/zxsssd/TotoLink- -CVE-2023-48197 - https://nitipoom-jar.github.io/CVE-2023-48197/ -CVE-2023-48198 - https://nitipoom-jar.github.io/CVE-2023-48198 -CVE-2023-48199 - https://nitipoom-jar.github.io/CVE-2023-48199/ -CVE-2023-4820 - https://wpscan.com/vulnerability/e866a214-a142-43c7-b93d-ff2301a3e432 -CVE-2023-48200 - https://nitipoom-jar.github.io/CVE-2023-48200/ -CVE-2023-48201 - https://mechaneus.github.io/CVE-2023-48201.html -CVE-2023-48202 - https://mechaneus.github.io/CVE-2023-48202.html -CVE-2023-48205 - http://packetstormsecurity.com/files/175802 -CVE-2023-48206 - http://packetstormsecurity.com/files/175803 -CVE-2023-48207 - http://packetstormsecurity.com/files/175804 -CVE-2023-48208 - http://packetstormsecurity.com/files/175805 -CVE-2023-4821 - https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5 -CVE-2023-48223 - https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg -CVE-2023-48225 - https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp -CVE-2023-48226 - https://bugcrowd.com/vulnerability-rating-taxonomy -CVE-2023-48226 - https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4 -CVE-2023-4823 - https://wpscan.com/vulnerability/84f53e27-d8d2-4fa3-91f9-447037508d30 -CVE-2023-48238 - https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355 -CVE-2023-4824 - https://wpscan.com/vulnerability/71c616ff-0a7e-4f6d-950b-79c469a28263 -CVE-2023-4826 - https://wpscan.com/vulnerability/99ec0add-8f4d-4d68-91aa-80b1631a53bf/ -CVE-2023-4827 - https://wpscan.com/vulnerability/d4daf0e1-8018-448a-964c-427a355e005f -CVE-2023-4829 - https://huntr.dev/bounties/babd73ca-6c80-4145-8c7d-33a883fe606b -CVE-2023-48294 - https://github.com/librenms/librenms/security/advisories/GHSA-fpq5-4vwm-78x4 -CVE-2023-48295 - https://github.com/librenms/librenms/security/advisories/GHSA-8phr-637g-pxrg -CVE-2023-48300 - https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g -CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6 -CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm -CVE-2023-48312 - https://github.com/projectcapsule/capsule-proxy/security/advisories/GHSA-fpvw-6m5v-hqfp -CVE-2023-4836 - https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc -CVE-2023-4836 - https://wpscan.com/vulnerability/c17f2534-d791-4fe3-b45b-875777585dc6 -CVE-2023-48418 - http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html -CVE-2023-4847 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ -CVE-2023-4848 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ -CVE-2023-4850 - https://github.com/RCEraser/cve/blob/main/sql_inject_2.md -CVE-2023-4850 - https://vuldb.com/?id.239259 -CVE-2023-4858 - https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md -CVE-2023-4858 - https://wpscan.com/vulnerability/ef8029e0-9282-401a-a77d-10b6656adaa6 -CVE-2023-4861 - https://wpscan.com/vulnerability/7fa03f00-25c7-4e40-8592-bb4001ce019d -CVE-2023-4862 - https://wpscan.com/vulnerability/81821bf5-69e1-4005-b3eb-d541490909cc -CVE-2023-4863 - https://blog.isosceles.com/the-webp-0day/ -CVE-2023-4863 - https://bugzilla.suse.com/show_bug.cgi?id=1215231 -CVE-2023-4863 - https://news.ycombinator.com/item?id=37478403 -CVE-2023-4863 - https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ -CVE-2023-4864 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/ -CVE-2023-4865 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/ -CVE-2023-4865 - https://vuldb.com/?id.239350 -CVE-2023-48654 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/ -CVE-2023-4868 - https://skypoc.wordpress.com/2023/09/05/vuln1/ -CVE-2023-4869 - https://skypoc.wordpress.com/2023/09/05/vuln1/ -CVE-2023-4870 - https://skypoc.wordpress.com/2023/09/05/vuln1/ -CVE-2023-48702 - https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/ -CVE-2023-48706 - https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q -CVE-2023-4871 - https://skypoc.wordpress.com/2023/09/05/vuln1/ -CVE-2023-48711 - https://github.com/cjvnjde/google-translate-api-browser/security/advisories/GHSA-4233-7q5q-m7p6 -CVE-2023-48712 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-c94j-vqr5-3mxr -CVE-2023-4872 - https://skypoc.wordpress.com/2023/09/05/vuln1/ -CVE-2023-48728 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1883 -CVE-2023-48728 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1883 -CVE-2023-4873 - https://github.com/cugerQDHJ/cve/blob/main/rce.md -CVE-2023-48730 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882 -CVE-2023-48730 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1882 -CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 -CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 -CVE-2023-48733 - https://www.openwall.com/lists/oss-security/2024/02/14/4 -CVE-2023-48736 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58 -CVE-2023-4876 - https://huntr.dev/bounties/f729d2c8-a62e-4f30-ac24-e187b0a7892a -CVE-2023-4877 - https://huntr.dev/bounties/168e9299-f8ff-40d6-9def-d097b38bad84 -CVE-2023-4878 - https://huntr.dev/bounties/655c4f77-04b2-4220-bfaf-a4d99fe86703 -CVE-2023-4879 - https://huntr.dev/bounties/7df6b167-3c39-4563-9b8a-33613e25cf27 -CVE-2023-48795 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html -CVE-2023-48795 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst -CVE-2023-48795 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/ -CVE-2023-48795 - https://www.paramiko.org/changelog.html -CVE-2023-48795 - https://www.theregister.com/2023/12/20/terrapin_attack_ssh -CVE-2023-48813 - https://github.com/slims/slims9_bulian/issues/217 -CVE-2023-48823 - http://packetstormsecurity.com/files/176030 -CVE-2023-48824 - http://packetstormsecurity.com/files/176031 -CVE-2023-48825 - http://packetstormsecurity.com/files/176033 -CVE-2023-48826 - http://packetstormsecurity.com/files/176034 -CVE-2023-48827 - http://packetstormsecurity.com/files/176036 -CVE-2023-48828 - http://packetstormsecurity.com/files/176037 -CVE-2023-48830 - http://packetstormsecurity.com/files/176038 -CVE-2023-48831 - http://packetstormsecurity.com/files/176039 -CVE-2023-48833 - http://packetstormsecurity.com/files/176042 -CVE-2023-48834 - http://packetstormsecurity.com/files/176043 -CVE-2023-48835 - http://packetstormsecurity.com/files/176045 -CVE-2023-48836 - http://packetstormsecurity.com/files/176046 -CVE-2023-48837 - http://packetstormsecurity.com/files/176048 -CVE-2023-48838 - http://packetstormsecurity.com/files/176054 -CVE-2023-48839 - http://packetstormsecurity.com/files/176055 -CVE-2023-48840 - http://packetstormsecurity.com/files/176056 -CVE-2023-48841 - http://packetstormsecurity.com/files/176058 -CVE-2023-48849 - https://github.com/delsploit/CVE-2023-48849 -CVE-2023-48858 - https://github.com/Shumerez/CVE-2023-48858 -CVE-2023-48859 - https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.md -CVE-2023-48861 - https://github.com/xieqiang11/POC4/blob/main/README.md -CVE-2023-48866 - https://nitipoom-jar.github.io/CVE-2023-48866/ -CVE-2023-48886 - https://github.com/luxiaoxun/NettyRpc/issues/53 -CVE-2023-48887 - https://github.com/fengjiachun/Jupiter/issues/115 -CVE-2023-48893 - https://github.com/slims/slims9_bulian/issues/209 -CVE-2023-48894 - https://github.com/jishenghua/jshERP/issues/98 -CVE-2023-48901 - https://packetstormsecurity.com/files/177660/Tramyardg-Autoexpress-1.3.0-SQL-Injection.html -CVE-2023-48902 - https://packetstormsecurity.com/files/177661/Tramyardg-Autoexpress-1.3.0-Authentication-Bypass.html -CVE-2023-48903 - https://packetstormsecurity.com/files/177662/Tramyardg-Autoexpress-1.3.0-Cross-Site-Scripting.html -CVE-2023-48910 - https://gist.github.com/b33t1e/2a2dc17cf36cd741b2c99425c892d826 -CVE-2023-48912 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20article%20management%20modification%20section.md -CVE-2023-48913 - https://github.com/Tiamat-ron/cms/blob/main/The%20deletion%20function%20of%20the%20Article%20Management%20Office%20exists%20in%20CSRF.md -CVE-2023-48914 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20section%20of%20article%20management.md -CVE-2023-48925 - https://security.friendsofpresta.org/modules/2023/12/07/bavideotab.html -CVE-2023-48928 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928 -CVE-2023-48929 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929 -CVE-2023-48945 - https://github.com/openlink/virtuoso-opensource/issues/1172 -CVE-2023-48946 - https://github.com/openlink/virtuoso-opensource/issues/1178 -CVE-2023-48947 - https://github.com/openlink/virtuoso-opensource/issues/1179 -CVE-2023-48948 - https://github.com/openlink/virtuoso-opensource/issues/1176 -CVE-2023-48949 - https://github.com/openlink/virtuoso-opensource/issues/1173 -CVE-2023-48950 - https://github.com/openlink/virtuoso-opensource/issues/1174 -CVE-2023-48951 - https://github.com/openlink/virtuoso-opensource/issues/1177 -CVE-2023-48952 - https://github.com/openlink/virtuoso-opensource/issues/1175 -CVE-2023-48958 - https://github.com/gpac/gpac/issues/2689 -CVE-2023-48963 - https://github.com/daodaoshao/vul_tenda_i6_1 -CVE-2023-48964 - https://github.com/daodaoshao/vul_tenda_i6_2 -CVE-2023-48967 - https://github.com/noear/solon/issues/226 -CVE-2023-4897 - https://huntr.dev/bounties/0631af48-84a3-4019-85db-f0f8b12cb0ab -CVE-2023-4898 - https://huntr.dev/bounties/a3dda692-7e8a-44a9-bd96-24cfd3f721d2 -CVE-2023-4899 - https://huntr.dev/bounties/70a2fb18-f030-4abb-9ddc-13f94107ac9d -CVE-2023-49000 - https://github.com/actuator/com.artis.browser/blob/main/CWE-94.md -CVE-2023-49001 - https://github.com/actuator/com.gurry.kvbrowser/blob/main/CWE-94.md -CVE-2023-49002 - https://github.com/actuator/com.sinous.voice.dialer/blob/main/CWE-928.md -CVE-2023-49003 - https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md -CVE-2023-49006 - https://github.com/Hebing123/cve/issues/5 -CVE-2023-49006 - https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/ -CVE-2023-49032 - https://github.com/ltb-project/self-service-password/issues/816 -CVE-2023-49040 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_internet_set.md -CVE-2023-49042 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/setSchedWifi.md -CVE-2023-49043 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md -CVE-2023-49044 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_wifi_set.md -CVE-2023-49046 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md -CVE-2023-49047 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md -CVE-2023-49052 - https://github.com/Cyber-Wo0dy/CVE-2023-49052 -CVE-2023-49052 - https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload -CVE-2023-49070 - http://packetstormsecurity.com/files/176323/Apache-OFBiz-18.12.09-Remote-Code-Execution.html -CVE-2023-49076 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-xx63-4jr8-9ghc -CVE-2023-49078 - https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq -CVE-2023-49079 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-3f39-6537-3cgc -CVE-2023-49081 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2 -CVE-2023-49082 - https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b -CVE-2023-49082 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx -CVE-2023-49083 - http://www.openwall.com/lists/oss-security/2023/11/29/2 -CVE-2023-49083 - https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97 -CVE-2023-49084 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html -CVE-2023-49085 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html -CVE-2023-49086 - https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr -CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h -CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x -CVE-2023-49091 - https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x -CVE-2023-49093 - https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7 -CVE-2023-49096 - https://ffmpeg.org/ffmpeg-filters.html#drawtext-1 -CVE-2023-49100 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html -CVE-2023-4911 - http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html -CVE-2023-4911 - http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html -CVE-2023-4911 - http://seclists.org/fulldisclosure/2023/Oct/11 -CVE-2023-4911 - http://www.openwall.com/lists/oss-security/2023/10/03/2 -CVE-2023-4911 - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt -CVE-2023-49114 - http://seclists.org/fulldisclosure/2024/Mar/10 -CVE-2023-49114 - https://r.sec-consult.com/qognify -CVE-2023-4912 - https://gitlab.com/gitlab-org/gitlab/-/issues/424882 -CVE-2023-4913 - https://huntr.dev/bounties/d2a9ec4d-1b4b-470b-87da-ec069f5925ae -CVE-2023-4914 - https://huntr.dev/bounties/cdd995b2-c983-428b-a73a-827b61b7c06b -CVE-2023-49147 - http://packetstormsecurity.com/files/176206/PDF24-Creator-11.15.1-Local-Privilege-Escalation.html -CVE-2023-49147 - http://seclists.org/fulldisclosure/2023/Dec/18 -CVE-2023-49147 - https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-pdf24-creator-geek-software-gmbh/ -CVE-2023-49210 - https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e -CVE-2023-4922 - https://wpscan.com/vulnerability/968d87c0-af60-45ea-b34e-8551313cc8df -CVE-2023-49231 - http://seclists.org/fulldisclosure/2024/Apr/1 -CVE-2023-49231 - https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2023-003.txt -CVE-2023-49231 - https://www.schutzwerk.com/blog/schutzwerk-sa-2023-003/ -CVE-2023-4925 - https://wpscan.com/vulnerability/0b094cba-9288-4c9c-87a9-bdce286fe8b6 -CVE-2023-49275 - https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975 -CVE-2023-49276 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-v4v2-8h88-65qj -CVE-2023-4928 - https://huntr.dev/bounties/cb72cc17-5a0d-4392-9a5f-a13aa773de9e -CVE-2023-49287 - http://packetstormsecurity.com/files/176060/TinyDir-1.2.5-Buffer-Overflow.html -CVE-2023-49287 - https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf -CVE-2023-49290 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf -CVE-2023-49291 - https://securitylab.github.com/research/github-actions-untrusted-input -CVE-2023-49293 - https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97 -CVE-2023-49294 - https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f -CVE-2023-49297 - https://github.com/iterative/PyDrive2/security/advisories/GHSA-v5f6-hjmf-9mc5 -CVE-2023-49298 - https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/ -CVE-2023-4930 - https://wpscan.com/vulnerability/c73b3276-e6f1-4f22-a888-025e5d0504f2 -CVE-2023-49313 - https://github.com/louiselalanne/CVE-2023-49313 -CVE-2023-49314 - https://asana.com/pt/download -CVE-2023-49328 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2023-4933 - https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7 -CVE-2023-49355 - https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md -CVE-2023-49356 - https://github.com/linzc21/bug-reports/blob/main/reports/mp3gain/1.6.2/stack-buffer-overflow/CVE-2023-49356.md -CVE-2023-49371 - https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md -CVE-2023-49372 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md -CVE-2023-49373 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20broadcast%20image.md -CVE-2023-49374 - https://github.com/li-yu320/cms/blob/main/There%20is%20CSRF%20in%20the%20rotation%20image%20editing%20section.md -CVE-2023-49375 - https://github.com/cui2shark/cms/blob/main/There%20is%20CSRF%20in%20the%20modification%20of%20the%20friendship%20link.md -CVE-2023-49376 - https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md -CVE-2023-49377 - https://github.com/cui2shark/cms/blob/main/Modification%20of%20CSRF%20in%20Label%20Management.md -CVE-2023-49378 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md -CVE-2023-49379 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20new%20location%20of%20the%20friendship%20link.md -CVE-2023-49380 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20friendship%20link.md -CVE-2023-49381 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20modification%20point%20of%20the%20custom%20table.md -CVE-2023-49382 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20the%20custom%20table.md -CVE-2023-49383 - https://github.com/cui2shark/cms/blob/main/Added%20CSRF%20in%20Label%20Management.md -CVE-2023-49391 - https://github.com/free5gc/free5gc/issues/497 -CVE-2023-49395 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md -CVE-2023-49396 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md -CVE-2023-49397 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md -CVE-2023-49398 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md -CVE-2023-49402 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md -CVE-2023-49403 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md -CVE-2023-49404 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setAdvancedSetList/w30e_setAdvancedSetList.md -CVE-2023-49405 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_UploadCfg/w30e_UploadCfg.md -CVE-2023-49406 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_telnet/w30e_telnet.md -CVE-2023-49408 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md -CVE-2023-49409 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_telnet/AX3_telnet.md -CVE-2023-49410 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setIPv6Status/w30e_setIPv6Status.md -CVE-2023-49411 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_deleteMesh/w30e_deleteMesh.md -CVE-2023-49417 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg -CVE-2023-49418 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setIpPortFilterRules -CVE-2023-49424 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.md -CVE-2023-49425 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/setMacFilterCfg.md -CVE-2023-49426 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.md -CVE-2023-49428 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.md -CVE-2023-49431 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.md -CVE-2023-49432 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.md -CVE-2023-49433 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetVirtualServerCfg.md -CVE-2023-49435 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-3.md -CVE-2023-49436 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-2.md -CVE-2023-49437 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.md -CVE-2023-49438 - https://github.com/brandon-t-elliott/CVE-2023-49438 -CVE-2023-49446 - https://github.com/ysuzhangbin/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20newly%20added%20navigation%20management%20area.md -CVE-2023-49447 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20navigation%20management%20modification%20location.md -CVE-2023-49448 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20navigation%20management.md -CVE-2023-49453 - https://nitipoom-jar.github.io/CVE-2023-49453/ -CVE-2023-49460 - https://github.com/strukturag/libheif/issues/1046 -CVE-2023-49462 - https://github.com/strukturag/libheif/issues/1043 -CVE-2023-49463 - https://github.com/strukturag/libheif/issues/1042 -CVE-2023-49464 - https://github.com/strukturag/libheif/issues/1044 -CVE-2023-49465 - https://github.com/strukturag/libde265/issues/435 -CVE-2023-49467 - https://github.com/strukturag/libde265/issues/434 -CVE-2023-49468 - https://github.com/strukturag/libde265/issues/432 -CVE-2023-49471 - https://github.com/zunak/CVE-2023-49471 -CVE-2023-49484 - https://github.com/jiaofj/cms/blob/main/There%20is%20a%20storage%20based%20XSS%20in%20the%20article%20management%20department.md -CVE-2023-49492 - https://github.com/Hebing123/cve/issues/2 -CVE-2023-49493 - https://github.com/Hebing123/cve/issues/2 -CVE-2023-49494 - https://github.com/Hebing123/cve/issues/3 -CVE-2023-4950 - https://wpscan.com/vulnerability/73db1ee8-06a2-41b6-b287-44e25f5f2e58 -CVE-2023-49501 - https://trac.ffmpeg.org/ticket/10686 -CVE-2023-49501 - https://trac.ffmpeg.org/ticket/10686#no1 -CVE-2023-49502 - https://trac.ffmpeg.org/ticket/10688 -CVE-2023-49528 - https://trac.ffmpeg.org/ticket/10691 -CVE-2023-49544 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion -CVE-2023-49549 - https://github.com/cesanta/mjs/issues/251 -CVE-2023-49550 - https://github.com/cesanta/mjs/issues/252 -CVE-2023-49551 - https://github.com/cesanta/mjs/issues/257 -CVE-2023-49553 - https://github.com/cesanta/mjs/issues/253 -CVE-2023-49554 - https://github.com/yasm/yasm/issues/249 -CVE-2023-49555 - https://github.com/yasm/yasm/issues/248 -CVE-2023-49556 - https://github.com/yasm/yasm/issues/250 -CVE-2023-49557 - https://github.com/yasm/yasm/issues/253 -CVE-2023-49558 - https://github.com/yasm/yasm/issues/252 -CVE-2023-49563 - https://gist.github.com/ph4nt0mbyt3/b237bfb06b2bff405ab47e4ea52c0bd2 -CVE-2023-49583 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ -CVE-2023-49606 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889 -CVE-2023-4965 - https://github.com/ctflearner/Vulnerability/blob/main/PHPIPAM/Open_Redirect.md -CVE-2023-4966 - http://packetstormsecurity.com/files/175323/Citrix-Bleed-Session-Token-Leakage-Proof-Of-Concept.html -CVE-2023-4969 - https://blog.trailofbits.com -CVE-2023-4969 - https://kb.cert.org/vuls/id/446598 -CVE-2023-4969 - https://www.kb.cert.org/vuls/id/446598 -CVE-2023-49693 - https://kb.netgear.com/000065886/Security-Advisory-for-Sensitive-Information-Disclosure-on-the-NMS300-PSV-2023-0126 -CVE-2023-49693 - https://www.tenable.com/security/research/tra-2023-39 -CVE-2023-49694 - https://www.tenable.com/security/research/tra-2023-39 -CVE-2023-4970 - https://wpscan.com/vulnerability/845bbfdd-fe9f-487c-91a0-5fe10403d8a2 -CVE-2023-4971 - https://wpscan.com/vulnerability/421194e1-6c3f-4972-8f3c-de1b9d2bcb13 -CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 -CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 -CVE-2023-49721 - https://www.openwall.com/lists/oss-security/2024/02/14/4 -CVE-2023-4973 - http://packetstormsecurity.com/files/174680/Academy-LMS-6.2-Cross-Site-Scripting.html -CVE-2023-4974 - http://packetstormsecurity.com/files/174681/Academy-LMS-6.2-SQL-Injection.html -CVE-2023-4977 - https://huntr.dev/bounties/3db8a1a4-ca2d-45df-be18-a959ebf82fbc -CVE-2023-4978 - https://huntr.dev/bounties/cefd9295-2053-4e6e-a130-7e1f845728f4 -CVE-2023-49786 - http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html -CVE-2023-49786 - http://seclists.org/fulldisclosure/2023/Dec/24 -CVE-2023-4979 - https://huntr.dev/bounties/e67f8f5d-4048-404f-9b86-cb6b8719b77f -CVE-2023-49799 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv -CVE-2023-4980 - https://huntr.dev/bounties/470b9b13-b7fe-4b3f-a186-fdc5dc193976 -CVE-2023-49800 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h -CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3 -CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g -CVE-2023-49805 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-mj22-23ff-2hrr -CVE-2023-4981 - https://huntr.dev/bounties/1f014494-49a9-4bf0-8d43-a675498b9609 -CVE-2023-49810 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898 -CVE-2023-4982 - https://huntr.dev/bounties/d3c2dd8a-883c-400e-a1a7-326c3fd37b9e -CVE-2023-4987 - http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html -CVE-2023-49923 - https://www.elastic.co/community/security -CVE-2023-49950 - https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md -CVE-2023-49964 - https://github.com/mbadanoiu/CVE-2023-49964 -CVE-2023-49965 - https://hackintoanetwork.com/blog/2023-starlink-router-gen2-xss-eng/ -CVE-2023-49967 - https://github.com/typecho/typecho/issues/1648 -CVE-2023-49990 - https://github.com/espeak-ng/espeak-ng/issues/1824 -CVE-2023-49991 - https://github.com/espeak-ng/espeak-ng/issues/1825 -CVE-2023-49992 - https://github.com/espeak-ng/espeak-ng/issues/1827 -CVE-2023-49993 - https://github.com/espeak-ng/espeak-ng/issues/1826 -CVE-2023-49994 - https://github.com/espeak-ng/espeak-ng/issues/1823 -CVE-2023-49999 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setUmountUSBPartition/w30e_setUmountUSBPartition.md -CVE-2023-50000 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_resetMesh/w30e_resetMesh.md -CVE-2023-50001 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_upgradeMeshOnline/w30e_upgradeMeshOnline.md -CVE-2023-50002 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md -CVE-2023-50007 - https://trac.ffmpeg.org/ticket/10700 -CVE-2023-50008 - https://trac.ffmpeg.org/ticket/10701 -CVE-2023-50009 - https://ffmpeg.org/ -CVE-2023-50009 - https://trac.ffmpeg.org/ticket/10699 -CVE-2023-50010 - https://ffmpeg.org/ -CVE-2023-50010 - https://trac.ffmpeg.org/ticket/10702 -CVE-2023-50011 - https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html -CVE-2023-50015 - https://github.com/n0obit4/Vulnerability_Disclosure/tree/main/CVE-2023-50015 -CVE-2023-50017 - https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md -CVE-2023-50027 - https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html -CVE-2023-5003 - https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748 -CVE-2023-50030 - https://security.friendsofpresta.org/modules/2024/01/16/jmssetting.html -CVE-2023-5005 - https://wpscan.com/vulnerability/bfb174d4-7658-4883-a682-d06bda89ec44 -CVE-2023-5006 - https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8 -CVE-2023-50061 - https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html -CVE-2023-50069 - https://github.com/holomekc/wiremock/issues/51 -CVE-2023-50072 - https://github.com/ahrixia/CVE-2023-50072 -CVE-2023-50089 - https://github.com/NoneShell/Vulnerabilities/blob/main/NETGEAR/WNR2000v4-1.0.0.70-Authorized-Command-Injection.md -CVE-2023-50094 - https://www.mattz.io/posts/cve-2023-50094/ -CVE-2023-50096 - https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md -CVE-2023-50110 - https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357 -CVE-2023-50120 - https://github.com/gpac/gpac/issues/2698 -CVE-2023-50123 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50124 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50125 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50126 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50127 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50128 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50129 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -CVE-2023-50137 - https://github.com/yukino-hiki/CVE/blob/main/3/There%20is%20a%20storage%20type%20xss%20in%20the%20site%20management%20office.md -CVE-2023-50164 - http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html -CVE-2023-50172 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897 -CVE-2023-5019 - https://github.com/ggg48966/cve/blob/main/sql.md -CVE-2023-5023 - https://github.com/RCEraser/cve/blob/main/sql_inject_3.md -CVE-2023-5024 - https://youtu.be/evdhcUlD1EQ -CVE-2023-50245 - https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj -CVE-2023-50246 - https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc -CVE-2023-50250 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 -CVE-2023-50251 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2 -CVE-2023-50252 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr -CVE-2023-50253 - https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f -CVE-2023-50254 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495 -CVE-2023-50255 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 -CVE-2023-50257 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98 -CVE-2023-50258 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g -CVE-2023-50258 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/ -CVE-2023-50259 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv -CVE-2023-50259 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/ -CVE-2023-50260 - https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw -CVE-2023-50262 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2 -CVE-2023-50264 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ -CVE-2023-50265 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ -CVE-2023-50266 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ -CVE-2023-5027 - https://vuldb.com/?id.239869 -CVE-2023-5028 - https://vuldb.com/?id.239870 -CVE-2023-5030 - https://github.com/husterdjx/cve/blob/main/sql1.md -CVE-2023-5033 - https://vuldb.com/?id.239877 -CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032 -CVE-2023-5036 - https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d -CVE-2023-5041 - https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523 -CVE-2023-50422 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ -CVE-2023-50423 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ -CVE-2023-50424 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ -CVE-2023-50429 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf -CVE-2023-50445 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html -CVE-2023-50446 - https://github.com/mullvad/mullvadvpn-app/pull/5398 -CVE-2023-50447 - https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/ -CVE-2023-50447 - https://duartecsantos.github.io/2024-01-02-CVE-2023-50447/ -CVE-2023-50449 - https://gitee.com/heyewei/JFinalcms/issues/I7WGC6 -CVE-2023-50465 - https://github.com/Crypt0Cr33py/monicahqvuln -CVE-2023-50470 - https://blog.csdn.net/weixin_72610998/article/details/134784075?spm=1001.2014.3001.5502 -CVE-2023-50471 - https://github.com/DaveGamble/cJSON/issues/802 -CVE-2023-50472 - https://github.com/DaveGamble/cJSON/issues/803 -CVE-2023-50488 - https://github.com/roman-mueller/PoC/tree/master/CVE-2023-50488 -CVE-2023-50488 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ -CVE-2023-50495 - https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html -CVE-2023-50559 - https://github.com/OpenXiangShan/XiangShan/issues/2534 -CVE-2023-50569 - https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf -CVE-2023-50569 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 -CVE-2023-5057 - https://wpscan.com/vulnerability/58a63507-f0fd-46f1-a80c-6b1c41dddcf5 -CVE-2023-50585 - https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.md -CVE-2023-50589 - https://github.com/VauP/CVE-IDs/blob/main/proof_of_concept.md -CVE-2023-5060 - https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3 -CVE-2023-50612 - https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA -CVE-2023-50628 - https://github.com/libming/libming/issues/289 -CVE-2023-50630 - https://github.com/xiweicheng/tms/issues/19 -CVE-2023-50685 - https://github.com/UnderwaterCoder/Hipcam-RTSP-Format-Validation-Vulnerability -CVE-2023-50693 - https://github.com/dom96/jester/issues/326 -CVE-2023-50694 - https://github.com/dom96/httpbeast/issues/95 -CVE-2023-50715 - https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83 -CVE-2023-5072 - https://github.com/stleary/JSON-java/issues/758 -CVE-2023-50720 - https://jira.xwiki.org/browse/XWIKI-20371 -CVE-2023-50731 - https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/ -CVE-2023-5074 - https://www.tenable.com/security/research/tra-2023-32 -CVE-2023-5075 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-5078 - https://support.lenovo.com/us/en/product_security/LEN-141775 -CVE-2023-50811 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2023-5082 - https://wpscan.com/vulnerability/13a196ba-49c7-4575-9a49-3ef9eb2348f3 -CVE-2023-5084 - https://huntr.dev/bounties/f3340570-6e59-4c72-a7d1-d4b829b4fb45 -CVE-2023-5087 - https://wpscan.com/vulnerability/3b45cc0b-7378-49f3-900e-d0e18cd4b878 -CVE-2023-5089 - https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d -CVE-2023-50914 - https://github.com/anvilsecure/gog-galaxy-app-research -CVE-2023-50914 - https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50914%20-%20LPE.md -CVE-2023-50914 - https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/ -CVE-2023-50915 - https://github.com/anvilsecure/gog-galaxy-app-research -CVE-2023-50915 - https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50915%20-%20DoS.md -CVE-2023-50916 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -CVE-2023-50916 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-001_kyocera-v2.txt -CVE-2023-50917 - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html -CVE-2023-50917 - http://packetstormsecurity.com/files/176669/MajorDoMo-Command-Injection.html -CVE-2023-50919 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html -CVE-2023-50965 - https://github.com/starnight/MicroHttpServer/issues/5 -CVE-2023-50966 - https://github.com/P3ngu1nW/CVE_Request/blob/main/erlang-jose.md -CVE-2023-5098 - https://wpscan.com/vulnerability/3167a83c-291e-4372-a42e-d842205ba722 -CVE-2023-50980 - https://github.com/weidai11/cryptopp/issues/1248 -CVE-2023-50982 - https://rehmeinfosec.de/labor/cve-2023-50982 -CVE-2023-51006 - https://github.com/firmianay/security-issues/tree/main/app/cn.etouch.ecalendar -CVE-2023-51010 - https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro -CVE-2023-51011 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanPriDns/ -CVE-2023-51012 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/ -CVE-2023-51013 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanNetmask/ -CVE-2023-51014 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig_lanSecDns/ -CVE-2023-51015 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/ -CVE-2023-51016 - https://815yang.github.io/2023/12/10/EX1800T/TOTOlink%20EX1800T_V9.1.0cu.2112_B20220316(setRebootScheCfg)/ -CVE-2023-51017 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanIp/ -CVE-2023-51018 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setWiFiApConfig-opmode/ -CVE-2023-51019 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-key5g/ -CVE-2023-51020 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langType/ -CVE-2023-51021 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setRptWizardCfg-merge/ -CVE-2023-51022 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langFlag/ -CVE-2023-51023 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031NTPSyncWithHost-host_time/ -CVE-2023-51024 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setNtpCfg-tz/ -CVE-2023-51025 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setPasswordCfg-admuser/ -CVE-2023-51026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setRebootScheCfg-hour/ -CVE-2023-51027 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliAuthMode/ -CVE-2023-51028 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliChannel/ -CVE-2023-51033 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_setOpModeCfg/ -CVE-2023-51034 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_UploadFirmwareFile/ -CVE-2023-51035 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost/ -CVE-2023-5104 - https://huntr.dev/bounties/1b5c6d9f-941e-4dd7-a964-42b53d6826b0 -CVE-2023-51042 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 -CVE-2023-5105 - https://wpscan.com/vulnerability/d40c7108-bad6-4ed3-8539-35c0f57e62cc -CVE-2023-51059 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220120-01_MOKOSmart_MKGW1_Gateway_Improper_Session_Management -CVE-2023-51062 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md -CVE-2023-51063 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md -CVE-2023-51064 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51064.md -CVE-2023-51065 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md -CVE-2023-51066 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md -CVE-2023-51067 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51067.md -CVE-2023-51068 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md -CVE-2023-51070 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md -CVE-2023-51071 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51071.md -CVE-2023-51074 - https://github.com/json-path/JsonPath/issues/973 -CVE-2023-51075 - https://github.com/dromara/hutool/issues/3421 -CVE-2023-51079 - https://github.com/mvel/mvel/issues/348 -CVE-2023-51079 - https://github.com/mvel/mvel/issues/348#issuecomment-1874047271 -CVE-2023-5108 - https://wpscan.com/vulnerability/1b277929-e88b-4ab6-9190-526e75f5ce7a -CVE-2023-51084 - https://github.com/PoppingSnack/VulReport/issues/12 -CVE-2023-51090 - https://github.com/GD008/TENDA/blob/main/M3/getWeiXinConfig/M3_getWeiXinConfig.md -CVE-2023-51091 - https://github.com/GD008/TENDA/blob/main/M3/cookie/M3_cookie.md -CVE-2023-51092 - https://github.com/GD008/TENDA/blob/main/M3/upgrade/M3_upgrade.md -CVE-2023-51093 - https://github.com/GD008/TENDA/blob/main/M3/setVlanInfo/M3_setVlanInfo.md -CVE-2023-51094 - https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md -CVE-2023-51095 - https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md -CVE-2023-51097 - https://github.com/GD008/TENDA/blob/main/W9/W9_setAutoPing/W9_setAutoPing.md -CVE-2023-51098 - https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md -CVE-2023-51099 - https://github.com/GD008/TENDA/blob/main/W9/W9_execommand/W9_execommand.md -CVE-2023-51100 - https://github.com/GD008/TENDA/blob/main/W9/W9_getDiagnoseInfo/W9_getDiagnoseInfo.md -CVE-2023-51101 - https://github.com/GD008/TENDA/blob/main/W9/W9_setUplinkInfo/W9_setUplinkInfo.md -CVE-2023-51102 - https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md -CVE-2023-51123 - https://github.com/WhereisRain/dir-815 -CVE-2023-51123 - https://github.com/WhereisRain/dir-815/blob/main/README.md -CVE-2023-51126 - https://github.com/risuxx/CVE-2023-51126 -CVE-2023-51141 - https://gist.github.com/ipxsec/1680d29c49fe368be81b037168175b10 -CVE-2023-51142 - https://gist.github.com/ipxsec/b20383620c9e1d5300f7716e62e8a82f -CVE-2023-51146 - https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md -CVE-2023-51147 - https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51147.md -CVE-2023-51148 - https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md -CVE-2023-5119 - https://wpscan.com/vulnerability/229207bb-8f8d-4579-a8e2-54516474ccb4 -CVE-2023-51210 - https://medium.com/@nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91 -CVE-2023-51219 - https://stulle123.github.io/posts/kakaotalk-account-takeover/ -CVE-2023-5124 - https://wpscan.com/vulnerability/1ef86546-3467-432c-a863-1ca3e5c65bd4/ -CVE-2023-51252 - https://github.com/sanluan/PublicCMS/issues/79 -CVE-2023-51257 - https://github.com/jasper-software/jasper/issues/367 -CVE-2023-51258 - https://github.com/hanxuer/crashes/blob/main/yasm/04/readme.md -CVE-2023-51277 - https://www.youtube.com/watch?v=c0nawqA_bdI -CVE-2023-5133 - https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3 -CVE-2023-5137 - https://wpscan.com/vulnerability/79b79e9c-ea4f-4188-a1b5-61dda0b5d434 -CVE-2023-51385 - https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html -CVE-2023-51387 - https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj -CVE-2023-5139 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-5139 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453 -CVE-2023-5140 - https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171 -CVE-2023-5141 - https://wpscan.com/vulnerability/9997fe8d-8027-4ae0-9885-a1f5565f2d1a -CVE-2023-5142 - https://vuldb.com/?id.240238 -CVE-2023-5143 - https://github.com/ggg48966/cve/blob/main/D-LINK%20-DAR-7000_rce_%20webmailattach.md -CVE-2023-5144 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20updateos.md -CVE-2023-51442 - https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r -CVE-2023-51443 - http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html -CVE-2023-51444 - https://github.com/geoserver/geoserver/security/advisories/GHSA-9v5q-2gwq-q9hq -CVE-2023-51444 - https://osgeo-org.atlassian.net/browse/GEOS-11176 -CVE-2023-51445 - https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w -CVE-2023-51445 - https://osgeo-org.atlassian.net/browse/GEOS-11148 -CVE-2023-51448 - https://github.com/Cacti/cacti/security/advisories/GHSA-w85f-7c4w-7594 -CVE-2023-5147 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_upload_%20updateos.md -CVE-2023-5148 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20uploadfile.md -CVE-2023-5150 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20web.md -CVE-2023-5152 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_sql_%20importexport.md -CVE-2023-5153 - https://vuldb.com/?id.240249 -CVE-2023-51650 - https://github.com/dromara/hertzbeat/security/advisories/GHSA-rrc5-qpxr-5jm2 -CVE-2023-51661 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j -CVE-2023-51664 - https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 -CVE-2023-5167 - https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437 -CVE-2023-51698 - https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2 -CVE-2023-51717 - https://dataiku.com -CVE-2023-5173 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823172 -CVE-2023-5174 - https://bugzilla.mozilla.org/show_bug.cgi?id=1848454 -CVE-2023-51747 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ -CVE-2023-5175 - https://bugzilla.mozilla.org/show_bug.cgi?id=1849704 -CVE-2023-51764 - https://github.com/duy-31/CVE-2023-51764 -CVE-2023-51764 - https://github.com/eeenvik1/CVE-2023-51764 -CVE-2023-51764 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ -CVE-2023-51765 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ -CVE-2023-51766 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ -CVE-2023-5177 - https://wpscan.com/vulnerability/a67b9c21-a35a-4cdb-9627-a5932334e5f0 -CVE-2023-51771 - https://github.com/starnight/MicroHttpServer/issues/8 -CVE-2023-51772 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/ -CVE-2023-51775 - https://bitbucket.org/b_c/jose4j/issues/212 -CVE-2023-51790 - https://github.com/Piwigo/AdminTools/issues/21 -CVE-2023-51790 - https://github.com/Piwigo/Piwigo/issues/2069 -CVE-2023-51791 - https://ffmpeg.org/ -CVE-2023-51791 - https://trac.ffmpeg.org/ticket/10738 -CVE-2023-51792 - https://github.com/strukturag/libde265/issues/427 -CVE-2023-51793 - https://ffmpeg.org/ -CVE-2023-51793 - https://trac.ffmpeg.org/ticket/10743 -CVE-2023-51794 - https://trac.ffmpeg.org/ticket/10746 -CVE-2023-51795 - https://ffmpeg.org/ -CVE-2023-51795 - https://trac.ffmpeg.org/ticket/10749 -CVE-2023-51796 - https://ffmpeg.org/ -CVE-2023-51796 - https://trac.ffmpeg.org/ticket/10753 -CVE-2023-51797 - https://ffmpeg.org/ -CVE-2023-51797 - https://trac.ffmpeg.org/ticket/10756 -CVE-2023-51798 - https://ffmpeg.org/ -CVE-2023-51798 - https://trac.ffmpeg.org/ticket/10758 -CVE-2023-51806 - https://github.com/ujcms/ujcms/issues/8 -CVE-2023-5181 - https://wpscan.com/vulnerability/564ad2b0-6ba6-4415-98d7-8d41bc1c3d44 -CVE-2023-51810 - https://github.com/Pastea/CVE-2023-51810 -CVE-2023-51813 - https://github.com/xxxxfang/CVE-Apply/blob/main/csrf-1.md -CVE-2023-51820 - https://github.com/roman-mueller/PoC/tree/master/CVE-2023-51820 -CVE-2023-51820 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ -CVE-2023-51828 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -CVE-2023-5184 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-5184 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g -CVE-2023-5192 - https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7 -CVE-2023-51939 - https://github.com/liang-junkai/Relic-bbs-fault-injection -CVE-2023-51939 - https://github.com/relic-toolkit/relic/issues/284 -CVE-2023-51949 - https://github.com/cui2shark/security/blob/main/Added%20CSRF%20in%20Role%20Controller.md -CVE-2023-51951 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2023-004 -CVE-2023-5197 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -CVE-2023-5198 - https://gitlab.com/gitlab-org/gitlab/-/issues/416957 -CVE-2023-51987 - https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2 -CVE-2023-51989 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md -CVE-2023-52026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/ -CVE-2023-52027 - https://815yang.github.io/2023/12/23/a3700r/TOTOLINKA3700R_NTPSyncWithHost/ -CVE-2023-52028 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_setTracerouteCfg/ -CVE-2023-5203 - https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932 -CVE-2023-52031 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_UploadFirmwareFile/ -CVE-2023-52032 - https://815yang.github.io/2023/12/24/cve6/EX1200T_V4.1.2cu.5232_B20210713_downloadFlile/ -CVE-2023-52039 - https://github.com/Beckaf/vunl/blob/main/TOTOLINK/X6000R/2/2.md -CVE-2023-5204 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html -CVE-2023-52041 - https://kee02p.github.io/2024/01/13/CVE-2023-52041/ -CVE-2023-52042 - https://kee02p.github.io/2024/01/13/CVE-2023-52042/ -CVE-2023-52043 - https://exploots.github.io/posts/2024/01/18/d-link-covr-1102-vulnerability.html -CVE-2023-52047 - https://github.com/chongfujun/test/blob/main/2023-52047.docx -CVE-2023-52059 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md -CVE-2023-52060 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52060/README.md -CVE-2023-52064 - https://github.com/wuzhicms/wuzhicms/issues/208 -CVE-2023-52072 - https://github.com/zouyang0714/cms/blob/main/2.md -CVE-2023-52073 - https://github.com/zouyang0714/cms/blob/main/3.md -CVE-2023-52074 - https://github.com/zouyang0714/cms/blob/main/1.md -CVE-2023-52075 - https://github.com/ReVanced/revanced-api/security/advisories/GHSA-852x-grxp-8p3q -CVE-2023-52076 - https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 -CVE-2023-5209 - https://wpscan.com/vulnerability/dea6077a-81ee-451f-b049-3749a2252c88 -CVE-2023-5210 - https://wpscan.com/vulnerability/1c3ff47a-12a5-49c1-a166-2c57e5c0d0aa -CVE-2023-5211 - https://wpscan.com/vulnerability/aa868380-cda7-4ec6-8a3f-d9fa692908f2 -CVE-2023-5212 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html -CVE-2023-52137 - https://github.com/tj-actions/verify-changed-files/security/advisories/GHSA-ghm2-rq8q-wrhc -CVE-2023-52138 - https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v -CVE-2023-52139 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm -CVE-2023-52153 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -CVE-2023-52154 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -CVE-2023-52155 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -CVE-2023-5221 - https://github.com/Fovker8/cve/blob/main/rce.md -CVE-2023-5221 - https://vuldb.com/?id.240363 -CVE-2023-5222 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_HardcodedPassword.md -CVE-2023-52240 - https://kantega-sso.atlassian.net/wiki/spaces/KSE/pages/1226473473/Security+Vulnerability+HTML+injection+Cross-site+scripting+in+SAML+POST+binding+Kantega+SSO+Enterprise -CVE-2023-52251 - http://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html -CVE-2023-52251 - https://github.com/BobTheShoplifter/CVE-2023-52251-POC -CVE-2023-52252 - https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/ -CVE-2023-52252 - https://www.exploit-db.com/exploits/51309 -CVE-2023-52257 - https://packetstormsecurity.com/files/174815 -CVE-2023-52265 - https://github.com/wbowm15/jubilant-enigma/blob/main/writeup.md -CVE-2023-52266 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 -CVE-2023-52266 - https://github.com/hongliuliao/ehttp/issues/38 -CVE-2023-52267 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 -CVE-2023-52267 - https://github.com/hongliuliao/ehttp/issues/38 -CVE-2023-52269 - https://github.com/vipercalling/XSSsecurityGateway/blob/main/finding -CVE-2023-5227 - https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8 -CVE-2023-52277 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php -CVE-2023-5228 - https://wpscan.com/vulnerability/50ae7008-46f0-4f89-ae98-65dcabe4ef09 -CVE-2023-5229 - https://wpscan.com/vulnerability/fb6ce636-9e0d-4c5c-bb95-dde1d2581245 -CVE-2023-52302 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md -CVE-2023-52303 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md -CVE-2023-52304 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md -CVE-2023-52305 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md -CVE-2023-52306 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md -CVE-2023-52307 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md -CVE-2023-52308 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md -CVE-2023-52309 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md -CVE-2023-52310 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md -CVE-2023-52311 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md -CVE-2023-52312 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md -CVE-2023-52313 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md -CVE-2023-52314 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md -CVE-2023-52339 - https://github.com/Matroska-Org/libebml/issues/147 -CVE-2023-5235 - https://wpscan.com/vulnerability/35c9a954-37fc-4818-a71f-34aaaa0fa3db -CVE-2023-52355 - https://gitlab.com/libtiff/libtiff/-/issues/621 -CVE-2023-52356 - https://gitlab.com/libtiff/libtiff/-/issues/622 -CVE-2023-5237 - https://research.cleantalk.org/cve-2023-5237-memberlite-shortcodes-stored-xss-via-shortcode -CVE-2023-5237 - https://wpscan.com/vulnerability/a46d686c-6234-4aa8-a656-00a65c55d0b0 -CVE-2023-5238 - https://wpscan.com/vulnerability/47a5fbfd-f47c-4356-8567-b29dadb48423 -CVE-2023-5239 - https://wpscan.com/vulnerability/1d748f91-773b-49d6-8f68-a27d397713c3 -CVE-2023-5241 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html -CVE-2023-52424 - https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf -CVE-2023-5243 - https://wpscan.com/vulnerability/ad895200-a03a-4e92-b256-d6991547d38a -CVE-2023-52430 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2023-5244 - https://huntr.dev/bounties/a3bd58ba-ca59-4cba-85d1-799f73a76470 -CVE-2023-5245 - https://github.com/combust/mleap/pull/866#issuecomment-1738032225 -CVE-2023-5245 - https://research.jfrog.com/vulnerabilities/mleap-path-traversal-rce-xray-532656/ -CVE-2023-52555 - https://github.com/mongo-express/mongo-express/issues/1338 -CVE-2023-52564 - http://www.openwall.com/lists/oss-security/2024/04/11/9 -CVE-2023-5259 - https://github.com/RCEraser/cve/blob/main/ForU-CMS.md -CVE-2023-5264 - https://github.com/yhy217/huakecms-vul/issues/1 -CVE-2023-5267 - https://github.com/kpz-wm/cve/blob/main/sql.md -CVE-2023-5284 - https://vuldb.com/?id.240912 -CVE-2023-5286 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App -CVE-2023-5287 - https://vuldb.com/?id.240915 -CVE-2023-5289 - https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce -CVE-2023-5297 - https://vuldb.com/?id.240927 -CVE-2023-5302 - https://github.com/rohit0x5/poc/blob/main/cve_2 -CVE-2023-5307 - https://research.cleantalk.org/cve-2023-5307-photos-and-files-contest-gallery-contact-form-21-2-8-1-unauthenticated-stored-xss-via-http-headers -CVE-2023-5307 - https://wpscan.com/vulnerability/6fac1e09-21ab-430d-b56d-195e7238c08c -CVE-2023-5311 - https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311 -CVE-2023-5313 - https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md -CVE-2023-5316 - https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43 -CVE-2023-5317 - https://huntr.dev/bounties/5e146e7c-60c7-498b-9ffe-fd4cb4ca8c54 -CVE-2023-5318 - https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d -CVE-2023-5319 - https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d -CVE-2023-5320 - https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67 -CVE-2023-5321 - https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a -CVE-2023-5322 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5:sysmanage:edit_manageadmin.php.md -CVE-2023-5323 - https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8 -CVE-2023-5325 - https://wpscan.com/vulnerability/e93841ef-e113-41d3-9fa1-b21af85bd812 -CVE-2023-5340 - https://wpscan.com/vulnerability/91a5847a-62e7-4b98-a554-5eecb6a06e5b -CVE-2023-5341 - https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1 -CVE-2023-5343 - https://wpscan.com/vulnerability/74613b38-48f2-43d5-bae5-25c89ba7db6e -CVE-2023-5344 - https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04 -CVE-2023-5344 - https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf -CVE-2023-5345 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -CVE-2023-5347 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html -CVE-2023-5347 - http://seclists.org/fulldisclosure/2024/Jan/11 -CVE-2023-5347 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/ -CVE-2023-5348 - https://wpscan.com/vulnerability/b37b09c1-1b53-471c-9b10-7d2d05ae11f1 -CVE-2023-5350 - https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736 -CVE-2023-5351 - https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b -CVE-2023-5352 - https://wpscan.com/vulnerability/d32b2136-d923-4f36-bd76-af4578deb23b -CVE-2023-5353 - https://huntr.dev/bounties/3b3bb4f1-1aea-4134-99eb-157f245fa752 -CVE-2023-5354 - https://wpscan.com/vulnerability/aa380524-031d-4e49-9d0b-96e62d54557f -CVE-2023-5355 - https://wpscan.com/vulnerability/d6f7faca-dacf-4455-a837-0404803d0f25 -CVE-2023-5360 - http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html -CVE-2023-5360 - https://wpscan.com/vulnerability/281518ff-7816-4007-b712-63aed7828b34 -CVE-2023-5375 - https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9 -CVE-2023-5376 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html -CVE-2023-5376 - http://seclists.org/fulldisclosure/2024/Jan/11 -CVE-2023-5376 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/ -CVE-2023-5377 - https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf -CVE-2023-5389 - https://www.honeywell.com/us/en/product-security -CVE-2023-5390 - https://www.honeywell.com/us/en/product-security -CVE-2023-5427 - http://packetstormsecurity.com/files/176029/ARM-Mali-r44p0-Use-After-Free.html -CVE-2023-5441 - https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2 -CVE-2023-5448 - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve -CVE-2023-5452 - https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8 -CVE-2023-5454 - https://wpscan.com/vulnerability/1854f77f-e12a-4370-9c44-73d16d493685 -CVE-2023-5458 - https://wpscan.com/vulnerability/47d15f1c-b9ca-494d-be8f-63c30e92f9b8 -CVE-2023-5463 - https://drive.google.com/drive/folders/1mpRxWOPjxVS980r0qu1IY_Hf0irKO-cu -CVE-2023-5471 - https://vuldb.com/?id.241608 -CVE-2023-5488 - https://vuldb.com/?id.241640 -CVE-2023-5489 - https://github.com/llixixi/cve/blob/main/s45_upload_%20uploadfile.md -CVE-2023-5490 - https://github.com/llixixi/cve/blob/main/s45_upload_%20userattestation.md -CVE-2023-5491 - https://github.com/llixixi/cve/blob/main/s45_upload_changelogo.md -CVE-2023-5492 - https://github.com/llixixi/cve/blob/main/s45_upload_licence.md -CVE-2023-5492 - https://vuldb.com/?id.241644 -CVE-2023-5493 - https://github.com/llixixi/cve/blob/main/s45_upload_web.md -CVE-2023-5494 - https://github.com/7332all/cve/blob/main/rce_1.md -CVE-2023-5495 - http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html -CVE-2023-5496 - https://vuldb.com/?id.241649 -CVE-2023-5497 - https://github.com/RCEraser/cve/blob/main/sql_inject_4.md -CVE-2023-5498 - https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9 -CVE-2023-5509 - https://wpscan.com/vulnerability/3b33c262-e7f0-4310-b26d-4727d7c25c9d -CVE-2023-5511 - https://huntr.dev/bounties/43206801-9862-48da-b379-e55e341d78bf -CVE-2023-5512 - https://gitlab.com/gitlab-org/gitlab/-/issues/427827 -CVE-2023-5519 - https://wpscan.com/vulnerability/ce564628-3d15-4bc5-8b8e-60b71786ac19 -CVE-2023-5520 - https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a -CVE-2023-5521 - https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1 -CVE-2023-5525 - https://wpscan.com/vulnerability/654bad15-1c88-446a-b28b-5a412cc0399d -CVE-2023-5530 - https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae -CVE-2023-5535 - https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d -CVE-2023-5535 - https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f -CVE-2023-5536 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1829071 -CVE-2023-5538 - https://github.com/juweihuitao/MpOperationLogs/ -CVE-2023-5555 - https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f -CVE-2023-5556 - https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b -CVE-2023-5558 - https://wpscan.com/vulnerability/4efd2a4d-89bd-472f-ba5a-f9944fd4dd16/ -CVE-2023-5559 - https://wpscan.com/vulnerability/eba46f7d-e4db-400c-8032-015f21087bbf -CVE-2023-5560 - https://wpscan.com/vulnerability/55d23184-fc5a-4090-b079-142407b59b05 -CVE-2023-5561 - https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/ -CVE-2023-5561 - https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441 -CVE-2023-5563 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv -CVE-2023-5564 - https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c -CVE-2023-5571 - https://huntr.dev/bounties/926ca25f-dd4a-40cf-8e6b-9d7b5938e95a -CVE-2023-5572 - https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be -CVE-2023-5573 - https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72 -CVE-2023-5585 - https://vuldb.com/?id.242170 -CVE-2023-5586 - https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740 -CVE-2023-5590 - https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99 -CVE-2023-5591 - https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090 -CVE-2023-5595 - https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e -CVE-2023-5601 - https://wpscan.com/vulnerability/0035ec5e-d405-4eb7-8fe4-29dd0c71e4bc -CVE-2023-5604 - https://wpscan.com/vulnerability/4ce69d71-87bf-4d95-90f2-63d558c78b69 -CVE-2023-5605 - https://wpscan.com/vulnerability/9ec03ef0-0c04-4517-b761-df87af722a64 -CVE-2023-5607 - https://kcm.trellix.com/corporate/index?page=content&id=SB10411 -CVE-2023-5609 - https://wpscan.com/vulnerability/aac4bcc8-b826-4165-aed3-f422dd178692 -CVE-2023-5610 - https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e -CVE-2023-5611 - https://wpscan.com/vulnerability/8cb8a5e9-2ab6-4d9b-9ffc-ef530e346f8d -CVE-2023-5618 - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve -CVE-2023-5620 - https://wpscan.com/vulnerability/a03330c2-3ae0-404d-a114-33b18cc47666 -CVE-2023-5626 - https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b -CVE-2023-5640 - https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/ -CVE-2023-5640 - https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d -CVE-2023-5641 - https://wpscan.com/vulnerability/c0a6c253-71f2-415d-a6ec-022f2eafc13b -CVE-2023-5642 - https://tenable.com/security/research/tra-2023-33 -CVE-2023-5644 - https://wpscan.com/vulnerability/08f1d623-0453-4103-a9aa-2d0ddb6eb69e -CVE-2023-5645 - https://wpscan.com/vulnerability/e392fb53-66e9-4c43-9e4f-f4ea7c561551 -CVE-2023-5651 - https://wpscan.com/vulnerability/a365c050-96ae-4266-aa87-850ee259ee2c -CVE-2023-5652 - https://wpscan.com/vulnerability/8ea46b9a-5239-476b-949d-49546371eac1 -CVE-2023-5653 - https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0 -CVE-2023-5654 - https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231 -CVE-2023-5672 - https://wpscan.com/vulnerability/7c1dff5b-bed3-49f8-96cc-1bc9abe78749 -CVE-2023-5673 - https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9 -CVE-2023-5674 - https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67 -CVE-2023-5681 - https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md -CVE-2023-5682 - https://github.com/Godfather-onec/cve/blob/main/sql.md -CVE-2023-5684 - https://github.com/Chef003/cve/blob/main/rce.md -CVE-2023-5686 - https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0 -CVE-2023-5687 - https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d -CVE-2023-5688 - https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7 -CVE-2023-5689 - https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6 -CVE-2023-5690 - https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01 -CVE-2023-5700 - https://github.com/istlnight/cve/blob/main/NS-ASG-sql-uploadiscgwrouteconf.md -CVE-2023-5708 - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve -CVE-2023-5718 - https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb -CVE-2023-5724 - https://bugzilla.mozilla.org/show_bug.cgi?id=1836705 -CVE-2023-5725 - https://bugzilla.mozilla.org/show_bug.cgi?id=1845739 -CVE-2023-5729 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823720 -CVE-2023-5732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690979 -CVE-2023-5737 - https://wpscan.com/vulnerability/c761c67c-eab8-4e1b-a332-c9a45e22bb13 -CVE-2023-5738 - https://wpscan.com/vulnerability/7f935916-9a1a-40c7-b6d8-efcc46eb8eaf -CVE-2023-5749 - https://wpscan.com/vulnerability/3931daac-3899-4169-8625-4c95fd2adafc -CVE-2023-5750 - https://wpscan.com/vulnerability/cf323f72-8374-40fe-9e2e-810e46de1ec8 -CVE-2023-5753 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -CVE-2023-5753 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww -CVE-2023-5754 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -CVE-2023-5757 - https://wpscan.com/vulnerability/2adc5995-03a9-4860-b00b-7f8d7fe18058 -CVE-2023-5760 - https://support.norton.com/sp/static/external/tools/security-advisories.html -CVE-2023-5762 - https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb -CVE-2023-5772 - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve -CVE-2023-5774 - https://drive.google.com/file/d/1zXWW545ktCznO36k90AN0APhTz8ky-gG/view?usp=sharing -CVE-2023-5774 - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=cve -CVE-2023-5779 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47 -CVE-2023-5780 - https://github.com/RCEraser/cve/blob/main/sql_inject_5.md -CVE-2023-5783 - https://github.com/halleyakina/cve/blob/main/sql.md -CVE-2023-5784 - https://github.com/gb111d/ns-asg_poc/ -CVE-2023-5784 - https://vuldb.com/?id.243590 -CVE-2023-5785 - https://github.com/ggg48966/cve/blob/main/NS-ASG-sql-addaddress_interpret.md -CVE-2023-5796 - https://vuldb.com/?id.243602 -CVE-2023-5798 - https://wpscan.com/vulnerability/bbb4c98c-4dd7-421e-9666-98f15acde761 -CVE-2023-5799 - https://wpscan.com/vulnerability/3061f85e-a70e-49e5-bccf-ae9240f51178 -CVE-2023-5809 - https://wpscan.com/vulnerability/f1eb05e8-1b7c-45b1-912d-f668bd68e265 -CVE-2023-5817 - https://drive.google.com/file/d/125xS3GVMr7_qo5HjWvXaXixuE_R-q_u3/view?usp=sharing -CVE-2023-5826 - https://github.com/Cubi123123123/cve/blob/main/NS-ASG-sql-list_onlineuser.md -CVE-2023-5826 - https://vuldb.com/?id.243716 -CVE-2023-5832 - https://huntr.com/bounties/afee3726-571f-416e-bba5-0828c815f5df -CVE-2023-5836 - https://vuldb.com/?id.243800 -CVE-2023-5838 - https://huntr.com/bounties/8f6feca3-386d-4897-801c-39b9e3e5eb03 -CVE-2023-5839 - https://huntr.com/bounties/21125f12-64a0-42a3-b218-26b9945a5bc0 -CVE-2023-5840 - https://huntr.com/bounties/8042d8c3-650e-4c0d-9146-d9ccf6082b30 -CVE-2023-5841 - https://takeonme.org/cves/CVE-2023-5841.html -CVE-2023-5842 - https://huntr.com/bounties/aed81114-5952-46f5-ae3a-e66518e98ba3 -CVE-2023-5844 - https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021 -CVE-2023-5845 - https://wpscan.com/vulnerability/d5b59e9e-85e5-4d26-aebe-64757c8495fa -CVE-2023-5846 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04 -CVE-2023-5847 - https://www.tenable.com/security/tns-2023-37 -CVE-2023-5861 - https://huntr.com/bounties/7baecef8-6c59-42fc-bced-886c4929e220 -CVE-2023-5862 - https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d -CVE-2023-5863 - https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f -CVE-2023-5864 - https://huntr.com/bounties/e4b0e8f4-5e06-49d1-832f-5756573623ad -CVE-2023-5865 - https://huntr.com/bounties/4c4b7395-d9fd-4ca0-98d7-2e20c1249aff -CVE-2023-5866 - https://huntr.com/bounties/ec44bcba-ae7f-497a-851e-8165ecf56945 -CVE-2023-5873 - https://huntr.com/bounties/701cfc30-22a1-4c4b-9b2f-885c77c290ce -CVE-2023-5874 - https://wpscan.com/vulnerability/ebe3e873-1259-43b9-a027-daa4dbd937f3 -CVE-2023-5877 - https://wpscan.com/vulnerability/39ed4934-3d91-4924-8acc-25759fef9e81 -CVE-2023-5882 - https://wpscan.com/vulnerability/72be4b5c-21be-46af-a3f4-08b4c190a7e2 -CVE-2023-5884 - https://wpscan.com/vulnerability/f4a7937c-6f4b-49dd-b88a-67ebe718ad19 -CVE-2023-5886 - https://wpscan.com/vulnerability/0a08e49d-d34e-4140-a15d-ad64444665a3 -CVE-2023-5889 - https://huntr.com/bounties/fba2991a-1b8a-4c89-9689-d708526928e1 -CVE-2023-5890 - https://huntr.com/bounties/b60e6e1f-e44d-4b11-acf8-b0548b915686 -CVE-2023-5891 - https://huntr.com/bounties/ce4956e4-9ef5-4e0e-bfb2-481ec5cfb0a5 -CVE-2023-5892 - https://huntr.com/bounties/16719252-d88d-43cc-853a-24ff75a067d8 -CVE-2023-5893 - https://huntr.com/bounties/a965aa16-79ce-4185-8f58-3d3b0d74a71e -CVE-2023-5894 - https://huntr.com/bounties/aba3ba5b-aa6b-4076-b663-4237b4a0761d -CVE-2023-5895 - https://huntr.com/bounties/2cc80417-32b2-4024-bbcd-d95a039c11ae -CVE-2023-5898 - https://huntr.com/bounties/19801d12-b8ad-45e7-86e1-8f0230667c9e -CVE-2023-5899 - https://huntr.com/bounties/0c7f1981-3bba-4508-a07e-4cb9a2553216 -CVE-2023-5900 - https://huntr.com/bounties/c3f011d4-9f76-4b2b-b3d4-a5e2ecd2e354 -CVE-2023-5901 - https://huntr.com/bounties/8fb9b06b-cadd-469e-862d-5ce026019597 -CVE-2023-5905 - https://wpscan.com/vulnerability/f94e91ef-1773-476c-9945-37e89ceefd3f -CVE-2023-5906 - https://wpscan.com/vulnerability/911d495c-3867-4259-a73a-572cd4fccdde -CVE-2023-5907 - https://wpscan.com/vulnerability/f250226f-4a05-4d75-93c4-5444a4ce919e -CVE-2023-5911 - https://wpscan.com/vulnerability/dde0767d-1dff-4261-adbe-1f3fdf2d9aae -CVE-2023-5922 - https://wpscan.com/vulnerability/debd8498-5770-4270-9ee1-1503e675ef34/ -CVE-2023-5931 - https://wpscan.com/vulnerability/3d6889e3-a01b-4e7f-868f-af7cc8c7531a -CVE-2023-5939 - https://wpscan.com/vulnerability/db5d41fc-bcd3-414f-aa99-54d5537007bc -CVE-2023-5940 - https://wpscan.com/vulnerability/d594c00d-2905-449b-80cd-95965a96cd4b -CVE-2023-5942 - https://wpscan.com/vulnerability/914559e1-eed5-4a69-8371-a48055835453 -CVE-2023-5943 - https://wpscan.com/vulnerability/18fbe9d5-4829-450b-988c-8ba4becd032a/ -CVE-2023-5948 - https://huntr.com/bounties/ac1363b5-207b-40d9-aac5-e66d6213f692 -CVE-2023-5949 - https://wpscan.com/vulnerability/3cec27ca-f470-402d-ae3e-271cb59cf407 -CVE-2023-5951 - https://wpscan.com/vulnerability/81dc093a-545d-4bcd-ab85-ee9472d709e5 -CVE-2023-5952 - https://wpscan.com/vulnerability/0acd613e-dbd6-42ae-9f3d-6d6e77a4c1b7 -CVE-2023-5953 - https://wpscan.com/vulnerability/6d29ba12-f14a-4cee-baae-a6049d83bce6 -CVE-2023-5955 - https://wpscan.com/vulnerability/1b5fce7e-14fc-4548-8747-96fdd58fdd98 -CVE-2023-5956 - https://wpscan.com/vulnerability/b3d1fbae-88c9-45d1-92c6-0a529b21e3b2/ -CVE-2023-5957 - https://wpscan.com/vulnerability/70f823ff-64ad-4f05-9eb3-b69b3b79dc12 -CVE-2023-5958 - https://wpscan.com/vulnerability/22fa478d-e42e-488d-9b4b-a8720dec7cee -CVE-2023-5959 - https://github.com/Changboqian/cve/blob/main/reset_password_improperly.md -CVE-2023-5971 - https://wpscan.com/vulnerability/03a201d2-535e-4574-afac-791dcf23e6e1/ -CVE-2023-5974 - https://wpscan.com/vulnerability/c0136057-f420-4fe7-a147-ecbec7e7a9b5 -CVE-2023-5979 - https://wpscan.com/vulnerability/936934c3-5bfe-416e-b6aa-47bed4db05c4 -CVE-2023-5980 - https://wpscan.com/vulnerability/b621261b-ae18-4853-9ace-7b773810529a -CVE-2023-5990 - https://wpscan.com/vulnerability/0a615ce3-93da-459d-a33f-a2a6e74a2f94 -CVE-2023-5991 - https://wpscan.com/vulnerability/e9d35e36-1e60-4483-b8b3-5cbf08fcd49e -CVE-2023-5995 - https://gitlab.com/gitlab-org/gitlab/-/issues/425361 -CVE-2023-5998 - https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113 -CVE-2023-6000 - https://wpscan.com/blog/stored-xss-fixed-in-popup-builder-4-2-3/ -CVE-2023-6000 - https://wpscan.com/vulnerability/cdb3a8bd-4ee0-4ce0-9029-0490273bcfc8 -CVE-2023-6005 - https://wpscan.com/vulnerability/fa4eea26-0611-4fa8-a947-f78ddf46a56a/ -CVE-2023-6006 - https://www.papercut.com/kb/Main/CommonSecurityQuestions/ -CVE-2023-6007 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-6008 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-6009 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html -CVE-2023-6009 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2023-6013 - https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af -CVE-2023-6014 - https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4 -CVE-2023-6015 - https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3 -CVE-2023-6016 - https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836 -CVE-2023-6017 - https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58 -CVE-2023-6019 - https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe -CVE-2023-6020 - https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 -CVE-2023-6021 - https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 -CVE-2023-6022 - https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af -CVE-2023-6023 - https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca -CVE-2023-6029 - https://wpscan.com/vulnerability/7a0aaf85-8130-4fd7-8f09-f8edc929597e -CVE-2023-6035 - https://wpscan.com/vulnerability/44f5a29a-05f9-40d2-80f2-6fb2bda60d79 -CVE-2023-6036 - https://wpscan.com/vulnerability/7f30ab20-805b-422c-a9a5-21d39c570ee4/ -CVE-2023-6037 - https://wpscan.com/vulnerability/753df046-9fd7-4d15-9114-45cde6d6539b -CVE-2023-6038 - https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c -CVE-2023-6040 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -CVE-2023-6042 - https://wpscan.com/vulnerability/56a1c050-67b5-43bc-b5b6-28d9a5a59eba -CVE-2023-6046 - https://wpscan.com/vulnerability/97f1d403-ae96-4c90-8d47-9822f4d68033/ -CVE-2023-6048 - https://wpscan.com/vulnerability/74cb07fe-fc82-472f-8c52-859c176d9e51 -CVE-2023-6049 - https://wpscan.com/vulnerability/8cfd8c1f-2834-4a94-a3fa-c0cfbe78a8b7 -CVE-2023-6050 - https://wpscan.com/vulnerability/c08e0f24-bd61-4e83-a555-363568cf0e6e -CVE-2023-6051 - https://gitlab.com/gitlab-org/gitlab/-/issues/431345 -CVE-2023-6052 - https://vuldb.com/?id.244872 -CVE-2023-6053 - https://github.com/Conan0313/cve/blob/main/sql.md -CVE-2023-6053 - https://vuldb.com/?id.244874 -CVE-2023-6054 - https://github.com/TinkAnet/cve/blob/main/sql2.md -CVE-2023-6054 - https://vuldb.com/?id.244875 -CVE-2023-6063 - https://wpscan.com/vulnerability/30a74105-8ade-4198-abe2-1c6f2967443e -CVE-2023-6064 - https://wpscan.com/vulnerability/423c8881-628b-4380-9677-65b3f5165efe -CVE-2023-6065 - https://drive.google.com/file/d/1w83xWsVLS_gCpQy4LDwbjNK9JaB87EEf/view?usp=sharing -CVE-2023-6065 - https://wpscan.com/vulnerability/64f2557f-c5e4-4779-9e28-911dfaf2dda5 -CVE-2023-6066 - https://wpscan.com/vulnerability/f8f84d47-49aa-4258-a8a6-3de8e7342623 -CVE-2023-6067 - https://wpscan.com/vulnerability/ae8e225a-5273-4db1-9c72-060304cca658/ -CVE-2023-6070 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413 -CVE-2023-6071 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413 -CVE-2023-6077 - https://wpscan.com/vulnerability/1afc0e4a-f712-47d4-bf29-7719ccbbbb1b -CVE-2023-6081 - https://wpscan.com/vulnerability/5f011911-5fd1-46d9-b468-3062b4ec6f1e/ -CVE-2023-6082 - https://wpscan.com/vulnerability/c3d43aac-66c8-4218-b3f0-5256f895eda3/ -CVE-2023-6084 - https://vuldb.com/?id.244994 -CVE-2023-6099 - https://github.com/gatsby2003/Shenzhen-Youkate-Industrial-Co.-Ltd/blob/main/Shenzhen%20Youkate%20Industrial%20Co.%2C%20Ltd.md -CVE-2023-6099 - https://vuldb.com/?id.245061 -CVE-2023-6103 - https://vuldb.com/?id.245065 -CVE-2023-6105 - https://www.tenable.com/security/research/tra-2023-35 -CVE-2023-6112 - http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html -CVE-2023-6113 - https://research.cleantalk.org/cve-2023-6113-wp-staging-unauth-sensitive-data-exposure-to-account-takeover-poc-exploit/ -CVE-2023-6113 - https://wpscan.com/vulnerability/5a71049a-09a6-40ab-a4e8-44634869d4fb -CVE-2023-6114 - https://drive.google.com/file/d/1mpapFCqfZLv__EAM7uivrrl2h55rpi1V/view?usp=sharing -CVE-2023-6114 - https://wpscan.com/vulnerability/5c5d41b9-1463-4a9b-862f-e9ee600ef8e1 -CVE-2023-6119 - https://kcm.trellix.com/corporate/index?page=content&id=SB10412 -CVE-2023-6124 - https://huntr.com/bounties/aed4d8f3-ab9a-42fd-afea-b3ec288a148e -CVE-2023-6125 - https://huntr.com/bounties/a9462f1e-9746-4380-8228-533ff2f64691 -CVE-2023-6127 - https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d -CVE-2023-6132 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ -CVE-2023-6139 - https://wpscan.com/vulnerability/96396a22-f523-4c51-8b72-52be266988aa -CVE-2023-6140 - https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b -CVE-2023-6141 - https://wpscan.com/vulnerability/df12513b-9664-45be-8824-2924bfddf364 -CVE-2023-6146 - https://www.qualys.com/security-advisories/ -CVE-2023-6147 - https://www.qualys.com/security-advisories/ -CVE-2023-6148 - https://www.qualys.com/security-advisories/ -CVE-2023-6149 - https://www.qualys.com/security-advisories/ -CVE-2023-6152 - https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f -CVE-2023-6155 - https://wpscan.com/vulnerability/c62be802-e91a-4bcf-990d-8fd8ef7c9a28 -CVE-2023-6161 - https://wpscan.com/vulnerability/ca7b6a39-a910-4b4f-b9cc-be444ec44942 -CVE-2023-6163 - https://wpscan.com/vulnerability/7ed6de4d-0a37-497f-971d-b6711893c557 -CVE-2023-6165 - https://github.com/youki992/youki992.github.io/blob/master/others/apply2.md -CVE-2023-6165 - https://wpscan.com/vulnerability/aba62286-9a82-4d5b-9b47-1fddde5da487/ -CVE-2023-6166 - https://wpscan.com/vulnerability/e6155d9b-f6bb-4607-ad64-1976a8afe907 -CVE-2023-6175 - https://gitlab.com/wireshark/wireshark/-/issues/19404 -CVE-2023-6176 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -CVE-2023-6179 - https://www.honeywell.com/us/en/product-security -CVE-2023-6188 - https://vuldb.com/?id.245735 -CVE-2023-6199 - https://fluidattacks.com/advisories/imagination/ -CVE-2023-6203 - https://wpscan.com/vulnerability/229273e6-e849-447f-a95a-0730969ecdae -CVE-2023-6207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1861344 -CVE-2023-6209 - https://bugzilla.mozilla.org/show_bug.cgi?id=1858570 -CVE-2023-6210 - https://bugzilla.mozilla.org/show_bug.cgi?id=1801501 -CVE-2023-6222 - https://drive.google.com/file/d/1krgHH2NvVFr93VpErLkOjDV3L6M5yIA1/view?usp=sharing -CVE-2023-6222 - https://wpscan.com/vulnerability/df892e99-c0f6-42b8-a834-fc55d1bde130 -CVE-2023-6246 - http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html -CVE-2023-6246 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html -CVE-2023-6246 - http://seclists.org/fulldisclosure/2024/Feb/3 -CVE-2023-6246 - https://www.openwall.com/lists/oss-security/2024/01/30/6 -CVE-2023-6246 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt -CVE-2023-6250 - https://wpscan.com/vulnerability/6cad602b-7414-4867-8ae2-f0b846c4c8f0 -CVE-2023-6253 - http://packetstormsecurity.com/files/175956/Fortra-Digital-Guardian-Agent-Uninstaller-Cross-Site-Scripting-UninstallKey-Cached.html -CVE-2023-6253 - http://seclists.org/fulldisclosure/2023/Nov/14 -CVE-2023-6253 - https://r.sec-consult.com/fortra -CVE-2023-6257 - https://wpscan.com/vulnerability/19a86448-8d7c-4f02-9290-d9f93810e6e1/ -CVE-2023-6263 - https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing -CVE-2023-6265 - https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md -CVE-2023-6268 - https://wpscan.com/vulnerability/15b9ab48-c038-4f2e-b823-1e374baae985 -CVE-2023-6269 - http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html -CVE-2023-6269 - http://seclists.org/fulldisclosure/2023/Dec/16 -CVE-2023-6269 - https://r.sec-consult.com/unifyroot -CVE-2023-6271 - https://research.cleantalk.org/cve-2023-6271-backup-migration-unauth-sensitive-data-exposure-to-full-control-of-the-site-poc-exploit -CVE-2023-6271 - https://wpscan.com/vulnerability/7ac217db-f332-404b-a265-6dc86fe747b9 -CVE-2023-6272 - https://wpscan.com/vulnerability/a03243ea-fee7-46e4-8037-a228afc5297a -CVE-2023-6274 - https://github.com/Carol7S/cve/blob/main/rce.md -CVE-2023-6274 - https://vuldb.com/?id.246103 -CVE-2023-6276 - https://github.com/YXuanZ1216/cve/blob/main/sql.md -CVE-2023-6277 - https://gitlab.com/libtiff/libtiff/-/issues/614 -CVE-2023-6278 - https://wpscan.com/vulnerability/dfe5001f-31b9-4de2-a240-f7f5a992ac49/ -CVE-2023-6279 - https://wpscan.com/vulnerability/626bbc7d-0d0f-4418-ac61-666278a1cbdb/ -CVE-2023-6289 - https://wpscan.com/vulnerability/8c83dd57-9291-4dfc-846d-5ad47534e2ad -CVE-2023-6290 - https://wpscan.com/vulnerability/78a13958-cd12-4ea8-b326-1e3184da970b/ -CVE-2023-6292 - https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ -CVE-2023-6293 - https://huntr.com/bounties/36a7ecbf-4d3d-462e-86a3-cda7b1ec64e2 -CVE-2023-6294 - https://wpscan.com/vulnerability/eaeb5706-b19c-4266-b7df-889558ee2614/ -CVE-2023-6295 - https://wpscan.com/vulnerability/adc9ed9f-55b4-43a9-a79d-c7120764f47c -CVE-2023-6296 - http://packetstormsecurity.com/files/175925/osCommerce-4-Cross-Site-Scripting.html -CVE-2023-6297 - https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md -CVE-2023-6298 - https://vuldb.com/?id.246124 -CVE-2023-6301 - https://github.com/BigTiger2020/2023/blob/main/best-courier-management-system/best-courier-management-system-reflected%20xss2.md -CVE-2023-6301 - https://vuldb.com/?id.246127 -CVE-2023-6305 - https://github.com/BigTiger2020/2023/blob/main/Free%20and%20Open%20Source%20inventory%20management%20system/Free%20and%20Open%20Source%20inventory%20management%20system.md -CVE-2023-6306 - https://vuldb.com/?id.246132 -CVE-2023-6308 - https://github.com/gatsby2003/Struts2-046/blob/main/Xiamen%20Four-Faith%20Communication%20Technology%20Co.,%20Ltd.%20video%20surveillance%20management%20system%20has%20a%20command%20execution%20vulnerability.md -CVE-2023-6309 - https://github.com/moses-smt/mosesdecoder/issues/237 -CVE-2023-6310 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20browser.md -CVE-2023-6311 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteltype.md -CVE-2023-6311 - https://vuldb.com/?id.246137 -CVE-2023-6312 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md -CVE-2023-6313 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/url-shortener.md -CVE-2023-6329 - https://tenable.com/security/research/tra-2023-36 -CVE-2023-6341 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6342 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6343 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6344 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6348 - http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html -CVE-2023-6353 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6354 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6360 - https://www.tenable.com/security/research/tra-2023-40 -CVE-2023-6373 - https://wpscan.com/vulnerability/afc11c92-a7c5-4e55-8f34-f2235438bd1b/ -CVE-2023-6375 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6376 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ -CVE-2023-6383 - https://wpscan.com/vulnerability/eae63103-3de6-4100-8f48-2bcf9a5c91fb -CVE-2023-6384 - https://wpscan.com/vulnerability/fbdefab4-614b-493b-a9ae-c5aeff8323ef/ -CVE-2023-6385 - https://wpscan.com/vulnerability/362c56ff-85eb-480f-a825-9670d4c0e3d0/ -CVE-2023-6389 - https://wpscan.com/vulnerability/04dafc55-3a8d-4dd2-96da-7a8b100e5a81/ -CVE-2023-6390 - https://wpscan.com/vulnerability/a0ca68d3-f885-46c9-9f6b-b77ad387d25d/ -CVE-2023-6391 - https://wpscan.com/vulnerability/4098b18d-6ff3-462c-af05-48adb6599cf3/ -CVE-2023-6421 - https://wpscan.com/vulnerability/244c7c00-fc8d-4a73-bbe0-7865c621d410 -CVE-2023-6440 - https://github.com/lscjl/lsi.webray.com.cn/blob/main/CVE-project/Book%20Borrower%20System%20Cross%20site%20scripting.md -CVE-2023-6444 - https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ -CVE-2023-6447 - https://wpscan.com/vulnerability/e366881c-d21e-4063-a945-95e6b080a373/ -CVE-2023-6456 - https://wpscan.com/vulnerability/30f31412-8f94-4d5e-a080-3f6f669703cd/ -CVE-2023-6461 - https://huntr.com/bounties/9a97d163-1738-4a09-b284-a04716e69dd0 -CVE-2023-6474 - https://github.com/dhabaleshwar/niv_testing_csrf/blob/main/exploit.md -CVE-2023-6485 - https://wpscan.com/vulnerability/759b3866-c619-42cc-94a8-0af6d199cc81 -CVE-2023-6486 - https://youtu.be/t5K745dBsT0 -CVE-2023-6499 - https://wpscan.com/vulnerability/69592e52-92db-4e30-92ca-b7b3d5b9185d/ -CVE-2023-6501 - https://wpscan.com/vulnerability/dd19189b-de04-44b6-8ac9-0c32399a8976/ -CVE-2023-6503 - https://wpscan.com/vulnerability/0d95de23-e8f6-4342-b19c-57cd22b2fee2/ -CVE-2023-6505 - https://wpscan.com/vulnerability/eca6f099-6af0-4f42-aade-ab61dd792629 -CVE-2023-6528 - https://wpscan.com/vulnerability/36ced447-84ea-4162-80d2-6df226cb53cb -CVE-2023-6529 - https://wpscan.com/vulnerability/c36314c1-a2c0-4816-93c9-e61f9cf7f27a -CVE-2023-6530 - https://research.cleantalk.org/cve-2023-6530-tj-shortcodes-stored-xss-poc/ -CVE-2023-6530 - https://wpscan.com/vulnerability/8e63bf7c-7827-4c4d-b0e3-66354b218bee/ -CVE-2023-6532 - https://wpscan.com/vulnerability/05a730bc-2d72-49e3-a608-e4390b19e97f -CVE-2023-6546 - http://www.openwall.com/lists/oss-security/2024/04/10/18 -CVE-2023-6546 - http://www.openwall.com/lists/oss-security/2024/04/10/21 -CVE-2023-6546 - http://www.openwall.com/lists/oss-security/2024/04/11/7 -CVE-2023-6546 - http://www.openwall.com/lists/oss-security/2024/04/11/9 -CVE-2023-6546 - http://www.openwall.com/lists/oss-security/2024/04/16/2 -CVE-2023-6546 - http://www.openwall.com/lists/oss-security/2024/04/17/1 -CVE-2023-6553 - http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html -CVE-2023-6553 - https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it -CVE-2023-6555 - https://wpscan.com/vulnerability/58803934-dbd3-422d-88e7-ebbc5e8c0886 -CVE-2023-6560 - http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html -CVE-2023-6562 - https://github.com/google/security-research/security/advisories/GHSA-g6qc-fhcq-vhf9 -CVE-2023-6566 - https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6 -CVE-2023-6568 - https://huntr.com/bounties/816bdaaa-8153-4732-951e-b0d92fddf709 -CVE-2023-6569 - https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c -CVE-2023-6570 - https://huntr.com/bounties/82d6e853-013b-4029-a23f-8b50ec56602a -CVE-2023-6571 - https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632 -CVE-2023-6574 - https://github.com/flyyue2001/cve/blob/main/smart_sql_updateos.md -CVE-2023-6575 - https://github.com/houhuidong/cve/blob/main/rce.md -CVE-2023-6576 - https://github.com/willchen0011/cve/blob/main/upload.md -CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html -CVE-2023-6580 - https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md -CVE-2023-6584 - https://wpscan.com/vulnerability/e528e3cd-a45c-4bf7-a37a-101f5c257acd/ -CVE-2023-6585 - https://wpscan.com/vulnerability/757412f4-e4f8-4007-8e3b-639a72b33180/ -CVE-2023-6591 - https://wpscan.com/vulnerability/f296de1c-b70b-4829-aba7-4afa24f64c51/ -CVE-2023-6592 - https://research.cleantalk.org/cve-2023-6592-fastdup-database-users-password-leak-poc-exploit/ -CVE-2023-6592 - https://wpscan.com/vulnerability/a39bb807-b143-4863-88ff-1783e407d7d4/ -CVE-2023-6599 - https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e -CVE-2023-6620 - https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 -CVE-2023-6621 - https://wpscan.com/vulnerability/b49ca336-5bc2-4d72-a9a5-b8c020057928 -CVE-2023-6623 - https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/ -CVE-2023-6623 - https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f -CVE-2023-6625 - https://wpscan.com/vulnerability/d483f7ce-cb3f-4fcb-b060-005cec0ea10f/ -CVE-2023-6626 - https://wpscan.com/vulnerability/327ae124-79eb-4e07-b029-e4f543cbd356/ -CVE-2023-6627 - https://wpscan.com/blog/stored-xss-fixed-in-wp-go-maps-9-0-28/ -CVE-2023-6627 - https://wpscan.com/vulnerability/f5687d0e-98ca-4449-98d6-7170c97c8f54 -CVE-2023-6633 - https://wpscan.com/vulnerability/eb983d82-b894-41c5-b51f-94d4bba3ba39/ -CVE-2023-6653 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_add_sub.md -CVE-2023-6655 - https://github.com/willchen0011/cve/blob/main/HongJing-sql.md -CVE-2023-6659 - https://github.com/Kidjing/cve/blob/main/sql1.md -CVE-2023-6730 - https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16 -CVE-2023-6732 - https://wpscan.com/vulnerability/aaf91707-f03b-4f25-bca9-9fac4945002a/ -CVE-2023-6741 - https://wpscan.com/vulnerability/9debe1ea-18ad-44c4-8078-68eb66d36c4a/ -CVE-2023-6750 - https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 -CVE-2023-6753 - https://github.com/mlflow/mlflow/commit/1c6309f884798fbf56017a3cc808016869ee8de4 -CVE-2023-6753 - https://huntr.com/bounties/b397b83a-527a-47e7-b912-a12a17a6cfb4 -CVE-2023-6766 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_course.md -CVE-2023-6773 - https://drive.google.com/drive/folders/1yuc1n6tr57wD8qsT0HAFDVAuii7iibDM?usp=sharing -CVE-2023-6778 - https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b -CVE-2023-6779 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html -CVE-2023-6779 - http://seclists.org/fulldisclosure/2024/Feb/3 -CVE-2023-6779 - https://www.openwall.com/lists/oss-security/2024/01/30/6 -CVE-2023-6779 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt -CVE-2023-6780 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html -CVE-2023-6780 - http://seclists.org/fulldisclosure/2024/Feb/3 -CVE-2023-6780 - https://www.openwall.com/lists/oss-security/2024/01/30/6 -CVE-2023-6780 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt -CVE-2023-6817 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -CVE-2023-6817 - http://www.openwall.com/lists/oss-security/2023/12/22/6 -CVE-2023-6821 - https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/ -CVE-2023-6824 - https://wpscan.com/vulnerability/a224b984-770a-4534-b689-0701b582b388/ -CVE-2023-6832 - https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376 -CVE-2023-6840 - https://gitlab.com/gitlab-org/gitlab/-/issues/435500 -CVE-2023-6843 - https://wpscan.com/vulnerability/41508340-8caf-4dca-bd88-350b63b78ab0 -CVE-2023-6845 - https://wpscan.com/vulnerability/cbdaf158-f277-4be4-b022-68d18dae4c55 -CVE-2023-6860 - https://bugzilla.mozilla.org/show_bug.cgi?id=1854669 -CVE-2023-6861 - https://bugzilla.mozilla.org/show_bug.cgi?id=1864118 -CVE-2023-6866 - https://bugzilla.mozilla.org/show_bug.cgi?id=1849037 -CVE-2023-6867 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863863 -CVE-2023-6870 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823316 -CVE-2023-6875 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html -CVE-2023-6885 - https://github.com/Martinzb/cve/blob/main/sql.md -CVE-2023-6888 - http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/ -CVE-2023-6888 - https://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py -CVE-2023-6889 - https://huntr.com/bounties/52897778-fad7-4169-bf04-a68a0646df0c -CVE-2023-6890 - https://huntr.com/bounties/2cf11678-8793-4fa1-b21a-f135564a105d -CVE-2023-6893 - https://github.com/willchen0011/cve/blob/main/download.md -CVE-2023-6901 - https://github.com/g1an123/POC/blob/main/README.md -CVE-2023-6902 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20upload%20getshell.md -CVE-2023-6906 - https://github.com/unpWn4bL3/iot-security/blob/main/1.md -CVE-2023-6907 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20deletion.md -CVE-2023-6927 - https://bugzilla.redhat.com/show_bug.cgi?id=2255027 -CVE-2023-6928 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 -CVE-2023-6929 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 -CVE-2023-6930 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 -CVE-2023-6932 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -CVE-2023-6941 - https://wpscan.com/vulnerability/58f7c9aa-5e59-468f-aba9-b15e7942fd37/ -CVE-2023-6946 - https://wpscan.com/vulnerability/54a00416-c7e3-44f3-8dd2-ed9e748055e6/ -CVE-2023-6960 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-6976 - https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f -CVE-2023-6977 - https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf -CVE-2023-6991 - https://wpscan.com/vulnerability/0b92becb-8a47-48fd-82e8-f7641cf5c9bc -CVE-2023-7003 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-7004 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-7006 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-7007 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-7009 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-7017 - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -CVE-2023-7018 - https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c -CVE-2023-7021 - https://github.com/qq956801985/cve/blob/main/sql.md -CVE-2023-7026 - https://github.com/willchen0011/cve/blob/main/upload2.md -CVE-2023-7027 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html -CVE-2023-7038 - https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF) -CVE-2023-7039 - https://github.com/Stitch3612/cve/blob/main/rce.md -CVE-2023-7040 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20read.md -CVE-2023-7041 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20overwrite.md -CVE-2023-7051 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_notes.md -CVE-2023-7052 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md -CVE-2023-7059 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/school-visitors-log-e-book.md -CVE-2023-7060 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fjc8-223c-qgqr -CVE-2023-7074 - https://wpscan.com/vulnerability/7906c349-97b0-4d82-aef0-97a1175ae88e/ -CVE-2023-7082 - https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ -CVE-2023-7083 - https://wpscan.com/vulnerability/ba77704a-32a1-494b-b2c0-e1c2a3f98adc/ -CVE-2023-7084 - https://wpscan.com/vulnerability/5e51e239-919b-4e74-a7ee-195f3817f907/ -CVE-2023-7085 - https://wpscan.com/vulnerability/a2ec1308-75a0-49d0-9288-33c6d9ee4328/ -CVE-2023-7089 - https://wpscan.com/vulnerability/3b8ba734-7764-4ab6-a7e2-8de55bd46bed/ -CVE-2023-7092 - https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/view -CVE-2023-7092 - https://vuldb.com/?id.248939 -CVE-2023-7095 - https://github.com/unpWn4bL3/iot-security/blob/main/2.md -CVE-2023-7100 - https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03 -CVE-2023-7100 - https://vuldb.com/?id.248952 -CVE-2023-7101 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md -CVE-2023-7101 - https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc -CVE-2023-7101 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html -CVE-2023-7102 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc -CVE-2023-7102 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md -CVE-2023-7105 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md -CVE-2023-7106 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md -CVE-2023-7107 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md -CVE-2023-7108 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md -CVE-2023-7109 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md -CVE-2023-7109 - https://vuldb.com/?id.249004 -CVE-2023-7110 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md -CVE-2023-7111 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-3.md -CVE-2023-7115 - https://wpscan.com/vulnerability/6ddd1a9e-3f96-4020-9b2b-f818a4d5ba58/ -CVE-2023-7123 - https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4 -CVE-2023-7124 - https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md -CVE-2023-7125 - https://wpscan.com/vulnerability/cac12b64-ed25-4ee2-933f-8ff722605271/ -CVE-2023-7126 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-1.md -CVE-2023-7126 - https://vuldb.com/?id.249129 -CVE-2023-7127 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-2.md -CVE-2023-7128 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-1.md -CVE-2023-7129 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-2.md -CVE-2023-7130 - https://github.com/h4md153v63n/CVEs/blob/main/College_Notes_Gallery/College_Notes_Gallery-SQL_Injection.md -CVE-2023-7130 - https://vuldb.com/?id.249133 -CVE-2023-7131 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-SQL-Injection.md -CVE-2023-7132 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-Stored_Cross_site_Scripting.md -CVE-2023-7134 - https://medium.com/@2839549219ljk/medicine-tracking-system-rce-vulnerability-1f009165b915 -CVE-2023-7135 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-1.md -CVE-2023-7136 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-2.md -CVE-2023-7137 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_1.md -CVE-2023-7138 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_2.md -CVE-2023-7139 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_3.md -CVE-2023-7140 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_4.md -CVE-2023-7141 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_5.md -CVE-2023-7142 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_6.md -CVE-2023-7143 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-Blind_Cross_Site_Scripting.md -CVE-2023-7149 - https://github.com/h4md153v63n/CVEs/blob/main/QR_Code_Generator/QR_Code_Generator-Reflected_Cross_Site_Scripting.md -CVE-2023-7150 - https://github.com/laoquanshi/Chic-Vulnerability- -CVE-2023-7151 - https://wpscan.com/vulnerability/4992a4a9-f21a-46e2-babf-954acfc7c5b4/ -CVE-2023-7154 - https://wpscan.com/vulnerability/0ed423dd-4a38-45e0-8645-3f4215a3f15c/ -CVE-2023-7155 - https://medium.com/@heishou/inventory-management-system-sql-injection-f6d67247c7ae -CVE-2023-7156 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-95b95ab64ccc -CVE-2023-7157 - https://medium.com/@heishou/inventory-management-system-sql-injection-7b955b5707eb -CVE-2023-7158 - https://github.com/micropython/micropython/issues/13007 -CVE-2023-7160 - https://vuldb.com/?id.249182 -CVE-2023-7161 - https://github.com/fixitc/cve/blob/main/sql.md -CVE-2023-7163 - https://tenable.com/security/research/tra-2023-43 -CVE-2023-7164 - https://wpscan.com/vulnerability/79b07f37-2c6b-4846-bb28-91a1e5bf112e/ -CVE-2023-7165 - https://wpscan.com/vulnerability/ad1ef4c5-60c1-4729-81dd-f626aa0ce3fe/ -CVE-2023-7167 - https://wpscan.com/vulnerability/6a2eb871-6b6e-4dbb-99f0-dd74d6c61e83/ -CVE-2023-7170 - https://wpscan.com/vulnerability/218fb3af-3a40-486f-8ea9-80211a986fb3/ -CVE-2023-7172 - https://github.com/sharathc213/CVE-2023-7172 -CVE-2023-7172 - https://vuldb.com/?id.249356 -CVE-2023-7173 - https://github.com/sharathc213/CVE-2023-7173 -CVE-2023-7175 - https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe -CVE-2023-7176 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-3-d02f0ce78fe3 -CVE-2023-7176 - https://vuldb.com/?id.249363 -CVE-2023-7177 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-4-cadc2983eb5e -CVE-2023-7178 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-5-5a761e5b73b8 -CVE-2023-7179 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-a98949964faf -CVE-2023-7180 - https://github.com/Bobjones7/cve/blob/main/sql.md -CVE-2023-7181 - https://vuldb.com/?id.249368 -CVE-2023-7194 - https://wpscan.com/vulnerability/e20292af-939a-4cb1-91e4-5ff6aa0c7fbe -CVE-2023-7198 - https://wpscan.com/vulnerability/75fbee63-d622-441f-8675-082907b0b1e6/ -CVE-2023-7199 - https://wpscan.com/vulnerability/0c96a128-4473-41f5-82ce-94bba33ca4a3/ -CVE-2023-7200 - https://wpscan.com/vulnerability/586cf0a5-515c-43ea-8c03-f2f47ed13c2c/ -CVE-2023-7201 - https://wpscan.com/vulnerability/64ba4461-bbba-45eb-981f-bb5f2e5e56e1/ -CVE-2023-7202 - https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/ -CVE-2023-7202 - https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65b375a/ -CVE-2023-7203 - https://wpscan.com/vulnerability/b514b631-c3e3-4793-ab5d-35ed0c38b011/ -CVE-2023-7204 - https://wpscan.com/vulnerability/65a8cf83-d6cc-4d4c-a482-288a83a69879/ -CVE-2023-7208 - https://github.com/unpWn4bL3/iot-security/blob/main/13.md -CVE-2023-7215 - https://github.com/Chanzhaoyu/chatgpt-web/issues/2001 -CVE-2023-7215 - https://vuldb.com/?id.249779 -CVE-2023-7216 - https://bugzilla.redhat.com/show_bug.cgi?id=2249901 -CVE-2023-7227 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02 -CVE-2023-7232 - https://wpscan.com/vulnerability/323fef8a-aa17-4698-9a02-c12d1d390763/ -CVE-2023-7233 - https://wpscan.com/vulnerability/585cb2f2-7adc-431f-89d4-4e947f16af18/ -CVE-2023-7236 - https://wpscan.com/vulnerability/2a4557e2-b764-4678-a6d6-af39dd1ba76b/ -CVE-2023-7246 - https://wpscan.com/vulnerability/7413d5ec-10a7-4cb8-ac1c-4ef554751518/ -CVE-2023-7247 - https://drive.google.com/file/d/1GCOzJ-ZovYij9GIdmsrZrR9g8mlC22hs/view?usp=sharing -CVE-2023-7247 - https://wpscan.com/vulnerability/96b93253-31d0-4184-94b7-f1e18355d841/ -CVE-2023-7252 - https://wpscan.com/vulnerability/c452c5da-05a6-4a14-994d-e5049996d496/ -CVE-2023-7253 - https://wpscan.com/vulnerability/aeefcc01-bbbf-4d86-9cfd-ea0f9a85e1a5/ -CVE-2023-7261 - https://issues.chromium.org/issues/40064602 -CVE-2024-0023 - https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268 -CVE-2024-0044 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 -CVE-2024-0044 - https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html -CVE-2024-0049 - https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e -CVE-2024-0051 - https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e -CVE-2024-0181 - https://vuldb.com/?id.249433 -CVE-2024-0182 - https://vuldb.com/?id.249440 -CVE-2024-0187 - https://wpscan.com/vulnerability/b4600411-bee1-4cc8-aee9-0a613ac9b55b/ -CVE-2024-0204 - http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html -CVE-2024-0204 - http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html -CVE-2024-0206 - https://kcm.trellix.com/corporate/index?page=content&id=SB10415 -CVE-2024-0209 - https://gitlab.com/wireshark/wireshark/-/issues/19501 -CVE-2024-0210 - https://gitlab.com/wireshark/wireshark/-/issues/19504 -CVE-2024-0213 - https://kcm.trellix.com/corporate/index?page=content&id=SB10416 -CVE-2024-0233 - https://wpscan.com/vulnerability/04a708a0-b6f3-47d1-aac9-0bb17f57c61e/ -CVE-2024-0235 - https://wpscan.com/vulnerability/e370b99a-f485-42bd-96a3-60432a15a4e9/ -CVE-2024-0236 - https://wpscan.com/vulnerability/09aeb6f2-6473-4de7-8598-e417049896d7/ -CVE-2024-0237 - https://wpscan.com/vulnerability/73d1b00e-1f17-4d9a-bfc8-6bc43a46b90b/ -CVE-2024-0238 - https://wpscan.com/vulnerability/774655ac-b201-4d9f-8790-9eff8564bc91/ -CVE-2024-0239 - https://wpscan.com/vulnerability/b9a4a3e3-7cdd-4354-8541-4219bd41c854/ -CVE-2024-0243 - https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861 -CVE-2024-0248 - https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/ -CVE-2024-0250 - https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/ -CVE-2024-0261 - https://packetstormsecurity.com/files/176342/FTPDMIN-0.96-Denial-Of-Service.html -CVE-2024-0261 - https://vuldb.com/?id.249817 -CVE-2024-0261 - https://www.youtube.com/watch?v=q-CVJfYdd-g -CVE-2024-0263 - https://0day.today/exploit/description/39212 -CVE-2024-0263 - https://packetstormsecurity.com/files/176333/Ultra-Mini-HTTPd-1.21-Denial-Of-Service.html -CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/ -CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py -CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE -CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py -CVE-2024-0268 - https://vuldb.com/?id.249824 -CVE-2024-0273 - https://vuldb.com/?id.249828 -CVE-2024-0278 - https://vuldb.com/?id.249833 -CVE-2024-0300 - https://github.com/tolkent/cve/blob/main/upload.md -CVE-2024-0310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10417 -CVE-2024-0311 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418 -CVE-2024-0312 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418 -CVE-2024-0313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418 -CVE-2024-0321 - https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 -CVE-2024-0322 - https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec -CVE-2024-0337 - https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/ -CVE-2024-0344 - https://vuldb.com/?id.250112 -CVE-2024-0346 - https://drive.google.com/file/d/1bao4YK4GwvAvCdCrsW5UpJZdvREdc_Yj/view?usp=sharing -CVE-2024-0355 - https://medium.com/@heishou/dfsms-has-sql-injection-vulnerability-e9cfbc375be8 -CVE-2024-0357 - https://vuldb.com/?id.250124 -CVE-2024-0361 - https://vuldb.com/?id.250128 -CVE-2024-0365 - https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/ -CVE-2024-0399 - https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/ -CVE-2024-0418 - https://cxsecurity.com/issue/WLB-2024010023 -CVE-2024-0419 - https://cxsecurity.com/issue/WLB-2024010027 -CVE-2024-0419 - https://www.youtube.com/watch?v=6dAWGH0-6TY -CVE-2024-0420 - https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7e54b7/ -CVE-2024-0421 - https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/ -CVE-2024-0425 - https://github.com/mi2acle/forucmsvuln/blob/master/passwordreset.md -CVE-2024-0426 - https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md -CVE-2024-0439 - https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce -CVE-2024-0440 - https://huntr.com/bounties/263fd7eb-f9a9-4578-9655-0e28c609272f -CVE-2024-0455 - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c -CVE-2024-0464 - https://vuldb.com/?id.250569 -CVE-2024-0480 - http://packetstormsecurity.com/files/176548/Taokeyun-SQL-Injection.html -CVE-2024-0496 - https://vuldb.com/?id.250601 -CVE-2024-0500 - https://vuldb.com/?id.250608 -CVE-2024-0503 - https://drive.google.com/file/d/1n9Zas-iSOfKVMN3UzPyVGgQgCmig2A5I/view?usp=sharing -CVE-2024-0510 - http://packetstormsecurity.com/files/176547/HaoKeKeJi-YiQiNiu-Server-Side-Request-Forgery.html -CVE-2024-0521 - https://huntr.com/bounties/a569c64b-1e2b-4bed-a19f-47fd5a3da453 -CVE-2024-0531 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/setBlackRule.md -CVE-2024-0532 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md -CVE-2024-0533 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.devname.md -CVE-2024-0534 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.mac.md -CVE-2024-0538 - https://vuldb.com/?id.250708 -CVE-2024-0543 - https://vuldb.com/?id.250713 -CVE-2024-0546 - https://packetstormsecurity.com/files/94905/EasyFTP-1.7.0.x-Denial-Of-Service.html -CVE-2024-0547 - https://packetstormsecurity.com/files/163079/Ability-FTP-Server-2.34-Denial-Of-Service.html -CVE-2024-0548 - https://packetstormsecurity.com/files/163038/FreeFloat-FTP-Server-1.0-Denial-Of-Service.html -CVE-2024-0550 - https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6 -CVE-2024-0551 - https://huntr.com/bounties/f114c787-ab5f-4f83-afa5-c000435efb78 -CVE-2024-0559 - https://research.cleantalk.org/cve-2024-0559/ -CVE-2024-0559 - https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/ -CVE-2024-0561 - https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/ -CVE-2024-0566 - https://wpscan.com/vulnerability/ca83db95-4a08-4615-aa8d-016022404c32/ -CVE-2024-0574 - https://vuldb.com/?id.250790 -CVE-2024-0575 - https://vuldb.com/?id.250791 -CVE-2024-0599 - https://vuldb.com/?id.250837 -CVE-2024-0603 - https://vuldb.com/?id.250839 -CVE-2024-0646 - https://access.redhat.com/errata/RHSA-2024:0850 -CVE-2024-0647 - https://www.youtube.com/watch?v=KtDjoJlrpAc -CVE-2024-0670 - http://seclists.org/fulldisclosure/2024/Mar/29 -CVE-2024-0670 - https://checkmk.com/werk/16361 -CVE-2024-0672 - https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/ -CVE-2024-0673 - https://wpscan.com/vulnerability/d80e725d-356a-4997-a352-33565e291fc8/ -CVE-2024-0677 - https://wpscan.com/vulnerability/0f7757c9-69fa-49db-90b0-40f0ff29bee7/ -CVE-2024-0684 - https://www.openwall.com/lists/oss-security/2024/01/18/2 -CVE-2024-0693 - https://0day.today/exploit/description/39218 -CVE-2024-0693 - https://packetstormsecurity.com/files/176377/Easy-File-Sharing-FTP-Server-2.0-Denial-Of-Service.html -CVE-2024-0693 - https://www.youtube.com/watch?v=Rcl6VWg_bPY -CVE-2024-0695 - https://packetstormsecurity.com/files/176381/Easy-Chat-Server-3.1-Denial-Of-Service.html -CVE-2024-0695 - https://vuldb.com/?id.251480 -CVE-2024-0695 - https://www.exploitalert.com/view-details.html?id=40072 -CVE-2024-0695 - https://www.youtube.com/watch?v=nGyS2Rp5aEo -CVE-2024-0700 - https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request -CVE-2024-0700 - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve -CVE-2024-0701 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 -CVE-2024-0711 - https://wpscan.com/vulnerability/8e286c04-ef32-4af0-be78-d978999b2a90/ -CVE-2024-0713 - https://drive.google.com/file/d/1C6_4A-96BtR9VTNSadUY09ErroqLEVJ4/view?usp=sharing -CVE-2024-0719 - https://wpscan.com/vulnerability/6e67bf7f-07e6-432b-a8f4-aa69299aecaf/ -CVE-2024-0720 - https://drive.google.com/drive/folders/1ZFjWlD5axvhWp--I7tuiZ9uOpSBmU_f6?usp=drive_link -CVE-2024-0720 - https://github.com/beraoudabdelkhalek/research/tree/main/CVEs/CVE-2024-0720 -CVE-2024-0723 - https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html -CVE-2024-0725 - https://packetstormsecurity.com/files/176544/ProSSHD-1.2-20090726-Denial-Of-Service.html -CVE-2024-0731 - https://fitoxs.com/vuldb/01-PCMan%20v2.0.7-exploit.txt -CVE-2024-0732 - https://fitoxs.com/vuldb/02-PCMan%20v2.0.7-exploit.txt -CVE-2024-0736 - https://0day.today/exploit/39249 -CVE-2024-0737 - https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html -CVE-2024-0741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 -CVE-2024-0745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1871838 -CVE-2024-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 -CVE-2024-0756 - https://wpscan.com/vulnerability/9130a42d-fca3-4f9c-ab97-d5e0a7a5cef2/ -CVE-2024-0757 - https://wpscan.com/vulnerability/eccd017c-e442-46b6-b5e6-aec7bbd5f836/ -CVE-2024-0763 - https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5 -CVE-2024-0765 - https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786 -CVE-2024-0769 - https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md -CVE-2024-0772 - https://youtu.be/WIeWeuXbkiY -CVE-2024-0773 - https://drive.google.com/drive/folders/1YjJFvxis3gLWX95990Y-nJMbWCQHB02U?usp=sharing -CVE-2024-0776 - https://vuldb.com/?id.251678 -CVE-2024-0778 - https://github.com/dezhoutorizhao/cve/blob/main/rce.md -CVE-2024-0778 - https://vuldb.com/?id.251696 -CVE-2024-0779 - https://wpscan.com/vulnerability/ced134cf-82c5-401b-9476-b6456e1924e2/ -CVE-2024-0780 - https://wpscan.com/vulnerability/be3045b1-72e6-450a-8dd2-4702a9328447/ -CVE-2024-0781 - https://drive.google.com/drive/folders/1f61RXqelSDY0T92aLjmb8BhgAHt_eeUS -CVE-2024-0782 - https://drive.google.com/drive/folders/1ecVTReqCS_G8svyq3MG79E2y59psMcPn?usp=sharing -CVE-2024-0782 - https://vuldb.com/?id.251698 -CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC -CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC/blob/main/poc.py -CVE-2024-0784 - https://github.com/biantaibao/octopus_SQL/blob/main/report.md -CVE-2024-0784 - https://vuldb.com/?id.251700 -CVE-2024-0788 - https://fluidattacks.com/advisories/brubeck/ -CVE-2024-0795 - https://huntr.com/bounties/f69e3307-7b44-4776-ac60-2990990723ec -CVE-2024-0799 - https://www.tenable.com/security/research/tra-2024-07 -CVE-2024-0800 - https://www.tenable.com/security/research/tra-2024-07 -CVE-2024-0801 - https://www.tenable.com/security/research/tra-2024-07 -CVE-2024-0811 - http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html -CVE-2024-0815 - https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350 -CVE-2024-0817 - https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3 -CVE-2024-0818 - https://huntr.com/bounties/85b06a1b-ac0b-4096-a06d-330891570cd9 -CVE-2024-0820 - https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/ -CVE-2024-0855 - https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/ -CVE-2024-0856 - https://wpscan.com/vulnerability/eb383600-0cff-4f24-8127-1fb118f0565a/ -CVE-2024-0858 - https://wpscan.com/vulnerability/f6627a35-d158-495e-9d56-69405cfca221/ -CVE-2024-0861 - https://gitlab.com/gitlab-org/gitlab/-/issues/439240 -CVE-2024-0868 - https://wpscan.com/vulnerability/bb7c2d2b-cdfe-433b-96cf-714e71d12b22/ -CVE-2024-0879 - https://research.jfrog.com/vulnerabilities/vector-admin-filter-bypass/ -CVE-2024-0880 - https://vuldb.com/?id.252032 -CVE-2024-0881 - https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/ -CVE-2024-0885 - https://packetstormsecurity.com/files/176633/SpyCamLizard-1.230-Denial-Of-Service.html -CVE-2024-0886 - https://fitoxs.com/vuldb/09-exploit-perl.txt -CVE-2024-0887 - https://fitoxs.com/vuldb/18-exploit-perl.txt -CVE-2024-0889 - https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html -CVE-2024-0890 - https://github.com/biantaibao/octopus_SQL2/blob/main/report.md -CVE-2024-0891 - https://github.com/biantaibao/octopus_XSS/blob/main/report.md -CVE-2024-0891 - https://vuldb.com/?id.252043 -CVE-2024-0902 - https://wpscan.com/vulnerability/fd53e40a-516b-47b9-b495-321774432367/ -CVE-2024-0904 - https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/ -CVE-2024-0905 - https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/ -CVE-2024-0911 - https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html -CVE-2024-0917 - https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119 -CVE-2024-0921 - https://github.com/xiyuanhuaigu/cve/blob/main/rce.md -CVE-2024-0922 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formQuickIndex.md -CVE-2024-0923 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md -CVE-2024-0924 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetPPTPServer.md -CVE-2024-0925 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetVirtualSer.md -CVE-2024-0926 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formWifiWpsOOB.md -CVE-2024-0927 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md -CVE-2024-0928 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md -CVE-2024-0929 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md -CVE-2024-0930 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md -CVE-2024-0930 - https://vuldb.com/?id.252135 -CVE-2024-0931 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md -CVE-2024-0931 - https://vuldb.com/?id.252136 -CVE-2024-0932 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md -CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5 -CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5/blob/main/poc.py -CVE-2024-0937 - https://github.com/bayuncao/vul-cve-6/blob/main/poc.py -CVE-2024-0937 - https://vuldb.com/?id.252182 -CVE-2024-0939 - https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md -CVE-2024-0951 - https://wpscan.com/vulnerability/88b2e479-eb15-4213-9df8-3d353074974e/ -CVE-2024-0953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837916 -CVE-2024-0958 - https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing -CVE-2024-0964 - https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741 -CVE-2024-0968 - https://huntr.com/bounties/566033b9-df20-4928-b4aa-5cd4c3ca1561 -CVE-2024-0973 - https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/ -CVE-2024-0986 - https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link -CVE-2024-0998 - https://vuldb.com/?id.252267 -CVE-2024-1008 - https://vuldb.com/?id.252277 -CVE-2024-1009 - https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn -CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS -CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS/ -CVE-2024-1011 - https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control -CVE-2024-1014 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html -CVE-2024-1015 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html -CVE-2024-1016 - https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html -CVE-2024-1017 - https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html -CVE-2024-1017 - https://www.youtube.com/watch?v=wwHuXfYS8yQ -CVE-2024-1019 - https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30 -CVE-2024-1020 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab -CVE-2024-1021 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5 -CVE-2024-1022 - https://drive.google.com/file/d/1lPZ1yL9UlU-uB03xz17q4OR9338X_1am/view?usp=sharing -CVE-2024-1029 - https://vuldb.com/?id.252302 -CVE-2024-1030 - https://vuldb.com/?id.252303 -CVE-2024-1061 - https://www.tenable.com/security/research/tra-2024-02 -CVE-2024-1068 - https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ -CVE-2024-1076 - https://wpscan.com/vulnerability/9c3e9c72-3d6c-4e2c-bb8a-f4efce1371d5/ -CVE-2024-1086 - https://github.com/Notselwyn/CVE-2024-1086 -CVE-2024-1086 - https://news.ycombinator.com/item?id=39828424 -CVE-2024-1086 - https://pwning.tech/nftables/ -CVE-2024-1098 - https://vuldb.com/?id.252455 -CVE-2024-1098 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/ouiw375l0m8mw5ls -CVE-2024-1099 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/dcilugg0htp973nx -CVE-2024-1106 - https://wpscan.com/vulnerability/0672f8af-33e2-459c-ac8a-7351247a8a26/ -CVE-2024-1142 - https://support.sonatype.com/hc/en-us/articles/27034479038739-CVE-2024-1142-Sonatype-IQ-Server-Path-Traversal-2024-03-06 -CVE-2024-1163 - https://huntr.com/bounties/c1cbc18b-e4ab-4332-ad13-0033f0f976f5 -CVE-2024-1184 - https://fitoxs.com/vuldb/10-exploit-perl.txt -CVE-2024-1185 - https://fitoxs.com/vuldb/11-exploit-perl.txt -CVE-2024-1186 - https://fitoxs.com/vuldb/12-exploit-perl.txt -CVE-2024-1186 - https://www.exploit-db.com/exploits/45884 -CVE-2024-1187 - https://fitoxs.com/vuldb/13-exploit-perl.txt -CVE-2024-1188 - https://fitoxs.com/vuldb/14-exploit-perl.txt -CVE-2024-1189 - https://fitoxs.com/vuldb/15-exploit-perl.txt -CVE-2024-1193 - https://vuldb.com/?id.252683 -CVE-2024-1195 - https://vuldb.com/?id.252685 -CVE-2024-1204 - https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/ -CVE-2024-1215 - https://github.com/PrecursorYork/crud-without-refresh-reload-Reflected_XSS-POC/blob/main/README.md -CVE-2024-1219 - https://wpscan.com/vulnerability/ce4ac9c4-d293-4464-b6a0-82ddf8d4860b/ -CVE-2024-1231 - https://wpscan.com/vulnerability/7d3968d9-61ed-4c00-8764-0360cf03255e/ -CVE-2024-1232 - https://wpscan.com/vulnerability/2a29b509-4cd5-43c8-84f4-f86251dd28f8/ -CVE-2024-1252 - https://github.com/b51s77/cve/blob/main/sql.md -CVE-2024-1252 - https://vuldb.com/?id.252991 -CVE-2024-1253 - https://github.com/b51s77/cve/blob/main/upload.md -CVE-2024-1254 - https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md -CVE-2024-1266 - https://drive.google.com/file/d/16a9lQqUFBICw-Hhbe9bT5sSB7qwZjMwA/view?usp=sharing -CVE-2024-1269 - https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md -CVE-2024-1273 - https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/ -CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/ -CVE-2024-1279 - https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/ -CVE-2024-1290 - https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/ -CVE-2024-1292 - https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/ -CVE-2024-1306 - https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/ -CVE-2024-1307 - https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/ -CVE-2024-1309 - https://www.honeywell.com/us/en/product-security -CVE-2024-1309 - https://www.kb.cert.org/vuls/id/417980 -CVE-2024-1310 - https://wpscan.com/vulnerability/a7735feb-876e-461c-9a56-ea6067faf277/ -CVE-2024-1316 - https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/ -CVE-2024-1319 - https://wpscan.com/vulnerability/5904dc7e-1058-4c40-bca3-66ba57b1414b/ -CVE-2024-1331 - https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/ -CVE-2024-1333 - https://wpscan.com/vulnerability/30546402-03b8-4e18-ad7e-04a6b556ffd7/ -CVE-2024-1401 - https://wpscan.com/vulnerability/91064ba5-cf65-46e6-88df-0e4d96a3ef9f/ -CVE-2024-1432 - https://github.com/bayuncao/vul-cve-12 -CVE-2024-1455 - https://github.com/langchain-ai/langchain/commit/727d5023ce88e18e3074ef620a98137d26ff92a3 -CVE-2024-1460 - https://fluidattacks.com/advisories/mingus/ -CVE-2024-1481 - https://bugzilla.redhat.com/show_bug.cgi?id=2262169 -CVE-2024-1487 - https://wpscan.com/vulnerability/c028cd73-f30a-4c8b-870f-3071055f0496/ -CVE-2024-1507 - https://www.wordfence.com/threat-intel/vulnerabilities/id/09f2cb22-07e2-4fe5-8c2a-9d4420ee26ed?source=cve -CVE-2024-1526 - https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/ -CVE-2024-1564 - https://wpscan.com/vulnerability/ecb1e36f-9c6e-4754-8878-03c97194644d/ -CVE-2024-1588 - https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/ -CVE-2024-1589 - https://wpscan.com/vulnerability/5cfbbddd-d941-4665-be8b-a54454527571/ -CVE-2024-1638 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2 -CVE-2024-1658 - https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/ -CVE-2024-1660 - https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/ -CVE-2024-1661 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-Totolink/X6000R-Hardcoded-Password.md -CVE-2024-1664 - https://wpscan.com/vulnerability/fc3beca7-af38-4ab2-b05f-13b47d042b85/ -CVE-2024-1668 - https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1 -CVE-2024-1669 - https://issues.chromium.org/issues/41495060 -CVE-2024-1670 - https://issues.chromium.org/issues/41481374 -CVE-2024-1671 - https://issues.chromium.org/issues/41487933 -CVE-2024-1672 - https://issues.chromium.org/issues/41485789 -CVE-2024-1675 - https://issues.chromium.org/issues/41486208 -CVE-2024-1676 - https://issues.chromium.org/issues/40944847 -CVE-2024-1694 - https://issues.chromium.org/issues/40946325 -CVE-2024-1700 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS -CVE-2024-1701 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control -CVE-2024-1702 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection -CVE-2024-1703 - https://vuldb.com/?id.254391 -CVE-2024-1704 - https://vuldb.com/?id.254392 -CVE-2024-1705 - https://vuldb.com/?id.254393 -CVE-2024-1707 - https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md -CVE-2024-1708 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass -CVE-2024-1709 - https://github.com/rapid7/metasploit-framework/pull/18870 -CVE-2024-1709 - https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc -CVE-2024-1709 - https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/ -CVE-2024-1709 - https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/ -CVE-2024-1709 - https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ -CVE-2024-1709 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass -CVE-2024-1709 - https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 -CVE-2024-1709 - https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 -CVE-2024-1709 - https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/ -CVE-2024-1712 - https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/ -CVE-2024-1713 - https://github.com/google/security-research/security/advisories/GHSA-r7m9-grw7-vcc4 -CVE-2024-1743 - https://wpscan.com/vulnerability/3cb1f707-6093-42a7-a778-2b296bdf1735/ -CVE-2024-1745 - https://wpscan.com/vulnerability/b63bbfeb-d6f7-4c33-8824-b86d64d3f598/ -CVE-2024-1746 - https://wpscan.com/vulnerability/5f35572a-4129-4fe0-a465-d25f4c3b4419/ -CVE-2024-1750 - https://vuldb.com/?id.254532 -CVE-2024-1752 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/ -CVE-2024-1754 - https://wpscan.com/vulnerability/c061e792-e37a-4cf6-b46b-ff111c5a5c84/ -CVE-2024-1755 - https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ -CVE-2024-1756 - https://wpscan.com/vulnerability/0baedd8d-2bbe-4091-bec4-f99e25d7290d/ -CVE-2024-1781 - https://github.com/Icycu123/X6000R-AX3000-Wifi-6-Giga/blob/main/2/X6000R%20AX3000%20WiFi%206%20Giga%E7%84%A1%E7%B7%9A%E8%B7%AF%E7%94%B1%E5%99%A8%E6%9C%AA%E6%8E%88%E6%9D%83rce.md -CVE-2024-1784 - https://github.com/liyako/vulnerability/blob/main/POC/Limbas-Blind-SQL-injection.md -CVE-2024-1784 - https://vuldb.com/?id.254575 -CVE-2024-1821 - https://github.com/jxp98/VulResearch/blob/main/2024/02/2Crime%20Reporting%20System%20-%20SQL%20Injection-police_add.md -CVE-2024-1824 - https://vuldb.com/?id.254612 -CVE-2024-1827 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.2Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_login.md -CVE-2024-1828 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.3Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_reg.md -CVE-2024-1828 - https://vuldb.com/?id.254616 -CVE-2024-1829 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.4Library%20System%20In%20PHP%20-%20SQL%20Injection-student_reg.md -CVE-2024-1830 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.5Library%20System%20In%20PHP%20-%20SQL%20Injection-student_lostpass.md -CVE-2024-1833 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp -CVE-2024-1834 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss -CVE-2024-1846 - https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/ -CVE-2024-1849 - https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/ -CVE-2024-1871 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/XSS%20Vulnerability%20in%20Project%20Assignment%20Report.md -CVE-2024-1871 - https://vuldb.com/?id.254694 -CVE-2024-1874 - http://www.openwall.com/lists/oss-security/2024/04/12/11 -CVE-2024-1874 - https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 -CVE-2024-1876 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Project%20SQL%20Injection%20Update.md -CVE-2024-1877 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Leave%20Cancel%20SQL%20Injection.md -CVE-2024-1878 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/IDOR%20Employee%20Profile.md -CVE-2024-1892 - https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b -CVE-2024-1899 - https://www.tenable.com/security/research/tra-2024-05 -CVE-2024-1905 - https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/ -CVE-2024-1919 - https://vuldb.com/?id.254854 -CVE-2024-1922 - https://vuldb.com/?id.254857 -CVE-2024-1923 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md -CVE-2024-1924 - https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md -CVE-2024-1926 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md -CVE-2024-1927 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md -CVE-2024-1928 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20XSS.md -CVE-2024-1929 - https://www.openwall.com/lists/oss-security/2024/03/04/2 -CVE-2024-1930 - https://www.openwall.com/lists/oss-security/2024/03/04/2 -CVE-2024-1932 - https://huntr.com/bounties/fefd711e-3bf0-4884-9acc-167649c1f9a2 -CVE-2024-1956 - https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/ -CVE-2024-1958 - https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/ -CVE-2024-1962 - https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ -CVE-2024-1970 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/OnlineLearningSystemV2-XSS.md -CVE-2024-1971 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SQL%20Injection%20Auth.md -CVE-2024-1977 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-004 -CVE-2024-1981 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/ -CVE-2024-1982 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/ -CVE-2024-1983 - https://wpscan.com/vulnerability/bf3a31de-a227-4db1-bd18-ce6a78dc96fb/ -CVE-2024-2002 - https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt -CVE-2024-2014 - https://github.com/mashroompc0527/CVE/blob/main/vul.md -CVE-2024-2016 - https://vuldb.com/?id.255270 -CVE-2024-2018 - https://melapress.com/support/kb/wp-activity-log-plugin-changelog/ -CVE-2024-2021 - https://github.com/dtxharry/cve/blob/main/cve.md -CVE-2024-20287 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO -CVE-2024-20295 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ -CVE-2024-20356 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb -CVE-2024-2044 - https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/ -CVE-2024-2053 - http://seclists.org/fulldisclosure/2024/Mar/11 -CVE-2024-2053 - https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt -CVE-2024-2054 - http://seclists.org/fulldisclosure/2024/Mar/12 -CVE-2024-2054 - https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt -CVE-2024-2055 - http://seclists.org/fulldisclosure/2024/Mar/13 -CVE-2024-2055 - https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt -CVE-2024-2056 - http://seclists.org/fulldisclosure/2024/Mar/14 -CVE-2024-2056 - https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt -CVE-2024-2057 - https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl -CVE-2024-2058 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md -CVE-2024-2059 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md -CVE-2024-2060 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md -CVE-2024-2061 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md -CVE-2024-2062 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md -CVE-2024-2063 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md -CVE-2024-2064 - https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md -CVE-2024-2065 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md -CVE-2024-2066 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md -CVE-2024-2067 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md -CVE-2024-2068 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md -CVE-2024-2069 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md -CVE-2024-2071 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/faq-management-system.md -CVE-2024-20729 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1890 -CVE-2024-2073 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md -CVE-2024-2075 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md -CVE-2024-2077 - https://github.com/yethu123/vulns-finding/blob/main/Simple%20Online%20Bidding%20System.md -CVE-2024-2093 - https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072 -CVE-2024-20954 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20989 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20990 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20991 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20992 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20993 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20994 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20995 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20997 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20998 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-20999 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21000 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21001 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21002 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21003 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21004 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21005 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21006 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21007 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21008 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21009 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-2101 - https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/ -CVE-2024-21010 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21011 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21012 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21013 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21014 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21015 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21016 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21017 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21018 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21019 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-2102 - https://wpscan.com/vulnerability/3d15f589-956c-4c71-98b1-3ba89d22262c/ -CVE-2024-21020 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21021 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21022 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21023 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21024 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21025 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21026 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21027 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21028 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21029 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21030 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21031 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21032 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21033 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21034 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21035 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21036 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21037 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21038 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21039 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21040 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21041 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21042 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21043 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21044 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21045 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21046 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21047 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21048 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21049 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21050 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21051 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21052 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21053 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21054 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21055 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21056 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21057 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21058 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21059 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21060 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21061 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21062 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21063 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21064 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21065 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21066 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21067 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21068 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21069 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21070 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21071 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21072 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21073 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21074 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21075 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21076 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21077 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21078 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21079 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21080 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21081 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21082 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21083 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21084 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21085 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21086 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21087 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21088 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21089 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21090 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21091 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21092 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21093 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21094 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21095 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21096 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21097 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21098 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21099 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21100 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21101 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21102 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21103 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21104 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21105 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21106 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21107 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21108 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21109 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21110 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21111 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21112 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21113 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21114 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21115 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21116 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21117 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21118 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21119 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21120 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-21121 - https://www.oracle.com/security-alerts/cpuapr2024.html -CVE-2024-2118 - https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/ -CVE-2024-2133 - https://vuldb.com/?id.255495 -CVE-2024-21338 - https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/ -CVE-2024-21413 - https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/ -CVE-2024-2145 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md -CVE-2024-2146 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md -CVE-2024-2147 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md -CVE-2024-2148 - https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md -CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734 -CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733 -CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732 -CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731 -CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084 -CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337 -CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335 -CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334 -CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336 -CVE-2024-21488 - https://gist.github.com/icemonster/282ab98fb68fc22aac7c576538f6369c -CVE-2024-21488 - https://security.snyk.io/vuln/SNYK-JS-NETWORK-6184371 -CVE-2024-2149 - https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md -CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 -CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 -CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 -CVE-2024-21492 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21493 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21493 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078 -CVE-2024-21494 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21494 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 -CVE-2024-21495 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21495 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275 -CVE-2024-21496 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21496 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860 -CVE-2024-21497 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21497 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861 -CVE-2024-21498 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21498 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862 -CVE-2024-21499 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21499 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863 -CVE-2024-21500 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -CVE-2024-21501 - https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf -CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557 -CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334 -CVE-2024-21502 - https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26 -CVE-2024-21502 - https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36 -CVE-2024-21502 - https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045 -CVE-2024-21503 - https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273 -CVE-2024-21504 - https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222 -CVE-2024-21505 - https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337 -CVE-2024-21506 - https://gist.github.com/keltecc/62a7c2bf74a997d0a7b48a0ff3853a03 -CVE-2024-21506 - https://security.snyk.io/vuln/SNYK-PYTHON-PYMONGO-6370597 -CVE-2024-21507 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591300 -CVE-2024-21508 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591085 -CVE-2024-21509 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591084 -CVE-2024-21511 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6670046 -CVE-2024-21512 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-7176010 -CVE-2024-21512 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6861580 -CVE-2024-2152 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md -CVE-2024-2153 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md -CVE-2024-2154 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md -CVE-2024-2154 - https://vuldb.com/?id.255586 -CVE-2024-2159 - https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/ -CVE-2024-21623 - https://securitylab.github.com/research/github-actions-untrusted-input/ -CVE-2024-21626 - http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html -CVE-2024-21632 - https://www.descope.com/blog/post/noauth -CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/commit/d348c43b24a9de350ff6e5bd610545a10c1fc712 -CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w -CVE-2024-21640 - https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh -CVE-2024-21644 - https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv -CVE-2024-21645 - https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr -CVE-2024-21652 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv -CVE-2024-21661 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7 -CVE-2024-21662 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454 -CVE-2024-21663 - https://github.com/DEMON1A/Discord-Recon/issues/23 -CVE-2024-21664 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3 -CVE-2024-21665 - https://github.com/pimcore/ecommerce-framework-bundle/security/advisories/GHSA-cx99-25hr-5jxf -CVE-2024-21666 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-c38c-c8mh-vq68 -CVE-2024-21667 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-g273-wppx-82w4 -CVE-2024-2169 - https://kb.cert.org/vuls/id/417980 -CVE-2024-2169 - https://www.kb.cert.org/vuls/id/417980 -CVE-2024-21732 - https://github.com/Ghostfox2003/cms/blob/main/1.md -CVE-2024-21733 - http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html -CVE-2024-2174 - https://issues.chromium.org/issues/325866363 -CVE-2024-2176 - https://issues.chromium.org/issues/325936438 -CVE-2024-2180 - https://fluidattacks.com/advisories/gomez/ -CVE-2024-21887 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html -CVE-2024-2189 - https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/ -CVE-2024-21907 - https://alephsecurity.com/vulns/aleph-2018004 -CVE-2024-21907 - https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678 -CVE-2024-2193 - https://www.vusec.net/projects/ghostrace/ -CVE-2024-22049 - https://github.com/advisories/GHSA-5pq7-52mg-hr42 -CVE-2024-22049 - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42 -CVE-2024-22086 - https://github.com/hayyp/cherry/issues/1 -CVE-2024-22087 - https://github.com/foxweb/pico/issues/31 -CVE-2024-22088 - https://github.com/chendotjs/lotos/issues/7 -CVE-2024-22107 - https://adepts.of0x.cc/gtbcc-pwned/ -CVE-2024-22107 - https://x-c3ll.github.io/cves.html -CVE-2024-22108 - https://adepts.of0x.cc/gtbcc-pwned/ -CVE-2024-22108 - https://x-c3ll.github.io/cves.html -CVE-2024-22120 - https://support.zabbix.com/browse/ZBX-24505 -CVE-2024-22144 - https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve -CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/pull/1792 -CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx -CVE-2024-22191 - https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h -CVE-2024-22194 - https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d -CVE-2024-22196 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c -CVE-2024-22197 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-pxmr-q2x3-9x9m -CVE-2024-22198 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-8r25-68wm-jw35 -CVE-2024-2220 - https://wpscan.com/vulnerability/fe8c001e-8880-4570-b010-a41fc8ee0c58/ -CVE-2024-22202 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6648-6g96-mg35 -CVE-2024-22208 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-9hhf-xmcw-r3xg -CVE-2024-22211 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59 -CVE-2024-22318 - http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html -CVE-2024-22318 - http://seclists.org/fulldisclosure/2024/Feb/7 -CVE-2024-22368 - http://www.openwall.com/lists/oss-security/2024/01/10/2 -CVE-2024-22368 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md -CVE-2024-22368 - https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes -CVE-2024-22368 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html -CVE-2024-22409 - https://github.com/datahub-project/datahub/security/advisories/GHSA-x3v6-r479-m4xv -CVE-2024-22411 - https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh -CVE-2024-22412 - https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r -CVE-2024-22414 - https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-mrcw-j96f-p6v6 -CVE-2024-22416 - https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm -CVE-2024-22418 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp -CVE-2024-22419 - https://github.com/vyperlang/vyper/security/advisories/GHSA-2q8v-3gqq-4f8p -CVE-2024-22422 - https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-xmj6-g32r-fc5q -CVE-2024-22490 - https://github.com/cui2shark/security/blob/main/beetl-bbs%20-%20A%20reflected%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20the%20search%20box.md -CVE-2024-22491 - https://github.com/cui2shark/security/blob/main/A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20beetl-bbs%20post%20save.md -CVE-2024-22492 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20contact%20para)A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20Jfinalcms%20contact%20para.md -CVE-2024-22496 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-username)%20.md -CVE-2024-22497 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-password)%20.md -CVE-2024-22514 - https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution -CVE-2024-22515 - https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability -CVE-2024-22526 - https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3 -CVE-2024-22529 - https://github.com/unpWn4bL3/iot-security/blob/main/29.md -CVE-2024-22532 - https://github.com/pwndorei/CVE-2024-22532 -CVE-2024-22550 - https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html -CVE-2024-22551 - https://packetstormsecurity.com/files/176314/WhatACart-2.0.7-Cross-Site-Scripting.html -CVE-2024-22562 - https://github.com/matthiaskramm/swftools/issues/210 -CVE-2024-22563 - https://github.com/openvswitch/ovs-issues/issues/315 -CVE-2024-22568 - https://github.com/kayo-zjq/myc/blob/main/1.md -CVE-2024-22569 - https://github.com/Num-Nine/CVE/issues/12 -CVE-2024-22570 - https://github.com/Num-Nine/CVE/issues/11 -CVE-2024-22591 - https://github.com/ysuzhangbin/cms2/blob/main/1.md -CVE-2024-22592 - https://github.com/ysuzhangbin/cms2/blob/main/2.md -CVE-2024-22593 - https://github.com/ysuzhangbin/cms2/blob/main/3.md -CVE-2024-22601 - https://github.com/ljw11e/cms/blob/main/5.md -CVE-2024-22603 - https://github.com/ljw11e/cms/blob/main/4.md -CVE-2024-2262 - https://wpscan.com/vulnerability/30544377-b90d-4762-b38a-ec89bda0dfdc/ -CVE-2024-2263 - https://wpscan.com/vulnerability/ec092ed9-eb3e-40a7-a878-ab854104e290/ -CVE-2024-22632 - https://tomiodarim.io/posts/cve-2024-22632-3/ -CVE-2024-22633 - https://tomiodarim.io/posts/cve-2024-22632-3/ -CVE-2024-22635 - https://packetstormsecurity.com/files/176365/WebCalendar-1.3.0-Cross-Site-Scripting.html -CVE-2024-22637 - https://packetstormsecurity.com/files/176403/Form-Tools-3.1.1-Cross-Site-Scripting.html -CVE-2024-22638 - https://packetstormsecurity.com/files/176420/liveSite-2019.1-Remote-Code-Execution.html -CVE-2024-22638 - https://www.exploit-db.com/exploits/51936 -CVE-2024-22639 - https://packetstormsecurity.com/files/176411/iGalerie-3.0.22-Cross-Site-Scripting.html -CVE-2024-2264 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md -CVE-2024-22640 - https://github.com/zunak/CVE-2024-22640 -CVE-2024-22651 - https://github.com/goldds96/Report/blob/main/DLink/DIR-815/CI.md -CVE-2024-22660 - https://github.com/Covteam/iot_vuln/tree/main/setLanguageCfg -CVE-2024-22662 - https://github.com/Covteam/iot_vuln/tree/main/setParentalRules -CVE-2024-22663 - https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2 -CVE-2024-22667 - https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt -CVE-2024-22667 - https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 -CVE-2024-2267 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md -CVE-2024-2268 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md -CVE-2024-2269 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/SQL%20Injection%20Search/SQL%20Injection%20in%20search.php%20.md -CVE-2024-22699 - https://github.com/biantaibao/cms/blob/main/1.md -CVE-2024-2270 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md -CVE-2024-2271 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md -CVE-2024-22715 - https://github.com/RumblingIsOccupied/cms/blob/main/1.md -CVE-2024-2272 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Home/Blind%20SQL%20Injection%20Home.php%20.md -CVE-2024-22727 - https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways -CVE-2024-22729 - https://github.com/adhikara13/CVE/blob/main/netis_MW5360/blind%20command%20injection%20in%20password%20parameter%20in%20initial%20settings.md -CVE-2024-22734 - https://www.redlinecybersecurity.com/blog/cve-2024-22734 -CVE-2024-22749 - https://github.com/gpac/gpac/issues/2713 -CVE-2024-22749 - https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md -CVE-2024-22751 - https://github.com/5erua/vuls/blob/main/dir882.md -CVE-2024-22751 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-22752 - https://github.com/hacker625/CVE-2024-22752 -CVE-2024-2277 - https://vuldb.com/?id.256046 -CVE-2024-22773 - https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433 -CVE-2024-22773 - https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s -CVE-2024-2278 - https://wpscan.com/vulnerability/2cbabde8-1e3e-4205-8a5c-b889447236a0/ -CVE-2024-22795 - https://github.com/Hagrid29/ForeScout-SecureConnector-EoP -CVE-2024-2281 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/BROKEN%20ACCESS%20CONTROL%20.md -CVE-2024-22817 - https://github.com/mafangqian/cms/blob/main/1.md -CVE-2024-22818 - https://github.com/mafangqian/cms/blob/main/3.md -CVE-2024-22819 - https://github.com/mafangqian/cms/blob/main/2.md -CVE-2024-2282 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20Login.md -CVE-2024-2282 - https://vuldb.com/?id.256049 -CVE-2024-2283 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20member-view.php%20.md -CVE-2024-22830 - https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf -CVE-2024-22836 - https://github.com/u32i/cve/tree/main/CVE-2024-22836 -CVE-2024-2284 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-chat.php%20.md -CVE-2024-2285 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-member-edit.php%20.md -CVE-2024-22851 - https://www.drive-byte.de/en/blog/liveconfig-advisory-cve-2024-22851 -CVE-2024-22852 - https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md -CVE-2024-22852 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-22853 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-22854 - https://tomekwasiak.pl/cve-2024-22854/ -CVE-2024-22856 - https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html -CVE-2024-22857 - https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 -CVE-2024-22859 - https://github.com/github/advisory-database/pull/3490 -CVE-2024-22871 - https://hackmd.io/@fe1w0/rymmJGida -CVE-2024-22889 - https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9 -CVE-2024-22891 - https://github.com/EQSTLab/PoC/tree/main/2024/RCE/CVE-2024-22891 -CVE-2024-22899 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -CVE-2024-22900 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -CVE-2024-22901 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -CVE-2024-22902 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -CVE-2024-22903 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -CVE-2024-22911 - https://github.com/matthiaskramm/swftools/issues/216 -CVE-2024-22912 - https://github.com/matthiaskramm/swftools/issues/212 -CVE-2024-22913 - https://github.com/matthiaskramm/swftools/issues/213 -CVE-2024-22914 - https://github.com/matthiaskramm/swftools/issues/214 -CVE-2024-22915 - https://github.com/matthiaskramm/swftools/issues/215 -CVE-2024-22916 - https://kee02p.github.io/2024/01/13/CVE-2024-22916/ -CVE-2024-22916 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-22919 - https://github.com/matthiaskramm/swftools/issues/209 -CVE-2024-22920 - https://github.com/matthiaskramm/swftools/issues/211 -CVE-2024-22923 - https://gist.github.com/whiteman007/ -CVE-2024-22927 - https://github.com/weng-xianhu/eyoucms/issues/57 -CVE-2024-22939 - https://github.com/NUDTTAN91/CVE-2024-22939 -CVE-2024-22939 - https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md -CVE-2024-22942 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/1/TOTOlink%20A3300R%20setWanCfg.md -CVE-2024-22955 - https://github.com/matthiaskramm/swftools/issues/207 -CVE-2024-22956 - https://github.com/matthiaskramm/swftools/issues/208 -CVE-2024-22957 - https://github.com/matthiaskramm/swftools/issues/206 -CVE-2024-22983 - https://github.com/keru6k/CVE-2024-22983/blob/main/CVE-2024-22983.md -CVE-2024-22988 - https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47 -CVE-2024-22988 - https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies -CVE-2024-23031 - https://github.com/weng-xianhu/eyoucms/issues/57 -CVE-2024-23032 - https://github.com/weng-xianhu/eyoucms/issues/57 -CVE-2024-23033 - https://github.com/weng-xianhu/eyoucms/issues/57 -CVE-2024-23034 - https://github.com/weng-xianhu/eyoucms/issues/57 -CVE-2024-23052 - https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28 -CVE-2024-23054 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md -CVE-2024-23055 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 -CVE-2024-23057 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/5/TOTOlink%20A3300R%20setNtpCfg.md -CVE-2024-23058 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/6/TOTOlink%20A3300R%20setTr069Cfg.md -CVE-2024-23059 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/2/TOTOlink%20A3300R%20setDdnsCfg.md -CVE-2024-23060 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/4/TOTOLINK%20A3300R%20setDmzCfg.md -CVE-2024-23061 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/3/TOTOLINK%20A3300R%20setScheduleCfg.md -CVE-2024-2307 - https://bugzilla.redhat.com/show_bug.cgi?id=2268513 -CVE-2024-2309 - https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/ -CVE-2024-23094 - https://github.com/TinkAnet/cve/blob/main/csrf3.md -CVE-2024-2310 - https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/ -CVE-2024-2318 - https://gist.github.com/whiteman007/a3b25a7ddf38774329d72930e0cd841a -CVE-2024-2322 - https://wpscan.com/vulnerability/c740ed3b-d6b8-4afc-8c6b-a1ec37597055/ -CVE-2024-2329 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.md -CVE-2024-2330 - https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md -CVE-2024-23301 - https://github.com/rear/rear/pull/3123 -CVE-2024-2332 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md -CVE-2024-23329 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr -CVE-2024-2333 - https://github.com/0x404Ming/CVE_Hunter/blob/main/SQLi-3.md -CVE-2024-23330 - https://github.com/tutao/tutanota/security/advisories/GHSA-32w8-v5fc-vpp7 -CVE-2024-23331 - https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw -CVE-2024-23334 - https://github.com/aio-libs/aiohttp/pull/8079 -CVE-2024-23342 - https://minerva.crocs.fi.muni.cz/ -CVE-2024-23346 - https://github.com/materialsproject/pymatgen/security/advisories/GHSA-vgv8-5cpj-qj2f -CVE-2024-2344 - https://gist.github.com/Xib3rR4dAr/05a32f63d75082ab05de27e313e70fa3 -CVE-2024-23446 - https://www.elastic.co/community/security -CVE-2024-23447 - https://www.elastic.co/community/security -CVE-2024-23448 - https://www.elastic.co/community/security -CVE-2024-23450 - https://www.elastic.co/community/security -CVE-2024-23525 - https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a -CVE-2024-23525 - https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes -CVE-2024-23525 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html -CVE-2024-2353 - https://github.com/OraclePi/repo/blob/main/totolink%20X6000R/1/X6000R%20AX3000%20WiFi%206%20Giga%20unauthed%20rce.md -CVE-2024-2355 - https://vuldb.com/?id.256315 -CVE-2024-23633 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r -CVE-2024-23634 - https://github.com/geoserver/geoserver/security/advisories/GHSA-75m5-hh4r-q9gx -CVE-2024-23634 - https://osgeo-org.atlassian.net/browse/GEOS-11213 -CVE-2024-2364 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Musicshelf_Manifest_issue.md -CVE-2024-23640 - https://github.com/geoserver/geoserver/security/advisories/GHSA-9rfr-pf2x-g4xf -CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11149 -CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11155 -CVE-2024-23641 - https://github.com/sveltejs/kit/security/advisories/GHSA-g5m6-hxpp-fc49 -CVE-2024-23642 - https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525 -CVE-2024-23642 - https://osgeo-org.atlassian.net/browse/GEOS-11152 -CVE-2024-23643 - https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7 -CVE-2024-23646 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv -CVE-2024-23648 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-mrqg-mwh7-q94j -CVE-2024-23649 - https://github.com/LemmyNet/lemmy/security/advisories/GHSA-r64r-5h43-26qv -CVE-2024-2365 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md -CVE-2024-23655 - https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g -CVE-2024-23656 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r -CVE-2024-23660 - https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/ -CVE-2024-23674 - https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1 -CVE-2024-23681 - https://github.com/advisories/GHSA-98hq-4wmw-98w9 -CVE-2024-23681 - https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9 -CVE-2024-23686 - https://github.com/advisories/GHSA-qqhq-8r2c-c3f5 -CVE-2024-23686 - https://github.com/jeremylong/DependencyCheck/security/advisories/GHSA-qqhq-8r2c-c3f5 -CVE-2024-2369 - https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/ -CVE-2024-23692 - https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ -CVE-2024-23709 - https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c -CVE-2024-23717 - https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2 -CVE-2024-23722 - https://medium.com/@adurands82/fluent-bit-dos-vulnerability-cve-2024-23722-4e3e74af9d00 -CVE-2024-23724 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724 -CVE-2024-23745 - https://blog.xpnsec.com/dirtynib/ -CVE-2024-23745 - https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model -CVE-2024-23745 - https://github.com/louiselalanne/CVE-2024-23745 -CVE-2024-23746 - https://github.com/louiselalanne/CVE-2024-23746 -CVE-2024-23747 - https://github.com/louiselalanne/CVE-2024-23747 -CVE-2024-23749 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -CVE-2024-23749 - http://seclists.org/fulldisclosure/2024/Feb/14 -CVE-2024-23752 - https://github.com/gventuri/pandas-ai/issues/868 -CVE-2024-23756 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23756 -CVE-2024-23759 - https://herolab.usd.de/security-advisories/usd-2023-0046/ -CVE-2024-23760 - https://herolab.usd.de/security-advisories/usd-2023-0050/ -CVE-2024-23761 - https://herolab.usd.de/security-advisories/usd-2023-0048/ -CVE-2024-23762 - https://herolab.usd.de/security-advisories/usd-2023-0049/ -CVE-2024-23763 - https://herolab.usd.de/security-advisories/usd-2023-0047/ -CVE-2024-23817 - https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-7947-48q7-cp5m -CVE-2024-23818 - https://osgeo-org.atlassian.net/browse/GEOS-11153 -CVE-2024-23819 - https://osgeo-org.atlassian.net/browse/GEOS-11154 -CVE-2024-23822 - https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx -CVE-2024-23824 - https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack -CVE-2024-23824 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7 -CVE-2024-23825 - https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg -CVE-2024-23826 - https://github.com/spbu-se/spbu_se_site/security/advisories/GHSA-5vfc-v7hg-pvwm -CVE-2024-23827 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m -CVE-2024-23829 - https://github.com/aio-libs/aiohttp/pull/8074 -CVE-2024-23829 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 -CVE-2024-23833 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-6p92-qfqf-qwx4 -CVE-2024-23837 - https://redmine.openinfosecfoundation.org/issues/6444 -CVE-2024-23850 - https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/ -CVE-2024-23897 - http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html -CVE-2024-23897 - http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html -CVE-2024-2391 - https://www.exploit-db.com/exploits/51153 -CVE-2024-2394 - https://github.com/LiAoRJ/CVE_Hunter/blob/main/RCE-1.md -CVE-2024-23940 - https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1 -CVE-2024-23985 - https://packetstormsecurity.com/files/176663/EzServer-6.4.017-Denial-Of-Service.html -CVE-2024-23995 - https://github.com/EQSTLab/PoC/blob/main/2024/RCE/CVE-2024-23995/README.md -CVE-2024-24001 - https://github.com/jishenghua/jshERP/issues/99 -CVE-2024-24002 - https://github.com/jishenghua/jshERP/issues/99 -CVE-2024-24003 - https://github.com/jishenghua/jshERP/issues/99 -CVE-2024-24004 - https://github.com/jishenghua/jshERP/issues/99 -CVE-2024-2402 - https://wpscan.com/vulnerability/98e050cf-5686-4216-bad1-575decf3eaa7/ -CVE-2024-24034 - https://github.com/ELIZEUOPAIN/CVE-2024-24034/tree/main -CVE-2024-24035 - https://github.com/ELIZEUOPAIN/CVE-2024-24035/tree/main -CVE-2024-2404 - https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/ -CVE-2024-24041 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md -CVE-2024-24041 - https://portswigger.net/web-security/cross-site-scripting -CVE-2024-2405 - https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/ -CVE-2024-24050 - https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050 -CVE-2024-24059 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability -CVE-2024-24060 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#11-stored-cross-site-scripting-sysuser -CVE-2024-24062 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole -CVE-2024-24115 - https://mechaneus.github.io/CVE-2024-24115.html -CVE-2024-24115 - https://mechaneus.github.io/CVE-PENDING-COTONTI.html -CVE-2024-24130 - https://github.com/Hebing123/cve/issues/13 -CVE-2024-24131 - https://github.com/Hebing123/cve/issues/14 -CVE-2024-24133 - https://github.com/Hebing123/cve/issues/16 -CVE-2024-24134 - https://github.com/BurakSevben/2024_Online_Food_Menu_XSS/ -CVE-2024-24135 - https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/ -CVE-2024-24136 - https://github.com/BurakSevben/2024_Math_Game_XSS -CVE-2024-24139 - https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection/ -CVE-2024-24140 - https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection -CVE-2024-24141 - https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1 -CVE-2024-24142 - https://github.com/BurakSevben/School-Task-Manager-SQL-Injection-2 -CVE-2024-24146 - https://github.com/libming/libming/issues/307 -CVE-2024-24147 - https://github.com/libming/libming/issues/311 -CVE-2024-24148 - https://github.com/libming/libming/issues/308 -CVE-2024-24149 - https://github.com/libming/libming/issues/310 -CVE-2024-24150 - https://github.com/libming/libming/issues/309 -CVE-2024-24155 - https://github.com/axiomatic-systems/Bento4/issues/919 -CVE-2024-24156 - https://github.com/gnuboard/g6/issues/316 -CVE-2024-24157 - https://github.com/gnuboard/g6/issues/314 -CVE-2024-24160 - https://github.com/wy876/cve/issues/1 -CVE-2024-24161 - https://github.com/wy876/cve/issues/2 -CVE-2024-24186 - https://github.com/pcmacdon/jsish/issues/98 -CVE-2024-24188 - https://github.com/pcmacdon/jsish/issues/100 -CVE-2024-24189 - https://github.com/pcmacdon/jsish/issues/101 -CVE-2024-24246 - https://github.com/qpdf/qpdf/issues/1123 -CVE-2024-24256 - https://github.com/l8l1/killl.github.io/blob/main/3.md -CVE-2024-2428 - https://wpscan.com/vulnerability/4832e223-4571-4b45-97db-2fd403797c49/ -CVE-2024-2429 - https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/ -CVE-2024-24294 - https://gist.github.com/mestrtee/d1eb6e1f7c6dd60d8838c3e56cab634d -CVE-2024-24300 - https://github.com/yckuo-sdc/PoC -CVE-2024-24301 - https://github.com/yckuo-sdc/PoC -CVE-2024-2432 - https://security.paloaltonetworks.com/CVE-2024-2432 -CVE-2024-24321 - https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md -CVE-2024-24321 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-24325 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md -CVE-2024-24326 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/8/TOTOlink%20A3300R%20setStaticDhcpRules.md -CVE-2024-24327 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/7/TOTOlink%20A3300R%20setIpv6Cfg.md -CVE-2024-24328 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/12/TOTOlink%20A3300R%20setMacFilterRules.md -CVE-2024-24329 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/10/TOTOlink%20A3300R%20setPortForwardRules.md -CVE-2024-24330 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/14/TOTOlink%20A3300R%20setRemoteCfg.md -CVE-2024-24331 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/13/TOTOlink%20A3300R%20setWiFiScheduleCfg.md -CVE-2024-24332 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/9/TOTOlink%20A3300R%20setUrlFilterRules.md -CVE-2024-24333 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/15/TOTOlink%20A3300R%20setWiFiAclRules.md -CVE-2024-24336 - https://nitipoom-jar.github.io/CVE-2024-24336/ -CVE-2024-24337 - https://nitipoom-jar.github.io/CVE-2024-24337/ -CVE-2024-2439 - https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/ -CVE-2024-24396 - https://cves.at/posts/cve-2024-24396/writeup/ -CVE-2024-24397 - https://cves.at/posts/cve-2024-24397/writeup/ -CVE-2024-24398 - https://cves.at/posts/cve-2024-24398/writeup/ -CVE-2024-24399 - https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html -CVE-2024-2441 - https://wpscan.com/vulnerability/9647e273-5724-4a02-868d-9b79f4bb2b79/ -CVE-2024-2444 - https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/ -CVE-2024-24468 - https://github.com/tang-0717/cms/blob/main/3.md -CVE-2024-24469 - https://github.com/tang-0717/cms/blob/main/2.md -CVE-2024-24470 - https://github.com/tang-0717/cms/blob/main/1.md -CVE-2024-24482 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-vgwr-4w3p-xmjv -CVE-2024-24494 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Stored_XSS.md -CVE-2024-24495 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/DailyHabitTracker-SQL_Injection.md -CVE-2024-24496 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Broken_Access_Control.md -CVE-2024-24497 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Login.md -CVE-2024-24498 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-Unauthenticated_Unrestricted_File_Upload_To_RCE.md -CVE-2024-24499 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Update_Profile.md -CVE-2024-24506 - https://bugs.limesurvey.org/bug_relationship_graph.php?bug_id=19364&graph=relation -CVE-2024-24506 - https://www.exploit-db.com/exploits/51926 -CVE-2024-24511 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24511%20-%3E%20Stored%20XSS%20in%20input%20Title%20of%20the%20Component -CVE-2024-24512 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24512%20-%3E%20Stored%20XSS%20in%20input%20SubTitle%20of%20the%20Component -CVE-2024-24520 - https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html -CVE-2024-24524 - https://github.com/harryrabbit5651/cms/blob/main/1.md -CVE-2024-2453 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01 -CVE-2024-24543 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0130/setSchedWifi.md -CVE-2024-24559 - https://github.com/vyperlang/vyper/security/advisories/GHSA-6845-xw22-ffxv -CVE-2024-24560 - https://github.com/vyperlang/vyper/security/advisories/GHSA-gp3w-2v2m-p686 -CVE-2024-24561 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c -CVE-2024-24563 - https://github.com/vyperlang/vyper/security/advisories/GHSA-52xq-j7v9-v4v2 -CVE-2024-24564 - https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx -CVE-2024-24565 - https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96 -CVE-2024-24566 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-pf55-fj96-xf37 -CVE-2024-24569 - https://github.com/pixee/java-security-toolkit/security/advisories/GHSA-qh4g-4m4w-jgv2 -CVE-2024-24570 - http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html -CVE-2024-24570 - http://seclists.org/fulldisclosure/2024/Feb/17 -CVE-2024-24571 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-h7w3-xv88-2xqj -CVE-2024-24572 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-xw34-8pj6-75gc -CVE-2024-24573 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-w67q-pp62-j4pf -CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/pull/2827 -CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx -CVE-2024-24578 - https://github.com/jens-maus/RaspberryMatic/security/advisories/GHSA-q967-q4j8-637h -CVE-2024-2470 - https://wpscan.com/vulnerability/8514b8ce-ff23-4aba-b2f1-fd36beb7d2ff/ -CVE-2024-24707 - https://snicco.io/vulnerability-disclosure/cwicly/remote-code-execution-cwicly-1-4-0-2?_s_id=cve -CVE-2024-24724 - https://packetstormsecurity.com/files/177857 -CVE-2024-24725 - https://www.exploit-db.com/exploits/51903 -CVE-2024-24736 - https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html -CVE-2024-24747 - https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4 -CVE-2024-24752 - https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 -CVE-2024-24753 - https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r -CVE-2024-24754 - https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w -CVE-2024-24756 - https://github.com/crafatar/crafatar/security/advisories/GHSA-5cxq-25mp-q5f2 -CVE-2024-24762 - https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p -CVE-2024-24762 - https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238 -CVE-2024-24762 - https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389 -CVE-2024-24765 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c -CVE-2024-24766 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm -CVE-2024-24767 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x -CVE-2024-24768 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h -CVE-2024-24793 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931 -CVE-2024-24793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931 -CVE-2024-24794 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931 -CVE-2024-24794 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931 -CVE-2024-24806 - http://www.openwall.com/lists/oss-security/2024/02/08/2 -CVE-2024-24806 - https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6 -CVE-2024-24808 - https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5 -CVE-2024-24809 - https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5 -CVE-2024-24810 - https://github.com/wixtoolset/issues/security/advisories/GHSA-7wh2-wxc7-9ph5 -CVE-2024-24814 - https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv -CVE-2024-24818 - https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7j -CVE-2024-24824 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-p6gg-5hf4-4rgj -CVE-2024-24830 - https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v -CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/SetSpeedWan.md -CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md -CVE-2024-2489 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetQosBand.md -CVE-2024-2490 - https://github.com/Emilytutu/IoT-vulnerable/blob/main/Tenda/AC18/setSchedWifi_end.md -CVE-2024-24945 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md -CVE-2024-24945 - https://portswigger.net/web-security/cross-site-scripting -CVE-2024-25003 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -CVE-2024-25003 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html -CVE-2024-25003 - http://seclists.org/fulldisclosure/2024/Feb/14 -CVE-2024-25003 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 -CVE-2024-25004 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -CVE-2024-25004 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html -CVE-2024-25004 - http://seclists.org/fulldisclosure/2024/Feb/14 -CVE-2024-25004 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 -CVE-2024-25007 - https://www.ericsson.com/en/about-us/security/psirt/security-bulletin--ericsson-network-manager-march-2024 -CVE-2024-2505 - https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/ -CVE-2024-2509 - https://research.cleantalk.org/cve-2024-2509/ -CVE-2024-2509 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ -CVE-2024-25106 - https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7 -CVE-2024-25108 - https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf -CVE-2024-25117 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273 -CVE-2024-25122 - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 -CVE-2024-25123 - https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2 -CVE-2024-25124 - http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html -CVE-2024-25124 - https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg -CVE-2024-25126 - https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx -CVE-2024-2515 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md -CVE-2024-2516 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md -CVE-2024-25164 - https://github.com/u32i/cve/tree/main/CVE-2024-25164 -CVE-2024-25165 - https://github.com/matthiaskramm/swftools/issues/217 -CVE-2024-25166 - https://github.com/xiaocheng-keji/71cms/issues/1 -CVE-2024-25167 - https://github.com/biantaibao/eblog_xss/blob/main/report.md -CVE-2024-25168 - https://github.com/biantaibao/snow_SQL/blob/main/report.md -CVE-2024-25169 - https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0 -CVE-2024-2517 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md -CVE-2024-25170 - https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 -CVE-2024-2518 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20book_history.php.md -CVE-2024-25180 - https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md -CVE-2024-25180 - https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 -CVE-2024-2519 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20navbar.php.md -CVE-2024-25197 - https://github.com/ros-planning/navigation2/issues/3940 -CVE-2024-2520 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20bookdate.php.md -CVE-2024-25200 - https://github.com/espruino/Espruino/issues/2457 -CVE-2024-25201 - https://github.com/espruino/Espruino/issues/2456 -CVE-2024-25202 - https://github.com/Agampreet-Singh/CVE-2024-25202 -CVE-2024-25202 - https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52 -CVE-2024-25207 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-2.md -CVE-2024-25208 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-1.md -CVE-2024-25209 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20SQL%20Injection.md -CVE-2024-2521 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md -CVE-2024-25210 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tacker%20-%20SQL%20Injection-1.md -CVE-2024-25211 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md -CVE-2024-25212 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%204.md -CVE-2024-25213 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%203.md -CVE-2024-25214 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md -CVE-2024-25215 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%202.md -CVE-2024-25216 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%201.md -CVE-2024-25217 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection(Unauthenticated).md -CVE-2024-25218 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-1.md -CVE-2024-25219 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-%202.md -CVE-2024-2522 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20booktime.php.md -CVE-2024-2522 - https://vuldb.com/?id.256959 -CVE-2024-25220 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%202.md -CVE-2024-25221 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-3.md -CVE-2024-25222 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%201.md -CVE-2024-25223 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md -CVE-2024-25224 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md -CVE-2024-25225 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%201.md -CVE-2024-25226 - https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md -CVE-2024-25228 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -CVE-2024-2523 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20booktime.php.md -CVE-2024-25239 - https://blu3ming.github.io/sourcecodester-employee-management-system-sql-injection/ -CVE-2024-2524 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20receipt.php.md -CVE-2024-2525 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20receipt.php.md -CVE-2024-2526 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20rooms.php.md -CVE-2024-25260 - https://sourceware.org/bugzilla/show_bug.cgi?id=31058 -CVE-2024-25262 - https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912 -CVE-2024-25269 - https://github.com/strukturag/libheif/issues/1073 -CVE-2024-2527 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20rooms.php.md -CVE-2024-2528 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-rooms.php.md -CVE-2024-25288 - https://github.com/slims/slims9_bulian/issues/229 -CVE-2024-2529 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20rooms.php.md -CVE-2024-25291 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25291 -CVE-2024-25292 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25292 -CVE-2024-25293 - https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293 -CVE-2024-25297 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/BLUDIT%20Stored%20XSS.md -CVE-2024-25298 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/REDAXO%20RCE.md -CVE-2024-2530 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-rooms.php.md -CVE-2024-25300 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md -CVE-2024-25301 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/RCE.md -CVE-2024-25301 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459 -CVE-2024-25302 - https://github.com/tubakvgc/CVE/blob/main/Event_Student_Attendance_System.md -CVE-2024-25304 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-2.md -CVE-2024-25305 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass.md -CVE-2024-25306 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-1.md -CVE-2024-25307 - https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md -CVE-2024-25308 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md -CVE-2024-25309 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-7.md -CVE-2024-2531 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20update-rooms.php.md -CVE-2024-25310 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-3.md -CVE-2024-25312 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-5.md -CVE-2024-25313 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass%20-%202.md -CVE-2024-25314 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-2.md -CVE-2024-25315 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-1.md -CVE-2024-25316 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-4.md -CVE-2024-25318 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-3.md -CVE-2024-2532 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md -CVE-2024-25320 - https://github.com/cqliuke/cve/blob/main/sql.md -CVE-2024-25327 - https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html -CVE-2024-2533 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-users.php.md -CVE-2024-2534 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20users.php.md -CVE-2024-25343 - https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343 -CVE-2024-25344 - https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html -CVE-2024-2535 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20users.php.md -CVE-2024-25350 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md -CVE-2024-25351 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Change_Image.md -CVE-2024-25354 - https://gist.github.com/6en6ar/c3b11b4058b8e2bc54717408d451fb79 -CVE-2024-25360 - https://github.com/leetsun/Hints/tree/main/moto-CX2L/4 -CVE-2024-25366 - https://github.com/mz-automation/libiec61850/issues/492 -CVE-2024-25369 - https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20(XSS).md -CVE-2024-25373 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_49B384.md -CVE-2024-2538 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e -CVE-2024-25385 - https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md -CVE-2024-25385 - https://github.com/noirotm/flvmeta/issues/23 -CVE-2024-25386 - https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2 -CVE-2024-25386 - https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/ -CVE-2024-25398 - https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md -CVE-2024-25410 - https://github.com/flusity/flusity-CMS/issues/9 -CVE-2024-25413 - https://github.com/capture0x/Magento-ver.-2.4.6 -CVE-2024-25413 - https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html -CVE-2024-25414 - https://github.com/capture0x/CSZ_CMS -CVE-2024-25414 - https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html -CVE-2024-25415 - https://github.com/capture0x/Phoenix -CVE-2024-25415 - https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html -CVE-2024-25417 - https://github.com/Carl0724/cms/blob/main/3.md -CVE-2024-25418 - https://github.com/Carl0724/cms/blob/main/2.md -CVE-2024-25419 - https://github.com/Carl0724/cms/blob/main/1.md -CVE-2024-25423 - https://github.com/DriverUnload/cve-2024-25423 -CVE-2024-25428 - https://github.com/wuweiit/mushroom/issues/19 -CVE-2024-2543 - https://gist.github.com/Xib3rR4dAr/a248426dfee107c6fda08e80f98fa894 -CVE-2024-25434 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25434%20-%3E%20Stored%20XSS%20in%20input%20public%20name%20of%20the%20Component -CVE-2024-25435 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25435%20-%3E%20Reflected%20XSS%20on%20md1patient%20login%20page -CVE-2024-25436 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions -CVE-2024-25438 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions -CVE-2024-25442 - https://bugs.launchpad.net/hugin/+bug/2025032 -CVE-2024-25443 - https://bugs.launchpad.net/hugin/+bug/2025035 -CVE-2024-25445 - https://bugs.launchpad.net/hugin/+bug/2025038 -CVE-2024-25446 - https://bugs.launchpad.net/hugin/+bug/2025037 -CVE-2024-25447 - https://github.com/derf/feh/issues/709 -CVE-2024-25448 - https://github.com/derf/feh/issues/711 -CVE-2024-25450 - https://github.com/derf/feh/issues/712 -CVE-2024-25451 - https://github.com/axiomatic-systems/Bento4/issues/872 -CVE-2024-25452 - https://github.com/axiomatic-systems/Bento4/issues/873 -CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/204 -CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/874 -CVE-2024-25454 - https://github.com/axiomatic-systems/Bento4/issues/875 -CVE-2024-25458 - https://tanzhuyin.com/posts/cve-2024-25458/ -CVE-2024-2546 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md -CVE-2024-2547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md -CVE-2024-25502 - https://github.com/flusity/flusity-CMS/issues/10 -CVE-2024-25503 - https://github.com/EQSTLab/PoC/tree/main/2024/XSS/CVE-2024-25503 -CVE-2024-25507 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#plan_template_previewaspx -CVE-2024-25508 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#bulletin_template_showaspx -CVE-2024-25509 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_file_downloadaspx -CVE-2024-25510 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx -CVE-2024-25511 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_newaspx -CVE-2024-25512 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#attachdownloadaspx -CVE-2024-25513 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx -CVE-2024-25514 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_template_child_field_listaspx -CVE-2024-25515 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_finish_file_downaspx -CVE-2024-25517 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx -CVE-2024-25518 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx -CVE-2024-25519 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx -CVE-2024-25520 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx -CVE-2024-25521 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx -CVE-2024-25522 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx -CVE-2024-25523 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx -CVE-2024-25524 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx -CVE-2024-25525 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx -CVE-2024-25526 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx -CVE-2024-25527 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx -CVE-2024-25528 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx -CVE-2024-25529 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_office_file_history_showaspx -CVE-2024-2553 - https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md -CVE-2024-25530 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx -CVE-2024-25531 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx -CVE-2024-25532 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx -CVE-2024-25533 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data -CVE-2024-2554 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp -CVE-2024-2555 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp -CVE-2024-2556 - https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md -CVE-2024-2557 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Execute%20After%20Redirect%20-%20Food%20Management%20System.md -CVE-2024-25575 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1963 -CVE-2024-25575 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1963 -CVE-2024-2558 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md -CVE-2024-2559 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md -CVE-2024-2560 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md -CVE-2024-25600 - https://github.com/Chocapikk/CVE-2024-25600 -CVE-2024-25600 - https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT -CVE-2024-25600 - https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6 -CVE-2024-25618 - https://github.com/mastodon/mastodon/security/advisories/GHSA-vm39-j3vx-pch3 -CVE-2024-25619 - https://github.com/mastodon/mastodon/security/advisories/GHSA-7w3c-p9j8-mq3x -CVE-2024-25625 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx -CVE-2024-25627 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf -CVE-2024-25634 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv -CVE-2024-25635 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f -CVE-2024-25641 - https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88 -CVE-2024-25648 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1959 -CVE-2024-25648 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1959 -CVE-2024-25652 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652 -CVE-2024-25653 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25653 -CVE-2024-2567 - https://github.com/ctflearner/Android_Findings/blob/main/AndroidWeatherApp/Android_backup.md -CVE-2024-25676 - https://excellium-services.com/cert-xlm-advisory/cve-2024-25676 -CVE-2024-2568 - https://github.com/bigbigbigbaby/cms/blob/main/5.md -CVE-2024-2569 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20admin-manage-user.php.md -CVE-2024-2570 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md -CVE-2024-2571 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md -CVE-2024-25712 - https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html -CVE-2024-25713 - https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh -CVE-2024-2572 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md -CVE-2024-25728 - https://www.bleepingcomputer.com/news/security/expressvpn-bug-has-been-leaking-some-dns-requests-for-years/ -CVE-2024-2573 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md -CVE-2024-25730 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-25730 -CVE-2024-25734 - http://packetstormsecurity.com/files/177081 -CVE-2024-25735 - http://packetstormsecurity.com/files/177082 -CVE-2024-25736 - http://packetstormsecurity.com/files/177083 -CVE-2024-2574 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md -CVE-2024-25742 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9 -CVE-2024-25746 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md -CVE-2024-25748 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md -CVE-2024-2575 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md -CVE-2024-25751 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetSysTime.md -CVE-2024-25753 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md -CVE-2024-25756 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md -CVE-2024-2576 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md -CVE-2024-2577 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md -CVE-2024-2577 - https://vuldb.com/?id.257080 -CVE-2024-25807 - https://github.com/Hebing123/cve/issues/17 -CVE-2024-25808 - https://github.com/Hebing123/cve/issues/17 -CVE-2024-2581 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md -CVE-2024-25811 - https://github.com/Fei123-design/vuln/blob/master/Dreamer%20CMS%20Unauthorized%20access%20vulnerability.md -CVE-2024-25817 - https://github.com/advisories/GHSA-3qx3-6hxr-j2ch -CVE-2024-25817 - https://www.cubeyond.net/blog/my-cves/eza-cve-report -CVE-2024-25828 - https://github.com/sec-Kode/cve -CVE-2024-2583 - https://wpscan.com/vulnerability/98d8c713-e8cd-4fad-a8fb-7a40db2742a2/ -CVE-2024-25830 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report -CVE-2024-25831 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report -CVE-2024-25832 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report -CVE-2024-25833 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report -CVE-2024-25843 - https://security.friendsofpresta.org/modules/2024/02/27/ba_importer.html -CVE-2024-25850 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md -CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md -CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md -CVE-2024-25852 - https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md -CVE-2024-25866 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md -CVE-2024-25867 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Add_Type.md -CVE-2024-25868 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Stored_XSS_Add_Type.md -CVE-2024-25869 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Unrestricted_Fileupload.md -CVE-2024-25873 - https://github.com/dd3x3r/enhavo/blob/main/html-injection-page-content-blockquote-author-v0.13.1.md -CVE-2024-25874 - https://github.com/dd3x3r/enhavo/blob/main/xss-create-tag-v0.13.1.md -CVE-2024-25875 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-undertitel-v0.13.1.md -CVE-2024-25876 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md -CVE-2024-25891 - https://github.com/ChurchCRM/CRM/issues/6856 -CVE-2024-25892 - https://github.com/ChurchCRM/CRM/issues/6858 -CVE-2024-25893 - https://github.com/ChurchCRM/CRM/issues/6856 -CVE-2024-25894 - https://github.com/ChurchCRM/CRM/issues/6849 -CVE-2024-25895 - https://github.com/ChurchCRM/CRM/issues/6853 -CVE-2024-25896 - https://github.com/ChurchCRM/CRM/issues/6854 -CVE-2024-25897 - https://github.com/ChurchCRM/CRM/issues/6856 -CVE-2024-25898 - https://github.com/ChurchCRM/CRM/issues/6851 -CVE-2024-25938 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1958 -CVE-2024-25938 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1958 -CVE-2024-25973 - http://seclists.org/fulldisclosure/2024/Feb/23 -CVE-2024-25973 - https://r.sec-consult.com/openolat -CVE-2024-25974 - http://seclists.org/fulldisclosure/2024/Feb/23 -CVE-2024-25974 - https://r.sec-consult.com/openolat -CVE-2024-25975 - https://r.sec-consult.com/hawki -CVE-2024-25976 - https://r.sec-consult.com/hawki -CVE-2024-25977 - https://r.sec-consult.com/hawki -CVE-2024-2603 - https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/ -CVE-2024-2604 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md -CVE-2024-26134 - https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m -CVE-2024-26135 - https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8 -CVE-2024-26149 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w -CVE-2024-26152 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg -CVE-2024-2627 - https://issues.chromium.org/issues/41493290 -CVE-2024-2631 - https://issues.chromium.org/issues/41495878 -CVE-2024-26329 - https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/ -CVE-2024-26333 - https://github.com/matthiaskramm/swftools/issues/219 -CVE-2024-26334 - https://github.com/matthiaskramm/swftools/issues/221 -CVE-2024-26335 - https://github.com/matthiaskramm/swftools/issues/222 -CVE-2024-26337 - https://github.com/matthiaskramm/swftools/issues/223 -CVE-2024-26339 - https://github.com/matthiaskramm/swftools/issues/225 -CVE-2024-26342 - https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md -CVE-2024-26349 - https://github.com/Icycu123/cms/blob/main/1.md -CVE-2024-26362 - https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html -CVE-2024-26369 - https://github.com/eProsima/Fast-DDS/issues/4365 -CVE-2024-26445 - https://github.com/xiaolanjing0/cms/blob/main/1.md -CVE-2024-26454 - https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4 -CVE-2024-26454 - https://medium.com/@0x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210 -CVE-2024-26470 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470 -CVE-2024-26471 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26471 -CVE-2024-26476 - https://github.com/mpdf/mpdf/issues/867 -CVE-2024-26489 - https://github.com/2111715623/cms/blob/main/3.md -CVE-2024-26490 - https://github.com/2111715623/cms/blob/main/2.md -CVE-2024-26491 - https://github.com/2111715623/cms/blob/main/1.md -CVE-2024-26492 - https://packetstormsecurity.com/files/165555/Online-Diagnostic-Lab-Management-System-1.0-Missing-Access-Control.html -CVE-2024-26492 - https://www.exploit-db.com/exploits/50660 -CVE-2024-26495 - https://github.com/friendica/friendica/issues/13884 -CVE-2024-26504 - https://tomiodarim.io/posts/cve-2024-26504/ -CVE-2024-26521 - https://github.com/capture0x/Phoenix -CVE-2024-26521 - https://github.com/hackervegas001/CVE-2024-26521 -CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/492 -CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/495 -CVE-2024-26540 - https://github.com/GreycLab/CImg/issues/403 -CVE-2024-26542 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-26542/README.md -CVE-2024-26548 - https://github.com/cwh031600/vivotek/blob/main/vivotek-FD8166A-uploadfile-dos/vivotek-FD8166A-uploadfile-analysis.md -CVE-2024-26557 - https://github.com/Hebing123/cve/issues/18 -CVE-2024-26559 - https://syst1m.cn/2024/01/22/U%E9%AA%8C%E8%AF%81%E7%BD%91%E7%BB%9C%E7%94%A8%E6%88%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ -CVE-2024-26577 - https://github.com/guusec/VSeeDoS -CVE-2024-26633 - https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd -CVE-2024-26798 - https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f -CVE-2024-26798 - https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d -CVE-2024-26798 - https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b -CVE-2024-26798 - https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520 -CVE-2024-26798 - https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8 -CVE-2024-2690 - https://github.com/wkeyi0x1/vul-report/issues/2 -CVE-2024-2697 - https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/ -CVE-2024-26979 - https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73 -CVE-2024-26979 - https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac -CVE-2024-26979 - https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791 -CVE-2024-26979 - https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2 -CVE-2024-26979 - https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7 -CVE-2024-26979 - https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d -CVE-2024-26979 - https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000 -CVE-2024-27000 - https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026 -CVE-2024-2703 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md -CVE-2024-2704 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md -CVE-2024-2705 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetQosBand.md -CVE-2024-2706 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md -CVE-2024-2707 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWriteFacMac.md -CVE-2024-2708 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md -CVE-2024-27081 - https://github.com/esphome/esphome/security/advisories/GHSA-8p25-3q46-8q2p -CVE-2024-27082 - https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h -CVE-2024-27088 - https://github.com/medikoo/es5-ext/issues/201 -CVE-2024-2709 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md -CVE-2024-27092 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp -CVE-2024-27093 - https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4 -CVE-2024-2710 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/setSchedWifi_start.md -CVE-2024-2711 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/addWifiMacFilter_deviceMac.md -CVE-2024-27132 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ -CVE-2024-27133 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ -CVE-2024-27285 - https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc -CVE-2024-27285 - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml -CVE-2024-27287 - https://github.com/esphome/esphome/security/advisories/GHSA-9p43-hj5j-96h5 -CVE-2024-2729 - https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14/ -CVE-2024-27297 - https://hackmd.io/03UGerewRcy3db44JQoWvw -CVE-2024-27299 - https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing -CVE-2024-27299 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw -CVE-2024-27300 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx -CVE-2024-27301 - https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc -CVE-2024-27302 - https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq -CVE-2024-27318 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 -CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/561ac3c17b92cb55d3032504a076fa4b -CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e -CVE-2024-2739 - https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2/ -CVE-2024-27398 - https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2 -CVE-2024-27398 - https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249 -CVE-2024-27398 - https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014 -CVE-2024-27398 - https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53 -CVE-2024-27398 - https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546 -CVE-2024-27398 - https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178 -CVE-2024-27398 - https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5 -CVE-2024-27398 - https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93 -CVE-2024-27399 - https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c -CVE-2024-27399 - https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9 -CVE-2024-27399 - https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33 -CVE-2024-27399 - https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0 -CVE-2024-27399 - https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c -CVE-2024-27399 - https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae -CVE-2024-27399 - https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79 -CVE-2024-27399 - https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4 -CVE-2024-2744 - https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f/ -CVE-2024-27453 - https://www.exsiliumsecurity.com/CVE-2024-27453.html -CVE-2024-27474 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md -CVE-2024-27476 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md -CVE-2024-27477 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md -CVE-2024-2749 - https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91/ -CVE-2024-27515 - https://github.com/mindstellar/Osclass/issues/495 -CVE-2024-27516 - https://github.com/LiveHelperChat/livehelperchat/issues/2054 -CVE-2024-27517 - https://github.com/webasyst/webasyst-framework/issues/377 -CVE-2024-27518 - https://github.com/secunnix/CVE-2024-27518 -CVE-2024-27518 - https://www.youtube.com/watch?v=FM5XlZPdvdo -CVE-2024-27521 - https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md -CVE-2024-2754 - https://github.com/wkeyi0x1/vul-report/issues/4 -CVE-2024-27558 - https://github.com/kilooooo/cms/blob/main/2.md -CVE-2024-27559 - https://github.com/kilooooo/cms/blob/main/1.md -CVE-2024-2756 - http://www.openwall.com/lists/oss-security/2024/04/12/11 -CVE-2024-2756 - https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4 -CVE-2024-27561 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md -CVE-2024-27563 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md -CVE-2024-27564 - https://github.com/dirk1983/chatgpt/issues/114 -CVE-2024-27565 - https://github.com/dirk1983/chatgpt-wechat-personal/issues/4 -CVE-2024-27567 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/config_vpn_pptp.md -CVE-2024-27568 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md -CVE-2024-27569 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md -CVE-2024-2757 - http://www.openwall.com/lists/oss-security/2024/04/12/11 -CVE-2024-2757 - https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq -CVE-2024-27570 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md -CVE-2024-27571 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md -CVE-2024-27572 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md -CVE-2024-27592 - https://medium.com/@nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7 -CVE-2024-27593 - https://blog.smarttecs.com/posts/2024-002-cve-2024-27593/ -CVE-2024-2760 - https://fluidattacks.com/advisories/kent/ -CVE-2024-2761 - https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/ -CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos -CVE-2024-27619 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-27620 - https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html -CVE-2024-27622 - https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html -CVE-2024-27625 - https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html -CVE-2024-27626 - https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html -CVE-2024-27627 - https://packetstormsecurity.com/files/177254/SuperCali-1.1.0-Cross-Site-Scripting.html -CVE-2024-2763 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md -CVE-2024-27630 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 -CVE-2024-27631 - https://github.com/ally-petitt/CVE-2024-27631 -CVE-2024-27631 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 -CVE-2024-27632 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 -CVE-2024-2764 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md -CVE-2024-27665 - https://github.com/Thirukrishnan/CVE-2024-27665/ -CVE-2024-27668 - https://github.com/LY102483/cms/blob/main/1.md -CVE-2024-27680 - https://github.com/xiaolanjing0/cms/blob/main/4.md -CVE-2024-27683 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-27684 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-27689 - https://github.com/Xin246/cms/blob/main/2.md -CVE-2024-27694 - https://github.com/sms2056/cms/blob/main/1.md -CVE-2024-27703 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27703/README.md -CVE-2024-27705 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705 -CVE-2024-27706 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md -CVE-2024-27707 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27707 -CVE-2024-27718 - https://github.com/tldjgggg/cve/blob/main/sql.md -CVE-2024-27719 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002 -CVE-2024-27733 - https://github.com/Sadw11v/cve/blob/main/upload.md -CVE-2024-27734 - https://github.com/sms2056/cms/blob/main/3.md -CVE-2024-27743 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md -CVE-2024-27744 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md -CVE-2024-27746 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md -CVE-2024-27747 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md -CVE-2024-27752 - https://github.com/flyhha/cms/blob/main/1.md -CVE-2024-27757 - https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh -CVE-2024-27758 - https://gist.github.com/renbou/957f70d27470982994f12a1d70153d09 -CVE-2024-27916 - https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37 -CVE-2024-27921 - https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc -CVE-2024-27923 - https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v -CVE-2024-27927 - https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3 -CVE-2024-27932 - https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr -CVE-2024-27933 - https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq -CVE-2024-27934 - https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf -CVE-2024-27935 - https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp -CVE-2024-27936 - https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw -CVE-2024-27938 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide -CVE-2024-2805 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md -CVE-2024-28056 - https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/ -CVE-2024-2806 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md -CVE-2024-2806 - https://vuldb.com/?id.257661 -CVE-2024-28065 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-007.txt -CVE-2024-28066 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt -CVE-2024-2807 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md -CVE-2024-2807 - https://vuldb.com/?id.257662 -CVE-2024-2808 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md -CVE-2024-28085 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt -CVE-2024-28085 - https://www.openwall.com/lists/oss-security/2024/03/27/5 -CVE-2024-28088 - https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md -CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089 -CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC.gif -CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC_DOS_ALT.gif -CVE-2024-2809 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md -CVE-2024-2810 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md -CVE-2024-28102 - https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97 -CVE-2024-28105 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf -CVE-2024-28106 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r -CVE-2024-28107 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r -CVE-2024-28108 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh -CVE-2024-2811 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md -CVE-2024-28116 - https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh -CVE-2024-28117 - https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv -CVE-2024-28118 - https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4 -CVE-2024-28119 - https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58 -CVE-2024-2812 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWriteFacMac.md -CVE-2024-28120 - https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p -CVE-2024-28120 - https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome -CVE-2024-28122 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 -CVE-2024-2813 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md -CVE-2024-2814 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md -CVE-2024-2815 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md -CVE-2024-2816 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md -CVE-2024-2817 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md -CVE-2024-28185 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf -CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-3xpw-36v7-2cmg -CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf -CVE-2024-28192 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm -CVE-2024-28193 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-3782-758f-mj85 -CVE-2024-28194 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827 -CVE-2024-28195 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj -CVE-2024-28196 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq -CVE-2024-2821 - https://vuldb.com/?id.257708 -CVE-2024-28224 - https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224/ -CVE-2024-2823 - https://github.com/lcg-22266/cms/blob/main/1.md -CVE-2024-28231 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w -CVE-2024-28232 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p -CVE-2024-28237 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c -CVE-2024-28239 - https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p -CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip -CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/issues/84 -CVE-2024-28247 - https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x -CVE-2024-28253 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-7vf4-x5m2-r6gr -CVE-2024-28254 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-j86m-rrpr-g8gw -CVE-2024-28255 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-6wx7-qw5p-wh84 -CVE-2024-28275 - https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab -CVE-2024-28286 - https://github.com/mz-automation/libiec61850/issues/496 -CVE-2024-28294 - https://gist.github.com/lx39214/248dc58c6d05455d4bd06c4d3df8e2d0 -CVE-2024-28318 - https://github.com/gpac/gpac/issues/2764 -CVE-2024-28319 - https://github.com/gpac/gpac/issues/2763 -CVE-2024-28320 - https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html -CVE-2024-28320 - https://sospiro014.github.io/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-+-Account-Takeover -CVE-2024-28322 - https://github.com/Sospiro014/zday1/blob/main/event-managment.md -CVE-2024-28322 - https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html -CVE-2024-28323 - https://packetstormsecurity.com/files/177168/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection.html -CVE-2024-28323 - https://sospiro014.github.io/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection -CVE-2024-28325 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Credentials-Stored-in-Cleartext-CVE%E2%80%902024%E2%80%9028325 -CVE-2024-28326 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Privilege-Escalation-CVE%E2%80%902024%E2%80%9028326 -CVE-2024-28327 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Insecure-Credential-Storage-CVE%E2%80%902024%E2%80%9028327 -CVE-2024-28328 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328 -CVE-2024-28335 - https://packetstormsecurity.com/files/177708/Lektor-Static-CMS-3.3.10-Arbitrary-File-Upload-Remote-Code-Execution.html -CVE-2024-28338 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md -CVE-2024-28344 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/ -CVE-2024-28345 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/ -CVE-2024-2836 - https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/ -CVE-2024-2837 - https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/ -CVE-2024-28383 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md -CVE-2024-28421 - https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9 -CVE-2024-28421 - https://github.com/cobub/razor/issues/178 -CVE-2024-28429 - https://github.com/itsqian797/cms/blob/main/2.md -CVE-2024-28430 - https://github.com/itsqian797/cms/blob/main/1.md -CVE-2024-28431 - https://github.com/itsqian797/cms/blob/main/3.md -CVE-2024-28432 - https://github.com/itsqian797/cms/blob/main/4.md -CVE-2024-28434 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434 -CVE-2024-28435 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28435 -CVE-2024-28441 - https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md -CVE-2024-28442 - https://medium.com/@deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227 -CVE-2024-28458 - https://github.com/keepinggg/poc/blob/main/poc_of_swfc -CVE-2024-2849 - https://github.com/CveSecLook/cve/issues/1 -CVE-2024-2850 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md -CVE-2024-2851 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md -CVE-2024-28515 - https://github.com/heshi906/CVE-2024-28515 -CVE-2024-2852 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md -CVE-2024-28520 - https://github.com/aknbg1thub/cve/blob/main/upload.md -CVE-2024-2853 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md -CVE-2024-28535 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md -CVE-2024-28537 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md -CVE-2024-2854 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md -CVE-2024-28545 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md -CVE-2024-28547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetFirewallCfg.md -CVE-2024-2855 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md -CVE-2024-28550 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formExpandDlnaFile.md -CVE-2024-28551 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md -CVE-2024-28553 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md -CVE-2024-28556 - https://github.com/xuanluansec/vul/issues/1 -CVE-2024-28557 - https://github.com/xuanluansec/vul/issues/2 -CVE-2024-28558 - https://github.com/xuanluansec/vul/issues/3#issue-2243633522 -CVE-2024-2856 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md -CVE-2024-28562 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28563 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28564 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28565 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28566 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28567 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28568 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28569 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-2857 - https://wpscan.com/vulnerability/b7a35c5b-474a-444a-85ee-c50782c7a6c2/ -CVE-2024-28570 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28571 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28572 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28573 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28574 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28575 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28576 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28577 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28578 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28579 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-2858 - https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a/ -CVE-2024-28580 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28581 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28582 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28583 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28584 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -CVE-2024-28595 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-28595.md -CVE-2024-28623 - https://github.com/GURJOTEXPERT/ritecms -CVE-2024-28635 - https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt -CVE-2024-28639 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_1.md -CVE-2024-28640 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md -CVE-2024-2866 - https://research.cleantalk.org/cve-2024-2509/ -CVE-2024-2866 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ -CVE-2024-28665 - https://github.com/777erp/cms/blob/main/1.md -CVE-2024-28666 - https://github.com/777erp/cms/blob/main/2.md -CVE-2024-28667 - https://github.com/777erp/cms/blob/main/6.md -CVE-2024-28668 - https://github.com/777erp/cms/blob/main/5.md -CVE-2024-28669 - https://github.com/777erp/cms/blob/main/10.md -CVE-2024-28670 - https://github.com/777erp/cms/blob/main/9.md -CVE-2024-28671 - https://github.com/777erp/cms/blob/main/7.md -CVE-2024-28672 - https://github.com/777erp/cms/blob/main/3.md -CVE-2024-28673 - https://github.com/777erp/cms/blob/main/4.md -CVE-2024-28675 - https://github.com/777erp/cms/blob/main/12.md -CVE-2024-28676 - https://github.com/777erp/cms/blob/main/18.md -CVE-2024-28677 - https://github.com/777erp/cms/blob/main/14.md -CVE-2024-28678 - https://github.com/777erp/cms/blob/main/15.md -CVE-2024-28679 - https://github.com/777erp/cms/blob/main/19.md -CVE-2024-28680 - https://github.com/777erp/cms/blob/main/11.md -CVE-2024-28681 - https://github.com/777erp/cms/blob/main/17.md -CVE-2024-28682 - https://github.com/777erp/cms/blob/main/13.md -CVE-2024-28683 - https://github.com/777erp/cms/blob/main/20.md -CVE-2024-28684 - https://github.com/777erp/cms/blob/main/16.md -CVE-2024-28699 - https://github.com/flexpaper/pdf2json/issues/52 -CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md -CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png -CVE-2024-28715 - https://github.com/Lq0ne/CVE-2024-28715 -CVE-2024-28716 - https://bugs.launchpad.net/solum/+bug/2047505 -CVE-2024-28716 - https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link -CVE-2024-28732 - https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792 -CVE-2024-28734 - https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html -CVE-2024-28735 - https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html -CVE-2024-28736 - https://packetstormsecurity.com/files/178794/Debezium-UI-2.5-Credential-Disclosure.html -CVE-2024-28741 - https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/ -CVE-2024-28741 - https://packetstormsecurity.com/files/177542/NorthStar-C2-Agent-1.0-Cross-Site-Scripting-Remote-Command-Execution.html -CVE-2024-28756 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt -CVE-2024-28816 - https://github.com/AaravRajSIngh/Chatbot/pull/10 -CVE-2024-28823 - https://github.com/awslabs/aws-js-s3-explorer/issues/118 -CVE-2024-28834 - https://minerva.crocs.fi.muni.cz/ -CVE-2024-28847 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-8p5r-6mvv-2435 -CVE-2024-28848 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5xv3-fm7g-865r -CVE-2024-28849 - https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp -CVE-2024-28852 - https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639 -CVE-2024-28853 - https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8 -CVE-2024-28854 - https://en.wikipedia.org/wiki/Slowloris_(computer_security) -CVE-2024-28854 - https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7 -CVE-2024-28859 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r -CVE-2024-28861 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-pv9j-c53q-h433 -CVE-2024-28863 - https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 -CVE-2024-2891 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md -CVE-2024-2899 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md -CVE-2024-2900 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md -CVE-2024-2901 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md -CVE-2024-29019 - https://github.com/advisories/GHSA-9p43-hj5j-96h5 -CVE-2024-29019 - https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99 -CVE-2024-2902 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md -CVE-2024-29021 - https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr -CVE-2024-29025 - https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v -CVE-2024-29028 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos -CVE-2024-29029 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/ -CVE-2024-2903 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md -CVE-2024-29030 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/ -CVE-2024-29031 - https://securitylab.github.com/advisories/GHSL-2023-249_Meshery/ -CVE-2024-29032 - https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m -CVE-2024-29042 - https://github.com/franciscop/translate/security/advisories/GHSA-882j-4vj5-7vmj -CVE-2024-2907 - https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/ -CVE-2024-2908 - https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/ -CVE-2024-29090 - https://www.vicarius.io/vsociety/posts/chaos-in-the-ai-zoo-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-plugin-by-jordy-meow -CVE-2024-29149 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-010.txt -CVE-2024-29150 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt -CVE-2024-29156 - https://launchpad.net/bugs/2048114 -CVE-2024-29179 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9 -CVE-2024-29180 - https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6 -CVE-2024-29183 - https://securitylab.github.com/advisories/GHSL-2023-253_openrasp -CVE-2024-29186 - https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r -CVE-2024-29187 - https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r -CVE-2024-29190 - https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link -CVE-2024-29190 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-wfgj-wrgh-h3r3 -CVE-2024-29191 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ -CVE-2024-29192 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ -CVE-2024-29193 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ -CVE-2024-29194 - https://github.com/OneUptime/oneuptime/security/advisories/GHSA-246p-xmg8-wmcq -CVE-2024-29196 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72 -CVE-2024-29197 - https://github.com/pimcore/pimcore/security/advisories/GHSA-5737-rqv4-v445 -CVE-2024-29200 - https://github.com/kimai/kimai/security/advisories/GHSA-cj3c-5xpm-cx94 -CVE-2024-29216 - https://sangomakb.atlassian.net/wiki/spaces/DVC/pages/45351279/Natural+Access+Software+Download -CVE-2024-29271 - https://github.com/givanz/VvvebJs/issues/342 -CVE-2024-29272 - https://github.com/givanz/VvvebJs/issues/343 -CVE-2024-29273 - https://github.com/zyx0814/dzzoffice/issues/244 -CVE-2024-29275 - https://github.com/seacms-net/CMS/issues/15 -CVE-2024-29276 - https://www.cnblogs.com/Rainy-Day/p/18061399 -CVE-2024-29291 - https://gist.github.com/whiteman007/43bd7fa1fa0e47554b33f0cf93066784 -CVE-2024-29296 - https://github.com/ThaySolis/CVE-2024-29296 -CVE-2024-2930 - https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md -CVE-2024-29301 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html -CVE-2024-29302 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html -CVE-2024-29303 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html -CVE-2024-29309 - https://gist.github.com/Siebene/c22e1a4a4a8b61067180475895e60858 -CVE-2024-29316 - https://nodebb.org/bounty/ -CVE-2024-2932 - https://github.com/CveSecLook/cve/issues/3 -CVE-2024-29338 - https://github.com/PWwwww123/cms/blob/main/1.md -CVE-2024-2934 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md -CVE-2024-2935 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md -CVE-2024-29366 - https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md -CVE-2024-29366 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-29368 - https://github.com/becpn/mozilocms -CVE-2024-29374 - https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2 -CVE-2024-29375 - https://github.com/ismailcemunver/CVE-2024-29375 -CVE-2024-29384 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 -CVE-2024-29384 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-29384 -CVE-2024-29385 - https://github.com/songah119/Report/blob/main/CI-1.md -CVE-2024-29385 - https://www.dlink.com/en/security-bulletin/ -CVE-2024-29386 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29386/ -CVE-2024-29387 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29387/ -CVE-2024-29392 - https://gist.github.com/phulelouch/48ee63a7c46078574f3b3dc9a739052c -CVE-2024-29399 - https://github.com/ally-petitt/CVE-2024-29399 -CVE-2024-29400 - https://github.com/Fr1ezy/RuoYi_info -CVE-2024-29401 - https://github.com/menghaining/PoC/blob/main/xzs-mysql/xzs-mysql%20--%20PoC.md -CVE-2024-29402 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 -CVE-2024-29413 - https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413 -CVE-2024-29415 - https://github.com/indutny/node-ip/issues/150 -CVE-2024-29421 - https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md -CVE-2024-2944 - https://vuldb.com/?id.258035 -CVE-2024-29461 - https://gist.github.com/ErodedElk/399a226905c574efe705e3bff77955e3 -CVE-2024-29461 - https://github.com/floodlight/floodlight/issues/867 -CVE-2024-29499 - https://github.com/daddywolf/cms/blob/main/1.md -CVE-2024-29504 - https://github.com/summernote/summernote/pull/3782 -CVE-2024-29513 - https://github.com/dru1d-foofus/briscKernelDriver -CVE-2024-29514 - https://github.com/zzq66/cve6/ -CVE-2024-29515 - https://github.com/zzq66/cve7/ -CVE-2024-2954 - https://blog.sth.sh/wordpress-action-network-1-4-3-authenticated-sql-injection-0-day-01fcd6e89e96 -CVE-2024-2962 - https://gist.github.com/Xib3rR4dAr/ab293092ffcfe3c14a3c7daf5462a50b -CVE-2024-29650 - https://gist.github.com/tariqhawis/1bc340ca5ea6ae115c9ab9665cfd5921 -CVE-2024-29650 - https://learn.snyk.io/lesson/prototype-pollution/#a0a863a5-fd3a-539f-e1ed-a0769f6c6e3b -CVE-2024-29651 - https://gist.github.com/tariqhawis/5db76b38112bba756615b688c32409ad -CVE-2024-29684 - https://github.com/iimiss/cms/blob/main/1.md -CVE-2024-29686 - https://www.exploit-db.com/exploits/51893 -CVE-2024-2972 - https://wpscan.com/vulnerability/27134a4f-a59b-40e9-8fc8-abe1f58672ad/ -CVE-2024-2980 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexeCommand.md -CVE-2024-2981 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/form_fast_setting_wifi_set.md -CVE-2024-2982 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWriteFacMac.md -CVE-2024-2982 - https://vuldb.com/?id.258151 -CVE-2024-2983 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetClientState.md -CVE-2024-2984 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetCfm.md -CVE-2024-2985 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md -CVE-2024-29882 - https://github.com/ossrs/srs/security/advisories/GHSA-gv9r-qcjc-5hj7 -CVE-2024-29894 - https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh -CVE-2024-29894 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 -CVE-2024-29895 - https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m -CVE-2024-29903 - https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv -CVE-2024-29916 - https://unsaflok.com -CVE-2024-29937 - https://www.youtube.com/watch?v=i_JOkHaCdzk -CVE-2024-29972 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -CVE-2024-29973 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -CVE-2024-29974 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -CVE-2024-29975 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -CVE-2024-29976 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md -CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md -CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md -CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md -CVE-2024-3004 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md -CVE-2024-3011 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md -CVE-2024-3012 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md -CVE-2024-3024 - https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing -CVE-2024-30248 - https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83 -CVE-2024-30252 - https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg -CVE-2024-30257 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f -CVE-2024-30258 - https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing -CVE-2024-30258 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh -CVE-2024-30259 - https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing -CVE-2024-30259 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 -CVE-2024-30264 - https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73 -CVE-2024-30268 - https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q -CVE-2024-3048 - https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/ -CVE-2024-3050 - https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/ -CVE-2024-30564 - https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c -CVE-2024-30568 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ping_test).md -CVE-2024-30572 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ntp_server).md -CVE-2024-3058 - https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/ -CVE-2024-30583 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_mitInterface.md -CVE-2024-30584 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security.md -CVE-2024-30585 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_deviceId.md -CVE-2024-30586 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security_5g.md -CVE-2024-30587 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md -CVE-2024-30588 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_start.md -CVE-2024-30589 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_entrys.md -CVE-2024-3059 - https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/ -CVE-2024-30590 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_end.md -CVE-2024-30591 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md -CVE-2024-30592 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_page.md -CVE-2024-30593 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_devName.md -CVE-2024-30594 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceMac.md -CVE-2024-30595 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceId.md -CVE-2024-30596 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_deviceId.md -CVE-2024-30597 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md -CVE-2024-30598 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md -CVE-2024-30599 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md -CVE-2024-3060 - https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ -CVE-2024-30600 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md -CVE-2024-30601 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md -CVE-2024-30602 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md -CVE-2024-30603 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md -CVE-2024-30604 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md -CVE-2024-30606 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_page.md -CVE-2024-30607 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_deviceId.md -CVE-2024-30612 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md -CVE-2024-30613 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/setSmartPowerManagement.md -CVE-2024-30620 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serviceName_parameter_in_the_function_fromAdvSetMacMtuWan.md -CVE-2024-30621 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serverName_parameter_in_the_function_fromAdvSetMacMtuWan.md -CVE-2024-30622 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md -CVE-2024-30623 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md -CVE-2024-30624 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md -CVE-2024-30625 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_entrys.md -CVE-2024-30626 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_end.md -CVE-2024-30627 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_deviceId.md -CVE-2024-30628 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_page.md -CVE-2024-30629 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_list1.md -CVE-2024-30630 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_time.md -CVE-2024-30631 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_start.md -CVE-2024-30632 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security_5g.md -CVE-2024-30633 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security.md -CVE-2024-30634 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_mitInterface.md -CVE-2024-30635 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md -CVE-2024-30636 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formQuickIndex.md -CVE-2024-30637 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formWriteFacMac.md -CVE-2024-30638 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_entrys.md -CVE-2024-30639 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_page.md -CVE-2024-30645 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/setUsbUnload.md -CVE-2024-3075 - https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/ -CVE-2024-3076 - https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/ -CVE-2024-30802 - https://github.com/WarmBrew/web_vul/blob/main/TTX.md -CVE-2024-30807 - https://github.com/axiomatic-systems/Bento4/issues/937 -CVE-2024-30808 - https://github.com/axiomatic-systems/Bento4/issues/937 -CVE-2024-30809 - https://github.com/axiomatic-systems/Bento4/issues/937 -CVE-2024-30840 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md -CVE-2024-30845 - https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66 -CVE-2024-30845 - https://github.com/netcccyun/pan/issues/6 -CVE-2024-30849 - https://github.com/wkeyi0x1/vul-report/issues/3 -CVE-2024-30850 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/ -CVE-2024-30851 - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc -CVE-2024-30862 - https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md -CVE-2024-30878 - https://github.com/jianyan74/rageframe2/issues/111 -CVE-2024-30879 - https://github.com/jianyan74/rageframe2/issues/114 -CVE-2024-30880 - https://github.com/jianyan74/rageframe2/issues/114 -CVE-2024-30883 - https://github.com/jianyan74/rageframe2/issues/114 -CVE-2024-30884 - https://github.com/Hebing123/cve/issues/28 -CVE-2024-30885 - https://github.com/Hebing123/cve/issues/29 -CVE-2024-30886 - https://github.com/Hebing123/cve/issues/30 -CVE-2024-30889 - https://github.com/robymontyz/pocs/blob/main/AudimexEE/ReflectedXSS.md -CVE-2024-3089 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md -CVE-2024-3089 - https://vuldb.com/?submit.306963 -CVE-2024-30891 - https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md -CVE-2024-30915 - https://github.com/OpenDDS/OpenDDS/issues/4527 -CVE-2024-3093 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/ -CVE-2024-30938 - https://github.com/lampSEC/semcms/blob/main/semcms.md -CVE-2024-30939 - https://medium.com/@deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad -CVE-2024-3094 - http://www.openwall.com/lists/oss-security/2024/04/16/5 -CVE-2024-3094 - https://lwn.net/Articles/967180/ -CVE-2024-3094 - https://news.ycombinator.com/item?id=39895344 -CVE-2024-3094 - https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils -CVE-2024-3094 - https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094 -CVE-2024-30946 - https://github.com/testgo1safe/cms/blob/main/1.md -CVE-2024-30950 - https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md -CVE-2024-30952 - https://github.com/CrownZTX/vulnerabilities/blob/main/pescms/stored_xss.md -CVE-2024-30953 - https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md -CVE-2024-3096 - http://www.openwall.com/lists/oss-security/2024/04/12/11 -CVE-2024-3096 - https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr -CVE-2024-30965 - https://github.com/Fishkey1/cms/commit/e9d294951ab2dd85709f1d12ad4747f25d326b1b -CVE-2024-30973 - https://github.com/Athos-Zago/CVE-2024-30973/tree/main -CVE-2024-30979 - https://medium.com/@shanunirwan/cve-2024-30979-stored-cross-site-scripting-xss-in-cyber-cafe-management-system-project-ccms-1-44b10f50817b -CVE-2024-30980 - https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7 -CVE-2024-30981 - https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb -CVE-2024-30985 - https://medium.com/@shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062 -CVE-2024-30986 - https://medium.com/@shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510 -CVE-2024-30987 - https://medium.com/@shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254 -CVE-2024-30988 - https://medium.com/@shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23 -CVE-2024-30989 - https://medium.com/@shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6 -CVE-2024-30990 - https://medium.com/@shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761 -CVE-2024-30998 - https://github.com/efekaanakkar/CVEs/blob/main/PHPGurukul-Men-Salon-Management-System-2.0.md -CVE-2024-31002 - https://github.com/axiomatic-systems/Bento4/issues/939 -CVE-2024-31003 - https://github.com/axiomatic-systems/Bento4/issues/939 -CVE-2024-31004 - https://github.com/axiomatic-systems/Bento4/issues/941 -CVE-2024-31005 - https://github.com/axiomatic-systems/Bento4/issues/941 -CVE-2024-31008 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20(logic%20vulnerability).md -CVE-2024-31009 - https://github.com/ss122-0ss/semcms/blob/main/README.md -CVE-2024-31010 - https://github.com/ss122-0ss/semcms/blob/main/README.md -CVE-2024-31047 - https://github.com/AcademySoftwareFoundation/openexr/issues/1680 -CVE-2024-31061 - https://github.com/sahildari/cve/blob/master/CVE-2024-31061.md -CVE-2024-31061 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-31062 - https://github.com/sahildari/cve/blob/master/CVE-2024-31062.md -CVE-2024-31062 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-31063 - https://github.com/sahildari/cve/blob/master/CVE-2024-31063.md -CVE-2024-31063 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-31064 - https://github.com/sahildari/cve/blob/master/CVE-2024-31064.md -CVE-2024-31065 - https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md -CVE-2024-31065 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-3118 - https://vuldb.com/?id.258779 -CVE-2024-31212 - https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw -CVE-2024-31213 - https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq -CVE-2024-31214 - https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9 -CVE-2024-3124 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md -CVE-2024-3124 - https://vuldb.com/?submit.307752 -CVE-2024-3125 - https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md -CVE-2024-3128 - https://github.com/ctflearner/Android_Findings/blob/main/Replify-Messenger/Backup.md -CVE-2024-3128 - https://vuldb.com/?submit.307761 -CVE-2024-3129 - https://github.com/Sospiro014/zday1/blob/main/Image_Accordion_Gallery.md -CVE-2024-3131 - https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md -CVE-2024-31380 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve -CVE-2024-31380 - https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1 -CVE-2024-31380 - https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1?_s_id=cve -CVE-2024-3139 - https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md -CVE-2024-31390 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve -CVE-2024-31390 - https://snicco.io/vulnerability-disclosure/breakdance/client-mode-remote-code-execution-breakdance-1-7-0?_s_id=cve -CVE-2024-31390 - https://www.youtube.com/watch?v=9glx54-LfRE -CVE-2024-3140 - https://github.com/Sospiro014/zday1/blob/main/xss_1.md -CVE-2024-3141 - https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md -CVE-2024-3142 - https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md -CVE-2024-3144 - https://github.com/Hckwzh/cms/blob/main/12.md -CVE-2024-31443 - https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3 -CVE-2024-31444 - https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87 -CVE-2024-31445 - https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc -CVE-2024-3145 - https://github.com/Hckwzh/cms/blob/main/13.md -CVE-2024-3145 - https://vuldb.com/?id.258920 -CVE-2024-31453 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-xg8v-m2mh-45m6 -CVE-2024-31454 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-2p2x-p7wj-j5h2 -CVE-2024-31457 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4 -CVE-2024-31458 - https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x -CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv -CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r -CVE-2024-3146 - https://github.com/Hckwzh/cms/blob/main/14.md -CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv -CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r -CVE-2024-3147 - https://github.com/Hckwzh/cms/blob/main/15.md -CVE-2024-31497 - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/ -CVE-2024-31497 - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/ -CVE-2024-31502 - https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md -CVE-2024-31506 - https://github.com/CveSecLook/cve/issues/4 -CVE-2024-31507 - https://github.com/CveSecLook/cve/issues/6 -CVE-2024-31510 - https://github.com/liang-junkai/Fault-injection-of-ML-DSA -CVE-2024-3154 - https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j -CVE-2024-31544 - https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md -CVE-2024-31545 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Computer-Laboratory-Management-System-PoC.md -CVE-2024-31546 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md -CVE-2024-31547 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md -CVE-2024-31581 - https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048 -CVE-2024-31610 - https://github.com/ss122-0ss/School/blob/main/readme.md -CVE-2024-31616 - https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883 -CVE-2024-31621 - https://www.exploit-db.com/exploits/52001 -CVE-2024-31636 - https://github.com/lief-project/LIEF/issues/1038 -CVE-2024-31648 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31648.md -CVE-2024-31649 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31649.md -CVE-2024-31650 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31650.md -CVE-2024-31651 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31651.md -CVE-2024-31652 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md -CVE-2024-31678 - https://github.com/CveSecLook/cve/issues/10 -CVE-2024-31680 - https://github.com/heidashuai5588/cve/blob/main/upload.md -CVE-2024-31705 - https://github.com/V3locidad/GLPI_POC_Plugins_Shell -CVE-2024-31705 - https://seclists.org/fulldisclosure/2024/Apr/23 -CVE-2024-31744 - https://github.com/jasper-software/jasper/issues/381 -CVE-2024-31747 - https://medium.com/@deepsahu1/yealink-vp59-microsoft-teams-phone-lock-bypass-b7fee9dd9c8c -CVE-2024-31755 - https://github.com/DaveGamble/cJSON/issues/839 -CVE-2024-31759 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 -CVE-2024-31759 - https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md -CVE-2024-31760 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 -CVE-2024-31760 - https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md -CVE-2024-31804 - https://www.exploit-db.com/exploits/51977 -CVE-2024-31819 - https://chocapikk.com/posts/2024/cve-2024-31819/ -CVE-2024-31819 - https://github.com/Chocapikk/CVE-2024-31819 -CVE-2024-31839 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/ -CVE-2024-31840 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31841 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31843 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31844 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31845 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31846 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31847 - https://www.gruppotim.it/it/footer/red-team.html -CVE-2024-31848 - https://www.tenable.com/security/research/tra-2024-09 -CVE-2024-31849 - https://www.tenable.com/security/research/tra-2024-09 -CVE-2024-31850 - https://www.tenable.com/security/research/tra-2024-09 -CVE-2024-31852 - https://github.com/llvm/llvm-project/issues/80287 -CVE-2024-31869 - http://www.openwall.com/lists/oss-security/2024/04/17/10 -CVE-2024-3188 - https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/ -CVE-2024-31989 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr -CVE-2024-32019 - https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93 -CVE-2024-32020 - https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj -CVE-2024-32022 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -CVE-2024-32023 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -CVE-2024-32024 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -CVE-2024-32025 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -CVE-2024-32026 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -CVE-2024-32027 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -CVE-2024-3203 - https://vuldb.com/?submit.304556 -CVE-2024-3204 - https://vuldb.com/?submit.304557 -CVE-2024-3205 - https://vuldb.com/?submit.304561 -CVE-2024-3207 - https://vuldb.com/?submit.304572 -CVE-2024-32163 - https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md -CVE-2024-32166 - https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md -CVE-2024-3218 - https://github.com/garboa/cve_3/blob/main/file_put_content.md -CVE-2024-32206 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md -CVE-2024-32254 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md -CVE-2024-32256 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md -CVE-2024-32258 - https://github.com/TASEmulators/fceux/issues/727 -CVE-2024-32258 - https://github.com/liyansong2018/CVE-2024-32258 -CVE-2024-32282 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexecommand_cmdi.md -CVE-2024-32283 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formexecommand_cmdi.md -CVE-2024-32285 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md -CVE-2024-32286 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromVirtualSer.md -CVE-2024-32287 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromqossetting.md -CVE-2024-32288 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromwebExcptypemanFilter.md -CVE-2024-32290 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromAddressNat_page.md -CVE-2024-32291 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromNatlimit.md -CVE-2024-32292 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formexecommand_cmdi.md -CVE-2024-32293 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromDhcpListClient_page.md -CVE-2024-32299 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromWizardHandle.md -CVE-2024-32301 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromWizardHandle.md -CVE-2024-32302 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromWizardHandle.md -CVE-2024-32303 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromWizardHandle.md -CVE-2024-32305 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromWizardHandle.md -CVE-2024-32306 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/fromWizardHandle.md -CVE-2024-32307 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromWizardHandle.md -CVE-2024-3231 - https://wpscan.com/vulnerability/81dbb5c0-ccdd-4af1-b2f2-71cb1b37fe93/ -CVE-2024-32310 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/fromWizardHandle.md -CVE-2024-32311 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWanParameterSetting.md -CVE-2024-32312 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/formWanParameterSetting.md -CVE-2024-32313 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWanParameterSetting.md -CVE-2024-32314 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md -CVE-2024-32315 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWanParameterSetting.md -CVE-2024-32316 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md -CVE-2024-32317 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md -CVE-2024-32318 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromSetVlanInfo_vlan.md -CVE-2024-32320 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetTimeZone.md -CVE-2024-32337 - https://github.com/adiapera/xss_security_wondercms_3.4.3 -CVE-2024-32338 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 -CVE-2024-32339 - https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3 -CVE-2024-32340 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 -CVE-2024-32341 - https://github.com/adiapera/xss_home_page_wondercms_3.4.3 -CVE-2024-32342 - https://github.com/adiapera/xss_create_boidcms_2.1.0 -CVE-2024-32343 - https://github.com/adiapera/xss_create2_boidcms_2.1.0 -CVE-2024-32344 - https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md -CVE-2024-32345 - https://github.com/adiapera/xss_language_cmsimple_5.15 -CVE-2024-32359 - https://github.com/HouqiyuA/k8s-rbac-poc -CVE-2024-32369 - https://github.com/chucrutis/CVE-2024-32369 -CVE-2024-3239 - https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ -CVE-2024-32391 - https://github.com/magicblack/maccms10/issues/1133 -CVE-2024-32392 - https://github.com/Hebing123/cve/issues/33 -CVE-2024-32394 - https://gist.github.com/Swind1er/7aad5c28e5bdc91d73fa7489b7250c94 -CVE-2024-32399 - https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md -CVE-2024-32404 - https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt -CVE-2024-32405 - https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html -CVE-2024-32405 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-32406 - https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html -CVE-2024-3241 - https://wpscan.com/vulnerability/a645daee-42ea-43f8-9480-ef3be69606e0/ -CVE-2024-32461 - https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34 -CVE-2024-32467 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp -CVE-2024-3247 - https://forum.xpdfreader.com/viewtopic.php?t=43597 -CVE-2024-32472 - https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f -CVE-2024-32477 - https://github.com/denoland/deno/security/advisories/GHSA-95cj-3hr2-7j5j -CVE-2024-32479 - https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw -CVE-2024-3248 - https://forum.xpdfreader.com/viewtopic.php?t=43657 -CVE-2024-32480 - https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438 -CVE-2024-32481 - https://github.com/vyperlang/vyper/security/advisories/GHSA-ppx5-q359-pvwj -CVE-2024-3251 - https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md -CVE-2024-3255 - https://vuldb.com/?id.259104 -CVE-2024-3261 - https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/ -CVE-2024-32645 - https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 -CVE-2024-32646 - https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m -CVE-2024-32647 - https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6 -CVE-2024-32648 - https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9 -CVE-2024-32649 - https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h -CVE-2024-3265 - https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ -CVE-2024-32650 - https://github.com/rustls/rustls/security/advisories/GHSA-6g7w-8wpp-frhj -CVE-2024-32651 - https://blog.hacktivesecurity.com/index.php/2024/05/08/cve-2024-32651-server-side-template-injection-changedetection-io/ -CVE-2024-32651 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3 -CVE-2024-32652 - https://github.com/honojs/node-server/issues/159 -CVE-2024-32653 - https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm -CVE-2024-32735 - https://www.tenable.com/security/research/tra-2024-14 -CVE-2024-32736 - https://www.tenable.com/security/research/tra-2024-14 -CVE-2024-32737 - https://www.tenable.com/security/research/tra-2024-14 -CVE-2024-32738 - https://www.tenable.com/security/research/tra-2024-14 -CVE-2024-32739 - https://www.tenable.com/security/research/tra-2024-14 -CVE-2024-32743 - https://github.com/adiapera/xss_security_wondercms_3.4.3 -CVE-2024-32744 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 -CVE-2024-32745 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 -CVE-2024-32746 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 -CVE-2024-3281 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt -CVE-2024-32866 - https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf -CVE-2024-32869 - https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347 -CVE-2024-32876 - https://github.com/TeamNewPipe/NewPipe/security/advisories/GHSA-wxrm-jhpf-vp6v -CVE-2024-32878 - https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-p5mv-gjc5-mwqv -CVE-2024-3288 - https://wpscan.com/vulnerability/4ef99f54-68df-4353-8fc0-9b09ac0df7ba/ -CVE-2024-32880 - https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f -CVE-2024-32881 - https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j -CVE-2024-32884 - https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh -CVE-2024-32884 - https://rustsec.org/advisories/RUSTSEC-2024-0335.html -CVE-2024-32886 - https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2 -CVE-2024-32890 - https://github.com/librespeed/speedtest/security/advisories/GHSA-3954-xrwh-fq4q -CVE-2024-32962 - https://github.com/node-saml/xml-crypto/security/advisories/GHSA-2xp3-57p7-qf4v -CVE-2024-32963 - https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm -CVE-2024-32964 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc -CVE-2024-32966 - https://github.com/static-web-server/static-web-server/security/advisories/GHSA-rwfq-v4hq-h7fg -CVE-2024-32970 - https://github.com/payloadbox/xss-payload-list -CVE-2024-32974 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-mgxp-7hhp-8299 -CVE-2024-32975 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-g9mq-6v96-cpqc -CVE-2024-32976 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-7wp5-c2vq-4f8m -CVE-2024-32977 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7 -CVE-2024-32982 - https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf -CVE-2024-32983 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-2vxv-pv3m-3wvj -CVE-2024-33101 - https://github.com/thinksaas/ThinkSAAS/issues/34 -CVE-2024-33102 - https://github.com/thinksaas/ThinkSAAS/issues/35 -CVE-2024-33103 - https://github.com/dokuwiki/dokuwiki/issues/4267 -CVE-2024-33110 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md -CVE-2024-33111 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md -CVE-2024-33112 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md -CVE-2024-33113 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md -CVE-2024-3322 - https://github.com/parisneo/lollms-webui/commit/1e17df01e01d4d33599db2afaafe91d90b6f0189 -CVE-2024-33247 - https://github.com/CveSecLook/cve/issues/11 -CVE-2024-33250 - https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md -CVE-2024-33255 - https://github.com/jerryscript-project/jerryscript/issues/5135 -CVE-2024-33258 - https://github.com/jerryscript-project/jerryscript/issues/5114 -CVE-2024-33259 - https://github.com/jerryscript-project/jerryscript/issues/5132 -CVE-2024-33260 - https://github.com/jerryscript-project/jerryscript/issues/5133 -CVE-2024-33263 - https://github.com/bellard/quickjs/issues/277 -CVE-2024-33266 - https://security.friendsofpresta.org/modules/2024/04/25/deliveryorderautoupdate.html -CVE-2024-33272 - https://security.friendsofpresta.org/modules/2024/04/25/autosuggest.html -CVE-2024-33294 - https://github.com/CveSecLook/cve/issues/16 -CVE-2024-33302 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33302.md -CVE-2024-33302 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-33303 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33303.md -CVE-2024-33304 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md -CVE-2024-33305 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md -CVE-2024-33306 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33306.md -CVE-2024-33307 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33307.md -CVE-2024-33332 - https://github.com/wy876/cve/issues/3 -CVE-2024-33338 - https://github.com/7akahash1/POC/blob/main/1.md -CVE-2024-33345 - https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware -CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md -CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ -CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc -CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15 -CVE-2024-33424 - https://github.com/adiapera/xss_language_cmsimple_5.15 -CVE-2024-33427 - https://github.com/squid-cache/squid/pull/1763 -CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png -CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md -CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc -CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1 -CVE-2024-33428 - https://github.com/stsaz/phiola/issues/29 -CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png -CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md -CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/poc/ -CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2 -CVE-2024-33429 - https://github.com/stsaz/phiola/issues/30 -CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5 -CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png -CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md -CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1 -CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc -CVE-2024-33430 - https://github.com/stsaz/phiola/issues/28 -CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png -CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md -CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G -CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1 -CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc -CVE-2024-33431 - https://github.com/stsaz/phiola/issues/27 -CVE-2024-33435 - https://github.com/vulreport3r/cve-reports/blob/main/Ncast_Yingshi_has_RCE_vulnerabilities/report.md -CVE-2024-33436 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 -CVE-2024-33436 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33436 -CVE-2024-33437 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 -CVE-2024-33437 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33437 -CVE-2024-33438 - https://github.com/julio-cfa/CVE-2024-33438 -CVE-2024-33443 - https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 -CVE-2024-33443 - https://github.com/liu21st/onethink/issues/40 -CVE-2024-33444 - https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152 -CVE-2024-33444 - https://github.com/liu21st/onethink/issues/39 -CVE-2024-33445 - https://gist.github.com/LioTree/04a4ece38df53af4027d52b2aeb7aff6 -CVE-2024-33445 - https://github.com/hisiphp/hisiphp/issues/11 -CVE-2024-3346 - https://github.com/Yu1e/vuls/blob/main/Byzro%20Networks%20Smart%20S80%20management%20platform%20has%20rce%20vulnerability.md -CVE-2024-33485 - https://github.com/CveSecLook/cve/issues/17 -CVE-2024-33525 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ -CVE-2024-33526 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ -CVE-2024-33527 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ -CVE-2024-33528 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ -CVE-2024-33529 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ -CVE-2024-33530 - https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/ -CVE-2024-33655 - https://gitlab.isc.org/isc-projects/bind9/-/issues/4398 -CVE-2024-33655 - https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/ -CVE-2024-3366 - https://github.com/xuxueli/xxl-job/issues/3391 -CVE-2024-33664 - https://github.com/mpdavis/python-jose/issues/344 -CVE-2024-33669 - https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html -CVE-2024-33669 - https://help.passbolt.com/incidents/pwned-password-service-information-leak -CVE-2024-3368 - https://wpscan.com/vulnerability/ab78b1a5-e28c-406b-baaf-6d53017f9328/ -CVE-2024-3376 - https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md -CVE-2024-33763 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg -CVE-2024-33764 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg -CVE-2024-33766 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg -CVE-2024-33767 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg -CVE-2024-33768 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg -CVE-2024-3377 - https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md -CVE-2024-33771 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md -CVE-2024-33772 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md -CVE-2024-33773 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md -CVE-2024-33774 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md -CVE-2024-3378 - https://vuldb.com/?submit.310642 -CVE-2024-33788 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788 -CVE-2024-33789 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789 -CVE-2024-33792 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 -CVE-2024-33793 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793 -CVE-2024-33809 - https://github.com/pingcap/tidb/issues/52159 -CVE-2024-33820 - https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 -CVE-2024-33829 - https://github.com/xyaly163/cms/blob/main/1.md -CVE-2024-33830 - https://github.com/xyaly163/cms/blob/main/2.md -CVE-2024-33831 - https://github.com/YMFE/yapi/issues/2745 -CVE-2024-33832 - https://github.com/helloxz/onenav/issues/186 -CVE-2024-33835 - https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md -CVE-2024-33891 - https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3 -CVE-2024-33899 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 -CVE-2024-33900 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 -CVE-2024-33901 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 -CVE-2024-33905 - https://medium.com/@pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90 -CVE-2024-3400 - https://security.paloaltonetworks.com/CVE-2024-3400 -CVE-2024-3400 - https://unit42.paloaltonetworks.com/cve-2024-3400/ -CVE-2024-34020 - https://bugzilla.suse.com/show_bug.cgi?id=1223534 -CVE-2024-3405 - https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/ -CVE-2024-34051 - https://blog.smarttecs.com/posts/2024-004-cve-2024-34051/ -CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3 -CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/ -CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67 -CVE-2024-3407 - https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/ -CVE-2024-34070 - https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53 -CVE-2024-34075 - https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr -CVE-2024-34082 - https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69 -CVE-2024-34196 - https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1 -CVE-2024-34199 - https://github.com/DMCERTCE/PoC_Tiny_Overflow -CVE-2024-34200 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules -CVE-2024-34201 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig -CVE-2024-34202 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules -CVE-2024-34203 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg -CVE-2024-34204 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW -CVE-2024-34206 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx -CVE-2024-34207 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setStaticDhcpConfig -CVE-2024-34209 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules -CVE-2024-34210 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection -CVE-2024-34212 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_overflow -CVE-2024-34213 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetPortForwardRules -CVE-2024-34215 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules -CVE-2024-34217 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode -CVE-2024-34218 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost -CVE-2024-34219 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg -CVE-2024-34220 - https://github.com/dovankha/CVE-2024-34220 -CVE-2024-34221 - https://github.com/dovankha/CVE-2024-34221 -CVE-2024-34222 - https://github.com/dovankha/CVE-2024-34222 -CVE-2024-34223 - https://github.com/dovankha/CVE-2024-34223 -CVE-2024-34224 - https://github.com/dovankha/CVE-2024-34224 -CVE-2024-34225 - https://github.com/dovankha/CVE-2024-34225 -CVE-2024-34226 - https://github.com/dovankha/CVE-2024-34226 -CVE-2024-34230 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md -CVE-2024-34231 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md -CVE-2024-34246 - https://github.com/wasm3/wasm3/issues/484 -CVE-2024-34249 - https://github.com/wasm3/wasm3/issues/485 -CVE-2024-34250 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346 -CVE-2024-34251 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347 -CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483 -CVE-2024-34257 - https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md -CVE-2024-34273 - https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md -CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md -CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m -CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 -CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 -CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 -CVE-2024-34347 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr -CVE-2024-34352 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 -CVE-2024-34359 - https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829 -CVE-2024-34362 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-hww5-43gv-35jv -CVE-2024-34363 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-g979-ph9j-5gg4 -CVE-2024-3437 - https://vuldb.com/?id.259631 -CVE-2024-34391 - https://github.com/libxmljs/libxmljs/issues/645 -CVE-2024-34391 - https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/ -CVE-2024-34392 - https://github.com/libxmljs/libxmljs/issues/646 -CVE-2024-34392 - https://research.jfrog.com/vulnerabilities/libxmljs-namespaces-type-confusion-rce-jfsa-2024-001034096/ -CVE-2024-34393 - https://github.com/marudor/libxmljs2/issues/204 -CVE-2024-34393 - https://research.jfrog.com/vulnerabilities/libxmljs2-attrs-type-confusion-rce-jfsa-2024-001034097/ -CVE-2024-34394 - https://github.com/marudor/libxmljs2/issues/205 -CVE-2024-34394 - https://research.jfrog.com/vulnerabilities/libxmljs2-namespaces-type-confusion-rce-jfsa-2024-001034098/ -CVE-2024-34397 - https://gitlab.gnome.org/GNOME/glib/-/issues/3268 -CVE-2024-34401 - https://www.exploit-db.com/exploits/51988 -CVE-2024-34408 - https://github.com/Tencent/libpag/issues/2230 -CVE-2024-3442 - https://vuldb.com/?id.259695 -CVE-2024-3443 - https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md -CVE-2024-34448 - https://github.com/phulelouch/CVEs/blob/main/CVE-2024-34448.md -CVE-2024-34467 - https://github.com/top-think/framework/issues/2996 -CVE-2024-34470 - https://github.com/osvaldotenorio/CVE-2024-34470 -CVE-2024-34471 - https://github.com/osvaldotenorio/CVE-2024-34471 -CVE-2024-34472 - https://github.com/osvaldotenorio/CVE-2024-34472 -CVE-2024-34473 - https://jira.o-ran-sc.org/browse/RIC-1055 -CVE-2024-34478 - https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455 -CVE-2024-34483 - https://github.com/faucetsdn/ryu/issues/193 -CVE-2024-34484 - https://github.com/faucetsdn/ryu/issues/194 -CVE-2024-34486 - https://github.com/faucetsdn/ryu/issues/190 -CVE-2024-34487 - https://github.com/faucetsdn/ryu/issues/192 -CVE-2024-34488 - https://github.com/faucetsdn/ryu/issues/191 -CVE-2024-34489 - https://github.com/faucetsdn/ryu/issues/195 -CVE-2024-34515 - https://github.com/spatie/image-optimizer/issues/210 -CVE-2024-34523 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md -CVE-2024-34532 - https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe -CVE-2024-34533 - https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data -CVE-2024-34534 - https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander -CVE-2024-34582 - https://github.com/silent6trinity/CVE-2024-34582 -CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/ -CVE-2024-34710 - https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf -CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v -CVE-2024-34715 - https://github.com/ethyca/fides/security/advisories/GHSA-8cm5-jfj2-26q7 -CVE-2024-3472 - https://wpscan.com/vulnerability/d42f74dd-520f-40aa-9cf0-3544db9562c7/ -CVE-2024-3474 - https://wpscan.com/vulnerability/e5c3e145-6738-4d85-8507-43ca1b1d5877/ -CVE-2024-3475 - https://wpscan.com/vulnerability/bf540242-5306-4c94-ad50-782d0d5b127f/ -CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db64ccd/ -CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/ -CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/ -CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/ -CVE-2024-34852 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md -CVE-2024-34854 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md -CVE-2024-34899 - https://hackerdna.com/courses/cve/cve-2024-34899 -CVE-2024-34905 - https://github.com/CloudWise-OpenSource/FlyFish/issues/191 -CVE-2024-34906 - https://github.com/kuaifan/dootask/issues/210 -CVE-2024-34914 - https://chmod744.super.site/redacted-vulnerability -CVE-2024-34919 - https://github.com/CveSecLook/cve/issues/20 -CVE-2024-34921 - https://github.com/cainiao159357/x5000r_poc/blob/main/README.md -CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.assets/debug-coredump.png -CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.md -CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/poc/I1DWE0~U -CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata -CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata/poc -CVE-2024-34952 - https://github.com/taurusxin/ncmdump/issues/18 -CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png -CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.md -CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/poc/I7K9QM~F -CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted -CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted/poc -CVE-2024-34953 - https://github.com/taurusxin/ncmdump/issues/19 -CVE-2024-34954 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md -CVE-2024-34955 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md -CVE-2024-34957 - https://github.com/Gr-1m/cms/blob/main/1.md -CVE-2024-34958 - https://github.com/Gr-1m/cms/blob/main/2.md -CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer -CVE-2024-34987 - https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md -CVE-2024-34997 - https://github.com/joblib/joblib/issues/1582 -CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md -CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md -CVE-2024-35011 - https://github.com/Thirtypenny77/cms/blob/main/8.md -CVE-2024-35012 - https://github.com/Thirtypenny77/cms/blob/main/7.md -CVE-2024-35039 - https://github.com/ywf7678/cms/blob/main/1.md -CVE-2024-35048 - https://github.com/javahuang/SurveyKing/issues/56 -CVE-2024-35049 - https://github.com/javahuang/SurveyKing/issues/55 -CVE-2024-35050 - https://github.com/javahuang/SurveyKing/issues/57 -CVE-2024-35099 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md -CVE-2024-35108 - https://github.com/FirstLIF/cms/blob/main/1.md -CVE-2024-35109 - https://github.com/FirstLIF/cms/blob/main/2.md -CVE-2024-35110 - https://github.com/yzmcms/yzmcms/issues/68 -CVE-2024-35175 - https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52 -CVE-2024-35179 - https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-5pfx-j27j-4c6h -CVE-2024-35181 - https://securitylab.github.com/advisories/GHSL-2024-013_GHSL-2024-014_Meshery/ -CVE-2024-35182 - https://securitylab.github.com/advisories/GHSL-2024-013_GHSL-2024-014_Meshery/ -CVE-2024-35183 - https://github.com/wolfi-dev/wolfictl/security/advisories/GHSA-8fg7-hp93-qhvr -CVE-2024-35186 - https://github.com/Byron/gitoxide/security/advisories/GHSA-7w47-3wg8-547c -CVE-2024-35187 - https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-rwp5-f854-ppg6 -CVE-2024-35189 - https://github.com/ethyca/fides/security/advisories/GHSA-rcvg-jj3g-rj7c -CVE-2024-35190 - https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 -CVE-2024-35196 - https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307 -CVE-2024-35197 - https://github.com/Byron/gitoxide/security/advisories/GHSA-49jc-r788-3fc9 -CVE-2024-3521 - https://github.com/garboa/cve_3/blob/main/Upload2.md -CVE-2024-35222 - https://github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7 -CVE-2024-35231 - https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869 -CVE-2024-35232 - https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr -CVE-2024-35236 - https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-7j99-76cj-q9pg -CVE-2024-3529 - https://vuldb.com/?id.259899 -CVE-2024-35361 - https://github.com/Hebing123/cve/issues/37 -CVE-2024-35362 - https://github.com/shopex/ecshop/issues/6 -CVE-2024-35373 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ -CVE-2024-35374 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ -CVE-2024-35384 - https://github.com/cesanta/mjs/issues/287 -CVE-2024-35385 - https://github.com/cesanta/mjs/issues/288 -CVE-2024-35386 - https://github.com/cesanta/mjs/issues/286 -CVE-2024-35387 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/loginAuth_http_host/README.md -CVE-2024-35388 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20NR1800X/README.md -CVE-2024-35399 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/loginAuth/README.md -CVE-2024-35400 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/SetPortForwardRules/README.md -CVE-2024-35403 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/setIpPortFilterRules/README.md -CVE-2024-35428 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35428.md -CVE-2024-35429 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35429.md -CVE-2024-35430 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35430.md -CVE-2024-35431 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35431.md -CVE-2024-35432 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35432.md -CVE-2024-35433 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35433.md -CVE-2024-35434 - https://github.com/inputzero/Security-Advisories/blob/main/CVE-XXXX-XXXX.md -CVE-2024-35468 - https://github.com/dovankha/CVE-2024-35468 -CVE-2024-35469 - https://github.com/dovankha/CVE-2024-35469 -CVE-2024-35475 - https://github.com/carsonchan12345/CVE-2024-35475 -CVE-2024-35475 - https://github.com/carsonchan12345/OpenKM-CSRF-PoC -CVE-2024-3548 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/ -CVE-2024-35492 - https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Mongoose_null_pointer.md -CVE-2024-35511 - https://github.com/efekaanakkar/CVE-2024-35511/blob/main/Men%20Salon%20Management%20System%20Using%20PHP%20and%20MySQL.md -CVE-2024-35550 - https://github.com/bearman113/1.md/blob/main/17/csrf.md -CVE-2024-35551 - https://github.com/bearman113/1.md/blob/main/16/csrf.md -CVE-2024-35552 - https://github.com/bearman113/1.md/blob/main/20/csrf.md -CVE-2024-35553 - https://github.com/bearman113/1.md/blob/main/21/csrf.md -CVE-2024-35554 - https://github.com/bearman113/1.md/blob/main/19/csrf.md -CVE-2024-35555 - https://github.com/bearman113/1.md/blob/main/18/csrf.md -CVE-2024-35556 - https://github.com/bearman113/1.md/blob/main/26/csrf.md -CVE-2024-35557 - https://github.com/bearman113/1.md/blob/main/27/csrf.md -CVE-2024-35558 - https://github.com/bearman113/1.md/blob/main/24/csrf.md -CVE-2024-35559 - https://github.com/bearman113/1.md/blob/main/22/csrf.md -CVE-2024-35560 - https://github.com/bearman113/1.md/blob/main/25/csrf.md -CVE-2024-35561 - https://github.com/bearman113/1.md/blob/main/23/csrf.md -CVE-2024-35570 - https://github.com/KakeruJ/CVE/ -CVE-2024-35581 - https://github.com/r04i7/CVE/blob/main/CVE-2024-35581.md -CVE-2024-35581 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-35582 - https://github.com/r04i7/CVE/blob/main/CVE-2024-35582.md -CVE-2024-35582 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-35583 - https://github.com/r04i7/CVE/blob/main/CVE-2024-35583.md -CVE-2024-35583 - https://portswigger.net/web-security/cross-site-scripting/stored -CVE-2024-35591 - https://github.com/o2oa/o2oa/issues/156 -CVE-2024-3567 - https://gitlab.com/qemu-project/qemu/-/issues/2273 -CVE-2024-3580 - https://wpscan.com/vulnerability/31f401c4-735a-4efb-b81f-ab98c00c526b/ -CVE-2024-3582 - https://wpscan.com/vulnerability/5a348b5d-13aa-40c3-9d21-0554683f8019/ -CVE-2024-3590 - https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/ -CVE-2024-3591 - https://wpscan.com/vulnerability/f85d8b61-eaeb-433c-b857-06ee4db5c7d5/ -CVE-2024-3594 - https://wpscan.com/vulnerability/7a8a834a-e5d7-4678-9d35-4390d1200437/ -CVE-2024-36049 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-007/ -CVE-2024-36052 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 -CVE-2024-36080 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf -CVE-2024-36081 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf -CVE-2024-36105 - https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349 -CVE-2024-36108 - https://github.com/casgate/casgate/security/advisories/GHSA-mj5q-rc67-h56c -CVE-2024-36109 - https://github.com/sagemathinc/cocalc/security/advisories/GHSA-8w44-hggw-p5rf -CVE-2024-36118 - https://github.com/metersphere/metersphere/security/advisories/GHSA-qxx2-p3w2-w4r6 -CVE-2024-36123 - https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-jhm6-qjhq-5mf9 -CVE-2024-36127 - https://github.com/chainguard-dev/apko/security/advisories/GHSA-v6mg-7f7p-qmqp -CVE-2024-36129 - https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v -CVE-2024-3617 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md -CVE-2024-3618 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md -CVE-2024-3619 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md -CVE-2024-3620 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md -CVE-2024-3621 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md -CVE-2024-3628 - https://wpscan.com/vulnerability/171af8eb-ceeb-403a-abc2-969d9535a4c9/ -CVE-2024-3629 - https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/ -CVE-2024-3630 - https://wpscan.com/vulnerability/cbab7639-fdb2-4ee5-b5ca-9e30701a63b7/ -CVE-2024-3631 - https://wpscan.com/vulnerability/c59a8b49-6f3e-452b-ba9b-50b80c522ee9/ -CVE-2024-3634 - https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/ -CVE-2024-3637 - https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/ -CVE-2024-36399 - https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv -CVE-2024-36400 - https://github.com/viz-rs/nano-id/security/advisories/GHSA-9hc7-6w9r-wj94 -CVE-2024-3641 - https://wpscan.com/vulnerability/f4047f1e-d5ea-425f-8def-76dd5e6a497e/ -CVE-2024-3642 - https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8/ -CVE-2024-3643 - https://wpscan.com/vulnerability/698277e6-56f9-4688-9a84-c2fa3ea9f7dc/ -CVE-2024-3644 - https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/ -CVE-2024-36547 - https://github.com/da271133/cms/blob/main/32/csrf.md -CVE-2024-36548 - https://github.com/da271133/cms/blob/main/31/csrf.md -CVE-2024-36549 - https://github.com/da271133/cms/blob/main/30/csrf.md -CVE-2024-36550 - https://github.com/da271133/cms/blob/main/29/csrf.md -CVE-2024-3657 - https://bugzilla.redhat.com/show_bug.cgi?id=2274401 -CVE-2024-3660 - https://kb.cert.org/vuls/id/253266 -CVE-2024-3660 - https://www.kb.cert.org/vuls/id/253266 -CVE-2024-3661 - https://news.ycombinator.com/item?id=40279632 -CVE-2024-3661 - https://www.leviathansecurity.com/blog/tunnelvision -CVE-2024-3661 - https://www.leviathansecurity.com/research/tunnelvision -CVE-2024-36667 - https://github.com/sigubbs/cms/blob/main/36/csrf.md -CVE-2024-36668 - https://github.com/sigubbs/cms/blob/main/35/csrf.md -CVE-2024-36669 - https://github.com/sigubbs/cms/blob/main/34/csrf.md -CVE-2024-36670 - https://github.com/sigubbs/cms/blob/main/33/csrf.md -CVE-2024-36673 - https://github.com/CveSecLook/cve/issues/39 -CVE-2024-36674 - https://github.com/LyLme/lylme_spage/issues/91 -CVE-2024-36675 - https://github.com/LyLme/lylme_spage/issues/92 -CVE-2024-36773 - https://github.com/OoLs5/VulDiscovery/blob/main/cve-2024-36773.md -CVE-2024-36774 - https://github.com/OoLs5/VulDiscovery/blob/main/poc.docx -CVE-2024-36775 - https://github.com/OoLs5/VulDiscovery/blob/main/monstra_xss.pdf -CVE-2024-36779 - https://github.com/CveSecLook/cve/issues/42 -CVE-2024-36783 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md -CVE-2024-36800 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md -CVE-2024-36801 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md -CVE-2024-36843 - https://github.com/stephane/libmodbus/issues/748 -CVE-2024-36844 - https://github.com/stephane/libmodbus/issues/749 -CVE-2024-36845 - https://github.com/stephane/libmodbus/issues/750 -CVE-2024-36857 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20AFR%20vulnerability -CVE-2024-36858 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability -CVE-2024-3690 - https://github.com/psudo-bugboy/CVE-2024 -CVE-2024-3691 - https://github.com/nikhil-aniill/Small-CRM-CVE -CVE-2024-3691 - https://vuldb.com/?submit.312975 -CVE-2024-3692 - https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/ -CVE-2024-3695 - https://vuldb.com/?id.260482 -CVE-2024-37017 - https://github.com/cinecert/asdcplib/issues/138 -CVE-2024-3703 - https://wpscan.com/vulnerability/3242b820-1da0-41ba-9f35-7be5dbc6d4b0/ -CVE-2024-37160 - https://github.com/getformwork/formwork/security/advisories/GHSA-5pxr-7m4j-jjc6 -CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md -CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection -CVE-2024-37273 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability -CVE-2024-3735 - https://vuldb.com/?submit.311153 -CVE-2024-3745 - https://fluidattacks.com/advisories/gershwin/ -CVE-2024-3748 - https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/ -CVE-2024-3749 - https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/ -CVE-2024-3752 - https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/ -CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/ -CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/ -CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control -CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py -CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md -CVE-2024-3768 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md -CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md -CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md -CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md -CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md -CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/ -CVE-2024-3823 - https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/ -CVE-2024-3824 - https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/ -CVE-2024-3837 - https://issues.chromium.org/issues/41491379 -CVE-2024-3844 - https://issues.chromium.org/issues/40058873 -CVE-2024-3846 - https://issues.chromium.org/issues/40064754 -CVE-2024-3873 - https://vuldb.com/?submit.312623 -CVE-2024-3874 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md -CVE-2024-3875 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md -CVE-2024-3876 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md -CVE-2024-3877 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md -CVE-2024-3878 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md -CVE-2024-3879 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md -CVE-2024-3880 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md -CVE-2024-3881 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md -CVE-2024-3882 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md -CVE-2024-3903 - https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/ -CVE-2024-3905 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md -CVE-2024-3906 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md -CVE-2024-3907 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md -CVE-2024-3908 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md -CVE-2024-3909 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md -CVE-2024-3909 - https://vuldb.com/?id.261145 -CVE-2024-3910 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md -CVE-2024-3917 - https://wpscan.com/vulnerability/88162016-9fc7-4194-9e81-44c50991f6e9/ -CVE-2024-3918 - https://wpscan.com/vulnerability/2074d0f5-4165-4130-9391-37cb21e8aa1b/ -CVE-2024-3920 - https://wpscan.com/vulnerability/2fb28c77-3c35-4a2f-91ed-823d0d011048/ -CVE-2024-3921 - https://wpscan.com/vulnerability/3c114e14-9113-411d-91f3-2e2daeb40739/ -CVE-2024-3928 - https://github.com/ggfzx/OCP-Security-Misconfiguration/tree/main -CVE-2024-3932 - https://vuldb.com/?submit.314381 -CVE-2024-3937 - https://wpscan.com/vulnerability/0cd5b288-05b3-48b7-9245-f59ce7377861/ -CVE-2024-3939 - https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/ -CVE-2024-3940 - https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/ -CVE-2024-3941 - https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/ -CVE-2024-3948 - https://github.com/xuanluansec/vul/issues/5 -CVE-2024-3979 - https://github.com/COVESA/vsomeip/files/14904610/details.zip -CVE-2024-3979 - https://github.com/COVESA/vsomeip/issues/663 -CVE-2024-4019 - https://github.com/scausoft/cve/blob/main/rce.md -CVE-2024-4040 - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ -CVE-2024-4040 - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ -CVE-2024-4057 - https://wpscan.com/vulnerability/da4d4d87-07b3-4f7d-bcbd-d29968a30b4f/ -CVE-2024-4061 - https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/ -CVE-2024-4064 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md -CVE-2024-4065 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md -CVE-2024-4066 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md -CVE-2024-4067 - https://github.com/micromatch/micromatch/issues/243 -CVE-2024-4068 - https://github.com/micromatch/braces/issues/35 -CVE-2024-4068 - https://github.com/micromatch/braces/pull/37 -CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md -CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md -CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md -CVE-2024-4114 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md -CVE-2024-4115 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formAddDnsForward.md -CVE-2024-4116 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelDhcpRule.md -CVE-2024-4117 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelPortMapping.md -CVE-2024-4118 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindAdd.md -CVE-2024-4119 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindDel.md -CVE-2024-4119 - https://vuldb.com/?id.261862 -CVE-2024-4120 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindModify.md -CVE-2024-4121 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formQOSRuleDel.md -CVE-2024-4122 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetDebugCfg.md -CVE-2024-4123 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetPortMapping.md -CVE-2024-4124 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetRemoteWebManage.md -CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetStaticRoute.md -CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md -CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md -CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66 -CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md -CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md -CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md -CVE-2024-4167 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md -CVE-2024-4168 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md -CVE-2024-4169 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md -CVE-2024-4170 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md -CVE-2024-4171 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md -CVE-2024-4172 - https://github.com/bigbigbigbaby/cms2/blob/main/1.md -CVE-2024-4180 - https://wpscan.com/vulnerability/b2a92316-e404-4a5e-8426-f88df6e87550/ -CVE-2024-4236 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md -CVE-2024-4237 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md -CVE-2024-4238 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md -CVE-2024-4239 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md -CVE-2024-4240 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md -CVE-2024-4241 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md -CVE-2024-4242 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md -CVE-2024-4243 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md -CVE-2024-4244 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md -CVE-2024-4245 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_auto.md -CVE-2024-4246 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md -CVE-2024-4247 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md -CVE-2024-4248 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md -CVE-2024-4249 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md -CVE-2024-4250 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md -CVE-2024-4251 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md -CVE-2024-4252 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md -CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md -CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/ -CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ -CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md -CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md -CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md -CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg -CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/ -CVE-2024-4348 - https://vuldb.com/?submit.320855 -CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19 -CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/ -CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/ -CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/ -CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/ -CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md -CVE-2024-4492 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md -CVE-2024-4493 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md -CVE-2024-4494 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md -CVE-2024-4495 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md -CVE-2024-4496 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterSet.md -CVE-2024-4497 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md -CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md -CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md -CVE-2024-4529 - https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/ -CVE-2024-4530 - https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/ -CVE-2024-4531 - https://wpscan.com/vulnerability/18c1b3bb-9998-416f-a972-c4a51643579c/ -CVE-2024-4532 - https://wpscan.com/vulnerability/64cf5f95-bbf0-4c5f-867b-62f1b7f6a42e/ -CVE-2024-4533 - https://wpscan.com/vulnerability/c3406236-aaee-480a-8931-79c867252f11/ -CVE-2024-4534 - https://wpscan.com/vulnerability/7b0046d4-cf95-4307-95a5-9b823f2daaaa/ -CVE-2024-4535 - https://wpscan.com/vulnerability/d4980886-da10-4bbc-a84a-fe071ab3b755/ -CVE-2024-4536 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198 -CVE-2024-4542 - https://research.cleantalk.org/cve-2024-3548/ -CVE-2024-4542 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/ -CVE-2024-4547 - https://www.tenable.com/security/research/tra-2024-13 -CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13 -CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13 -CVE-2024-4585 - https://github.com/Hckwzh/cms/blob/main/16.md -CVE-2024-4586 - https://github.com/Hckwzh/cms/blob/main/17.md -CVE-2024-4587 - https://github.com/Hckwzh/cms/blob/main/18.md -CVE-2024-4588 - https://github.com/Hckwzh/cms/blob/main/19.md -CVE-2024-4589 - https://github.com/Hckwzh/cms/blob/main/20.md -CVE-2024-4590 - https://github.com/Hckwzh/cms/blob/main/21.md -CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md -CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md -CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md -CVE-2024-4594 - https://github.com/Hckwzh/cms/blob/main/25.md -CVE-2024-4620 - https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/ -CVE-2024-4621 - https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/ -CVE-2024-4644 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss3.md -CVE-2024-4645 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss4.md -CVE-2024-4653 - https://github.com/Hefei-Coffee/cve/blob/main/sql.md -CVE-2024-4654 - https://github.com/Hefei-Coffee/cve/blob/main/sql2.md -CVE-2024-4699 - https://github.com/I-Schnee-I/cev/blob/main/D-LINK-DAR-8000-10_rce_importhtml.md -CVE-2024-4723 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-status.md -CVE-2024-4724 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-type.md -CVE-2024-4725 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_client_user.md -CVE-2024-4726 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_clients.md -CVE-2024-4727 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court-type.md -CVE-2024-4728 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court.md -CVE-2024-4729 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_expense-type.md -CVE-2024-4730 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_judge.md -CVE-2024-4731 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_role.md -CVE-2024-4732 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_service.md -CVE-2024-4735 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tasks.md -CVE-2024-4736 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tax.md -CVE-2024-4737 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_vendor.md -CVE-2024-4738 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md -CVE-2024-4749 - https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/ -CVE-2024-4750 - https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/ -CVE-2024-4756 - https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/ -CVE-2024-4792 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md -CVE-2024-4793 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md -CVE-2024-4794 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md -CVE-2024-4795 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md -CVE-2024-4796 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md -CVE-2024-4797 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md -CVE-2024-4798 - https://github.com/Hefei-Coffee/cve/blob/main/sql5.md -CVE-2024-4809 - https://github.com/CveSecLook/cve/issues/26 -CVE-2024-4817 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md -CVE-2024-4818 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md -CVE-2024-4819 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md -CVE-2024-4820 - https://github.com/jxm68868/cve/blob/main/upload.md -CVE-2024-4853 - https://gitlab.com/wireshark/wireshark/-/issues/19724 -CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19782 -CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19783 -CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19784 -CVE-2024-4856 - https://wpscan.com/vulnerability/6cf90a27-55e2-4b2c-9df1-5fa34c1bd9d1/ -CVE-2024-4857 - https://wpscan.com/vulnerability/bf1b8434-b361-4666-9058-d9f08c09d083/ -CVE-2024-4860 - https://www.tenable.com/security/research/tra-2024-16 -CVE-2024-4886 - https://wpscan.com/vulnerability/76e8591f-120c-4cd7-b9a2-79f8d4d98aa8/ -CVE-2024-4903 - https://github.com/Hefei-Coffee/cve/blob/main/sql3.md -CVE-2024-4904 - https://github.com/Hefei-Coffee/cve/blob/main/upload.md -CVE-2024-4912 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md -CVE-2024-4913 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md -CVE-2024-4914 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_ranking-exam.md -CVE-2024-4915 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_result.md -CVE-2024-4916 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_selExamAttemptExe.md -CVE-2024-4917 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_submitAnswerExe.md -CVE-2024-4918 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_updateQuestion.md -CVE-2024-4919 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addCourseExe.md -CVE-2024-4920 - https://github.com/CveSecLook/cve/issues/27 -CVE-2024-4921 - https://github.com/I-Schnee-I/cev/blob/main/upload.md -CVE-2024-4923 - https://github.com/polaris0x1/CVE/issues/1 -CVE-2024-4925 - https://github.com/Hefei-Coffee/cve/blob/main/sql6.md -CVE-2024-4926 - https://github.com/Hefei-Coffee/cve/blob/main/sql7.md -CVE-2024-4927 - https://github.com/Hefei-Coffee/cve/blob/main/upload2.md -CVE-2024-4928 - https://github.com/Hefei-Coffee/cve/blob/main/sql8.md -CVE-2024-4929 - https://github.com/Hefei-Coffee/cve/blob/main/csrf.md -CVE-2024-4946 - https://github.com/CveSecLook/cve/issues/29 -CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30 -CVE-2024-4967 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md -CVE-2024-4968 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20Cross-Site-Scripting.md -CVE-2024-4972 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md -CVE-2024-4973 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md -CVE-2024-4974 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md -CVE-2024-4975 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-2.md -CVE-2024-5003 - https://wpscan.com/vulnerability/1d7d0372-bbc5-40b2-a668-253c819415c4/ -CVE-2024-5046 - https://github.com/CveSecLook/cve/issues/32 -CVE-2024-5047 - https://github.com/I-Schnee-I/cev/blob/main/SourceCodester%20Student%20Management%20System%201.0%20controller.php%20Unrestricted%20Upload.md -CVE-2024-5048 - https://github.com/BurakSevben/CVEs/blob/main/Budget%20Management%20App/Budget%20Management%20App%20-%20SQL%20Injection%20-%201.md -CVE-2024-5049 - https://github.com/polaris0x1/CVE/issues/2 -CVE-2024-5051 - https://vuldb.com/?id.264748 -CVE-2024-5063 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md -CVE-2024-5064 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%202%20(Unauthenticated).md -CVE-2024-5064 - https://vuldb.com/?id.264923 -CVE-2024-5065 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%203%20(Unauthenticated).md -CVE-2024-5066 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%204.md -CVE-2024-5069 - https://vuldb.com/?id.264926 -CVE-2024-5093 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20Authentication%20Bypass.md -CVE-2024-5094 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20SQL%20Injection%20-%202.md -CVE-2024-5097 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20CSRF.md -CVE-2024-5098 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-1.md -CVE-2024-5099 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md -CVE-2024-5100 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-3.md -CVE-2024-5101 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md -CVE-2024-5116 - https://github.com/polaris0x1/CVE/issues/3 -CVE-2024-5117 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md -CVE-2024-5118 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md -CVE-2024-5119 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md -CVE-2024-5120 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md -CVE-2024-5121 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md -CVE-2024-5122 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md -CVE-2024-5123 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md -CVE-2024-5134 - https://github.com/BurakSevben/CVEs/blob/main/Electricity%20Consumption%20Monitoring%20Tool/Electricity%20Consumption%20Monitoring%20Tool%20-%20SQL%20Injection.md -CVE-2024-5135 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20SQL%20Injection%20-%201.md -CVE-2024-5136 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md -CVE-2024-5137 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md -CVE-2024-5138 - https://bugs.launchpad.net/snapd/+bug/2065077 -CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38 -CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38CVE-2005-1275 -CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38CVE-2020-7009 -CVE-2024-5350 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5351 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5352 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5353 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5354 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5355 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5356 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf -CVE-2024-5362 - https://github.com/CveSecLook/cve/issues/41 -CVE-2024-5363 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-1.md -CVE-2024-5364 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-2.md -CVE-2024-5365 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-3.md -CVE-2024-5366 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-4.md -CVE-2024-5377 - https://github.com/yuyuliq/cve/issues/1 -CVE-2024-5378 - https://github.com/GAO-UNO/cve/blob/main/sql2.md -CVE-2024-5381 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 -CVE-2024-5390 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 -CVE-2024-5391 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 -CVE-2024-5392 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 -CVE-2024-5393 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 -CVE-2024-5394 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 -CVE-2024-5395 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 -CVE-2024-5396 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 -CVE-2024-5397 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 -CVE-2024-5410 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ -CVE-2024-5411 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ -CVE-2024-5420 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html -CVE-2024-5421 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html -CVE-2024-5422 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html -CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md -CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md -CVE-2024-5515 - https://github.com/HaojianWang/cve/issues/1 -CVE-2024-5516 - https://github.com/ppp-src/ha/issues/3 -CVE-2024-5517 - https://github.com/ppp-src/ha/issues/4 -CVE-2024-5518 - https://github.com/L1OudFd8cl09/CVE/issues/1 -CVE-2024-5519 - https://github.com/L1OudFd8cl09/CVE/issues/2 -CVE-2024-5565 - https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/ -CVE-2024-5588 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 -CVE-2024-5635 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_a.md -CVE-2024-5636 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_b.md -CVE-2024-5656 - https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/ -CVE-2024-5657 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure -CVE-2024-5658 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use -CVE-2024-5733 - https://github.com/kingshao0312/cve/issues/1 -CVE-2024-5745 - https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md -http://0a29.blogspot.com/2011/11/0a29-11-1-cross-site-scripting.html -http://0a29.blogspot.com/2011/12/0a29-11-2-privilege-escalation.html -http://0dd.zone/2018/04/23/UMLet-XXE/ -http://0x90.eu/ff_tls_poc.html -http://adamziaja.com/poc/201312-xss-mybb.html -http://adamziaja.com/poc/201401-xss-otrs.html -http://aluigi.altervista.org/adv/aa2k6x-adv.txt -http://aluigi.altervista.org/adv/aa2k7x-adv.txt -http://aluigi.altervista.org/adv/aaboompb-adv.txt -http://aluigi.altervista.org/adv/acroagent-adv.txt -http://aluigi.altervista.org/adv/acrogroup-adv.txt -http://aluigi.altervista.org/adv/actp-adv.txt -http://aluigi.altervista.org/adv/adplugbof-adv.txt -http://aluigi.altervista.org/adv/almsrvx_1-adv.txt -http://aluigi.altervista.org/adv/alsapbof-adv.txt -http://aluigi.altervista.org/adv/amp2zero-adv.txt -http://aluigi.altervista.org/adv/aquabof-adv.txt -http://aluigi.altervista.org/adv/armadioz-adv.txt -http://aluigi.altervista.org/adv/armazzo-adv.txt -http://aluigi.altervista.org/adv/armazzofs-adv.txt -http://aluigi.altervista.org/adv/armynchia-adv.txt -http://aluigi.altervista.org/adv/asgulo-adv.txt -http://aluigi.altervista.org/adv/asurabof-adv.txt -http://aluigi.altervista.org/adv/asusvsbugs-adv.txt -http://aluigi.altervista.org/adv/asuxdpc-adv.txt -http://aluigi.altervista.org/adv/atvise_1-adv.txt -http://aluigi.altervista.org/adv/badblue-adv.txt -http://aluigi.altervista.org/adv/battlemages-adv.txt -http://aluigi.altervista.org/adv/bcarrydos-adv.txt -http://aluigi.altervista.org/adv/bcloneboom-adv.txt -http://aluigi.altervista.org/adv/bfccown-adv.txt -http://aluigi.altervista.org/adv/bontagobof-adv.txt -http://aluigi.altervista.org/adv/brainzbof-adv.txt -http://aluigi.altervista.org/adv/bv2x-adv.txt -http://aluigi.altervista.org/adv/bzflagboom-adv.txt -http://aluigi.altervista.org/adv/ca3dex-adv.txt -http://aluigi.altervista.org/adv/carcbackazz-adv.txt -http://aluigi.altervista.org/adv/cellfucktor-adv.txt -http://aluigi.altervista.org/adv/chasercool-adv.txt -http://aluigi.altervista.org/adv/chatany-ghost-adv.txt -http://aluigi.altervista.org/adv/cheesebof-adv.txt -http://aluigi.altervista.org/adv/chmpokbof-adv.txt -http://aluigi.altervista.org/adv/chrome-boom-adv.txt -http://aluigi.altervista.org/adv/closedview-adv.txt -http://aluigi.altervista.org/adv/closedviewx-adv.txt -http://aluigi.altervista.org/adv/cnedrabof-adv.txt -http://aluigi.altervista.org/adv/cod4statz-adv.txt -http://aluigi.altervista.org/adv/cogent_1-adv.txt -http://aluigi.altervista.org/adv/cogent_3-adv.txt -http://aluigi.altervista.org/adv/crysislog-adv.txt -http://aluigi.altervista.org/adv/csdoombof-adv.txt -http://aluigi.altervista.org/adv/cyanuro-adv.txt -http://aluigi.altervista.org/adv/d3engfspb-adv.txt -http://aluigi.altervista.org/adv/daqfactory_1-adv.txt -http://aluigi.altervista.org/adv/dim3bof-adv.txt -http://aluigi.altervista.org/adv/divxplayer-adv.txt -http://aluigi.altervista.org/adv/doubletakedown-adv.txt -http://aluigi.altervista.org/adv/dpa_1-adv.txt -http://aluigi.altervista.org/adv/dropteamz-adv.txt -http://aluigi.altervista.org/adv/dualsbof-adv.txt -http://aluigi.altervista.org/adv/dumbit-adv.txt -http://aluigi.altervista.org/adv/dumsdei-adv.txt -http://aluigi.altervista.org/adv/ecsqdamn-adv.txt -http://aluigi.altervista.org/adv/emerdal-adv.txt -http://aluigi.altervista.org/adv/empiredos-adv.txt -http://aluigi.altervista.org/adv/enetx-adv.txt -http://aluigi.altervista.org/adv/esignal_1-adv.txt -http://aluigi.altervista.org/adv/ethboom-adv.txt -http://aluigi.altervista.org/adv/evilcube-adv.txt -http://aluigi.altervista.org/adv/ezipirla-adv.txt -http://aluigi.altervista.org/adv/fearfspb-adv.txt -http://aluigi.altervista.org/adv/fengulo-adv.txt -http://aluigi.altervista.org/adv/festahc-adv.txt -http://aluigi.altervista.org/adv/flatfragz-adv.txt -http://aluigi.altervista.org/adv/freecivx-adv.txt -http://aluigi.altervista.org/adv/freesshdnull-adv.txt -http://aluigi.altervista.org/adv/funlabsboom-adv.txt -http://aluigi.altervista.org/adv/gc2boom-adv.txt -http://aluigi.altervista.org/adv/genecysbof-adv.txt -http://aluigi.altervista.org/adv/ggwbof-adv.txt -http://aluigi.altervista.org/adv/ggzcdos-adv.txt -http://aluigi.altervista.org/adv/gliderbof-adv.txt -http://aluigi.altervista.org/adv/gnefs-adv.txt -http://aluigi.altervista.org/adv/grboom-adv.txt -http://aluigi.altervista.org/adv/gskeyinuse-adv.txt -http://aluigi.altervista.org/adv/gswsshit-adv.txt -http://aluigi.altervista.org/adv/haloboom-adv.txt -http://aluigi.altervista.org/adv/haloloop-adv.txt -http://aluigi.altervista.org/adv/hgmcrash-adv.txt -http://aluigi.altervista.org/adv/iceexec-adv.txt -http://aluigi.altervista.org/adv/igi2fs-adv.txt -http://aluigi.altervista.org/adv/ihudos-adv.txt -http://aluigi.altervista.org/adv/ipsimene-adv.txt -http://aluigi.altervista.org/adv/jamsgbof-adv.txt -http://aluigi.altervista.org/adv/kailleraex-adv.txt -http://aluigi.altervista.org/adv/lfscbof-adv.txt -http://aluigi.altervista.org/adv/libnemesibof-adv.txt -http://aluigi.altervista.org/adv/lieroxxx-adv.txt -http://aluigi.altervista.org/adv/lithsock-adv.txt -http://aluigi.altervista.org/adv/live555x-adv.txt -http://aluigi.altervista.org/adv/lmmgt2ho-adv.txt -http://aluigi.altervista.org/adv/lotr3boom-adv.txt -http://aluigi.altervista.org/adv/maildisable-adv.txt -http://aluigi.altervista.org/adv/meccaffi-adv.txt -http://aluigi.altervista.org/adv/metastock_1-adv.txt -http://aluigi.altervista.org/adv/mlipodbof-adv.txt -http://aluigi.altervista.org/adv/mobilinkhof-adv.txt -http://aluigi.altervista.org/adv/monopdx-adv.txt -http://aluigi.altervista.org/adv/movicon_1-adv.txt -http://aluigi.altervista.org/adv/movicon_3-adv.txt -http://aluigi.altervista.org/adv/mptho-adv.txt -http://aluigi.altervista.org/adv/mtaboom-adv.txt -http://aluigi.altervista.org/adv/mtpbugs-adv.txt -http://aluigi.altervista.org/adv/nasbugs-adv.txt -http://aluigi.altervista.org/adv/neoaxis_1-adv.txt -http://aluigi.altervista.org/adv/neoenginex-adv.txt -http://aluigi.altervista.org/adv/netrekfs-adv.txt -http://aluigi.altervista.org/adv/nfshp2cbof-adv.txt -http://aluigi.altervista.org/adv/nowsmsz-adv.txt -http://aluigi.altervista.org/adv/ocpbof-adv.txt -http://aluigi.altervista.org/adv/officescaz-adv.txt -http://aluigi.altervista.org/adv/openttdx-adv.txt -http://aluigi.altervista.org/adv/outgunx-adv.txt -http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt -http://aluigi.altervista.org/adv/painkkeybof-adv.txt -http://aluigi.altervista.org/adv/panza-adv.txt -http://aluigi.altervista.org/adv/panzone-adv.txt -http://aluigi.altervista.org/adv/pbwebbof-adv.txt -http://aluigi.altervista.org/adv/peercasthof-adv.txt -http://aluigi.altervista.org/adv/perforces-adv.txt -http://aluigi.altervista.org/adv/picobof-adv.txt -http://aluigi.altervista.org/adv/pragmassh-adv.txt -http://aluigi.altervista.org/adv/pragmatel-adv.txt -http://aluigi.altervista.org/adv/prowizbof-adv.txt -http://aluigi.altervista.org/adv/pulsex-adv.txt -http://aluigi.altervista.org/adv/q3cbof-adv.txt -http://aluigi.altervista.org/adv/q3cfilevar-adv.txt -http://aluigi.altervista.org/adv/q3infoboom-adv.txt -http://aluigi.altervista.org/adv/q3msgboom-adv.txt -http://aluigi.altervista.org/adv/qnxph_1-adv.txt -http://aluigi.altervista.org/adv/ragefreeze-adv.txt -http://aluigi.altervista.org/adv/rakzero-adv.txt -http://aluigi.altervista.org/adv/raydiumx-adv.txt -http://aluigi.altervista.org/adv/remotelynowhere-adv.txt -http://aluigi.altervista.org/adv/rintintin-adv.txt -http://aluigi.altervista.org/adv/rorbof-adv.txt -http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt -http://aluigi.altervista.org/adv/rslogix_1-adv.txt -http://aluigi.altervista.org/adv/rsniff-adv.txt -http://aluigi.altervista.org/adv/ruttorrent-adv.txt -http://aluigi.altervista.org/adv/ruttorrent2-adv.txt -http://aluigi.altervista.org/adv/sapone-adv.txt -http://aluigi.altervista.org/adv/scadapro_1-adv.txt -http://aluigi.altervista.org/adv/scorchbugs-adv.txt -http://aluigi.altervista.org/adv/scrapboom-adv.txt -http://aluigi.altervista.org/adv/skulltagfs-adv.txt -http://aluigi.altervista.org/adv/skulltaghof-adv.txt -http://aluigi.altervista.org/adv/skulltagod-adv.txt -http://aluigi.altervista.org/adv/slmaildos-adv.txt -http://aluigi.altervista.org/adv/slnetmsg-adv.txt -http://aluigi.altervista.org/adv/sof2guidboom-adv.txt -http://aluigi.altervista.org/adv/sof2pbbof-adv.txt -http://aluigi.altervista.org/adv/soldatdos-adv.txt -http://aluigi.altervista.org/adv/soliddb_1-adv.txt -http://aluigi.altervista.org/adv/soliduro-adv.txt -http://aluigi.altervista.org/adv/ssboom-adv.txt -http://aluigi.altervista.org/adv/stalker39x-adv.txt -http://aluigi.altervista.org/adv/stalkerboom-adv.txt -http://aluigi.altervista.org/adv/steamcazz-adv.txt -http://aluigi.altervista.org/adv/strong2boom-adv.txt -http://aluigi.altervista.org/adv/sunagex-adv.txt -http://aluigi.altervista.org/adv/surgeftpizza-adv.txt -http://aluigi.altervista.org/adv/surgemailz-adv.txt -http://aluigi.altervista.org/adv/t3cbof-adv.txt -http://aluigi.altervista.org/adv/t3wmbof-adv.txt -http://aluigi.altervista.org/adv/timbuto-adv.txt -http://aluigi.altervista.org/adv/tincat2bof-adv.txt -http://aluigi.altervista.org/adv/toneboom-adv.txt -http://aluigi.altervista.org/adv/ufo2ko-adv.txt -http://aluigi.altervista.org/adv/umod-adv.txt -http://aluigi.altervista.org/adv/unrealcbof-adv.txt -http://aluigi.altervista.org/adv/unrealcfs-adv.txt -http://aluigi.altervista.org/adv/unrfs-adv.txt -http://aluigi.altervista.org/adv/unsecure-adv.txt -http://aluigi.altervista.org/adv/usurdat-adv.txt -http://aluigi.altervista.org/adv/ut2004null-adv.txt -http://aluigi.altervista.org/adv/ut3mendo-adv.txt -http://aluigi.altervista.org/adv/vaboom-adv.txt -http://aluigi.altervista.org/adv/ventrilobotomy-adv.txt -http://aluigi.altervista.org/adv/versantcmd-adv.txt -http://aluigi.altervista.org/adv/vietcong2fs-adv.txt -http://aluigi.altervista.org/adv/virtbugs-adv.txt -http://aluigi.altervista.org/adv/visibroken-adv.txt -http://aluigi.altervista.org/adv/vlcboffs-adv.txt -http://aluigi.altervista.org/adv/vymesbof-adv.txt -http://aluigi.altervista.org/adv/waccaz-adv.txt -http://aluigi.altervista.org/adv/wachof-adv.txt -http://aluigi.altervista.org/adv/warkings-adv.txt -http://aluigi.altervista.org/adv/wartimesboom-adv.txt -http://aluigi.altervista.org/adv/whitedunboffs-adv.txt -http://aluigi.altervista.org/adv/wicassert-adv.txt -http://aluigi.altervista.org/adv/wicboom-adv.txt -http://aluigi.altervista.org/adv/wilco-again-adv.txt -http://aluigi.altervista.org/adv/winipds-adv.txt -http://aluigi.altervista.org/adv/winuaebof-adv.txt -http://aluigi.altervista.org/adv/xinehof-adv.txt -http://aluigi.altervista.org/adv/xmpbof-adv.txt -http://aluigi.altervista.org/adv/xprallyboom-adv.txt -http://aluigi.altervista.org/adv/xprallyfs-adv.txt -http://aluigi.altervista.org/adv/xtacacsdz-adv.txt -http://aluigi.altervista.org/adv/yagerbof-adv.txt -http://aluigi.altervista.org/adv/zdaebof-adv.txt -http://aluigi.altervista.org/adv/zdaemonull-adv.txt -http://aluigi.altervista.org/adv/zilabzcsx-adv.txt -http://aluigi.altervista.org/adv/zoidboom-adv.txt -http://aluigi.altervista.org/adv/zoidboom2-adv.txt -http://aluigi.altervista.org/adv/zoomprayer-adv.txt -http://aluigi.org/adv/igss_1-adv.txt -http://aluigi.org/adv/igss_2-adv.txt -http://aluigi.org/adv/igss_3-adv.txt -http://aluigi.org/adv/igss_4-adv.txt -http://aluigi.org/adv/igss_5-adv.txt -http://aluigi.org/adv/igss_6-adv.txt -http://aluigi.org/adv/igss_7-adv.txt -http://aluigi.org/adv/igss_8-adv.txt -http://aluigi.org/adv/irm_1-adv.txt -http://aluigi.org/adv/nfr_2-adv.txt -http://aluigi.org/adv/proservrex_1-adv.txt -http://aluigi.org/adv/qtsslame-adv.txt -http://aluigi.org/adv/real_5-adv.txt -http://aluigi.org/adv/realwin_1-adv.txt -http://aluigi.org/adv/realwin_2-adv.txt -http://aluigi.org/adv/realwin_3-adv.txt -http://aluigi.org/adv/realwin_4-adv.txt -http://aluigi.org/adv/realwin_5-adv.txt -http://aluigi.org/adv/realwin_6-adv.txt -http://aluigi.org/adv/realwin_7-adv.txt -http://aluigi.org/adv/realwin_8-adv.txt -http://aluigi.org/adv/samsux_1-adv.txt -http://aluigi.org/adv/unrwebdos-adv.txt -http://aluigi.org/adv/ut3webown-adv.txt -http://aluigi.org/adv/vlcboffs-adv.txt -http://aluigi.org/adv/wachof-adv.txt -http://aluigi.org/adv/wincomalpd-adv.txt -http://aluigi.org/adv/winlog_2-adv.txt -http://aluigi.org/poc/aaboompb.zip -http://aluigi.org/poc/armynchia.zip -http://aluigi.org/poc/bcloneboom.zip -http://aluigi.org/poc/cellfucktor.zip -http://aluigi.org/poc/closedview.zip -http://aluigi.org/poc/d3engfspb.zip -http://aluigi.org/poc/dosboxxx.zip -http://aluigi.org/poc/doubletakedown.zip -http://aluigi.org/poc/dumsdei.zip -http://aluigi.org/poc/ezipirla.zip -http://aluigi.org/poc/fearfspb.zip -http://aluigi.org/poc/fengulo.zip -http://aluigi.org/poc/ipsimene.zip -http://aluigi.org/poc/libnemesibof.zip -http://aluigi.org/poc/lmmgt2ho.zip -http://aluigi.org/poc/perforces.zip -http://aluigi.org/poc/pragmassh.zip -http://aluigi.org/poc/prowizbof.zip -http://aluigi.org/poc/pulsex.zip -http://aluigi.org/poc/qtsslame.zip -http://aluigi.org/poc/rfactorx.zip -http://aluigi.org/poc/rorbof.zip -http://aluigi.org/poc/ruttorrent.zip -http://aluigi.org/poc/skulltagloop.zip -http://aluigi.org/poc/slmaildos.zip -http://aluigi.org/poc/sof2pbbof.zip -http://aluigi.org/poc/soldatdos.zip -http://aluigi.org/poc/soliduro.zip -http://aluigi.org/poc/steamcazz.zip -http://aluigi.org/poc/sunagex.zip -http://aluigi.org/poc/timbuto.zip -http://aluigi.org/poc/toribashish.zip -http://aluigi.org/poc/unrwebdos.zip -http://aluigi.org/poc/ut2004null.zip -http://aluigi.org/poc/ut3mendo.zip -http://aluigi.org/poc/ventrilobotomy.zip -http://aluigi.org/poc/wicassert.zip -http://aluigi.org/poc/wincomalpd.zip -http://aluigi.org/poc/winuaebof.zip -http://aluigi.org/poc/xinehof.zip -http://aluigi.org/poc/xtacacsdz.zip -http://aluigi.org/poc/zdaemonull.zip -http://aluigi.org/poc/zilabzcsx.zip -http://aluigi.org/poc/zoidboom2.zip -http://an7isec.blogspot.co.il/2014/04/pown-noobs-acunetix-0day.html -http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/ -http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/log.php?r1=284&r2=325 -http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/logerror.php?r1=245&r2=325 -http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/ -http://applefun.blogspot.com/2007/01/moab-10-01-2007-apple-dmg-ufs.html -http://archive.is/eF2GR -http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ -http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ -http://atomic111.github.io/article/homematic-ccu2-filewrite -http://atomic111.github.io/article/homematic-ccu2-remote-code-execution -http://attrition.org/pipermail/vim/2006-December/001159.html -http://attrition.org/pipermail/vim/2006-November/001147.html -http://attrition.org/pipermail/vim/2007-April/001523.html -http://attrition.org/pipermail/vim/2007-April/001534.html -http://attrition.org/pipermail/vim/2007-April/001545.html -http://attrition.org/pipermail/vim/2007-April/001546.html -http://attrition.org/pipermail/vim/2007-April/001566.html -http://attrition.org/pipermail/vim/2007-February/001367.html -http://attrition.org/pipermail/vim/2007-February/001377.html -http://attrition.org/pipermail/vim/2007-February/001379.html -http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html -http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html -http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html -http://baraktawily.blogspot.co.il/2017/09/gem-in-box-xss-vulenrability-cve-2017.html -http://baraktawily.blogspot.com/2014/01/soapui-code-execution-vulnerability-cve.html -http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html -http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html -http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk -http://blackwolfsec.cc/2017/07/20/Metinfo-directory-traversal-bypass/ -http://blackwolfsec.cc/2018/01/22/Nonecms/ -http://blog.0xlabs.com/2017/03/solarwinds-lem-ssh-jailbreak-and.html -http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html -http://blog.48bits.com/?p=781 -http://blog.acrossecurity.com/2010/10/breaking-setdlldirectory-protection.html -http://blog.acrossecurity.com/2011/10/google-chrome-pkcs11txt-file-planting.html -http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ -http://blog.c22.cc/2013/03/11/privoxy-proxy-authentication-credential-exposure-cve-2013-2503/ -http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/ -http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ -http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html -http://blog.cr0.org/2009/05/write-once-own-everyone.html -http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ -http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ -http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ -http://blog.didierstevens.com/2010/06/29/quickpost-no-escape-from-pdf/ -http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html -http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/ -http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html -http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html -http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html -http://blog.malerisch.net/2016/09/microsoft--out-of-bounds-read-pdf-library-cve-2016-3374.html -http://blog.malerisch.net/2016/12/alcatel-omnivista-8770-unauth-rce-giop-corba.html -http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html -http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html -http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/ -http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/ -http://blog.mozilla.com/security/2009/07/19/milw0rm-9158-stack-overflow-crash-not-exploitable-cve-2009-2479/ -http://blog.mozilla.com/security/2010/02/22/secunia-advisory-sa38608/ -http://blog.mozilla.com/security/2010/03/18/update-on-secunia-advisory-sa38608/ -http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ -http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html -http://blog.pi3.com.pl/?p=277 -http://blog.pi3.com.pl/?p=69 -http://blog.pi3.com.pl/?p=850 -http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html -http://blog.rewolf.pl/blog/?p=1630 -http://blog.rewolf.pl/blog/?p=1778 -http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/ -http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ -http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure/ -http://blog.skylined.nl/20161118002.html -http://blog.skylined.nl/20161206001.html -http://blog.skylined.nl/20161219001.html -http://blog.skylined.nl/20161221001.html -http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html -http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html -http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day -http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ -http://blog.watchfire.com/files/androiddnsweakprng.pdf -http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html -http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html -http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html -http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html -http://blog.zoller.lu/2009/04/advisory-firefox-dos-condition.html -http://blog.zoller.lu/2009/04/avg-zip-evasion-bypass.html -http://blog.zoller.lu/2009/04/clamav-094-and-below-evasion-and-bypass.html -http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html -http://blog.zoller.lu/2009/04/ibm-proventia-evasion-limited-details.html -http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html -http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html -http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html -http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html -http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ -http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/ -http://blogs.technet.com/srd/archive/2009/06/09/ms09-024.aspx -http://breachattack.com/ -http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html -http://browser-shredders.blogspot.com/2014/01/cve-2014-1449-maxthon-cloud-browser-for.html -http://buddieshub27.blogspot.com/2018/09/cve-2018-16310-technicolor-tg588v-v2.html -http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 -http://bugs.gentoo.org/attachment.cgi?id=163282&action=view -http://bugs.gentoo.org/show_bug.cgi?id=148228 -http://bugs.gentoo.org/show_bug.cgi?id=184815 -http://bugs.gentoo.org/show_bug.cgi?id=190104 -http://bugs.gentoo.org/show_bug.cgi?id=192876 -http://bugs.gentoo.org/show_bug.cgi?id=196803 -http://bugs.gentoo.org/show_bug.cgi?id=199214 -http://bugs.gentoo.org/show_bug.cgi?id=200773 -http://bugs.gentoo.org/show_bug.cgi?id=208100 -http://bugs.gentoo.org/show_bug.cgi?id=238445 -http://bugs.gentoo.org/show_bug.cgi?id=278186 -http://bugs.gentoo.org/show_bug.cgi?id=70090 -http://bugs.gentoo.org/show_bug.cgi?id=93079 -http://bugs.gentoo.org/show_bug.cgi?id=99464 -http://bugs.horde.org/ticket/8398 -http://bugs.jquery.com/ticket/9521 -http://bugs.kde.org/show_bug.cgi?id=96020 -http://bugs.php.net/bug.php?id=54002 -http://bugs.python.org/issue1179 -http://bugs.python.org/issue20246 -http://bugs.python.org/issue2587 -http://bugs.python.org/issue2588 -http://bugs.python.org/issue9061 -http://bugzilla.gnome.org/show_bug.cgi?id=317312 -http://bugzilla.gnome.org/show_bug.cgi?id=546364 -http://bugzilla.mozilla.org/show_bug.cgi?id=256316 -http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337 -http://burninatorsec.blogspot.com/2022/04/library-rce-object-chaining-cve-2021.html -http://buttercms.com -http://c-skills.blogspot.com/2011/11/openpam-trickery.html -http://cat.eyalro.net/ -http://census-labs.com/news/2009/12/02/corehttp-web-server/ -http://census-labs.com/news/2011/10/03/netvolution-referer-SQLi/ -http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/ -http://chxsecurity.org/advisories/adv-1-mid.txt -http://chxsecurity.org/advisories/adv-2-mid.txt -http://chxsecurity.org/advisories/adv-3-full.txt -http://cloudscan.blogspot.com/2010/09/smarter-stats-533819-file-fuzzing.html -http://cloudscan.blogspot.com/2010/09/vendorsmarterstats-bug-cross-site.html -http://co3k.org/blog/redcloth-unfixed-xss-en -http://codalabs.net/cla-2014-001 -http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457 -http://code610.blogspot.com/2016/08/testing-sql-injections-in-comvirtuemart.html -http://code610.blogspot.com/2016/09/sql-injection-in-latest-e107-cms.html -http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.html -http://code610.blogspot.com/2017/04/multiple-crashes-in-vlc-224.html -http://code610.blogspot.com/2017/05/divided-realplayer-160232.html -http://code610.blogspot.com/2017/05/turnkey-feat-otrs.html -http://code610.blogspot.com/2017/07/readwrite-access-violation-acunetix.html -http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html -http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html -http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html -http://code610.blogspot.com/2017/11/sql-injection-in-manageengine.html -http://code610.blogspot.com/2018/01/post-auth-sql-injection-in-freepbx.html -http://code610.blogspot.com/2018/04/few-bugs-in-latest-nagios-xi-5413.html -http://code610.blogspot.com/2018/05/make-free-vlc.html -http://code610.blogspot.com/2018/06/exploiting-cyberark-1021603.html -http://code610.blogspot.com/2018/07/crashing-nmap-760.html -http://code610.blogspot.com/2018/07/crashing-nmap-770.html -http://code610.blogspot.com/2018/08/updating-xnview.html -http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html -http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html -http://codevigilant.com/disclosure/wp-plugin-alipay-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-anyfont-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-bic-media-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-conversador-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-dmca-watermarker-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-easy-career-openings-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-easy-post-types-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-efence-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-envialosimple-email-marketing-y-newsletters-gratis-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-fbpromotions-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-keyword-strategy-internal-links-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-malware-finder-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-oleggo-livestream-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-omfg-mobile-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-rezgo-online-booking-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-jigoshop-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-swipehq-payment-gateway-woocommerce-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-webengage-a3-cross-site-scripting-xss -http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss -http://codewhitesec.blogspot.com/2017/04/amf.html -http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 -http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74 -http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html -http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Balsee%5D_6.20.0.1_insecure_dll_hijacking -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bcelframe_office%5D_2008_insecure_dll_hijacking -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Be-press-one_office%5D_insecure_dll_hijacking -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29 -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bibm_lotus_symphony%5D_3-beta-4_insecure_dll_hijacking -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bkingsoft_office%5D_2010_insecure_dll_hijacking -http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bnuance_pdf_reader%5D_6.0_insecure_dll_hijacking -http://cr.yp.to/antiforgery/cachetiming-20050414.pdf -http://crisp.cs.du.edu/?q=ca2007-1 -http://crisp.cs.du.edu/?q=node/36 -http://cross-site-scripting.blogspot.com/2010/05/brekeke-pbx-2448-cross-site-request.html -http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html -http://cross-site-scripting.blogspot.com/2010/05/pacific-timesheet-674-cross-site.html -http://cross-site-scripting.blogspot.com/2010/05/uniform-server-565-xsrf.html -http://cross-site-scripting.blogspot.com/2010/06/tcexam-101006-arbitrary-upload.html -http://cross-site-scripting.blogspot.com/2010/07/bit-weaver-27-local-file-inclusion.html -http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html -http://cross-site-scripting.blogspot.com/2010/07/news-office-2018-reflected-xss.html -http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-local-file-inclusion.html -http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-reflected-xss.html -http://cross-site-scripting.blogspot.com/2010/07/orbis-102-reflected-xss.html -http://cross-site-scripting.blogspot.com/2010/07/runcms-21-magpie-rss-module-reflected.html -http://cturt.github.io/SETFKEY.html -http://cturt.github.io/sendmsg.html -http://cvewalkthrough.com/cve-2020-13480html-injection -http://cvewalkthrough.com/variant-unauthenticated-information-disclosure-via-api/ -http://cxsecurity.com/issue/WLB-2013110059 -http://cxsecurity.com/issue/WLB-2013110149 -http://cxsecurity.com/issue/WLB-2014010087 -http://cxsecurity.com/research/103 -http://daniels-it-blog.blogspot.com/2020/06/when-your-anti-virus-turns-against-you.html -http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html -http://daniels-it-blog.blogspot.com/2020/07/iobit-malware-fighter-arbitrary-code.html -http://daniels-it-blog.blogspot.com/2020/07/steam-arbitrary-code-execution-part-2.html -http://davidsopaslabs.blogspot.com/2013/ -http://davidsopaslabs.blogspot.com/2013/07/prestashop-persistent-xss-and-csrf.html -http://davidsopaslabs.blogspot.com/2013/10/how-salesman-could-hack-prestashop.html -http://determina.blogspot.com/2007/01/whats-wrong-with-wmf.html -http://dev.cmsmadesimple.org/bug/view/11741 -http://dev.cmsmadesimple.org/bug/view/12312 -http://dev.cmsmadesimple.org/bug/view/12503 -http://dev.sourcefabric.org/browse/CS-4179 -http://dev.sourcefabric.org/browse/CS-4181 -http://dev.sourcefabric.org/browse/CS-4182 -http://dev.sourcefabric.org/browse/CS-4183 -http://dev.sourcefabric.org/browse/CS-4184 -http://digit-labs.org/files/exploits/deslock-probe-read.c -http://digit-labs.org/files/exploits/xnu-superblob-dos.c -http://dl.packetstormsecurity.net/1006-exploits/silverstripe-shell.txt -http://dl.packetstormsecurity.net/1202-exploits/joomlacurrencyconverter-xss.txt -http://doc.powerdns.com/powerdns-advisory-2012-01.html -http://ds-develop.de/advisories/advisory-2016-01-07-1-avm.txt -http://dumpco.re/bugs/wp-plugin-print-my-blog-ssrf -http://echo.or.id/adv/adv02-y3dips-2004.txt -http://echo.or.id/adv/adv05-y3dips-2004.txt -http://echo.or.id/adv/adv07-y3dips-2004.txt -http://echo.or.id/adv/adv08-y3dips-2004.txt -http://echo.or.id/adv/adv09-y3dips-2004.txt -http://echo.or.id/adv/adv16-theday-2005.txt -http://echo.or.id/adv/adv18-theday-2005.txt -http://echo.or.id/adv/adv20-theday-2005.txt -http://echo.or.id/adv/adv21-theday-2005.txt -http://echo.or.id/adv/adv24-theday-2005.txt -http://echo.or.id/adv/adv26-K-159-2006.txt -http://echo.or.id/adv/adv63-y3dips-2007.txt -http://echo.or.id/adv/adv64-y3dips-2007.txt -http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html -http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html -http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/ -http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 -http://eromang.zataz.com/2012/02/15/cve-2012-0209-horde-backdoor-analysis/ -http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/ -http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -http://evilc0de.blogspot.com/2009/09/tpdugg-joomla-component-11-blind-sql.html -http://evilc0de.blogspot.com/2010/03/osdate-rfi-vuln.html -http://evilc0de.blogspot.com/2010/03/pre-e-learning-portal-sql-injection.html -http://evilc0de.blogspot.com/2010/04/joomla-component-redtwitter-lfi-vuln.html -http://evuln.com/vulns/1/summary.html -http://evuln.com/vulns/10/summary.html -http://evuln.com/vulns/100/summary.html -http://evuln.com/vulns/101/summary.html -http://evuln.com/vulns/102/description.html -http://evuln.com/vulns/103/summary.html -http://evuln.com/vulns/104/summary.html -http://evuln.com/vulns/105/summary.html -http://evuln.com/vulns/106/description.html -http://evuln.com/vulns/107/summary.html -http://evuln.com/vulns/108/summary.html -http://evuln.com/vulns/109/summary.html -http://evuln.com/vulns/11/summary.html -http://evuln.com/vulns/113/description.html -http://evuln.com/vulns/114/summary.html -http://evuln.com/vulns/115/summary.html -http://evuln.com/vulns/116/summary.html -http://evuln.com/vulns/117/summary.html -http://evuln.com/vulns/118/summary.html -http://evuln.com/vulns/119/summary.html -http://evuln.com/vulns/120/summary.html -http://evuln.com/vulns/121/summary.html -http://evuln.com/vulns/122/summary.html -http://evuln.com/vulns/123/summary.html -http://evuln.com/vulns/124/summary.html -http://evuln.com/vulns/125/summary.html -http://evuln.com/vulns/126/ -http://evuln.com/vulns/127/summary.html -http://evuln.com/vulns/128/ -http://evuln.com/vulns/129/summary.html -http://evuln.com/vulns/13/summary.html -http://evuln.com/vulns/130/summary.html -http://evuln.com/vulns/131/summary.html -http://evuln.com/vulns/133/summary.html -http://evuln.com/vulns/134/description.html -http://evuln.com/vulns/135/description.html -http://evuln.com/vulns/136/description.html -http://evuln.com/vulns/137/summary.html -http://evuln.com/vulns/139/summary.html -http://evuln.com/vulns/14/exploit.html -http://evuln.com/vulns/14/summary.html -http://evuln.com/vulns/144/summary.html -http://evuln.com/vulns/146/summary.html -http://evuln.com/vulns/147/summary.html -http://evuln.com/vulns/148/summary.html -http://evuln.com/vulns/15/summary.html -http://evuln.com/vulns/151/summary.html -http://evuln.com/vulns/16/summary.html -http://evuln.com/vulns/17/exploit.html -http://evuln.com/vulns/17/summary.html -http://evuln.com/vulns/174/summary.html -http://evuln.com/vulns/175/summary.html -http://evuln.com/vulns/18/summary.html -http://evuln.com/vulns/19/summary.html -http://evuln.com/vulns/2/summary.html -http://evuln.com/vulns/21/summary.html -http://evuln.com/vulns/22/summary.html -http://evuln.com/vulns/23/summary.html -http://evuln.com/vulns/24/summary.html -http://evuln.com/vulns/25/summary.html -http://evuln.com/vulns/26/summary.html -http://evuln.com/vulns/27/summary.html -http://evuln.com/vulns/28/summary.html -http://evuln.com/vulns/29/exploit.html -http://evuln.com/vulns/29/summary.html -http://evuln.com/vulns/3/summary.html -http://evuln.com/vulns/30/summary.html -http://evuln.com/vulns/31/summary -http://evuln.com/vulns/32/exploit -http://evuln.com/vulns/32/summary/ -http://evuln.com/vulns/33/summary.html -http://evuln.com/vulns/34/summary -http://evuln.com/vulns/35/summary.html -http://evuln.com/vulns/36/summary.html -http://evuln.com/vulns/37/summary.html -http://evuln.com/vulns/38/summary/bt/ -http://evuln.com/vulns/39/summary.html -http://evuln.com/vulns/4/summary.html -http://evuln.com/vulns/40/summary.html -http://evuln.com/vulns/41/summary.html -http://evuln.com/vulns/42/summary.html -http://evuln.com/vulns/43/summary.html -http://evuln.com/vulns/44/summary.html -http://evuln.com/vulns/45/summary.html -http://evuln.com/vulns/46/summary.html -http://evuln.com/vulns/47/summary.html -http://evuln.com/vulns/48/summary.html -http://evuln.com/vulns/49/summary.html -http://evuln.com/vulns/5/summary.html -http://evuln.com/vulns/50/summary.html -http://evuln.com/vulns/51/ -http://evuln.com/vulns/51/summary.html -http://evuln.com/vulns/55/summary.html -http://evuln.com/vulns/58/description.html -http://evuln.com/vulns/58/summary.html -http://evuln.com/vulns/59/summary.html -http://evuln.com/vulns/6/summary.html -http://evuln.com/vulns/61/summary.html -http://evuln.com/vulns/63/summary.html -http://evuln.com/vulns/65/summary.html -http://evuln.com/vulns/7/exploit.html -http://evuln.com/vulns/7/summary.html -http://evuln.com/vulns/70/summary.html -http://evuln.com/vulns/71/summary.html -http://evuln.com/vulns/72/summary.html -http://evuln.com/vulns/73/summary.html -http://evuln.com/vulns/78/summary.html -http://evuln.com/vulns/79/summary.html -http://evuln.com/vulns/8/summary.html -http://evuln.com/vulns/80/summary.html -http://evuln.com/vulns/81/summary.html -http://evuln.com/vulns/83/summary.html -http://evuln.com/vulns/84/summary.html -http://evuln.com/vulns/85/summary.html -http://evuln.com/vulns/86/summary.html -http://evuln.com/vulns/87/summary.html -http://evuln.com/vulns/88/summary.html -http://evuln.com/vulns/89/summary.html -http://evuln.com/vulns/9/summary.html -http://evuln.com/vulns/90/summary.html -http://evuln.com/vulns/91/description.html -http://evuln.com/vulns/92/summary.html -http://evuln.com/vulns/93/summary.html -http://evuln.com/vulns/94/summary.html -http://evuln.com/vulns/95/summary.html -http://evuln.com/vulns/96/summary.html -http://evuln.com/vulns/97/summary.html -http://evuln.com/vulns/98/summary.html -http://evuln.com/vulns/99/summary.html -http://exim.org/static/doc/security/CVE-2019-15846.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-003-adventiachat.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-004-edata.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt -http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt -http://exploitlabs.com/files/advisories/EXPL-A-2006-005-shttpd.txt -http://fd.the-wildcat.de/pma_e36a091q11.php -http://fedoranews.org/updates/FEDORA-2004-111.shtml -http://fereidani.com/articles/show/76_kerio_control_8_3_1_boolean_based_blind_sql_injection -http://ffmpeg.mplayerhq.hu/ -http://ffmpeg.org/ -http://ffmpeg.org/security.html -http://ffmpeg.org/trac/ffmpeg/ticket/757 -http://ffmpeg.org/trac/ffmpeg/ticket/758 -http://ffmpeg.org/trac/ffmpeg/ticket/780 -http://firebitsbr.wordpress.com/2014/07/16/vsla-security-advisory-fire-scada-dos-2013-001-http-dos-requests-flooding-crash-device-vulnerabilities-elipse-e3-scada-plc/ -http://firmware.re/vulns/acsa-2015-002.php -http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues -http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ -http://firstsight.me/2019/10/illegal-rendered-at-download-feature-in-several-apps-including-opera-mini-that-lead-to-extension-manipulation-with-rtlo/ -http://forum.wampserver.com/read.php?2,144473 -http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ -http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jenkins -http://ftp.gnu.org/gnu/radius/radius-1.2.tar.gz -http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html -http://g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html -http://genesys.com -http://ghost.org/docs/security/#privilege-escalation-attacks -http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04bf464a5dfd9ade0dda918e44366c2c61fce80b -http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 -http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c -http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d114b9fe78c8d6fc6e70808c2092aa307c36dc8e -http://git.videolan.org/?p=ffmpeg.git;a=commit;h=0aada30510d809bccfd539a90ea37b61188f2cb4 -http://git.videolan.org/?p=ffmpeg.git;a=commit;h=47b7c68ae54560e2308bdb6be4fb076c73b93081 -http://git.videolan.org/gitweb.cgi/ffmpeg.git/?a=commit;h=8a3221cc67a516dfc1700bdae3566ec52c7ee823 -http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99 -http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html -http://greyhathackers.wordpress.com/2010/01/02/left-4-dead-stats-1-1-sql-injection-vulnerability/ -http://greyhathackers.wordpress.com/2010/01/07/sniggabo-cms-v2-21-xss-vulnerability/ -http://h4x0resec.blogspot.com/2014/11/wordpress-html5-mp3-player-with.html -http://h4x0resec.blogspot.com/2014/11/wordpress-sexy-squeeze-pages-plugin.html -http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html -http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html -http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/ -http://hacktheplanet.nu/djihax.pdf -http://hakre.wordpress.com/2010/02/16/the-short-memory-of-wordpress-org-security/ -http://hauntit.blogspot.com/2013/04/en-smf-204-full-disclosure.html -http://hjafari.blogspot.com/2009/09/invisible-browsing-5052-ibkey-local.html -http://hmarco.org/bugs/CVE-2013-4788.html -http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html -http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html -http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html -http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html -http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt -http://hyp3rlinx.altervista.org/advisories/ADOBE-ANIMATE-MEMORY-CORRUPTION-VULNERABILITY.txt -http://hyp3rlinx.altervista.org/advisories/ADOBE-CREATIVE-CLOUD-PRIVILEGE-ESCALATION.txt -http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt -http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt -http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt -http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt -http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt -http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-VIEWERCTRL-ACTIVE-X-BUFFER-OVERFLOW-0DAY.txt -http://hyp3rlinx.altervista.org/advisories/BARCODEWIZ-v6.7-ACTIVEX-COMPONENT-BUFFER-OVERFLOW.txt -http://hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txt -http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2017-14083-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-ENCRYPTION-KEY-DISCLOSURE.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2017-14085-TRENDMICRO-OFFICESCAN-XG-REMOTE-NT-DOMAIN-PHP-INFO-DISCLOSURE.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2017-14089-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-MEMORY-CORRUPTION.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2018-18551-SERVERSCHECK-MONITORING-SOFTWARE-CROSS-SITE-SCRIPTING.txt -http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt -http://hyp3rlinx.altervista.org/advisories/CVS-SUITE-2009R2-INSECURE-LIBRARY-LOADING-CVE-2018-6461.txt -http://hyp3rlinx.altervista.org/advisories/DEVICELOCK-PLUG-PLAY-AUDITOR-v5.72-UNICODE-BUFFER-OVERFLOW.txt -http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt -http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt -http://hyp3rlinx.altervista.org/advisories/EASYCOM-SQL-IPLUG-DENIAL-OF-SERVICE.txt -http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-INSECURE-CRYPTO.txt -http://hyp3rlinx.altervista.org/advisories/FSPRO-LABS-EVENT-LOG-EXPLORER-XML-INJECTION-INFO-DISCLOSURE.txt -http://hyp3rlinx.altervista.org/advisories/FTP-VOYAGER-SCHEDULER-CSRF-REMOTE-CMD-EXECUTION.txt -http://hyp3rlinx.altervista.org/advisories/HFS-HTTP-FILE-SERVER-v2.3-REMOTE-BUFFER-OVERFLOW-DoS.txt -http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt -http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt -http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt -http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt -http://hyp3rlinx.altervista.org/advisories/MOBAXTERM-TFTP-PATH-TRAVERSAL-REMOTE-FILE-ACCESS.txt -http://hyp3rlinx.altervista.org/advisories/MONGOOSE-WEB-SERVER-v6.5-CSRF-COMMAND-EXECUTION.txt -http://hyp3rlinx.altervista.org/advisories/MOXA-MX-AOPC-SERVER-v1.5-XML-EXTERNAL-ENTITY.txt -http://hyp3rlinx.altervista.org/advisories/MOXA-MXVIEW-v2.8-DENIAL-OF-SERVICE.txt -http://hyp3rlinx.altervista.org/advisories/NAT32-REMOTE-COMMAND-EXECUTION-CSRF-CVE-2018-6941.txt -http://hyp3rlinx.altervista.org/advisories/NAT32-REMOTE-COMMAND-EXECUTION-CVE-2018-6940.txt -http://hyp3rlinx.altervista.org/advisories/NEC-UNIVERGE-WEBPRO-v6.00-PREDICTABLE-SESSIONID-CLEARTEXT-PASSWORDS.txt -http://hyp3rlinx.altervista.org/advisories/NOMACHINE-TROJAN-FILE-REMOTE-CODE-EXECUTION.txt -http://hyp3rlinx.altervista.org/advisories/ORACLE-NETBEANS-IDE-DIRECTORY-TRAVERSAL.txt -http://hyp3rlinx.altervista.org/advisories/SECURE-AUDITOR-v3.0-DIRECTORY-TRAVERSAL.txt -http://hyp3rlinx.altervista.org/advisories/SEGGER-embOS-FTP-SERVER-v3.22-FTP-COMMANDS-DENIAL-OF-SERVICE.txt -http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-v10.7-TAMPER-PROTECTION-BYPASS-CVE-2018-4863.txt -http://hyp3rlinx.altervista.org/advisories/SPICEWORKS-IMPROPER-ACCESS-CONTROL-FILE-OVERWRITE.txt -http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt -http://hyp3rlinx.altervista.org/advisories/SUBSONIC-CSRF-PERSISTENT-XSS.txt -http://hyp3rlinx.altervista.org/advisories/SUBSONIC-XML-EXTERNAL-ENITITY.txt -http://hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt -http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-ANTI-THREAT-TOOLKIT-(ATTK)-REMOTE-CODE-EXECUTION.txt -http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt -http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt -http://hyp3rlinx.altervista.org/advisories/TRENDMICRO-OFFICESCAN-XG-v11.0-UNAUTHORIZED-CHANGE-PREVENTION-SERVICE-BYPASS.txt -http://hyp3rlinx.altervista.org/advisories/WEBLOG-EXPERT-WEB-SERVER-ENTERPRISE-v9.4-AUTHENTICATION-BYPASS.txt -http://hyp3rlinx.altervista.org/advisories/WEBLOG-EXPERT-WEB-SERVER-ENTERPRISE-v9.4-DENIAL-OF-SERVICE.txt -http://hyp3rlinx.altervista.org/advisories/WINGATE-INSECURE-PERMISSIONS-LOCAL-PRIVILEGE-ESCALATION.txt -http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt -http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt -http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02 -http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01 -http://ics-cert.us-cert.gov/advisories/ICSA-13-225-01 -http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 -http://ics-cert.us-cert.gov/advisories/ICSA-14-051-02 -http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html -http://ifsec.blogspot.com/2008/10/internet-explorer-6-componentfrompoint.html -http://imagemagick.org/script/changelog.php -http://immunityproducts.blogspot.ca/2013/01/confirmed-java-only-fixed-one-of-two.html -http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html -http://immunityproducts.blogspot.com/2013/03/infiltrate-preview-truetype-font.html -http://immunityservices.blogspot.com/2019/02/cvss.html -http://infosecabsurdity.wordpress.com/research/isa-2013-002/ -http://infoworld.com/d/security-central/new-weaponized-virus-targets-industrial-secrets-725 -http://ingehenriksen.blogspot.com/2005/11/filezilla-server-terminal-094d-dos-poc_21.html -http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf -http://isciurus.blogspot.com/2015/01/android-app-with-full-control-over-your.html -http://isec.pl/vulnerabilities/isec-0008-sun-at.txt -http://isec.pl/vulnerabilities/isec-0013-mremap.txt -http://isec.pl/vulnerabilities/isec-0018-igmp.txt -http://isec.pl/vulnerabilities/isec-0020-mozilla.txt -http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt -http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html -http://issues.apache.org/bugzilla/show_bug.cgi?id=31975 -http://issues.igniterealtime.org/browse/SMACK-410 -http://issues.liferay.com/browse/LPS-11506 -http://issues.liferay.com/browse/LPS-12628 -http://issues.liferay.com/browse/LPS-13250 -http://issues.liferay.com/browse/LPS-13762 -http://issues.liferay.com/browse/LPS-14726 -http://issues.liferay.com/browse/LPS-14927 -http://issues.liferay.com/browse/LPS-6034 -http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 -http://issues.opennms.org/browse/NMS-5128?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel#issue-tabs -http://it.slashdot.org/it/08/06/18/1919224.shtml -http://jgj212.blogspot.hk/2017/04/modified-ecommerce-shopsoftware-2022.html -http://jgj212.blogspot.kr/2017/05/a-reflected-xss-vulnerability-in.html -http://jira.pentaho.com/browse/BISERVER-13207 -http://jouko.iki.fi/adv/ws.html -http://karmainsecurity.com/KIS-2013-03 -http://karmainsecurity.com/KIS-2013-04 -http://karmainsecurity.com/KIS-2016-02 -http://karmainsecurity.com/KIS-2016-11 -http://kerneltrap.org/mailarchive/git-commits-head/2008/5/8/1760604 -http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 -http://kerneltrap.org/mailarchive/git/2008/7/16/2529284 -http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread -http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread -http://kerneltrap.org/mailarchive/linux-netdev/2010/5/21/6277805 -http://klikki.fi/adv/wordpress.html -http://klikki.fi/adv/wpml.html -http://krebsonsecurity.com/2013/01/zero-day-java-exploit-debuts-in-crimeware/ -http://labs.integrity.pt/advisories/cve-2013-3319/ -http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html -http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html -http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html -http://legalhackers.com/advisories/Adobe-ColdFusion-11-XXE-Exploit-CVE-2016-4264.txt -http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt -http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html -http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html -http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html -http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html -http://legalhackers.com/advisories/nagios-check_dhcp.txt -http://legalhackers.com/advisories/vBulletin-SSRF-Vulnerability-Exploit.txt -http://legalhackers.com/advisories/zabbix181api-sql.txt -http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt -http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html -http://liquidworm.blogspot.com/2009/05/mp3-tag-assistant-pro-292-tag-metadata.html -http://liquidworm.blogspot.com/2009/07/music-tag-editor-161-build-212-remote.html -http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html -http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html -http://lists.gnu.org/archive/html/bug-gama/2019-04/msg00001.html -http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html -http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html -http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html -http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html -http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html -http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00031.html -http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html -http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html -http://lists.live555.com/pipermail/live-devel/2020-July/021662.html -http://lists.live555.com/pipermail/live-devel/2021-August/021954.html -http://lists.live555.com/pipermail/live-devel/2021-August/021959.html -http://lists.live555.com/pipermail/live-devel/2021-August/021961.html -http://lists.live555.com/pipermail/live-devel/2021-August/021969.html -http://lists.live555.com/pipermail/live-devel/2021-August/021970.html -http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html -http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html -http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html -http://lists.openwall.net/full-disclosure/2017/04/09/1 -http://lists.openwall.net/full-disclosure/2017/09/14/2 -http://lists.openwall.net/full-disclosure/2018/01/10/8 -http://lists.openwall.net/full-disclosure/2018/02/27/1 -http://lists.openwall.net/full-disclosure/2018/02/28/1 -http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html -http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html -http://lists.vtigercrm.com/pipermail/vtigercrm-developers/2019-January/037852.html -http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html -http://lkml.org/lkml/2009/10/19/50 -http://longinox.blogspot.com/2013/08/explot-stack-based-overflow-bypassing.html -http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Authenticated-SQL-injection -http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Reflected-XSS-in-get-image-php -http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Stored-XSS-in-images-php -http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Stored-XSS-in-visitors-php -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#Reflected-XSS -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-after-limit-via-system-num-parameter -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-in-action-related-catid-parameter -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-via-system-field-parameter -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#URL-Redirector-Abuse -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#api-php-Reflected-XSS -http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#remote-php-code-execution -http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html -http://lostmon.blogspot.com/2005/04/oneworldstore-critical-failure.html -http://lostmon.blogspot.com/2005/04/oneworldstore-user-information.html -http://lostmon.blogspot.com/2005/04/phpcart-price-manipulation.html -http://lostmon.blogspot.com/2005/04/viart-shop-enterprise-multiple.html -http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html -http://lostmon.blogspot.com/2005/07/cmsimple-search-variable-xss.html -http://lostmon.blogspot.com/2005/08/dvbbs-multiple-variable-cross-site.html -http://lostmon.blogspot.com/2006/12/php-icalendar-multiple-variable-cross.html -http://lostmon.blogspot.com/2007/06/safari-301-552122-for-windows.html -http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html -http://lostmon.blogspot.com/2008/05/bcoos-highlightphp-traversal-file.html -http://lostmon.blogspot.com/2008/08/kshop-module-search-variable-and-field.html -http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.html -http://lostmon.blogspot.com/2008/08/rmsoft-minishop-module-multiple.html -http://lostmon.blogspot.com/2008/11/dhcart-multiple-variable-xss-and-stored.html -http://lostmon.blogspot.com/2009/01/safari-for-windows-321-remote-http-uri.html -http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html -http://lostmon.blogspot.com/2009/10/wowd-search-client-multiple-variable.html -http://lostmon.blogspot.com/2012/03/greenbrowser-about-dialog-xss-and.html -http://lua-users.org/lists/lua-l/2020-07/msg00052.html -http://lua-users.org/lists/lua-l/2020-07/msg00053.html -http://lua-users.org/lists/lua-l/2020-07/msg00054.html -http://lua-users.org/lists/lua-l/2020-07/msg00071.html -http://lua-users.org/lists/lua-l/2020-07/msg00078.html -http://lua-users.org/lists/lua-l/2020-07/msg00079.html -http://lua-users.org/lists/lua-l/2020-07/msg00123.html -http://lua-users.org/lists/lua-l/2020-07/msg00324.html -http://lua-users.org/lists/lua-l/2021-11/msg00186.html -http://lwn.net/Articles/81773/ -http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2 -http://marc.info/?l=bugtraq&m=109597139011373&w=2 -http://marc.info/?l=bugtraq&m=100342151132277&w=2 -http://marc.info/?l=bugtraq&m=100498111712723&w=2 -http://marc.info/?l=bugtraq&m=100689302316077&w=2 -http://marc.info/?l=bugtraq&m=100698397818175&w=2 -http://marc.info/?l=bugtraq&m=100700363414799&w=2 -http://marc.info/?l=bugtraq&m=100863301405266&w=2 -http://marc.info/?l=bugtraq&m=101102759631000&w=2 -http://marc.info/?l=bugtraq&m=101111688819855&w=2 -http://marc.info/?l=bugtraq&m=101174569103289&w=2 -http://marc.info/?l=bugtraq&m=101286747013955&w=2 -http://marc.info/?l=bugtraq&m=101310622531303&w=2 -http://marc.info/?l=bugtraq&m=101362984930597&w=2 -http://marc.info/?l=bugtraq&m=101366658112809&w=2 -http://marc.info/?l=bugtraq&m=101389284625019&w=2 -http://marc.info/?l=bugtraq&m=101408718030099&w=2 -http://marc.info/?l=bugtraq&m=101408906001958&w=2 -http://marc.info/?l=bugtraq&m=101414005501708&w=2 -http://marc.info/?l=bugtraq&m=101424307617060&w=2 -http://marc.info/?l=bugtraq&m=101424723728817&w=2 -http://marc.info/?l=bugtraq&m=101441689224760&w=2 -http://marc.info/?l=bugtraq&m=101446366708757&w=2 -http://marc.info/?l=bugtraq&m=101474387016066&w=2 -http://marc.info/?l=bugtraq&m=101484705523351&w=2 -http://marc.info/?l=bugtraq&m=101495944202452&w=2 -http://marc.info/?l=bugtraq&m=101534535304228&w=2 -http://marc.info/?l=bugtraq&m=101537076619812&w=2 -http://marc.info/?l=bugtraq&m=101724766216872 -http://marc.info/?l=bugtraq&m=101778302030981&w=2 -http://marc.info/?l=bugtraq&m=101829645415486&w=2 -http://marc.info/?l=bugtraq&m=101829726516346&w=2 -http://marc.info/?l=bugtraq&m=101829911018463&w=2 -http://marc.info/?l=bugtraq&m=101830175621193&w=2 -http://marc.info/?l=bugtraq&m=101901273810598&w=2 -http://marc.info/?l=bugtraq&m=101974610509912&w=2 -http://marc.info/?l=bugtraq&m=102017952204097&w=2 -http://marc.info/?l=bugtraq&m=102139136019862&w=2 -http://marc.info/?l=bugtraq&m=102306166201275&w=2 -http://marc.info/?l=bugtraq&m=102450188620081&w=2 -http://marc.info/?l=bugtraq&m=102459162909825&w=2 -http://marc.info/?l=bugtraq&m=102508071021631&w=2 -http://marc.info/?l=bugtraq&m=102513970919836&w=2 -http://marc.info/?l=bugtraq&m=102563702928443&w=2 -http://marc.info/?l=bugtraq&m=102709593117171&w=2 -http://marc.info/?l=bugtraq&m=102734516023281&w=2 -http://marc.info/?l=bugtraq&m=102812622416695&w=2 -http://marc.info/?l=bugtraq&m=102822806329440&w=2 -http://marc.info/?l=bugtraq&m=102979180524452&w=2 -http://marc.info/?l=bugtraq&m=103002169829669&w=2 -http://marc.info/?l=bugtraq&m=103011639524314&w=2 -http://marc.info/?l=bugtraq&m=103040003014999&w=2 -http://marc.info/?l=bugtraq&m=103046375002380&w=2 -http://marc.info/?l=bugtraq&m=103098575826031&w=2 -http://marc.info/?l=bugtraq&m=103134051120770&w=2 -http://marc.info/?l=bugtraq&m=103158601431054&w=2 -http://marc.info/?l=bugtraq&m=103252858816401&w=2 -http://marc.info/?l=bugtraq&m=103305615613319&w=2 -http://marc.info/?l=bugtraq&m=103340148625187&w=2 -http://marc.info/?l=bugtraq&m=103419115517344&w=2 -http://marc.info/?l=bugtraq&m=103470310417576&w=2 -http://marc.info/?l=bugtraq&m=103530131201191&w=2 -http://marc.info/?l=bugtraq&m=103798147613151&w=2 -http://marc.info/?l=bugtraq&m=103858895600963&w=2 -http://marc.info/?l=bugtraq&m=103971644013961&w=2 -http://marc.info/?l=bugtraq&m=103979751818638&w=2 -http://marc.info/?l=bugtraq&m=104032149026670&w=2 -http://marc.info/?l=bugtraq&m=104204786206563&w=2 -http://marc.info/?l=bugtraq&m=104342864418213&w=2 -http://marc.info/?l=bugtraq&m=104428700106672&w=2 -http://marc.info/?l=bugtraq&m=104431622818954&w=2 -http://marc.info/?l=bugtraq&m=104490777824360&w=2 -http://marc.info/?l=bugtraq&m=104576100719090&w=2 -http://marc.info/?l=bugtraq&m=104587206702715&w=2 -http://marc.info/?l=bugtraq&m=104610337726297&w=2 -http://marc.info/?l=bugtraq&m=104610380126860&w=2 -http://marc.info/?l=bugtraq&m=104678739608479&w=2 -http://marc.info/?l=bugtraq&m=104716030503607&w=2 -http://marc.info/?l=bugtraq&m=104739841223916&w=2 -http://marc.info/?l=bugtraq&m=104818814931378&w=2 -http://marc.info/?l=bugtraq&m=104861839130254&w=2 -http://marc.info/?l=bugtraq&m=104869513822233&w=2 -http://marc.info/?l=bugtraq&m=104914778303805&w=2 -http://marc.info/?l=bugtraq&m=104940730819887&w=2 -http://marc.info/?l=bugtraq&m=104982175321731&w=2 -http://marc.info/?l=bugtraq&m=104994309010974&w=2 -http://marc.info/?l=bugtraq&m=105001663120995&w=2 -http://marc.info/?l=bugtraq&m=105103613727471&w=2 -http://marc.info/?l=bugtraq&m=105111217731583&w=2 -http://marc.info/?l=bugtraq&m=105121918523320&w=2 -http://marc.info/?l=bugtraq&m=105155734411836&w=2 -http://marc.info/?l=bugtraq&m=105172058404810&w=2 -http://marc.info/?l=bugtraq&m=105241224228693&w=2 -http://marc.info/?l=bugtraq&m=105259012802997&w=2 -http://marc.info/?l=bugtraq&m=105284486526310&w=2 -http://marc.info/?l=bugtraq&m=105344891005369&w=2 -http://marc.info/?l=bugtraq&m=105361879109409&w=2 -http://marc.info/?l=bugtraq&m=105370528728225&w=2 -http://marc.info/?l=bugtraq&m=105405629622652&w=2 -http://marc.info/?l=bugtraq&m=105405668423102&w=2 -http://marc.info/?l=bugtraq&m=105474080512376&w=2 -http://marc.info/?l=bugtraq&m=105561134624665&w=2 -http://marc.info/?l=bugtraq&m=105561189625082&w=2 -http://marc.info/?l=bugtraq&m=105577912106710&w=2 -http://marc.info/?l=bugtraq&m=105585986015421&w=2 -http://marc.info/?l=bugtraq&m=105595990924165&w=2 -http://marc.info/?l=bugtraq&m=105613243117155&w=2 -http://marc.info/?l=bugtraq&m=105621758104242 -http://marc.info/?l=bugtraq&m=105648385900792&w=2 -http://marc.info/?l=bugtraq&m=105664924024009&w=2 -http://marc.info/?l=bugtraq&m=105709450711395&w=2 -http://marc.info/?l=bugtraq&m=105709569312583&w=2 -http://marc.info/?l=bugtraq&m=105733145930031&w=2 -http://marc.info/?l=bugtraq&m=105733277731084&w=2 -http://marc.info/?l=bugtraq&m=105733894003737&w=2 -http://marc.info/?l=bugtraq&m=105760660928715&w=2 -http://marc.info/?l=bugtraq&m=105769387706906&w=2 -http://marc.info/?l=bugtraq&m=105769805311484&w=2 -http://marc.info/?l=bugtraq&m=105785749721291&w=2 -http://marc.info/?l=bugtraq&m=105820193406838&w=2 -http://marc.info/?l=bugtraq&m=105820430209748&w=2 -http://marc.info/?l=bugtraq&m=105829174431769&w=2 -http://marc.info/?l=bugtraq&m=105829691405446&w=2 -http://marc.info/?l=bugtraq&m=105838519729525&w=2 -http://marc.info/?l=bugtraq&m=105838948002337&w=2 -http://marc.info/?l=bugtraq&m=105839042603476&w=2 -http://marc.info/?l=bugtraq&m=105839150004682&w=2 -http://marc.info/?l=bugtraq&m=105845898003616&w=2 -http://marc.info/?l=bugtraq&m=105846288808846&w=2 -http://marc.info/?l=bugtraq&m=105848106631132&w=2 -http://marc.info/?l=bugtraq&m=105880332428706&w=2 -http://marc.info/?l=bugtraq&m=105950927708272&w=2 -http://marc.info/?l=bugtraq&m=105958240709302&w=2 -http://marc.info/?l=bugtraq&m=105978381618095&w=2 -http://marc.info/?l=bugtraq&m=106062021711496&w=2 -http://marc.info/?l=bugtraq&m=106071059430211&w=2 -http://marc.info/?l=bugtraq&m=106260760211958&w=2 -http://marc.info/?l=bugtraq&m=106262077829157&w=2 -http://marc.info/?l=bugtraq&m=106304902323758&w=2 -http://marc.info/?l=bugtraq&m=106364207129993&w=2 -http://marc.info/?l=bugtraq&m=106367213400313&w=2 -http://marc.info/?l=bugtraq&m=106381136115972&w=2 -http://marc.info/?l=bugtraq&m=106546044416498&w=2 -http://marc.info/?l=bugtraq&m=106547728803252&w=2 -http://marc.info/?l=bugtraq&m=106589631819348&w=2 -http://marc.info/?l=bugtraq&m=106666713812158&w=2 -http://marc.info/?l=bugtraq&m=106761926906781&w=2 -http://marc.info/?l=bugtraq&m=106762000607681&w=2 -http://marc.info/?l=bugtraq&m=106865197102041&w=2 -http://marc.info/?l=bugtraq&m=106867135830683&w=2 -http://marc.info/?l=bugtraq&m=106875764826251&w=2 -http://marc.info/?l=bugtraq&m=106944220426970 -http://marc.info/?l=bugtraq&m=106986437621130&w=2 -http://marc.info/?l=bugtraq&m=107004362416252&w=2 -http://marc.info/?l=bugtraq&m=107038202225587&w=2 -http://marc.info/?l=bugtraq&m=107064830206816&w=2 -http://marc.info/?l=bugtraq&m=107090390002654&w=2 -http://marc.info/?l=bugtraq&m=107196735102970&w=2 -http://marc.info/?l=bugtraq&m=107247236124180&w=2 -http://marc.info/?l=bugtraq&m=107273069130885&w=2 -http://marc.info/?l=bugtraq&m=107332782121916&w=2 -http://marc.info/?l=bugtraq&m=107340358402129&w=2 -http://marc.info/?l=bugtraq&m=107340481804110&w=2 -http://marc.info/?l=bugtraq&m=107367110805273&w=2 -http://marc.info/?l=bugtraq&m=107394912715478&w=2 -http://marc.info/?l=bugtraq&m=107401398014761&w=2 -http://marc.info/?l=bugtraq&m=107411794303201&w=2 -http://marc.info/?l=bugtraq&m=107462349324945&w=2 -http://marc.info/?l=bugtraq&m=107479094508691&w=2 -http://marc.info/?l=bugtraq&m=107480261825214&w=2 -http://marc.info/?l=bugtraq&m=107487971405960&w=2 -http://marc.info/?l=bugtraq&m=107513690306318&w=2 -http://marc.info/?l=bugtraq&m=107515550931508&w=2 -http://marc.info/?l=bugtraq&m=107524391217364&w=2 -http://marc.info/?l=bugtraq&m=107530966524193&w=2 -http://marc.info/?l=bugtraq&m=107576894019530&w=2 -http://marc.info/?l=bugtraq&m=107582648326448&w=2 -http://marc.info/?l=bugtraq&m=107584109420084&w=2 -http://marc.info/?l=bugtraq&m=107586518120516&w=2 -http://marc.info/?l=bugtraq&m=107594183924958&w=2 -http://marc.info/?l=bugtraq&m=107604065819233&w=2 -http://marc.info/?l=bugtraq&m=107606726417150&w=2 -http://marc.info/?l=bugtraq&m=107634556632195&w=2 -http://marc.info/?l=bugtraq&m=107634638201570&w=2 -http://marc.info/?l=bugtraq&m=107634727520936&w=2 -http://marc.info/?l=bugtraq&m=107635110327066&w=2 -http://marc.info/?l=bugtraq&m=107642978524321&w=2 -http://marc.info/?l=bugtraq&m=107643014606515&w=2 -http://marc.info/?l=bugtraq&m=107643348117646&w=2 -http://marc.info/?l=bugtraq&m=107652610506968&w=2 -http://marc.info/?l=bugtraq&m=107655269820530&w=2 -http://marc.info/?l=bugtraq&m=107695064204362&w=2 -http://marc.info/?l=bugtraq&m=107703630913205&w=2 -http://marc.info/?l=bugtraq&m=107711762014175&w=2 -http://marc.info/?l=bugtraq&m=107712159425226&w=2 -http://marc.info/?l=bugtraq&m=107756001412888&w=2 -http://marc.info/?l=bugtraq&m=107756639427140&w=2 -http://marc.info/?l=bugtraq&m=107757029514146&w=2 -http://marc.info/?l=bugtraq&m=107764783411414&w=2 -http://marc.info/?l=bugtraq&m=107799508130700&w=2 -http://marc.info/?l=bugtraq&m=107816217901923&w=2 -http://marc.info/?l=bugtraq&m=107833097705486&w=2 -http://marc.info/?l=bugtraq&m=107885946220895&w=2 -http://marc.info/?l=bugtraq&m=107893764406905&w=2 -http://marc.info/?l=bugtraq&m=107964719614657&w=2 -http://marc.info/?l=bugtraq&m=107997967421972&w=2 -http://marc.info/?l=bugtraq&m=108006680013576&w=2 -http://marc.info/?l=bugtraq&m=108007072215742&w=2 -http://marc.info/?l=bugtraq&m=108016032220647&w=2 -http://marc.info/?l=bugtraq&m=108016076221855&w=2 -http://marc.info/?l=bugtraq&m=108024309814423&w=2 -http://marc.info/?l=bugtraq&m=108025234317408&w=2 -http://marc.info/?l=bugtraq&m=108057790723123&w=2 -http://marc.info/?l=bugtraq&m=108067894822358&w=2 -http://marc.info/?l=bugtraq&m=108075059013762&w=2 -http://marc.info/?l=bugtraq&m=108100973820868&w=2 -http://marc.info/?l=bugtraq&m=108100987429960&w=2 -http://marc.info/?l=bugtraq&m=108120385811815&w=2 -http://marc.info/?l=bugtraq&m=108127833002955&w=2 -http://marc.info/?l=bugtraq&m=108130573130482&w=2 -http://marc.info/?l=bugtraq&m=108136872711898&w=2 -http://marc.info/?l=bugtraq&m=108136901406896&w=2 -http://marc.info/?l=bugtraq&m=108137421524251&w=2 -http://marc.info/?l=bugtraq&m=108137545531496&w=2 -http://marc.info/?l=bugtraq&m=108145722229810&w=2 -http://marc.info/?l=bugtraq&m=108146376315229&w=2 -http://marc.info/?l=bugtraq&m=108152508004665&w=2 -http://marc.info/?l=bugtraq&m=108239796512897&w=2 -http://marc.info/?l=bugtraq&m=108240639427412&w=2 -http://marc.info/?l=bugtraq&m=108249818308672&w=2 -http://marc.info/?l=bugtraq&m=108267310519459&w=2 -http://marc.info/?l=bugtraq&m=108276299810121&w=2 -http://marc.info/?l=bugtraq&m=108325860431471&w=2 -http://marc.info/?l=bugtraq&m=108360001130312&w=2 -http://marc.info/?l=bugtraq&m=108386181021070&w=2 -http://marc.info/?l=bugtraq&m=108420555920369&w=2 -http://marc.info/?l=bugtraq&m=108432258920570&w=2 -http://marc.info/?l=bugtraq&m=108437759930820&w=2 -http://marc.info/?l=bugtraq&m=108481571131866&w=2 -http://marc.info/?l=bugtraq&m=108498433632333&w=2 -http://marc.info/?l=bugtraq&m=108498454829020&w=2 -http://marc.info/?l=bugtraq&m=108498676517697&w=2 -http://marc.info/?l=bugtraq&m=108559623703422&w=2 -http://marc.info/?l=bugtraq&m=108577846011604&w=2 -http://marc.info/?l=bugtraq&m=108585789220174&w=2 -http://marc.info/?l=bugtraq&m=108611554415078&w=2 -http://marc.info/?l=bugtraq&m=108627581717738&w=2 -http://marc.info/?l=bugtraq&m=108663003608211&w=2 -http://marc.info/?l=bugtraq&m=108668791510153 -http://marc.info/?l=bugtraq&m=108723630730487&w=2 -http://marc.info/?l=bugtraq&m=108745217504379&w=2 -http://marc.info/?l=bugtraq&m=108766803817406&w=2 -http://marc.info/?l=bugtraq&m=108787105023304&w=2 -http://marc.info/?l=bugtraq&m=108809720026642&w=2 -http://marc.info/?l=bugtraq&m=108844316930791&w=2 -http://marc.info/?l=bugtraq&m=108886995627906&w=2 -http://marc.info/?l=bugtraq&m=108887778628398&w=2 -http://marc.info/?l=bugtraq&m=108938579712894&w=2 -http://marc.info/?l=bugtraq&m=108966465302107&w=2 -http://marc.info/?l=bugtraq&m=108981780109154&w=2 -http://marc.info/?l=bugtraq&m=109008314631518&w=2 -http://marc.info/?l=bugtraq&m=109035224715409&w=2 -http://marc.info/?l=bugtraq&m=109053195818351&w=2 -http://marc.info/?l=bugtraq&m=109086977330418&w=2 -http://marc.info/?l=bugtraq&m=109087067730938&w=2 -http://marc.info/?l=bugtraq&m=109087144509299&w=2 -http://marc.info/?l=bugtraq&m=109121546120575&w=2 -http://marc.info/?l=bugtraq&m=109146099404071&w=2 -http://marc.info/?l=bugtraq&m=109164397601049&w=2 -http://marc.info/?l=bugtraq&m=109208394910086&w=2 -http://marc.info/?l=bugtraq&m=109215441332682&w=2 -http://marc.info/?l=bugtraq&m=109223783402624&w=2 -http://marc.info/?l=bugtraq&m=109267937212298&w=2 -http://marc.info/?l=bugtraq&m=109285292901685&w=2 -http://marc.info/?l=bugtraq&m=109309119502208&w=2 -http://marc.info/?l=bugtraq&m=109327547026265&w=2 -http://marc.info/?l=bugtraq&m=109327938924287&w=2 -http://marc.info/?l=bugtraq&m=109336221826652&w=2 -http://marc.info/?l=bugtraq&m=109339761608821&w=2 -http://marc.info/?l=bugtraq&m=109340580218818&w=2 -http://marc.info/?l=bugtraq&m=109341398102863&w=2 -http://marc.info/?l=bugtraq&m=109357154602892&w=2 -http://marc.info/?l=bugtraq&m=109364123707953&w=2 -http://marc.info/?l=bugtraq&m=109396159332523&w=2 -http://marc.info/?l=bugtraq&m=109396193723317&w=2 -http://marc.info/?l=bugtraq&m=109413415205017&w=2 -http://marc.info/?l=bugtraq&m=109414967003192&w=2 -http://marc.info/?l=bugtraq&m=109441750900432&w=2 -http://marc.info/?l=bugtraq&m=109449953200587&w=2 -http://marc.info/?l=bugtraq&m=109479695022024&w=2 -http://marc.info/?l=bugtraq&m=109483089621955&w=2 -http://marc.info/?l=bugtraq&m=109508834910733&w=2 -http://marc.info/?l=bugtraq&m=109517782910407&w=2 -http://marc.info/?l=bugtraq&m=109534848430404&w=2 -http://marc.info/?l=bugtraq&m=109543366631724&w=2 -http://marc.info/?l=bugtraq&m=109577497718374&w=2 -http://marc.info/?l=bugtraq&m=109581586128899&w=2 -http://marc.info/?l=bugtraq&m=109589167110196&w=2 -http://marc.info/?l=bugtraq&m=109591179510781&w=2 -http://marc.info/?l=bugtraq&m=109597139011373&w=2 -http://marc.info/?l=bugtraq&m=109608092609200&w=2 -http://marc.info/?l=bugtraq&m=109630699829536&w=2 -http://marc.info/?l=bugtraq&m=109638486728548&w=2 -http://marc.info/?l=bugtraq&m=109640005127644&w=2 -http://marc.info/?l=bugtraq&m=109651567308405&w=2 -http://marc.info/?l=bugtraq&m=109664986210763&w=2 -http://marc.info/?l=bugtraq&m=109665993315769&w=2 -http://marc.info/?l=bugtraq&m=109668542406346&w=2 -http://marc.info/?l=bugtraq&m=109716787607302&w=2 -http://marc.info/?l=bugtraq&m=109728194025487&w=2 -http://marc.info/?l=bugtraq&m=109761632831563&w=2 -http://marc.info/?l=bugtraq&m=109778648232233&w=2 -http://marc.info/?l=bugtraq&m=109786760926133&w=2 -http://marc.info/?l=bugtraq&m=109811852218478&w=2 -http://marc.info/?l=bugtraq&m=109820344806472&w=2 -http://marc.info/?l=bugtraq&m=109829017407842&w=2 -http://marc.info/?l=bugtraq&m=109829067325779&w=2 -http://marc.info/?l=bugtraq&m=109880813013482&w=2 -http://marc.info/?l=bugtraq&m=109880961630050&w=2 -http://marc.info/?l=bugtraq&m=109886388528179&w=2 -http://marc.info/?l=bugtraq&m=109889281711636&w=2 -http://marc.info/?l=bugtraq&m=109889312917613&w=2 -http://marc.info/?l=bugtraq&m=109889705116038&w=2 -http://marc.info/?l=bugtraq&m=109898213806099&w=2 -http://marc.info/?l=bugtraq&m=109942758911846&w=2 -http://marc.info/?l=bugtraq&m=109976745017459&w=2 -http://marc.info/?l=bugtraq&m=110004150430309&w=2 -http://marc.info/?l=bugtraq&m=110011618724455&w=2 -http://marc.info/?l=bugtraq&m=110011817627839&w=2 -http://marc.info/?l=bugtraq&m=110020607924001&w=2 -http://marc.info/?l=bugtraq&m=110021385926870&w=2 -http://marc.info/?l=bugtraq&m=110054671403755&w=2 -http://marc.info/?l=bugtraq&m=110064626111756&w=2 -http://marc.info/?l=bugtraq&m=110072140811965&w=2 -http://marc.info/?l=bugtraq&m=110114233323417&w=2 -http://marc.info/?l=bugtraq&m=110114770406920&w=2 -http://marc.info/?l=bugtraq&m=110118902823639&w=2 -http://marc.info/?l=bugtraq&m=110123023521619&w=2 -http://marc.info/?l=bugtraq&m=110124208811327&w=2 -http://marc.info/?l=bugtraq&m=110138413816367&w=2 -http://marc.info/?l=bugtraq&m=110138568212036&w=2 -http://marc.info/?l=bugtraq&m=110140029419018&w=2 -http://marc.info/?l=bugtraq&m=110144303826709&w=2 -http://marc.info/?l=bugtraq&m=110144606411674&w=2 -http://marc.info/?l=bugtraq&m=110149122529761&w=2 -http://marc.info/?l=bugtraq&m=110176280402580&w=2 -http://marc.info/?l=bugtraq&m=110197682705001&w=2 -http://marc.info/?l=bugtraq&m=110201776207915&w=2 -http://marc.info/?l=bugtraq&m=110238855010003&w=2 -http://marc.info/?l=bugtraq&m=110244662102167&w=2 -http://marc.info/?l=bugtraq&m=110245123927025&w=2 -http://marc.info/?l=bugtraq&m=110269474112384&w=2 -http://marc.info/?l=bugtraq&m=110279034910663&w=2 -http://marc.info/?l=bugtraq&m=110295777306493&w=2 -http://marc.info/?l=bugtraq&m=110297515500671&w=2 -http://marc.info/?l=bugtraq&m=110304269031484&w=2 -http://marc.info/?l=bugtraq&m=110305802005220&w=2 -http://marc.info/?l=bugtraq&m=110313585810712&w=2 -http://marc.info/?l=bugtraq&m=110314318531298&w=2 -http://marc.info/?l=bugtraq&m=110314454810163&w=2 -http://marc.info/?l=bugtraq&m=110355931920123&w=2 -http://marc.info/?l=bugtraq&m=110357519312200&w=2 -http://marc.info/?l=bugtraq&m=110375900916558&w=2 -http://marc.info/?l=bugtraq&m=110382854111833&w=2 -http://marc.info/?l=bugtraq&m=110382891718076&w=2 -http://marc.info/?l=bugtraq&m=110383690219440&w=2 -http://marc.info/?l=bugtraq&m=110391024404947&w=2 -http://marc.info/?l=bugtraq&m=110425409614735&w=2 -http://marc.info/?l=bugtraq&m=110425875504586&w=2 -http://marc.info/?l=bugtraq&m=110429204712327&w=2 -http://marc.info/?l=bugtraq&m=110436284718949&w=2 -http://marc.info/?l=bugtraq&m=110486165802196&w=2 -http://marc.info/?l=bugtraq&m=110486566600980&w=2 -http://marc.info/?l=bugtraq&m=110486654213504&w=2 -http://marc.info/?l=bugtraq&m=110503597505648&w=2 -http://marc.info/?l=bugtraq&m=110505334903257&w=2 -http://marc.info/?l=bugtraq&m=110512665029209&w=2 -http://marc.info/?l=bugtraq&m=110537385427004&w=2 -http://marc.info/?l=bugtraq&m=110547286002188&w=2 -http://marc.info/?l=bugtraq&m=110547469530582&w=2 -http://marc.info/?l=bugtraq&m=110548193312050&w=2 -http://marc.info/?l=bugtraq&m=110549426300953&w=2 -http://marc.info/?l=bugtraq&m=110555988111899&w=2 -http://marc.info/?l=bugtraq&m=110556975827760&w=2 -http://marc.info/?l=bugtraq&m=110557050700947&w=2 -http://marc.info/?l=bugtraq&m=110565373407474&w=2 -http://marc.info/?l=bugtraq&m=110565587010998&w=2 -http://marc.info/?l=bugtraq&m=110599727631560&w=2 -http://marc.info/?l=bugtraq&m=110608422029555&w=2 -http://marc.info/?l=bugtraq&m=110627132209963&w=2 -http://marc.info/?l=bugtraq&m=110627201120011&w=2 -http://marc.info/?l=bugtraq&m=110642400018425&w=2 -http://marc.info/?l=bugtraq&m=110642748517854&w=2 -http://marc.info/?l=bugtraq&m=110661194108205&w=2 -http://marc.info/?l=bugtraq&m=110666998407073&w=2 -http://marc.info/?l=bugtraq&m=110687202332039&w=2 -http://marc.info/?l=bugtraq&m=110693045507245&w=2 -http://marc.info/?l=bugtraq&m=110720064811485&w=2 -http://marc.info/?l=bugtraq&m=110736915015707&w=2 -http://marc.info/?l=bugtraq&m=110737616324614&w=2 -http://marc.info/?l=bugtraq&m=110746524021133&w=2 -http://marc.info/?l=bugtraq&m=110763204301080&w=2 -http://marc.info/?l=bugtraq&m=110780306326130&w=2 -http://marc.info/?l=bugtraq&m=110780995232064&w=2 -http://marc.info/?l=bugtraq&m=110781055630856&w=2 -http://marc.info/?l=bugtraq&m=110781134617144&w=2 -http://marc.info/?l=bugtraq&m=110782042532295&w=2 -http://marc.info/?l=bugtraq&m=110782704923280&w=2 -http://marc.info/?l=bugtraq&m=110791369419784&w=2 -http://marc.info/?l=bugtraq&m=110792779115794&w=2 -http://marc.info/?l=bugtraq&m=110796851002781&w=2 -http://marc.info/?l=bugtraq&m=110797495532358&w=2 -http://marc.info/?l=bugtraq&m=110811699206052&w=2 -http://marc.info/?l=bugtraq&m=110824822224025&w=2 -http://marc.info/?l=bugtraq&m=110824870908614&w=2 -http://marc.info/?l=bugtraq&m=110868948719773&w=2 -http://marc.info/?l=bugtraq&m=110869187805397&w=2 -http://marc.info/?l=bugtraq&m=110879063511486&w=2 -http://marc.info/?l=bugtraq&m=110910899415763&w=2 -http://marc.info/?l=bugtraq&m=110917641105486&w=2 -http://marc.info/?l=bugtraq&m=110917702708589&w=2 -http://marc.info/?l=bugtraq&m=110917768511595&w=2 -http://marc.info/?l=bugtraq&m=110927288423807&w=2 -http://marc.info/?l=bugtraq&m=110927754230666&w=2 -http://marc.info/?l=bugtraq&m=110935267500395&w=2 -http://marc.info/?l=bugtraq&m=110943766505666&w=2 -http://marc.info/?l=bugtraq&m=110970474726113&w=2 -http://marc.info/?l=bugtraq&m=110970738214608&w=2 -http://marc.info/?l=bugtraq&m=110970911514167&w=2 -http://marc.info/?l=bugtraq&m=110971002211589&w=2 -http://marc.info/?l=bugtraq&m=110971101826900&w=2 -http://marc.info/?l=bugtraq&m=110989169008570&w=2 -http://marc.info/?l=bugtraq&m=110995289619649&w=2 -http://marc.info/?l=bugtraq&m=111023000624809&w=2 -http://marc.info/?l=bugtraq&m=111056135818279&w=2 -http://marc.info/?l=bugtraq&m=111065868402859&w=2 -http://marc.info/?l=bugtraq&m=111065974004648&w=2 -http://marc.info/?l=bugtraq&m=111066115808506&w=2 -http://marc.info/?l=bugtraq&m=111066805726551&w=2 -http://marc.info/?l=bugtraq&m=111082702422979&w=2 -http://marc.info/?l=bugtraq&m=111083125521813&w=2 -http://marc.info/?l=bugtraq&m=111091250923281&w=2 -http://marc.info/?l=bugtraq&m=111092012415193&w=2 -http://marc.info/?l=bugtraq&m=111100269512216&w=2 -http://marc.info/?l=bugtraq&m=111108519331738&w=2 -http://marc.info/?l=bugtraq&m=111108743527497&w=2 -http://marc.info/?l=bugtraq&m=111125734701262&w=2 -http://marc.info/?l=bugtraq&m=111143649730845&w=2 -http://marc.info/?l=bugtraq&m=111168413007891&w=2 -http://marc.info/?l=bugtraq&m=111176899423078&w=2 -http://marc.info/?l=bugtraq&m=111186424600509&w=2 -http://marc.info/?l=bugtraq&m=111205342909640&w=2 -http://marc.info/?l=bugtraq&m=111213291118273&w=2 -http://marc.info/?l=bugtraq&m=111221890614271&w=2 -http://marc.info/?l=bugtraq&m=111221940107161&w=2 -http://marc.info/?l=bugtraq&m=111230101127767&w=2 -http://marc.info/?l=bugtraq&m=111238364916500&w=2 -http://marc.info/?l=bugtraq&m=111246796918067&w=2 -http://marc.info/?l=bugtraq&m=111246855213653&w=2 -http://marc.info/?l=bugtraq&m=111247198021626&w=2 -http://marc.info/?l=bugtraq&m=111262942708249&w=2 -http://marc.info/?l=bugtraq&m=111264602406090&w=2 -http://marc.info/?l=bugtraq&m=111273637518494&w=2 -http://marc.info/?l=bugtraq&m=111280834000432&w=2 -http://marc.info/?l=bugtraq&m=111298226029957&w=2 -http://marc.info/?l=bugtraq&m=111306207306155&w=2 -http://marc.info/?l=bugtraq&m=111323802003019&w=2 -http://marc.info/?l=bugtraq&m=111331738223323&w=2 -http://marc.info/?l=bugtraq&m=111339935903880&w=2 -http://marc.info/?l=bugtraq&m=111340031132596&w=2 -http://marc.info/?l=bugtraq&m=111343406309969&w=2 -http://marc.info/?l=bugtraq&m=111352017704126&w=2 -http://marc.info/?l=bugtraq&m=111352154820865&w=2 -http://marc.info/?l=bugtraq&m=111358557823673&w=2 -http://marc.info/?l=bugtraq&m=111359804013536&w=2 -http://marc.info/?l=bugtraq&m=111384806002021&w=2 -http://marc.info/?l=bugtraq&m=111393619021575&w=2 -http://marc.info/?l=bugtraq&m=111393947713420&w=2 -http://marc.info/?l=bugtraq&m=111401172901705&w=2 -http://marc.info/?l=bugtraq&m=111401502007772&w=2 -http://marc.info/?l=bugtraq&m=111402253108991&w=2 -http://marc.info/?l=bugtraq&m=111420400316397&w=2 -http://marc.info/?l=bugtraq&m=111428133317901&w=2 -http://marc.info/?l=bugtraq&m=111428393022389&w=2 -http://marc.info/?l=bugtraq&m=111445064725591&w=2 -http://marc.info/?l=bugtraq&m=111445131808328&w=2 -http://marc.info/?l=bugtraq&m=111445834220015&w=2 -http://marc.info/?l=bugtraq&m=111453994718211&w=2 -http://marc.info/?l=bugtraq&m=111454090503662&w=2 -http://marc.info/?l=bugtraq&m=111454142832023&w=2 -http://marc.info/?l=bugtraq&m=111454192928364&w=2 -http://marc.info/?l=bugtraq&m=111454354214982&w=2 -http://marc.info/?l=bugtraq&m=111473522804665&w=2 -http://marc.info/?l=bugtraq&m=111507556127582&w=2 -http://marc.info/?l=bugtraq&m=111530675909673&w=2 -http://marc.info/?l=bugtraq&m=111530799109755&w=2 -http://marc.info/?l=bugtraq&m=111530871716145&w=2 -http://marc.info/?l=bugtraq&m=111530871724865&w=2 -http://marc.info/?l=bugtraq&m=111531904608224&w=2 -http://marc.info/?l=bugtraq&m=111539740212818&w=2 -http://marc.info/?l=bugtraq&m=111541709402784&w=2 -http://marc.info/?l=bugtraq&m=111575820116969&w=2 -http://marc.info/?l=bugtraq&m=111575905112831&w=2 -http://marc.info/?l=bugtraq&m=111584883727605&w=2 -http://marc.info/?l=bugtraq&m=111592417803514&w=2 -http://marc.info/?l=bugtraq&m=111600262424876&w=2 -http://marc.info/?l=bugtraq&m=111600439331242&w=2 -http://marc.info/?l=bugtraq&m=111601780332632&w=2 -http://marc.info/?l=bugtraq&m=111601904204055&w=2 -http://marc.info/?l=bugtraq&m=111602076500031&w=2 -http://marc.info/?l=bugtraq&m=111609838307070&w=2 -http://marc.info/?l=bugtraq&m=111627124301526&w=2 -http://marc.info/?l=bugtraq&m=111643475210982&w=2 -http://marc.info/?l=bugtraq&m=111653088303057&w=2 -http://marc.info/?l=bugtraq&m=111653168810937&w=2 -http://marc.info/?l=bugtraq&m=111661117701398&w=2 -http://marc.info/?l=bugtraq&m=111661253517089&w=2 -http://marc.info/?l=bugtraq&m=111670637812128&w=2 -http://marc.info/?l=bugtraq&m=111686776303832&w=2 -http://marc.info/?l=bugtraq&m=111695779919830&w=2 -http://marc.info/?l=bugtraq&m=111712494620031&w=2 -http://marc.info/?l=bugtraq&m=111713248227479&w=2 -http://marc.info/?l=bugtraq&m=111713300212601&w=2 -http://marc.info/?l=bugtraq&m=111721290726958&w=2 -http://marc.info/?l=bugtraq&m=111746303509720&w=2 -http://marc.info/?l=bugtraq&m=111746394106172&w=2 -http://marc.info/?l=bugtraq&m=111746441220149&w=2 -http://marc.info/?l=bugtraq&m=111746551802380&w=2 -http://marc.info/?l=bugtraq&m=111746654827861&w=2 -http://marc.info/?l=bugtraq&m=111747562806999&w=2 -http://marc.info/?l=bugtraq&m=111755356016155&w=2 -http://marc.info/?l=bugtraq&m=111755870828817&w=2 -http://marc.info/?l=bugtraq&m=111757191118050&w=2 -http://marc.info/?l=bugtraq&m=111773774916907&w=2 -http://marc.info/?l=bugtraq&m=111773894525119&w=2 -http://marc.info/?l=bugtraq&m=111809312423958&w=2 -http://marc.info/?l=bugtraq&m=111816939928640&w=2 -http://marc.info/?l=bugtraq&m=111835539312985&w=2 -http://marc.info/?l=bugtraq&m=111852830111316&w=2 -http://marc.info/?l=bugtraq&m=111877410528692&w=2 -http://marc.info/?l=bugtraq&m=111885974124936&w=2 -http://marc.info/?l=bugtraq&m=111893777504821&w=2 -http://marc.info/?l=bugtraq&m=111927717726371&w=2 -http://marc.info/?l=bugtraq&m=111928552304897&w=2 -http://marc.info/?l=bugtraq&m=111928841328681&w=2 -http://marc.info/?l=bugtraq&m=111946399501080&w=2 -http://marc.info/?l=bugtraq&m=111954840611126&w=2 -http://marc.info/?l=bugtraq&m=111963068714114&w=2 -http://marc.info/?l=bugtraq&m=111963341429906&w=2 -http://marc.info/?l=bugtraq&m=111989223906484&w=2 -http://marc.info/?l=bugtraq&m=111989828622112&w=2 -http://marc.info/?l=bugtraq&m=111999905917019&w=2 -http://marc.info/?l=bugtraq&m=112006558125309&w=2 -http://marc.info/?l=bugtraq&m=112006605026261&w=2 -http://marc.info/?l=bugtraq&m=112006764714946&w=2 -http://marc.info/?l=bugtraq&m=112006967221438&w=2 -http://marc.info/?l=bugtraq&m=112008299210033&w=2 -http://marc.info/?l=bugtraq&m=112008638320145&w=2 -http://marc.info/?l=bugtraq&m=112051398718830&w=2 -http://marc.info/?l=bugtraq&m=112059745606348&w=2 -http://marc.info/?l=bugtraq&m=112059815028059&w=2 -http://marc.info/?l=bugtraq&m=112060187204457&w=2 -http://marc.info/?l=bugtraq&m=112066594312876&w=2 -http://marc.info/?l=bugtraq&m=112066901231154&w=2 -http://marc.info/?l=bugtraq&m=112067013827970&w=2 -http://marc.info/?l=bugtraq&m=112069267700034&w=2 -http://marc.info/?l=bugtraq&m=112075901100640&w=2 -http://marc.info/?l=bugtraq&m=112077057001064&w=2 -http://marc.info/?l=bugtraq&m=112084050624959&w=2 -http://marc.info/?l=bugtraq&m=112084384928950&w=2 -http://marc.info/?l=bugtraq&m=112110868021563&w=2 -http://marc.info/?l=bugtraq&m=112110963416714&w=2 -http://marc.info/?l=bugtraq&m=112120030308592&w=2 -http://marc.info/?l=bugtraq&m=112121930328341&w=2 -http://marc.info/?l=bugtraq&m=112122500308722&w=2 -http://marc.info/?l=bugtraq&m=112127188609993&w=2 -http://marc.info/?l=bugtraq&m=112129258221823&w=2 -http://marc.info/?l=bugtraq&m=112196537312610&w=2 -http://marc.info/?l=bugtraq&m=112199282029269&w=2 -http://marc.info/?l=bugtraq&m=112206702015439&w=2 -http://marc.info/?l=bugtraq&m=112230649106740&w=2 -http://marc.info/?l=bugtraq&m=112239353829324&w=2 -http://marc.info/?l=bugtraq&m=112259845904350&w=2 -http://marc.info/?l=bugtraq&m=112264706213040&w=2 -http://marc.info/?l=bugtraq&m=112292193807958&w=2 -http://marc.info/?l=bugtraq&m=112327238030127&w=2 -http://marc.info/?l=bugtraq&m=112351740803443&w=2 -http://marc.info/?l=bugtraq&m=112352095923614&w=2 -http://marc.info/?l=bugtraq&m=112360702307424&w=2 -http://marc.info/?l=bugtraq&m=112379283900586&w=2 -http://marc.info/?l=bugtraq&m=112387501519835&w=2 -http://marc.info/?l=bugtraq&m=112431235221271&w=2 -http://marc.info/?l=bugtraq&m=112438781604862&w=2 -http://marc.info/?l=bugtraq&m=112447630109392&w=2 -http://marc.info/?l=bugtraq&m=112472951529964&w=2 -http://marc.info/?l=bugtraq&m=112474427221031&w=2 -http://marc.info/?l=bugtraq&m=112474727903399&w=2 -http://marc.info/?l=bugtraq&m=112483407515020&w=2 -http://marc.info/?l=bugtraq&m=112490496918102&w=2 -http://marc.info/?l=bugtraq&m=112498693231687&w=2 -http://marc.info/?l=bugtraq&m=112511159821143&w=2 -http://marc.info/?l=bugtraq&m=112516327607001&w=2 -http://marc.info/?l=bugtraq&m=112534155318828&w=2 -http://marc.info/?l=bugtraq&m=112542447219235&w=2 -http://marc.info/?l=bugtraq&m=112550635826169&w=2 -http://marc.info/?l=bugtraq&m=112560044813390&w=2 -http://marc.info/?l=bugtraq&m=112561344400914&w=2 -http://marc.info/?l=bugtraq&m=112577523810442&w=2 -http://marc.info/?l=bugtraq&m=112605448327521&w=2 -http://marc.info/?l=bugtraq&m=112605610624004&w=2 -http://marc.info/?l=bugtraq&m=112610983428771&w=2 -http://marc.info/?l=bugtraq&m=112611338417979&w=2 -http://marc.info/?l=bugtraq&m=112629480300071&w=2 -http://marc.info/?l=bugtraq&m=112629627512785&w=2 -http://marc.info/?l=bugtraq&m=112662698511403&w=2 -http://marc.info/?l=bugtraq&m=112662785418368&w=2 -http://marc.info/?l=bugtraq&m=112680922318639&w=2 -http://marc.info/?l=bugtraq&m=112714879101323&w=2 -http://marc.info/?l=bugtraq&m=112716394925851&w=2 -http://marc.info/?l=bugtraq&m=112741430006983&w=2 -http://marc.info/?l=bugtraq&m=112749230124091&w=2 -http://marc.info/?l=bugtraq&m=112758146618234&w=2 -http://marc.info/?l=bugtraq&m=112776577002945&w=2 -http://marc.info/?l=bugtraq&m=112785544325326&w=2 -http://marc.info/?l=bugtraq&m=112786017426276&w=2 -http://marc.info/?l=bugtraq&m=112793982604963&w=2 -http://marc.info/?l=bugtraq&m=112801702000944&w=2 -http://marc.info/?l=bugtraq&m=112811189420696&w=2 -http://marc.info/?l=bugtraq&m=112811771331997&w=2 -http://marc.info/?l=bugtraq&m=112812059917394&w=2 -http://marc.info/?l=bugtraq&m=112818273307878&w=2 -http://marc.info/?l=bugtraq&m=112862493918840&w=2 -http://marc.info/?l=bugtraq&m=112872593432359&w=2 -http://marc.info/?l=bugtraq&m=112872691119874&w=2 -http://marc.info/?l=bugtraq&m=112879353805769&w=2 -http://marc.info/?l=bugtraq&m=112879611919750&w=2 -http://marc.info/?l=bugtraq&m=112907535528616&w=2 -http://marc.info/?l=bugtraq&m=112915118302012&w=2 -http://marc.info/?l=bugtraq&m=112967149509401&w=2 -http://marc.info/?l=bugtraq&m=112967223222966&w=2 -http://marc.info/?l=bugtraq&m=113017003617987&w=2 -http://marc.info/?l=bugtraq&m=113017049702436&w=2 -http://marc.info/?l=bugtraq&m=113017591414699&w=2 -http://marc.info/?l=bugtraq&m=113026202728568&w=2 -http://marc.info/?l=bugtraq&m=113028017608146&w=2 -http://marc.info/?l=bugtraq&m=113028858316430&w=2 -http://marc.info/?l=bugtraq&m=113035773010381&w=2 -http://marc.info/?l=bugtraq&m=113081113317600&w=2 -http://marc.info/?l=bugtraq&m=113140190521377&w=2 -http://marc.info/?l=bugtraq&m=113140426614670&w=2 -http://marc.info/?l=bugtraq&m=113156438708932&w=2 -http://marc.info/?l=bugtraq&m=113156525006667&w=2 -http://marc.info/?l=bugtraq&m=113156601505542&w=2 -http://marc.info/?l=bugtraq&m=113156859811594&w=2 -http://marc.info/?l=bugtraq&m=113165668814241&w=2 -http://marc.info/?l=bugtraq&m=113199214723444&w=2 -http://marc.info/?l=bugtraq&m=113199244824660&w=2 -http://marc.info/?l=bugtraq&m=113201260613863&w=2 -http://marc.info/?l=bugtraq&m=113261573023912&w=2 -http://marc.info/?l=bugtraq&m=113486637512821&w=2 -http://marc.info/?l=bugtraq&m=113898556313924&w=2 -http://marc.info/?l=bugtraq&m=113926179907655&w=2 -http://marc.info/?l=bugtraq&m=114791192612460&w=2 -http://marc.info/?l=bugtraq&m=115016951316696&w=2 -http://marc.info/?l=bugtraq&m=115024576618386&w=2 -http://marc.info/?l=bugtraq&m=115041611713385&w=2 -http://marc.info/?l=bugtraq&m=115048898305454&w=2 -http://marc.info/?l=bugtraq&m=115109990800428&w=2 -http://marc.info/?l=bugtraq&m=115869368313367&w=2 -http://marc.info/?l=bugtraq&m=115876919804966&w=2 -http://marc.info/?l=bugtraq&m=116049484210942&w=2 -http://marc.info/?l=bugtraq&m=116110988829381&w=2 -http://marc.info/?l=bugtraq&m=116283614914510&w=2 -http://marc.info/?l=bugtraq&m=116283724113571&w=2 -http://marc.info/?l=bugtraq&m=116283849004075&w=2 -http://marc.info/?l=bugtraq&m=116303405916694&w=2 -http://marc.info/?l=bugtraq&m=116353137028066&w=2 -http://marc.info/?l=bugtraq&m=116373125308955&w=2 -http://marc.info/?l=bugtraq&m=116387287216907&w=2 -http://marc.info/?l=bugtraq&m=116387481223790&w=2 -http://marc.info/?l=bugtraq&m=116508632603388&w=2 -http://marc.info/?l=bugtraq&m=116525508018486&w=2 -http://marc.info/?l=bugtraq&m=117036933022782&w=2 -http://marc.info/?l=bugtraq&m=117319839710382&w=2 -http://marc.info/?l=bugtraq&m=117883301207293&w=2 -http://marc.info/?l=bugtraq&m=119678272603064&w=2 -http://marc.info/?l=bugtraq&m=119678724111351&w=2 -http://marc.info/?l=bugtraq&m=120093005310107&w=2 -http://marc.info/?l=bugtraq&m=120110205511630&w=2 -http://marc.info/?l=bugtraq&m=120468784112145&w=2 -http://marc.info/?l=bugtraq&m=120792465631586&w=2 -http://marc.info/?l=bugtraq&m=121130774617956&w=4 -http://marc.info/?l=bugtraq&m=121322052622903&w=2 -http://marc.info/?l=bugtraq&m=121881329424635&w=2 -http://marc.info/?l=bugtraq&m=121933211712734&w=2 -http://marc.info/?l=bugtraq&m=121933258013788&w=2 -http://marc.info/?l=bugtraq&m=122210321731789&w=2 -http://marc.info/?l=bugtraq&m=122278832621348&w=2 -http://marc.info/?l=bugtraq&m=122298544725313&w=2 -http://marc.info/?l=bugtraq&m=122893066212987&w=2 -http://marc.info/?l=bugtraq&m=124171333011782&w=2 -http://marc.info/?l=bugtraq&m=124905075425380&w=2 -http://marc.info/?l=bugtraq&m=128104130309426&w=2 -http://marc.info/?l=bugtraq&m=128104795219200&w=2 -http://marc.info/?l=bugtraq&m=129182251500541&w=2 -http://marc.info/?l=bugtraq&m=94936267131123&w=2 -http://marc.info/?l=bugtraq&m=96045469627806&w=2 -http://marc.info/?l=bugtraq&m=96161462915381&w=2 -http://marc.info/?l=bugtraq&m=97034397026473&w=2 -http://marc.info/?l=bugtraq&m=97236125107957&w=2 -http://marc.info/?l=bugtraq&m=97236316510117&w=2 -http://marc.info/?l=bugtraq&m=97310314724964&w=2 -http://marc.info/?l=bugtraq&m=97570878710037&w=2 -http://marc.info/?l=bugtraq&m=97570884410184&w=2 -http://marc.info/?l=bugtraq&m=97967435023835&w=2 -http://marc.info/?l=bugtraq&m=98339581702282&w=2 -http://marc.info/?l=bugtraq&m=98642418618512&w=2 -http://marc.info/?l=bugtraq&m=98761402029302&w=2 -http://marc.info/?l=bugtraq&m=98865027328391&w=2 -http://marc.info/?l=bugtraq&m=98874912915948&w=2 -http://marc.info/?l=bugtraq&m=99057164129869&w=2 -http://marc.info/?l=bugtraq&m=99348216322147&w=2 -http://marc.info/?l=bugtraq&m=99598918914068&w=2 -http://marc.info/?l=bugtraq&m=99745571104126&w=2 -http://marc.info/?l=bugtraq&m=99892644616749&w=2 -http://marc.info/?l=full-disclosure&m=108091662105032&w=2 -http://marc.info/?l=full-disclosure&m=108430407801825&w=2 -http://marc.info/?l=full-disclosure&m=109391133831787&w=2 -http://marc.info/?l=full-disclosure&m=109727077824860&w=2 -http://marc.info/?l=full-disclosure&m=110824766519417&w=2 -http://marc.info/?l=full-disclosure&m=110864983905770&w=2 -http://marc.info/?l=full-disclosure&m=110961578504928&w=2 -http://marc.info/?l=full-disclosure&m=111072872816405&w=2 -http://marc.info/?l=full-disclosure&m=111117284323657&w=2 -http://marc.info/?l=full-disclosure&m=111175236620942&w=2 -http://marc.info/?l=full-disclosure&m=111211930330410&w=2 -http://marc.info/?l=full-disclosure&m=111211945505635&w=2 -http://marc.info/?l=full-disclosure&m=111330048629182&w=2 -http://marc.info/?l=full-disclosure&m=111489411524630&w=2 -http://marc.info/?l=full-disclosure&m=111537013104724&w=2 -http://marc.info/?l=full-disclosure&m=111553138007647&w=2 -http://marc.info/?l=full-disclosure&m=111556301530553&w=2 -http://marc.info/?l=full-disclosure&m=111625623909003&w=2 -http://marc.info/?l=full-disclosure&m=111625635716712&w=2 -http://marc.info/?l=full-disclosure&m=112775929608219&w=2 -http://marc.info/?l=full-disclosure&m=113083841308736&w=2 -http://marc.info/?l=full-disclosure&m=113095918810489&w=2 -http://marc.info/?l=full-disclosure&m=113095941031946&w=2 -http://marc.info/?l=full-disclosure&m=113095975721571&w=2 -http://marc.info/?l=full-disclosure&m=113096055302614&w=2 -http://marc.info/?l=full-disclosure&m=113096078606274&w=2 -http://marc.info/?l=full-disclosure&m=113096122630102&w=2 -http://marc.info/?l=full-disclosure&m=113222358007499&w=2 -http://marc.info/?l=full-disclosure&m=113285451031500&w=2 -http://marc.info/?l=full-disclosure&m=113404911919629&w=2 -http://marc.info/?l=full-disclosure&m=113405896025702&w=2 -http://marc.info/?l=full-disclosure&m=113478814326427&w=2 -http://marc.info/?l=full-disclosure&m=113502692010867&w=2 -http://marc.info/?l=full-disclosure&m=113532626203708&w=2 -http://marc.info/?l=full-disclosure&m=113532633229270&w=2 -http://marc.info/?l=full-disclosure&m=113777628702043&w=2 -http://marc.info/?l=full-disclosure&m=113890734603201&w=2 -http://marc.info/?l=full-disclosure&m=113894933522271&w=2 -http://marc.info/?l=full-disclosure&m=113924625825488&w=2 -http://marc.info/?l=full-disclosure&m=113924661724270&w=2 -http://marc.info/?l=full-disclosure&m=113970096305873&w=2 -http://marc.info/?l=full-disclosure&m=114493114031891&w=2 -http://marc.info/?l=full-disclosure&m=114555163911635&w=2 -http://marc.info/?l=full-disclosure&m=114764338702488&w=2 -http://marc.info/?l=full-disclosure&m=115067840426070&w=2 -http://marc.info/?l=full-disclosure&m=115102378824221&w=2 -http://marc.info/?l=full-disclosure&m=115220500707900&w=2 -http://marc.info/?l=full-disclosure&m=115249298204354&w=2 -http://marc.info/?l=full-disclosure&m=115253898206225&w=2 -http://marc.info/?l=full-disclosure&m=115261598510657&w=2 -http://marc.info/?l=full-disclosure&m=115423462216111&w=2 -http://marc.info/?l=full-disclosure&m=115642248226217&w=2 -http://marc.info/?l=full-disclosure&m=115913461828660&w=2 -http://marc.info/?l=full-disclosure&m=116034301209228&w=2 -http://marc.info/?l=full-disclosure&m=116042862409660&w=2 -http://marc.info/?l=full-disclosure&m=116062269104422&w=2 -http://marc.info/?l=full-disclosure&m=116062281632705&w=2 -http://marc.info/?l=full-disclosure&m=116232831525086&w=2 -http://marc.info/?l=full-disclosure&m=116289234522958&w=2 -http://marc.info/?l=full-disclosure&m=116295408114746&w=2 -http://marc.info/?l=full-disclosure&m=116343152030074&w=2 -http://marc.info/?l=full-disclosure&m=117094708423302&w=2 -http://marc.info/?l=full-disclosure&m=117251821622820&w=2 -http://marc.info/?l=full-disclosure&m=117396596027148&w=2 -http://marc.info/?l=full-disclosure&m=117432783011737&w=2 -http://marc.info/?l=full-disclosure&m=117948032428148&w=2 -http://marc.info/?l=full-disclosure&m=117981953312669&w=2 -http://marc.info/?l=full-disclosure&m=117987658110713&w=2 -http://marc.info/?l=full-disclosure&m=118000321419384&w=2 -http://marc.info/?l=full-disclosure&m=118007660813710&w=2 -http://marc.info/?l=full-disclosure&m=118040810718045&w=2 -http://marc.info/?l=full-disclosure&m=118184411720509&w=2 -http://marc.info/?l=full-disclosure&m=118409539009277&w=2 -http://marc.info/?l=full-disclosure&m=119002152126755&w=2 -http://marc.info/?l=full-disclosure&m=119115897930583&w=2 -http://marc.info/?l=full-disclosure&m=119145344606493&w=2 -http://marc.info/?l=full-disclosure&m=119498701505838&w=2 -http://marc.info/?l=full-disclosure&m=119517573408574&w=2 -http://marc.info/?l=full-disclosure&m=119794961212714&w=2 -http://marc.info/?l=full-disclosure&m=119863639428564&w=2 -http://marc.info/?l=full-disclosure&m=120139657100513&w=2 -http://marc.info/?l=full-disclosure&m=122572590212610&w=4 -http://marc.info/?l=full-disclosure&m=124624413120440&w=2 -http://marc.info/?l=full-disclosure&m=124627617220913&w=2 -http://marc.info/?l=full-disclosure&m=126531284626756&w=2 -http://marc.info/?l=full-disclosure&m=131373057621672&w=2 -http://marc.info/?l=full-disclosure&m=132706457510193&w=2 -http://marc.info/?l=full-disclosure&m=132852645911072&w=2 -http://marc.info/?l=ntbugtraq&m=101484975231922&w=2 -http://marc.info/?l=ntbugtraq&m=102020343728766&w=2 -http://marc.info/?l=ntbugtraq&m=102256058220402&w=2 -http://marc.info/?l=ntbugtraq&m=103046138631893&w=2 -http://marc.info/?l=ntbugtraq&m=103470202010570&w=2 -http://marc.info/?l=ntbugtraq&m=104868285106289&w=2 -http://marc.info/?l=ntbugtraq&m=105585001905002&w=2 -http://marc.info/?l=ntbugtraq&m=105838590030409&w=2 -http://marc.info/?l=oss-security&m=125649553414700&w=2 -http://marc.info/?l=php-internals&m=147921016724565&w=2 -http://marc.info/?l=snort-devel&m=114909074311462&w=2 -http://marc.info/?l=squirrelmail-devel&m=119765235203392&w=2 -http://marc.info/?l=vuln-dev&m=102297259123103&w=2 -http://marc.info/?l=vuln-dev&m=102321152215055&w=2 -http://marc.info/?l=vuln-dev&m=105241032526289&w=2 -http://marc.info/?l=vuln-dev&m=107462499927040&w=2 -http://marc.info/?l=vuln-dev&m=114857412916909&w=2 -http://marc.info/?l=vuln-dev&m=99651044701417&w=2 -http://martem.eu/csa/Martem_CSA_Telem_1805184.pdf -http://maxwelldulin.com/BlogPost?post=3236967424 -http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf -http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/ -http://moaxb.blogspot.com/2007/05/moaxb-05-east-wind-software.html -http://mrhinkydink.blogspot.com/2007/12/websense-policy-filtering-bypass.html -http://mrhinkydink.blogspot.com/2010/05/websense-633-via-bypass.html -http://n0sign4l.blogspot.com/2018/08/advisory-id-n0sign4l-002-risk-level-4-5.html?m=1 -http://noahclements.com/Improper-Input-Validation-on-dbell-Smart-Doorbell-Can-Lead-To-Attackers-Remotely-Unlocking-Door/ -http://nobytes.com/exploits/Safari_4.0.4_background_DoS_pl.txt -http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html -http://nvidia.custhelp.com/app/answers/detail/a_id/3618 -http://nvidia.custhelp.com/app/answers/detail/a_id/3634 -http://nvidia.custhelp.com/app/answers/detail/a_id/3763/~/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia -http://nvidia.custhelp.com/app/answers/detail/a_id/4213 -http://nvidia.custhelp.com/app/answers/detail/a_id/4246 -http://nvidia.custhelp.com/app/answers/detail/a_id/4247 -http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html -http://ocert.org/advisories/ocert-2009-013.html -http://ocert.org/advisories/ocert-2014-005.html -http://openwall.com/lists/oss-security/2010/12/02/5 -http://openwall.com/lists/oss-security/2010/12/02/8 -http://openwall.com/lists/oss-security/2010/12/21/4 -http://openwall.com/lists/oss-security/2010/12/22/4 -http://openwall.com/lists/oss-security/2011/01/06/16 -http://openwall.com/lists/oss-security/2011/01/06/7 -http://openwall.com/lists/oss-security/2011/01/27/2 -http://openwall.com/lists/oss-security/2011/01/27/5 -http://openwall.com/lists/oss-security/2011/02/01/1 -http://openwall.com/lists/oss-security/2011/02/03/1 -http://openwall.com/lists/oss-security/2011/02/14/1 -http://openwall.com/lists/oss-security/2011/02/16/7 -http://openwall.com/lists/oss-security/2011/03/25/3 -http://openwall.com/lists/oss-security/2011/12/01/6 -http://openwall.com/lists/oss-security/2012/05/20/2 -http://openwall.com/lists/oss-security/2013/07/11/11 -http://openwall.com/lists/oss-security/2014/01/10/2 -http://openwall.com/lists/oss-security/2014/02/19/10 -http://openwall.com/lists/oss-security/2014/02/19/4 -http://openwall.com/lists/oss-security/2014/04/29/4 -http://openwall.com/lists/oss-security/2014/05/08/1 -http://openwall.com/lists/oss-security/2014/05/25/2 -http://openwall.com/lists/oss-security/2014/07/05/4 -http://openwall.com/lists/oss-security/2014/07/08/16 -http://openwall.com/lists/oss-security/2014/10/15/24 -http://openwall.com/lists/oss-security/2015/05/05/6 -http://openwall.com/lists/oss-security/2017/01/26/2 -http://openwall.com/lists/oss-security/2017/03/06/7 -http://openwall.com/lists/oss-security/2017/03/06/8 -http://openwall.com/lists/oss-security/2017/04/19/6 -http://openwall.com/lists/oss-security/2017/04/24/2 -http://openwall.com/lists/oss-security/2017/05/03/5 -http://openwall.com/lists/oss-security/2017/06/16/4 -http://openwall.com/lists/oss-security/2017/07/11/3 -http://openwall.com/lists/oss-security/2017/08/31/1 -http://openwall.com/lists/oss-security/2017/08/31/2 -http://openwall.com/lists/oss-security/2017/08/31/3 -http://openwall.com/lists/oss-security/2017/09/18/2 -http://openwall.com/lists/oss-security/2017/09/21/2 -http://openwall.com/lists/oss-security/2017/10/13/2 -http://openwall.com/lists/oss-security/2017/11/25/2 -http://openwall.com/lists/oss-security/2017/11/25/3 -http://openwall.com/lists/oss-security/2017/12/21/2 -http://openwall.com/lists/oss-security/2018/05/08/4 -http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog -http://packetstormsecurity.com/files/105610/Ark-2.16-Directory-Traversal.html -http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt -http://packetstormsecurity.com/files/111114/phpMoneyBooks-1.0.2-Local-File-Inclusion.html -http://packetstormsecurity.com/files/111408/Simple-PHP-Agenda-2.2.8-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/112748/Axous-1.1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/112947/Plogger-Photo-Gallery-SQL-Injection.html -http://packetstormsecurity.com/files/115463/WordPress-Quick-Post-Widget-1.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/116277/Symantec-Messaging-Gateway-9.5-Default-SSH-Password.html -http://packetstormsecurity.com/files/116714/Microcart-1.0-Checkout-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/116721/Microcart-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/117894/ZPanel-10.0.1-XSS-CSRF-SQL-Injection.html -http://packetstormsecurity.com/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html -http://packetstormsecurity.com/files/118274/dotProject-2.1.6-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/118281/TrouSerS-Denial-Of-Service.html -http://packetstormsecurity.com/files/118359/Apple-QuickTime-7.7.2-TeXML-Style-Element-font-table-Field-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html -http://packetstormsecurity.com/files/118421/Apple-QuickTime-7.7.2-MIME-Type-Buffer-Overflow.html -http://packetstormsecurity.com/files/118454/Elastix-2.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html -http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html -http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html -http://packetstormsecurity.com/files/119260/Nexpose-Security-Console-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/119422/Quick.Cms-5.0-Quick.Cart-6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119423/Samsung-Kies-2.5.0.12114_1-Buffer-Overflow.html -http://packetstormsecurity.com/files/119543/Security-Notice-For-CA-ARCserve-Backup.html -http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html -http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119739/F5-BIG-IP-11.2.0-SQL-Injection.html -http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119767/iTop-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119805/gpEasy-3.5.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119806/ImageCMS-4.0.0b-SQL-Injection.html -http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120089/WordPress-Wysija-Newsletters-2.2-SQL-Injection.html -http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html -http://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html -http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html -http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html -http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html -http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html -http://packetstormsecurity.com/files/120368/PHP-Fusion-CMS-7.02.05-SQL-Injection.html -http://packetstormsecurity.com/files/120378/WordPress-Marekkis-Watermark-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120379/WordPress-Responsive-Logo-Slideshow-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120423/glFusion-1.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120433/WordPress-Pretty-Link-1.6.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html -http://packetstormsecurity.com/files/120593/Geeklog-1.8.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120594/Airvana-HubBub-C1-600-RT-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html -http://packetstormsecurity.com/files/120611/Hanso-Player-2.1.0-Buffer-Overflow.html -http://packetstormsecurity.com/files/120613/dlinkdsl2740b-bypass.txt -http://packetstormsecurity.com/files/120713/Corel-Quattro-Pro-X6-Standard-Edition-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/120721/McAfee-Vulnerability-Manager-7.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120730/WordPress-Terillion-Reviews-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120746/SWFUpload-Content-Spoofing-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120750/TinyMCE-3.5.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html -http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html -http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html -http://packetstormsecurity.com/files/120788/Drupal-Node-Parameter-Control-6.x-Access-Bypass.html -http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html -http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html -http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html -http://packetstormsecurity.com/files/120862/ViewGit-0.0.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120892/Drupal-Views-7.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120923 -http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html -http://packetstormsecurity.com/files/120976/PsychoStats-3.2.2b-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/120985/Drupal-Zero-Point-7.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/120995/Drupal-Common-Wikis-7.x-Access-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/121030/WordPress-FuneralPress-1.1.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121034/Network-Weathermap-0.97a-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121035/Aspen-0.8-Directory-Traversal.html -http://packetstormsecurity.com/files/121046/WHMCS-Grouppay-1.5-SQL-Injection.html -http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html -http://packetstormsecurity.com/files/121072/Drupal-Chaos-Tool-Suite-7.x-Access-Bypass.html -http://packetstormsecurity.com/files/121091/Radio-CMS-2.2-SQL-Injection.html -http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html -http://packetstormsecurity.com/files/121167/WordPress-Traffic-Analyzer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121202/ZAPms-1.41-SQL-Injection.html -http://packetstormsecurity.com/files/121204/WordPress-Spiffy-XSPF-Player-0.1-SQL-Injection.html -http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121245/RT-Request-Tracker-4.0.10-SQL-Injection.html -http://packetstormsecurity.com/files/121250/WordPress-Spider-Video-Player-2.1-SQL-Injection.html -http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/121303/CMSLogik-1.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121402/Hornbill-Supportworks-ITSM-1.0.0-SQL-Injection.html -http://packetstormsecurity.com/files/121431/WPS-Office-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/121481/b2evolution-4.1.6-SQL-Injection.html -http://packetstormsecurity.com/files/121512/Winarchiver-3.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html -http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121564/UMI.CMS-2.9-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/121616/semtex.c -http://packetstormsecurity.com/files/121623/Joomla-Jnews-8.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html -http://packetstormsecurity.com/files/121643/Exponent-CMS-2.2.0-Beta-3-LFI-SQL-Injection.html -http://packetstormsecurity.com/files/121675/Nginx-1.3.9-1.4.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/121787/MayGion-IP-Camera-Path-Traversal-Buffer-Overflow.html -http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html -http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html -http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html -http://packetstormsecurity.com/files/122174/Xaraya-2.4.0-b1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122223/Xorbin-Digital-Flash-Clock-1.0-For-WordPress-XSS.html -http://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.html -http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html -http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html -http://packetstormsecurity.com/files/122259/WordPress-Category-Grid-View-Gallery-XSS.html -http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html -http://packetstormsecurity.com/files/122314/D-Link-DIR-505L-DIR-826L-Authentication-Bypass.html -http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html -http://packetstormsecurity.com/files/122399/TinyMCE-Image-Manager-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122399/tinymce11-xss.txt -http://packetstormsecurity.com/files/122527/Magnolia-CMS-5.0.1-Community-Edition-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122535/WordPress-Duplicator-0.4.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122547/Alienvault-OSSIM-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html -http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html -http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html -http://packetstormsecurity.com/files/122657/Radio-Thermostat-Of-America-Inc-Lack-Of-Authentication.html -http://packetstormsecurity.com/files/122663/Rite-CMS-1.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122677 -http://packetstormsecurity.com/files/122718/Hikvision-IP-Cameras-Overflow-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/122719/TWSL2013-025.txt -http://packetstormsecurity.com/files/122721 -http://packetstormsecurity.com/files/122735/Trustport-Webfilter-Traversal-File-Disclosure.html -http://packetstormsecurity.com/files/122737/algosec-xss.txt -http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html -http://packetstormsecurity.com/files/122771 -http://packetstormsecurity.com/files/122792/DotNetNuke-DNN-7.1.0-6.2.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/122810/Chasys-Draw-IES-Buffer-Overflow.html -http://packetstormsecurity.com/files/122899/algosec64-xss.txt -http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html -http://packetstormsecurity.com/files/122978 -http://packetstormsecurity.com/files/123036 -http://packetstormsecurity.com/files/123138/realestatephpscript-xss.txt -http://packetstormsecurity.com/files/123193 -http://packetstormsecurity.com/files/123196 -http://packetstormsecurity.com/files/123200/D-Link-DSL-2740B-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/123235 -http://packetstormsecurity.com/files/123303 -http://packetstormsecurity.com/files/123327 -http://packetstormsecurity.com/files/123349 -http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html -http://packetstormsecurity.com/files/123454/ -http://packetstormsecurity.com/files/123455/SimpleRisk-20130915-01-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123476 -http://packetstormsecurity.com/files/123482 -http://packetstormsecurity.com/files/123493/wpseowatcher-exec.txt -http://packetstormsecurity.com/files/123494/wpslimstatex-exec.txt -http://packetstormsecurity.com/files/123533 -http://packetstormsecurity.com/files/123554/ALLPlayer-5.6.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/123558 -http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html -http://packetstormsecurity.com/files/123660/Drupal-Simplenews-6.x-7.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123703/quest-captcha.txt -http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html -http://packetstormsecurity.com/files/123746/PHPCMS-Guestbook-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123747 -http://packetstormsecurity.com/files/123764 -http://packetstormsecurity.com/files/123771/WebCollab-3.30-HTTP-Response-Splitting.html -http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html -http://packetstormsecurity.com/files/123915 -http://packetstormsecurity.com/files/123916 -http://packetstormsecurity.com/files/123929 -http://packetstormsecurity.com/files/123934/Open-Xchange-AppSuite-Script-Insertion.html -http://packetstormsecurity.com/files/123943/FOSCAM-Wireless-IP-Camera-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/123976 -http://packetstormsecurity.com/files/123980/fortianalyzer-xsrf.txt -http://packetstormsecurity.com/files/123986/ALLPlayer-5.6.2-SEH-Buffer-Overflow.html -http://packetstormsecurity.com/files/124022/Dahua-DVR-Authentication-Bypass.html -http://packetstormsecurity.com/files/124035/testa-sql.txt -http://packetstormsecurity.com/files/124054 -http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html -http://packetstormsecurity.com/files/124091/MyBB-Ajaxfs-SQL-Injection.html -http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/124161/ALLPlayer-5.7-Buffer-Overflow.html -http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124200 -http://packetstormsecurity.com/files/124201 -http://packetstormsecurity.com/files/124222 -http://packetstormsecurity.com/files/124239/WordPress-Js-Multi-Hotel-2.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124240 -http://packetstormsecurity.com/files/124274/ISL-Light-Desktop-3.5.4-Information-Disclosure.html -http://packetstormsecurity.com/files/124275/Tftpd32-Client-Side-Format-String.html -http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html -http://packetstormsecurity.com/files/124282 -http://packetstormsecurity.com/files/124283 -http://packetstormsecurity.com/files/124284 -http://packetstormsecurity.com/files/124295/MySQL-5.0.x-Denial-Of-Service.html -http://packetstormsecurity.com/files/124321 -http://packetstormsecurity.com/files/124330/ZippyYum-3.4-Insecure-Data-Storage.html -http://packetstormsecurity.com/files/124343/wpformcraft-sql.txt -http://packetstormsecurity.com/files/124344 -http://packetstormsecurity.com/files/124374/LiveZilla-5.1.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124380/IcoFX-2.5.0.0-Buffer-Overflow.html -http://packetstormsecurity.com/files/124400 -http://packetstormsecurity.com/files/124402 -http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html -http://packetstormsecurity.com/files/124421 -http://packetstormsecurity.com/files/124441/c2cfac-sql.txt -http://packetstormsecurity.com/files/124442 -http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html -http://packetstormsecurity.com/files/124449/Cisco-EPC3925-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/124451 -http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/124513 -http://packetstormsecurity.com/files/124535 -http://packetstormsecurity.com/files/124537 -http://packetstormsecurity.com/files/124554/Java-XML-Signature-Denial-Of-Service-Attack.html -http://packetstormsecurity.com/files/124563 -http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html -http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure.html -http://packetstormsecurity.com/files/124587/WordPress-Recommend-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124598/JForum-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/124609/cfme_manageiq_evm_pass_reset.rb.txt -http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html -http://packetstormsecurity.com/files/124624 -http://packetstormsecurity.com/files/124652 -http://packetstormsecurity.com/files/124658 -http://packetstormsecurity.com/files/124681/Hiox-Guest-Book-5.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124682 -http://packetstormsecurity.com/files/124685 -http://packetstormsecurity.com/files/124688/Seagate-BlackArmor-NAS-sg2000-2000.1331-Remote-Command-Execution.html -http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html -http://packetstormsecurity.com/files/124711 -http://packetstormsecurity.com/files/124723/uaepdshopping-sql.txt -http://packetstormsecurity.com/files/124724/cspmysql-sql.txt -http://packetstormsecurity.com/files/124753/eventbookingcalendar-xssxsrfsql.txt -http://packetstormsecurity.com/files/124755 -http://packetstormsecurity.com/files/124773/SoapUI-Remote-Code-Execution.html -http://packetstormsecurity.com/files/124777/Collabtive-1.1-SQL-Injection.html -http://packetstormsecurity.com/files/124800/Y-Toolbar-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124801 -http://packetstormsecurity.com/files/124803/Drupal-Anonymous-Posting-7.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124804/Ajenti-1.2.13-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124886 -http://packetstormsecurity.com/files/124914 -http://packetstormsecurity.com/files/124918 -http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/124933 -http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html -http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt -http://packetstormsecurity.com/files/124955/Mp3info-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/124965/Mozilla-Thunderbird-Filter-Bypass.html -http://packetstormsecurity.com/files/124967 -http://packetstormsecurity.com/files/124986/WordPress-Photocrati-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/125007 -http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html -http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/125059 -http://packetstormsecurity.com/files/125062 -http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html -http://packetstormsecurity.com/files/125078 -http://packetstormsecurity.com/files/125079 -http://packetstormsecurity.com/files/125089 -http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html -http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html -http://packetstormsecurity.com/files/125308/Catia-V5-6R2013-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/125325/Catia-V5-6R2013-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/125348/ATutor-2.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html -http://packetstormsecurity.com/files/125353/CMSMadeSimple-1.11.10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/125361 -http://packetstormsecurity.com/files/125379 -http://packetstormsecurity.com/files/125397 -http://packetstormsecurity.com/files/125438/Piwigo-2.6.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/125454 -http://packetstormsecurity.com/files/125464 -http://packetstormsecurity.com/files/125480 -http://packetstormsecurity.com/files/125495 -http://packetstormsecurity.com/files/125496 -http://packetstormsecurity.com/files/125497 -http://packetstormsecurity.com/files/125507 -http://packetstormsecurity.com/files/125513 -http://packetstormsecurity.com/files/125519/ALLPlayer-5.8.1-Buffer-Overflow.html -http://packetstormsecurity.com/files/125585/ownCloud-4.0.x-4.5.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/125723/MicroP-0.1.1.1600-Buffer-Overflow.html -http://packetstormsecurity.com/files/125726 -http://packetstormsecurity.com/files/125732/Joomla-Youtube-Gallery-3.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/125734 -http://packetstormsecurity.com/files/125735 -http://packetstormsecurity.com/files/125737 -http://packetstormsecurity.com/files/125738 -http://packetstormsecurity.com/files/125766 -http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html -http://packetstormsecurity.com/files/125786/MP3Info-0.8.5-SEH-Buffer-Overflow.html -http://packetstormsecurity.com/files/125834 -http://packetstormsecurity.com/files/125849/Deutsche-Telekom-CERT-Advisory-DTC-A-20140324-001.html -http://packetstormsecurity.com/files/125866/Katello-Red-Hat-Satellite-users-update_roles-Missing-Authorization.html -http://packetstormsecurity.com/files/125889 -http://packetstormsecurity.com/files/125959 -http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html -http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html -http://packetstormsecurity.com/files/126127 -http://packetstormsecurity.com/files/126134 -http://packetstormsecurity.com/files/126171/Xerox-DocuShare-SQL-Injection.html -http://packetstormsecurity.com/files/126187/Ektron-CMS-8.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126216/Jzip-2.0.0.132900-Buffer-Overflow.html -http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html -http://packetstormsecurity.com/files/126226/vBulletin-5.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126306/Acunetix-8-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/126307/Acunetix-8-Scanner-Buffer-Overflow.html -http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html -http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/126332/Kolibri-2.0-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/126426/Beetel-450TC2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/126550/VM-Turbo-Operations-Manager-4.5.x-Directory-Traversal.html -http://packetstormsecurity.com/files/126553/Cobbler-Local-File-Inclusion.html -http://packetstormsecurity.com/files/126564/VLC-Player-2.1.3-Memory-Corruption.html -http://packetstormsecurity.com/files/126596/SpiceWorks-7.2.00174-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126613/klite1045-corrupt.txt -http://packetstormsecurity.com/files/126614/Easy-File-Sharing-Web-Server-6.8-Buffer-Overflow.html -http://packetstormsecurity.com/files/126635/Aleph-500-SQL-Injection.html -http://packetstormsecurity.com/files/126636 -http://packetstormsecurity.com/files/126637 -http://packetstormsecurity.com/files/126640/Intel-Ideo-Video-4.5-Memory-Corruption.html -http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126651/Torque-2.5.13-Buffer-Overflow.html -http://packetstormsecurity.com/files/126654/Aleph-500-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126697/PHP-Nuke-Web-Links-SQL-Injection.html -http://packetstormsecurity.com/files/126701 -http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126735/flyingcart-xss.txt -http://packetstormsecurity.com/files/126739/BSS-Continuity-CMS-4.2.22640.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/126740/BSS-Continuity-CMS-4.2.22640.0-Code-Execution.html -http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html -http://packetstormsecurity.com/files/126763/WordPress-Simple-Popup-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html -http://packetstormsecurity.com/files/126768/Dotclear-2.6.2-SQL-Injection.html -http://packetstormsecurity.com/files/126781/WordPress-Conversion-Ninja-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126782/wpbib2html-xss.txt -http://packetstormsecurity.com/files/126788/RSA-Archer-GRC-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126803/phpnuke83news-sql.txt -http://packetstormsecurity.com/files/126812/Zyxel-P-660HW-T1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/126813/Splunk-6.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html -http://packetstormsecurity.com/files/126844/HandsomeWeb-SOS-Webpages-1.1.11-Backup-Hash-Disclosure.html -http://packetstormsecurity.com/files/126847/InterScan-Messaging-Security-Virtual-Appliance-8.5.1.1516-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html -http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html -http://packetstormsecurity.com/files/126855/TORQUE-Resource-Manager-2.5.13-Buffer-Overflow.html -http://packetstormsecurity.com/files/126856/Fiyo-CMS-1.5.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html -http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html -http://packetstormsecurity.com/files/126861/webEdition-CMS-2.8.0.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/126862/webEdition-CMS-6.3.8.0-svn6985-SQL-Injection.html -http://packetstormsecurity.com/files/126866/Videos-Tube-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html -http://packetstormsecurity.com/files/126870/Pixie-CMS-1.04-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html -http://packetstormsecurity.com/files/126882/Xilisoft-Video-Converter-Ultimate-7.8.1-build-20140505-DLL-Hijacking.html -http://packetstormsecurity.com/files/126883/DCMTK-Privilege-Escalation.html -http://packetstormsecurity.com/files/126887/s3dvt-Privilege-Escalation.html -http://packetstormsecurity.com/files/126897/RSA-Adaptive-Authentication-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126902/FCKeditor-2.6.10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126907/Transform-Foundation-Server-4.3.1-5.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126909/ImpressCMS-1.3.6.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126940/IBM-DB2-Privilege-Escalation.html -http://packetstormsecurity.com/files/126947/EMC-Documentum-Digital-Asset-Manager-Blind-DQL-Injection.html -http://packetstormsecurity.com/files/126948/IPSwitch-IMail-12.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126949/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/126953/DevExpress-ASP.NET-File-Manager-13.2.8-Directory-Traversal.html -http://packetstormsecurity.com/files/126956/Cloudera-Manager-4.8.2-5.0.0-Information-Disclosure.html -http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html -http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html -http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html -http://packetstormsecurity.com/files/126986/SAP-SLD-Information-Tampering.html -http://packetstormsecurity.com/files/126994/SpiceWorks-IT-Ticketing-System-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127001/AlogoSec-FireFlow-6.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127003/Xornic-Contact-Us-Form-CAPTCHA-Bypass-XSS.html -http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html -http://packetstormsecurity.com/files/127005/ZeroCMS-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/127006/eFront-3.6.14.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127043/ntop-xss.txt -http://packetstormsecurity.com/files/127044/Openfiler-NAS-SAN-Appliance-2.99-XSS-Traversal-Command-Injection.html -http://packetstormsecurity.com/files/127047/Oracle-Access-Manager-Information-Disclosure.html -http://packetstormsecurity.com/files/127050/HAM3D-Shop-Engine-CMS-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127067/IBM-AIX-6.1.8-Privilege-Escalation.html -http://packetstormsecurity.com/files/127074/SHOUTcast-DNAS-2.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127075/Core-FTP-LE-2.2-Heap-Overflow.html -http://packetstormsecurity.com/files/127081/Yealink-VoIP-Phones-XSS-CRLF-Injection.html -http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html -http://packetstormsecurity.com/files/127088/Asterisk-Project-Security-Advisory-AST-2014-006.html -http://packetstormsecurity.com/files/127089/Asterisk-Project-Security-Advisory-AST-2014-007.html -http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html -http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html -http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html -http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html -http://packetstormsecurity.com/files/127098/ClipBucket-CMS-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127113/Adobe-Reader-for-Android-addJavascriptInterface-Exploit.html -http://packetstormsecurity.com/files/127128/BarracudaDrive-6.7.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html -http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html -http://packetstormsecurity.com/files/127148/Dolphin-7.1.4-SQL-Injection.html -http://packetstormsecurity.com/files/127152/Ericom-AccessNow-Server-Buffer-Overflow.html -http://packetstormsecurity.com/files/127164/ZeroCMS-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/127177/User-Friendly-SVN-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/127188/Lunar-CMS-3.3-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127192/TimThumb-2.8.13-Remote-Code-Execution.html -http://packetstormsecurity.com/files/127196/ZeusCart-4.x-Remote-SQL-Injection.html -http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html -http://packetstormsecurity.com/files/127221/Storesprite-7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127222/Endeca-Latitude-2.2.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/127223/Endeca-Latitude-2.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127227/G-Data-TotalProtection-2014-Code-Execution.html -http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127238/WordPress-Simple-Share-Buttons-Adder-4.4-CSRF-XSS.html -http://packetstormsecurity.com/files/127239/HP-Enterprise-Maps-1.00-Authenticated-XXE-Injection.html -http://packetstormsecurity.com/files/127244/Thomson-TWG87OUIR-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/127245/MS13-097-Registry-Symlink-IE-Sandbox-Escape.html -http://packetstormsecurity.com/files/127246/MS14-009-.NET-Deployment-Service-IE-Sandbox-Escape.html -http://packetstormsecurity.com/files/127247/HP-AutoPass-License-Server-File-Upload.html -http://packetstormsecurity.com/files/127262/ZeroCMS-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127280/Reportico-Admin-Credential-Leak.html -http://packetstormsecurity.com/files/127281/Gitlist-0.4.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/127284/openSIS-5.3-SQL-Injection.html -http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127288/WordPress-ml-slider-2.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127289/WordPress-Bannerman-0.2.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127290/WordPress-Blogstand-Smart-Banner-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127291/WordPress-Custom-Banners-1.2.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127292/WordPress-Random-Banner-1.1.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127293/WordPress-Easy-Banners-1.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127294 -http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127301/EMC-Network-Configuration-Manager-NCM-Session-Fixation.html -http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html -http://packetstormsecurity.com/files/127309/EMC-Documentum-eRoom-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127320/Kerio-Control-8.3.1-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/127321/EMC-Documentum-eRoom-Stored-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127329/Ntop-NG-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127330/OpenDocMan-1.2.7.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html -http://packetstormsecurity.com/files/127359/Android-OS-Authorization-Missing.html -http://packetstormsecurity.com/files/127364/Gitlist-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/127365/Oracle-Event-Processing-FileUploadServlet-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html -http://packetstormsecurity.com/files/127370/xClassified-1.2-SQL-Injection.html -http://packetstormsecurity.com/files/127371/Atom-CMS-Shell-Upload-SQL-Injection.html -http://packetstormsecurity.com/files/127372/Joomla-JChatSocial-2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html -http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html -http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html -http://packetstormsecurity.com/files/127404/OctavoCMS-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127407/WordPress-BSK-PDF-Manager-1.3.2-SQL-Injection.html -http://packetstormsecurity.com/files/127410/Infoblox-6.8.4.x-Weak-MySQL-Password.html -http://packetstormsecurity.com/files/127427/D-Link-HNAP-Request-Remote-Buffer-Overflow.html -http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html -http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html -http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html -http://packetstormsecurity.com/files/127460/OpenCart-1.5.6.4-PHP-Object-Injection.html -http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127497/Joomla-Youtube-Gallery-4.1.7-SQL-Injection.html -http://packetstormsecurity.com/files/127499/e107-2.0-alpha2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html -http://packetstormsecurity.com/files/127523/Omeka-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127525/Raritan-PowerIQ-Unauthenticated-SQL-Injection.html -http://packetstormsecurity.com/files/127532/Tenable-Nessus-5.2.7-Parameter-Tampering-Authentication-Bypass.html -http://packetstormsecurity.com/files/127533/WordPress-Gallery-Objects-0.4-SQL-Injection.html -http://packetstormsecurity.com/files/127535/Microsoft-XP-SP3-BthPan.sys-Arbitrary-Write-Privilege-Escalation.html -http://packetstormsecurity.com/files/127536/Microsoft-XP-SP3-MQAC.sys-Arbitrary-Write-Privilege-Escalation.html -http://packetstormsecurity.com/files/127537/vBulletin-5.1.2-SQL-Injection.html -http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html -http://packetstormsecurity.com/files/127544/ACME-micro_httpd-Denial-Of-Service.html -http://packetstormsecurity.com/files/127545/MyConnection-Server-MCS-9.7i-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127568/EventLog-Analyzer-9.0-Build-9000-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html -http://packetstormsecurity.com/files/127594/E2-2844-SQL-Injection.html -http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/127615/Pligg-2.0.1-SQL-Injection-Command-Execution.html -http://packetstormsecurity.com/files/127616/Ubiquiti-UbiFi-Controller-2.4.5-Password-Hash-Disclosure.html -http://packetstormsecurity.com/files/127622/Easy-File-Sharing-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127623/Zenoss-Monitoring-System-4.2.5-2108-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127624/Moodle-2.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127634/ZeroCMS-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127639 -http://packetstormsecurity.com/files/127640/WordPress-Lead-Octopus-Power-SQL-Injection.html -http://packetstormsecurity.com/files/127642/DirPHP-1.0-Local-File-Inclusion.html -http://packetstormsecurity.com/files/127651/Android-SDK-SQL-Injection.html -http://packetstormsecurity.com/files/127652/Oxwall-1.7.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html -http://packetstormsecurity.com/files/127666/SAP-HANA-XS-Missing-Encryption.html -http://packetstormsecurity.com/files/127667/SAP-HANA-IU5-SDK-Authentication-Bypass.html -http://packetstormsecurity.com/files/127669/SAP-FI-Manager-Self-Service-Hardcoded-Username.html -http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127671/SAP-Netweaver-Business-Warehouse-Missing-Authorization.html -http://packetstormsecurity.com/files/127672/Lyris-ListManagerWeb-8.95a-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127683/Joomla-Kunena-Forum-3.0.5-SQL-Injection.html -http://packetstormsecurity.com/files/127684/joomlakunena305-xss.txt -http://packetstormsecurity.com/files/127690/SkaDate-Lite-2.0-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127701/Free-Reprintables-ArticleFR-11.06.2014-Improper-Access-Control.html -http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html -http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html -http://packetstormsecurity.com/files/127723/WordPress-SI-CAPTCHA-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127724/WordPress-Gamespeed-Theme-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127740/Barracuda-WAF-Authentication-Bypass.html -http://packetstormsecurity.com/files/127769/Crescendo-Sales-CRM-SQL-Injection.html -http://packetstormsecurity.com/files/127770/WordPress-WPSS-0.62-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127771/WordPress-WPSS-0.62-SQL-Injection.html -http://packetstormsecurity.com/files/127772/Symantec-Endpoint-Protection-11.x-12.x-Kernel-Pool-Overflow.html -http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html -http://packetstormsecurity.com/files/127777/Feng-Office-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/127827/Espo-CRM-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127829/IBM-Sametime-Meet-Server-8.5-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/127830/IBM-Sametime-Meet-Server-8.5-Password-Disclosure.html -http://packetstormsecurity.com/files/127831/IBM-Sametime-Meet-Server-8.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127833/WordPress-GB-Gallery-Slideshow-1.5-SQL-Injection.html -http://packetstormsecurity.com/files/127843/Opendaylight-1.0-Local-File-Inclusion-Remote-File-Inclusion.html -http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127850 -http://packetstormsecurity.com/files/127850/BlackBerry-Z10-Authentication-Bypass.html -http://packetstormsecurity.com/files/127851/Ganeti-Insecure-Archive-Permission.html -http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127854/Jamroom-5.2.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127864/VMTurbo-Operations-Manager-4.6-vmtadmin.cgi-Remote-Command-Execution.html -http://packetstormsecurity.com/files/127866/SAS-Visual-Analytics-6.4M1-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html -http://packetstormsecurity.com/files/127912/Senkas-Kolibri-WebServer-2.0-Buffer-Overflow.html -http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html -http://packetstormsecurity.com/files/127929/Apache-OFBiz-11.04.04-12.04.03-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html -http://packetstormsecurity.com/files/127943/ArticleFR-3.0.4-SQL-Injection.html -http://packetstormsecurity.com/files/127946/Webasyst-Shop-Script-5.2.2.30933-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127948/Panda-Security-2014-Privilege-Escalation.html -http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html -http://packetstormsecurity.com/files/127973/ManageEngine-Password-Manager-MetadataServlet.dat-SQL-Injection.html -http://packetstormsecurity.com/files/127978/Fatt-Free-CRM-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/127997/VTLS-Virtua-SQL-Injection.html -http://packetstormsecurity.com/files/128003/Grand-MA-300-Fingerprint-Reader-Weak-PIN-Verification.html -http://packetstormsecurity.com/files/128005/RSA-Identity-Management-And-Governance-Authentication-Bypass.html -http://packetstormsecurity.com/files/128012/ManageEngine-EventLog-Analyzer-7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html -http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html -http://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-Inclusion.html -http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html -http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html -http://packetstormsecurity.com/files/128064/MX-SmartTimer-13.18.5.11-SQL-Injection.html -http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html -http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html -http://packetstormsecurity.com/files/128118/WordPress-Huge-IT-Image-Gallery-1.0.0-SQL-Injection.html -http://packetstormsecurity.com/files/128121/LogAnalyzer-3.6.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html -http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-Information-Disclosure-SQL-Injection.html -http://packetstormsecurity.com/files/128137/WordPress-Advanced-Access-Manager-2.8.2-File-Write-Code-Execution.html -http://packetstormsecurity.com/files/128140/MyWebSQL-3.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128141/BlackCat-CMS-1.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html -http://packetstormsecurity.com/files/128179/PhpOnlineChat-3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128180/JobScheduler-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128181/JobScheduler-XML-eXternal-Entity-Injection.html -http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html -http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html -http://packetstormsecurity.com/files/128213/Airties-Air6372SO-Modem-Web-Interface-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html -http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html -http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html -http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html -http://packetstormsecurity.com/files/128285/OsClass-3.4.1-Local-File-Inclusion.html -http://packetstormsecurity.com/files/128286/OsClass-3.4.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128293/Livefyre-LiveComments-3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128296/ClassApps-SelectSurvey.net-4.124.004-SQL-Injection.html -http://packetstormsecurity.com/files/128301/webEdition-6.3.8.0-Path-Traversal.html -http://packetstormsecurity.com/files/128302/MODX-Revolution-2.3.1-pl-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128320/Nokia-Asha-501-Lock-Bypass.html -http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/128335/Exponent-CMS-2.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128336/Your-Online-Shop-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128337 -http://packetstormsecurity.com/files/128338/OKCupid-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128342/KonaKart-Storefront-Application-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html -http://packetstormsecurity.com/files/128352/X2Engine-4.1.7-PHP-Object-Injection.html -http://packetstormsecurity.com/files/128353/X2Engine-4.1.7-Unrestricted-File-Upload.html -http://packetstormsecurity.com/files/128382/Suricata-2.0.3-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html -http://packetstormsecurity.com/files/128414/Telerik-ASP.NET-AJAX-RadEditor-Control-2014.1.403.35-XSS.html -http://packetstormsecurity.com/files/128419/All-In-One-WP-Security-3.8.2-SQL-Injection.html -http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html -http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/128455/Openfiler-2.99.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html -http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html -http://packetstormsecurity.com/files/128480/Bacula-web-5.2.10-SQL-Injection.html -http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html -http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html -http://packetstormsecurity.com/files/128485/Moab-Insecure-Message-Signing-Authentication-Bypass.html -http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html -http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html -http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128519/Textpattern-4.5.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128521/TestLink-1.9.11-SQL-Injection.html -http://packetstormsecurity.com/files/128525/WordPress-Content-Audit-1.6-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html -http://packetstormsecurity.com/files/128532/HTTP-File-Server-2.3a-2.3b-2.3c-Remote-Command-Execution.html -http://packetstormsecurity.com/files/128550/ZyXEL-SBG-3300-Security-Gateway-Denial-Of-Service.html -http://packetstormsecurity.com/files/128551/ZyXEL-SBG-3300-Security-Gateway-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html -http://packetstormsecurity.com/files/128564/Epicor-Procurement-SQL-Injection.html -http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html -http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html -http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html -http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html -http://packetstormsecurity.com/files/128579/Nessus-Web-UI-2.3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html -http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html -http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html -http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128600/SAP-Business-Objects-Denial-Of-Service-Via-CORBA.html -http://packetstormsecurity.com/files/128601/SAP-Business-Objects-Information-Disclosure-Via-CORBA.html -http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128603/SAP-Business-Warehouse-Missing-Authorization-Check.html -http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128623/Twiki-Perl-Code-Execution.html -http://packetstormsecurity.com/files/128625/WordPress-Contact-Form-DB-2.8.13-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128626/WordPress-Google-Calendar-Events-2.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128633/SAP-BusinessObjects-Explorer-14.0.5-XXE-Injection.html -http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html -http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/128668/YourMembers-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/128671/Tenda-A32-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/128674/Microsoft-Bluetooth-Personal-Area-Networking-BthPan.sys-Privilege-Escalation.html -http://packetstormsecurity.com/files/128691/vBulletin-5.x-4.x-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128693/WordPress-MaxButtons-1.26.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128694/WordPress-WP-Google-Maps-6.0.26-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128696/vBulletin-4.x-SQL-Injection.html -http://packetstormsecurity.com/files/128718/OpenX-2.8.10-Open-Redirect.html -http://packetstormsecurity.com/files/128720/Drupal-7.X-SQL-Injection.html -http://packetstormsecurity.com/files/128721/Drupal-7.31-SQL-Injection.html -http://packetstormsecurity.com/files/128725/Megapolis.Portal-Manager-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html -http://packetstormsecurity.com/files/128739/Hamster-Free-ZIP-Archiver-2.0.1.7-DLL-Hijacking.html -http://packetstormsecurity.com/files/128741/Drupal-HTTP-Parameter-Key-Value-SQL-Injection.html -http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html -http://packetstormsecurity.com/files/128749/Newtelligence-dasBlog-2.3-Open-Redirect.html -http://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html -http://packetstormsecurity.com/files/128768/LiteCart-1.1.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128785/WordPress-Database-Manager-2.7.1-Command-Injection-Credential-Leak.html -http://packetstormsecurity.com/files/128799 -http://packetstormsecurity.com/files/128806/iBackup-10.0.0.32-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/128814/WordPress-CP-Multi-View-Event-Calendar-1.01-SQL-Injection.html -http://packetstormsecurity.com/files/128819/ElectricCommander-4.2.4.71224-Privilege-Escalation.html -http://packetstormsecurity.com/files/128824/TestLink-1.9.12-Path-Disclosure.html -http://packetstormsecurity.com/files/128841/EMC-NetWorker-Module-For-MEDITECH-NMMEDI-Information-Disclosure.html -http://packetstormsecurity.com/files/128842/EMC-Avamar-Weak-Password-Storage.html -http://packetstormsecurity.com/files/128843/EMC-Avamar-Sensitive-Information-Disclosure.html -http://packetstormsecurity.com/files/128850/VMware-Security-Advisory-2014-0011.html -http://packetstormsecurity.com/files/128851/WordPress-HTML5-Flash-Player-SQL-Injection.html -http://packetstormsecurity.com/files/128852/WordPress-Download-Manager-Arbitrary-File-Download.html -http://packetstormsecurity.com/files/128853/Filemaker-Login-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/128854/vBulletin-4.x-Tapatalk-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html -http://packetstormsecurity.com/files/128868/ESTsoft-ALUpdate-8.5.1.0.0-Privilege-Escalation.html -http://packetstormsecurity.com/files/128874/ESET-7.0-Kernel-Memory-Leak.html -http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html -http://packetstormsecurity.com/files/128904/ASUS-Router-Man-In-The-Middle.html -http://packetstormsecurity.com/files/128907/Confluence-RefinedWiki-Original-Theme-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128909/Nuevolabs-Nuevoplayer-For-Clipshare-SQL-Injection.html -http://packetstormsecurity.com/files/128915/F5-Big-IP-11.3.0.39.0-XML-External-Entity-Injection-1.html -http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html -http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html -http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html -http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html -http://packetstormsecurity.com/files/128958/vBulletin-4.2.1-Open-Redirect.html -http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_replace-PHP-Code-Execution.html -http://packetstormsecurity.com/files/128972/FreeBSD-Security-Advisory-sshd-Denial-Of-Service.html -http://packetstormsecurity.com/files/128975/Softing-FG-100-PB-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128976/Softing-FG-100-PB-Hardcoded-Backdoor.html -http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html -http://packetstormsecurity.com/files/128978/Forma-Lms-1.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/128979/HelpDEZk-1.0.1-Unrestricted-File-Upload.html -http://packetstormsecurity.com/files/128986/RSA-Web-Threat-Detection-SQL-Injection.html -http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html -http://packetstormsecurity.com/files/128996/ManageEngine-EventLog-Analyzer-SQL-Credential-Disclosure.html -http://packetstormsecurity.com/files/129009/JExperts-Tecnologia-Channel-Software-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129010/JExperts-Tecnologia-Channel-Software-Privilege-Escalation.html -http://packetstormsecurity.com/files/129015/ZTE-ZXDSL-831CII-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html -http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129020/OX-App-Suite-7.6.0-SQL-Injection.html -http://packetstormsecurity.com/files/129034/Apache-Qpid-0.30-Induced-HTTP-Requests.html -http://packetstormsecurity.com/files/129035/Another-WordPress-Classifieds-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html -http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html -http://packetstormsecurity.com/files/129041 -http://packetstormsecurity.com/files/129042/Anchor-CMS-0.9.2-Header-Injection.html -http://packetstormsecurity.com/files/129052/Progress-OpenEdge-11.2-Directory-Traversal.html -http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html -http://packetstormsecurity.com/files/129082/Monstra-3.0.1-Bruteforce-Mitigation-Bypass.html -http://packetstormsecurity.com/files/129083/SAP-GRC-Bypass-Privilege-Escalation-Program-Execution.html -http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html -http://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html -http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/129090/PHPMemcachedAdmin-1.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html -http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/129103/WordPress-SupportEzzy-Ticket-System-1.2.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129104/phpSound-Music-Sharing-Platform-1.0.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129108/Digi-Online-Examination-System-2.0-Shell-Upload.html -http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/129111/OSSEC-2.8-Privilege-Escalation.html -http://packetstormsecurity.com/files/129112/Pandora-FMS-5.1SP1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129114/Atlas-Systems-Aeon-3.5-3.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html -http://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129129/Proticaret-E-Commerce-Script-3.0-SQL-Injection.html -http://packetstormsecurity.com/files/129133/Nibbleblog-4.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129134/XOOPS-2.5.6-SQL-Injection.html -http://packetstormsecurity.com/files/129135/Maarch-LetterBox-2.8-Insecure-Cookie-Handling.html -http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html -http://packetstormsecurity.com/files/129139/ZTE-ZXHN-H108L-Access-Bypass.html -http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html -http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/129153/PHPFox-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html -http://packetstormsecurity.com/files/129156/tcpdump-4.6.2-Geonet-Denial-Of-Service.html -http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html -http://packetstormsecurity.com/files/129162/Snowfox-CMS-1.0-Open-Redirect.html -http://packetstormsecurity.com/files/129164/Snowfox-CMS-1.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/129171/Joomla-Simple-Email-Form-1.8.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129172/Faronics-Deep-Freeze-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/129175/Dolibarr-ERP-And-CRM-3.5.3-SQL-Injection.html -http://packetstormsecurity.com/files/129183/WordPress-CM-Download-Manager-2.0.0-Code-Injection.html -http://packetstormsecurity.com/files/129187/Hikvision-DVR-RTSP-Request-Remote-Code-Execution.html -http://packetstormsecurity.com/files/129189/Paid-Memberships-Pro-1.7.14.2-Path-Traversal.html -http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129212/WordPress-SP-Client-Document-Manager-2.4.1-SQL-Injection.html -http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html -http://packetstormsecurity.com/files/129227/TP-Link-TL-WR740N-Denial-Of-Service.html -http://packetstormsecurity.com/files/129229/RobotStats-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/129230/RobotStats-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129232/WordPress-wpDataTables-1.5.3-SQL-Injection.html -http://packetstormsecurity.com/files/129234/CodeMeter-Weak-Service-Permissions.html -http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html -http://packetstormsecurity.com/files/129262/TRENDnet-SecurView-Wireless-Network-Camera-TV-IP422WN-Buffer-Overflow.html -http://packetstormsecurity.com/files/129281/Android-Settings-Pendingintent-Leak.html -http://packetstormsecurity.com/files/129282/Android-SMS-Resend.html -http://packetstormsecurity.com/files/129283/Android-WAPPushManager-SQL-Injection.html -http://packetstormsecurity.com/files/129285/WordPress-Sexy-Squeeze-Pages-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129286/WordPress-Html5-Mp3-Player-Full-Path-Disclosure.html -http://packetstormsecurity.com/files/129290/WordPress-Ad-Manager-1.1.2-Open-Redirect.html -http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html -http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html -http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html -http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/129323/CCH-Wolters-Kluwer-PFX-Engagement-7.1-Privilege-Escalation.html -http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html -http://packetstormsecurity.com/files/129349/IBM-Endpoint-Manager-For-Mobile-Devices-Code-Execution.html -http://packetstormsecurity.com/files/129357/WordPress-CM-Download-Manager-2.0.6-XSS-CSRF.html -http://packetstormsecurity.com/files/129372/Altitude-uAgent-Altitude-uCI-7.5-XSS.html -http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html -http://packetstormsecurity.com/files/129376/EMC-Documentum-Content-Server-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html -http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html -http://packetstormsecurity.com/files/129395/Cart66-Lite-WordPress-Ecommerce-1.5.1.17-SQL-Injection.html -http://packetstormsecurity.com/files/129403/OpenEMR-4.1.2-7-SQL-Injection.html -http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html -http://packetstormsecurity.com/files/129440/Humhub-0.10.0-rc.1-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/129443/goYWP-WebPress-13.00.06-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129445/phpTrafficA-2.3-SQL-Injection.html -http://packetstormsecurity.com/files/129446/Concrete5-CMS-5.7.2-5.7.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129451/ClassAd-3.0-SQL-Injection.html -http://packetstormsecurity.com/files/129454/PingFederate-6.10.1-SP-Endpoints-Open-Redirect.html -http://packetstormsecurity.com/files/129455/VMware-Security-Advisory-2014-0013.html -http://packetstormsecurity.com/files/129465/SGI-Tempo-vx-Setuid-Privilege-Escalation.html -http://packetstormsecurity.com/files/129470/K7-Computing-Multiple-Products-Null-Pointer-Dereference.html -http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html -http://packetstormsecurity.com/files/129474/K7-Computing-Multiple-Products-K7FWFilt.sys-Privilege-Escalation.html -http://packetstormsecurity.com/files/129499/WordPress-Our-Team-Showcase-1.2-CSRF-XSS.html -http://packetstormsecurity.com/files/129500/WordPress-IP-Ban-1.2.3-CSRF-XSS.html -http://packetstormsecurity.com/files/129501/WordPress-WP-ViperGB-1.3.10-CSRF-XSS.html -http://packetstormsecurity.com/files/129502/WordPress-Simple-Visitor-Stat-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129503/WordPress-Simple-Sticky-Footer-1.3.2-CSRF-XSS.html -http://packetstormsecurity.com/files/129506/WordPress-Facebook-Like-Box-2.8.2-CSRF-XSS.html -http://packetstormsecurity.com/files/129507 -http://packetstormsecurity.com/files/129509 -http://packetstormsecurity.com/files/129510/WordPress-Timed-Popup-1.3-CSRF-XSS.html -http://packetstormsecurity.com/files/129512/W3-Total-Cache-0.9.4-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/129575/WordPress-DandyID-Services-ID-1.5.9-CSRF-XSS.html -http://packetstormsecurity.com/files/129576/WordPress-iTwitter-WP-0.04-CSRF-XSS.html -http://packetstormsecurity.com/files/129577/Mikiurl-WordPress-Eklentisi-2.0-CSRF-XSS.html -http://packetstormsecurity.com/files/129578/WordPress-O2Tweet-0.0.4-CSRF-XSS.html -http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.html -http://packetstormsecurity.com/files/129580/WordPress-SPNbabble-1.4.1-CSRF-XSS.html -http://packetstormsecurity.com/files/129581/WordPress-wpCommentTwit-0.5-CSRF-XSS.html -http://packetstormsecurity.com/files/129582/WordPress-yURL-ReTwitt-WP-1.4-CSRF-XSS.html -http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html -http://packetstormsecurity.com/files/129586/CMS-Papoo-6.0.0-Revision-4701-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129590/Intrexx-Professional-6.0-5.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129609/D-Link-DCS-2103-Brute-Force-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129613/SAP-Business-Objects-Search-Token-Privilege-Escalation.html -http://packetstormsecurity.com/files/129619/vBulletin-Moderator-Control-Panel-4.2.2-CSRF.html -http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html -http://packetstormsecurity.com/files/129622/Revive-Adserver-3.0.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129623/WordPress-Bird-Feeder-1.2.3-CSRF-XSS.html -http://packetstormsecurity.com/files/129624/Morfy-CMS-1.05-Remote-Command-Execution.html -http://packetstormsecurity.com/files/129626/W3-Total-Cache-0.9.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129637/WordPress-gSlideShow-0.1-CSRF-XSS.html -http://packetstormsecurity.com/files/129638/WordPress-PictoBrowser-0.3.1-CSRF-XSS.html -http://packetstormsecurity.com/files/129639/WordPress-Twitter-0.7-CSRF-XSS.html -http://packetstormsecurity.com/files/129640/WordPress-PWG-Random-1.11-CSRF-XSS.html -http://packetstormsecurity.com/files/129641/WordPress-Simplelife-1.2-CSRF-XSS.html -http://packetstormsecurity.com/files/129642/WordPress-SimpleFlickr-3.0.3-CSRF-XSS.html -http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129644/WordPress-Twitter-LiveBlog-1.1.2-CSRF-XSS.html -http://packetstormsecurity.com/files/129645/WordPress-TweetScribe-1.1-CSRF-XSS.html -http://packetstormsecurity.com/files/129646/WordPress-WP-Unique-Article-Header-Image-1.0-CSRF-XSS.html -http://packetstormsecurity.com/files/129647/WordPress-WP-Limit-Posts-Automatically-0.7-CSRF-XSS.html -http://packetstormsecurity.com/files/129654/TWiki-6.0.1-QUERYSTRING-QUERYPARAMSTRING-XSS.html -http://packetstormsecurity.com/files/129655/TWiki-6.0.0-6.0.1-WebSearch-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html -http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html -http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html -http://packetstormsecurity.com/files/129666 -http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129699/SoX-14.4.1-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/129709/CMS-Serendipity-2.0-rc1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129713/CMS-Contenido-4.9.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129749/WordPress-Frontend-Uploader-0.9.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129751/e107-2.0-Alpha2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/129756/Ex-Libris-Patron-Directory-Services-2.1-Open-Redirect.html -http://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/129764/iExplorer-3.6.3.0-DLL-Hijacking.html -http://packetstormsecurity.com/files/129769/Desktop-Central-Add-Administrator.html -http://packetstormsecurity.com/files/129775/Osclass-3.4.2-SQL-Injection.html -http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html -http://packetstormsecurity.com/files/129777/Osclass-3.4.2-Shell-Upload.html -http://packetstormsecurity.com/files/129778/GetSimple-CMS-3.3.4-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/129803/ADSelfservice-Plus-5.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129804/WordPress-Banner-Effect-Header-1.2.6-XSS-CSRF.html -http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html -http://packetstormsecurity.com/files/129808/ZTE-Datacard-MF19-Privilege-Escalation-DLL-Hijacking.html -http://packetstormsecurity.com/files/129811/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129812/AdaptCMS-3.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129813/AdaptCMS-3.0.3-HTTP-Referer-Header-Open-Redirect.html -http://packetstormsecurity.com/files/129814/AdaptCMS-3.0.3-Remote-Command-Execution.html -http://packetstormsecurity.com/files/129815/ASUSWRT-3.0.0.4.376_1071-LAN-Backdoor-Command-Execution.html -http://packetstormsecurity.com/files/129816/Crea8Social-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129817/Pirelli-Router-P.DG-A4001N-WPA-Key-Reverse-Engineering.html -http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html -http://packetstormsecurity.com/files/129824/Sefrengo-CMS-1.6.0-SQL-Injection.html -http://packetstormsecurity.com/files/129825/Sefrengo-CMS-1.6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129826/Kajona-CMS-4.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html -http://packetstormsecurity.com/files/129828/Pirelli-ADSL2-2-Wireless-Router-P.DGA4001N-Information-Disclosure.html -http://packetstormsecurity.com/files/129830/Pandora-3.1-Auth-Bypass-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/129841/Brother-MFC-J4410DW-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129864/Good-For-Enterprise-Android-HTML-Injection.html -http://packetstormsecurity.com/files/129865/CMS-BEdita-3.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129872/CMS-e107-1.0.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129875/WordPress-Shopping-Cart-3.0.4-Unrestricted-File-Upload.html -http://packetstormsecurity.com/files/129888/SoftBB-0.1.3-SQL-Injection.html -http://packetstormsecurity.com/files/129889/SoftBB-0.1.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129911/F5-BIG-IP-Application-Security-Manager-ASM-XSS.html -http://packetstormsecurity.com/files/129916/CMS-Croogo-2.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129917/CMS-PHPKit-WCMS-1.6.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129922/Corel-Software-DLL-Hijacking.html -http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html -http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html -http://packetstormsecurity.com/files/129990/CatBot-0.4.2-SQL-Injection.html -http://packetstormsecurity.com/files/129992/simeditor-overflow.txt -http://packetstormsecurity.com/files/130007/Kiwix-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130008/CMS-Websitebaker-2.8.3-SP3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html -http://packetstormsecurity.com/files/130020/ManageEngine-Multiple-Products-Authenticated-File-Upload.html -http://packetstormsecurity.com/files/130026/Prestashop-1.6.0.9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130027/Barracuda-Load-Balancer-ADC-Key-Recovery-Password-Reset.html -http://packetstormsecurity.com/files/130037/Exif-Pilot-4.7.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/130040/AVM-FRITZ-Box-Firmware-Signature-Bypass.html -http://packetstormsecurity.com/files/130053/CAS-Server-3.5.2-LDAP-Authentication-Bypass.html -http://packetstormsecurity.com/files/130057/osTicket-1.9.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130058/Exponent-CMS-2.3.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html -http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130062/Mango-Automation-SCADA-HMI-2.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130063/EventSentry-3.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130066/articleFR-CMS-3.0.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130067/USAA-Mobile-App-Information-Disclosure.html -http://packetstormsecurity.com/files/130073/ecommerceMajor-SQL-Injection.html -http://packetstormsecurity.com/files/130075/SmartCMS-2-SQL-Injection.html -http://packetstormsecurity.com/files/130076/SmartCMS-2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130079/ManageEngine-ServiceDesk-9.0-SQL-Injection.html -http://packetstormsecurity.com/files/130081/ManageEngine-ServiceDesk-Plus-9.0-Privilege-Escalation.html -http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html -http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/130094/Comodo-Backup-4.4.0.0-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/130104/Photo-Gallery-1.2.5-Shell-Upload.html -http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html -http://packetstormsecurity.com/files/130106/Apache-Qpid-0.30-Anonymous-Action-Prevention.html -http://packetstormsecurity.com/files/130107/Android-WiFi-Direct-Denial-Of-Service.html -http://packetstormsecurity.com/files/130117/FancyFon-FAMOC-3.16.5-SQL-Injection.html -http://packetstormsecurity.com/files/130119/FancyFon-FAMOC-3.16.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130122/Restaurantbiller-SQL-Injection-Shell-Upload.html -http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html -http://packetstormsecurity.com/files/130147/OS-X-Gatekeeper-Bypass.html -http://packetstormsecurity.com/files/130155/Blubrry-PowerPress-6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html -http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html -http://packetstormsecurity.com/files/130169/ManageEngine-Firewall-Analyzer-8.0-Directory-Traversal-XSS.html -http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html -http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html -http://packetstormsecurity.com/files/130177/McAfee-Data-Loss-Prevention-Endpoint-Privilege-Escalation.html -http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html -http://packetstormsecurity.com/files/130187/Asus-RT-N10-Plus-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html -http://packetstormsecurity.com/files/130194/SIPhone-Enterprise-PBX-SQL-Injection.html -http://packetstormsecurity.com/files/130201/MS15-004-Microsoft-Remote-Desktop-Services-Web-Proxy-IE-Sandbox-Escape.html -http://packetstormsecurity.com/files/130219/ManageEngine-Desktop-Central-9-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130220/My-Little-Forum-2.3.3-2.2-1.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html -http://packetstormsecurity.com/files/130244/Malwarebytes-Anti-Malware-Anti-Exploit-Update-Remote-Code-Execution.html -http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html -http://packetstormsecurity.com/files/130247/BullGuard-14.1.285.4-Privilege-Escalation.html -http://packetstormsecurity.com/files/130248/AVG-Internet-Security-2015.0.5315-Privilege-Escalation.html -http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html -http://packetstormsecurity.com/files/130282/WordPress-Holding-Pattern-0.6-Shell-Upload.html -http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html -http://packetstormsecurity.com/files/130284/EMC-Captiva-Capture-Sensitive-Information-Disclosure.html -http://packetstormsecurity.com/files/130286/LG-On-Screen-Phone-Authentication-Bypass.html -http://packetstormsecurity.com/files/130292/u5CMS-3.9.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130306/WordPress-Acobot-Live-Chat-And-Contact-Form-2.0-CSRF-XSS.html -http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html -http://packetstormsecurity.com/files/130309/WordPress-Google-Doc-Embedder-2.5.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130311/WordPress-Contact-Form-DB-2.8.26-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130313/WordPress-Cross-Slide-2.0.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130314/WordPress-Redirection-Page-1.2-CSRF-XSS.html -http://packetstormsecurity.com/files/130316/WordPress-Mobile-Domain-1.5.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130317/u5CMS-3.9.3-Open-Redirect.html -http://packetstormsecurity.com/files/130318/WordPress-Spider-Facebook-1.0.10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130322/Radexscript-CMS-2.2.0-SQL-Injection.html -http://packetstormsecurity.com/files/130325/u5CMS-3.9.3-Arbitrary-File-Deletion.html -http://packetstormsecurity.com/files/130326/u5CMS-3.9.3-SQL-Injection.html -http://packetstormsecurity.com/files/130355/WordPress-Easing-Slider-2.2.0.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html -http://packetstormsecurity.com/files/130369/WordPress-Ninja-Forms-2.8.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130371/WordPress-Video-Gallery-2.7-SQL-Injection.html -http://packetstormsecurity.com/files/130379/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Exposure.html -http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html -http://packetstormsecurity.com/files/130381/WordPress-Survey-And-Poll-1.1.7-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/130382/Exponent-CMS-2.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130383/Maarch-LetterBox-2.8-Unrestricted-File-Upload.html -http://packetstormsecurity.com/files/130384/WordPress-Photo-Gallery-1.2.5-Unrestricted-File-Upload.html -http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html -http://packetstormsecurity.com/files/130388/Google-Email-4.4.2.0200-Denial-Of-Service.html -http://packetstormsecurity.com/files/130392/Cit-e-Net-6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130393/vBulletin-5.1.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html -http://packetstormsecurity.com/files/130396/UNIT4-Prosoft-HRMS-8.14.230.47-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130397/WordPress-Fusion-3.1-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/130401/Netatmo-Weather-Station-Cleartext-Password-Leak.html -http://packetstormsecurity.com/files/130403/Cosmoshop-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130404/WordPress-Image-Metadata-Cruncher-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130410/Fat-Free-CRM-0.13.5-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130431/ES-File-Explorer-3.2.4.1-Path-Traversal.html -http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/130440/Piwigo-2.7.3-SQL-Injection.html -http://packetstormsecurity.com/files/130441/Ilch-CMS-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130444/Hybris-Commerce-Software-Suite-5.x-File-Disclosure-Traversal.html -http://packetstormsecurity.com/files/130458/WordPress-WooCommerce-2.2.10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html -http://packetstormsecurity.com/files/130461/WordPress-Easy-Social-Icons-1.2.2-CSRF-XSS.html -http://packetstormsecurity.com/files/130485/Clipbucket-2.7.0.4.v2929-rc3-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/130490/MyConnection-Server-8.2b-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130520/SAP-Business-Objects-Unauthorized-File-Repository-Server-Read.html -http://packetstormsecurity.com/files/130521/SAP-Business-Objects-Unauthorized-File-Repository-Server-Write.html -http://packetstormsecurity.com/files/130522/SAP-Business-Objects-Unauthorized-Audit-Information-Delete.html -http://packetstormsecurity.com/files/130523/SAP-Business-Objects-Unauthorized-Audit-Information-Access.html -http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html -http://packetstormsecurity.com/files/130527/Cisco-Ironport-AsyncOS-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html -http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html -http://packetstormsecurity.com/files/130583/NetCat-CMS-5.01-3.12-Full-Path-Disclosure.html -http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html -http://packetstormsecurity.com/files/130587/Ubuntu-Vivid-Upstart-Privilege-Escalation.html -http://packetstormsecurity.com/files/130595/WordPress-Photocrati-Theme-4.x.x-SQL-Injection.html -http://packetstormsecurity.com/files/130598/ATutor-LCMS-2.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.html -http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/130612/Symantec-Web-Gateway-5-restore.php-Command-Injection.html -http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html -http://packetstormsecurity.com/files/130648/Webshop-Hun-1.062S-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130653/Webshop-Hun-1.062S-Directory-Traversal.html -http://packetstormsecurity.com/files/130654/WordPress-Contact-Form-DB-2.8.29-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130656/Webshop-Hun-1.062S-SQL-Injection.html -http://packetstormsecurity.com/files/130658/HP-Data-Protector-8.10-Remote-Command-Execution.html -http://packetstormsecurity.com/files/130684/Ultimate-PHP-Board-UPB-2.2.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130685/PHPMoAdmin-1.1.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/130690/WordPress-Download-Manager-2.7.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html -http://packetstormsecurity.com/files/130696/Betster-1.0.4-SQL-Injection-Authentication-Bypass.html -http://packetstormsecurity.com/files/130698/Elastix-2.5.0-SQL-Injection.html -http://packetstormsecurity.com/files/130722/MikroTik-RouterOS-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130723/OpenKM-Stored-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130729/ocPortal-9.0.16-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -http://packetstormsecurity.com/files/130737/Manage-Engine-AD-Audit-Manager-Plus-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130739/Codoforum-2.5.1-Arbitrary-File-Download.html -http://packetstormsecurity.com/files/130751/SuperWebMailer-5.50.0.01160-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130754/Vastal-I-tech-phpVID-1.2.3-SQL-Injection.html -http://packetstormsecurity.com/files/130755/Vastal-I-tech-phpVID-1.2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130766/Community-Gallery-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130767/Dropbox-SDK-For-Android-Remote-Exploitation.html -http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html -http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html -http://packetstormsecurity.com/files/130770/GeniXCMS-0.0.1-SQL-Injection.html -http://packetstormsecurity.com/files/130771/GeniXCMS-0.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130772/GeniXCMS-0.0.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html -http://packetstormsecurity.com/files/130778/Google-Android-Integer-Oveflow-Heap-Corruption.html -http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/130796/WordPress-Huge-IT-Slider-2.6.8-SQL-Injection.html -http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html -http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html -http://packetstormsecurity.com/files/130812/Alkacon-OpenCms-9.5.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130838/Serendipity-CMS-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130839/WordPress-WPML-Missing-Authentication.html -http://packetstormsecurity.com/files/130840/Foxit-Reader-7.0.6.1126-Privilege-Escalation.html -http://packetstormsecurity.com/files/130845/ -http://packetstormsecurity.com/files/130854/Intel-Network-Adapter-Diagnostic-Driver-IOCTL-DoS.html -http://packetstormsecurity.com/files/130896/Joomla-ECommerce-WD-1.2.5-SQL-Injection.html -http://packetstormsecurity.com/files/130897/Websense-Data-Security-DLP-Incident-Forensics-Preview-XSS.html -http://packetstormsecurity.com/files/130898/Websense-Email-Security-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130899/Websense-Appliance-Manager-Command-Injection.html -http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html -http://packetstormsecurity.com/files/130902/Websense-Data-Security-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130908/Websense-Content-Gateway-Error-Message-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html -http://packetstormsecurity.com/files/130928/Citrix-Command-Center-Configuration-Disclosure.html -http://packetstormsecurity.com/files/130930/Citrx-Command-Center-Advent-JMX-Servlet-Accessible.html -http://packetstormsecurity.com/files/130931/Citrix-NITRO-SDK-xen_hotfix-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130936/Citrix-NetScaler-VPX-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/130937/Citrix-NITRO-SDK-Command-Injection.html -http://packetstormsecurity.com/files/130959/EMC-Documentum-xMS-Sensitive-Information-Disclosure.html -http://packetstormsecurity.com/files/130960/WordPress-AB-Google-Map-Travel-CSRF-XSS.html -http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html -http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html -http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html -http://packetstormsecurity.com/files/130999/WordPress-W3-Total-Cache-PHP-Code-Execution.html -http://packetstormsecurity.com/files/131002/Wordpress-InfusionSoft-Shell-Upload.html -http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131035/EMC-Isilon-OneFS-Privilege-Escalation.html -http://packetstormsecurity.com/files/131062/Manage-Engine-Desktop-Central-9-Unauthorized-Administrative-Password-Reset.html -http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html -http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/131155/WordPress-Google-Map-Travel-3.4-XSS-CSRF.html -http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html -http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html -http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html -http://packetstormsecurity.com/files/131182/Palo-Alto-Traps-Server-3.1.2.1546-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.html -http://packetstormsecurity.com/files/131230/Ericsson-Drutt-MSDP-3PI-Manager-Open-Redirect.html -http://packetstormsecurity.com/files/131232/Ericsson-Drutt-MSDP-Report-Viewer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131233/Ericsson-Drutt-MSDP-Instance-Monitor-Directory-Traversal-File-Access.html -http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html -http://packetstormsecurity.com/files/131250/EMC-PowerPath-Virtual-Appliance-Undocumented-User-Accounts.html -http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html -http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html -http://packetstormsecurity.com/files/131280/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-SQL-Injection.html -http://packetstormsecurity.com/files/131281/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-Information-Disclosure.html -http://packetstormsecurity.com/files/131282/WordPress-Simple-Ads-Manager-2.5.94-File-Upload.html -http://packetstormsecurity.com/files/131284/Kemp-Load-Master-7.1-16-CSRF-XSS-DoS-Code-Execution.html -http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131321/WordPress-Shareaholic-7.6.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html -http://packetstormsecurity.com/files/131332/phpTrafficA-2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-Disclosure.html -http://packetstormsecurity.com/files/131364/Asterisk-Project-Security-Advisory-AST-2015-003.html -http://packetstormsecurity.com/files/131376/Magento-eCommerce-Vulnerable-Adobe-Flex-SDK.html -http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html -http://packetstormsecurity.com/files/131421/Samsung-iPOLiS-1.12.2-ReadConfigValue-Remote-Code-Execution.html -http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html -http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html -http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html -http://packetstormsecurity.com/files/131457/Microsoft-Windows-GDI-MRSETDIBITSTODEVICE-bPlay-EMF-Parsing-Memory-Corruption.html -http://packetstormsecurity.com/files/131459/Huawei-SEQ-Analyst-XXE-Injection.html -http://packetstormsecurity.com/files/131460/Huawei-SEQ-Analyst-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html -http://packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.html -http://packetstormsecurity.com/files/131494/Oracle-Outside-In-ibpsd2.dll-PSD-File-Processing-Buffer-Overflow.html -http://packetstormsecurity.com/files/131496/Landesk-Management-Suite-9.5-RFI-CSRF.html -http://packetstormsecurity.com/files/131504/BlueDragon-CFChart-Servlet-7.1.1.17759-Directory-Traversal.html -http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html -http://packetstormsecurity.com/files/131507/Oracle-Hyperion-Smart-View-For-Office-11.1.2.3.000-DoS.html -http://packetstormsecurity.com/files/131509/Android-4.4-MTP-Path-Traversal.html -http://packetstormsecurity.com/files/131510/ADB-Backup-Traversal-File-Overwrite.html -http://packetstormsecurity.com/files/131515/ -http://packetstormsecurity.com/files/131516/Adobe-Flash-Player-copyPixelsToByteArray-Integer-Overflow.html -http://packetstormsecurity.com/files/131530/WordPress-Community-Events-1.3.5-SQL-Injection.html -http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html -http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html -http://packetstormsecurity.com/files/131558/WordPress-Tune-Library-1.5.4-SQL-Injection.html -http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html -http://packetstormsecurity.com/files/131591/FreePBX-12.0.43-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html -http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html -http://packetstormsecurity.com/files/131644/WordPress-4.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131646/Elasticsearch-Directory-Traversal.html -http://packetstormsecurity.com/files/131649/Open-Xchange-Server-6-OX-AppSuite-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131654/OTRS-3.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html -http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html -http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html -http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html -http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html -http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html -http://packetstormsecurity.com/files/131731/GNS3-1.2.3-DLL-Hijacking.html -http://packetstormsecurity.com/files/131732/Epicor-Retail-Store-Help-System-3.2.03.01.008-Code-Execution.html -http://packetstormsecurity.com/files/131748/EMC-SourceOne-Email-Management-Account-Lockout-Policy.html -http://packetstormsecurity.com/files/131749/EMC-AutoStart-5.4.3-5.5.0-Packet-Injection.html -http://packetstormsecurity.com/files/131756/Apache-Xerces-C-XML-Parser-Denial-Of-Service.html -http://packetstormsecurity.com/files/131762/Dell-SonicWALL-Secure-Remote-Access-7.5-8.0-CSRF.html -http://packetstormsecurity.com/files/131766/Fortinet-FortiAnalyzer-FortiManager-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131801/WordPress-WP-Symposium-15.1-SQL-Injection.html -http://packetstormsecurity.com/files/131802/WordPress-Twenty-Fifteen-4.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html -http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131882/Concrete5-5.7.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html -http://packetstormsecurity.com/files/131934/WordPress-Roomcloud-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html -http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html -http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html -http://packetstormsecurity.com/files/131974/WordPress-FeedWordPress-2015.0426-SQL-Injection.html -http://packetstormsecurity.com/files/131976/WordPress-WP-Photo-Album-Plus-6.1.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/131981/Milw0rm-Clone-Script-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html -http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html -http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html -http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html -http://packetstormsecurity.com/files/132011/WordPress-WP-Membership-1.2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132012/WordPress-WP-Membership-1.2.3-Privilege-Escalation.html -http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html -http://packetstormsecurity.com/files/132030/phpwind-8.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132033/phpwind-8.7-Open-Redirect.html -http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132036/WordPress-GigPress-2.3.8-SQL-Injection.html -http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/132060/Aruba-ClearPass-Policy-Manager-6.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html -http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html -http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html -http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html -http://packetstormsecurity.com/files/132104/Ektron-CMS-9.10-SP1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/132105/Ektron-CMS-9.10-SP1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html -http://packetstormsecurity.com/files/132108/Dolibarr-3.5-3.6-HTML-Injection.html -http://packetstormsecurity.com/files/132121/FreeBox-3.0.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132122/Enhanced-SQL-Portal-5.0.7961-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html -http://packetstormsecurity.com/files/132142/ResourceSpace-7.1.6513-Local-File-Inclusion.html -http://packetstormsecurity.com/files/132168/Beckhoff-IPC-Diagnositcs-Authentication-Bypass.html -http://packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html -http://packetstormsecurity.com/files/132178/Airties-RT210-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132179/Wing-FTP-4.4.6-Code-Execution-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/132180/Wing-FTP-4.4.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/132181/WordPress-Users-Ultra-1.5.15-SQL-Injection.html -http://packetstormsecurity.com/files/132186/TickFa-1.x-SQL-Injection.html -http://packetstormsecurity.com/files/132193/Symphony-CMS-2.6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132196/TinySRP-Buffer-Overflow.html -http://packetstormsecurity.com/files/132209/WordPress-Encrypted-Contact-Form-1.0.4-CSRF-XSS.html -http://packetstormsecurity.com/files/132210/Kankun-Smart-Socket-Mobile-App-Hardcoded-AES-Key.html -http://packetstormsecurity.com/files/132214/DreamBox-DM500s-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132216/Persian-Car-CMS-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html -http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html -http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html -http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html -http://packetstormsecurity.com/files/132232/Kibana-4.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html -http://packetstormsecurity.com/files/132234/Elasticsearch-1.5.2-File-Creation.html -http://packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html -http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html -http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/132256/WordPress-Aviary-Image-Editor-Add-On-For-Gravity-Forms-3.0-Beta-Shell-Upload.html -http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html -http://packetstormsecurity.com/files/132266/WordPress-SE-HTML5-Album-Audio-Player-1.1.0-Directory-Traversal.html -http://packetstormsecurity.com/files/132269/Adobe-Connect-9.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132278/WordPress-Paypal-Currency-Converter-Basic-For-Woocommerce-1.3-File-Read.html -http://packetstormsecurity.com/files/132281/OSSEC-2.8.1-Local-Root-Escalation.html -http://packetstormsecurity.com/files/132286/ZCMS-1.1-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/132294/WordPress-Yoast-2.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html -http://packetstormsecurity.com/files/132324/CellPipe-7130-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/132327/CellPipe-7130-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132337/Audio-Share-2.0.2-Cross-Site-Scripting-Remote-File-Inclusion.html -http://packetstormsecurity.com/files/132341/SearchBlox-8.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132353/SAP-NetWeaver-Dispatcher-Buffer-Overflow.html -http://packetstormsecurity.com/files/132356/SAP-NetWeaver-Portal-7.31-XXE-Injection.html -http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html -http://packetstormsecurity.com/files/132358/SAP-NetWeaver-Portal-7.31-XXE-Injection.html -http://packetstormsecurity.com/files/132359/SAP-Management-Console-Information-Disclosure.html -http://packetstormsecurity.com/files/132362/SAP-Afaria-7-Denial-Of-Service.html -http://packetstormsecurity.com/files/132363/SAP-Afaria-7-Missing-Authorization-Check.html -http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html -http://packetstormsecurity.com/files/132366/WordPress-Revslider-4.2.2-XSS-Information-Disclosure.html -http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/132369/ApPHP-Hotel-Site-3.x.x-SQL-Injection.html -http://packetstormsecurity.com/files/132376/ManageEngine-SupportCenter-Plus-7.90-XSS-Traversal-Password-Disclosure.html -http://packetstormsecurity.com/files/132397/GeniXCMS-0.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html -http://packetstormsecurity.com/files/132417/Apache-Storm-0.10.0-beta-Code-Execution.html -http://packetstormsecurity.com/files/132418/Zurmo-CRM-3.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132420/MySQL-Lite-Administrator-Beta-1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132425/WordPress-Nextend-Facebook-Connect-1.5.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132432/WordPress-Nextend-Twitter-Connect-1.5.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132437/Kguard-Digital-Video-Recorder-Bypass-Issues.html -http://packetstormsecurity.com/files/132459/Download-Zip-Attachments-1.0-File-Download.html -http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-File-Download.html -http://packetstormsecurity.com/files/132461/Nucleus-CMS-3.65-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -http://packetstormsecurity.com/files/132473/Microsec-e-Szigno-Netlock-Mokka-XML-Signature-Wrapping.html -http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html -http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html -http://packetstormsecurity.com/files/132479/Fiyo-CMS-2.0_1.9.1-SQL-Injection.html -http://packetstormsecurity.com/files/132481/GetSimple-CMS-5.7.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132498/Watchguard-XCS-10.0-SQL-Injection-Command-Execution.html -http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html -http://packetstormsecurity.com/files/132513/X-Cart-4.5.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132514/Climatix-BACnet-IP-Communication-Module-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132541/BlackCat-CMS-1.1.1-Path-Traversal.html -http://packetstormsecurity.com/files/132549/Soreco-AG-Xpert.Line-3.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/132552/Snorby-2.6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132553/WordPress-StageShow-5.0.8-Open-Redirect.html -http://packetstormsecurity.com/files/132578/ -http://packetstormsecurity.com/files/132580/phpLiteAdmin-1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132583/Orchard-CMS-1.9.0-1.8.2-1.7.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132584/WideImage-11.02.19-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html -http://packetstormsecurity.com/files/132589/Black-Cat-CMS-1.1.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132607/Merethis-Centreon-2.5.4-SQL-Injection-Remote-Command-Execution.html -http://packetstormsecurity.com/files/132609/AirLink101-SkyIPCam1620W-OS-Command-Injection.html -http://packetstormsecurity.com/files/132645/ADB-Backup-APK-Injection.html -http://packetstormsecurity.com/files/132648/Arab-Portal-3-SQL-Injection.html -http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html -http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html -http://packetstormsecurity.com/files/132657/WordPress-GD-bbPress-Attachments-2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132658/Joomla-J2Store-3.1.6-SQL-Injection.html -http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html -http://packetstormsecurity.com/files/132665/Accellion-FTA-getStatus-verify_oauth_token-Command-Execution.html -http://packetstormsecurity.com/files/132667/ZenPhoto-1.4.8-XSS-SQL-Injection-Traversal.html -http://packetstormsecurity.com/files/132670/WordPress-Floating-Social-Bar-1.1.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html -http://packetstormsecurity.com/files/132672/sysPass-1.0.9-SQL-Injection.html -http://packetstormsecurity.com/files/132673/FreiChat-9.6-SQL-Injection.html -http://packetstormsecurity.com/files/132676/The-Events-Calender-Eventbrite-Tickets-3.9.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132680/SAP-ECC-Privilege-Escalation.html -http://packetstormsecurity.com/files/132681/SAP-Afaria-XeService.exe-7.0.6398.0-Weak-File-Permissions.html -http://packetstormsecurity.com/files/132682/Panda-Security-1.0.0.13-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/132683/ArticleFR-3.0.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html -http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversal.html -http://packetstormsecurity.com/files/132764/Axigen-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html -http://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html -http://packetstormsecurity.com/files/132807/NetCracker-Resource-Management-System-8.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html -http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html -http://packetstormsecurity.com/files/132811/WordPress-Count-Per-Day-3.4-SQL-Injection.html -http://packetstormsecurity.com/files/132812/WordPress-Paid-Memberships-Pro-1.8.4.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132842/ -http://packetstormsecurity.com/files/132865/phpFileManager-0.9.8-Remote-Command-Execution.html -http://packetstormsecurity.com/files/132908/ -http://packetstormsecurity.com/files/132911/ -http://packetstormsecurity.com/files/132916/WordPress-qTranslate-2.5.39-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html -http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html -http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132931/WordPress-Job-Manager-0.7.22-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/132968/Websense-Triton-Content-Manager-8.0.0-Build-1165-Buffer-Overflow.html -http://packetstormsecurity.com/files/132992/ -http://packetstormsecurity.com/files/133001/ -http://packetstormsecurity.com/files/133002/ -http://packetstormsecurity.com/files/133003/Thomson-Reuters-FATCA-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html -http://packetstormsecurity.com/files/133052/WiFi-Pineapple-Predictable-CSRF-Token.html -http://packetstormsecurity.com/files/133055/phpipam-1.1.010-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133059/Coppermine-Photo-Gallery-1.5.36-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html -http://packetstormsecurity.com/files/133082/Enorth-Webpublisher-CMS-SQL-Injection.html -http://packetstormsecurity.com/files/133122/SAP-NetWeaver-AS-Java-XXE-Injection.html -http://packetstormsecurity.com/files/133147/UNIT4TETA-TETA-WEB-22.62.3.4-Authorization-Bypass.html -http://packetstormsecurity.com/files/133247/OpenText-Secure-MFT-2014-R2-SP4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133248/Ricoh-FTP-Server-1.1.0.6-Buffer-Overflow.html -http://packetstormsecurity.com/files/133251/SiteFactory-CMS-5.5.9-Directory-Traversal.html -http://packetstormsecurity.com/files/133266/VLC-2.2.1-Arbitrary-Pointer-Dereference.html -http://packetstormsecurity.com/files/133267/ -http://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html -http://packetstormsecurity.com/files/133296/UNIT4TETA-TETA-WEB-22.62.3.4-Session-Fixation.html -http://packetstormsecurity.com/files/133297/ResourceSpace-CMS-7.3.7009-SQL-Injection.html -http://packetstormsecurity.com/files/133299/Pligg-CMS-2.0.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/133302/Dell-SonicWall-NetExtender-7.5.215-Privilege-Escalation.html -http://packetstormsecurity.com/files/133335/FreeBSD-Security-Advisory-IRET-Handler-Privilege-Escalation.html -http://packetstormsecurity.com/files/133340/WordPress-YouTube-Embed-3.3.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133349/WordPress-Private-Only-3.5.1-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133350/WordPress-Navis-DocumentCloud-0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133371/WordPress-sourceAFRICA-0.1.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133375/Joomla-GoogleSearch-CSE-3.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133377/Boxoft-WAV-To-MP3-Converter-Buffer-Overflow.html -http://packetstormsecurity.com/files/133378/Cyberoam-CR500iNG-XP-10.6.2-MR-1-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html -http://packetstormsecurity.com/files/133399/SiS-Windows-VGA-Display-Manager-Privilege-Escalation.html -http://packetstormsecurity.com/files/133400/XGI-Windows-VGA-Display-Manager-Privilege-Escalation.html -http://packetstormsecurity.com/files/133401/Jira-HipChat-For-Jira-Java-Code-Execution.html -http://packetstormsecurity.com/files/133404/Cerb-7.0.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/133405/EMC-Atmos-2.3.0-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html -http://packetstormsecurity.com/files/133426/Serendipity-2.0.1-Shell-Upload.html -http://packetstormsecurity.com/files/133427/Serendipity-2.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/133437/Checkmarx-CxQL-7.1.5-Sandbox-Bypass.html -http://packetstormsecurity.com/files/133441/EMC-Documentum-Content-Server-Privilege-Escalation.html -http://packetstormsecurity.com/files/133443/Yahoo-Messenger-11.5.0.228-Buffer-Overflow.html -http://packetstormsecurity.com/files/133463/WordPress-Contact-Form-Generator-2.0.1-CSRF.html -http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133469/Endian-Firewall-Proxy-Password-Change-Command-Injection.html -http://packetstormsecurity.com/files/133494/WordPress-Easy-Media-Gallery-1.3.47-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133498/Autoexchanger-5.1.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/133499/Qlikview-11.20-SR4-Blind-XXE-Injection.html -http://packetstormsecurity.com/files/133514/SAP-Mobile-Platform-3-XXE-Injection.html -http://packetstormsecurity.com/files/133515/SAP-NetWeaver-AS-FKCDBFTRACE-ABAP-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/133516/SAP-NetWeaver-AS-LSCT1I13-ABAP-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html -http://packetstormsecurity.com/files/133520/Synology-Download-Station-3.5-2956-3.5-2962-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133535/CubeCart-6.0.6-Administrative-Bypass.html -http://packetstormsecurity.com/files/133538/Nokia-Solutions-And-Networks-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html -http://packetstormsecurity.com/files/133544/Magento-1.9.2-File-Inclusion.html -http://packetstormsecurity.com/files/133547/OS-X-Privilege-Escalation.html -http://packetstormsecurity.com/files/133550/OS-X-Suid-Privilege-Escalation.html -http://packetstormsecurity.com/files/133551/Typo3-CMS-6.2.14-4.5.40-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133554/Openfire-3.10.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133558/Openfire-3.10.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133559/Openfire-3.10.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html -http://packetstormsecurity.com/files/133581/ManageEngine-EventLog-Analyzer-10.6-Build-10060-SQL-Query-Execution.html -http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html -http://packetstormsecurity.com/files/133601/Pentaho-5.2.x-BA-Suite-PDI-Information-Disclosure.html -http://packetstormsecurity.com/files/133610/Farol-SQL-Injection.html -http://packetstormsecurity.com/files/133620/VBox-Satellite-Express-Arbitrary-Write-Privilege-Escalation.html -http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html -http://packetstormsecurity.com/files/133627/SAP-Netweaver-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html -http://packetstormsecurity.com/files/133672/Guard-2.0.0-rev7-SQL-Injection.html -http://packetstormsecurity.com/files/133674/Open-Xchange-Server-6-OX-AppSuite-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html -http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html -http://packetstormsecurity.com/files/133712/4images-1.7.11-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133716/X2Engine-4.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133717/X2Engine-4.2-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/133718/X2Engine-4.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/133721/Watchguard-XCS-Remote-Command-Execution.html -http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html -http://packetstormsecurity.com/files/133736/Collabtive-2.0-Shell-Upload.html -http://packetstormsecurity.com/files/133737/Open-Source-Point-Of-Sale-2.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133743/WordPress-Appointment-Booking-Calendar-1.1.7-XSS.html -http://packetstormsecurity.com/files/133747/ManageEngine-EventLog-Analyzer-Remote-Code-Execution.html -http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html -http://packetstormsecurity.com/files/133756/PCMan-FTP-Server-2.0.7-Directory-Traversal.html -http://packetstormsecurity.com/files/133757/WordPress-Appointment-Booking-Calendar-1.1.7-SQL-Injection.html -http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html -http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html -http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html -http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html -http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html -http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html -http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html -http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html -http://packetstormsecurity.com/files/133779/RSA-Web-Threat-Detection-Privilege-Escalation-Information-Disclosure.html -http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html -http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html -http://packetstormsecurity.com/files/133784/RSA-OneStep-6.9-Path-Traversal.html -http://packetstormsecurity.com/files/133797/ElasticSearch-Path-Traversal-Arbitrary-File-Download.html -http://packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.html -http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html -http://packetstormsecurity.com/files/133826/issetugid-rsh-libmalloc-OS-X-Local-Root.html -http://packetstormsecurity.com/files/133847/Apple-Safari-8.0.8-URI-Spoofing.html -http://packetstormsecurity.com/files/133867/WordPress-U-Design-Theme-2.7.9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html -http://packetstormsecurity.com/files/133877/Truecrypt-7-Privilege-Escalation.html -http://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.html -http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -http://packetstormsecurity.com/files/133897/Kallithea-0.2.9-HTTP-Response-Splitting.html -http://packetstormsecurity.com/files/133899/Watermark-Master-Buffer-Overflow-SEH.html -http://packetstormsecurity.com/files/133906/Veeam-Backup-And-Replication-6-7-8-Privilege-Escalation.html -http://packetstormsecurity.com/files/133907/Joomla-CMS-3.4.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html -http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html -http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html -http://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/133929/WordPress-Pie-Register-2.0.18-SQL-Injection.html -http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.html -http://packetstormsecurity.com/files/133931/F5-BigIP-10.2.4-Build-595.0-HF3-Path-Traversal.html -http://packetstormsecurity.com/files/133953/K2-SmartForms-BlackPearl-SQL-Injection.html -http://packetstormsecurity.com/files/133962/Microsoft-Trusted-Boot-Security-Feature-Bypass.html -http://packetstormsecurity.com/files/133964/ElasticSearch-Snapshot-API-Directory-Traversal.html -http://packetstormsecurity.com/files/133971/Windows-Sandboxed-Mount-Reparse-Point-Creation-Mitigation-Bypass.html -http://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html -http://packetstormsecurity.com/files/133998/Qualys-Security-Advisory-LibreSSL-Leak-Overflow.html -http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html -http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html -http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html -http://packetstormsecurity.com/files/134066/Realtyna-RPL-8.9.2-SQL-Injection.html -http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134071/Beckoff-CX9020-CPU-Model-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134072/Safari-User-Assisted-Applescript-Exec-Attack.html -http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134081/articleFR-3.0.7-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html -http://packetstormsecurity.com/files/134084/Google-Picasa-Phase-One-Tags-Processing-Integer-Overflow.html -http://packetstormsecurity.com/files/134087/Mac-OS-X-10.9.5-10.10.5-rsh-libmalloc-Privilege-Escalation.html -http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html -http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html -http://packetstormsecurity.com/files/134098/Oracle-E-Business-Suite-12.2.4-Database-User-Enumeration.html -http://packetstormsecurity.com/files/134099/Oracle-E-Business-Suite-12.1.3-12.1.4-SQL-Injection.html -http://packetstormsecurity.com/files/134100/Oracle-E-Business-Suite-12.1.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html -http://packetstormsecurity.com/files/134105/Samsung-SecEmailComposer-QUICK_REPLY_BACKGROUND-Permission-Weakness.html -http://packetstormsecurity.com/files/134106/Samsung-Seiren-Kernel-Driver-Buffer-Overflow.html -http://packetstormsecurity.com/files/134107/Samsung-Fimg2d-FIMG2D_BITBLT_BLIT-Ioctl-Concurrency-Flaw.html -http://packetstormsecurity.com/files/134108/Samsung-M2m1shot-Kernel-Driver-Buffer-Overflow.html -http://packetstormsecurity.com/files/134117/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html -http://packetstormsecurity.com/files/134118/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html -http://packetstormsecurity.com/files/134119/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html -http://packetstormsecurity.com/files/134120/AMD-fglrx-driver-15.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/134121/AMD-fglrx-driver-14.4.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/134124/Oxwall-1.7.4-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html -http://packetstormsecurity.com/files/134132/Libstagefright-Saio-Tag-Integer-Overflow-Heap-Corruption.html -http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html -http://packetstormsecurity.com/files/134176/Accentis-Content-Resource-Management-System-SQL-Injection.html -http://packetstormsecurity.com/files/134177/Accentis-Content-Resource-Management-System-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134178/Milton-Webdav-2.7.0.1-XXE-Injection.html -http://packetstormsecurity.com/files/134191/Alcatel-Lucent-Home-Device-Manager-Spoofing.html -http://packetstormsecurity.com/files/134197/Samsung-LibQjpeg-Image-Decoding-Memory-Corruption.html -http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html -http://packetstormsecurity.com/files/134199/Samsung-Galaxy-S6-Android.media.process-Face-Recognition-Memory-Corruption.html -http://packetstormsecurity.com/files/134215/ATutor-2.2-File-Upload.html -http://packetstormsecurity.com/files/134217/ATutor-2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134218/ATutor-2.2-PHP-Code-Injection.html -http://packetstormsecurity.com/files/134219/Piwik-2.14.3-Local-File-Inclusion.html -http://packetstormsecurity.com/files/134220/Piwik-2.14.3-PHP-Object-Injection.html -http://packetstormsecurity.com/files/134251/Java-Secure-Socket-Extension-JSSE-SKIP-TLS.html -http://packetstormsecurity.com/files/134252/Cryptocat-Script-Insertion.html -http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html -http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html -http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html -http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html -http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134314/Microsoft-.NET-Framework-XSS-Privilege-Escalation.html -http://packetstormsecurity.com/files/134315/Google-Picasa-CAMF-Section-Integer-Overflow.html -http://packetstormsecurity.com/files/134323/OpenBSD-net-snmp-Information-Disclosure.html -http://packetstormsecurity.com/files/134331/vBulletin-5.1.2-Unserialize-Code-Execution.html -http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html -http://packetstormsecurity.com/files/134352/dotclear-2.8.1-Shell-Upload.html -http://packetstormsecurity.com/files/134353/dotclear-2.8.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html -http://packetstormsecurity.com/files/134362/AlegroCart-1.2.8-SQL-Injection.html -http://packetstormsecurity.com/files/134379/D-Link-DIR-816L-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Certificate-Validation.html -http://packetstormsecurity.com/files/134391/zTree-3.5.19.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134392/Microsoft-Windows-8.1-Ahcache.sys-NtApphelpCacheControl-Privilege-Escalation.html -http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html -http://packetstormsecurity.com/files/134394/Adobe-Reader-X-XI-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/134395/FreeType-2.5.3-Mac-FOND-Resource-Parsing-Out-Of-Bounds-Read-From-Stack.html -http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html -http://packetstormsecurity.com/files/134397/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html -http://packetstormsecurity.com/files/134398/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html -http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134420/EMC-VPLEX-Sensitive-Information-Exposure.html -http://packetstormsecurity.com/files/134434/F5-iControl-iCall-Script-Root-Command-Execution.html -http://packetstormsecurity.com/files/134482/Google-Chrome-Integer-Overflow.html -http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html -http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134496/Apache-Cordova-Android-3.6.4-BridgeSecret-Weak-Randomization.html -http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html -http://packetstormsecurity.com/files/134506/Apache-Flex-BlazeDS-4.7.1-SSRF.html -http://packetstormsecurity.com/files/134507/SAP-NetWeaver-7.4-XXE-Injection.html -http://packetstormsecurity.com/files/134508/SAP-Afaria-7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134509/SAP-Mobile-Platform-2.3-XXE-Injection.html -http://packetstormsecurity.com/files/134513/Steam-2.10.91.91-Weak-File-Permissions-Privilege-Escalation.html -http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html -http://packetstormsecurity.com/files/134520/NVIDIA-Stereoscopic-3D-Driver-Service-Arbitrary-Run-Key-Creation.html -http://packetstormsecurity.com/files/134521/Microsoft-Windows-Ndis.sys-Buffer-Overflow.html -http://packetstormsecurity.com/files/134523/Polycom-BTOE-Connector-2.3.0-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/134524/KNX-ETS-4.1.5-Build-3246-Buffer-Overflow.html -http://packetstormsecurity.com/files/134525/RXTEC-RXAdmin-SQL-Injection.html -http://packetstormsecurity.com/files/134529/MODX-2.3.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html -http://packetstormsecurity.com/files/134593/ntop-ng-2.0.15102-Privilege-Escalation.html -http://packetstormsecurity.com/files/134598/WordPress-Calls-To-Action-2.4.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html -http://packetstormsecurity.com/files/134600/WordPress-Role-Scoper-1.3.66-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134601/WordPress-Ultimate-Member-1.3.28-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html -http://packetstormsecurity.com/files/134626/WordPress-Cool-Video-Gallery-1.9-Command-Injection.html -http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html -http://packetstormsecurity.com/files/134760/Secure-Data-Space-3.1.1-2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134765/bitrix.scan-Bitrix-1.0.3-Path-Traversal.html -http://packetstormsecurity.com/files/134766/bitrix.mpbuilder-Bitrix-1.0.10-Local-File-Inclusion.html -http://packetstormsecurity.com/files/134767/Intellect-Core-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/134801/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html -http://packetstormsecurity.com/files/134805/Jenkins-CLI-RMI-Java-Deserialization.html -http://packetstormsecurity.com/files/134806/ManageEngine-Desktop-Central-9-FileUploadServlet-ConnectionId.html -http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html -http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html -http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html -http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/134950/Samsung-Galaxy-S6-Samsung-Gallery-Bitmap-Decoding-Crash.html -http://packetstormsecurity.com/files/134951/Samsung-Galaxy-S6-Samsung-Gallery-GIF-Parsing-Crash.html -http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html -http://packetstormsecurity.com/files/134987/Dell-Authentication-Driver-Uncontrolled-Write.html -http://packetstormsecurity.com/files/135013/RSA-SecurID-Web-Agent-Authentication-Bypass.html -http://packetstormsecurity.com/files/135034/giflib-5.1.1-Heap-Overflow.html -http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html -http://packetstormsecurity.com/files/135044/EMC-Secure-Remote-Services-Virtual-Edition-Path-Traversal.html -http://packetstormsecurity.com/files/135047/Slackware-Security-Advisory-blueman-Updates.html -http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html -http://packetstormsecurity.com/files/135068/Nordex-Control-2-NC2-SCADA-16-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html -http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html -http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html -http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html -http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html -http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/135151/Ubuntu-14.04-LTS-15.10-overlayfs-Local-Root.html -http://packetstormsecurity.com/files/135158/ownCloud-8.2.1-8.1.4-8.0.9-Information-Exposure.html -http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html -http://packetstormsecurity.com/files/135163/OpenCart-2.1.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135168/AVM-FRITZ-OS-HTML-Injection.html -http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html -http://packetstormsecurity.com/files/135201/Dolibarr-3.8.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html -http://packetstormsecurity.com/files/135206/GDCM-2.6.0-2.6.1-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/135222/TrendMicro-Node.js-HTTP-Server-Command-Execution.html -http://packetstormsecurity.com/files/135225/FortiGate-OS-5.0.7-SSH-Backdoor.html -http://packetstormsecurity.com/files/135232/Microsoft-DirectShow-Remote-Code-Execution.html -http://packetstormsecurity.com/files/135256/dolibarr-HTML-Injection.html -http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html -http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html -http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html -http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html -http://packetstormsecurity.com/files/135303/Samsung-KNOX-1.0-Weak-eCryptFS-Key-Generation.html -http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html -http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html -http://packetstormsecurity.com/files/135328/OpenVAS-Greenbone-Security-Assistant-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html -http://packetstormsecurity.com/files/135369/FreeBSD-SCTP-ICMPv6-Denial-Of-Service.html -http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html -http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html -http://packetstormsecurity.com/files/135435/IOKit-Methods-Being-Called-Without-Locks-From-IOServiceClose.html -http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html -http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html -http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html -http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html -http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html -http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html -http://packetstormsecurity.com/files/135444/iOS-OS-X-Kernel-Uninitialized-Variable-Code-Execution.html -http://packetstormsecurity.com/files/135457/Ipswitch-MOVEit-DMZ-8.1-Authorization-Bypass.html -http://packetstormsecurity.com/files/135458/Ipswitch-MOVEit-DMZ-8.1-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135459/Ipswitch-MOVEit-DMZ-8.1-File-ID-Enumeration.html -http://packetstormsecurity.com/files/135460/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135462/Ipswitch-MOVEit-DMZ-8.1-Information-Disclosure.html -http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html -http://packetstormsecurity.com/files/135586/GE-Industrial-Solutions-UPS-SNMP-Adapter-Command-Injection.html -http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html -http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html -http://packetstormsecurity.com/files/135617/Dell-SecureWorks-iOS-Certificate-Validation-Failure.html -http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html -http://packetstormsecurity.com/files/135643/Samsung-SecEmailUI-Script-Injection.html -http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html -http://packetstormsecurity.com/files/135701/OS-X-Sysmond-XPC-Type-Confusion-Privilege-Escalation.html -http://packetstormsecurity.com/files/135709/Sophos-UTM-9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135711/Node.js-HTTP-Response-Splitting.html -http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html -http://packetstormsecurity.com/files/135720/Apache-Sling-Framework-2.3.6-Information-Disclosure.html -http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html -http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html -http://packetstormsecurity.com/files/135761/SAP-MII-12.2-14.0-15.0-Cryptography-Issues.html -http://packetstormsecurity.com/files/135775/SAP-PCo-2.2-2.3-15.0-15.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/135797/Windows-Kerberos-Security-Feature-Bypass.html -http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html -http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html -http://packetstormsecurity.com/files/135841/Comodo-Internet-Security-VNC-Server-Exposure.html -http://packetstormsecurity.com/files/135859/Avast-11.1.2245-Heap-Overflow.html -http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html -http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html -http://packetstormsecurity.com/files/135886/WebSVN-2.3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html -http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html -http://packetstormsecurity.com/files/135941/Magento-1.9.2.2-RSS-Feed-Information-Disclosure.html -http://packetstormsecurity.com/files/135949/Apache-Xerces-C-XML-Parser-Buffer-Overflow.html -http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html -http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/136040/Vivint-Sky-Control-Panel-Unauthenticated-Access.html -http://packetstormsecurity.com/files/136069/Open-Xchange-Guard-2.2.0-2.0-Private-Key-Disclosure.html -http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html -http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html -http://packetstormsecurity.com/files/136090/Avast-Authenticode-Parsing-Memory-Corruption.html -http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/136172/SAP-Download-Manager-2.1.142-Weak-Encryption.html -http://packetstormsecurity.com/files/136215/Apache-ActiveMQ-5.13.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html -http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html -http://packetstormsecurity.com/files/136251/Dropbear-SSHD-xauth-Command-Injection-Bypass.html -http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html -http://packetstormsecurity.com/files/136276/FreeBSD-Kernel-amd64_set_ldt-Heap-Overflow.html -http://packetstormsecurity.com/files/136280/Grandstream-Wave-1.0.1.26-Man-In-The-Middle.html -http://packetstormsecurity.com/files/136290/Grandstream-Wave-1.0.1.26-TLS-Man-In-The-Middle.html -http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html -http://packetstormsecurity.com/files/136293/Solarwinds-Dameware-Mini-Remote-Code-Execution.html -http://packetstormsecurity.com/files/136323/Wildfly-Filter-Restriction-Bypass-Information-Disclosure.html -http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html -http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html -http://packetstormsecurity.com/files/136433/Apache-OpenMeetings-3.0.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html -http://packetstormsecurity.com/files/136461/BMC-Server-Automation-BSA-RSCD-Agent-User-Enumeration.html -http://packetstormsecurity.com/files/136462/BMC-Server-Automation-BSA-RSCD-Agent-Unauthorized-Password-Reset.html -http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html -http://packetstormsecurity.com/files/136484/Apache-OpenMeetings-3.1.0-Path-Traversal.html -http://packetstormsecurity.com/files/136489/Apache-Jetspeed-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/136543/Open-Xchange-7.8.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html -http://packetstormsecurity.com/files/136548/DotCMS-3.3-SQL-Injection.html -http://packetstormsecurity.com/files/136553/Optipng-Invalid-Write.html -http://packetstormsecurity.com/files/136561/Sophos-Cyberoam-NG-Series-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/136563/Hexchat-IRC-Client-2.11.0-CAP-LS-Handling-Buffer-Overflow.html -http://packetstormsecurity.com/files/136564/Hexchat-IRC-Client-2.11.0-Directory-Traversal.html -http://packetstormsecurity.com/files/136606/Panda-Endpoint-Administration-Agent-Privilege-Escalation.html -http://packetstormsecurity.com/files/136607/Panda-Security-URL-Filtering-Privilege-Escalation.html -http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html -http://packetstormsecurity.com/files/136638/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html -http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html -http://packetstormsecurity.com/files/136656/RSA-BSAFE-Lenstras-Attack.html -http://packetstormsecurity.com/files/136671/.NET-Framework-4.6-DLL-Hijacking.html -http://packetstormsecurity.com/files/136702/Microsoft-Internet-Explorer-11-DLL-Hijacking.html -http://packetstormsecurity.com/files/136710/KNOX-2.3-Clipboard-Data-Disclosure.html -http://packetstormsecurity.com/files/136717/Novell-ServiceDesk-Authenticated-File-Upload.html -http://packetstormsecurity.com/files/136731/Oliver-1.3.0-1.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/136734/modified-eCommerce-2.0.0.0-Rev-9678-SQL-Injection.html -http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html -http://packetstormsecurity.com/files/136758/Symantec-Brightmail-10.6.0-7-LDAP-Credential-Grabber.html -http://packetstormsecurity.com/files/136781/Shopware-Remote-Code-Execution.html -http://packetstormsecurity.com/files/136837/EMC-ViPR-SRM-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/136839/Apache-Cordova-iOS-3.9.1-Arbitrary-Plugin-Execution.html -http://packetstormsecurity.com/files/136840/Apache-Cordova-iOS-3.9.1-Access-Bypass.html -http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html -http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html -http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html -http://packetstormsecurity.com/files/136897/CMS-Made-Simple-Cache-Poisoning.html -http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html -http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html -http://packetstormsecurity.com/files/136907/McAfee-Relocation-Processing-Memory-Corruption.html -http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html -http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html -http://packetstormsecurity.com/files/136997/Aruba-Authentication-Bypass-Insecure-Transport-Tons-Of-Issues.html -http://packetstormsecurity.com/files/137020/Trend-Micro-Mobile-Security-Man-In-The-Middle.html -http://packetstormsecurity.com/files/137025/Huawei-Mobile-Broadband-HL-Service-22.001.25.00.03-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/137031/eXtplorer-2.1.9-Path-Traversal.html -http://packetstormsecurity.com/files/137035/Adobe-Reader-DC-15.010.20060-Memory-Corruption.html -http://packetstormsecurity.com/files/137045/SAP-NetWeaver-AS-JAVA-7.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137046/SAP-MII-15.0-Directory-Traversal.html -http://packetstormsecurity.com/files/137050/Adobe-Flash-MovieClip.duplicateMovieClip-Use-After-Free.html -http://packetstormsecurity.com/files/137051/Adobe-Flash-MP4-File-Stack-Corruption.html -http://packetstormsecurity.com/files/137052/Adobe-Flash-ATF-Processing-Heap-Overflow.html -http://packetstormsecurity.com/files/137053/Adobe-Flash-JXR-Processing-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/137054/Adobe-Flash-Raw-565-Texture-Processing-Overflow.html -http://packetstormsecurity.com/files/137055/Adobe-Flash-Object-Placing-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html -http://packetstormsecurity.com/files/137057/Adobe-Flash-SetNative-Use-After-Free.html -http://packetstormsecurity.com/files/137058/Adobe-Flash-addProperty-Use-After-Free.html -http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html -http://packetstormsecurity.com/files/137073/WSO2-SOA-Enablement-Server-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137094/Microsoft-Windows-gdi32.dll-Information-Disclosure.html -http://packetstormsecurity.com/files/137095/Microsoft-Windows-gdi32.dll-Data-Copy.html -http://packetstormsecurity.com/files/137096/Microsoft-Windows-gdi32.dll-ExtEscape-Buffer-Overflow.html -http://packetstormsecurity.com/files/137098/Dell-SonicWALL-Scrutinizer-11.01-methodDetail-SQL-Injection.html -http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html -http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html -http://packetstormsecurity.com/files/137129/SAP-NetWeaver-AS-JAVA-7.5-SQL-Injection.html -http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/137187/Open-Xchange-OX-AppSuite-7.8.0-XSS-Open-Redirect.html -http://packetstormsecurity.com/files/137189/VMWare-vSphere-Web-Client-6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html -http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html -http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html -http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html -http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html -http://packetstormsecurity.com/files/137221/Citrix-Netscaler-11.0-Build-64.35-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html -http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html -http://packetstormsecurity.com/files/137252/Konica-Minolta-FTP-Utility-1.0-SEH-Buffer-Overflow.html -http://packetstormsecurity.com/files/137277/Boxoft-Wav-To-MP3-Converter-1.0-Buffer-Overflow.html -http://packetstormsecurity.com/files/137279/Liferay-CE-Stored-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html -http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html -http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html -http://packetstormsecurity.com/files/137341/HP-Data-Protector-Encrypted-Communication-Remote-Command-Execution.html -http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html -http://packetstormsecurity.com/files/137373/IBM-GPFS-Spectrum-Scale-Command-Injection.html -http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html -http://packetstormsecurity.com/files/137390/Apache-CloudStack-4.5.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/137395/OS-X-iOS-Kernel-IOHDIXControllerUserClient-Use-After-Free.html -http://packetstormsecurity.com/files/137396/OS-X-Kernel-Use-After-Free-From-IOAcceleratorFamily2-Bad-Locking.html -http://packetstormsecurity.com/files/137397/OS-X-Kernel-Raw-Cast-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/137399/OS-X-CoreCaptureResponder-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/137400/OS-X-IOAccelSharedUserClient2-page_off_resource-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/137401/OS-X-AppleGraphicsDeviceControl-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/137402/OS-X-AppleMuxControl.kext-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/137403/OS-X-GeForce.kext-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/137404/Android-system-bin-sdcard-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/137469/nGrinder-3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137486/Solarwinds-Virtualization-Manager-6.3.1-Java-Deserialization.html -http://packetstormsecurity.com/files/137487/Solarwinds-Virtualization-Manager-6.3.1-Privilege-Escalation.html -http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html -http://packetstormsecurity.com/files/137502/Windows-7-win32k-Bitmap-Use-After-Free.html -http://packetstormsecurity.com/files/137503/Windows-7-win32k-Bitmap-Use-After-Free.html -http://packetstormsecurity.com/files/137525/Solarwinds-Virtualization-Manager-6.3.1-Weak-Crypto.html -http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html -http://packetstormsecurity.com/files/137528/SAP-NetWeaver-AS-JAVA-7.5-Directory-Traversal.html -http://packetstormsecurity.com/files/137529/SAP-NetWeaver-AS-JAVA-7.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137532/Adobe-Flash-Player-DLL-Hijacking.html -http://packetstormsecurity.com/files/137533/Microsoft-Internet-Explorer-11-Garbage-Collector-Attribute-Type-Confusion.html -http://packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html -http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html -http://packetstormsecurity.com/files/137579/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html -http://packetstormsecurity.com/files/137589/SAP-NetWeaver-AS-JAVA-7.4-icman-Denial-Of-Service.html -http://packetstormsecurity.com/files/137591/SAP-NetWeaver-AS-JAVA-7.4-jstart-Denial-Of-Service.html -http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html -http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html -http://packetstormsecurity.com/files/137733/Huawei-HiSuite-For-Windows-4.0.3.301-Privilege-Escalation.html -http://packetstormsecurity.com/files/137734/Ktools-Photostore-4.7.5-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html -http://packetstormsecurity.com/files/137771/Apache-2.4.20-X509-Authentication-Bypass.html -http://packetstormsecurity.com/files/137775/Acer-Portal-Android-Application-3.9.3.2006-Man-In-The-Middle.html -http://packetstormsecurity.com/files/137804/IPS-Community-Suite-4.1.12.3-PHP-Code-Injection.html -http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137894/Open-Xchange-App-Suite-7.8.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137919/SAP-NetWeaver-AS-JAVA-7.4-XXE-Injection.html -http://packetstormsecurity.com/files/137920/SAP-xMII-15-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html -http://packetstormsecurity.com/files/137970/Objective-Systems-Inc.-ASN1C-For-C-C-Heap-Memory-Corruption.html -http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html -http://packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html -http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html -http://packetstormsecurity.com/files/138061/Huawei-ISM-Professional-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/138083/AXIS-Authenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/138107/Intel-Crosswalk-Project-Man-In-The-Middle.html -http://packetstormsecurity.com/files/138113/MediaTek-Driver-Privilege-Escalation.html -http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html -http://packetstormsecurity.com/files/138210/Sophos-Mobile-Control-3.5.0.3-Open-Reverse-Proxy.html -http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html -http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html -http://packetstormsecurity.com/files/138248/Microsoft-Windows-7-Group-Policy-Privilege-Escalation.html -http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html -http://packetstormsecurity.com/files/138313/Apache-OpenMeetings-3.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/138329/WSO2-Identity-Server-5.1.0-XML-Injection.html -http://packetstormsecurity.com/files/138330/WSO2-Carbon-4.4.5-Local-File-Inclusion.html -http://packetstormsecurity.com/files/138331/WSO2-Carbon-4.4.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/138332/WSO2-Carbon-4.4.5-Cross-Site-Request-Forgery-Denial-Of-Service.html -http://packetstormsecurity.com/files/138368/GitLab-Impersonate-Privilege-Escalation.html -http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html -http://packetstormsecurity.com/files/138393/ESCALATEPLOWMAN-WatchGuard-Privilege-Escalation.html -http://packetstormsecurity.com/files/138428/SAP-HANA-1.00.091.00.1418659308-Information-Disclosure.html -http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html -http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html -http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html -http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html -http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html -http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html -http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html -http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html -http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html -http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html -http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html -http://packetstormsecurity.com/files/138456/SAP-HANA-SPS09-1.00.091.00.1418659308-EXPORT-Information-Disclosure.html -http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html -http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html -http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html -http://packetstormsecurity.com/files/138508/JD-Edwards-9.1-EnterpriseOne-Server-Manager-Shutdown.html -http://packetstormsecurity.com/files/138509/JD-Edwards-9.1-EnterpriseOne-Server-Create-Users.html -http://packetstormsecurity.com/files/138510/JD-Edwards-9.1-EnterpriseOne-Server-Denial-Of-Service.html -http://packetstormsecurity.com/files/138511/JD-Edwards-9.1-EnterpriseOne-Server-Password-Disclosure.html -http://packetstormsecurity.com/files/138512/JD-Edwards-9.1-EnterpriseOne-Server-JDENET-Denial-Of-Service.html -http://packetstormsecurity.com/files/138531/Adobe-Flash-BitmapData.copyPixels-Use-After-Free.html -http://packetstormsecurity.com/files/138532/Adobe-Flash-MovieClip-Transform-Use-After-Free.html -http://packetstormsecurity.com/files/138564/Oracle-E-Business-Suite-12.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/138600/BMC-BladeLogic-Server-Automation-For-Linux-8.7-Directory-Dump.html -http://packetstormsecurity.com/files/138615/Infoblox-7.0.1-CRLF-Injection-HTTP-Response-Splitting.html -http://packetstormsecurity.com/files/138618/ffmpeg-3.1.2-Heap-Overflow.html -http://packetstormsecurity.com/files/138700/Open-Xchange-App-Suite-7.8.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html -http://packetstormsecurity.com/files/138755/ZooKeeper-3.4.8-3.5.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/138809/jsch-0.1.53-Path-Traversal.html -http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html -http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html -http://packetstormsecurity.com/files/138920/Apache-MyFaces-Trinidad-Information-Disclosure.html -http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html -http://packetstormsecurity.com/files/139006/Symantec-Web-Gateway-5.2.2-OS-Command-Injection.html -http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html -http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html -http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html -http://packetstormsecurity.com/files/139096/SAP-SLDREG-Memory-Corruption.html -http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html -http://packetstormsecurity.com/files/139212/Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection-2.html -http://packetstormsecurity.com/files/139259/Oracle-Netbeans-IDE-8.1-Directory-Traversal.html -http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html -http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html -http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html -http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html -http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html -http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html -http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/139660/CA-Service-Desk-Manaager-12.9-14.1-Code-Execution.html -http://packetstormsecurity.com/files/139661/CA-Unified-Infrastructure-Management-Bypass-Traversal-Disclosure.html -http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html -http://packetstormsecurity.com/files/139750/Nginx-Debian-Based-Distros-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html -http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html -http://packetstormsecurity.com/files/139991/Microsoft-Edge-JSON.parse-Information-Leak.html -http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html -http://packetstormsecurity.com/files/140043/Microsoft-Edge-CBase-Scriptable-Private-Query-Interface-Memory-Corruption.html -http://packetstormsecurity.com/files/140050/Microsoft-Internet-Explorer-9-jscript9-JavaScriptStackWalker-Memory-Corruption.html -http://packetstormsecurity.com/files/140062/PwC-ACE-Software-For-SAP-Security-8.10.304-ABAP-Injection.html -http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html -http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html -http://packetstormsecurity.com/files/140071/Cisco-Unified-Communications-Manager-7-8-9-Directory-Traversal.html -http://packetstormsecurity.com/files/140092/Microsoft-Internet-Explorer-9-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html -http://packetstormsecurity.com/files/140094/Microsoft-Internet-Explorer-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html -http://packetstormsecurity.com/files/140098/Symantec-VIP-Access-Arbitrary-DLL-Execution.html -http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html -http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html -http://packetstormsecurity.com/files/140164/Adobe-Animate-15.2.1.95-Buffer-Overflow.html -http://packetstormsecurity.com/files/140166/Microsoft-Internet-Explorer-9-IEFRAME-CMarkup..RemovePointerPos-Use-After-Free.html -http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html -http://packetstormsecurity.com/files/140172/Microsoft-Windows-Type-1-Font-Processing-Privilege-Escalation.html -http://packetstormsecurity.com/files/140186/Microsoft-Internet-Explorer-9-IEFRAME-CView-EnsureSize-Use-After-Free.html -http://packetstormsecurity.com/files/140191/DCMTK-storescp-DICOM-storage-C-STORE-SCP-Remote-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/140232/SAP-Solman-7.31-Information-Disclosure.html -http://packetstormsecurity.com/files/140233/Microsoft-Internet-Explorer-11-MSHTML-CSpliceTreeEngine-RemoveSplice-Use-After-Free.html -http://packetstormsecurity.com/files/140240/FreeBSD-Security-Advisory-FreeBSD-SA-16.39.ntp.html -http://packetstormsecurity.com/files/140250/Microsoft-Edge-SIMD.toLocaleString-Uninitialized-Memory.html -http://packetstormsecurity.com/files/140251/Microsoft-Edge-Internationalization-Type-Confusion.html -http://packetstormsecurity.com/files/140258/Microsoft-Internet-Explorer-11-MSHTML-CPasteCommand-ConvertBitmaptoPng-Buffer-Overflow.html -http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html -http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html -http://packetstormsecurity.com/files/140290/SwiftMailer-Remote-Code-Execution.html -http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html -http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html -http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html -http://packetstormsecurity.com/files/140463/Adobe-Flash-24.0.0.186-Code-Execution.html -http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html -http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html -http://packetstormsecurity.com/files/140548/Atlassian-Jira-7.1.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/140610/SAP-ASE-ODATA-Server-16-Denial-Of-Service.html -http://packetstormsecurity.com/files/140611/SAP-NetWeaver-AS-Java-P4-MSPRUNTIMEINTERFACE-Information-Disclosure.html -http://packetstormsecurity.com/files/140759/Man-db-2.6.7.1-Privilege-Escalation.html -http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/140994/Microsoft-Edge-TypedArray.sort-Use-After-Free.html -http://packetstormsecurity.com/files/141017/Ticketbleed-F5-TLS-Information-Disclosure.html -http://packetstormsecurity.com/files/141043/Kodi-17.1-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html -http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html -http://packetstormsecurity.com/files/141299/EasyCom-AS400-PHP-API-Buffer-Overflow.html -http://packetstormsecurity.com/files/141300/EasyCom-SQL-iPlug-Denial-Of-Service.html -http://packetstormsecurity.com/files/141349/SAP-BusinessObjects-Financial-Consolidation-10.0.0.1933-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/141366/Amazon-Kindle-DLL-Hijacking.html -http://packetstormsecurity.com/files/141396/Synchronet-BBS-3.16c-For-Windows-Denial-Of-Service.html -http://packetstormsecurity.com/files/141456/FTPShell-Client-6.53-Buffer-Overflow.html -http://packetstormsecurity.com/files/141502/Azure-Data-Expert-Ultimate-2.2.16-Buffer-Overflow.html -http://packetstormsecurity.com/files/141526/USBPcap-1.1.0.0-Privilege-Escalation.html -http://packetstormsecurity.com/files/141567/FTP-Voyager-Scheduler-16.2.0-CSRF-Denial-Of-Service.html -http://packetstormsecurity.com/files/141575/Kinseys-Infor-Lawson-SQL-Injection.html -http://packetstormsecurity.com/files/141582/MobaXterm-Personal-Edition-9.4-Path-Traversal.html -http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html -http://packetstormsecurity.com/files/141651/USB-Pratirodh-Insecure-Password-Storage.html -http://packetstormsecurity.com/files/141652/USB-Pratirodh-XXE-Injection.html -http://packetstormsecurity.com/files/141674/AXIS-Network-Camera-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/141689/MetInfo-5.3.15-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html -http://packetstormsecurity.com/files/141803/Broadcom-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html -http://packetstormsecurity.com/files/142012/Kony-EMM-4.2.0-Private-Key-Disclosure.html -http://packetstormsecurity.com/files/142074/Moxa-MXview-2.8-Private-Key-Disclosure.html -http://packetstormsecurity.com/files/142095/Quest-Privilege-Manager-6.0.0-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html -http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html -http://packetstormsecurity.com/files/142215/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-upload.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142216/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_system.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142217/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142218/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_dlp.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142219/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_dae.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142220/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-hotfix_upload.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142221/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-dlp_policy_upload.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142222/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-detected_potential_files.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142223/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-admin_sys_time.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142224/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-admin_sys_time.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142227/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-Session-Generation-Authentication-Bypass.html -http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html -http://packetstormsecurity.com/files/142486/Vanilla-Forums-2.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/142597/SAP-Business-One-For-Android-1.2.3-XML-Injection.html -http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html -http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html -http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html -http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/142795/Subsonic-6.1.1-XML-External-Entity-Attack.html -http://packetstormsecurity.com/files/142796/Subsonic-6.1.1-Persistent-XSS.html -http://packetstormsecurity.com/files/143014/Ektron-CMS-9.10SP1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/143053/TeamSpeak-Client-3.1.4-Buffer-Overflow.html -http://packetstormsecurity.com/files/143103/Blackcat-CMS-1.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html -http://packetstormsecurity.com/files/143481/Compulab-Intense-PC-MintBox-2-Signature-Verification.html -http://packetstormsecurity.com/files/143516/Razer-Synapse-2.20-DLL-Hijacking.html -http://packetstormsecurity.com/files/143518/libjpeg-turbo-1.5.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html -http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html -http://packetstormsecurity.com/files/143746/Quali-CloudShell-7.1.0.6508-Patch-6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/143758/Apache-Sling-Servlets-Post-2.3.20-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html -http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html -http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html -http://packetstormsecurity.com/files/143949/VX-Search-Enterprise-10.0.14-Buffer-Overflow.html -http://packetstormsecurity.com/files/143975/Lexmark-Scan-To-Network-SNF-3.2.9-Information-Disclosure.html -http://packetstormsecurity.com/files/143978/Wireless-Repeater-BE126-Remote-Code-Execution.html -http://packetstormsecurity.com/files/144022/FiberHome-Unauthenticated-ADSL-Router-Factory-Reset.html -http://packetstormsecurity.com/files/144045/Jungo-DriverWizard-WinDrive-OOB-Write-Privilege-Escalation.html -http://packetstormsecurity.com/files/144046/Jungo-DriverWizard-WinDrive-Overflow.html -http://packetstormsecurity.com/files/144257/DlxSpot-SQL-Injection.html -http://packetstormsecurity.com/files/144258/DlxSpot-Shell-Upload.html -http://packetstormsecurity.com/files/144259/DlxSpot-Hardcoded-Password.html -http://packetstormsecurity.com/files/144328/Broadcom-802.11k-Neighbor-Report-Response-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/144329/Broadcom-802.11r-FT-Reassociation-Response-Overflows.html -http://packetstormsecurity.com/files/144332/Adobe-Flash-appleToRange-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/144398/TrendMicro-OfficeScan-11.0-XG-12.0-Encryption-Key-Disclosure.html -http://packetstormsecurity.com/files/144400/TrendMicro-OfficeScan-11.0-XG-12.0-Man-In-The-Middle.html -http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html -http://packetstormsecurity.com/files/144402/TrendMicro-OfficeScan-11.0-XG-12.0-Information-Disclosure.html -http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html -http://packetstormsecurity.com/files/144452/Sync-Breeze-Enterprise-10.0.28-Buffer-Overflow.html -http://packetstormsecurity.com/files/144461/Broadcom-ICMPv6-Information-Leak.html -http://packetstormsecurity.com/files/144464/TrendMicro-OfficeScan-11.0-XG-12.0-Memory-Corruption.html -http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html -http://packetstormsecurity.com/files/144527/Lansweeper-6.0.100.29-XXE-Injection.html -http://packetstormsecurity.com/files/144590/ASX-To-MP3-3.1.3.7-Buffer-Overflow.html -http://packetstormsecurity.com/files/144617/AlienVault-USM-5.4.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html -http://packetstormsecurity.com/files/144786/Watchdog-Development-Anti-Malware-Online-Security-Pro-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/144882/Avaya-IP-Office-IPO-10.1-Active-X-Buffer-Overflow.html -http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html -http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/144908/Debut-Embedded-httpd-1.20-Denial-Of-Service.html -http://packetstormsecurity.com/files/144955/IKARUS-AntiVirus-2.16.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html -http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html -http://packetstormsecurity.com/files/145096/CSC-Cart-4.6.2-Shell-Upload.html -http://packetstormsecurity.com/files/145121/ZTE-ZXDSL-831-Unauthorized-Configuration-Access-Bypass.html -http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html -http://packetstormsecurity.com/files/145159/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/145160/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/145182/MistServer-2.12-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/145183/Artica-Web-Proxy-3.06.112216-Remote-Code-Execution.html -http://packetstormsecurity.com/files/145230/Perspective-ICM-Investigation-And-Case-5.1.1.16-Privilege-Escalation.html -http://packetstormsecurity.com/files/145231/Techno-Portfolio-Management-Panel-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/145237/Readymade-Classifieds-Script-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html -http://packetstormsecurity.com/files/145388/Meinberg-LANTIME-Web-Configuration-Utility-6.16.008-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/145435/Sync-Breeze-10.2.12-Denial-Of-Service.html -http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html -http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html -http://packetstormsecurity.com/files/145510/Samsung-Internet-Browser-SOP-Bypass.html -http://packetstormsecurity.com/files/145517/ServersCheck-Monitoring-Software-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/145548/ZyXEL-P-660HW-TTL-Expiry-Denial-Of-Service.html -http://packetstormsecurity.com/files/145639/Xplico-Remote-Code-Execution.html -http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html -http://packetstormsecurity.com/files/145731/BarcodeWiz-ActiveX-Control-Buffer-Overflow.html -http://packetstormsecurity.com/files/145756/DiskBoss-Enterprise-8.5.12-Denial-Of-Service.html -http://packetstormsecurity.com/files/145760/Sync-Breeze-Enterprise-10.1.16-Denial-Of-Service.html -http://packetstormsecurity.com/files/145763/Disk-Pulse-Enterprise-10.1.18-Denial-Of-Service.html -http://packetstormsecurity.com/files/145764/VX-Search-Enterprise-10.1.12-Denial-Of-Service.html -http://packetstormsecurity.com/files/145770/Yawcam-0.6.0-Directory-Traversal.html -http://packetstormsecurity.com/files/145775/Office-Tracker-11.2.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/145825/DiskBoss-Enterprise-8.8.16-Buffer-Overflow.html -http://packetstormsecurity.com/files/145833/WordPress-Events-Calendar-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html -http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html -http://packetstormsecurity.com/files/145863/ZyXEL-P-660HW-UDP-Denial-Of-Service.html -http://packetstormsecurity.com/files/145872/Xnami-Image-Sharing-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/145900/SysGauge-Server-3.6.18-Buffer-Overflow.html -http://packetstormsecurity.com/files/145902/RISE-1.9-SQL-Injection.html -http://packetstormsecurity.com/files/145903/PerfexCRM-1.9.7-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html -http://packetstormsecurity.com/files/145940/Reservo-Image-Hosting-Script-1.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146033/CMS-Made-Simple-2.2.5-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146034/CMS-Made-Simple-2.2.5-moduleinterface.php-title-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146035/CMS-Made-Simple-2.2.5-moduleinterface.php-m1_errors-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146037/PHPFreeChat-1.7-Denial-Of-Service.html -http://packetstormsecurity.com/files/146071/Professional-Local-Directory-Script-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html -http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html -http://packetstormsecurity.com/files/146158/Arq-5.10-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/146159/Arq-5.10-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/146165/System-Shield-5.0.0.136-Privilege-Escalation.html -http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/146254/Online-Voting-System-Authentication-Bypass.html -http://packetstormsecurity.com/files/146267/WINCVS-2009R2-DLL-Hijacking.html -http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html -http://packetstormsecurity.com/files/146373/NAT32-Build-22284-Remote-Command-Execution.html -http://packetstormsecurity.com/files/146402/NAT32-Build-22284-Remote-Command-Execution-CSRF.html -http://packetstormsecurity.com/files/146418/EPIC-MyChart-SQL-Injection.html -http://packetstormsecurity.com/files/146422/Joomla-Kubik-Rubik-SIGE-3.2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146454/Joomla-Project-Log-1.5.3-SQL-Injection.html -http://packetstormsecurity.com/files/146541/Disk-Savvy-Enterprise-10.4.18-Buffer-Overflow.html -http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html -http://packetstormsecurity.com/files/146645/Softros-Network-Time-System-Server-2.3.4-Denial-Of-Service.html -http://packetstormsecurity.com/files/146668/Rapid-Scada-5.5.0-Insecure-Permissions.html -http://packetstormsecurity.com/files/146697/WebLog-Expert-Web-Server-Enterprise-9.4-Weak-Permissions.html -http://packetstormsecurity.com/files/146698/WebLog-Expert-Web-Server-Enterprise-9.4-Denial-Of-Service.html -http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146938/TwonkyMedia-Server-7.0.11-8.5-Directory-Traversal.html -http://packetstormsecurity.com/files/146939/TwonkyMedia-Server-7.0.11-8.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/146999/DotNetNuke-DNNarticle-Directory-Traversal.html -http://packetstormsecurity.com/files/147183/MikroTik-6.41.4-Denial-Of-Service.html -http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147242/Digital-Guardian-Management-Console-7.1.2.0015-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html -http://packetstormsecurity.com/files/147246/Easy-File-Sharing-Web-Server-7.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html -http://packetstormsecurity.com/files/147257/WordPress-Caldera-Forms-1.5.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147260/Digital-Guardian-Management-Console-7.1.2.0015-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/147261/Digital-Guardian-Management-Console-7.1.2.0015-XXE-Injection.html -http://packetstormsecurity.com/files/147330/WSO2-Identity-Server-5.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147333/WordPress-UK-Cookie-Consent-2.3.9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147362/Shopy-Point-Of-Sale-1.0-CSV-Injection.html -http://packetstormsecurity.com/files/147363/Blog-Master-Pro-1.0-CSV-Injection.html -http://packetstormsecurity.com/files/147364/HRSALE-The-Ultimate-HRM-1.0.2-CSV-Injection.html -http://packetstormsecurity.com/files/147366/HRSALE-The-Ultimate-HRM-1.0.2-SQL-Injection.html -http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html -http://packetstormsecurity.com/files/147382/HRSALE-The-Ultimate-HRM-1.0.2-Local-File-Inclusion.html -http://packetstormsecurity.com/files/147383/HRSALE-The-Ultimate-HRM-1.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147505/IceWarp-Mail-Server-Directory-Traversal.html -http://packetstormsecurity.com/files/147516/DeviceLock-Plug-And-Play-Auditor-5.72-Buffer-Overflow.html -http://packetstormsecurity.com/files/147538/2345-Security-Guard-3.7-Denial-Of-Service.html -http://packetstormsecurity.com/files/147553/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Scripting-Add-FTP-Account.html -http://packetstormsecurity.com/files/147554/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Scripting-Cookie-Theft.html -http://packetstormsecurity.com/files/147555/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/147556/Easy-Hosting-Control-Panel-0.37.12.b-Insecure-Cryptography.html -http://packetstormsecurity.com/files/147557/Easy-Hosting-Control-Panel-0.37.12.b-Clear-Text-Password-Storage.html -http://packetstormsecurity.com/files/147558/Easy-Hosting-Control-Panel-0.37.12.b-Unverified-Password-Change.html -http://packetstormsecurity.com/files/147571/Fastweb-FASTGate-0.00.47-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/147573/ModbusPal-1.6b-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147637/Totemomail-Encryption-Gateway-6.0.0_Build_371-JSONP-Hijacking.html -http://packetstormsecurity.com/files/147648/Totemomail-Encryption-Gateway-6.0.0_Build_371-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/147687/MagniComp-SysInfo-Information-Exposure.html -http://packetstormsecurity.com/files/147708/D-Link-DSL-3782-Authentication-Bypass.html -http://packetstormsecurity.com/files/147726/ILIAS-5.3.2-5.2.14-5.1.25-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/147841/Samsung-Galaxy-S7-Edge-OMACP-WbXml-String-Extension-Processing-Overflow.html -http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Shell-Upload.html -http://packetstormsecurity.com/files/147977/SearchBlox-8.6.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/147978/Yosoro-1.0.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html -http://packetstormsecurity.com/files/148032/SearchBlox-8.6.7-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/148057/Ignite-Realtime-Openfire-3.7.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/148113/libpff-2018-04-28-Information-Disclosure.html -http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html -http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html -http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html -http://packetstormsecurity.com/files/148125/SensioLabs-Symfony-3.3.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/148126/WebCTRL-Out-Of-Band-XML-Injection.html -http://packetstormsecurity.com/files/148127/Joomla-2.4.0-Gridbox-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html -http://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/148274/IPConfigure-Orchid-VMS-2.0.5-Directory-Traversal-Information-Disclosure.html -http://packetstormsecurity.com/files/148312/Polaris-Office-2017-8.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html -http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/148389/Microsoft-Forefront-Unified-Access-Gateway-2010-External-DNS-Interaction.html -http://packetstormsecurity.com/files/148424/ADB-Local-Root-Jailbreak.html -http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html -http://packetstormsecurity.com/files/148430/ADB-Group-Manipulation-Privilege-Escalation.html -http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html -http://packetstormsecurity.com/files/148537/Zeta-Producer-Desktop-CMS-14.2.0-Code-Execution-File-Disclosure.html -http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html -http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html -http://packetstormsecurity.com/files/148661/PDFunite-0.62.0-Buffer-Overflow.html -http://packetstormsecurity.com/files/148742/Responsive-Filemanager-9.13.1-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/148836/Monstra-Dev-3.0.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/148855/man-cgi-Local-File-Inclusion.html -http://packetstormsecurity.com/files/148871/MyBB-Thank-You-Like-3.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html -http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/149002/Geutebruck-re_porter-16-Credential-Disclosure.html -http://packetstormsecurity.com/files/149003/Geutebruck-re_porter-16-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149007/BMC-MyIT-Java-System-Solutions-SSO-Plugin-4.0.13.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149018/Easylogin-Pro-1.3.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/149065/Mutiny-Monitoring-Appliance-Command-Injection.html -http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/149097/ManageEngine-ADManager-Plus-6.5.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149109/CMS-ISWEB-3.5.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149134/Argus-Surveillance-DVR-4.0.0.0-Directory-Traversal.html -http://packetstormsecurity.com/files/149195/FsPro-Labs-Event-Log-Explorer-4.6.1.2115-XML-Injection.html -http://packetstormsecurity.com/files/149196/MIWiFi-Xiaomi_55DD-2.8.50-Out-Of-Band-Resource-Load.html -http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html -http://packetstormsecurity.com/files/149267/Subsonic-Music-Streamer-4.4-For-Android-Improper-Certificate-Validation.html -http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.html -http://packetstormsecurity.com/files/149324/SynaMan-4.0-Build-1488-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149326/SynaMan-40-Build-1488-SMTP-Credential-Disclosure.html -http://packetstormsecurity.com/files/149351/Tor-Browser-SMB-Deanonymization-Information-Disclosure.html -http://packetstormsecurity.com/files/149376/Microsoft-ADFS-4.0-Windows-Server-2016-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/149411/Rollup-18-For-Microsoft-Exchange-Server-2010-SP3-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/149435/LimeSurvey-3.14.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149436/ManageEngine-Desktop-Central-10.0.271-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149438/ManageEngine-SupportCenter-Plus-8.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149441/RICOH-SP-4510SF-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149443/RICOH-MP-2001-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html -http://packetstormsecurity.com/files/149468/Antidote-9.5.1-Code-Execution.html -http://packetstormsecurity.com/files/149492/EE-4GEE-Mini-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/149493/RICOH-MP-C406Z-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149494/RICOH-MP-C1803-JPN-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149495/RICOH-MP-C6503-Plus-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149496/RICOH-Aficio-MP-301-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149497/RICOH-MP-C307-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149501/RICOH-MP-305-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149502/RICOH-MP-C2003-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149505/RICOH-MP-C6003-Printer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149519/Super-Cms-Blog-Pro-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/149520/Joomla-Raffle-Factory-3.5.2-SQL-Injection.html -http://packetstormsecurity.com/files/149521/Joomla-Music-Collection-3.0.3-SQL-Injection.html -http://packetstormsecurity.com/files/149522/Joomla-Penny-Auction-Factory-2.0.4-SQL-Injection.html -http://packetstormsecurity.com/files/149523/Joomla-Questions-1.4.3-SQL-Injection.html -http://packetstormsecurity.com/files/149524/Joomla-Jobs-Factory-2.0.4-SQL-Injection.html -http://packetstormsecurity.com/files/149525/Joomla-Social-Factory-3.8.3-SQL-Injection.html -http://packetstormsecurity.com/files/149529/Joomla-Swap-Factory-2.2.1-SQL-Injection.html -http://packetstormsecurity.com/files/149530/Joomla-Collection-Factory-4.1.9-SQL-Injection.html -http://packetstormsecurity.com/files/149531/Joomla-Reverse-Auction-Factory-4.3.8-SQL-Injection.html -http://packetstormsecurity.com/files/149532/Joomla-AlphaIndex-Dictionaries-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/149533/Joomla-Article-Factory-Manager-4.3.9-SQL-Injection.html -http://packetstormsecurity.com/files/149534/Joomla-Timetable-Schedule-3.6.8-SQL-Injection.html -http://packetstormsecurity.com/files/149571/CMS-ISWEB-3.5.3-SQL-Injection.html -http://packetstormsecurity.com/files/149592/Airties-AIR5343v2-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149593/Airties-AIR5442-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149594/Airties-AIR5443v2-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149595/Airties-AIR5453-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149597/ManageEngine-AssetExplorer-6.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149598/Airties-AIR5021-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149599/Airties-AIR5650-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149600/Airties-AIR5750-1.0.0.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149614/Ivanti-Workspace-Control-Application-PowerGrid-SEE-Whitelist-Bypass.html -http://packetstormsecurity.com/files/149615/Ivanti-Workspace-Control-Named-Pipe-Privilege-Escalation.html -http://packetstormsecurity.com/files/149616/Ivanti-Workspace-Control-Registry-Stored-Credentials.html -http://packetstormsecurity.com/files/149617/Ivanti-Workspace-Control-UNC-Path-Data-Security-Bypass.html -http://packetstormsecurity.com/files/149647/Coaster-CMS-5.5.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149651/Collaboration-Compliance-And-Quality-Management-Platform-9.1.1.5482-Disclosure.html -http://packetstormsecurity.com/files/149652/Collaboration-Compliance-And-Quality-Management-Platform-9.1.1.5482-Improper-Access-Control.html -http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html -http://packetstormsecurity.com/files/149771/LUYA-CMS-1.0.12-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149772/CAMALEON-CMS-2.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html -http://packetstormsecurity.com/files/149779/Teltonika-RUT9XX-Missing-Access-Control-To-UART-Root-Terminal.html -http://packetstormsecurity.com/files/149781/Teltonika-RUT9XX-Reflected-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149784/NoMachine-5.3.26-Remote-Code-Execution.html -http://packetstormsecurity.com/files/149787/Alchemy-CMS-4.1-Stable-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149788/BigTree-CMS-4.2.23-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149805/Library-CMS-2.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149806/WordPress-Support-Board-1.2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149841/LANGO-Codeigniter-Multilingual-Script-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149842/Ekushey-Project-Manager-CRM-3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149850/User-Management-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149851/Zenar-Content-Management-System-8.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/149867/WiFiRanger-7.0.8rc3-Incorrect-Access-Control-Privilege-Escalation.html -http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/149897/VestaCP-0.9.8-22-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149900/Bitdefender-GravityZone-Installer-Signature-Bypass-Code-Execution.html -http://packetstormsecurity.com/files/149907/ServersCheck-Monitoring-Software-14.3.3-Arbitrary-File-Write-DoS.html -http://packetstormsecurity.com/files/149914/ServersCheck-Monitoring-Software-14.3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149916/CommuniGatePro-Pronto-Webmail-6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/149978/Shell-In-A-Box-2.2.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/149981/WordPress-Arforms-3.5.1-Arbitrary-File-Delete.html -http://packetstormsecurity.com/files/149986/Local-Server-1.0.9-Denial-Of-Service.html -http://packetstormsecurity.com/files/149987/Library-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/149996/School-Equipment-Monitoring-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html -http://packetstormsecurity.com/files/150004/SaltOS-Erp-Crm-3.1-r8126-SQL-Injection.html -http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html -http://packetstormsecurity.com/files/150006/School-Event-Management-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/150007/School-Event-Management-System-1.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/150008/School-Attendance-Monitoring-System-1.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/150009/School-Attendance-Monitoring-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/150010/School-Attendance-Monitoring-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150011/Curriculum-Evaluation-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150012/Bakeshop-Inventory-System-In-VB.Net-MS-Access-Database-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150013/Point-Of-Sales-POS-In-VB.Net-MYSQL-Database-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150014/School-Event-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150015/Modbus-Slave-7.0.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/150016/K-iwi-Framework-1775-SQL-Injection.html -http://packetstormsecurity.com/files/150017/E-Negosyo-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150018/RhinOS-CMS-3.x-Arbitrary-File-Download.html -http://packetstormsecurity.com/files/150019/PayPal-Credit-Card-Debit-Card-Payment-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html -http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150135/Loadbalancer.org-Enterprise-VA-MAX-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html -http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html -http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html -http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html -http://packetstormsecurity.com/files/150174/PCManFTPD-2.0.7-Server-APPE-Command-Buffer-Overflow.html -http://packetstormsecurity.com/files/150242/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-Man-In-The-Middle.html -http://packetstormsecurity.com/files/150243/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/150244/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-DLL-Hijacking.html -http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/150262/Netscape-Enterprise-3.63-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150263/Vignette-Content-Management-6-Security-Bypass.html -http://packetstormsecurity.com/files/150284/Android-5.0-Battery-Information-Broadcast-Information-Disclosure.html -http://packetstormsecurity.com/files/150323/SwitchVPN-For-MacOS-2.1012.03-Privilege-Escalation.html -http://packetstormsecurity.com/files/150330/OCS-Inventory-NG-ocsreports-Shell-Upload.html -http://packetstormsecurity.com/files/150391/Budabot-4.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html -http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html -http://packetstormsecurity.com/files/150444/Oracle-Secure-Global-Desktop-Administration-Console-4.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150492/BMC-Remedy-7.1-User-Impersonation.html -http://packetstormsecurity.com/files/150496/SonarSource-SonarQube-7.3-Information-Disclosure.html -http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html -http://packetstormsecurity.com/files/150535/Moxa-NPort-W2x50A-2.1-OS-Command-Injection.html -http://packetstormsecurity.com/files/150541/Tarantella-Enterprise-Directory-Traversal.html -http://packetstormsecurity.com/files/150542/Tarantella-Enterprise-Security-Bypass.html -http://packetstormsecurity.com/files/150549/ATool-1.0.0.22-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html -http://packetstormsecurity.com/files/150608/FreshRSS-1.11.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150610/NEC-Univerge-Sv9100-WebPro-6.00.00-Predictable-Session-ID-Cleartext-Passwords.html -http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html -http://packetstormsecurity.com/files/150623/Dolibarr-ERP-CRM-8.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150643/OSclass-3.7.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150657/Plikli-4.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html -http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150750/PrinterOn-Enterprise-4.1.4-Arbitrary-File-Deletion.html -http://packetstormsecurity.com/files/150810/KARMA-6.0.0-SQL-Injection.html -http://packetstormsecurity.com/files/150826/SDL-Web-Content-Manager-8.5.0-XML-Injection.html -http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html -http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html -http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html -http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html -http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html -http://packetstormsecurity.com/files/150918/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/150990/ImpressCMS-1.3.10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151005/Microweber-1.0.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html -http://packetstormsecurity.com/files/151018/Base-Soundtouch-18.1.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151021/BMC-Remedy-ITAM-7.1.00-9.1.02.003-Information-Disclosure.html -http://packetstormsecurity.com/files/151028/TWiki-6.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151031/KioWare-Server-4.9.6-Privilege-Escalation.html -http://packetstormsecurity.com/files/151033/Roxy-Fileman-1.4.5-File-Upload-Directory-Traversal.html -http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html -http://packetstormsecurity.com/files/151052/ZenPhoto-1.4.14-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html -http://packetstormsecurity.com/files/151063/BlogEngine-3.3-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html -http://packetstormsecurity.com/files/151115/AudioCode-400HD-Cross-Site-scripting.html -http://packetstormsecurity.com/files/151116/AudioCode-400HD-Remote-Command-Injection.html -http://packetstormsecurity.com/files/151117/PORTIER-4.4.4.2-4.4.4.6-SQL-Injection.html -http://packetstormsecurity.com/files/151118/PORTIER-4.4.4.2-4.4.4.6-Cryptographic-Issues.html -http://packetstormsecurity.com/files/151119/HMS-Netbiter-WS100-3.30.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151144/Webmin-1.890-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html -http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html -http://packetstormsecurity.com/files/151237/Kentix-MultiSensor-LAN-5.63.00-Authentication-Bypass.html -http://packetstormsecurity.com/files/151243/Open-Xchange-OX-App-Suite-Cross-Site-Scripting-SSRF.html -http://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html -http://packetstormsecurity.com/files/151275/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151304/DNN-9.1-XML-Related-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151305/Abantecart-1.2.12-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151306/Coppermine-1.5.46-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html -http://packetstormsecurity.com/files/151327/SirsiDynix-e-Library-3.5.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151333/Podcast-Generator-2.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151335/Lua-5.3.5-Use-After-Free.html -http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html -http://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151373/LongBox-Limited-Access-Manager-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/151377/Sricam-gSOAP-2.8-Denial-Of-Service.html -http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/151466/Pages-For-Bitbucket-Server-2.6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151467/COYO-9.0.8-10.0.11-12.0.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151472/Zimbra-Collaboration-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151473/SolarWinds-Serv-U-FTP-15.1.6-Privilege-Escalation.html -http://packetstormsecurity.com/files/151474/SolarWinds-Serv-U-FTP-15.1.6.25-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151524/Qkr-With-MasterPass-Man-In-The-Middle.html -http://packetstormsecurity.com/files/151550/Zyxel-VMG3312-B10B-DSL-491HNU-B1-V2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151553/OpenMRS-Platform-Insecure-Object-Deserialization.html -http://packetstormsecurity.com/files/151582/OpenText-Documentum-Webtop-5.3-SP2-Open-Redirect.html -http://packetstormsecurity.com/files/151583/Ericsson-Active-Library-Explorer-ALEX-14.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html -http://packetstormsecurity.com/files/151590/Avast-Anti-Virus-Local-Credential-Disclosure.html -http://packetstormsecurity.com/files/151595/Coship-Wireless-Router-4.0.0.x-5.0.0.x-Authentication-Bypass.html -http://packetstormsecurity.com/files/151608/Skyworth-GPON-HomeGateways-Optical-Network-Stack-Overflow.html -http://packetstormsecurity.com/files/151628/BlogEngine.NET-3.3.6-Directory-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/151630/CentOS-Web-Panel-0.9.8.763-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151647/SYSTORME-ISG-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151648/SYSTORME-ISG-Command-Injection.html -http://packetstormsecurity.com/files/151649/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html -http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html -http://packetstormsecurity.com/files/151651/Nokia-8810-Denial-Of-Service.html -http://packetstormsecurity.com/files/151654/Jiofi-4-JMR-1140-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151655/Jiofi-4-JMR-1140-WiFi-Password-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151656/Jiofi-4-JMR-1140-Admin-Token-Disclosure-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151657/Rukovoditel-Project-Management-CRM-2.4.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151692/WordPress-Booking-Calendar-8.4.3-SQL-Injection.html -http://packetstormsecurity.com/files/151694/LayerBB-1.1.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/151704/MyBB-Trash-Bin-1.1.3-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html -http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html -http://packetstormsecurity.com/files/151719/Digi-TransPort-LR54-Restricted-Shell-Escape.html -http://packetstormsecurity.com/files/151723/qdPM-9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151725/Master-IP-CAM-01-3.3.4.2103-Remote-Command-Execution.html -http://packetstormsecurity.com/files/151733/HTMLy-2.7.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151756/XAMPP-5.6.8-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html -http://packetstormsecurity.com/files/151763/Webiness-Inventory-2.3-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/151779/HotelDruid-2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151799/Advanced-Comment-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151800/VertrigoServ-2.17-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html -http://packetstormsecurity.com/files/151945/SAP-J2EE-Engine-7.01-Portal-EPP-Protocol-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/151946/SAP-J2EE-Engine-7.01-Fiori-test2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html -http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html -http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html -http://packetstormsecurity.com/files/152152/MyBB-Upcoming-Events-1.32-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152153/Gila-CMS-1.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152166/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html -http://packetstormsecurity.com/files/152167/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html -http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html -http://packetstormsecurity.com/files/152177/DVD-X-Player-5.5.3-Buffer-Overflow.html -http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html -http://packetstormsecurity.com/files/152182/Canarytokens-2019-03-01-Detection-Bypass.html -http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html -http://packetstormsecurity.com/files/152232/DASAN-H660RM-Information-Disclosure-Hardcoded-Key.html -http://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html -http://packetstormsecurity.com/files/152244/Titan-FTP-Server-2019-Build-3505-Directory-Traversal.html -http://packetstormsecurity.com/files/152248/Rukovoditel-ERP-And-CRM-2.4.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html -http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html -http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html -http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html -http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152269/CMS-Made-Simple-CMSMS-Showtime2-File-Upload-Remote-Command-Execution.html -http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html -http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -http://packetstormsecurity.com/files/152298/Thomson-Reuters-Concourse-And-Firm-Central-Local-File-Inclusion-Directory-Traversal.html -http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152324/Oracle-Weblogic-Server-Deserialization-MarshalledObject-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152356/CMS-Made-Simple-SQL-Injection.html -http://packetstormsecurity.com/files/152357/Oracle-Weblogic-Server-Deserialization-RMI-UnicastRef-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152361/JioFi-4G-M2S-1.0.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152362/WordPress-PayPal-Checkout-Payment-Gateway-1.6.8-Parameter-Tampering.html -http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html -http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html -http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html -http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html -http://packetstormsecurity.com/files/152429/Bolt-CMS-3.6.6-Cross-Site-Request-Forgery-Code-Execution.html -http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html -http://packetstormsecurity.com/files/152435/SaLICru-SLC-20-cube3-5-HTML-Injection.html -http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0.9.8.793-Free-0.9.8.753-Pro-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152439/ManageEngine-ServiceDesk-Plus-9.3-User-Enumeration.html -http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html -http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/152452/Uniqkey-Password-Manager-1.14-Denial-Of-Service.html -http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html -http://packetstormsecurity.com/files/152458/TP-LINK-TL-WR940N-TL-WR941ND-Buffer-Overflow.html -http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html -http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html -http://packetstormsecurity.com/files/152465/D-Link-DI-524-2.06RU-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152476/Horde-Form-Shell-Upload.html -http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html -http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html -http://packetstormsecurity.com/files/152489/CyberArk-EPM-10.2.1.603-Security-Restrictions-Bypass.html -http://packetstormsecurity.com/files/152494/DirectAdmin-1.561-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.html -http://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html -http://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html -http://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html -http://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html -http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html -http://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html -http://packetstormsecurity.com/files/152525/Zyxel-ZyWall-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html -http://packetstormsecurity.com/files/152532/Microsoft-Windows-CSRSS-SxSSrv-Cached-Manifest-Privilege-Escalation.html -http://packetstormsecurity.com/files/152533/Microsoft-Windows-LUAFV-Delayed-Virtualization-MAXIMUM_ACCESS-DesiredAccess-Privilege-Escalation.html -http://packetstormsecurity.com/files/152534/Microsoft-Windows-LUAFV-Delayed-Virtualization-Cross-Process-Handle-Duplication-Privilege-Escalation.html -http://packetstormsecurity.com/files/152535/Microsoft-Windows-LUAFV-LuafvCopyShortName-Arbitrary-Short-Name-Privilege-Escalation.html -http://packetstormsecurity.com/files/152536/Microsoft-Windows-LUAFV-NtSetCachedSigningLevel-Device-Guard-Bypass.html -http://packetstormsecurity.com/files/152537/Microsoft-Windows-LUAFV-Delayed-Virtualization-Cache-Manager-Poisoning-Privilege-Escalation.html -http://packetstormsecurity.com/files/152538/Microsoft-Windows-LUAFV-PostLuafvPostReadWrite-SECTION_OBJECT_POINTERS-Race-Condition.html -http://packetstormsecurity.com/files/152542/ASUS-HG100-Denial-Of-Service.html -http://packetstormsecurity.com/files/152551/OAMbuster-Multi-Threaded-CVE-2018-2879-Scanner.html -http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html -http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html -http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html -http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html -http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html -http://packetstormsecurity.com/files/152570/QNAP-myQNAPcloud-Connect-1.3.4.0317-Username-Password-Denial-Of-Service.html -http://packetstormsecurity.com/files/152603/74CMS-5.0.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152604/Msvod-10-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152607/ManageEngine-Applications-Manager-14.0-SQL-Injection-Command-Injection.html -http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html -http://packetstormsecurity.com/files/152612/Sony-Smart-TV-Information-Disclosure-File-Read.html -http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html -http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html -http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152625/JioFi-4G-M2S-1.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152626/JioFi-4G-M2S-1.0.2-Denial-Of-Service.html -http://packetstormsecurity.com/files/152642/Apache-Pluto-3.0.0-3.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152643/GAT-Ship-Web-Module-Unrestricted-File-Upload.html -http://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html -http://packetstormsecurity.com/files/152647/Sierra-Wireless-AirLink-ES450-SNMPD-Hard-Coded-Credentials.html -http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152652/Sierra-Wireless-AirLink-ES450-ACEManager-template_load.cgi-Information-Disclosure.html -http://packetstormsecurity.com/files/152654/Sierra-Wireless-AirLink-ES450-ACEManager-Information-Exposure.html -http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html -http://packetstormsecurity.com/files/152667/Pimcore-Unserialize-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html -http://packetstormsecurity.com/files/152678/Domoticz-4.10577-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/152680/Intelbras-IWR-3000N-Denial-Of-Service.html -http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152682/Intelbras-IWR-3000N-1.5.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html -http://packetstormsecurity.com/files/152696/CentOS-Web-Panel-Domain-Field-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html -http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152714/ABUS-Secvest-3.01.01-Cryptographic-Issues.html -http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html -http://packetstormsecurity.com/files/152717/Zotonic-0.46-mod_admin-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152721/SolarWinds-DameWare-Mini-Remote-Control-10.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/152722/Wordpress-Social-Warfare-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152731/ReadyAPI-2.5.0-2.6.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152733/LG-Supersign-EZ-CMS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html -http://packetstormsecurity.com/files/152786/Lotus-Domino-8.5.3-EXAMINE-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html -http://packetstormsecurity.com/files/152788/dotCMS-5.1.1-HTML-Injection.html -http://packetstormsecurity.com/files/152789/RICOH-SP-4510DN-Printer-HTML-Injection.html -http://packetstormsecurity.com/files/152790/RICOH-SP-4520DN-Printer-HTML-Injection.html -http://packetstormsecurity.com/files/152793/Zoho-ManageEngine-ADSelfService-Plus-5.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/152801/CyberArk-Enterprise-Password-Vault-10.7-XML-External-Entity-Injection.html -http://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html -http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152840/Go-Cryptography-Libraries-Cleartext-Message-Spoofing.html -http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html -http://packetstormsecurity.com/files/152856/Ellucian-Banner-Web-Tailor-Banner-Enterprise-Identity-Services-Improper-Authentication.html -http://packetstormsecurity.com/files/152862/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html -http://packetstormsecurity.com/files/152910/CommSy-8.6.5-SQL-Injection.html -http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html -http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html -http://packetstormsecurity.com/files/152933/FreeBSD-Security-Advisory-FreeBSD-SA-19-05.pf.html -http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html -http://packetstormsecurity.com/files/152946/VMware-Workstation-DLL-Hijacking.html -http://packetstormsecurity.com/files/152947/WeChat-7.0.4-Denial-Of-Service.html -http://packetstormsecurity.com/files/152951/SEL-AcSELerator-Architect-2.2.24-Denial-Of-Service.html -http://packetstormsecurity.com/files/152961/GetSimpleCMS-3.3.15-Remote-Code-Execution.html -http://packetstormsecurity.com/files/152963/Cisco-Expressway-Gateway-11.5.1-Directory-Traversal.html -http://packetstormsecurity.com/files/152964/GAT-Ship-Web-Module-1.30-Information-Disclosure.html -http://packetstormsecurity.com/files/152965/Huawei-eSpace-1.1.11.103-Unicode-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/152966/Huawei-eSpace-1.1.11.103-DLL-Hijacking.html -http://packetstormsecurity.com/files/152967/Huawei-eSpace-1.1.11.103-Meeting-Image-File-Format-Handling-Buffer-Overflow.html -http://packetstormsecurity.com/files/152968/Huawei-eSpace-1.1.11.103-Meeting-Heap-Overflow.html -http://packetstormsecurity.com/files/152986/Darktrace-Enterpise-Immune-System-3.0.9-3.0.10-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/152988/Microsoft-Windows-CmKeyBodyRemapToVirtualForEnum-Arbitrary-Key-Enumeration.html -http://packetstormsecurity.com/files/152995/Shopware-createInstanceFromNamedArguments-PHP-Object-Instantiation.html -http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html -http://packetstormsecurity.com/files/153007/Blue-Prism-Robotic-Process-Automation-RPA-Privilege-Escalation.html -http://packetstormsecurity.com/files/153008/Angry-Polar-Bear-2-Microsoft-Windows-Error-Reporting-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html -http://packetstormsecurity.com/files/153018/Interspire-Email-Marketer-6.20-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html -http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153028/Zoho-ManageEngine-ServiceDesk-Plus-9.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153029/Zoho-ManageEngine-ServiceDesk-Plus-Privilege-Escalation.html -http://packetstormsecurity.com/files/153034/Microsoft-Windows-Win32k-Privilege-Escalation.html -http://packetstormsecurity.com/files/153035/Brocade-Network-Advisor-14.4.1-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153040/Nagios-XI-5.6.1-SQL-Injection.html -http://packetstormsecurity.com/files/153053/Quest-KACE-Systems-Management-Appliance-9.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153071/CMS-Made-Simple-2.2.10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153072/Oracle-Application-Testing-Suite-WebLogic-Server-Administration-Console-War-Deployment.html -http://packetstormsecurity.com/files/153078/Microsoft-Internet-Explorer-Windows-10-1809-17763.316-Memory-Corruption.html -http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html -http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html -http://packetstormsecurity.com/files/153084/Petraware-pTransformer-ADC-SQL-Injection.html -http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html -http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153103/VFront-0.99.5-Reflective-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153104/VFront-0.99.5-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html -http://packetstormsecurity.com/files/153112/pfSense-2.4.4-p3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/153122/Siemens-LOGO-8-Hard-Coded-Cryptographic-Key.html -http://packetstormsecurity.com/files/153123/Siemens-LOGO-8-Missing-Authentication.html -http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html -http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html -http://packetstormsecurity.com/files/153145/Shopware-5.5.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html -http://packetstormsecurity.com/files/153150/Dell-KACE-System-Management-Appliance-SMA-XSS-SQL-Injection.html -http://packetstormsecurity.com/files/153151/AUO-Solar-Data-Recorder-Incorrect-Access-Control.html -http://packetstormsecurity.com/files/153159/Rapid7-Windows-InsightIDR-Agent-2.6.3.14-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/153161/IceWarp-10.4.4-Local-File-Inclusion.html -http://packetstormsecurity.com/files/153162/NUUO-NVRMini-2-3.9.1-Stack-Overflow.html -http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html -http://packetstormsecurity.com/files/153184/Inateck-2.4-GHz-Wireless-Presenter-WP1001-Keystroke-Injection.html -http://packetstormsecurity.com/files/153185/Inateck-2.4-GHz-Wearable-Wireless-Presenter-WP2002-Keystroke-Injection.html -http://packetstormsecurity.com/files/153186/Logitech-R700-Laser-Presentation-Remote-Keystroke-Injection.html -http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html -http://packetstormsecurity.com/files/153190/Zimbra-XML-Injection-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/153191/Supra-Smart-Cloud-TV-Remote-File-Inclusion.html -http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153219/UliCMS-2019.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html -http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html -http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html -http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html -http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html -http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html -http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html -http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html -http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html -http://packetstormsecurity.com/files/153249/ProShow-9.0.3797-Privilege-Escalation.html -http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/153252/Liferay-Portal-7.1-CE-GA4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html -http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153275/Pronestor-Health-Monitoring-Privilege-Escalation.html -http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/153280/Tzumi-Electronics-Klic-Lock-Authentication-Bypass.html -http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html -http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html -http://packetstormsecurity.com/files/153330/Sahi-Pro-7.x-8.x-Directory-Traversal.html -http://packetstormsecurity.com/files/153331/Sahi-Pro-8.x-SQL-Injection.html -http://packetstormsecurity.com/files/153332/Sahi-Pro-8.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153333/Serv-U-FTP-Server-15.1.6-Privilege-Escalation.html -http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html -http://packetstormsecurity.com/files/153347/BlogEngine.NET-3.3.6-3.3.7-dirPath-Directory-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153348/BlogEngine.NET-3.3.6-3.3.7-Theme-Cookie-Directory-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153350/Cisco-Prime-Infrastructure-Health-Monitor-TarArchive-Directory-Traversal.html -http://packetstormsecurity.com/files/153364/BlogEngine.NET-3.3.6-3.3.7-XML-Injection.html -http://packetstormsecurity.com/files/153372/Webmin-1.910-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153373/GrandNode-4.40-Path-Traversal-File-Download.html -http://packetstormsecurity.com/files/153374/PC-Doctor-Toolbox-DLL-Hijacking.html -http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html -http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html -http://packetstormsecurity.com/files/153382/SeedDMS-out.UsrMgr.php-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153383/SeedDMS-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153384/SeedDMS-out.GroupMgr.php-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153385/EA-Origin-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153386/ABB-IDAL-FTP-Server-Uncontrolled-Format-String.html -http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-Verification.html -http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html -http://packetstormsecurity.com/files/153395/ABB-IDAL-FTP-Server-Buffer-Overflow.html -http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html -http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html -http://packetstormsecurity.com/files/153403/ABB-IDAL-HTTP-Server-Stack-Based-Buffer-Overflow.html -http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html -http://packetstormsecurity.com/files/153405/Quarking-Password-Manager-3.1.84-Clickjacking.html -http://packetstormsecurity.com/files/153407/Microsoft-Windows-CmpAddRemoveContainerToCLFSLog-Arbitrary-File-Directory-Creation.html -http://packetstormsecurity.com/files/153408/Microsoft-Windows-Font-Cache-Service-Insecure-Sections.html -http://packetstormsecurity.com/files/153433/Nagios-XI-Magpie_debug.php-Root-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153436/AMD-Secure-Encrypted-Virtualization-SEV-Key-Recovery.html -http://packetstormsecurity.com/files/153439/Coldfusion-JNBridge-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153448/LibreNMS-1.46-addhost-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153471/SAP-Crystal-Reports-Information-Disclosure.html -http://packetstormsecurity.com/files/153480/Slackware-Security-Advisory-irssi-Updates.html -http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153492/CyberPanel-1.8.4-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/153495/SquirrelMail-1.4.22-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153504/Centreon-19.04-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153505/Serv-U-FTP-Server-prepareinstallation-Privilege-Escalation.html -http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153512/Symantec-DLP-15.5-MP1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SA-19-09.iconv.html -http://packetstormsecurity.com/files/153522/FreeBSD-Security-Advisory-FreeBSD-SA-19-11.cd_ioctl.html -http://packetstormsecurity.com/files/153523/FreeBSD-Security-Advisory-FreeBSD-SA-19-10.ufs.html -http://packetstormsecurity.com/files/153530/WolfVision-Cynap-1.18g-1.28j-Hardcoded-Credential.html -http://packetstormsecurity.com/files/153533/Microsoft-Exchange-2003-base64-MIME-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153541/WordPress-Like-Button-1.6.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html -http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html -http://packetstormsecurity.com/files/153581/PowerPanel-Business-Edition-3.4.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/153591/phpFK-lite-version-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153610/Jenkins-Dependency-Graph-View-0.13-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153612/SNMPc-Enterprise-Edition-9-10-Mapping-Filename-Buffer-Overflow.html -http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html -http://packetstormsecurity.com/files/153626/FlightPath-Local-File-Inclusion.html -http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html -http://packetstormsecurity.com/files/153628/Android-VideoPlayer-ihevcd_parse_pps-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153639/Microsoft-Windows-HTTP-To-SMB-NTLM-Reflection-Privilege-Escalation.html -http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html -http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html -http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html -http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html -http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html -http://packetstormsecurity.com/files/153666/CentOS-Control-Web-Panel-0.9.8.836-Privilege-Escalation.html -http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-User-Enumeration.html -http://packetstormsecurity.com/files/153668/DameWare-Remote-Support-12.0.0.509-Buffer-Overflow.html -http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html -http://packetstormsecurity.com/files/153671/FANUC-Robotics-Virtual-Robot-Controller-8.23-Buffer-Overflow.html -http://packetstormsecurity.com/files/153672/FANUC-Robotics-Virtual-Robot-Controller-8.23-Path-Traversal.html -http://packetstormsecurity.com/files/153675/MAPLE-Computer-WBT-SNMP-Administrator-2.0.195.15-Buffer-Overflow.html -http://packetstormsecurity.com/files/153683/Microsoft-Windows-RPCSS-Activation-Kernel-Security-Callback-Privilege-Escalation.html -http://packetstormsecurity.com/files/153686/WorldClient-14-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/153691/REDCap-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153696/fuelCMS-1.4.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/153716/BACnet-Stack-0.8.6-Denial-Of-Service.html -http://packetstormsecurity.com/files/153733/Mikrotik-RouterOS-Resource-Stack-Exhaustion.html -http://packetstormsecurity.com/files/153734/Tufin-Secure-Change-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153737/Ovidentia-8.4.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153738/Ovidentia-8.4.3-SQL-Injection.html -http://packetstormsecurity.com/files/153746/FreeBSD-Security-Advisory-FreeBSD-SA-19-12.telnet.html -http://packetstormsecurity.com/files/153748/FreeBSD-Security-Advisory-FreeBSD-SA-19-13.pts.html -http://packetstormsecurity.com/files/153749/FreeBSD-Security-Advisory-FreeBSD-SA-19-14.freebsd32.html -http://packetstormsecurity.com/files/153752/FreeBSD-Security-Advisory-FreeBSD-SA-19-15.mqueuefs.html -http://packetstormsecurity.com/files/153753/FreeBSD-Security-Advisory-FreeBSD-SA-19-16.bhyve.html -http://packetstormsecurity.com/files/153755/FreeBSD-Security-Advisory-FreeBSD-SA-19-17.fd.html -http://packetstormsecurity.com/files/153766/Moodle-Filepicker-3.5.2-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/153767/pdfresurrect-0.15-Buffer-Overflow.html -http://packetstormsecurity.com/files/153770/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153771/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/153772/Ahsay-Backup-7.x-8.x-XML-Injection.html -http://packetstormsecurity.com/files/153780/ABUS-Secvest-3.01.01-Unchecked-Message-Transmission-Error-Condition.html -http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html -http://packetstormsecurity.com/files/153801/WordPress-Simple-Membership-3.8.4-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html -http://packetstormsecurity.com/files/153821/WordPress-WP-Fastest-Cache-0.8.9.5-Directory-Traversal.html -http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html -http://packetstormsecurity.com/files/153841/Oracle-Hyperion-Planning-11.1.2.3-XML-Injection.html -http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html -http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html -http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html -http://packetstormsecurity.com/files/153868/Avira-Free-Security-Suite-2019-Software-Updater-2.0.6.13175-Improper-Access-Control.html -http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153870/ATutor-2.2.4-Arbitrary-File-Upload-Command-Execution.html -http://packetstormsecurity.com/files/153876/CentOS-Control-Web-Panel-0.9.8.836-Remote-Command-Execution.html -http://packetstormsecurity.com/files/153877/CentOS-Control-Web-Panel-0.9.8.840-User-Enumeration.html -http://packetstormsecurity.com/files/153878/CentOS-Control-Web-Panel-0.9.8.846-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html -http://packetstormsecurity.com/files/153959/FreeBSD-Security-Advisory-FreeBSD-SA-19-20.bsnmp.html -http://packetstormsecurity.com/files/153963/WordPress-JoomSport-3.3-SQL-Injection.html -http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html -http://packetstormsecurity.com/files/153984/Open-School-3.0-Community-Edition-2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/153985/Aptana-Jaxer-1.0.3.4547-Local-File-Inclusion.html -http://packetstormsecurity.com/files/153989/Adive-Framework-2.0.7-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html -http://packetstormsecurity.com/files/154001/Master-Data-Online-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154004/osTicket-1.12-Formula-Injection.html -http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154015/Ghidra-Linux-9.0.4-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/154017/Cisco-Adaptive-Security-Appliance-Path-Traversal.html -http://packetstormsecurity.com/files/154018/UNA-10.0.0-RC1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html -http://packetstormsecurity.com/files/154024/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/154061/OmniDoc-7.0-Input-Validation.html -http://packetstormsecurity.com/files/154081/Microsoft-Font-Subsetting-DLL-MergeFontPackage-Dangling-Pointer.html -http://packetstormsecurity.com/files/154084/Microsoft-Font-Subsetting-DLL-GetGlyphId-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154085/Microsoft-Font-Subsetting-DLL-MergeFormat12Cmap-MakeFormat12MergedGlyphList-Double-Free.html -http://packetstormsecurity.com/files/154086/Microsoft-Font-Subsetting-DLL-FixSbitSubTables-Heap-Corruption.html -http://packetstormsecurity.com/files/154087/Microsoft-Font-Subsetting-DLL-ReadTableIntoStructure-Heap-Corruption.html -http://packetstormsecurity.com/files/154092/Microsoft-Font-Subsetting-DLL-ReadAllocFormat12CharGlyphMapList-Heap-Corruption.html -http://packetstormsecurity.com/files/154093/Microsoft-Font-Subsetting-DLL-WriteTableFromStructure-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154096/Microsoft-Font-Subsetting-DLL-MakeFormat12MergedGlyphList-Heap-Corruption.html -http://packetstormsecurity.com/files/154098/Microsoft-Font-Subsetting-DLL-FixSbitSubTableFormat1-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html -http://packetstormsecurity.com/files/154127/Open-Xchange-OX-Guard-Cross-Site-Scripting-Signature-Validation.html -http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154141/Webmin-1.920-Remote-Command-Execution.html -http://packetstormsecurity.com/files/154141/Webmin-Remote-Comman-Execution.html -http://packetstormsecurity.com/files/154155/CentOS-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html -http://packetstormsecurity.com/files/154155/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html -http://packetstormsecurity.com/files/154155/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html -http://packetstormsecurity.com/files/154156/CentOS-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html -http://packetstormsecurity.com/files/154156/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html -http://packetstormsecurity.com/files/154156/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html -http://packetstormsecurity.com/files/154164/CentOS-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html -http://packetstormsecurity.com/files/154164/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html -http://packetstormsecurity.com/files/154164/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html -http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html -http://packetstormsecurity.com/files/154170/FreeBSD-Security-Advisory-FreeBSD-SA-19-22.mbuf.html -http://packetstormsecurity.com/files/154172/FreeBSD-Security-Advisory-FreeBSD-SA-19-24.mqueuefs.html -http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/154183/Zoho-Corporation-ManageEngine-ServiceDesk-Plus-Information-Disclosure.html -http://packetstormsecurity.com/files/154184/KBPublisher-6.0.2.1-SQL-Injection.html -http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html -http://packetstormsecurity.com/files/154192/Microsoft-Windows-SET_REPARSE_POINT_EX-Mount-Point-Security-Feature-Bypass.html -http://packetstormsecurity.com/files/154196/Nimble-Streamer-3.x-Directory-Traversal.html -http://packetstormsecurity.com/files/154197/Webmin-1.920-password_change.cgi-Backdoor.html -http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/154200/Trend-Maximum-Security-2019-Unquoted-Search-Path.html -http://packetstormsecurity.com/files/154202/LSoft-ListServ-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154203/WordPress-Import-Export-WordPress-Users-1.3.1-CSV-Injection.html -http://packetstormsecurity.com/files/154204/CoreFTP-Server-SIZE-Directory-Traversal.html -http://packetstormsecurity.com/files/154205/CoreFTP-Server-MDTM-Directory-Traversal.html -http://packetstormsecurity.com/files/154206/WordPress-UserPro-4.9.32-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154216/CentOS-7.6.1810-Control-Web-Panel-0.9.8.837-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154217/CentOS-7.6.1810-Control-Web-Panel-0.9.8.837-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154221/ProGrade-Lierda-Grill-Temperature-1.00_50006-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html -http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html -http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html -http://packetstormsecurity.com/files/154259/Asus-Precision-TouchPad-11.0.0.25-Denial-Of-Service-Privilege-Escalation.html -http://packetstormsecurity.com/files/154263/WordPress-WooCommerce-Product-Feed-2.2.18-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154266/Canon-PRINT-2.5.5-URI-Injection.html -http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html -http://packetstormsecurity.com/files/154270/DomainMod-4.13-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154274/Ping-Identity-Agentless-Integration-Kit-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154276/Craft-CMS-2.7.9-3.2.5-Information-Disclosure.html -http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html -http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154286/Opencart-3.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154294/Wolters-Kluwer-TeamMate-3.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154305/Cisco-UCS-Director-Default-scpuser-Password.html -http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html -http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html -http://packetstormsecurity.com/files/154340/Totaljs-CMS-12.0-Path-Traversal.html -http://packetstormsecurity.com/files/154356/WordPress-Download-Manager-2.9.93-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154357/DASAN-Zhone-ZNID-GPON-2426A-EU-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html -http://packetstormsecurity.com/files/154362/AwindInc-SNMP-Service-Command-Injection.html -http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html -http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html -http://packetstormsecurity.com/files/154376/Pulse-Secure-8.1R15.1-8.2-8.3-9.0-SSL-VPN-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154390/October-CMS-Upload-Protection-Bypass-Code-Execution.html -http://packetstormsecurity.com/files/154391/LibreNMS-Collectd-Command-Injection.html -http://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html -http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html -http://packetstormsecurity.com/files/154416/Dabman-And-Imperial-Web-Radio-Devices-Undocumented-Telnet-Backdoor.html -http://packetstormsecurity.com/files/154418/CA-Common-Services-Distributed-Intelligence-Architecture-DIA-Code-Execution.html -http://packetstormsecurity.com/files/154432/WordPress-Photo-Gallery-1.5.34-SQL-Injection.html -http://packetstormsecurity.com/files/154433/WordPress-Photo-Gallery-1.5.34-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154440/WordPress-SlickQuiz-1.3.7.1-SQL-Injection.html -http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html -http://packetstormsecurity.com/files/154479/LimeSurvey-3.17.13-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154484/Piwigo-2.9.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154485/Webmin-1.920-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html -http://packetstormsecurity.com/files/154494/Inteno-IOPSYS-Gateway-3DES-Key-Extraction-Improper-Access.html -http://packetstormsecurity.com/files/154498/Master-Data-Online-Cross-Site-Request-Forgery-Data-Tampering.html -http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html -http://packetstormsecurity.com/files/154524/Western-Digital-My-Book-World-II-NAS-1.02.12-Hardcoded-Credential.html -http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html -http://packetstormsecurity.com/files/154549/LayerBB-1.1.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html -http://packetstormsecurity.com/files/154574/Jira-Service-Desk-Server-And-Data-Center-Path-Traversal.html -http://packetstormsecurity.com/files/154578/Gila-CMS-Local-File-Inclusion.html -http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html -http://packetstormsecurity.com/files/154580/HPE-Intelligent-Management-Center-Information-Disclosure.html -http://packetstormsecurity.com/files/154586/File-Sharing-Wizard-1.5.0-SEH-Buffer-Overflow.html -http://packetstormsecurity.com/files/154587/pfSense-2.3.4-2.4.4-p3-Remote-Code-Injection.html -http://packetstormsecurity.com/files/154591/Microsoft-SharePoint-2013-SP1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html -http://packetstormsecurity.com/files/154598/NPMJS-gitlabhook-0.0.17-Remote-Command-Execution.html -http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html -http://packetstormsecurity.com/files/154611/Jira-Server-Data-Center-Template-Injection.html -http://packetstormsecurity.com/files/154614/Samsung-Mobile-Android-SamsungTTS-Privilege-Escalation.html -http://packetstormsecurity.com/files/154615/Samsung-Mobile-Android-FotaAgent-Arbitrary-File-Creation.html -http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html -http://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html -http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154651/phpIPAM-1.4-SQL-Injection.html -http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html -http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html -http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154678/GFI-Kerio-Control-9.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html -http://packetstormsecurity.com/files/154705/Counter-Strike-Global-Offensive-Code-Execution-Denial-Of-Service.html -http://packetstormsecurity.com/files/154706/Notepad-Code-Execution-Denial-Of-Service.html -http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html -http://packetstormsecurity.com/files/154713/Xpdf-4.02-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html -http://packetstormsecurity.com/files/154723/Anchor-CMS-0.12.3a-Information-Disclosure.html -http://packetstormsecurity.com/files/154734/GitLab-Omnibus-12.2.1-Logrotate-Privilege-Escalation.html -http://packetstormsecurity.com/files/154739/CA-Network-Flow-Analysis-9.x-10.0.x-Remote-Command-Execution.html -http://packetstormsecurity.com/files/154746/Subrion-4.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154747/IBM-Bigfix-Platform-9.5.9.62-Arbitary-File-Upload-Code-Execution.html -http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html -http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html -http://packetstormsecurity.com/files/154758/vBulletin-5.5.4-SQL-Injection.html -http://packetstormsecurity.com/files/154759/vBulletin-5.5.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154763/OmniCenter-12.1.1-SQL-Injection.html -http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html -http://packetstormsecurity.com/files/154772/RENPHO-3.0.0-Information-Disclosure.html -http://packetstormsecurity.com/files/154774/libyal-libfwsi-Buffer-Overread.html -http://packetstormsecurity.com/files/154777/File-Sharing-Wizard-1.5.0-POST-SEH-Overflow.html -http://packetstormsecurity.com/files/154782/PBS-Professional-19.2.3-Authentication-Bypass.html -http://packetstormsecurity.com/files/154788/ASX-To-MP3-Converter-3.1.3.7-Stack-Overflow.html -http://packetstormsecurity.com/files/154789/SMA-Solar-Technology-AG-Sunny-WebBox-1.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/154797/Microsoft-Windows-Kernel-win32k.sys-TTF-Font-Processing-win32k-ulClearTypeFilter-Pool-Corruption.html -http://packetstormsecurity.com/files/154798/Microsoft-Windows-Kernel-nt-MiOffsetToProtos-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/154799/Microsoft-Windows-Kernel-CI-CipFixImageType-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154800/Microsoft-Windows-Kernel-nt-MiParseImageLoadConfig-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154801/Microsoft-Windows-Kernel-CI-HashKComputeFirstPageHash-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154802/Microsoft-Windows-Kernel-nt-MiRelocateImage-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html -http://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html -http://packetstormsecurity.com/files/154851/OpenProject-10.0.1-9.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html -http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html -http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html -http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html -http://packetstormsecurity.com/files/154875/WordPress-Broken-Link-Checker-1.11.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html -http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitary-Command-Execution.html -http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitrary-Command-Execution.html -http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html -http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html -http://packetstormsecurity.com/files/154914/Sangoma-SBC-2.3.23-119-GA-Unauthenticated-User-Creation.html -http://packetstormsecurity.com/files/154915/Sangoma-SBC-2.3.23-119-GA-Authentication-Bypass.html -http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html -http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html -http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html -http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html -http://packetstormsecurity.com/files/154944/Rocket.Chat-2.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html -http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html -http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html -http://packetstormsecurity.com/files/154955/Fujitsu-Wireless-Keyboard-Set-LX390-Missing-Encryption.html -http://packetstormsecurity.com/files/154956/Fujitsu-Wireless-Keyboard-Set-LX390-Keystroke-Injection.html -http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html -http://packetstormsecurity.com/files/154960/Solaris-xscreensaver-Privilege-Escalation.html -http://packetstormsecurity.com/files/154986/ClonOs-WEB-UI-19.09-Improper-Access-Control.html -http://packetstormsecurity.com/files/154990/CWP-0.9.8.885-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html -http://packetstormsecurity.com/files/154992/Infosysta-Jira-1.6.13_J8-Project-List-Authentication-Bypass.html -http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html -http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155002/Microsoft-Windows-Server-2012-Group-Policy-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155007/Microsoft-Windows-Server-2012-Group-Policy-Security-Feature-Bypass.html -http://packetstormsecurity.com/files/155012/Craft-CMS-Rate-Limiting-Brute-Force.html -http://packetstormsecurity.com/files/155036/MikroTik-RouterOS-6.45.6-DNS-Cache-Poisoning.html -http://packetstormsecurity.com/files/155045/Nostromo-1.9.6-Directory-Traversal-Remote-Command-Execution.html -http://packetstormsecurity.com/files/155076/Micro-Focus-HPE-Data-Protector-SUID-Privilege-Escalation.html -http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html -http://packetstormsecurity.com/files/155175/Parallels-Plesk-Panel-9.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html -http://packetstormsecurity.com/files/155189/Android-Janus-APK-Signature-Bypass.html -http://packetstormsecurity.com/files/155200/Jenkins-Build-Metrics-1.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/155213/Adive-Framework-2.0.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/155214/Jira-Service-Desk-Server-Data-Center-Path-Traversal.html -http://packetstormsecurity.com/files/155224/Adobe-Acrobat-Reader-DC-For-Windows-Malformed-JBIG2Globals-Stream-Uninitialized-Pointer.html -http://packetstormsecurity.com/files/155225/Adobe-Acrobat-Reader-DC-For-Windows-Malformed-OTF-Font-Uninitialized-Pointer.html -http://packetstormsecurity.com/files/155231/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155232/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html -http://packetstormsecurity.com/files/155241/LavaLite-CMS-5.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155242/RISE-Ultimate-Project-Manager-2.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155244/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html -http://packetstormsecurity.com/files/155247/Computrols-CBAS-Web-19.0.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html -http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155251/Computrols-CBAS-Web-19.0.0-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/155252/Linear-eMerge-E3-1.00-06-Directory-Traversal.html -http://packetstormsecurity.com/files/155253/Linear-eMerge-E3-1.00-06-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155254/Linear-eMerge-E3-1.00-06-Arbitrary-File-Upload-Remote-Root-Code-Execution.html -http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html -http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Injection.html -http://packetstormsecurity.com/files/155257/Computrols-CBAS-Web-19.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155259/Optergy-BMS-2.0.3a-Account-Reset-Username-Disclosure.html -http://packetstormsecurity.com/files/155260/Linear-eMerge-E3-1.00-06-Privilege-Escalation.html -http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html -http://packetstormsecurity.com/files/155263/Nortek-Linear-eMerge-E3-Access-Control-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155265/Optergy-Proton-Enterprise-BMS-2.0.3a-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155266/Computrols-CBAS-Web-19.0.0-Username-Enumeration.html -http://packetstormsecurity.com/files/155267/Nortek-Linear-eMerge-E3-Access-Controller-1.00-06-SSH-FTP-Remote-Root.html -http://packetstormsecurity.com/files/155268/Optergy-Proton-Enterprise-BMS-2.3.0a-Open-Redirect.html -http://packetstormsecurity.com/files/155269/Optergy-2.3.0a-Remote-Root.html -http://packetstormsecurity.com/files/155270/FlexAir-Access-Control-2.3.38-Command-Injection.html -http://packetstormsecurity.com/files/155271/FlexAir-Access-Control-2.3.38-Remote-Root.html -http://packetstormsecurity.com/files/155272/Linear-eMerge-E3-Access-Controller-Command-Injection.html -http://packetstormsecurity.com/files/155273/Prima-Access-Control-2.3.35-Script-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155274/Prima-Access-Control-2.3.35-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/155277/Pulse-Secure-VPN-Arbitrary-Command-Execution.html -http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html -http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html -http://packetstormsecurity.com/files/155296/Technicolor-TD5130.2-Remote-Command-Execution.html -http://packetstormsecurity.com/files/155320/MicroStrategy-Library-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155324/Xfilesharing-2.5.1-Local-File-Inclusion-Shell-Upload.html -http://packetstormsecurity.com/files/155344/FusionPBX-Operator-Panel-exec.php-Command-Execution.html -http://packetstormsecurity.com/files/155355/Centraleyezer-Shell-Upload.html -http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155359/Raritan-CommandCenter-Secure-Gateway-XML-Injection.html -http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html -http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html -http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/155376/TemaTres-3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155378/nipper-ng-0.11.10-Remote-Buffer-Overflow.html -http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html -http://packetstormsecurity.com/files/155419/Jalios-JCMS-10-Backdoor-Account-Authentication-Bypass.html -http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html -http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html -http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html -http://packetstormsecurity.com/files/155502/WordPress-Plainview-Activity-Monitor-20161228-Remote-Command-Execution.html -http://packetstormsecurity.com/files/155503/Inateck-BCST-60-Barcode-Scanner-Keystroke-Injection.html -http://packetstormsecurity.com/files/155504/Allied-Telesis-AT-GS950-8-Directory-Traversal.html -http://packetstormsecurity.com/files/155506/Max-Secure-Anti-Virus-Plus-19.0.4.020-Insecure-Permissions.html -http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html -http://packetstormsecurity.com/files/155554/Cisco-WLC-2504-8.9-Denial-Of-Service.html -http://packetstormsecurity.com/files/155557/Intelbras-Router-RF1200-1.1.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155558/WordPress-CSS-Hero-4.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155559/Revive-Adserver-4.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html -http://packetstormsecurity.com/files/155564/YouPHPTube-7.7-SQL-Injection.html -http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/155573/BeeGFS-7.1.3-Privilege-Escalation.html -http://packetstormsecurity.com/files/155576/Broadcom-CA-Privileged-Access-Manager-2.8.2-Remote-Command-Execution.html -http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155578/Integard-Pro-NoJs-2.2.0.9026-Remote-Buffer-Overflow.html -http://packetstormsecurity.com/files/155579/Trend-Micro-Deep-Security-Agent-11-Arbitrary-File-Overwrite.html -http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html -http://packetstormsecurity.com/files/155582/Yachtcontrol-2019-10-06-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155584/SiteVision-4.x-5.x-Insufficient-Module-Access-Control.html -http://packetstormsecurity.com/files/155585/SiteVision-4.x-5.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html -http://packetstormsecurity.com/files/155615/WordPress-Scoutnet-Kalender-1.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html -http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155630/DAViCal-CalDAV-Server-1.1.8-Reflective-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155631/CA-Nolio-6.6-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.html -http://packetstormsecurity.com/files/155653/AppXSvc-17763-Arbitrary-File-Overwrite.html -http://packetstormsecurity.com/files/155656/Lenovo-Power-Management-Driver-Buffer-Overflow.html -http://packetstormsecurity.com/files/155658/Qualys-Security-Advisory-OpenBSD-Dynamic-Loader-Privilege-Escalation.html -http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html -http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html -http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html -http://packetstormsecurity.com/files/155672/Serv-U-FTP-Server-15.1.7-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155673/Serv-U-FTP-Server-15.1.7-CSV-Injection.html -http://packetstormsecurity.com/files/155691/OpenMRS-Java-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155708/Serv-U-FTP-Server-15.1.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155709/Xerox-AltaLink-C8035-Printer-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155710/Tautulli-2.1.9-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155719/Rumpus-FTP-Web-File-Manager-8.2.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html -http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html -http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html -http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html -http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html -http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html -http://packetstormsecurity.com/files/155764/OpenBSD-Dynamic-Loader-chpass-Privilege-Escalation.html -http://packetstormsecurity.com/files/155790/FreeBSD-fd-Privilege-Escalation.html -http://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155813/OX-App-Suite-7.10.2-Cross-Site-Scripting-Improper-Access-Control.html -http://packetstormsecurity.com/files/155832/FTPGetter-Professional-5.97.0.223-Denial-Of-Service.html -http://packetstormsecurity.com/files/155861/Dairy-Farm-Shop-Management-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html -http://packetstormsecurity.com/files/155870/Cisco-DCNM-JBoss-10.4-Credential-Leakage.html -http://packetstormsecurity.com/files/155871/Sony-Playstation-4-Webkit-Code-Execution.html -http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html -http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html -http://packetstormsecurity.com/files/155874/JetBrains-TeamCity-2018.2.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155876/EBBISLAND-EBBSHAVE-6100-09-04-1441-Remote-Buffer-Overflow.html -http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html -http://packetstormsecurity.com/files/155886/Oracle-Weblogic-10.3.6.0.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html -http://packetstormsecurity.com/files/155897/Pandora-7.0NG-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155898/PixelStor-5000-K-4.0.1580-20150629-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html -http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html -http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html -http://packetstormsecurity.com/files/155922/Freelancy-1.0.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155925/Car-Rental-Project-1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155926/Digi-AnywhereUSB-14-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155929/Hospital-Management-System-4.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html -http://packetstormsecurity.com/files/155952/Plantronics-Hub-SpokesUpdateService-Privilege-Escalation.html -http://packetstormsecurity.com/files/155954/Huawei-HG255-Directory-Traversal.html -http://packetstormsecurity.com/files/155960/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html -http://packetstormsecurity.com/files/155961/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html -http://packetstormsecurity.com/files/155963/SunOS-5.10-Generic_147148-26-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html -http://packetstormsecurity.com/files/155973/WordPress-Postie-1.9.40-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/155974/Tautulli-2.1.9-Denial-Of-Service.html -http://packetstormsecurity.com/files/155990/Solaris-xlock-Information-Disclosure.html -http://packetstormsecurity.com/files/155991/Common-Desktop-Environment-2.3.1-Buffer-Overflow.html -http://packetstormsecurity.com/files/155996/Easy-XML-Editor-1.7.8-XML-Injection.html -http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156015/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html -http://packetstormsecurity.com/files/156027/Microsoft-Windows-Theme-API-File-Parsing.html -http://packetstormsecurity.com/files/156037/Citrix-XenMobile-Server-10.8-XML-Injection.html -http://packetstormsecurity.com/files/156050/ZOHO-ManageEngine-ServiceDeskPlus-11.0-Build-11007-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156051/XNU-vm_map_copy-Insufficient-Fix.html -http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html -http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/156062/Umbraco-CMS-8.2.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156075/Genexis-Platinum-4410-2.1-Authentication-Bypass.html -http://packetstormsecurity.com/files/156082/Ricoh-Printer-Driver-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html -http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html -http://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156106/Adive-Framework-2.0.8-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/156113/Octeth-Oempro-4.8-SQL-Injection.html -http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html -http://packetstormsecurity.com/files/156139/XMLBlueprint-16.191112-XML-Injection.html -http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156146/rConfig-3.9.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156160/TrendMicro-Anti-Threat-Toolkit-Improper-Fix.html -http://packetstormsecurity.com/files/156170/BearFTP-0.1.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html -http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html -http://packetstormsecurity.com/files/156184/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html -http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html -http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html -http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html -http://packetstormsecurity.com/files/156206/xglance-bin-Local-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/156214/Verodin-Director-Web-Console-3.5.4.0-Password-Disclosure.html -http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156222/Windscribe-WindscribeService-Named-Pipe-Privilege-Escalation.html -http://packetstormsecurity.com/files/156238/Cisco-Data-Center-Network-Manager-11.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html -http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html -http://packetstormsecurity.com/files/156249/OpenSMTPD-MAIL-FROM-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156250/D-Link-ssdpcgi-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/156251/Ricoh-Driver-Privilege-Escalation.html -http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156274/Forcepoint-WebSecurity-8.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156275/LearnDash-WordPress-LMS-3.1.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156281/Vanilla-Forum-2.6.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156289/CHIYU-BF430-TCP-IP-Converter-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156295/OpenSMTPD-6.6.1-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html -http://packetstormsecurity.com/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html -http://packetstormsecurity.com/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html -http://packetstormsecurity.com/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html -http://packetstormsecurity.com/files/156331/SuiteCRM-7.11.10-SQL-Injection.html -http://packetstormsecurity.com/files/156335/Anviz-CrossChex-Buffer-Overflow.html -http://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.html -http://packetstormsecurity.com/files/156369/WordPress-Strong-Testimonials-2.40.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156394/Microsoft-Windows-Modules-Installer-Service-Information-Disclosure.html -http://packetstormsecurity.com/files/156425/Global-TV-Unencrypted-Analytics.html -http://packetstormsecurity.com/files/156426/Citytv-Video-Unencrypted-Analytics.html -http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html -http://packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/156472/AVIRA-Generic-Malformed-Container-Bypass.html -http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/156476/Avaya-IP-Office-Application-Server-11.0.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html -http://packetstormsecurity.com/files/156484/DotNetNuke-CMS-9.5.0-File-Extension-Check-Bypass.html -http://packetstormsecurity.com/files/156485/ManageEngine-EventLog-Analyzer-10.0-Information-Disclosure.html -http://packetstormsecurity.com/files/156489/DotNetNuke-CMS-9.4.4-Zip-Directory-Traversal.html -http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html -http://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html -http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html -http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html -http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html -http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html -http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html -http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156580/QuickHeal-Generic-Malformed-Archive-Bypass.html -http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156584/TP-Link-TL-WR849N-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156585/WordPress-Tutor-LMS-1.5.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/156586/TP-Link-TL-WR849N-0.9.1-4.16-Authentication-Bypass.html -http://packetstormsecurity.com/files/156588/Netis-WF2419-2.2.36123-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156589/Intelbras-Wireless-N-150Mbps-WRN240-Authentication-Bypass.html -http://packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156593/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html -http://packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html -http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html -http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/156640/Google-Chrome-67-68-69-Object.create-Type-Confusion.html -http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html -http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156643/Apache-ActiveMQ-5.11.1-Directory-Traversal-Shell-Upload.html -http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/156655/Creative-Contact-Form-4.6.2-Directory-Traversal.html -http://packetstormsecurity.com/files/156656/Citrix-Gateway-11.1-12.0-12.1-Information-Disclosure.html -http://packetstormsecurity.com/files/156660/Citrix-Gateway-11.1-12.0-12.1-Cache-Poisoning.html -http://packetstormsecurity.com/files/156661/Citrix-Gateway-11.1-12.0-12.1-Cache-Bypass.html -http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html -http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html -http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/156687/rConfig-3.93-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156688/rConfig-3.9-SQL-Injection.html -http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html -http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html -http://packetstormsecurity.com/files/156710/Drobo-5N2-4.1.1-Remote-Command-Injection.html -http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html -http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html -http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html -http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html -http://packetstormsecurity.com/files/156746/Enhanced-Multimedia-Router-3.0.4.27-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/156751/PHPKB-Multi-Language-9-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-Authenticated-Directory-Traversal.html -http://packetstormsecurity.com/files/156757/PHPKB-Multi-Language-9-image-upload.php-Code-Execution.html -http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html -http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156792/Ivanti-Workspace-Manager-Security-Bypass.html -http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html -http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html -http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html -http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/156844/Avast-Secure-Browser-76.0.1659.101-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/156872/Horde-5.2.22-CSV-Import-Code-Execution.html -http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html -http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html -http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html -http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html -http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html -http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html -http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html -http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html -http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html -http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html -http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html -http://packetstormsecurity.com/files/156951/codeBeamer-9.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/156952/DLINK-DWL-2600-Authenticated-Remote-Command-Injection.html -http://packetstormsecurity.com/files/156953/IBM-Cognos-TM1-IBM-Planning-Analytics-Server-Configuration-Overwrite-Code-Execution.html -http://packetstormsecurity.com/files/156976/Grandstream-UCM6200-Series-WebSocket-1.0.20.20-SQL-Injection.html -http://packetstormsecurity.com/files/156977/Grandstream-UCM6200-Series-CTI-Interface-SQL-Injection.html -http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html -http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/157048/TP-LINK-Cloud-Cameras-NCXXX-Remote-NULL-Pointer-Dereference.html -http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html -http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html -http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157104/pfSense-2.4.4-P3-User-Manager-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157106/PlaySMS-index.php-Unauthenticated-Template-Injection-Code-Execution.html -http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html -http://packetstormsecurity.com/files/157111/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157112/LimeSurvey-4.1.11-Path-Traversal.html -http://packetstormsecurity.com/files/157114/LimeSurvey-4.1.11-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157164/Amcrest-Dahua-NVR-Camera-IP2M-841-Denial-Of-Service.html -http://packetstormsecurity.com/files/157196/TVT-NVMS-1000-Directory-Traversal.html -http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157208/MOVEit-Transfer-11.1.1-SQL-Injection.html -http://packetstormsecurity.com/files/157217/Cellebrite-UFED-7.29-Hardcoded-ADB-Authentication-Keys.html -http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157219/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157232/Matrix42-Workspace-Management-9.1.2.2765-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html -http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/157248/Microsoft-Windows-NtFilterToken-ParentTokenId-Incorrect-Setting-Privilege-Escalation.html -http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html -http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html -http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/157280/Common-Desktop-Environment-1.6-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/157281/Common-Desktop-Environment-2.3.1-1.6-libDtSvc-Buffer-Overflow.html -http://packetstormsecurity.com/files/157282/Oracle-Solaris-11.x-10-whodo-w-Buffer-Overflow.html -http://packetstormsecurity.com/files/157314/Sysaid-20.1.11-b26-Remote-Command-Execution.html -http://packetstormsecurity.com/files/157321/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html -http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/157328/QRadar-Community-Edition-7.3.1.6-Default-Credentials.html -http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/157335/QRadar-Community-Edition-7.3.1.6-Insecure-File-Permissions.html -http://packetstormsecurity.com/files/157336/QRadar-Community-Edition-7.3.1.6-PHP-Object-Injection.html -http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html -http://packetstormsecurity.com/files/157338/QRadar-Community-Edition-7.3.1.6-Authorization-Bypass.html -http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html -http://packetstormsecurity.com/files/157376/Chrome-AudioArray-Allocate-Data-Race-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157401/Open-AudIT-3.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-Privilege-Escalation.html -http://packetstormsecurity.com/files/157407/CloudMe-1.11.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/157419/Chrome-ReadableStream-Close-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/157476/Open-AudIT-3.2.2-Command-Injection-SQL-Injection.html -http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html -http://packetstormsecurity.com/files/157493/Druva-inSync-Windows-Client-6.5.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157514/Apache-OFBiz-17.12.03-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html -http://packetstormsecurity.com/files/157528/HP-Performance-Monitoring-xglance-Privilege-Escalation.html -http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html -http://packetstormsecurity.com/files/157531/TP-LINK-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html -http://packetstormsecurity.com/files/157532/TP-LINK-Cloud-Cameras-NCXXX-Hardcoded-Encryption-Key.html -http://packetstormsecurity.com/files/157533/TP-LINK-Cloud-Cameras-NCXXX-SetEncryptKey-Command-Injection.html -http://packetstormsecurity.com/files/157534/xt-Commerce-5.4.1-6.2.1-6.2.2-Improper-Access-Control.html -http://packetstormsecurity.com/files/157557/WordPress-WooCommerce-Advanced-Order-Export-3.1.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html -http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html -http://packetstormsecurity.com/files/157591/SolarWinds-MSP-PME-Cache-Service-Insecure-File-Permissions-Code-Execution.html -http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html -http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html -http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html -http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157615/Service-Tracing-Privilege-Escalation.html -http://packetstormsecurity.com/files/157616/Microsoft-Windows-NtUserMNDragOver-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157623/Pi-hole-4.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157624/Pi-hole-4.4-Remote-Code-Execution-Privilege-Escalation.html -http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html -http://packetstormsecurity.com/files/157668/Cisco-Digital-Network-Architecture-Center-1.3.1.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157680/Druva-inSync-inSyncCPHwnet64.exe-RPC-Type-5-Privilege-Escalation.html -http://packetstormsecurity.com/files/157699/Subrion-CMS-4.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157700/Subrion-CMS-4.2.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/157715/Cellebrite-UFED-7.5.0.845-Desktop-Escape-Privilege-Escalation.html -http://packetstormsecurity.com/files/157716/vBulletin-5.6.1-SQL-Injection.html -http://packetstormsecurity.com/files/157717/ManageEngine-Service-Desk-10.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157731/ManageEngine-AssetExplorer-Authenticated-Command-Execution.html -http://packetstormsecurity.com/files/157733/Mikrotik-Router-Monitoring-System-1.2.3-SQL-Injection.html -http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html -http://packetstormsecurity.com/files/157746/Oracle-Hospitality-RES-3700-5.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157748/Pi-Hole-heisenbergCompensator-Blocklist-OS-Command-Execution.html -http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157756/Submitty-20.04.01-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html -http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html -http://packetstormsecurity.com/files/157785/OpenEDX-Ironwood-2.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157787/Composr-CMS-10.0.30-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157807/Synology-DiskStation-Manager-smart.cgi-Remote-Command-Execution.html -http://packetstormsecurity.com/files/157808/Plesk-myLittleAdmin-ViewState-.NET-Deserialization.html -http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html -http://packetstormsecurity.com/files/157839/Pi-hole-4.4.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html -http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html -http://packetstormsecurity.com/files/157861/Pi-Hole-4.3.2-DHCP-MAC-OS-Command-Execution.html -http://packetstormsecurity.com/files/157885/WordPress-BBPress-2.5-Privilege-Escalation.html -http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html -http://packetstormsecurity.com/files/157898/QuickBox-Pro-2.1.8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157904/vBulletin-5.6.1-SQL-Injection.html -http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/157909/vCloud-Director-9.7.0.15498291-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html -http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html -http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html -http://packetstormsecurity.com/files/157936/D-Link-DIR-615-T1-20.10-CAPTCHA-Bypass.html -http://packetstormsecurity.com/files/157940/Navigate-CMS-2.8.7-Directory-Traversal.html -http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html -http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html -http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html -http://packetstormsecurity.com/files/157958/WinGate-9.4.1.5998-Insecure-Permissions-Privilege-Escalation.html -http://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html -http://packetstormsecurity.com/files/157988/Bludit-3.9.12-Directory-Traversal.html -http://packetstormsecurity.com/files/158000/RoyalTS-SSH-Tunnel-Authentication-Bypass.html -http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html -http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html -http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html -http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html -http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html -http://packetstormsecurity.com/files/158053/SMBleed-Uninitialized-Kernel-Memory-Read-Proof-Of-Concept.html -http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html -http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html -http://packetstormsecurity.com/files/158062/Sysax-MultiServer-6.90-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -http://packetstormsecurity.com/files/158111/MJML-4.6.2-Path-Traversal.html -http://packetstormsecurity.com/files/158112/SOS-JobScheduler-1.13.3-Stored-Password-Decryption.html -http://packetstormsecurity.com/files/158114/Gila-CMS-1.11.8-SQL-Injection.html -http://packetstormsecurity.com/files/158115/TP-LINK-Cloud-Cameras-NCXXX-Stack-Overflow.html -http://packetstormsecurity.com/files/158117/Pulse-Secure-Client-For-Windows-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/158119/Arista-Restricted-Shell-Escape-Privilege-Escalation.html -http://packetstormsecurity.com/files/158120/Zivif-Camera-2.3.4.2103-iptest.cgi-Blind-Remote-Command-Execution.html -http://packetstormsecurity.com/files/158140/Gila-CMS-1.1.18.1-SQL-Injection-Shell-Upload.html -http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158173/FileRun-2019.05.21-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html -http://packetstormsecurity.com/files/158205/Lansweeper-7.2-Default-Account-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158217/BSA-Radar-1.6.7234.24750-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html -http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html -http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html -http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158246/ATutor-2.2.4-Directory-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html -http://packetstormsecurity.com/files/158255/openSIS-7.4-Incorrect-Access-Control.html -http://packetstormsecurity.com/files/158256/openSIS-7.4-Local-File-Inclusion.html -http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html -http://packetstormsecurity.com/files/158293/OCS-Inventory-NG-2.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html -http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158302/Android-o2-Business-1.2.0-Open-Redirect.html -http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html -http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/158322/Sophos-Secure-Email-Android-Application-3.9.4-Man-In-The-Middle.html -http://packetstormsecurity.com/files/158323/VIPRE-Password-Vault-1.100.1090-Man-In-The-Middle.html -http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html -http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158334/BIG-IP-TMUI-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html -http://packetstormsecurity.com/files/158368/ClearPass-Policy-Manager-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/158372/BSA-Radar-1.6.7234.24750-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/158373/SuperMicro-IPMI-03.40-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/158390/Pandora-FMS-7.0-NG-7XX-Remote-Command-Execution.html -http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158411/Verint-Impact-360-15.1-Script-Insertion-HTML-Injection.html -http://packetstormsecurity.com/files/158412/Verint-Impact-360-15.1-Open-Redirect.html -http://packetstormsecurity.com/files/158413/Verint-Impact-360-15.1-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/158414/Checker-CVE-2020-5902.html -http://packetstormsecurity.com/files/158420/BSA-Radar-1.6.7234.24750-Local-File-Inclusion.html -http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158428/Zyxel-Armor-X1-WAP6806-Directory-Traversal.html -http://packetstormsecurity.com/files/158434/SecZetta-NEProfile-3.3.11-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/158470/Plex-Unpickle-Dict-Windows-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html -http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158554/ManageEngine-Applications-Manager-13-SQL-Injection.html -http://packetstormsecurity.com/files/158556/INNEO-Startup-TOOLS-2018-M040-13.0.70.3804-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158563/WordPress-Email-Subscribers-And-Newsletters-4.2.2-File-Disclosure.html -http://packetstormsecurity.com/files/158568/WordPress-Email-Subscribers-And-Newsletters-4.2.2-SQL-Injection.html -http://packetstormsecurity.com/files/158569/Bludit-3.9.2-Directory-Traversal.html -http://packetstormsecurity.com/files/158576/Bio-Star-2.8.2-Local-File-Inclusion.html -http://packetstormsecurity.com/files/158581/F5-Big-IP-13.1.3-Build-0.0.6-Local-File-Inclusion.html -http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158614/pfSense-2.4.4-p3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html -http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html -http://packetstormsecurity.com/files/158648/Cisco-Adaptive-Security-Appliance-Software-9.7-Arbitrary-File-Deletion.html -http://packetstormsecurity.com/files/158649/WordPress-Maintenance-Mode-By-SeedProd-5.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158692/ABUS-Secvest-Hybrid-Module-FUMO50110-Authentication-Bypass.html -http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html -http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html -http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html -http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html -http://packetstormsecurity.com/files/158716/CloudMe-1.11.2-SEH-Buffer-Overflow.html -http://packetstormsecurity.com/files/158728/Mara-CMS-7.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158729/Microsoft-Windows-Win32k-Privilege-Escalation.html -http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html -http://packetstormsecurity.com/files/158737/Pi-hole-4.3.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158751/Gantt-Chart-For-Jira-5.5.3-Missing-Privilege-Check.html -http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158771/ACTi-NVR3-Standard-Professional-Server-3.0.12.42-Denial-Of-Service.html -http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html -http://packetstormsecurity.com/files/158820/ManageEngine-ADSelfService-Plus-6000-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158829/vBulletin-5.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158830/vBulletin-5.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158840/Fuel-CMS-1.4.7-SQL-Injection.html -http://packetstormsecurity.com/files/158847/SugarCRM-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158848/SugarCRM-SQL-Injection.html -http://packetstormsecurity.com/files/158866/vBulletin-5.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158868/Artica-Proxy-4.3.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/158869/Android-App-Zygotes-Improper-Guarding.html -http://packetstormsecurity.com/files/158874/Safari-Webkit-For-iOS-7.1.2-JIT-Optimization-Bug.html -http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html -http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html -http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html -http://packetstormsecurity.com/files/158904/D-Link-Central-WiFi-Manager-CWM-100-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158931/WordPress-NAB-Transact-WooCommerce-2.1.0-Payment-Bypass.html -http://packetstormsecurity.com/files/158932/OX-App-Suite-OX-Documents-XSS-SSRF-Bypass.html -http://packetstormsecurity.com/files/158933/Seowon-SlC-130-Router-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158938/Microsoft-Windows-CmpDoReDoCreateKey-Arbitrary-Registry-Key-Creation-Privilege-Escalation.html -http://packetstormsecurity.com/files/158939/Microsoft-Windows-CmpDoReadTxRBigLogRecord-Memory-Corruption-Privilege-Escalation.html -http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/158965/SecZetta-NEProfile-3.3.11-Host-Header-Injection.html -http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-File-Permissions.html -http://packetstormsecurity.com/files/158990/ZTE-Mobile-Hotspot-MS910S-Backdoor-Hardcoded-Password.html -http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/158992/Nagios-Log-Server-2.1.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/158999/TP-Link-WDR4300-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html -http://packetstormsecurity.com/files/159026/Sagemcom-F-ST-5280-Privilege-Escalation.html -http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html -http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159055/Noise-Java-AESGCMFallbackCipherState.encryptWithAd-Insufficient-Boundary-Checks.html -http://packetstormsecurity.com/files/159056/Noise-Java-AESGCMOnCtrCipherState.encryptWithAd-Insufficient-Boundary-Checks.html -http://packetstormsecurity.com/files/159057/Noise-Java-ChaChaPolyCipherState.encryptWithAd-Insufficient-Boundary-Checks.html -http://packetstormsecurity.com/files/159058/COVR-3902-1.01B0-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html -http://packetstormsecurity.com/files/159065/Pulse-Secure-Windows-Client-Privilege-Escalation.html -http://packetstormsecurity.com/files/159066/ManageEngine-Applications-Manager-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159072/Joomla-GMapFP-J3.5-J3.5F-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/159109/Microsoft-Windows-CloudExperienceHostBroker-Privilege-Escalation.html -http://packetstormsecurity.com/files/159134/CuteNews-2.1.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159135/ZTE-F602W-CAPTCHA-Bypass.html -http://packetstormsecurity.com/files/159137/Microsoft-Internet-Explorer-11-Use-After-Free.html -http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/159185/ModSecurity-3.0.x-Denial-Of-Service.html -http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html -http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159193/1CRM-8.6.7-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/159194/Mida-Solutions-eFramework-ajaxreq.php-Command-Injection.html -http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159216/Microsoft-SQL-Server-Reporting-Services-2016-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159217/Microsoft-Spooler-Local-Privilege-Elevation.html -http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159222/TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html -http://packetstormsecurity.com/files/159234/VyOS-restricted-shell-Escape-Privilege-Escalation.html -http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/159239/Mida-eFramework-2.9.0-Backdoor-Access.html -http://packetstormsecurity.com/files/159246/Comodo-Unified-Threat-Management-Web-Console-2.7.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159260/Seat-Reservation-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/159261/Seat-Reservation-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/159262/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/159263/Visitor-Management-System-In-PHP-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159264/Framer-Preview-12-Content-Injection.html -http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html -http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html -http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159305/Microsoft-Windows-Update-Orchestrator-Unchecked-ScheduleWork-Call.html -http://packetstormsecurity.com/files/159314/Mida-eFramework-2.8.9-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159315/MSI-Ambient-Link-Driver-1.0.0.8-Privilege-Escalation.html -http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html -http://packetstormsecurity.com/files/159327/CloudMe-1.11.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/159419/Corona-Exposure-Notifications-API-Data-Leakage.html -http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html -http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html -http://packetstormsecurity.com/files/159434/CMS-Made-Simple-2.2.14-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159454/FusionAuth-SAMLv2-0.2.3-Message-Forging.html -http://packetstormsecurity.com/files/159455/MailDepot-2032-SP2-2.2.1242-Authorization-Bypass.html -http://packetstormsecurity.com/files/159470/SpamTitan-7.07-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html -http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html -http://packetstormsecurity.com/files/159496/GAEN-Protocol-Metadata-Deanonymization-Risk-Score-Inflation.html -http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html -http://packetstormsecurity.com/files/159516/D-Link-DSR-250N-Denial-Of-Service.html -http://packetstormsecurity.com/files/159520/Garfield-Petshop-2020-10-01-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html -http://packetstormsecurity.com/files/159525/Kentico-CMS-9.0-12.0.49-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159558/Chrome-MediaElementEventListener-UpdateSources-Use-After-Free.html -http://packetstormsecurity.com/files/159560/NodeBB-Forum-1.14.2-Account-Takeover.html -http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html -http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/159575/aaPanel-6.6.6-Privilege-Escalation.html -http://packetstormsecurity.com/files/159589/QRadar-RemoteJavaScript-Deserialization.html -http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html -http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html -http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html -http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html -http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html -http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html -http://packetstormsecurity.com/files/159606/FRITZ-Box-7.20-DNS-Rebinding-Protection-Bypass.html -http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html -http://packetstormsecurity.com/files/159610/Chrome-USB-OnServiceConnectionError-Use-After-Free.html -http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html -http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159614/Hostel-Management-System-2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159615/Typesetter-CMS-5.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159618/Comtrend-AR-5387un-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159637/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html -http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html -http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/159663/Tiki-Wiki-CMS-Groupware-21.1-Authentication-Bypass.html -http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-Bypass.html -http://packetstormsecurity.com/files/159667/BigBlueButton-2.2.25-File-Disclosure-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/159690/CMS-Made-Simple-2.1.6-Server-Side-Template-Injection.html -http://packetstormsecurity.com/files/159699/QSC-Q-SYS-Core-Manager-8.2.1-Directory-Traversal.html -http://packetstormsecurity.com/files/159712/Sentrifugo-3.2-Shell-Upload-Restriction-Bypass.html -http://packetstormsecurity.com/files/159715/Sphider-Search-Engine-1.3.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159740/Blueman-Local-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/159743/Nagios-XI-5.7.3-Remote-Command-Injection.html -http://packetstormsecurity.com/files/159747/God-Kings-0.60.1-Notification-Spoofing.html -http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html -http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159772/DedeCMS-5.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159784/Foxit-Reader-9.7.1-Remote-Command-Execution.html -http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html -http://packetstormsecurity.com/files/159898/Amarok-2.8.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159936/Genexis-Platinum-4410-P4410-V2-1.28-Missing-Access-Control-CSRF.html -http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html -http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html -http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html -http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/159996/Anuko-Time-Tracker-1.19.23.5325-CSV-Injection.html -http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html -http://packetstormsecurity.com/files/160028/Microsoft-Windows-Local-Spooler-Bypass.html -http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html -http://packetstormsecurity.com/files/160046/HorizontCMS-1.0.0-beta-Shell-Upload.html -http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html -http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html -http://packetstormsecurity.com/files/160054/Microsoft-Windows-WindowsCodecsRaw-CCanonRawImageRep-GetNamedWhiteBalances-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/160077/MailDepot-2033-2.3.3022-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160082/Kaa-IoT-Platform-1.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160106/Aerospike-Database-5.1.0.3-Remote-Command-Execution.html -http://packetstormsecurity.com/files/160107/Grocy-Household-Management-Solution-2.7.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html -http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html -http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html -http://packetstormsecurity.com/files/160128/PESCMS-TEAM-2.3.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160129/xuucms-3-SQL-Injection.html -http://packetstormsecurity.com/files/160136/Gemtek-WVRTM-127ACN-01.01.02.141-Command-Injection.html -http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160157/Free-MP3-CD-Ripper-2.8-Buffer-Overflow.html -http://packetstormsecurity.com/files/160161/Barco-wePresent-Authentication-Bypass.html -http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html -http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-Root-SSH-Password.html -http://packetstormsecurity.com/files/160164/Barco-wePresent-Insecure-Firmware-Image.html -http://packetstormsecurity.com/files/160168/LifeRay-7.2.1-GA2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/160211/ZeroShell-3.9.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html -http://packetstormsecurity.com/files/160225/Razer-Chroma-SDK-Server-3.16.02-Race-Condition.html -http://packetstormsecurity.com/files/160238/BigBlueButton-2.2.29-Brute-Force.html -http://packetstormsecurity.com/files/160239/BigBlueButton-2.2.29-E-mail-Validation-Bypass.html -http://packetstormsecurity.com/files/160240/Foxit-Reader-9.0.1.1049-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/160242/libupnp-1.6.18-Denial-Of-Service.html -http://packetstormsecurity.com/files/160243/Laravel-Administrator-4-File-Upload.html -http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html -http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html -http://packetstormsecurity.com/files/160281/SciKit-Learn-0.23.2-Denial-Of-Service.html -http://packetstormsecurity.com/files/160282/WordPress-EventON-Calendar-3.0.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160312/PRTG-Network-Monitor-20.4.63.1412-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html -http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html -http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html -http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html -http://packetstormsecurity.com/files/160397/Online-Bus-Booking-System-Project-Using-PHP-MySQL-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/160398/Student-Management-System-Project-PHP-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html -http://packetstormsecurity.com/files/160411/FlexDotnetCMS-1.5.8-Arbitrary-ASP-File-Upload.html -http://packetstormsecurity.com/files/160416/SmarterMail-6985-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160441/GitLab-File-Read-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160451/Aerospike-Database-UDF-Lua-Code-Execution.html -http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160453/OpenAsset-Digital-Asset-Management-IP-Access-Control-Bypass.html -http://packetstormsecurity.com/files/160455/OpenAsset-Digital-Asset-Management-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160457/OpenAsset-Digital-Asset-Management-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/160458/OpenAsset-Digital-Asset-Management-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/160459/OpenAsset-Digital-Asset-Management-SQL-Injection.html -http://packetstormsecurity.com/files/160478/Macally-WIFISD2-2A82-2.000.010-Privilege-Escalation.html -http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html -http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160508/Alumni-Management-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html -http://packetstormsecurity.com/files/160515/Microsoft-Windows-DrawIconEx-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/160516/GitLab-11.4.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html -http://packetstormsecurity.com/files/160583/Alumni-Management-System-1.0-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/160591/Alumni-Management-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160599/Online-Health-Card-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160606/Library-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html -http://packetstormsecurity.com/files/160616/Jenkins-2.251-LTS-2.235.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html -http://packetstormsecurity.com/files/160623/Programi-Bilanc-Build-007-Release-014-31.01.2020-Weak-Default-Password.html -http://packetstormsecurity.com/files/160625/Programi-Bilanc-Build-007-Release-014-31.01.2020-Static-Key.html -http://packetstormsecurity.com/files/160627/Programi-Bilanc-Build-007-Release-014-31.01.2020-Insecure-Downloads.html -http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html -http://packetstormsecurity.com/files/160631/Spiceworks-7.5-HTTP-Header-Injection.html -http://packetstormsecurity.com/files/160634/SCO-Openserver-5.0.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160635/SCO-Openserver-5.0.7-Command-Injection.html -http://packetstormsecurity.com/files/160652/Stratodesk-NoTouch-Center-Privilege-Escalation.html -http://packetstormsecurity.com/files/160666/SUPREMO-4.1.3.2348-Privilege-Escalation.html -http://packetstormsecurity.com/files/160674/WordPress-W3-Total-Cache-0.9.3-File-Read-Directory-Traversal.html -http://packetstormsecurity.com/files/160676/Webmin-1.962-Remote-Command-Execution.html -http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html -http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html -http://packetstormsecurity.com/files/160699/GitLab-11.4.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html -http://packetstormsecurity.com/files/160722/URVE-Software-Build-24.03.2020-Authentication-Bypass-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160724/Philips-Hue-Denial-Of-Service.html -http://packetstormsecurity.com/files/160725/URVE-Software-Build-24.03.2020-Missing-Authorization.html -http://packetstormsecurity.com/files/160726/URVE-Software-Build-24.03.2020-Information-Disclosure.html -http://packetstormsecurity.com/files/160733/qdPM-9.1-PHP-Object-Injection.html -http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html -http://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html -http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html -http://packetstormsecurity.com/files/160783/Subrion-CMS-4.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160784/Incom-CMS-2.0-File-Upload.html -http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html -http://packetstormsecurity.com/files/160798/Klog-Server-2.4.1-Command-Injection.html -http://packetstormsecurity.com/files/160809/SpamTitan-7.07-Command-Injection.html -http://packetstormsecurity.com/files/160815/IPeakCMS-3.5-SQL-Injection.html -http://packetstormsecurity.com/files/160826/Newgen-Correspondence-Management-System-eGov-12.0-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/160830/IPS-Community-Suite-4.5.4-SQL-Injection.html -http://packetstormsecurity.com/files/160832/PaperStream-IP-TWAIN-1.42.0.5685-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160841/Dovecot-2.3.11.3-Denial-Of-Service.html -http://packetstormsecurity.com/files/160842/Dovecot-2.3.11.3-Access-Bypass.html -http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html -http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html -http://packetstormsecurity.com/files/160850/WordPress-Autoptimize-Shell-Upload.html -http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -http://packetstormsecurity.com/files/160919/Cloud-Filter-Arbitrary-File-Creation-Privilege-Escalation.html -http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html -http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/160953/Cisco-RV110W-1.2.1.7-Denial-Of-Service.html -http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution.html -http://packetstormsecurity.com/files/160993/Microsoft-Spooler-Local-Privilege-Elevation.html -http://packetstormsecurity.com/files/160995/osTicket-1.14.2-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/161048/Anchor-CMS-0.12.7-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html -http://packetstormsecurity.com/files/161053/Oracle-WebLogic-Server-14.1.1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html -http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html -http://packetstormsecurity.com/files/161072/Caret-Editor-4.0.0-rc21-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161119/Tenda-AC5-AC1200-Wireless-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161123/Klog-Server-2.4.1-Command-Injection.html -http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html -http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html -http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html -http://packetstormsecurity.com/files/161208/Klog-Server-2.4.1-Command-Injection.html -http://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161226/Roundcube-Webmail-1.2-File-Disclosure.html -http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html -http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html -http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html -http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html -http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161295/XNU-Kernel-Turnstiles-Type-Confusion.html -http://packetstormsecurity.com/files/161296/XNU-Kernel-Mach-Message-Trailers-Memory-Disclosure.html -http://packetstormsecurity.com/files/161299/Apple-CoreText-libFontParser.dylib-Stack-Corruption.html -http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html -http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161334/Millewin-13.39.028-Unquoted-Service-Path-Insecure-Permissions.html -http://packetstormsecurity.com/files/161335/SmartFoxServer-2X-2.17.0-God-Mode-Console-WebSocket-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161337/SmartFoxServer-2X-2.17.0-Credential-Disclosure.html -http://packetstormsecurity.com/files/161340/SmartFoxServer-2X-2.17.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/161347/Discord-Probot-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/161356/Node.JS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html -http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161399/SolarWinds-Serv-U-FTP-Server-15.2.1-Path-Traversal.html -http://packetstormsecurity.com/files/161400/SolarWinds-Serv-U-FTP-Server-15.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161401/TestLink-1.9.20-Shell-Upload.html -http://packetstormsecurity.com/files/161410/Klog-Server-2.4.1-Command-Injection.html -http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/161421/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161449/IrfanView-4.57-Denial-Of-Service-Code-Execution.html -http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html -http://packetstormsecurity.com/files/161471/Asterisk-Project-Security-Advisory-AST-2021-002.html -http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html -http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html -http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161501/Monica-2.19.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161507/CIRA-Canadian-Shield-Man-In-The-Middle.html -http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html -http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html -http://packetstormsecurity.com/files/161570/Triconsole-3.75-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/161582/Microsoft-DirectWrite-fsg_ExecuteGlyph-Buffer-Overflow.html -http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/161606/TinyTinyRSS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html -http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html -http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html -http://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html -http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html -http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html -http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161696/Mozilla-Arbitrary-Code-Execution-Privilege-Escalation.html -http://packetstormsecurity.com/files/161700/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Privilege-Escalation.html -http://packetstormsecurity.com/files/161701/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Missing-Authentication.html -http://packetstormsecurity.com/files/161711/Golden-FTP-Server-4.70-Buffer-Overflow.html -http://packetstormsecurity.com/files/161713/Microsoft-Windows-WindowsCodecsRaw-COlympusE300LoadRaw-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html -http://packetstormsecurity.com/files/161746/MyBB-OUGC-Feedback-1.8.22-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161757/D-Link-DIR-3060-1.11b04-Command-Injection.html -http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html -http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html -http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html -http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html -http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html -http://packetstormsecurity.com/files/161836/VestaCP-0.9.8-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html -http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html -http://packetstormsecurity.com/files/161900/WordPress-Delightful-Downloads-Jquery-File-Tree-1.6.6-Path-Traversal.html -http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html -http://packetstormsecurity.com/files/161918/MyBB-1.8.25-SQL-Injection.html -http://packetstormsecurity.com/files/161937/Advantech-iView-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/161955/Dolibarr-ERP-CRM-11.0.4-Bypass-Code-Execution.html -http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/161993/SAP-Solution-Manager-7.2-Remote-Command-Execution.html -http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html -http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html -http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162083/SAP-SMD-Agent-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162084/SAP-Host-Control-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/162085/SAP-JAVA-Configuration-Task-Execution.html -http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162088/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162092/Pulse-Secure-VPN-Arbitrary-Command-Execution.html -http://packetstormsecurity.com/files/162093/OpenBSD-OpenSMTPD-6.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html -http://packetstormsecurity.com/files/162105/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162107/Atlassian-Jira-Service-Desk-4.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162110/Dell-OpenManage-Server-Administrator-9.4.0.0-File-Read.html -http://packetstormsecurity.com/files/162111/Composr-CMS-10.0.36-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html -http://packetstormsecurity.com/files/162118/Monospace-Directus-Headless-CMS-File-Upload-Rule-Bypass.html -http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html -http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162123/Gogs-Git-Hooks-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162128/Composr-10.0.36-Shell-Upload.html -http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.html -http://packetstormsecurity.com/files/162136/DMA-Radius-Manager-4.4.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/162138/Tableau-Server-Open-Redirection.html -http://packetstormsecurity.com/files/162140/PrestaShop-1.7.6.7-SQL-Injection.html -http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html -http://packetstormsecurity.com/files/162145/vsftpd-2.3.4-Backdoor-Command-Execution.html -http://packetstormsecurity.com/files/162152/ExpressVPN-VPN-Router-1.0-Integer-Overflow.html -http://packetstormsecurity.com/files/162157/Microsoft-Windows-SCM-Remote-Access-Check-Limit-Bypass-Privilege-Escalation.html -http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162174/Genexis-PLATINUM-4410-2.1-P4410-V2-1.28-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html -http://packetstormsecurity.com/files/162181/CITSmart-ITSM-9.1.2.22-LDAP-Injection.html -http://packetstormsecurity.com/files/162182/CITSmart-ITSM-9.1.2.27-SQL-Injection.html -http://packetstormsecurity.com/files/162187/Webmail-Edition-5.2.22-XSS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162190/Microsoft-Azure-DevOps-Server-2020.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162194/Horde-Groupware-Webmail-5.2.22-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162195/htmly-2.8.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162235/Nagios-XI-5.7.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html -http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html -http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html -http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html -http://packetstormsecurity.com/files/162258/Multilaser-Router-RE018-AC1200-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/162262/RemoteClinic-2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162268/Adtran-Personal-Phone-Manager-10.8.1-Persistent-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162269/Adtran-Personal-Phone-Manager-10.8.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162280/Adtran-Personal-Phone-Manager-10.8.1-DNS-Exfiltration.html -http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162284/Nagios-XI-5.7.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162287/CMS-Made-Simple-2.2.15-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162314/DzzOffice-2.02.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162316/Sipwise-C5-NGCP-CSC-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162318/Sipwise-C5-NGCP-CSC-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html -http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html -http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162380/Android-NFC-Stack-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html -http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html -http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162407/Micro-Focus-Operations-Bridge-Reporter-shrboadmin-Default-Password.html -http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html -http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html -http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162450/Shenzhen-Skyworth-RN510-Buffer-Overflow.html -http://packetstormsecurity.com/files/162454/Shenzhen-Skyworth-RN510-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162455/Shenzhen-Skyworth-RN510-Information-Disclosure.html -http://packetstormsecurity.com/files/162457/GravCMS-1.10.7-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html -http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html -http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html -http://packetstormsecurity.com/files/162534/Hexagon-G-nius-Auskunftsportal-SQL-Injection.html -http://packetstormsecurity.com/files/162555/Windows-Container-Manager-Service-CmsRpcSrv_CreateContainer-Privilege-Escalation.html -http://packetstormsecurity.com/files/162556/Windows-Container-Manager-Service-CmsRpcSrv_MapVirtualDiskToContainer-Privilege-Escalation.html -http://packetstormsecurity.com/files/162557/Windows-Container-Manager-Service-Arbitrary-Object-Directory-Creation-Privilege-Escalation.html -http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html -http://packetstormsecurity.com/files/162559/Windows-Container-Manager-Service-CmsRpcSrv_MapNamedPipeToContainer-Privilege-Escalation.html -http://packetstormsecurity.com/files/162561/ZeroShell-3.9.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162564/ScadaBR-1.0-1.1CE-Linux-Shell-Upload.html -http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html -http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html -http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html -http://packetstormsecurity.com/files/162572/Chamilo-LMS-1.11.14-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html -http://packetstormsecurity.com/files/162585/Microsoft-Internet-Explorer-8-SetMouseCapture-Use-After-Free.html -http://packetstormsecurity.com/files/162591/Subrion-CMS-4.2.1-Shell-Upload.html -http://packetstormsecurity.com/files/162604/Dell-DBUtil_2_3.sys-IOCTL-Memory-Read-Write.html -http://packetstormsecurity.com/files/162610/Microsoft-Exchange-2019-Unauthenticated-Email-Download.html -http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html -http://packetstormsecurity.com/files/162617/NetMotion-Mobility-Server-MvcUtil-Java-Deserialization.html -http://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162722/Microsoft-HTTP-Protocol-Stack-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html -http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html -http://packetstormsecurity.com/files/162739/DELL-dbutil_2_3.sys-2.3-Arbitrary-Write-Privilege-Escalation.html -http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162756/WordPress-ReDi-Restaurant-Reservation-21.0307-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162772/Codiad-2.8.4-Shell-Upload.html -http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html -http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html -http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html -http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html -http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html -http://packetstormsecurity.com/files/162852/PHPFusion-9.03.50-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162853/Trixbox-2.8.0.4-Path-Traversal.html -http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162856/WordPress-LifterLMS-4.21.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/162868/IPS-Community-Suite-4.5.4.2-PHP-Code-Injection.html -http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html -http://packetstormsecurity.com/files/162873/Veyon-4.4.1-Unquoted-Service-Path.html -http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html -http://packetstormsecurity.com/files/162906/GetSimple-CMS-3.3.4-Information-Disclosure.html -http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html -http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html -http://packetstormsecurity.com/files/162919/Local-Service-Search-Engine-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/162934/CHIYU-IoT-Denial-Of-Service.html -http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/162952/Gstreamer-Matroska-Demuxing-Use-After-Free.html -http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html -http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html -http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html -http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162968/Monstra-CMS-3.0.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162973/Chrome-Legacy-ipc-Message-Passed-Via-Shared-Memory.html -http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html -http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html -http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html -http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html -http://packetstormsecurity.com/files/162995/IcoFX-2.6-Buffer-Overflow.html -http://packetstormsecurity.com/files/162997/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html -http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163014/COVID-19-Testing-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/163023/Intelbras-Router-RF-301K-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html -http://packetstormsecurity.com/files/163080/Microsoft-SharePoint-Server-16.0.10372.20060-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html -http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html -http://packetstormsecurity.com/files/163091/WordPress-Database-Backups-1.2.2.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/163093/Accela-Civic-Platorm-21.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html -http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html -http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html -http://packetstormsecurity.com/files/163143/SAP-Hybris-eCommerce-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/163146/SAP-Hybris-eCommerce-Information-Disclosure.html -http://packetstormsecurity.com/files/163148/XML-External-Entity-Via-MP3-File-Upload-On-WordPress.html -http://packetstormsecurity.com/files/163153/SAP-Wily-Introscope-Enterprise-OS-Command-Injection.html -http://packetstormsecurity.com/files/163158/IPFire-2.25-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163159/SAP-Wily-Introscope-Enterprise-Default-Hard-Coded-Credentials.html -http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html -http://packetstormsecurity.com/files/163161/SAP-Solution-Manager-7.2-Missing-Authorization.html -http://packetstormsecurity.com/files/163164/SAP-XMII-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163166/SAP-Netweaver-JAVA-7.50-Missing-Authorization.html -http://packetstormsecurity.com/files/163168/SAP-Solution-Manager-7.20-Missing-Authorization.html -http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html -http://packetstormsecurity.com/files/163192/Zoho-ManageEngine-ServiceDesk-Plus-9.4-User-Enumeration.html -http://packetstormsecurity.com/files/163198/Samsung-NPU-npu_session_format-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html -http://packetstormsecurity.com/files/163208/Microsoft-SharePoint-Unsafe-Control-And-ViewState-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html -http://packetstormsecurity.com/files/163222/Node.JS-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163223/Protectimus-SLIM-NFC-Time-Manipulation.html -http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html -http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html -http://packetstormsecurity.com/files/163261/WordPress-WP-Google-Maps-8.1.11-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html -http://packetstormsecurity.com/files/163264/F5-BIG-IQ-VE-8.0.0-2923215-Remote-Root.html -http://packetstormsecurity.com/files/163265/Cisco-Modeling-Labs-2.1.1-b19-Remote-Command-Execution.html -http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163271/Adobe-ColdFusion-8-Remote-Command-Execution.html -http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html -http://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html -http://packetstormsecurity.com/files/163283/Seeddms-5.1.10-Remote-Command-Execution.html -http://packetstormsecurity.com/files/163289/Atlassian-Jira-Server-Data-Center-8.16.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163294/SAS-Environment-Manager-2.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html -http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/163311/Android-2.0-FreeCIV-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/163324/KVM-nested_svm_vmrun-Double-Fetch.html -http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html -http://packetstormsecurity.com/files/163343/AKCP-sensorProbe-SPX476-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163345/WordPress-Modern-Events-Calendar-5.16.2-Information-Disclosure.html -http://packetstormsecurity.com/files/163346/WordPress-Modern-Events-Calendar-5.16.2-Shell-Upload.html -http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html -http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html -http://packetstormsecurity.com/files/163382/WordPress-Backup-Guard-1.5.8-Shell-Upload.html -http://packetstormsecurity.com/files/163398/Pallets-Werkzeug-0.15.4-Path-Traversal.html -http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html -http://packetstormsecurity.com/files/163419/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html -http://packetstormsecurity.com/files/163425/WordPress-Plainview-Activity-Monitor-20161228-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html -http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html -http://packetstormsecurity.com/files/163443/MpEngine-ASProtect-Embedded-Runtime-DLL-Memory-Corruption.html -http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html -http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163466/Pandora-FMS-7.54-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163482/OpenEMR-5.0.1.3-Shell-Upload.html -http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html -http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163492/Webmin-1.973-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html -http://packetstormsecurity.com/files/163498/Realtek-RTKVHD64.sys-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/163499/Windows-TCP-IP-Denial-Of-Service.html -http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html -http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html -http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html -http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html -http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/163536/WordPress-LearnPress-SQL-Injection.html -http://packetstormsecurity.com/files/163538/WordPress-LearnPress-Privilege-Escalation.html -http://packetstormsecurity.com/files/163541/Dolibarr-ERP-CRM-10.0.6-Login-Brute-Forcer.html -http://packetstormsecurity.com/files/163559/Webmin-1.973-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/163564/Concrete5-8.5.5-Phar-Deserialization.html -http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html -http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html -http://packetstormsecurity.com/files/163623/WordPress-Backup-Guard-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html -http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html -http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html -http://packetstormsecurity.com/files/163655/Elasticsearch-ECE-7.13.3-Database-Disclosure.html -http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html -http://packetstormsecurity.com/files/163672/WordPress-Modern-Events-Calendar-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163687/eGain-Chat-15.5.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/163706/Microsoft-Exchange-AD-Schema-Misconfiguration-Privilege-Escalation.html -http://packetstormsecurity.com/files/163715/Pi-Hole-Remove-Commands-Linux-Privilege-Escalation.html -http://packetstormsecurity.com/files/163730/Apache-OfBiz-17.12.01-Remote-Command-Execution.html -http://packetstormsecurity.com/files/163737/CMSuno-1.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html -http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html -http://packetstormsecurity.com/files/163795/Canon-TR150-Driver-3.71.2.10-Privilege-Escalation.html -http://packetstormsecurity.com/files/163796/Xiaomi-10.2.4.g-Information-Disclosure.html -http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html -http://packetstormsecurity.com/files/163816/Chikitsa-2.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163823/PluXML-5.8.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163825/Tiny-Java-Web-Server-1.115-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163835/Chrome-JS-WasmJs-InstallConditionalFeatures-Object-Corruption.html -http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163857/SonicWall-NetExtender-10.2.0.300-Unquoted-Service-Path.html -http://packetstormsecurity.com/files/163859/Cyberoam-NetGenie-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163864/Lucee-Administrator-imgProcess.cfm-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/163869/Hospital-Management-System-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html -http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html -http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html -http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html -http://packetstormsecurity.com/files/163973/WordPress-ProfilePress-3.1.3-Privilege-Escalation.html -http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html -http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html -http://packetstormsecurity.com/files/163989/BSCW-Server-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164006/HiveNightmare-AKA-SeriousSAM.html -http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/164014 -http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/164023/CyberArk-Credential-File-Insufficient-Effective-Key-Space.html -http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html -http://packetstormsecurity.com/files/164026/Compro-Technology-IP-Camera-RTSP-Stream-Disclosure.html -http://packetstormsecurity.com/files/164027/Compro-Technology-IP-Camera-Credential-Disclosure.html -http://packetstormsecurity.com/files/164031/Compro-Technology-IP-Camera-Stream-Disclosure.html -http://packetstormsecurity.com/files/164032/Compro-Technology-IP-Camera-Screenshot-Disclosure.html -http://packetstormsecurity.com/files/164033/CyberArk-Credential-Provider-Race-Condition-Authorization-Bypass.html -http://packetstormsecurity.com/files/164035/CyberArk-Credential-Provider-Local-Cache-Decryption.html -http://packetstormsecurity.com/files/164045/jforum-2.7.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164047/FlatCore-CMS-2.0.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164085/Ionic-Identity-Vault-4.7-Android-Biometric-Authentication-Bypass.html -http://packetstormsecurity.com/files/164121/Internet-Explorer-JIT-Optimization-Memory-Corruption.html -http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html -http://packetstormsecurity.com/files/164149/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html -http://packetstormsecurity.com/files/164152/Ulfius-Web-Framework-Remote-Memory-Corruption.html -http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html -http://packetstormsecurity.com/files/164160/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html -http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html -http://packetstormsecurity.com/files/164180/Git-git-lfs-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html -http://packetstormsecurity.com/files/164198/WordPress-5.7-Media-Library-XML-Injection.html -http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html -http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html -http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html -http://packetstormsecurity.com/files/164253/OpenCats-0.9.4-2-XML-Injection.html -http://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html -http://packetstormsecurity.com/files/164261/WordPress-Fitness-Calculators-1.9.5-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/164263/WordPress-Advanced-Order-Export-For-WooCommerce-3.1.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164270/Gurock-Testrail-7.2.0.3014-Improper-Access-Control.html -http://packetstormsecurity.com/files/164274/OpenVPN-Monitor-1.1.3-Authorization-Bypass-Denial-Of-Service.html -http://packetstormsecurity.com/files/164278/OpenVPN-Monitor-1.1.3-Command-Injection.html -http://packetstormsecurity.com/files/164281/OpenVPN-Monitor-1.1.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/164292/XAMPP-7.4.3-Privilege-Escalation.html -http://packetstormsecurity.com/files/164306/WordPress-TranslatePress-2.0.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164308/WordPress-Contact-Form-1.7.14-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164311/WordPress-Popup-1.10.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164316/WordPress-Ultimate-Maps-1.2.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164324/Covid-Vaccination-Scheduler-System-1.0-SQL-Injection-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164327/WordPress-Select-All-Categories-And-Taxonomies-1.3.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164328/WordPress-Redirect-404-To-Parent-1.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html -http://packetstormsecurity.com/files/164359/WhatsUpGold-21.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html -http://packetstormsecurity.com/files/164366/Lodging-Reservation-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/164375/Gatekeeper-Bypass-Proof-Of-Concept.html -http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html -http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html -http://packetstormsecurity.com/files/164419/Microsoft-Office-OneNote-2007-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html -http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html -http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html -http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html -http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html -http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html -http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164445/Maian-Cart-3.8-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html -http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164481/Moodle-SpellChecker-Path-Authenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html -http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html -http://packetstormsecurity.com/files/164514/IFSC-Code-Finder-Project-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/164519/i-Panel-Administration-System-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Improper-Access-Control.html -http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/164537/Mitsubishi-Electric-INEA-SmartRTU-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164538/Mitsubishi-Electric-INEA-SmartRTU-Source-Code-Disclosure.html -http://packetstormsecurity.com/files/164548/WordPress-Enfold-Theme-4.8.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164564/SonicWall-SMA-10.2.1.0-17sv-Password-Reset.html -http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html -http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html -http://packetstormsecurity.com/files/164600/SAP-Enterprise-Portal-Sensitive-Data-Disclosure.html -http://packetstormsecurity.com/files/164603/Hikvision-Web-Server-Build-210702-Command-Injection.html -http://packetstormsecurity.com/files/164604/WordPress-TaxoPress-3.0.7.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164615/Online-Event-Booking-And-Reservation-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164618/Engineers-Online-Portal-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/164621/GridPro-Request-Management-For-Windows-Azure-Pack-2.0.7905-Directory-Traversal.html -http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html -http://packetstormsecurity.com/files/164628/FreeSWITCH-1.10.6-Missing-SIP-MESSAGE-Authentication.html -http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164633/WordPress-4.9.6-Arbitrary-File-Deletion.html -http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html -http://packetstormsecurity.com/files/164697/Sophos-UTM-WebAdmin-SID-Command-Injection.html -http://packetstormsecurity.com/files/164704/Android-NFC-Type-Confusion.html -http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html -http://packetstormsecurity.com/files/164707/WebCTRL-OEM-6.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html -http://packetstormsecurity.com/files/164772/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164775/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Filename-Bypass.html -http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html -http://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html -http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164784/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Authentication-Bypass.html -http://packetstormsecurity.com/files/164787/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-User-Enumeration.html -http://packetstormsecurity.com/files/164791/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-SQL-Injection.html -http://packetstormsecurity.com/files/164795/FusionPBX-4.5.29-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164800/Froxlor-0.10.29.1-SQL-Injection.html -http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html -http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html -http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/164930/FormaLMS-2.4.4-Authentication-Bypass.html -http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html -http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html -http://packetstormsecurity.com/files/164957/Aerohive-NetConfig-10.0r8a-Local-File-Inclusion-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164961/Talariax-sendQuick-Alertplus-Server-Admin-4.3-SQL-Injection.html -http://packetstormsecurity.com/files/164968/Simple-Subscription-Website-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html -http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164985/Online-Learning-System-2.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html -http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html -http://packetstormsecurity.com/files/165027/Ionic-Identity-Vault-5.0.4-PIN-Unlock-Lockout-Bypass.html -http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html -http://packetstormsecurity.com/files/165031/Wipro-Holmes-Orchestrator-20.4.1-File-Disclosure.html -http://packetstormsecurity.com/files/165036/PuneethReddyHC-Online-Shopping-System-Advanced-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html -http://packetstormsecurity.com/files/165039/Wipro-Holmes-Orchestrator-20.4.1-Report-Disclosure.html -http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/165075/Apple-ColorSync-CMMNDimLinear-Interpolate-Uninitialized-Memory.html -http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html -http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html -http://packetstormsecurity.com/files/165106/Online-Enrollment-Management-System-In-PHP-And-PayPal-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165139/M-Files-Web-Denial-Of-Service.html -http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/165162/Auerswald-COMfortel-1400-2600-3600-IP-2.8F-Authentication-Bypass.html -http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html -http://packetstormsecurity.com/files/165166/Auerswald-COMpact-8.0B-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/165182/Reprise-License-Manager-14.2-User-Enumeration.html -http://packetstormsecurity.com/files/165186/Reprise-License-Manager-14.2-Unauthenticated-Password-Change.html -http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html -http://packetstormsecurity.com/files/165193/Reprise-License-Manager-14.2-Buffer-Overflow.html -http://packetstormsecurity.com/files/165194/Reprise-License-Manager-14.2-Remote-Binary-Execution.html -http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html -http://packetstormsecurity.com/files/165198/Grafana-Arbitrary-File-Reading.html -http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html -http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html -http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html -http://packetstormsecurity.com/files/165211/Raspberry-Pi-5.10-Default-Credentials.html -http://packetstormsecurity.com/files/165214/Microsoft-Office-Word-MSHTML-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165215/Kabir-Alhasan-Student-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/165221/Grafana-8.3.0-Directory-Traversal-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165252/WebHMI-4.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html -http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html -http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html -http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html -http://packetstormsecurity.com/files/165263/Booked-Scheduler-2.7.5-Shell-Upload.html -http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165278/Sofico-Miles-RIA-2020.2-Build-127964T-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html -http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html -http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html -http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html -http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html -http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html -http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html -http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html -http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html -http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html -http://packetstormsecurity.com/files/165400/ManageEngine-ServiceDesk-Plus-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165408/BeyondTrust-Remote-Support-6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html -http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html -http://packetstormsecurity.com/files/165432/ConnectWise-Control-19.2.24707-Username-Enumeration.html -http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html -http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/165438/Nettmp-NNT-5.1-SQL-Injection.html -http://packetstormsecurity.com/files/165439/Safari-Montage-8.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html -http://packetstormsecurity.com/files/165449/Automox-Agent-32-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html -http://packetstormsecurity.com/files/165475/XNU-inm_merge-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html -http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.html -http://packetstormsecurity.com/files/165502/Open-AudIT-Community-4.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html -http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html -http://packetstormsecurity.com/files/165559/Apple-ColorSync-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/165560/Microsoft-Windows-EFSRPC-Arbitrary-File-Upload-Privilege-Escalation.html -http://packetstormsecurity.com/files/165563/SonicWall-SMA-100-Series-Authenticated-Command-Injection.html -http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html -http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-Command-Execution.html -http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html -http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.html -http://packetstormsecurity.com/files/165684/WebACMS-2.1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165690/Alps-Alpine-Touchpad-Driver-DLL-Injection.html -http://packetstormsecurity.com/files/165701/FAUST-iServer-9.0.018.018.4-Local-File-Inclusion.html -http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html -http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html -http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html -http://packetstormsecurity.com/files/165737/SAP-Enterprise-Portal-NavigationReporter-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165740/SAP-Enterprise-Portal-RunContentCreation-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/165742/WordPress-Modern-Events-Calendar-6.1-SQL-Injection.html -http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/165746/WordPress-RegistrationMagic-V-5.0.1.5-SQL-Injection.html -http://packetstormsecurity.com/files/165748/SAP-Enterprise-Portal-Open-Redirect.html -http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html -http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html -http://packetstormsecurity.com/files/165863/Servisnet-Tessa-Authentication-Bypass.html -http://packetstormsecurity.com/files/165867/Servisnet-Tessa-MQTT-Credential-Disclosure.html -http://packetstormsecurity.com/files/165873/Servisnet-Tessa-Privilege-Escalation.html -http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html -http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html -http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html -http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html -http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html -http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html -http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-Unauthenticated-Command-Execution.html -http://packetstormsecurity.com/files/165944/Tokheim-Profleet-DiaLOG-Fuel-Management-System-11.005.02-SQL-Injection-Code-Execution.html -http://packetstormsecurity.com/files/165946/WordPress-Secure-Copy-Content-Protection-And-Content-Locking-2.8.1-SQL-Injection.html -http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/165964/Nokia-Transport-Module-Authentication-Bypass.html -http://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html -http://packetstormsecurity.com/files/165978/Nagios-XI-Autodiscovery-Shell-Upload.html -http://packetstormsecurity.com/files/165989/ServiceNow-Orlando-Username-Enumeration.html -http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166055/Fortinet-Fortimail-7.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166059/WordPress-UpdraftPlus-1.22.2-Backup-Disclosure.html -http://packetstormsecurity.com/files/166068/Thinfinity-VirtualUI-2.5.41.0-IFRAME-Injection.html -http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html -http://packetstormsecurity.com/files/166071/WordPress-WP-User-Frontend-3.5.25-SQL-Injection.html -http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html -http://packetstormsecurity.com/files/166073/Datarobot-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166074/FileCloud-21.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html -http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html -http://packetstormsecurity.com/files/166153/Microsoft-Exchange-Server-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html -http://packetstormsecurity.com/files/166167/Hikvision-IP-Camera-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html -http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html -http://packetstormsecurity.com/files/166181/Xerte-3.10.3-Directory-Traversal.html -http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166189/Zyxel-ZyWALL-2-Plus-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html -http://packetstormsecurity.com/files/166208/pfSense-2.5.2-Shell-Upload.html -http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html -http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html -http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html -http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html -http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html -http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html -http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html -http://packetstormsecurity.com/files/166299/WordPress-Core-5.9.0-5.9.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166328/Apache-APISIX-2.12.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html -http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/166369/SAP-Knowledge-Warehouse-7.50-7.40-7.31-7.30-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166386/3CX-Phone-System-Cleartext-Passwords.html -http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html -http://packetstormsecurity.com/files/166396/iRZ-Mobile-Router-Cross-Site-Request-Forgery-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html -http://packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.html -http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html -http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html -http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html -http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html -http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html -http://packetstormsecurity.com/files/166535/CSZ-CMS-1.2.9-SQL-Injection.html -http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166541/Kramer-VIAware-2.5.0719.1034-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166543/WordPress-Easy-Cookie-Policy-1.6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166546/Joomla-4.1.0-Zip-Slip-File-Overwrite-Path-Traversal.html -http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html -http://packetstormsecurity.com/files/166559/IdeaRE-RefTree-Shell-Upload.html -http://packetstormsecurity.com/files/166560/IdeaRE-RefTree-Path-Traversal.html -http://packetstormsecurity.com/files/166573/ALLMediaServer-1.6-Buffer-Overflow.html -http://packetstormsecurity.com/files/166574/Sherpa-Connector-Service-2020.2.20328.2050-Unquoted-Service-Path.html -http://packetstormsecurity.com/files/166577/Barco-Control-Room-Management-Suite-Directory-Traversal.html -http://packetstormsecurity.com/files/166585/Roxy-File-Manager-1.4.5-PHP-File-Upload-Restriction-Bypass.html -http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html -http://packetstormsecurity.com/files/166609/SAP-Information-System-1.0.0-Missing-Authorization.html -http://packetstormsecurity.com/files/166610/FFS-Colibri-Controller-Module-1.8.19.8580-Directory-Traversal.html -http://packetstormsecurity.com/files/166617/Zenario-CMS-9.0.54156-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166626/WordPress-Ad-Inserter-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166627/ICEHRM-31.0.0.0S-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/166629/minewebcms-1.15.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html -http://packetstormsecurity.com/files/166648/PHPGurukul-Zoo-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166650/Social-Codia-SMS-1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/166653/Musical-World-1-Shell-Upload.html -http://packetstormsecurity.com/files/166654/E-Commerce-Website-1.1.0-Shell-Upload.html -http://packetstormsecurity.com/files/166655/Social-Codia-SMS-1-Shell-Upload.html -http://packetstormsecurity.com/files/166656/Simple-House-Rental-System-1-Shell-Upload.html -http://packetstormsecurity.com/files/166657/Car-Rental-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html -http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html -http://packetstormsecurity.com/files/166670/SAM-SUNNY-TRIPOWER-5.0-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/166671/Franklin-Fueling-Systems-Colibri-Controller-Module-1.8.19.8580-Local-File-Inclusion.html -http://packetstormsecurity.com/files/166674/Telesquare-TLR-2855KS6-Arbitrary-File-Creation.html -http://packetstormsecurity.com/files/166675/Telesquare-TLR-2855KS6-Arbitrary-File-Deletion.html -http://packetstormsecurity.com/files/166694/Explore-CMS-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html -http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html -http://packetstormsecurity.com/files/166723/REDCap-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html -http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html -http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html -http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html -http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html -http://packetstormsecurity.com/files/166752/Zyxel-NWA-1100-NH-Command-Injection.html -http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html -http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html -http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html -http://packetstormsecurity.com/files/166829/Gitlab-14.9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html -http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html -http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html -http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html -http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html -http://packetstormsecurity.com/files/166965/SAP-NetWeaver-Java-Denial-Of-Service.html -http://packetstormsecurity.com/files/166966/PHProjekt-PhpSimplyGest-MyProjects-1.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html -http://packetstormsecurity.com/files/166989/Craft-CMS-3.7.36-Password-Reset-Poisoning-Attack.html -http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html -http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html -http://packetstormsecurity.com/files/167016/Bookeen-Notea-BK_R_1.0.5_20210608-Directory-Traversal.html -http://packetstormsecurity.com/files/167017/Microfinance-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/167018/Akka-HTTP-10.1.14-Denial-Of-Service.html -http://packetstormsecurity.com/files/167026/WebTareas-2.4-SQL-Injection.html -http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167035/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/167036/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/167040/Cyclos-4.14.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167041/DLINK-DIR850-Open-Redirection.html -http://packetstormsecurity.com/files/167042/DLINK-DIR850-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/167046/SAP-BusinessObjects-Intelligence-4.3-XML-Injection.html -http://packetstormsecurity.com/files/167051/ManageEngine-ADSelfService-Plus-Build-6118-NTLMv2-Hash-Exposure.html -http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html -http://packetstormsecurity.com/files/167063/Navigate-CMS-2.9.4-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167069/PyScript-2022-05-04-Alpha-Source-Code-Disclosure.html -http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html -http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167099/Ruijie-Reyee-Mesh-Router-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167101/TLR-2005KSH-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/167113/Cisco-RV340-SSL-VPN-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html -http://packetstormsecurity.com/files/167131/College-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/167144/AppleVideoDecoder-CreateHeaderBuffer-Out-Of-Bounds-Free.html -http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html -http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html -http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/167183/SolarView-Compact-6.0-Command-Injection.html -http://packetstormsecurity.com/files/167187/Survey-Sparrow-Enterprise-Survey-Software-2022-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167190/WordPress-Tatsu-Builder-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167197/OpenCart-So-Listing-Tabs-2.2.0-Unsafe-Deserialization.html -http://packetstormsecurity.com/files/167198/Showdoc-2.10.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html -http://packetstormsecurity.com/files/167227/PHPIPAM-1.4.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167228/LiquidFiles-3.4.15-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html -http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html -http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html -http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html -http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167341/Avantune-Genialcloud-ProJ-10-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html -http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html -http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html -http://packetstormsecurity.com/files/167376/Microweber-CMS-1.2.15-Account-Takeover.html -http://packetstormsecurity.com/files/167383/SolarView-Compact-6.00-Directory-Traversal.html -http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html -http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html -http://packetstormsecurity.com/files/167396/NVIDIA-Data-Center-GPU-Manager-Remote-Memory-Corruption.html -http://packetstormsecurity.com/files/167397/Apache-2.4.50-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html -http://packetstormsecurity.com/files/167409/Korenix-JetPort-5601V3-Backdoor-Account.html -http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html -http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html -http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html -http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html -http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html -http://packetstormsecurity.com/files/167465/WSO2-Management-Console-XML-Injection.html -http://packetstormsecurity.com/files/167480/Virtua-Software-Cobranca-12S-SQL-Injection.html -http://packetstormsecurity.com/files/167481/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Cryptography-Issue.html -http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Missing-Control.html -http://packetstormsecurity.com/files/167483/ChurchCRM-4.4.5-SQL-Injection.html -http://packetstormsecurity.com/files/167491/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-ECB-Issue.html -http://packetstormsecurity.com/files/167492/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Passcode-Retry.html -http://packetstormsecurity.com/files/167499/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html -http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html -http://packetstormsecurity.com/files/167503/Pandora-FMS-7.0NG.742-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167506/Sourcegraph-Gitserver-3.36.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html -http://packetstormsecurity.com/files/167509/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Behavior-Violation.html -http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html -http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html -http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html -http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html -http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html -http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html -http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html -http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html -http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html -http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html -http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html -http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html -http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167559/SAP-FRUN-2.00-3.00-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167560/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Missing-Authentication.html -http://packetstormsecurity.com/files/167561/SAP-Fiori-Launchpad-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167562/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Information-Disclosure.html -http://packetstormsecurity.com/files/167563/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Directory-Traversal.html -http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html -http://packetstormsecurity.com/files/167630/launchd-Heap-Corruption.html -http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html -http://packetstormsecurity.com/files/167710/Xen-PV-Guest-Non-SELFSNOOP-CPU-Memory-Corruption.html -http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html -http://packetstormsecurity.com/files/167718/Xen-TLB-Flush-Bypass.html -http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/167733/VMware-Security-Advisory-2022-0025.2.html -http://packetstormsecurity.com/files/167741/Sourcegraph-gitserver-sshCommand-Remote-Command-Execution.html -http://packetstormsecurity.com/files/167742/PrestaShop-1.7.6.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html -http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html -http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html -http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html -http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167782/CodoForum-5.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html -http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html -http://packetstormsecurity.com/files/167795/VMware-Security-Advisory-2021-0025.3.html -http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html -http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html -http://packetstormsecurity.com/files/167872/rpc.py-0.6.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html -http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html -http://packetstormsecurity.com/files/167892/Easy-Chat-Server-3.1-Buffer-Overflow.html -http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html -http://packetstormsecurity.com/files/167908/uftpd-2.10-Directory-Traversal.html -http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html -http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html -http://packetstormsecurity.com/files/167972/Chrome-WebGL-Uniform-Integer-Overflows.html -http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html -http://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html -http://packetstormsecurity.com/files/167991/Nortek-Linear-eMerge-E3-Series-Command-Injection.html -http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html -http://packetstormsecurity.com/files/167997/ManageEngine-ADAudit-Plus-Path-Traversal-XML-Injection.html -http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html -http://packetstormsecurity.com/files/168008/PAN-OS-10.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html -http://packetstormsecurity.com/files/168047/AirSpot-5410-0.3.4.1-4-Remote-Command-Injection.html -http://packetstormsecurity.com/files/168049/Webmin-Package-Updates-Command-Injection.html -http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/168096/TypeORM-0.3.7-Information-Disclosure.html -http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html -http://packetstormsecurity.com/files/168108/Advantech-iView-NetworkServlet-Command-Injection.html -http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html -http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html -http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html -http://packetstormsecurity.com/files/168147/Arm-Mali-CSF-VMA-Split-Mishandling.html -http://packetstormsecurity.com/files/168148/PrestaShop-Ap-Pagebuilder-2.4.4-SQL-Injection.html -http://packetstormsecurity.com/files/168149/Centreon-22.04.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html -http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html -http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html -http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168212/Doctors-Appointment-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/168256/Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection.html -http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/168336/SmartRG-Router-2.6.13-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/168384/News247-News-Magazine-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html -http://packetstormsecurity.com/files/168408/Palo-Alto-Networks-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168409/SAP-SAPControl-Web-Service-Interface-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168423/Bookwyrm-0.4.3-Authentication-Bypass.html -http://packetstormsecurity.com/files/168427/ProcessMaker-Privilege-Escalation.html -http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html -http://packetstormsecurity.com/files/168431/Arm-Mali-Released-Buffer-Use-After-Free.html -http://packetstormsecurity.com/files/168432/Arm-Mali-Physical-Address-Exposure.html -http://packetstormsecurity.com/files/168433/Arm-Mali-Race-Condition.html -http://packetstormsecurity.com/files/168434/Arm-Mali-CSF-Missing-Buffer-Size-Check.html -http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html -http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html -http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html -http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html -http://packetstormsecurity.com/files/168585/Centreon-22.04.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html -http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html -http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html -http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html -http://packetstormsecurity.com/files/168718/Garage-Management-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html -http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html -http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html -http://packetstormsecurity.com/files/169457/Chrome-AccountSelectionBubbleView-OnAccountImageFetched-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html -http://packetstormsecurity.com/files/169459/Chrome-offline_items_collection-OfflineContentAggregator-OnItemRemoved-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html -http://packetstormsecurity.com/files/169544/Siemens-APOGEE-PXC-TALON-TC-Authentication-Bypass.html -http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html -http://packetstormsecurity.com/files/169604/Train-Scheduler-App-1.0-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/169605/Simple-Cold-Storage-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html -http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html -http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169701/FLIR-AX8-1.46.16-Remote-Command-Injection.html -http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169731/Windows-Kernel-Registry-Use-After-Free.html -http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html -http://packetstormsecurity.com/files/169805/Windows-Kernel-Long-Registry-Path-Memory-Corruption.html -http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/169811/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/169816/SmartRG-Router-SR510n-2.6.13-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html -http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html -http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html -http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html -http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169929/AppleAVD-deallocateKernelMemoryInternal-Missing-Surface-Lock.html -http://packetstormsecurity.com/files/169930/AppleAVD-AppleAVDUserClient-decodeFrameFig-Memory-Corruption.html -http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html -http://packetstormsecurity.com/files/169959/Microsoft-Outlook-2019-16.0.12624.20424-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/169961/Microsoft-Outlook-2019-16.0.13231.20262-Remote-Code-Execution.html -http://packetstormsecurity.com/files/169964/Roxy-Fileman-1.4.6-Remote-Shell-Upload.html -http://packetstormsecurity.com/files/170010/XNU-Dangling-PTE-Entry.html -http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html -http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html -http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html -http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html -http://packetstormsecurity.com/files/170070/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/170073/IBM-Websphere-Application-Server-7.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html -http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html -http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html -http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html -http://packetstormsecurity.com/files/170177/Zhuhai-Suny-Technology-ESL-Tag-Forgery-Replay-Attacks.html -http://packetstormsecurity.com/files/170180/Intel-Data-Center-Manager-4.1-SQL-Injection.html -http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html -http://packetstormsecurity.com/files/170233/SAP-Host-Agent-Privilege-Escalation.html -http://packetstormsecurity.com/files/170245/Syncovery-For-Linux-Web-GUI-Authenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/170246/Acronis-TrueImage-XPC-Privilege-Escalation.html -http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html -http://packetstormsecurity.com/files/170354/Oracle-Unified-Audit-Policy-Bypass.html -http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html -http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html -http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-80.103.2.5045-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170372/Linear-eMerge-E3-Series-Access-Controller-Command-Injection.html -http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html -http://packetstormsecurity.com/files/170388/Control-Web-Panel-7-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170420/Arm-Mali-CSF-KBASE_REG_NO_USER_FREE-Unsafe-Use-Use-After-Free.html -http://packetstormsecurity.com/files/170518/libCoreEntitlements-CEContextQuery-Arbitrary-Entitlement-Returns.html -http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html -http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html -http://packetstormsecurity.com/files/170605/wolfSSL-5.3.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html -http://packetstormsecurity.com/files/170613/OpenText-Extended-ECM-22.3-cs.exe-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html -http://packetstormsecurity.com/files/170620/Solaris-10-dtprintinfo-libXm-libXpm-Security-Issues.html -http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html -http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html -http://packetstormsecurity.com/files/170820/Control-Web-Panel-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html -http://packetstormsecurity.com/files/170855/Android-Binder-VMA-Management-Security-Issues.html -http://packetstormsecurity.com/files/170857/Apache-Tomcat-On-Ubuntu-Log-Init-Privilege-Escalation.html -http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html -http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html -http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html -http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html -http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html -http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html -http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171136/ABUS-Security-Camera-TVIP-20000-21150-LFI-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html -http://packetstormsecurity.com/files/171158/VMware-Security-Advisory-2023-0006.html -http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/171239/Android-GKI-Kernels-Contain-Broken-Non-Upstream-Speculative-Page-Faults-MM-Code.html -http://packetstormsecurity.com/files/171252/Agilebio-Lab-Collector-4.234-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html -http://packetstormsecurity.com/files/171320/SugarCRM-12.x-Remote-Code-Execution-Shell-Upload.html -http://packetstormsecurity.com/files/171344/Oracle-DB-Broken-PDB-Isolation-Metadata-Exposure.html -http://packetstormsecurity.com/files/171378/Shannon-Baseband-NrmmMsgCodec-Emergency-Number-List-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/171380/Shannon-Baseband-NrmmMsgCodec-Extended-Emergency-Number-List-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/171383/Shannon-Baseband-NrmmMsgCodec-Access-Category-Definitions-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/171387/Shannon-Baseband-NrmmMsgCodec-Intra-Object-Overflow.html -http://packetstormsecurity.com/files/171389/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html -http://packetstormsecurity.com/files/171400/Shannon-Baseband-NrSmPcoCodec-Intra-Object-Overflow.html -http://packetstormsecurity.com/files/171402/MyBB-Active-Threads-1.3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171403/MyBB-External-Redirect-Warning-1.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171421/MyBB-Export-User-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171429/Monitorr-1.7.6m-1.7.7d-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171433/Linksys-AX3200-1.1.00-Command-Injection.html -http://packetstormsecurity.com/files/171439/MAN-EAM-0003-3.2.4-XML-Injection.html -http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html -http://packetstormsecurity.com/files/171478/Raspberry-Pi-Camera-Server-1.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/171479/WordPress-Translatepress-Multilingual-SQL-Injection.html -http://packetstormsecurity.com/files/171483/NVFLARE-Unsafe-Deserialization.html -http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html -http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html -http://packetstormsecurity.com/files/171486/SimpleMachinesForum-2.1.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171489/Composr-CMS-10.0.39-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html -http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html -http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html -http://packetstormsecurity.com/files/171542/BoxBilling-4.22.1.5-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171546/X-Skipper-Proxy-0.13.237-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/171549/OPSWAT-Metadefender-Core-4.21.1-Privilege-Escalation.html -http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171564/Optergy-Proton-And-Enterprise-BMS-2.0.3a-Command-Injection.html -http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html -http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html -http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html -http://packetstormsecurity.com/files/171613/rconfig-3.9.7-SQL-Injection.html -http://packetstormsecurity.com/files/171615/EQ-Enterprise-Management-System-2.2.0-SQL-Injection.html -http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171627/Reprise-Software-RLM-14.2BL4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171629/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html -http://packetstormsecurity.com/files/171633/Yahoo-User-Interface-TreeView-2.8.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html -http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html -http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html -http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html -http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html -http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171654/GLPI-Glpiinventory-1.0.1-Local-File-Inclusion.html -http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171661/WordPress-Paid-Memberships-Pro-2.9.8-SQL-Injection.html -http://packetstormsecurity.com/files/171689/Kardex-Mlog-MCC-5.7.12-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171697/Calendar-Event-Multi-View-1.4.07-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171699/Uptime-Kuma-1.19.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171701/Liferay-Portal-6.2.5-Insecure-Permissions.html -http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html -http://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html -http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html -http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171727/ImageMagick-7.1.0-48-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html -http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171730/ERPNext-12.29-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171731/itech-TrainSmart-r1044-SQL-Injection.html -http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html -http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html -http://packetstormsecurity.com/files/171734/Provide-Server-14.4-XSS-Cross-Site-Request-Forgery-Code-Execution.html -http://packetstormsecurity.com/files/171737/Titan-FTP-Path-Traversal.html -http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/171740/Intern-Record-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/171743/POLR-URL-2.3.0-Shortener-Admin-Takeover.html -http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html -http://packetstormsecurity.com/files/171746/pdfkit-0.8.7.2-Command-Injection.html -http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html -http://packetstormsecurity.com/files/171766/FortiRecorder-6.4.3-Denial-Of-Service.html -http://packetstormsecurity.com/files/171770/IBM-Instana-243-0-Missing-Authentication.html -http://packetstormsecurity.com/files/171771/MAC-1200R-Directory-Traversal.html -http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html -http://packetstormsecurity.com/files/171773/Tenda-N300-F3-12.01.01.48-Header-Processing.html -http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html -http://packetstormsecurity.com/files/171775/Altenergy-Power-Control-Software-C1.2.5-Command-Injection.html -http://packetstormsecurity.com/files/171777/ENTAB-ERP-1.0-Information-Disclosure.html -http://packetstormsecurity.com/files/171781/Symantec-Messaging-Gateway-10.7.4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171782/Palo-Alto-Cortex-XSOAR-6.5.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171783/Paradox-Security-Systems-IPR512-Denial-Of-Service.html -http://packetstormsecurity.com/files/171787/ZCBS-ZBBS-ZPBS-4.14k-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html -http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171795/Chrome-base-debug-ActivityUserData-ActivityUserData-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/171796/Chrome-base-SampleVectorBase-MoveSingleSampleToCounts-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/171804/NotrinosERP-0.7-SQL-Injection.html -http://packetstormsecurity.com/files/171824/WordPress-Limit-Login-Attempts-1.7.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html -http://packetstormsecurity.com/files/171853/Rocket-Software-Unidata-8.2.4-Build-3003-Buffer-Overflow.html -http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html -http://packetstormsecurity.com/files/171879/File-Replication-Pro-7.5.0-Insecure-Permissions-Privilege-Escalation.html -http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html -http://packetstormsecurity.com/files/171899/Bang-Resto-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/171900/Bang-Resto-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html -http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html -http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html -http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html -http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html -http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html -http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html -http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html -http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html -http://packetstormsecurity.com/files/171978/Telit-Cinterion-IoT-Traversal-Escalation-Bypass-Heap-Overflow.html -http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html -http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html -http://packetstormsecurity.com/files/172047/ChurchCRM-4.5.3-SQL-Injection.html -http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html -http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172105/Advanced-Host-Monitor-12.56-Unquoted-Service-Path.html -http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html -http://packetstormsecurity.com/files/172137/Shannon-Baseband-accept-type-SDP-Attribute-Memory-Corruption.html -http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html -http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html -http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html -http://packetstormsecurity.com/files/172152/Jedox-2022.4.2-Directory-Traversal-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172156/Jedox-2020.2.5-Database-Credential-Disclosure.html -http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html -http://packetstormsecurity.com/files/172183/Oracle-RMAN-Missing-Auditing.html -http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/172258/ManageEngine-ADAudit-Plus-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172277/Zyxel-Chained-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172282/Shannon-Baseband-SIP-URI-Decoder-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/172287/Shannon-Baseband-Via-Header-Decoder-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/172288/Shannon-Baseband-SIP-Status-Line-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/172289/Shannon-Baseband-SIP-Session-Expires-Header-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/172292/Shannon-Baseband-Negative-Size-Memcpy-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/172293/Shannon-Baseband-SIP-Min-SE-Header-Stack-Buffer-Overflow.html -http://packetstormsecurity.com/files/172295/Shannon-Baseband-SIP-Retry-After-Header-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html -http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html -http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html -http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html -http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html -http://packetstormsecurity.com/files/172457/WordPress-Elementor-Lite-5.7.1-Arbitrary-Password-Reset.html -http://packetstormsecurity.com/files/172458/IBM-AIX-7.2-inscout-Privilege-Escalation.html -http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html -http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html -http://packetstormsecurity.com/files/172511/PnPSCADA-2.x-SQL-Injection.html -http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/172540/eScan-Management-Console-14.0.1400.2281-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172542/Webkul-Qloapps-1.5.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html -http://packetstormsecurity.com/files/172547/Roxy-WI-6.1.0.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html -http://packetstormsecurity.com/files/172588/SCM-Manager-1.60-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html -http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html -http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html -http://packetstormsecurity.com/files/172644/Papaya-Medical-Viewer-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html -http://packetstormsecurity.com/files/172649/Wekan-6.74-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html -http://packetstormsecurity.com/files/172664/Qualcomm-Adreno-KGSL-Data-Leakage.html -http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/172674/Bumsys-Business-Management-System-1.0.3-beta-Shell-Upload.html -http://packetstormsecurity.com/files/172676/Flexense-HTTP-Server-10.6.24-Buffer-Overflow-Denial-Of-Service.html -http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html -http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html -http://packetstormsecurity.com/files/172730/WordPress-Tree-Page-View-1.6.7-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html -http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html -http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html -http://packetstormsecurity.com/files/172799/Delta-Electronics-InfraSuite-Device-Master-Deserialization.html -http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172822/Thruk-Monitoring-Web-Interface-3.06-Path-Traversal.html -http://packetstormsecurity.com/files/172826/Microsoft-ChakaCore-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172827/Apple-XNU-Kernel-Memory-Exposure.html -http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172829/librelp-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html -http://packetstormsecurity.com/files/172832/iOS-11.4.1-macOS-10.13.6-icmp_error-Heap-Buffer-Overflow.html -http://packetstormsecurity.com/files/172833/strongSwan-VPN-Charon-Server-Buffer-Overflow.html -http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html -http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html -http://packetstormsecurity.com/files/172838/VIVO-SPARQL-Injection.html -http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html -http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html -http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172843/Chrome-WebAudio-Use-After-Free.html -http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html -http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html -http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html -http://packetstormsecurity.com/files/172848/Ubuntu-accountsservice-Double-Free-Memory-Corruption.html -http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html -http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html -http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html -http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html -http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html -http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html -http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html -http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html -http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/172908/Sales-Tracker-Management-System-1.0-HTML-Injection.html -http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html -http://packetstormsecurity.com/files/173029/Tenda-AC6-AC1200-15.03.06.50_multi-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173030/Student-Study-Center-Management-System-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html -http://packetstormsecurity.com/files/173038/Symantec-SiteMinder-WebAgent-12.52-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173048/WordPress-WP-Sticky-Social-1.0.1-CSRF-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173053/WordPress-Super-Socializer-7.13.52-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html -http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html -http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html -http://packetstormsecurity.com/files/173117/NCH-Express-Invoice-7.25-Cleartext-Password.html -http://packetstormsecurity.com/files/173126/Microsoft-SharePoint-Enterprise-Server-2016-Spoofing.html -http://packetstormsecurity.com/files/173127/Microsoft-Office-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html -http://packetstormsecurity.com/files/173134/Azure-Apache-Ambari-2302250400-Spoofing.html -http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html -http://packetstormsecurity.com/files/173136/PrestaShop-Winbiz-Payment-Improper-Limitation.html -http://packetstormsecurity.com/files/173140/Microsoft-365-MSO-2305-Build-16.0.16501.20074-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173196/Chrome-v8-internal-Object-SetPropertyWithAccessor-Type-Confusion.html -http://packetstormsecurity.com/files/173197/Chrome-V8-Type-Confusion.html -http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html -http://packetstormsecurity.com/files/173278/POS-Codekop-2.0-Shell-Upload.html -http://packetstormsecurity.com/files/173279/FuguHub-8.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173280/Sales-Of-Cashier-Goods-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173293/WordPress-WP-AutoComplete-Search-1.0.4-SQL-Injection.html -http://packetstormsecurity.com/files/173294/TP-Link-TL-WR940N-4-Buffer-Overflow.html -http://packetstormsecurity.com/files/173296/Qualcomm-Adreno-KGSL-Insecure-Execution.html -http://packetstormsecurity.com/files/173310/Windows-Kernel-KTM-Registry-Transactions-Non-Atomic-Outcomes.html -http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html -http://packetstormsecurity.com/files/173354/ServiceNow-Insecure-Access-Control-Full-Admin-Compromise.html -http://packetstormsecurity.com/files/173361/Microsoft-365-MSO-2306-Build-16.0.16529.20100-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173366/BuildaGate5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html -http://packetstormsecurity.com/files/173388/SmarterTools-SmarterMail-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html -http://packetstormsecurity.com/files/173434/WordPress-User-Registration-3.0.2-Arbitrary-File-Upload.html -http://packetstormsecurity.com/files/173487/pfSense-Restore-RRD-Data-Command-Injection.html -http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173520/WinterCMS-1.2.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173609/RWS-WorldServer-11.7.3-Session-Token-Enumeration.html -http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html -http://packetstormsecurity.com/files/173653/Hikvision-Hybrid-SAN-Ds-a71024-SQL-Injection.html -http://packetstormsecurity.com/files/173656/Online-Piggery-Management-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html -http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html -http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html -http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173725/WordPress-Seo-By-10Web-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173726/WordPress-Login-Rebuilder-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173729/WordPress-PrePost-SEO-3.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html -http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html -http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html -http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html -http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html -http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html -http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html -http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173878/Uvdesk-1.1.3-Shell-Upload.html -http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html -http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173950/Campcodes-Online-Matrimonial-Website-System-3.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173954/Shelly-PRO-4PM-0.11.0-Authentication-Bypass.html -http://packetstormsecurity.com/files/173983/WordPress-Ninja-Forms-3.6.25-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html -http://packetstormsecurity.com/files/173998/Intelliants-Subrion-CMS-4.2.1-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174015/Adlisting-Classified-Ads-2.14.0-Information-Disclosure.html -http://packetstormsecurity.com/files/174016/mooSocial-3.1.8-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174017/Social-Commerce-3.1.6-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html -http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174115/Microsoft-Windows-Kernel-Arbitrary-Read.html -http://packetstormsecurity.com/files/174116/Microsoft-Windows-Kernel-Unsafe-Reference.html -http://packetstormsecurity.com/files/174117/Microsoft-Windows-Kernel-Unsafe-Reference.html -http://packetstormsecurity.com/files/174118/Microsoft-Windows-Kernel-Security-Descriptor-Use-After-Free.html -http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html -http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html -http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html -http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html -http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html -http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html -http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html -http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html -http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html -http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html -http://packetstormsecurity.com/files/174223/Chrome-IPCZ-FragmentDescriptors-Missing-Validation.html -http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html -http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQL-Injection.html -http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html -http://packetstormsecurity.com/files/174271/TSPlus-16.0.0.0-Insecure-Credential-Storage.html -http://packetstormsecurity.com/files/174272/TSPlus-16.0.0.0-Insecure-Permissions.html -http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html -http://packetstormsecurity.com/files/174300/SugarCRM-12.2.0-Shell-Upload.html -http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html -http://packetstormsecurity.com/files/174302/SugarCRM-12.2.0-PHP-Object-Injection.html -http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html -http://packetstormsecurity.com/files/174304/CrafterCMS-4.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html -http://packetstormsecurity.com/files/174343/SPA-Cart-eCommerce-CMS-1.9.0.3-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174344/SPA-Cart-eCommerce-CMS-1.9.0.3-SQL-Injection.html -http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174444/Clcknshop-1.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html -http://packetstormsecurity.com/files/174446/PlayTube-3.0.1-Information-Disclosure.html -http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html -http://packetstormsecurity.com/files/174448/Oracle-RMAN-Missing-Auditing.html -http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html -http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html -http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html -http://packetstormsecurity.com/files/174491/FileMage-Gateway-1.10.9-Local-File-Inclusion.html -http://packetstormsecurity.com/files/174503/Internet-Radio-auna-IR-160-SE-UIProto-DoS-XSS-Missing-Authentication.html -http://packetstormsecurity.com/files/174506/Hikvision-Access-Control-Session-Hijacking.html -http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html -http://packetstormsecurity.com/files/174537/SolarView-Compact-6.00-Remote-Command-Execution.html -http://packetstormsecurity.com/files/174551/Axigen-10.5.0-4370c946-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html -http://packetstormsecurity.com/files/174567/Microsoft-Windows-Kernel-Integer-Overflow-Out-Of-Bounds-Read.html -http://packetstormsecurity.com/files/174568/Microsoft-Windows-Kernel-Recovery-Memory-Corruption.html -http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Pollution-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html -http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html -http://packetstormsecurity.com/files/174604/WordPress-Slimstat-Analytics-5.0.9-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html -http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html -http://packetstormsecurity.com/files/174680/Academy-LMS-6.2-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174681/Academy-LMS-6.2-SQL-Injection.html -http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html -http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html -http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html -http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html -http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174799/TOTOLINK-Wireless-Routers-Remote-Command-Execution.html -http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html -http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html -http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174895/WordPress-KiviCare-3.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html -http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html -http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/174985/SAP-Application-Server-ABAP-Open-Redirection.html -http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html -http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html -http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html -http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html -http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html -http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html -http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html -http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html -http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html -http://packetstormsecurity.com/files/175105/ChurchCRM-4.5.4-SQL-Injection.html -http://packetstormsecurity.com/files/175106/WordPress-WP-ERP-1.12.2-SQL-Injection.html -http://packetstormsecurity.com/files/175108/Microsoft-Windows-Kernel-Paged-Pool-Memory-Disclosure.html -http://packetstormsecurity.com/files/175109/Microsoft-Windows-Kernel-Out-Of-Bounds-Reads-Memory-Disclosure.html -http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html -http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/175260/PowerVR-Out-Of-Bounds-Access-Information-Leak.html -http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html -http://packetstormsecurity.com/files/175323/Citrix-Bleed-Session-Token-Leakage-Proof-Of-Concept.html -http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html -http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html -http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html -http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html -http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html -http://packetstormsecurity.com/files/175654/WordPress-Contact-Form-To-Any-API-1.1.2-SQL-Injection.html -http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html -http://packetstormsecurity.com/files/175659/Windows-Kernel-Containerized-Registry-Escape.html -http://packetstormsecurity.com/files/175660 -http://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html -http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html -http://packetstormsecurity.com/files/175671/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html -http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Execution.html -http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html -http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html -http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html -http://packetstormsecurity.com/files/175800 -http://packetstormsecurity.com/files/175802 -http://packetstormsecurity.com/files/175803 -http://packetstormsecurity.com/files/175804 -http://packetstormsecurity.com/files/175805 -http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html -http://packetstormsecurity.com/files/175925/osCommerce-4-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html -http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html -http://packetstormsecurity.com/files/175956/Fortra-Digital-Guardian-Agent-Uninstaller-Cross-Site-Scripting-UninstallKey-Cached.html -http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html -http://packetstormsecurity.com/files/176007/Online-Student-Clearance-System-1.0-Shell-Upload.html -http://packetstormsecurity.com/files/176029/ARM-Mali-r44p0-Use-After-Free.html -http://packetstormsecurity.com/files/176030 -http://packetstormsecurity.com/files/176031 -http://packetstormsecurity.com/files/176033 -http://packetstormsecurity.com/files/176034 -http://packetstormsecurity.com/files/176036 -http://packetstormsecurity.com/files/176037 -http://packetstormsecurity.com/files/176038 -http://packetstormsecurity.com/files/176039 -http://packetstormsecurity.com/files/176042 -http://packetstormsecurity.com/files/176043 -http://packetstormsecurity.com/files/176045 -http://packetstormsecurity.com/files/176046 -http://packetstormsecurity.com/files/176048 -http://packetstormsecurity.com/files/176054 -http://packetstormsecurity.com/files/176055 -http://packetstormsecurity.com/files/176056 -http://packetstormsecurity.com/files/176058 -http://packetstormsecurity.com/files/176060/TinyDir-1.2.5-Buffer-Overflow.html -http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html -http://packetstormsecurity.com/files/176109/Arm-Mali-CSF-Overflow-Use-After-Free.html -http://packetstormsecurity.com/files/176110/Windows-Kernel-Information-Disclosure.html -http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html -http://packetstormsecurity.com/files/176126/ISPConfig-3.2.11-PHP-Code-Injection.html -http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html -http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176206/PDF24-Creator-11.15.1-Local-Privilege-Escalation.html -http://packetstormsecurity.com/files/176209/Windows-Kernel-Race-Conditions.html -http://packetstormsecurity.com/files/176210/Chrome-V8-JIT-XOR-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html -http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html -http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html -http://packetstormsecurity.com/files/176255/PKP-WAL-3.4.0-3-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html -http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html -http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html -http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html -http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html -http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176323/Apache-OFBiz-18.12.09-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html -http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html -http://packetstormsecurity.com/files/176391/Themebleed-Windows-11-Themes-Arbitrary-Code-Execution.html -http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html -http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html -http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html -http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html -http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html -http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html -http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html -http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html -http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html -http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html -http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html -http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -http://packetstormsecurity.com/files/176625/Contiki-NG-tinyDTLS-Denial-Of-Service.html -http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html -http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html -http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176669/MajorDoMo-Command-Injection.html -http://packetstormsecurity.com/files/176677/PRTG-Authenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html -http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html -http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html -http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html -http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html -http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html -http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html -http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html -http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html -http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html -http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html -http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html -http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html -http://packetstormsecurity.com/files/176957/WebCatalog-48.4-Arbitrary-Protocol-Execution-Code-Execution.html -http://packetstormsecurity.com/files/176958/Grocy-4.0.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.com/files/176967/Proxmox-VE-7.4-1-TOTP-Brute-Force.html -http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html -http://packetstormsecurity.com/files/176975/MISP-2.4.171-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/176978/WhatsUp-Gold-2022-22.1.0-Build-39-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html -http://packetstormsecurity.com/files/176991/SISQUAL-WFM-7.1.319.103-Host-Header-Injection.html -http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html -http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html -http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html -http://packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html -http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html -http://packetstormsecurity.com/files/177081 -http://packetstormsecurity.com/files/177082 -http://packetstormsecurity.com/files/177083 -http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html -http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html -http://packetstormsecurity.com/files/177135/DS-Wireless-Communication-Code-Execution.html -http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html -http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html -http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html -http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html -http://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html -http://packetstormsecurity.com/files/download/136089/mcafeevses-bypass.html -http://packetstormsecurity.org/0607-exploits/mspp-poc3.txt -http://packetstormsecurity.org/0903-exploits/phortail-xss.txt -http://packetstormsecurity.org/0907-exploits/alp-overflow.txt -http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt -http://packetstormsecurity.org/0907-exploits/otsav-overflow.txt -http://packetstormsecurity.org/0908-exploits/broid-overflow.txt -http://packetstormsecurity.org/0911-exploits/sybsec-adv17.txt -http://packetstormsecurity.org/1001-exploits/modproxy-overflow.txt -http://packetstormsecurity.org/1002-exploits/rcadcm425-dos.txt -http://packetstormsecurity.org/files/100179/eGroupware-1.8.001-SQL-Injection.html -http://packetstormsecurity.org/files/100180/eGroupware-1.8.001-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/101675/eGroupware-1.8.001.20110421-Open-Redirect.html -http://packetstormsecurity.org/files/101676/eGroupware-1.8.001.20110421-Local-File-Inclusion.html -http://packetstormsecurity.org/files/104149 -http://packetstormsecurity.org/files/106859/dlguardshoppingcart-xss.txt -http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt -http://packetstormsecurity.org/files/107312/xchat-dos.txt -http://packetstormsecurity.org/files/107970/videoportalneu-sql.txt -http://packetstormsecurity.org/files/107971/flirtportal-sql.txt -http://packetstormsecurity.org/files/107972/social2-sql.txt -http://packetstormsecurity.org/files/108145/graphicclone-xss.txt -http://packetstormsecurity.org/files/108239/rapidleech-xss.txt -http://packetstormsecurity.org/files/108282/wplivephp-xss.txt -http://packetstormsecurity.org/files/108340/statit4-xss.txt -http://packetstormsecurity.org/files/108342/EasyWebRealEstate-Blind-SQL-Injection.html -http://packetstormsecurity.org/files/108353/ubbforum-xss.txt -http://packetstormsecurity.org/files/108355/ZSL-2012-5066.txt -http://packetstormsecurity.org/files/108389/ggbguestbook-xss.txt -http://packetstormsecurity.org/files/108426/CommonSense-CMS-Blind-SQL-Injection.html -http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt -http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt -http://packetstormsecurity.org/files/108756/vastalfreelance-sql.txt -http://packetstormsecurity.org/files/108869/acidcat-xss.txt -http://packetstormsecurity.org/files/108887/leadcapturepagesystem-xss.txt -http://packetstormsecurity.org/files/109168/VL-144.txt -http://packetstormsecurity.org/files/109246/twiki-xss.txt -http://packetstormsecurity.org/files/109290/4images-xss.txt -http://packetstormsecurity.org/files/109389/VL-407.txt -http://packetstormsecurity.org/files/109447/XWiki-Enterprise-3.4-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/109485/Tube-Ace-SQL-Injection.html -http://packetstormsecurity.org/files/109507/Flyspray-0.9.9.6-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/109528 -http://packetstormsecurity.org/files/109617/#comment-10344 -http://packetstormsecurity.org/files/109617/Yoono-Firefox-7.7.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/109618/#comment-10343 -http://packetstormsecurity.org/files/109618/Yoono-Desktop-1.8.16-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html -http://packetstormsecurity.org/files/109665/STHS-v2-Web-Portal-2.2-SQL-Injection.html -http://packetstormsecurity.org/files/109669/Nova-CMS-Remote-File-Inclusion.html -http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/109706/PBBoard-2.1.4-Cross-Site-Request-Forgery-Shell-Upload.html -http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html -http://packetstormsecurity.org/files/109710/Zimbra-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/109849/Impulsio-CMS-SQL-Injection.html -http://packetstormsecurity.org/files/109874/Horde-3.3.12-Backdoor-Arbitrary-PHP-Code-Execution.html -http://packetstormsecurity.org/files/109942/Endian-UTM-Firewall-2.4.x-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/109987/Xavi-7968-ADSL-Router-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/110046/Oxwall-1.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110100/limesurvey-sql.txt -http://packetstormsecurity.org/files/110166/The-Uploader-2.0.4-Eng-Ita-Remote-File-Upload.html -http://packetstormsecurity.org/files/110203/Movable-Type-Publishing-Platform-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110212/idev-BusinessDirectory-3.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110214/ContaoCMS-2.11.0-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/110216 -http://packetstormsecurity.org/files/110219/Webglimpse-Brute-Force-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110224/WonderDesk-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110225/MyJobList-0.1.3-SQL-Injection.html -http://packetstormsecurity.org/files/110294/WebfolioCMS-1.1.4-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/110320/yealink-xss.txt -http://packetstormsecurity.org/files/110376/starcms-xss.txt -http://packetstormsecurity.org/files/110404/drupal712-xsrf.txt -http://packetstormsecurity.org/files/110437/Interlogy-Profile-Manager-Basic-Insecure-Cookie-Handling.html -http://packetstormsecurity.org/files/110524/Webfolio-CMS-1.1.4-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/110593/RazorCMS-1.2.1-STABLE-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/110770/Sitecom-WLM-2501-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/110772/Maxs-Guestbook-1.0-Local-File-Inclusion-Path-Disclosure.html -http://packetstormsecurity.org/files/110949/Xtreme-RAT-DLL-Hijack.html -http://packetstormsecurity.org/files/110974/LiteSpeed-4.1.11-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html -http://packetstormsecurity.org/files/111031 -http://packetstormsecurity.org/files/111034 -http://packetstormsecurity.org/files/111075/Vtiger-5.1.0-Local-File-Inclusion.html -http://packetstormsecurity.org/files/111116/Wolfcms-0.75-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111162/RealPlayer-1.1.4-Memory-Corruption.html -http://packetstormsecurity.org/files/111238/MyBB-1.6.6-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/111249/WordPress-Integrator-1.32-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html -http://packetstormsecurity.org/files/111252/GreenBrowser-6.1.x-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111274/PicoPublisher-2.0-SQL-Injection.html -http://packetstormsecurity.org/files/111276/F5-FirePass-SSL-VPN-6.x-7.x-SQL-Injection.html -http://packetstormsecurity.org/files/111291/TomatoCart-1.2.0-Alpha-2-Local-File-Inclusion.html -http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html -http://packetstormsecurity.org/files/111296/KnFTPd-1.0.0-Denial-Of-Service.html -http://packetstormsecurity.org/files/111312/Quest-InTrust-10.4.x-Annotation-Objects-Code-Execution.html -http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html -http://packetstormsecurity.org/files/111356/SMF-2.0.2-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html -http://packetstormsecurity.org/files/111360/PTK-1.0.5-Cross-Site-Scripting-Unrestricted-Access.html -http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html -http://packetstormsecurity.org/files/111402/Dalbum-144-Build-174-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/111403/Intuit-Help-System-Protocol-File-Retrieval.html -http://packetstormsecurity.org/files/111405/SyndeoCMS-3.0.01-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html -http://packetstormsecurity.org/files/111474/VL-437.txt -http://packetstormsecurity.org/files/111563/AlstraSoft-Site-Uptime-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/111564/Vacation-Rental-Listing-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/111626/egroupware-xss.txt -http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/111853/Quest-InTrust-Annotation-Objects-Uninitialized-Pointer.html -http://packetstormsecurity.org/files/111905/ -http://packetstormsecurity.org/files/111956/ownCloud-3.0.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/111958/XOOPS-2.5.4-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html -http://packetstormsecurity.org/files/112089/Havalite-CMS-1.0.4-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112092/Joomla-CCNewsLetter-1.0.7-SQL-Injection.html -http://packetstormsecurity.org/files/112106/ChurchCMS-0.0.1-SQL-Injection.html -http://packetstormsecurity.org/files/112218/KMPlayer-3.2.0.19-DLL-Hijack.html -http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html -http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html -http://packetstormsecurity.org/files/112233/jNews-7.5.1-Information-Disclosure.html -http://packetstormsecurity.org/files/112235/Joomla-nBill-Lite-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112241/e107-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112242/Quick.Cart-5.0-Information-Disclosure.html -http://packetstormsecurity.org/files/112243/Quick.CMS-4.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112248/Yaqas-CMS-Alpha1-Information-Disclosure.html -http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112257/ASP-DEv-XM-Diary-SQL-Injection.html -http://packetstormsecurity.org/files/112259/ASP-DEv-XM-Forums-SQL-Injection.html -http://packetstormsecurity.org/files/112287/Uiga-FanClub-SQL-Injection.html -http://packetstormsecurity.org/files/112288/Uiga-Personal-Portal-SQL-Injection.html -http://packetstormsecurity.org/files/112295/Nokia-CP-Suite-Video-Manager-7.1.180.64-Denial-Of-Service.html -http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html -http://packetstormsecurity.org/files/112375/PHP-Pastebin-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112385/vBulletin-4.1.12-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/112480/MYRE-Real-Estate-Mobile-2012-2-Cross-Site-Scripting-SQL-Injection.html -http://packetstormsecurity.org/files/112488/Trombinoscope-3.5-SQL-Injection.html -http://packetstormsecurity.org/files/112495/Ramui-Forum-Script-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html -http://packetstormsecurity.org/files/112536/PHP-Enter-Code-Injection.html -http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html -http://packetstormsecurity.org/files/112615/WordPress-2-Click-Socialmedia-Buttons-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112617/WordPress-Better-WP-Security-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112619/WordPress-Bad-Behavior-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112643/GetSimple-CMS-3.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112655/NetBill-Billing-System-1.2-CSRF-XSS.html -http://packetstormsecurity.org/files/112658/WordPress-WP-FaceThumb-Gallery-0.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112689/WordPress-Soundcloud-Is-Gold-2.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112692/WordPress-SABRE-1.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112694/WordPress-Newsletter-Manager-1.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112697/WordPress-Media-Categories-1.1.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112699/WordPress-Leaflet-0.0.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112785/Unijimpe-Captcha-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112801/SiliSoftware-backupDB-1.2.7a-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112804/Artiphp-CMS-5.5.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112859/Cryptographp-Local-File-Inclusion-HTTP-Response-Splitting.html -http://packetstormsecurity.org/files/112862/libwpd-WPXContentListener-_closeTableRow-Memory-Overwrite.html -http://packetstormsecurity.org/files/112945/Yandex.Server-2010-9.0-Enterprise-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/112947/Plogger-Photo-Gallery-SQL-Injection.html -http://packetstormsecurity.org/files/112991/Mod_Auth_OpenID-Session-Stealing.html -http://packetstormsecurity.org/files/113014/Apache-Commons-Compress-Apache-Ant-Denial-Of-Service.html -http://packetstormsecurity.org/files/113287/WordPress-Nmedia-WP-Member-Conversation-1.35.0-Shell-Upload.html -http://packetstormsecurity.org/files/113323/WordPress-FCChat-Widget-2.x-Shell-Upload.html -http://packetstormsecurity.org/files/113644/ESRI-ArcMap-Arbitrary-Code-Execution.html -http://packetstormsecurity.org/files/114541/WebsitePanel-CMS-Open-Redirect.html -http://packetstormsecurity.org/files/115253/Elefant-CMS-1.2.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/115276/Openconstructor-CMS-3.12.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/115284/Openconstructor-CMS-3.12.0-Reflected-XSS.html -http://packetstormsecurity.org/files/115285/Openconstructor-CMS-3.12.0-i_hybrid.php-XSS.html -http://packetstormsecurity.org/files/115286/Openconstructor-CMS-3.12.0-SQL-Injection.html -http://packetstormsecurity.org/files/115354/EmailArchitect-Enterprise-Email-Server-10.0-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/115772/Banana-Dance-CMS-B.2.1-XSS-SQL-Injection.html -http://packetstormsecurity.org/files/116057/Phorum-5.2.18-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/116268/mcrypt-2.6.8-Buffer-Overflow-Proof-Of-Concept.html -http://packetstormsecurity.org/files/116275/TestLink-1.9.3-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt -http://packetstormsecurity.org/files/116433 -http://packetstormsecurity.org/files/116434/Subrion-CMS-2.2.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/116435/Adobe-Flash-Player-Matrix3D-Integer-Overflow-Code-Execution.html -http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html -http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html -http://packetstormsecurity.org/files/117749/TP-LINK-TL-WR841N-Local-File-Inclusion.html -http://packetstormsecurity.org/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html -http://packetstormsecurity.org/files/117925/OrangeHRM-2.7.1-rc.1-Cross-Site-Request-Forgery-SQL-Injection.html -http://packetstormsecurity.org/files/117951/CMS-Made-Simple-1.11.2-Cross-Site-Request-Forgery.html -http://packetstormsecurity.org/files/117975/AWCM-2.2-Access-Bypass.html -http://packetstormsecurity.org/files/118053/WordPress-UK-Cookie-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/118154/Kies-Air-Denial-Of-Service-Authorization-Bypass.html -http://packetstormsecurity.org/files/118231/Apple-QuickTime-7.7.2-Buffer-Overflow.html -http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html -http://packetstormsecurity.org/files/118358/EMC-Smarts-Network-Configuration-Manager-Bypass.html -http://packetstormsecurity.org/files/118467/Agilebits-1Password-3.9.9-Cross-Site-Scripting.html -http://packetstormsecurity.org/files/118539/Android-4.0.3-Browser-Crash.html -http://packetstormsecurity.org/files/81614/html2ps-1.0-beta5-File-Disclosure.html -http://pastebin.com/raw.php?i=GHXSmNEg -http://pastebin.com/raw.php?i=rz9BcBey -http://pastebin.com/raw.php?i=vbiG42VD -http://pastebin.com/raw.php?i=yTSFUBgZ -http://pb.specialised.info/all/adv/avast-adv.txt -http://pb.specialised.info/all/adv/ida-debugger-adv.txt -http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt -http://pb.specialised.info/all/adv/quicktime-mov-dos-adv.txt -http://pb.specialised.info/all/adv/quicktime-mov-io1-adv.txt -http://pb.specialised.info/all/adv/quicktime-mov-io2-adv.txt -http://pb.specialised.info/all/adv/quicktime-pict-adv.txt -http://pb.specialised.info/all/adv/sice-adv.txt -http://pear.php.net/advisory-20051104.txt -http://pear.php.net/advisory-20070507.txt -http://pecl.php.net/bugs/bug.php?id=13415 -http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html -http://pentest.com.tr/exploits/CuteNews-2-1-2-Remote-Code-Execution-Metasploit.html -http://pentest.com.tr/exploits/DEFCON-ManageEngine-APM-v14-Privilege-Escalation-Remote-Command-Execution.html -http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Privilege-Escalation-Remote-Command-Execution.html -http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html -http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt -http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt -http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html -http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html -http://pstgroup.blogspot.com/2007/06/exploitmicrosoft-excel-20002003-sheet.html -http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html -http://punbb.informer.com/forums/topic/19682/punbb-1220-and-13rc-hotfix-released/ -http://qwertwwwe.github.io/2017/04/22/PoDoFo-0-9-5-allows-remote-attackers-to-cause-a-denial-of-service-infinit-loop/ -http://rachelbythebay.com/w/2018/04/05/bangpatch/ -http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html -http://radscan.com/pipermail/nas/2013-August/001270.html -http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html -http://realpentesting.blogspot.com.es/p/blog-page_3.html -http://research.g0blin.co.uk/cve-2014-6445/ -http://research.g0blin.co.uk/cve-2014-6446/ -http://research.g0blin.co.uk/cve-2014-7152/ -http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ -http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/ -http://resources.infosecinstitute.com/slaac-attack/ -http://retrogod.altervista.org/9sg_CA_poc.html -http://retrogod.altervista.org/9sg_oovoo_url_poc.html -http://rewtin.blogspot.nl/2017/04/cve-2017-0199-practical-exploitation-poc.html -http://rhn.redhat.com/errata/RHSA-2013-0595.html -http://rhn.redhat.com/errata/RHSA-2013-0671.html -http://rhn.redhat.com/errata/RHSA-2014-0233.html -http://rhn.redhat.com/errata/RHSA-2014-1691.html -http://rhn.redhat.com/errata/RHSA-2015-0789.html -http://rhn.redhat.com/errata/RHSA-2015-0831.html -http://rhn.redhat.com/errata/RHSA-2015-0832.html -http://riddle.link/ -http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt -http://roeehay.blogspot.com/2009/08/exploitation-of-cve-2009-1869.html -http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ -http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156 -http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973 -http://ruffsecurity.blogspot.com/2018/05/my-first-cve-found.html -http://rungga.blogspot.co.id/2017/04/csrf-privilege-escalation-manipulation.html -http://rungga.blogspot.co.id/2017/04/multiple-csrf-remote-code-execution.html -http://rungga.blogspot.co.id/2017/04/remote-file-upload-vulnerability-in.html -http://savannah.nongnu.org/patch/index.php?7459 -http://scan.flashsec.org/ -http://scary.beasts.org/security/CESA-2006-003.html -http://scary.beasts.org/security/CESA-2008-001.html -http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html -http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked -http://secdev.zoller.lu/research/zango.htm -http://seclists.org/bugtraq/2010/Jul/60 -http://seclists.org/bugtraq/2012/Apr/121 -http://seclists.org/bugtraq/2012/Jul/101 -http://seclists.org/bugtraq/2012/May/58 -http://seclists.org/bugtraq/2012/Nov/33 -http://seclists.org/bugtraq/2012/Sep/38 -http://seclists.org/bugtraq/2014/Jan/96 -http://seclists.org/bugtraq/2016/Jul/119 -http://seclists.org/bugtraq/2016/Mar/85 -http://seclists.org/bugtraq/2016/Mar/87 -http://seclists.org/bugtraq/2016/Mar/88 -http://seclists.org/bugtraq/2016/Mar/89 -http://seclists.org/bugtraq/2016/Mar/90 -http://seclists.org/bugtraq/2017/Apr/61 -http://seclists.org/bugtraq/2017/Feb/39 -http://seclists.org/bugtraq/2017/Feb/40 -http://seclists.org/bugtraq/2017/Feb/6 -http://seclists.org/bugtraq/2017/Jul/3 -http://seclists.org/bugtraq/2017/Jul/30 -http://seclists.org/bugtraq/2017/Jun/4 -http://seclists.org/bugtraq/2017/Jun/43 -http://seclists.org/bugtraq/2017/Sep/19 -http://seclists.org/bugtraq/2017/Sep/20 -http://seclists.org/bugtraq/2017/Sep/22 -http://seclists.org/bugtraq/2018/Aug/41 -http://seclists.org/bugtraq/2018/Aug/49 -http://seclists.org/fulldisclosure/2009/Aug/0143.html -http://seclists.org/fulldisclosure/2009/Nov/134 -http://seclists.org/fulldisclosure/2009/Nov/139 -http://seclists.org/fulldisclosure/2009/Nov/228 -http://seclists.org/fulldisclosure/2009/Oct/299 -http://seclists.org/fulldisclosure/2010/Apr/272 -http://seclists.org/fulldisclosure/2010/Apr/79 -http://seclists.org/fulldisclosure/2010/Aug/235 -http://seclists.org/fulldisclosure/2010/Dec/180 -http://seclists.org/fulldisclosure/2010/Jul/3 -http://seclists.org/fulldisclosure/2010/Jul/317 -http://seclists.org/fulldisclosure/2010/Jul/324 -http://seclists.org/fulldisclosure/2010/Jul/337 -http://seclists.org/fulldisclosure/2010/Nov/326 -http://seclists.org/fulldisclosure/2010/Nov/40 -http://seclists.org/fulldisclosure/2010/Sep/82 -http://seclists.org/fulldisclosure/2011/Jan/78 -http://seclists.org/fulldisclosure/2012/Apr/204 -http://seclists.org/fulldisclosure/2012/Apr/343 -http://seclists.org/fulldisclosure/2012/Dec/4 -http://seclists.org/fulldisclosure/2012/Dec/5 -http://seclists.org/fulldisclosure/2012/Dec/58 -http://seclists.org/fulldisclosure/2012/Dec/7 -http://seclists.org/fulldisclosure/2012/Jan/27 -http://seclists.org/fulldisclosure/2012/Jul/375 -http://seclists.org/fulldisclosure/2012/Jun/289 -http://seclists.org/fulldisclosure/2012/Mar/234 -http://seclists.org/fulldisclosure/2012/Mar/259 -http://seclists.org/fulldisclosure/2012/Mar/324 -http://seclists.org/fulldisclosure/2012/Mar/7 -http://seclists.org/fulldisclosure/2012/Oct/113 -http://seclists.org/fulldisclosure/2012/Oct/25 -http://seclists.org/fulldisclosure/2012/Oct/36 -http://seclists.org/fulldisclosure/2013/Apr/247 -http://seclists.org/fulldisclosure/2013/Mar/114 -http://seclists.org/fulldisclosure/2014/Dec/50 -http://seclists.org/fulldisclosure/2016/Apr/11 -http://seclists.org/fulldisclosure/2016/Apr/3 -http://seclists.org/fulldisclosure/2016/Apr/36 -http://seclists.org/fulldisclosure/2016/Apr/37 -http://seclists.org/fulldisclosure/2016/Apr/43 -http://seclists.org/fulldisclosure/2016/Apr/5 -http://seclists.org/fulldisclosure/2016/Apr/58 -http://seclists.org/fulldisclosure/2016/Apr/59 -http://seclists.org/fulldisclosure/2016/Apr/61 -http://seclists.org/fulldisclosure/2016/Apr/72 -http://seclists.org/fulldisclosure/2016/Aug/122 -http://seclists.org/fulldisclosure/2016/Aug/123 -http://seclists.org/fulldisclosure/2016/Aug/38 -http://seclists.org/fulldisclosure/2016/Aug/4 -http://seclists.org/fulldisclosure/2016/Aug/44 -http://seclists.org/fulldisclosure/2016/Aug/46 -http://seclists.org/fulldisclosure/2016/Aug/54 -http://seclists.org/fulldisclosure/2016/Dec/45 -http://seclists.org/fulldisclosure/2016/Dec/57 -http://seclists.org/fulldisclosure/2016/Dec/58 -http://seclists.org/fulldisclosure/2016/Dec/69 -http://seclists.org/fulldisclosure/2016/Dec/72 -http://seclists.org/fulldisclosure/2016/Dec/78 -http://seclists.org/fulldisclosure/2016/Dec/81 -http://seclists.org/fulldisclosure/2016/Dec/86 -http://seclists.org/fulldisclosure/2016/Feb/105 -http://seclists.org/fulldisclosure/2016/Feb/21 -http://seclists.org/fulldisclosure/2016/Feb/30 -http://seclists.org/fulldisclosure/2016/Feb/48 -http://seclists.org/fulldisclosure/2016/Feb/60 -http://seclists.org/fulldisclosure/2016/Feb/95 -http://seclists.org/fulldisclosure/2016/Feb/99 -http://seclists.org/fulldisclosure/2016/Jan/22 -http://seclists.org/fulldisclosure/2016/Jan/44 -http://seclists.org/fulldisclosure/2016/Jan/56 -http://seclists.org/fulldisclosure/2016/Jan/63 -http://seclists.org/fulldisclosure/2016/Jan/67 -http://seclists.org/fulldisclosure/2016/Jul/19 -http://seclists.org/fulldisclosure/2016/Jul/37 -http://seclists.org/fulldisclosure/2016/Jul/38 -http://seclists.org/fulldisclosure/2016/Jul/45 -http://seclists.org/fulldisclosure/2016/Jul/53 -http://seclists.org/fulldisclosure/2016/Jul/72 -http://seclists.org/fulldisclosure/2016/Jun/23 -http://seclists.org/fulldisclosure/2016/Jun/25 -http://seclists.org/fulldisclosure/2016/Jun/26 -http://seclists.org/fulldisclosure/2016/Jun/29 -http://seclists.org/fulldisclosure/2016/Jun/38 -http://seclists.org/fulldisclosure/2016/Jun/39 -http://seclists.org/fulldisclosure/2016/Jun/40 -http://seclists.org/fulldisclosure/2016/Jun/41 -http://seclists.org/fulldisclosure/2016/Jun/42 -http://seclists.org/fulldisclosure/2016/Jun/44 -http://seclists.org/fulldisclosure/2016/Mar/13 -http://seclists.org/fulldisclosure/2016/Mar/20 -http://seclists.org/fulldisclosure/2016/Mar/21 -http://seclists.org/fulldisclosure/2016/Mar/22 -http://seclists.org/fulldisclosure/2016/Mar/46 -http://seclists.org/fulldisclosure/2016/Mar/47 -http://seclists.org/fulldisclosure/2016/Mar/56 -http://seclists.org/fulldisclosure/2016/Mar/68 -http://seclists.org/fulldisclosure/2016/May/15 -http://seclists.org/fulldisclosure/2016/May/19 -http://seclists.org/fulldisclosure/2016/May/34 -http://seclists.org/fulldisclosure/2016/May/39 -http://seclists.org/fulldisclosure/2016/May/40 -http://seclists.org/fulldisclosure/2016/May/56 -http://seclists.org/fulldisclosure/2016/May/69 -http://seclists.org/fulldisclosure/2016/May/9 -http://seclists.org/fulldisclosure/2016/Nov/0 -http://seclists.org/fulldisclosure/2016/Nov/111 -http://seclists.org/fulldisclosure/2016/Nov/143 -http://seclists.org/fulldisclosure/2016/Nov/38 -http://seclists.org/fulldisclosure/2016/Nov/4 -http://seclists.org/fulldisclosure/2016/Nov/75 -http://seclists.org/fulldisclosure/2016/Nov/76 -http://seclists.org/fulldisclosure/2016/Nov/78 -http://seclists.org/fulldisclosure/2016/Oct/63 -http://seclists.org/fulldisclosure/2016/Oct/80 -http://seclists.org/fulldisclosure/2016/Oct/96 -http://seclists.org/fulldisclosure/2016/Sep/23 -http://seclists.org/fulldisclosure/2016/Sep/53 -http://seclists.org/fulldisclosure/2017/Apr/4 -http://seclists.org/fulldisclosure/2017/Apr/40 -http://seclists.org/fulldisclosure/2017/Apr/41 -http://seclists.org/fulldisclosure/2017/Apr/42 -http://seclists.org/fulldisclosure/2017/Apr/44 -http://seclists.org/fulldisclosure/2017/Apr/49 -http://seclists.org/fulldisclosure/2017/Apr/50 -http://seclists.org/fulldisclosure/2017/Apr/51 -http://seclists.org/fulldisclosure/2017/Apr/52 -http://seclists.org/fulldisclosure/2017/Apr/53 -http://seclists.org/fulldisclosure/2017/Apr/55 -http://seclists.org/fulldisclosure/2017/Apr/78 -http://seclists.org/fulldisclosure/2017/Apr/97 -http://seclists.org/fulldisclosure/2017/Aug/0 -http://seclists.org/fulldisclosure/2017/Aug/12 -http://seclists.org/fulldisclosure/2017/Aug/15 -http://seclists.org/fulldisclosure/2017/Aug/17 -http://seclists.org/fulldisclosure/2017/Aug/23 -http://seclists.org/fulldisclosure/2017/Aug/39 -http://seclists.org/fulldisclosure/2017/Aug/46 -http://seclists.org/fulldisclosure/2017/Dec/2 -http://seclists.org/fulldisclosure/2017/Dec/3 -http://seclists.org/fulldisclosure/2017/Dec/32 -http://seclists.org/fulldisclosure/2017/Dec/33 -http://seclists.org/fulldisclosure/2017/Dec/45 -http://seclists.org/fulldisclosure/2017/Dec/47 -http://seclists.org/fulldisclosure/2017/Dec/50 -http://seclists.org/fulldisclosure/2017/Dec/67 -http://seclists.org/fulldisclosure/2017/Dec/71 -http://seclists.org/fulldisclosure/2017/Dec/72 -http://seclists.org/fulldisclosure/2017/Dec/73 -http://seclists.org/fulldisclosure/2017/Feb/1 -http://seclists.org/fulldisclosure/2017/Feb/100 -http://seclists.org/fulldisclosure/2017/Feb/11 -http://seclists.org/fulldisclosure/2017/Feb/12 -http://seclists.org/fulldisclosure/2017/Feb/13 -http://seclists.org/fulldisclosure/2017/Feb/14 -http://seclists.org/fulldisclosure/2017/Feb/15 -http://seclists.org/fulldisclosure/2017/Feb/18 -http://seclists.org/fulldisclosure/2017/Feb/19 -http://seclists.org/fulldisclosure/2017/Feb/24 -http://seclists.org/fulldisclosure/2017/Feb/28 -http://seclists.org/fulldisclosure/2017/Feb/34 -http://seclists.org/fulldisclosure/2017/Feb/36 -http://seclists.org/fulldisclosure/2017/Feb/37 -http://seclists.org/fulldisclosure/2017/Feb/39 -http://seclists.org/fulldisclosure/2017/Feb/58 -http://seclists.org/fulldisclosure/2017/Feb/60 -http://seclists.org/fulldisclosure/2017/Feb/61 -http://seclists.org/fulldisclosure/2017/Feb/66 -http://seclists.org/fulldisclosure/2017/Feb/67 -http://seclists.org/fulldisclosure/2017/Feb/68 -http://seclists.org/fulldisclosure/2017/Feb/70 -http://seclists.org/fulldisclosure/2017/Feb/71 -http://seclists.org/fulldisclosure/2017/Jan/30 -http://seclists.org/fulldisclosure/2017/Jan/50 -http://seclists.org/fulldisclosure/2017/Jul/28 -http://seclists.org/fulldisclosure/2017/Jul/29 -http://seclists.org/fulldisclosure/2017/Jul/31 -http://seclists.org/fulldisclosure/2017/Jul/33 -http://seclists.org/fulldisclosure/2017/Jul/56 -http://seclists.org/fulldisclosure/2017/Jul/62 -http://seclists.org/fulldisclosure/2017/Jul/63 -http://seclists.org/fulldisclosure/2017/Jul/65 -http://seclists.org/fulldisclosure/2017/Jul/66 -http://seclists.org/fulldisclosure/2017/Jul/76 -http://seclists.org/fulldisclosure/2017/Jul/77 -http://seclists.org/fulldisclosure/2017/Jul/78 -http://seclists.org/fulldisclosure/2017/Jul/79 -http://seclists.org/fulldisclosure/2017/Jul/80 -http://seclists.org/fulldisclosure/2017/Jul/81 -http://seclists.org/fulldisclosure/2017/Jul/82 -http://seclists.org/fulldisclosure/2017/Jul/83 -http://seclists.org/fulldisclosure/2017/Jul/84 -http://seclists.org/fulldisclosure/2017/Jul/85 -http://seclists.org/fulldisclosure/2017/Jul/94 -http://seclists.org/fulldisclosure/2017/Jun/32 -http://seclists.org/fulldisclosure/2017/Jun/33 -http://seclists.org/fulldisclosure/2017/Jun/44 -http://seclists.org/fulldisclosure/2017/Jun/45 -http://seclists.org/fulldisclosure/2017/Jun/6 -http://seclists.org/fulldisclosure/2017/Mar/23 -http://seclists.org/fulldisclosure/2017/Mar/24 -http://seclists.org/fulldisclosure/2017/Mar/31 -http://seclists.org/fulldisclosure/2017/Mar/34 -http://seclists.org/fulldisclosure/2017/Mar/36 -http://seclists.org/fulldisclosure/2017/Mar/42 -http://seclists.org/fulldisclosure/2017/Mar/44 -http://seclists.org/fulldisclosure/2017/Mar/45 -http://seclists.org/fulldisclosure/2017/Mar/46 -http://seclists.org/fulldisclosure/2017/Mar/47 -http://seclists.org/fulldisclosure/2017/Mar/48 -http://seclists.org/fulldisclosure/2017/Mar/49 -http://seclists.org/fulldisclosure/2017/Mar/5 -http://seclists.org/fulldisclosure/2017/Mar/52 -http://seclists.org/fulldisclosure/2017/Mar/58 -http://seclists.org/fulldisclosure/2017/Mar/6 -http://seclists.org/fulldisclosure/2017/Mar/63 -http://seclists.org/fulldisclosure/2017/Mar/75 -http://seclists.org/fulldisclosure/2017/Mar/89 -http://seclists.org/fulldisclosure/2017/May/10 -http://seclists.org/fulldisclosure/2017/May/105 -http://seclists.org/fulldisclosure/2017/May/106 -http://seclists.org/fulldisclosure/2017/May/23 -http://seclists.org/fulldisclosure/2017/May/54 -http://seclists.org/fulldisclosure/2017/May/59 -http://seclists.org/fulldisclosure/2017/May/91 -http://seclists.org/fulldisclosure/2017/Nov/17 -http://seclists.org/fulldisclosure/2017/Nov/19 -http://seclists.org/fulldisclosure/2017/Oct/14 -http://seclists.org/fulldisclosure/2017/Sep/1 -http://seclists.org/fulldisclosure/2017/Sep/13 -http://seclists.org/fulldisclosure/2017/Sep/14 -http://seclists.org/fulldisclosure/2017/Sep/3 -http://seclists.org/fulldisclosure/2017/Sep/34 -http://seclists.org/fulldisclosure/2017/Sep/36 -http://seclists.org/fulldisclosure/2017/Sep/38 -http://seclists.org/fulldisclosure/2017/Sep/39 -http://seclists.org/fulldisclosure/2017/Sep/55 -http://seclists.org/fulldisclosure/2017/Sep/57 -http://seclists.org/fulldisclosure/2017/Sep/85 -http://seclists.org/fulldisclosure/2017/Sep/86 -http://seclists.org/fulldisclosure/2017/Sep/88 -http://seclists.org/fulldisclosure/2017/Sep/90 -http://seclists.org/fulldisclosure/2017/Sep/91 -http://seclists.org/fulldisclosure/2018/Apr/18 -http://seclists.org/fulldisclosure/2018/Apr/19 -http://seclists.org/fulldisclosure/2018/Apr/36 -http://seclists.org/fulldisclosure/2018/Apr/45 -http://seclists.org/fulldisclosure/2018/Apr/6 -http://seclists.org/fulldisclosure/2018/Apr/61 -http://seclists.org/fulldisclosure/2018/Aug/1 -http://seclists.org/fulldisclosure/2018/Aug/11 -http://seclists.org/fulldisclosure/2018/Aug/13 -http://seclists.org/fulldisclosure/2018/Aug/18 -http://seclists.org/fulldisclosure/2018/Aug/19 -http://seclists.org/fulldisclosure/2018/Aug/2 -http://seclists.org/fulldisclosure/2018/Aug/25 -http://seclists.org/fulldisclosure/2018/Aug/26 -http://seclists.org/fulldisclosure/2018/Aug/27 -http://seclists.org/fulldisclosure/2018/Aug/28 -http://seclists.org/fulldisclosure/2018/Aug/29 -http://seclists.org/fulldisclosure/2018/Dec/1 -http://seclists.org/fulldisclosure/2018/Dec/19 -http://seclists.org/fulldisclosure/2018/Dec/20 -http://seclists.org/fulldisclosure/2018/Dec/21 -http://seclists.org/fulldisclosure/2018/Dec/32 -http://seclists.org/fulldisclosure/2018/Dec/33 -http://seclists.org/fulldisclosure/2018/Dec/34 -http://seclists.org/fulldisclosure/2018/Dec/37 -http://seclists.org/fulldisclosure/2018/Dec/39 -http://seclists.org/fulldisclosure/2018/Dec/44 -http://seclists.org/fulldisclosure/2018/Feb/10 -http://seclists.org/fulldisclosure/2018/Feb/23 -http://seclists.org/fulldisclosure/2018/Feb/24 -http://seclists.org/fulldisclosure/2018/Feb/44 -http://seclists.org/fulldisclosure/2018/Jan/13 -http://seclists.org/fulldisclosure/2018/Jan/14 -http://seclists.org/fulldisclosure/2018/Jan/63 -http://seclists.org/fulldisclosure/2018/Jan/80 -http://seclists.org/fulldisclosure/2018/Jan/82 -http://seclists.org/fulldisclosure/2018/Jan/83 -http://seclists.org/fulldisclosure/2018/Jan/91 -http://seclists.org/fulldisclosure/2018/Jan/92 -http://seclists.org/fulldisclosure/2018/Jul/12 -http://seclists.org/fulldisclosure/2018/Jul/14 -http://seclists.org/fulldisclosure/2018/Jul/17 -http://seclists.org/fulldisclosure/2018/Jul/18 -http://seclists.org/fulldisclosure/2018/Jul/19 -http://seclists.org/fulldisclosure/2018/Jul/2 -http://seclists.org/fulldisclosure/2018/Jul/20 -http://seclists.org/fulldisclosure/2018/Jul/23 -http://seclists.org/fulldisclosure/2018/Jul/24 -http://seclists.org/fulldisclosure/2018/Jul/28 -http://seclists.org/fulldisclosure/2018/Jul/29 -http://seclists.org/fulldisclosure/2018/Jul/38 -http://seclists.org/fulldisclosure/2018/Jul/45 -http://seclists.org/fulldisclosure/2018/Jul/55 -http://seclists.org/fulldisclosure/2018/Jul/7 -http://seclists.org/fulldisclosure/2018/Jul/71 -http://seclists.org/fulldisclosure/2018/Jul/73 -http://seclists.org/fulldisclosure/2018/Jul/74 -http://seclists.org/fulldisclosure/2018/Jul/75 -http://seclists.org/fulldisclosure/2018/Jul/85 -http://seclists.org/fulldisclosure/2018/Jul/94 -http://seclists.org/fulldisclosure/2018/Jun/13 -http://seclists.org/fulldisclosure/2018/Jun/15 -http://seclists.org/fulldisclosure/2018/Jun/21 -http://seclists.org/fulldisclosure/2018/Jun/23 -http://seclists.org/fulldisclosure/2018/Jun/26 -http://seclists.org/fulldisclosure/2018/Mar/20 -http://seclists.org/fulldisclosure/2018/Mar/29 -http://seclists.org/fulldisclosure/2018/Mar/34 -http://seclists.org/fulldisclosure/2018/Mar/38 -http://seclists.org/fulldisclosure/2018/Mar/40 -http://seclists.org/fulldisclosure/2018/Mar/57 -http://seclists.org/fulldisclosure/2018/Mar/58 -http://seclists.org/fulldisclosure/2018/Mar/66 -http://seclists.org/fulldisclosure/2018/May/2 -http://seclists.org/fulldisclosure/2018/May/32 -http://seclists.org/fulldisclosure/2018/May/49 -http://seclists.org/fulldisclosure/2018/May/66 -http://seclists.org/fulldisclosure/2018/May/69 -http://seclists.org/fulldisclosure/2018/May/71 -http://seclists.org/fulldisclosure/2018/Nov/1 -http://seclists.org/fulldisclosure/2018/Nov/25 -http://seclists.org/fulldisclosure/2018/Nov/27 -http://seclists.org/fulldisclosure/2018/Nov/28 -http://seclists.org/fulldisclosure/2018/Nov/29 -http://seclists.org/fulldisclosure/2018/Nov/30 -http://seclists.org/fulldisclosure/2018/Nov/31 -http://seclists.org/fulldisclosure/2018/Nov/32 -http://seclists.org/fulldisclosure/2018/Nov/38 -http://seclists.org/fulldisclosure/2018/Nov/4 -http://seclists.org/fulldisclosure/2018/Nov/40 -http://seclists.org/fulldisclosure/2018/Nov/44 -http://seclists.org/fulldisclosure/2018/Nov/46 -http://seclists.org/fulldisclosure/2018/Nov/55 -http://seclists.org/fulldisclosure/2018/Nov/58 -http://seclists.org/fulldisclosure/2018/Nov/62 -http://seclists.org/fulldisclosure/2018/Nov/64 -http://seclists.org/fulldisclosure/2018/Nov/65 -http://seclists.org/fulldisclosure/2018/Nov/66 -http://seclists.org/fulldisclosure/2018/Nov/67 -http://seclists.org/fulldisclosure/2018/Oct/11 -http://seclists.org/fulldisclosure/2018/Oct/15 -http://seclists.org/fulldisclosure/2018/Oct/27 -http://seclists.org/fulldisclosure/2018/Oct/28 -http://seclists.org/fulldisclosure/2018/Oct/29 -http://seclists.org/fulldisclosure/2018/Sep/13 -http://seclists.org/fulldisclosure/2018/Sep/20 -http://seclists.org/fulldisclosure/2018/Sep/32 -http://seclists.org/fulldisclosure/2018/Sep/33 -http://seclists.org/fulldisclosure/2018/Sep/38 -http://seclists.org/fulldisclosure/2018/Sep/49 -http://seclists.org/fulldisclosure/2018/Sep/50 -http://seclists.org/fulldisclosure/2019/Apr/12 -http://seclists.org/fulldisclosure/2019/Feb/3 -http://seclists.org/fulldisclosure/2019/Feb/30 -http://seclists.org/fulldisclosure/2019/Feb/31 -http://seclists.org/fulldisclosure/2019/Feb/32 -http://seclists.org/fulldisclosure/2019/Feb/33 -http://seclists.org/fulldisclosure/2019/Feb/34 -http://seclists.org/fulldisclosure/2019/Feb/35 -http://seclists.org/fulldisclosure/2019/Feb/4 -http://seclists.org/fulldisclosure/2019/Feb/40 -http://seclists.org/fulldisclosure/2019/Feb/43 -http://seclists.org/fulldisclosure/2019/Feb/45 -http://seclists.org/fulldisclosure/2019/Feb/46 -http://seclists.org/fulldisclosure/2019/Feb/47 -http://seclists.org/fulldisclosure/2019/Feb/48 -http://seclists.org/fulldisclosure/2019/Feb/5 -http://seclists.org/fulldisclosure/2019/Feb/51 -http://seclists.org/fulldisclosure/2019/Jan/10 -http://seclists.org/fulldisclosure/2019/Jan/46 -http://seclists.org/fulldisclosure/2019/Jul/20 -http://seclists.org/fulldisclosure/2019/Jun/1 -http://seclists.org/fulldisclosure/2019/Jun/10 -http://seclists.org/fulldisclosure/2019/Jun/13 -http://seclists.org/fulldisclosure/2019/Jun/14 -http://seclists.org/fulldisclosure/2019/Jun/15 -http://seclists.org/fulldisclosure/2019/Jun/16 -http://seclists.org/fulldisclosure/2019/Jun/18 -http://seclists.org/fulldisclosure/2019/Mar/33 -http://seclists.org/fulldisclosure/2019/Mar/36 -http://seclists.org/fulldisclosure/2019/May/13 -http://seclists.org/fulldisclosure/2019/May/26 -http://seclists.org/fulldisclosure/2019/Sep/17 -http://seclists.org/fulldisclosure/2019/Sep/7 -http://seclists.org/fulldisclosure/2020/Aug/20 -http://seclists.org/fulldisclosure/2020/Dec/51 -http://seclists.org/fulldisclosure/2020/Mar/15 -http://seclists.org/fulldisclosure/2020/Oct/23 -http://seclists.org/fulldisclosure/2020/Oct/26 -http://seclists.org/fulldisclosure/2020/Sep/6 -http://seclists.org/fulldisclosure/2021/Jan/39 -http://seclists.org/fulldisclosure/2021/Jul/32 -http://seclists.org/fulldisclosure/2021/Sep/0 -http://seclists.org/fulldisclosure/2022/Apr/0 -http://seclists.org/fulldisclosure/2022/Apr/20 -http://seclists.org/fulldisclosure/2022/Apr/42 -http://seclists.org/fulldisclosure/2022/Dec/1 -http://seclists.org/fulldisclosure/2022/Dec/12 -http://seclists.org/fulldisclosure/2022/Dec/6 -http://seclists.org/fulldisclosure/2022/Dec/7 -http://seclists.org/fulldisclosure/2022/Feb/20 -http://seclists.org/fulldisclosure/2022/Jan/34 -http://seclists.org/fulldisclosure/2022/Jan/39 -http://seclists.org/fulldisclosure/2022/Jul/4 -http://seclists.org/fulldisclosure/2022/Jul/9 -http://seclists.org/fulldisclosure/2022/Jun/10 -http://seclists.org/fulldisclosure/2022/Jun/11 -http://seclists.org/fulldisclosure/2022/Jun/12 -http://seclists.org/fulldisclosure/2022/Jun/13 -http://seclists.org/fulldisclosure/2022/Jun/17 -http://seclists.org/fulldisclosure/2022/Jun/18 -http://seclists.org/fulldisclosure/2022/Jun/19 -http://seclists.org/fulldisclosure/2022/Jun/20 -http://seclists.org/fulldisclosure/2022/Jun/21 -http://seclists.org/fulldisclosure/2022/Jun/22 -http://seclists.org/fulldisclosure/2022/Jun/23 -http://seclists.org/fulldisclosure/2022/Jun/24 -http://seclists.org/fulldisclosure/2022/Jun/25 -http://seclists.org/fulldisclosure/2022/Jun/26 -http://seclists.org/fulldisclosure/2022/Jun/27 -http://seclists.org/fulldisclosure/2022/Jun/32 -http://seclists.org/fulldisclosure/2022/Jun/35 -http://seclists.org/fulldisclosure/2022/Jun/36 -http://seclists.org/fulldisclosure/2022/Jun/52 -http://seclists.org/fulldisclosure/2022/Jun/8 -http://seclists.org/fulldisclosure/2022/Jun/9 -http://seclists.org/fulldisclosure/2022/Nov/10 -http://seclists.org/fulldisclosure/2022/Nov/11 -http://seclists.org/fulldisclosure/2022/Nov/19 -http://seclists.org/fulldisclosure/2022/Oct/3 -http://seclists.org/fulldisclosure/2022/Oct/30 -http://seclists.org/fulldisclosure/2022/Oct/37 -http://seclists.org/fulldisclosure/2022/Oct/38 -http://seclists.org/fulldisclosure/2022/Oct/39 -http://seclists.org/fulldisclosure/2022/Oct/4 -http://seclists.org/fulldisclosure/2022/Oct/40 -http://seclists.org/fulldisclosure/2022/Oct/41 -http://seclists.org/fulldisclosure/2022/Oct/42 -http://seclists.org/fulldisclosure/2022/Oct/43 -http://seclists.org/fulldisclosure/2022/Oct/45 -http://seclists.org/fulldisclosure/2022/Oct/47 -http://seclists.org/fulldisclosure/2022/Oct/49 -http://seclists.org/fulldisclosure/2022/Oct/5 -http://seclists.org/fulldisclosure/2022/Oct/50 -http://seclists.org/fulldisclosure/2022/Oct/6 -http://seclists.org/fulldisclosure/2022/Sep/17 -http://seclists.org/fulldisclosure/2022/Sep/18 -http://seclists.org/fulldisclosure/2023/Apr/7 -http://seclists.org/fulldisclosure/2023/Aug/12 -http://seclists.org/fulldisclosure/2023/Aug/13 -http://seclists.org/fulldisclosure/2023/Aug/15 -http://seclists.org/fulldisclosure/2023/Aug/16 -http://seclists.org/fulldisclosure/2023/Aug/17 -http://seclists.org/fulldisclosure/2023/Aug/21 -http://seclists.org/fulldisclosure/2023/Aug/26 -http://seclists.org/fulldisclosure/2023/Aug/28 -http://seclists.org/fulldisclosure/2023/Aug/29 -http://seclists.org/fulldisclosure/2023/Aug/4 -http://seclists.org/fulldisclosure/2023/Dec/16 -http://seclists.org/fulldisclosure/2023/Dec/18 -http://seclists.org/fulldisclosure/2023/Dec/2 -http://seclists.org/fulldisclosure/2023/Dec/20 -http://seclists.org/fulldisclosure/2023/Dec/23 -http://seclists.org/fulldisclosure/2023/Dec/24 -http://seclists.org/fulldisclosure/2023/Feb/10 -http://seclists.org/fulldisclosure/2023/Feb/15 -http://seclists.org/fulldisclosure/2023/Feb/16 -http://seclists.org/fulldisclosure/2023/Jan/1 -http://seclists.org/fulldisclosure/2023/Jan/10 -http://seclists.org/fulldisclosure/2023/Jan/11 -http://seclists.org/fulldisclosure/2023/Jan/13 -http://seclists.org/fulldisclosure/2023/Jan/14 -http://seclists.org/fulldisclosure/2023/Jan/19 -http://seclists.org/fulldisclosure/2023/Jan/28 -http://seclists.org/fulldisclosure/2023/Jul/14 -http://seclists.org/fulldisclosure/2023/Jul/30 -http://seclists.org/fulldisclosure/2023/Jul/42 -http://seclists.org/fulldisclosure/2023/Jun/2 -http://seclists.org/fulldisclosure/2023/Mar/2 -http://seclists.org/fulldisclosure/2023/Mar/21 -http://seclists.org/fulldisclosure/2023/Mar/26 -http://seclists.org/fulldisclosure/2023/May/14 -http://seclists.org/fulldisclosure/2023/May/18 -http://seclists.org/fulldisclosure/2023/May/4 -http://seclists.org/fulldisclosure/2023/Nov/12 -http://seclists.org/fulldisclosure/2023/Nov/13 -http://seclists.org/fulldisclosure/2023/Nov/14 -http://seclists.org/fulldisclosure/2023/Oct/11 -http://seclists.org/fulldisclosure/2023/Oct/15 -http://seclists.org/fulldisclosure/2023/Oct/30 -http://seclists.org/fulldisclosure/2023/Oct/31 -http://seclists.org/fulldisclosure/2023/Sep/10 -http://seclists.org/fulldisclosure/2023/Sep/6 -http://seclists.org/fulldisclosure/2024/Apr/1 -http://seclists.org/fulldisclosure/2024/Apr/17 -http://seclists.org/fulldisclosure/2024/Apr/18 -http://seclists.org/fulldisclosure/2024/Feb/14 -http://seclists.org/fulldisclosure/2024/Feb/17 -http://seclists.org/fulldisclosure/2024/Feb/23 -http://seclists.org/fulldisclosure/2024/Feb/3 -http://seclists.org/fulldisclosure/2024/Feb/7 -http://seclists.org/fulldisclosure/2024/Jan/11 -http://seclists.org/fulldisclosure/2024/Jan/43 -http://seclists.org/fulldisclosure/2024/Mar/10 -http://seclists.org/fulldisclosure/2024/Mar/11 -http://seclists.org/fulldisclosure/2024/Mar/12 -http://seclists.org/fulldisclosure/2024/Mar/13 -http://seclists.org/fulldisclosure/2024/Mar/14 -http://seclists.org/oss-sec/2012/q2/396 -http://seclists.org/oss-sec/2016/q2/574 -http://seclists.org/oss-sec/2016/q4/224 -http://seclists.org/oss-sec/2016/q4/442 -http://seclists.org/oss-sec/2017/q2/422 -http://seclists.org/oss-sec/2017/q3/128 -http://seclists.org/oss-sec/2017/q3/290 -http://seclists.org/oss-sec/2017/q3/437 -http://seclists.org/oss-sec/2018/q1/38 -http://seclists.org/oss-sec/2018/q2/122 -http://seclists.org/oss-sec/2018/q3/142 -http://seclists.org/oss-sec/2018/q3/180 -http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/ -http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/ -http://security.gentoo.org/glsa/glsa-200403-02.xml -http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor -http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html -http://securityreason.com/achievement_securityalert/101 -http://securityreason.com/achievement_securityalert/32 -http://securityreason.com/achievement_securityalert/69 -http://securityreason.com/achievement_securityalert/71 -http://securityreason.com/achievement_securityalert/72 -http://securityreason.com/achievement_securityalert/73 -http://securityreason.com/achievement_securityalert/75 -http://securityreason.com/achievement_securityalert/76 -http://securityreason.com/achievement_securityalert/77 -http://securityreason.com/achievement_securityalert/78 -http://securityreason.com/achievement_securityalert/81 -http://securityreason.com/achievement_securityalert/82 -http://securityreason.com/achievement_securityalert/83 -http://securityreason.com/achievement_securityalert/89 -http://securityreason.com/achievement_securityalert/93 -http://securityreason.com/achievement_securityalert/95 -http://securityreason.com/achievement_securityalert/97 -http://securityreason.com/expldownload/1/7380/1 -http://securityreason.com/exploitalert/5644 -http://securityreason.com/exploitalert/6198 -http://securityreason.com/exploitalert/7422 -http://securityreason.com/exploitalert/7480 -http://securityreason.com/exploitalert/7494 -http://securityreason.com/exploitalert/7731 -http://securityreason.com/exploitalert/9223 -http://securityreason.com/securityalert/1026 -http://securityreason.com/securityalert/1080 -http://securityreason.com/securityalert/117 -http://securityreason.com/securityalert/1170 -http://securityreason.com/securityalert/1171 -http://securityreason.com/securityalert/1172 -http://securityreason.com/securityalert/1173 -http://securityreason.com/securityalert/1174 -http://securityreason.com/securityalert/1175 -http://securityreason.com/securityalert/1176 -http://securityreason.com/securityalert/1177 -http://securityreason.com/securityalert/1178 -http://securityreason.com/securityalert/1179 -http://securityreason.com/securityalert/13 -http://securityreason.com/securityalert/130 -http://securityreason.com/securityalert/1300 -http://securityreason.com/securityalert/1301 -http://securityreason.com/securityalert/1302 -http://securityreason.com/securityalert/1303 -http://securityreason.com/securityalert/1304 -http://securityreason.com/securityalert/1305 -http://securityreason.com/securityalert/1306 -http://securityreason.com/securityalert/1307 -http://securityreason.com/securityalert/1308 -http://securityreason.com/securityalert/1309 -http://securityreason.com/securityalert/1310 -http://securityreason.com/securityalert/1311 -http://securityreason.com/securityalert/1312 -http://securityreason.com/securityalert/1313 -http://securityreason.com/securityalert/1314 -http://securityreason.com/securityalert/1315 -http://securityreason.com/securityalert/1316 -http://securityreason.com/securityalert/1317 -http://securityreason.com/securityalert/1318 -http://securityreason.com/securityalert/1319 -http://securityreason.com/securityalert/132 -http://securityreason.com/securityalert/1320 -http://securityreason.com/securityalert/1321 -http://securityreason.com/securityalert/1322 -http://securityreason.com/securityalert/1323 -http://securityreason.com/securityalert/1324 -http://securityreason.com/securityalert/1325 -http://securityreason.com/securityalert/1326 -http://securityreason.com/securityalert/1327 -http://securityreason.com/securityalert/1328 -http://securityreason.com/securityalert/1329 -http://securityreason.com/securityalert/133 -http://securityreason.com/securityalert/1330 -http://securityreason.com/securityalert/1331 -http://securityreason.com/securityalert/1332 -http://securityreason.com/securityalert/1333 -http://securityreason.com/securityalert/1334 -http://securityreason.com/securityalert/1335 -http://securityreason.com/securityalert/1336 -http://securityreason.com/securityalert/1337 -http://securityreason.com/securityalert/1338 -http://securityreason.com/securityalert/1339 -http://securityreason.com/securityalert/134 -http://securityreason.com/securityalert/1340 -http://securityreason.com/securityalert/1341 -http://securityreason.com/securityalert/1342 -http://securityreason.com/securityalert/1343 -http://securityreason.com/securityalert/1344 -http://securityreason.com/securityalert/1345 -http://securityreason.com/securityalert/1346 -http://securityreason.com/securityalert/1347 -http://securityreason.com/securityalert/1348 -http://securityreason.com/securityalert/1349 -http://securityreason.com/securityalert/1350 -http://securityreason.com/securityalert/1351 -http://securityreason.com/securityalert/1352 -http://securityreason.com/securityalert/1353 -http://securityreason.com/securityalert/1354 -http://securityreason.com/securityalert/1355 -http://securityreason.com/securityalert/1356 -http://securityreason.com/securityalert/1357 -http://securityreason.com/securityalert/1358 -http://securityreason.com/securityalert/1359 -http://securityreason.com/securityalert/136 -http://securityreason.com/securityalert/1360 -http://securityreason.com/securityalert/1361 -http://securityreason.com/securityalert/1362 -http://securityreason.com/securityalert/1363 -http://securityreason.com/securityalert/1364 -http://securityreason.com/securityalert/1365 -http://securityreason.com/securityalert/1366 -http://securityreason.com/securityalert/1367 -http://securityreason.com/securityalert/1368 -http://securityreason.com/securityalert/1369 -http://securityreason.com/securityalert/137 -http://securityreason.com/securityalert/1370 -http://securityreason.com/securityalert/1371 -http://securityreason.com/securityalert/1372 -http://securityreason.com/securityalert/1373 -http://securityreason.com/securityalert/1374 -http://securityreason.com/securityalert/1375 -http://securityreason.com/securityalert/1376 -http://securityreason.com/securityalert/1377 -http://securityreason.com/securityalert/1378 -http://securityreason.com/securityalert/1379 -http://securityreason.com/securityalert/138 -http://securityreason.com/securityalert/1380 -http://securityreason.com/securityalert/1381 -http://securityreason.com/securityalert/1382 -http://securityreason.com/securityalert/1383 -http://securityreason.com/securityalert/1384 -http://securityreason.com/securityalert/1385 -http://securityreason.com/securityalert/1386 -http://securityreason.com/securityalert/1387 -http://securityreason.com/securityalert/1388 -http://securityreason.com/securityalert/1389 -http://securityreason.com/securityalert/139 -http://securityreason.com/securityalert/1390 -http://securityreason.com/securityalert/1391 -http://securityreason.com/securityalert/1392 -http://securityreason.com/securityalert/1393 -http://securityreason.com/securityalert/1394 -http://securityreason.com/securityalert/1395 -http://securityreason.com/securityalert/1396 -http://securityreason.com/securityalert/1397 -http://securityreason.com/securityalert/1398 -http://securityreason.com/securityalert/1399 -http://securityreason.com/securityalert/1435 -http://securityreason.com/securityalert/145 -http://securityreason.com/securityalert/1450 -http://securityreason.com/securityalert/1451 -http://securityreason.com/securityalert/1452 -http://securityreason.com/securityalert/1453 -http://securityreason.com/securityalert/1454 -http://securityreason.com/securityalert/1455 -http://securityreason.com/securityalert/1456 -http://securityreason.com/securityalert/1457 -http://securityreason.com/securityalert/1458 -http://securityreason.com/securityalert/1459 -http://securityreason.com/securityalert/1466 -http://securityreason.com/securityalert/1475 -http://securityreason.com/securityalert/163 -http://securityreason.com/securityalert/1630 -http://securityreason.com/securityalert/1631 -http://securityreason.com/securityalert/1632 -http://securityreason.com/securityalert/1633 -http://securityreason.com/securityalert/1634 -http://securityreason.com/securityalert/1635 -http://securityreason.com/securityalert/1636 -http://securityreason.com/securityalert/1637 -http://securityreason.com/securityalert/1638 -http://securityreason.com/securityalert/1639 -http://securityreason.com/securityalert/168 -http://securityreason.com/securityalert/1680 -http://securityreason.com/securityalert/1681 -http://securityreason.com/securityalert/1682 -http://securityreason.com/securityalert/1683 -http://securityreason.com/securityalert/1684 -http://securityreason.com/securityalert/1685 -http://securityreason.com/securityalert/1686 -http://securityreason.com/securityalert/1687 -http://securityreason.com/securityalert/1688 -http://securityreason.com/securityalert/1689 -http://securityreason.com/securityalert/172 -http://securityreason.com/securityalert/1720 -http://securityreason.com/securityalert/1721 -http://securityreason.com/securityalert/1722 -http://securityreason.com/securityalert/1723 -http://securityreason.com/securityalert/1724 -http://securityreason.com/securityalert/1725 -http://securityreason.com/securityalert/1726 -http://securityreason.com/securityalert/1727 -http://securityreason.com/securityalert/1728 -http://securityreason.com/securityalert/1729 -http://securityreason.com/securityalert/176 -http://securityreason.com/securityalert/1760 -http://securityreason.com/securityalert/1761 -http://securityreason.com/securityalert/1762 -http://securityreason.com/securityalert/1763 -http://securityreason.com/securityalert/1764 -http://securityreason.com/securityalert/1765 -http://securityreason.com/securityalert/1766 -http://securityreason.com/securityalert/1767 -http://securityreason.com/securityalert/1768 -http://securityreason.com/securityalert/1769 -http://securityreason.com/securityalert/18 -http://securityreason.com/securityalert/180 -http://securityreason.com/securityalert/1800 -http://securityreason.com/securityalert/1801 -http://securityreason.com/securityalert/1802 -http://securityreason.com/securityalert/1803 -http://securityreason.com/securityalert/1804 -http://securityreason.com/securityalert/1805 -http://securityreason.com/securityalert/1806 -http://securityreason.com/securityalert/1807 -http://securityreason.com/securityalert/1808 -http://securityreason.com/securityalert/1809 -http://securityreason.com/securityalert/181 -http://securityreason.com/securityalert/1810 -http://securityreason.com/securityalert/1811 -http://securityreason.com/securityalert/1812 -http://securityreason.com/securityalert/1813 -http://securityreason.com/securityalert/1814 -http://securityreason.com/securityalert/1815 -http://securityreason.com/securityalert/1816 -http://securityreason.com/securityalert/1817 -http://securityreason.com/securityalert/1818 -http://securityreason.com/securityalert/1819 -http://securityreason.com/securityalert/182 -http://securityreason.com/securityalert/1820 -http://securityreason.com/securityalert/1821 -http://securityreason.com/securityalert/1822 -http://securityreason.com/securityalert/1823 -http://securityreason.com/securityalert/1824 -http://securityreason.com/securityalert/1825 -http://securityreason.com/securityalert/1826 -http://securityreason.com/securityalert/1827 -http://securityreason.com/securityalert/1828 -http://securityreason.com/securityalert/1829 -http://securityreason.com/securityalert/1830 -http://securityreason.com/securityalert/1831 -http://securityreason.com/securityalert/1832 -http://securityreason.com/securityalert/1833 -http://securityreason.com/securityalert/1834 -http://securityreason.com/securityalert/1835 -http://securityreason.com/securityalert/1836 -http://securityreason.com/securityalert/1837 -http://securityreason.com/securityalert/1838 -http://securityreason.com/securityalert/1839 -http://securityreason.com/securityalert/184 -http://securityreason.com/securityalert/1840 -http://securityreason.com/securityalert/1841 -http://securityreason.com/securityalert/1842 -http://securityreason.com/securityalert/1843 -http://securityreason.com/securityalert/1844 -http://securityreason.com/securityalert/1845 -http://securityreason.com/securityalert/1846 -http://securityreason.com/securityalert/1847 -http://securityreason.com/securityalert/1848 -http://securityreason.com/securityalert/1849 -http://securityreason.com/securityalert/185 -http://securityreason.com/securityalert/1850 -http://securityreason.com/securityalert/1851 -http://securityreason.com/securityalert/1852 -http://securityreason.com/securityalert/1853 -http://securityreason.com/securityalert/1854 -http://securityreason.com/securityalert/1855 -http://securityreason.com/securityalert/1856 -http://securityreason.com/securityalert/1857 -http://securityreason.com/securityalert/1858 -http://securityreason.com/securityalert/1859 -http://securityreason.com/securityalert/186 -http://securityreason.com/securityalert/1860 -http://securityreason.com/securityalert/1861 -http://securityreason.com/securityalert/1862 -http://securityreason.com/securityalert/1863 -http://securityreason.com/securityalert/1864 -http://securityreason.com/securityalert/1865 -http://securityreason.com/securityalert/1866 -http://securityreason.com/securityalert/1867 -http://securityreason.com/securityalert/1868 -http://securityreason.com/securityalert/1869 -http://securityreason.com/securityalert/187 -http://securityreason.com/securityalert/1870 -http://securityreason.com/securityalert/1871 -http://securityreason.com/securityalert/1872 -http://securityreason.com/securityalert/1873 -http://securityreason.com/securityalert/1874 -http://securityreason.com/securityalert/1875 -http://securityreason.com/securityalert/1876 -http://securityreason.com/securityalert/1877 -http://securityreason.com/securityalert/1878 -http://securityreason.com/securityalert/1879 -http://securityreason.com/securityalert/188 -http://securityreason.com/securityalert/1880 -http://securityreason.com/securityalert/1881 -http://securityreason.com/securityalert/1882 -http://securityreason.com/securityalert/1883 -http://securityreason.com/securityalert/1884 -http://securityreason.com/securityalert/1885 -http://securityreason.com/securityalert/1886 -http://securityreason.com/securityalert/1887 -http://securityreason.com/securityalert/1888 -http://securityreason.com/securityalert/1889 -http://securityreason.com/securityalert/189 -http://securityreason.com/securityalert/1890 -http://securityreason.com/securityalert/1891 -http://securityreason.com/securityalert/1892 -http://securityreason.com/securityalert/1893 -http://securityreason.com/securityalert/1894 -http://securityreason.com/securityalert/1895 -http://securityreason.com/securityalert/1896 -http://securityreason.com/securityalert/1897 -http://securityreason.com/securityalert/1898 -http://securityreason.com/securityalert/1899 -http://securityreason.com/securityalert/1912 -http://securityreason.com/securityalert/1935 -http://securityreason.com/securityalert/1960 -http://securityreason.com/securityalert/1961 -http://securityreason.com/securityalert/205 -http://securityreason.com/securityalert/2050 -http://securityreason.com/securityalert/2051 -http://securityreason.com/securityalert/2052 -http://securityreason.com/securityalert/2053 -http://securityreason.com/securityalert/2054 -http://securityreason.com/securityalert/2055 -http://securityreason.com/securityalert/2056 -http://securityreason.com/securityalert/2057 -http://securityreason.com/securityalert/2058 -http://securityreason.com/securityalert/2059 -http://securityreason.com/securityalert/21 -http://securityreason.com/securityalert/210 -http://securityreason.com/securityalert/2100 -http://securityreason.com/securityalert/2101 -http://securityreason.com/securityalert/2102 -http://securityreason.com/securityalert/2103 -http://securityreason.com/securityalert/2104 -http://securityreason.com/securityalert/2105 -http://securityreason.com/securityalert/2106 -http://securityreason.com/securityalert/2107 -http://securityreason.com/securityalert/2108 -http://securityreason.com/securityalert/2109 -http://securityreason.com/securityalert/211 -http://securityreason.com/securityalert/2110 -http://securityreason.com/securityalert/2111 -http://securityreason.com/securityalert/2112 -http://securityreason.com/securityalert/2113 -http://securityreason.com/securityalert/2114 -http://securityreason.com/securityalert/2115 -http://securityreason.com/securityalert/2116 -http://securityreason.com/securityalert/2117 -http://securityreason.com/securityalert/2118 -http://securityreason.com/securityalert/2119 -http://securityreason.com/securityalert/212 -http://securityreason.com/securityalert/2120 -http://securityreason.com/securityalert/2121 -http://securityreason.com/securityalert/2122 -http://securityreason.com/securityalert/2123 -http://securityreason.com/securityalert/2124 -http://securityreason.com/securityalert/2125 -http://securityreason.com/securityalert/2126 -http://securityreason.com/securityalert/2127 -http://securityreason.com/securityalert/2128 -http://securityreason.com/securityalert/2129 -http://securityreason.com/securityalert/213 -http://securityreason.com/securityalert/2131 -http://securityreason.com/securityalert/2132 -http://securityreason.com/securityalert/2133 -http://securityreason.com/securityalert/2134 -http://securityreason.com/securityalert/2135 -http://securityreason.com/securityalert/2136 -http://securityreason.com/securityalert/2137 -http://securityreason.com/securityalert/2138 -http://securityreason.com/securityalert/2139 -http://securityreason.com/securityalert/214 -http://securityreason.com/securityalert/2140 -http://securityreason.com/securityalert/2141 -http://securityreason.com/securityalert/2142 -http://securityreason.com/securityalert/2143 -http://securityreason.com/securityalert/2144 -http://securityreason.com/securityalert/2145 -http://securityreason.com/securityalert/2146 -http://securityreason.com/securityalert/2147 -http://securityreason.com/securityalert/2148 -http://securityreason.com/securityalert/2149 -http://securityreason.com/securityalert/215 -http://securityreason.com/securityalert/2150 -http://securityreason.com/securityalert/2151 -http://securityreason.com/securityalert/2152 -http://securityreason.com/securityalert/2153 -http://securityreason.com/securityalert/2154 -http://securityreason.com/securityalert/2155 -http://securityreason.com/securityalert/2156 -http://securityreason.com/securityalert/2157 -http://securityreason.com/securityalert/2158 -http://securityreason.com/securityalert/2159 -http://securityreason.com/securityalert/216 -http://securityreason.com/securityalert/2160 -http://securityreason.com/securityalert/2161 -http://securityreason.com/securityalert/2162 -http://securityreason.com/securityalert/2163 -http://securityreason.com/securityalert/2164 -http://securityreason.com/securityalert/2165 -http://securityreason.com/securityalert/2166 -http://securityreason.com/securityalert/2167 -http://securityreason.com/securityalert/2168 -http://securityreason.com/securityalert/2169 -http://securityreason.com/securityalert/217 -http://securityreason.com/securityalert/2170 -http://securityreason.com/securityalert/2171 -http://securityreason.com/securityalert/2172 -http://securityreason.com/securityalert/2173 -http://securityreason.com/securityalert/2174 -http://securityreason.com/securityalert/2175 -http://securityreason.com/securityalert/2176 -http://securityreason.com/securityalert/2177 -http://securityreason.com/securityalert/2178 -http://securityreason.com/securityalert/2179 -http://securityreason.com/securityalert/218 -http://securityreason.com/securityalert/2180 -http://securityreason.com/securityalert/2181 -http://securityreason.com/securityalert/2182 -http://securityreason.com/securityalert/2183 -http://securityreason.com/securityalert/2184 -http://securityreason.com/securityalert/2185 -http://securityreason.com/securityalert/2186 -http://securityreason.com/securityalert/2187 -http://securityreason.com/securityalert/2188 -http://securityreason.com/securityalert/2189 -http://securityreason.com/securityalert/2190 -http://securityreason.com/securityalert/2191 -http://securityreason.com/securityalert/2192 -http://securityreason.com/securityalert/2193 -http://securityreason.com/securityalert/2194 -http://securityreason.com/securityalert/2195 -http://securityreason.com/securityalert/2196 -http://securityreason.com/securityalert/2197 -http://securityreason.com/securityalert/2198 -http://securityreason.com/securityalert/2199 -http://securityreason.com/securityalert/2205 -http://securityreason.com/securityalert/2261 -http://securityreason.com/securityalert/2388 -http://securityreason.com/securityalert/2407 -http://securityreason.com/securityalert/2428 -http://securityreason.com/securityalert/2452 -http://securityreason.com/securityalert/248 -http://securityreason.com/securityalert/2480 -http://securityreason.com/securityalert/2481 -http://securityreason.com/securityalert/2482 -http://securityreason.com/securityalert/2483 -http://securityreason.com/securityalert/2484 -http://securityreason.com/securityalert/2485 -http://securityreason.com/securityalert/2486 -http://securityreason.com/securityalert/2487 -http://securityreason.com/securityalert/2488 -http://securityreason.com/securityalert/2489 -http://securityreason.com/securityalert/25 -http://securityreason.com/securityalert/250 -http://securityreason.com/securityalert/2508 -http://securityreason.com/securityalert/2509 -http://securityreason.com/securityalert/251 -http://securityreason.com/securityalert/2510 -http://securityreason.com/securityalert/2511 -http://securityreason.com/securityalert/2512 -http://securityreason.com/securityalert/2513 -http://securityreason.com/securityalert/2514 -http://securityreason.com/securityalert/2515 -http://securityreason.com/securityalert/2516 -http://securityreason.com/securityalert/2517 -http://securityreason.com/securityalert/2518 -http://securityreason.com/securityalert/252 -http://securityreason.com/securityalert/2520 -http://securityreason.com/securityalert/2522 -http://securityreason.com/securityalert/2523 -http://securityreason.com/securityalert/2524 -http://securityreason.com/securityalert/2525 -http://securityreason.com/securityalert/2526 -http://securityreason.com/securityalert/2527 -http://securityreason.com/securityalert/2528 -http://securityreason.com/securityalert/2529 -http://securityreason.com/securityalert/253 -http://securityreason.com/securityalert/2530 -http://securityreason.com/securityalert/2531 -http://securityreason.com/securityalert/2532 -http://securityreason.com/securityalert/2533 -http://securityreason.com/securityalert/2534 -http://securityreason.com/securityalert/2535 -http://securityreason.com/securityalert/2536 -http://securityreason.com/securityalert/2537 -http://securityreason.com/securityalert/2538 -http://securityreason.com/securityalert/2539 -http://securityreason.com/securityalert/254 -http://securityreason.com/securityalert/2540 -http://securityreason.com/securityalert/2541 -http://securityreason.com/securityalert/2542 -http://securityreason.com/securityalert/2543 -http://securityreason.com/securityalert/2544 -http://securityreason.com/securityalert/2545 -http://securityreason.com/securityalert/2546 -http://securityreason.com/securityalert/2547 -http://securityreason.com/securityalert/2548 -http://securityreason.com/securityalert/2549 -http://securityreason.com/securityalert/255 -http://securityreason.com/securityalert/2550 -http://securityreason.com/securityalert/2551 -http://securityreason.com/securityalert/2552 -http://securityreason.com/securityalert/2553 -http://securityreason.com/securityalert/2554 -http://securityreason.com/securityalert/2555 -http://securityreason.com/securityalert/2556 -http://securityreason.com/securityalert/2557 -http://securityreason.com/securityalert/2558 -http://securityreason.com/securityalert/2559 -http://securityreason.com/securityalert/256 -http://securityreason.com/securityalert/2560 -http://securityreason.com/securityalert/2561 -http://securityreason.com/securityalert/2562 -http://securityreason.com/securityalert/2563 -http://securityreason.com/securityalert/2564 -http://securityreason.com/securityalert/2565 -http://securityreason.com/securityalert/2566 -http://securityreason.com/securityalert/2567 -http://securityreason.com/securityalert/2568 -http://securityreason.com/securityalert/2569 -http://securityreason.com/securityalert/257 -http://securityreason.com/securityalert/2570 -http://securityreason.com/securityalert/2571 -http://securityreason.com/securityalert/2572 -http://securityreason.com/securityalert/2573 -http://securityreason.com/securityalert/2574 -http://securityreason.com/securityalert/2575 -http://securityreason.com/securityalert/2576 -http://securityreason.com/securityalert/2577 -http://securityreason.com/securityalert/2578 -http://securityreason.com/securityalert/2579 -http://securityreason.com/securityalert/258 -http://securityreason.com/securityalert/2580 -http://securityreason.com/securityalert/2581 -http://securityreason.com/securityalert/2582 -http://securityreason.com/securityalert/2583 -http://securityreason.com/securityalert/2584 -http://securityreason.com/securityalert/2585 -http://securityreason.com/securityalert/2586 -http://securityreason.com/securityalert/2587 -http://securityreason.com/securityalert/2588 -http://securityreason.com/securityalert/2589 -http://securityreason.com/securityalert/259 -http://securityreason.com/securityalert/2590 -http://securityreason.com/securityalert/2591 -http://securityreason.com/securityalert/2592 -http://securityreason.com/securityalert/2593 -http://securityreason.com/securityalert/2594 -http://securityreason.com/securityalert/2595 -http://securityreason.com/securityalert/2596 -http://securityreason.com/securityalert/2597 -http://securityreason.com/securityalert/2598 -http://securityreason.com/securityalert/2599 -http://securityreason.com/securityalert/26 -http://securityreason.com/securityalert/260 -http://securityreason.com/securityalert/2600 -http://securityreason.com/securityalert/2601 -http://securityreason.com/securityalert/2602 -http://securityreason.com/securityalert/2603 -http://securityreason.com/securityalert/2604 -http://securityreason.com/securityalert/2605 -http://securityreason.com/securityalert/2606 -http://securityreason.com/securityalert/2607 -http://securityreason.com/securityalert/2608 -http://securityreason.com/securityalert/2609 -http://securityreason.com/securityalert/261 -http://securityreason.com/securityalert/2610 -http://securityreason.com/securityalert/2611 -http://securityreason.com/securityalert/2612 -http://securityreason.com/securityalert/2613 -http://securityreason.com/securityalert/2614 -http://securityreason.com/securityalert/2615 -http://securityreason.com/securityalert/2616 -http://securityreason.com/securityalert/2617 -http://securityreason.com/securityalert/2618 -http://securityreason.com/securityalert/2619 -http://securityreason.com/securityalert/262 -http://securityreason.com/securityalert/2620 -http://securityreason.com/securityalert/2621 -http://securityreason.com/securityalert/2622 -http://securityreason.com/securityalert/2623 -http://securityreason.com/securityalert/2624 -http://securityreason.com/securityalert/2625 -http://securityreason.com/securityalert/2626 -http://securityreason.com/securityalert/2627 -http://securityreason.com/securityalert/2628 -http://securityreason.com/securityalert/2629 -http://securityreason.com/securityalert/263 -http://securityreason.com/securityalert/2630 -http://securityreason.com/securityalert/2631 -http://securityreason.com/securityalert/2632 -http://securityreason.com/securityalert/2633 -http://securityreason.com/securityalert/2634 -http://securityreason.com/securityalert/2635 -http://securityreason.com/securityalert/2636 -http://securityreason.com/securityalert/2637 -http://securityreason.com/securityalert/2638 -http://securityreason.com/securityalert/2639 -http://securityreason.com/securityalert/264 -http://securityreason.com/securityalert/2640 -http://securityreason.com/securityalert/2641 -http://securityreason.com/securityalert/2642 -http://securityreason.com/securityalert/2643 -http://securityreason.com/securityalert/2644 -http://securityreason.com/securityalert/2645 -http://securityreason.com/securityalert/2646 -http://securityreason.com/securityalert/2647 -http://securityreason.com/securityalert/2648 -http://securityreason.com/securityalert/2649 -http://securityreason.com/securityalert/265 -http://securityreason.com/securityalert/2650 -http://securityreason.com/securityalert/2651 -http://securityreason.com/securityalert/2652 -http://securityreason.com/securityalert/2653 -http://securityreason.com/securityalert/2654 -http://securityreason.com/securityalert/2655 -http://securityreason.com/securityalert/2656 -http://securityreason.com/securityalert/2657 -http://securityreason.com/securityalert/2658 -http://securityreason.com/securityalert/2659 -http://securityreason.com/securityalert/266 -http://securityreason.com/securityalert/2660 -http://securityreason.com/securityalert/2661 -http://securityreason.com/securityalert/2662 -http://securityreason.com/securityalert/2663 -http://securityreason.com/securityalert/2664 -http://securityreason.com/securityalert/2665 -http://securityreason.com/securityalert/2666 -http://securityreason.com/securityalert/2667 -http://securityreason.com/securityalert/2668 -http://securityreason.com/securityalert/2669 -http://securityreason.com/securityalert/267 -http://securityreason.com/securityalert/2670 -http://securityreason.com/securityalert/2671 -http://securityreason.com/securityalert/2672 -http://securityreason.com/securityalert/2673 -http://securityreason.com/securityalert/2674 -http://securityreason.com/securityalert/2675 -http://securityreason.com/securityalert/2676 -http://securityreason.com/securityalert/2677 -http://securityreason.com/securityalert/2678 -http://securityreason.com/securityalert/2679 -http://securityreason.com/securityalert/268 -http://securityreason.com/securityalert/2680 -http://securityreason.com/securityalert/2681 -http://securityreason.com/securityalert/2682 -http://securityreason.com/securityalert/2683 -http://securityreason.com/securityalert/2684 -http://securityreason.com/securityalert/2685 -http://securityreason.com/securityalert/2686 -http://securityreason.com/securityalert/2687 -http://securityreason.com/securityalert/2688 -http://securityreason.com/securityalert/2689 -http://securityreason.com/securityalert/269 -http://securityreason.com/securityalert/2690 -http://securityreason.com/securityalert/2691 -http://securityreason.com/securityalert/2692 -http://securityreason.com/securityalert/2693 -http://securityreason.com/securityalert/2694 -http://securityreason.com/securityalert/2695 -http://securityreason.com/securityalert/2696 -http://securityreason.com/securityalert/2697 -http://securityreason.com/securityalert/2698 -http://securityreason.com/securityalert/2699 -http://securityreason.com/securityalert/270 -http://securityreason.com/securityalert/2700 -http://securityreason.com/securityalert/2701 -http://securityreason.com/securityalert/2702 -http://securityreason.com/securityalert/2703 -http://securityreason.com/securityalert/2704 -http://securityreason.com/securityalert/2705 -http://securityreason.com/securityalert/2706 -http://securityreason.com/securityalert/2707 -http://securityreason.com/securityalert/2708 -http://securityreason.com/securityalert/2733 -http://securityreason.com/securityalert/2752 -http://securityreason.com/securityalert/2775 -http://securityreason.com/securityalert/2783 -http://securityreason.com/securityalert/2803 -http://securityreason.com/securityalert/2817 -http://securityreason.com/securityalert/2828 -http://securityreason.com/securityalert/2844 -http://securityreason.com/securityalert/288 -http://securityreason.com/securityalert/2880 -http://securityreason.com/securityalert/2881 -http://securityreason.com/securityalert/2882 -http://securityreason.com/securityalert/2883 -http://securityreason.com/securityalert/2886 -http://securityreason.com/securityalert/2887 -http://securityreason.com/securityalert/2888 -http://securityreason.com/securityalert/2889 -http://securityreason.com/securityalert/2923 -http://securityreason.com/securityalert/297 -http://securityreason.com/securityalert/2970 -http://securityreason.com/securityalert/2971 -http://securityreason.com/securityalert/2972 -http://securityreason.com/securityalert/2973 -http://securityreason.com/securityalert/2974 -http://securityreason.com/securityalert/2975 -http://securityreason.com/securityalert/2976 -http://securityreason.com/securityalert/2977 -http://securityreason.com/securityalert/2978 -http://securityreason.com/securityalert/2979 -http://securityreason.com/securityalert/298 -http://securityreason.com/securityalert/2980 -http://securityreason.com/securityalert/2981 -http://securityreason.com/securityalert/2982 -http://securityreason.com/securityalert/2983 -http://securityreason.com/securityalert/2984 -http://securityreason.com/securityalert/2985 -http://securityreason.com/securityalert/2986 -http://securityreason.com/securityalert/2987 -http://securityreason.com/securityalert/2988 -http://securityreason.com/securityalert/2989 -http://securityreason.com/securityalert/2998 -http://securityreason.com/securityalert/3002 -http://securityreason.com/securityalert/3018 -http://securityreason.com/securityalert/3024 -http://securityreason.com/securityalert/303 -http://securityreason.com/securityalert/3030 -http://securityreason.com/securityalert/3031 -http://securityreason.com/securityalert/3032 -http://securityreason.com/securityalert/3033 -http://securityreason.com/securityalert/3034 -http://securityreason.com/securityalert/3035 -http://securityreason.com/securityalert/3036 -http://securityreason.com/securityalert/3037 -http://securityreason.com/securityalert/3038 -http://securityreason.com/securityalert/3039 -http://securityreason.com/securityalert/3044 -http://securityreason.com/securityalert/305 -http://securityreason.com/securityalert/3050 -http://securityreason.com/securityalert/3051 -http://securityreason.com/securityalert/3052 -http://securityreason.com/securityalert/3053 -http://securityreason.com/securityalert/3054 -http://securityreason.com/securityalert/3055 -http://securityreason.com/securityalert/3056 -http://securityreason.com/securityalert/3057 -http://securityreason.com/securityalert/3058 -http://securityreason.com/securityalert/3059 -http://securityreason.com/securityalert/3060 -http://securityreason.com/securityalert/3067 -http://securityreason.com/securityalert/3104 -http://securityreason.com/securityalert/3109 -http://securityreason.com/securityalert/3140 -http://securityreason.com/securityalert/3143 -http://securityreason.com/securityalert/3178 -http://securityreason.com/securityalert/3181 -http://securityreason.com/securityalert/3182 -http://securityreason.com/securityalert/3197 -http://securityreason.com/securityalert/3234 -http://securityreason.com/securityalert/3342 -http://securityreason.com/securityalert/3364 -http://securityreason.com/securityalert/3370 -http://securityreason.com/securityalert/3373 -http://securityreason.com/securityalert/3402 -http://securityreason.com/securityalert/3421 -http://securityreason.com/securityalert/3442 -http://securityreason.com/securityalert/3443 -http://securityreason.com/securityalert/3455 -http://securityreason.com/securityalert/3473 -http://securityreason.com/securityalert/3495 -http://securityreason.com/securityalert/3502 -http://securityreason.com/securityalert/3517 -http://securityreason.com/securityalert/3530 -http://securityreason.com/securityalert/3531 -http://securityreason.com/securityalert/3542 -http://securityreason.com/securityalert/3547 -http://securityreason.com/securityalert/3550 -http://securityreason.com/securityalert/3555 -http://securityreason.com/securityalert/3559 -http://securityreason.com/securityalert/3564 -http://securityreason.com/securityalert/3588 -http://securityreason.com/securityalert/3600 -http://securityreason.com/securityalert/3609 -http://securityreason.com/securityalert/3619 -http://securityreason.com/securityalert/3697 -http://securityreason.com/securityalert/3724 -http://securityreason.com/securityalert/3753 -http://securityreason.com/securityalert/3769 -http://securityreason.com/securityalert/3810 -http://securityreason.com/securityalert/3876 -http://securityreason.com/securityalert/39 -http://securityreason.com/securityalert/390 -http://securityreason.com/securityalert/3900 -http://securityreason.com/securityalert/3901 -http://securityreason.com/securityalert/3902 -http://securityreason.com/securityalert/3903 -http://securityreason.com/securityalert/391 -http://securityreason.com/securityalert/392 -http://securityreason.com/securityalert/3922 -http://securityreason.com/securityalert/3923 -http://securityreason.com/securityalert/3924 -http://securityreason.com/securityalert/3925 -http://securityreason.com/securityalert/3926 -http://securityreason.com/securityalert/3927 -http://securityreason.com/securityalert/3928 -http://securityreason.com/securityalert/3929 -http://securityreason.com/securityalert/393 -http://securityreason.com/securityalert/3930 -http://securityreason.com/securityalert/3931 -http://securityreason.com/securityalert/3932 -http://securityreason.com/securityalert/3933 -http://securityreason.com/securityalert/3934 -http://securityreason.com/securityalert/3935 -http://securityreason.com/securityalert/3936 -http://securityreason.com/securityalert/3937 -http://securityreason.com/securityalert/3938 -http://securityreason.com/securityalert/3939 -http://securityreason.com/securityalert/394 -http://securityreason.com/securityalert/3940 -http://securityreason.com/securityalert/3941 -http://securityreason.com/securityalert/3942 -http://securityreason.com/securityalert/3943 -http://securityreason.com/securityalert/3944 -http://securityreason.com/securityalert/3945 -http://securityreason.com/securityalert/3946 -http://securityreason.com/securityalert/3947 -http://securityreason.com/securityalert/3948 -http://securityreason.com/securityalert/3949 -http://securityreason.com/securityalert/395 -http://securityreason.com/securityalert/3950 -http://securityreason.com/securityalert/3951 -http://securityreason.com/securityalert/3952 -http://securityreason.com/securityalert/3953 -http://securityreason.com/securityalert/3954 -http://securityreason.com/securityalert/3955 -http://securityreason.com/securityalert/3956 -http://securityreason.com/securityalert/3957 -http://securityreason.com/securityalert/3958 -http://securityreason.com/securityalert/3959 -http://securityreason.com/securityalert/396 -http://securityreason.com/securityalert/3960 -http://securityreason.com/securityalert/3961 -http://securityreason.com/securityalert/3962 -http://securityreason.com/securityalert/3963 -http://securityreason.com/securityalert/3964 -http://securityreason.com/securityalert/3965 -http://securityreason.com/securityalert/3966 -http://securityreason.com/securityalert/3967 -http://securityreason.com/securityalert/3968 -http://securityreason.com/securityalert/3969 -http://securityreason.com/securityalert/397 -http://securityreason.com/securityalert/3970 -http://securityreason.com/securityalert/3971 -http://securityreason.com/securityalert/3972 -http://securityreason.com/securityalert/3973 -http://securityreason.com/securityalert/3974 -http://securityreason.com/securityalert/3975 -http://securityreason.com/securityalert/3976 -http://securityreason.com/securityalert/3977 -http://securityreason.com/securityalert/3978 -http://securityreason.com/securityalert/3979 -http://securityreason.com/securityalert/398 -http://securityreason.com/securityalert/3980 -http://securityreason.com/securityalert/3981 -http://securityreason.com/securityalert/3982 -http://securityreason.com/securityalert/3983 -http://securityreason.com/securityalert/3984 -http://securityreason.com/securityalert/3985 -http://securityreason.com/securityalert/3986 -http://securityreason.com/securityalert/3987 -http://securityreason.com/securityalert/3988 -http://securityreason.com/securityalert/3989 -http://securityreason.com/securityalert/399 -http://securityreason.com/securityalert/3990 -http://securityreason.com/securityalert/3991 -http://securityreason.com/securityalert/3992 -http://securityreason.com/securityalert/3993 -http://securityreason.com/securityalert/3994 -http://securityreason.com/securityalert/3995 -http://securityreason.com/securityalert/3996 -http://securityreason.com/securityalert/3997 -http://securityreason.com/securityalert/3998 -http://securityreason.com/securityalert/3999 -http://securityreason.com/securityalert/4 -http://securityreason.com/securityalert/40 -http://securityreason.com/securityalert/400 -http://securityreason.com/securityalert/4000 -http://securityreason.com/securityalert/4001 -http://securityreason.com/securityalert/4002 -http://securityreason.com/securityalert/4003 -http://securityreason.com/securityalert/4004 -http://securityreason.com/securityalert/4005 -http://securityreason.com/securityalert/4006 -http://securityreason.com/securityalert/4007 -http://securityreason.com/securityalert/4008 -http://securityreason.com/securityalert/4009 -http://securityreason.com/securityalert/401 -http://securityreason.com/securityalert/4010 -http://securityreason.com/securityalert/4011 -http://securityreason.com/securityalert/4012 -http://securityreason.com/securityalert/4013 -http://securityreason.com/securityalert/4014 -http://securityreason.com/securityalert/4015 -http://securityreason.com/securityalert/4016 -http://securityreason.com/securityalert/4017 -http://securityreason.com/securityalert/4018 -http://securityreason.com/securityalert/4019 -http://securityreason.com/securityalert/402 -http://securityreason.com/securityalert/4020 -http://securityreason.com/securityalert/4021 -http://securityreason.com/securityalert/4022 -http://securityreason.com/securityalert/4023 -http://securityreason.com/securityalert/4024 -http://securityreason.com/securityalert/4025 -http://securityreason.com/securityalert/4026 -http://securityreason.com/securityalert/4027 -http://securityreason.com/securityalert/4028 -http://securityreason.com/securityalert/4029 -http://securityreason.com/securityalert/403 -http://securityreason.com/securityalert/4030 -http://securityreason.com/securityalert/4031 -http://securityreason.com/securityalert/4032 -http://securityreason.com/securityalert/4033 -http://securityreason.com/securityalert/4034 -http://securityreason.com/securityalert/4035 -http://securityreason.com/securityalert/4036 -http://securityreason.com/securityalert/4037 -http://securityreason.com/securityalert/4038 -http://securityreason.com/securityalert/4039 -http://securityreason.com/securityalert/404 -http://securityreason.com/securityalert/4040 -http://securityreason.com/securityalert/4041 -http://securityreason.com/securityalert/4042 -http://securityreason.com/securityalert/4043 -http://securityreason.com/securityalert/4044 -http://securityreason.com/securityalert/4045 -http://securityreason.com/securityalert/4046 -http://securityreason.com/securityalert/4047 -http://securityreason.com/securityalert/4048 -http://securityreason.com/securityalert/4049 -http://securityreason.com/securityalert/405 -http://securityreason.com/securityalert/4050 -http://securityreason.com/securityalert/4051 -http://securityreason.com/securityalert/4052 -http://securityreason.com/securityalert/4053 -http://securityreason.com/securityalert/4054 -http://securityreason.com/securityalert/4055 -http://securityreason.com/securityalert/4056 -http://securityreason.com/securityalert/4057 -http://securityreason.com/securityalert/4058 -http://securityreason.com/securityalert/4059 -http://securityreason.com/securityalert/406 -http://securityreason.com/securityalert/4060 -http://securityreason.com/securityalert/4061 -http://securityreason.com/securityalert/4062 -http://securityreason.com/securityalert/4063 -http://securityreason.com/securityalert/4064 -http://securityreason.com/securityalert/4065 -http://securityreason.com/securityalert/4066 -http://securityreason.com/securityalert/4067 -http://securityreason.com/securityalert/4068 -http://securityreason.com/securityalert/4069 -http://securityreason.com/securityalert/407 -http://securityreason.com/securityalert/4070 -http://securityreason.com/securityalert/4071 -http://securityreason.com/securityalert/4072 -http://securityreason.com/securityalert/4073 -http://securityreason.com/securityalert/4074 -http://securityreason.com/securityalert/4075 -http://securityreason.com/securityalert/4076 -http://securityreason.com/securityalert/4077 -http://securityreason.com/securityalert/4078 -http://securityreason.com/securityalert/4079 -http://securityreason.com/securityalert/408 -http://securityreason.com/securityalert/4080 -http://securityreason.com/securityalert/4081 -http://securityreason.com/securityalert/4082 -http://securityreason.com/securityalert/4083 -http://securityreason.com/securityalert/4084 -http://securityreason.com/securityalert/4085 -http://securityreason.com/securityalert/4086 -http://securityreason.com/securityalert/4087 -http://securityreason.com/securityalert/4088 -http://securityreason.com/securityalert/4089 -http://securityreason.com/securityalert/409 -http://securityreason.com/securityalert/4090 -http://securityreason.com/securityalert/4091 -http://securityreason.com/securityalert/4092 -http://securityreason.com/securityalert/4093 -http://securityreason.com/securityalert/4094 -http://securityreason.com/securityalert/4095 -http://securityreason.com/securityalert/4096 -http://securityreason.com/securityalert/4097 -http://securityreason.com/securityalert/4098 -http://securityreason.com/securityalert/4099 -http://securityreason.com/securityalert/41 -http://securityreason.com/securityalert/410 -http://securityreason.com/securityalert/4100 -http://securityreason.com/securityalert/4101 -http://securityreason.com/securityalert/4102 -http://securityreason.com/securityalert/4103 -http://securityreason.com/securityalert/4104 -http://securityreason.com/securityalert/4105 -http://securityreason.com/securityalert/4106 -http://securityreason.com/securityalert/4107 -http://securityreason.com/securityalert/4108 -http://securityreason.com/securityalert/4109 -http://securityreason.com/securityalert/411 -http://securityreason.com/securityalert/4110 -http://securityreason.com/securityalert/4111 -http://securityreason.com/securityalert/4112 -http://securityreason.com/securityalert/4113 -http://securityreason.com/securityalert/4114 -http://securityreason.com/securityalert/4115 -http://securityreason.com/securityalert/4116 -http://securityreason.com/securityalert/4117 -http://securityreason.com/securityalert/4118 -http://securityreason.com/securityalert/4119 -http://securityreason.com/securityalert/412 -http://securityreason.com/securityalert/4120 -http://securityreason.com/securityalert/4121 -http://securityreason.com/securityalert/4122 -http://securityreason.com/securityalert/4123 -http://securityreason.com/securityalert/4124 -http://securityreason.com/securityalert/4125 -http://securityreason.com/securityalert/4126 -http://securityreason.com/securityalert/4127 -http://securityreason.com/securityalert/4128 -http://securityreason.com/securityalert/4129 -http://securityreason.com/securityalert/413 -http://securityreason.com/securityalert/4130 -http://securityreason.com/securityalert/4131 -http://securityreason.com/securityalert/4132 -http://securityreason.com/securityalert/4133 -http://securityreason.com/securityalert/4134 -http://securityreason.com/securityalert/4135 -http://securityreason.com/securityalert/4136 -http://securityreason.com/securityalert/4137 -http://securityreason.com/securityalert/4138 -http://securityreason.com/securityalert/4139 -http://securityreason.com/securityalert/414 -http://securityreason.com/securityalert/4140 -http://securityreason.com/securityalert/4141 -http://securityreason.com/securityalert/4142 -http://securityreason.com/securityalert/4143 -http://securityreason.com/securityalert/4144 -http://securityreason.com/securityalert/4145 -http://securityreason.com/securityalert/4146 -http://securityreason.com/securityalert/4147 -http://securityreason.com/securityalert/4148 -http://securityreason.com/securityalert/4149 -http://securityreason.com/securityalert/415 -http://securityreason.com/securityalert/4150 -http://securityreason.com/securityalert/4151 -http://securityreason.com/securityalert/4152 -http://securityreason.com/securityalert/4153 -http://securityreason.com/securityalert/4154 -http://securityreason.com/securityalert/4155 -http://securityreason.com/securityalert/4156 -http://securityreason.com/securityalert/4157 -http://securityreason.com/securityalert/4158 -http://securityreason.com/securityalert/4159 -http://securityreason.com/securityalert/416 -http://securityreason.com/securityalert/4160 -http://securityreason.com/securityalert/4161 -http://securityreason.com/securityalert/4162 -http://securityreason.com/securityalert/4163 -http://securityreason.com/securityalert/4164 -http://securityreason.com/securityalert/4165 -http://securityreason.com/securityalert/4166 -http://securityreason.com/securityalert/4167 -http://securityreason.com/securityalert/4168 -http://securityreason.com/securityalert/4169 -http://securityreason.com/securityalert/4170 -http://securityreason.com/securityalert/4171 -http://securityreason.com/securityalert/4172 -http://securityreason.com/securityalert/4173 -http://securityreason.com/securityalert/4174 -http://securityreason.com/securityalert/4175 -http://securityreason.com/securityalert/4176 -http://securityreason.com/securityalert/4177 -http://securityreason.com/securityalert/4178 -http://securityreason.com/securityalert/4179 -http://securityreason.com/securityalert/418 -http://securityreason.com/securityalert/4180 -http://securityreason.com/securityalert/4181 -http://securityreason.com/securityalert/4182 -http://securityreason.com/securityalert/4183 -http://securityreason.com/securityalert/4184 -http://securityreason.com/securityalert/4185 -http://securityreason.com/securityalert/4186 -http://securityreason.com/securityalert/4187 -http://securityreason.com/securityalert/4188 -http://securityreason.com/securityalert/4189 -http://securityreason.com/securityalert/419 -http://securityreason.com/securityalert/4190 -http://securityreason.com/securityalert/4191 -http://securityreason.com/securityalert/4192 -http://securityreason.com/securityalert/4193 -http://securityreason.com/securityalert/4195 -http://securityreason.com/securityalert/4196 -http://securityreason.com/securityalert/4197 -http://securityreason.com/securityalert/4198 -http://securityreason.com/securityalert/4199 -http://securityreason.com/securityalert/42 -http://securityreason.com/securityalert/420 -http://securityreason.com/securityalert/4200 -http://securityreason.com/securityalert/4201 -http://securityreason.com/securityalert/4202 -http://securityreason.com/securityalert/4203 -http://securityreason.com/securityalert/4204 -http://securityreason.com/securityalert/4205 -http://securityreason.com/securityalert/4206 -http://securityreason.com/securityalert/4207 -http://securityreason.com/securityalert/4208 -http://securityreason.com/securityalert/4209 -http://securityreason.com/securityalert/421 -http://securityreason.com/securityalert/4210 -http://securityreason.com/securityalert/4211 -http://securityreason.com/securityalert/4212 -http://securityreason.com/securityalert/4213 -http://securityreason.com/securityalert/4214 -http://securityreason.com/securityalert/4215 -http://securityreason.com/securityalert/4216 -http://securityreason.com/securityalert/4217 -http://securityreason.com/securityalert/4218 -http://securityreason.com/securityalert/4219 -http://securityreason.com/securityalert/422 -http://securityreason.com/securityalert/4220 -http://securityreason.com/securityalert/4221 -http://securityreason.com/securityalert/4222 -http://securityreason.com/securityalert/4223 -http://securityreason.com/securityalert/4224 -http://securityreason.com/securityalert/4225 -http://securityreason.com/securityalert/4226 -http://securityreason.com/securityalert/4227 -http://securityreason.com/securityalert/4228 -http://securityreason.com/securityalert/4229 -http://securityreason.com/securityalert/423 -http://securityreason.com/securityalert/4230 -http://securityreason.com/securityalert/4231 -http://securityreason.com/securityalert/4232 -http://securityreason.com/securityalert/4233 -http://securityreason.com/securityalert/4234 -http://securityreason.com/securityalert/4235 -http://securityreason.com/securityalert/4236 -http://securityreason.com/securityalert/4237 -http://securityreason.com/securityalert/4238 -http://securityreason.com/securityalert/4239 -http://securityreason.com/securityalert/424 -http://securityreason.com/securityalert/4240 -http://securityreason.com/securityalert/4241 -http://securityreason.com/securityalert/4242 -http://securityreason.com/securityalert/4243 -http://securityreason.com/securityalert/4244 -http://securityreason.com/securityalert/4245 -http://securityreason.com/securityalert/4246 -http://securityreason.com/securityalert/4247 -http://securityreason.com/securityalert/4248 -http://securityreason.com/securityalert/4249 -http://securityreason.com/securityalert/425 -http://securityreason.com/securityalert/4250 -http://securityreason.com/securityalert/4251 -http://securityreason.com/securityalert/4252 -http://securityreason.com/securityalert/4253 -http://securityreason.com/securityalert/4254 -http://securityreason.com/securityalert/4255 -http://securityreason.com/securityalert/4256 -http://securityreason.com/securityalert/4257 -http://securityreason.com/securityalert/4258 -http://securityreason.com/securityalert/4259 -http://securityreason.com/securityalert/426 -http://securityreason.com/securityalert/4260 -http://securityreason.com/securityalert/4261 -http://securityreason.com/securityalert/4262 -http://securityreason.com/securityalert/4263 -http://securityreason.com/securityalert/4264 -http://securityreason.com/securityalert/4265 -http://securityreason.com/securityalert/4266 -http://securityreason.com/securityalert/4267 -http://securityreason.com/securityalert/4268 -http://securityreason.com/securityalert/4269 -http://securityreason.com/securityalert/427 -http://securityreason.com/securityalert/4270 -http://securityreason.com/securityalert/4271 -http://securityreason.com/securityalert/4272 -http://securityreason.com/securityalert/4273 -http://securityreason.com/securityalert/4274 -http://securityreason.com/securityalert/4275 -http://securityreason.com/securityalert/4276 -http://securityreason.com/securityalert/4277 -http://securityreason.com/securityalert/4278 -http://securityreason.com/securityalert/4279 -http://securityreason.com/securityalert/428 -http://securityreason.com/securityalert/4280 -http://securityreason.com/securityalert/4281 -http://securityreason.com/securityalert/4282 -http://securityreason.com/securityalert/4283 -http://securityreason.com/securityalert/4284 -http://securityreason.com/securityalert/4285 -http://securityreason.com/securityalert/4286 -http://securityreason.com/securityalert/4287 -http://securityreason.com/securityalert/4288 -http://securityreason.com/securityalert/4289 -http://securityreason.com/securityalert/429 -http://securityreason.com/securityalert/4290 -http://securityreason.com/securityalert/4291 -http://securityreason.com/securityalert/4292 -http://securityreason.com/securityalert/4293 -http://securityreason.com/securityalert/4294 -http://securityreason.com/securityalert/4295 -http://securityreason.com/securityalert/4296 -http://securityreason.com/securityalert/4297 -http://securityreason.com/securityalert/4298 -http://securityreason.com/securityalert/4299 -http://securityreason.com/securityalert/43 -http://securityreason.com/securityalert/430 -http://securityreason.com/securityalert/4300 -http://securityreason.com/securityalert/4301 -http://securityreason.com/securityalert/4302 -http://securityreason.com/securityalert/4303 -http://securityreason.com/securityalert/4304 -http://securityreason.com/securityalert/4305 -http://securityreason.com/securityalert/4306 -http://securityreason.com/securityalert/4307 -http://securityreason.com/securityalert/4308 -http://securityreason.com/securityalert/4309 -http://securityreason.com/securityalert/431 -http://securityreason.com/securityalert/4310 -http://securityreason.com/securityalert/4311 -http://securityreason.com/securityalert/4312 -http://securityreason.com/securityalert/4313 -http://securityreason.com/securityalert/4314 -http://securityreason.com/securityalert/4315 -http://securityreason.com/securityalert/4316 -http://securityreason.com/securityalert/4317 -http://securityreason.com/securityalert/4318 -http://securityreason.com/securityalert/4319 -http://securityreason.com/securityalert/432 -http://securityreason.com/securityalert/4320 -http://securityreason.com/securityalert/4321 -http://securityreason.com/securityalert/4322 -http://securityreason.com/securityalert/4323 -http://securityreason.com/securityalert/4324 -http://securityreason.com/securityalert/4325 -http://securityreason.com/securityalert/4326 -http://securityreason.com/securityalert/4327 -http://securityreason.com/securityalert/4328 -http://securityreason.com/securityalert/4329 -http://securityreason.com/securityalert/4330 -http://securityreason.com/securityalert/4331 -http://securityreason.com/securityalert/4332 -http://securityreason.com/securityalert/4333 -http://securityreason.com/securityalert/4334 -http://securityreason.com/securityalert/4335 -http://securityreason.com/securityalert/4336 -http://securityreason.com/securityalert/4337 -http://securityreason.com/securityalert/4338 -http://securityreason.com/securityalert/4339 -http://securityreason.com/securityalert/434 -http://securityreason.com/securityalert/4340 -http://securityreason.com/securityalert/4341 -http://securityreason.com/securityalert/4342 -http://securityreason.com/securityalert/4343 -http://securityreason.com/securityalert/4344 -http://securityreason.com/securityalert/4345 -http://securityreason.com/securityalert/4346 -http://securityreason.com/securityalert/4347 -http://securityreason.com/securityalert/4348 -http://securityreason.com/securityalert/4349 -http://securityreason.com/securityalert/435 -http://securityreason.com/securityalert/4350 -http://securityreason.com/securityalert/4351 -http://securityreason.com/securityalert/4352 -http://securityreason.com/securityalert/4353 -http://securityreason.com/securityalert/4354 -http://securityreason.com/securityalert/4355 -http://securityreason.com/securityalert/4356 -http://securityreason.com/securityalert/4357 -http://securityreason.com/securityalert/4358 -http://securityreason.com/securityalert/4359 -http://securityreason.com/securityalert/4360 -http://securityreason.com/securityalert/4361 -http://securityreason.com/securityalert/4362 -http://securityreason.com/securityalert/4363 -http://securityreason.com/securityalert/4364 -http://securityreason.com/securityalert/4365 -http://securityreason.com/securityalert/4366 -http://securityreason.com/securityalert/4367 -http://securityreason.com/securityalert/4368 -http://securityreason.com/securityalert/4369 -http://securityreason.com/securityalert/4370 -http://securityreason.com/securityalert/4371 -http://securityreason.com/securityalert/4372 -http://securityreason.com/securityalert/4373 -http://securityreason.com/securityalert/4374 -http://securityreason.com/securityalert/4375 -http://securityreason.com/securityalert/4376 -http://securityreason.com/securityalert/4377 -http://securityreason.com/securityalert/4378 -http://securityreason.com/securityalert/4379 -http://securityreason.com/securityalert/438 -http://securityreason.com/securityalert/4380 -http://securityreason.com/securityalert/4381 -http://securityreason.com/securityalert/4382 -http://securityreason.com/securityalert/4383 -http://securityreason.com/securityalert/4384 -http://securityreason.com/securityalert/4385 -http://securityreason.com/securityalert/4386 -http://securityreason.com/securityalert/4387 -http://securityreason.com/securityalert/4388 -http://securityreason.com/securityalert/4389 -http://securityreason.com/securityalert/439 -http://securityreason.com/securityalert/4390 -http://securityreason.com/securityalert/4391 -http://securityreason.com/securityalert/4392 -http://securityreason.com/securityalert/4393 -http://securityreason.com/securityalert/4394 -http://securityreason.com/securityalert/4395 -http://securityreason.com/securityalert/4396 -http://securityreason.com/securityalert/4397 -http://securityreason.com/securityalert/4398 -http://securityreason.com/securityalert/4399 -http://securityreason.com/securityalert/44 -http://securityreason.com/securityalert/440 -http://securityreason.com/securityalert/4400 -http://securityreason.com/securityalert/4401 -http://securityreason.com/securityalert/4402 -http://securityreason.com/securityalert/4403 -http://securityreason.com/securityalert/4404 -http://securityreason.com/securityalert/4405 -http://securityreason.com/securityalert/4406 -http://securityreason.com/securityalert/4407 -http://securityreason.com/securityalert/4408 -http://securityreason.com/securityalert/4409 -http://securityreason.com/securityalert/441 -http://securityreason.com/securityalert/4410 -http://securityreason.com/securityalert/4411 -http://securityreason.com/securityalert/4412 -http://securityreason.com/securityalert/4413 -http://securityreason.com/securityalert/4414 -http://securityreason.com/securityalert/4415 -http://securityreason.com/securityalert/4416 -http://securityreason.com/securityalert/4417 -http://securityreason.com/securityalert/4418 -http://securityreason.com/securityalert/4419 -http://securityreason.com/securityalert/442 -http://securityreason.com/securityalert/4420 -http://securityreason.com/securityalert/4421 -http://securityreason.com/securityalert/4422 -http://securityreason.com/securityalert/4423 -http://securityreason.com/securityalert/4424 -http://securityreason.com/securityalert/4425 -http://securityreason.com/securityalert/4426 -http://securityreason.com/securityalert/4427 -http://securityreason.com/securityalert/4428 -http://securityreason.com/securityalert/4429 -http://securityreason.com/securityalert/443 -http://securityreason.com/securityalert/4430 -http://securityreason.com/securityalert/4431 -http://securityreason.com/securityalert/4432 -http://securityreason.com/securityalert/4433 -http://securityreason.com/securityalert/4434 -http://securityreason.com/securityalert/4435 -http://securityreason.com/securityalert/4436 -http://securityreason.com/securityalert/4437 -http://securityreason.com/securityalert/4438 -http://securityreason.com/securityalert/4439 -http://securityreason.com/securityalert/444 -http://securityreason.com/securityalert/4440 -http://securityreason.com/securityalert/4441 -http://securityreason.com/securityalert/4442 -http://securityreason.com/securityalert/4443 -http://securityreason.com/securityalert/4444 -http://securityreason.com/securityalert/4445 -http://securityreason.com/securityalert/4446 -http://securityreason.com/securityalert/4447 -http://securityreason.com/securityalert/4448 -http://securityreason.com/securityalert/4449 -http://securityreason.com/securityalert/445 -http://securityreason.com/securityalert/4450 -http://securityreason.com/securityalert/4451 -http://securityreason.com/securityalert/4452 -http://securityreason.com/securityalert/4453 -http://securityreason.com/securityalert/4454 -http://securityreason.com/securityalert/4455 -http://securityreason.com/securityalert/4456 -http://securityreason.com/securityalert/4457 -http://securityreason.com/securityalert/4458 -http://securityreason.com/securityalert/4459 -http://securityreason.com/securityalert/446 -http://securityreason.com/securityalert/4460 -http://securityreason.com/securityalert/4461 -http://securityreason.com/securityalert/4462 -http://securityreason.com/securityalert/4463 -http://securityreason.com/securityalert/4464 -http://securityreason.com/securityalert/4465 -http://securityreason.com/securityalert/4466 -http://securityreason.com/securityalert/4467 -http://securityreason.com/securityalert/4468 -http://securityreason.com/securityalert/4469 -http://securityreason.com/securityalert/447 -http://securityreason.com/securityalert/4470 -http://securityreason.com/securityalert/4471 -http://securityreason.com/securityalert/4472 -http://securityreason.com/securityalert/4473 -http://securityreason.com/securityalert/4474 -http://securityreason.com/securityalert/4475 -http://securityreason.com/securityalert/4476 -http://securityreason.com/securityalert/4477 -http://securityreason.com/securityalert/4478 -http://securityreason.com/securityalert/4479 -http://securityreason.com/securityalert/448 -http://securityreason.com/securityalert/4480 -http://securityreason.com/securityalert/4481 -http://securityreason.com/securityalert/4482 -http://securityreason.com/securityalert/4483 -http://securityreason.com/securityalert/4484 -http://securityreason.com/securityalert/4485 -http://securityreason.com/securityalert/4486 -http://securityreason.com/securityalert/4487 -http://securityreason.com/securityalert/4488 -http://securityreason.com/securityalert/4489 -http://securityreason.com/securityalert/449 -http://securityreason.com/securityalert/4492 -http://securityreason.com/securityalert/4493 -http://securityreason.com/securityalert/4494 -http://securityreason.com/securityalert/4495 -http://securityreason.com/securityalert/4496 -http://securityreason.com/securityalert/4497 -http://securityreason.com/securityalert/4498 -http://securityreason.com/securityalert/4499 -http://securityreason.com/securityalert/45 -http://securityreason.com/securityalert/450 -http://securityreason.com/securityalert/4500 -http://securityreason.com/securityalert/4501 -http://securityreason.com/securityalert/4502 -http://securityreason.com/securityalert/4503 -http://securityreason.com/securityalert/4504 -http://securityreason.com/securityalert/4505 -http://securityreason.com/securityalert/4506 -http://securityreason.com/securityalert/4507 -http://securityreason.com/securityalert/4508 -http://securityreason.com/securityalert/4509 -http://securityreason.com/securityalert/451 -http://securityreason.com/securityalert/4510 -http://securityreason.com/securityalert/4511 -http://securityreason.com/securityalert/4512 -http://securityreason.com/securityalert/4513 -http://securityreason.com/securityalert/4514 -http://securityreason.com/securityalert/4515 -http://securityreason.com/securityalert/4516 -http://securityreason.com/securityalert/4517 -http://securityreason.com/securityalert/4518 -http://securityreason.com/securityalert/4519 -http://securityreason.com/securityalert/452 -http://securityreason.com/securityalert/4520 -http://securityreason.com/securityalert/4521 -http://securityreason.com/securityalert/4522 -http://securityreason.com/securityalert/4523 -http://securityreason.com/securityalert/4524 -http://securityreason.com/securityalert/4525 -http://securityreason.com/securityalert/4526 -http://securityreason.com/securityalert/4527 -http://securityreason.com/securityalert/4528 -http://securityreason.com/securityalert/4529 -http://securityreason.com/securityalert/453 -http://securityreason.com/securityalert/4530 -http://securityreason.com/securityalert/4531 -http://securityreason.com/securityalert/4532 -http://securityreason.com/securityalert/4533 -http://securityreason.com/securityalert/4534 -http://securityreason.com/securityalert/4535 -http://securityreason.com/securityalert/4536 -http://securityreason.com/securityalert/4537 -http://securityreason.com/securityalert/4538 -http://securityreason.com/securityalert/4539 -http://securityreason.com/securityalert/454 -http://securityreason.com/securityalert/4540 -http://securityreason.com/securityalert/4541 -http://securityreason.com/securityalert/4542 -http://securityreason.com/securityalert/4543 -http://securityreason.com/securityalert/4544 -http://securityreason.com/securityalert/4545 -http://securityreason.com/securityalert/4546 -http://securityreason.com/securityalert/4547 -http://securityreason.com/securityalert/4548 -http://securityreason.com/securityalert/4549 -http://securityreason.com/securityalert/455 -http://securityreason.com/securityalert/4550 -http://securityreason.com/securityalert/4551 -http://securityreason.com/securityalert/4552 -http://securityreason.com/securityalert/4553 -http://securityreason.com/securityalert/4554 -http://securityreason.com/securityalert/4555 -http://securityreason.com/securityalert/4556 -http://securityreason.com/securityalert/4558 -http://securityreason.com/securityalert/4559 -http://securityreason.com/securityalert/456 -http://securityreason.com/securityalert/4560 -http://securityreason.com/securityalert/4561 -http://securityreason.com/securityalert/4562 -http://securityreason.com/securityalert/4563 -http://securityreason.com/securityalert/4564 -http://securityreason.com/securityalert/4565 -http://securityreason.com/securityalert/4566 -http://securityreason.com/securityalert/4567 -http://securityreason.com/securityalert/4568 -http://securityreason.com/securityalert/4569 -http://securityreason.com/securityalert/4570 -http://securityreason.com/securityalert/4571 -http://securityreason.com/securityalert/4572 -http://securityreason.com/securityalert/4573 -http://securityreason.com/securityalert/4574 -http://securityreason.com/securityalert/4575 -http://securityreason.com/securityalert/4576 -http://securityreason.com/securityalert/4577 -http://securityreason.com/securityalert/4578 -http://securityreason.com/securityalert/4579 -http://securityreason.com/securityalert/4580 -http://securityreason.com/securityalert/4581 -http://securityreason.com/securityalert/4582 -http://securityreason.com/securityalert/4583 -http://securityreason.com/securityalert/4584 -http://securityreason.com/securityalert/4585 -http://securityreason.com/securityalert/4586 -http://securityreason.com/securityalert/4587 -http://securityreason.com/securityalert/4588 -http://securityreason.com/securityalert/4589 -http://securityreason.com/securityalert/459 -http://securityreason.com/securityalert/4590 -http://securityreason.com/securityalert/4591 -http://securityreason.com/securityalert/4592 -http://securityreason.com/securityalert/4593 -http://securityreason.com/securityalert/4594 -http://securityreason.com/securityalert/4595 -http://securityreason.com/securityalert/4596 -http://securityreason.com/securityalert/4597 -http://securityreason.com/securityalert/4598 -http://securityreason.com/securityalert/4599 -http://securityreason.com/securityalert/46 -http://securityreason.com/securityalert/460 -http://securityreason.com/securityalert/4600 -http://securityreason.com/securityalert/4601 -http://securityreason.com/securityalert/4602 -http://securityreason.com/securityalert/4603 -http://securityreason.com/securityalert/4604 -http://securityreason.com/securityalert/4605 -http://securityreason.com/securityalert/4606 -http://securityreason.com/securityalert/4607 -http://securityreason.com/securityalert/4608 -http://securityreason.com/securityalert/4609 -http://securityreason.com/securityalert/461 -http://securityreason.com/securityalert/4610 -http://securityreason.com/securityalert/4612 -http://securityreason.com/securityalert/4613 -http://securityreason.com/securityalert/4614 -http://securityreason.com/securityalert/4615 -http://securityreason.com/securityalert/4616 -http://securityreason.com/securityalert/4617 -http://securityreason.com/securityalert/4618 -http://securityreason.com/securityalert/4619 -http://securityreason.com/securityalert/462 -http://securityreason.com/securityalert/4620 -http://securityreason.com/securityalert/4621 -http://securityreason.com/securityalert/4622 -http://securityreason.com/securityalert/4623 -http://securityreason.com/securityalert/4624 -http://securityreason.com/securityalert/4625 -http://securityreason.com/securityalert/4626 -http://securityreason.com/securityalert/4627 -http://securityreason.com/securityalert/4628 -http://securityreason.com/securityalert/4629 -http://securityreason.com/securityalert/463 -http://securityreason.com/securityalert/4630 -http://securityreason.com/securityalert/4631 -http://securityreason.com/securityalert/4632 -http://securityreason.com/securityalert/4633 -http://securityreason.com/securityalert/4634 -http://securityreason.com/securityalert/4635 -http://securityreason.com/securityalert/4636 -http://securityreason.com/securityalert/4637 -http://securityreason.com/securityalert/4638 -http://securityreason.com/securityalert/4639 -http://securityreason.com/securityalert/464 -http://securityreason.com/securityalert/4640 -http://securityreason.com/securityalert/4641 -http://securityreason.com/securityalert/4642 -http://securityreason.com/securityalert/4643 -http://securityreason.com/securityalert/4644 -http://securityreason.com/securityalert/4645 -http://securityreason.com/securityalert/4646 -http://securityreason.com/securityalert/4647 -http://securityreason.com/securityalert/4648 -http://securityreason.com/securityalert/465 -http://securityreason.com/securityalert/4651 -http://securityreason.com/securityalert/4652 -http://securityreason.com/securityalert/4653 -http://securityreason.com/securityalert/4654 -http://securityreason.com/securityalert/4655 -http://securityreason.com/securityalert/4656 -http://securityreason.com/securityalert/4657 -http://securityreason.com/securityalert/4658 -http://securityreason.com/securityalert/4659 -http://securityreason.com/securityalert/466 -http://securityreason.com/securityalert/4660 -http://securityreason.com/securityalert/4662 -http://securityreason.com/securityalert/4663 -http://securityreason.com/securityalert/4664 -http://securityreason.com/securityalert/4665 -http://securityreason.com/securityalert/4666 -http://securityreason.com/securityalert/4667 -http://securityreason.com/securityalert/4668 -http://securityreason.com/securityalert/4669 -http://securityreason.com/securityalert/467 -http://securityreason.com/securityalert/4670 -http://securityreason.com/securityalert/4671 -http://securityreason.com/securityalert/4672 -http://securityreason.com/securityalert/4673 -http://securityreason.com/securityalert/4674 -http://securityreason.com/securityalert/4675 -http://securityreason.com/securityalert/4676 -http://securityreason.com/securityalert/4677 -http://securityreason.com/securityalert/4678 -http://securityreason.com/securityalert/4679 -http://securityreason.com/securityalert/468 -http://securityreason.com/securityalert/4680 -http://securityreason.com/securityalert/4681 -http://securityreason.com/securityalert/4682 -http://securityreason.com/securityalert/4683 -http://securityreason.com/securityalert/4686 -http://securityreason.com/securityalert/4687 -http://securityreason.com/securityalert/4688 -http://securityreason.com/securityalert/4689 -http://securityreason.com/securityalert/469 -http://securityreason.com/securityalert/4690 -http://securityreason.com/securityalert/4691 -http://securityreason.com/securityalert/4692 -http://securityreason.com/securityalert/4693 -http://securityreason.com/securityalert/4694 -http://securityreason.com/securityalert/4695 -http://securityreason.com/securityalert/4696 -http://securityreason.com/securityalert/4697 -http://securityreason.com/securityalert/4698 -http://securityreason.com/securityalert/4699 -http://securityreason.com/securityalert/47 -http://securityreason.com/securityalert/470 -http://securityreason.com/securityalert/4700 -http://securityreason.com/securityalert/4701 -http://securityreason.com/securityalert/4702 -http://securityreason.com/securityalert/4703 -http://securityreason.com/securityalert/4704 -http://securityreason.com/securityalert/4705 -http://securityreason.com/securityalert/4706 -http://securityreason.com/securityalert/4707 -http://securityreason.com/securityalert/4708 -http://securityreason.com/securityalert/4709 -http://securityreason.com/securityalert/471 -http://securityreason.com/securityalert/4710 -http://securityreason.com/securityalert/4711 -http://securityreason.com/securityalert/4712 -http://securityreason.com/securityalert/4713 -http://securityreason.com/securityalert/4714 -http://securityreason.com/securityalert/4715 -http://securityreason.com/securityalert/4716 -http://securityreason.com/securityalert/4717 -http://securityreason.com/securityalert/4718 -http://securityreason.com/securityalert/4719 -http://securityreason.com/securityalert/472 -http://securityreason.com/securityalert/4720 -http://securityreason.com/securityalert/4721 -http://securityreason.com/securityalert/4722 -http://securityreason.com/securityalert/4723 -http://securityreason.com/securityalert/4724 -http://securityreason.com/securityalert/4725 -http://securityreason.com/securityalert/4726 -http://securityreason.com/securityalert/4727 -http://securityreason.com/securityalert/4728 -http://securityreason.com/securityalert/4729 -http://securityreason.com/securityalert/473 -http://securityreason.com/securityalert/4730 -http://securityreason.com/securityalert/4731 -http://securityreason.com/securityalert/4732 -http://securityreason.com/securityalert/4733 -http://securityreason.com/securityalert/4734 -http://securityreason.com/securityalert/4735 -http://securityreason.com/securityalert/4736 -http://securityreason.com/securityalert/4737 -http://securityreason.com/securityalert/4738 -http://securityreason.com/securityalert/4739 -http://securityreason.com/securityalert/474 -http://securityreason.com/securityalert/4740 -http://securityreason.com/securityalert/4741 -http://securityreason.com/securityalert/4742 -http://securityreason.com/securityalert/4743 -http://securityreason.com/securityalert/4744 -http://securityreason.com/securityalert/4745 -http://securityreason.com/securityalert/4746 -http://securityreason.com/securityalert/4747 -http://securityreason.com/securityalert/4748 -http://securityreason.com/securityalert/4749 -http://securityreason.com/securityalert/4750 -http://securityreason.com/securityalert/4751 -http://securityreason.com/securityalert/4752 -http://securityreason.com/securityalert/4753 -http://securityreason.com/securityalert/4754 -http://securityreason.com/securityalert/4755 -http://securityreason.com/securityalert/4756 -http://securityreason.com/securityalert/4757 -http://securityreason.com/securityalert/4758 -http://securityreason.com/securityalert/4759 -http://securityreason.com/securityalert/476 -http://securityreason.com/securityalert/4760 -http://securityreason.com/securityalert/4761 -http://securityreason.com/securityalert/4762 -http://securityreason.com/securityalert/4763 -http://securityreason.com/securityalert/4764 -http://securityreason.com/securityalert/4765 -http://securityreason.com/securityalert/4766 -http://securityreason.com/securityalert/4767 -http://securityreason.com/securityalert/4768 -http://securityreason.com/securityalert/4769 -http://securityreason.com/securityalert/477 -http://securityreason.com/securityalert/4770 -http://securityreason.com/securityalert/4771 -http://securityreason.com/securityalert/4772 -http://securityreason.com/securityalert/4773 -http://securityreason.com/securityalert/4774 -http://securityreason.com/securityalert/4775 -http://securityreason.com/securityalert/4776 -http://securityreason.com/securityalert/4777 -http://securityreason.com/securityalert/4778 -http://securityreason.com/securityalert/4779 -http://securityreason.com/securityalert/478 -http://securityreason.com/securityalert/4780 -http://securityreason.com/securityalert/4781 -http://securityreason.com/securityalert/4782 -http://securityreason.com/securityalert/4783 -http://securityreason.com/securityalert/4784 -http://securityreason.com/securityalert/4785 -http://securityreason.com/securityalert/4786 -http://securityreason.com/securityalert/4787 -http://securityreason.com/securityalert/4788 -http://securityreason.com/securityalert/4789 -http://securityreason.com/securityalert/479 -http://securityreason.com/securityalert/4790 -http://securityreason.com/securityalert/4791 -http://securityreason.com/securityalert/4792 -http://securityreason.com/securityalert/4793 -http://securityreason.com/securityalert/4794 -http://securityreason.com/securityalert/4795 -http://securityreason.com/securityalert/4796 -http://securityreason.com/securityalert/4797 -http://securityreason.com/securityalert/4798 -http://securityreason.com/securityalert/4799 -http://securityreason.com/securityalert/48 -http://securityreason.com/securityalert/480 -http://securityreason.com/securityalert/4800 -http://securityreason.com/securityalert/4801 -http://securityreason.com/securityalert/4802 -http://securityreason.com/securityalert/4803 -http://securityreason.com/securityalert/4804 -http://securityreason.com/securityalert/4805 -http://securityreason.com/securityalert/4806 -http://securityreason.com/securityalert/4807 -http://securityreason.com/securityalert/4808 -http://securityreason.com/securityalert/4809 -http://securityreason.com/securityalert/481 -http://securityreason.com/securityalert/4810 -http://securityreason.com/securityalert/4811 -http://securityreason.com/securityalert/4812 -http://securityreason.com/securityalert/4813 -http://securityreason.com/securityalert/4814 -http://securityreason.com/securityalert/4815 -http://securityreason.com/securityalert/4816 -http://securityreason.com/securityalert/4817 -http://securityreason.com/securityalert/4818 -http://securityreason.com/securityalert/4819 -http://securityreason.com/securityalert/482 -http://securityreason.com/securityalert/4820 -http://securityreason.com/securityalert/4821 -http://securityreason.com/securityalert/4822 -http://securityreason.com/securityalert/4823 -http://securityreason.com/securityalert/4824 -http://securityreason.com/securityalert/4825 -http://securityreason.com/securityalert/4826 -http://securityreason.com/securityalert/4827 -http://securityreason.com/securityalert/4828 -http://securityreason.com/securityalert/4829 -http://securityreason.com/securityalert/483 -http://securityreason.com/securityalert/4830 -http://securityreason.com/securityalert/4831 -http://securityreason.com/securityalert/4832 -http://securityreason.com/securityalert/4833 -http://securityreason.com/securityalert/4834 -http://securityreason.com/securityalert/4835 -http://securityreason.com/securityalert/4836 -http://securityreason.com/securityalert/4837 -http://securityreason.com/securityalert/4838 -http://securityreason.com/securityalert/4839 -http://securityreason.com/securityalert/484 -http://securityreason.com/securityalert/4840 -http://securityreason.com/securityalert/4841 -http://securityreason.com/securityalert/4842 -http://securityreason.com/securityalert/4843 -http://securityreason.com/securityalert/4844 -http://securityreason.com/securityalert/4845 -http://securityreason.com/securityalert/4846 -http://securityreason.com/securityalert/4847 -http://securityreason.com/securityalert/4848 -http://securityreason.com/securityalert/4849 -http://securityreason.com/securityalert/485 -http://securityreason.com/securityalert/4850 -http://securityreason.com/securityalert/4851 -http://securityreason.com/securityalert/4852 -http://securityreason.com/securityalert/4853 -http://securityreason.com/securityalert/4854 -http://securityreason.com/securityalert/4855 -http://securityreason.com/securityalert/4856 -http://securityreason.com/securityalert/4857 -http://securityreason.com/securityalert/4858 -http://securityreason.com/securityalert/4859 -http://securityreason.com/securityalert/486 -http://securityreason.com/securityalert/4860 -http://securityreason.com/securityalert/4861 -http://securityreason.com/securityalert/4862 -http://securityreason.com/securityalert/4863 -http://securityreason.com/securityalert/4864 -http://securityreason.com/securityalert/4865 -http://securityreason.com/securityalert/4866 -http://securityreason.com/securityalert/4867 -http://securityreason.com/securityalert/4868 -http://securityreason.com/securityalert/4869 -http://securityreason.com/securityalert/487 -http://securityreason.com/securityalert/4870 -http://securityreason.com/securityalert/4871 -http://securityreason.com/securityalert/4872 -http://securityreason.com/securityalert/4873 -http://securityreason.com/securityalert/4874 -http://securityreason.com/securityalert/4875 -http://securityreason.com/securityalert/4876 -http://securityreason.com/securityalert/4877 -http://securityreason.com/securityalert/4878 -http://securityreason.com/securityalert/4879 -http://securityreason.com/securityalert/488 -http://securityreason.com/securityalert/4880 -http://securityreason.com/securityalert/4881 -http://securityreason.com/securityalert/4882 -http://securityreason.com/securityalert/4883 -http://securityreason.com/securityalert/4884 -http://securityreason.com/securityalert/4885 -http://securityreason.com/securityalert/4886 -http://securityreason.com/securityalert/4887 -http://securityreason.com/securityalert/4888 -http://securityreason.com/securityalert/4889 -http://securityreason.com/securityalert/489 -http://securityreason.com/securityalert/4890 -http://securityreason.com/securityalert/4891 -http://securityreason.com/securityalert/4892 -http://securityreason.com/securityalert/4893 -http://securityreason.com/securityalert/4894 -http://securityreason.com/securityalert/4895 -http://securityreason.com/securityalert/4896 -http://securityreason.com/securityalert/4897 -http://securityreason.com/securityalert/4898 -http://securityreason.com/securityalert/4899 -http://securityreason.com/securityalert/49 -http://securityreason.com/securityalert/490 -http://securityreason.com/securityalert/4900 -http://securityreason.com/securityalert/4901 -http://securityreason.com/securityalert/4902 -http://securityreason.com/securityalert/4903 -http://securityreason.com/securityalert/4904 -http://securityreason.com/securityalert/4905 -http://securityreason.com/securityalert/4906 -http://securityreason.com/securityalert/4907 -http://securityreason.com/securityalert/4908 -http://securityreason.com/securityalert/4909 -http://securityreason.com/securityalert/491 -http://securityreason.com/securityalert/4910 -http://securityreason.com/securityalert/4911 -http://securityreason.com/securityalert/4912 -http://securityreason.com/securityalert/4913 -http://securityreason.com/securityalert/4914 -http://securityreason.com/securityalert/4915 -http://securityreason.com/securityalert/4916 -http://securityreason.com/securityalert/4917 -http://securityreason.com/securityalert/4918 -http://securityreason.com/securityalert/4919 -http://securityreason.com/securityalert/492 -http://securityreason.com/securityalert/4920 -http://securityreason.com/securityalert/4921 -http://securityreason.com/securityalert/4922 -http://securityreason.com/securityalert/4923 -http://securityreason.com/securityalert/4924 -http://securityreason.com/securityalert/4925 -http://securityreason.com/securityalert/4926 -http://securityreason.com/securityalert/4927 -http://securityreason.com/securityalert/4928 -http://securityreason.com/securityalert/4929 -http://securityreason.com/securityalert/493 -http://securityreason.com/securityalert/4930 -http://securityreason.com/securityalert/4931 -http://securityreason.com/securityalert/4932 -http://securityreason.com/securityalert/4933 -http://securityreason.com/securityalert/4934 -http://securityreason.com/securityalert/4935 -http://securityreason.com/securityalert/4936 -http://securityreason.com/securityalert/4937 -http://securityreason.com/securityalert/4938 -http://securityreason.com/securityalert/4939 -http://securityreason.com/securityalert/494 -http://securityreason.com/securityalert/4940 -http://securityreason.com/securityalert/4941 -http://securityreason.com/securityalert/4942 -http://securityreason.com/securityalert/495 -http://securityreason.com/securityalert/496 -http://securityreason.com/securityalert/497 -http://securityreason.com/securityalert/498 -http://securityreason.com/securityalert/525 -http://securityreason.com/securityalert/7008 -http://securityreason.com/securityalert/78 -http://securityreason.com/securityalert/780 -http://securityreason.com/securityalert/781 -http://securityreason.com/securityalert/782 -http://securityreason.com/securityalert/783 -http://securityreason.com/securityalert/784 -http://securityreason.com/securityalert/785 -http://securityreason.com/securityalert/786 -http://securityreason.com/securityalert/787 -http://securityreason.com/securityalert/788 -http://securityreason.com/securityalert/789 -http://securityreason.com/securityalert/8003 -http://securityreason.com/securityalert/8026 -http://securityreason.com/securityalert/8061 -http://securityreason.com/securityalert/8062 -http://securityreason.com/securityalert/8077 -http://securityreason.com/securityalert/8083 -http://securityreason.com/securityalert/8089 -http://securityreason.com/securityalert/8096 -http://securityreason.com/securityalert/8102 -http://securityreason.com/securityalert/8103 -http://securityreason.com/securityalert/8109 -http://securityreason.com/securityalert/8110 -http://securityreason.com/securityalert/8112 -http://securityreason.com/securityalert/8116 -http://securityreason.com/securityalert/8133 -http://securityreason.com/securityalert/8141 -http://securityreason.com/securityalert/8162 -http://securityreason.com/securityalert/8171 -http://securityreason.com/securityalert/8172 -http://securityreason.com/securityalert/8179 -http://securityreason.com/securityalert/8182 -http://securityreason.com/securityalert/8183 -http://securityreason.com/securityalert/8191 -http://securityreason.com/securityalert/8192 -http://securityreason.com/securityalert/8196 -http://securityreason.com/securityalert/8217 -http://securityreason.com/securityalert/8225 -http://securityreason.com/securityalert/8228 -http://securityreason.com/securityalert/8229 -http://securityreason.com/securityalert/8245 -http://securityreason.com/securityalert/8251 -http://securityreason.com/securityalert/8255 -http://securityreason.com/securityalert/8257 -http://securityreason.com/securityalert/8263 -http://securityreason.com/securityalert/8288 -http://securityreason.com/securityalert/8312 -http://securityreason.com/securityalert/8313 -http://securityreason.com/securityalert/8317 -http://securityreason.com/securityalert/8324 -http://securityreason.com/securityalert/8370 -http://securityreason.com/securityalert/8372 -http://securityreason.com/securityalert/8373 -http://securityreason.com/securityalert/8374 -http://securityreason.com/securityalert/8376 -http://securityreason.com/securityalert/8382 -http://securityreason.com/securityalert/8383 -http://securityreason.com/securityalert/8386 -http://securityreason.com/securityalert/8387 -http://securityreason.com/securityalert/8392 -http://securityreason.com/securityalert/8396 -http://securityreason.com/securityalert/8398 -http://securityreason.com/securityalert/8399 -http://securityreason.com/securityalert/8402 -http://securityreason.com/securityalert/8409 -http://securityreason.com/securityalert/8411 -http://securityreason.com/securityalert/8417 -http://securityreason.com/securityalert/8420 -http://securityreason.com/securityalert/8427 -http://securityreason.com/securityalert/8430 -http://securityreason.com/securityalert/8431 -http://securityreason.com/securityalert/8435 -http://securityreason.com/securityalert/8437 -http://securityreason.com/securityalert/8439 -http://securityreason.com/securityalert/8443 -http://securityreason.com/securityalert/8449 -http://securityreason.com/securityalert/8455 -http://securityreason.com/securityalert/8468 -http://securityreason.com/securityalert/8477 -http://securityreason.com/securityalert/8489 -http://securityreason.com/securityalert/8490 -http://securityreason.com/securityalert/8491 -http://securityreason.com/securityalert/8503 -http://securityreason.com/securityalert/8514 -http://securityreason.com/securityalert/8515 -http://securityreason.com/securityalert/8518 -http://securityreason.com/securityalert/8520 -http://securityreason.com/securityalert/944 -http://securityvulns.com/Rdocument752.html -http://securityvulns.com/Rdocument844.html -http://securityvulns.com/Rdocument845.html -http://securityvulns.com/Rdocument846.html -http://securityvulns.com/Rdocument959.html -http://securityvulns.com/Rdocument960.html -http://securityvulns.com/Sdocument42.html -http://securityvulns.ru/Rdocument391.html -http://securityvulns.ru/Sdocument137.html -http://securityvulns.ru/Sdocument162.html -http://secwk.blogspot.com/2018/09/otcms-361-reflected-xss-shareswitchphp.html -http://secwk.blogspot.com/2018/09/otcms-361-reflected-xss-usersphp.html -http://sethsec.blogspot.com/2014/07/cve-2014-2225.html -http://sethsec.blogspot.com/2014/07/cve-2014-2226.html -http://sethsec.blogspot.com/2014/07/cve-2014-2227.html -http://shampoo.antville.org/stories/1451301/ -http://silversmith.persiangig.com/PoC.rar -http://sirdarckcat.blogspot.com/2008/05/ghosts-for-ie8-and-ie75730.html -http://site.pi3.com.pl/adv/disk_pool_manager_1.txt -http://site.pi3.com.pl/adv/libopie-adv.txt -http://site.pi3.com.pl/adv/mod_proxy.txt -http://site.pi3.com.pl/adv/xpdf.txt -http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684 -http://snyk.io/vuln/SNYK-JS-CHROMELAUNCHER-537575 -http://sotiriu.de/adv/NSOADV-2009-001.txt -http://sotiriu.de/adv/NSOADV-2009-002.txt -http://sotiriu.de/adv/NSOADV-2009-003.txt -http://sotiriu.de/adv/NSOADV-2010-003.txt -http://sotiriu.de/adv/NSOADV-2010-010.txt -http://sotiriu.de/adv/NSOADV-2011-001.txt -http://sotiriu.de/adv/NSOADV-2011-003.txt -http://sotiriu.de/adv/NSOADV-2015-001.txt -http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel -http://sourceforge.net/p/ipcop/bugs/807/ -http://sourceforge.net/p/mydms/code/HEAD/tree/trunk/CHANGELOG -http://sourceforge.net/project/shownotes.php?group_id=140317&release_id=456313 -http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929 -http://sourceforge.net/tracker/?func=detail&aid=3506818&group_id=219284&atid=1045881 -http://sourceforge.net/tracker/index.php?func=detail&aid=1344032&group_id=40604&atid=428516 -http://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764 -http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html -http://speirofr.appspot.com/cve-2014-1739-kernel-infoleak-vulnerability-in-media_enum_entities.html -http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf -http://sploit.tech/2018/01/16/ASUS-part-I.html -http://sploit.tech/2018/10/12/D-Link.html -http://srcincite.io/advisories/src-2017-0005/ -http://srcincite.io/advisories/src-2017-0027/ -http://st2tea.blogspot.com/2012/01/cross-site-scripting-twiki.html -http://st2tea.blogspot.com/2012/01/otterware-statit4-cross-site-scripting.html -http://st2tea.blogspot.com/2012/01/ubb-forum756-cross-site-scripting.html -http://st2tea.blogspot.com/2012/01/viewgit-cross-site-scripting.html -http://st2tea.blogspot.com/2012/01/xclick-cart-cross-site-scripting.html -http://st2tea.blogspot.com/2012/02/foswiki-cross-site-scripting.html -http://st2tea.blogspot.com/2012/02/jamroom-cross-site-scripting.html -http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html -http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html -http://st2tea.blogspot.com/2012/02/wonderdesk-cross-site-scripting.html -http://st2tea.blogspot.com/2012/02/xwiki-cross-site-scripting.html -http://st2tea.blogspot.com/2012/02/zimbra-cross-site-scripting.html -http://st2tea.blogspot.com/2012/03/kayako-fusion-cross-site-scripting.html -http://stealth.openwall.net/null/dzug.c -http://stealth.openwall.net/xSports/clown-newuser.c -http://stealth.openwall.net/xSports/pamslam -http://struts.apache.org/development/2.x/docs/s2-012.html -http://struts.apache.org/development/2.x/docs/s2-013.html -http://struts.apache.org/development/2.x/docs/s2-014.html -http://struts.apache.org/development/2.x/docs/s2-015.html -http://struts.apache.org/release/2.3.x/docs/s2-016.html -http://struts.apache.org/release/2.3.x/docs/s2-017.html -http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf -http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf -http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ -http://tech.mantz-it.com/2016/12/sql-injection-in-frappe-framework.html -http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html -http://terasolunaorg.github.io/vulnerability/cve-2022-43484.html -http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html -http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html -http://thekelleys.org.uk/dnsmasq/CHANGELOG -http://thenextweb.com/insider/2013/01/28/new-vulnerability-bypasses-oracles-attempt-to-stop-malware-drive-by-downloads-via-java-applets/ -http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html -http://threat.tevora.com/biscom-secure-file-transfer-arbitrary-file-download/ -http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-11-remote-file-access.html -http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-version-11-floating.html -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-cupxcp -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140226-pi -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151006-vcs -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151007-vcs -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-ucd -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-vds -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fmc -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization -http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4097 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1124 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1140 -http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0659 -http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ -http://trac.edgewall.org/ticket/4049 -http://trac.videolan.org/vlc/ticket/8024 -http://tracker.firebirdsql.org/browse/CORE-1312 -http://tracker.firebirdsql.org/browse/CORE-4058 -http://tracker.firebirdsql.org/browse/CORE-5474 -http://treadstonesecurity.blogspot.ca/2014/07/myconnection-server-mcs-reflective-xss.html -http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html -http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-002/ -http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ -http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-013/ -http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-014/ -http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/ -http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/ -http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ -http://unbound.nlnetlabs.nl/downloads/unbound-1.4.4.tar.gz -http://uploadboy.me/cn40ne6p89t6/POC.mp4.html -http://users.own-hero.net/~decoder/advisories/mvnforum-jsxss.txt -http://users.own-hero.net/~decoder/advisories/sphider134-xss.txt -http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html -http://vapid.dhs.org/advisories/show_in_browser.html -http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html -http://verneet.com/cve-2019-16685/ -http://verneet.com/cve-2019-16686 -http://verneet.com/cve-2019-16687 -http://verneet.com/cve-2019-16688 -http://vigilance.fr/vulnerability/Dotclear-file-upload-via-swfupload-swf-11396 -http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-proc-net-udp-8586 -http://vigilance.fr/vulnerability/Windows-denials-of-service-of-win32k-sys-9607 -http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html -http://virgil-cj.blogspot.com/2018/05/0day-legacy-ivr-lets-phreak.html -http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt -http://vnhacker.blogspot.com/2011/09/beast.html -http://voidroot.blogspot.com/2011/08/xss-in-ibm-open-admin-tool.html -http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html -http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002533.html -http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html -http://vuln.sg/3dftp801-en.html -http://vuln.sg/FFFTP196b-en.html -http://vuln.sg/aceftp3803-en.html -http://vuln.sg/agephone1381-en.html -http://vuln.sg/alftp41b2-en.html -http://vuln.sg/alpass27-en.html -http://vuln.sg/bitkinex293-en.html -http://vuln.sg/blognplus255-en.html -http://vuln.sg/classicftp102-en.html -http://vuln.sg/coreftp211565-en.html -http://vuln.sg/cruiseworks109d-en.html -http://vuln.sg/cuteftp820-en.html -http://vuln.sg/ddarviewer2501314-en.html -http://vuln.sg/dynazip5007-en.html -http://vuln.sg/efcommander575-en.html -http://vuln.sg/epostmailserver410-en.html -http://vuln.sg/fireftp0971-en.html -http://vuln.sg/fireftp105-en.html -http://vuln.sg/glubsecureftp2515-en.html -http://vuln.sg/iceows420b-en.html -http://vuln.sg/isowincmd173-en.html -http://vuln.sg/isowincmd173-jp.html -http://vuln.sg/lhaca121-en.html -http://vuln.sg/lhaplus152-en.html -http://vuln.sg/lhaz131-en.html -http://vuln.sg/lotusnotes702doc-en.html -http://vuln.sg/lotusnotes702mif-en.html -http://vuln.sg/lotusnotes702sam-en.html -http://vuln.sg/lotusnotes702wpd-en.html -http://vuln.sg/net2ftp096-en.html -http://vuln.sg/nullftpserver1107-en.html -http://vuln.sg/pagemaker701-en.html -http://vuln.sg/powarc962-en.html -http://vuln.sg/powarc964-en.html -http://vuln.sg/powerzip706-en.html -http://vuln.sg/quarkxpress72-en.html -http://vuln.sg/salamander25-en.html -http://vuln.sg/turbozip6-en.html -http://vuln.sg/ultraedit1400b-en.html -http://vuln.sg/winimage808000-en.html -http://vuln.sg/wiseftp558-en.html -http://vuln.sg/yenc32-107-en.html -http://vulnerability-lab.com/get_content.php?id=482 -http://vulnerability-lab.com/get_content.php?id=485 -http://w00troot.blogspot.in/2017/10/php-melody-2.html -http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote-code-execution.html -http://wabisabilabi.blogspot.com/2007/11/quicktime-zeroday-vulnerability-still.html -http://wadofstuff.blogspot.com.au/2015/11/cve-2015-6357-firepwner-exploit-for.html -http://waleedassar.blogspot.com/2012/05/pe-explorer-heap-overflow-vulnerability.html -http://waleedassar.blogspot.com/2012/05/resource-hacker-heap-overflow.html -http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html -http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html -http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/ -http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability -http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-003.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt -http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt -http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt -http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/ -http://websecurity.com.ua/1045/ -http://websecurity.com.ua/1368/ -http://websecurity.com.ua/4146/ -http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html -http://www.133tsec.com/2012/04/30/0day-ddos-mikrotik-server-side-ddos-attack/ -http://www.7elements.co.uk/news/cve-2013-5667/ -http://www.7elements.co.uk/news/cve-2013-5668/ -http://www.7elements.co.uk/news/cve-2013-5669/ -http://www.7elements.co.uk/resources/blog/cve-2013-6880-proof-concept -http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ -http://www.acunetix.com/blog/websecuritynews/cubecart-4-session-management-bypass-leads-to-administrator-access/ -http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ -http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html -http://www.aircrack-ng.org/doku.php?id=tkiptun-ng -http://www.akitasecurity.nl/advisory.php?id=AK20090602 -http://www.andmp.com/2018/02/advisory-assigned-CVE-2018-7251-in-anchorcms.html -http://www.andmp.com/2018/02/advisory-assigned-cve-2018-7308-csrf.html -http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt -http://www.androidpolice.com/2011/04/14/exclusive-vulnerability-in-skype-for-android-is-exposing-your-name-phone-number-chat-logs-and-a-lot-more/ -http://www.androidpolice.com/2011/10/01/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more/ -http://www.antoniobarresi.com/files/cain_advisory.txt -http://www.attrition.org/pipermail/vim/2006-August/001000.html -http://www.attrition.org/pipermail/vim/2006-October/001076.html -http://www.attrition.org/pipermail/vim/2006-September/001012.html -http://www.attrition.org/pipermail/vim/2007-April/001541.html -http://www.attrition.org/pipermail/vim/2007-February/001264.html -http://www.attrition.org/pipermail/vim/2007-February/001280.html -http://www.attrition.org/pipermail/vim/2007-July/001704.html -http://www.attrition.org/pipermail/vim/2007-July/001710.html -http://www.attrition.org/pipermail/vim/2007-March/001459.html -http://www.attrition.org/pipermail/vim/2007-October/001823.html -http://www.attrition.org/pipermail/vim/2007-October/001824.html -http://www.attrition.org/pipermail/vim/2008-January/001890.html -http://www.attrition.org/pipermail/vim/2008-July/002035.html -http://www.attrition.org/pipermail/vim/2008-July/002036.html -http://www.attrition.org/pipermail/vim/2008-May/001988.html -http://www.attrition.org/pipermail/vim/2008-May/001989.html -http://www.attrition.org/pipermail/vim/2010-November/002468.html -http://www.attrition.org/pipermail/vim/2010-November/002469.html -http://www.beskerming.com/security/2007/11/25/74/QuickTime_-_Remote_hacker_automatic_control -http://www.binaryworld.it/ -http://www.binaryworld.it/guidepoc.asp -http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike -http://www.blackhat.com/html/bh-eu-10/bh-eu-10-briefings.html#Li -http://www.blackhat.com/html/bh-europe-05/bh-eu-05-speakers.html#Berrueta -http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Dror -http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson -http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html#Endler -http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf -http://www.blackhat.com/presentations/bh-europe-07/Butti/Presentation/bh-eu-07-Butti.pdf -http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf -http://www.bratax.be/advisories/b013.html -http://www.buayacorp.com/files/wordpress/wordpress-advisory.html -http://www.buayacorp.com/files/wordpress/wordpress-advisory.txt -http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html -http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html -http://www.bugtrack.almico.com/view.php?id=987 -http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf -http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html -http://www.christian-schneider.net/advisories/CVE-2014-2025.txt -http://www.christian-schneider.net/advisories/CVE-2014-2026.txt -http://www.christian-schneider.net/advisories/CVE-2014-2232.txt -http://www.christian-schneider.net/advisories/CVE-2014-2233.txt -http://www.christian-schneider.net/advisories/CVE-2014-2843.txt -http://www.christian-schneider.net/advisories/CVE-2014-3149.txt -http://www.christian-schneider.net/advisories/CVE-2014-5391.txt -http://www.christian-schneider.net/advisories/CVE-2014-5392.txt -http://www.christian-schneider.net/advisories/CVE-2014-5393.txt -http://www.cinquino.eu/EspoCRM.htm -http://www.cinquino.eu/NetBox.htm -http://www.cinquino.eu/ProFiles%201.5%20Free%20Version%20Component%20Xss.htm -http://www.cinquino.eu/SeoPanelReflect.htm -http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_caveats_15_3_2s.html -http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html -http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf -http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_34s.html -http://www.cloudscan.me/2011/12/cve-2011-5018-koala-framework-xss.html -http://www.cloudscan.me/2012/02/cve-2011-5020-online-tv-database-sql.html -http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html -http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html -http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html -http://www.cloudscan.me/2013/09/cve-2013-1034-stored-xss-xxe-os-x.html -http://www.cloudscan.me/2014/01/cve-2013-6853-stored-xss-in-y-toolbar.html -http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html -http://www.cloudscan.me/2016/03/xxe-dork-open-am-1010-xml-injection.html -http://www.coresecurity.com/advisories/advantech-adamView-buffer-overflow -http://www.coresecurity.com/advisories/advantech-eki-6340-command-injection -http://www.coresecurity.com/advisories/aloaha-pdf-suite-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities -http://www.coresecurity.com/advisories/buffer-overflow-ubiquiti-aircam-rtsp-service -http://www.coresecurity.com/advisories/corel-software-dll-hijacking -http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-buffer-overflow -http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-heap-buffer-overflow -http://www.coresecurity.com/advisories/eps-viewer-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities -http://www.coresecurity.com/advisories/fortinet-single-sign-on-stack-overflow -http://www.coresecurity.com/advisories/foscam-ip-cameras-improper-access-restrictions -http://www.coresecurity.com/advisories/freebsd-kernel-amd64setldt-heap-overflow -http://www.coresecurity.com/advisories/freebsd-kernel-multiple-vulnerabilities -http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities -http://www.coresecurity.com/advisories/icofx-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities -http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm -http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities -http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities -http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras -http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities -http://www.coresecurity.com/advisories/pdfcool-studio-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/pinapp-mail-secure-access-control-failure -http://www.coresecurity.com/advisories/publish-it-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/realplayer-heap-based-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/sap-download-manager-password-weak-encryption -http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities -http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability -http://www.coresecurity.com/advisories/sap-router-password-timing-attack -http://www.coresecurity.com/advisories/schneider-vampset-stack-and-heap-buffer-overflow -http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities -http://www.coresecurity.com/advisories/trend-micro-smart-protection-os-command-injection -http://www.coresecurity.com/advisories/vivotek-ip-cameras-rtsp-authentication-bypass -http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation -http://www.coresecurity.com/advisories/xnview-buffer-overflow-vulnerability -http://www.coresecurity.com/advisories/zavio-IP-cameras-multiple-vulnerabilities -http://www.coresecurity.com/content/3dsmax-arbitrary-command-execution -http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file -http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability -http://www.coresecurity.com/content/CORE-2010-0424-windows-smtp-dns-query-id-bugs -http://www.coresecurity.com/content/DXStudio-player-firefox-plugin -http://www.coresecurity.com/content/HP-Data-Protector-EXECCMD-Vulnerability -http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities -http://www.coresecurity.com/content/IBM-WebSphere-CSRF -http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow -http://www.coresecurity.com/content/SAP-netweaver-msg-srv-multiple-vulnerabilities -http://www.coresecurity.com/content/StoneTrip-S3DPlayers -http://www.coresecurity.com/content/XnView-MBM-Processing-Heap-Overflow -http://www.coresecurity.com/content/adobe-reader-buffer-overflow -http://www.coresecurity.com/content/amaya-buffer-overflows -http://www.coresecurity.com/content/anzio-web-print-object-buffer-overflow -http://www.coresecurity.com/content/apple-osx-sandbox-bypass -http://www.coresecurity.com/content/blender-scripting-injection -http://www.coresecurity.com/content/broadcom-input-validation-BCM4325-BCM4329 -http://www.coresecurity.com/content/cactushop-xss-persistent-vulnerability -http://www.coresecurity.com/content/cisco-secure-desktop-xss -http://www.coresecurity.com/content/cubecart-php-shopping-cart-sql-injection -http://www.coresecurity.com/content/dazstudio-scripting-injection -http://www.coresecurity.com/content/e107-cms-script-command-injection -http://www.coresecurity.com/content/efront-php-file-inclusion -http://www.coresecurity.com/content/firebird-sql-dos -http://www.coresecurity.com/content/foxit-reader-vulnerabilities -http://www.coresecurity.com/content/google-sketchup-vulnerability -http://www.coresecurity.com/content/hp-nnm-ovjavalocale-buffer-overflow -http://www.coresecurity.com/content/hyperic-hq-vulnerabilities -http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag -http://www.coresecurity.com/content/internet-explorer-zone-elevation -http://www.coresecurity.com/content/iphone-safari-javascript-alert-denial-of-service -http://www.coresecurity.com/content/jetty-persistent-xss -http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability -http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow -http://www.coresecurity.com/content/libpurple-arbitrary-write -http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow -http://www.coresecurity.com/content/luxology-modo-lxo-vulnerability -http://www.coresecurity.com/content/maya-arbitrary-command-execution -http://www.coresecurity.com/content/ms-visio-dxf-buffer-overflow -http://www.coresecurity.com/content/multiple-vulnerabilities-in-bugtracker -http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp -http://www.coresecurity.com/content/nextgen-gallery-xss-vulnerability -http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities -http://www.coresecurity.com/content/openfire-multiple-vulnerabilities -http://www.coresecurity.com/content/openview-buffer-overflows -http://www.coresecurity.com/content/openview_nnm_internaldb_dos -http://www.coresecurity.com/content/real-helix-dna -http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities -http://www.coresecurity.com/content/softimage-arbitrary-command-execution -http://www.coresecurity.com/content/sun-calendar-express -http://www.coresecurity.com/content/sun-communications-express -http://www.coresecurity.com/content/sun-delegated-administrator -http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos -http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities -http://www.coresecurity.com/content/vbulletin-cross-site-scripting-vulnerability -http://www.coresecurity.com/content/vinagre-format-string -http://www.coresecurity.com/content/virtual-pc-2007-hypervisor-memory-protection-bug -http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability -http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files -http://www.coresecurity.com/content/vlc-xspf-memory-corruption -http://www.coresecurity.com/content/vmware-esx-input-validation-error -http://www.coresecurity.com/content/vnc-integer-overflows -http://www.coresecurity.com/content/vnc-remote-dos -http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities -http://www.coresecurity.com/content/winds3d-viewer-advisory -http://www.coresecurity.com/content/word-arbitrary-free -http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities -http://www.cynops.de/advisories/AKLINK-SA-2008-007.txt -http://www.daemonology.net/hyperthreading-considered-harmful/ -http://www.darksecurity.de/advisories/2012/SSCHADV2012-002.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-004.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-005.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-006.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-010.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-014.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt -http://www.darksecurity.de/advisories/2012/SSCHADV2012-016.txt -http://www.darksecurity.de/advisories/2013/SSCHADV2013-004.txt -http://www.darksecurity.de/advisories/SSCHADV2011-042.txt -http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html -http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html -http://www.deerfield.com/products/visnetic_website/ -http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ -http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug -http://www.digit-labs.org/files/exploits/extremail-v3.pl -http://www.digit-labs.org/files/exploits/extremail-v8.pl -http://www.digit-labs.org/files/exploits/extremail-v9.c -http://www.digit-labs.org/files/exploits/mydns-rr-smash.c -http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c -http://www.digit-labs.org/files/exploits/safenet-dos.c -http://www.digit-labs.org/files/exploits/xnu-appletalk-zip.c -http://www.digit-labs.org/files/exploits/xnu-macfsstat-leak.c -http://www.digit-labs.org/files/exploits/xnu-macho-dos.c -http://www.digit-labs.org/files/exploits/xnu-profil-leak.c -http://www.digit-labs.org/files/exploits/xnu-vfssysctl-dos.c -http://www.djangoproject.com/weblog/2008/sep/02/security/ -http://www.djangoproject.com/weblog/2011/feb/08/security/ -http://www.emerson.com/documents/automation/deltav-smart-switches-en-179014.pdf -http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php -http://www.evilfingers.com/patchTuesday/MS08_052_GDI+_Vulnerability_ver2.txt -http://www.evuln.com/vulns/12/summary.html -http://www.evuln.com/vulns/138/ -http://www.evuln.com/vulns/52/summary.html -http://www.evuln.com/vulns/53/summary.html -http://www.evuln.com/vulns/54/summary.html -http://www.evuln.com/vulns/56/summary.html -http://www.evuln.com/vulns/57/summary.html -http://www.evuln.com/vulns/60/summary.html -http://www.evuln.com/vulns/62/summary.html -http://www.evuln.com/vulns/64/summary.html -http://www.evuln.com/vulns/66/summary.html -http://www.evuln.com/vulns/67/summary.html -http://www.evuln.com/vulns/68/summary.html -http://www.evuln.com/vulns/69/summary.html -http://www.evuln.com/vulns/74/summary.html -http://www.evuln.com/vulns/75/summary.html -http://www.evuln.com/vulns/76/summary.html -http://www.evuln.com/vulns/77/summary.html -http://www.evuln.com/vulns/80/summary.html -http://www.evuln.com/vulns/82/summary.html -http://www.exploit-db.com/exploits/10216 -http://www.exploit-db.com/exploits/10338 -http://www.exploit-db.com/exploits/10354 -http://www.exploit-db.com/exploits/10439 -http://www.exploit-db.com/exploits/10569 -http://www.exploit-db.com/exploits/10793 -http://www.exploit-db.com/exploits/10967 -http://www.exploit-db.com/exploits/11141 -http://www.exploit-db.com/exploits/11243 -http://www.exploit-db.com/exploits/11277 -http://www.exploit-db.com/exploits/11356 -http://www.exploit-db.com/exploits/11402 -http://www.exploit-db.com/exploits/11585 -http://www.exploit-db.com/exploits/11587 -http://www.exploit-db.com/exploits/11588 -http://www.exploit-db.com/exploits/11602 -http://www.exploit-db.com/exploits/11622 -http://www.exploit-db.com/exploits/11655 -http://www.exploit-db.com/exploits/11831 -http://www.exploit-db.com/exploits/11975 -http://www.exploit-db.com/exploits/11976 -http://www.exploit-db.com/exploits/12030/ -http://www.exploit-db.com/exploits/12082 -http://www.exploit-db.com/exploits/12087 -http://www.exploit-db.com/exploits/12097 -http://www.exploit-db.com/exploits/12098 -http://www.exploit-db.com/exploits/12102 -http://www.exploit-db.com/exploits/12120 -http://www.exploit-db.com/exploits/12142 -http://www.exploit-db.com/exploits/12151 -http://www.exploit-db.com/exploits/12167 -http://www.exploit-db.com/exploits/12168 -http://www.exploit-db.com/exploits/12170 -http://www.exploit-db.com/exploits/12171 -http://www.exploit-db.com/exploits/12174 -http://www.exploit-db.com/exploits/12177 -http://www.exploit-db.com/exploits/12232 -http://www.exploit-db.com/exploits/12234 -http://www.exploit-db.com/exploits/12239 -http://www.exploit-db.com/exploits/12282 -http://www.exploit-db.com/exploits/12283 -http://www.exploit-db.com/exploits/12288 -http://www.exploit-db.com/exploits/12313 -http://www.exploit-db.com/exploits/12317 -http://www.exploit-db.com/exploits/12318 -http://www.exploit-db.com/exploits/12365 -http://www.exploit-db.com/exploits/12426 -http://www.exploit-db.com/exploits/12452 -http://www.exploit-db.com/exploits/12595 -http://www.exploit-db.com/exploits/12787/ -http://www.exploit-db.com/exploits/13760 -http://www.exploit-db.com/exploits/13763 -http://www.exploit-db.com/exploits/13822 -http://www.exploit-db.com/exploits/13832/ -http://www.exploit-db.com/exploits/13876 -http://www.exploit-db.com/exploits/13888 -http://www.exploit-db.com/exploits/13965 -http://www.exploit-db.com/exploits/14010 -http://www.exploit-db.com/exploits/14107 -http://www.exploit-db.com/exploits/14126 -http://www.exploit-db.com/exploits/14504 -http://www.exploit-db.com/exploits/14589 -http://www.exploit-db.com/exploits/14746/ -http://www.exploit-db.com/exploits/14747 -http://www.exploit-db.com/exploits/14758 -http://www.exploit-db.com/exploits/14765 -http://www.exploit-db.com/exploits/14933 -http://www.exploit-db.com/exploits/14948 -http://www.exploit-db.com/exploits/15005 -http://www.exploit-db.com/exploits/15011 -http://www.exploit-db.com/exploits/15060 -http://www.exploit-db.com/exploits/15064 -http://www.exploit-db.com/exploits/15120 -http://www.exploit-db.com/exploits/15204 -http://www.exploit-db.com/exploits/15234 -http://www.exploit-db.com/exploits/15259 -http://www.exploit-db.com/exploits/15330 -http://www.exploit-db.com/exploits/15504 -http://www.exploit-db.com/exploits/15594 -http://www.exploit-db.com/exploits/15607 -http://www.exploit-db.com/exploits/15609/ -http://www.exploit-db.com/exploits/15631 -http://www.exploit-db.com/exploits/15633 -http://www.exploit-db.com/exploits/15636 -http://www.exploit-db.com/exploits/15643 -http://www.exploit-db.com/exploits/15645 -http://www.exploit-db.com/exploits/15722 -http://www.exploit-db.com/exploits/15740 -http://www.exploit-db.com/exploits/15743 -http://www.exploit-db.com/exploits/15744 -http://www.exploit-db.com/exploits/15755 -http://www.exploit-db.com/exploits/15799 -http://www.exploit-db.com/exploits/15897 -http://www.exploit-db.com/exploits/15901 -http://www.exploit-db.com/exploits/15935 -http://www.exploit-db.com/exploits/15936 -http://www.exploit-db.com/exploits/15940 -http://www.exploit-db.com/exploits/15957 -http://www.exploit-db.com/exploits/15968 -http://www.exploit-db.com/exploits/16000 -http://www.exploit-db.com/exploits/16003 -http://www.exploit-db.com/exploits/16004 -http://www.exploit-db.com/exploits/16016 -http://www.exploit-db.com/exploits/16071 -http://www.exploit-db.com/exploits/16103 -http://www.exploit-db.com/exploits/16108 -http://www.exploit-db.com/exploits/16123/ -http://www.exploit-db.com/exploits/16129/ -http://www.exploit-db.com/exploits/16171 -http://www.exploit-db.com/exploits/16182 -http://www.exploit-db.com/exploits/16261/ -http://www.exploit-db.com/exploits/16270 -http://www.exploit-db.com/exploits/16933 -http://www.exploit-db.com/exploits/16988 -http://www.exploit-db.com/exploits/17011 -http://www.exploit-db.com/exploits/17019 -http://www.exploit-db.com/exploits/17024 -http://www.exploit-db.com/exploits/17025 -http://www.exploit-db.com/exploits/17056 -http://www.exploit-db.com/exploits/17061/ -http://www.exploit-db.com/exploits/17084/ -http://www.exploit-db.com/exploits/17098 -http://www.exploit-db.com/exploits/17102 -http://www.exploit-db.com/exploits/17119 -http://www.exploit-db.com/exploits/17127 -http://www.exploit-db.com/exploits/17195 -http://www.exploit-db.com/exploits/17222 -http://www.exploit-db.com/exploits/17240 -http://www.exploit-db.com/exploits/17278/ -http://www.exploit-db.com/exploits/17458 -http://www.exploit-db.com/exploits/17461 -http://www.exploit-db.com/exploits/17490 -http://www.exploit-db.com/exploits/17577 -http://www.exploit-db.com/exploits/17602 -http://www.exploit-db.com/exploits/17827 -http://www.exploit-db.com/exploits/17848 -http://www.exploit-db.com/exploits/17855 -http://www.exploit-db.com/exploits/17856 -http://www.exploit-db.com/exploits/17861 -http://www.exploit-db.com/exploits/17871 -http://www.exploit-db.com/exploits/17872 -http://www.exploit-db.com/exploits/17876 -http://www.exploit-db.com/exploits/17908 -http://www.exploit-db.com/exploits/17918/ -http://www.exploit-db.com/exploits/17969 -http://www.exploit-db.com/exploits/17992 -http://www.exploit-db.com/exploits/18005 -http://www.exploit-db.com/exploits/18009 -http://www.exploit-db.com/exploits/18021/ -http://www.exploit-db.com/exploits/18045 -http://www.exploit-db.com/exploits/18053 -http://www.exploit-db.com/exploits/18056 -http://www.exploit-db.com/exploits/18066 -http://www.exploit-db.com/exploits/18091 -http://www.exploit-db.com/exploits/18092 -http://www.exploit-db.com/exploits/18099 -http://www.exploit-db.com/exploits/18114 -http://www.exploit-db.com/exploits/18117 -http://www.exploit-db.com/exploits/18119 -http://www.exploit-db.com/exploits/18121 -http://www.exploit-db.com/exploits/18127 -http://www.exploit-db.com/exploits/18128 -http://www.exploit-db.com/exploits/18129 -http://www.exploit-db.com/exploits/18132/ -http://www.exploit-db.com/exploits/18142 -http://www.exploit-db.com/exploits/18147 -http://www.exploit-db.com/exploits/18149/ -http://www.exploit-db.com/exploits/18155 -http://www.exploit-db.com/exploits/18159 -http://www.exploit-db.com/exploits/18189/ -http://www.exploit-db.com/exploits/18198 -http://www.exploit-db.com/exploits/18220 -http://www.exploit-db.com/exploits/18224 -http://www.exploit-db.com/exploits/18225 -http://www.exploit-db.com/exploits/18246 -http://www.exploit-db.com/exploits/18249 -http://www.exploit-db.com/exploits/18257 -http://www.exploit-db.com/exploits/18259 -http://www.exploit-db.com/exploits/18261 -http://www.exploit-db.com/exploits/18266 -http://www.exploit-db.com/exploits/18287 -http://www.exploit-db.com/exploits/18295 -http://www.exploit-db.com/exploits/18305 -http://www.exploit-db.com/exploits/18370/ -http://www.exploit-db.com/exploits/18417 -http://www.exploit-db.com/exploits/23248/ -http://www.exploit-db.com/exploits/23945/ -http://www.exploit-db.com/exploits/24203 -http://www.exploit-db.com/exploits/24485 -http://www.exploit-db.com/exploits/24487 -http://www.exploit-db.com/exploits/24511 -http://www.exploit-db.com/exploits/24536 -http://www.exploit-db.com/exploits/24556 -http://www.exploit-db.com/exploits/24561 -http://www.exploit-db.com/exploits/24629 -http://www.exploit-db.com/exploits/24747 -http://www.exploit-db.com/exploits/24862 -http://www.exploit-db.com/exploits/24874 -http://www.exploit-db.com/exploits/24898 -http://www.exploit-db.com/exploits/24906 -http://www.exploit-db.com/exploits/24916/ -http://www.exploit-db.com/exploits/24924 -http://www.exploit-db.com/exploits/24930/ -http://www.exploit-db.com/exploits/24942 -http://www.exploit-db.com/exploits/24947 -http://www.exploit-db.com/exploits/24950 -http://www.exploit-db.com/exploits/24960 -http://www.exploit-db.com/exploits/24965 -http://www.exploit-db.com/exploits/24976 -http://www.exploit-db.com/exploits/25001 -http://www.exploit-db.com/exploits/25087 -http://www.exploit-db.com/exploits/25138 -http://www.exploit-db.com/exploits/25139 -http://www.exploit-db.com/exploits/25292 -http://www.exploit-db.com/exploits/25295 -http://www.exploit-db.com/exploits/25519 -http://www.exploit-db.com/exploits/25812 -http://www.exploit-db.com/exploits/25813 -http://www.exploit-db.com/exploits/25815 -http://www.exploit-db.com/exploits/25987 -http://www.exploit-db.com/exploits/26125 -http://www.exploit-db.com/exploits/26136 -http://www.exploit-db.com/exploits/26138/ -http://www.exploit-db.com/exploits/26406 -http://www.exploit-db.com/exploits/26416 -http://www.exploit-db.com/exploits/26528/ -http://www.exploit-db.com/exploits/26557 -http://www.exploit-db.com/exploits/26558 -http://www.exploit-db.com/exploits/26624 -http://www.exploit-db.com/exploits/26958 -http://www.exploit-db.com/exploits/27047 -http://www.exploit-db.com/exploits/27049 -http://www.exploit-db.com/exploits/27076 -http://www.exploit-db.com/exploits/27285 -http://www.exploit-db.com/exploits/27286 -http://www.exploit-db.com/exploits/27430 -http://www.exploit-db.com/exploits/27602 -http://www.exploit-db.com/exploits/27609 -http://www.exploit-db.com/exploits/27700 -http://www.exploit-db.com/exploits/27777 -http://www.exploit-db.com/exploits/27878 -http://www.exploit-db.com/exploits/28054 -http://www.exploit-db.com/exploits/28080 -http://www.exploit-db.com/exploits/28084/ -http://www.exploit-db.com/exploits/28085/ -http://www.exploit-db.com/exploits/28377 -http://www.exploit-db.com/exploits/28654 -http://www.exploit-db.com/exploits/28683 -http://www.exploit-db.com/exploits/28684 -http://www.exploit-db.com/exploits/28811/ -http://www.exploit-db.com/exploits/28855 -http://www.exploit-db.com/exploits/28959 -http://www.exploit-db.com/exploits/29274 -http://www.exploit-db.com/exploits/29279 -http://www.exploit-db.com/exploits/29327 -http://www.exploit-db.com/exploits/29516 -http://www.exploit-db.com/exploits/29517 -http://www.exploit-db.com/exploits/29519 -http://www.exploit-db.com/exploits/29544 -http://www.exploit-db.com/exploits/29549 -http://www.exploit-db.com/exploits/29672 -http://www.exploit-db.com/exploits/29673 -http://www.exploit-db.com/exploits/29927/ -http://www.exploit-db.com/exploits/29959 -http://www.exploit-db.com/exploits/30002 -http://www.exploit-db.com/exploits/30054 -http://www.exploit-db.com/exploits/30208 -http://www.exploit-db.com/exploits/30213 -http://www.exploit-db.com/exploits/30237/ -http://www.exploit-db.com/exploits/30362/ -http://www.exploit-db.com/exploits/30373 -http://www.exploit-db.com/exploits/30374 -http://www.exploit-db.com/exploits/30408 -http://www.exploit-db.com/exploits/30413 -http://www.exploit-db.com/exploits/30414 -http://www.exploit-db.com/exploits/30472 -http://www.exploit-db.com/exploits/30667 -http://www.exploit-db.com/exploits/30668 -http://www.exploit-db.com/exploits/30726 -http://www.exploit-db.com/exploits/30727 -http://www.exploit-db.com/exploits/30908 -http://www.exploit-db.com/exploits/30946 -http://www.exploit-db.com/exploits/31090 -http://www.exploit-db.com/exploits/31140 -http://www.exploit-db.com/exploits/31142 -http://www.exploit-db.com/exploits/31176 -http://www.exploit-db.com/exploits/31177 -http://www.exploit-db.com/exploits/31179 -http://www.exploit-db.com/exploits/31183 -http://www.exploit-db.com/exploits/31222 -http://www.exploit-db.com/exploits/31329/ -http://www.exploit-db.com/exploits/31425 -http://www.exploit-db.com/exploits/31461 -http://www.exploit-db.com/exploits/31515 -http://www.exploit-db.com/exploits/31521 -http://www.exploit-db.com/exploits/31578 -http://www.exploit-db.com/exploits/31738 -http://www.exploit-db.com/exploits/31763 -http://www.exploit-db.com/exploits/31834 -http://www.exploit-db.com/exploits/31853 -http://www.exploit-db.com/exploits/31875 -http://www.exploit-db.com/exploits/31894 -http://www.exploit-db.com/exploits/31917 -http://www.exploit-db.com/exploits/31990 -http://www.exploit-db.com/exploits/32038 -http://www.exploit-db.com/exploits/32039 -http://www.exploit-db.com/exploits/32040 -http://www.exploit-db.com/exploits/32162 -http://www.exploit-db.com/exploits/32163 -http://www.exploit-db.com/exploits/32208 -http://www.exploit-db.com/exploits/32477/ -http://www.exploit-db.com/exploits/32516 -http://www.exploit-db.com/exploits/32702 -http://www.exploit-db.com/exploits/32792 -http://www.exploit-db.com/exploits/32830 -http://www.exploit-db.com/exploits/32867 -http://www.exploit-db.com/exploits/32884 -http://www.exploit-db.com/exploits/32899 -http://www.exploit-db.com/exploits/32919 -http://www.exploit-db.com/exploits/32997 -http://www.exploit-db.com/exploits/33076 -http://www.exploit-db.com/exploits/33136 -http://www.exploit-db.com/exploits/33250 -http://www.exploit-db.com/exploits/33252 -http://www.exploit-db.com/exploits/33330 -http://www.exploit-db.com/exploits/33332 -http://www.exploit-db.com/exploits/33335 -http://www.exploit-db.com/exploits/33336 -http://www.exploit-db.com/exploits/33384 -http://www.exploit-db.com/exploits/33387 -http://www.exploit-db.com/exploits/33493 -http://www.exploit-db.com/exploits/33516 -http://www.exploit-db.com/exploits/33554 -http://www.exploit-db.com/exploits/33614 -http://www.exploit-db.com/exploits/33633 -http://www.exploit-db.com/exploits/33700 -http://www.exploit-db.com/exploits/33713 -http://www.exploit-db.com/exploits/33714 -http://www.exploit-db.com/exploits/33740 -http://www.exploit-db.com/exploits/33741 -http://www.exploit-db.com/exploits/33742 -http://www.exploit-db.com/exploits/33792 -http://www.exploit-db.com/exploits/33803 -http://www.exploit-db.com/exploits/33804 -http://www.exploit-db.com/exploits/33824 -http://www.exploit-db.com/exploits/33851 -http://www.exploit-db.com/exploits/33860 -http://www.exploit-db.com/exploits/33897 -http://www.exploit-db.com/exploits/33951 -http://www.exploit-db.com/exploits/33954 -http://www.exploit-db.com/exploits/33990 -http://www.exploit-db.com/exploits/34030 -http://www.exploit-db.com/exploits/34066/ -http://www.exploit-db.com/exploits/34088/ -http://www.exploit-db.com/exploits/34112 -http://www.exploit-db.com/exploits/34131 -http://www.exploit-db.com/exploits/34132/ -http://www.exploit-db.com/exploits/34133 -http://www.exploit-db.com/exploits/34134 -http://www.exploit-db.com/exploits/34165 -http://www.exploit-db.com/exploits/34169 -http://www.exploit-db.com/exploits/34173 -http://www.exploit-db.com/exploits/34189 -http://www.exploit-db.com/exploits/34239 -http://www.exploit-db.com/exploits/34333 -http://www.exploit-db.com/exploits/34436 -http://www.exploit-db.com/exploits/34449 -http://www.exploit-db.com/exploits/34511 -http://www.exploit-db.com/exploits/34514 -http://www.exploit-db.com/exploits/34519 -http://www.exploit-db.com/exploits/34525 -http://www.exploit-db.com/exploits/34552 -http://www.exploit-db.com/exploits/34586 -http://www.exploit-db.com/exploits/34594 -http://www.exploit-db.com/exploits/34669 -http://www.exploit-db.com/exploits/34718 -http://www.exploit-db.com/exploits/34760 -http://www.exploit-db.com/exploits/34762 -http://www.exploit-db.com/exploits/34781 -http://www.exploit-db.com/exploits/34851 -http://www.exploit-db.com/exploits/34852 -http://www.exploit-db.com/exploits/34861 -http://www.exploit-db.com/exploits/34865 -http://www.exploit-db.com/exploits/34929 -http://www.exploit-db.com/exploits/34959 -http://www.exploit-db.com/exploits/34982 -http://www.exploit-db.com/exploits/34984 -http://www.exploit-db.com/exploits/34993 -http://www.exploit-db.com/exploits/35019 -http://www.exploit-db.com/exploits/35046 -http://www.exploit-db.com/exploits/35055 -http://www.exploit-db.com/exploits/35073 -http://www.exploit-db.com/exploits/35076 -http://www.exploit-db.com/exploits/35105 -http://www.exploit-db.com/exploits/35150 -http://www.exploit-db.com/exploits/35204 -http://www.exploit-db.com/exploits/35210 -http://www.exploit-db.com/exploits/35237 -http://www.exploit-db.com/exploits/35238 -http://www.exploit-db.com/exploits/35272 -http://www.exploit-db.com/exploits/35276 -http://www.exploit-db.com/exploits/35303 -http://www.exploit-db.com/exploits/35340 -http://www.exploit-db.com/exploits/35346 -http://www.exploit-db.com/exploits/35371 -http://www.exploit-db.com/exploits/35439 -http://www.exploit-db.com/exploits/35459 -http://www.exploit-db.com/exploits/35463 -http://www.exploit-db.com/exploits/35505 -http://www.exploit-db.com/exploits/35510 -http://www.exploit-db.com/exploits/35528 -http://www.exploit-db.com/exploits/35589 -http://www.exploit-db.com/exploits/35591 -http://www.exploit-db.com/exploits/35625 -http://www.exploit-db.com/exploits/35730 -http://www.exploit-db.com/exploits/35742/ -http://www.exploit-db.com/exploits/35747 -http://www.exploit-db.com/exploits/35750 -http://www.exploit-db.com/exploits/35751 -http://www.exploit-db.com/exploits/35846 -http://www.exploit-db.com/exploits/35936 -http://www.exploit-db.com/exploits/35980 -http://www.exploit-db.com/exploits/36251 -http://www.exploit-db.com/exploits/36266 -http://www.exploit-db.com/exploits/36267 -http://www.exploit-db.com/exploits/36268 -http://www.exploit-db.com/exploits/36304 -http://www.exploit-db.com/exploits/36320 -http://www.exploit-db.com/exploits/37114 -http://www.exploit-db.com/exploits/4170 -http://www.exploit-db.com/exploits/8172 -http://www.exploit-db.com/exploits/8484 -http://www.exploit-db.com/exploits/8588 -http://www.exploit-db.com/exploits/8601 -http://www.exploit-db.com/exploits/8881 -http://www.exploit-db.com/exploits/9001 -http://www.exploit-db.com/exploits/9033 -http://www.exploit-db.com/exploits/9103 -http://www.exploit-db.com/exploits/9110 -http://www.exploit-db.com/exploits/9116 -http://www.exploit-db.com/exploits/9131 -http://www.exploit-db.com/exploits/9139 -http://www.exploit-db.com/exploits/9140 -http://www.exploit-db.com/exploits/9147 -http://www.exploit-db.com/exploits/9157 -http://www.exploit-db.com/exploits/9160 -http://www.exploit-db.com/exploits/9167 -http://www.exploit-db.com/exploits/9198 -http://www.exploit-db.com/exploits/9252 -http://www.exploit-db.com/exploits/9271 -http://www.exploit-db.com/exploits/9319 -http://www.exploit-db.com/exploits/9350 -http://www.exploit-db.com/exploits/9410 -http://www.exploit-db.com/exploits/9480 -http://www.exploit-db.com/exploits/9524 -http://www.exploit-db.com/exploits/9539 -http://www.exploit-db.com/exploits/9576 -http://www.exploit-db.com/exploits/9577 -http://www.exploit-db.com/exploits/9640 -http://www.exploit-db.com/exploits/9659 -http://www.exploit-db.com/exploits/9691 -http://www.exploit-db.com/exploits/9707 -http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt -http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt -http://www.exploitlabs.com/files/advisories/EXPL-A-2005-016-typsoft-ftpd.txt -http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt -http://www.exploitlabs.com/files/advisories/EXPL-A-2006-001-asptopsites.txt -http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog -http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog -http://www.foofus.net/?page_id=616 -http://www.freeipa.org/page/Downloads -http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm -http://www.freewebs.com/xxosfilexx/HungFPage.html -http://www.fuzzmyapp.com/advisories/FMA-2010-002/FMA-2010-002-EN.xml -http://www.g-sec.lu/one-bug-to-rule-them-all.html -http://www.gdssecurity.com/l/b/2009/08/20/adobe-flex-3-3-sdk-dom-based-xss/ -http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/ -http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of,20090402,8311 -http://www.gnucitizen.org/blog/0day-pdf-pwns-windows -http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox -http://www.gnucitizen.org/blog/backdooring-mp3-files/ -http://www.gnucitizen.org/blog/backdooring-quicktime-movies/ -http://www.gnucitizen.org/blog/backdooring-windows-media-files -http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/ -http://www.gnucitizen.org/blog/cross-context-scripting-with-sage -http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ -http://www.gnucitizen.org/blog/danger-danger-danger/ -http://www.gnucitizen.org/blog/firebug-goes-evil -http://www.gnucitizen.org/blog/ghost-busters/ -http://www.gnucitizen.org/blog/google-urchin-password-theft-madness -http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/ -http://www.gnucitizen.org/blog/hacking-the-interwebs/ -http://www.gnucitizen.org/blog/ie-pwns-secondlife -http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ -http://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues -http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html -http://www.hacker.co.il/security/ie/css_import.html -http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html -http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/ -http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/ -http://www.halfdog.net/Security/2015/MandbSymlinkLocalRootPrivilegeEscalation/ -http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ -http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/ -http://www.halfdog.net/Security/FuseTimerace/ -http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities -http://www.halock.com/blog/cve-2014-4980-parameter-tampering-nessus-web-ui/ -http://www.halock.com/blog/cve-2016-2046-cross-site-scripting-sophos-utm-9/ -http://www.hat-squad.com/en/000075.html -http://www.hat-squad.com/en/000102.html -http://www.hat-squad.com/en/000142.html -http://www.hat-squad.com/en/000164.html -http://www.hat-squad.com/en/000165.html -http://www.hat-squad.com/en/000170.html -http://www.hat-squad.com/en/000171.html -http://www.heise.de/newsticker/meldung/68981 -http://www.hitachi-support.com/security_e/vuls_e/HS06-005_e/index-e.html -http://www.homelab.it/index.php/2014/07/18/wordpress-gallery-objects-0-4-sql-injection/#sthash.ftMVwBVK.dpbs -http://www.homelab.it/index.php/2014/08/10/wordpress-gb-gallery-slideshow -http://www.homelab.it/index.php/2014/11/23/wordpress-wpdatatables-sql-injection-vulnerability -http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/ -http://www.ietf.org/mail-archive/web/tls/current/msg07553.html -http://www.igniterealtime.org/issues/browse/JM-1049 -http://www.igniterealtime.org/issues/browse/JM-1289 -http://www.igniterealtime.org/issues/browse/JM-1488 -http://www.igniterealtime.org/issues/browse/JM-1489 -http://www.igniterealtime.org/issues/browse/JM-1506 -http://www.igniterealtime.org/issues/browse/JM-629 -http://www.ikkisoft.com/stuff/LC-2008-07.txt -http://www.ikkisoft.com/stuff/LC-2009-01.txt -http://www.imagemagick.org/script/changelog.php -http://www.immunityinc.com/downloads/0day_IPO.pdf -http://www.imperialviolet.org/2011/09/23/chromeandbeast.html -http://www.infoworld.com/d/security-central/critical-vulnerability-patched-in-googles-chrome-599 -http://www.insinuator.net/2013/01/rails-yaml/ -http://www.integraxor.com/blog/security-issue-for-activex-enabled-browser-vulnerability-note -http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt -http://www.ja-sig.org/issues/browse/PHPCAS-52 -http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ -http://www.jianshu.com/p/35af80b97ee6 -http://www.jianshu.com/p/41ac7ac2a7af -http://www.kb.cert.org/vuls/id/100972 -http://www.kb.cert.org/vuls/id/101462 -http://www.kb.cert.org/vuls/id/101500 -http://www.kb.cert.org/vuls/id/103425 -http://www.kb.cert.org/vuls/id/110532 -http://www.kb.cert.org/vuls/id/110652 -http://www.kb.cert.org/vuls/id/111588 -http://www.kb.cert.org/vuls/id/112179 -http://www.kb.cert.org/vuls/id/112412 -http://www.kb.cert.org/vuls/id/113196 -http://www.kb.cert.org/vuls/id/118913 -http://www.kb.cert.org/vuls/id/122582 -http://www.kb.cert.org/vuls/id/122656 -http://www.kb.cert.org/vuls/id/123799 -http://www.kb.cert.org/vuls/id/125228 -http://www.kb.cert.org/vuls/id/131263 -http://www.kb.cert.org/vuls/id/134756 -http://www.kb.cert.org/vuls/id/143335 -http://www.kb.cert.org/vuls/id/143395 -http://www.kb.cert.org/vuls/id/143740 -http://www.kb.cert.org/vuls/id/144389 -http://www.kb.cert.org/vuls/id/154201 -http://www.kb.cert.org/vuls/id/155412 -http://www.kb.cert.org/vuls/id/158647 -http://www.kb.cert.org/vuls/id/160027 -http://www.kb.cert.org/vuls/id/160460 -http://www.kb.cert.org/vuls/id/162308 -http://www.kb.cert.org/vuls/id/168751 -http://www.kb.cert.org/vuls/id/174119 -http://www.kb.cert.org/vuls/id/177092 -http://www.kb.cert.org/vuls/id/180091 -http://www.kb.cert.org/vuls/id/180345 -http://www.kb.cert.org/vuls/id/184100 -http://www.kb.cert.org/vuls/id/189929 -http://www.kb.cert.org/vuls/id/194604 -http://www.kb.cert.org/vuls/id/196617 -http://www.kb.cert.org/vuls/id/203844 -http://www.kb.cert.org/vuls/id/204232 -http://www.kb.cert.org/vuls/id/204950 -http://www.kb.cert.org/vuls/id/204988 -http://www.kb.cert.org/vuls/id/207540 -http://www.kb.cert.org/vuls/id/208769 -http://www.kb.cert.org/vuls/id/209131 -http://www.kb.cert.org/vuls/id/212651 -http://www.kb.cert.org/vuls/id/214572 -http://www.kb.cert.org/vuls/id/217836 -http://www.kb.cert.org/vuls/id/217871 -http://www.kb.cert.org/vuls/id/219470 -http://www.kb.cert.org/vuls/id/221180 -http://www.kb.cert.org/vuls/id/22404 -http://www.kb.cert.org/vuls/id/225833 -http://www.kb.cert.org/vuls/id/228519 -http://www.kb.cert.org/vuls/id/228886 -http://www.kb.cert.org/vuls/id/229047 -http://www.kb.cert.org/vuls/id/229804 -http://www.kb.cert.org/vuls/id/233990 -http://www.kb.cert.org/vuls/id/241508 -http://www.kb.cert.org/vuls/id/246524 -http://www.kb.cert.org/vuls/id/247235 -http://www.kb.cert.org/vuls/id/248184 -http://www.kb.cert.org/vuls/id/248449 -http://www.kb.cert.org/vuls/id/248692 -http://www.kb.cert.org/vuls/id/251628 -http://www.kb.cert.org/vuls/id/251635 -http://www.kb.cert.org/vuls/id/251793 -http://www.kb.cert.org/vuls/id/252294 -http://www.kb.cert.org/vuls/id/253708 -http://www.kb.cert.org/vuls/id/261869 -http://www.kb.cert.org/vuls/id/264092 -http://www.kb.cert.org/vuls/id/264212 -http://www.kb.cert.org/vuls/id/264729 -http://www.kb.cert.org/vuls/id/265532 -http://www.kb.cert.org/vuls/id/267328 -http://www.kb.cert.org/vuls/id/268662 -http://www.kb.cert.org/vuls/id/269991 -http://www.kb.cert.org/vuls/id/270232 -http://www.kb.cert.org/vuls/id/274244 -http://www.kb.cert.org/vuls/id/276148 -http://www.kb.cert.org/vuls/id/278204 -http://www.kb.cert.org/vuls/id/279472 -http://www.kb.cert.org/vuls/id/280844 -http://www.kb.cert.org/vuls/id/294272 -http://www.kb.cert.org/vuls/id/295276 -http://www.kb.cert.org/vuls/id/298796 -http://www.kb.cert.org/vuls/id/301735 -http://www.kb.cert.org/vuls/id/301788 -http://www.kb.cert.org/vuls/id/302668 -http://www.kb.cert.org/vuls/id/303900 -http://www.kb.cert.org/vuls/id/304064 -http://www.kb.cert.org/vuls/id/305607 -http://www.kb.cert.org/vuls/id/309873 -http://www.kb.cert.org/vuls/id/315340 -http://www.kb.cert.org/vuls/id/316888 -http://www.kb.cert.org/vuls/id/318779 -http://www.kb.cert.org/vuls/id/319464 -http://www.kb.cert.org/vuls/id/325636 -http://www.kb.cert.org/vuls/id/326830 -http://www.kb.cert.org/vuls/id/332115 -http://www.kb.cert.org/vuls/id/335192 -http://www.kb.cert.org/vuls/id/338343 -http://www.kb.cert.org/vuls/id/339177 -http://www.kb.cert.org/vuls/id/343060 -http://www.kb.cert.org/vuls/id/345260 -http://www.kb.cert.org/vuls/id/346278 -http://www.kb.cert.org/vuls/id/346982 -http://www.kb.cert.org/vuls/id/348126 -http://www.kb.cert.org/vuls/id/350089 -http://www.kb.cert.org/vuls/id/350135 -http://www.kb.cert.org/vuls/id/350508 -http://www.kb.cert.org/vuls/id/356961 -http://www.kb.cert.org/vuls/id/357851 -http://www.kb.cert.org/vuls/id/359816 -http://www.kb.cert.org/vuls/id/360431 -http://www.kb.cert.org/vuls/id/361441 -http://www.kb.cert.org/vuls/id/365313 -http://www.kb.cert.org/vuls/id/367424 -http://www.kb.cert.org/vuls/id/374092 -http://www.kb.cert.org/vuls/id/374268 -http://www.kb.cert.org/vuls/id/377348 -http://www.kb.cert.org/vuls/id/377644 -http://www.kb.cert.org/vuls/id/377915 -http://www.kb.cert.org/vuls/id/381692 -http://www.kb.cert.org/vuls/id/381699 -http://www.kb.cert.org/vuls/id/389795 -http://www.kb.cert.org/vuls/id/394540 -http://www.kb.cert.org/vuls/id/395981 -http://www.kb.cert.org/vuls/id/405942 -http://www.kb.cert.org/vuls/id/406596 -http://www.kb.cert.org/vuls/id/408099 -http://www.kb.cert.org/vuls/id/415294 -http://www.kb.cert.org/vuls/id/418072 -http://www.kb.cert.org/vuls/id/419568 -http://www.kb.cert.org/vuls/id/427547 -http://www.kb.cert.org/vuls/id/428280 -http://www.kb.cert.org/vuls/id/431726 -http://www.kb.cert.org/vuls/id/432608 -http://www.kb.cert.org/vuls/id/436214 -http://www.kb.cert.org/vuls/id/437385 -http://www.kb.cert.org/vuls/id/441363 -http://www.kb.cert.org/vuls/id/442497 -http://www.kb.cert.org/vuls/id/442595 -http://www.kb.cert.org/vuls/id/443060 -http://www.kb.cert.org/vuls/id/444513 -http://www.kb.cert.org/vuls/id/447516 -http://www.kb.cert.org/vuls/id/449452 -http://www.kb.cert.org/vuls/id/450646 -http://www.kb.cert.org/vuls/id/458007 -http://www.kb.cert.org/vuls/id/459446 -http://www.kb.cert.org/vuls/id/460687 -http://www.kb.cert.org/vuls/id/466876 -http://www.kb.cert.org/vuls/id/471364 -http://www.kb.cert.org/vuls/id/485324 -http://www.kb.cert.org/vuls/id/485744 -http://www.kb.cert.org/vuls/id/486225 -http://www.kb.cert.org/vuls/id/489228 -http://www.kb.cert.org/vuls/id/498348 -http://www.kb.cert.org/vuls/id/504019 -http://www.kb.cert.org/vuls/id/505120 -http://www.kb.cert.org/vuls/id/505560 -http://www.kb.cert.org/vuls/id/511404 -http://www.kb.cert.org/vuls/id/513062 -http://www.kb.cert.org/vuls/id/515283 -http://www.kb.cert.org/vuls/id/516627 -http://www.kb.cert.org/vuls/id/518518 -http://www.kb.cert.org/vuls/id/519137 -http://www.kb.cert.org/vuls/id/520721 -http://www.kb.cert.org/vuls/id/521348 -http://www.kb.cert.org/vuls/id/521612 -http://www.kb.cert.org/vuls/id/525276 -http://www.kb.cert.org/vuls/id/533894 -http://www.kb.cert.org/vuls/id/534407 -http://www.kb.cert.org/vuls/id/534710 -http://www.kb.cert.org/vuls/id/537684 -http://www.kb.cert.org/vuls/id/542123 -http://www.kb.cert.org/vuls/id/544527 -http://www.kb.cert.org/vuls/id/546340 -http://www.kb.cert.org/vuls/id/546769 -http://www.kb.cert.org/vuls/id/549807 -http://www.kb.cert.org/vuls/id/550620 -http://www.kb.cert.org/vuls/id/551715 -http://www.kb.cert.org/vuls/id/551972 -http://www.kb.cert.org/vuls/id/552286 -http://www.kb.cert.org/vuls/id/554257 -http://www.kb.cert.org/vuls/id/555668 -http://www.kb.cert.org/vuls/id/555984 -http://www.kb.cert.org/vuls/id/558132 -http://www.kb.cert.org/vuls/id/561444 -http://www.kb.cert.org/vuls/id/565580 -http://www.kb.cert.org/vuls/id/567620 -http://www.kb.cert.org/vuls/id/568153 -http://www.kb.cert.org/vuls/id/571068 -http://www.kb.cert.org/vuls/id/573356 -http://www.kb.cert.org/vuls/id/573848 -http://www.kb.cert.org/vuls/id/577140 -http://www.kb.cert.org/vuls/id/582879 -http://www.kb.cert.org/vuls/id/584653 -http://www.kb.cert.org/vuls/id/586503 -http://www.kb.cert.org/vuls/id/586958 -http://www.kb.cert.org/vuls/id/589272 -http://www.kb.cert.org/vuls/id/591667 -http://www.kb.cert.org/vuls/id/595142 -http://www.kb.cert.org/vuls/id/595884 -http://www.kb.cert.org/vuls/id/596990 -http://www.kb.cert.org/vuls/id/602540 -http://www.kb.cert.org/vuls/id/603276 -http://www.kb.cert.org/vuls/id/612076 -http://www.kb.cert.org/vuls/id/613886 -http://www.kb.cert.org/vuls/id/615910 -http://www.kb.cert.org/vuls/id/622950 -http://www.kb.cert.org/vuls/id/631788 -http://www.kb.cert.org/vuls/id/632140 -http://www.kb.cert.org/vuls/id/637068 -http://www.kb.cert.org/vuls/id/639620 -http://www.kb.cert.org/vuls/id/646748 -http://www.kb.cert.org/vuls/id/648646 -http://www.kb.cert.org/vuls/id/655100 -http://www.kb.cert.org/vuls/id/656302 -http://www.kb.cert.org/vuls/id/657622 -http://www.kb.cert.org/vuls/id/659615 -http://www.kb.cert.org/vuls/id/659684 -http://www.kb.cert.org/vuls/id/665280 -http://www.kb.cert.org/vuls/id/667340 -http://www.kb.cert.org/vuls/id/673313 -http://www.kb.cert.org/vuls/id/675052 -http://www.kb.cert.org/vuls/id/682704 -http://www.kb.cert.org/vuls/id/687278 -http://www.kb.cert.org/vuls/id/688812 -http://www.kb.cert.org/vuls/id/695940 -http://www.kb.cert.org/vuls/id/698278 -http://www.kb.cert.org/vuls/id/702452 -http://www.kb.cert.org/vuls/id/704828 -http://www.kb.cert.org/vuls/id/706359 -http://www.kb.cert.org/vuls/id/709806 -http://www.kb.cert.org/vuls/id/709939 -http://www.kb.cert.org/vuls/id/713312 -http://www.kb.cert.org/vuls/id/727318 -http://www.kb.cert.org/vuls/id/732115 -http://www.kb.cert.org/vuls/id/735416 -http://www.kb.cert.org/vuls/id/740372 -http://www.kb.cert.org/vuls/id/740636 -http://www.kb.cert.org/vuls/id/742932 -http://www.kb.cert.org/vuls/id/743555 -http://www.kb.cert.org/vuls/id/751328 -http://www.kb.cert.org/vuls/id/751808 -http://www.kb.cert.org/vuls/id/754056 -http://www.kb.cert.org/vuls/id/763795 -http://www.kb.cert.org/vuls/id/767044 -http://www.kb.cert.org/vuls/id/772676 -http://www.kb.cert.org/vuls/id/773035 -http://www.kb.cert.org/vuls/id/774788 -http://www.kb.cert.org/vuls/id/777007 -http://www.kb.cert.org/vuls/id/777024 -http://www.kb.cert.org/vuls/id/778696 -http://www.kb.cert.org/vuls/id/782451 -http://www.kb.cert.org/vuls/id/785823 -http://www.kb.cert.org/vuls/id/785838 -http://www.kb.cert.org/vuls/id/787252 -http://www.kb.cert.org/vuls/id/788478 -http://www.kb.cert.org/vuls/id/794095 -http://www.kb.cert.org/vuls/id/795644 -http://www.kb.cert.org/vuls/id/797896 -http://www.kb.cert.org/vuls/id/802596 -http://www.kb.cert.org/vuls/id/806908 -http://www.kb.cert.org/vuls/id/807134 -http://www.kb.cert.org/vuls/id/810572 -http://www.kb.cert.org/vuls/id/812969 -http://www.kb.cert.org/vuls/id/813382 -http://www.kb.cert.org/vuls/id/813631 -http://www.kb.cert.org/vuls/id/815532 -http://www.kb.cert.org/vuls/id/823452 -http://www.kb.cert.org/vuls/id/842252 -http://www.kb.cert.org/vuls/id/842780 -http://www.kb.cert.org/vuls/id/843044 -http://www.kb.cert.org/vuls/id/851777 -http://www.kb.cert.org/vuls/id/852879 -http://www.kb.cert.org/vuls/id/856152 -http://www.kb.cert.org/vuls/id/857948 -http://www.kb.cert.org/vuls/id/862384 -http://www.kb.cert.org/vuls/id/863369 -http://www.kb.cert.org/vuls/id/866432 -http://www.kb.cert.org/vuls/id/867980 -http://www.kb.cert.org/vuls/id/868948 -http://www.kb.cert.org/vuls/id/869702 -http://www.kb.cert.org/vuls/id/871148 -http://www.kb.cert.org/vuls/id/872545 -http://www.kb.cert.org/vuls/id/876780 -http://www.kb.cert.org/vuls/id/882207 -http://www.kb.cert.org/vuls/id/882286 -http://www.kb.cert.org/vuls/id/882841 -http://www.kb.cert.org/vuls/id/884840 -http://www.kb.cert.org/vuls/id/887409 -http://www.kb.cert.org/vuls/id/887861 -http://www.kb.cert.org/vuls/id/889195 -http://www.kb.cert.org/vuls/id/895524 -http://www.kb.cert.org/vuls/id/897144 -http://www.kb.cert.org/vuls/id/898083 -http://www.kb.cert.org/vuls/id/899080 -http://www.kb.cert.org/vuls/id/901156 -http://www.kb.cert.org/vuls/id/902790 -http://www.kb.cert.org/vuls/id/906576 -http://www.kb.cert.org/vuls/id/909022 -http://www.kb.cert.org/vuls/id/911878 -http://www.kb.cert.org/vuls/id/912036 -http://www.kb.cert.org/vuls/id/912156 -http://www.kb.cert.org/vuls/id/913483 -http://www.kb.cert.org/vuls/id/917348 -http://www.kb.cert.org/vuls/id/918568 -http://www.kb.cert.org/vuls/id/919604 -http://www.kb.cert.org/vuls/id/923508 -http://www.kb.cert.org/vuls/id/924124 -http://www.kb.cert.org/vuls/id/939605 -http://www.kb.cert.org/vuls/id/940439 -http://www.kb.cert.org/vuls/id/941108 -http://www.kb.cert.org/vuls/id/950795 -http://www.kb.cert.org/vuls/id/953183 -http://www.kb.cert.org/vuls/id/957036 -http://www.kb.cert.org/vuls/id/960193 -http://www.kb.cert.org/vuls/id/960908 -http://www.kb.cert.org/vuls/id/966927 -http://www.kb.cert.org/vuls/id/976534 -http://www.kb.cert.org/vuls/id/977312 -http://www.kb.cert.org/vuls/id/978508 -http://www.kb.cert.org/vuls/id/978652 -http://www.kb.cert.org/vuls/id/985625 -http://www.kb.cert.org/vuls/id/989684 -http://www.kb.cert.org/vuls/id/990652 -http://www.kb.cert.org/vuls/id/999708 -http://www.kb.cert.org/vuls/id/BLUU-97KQ26 -http://www.kb.cert.org/vuls/id/BLUU-97KQ2C -http://www.kb.cert.org/vuls/id/BLUU-985QRC -http://www.kb.cert.org/vuls/id/BLUU-985QRV -http://www.kb.cert.org/vuls/id/BLUU-985QS8 -http://www.kb.cert.org/vuls/id/BLUU-985QSE -http://www.kb.cert.org/vuls/id/BLUU-985QTG -http://www.kb.cert.org/vuls/id/BLUU-985QUQ -http://www.kb.cert.org/vuls/id/BLUU-98MS25 -http://www.kb.cert.org/vuls/id/BLUU-997M5B -http://www.kb.cert.org/vuls/id/BLUU-99HSLA -http://www.kb.cert.org/vuls/id/BLUU-9RDQHM -http://www.kb.cert.org/vuls/id/BLUU-9TLSHD -http://www.kb.cert.org/vuls/id/BLUU-9VBU45 -http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L -http://www.kb.cert.org/vuls/id/BLUU-A3NQAL -http://www.kb.cert.org/vuls/id/BLUU-A9SQRS -http://www.kb.cert.org/vuls/id/BLUU-A9WQVP -http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ -http://www.kb.cert.org/vuls/id/JLAD-9X4SPN -http://www.kb.cert.org/vuls/id/JLAD-ABMPVA -http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 -http://www.kb.cert.org/vuls/id/MAPG-8NVRPY -http://www.kb.cert.org/vuls/id/MAPG-8R5LD6 -http://www.kb.cert.org/vuls/id/MAPG-8RCPEN -http://www.kb.cert.org/vuls/id/MAPG-8RJPJX -http://www.kb.cert.org/vuls/id/MAPG-8RQL83 -http://www.kb.cert.org/vuls/id/MAPG-8TJKAF -http://www.kb.cert.org/vuls/id/MAPG-8TWMEJ -http://www.kb.cert.org/vuls/id/MIMG-6ZKP4T -http://www.kb.cert.org/vuls/id/MORO-8QNJLE -http://www.kb.cert.org/vuls/id/MORO-8UYN8P -http://www.kb.cert.org/vuls/id/MORO-8WKGBN -http://www.kde.org/info/security/advisory-20070109-1.txt -http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 -http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 -http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 -http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.2 -http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8 -http://www.madirish.net/538 -http://www.madirish.net/541 -http://www.madirish.net/550 -http://www.madirish.net/551 -http://www.madirish.net/554 -http://www.madirish.net/557 -http://www.madirish.net/559 -http://www.madirish.net/?article=251 -http://www.madirish.net/?article=440 -http://www.madirish.net/?article=441 -http://www.madirish.net/?article=442 -http://www.madirish.net/?article=452 -http://www.madirish.net/?article=456 -http://www.madirish.net/?article=457 -http://www.madirish.net/?article=458 -http://www.madirish.net/?article=460 -http://www.madirish.net/?article=461 -http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html -http://www.mantisbt.org/bugs/view.php?id=13191 -http://www.mantisbt.org/bugs/view.php?id=13281 -http://www.mantisbt.org/bugs/view.php?id=9154 -http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html -http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/ -http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:02.txt -http://www.mindedsecurity.com/MSA01150108.html -http://www.mindedsecurity.com/MSA01240108.html -http://www.mindedsecurity.com/labs/advisories/MSA01110707 -http://www.modzero.ch/advisories/MZ-13-04-Blackberry_Z10-File-Exchange-Authentication-By-Pass.txt -http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt -http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt -http://www.mozilla.org/security/announce/2006/mfsa2006-37.html -http://www.mozilla.org/security/announce/2006/mfsa2006-41.html -http://www.mozilla.org/security/announce/2007/mfsa2007-37.html -http://www.mozilla.org/security/announce/2010/mfsa2010-76.html -http://www.mozilla.org/security/announce/mfsa2005-40.html -http://www.mozilla.org/security/announce/mfsa2005-50.html -http://www.mpg123.de/cgi-bin/news.cgi -http://www.n00bz.net/antivirus-cve -http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/ -http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/ -http://www.netragard.com/pdfs/research/ATMAIL-XSRF-ADVISORY-20061206.txt -http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt -http://www.netragard.com/pdfs/research/HP-TRU64-LIBPTHREAD-20060811.txt -http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt -http://www.netragard.com/pdfs/research/NETRAGARD-20070628-MAILGUARD.txt -http://www.netragard.com/pdfs/research/ROXIO_RACE_NETRAGARD-20060624.txt -http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt -http://www.nth-dimension.org.uk/pub/NDSA20110310.txt.asc -http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc -http://www.ocert.org/advisories/ocert-2008-007.html -http://www.ocert.org/advisories/ocert-2008-009.html -http://www.ocert.org/advisories/ocert-2008-013.html -http://www.ocert.org/advisories/ocert-2009-008.html -http://www.ocert.org/advisories/ocert-2009-009.html -http://www.ocert.org/advisories/ocert-2009-012.html -http://www.ocert.org/advisories/ocert-2009-013.html -http://www.ocert.org/advisories/ocert-2009-016.html -http://www.ocert.org/advisories/ocert-2009-019.html -http://www.ocert.org/advisories/ocert-2010-002.html -http://www.ocert.org/advisories/ocert-2010-004.html -http://www.ocert.org/advisories/ocert-2011-001.html -http://www.ocert.org/advisories/ocert-2011-003.html -http://www.ocert.org/advisories/ocert-2012-001.html -http://www.ocert.org/advisories/ocert-2014-006.html -http://www.oliverkarow.de/research/WebWasherCONNECT.txt -http://www.oliverkarow.de/research/mailscan.txt -http://www.openoffice.org/security/cves/CVE-2015-4551.html -http://www.openoffice.org/security/cves/CVE-2015-5212.html -http://www.openoffice.org/security/cves/CVE-2015-5213.html -http://www.openoffice.org/security/cves/CVE-2015-5214.html -http://www.openoffice.org/security/cves/CVE-2016-1513.html -http://www.openoffice.org/security/cves/CVE-2017-9806.html -http://www.openwall.com/lists/oss-security/2008/07/03/4 -http://www.openwall.com/lists/oss-security/2008/07/08/8 -http://www.openwall.com/lists/oss-security/2008/07/12/3 -http://www.openwall.com/lists/oss-security/2008/09/03/3 -http://www.openwall.com/lists/oss-security/2008/09/11/3 -http://www.openwall.com/lists/oss-security/2008/10/03/7 -http://www.openwall.com/lists/oss-security/2008/10/03/8 -http://www.openwall.com/lists/oss-security/2008/10/15/1 -http://www.openwall.com/lists/oss-security/2008/10/29/3 -http://www.openwall.com/lists/oss-security/2008/11/01/2 -http://www.openwall.com/lists/oss-security/2008/11/05/2 -http://www.openwall.com/lists/oss-security/2008/11/05/3 -http://www.openwall.com/lists/oss-security/2008/11/20/1 -http://www.openwall.com/lists/oss-security/2008/11/20/4 -http://www.openwall.com/lists/oss-security/2009/04/01/10 -http://www.openwall.com/lists/oss-security/2009/07/03/1 -http://www.openwall.com/lists/oss-security/2009/07/25/3 -http://www.openwall.com/lists/oss-security/2009/09/09/1 -http://www.openwall.com/lists/oss-security/2009/09/25/1 -http://www.openwall.com/lists/oss-security/2009/10/22/3 -http://www.openwall.com/lists/oss-security/2009/10/22/6 -http://www.openwall.com/lists/oss-security/2009/10/23/8 -http://www.openwall.com/lists/oss-security/2009/11/20/7 -http://www.openwall.com/lists/oss-security/2009/12/17/5 -http://www.openwall.com/lists/oss-security/2010/04/08/9 -http://www.openwall.com/lists/oss-security/2010/04/14/3 -http://www.openwall.com/lists/oss-security/2010/07/20/2 -http://www.openwall.com/lists/oss-security/2010/07/21/8 -http://www.openwall.com/lists/oss-security/2010/08/19/6 -http://www.openwall.com/lists/oss-security/2010/09/28/4 -http://www.openwall.com/lists/oss-security/2010/12/03/2 -http://www.openwall.com/lists/oss-security/2010/12/06/8 -http://www.openwall.com/lists/oss-security/2011/01/31/4 -http://www.openwall.com/lists/oss-security/2011/01/31/8 -http://www.openwall.com/lists/oss-security/2011/03/13/8 -http://www.openwall.com/lists/oss-security/2011/03/14/22 -http://www.openwall.com/lists/oss-security/2011/03/18/3 -http://www.openwall.com/lists/oss-security/2011/03/18/5 -http://www.openwall.com/lists/oss-security/2011/03/18/8 -http://www.openwall.com/lists/oss-security/2011/03/23/7 -http://www.openwall.com/lists/oss-security/2011/03/23/8 -http://www.openwall.com/lists/oss-security/2011/03/23/9 -http://www.openwall.com/lists/oss-security/2011/03/30/6 -http://www.openwall.com/lists/oss-security/2011/03/30/7 -http://www.openwall.com/lists/oss-security/2011/03/30/8 -http://www.openwall.com/lists/oss-security/2011/06/28/4 -http://www.openwall.com/lists/oss-security/2011/06/29/12 -http://www.openwall.com/lists/oss-security/2011/07/13/3 -http://www.openwall.com/lists/oss-security/2011/07/13/5 -http://www.openwall.com/lists/oss-security/2011/07/18/3 -http://www.openwall.com/lists/oss-security/2011/07/19/5 -http://www.openwall.com/lists/oss-security/2011/07/20/2 -http://www.openwall.com/lists/oss-security/2011/07/22/1 -http://www.openwall.com/lists/oss-security/2011/07/22/5 -http://www.openwall.com/lists/oss-security/2011/07/28/1 -http://www.openwall.com/lists/oss-security/2011/08/12/6 -http://www.openwall.com/lists/oss-security/2011/11/07/9 -http://www.openwall.com/lists/oss-security/2011/11/22/10 -http://www.openwall.com/lists/oss-security/2011/11/22/3 -http://www.openwall.com/lists/oss-security/2011/11/22/7 -http://www.openwall.com/lists/oss-security/2011/11/25/4 -http://www.openwall.com/lists/oss-security/2012/02/02/10 -http://www.openwall.com/lists/oss-security/2012/02/12/3 -http://www.openwall.com/lists/oss-security/2012/02/12/4 -http://www.openwall.com/lists/oss-security/2012/02/13/5 -http://www.openwall.com/lists/oss-security/2012/02/13/6 -http://www.openwall.com/lists/oss-security/2012/02/18/1 -http://www.openwall.com/lists/oss-security/2012/02/20/10 -http://www.openwall.com/lists/oss-security/2012/02/20/11 -http://www.openwall.com/lists/oss-security/2012/02/20/5 -http://www.openwall.com/lists/oss-security/2012/02/20/6 -http://www.openwall.com/lists/oss-security/2012/03/05/14 -http://www.openwall.com/lists/oss-security/2012/03/05/15 -http://www.openwall.com/lists/oss-security/2012/03/05/21 -http://www.openwall.com/lists/oss-security/2012/03/05/23 -http://www.openwall.com/lists/oss-security/2012/03/21/11 -http://www.openwall.com/lists/oss-security/2012/03/26/4 -http://www.openwall.com/lists/oss-security/2012/03/29/3 -http://www.openwall.com/lists/oss-security/2012/04/13/4 -http://www.openwall.com/lists/oss-security/2012/04/15/1 -http://www.openwall.com/lists/oss-security/2012/04/17/1 -http://www.openwall.com/lists/oss-security/2012/04/18/7 -http://www.openwall.com/lists/oss-security/2012/04/22/4 -http://www.openwall.com/lists/oss-security/2012/04/23/1 -http://www.openwall.com/lists/oss-security/2012/05/29/10 -http://www.openwall.com/lists/oss-security/2012/05/29/7 -http://www.openwall.com/lists/oss-security/2012/05/31/1 -http://www.openwall.com/lists/oss-security/2012/07/09/4 -http://www.openwall.com/lists/oss-security/2012/07/10/1 -http://www.openwall.com/lists/oss-security/2012/07/11/16 -http://www.openwall.com/lists/oss-security/2012/08/13/7 -http://www.openwall.com/lists/oss-security/2012/08/14/1 -http://www.openwall.com/lists/oss-security/2012/09/06/4 -http://www.openwall.com/lists/oss-security/2012/10/09/4 -http://www.openwall.com/lists/oss-security/2012/12/02/3 -http://www.openwall.com/lists/oss-security/2012/12/02/4 -http://www.openwall.com/lists/oss-security/2012/12/20/3 -http://www.openwall.com/lists/oss-security/2013/01/08/3 -http://www.openwall.com/lists/oss-security/2013/01/29/8 -http://www.openwall.com/lists/oss-security/2013/02/14/4 -http://www.openwall.com/lists/oss-security/2013/02/15/16 -http://www.openwall.com/lists/oss-security/2013/02/15/3 -http://www.openwall.com/lists/oss-security/2013/02/24/3 -http://www.openwall.com/lists/oss-security/2013/03/10/1 -http://www.openwall.com/lists/oss-security/2013/03/10/2 -http://www.openwall.com/lists/oss-security/2013/04/29/1 -http://www.openwall.com/lists/oss-security/2013/04/29/10 -http://www.openwall.com/lists/oss-security/2013/04/29/11 -http://www.openwall.com/lists/oss-security/2013/04/29/13 -http://www.openwall.com/lists/oss-security/2013/05/18/4 -http://www.openwall.com/lists/oss-security/2013/06/13/7 -http://www.openwall.com/lists/oss-security/2013/06/14/11 -http://www.openwall.com/lists/oss-security/2013/06/30/7 -http://www.openwall.com/lists/oss-security/2013/07/15/9 -http://www.openwall.com/lists/oss-security/2013/07/26/5 -http://www.openwall.com/lists/oss-security/2013/09/09/10 -http://www.openwall.com/lists/oss-security/2013/09/18/4 -http://www.openwall.com/lists/oss-security/2013/09/18/6 -http://www.openwall.com/lists/oss-security/2013/10/29/1 -http://www.openwall.com/lists/oss-security/2013/12/03/1 -http://www.openwall.com/lists/oss-security/2013/12/03/6 -http://www.openwall.com/lists/oss-security/2014/01/31/2 -http://www.openwall.com/lists/oss-security/2014/02/03/14 -http://www.openwall.com/lists/oss-security/2014/03/10/8 -http://www.openwall.com/lists/oss-security/2014/05/09/2 -http://www.openwall.com/lists/oss-security/2014/05/14/3 -http://www.openwall.com/lists/oss-security/2014/05/14/5 -http://www.openwall.com/lists/oss-security/2014/05/23/1 -http://www.openwall.com/lists/oss-security/2014/05/28/1 -http://www.openwall.com/lists/oss-security/2014/06/15/1 -http://www.openwall.com/lists/oss-security/2014/06/24/16 -http://www.openwall.com/lists/oss-security/2014/07/04/4 -http://www.openwall.com/lists/oss-security/2014/07/23/6 -http://www.openwall.com/lists/oss-security/2014/08/27/4 -http://www.openwall.com/lists/oss-security/2014/09/02/3 -http://www.openwall.com/lists/oss-security/2014/09/23/5 -http://www.openwall.com/lists/oss-security/2014/10/08/21 -http://www.openwall.com/lists/oss-security/2014/10/15/23 -http://www.openwall.com/lists/oss-security/2014/10/17/11 -http://www.openwall.com/lists/oss-security/2014/10/20/9 -http://www.openwall.com/lists/oss-security/2014/10/21/1 -http://www.openwall.com/lists/oss-security/2014/10/21/4 -http://www.openwall.com/lists/oss-security/2014/10/23/7 -http://www.openwall.com/lists/oss-security/2014/10/29/7 -http://www.openwall.com/lists/oss-security/2015/01/11/7 -http://www.openwall.com/lists/oss-security/2015/01/27/27 -http://www.openwall.com/lists/oss-security/2015/01/27/6 -http://www.openwall.com/lists/oss-security/2015/02/12/16 -http://www.openwall.com/lists/oss-security/2015/02/18/7 -http://www.openwall.com/lists/oss-security/2015/02/18/9 -http://www.openwall.com/lists/oss-security/2015/03/21/1 -http://www.openwall.com/lists/oss-security/2015/03/26/1 -http://www.openwall.com/lists/oss-security/2015/04/08/11 -http://www.openwall.com/lists/oss-security/2015/04/08/8 -http://www.openwall.com/lists/oss-security/2015/04/17/4 -http://www.openwall.com/lists/oss-security/2015/05/29/1 -http://www.openwall.com/lists/oss-security/2015/06/03/3 -http://www.openwall.com/lists/oss-security/2015/06/04/2 -http://www.openwall.com/lists/oss-security/2015/06/12/4 -http://www.openwall.com/lists/oss-security/2015/06/21/2 -http://www.openwall.com/lists/oss-security/2015/07/14/4 -http://www.openwall.com/lists/oss-security/2015/07/21/5 -http://www.openwall.com/lists/oss-security/2015/08/20/8 -http://www.openwall.com/lists/oss-security/2015/10/01/8 -http://www.openwall.com/lists/oss-security/2015/10/05/7 -http://www.openwall.com/lists/oss-security/2015/10/27/3 -http://www.openwall.com/lists/oss-security/2015/10/27/6 -http://www.openwall.com/lists/oss-security/2015/11/06/4 -http://www.openwall.com/lists/oss-security/2015/12/09/5 -http://www.openwall.com/lists/oss-security/2015/12/17/1 -http://www.openwall.com/lists/oss-security/2015/12/17/10 -http://www.openwall.com/lists/oss-security/2015/12/17/11 -http://www.openwall.com/lists/oss-security/2015/12/17/12 -http://www.openwall.com/lists/oss-security/2015/12/18/5 -http://www.openwall.com/lists/oss-security/2015/12/24/2 -http://www.openwall.com/lists/oss-security/2015/12/25/1 -http://www.openwall.com/lists/oss-security/2016/01/07/10 -http://www.openwall.com/lists/oss-security/2016/01/13/2 -http://www.openwall.com/lists/oss-security/2016/01/13/6 -http://www.openwall.com/lists/oss-security/2016/01/14/7 -http://www.openwall.com/lists/oss-security/2016/01/14/8 -http://www.openwall.com/lists/oss-security/2016/01/18/4 -http://www.openwall.com/lists/oss-security/2016/01/19/3 -http://www.openwall.com/lists/oss-security/2016/01/24/8 -http://www.openwall.com/lists/oss-security/2016/01/25/6 -http://www.openwall.com/lists/oss-security/2016/01/26/7 -http://www.openwall.com/lists/oss-security/2016/01/28/4 -http://www.openwall.com/lists/oss-security/2016/02/03/5 -http://www.openwall.com/lists/oss-security/2016/02/26/2 -http://www.openwall.com/lists/oss-security/2016/03/10/13 -http://www.openwall.com/lists/oss-security/2016/03/15/11 -http://www.openwall.com/lists/oss-security/2016/04/08/12 -http://www.openwall.com/lists/oss-security/2016/04/11/3 -http://www.openwall.com/lists/oss-security/2016/04/12/1 -http://www.openwall.com/lists/oss-security/2016/04/12/2 -http://www.openwall.com/lists/oss-security/2016/04/27/6 -http://www.openwall.com/lists/oss-security/2016/04/28/1 -http://www.openwall.com/lists/oss-security/2016/04/29/1 -http://www.openwall.com/lists/oss-security/2016/05/03/13 -http://www.openwall.com/lists/oss-security/2016/05/03/18 -http://www.openwall.com/lists/oss-security/2016/05/24/1 -http://www.openwall.com/lists/oss-security/2016/06/11/4 -http://www.openwall.com/lists/oss-security/2016/06/15/9 -http://www.openwall.com/lists/oss-security/2016/06/23/1 -http://www.openwall.com/lists/oss-security/2016/06/28/7 -http://www.openwall.com/lists/oss-security/2016/06/29/3 -http://www.openwall.com/lists/oss-security/2016/07/14/5 -http://www.openwall.com/lists/oss-security/2016/07/21/1 -http://www.openwall.com/lists/oss-security/2016/07/21/2 -http://www.openwall.com/lists/oss-security/2016/07/21/6 -http://www.openwall.com/lists/oss-security/2016/07/22/1 -http://www.openwall.com/lists/oss-security/2016/07/26/6 -http://www.openwall.com/lists/oss-security/2016/07/26/8 -http://www.openwall.com/lists/oss-security/2016/07/28/13 -http://www.openwall.com/lists/oss-security/2016/07/28/15 -http://www.openwall.com/lists/oss-security/2016/07/31/6 -http://www.openwall.com/lists/oss-security/2016/08/02/3 -http://www.openwall.com/lists/oss-security/2016/08/12/6 -http://www.openwall.com/lists/oss-security/2016/08/23/9 -http://www.openwall.com/lists/oss-security/2016/09/08/19 -http://www.openwall.com/lists/oss-security/2016/09/08/24 -http://www.openwall.com/lists/oss-security/2016/09/08/3 -http://www.openwall.com/lists/oss-security/2016/09/12/3 -http://www.openwall.com/lists/oss-security/2016/09/13/5 -http://www.openwall.com/lists/oss-security/2016/09/18/4 -http://www.openwall.com/lists/oss-security/2016/09/22/6 -http://www.openwall.com/lists/oss-security/2016/09/26/3 -http://www.openwall.com/lists/oss-security/2016/09/26/6 -http://www.openwall.com/lists/oss-security/2016/09/26/8 -http://www.openwall.com/lists/oss-security/2016/09/28/2 -http://www.openwall.com/lists/oss-security/2016/09/28/4 -http://www.openwall.com/lists/oss-security/2016/09/28/9 -http://www.openwall.com/lists/oss-security/2016/09/29/11 -http://www.openwall.com/lists/oss-security/2016/09/30/1 -http://www.openwall.com/lists/oss-security/2016/09/30/5 -http://www.openwall.com/lists/oss-security/2016/10/05/16 -http://www.openwall.com/lists/oss-security/2016/10/12/10 -http://www.openwall.com/lists/oss-security/2016/10/12/6 -http://www.openwall.com/lists/oss-security/2016/10/12/7 -http://www.openwall.com/lists/oss-security/2016/10/12/8 -http://www.openwall.com/lists/oss-security/2016/10/23/6 -http://www.openwall.com/lists/oss-security/2016/11/18/12 -http://www.openwall.com/lists/oss-security/2016/11/18/13 -http://www.openwall.com/lists/oss-security/2016/11/19/6 -http://www.openwall.com/lists/oss-security/2016/11/19/7 -http://www.openwall.com/lists/oss-security/2016/11/20/1 -http://www.openwall.com/lists/oss-security/2016/11/30/3 -http://www.openwall.com/lists/oss-security/2016/12/01/2 -http://www.openwall.com/lists/oss-security/2016/12/01/4 -http://www.openwall.com/lists/oss-security/2016/12/01/5 -http://www.openwall.com/lists/oss-security/2016/12/01/6 -http://www.openwall.com/lists/oss-security/2016/12/01/7 -http://www.openwall.com/lists/oss-security/2016/12/01/8 -http://www.openwall.com/lists/oss-security/2016/12/04/3 -http://www.openwall.com/lists/oss-security/2016/12/05/8 -http://www.openwall.com/lists/oss-security/2017/01/01/7 -http://www.openwall.com/lists/oss-security/2017/01/16/1 -http://www.openwall.com/lists/oss-security/2017/01/16/3 -http://www.openwall.com/lists/oss-security/2017/01/16/5 -http://www.openwall.com/lists/oss-security/2017/01/22/2 -http://www.openwall.com/lists/oss-security/2017/01/27/7 -http://www.openwall.com/lists/oss-security/2017/02/01/12 -http://www.openwall.com/lists/oss-security/2017/02/01/14 -http://www.openwall.com/lists/oss-security/2017/02/04/1 -http://www.openwall.com/lists/oss-security/2017/02/06/3 -http://www.openwall.com/lists/oss-security/2017/02/18/1 -http://www.openwall.com/lists/oss-security/2017/03/07/6 -http://www.openwall.com/lists/oss-security/2017/03/23/4 -http://www.openwall.com/lists/oss-security/2017/03/23/5 -http://www.openwall.com/lists/oss-security/2017/03/23/6 -http://www.openwall.com/lists/oss-security/2017/04/18/5 -http://www.openwall.com/lists/oss-security/2017/05/01/14 -http://www.openwall.com/lists/oss-security/2017/05/03/7 -http://www.openwall.com/lists/oss-security/2017/05/03/8 -http://www.openwall.com/lists/oss-security/2017/05/10/3 -http://www.openwall.com/lists/oss-security/2017/06/12/2 -http://www.openwall.com/lists/oss-security/2017/06/25/2 -http://www.openwall.com/lists/oss-security/2017/06/30/1 -http://www.openwall.com/lists/oss-security/2017/07/13/1 -http://www.openwall.com/lists/oss-security/2017/08/14/1 -http://www.openwall.com/lists/oss-security/2017/08/15/8 -http://www.openwall.com/lists/oss-security/2017/08/16/2 -http://www.openwall.com/lists/oss-security/2017/08/16/3 -http://www.openwall.com/lists/oss-security/2017/08/17/10 -http://www.openwall.com/lists/oss-security/2017/08/17/11 -http://www.openwall.com/lists/oss-security/2017/08/17/12 -http://www.openwall.com/lists/oss-security/2017/08/17/13 -http://www.openwall.com/lists/oss-security/2017/08/17/14 -http://www.openwall.com/lists/oss-security/2017/08/17/8 -http://www.openwall.com/lists/oss-security/2017/08/17/9 -http://www.openwall.com/lists/oss-security/2017/08/20/1 -http://www.openwall.com/lists/oss-security/2017/09/11/1 -http://www.openwall.com/lists/oss-security/2017/09/29/4 -http://www.openwall.com/lists/oss-security/2017/11/01/11 -http://www.openwall.com/lists/oss-security/2017/11/01/3 -http://www.openwall.com/lists/oss-security/2017/11/01/7 -http://www.openwall.com/lists/oss-security/2017/11/01/8 -http://www.openwall.com/lists/oss-security/2017/11/30/3 -http://www.openwall.com/lists/oss-security/2017/12/04/3 -http://www.openwall.com/lists/oss-security/2017/12/05/1 -http://www.openwall.com/lists/oss-security/2017/12/21/2 -http://www.openwall.com/lists/oss-security/2018/01/10/1 -http://www.openwall.com/lists/oss-security/2018/01/29/3 -http://www.openwall.com/lists/oss-security/2018/03/15/1 -http://www.openwall.com/lists/oss-security/2018/04/23/3 -http://www.openwall.com/lists/oss-security/2018/04/24/1 -http://www.openwall.com/lists/oss-security/2018/05/08/5 -http://www.openwall.com/lists/oss-security/2018/05/21/1 -http://www.openwall.com/lists/oss-security/2018/05/21/2 -http://www.openwall.com/lists/oss-security/2018/05/21/3 -http://www.openwall.com/lists/oss-security/2018/06/03/1 -http://www.openwall.com/lists/oss-security/2018/07/13/1 -http://www.openwall.com/lists/oss-security/2018/07/16/1 -http://www.openwall.com/lists/oss-security/2018/07/17/1 -http://www.openwall.com/lists/oss-security/2018/07/18/3 -http://www.openwall.com/lists/oss-security/2019/01/30/1 -http://www.openwall.com/lists/oss-security/2019/04/25/7 -http://www.openwall.com/lists/oss-security/2019/04/29/3 -http://www.openwall.com/lists/oss-security/2019/05/16/1 -http://www.openwall.com/lists/oss-security/2019/06/24/1 -http://www.openwall.com/lists/oss-security/2019/06/24/13 -http://www.openwall.com/lists/oss-security/2019/06/24/14 -http://www.openwall.com/lists/oss-security/2019/07/23/1 -http://www.openwall.com/lists/oss-security/2019/09/24/1 -http://www.openwall.com/lists/oss-security/2019/10/16/3 -http://www.openwall.com/lists/oss-security/2019/10/16/4 -http://www.openwall.com/lists/oss-security/2019/10/16/5 -http://www.openwall.com/lists/oss-security/2019/11/05/1 -http://www.openwall.com/lists/oss-security/2020/01/20/4 -http://www.openwall.com/lists/oss-security/2020/01/24/2 -http://www.openwall.com/lists/oss-security/2020/01/28/3 -http://www.openwall.com/lists/oss-security/2020/02/24/4 -http://www.openwall.com/lists/oss-security/2020/03/06/3 -http://www.openwall.com/lists/oss-security/2020/05/04/2 -http://www.openwall.com/lists/oss-security/2020/05/19/8 -http://www.openwall.com/lists/oss-security/2020/06/12/1 -http://www.openwall.com/lists/oss-security/2020/07/06/1 -http://www.openwall.com/lists/oss-security/2020/07/09/2 -http://www.openwall.com/lists/oss-security/2020/07/20/6 -http://www.openwall.com/lists/oss-security/2020/07/20/7 -http://www.openwall.com/lists/oss-security/2020/09/17/3 -http://www.openwall.com/lists/oss-security/2020/10/30/1 -http://www.openwall.com/lists/oss-security/2020/11/04/3 -http://www.openwall.com/lists/oss-security/2020/11/05/2 -http://www.openwall.com/lists/oss-security/2020/11/19/5 -http://www.openwall.com/lists/oss-security/2020/11/20/5 -http://www.openwall.com/lists/oss-security/2020/11/25/1 -http://www.openwall.com/lists/oss-security/2021/01/07/1 -http://www.openwall.com/lists/oss-security/2021/01/08/1 -http://www.openwall.com/lists/oss-security/2021/01/13/1 -http://www.openwall.com/lists/oss-security/2021/02/04/1 -http://www.openwall.com/lists/oss-security/2021/02/04/2 -http://www.openwall.com/lists/oss-security/2021/02/04/3 -http://www.openwall.com/lists/oss-security/2021/02/09/1 -http://www.openwall.com/lists/oss-security/2021/05/04/4 -http://www.openwall.com/lists/oss-security/2021/05/04/7 -http://www.openwall.com/lists/oss-security/2021/05/10/5 -http://www.openwall.com/lists/oss-security/2021/05/11/2 -http://www.openwall.com/lists/oss-security/2021/05/11/5 -http://www.openwall.com/lists/oss-security/2021/05/13/1 -http://www.openwall.com/lists/oss-security/2021/05/14/2 -http://www.openwall.com/lists/oss-security/2021/05/25/1 -http://www.openwall.com/lists/oss-security/2021/06/01/2 -http://www.openwall.com/lists/oss-security/2021/06/09/1 -http://www.openwall.com/lists/oss-security/2021/06/15/1 -http://www.openwall.com/lists/oss-security/2021/07/20/1 -http://www.openwall.com/lists/oss-security/2021/07/20/2 -http://www.openwall.com/lists/oss-security/2021/09/15/5 -http://www.openwall.com/lists/oss-security/2021/10/01/1 -http://www.openwall.com/lists/oss-security/2022/01/12/4 -http://www.openwall.com/lists/oss-security/2022/01/12/7 -http://www.openwall.com/lists/oss-security/2022/01/20/3 -http://www.openwall.com/lists/oss-security/2022/01/21/2 -http://www.openwall.com/lists/oss-security/2022/02/23/1 -http://www.openwall.com/lists/oss-security/2022/03/07/1 -http://www.openwall.com/lists/oss-security/2022/04/06/1 -http://www.openwall.com/lists/oss-security/2022/04/22/4 -http://www.openwall.com/lists/oss-security/2022/04/22/7 -http://www.openwall.com/lists/oss-security/2022/05/18/2 -http://www.openwall.com/lists/oss-security/2022/06/03/1 -http://www.openwall.com/lists/oss-security/2022/06/07/4 -http://www.openwall.com/lists/oss-security/2022/07/02/1 -http://www.openwall.com/lists/oss-security/2022/07/05/1 -http://www.openwall.com/lists/oss-security/2022/07/25/1 -http://www.openwall.com/lists/oss-security/2022/08/04/1 -http://www.openwall.com/lists/oss-security/2022/08/08/3 -http://www.openwall.com/lists/oss-security/2022/08/25/1 -http://www.openwall.com/lists/oss-security/2022/08/29/1 -http://www.openwall.com/lists/oss-security/2022/08/29/2 -http://www.openwall.com/lists/oss-security/2022/09/02/9 -http://www.openwall.com/lists/oss-security/2022/09/13/1 -http://www.openwall.com/lists/oss-security/2022/09/23/4 -http://www.openwall.com/lists/oss-security/2022/09/24/1 -http://www.openwall.com/lists/oss-security/2022/09/27/1 -http://www.openwall.com/lists/oss-security/2022/10/13/5 -http://www.openwall.com/lists/oss-security/2023/01/05/1 -http://www.openwall.com/lists/oss-security/2023/01/05/2 -http://www.openwall.com/lists/oss-security/2023/01/13/2 -http://www.openwall.com/lists/oss-security/2023/01/19/1 -http://www.openwall.com/lists/oss-security/2023/02/13/1 -http://www.openwall.com/lists/oss-security/2023/02/22/1 -http://www.openwall.com/lists/oss-security/2023/02/23/1 -http://www.openwall.com/lists/oss-security/2023/04/12/4 -http://www.openwall.com/lists/oss-security/2023/04/16/3 -http://www.openwall.com/lists/oss-security/2023/04/19/11 -http://www.openwall.com/lists/oss-security/2023/05/19/1 -http://www.openwall.com/lists/oss-security/2023/06/06/3 -http://www.openwall.com/lists/oss-security/2023/07/02/1 -http://www.openwall.com/lists/oss-security/2023/07/06/6 -http://www.openwall.com/lists/oss-security/2023/07/24/3 -http://www.openwall.com/lists/oss-security/2023/07/28/1 -http://www.openwall.com/lists/oss-security/2023/08/10/1 -http://www.openwall.com/lists/oss-security/2023/08/25/4 -http://www.openwall.com/lists/oss-security/2023/10/03/2 -http://www.openwall.com/lists/oss-security/2023/10/27/3 -http://www.openwall.com/lists/oss-security/2023/11/26/1 -http://www.openwall.com/lists/oss-security/2023/12/13/2 -http://www.openwall.com/lists/oss-security/2023/12/22/6 -http://www.openwall.com/lists/oss-security/2023/12/28/4 -http://www.openwall.com/lists/oss-security/2024/01/03/4 -http://www.openwall.com/lists/oss-security/2024/01/10/2 -http://www.openwall.com/lists/oss-security/2024/01/30/6 -http://www.openwall.com/lists/oss-security/2024/01/30/8 -http://www.openwall.com/lists/oss-security/2024/02/08/2 -http://www.openwall.com/lists/oss-security/2024/04/10/18 -http://www.openwall.com/lists/oss-security/2024/04/10/21 -http://www.openwall.com/lists/oss-security/2024/04/11/7 -http://www.openwall.com/lists/oss-security/2024/04/11/9 -http://www.openwall.com/lists/oss-security/2024/04/12/11 -http://www.openwall.com/lists/oss-security/2024/04/16/2 -http://www.openwall.com/lists/oss-security/2024/04/16/5 -http://www.openwall.com/lists/oss-security/2024/04/17/1 -http://www.openwall.com/lists/oss-security/2024/04/17/10 -http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html -http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html -http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html -http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html -http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html -http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html -http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html -http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html -http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html -http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html -http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html -http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html -http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html -http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html -http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html -http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html -http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html -http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html -http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html -http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html -http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html -http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html -http://www.packetstormsecurity.com/0910-exploits/gpg2kleo-dos.txt -http://www.packetstormsecurity.org/0512-exploits/mIRCexploitXPSP2eng.c -http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt -http://www.packetstormsecurity.org/0909-exploits/Dr_IDE-CuteFTP_FTP_8.3.3-PoC.py.txt -http://www.packetstormsecurity.org/0909-exploits/coreftp_local.py.txt -http://www.packetstormsecurity.org/0909-exploits/nocoolnameforawsftppoc.pl.txt -http://www.packetstormsecurity.org/0910-exploits/eurekamc-dos.txt -http://www.packetstormsecurity.org/0910-exploits/pegasusmc-dos.txt -http://www.pcworld.com/article/2879372/dangerous-ie-vulnerability-opens-door-to-powerful-phishing-attacks.html -http://www.pentest.com.tr/exploits/AROX-School-ERP-Pro-Unauthenticated-RCE-Metasploit.html -http://www.pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html -http://www.phreedom.org/research/rogue-ca/ -http://www.piotrbania.com/all/adv/adobe-acrobat-adv.txt -http://www.piotrbania.com/all/adv/kadu-fun.txt -http://www.piotrbania.com/all/adv/ms-directx-mjpeg-adv.txt -http://www.piotrbania.com/all/adv/nullsoft-winamp-libsndfile-adv.txt -http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt -http://www.planitcomputing.ie/upc-wifi-attack.pdf -http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982 -http://www.quantenblog.net/security/virus-scanner-bypass -http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html -http://www.rafayhackingarticles.net/2013/11/phpthumb-server-side-request-forgery.html -http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html -http://www.rafayhackingarticles.net/2014/10/a-tale-of-another-sop-bypass-in-android.html -http://www.rcesecurity.com/2014/03/cve-2014-2206-getgo-download-manager-http-response-header-buffer-overflow-remote-code-execution -http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html -http://www.red-database-security.com/exploits/oracle_exploit_dbms_scheduler_select_user.html -http://www.redteam-pentesting.de/advisories/rt-sa-2005-001.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-003.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-004.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-005.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-007.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-010.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-011.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-012.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-014.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2006-004.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2006-005.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2006-006.txt -http://www.redteam-pentesting.de/advisories/rt-sa-2009-001 -http://www.redteam-pentesting.de/advisories/rt-sa-2009-002 -http://www.redteam-pentesting.de/advisories/rt-sa-2009-003 -http://www.redteam-pentesting.de/advisories/rt-sa-2009-004 -http://www.redteam-pentesting.de/advisories/rt-sa-2011-001 -http://www.redteam-pentesting.de/advisories/rt-sa-2011-002 -http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-001/-geo-r-gncaster-insecure-handling-of-long-urls -http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-002/-geo-r-gncaster-insecure-handling-of-nmea-data -http://www.redteam-pentesting.de/en/advisories/rt-sa-2012-002/-php-decoda-cross-site-scripting-in-video-tags -http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt -http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt -http://www.ryantzj.com/flexense-syncbreeze-entreprise-10314-buffer-overflow-seh-bypass.html -http://www.samba.org/samba/security/CVE-2010-2063.html -http://www.scip.ch/?vuldb.4021 -http://www.scip.ch/?vuldb.4063 -http://www.scip.ch/en/?vuldb.75111 -http://www.seanox.de/projects.devwex.php -http://www.search-lab.hu/about-us/news/110-android-adb-backup-apk-injection-vulnerability -http://www.sec-tec.co.uk/vulnerability/r55w_directory_traversal.html -http://www.sec-tec.co.uk/vulnerability/snitzxss.html -http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf -http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html -http://www.securify.nl/advisory/SFY20140401/adobe_reader_for_android_exposes_insecure_javascript_interfaces.html -http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml -http://www.securitylab.ru/news/301422.php -http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/ -http://www.senseofsecurity.com.au/advisories/SOS-10-002 -http://www.senseofsecurity.com.au/advisories/SOS-13-003 -http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ -http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition -http://www.slideshare.net/ibmsecurity/android-keystorestackbufferoverflow -http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon -http://www.slideshare.net/wojdwo/big-problems-with-big-data-hadoop-interfaces-security -http://www.splunk.com/view/SP-CAAAFGD -http://www.splunk.com/view/SP-CAAAFHY -http://www.splunk.com/view/SP-CAAAFQ6 -http://www.splunk.com/view/SP-CAAAGMM -http://www.splunk.com/view/SP-CAAAGTK#38585 -http://www.splunk.com/view/SP-CAAAHSQ -http://www.squid-cache.org/Advisories/SQUID-2016_2.txt -http://www.stack.nl/~jilles/irc/charybdis-3.4.2.tbz2 -http://www.suspekt.org/2009/12/09/advisory-032009-piwik-cookie-unserialize-vulnerability/ -http://www.talosintel.com/reports/TALOS-2016-0094/ -http://www.talosintel.com/reports/TALOS-2016-0153/ -http://www.talosintelligence.com/reports/TALOS-2015-0052/ -http://www.talosintelligence.com/reports/TALOS-2016-0029/ -http://www.talosintelligence.com/reports/TALOS-2016-0031/ -http://www.talosintelligence.com/reports/TALOS-2016-0032/ -http://www.talosintelligence.com/reports/TALOS-2016-0034/ -http://www.talosintelligence.com/reports/TALOS-2016-0066/ -http://www.talosintelligence.com/reports/TALOS-2016-0067/ -http://www.talosintelligence.com/reports/TALOS-2016-0068/ -http://www.talosintelligence.com/reports/TALOS-2016-0083/ -http://www.talosintelligence.com/reports/TALOS-2016-0095/ -http://www.talosintelligence.com/reports/TALOS-2016-0127/ -http://www.talosintelligence.com/reports/TALOS-2016-0144/ -http://www.talosintelligence.com/reports/TALOS-2016-0148/ -http://www.talosintelligence.com/reports/TALOS-2016-0149/ -http://www.talosintelligence.com/reports/TALOS-2016-0150/ -http://www.talosintelligence.com/reports/TALOS-2016-0151/ -http://www.talosintelligence.com/reports/TALOS-2016-0164/ -http://www.talosintelligence.com/reports/TALOS-2016-0166/ -http://www.talosintelligence.com/reports/TALOS-2016-0167/ -http://www.talosintelligence.com/reports/TALOS-2016-0168/ -http://www.talosintelligence.com/reports/TALOS-2016-0169/ -http://www.talosintelligence.com/reports/TALOS-2016-0172/ -http://www.talosintelligence.com/reports/TALOS-2016-0173/ -http://www.talosintelligence.com/reports/TALOS-2016-0175/ -http://www.talosintelligence.com/reports/TALOS-2016-0176/ -http://www.talosintelligence.com/reports/TALOS-2016-0177/ -http://www.talosintelligence.com/reports/TALOS-2016-0178/ -http://www.talosintelligence.com/reports/TALOS-2016-0179/ -http://www.talosintelligence.com/reports/TALOS-2016-0199/ -http://www.talosintelligence.com/reports/TALOS-2016-0210/ -http://www.talosintelligence.com/reports/TALOS-2016-0211/ -http://www.talosintelligence.com/reports/TALOS-2016-0212/ -http://www.talosintelligence.com/reports/TALOS-2016-0213/ -http://www.talosintelligence.com/reports/TALOS-2016-0214/ -http://www.talosintelligence.com/reports/TALOS-2016-0219/ -http://www.talosintelligence.com/reports/TALOS-2016-0220/ -http://www.talosintelligence.com/reports/TALOS-2016-0221/ -http://www.talosintelligence.com/reports/TALOS-2016-0225/ -http://www.talosintelligence.com/reports/TALOS-2016-0227/ -http://www.talosintelligence.com/reports/TALOS-2016-0232/ -http://www.talosintelligence.com/reports/TALOS-2016-0233/ -http://www.talosintelligence.com/reports/TALOS-2016-0234/ -http://www.talosintelligence.com/reports/TALOS-2016-0235/ -http://www.talosintelligence.com/reports/TALOS-2016-0236/ -http://www.talosintelligence.com/reports/TALOS-2016-0237/ -http://www.talosintelligence.com/reports/TALOS-2016-0238/ -http://www.talosintelligence.com/reports/TALOS-2016-0239/ -http://www.talosintelligence.com/reports/TALOS-2016-0240/ -http://www.talosintelligence.com/reports/TALOS-2016-0241/ -http://www.talosintelligence.com/reports/TALOS-2016-0254/ -http://www.talosintelligence.com/reports/TALOS-2016-0255/ -http://www.talosintelligence.com/reports/TALOS-2016-0257/ -http://www.talosintelligence.com/reports/TALOS-2016-0263/ -http://www.talosintelligence.com/reports/TALOS-2016-0264/ -http://www.talosintelligence.com/reports/TALOS-2016-0265/ -http://www.talosintelligence.com/reports/TALOS-2016-0266/ -http://www.talosintelligence.com/reports/TALOS-2016-0267/ -http://www.talosintelligence.com/reports/TALOS-2016-0268/ -http://www.talosintelligence.com/reports/TALOS-2017-0274/ -http://www.talosintelligence.com/reports/TALOS-2017-0279/ -http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download -http://www.tenable.com/plugins/index.php?view=single&id=65738 -http://www.tenable.com/security/tns-2014-08 -http://www.thekelleys.org.uk/dnsmasq/CHANGELOG -http://www.theora.org/news/#libtheora-1.1.0 -http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/ -http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/ -http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/ -http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ -http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/ -http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/ -http://www.theregister.co.uk/2011/05/25/microsoft_internet_explorer_cookiejacking/ -http://www.theregister.co.uk/2011/06/16/webgl_security_threats_redux/ -http://www.theregister.co.uk/2012/09/14/crime_tls_attack/ -http://www.theregister.co.uk/2013/12/10/android_has_lockbypass_bug/ -http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/ -http://www.thespanner.co.uk/2007/08/17/safari-beta-zero-day/ -http://www.thespanner.co.uk/2012/10/10/firefox-knows-what-your-friends-did-last-summer/ -http://www.theta44.org/karma/ -http://www.trapkit.de/advisories/TKADV2005-11-001.txt -http://www.trapkit.de/advisories/TKADV2005-11-002.txt -http://www.trapkit.de/advisories/TKADV2005-11-004.txt -http://www.trapkit.de/advisories/TKADV2005-12-001.txt -http://www.trapkit.de/advisories/TKADV2007-001.txt -http://www.turbotax.com/atr/update/ -http://www.ubuntu.com/usn/USN-1001-1 -http://www.ubuntu.com/usn/USN-1847-1 -http://www.ubuntu.com/usn/USN-2053-1 -http://www.ubuntu.com/usn/USN-2495-1 -http://www.ubuntu.com/usn/USN-2936-1 -http://www.ubuntu.com/usn/usn-740-1 -http://www.unixodbc.org/unixODBC-2.3.5.tar.gz -http://www.ush.it/2007/03/09/php-nuke-wild-post-xss/ -http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt -http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt -http://www.ush.it/team/ush/hack_httpd_escape/adv.txt -http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 -http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html -http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/index.html -http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ -http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html -http://www.vapidlabs.com/advisory.php?v=153 -http://www.vapidlabs.com/advisory.php?v=162 -http://www.vapidlabs.com/advisory.php?v=36 -http://www.vapidlabs.com/advisory.php?v=81 -http://www.vulnerability-lab.com/get_content.php?id=1080 -http://www.vulnerability-lab.com/get_content.php?id=1099 -http://www.vulnerability-lab.com/get_content.php?id=1100 -http://www.vulnerability-lab.com/get_content.php?id=1125 -http://www.vulnerability-lab.com/get_content.php?id=115 -http://www.vulnerability-lab.com/get_content.php?id=1171 -http://www.vulnerability-lab.com/get_content.php?id=1191 -http://www.vulnerability-lab.com/get_content.php?id=1359 -http://www.vulnerability-lab.com/get_content.php?id=1367 -http://www.vulnerability-lab.com/get_content.php?id=1372 -http://www.vulnerability-lab.com/get_content.php?id=1408 -http://www.vulnerability-lab.com/get_content.php?id=1478 -http://www.vulnerability-lab.com/get_content.php?id=1488 -http://www.vulnerability-lab.com/get_content.php?id=1501 -http://www.vulnerability-lab.com/get_content.php?id=1687 -http://www.vulnerability-lab.com/get_content.php?id=1869 -http://www.vulnerability-lab.com/get_content.php?id=196 -http://www.vulnerability-lab.com/get_content.php?id=28 -http://www.vulnerability-lab.com/get_content.php?id=304 -http://www.vulnerability-lab.com/get_content.php?id=33 -http://www.vulnerability-lab.com/get_content.php?id=342 -http://www.vulnerability-lab.com/get_content.php?id=362 -http://www.vulnerability-lab.com/get_content.php?id=378 -http://www.vulnerability-lab.com/get_content.php?id=384 -http://www.vulnerability-lab.com/get_content.php?id=392 -http://www.vulnerability-lab.com/get_content.php?id=402 -http://www.vulnerability-lab.com/get_content.php?id=405 -http://www.vulnerability-lab.com/get_content.php?id=407 -http://www.vulnerability-lab.com/get_content.php?id=423 -http://www.vulnerability-lab.com/get_content.php?id=428 -http://www.vulnerability-lab.com/get_content.php?id=436 -http://www.vulnerability-lab.com/get_content.php?id=437 -http://www.vulnerability-lab.com/get_content.php?id=461 -http://www.vulnerability-lab.com/get_content.php?id=462 -http://www.vulnerability-lab.com/get_content.php?id=486 -http://www.vulnerability-lab.com/get_content.php?id=487 -http://www.vulnerability-lab.com/get_content.php?id=502 -http://www.vulnerability-lab.com/get_content.php?id=504 -http://www.vulnerability-lab.com/get_content.php?id=509 -http://www.vulnerability-lab.com/get_content.php?id=512 -http://www.vulnerability-lab.com/get_content.php?id=513 -http://www.vulnerability-lab.com/get_content.php?id=516 -http://www.vulnerability-lab.com/get_content.php?id=518 -http://www.vulnerability-lab.com/get_content.php?id=520 -http://www.vulnerability-lab.com/get_content.php?id=521 -http://www.vulnerability-lab.com/get_content.php?id=524 -http://www.vulnerability-lab.com/get_content.php?id=525 -http://www.vulnerability-lab.com/get_content.php?id=530 -http://www.vulnerability-lab.com/get_content.php?id=60 -http://www.vulnerability-lab.com/get_content.php?id=701 -http://www.vulnerability-lab.com/get_content.php?id=91 -http://www.vulnerability-lab.com/get_content.php?id=953 -http://www.w3.org/Jigsaw/RelNotes.html#2.2.1 -http://www.w3.org/Jigsaw/RelNotes.html#2.2.4 -http://www.waraxe.us/advisory-39.html -http://www.waraxe.us/advisory-45.html -http://www.waraxe.us/advisory-46.html -http://www.waraxe.us/advisory-49.html -http://www.waraxe.us/advisory-50.html -http://www.waraxe.us/advisory-51.html -http://www.waraxe.us/advisory-53.html -http://www.waraxe.us/advisory-54.html -http://www.waraxe.us/advisory-55.html -http://www.waraxe.us/advisory-56.html -http://www.waraxe.us/advisory-57.html -http://www.waraxe.us/advisory-58.html -http://www.waraxe.us/advisory-59.html -http://www.waraxe.us/advisory-62.html -http://www.waraxe.us/advisory-63.html -http://www.waraxe.us/advisory-64.html -http://www.waraxe.us/advisory-65.html -http://www.waraxe.us/advisory-68.html -http://www.waraxe.us/advisory-73.html -http://www.waraxe.us/advisory-74.html -http://www.waraxe.us/advisory-75.html -http://www.waraxe.us/index.php?modname=sa&id=19 -http://www.waraxe.us/index.php?modname=sa&id=25 -http://www.waraxe.us/index.php?modname=sa&id=38 -http://www.webera.fr/advisory-02-php-agenda-isql-exploit -http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html -http://www.win.tue.nl/hashclash/SoftIntCodeSign/ -http://www.win.tue.nl/hashclash/rogue-ca/ -http://www.wired.com/threatlevel/2010/07/siemens-scada/ -http://www.wisec.it/vulns.php?id=11 -http://www.wisec.it/vulns.php?page=7 -http://www.wisec.it/vulns.php?page=8 -http://www.wisec.it/vulns.php?page=9 -http://www.x0rsecurity.com/2019/06/09/my-second-cve-linksys-wrt-acs-cve-2019-7579-or-as-i-call-it-acceptance-no-one-considers-security-by-design/ -http://www.xssed.com/advisory/60/PHP-FUSION_FUSION_QUERY_Cross-Site_Scripting_Vulnerability/ -http://www.youtube.com/ChristianHaiderPoC -http://www.youtube.com/watch?v=3lCLE64rsc0 -http://www.youtube.com/watch?v=5d7cIaM80oY -http://www.youtube.com/watch?v=A1kPL9ggRi4 -http://www.youtube.com/watch?v=NinvMDOj7sM -http://www.youtube.com/watch?v=TPqagWAvo8U -http://www.zdnet.com/article/google-discloses-unpatched-windows-vulnerability/ -http://www.zeroscience.mk/codes/psbrush_bof.txt -http://www.zeroscience.mk/codes/psgradient_bof.txt -http://www.zeroscience.mk/codes/psstyle_bof.txt -http://www.zeroscience.mk/codes/shockwave_mem.txt -http://www.zeroscience.mk/codes/trendnet_bof.txt -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4931.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4938.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4939.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4940.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4941.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4953.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4954.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4964.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4970.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4990.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4992.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5009.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5012.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5053.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5057.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5062.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5064.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5065.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5066.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5067.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5068.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5070.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5075.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5079.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5080.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5089.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5091.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5105.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5106.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5151.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5169.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5170.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5186.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5187.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5190.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5191.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5193.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5195.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5197.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5205.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5206.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5210.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5211.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5218.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5219.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5223.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5225.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5226.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5227.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5232.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5233.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5234.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5235.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5247.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5248.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5267.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5272.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5313.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php -http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php -http://xorl.wordpress.com/2009/07/21/linux-kernel-sgi-gru-driver-off-by-one-overwrite/ -http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/ -http://xss.cx/cve/2017/14620/smarterstats.v11-3-6347.html -http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html -http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html -http://yehg.net/lab/pr0js/advisories/%5BDolphin_7.0.7%5D_xss -http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss -http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6.x_(asp)%5D_xss -http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0.x%5D_open_url_redirection -http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss -http://yehg.net/lab/pr0js/advisories/%5Bgeeklog1.7.1%5D_cross_site_scripting -http://yehg.net/lab/pr0js/advisories/%5Bmambo4.6_x%5D_sql_injection -http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi -http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_XSS -http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin -http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce -http://yehg.net/lab/pr0js/advisories/%5Bvanilla_forums-2.0.16%5D_cross_site_scripting -http://yehg.net/lab/pr0js/advisories/eclipse/%5Beclipse_help_server%5D_cross_site_scripting -http://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse -http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS) -http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-stable%5D_cross_site_scripting%28XSS%29 -http://yehg.net/lab/pr0js/advisories/phpmyadmin/%5Bphpmyadmin-3.3.5%5D_cross_site_scripting%28XSS%29 -http://zepl.com -http://zeroscience.mk/codes/wamp_xss.txt -http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php -http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php -http://zeroscience.mk/en/vulnerabilities/ZSL-2015-5220.php -http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html -https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg/ -https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/ -https://0dd.zone/2018/05/31/TripleA-XXE/ -https://0dd.zone/2018/06/02/Netbeans-MMD-Plugin-XXE/ -https://0dd.zone/2018/09/03/lh-ehr-RCE-via-picture-upload/ -https://0dr3f.github.io/cve/ -https://0ffsecninja.github.io/Telegram:CVE-2021-2735.html -https://0g.vc/posts/insecure-cipher-gnuboard5/ -https://0patch.blogspot.com/2016/06/writing-0patch-for-acrobat-readers-use.html -https://0patch.blogspot.com/2016/07/0patching-foxit-readers-heap-buffer.html -https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html -https://0patch.blogspot.com/2017/02/0patching-0-day-windows-gdi32dll-memory.html -https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html -https://0patch.blogspot.com/2017/07/0patching-quick-brown-fox-of-cve-2017.html -https://0patch.blogspot.com/2017/08/0patching-foxit-readers-saveas-0day-cve.html -https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html -https://0patch.blogspot.com/2017/09/exploit-kit-rendezvous-and-cve-2017-0022.html -https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html -https://0patch.blogspot.com/2017/11/0patching-pretty-nasty-microsoft-word.html -https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html -https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html -https://0patch.blogspot.com/2018/01/the-bug-that-killed-equation-editor-how.html -https://0patch.blogspot.si/2017/03/0patching-another-0-day-internet.html -https://0patch.blogspot.si/2017/05/0patching-worst-windows-remote-code.html -https://0tkombo.wixsite.com/0tkombo/blog/five9-dos-websocket-access -https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/ -https://0x62626262.wordpress.com/2016/04/21/echosign-plugin-for-wordpress-xss-vulnerability/ -https://0x62626262.wordpress.com/2016/04/21/persian-woocommerce-sms-xss-vulnerability/ -https://0x62626262.wordpress.com/2016/04/21/tweet-wheel-xss-vulnerability/ -https://0x62626262.wordpress.com/2018/10/08/sitepress-multilingual-cms-plugin-unauthenticated-stored-xss/ -https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ -https://0xbro.red/disclosures/disclosed-vulnerabilities/opencart-cve-2023-47444/ -https://0xd0ff9.wordpress.com/2018/06/21/cve-2018-7475/ -https://0xd0ff9.wordpress.com/2018/10/18/cve-2018-18398/ -https://0xd0ff9.wordpress.com/2019/07/19/from-code-evaluation-to-pre-auth-remote-code-execution-cve-2018-16763-bypass/ -https://0xdb9.in/2021/06/07/cve-2021-28293.html -https://0xdeadface.wordpress.com/2017/04/07/multiple-vulnerabilities-in-quest-privilege-manager-6-0-0-xx-cve-2017-6553-cve-2017-6554/ -https://0xdf.gitlab.io/2020/09/05/htb-remote.html -https://0xhunter20.medium.com/how-i-found-my-first-blind-sql-injection-cve-2023-23331-aef103a7f73c -https://0xy37.medium.com/my-first-cve-cve-2021-41825-verint-workforce-optimization-html-injection-6dd450e7f2af -https://10degres.net/cves/cve-2022-43265/ -https://1modm.github.io/CVE-2019-12480.html -https://2SXC.org/en/blog/post/2sxc-security-notification-2021-001 -https://3xpl01tc0d3r.blogspot.com/2018/06/information-disclosure-internal-path.html -https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf -https://7bits.nl/journal/posts/cve-2021-38703-kpn-experia-wifi-root-shell/ -https://Full-Disclosure.eu -https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html -https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/ -https://access.redhat.com/articles/2548661 -https://adamcaudill.com/2016/02/02/plsql-developer-nonexistent-encryption/ -https://adamziaja.com/poc/201312-xss-mybb.html -https://adamziaja.com/poc/201903-xss-zhone.html -https://adblockplus.org/releases/adblock-plus-352-for-chrome-firefox-and-opera-released -https://adepts.of0x.cc/gtbcc-pwned/ -https://adepts.of0x.cc/leostream-xss-to-rce/ -https://adepts.of0x.cc/ruckus-vriot-rce/ -https://advisories.dxw.com/advisories/ace-file-inclusion-redirection/ -https://advisories.dxw.com/advisories/copy-me-vulnerable-to-csrf-allowing-unauthenticated-attacker-to-copy-posts/ -https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/ -https://advisories.dxw.com/advisories/csrf-in-tooltipy/ -https://advisories.dxw.com/advisories/csrf-in-watu-pro-allows-unauthenticated-attackers-to-delete-quizzes/ -https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ -https://advisories.dxw.com/advisories/csrf-metronet-tag-manager/ -https://advisories.dxw.com/advisories/csrf-vulnerability-in-multisite-post-duplicator-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can-do/ -https://advisories.dxw.com/advisories/csrf-wp-user-groups/ -https://advisories.dxw.com/advisories/reflected-xss-in-social-pug-easy-social-share-buttons-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ -https://advisories.dxw.com/advisories/sql-injection-and-unserialization-vulnerability-in-relevanssi-premium-could-allow-admins-to-execute-arbitrary-code-in-some-circumstances/ -https://advisories.dxw.com/advisories/sql-injection-in-post-indexer-allows-super-admins-to-read-the-contents-of-the-database/ -https://advisories.dxw.com/advisories/stored-xss-wp-ulike/ -https://advisories.dxw.com/advisories/unserialisation-in-post-indexer-could-allow-man-in-the-middle-to-execute-arbitrary-code-in-some-circumstances/ -https://advisories.dxw.com/advisories/unserialization-redirection/ -https://advisories.dxw.com/advisories/wp-image-zoom-dos/ -https://advisories.dxw.com/advisories/wp-ulike-delete-rows/ -https://advisories.dxw.com/advisories/xen-mobile-backing-service-allows-unauthenticated-local-users-to-execute-system-commands-as-root/ -https://advisories.dxw.com/advisories/xen-mobile-vulnerable-to-code-execution-via-object-serialisation/ -https://advisories.dxw.com/advisories/xss-in-tooltipy/ -https://advisories.stormshield.eu/2018-006/ -https://advisories.stormshield.eu/2020-011/ -https://advisories.stormshield.eu/2021-004/ -https://advisories.stormshield.eu/2021-006 -https://advisories.stormshield.eu/2021-019/ -https://advisories.stormshield.eu/2021-020/ -https://advisories.stormshield.eu/2021-022/ -https://advisories.stormshield.eu/2021-023/ -https://advisories.stormshield.eu/2021-024/ -https://advisories.stormshield.eu/2021-025/ -https://advisories.stormshield.eu/2021-026/ -https://advisories.stormshield.eu/2021-027/ -https://advisories.stormshield.eu/2021-069/ -https://advisories.stormshield.eu/2023-006 -https://advisories.stormshield.eu/2023-019 -https://advisories.stormshield.eu/2023-020/ -https://advisories.stormshield.eu/2023-021/ -https://advisories.stormshield.eu/2023-022/ -https://advisories.stormshield.eu/2023-024/ -https://advisories.stormshield.eu/2023-027 -https://advisory.dw1.io/57 -https://advisory.dw1.io/59 -https://advisory.dw1.io/60 -https://ajdg.solutions/2019/07/11/adrotate-pro-5-3-important-update-for-security-and-ads-txt/ -https://akerva.com/blog/intermec-industrial-printers-local-root-with-busybox-jailbreak/ -https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38886_Dolibarr_RCE-1.pdf -https://albert5888.github.io/posts/CVE-2022-38329/ -https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/ -https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ -https://alephsecurity.com/vulns/aleph-2017008 -https://alephsecurity.com/vulns/aleph-2017009 -https://alephsecurity.com/vulns/aleph-2017020 -https://alephsecurity.com/vulns/aleph-2017021 -https://alephsecurity.com/vulns/aleph-2017022 -https://alephsecurity.com/vulns/aleph-2017026 -https://alephsecurity.com/vulns/aleph-2018004 -https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian -https://amonitoring.ru/article/steamclient-0day/ -https://ampforwp.com/critical-security-issues-has-been-fixed-in-0-9-97-20-version/ -https://android.googlesource.com/device/google/dragon/+/7df7ec13b1d222ac3a66797fbe432605ea8f973f -https://android.googlesource.com/kernel/common/+/1ca1130ec62d -https://android.googlesource.com/platform/external/aac/+/4242f97d149b0bf0cd96f00cd1e9d30d5922cd46 -https://android.googlesource.com/platform/external/libavc/+/42cf02965b11c397dd37a0063e683cef005bc0ae -https://android.googlesource.com/platform/external/libavc/+/5acaa6fc86c73a750e5f4900c4e2d44bf22f683a -https://android.googlesource.com/platform/external/libavc/+/8b5fd8f24eba5dd19ab2f80ea11a9125aa882ae2 -https://android.googlesource.com/platform/external/libavc/+/e86d3cfd2bc28dac421092106751e5638d54a848 -https://android.googlesource.com/platform/external/libhevc/+/25c0ffbe6a181b4a373c3c9b421ea449d457e6ed -https://android.googlesource.com/platform/external/libhevc/+/87fb7909c49e6a4510ba86ace1ffc83459c7e1b9 -https://android.googlesource.com/platform/external/libhevc/+/9f0fb67540d2259e4930d9bd5f1a1a6fb95af862 -https://android.googlesource.com/platform/external/libmpeg2/+/7737780815fe523ad7b0e49456eb75d27a30818a -https://android.googlesource.com/platform/external/libvpx/+/55cd1dd7c8d0a3de907d22e0f12718733f4e41d9 -https://android.googlesource.com/platform/external/libxaac/+/04e8cd58f075bec5892e369c8deebca9c67e855c -https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c -https://android.googlesource.com/platform/external/tremolo/+/5dc99237d49e73c27d3eca54f6ccd97d13f94de0 -https://android.googlesource.com/platform/external/tremolo/+/eeb4e45d5683f88488c083ecf142dc89bc3f0b47 -https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268 -https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe -https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e -https://android.googlesource.com/platform/frameworks/av/+/523f6b49c1a2289161f40cf9fe80b92e592e9441 -https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1 -https://android.googlesource.com/platform/frameworks/av/+/594bf934384920618d2b6ce0bcda1f60144cb3eb -https://android.googlesource.com/platform/frameworks/av/+/8a3a2f6ea7defe1a81bb32b3c9f3537f84749b9d -https://android.googlesource.com/platform/frameworks/av/+/961e5ac5788b52304e64b9a509781beaf5201fb0 -https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e -https://android.googlesource.com/platform/frameworks/av/+/bf7a67c33c0f044abeef3b9746f434b7f3295bb1 -https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac -https://android.googlesource.com/platform/frameworks/av/+/d07f5c14e811951ff9b411ceb84e7288e0d04aaf -https://android.googlesource.com/platform/frameworks/av/+/d834160d9759f1098df692b34e6eeb548f9e317b -https://android.googlesource.com/platform/frameworks/av/+/dd3ca4d6b81a9ae2ddf358b7b93d2f8c010921f5 -https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 -https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1 -https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253 -https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3 -https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad -https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9 -https://android.googlesource.com/platform/frameworks/base/+/91bfcbbd87886049778142618a655352b16cd911 -https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd -https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670d -https://android.googlesource.com/platform/hardware/qcom/audio/+/d72ea85c78a1a68bf99fd5804ad9784b4102fe57 -https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2 -https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/2bffd7f5e66dd0cf7e5668fb65c4f2b2e9f87cf7 -https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/ed6ee1f7eca7b33160e36ac6d730a9ef395ca4f1 -https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/3a3a5d145d380deef2d5b7c3150864cd04be397f -https://android.googlesource.com/platform/system/bt/+/830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 -https://androidvulnerabilities.org/all -https://anotepad.com/note/read/s3kkk6h7 -https://anotepad.com/notes/2skndayt -https://ansawaf.blogspot.com/2018/10/cve-2018-14846-multiple-stored-xss-in.html -https://ansawaf.blogspot.com/2019/04/cve-2018-13137-xss-in-events-manager.html -https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html -https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505 -https://appcheck-ng.com/advisory-remote-code-execution-traccar-server/ -https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/ -https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186 -https://appcheck-ng.com/persistent-xss-kentico-cms/ -https://appcheck-ng.com/wordpress-microsoft-office-365-azure-ad-login-persistent-cross-site-scripting/ -https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html -https://appsource.microsoft.com/en-us/product/web-apps/acctech-systems-pty-ltd.modernflow-saas?tab=overview -https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview -https://aramido.de/media/aramido-2020-006-disclosure-amazon-secret-access-key.md -https://ardent-security.com/en/advisory/asa-2021-01/ -https://ardent-security.com/en/advisory/asa-2021-02/ -https://ardent-security.com/en/advisory/asa-2021-03/ -https://ardent-security.com/en/advisory/asa-2021-04/ -https://ardent-security.com/en/advisory/asa-2021-05/ -https://ardent-security.com/en/advisory/asa-2021-06/ -https://arinerron.com/blog/posts/6 -https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/ -https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/ -https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/ -https://arxiv.org/pdf/1809.07477 -https://arxiv.org/pdf/2005.08208.pdf -https://arxiv.org/pdf/2012.07432.pdf -https://arxiv.org/pdf/2205.15202.pdf -https://arxiv.org/pdf/2212.05197.pdf -https://asec.ahnlab.com/en/47088/ -https://asfiyashaikh20.medium.com/cve-2020-29259-persistent-xss-2ef63cc5cee6 -https://ashallen.net/wireless-smart-lock-vulnerability-disclosure -https://assura.atlassian.net/wiki/spaces/VULNS/pages/1843134469/CVE-2022-34002+Personnel+Data+Systems+PDS+Vista+7+-+Local+File+Inclusion -https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis -https://attackerkb.com/topics/RSDAFLik92/cve-2020-12720-vbulletin-incorrect-access-control -https://attackerkb.com/topics/XuEb81tsid/online-catering-reservation-dt-food-catering-by-oretnom23-v1-0-sql-injection---login -https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044 -https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis -https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990 -https://attackerkb.com/topics/hxx3zmiCkR/webmin-password-change-cgi-command-injection -https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis -https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ -https://awakened1712.github.io/hacking/hacking-wechat-dos/ -https://awxylitol.github.io/2021/05/09/embedthis-appweb-npd-bug.html -https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/ -https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/ -https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview -https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html -https://bananamafia.dev/post/r2-pwndebian/ -https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html -https://barriersec.com/2019/06/cve-2018-20468-sahi-pro/ -https://barriersec.com/2019/06/cve-2018-20469-sahi-pro/ -https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ -https://barriersec.com/2019/06/cve-2018-20472-sahi-pro/ -https://barriersec.com/2019/08/cve-2019-15102-sahi-pro/ -https://bastijnouwendijk.com/cve-2021-24313/ -https://behradtaher.dev/2021/11/05/Discovering-a-Blind-SQL-Injection-Whitebox-Approach/ -https://bentl.ee/posts/cve-givewp/ -https://beronet.atlassian.net/wiki/spaces/PUB/pages/88768529/Security+Issues -https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20aprocess.php%20SQL%20Injection/ -https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20eprocess.php%20SQL%20Injection/ -https://beyondbinary.io/articles/seagate-nas-rce/ -https://beyondbinary.io/articles/teamcity-account-creation/ -https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb -https://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss -https://bierbaumer.net/security/asuswrt/#remote-code-execution -https://bierbaumer.net/security/asuswrt/#session-stealing -https://bierbaumer.net/security/cve-2014-4677/ -https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html -https://bit.ly/2kfL7xE -https://bitbucket.org/analogic/mailserver/issues/665/posteio-logs-leak -https://bitbucket.org/b_c/jose4j/issues/212 -https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij -https://bitbucket.org/mpyne/game-music-emu/issues/14/addresssanitizer-negative-size-param-size -https://bkd00r.wordpress.com/2018/08/24/cve-2018-15852-exploit-title-cable-modem-technicolor-tc7200-20-wifi-buffer-overflow/ -https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 -https://blog.0patch.com/2018/05/0patching-foxit-reader-buffer-oops.html -https://blog.0patch.com/2018/05/a-single-instruction-micropatch-for.html -https://blog.0patch.com/2018/08/how-we-micropatched-publicly-dropped.html -https://blog.0patch.com/2018/09/comparing-our-micropatch-with.html -https://blog.0patch.com/2018/09/outrunning-attackers-on-jet-database.html -https://blog.0patch.com/2018/10/patching-re-patching-and-meta-patching.html -https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html -https://blog.0xlabs.com/2020/03/x-plane-1141-remote-command-execution.html -https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html -https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/ -https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055 -https://blog.appicaptor.com/2019/10/04/vulnerable-library-warning-twitterkit-for-ios/ -https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/ -https://blog.avira.com/victure-pc530-home-insecurity-you-can-install-yourself/ -https://blog.bjornweb.nl/2017/02/flash-bypassing-local-sandbox-data-exfiltration-credentials-leak/ -https://blog.burghardt.pl/2019/03/diag_tool-cgi-on-dasan-h660rm-devices-with-firmware-1-03-0022-allows-spawning-ping-processes-without-any-authorization-leading-to-information-disclosure-and-dos-attacks/ -https://blog.c22.cc/advisories/cve-2013-5112-evernote-android-insecure-storage-of-pin-data-bypass-of-pin-protection/ -https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/ -https://blog.caller.xyz/socketio-engineio-dos/ -https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/ -https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/ -https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ -https://blog.coinkite.com/noise-troll/ -https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/ -https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/ -https://blog.convisoappsec.com/en/bug-hunting-in-the-janet-language-interpreter/ -https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/ -https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 -https://blog.deteact.com/bitrix-waf-bypass/ -https://blog.doyensec.com/2017/08/03/electron-framework-security.html -https://blog.doyensec.com/2019/04/24/rubyzip-bug.html -https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html -https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 -https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ -https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ -https://blog.filippo.io/finding-ticketbleed/ -https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982 -https://blog.fortinet.com/2016/01/22/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell -https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader -https://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 -https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability/ -https://blog.freax13.de/cve/cve-2023-35861 -https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html -https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-3193.html -https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html -https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html -https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html -https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ -https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html -https://blog.grimm-co.com/2021/04/time-for-upgrade.html -https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html -https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ -https://blog.hackeriet.no/cve-2018-20162-digi-lr54-restricted-shell-escape/ -https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/ -https://blog.hackingforce.com.br/en/cve-2021-36568/ -https://blog.hacktivesecurity.com/index.php/2021/10/05/cve-2021-43136-formalms-the-evil-default-value-that-leads-to-authentication-bypass/ -https://blog.hacktivesecurity.com/index.php/2024/05/08/cve-2024-32651-server-side-template-injection-changedetection-io/ -https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 -https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html -https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ -https://blog.inhq.net/posts/keepkey-CVE-2019-18671/ -https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ -https://blog.inhq.net/posts/keepkey-CVE-2021-31616/ -https://blog.inhq.net/posts/keepkey-CVE-2022-30330/ -https://blog.inhq.net/posts/keepkey-CVE-2023-27892/ -https://blog.inhq.net/posts/yubico-libu2f-host-vuln-part1/ -https://blog.inhq.net/posts/yubico-libykpiv-vuln/ -https://blog.inhq.net/posts/yubico-libyubihsm-vuln/ -https://blog.inhq.net/posts/yubico-libyubihsm-vuln2 -https://blog.inhq.net/posts/yubico-libyubihsm-vuln2/#second-attack-variant-cve-pending -https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/ -https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ -https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html -https://blog.isosceles.com/the-webp-0day/ -https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup -https://blog.jamesotten.com/post/applications-manager-rce/ -https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/ -https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ -https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita -https://blog.kscsc.online/cves/202331445/md.html -https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/ -https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ -https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51 -https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/ -https://blog.manavparekh.com/2023/06/cve-2023-30082.html -https://blog.manchestergreyhats.co.uk/2018/02/25/eavesdropping-on-wifi-baby-monitor/ -https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/ -https://blog.mirch.io/2018/11/05/cve-2018-18556-vyos-privilege-escalation-via-sudo-pppd-for-operator-users/ -https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/ -https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/ -https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/ -https://blog.mirch.io/2019/12/18/signal-desktop-windows-lpe/ -https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign -https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/ -https://blog.nettitude.com/uk/crsf-and-unsafe-arbitrary-file-upload-in-nextgen-gallery-plugin-for-wordpress -https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin/ -https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ -https://blog.nintechnet.com/settings-change-and-css-injection-in-wordpress-ocean-extra-plugin/ -https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ -https://blog.openzeppelin.com/argent-vulnerability-report/ -https://blog.openzeppelin.com/libra-vulnerability-summary/ -https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf -https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html -https://blog.ostorlab.co/zip-packages-exploitation.html -https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ -https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ -https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ -https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent -https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html -https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html -https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html -https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ -https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ -https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ -https://blog.scadafence.com/technical-blog-cve-2020-12117-industrial-iot-insecure-default-configurations -https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series -https://blog.scadafence.com/vulnerability-report-cve-2020-16849 -https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 -https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc -https://blog.securityevaluators.com/ise-labs-finds-vulnerabilities-in-zyxel-nsa325-945481a699b8 -https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc -https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a -https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86ahttps://downwithup.github.io/CVEPosts.html -https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/ -https://blog.smarttecs.com/posts/2024-002-cve-2024-27593/ -https://blog.smarttecs.com/posts/2024-004-cve-2024-34051/ -https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ -https://blog.sonarsource.com/ghost-admin-takeover -https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities -https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/ -https://blog.sonarsource.com/squirrel-vm-sandbox-escape/ -https://blog.sonarsource.com/wordpress-xxe-security-vulnerability/ -https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ -https://blog.sonatype.com/cve-2020-17479 -https://blog.sorcery.ie -https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/ -https://blog.sorcery.ie/posts/mybb_acp_rce/ -https://blog.sorcery.ie/posts/myprestamodules_phpinfo/ -https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ -https://blog.sorcery.ie/posts/simpleimportproduct_sqli/ -https://blog.sorcery.ie/posts/smartblog_sqli/ -https://blog.sth.sh/wordpress-action-network-1-4-3-authenticated-sql-injection-0-day-01fcd6e89e96 -https://blog.stmcyber.com/pax-pos-cves-2023/ -https://blog.stmcyber.com/vulns/cve-2021-2053/ -https://blog.stmcyber.com/vulns/cve-2021-28958/ -https://blog.stmcyber.com/vulns/cve-2021-31874/ -https://blog.stmcyber.com/vulns/cve-2021-33055/ -https://blog.stmcyber.com/vulns/cve-2021-37416/ -https://blog.stmcyber.com/vulns/cve-2021-37417/ -https://blog.stmcyber.com/vulns/cve-2021-37419/ -https://blog.stmcyber.com/vulns/cve-2021-37420/ -https://blog.stmcyber.com/vulns/cve-2021-37421/ -https://blog.stmcyber.com/vulns/cve-2022-30874/ -https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html -https://blog.sucuri.net/2015/01/serious-vulnerability-on-vbseo.html -https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html -https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html -https://blog.sucuri.net/2019/03/zero-day-stored-xss-in-social-warfare.html -https://blog.telspace.co.za/2019/08/tsa-2019-001-asus-precision-touchpad.html -https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html -https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/ -https://blog.to.com/advisory-runasspc-cve-2019-10239/ -https://blog.to.com/advisory-superwebmailer-cve-2020-11546/ -https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ -https://blog.to.com/advisory-teamviewer-cve-2019-11769-2/ -https://blog.to.com/advisory-webacms-2-1-0-cross-site-scripting/ -https://blog.trailofbits.com -https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ -https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/ -https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/ -https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ -https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ -https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html -https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ -https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ -https://blog.vonahi.io/whats-in-a-re-name/ -https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases -https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/ -https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html -https://blog.xpnsec.com/dirtynib/ -https://blog.xpnsec.com/total-meltdown-cve-2018-1038/ -https://blog.zerdle.net/classlink/ -https://blog.zerdle.net/classlink2/ -https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/ -https://blog.zimperium.com/dont-give-me-a-brake-xiaomi-scooter-hack-enables-dangerous-accelerations-and-stops-for-unsuspecting-riders/ -https://blog.zimperium.com/telegram-hack/ -https://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/ -https://blog.zoller.lu/p/from-low-hanging-fruit-department-avira.html -https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html -https://blog.zoller.lu/p/from-low-hanging-fruit-department_24.html -https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html -https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html -https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html -https://blog.zoller.lu/p/tzo-20-2020-quickheal-malformed-archive.html -https://blog.zoller.lu/p/tzo-23-2020-avast-generic-archive.html -https://blogs.gentoo.org/ago/2016/10/23/jasper-heap-based-buffer-overflow-in-jpc_dec_tiledecode-jpc_dec-c/ -https://blogs.gentoo.org/ago/2016/10/23/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c-incomplete-fix-for-cve-2016-8887/ -https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ -https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/ -https://blogs.gentoo.org/ago/2016/11/04/jasper-use-of-uninitialized-value-in-jpc_pi_nextcprl-jpc_t2cod-c/ -https://blogs.gentoo.org/ago/2016/11/07/jasper-use-after-free-in-jas_realloc-jas_malloc-c -https://blogs.gentoo.org/ago/2016/11/07/libdwarf-heap-based-buffer-overflow-in-_dwarf_skim_forms-dwarf_macro5-c -https://blogs.gentoo.org/ago/2016/11/07/libdwarf-heap-based-buffer-overflow-in-dwarf_get_aranges_list-dwarf_arange-c -https://blogs.gentoo.org/ago/2016/11/07/libming-listmp3-global-buffer-overflow-in-printmp3headers-listmp3-c/ -https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list -https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-left-shift-in-listmp3-c -https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure -https://blogs.gentoo.org/ago/2016/11/19/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h -https://blogs.gentoo.org/ago/2016/11/19/imagemagick-null-pointer-must-never-be-null-tiff-c/ -https://blogs.gentoo.org/ago/2016/11/19/jasper-signed-integer-overflow-in-jas_image-c -https://blogs.gentoo.org/ago/2016/11/19/libdwarf-negation-overflow-in-dwarf_leb-c/ -https://blogs.gentoo.org/ago/2016/11/20/jasper-stack-based-buffer-overflow-in-jpc_tsfb_getbands2-jpc_tsfb-c/ -https://blogs.gentoo.org/ago/2016/12/01/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c -https://blogs.gentoo.org/ago/2016/12/01/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h-incomplete-fix-for-cve-2016-9556/ -https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ -https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c/ -https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_definefont-parser-c/ -https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_rgba-parser-c/ -https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-null-pointer-dereference-in-dumpbuffer-read-c/ -https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero -https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ -https://blogs.gentoo.org/ago/2017/01/01/libtiff-stack-based-buffer-overflow-in-_tiffvgetfield-tif_dir-c/ -https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jas_matrix_asl-jas_seq-c/ -https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jpc_undo_roi-jpc_dec-c/ -https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-write-in-dec_clnpass-jpc_t1dec-c/ -https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ -https://blogs.gentoo.org/ago/2017/01/25/jasper-heap-based-buffer-overflow-in-jpc_dec_decodepkt-jpc_t2dec-c/ -https://blogs.gentoo.org/ago/2017/01/25/jasper-invalid-memory-read-in-jas_matrix_bindsub-jas_seq-c/ -https://blogs.gentoo.org/ago/2017/01/25/jasper-null-pointer-dereference-in-jp2_cdef_destroy-jp2_cod-c/ -https://blogs.gentoo.org/ago/2017/01/29/mp3splt-invalid-free-in-free_options-options_manager-c/ -https://blogs.gentoo.org/ago/2017/01/29/mp3splt-null-pointer-dereference-in-splt_cue_export_to_file-cue-c/ -https://blogs.gentoo.org/ago/2017/02/01/mp3splt-null-pointer-dereference-in-free_options-options_manager-c/ -https://blogs.gentoo.org/ago/2017/02/01/podofo-infinite-loop-in-podofopdfpagegetinheritedkeyfromobject-pdfpage-cpp/ -https://blogs.gentoo.org/ago/2017/02/01/podofo-null-pointer-dereference-in-pdfoutputstream-cpp/ -https://blogs.gentoo.org/ago/2017/02/01/podofo-null-pointer-dereference-in-podofopdfparserreadxrefsubsection-pdfparser-cpp/ -https://blogs.gentoo.org/ago/2017/02/01/podofo-signed-integer-overflow-in-pdfparser-cpp/ -https://blogs.gentoo.org/ago/2017/02/03/podofo-heap-based-buffer-overflow-in-podofopdftokenizergetnexttoken-pdftokenizer-cpp/ -https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-assertion-failure-in-seeko-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get64-fetch-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-zzip_mem_entry_extra_block-memdisk-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-invalid-memory-read-in-zzip_mem_entry_extra_block-memdisk-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-null-pointer-dereference-in-prescan_entry-fseeko-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-null-pointer-dereference-in-zzip_mem_entry_new-memdisk-c/ -https://blogs.gentoo.org/ago/2017/02/09/zziplib-out-of-bounds-read-in-zzip_mem_entry_new-memdisk-c/ -https://blogs.gentoo.org/ago/2017/02/17/mupdf-mujstest-stack-based-buffer-overflow-in-main-jstest_main-c/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecreset1-blockcodec-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecrunpull-blockcodec-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-global-buffer-overflow-in-decodesample-ima-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-alaw2linear_buf-g711-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-expand3to4modulerun-simplemodule-h/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcmdecodeblock-msadpcm-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcminitializecoefficients-msadpcm-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-readvalue-filehandle-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-ulaw2linear_buf-g711-cpp/ -https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-global-buffer-overflow-in-podofopdfparserreadxrefsubsection-pdfparser-cpp/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-heap-based-buffer-overflow-in-podofopdfvariantdelayedload-pdfvariant-h/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-invalid-memory-read-in-colorchangergetcolorfromstack-colorchanger-cpp/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-colorchangergetcolorfromstack-colorchanger-cpp/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementsetnonstrokingcolorspace-graphicsstack-h/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementtgraphicsstackelement-graphicsstack-h/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcolorgraypdfcolorgray-pdfcolor-cpp/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcoloroperator-pdfcolor-cpp/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfvariantdelayedload-pdfvariant-h/ -https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfxobjectpdfxobject-pdfxobject-cpp/ -https://blogs.gentoo.org/ago/2017/03/03/potrace-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c-incomplete-fix-for-cve-2016-8698/ -https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/ -https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/ -https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ -https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference -https://blogs.gentoo.org/ago/2017/03/31/podofo-heap-based-buffer-overflow-in-podofopdfpainterexpandtabs-pdfpainter-cpp -https://blogs.gentoo.org/ago/2017/03/31/podofo-heap-based-buffer-overflow-in-podofopdfsimpleencodingconverttoencoding-pdfencoding-cpp -https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ -https://blogs.gentoo.org/ago/2017/04/01/libtiff-divide-by-zero-in-jpegsetupencode-tiff_jpeg-c -https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes -https://blogs.gentoo.org/ago/2017/04/02/imagemagick-undefined-behavior-in-codersrle-c/ -https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c -https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c -https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c -https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c -https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c -https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c -https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c -https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/ -https://blogs.gentoo.org/ago/2017/04/17/imageworsener-divide-by-zero-in-iwgif_record_pixel-imagew-gif-c/ -https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ -https://blogs.gentoo.org/ago/2017/04/27/imageworsener-heap-based-buffer-overflow-in-iw_process_cols_to_intermediate-imagew-main-c/ -https://blogs.gentoo.org/ago/2017/04/27/imageworsener-memory-allocation-failure-in-my_mallocfn-imagew-cmd-c/ -https://blogs.gentoo.org/ago/2017/04/27/imageworsener-two-left-shift/ -https://blogs.gentoo.org/ago/2017/04/29/ettercap-etterfilter-heap-based-buffer-overflow-write/ -https://blogs.gentoo.org/ago/2017/04/29/libpcre-heap-based-buffer-overflow-write-in-pcre2test-c/ -https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/ -https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/ -https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/ -https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/ -https://blogs.gentoo.org/ago/2017/04/29/rzip-heap-based-buffer-overflow-in-read_buf-stream-c/ -https://blogs.gentoo.org/ago/2017/04/30/libmad-assertion-failure-in-layer3-c/ -https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_bit_skip-bit-c/ -https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/ -https://blogs.gentoo.org/ago/2017/05/07/lrzip-divide-by-zero-in-bufreadget-libzpaq-h/ -https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/ -https://blogs.gentoo.org/ago/2017/05/07/lrzip-invalid-memory-read-in-lzo_decompress_buf-stream-c/ -https://blogs.gentoo.org/ago/2017/05/07/lrzip-null-pointer-dereference-in-bufreadget-libzpaq-h/ -https://blogs.gentoo.org/ago/2017/05/07/lrzip-null-pointer-dereference-in-join_pthread-stream-c/ -https://blogs.gentoo.org/ago/2017/05/07/lrzip-use-after-free-in-read_stream-stream-c/ -https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ -https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ -https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ -https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ -https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-decompressrtf-ytnef-c/ -https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapdword-ytnef-c/ -https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapword-ytnef-c/ -https://blogs.gentoo.org/ago/2017/05/24/ytnef-memory-allocation-failure-in-tneffillmapi-ytnef-c/ -https://blogs.gentoo.org/ago/2017/05/24/ytnef-null-pointer-dereference-in-mapiprint-ytnef-c/ -https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/ -https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/ -https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-iii_i_stereo-layer3-c/ -https://blogs.gentoo.org/ago/2017/06/17/lame-heap-based-buffer-overflow-in-fill_buffer_resample-util-c/ -https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_dequantize_sample-layer3-c/ -https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/ -https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_get_path-util-c/ -https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_unserialize-archive-c/ -https://blogs.gentoo.org/ago/2017/07/03/mpg123-global-buffer-overflow-in-iii_i_stereo-layer3-c/ -https://blogs.gentoo.org/ago/2017/07/12/graphicsmagick-use-after-free-in-closeblob-blob-c/ -https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-heap-based-buffer-overflow-in-readsunimage-sun-c/ -https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/ -https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-use-after-free-in-readwmfimage-wmf-c/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-divide-by-zero-in-cdirvectorgettable-dirfunc-hxx/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-double-free-in-dffromlb-docfile-cxx/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-heap-based-buffer-overflow-in-olestreamwritevt_lpstr-olestrm-cpp/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-cdirectorygetdirentry-dir-cxx/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-olestreamwritevt_lpstr-olestrm-cpp/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-pfileflashpixviewgetglobalinfoproperty-f_fpxvw-cpp/ -https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-wchar-c/ -https://blogs.gentoo.org/ago/2017/08/10/imagemagick-heap-based-buffer-overflow-in-omp_outlined-32-enhance-c/ -https://blogs.gentoo.org/ago/2017/08/10/imagemagick-use-after-free-in-destroyimage-image-c/ -https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/ -https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_mqc_flush-mqc-c/ -https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c/ -https://blogs.gentoo.org/ago/2017/08/28/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c-2/ -https://blogs.gentoo.org/ago/2017/08/28/openjpeg-heap-based-buffer-overflow-in-opj_t2_encode_packet-t2-c/ -https://blogs.gentoo.org/ago/2017/08/28/openjpeg-invalid-memory-write-in-tgatoimage-convert-c/ -https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/ -https://blogs.gentoo.org/ago/2017/09/01/graphicsmagick-use-after-free-in-closeblob-blob-c-incomplete-fix-for-cve-2017-11403/ -https://blogs.gentoo.org/ago/2017/09/01/libzip-memory-allocation-failure-in-_zip_cdir_grow-zip_dirent-c/ -https://blogs.gentoo.org/ago/2017/09/06/graphicsmagick-memory-allocation-failure-in-magickmalloc-memory-c-2/ -https://blogs.gentoo.org/ago/2017/09/06/heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c-incomplete-fix-for-cve-2017-14152/ -https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/ -https://blogs.gentoo.org/ago/2017/09/07/aacplusenc-null-pointer-dereference-in-deletebitbuffer-bitbuffer-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_dequantize_sample-mpglibdbllayer3-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_i_stereo-mpglibdbllayer3-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-invalid-memory-write-in-copy_mp-mpglibdblinterface-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-null-pointer-dereference-in-sync_buffer-mpglibdblinterface-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-copy_mp-mpglibdblinterface-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-dct36-mpglibdbllayer3-c/ -https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-filteryule-gain_analysis-c/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_bitstreamreadbytes-ap4bitstream-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_bytestouint32be-ap4utils-h/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_databuffersetdata-ap4databuffer-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_hdlratomap4_hdlratom-ap4hdlratom-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_atomsampletablegetsample-ap4atomsampletable-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_atomsettype-ap4atom-h/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_dataatomap4_dataatom-ap4metadata-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_stdcfilebytestreamreadpartial-ap4stdcfilebytestream-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-overflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/ -https://blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-underflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/ -https://blogs.gentoo.org/ago/2017/09/19/graphicsmagick-assertion-failure-in-pixel_cache-c/ -https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/ -https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/ -https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/ -https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/ -https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/ -https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/ -https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/ -https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/ -https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/ -https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/ -https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/ -https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/ -https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ -https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html -https://blu3ming.github.io/sourcecodester-employee-management-system-sql-injection/ -https://bmantra.github.io/logmx/logmx.html -https://bnbdr.github.io/posts/extracheese/ -https://bnbdr.github.io/posts/swisscheese/ -https://bnbdr.github.io/posts/wd/ -https://bogner.sh/2019/06/local-privilege-escalation-in-rapid7s-windows-insight-idr-agent/ -https://bordplate.no/blog/en/post/crashplan-privilege-escalation/ -https://boschko.ca/glinet-router -https://boschko.ca/tenda_ac1200_router -https://boschko.ca/tenda_ac1200_router/ -https://breakingthe3ma.app -https://breakingthe3ma.app/files/Threema-PST22.pdf -https://bro-tracker.atlassian.net/browse/BIT-1856 -https://brooklyn.apache.org/community/security/CVE-2016-8737.html -https://brooklyn.apache.org/community/security/CVE-2016-8744.html -https://brooklyn.apache.org/community/security/CVE-2017-3165.html -https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/ -https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ -https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator -https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator -https://bugbounty.zohocorp.com/bb/#/bug/101000006459171?tab=originator -https://bugbounty.zohocorp.com/bb/#/bug/101000006459195?tab=originator -https://bugbounty.zohocorp.com/bb/#/bug/101000006459751?tab=originator -https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator -https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions -https://bugcrowd.com/vulnerability-rating-taxonomy -https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ -https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ -https://bugs.astron.com/view.php?id=310 -https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=458571 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=530102 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=548244 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=551596 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=568803 -https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924 -https://bugs.exim.org/show_bug.cgi?id=2201 -https://bugs.exim.org/show_bug.cgi?id=2571 -https://bugs.freedesktop.org/show_bug.cgi?id=100763 -https://bugs.freedesktop.org/show_bug.cgi?id=100774 -https://bugs.freedesktop.org/show_bug.cgi?id=100775 -https://bugs.freedesktop.org/show_bug.cgi?id=100776 -https://bugs.freedesktop.org/show_bug.cgi?id=101084 -https://bugs.freedesktop.org/show_bug.cgi?id=101208 -https://bugs.freedesktop.org/show_bug.cgi?id=101540 -https://bugs.freedesktop.org/show_bug.cgi?id=101547 -https://bugs.freedesktop.org/show_bug.cgi?id=102601 -https://bugs.freedesktop.org/show_bug.cgi?id=102604 -https://bugs.freedesktop.org/show_bug.cgi?id=102607 -https://bugs.freedesktop.org/show_bug.cgi?id=102687 -https://bugs.freedesktop.org/show_bug.cgi?id=102688 -https://bugs.freedesktop.org/show_bug.cgi?id=102701 -https://bugs.freedesktop.org/show_bug.cgi?id=102719 -https://bugs.freedesktop.org/show_bug.cgi?id=102854 -https://bugs.freedesktop.org/show_bug.cgi?id=102969 -https://bugs.freedesktop.org/show_bug.cgi?id=103016 -https://bugs.freedesktop.org/show_bug.cgi?id=103045 -https://bugs.freedesktop.org/show_bug.cgi?id=105204 -https://bugs.freedesktop.org/show_bug.cgi?id=105205 -https://bugs.freedesktop.org/show_bug.cgi?id=105206 -https://bugs.freedesktop.org/show_bug.cgi?id=105247 -https://bugs.freedesktop.org/show_bug.cgi?id=106408 -https://bugs.freedesktop.org/show_bug.cgi?id=106981 -https://bugs.freedesktop.org/show_bug.cgi?id=28801 -https://bugs.freedesktop.org/show_bug.cgi?id=32321 -https://bugs.freedesktop.org/show_bug.cgi?id=93476 -https://bugs.freedroid.org/b/issue951 -https://bugs.freedroid.org/b/issue953 -https://bugs.freenas.org/issues/5844 -https://bugs.gentoo.org/641842 -https://bugs.gentoo.org/692492 -https://bugs.gentoo.org/868495 -https://bugs.gentoo.org/868543 -https://bugs.gentoo.org/show_bug.cgi?id=100519 -https://bugs.gentoo.org/show_bug.cgi?id=103555 -https://bugs.gentoo.org/show_bug.cgi?id=276235 -https://bugs.gentoo.org/show_bug.cgi?id=516822 -https://bugs.gentoo.org/show_bug.cgi?id=858107 -https://bugs.ghostscript.com/show_bug.cgi?id=697596 -https://bugs.ghostscript.com/show_bug.cgi?id=698538 -https://bugs.ghostscript.com/show_bug.cgi?id=698551 -https://bugs.ghostscript.com/show_bug.cgi?id=698558 -https://bugs.ghostscript.com/show_bug.cgi?id=699271 -https://bugs.ghostscript.com/show_bug.cgi?id=700153 -https://bugs.ghostscript.com/show_bug.cgi?id=700301 -https://bugs.ghostscript.com/show_bug.cgi?id=700576 -https://bugs.ghostscript.com/show_bug.cgi?id=700585 -https://bugs.horde.org/ticket/14926 -https://bugs.internet2.edu/jira/browse/GRP-1838 -https://bugs.kde.org/show_bug.cgi?id=398096 -https://bugs.kde.org/show_bug.cgi?id=404697 -https://bugs.kde.org/show_bug.cgi?id=404698 -https://bugs.launchpad.net/apport/+bug/1648806 -https://bugs.launchpad.net/bugs/1899193 -https://bugs.launchpad.net/bugs/1901572 -https://bugs.launchpad.net/bugs/670622 -https://bugs.launchpad.net/calibre/+bug/1753870 -https://bugs.launchpad.net/calibre/+bug/1951979 -https://bugs.launchpad.net/calibre/+bug/885027 -https://bugs.launchpad.net/devstack/+bug/1168252 -https://bugs.launchpad.net/evergreen/+bug/1206589 -https://bugs.launchpad.net/horizon/+bug/1322197 -https://bugs.launchpad.net/horizon/+bug/1567673 -https://bugs.launchpad.net/hugin/+bug/2025032 -https://bugs.launchpad.net/hugin/+bug/2025035 -https://bugs.launchpad.net/hugin/+bug/2025037 -https://bugs.launchpad.net/hugin/+bug/2025038 -https://bugs.launchpad.net/inkscape/+bug/1025185 -https://bugs.launchpad.net/katacontainers.io/+bug/1878234 -https://bugs.launchpad.net/mahara/+bug/1055232 -https://bugs.launchpad.net/mahara/+bug/1057240 -https://bugs.launchpad.net/mahara/+bug/1363873 -https://bugs.launchpad.net/mahara/+bug/1404117 -https://bugs.launchpad.net/mahara/+bug/1480329 -https://bugs.launchpad.net/mahara/+bug/1770561 -https://bugs.launchpad.net/nova/+bug/1202266 -https://bugs.launchpad.net/nova/+bug/1325128 -https://bugs.launchpad.net/ossn/+bug/1168252 -https://bugs.launchpad.net/snapd/+bug/2065077 -https://bugs.launchpad.net/solum/+bug/2047505 -https://bugs.launchpad.net/swift/+bug/1449212 -https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858 -https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863 -https://bugs.launchpad.net/ubuntu/+bug/531569 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1839795 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1862933 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308 -https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 -https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 -https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1899193 -https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 -https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/1897287 -https://bugs.launchpad.net/ubuntu/+source/byobu/+bug/1827202 -https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 -https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 -https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365 -https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473 -https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251 -https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858744 -https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858746 -https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 -https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821 -https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522 -https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840 -https://bugs.launchpad.net/ubuntu/+source/lrzip/+bug/1893641 -https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842 -https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1829071 -https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 -https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1668321 -https://bugs.launchpad.net/ubuntu/+source/phpldapadmin/+bug/1701731 -https://bugs.launchpad.net/ubuntu/+source/pipewire/+bug/1995707/ -https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/1016643 -https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912 -https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 -https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860 -https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025 -https://bugs.launchpad.net/xibo/+bug/1093967 -https://bugs.limesurvey.org/bug_relationship_graph.php?bug_id=19364&graph=relation -https://bugs.limesurvey.org/view.php?id=14376 -https://bugs.openwrt.org/index.php?do=details&task_id=4199 -https://bugs.oxid-esales.com/view.php?id=6674 -https://bugs.php.net/72479 -https://bugs.php.net/72494 -https://bugs.php.net/72513 -https://bugs.php.net/72562 -https://bugs.php.net/72606 -https://bugs.php.net/bug.php?id=47802 -https://bugs.php.net/bug.php?id=54681 -https://bugs.php.net/bug.php?id=61755 -https://bugs.php.net/bug.php?id=66356 -https://bugs.php.net/bug.php?id=66901 -https://bugs.php.net/bug.php?id=67060 -https://bugs.php.net/bug.php?id=67397 -https://bugs.php.net/bug.php?id=67538 -https://bugs.php.net/bug.php?id=67539 -https://bugs.php.net/bug.php?id=68044 -https://bugs.php.net/bug.php?id=68552 -https://bugs.php.net/bug.php?id=68594 -https://bugs.php.net/bug.php?id=68942 -https://bugs.php.net/bug.php?id=69090 -https://bugs.php.net/bug.php?id=69324 -https://bugs.php.net/bug.php?id=69364 -https://bugs.php.net/bug.php?id=69441 -https://bugs.php.net/bug.php?id=69443 -https://bugs.php.net/bug.php?id=69453 -https://bugs.php.net/bug.php?id=69646 -https://bugs.php.net/bug.php?id=69720 -https://bugs.php.net/bug.php?id=69737 -https://bugs.php.net/bug.php?id=69793 -https://bugs.php.net/bug.php?id=70068 -https://bugs.php.net/bug.php?id=70081 -https://bugs.php.net/bug.php?id=70168 -https://bugs.php.net/bug.php?id=70169 -https://bugs.php.net/bug.php?id=70172 -https://bugs.php.net/bug.php?id=70219 -https://bugs.php.net/bug.php?id=70365 -https://bugs.php.net/bug.php?id=70366 -https://bugs.php.net/bug.php?id=70976 -https://bugs.php.net/bug.php?id=71020 -https://bugs.php.net/bug.php?id=71270 -https://bugs.php.net/bug.php?id=71331 -https://bugs.php.net/bug.php?id=71354 -https://bugs.php.net/bug.php?id=71498 -https://bugs.php.net/bug.php?id=71587 -https://bugs.php.net/bug.php?id=71610 -https://bugs.php.net/bug.php?id=71637 -https://bugs.php.net/bug.php?id=71719 -https://bugs.php.net/bug.php?id=71735 -https://bugs.php.net/bug.php?id=71798 -https://bugs.php.net/bug.php?id=72094 -https://bugs.php.net/bug.php?id=72135 -https://bugs.php.net/bug.php?id=72241 -https://bugs.php.net/bug.php?id=72262 -https://bugs.php.net/bug.php?id=72339 -https://bugs.php.net/bug.php?id=72433 -https://bugs.php.net/bug.php?id=72434 -https://bugs.php.net/bug.php?id=72446 -https://bugs.php.net/bug.php?id=72455 -https://bugs.php.net/bug.php?id=72663 -https://bugs.php.net/bug.php?id=72681 -https://bugs.php.net/bug.php?id=72696 -https://bugs.php.net/bug.php?id=72697 -https://bugs.php.net/bug.php?id=72742 -https://bugs.php.net/bug.php?id=72978 -https://bugs.php.net/bug.php?id=73003 -https://bugs.php.net/bug.php?id=73007 -https://bugs.php.net/bug.php?id=73052 -https://bugs.php.net/bug.php?id=73055 -https://bugs.php.net/bug.php?id=73055&edit=1 -https://bugs.php.net/bug.php?id=73065 -https://bugs.php.net/bug.php?id=73092 -https://bugs.php.net/bug.php?id=73093 -https://bugs.php.net/bug.php?id=73147 -https://bugs.php.net/bug.php?id=73331 -https://bugs.php.net/bug.php?id=73832 -https://bugs.php.net/bug.php?id=74544 -https://bugs.php.net/bug.php?id=75535 -https://bugs.php.net/bug.php?id=75571 -https://bugs.php.net/bug.php?id=75981 -https://bugs.php.net/bug.php?id=76248 -https://bugs.php.net/bug.php?id=76449 -https://bugs.php.net/bug.php?id=76450 -https://bugs.php.net/bug.php?id=76557 -https://bugs.php.net/bug.php?id=76582 -https://bugs.php.net/bug.php?id=77247 -https://bugs.php.net/bug.php?id=77270 -https://bugs.php.net/bug.php?id=78069 -https://bugs.php.net/bug.php?id=78862 -https://bugs.php.net/bug.php?id=78863 -https://bugs.php.net/bug.php?id=78875 -https://bugs.php.net/bug.php?id=78876 -https://bugs.php.net/bug.php?id=79037 -https://bugs.php.net/bug.php?id=79221 -https://bugs.php.net/bug.php?id=79465 -https://bugs.php.net/bug.php?id=79797 -https://bugs.php.net/bug.php?id=79971 -https://bugs.php.net/bug.php?id=81708 -https://bugs.php.net/bug.php?id=81726 -https://bugs.python.org/issue26171 -https://bugs.python.org/issue30657 -https://bugs.python.org/issue34656 -https://bugs.python.org/issue35906 -https://bugs.python.org/issue35907 -https://bugs.python.org/issue36276 -https://bugs.python.org/issue38243 -https://bugs.python.org/issue39421 -https://bugs.python.org/issue42938 -https://bugs.python.org/issue43223 -https://bugs.ruby-lang.org/issues/13234 -https://bugs.webkit.org/show_bug.cgi?id=164123 -https://bugs.webkit.org/show_bug.cgi?id=167239 -https://bugs.webkit.org/show_bug.cgi?id=38922 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12750 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12752 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13799 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13811 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15281 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2922 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5732 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5908 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7570 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7571 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7572 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7573 -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8274 -https://bugzilla.freedesktop.org/show_bug.cgi?id=103238 -https://bugzilla.gnome.org/show_bug.cgi?id=600741 -https://bugzilla.gnome.org/show_bug.cgi?id=641802 -https://bugzilla.gnome.org/show_bug.cgi?id=707905 -https://bugzilla.gnome.org/show_bug.cgi?id=739134 -https://bugzilla.gnome.org/show_bug.cgi?id=752297 -https://bugzilla.gnome.org/show_bug.cgi?id=757711 -https://bugzilla.gnome.org/show_bug.cgi?id=758605 -https://bugzilla.gnome.org/show_bug.cgi?id=763071 -https://bugzilla.gnome.org/show_bug.cgi?id=770143 -https://bugzilla.gnome.org/show_bug.cgi?id=774533 -https://bugzilla.gnome.org/show_bug.cgi?id=774834 -https://bugzilla.gnome.org/show_bug.cgi?id=774859 -https://bugzilla.gnome.org/show_bug.cgi?id=774896 -https://bugzilla.gnome.org/show_bug.cgi?id=774897 -https://bugzilla.gnome.org/show_bug.cgi?id=774902 -https://bugzilla.gnome.org/show_bug.cgi?id=775048 -https://bugzilla.gnome.org/show_bug.cgi?id=775120 -https://bugzilla.gnome.org/show_bug.cgi?id=775200 -https://bugzilla.gnome.org/show_bug.cgi?id=775450 -https://bugzilla.gnome.org/show_bug.cgi?id=775451 -https://bugzilla.gnome.org/show_bug.cgi?id=777262 -https://bugzilla.gnome.org/show_bug.cgi?id=777263 -https://bugzilla.gnome.org/show_bug.cgi?id=777265 -https://bugzilla.gnome.org/show_bug.cgi?id=777469 -https://bugzilla.gnome.org/show_bug.cgi?id=777525 -https://bugzilla.gnome.org/show_bug.cgi?id=777937 -https://bugzilla.gnome.org/show_bug.cgi?id=777955#c3 -https://bugzilla.gnome.org/show_bug.cgi?id=777991 -https://bugzilla.gnome.org/show_bug.cgi?id=778048 -https://bugzilla.gnome.org/show_bug.cgi?id=778050 -https://bugzilla.gnome.org/show_bug.cgi?id=784630 -https://bugzilla.gnome.org/show_bug.cgi?id=785973 -https://bugzilla.gnome.org/show_bug.cgi?id=788980 -https://bugzilla.gnome.org/show_bug.cgi?id=790849 -https://bugzilla.gnome.org/show_bug.cgi?id=790853 -https://bugzilla.gnome.org/show_bug.cgi?id=791037 -https://bugzilla.gnome.org/show_bug.cgi?id=794337 -https://bugzilla.gnome.org/show_bug.cgi?id=794914 -https://bugzilla.gnome.org/show_bug.cgi?id=795248 -https://bugzilla.gnome.org/show_bug.cgi?id=795249 -https://bugzilla.gnome.org/show_bug.cgi?id=795740 -https://bugzilla.gnome.org/show_bug.cgi?id=796424 -https://bugzilla.ipfire.org/show_bug.cgi?id=12226 -https://bugzilla.libsdl.org/show_bug.cgi?id=4490 -https://bugzilla.libsdl.org/show_bug.cgi?id=4491 -https://bugzilla.libsdl.org/show_bug.cgi?id=4492 -https://bugzilla.libsdl.org/show_bug.cgi?id=4493 -https://bugzilla.libsdl.org/show_bug.cgi?id=4494 -https://bugzilla.libsdl.org/show_bug.cgi?id=4495 -https://bugzilla.libsdl.org/show_bug.cgi?id=4496 -https://bugzilla.libsdl.org/show_bug.cgi?id=4497 -https://bugzilla.libsdl.org/show_bug.cgi?id=4498 -https://bugzilla.libsdl.org/show_bug.cgi?id=4499 -https://bugzilla.libsdl.org/show_bug.cgi?id=4500 -https://bugzilla.libsdl.org/show_bug.cgi?id=4522 -https://bugzilla.libsdl.org/show_bug.cgi?id=4538 -https://bugzilla.libsdl.org/show_bug.cgi?id=4619 -https://bugzilla.libsdl.org/show_bug.cgi?id=4620 -https://bugzilla.libsdl.org/show_bug.cgi?id=4621 -https://bugzilla.libsdl.org/show_bug.cgi?id=4625 -https://bugzilla.libsdl.org/show_bug.cgi?id=4626 -https://bugzilla.libsdl.org/show_bug.cgi?id=4627 -https://bugzilla.libsdl.org/show_bug.cgi?id=4628 -https://bugzilla.libsdl.org/show_bug.cgi?id=5200 -https://bugzilla.mozilla.org/show_bug.cgi?id=1002340 -https://bugzilla.mozilla.org/show_bug.cgi?id=1002702 -https://bugzilla.mozilla.org/show_bug.cgi?id=1011859 -https://bugzilla.mozilla.org/show_bug.cgi?id=1012694 -https://bugzilla.mozilla.org/show_bug.cgi?id=1018234 -https://bugzilla.mozilla.org/show_bug.cgi?id=1018524 -https://bugzilla.mozilla.org/show_bug.cgi?id=1019684 -https://bugzilla.mozilla.org/show_bug.cgi?id=1020008 -https://bugzilla.mozilla.org/show_bug.cgi?id=1020041 -https://bugzilla.mozilla.org/show_bug.cgi?id=1020205 -https://bugzilla.mozilla.org/show_bug.cgi?id=1021240 -https://bugzilla.mozilla.org/show_bug.cgi?id=1026037 -https://bugzilla.mozilla.org/show_bug.cgi?id=1036213 -https://bugzilla.mozilla.org/show_bug.cgi?id=1045977 -https://bugzilla.mozilla.org/show_bug.cgi?id=1047831 -https://bugzilla.mozilla.org/show_bug.cgi?id=1063327 -https://bugzilla.mozilla.org/show_bug.cgi?id=1068218 -https://bugzilla.mozilla.org/show_bug.cgi?id=1069405 -https://bugzilla.mozilla.org/show_bug.cgi?id=1074812 -https://bugzilla.mozilla.org/show_bug.cgi?id=1075546 -https://bugzilla.mozilla.org/show_bug.cgi?id=1075578 -https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 -https://bugzilla.mozilla.org/show_bug.cgi?id=1080987 -https://bugzilla.mozilla.org/show_bug.cgi?id=1087565 -https://bugzilla.mozilla.org/show_bug.cgi?id=1088635 -https://bugzilla.mozilla.org/show_bug.cgi?id=1092947 -https://bugzilla.mozilla.org/show_bug.cgi?id=1096026 -https://bugzilla.mozilla.org/show_bug.cgi?id=1101158 -https://bugzilla.mozilla.org/show_bug.cgi?id=1116385 -https://bugzilla.mozilla.org/show_bug.cgi?id=1125013 -https://bugzilla.mozilla.org/show_bug.cgi?id=1130541 -https://bugzilla.mozilla.org/show_bug.cgi?id=1136692 -https://bugzilla.mozilla.org/show_bug.cgi?id=1145255 -https://bugzilla.mozilla.org/show_bug.cgi?id=1146339 -https://bugzilla.mozilla.org/show_bug.cgi?id=1148732 -https://bugzilla.mozilla.org/show_bug.cgi?id=1149000 -https://bugzilla.mozilla.org/show_bug.cgi?id=1152280 -https://bugzilla.mozilla.org/show_bug.cgi?id=1153672 -https://bugzilla.mozilla.org/show_bug.cgi?id=1154683 -https://bugzilla.mozilla.org/show_bug.cgi?id=1175278 -https://bugzilla.mozilla.org/show_bug.cgi?id=1177861 -https://bugzilla.mozilla.org/show_bug.cgi?id=1189082 -https://bugzilla.mozilla.org/show_bug.cgi?id=1189814 -https://bugzilla.mozilla.org/show_bug.cgi?id=1189860 -https://bugzilla.mozilla.org/show_bug.cgi?id=1190038 -https://bugzilla.mozilla.org/show_bug.cgi?id=1193027 -https://bugzilla.mozilla.org/show_bug.cgi?id=1193093 -https://bugzilla.mozilla.org/show_bug.cgi?id=1194818 -https://bugzilla.mozilla.org/show_bug.cgi?id=1194820 -https://bugzilla.mozilla.org/show_bug.cgi?id=1198435 -https://bugzilla.mozilla.org/show_bug.cgi?id=1202447 -https://bugzilla.mozilla.org/show_bug.cgi?id=1203078 -https://bugzilla.mozilla.org/show_bug.cgi?id=1203135 -https://bugzilla.mozilla.org/show_bug.cgi?id=1208339 -https://bugzilla.mozilla.org/show_bug.cgi?id=1208520 -https://bugzilla.mozilla.org/show_bug.cgi?id=1208946 -https://bugzilla.mozilla.org/show_bug.cgi?id=1211262 -https://bugzilla.mozilla.org/show_bug.cgi?id=1212939 -https://bugzilla.mozilla.org/show_bug.cgi?id=1215648 -https://bugzilla.mozilla.org/show_bug.cgi?id=1216748 -https://bugzilla.mozilla.org/show_bug.cgi?id=1220493 -https://bugzilla.mozilla.org/show_bug.cgi?id=1221444 -https://bugzilla.mozilla.org/show_bug.cgi?id=1221518 -https://bugzilla.mozilla.org/show_bug.cgi?id=1222798 -https://bugzilla.mozilla.org/show_bug.cgi?id=1223743 -https://bugzilla.mozilla.org/show_bug.cgi?id=1226977 -https://bugzilla.mozilla.org/show_bug.cgi?id=1227538 -https://bugzilla.mozilla.org/show_bug.cgi?id=1228103 -https://bugzilla.mozilla.org/show_bug.cgi?id=1228590 -https://bugzilla.mozilla.org/show_bug.cgi?id=1228950 -https://bugzilla.mozilla.org/show_bug.cgi?id=1229681 -https://bugzilla.mozilla.org/show_bug.cgi?id=1232069 -https://bugzilla.mozilla.org/show_bug.cgi?id=1232785 -https://bugzilla.mozilla.org/show_bug.cgi?id=1237219 -https://bugzilla.mozilla.org/show_bug.cgi?id=1240880 -https://bugzilla.mozilla.org/show_bug.cgi?id=1243178 -https://bugzilla.mozilla.org/show_bug.cgi?id=1245264 -https://bugzilla.mozilla.org/show_bug.cgi?id=1245724 -https://bugzilla.mozilla.org/show_bug.cgi?id=1245791 -https://bugzilla.mozilla.org/show_bug.cgi?id=1245795 -https://bugzilla.mozilla.org/show_bug.cgi?id=1246054 -https://bugzilla.mozilla.org/show_bug.cgi?id=1246093 -https://bugzilla.mozilla.org/show_bug.cgi?id=1246944 -https://bugzilla.mozilla.org/show_bug.cgi?id=1247239 -https://bugzilla.mozilla.org/show_bug.cgi?id=1247968 -https://bugzilla.mozilla.org/show_bug.cgi?id=1252330 -https://bugzilla.mozilla.org/show_bug.cgi?id=1253673 -https://bugzilla.mozilla.org/show_bug.cgi?id=1255474 -https://bugzilla.mozilla.org/show_bug.cgi?id=1270381 -https://bugzilla.mozilla.org/show_bug.cgi?id=1271460 -https://bugzilla.mozilla.org/show_bug.cgi?id=1273129 -https://bugzilla.mozilla.org/show_bug.cgi?id=1274637 -https://bugzilla.mozilla.org/show_bug.cgi?id=1282430 -https://bugzilla.mozilla.org/show_bug.cgi?id=1284395 -https://bugzilla.mozilla.org/show_bug.cgi?id=1285003 -https://bugzilla.mozilla.org/show_bug.cgi?id=1287266 -https://bugzilla.mozilla.org/show_bug.cgi?id=1289085 -https://bugzilla.mozilla.org/show_bug.cgi?id=1292159 -https://bugzilla.mozilla.org/show_bug.cgi?id=1293463 -https://bugzilla.mozilla.org/show_bug.cgi?id=1295023 -https://bugzilla.mozilla.org/show_bug.cgi?id=1299686 -https://bugzilla.mozilla.org/show_bug.cgi?id=1301876 -https://bugzilla.mozilla.org/show_bug.cgi?id=1309630 -https://bugzilla.mozilla.org/show_bug.cgi?id=1315435 -https://bugzilla.mozilla.org/show_bug.cgi?id=1317873 -https://bugzilla.mozilla.org/show_bug.cgi?id=1319070 -https://bugzilla.mozilla.org/show_bug.cgi?id=1319370 -https://bugzilla.mozilla.org/show_bug.cgi?id=1320039 -https://bugzilla.mozilla.org/show_bug.cgi?id=1320057 -https://bugzilla.mozilla.org/show_bug.cgi?id=1321619 -https://bugzilla.mozilla.org/show_bug.cgi?id=1321719 -https://bugzilla.mozilla.org/show_bug.cgi?id=1321814 -https://bugzilla.mozilla.org/show_bug.cgi?id=1325200 -https://bugzilla.mozilla.org/show_bug.cgi?id=1325511 -https://bugzilla.mozilla.org/show_bug.cgi?id=1325955 -https://bugzilla.mozilla.org/show_bug.cgi?id=1328762 -https://bugzilla.mozilla.org/show_bug.cgi?id=1336622 -https://bugzilla.mozilla.org/show_bug.cgi?id=1336830 -https://bugzilla.mozilla.org/show_bug.cgi?id=1336832 -https://bugzilla.mozilla.org/show_bug.cgi?id=1336964 -https://bugzilla.mozilla.org/show_bug.cgi?id=1336979 -https://bugzilla.mozilla.org/show_bug.cgi?id=1338637 -https://bugzilla.mozilla.org/show_bug.cgi?id=1342742 -https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 -https://bugzilla.mozilla.org/show_bug.cgi?id=1344415 -https://bugzilla.mozilla.org/show_bug.cgi?id=1344461 -https://bugzilla.mozilla.org/show_bug.cgi?id=1346515 -https://bugzilla.mozilla.org/show_bug.cgi?id=1347617 -https://bugzilla.mozilla.org/show_bug.cgi?id=1348645 -https://bugzilla.mozilla.org/show_bug.cgi?id=1349310 -https://bugzilla.mozilla.org/show_bug.cgi?id=1352039 -https://bugzilla.mozilla.org/show_bug.cgi?id=1356596 -https://bugzilla.mozilla.org/show_bug.cgi?id=1356824 -https://bugzilla.mozilla.org/show_bug.cgi?id=1356893 -https://bugzilla.mozilla.org/show_bug.cgi?id=1360842 -https://bugzilla.mozilla.org/show_bug.cgi?id=1362050 -https://bugzilla.mozilla.org/show_bug.cgi?id=1367531 -https://bugzilla.mozilla.org/show_bug.cgi?id=1368490 -https://bugzilla.mozilla.org/show_bug.cgi?id=1370497 -https://bugzilla.mozilla.org/show_bug.cgi?id=1374047 -https://bugzilla.mozilla.org/show_bug.cgi?id=1388015 -https://bugzilla.mozilla.org/show_bug.cgi?id=1390882 -https://bugzilla.mozilla.org/show_bug.cgi?id=1397064 -https://bugzilla.mozilla.org/show_bug.cgi?id=1399540 -https://bugzilla.mozilla.org/show_bug.cgi?id=1401339 -https://bugzilla.mozilla.org/show_bug.cgi?id=1408708 -https://bugzilla.mozilla.org/show_bug.cgi?id=1408990 -https://bugzilla.mozilla.org/show_bug.cgi?id=1411699 -https://bugzilla.mozilla.org/show_bug.cgi?id=1411708 -https://bugzilla.mozilla.org/show_bug.cgi?id=1411716 -https://bugzilla.mozilla.org/show_bug.cgi?id=1416045 -https://bugzilla.mozilla.org/show_bug.cgi?id=1418447 -https://bugzilla.mozilla.org/show_bug.cgi?id=1419166 -https://bugzilla.mozilla.org/show_bug.cgi?id=1421324 -https://bugzilla.mozilla.org/show_bug.cgi?id=1422231 -https://bugzilla.mozilla.org/show_bug.cgi?id=1422643 -https://bugzilla.mozilla.org/show_bug.cgi?id=1423086 -https://bugzilla.mozilla.org/show_bug.cgi?id=1424107 -https://bugzilla.mozilla.org/show_bug.cgi?id=1425224 -https://bugzilla.mozilla.org/show_bug.cgi?id=1425267 -https://bugzilla.mozilla.org/show_bug.cgi?id=1429379 -https://bugzilla.mozilla.org/show_bug.cgi?id=1431371 -https://bugzilla.mozilla.org/show_bug.cgi?id=1432624 -https://bugzilla.mozilla.org/show_bug.cgi?id=1432870 -https://bugzilla.mozilla.org/show_bug.cgi?id=1434634 -https://bugzilla.mozilla.org/show_bug.cgi?id=1436482 -https://bugzilla.mozilla.org/show_bug.cgi?id=1437325 -https://bugzilla.mozilla.org/show_bug.cgi?id=1438025 -https://bugzilla.mozilla.org/show_bug.cgi?id=1440079 -https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 -https://bugzilla.mozilla.org/show_bug.cgi?id=1441941 -https://bugzilla.mozilla.org/show_bug.cgi?id=1442840 -https://bugzilla.mozilla.org/show_bug.cgi?id=1447087 -https://bugzilla.mozilla.org/show_bug.cgi?id=1449548 -https://bugzilla.mozilla.org/show_bug.cgi?id=1450353 -https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 -https://bugzilla.mozilla.org/show_bug.cgi?id=1452075 -https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 -https://bugzilla.mozilla.org/show_bug.cgi?id=1457721 -https://bugzilla.mozilla.org/show_bug.cgi?id=1462910 -https://bugzilla.mozilla.org/show_bug.cgi?id=1483510 -https://bugzilla.mozilla.org/show_bug.cgi?id=1484753 -https://bugzilla.mozilla.org/show_bug.cgi?id=1493900 -https://bugzilla.mozilla.org/show_bug.cgi?id=1505973 -https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 -https://bugzilla.mozilla.org/show_bug.cgi?id=1518627 -https://bugzilla.mozilla.org/show_bug.cgi?id=1526218 -https://bugzilla.mozilla.org/show_bug.cgi?id=1527717 -https://bugzilla.mozilla.org/show_bug.cgi?id=1528909 -https://bugzilla.mozilla.org/show_bug.cgi?id=1538006 -https://bugzilla.mozilla.org/show_bug.cgi?id=1538015 -https://bugzilla.mozilla.org/show_bug.cgi?id=1543191 -https://bugzilla.mozilla.org/show_bug.cgi?id=1544386 -https://bugzilla.mozilla.org/show_bug.cgi?id=1549833 -https://bugzilla.mozilla.org/show_bug.cgi?id=1552206 -https://bugzilla.mozilla.org/show_bug.cgi?id=1553820 -https://bugzilla.mozilla.org/show_bug.cgi?id=1555523 -https://bugzilla.mozilla.org/show_bug.cgi?id=1556230 -https://bugzilla.mozilla.org/show_bug.cgi?id=1558299 -https://bugzilla.mozilla.org/show_bug.cgi?id=1562582 -https://bugzilla.mozilla.org/show_bug.cgi?id=1563327 -https://bugzilla.mozilla.org/show_bug.cgi?id=1568397 -https://bugzilla.mozilla.org/show_bug.cgi?id=1571481 -https://bugzilla.mozilla.org/show_bug.cgi?id=1574980 -https://bugzilla.mozilla.org/show_bug.cgi?id=1577953 -https://bugzilla.mozilla.org/show_bug.cgi?id=1587976 -https://bugzilla.mozilla.org/show_bug.cgi?id=1596668 -https://bugzilla.mozilla.org/show_bug.cgi?id=1599008 -https://bugzilla.mozilla.org/show_bug.cgi?id=1599181 -https://bugzilla.mozilla.org/show_bug.cgi?id=1602843 -https://bugzilla.mozilla.org/show_bug.cgi?id=1605814 -https://bugzilla.mozilla.org/show_bug.cgi?id=1607443 -https://bugzilla.mozilla.org/show_bug.cgi?id=1610426 -https://bugzilla.mozilla.org/show_bug.cgi?id=1615471 -https://bugzilla.mozilla.org/show_bug.cgi?id=1617928 -https://bugzilla.mozilla.org/show_bug.cgi?id=1622640 -https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 -https://bugzilla.mozilla.org/show_bug.cgi?id=1631618 -https://bugzilla.mozilla.org/show_bug.cgi?id=1631739 -https://bugzilla.mozilla.org/show_bug.cgi?id=1632387 -https://bugzilla.mozilla.org/show_bug.cgi?id=1634738 -https://bugzilla.mozilla.org/show_bug.cgi?id=1636629 -https://bugzilla.mozilla.org/show_bug.cgi?id=1636654 -https://bugzilla.mozilla.org/show_bug.cgi?id=1641487 -https://bugzilla.mozilla.org/show_bug.cgi?id=1652360 -https://bugzilla.mozilla.org/show_bug.cgi?id=1652612 -https://bugzilla.mozilla.org/show_bug.cgi?id=1653371 -https://bugzilla.mozilla.org/show_bug.cgi?id=1656741 -https://bugzilla.mozilla.org/show_bug.cgi?id=1658881 -https://bugzilla.mozilla.org/show_bug.cgi?id=1661071 -https://bugzilla.mozilla.org/show_bug.cgi?id=1663466 -https://bugzilla.mozilla.org/show_bug.cgi?id=1670358 -https://bugzilla.mozilla.org/show_bug.cgi?id=1673241 -https://bugzilla.mozilla.org/show_bug.cgi?id=1675755 -https://bugzilla.mozilla.org/show_bug.cgi?id=1675905 -https://bugzilla.mozilla.org/show_bug.cgi?id=1676311 -https://bugzilla.mozilla.org/show_bug.cgi?id=1677138 -https://bugzilla.mozilla.org/show_bug.cgi?id=1683940 -https://bugzilla.mozilla.org/show_bug.cgi?id=1684761 -https://bugzilla.mozilla.org/show_bug.cgi?id=1684837 -https://bugzilla.mozilla.org/show_bug.cgi?id=1690979 -https://bugzilla.mozilla.org/show_bug.cgi?id=1691153 -https://bugzilla.mozilla.org/show_bug.cgi?id=1692623 -https://bugzilla.mozilla.org/show_bug.cgi?id=1692832 -https://bugzilla.mozilla.org/show_bug.cgi?id=1692972 -https://bugzilla.mozilla.org/show_bug.cgi?id=1694684 -https://bugzilla.mozilla.org/show_bug.cgi?id=1694698 -https://bugzilla.mozilla.org/show_bug.cgi?id=1697604 -https://bugzilla.mozilla.org/show_bug.cgi?id=1699077 -https://bugzilla.mozilla.org/show_bug.cgi?id=1701673 -https://bugzilla.mozilla.org/show_bug.cgi?id=1701684 -https://bugzilla.mozilla.org/show_bug.cgi?id=1701942 -https://bugzilla.mozilla.org/show_bug.cgi?id=1702374 -https://bugzilla.mozilla.org/show_bug.cgi?id=1704422 -https://bugzilla.mozilla.org/show_bug.cgi?id=1706501 -https://bugzilla.mozilla.org/show_bug.cgi?id=1709257 -https://bugzilla.mozilla.org/show_bug.cgi?id=1719088 -https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 -https://bugzilla.mozilla.org/show_bug.cgi?id=1722083 -https://bugzilla.mozilla.org/show_bug.cgi?id=1729517 -https://bugzilla.mozilla.org/show_bug.cgi?id=1729642 -https://bugzilla.mozilla.org/show_bug.cgi?id=1732435 -https://bugzilla.mozilla.org/show_bug.cgi?id=1736886 -https://bugzilla.mozilla.org/show_bug.cgi?id=1737252 -https://bugzilla.mozilla.org/show_bug.cgi?id=1737722 -https://bugzilla.mozilla.org/show_bug.cgi?id=1738237 -https://bugzilla.mozilla.org/show_bug.cgi?id=1739091 -https://bugzilla.mozilla.org/show_bug.cgi?id=1739957 -https://bugzilla.mozilla.org/show_bug.cgi?id=1741515 -https://bugzilla.mozilla.org/show_bug.cgi?id=1742334 -https://bugzilla.mozilla.org/show_bug.cgi?id=1743931 -https://bugzilla.mozilla.org/show_bug.cgi?id=1744158 -https://bugzilla.mozilla.org/show_bug.cgi?id=1745566 -https://bugzilla.mozilla.org/show_bug.cgi?id=1745874 -https://bugzilla.mozilla.org/show_bug.cgi?id=1746448 -https://bugzilla.mozilla.org/show_bug.cgi?id=1747388 -https://bugzilla.mozilla.org/show_bug.cgi?id=1747526 -https://bugzilla.mozilla.org/show_bug.cgi?id=1750565 -https://bugzilla.mozilla.org/show_bug.cgi?id=1750679 -https://bugzilla.mozilla.org/show_bug.cgi?id=1751609 -https://bugzilla.mozilla.org/show_bug.cgi?id=1751678 -https://bugzilla.mozilla.org/show_bug.cgi?id=1752979 -https://bugzilla.mozilla.org/show_bug.cgi?id=1753341 -https://bugzilla.mozilla.org/show_bug.cgi?id=1753838 -https://bugzilla.mozilla.org/show_bug.cgi?id=1760674 -https://bugzilla.mozilla.org/show_bug.cgi?id=1765049 -https://bugzilla.mozilla.org/show_bug.cgi?id=1767194 -https://bugzilla.mozilla.org/show_bug.cgi?id=1767590 -https://bugzilla.mozilla.org/show_bug.cgi?id=1768537 -https://bugzilla.mozilla.org/show_bug.cgi?id=1770048 -https://bugzilla.mozilla.org/show_bug.cgi?id=1771685 -https://bugzilla.mozilla.org/show_bug.cgi?id=1773874 -https://bugzilla.mozilla.org/show_bug.cgi?id=1777800 -https://bugzilla.mozilla.org/show_bug.cgi?id=1782211 -https://bugzilla.mozilla.org/show_bug.cgi?id=1783561 -https://bugzilla.mozilla.org/show_bug.cgi?id=1786188 -https://bugzilla.mozilla.org/show_bug.cgi?id=1789061 -https://bugzilla.mozilla.org/show_bug.cgi?id=1789128 -https://bugzilla.mozilla.org/show_bug.cgi?id=1790311 -https://bugzilla.mozilla.org/show_bug.cgi?id=1791201 -https://bugzilla.mozilla.org/show_bug.cgi?id=1793551 -https://bugzilla.mozilla.org/show_bug.cgi?id=1795496 -https://bugzilla.mozilla.org/show_bug.cgi?id=1795815 -https://bugzilla.mozilla.org/show_bug.cgi?id=1798798 -https://bugzilla.mozilla.org/show_bug.cgi?id=1800203 -https://bugzilla.mozilla.org/show_bug.cgi?id=1801501 -https://bugzilla.mozilla.org/show_bug.cgi?id=1804564 -https://bugzilla.mozilla.org/show_bug.cgi?id=1810143 -https://bugzilla.mozilla.org/show_bug.cgi?id=1810793 -https://bugzilla.mozilla.org/show_bug.cgi?id=1813376 -https://bugzilla.mozilla.org/show_bug.cgi?id=1815062 -https://bugzilla.mozilla.org/show_bug.cgi?id=1816007 -https://bugzilla.mozilla.org/show_bug.cgi?id=1816059 -https://bugzilla.mozilla.org/show_bug.cgi?id=1817768 -https://bugzilla.mozilla.org/show_bug.cgi?id=1821155 -https://bugzilla.mozilla.org/show_bug.cgi?id=1821576 -https://bugzilla.mozilla.org/show_bug.cgi?id=1821886 -https://bugzilla.mozilla.org/show_bug.cgi?id=1821906 -https://bugzilla.mozilla.org/show_bug.cgi?id=1822754 -https://bugzilla.mozilla.org/show_bug.cgi?id=1823172 -https://bugzilla.mozilla.org/show_bug.cgi?id=1823316 -https://bugzilla.mozilla.org/show_bug.cgi?id=1823365 -https://bugzilla.mozilla.org/show_bug.cgi?id=1823379 -https://bugzilla.mozilla.org/show_bug.cgi?id=1823720 -https://bugzilla.mozilla.org/show_bug.cgi?id=1824420 -https://bugzilla.mozilla.org/show_bug.cgi?id=1826622 -https://bugzilla.mozilla.org/show_bug.cgi?id=1836705 -https://bugzilla.mozilla.org/show_bug.cgi?id=1837675 -https://bugzilla.mozilla.org/show_bug.cgi?id=1837916 -https://bugzilla.mozilla.org/show_bug.cgi?id=1839079 -https://bugzilla.mozilla.org/show_bug.cgi?id=1840777 -https://bugzilla.mozilla.org/show_bug.cgi?id=1845739 -https://bugzilla.mozilla.org/show_bug.cgi?id=1848454 -https://bugzilla.mozilla.org/show_bug.cgi?id=1849037 -https://bugzilla.mozilla.org/show_bug.cgi?id=1849704 -https://bugzilla.mozilla.org/show_bug.cgi?id=1854669 -https://bugzilla.mozilla.org/show_bug.cgi?id=1858570 -https://bugzilla.mozilla.org/show_bug.cgi?id=1861344 -https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 -https://bugzilla.mozilla.org/show_bug.cgi?id=1863863 -https://bugzilla.mozilla.org/show_bug.cgi?id=1864118 -https://bugzilla.mozilla.org/show_bug.cgi?id=1871838 -https://bugzilla.mozilla.org/show_bug.cgi?id=260560 -https://bugzilla.mozilla.org/show_bug.cgi?id=267645 -https://bugzilla.mozilla.org/show_bug.cgi?id=272620 -https://bugzilla.mozilla.org/show_bug.cgi?id=279945 -https://bugzilla.mozilla.org/show_bug.cgi?id=290036 -https://bugzilla.mozilla.org/show_bug.cgi?id=295854 -https://bugzilla.mozilla.org/show_bug.cgi?id=297078 -https://bugzilla.mozilla.org/show_bug.cgi?id=300246 -https://bugzilla.mozilla.org/show_bug.cgi?id=313441 -https://bugzilla.mozilla.org/show_bug.cgi?id=327014 -https://bugzilla.mozilla.org/show_bug.cgi?id=355569 -https://bugzilla.mozilla.org/show_bug.cgi?id=355655 -https://bugzilla.mozilla.org/show_bug.cgi?id=358797 -https://bugzilla.mozilla.org/show_bug.cgi?id=361298 -https://bugzilla.mozilla.org/show_bug.cgi?id=367428 -https://bugzilla.mozilla.org/show_bug.cgi?id=371375 -https://bugzilla.mozilla.org/show_bug.cgi?id=395399 -https://bugzilla.mozilla.org/show_bug.cgi?id=402347 -https://bugzilla.mozilla.org/show_bug.cgi?id=403331 -https://bugzilla.mozilla.org/show_bug.cgi?id=408076 -https://bugzilla.mozilla.org/show_bug.cgi?id=408164 -https://bugzilla.mozilla.org/show_bug.cgi?id=424733 -https://bugzilla.mozilla.org/show_bug.cgi?id=433610 -https://bugzilla.mozilla.org/show_bug.cgi?id=439735 -https://bugzilla.mozilla.org/show_bug.cgi?id=440230 -https://bugzilla.mozilla.org/show_bug.cgi?id=441995 -https://bugzilla.mozilla.org/show_bug.cgi?id=443288 -https://bugzilla.mozilla.org/show_bug.cgi?id=443299 -https://bugzilla.mozilla.org/show_bug.cgi?id=460713 -https://bugzilla.mozilla.org/show_bug.cgi?id=461735 -https://bugzilla.mozilla.org/show_bug.cgi?id=465615 -https://bugzilla.mozilla.org/show_bug.cgi?id=469565 -https://bugzilla.mozilla.org/show_bug.cgi?id=474456 -https://bugzilla.mozilla.org/show_bug.cgi?id=479880 -https://bugzilla.mozilla.org/show_bug.cgi?id=481558 -https://bugzilla.mozilla.org/show_bug.cgi?id=484320 -https://bugzilla.mozilla.org/show_bug.cgi?id=485217 -https://bugzilla.mozilla.org/show_bug.cgi?id=486269 -https://bugzilla.mozilla.org/show_bug.cgi?id=493601 -https://bugzilla.mozilla.org/show_bug.cgi?id=504342 -https://bugzilla.mozilla.org/show_bug.cgi?id=504343 -https://bugzilla.mozilla.org/show_bug.cgi?id=504862 -https://bugzilla.mozilla.org/show_bug.cgi?id=511615 -https://bugzilla.mozilla.org/show_bug.cgi?id=514554 -https://bugzilla.mozilla.org/show_bug.cgi?id=514823 -https://bugzilla.mozilla.org/show_bug.cgi?id=521461 -https://bugzilla.mozilla.org/show_bug.cgi?id=526500 -https://bugzilla.mozilla.org/show_bug.cgi?id=531222 -https://bugzilla.mozilla.org/show_bug.cgi?id=532246 -https://bugzilla.mozilla.org/show_bug.cgi?id=533000 -https://bugzilla.mozilla.org/show_bug.cgi?id=536466 -https://bugzilla.mozilla.org/show_bug.cgi?id=538308 -https://bugzilla.mozilla.org/show_bug.cgi?id=538310 -https://bugzilla.mozilla.org/show_bug.cgi?id=540100 -https://bugzilla.mozilla.org/show_bug.cgi?id=547143 -https://bugzilla.mozilla.org/show_bug.cgi?id=552110 -https://bugzilla.mozilla.org/show_bug.cgi?id=552216 -https://bugzilla.mozilla.org/show_bug.cgi?id=552255 -https://bugzilla.mozilla.org/show_bug.cgi?id=554255 -https://bugzilla.mozilla.org/show_bug.cgi?id=557174 -https://bugzilla.mozilla.org/show_bug.cgi?id=568148 -https://bugzilla.mozilla.org/show_bug.cgi?id=568564 -https://bugzilla.mozilla.org/show_bug.cgi?id=571106 -https://bugzilla.mozilla.org/show_bug.cgi?id=572985 -https://bugzilla.mozilla.org/show_bug.cgi?id=572986 -https://bugzilla.mozilla.org/show_bug.cgi?id=574059 -https://bugzilla.mozilla.org/show_bug.cgi?id=576070 -https://bugzilla.mozilla.org/show_bug.cgi?id=576075 -https://bugzilla.mozilla.org/show_bug.cgi?id=576447 -https://bugzilla.mozilla.org/show_bug.cgi?id=576616 -https://bugzilla.mozilla.org/show_bug.cgi?id=579655 -https://bugzilla.mozilla.org/show_bug.cgi?id=579744 -https://bugzilla.mozilla.org/show_bug.cgi?id=580445 -https://bugzilla.mozilla.org/show_bug.cgi?id=583520 -https://bugzilla.mozilla.org/show_bug.cgi?id=585815 -https://bugzilla.mozilla.org/show_bug.cgi?id=587234 -https://bugzilla.mozilla.org/show_bug.cgi?id=590771 -https://bugzilla.mozilla.org/show_bug.cgi?id=591165 -https://bugzilla.mozilla.org/show_bug.cgi?id=599468 -https://bugzilla.mozilla.org/show_bug.cgi?id=602780 -https://bugzilla.mozilla.org/show_bug.cgi?id=610997 -https://bugzilla.mozilla.org/show_bug.cgi?id=615657 -https://bugzilla.mozilla.org/show_bug.cgi?id=616009 -https://bugzilla.mozilla.org/show_bug.cgi?id=616659 -https://bugzilla.mozilla.org/show_bug.cgi?id=621090 -https://bugzilla.mozilla.org/show_bug.cgi?id=622015 -https://bugzilla.mozilla.org/show_bug.cgi?id=623998 -https://bugzilla.mozilla.org/show_bug.cgi?id=624764 -https://bugzilla.mozilla.org/show_bug.cgi?id=626631 -https://bugzilla.mozilla.org/show_bug.cgi?id=630919 -https://bugzilla.mozilla.org/show_bug.cgi?id=634724 -https://bugzilla.mozilla.org/show_bug.cgi?id=635705 -https://bugzilla.mozilla.org/show_bug.cgi?id=635977 -https://bugzilla.mozilla.org/show_bug.cgi?id=645565 -https://bugzilla.mozilla.org/show_bug.cgi?id=648065 -https://bugzilla.mozilla.org/show_bug.cgi?id=648090 -https://bugzilla.mozilla.org/show_bug.cgi?id=648160 -https://bugzilla.mozilla.org/show_bug.cgi?id=650001 -https://bugzilla.mozilla.org/show_bug.cgi?id=655742 -https://bugzilla.mozilla.org/show_bug.cgi?id=655987 -https://bugzilla.mozilla.org/show_bug.cgi?id=656277 -https://bugzilla.mozilla.org/show_bug.cgi?id=659349 -https://bugzilla.mozilla.org/show_bug.cgi?id=664009 -https://bugzilla.mozilla.org/show_bug.cgi?id=665934 -https://bugzilla.mozilla.org/show_bug.cgi?id=665936 -https://bugzilla.mozilla.org/show_bug.cgi?id=670514 -https://bugzilla.mozilla.org/show_bug.cgi?id=672485 -https://bugzilla.mozilla.org/show_bug.cgi?id=674042 -https://bugzilla.mozilla.org/show_bug.cgi?id=682335 -https://bugzilla.mozilla.org/show_bug.cgi?id=684555 -https://bugzilla.mozilla.org/show_bug.cgi?id=687745 -https://bugzilla.mozilla.org/show_bug.cgi?id=690225 -https://bugzilla.mozilla.org/show_bug.cgi?id=697699 -https://bugzilla.mozilla.org/show_bug.cgi?id=703975 -https://bugzilla.mozilla.org/show_bug.cgi?id=703983 -https://bugzilla.mozilla.org/show_bug.cgi?id=708186 -https://bugzilla.mozilla.org/show_bug.cgi?id=708198 -https://bugzilla.mozilla.org/show_bug.cgi?id=713926 -https://bugzilla.mozilla.org/show_bug.cgi?id=714631 -https://bugzilla.mozilla.org/show_bug.cgi?id=715073 -https://bugzilla.mozilla.org/show_bug.cgi?id=717511 -https://bugzilla.mozilla.org/show_bug.cgi?id=718319 -https://bugzilla.mozilla.org/show_bug.cgi?id=719612 -https://bugzilla.mozilla.org/show_bug.cgi?id=723446 -https://bugzilla.mozilla.org/show_bug.cgi?id=724247 -https://bugzilla.mozilla.org/show_bug.cgi?id=724599 -https://bugzilla.mozilla.org/show_bug.cgi?id=725611 -https://bugzilla.mozilla.org/show_bug.cgi?id=725663 -https://bugzilla.mozilla.org/show_bug.cgi?id=735104 -https://bugzilla.mozilla.org/show_bug.cgi?id=739343 -https://bugzilla.mozilla.org/show_bug.cgi?id=744480 -https://bugzilla.mozilla.org/show_bug.cgi?id=745397 -https://bugzilla.mozilla.org/show_bug.cgi?id=746855 -https://bugzilla.mozilla.org/show_bug.cgi?id=748764 -https://bugzilla.mozilla.org/show_bug.cgi?id=750096 -https://bugzilla.mozilla.org/show_bug.cgi?id=750109 -https://bugzilla.mozilla.org/show_bug.cgi?id=750820 -https://bugzilla.mozilla.org/show_bug.cgi?id=751422 -https://bugzilla.mozilla.org/show_bug.cgi?id=756719 -https://bugzilla.mozilla.org/show_bug.cgi?id=757128 -https://bugzilla.mozilla.org/show_bug.cgi?id=757376 -https://bugzilla.mozilla.org/show_bug.cgi?id=767778 -https://bugzilla.mozilla.org/show_bug.cgi?id=769108 -https://bugzilla.mozilla.org/show_bug.cgi?id=771859 -https://bugzilla.mozilla.org/show_bug.cgi?id=775009 -https://bugzilla.mozilla.org/show_bug.cgi?id=790296 -https://bugzilla.mozilla.org/show_bug.cgi?id=792405 -https://bugzilla.mozilla.org/show_bug.cgi?id=796866 -https://bugzilla.mozilla.org/show_bug.cgi?id=799952 -https://bugzilla.mozilla.org/show_bug.cgi?id=800666 -https://bugzilla.mozilla.org/show_bug.cgi?id=813901 -https://bugzilla.mozilla.org/show_bug.cgi?id=813906 -https://bugzilla.mozilla.org/show_bug.cgi?id=814001 -https://bugzilla.mozilla.org/show_bug.cgi?id=814026 -https://bugzilla.mozilla.org/show_bug.cgi?id=814027 -https://bugzilla.mozilla.org/show_bug.cgi?id=814029 -https://bugzilla.mozilla.org/show_bug.cgi?id=827193 -https://bugzilla.mozilla.org/show_bug.cgi?id=840263 -https://bugzilla.mozilla.org/show_bug.cgi?id=845880 -https://bugzilla.mozilla.org/show_bug.cgi?id=848417 -https://bugzilla.mozilla.org/show_bug.cgi?id=850492 -https://bugzilla.mozilla.org/show_bug.cgi?id=866915 -https://bugzilla.mozilla.org/show_bug.cgi?id=868267 -https://bugzilla.mozilla.org/show_bug.cgi?id=868327 -https://bugzilla.mozilla.org/show_bug.cgi?id=870870 -https://bugzilla.mozilla.org/show_bug.cgi?id=875818 -https://bugzilla.mozilla.org/show_bug.cgi?id=888314 -https://bugzilla.mozilla.org/show_bug.cgi?id=888361 -https://bugzilla.mozilla.org/show_bug.cgi?id=890277 -https://bugzilla.mozilla.org/show_bug.cgi?id=890853 -https://bugzilla.mozilla.org/show_bug.cgi?id=891693 -https://bugzilla.mozilla.org/show_bug.cgi?id=910375 -https://bugzilla.mozilla.org/show_bug.cgi?id=911593 -https://bugzilla.mozilla.org/show_bug.cgi?id=913904 -https://bugzilla.mozilla.org/show_bug.cgi?id=916726 -https://bugzilla.mozilla.org/show_bug.cgi?id=920515 -https://bugzilla.mozilla.org/show_bug.cgi?id=924802 -https://bugzilla.mozilla.org/show_bug.cgi?id=925747 -https://bugzilla.mozilla.org/show_bug.cgi?id=950427 -https://bugzilla.mozilla.org/show_bug.cgi?id=952077 -https://bugzilla.mozilla.org/show_bug.cgi?id=956524 -https://bugzilla.mozilla.org/show_bug.cgi?id=961676 -https://bugzilla.mozilla.org/show_bug.cgi?id=963962 -https://bugzilla.mozilla.org/show_bug.cgi?id=995289 -https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123 -https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2019-17003 -https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980 -https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 -https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238422 -https://bugzilla.redhat.com/show_bug.cgi?id=1076676 -https://bugzilla.redhat.com/show_bug.cgi?id=1094232 -https://bugzilla.redhat.com/show_bug.cgi?id=1110470 -https://bugzilla.redhat.com/show_bug.cgi?id=1136683 -https://bugzilla.redhat.com/show_bug.cgi?id=1146026 -https://bugzilla.redhat.com/show_bug.cgi?id=1185717 -https://bugzilla.redhat.com/show_bug.cgi?id=1189958 -https://bugzilla.redhat.com/show_bug.cgi?id=1228283 -https://bugzilla.redhat.com/show_bug.cgi?id=1243468 -https://bugzilla.redhat.com/show_bug.cgi?id=1245684 -https://bugzilla.redhat.com/show_bug.cgi?id=1251749 -https://bugzilla.redhat.com/show_bug.cgi?id=1257962 -https://bugzilla.redhat.com/show_bug.cgi?id=1272326 -https://bugzilla.redhat.com/show_bug.cgi?id=1283362 -https://bugzilla.redhat.com/show_bug.cgi?id=1283370 -https://bugzilla.redhat.com/show_bug.cgi?id=1377015 -https://bugzilla.redhat.com/show_bug.cgi?id=1393882 -https://bugzilla.redhat.com/show_bug.cgi?id=1396959 -https://bugzilla.redhat.com/show_bug.cgi?id=1396962 -https://bugzilla.redhat.com/show_bug.cgi?id=1396963 -https://bugzilla.redhat.com/show_bug.cgi?id=1396965 -https://bugzilla.redhat.com/show_bug.cgi?id=1396967 -https://bugzilla.redhat.com/show_bug.cgi?id=1396971 -https://bugzilla.redhat.com/show_bug.cgi?id=1396977 -https://bugzilla.redhat.com/show_bug.cgi?id=1396978 -https://bugzilla.redhat.com/show_bug.cgi?id=1396979 -https://bugzilla.redhat.com/show_bug.cgi?id=1396980 -https://bugzilla.redhat.com/show_bug.cgi?id=1396981 -https://bugzilla.redhat.com/show_bug.cgi?id=1429472 -https://bugzilla.redhat.com/show_bug.cgi?id=1464141 -https://bugzilla.redhat.com/show_bug.cgi?id=1464686 -https://bugzilla.redhat.com/show_bug.cgi?id=1464687 -https://bugzilla.redhat.com/show_bug.cgi?id=1464691 -https://bugzilla.redhat.com/show_bug.cgi?id=1464692 -https://bugzilla.redhat.com/show_bug.cgi?id=1465756 -https://bugzilla.redhat.com/show_bug.cgi?id=1470714 -https://bugzilla.redhat.com/show_bug.cgi?id=1470722 -https://bugzilla.redhat.com/show_bug.cgi?id=1470729 -https://bugzilla.redhat.com/show_bug.cgi?id=1470737 -https://bugzilla.redhat.com/show_bug.cgi?id=1470913 -https://bugzilla.redhat.com/show_bug.cgi?id=1470946 -https://bugzilla.redhat.com/show_bug.cgi?id=1470950 -https://bugzilla.redhat.com/show_bug.cgi?id=1471772 -https://bugzilla.redhat.com/show_bug.cgi?id=1471782 -https://bugzilla.redhat.com/show_bug.cgi?id=1471786 -https://bugzilla.redhat.com/show_bug.cgi?id=1474019 -https://bugzilla.redhat.com/show_bug.cgi?id=1474276 -https://bugzilla.redhat.com/show_bug.cgi?id=1475124 -https://bugzilla.redhat.com/show_bug.cgi?id=1482295 -https://bugzilla.redhat.com/show_bug.cgi?id=1482296 -https://bugzilla.redhat.com/show_bug.cgi?id=1482331 -https://bugzilla.redhat.com/show_bug.cgi?id=1482335 -https://bugzilla.redhat.com/show_bug.cgi?id=1482397 -https://bugzilla.redhat.com/show_bug.cgi?id=1482423 -https://bugzilla.redhat.com/show_bug.cgi?id=1484290 -https://bugzilla.redhat.com/show_bug.cgi?id=1484291 -https://bugzilla.redhat.com/show_bug.cgi?id=1489356 -https://bugzilla.redhat.com/show_bug.cgi?id=1494443 -https://bugzilla.redhat.com/show_bug.cgi?id=1494467 -https://bugzilla.redhat.com/show_bug.cgi?id=1494776 -https://bugzilla.redhat.com/show_bug.cgi?id=1494778 -https://bugzilla.redhat.com/show_bug.cgi?id=1494780 -https://bugzilla.redhat.com/show_bug.cgi?id=1494781 -https://bugzilla.redhat.com/show_bug.cgi?id=1494782 -https://bugzilla.redhat.com/show_bug.cgi?id=1494786 -https://bugzilla.redhat.com/show_bug.cgi?id=1494787 -https://bugzilla.redhat.com/show_bug.cgi?id=1495043 -https://bugzilla.redhat.com/show_bug.cgi?id=1499599 -https://bugzilla.redhat.com/show_bug.cgi?id=1499600 -https://bugzilla.redhat.com/show_bug.cgi?id=1500553 -https://bugzilla.redhat.com/show_bug.cgi?id=1500554 -https://bugzilla.redhat.com/show_bug.cgi?id=1500570 -https://bugzilla.redhat.com/show_bug.cgi?id=1501695 -https://bugzilla.redhat.com/show_bug.cgi?id=1524104 -https://bugzilla.redhat.com/show_bug.cgi?id=1524107 -https://bugzilla.redhat.com/show_bug.cgi?id=1524116 -https://bugzilla.redhat.com/show_bug.cgi?id=1525055 -https://bugzilla.redhat.com/show_bug.cgi?id=1531897 -https://bugzilla.redhat.com/show_bug.cgi?id=1531956 -https://bugzilla.redhat.com/show_bug.cgi?id=1532381 -https://bugzilla.redhat.com/show_bug.cgi?id=1532390 -https://bugzilla.redhat.com/show_bug.cgi?id=1536179 -https://bugzilla.redhat.com/show_bug.cgi?id=1539237 -https://bugzilla.redhat.com/show_bug.cgi?id=1547879 -https://bugzilla.redhat.com/show_bug.cgi?id=1547883 -https://bugzilla.redhat.com/show_bug.cgi?id=1547885 -https://bugzilla.redhat.com/show_bug.cgi?id=1547889 -https://bugzilla.redhat.com/show_bug.cgi?id=1547892 -https://bugzilla.redhat.com/show_bug.cgi?id=1548918 -https://bugzilla.redhat.com/show_bug.cgi?id=1548930 -https://bugzilla.redhat.com/show_bug.cgi?id=1549469 -https://bugzilla.redhat.com/show_bug.cgi?id=1566260 -https://bugzilla.redhat.com/show_bug.cgi?id=1574844 -https://bugzilla.redhat.com/show_bug.cgi?id=1575188 -https://bugzilla.redhat.com/show_bug.cgi?id=1575201 -https://bugzilla.redhat.com/show_bug.cgi?id=1575502 -https://bugzilla.redhat.com/show_bug.cgi?id=1575851 -https://bugzilla.redhat.com/show_bug.cgi?id=1576174 -https://bugzilla.redhat.com/show_bug.cgi?id=1582024 -https://bugzilla.redhat.com/show_bug.cgi?id=1595689 -https://bugzilla.redhat.com/show_bug.cgi?id=1595693 -https://bugzilla.redhat.com/show_bug.cgi?id=1622951 -https://bugzilla.redhat.com/show_bug.cgi?id=1629451 -https://bugzilla.redhat.com/show_bug.cgi?id=1629453 -https://bugzilla.redhat.com/show_bug.cgi?id=1643752 -https://bugzilla.redhat.com/show_bug.cgi?id=1643753 -https://bugzilla.redhat.com/show_bug.cgi?id=1643754 -https://bugzilla.redhat.com/show_bug.cgi?id=1643812 -https://bugzilla.redhat.com/show_bug.cgi?id=1649197 -https://bugzilla.redhat.com/show_bug.cgi?id=1649198 -https://bugzilla.redhat.com/show_bug.cgi?id=1649199 -https://bugzilla.redhat.com/show_bug.cgi?id=1649200 -https://bugzilla.redhat.com/show_bug.cgi?id=1649201 -https://bugzilla.redhat.com/show_bug.cgi?id=1649202 -https://bugzilla.redhat.com/show_bug.cgi?id=1652632 -https://bugzilla.redhat.com/show_bug.cgi?id=1652633 -https://bugzilla.redhat.com/show_bug.cgi?id=1652634 -https://bugzilla.redhat.com/show_bug.cgi?id=1652635 -https://bugzilla.redhat.com/show_bug.cgi?id=1660318 -https://bugzilla.redhat.com/show_bug.cgi?id=1677794 -https://bugzilla.redhat.com/show_bug.cgi?id=1683499 -https://bugzilla.redhat.com/show_bug.cgi?id=1765647 -https://bugzilla.redhat.com/show_bug.cgi?id=1825762 -https://bugzilla.redhat.com/show_bug.cgi?id=1917565 -https://bugzilla.redhat.com/show_bug.cgi?id=1928437 -https://bugzilla.redhat.com/show_bug.cgi?id=1943797 -https://bugzilla.redhat.com/show_bug.cgi?id=2052696 -https://bugzilla.redhat.com/show_bug.cgi?id=2066799 -https://bugzilla.redhat.com/show_bug.cgi?id=2092427 -https://bugzilla.redhat.com/show_bug.cgi?id=2120597 -https://bugzilla.redhat.com/show_bug.cgi?id=214205 -https://bugzilla.redhat.com/show_bug.cgi?id=2160151 -https://bugzilla.redhat.com/show_bug.cgi?id=2218943 -https://bugzilla.redhat.com/show_bug.cgi?id=2218944 -https://bugzilla.redhat.com/show_bug.cgi?id=2249901 -https://bugzilla.redhat.com/show_bug.cgi?id=2255027 -https://bugzilla.redhat.com/show_bug.cgi?id=2262169 -https://bugzilla.redhat.com/show_bug.cgi?id=2268513 -https://bugzilla.redhat.com/show_bug.cgi?id=2274401 -https://bugzilla.redhat.com/show_bug.cgi?id=447974 -https://bugzilla.redhat.com/show_bug.cgi?id=449929 -https://bugzilla.redhat.com/show_bug.cgi?id=456044 -https://bugzilla.redhat.com/show_bug.cgi?id=460966 -https://bugzilla.redhat.com/show_bug.cgi?id=469667 -https://bugzilla.redhat.com/show_bug.cgi?id=475070 -https://bugzilla.redhat.com/show_bug.cgi?id=481560 -https://bugzilla.redhat.com/show_bug.cgi?id=481565 -https://bugzilla.redhat.com/show_bug.cgi?id=481570 -https://bugzilla.redhat.com/show_bug.cgi?id=484925 -https://bugzilla.redhat.com/show_bug.cgi?id=493442 -https://bugzilla.redhat.com/show_bug.cgi?id=493445 -https://bugzilla.redhat.com/show_bug.cgi?id=496834 -https://bugzilla.redhat.com/show_bug.cgi?id=497154 -https://bugzilla.redhat.com/show_bug.cgi?id=499867 -https://bugzilla.redhat.com/show_bug.cgi?id=500363 -https://bugzilla.redhat.com/show_bug.cgi?id=510071 -https://bugzilla.redhat.com/show_bug.cgi?id=513813 -https://bugzilla.redhat.com/show_bug.cgi?id=523178 -https://bugzilla.redhat.com/show_bug.cgi?id=530056 -https://bugzilla.redhat.com/show_bug.cgi?id=530255 -https://bugzilla.redhat.com/show_bug.cgi?id=530863 -https://bugzilla.redhat.com/show_bug.cgi?id=543905 -https://bugzilla.redhat.com/show_bug.cgi?id=555313 -https://bugzilla.redhat.com/show_bug.cgi?id=580605 -https://bugzilla.redhat.com/show_bug.cgi?id=598197 -https://bugzilla.redhat.com/show_bug.cgi?id=598537 -https://bugzilla.redhat.com/show_bug.cgi?id=621980 -https://bugzilla.redhat.com/show_bug.cgi?id=628040 -https://bugzilla.redhat.com/show_bug.cgi?id=628328 -https://bugzilla.redhat.com/show_bug.cgi?id=628660 -https://bugzilla.redhat.com/show_bug.cgi?id=630460 -https://bugzilla.redhat.com/show_bug.cgi?id=632200 -https://bugzilla.redhat.com/show_bug.cgi?id=651183 -https://bugzilla.redhat.com/show_bug.cgi?id=659297 -https://bugzilla.redhat.com/show_bug.cgi?id=659359 -https://bugzilla.redhat.com/show_bug.cgi?id=659676 -https://bugzilla.redhat.com/show_bug.cgi?id=662189 -https://bugzilla.redhat.com/show_bug.cgi?id=664718 -https://bugzilla.redhat.com/show_bug.cgi?id=666793 -https://bugzilla.redhat.com/show_bug.cgi?id=667407 -https://bugzilla.redhat.com/show_bug.cgi?id=671122 -https://bugzilla.redhat.com/show_bug.cgi?id=676252 -https://bugzilla.redhat.com/show_bug.cgi?id=676357 -https://bugzilla.redhat.com/show_bug.cgi?id=690877 -https://bugzilla.redhat.com/show_bug.cgi?id=692898 -https://bugzilla.redhat.com/show_bug.cgi?id=700883 -https://bugzilla.redhat.com/show_bug.cgi?id=711134 -https://bugzilla.redhat.com/show_bug.cgi?id=711245 -https://bugzilla.redhat.com/show_bug.cgi?id=712148 -https://bugzilla.redhat.com/show_bug.cgi?id=712694 -https://bugzilla.redhat.com/show_bug.cgi?id=716825 -https://bugzilla.redhat.com/show_bug.cgi?id=716842 -https://bugzilla.redhat.com/show_bug.cgi?id=723215 -https://bugzilla.redhat.com/show_bug.cgi?id=725764 -https://bugzilla.redhat.com/show_bug.cgi?id=751112 -https://bugzilla.redhat.com/show_bug.cgi?id=772570 -https://bugzilla.redhat.com/show_bug.cgi?id=810551 -https://bugzilla.redhat.com/show_bug.cgi?id=815122 -https://bugzilla.redhat.com/show_bug.cgi?id=823464 -https://bugzilla.redhat.com/show_bug.cgi?id=840920 -https://bugzilla.redhat.com/show_bug.cgi?id=863091 -https://bugzilla.redhat.com/show_bug.cgi?id=863102 -https://bugzilla.redhat.com/show_bug.cgi?id=892983 -https://bugzilla.redhat.com/show_bug.cgi?id=907207 -https://bugzilla.redhat.com/show_bug.cgi?id=952646 -https://bugzilla.redhat.com/show_bug.cgi?id=975122 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3439 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2207 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3352 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3596 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3609 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3592 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10131 -https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386 -https://bugzilla.samba.org/show_bug.cgi?id=13979 -https://bugzilla.samba.org/show_bug.cgi?id=14914 -https://bugzilla.samba.org/show_bug.cgi?id=8289 -https://bugzilla.samba.org/show_bug.cgi?id=8290 -https://bugzilla.suse.com/show_bug.cgi?id=1020601 -https://bugzilla.suse.com/show_bug.cgi?id=1025068 -https://bugzilla.suse.com/show_bug.cgi?id=1033055 -https://bugzilla.suse.com/show_bug.cgi?id=1034482 -https://bugzilla.suse.com/show_bug.cgi?id=1062722 -https://bugzilla.suse.com/show_bug.cgi?id=1102721 -https://bugzilla.suse.com/show_bug.cgi?id=1120386 -https://bugzilla.suse.com/show_bug.cgi?id=1131109 -https://bugzilla.suse.com/show_bug.cgi?id=1140118 -https://bugzilla.suse.com/show_bug.cgi?id=1154183 -https://bugzilla.suse.com/show_bug.cgi?id=1154229 -https://bugzilla.suse.com/show_bug.cgi?id=1154302 -https://bugzilla.suse.com/show_bug.cgi?id=1154328 -https://bugzilla.suse.com/show_bug.cgi?id=1155075 -https://bugzilla.suse.com/show_bug.cgi?id=1155078 -https://bugzilla.suse.com/show_bug.cgi?id=1157465 -https://bugzilla.suse.com/show_bug.cgi?id=1157471 -https://bugzilla.suse.com/show_bug.cgi?id=1157651 -https://bugzilla.suse.com/show_bug.cgi?id=1159740 -https://bugzilla.suse.com/show_bug.cgi?id=1164131 -https://bugzilla.suse.com/show_bug.cgi?id=1165721 -https://bugzilla.suse.com/show_bug.cgi?id=1165802 -https://bugzilla.suse.com/show_bug.cgi?id=1169385 -https://bugzilla.suse.com/show_bug.cgi?id=1172698 -https://bugzilla.suse.com/show_bug.cgi?id=1173519 -https://bugzilla.suse.com/show_bug.cgi?id=1173521 -https://bugzilla.suse.com/show_bug.cgi?id=1173910 -https://bugzilla.suse.com/show_bug.cgi?id=1177362 -https://bugzilla.suse.com/show_bug.cgi?id=1182777 -https://bugzilla.suse.com/show_bug.cgi?id=1188601 -https://bugzilla.suse.com/show_bug.cgi?id=1197930 -https://bugzilla.suse.com/show_bug.cgi?id=1199512 -https://bugzilla.suse.com/show_bug.cgi?id=1200381 -https://bugzilla.suse.com/show_bug.cgi?id=1200885 -https://bugzilla.suse.com/show_bug.cgi?id=1201674 -https://bugzilla.suse.com/show_bug.cgi?id=1201949 -https://bugzilla.suse.com/show_bug.cgi?id=1204285 -https://bugzilla.suse.com/show_bug.cgi?id=1204716 -https://bugzilla.suse.com/show_bug.cgi?id=1210685 -https://bugzilla.suse.com/show_bug.cgi?id=1212649 -https://bugzilla.suse.com/show_bug.cgi?id=1215231 -https://bugzilla.suse.com/show_bug.cgi?id=1223534 -https://bugzilla.suse.com/show_bug.cgi?id=679325 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-3718 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-6364 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-6365 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32183 -https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32184 -https://bulletin.iese.de/post/buddybadges_1-0-0/ -https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_10 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_11 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_12 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_13 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_14 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_15 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_16 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_2 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_4 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_7 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8 -https://bulletin.iese.de/post/contest-gallery_19-1-4-1_9 -https://bulletin.iese.de/post/cp-image-store_1-0-67 -https://bulletin.iese.de/post/cube-slider_1-2 -https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1 -https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2 -https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/ -https://bulletin.iese.de/post/logo-slider_1-4-8 -https://bulletin.iese.de/post/multimedial-images_1-0b -https://bulletin.iese.de/post/note-press_0-1-10_1 -https://bulletin.iese.de/post/note-press_0-1-10_2 -https://bulletin.iese.de/post/note-press_0-1-10_3 -https://bulletin.iese.de/post/plugin-logic_1-0-7/ -https://bulletin.iese.de/post/realty-workstation_1-0-6 -https://bulletin.iese.de/post/web-invoice_2-1-3_1 -https://bulletin.iese.de/post/web-invoice_2-1-3_2 -https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/ -https://bulletin.iese.de/post/wp-user-merger_1-5-1_1/ -https://bulletin.iese.de/post/wp-user-merger_1-5-1_2/ -https://bulletin.iese.de/post/wp-user-merger_1-5-1_3/ -https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html -https://c-ares.haxx.se/adv_20160929.html -https://caml.inria.fr/mantis/view.php?id=7557 -https://cardaci.xyz/advisories/2019/04/15/vesta-control-panel-0.9.8-23-reflected-xss-in-file-manager-api/ -https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/ -https://carteryagemann.com/halibut-case-study.html#poc-halibut-info-uaf -https://carteryagemann.com/halibut-case-study.html#poc-halibut-text-uaf -https://carteryagemann.com/halibut-case-study.html#poc-halibut-winhelp-df -https://ccat.gitbook.io/cyber-sec/cve/cve-2022-45962-postauth-sqli -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.194 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.195 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102 -https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.233 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.13 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.1 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.14 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.11 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.5 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.4 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.6 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.7 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.2 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.3 -https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4 -https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9 -https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/ -https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/ -https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/ -https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/ -https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf -https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-bypass/ -https://cert.vde.com/en-us/advisories/vde-2019-010 -https://cert.vde.com/en/advisories/VDE-2021-047 -https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe -https://charonv.net/Pydio-Broken-Access-Control/ -https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html -https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern -https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ -https://checkmk.com/werk/16361 -https://chmod744.super.site/redacted-vulnerability -https://chocapikk.com/posts/2024/cve-2024-31819/ -https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ -https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model -https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ -https://cinzinga.com/CVE-2020-6637/ -https://cisk123456.blogspot.com/2019/04/gila-cms-1101-csrf.html -https://cisk123456.blogspot.com/2019/04/gila-cms-1101.html -https://cisk123456.blogspot.com/2019/04/mkcms-v50.html -https://cisk123456.blogspot.com/2019/05/otcms-xss.html -https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956/ -https://cjc.im/advisories/0006/ -https://cjc.im/advisories/0007/ -https://cjc.im/advisories/0008/ -https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog -https://clojure.atlassian.net/browse/CLJ-2204 -https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html -https://code610.blogspot.com/2017/12/modus-operandi-genixcms-115.html -https://code610.blogspot.com/2018/11/crashing-librecad-213.html -https://code610.blogspot.com/2019/01/rce-in-artica.html -https://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html -https://code610.blogspot.com/2019/03/crashing-xnview-248.html -https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html -https://code610.blogspot.com/2019/05/crashing-devicenet-builder.html -https://code610.blogspot.com/2019/05/crashing-edraw-max.html -https://code610.blogspot.com/2019/07/xss-in-testlink-1919.html -https://code610.blogspot.com/2019/07/xss-in-zurmo-crm.html -https://code610.blogspot.com/2019/09/crashing-dcisoft-121.html -https://code610.blogspot.com/2019/10/random-bytes-in-vlc-308.html -https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html -https://code610.blogspot.com/2019/11/from-0-to-0day-quick-fuzzing-lesson.html -https://code610.blogspot.com/2019/12/multiple-xss-bugs-in-nagios-569.html -https://code610.blogspot.com/2019/12/postauth-rce-in-latest-nagiosxi.html -https://code610.blogspot.com/2019/12/testing-ssrf-in-liquifireos.html -https://code610.blogspot.com/2020/02/postauth-rce-in-centreon-1910.html -https://code610.blogspot.com/2020/02/this-time-i-tried-to-check-one-of.html -https://code610.blogspot.com/2020/03/nagios-5611-xssd.html -https://code610.blogspot.com/2020/03/postauth-rce-bugs-in-nagiosxi-5611.html -https://code610.blogspot.com/2020/03/rce-in-artica-426.html -https://code610.blogspot.com/2020/04/postauth-sqli-in-centreon-1910-1el7.html, -https://code610.blogspot.com/2020/06/postauth-sqli-in-sitracker-v367-p2.html -https://code610.blogspot.com/2020/08/postauth-rce-in-nagios-572.html -https://code610.blogspot.com/2021/01/crashing-activepresenter.html -https://code610.blogspot.com/2022/06/night-fuzzing-session-idapro-66-part-2.html -https://codereview.chromium.org/1463463003/ -https://codereview.chromium.org/1583233008 -https://codetector.org/post/asrock_rgb_driver/ -https://codevigilant.com/disclosure/2021/wp-plugin-aceide/ -https://codevigilant.com/disclosure/2021/wp-plugin-alipay/ -https://codevigilant.com/disclosure/2021/wp-plugin-broken-link-manager/ -https://codevigilant.com/disclosure/2021/wp-plugin-cashtomer/ -https://codevigilant.com/disclosure/2021/wp-plugin-catalog/ -https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/ -https://codevigilant.com/disclosure/2021/wp-plugin-club-management-software/ -https://codevigilant.com/disclosure/2021/wp-plugin-comment-highlighter/ -https://codevigilant.com/disclosure/2021/wp-plugin-diary-availability-calendar/ -https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/ -https://codevigilant.com/disclosure/2021/wp-plugin-edit-comments/ -https://codevigilant.com/disclosure/2021/wp-plugin-email-subscriber/ -https://codevigilant.com/disclosure/2021/wp-plugin-embed-youtube-video/ -https://codevigilant.com/disclosure/2021/wp-plugin-flightlog-sql-injection/ -https://codevigilant.com/disclosure/2021/wp-plugin-g-auto-hyperlink/ -https://codevigilant.com/disclosure/2021/wp-plugin-giveasap-xss/ -https://codevigilant.com/disclosure/2021/wp-plugin-gseor/ -https://codevigilant.com/disclosure/2021/wp-plugin-handsome-testimonials/ -https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/ -https://codevigilant.com/disclosure/2021/wp-plugin-microcopy/ -https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/ -https://codevigilant.com/disclosure/2021/wp-plugin-mwp-forms/ -https://codevigilant.com/disclosure/2021/wp-plugin-post-content-xmlrpc/ -https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ -https://codevigilant.com/disclosure/2021/wp-plugin-purple-xmls-google-product-feed-for-woocommerce/ -https://codevigilant.com/disclosure/2021/wp-plugin-rsvpmaker/ -https://codevigilant.com/disclosure/2021/wp-plugin-schreikasten/ -https://codevigilant.com/disclosure/2021/wp-plugin-sendit/ -https://codevigilant.com/disclosure/2021/wp-plugin-side-menu/ -https://codevigilant.com/disclosure/2021/wp-plugin-simple-events-calendar/ -https://codevigilant.com/disclosure/2021/wp-plugin-stock-in/ -https://codevigilant.com/disclosure/2021/wp-plugin-the-sorter/ -https://codevigilant.com/disclosure/2021/wp-plugin-timeline-calendar/ -https://codevigilant.com/disclosure/2021/wp-plugin-unlimited-popups/ -https://codevigilant.com/disclosure/2021/wp-plugin-video-embed-box/ -https://codevigilant.com/disclosure/2021/wp-plugin-wp-board/ -https://codevigilant.com/disclosure/2021/wp-plugin-wp-display-users/ -https://codevigilant.com/disclosure/2021/wp-plugin-wp-icommerce/ -https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/ -https://codevigilant.com/disclosure/2021/wp-plugin-wpagecontact/ -https://codevigilant.com/disclosure/2021/wp-plugins-domain-redirect/ -https://codewhitesec.blogspot.com/2017/04/amf.html -https://codingkoala.eu/posts/CVE202230515/ -https://community.freepbx.org/t/0-day-freepbx-exploit/80092 -https://community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerability-in-d-link-dwr-and-dap-routers/1772 -https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 -https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 -https://community.sophos.com/b/security-blog -https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal -https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation -https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503 -https://community.sophos.com/b/security-blog/posts/advisory-resolved-authenticated-rce-issues-in-user-portal-cve-2020-17352 -https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-in-sg-utm-webadmin-cve-2020-25223 -https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-via-sqli-cve-2020-15504 -https://community.sophos.com/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264 -https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265 -https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363 -https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt -https://compass-security.com/fileadmin/Research/Advisories/2020-05_CSNC-2020-005_Checkmk_Local_Privilege_Escalation.txt -https://compass-security.com/fileadmin/Research/Advisories/2020-12_CSNC-2019-013_AdRem_NetCrunch_Cross-Site_Scripting_XSS.txt -https://compass-security.com/fileadmin/Research/Advisories/2020-15_CSNC-2019-016_AdRem_NetCrunch_Cross-Site_Request_Forgery_CSRF.txt -https://comsec.ethz.ch/research/microarch/inception/ -https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/ -https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/ -https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/ -https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ -https://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered/ -https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection -https://coreruleset.org/20200914/cve-2020-15598/ -https://coreymhudson.github.io/bwa_vulnerabilties/ -https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html -https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html -https://cp270.wordpress.com/2017/02/02/security-advisory-open-url-redirect-in-sme-server/ -https://cp270.wordpress.com/2018/05/14/war-story-password-resets/ -https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b -https://crayon-xin.github.io/2018/04/20/baijiacmsV3-CSRF-add-admin/ -https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal -https://cschwarz1.github.io/posts/0x04/ -https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1 -https://ctrlu.net/vuln/0002.html -https://cturt.github.io/shogihax.html -https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107 -https://curl.haxx.se/docs/CVE-2019-5443.html -https://curl.se/docs/CVE-2021-22898.html -https://cve.anas-cherni.me/2024/04/04/cve-2024-29386/ -https://cve.anas-cherni.me/2024/04/04/cve-2024-29387/ -https://cveexploit.blogspot.in/ -https://cves.at/posts/cve-2023-25260/writeup/ -https://cves.at/posts/cve-2023-25261/writeup/ -https://cves.at/posts/cve-2023-25262/writeup/ -https://cves.at/posts/cve-2023-25263/writeup/ -https://cves.at/posts/cve-2023-31433/writeup/ -https://cves.at/posts/cve-2023-31434/writeup/ -https://cves.at/posts/cve-2023-31435/writeup/ -https://cves.at/posts/cve-2024-24396/writeup/ -https://cves.at/posts/cve-2024-24397/writeup/ -https://cves.at/posts/cve-2024-24398/writeup/ -https://cvewalkthrough.com/cve-2020-13473-nch-account-clear-text-password-storage/ -https://cvewalkthrough.com/cve-2020-13474-nch-express-accounts-privilege-escalation/ -https://cvewalkthrough.com/cve-2020-27413-mahavitaran-android-application-clear-text-password-storage/ -https://cvewalkthrough.com/cve-2020-27414-mahavitaran-android-application-insecure-communication-of-sensitive-dat/ -https://cvewalkthrough.com/cve-2020-35398-uti-mutual-fund-android-application-username-enumeration/ -https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/ -https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/ -https://cwatch.comodo.com/blog/website-security/vulnerability-found-in-multiple-stored-xss-form-in-wordpress-version-1-2-5/ -https://cwiki.apache.org/confluence/display/WW/S2-013 -https://cwiki.apache.org/confluence/display/WW/S2-014 -https://cwiki.apache.org/confluence/display/WW/S2-015 -https://cwiki.apache.org/confluence/display/WW/S2-057 -https://cxsecurity.com/ascii/WLB-2019050283 -https://cxsecurity.com/blad/WLB-2017040033 -https://cxsecurity.com/blad/WLB-2017040064 -https://cxsecurity.com/issue/WLB-2013040082 -https://cxsecurity.com/issue/WLB-2015080165 -https://cxsecurity.com/issue/WLB-2016010011 -https://cxsecurity.com/issue/WLB-2016050136 -https://cxsecurity.com/issue/WLB-2016080220 -https://cxsecurity.com/issue/WLB-2016110092 -https://cxsecurity.com/issue/WLB-2016110122 -https://cxsecurity.com/issue/WLB-2017010042 -https://cxsecurity.com/issue/WLB-2017050062 -https://cxsecurity.com/issue/WLB-2017060181 -https://cxsecurity.com/issue/WLB-2017090008 -https://cxsecurity.com/issue/WLB-2017100187 -https://cxsecurity.com/issue/WLB-2017120155 -https://cxsecurity.com/issue/WLB-2017120169 -https://cxsecurity.com/issue/WLB-2017120183 -https://cxsecurity.com/issue/WLB-2018010251 -https://cxsecurity.com/issue/WLB-2018050029 -https://cxsecurity.com/issue/WLB-2018050139 -https://cxsecurity.com/issue/WLB-2018060091 -https://cxsecurity.com/issue/WLB-2018060092 -https://cxsecurity.com/issue/WLB-2018060157 -https://cxsecurity.com/issue/WLB-2018060185 -https://cxsecurity.com/issue/WLB-2018060325 -https://cxsecurity.com/issue/WLB-2018070095 -https://cxsecurity.com/issue/WLB-2018070096 -https://cxsecurity.com/issue/WLB-2018070175 -https://cxsecurity.com/issue/WLB-2018080003 -https://cxsecurity.com/issue/WLB-2018080098 -https://cxsecurity.com/issue/WLB-2018090182 -https://cxsecurity.com/issue/WLB-2018090248 -https://cxsecurity.com/issue/WLB-2018090249 -https://cxsecurity.com/issue/WLB-2018090255 -https://cxsecurity.com/issue/WLB-2018090261 -https://cxsecurity.com/issue/WLB-2018100018 -https://cxsecurity.com/issue/WLB-2018100107 -https://cxsecurity.com/issue/WLB-2018120252 -https://cxsecurity.com/issue/WLB-2019020191 -https://cxsecurity.com/issue/WLB-2019050199 -https://cxsecurity.com/issue/WLB-2019100164 -https://cxsecurity.com/issue/WLB-2019120110 -https://cxsecurity.com/issue/WLB-2019120111 -https://cxsecurity.com/issue/WLB-2019120112 -https://cxsecurity.com/issue/WLB-2020010143 -https://cxsecurity.com/issue/WLB-2020010205 -https://cxsecurity.com/issue/WLB-2020030150 -https://cxsecurity.com/issue/WLB-2020030174 -https://cxsecurity.com/issue/WLB-2020030177 -https://cxsecurity.com/issue/WLB-2020040032 -https://cxsecurity.com/issue/WLB-2020040144 -https://cxsecurity.com/issue/WLB-2020050071 -https://cxsecurity.com/issue/WLB-2020050235 -https://cxsecurity.com/issue/WLB-2020060010 -https://cxsecurity.com/issue/WLB-2020060011 -https://cxsecurity.com/issue/WLB-2020080046 -https://cxsecurity.com/issue/WLB-2020090030 -https://cxsecurity.com/issue/WLB-2020090063 -https://cxsecurity.com/issue/WLB-2020090064 -https://cxsecurity.com/issue/WLB-2020100161 -https://cxsecurity.com/issue/WLB-2020120118 -https://cxsecurity.com/issue/WLB-2021110057 -https://cxsecurity.com/issue/WLB-2022010013 -https://cxsecurity.com/issue/WLB-2022010019 -https://cxsecurity.com/issue/WLB-2022010093 -https://cxsecurity.com/issue/WLB-2022090057 -https://cxsecurity.com/issue/WLB-2022100037 -https://cxsecurity.com/issue/WLB-2023050012 -https://cxsecurity.com/issue/WLB-2023090075 -https://cxsecurity.com/issue/WLB-2024010023 -https://cxsecurity.com/issue/WLB-2024010027 -https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/ -https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/ -https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/ -https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/ -https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/ -https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ -https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ -https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html -https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html -https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/ -https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ -https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html -https://cyberintel.es/cve/CVE-2022-48331_Buffer_Overflow_in_Widevine_drm_save_keys_0x69b0/ -https://cyberintel.es/cve/CVE-2022-48332_Buffer_Overflow_in_Widevine_drm_save_keys_0x6a18/ -https://cyberintel.es/cve/CVE-2022-48333_Buffer_Overflow_in_Widevine_drm_verify_keys_0x730c/ -https://cyberintel.es/cve/CVE-2022-48334_Buffer_Overflow_in_Widevine_drm_verify_keys_0x7370/ -https://cyberintel.es/cve/CVE-2022-48335_Buffer_Overflow_in_Widevine_PRDiagVerifyProvisioning_0x5f90/ -https://cyberintel.es/cve/CVE-2022-48336_Buffer_Overflow_in_Widevine_PRDiagParseAndStoreData_0x5cc8/ -https://cybersecurityworks.com/zerodays/cve-2015-9260-bedita.html -https://cybersecurityworks.com/zerodays/cve-2016-11014-netgear.html -https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 -https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ -https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/ -https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/ -https://cybir.com/2023/cve/poc-repetier-server-140/ -https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/ -https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ -https://d0ub1e-d.github.io/2022/12/30/exploit-db-1/ -https://daniels-it-blog.blogspot.com/2020/06/arbitrary-file-deletion-in-iobit.html -https://dannyodler.medium.com/attacking-the-golden-ring-on-amd-mini-pc-b7bfb217b437 -https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/ -https://dappsec.substack.com/p/an-advisory-for-cve-2019-16891-from -https://datarift.blogspot.com/2018/05/CVE-2018-11518-abusing-ivr-systems.html -https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/ -https://daylight-it.com/security-advisory-dlcs0001.html -https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html -https://debihiga.wordpress.com/sa-ftp/ -https://debihiga.wordpress.com/sa-whip/ -https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/ -https://derekabdine.com/blog/2022-arris-advisory -https://deshal3v.github.io/blog/kernel-research/mmap_exploitation -https://dev.gnupg.org/T4541 -https://dev696.github.io/Writeup/ -https://devbrain.com.br/index.php/2022/05/16/cve-2021-42943/ -https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ -https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study/ -https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ -https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html -https://devel0pment.de/?p=1881 -https://devel0pment.de/?p=2217 -https://developer.blender.org/T99705 -https://developer.blender.org/T99706 -https://developer.blender.org/T99711 -https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/ -https://devisions.github.io/blog/cve-2022-48111 -https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/ -https://dfir.ru/2023/11/01/cve-2023-45897-a-vulnerability-in-the-linux-exfat-userspace-tools/ -https://dgl.cx/2023/09/ansi-terminal-security#mintty -https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50 -https://dheatattack.com -https://dheatattack.gitlab.io/ -https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/ -https://dirtypipe.cm4all.com/ -https://discuss.gradle.org/t/a-security-issue-about-gradle-rce/17726 -https://discussions.eramba.org/t/question-stored-xss-vulnerability/2326 -https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-lfi.txt -https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-xsrf.txt -https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-xss.txt -https://dl.packetstormsecurity.net/1804-exploits/quixplorer241beta-xss.txt -https://dl.packetstormsecurity.net/2206-exploits/avantunegenialcloudproj10-xss.txt -https://dl.packetstormsecurity.net/papers/general/braktooth.pdf -https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/ -https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html -https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021 -https://docs.gitlab.com/ee/administration/server_hooks.html -https://docs.gitlab.com/ee/user/group/ -https://docs.google.com/document/d/18lJc_F5p3HPaMwsUAIwP0zMMhwJs-Snhuj05nhMIgAw/edit -https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit -https://docs.google.com/document/d/1GZt9MKB2K-nDrg0cnrnU6_z9wDd9xPE-YJbPV2Qgqg4/edit -https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing -https://docs.google.com/document/d/1K3G6a8P_LhYdk5Ddn57Z2aDUpaGAS7I_F8lESVfSFfY/edit -https://docs.google.com/document/d/1MKeb9lly_oOrVG0Ja4A-HgwaeXhb_xQHT9IIOee3wi0/edit -https://docs.google.com/document/d/1OSwQjtyALgV3OulmWGaTqZrSzk7Ta-xGrcLI0I7SPyM -https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing -https://docs.google.com/document/d/1Uw3D6ECXZr8S2cWOTY81kg6ivv0WpR4kQqxVpUSyGUA/edit?usp=sharing -https://docs.google.com/document/d/1ZG1qiwpECbVnv92yNckDn7yyuluKoC2_ON-eLhAY97Q/edit?usp=sharing -https://docs.google.com/document/d/1dJP1CQupHGXjsMWthgPGepOkcnxYA4mDfdjOE46nrhM/edit?usp=sharing -https://docs.google.com/document/d/1k598A16gV9HPwFXnYkyrPwoRbnbFX6LAMRyzb_dxLCM/edit -https://docs.google.com/document/d/1lUHMAOnbQUfh_yBGdBB1x9n0QdVGeP9Tggu9auqpXNo/edit?usp=sharing -https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit -https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing -https://docs.google.com/document/d/e/2PACX-1vQJveVcGMp_NMdBY5Je2K2k63RoCYznvKjJk5u1wJRmLotvwQkG5qiqZjpABcOkjzj49wkwGweiFwrc/pub -https://docs.google.com/spreadsheets/d/1DiiUPCPvmaliWcfwPSc36y2mDvuidkDKQBWqaIuJi0A/edit?usp=sharing -https://docs.liman.dev/baslangic/guvenlik -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-021 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-022 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-026 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-029 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-003 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-006 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-007 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-010 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-011 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-012 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-017 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-026 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-028 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-029 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-030 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-031 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-032 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-033 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-043 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-046 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-050 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-055 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-005 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-008 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-010 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-011 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-017 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-022 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-026 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-028 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-029 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-031 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-033 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-043 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-049 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-050 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-051 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-052 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-053 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-056 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-065 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-068 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-074 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-076 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-077 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-001 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-005 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-006 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-007 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-010 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-011 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-012 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-013 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-022 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-028 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-031 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-032 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-035 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-038 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-041 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-042 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-043 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-046 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-050 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-051 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-052 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-054 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-055 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-056 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-058 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-059 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-062 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-063 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-064 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-065 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-066 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-002 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-003 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-004 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-006 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-007 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-008 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-009 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-013 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-017 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-022 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-046 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-048 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-050 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-055 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-056 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-059 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-060 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-063 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-064 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-066 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-068 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-077 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-004 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-007 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-011 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-026 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-030 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-031 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-033 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-038 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-040 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-041 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-042 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-046 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-047 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-049 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-051 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-052 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-056 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-057 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-063 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-068 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-069 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-073 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-074 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-028 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-030 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-036 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-040 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-045 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-051 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-067 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-069 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-073 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-084 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-092 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-096 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-097 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-001 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-024 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-029 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-033 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-046 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-055 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-065 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-076 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-008 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-012 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-027 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-049 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-060 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-011 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-025 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-058 -https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-006 -https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html -https://docs.unsafe-inline.com/0day/asp.net-zero-v12.3.0-html-injection-leads-to-open-redirect-via-websockets-cve-2023-48003 -https://docs.unsafe-inline.com/0day/manageengine-adselfservice-plus-6.1-csv-injection -https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758 -https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html -https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 -https://doddsecurity.com/234/command-injection-on-palo-alto-networks-expedition/ -https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html -https://dolosgroup.io/blog -https://douevenknow.us/post/619763074822520832/an-el1el3-coldboot-vulnerability -https://downfall.page -https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-103-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2021-103-01_C-Bus_Toolkit_C-Gate_Server_Security_Notification.pdf -https://downloads.avaya.com/css/P8/documents/101038598 -https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing -https://drive.google.com/drive/folders/18YCKzFnS5CZRmzgcwc8g7jvLpmqgy68B?usp=sharing -https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing -https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing -https://drive.google.com/drive/folders/1BPULhDC_g__seH_VnQlVtkrKdOLkXdzV?usp=sharing -https://drive.google.com/drive/folders/1GAOuZwPB-upkpjPgjB8qLIKl9Mh3IVfl?usp=sharing -https://drive.google.com/drive/folders/1NOIoT8yE_HDoLVYhchml5E2Za3Oo6V9Y?usp=sharing -https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing -https://drive.google.com/drive/folders/1YjJFvxis3gLWX95990Y-nJMbWCQHB02U?usp=sharing -https://drive.google.com/drive/folders/1Yu4aVDdrgvs-F9jP3R8Cw7qo_TC7VB-R -https://drive.google.com/drive/folders/1ZFjWlD5axvhWp--I7tuiZ9uOpSBmU_f6?usp=drive_link -https://drive.google.com/drive/folders/1_XfWBLqxT2Mqt7uB663Sjlc62pE8-rcN?usp=sharing -https://drive.google.com/drive/folders/1ecVTReqCS_G8svyq3MG79E2y59psMcPn?usp=sharing -https://drive.google.com/drive/folders/1epm65c4_iC0zE5V_leoet4Jyk1Prz2p5?usp=sharing -https://drive.google.com/drive/folders/1f61RXqelSDY0T92aLjmb8BhgAHt_eeUS -https://drive.google.com/drive/folders/1iY4QqzZLdYgwD0LYc74M4Gm2wSC6Be1u?usp=sharing -https://drive.google.com/drive/folders/1lSaxWKiNKRkeZxQanEMpt906aUgDGUk_?usp=sharing -https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing -https://drive.google.com/drive/folders/1yuc1n6tr57wD8qsT0HAFDVAuii7iibDM?usp=sharing -https://drive.google.com/drive/u/1/folders/1qtq272m7jJaEUPGFLvyXmIl5zNJv7rd1 -https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link -https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link -https://drive.google.com/file/d/125xS3GVMr7_qo5HjWvXaXixuE_R-q_u3/view?usp=sharing -https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/view -https://drive.google.com/file/d/17y764rRfgab2EhYMEqCIYh__5sOTigqe/view?usp=sharing -https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing -https://drive.google.com/file/d/1Dp0dD9PNcwamjRi0ldD0hUOEivu48SR6/view?usp=sharing -https://drive.google.com/file/d/1GCOzJ-ZovYij9GIdmsrZrR9g8mlC22hs/view?usp=sharing -https://drive.google.com/file/d/1RXmDUAjqZvWSvHUrfRerz7My6M3KX7YG/view -https://drive.google.com/file/d/1S69wOovVa8NRVUXcB0PkVvZHFxREcD4Y/view?usp=sharing -https://drive.google.com/file/d/1UDuez2CTscdWXYzyXLi3x8CMs9IWLL11/view?usp=sharing -https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing -https://drive.google.com/file/d/1ZmAuKMVzUpL8pt5KXQJk8IyPECoVP9xw/view?usp=sharing -https://drive.google.com/file/d/1bao4YK4GwvAvCdCrsW5UpJZdvREdc_Yj/view?usp=sharing -https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing -https://drive.google.com/file/d/1iMswKzoUvindXUGh1cuAmi-0R84tLDaH/view?usp=sharing -https://drive.google.com/file/d/1iusYdheb62dom0DnvAzEiNR-e4EXSf2k/view?usp=sharing -https://drive.google.com/file/d/1kSDlPASBCgJEINxTSIsjMWrU4u4T5XCc/view?usp=sharing -https://drive.google.com/file/d/1krgHH2NvVFr93VpErLkOjDV3L6M5yIA1/view?usp=sharing -https://drive.google.com/file/d/1lPZ1yL9UlU-uB03xz17q4OR9338X_1am/view?usp=sharing -https://drive.google.com/file/d/1m-wTfOL5gY3huaSEM3YPSf98qIrkl-TW/view?usp=sharing -https://drive.google.com/file/d/1mpapFCqfZLv__EAM7uivrrl2h55rpi1V/view?usp=sharing -https://drive.google.com/file/d/1n9Zas-iSOfKVMN3UzPyVGgQgCmig2A5I/view?usp=sharing -https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link -https://drive.google.com/file/d/1w83xWsVLS_gCpQy4LDwbjNK9JaB87EEf/view?usp=sharing -https://drive.google.com/file/d/1zXWW545ktCznO36k90AN0APhTz8ky-gG/view?usp=sharing -https://drive.google.com/open?id=1795_joGaL3QXMFeJoJPiNgB_d913XePx -https://drive.google.com/open?id=195h-LirGiIVKxioyusw3SvmLp8BljPxe -https://drive.google.com/open?id=1CxLrSKAczEZpm_7FERIrCGGJAs2mp6Go -https://drive.google.com/open?id=1HrYqVKlSxhQqB5tNhhLIgpyfi0Y2ZL80 -https://drive.google.com/open?id=1IGRYVci8fxic0jJJb-pAfAK1kJ4V2yGM -https://drive.google.com/open?id=1msz6pb08crPC0VT7s_Z_KTsKm9CbLJEXNsmRwzoNLy8 -https://drive.google.com/open?id=1p4HJ5C20TqY0rVNffdD5Zd7S_bGvDhnk -https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 -https://drivertom.blogspot.com/2021/01/wfilter-icf-0day-rce.html -https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/ -https://duartecsantos.github.io/2024-01-02-CVE-2023-50447/ -https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/ -https://dumpco.re/blog/net-snmp-5.7.3-remote-dos -https://dumpco.re/bugs/ntpsec-authed-npe -https://dumpco.re/bugs/ntpsec-authed-oobwrite -https://dumpco.re/bugs/ntpsec-oobread1 -https://dumpco.re/bugs/ntpsec-oobread2 -https://dvsorder.org -https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/ -https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/ -https://eclypsium.com/2019/11/12/mother-of-all-drivers/ -https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf -https://ecosystem.atlassian.net/browse/APL-1338 -https://ecosystem.atlassian.net/browse/APL-1359 -https://ecosystem.atlassian.net/browse/APL-1361 -https://ecosystem.atlassian.net/browse/APL-1363 -https://ecosystem.atlassian.net/browse/APL-1373 -https://ecosystem.atlassian.net/browse/APL-1386 -https://ecosystem.atlassian.net/browse/APL-1390 -https://ecosystem.atlassian.net/browse/APL-1391 -https://ecosystem.atlassian.net/browse/AW-20 -https://ecosystem.atlassian.net/browse/OAUTH-344 -https://ecosystem.atlassian.net/browse/STRM-2350 -https://ecosystem.atlassian.net/browse/UPM-5871 -https://ecosystem.atlassian.net/browse/UPM-5964 -https://ecosystem.atlassian.net/browse/UPM-6044 -https://edoverflow.com/2017/ruby-resolv-bug/ -https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html -https://eldstal.se/advisories/230327-magnusbilling.html -https://elifulkerson.com/CVE-2022-32429/ -https://emily.id.au/tailscale -https://en.wikipedia.org/wiki/Slowloris_(computer_security) -https://ephort.dk/blog/laravel-timing-attack-vulnerability/ -https://ereisr00.github.io/ -https://erpaciocco.github.io/2022/eve-ng-rce/ -https://eslam.io/posts/ejs-server-side-template-injection-rce/ -https://espressif.com -https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/ -https://exim.org/static/doc/security/CVE-2019-15846.txt -https://exploit-db.com/exploits/44159 -https://exploit-db.com/exploits/44161 -https://exploit-db.com/exploits/44162 -https://exploit-db.com/exploits/44163 -https://exploit-db.com/exploits/44164 -https://exploit-db.com/exploits/47958 -https://exploitbox.io/vuln/Vanilla-Forums-Exploit-Host-Header-Injection-CVE-2016-10073-0day.html -https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html -https://exploots.github.io/posts/2024/01/18/d-link-covr-1102-vulnerability.html -https://exponentcms.lighthouseapp.com/projects/61783/tickets/1323-exponent-cms-235-file-upload-cross-site-scripting-vulnerability -https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459 -https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460 -https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461 -https://extensions.typo3.org/extension/download/restler/1.7.1/zip/ -https://f20.be/cves/provide-server-v-14-4 -https://f20.be/cves/socomec -https://f20.be/cves/titan-ftp-vulnerabilities -https://fatihhcelik.github.io/posts/Division-By-Zero-Deark/ -https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/ -https://fatihhcelik.github.io/posts/Group-Office-CRM-Stored-XSS-via-SVG-File/ -https://fatihhcelik.github.io/posts/NULL-Pointer-Dereference-Deark/ -https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html -https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html -https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/ -https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce/ -https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/ -https://ffmpeg.org/ -https://ffmpeg.org/ffmpeg-filters.html#drawtext-1 -https://ffmpeg.org/security.html -https://ffmpeg.org/trac/ffmpeg/ticket/794 -https://fibonhack.github.io/2021/desktop-telematico-mitm-to-rce -https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2021-40142.pdf -https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf -https://fireshellsecurity.team/hack-n-routers/ -https://fitoxs.com/vuldb/09-exploit-perl.txt -https://fitoxs.com/vuldb/10-exploit-perl.txt -https://fitoxs.com/vuldb/11-exploit-perl.txt -https://fitoxs.com/vuldb/12-exploit-perl.txt -https://fitoxs.com/vuldb/13-exploit-perl.txt -https://fitoxs.com/vuldb/14-exploit-perl.txt -https://fitoxs.com/vuldb/15-exploit-perl.txt -https://fitoxs.com/vuldb/18-exploit-perl.txt -https://flashpoint.io/blog/bitwarden-password-pilfering/ -https://flipflopsecurity.wordpress.com/2019/10/07/pc-protect-v4-14-31-privilege-esclation/ -https://floodlight.atlassian.net/wiki/spaces/floodlightcontroller/pages/24805419/Floodlight+v1.2 -https://fluidattacks.com/advisories/aerosmith -https://fluidattacks.com/advisories/armstrong/ -https://fluidattacks.com/advisories/berry/ -https://fluidattacks.com/advisories/blessd/ -https://fluidattacks.com/advisories/bowie/ -https://fluidattacks.com/advisories/brown/ -https://fluidattacks.com/advisories/brubeck/ -https://fluidattacks.com/advisories/cerati/ -https://fluidattacks.com/advisories/charles/ -https://fluidattacks.com/advisories/clapton/ -https://fluidattacks.com/advisories/cobain/ -https://fluidattacks.com/advisories/creed/ -https://fluidattacks.com/advisories/dylan/ -https://fluidattacks.com/advisories/eilish/ -https://fluidattacks.com/advisories/franklin/ -https://fluidattacks.com/advisories/gershwin/ -https://fluidattacks.com/advisories/gomez/ -https://fluidattacks.com/advisories/hendrix/ -https://fluidattacks.com/advisories/imagination/ -https://fluidattacks.com/advisories/jackson/ -https://fluidattacks.com/advisories/jagger/ -https://fluidattacks.com/advisories/jett/ -https://fluidattacks.com/advisories/joplin/ -https://fluidattacks.com/advisories/kent/ -https://fluidattacks.com/advisories/lennon/ -https://fluidattacks.com/advisories/maiden/ -https://fluidattacks.com/advisories/mercury/ -https://fluidattacks.com/advisories/miller/ -https://fluidattacks.com/advisories/mingus/ -https://fluidattacks.com/advisories/napoli -https://fluidattacks.com/advisories/osbourne/ -https://fluidattacks.com/advisories/porter/ -https://fluidattacks.com/advisories/queen/ -https://fluidattacks.com/advisories/simone/ -https://fluidattacks.com/advisories/sinatra/ -https://fluidattacks.com/advisories/spinetta/ -https://fluidattacks.com/advisories/stirling/ -https://fluidattacks.com/advisories/tempest/ -https://fluidattacks.com/advisories/tyler/ -https://fluidattacks.com/advisories/wyckoff/ -https://flyd.uk/post/cve-2023-24249/ -https://forge.univention.org/bugzilla/show_bug.cgi?id=48427 -https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt -https://forum.backbox.org/security-advisories/waiting-verification-backbox-os-denial-of-service/msg10218 -https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 -https://forum.freecadweb.org/viewtopic.php?t=64733 -https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 -https://forum.obsidian.md/t/embedded-web-pages-in-obsidian-canvas-can-use-sensitive-web-apis-without-the-users-permission-grant/54509 -https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760 -https://forum.tracker-software.com/viewtopic.php?f=62&t=31419 -https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928 -https://forum.xpdfreader.com/viewtopic.php?f=1&t=42344 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=40842 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41273 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41818 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=41890 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42028 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42029 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42066 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42092 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42122 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42160 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42261 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42320 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=42349&p=43959#p43959 -https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 -https://forum.xpdfreader.com/viewtopic.php?t=42361 -https://forum.xpdfreader.com/viewtopic.php?t=42421 -https://forum.xpdfreader.com/viewtopic.php?t=42422 -https://forum.xpdfreader.com/viewtopic.php?t=42505 -https://forum.xpdfreader.com/viewtopic.php?t=42618 -https://forum.xpdfreader.com/viewtopic.php?t=43597 -https://forum.xpdfreader.com/viewtopic.php?t=43657 -https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/ -https://foswiki.org/Support/SecurityAlert-CVE-2023-24698 -https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e -https://freedom-to-tinker.com/2023/06/14/security-analysis-of-the-dominion-imagecast-x/ -https://freetom.github.io/0day/2019/09/14/MobaXterm-command-exec-in-protocol-handler.html -https://frichetten.com/blog/cve-2020-11108-pihole-rce/ -https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html -https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html -https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html -https://friends-of-presta.github.io/security-advisories/module/2023/06/06/leocustomajax.html -https://friends-of-presta.github.io/security-advisories/modules/2023/01/05/appagebuilder.html -https://friends-of-presta.github.io/security-advisories/modules/2023/01/17/smplredirectionsmanager.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/01/stripejs.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/06/xenforum.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/09/dpdfrance.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmsslider.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/23/xipblog.html -https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html -https://friends-of-presta.github.io/security-advisories/modules/2023/04/04/lgbudget.html -https://friends-of-presta.github.io/security-advisories/modules/2023/04/11/advancedpopupcreator.html -https://friends-of-presta.github.io/security-advisories/modules/2023/04/20/bdroppy.html -https://friends-of-presta.github.io/security-advisories/modules/2023/04/25/askforaquote.html -https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html -https://friends-of-presta.github.io/security-advisories/modules/2023/05/09/posstaticfooter.html -https://friends-of-presta.github.io/security-advisories/modules/2023/05/11/possearchproducts.html -https://friends-of-presta.github.io/security-advisories/modules/2023/05/17/cdesigner-89.html -https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html -https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html -https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html -https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/ -https://g0blin.co.uk/cve-2014-4972/ -https://g0blin.co.uk/cve-2014-7240/ -https://g0blin.co.uk/cve-2014-8087/ -https://g0blin.co.uk/cve-2014-8491/ -https://g0blin.co.uk/cve-2014-8492/ -https://g0blin.co.uk/cve-2014-8621/ -https://g0blin.co.uk/cve-2014-8758/ -https://galogetlatorre.blogspot.com/2023/06/cve-2023-34096-path-traversal-thruk.html -https://ganofins.com/blog/my-first-cve-2021-24176/ -https://gccybermonks.com/posts/pdfjira/ -https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023 -https://gerr.re/posts/cve-2022-27438/ -https://ghost.org/docs/security/ -https://ghost.org/docs/security/#privilege-escalation-attacks -https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311 -https://gist.github.com/0xHop/0d065694d56ac3943d8e8c239d80c63f -https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070 -https://gist.github.com/1725489 -https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29 -https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30 -https://gist.github.com/6en6ar/712a4c1eab0324f15e09232c77ea08f8 -https://gist.github.com/6en6ar/7c2424c93e7fbf2b6fc44e7fb9acb95d -https://gist.github.com/6en6ar/b118888dc739e8979038f24c8ac33611 -https://gist.github.com/9thplayer/df042fe48c314dbc1afad80ffed8387d -https://gist.github.com/AhMyth/6d9c5e15d943dd092ccca19fca8d5d37 -https://gist.github.com/AhMyth/b0f7e4b8244def8eb8d7d8c61fa6d4e5 -https://gist.github.com/B0UG/68d3161af0c0ec85c615ca7452f9755e -https://gist.github.com/B0UG/8615df3fe83a4deca07334af783696d6 -https://gist.github.com/B0UG/9732614abccaf2893c352d14c822d07b -https://gist.github.com/B0UG/f0cfb356e23be3cd6ebea69566d6100a -https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231 -https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca -https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d -https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb -https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9 -https://gist.github.com/ChubbyZ/e1e5c1858c389334dcf581a19c741308 -https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d -https://gist.github.com/Cossack9989/6034c077f46e4f06d0992e9f2fae7f26 -https://gist.github.com/Cossack9989/e9c1c2d2e69b773ca4251acdd77f2835 -https://gist.github.com/CrimsonHamster/1aeec6db0d740de6ed4690f6a975f377 -https://gist.github.com/DrmnSamoLiu/cd1d6fa59501f161616686296aa4a6c8 -https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3 -https://gist.github.com/DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c -https://gist.github.com/Eriner/0872628519f70556d2c26c83439a9f67 -https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792 -https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 -https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3 -https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c -https://gist.github.com/GroundCTL2MajorTom/eef0d55f5df77cc911d84392acdbf625 -https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53 -https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737 -https://gist.github.com/JLLeitschuh/fe6784391254b58de680bbda78a04a70 -https://gist.github.com/JafarAkhondali/528fe6c548b78f454911fb866b23f66e -https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef -https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9 -https://gist.github.com/LioTree/8d10d123d31f50db05a25586e62a87ba -https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 -https://gist.github.com/Lz1y/24a6368c7ffdc1af7292035dd16a97f5 -https://gist.github.com/Lz1y/31595b060cd6a031896fdf2b3a1273f5 -https://gist.github.com/Lz1y/3388fa886a3e10edd2a7e93d3c3e5b6c -https://gist.github.com/Lz1y/7ab529230c43dfc5441ac32dd13e3e5b -https://gist.github.com/Lz1y/acd1bfd0cc0e0f53b8f781840e7bf368 -https://gist.github.com/Lz1y/cfb2f8179003b91404ad029333508f4c -https://gist.github.com/Lz1y/e82eb9cc776e629b9d1874dc689421eb -https://gist.github.com/Marshall-Hallenbeck/bf6a4a4f408bb7a5e0a47cb39dc1dbbe -https://gist.github.com/Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee/712ac36c8a08e2698e875169442a23a4 -https://gist.github.com/MortalP0ison/5fd584b4c85fa13281fdc918913446fa -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_newaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#attachdownloadaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#bulletin_template_showaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#plan_template_previewaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_file_downloadaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_office_file_history_showaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_template_child_field_listaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_finish_file_downaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx -https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx -https://gist.github.com/NinjaXshell/4c0509096cb4ec6543b3f8050369920c -https://gist.github.com/NinjaXshell/a5fae5e2d1031ca59160fbe29d94279c -https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8 -https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-45803 -https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#file-cve-2021-45802-md -https://gist.github.com/Psychotropos/3e8c047cada9b1fb716e6a014a428b7f -https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde -https://gist.github.com/RNPG/32be1c4bae6f9378d4f382ba0c92b367 -https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0 -https://gist.github.com/RNPG/4bb91170f8ee50b395427f26bc96a1f2 -https://gist.github.com/RNPG/53b579da330ba896aa8dc2d901e5e400 -https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3 -https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca -https://gist.github.com/RNPG/84cac1b949bab0e4c587a668385b052d -https://gist.github.com/RNPG/b154f4b2e90340d2f39605989af06bee -https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783 -https://gist.github.com/RNPG/c1ae240f2acec138132aa64ce3faa2e0 -https://gist.github.com/RNPG/e0d25ad51aa5c288b9005900f88a4f03 -https://gist.github.com/RNPG/e10524f1781a9981b50fb27bb473b0fe -https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589 -https://gist.github.com/RNPG/ef10c0acceb650d43625a77d3472dd84 -https://gist.github.com/RaJiska/c1b4521aefd77ed43b06045ca05e2591 -https://gist.github.com/Raghavrao29/1cb84f1f2d8ce993fd7b2d1366d35f48 -https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486 -https://gist.github.com/RootUp/3d9e90ea5ae0799305b4c7ec66e19387 -https://gist.github.com/RootUp/b5de893bb2e51a4c846c5a0caa13b666 -https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 -https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2 -https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf -https://gist.github.com/Sp3eD-X/22640377f96340544baf12891f708b8f -https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883 -https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1 -https://gist.github.com/Swind1er/7aad5c28e5bdc91d73fa7489b7250c94 -https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 -https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae -https://gist.github.com/This-is-Neo/c91e1a0ed5d40fbcf0dada43ea1d7479 -https://gist.github.com/This-is-Neo/cc5b08ad8a3a60cd81fd1b9c1cb573b4 -https://gist.github.com/Voidager88/73c2d512a72cceb0ef84dbf87a497d10 -https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a -https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 -https://gist.github.com/Xib3rR4dAr/02a21cd0ea0b7bf586131c5eebb69f1d -https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e -https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc -https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3 -https://gist.github.com/Xib3rR4dAr/561ac3c17b92cb55d3032504a076fa4b -https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 -https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607 -https://gist.github.com/Xib3rR4dAr/6aa9e730c1d030a5ee9f9d1eae6fbd5e -https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf -https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb -https://gist.github.com/Xib3rR4dAr/89fc87ea1d62348c21c99fc11a3bfd88 -https://gist.github.com/Xib3rR4dAr/ab293092ffcfe3c14a3c7daf5462a50b -https://gist.github.com/Xib3rR4dAr/af90cef7867583ab2de4cccea2a8c87d -https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 -https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37 -https://gist.github.com/Zenexer/40d02da5e07f151adeaeeaa11af9ab36 -https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7 -https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66 -https://gist.github.com/aaaahuia/1343e3aa06b031ea621b5701cebcee3e -https://gist.github.com/aaaahuia/1fd31c1ebcddfe4c95268fa4f31fc312 -https://gist.github.com/aaaahuia/583b062b686cdff27554e3c6fa5ac94e -https://gist.github.com/aaaahuia/b99596c6de9bd6f60e0ddb7bf0bd13c4 -https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe -https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68 -https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f -https://gist.github.com/ahpaleus/76aa81ec82644a89c2088ab3ea99f07c -https://gist.github.com/alacerda/98853283be6009e75b7d94968d50b88e -https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b -https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 -https://gist.github.com/alfarom256/220cb75816ca2b5556e7fc8d8d2803a0 -https://gist.github.com/aliceicl/b2f25f3a0a3ba9973e4977f922d04008 -https://gist.github.com/aliceicl/e32fb4a17277c7db9e0256185ac03dae -https://gist.github.com/anonymous/16aca69b7dea27cb73ddebb0d9033b02 -https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb -https://gist.github.com/ansarisec/12737c207c0851d52865ed60c08891b7 -https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550 -https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac -https://gist.github.com/arleyna/20d858e11c48984d00926fa8cc0c2722 -https://gist.github.com/b33t1e/43b26c31e895baf7e7aea2dbf9743a9a -https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867 -https://gist.github.com/bc0d3/6d55866a78f66569383241406e18794f -https://gist.github.com/bc0d3/cbc458f0fcbe0f897e529c7f3d77c9d6 -https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa -https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9 -https://gist.github.com/bincat99/311aff295c270371dc8ee89599b016f1 -https://gist.github.com/c0nrad/e92005446c480707a74a -https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832 -https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e -https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c -https://gist.github.com/dazhouzhou/1a3b7400547f23fe316db303ab9b604f -https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280 -https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b -https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e -https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a -https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c -https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20 -https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808 -https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b -https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba -https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7 -https://gist.github.com/dmblbc/14a77036a9562407194c3cf3ee3f265e -https://gist.github.com/dmknght/ac489cf3605ded09b3925521afee3003 -https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 -https://gist.github.com/dru1d-foofus/835423de77c3522d53b9e7bdf5a28dfe -https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b -https://gist.github.com/emboss/91696b56cd227c8a0c13 -https://gist.github.com/erud1te-sec/5c85924cb78ba85af42e0b7b62a5ec91 -https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597 -https://gist.github.com/fakhrizulkifli/40f3daf52950cca6de28ebec2498ff6e -https://gist.github.com/fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab -https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8 -https://gist.github.com/fakhrizulkifli/c7740d28efa07dafee66d4da5d857ef6 -https://gist.github.com/feixuezhi/7a1b117e1a4800efb3b6fffe76ca0e97 -https://gist.github.com/fxb6476/0b9883a88ff2ca40de46a8469834e16c -https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa -https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8 -https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6 -https://gist.github.com/harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b -https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 -https://gist.github.com/hybriz/63bbe2d963e531357aca353c74dd1ad5 -https://gist.github.com/icemonster/282ab98fb68fc22aac7c576538f6369c -https://gist.github.com/illikainen/ced14e08e00747fef613ba619bb25bb4 -https://gist.github.com/ipxsec/1680d29c49fe368be81b037168175b10 -https://gist.github.com/ipxsec/b20383620c9e1d5300f7716e62e8a82f -https://gist.github.com/isciurus/df4d7edd9c3efb4a0753 -https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd -https://gist.github.com/izadgot/3efc75f62f9c9567c8f11bad74165425 -https://gist.github.com/jk1986/3b304ac6b4ae52ae667bba380c2dce19 -https://gist.github.com/jocephus/806ff4679cf54af130d69777a551f819 -https://gist.github.com/kdrypr/5dac91c2d27c4dc82b1225dffa38f7a8 -https://gist.github.com/keeganparr1/1dffd3c017339b7ed5371ed3d81e6b2a -https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26 -https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md -https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 -https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244 -https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c -https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14 -https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252 -https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d -https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab -https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120 -https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d -https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b -https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c -https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd -https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde -https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb -https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0 -https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc -https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998 -https://gist.github.com/llandeilocymro/55a61e3730cdef56ab5806a677ba0891 -https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb -https://gist.github.com/lx39214/248dc58c6d05455d4bd06c4d3df8e2d0 -https://gist.github.com/mariuszpoplwski/51604d8a6d7d78fffdf590c25e844e09 -https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f -https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18 -https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 -https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 -https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f -https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 -https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c -https://gist.github.com/mestrtee/d1eb6e1f7c6dd60d8838c3e56cab634d -https://gist.github.com/mmmdzz/03df5177afd04b32ac190eb7907f3834 -https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f -https://gist.github.com/netspooky/61101e191afee95feda7dbd2f6b061c4 -https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5 -https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb -https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc -https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386 -https://gist.github.com/omarhashem123/5f0c6f1394099b555740fdc5c7651ee2 -https://gist.github.com/omarhashem123/71ec9223e90ea76a76096d777d9b945c -https://gist.github.com/omarhashem123/bccdcec70ab7e8f00519d56ea2e3fd79 -https://gist.github.com/oxagast/51171aa161074188a11d96cbef884bbd -https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8 -https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459 -https://gist.github.com/pedromonteirobb/a0584095b46141702c8cae0f3f1b6759 -https://gist.github.com/ph4nt0mbyt3/9456312e867c10de8f808250ec0b12d3 -https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7 -https://gist.github.com/pietroborrello/7c5be2d1dc15349c4ffc8671f0aad04f -https://gist.github.com/pouyadarabi/467d3167551fb0712d3264c72db092af -https://gist.github.com/prodigiousMind/fc69a79629c4ba9ee88a7ad526043413 -https://gist.github.com/redeye5/470708bd27ed115b29d0434255b9f7a0 -https://gist.github.com/redeye5/57ccafea7263efec67c82b0503c72480 -https://gist.github.com/redeye5/ccbbc43330cc9821062249b78c916317 -https://gist.github.com/redeye5/ebfef23f0a063b82779151f9cde8e480 -https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245 -https://gist.github.com/renbou/957f70d27470982994f12a1d70153d09 -https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f -https://gist.github.com/rntcruz23/199782fb65b7dc3c4492d168770b71e5 -https://gist.github.com/rodnt/a190d14d1715890d8df19bad58b90693 -https://gist.github.com/rvismit/2b1a10a48104e01f575cc948da69df19 -https://gist.github.com/rvismit/67bc11dd9ccb7423827564cb81d25740 -https://gist.github.com/sedrubal/a83fa22f1091025a5c1a14aabd711ad7 -https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1 -https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d -https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465 -https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495 -https://gist.github.com/sqrtrev/1f9986d4bdd1393832c60a97b56e170a -https://gist.github.com/svennergr/204038bda1849ebce9af32eea9e55038 -https://gist.github.com/svennergr/501409fbdb0ef4a8b0f07a26a2815fbb -https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac -https://gist.github.com/tanprathan/18d0f692a2485acfb5693e2f6dabeb5d -https://gist.github.com/tanprathan/19165c43ade898ab8b664098fb171f49 -https://gist.github.com/tanprathan/24cab2eb02937f86961c6380b47ce385 -https://gist.github.com/tanprathan/69fbf6fbac11988e12f44069ec5b18ea#file-cve-2020-22007-txt -https://gist.github.com/tanprathan/6e8ed195a2e05b7f9d9a342dbdacb349 -https://gist.github.com/tanprathan/f5133651e438b2ad1b39172d52b56115 -https://gist.github.com/tim124058/5c4babe391a016c771d2cccabead21cb -https://gist.github.com/tj-oconnor/16a4116050bbcb4717315f519b944f1f -https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 -https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936 -https://gist.github.com/w4nd3r-hya/784a86dda91bdcb3071892e56aacdee2 -https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754 -https://gist.github.com/walhajri/711af9b62f6fb25e66a5d9a490deab98 -https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b -https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263 -https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642 -https://gist.github.com/wes4m/e32080b02c2cd668d50eeac66613ca1d -https://gist.github.com/whiteman007/ -https://gist.github.com/whiteman007/43bd7fa1fa0e47554b33f0cf93066784 -https://gist.github.com/whiteman007/a3b25a7ddf38774329d72930e0cd841a -https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47 -https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 -https://gist.github.com/xax007/94183b11bdfe579fd860a37e74cd3a8e -https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c -https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b -https://gist.github.com/yurahod/2e11eabbe4b92ef1d44b08e37023ecfb -https://gist.github.com/yurahod/828d5e6a077c12f3f74c6485d1c7f0e7 -https://gist.github.com/zaee-k/390b2f8e50407e4b199df806baa7e4ef -https://gist.github.com/zeroSteiner/85daef257831d904479c -https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt -https://gist.githubusercontent.com/mke1985/a21a71098f48829916dfec74eff1e24a/raw/f635b060ad03e23fd887de48a79b70040daadadb/CVE-2021-32051 -https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/118e1b0b3370dd1c0da442901b486689efd1654b -https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/7414d0bda7763f9bd69c26c068e482ab297c1c96 -https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/a6cba062051f345e8ebfdff34aba071ed73d923f -https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/c6939f65a116b1ffed345d29d8621ee4ffb32235 -https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/c94875471e3ba3dc396c6919ff3ec9b14539cd71 -https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n4.1.4 -https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 -https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd -https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 -https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6 -https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a -https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354 -https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2 -https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12 -https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 -https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f -https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2 -https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c -https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73 -https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249 -https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d -https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b -https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014 -https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53 -https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546 -https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178 -https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac -https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791 -https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9 -https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5 -https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520 -https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33 -https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2 -https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0 -https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7 -https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8 -https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c -https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93 -https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d -https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae -https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79 -https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4 -https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000 -https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=5df147c8140efc71ac0879ae3b0057f577226d4c -https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31252 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642 -https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31643 -https://gitee.com/inxeduopen/inxedu/issues/I294XL -https://gitee.com/koyshe/phpshe/issues/IQ8S8 -https://gitee.com/koyshe/phpshe/issues/ISW87 -https://gitee.com/koyshe/phpshe/issues/ITC0C -https://gitee.com/koyshe/phpshe/issues/ITLK2 -https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ -https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ -https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/ -https://github.com/0katz/CVE-2019-12476 -https://github.com/0pc0deFR/wordpress-sploit-framework/blob/master/exploits/Brute_Force_Login_Protection_1_3_Cross_Site_Request_Forgery -https://github.com/0x09AL/CVE-2017-11882-metasploit -https://github.com/0x404Ming/CVE_Hunter/blob/main/SQLi-3.md -https://github.com/0x727/ShuiZe_0x727 -https://github.com/0x727/ShuiZe_0x727/issues/160 -https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md -https://github.com/0xB9/LayerBB-1.1.3-CSRF/blob/master/README.md -https://github.com/0xBaz/CVE-2021-29349/issues/1 -https://github.com/0xBrAinsTorM/CVE-2021-36981 -https://github.com/0xInfection/EPScalate -https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-8r25-68wm-jw35 -https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c -https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m -https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/DailyHabitTracker-SQL_Injection.md -https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Add_Type.md -https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md -https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Stored_XSS_Add_Type.md -https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Unrestricted_Fileupload.md -https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md -https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Stored_XSS.md -https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack -https://github.com/0xcc-Since2016/TP-Link-WDR-Router-Command-injection_POC/blob/master/poc.py -https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md -https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md -https://github.com/0xfml/poc/blob/main/NCH/Flexiserver_6.00_LFI.md -https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md -https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md -https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md -https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_CC.md -https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md -https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md -https://github.com/0xfml/poc/blob/main/NCH/ReflectCRM_3.01_CC.md -https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_LFI.md -https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_XSS.md -https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md -https://github.com/0xhebi/CVE-2022-34970/blob/master/report.md -https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.md -https://github.com/0xrayan/CVEs/issues/1 -https://github.com/0xrayan/CVEs/issues/2 -https://github.com/0xrayan/CVEs/issues/3 -https://github.com/0xrayan/CVEs/issues/4 -https://github.com/0z09e/CVE-2022-22909 -https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-41415/CVE-2022-41415.md -https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md -https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF -https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md -https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8 -https://github.com/10cksYiqiyinHangzhouTechnology/elf-parser_segments_poc -https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc -https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16 -https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1 -https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc -https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25346 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25347 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26839 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26840 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26841 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26843 -https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548 -https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_NatStaticSetting.md -https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_expandDlnaFile.md -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/01 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/02 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/01 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/02 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/03 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/04 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/02 -https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/03 -https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37630 -https://github.com/14isnot40/vul_discovery/blob/06d04dbbc6f792a82321c00376d4dbf3add00f4f/poc/bit2spr%20vulnerability%20discovery.md.pdf -https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf -https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/2.md -https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/3.md -https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/1.md -https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/3.md -https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/4.md -https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/5.md -https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f -https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 -https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 -https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4 -https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5 -https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r -https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h -https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md -https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20touchlist_sync.cgi.md -https://github.com/1d8/publications/tree/main/cve-2021-29011 -https://github.com/1d8/publications/tree/main/cve-2021-29012 -https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md -https://github.com/1modm/petereport/issues/35 -https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md -https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26256.md -https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md -https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-hg7m-23j3-rf56 -https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md -https://github.com/2111715623/cms/blob/main/3.md -https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md -https://github.com/2205794866/Tenda/blob/main/AC15/1.md -https://github.com/2205794866/Tenda/blob/main/AC15/10.md -https://github.com/2205794866/Tenda/blob/main/AC15/5.md -https://github.com/2205794866/Tenda/blob/main/AC15/7.md -https://github.com/2205794866/Tenda/blob/main/AC15/9.md -https://github.com/2205794866/Tenda/blob/main/AC5/1.md -https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25679.md -https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25680.md -https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25681.md -https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 -https://github.com/418sec/huntr/pull/102 -https://github.com/418sec/huntr/pull/1329 -https://github.com/4LPH4-NL/CVEs -https://github.com/4images/4images/issues/3 -https://github.com/4ra1n/super-xray/releases/tag/0.2-beta -https://github.com/4ra1n/super-xray/releases/tag/0.3-beta -https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr -https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md -https://github.com/5497lvren/Zhenhao/issues/1 -https://github.com/5erua/vuls/blob/main/dir882.md -https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting -https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1 -https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetMultipleActions -https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo -https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/boSetPasswdSettings -https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell -https://github.com/7332all/cve/blob/main/rce_1.md -https://github.com/777erp/cms/blob/main/1.md -https://github.com/777erp/cms/blob/main/10.md -https://github.com/777erp/cms/blob/main/11.md -https://github.com/777erp/cms/blob/main/12.md -https://github.com/777erp/cms/blob/main/13.md -https://github.com/777erp/cms/blob/main/14.md -https://github.com/777erp/cms/blob/main/15.md -https://github.com/777erp/cms/blob/main/16.md -https://github.com/777erp/cms/blob/main/17.md -https://github.com/777erp/cms/blob/main/2.md -https://github.com/777erp/cms/blob/main/20.md -https://github.com/777erp/cms/blob/main/3.md -https://github.com/777erp/cms/blob/main/4.md -https://github.com/777erp/cms/blob/main/5.md -https://github.com/777erp/cms/blob/main/6.md -https://github.com/777erp/cms/blob/main/7.md -https://github.com/777erp/cms/blob/main/9.md -https://github.com/779789571/zzcms/blob/main/README.md -https://github.com/7akahash1/POC/blob/main/1.md -https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md -https://github.com/86x/CVE-2021-45416 -https://github.com/876054426/vul/blob/master/ljcms_sql.md -https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh -https://github.com/94fzb/zrlog/issues/37 -https://github.com/94fzb/zrlog/issues/38 -https://github.com/94fzb/zrlog/issues/39 -https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md -https://github.com/9Bakabaka/CVE-2023-36123 -https://github.com/9lyph/CVE-2019-12836/blob/master/README.md -https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-9gqg-pp5p-q9hg -https://github.com/ADOdb/ADOdb/issues/274 -https://github.com/ARM-software/astc-encoder/issues/294 -https://github.com/ARMmbed/mbedtls/issues/1561 -https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 -https://github.com/AaravRajSIngh/Chatbot/pull/10 -https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.2/SPIP_4.1.2_AUTH_RCE/SPIP_4.1.2_AUTH_RCE_Abyss_Watcher_12_07_22.md -https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md -https://github.com/AcademySoftwareFoundation/openexr/issues/1680 -https://github.com/AcademySoftwareFoundation/openexr/issues/491 -https://github.com/AcademySoftwareFoundation/openexr/issues/493 -https://github.com/AcademySoftwareFoundation/openexr/issues/494 -https://github.com/Admidio/admidio/issues/612 -https://github.com/AetherBlack/CVE/tree/main/PMB -https://github.com/AgainstTheLight/CVE-2022-37201/blob/main/README.md -https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md -https://github.com/AgainstTheLight/CVE-2022-37203/blob/main/README.md -https://github.com/AgainstTheLight/CVE-2022-37204/blob/main/README.md -https://github.com/AgainstTheLight/CVE-2022-37205/blob/main/README.md -https://github.com/AgainstTheLight/CVE-2022-37207/blob/main/README.md -https://github.com/AgainstTheLight/CVE-2022-37209/tree/main -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql10.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql4.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql5.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql8.md -https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md -https://github.com/Agampreet-Singh/CVE-2024-25202 -https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf -https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc -https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1 -https://github.com/Ainevsia/CVE-Request/tree/main/Solana/1 -https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/11 -https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/7 -https://github.com/Ainevsia/CVE-Request/tree/main/Xerox/1 -https://github.com/Alexandre-Bartel/CVE-2018-20343 -https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md -https://github.com/Alluxio/alluxio/issues/10552 -https://github.com/AlquistManager/alquist/issues/43 -https://github.com/Am1ngl/ttt/tree/main/12 -https://github.com/Am1ngl/ttt/tree/main/13 -https://github.com/Am1ngl/ttt/tree/main/14 -https://github.com/Am1ngl/ttt/tree/main/15 -https://github.com/Am1ngl/ttt/tree/main/16 -https://github.com/Am1ngl/ttt/tree/main/160 -https://github.com/Am1ngl/ttt/tree/main/161 -https://github.com/Am1ngl/ttt/tree/main/17 -https://github.com/Am1ngl/ttt/tree/main/19 -https://github.com/Am1ngl/ttt/tree/main/20 -https://github.com/Am1ngl/ttt/tree/main/22 -https://github.com/Am1ngl/ttt/tree/main/23 -https://github.com/Am1ngl/ttt/tree/main/28 -https://github.com/Am1ngl/ttt/tree/main/29 -https://github.com/Am1ngl/ttt/tree/main/30 -https://github.com/Am1ngl/ttt/tree/main/31 -https://github.com/Am1ngl/ttt/tree/main/32 -https://github.com/Am1ngl/ttt/tree/main/37 -https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md -https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md -https://github.com/AndreGNogueira/CVE-2023-39063 -https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md -https://github.com/AndyRixon/LayerBB/issues/51 -https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-admininquiriesview_inquiryphp -https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-adminusermanage_userphp -https://github.com/AntSword-Store/AS_Redis/issues/1 -https://github.com/AntSwordProject/antSword/issues/147 -https://github.com/Antho59/wp-jobhunt-exploit -https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36 -https://github.com/AntonKueltz/fastecdsa/issues/52 -https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss -https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md -https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/fromSetWirelessRepeat.md -https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/setSchedWifi.md -https://github.com/ArchimedesCAD/libredwg/issues/6 -https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py -https://github.com/Athlon1600/php-proxy-app/issues/134 -https://github.com/Athos-Zago/CVE-2024-30973/tree/main -https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%20Injection/readme.md -https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R/readme.md -https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type -https://github.com/Aurorainfinity/Poc/tree/master/pdf2json -https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml -https://github.com/AutismJH/damicms/issues/5 -https://github.com/AutismJH/damicms/issues/6 -https://github.com/Automattic/mongoose/issues/8222 -https://github.com/Awilum/monstra-cms/issues/351 -https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md -https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md -https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md -https://github.com/B3Bo1d/CVE-2019-13403/ -https://github.com/BLL-l/vulnerability_wiki/blob/main/zzcms/user_manage_xss.md -https://github.com/Balasys/dheater -https://github.com/Barakat/CVE-2019-16098 -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-17.public-wifi-theft-impersonation.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-18.home-security-wifi-network.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-19.wifi-dhcp-cm-mac-leak.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-20.emta-reverse-dns.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-21.default-wifi-credentials.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-22.syseventd.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-23.upnp-directory-write.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-24.atom-ip-routing.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-25.atom-telnet.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-26.arbitrary-command-execution.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-27.ipv6-cm-mac-leak.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-28.session-cookie-write.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-29.password-of-the-day.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-30.wan0-ipv6-cm-mac.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-31.stb-remote-webui.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-32.unnecessary-services.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-37.rf4ce-forced-pairing.vendor.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-38.remote-web-inspector.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-39.arbitrary-file-read.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-40.ethernet-snmp.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-41.root-command-execution.txt -https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-42.remote-OTA.txt -https://github.com/BasuCert/WinboxPoC -https://github.com/Beckaf/vunl/blob/main/TOTOLINK/X6000R/2/2.md -https://github.com/BigNerd95/Chimay-Red -https://github.com/BigNerd95/WinboxExploit -https://github.com/BigTiger2020/2023/blob/main/Free%20and%20Open%20Source%20inventory%20management%20system/Free%20and%20Open%20Source%20inventory%20management%20system.md -https://github.com/BigTiger2020/2023/blob/main/XSS.md -https://github.com/BigTiger2020/2023/blob/main/best-courier-management-system/best-courier-management-system-reflected%20xss2.md -https://github.com/BigTiger2020/74cms-rce/blob/main/README.md -https://github.com/BigTiger2020/BloodX-CMS/blob/main/README.md -https://github.com/BigTiger2020/Seat-Reservation-System -https://github.com/BigTiger2020/Victor-CMS-/blob/main/README.md -https://github.com/Bixie/pagekit-portfolio/issues/44 -https://github.com/BlackCatDevelopment/BlackCatCMS/issues/373 -https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389 -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-sparkle.md -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/mootools-more.md -https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/purl.md -https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php -https://github.com/BloodHoundAD/BloodHound/issues/267 -https://github.com/BloodHoundAD/BloodHound/issues/338 -https://github.com/Bo0oM/CVE-2017-5124 -https://github.com/BobTheShoplifter/CVE-2023-52251-POC -https://github.com/Bobjones7/cve/blob/main/sql.md -https://github.com/Bonfee/CVE-2022-25636 -https://github.com/Boomingjacob/ZZCMS2021#readme -https://github.com/Boyan-MILANOV/ropium/issues/32 -https://github.com/BreakALegCml/try/blob/main/SinSiuEnterpriseWebsiteSystem -https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25366.md -https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md -https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md -https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25369.md -https://github.com/BrotherOfJhonny/grafana -https://github.com/BrotherOfJhonny/grafana/blob/main/README.md -https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md -https://github.com/Bubka/2FAuth/security/advisories/GHSA-cwhq-2mcq-pp9q -https://github.com/Budibase/budibase/security/advisories/GHSA-9xg2-9mcv-985p -https://github.com/BugBountyHunterCVE/CVE-2023-40280/blob/main/CVE-2023-40280_Authenticated-Directory-Path-Traversal_OpenClinic-GA_5.247.01_Report.md -https://github.com/BurakSevben/2024_Math_Game_XSS -https://github.com/BurakSevben/2024_Online_Food_Menu_XSS/ -https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/ -https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-1.md -https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-2.md -https://github.com/BurakSevben/CVEs/blob/main/Budget%20Management%20App/Budget%20Management%20App%20-%20SQL%20Injection%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20SQL%20Injection%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/Electricity%20Consumption%20Monitoring%20Tool/Electricity%20Consumption%20Monitoring%20Tool%20-%20SQL%20Injection.md -https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md -https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%203.md -https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md -https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md -https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20Authentication%20Bypass.md -https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20SQL%20Injection%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20Cross-Site-Scripting.md -https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md -https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md -https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%202%20(Unauthenticated).md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%203%20(Unauthenticated).md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%204.md -https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection(Unauthenticated).md -https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md -https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-2.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md -https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md -https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md -https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md -https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md -https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-%202.md -https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-1.md -https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-3.md -https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%201.md -https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md -https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md -https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection -https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection/ -https://github.com/BurakSevben/School-Task-Manager-SQL-Injection-2 -https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1 -https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#11-stored-cross-site-scripting-sysuser -https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole -https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability -https://github.com/Byron/gitoxide/security/advisories/GHSA-49jc-r788-3fc9 -https://github.com/Byron/gitoxide/security/advisories/GHSA-7w47-3wg8-547c -https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh -https://github.com/ByteHackr/389-ds-base -https://github.com/ByteHackr/unzip_poc -https://github.com/C0der1iu/Nexusphppoc/blob/master/xss2.txt -https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree -https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption -https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-libansilove-1.0.0 -https://github.com/CCCCCrash/POCs/tree/master/Web/gitnote -https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/IncorrectAccessControl -https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/IncorrectAccessControl#0x02-modify -https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/csrf -https://github.com/CDACesec/CVE-2022-31901 -https://github.com/CDACesec/CVE-2022-31902 -https://github.com/CESNET/libyang/issues/1453 -https://github.com/CLP-team/Vigor-Commond-Injection -https://github.com/CNK2100/VFuzz-public -https://github.com/COVESA/vsomeip/files/14904610/details.zip -https://github.com/COVESA/vsomeip/issues/663 -https://github.com/CP04042K/Full-Ecommece-Website-Add_Product-Stored_XSS-POC -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/addressNat.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/formSetQosBand.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/form_fast_setting_wifi_set.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromDhcpListClient-list.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromNatStaticSetting.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSchedWifi.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/formSetQosBand.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromDhcpListClient-list.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromNatStaticSetting.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSchedWifi.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSmartPowerManagement.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formDelDhcpRule.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formIPMacBindDel.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md -https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/setDebugCfg.md -https://github.com/CQURE/CVEs/blob/main/CVE-2023-37607/README.md -https://github.com/CQURE/CVEs/tree/main/CVE-2023-37608 -https://github.com/CTurt/shogihax -https://github.com/Cacti/cacti/issues/1057 -https://github.com/Cacti/cacti/issues/1071 -https://github.com/Cacti/cacti/issues/1882 -https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h -https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m -https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x -https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42 -https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7 -https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg -https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg -https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p -https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88 -https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2 -https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q -https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m -https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv -https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp -https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r -https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g -https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh -https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4 -https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h -https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h -https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x -https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87 -https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h -https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x -https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv -https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876 -https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3 -https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv -https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22 -https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc -https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7 -https://github.com/Cacti/cacti/security/advisories/GHSA-w85f-7c4w-7594 -https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr -https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 -https://github.com/CalfCrusher/CVE-2023-31851 -https://github.com/CalfCrusher/CVE-2023-31852 -https://github.com/CalfCrusher/CVE-2023-31853 -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection(1).md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41638%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41640%20%7C%20RealGimm%20-%20Information%20disclosure.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41642%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31465.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31466.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39558.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39559.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection(1).md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md -https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md -https://github.com/Carl0724/cms/blob/main/1.md -https://github.com/Carl0724/cms/blob/main/2.md -https://github.com/Carl0724/cms/blob/main/3.md -https://github.com/Carol7S/cve/blob/main/rce.md -https://github.com/CauldronDevelopmentLLC/cbang/issues/115 -https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md -https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8 -https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf -https://github.com/Changboqian/cve/blob/main/reset_password_improperly.md -https://github.com/Chanzhaoyu/chatgpt-web/issues/2001 -https://github.com/Chef003/cve/blob/main/rce.md -https://github.com/Cherry-toto/jizhicms/issues/28 -https://github.com/Cherry-toto/jizhicms/issues/29 -https://github.com/Cherry-toto/jizhicms/issues/75 -https://github.com/Cherry-toto/jizhicms/issues/76 -https://github.com/Cherry-toto/jizhicms/issues/77 -https://github.com/Cherry-toto/jizhicms/issues/85 -https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.36.0 -https://github.com/Chocapikk/CVE-2024-25600 -https://github.com/Chocapikk/CVE-2024-31819 -https://github.com/ChrisL0tus/CVE-2023-34924 -https://github.com/ChurchCRM/CRM/issues/5477 -https://github.com/ChurchCRM/CRM/issues/6450 -https://github.com/ChurchCRM/CRM/issues/6471 -https://github.com/ChurchCRM/CRM/issues/6474 -https://github.com/ChurchCRM/CRM/issues/6849 -https://github.com/ChurchCRM/CRM/issues/6851 -https://github.com/ChurchCRM/CRM/issues/6853 -https://github.com/ChurchCRM/CRM/issues/6854 -https://github.com/ChurchCRM/CRM/issues/6856 -https://github.com/ChurchCRM/CRM/issues/6858 -https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md -https://github.com/CleverStupidDog/yf-exam/issues/2 -https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r -https://github.com/ClipperCMS/ClipperCMS/issues/487 -https://github.com/ClipperCMS/ClipperCMS/issues/488 -https://github.com/ClipperCMS/ClipperCMS/issues/489 -https://github.com/ClipperCMS/ClipperCMS/issues/494 -https://github.com/CloudWise-OpenSource/FlyFish/issues/191 -https://github.com/CoColizdf/CVE/issues/1 -https://github.com/CoColizdf/CVE/issues/2 -https://github.com/Codiad/Codiad/issues/1122 -https://github.com/Codiad/Codiad/issues/584 -https://github.com/Conan0313/cve/blob/main/sql.md -https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formSetAutoPing_ping1/formSetAutoPing_ping1.md -https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolReboot/fromSysToolReboot.md -https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolRestoreSet/fromSysToolRestoreSet.md -https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md -https://github.com/Cossack9989/Vulns/blob/master/IoT/CVE-2020-14473.md -https://github.com/Cotonti/Cotonti/issues/1660 -https://github.com/Cotonti/Cotonti/issues/1661 -https://github.com/CpyRe/I-Find-CVE-2024/blob/main/BLUDIT%20Stored%20XSS.md -https://github.com/CpyRe/I-Find-CVE-2024/blob/main/REDAXO%20RCE.md -https://github.com/Creatiwity/wityCMS/issues/153 -https://github.com/CrownZTX/storedXSS -https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md -https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md -https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/reflected_XSS_in_editservice.md -https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md -https://github.com/CrownZTX/vulnerabilities/blob/main/pescms/stored_xss.md -https://github.com/Crypt0Cr33py/monicahqvuln -https://github.com/Cubi123123123/cve/blob/main/NS-ASG-sql-list_onlineuser.md -https://github.com/CunningLogic/PixelDump_CVE-2016-8462 -https://github.com/CuppaCMS/CuppaCMS/issues/12 -https://github.com/CuppaCMS/CuppaCMS/issues/17 -https://github.com/CuppaCMS/CuppaCMS/issues/20 -https://github.com/CuppaCMS/CuppaCMS/issues/23 -https://github.com/CuppaCMS/CuppaCMS/issues/24 -https://github.com/CuppaCMS/CuppaCMS/issues/28 -https://github.com/CuppaCMS/CuppaCMS/issues/3 -https://github.com/CuppaCMS/CuppaCMS/issues/30 -https://github.com/CuppaCMS/CuppaCMS/issues/31 -https://github.com/CuppaCMS/CuppaCMS/issues/33 -https://github.com/CuppaCMS/CuppaCMS/issues/34 -https://github.com/CuppaCMS/CuppaCMS/issues/4 -https://github.com/CuppaCMS/CuppaCMS/issues/7 -https://github.com/Cutegod/CMS_0_day/issues/2 -https://github.com/CveSecLook/cve/issues/1 -https://github.com/CveSecLook/cve/issues/10 -https://github.com/CveSecLook/cve/issues/11 -https://github.com/CveSecLook/cve/issues/16 -https://github.com/CveSecLook/cve/issues/17 -https://github.com/CveSecLook/cve/issues/19 -https://github.com/CveSecLook/cve/issues/20 -https://github.com/CveSecLook/cve/issues/26 -https://github.com/CveSecLook/cve/issues/27 -https://github.com/CveSecLook/cve/issues/29 -https://github.com/CveSecLook/cve/issues/3 -https://github.com/CveSecLook/cve/issues/30 -https://github.com/CveSecLook/cve/issues/32 -https://github.com/CveSecLook/cve/issues/38 -https://github.com/CveSecLook/cve/issues/39 -https://github.com/CveSecLook/cve/issues/4 -https://github.com/CveSecLook/cve/issues/41 -https://github.com/CveSecLook/cve/issues/42 -https://github.com/CveSecLook/cve/issues/6 -https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md -https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md -https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md -https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md -https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35023.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35024.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35025.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35026.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35029.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35030.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35031.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35032.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35034.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35035.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35036.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35037.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35039.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35040.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35046.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35047.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35049.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35050.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35051.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35053.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35054.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35055.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35056.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35058.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35059.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35060.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35061.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35062.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35063.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35064.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35065.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35066.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35069.md -https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35070.md -https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35085.md -https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35086.md -https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35087.md -https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35088.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35091.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35092.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35093.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35094.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35095.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35096.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35097.md -https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35099.md -https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35080.md -https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35081.md -https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload -https://github.com/CyberThoth/CVE/blob/83c243538386cd0761025f85eb747eab7cae5c21/CVE/Simple%20e-Learning%20System/Cross%20Site%20Scripting(Stored)/POC.md -https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/CVE/Clinic's%20Patient%20Management%20System/Unrestricted%20file%20upload%20(RCE)/POC.md -https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Refelected)/POC.md -https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Stored)/POC.md -https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Simple%20Sales%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md -https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Refelected)/POC.md -https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md -https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md -https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 -https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 -https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222018 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222040 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222054 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222098 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x0022209c -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222108 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/2345DumpBlock.sys-0x00222040 -https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/2345DumpBlock.sys-0x00222044 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c402000 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c402004 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060c4 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060cc -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060d0 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402000 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402004 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060c4 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060cc -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060d0 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c402000 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c402004 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060c4 -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060cc -https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060d0 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002000 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002001 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002002 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002003 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002005 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002006 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002007 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002008 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002009 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002010 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002021 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100202D -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf10026cc -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100282C -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100282d -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002833 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100283c -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002841 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002849 -https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100284c -https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md -https://github.com/D2y6p/CVE/blob/2bac2c96e24229fa99e0254eaac1b8809e424b4b/Totolink/CVE-2023-31729/CVE-2023-31729.md -https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-34563/EN.md -https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc -https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc -https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC -https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20SQLI/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20Upload%20%2B%20RCE/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20File%20Disclosure/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20SQLI/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Online-Banking_SQLI/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20Bakery%20Shop%20Management%20System%20File%20Disclosure/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md -https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md -https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC -https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC -https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC -https://github.com/D4rkP0w4r/Musical-World-Unrestricted-File-Upload-RCE-POC -https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC -https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC -https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N1/README.md -https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N2/README.md -https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N3/README.md -https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N4/README.md -https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N5/README.md -https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N6/README.md -https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N1 -https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N2 -https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N3 -https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N4 -https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N5 -https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N6 -https://github.com/DEMON1A/Discord-Recon/issues/23 -https://github.com/DIPlib/diplib/issues/80 -https://github.com/DIYgod/RSSHub/issues/10045 -https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3 -https://github.com/DMCERTCE/PoC_Tiny_Overflow -https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/4/README.md -https://github.com/DaDong-G/Vulnerability_info/tree/main/TOTOLINK/lr350/2 -https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md -https://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.zip -https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive -https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params -https://github.com/Daniel-itsec/AdvancedSystemCare -https://github.com/Darry-lang1/vuln/blob/main/H3C/GR3200/1/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/10/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/11/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/12/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/6/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/7/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/8/readme.md -https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/9/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3600R/1/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/10/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/2/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/3/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/4/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/5/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/6/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/7/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/8/readme.md -https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/9/readme.md -https://github.com/Darry-lang1/vuln/tree/main/H3C/1 -https://github.com/Darry-lang1/vuln/tree/main/H3C/10 -https://github.com/Darry-lang1/vuln/tree/main/H3C/11 -https://github.com/Darry-lang1/vuln/tree/main/H3C/12 -https://github.com/Darry-lang1/vuln/tree/main/H3C/2 -https://github.com/Darry-lang1/vuln/tree/main/H3C/3 -https://github.com/Darry-lang1/vuln/tree/main/H3C/4 -https://github.com/Darry-lang1/vuln/tree/main/H3C/5 -https://github.com/Darry-lang1/vuln/tree/main/H3C/6 -https://github.com/Darry-lang1/vuln/tree/main/H3C/7 -https://github.com/Darry-lang1/vuln/tree/main/H3C/8 -https://github.com/Darry-lang1/vuln/tree/main/H3C/9 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/1 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/10 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/11 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/12 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/13 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/14 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/15 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/16 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/17 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/18 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/19 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/2 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/3 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/4 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/5 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/9 -https://github.com/Darry-lang1/vuln/tree/main/H3C/GR2200/1 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/1 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/10 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/11 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/13 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/14 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/15 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/16 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/2 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/3 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/4 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/6 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/7 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/8 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/9 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/2/readme.md -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/3/readme.md -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/5/readme.md -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/1 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/10 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/11 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/12 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/13 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/14 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/15 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/16 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/17 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/18 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/19 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/2 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/20 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/3 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/4 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/6 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/7 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/8 -https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/9 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/1 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/10 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/2 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/4 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/7 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/8 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/9 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A720R/1 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/1 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/2 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/3 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/4 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/5 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/6 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/8 -https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/9 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/1 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/10 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/11 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/13 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/14 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/15 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/16 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/17 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/18 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/19 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/2 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/4 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/6 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/7 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/8 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/9 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/1 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/2 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/4 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/5 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/6 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/7 -https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/8 -https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v -https://github.com/DaveGamble/cJSON/issues/30 -https://github.com/DaveGamble/cJSON/issues/803 -https://github.com/DaveGamble/cJSON/issues/839 -https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py -https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff -https://github.com/DelspoN/CVE/tree/master/CVE-2018-18695 -https://github.com/DelspoN/CVE/tree/master/CVE-2019-18929 -https://github.com/DelspoN/CVE/tree/master/CVE-2019-18930 -https://github.com/DelspoN/CVE/tree/master/CVE-2019-18931 -https://github.com/Deng-JunFeng/cve-lists/tree/main/novel-plus/vuln -https://github.com/DengyigeFeng/vuln/issues/1 -https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System -https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC -https://github.com/DisguisedRoot/Exploit/blob/main/SQLInj/POC -https://github.com/Dmitriy-area51/Exploit/tree/master/CVE-2020-24038 -https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure -https://github.com/Dogfalo/materialize/issues/6286 -https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-mrcw-j96f-p6v6 -https://github.com/DojoSecurity/BMC-Control-M-Unauthenticated-SQL-Injection -https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection -https://github.com/Dolibarr/dolibarr/issues/20237 -https://github.com/Dolibarr/dolibarr/issues/2857 -https://github.com/Dolibarr/dolibarr/issues/4341 -https://github.com/Dolibarr/dolibarr/issues/8000 -https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-7947-48q7-cp5m -https://github.com/DonnchaC/ubuntu-apport-exploitation -https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formAddSysLogRule/readme.md -https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetDiagnoseInfo/readme.md -https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSnmpInfo/readme.md -https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md -https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetUplinkInfo/readme.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceMac/addWifiMacFilter_derviceMac.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeedUp/formSetClientState_limitSpeed.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetDeviceName/formSetDeviceName.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetFirewallCfg/formSetFirewallCfg.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetMacFilterCfg/formSetMacFilterCfg.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_endIp/formSetPPTPServer_endIp.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_ssid/form_fast_setting_wifi_set_ssid.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_timeZone/form_fast_setting_wifi_set_timeZone.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetIpMacBind/fromSetIpMacBind.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetSysTime/fromSetSysTime.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetWirelessRepeat/fromSetWirelessRepeat.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedEndTime/setSchedWifi_schedEndTime.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedStartTime/setSchedWifi_schedStartTime.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSmartPowerManagement/setSmartPowerManagement.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6v1.0_vuln/Tenda%20AC6V1.0%20V15.03.05.19%20Stack%20overflow%20vulnerability.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/GetParentControlInfo/GetParentControlInfo.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceMac/addWifiMacFilter_deviceMac.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeedUp/formSetClientState_limitSpeedUp.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/form_fast_setting_wifi_set/form_fast_setting_wifi_set.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_page/fromAddressNat_page.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetCfm/formWifiMacFilterSet.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWifiMacFilterSet/formWifiMacFilterSet.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDget/formWifiMacFilterGet.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolReboot/fromSysToolReboot.md -https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md -https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md -https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md -https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation -https://github.com/Doufox/Doufox/issues/7 -https://github.com/DownWithUp/CVE-2018-15499 -https://github.com/DozerMapper/dozer/issues/217 -https://github.com/DreyAnd/maian-cart-rce -https://github.com/DriverUnload/cve-2024-25423 -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12401-XML%20Bomb-Apache%20Solr -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12409-RCE%20Vulnerability%20Due%20to%20Bad%20Defalut%20Config-Apache%20Solr -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-1332-Cross-Site%20Scripting-Microsoft%20SQL%20Server%20Reporting%20Services -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14678-Unsafe%20XML%20Parsing-SAS%20XML%20Mapper -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-7656-PrivEscal-Wowza -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14021-Arbitrary%20File%20Read-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14022-Dangerous%20File%20Upload-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14023-Server%20Side%20Request%20Forgery-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14024-Multiple%20XSS-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14025-Cross-Site%20Request%20Forgery-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14026-Formula%20Injection-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14027-MySQL%20LOAD%20DATA%20LOCAL%20INFILE%20Attack-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14028-Arbitary%20File%20Write-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14031-Arbitary%20File%20Delete-Ozeki%20SMS%20Gateway -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42560-Unsafe%20XML%20Parsing-MITRE%20Caldera -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42561-Command%20Injection%20Via%20the%20Human%20Plugin-MITRE%20Caldera -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42562-Improper%20Access%20Control-MITRE%20Caldera -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46362-Unauthenticated%20SSTI-Magnolia%20CMS -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364-YAML%20Deserialization-Magnolia%20CMS -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS -https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS -https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md -https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp -https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/Modbus%20Slave%20(version%207.5.1%20and%20earlier)%20mbs%20file%20has%20a%20buffer%20overflow%20vulnerability.md -https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/poc/poc.mbs -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32393.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32394.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32395.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32396.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32397.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32398.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32399.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32401.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32402.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32404.md -https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32405.md -https://github.com/E1tex/CVE-2023-48104 -https://github.com/ELIZEUOPAIN/CVE-2024-24034/tree/main -https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293 -https://github.com/EQSTLab/PoC/tree/main/2024/RCE/CVE-2024-22891 -https://github.com/EQSTLab/PoC/tree/main/2024/XSS/CVE-2024-25503 -https://github.com/EagleTube/CloudPanel -https://github.com/Echox1/metinfo_csrf/issues/1 -https://github.com/Edgarloyola/CVE-2021-36563 -https://github.com/Edgarloyola/CVE-2021-40904 -https://github.com/Edgarloyola/CVE-2021-40906 -https://github.com/Edubr2020/RP_DCP_Code_Exec -https://github.com/Edubr2020/RP_Import_RCE -https://github.com/Edubr2020/RealPlayer_G2_RCE -https://github.com/Edward-L/fuzzing-pocs/tree/master/liblouis -https://github.com/Edward-L/fuzzing-pocs/tree/master/md4c -https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib -https://github.com/ElberTavares/routers-exploit/tree/master/tp-link -https://github.com/Elias-Black/Landing-CMS/issues/8 -https://github.com/Elvin9/NotSecDrv/blob/master/README.md -https://github.com/Elvin9/SecDrvPoolLeak/blob/master/README.md -https://github.com/Emilytutu/IoT-vulnerable/blob/main/Tenda/AC18/setSchedWifi_end.md -https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Reflected-XSS -https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability -https://github.com/EmreOvunc/FileRun-Vulnerabilities/ -https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 -https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability -https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting -https://github.com/EmreOvunc/Nagios-XI-Reflected-XSS -https://github.com/EmreOvunc/OpenEMR_Vulnerabilities -https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection -https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/ -https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/ -https://github.com/Erebua/CVE/blob/main/Edimax.md -https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/2/Readme.md -https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/3/Readme.md -https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/4/Readme.md -https://github.com/Ers4tz/vuln/blob/master/74cms_5.2.8_SQLI.md -https://github.com/Ers4tz/vuln/blob/master/qibosoft/qibosoft_v7_remote_code_execution.md -https://github.com/Ettercap/ettercap/issues/782 -https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p -https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8 -https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5 -https://github.com/Exiv2/exiv2/issues/1011 -https://github.com/Exiv2/exiv2/issues/1019 -https://github.com/Exiv2/exiv2/issues/187 -https://github.com/Exiv2/exiv2/issues/188 -https://github.com/Exiv2/exiv2/issues/202 -https://github.com/Exiv2/exiv2/issues/216 -https://github.com/Exiv2/exiv2/issues/246 -https://github.com/Exiv2/exiv2/issues/247 -https://github.com/Exiv2/exiv2/issues/262 -https://github.com/Exiv2/exiv2/issues/263 -https://github.com/Exiv2/exiv2/issues/302 -https://github.com/Exiv2/exiv2/issues/303 -https://github.com/Exiv2/exiv2/issues/306 -https://github.com/Exiv2/exiv2/issues/307 -https://github.com/Exiv2/exiv2/issues/365 -https://github.com/Exiv2/exiv2/issues/366 -https://github.com/Exiv2/exiv2/issues/378 -https://github.com/Exiv2/exiv2/issues/400 -https://github.com/Exiv2/exiv2/issues/428 -https://github.com/Exiv2/exiv2/issues/457 -https://github.com/Exiv2/exiv2/issues/460 -https://github.com/Exiv2/exiv2/issues/511 -https://github.com/Exiv2/exiv2/issues/561 -https://github.com/Exiv2/exiv2/issues/590 -https://github.com/Exiv2/exiv2/issues/711 -https://github.com/Exiv2/exiv2/issues/712 -https://github.com/Exiv2/exiv2/issues/741 -https://github.com/Exiv2/exiv2/issues/742 -https://github.com/Exiv2/exiv2/issues/756 -https://github.com/Exiv2/exiv2/issues/759 -https://github.com/Exiv2/exiv2/issues/760 -https://github.com/Exiv2/exiv2/issues/789 -https://github.com/Exiv2/exiv2/issues/790 -https://github.com/Exiv2/exiv2/issues/791 -https://github.com/Exiv2/exiv2/issues/828 -https://github.com/Exiv2/exiv2/issues/841 -https://github.com/Exiv2/exiv2/issues/843 -https://github.com/Exiv2/exiv2/issues/845 -https://github.com/Exiv2/exiv2/issues/952 -https://github.com/Exiv2/exiv2/issues/953 -https://github.com/Exiv2/exiv2/issues/954 -https://github.com/Exiv2/exiv2/issues/960 -https://github.com/Exiv2/exiv2/issues/980 -https://github.com/Exiv2/exiv2/pull/1536 -https://github.com/Exiv2/exiv2/pull/1627 -https://github.com/Exiv2/exiv2/pull/1657 -https://github.com/Exiv2/exiv2/pull/1790 -https://github.com/Exiv2/exiv2/pull/518 -https://github.com/Exiv2/exiv2/security/policy -https://github.com/Exopteron/BiblioRCE -https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc -https://github.com/F0und-icu/CVEIDs/tree/main/TendaAC9 -https://github.com/F0und-icu/TempName/tree/main/Dlink-823pro -https://github.com/F0und-icu/TempName/tree/main/TendaAX18 -https://github.com/FCncdn/Appsmith-Js-Injection-POC -https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md -https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048 -https://github.com/FFmpeg/FFmpeg/commit/22aa37c0fedf14531783189a197542a055959b6c -https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92 -https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 -https://github.com/FFmpeg/FFmpeg/commit/54655623a82632e7624714d7b2a3e039dc5faa7e -https://github.com/FFmpeg/FFmpeg/commit/96349da5ec8eda9f0368446e557fe0c8ba0e66b7 -https://github.com/FFmpeg/FFmpeg/commit/9ccc633068c6fe76989f487c8932bd11886ad65b -https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 -https://github.com/FFmpeg/FFmpeg/commit/ba4beaf6149f7241c8bd85fe853318c2f6837ad0 -https://github.com/FFmpeg/FFmpeg/commit/c42a1388a6d1bfd8001bf6a4241d8ca27e49326d -https://github.com/FFmpeg/FFmpeg/commit/e724bd1dd9efea3abb8586d6644ec07694afceae -https://github.com/FFmpeg/FFmpeg/commit/f31fc4755f69ab26bf6e8be47875b7dcede8e29e -https://github.com/FGasper/p5-Crypt-Perl/issues/14 -https://github.com/FLIF-hub/FLIF/issues/501 -https://github.com/FLIF-hub/FLIF/issues/503 -https://github.com/FLIF-hub/FLIF/issues/541 -https://github.com/FRRouting/frr/issues/11698 -https://github.com/FRRouting/frr/issues/13098 -https://github.com/FRRouting/frr/issues/13099 -https://github.com/Fanli2012/nbnbk/issues/5 -https://github.com/FasterXML/jackson-databind/issues/2462 -https://github.com/FasterXML/jackson-databind/issues/3972 -https://github.com/FeMiner/wms/issues/12 -https://github.com/FeMiner/wms/issues/14 -https://github.com/FedericoHeichou/DSL-N14U-XSS -https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md -https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py -https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromNatStaticSetting/report.md -https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromP2pListFilter/report.md -https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromRouteStatic/report.md -https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeMacFilter/report.md -https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromqossetting/report.md -https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/saveParentControlInfo -https://github.com/FirstLIF/cms/blob/main/1.md -https://github.com/FirstLIF/cms/blob/main/2.md -https://github.com/Fishkey1/cms/commit/e9d294951ab2dd85709f1d12ad4747f25d326b1b -https://github.com/FiyoCMS/FiyoCMS/issues/10 -https://github.com/FiyoCMS/FiyoCMS/issues/11 -https://github.com/FiyoCMS/FiyoCMS/issues/7 -https://github.com/FiyoCMS/FiyoCMS/issues/9 -https://github.com/FlameNET/FlameCMS/issues/26 -https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c -https://github.com/FlaviuPopescu/CVE-2022-28986 -https://github.com/FlaviuPopescu/Spigit-PoC -https://github.com/Fluorohydride/ygopro/issues/2314 -https://github.com/Foddy/node-red-contrib-huemagic/issues/217 -https://github.com/Fovker8/cve/blob/main/rce.md -https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc/covid-19-vaccination.md -https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md -https://github.com/FredrikNoren/ungit/pull/1510 -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6 -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59 -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj -https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2 -https://github.com/FreeTAKTeam/UI/issues/27 -https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8vvv-jxg6-8578 -https://github.com/FreySolarEye/CVE/blob/master/Battle%20Net%20Launcher%20Local%20Privilege%20Escalation -https://github.com/FreySolarEye/CVE/blob/master/Guild%20Wars%202%20-%20Local%20Privilege%20Escalation -https://github.com/FreySolarEye/CVE/blob/master/Mara%20CMS%207.5%20-%20Cross%20Site%20Scripting -https://github.com/Frichetten/CVE-2019-5736-PoC -https://github.com/Frichetten/CVE-2020-11108-PoC -https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-pv9j-c53q-h433 -https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r -https://github.com/FrontAccountingERP/FA/issues/37 -https://github.com/FrontAccountingERP/FA/issues/38 -https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104 -https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_1 -https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2 -https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/AC6/205_1 -https://github.com/Future-Depth/IMS/issues/1 -https://github.com/Future-Depth/IMS/issues/2 -https://github.com/Fysac/CVE-2019-20326 -https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-36193/POC.md -https://github.com/G37SYS73M/CVE-2023-27742 -https://github.com/GAO-UNO/cve/blob/main/sql.md -https://github.com/GAO-UNO/cve/blob/main/sql2.md -https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md -https://github.com/GD008/TENDA/blob/main/M3/cookie/M3_cookie.md -https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md -https://github.com/GD008/TENDA/blob/main/M3/getWeiXinConfig/M3_getWeiXinConfig.md -https://github.com/GD008/TENDA/blob/main/M3/setVlanInfo/M3_setVlanInfo.md -https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md -https://github.com/GD008/TENDA/blob/main/M3/upgrade/M3_upgrade.md -https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md -https://github.com/GD008/TENDA/blob/main/W9/W9_execommand/W9_execommand.md -https://github.com/GD008/TENDA/blob/main/W9/W9_getDiagnoseInfo/W9_getDiagnoseInfo.md -https://github.com/GD008/TENDA/blob/main/W9/W9_setAutoPing/W9_setAutoPing.md -https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md -https://github.com/GD008/TENDA/blob/main/W9/W9_setUplinkInfo/W9_setUplinkInfo.md -https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md -https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md -https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md -https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setIPv6Status/w30e_setIPv6Status.md -https://github.com/GENIVI/dlt-daemon/issues/274 -https://github.com/GUIqizsq/cve/blob/main/upload_1.md -https://github.com/GURJOTEXPERT/ritecms -https://github.com/Galapag0s/Trendnet_TW100-S4W1CA/blob/main/writeup_XSS.txt -https://github.com/Gallopsled/pwntools/issues/1427 -https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8 -https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1293 -https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1295 -https://github.com/Geta/NestedObjectAssign/pull/11 -https://github.com/Ghostfox2003/cms/blob/main/1.md -https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1 -https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1 -https://github.com/GilaCMS/gila/issues/51 -https://github.com/GilaCMS/gila/issues/52 -https://github.com/GilaCMS/gila/issues/57 -https://github.com/GitHaaH/issue/blob/master/Niushop.md -https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md -https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3 -https://github.com/Gnoxter/mountain_goat -https://github.com/GodEpic/JuQingCMS/issues/1 -https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/FeiFeiCMS_4.1_csrf.doc -https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/poc -https://github.com/GodEpic/chaojicms/issues/3 -https://github.com/GodEpic/chaojicms/issues/5 -https://github.com/GodEpic/chaojicms/issues/6 -https://github.com/Godfather-onec/cve/blob/main/sql.md -https://github.com/Gr-1m/cms/blob/main/1.md -https://github.com/Gr-1m/cms/blob/main/2.md -https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3fqm-frhg-7c85 -https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3 -https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-p6gg-5hf4-4rgj -https://github.com/GreenCMS/GreenCMS/issues/110 -https://github.com/GreenCMS/GreenCMS/issues/114 -https://github.com/GreenCMS/GreenCMS/issues/115 -https://github.com/GreycLab/CImg/issues/343 -https://github.com/GreycLab/CImg/issues/403 -https://github.com/GuillaumePetit84/CVE-2020-35488 -https://github.com/HDFGroup/hdf5/issues/1326 -https://github.com/HDFGroup/hdf5/issues/1327 -https://github.com/HDFGroup/hdf5/issues/2458 -https://github.com/HF9/yxcms-code-audit/blob/master/Any%20PHP%20Code%20Execution -https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability/blob/main/README.md -https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md -https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2015-9101 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10269 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-9560 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-15045 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-12900 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-18557 -https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-6381 -https://github.com/HackAllSec/CVEs/tree/main/Jan%20AFR%20vulnerability -https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability -https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md -https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE -https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md -https://github.com/Hagrid29/ForeScout-SecureConnector-EoP -https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC -https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20ci%20parameter%20is%20injected.pdf -https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20cityedit%20parameter%20is%20injected.pdf -https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20sc%20parameter%20is%20injected.pdf -https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20searccity%20parameter%20is%20injected.pdf -https://github.com/HaojianWang/cve/issues/1 -https://github.com/HaschekSolutions/pictshare/issues/133 -https://github.com/Hckwzh/cms/blob/main/12.md -https://github.com/Hckwzh/cms/blob/main/13.md -https://github.com/Hckwzh/cms/blob/main/14.md -https://github.com/Hckwzh/cms/blob/main/15.md -https://github.com/Hckwzh/cms/blob/main/16.md -https://github.com/Hckwzh/cms/blob/main/17.md -https://github.com/Hckwzh/cms/blob/main/18.md -https://github.com/Hckwzh/cms/blob/main/19.md -https://github.com/Hckwzh/cms/blob/main/20.md -https://github.com/Hckwzh/cms/blob/main/21.md -https://github.com/Hckwzh/cms/blob/main/22.md -https://github.com/Hckwzh/cms/blob/main/23.md -https://github.com/Hckwzh/cms/blob/main/24.md -https://github.com/Hckwzh/cms/blob/main/25.md -https://github.com/Hebing123/cve/issues/13 -https://github.com/Hebing123/cve/issues/14 -https://github.com/Hebing123/cve/issues/16 -https://github.com/Hebing123/cve/issues/17 -https://github.com/Hebing123/cve/issues/18 -https://github.com/Hebing123/cve/issues/2 -https://github.com/Hebing123/cve/issues/28 -https://github.com/Hebing123/cve/issues/29 -https://github.com/Hebing123/cve/issues/30 -https://github.com/Hebing123/cve/issues/37 -https://github.com/Hefei-Coffee/cve/blob/main/csrf.md -https://github.com/Hefei-Coffee/cve/blob/main/sql.md -https://github.com/Hefei-Coffee/cve/blob/main/sql2.md -https://github.com/Hefei-Coffee/cve/blob/main/sql3.md -https://github.com/Hefei-Coffee/cve/blob/main/sql5.md -https://github.com/Hefei-Coffee/cve/blob/main/sql6.md -https://github.com/Hefei-Coffee/cve/blob/main/sql7.md -https://github.com/Hefei-Coffee/cve/blob/main/sql8.md -https://github.com/Hefei-Coffee/cve/blob/main/upload.md -https://github.com/Hefei-Coffee/cve/blob/main/upload2.md -https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.assets/debug-coredump.png -https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.md -https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/poc/I1DWE0~U -https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png -https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.md -https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/poc/I7K9QM~F -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5 -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png -https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md -https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata -https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata/poc -https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted -https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted/poc -https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1 -https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc -https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1 -https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2 -https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1 -https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc -https://github.com/HerrLeStrate/CVE-2022-44276-PoC -https://github.com/HolaAsuka/CVE/issues/1 -https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v -https://github.com/HouqiyuA/k8s-rbac-poc -https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7 -https://github.com/HuangPayoung/CVE-request/tree/main/DLink/vuln2 -https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35193 -https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35194 -https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35196 -https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw -https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg -https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r -https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r -https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x -https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS -https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS -https://github.com/I-Schnee-I/cev/blob/main/D-LINK-DAR-8000-10_rce_importhtml.md -https://github.com/I-Schnee-I/cev/blob/main/SourceCodester%20Student%20Management%20System%201.0%20controller.php%20Unrestricted%20Upload.md -https://github.com/I-Schnee-I/cev/blob/main/upload.md -https://github.com/IAIK/wolfSSL-DoS -https://github.com/IBAX-io/go-ibax/issues/2060 -https://github.com/IBAX-io/go-ibax/issues/2061 -https://github.com/IBAX-io/go-ibax/issues/2062 -https://github.com/IBAX-io/go-ibax/issues/2063 -https://github.com/INTER-Mediator/INTER-Mediator/issues/772 -https://github.com/ISCAS-Vulab/PoC_Nebula-Capsule-Pro-Wifi -https://github.com/IbrahimEkimIsik/CVE-2022-28099/blob/main/SQL%20Injection%20For%20Poultry%20Farm%20Management%20system%201.0 -https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm -https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c -https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p -https://github.com/Ickarah/CVE-2019-25137-Version-Research -https://github.com/Icycu123/X6000R-AX3000-Wifi-6-Giga/blob/main/2/X6000R%20AX3000%20WiFi%206%20Giga%E7%84%A1%E7%B7%9A%E8%B7%AF%E7%94%B1%E5%99%A8%E6%9C%AA%E6%8E%88%E6%9D%83rce.md -https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2 -https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0 -https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1 -https://github.com/ImageMagick/ImageMagick/issues/1009 -https://github.com/ImageMagick/ImageMagick/issues/1020 -https://github.com/ImageMagick/ImageMagick/issues/1025 -https://github.com/ImageMagick/ImageMagick/issues/1072 -https://github.com/ImageMagick/ImageMagick/issues/1095 -https://github.com/ImageMagick/ImageMagick/issues/1149 -https://github.com/ImageMagick/ImageMagick/issues/1156 -https://github.com/ImageMagick/ImageMagick/issues/1177 -https://github.com/ImageMagick/ImageMagick/issues/1178 -https://github.com/ImageMagick/ImageMagick/issues/1221 -https://github.com/ImageMagick/ImageMagick/issues/1249 -https://github.com/ImageMagick/ImageMagick/issues/1250 -https://github.com/ImageMagick/ImageMagick/issues/1251 -https://github.com/ImageMagick/ImageMagick/issues/1255 -https://github.com/ImageMagick/ImageMagick/issues/1335 -https://github.com/ImageMagick/ImageMagick/issues/1336 -https://github.com/ImageMagick/ImageMagick/issues/1337 -https://github.com/ImageMagick/ImageMagick/issues/1523 -https://github.com/ImageMagick/ImageMagick/issues/1532 -https://github.com/ImageMagick/ImageMagick/issues/1533 -https://github.com/ImageMagick/ImageMagick/issues/1540 -https://github.com/ImageMagick/ImageMagick/issues/1554 -https://github.com/ImageMagick/ImageMagick/issues/1555 -https://github.com/ImageMagick/ImageMagick/issues/1561 -https://github.com/ImageMagick/ImageMagick/issues/1562 -https://github.com/ImageMagick/ImageMagick/issues/1610 -https://github.com/ImageMagick/ImageMagick/issues/1641 -https://github.com/ImageMagick/ImageMagick/issues/1723 -https://github.com/ImageMagick/ImageMagick/issues/1723#issuecomment-718275153 -https://github.com/ImageMagick/ImageMagick/issues/1791 -https://github.com/ImageMagick/ImageMagick/issues/1859 -https://github.com/ImageMagick/ImageMagick/issues/1895 -https://github.com/ImageMagick/ImageMagick/issues/2624 -https://github.com/ImageMagick/ImageMagick/issues/298 -https://github.com/ImageMagick/ImageMagick/issues/347 -https://github.com/ImageMagick/ImageMagick/issues/348 -https://github.com/ImageMagick/ImageMagick/issues/350 -https://github.com/ImageMagick/ImageMagick/issues/354 -https://github.com/ImageMagick/ImageMagick/issues/3540 -https://github.com/ImageMagick/ImageMagick/issues/362 -https://github.com/ImageMagick/ImageMagick/issues/4446 -https://github.com/ImageMagick/ImageMagick/issues/466 -https://github.com/ImageMagick/ImageMagick/issues/467 -https://github.com/ImageMagick/ImageMagick/issues/469 -https://github.com/ImageMagick/ImageMagick/issues/471 -https://github.com/ImageMagick/ImageMagick/issues/472 -https://github.com/ImageMagick/ImageMagick/issues/4729 -https://github.com/ImageMagick/ImageMagick/issues/4974 -https://github.com/ImageMagick/ImageMagick/issues/4988 -https://github.com/ImageMagick/ImageMagick/issues/517 -https://github.com/ImageMagick/ImageMagick/issues/518 -https://github.com/ImageMagick/ImageMagick/issues/519 -https://github.com/ImageMagick/ImageMagick/issues/522 -https://github.com/ImageMagick/ImageMagick/issues/523 -https://github.com/ImageMagick/ImageMagick/issues/524 -https://github.com/ImageMagick/ImageMagick/issues/525 -https://github.com/ImageMagick/ImageMagick/issues/526 -https://github.com/ImageMagick/ImageMagick/issues/527 -https://github.com/ImageMagick/ImageMagick/issues/528 -https://github.com/ImageMagick/ImageMagick/issues/533 -https://github.com/ImageMagick/ImageMagick/issues/535 -https://github.com/ImageMagick/ImageMagick/issues/537 -https://github.com/ImageMagick/ImageMagick/issues/539 -https://github.com/ImageMagick/ImageMagick/issues/542 -https://github.com/ImageMagick/ImageMagick/issues/549 -https://github.com/ImageMagick/ImageMagick/issues/550 -https://github.com/ImageMagick/ImageMagick/issues/551 -https://github.com/ImageMagick/ImageMagick/issues/552 -https://github.com/ImageMagick/ImageMagick/issues/553 -https://github.com/ImageMagick/ImageMagick/issues/560 -https://github.com/ImageMagick/ImageMagick/issues/561 -https://github.com/ImageMagick/ImageMagick/issues/562 -https://github.com/ImageMagick/ImageMagick/issues/563 -https://github.com/ImageMagick/ImageMagick/issues/564 -https://github.com/ImageMagick/ImageMagick/issues/566 -https://github.com/ImageMagick/ImageMagick/issues/567 -https://github.com/ImageMagick/ImageMagick/issues/569 -https://github.com/ImageMagick/ImageMagick/issues/571 -https://github.com/ImageMagick/ImageMagick/issues/572 -https://github.com/ImageMagick/ImageMagick/issues/573 -https://github.com/ImageMagick/ImageMagick/issues/574 -https://github.com/ImageMagick/ImageMagick/issues/575 -https://github.com/ImageMagick/ImageMagick/issues/576 -https://github.com/ImageMagick/ImageMagick/issues/577 -https://github.com/ImageMagick/ImageMagick/issues/578 -https://github.com/ImageMagick/ImageMagick/issues/581 -https://github.com/ImageMagick/ImageMagick/issues/582 -https://github.com/ImageMagick/ImageMagick/issues/584 -https://github.com/ImageMagick/ImageMagick/issues/586 -https://github.com/ImageMagick/ImageMagick/issues/587 -https://github.com/ImageMagick/ImageMagick/issues/588 -https://github.com/ImageMagick/ImageMagick/issues/591 -https://github.com/ImageMagick/ImageMagick/issues/624 -https://github.com/ImageMagick/ImageMagick/issues/628 -https://github.com/ImageMagick/ImageMagick/issues/629 -https://github.com/ImageMagick/ImageMagick/issues/631 -https://github.com/ImageMagick/ImageMagick/issues/632 -https://github.com/ImageMagick/ImageMagick/issues/633 -https://github.com/ImageMagick/ImageMagick/issues/6338 -https://github.com/ImageMagick/ImageMagick/issues/6339 -https://github.com/ImageMagick/ImageMagick/issues/634 -https://github.com/ImageMagick/ImageMagick/issues/6341 -https://github.com/ImageMagick/ImageMagick/issues/636 -https://github.com/ImageMagick/ImageMagick/issues/639 -https://github.com/ImageMagick/ImageMagick/issues/643 -https://github.com/ImageMagick/ImageMagick/issues/648 -https://github.com/ImageMagick/ImageMagick/issues/649 -https://github.com/ImageMagick/ImageMagick/issues/650 -https://github.com/ImageMagick/ImageMagick/issues/652 -https://github.com/ImageMagick/ImageMagick/issues/653 -https://github.com/ImageMagick/ImageMagick/issues/654 -https://github.com/ImageMagick/ImageMagick/issues/656 -https://github.com/ImageMagick/ImageMagick/issues/659 -https://github.com/ImageMagick/ImageMagick/issues/660 -https://github.com/ImageMagick/ImageMagick/issues/664 -https://github.com/ImageMagick/ImageMagick/issues/682 -https://github.com/ImageMagick/ImageMagick/issues/708 -https://github.com/ImageMagick/ImageMagick/issues/712 -https://github.com/ImageMagick/ImageMagick/issues/713 -https://github.com/ImageMagick/ImageMagick/issues/714 -https://github.com/ImageMagick/ImageMagick/issues/715 -https://github.com/ImageMagick/ImageMagick/issues/717 -https://github.com/ImageMagick/ImageMagick/issues/739 -https://github.com/ImageMagick/ImageMagick/issues/740 -https://github.com/ImageMagick/ImageMagick/issues/741 -https://github.com/ImageMagick/ImageMagick/issues/746 -https://github.com/ImageMagick/ImageMagick/issues/770 -https://github.com/ImageMagick/ImageMagick/issues/869 -https://github.com/ImageMagick/ImageMagick/issues/870 -https://github.com/ImageMagick/ImageMagick/issues/904 -https://github.com/ImageMagick/ImageMagick/issues/920 -https://github.com/ImageMagick/ImageMagick/issues/921 -https://github.com/ImageMagick/ImageMagick/issues/927 -https://github.com/ImageMagick/ImageMagick/issues/928 -https://github.com/ImageMagick/ImageMagick/issues/929 -https://github.com/ImageMagick/ImageMagick/issues/941 -https://github.com/ImageMagick/ImageMagick/issues/973 -https://github.com/ImageMagick/ImageMagick/issues/998 -https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr -https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750 -https://github.com/ImaizumiYui/bug_report/blob/main/vendors/oretnom23/Human%20Resource%20Management%20System/XSS-1.md -https://github.com/Indexhibit/indexhibit/issues/17 -https://github.com/Indexhibit/indexhibit/issues/18 -https://github.com/Indexhibit/indexhibit/issues/19 -https://github.com/Indexhibit/indexhibit/issues/21 -https://github.com/Indexhibit/indexhibit/issues/22 -https://github.com/InductiveComputerScience/pbJson/issues/2 -https://github.com/InitRoot/CVE-2022-23342 -https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp -https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp -https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfv -https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 -https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 -https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58 -https://github.com/Iolop/Poc/tree/master/Router/Tenda -https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20%20aubio_source_avcodec_readframe%20of%20aubio.md -https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20swri_audio_convert%20of%20ffmpeg%20libswresample.md -https://github.com/J3rryBl4nks/CUPSEasyExploits -https://github.com/J3rryBl4nks/CandidATS/blob/master/AddAdminUserCSRF.md -https://github.com/J3rryBl4nks/GenixCMS/blob/master/CreateAdminBAC.md -https://github.com/J3rryBl4nks/IceHRM/blob/master/AddNewUserCSRF.md -https://github.com/J3rryBl4nks/IceHRM/blob/master/ChangeUserPasswordCSRF.md -https://github.com/J3rryBl4nks/PHPMyChatPlus/blob/master/SQLi.md -https://github.com/J3rryBl4nks/SOPlanning/blob/master/AddUserCSRF.md -https://github.com/J3rryBl4nks/SOPlanning/blob/master/AdminPasswordChangeCSRF.md -https://github.com/J3rryBl4nks/SOPlanning/blob/master/InjectionIcalShell.md -https://github.com/J3rryBl4nks/SchoolERPCSRF -https://github.com/J6451/CVE-2023-31726 -https://github.com/JAckLosingHeart/CVE-2023-46442_POC/tree/main -https://github.com/JBalanza/CVE-2022-44215 -https://github.com/JHHAX/CVE-2020-17453-PoC -https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-vpcc-9rh2-8jfp -https://github.com/JP1016/Markdown-Electron/issues/3 -https://github.com/JPeer264/node-git-commit-info/issues/24 -https://github.com/JackDoan/TP-Link-ArcherC5-RCE -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-http -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jikes -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/myserver.alexcthomas18 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sly07 -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt -https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/citypredict.whauwiller -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/datachannel-client -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fsk-server -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/rtcmulticonnection-client -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1 -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2 -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123 -https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver -https://github.com/Jacky-Y/vuls/blob/main/vul6.md -https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi -https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt -https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt -https://github.com/JameelNabbo/exploits/blob/master/nagiosxi%20username%20sql%20injection.txt -https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/AddProfileCSRFXSSPoc.html -https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFInternetDCPoC.html -https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFPocRedirectSMS.html -https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFPocResetDefaults.html -https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/uploadBinarySettingsCSRFPoC.html -https://github.com/Jas0nwhy/vulnerability/blob/master/Seacmsxss.md -https://github.com/JaxsonWang/WP-Editor.md/issues/275 -https://github.com/Jfox816/TOTOLINK-720R/blob/177ee39a5a8557a6bd19586731b0e624548b67ee/totolink%20720%20RCode%20Execution2.md -https://github.com/Jfox816/TOTOLINK-720R/blob/fb6ba109ba9c5bd1b0d8e22c88ee14bdc4a75e6b/TOTOLINK%20720%20RCode%20Execution.md -https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10262.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10263.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-8994.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33818.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33820.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33822.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33823.md -https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33824.md -https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md -https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png -https://github.com/JinYiTong/poc -https://github.com/JiuBanSec/CVE/blob/main/VictorCMS%20SQL.md -https://github.com/JojoCMS/Jojo-CMS/issues/30 -https://github.com/JunFengDeng/Cve-List/blob/main/novel-plus/20231027/vuln/readme.md -https://github.com/Juniper/libslax/issues/50 -https://github.com/Juniper/libslax/issues/51 -https://github.com/Juniper/libslax/issues/52 -https://github.com/Juniper/libslax/issues/53 -https://github.com/Juunan06/eCommerce/issues/1 -https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT -https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-0833 -https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574 -https://github.com/KPN-CISO/CVE-2019-9745/blob/master/README.md -https://github.com/KakeruJ/CVE/ -https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/1 -https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/2 -https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3 -https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2 -https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3 -https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/4 -https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/5 -https://github.com/Kenun99/CVE-batdappboomx -https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS/blob/main/README.md -https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180122 -https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180129 -https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md -https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md -https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md -https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc -https://github.com/Kitesky/KiteCMS/issues/1 -https://github.com/Kitesky/KiteCMS/issues/10 -https://github.com/Kitesky/KiteCMS/issues/3 -https://github.com/Kitsun3Sec/exploits/blob/master/cms/ovidentia/exploitSQLIOvidentia.txt -https://github.com/Kitsun3Sec/exploits/blob/master/cms/ovidentia/exploitXSSOvidentia.txt -https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/256 -https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 -https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p -https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc -https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj -https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc -https://github.com/Kotti/Kotti/issues/551 -https://github.com/Kubozz/rukovoditel-3.2.1/issues/2 -https://github.com/Kyhvedn/CVE_Description/blob/master/CVE-2018-7720_Description.md -https://github.com/Kyhvedn/CVE_Description/blob/master/Cobub_Razor_0.8.0_SQL_injection_description.md -https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_a.md -https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_b.md -https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md -https://github.com/L1OudFd8cl09/CVE/issues/1 -https://github.com/L1OudFd8cl09/CVE/issues/2 -https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md -https://github.com/LDAPAccountManager/lam/issues/170 -https://github.com/LLK/scratch-vm/pull/2476 -https://github.com/LMP88959/NTSC-CRT/issues/32 -https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md -https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 -https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 -https://github.com/Le1a/CVE-2022-30040 -https://github.com/Le1a/Tenda-AX1803-Denial-of-service -https://github.com/Leeyangee/leeya_bug/blob/main/%5BWarning%5DSQL%20Injection%20in%20abupy%20%3C=%20v0.4.0.md -https://github.com/Legrandin/pycryptodome/issues/198 -https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944 -https://github.com/LiAoRJ/CVE_Hunter/blob/main/RCE-1.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47028/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29725/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29737/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29739/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29740/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29745/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29747/CVE%20detail.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29749/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29751/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29752/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29757/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29758/CVE%20detailed.md -https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29767/CVE%20detailed.md -https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2022-47027/CVE%20detail.md -https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27645/CVE%20detail.md -https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md -https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27648/CVE%20detail.md -https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27652/CVE%20detail.md -https://github.com/LibRaw/LibRaw/issues/144 -https://github.com/LibRaw/LibRaw/issues/192 -https://github.com/LibRaw/LibRaw/issues/194 -https://github.com/LibRaw/LibRaw/issues/195 -https://github.com/LibRaw/LibRaw/issues/269 -https://github.com/LibRaw/LibRaw/issues/270 -https://github.com/LibRaw/LibRaw/issues/271 -https://github.com/LibRaw/LibRaw/issues/272 -https://github.com/LibRaw/LibRaw/issues/273 -https://github.com/LibRaw/LibRaw/issues/279 -https://github.com/LibRaw/LibRaw/issues/283 -https://github.com/LibRaw/LibRaw/issues/301 -https://github.com/LibRaw/LibRaw/issues/330 -https://github.com/LibRaw/LibRaw/issues/334 -https://github.com/LibRaw/LibRaw/issues/335 -https://github.com/LibRaw/LibRaw/issues/400 -https://github.com/LibRaw/LibRaw/issues/557 -https://github.com/LibVNC/libvncserver/pull/137 -https://github.com/LibreCAD/LibreCAD/issues/1462 -https://github.com/LibreCAD/LibreCAD/issues/1464 -https://github.com/LibreCAD/LibreCAD/issues/1468 -https://github.com/LibreCAD/LibreCAD/issues/1481 -https://github.com/LibreDWG/libredwg/issues/176 -https://github.com/LibreDWG/libredwg/issues/176#issue-541977765 -https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028 -https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060 -https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088 -https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172 -https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383 -https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 -https://github.com/LibreDWG/libredwg/issues/178 -https://github.com/LibreDWG/libredwg/issues/179#issue-544834443 -https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025 -https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 -https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120 -https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169 -https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190 -https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 -https://github.com/LibreDWG/libredwg/issues/182#issue-547887727 -https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 -https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901 -https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932 -https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890969 -https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053 -https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083 -https://github.com/LibreDWG/libredwg/issues/183 -https://github.com/LibreDWG/libredwg/issues/186 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492707 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492816 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493134 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493364 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493437 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493513 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493775 -https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857 -https://github.com/LibreDWG/libredwg/issues/190 -https://github.com/LibreDWG/libredwg/issues/248 -https://github.com/LibreDWG/libredwg/issues/251 -https://github.com/LibreDWG/libredwg/issues/252 -https://github.com/LibreDWG/libredwg/issues/255 -https://github.com/LibreDWG/libredwg/issues/256 -https://github.com/LibreDWG/libredwg/issues/258 -https://github.com/LibreDWG/libredwg/issues/261 -https://github.com/LibreDWG/libredwg/issues/262 -https://github.com/LibreDWG/libredwg/issues/32 -https://github.com/LibreDWG/libredwg/issues/324 -https://github.com/LibreDWG/libredwg/issues/325 -https://github.com/LibreDWG/libredwg/issues/33 -https://github.com/LibreDWG/libredwg/issues/350 -https://github.com/LibreDWG/libredwg/issues/351 -https://github.com/LibreDWG/libredwg/issues/484 -https://github.com/LibreDWG/libredwg/issues/487 -https://github.com/LibreDWG/libredwg/issues/488 -https://github.com/LibreDWG/libredwg/issues/489 -https://github.com/LibreDWG/libredwg/issues/490 -https://github.com/LibreDWG/libredwg/issues/492 -https://github.com/LibreDWG/libredwg/issues/493 -https://github.com/LibreDWG/libredwg/issues/494 -https://github.com/LibreDWG/libredwg/issues/497 -https://github.com/LibreDWG/libredwg/issues/524 -https://github.com/LibreDWG/libredwg/issues/615 -https://github.com/LibreDWG/libredwg/issues/677#BUG1 -https://github.com/LibreDWG/libredwg/issues/677#BUG2 -https://github.com/LibreDWG/libredwg/issues/681#BUG1 -https://github.com/LibreDWG/libredwg/issues/681#BUG2 -https://github.com/LibreHealthIO/lh-ehr/issues/1223 -https://github.com/Limesss/CVE-2023-36109/tree/main -https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md -https://github.com/LiodAir/images/blob/master/csrf.md -https://github.com/LiveHelperChat/livehelperchat/issues/2054 -https://github.com/Liyou-ZY/POC/issues/1 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln01 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln02 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln03 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln04 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln05 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln06 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln07 -https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln11 -https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated--upload-file-and-php-code-execution -https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated-ssrf -https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-276-orderby-sql-injection -https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-393-sql-injection -https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolcapphp-reflected-xss -https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolphp-line-35-second-order-sqli -https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewseventsphp-line-44-sql-injection -https://github.com/Lq0ne/CVE-2024-28715 -https://github.com/LuaJIT/LuaJIT/issues/601 -https://github.com/LuaJIT/LuaJIT/issues/603 -https://github.com/LuaJIT/LuaJIT/pull/526 -https://github.com/LucaBarile/CVE-2022-38604 -https://github.com/LucaBarile/CVE-2022-43293 -https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery -https://github.com/LucvanDonk/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability/wiki -https://github.com/LyLme/lylme_spage/issues/91 -https://github.com/LyLme/lylme_spage/issues/92 -https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md -https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md -https://github.com/Lyc-heng/routers/blob/main/routers/stack1.md -https://github.com/Lyc-heng/routers/blob/main/routers/stack2.md -https://github.com/Lyc-heng/routers/blob/main/routers/stack3.md -https://github.com/Lyc-heng/routers/blob/main/routers/stack4.md -https://github.com/Lyrebirds/Fast8690-exploit -https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md -https://github.com/M0NsTeRRR/CVE-2020-24033 -https://github.com/M0NsTeRRR/S3900-24T4S-CSRF-vulnerability -https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2020-12-07-ipeak-cms-sqli.md -https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md -https://github.com/MRdoulestar/CodeAnalyse/issues/2 -https://github.com/MacDownApp/macdown/issues/1050 -https://github.com/MacDownApp/macdown/issues/1076 -https://github.com/MacherCS/CVE_Evoh_Contract -https://github.com/Mad-robot/CVE-List/blob/master/Advanced%20Real%20Estate%20Script.md -https://github.com/MaherAzzouzi/CVE-2022-37703 -https://github.com/MaherAzzouzi/CVE-2022-37704 -https://github.com/MaherAzzouzi/CVE-2022-37705 -https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit -https://github.com/MailCleaner/MailCleaner/issues/53 -https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf -https://github.com/ManhNDd/CVE-2019-19203 -https://github.com/ManhNDd/CVE-2019-19204 -https://github.com/MarginResearch/FOISted -https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md -https://github.com/Martinzb/cve/blob/main/sql.md -https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip -https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip -https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929 -https://github.com/MateusTesser/CVE-2023-43284 -https://github.com/Matheus-Garbelini/esp32_esp8266_attacks -https://github.com/Matroska-Org/foundation-source/issues/24 -https://github.com/Matroska-Org/libebml/issues/74 -https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip -https://github.com/Matthias-Wandel/jhead/issues/15 -https://github.com/Matthias-Wandel/jhead/issues/16 -https://github.com/Matthias-Wandel/jhead/issues/17 -https://github.com/Matthias-Wandel/jhead/issues/33 -https://github.com/Matthias-Wandel/jhead/issues/36 -https://github.com/Matthias-Wandel/jhead/issues/7 -https://github.com/Matthias-Wandel/jhead/issues/84 -https://github.com/MauroEldritch/VanCleef -https://github.com/MauroEldritch/lempo -https://github.com/MegaTKC/AeroCMS/issues/11 -https://github.com/MegaTKC/AeroCMS/issues/3 -https://github.com/Meizhi-hua/cve/blob/main/upload_file.md -https://github.com/Mesh3l911/CVE-2021-31760 -https://github.com/Mesh3l911/CVE-2021-31761 -https://github.com/Mesh3l911/CVE-2021-31762 -https://github.com/Mesh3l911/CVE-2021-32156 -https://github.com/Mesh3l911/CVE-2021-32157 -https://github.com/Mesh3l911/CVE-2021-32158 -https://github.com/Mesh3l911/CVE-2021-32159 -https://github.com/Mesh3l911/CVE-2021-32160 -https://github.com/Mesh3l911/CVE-2021-32161 -https://github.com/Mesh3l911/CVE-2021-32162 -https://github.com/Mesh3l911/Disource -https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md -https://github.com/Mindwerks/wildmidi/issues/178 -https://github.com/MinoTauro2020/CVE-2023-43147/ -https://github.com/Mint60/PHP/issues/1 -https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-xmj6-g32r-fc5q -https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m -https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166 -https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-wfgj-wrgh-h3r3 -https://github.com/MobiusBinary/CVE-2021-41647 -https://github.com/MobiusBinary/CVE-2021-41651/ -https://github.com/Moddable-OpenSource/moddable/issues/351 -https://github.com/Moddable-OpenSource/moddable/issues/431 -https://github.com/Moddable-OpenSource/moddable/issues/432 -https://github.com/Moddable-OpenSource/moddable/issues/440 -https://github.com/Moddable-OpenSource/moddable/issues/441 -https://github.com/Moddable-OpenSource/moddable/issues/442 -https://github.com/Moddable-OpenSource/moddable/issues/580 -https://github.com/Moddable-OpenSource/moddable/issues/582 -https://github.com/Moddable-OpenSource/moddable/issues/583 -https://github.com/Moddable-OpenSource/moddable/issues/585 -https://github.com/Moddable-OpenSource/moddable/issues/586 -https://github.com/Moddable-OpenSource/moddable/issues/587 -https://github.com/Moddable-OpenSource/moddable/issues/748 -https://github.com/Moddable-OpenSource/moddable/issues/749 -https://github.com/Moddable-OpenSource/moddable/issues/750 -https://github.com/Moddable-OpenSource/moddable/issues/752 -https://github.com/Moddable-OpenSource/moddable/issues/759 -https://github.com/Moddable-OpenSource/moddable/issues/760 -https://github.com/Moddable-OpenSource/moddable/issues/766 -https://github.com/Moddable-OpenSource/moddable/issues/768 -https://github.com/Moddable-OpenSource/moddable/issues/769 -https://github.com/Moddable-OpenSource/moddable/issues/774 -https://github.com/Moddable-OpenSource/moddable/issues/896 -https://github.com/MoeMion233/cve/blob/main/1.md -https://github.com/MoeMion233/cve/blob/main/2.md -https://github.com/Moeditor/Moeditor/issues/156 -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31648.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31649.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31650.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31651.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33302.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33303.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33306.md -https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33307.md -https://github.com/MonikaBrzica/scm/issues/1 -https://github.com/Motion-Project/motion/issues/1227#issuecomment-715927776 -https://github.com/Mount4in/Mount4in.github.io/blob/master/poc.py -https://github.com/Mr-n0b3dy/CVE-2023-42362 -https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt -https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt -https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt -https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt -https://github.com/MucahitSaratar/endian_firewall_authenticated_rce -https://github.com/MucahitSaratar/zencart_auth_rce_poc -https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6 -https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm -https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md -https://github.com/NSSCYCTFER/SRC-CVE -https://github.com/NUDTTAN91/CVE-2024-22939 -https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md -https://github.com/Nacl122/CVEReport/blob/main/CVE-2023-42286/CVE-2023-42286.md -https://github.com/NagVis/nagvis/issues/91 -https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md -https://github.com/Nat-Lab/CVE-2018-5951 -https://github.com/NationalSecurityAgency/ghidra/issues/4869 -https://github.com/NationalSecurityAgency/ghidra/issues/71 -https://github.com/NationalSecurityAgency/ghidra/issues/943 -https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 -https://github.com/Neeke/HongCMS/issues/15 -https://github.com/Neeke/HongCMS/issues/4 -https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC -https://github.com/Nhoya/MycroftAI-RCE -https://github.com/Ni7inSharma/CVE-2021-41511 -https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_DOS.md -https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak.md -https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak2.md -https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_read.md -https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_start-stop.md -https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_upload.md -https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/adv2.php.md -https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/install.md -https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/licence_save.php.md -https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/manage.php.md -https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/ppsave.php.md -https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md -https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md -https://github.com/NoneShell/Vulnerabilities/blob/main/NETGEAR/WNR2000v4-1.0.0.70-Authorized-Command-Injection.md -https://github.com/Notselwyn/CVE-2024-1086 -https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md -https://github.com/NucleusCMS/NucleusCMS/issues/83 -https://github.com/OAID/Tengine/issues/476 -https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm -https://github.com/OS4ED/openSIS-Classic/issues/158 -https://github.com/OS4ED/openSIS-Classic/issues/192 -https://github.com/OS4ED/openSIS-Classic/issues/193 -https://github.com/OS4ED/openSIS-Classic/issues/204 -https://github.com/OS4ED/openSIS-Classic/issues/248 -https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf -https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf -https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c -https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md -https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-17381.md -https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4 -https://github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp -https://github.com/OneUptime/oneuptime/security/advisories/GHSA-246p-xmg8-wmcq -https://github.com/OoLs5/VulDiscovery/blob/main/cve-2024-36773.md -https://github.com/OoLs5/VulDiscovery/blob/main/monstra_xss.pdf -https://github.com/OoLs5/VulDiscovery/blob/main/poc.docx -https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2 -https://github.com/OpenAPITools/openapi-generator/issues/2253 -https://github.com/OpenDDS/OpenDDS/issues/4527 -https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv -https://github.com/OpenImageIO/oiio/issues/3871 -https://github.com/OpenImageIO/oiio/issues/3947 -https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp -https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7 -https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h -https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 -https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5 -https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m -https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 -https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9 -https://github.com/OpenTSDB/opentsdb/issues/2051 -https://github.com/OpenXiangShan/XiangShan/issues/2534 -https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51064.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51067.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md -https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51071.md -https://github.com/OraclePi/repo/blob/main/totolink%20A3700R/1/A3700R%20%20V9.1.2u.6165_20211012%20vuln.md -https://github.com/OraclePi/repo/blob/main/totolink%20X6000R/1/X6000R%20AX3000%20WiFi%206%20Giga%20unauthed%20rce.md -https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability -https://github.com/Orange-Cyberdefense/CVE-repository -https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md -https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md -https://github.com/Orange-Cyberdefense/CVE-repository/tree/master -https://github.com/Oudaorui/bug_report/blob/main/vendors/oretnom23/Food%20Ordering%20Management%20System/XSS-1.md -https://github.com/Outpost24/Pyrescom-Termod-PoC -https://github.com/Overv/Open.GL/issues/56 -https://github.com/P3ngu1nW/CVE_Request/blob/main/erlang-jose.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_sys_account/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_web_and_sys_account/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/remote_cmd_exec_0/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/reset_router/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_00/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_01/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_02/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_03/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_04/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_05/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_07/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_08/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_09/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_10/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_11/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_12/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_13/README.md -https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_14/README.md -https://github.com/PAGalaxyLab/VulInfo/tree/master/ASUS/GT-AC5300/dos1 -https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_0 -https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_1 -https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_2 -https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_3 -https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_1 -https://github.com/PGYER/codefever/issues/140 -https://github.com/PHPFusion/PHPFusion/issues/2314 -https://github.com/PX4/PX4-Autopilot/issues/17062 -https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw -https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82 -https://github.com/PabloMK7/ENLBufferPwn -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md -https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md -https://github.com/Pandora1m2/zzcms201910/issues/1 -https://github.com/PaquitoSoft/Notimoo/issues/3 -https://github.com/Pastea/CVE-2023-51810 -https://github.com/Paxa/postbird/issues/132 -https://github.com/Paxa/postbird/issues/133 -https://github.com/Paxa/postbird/issues/134 -https://github.com/Pbootcms/Pbootcms/issues/8 -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#10xss-vulnerability-in-adminpostsmanage_postphptitle -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#11xss-vulnerability-in-adminpostsmanage_postphpcontent -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#5sql-injection-vulnerability-in-adminpostsview_postphp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#6sql-injection-vulnerability-in-adminpostsmanage_postphp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-admincategoriesview_categoryphp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#8sql-injection-vulnerability-in-admincategoriesmanage_categoryphp -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#9sql-injection-vulnerability-in-classesusersphppost -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md -https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The%20NFine%20rapid%20development%20platform%20Organize-GetTreeGridJson%20has%20unauthorized%20access%20vulnerability.md -https://github.com/Peppermint-Lab/peppermint/issues/171 -https://github.com/PinaeOS/py-xml/issues/2 -https://github.com/Pingkon/HMS-PHP/issues/1 -https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md -https://github.com/Piwigo/AdminTools/issues/21 -https://github.com/Piwigo/Piwigo/issues/1157 -https://github.com/Piwigo/Piwigo/issues/1158 -https://github.com/Piwigo/Piwigo/issues/1605 -https://github.com/Piwigo/Piwigo/issues/1908 -https://github.com/Piwigo/Piwigo/issues/2069 -https://github.com/Piwigo/Piwigo/issues/721 -https://github.com/Piwigo/Piwigo/issues/804 -https://github.com/Piwigo/Piwigo/issues/839 -https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg -https://github.com/PopojiCMS/PopojiCMS/issues/13 -https://github.com/PopojiCMS/PopojiCMS/issues/14 -https://github.com/PopojiCMS/PopojiCMS/issues/16 -https://github.com/PopojiCMS/PopojiCMS/issues/23 -https://github.com/PopojiCMS/PopojiCMS/issues/24 -https://github.com/PopojiCMS/PopojiCMS/issues/31 -https://github.com/PoppingSnack/VulReport/issues/12 -https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md -https://github.com/PrecursorYork/crud-without-refresh-reload-Reflected_XSS-POC/blob/main/README.md -https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 -https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw -https://github.com/ProxymanApp/Proxyman/issues/364 -https://github.com/PumpkinBridge/cve/blob/main/rce.md -https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_HardcodedPassword.md -https://github.com/PwnYouLin/IOT_vul/blob/main/wayos/2/readme.md -https://github.com/PyconUK/ConferenceScheduler-cli/issues/19 -https://github.com/QQ704568679/YXcms-Code-audit/blob/master/Yxcms%20Code%20audit -https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m -https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/sales-report-ds-sql(CVE-2022-40944).md -https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf -https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf -https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_DNSServers%3D.pdf -https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_X_TP_ClonedMACAddress%3D.pdf -https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_httpRemotePort%3D.pdf -https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_minAddress%3D.pdf -https://github.com/QuantConnect/Lean/issues/3537 -https://github.com/RCEraser/cve/blob/main/ForU-CMS.md -https://github.com/RCEraser/cve/blob/main/S85F.md -https://github.com/RCEraser/cve/blob/main/rce.md -https://github.com/RCEraser/cve/blob/main/sql_inject_2.md -https://github.com/RCEraser/cve/blob/main/sql_inject_3.md -https://github.com/RCEraser/cve/blob/main/sql_inject_4.md -https://github.com/RCEraser/cve/blob/main/sql_inject_5.md -https://github.com/RCEraser/cve/blob/main/tongda.md -https://github.com/RCEraser/cve/blob/main/wanjiang.md -https://github.com/RO6OTXX/pescms_vulnerability -https://github.com/RaRe-Technologies/bounter/issues/47 -https://github.com/Raj789-sec/CVE-2023-39115 -https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE -https://github.com/Ramansh123454/POCs/blob/main/POC -https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection -https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20OS%20Command%20Injection%20Vulnerability -https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20XSS%20%26%20HTML%20Injection%20vulnerability -https://github.com/RashidKhanPathan/CVE-2022-38813 -https://github.com/RashidKhanPathan/CVE-2022-40471 -https://github.com/RashidKhanPathan/CVE-2022-41445 -https://github.com/RashidKhanPathan/CVE-2022-41446 -https://github.com/RashidKhanPathan/CVE-2022-43117 -https://github.com/RashidKhanPathan/CVE-2022-44830 -https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt -https://github.com/ReCryptLLC/CVE-2022-42045/tree/main -https://github.com/ReFirmLabs/binwalk/pull/617 -https://github.com/RealLinkers/CVE-2019-17427 -https://github.com/RealLinkers/CVE-2019-18890 -https://github.com/RedisGraph/RedisGraph/issues/3178 -https://github.com/RektInator/cod-steamauth-rce -https://github.com/RhinoSecurityLabs/CVEs -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-20621 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-16864 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9757 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9758 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9926 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47321 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47322 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47324 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47325 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47326 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47327 -https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724 -https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8 -https://github.com/Richard1266/aikcms/issues/2 -https://github.com/RiieCco/write-ups/tree/master/CVE-2019-9659 -https://github.com/RioIsDown/TC7337 -https://github.com/RisingStack/protect/issues/16 -https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md -https://github.com/RootSoull/Vuln-Poc/tree/master/D-Link/DIR-816 -https://github.com/RootUp/PersonalStuff/blob/master/Telegram_Privacy.pdf -https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 -https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt -https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq -https://github.com/Ryan0lb/EC-cloud-e-commerce-system-CVE-application/blob/master/README.md -https://github.com/S1lkys/CVE-2020-29669 -https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper -https://github.com/S4nshine/CVE-2023-23169 -https://github.com/SECFORCE/CVE-2018-8941 -https://github.com/SQSamir/CVE-2021-27328 -https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems/CVE-2018-11654 -https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems/CVE-2018-7812 -https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life -https://github.com/Sadw11v/cve/blob/main/upload.md -https://github.com/SakuraSamuraii/CVE-2021-43032 -https://github.com/SakuraSamuraii/derailed -https://github.com/SakuraSamuraii/ez-iRZ -https://github.com/Samsung/mTower/issues/83 -https://github.com/Samuel-Tyler/fast_ber/issues/30 -https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271 -https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/blob/master/CVE-2017-8260.c -https://github.com/Seagate/cortx-s3server/issues/1037 -https://github.com/SecLoop/CVE/blob/main/telefone_ip_tip200.md -https://github.com/SecWiki/CMS-Hunter/blob/master/seacms/seacms6.61/seacms661.md -https://github.com/SecureAuthCorp/impacket/releases -https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551 -https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2552 -https://github.com/Security-AVS/CVE-2019-13633 -https://github.com/Security-AVS/CVE-2020-16270 -https://github.com/Security-AVS/CVE-2021-29267 -https://github.com/Security-AVS/CVE-2021-30146 -https://github.com/SegfaultMasters/covering360/blob/master/HDF5/README.md#divided-by-zero---h5d__chunk_set_info_real_div_by_zero -https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay -https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#use-after-free-in-post_args -https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#user-content-heap-overflow-in-csum_replace4 -https://github.com/SegfaultMasters/covering360/tree/master/HDF5#divided-by-zero---divbyzero__h5d_chunk_poc -https://github.com/SegfaultMasters/covering360/tree/master/HDF5#stack-overflow---stackoverflow_h5p__get_cb -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#stack-overflow-in-h5s_extent_get_dims -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln7#heap-overflow-in-h5o_attr_decode -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc -https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#invalid-write-memory-access-in-decompressc -https://github.com/Sentinal920/WPanel4-Authenticated-RCE -https://github.com/Serhatcck/cves/blob/main/CVE-2023-48016-restaurant-table-booking-system-SQLInjection.md -https://github.com/ShielderSec/cve-2017-18635 -https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328 -https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Credentials-Stored-in-Cleartext-CVE%E2%80%902024%E2%80%9028325 -https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Insecure-Credential-Storage-CVE%E2%80%902024%E2%80%9028327 -https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Privilege-Escalation-CVE%E2%80%902024%E2%80%9028326 -https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343 -https://github.com/Shumerez/CVE-2023-48858 -https://github.com/Sigil-Ebook/flightcrew/issues/52 -https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505967936 -https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505997355 -https://github.com/SimbCo/httpster/pull/36 -https://github.com/SinGooCMS/SinGooCMSUtility/issues/1 -https://github.com/Skotizo/CVE-2021-43129 -https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 -https://github.com/Slovejoy/dnsmasq-pre2.76 -https://github.com/Snawoot/hisilicon-dvr-telnet -https://github.com/Snowty/myCVE/blob/master/CraftCMS-2.6.3000/README.md -https://github.com/SomeBottle/OBottle/issues/6 -https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md -https://github.com/Sospiro014/zday1/blob/main/Image_Accordion_Gallery.md -https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md -https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md -https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md -https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md -https://github.com/Sospiro014/zday1/blob/main/event-managment.md -https://github.com/Sospiro014/zday1/blob/main/xss_1.md -https://github.com/SouhailHammou/Exploits/blob/master/CVE-2019-14694%20-%20Comodo%20AV%20Sandbox%20Race%20Condition%20UAF/comodo_av_uaf_poc.c -https://github.com/SouhailHammou/Panda-Antivirus-LPE -https://github.com/SpengeSec/CVE-2019-19699 -https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md -https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md -https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md -https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51147.md -https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md -https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m -https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-jhm6-qjhq-5mf9 -https://github.com/Starcounter-Jack/JSON-Patch/pull/262 -https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/SetTftpUpgrad.md -https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md -https://github.com/Stevenbaga/fengsha/blob/main/W20E/SetSysTime.md -https://github.com/Stevenbaga/fengsha/blob/main/W20E/formIPMacBindModify.md -https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md -https://github.com/Stitch3612/cve/blob/main/rce.md -https://github.com/StolidWaffle/AVer-PTZApp2 -https://github.com/Stranger6667/pyanyapi/issues/41 -https://github.com/Studio-42/elFinder/issues/3295 -https://github.com/SukaraLin/php_code_audit_project/blob/master/dedecms/dedecms%20v5.7%20sp2%20%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md -https://github.com/SxB64/mxgraph-xss-vul/wiki -https://github.com/Sylon001/NVS-365-Camera/tree/master/NVS365%20Network%20Video%20Server%20Password%20Information%20Unauthorized%20Access%20Vulnerability -https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated -https://github.com/TEag1e/zzcms -https://github.com/TREYWANGCQU/LANKERS/issues/1 -https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject1 -https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject3 -https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject4 -https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject5 -https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3 -https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg -https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md -https://github.com/Tardis07/CVE_GO/blob/master/zzzphp_code_execution_v1.7.3.md -https://github.com/Tatsh/pngdefry/issues/1 -https://github.com/TeamEasy/EasyCMS/issues/8 -https://github.com/TeamNewPipe/NewPipe/security/advisories/GHSA-wxrm-jhpf-vp6v -https://github.com/TeamSeri0us/pocs/blob/master/exiv2/1-out-of-read-Poc -https://github.com/TeamSeri0us/pocs/blob/master/exiv2/2-out-of-read-Poc -https://github.com/TeamSeri0us/pocs/blob/master/faad/global-buffer-overflow%40ps_mix_phase.md -https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils -https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils/ -https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/2018_09_03 -https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/readme.md -https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 -https://github.com/TeamSeri0us/pocs/tree/master/faad -https://github.com/TeamSeri0us/pocs/tree/master/gerbv -https://github.com/TeamSeri0us/pocs/tree/master/libofx -https://github.com/TeamSeri0us/pocs/tree/master/lmdb/FPE -https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20initialization%20vuln -https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memcpy%20illegal%20dst -https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memory%20corruption%20vuln -https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20write%20to%20illegal%20address -https://github.com/TeamSeri0us/pocs/tree/master/mupdf -https://github.com/TeamSeri0us/pocs/tree/master/mupdf/20181203 -https://github.com/TeamSeri0us/pocs/tree/master/pdfalto -https://github.com/TeamSeri0us/pocs/tree/master/recutils -https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/rec2csv -https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/recfix -https://github.com/TeamSeri0us/pocs/tree/master/xpdf -https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm -https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 -https://github.com/TechSmith/mp4v2/issues/20 -https://github.com/TechSmith/mp4v2/issues/74 -https://github.com/Tencent/libpag/issues/2230 -https://github.com/Tencent/vConsole/issues/616 -https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357 -https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/1 -https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2 -https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/3 -https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/4 -https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/6 -https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto -https://github.com/TheCyberGeek/CVE-2020-5844 -https://github.com/TheGetch/CVE-2022-23378 -https://github.com/TheGetch/CVE-2022-29597 -https://github.com/TheGetch/CVE-2022-29598 -https://github.com/TheHackingRabbi/CVE-2021-42662 -https://github.com/TheHackingRabbi/CVE-2021-42663 -https://github.com/TheHackingRabbi/CVE-2021-42665 -https://github.com/TheHackingRabbi/CVE-2021-42666 -https://github.com/TheHackingRabbi/CVE-2021-42667 -https://github.com/TheHackingRabbi/CVE-2021-42668 -https://github.com/TheHackingRabbi/CVE-2021-42669 -https://github.com/TheHackingRabbi/CVE-2021-42670 -https://github.com/TheHackingRabbi/CVE-2021-42671 -https://github.com/Thecosy/IceCMS/issues/8 -https://github.com/Thinstation/thinstation/issues/427 -https://github.com/Thirtypenny77/cms/blob/main/5.md -https://github.com/Thirtypenny77/cms/blob/main/6.md -https://github.com/Thirtypenny77/cms/blob/main/7.md -https://github.com/Thirtypenny77/cms/blob/main/8.md -https://github.com/Thirukrishnan/CVE-2023-33408 -https://github.com/Thirukrishnan/CVE-2023-33409 -https://github.com/Thirukrishnan/CVE-2023-33410 -https://github.com/Thirukrishnan/CVE-2024-27665/ -https://github.com/This-is-Y/baijiacms-RCE -https://github.com/Thomas-Tsai/partclone/issues/71 -https://github.com/Thomas-Tsai/partclone/issues/82 -https://github.com/Tiamat-ron/cms/blob/main/The%20deletion%20function%20of%20the%20Article%20Management%20Office%20exists%20in%20CSRF.md -https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20article%20management%20modification%20section.md -https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow2.md -https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0130/setSchedWifi.md -https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md -https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md -https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md -https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md -https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetSysTime.md -https://github.com/Timorlover/CVE-2023-23333 -https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php -https://github.com/TinkAnet/cve/blob/main/sql2.md -https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL -https://github.com/TishaManandhar/Webmin_xss_POC/blob/main/XSS -https://github.com/To-LingJing/CVE-Issues/blob/main/baijiacms/upload_file.md -https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 -https://github.com/TonyKentClark/MyCodeAudit/blob/master/xycms%20%20v1.7 -https://github.com/ToughRunner/Open5gs_bugreport -https://github.com/ToughRunner/Open5gs_bugreport2 -https://github.com/ToughRunner/Open5gs_bugreport3 -https://github.com/ToughRunner/Open5gs_bugreport4 -https://github.com/Toxich4/CVE-2022-32199 -https://github.com/Toxich4/CVE-2023-30459 -https://github.com/Toxich4/CVE-2023-33253 -https://github.com/TplusSs/PbootCMS/issues/1 -https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-2.md -https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-3.md -https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-3.md -https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-1.md -https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-2.md -https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-3.md -https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-5.md -https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/Online%20Security%20Guards%20Hiring%20System%201.0.md -https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/e107%20v2.3.2.md -https://github.com/Trinity-SYT-SECURITY/arbitrary-file-upload-RCE/blob/main/Online%20Art%20gallery%20project%201.0.md -https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239 -https://github.com/TycheSoftwares/woocommerce-abandoned-cart/pull/885#issuecomment-1601813615 -https://github.com/TyeYeah/DIR-890L-1.20-RCE -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-deleting-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-command-injection-in-admcgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-hidden-parameter-ufconf-command-injection-in-apicgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-loginshtml-command-injection-in-logincgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-man_securityshtml-command-injection-in-firewallcgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-nas_diskshtml-command-injection-in-nascgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wanshtml-command-injection-in-admcgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi -https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi -https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-adding-extender-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi -https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-clicking-the-button-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi -https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-command-injection-in-qoscgi -https://github.com/TylerGarlick/angular-redactor/issues/77 -https://github.com/Typesetter/Typesetter/issues/674 -https://github.com/Typesetter/Typesetter/issues/697 -https://github.com/UT-Security/gpu-zip -https://github.com/UditChavda/Udit-Chavda-CVE/blob/main/CVE-2022-36736 -https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/arbitrary_file_read_vulnerability.py -https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py -https://github.com/UnderwaterCoder/Hipcam-RTSP-Format-Validation-Vulnerability -https://github.com/UniSharp/laravel-filemanager/issues/1150 -https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966 -https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417 -https://github.com/V1n1v131r4/CSRF-on-ArGoSoft-Mail-Server/blob/master/README.md -https://github.com/V1n1v131r4/CSRF-to-RCE-on-Backdrop-CMS -https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md -https://github.com/V1n1v131r4/Exploiting-WP-Database-Backup-WordPress-Plugin/blob/master/README.md -https://github.com/V1n1v131r4/Exploiting-WP-Htaccess-by-BestWebSoft-Plugin/blob/master/README.md -https://github.com/V1n1v131r4/HGB10R-2 -https://github.com/V1n1v131r4/MIME-Confusion-Attack-on-Midori-Browser/blob/master/README.md -https://github.com/V3locidad/GLPI_POC_Plugins_Shell -https://github.com/VauP/CVE-IDs/blob/main/proof_of_concept.md -https://github.com/Veeeooo/phpwind/blob/master/README.md -https://github.com/Venan24/SCMS/issues/2 -https://github.com/Venus-WQLab/bug_report/blob/main/Tenda/CVE-2023-24212.md -https://github.com/VerSprite/research/blob/master/advisories/VS-2017-007.md -https://github.com/VerSprite/research/blob/master/advisories/VS-2018-014.md -https://github.com/Verytops/verydows/issues/10 -https://github.com/Verytops/verydows/issues/17 -https://github.com/Vict00r/poc/issues/1 -https://github.com/VictorAlagwu/CMSsite/issues/14 -https://github.com/VictorAlagwu/CMSsite/issues/15 -https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram-CVE-2020-17448 -https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-10570 -https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-12474 -https://github.com/VirusTotal/yara/issues/1178 -https://github.com/VirusTotal/yara/issues/1616 -https://github.com/VirusTotal/yara/issues/891 -https://github.com/VirusTotal/yara/issues/999 -https://github.com/VivekPanday12/CVE-/issues/2 -https://github.com/VivekPanday12/CVE-/issues/3 -https://github.com/VoidSec/Exploit-Development/blob/master/windows/x64/kernel/crucial_Ballistix_MOD_Utility_v.2.0.2.5/crucial_Ballistix_MOD_Utility_v.2.0.2.5_memory_dump_PoC.cpp -https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py -https://github.com/VulDetailsPublication/Poc/tree/master/Tenda/AC9 -https://github.com/WPO-Foundation/webpagetest/issues/820 -https://github.com/WPO-Foundation/webpagetest/issues/830 -https://github.com/WPO-Foundation/webpagetest/issues/831 -https://github.com/WPO-Foundation/webpagetest/issues/832 -https://github.com/WPO-Foundation/webpagetest/issues/833 -https://github.com/WPO-Foundation/webpagetest/issues/834 -https://github.com/WPO-Foundation/webpagetest/issues/835 -https://github.com/WPO-Foundation/webpagetest/issues/836 -https://github.com/WPO-Foundation/webpagetest/issues/837 -https://github.com/WPO-Foundation/webpagetest/issues/838 -https://github.com/WULINPIN/CVE/blob/main/JForum/poc.html -https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx -https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm -https://github.com/WarmBrew/web_vul/blob/main/TTX.md -https://github.com/WazeHell/CVE-2018-6389 -https://github.com/WebAssembly/binaryen/issues/1863 -https://github.com/WebAssembly/binaryen/issues/1864 -https://github.com/WebAssembly/binaryen/issues/1865 -https://github.com/WebAssembly/binaryen/issues/1866 -https://github.com/WebAssembly/binaryen/issues/1867 -https://github.com/WebAssembly/binaryen/issues/1872 -https://github.com/WebAssembly/binaryen/issues/1876 -https://github.com/WebAssembly/binaryen/issues/1879 -https://github.com/WebAssembly/binaryen/issues/1880 -https://github.com/WebAssembly/binaryen/issues/1881 -https://github.com/WebAssembly/binaryen/issues/1900 -https://github.com/WebAssembly/binaryen/issues/2288 -https://github.com/WebAssembly/wabt/issues/1938 -https://github.com/WebAssembly/wabt/issues/1981 -https://github.com/WebAssembly/wabt/issues/1982 -https://github.com/WebAssembly/wabt/issues/1983 -https://github.com/WebAssembly/wabt/issues/1985 -https://github.com/WebAssembly/wabt/issues/1989 -https://github.com/WebAssembly/wabt/issues/1992 -https://github.com/WebAssembly/wabt/issues/2310 -https://github.com/WebAssembly/wabt/issues/2311 -https://github.com/Webklex/php-imap/security/advisories/GHSA-47p7-xfcc-4pv9 -https://github.com/Westbrookadmin/portfolioCMS/issues/1 -https://github.com/Wh04m1001/CVE -https://github.com/WhatCD/Gazelle/issues/111 -https://github.com/WhatCD/Gazelle/issues/112 -https://github.com/WhatCD/Gazelle/issues/113 -https://github.com/WhatCD/Gazelle/issues/114 -https://github.com/WhereisRain/dir-815 -https://github.com/WhereisRain/dir-815/blob/main/README.md -https://github.com/WhoisZkuan/TOTOlink-A700RU -https://github.com/WillyXJ/facileManager/security/advisories/GHSA-h7w3-xv88-2xqj -https://github.com/WillyXJ/facileManager/security/advisories/GHSA-w67q-pp62-j4pf -https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45634 -https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45635 -https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636 -https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45637 -https://github.com/WizardMac/ReadStat/issues/108 -https://github.com/Wocanilo/CVE-2019-14537 -https://github.com/WodenSec/CVE-2022-46485 -https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/RCE.md -https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md -https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-Totolink/X6000R-Hardcoded-Password.md -https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849 -https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md -https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28 -https://github.com/X-C3LL/PoC-CVEs/blob/master/Aircam-DoS/Aircam-DoS.py -https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md -https://github.com/XC9409/CVE-2023-31634/blob/main/PoC -https://github.com/XOOPS/XoopsCore25/issues/523 -https://github.com/XOS-Shop/xos_shop_system/issues/1 -https://github.com/Xh4H/Satellian-CVE-2020-7980 -https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md -https://github.com/Xin246/cms/blob/main/2.md -https://github.com/XiphosResearch/exploits/tree/master/suiteshell -https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx -https://github.com/Xtraball/SiberianCMS/issues/217 -https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/2 -https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/3 -https://github.com/Xyntax/POC-T/blob/2.0/script/fiyo2.0.7-getshell.py -https://github.com/Y1LD1R1M-1337/Limesurvey-RCE -https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5 -https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m -https://github.com/YMFE/yapi/issues/2745 -https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md -https://github.com/YXuanZ1216/cve/blob/main/sql.md -https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md -https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL -https://github.com/Yesec/-Doctor-s-Appointment-System/blob/main/SQL%20Injection%20in%20login.php/vuln.md -https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20doctors.php/vuln.md -https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20login.php/vuln.md -https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/vertical%20privilege%20escalation/vuln.md -https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20catagory_data.php/vuln.md -https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20ex_catagory_data.php/vuln.md -https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20product_data.php/vuln.md -https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20manage_user.php/vuln.md -https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20view_fee.php/vuln.md -https://github.com/Yesec/Resort-Reservation-System/blob/main/local%20file%20inclusion/vuln.md -https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8 -https://github.com/Yomguithereal/baobab/pull/511 -https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-3782-758f-mj85 -https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm -https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827 -https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj -https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq -https://github.com/YouPHPTube/YouPHPTube/issues/2202 -https://github.com/Yozarseef95/CVE-2023-31594 -https://github.com/Yozarseef95/CVE-2023-31595 -https://github.com/Ysurac/FlightAirMap/issues/275 -https://github.com/Yu1e/vuls/blob/main/Byzro%20Networks%20Smart%20S80%20management%20platform%20has%20rce%20vulnerability.md -https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md -https://github.com/Z3Prover/z3/issues/3363 -https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1 -https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1%20%20xss1 -https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_1.md -https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md -https://github.com/ZIllR0/Routers/blob/master/PHICOMM -https://github.com/ZIllR0/Routers/blob/master/Tenda/heapoverflow1.md -https://github.com/ZIllR0/Routers/blob/master/Tenda/rce1.md -https://github.com/ZIllR0/Routers/blob/master/Tenda/stack1.md -https://github.com/ZIllR0/Routers/blob/master/Tenda/stack2.md -https://github.com/ZIllR0/Routers/blob/master/Tenda/stack3.md -https://github.com/ZIllR0/Routers/blob/master/Tenda/stack4.md -https://github.com/ZIllR0/Routers/blob/master/Tendaoob1.md -https://github.com/ZLMediaKit/ZLMediaKit/issues/1839 -https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md -https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-869 -https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-879 -https://github.com/ZerBea/hcxtools/issues/155 -https://github.com/ZhenKaiHe/bug_report/blob/main/vendors/onetnom23/clinics-patient-management-system/XSS-1.md -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020E0_0x830020E4 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020F8 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x8300210C -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008084 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008088 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008090 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00813C -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A0081DC -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A0081E4 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008240 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00824C -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008254 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00825C -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008264 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008268 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_220400 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_220840 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_2208C0 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_221808 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008020 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_990081C8 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008208 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008210 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008224 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E020 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E024 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e000 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e004 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e008 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e00c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e014 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e018 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e02c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxCryptMon -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x220009 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x22000d -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x220011 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_220019 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/SDActMon -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000035 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000038 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000010c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000110 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000118 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000014c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110009/0x80000170 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C40204c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402078 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402080 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402114_9C402124_9C40207c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402148 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/getshell -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/WatchDog_AntiMalware_POC/tree/master/0x80002010 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/WatchDog_AntiMalware_POC/tree/master/0x80002054 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402424 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C40242C -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x220458 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x22045c -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x220c20 -https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKRgFtXp_0x220408 -https://github.com/ZipArchive/ZipArchive/issues/680 -https://github.com/ZoneMinder/ZoneMinder/issues/1797 -https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrx -https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx -https://github.com/a2u/CVE-2018-7600 -https://github.com/a932278490/ebcms/issues/1 -https://github.com/aaPanel/aaPanel/issues/74 -https://github.com/aaronsvk -https://github.com/aaronsvk/CVE-2020-3956 -https://github.com/aaronsvk/CVE-2022-30075 -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/addWifiMacFilter_deviceMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetQosBand.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWriteFacMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/setSchedWifi_start.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWriteFacMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/setUsbUnload.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/setSmartPowerManagement.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/SetSpeedWan.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formExpandDlnaFile.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetQosBand.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formQuickIndex.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_entrys.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_mitInterface.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/formWanParameterSetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetCfm.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetClientState.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_devName.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWanParameterSetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security_5g.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWriteFacMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/form_fast_setting_wifi_set.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexeCommand.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_entrys.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_mitInterface.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_end.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_start.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWanParameterSetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security_5g.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_entrys.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_list1.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_deviceId.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_time.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_end.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_start.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formAddDnsForward.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelDhcpRule.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelPortMapping.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindAdd.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindDel.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindModify.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formQOSRuleDel.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetDebugCfg.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetPortMapping.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetRemoteWebManage.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetStaticRoute.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromAddressNat_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromDhcpListClient_page.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromNatlimit.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromVirtualSer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromqossetting.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromwebExcptypemanFilter.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_auto.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterSet.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md -https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md -https://github.com/abeluck/stegdetect/issues/10 -https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829 -https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/blob/master/Directory%20listing/Report_Directory%20listing.pdf -https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/tree/master/Directory%20listing -https://github.com/aclements/libelfin/issues/52 -https://github.com/actions/runner/pull/2108 -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-002.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-004.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-005.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-006.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-008.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-010.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md -https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-012.md -https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-001.md -https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md -https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-003.md -https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-004.md -https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-005.md -https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md -https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-009.md -https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/AFC-POC.apk -https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/CWE-94.md -https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/TVBrowserDemo.gif -https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md -https://github.com/actuator/com.cutestudio.colordialer/blob/main/CWE-284.md -https://github.com/actuator/com.eypcnnapps.quickreboot/blob/main/CWE-925.md -https://github.com/actuator/com.full.dialer.top.secure.encrypted -https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/dial.gif -https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/poc.apk -https://github.com/actuator/com.gurry.kvbrowser/blob/main/CWE-94.md -https://github.com/actuator/com.phlox.tvwebbrowser -https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/CWE-94.md -https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk -https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md -https://github.com/actuator/com.tcl.browser/blob/main/CWE-94.md -https://github.com/actuator/cve/blob/main/CVE-2023-42469 -https://github.com/actuator/cve/blob/main/CVE-2023-42470 -https://github.com/actuator/cve/blob/main/CVE-2023-42471 -https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089 -https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC.gif -https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC_DOS_ALT.gif -https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md -https://github.com/actuator/imou/blob/main/poc.apk -https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md -https://github.com/actuator/wave.ai.browser/blob/main/poc.apk -https://github.com/actuator/yi/blob/main/CWE-319.md -https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4 -https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E -https://github.com/adhikara13/CVE/blob/main/netis_MW5360/blind%20command%20injection%20in%20password%20parameter%20in%20initial%20settings.md -https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md -https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md -https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20hostname%20parameter%20in%20wan%20settings.md -https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md -https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md -https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md -https://github.com/adiapera/xss_create2_boidcms_2.1.0 -https://github.com/adiapera/xss_create_boidcms_2.1.0 -https://github.com/adiapera/xss_current_page_wondercms_3.4.3 -https://github.com/adiapera/xss_home_page_wondercms_3.4.3 -https://github.com/adiapera/xss_language_cmsimple_5.15 -https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md -https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 -https://github.com/adiapera/xss_security_wondercms_3.4.3 -https://github.com/adilkhan7/CVE-2023-31664 -https://github.com/advisories/GHSA-2m57-hf25-phgg -https://github.com/advisories/GHSA-3qx3-6hxr-j2ch -https://github.com/advisories/GHSA-5pq7-52mg-hr42 -https://github.com/advisories/GHSA-66m2-493m-crh2 -https://github.com/advisories/GHSA-8jxm-xp43-qh3q -https://github.com/advisories/GHSA-98hq-4wmw-98w9 -https://github.com/advisories/GHSA-9p43-hj5j-96h5 -https://github.com/advisories/GHSA-c35q-ffpf-5qpm -https://github.com/advisories/GHSA-cfc2-wr2v-gxm5 -https://github.com/advisories/GHSA-qg8p-v9q4-gh34 -https://github.com/advisories/GHSA-qqhq-8r2c-c3f5 -https://github.com/advisto/peel-shopping/issues/1 -https://github.com/advisto/peel-shopping/issues/3 -https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611 -https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-7j99-76cj-q9pg -https://github.com/ae6e361b/taocms-XSS -https://github.com/afaq1337/CVE-2021-35296 -https://github.com/afaq1337/CVE-2022-36200 -https://github.com/affix/CVE-2022-36231 -https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj -https://github.com/agambier/libsvg2/issues/2 -https://github.com/agambier/libsvg2/issues/3 -https://github.com/agambier/libsvg2/issues/4 -https://github.com/agentejo/cockpit/issues/1310 -https://github.com/agl/jbig2enc/issues/84 -https://github.com/agl/jbig2enc/issues/85 -https://github.com/ahmedalroky/CVEs/tree/cellinx -https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD -https://github.com/ahrixia/CVE-2023-43323 -https://github.com/ahrixia/CVE-2023-44811 -https://github.com/ahrixia/CVE-2023-44812 -https://github.com/ahrixia/CVE-2023-44813 -https://github.com/ahrixia/CVE-2023-45542 -https://github.com/ahrixia/CVE-2023-50072 -https://github.com/aio-libs/aiohttp-session/issues/272 -https://github.com/aio-libs/aiohttp-session/issues/325 -https://github.com/aio-libs/aiohttp/issues/6772 -https://github.com/aio-libs/aiohttp/pull/8079 -https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg -https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx -https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j -https://github.com/airbnb/knowledge-repo/issues/431 -https://github.com/aircrack-ng/rtl8812au/issues/730 -https://github.com/aixiao0621/Tenda/blob/main/AC10/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/2/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md -https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md -https://github.com/aknbg1thub/cve/blob/main/upload.md -https://github.com/akrennmair/newsbeuter/commit/96e9506ae9e252c548665152d1b8968297128307 -https://github.com/akrennmair/newsbeuter/issues/591 -https://github.com/akshadjoshi/CVE-2023-38890 -https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md -https://github.com/al3zx/xss_languages_subrion_4.2.1 -https://github.com/albandes/helpdezk/issues/2 -https://github.com/alexazhou/VeryNginx/issues/218 -https://github.com/alexlang24/bloofoxCMS/issues/10 -https://github.com/alexlang24/bloofoxCMS/issues/11 -https://github.com/alexlang24/bloofoxCMS/issues/8 -https://github.com/alexlang24/bloofoxCMS/issues/9 -https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv -https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f -https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf -https://github.com/aliasrobotics/RVD/issues/1495 -https://github.com/aliasrobotics/RVD/issues/3316 -https://github.com/alibaba/nacos/issues/4463 -https://github.com/alipay/sofa-hessian/issues/34 -https://github.com/alixiaowei/cve_test/issues/2 -https://github.com/alixiaowei/cve_test/issues/3 -https://github.com/ally-petitt/CVE-2023-40362 -https://github.com/ally-petitt/CVE-2024-27631 -https://github.com/ally-petitt/CVE-2024-29399 -https://github.com/alorfm/vuln/blob/master/qibosoft_cross_Site_Scripting.md -https://github.com/alt3kx/CVE-2019-10685 -https://github.com/alterebro/WeaselCMS/issues/6 -https://github.com/alwentiu/COVIDSafe-CVE-2020-12856/blob/master/README.md -https://github.com/aman05382/movie_ticket_booking_system_php/issues/2 -https://github.com/aman05382/movie_ticket_booking_system_php/issues/3 -https://github.com/aman05382/movie_ticket_booking_system_php/issues/4 -https://github.com/amdsyad/poc-dump/blob/main/Stored%20XSS%20in%20name%20parameter%20in%20Centreon%20version%2022.04.0 -https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639 -https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8 -https://github.com/amplafi/htmlcleaner/issues/13 -https://github.com/an0ry/advisories/blob/main/CVE-2020-17381.md -https://github.com/andreas83/SocialNetwork/issues/84 -https://github.com/andreysanyuk/CVE-2023-42283 -https://github.com/andreysanyuk/CVE-2023-42284 -https://github.com/andsnw/sockjs-dos-py -https://github.com/anh91/uasoft-indonesia--badaso/blob/main/xss5.md -https://github.com/anhdq201/netbox/issues/1 -https://github.com/anhdq201/netbox/issues/10 -https://github.com/anhdq201/netbox/issues/11 -https://github.com/anhdq201/netbox/issues/12 -https://github.com/anhdq201/netbox/issues/13 -https://github.com/anhdq201/netbox/issues/14 -https://github.com/anhdq201/netbox/issues/15 -https://github.com/anhdq201/netbox/issues/16 -https://github.com/anhdq201/netbox/issues/2 -https://github.com/anhdq201/netbox/issues/3 -https://github.com/anhdq201/netbox/issues/4 -https://github.com/anhdq201/netbox/issues/5 -https://github.com/anhdq201/netbox/issues/6 -https://github.com/anhdq201/netbox/issues/7 -https://github.com/anhdq201/netbox/issues/8 -https://github.com/anhdq201/netbox/issues/9 -https://github.com/anhdq201/rukovoditel/issues/1 -https://github.com/anhdq201/rukovoditel/issues/10 -https://github.com/anhdq201/rukovoditel/issues/11 -https://github.com/anhdq201/rukovoditel/issues/12 -https://github.com/anhdq201/rukovoditel/issues/13 -https://github.com/anhdq201/rukovoditel/issues/14 -https://github.com/anhdq201/rukovoditel/issues/15 -https://github.com/anhdq201/rukovoditel/issues/16 -https://github.com/anhdq201/rukovoditel/issues/2 -https://github.com/anhdq201/rukovoditel/issues/3 -https://github.com/anhdq201/rukovoditel/issues/4 -https://github.com/anhdq201/rukovoditel/issues/5 -https://github.com/anhdq201/rukovoditel/issues/6 -https://github.com/anhdq201/rukovoditel/issues/7 -https://github.com/anhdq201/rukovoditel/issues/8 -https://github.com/anhdq201/rukovoditel/issues/9 -https://github.com/anhdq201/webtareas/issues/1 -https://github.com/anhdq201/webtareas/issues/10 -https://github.com/anhdq201/webtareas/issues/11 -https://github.com/anhdq201/webtareas/issues/12 -https://github.com/anhdq201/webtareas/issues/2 -https://github.com/anhdq201/webtareas/issues/3 -https://github.com/anhdq201/webtareas/issues/4 -https://github.com/anhdq201/webtareas/issues/5 -https://github.com/anhdq201/webtareas/issues/6 -https://github.com/anhdq201/webtareas/issues/7 -https://github.com/anhdq201/webtareas/issues/8 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x0022204C -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222050 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222088 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220E4 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220e0 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222100 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222104 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222548 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222550 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222014 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222040 -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NsProtect.sys-x64-0x8000200D -https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NsProtect.sys-x64-0x80002019 -https://github.com/anji-plus/report/files/15363269/aj-report.pdf -https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS -https://github.com/ansible/ansible-modules-extras/pull/1941 -https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4 -https://github.com/ansilove/libansilove/issues/4 -https://github.com/ant-design/ant-design-pro/pull/5461 -https://github.com/antirez/kilo/issues/60 -https://github.com/antirez/redis/blob/3.2/00-RELEASENOTES -https://github.com/antirez/redis/issues/2855 -https://github.com/antirez/redis/pull/6875 -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23298.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23299.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23300.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23301.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23302.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23303.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23304.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23305.md -https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23306.md -https://github.com/anvilsecure/gog-galaxy-app-research -https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50914%20-%20LPE.md -https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50915%20-%20DoS.md -https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-SQL%20injections.md -https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md -https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md -https://github.com/apexcharts/apexcharts.js/pull/2158 -https://github.com/appneta/tcpreplay/issues/278 -https://github.com/appneta/tcpreplay/issues/477 -https://github.com/appneta/tcpreplay/issues/485 -https://github.com/appneta/tcpreplay/issues/486 -https://github.com/appneta/tcpreplay/issues/530 -https://github.com/appneta/tcpreplay/issues/536 -https://github.com/appneta/tcpreplay/issues/537 -https://github.com/appneta/tcpreplay/issues/538 -https://github.com/appneta/tcpreplay/issues/556 -https://github.com/appneta/tcpreplay/issues/576 -https://github.com/appneta/tcpreplay/issues/579 -https://github.com/appneta/tcpreplay/issues/616 -https://github.com/appneta/tcpreplay/issues/617 -https://github.com/appneta/tcpreplay/issues/687 -https://github.com/appneta/tcpreplay/issues/716 -https://github.com/appneta/tcpreplay/issues/717 -https://github.com/appneta/tcpreplay/issues/718 -https://github.com/appneta/tcpreplay/issues/719 -https://github.com/appneta/tcpreplay/issues/734 -https://github.com/appneta/tcpreplay/issues/735 -https://github.com/appneta/tcpreplay/issues/736 -https://github.com/appneta/tcpreplay/issues/787 -https://github.com/appneta/tcpreplay/issues/813 -https://github.com/arachnys/cabot/pull/694 -https://github.com/arbahayoub/POC/blob/master/itop_command_injection_1.txt -https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454 -https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7 -https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr -https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv -https://github.com/argoproj/argo-workflows/issues/6441 -https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 -https://github.com/armink/struct2json/issues/13 -https://github.com/arrow-kt/ank/issues/35 -https://github.com/arrow-kt/arrow/issues/1310 -https://github.com/artdarek/go-unzip/pull/2 -https://github.com/artkond/cisco-snmp-rce -https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.md -https://github.com/arvandy/CVE/blob/main/NotrinosERP/POC.md -https://github.com/arvidn/libtorrent/issues/2099 -https://github.com/aslanemre/CVE-2020-29364/blob/main/CVE-2020-29364 -https://github.com/assimp/assimp/issues/4286 -https://github.com/assimp/assimp/issues/4662 -https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 -https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf -https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0004.md -https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md -https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md -https://github.com/atutor/ATutor/issues/129 -https://github.com/atutor/ATutor/issues/135 -https://github.com/auracms/AuraCMS/issues/3 -https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 -https://github.com/avo-hq/avo/security/advisories/GHSA-86h2-2g4g-29qx -https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh -https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h -https://github.com/awake1t/linglong -https://github.com/awslabs/aws-js-s3-explorer/issues/118 -https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip -https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip -https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip -https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip -https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip -https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip -https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip -https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip -https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip -https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip -https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip -https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip -https://github.com/axiomatic-systems/Bento4/issues/181 -https://github.com/axiomatic-systems/Bento4/issues/182 -https://github.com/axiomatic-systems/Bento4/issues/183 -https://github.com/axiomatic-systems/Bento4/issues/184 -https://github.com/axiomatic-systems/Bento4/issues/185 -https://github.com/axiomatic-systems/Bento4/issues/187 -https://github.com/axiomatic-systems/Bento4/issues/188 -https://github.com/axiomatic-systems/Bento4/issues/190 -https://github.com/axiomatic-systems/Bento4/issues/204 -https://github.com/axiomatic-systems/Bento4/issues/233 -https://github.com/axiomatic-systems/Bento4/issues/289 -https://github.com/axiomatic-systems/Bento4/issues/291 -https://github.com/axiomatic-systems/Bento4/issues/292 -https://github.com/axiomatic-systems/Bento4/issues/341 -https://github.com/axiomatic-systems/Bento4/issues/342 -https://github.com/axiomatic-systems/Bento4/issues/343 -https://github.com/axiomatic-systems/Bento4/issues/345 -https://github.com/axiomatic-systems/Bento4/issues/350 -https://github.com/axiomatic-systems/Bento4/issues/351 -https://github.com/axiomatic-systems/Bento4/issues/354 -https://github.com/axiomatic-systems/Bento4/issues/355 -https://github.com/axiomatic-systems/Bento4/issues/357 -https://github.com/axiomatic-systems/Bento4/issues/361 -https://github.com/axiomatic-systems/Bento4/issues/363 -https://github.com/axiomatic-systems/Bento4/issues/364 -https://github.com/axiomatic-systems/Bento4/issues/366 -https://github.com/axiomatic-systems/Bento4/issues/374 -https://github.com/axiomatic-systems/Bento4/issues/390 -https://github.com/axiomatic-systems/Bento4/issues/408 -https://github.com/axiomatic-systems/Bento4/issues/413 -https://github.com/axiomatic-systems/Bento4/issues/414 -https://github.com/axiomatic-systems/Bento4/issues/415 -https://github.com/axiomatic-systems/Bento4/issues/416 -https://github.com/axiomatic-systems/Bento4/issues/417 -https://github.com/axiomatic-systems/Bento4/issues/418 -https://github.com/axiomatic-systems/Bento4/issues/422 -https://github.com/axiomatic-systems/Bento4/issues/434 -https://github.com/axiomatic-systems/Bento4/issues/435 -https://github.com/axiomatic-systems/Bento4/issues/436 -https://github.com/axiomatic-systems/Bento4/issues/437 -https://github.com/axiomatic-systems/Bento4/issues/461 -https://github.com/axiomatic-systems/Bento4/issues/462 -https://github.com/axiomatic-systems/Bento4/issues/540 -https://github.com/axiomatic-systems/Bento4/issues/545 -https://github.com/axiomatic-systems/Bento4/issues/615 -https://github.com/axiomatic-systems/Bento4/issues/616 -https://github.com/axiomatic-systems/Bento4/issues/643 -https://github.com/axiomatic-systems/Bento4/issues/677 -https://github.com/axiomatic-systems/Bento4/issues/691 -https://github.com/axiomatic-systems/Bento4/issues/702 -https://github.com/axiomatic-systems/Bento4/issues/703 -https://github.com/axiomatic-systems/Bento4/issues/708 -https://github.com/axiomatic-systems/Bento4/issues/712 -https://github.com/axiomatic-systems/Bento4/issues/755 -https://github.com/axiomatic-systems/Bento4/issues/756 -https://github.com/axiomatic-systems/Bento4/issues/757 -https://github.com/axiomatic-systems/Bento4/issues/758 -https://github.com/axiomatic-systems/Bento4/issues/766 -https://github.com/axiomatic-systems/Bento4/issues/767 -https://github.com/axiomatic-systems/Bento4/issues/768 -https://github.com/axiomatic-systems/Bento4/issues/770 -https://github.com/axiomatic-systems/Bento4/issues/772 -https://github.com/axiomatic-systems/Bento4/issues/773 -https://github.com/axiomatic-systems/Bento4/issues/775 -https://github.com/axiomatic-systems/Bento4/issues/776 -https://github.com/axiomatic-systems/Bento4/issues/779 -https://github.com/axiomatic-systems/Bento4/issues/780 -https://github.com/axiomatic-systems/Bento4/issues/784 -https://github.com/axiomatic-systems/Bento4/issues/792 -https://github.com/axiomatic-systems/Bento4/issues/793 -https://github.com/axiomatic-systems/Bento4/issues/794 -https://github.com/axiomatic-systems/Bento4/issues/800 -https://github.com/axiomatic-systems/Bento4/issues/802 -https://github.com/axiomatic-systems/Bento4/issues/806 -https://github.com/axiomatic-systems/Bento4/issues/812 -https://github.com/axiomatic-systems/Bento4/issues/840 -https://github.com/axiomatic-systems/Bento4/issues/841 -https://github.com/axiomatic-systems/Bento4/issues/842 -https://github.com/axiomatic-systems/Bento4/issues/844 -https://github.com/axiomatic-systems/Bento4/issues/872 -https://github.com/axiomatic-systems/Bento4/issues/873 -https://github.com/axiomatic-systems/Bento4/issues/874 -https://github.com/axiomatic-systems/Bento4/issues/919 -https://github.com/axiomatic-systems/Bento4/issues/937 -https://github.com/axiomatic-systems/Bento4/issues/939 -https://github.com/axiomatic-systems/Bento4/issues/941 -https://github.com/axiomatic-systems/bento4/issues/408 -https://github.com/axiomatic-systems/bento4/issues/409 -https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x -https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27703/README.md -https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md -https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28435 -https://github.com/b17fr13nds/MPlayer_cve_poc -https://github.com/b1ackc4t/MarsCTF/issues/10 -https://github.com/b51s77/cve/blob/main/sql.md -https://github.com/badboycxcc/SolarView_Compact_6.0_xss -https://github.com/badboycxcc/nuuo-xss/blob/main/README.md -https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability -https://github.com/bagesoft/bagecms/issues/2 -https://github.com/bagesoft/bagecms/issues/5 -https://github.com/baigoStudio/baigoCMS/issues/7 -https://github.com/baigoStudio/baigoCMS/issues/8 -https://github.com/baigoStudio/baigoCMS/issues/9 -https://github.com/baigoStudio/baigoSSO/issues/13 -https://github.com/baijiacms/baijiacmsV4/issues/2 -https://github.com/baijiacms/baijiacmsV4/issues/7 -https://github.com/baker221/poc-xpdf -https://github.com/balderdashy/sails/issues/7209 -https://github.com/balloonwj/flamingo/issues/47 -https://github.com/balloonwj/flamingo/issues/48 -https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73 -https://github.com/barneycarroll/npm-dependency-versions/issues/6 -https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl -https://github.com/bayuncao/vul-cve-5/blob/main/poc.py -https://github.com/bayuncao/vul-cve-6/blob/main/poc.py -https://github.com/bazad/ctl_ctloutput-leak -https://github.com/bbalet/jorani/issues/254 -https://github.com/bbatsov/rubocop/issues/4336 -https://github.com/bbbrumley/portsmash -https://github.com/bbengfort/confire/issues/24 -https://github.com/bcit-ci/CodeIgniter/issues/4020 -https://github.com/bcit-ci/CodeIgniter/issues/4963 -https://github.com/bearman113/1.md/blob/main/16/csrf.md -https://github.com/bearman113/1.md/blob/main/17/csrf.md -https://github.com/bearman113/1.md/blob/main/18/csrf.md -https://github.com/bearman113/1.md/blob/main/19/csrf.md -https://github.com/bearman113/1.md/blob/main/20/csrf.md -https://github.com/bearman113/1.md/blob/main/21/csrf.md -https://github.com/bearman113/1.md/blob/main/22/csrf.md -https://github.com/bearman113/1.md/blob/main/23/csrf.md -https://github.com/bearman113/1.md/blob/main/24/csrf.md -https://github.com/bearman113/1.md/blob/main/25/csrf.md -https://github.com/bearman113/1.md/blob/main/26/csrf.md -https://github.com/bearman113/1.md/blob/main/27/csrf.md -https://github.com/becpn/mozilocms -https://github.com/beego/beego/issues/4484 -https://github.com/beekeeper-studio/beekeeper-studio/issues/1393 -https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/file_upload_RCE/File_upload_to_RCE.md -https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md -https://github.com/beerpwn/CVE/tree/master/WP-File-Upload_disclosure_report/ -https://github.com/beerpwn/ctf/blob/master/CVE/CVE-2019-13571/report.pdf -https://github.com/beerpwn/ctf/tree/master/CVE/CVE-2019-13571 -https://github.com/bellard/quickjs/issues/178 -https://github.com/bellard/quickjs/issues/277 -https://github.com/beraoudabdelkhalek/research/tree/main/CVEs/CVE-2024-0720 -https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md -https://github.com/bettershop/LaikeTui/issues/8 -https://github.com/beyond7176/njiandan-cms/issues/1 -https://github.com/bg5sbk/MiniCMS/issues/14 -https://github.com/bg5sbk/MiniCMS/issues/15 -https://github.com/bg5sbk/MiniCMS/issues/20 -https://github.com/bg5sbk/MiniCMS/issues/21 -https://github.com/bg5sbk/MiniCMS/issues/22 -https://github.com/bg5sbk/MiniCMS/issues/25 -https://github.com/bg5sbk/MiniCMS/issues/29 -https://github.com/bg5sbk/MiniCMS/issues/31 -https://github.com/bg5sbk/MiniCMS/issues/32 -https://github.com/bg5sbk/MiniCMS/issues/45 -https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt -https://github.com/bi7s/CVE/blob/master/CVE-2019-15943/README.md -https://github.com/bi7s/CVE/tree/master/CVE-2019-16294 -https://github.com/biantaibao/cms/blob/main/1.md -https://github.com/biantaibao/octopus_SQL2/blob/main/report.md -https://github.com/biantaibao/snow_SQL/blob/main/report.md -https://github.com/bigb0x/CVEs/blob/main/Inout-Homestay-2-2-sqli.md -https://github.com/bigbigbigbaby/cms2/blob/main/1.md -https://github.com/bigric3/poc -https://github.com/bigric3/poc2 -https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf -https://github.com/bigtreecms/BigTree-CMS/issues/275 -https://github.com/bigtreecms/BigTree-CMS/issues/287 -https://github.com/bigtreecms/BigTree-CMS/issues/288 -https://github.com/bigtreecms/BigTree-CMS/issues/289 -https://github.com/bigtreecms/BigTree-CMS/issues/290 -https://github.com/bigtreecms/BigTree-CMS/issues/291 -https://github.com/bigtreecms/BigTree-CMS/issues/292 -https://github.com/bigtreecms/BigTree-CMS/issues/293 -https://github.com/bigtreecms/BigTree-CMS/issues/294 -https://github.com/bigtreecms/BigTree-CMS/issues/295 -https://github.com/bigtreecms/BigTree-CMS/issues/296 -https://github.com/bigtreecms/BigTree-CMS/issues/297 -https://github.com/bigtreecms/BigTree-CMS/issues/298 -https://github.com/bigtreecms/BigTree-CMS/issues/323 -https://github.com/bigtreecms/BigTree-CMS/issues/327 -https://github.com/bigtreecms/BigTree-CMS/issues/333 -https://github.com/bigtreecms/BigTree-CMS/issues/342 -https://github.com/bigtreecms/BigTree-CMS/issues/364 -https://github.com/bigtreecms/BigTree-CMS/issues/392 -https://github.com/bitfu/sricam-gsoap2.8-dos-exploit -https://github.com/bitfu/uc-httpd-1.0.0-buffer-overflow-exploit -https://github.com/bitovi/launchpad/pull/124 -https://github.com/bitwarden/jslib/issues/52 -https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956 -https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-12606 -https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-28657 -https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-35577 -https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33208 -https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33523 -https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33581 -https://github.com/blackarrowsec/advisories/tree/master/2022/CVE-2022-43216 -https://github.com/blackjliuyun/cvetest/issues/1 -https://github.com/blacksmithgu/obsidian-dataview/issues/615 -https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md -https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md -https://github.com/blakeblackshear/frigate/security/advisories/GHSA-qp3h-4q62-p428 -https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h -https://github.com/blindkey/DedeCMSv5/issues/1 -https://github.com/blindkey/cve_like/issues/10 -https://github.com/blindkey/cve_like/issues/11 -https://github.com/blindkey/cve_like/issues/12 -https://github.com/blindkey/cve_like/issues/13 -https://github.com/blindkey/cve_like/issues/4 -https://github.com/blindkey/cve_like/issues/6 -https://github.com/bludit/bludit/issues/1132 -https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 -https://github.com/bludit/bludit/issues/1509 -https://github.com/bludit/bludit/issues/812 -https://github.com/bludit/bludit/pull/1090 -https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md -https://github.com/bluecity/CMS/blob/master/niushop%20v1.11-passwd/Niushop%20V1.11.md -https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q -https://github.com/bmantra/bmantra.github.io/blob/master/logmx/logmx.html -https://github.com/bnbdr/swisscheese -https://github.com/bnbdr/swisscheese/ -https://github.com/bnbdr/wd-rce/ -https://github.com/bndr/pipreqs/pull/364 -https://github.com/bobfuzzer/CVE-2019-18885 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19037 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19815 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816 -https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927 -https://github.com/boiteasite/cmsuno/issues/15 -https://github.com/boku7/CVE-2020-23839 -https://github.com/brackeen/ok-file-formats/issues/11 -https://github.com/brackeen/ok-file-formats/issues/12 -https://github.com/brackeen/ok-file-formats/issues/13 -https://github.com/brackeen/ok-file-formats/issues/15 -https://github.com/brackeen/ok-file-formats/issues/17 -https://github.com/brackeen/ok-file-formats/issues/18 -https://github.com/brackeen/ok-file-formats/issues/19 -https://github.com/brackeen/ok-file-formats/issues/5 -https://github.com/brackeen/ok-file-formats/issues/6 -https://github.com/brackeen/ok-file-formats/issues/7 -https://github.com/brackeen/ok-file-formats/issues/8 -https://github.com/brandon-t-elliott/CVE-2023-49438 -https://github.com/brave/browser-laptop/issues/5006 -https://github.com/brave/browser-laptop/issues/5007 -https://github.com/breaktoprotect/CVE-2017-12615 -https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection -https://github.com/brechtsanders/xlsxio/issues/121 -https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w -https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r -https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r -https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 -https://github.com/brendan-duncan/archive/issues/266 -https://github.com/brianmario/yajl-ruby/issues/176 -https://github.com/brycebaril/node-flatnest/issues/4 -https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md -https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20UPLOAD%20FILE%20XSS.md -https://github.com/butterflyhack/anchorcms-0.12.7-CSRF -https://github.com/buxu/bug/issues/2 -https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726 -https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346 -https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23345 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23346 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23348 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23349 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23350 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352 -https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-26281 -https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md -https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-26542/README.md -https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 -https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23756 -https://github.com/c0n5n3d/CVE-2021-43657/blob/main/Info.txt -https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md -https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md -https://github.com/c53elyas/CVE-2023-33733 -https://github.com/c610/free/ -https://github.com/c610/tmp/blob/master/aRtiCE.py -https://github.com/c610/tmp/blob/master/zenload4patreons.zip -https://github.com/cBioPortal/cbioportal/issues/8680 -https://github.com/cacalabs/libcaca/issues/53 -https://github.com/cacalabs/libcaca/issues/54 -https://github.com/cacalabs/libcaca/issues/65 -https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p -https://github.com/caffeinated-labs/CVE-2023-36644 -https://github.com/cainiao159357/x5000r_poc/blob/main/README.md -https://github.com/caiteli/poc_information/blob/main/southsoft_GMIS.txt -https://github.com/caiteli/poc_information/issues/1 -https://github.com/caokang/waimai/issues/2 -https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331 -https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334 -https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332 -https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330 -https://github.com/capture0x/CSZ_CMS -https://github.com/capture0x/Phoenix -https://github.com/cardgate/magento2/issues/54 -https://github.com/cardgate/woocommerce/issues/18 -https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4 -https://github.com/carsonchan12345/CVE-2024-35475 -https://github.com/carsonchan12345/OpenKM-CSRF-PoC -https://github.com/casdoor/casdoor/issues/1171 -https://github.com/casdoor/casdoor/issues/439 -https://github.com/casdoor/casdoor/pull/442 -https://github.com/casgate/casgate/security/advisories/GHSA-mj5q-rc67-h56c -https://github.com/cby234/cve_request/issues/1 -https://github.com/cby234/cve_request/issues/2 -https://github.com/cby234/zzcms/issues/1 -https://github.com/cby234/zzcms/issues/2 -https://github.com/cby234/zzcms/issues/3 -https://github.com/cby234/zzcms/issues/4 -https://github.com/cby234/zzcms/issues/5 -https://github.com/cc-crack/router/blob/master/CNVD-2018-04520.py -https://github.com/cc-crack/router/blob/master/CNVD-2018-04521.py -https://github.com/cc-crack/router/blob/master/motocx2.md -https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2 -https://github.com/cccaaasser/1CRM-CVE/blob/master/CVE-2019-14221.md -https://github.com/ccxvii/mujs/issues/133 -https://github.com/ccxvii/mujs/issues/134 -https://github.com/ccxvii/mujs/issues/136 -https://github.com/ccxvii/mujs/issues/148 -https://github.com/ccxvii/mujs/issues/161 -https://github.com/cdfan/my-admin/issues/3 -https://github.com/cebe/markdown/issues/166 -https://github.com/cebe/markdown/issues/166#issuecomment-508230493 -https://github.com/ceng-yildirim/LFI-processwire -https://github.com/centreon/centreon/security/policy -https://github.com/cesanta/mjs/issues/135 -https://github.com/cesanta/mjs/issues/136 -https://github.com/cesanta/mjs/issues/158 -https://github.com/cesanta/mjs/issues/159 -https://github.com/cesanta/mjs/issues/160 -https://github.com/cesanta/mjs/issues/161 -https://github.com/cesanta/mjs/issues/162 -https://github.com/cesanta/mjs/issues/163 -https://github.com/cesanta/mjs/issues/164 -https://github.com/cesanta/mjs/issues/165 -https://github.com/cesanta/mjs/issues/166 -https://github.com/cesanta/mjs/issues/167 -https://github.com/cesanta/mjs/issues/168 -https://github.com/cesanta/mjs/issues/169 -https://github.com/cesanta/mjs/issues/170 -https://github.com/cesanta/mjs/issues/175 -https://github.com/cesanta/mjs/issues/183 -https://github.com/cesanta/mjs/issues/184 -https://github.com/cesanta/mjs/issues/186 -https://github.com/cesanta/mjs/issues/187 -https://github.com/cesanta/mjs/issues/188 -https://github.com/cesanta/mjs/issues/189 -https://github.com/cesanta/mjs/issues/191 -https://github.com/cesanta/mjs/issues/193 -https://github.com/cesanta/mjs/issues/195 -https://github.com/cesanta/mjs/issues/196 -https://github.com/cesanta/mjs/issues/197 -https://github.com/cesanta/mjs/issues/198 -https://github.com/cesanta/mjs/issues/199 -https://github.com/cesanta/mjs/issues/200 -https://github.com/cesanta/mjs/issues/201 -https://github.com/cesanta/mjs/issues/202 -https://github.com/cesanta/mjs/issues/203 -https://github.com/cesanta/mjs/issues/204 -https://github.com/cesanta/mjs/issues/206 -https://github.com/cesanta/mjs/issues/208 -https://github.com/cesanta/mjs/issues/209 -https://github.com/cesanta/mjs/issues/210 -https://github.com/cesanta/mjs/issues/212 -https://github.com/cesanta/mjs/issues/213 -https://github.com/cesanta/mjs/issues/214 -https://github.com/cesanta/mjs/issues/215 -https://github.com/cesanta/mjs/issues/217 -https://github.com/cesanta/mjs/issues/218 -https://github.com/cesanta/mjs/issues/219 -https://github.com/cesanta/mjs/issues/220 -https://github.com/cesanta/mjs/issues/221 -https://github.com/cesanta/mjs/issues/224 -https://github.com/cesanta/mjs/issues/226 -https://github.com/cesanta/mjs/issues/228 -https://github.com/cesanta/mjs/issues/229 -https://github.com/cesanta/mjs/issues/240 -https://github.com/cesanta/mjs/issues/241 -https://github.com/cesanta/mjs/issues/250 -https://github.com/cesanta/mjs/issues/252 -https://github.com/cesanta/mjs/issues/257 -https://github.com/cesanta/mjs/issues/286 -https://github.com/cesanta/mjs/issues/287 -https://github.com/cesanta/mjs/issues/288 -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS(XSS).md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS--.md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(XSS).md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System--.md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI).md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(XSS).md -https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System--.md -https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5 -https://github.com/chainguard-dev/apko/security/advisories/GHSA-v6mg-7f7p-qmqp -https://github.com/chakra-core/ChakraCore/issues/6887 -https://github.com/chakra-core/ChakraCore/issues/6888 -https://github.com/chbrown/rfc6902/pull/76 -https://github.com/che-my/fastadmin-tp6/issues/2 -https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc -https://github.com/chekun/DiliCMS/issues/59 -https://github.com/chekun/DiliCMS/issues/60 -https://github.com/chemcms/ChemCMS/issues/1 -https://github.com/chemcms/ChemCMS/issues/2 -https://github.com/chenan224/webchess_sqli_poc -https://github.com/chendotjs/lotos/issues/7 -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15910.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15911.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15912_1.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15912_2.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15913.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15914_1.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15914_2.md -https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15915.md -https://github.com/cherokee/webserver/issues/1221 -https://github.com/cherokee/webserver/issues/1222 -https://github.com/cherokee/webserver/issues/1224 -https://github.com/cherokee/webserver/issues/1225 -https://github.com/cherokee/webserver/issues/1226 -https://github.com/cherokee/webserver/issues/1227 -https://github.com/cherryla/zzcms/blob/master/adv.php.md -https://github.com/chjj/marked/issues/937 -https://github.com/chocolate-doom/chocolate-doom/issues/1293 -https://github.com/choregus/puppyCMS/issues/13 -https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md -https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh -https://github.com/chshcms/cscms/issues/12#issue-1170440183 -https://github.com/chshcms/cscms/issues/2 -https://github.com/chshcms/cscms/issues/20#issue-1207634969 -https://github.com/chshcms/cscms/issues/21#issue-1207638326 -https://github.com/chshcms/cscms/issues/22#issue-1207641519 -https://github.com/chshcms/cscms/issues/23#issue-1207644525 -https://github.com/chshcms/cscms/issues/24#issue-1207646618 -https://github.com/chshcms/cscms/issues/25#issue-1207649017 -https://github.com/chshcms/cscms/issues/26#issue-1207651726 -https://github.com/chshcms/cscms/issues/27#issue-1209040138 -https://github.com/chshcms/cscms/issues/28#issue-1209044410 -https://github.com/chshcms/cscms/issues/29#issue-1209046027 -https://github.com/chshcms/cscms/issues/3 -https://github.com/chshcms/cscms/issues/30#issue-1209049714 -https://github.com/chshcms/cscms/issues/31#issue-1209052957 -https://github.com/chshcms/cscms/issues/32#issue-1209054307 -https://github.com/chshcms/cscms/issues/33#issue-1209055493 -https://github.com/chshcms/cscms/issues/34#issue-1209056912 -https://github.com/chshcms/cscms/issues/35#issue-1209058818 -https://github.com/chshcms/cscms/issues/36#issue-1209060196 -https://github.com/chshcms/cscms/issues/37 -https://github.com/chshcms/cscms/issues/4 -https://github.com/chucrutis/CVE-2024-32369 -https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt -https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/01/README.md -https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md -https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md -https://github.com/cilan2/iot/blob/main/4.md -https://github.com/cinecert/asdcplib/issues/138 -https://github.com/ciph0x01/poc/blob/main/poc.html -https://github.com/ciur/papermerge/issues/228 -https://github.com/cjvnjde/google-translate-api-browser/security/advisories/GHSA-4233-7q5q-m7p6 -https://github.com/ckolivas/lrzip/issues/108 -https://github.com/ckolivas/lrzip/issues/163 -https://github.com/ckolivas/lrzip/issues/164 -https://github.com/ckolivas/lrzip/issues/165 -https://github.com/ckolivas/lrzip/issues/198 -https://github.com/ckolivas/lrzip/issues/199 -https://github.com/ckolivas/lrzip/issues/206 -https://github.com/ckolivas/lrzip/issues/246 -https://github.com/ckolivas/lrzip/issues/66 -https://github.com/ckolivas/lrzip/issues/67 -https://github.com/ckolivas/lrzip/issues/68 -https://github.com/ckolivas/lrzip/issues/69 -https://github.com/ckolivas/lrzip/issues/70 -https://github.com/ckolivas/lrzip/issues/71 -https://github.com/ckolivas/lrzip/issues/88 -https://github.com/ckolivas/lrzip/issues/90 -https://github.com/ckolivas/lrzip/issues/91 -https://github.com/ckolivas/lrzip/issues/93 -https://github.com/ckolivas/lrzip/issues/95 -https://github.com/ckolivas/lrzip/issues/96 -https://github.com/cksgf/ServerManagement/issues/21 -https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md -https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation -https://github.com/clarkgrubb/data-tools/issues/7 -https://github.com/claudiodangelis/qrcp/issues/223 -https://github.com/claviska/simple-php-captcha/issues/16 -https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47 -https://github.com/closethe/AG550QCN_CommandInjection_ql_atfwd/blob/main/README.md -https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898 -https://github.com/cloudwebsoft/ywoa/issues/25 -https://github.com/cloudwu/pbc/issues/158 -https://github.com/cnvs/canvas/issues/331 -https://github.com/cobbler/cobbler/issues/1917 -https://github.com/cobub/razor/issues/168 -https://github.com/cobub/razor/issues/178 -https://github.com/cockpit-project/cockpit/issues/15077 -https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake -https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/Asus_DeleteOfflineClientOverflow.txt -https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md -https://github.com/combust/mleap/pull/866#issuecomment-1738032225 -https://github.com/concrete5/concrete5-legacy/issues/1948 -https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/74cms.docx -https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/douphp_xss.docx -https://github.com/contentful/the-example-app.py/issues/44 -https://github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv -https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt -https://github.com/convos-chat/convos/issues/623 -https://github.com/cooltey/C.P.Sub/issues/2 -https://github.com/cooltey/C.P.Sub/issues/3 -https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h -https://github.com/corelight/callstranger-detector -https://github.com/coreos/etcd/issues/9353 -https://github.com/coreruleset/coreruleset/pull/1793 -https://github.com/cozis/xHTTP/issues/1 -https://github.com/cpeggg/Netgear-upnpd-poc -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20217/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20230/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20231/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20248/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20249/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20250/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20252/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-36522/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md -https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md -https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_dot1x/README.md -https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_ipsec/README.md -https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_2/README.md -https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_4/README.md -https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_netwatch/README.md -https://github.com/cqliuke/cve/blob/main/sql.md -https://github.com/crafatar/crafatar/security/advisories/GHSA-5cxq-25mp-q5f2 -https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9 -https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr -https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5 -https://github.com/craftcms/cms/security/advisories/GHSA-qcrj-6ffc-v7hq -https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x -https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c -https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96 -https://github.com/crater-invoice/crater/issues/1267 -https://github.com/creditease-sec/insight/issues/42 -https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j -https://github.com/crmeb/CRMEB/issues/22 -https://github.com/cryptomator/cryptomator/security/advisories/GHSA-62gx-54j7-mjh3 -https://github.com/cryptomator/cryptomator/security/advisories/GHSA-9c9p-c3mg-hpjq -https://github.com/cryptonotefoundation/cryptonote/issues/172 -https://github.com/cskaza/cszcms/issues/17 -https://github.com/cskaza/cszcms/issues/28 -https://github.com/cskaza/cszcms/issues/29 -https://github.com/cskaza/cszcms/issues/32 -https://github.com/ctflearner/Android_Findings/blob/main/AndroidWeatherApp/Android_backup.md -https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Musicshelf_Manifest_issue.md -https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md -https://github.com/ctflearner/Android_Findings/blob/main/Replify-Messenger/Backup.md -https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md -https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md -https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md -https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md -https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md -https://github.com/ctflearner/Vulnerability/blob/main/MINICAL/minical.md -https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md -https://github.com/ctflearner/Vulnerability/blob/main/PHPIPAM/Open_Redirect.md -https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md -https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md -https://github.com/ctflearner/Vulnerability/blob/main/WALLABAG/NAME-LIMIT.md -https://github.com/ctripcorp/apollo/issues/2103 -https://github.com/cugerQDHJ/cve/blob/main/rce.md -https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md -https://github.com/cui2shark/security/blob/main/(JFinalcms%20contact%20para)A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20Jfinalcms%20contact%20para.md -https://github.com/cui2shark/security/blob/main/A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20beetl-bbs%20post%20save.md -https://github.com/cui2shark/security/blob/main/Added%20CSRF%20in%20Role%20Controller.md -https://github.com/cui2shark/security/blob/main/beetl-bbs%20-%20A%20reflected%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20the%20search%20box.md -https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 -https://github.com/curlyboi/hashtopus/issues/63 -https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md -https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md -https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md -https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md -https://github.com/cve-vul/vul/blob/master/FTPShell/FTPShell_Server_6.83_DOS.md -https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf -https://github.com/cyb3r-n3rd/cve-request/blob/main/cve-poc-payload -https://github.com/cybersecurityworks/Disclosed/issues/1 -https://github.com/cybersecurityworks/Disclosed/issues/11 -https://github.com/cybersecurityworks/Disclosed/issues/12 -https://github.com/cybersecurityworks/Disclosed/issues/13 -https://github.com/cybersecurityworks/Disclosed/issues/14 -https://github.com/cybersecurityworks/Disclosed/issues/15 -https://github.com/cybersecurityworks/Disclosed/issues/16 -https://github.com/cybersecurityworks/Disclosed/issues/17 -https://github.com/cybersecurityworks/Disclosed/issues/18 -https://github.com/cybersecurityworks/Disclosed/issues/19 -https://github.com/cybersecurityworks/Disclosed/issues/2 -https://github.com/cybersecurityworks/Disclosed/issues/20 -https://github.com/cybersecurityworks/Disclosed/issues/21 -https://github.com/cybersecurityworks/Disclosed/issues/22 -https://github.com/cybersecurityworks/Disclosed/issues/23 -https://github.com/cybersecurityworks/Disclosed/issues/24 -https://github.com/cybersecurityworks/Disclosed/issues/25 -https://github.com/cybersecurityworks/Disclosed/issues/26 -https://github.com/cybersecurityworks/Disclosed/issues/3 -https://github.com/cybersecurityworks/Disclosed/issues/4 -https://github.com/cybersecurityworks/Disclosed/issues/5 -https://github.com/cybersecurityworks/Disclosed/issues/6 -https://github.com/cybersecurityworks/Disclosed/issues/7 -https://github.com/cybersecurityworks/Disclosed/issues/8 -https://github.com/cybersecurityworks/Disclosed/issues/9 -https://github.com/d00rt/pedicom -https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_(DICOM)_file_format_standard_-_Markel_Picado_Ortiz_(d00rt).pdf -https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md -https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/GetParentControlInfo/readme.md -https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/form_fast_setting_wifi_set/readme.md -https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromAdvSetMacMtuWan/readme.md -https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/A18/formAddMacfilterRule -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetVirtualSer -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetRouteStatic -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetWifiGusetBasic -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formGetPassengerAnalyseData -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAPCfg -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAccessCodeInfo -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetStoreWeb -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formdelMasteraclist -https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/fromDhcpListClient -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/1.setWiFiAclAddConfig -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/2.setPortForwardRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/4.setMacFilterRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/5.setStaticDhcpConfig -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/6.setWiFiRepeaterConfig -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/7.UploadCustomModule -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/8.setIpPortFilterRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/9.setUrlFilterRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/1.setIpPortFilterRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/10.setTracerouteCfg -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/2.setParentalRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/3.setWiFiAclRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/4.setWiFiScheduleCfg -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/6.setWizardCfg -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/7.setUrlFilterRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/8.setMacFilterRules -https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/9.setWanCfg -https://github.com/d34dun1c02n/CVE-2023-31705 -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/FS%20Lynda%20Clone.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/ImageInject.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Responsive%20Realestate%20Script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/SrbTransLatin.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/Vanguard.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/piwigo.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md -https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md -https://github.com/d7x/CVE-2020-12432 -https://github.com/da271133/cms/blob/main/29/csrf.md -https://github.com/da271133/cms/blob/main/30/csrf.md -https://github.com/da271133/cms/blob/main/31/csrf.md -https://github.com/da271133/cms/blob/main/32/csrf.md -https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40839/poc.txt -https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40840/poc.txt -https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40841/poc.txt -https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40842/poc.txt -https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-44897/poc.txt -https://github.com/dahua966/Routers-vuls/blob/master/DAP-1320/vuls_poc.md -https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/GuestWLanSetting_RCE.md -https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/vuls_info.md -https://github.com/danieljiang0415/android_kernel_crash_poc -https://github.com/danpros/htmly/issues/462 -https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j -https://github.com/daodaoshao/vul_tenda_i6_1 -https://github.com/daodaoshao/vul_tenda_i6_2 -https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_dos.py -https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py -https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/ti_wl18xx_adv_rce.py -https://github.com/datackmy/FallingSkies-CVE-2023-35885 -https://github.com/datadancer/HIAFuzz/blob/master/360%20Phone%20N6%20Pro%20Kernel%20Vuln.md -https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11019.md -https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11020.md -https://github.com/datadancer/HIAFuzz/blob/master/CVEs.md -https://github.com/datadancer/WinSysVuln/blob/main/DriverGenius-MyDrivers64.md -https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx -https://github.com/datahub-project/datahub/security/advisories/GHSA-fg9x-wvqw-6gmw -https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8 -https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt -https://github.com/davea42/libdwarf-code/issues/116 -https://github.com/davea42/libdwarf-code/issues/119 -https://github.com/davea42/libdwarf-code/issues/132 -https://github.com/daveismyname/simple-cms/issues/3 -https://github.com/davesteele/gnome-gmail/issues/84 -https://github.com/davidhalter/parso/issues/75 -https://github.com/daylightstudio/FUEL-CMS/issues/481 -https://github.com/daylightstudio/FUEL-CMS/issues/559 -https://github.com/daylightstudio/FUEL-CMS/issues/561 -https://github.com/daylightstudio/FUEL-CMS/issues/575 -https://github.com/daylightstudio/FUEL-CMS/issues/576 -https://github.com/daylightstudio/FUEL-CMS/issues/578 -https://github.com/daylightstudio/FUEL-CMS/issues/579 -https://github.com/daylightstudio/FUEL-CMS/issues/584 -https://github.com/daylightstudio/FUEL-CMS/issues/595 -https://github.com/dayrui/xunruicms/issues/1 -https://github.com/dbry/WavPack/issues/121 -https://github.com/dbry/WavPack/issues/26 -https://github.com/dbry/WavPack/issues/27 -https://github.com/dbry/WavPack/issues/28 -https://github.com/dbry/WavPack/issues/91 -https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349 -https://github.com/dbyio/cve-2022-37298 -https://github.com/dd3x3r/enhavo/blob/main/html-injection-page-content-blockquote-author-v0.13.1.md -https://github.com/dd3x3r/enhavo/blob/main/xss-create-tag-v0.13.1.md -https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md -https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-undertitel-v0.13.1.md -https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md -https://github.com/delikely/advisory/tree/main/GARO -https://github.com/delta/pragyan/issues/228 -https://github.com/denoland/deno/issues/12152 -https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq -https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp -https://github.com/derf/feh/issues/709 -https://github.com/derf/feh/issues/712 -https://github.com/derrekr/android_security/commit/0dd1a733e60cf5239c0a185d4219ba2ef1118a8b -https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md -https://github.com/desencrypt/CVE/blob/main/CVE-2023-38911/Readme.md -https://github.com/desencrypt/CVE/blob/main/CVE-2023-39599/Readme.md -https://github.com/dest-3/CVE-2023-46012/tree/main -https://github.com/devryan/GamePanelX-V3/issues/161 -https://github.com/dexter2206/ymlref/issues/2 -https://github.com/dexterone/Vigor-poc -https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr -https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67 -https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_add_sub.md -https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_course.md -https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_notes.md -https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md -https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md -https://github.com/dhabaleshwar/niv_testing_csrf/blob/main/exploit.md -https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md -https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 -https://github.com/dhananjay-bajaj/E107-v2.1.8-XSS-POC -https://github.com/dhananjay-bajaj/e107_2.1.8_csrf -https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelDnsForward.md -https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelWewifiPic.md -https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formWifiFilterRulesModify.md -https://github.com/dinhvh/libetpan/issues/420 -https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p -https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h -https://github.com/dirk1983/chatgpt-wechat-personal/issues/4 -https://github.com/dirk1983/chatgpt/issues/114 -https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs -https://github.com/disintegration/imaging/issues/165 -https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md -https://github.com/djcsdy/swfmill/issues/56 -https://github.com/djcsdy/swfmill/issues/57 -https://github.com/djcsdy/swfmill/issues/58 -https://github.com/djcsdy/swfmill/issues/61 -https://github.com/djcsdy/swfmill/issues/62 -https://github.com/djcsdy/swfmill/issues/63 -https://github.com/djcsdy/swfmill/issues/64 -https://github.com/djcsdy/swfmill/issues/65 -https://github.com/dlitz/pycrypto/issues/253 -https://github.com/docsifyjs/docsify/issues/1126 -https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2 -https://github.com/dokuwiki/dokuwiki/issues/4267 -https://github.com/dom96/httpbeast/issues/95 -https://github.com/dom96/jester/issues/326 -https://github.com/domainmod/domainmod/issues/66 -https://github.com/domainmod/domainmod/issues/80 -https://github.com/domainmod/domainmod/issues/81 -https://github.com/domainmod/domainmod/issues/82 -https://github.com/domainmod/domainmod/issues/83 -https://github.com/domainmod/domainmod/issues/84 -https://github.com/domainmod/domainmod/issues/86 -https://github.com/domainmod/domainmod/issues/87 -https://github.com/domainmod/domainmod/issues/88 -https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg -https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2 -https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273 -https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2 -https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr -https://github.com/doorgets/CMS/issues/11 -https://github.com/doorgets/CMS/issues/12 -https://github.com/doramart/DoraCMS/issues/136 -https://github.com/doramart/DoraCMS/issues/256 -https://github.com/dotCMS/core/issues/12131 -https://github.com/dotnetcore/AgileConfig/issues/91 -https://github.com/doublefast/yunucms/issues/1 -https://github.com/doudoudedi/D-LINK_Command_Injection1/blob/main/D-LINK_Command_injection.md -https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md -https://github.com/doudoudedi/buffer_overflow/blob/main/Tenda%20AC6%20V4.0-Denial%20of%20Service%20Vulnerability.md -https://github.com/doudoudedi/main-DIR-816_A1_Command-injection/blob/main/injection_A1.md -https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md -https://github.com/dovankha/CVE-2024-34220 -https://github.com/dovankha/CVE-2024-34221 -https://github.com/dovankha/CVE-2024-34222 -https://github.com/dovankha/CVE-2024-34223 -https://github.com/dovankha/CVE-2024-34224 -https://github.com/dovankha/CVE-2024-34225 -https://github.com/dovankha/CVE-2024-34226 -https://github.com/dovankha/CVE-2024-35468 -https://github.com/dovankha/CVE-2024-35469 -https://github.com/dpuenteramirez/XSS-ReferenceID-Subrion_4.2.1 -https://github.com/draco1725/POC/blob/main/Exploit/Password%20Storage%20Application/XSS -https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/SQL%20Injection -https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/Stored%20XSS -https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Public%20Access%20Catalog/XSS -https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss -https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS -https://github.com/draco1725/Stored-XSS/blob/main/poc -https://github.com/draco1725/localpriv/blob/main/poc -https://github.com/draco1725/vloggers/blob/main/poc -https://github.com/drbye78/libgig/issues/1 -https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/ -https://github.com/dreadlocked/netwave-dosvulnerability -https://github.com/drewlong/vbully -https://github.com/drewnoakes/metadata-extractor/issues/561 -https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj -https://github.com/dromara/hertzbeat/security/advisories/GHSA-rrc5-qpxr-5jm2 -https://github.com/dromara/hutool/issues/3289 -https://github.com/dropbox/lepton/issues/112 -https://github.com/dropbox/lepton/issues/154 -https://github.com/dtorp06/jymusic/issues/1 -https://github.com/dtschump/CImg/issues/184 -https://github.com/dtxharry/cve/blob/main/cve.md -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38870 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38872 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38874 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38876 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38879 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38882 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470 -https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26471 -https://github.com/dumpling-soup/Online-Catering-Reservation-DT/blob/main/README.md -https://github.com/dumpling-soup/Online-Catering-Reservation/blob/main/README.md -https://github.com/dumpling-soup/Simple-Image-Gallery-Web-App/blob/main/README.md -https://github.com/dutchcoders/transfer.sh/issues/500 -https://github.com/duy-31/CVE-2023-51764 -https://github.com/dvidelabs/flatcc/issues/188 -https://github.com/dweeves/magmi-git/issues/522 -https://github.com/dwisiswant0/advisory/issues/18 -https://github.com/dwisiswant0/advisory/issues/3 -https://github.com/dwisiswant0/advisory/issues/4 -https://github.com/dwisiswant0/advisory/issues/5 -https://github.com/dzflack/exploits/blob/master/unix/monit_buffer_overread.py -https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements -https://github.com/eProsima/Fast-DDS/issues/3236 -https://github.com/eProsima/Fast-DDS/issues/4365 -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9 -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-fcr6-x23w-94wp -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98 -https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-x9pj-vrgf-f68f -https://github.com/earth2sky/Disclosed/blob/main/CVE-2022-30519 -https://github.com/easysoft/zentaopms/issues/40 -https://github.com/ebel34/bpg-web-encoder/issues/1 -https://github.com/ebel34/bpg-web-encoder/issues/2 -https://github.com/eclecticiq/OpenTAXII/issues/176 -https://github.com/eclipse-ee4j/mojarra/files/3039198/advisory.txt -https://github.com/eclipse-ee4j/mojarra/issues/4556 -https://github.com/eclipse-theia/theia/issues/7283 -https://github.com/eclipse-theia/theia/issues/8794 -https://github.com/eclipse/buildship/issues/855 -https://github.com/eclipse/jetty.project/issues/10679 -https://github.com/eclipse/xtext-xtend/issues/759 -https://github.com/eclypsium/USBAnywhere -https://github.com/ectouch/ectouch/issues/5 -https://github.com/eddietcc/CVEnotes/blob/master/MyWebSQL/CSRF/readme.md -https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md -https://github.com/edmarmoretti/i3geo/issues/3 -https://github.com/edmarmoretti/i3geo/issues/5 -https://github.com/eeenvik1/CVE-2023-51764 -https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption -https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay -https://github.com/efekaanakkar/CVE-2024-35511/blob/main/Men%20Salon%20Management%20System%20Using%20PHP%20and%20MySQL.md -https://github.com/ehtec/phpipam-exploit -https://github.com/ejdhssh/IOT_Vul -https://github.com/ekultek/cve-2019-7216 -https://github.com/ele7enxxh/poc-exp/tree/master/CVE-2016-5346 -https://github.com/electronicbots/CVE-2021-31760 -https://github.com/electronicbots/CVE-2021-31761 -https://github.com/electronicbots/CVE-2021-31762 -https://github.com/elementalSec/CVE-Disclosures/blob/main/ZentaoPMS/CVE-2023-46475/CVE-2023-46475%20-%20Cross-Site%20Scripting%20(Stored).md -https://github.com/elvanderb/TCP-32764 -https://github.com/embedi/CVE-2017-11882 -https://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS/blob/main/README.md -https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md -https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md -https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Computer-Laboratory-Management-System-PoC.md -https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md -https://github.com/emlog/emlog/issues/195 -https://github.com/emlog/emlog/issues/48 -https://github.com/emlog/emlog/issues/49 -https://github.com/emoncms/emoncms/issues/1652 -https://github.com/emoncms/emoncms/issues/1856 -https://github.com/emqx/nanomq/issues/1153 -https://github.com/emqx/nanomq/issues/1154 -https://github.com/emqx/nanomq/issues/1155 -https://github.com/emqx/nanomq/issues/1164 -https://github.com/emqx/nanomq/issues/1165#issue-1668648319 -https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127 -https://github.com/emqx/nanomq/issues/1181 -https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md -https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px -https://github.com/enferex/pdfresurrect/issues/14 -https://github.com/enferex/pdfresurrect/issues/17 -https://github.com/enferex/pdfresurrect/issues/8 -https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf -https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3 -https://github.com/entropic-dev/entropic/issues/251 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xvf-4396-cj46 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g -https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh -https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-7wp5-c2vq-4f8m -https://github.com/envoyproxy/envoy/security/advisories/GHSA-g979-ph9j-5gg4 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-g9mq-6v96-cpqc -https://github.com/envoyproxy/envoy/security/advisories/GHSA-gxvv-x4p2-rppp -https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh -https://github.com/envoyproxy/envoy/security/advisories/GHSA-hww5-43gv-35jv -https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r -https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq -https://github.com/envoyproxy/envoy/security/advisories/GHSA-mgxp-7hhp-8299 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g -https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6 -https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q -https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h -https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w -https://github.com/enzo1982/mp4v2/issues/30 -https://github.com/enzo1982/mp4v2/issues/36 -https://github.com/enzo1982/mp4v2/issues/37 -https://github.com/ephort/laravel-user-enumeration-demo -https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g -https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-18959/poc-cve-2018-18959.py -https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-18960/poc-cve-2018-18960.py -https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19232/poc-cve-2018-19232.py -https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19248/poc-cve-2018-19248.py -https://github.com/epistemophilia/CVEs/blob/master/LG-GAMP-Routers/CVE-2019-7404/poc-cve-2019-7404.py -https://github.com/erberkan/SonLogger-vulns -https://github.com/erberkan/fortilogger_arbitrary_fileupload -https://github.com/ereisr00/bagofbugz/blob/master/010Editor -https://github.com/ereisr00/bagofbugz/blob/master/010Editor/SubStr.bt -https://github.com/ereisr00/bagofbugz/blob/master/010Editor/WSubStr.bt -https://github.com/ereisr00/bagofbugz/blob/master/010Editor/strcat_heap_overflow.bt -https://github.com/ereisr00/bagofbugz/tree/master/CorelPaintShop2019 -https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated -https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated -https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated -https://github.com/erikd/libsamplerate/issues/11 -https://github.com/erikd/libsndfile/issues/397 -https://github.com/erikd/libsndfile/issues/398 -https://github.com/erikd/libsndfile/issues/427 -https://github.com/erikd/libsndfile/issues/429 -https://github.com/erikd/libsndfile/issues/456 -https://github.com/erinxocon/requests-xml/issues/7 -https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq -https://github.com/erpscanteam/CVE-2018-2380 -https://github.com/erpscanteam/CVE-2018-2636 -https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability -https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability -https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability -https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability -https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability -https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability -https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46580-Code-Projects-Inventory-Management-1.0-Stored-Cross-Site-Scripting-Vulnerability.md -https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46581-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md -https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46582-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md -https://github.com/ersinerenler/Code-Projects-Simple-Task-List-1.0/blob/main/CVE-2023-46023-Code-Projects-Simple-Task-List-1.0-SQL-Injection-Vulnerability.md -https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46024-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md -https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46025-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md -https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46026-PHPGurukul-Teacher-Subject-Allocation-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md -https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC -https://github.com/esnet/iperf/issues/1542 -https://github.com/espeak-ng/espeak-ng/issues/1824 -https://github.com/espeak-ng/espeak-ng/issues/1826 -https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99 -https://github.com/esphome/esphome/security/advisories/GHSA-8p25-3q46-8q2p -https://github.com/esphome/esphome/security/advisories/GHSA-9p43-hj5j-96h5 -https://github.com/espocrm/espocrm/issues/1038 -https://github.com/espocrm/espocrm/issues/1039 -https://github.com/espocrm/espocrm/issues/1349 -https://github.com/espocrm/espocrm/issues/1356 -https://github.com/espocrm/espocrm/issues/1357 -https://github.com/espocrm/espocrm/issues/1358 -https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7j -https://github.com/espocrm/espocrm/security/advisories/GHSA-g955-rwxx-jvf6 -https://github.com/espruino/Espruino/issues/1684 -https://github.com/espruino/Espruino/issues/1799 -https://github.com/espruino/Espruino/issues/1820 -https://github.com/espruino/Espruino/issues/2121 -https://github.com/espruino/Espruino/issues/2122 -https://github.com/espruino/Espruino/issues/2142 -https://github.com/espruino/Espruino/issues/2457 -https://github.com/ethancunt/CVE-2022-45599 -https://github.com/ethancunt/CVE-2022-45600 -https://github.com/ethereum/go-ethereum/pull/16891 -https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md -https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md -https://github.com/ethyca/fides/security/advisories/GHSA-8cm5-jfj2-26q7 -https://github.com/ethyca/fides/security/advisories/GHSA-rcvg-jj3g-rj7c -https://github.com/evangelion1204/multi-ini/pull/37 -https://github.com/evanmiller/libxls/issues/34 -https://github.com/evanmiller/libxls/issues/35 -https://github.com/evict/poc_CVE-2018-1002105 -https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39458 -https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459 -https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2022-29347 -https://github.com/evolution-cms/evolution/issues/1041 -https://github.com/evolution-cms/evolution/issues/1042 -https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f -https://github.com/exponentcms/exponent-cms/issues/73 -https://github.com/extramaster/bchunk/issues/2 -https://github.com/extramaster/bchunk/issues/3 -https://github.com/extramaster/bchunk/issues/4 -https://github.com/eyoucms/eyoucms/issues/1 -https://github.com/eyoucms/eyoucms/issues/12 -https://github.com/eyoucms/eyoucms/issues/13 -https://github.com/eyoucms/eyoucms/issues/14 -https://github.com/eyoucms/eyoucms/issues/17 -https://github.com/eyoucms/eyoucms/issues/18 -https://github.com/eyoucms/eyoucms/issues/19 -https://github.com/eyoucms/eyoucms/issues/21 -https://github.com/eyoucms/eyoucms/issues/22 -https://github.com/eyoucms/eyoucms/issues/24 -https://github.com/eyoucms/eyoucms/issues/4 -https://github.com/eyoucms/eyoucms/issues/5 -https://github.com/eyoucms/eyoucms/issues/8 -https://github.com/eyoucms/eyoucms/issues/9 -https://github.com/facebook/create-react-app/pull/10644 -https://github.com/facebook/proxygen/pull/466 -https://github.com/facelessuser/pymdown-extensions/security/advisories/GHSA-jh85-wwv9-24hv -https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm -https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md -https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc -https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc -https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request -https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc -https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC -https://github.com/fangqyi/cpiopwn -https://github.com/fanyibo2009/cscms/blob/master/v4.1%20csrf -https://github.com/farliy-hacker/Doufoxcms/issues/1 -https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 -https://github.com/fatcerberus/minisphere/pull/268 -https://github.com/faucetsdn/ryu/issues/190 -https://github.com/faucetsdn/ryu/issues/191 -https://github.com/faucetsdn/ryu/issues/192 -https://github.com/faucetsdn/ryu/issues/194 -https://github.com/faucetsdn/ryu/issues/195 -https://github.com/fbkcs/CVE-2021-35975 -https://github.com/fdbao/UsualToolCMS/issues/1 -https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh -https://github.com/federella/CVE-2023-41717 -https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading -https://github.com/feross/bittorrent-dht/issues/87 -https://github.com/fex-team/kityminder/issues/345 -https://github.com/ff4j/ff4j/issues/624 -https://github.com/fhlip0/JopinXSS -https://github.com/fibonascii/CVE-2004-0558 -https://github.com/filebrowser/filebrowser/issues/2570 -https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh -https://github.com/filipi86/ConnectBoxDOCSIS-3.0 -https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc -https://github.com/firebase/php-jwt/issues/351 -https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc -https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc -https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0005/FEYE-2019-0005.md -https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0006/FEYE-2019-0006.md -https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0007/FEYE-2019-0007.md -https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0008/FEYE-2019-0008.md -https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0009/FEYE-2019-0009.md -https://github.com/firefly-iii/firefly-iii/issues/2335 -https://github.com/firefly-iii/firefly-iii/issues/2337 -https://github.com/firefly-iii/firefly-iii/issues/2338 -https://github.com/firefly-iii/firefly-iii/issues/2339 -https://github.com/firefly-iii/firefly-iii/issues/2363 -https://github.com/firefly-iii/firefly-iii/issues/2364 -https://github.com/firefly-iii/firefly-iii/issues/2365 -https://github.com/firefly-iii/firefly-iii/issues/2366 -https://github.com/firmianay/security-issues/tree/main/app/cn.etouch.ecalendar -https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro -https://github.com/firsov/onlyoffice -https://github.com/firsov/onlyoffice/blob/main/CVE-2023-34939-PoC.md -https://github.com/fishykz/TP-POC -https://github.com/fit2cloud/rackshift/issues/79 -https://github.com/fixitc/cve/blob/main/sql.md -https://github.com/flankerhqd/vendor-android-cves/tree/master/SMT-CVE-2019-16253 -https://github.com/flatCore/flatCore-CMS/issues/27 -https://github.com/flatCore/flatCore-CMS/issues/39 -https://github.com/flatCore/flatCore-CMS/issues/52 -https://github.com/flatCore/flatCore-CMS/issues/53 -https://github.com/flatCore/flatCore-CMS/issues/56 -https://github.com/flatCore/flatCore-CMS/issues/69 -https://github.com/fleetcaptain/integria-takeover -https://github.com/flexocms/flexo1.source/issues/25 -https://github.com/flexpaper/pdf2json/issues/24 -https://github.com/flexpaper/pdf2json/issues/25 -https://github.com/flexpaper/pdf2json/issues/26 -https://github.com/flexpaper/pdf2json/issues/27 -https://github.com/flexpaper/pdf2json/issues/28 -https://github.com/flexpaper/pdf2json/issues/29 -https://github.com/flexpaper/pdf2json/issues/30 -https://github.com/flexpaper/pdf2json/issues/31 -https://github.com/flexpaper/pdf2json/issues/32 -https://github.com/flexpaper/pdf2json/issues/33 -https://github.com/flexpaper/pdf2json/issues/34 -https://github.com/flexpaper/pdf2json/issues/35 -https://github.com/flexpaper/pdf2json/issues/36 -https://github.com/flexpaper/pdf2json/issues/44 -https://github.com/flexpaper/pdf2json/issues/45 -https://github.com/flexpaper/pdf2json/issues/52 -https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425 -https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4 -https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2 -https://github.com/flipperdevices/flipperzero-firmware/pull/1697 -https://github.com/fluent/fluentd/issues/3201 -https://github.com/flusity/flusity-CMS/issues/10 -https://github.com/flyhha/cms/blob/main/1.md -https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5:sysmanage:edit_manageadmin.php.md -https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md -https://github.com/flyyue2001/cve/blob/main/smart_sql_updateos.md -https://github.com/fmsdwifull/tp5cms/issues/3 -https://github.com/fmsdwifull/tp5cms/issues/6 -https://github.com/fmsdwifull/tp5cms/issues/8 -https://github.com/fmsh-seclab/TesMla -https://github.com/follow-redirects/follow-redirects/issues/235 -https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp -https://github.com/fontforge/fontforge/issues/3087 -https://github.com/fontforge/fontforge/issues/3088 -https://github.com/fontforge/fontforge/issues/3089 -https://github.com/fontforge/fontforge/issues/3090 -https://github.com/fontforge/fontforge/issues/3091 -https://github.com/fontforge/fontforge/issues/3092 -https://github.com/fontforge/fontforge/issues/3093 -https://github.com/fontforge/fontforge/issues/3096 -https://github.com/fontforge/fontforge/issues/3097 -https://github.com/fontforge/fontforge/issues/3098 -https://github.com/forgeekscn/sftnow/issues/6 -https://github.com/fortest-1/vuln/blob/main/MonoCMS%20Blog/MonoCMS%20Blog%201.0_remote_code_execution.md -https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md -https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220321-tooljet-xss.md -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#1 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#10 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#11 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#12 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#13 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#14 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#15 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#2 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#3 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#4 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#5 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#6 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#7 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#8 -https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#9 -https://github.com/free5gc/free5gc/issues/482 -https://github.com/free5gc/free5gc/issues/483 -https://github.com/free5gc/free5gc/issues/496 -https://github.com/free5gc/free5gc/issues/501 -https://github.com/freedomofpress/securedrop/issues/2238 -https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54 -https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-rm4c-ccvf-ff9c -https://github.com/fribidi/fribidi/issues/181 -https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2023-11-09-newsletterpop.md -https://github.com/froala/wysiwyg-editor/issues/3880 -https://github.com/frohoff/ysoserial/ -https://github.com/frohoff/ysoserial/pull/13 -https://github.com/frohoff/ysoserial/pull/68/files -https://github.com/frostming/rediswrapper/pull/1 -https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53 -https://github.com/frozeman/feindura-flat-file-cms/issues/29 -https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md -https://github.com/fs0c131y/ESFileExplorerOpenPortVuln -https://github.com/fs0c131y/SamsungLocker -https://github.com/fu2x2000/Liferay_exploit_Poc -https://github.com/fudforum/FUDforum/issues/2 -https://github.com/fudforum/FUDforum/issues/23 -https://github.com/fudforum/FUDforum/issues/24 -https://github.com/fuge/cms/issues/3 -https://github.com/funadmin/funadmin/issues/12 -https://github.com/funadmin/funadmin/issues/4 -https://github.com/funadmin/funadmin/issues/6 -https://github.com/funadmin/funadmin/issues/8 -https://github.com/funadmin/funadmin/issues/9 -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/12/TOTOlink%20A3300R%20setMacFilterRules.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/13/TOTOlink%20A3300R%20setWiFiScheduleCfg.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/15/TOTOlink%20A3300R%20setWiFiAclRules.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/3/TOTOLINK%20A3300R%20setScheduleCfg.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/7/TOTOlink%20A3300R%20setIpv6Cfg.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/8/TOTOlink%20A3300R%20setStaticDhcpRules.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/9/TOTOlink%20A3300R%20setUrlFilterRules.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ntp_server).md -https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ping_test).md -https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2 -https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit -https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File -https://github.com/fuzzywalls/CVE-2019-10999 -https://github.com/fxc233/iot-vul/blob/main/WAVLINK/WN575A3/Readme.md -https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645 -https://github.com/fxc233/iot-vul/tree/main/Tenda/IPC -https://github.com/g0rx/CVE-2018-7600-Drupal-RCE -https://github.com/g1an123/POC/blob/main/README.md -https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20deletion.md -https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20overwrite.md -https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20read.md -https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh -https://github.com/galoget/Thruk-CVE-2023-34096 -https://github.com/gamonoid/icehrm/issues/284 -https://github.com/gamonoid/icehrm/issues/285 -https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c -https://github.com/gaozhifeng/PHPMyWind/issues/11 -https://github.com/gaozhifeng/PHPMyWind/issues/15 -https://github.com/gaozhifeng/PHPMyWind/issues/9 -https://github.com/garboa/cve_3/blob/main/Upload2.md -https://github.com/garboa/cve_3/blob/main/file_put_content.md -https://github.com/gatsby2003/Shenzhen-Youkate-Industrial-Co.-Ltd/blob/main/Shenzhen%20Youkate%20Industrial%20Co.%2C%20Ltd.md -https://github.com/gatsby2003/Struts2-046/blob/main/Xiamen%20Four-Faith%20Communication%20Technology%20Co.,%20Ltd.%20video%20surveillance%20management%20system%20has%20a%20command%20execution%20vulnerability.md -https://github.com/gaukas/instructure-canvas-file-oracle -https://github.com/gb111d/ns-asg_poc/ -https://github.com/gdraheim/zziplib/issues/14 -https://github.com/gdraheim/zziplib/issues/15 -https://github.com/gdraheim/zziplib/issues/16 -https://github.com/gdraheim/zziplib/issues/17 -https://github.com/gdraheim/zziplib/issues/22 -https://github.com/gdraheim/zziplib/issues/39 -https://github.com/gdraheim/zziplib/issues/40 -https://github.com/gdraheim/zziplib/issues/41 -https://github.com/gdraheim/zziplib/issues/68 -https://github.com/gdraheim/zziplib/issues/69 -https://github.com/geffner/CVE-2020-8289/blob/master/README.md -https://github.com/geffner/CVE-2020-8290/blob/master/README.md -https://github.com/gentoo/soko/security/advisories/GHSA-gp8g-jfq9-5q2g -https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7 -https://github.com/geoserver/geoserver/security/advisories/GHSA-9v5q-2gwq-q9hq -https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525 -https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w -https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a -https://github.com/gerbv/gerbv/issues/191 -https://github.com/gerr-re/cve-2022-24644/blob/main/cve-2022-24644_public-advisory.pdf -https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html -https://github.com/getformwork/formwork/security/advisories/GHSA-5pxr-7m4j-jjc6 -https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7 -https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58 -https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh -https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v -https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69 -https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5 -https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc -https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv -https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4 -https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc -https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307 -https://github.com/ggb0n/CVE-2023-44962 -https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-p5mv-gjc5-mwqv -https://github.com/ggfzx/OCP-Security-Misconfiguration/tree/main -https://github.com/ggg48966/cve/blob/main/D-LINK%20-DAR-7000_rce_%20webmailattach.md -https://github.com/ggg48966/cve/blob/main/NS-ASG-sql-addaddress_interpret.md -https://github.com/ggg48966/cve/blob/main/sql.md -https://github.com/gin-gonic/gin/issues/3555 -https://github.com/git-for-windows/git/issues/944 -https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj -https://github.com/github/advisory-database/pull/3490 -https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r -https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c -https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh -https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr -https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p -https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5 -https://github.com/github/securitylab/issues/669#issuecomment-1117265726 -https://github.com/github123abc123/bird/issues/1 -https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c -https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4 -https://github.com/givanz/VvvebJs/issues/342 -https://github.com/gl-inet/CVE-issues/blob/main/3.215/Abuse_of_Functionality_leads_to_RCE.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary%20File%20Read%20through%20file%20share.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Creation.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Read.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/Buffer_Overflow.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/Directory_Listing.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/GL-MV1000_Arbitrary_File_Creation.md -https://github.com/gl-inet/CVE-issues/blob/main/3.215/SSID_Key_Disclosure.md -https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Creation%20Through%20API%20upload.md -https://github.com/glFusion/glfusion/issues/486 -https://github.com/gleez/cms/issues/795 -https://github.com/gleez/cms/issues/800 -https://github.com/glennrp/libpng/issues/269 -https://github.com/glennrp/libpng/issues/307 -https://github.com/glennrp/libpng/issues/307#issuecomment-544779431 -https://github.com/glpi-project/glpi/issues/1047 -https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc -https://github.com/gluxon/CVE-2018-13257 -https://github.com/gnat/nc-cms/issues/11 -https://github.com/gnuboard/g6/issues/314 -https://github.com/gnuboard/g6/issues/316 -https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h -https://github.com/godotengine/godot/pull/45701 -https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a -https://github.com/godotengine/godot/pull/45702 -https://github.com/godotengine/godot/pull/45702/files -https://github.com/gogs/gogs/issues/5364 -https://github.com/gogs/gogs/issues/5372 -https://github.com/gogs/gogs/issues/5397 -https://github.com/gogs/gogs/issues/5926 -https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf -https://github.com/golang/go/issues/23867 -https://github.com/golang/go/issues/27016 -https://github.com/goldds96/Report/blob/main/DLink/DIR-815/CI.md -https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2 -https://github.com/gongfuxiang/schoolcms/issues/1 -https://github.com/gongwalker/ApiManager/issues/26 -https://github.com/goodrain-apps/chanzhieps/issues/1 -https://github.com/google/google-api-cpp-client/pull/58 -https://github.com/google/sa360-webquery-bigquery/pull/15 -https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m -https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw -https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8 -https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9 -https://github.com/google/security-research/security/advisories/GHSA-g69r-8jwh-2462 -https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q -https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph -https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x -https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx -https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2 -https://github.com/google/security-research/security/advisories/GHSA-r7m9-grw7-vcc4 -https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 -https://github.com/gopeak/masterlab/issues/254 -https://github.com/gopro/gpmf-parser/issues/29 -https://github.com/gopro/gpmf-parser/issues/31 -https://github.com/gopro/gpmf-parser/issues/32 -https://github.com/gopro/gpmf-parser/issues/43 -https://github.com/gopro/gpmf-parser/issues/60 -https://github.com/gopro/gpmf-parser/issues/74 -https://github.com/gopro/gpmf-parser/issues/75 -https://github.com/gopro/gpmf-parser/issues/76 -https://github.com/gopro/gpmf-parser/issues/77 -https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c -https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh -https://github.com/gottburgm/Exploits/tree/master/CVE-2017-12149 -https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 -https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679 -https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302 -https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b -https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 -https://github.com/gpac/gpac/issues/1179 -https://github.com/gpac/gpac/issues/1180 -https://github.com/gpac/gpac/issues/1183 -https://github.com/gpac/gpac/issues/1249 -https://github.com/gpac/gpac/issues/1263 -https://github.com/gpac/gpac/issues/1264 -https://github.com/gpac/gpac/issues/1265 -https://github.com/gpac/gpac/issues/1266 -https://github.com/gpac/gpac/issues/1267 -https://github.com/gpac/gpac/issues/1268 -https://github.com/gpac/gpac/issues/1269 -https://github.com/gpac/gpac/issues/1270 -https://github.com/gpac/gpac/issues/1271 -https://github.com/gpac/gpac/issues/1320 -https://github.com/gpac/gpac/issues/1321 -https://github.com/gpac/gpac/issues/1327 -https://github.com/gpac/gpac/issues/1328 -https://github.com/gpac/gpac/issues/1329 -https://github.com/gpac/gpac/issues/1330 -https://github.com/gpac/gpac/issues/1331 -https://github.com/gpac/gpac/issues/1332 -https://github.com/gpac/gpac/issues/1333 -https://github.com/gpac/gpac/issues/1334 -https://github.com/gpac/gpac/issues/1335 -https://github.com/gpac/gpac/issues/1337 -https://github.com/gpac/gpac/issues/1338 -https://github.com/gpac/gpac/issues/1339 -https://github.com/gpac/gpac/issues/1341 -https://github.com/gpac/gpac/issues/1342 -https://github.com/gpac/gpac/issues/1344 -https://github.com/gpac/gpac/issues/1345 -https://github.com/gpac/gpac/issues/1346 -https://github.com/gpac/gpac/issues/1348 -https://github.com/gpac/gpac/issues/1377 -https://github.com/gpac/gpac/issues/1378 -https://github.com/gpac/gpac/issues/1406 -https://github.com/gpac/gpac/issues/1423 -https://github.com/gpac/gpac/issues/1440 -https://github.com/gpac/gpac/issues/1479 -https://github.com/gpac/gpac/issues/1481 -https://github.com/gpac/gpac/issues/1482 -https://github.com/gpac/gpac/issues/1564 -https://github.com/gpac/gpac/issues/1565 -https://github.com/gpac/gpac/issues/1566 -https://github.com/gpac/gpac/issues/1567 -https://github.com/gpac/gpac/issues/1568 -https://github.com/gpac/gpac/issues/1569 -https://github.com/gpac/gpac/issues/1574 -https://github.com/gpac/gpac/issues/1575 -https://github.com/gpac/gpac/issues/1586 -https://github.com/gpac/gpac/issues/1587 -https://github.com/gpac/gpac/issues/1659 -https://github.com/gpac/gpac/issues/1660 -https://github.com/gpac/gpac/issues/1661 -https://github.com/gpac/gpac/issues/1662 -https://github.com/gpac/gpac/issues/1702 -https://github.com/gpac/gpac/issues/1769 -https://github.com/gpac/gpac/issues/1770 -https://github.com/gpac/gpac/issues/1772 -https://github.com/gpac/gpac/issues/1774 -https://github.com/gpac/gpac/issues/1838 -https://github.com/gpac/gpac/issues/1840 -https://github.com/gpac/gpac/issues/1842 -https://github.com/gpac/gpac/issues/1846 -https://github.com/gpac/gpac/issues/1879 -https://github.com/gpac/gpac/issues/1883 -https://github.com/gpac/gpac/issues/1886 -https://github.com/gpac/gpac/issues/1887 -https://github.com/gpac/gpac/issues/1889 -https://github.com/gpac/gpac/issues/1890 -https://github.com/gpac/gpac/issues/1891 -https://github.com/gpac/gpac/issues/1892 -https://github.com/gpac/gpac/issues/1893 -https://github.com/gpac/gpac/issues/1894 -https://github.com/gpac/gpac/issues/1895 -https://github.com/gpac/gpac/issues/1897 -https://github.com/gpac/gpac/issues/1898 -https://github.com/gpac/gpac/issues/1899 -https://github.com/gpac/gpac/issues/1900 -https://github.com/gpac/gpac/issues/1901 -https://github.com/gpac/gpac/issues/1902 -https://github.com/gpac/gpac/issues/1904 -https://github.com/gpac/gpac/issues/1955 -https://github.com/gpac/gpac/issues/1957 -https://github.com/gpac/gpac/issues/1958 -https://github.com/gpac/gpac/issues/1959 -https://github.com/gpac/gpac/issues/1964 -https://github.com/gpac/gpac/issues/1965 -https://github.com/gpac/gpac/issues/1966 -https://github.com/gpac/gpac/issues/1967 -https://github.com/gpac/gpac/issues/1968 -https://github.com/gpac/gpac/issues/1969 -https://github.com/gpac/gpac/issues/1970 -https://github.com/gpac/gpac/issues/1971 -https://github.com/gpac/gpac/issues/1972 -https://github.com/gpac/gpac/issues/1973 -https://github.com/gpac/gpac/issues/1974 -https://github.com/gpac/gpac/issues/1975 -https://github.com/gpac/gpac/issues/1978 -https://github.com/gpac/gpac/issues/1979 -https://github.com/gpac/gpac/issues/1980 -https://github.com/gpac/gpac/issues/1982 -https://github.com/gpac/gpac/issues/1986 -https://github.com/gpac/gpac/issues/1999 -https://github.com/gpac/gpac/issues/2058 -https://github.com/gpac/gpac/issues/2061 -https://github.com/gpac/gpac/issues/2067 -https://github.com/gpac/gpac/issues/2081 -https://github.com/gpac/gpac/issues/2108 -https://github.com/gpac/gpac/issues/2109 -https://github.com/gpac/gpac/issues/2120 -https://github.com/gpac/gpac/issues/2138 -https://github.com/gpac/gpac/issues/2163 -https://github.com/gpac/gpac/issues/2165 -https://github.com/gpac/gpac/issues/2173 -https://github.com/gpac/gpac/issues/2175 -https://github.com/gpac/gpac/issues/2179 -https://github.com/gpac/gpac/issues/2216 -https://github.com/gpac/gpac/issues/2218 -https://github.com/gpac/gpac/issues/2220 -https://github.com/gpac/gpac/issues/2223 -https://github.com/gpac/gpac/issues/2276 -https://github.com/gpac/gpac/issues/2277 -https://github.com/gpac/gpac/issues/2278 -https://github.com/gpac/gpac/issues/2280 -https://github.com/gpac/gpac/issues/2281 -https://github.com/gpac/gpac/issues/2282 -https://github.com/gpac/gpac/issues/2284 -https://github.com/gpac/gpac/issues/2285 -https://github.com/gpac/gpac/issues/2295 -https://github.com/gpac/gpac/issues/2296 -https://github.com/gpac/gpac/issues/2307 -https://github.com/gpac/gpac/issues/2315 -https://github.com/gpac/gpac/issues/2327 -https://github.com/gpac/gpac/issues/2328 -https://github.com/gpac/gpac/issues/2333 -https://github.com/gpac/gpac/issues/2337 -https://github.com/gpac/gpac/issues/2338 -https://github.com/gpac/gpac/issues/2339 -https://github.com/gpac/gpac/issues/2340 -https://github.com/gpac/gpac/issues/2343 -https://github.com/gpac/gpac/issues/2344 -https://github.com/gpac/gpac/issues/2345 -https://github.com/gpac/gpac/issues/2346 -https://github.com/gpac/gpac/issues/2347 -https://github.com/gpac/gpac/issues/2349 -https://github.com/gpac/gpac/issues/2350 -https://github.com/gpac/gpac/issues/2353 -https://github.com/gpac/gpac/issues/2354 -https://github.com/gpac/gpac/issues/2355 -https://github.com/gpac/gpac/issues/2356 -https://github.com/gpac/gpac/issues/2357 -https://github.com/gpac/gpac/issues/2358 -https://github.com/gpac/gpac/issues/2359 -https://github.com/gpac/gpac/issues/2360 -https://github.com/gpac/gpac/issues/2386 -https://github.com/gpac/gpac/issues/2388 -https://github.com/gpac/gpac/issues/2396 -https://github.com/gpac/gpac/issues/2514 -https://github.com/gpac/gpac/issues/2516 -https://github.com/gpac/gpac/issues/2537 -https://github.com/gpac/gpac/issues/2550 -https://github.com/gpac/gpac/issues/2567 -https://github.com/gpac/gpac/issues/2611 -https://github.com/gpac/gpac/issues/2629 -https://github.com/gpac/gpac/issues/2641 -https://github.com/gpac/gpac/issues/2642 -https://github.com/gpac/gpac/issues/2652 -https://github.com/gpac/gpac/issues/2657 -https://github.com/gpac/gpac/issues/2658 -https://github.com/gpac/gpac/issues/2661 -https://github.com/gpac/gpac/issues/2662 -https://github.com/gpac/gpac/issues/2664 -https://github.com/gpac/gpac/issues/2666 -https://github.com/gpac/gpac/issues/2669 -https://github.com/gpac/gpac/issues/2672 -https://github.com/gpac/gpac/issues/2679 -https://github.com/gpac/gpac/issues/2689 -https://github.com/gpac/gpac/issues/2698 -https://github.com/gpac/gpac/issues/2713 -https://github.com/gpac/gpac/issues/2763 -https://github.com/gpac/gpac/issues/2764 -https://github.com/gpac/gpac/issues/997 -https://github.com/gpertea/gclib/issues/11 -https://github.com/gphper/ginadmin/issues/8 -https://github.com/gphper/ginadmin/issues/9 -https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f -https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3 -https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp -https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76 -https://github.com/grafana/grafana/issues/13667 -https://github.com/grails/grails-core/issues/11250 -https://github.com/grame-cncm/faust/issues/482 -https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j -https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad -https://github.com/gravitational/teleport -https://github.com/gravitational/teleport/releases/tag/v4.4.11 -https://github.com/gravitational/teleport/releases/tag/v5.2.4 -https://github.com/gravitational/teleport/releases/tag/v6.2.12 -https://github.com/gravitational/teleport/releases/tag/v7.1.1 -https://github.com/grayfullbuster0804/netbox/issues/1 -https://github.com/grobmeier/jjson/issues/2 -https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md -https://github.com/gteissier/CVE-2016-6271 -https://github.com/gunet/openeclass/issues/11 -https://github.com/gunet/openeclass/issues/39 -https://github.com/guusec/VSeeDoS -https://github.com/guy-liu/yith-giftdrop -https://github.com/guyinatuxedo/sqlite3_record_leaking -https://github.com/gventuri/pandas-ai/issues/399 -https://github.com/gventuri/pandas-ai/issues/410 -https://github.com/gventuri/pandas-ai/issues/868 -https://github.com/h3llraiser/CVE-2019-15120 -https://github.com/h3llraiser/CVE-2020-25398 -https://github.com/h3llraiser/CVE-2020-25399 -https://github.com/h3xduck/TripleCross/issues/40 -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34928.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34929.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34932.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34933.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34934.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md -https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md -https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated -https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated -https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-1.md -https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-2.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-Blind_Cross_Site_Scripting.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_1.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_2.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_3.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_4.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_5.md -https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_6.md -https://github.com/h4md153v63n/CVEs/blob/main/College_Notes_Gallery/College_Notes_Gallery-SQL_Injection.md -https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md -https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md -https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md -https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md -https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md -https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-SQL-Injection.md -https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-Stored_Cross_site_Scripting.md -https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md -https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md -https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-3.md -https://github.com/h4md153v63n/CVEs/blob/main/QR_Code_Generator/QR_Code_Generator-Reflected_Cross_Site_Scripting.md -https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-1.md -https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-2.md -https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-1.md -https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-2.md -https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md -https://github.com/hackerlib/hackerlib-vul/tree/master/gnome -https://github.com/hackerlib/hackerlib-vul/tree/master/potrace/heap-buffer-overflow-mkbitmap -https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim -https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print -https://github.com/hackervegas001/CVE-2024-26521 -https://github.com/hackmdio/codimd/issues/1263 -https://github.com/hackmdio/codimd/issues/1630 -https://github.com/hackmdio/codimd/issues/1648 -https://github.com/hacksparrow/safe-eval/issues/19 -https://github.com/hacksparrow/safe-eval/issues/26 -https://github.com/hacksparrow/safe-eval/issues/27 -https://github.com/hacksparrow/safe-eval/issues/5 -https://github.com/hacky1997/CVE-2020-8825 -https://github.com/haile01/perl_spreadsheet_excel_rce_poc -https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md -https://github.com/haiwen/seafile-client/issues/1309 -https://github.com/hakivvi/CVE-2022-29464 -https://github.com/halfbitteam/POCs/tree/master/libtiff-4.08_tiff2ps_heap_overflow -https://github.com/halleyakina/cve/blob/main/sql.md -https://github.com/halo-dev/halo/issues/1575 -https://github.com/halostatue/minitar/issues/16 -https://github.com/hamkovic/Admidio-3.2.5-SQLi -https://github.com/hamm0nz/CVE-2020-18324 -https://github.com/hamm0nz/CVE-2020-18325 -https://github.com/hamm0nz/CVE-2020-18326 -https://github.com/hannob/optionsbleed -https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md -https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md -https://github.com/hanxuer/crashes/blob/main/yasm/04/readme.md -https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv -https://github.com/hapijs/hapi/issues/3466 -https://github.com/harry935/CVE-2023-45992 -https://github.com/harryrabbit5651/cms/blob/main/1.md -https://github.com/havok89/Hoosk/issues/63 -https://github.com/hawtio/hawtio/issues/2832 -https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20BCC%20endpoint -https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20CC%20endpoint -https://github.com/haxpunk1337/Microstrategy-Poc/blob/main/poc -https://github.com/hayyp/cherry/issues/1 -https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg -https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87 -https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pxxg-px9v-6qf3 -https://github.com/heidashuai5588/cve/blob/main/upload.md -https://github.com/heimdal/heimdal/issues/353 -https://github.com/helloxz/imgurl/issues/75 -https://github.com/helloxz/onenav/issues/186 -https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29228.md -https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29230.md -https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29231.md -https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35240.md -https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35241.md -https://github.com/heshi906/CVE-2024-28515 -https://github.com/hessandrew/CVE-2019-17124 -https://github.com/hfiref0x/LightFTP/issues/5 -https://github.com/hfp/libxsmm/issues/398 -https://github.com/hfp/libxsmm/issues/402 -https://github.com/hhhhu8045759/619L_upnpd_heapoverflow -https://github.com/hhhhu8045759/dir_619l-buffer-overflow -https://github.com/hhhhu8045759/dlink-619l-buffer_overflow -https://github.com/hhxsv5/laravel-s/issues/437 -https://github.com/hi-KK/CVE-Hunter/blob/master/1.md -https://github.com/hi-KK/CVE-Hunter/blob/master/2.md -https://github.com/hi-KK/CVE-Hunter/blob/master/3.md -https://github.com/hillerlin/bycms/issues/1 -https://github.com/hillerlin/bycms/issues/3 -https://github.com/himanshurahi/e107_2.1.9_CSRF_POC -https://github.com/hisiphp/hisiphp/issues/10 -https://github.com/hisiphp/hisiphp/issues/11 -https://github.com/hisiphp/hisiphp/issues/3 -https://github.com/hisiphp/hisiphp/issues/7 -https://github.com/hitIer/web_test/tree/master/hotel -https://github.com/hjson/hjson-java/issues/24 -https://github.com/hjson/hjson-java/issues/27 -https://github.com/hkerma/opa-gatekeeper-concurrency-issue -https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt -https://github.com/hoene/libmysofa/issues/67 -https://github.com/hoene/libmysofa/issues/83 -https://github.com/hoene/libmysofa/issues/84 -https://github.com/hoene/libmysofa/issues/96 -https://github.com/holychang/maccms8/blob/master/xss2 -https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 -https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347 -https://github.com/honojs/node-server/issues/159 -https://github.com/hook-s3c/CVE-2018-11776-Python-PoC -https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v -https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp -https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr -https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833 -https://github.com/horde/horde/commit/eb3afd14c22c77ae0d29e2848f5ac726ef6e7c5b -https://github.com/horizon3ai/CVE-2022-47966 -https://github.com/housamz/php-mysql-admin-panel-generator/issues/19 -https://github.com/htacg/tidy-html5/issues/588 -https://github.com/htacg/tidy-html5/issues/656 -https://github.com/httl/httl/issues/224 -https://github.com/httl/httl/issues/225 -https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md -https://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py -https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr -https://github.com/huanglei3/lrzip-next-poc/tree/main -https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow -https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution -https://github.com/hucmosin/Python_Small_Tool/blob/master/other/DVR_POC.py -https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md -https://github.com/hundredrabbits/Left/issues/167 -https://github.com/hundredrabbits/Left/issues/168 -https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd -https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4 -https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54 -https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity -https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity -https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm -https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer -https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_cookie_overflow.md -https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_default_telnet_info.md -https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_leak_config_file.md -https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_login_bypass.md -https://github.com/husterdjx/cve/blob/main/sql1.md -https://github.com/hxcc/just_for_fun/blob/master/ICMS%20CSRF -https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m -https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123 -https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1124 -https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w-39f4-rpv2 -https://github.com/hyyyp/HYBBS2/issues/3 -https://github.com/hyyyp/HYBBS2/issues/33 -https://github.com/hyyyp/HYBBS2/issues/34 -https://github.com/hzeller/timg/issues/92 -https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13477.md -https://github.com/iBotPeaches/Apktool/commit/d348c43b24a9de350ff6e5bd610545a10c1fc712 -https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w -https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-vgwr-4w3p-xmjv -https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md -https://github.com/iamweifan/jooan/blob/master/es_poc.py -https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS%202.md -https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md -https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md -https://github.com/icepng/PoC/tree/master/PoC1 -https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md -https://github.com/icon-project/loopchain/issues/231 -https://github.com/idcos/Cloudboot/issues/22 -https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219 -https://github.com/iimiss/cms/blob/main/1.md -https://github.com/illagrenan/django-make-app/issues/5 -https://github.com/ilsani/rd/tree/master/security-advisories/faststone/maxview-cve-2017-6078 -https://github.com/imapsync/imapsync/issues/399 -https://github.com/imp0wd3r/vuln-papers/tree/master/zencart-155e-auth-rce -https://github.com/imsebao/404team/blob/master/zorovavi-blog-sql-injection.md -https://github.com/indutny/elliptic/issues/226 -https://github.com/indutny/node-ip/issues/150 -https://github.com/inflixim4be/Brute-Force-on-Umanni-RH -https://github.com/inflixim4be/CVE-2020-15367 -https://github.com/inflixim4be/CVE-2020-15392 -https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH -https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5 -https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18 -https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03 -https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6 -https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p -https://github.com/input-output-hk/hydra/security/advisories/GHSA-mgcx-6p7h-5996 -https://github.com/inputzero/Security-Advisories/blob/main/CVE-XXXX-XXXX.md -https://github.com/instantsoft/icms2/issues/892 -https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq -https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw -https://github.com/intelliants/subrion/issues/467 -https://github.com/intelliants/subrion/issues/479 -https://github.com/intelliants/subrion/issues/570 -https://github.com/intelliants/subrion/issues/638 -https://github.com/intelliants/subrion/issues/762 -https://github.com/intelliants/subrion/issues/817 -https://github.com/intelliants/subrion/issues/821 -https://github.com/intelliants/subrion/issues/845 -https://github.com/intelliants/subrion/issues/890 -https://github.com/intridea/omniauth-oauth2/pull/25 -https://github.com/invernyx/smartcars-3-bugs/security/advisories/GHSA-hx8p-f8h7-5h78 -https://github.com/invisiblebyte/CVE-2023-46694 -https://github.com/invoiceninja/invoiceninja/issues/1727 -https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md -https://github.com/ionize/ionize/issues/393 -https://github.com/ioprojecton/dir-3040_dos -https://github.com/iot-firmeware/-Router-vulnerability/tree/main/AX12 -https://github.com/iot-firmeware/-Router-vulnerability/tree/main/Tenda%20AC9 -https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7 -https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x -https://github.com/ireader/media-server/issues/235 -https://github.com/irontec/sngrep/issues/430 -https://github.com/irontec/sngrep/issues/431 -https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31727.md -https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31728.md -https://github.com/irsl/ADB-Backup-APK-Injection/ -https://github.com/irsl/CVE-2020-1967 -https://github.com/irsl/gnu-patch-vulnerabilities -https://github.com/irsl/jackson-rce-via-spel/ -https://github.com/irsl/knc-memory-exhaustion/ -https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md -https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 -https://github.com/ismailcemunver/CVE-2024-29375 -https://github.com/ismailerkek/CVEs/blob/main/CVE-2020-19762-RESERVED.md -https://github.com/istlnight/cve/blob/main/NS-ASG-sql-uploadiscgwrouteconf.md -https://github.com/itext/itext7/pull/78 -https://github.com/itext/itext7/pull/78#issuecomment-1089279222 -https://github.com/itext/itext7/pull/78#issuecomment-1089282165 -https://github.com/itext/itext7/pull/78#issuecomment-1089287808 -https://github.com/itodaro/WhiteSharkSystem_cve -https://github.com/itodaro/cmsms_cve/blob/master/README.md -https://github.com/itodaro/cve/blob/master/README.md -https://github.com/itodaro/doorGets_cve -https://github.com/itsqian797/cms/blob/main/1.md -https://github.com/itsqian797/cms/blob/main/3.md -https://github.com/itsqian797/cms/blob/main/4.md -https://github.com/itssixtyn3in/CVE-2023-42222 -https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1 -https://github.com/ivoschyk-cs/CVE-s/blob/master/Email%20Subscribers%20%26%20Newsletters%20Wordpress%20Plugin%20(XSS) -https://github.com/ixSly/CVE-2022-41401 -https://github.com/jacobwb/hashover-next/issues/152 -https://github.com/jact/openclinic/issues/8 -https://github.com/jadacheng/vulnerability/blob/master/Metinfo6.x/MetInfo.md -https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r -https://github.com/jakgibb/nagiosxi-root-rce-exploit -https://github.com/jamesagnew/hapi-fhir/issues/2026 -https://github.com/janbialostok/deep-assign/issues/1 -https://github.com/janino-compiler/janino/issues/201 -https://github.com/jarradseers/config-handler/issues/1 -https://github.com/jasonjoh/php-calendar/issues/4 -https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b -https://github.com/jasper-software/jasper/issues/252 -https://github.com/jasper-software/jasper/issues/259 -https://github.com/jasper-software/jasper/issues/264 -https://github.com/jasper-software/jasper/issues/265 -https://github.com/jasper-software/jasper/issues/338 -https://github.com/jasper-software/jasper/issues/367 -https://github.com/jasper-software/jasper/issues/381 -https://github.com/javadelight/delight-nashorn-sandbox/issues/117 -https://github.com/javadelight/delight-nashorn-sandbox/issues/135 -https://github.com/javahuang/SurveyKing/issues/55 -https://github.com/javahuang/SurveyKing/issues/56 -https://github.com/jaygreig86/dmitry/issues/4 -https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md -https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF2.md -https://github.com/jayus0821/insight/blob/master/iCMS%20SSRF.md -https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md -https://github.com/jayus0821/uai-poc/blob/main/Netgear/WNAP320/unauth.md -https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md -https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md -https://github.com/jbaines-r7/staystaystay -https://github.com/jbaines-r7/theway -https://github.com/jbeder/yaml-cpp/issues/519 -https://github.com/jbeder/yaml-cpp/issues/654 -https://github.com/jbeder/yaml-cpp/issues/657 -https://github.com/jbeder/yaml-cpp/issues/660 -https://github.com/jboogie15/CVE-2021-38149 -https://github.com/jcarabantes/Bus-Vulnerabilities -https://github.com/jcubic/jquery.terminal/issues/727 -https://github.com/je6k/ctf-challenges/blob/master/poc.txt -https://github.com/jeecgboot/jeecg-boot/issues/3331 -https://github.com/jeecgboot/jeecg-boot/issues/4125 -https://github.com/jeecgboot/jeecg-boot/issues/4126 -https://github.com/jeecgboot/jeecg-boot/issues/4127 -https://github.com/jeecgboot/jeecg-boot/issues/4128 -https://github.com/jeffssh/CVE-2021-30860 -https://github.com/jenaye/KumbiaPHP- -https://github.com/jenaye/PMB -https://github.com/jenaye/aapanel -https://github.com/jenaye/cve/blob/master/readme.MD -https://github.com/jenaye/pligg/blob/master/README.md -https://github.com/jensregel/Advisories/tree/master/CVE-2020-12608 -https://github.com/jeremylong/DependencyCheck/security/advisories/GHSA-qqhq-8r2c-c3f5 -https://github.com/jerryhanjj/ERP/issues/3 -https://github.com/jerryjliu/llama_index/issues/7054 -https://github.com/jerryscript-project/jerryscript/issues/2008 -https://github.com/jerryscript-project/jerryscript/issues/2140 -https://github.com/jerryscript-project/jerryscript/issues/3785 -https://github.com/jerryscript-project/jerryscript/issues/3804 -https://github.com/jerryscript-project/jerryscript/issues/3976 -https://github.com/jerryscript-project/jerryscript/issues/3977 -https://github.com/jerryscript-project/jerryscript/issues/4445 -https://github.com/jerryscript-project/jerryscript/issues/4793 -https://github.com/jerryscript-project/jerryscript/issues/4847 -https://github.com/jerryscript-project/jerryscript/issues/4871 -https://github.com/jerryscript-project/jerryscript/issues/4872 -https://github.com/jerryscript-project/jerryscript/issues/4875 -https://github.com/jerryscript-project/jerryscript/issues/4876 -https://github.com/jerryscript-project/jerryscript/issues/4882 -https://github.com/jerryscript-project/jerryscript/issues/4890 -https://github.com/jerryscript-project/jerryscript/issues/4891 -https://github.com/jerryscript-project/jerryscript/issues/4894 -https://github.com/jerryscript-project/jerryscript/issues/4895 -https://github.com/jerryscript-project/jerryscript/issues/4900 -https://github.com/jerryscript-project/jerryscript/issues/4901 -https://github.com/jerryscript-project/jerryscript/issues/4916 -https://github.com/jerryscript-project/jerryscript/issues/4917 -https://github.com/jerryscript-project/jerryscript/issues/4920 -https://github.com/jerryscript-project/jerryscript/issues/4924 -https://github.com/jerryscript-project/jerryscript/issues/4927 -https://github.com/jerryscript-project/jerryscript/issues/4928 -https://github.com/jerryscript-project/jerryscript/issues/4930 -https://github.com/jerryscript-project/jerryscript/issues/4934 -https://github.com/jerryscript-project/jerryscript/issues/4936 -https://github.com/jerryscript-project/jerryscript/issues/4938 -https://github.com/jerryscript-project/jerryscript/issues/4939 -https://github.com/jerryscript-project/jerryscript/issues/4940 -https://github.com/jerryscript-project/jerryscript/issues/4941 -https://github.com/jerryscript-project/jerryscript/issues/5061 -https://github.com/jerryscript-project/jerryscript/issues/5062 -https://github.com/jerryscript-project/jerryscript/issues/5064 -https://github.com/jerryscript-project/jerryscript/issues/5067 -https://github.com/jerryscript-project/jerryscript/issues/5068 -https://github.com/jerryscript-project/jerryscript/issues/5069 -https://github.com/jerryscript-project/jerryscript/issues/5070 -https://github.com/jerryscript-project/jerryscript/issues/5073 -https://github.com/jerryscript-project/jerryscript/issues/5076 -https://github.com/jerryscript-project/jerryscript/issues/5084 -https://github.com/jerryscript-project/jerryscript/issues/5092 -https://github.com/jerryscript-project/jerryscript/issues/5114 -https://github.com/jerryscript-project/jerryscript/issues/5132 -https://github.com/jerryscript-project/jerryscript/issues/5133 -https://github.com/jerryscript-project/jerryscript/issues/5135 -https://github.com/jet-pentest/CVE-2022-39838 -https://github.com/jettison-json/jettison/issues/52 -https://github.com/jettison-json/jettison/issues/54 -https://github.com/jflyfox/jfinal_cms/issues/27 -https://github.com/jflyfox/jfinal_cms/issues/54 -https://github.com/jhipster/generator-jhipster/issues/10401 -https://github.com/jhipster/jhipster-kotlin/issues/183 -https://github.com/jianyan74/TinyShop/issues/14 -https://github.com/jianyan74/rageframe2/issues/111 -https://github.com/jianyan74/rageframe2/issues/114 -https://github.com/jiaofj/cms/blob/main/There%20is%20a%20storage%20based%20XSS%20in%20the%20article%20management%20department.md -https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md -https://github.com/jishenghua/jshERP/issues/99 -https://github.com/jjanier/axml/issues/1 -https://github.com/jkriege2/TinyTIFF/issues/19 -https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/ -https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py -https://github.com/jmrozanec/cron-utils/issues/461 -https://github.com/jmurty/java-xmlbuilder/issues/6 -https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355 -https://github.com/joblib/joblib/issues/1582 -https://github.com/jofpin/trape/issues/168 -https://github.com/jofpin/trape/issues/169 -https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md -https://github.com/joinia/webray.com.cn/blob/main/Bludit/Bluditreadme.md -https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql1.md -https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql2.md -https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpms.md -https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpmssql.md -https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md -https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20upload.php%20File%20upload%20vulnerability.md -https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20uploader.php%20%20File%20upload%20vulnerability.md -https://github.com/joinia/webray.com.cn/blob/main/lead-management-system/leadmanasql.md -https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbanksql.md -https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure -https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control -https://github.com/jonschlinkert/remarkable/issues/331 -https://github.com/josdejong/jsoneditor/issues/1029 -https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170 -https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24 -https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc -https://github.com/jqueryfiletree/jqueryfiletree/issues/66 -https://github.com/jra89/CVE-2019-19576 -https://github.com/jra89/CVE-2019-19634 -https://github.com/jselliott/CVE-2023-38891 -https://github.com/jshafer817/Eaglesoft -https://github.com/jsmitty12/phpWhois/blob/master/CHANGELOG.md -https://github.com/json-c/json-c/issues/654 -https://github.com/jsummers/deark/issues/52 -https://github.com/jsummers/imageworsener/issues/15 -https://github.com/jsummers/imageworsener/issues/30 -https://github.com/jsummers/imageworsener/issues/34 -https://github.com/jtdowney/private_address_check/issues/1 -https://github.com/jtesta/gog_galaxy_client_service_poc -https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218 -https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh -https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7 -https://github.com/judge0/judge0/security/advisories/GHSA-3xpw-36v7-2cmg -https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf -https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr -https://github.com/julio-cfa/CVE-2024-33438 -https://github.com/jumpycastle/xmlrpc.net-poc -https://github.com/junrar/junrar/issues/73 -https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq -https://github.com/jusstSahil/CSRF-/blob/main/POC -https://github.com/justdan96/tsMuxer/issues/395 -https://github.com/justdan96/tsMuxer/issues/423 -https://github.com/justdan96/tsMuxer/issues/424 -https://github.com/justdan96/tsMuxer/issues/426 -https://github.com/justdan96/tsMuxer/issues/427 -https://github.com/justdan96/tsMuxer/issues/428 -https://github.com/justdan96/tsMuxer/issues/432 -https://github.com/justdan96/tsMuxer/issues/436 -https://github.com/justdan96/tsMuxer/issues/476 -https://github.com/justdan96/tsMuxer/issues/478 -https://github.com/justdan96/tsMuxer/issues/509 -https://github.com/justdan96/tsMuxer/issues/510 -https://github.com/justdan96/tsMuxer/issues/641 -https://github.com/justdan96/tsMuxer/issues/778 -https://github.com/justdan96/tsMuxer/issues/780 -https://github.com/justinas/nosurf/pull/60 -https://github.com/justinhunt/moodle-filter_poodll/issues/23 -https://github.com/justinsteven/advisories/blob/master/2017_rbenv_ruby_version_directory_traversal.md -https://github.com/justinsteven/advisories/blob/master/2017_rvm_cd_command_execution.md -https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md -https://github.com/juweihuitao/MpOperationLogs/ -https://github.com/jxm68868/cve/blob/main/upload.md -https://github.com/k-takata/Onigmo/issues/132 -https://github.com/k-takata/Onigmo/issues/139 -https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Memory_Corruption_1_0x83000084 -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Null_Pointer_Dereference_1 -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Pool_Corruption_1 -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002570 -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002574 -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c04_ -https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c44 -https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerDereference_0x82730020 -https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference1 -https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference_0x82730010 -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-1.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-3.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-4.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-5.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-1.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-2.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-3.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-1.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-2.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/RCE-1.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-1.md -https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-2.md -https://github.com/kagancapar/CVE-2022-29072 -https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md -https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-17-dsl-n14u.md -https://github.com/kalcaddle/KodExplorer/issues/482 -https://github.com/kaltura/server/issues/5303 -https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9 -https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx -https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr -https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2 -https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286 -https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv -https://github.com/kaoudis/advisories/blob/main/0-2021.md -https://github.com/kashimAstro/SimpleNetwork/issues/22 -https://github.com/kayo-zjq/myc/blob/main/1.md -https://github.com/kbgsft/vuln-dext5upload/wiki/File-Download-Vulnerability-in-DEXT5Upload-2.7.1262310-by-xcuter -https://github.com/kbni/owlky -https://github.com/keepassxreboot/keepassxc/discussions/9433 -https://github.com/keepinggg/poc/blob/main/poc_of_swfc -https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc -https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg -https://github.com/keepinggg/poc/tree/main/poc_of_swfdump -https://github.com/keheying/onekeyadmin/issues/1 -https://github.com/keheying/onekeyadmin/issues/11 -https://github.com/keheying/onekeyadmin/issues/4 -https://github.com/keheying/onekeyadmin/issues/7 -https://github.com/keheying/onekeyadmin/issues/8 -https://github.com/keheying/onekeyadmin/issues/9 -https://github.com/kekingcn/kkFileView/issues/304 -https://github.com/kekingcn/kkFileView/issues/347 -https://github.com/kekingcn/kkFileView/issues/366 -https://github.com/kekingcn/kkFileView/issues/370 -https://github.com/kekingcn/kkFileView/issues/389 -https://github.com/kekingcn/kkFileView/issues/392 -https://github.com/kermitt2/pdf2xml/issues/10 -https://github.com/kermitt2/pdf2xml/issues/11 -https://github.com/kermitt2/pdf2xml/issues/12 -https://github.com/kermitt2/pdf2xml/issues/14 -https://github.com/kermitt2/pdf2xml/issues/15 -https://github.com/kermitt2/pdfalto/issues/46 -https://github.com/keru6k/Online-Admission-System-RCE-PoC/blob/main/poc.py -https://github.com/kevinboone/epub2txt2/issues/22 -https://github.com/kevins1022/cve/blob/master/wordpress-Easy-Testimonials.md -https://github.com/kevins1022/cve/blob/master/wordpress-event-list.md -https://github.com/kevins1022/cve/blob/master/wordpress-product-catalog.md -https://github.com/kevva/decompress/issues/71 -https://github.com/kevva/decompress/pull/73 -https://github.com/keycloak/keycloak/issues/9247 -https://github.com/khmk2k/CVE-2023-31753/ -https://github.com/kilooooo/cms/blob/main/1.md -https://github.com/kilooooo/cms/blob/main/2.md -https://github.com/kimai/kimai/security/advisories/GHSA-cj3c-5xpm-cx94 -https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw -https://github.com/kindsoft/kindeditor/issues/321 -https://github.com/kings-way/deepinhack/blob/master/dde_daemon_poc.py -https://github.com/kingshao0312/cve/issues/1 -https://github.com/kirillwow/ids_bypass -https://github.com/kishan0725/Hospital-Management-System/issues/17 -https://github.com/kishan0725/Hospital-Management-System/issues/22 -https://github.com/kishan0725/Hospital-Management-System/issues/23 -https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx -https://github.com/kjur/jsrsasign/issues/437 -https://github.com/kjur/jsrsasign/issues/438 -https://github.com/kjur/jsrsasign/issues/439 -https://github.com/kk98kk0/exploit/issues/1 -https://github.com/kk98kk0/exploit/issues/2 -https://github.com/kk98kk0/exploit/issues/3 -https://github.com/kkent030315/CVE-2022-42046 -https://github.com/kkent030315/evil-mhyprot-cli -https://github.com/kkos/oniguruma/issues/147 -https://github.com/kkos/oniguruma/issues/162 -https://github.com/kkos/oniguruma/issues/163 -https://github.com/kkos/oniguruma/issues/164 -https://github.com/klange/toaruos/issues/243 -https://github.com/klange/toaruos/issues/244 -https://github.com/kmkz/exploit/blob/master/CVE-2017-5671-Credits.pdf -https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt -https://github.com/kmkz/exploit/blob/master/CVE-2019-14251-TEMENOS-T24.txt -https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt -https://github.com/knex/knex/issues/1227 -https://github.com/knik0/faac/issues/20 -https://github.com/knik0/faac/issues/21 -https://github.com/knik0/faac/issues/22 -https://github.com/knik0/faac/issues/23 -https://github.com/knik0/faac/issues/24 -https://github.com/knik0/faac/issues/25 -https://github.com/knik0/faad2/issues/19 -https://github.com/knik0/faad2/issues/20 -https://github.com/knik0/faad2/issues/21 -https://github.com/knik0/faad2/issues/29 -https://github.com/knik0/faad2/issues/30 -https://github.com/knik0/faad2/issues/32 -https://github.com/knik0/faad2/issues/56 -https://github.com/knik0/faad2/issues/57 -https://github.com/knik0/faad2/issues/58 -https://github.com/knik0/faad2/issues/59 -https://github.com/knik0/faad2/issues/60 -https://github.com/knik0/faad2/issues/62 -https://github.com/kobezzza/Collection/issues/27 -https://github.com/kofa2002/splunk -https://github.com/kohler/gifsicle/issues/140 -https://github.com/kohler/gifsicle/issues/196 -https://github.com/kohler/gifsicle/issues/65 -https://github.com/korzio/djv/pull/98/files -https://github.com/koto/exceed-mitm -https://github.com/kpz-wm/cve/blob/main/sql.md -https://github.com/krb5/krb5/commit/102bb6ebf20f9174130c85c3b052ae104e5073ec -https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd -https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b -https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 -https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc -https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca -https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d -https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b -https://github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d -https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1 -https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb -https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a -https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604 -https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 -https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789 -https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f -https://github.com/kuaifan/dootask/issues/210 -https://github.com/kuba--/zip/issues/123 -https://github.com/kubernetes/kubernetes/issues/61297 -https://github.com/kubernetes/kubernetes/issues/92914 -https://github.com/kubernetes/kubernetes/issues/97076 -https://github.com/kubevirt/kubevirt/issues/9109 -https://github.com/kvz/locutus/pull/418/ -https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332 -https://github.com/kyrie403/Vuln/blob/master/74cms/74cms%20v5.0.1%20remote%20code%20execution.md -https://github.com/kyrie403/Vuln/blob/master/Cobub%20Razor/Cobub%20Razor%20-%20file%20upload%20vulnerability.md -https://github.com/kyrie403/Vuln/blob/master/zzzcms/zzzphp%20v1.6.3%20write%20file%20with%20dangerous%20type.md -https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d -https://github.com/kyz/libmspack/issues/27 -https://github.com/l0nax/CVE-2019-15053 -https://github.com/l0nax/CVE-2019-15233 -https://github.com/l3m0nade/IOTvul/blob/master/compare_parentcontrol_time.md -https://github.com/l3m0nade/IOTvul/blob/master/fromSetWifiGusetBasic.md -https://github.com/l3m0nade/IOTvul/blob/master/get_parentControl_list_Info.md -https://github.com/l3m0nade/IOTvul/blob/master/sub_47D878.md -https://github.com/l3m0nade/IOTvul/blob/master/sub_49E098.md -https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33268.md -https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33269.md -https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33270.md -https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33271.md -https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33272.md -https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33273.md -https://github.com/labapart/gattlib/issues/81 -https://github.com/labapart/gattlib/issues/82 -https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f -https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp -https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62 -https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w -https://github.com/labstack/echo/pull/1718 -https://github.com/ladybirdweb/faveo-helpdesk/issues/446 -https://github.com/lakshaya0557/POCs/blob/main/POC -https://github.com/landley/toybox/issues/346 -https://github.com/lane711/sonicjs/pull/183 -https://github.com/langchain-ai/langchain/commit/727d5023ce88e18e3074ef620a98137d26ff92a3 -https://github.com/langchain-ai/langchain/issues/7700 -https://github.com/langchain-ai/langchain/issues/8363 -https://github.com/langhsu/mblog/issues/27 -https://github.com/langhsu/mblog/issues/50 -https://github.com/laoquanshi/Chic-Vulnerability- -https://github.com/laotun-s/POC/blob/main/CVE-2022-31382.txt -https://github.com/laotun-s/POC/blob/main/CVE-2022-31383.txt -https://github.com/laotun-s/POC/blob/main/CVE-2022-31384.txt -https://github.com/laotun-s/POC/blob/main/CVE-2022-32993.txt -https://github.com/laotun-s/POC/blob/main/CVE-2023-26925.txt -https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97 -https://github.com/laurent22/joplin/commit/9c20d5947d1fa4678a8b640792ff3d31224f0adf -https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26 -https://github.com/laurent22/joplin/issues/500 -https://github.com/laurent22/joplin/issues/6004 -https://github.com/laurent22/joplin/releases/tag/v2.0.9 -https://github.com/laurent22/joplin/releases/tag/v2.9.17 -https://github.com/lazyphp/PESCMS-TEAM/issues/7 -https://github.com/lazyphp/PESCMS-TEAM/issues/7, -https://github.com/lcg-22266/cms/blob/main/1.md -https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1 -https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/3 -https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/4 -https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5 -https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6 -https://github.com/ldarren/QuickJS/issues/11 -https://github.com/ldenoue/pdftojson/issues/3 -https://github.com/ldenoue/pdftojson/issues/4 -https://github.com/learnsec6/test/issues/1 -https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss -https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employeeadd-sqli -https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5 -https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt -https://github.com/leesavide/abcm2ps/issues/16 -https://github.com/leesavide/abcm2ps/issues/83 -https://github.com/leesavide/abcm2ps/issues/84 -https://github.com/leesavide/abcm2ps/issues/85 -https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md -https://github.com/lemon666/vuln/blob/master/Phpshe1.7_sql1.md -https://github.com/leonW7/D-Link/blob/master/Vul_1.md -https://github.com/leonW7/D-Link/blob/master/Vul_2.md -https://github.com/leonW7/D-Link/blob/master/Vul_3.md -https://github.com/leonW7/D-Link/blob/master/Vul_4.md -https://github.com/leonW7/D-Link/blob/master/Vul_5.md -https://github.com/leonW7/D-Link/blob/master/Vul_6.md -https://github.com/leona4040/PSG-6528VM-xss/blob/master/README.md -https://github.com/leonardobg/CVE-2022-24654 -https://github.com/leonardobg/CVE-2023-36143 -https://github.com/leonardobg/CVE-2023-36144 -https://github.com/leonardobg/CVE-2023-36146/#readme -https://github.com/leonhad/pdftools/issues/1 -https://github.com/leonhad/pdftools/issues/2 -https://github.com/leonhad/pdftools/issues/3 -https://github.com/leonhad/pdftools/issues/4 -https://github.com/leonhad/pdftools/issues/5 -https://github.com/leonhad/pdftools/issues/6 -https://github.com/leonzhao7/vulnerability/blob/master/An%20Out-of-Bounds%20Read%20%28DoS%29%20Vulnerability%20in%20hevc.c%20of%20libbpg.md -https://github.com/leonzhao7/vulnerability/blob/master/An%20integer%20underflow%20vulnerability%20in%20sao_filter_CTB%20of%20libbpg.md -https://github.com/lessthanoptimal/BoofCV/issues/406 -https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 -https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3 -https://github.com/lexborisov/myhtml/issues/175 -https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md -https://github.com/liang-junkai/Fault-injection-of-ML-DSA -https://github.com/liang-junkai/Relic-bbs-fault-injection -https://github.com/libarchive/libarchive/issues/1754 -https://github.com/libarchive/libarchive/issues/834 -https://github.com/libarchive/libarchive/issues/835 -https://github.com/libass/libass/issues/422 -https://github.com/libass/libass/issues/422#issuecomment-806002919 -https://github.com/libass/libass/issues/423 -https://github.com/libass/libass/issues/431 -https://github.com/libconfuse/libconfuse/issues/163 -https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5 -https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e -https://github.com/libevent/libevent/issues/318 -https://github.com/libevent/libevent/issues/332 -https://github.com/libexif/exif/issues/4 -https://github.com/libexpat/libexpat/pull/558 -https://github.com/libexpat/libexpat/pull/559 -https://github.com/libgd/libgd/issues/215 -https://github.com/libgd/libgd/issues/248 -https://github.com/libgd/libgd/issues/308 -https://github.com/libgd/libgd/issues/700 -https://github.com/libgd/libgd/pull/713 -https://github.com/libimobiledevice/libplist/issues/87 -https://github.com/libimobiledevice/libplist/issues/88 -https://github.com/libimobiledevice/libplist/issues/93 -https://github.com/libimobiledevice/libplist/issues/94 -https://github.com/libimobiledevice/libplist/issues/95 -https://github.com/libimobiledevice/libplist/issues/98 -https://github.com/libimobiledevice/libplist/issues/99 -https://github.com/libjpeg-turbo/libjpeg-turbo/issues/167 -https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258 -https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 -https://github.com/libjxl/libjxl/issues/1477 -https://github.com/libjxl/libjxl/issues/422 -https://github.com/liblouis/liblouis/issues/1171 -https://github.com/liblouis/liblouis/issues/1214 -https://github.com/liblouis/liblouis/issues/1292 -https://github.com/liblouis/liblouis/issues/1301 -https://github.com/liblouis/liblouis/issues/582 -https://github.com/libming/libming/issues/101 -https://github.com/libming/libming/issues/105 -https://github.com/libming/libming/issues/109 -https://github.com/libming/libming/issues/110 -https://github.com/libming/libming/issues/111 -https://github.com/libming/libming/issues/112 -https://github.com/libming/libming/issues/113 -https://github.com/libming/libming/issues/114 -https://github.com/libming/libming/issues/115 -https://github.com/libming/libming/issues/116 -https://github.com/libming/libming/issues/117 -https://github.com/libming/libming/issues/118 -https://github.com/libming/libming/issues/119 -https://github.com/libming/libming/issues/120 -https://github.com/libming/libming/issues/121 -https://github.com/libming/libming/issues/122 -https://github.com/libming/libming/issues/123 -https://github.com/libming/libming/issues/128 -https://github.com/libming/libming/issues/129 -https://github.com/libming/libming/issues/130 -https://github.com/libming/libming/issues/131 -https://github.com/libming/libming/issues/133 -https://github.com/libming/libming/issues/146 -https://github.com/libming/libming/issues/149 -https://github.com/libming/libming/issues/160 -https://github.com/libming/libming/issues/161 -https://github.com/libming/libming/issues/163 -https://github.com/libming/libming/issues/164 -https://github.com/libming/libming/issues/168 -https://github.com/libming/libming/issues/169 -https://github.com/libming/libming/issues/170 -https://github.com/libming/libming/issues/171 -https://github.com/libming/libming/issues/172 -https://github.com/libming/libming/issues/173 -https://github.com/libming/libming/issues/178 -https://github.com/libming/libming/issues/190 -https://github.com/libming/libming/issues/191 -https://github.com/libming/libming/issues/196 -https://github.com/libming/libming/issues/197 -https://github.com/libming/libming/issues/201 -https://github.com/libming/libming/issues/202 -https://github.com/libming/libming/issues/203 -https://github.com/libming/libming/issues/204 -https://github.com/libming/libming/issues/205 -https://github.com/libming/libming/issues/218 -https://github.com/libming/libming/issues/235 -https://github.com/libming/libming/issues/236 -https://github.com/libming/libming/issues/267 -https://github.com/libming/libming/issues/268 -https://github.com/libming/libming/issues/273 -https://github.com/libming/libming/issues/307 -https://github.com/libming/libming/issues/308 -https://github.com/libming/libming/issues/309 -https://github.com/libming/libming/issues/310 -https://github.com/libming/libming/issues/311 -https://github.com/libming/libming/issues/85 -https://github.com/libming/libming/issues/86 -https://github.com/libming/libming/issues/97 -https://github.com/libming/libming/issues/98 -https://github.com/libofx/libofx/issues/22 -https://github.com/librenms/librenms/issues/9170 -https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw -https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx -https://github.com/libsixel/libsixel/issues/25 -https://github.com/libsixel/libsixel/issues/27 -https://github.com/libsixel/libsixel/issues/51 -https://github.com/libsndfile/libsndfile/issues/687 -https://github.com/libsndfile/libsndfile/issues/731 -https://github.com/libsndfile/libsndfile/issues/789 -https://github.com/libtom/libtomcrypt/issues/507 -https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6 -https://github.com/libxls/libxls/issues/94 -https://github.com/libxmljs/libxmljs/issues/645 -https://github.com/libxmljs/libxmljs/issues/646 -https://github.com/libyal/libesedb/issues/43 -https://github.com/libyal/libexe/issues/1 -https://github.com/libyal/libfsclfs/issues/3 -https://github.com/libyal/libfwsi/issues/13 -https://github.com/libyal/liblnk/issues/38 -https://github.com/libyal/liblnk/issues/40 -https://github.com/libyal/libpff/issues/61 -https://github.com/libyal/libpff/issues/62 -https://github.com/lichti/shodan-portainer/ -https://github.com/lief-project/LIEF/issues/1038 -https://github.com/lief-project/LIEF/issues/449 -https://github.com/lief-project/LIEF/issues/763 -https://github.com/lief-project/LIEF/issues/764 -https://github.com/lief-project/LIEF/issues/765 -https://github.com/lief-project/LIEF/issues/766 -https://github.com/lief-project/LIEF/issues/767 -https://github.com/lief-project/LIEF/issues/781 -https://github.com/lief-project/LIEF/issues/782 -https://github.com/liftoff/GateOne/issues/736 -https://github.com/lihonghuyang/vulnerability/blob/master/dl_sendsms.php.md -https://github.com/linchuzhu/Dedecms-v5.7.101-RCE -https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495 -https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 -https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md -https://github.com/liong007/ZZCMS/issues/2 -https://github.com/liong007/Zed-3/issues/1 -https://github.com/liske/needrestart/releases/tag/v3.6 -https://github.com/litespeedtech/openlitespeed/issues/117 -https://github.com/litespeedtech/openlitespeed/issues/217 -https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss -https://github.com/liu21st/onethink/issues/36 -https://github.com/liu21st/onethink/issues/37 -https://github.com/liu21st/onethink/issues/39 -https://github.com/liu21st/onethink/issues/40 -https://github.com/liufee/cms/issues/43 -https://github.com/liufee/cms/issues/45 -https://github.com/liufee/cms/issues/57 -https://github.com/liufee/cms/issues/58 -https://github.com/liufee/cms/issues/59 -https://github.com/liufee/feehicms/issues/4 -https://github.com/livehybrid/poc-cribl-rce -https://github.com/liyako/vulnerability/blob/main/POC/Limbas-Blind-SQL-injection.md -https://github.com/liyansong2018/CVE-2024-32258 -https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 -https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31659 -https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34201 -https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34202 -https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34203 -https://github.com/liyansong2018/elfspirit/issues/1 -https://github.com/lizhipay/faka/issues/22 -https://github.com/ljw11e/cms/blob/main/4.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_sql_%20importexport.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_upload_%20updateos.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_sql_%20importexport.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20updateos.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20uploadfile.md -https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20web.md -https://github.com/llixixi/cve/blob/main/s45_upload_%20uploadfile.md -https://github.com/llixixi/cve/blob/main/s45_upload_%20userattestation.md -https://github.com/llixixi/cve/blob/main/s45_upload_changelogo.md -https://github.com/llixixi/cve/blob/main/s45_upload_licence.md -https://github.com/llixixi/cve/blob/main/s45_upload_web.md -https://github.com/llvm/llvm-project/issues/80287 -https://github.com/lntrx/CVE-2021-28663 -https://github.com/lobehub/lobe-chat/security/advisories/GHSA-pf55-fj96-xf37 -https://github.com/lock-upme/OPMS/issues/25 -https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16404/README.md -https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16862/README.md -https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17179/README.md -https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17409/README.md -https://github.com/lodestone-security/CVEs/tree/master/CVE-2020-13168 -https://github.com/lodi-g/CVE-2019-13361/ -https://github.com/login-securite/CVE/blob/main/CVE-2020-16194.md -https://github.com/lohith19/CVE-2022-3518/blob/main/POC -https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test(exiv2) -https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/blob/main/CVE-2022-28051/README.md -https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28051 -https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 -https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28479 -https://github.com/louiselalanne/CVE-2024-23745 -https://github.com/louiselalanne/CVE-2024-23746 -https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp -https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96 -https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g -https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 -https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296 -https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9 -https://github.com/lscjl/lsi.webray.com.cn/blob/main/CVE-project/Book%20Borrower%20System%20Cross%20site%20scripting.md -https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc -https://github.com/lsh123/xmlsec/issues/43 -https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formAddMacfilterRule -https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formWifiBasicSet -https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/fromSetWirelessRepeat -https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time -https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf -https://github.com/luca-regne/my-cves/tree/main/CVE-2021-37589 -https://github.com/lucasgcilento/CVE/blob/master/Dolibarr_CSRF -https://github.com/lucxssouza/CVE-2020-13886 -https://github.com/luelueking/Beetl-3.15.0-vuln-poc -https://github.com/luelueking/ruoyi-4.7.5-vuln-poc -https://github.com/luin/medis/issues/109 -https://github.com/luqiut/iot/blob/main/DIR-645%20Stack%20overflow.md -https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data -https://github.com/luvsn/OdZoo/tree/main/exploits/odoo-biometric-attendance -https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2 -https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe -https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander -https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog -https://github.com/luxiaoxun/NettyRpc/issues/53 -https://github.com/lvandeve/lodepng/issues/177 -https://github.com/lvu/rtf2html/issues/11 -https://github.com/lvyyevd/cms/blob/master/metinfo/metinfo7.0.0.md -https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59 -https://github.com/ly1g3/Joplin-CVE-2022-35131 -https://github.com/ly1g3/Mailcow-CVE-2022-31138 -https://github.com/ly1g3/Mailcow-CVE-2022-31245 -https://github.com/lzlzh2016/CVE/blob/master/XSS.md -https://github.com/lzlzh2016/CraftedWeb/blob/master/xss.md -https://github.com/m3lon/CVE/blob/master/CSRF/FUELCMS%20CSRF.md -https://github.com/m4b/bingrep/issues/30 -https://github.com/m4sk0ff/CVE-2021-38819/blob/main/CVE-2021-38819.md -https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24511%20-%3E%20Stored%20XSS%20in%20input%20Title%20of%20the%20Component -https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24512%20-%3E%20Stored%20XSS%20in%20input%20SubTitle%20of%20the%20Component -https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25434%20-%3E%20Stored%20XSS%20in%20input%20public%20name%20of%20the%20Component -https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25435%20-%3E%20Reflected%20XSS%20on%20md1patient%20login%20page -https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions -https://github.com/macvim-dev/macvim/security/advisories/GHSA-9jgj-jfwg-99fv -https://github.com/maddingo/sojo/issues/15 -https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 -https://github.com/maelosoki/MaeloStore/issues/1 -https://github.com/mafangqian/cms/blob/main/2.md -https://github.com/magicblack/maccms10/issues/1133 -https://github.com/magicblack/maccms10/issues/747 -https://github.com/magicblack/maccms10/issues/76 -https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3j2f-wf52-cjg7 -https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md -https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20(logic%20vulnerability).md -https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md -https://github.com/malerisch/omnivista-8770-unauth-rce -https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md -https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw -https://github.com/mantisbt/mantisbt/pull/1094 -https://github.com/manuelz120 -https://github.com/manuelz120/CVE-2021-45041 -https://github.com/manuelz120/CVE-2021-45897 -https://github.com/manvel-khnkoyan/jpv/issues/10 -https://github.com/marc-q/libwav/issues/24 -https://github.com/marc-q/libwav/issues/29 -https://github.com/marcobambini/gravity/issues/123 -https://github.com/marcobambini/gravity/issues/133 -https://github.com/marcobambini/gravity/issues/172 -https://github.com/marcobambini/gravity/issues/186 -https://github.com/marcobambini/gravity/issues/313 -https://github.com/marcobambini/gravity/issues/314 -https://github.com/marcobambini/gravity/issues/315 -https://github.com/marcobambini/gravity/issues/319 -https://github.com/marcobambini/gravity/issues/321 -https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-24721/CVE-2023-24721.md -https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-27775/CVE-2023-27775.md -https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj -https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf -https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown -https://github.com/marktext/marktext/issues/2360 -https://github.com/marktext/marktext/issues/2548 -https://github.com/marktext/marktext/issues/3575 -https://github.com/markuta/bw-dump -https://github.com/marmelab/react-admin/pull/8644 -https://github.com/martinfrancois/CVE-2018-1000529 -https://github.com/martinfrancois/CVE-2021-36460 -https://github.com/martinh/libconfuse/issues/109 -https://github.com/martinzhou2015/SRCMS/issues/20 -https://github.com/mashroompc0527/CVE/blob/main/vul.md -https://github.com/mastodon/mastodon/security/advisories/GHSA-7w3c-p9j8-mq3x -https://github.com/mastodon/mastodon/security/advisories/GHSA-vm39-j3vx-pch3 -https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2 -https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 -https://github.com/matt-/nunjucks_test -https://github.com/matthiaskramm/swftools/issues/100 -https://github.com/matthiaskramm/swftools/issues/101 -https://github.com/matthiaskramm/swftools/issues/102 -https://github.com/matthiaskramm/swftools/issues/103 -https://github.com/matthiaskramm/swftools/issues/105 -https://github.com/matthiaskramm/swftools/issues/106 -https://github.com/matthiaskramm/swftools/issues/114 -https://github.com/matthiaskramm/swftools/issues/115 -https://github.com/matthiaskramm/swftools/issues/116 -https://github.com/matthiaskramm/swftools/issues/121 -https://github.com/matthiaskramm/swftools/issues/122 -https://github.com/matthiaskramm/swftools/issues/124 -https://github.com/matthiaskramm/swftools/issues/125 -https://github.com/matthiaskramm/swftools/issues/128 -https://github.com/matthiaskramm/swftools/issues/129 -https://github.com/matthiaskramm/swftools/issues/13 -https://github.com/matthiaskramm/swftools/issues/130 -https://github.com/matthiaskramm/swftools/issues/131 -https://github.com/matthiaskramm/swftools/issues/132 -https://github.com/matthiaskramm/swftools/issues/133 -https://github.com/matthiaskramm/swftools/issues/135 -https://github.com/matthiaskramm/swftools/issues/136 -https://github.com/matthiaskramm/swftools/issues/137 -https://github.com/matthiaskramm/swftools/issues/138 -https://github.com/matthiaskramm/swftools/issues/139 -https://github.com/matthiaskramm/swftools/issues/14 -https://github.com/matthiaskramm/swftools/issues/141 -https://github.com/matthiaskramm/swftools/issues/142 -https://github.com/matthiaskramm/swftools/issues/143 -https://github.com/matthiaskramm/swftools/issues/145 -https://github.com/matthiaskramm/swftools/issues/146 -https://github.com/matthiaskramm/swftools/issues/168 -https://github.com/matthiaskramm/swftools/issues/169 -https://github.com/matthiaskramm/swftools/issues/170 -https://github.com/matthiaskramm/swftools/issues/171 -https://github.com/matthiaskramm/swftools/issues/172 -https://github.com/matthiaskramm/swftools/issues/173 -https://github.com/matthiaskramm/swftools/issues/174 -https://github.com/matthiaskramm/swftools/issues/175 -https://github.com/matthiaskramm/swftools/issues/176 -https://github.com/matthiaskramm/swftools/issues/177 -https://github.com/matthiaskramm/swftools/issues/188 -https://github.com/matthiaskramm/swftools/issues/196 -https://github.com/matthiaskramm/swftools/issues/197 -https://github.com/matthiaskramm/swftools/issues/198 -https://github.com/matthiaskramm/swftools/issues/206 -https://github.com/matthiaskramm/swftools/issues/207 -https://github.com/matthiaskramm/swftools/issues/208 -https://github.com/matthiaskramm/swftools/issues/21 -https://github.com/matthiaskramm/swftools/issues/210 -https://github.com/matthiaskramm/swftools/issues/211 -https://github.com/matthiaskramm/swftools/issues/212 -https://github.com/matthiaskramm/swftools/issues/213 -https://github.com/matthiaskramm/swftools/issues/214 -https://github.com/matthiaskramm/swftools/issues/215 -https://github.com/matthiaskramm/swftools/issues/216 -https://github.com/matthiaskramm/swftools/issues/217 -https://github.com/matthiaskramm/swftools/issues/219 -https://github.com/matthiaskramm/swftools/issues/223 -https://github.com/matthiaskramm/swftools/issues/225 -https://github.com/matthiaskramm/swftools/issues/23 -https://github.com/matthiaskramm/swftools/issues/24 -https://github.com/matthiaskramm/swftools/issues/25 -https://github.com/matthiaskramm/swftools/issues/26 -https://github.com/matthiaskramm/swftools/issues/27 -https://github.com/matthiaskramm/swftools/issues/28 -https://github.com/matthiaskramm/swftools/issues/30 -https://github.com/matthiaskramm/swftools/issues/31 -https://github.com/matthiaskramm/swftools/issues/32 -https://github.com/matthiaskramm/swftools/issues/33 -https://github.com/matthiaskramm/swftools/issues/34 -https://github.com/matthiaskramm/swftools/issues/36 -https://github.com/matthiaskramm/swftools/issues/46 -https://github.com/matthiaskramm/swftools/issues/47 -https://github.com/matthiaskramm/swftools/issues/50 -https://github.com/matthiaskramm/swftools/issues/52 -https://github.com/matthiaskramm/swftools/issues/57 -https://github.com/matthiaskramm/swftools/issues/97 -https://github.com/matthiaskramm/swftools/issues/98 -https://github.com/matthiaskramm/swftools/issues/99 -https://github.com/matthiasmaes/CVE-2020-27688 -https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/calendar_xss/calendar_xss.md -https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/csrf/csrf.md -https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/rce/rce_file_upload.md -https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/svg_xss/svg_xss.md -https://github.com/mattiapazienti/fledrCMS/issues/2 -https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 -https://github.com/maxmind/libmaxminddb/issues/236 -https://github.com/maxsite/cms/issues/430 -https://github.com/maxsite/cms/issues/487 -https://github.com/mclab-hbrs/BBB-POC -https://github.com/mcorybillington/SuiteCRM-RCE -https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py -https://github.com/mdadams/jasper/issues/112 -https://github.com/mdadams/jasper/issues/113 -https://github.com/mdadams/jasper/issues/114 -https://github.com/mdadams/jasper/issues/147 -https://github.com/mdadams/jasper/issues/172 -https://github.com/mdadams/jasper/issues/173 -https://github.com/mdadams/jasper/issues/184 -https://github.com/mdadams/jasper/issues/188 -https://github.com/mdadams/jasper/issues/191 -https://github.com/mdadams/jasper/issues/192 -https://github.com/mdadams/jasper/issues/93 -https://github.com/mdadams/jasper/issues/94 -https://github.com/mdanzaruddin/CVE-2021-33558. -https://github.com/mdanzaruddin/CVE-2021-33558./issues/1 -https://github.com/mde/ejs/issues/720 -https://github.com/mde/utilities/issues/29 -https://github.com/medikoo/es5-ext/issues/201 -https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117 -https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166 -https://github.com/memcached/memcached/issues/629 -https://github.com/memcached/memcached/issues/805 -https://github.com/memononen/nanosvg/issues/136 -https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md -https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md -https://github.com/menghaining/PoC/blob/main/xzs-mysql/xzs-mysql%20--%20PoC.md -https://github.com/merces/libpe/issues/35 -https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf -https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898 -https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25829 -https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830 -https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25831 -https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25832 -https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833 -https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13899 -https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900 -https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13901 -https://github.com/metaStor/Vuls/blob/main/gitblit/gitblit%20V1.9.3%20path%20traversal/gitblit%20V1.9.3%20path%20traversal.md -https://github.com/metaStor/Vuls/blob/main/zzzcms/zzzphp%20V2.1.0%20RCE/zzzphp%20V2.1.0%20RCE.md -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-7344-4pg9-qf45 -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3 -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxg8-4r3q-p9rv -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4 -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-vgvw-6xcf-qqfc -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm -https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf -https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27 -https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp -https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r -https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j -https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7 -https://github.com/metersphere/metersphere/security/advisories/GHSA-qxx2-p3w2-w4r6 -https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj -https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 -https://github.com/mholt/archiver/pull/65 -https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md -https://github.com/michaelrsweet/htmldoc/issues/413 -https://github.com/michaelrsweet/htmldoc/issues/414 -https://github.com/michaelrsweet/htmldoc/issues/415 -https://github.com/michaelrsweet/htmldoc/issues/416 -https://github.com/michaelrsweet/htmldoc/issues/417 -https://github.com/michaelrsweet/htmldoc/issues/418 -https://github.com/michaelrsweet/htmldoc/issues/423 -https://github.com/michaelrsweet/htmldoc/issues/425 -https://github.com/michaelrsweet/htmldoc/issues/431 -https://github.com/michaelrsweet/htmldoc/issues/433 -https://github.com/michaelrsweet/htmldoc/issues/444 -https://github.com/michaelrsweet/htmldoc/issues/453 -https://github.com/michaelrsweet/htmldoc/issues/456 -https://github.com/michaelrsweet/htmldoc/issues/461 -https://github.com/michaelrsweet/htmldoc/issues/463 -https://github.com/michaelrsweet/htmldoc/issues/470 -https://github.com/michaelrsweet/htmldoc/issues/471 -https://github.com/michaelrsweet/htmldoc/issues/480 -https://github.com/michaelrsweet/mxml/issues/237 -https://github.com/michaelrsweet/mxml/issues/286 -https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-68x8-9phf-j7jf -https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf -https://github.com/micrictor/http2-rst-stream -https://github.com/micromatch/braces/issues/35 -https://github.com/micromatch/braces/pull/37 -https://github.com/micromatch/micromatch/issues/243 -https://github.com/micronaut-projects/micronaut-security/security/advisories/GHSA-qw22-8w9r-864h -https://github.com/micropython/micropython/issues/13007 -https://github.com/microsoft/CBL-Mariner/pull/6381 -https://github.com/microweber/microweber/issues/1042 -https://github.com/microweber/microweber/issues/483 -https://github.com/microweber/microweber/issues/484 -https://github.com/micwallace/wallacepos/issues/84 -https://github.com/miekg/dns/issues/742 -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20In%20tools_AccountName -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20in%20pingV4Msg -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20IPAddress -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20Netmask -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20%20in%20reserveDHCP_HostName_1.1.1.0 -https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing -https://github.com/miguelhamal/CVE-2019-19393 -https://github.com/migueltarga/CVE-2020-9380 -https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md -https://github.com/mikelbring/tinyissue/issues/237 -https://github.com/millken/doyocms/issues/1 -https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp -https://github.com/mindstellar/Osclass/issues/495 -https://github.com/ming-soft/MCMS/issues/58 -https://github.com/ming-soft/MCMS/issues/59 -https://github.com/minghangshen/bug_poc -https://github.com/miniupnp/ngiflib/issues/11 -https://github.com/miniupnp/ngiflib/issues/12 -https://github.com/miniupnp/ngiflib/issues/15 -https://github.com/miniupnp/ngiflib/issues/16 -https://github.com/miniupnp/ngiflib/issues/17 -https://github.com/miniupnp/ngiflib/issues/18 -https://github.com/miniupnp/ngiflib/issues/19 -https://github.com/miniupnp/ngiflib/issues/27 -https://github.com/miniupnp/ngiflib/issues/29 -https://github.com/miniupnp/ngiflib/issues/4 -https://github.com/miniupnp/ngiflib/issues/5 -https://github.com/miniupnp/ngiflib/issues/6 -https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt -https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2019-6617.txt -https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12573.txt -https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12574.txt -https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12576.txt -https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12577.txt -https://github.com/miroslavpejic85/mirotalk/issues/139 -https://github.com/miruser/Roche-CVEs/blob/master/CVE-2017-11175.md -https://github.com/miruser/Roche-CVEs/blob/master/CVE-2019-12834.md -https://github.com/missing0x00/CVE-2018-5353 -https://github.com/missing0x00/CVE-2018-5354 -https://github.com/missing0x00/CVE-2020-26061 -https://github.com/misskey-dev/misskey/security/advisories/GHSA-2vxv-pv3m-3wvj -https://github.com/misskey-dev/misskey/security/advisories/GHSA-3f39-6537-3cgc -https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm -https://github.com/mity/md4c/issues/41 -https://github.com/mity/md4c/issues/42 -https://github.com/mkucej/i-librarian/issues/116 -https://github.com/mkucej/i-librarian/issues/119 -https://github.com/mkucej/i-librarian/issues/120 -https://github.com/mkucej/i-librarian/issues/121 -https://github.com/mkucej/i-librarian/issues/138 -https://github.com/mkucej/i-librarian/issues/139 -https://github.com/mkucej/i-librarian/issues/155 -https://github.com/mkucej/i-librarian/issues/155#issue-1501906608 -https://github.com/mlflow/mlflow/commit/1c6309f884798fbf56017a3cc808016869ee8de4 -https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 -https://github.com/mlogclub/bbs-go/issues/112 -https://github.com/mlr0p/CVE-2021-33564 -https://github.com/mmp/pbrt-v3/issues/296 -https://github.com/mnbvcxz131421/douhaocms/blob/main/README.md -https://github.com/mntn0x/POC/blob/master/S-CMS/S-CMS-SQL%E6%B3%A8%E5%85%A5.md -https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security -https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices -https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFile.py -https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29776 -https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29777 -https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488 -https://github.com/momo5502/cod-exploit -https://github.com/momo5502/cod-exploits/tree/master/steam-auth -https://github.com/monburan/attack-baijiacmsV4-with-csrf -https://github.com/monero-project/monero-gui/issues/3142#issuecomment-705940446 -https://github.com/monicahq/monica/issues/4888 -https://github.com/monicahq/monica/pull/4543 -https://github.com/monkey/monkey/issues/92 -https://github.com/monoxgas/mailorder -https://github.com/monstra-cms/monstra/issues/452 -https://github.com/monstra-cms/monstra/issues/458 -https://github.com/monstra-cms/monstra/issues/471 -https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-4927-23jw-rq62 -https://github.com/moov-io/signedxml/issues/23 -https://github.com/moses-smt/mosesdecoder/issues/237 -https://github.com/mozilla-mobile/mozilla-vpn-client/pull/7110 -https://github.com/mozilla/mozjpeg/issues/268 -https://github.com/mozilla/mozjpeg/issues/299 -https://github.com/mozilla/ssl-config-generator/issues/162 -https://github.com/mpdavis/python-jose/issues/344 -https://github.com/mpdf/mpdf/issues/867 -https://github.com/mpdf/mpdf/issues/949 -https://github.com/mperham/sidekiq/issues/4852 -https://github.com/mpgn/CRIME-poc -https://github.com/mpgn/poodle-PoC -https://github.com/mpruett/audiofile/issues/33 -https://github.com/mpruett/audiofile/issues/34 -https://github.com/mpruett/audiofile/issues/35 -https://github.com/mpruett/audiofile/issues/36 -https://github.com/mpruett/audiofile/issues/37 -https://github.com/mpruett/audiofile/issues/38 -https://github.com/mpruett/audiofile/issues/39 -https://github.com/mpruett/audiofile/issues/40 -https://github.com/mpruett/audiofile/issues/41 -https://github.com/mpruett/audiofile/issues/49 -https://github.com/mpruett/audiofile/issues/54 -https://github.com/mpruett/audiofile/issues/56 -https://github.com/mpruett/audiofile/issues/60 -https://github.com/mr-xmen786/CVE-2023-46478/tree/main -https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35428.md -https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35429.md -https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35430.md -https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35431.md -https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35432.md -https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35433.md -https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29004-POC-req.txt -https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29005-POC.sh -https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29006-POC.py -https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md -https://github.com/mrojz/rconfig-exploit/blob/main/README.md -https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md -https://github.com/mruby/mruby/issues/3995 -https://github.com/mruby/mruby/issues/4926 -https://github.com/mruby/mruby/issues/4927 -https://github.com/mruby/mruby/issues/4929 -https://github.com/mruby/mruby/issues/5042 -https://github.com/mruby/mruby/issues/5613 -https://github.com/mrvautin/expressCart/issues/120 -https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq -https://github.com/mspaling/mbam-exclusions-poc- -https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt -https://github.com/mspaling/zemana-exclusions-poc/blob/master/zemana-whitelist-poc.txt -https://github.com/mssalvatore/CVE-2019-14751_PoC -https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS -https://github.com/munin-monitoring/munin/blob/2.0.18/ChangeLog -https://github.com/musescore/MuseScore/issues/16346 -https://github.com/mvel/mvel/issues/348 -https://github.com/mvel/mvel/issues/348#issuecomment-1874047271 -https://github.com/mwarning/KadNode/issues/79 -https://github.com/mwrlabs/CVE-2016-7255 -https://github.com/mwrlabs/CVE-2018-4121 -https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-10.md -https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-18.md -https://github.com/mz-automation/libiec61850/issues/193 -https://github.com/mz-automation/libiec61850/issues/194 -https://github.com/mz-automation/libiec61850/issues/196 -https://github.com/mz-automation/libiec61850/issues/197 -https://github.com/mz-automation/libiec61850/issues/198 -https://github.com/mz-automation/libiec61850/issues/200 -https://github.com/mz-automation/libiec61850/issues/368 -https://github.com/mz-automation/libiec61850/issues/492 -https://github.com/mz-automation/libiec61850/issues/495 -https://github.com/mz-automation/libiec61850/issues/496 -https://github.com/n0obit4/Vulnerability_Disclosure/tree/main/CVE-2023-50015 -https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection -https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost -https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetPortForwardRules -https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg -https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules -https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode -https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setStaticDhcpConfig -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW -https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx -https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware -https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60 -https://github.com/n8tz/CVE-2022-24999 -https://github.com/nabby27/CMS/pull/3 -https://github.com/nagenanhai/cve/blob/main/duqu.md -https://github.com/nagenanhai/cve/blob/main/sql.md -https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md -https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md -https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/cmd%20injection -https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow -https://github.com/naihsin/IoT/tree/main/D-Link/DIR-619L/overflow -https://github.com/nam3lum/msi-central_privesc -https://github.com/nangge/noneCms/issues/21 -https://github.com/nangge/noneCms/issues/30 -https://github.com/nangge/noneCms/issues/32 -https://github.com/nangge/noneCms/issues/33 -https://github.com/nangge/noneCms/issues/35 -https://github.com/nasroabd/vulns/tree/main/XnView/2.51.5 -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md -https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Simple%20Food%20Ordering%20System%20-%20Authenticated%20Reflected%20XSS.md -https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm -https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r -https://github.com/nck0099/osTicket/issues/2 -https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg -https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff -https://github.com/nelhage/virtunoid -https://github.com/neocotic/convert-svg/issues/81 -https://github.com/neocotic/convert-svg/issues/84 -https://github.com/neocotic/convert-svg/issues/86 -https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11367 -https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11368 -https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11369 -https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11370 -https://github.com/net-snmp/net-snmp/issues/474 -https://github.com/net-snmp/net-snmp/issues/475 -https://github.com/netbox-community/netbox/issues/3471 -https://github.com/netcccyun/pan/issues/6 -https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93 -https://github.com/netplex/json-smart-v2/issues/67 -https://github.com/netptop/siteproxy/issues/67 -https://github.com/netsecfish/tbk_dvr_command_injection -https://github.com/netsecfish/xiongmai_incorrect_access_control -https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py -https://github.com/newbee-ltd/newbee-mall/issues/1 -https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f -https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit- -https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q -https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h -https://github.com/nextcloud/news-android/blob/master/security/GHSL-2021-1033_Nextcloud_News_for_Android.md -https://github.com/ngallagher/simplexml/issues/18 -https://github.com/nghttp2/nghttp2/pull/1961 -https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr -https://github.com/nginx/njs/issues/174 -https://github.com/nginx/njs/issues/187 -https://github.com/nginx/njs/issues/188 -https://github.com/nginx/njs/issues/322 -https://github.com/nginx/njs/issues/323 -https://github.com/nginx/njs/issues/324 -https://github.com/nginx/njs/issues/325 -https://github.com/nginx/njs/issues/447 -https://github.com/nginx/njs/issues/449 -https://github.com/nginx/njs/issues/451 -https://github.com/nginx/njs/issues/467 -https://github.com/nginx/njs/issues/469 -https://github.com/nginx/njs/issues/470 -https://github.com/nginx/njs/issues/471 -https://github.com/nginx/njs/issues/480 -https://github.com/nginx/njs/issues/481 -https://github.com/nginx/njs/issues/482 -https://github.com/nginx/njs/issues/483 -https://github.com/nginx/njs/issues/485 -https://github.com/nginx/njs/issues/486 -https://github.com/nginx/njs/issues/504 -https://github.com/nginx/njs/issues/506 -https://github.com/nginx/njs/issues/522 -https://github.com/nginx/njs/issues/523 -https://github.com/nginx/njs/issues/524 -https://github.com/nginx/njs/issues/529 -https://github.com/nginx/njs/issues/533 -https://github.com/nginx/njs/issues/540 -https://github.com/nginx/njs/issues/569 -https://github.com/nginx/njs/issues/615 -https://github.com/nginx/njs/issues/619 -https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md -https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/SQLi-1.md -https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/XSS-1.md -https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md -https://github.com/nightcloudos/cve/blob/main/CSRF.md -https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md -https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md -https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md -https://github.com/nih-at/libzip/issues/5 -https://github.com/nikeshtiwari1/House-Rental-System/issues/6 -https://github.com/nikeshtiwari1/House-Rental-System/issues/8 -https://github.com/nikhil-aniill/Small-CRM-CVE -https://github.com/nikhil1232/Cockpit-CMS-XSS-POC -https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection -https://github.com/nim-lang/zip/issues/54 -https://github.com/nimble-code/Modex/issues/8 -https://github.com/nimble-code/Spin/issues/56 -https://github.com/nipunsomani/Opencart-3.x.x-Authenticated-Stored-XSS/blob/master/README.md -https://github.com/nisdn/CVE-2021-40978 -https://github.com/nisdn/CVE-2021-40978/issues/1 -https://github.com/niteosoft/simplejobscript/issues/10 -https://github.com/niteosoft/simplejobscript/issues/7 -https://github.com/niteosoft/simplejobscript/issues/9 -https://github.com/nitinp1232/cms-corephp/issues/1 -https://github.com/nixwizard/CVE-2018-15365/ -https://github.com/njhartwell/pw3nage -https://github.com/nmap/nmap/issues/1568 -https://github.com/no-security/sqlalchemy_test -https://github.com/no1rr/Vulnerability/tree/master/Tenda/TX9Pro/1 -https://github.com/node-saml/passport-saml/pull/595 -https://github.com/node-swig/swig-templates/issues/88 -https://github.com/node-swig/swig-templates/issues/89 -https://github.com/noear/solon/issues/145 -https://github.com/noear/solon/issues/226 -https://github.com/noirotm/flvmeta/issues/19 -https://github.com/nokiatech/heif/issues/85 -https://github.com/nokiatech/heif/issues/86 -https://github.com/nokiatech/heif/issues/87 -https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py -https://github.com/nonamecoder/CVE-2022-27254 -https://github.com/nonamecoder/CVE-2023-22906 -https://github.com/nopSolutions/nopCommerce/issues/5322 -https://github.com/noperator/CVE-2019-18935 -https://github.com/noraj/Umbraco-RCE -https://github.com/nothings/stb/issues/1108 -https://github.com/nothings/stb/issues/1166 -https://github.com/nothings/stb/issues/1178 -https://github.com/nothings/stb/issues/1224 -https://github.com/nothings/stb/issues/1225 -https://github.com/nothings/stb/issues/1286 -https://github.com/nothings/stb/issues/790 -https://github.com/nothings/stb/issues/863 -https://github.com/nothings/stb/issues/864 -https://github.com/nothings/stb/issues/865 -https://github.com/nothings/stb/issues/866 -https://github.com/nothings/stb/issues/867 -https://github.com/nothings/stb/issues/868 -https://github.com/nothings/stb/issues/869 -https://github.com/notkisi/CVE-s/blob/master/CVE-2018-18912.py -https://github.com/novysodope/VulReq/blob/main/JFinalOA -https://github.com/novysodope/VulReq/blob/main/oa_system -https://github.com/nowsecure/samsung-ime-rce-poc/ -https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md -https://github.com/nrhirani/node-qpdf/issues/23 -https://github.com/nsbogam/CVE-2022-26269/blob/main/README.md -https://github.com/nsbogam/ebike -https://github.com/nsbogam/ebike-jammer -https://github.com/nsbogam/ebike-jammer/blob/main/README.md -https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg -https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25003 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-28452 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-31325 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-35458 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-36624 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37806 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41492 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41511 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41649 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41947 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42224 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42665 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42667 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42668 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43141 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44280 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44593 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44598 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44653 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44655 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-45334 -https://github.com/nu11secur1ty/CVE-mitre/tree/main/Online-Catering-Reservation-DT-Food-Catering -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection-Bypass-Authentication -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Piwigo/2022/12.3.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Projectworlds/2022/Online%20Examination%20System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PuneethReddyHC/event-management-1.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/acetech/2022/Home-Clean-Service-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/campcodes.com/Bank-Management-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/code-projects/Pharmacy-Management -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/glfusion/XSS-Reflected -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101821 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-12-09162021 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Multi%20Restaurant%20Table%20Reservation%20System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Garage-Management-System-1.0-SFU -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Accounting-Journal-Management -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Air-Cargo-Management-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store/SQL-Injection -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Courier-Management-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Covid-19-Travel-Pass-Management -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Employee-and-Visitor-Gate-Pass-Logging -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Resort-Management-System-1.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Payroll-Management-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple%20ChatBot -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Mobile-Comparison-Website -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Music-Cloud-Community-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Student-Information -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Student-Grading-System -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-03 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-04 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-06-092421 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-08-09072021 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-09 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-10-09102021 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-15-092121 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-19-302021 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-20-100121 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-21-100521 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Forum-Discussion-System-1.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/RSMS-1.0 -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Simple-Logistic-Hub-Parcels-Management -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/razormist -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/unyasoft/CTMS -https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/vetbossel.in/2022/Matrimony -https://github.com/nu774/fdkaac/issues/52 -https://github.com/nugmubs/chronoforums-cve/wiki/Stored-XSS-Vulnerability-in-Chronoforum-v2.0.11-(Joomla-plugin) -https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md -https://github.com/o2oa/o2oa/issues/156 -https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j -https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7 -https://github.com/oblac/jodd-http/issues/9 -https://github.com/oblac/jodd/issues/787 -https://github.com/octobercms/october/issues/1302 -https://github.com/offalltn/CVE-2022-45299 -https://github.com/ohler55/agoo/issues/88 -https://github.com/ohler55/ox/issues/194 -https://github.com/ohler55/ox/issues/195 -https://github.com/olmax99/helm-flask-celery/commit/28c985d712d7ac26893433e8035e2e3678fcae9f -https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control -https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection -https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS -https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.txt -https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.yaml -https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt -https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-42710/CVE-2022-42710.txt -https://github.com/omeka/Omeka/issues/935 -https://github.com/omershaik0/Handmade_Exploits/tree/main/SISQUALWFM-Host-Header-Injection-CVE-2023-36085 -https://github.com/omnitaint/Vulnerability-Reports/blob/2211ea4712f24d20b7f223fb737910fdfb041edb/reports/rails-routes-to-json/report.md -https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md -https://github.com/onionshare/onionshare/issues/1389 -https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc -https://github.com/onkyoworm/poc/blob/master/laobancms/poc.md -https://github.com/onlaj/Piano-LED-Visualizer/issues/350 -https://github.com/onlaj/Piano-LED-Visualizer/pull/351 -https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4 -https://github.com/onnx/onnx/issues/3991 -https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5xv3-fm7g-865r -https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-6wx7-qw5p-wh84 -https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-7vf4-x5m2-r6gr -https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-8p5r-6mvv-2435 -https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-j86m-rrpr-g8gw -https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v -https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw -https://github.com/open-telemetry/opentelemetry-java-instrumentation/security/advisories/GHSA-hghr-r469-gfq6 -https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17 -https://github.com/open5gs/open5gs/issues/1247 -https://github.com/open5gs/open5gs/issues/764 -https://github.com/openSUSE/libsolv/issues/416 -https://github.com/openSUSE/libsolv/issues/417 -https://github.com/openSUSE/libsolv/issues/425 -https://github.com/opencontainers/runc/issues/2128 -https://github.com/opencontainers/runc/issues/2197 -https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334 -https://github.com/opencv/opencv/issues/10351 -https://github.com/opencv/opencv/issues/10479 -https://github.com/opencv/opencv/issues/15124 -https://github.com/opencv/opencv/issues/9370 -https://github.com/opencv/opencv/issues/9371 -https://github.com/opencv/opencv/issues/9372 -https://github.com/opencv/opencv/issues/9723 -https://github.com/opendocman/opendocman/issues/163 -https://github.com/openemr/openemr/issues/1781 -https://github.com/openemr/openemr/issues/1782 -https://github.com/openemr/openemr/issues/498 -https://github.com/openexr/openexr/issues/248 -https://github.com/openexr/openexr/issues/350 -https://github.com/openexr/openexr/issues/351 -https://github.com/openid/ruby-openid/pull/43 -https://github.com/openlink/virtuoso-opensource/issues/1118 -https://github.com/openlink/virtuoso-opensource/issues/1119 -https://github.com/openlink/virtuoso-opensource/issues/1120 -https://github.com/openlink/virtuoso-opensource/issues/1121 -https://github.com/openlink/virtuoso-opensource/issues/1122 -https://github.com/openlink/virtuoso-opensource/issues/1123 -https://github.com/openlink/virtuoso-opensource/issues/1124 -https://github.com/openlink/virtuoso-opensource/issues/1125 -https://github.com/openlink/virtuoso-opensource/issues/1126 -https://github.com/openlink/virtuoso-opensource/issues/1127 -https://github.com/openlink/virtuoso-opensource/issues/1128 -https://github.com/openlink/virtuoso-opensource/issues/1129 -https://github.com/openlink/virtuoso-opensource/issues/1130 -https://github.com/openlink/virtuoso-opensource/issues/1131 -https://github.com/openlink/virtuoso-opensource/issues/1132 -https://github.com/openlink/virtuoso-opensource/issues/1133 -https://github.com/openlink/virtuoso-opensource/issues/1134 -https://github.com/openlink/virtuoso-opensource/issues/1135 -https://github.com/openlink/virtuoso-opensource/issues/1136 -https://github.com/openlink/virtuoso-opensource/issues/1137 -https://github.com/openlink/virtuoso-opensource/issues/1138 -https://github.com/openlink/virtuoso-opensource/issues/1139 -https://github.com/openlink/virtuoso-opensource/issues/1140 -https://github.com/openlink/virtuoso-opensource/issues/1141 -https://github.com/openlink/virtuoso-opensource/issues/1173 -https://github.com/openlink/virtuoso-opensource/issues/1176 -https://github.com/openlink/virtuoso-opensource/issues/1177 -https://github.com/openlink/virtuoso-opensource/issues/1178 -https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7 -https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v -https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4 -https://github.com/openscad/openscad/issues/4043 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-25j8-69h7-83h2 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh -https://github.com/orangecertcc/security-research/security/advisories/GHSA-34f2-7h57-rg7p -https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj -https://github.com/orangecertcc/security-research/security/advisories/GHSA-8wx4-g5p9-348h -https://github.com/orangecertcc/security-research/security/advisories/GHSA-f49v-45qp-cv53 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-f73m-fvj3-m2pm -https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-gr7j-26pv-5v57 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-hhfw-6cm2-v3w5 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg -https://github.com/orangecertcc/security-research/security/advisories/GHSA-j94f-5cg6-6j9j -https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf -https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc -https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr -https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p -https://github.com/orangecertcc/security-research/security/advisories/GHSA-qx9c-49m4-f3vj -https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47 -https://github.com/orangecertcc/security-research/security/advisories/GHSA-r32j-xgg3-w2rw -https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g -https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr -https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r -https://github.com/orangecertcc/security-research/security/advisories/GHSA-wjp8-8qf6-vqmc -https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc -https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r -https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp -https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p -https://github.com/osamu620/OpenHTJ2K -https://github.com/oskarsve/ms-teams-rce -https://github.com/ossec/ossec-hids/issues/1585 -https://github.com/ossec/ossec-hids/issues/1953 -https://github.com/ossec/ossec-hids/releases/tag/2.8.1 -https://github.com/osvaldotenorio/CVE-2024-34470 -https://github.com/osvaldotenorio/CVE-2024-34471 -https://github.com/osvaldotenorio/CVE-2024-34472 -https://github.com/oswetto/LoboEvolution/issues/38 -https://github.com/otavioarj/SIOCtl -https://github.com/overXsky/IrfanviewPoc -https://github.com/owlike/genson/issues/191 -https://github.com/oxen-io/session-android/pull/897 -https://github.com/oyeahtime/test/issues/3 -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_NoticeUrl_rce4.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicemac_rce.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicename_rce.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_easywizard_leak.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_getWiFiApConfig_leak.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_hosttime_rce.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_ipdoamin_rce.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_langtype_rce.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_login_bypass.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_reboot.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_sysstatus_leak.md -https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_telnet_default.md -https://github.com/p1ckzi/CVE-2022-35513 -https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI -https://github.com/p8w/akcms/issues/1 -https://github.com/p8w/akcms/issues/2 -https://github.com/paalbra/zabbix-zbxsec-7 -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-09.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md -https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md -https://github.com/pallets/jinja/issues/549 -https://github.com/pandao/editor.md/issues/700 -https://github.com/pandao/editor.md/issues/709 -https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md -https://github.com/pang0lin/CVEproject/blob/main/wordpress_side-menu-lite_sqli.md -https://github.com/panghusec/exploit/issues/2 -https://github.com/panghusec/exploit/issues/8 -https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt -https://github.com/paragbagul111/CVE-2023-30145 -https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst -https://github.com/parcel-bundler/parcel/pull/1794 -https://github.com/parisneo/lollms-webui/commit/1e17df01e01d4d33599db2afaafe91d90b6f0189 -https://github.com/passtheticket/vulnerability-research/blob/main/cockpitProject/README.md -https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md -https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md -https://github.com/patriksimek/vm2/issues/197 -https://github.com/patriksimek/vm2/issues/467 -https://github.com/patriksimek/vm2/issues/515 -https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv -https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m -https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4 -https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v -https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5 -https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985 -https://github.com/pawelmalak/snippet-box/issues/57 -https://github.com/payatu/QuickHeal -https://github.com/payloadbox/xss-payload-list -https://github.com/pbgt/CVEs/blob/main/CVE-2021-39285.md -https://github.com/pcmacdon/jsish/issues/10 -https://github.com/pcmacdon/jsish/issues/100 -https://github.com/pcmacdon/jsish/issues/101 -https://github.com/pcmacdon/jsish/issues/12 -https://github.com/pcmacdon/jsish/issues/13 -https://github.com/pcmacdon/jsish/issues/14 -https://github.com/pcmacdon/jsish/issues/16 -https://github.com/pcmacdon/jsish/issues/5 -https://github.com/pcmacdon/jsish/issues/51 -https://github.com/pcmacdon/jsish/issues/52 -https://github.com/pcmacdon/jsish/issues/53 -https://github.com/pcmacdon/jsish/issues/54 -https://github.com/pcmacdon/jsish/issues/55 -https://github.com/pcmacdon/jsish/issues/57 -https://github.com/pcmacdon/jsish/issues/60 -https://github.com/pcmacdon/jsish/issues/61 -https://github.com/pcmacdon/jsish/issues/62 -https://github.com/pcmacdon/jsish/issues/63 -https://github.com/pcmacdon/jsish/issues/64 -https://github.com/pcmacdon/jsish/issues/65 -https://github.com/pcmacdon/jsish/issues/67 -https://github.com/pcmacdon/jsish/issues/68 -https://github.com/pcmacdon/jsish/issues/69 -https://github.com/pcmacdon/jsish/issues/70 -https://github.com/pcmacdon/jsish/issues/73 -https://github.com/pcmacdon/jsish/issues/74 -https://github.com/pcmacdon/jsish/issues/78 -https://github.com/pcmacdon/jsish/issues/81 -https://github.com/pcmacdon/jsish/issues/83 -https://github.com/pcmacdon/jsish/issues/84 -https://github.com/pcmacdon/jsish/issues/85 -https://github.com/pcmacdon/jsish/issues/86 -https://github.com/pcmacdon/jsish/issues/98 -https://github.com/pcmt/superMicro-CMS/issues/1 -https://github.com/pcmt/superMicro-CMS/issues/2 -https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 -https://github.com/peanuts62/TP-Link-poc -https://github.com/pear/Archive_Tar/issues/33 -https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_dc9_admin.txt -https://github.com/pedrib/PoC/blob/master/advisories/NUUO/nuuo_nvrmini_round2.mkd -https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2019/lao_bomb/lao_bomb.md -https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/minesweeper.md -https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md -https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt -https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt -https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt -https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md -https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt -https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-report.txt -https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-testcase.html -https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt -https://github.com/penson233/Vuln/issues/3 -https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rce -https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2Dhcpip_cgi/1.md -https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2IPQoSTcDel/1.md -https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWifiDownSettings/1.md -https://github.com/peris-navince/founded-0-days/blob/main/Tenda/ac500/fromSetVlanInfo/1.md -https://github.com/petergoldstein/dalli/issues/932 -https://github.com/petewarden/catdoc/issues/9 -https://github.com/pghuanghui/CVE_Request/blob/main/AERIAL%20X%201200_Command%20Execution%20Vulnerability.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Command%20Execution%20Vulnerability.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Sensitive%20information%20leakage.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_live.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__live_mfg.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__Sensitive%20information%20leakage.md -https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__messages.md -https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_Tftpd32.assets/WiFi-Repeater_Tftpd32.md -https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_fctest.assets/WiFi-Repeater_fctest.md -https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_mb_wifibasic.assets/WiFi-Repeater_mb_wifibasic.md -https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_syslog.shtml.md -https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md -https://github.com/ph0nkybit/proof-of-concepts/tree/main/Use_Of_Hardcoded_Password_In_ALF-BanCO_8.2.x -https://github.com/phantom0301/vulns/blob/master/Metinfo.md -https://github.com/phantom0301/vulns/blob/master/Metinfo2.md -https://github.com/phax/ph-commons/issues/35 -https://github.com/philippe/FrogCMS/issues/10 -https://github.com/philippe/FrogCMS/issues/6 -https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4 -https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 -https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr -https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw -https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4 -https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq -https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr -https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv -https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 -https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4 -https://github.com/phpList/phplist3/issues/660 -https://github.com/phpList/phplist3/issues/665 -https://github.com/phpList/phplist3/issues/666 -https://github.com/phpList/phplist3/issues/669 -https://github.com/phpList/phplist3/issues/672 -https://github.com/phpfusion/PHPFusion/issues/2329 -https://github.com/phpipam/phpipam/issues/2327 -https://github.com/phpipam/phpipam/issues/2344 -https://github.com/phpipam/phpipam/issues/3025 -https://github.com/phpipam/phpipam/issues/3351 -https://github.com/phpipam/phpipam/issues/992 -https://github.com/phpmyadmin/phpmyadmin/issues/16056 -https://github.com/phulelouch/CVEs/blob/main/CVE-2024-34448.md -https://github.com/pi-engine/pi/issues/1523 -https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-33w4-xf7m-f82m -https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-5cm9-6p3m-v259 -https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497 -https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x -https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-h7cm-mrvq-wcfr -https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-xq59-7jf3-rjc6 -https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83 -https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md -https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv -https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-jfxw-6c5v-c42f -https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-c38c-c8mh-vq68 -https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-g273-wppx-82w4 -https://github.com/pimcore/ecommerce-framework-bundle/security/advisories/GHSA-cx99-25hr-5jxf -https://github.com/pimcore/pimcore/security/advisories/GHSA-72hh-xf79-429p -https://github.com/pingcap/tidb/issues/52159 -https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/README.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/Reflected-XSS.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/CSTI-KnowageSuite7-3.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/HTLM-Injection-KnowageSuite.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/SQLi-KnowageSuite.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-notes.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-surname.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSSI-KnowageSuite.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md -https://github.com/piuppi/Proof-of-Concepts/blob/main/WSO2/CVE-2020-25516.md -https://github.com/pixee/java-security-toolkit/security/advisories/GHSA-qh4g-4m4w-jgv2 -https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf -https://github.com/pixelimity/pixelimity/issues/19 -https://github.com/pixelimity/pixelimity/issues/20 -https://github.com/pixelimity/pixelimity/issues/21 -https://github.com/pixelimity/pixelimity/issues/23 -https://github.com/pjlantz/optee-qemu/blob/main/README.md -https://github.com/pkuvcl/davs2/issues/29 -https://github.com/plack/Plack/issues/405 -https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9 -https://github.com/plone/Products.CMFPlone/issues/3255 -https://github.com/plougher/squashfs-tools/issues/72 -https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405 -https://github.com/pluck-cms/pluck/issues/69 -https://github.com/pluck-cms/pluck/issues/70 -https://github.com/pluck-cms/pluck/issues/81 -https://github.com/pluck-cms/pluck/issues/98 -https://github.com/pluginsGLPI/formcreator/security/advisories/GHSA-777g-3848-8r3g -https://github.com/pluxml/PluXml/issues/320 -https://github.com/pluxml/PluXml/issues/321 -https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee -https://github.com/podofo/podofo/files/11260976/poc-file.zip -https://github.com/podofo/podofo/issues/66 -https://github.com/podofo/podofo/issues/67 -https://github.com/podofo/podofo/issues/69 -https://github.com/podofo/podofo/issues/70 -https://github.com/podofo/podofo/issues/71 -https://github.com/podofo/podofo/issues/72 -https://github.com/polaris0x1/CVE/issues/1 -https://github.com/polaris0x1/CVE/issues/2 -https://github.com/polaris0x1/CVE/issues/3 -https://github.com/ponchio/untrunc/issues/131 -https://github.com/poropro/kuaifan/issues/3 -https://github.com/portainer/portainer/issues/2475 -https://github.com/ppp-src/ha/issues/3 -https://github.com/ppp-src/ha/issues/4 -https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 -https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114 -https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-20082 -https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-6258 -https://github.com/pradeepjairamani/TYPO3-XSS-POC -https://github.com/pradeepjairamani/WolfCMS-XSS-POC -https://github.com/pradeepjairamani/WolfCMS-XSS-POC/blob/master/Wolfcms%20v0.8.3.1%20xss%20POC%20by%20Pradeep%20Jairamani.pdf -https://github.com/pramodmahato/BlogCMS/issues/1 -https://github.com/pravednik/xmlBundle/issues/2 -https://github.com/preempt/credssp -https://github.com/prismbreak/vulnerabilities/issues/2 -https://github.com/prismbreak/vulnerabilities/issues/3 -https://github.com/prismbreak/vulnerabilities/issues/4 -https://github.com/prismbreak/vulnerabilities/issues/5 -https://github.com/processing/processing/issues/5706 -https://github.com/proftpd/proftpd/issues/903 -https://github.com/progfay/scrapbox-parser/pull/519 -https://github.com/progfay/scrapbox-parser/pull/539 -https://github.com/projectcapsule/capsule-proxy/security/advisories/GHSA-fpvw-6m5v-hqfp -https://github.com/projectsend/projectsend/issues/995 -https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2 -https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2 -https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3 -https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/13 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/15 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/8 -https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/9 -https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1 -https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2 -https://github.com/prometheus/blackbox_exporter/issues/1024 -https://github.com/proofofcalc/cve-2019-6453-poc -https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf -https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-2p2x-p7wj-j5h2 -https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-xg8v-m2mh-45m6 -https://github.com/psudo-bugboy/CVE-2024 -https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9582.md -https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md -https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md -https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md -https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-06-29-CVE-2019-13030.md -https://github.com/pts/sam2p/issues/14 -https://github.com/pts/sam2p/issues/18 -https://github.com/pts/sam2p/issues/28 -https://github.com/pts/sam2p/issues/29 -https://github.com/pts/sam2p/issues/30 -https://github.com/pts/sam2p/issues/32 -https://github.com/pts/sam2p/issues/39 -https://github.com/pts/sam2p/issues/41 -https://github.com/pts/sam2p/issues/66 -https://github.com/pts/sam2p/issues/67 -https://github.com/pugjs/pug/issues/3312 -https://github.com/punkave/sanitize-html/issues/100 -https://github.com/pupnp/pupnp/issues/249 -https://github.com/purpleracc00n/CVE-2019-16941 -https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md -https://github.com/pwndoc/pwndoc/issues/401 -https://github.com/pwndorei/CVE-2024-22532 -https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f -https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5 -https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr -https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2 -https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv -https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm -https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g -https://github.com/pymedusa/Medusa/security/advisories/GHSA-6589-x6f5-cgg9 -https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv -https://github.com/pypa/pip/issues/425 -https://github.com/pypa/pip/issues/6413 -https://github.com/pytest-dev/py/issues/287 -https://github.com/python/cpython/issues/103824 -https://github.com/python/cpython/pull/12577 -https://github.com/python/cpython/pull/25099 -https://github.com/pytroll/donfig/issues/5 -https://github.com/q3k/cve-2019-5736-poc -https://github.com/qdrant/qdrant/issues/2268 -https://github.com/qemm/joomlasqli -https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3 -https://github.com/qinggan/phpok/issues/12 -https://github.com/qinggan/phpok/issues/5 -https://github.com/qinming99/dst-admin/issues/28 -https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md -https://github.com/qoli/Merlin.PHP/issues/26 -https://github.com/qoli/Merlin.PHP/issues/27 -https://github.com/qpdf/qpdf/issues/1123 -https://github.com/qpdf/qpdf/issues/146 -https://github.com/qpdf/qpdf/issues/202 -https://github.com/qpdf/qpdf/issues/243 -https://github.com/qpdf/qpdf/issues/492 -https://github.com/qq956801985/cve/blob/main/sql.md -https://github.com/quartz-scheduler/quartz/issues/943 -https://github.com/quickapps/cms/issues/199 -https://github.com/quilljs/quill/issues/3364 -https://github.com/qurbat/CVE-2022-0236 -https://github.com/qurbat/gpon -https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430 -https://github.com/r04i7/CVE/blob/main/CVE-2024-35581.md -https://github.com/r04i7/CVE/blob/main/CVE-2024-35582.md -https://github.com/r04i7/CVE/blob/main/CVE-2024-35583.md -https://github.com/r0ck3t1973/xss_payload/issues/6 -https://github.com/r0ck3t1973/xss_payload/issues/7 -https://github.com/r1b/CVE-2017-13089 -https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43509 -https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h -https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg -https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869 -https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx -https://github.com/radare/radare2/issues/10464 -https://github.com/radare/radare2/issues/10498 -https://github.com/radare/radare2/issues/8731 -https://github.com/radare/radare2/issues/8742 -https://github.com/radare/radare2/issues/8743 -https://github.com/radare/radare2/issues/8748 -https://github.com/radare/radare2/issues/9725 -https://github.com/radare/radare2/issues/9726 -https://github.com/radare/radare2/issues/9727 -https://github.com/radare/radare2/issues/9913 -https://github.com/radare/radare2/issues/9915 -https://github.com/radare/radare2/releases/tag/3.7.0 -https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 -https://github.com/radareorg/radare2/issues/15543 -https://github.com/radareorg/radare2/issues/17383 -https://github.com/radareorg/radare2/issues/17431 -https://github.com/radareorg/radare2/issues/20336 -https://github.com/radareorg/radare2/issues/20354 -https://github.com/radareorg/radare2/issues/22333 -https://github.com/radareorg/radare2/issues/22334 -https://github.com/radareorg/radare2/issues/22349 -https://github.com/rails/rails/issues/46244 -https://github.com/ralap-z/rpcms/issues/1 -https://github.com/ralap-z/rpcms/issues/2 -https://github.com/ralap-z/rpcms/issues/3 -https://github.com/ramda/ramda/pull/3192 -https://github.com/rand0mIdas/randomideas/blob/main/ShimoVPN.md -https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-29384 -https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33436 -https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33437 -https://github.com/rapid7/metasploit-framework/issues/13026 -https://github.com/rapid7/metasploit-framework/issues/14015 -https://github.com/rapid7/metasploit-framework/issues/8064 -https://github.com/rapid7/metasploit-framework/pull/14365 -https://github.com/rapid7/metasploit-framework/pull/16044 -https://github.com/rapid7/metasploit-framework/pull/16989 -https://github.com/rapid7/metasploit-framework/pull/1834 -https://github.com/rauc/rauc/security/advisories/GHSA-cgf3-h62j-w9vv -https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25277 -https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675 -https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34676 -https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33761 -https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33763 -https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764 -https://github.com/rawchen/sims/issues/7 -https://github.com/rawchen/sims/issues/8 -https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting -https://github.com/rdincel1/Craft-CMS-3.0.25---Cross-Site-Scripting -https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2019/lao_bomb.md -https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2020/minesweeper.md -https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serverName_parameter_in_the_function_fromAdvSetMacMtuWan.md -https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serviceName_parameter_in_the_function_fromAdvSetMacMtuWan.md -https://github.com/realistic-security/CVE-2017-16524 -https://github.com/reasoncms/reasoncms/issues/264 -https://github.com/rebol0x6c/2345_mouse_poc -https://github.com/rebol0x6c/2345_msg_poc -https://github.com/redaxo/redaxo/issues/2043 -https://github.com/redaxo/redaxo4/issues/420 -https://github.com/redaxo/redaxo4/issues/422 -https://github.com/redblueteam/CVE-2023-41507/ -https://github.com/redblueteam/CVE-2023-41508/ -https://github.com/reevesrs24/CVE/blob/master/Netgear_WNDR2400v3/upnp_stack_overflow/upnp_stack_overflow.md -https://github.com/refi64/CVE-2020-25265-25266 -https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx -https://github.com/relic-toolkit/relic/issues/154 -https://github.com/relic-toolkit/relic/issues/155 -https://github.com/relic-toolkit/relic/issues/284 -https://github.com/remix30303/AirBoxAPNLeaks -https://github.com/remix30303/AirBoxDoom -https://github.com/remix30303/AirboxLeak -https://github.com/remix30303/AsusLeak -https://github.com/remoteclinic/RemoteClinic/issues/22 -https://github.com/remoteclinic/RemoteClinic/issues/23 -https://github.com/remoteclinic/RemoteClinic/issues/24 -https://github.com/renmizo/CVE-2022-41412 -https://github.com/renmizo/CVE-2022-41413 -https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf -https://github.com/request/request/issues/1904 -https://github.com/restify/node-restify/issues/1018 -https://github.com/rgaufman/live555/issues/19 -https://github.com/rhymix/rhymix/issues/1088 -https://github.com/rhysd/Shiba/issues/42 -https://github.com/ricardojoserf/CVE-2021-40845 -https://github.com/richardgirges/express-fileupload/issues/236 -https://github.com/richgel999/miniz/issues/90 -https://github.com/rickxy/Stock-Management-System/issues/2 -https://github.com/rickxy/Stock-Management-System/issues/3 -https://github.com/rickxy/Stock-Management-System/issues/4 -https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/1 -https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/2 -https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/3 -https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/4 -https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/5 -https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/6 -https://github.com/riscv-boom/riscv-boom/issues/577 -https://github.com/rishaldwivedi/Public_Disclosure/blob/master/README.md#msi-dragon-center-eop -https://github.com/risuxx/CVE-2023-51126 -https://github.com/riteshgohil/My_CVE/blob/main/CVE-2020-35852.md -https://github.com/rizinorg/rizin/pull/1313 -https://github.com/rjbs/Email-MIME/issues/66 -https://github.com/rjt-gupta/CVE-2021-29337 -https://github.com/rmccarth/cve-2021-3164 -https://github.com/robertchrk/zmanda_exploit -https://github.com/robertguetzkow/CVE-2021-37740 -https://github.com/robertguetzkow/ets5-password-recovery -https://github.com/robiso/wondercms/issues/64 -https://github.com/robymontyz/pocs/blob/main/AudimexEE/ReflectedXSS.md -https://github.com/rockcarry/ffjpeg/issues/10 -https://github.com/rockcarry/ffjpeg/issues/11 -https://github.com/rockcarry/ffjpeg/issues/12 -https://github.com/rockcarry/ffjpeg/issues/13 -https://github.com/rockcarry/ffjpeg/issues/14 -https://github.com/rockcarry/ffjpeg/issues/25 -https://github.com/rockcarry/ffjpeg/issues/26 -https://github.com/rockcarry/ffjpeg/issues/27 -https://github.com/rockcarry/ffjpeg/issues/28 -https://github.com/rockcarry/ffjpeg/issues/36 -https://github.com/rockcarry/ffjpeg/issues/43 -https://github.com/rockcarry/ffjpeg/issues/44 -https://github.com/rockcarry/ffjpeg/issues/47 -https://github.com/rockcarry/ffjpeg/issues/49 -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20CSRF.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-1.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-1.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-2.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-3.md -https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-4.md -https://github.com/rohe/pysaml2/issues/366 -https://github.com/rohit0x5/poc/blob/main/cve_2 -https://github.com/rohit0x5/poc/blob/main/idor -https://github.com/roman-mueller/PoC/tree/master/CVE-2023-50488 -https://github.com/roman-mueller/PoC/tree/master/CVE-2023-51820 -https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst -https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5 -https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc -https://github.com/ros-planning/navigation2/issues/3940 -https://github.com/ros/actionlib/pull/171 -https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 -https://github.com/roundcube/roundcubemail/pull/7302 -https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm -https://github.com/rsrahulsingh05/POC/blob/main/Stored%20XSS -https://github.com/rsyslog/libfastjson/issues/161 -https://github.com/rt122001/CVES/blob/main/CVE-2023-37684.txt -https://github.com/rt122001/CVES/blob/main/CVE-2023-37685.txt -https://github.com/rt122001/CVES/blob/main/CVE-2023-37689.txt -https://github.com/rtomayko/rack-cache/blob/master/CHANGES -https://github.com/ruby/ruby/pull/1777 -https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000058 -https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000084 -https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000088 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x830020F0 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x830020FC -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002100 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300211C -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002124 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002128 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300212C -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300215B -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300215F -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_95002578 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_950025b0 -https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_95002610 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730008 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730020 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730030 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730050 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730054 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730070 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730074 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730088 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82732140 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82736068 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x8273A0A0 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x82730068 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x827300A4 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x82736068 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273A0A0 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273E060 -https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273E080 -https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32 -https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml -https://github.com/rubyzip/rubyzip/issues/315 -https://github.com/rubyzip/rubyzip/issues/369 -https://github.com/rubyzip/rubyzip/pull/403 -https://github.com/rust-lang/rust/issues/44800 -https://github.com/rust-lang/rust/issues/83618 -https://github.com/rustsec/advisory-db/pull/1798 -https://github.com/rxwx/CVE-2017-11882 -https://github.com/rxwx/CVE-2017-8570 -https://github.com/rxwx/CVE-2018-0802 -https://github.com/s-cart/s-cart/issues/102 -https://github.com/s-cart/s-cart/issues/52 -https://github.com/s0tr/CVE-2023-33781 -https://github.com/s0tr/CVE-2023-33782 -https://github.com/s1kr10s/EasyChatServer-DOS -https://github.com/s3131212/allendisk/issues/16 -https://github.com/s3131212/allendisk/issues/21 -https://github.com/s3inlc/hashtopussy/issues/241 -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/SetPortForwardRules/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/loginAuth/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/setIpPortFilterRules/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20NR1800X/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md -https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/loginAuth_http_host/README.md -https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi -https://github.com/saaramar/execve_exploit -https://github.com/safe-b/CVE/issues/1 -https://github.com/safe-b/CVE/issues/1#issue-1817133689 -https://github.com/sagemath/FlintQS/issues/3 -https://github.com/sagemathinc/cocalc/security/advisories/GHSA-8w44-hggw-p5rf -https://github.com/sahaRatul/sela/issues/23 -https://github.com/sahaRatul/sela/issues/25 -https://github.com/sahaRatul/sela/issues/26 -https://github.com/sahaRatul/sela/issues/27 -https://github.com/sahaRatul/sela/issues/28 -https://github.com/sahaRatul/sela/issues/29 -https://github.com/sahaRatul/sela/issues/30 -https://github.com/sahaRatul/sela/issues/31 -https://github.com/sahaRatul/sela/issues/32 -https://github.com/sahellebusch/flattenizer/pull/13 -https://github.com/sahildari/cve/blob/master/CVE-2024-31061.md -https://github.com/sahildari/cve/blob/master/CVE-2024-31062.md -https://github.com/sahildari/cve/blob/master/CVE-2024-31063.md -https://github.com/sahildari/cve/blob/master/CVE-2024-31064.md -https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md -https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md -https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Cross%20Site%20Request%20Forgery%20in%20Piwigo%202.9.2.md -https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md -https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Stored%20XSS%20Vulnerabilities%20in%20Piwigo%202.9.2.md -https://github.com/sahiloj/CVE-2023-37596/blob/main/README.md -https://github.com/sahilop123/-CVE-2022-48150 -https://github.com/saitamang/CVE-2021-35475/blob/main/README.md -https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md -https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md -https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md -https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System -https://github.com/saitamang/POC-DUMP/tree/main/PayMoney -https://github.com/saitoha/libsixel/blob/master/ChangeLog -https://github.com/saitoha/libsixel/issues/108 -https://github.com/saitoha/libsixel/issues/109 -https://github.com/saitoha/libsixel/issues/110 -https://github.com/saitoha/libsixel/issues/120 -https://github.com/saitoha/libsixel/issues/121 -https://github.com/saitoha/libsixel/issues/122 -https://github.com/saitoha/libsixel/issues/123 -https://github.com/saitoha/libsixel/issues/125 -https://github.com/saitoha/libsixel/issues/126 -https://github.com/saitoha/libsixel/issues/127 -https://github.com/saitoha/libsixel/issues/134 -https://github.com/saitoha/libsixel/issues/136 -https://github.com/saitoha/libsixel/issues/143 -https://github.com/saitoha/libsixel/issues/156 -https://github.com/saitoha/libsixel/issues/157 -https://github.com/saitoha/libsixel/issues/158 -https://github.com/saitoha/libsixel/issues/163 -https://github.com/saitoha/libsixel/issues/165 -https://github.com/saitoha/libsixel/issues/166 -https://github.com/saitoha/libsixel/issues/73 -https://github.com/saitoha/libsixel/issues/74 -https://github.com/saitoha/libsixel/issues/75 -https://github.com/saitoha/libsixel/issues/85 -https://github.com/sajaljat/CVE-2023-46449/tree/main -https://github.com/sajaljat/CVE-2023-46451 -https://github.com/sajaljat/CVE-2023-46980/tree/main -https://github.com/salesagility/SuiteCRM-Core/security/advisories/GHSA-fxww-jqfv-9rrr -https://github.com/salesagility/SuiteCRM/issues/333 -https://github.com/salesforce/tough-cookie/issues/282 -https://github.com/saltstack/salt/commits/master -https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c -https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 -https://github.com/samyk/slipstream -https://github.com/sandyre/libopencad/issues/43 -https://github.com/sanluan/PublicCMS/issues/11 -https://github.com/sanluan/PublicCMS/issues/12 -https://github.com/sanluan/PublicCMS/issues/79 -https://github.com/sansanyun/mipcms5/issues/4 -https://github.com/sansanyun/mipcms5/issues/5 -https://github.com/sapplica/sentrifugo/issues/384 -https://github.com/sass/libsass/issues/2661 -https://github.com/sass/libsass/issues/2662 -https://github.com/sass/libsass/issues/2663 -https://github.com/sass/libsass/issues/2665 -https://github.com/sass/libsass/issues/2814 -https://github.com/sass/libsass/issues/2815 -https://github.com/sass/libsass/issues/2816 -https://github.com/sass/libsass/issues/2999 -https://github.com/sass/libsass/issues/3000 -https://github.com/sass/libsass/issues/3001 -https://github.com/sass/libsass/issues/3174 -https://github.com/sass/libsass/issues/3177 -https://github.com/sass/libsass/issues/3178 -https://github.com/saysky/ForestBlog/issues/20 -https://github.com/sazanrjb/InventoryManagementSystem/issues/14 -https://github.com/sbaresearch/advisories/tree/public/2015/Polycom_20150513 -https://github.com/sbaresearch/advisories/tree/public/2015/RXTEC_20150513 -https://github.com/sbaresearch/advisories/tree/public/2015/knAx_20150101 -https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection -https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-02_Teltonika_Incorrect_Access_Control -https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180410-01_Teltonika_Cross_Site_Scripting -https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal -https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180425-01_phpWhois_Code_Execution -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190305-01_Ping_Identity_Agentless_Integration_Kit_Reflected_XSS -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190911-01_Easy_FancyBox_WP_Plugin_Stored_XSS -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-01_WordPress_Plugin_EU_Cookie_Law -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-03_WordPress_Plugin_Events_Manager -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-04_WordPress_Plugin_All_in_One_SEO_Pack -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-01_Monsta_FTP_Arbitrary_File_Read_and_Write -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery -https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191211-01_Monsta_FTP_Stored_XSS -https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure -https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-02_CloudLinux_CageFS_Insufficiently_Restricted_Proxy_Commands -https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220120-01_MOKOSmart_MKGW1_Gateway_Improper_Session_Management -https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF -https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting -https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure -https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use -https://github.com/sbmzhcn/EmpireCMS/issues/1 -https://github.com/scarvell/grandstream_exploits -https://github.com/scausoft/cve/blob/main/rce.md -https://github.com/scausoft/cve/blob/main/sql.md -https://github.com/schettino72/sqla_yaml_fixtures/issues/20 -https://github.com/scikit-learn/scikit-learn/issues/18891 -https://github.com/scipy/scipy/issues/14713 -https://github.com/scipy/scipy/issues/14713#issuecomment-1629468565 -https://github.com/scorelab/OpenMF/issues/262 -https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF) -https://github.com/seacms-com/seacms/issues/23 -https://github.com/seacms-net/CMS/issues/15 -https://github.com/sec-Kode/cve -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/1 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/4 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/5 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/6 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/10 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/11 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/12 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/13 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/2 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/6 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/8 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/3 -https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/7 -https://github.com/seccome/Ehoney/issues/59 -https://github.com/secf0ra11/secf0ra11.github.io/blob/main/Shopro_SQL_injection.md -https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate -https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example -https://github.com/secure-77/CVE-2022-31262 -https://github.com/securifera/CVE-2018-6546-Exploit/ -https://github.com/seedis/Z-BlogPHP/blob/master/Z-BlogPHP_stored_xss.md -https://github.com/seedis/zzcms/blob/master/README.md -https://github.com/seedis/zzcms/blob/master/SQL%20injection%20in%20%20addclass.md -https://github.com/seedis/zzcms/blob/master/SQL%20injection%20in%20zs_elite.php.md -https://github.com/seedis/zzcms/blob/master/SQL%20injection.md -https://github.com/seedis/zzcms/blob/master/arbitrary_file_deletion1.md -https://github.com/segonse/cve/blob/main/sichuang/sichuang.md -https://github.com/sehmaschine/django-grappelli/issues/975 -https://github.com/sek1th/iot/blob/master/DIR-816L_XSS.md -https://github.com/semplon/GeniXCMS/issues/62 -https://github.com/semplon/GeniXCMS/issues/64 -https://github.com/semplon/GeniXCMS/issues/65 -https://github.com/semplon/GeniXCMS/issues/66 -https://github.com/semplon/GeniXCMS/issues/68 -https://github.com/semplon/GeniXCMS/issues/69 -https://github.com/semplon/GeniXCMS/issues/70 -https://github.com/semplon/GeniXCMS/issues/71 -https://github.com/seopanel/Seo-Panel/issues/201 -https://github.com/seopanel/Seo-Panel/issues/202 -https://github.com/seopanel/Seo-Panel/issues/206 -https://github.com/seopanel/Seo-Panel/issues/207 -https://github.com/seopanel/Seo-Panel/issues/208 -https://github.com/seopanel/Seo-Panel/issues/209 -https://github.com/seopanel/Seo-Panel/issues/210 -https://github.com/seopanel/Seo-Panel/issues/211 -https://github.com/seopanel/Seo-Panel/issues/212 -https://github.com/sergeKashkin/Simple-RAT/pull/11 -https://github.com/serializingme/cve-2016-9192 -https://github.com/sfh320/seacms/issues/1 -https://github.com/shadowsock5/ThinkCMF-5.0.190111/blob/master/README.md -https://github.com/shadowsocks/shadowsocks-libev/issues/1734 -https://github.com/shahzaibak96/CVE-2023-46480 -https://github.com/sharathc213/CVE-2023-7172 -https://github.com/sharathc213/CVE-2023-7173 -https://github.com/sharemice/phpcms_xss/blob/master/index.html -https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20 -https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py -https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639 -https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640 -https://github.com/sheehan/grails-console/issues/54 -https://github.com/sheehan/grails-console/issues/55 -https://github.com/shellpei/TOTOLINK-Unauthorized/blob/main/CVE-2023-23064 -https://github.com/shellshok3/Cross-Site-Scripting-XSS/blob/main/Bus%20Pass%20Management%20System%201.0.md -https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0 -https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 -https://github.com/shenzhim/aaptjs/issues/2 -https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md -https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/3.md -https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/4.md -https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/5.md -https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/6.md -https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/9.md -https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20A3300R/1/README.md -https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20LR1200GB/1/README.md -https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/1/README.md -https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/2/README.md -https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r -https://github.com/shish/shimmie2/issues/597 -https://github.com/shopex/ecshop/issues/6 -https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45418.md -https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45419.md -https://github.com/shreyansh225/Sports-Club-Management-System/issues/6 -https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md -https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md -https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md -https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md -https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-28595.md -https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8 -https://github.com/shulao2020/cve/blob/main/Flying%20Fish.md -https://github.com/shyiko/ktlint/pull/332 -https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-002.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-004.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-009.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md -https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-128.md -https://github.com/sigubbs/cms/blob/main/33/csrf.md -https://github.com/sigubbs/cms/blob/main/34/csrf.md -https://github.com/sigubbs/cms/blob/main/35/csrf.md -https://github.com/sigubbs/cms/blob/main/36/csrf.md -https://github.com/silent6trinity/CVE-2024-34582 -https://github.com/silnrsi/graphite/issues/22 -https://github.com/simplcommerce/SimplCommerce/issues/943 -https://github.com/simplcommerce/SimplCommerce/issues/969 -https://github.com/simsong/tcpflow/issues/195 -https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md -https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md -https://github.com/siteserver/cms/issues/1858 -https://github.com/siteserver/cms/issues/3492 -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20rooms.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20update-rooms.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20book_history.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20booktime.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20navbar.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20receipt.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20rooms.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-rooms.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-users.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20users.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20bookdate.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20booktime.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20receipt.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20rooms.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-rooms.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20users.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Leave%20Cancel%20SQL%20Injection.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/IDOR%20Employee%20Profile.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/XSS%20Vulnerability%20in%20Project%20Assignment%20Report.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20admin-manage-user.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/BROKEN%20ACCESS%20CONTROL%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20Login.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20member-view.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-chat.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-member-edit.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Home/Blind%20SQL%20Injection%20Home.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/SQL%20Injection%20Search/SQL%20Injection%20in%20search.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md -https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md -https://github.com/skoranga/node-dns-sync/issues/5 -https://github.com/skvadrik/re2c/commit/c4603ba5ce229db83a2a4fb93e6d4b4e3ec3776a -https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm -https://github.com/skysafe/reblog/tree/main/cve-2023-45866 -https://github.com/skysider/openexif_vulnerabilities -https://github.com/sl4cky/LumisXP-XXE---POC/blob/main/poc.txt -https://github.com/slackero/phpwcms/issues/312 -https://github.com/sleepyvv/vul_report/blob/main/C-data/BrokenAccessControl.md -https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md -https://github.com/sleuthkit/sleuthkit/issues/1264 -https://github.com/sleuthkit/sleuthkit/issues/1265 -https://github.com/sleuthkit/sleuthkit/issues/1266 -https://github.com/sleuthkit/sleuthkit/issues/1575 -https://github.com/sleuthkit/sleuthkit/issues/1576 -https://github.com/sleuthkit/sleuthkit/issues/1829 -https://github.com/sleuthkit/sleuthkit/pull/1374 -https://github.com/slic3r/Slic3r/issues/5117 -https://github.com/slic3r/Slic3r/issues/5118 -https://github.com/slic3r/Slic3r/issues/5119 -https://github.com/slic3r/Slic3r/issues/5120 -https://github.com/slims/slims7_cendana/issues/50 -https://github.com/slims/slims8_akasia/issues/103 -https://github.com/slims/slims8_akasia/issues/48 -https://github.com/slims/slims8_akasia/issues/49 -https://github.com/slims/slims9_bulian/issues/186 -https://github.com/slims/slims9_bulian/issues/204 -https://github.com/slims/slims9_bulian/issues/209 -https://github.com/slims/slims9_bulian/issues/217 -https://github.com/slims/slims9_bulian/issues/229 -https://github.com/smriti548/CVE/blob/main/CVE-2021-3275 -https://github.com/sms2056/cms/blob/main/1.md -https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md -https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md -https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability -https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx -https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h -https://github.com/socketio/socket.io/issues/3671 -https://github.com/software-mansion/react-native-reanimated/pull/3382 -https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa -https://github.com/songah119/Report/blob/main/CI-1.md -https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9 -https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj -https://github.com/sony/nnabla/issues/209 -https://github.com/soruly/whatanime.ga/issues/8 -https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md -https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md -https://github.com/soundarkutty/Stored-xss/blob/main/poc -https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System/blob/main/PoC -https://github.com/source-hunter/espcms/issues/1 -https://github.com/source-trace/beescms/issues/1 -https://github.com/source-trace/beescms/issues/4 -https://github.com/source-trace/beescms/issues/5 -https://github.com/source-trace/yunucms/issues/1 -https://github.com/source-trace/yunucms/issues/2 -https://github.com/source-trace/yunucms/issues/3 -https://github.com/source-trace/yunucms/issues/4 -https://github.com/source-trace/yunucms/issues/5 -https://github.com/source-trace/yunucms/issues/6 -https://github.com/source-trace/yunucms/issues/7 -https://github.com/source-trace/yunucms/issues/8 -https://github.com/sourceincite/randy -https://github.com/soy-oreocato/CVE-2023-46998/ -https://github.com/soy-oreocato/CVE-Advisories/tree/main/PapiQuieroPollo00 -https://github.com/spaceraccoon/CVE-2020-10665 -https://github.com/spatie/image-optimizer/issues/210 -https://github.com/spcck/cve/blob/main/sql.md -https://github.com/spejman/festivaltts4r/issues/1 -https://github.com/spesmilo/electrum/issues/3678 -https://github.com/splitbrain/dokuwiki/issues/2061 -https://github.com/splitbrain/dokuwiki/issues/2080 -https://github.com/splitbrain/dokuwiki/issues/2081 -https://github.com/splitbrain/dokuwiki/issues/2450 -https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v -https://github.com/spwpun/pocs -https://github.com/spwpun/pocs/blob/main/frr-bgpd.md -https://github.com/sqlalchemy/sqlalchemy/issues/4481 -https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518 -https://github.com/squid-cache/squid/pull/585 -https://github.com/sromanhu/CMSmadesimple-Stored-XSS---File-Picker-extension -https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md -https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md -https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection- -https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content -https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra -https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager -https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension -https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media/blob/main/README.md -https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md -https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu/blob/main/README.md -https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main -https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail -https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags -https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations -https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms -https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation -https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection- -https://github.com/sromanhu/RiteCMS-Stored-XSS---MainMenu/blob/main/README.md -https://github.com/sromanhu/Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md -https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md -https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main -https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout -https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage/blob/main/README.md -https://github.com/srsec/-srsec-/issues/1 -https://github.com/ss122-0ss/School/blob/main/readme.md -https://github.com/ss122-0ss/semcms/blob/main/README.md -https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4 -https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37 -https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-5pfx-j27j-4c6h -https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-rwp5-f854-ppg6 -https://github.com/stampit-org/supermixer/issues/9 -https://github.com/star7th/showdoc/issues/1406 -https://github.com/starnight/MicroHttpServer/issues/5 -https://github.com/starnight/MicroHttpServer/issues/8 -https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g -https://github.com/static-web-server/static-web-server/security/advisories/GHSA-rwfq-v4hq-h7fg -https://github.com/staufnic/CVE/tree/master/CVE-2019-18794 -https://github.com/staufnic/CVE/tree/master/CVE-2019-18795 -https://github.com/staufnic/CVE/tree/master/CVE-2019-18796 -https://github.com/staufnic/CVE/tree/master/CVE-2019-19513 -https://github.com/stephane/libmodbus/issues/614 -https://github.com/stephane/libmodbus/issues/683 -https://github.com/stephane/libmodbus/issues/748 -https://github.com/stephane/libmodbus/issues/749 -https://github.com/stephane/libmodbus/issues/750 -https://github.com/stepmania/stepmania/issues/1890 -https://github.com/steveukx/properties/issues/40 -https://github.com/sthierolf/security/blob/main/CVE-2021-35061.md -https://github.com/sthierolf/security/blob/main/CVE-2021-35062.md -https://github.com/stleary/JSON-java/issues/654 -https://github.com/stleary/JSON-java/issues/708 -https://github.com/stleary/JSON-java/issues/758 -https://github.com/stong/CVE-2020-15368?tab=readme-ov-file -https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r -https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f -https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 -https://github.com/strik3r0x1/Vulns/blob/35fe4fb3d5945b5df2a87aab0cf9ec6137bcf976/Insufficient%20Session%20Expiration%20-%20Elenos.md -https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md -https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to%20access%20Traps%20configurations.md -https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md -https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md -https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md -https://github.com/strik3r0x1/Vulns/blob/main/Lack%20of%20resources%20and%20rate%20limiting%20-%20Elenos.md -https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md -https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md -https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WN533A8.md -https://github.com/strik3r0x1/Vulns/blob/main/Wavlink%20WL-WN531G3.md -https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md -https://github.com/strukturag/libde265/issues/232 -https://github.com/strukturag/libde265/issues/233 -https://github.com/strukturag/libde265/issues/234 -https://github.com/strukturag/libde265/issues/235 -https://github.com/strukturag/libde265/issues/236 -https://github.com/strukturag/libde265/issues/237 -https://github.com/strukturag/libde265/issues/238 -https://github.com/strukturag/libde265/issues/239 -https://github.com/strukturag/libde265/issues/240 -https://github.com/strukturag/libde265/issues/242 -https://github.com/strukturag/libde265/issues/298 -https://github.com/strukturag/libde265/issues/299 -https://github.com/strukturag/libde265/issues/300 -https://github.com/strukturag/libde265/issues/301 -https://github.com/strukturag/libde265/issues/302 -https://github.com/strukturag/libde265/issues/335 -https://github.com/strukturag/libde265/issues/336 -https://github.com/strukturag/libde265/issues/337 -https://github.com/strukturag/libde265/issues/338 -https://github.com/strukturag/libde265/issues/339 -https://github.com/strukturag/libde265/issues/340 -https://github.com/strukturag/libde265/issues/341 -https://github.com/strukturag/libde265/issues/342 -https://github.com/strukturag/libde265/issues/343 -https://github.com/strukturag/libde265/issues/344 -https://github.com/strukturag/libde265/issues/345 -https://github.com/strukturag/libde265/issues/346 -https://github.com/strukturag/libde265/issues/347 -https://github.com/strukturag/libde265/issues/348 -https://github.com/strukturag/libde265/issues/349 -https://github.com/strukturag/libde265/issues/352 -https://github.com/strukturag/libde265/issues/367 -https://github.com/strukturag/libde265/issues/368 -https://github.com/strukturag/libde265/issues/369 -https://github.com/strukturag/libde265/issues/378 -https://github.com/strukturag/libde265/issues/379 -https://github.com/strukturag/libde265/issues/383 -https://github.com/strukturag/libde265/issues/384 -https://github.com/strukturag/libde265/issues/385 -https://github.com/strukturag/libde265/issues/388 -https://github.com/strukturag/libde265/issues/418 -https://github.com/strukturag/libde265/issues/426 -https://github.com/strukturag/libde265/issues/427 -https://github.com/strukturag/libde265/issues/435 -https://github.com/strukturag/libheif/issues/1042 -https://github.com/strukturag/libheif/issues/1046 -https://github.com/strukturag/libheif/issues/138 -https://github.com/strukturag/libheif/issues/139 -https://github.com/strukturag/libheif/issues/207 -https://github.com/strukturag/libheif/issues/794 -https://github.com/stsaz/phiola/issues/27 -https://github.com/stsaz/phiola/issues/28 -https://github.com/stsaz/phiola/issues/29 -https://github.com/stsaz/phiola/issues/30 -https://github.com/summernote/summernote/pull/3782 -https://github.com/sungjungk/fp-img-key-crack -https://github.com/sungjungk/fp-scanner-hacking -https://github.com/sungjungk/keyring_crack -https://github.com/sungjungk/whoopsie_killer -https://github.com/sungjungk/whoopsie_killer2/blob/master/README.md -https://github.com/sungjungk/whoopsie_killer2/blob/master/whoopsie_killer2.py -https://github.com/sunkaifei/FlyCms/issues/1 -https://github.com/sunkaifei/FlyCms/issues/8 -https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 -https://github.com/sunyixuan1228/cve/blob/main/weaver.md -https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md -https://github.com/svanderburg/libiff/issues/10 -https://github.com/svgpp/svgpp/issues/70 -https://github.com/swoole/swoole-src/pull/3539 -https://github.com/sword1991912/metinfo/issues/1 -https://github.com/swzhouu/CVE-2020-26732 -https://github.com/swzhouu/CVE-2020-26733 -https://github.com/swzhouu/CVE-2020-27368 -https://github.com/swzhouu/CVE-2022-48311 -https://github.com/sybrenstuvel/python-rsa/issues/146 -https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 -https://github.com/syedsohaibkarim/PoC-BrokenAuth-AppSpace6.2.4 -https://github.com/syedsohaibkarim/PoC-StoredXSS-Appspace6.2.4 -https://github.com/symless/synergy-core/security/advisories/GHSA-chfm-333q-gfpp -https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420 -https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235 -https://github.com/syoyo/tinydng/issues/28 -https://github.com/syoyo/tinyexr/issues/124 -https://github.com/syoyo/tinyexr/issues/167 -https://github.com/syoyo/tinyexr/issues/169 -https://github.com/syoyo/tinygltf/issues/368 -https://github.com/sysenter-eip/CVE-2022-26629 -https://github.com/sysstat/sysstat/issues/196 -https://github.com/sysstat/sysstat/issues/199 -https://github.com/sysstat/sysstat/issues/230 -https://github.com/systemd/systemd/issues/4234 -https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 -https://github.com/systemd/systemd/issues/7986 -https://github.com/systemd/systemd/issues/9397 -https://github.com/systemd/systemd/pull/28885 -https://github.com/syuilo/misskey/security/advisories/GHSA-6qw9-6jxq-xj3p -https://github.com/tacetool/TACE#cve-2023-48161 -https://github.com/tadashi-aikawa/owlmixin/issues/12 -https://github.com/tang-0717/cms/blob/main/1.md -https://github.com/tang-0717/cms/blob/main/2.md -https://github.com/tang-0717/cms/blob/main/3.md -https://github.com/tangent65536/Slivjacker -https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q -https://github.com/taogogo/taocms/issues/13 -https://github.com/taogogo/taocms/issues/14 -https://github.com/taogogo/taocms/issues/15 -https://github.com/taogogo/taocms/issues/4 -https://github.com/taogogo/taocms/issues/5 -https://github.com/taogogo/taocms/issues/6 -https://github.com/taogogo/taocms/issues/8 -https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf -https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr -https://github.com/taosir/wtcms/issues/10 -https://github.com/taosir/wtcms/issues/11 -https://github.com/taosir/wtcms/issues/8 -https://github.com/taosir/wtcms/issues/9 -https://github.com/tarantula-team/CSS-injection-in-Swagger-UI -https://github.com/tarantula-team/CVE-2019-12949 -https://github.com/tarantula-team/CVE-2019-19012 -https://github.com/tarantula-team/CVE-2019-19203 -https://github.com/tarantula-team/CVE-2019-19204 -https://github.com/tats/w3m/issues/242 -https://github.com/tats/w3m/issues/268 -https://github.com/tats/w3m/issues/270 -https://github.com/tats/w3m/issues/271 -https://github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7 -https://github.com/taurusxin/ncmdump/issues/18 -https://github.com/taurusxin/ncmdump/issues/19 -https://github.com/tbeu/matio/issues/121 -https://github.com/tbeu/matio/issues/127 -https://github.com/tbeu/matio/issues/128 -https://github.com/tbeu/matio/issues/129 -https://github.com/tbeu/matio/issues/130 -https://github.com/tbeu/matio/issues/131 -https://github.com/tboothman/imdbphp/issues/88 -https://github.com/tchenu/CVE-2020-12112 -https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4 -https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws -https://github.com/teameasy/EasyCMS/issues/3 -https://github.com/teameasy/EasyCMS/issues/4 -https://github.com/teameasy/EasyCMS/issues/5 -https://github.com/teameasy/EasyCMS/issues/7 -https://github.com/teknoraver/aacplusenc/issues/1 -https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53 -https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/ -https://github.com/tenable/poc/tree/master/nuuo/nvrmini2 -https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716 -https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf -https://github.com/tenable/routeros/tree/master/poc/bytheway -https://github.com/tenable/routeros/tree/master/poc/cve_2018_14847 -https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055 -https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636 -https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47445%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20SQL%20Injection.md -https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47446%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20Stored%20XSS%20Vulnerability.md -https://github.com/testgo1safe/cms/blob/main/1.md -https://github.com/tezeb/accfly/blob/master/Readme.md -https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52 -https://github.com/tgp-top/D-Link-DIR-825 -https://github.com/tgp-top/DAP-1360/blob/main/README.md -https://github.com/thanethomson/MLAlchemy/issues/1 -https://github.com/the-girl-who-lived/CVE-2020-11539/ -https://github.com/the-girl-who-lived/CVE-2020-25498 -https://github.com/the-girl-who-lived/CVE-2020-35262 -https://github.com/the-tcpdump-group/tcpdump/issues/645 -https://github.com/the-tcpdump-group/tcpslice/issues/11 -https://github.com/theart42/cves/blob/master/CVE-2021-28079/CVE-2021-28079.md -https://github.com/thecasual/CVE-2022-41358 -https://github.com/thedigicraft/Atom.CMS/issues/256 -https://github.com/thedigicraft/Atom.CMS/issues/257 -https://github.com/theguly/CVE-2017-14105 -https://github.com/thehackingverse/Stored-xss-/blob/main/Poc -https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47992 -https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47993 -https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994 -https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995 -https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47996 -https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997 -https://github.com/theonedev/onedev/security/advisories/GHSA-5q3q-f373-2jv8 -https://github.com/theonedev/onedev/security/advisories/GHSA-9mmq-fm8c-q4fv -https://github.com/theori-io/chakra-2016-11 -https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr -https://github.com/thinkcmf/cmfx/issues/26 -https://github.com/thinkcmf/thinkcmf/issues/675 -https://github.com/thinkcmf/thinkcmf/issues/736 -https://github.com/thinkcmf/thinkcmf/issues/737 -https://github.com/thinkgad/Bugs/blob/main/emlog%20v5.3.1%20has%20Full%20Path%20Disclosure%20vulnerability.md -https://github.com/thinksaas/ThinkSAAS/issues/16 -https://github.com/thinksaas/ThinkSAAS/issues/18 -https://github.com/thinksaas/ThinkSAAS/issues/24 -https://github.com/thinksaas/ThinkSAAS/issues/34 -https://github.com/thinksaas/ThinkSAAS/issues/35 -https://github.com/tholum/crm42/issues/1 -https://github.com/thorfdbg/libjpeg/issues/28 -https://github.com/thorfdbg/libjpeg/issues/33 -https://github.com/thorfdbg/libjpeg/issues/34 -https://github.com/thorfdbg/libjpeg/issues/35 -https://github.com/thorfdbg/libjpeg/issues/36 -https://github.com/thorfdbg/libjpeg/issues/37 -https://github.com/thorfdbg/libjpeg/issues/42 -https://github.com/thorfdbg/libjpeg/issues/70 -https://github.com/thorfdbg/libjpeg/issues/71 -https://github.com/thorfdbg/libjpeg/issues/73 -https://github.com/thorfdbg/libjpeg/issues/74 -https://github.com/thorfdbg/libjpeg/issues/75 -https://github.com/thorfdbg/libjpeg/issues/77 -https://github.com/thorfdbg/libjpeg/issues/78 -https://github.com/thorfdbg/libjpeg/issues/79 -https://github.com/thorfdbg/libjpeg/issues/87#BUG1 -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9 -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72 -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx -https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw -https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md -https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md -https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md -https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md -https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md -https://github.com/tiann/KernelSU/security/advisories/GHSA-86cp-3prf-pwqq -https://github.com/tidwall/gjson/issues/195 -https://github.com/tifaweb/Dswjcms/issues/4 -https://github.com/tifaweb/Dswjcms/issues/5 -https://github.com/tildearrow/furnace/issues/325 -https://github.com/tildearrow/furnace/issues/325#issuecomment-1094139655 -https://github.com/timdown/rangy/issues/478 -https://github.com/tin-z/Stuff_and_POCs/blob/main/poc_libwav/POC -https://github.com/tingyuu/vaeThink/issues/1 -https://github.com/tingyuu/vaeThink/issues/2 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2021 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2022 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2023 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16929 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16930 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2018-10057 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2018-10058 -https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690 -https://github.com/tinymce/tinymce/issues/4394 -https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 -https://github.com/tldjgggg/cve/blob/main/sql.md -https://github.com/tlfyyds/EQ -https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7 -https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg -https://github.com/tonini/alchemist-server/issues/14 -https://github.com/tootsuite/mastodon/pull/9329 -https://github.com/tootsuite/mastodon/pull/9381 -https://github.com/top-think/framework/issues/2559 -https://github.com/top-think/framework/issues/2996 -https://github.com/torres14852/cve/blob/main/upload.md -https://github.com/torvalds/linux/commit/04bf464a5dfd9ade0dda918e44366c2c61fce80b -https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 -https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a -https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 -https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6 -https://github.com/torvalds/linux/commit/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c -https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 -https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33 -https://github.com/torvalds/linux/commit/d114b9fe78c8d6fc6e70808c2092aa307c36dc8e -https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 -https://github.com/totaljs/cms/issues/35 -https://github.com/tothi/hs-dvr-telnet -https://github.com/tothi/pwn-hisilicon-dvr/blob/master/pwn_hisilicon_dvr.py -https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester/blob/main/Best-Student-Result-Management-System_1.0.poc.md -https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9 -https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5 -https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p -https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm -https://github.com/trampgeek/jobe/issues/39 -https://github.com/tramyardg/hotel-mgmt-system/issues/21 -https://github.com/tramyardg/hotel-mgmt-system/issues/22 -https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md -https://github.com/tremwil/ds3-nrssr-rce -https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true -https://github.com/trentm/json/issues/144 -https://github.com/trentm/python-markdown2/issues/285 -https://github.com/trentm/python-markdown2/issues/348 -https://github.com/trippo/ResponsiveFilemanager/issues/600 -https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md -https://github.com/tristao-marinho/CVE-2023-27842 -https://github.com/tristao-marinho/CVE-2023-27842/blob/main/README.md -https://github.com/tristao-marinho/CVE-2023-41646/ -https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r -https://github.com/trusteddomainproject/OpenDMARC/issues/64 -https://github.com/tsingsee/EasyPlayerPro-Win/pull/24 -https://github.com/tsruban/HHIMS/issues/1 -https://github.com/ttimot24/HorizontCMS/issues/43 -https://github.com/tubakvgc/CVE/blob/main/Event_Student_Attendance_System.md -https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md -https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md -https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-2.md -https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-3.md -https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-4.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass%20-%202.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-1.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-3.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-5.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md -https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-7.md -https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g -https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644 -https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 -https://github.com/twignet/splicecom -https://github.com/two-kisses/pescms_vulnerability -https://github.com/two-kisses/pescms_vulnerability, -https://github.com/twosevenzero/shoretel-mitel-rce -https://github.com/twothink/twothink/issues/1 -https://github.com/typecho/typecho/issues/1523 -https://github.com/typecho/typecho/issues/1536 -https://github.com/typecho/typecho/issues/1539 -https://github.com/typecho/typecho/issues/1546 -https://github.com/typecho/typecho/issues/952 -https://github.com/typestack/class-validator/issues/438 -https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 -https://github.com/typora/typora-issues/issues/2129 -https://github.com/typora/typora-issues/issues/2131 -https://github.com/typora/typora-issues/issues/2166 -https://github.com/typora/typora-issues/issues/2204 -https://github.com/typora/typora-issues/issues/2289 -https://github.com/typora/typora-issues/issues/2505 -https://github.com/typora/typora-issues/issues/2959 -https://github.com/typora/typora-issues/issues/3124 -https://github.com/u32i/cve/tree/main/CVE-2024-25164 -https://github.com/uBlockOrigin/uBlock-issues/issues/1992 -https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md -https://github.com/uclouvain/openjpeg/issues/1053 -https://github.com/uclouvain/openjpeg/issues/1057 -https://github.com/uclouvain/openjpeg/issues/1059 -https://github.com/uclouvain/openjpeg/issues/1152 -https://github.com/uclouvain/openjpeg/issues/1178 -https://github.com/uclouvain/openjpeg/issues/1228 -https://github.com/uclouvain/openjpeg/issues/1231 -https://github.com/uclouvain/openjpeg/issues/1261 -https://github.com/uclouvain/openjpeg/issues/1283 -https://github.com/uclouvain/openjpeg/issues/1338 -https://github.com/uclouvain/openjpeg/issues/1347 -https://github.com/uclouvain/openjpeg/issues/1368 -https://github.com/uclouvain/openjpeg/issues/731 -https://github.com/uclouvain/openjpeg/issues/732 -https://github.com/uclouvain/openjpeg/issues/733 -https://github.com/uclouvain/openjpeg/issues/774 -https://github.com/uclouvain/openjpeg/issues/776 -https://github.com/uclouvain/openjpeg/issues/777 -https://github.com/uclouvain/openjpeg/issues/778 -https://github.com/uclouvain/openjpeg/issues/779 -https://github.com/uclouvain/openjpeg/issues/780 -https://github.com/uclouvain/openjpeg/issues/784 -https://github.com/uclouvain/openjpeg/issues/785 -https://github.com/uclouvain/openjpeg/issues/792 -https://github.com/uclouvain/openjpeg/issues/826 -https://github.com/uclouvain/openjpeg/issues/833 -https://github.com/uclouvain/openjpeg/issues/835 -https://github.com/uclouvain/openjpeg/issues/843 -https://github.com/uclouvain/openjpeg/issues/855 -https://github.com/uclouvain/openjpeg/issues/856 -https://github.com/uclouvain/openjpeg/issues/857 -https://github.com/uclouvain/openjpeg/issues/858 -https://github.com/uclouvain/openjpeg/issues/859 -https://github.com/uclouvain/openjpeg/issues/860 -https://github.com/uclouvain/openjpeg/issues/861 -https://github.com/uclouvain/openjpeg/issues/862 -https://github.com/uclouvain/openjpeg/issues/863 -https://github.com/uclouvain/openjpeg/issues/871 -https://github.com/uclouvain/openjpeg/issues/872 -https://github.com/uclouvain/openjpeg/issues/982 -https://github.com/uclouvain/openjpeg/issues/983 -https://github.com/uclouvain/openjpeg/issues/985 -https://github.com/uclouvain/openjpeg/issues/991 -https://github.com/uclouvain/openjpeg/issues/992 -https://github.com/uclouvain/openjpeg/issues/995 -https://github.com/uclouvain/openjpeg/issues/997 -https://github.com/uclouvain/openjpeg/pull/809 -https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2015-0001 -https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 -https://github.com/udima-university/moodle-mod_jitsi/issues/67 -https://github.com/ujcms/ujcms/issues/8 -https://github.com/ukoethe/vigra/issues/494 -https://github.com/umlet/umlet/issues/500 -https://github.com/uncmath25/easy-parse/issues/3 -https://github.com/underprotection/CVE-2019-19550/ -https://github.com/unh3x/just4cve/issues/1 -https://github.com/unh3x/just4cve/issues/10 -https://github.com/unh3x/just4cve/issues/2 -https://github.com/unh3x/just4cve/issues/3 -https://github.com/unh3x/just4cve/issues/4 -https://github.com/unh3x/just4cve/issues/5 -https://github.com/unh3x/just4cve/issues/6 -https://github.com/unh3x/just4cve/issues/7 -https://github.com/unh3x/just4cve/issues/8 -https://github.com/unh3x/just4cve/issues/9 -https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md -https://github.com/unicorn-engine/unicorn/issues/1578 -https://github.com/unicorn-engine/unicorn/issues/1586 -https://github.com/unicorn-engine/unicorn/issues/1588 -https://github.com/unicorn-engine/unicorn/issues/1595 -https://github.com/unknown00759/CVE-2023-36158/blob/main/CVE-2023-36158.md -https://github.com/unlcms/UNL-CMS/issues/941 -https://github.com/unpWn4bL3/iot-security/blob/main/1.md -https://github.com/unpWn4bL3/iot-security/blob/main/13.md -https://github.com/unpWn4bL3/iot-security/blob/main/2.md -https://github.com/unpWn4bL3/iot-security/blob/main/29.md -https://github.com/upasvi/CVE-/issues/1 -https://github.com/upasvi/CVE-/issues/2 -https://github.com/upx/upx/issues/128 -https://github.com/upx/upx/issues/207 -https://github.com/upx/upx/issues/286 -https://github.com/upx/upx/issues/287 -https://github.com/upx/upx/issues/313 -https://github.com/upx/upx/issues/314 -https://github.com/upx/upx/issues/315 -https://github.com/upx/upx/issues/331 -https://github.com/upx/upx/issues/332 -https://github.com/upx/upx/issues/333 -https://github.com/upx/upx/issues/378 -https://github.com/upx/upx/issues/379 -https://github.com/upx/upx/issues/381 -https://github.com/upx/upx/issues/388 -https://github.com/upx/upx/issues/390 -https://github.com/upx/upx/issues/391 -https://github.com/upx/upx/issues/392 -https://github.com/upx/upx/issues/393 -https://github.com/upx/upx/issues/394 -https://github.com/upx/upx/issues/395 -https://github.com/upx/upx/issues/396 -https://github.com/upx/upx/issues/421 -https://github.com/upx/upx/issues/485 -https://github.com/upx/upx/issues/486 -https://github.com/upx/upx/issues/545 -https://github.com/upx/upx/issues/631 -https://github.com/upx/upx/issues/632 -https://github.com/ushahidi/Ushahidi_Web/issues/1009 -https://github.com/uvoteam/libdoc/issues/1 -https://github.com/uvoteam/libdoc/issues/2 -https://github.com/uvoteam/libdoc/issues/5 -https://github.com/uvoteam/libdoc/issues/6 -https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2020-10220.py -https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_sqli.py -https://github.com/vQAQv/Request-CVE-ID-PoC/blob/master/PbootCMS/v0.9.8/CSRF.md -https://github.com/vQAQv/Request-CVE-ID-PoC/blob/master/PbootCMS/v0.9.8/Getshll.md -https://github.com/vaadin/flow/pull/10577 -https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10147 -https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10148 -https://github.com/vah13/SAP_exploit -https://github.com/vah13/extractTVpasswords -https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/Execute%20After%20Redirect%20-%20Food%20Management%20System.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md -https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md -https://github.com/varangamin/CVE-2017-6206 -https://github.com/varigit/matrix-gui-v2/issues/1 -https://github.com/varun-suresh/Clustering/issues/12 -https://github.com/vatesfr/xen-orchestra/issues/5712 -https://github.com/vdohney/keepass-password-dumper -https://github.com/vedees/wcms/issues/10 -https://github.com/vedees/wcms/issues/11 -https://github.com/vedees/wcms/issues/12 -https://github.com/vedees/wcms/issues/15 -https://github.com/vedees/wcms/issues/2 -https://github.com/vedees/wcms/issues/3 -https://github.com/vedees/wcms/issues/7 -https://github.com/vedees/wcms/issues/8 -https://github.com/vedees/wcms/issues/9 -https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4 -https://github.com/vega/vega/security/advisories/GHSA-w5m3-xh75-mp55 -https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072 -https://github.com/vercel/ms/pull/89 -https://github.com/verdammelt/tnef/issues/23 -https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png -https://github.com/verf1sh/Poc/blob/master/giflib_poc -https://github.com/verf1sh/Poc/blob/master/pic_ppm.png -https://github.com/verf1sh/Poc/blob/master/poc_ppm -https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38 -https://github.com/veyon/veyon/issues/657 -https://github.com/vi3t1/qq-tim-elevation -https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04 -https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d -https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1 -https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a -https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c -https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139 -https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93 -https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed -https://github.com/vim/vim/issues/12528 -https://github.com/vim/vim/issues/5041 -https://github.com/vim/vim/issues/7674 -https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q -https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm -https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS -https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation -https://github.com/vipinxsec/Alfresco_XSS/blob/master/README.md -https://github.com/vitejs/vite/issues/8498 -https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67 -https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97 -https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2 -https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt -https://github.com/vitorespf/Advisories/blob/master/Intelbras-switch.txt -https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server-RSTPLive555%20Activex%20Buffer%20overflow.txt -https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server.txt -https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server_AFW.txt -https://github.com/viz-rs/nano-id/security/advisories/GHSA-9hc7-6w9r-wj94 -https://github.com/vlm/asn1c/issues/394 -https://github.com/vlm/asn1c/issues/396 -https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS -https://github.com/vulnbe/poc-rebar3.git -https://github.com/vulnbe/poc-yaws-cgi-shell-injection -https://github.com/vulnbe/poc-yaws-dav-xxe -https://github.com/vulreport3r/cve-reports/blob/main/Ncast_Yingshi_has_RCE_vulnerabilities/report.md -https://github.com/vuongdq54/RedCap -https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6 -https://github.com/vyperlang/vyper/security/advisories/GHSA-52xq-j7v9-v4v2 -https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h -https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w -https://github.com/vyperlang/vyper/security/advisories/GHSA-gp3w-2v2m-p686 -https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9 -https://github.com/vyperlang/vyper/security/advisories/GHSA-ppx5-q359-pvwj -https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m -https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 -https://github.com/vysec/CVE-2018-4878 -https://github.com/w3c/resource-timing/issues/29 -https://github.com/w3irdo001/demo/blob/master/1.html -https://github.com/w3irdo001/demo/blob/master/3.html -https://github.com/w4fz5uck5/FTPGetter/blob/master/xpl.py -https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt -https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23 -https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44 -https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65 -https://github.com/walinejs/waline/issues/785 -https://github.com/walmartlabs/concord/issues/22 -https://github.com/wanghaiwei/xiuno-docker/issues/3 -https://github.com/wanghaiwei/xiuno-docker/issues/5 -https://github.com/wangl1989/mysiteforme/issues/40 -https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md -https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md -https://github.com/warmachine-57/CVE-2021-44117/blob/main/CSRF%20in%20FuelCMS -https://github.com/warp-tech/warpgate/security/advisories/GHSA-868r-97g5-r9g4 -https://github.com/warp-tech/warpgate/security/advisories/GHSA-c94j-vqr5-3mxr -https://github.com/warringaa/CVEs#glory-systems-rbw-100 -https://github.com/wasm3/wasm3/issues/320 -https://github.com/wasm3/wasm3/issues/323 -https://github.com/wasm3/wasm3/issues/337 -https://github.com/wasm3/wasm3/issues/483 -https://github.com/wasm3/wasm3/issues/484 -https://github.com/wasm3/wasm3/issues/485 -https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc -https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975 -https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw -https://github.com/wbowm15/jubilant-enigma/blob/main/writeup.md -https://github.com/wclimb/Koa2-blog/issues/40 -https://github.com/wclimb/Koa2-blog/issues/41 -https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell -https://github.com/webasyst/webasyst-framework/issues/377 -https://github.com/webbukkit/dynmap/issues/2474 -https://github.com/webpack/loader-utils/issues/212 -https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884 -https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff -https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 -https://github.com/weidai11/cryptopp/issues/1248 -https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki -https://github.com/weison-tech/yii2-cms/issues/2 -https://github.com/wellcms/wellcms/issues/11 -https://github.com/wendell1224/O2OA-POC/blob/main/POC.md -https://github.com/weng-xianhu/eyoucms/issues/26 -https://github.com/weng-xianhu/eyoucms/issues/33 -https://github.com/weng-xianhu/eyoucms/issues/34 -https://github.com/weng-xianhu/eyoucms/issues/35 -https://github.com/weng-xianhu/eyoucms/issues/36 -https://github.com/weng-xianhu/eyoucms/issues/37 -https://github.com/weng-xianhu/eyoucms/issues/38 -https://github.com/weng-xianhu/eyoucms/issues/41 -https://github.com/weng-xianhu/eyoucms/issues/44 -https://github.com/weng-xianhu/eyoucms/issues/55 -https://github.com/weng-xianhu/eyoucms/issues/57 -https://github.com/westes/flex/issues/414 -https://github.com/wgm/cerb/commit/12de87ff9961a4f3ad2946c8f47dd0c260607144 -https://github.com/whiteHat001/DRIVER_POC/tree/master/malwarefox/0x80002010 -https://github.com/whiteHat001/DRIVER_POC/tree/master/malwarefox/0x80002054 -https://github.com/whitehatl/Vulnerability/blob/main/web/dedebiz/6.0.0/sys_info.poc.md -https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.93/Login.poc.md -https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.94/member_toadmin.poc.md -https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A810R/downloadFile.md -https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setStaticDhcpRules_1.md -https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_1.md -https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_2.md -https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/SetNetControlList.md -https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md -https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md -https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md -https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/faq-management-system.md -https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/school-visitors-log-e-book.md -https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/url-shortener.md -https://github.com/willchen0011/cve/blob/main/HongJing-sql.md -https://github.com/willchen0011/cve/blob/main/upload.md -https://github.com/willchen0011/cve/blob/main/upload2.md -https://github.com/win3zz/CVE-2023-43261 -https://github.com/wind-cyber/DamiCMS-v6.0.0-have-csrf-and-xss-Vulnerabilities-/blob/master/README.md -https://github.com/windecks/CVE-2023-46404 -https://github.com/wiremock/wiremock/security/advisories/GHSA-676j-xrv3-73vc -https://github.com/wixtoolset/issues/security/advisories/GHSA-7wh2-wxc7-9ph5 -https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r -https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc -https://github.com/wkeyi0x1/vul-report/issues/2 -https://github.com/wkeyi0x1/vul-report/issues/3 -https://github.com/wkeyi0x1/vul-report/issues/4 -https://github.com/wkeyuan/DWSurvey/issues/47 -https://github.com/wkeyuan/DWSurvey/issues/48 -https://github.com/wkeyuan/DWSurvey/issues/81 -https://github.com/wlx65003/HZNUOJ/issues/17 -https://github.com/woduq1414/munhak-moa/commit/e8f800373b20cb22de70c7a994325b8903877da0 -https://github.com/woider/ArticleCMS/issues/5 -https://github.com/wolfi-dev/wolfictl/security/advisories/GHSA-8fg7-hp93-qhvr -https://github.com/wollardj/simple-plist/issues/60 -https://github.com/wpay65249519/cve/blob/main/SQL_injection.md -https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md -https://github.com/wshepherd0010/advisories/blob/master/CVE-2017-14702.md -https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-8974.md -https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-9113.md -https://github.com/wshidamowang/Router/blob/main/Tenda/AC18/RCE_1.md -https://github.com/wssgcsc58/CVEs/tree/master/baidurustsgxsdk_enclaveid_race -https://github.com/wstmall/wstmall/issues/4 -https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14943%20-%20Stored%20XSS.md -https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14944%20-%20Access%20Control%20Vulnerabilities.md -https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14945%20-%20Privilege%20Escalation.md -https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14946%20-%20Local%20File%20Inclusion.md -https://github.com/wuweiit/mushroom/issues/19 -https://github.com/wuzhicms/wuzhicms/issues/128 -https://github.com/wuzhicms/wuzhicms/issues/129 -https://github.com/wuzhicms/wuzhicms/issues/130 -https://github.com/wuzhicms/wuzhicms/issues/131 -https://github.com/wuzhicms/wuzhicms/issues/132 -https://github.com/wuzhicms/wuzhicms/issues/133 -https://github.com/wuzhicms/wuzhicms/issues/134 -https://github.com/wuzhicms/wuzhicms/issues/137 -https://github.com/wuzhicms/wuzhicms/issues/138 -https://github.com/wuzhicms/wuzhicms/issues/141 -https://github.com/wuzhicms/wuzhicms/issues/143 -https://github.com/wuzhicms/wuzhicms/issues/144 -https://github.com/wuzhicms/wuzhicms/issues/145 -https://github.com/wuzhicms/wuzhicms/issues/146 -https://github.com/wuzhicms/wuzhicms/issues/149 -https://github.com/wuzhicms/wuzhicms/issues/150 -https://github.com/wuzhicms/wuzhicms/issues/154 -https://github.com/wuzhicms/wuzhicms/issues/155 -https://github.com/wuzhicms/wuzhicms/issues/156 -https://github.com/wuzhicms/wuzhicms/issues/157 -https://github.com/wuzhicms/wuzhicms/issues/158 -https://github.com/wuzhicms/wuzhicms/issues/159 -https://github.com/wuzhicms/wuzhicms/issues/169 -https://github.com/wuzhicms/wuzhicms/issues/170 -https://github.com/wuzhicms/wuzhicms/issues/171 -https://github.com/wuzhicms/wuzhicms/issues/172 -https://github.com/wuzhicms/wuzhicms/issues/173 -https://github.com/wuzhicms/wuzhicms/issues/174 -https://github.com/wuzhicms/wuzhicms/issues/183 -https://github.com/wuzhicms/wuzhicms/issues/188 -https://github.com/wuzhicms/wuzhicms/issues/191 -https://github.com/wuzhicms/wuzhicms/issues/192 -https://github.com/wuzhicms/wuzhicms/issues/196 -https://github.com/wuzhicms/wuzhicms/issues/197 -https://github.com/wuzhicms/wuzhicms/issues/198 -https://github.com/wuzhicms/wuzhicms/issues/200 -https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937 -https://github.com/wuzhicms/wuzhicms/issues/208 -https://github.com/wy876/cve/issues/1 -https://github.com/wy876/cve/issues/3 -https://github.com/x-f1v3/ForCve/issues/1 -https://github.com/x-f1v3/ForCve/issues/2 -https://github.com/x-f1v3/ForCve/issues/3 -https://github.com/x-f1v3/ForCve/issues/4 -https://github.com/x-f1v3/ForCve/issues/5 -https://github.com/xCss/Valine/issues/127 -https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384 -https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793 -https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 -https://github.com/xbmc/xbmc/issues/20305 -https://github.com/xbmc/xbmc/pull/20306 -https://github.com/xcodeOn1/SQLI-TollTax/blob/main/README.md -https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App -https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main -https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44047.md -https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44048.md -https://github.com/xebd/accel-ppp/issues/158 -https://github.com/xenv/S-mall-ssm/issues/37 -https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv -https://github.com/xiahao90/CVEproject/blob/main/DolphinPHPV1.5.0_xss.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/AC-Repair-and-Services-System---SQL-injections.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md#2classesmasterphpfdelete_item -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#1xss-vulnerability-in-productsphp -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#2sql-injection-vulnerability-in-productsphp -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#3sql-injection-vulnerability-in-view_productphp -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#4sql-injection-vulnerability-in-view_categoriesphp -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/OnlineLearningSystemV2-XSS.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Serviced-Providerd-Managementd-Systemd--d-SQLd-injections.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20XSS.md -https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md -https://github.com/xiangbulala/CVE/blob/main/totlink.md -https://github.com/xiangxiaobo/poc_and_report/tree/master/podofo_heapoverflow_PdfParser.ReadObjects -https://github.com/xiaolanjing0/cms/blob/main/1.md -https://github.com/xiaolanjing0/cms/blob/main/4.md -https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md -https://github.com/xiaoqx/pocs/blob/master/netpbm -https://github.com/xiaoqx/pocs/tree/master/cms -https://github.com/xiaoqx/pocs/tree/master/exiv2 -https://github.com/xiaoqx/pocs/tree/master/gegl -https://github.com/xiaoqx/pocs/tree/master/libtiff -https://github.com/xiaosed/CVE-2023-29919/ -https://github.com/xiayulei/open_source_bms/issues/33 -https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr -https://github.com/xieqiang11/poc-1/tree/main -https://github.com/xieqiang11/poc-2/tree/main -https://github.com/xieqiang11/poc-3/tree/main -https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.md -https://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md -https://github.com/xinzhihen06/dxq-cve/blob/main/h3cr160.md -https://github.com/xiph/vorbis-tools/issues/41 -https://github.com/xiweicheng/tms/issues/19 -https://github.com/xiyuanhuaigu/cve/blob/main/rce.md -https://github.com/xmldom/xmldom/issues/436 -https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 -https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 -https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -https://github.com/xoffense/POC/blob/main/Account%20takeover%20using%20CSRF%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md -https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md -https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20index.php%20URI -https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20limit%20parameter -https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20page%20parameter -https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20query%20parameter -https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20refID%20parameter -https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20valueID%20parameter -https://github.com/xoffense/POC/blob/main/Ilch%202.1.42%20Open%20redirect -https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md -https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md -https://github.com/xoffense/POC/blob/main/Stored%20XSS%20via%20malicious%20file%20upload%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md -https://github.com/xtr4nge/FruityWifi/issues/277 -https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md -https://github.com/xuanluansec/vul/issues/1 -https://github.com/xuanluansec/vul/issues/2 -https://github.com/xuanluansec/vul/issues/3#issue-2243633522 -https://github.com/xuanluansec/vul/issues/5 -https://github.com/xuhuisheng/lemon/issues/198 -https://github.com/xuhuisheng/lemon/issues/199 -https://github.com/xunyang1/ZZCMS/issues/1 -https://github.com/xunyang1/ZZCMS/issues/2 -https://github.com/xuxueli/xxl-job/issues/1866 -https://github.com/xuxueli/xxl-job/issues/1921 -https://github.com/xuxueli/xxl-job/issues/2083 -https://github.com/xuxueli/xxl-job/issues/2821 -https://github.com/xuxueli/xxl-job/issues/2836 -https://github.com/xuxueli/xxl-job/issues/3002 -https://github.com/xuxueli/xxl-job/issues/3391 -https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q -https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475 -https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x -https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qx9h-c5v6-ghqh -https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv -https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx -https://github.com/xwlrbh/Catfish/issues/1 -https://github.com/xwlrbh/Catfish/issues/5 -https://github.com/xxxxfang/CVE-Apply/blob/main/csrf-1.md -https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md -https://github.com/xxy1126/Vuln/blob/main/Draytek/2.md -https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/1 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/10 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/2 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/3 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/4 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/5 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/6 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/7 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/9 -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelAd -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelPushedAd -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailname -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailpwd -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetAdConfigInfo_ -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_Mac -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_hostname -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_lan -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem -https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetPicListItem -https://github.com/xxy961216/attack-baijiacmsV4-with-blind-sql-injection -https://github.com/xxy961216/attack-baijiacmsV4-with-xss -https://github.com/xyaly163/cms/blob/main/1.md -https://github.com/xyaly163/cms/blob/main/2.md -https://github.com/yanbushuang/CVE/blob/main/TendaAC5.md -https://github.com/yangfan6888/PoC -https://github.com/yangfan6888/PoC/blob/main/PoC.cpp -https://github.com/yangfar/CVE/blob/main/CVE-2022-40884.md -https://github.com/yangfar/CVE/blob/main/Reference%20of%20Binbloom.md -https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 -https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334 -https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940 -https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995 -https://github.com/yaniswang/xhEditor/issues/37 -https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA -https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.devname.md -https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.mac.md -https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md -https://github.com/yaoyue123/iot/blob/main/Tenda/A15/setBlackRule.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formQuickIndex.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetPPTPServer.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md -https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md -https://github.com/yargs/y18n/issues/96 -https://github.com/yasinyildiz26/Badminton-Center-Management-System -https://github.com/yasm/yasm/issues/161 -https://github.com/yasm/yasm/issues/162 -https://github.com/yasm/yasm/issues/163 -https://github.com/yasm/yasm/issues/164 -https://github.com/yasm/yasm/issues/165 -https://github.com/yasm/yasm/issues/166 -https://github.com/yasm/yasm/issues/167 -https://github.com/yasm/yasm/issues/168 -https://github.com/yasm/yasm/issues/169 -https://github.com/yasm/yasm/issues/170 -https://github.com/yasm/yasm/issues/171 -https://github.com/yasm/yasm/issues/172 -https://github.com/yasm/yasm/issues/173 -https://github.com/yasm/yasm/issues/174 -https://github.com/yasm/yasm/issues/175 -https://github.com/yasm/yasm/issues/206 -https://github.com/yasm/yasm/issues/207 -https://github.com/yasm/yasm/issues/208 -https://github.com/yasm/yasm/issues/209 -https://github.com/yasm/yasm/issues/214 -https://github.com/yasm/yasm/issues/216 -https://github.com/yasm/yasm/issues/217 -https://github.com/yasm/yasm/issues/220 -https://github.com/yasm/yasm/issues/221 -https://github.com/yasm/yasm/issues/222 -https://github.com/yaxuan404/OTCMS_3.2 -https://github.com/yckuo-sdc/PoC -https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md -https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md -https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md -https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md -https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md -https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md -https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md -https://github.com/yeyinshi/tuzicms/issues/1 -https://github.com/yeyinshi/tuzicms/issues/10 -https://github.com/yeyinshi/tuzicms/issues/11 -https://github.com/yeyinshi/tuzicms/issues/12 -https://github.com/yeyinshi/tuzicms/issues/13 -https://github.com/yeyinshi/tuzicms/issues/7 -https://github.com/yeyinshi/tuzicms/issues/8 -https://github.com/yeyinshi/tuzicms/issues/9 -https://github.com/yhirose/cpp-httplib/issues/425 -https://github.com/yhirose/cpp-peglib/issues/121 -https://github.com/yhirose/cpp-peglib/issues/122 -https://github.com/yhy217/huakecms-vul/issues/1 -https://github.com/yi-ge/unzip/pull/1 -https://github.com/yiisoft/yii2/issues/19755 -https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955 -https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813 -https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351 -https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469 -https://github.com/yilezhu/Czar.Cms/issues/6 -https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md -https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md -https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788 -https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789 -https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 -https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793 -https://github.com/yogeshshe1ke/CVE/blob/master/2019-7690/mobaxterm_exploit.py -https://github.com/yoshuawuyts/vmd/issues/137 -https://github.com/youki992/youki992.github.io/blob/master/others/apply2.md -https://github.com/youngerheart/nodeserver/pull/6 -https://github.com/yourkevin/NiterForum/issues/25 -https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20navigation%20management.md -https://github.com/ysuzhangbin/cms2/blob/main/1.md -https://github.com/ysuzhangbin/cms2/blob/main/2.md -https://github.com/yte121/-CVE-2023-46450/ -https://github.com/yte121/CVE-2023-46974/ -https://github.com/ytsutano/axmldec/issues/4 -https://github.com/yueying638/cve/blob/main/upload.md -https://github.com/yukar1z0e/temp/blob/main/README.md -https://github.com/yukino-hiki/CVE/blob/main/3/There%20is%20a%20storage%20type%20xss%20in%20the%20site%20management%20office.md -https://github.com/yunaranyancat/poc-dump/blob/main/cloudpanel/README.md -https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py -https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 -https://github.com/yupoxiong/BearAdmin/issues/5 -https://github.com/yuyuliq/cve/issues/1 -https://github.com/ywf7678/cms/blob/main/1.md -https://github.com/yxcmf/ukcms/issues/1 -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-status.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-type.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_client_user.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_clients.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court-type.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_expense-type.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_judge.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_role.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_service.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tasks.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tax.md -https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_vendor.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addCourseExe.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_ranking-exam.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_result.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_selExamAttemptExe.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_submitAnswerExe.md -https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_updateQuestion.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md -https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md -https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md -https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md -https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss3.md -https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss4.md -https://github.com/yzmcms/yzmcms/issues/1 -https://github.com/yzmcms/yzmcms/issues/11 -https://github.com/yzmcms/yzmcms/issues/12 -https://github.com/yzmcms/yzmcms/issues/13 -https://github.com/yzmcms/yzmcms/issues/14 -https://github.com/yzmcms/yzmcms/issues/2 -https://github.com/yzmcms/yzmcms/issues/21 -https://github.com/yzmcms/yzmcms/issues/22 -https://github.com/yzmcms/yzmcms/issues/27 -https://github.com/yzmcms/yzmcms/issues/28 -https://github.com/yzmcms/yzmcms/issues/3 -https://github.com/yzmcms/yzmcms/issues/43 -https://github.com/yzmcms/yzmcms/issues/45 -https://github.com/yzmcms/yzmcms/issues/46 -https://github.com/yzmcms/yzmcms/issues/47 -https://github.com/yzmcms/yzmcms/issues/55 -https://github.com/yzmcms/yzmcms/issues/59 -https://github.com/yzmcms/yzmcms/issues/60 -https://github.com/yzmcms/yzmcms/issues/68 -https://github.com/yzmcms/yzmcms/issues/7 -https://github.com/yzmcms/yzmcms/issues/9 -https://github.com/yzskyt/Vuln/blob/main/Go-RT-AC750/Go-RT-AC750.md -https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056 -https://github.com/z1pwn/bug_report/blob/main/vendors/kingbhob02/library-management-system/XSS-1.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/addWifiMacFilter/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetFirewallCfg/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetSpeedWan/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formWifiWpsStart/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromSetIpMacBind/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/saveParentControlInfo/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/CertListInfo/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/IPSECsave/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/L7Im/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/NatStaticSetting/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/P2pListFilter/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/QuickIndex/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeClientFilter/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeEmailFilter/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeUrlFilter/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SetIpBind/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/VirtualSer/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addUserName/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addressNat/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/delFileName/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editFileName/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editUserName/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolReboot/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolRestoreSet/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/WifiMacFilterGet/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/exeCommand/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/setAutoPing/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/wifiSSIDset/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/doReboot/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2Wan_cgi/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2userconfig_cgi/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/setmac/readme.md -https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/wizard_end/readme.md -https://github.com/z1r00/IOT_Vul/tree/main/dlink/Dir816/form2systime_cgi -https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/MP4GetVideoProfileLevel/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/mp4property.cpp/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md -https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md -https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md -https://github.com/zadewg/LIVEBOX-0DAY -https://github.com/zadewg/RIUS -https://github.com/zakee94/online-banking-system/issues/11 -https://github.com/zakee94/online-banking-system/issues/12 -https://github.com/zakee94/online-banking-system/issues/13 -https://github.com/zakee94/online-banking-system/issues/14 -https://github.com/zakee94/online-banking-system/issues/15 -https://github.com/zakee94/online-banking-system/issues/16 -https://github.com/zakee94/online-banking-system/issues/17 -https://github.com/zakee94/online-banking-system/issues/19 -https://github.com/zalando/skipper/releases/tag/v0.13.218 -https://github.com/zblogcn/zblogphp/issues/175 -https://github.com/zblogcn/zblogphp/issues/176 -https://github.com/zblogcn/zblogphp/issues/187 -https://github.com/zblogcn/zblogphp/issues/188 -https://github.com/zblogcn/zblogphp/issues/209 -https://github.com/zblogcn/zblogphp/issues/336 -https://github.com/zchuanzhao/jeesns/issues/6 -https://github.com/zchuanzhao/jeesns/issues/9 -https://github.com/zeek/zeek/issues/1798 -https://github.com/zencart/zencart/issues/1431 -https://github.com/zenspider/ruby_parser-legacy/issues/1 -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3 -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-56p9-5p3v-hhrc -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47 -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549 -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fjc8-223c-qgqr -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4 -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2 -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j -https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453 -https://github.com/zer0yu/CVE_Request/blob/master/MonstaFTP/MonstaFTP_v2_10_3_SSRF.md -https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_first.md -https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_second.md -https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md -https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md -https://github.com/zer0yu/CVE_Request/blob/master/baijiacms/baijiacmsv4_ssrf.md -https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_first.md -https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_second.md -https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md -https://github.com/zer0yu/CVE_Request/blob/master/netgear/netgear_cgi_unauthorized_access_vulnerability.md -https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_%20ajaxGetFileByPath.md -https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_a.md -https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_b.md -https://github.com/zerohax/RedmineUP-XSS/blob/master/vcard-upload-xss -https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq -https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/Arbitrary-File-Upload-Vulnerability.md -https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-3.md -https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability.md -https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Garage-Management-System/Arbitrary-File-Upload-Vulnerability.md -https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/Arbitrary-File-Upload-Vulnerability.md -https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/SQL-Injection-Vulnerability.md -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1188 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1189 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1453 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1488 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1489 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1490 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1492 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1493 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678 -https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679 -https://github.com/zhangqiquan/shopxian_cms/issues/4 -https://github.com/zhaoheng521/PbootCMS/blob/master/V1.0.7%20csrf -https://github.com/zhaoheng521/yxcms/blob/master/Any%20file%20deletion -https://github.com/zhaojh329/rttys/issues/117 -https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md -https://github.com/zhlu32/cve/blob/main/tenda/Tenda-ac15-buffer-overflow.md -https://github.com/zhlu32/cve/blob/main/tplink/wr886n/Tplink-wr886n-V3-Ping-DOS.md -https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html -https://github.com/zhuxianjin/vuln_repo/blob/master/chaojicms_stored_xss.md -https://github.com/zhuzhuyule/HexoEditor/issues/3 -https://github.com/zi0Black/POC-CVE-2018-0114 -https://github.com/zikula/core/issues/3237 -https://github.com/zj3t/Automotive-vulnerabilities/tree/main/VW/jetta2021 -https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md -https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md -https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md -https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md -https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md -https://github.com/zldww2011/CVE-2018-0802_POC -https://github.com/zlgxzswjy/BUI-select-xss -https://github.com/zlib-ng/minizip-ng/issues/739 -https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3 -https://github.com/zn9988/publications/tree/main/1.TP-Link%20Tapo%20C100%20-%20HTTP%20Denial-Of-Service -https://github.com/znc/znc/issues/1459 -https://github.com/zongdeiqianxing/cve-reports/issues/2 -https://github.com/zorlan/skycaiji/issues/13 -https://github.com/zorlan/skycaiji/issues/9 -https://github.com/zoujingli/ThinkAdmin/issues/173 -https://github.com/zoujingli/ThinkAdmin/issues/238 -https://github.com/zoujingli/ThinkAdmin/issues/255 -https://github.com/zouyang0714/cms/blob/main/2.md -https://github.com/zouyang0714/cms/blob/main/3.md -https://github.com/zrax/pycdc/issues/291 -https://github.com/zrax/pycdc/issues/295 -https://github.com/zxlie/FeHelper/issues/63 -https://github.com/zxsssd/TotoLink- -https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md -https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md -https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md -https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md -https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md -https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md -https://github.com/zyx0814/dzzoffice/issues/183 -https://github.com/zyx0814/dzzoffice/issues/195 -https://github.com/zyx0814/dzzoffice/issues/223 -https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Mongoose_null_pointer.md -https://github.com/zzh-newlearner/record/blob/main/luowice.md -https://github.com/zzh-newlearner/record/blob/main/luowice_warning.md -https://github.com/zzh-newlearner/record/blob/main/macrovideo_share.md -https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md -https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md -https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749 -https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras/ -https://gitlab.com/dheatattack/dheater -https://gitlab.com/esr/gif2png/issues/8 -https://gitlab.com/francoisjacquet/rosariosis/-/issues/282 -https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 -https://gitlab.com/francoisjacquet/rosariosis/-/issues/307 -https://gitlab.com/francoisjacquet/rosariosis/-/issues/308 -https://gitlab.com/francoisjacquet/rosariosis/-/issues/328 -https://gitlab.com/gitlab-org/gitaly/-/issues/3948 -https://gitlab.com/gitlab-org/gitlab-ce/issues/25064 -https://gitlab.com/gitlab-org/gitlab-ce/issues/41757 -https://gitlab.com/gitlab-org/gitlab-ce/issues/41838 -https://gitlab.com/gitlab-org/gitlab-ce/issues/42028 -https://gitlab.com/gitlab-org/gitlab-ce/issues/47793 -https://gitlab.com/gitlab-org/gitlab-ce/issues/48617 -https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 -https://gitlab.com/gitlab-org/gitlab-ce/issues/50744 -https://gitlab.com/gitlab-org/gitlab-ce/issues/50748 -https://gitlab.com/gitlab-org/gitlab-ce/issues/50995 -https://gitlab.com/gitlab-org/gitlab-ce/issues/51142 -https://gitlab.com/gitlab-org/gitlab-ce/issues/51423 -https://gitlab.com/gitlab-org/gitlab-ce/issues/51581 -https://gitlab.com/gitlab-org/gitlab-ce/issues/52212 -https://gitlab.com/gitlab-org/gitlab-ce/issues/52444 -https://gitlab.com/gitlab-org/gitlab-ce/issues/52522 -https://gitlab.com/gitlab-org/gitlab-ce/issues/53037 -https://gitlab.com/gitlab-org/gitlab-ce/issues/54189 -https://gitlab.com/gitlab-org/gitlab-ce/issues/54220 -https://gitlab.com/gitlab-org/gitlab-ce/issues/54795 -https://gitlab.com/gitlab-org/gitlab-ce/issues/55200 -https://gitlab.com/gitlab-org/gitlab-ce/issues/55469 -https://gitlab.com/gitlab-org/gitlab-ce/issues/55653 -https://gitlab.com/gitlab-org/gitlab-ce/issues/57556 -https://gitlab.com/gitlab-org/gitlab-ce/issues/59003 -https://gitlab.com/gitlab-org/gitlab-ce/issues/63959 -https://gitlab.com/gitlab-org/gitlab-ee/issues/7696 -https://gitlab.com/gitlab-org/gitlab-ee/issues/8167 -https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262 -https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27386 -https://gitlab.com/gitlab-org/gitlab-vscode-extension/-/issues/325 -https://gitlab.com/gitlab-org/gitlab/-/issues/121664 -https://gitlab.com/gitlab-org/gitlab/-/issues/211956 -https://gitlab.com/gitlab-org/gitlab/-/issues/216528 -https://gitlab.com/gitlab-org/gitlab/-/issues/219010 -https://gitlab.com/gitlab-org/gitlab/-/issues/219378 -https://gitlab.com/gitlab-org/gitlab/-/issues/219496 -https://gitlab.com/gitlab-org/gitlab/-/issues/220137 -https://gitlab.com/gitlab-org/gitlab/-/issues/220972 -https://gitlab.com/gitlab-org/gitlab/-/issues/239369 -https://gitlab.com/gitlab-org/gitlab/-/issues/241767 -https://gitlab.com/gitlab-org/gitlab/-/issues/24542 -https://gitlab.com/gitlab-org/gitlab/-/issues/24649 -https://gitlab.com/gitlab-org/gitlab/-/issues/255612 -https://gitlab.com/gitlab-org/gitlab/-/issues/259626 -https://gitlab.com/gitlab-org/gitlab/-/issues/26695 -https://gitlab.com/gitlab-org/gitlab/-/issues/27231 -https://gitlab.com/gitlab-org/gitlab/-/issues/28226 -https://gitlab.com/gitlab-org/gitlab/-/issues/28440 -https://gitlab.com/gitlab-org/gitlab/-/issues/289948 -https://gitlab.com/gitlab-org/gitlab/-/issues/294178 -https://gitlab.com/gitlab-org/gitlab/-/issues/300095 -https://gitlab.com/gitlab-org/gitlab/-/issues/300308 -https://gitlab.com/gitlab-org/gitlab/-/issues/30376 -https://gitlab.com/gitlab-org/gitlab/-/issues/32291 -https://gitlab.com/gitlab-org/gitlab/-/issues/324397 -https://gitlab.com/gitlab-org/gitlab/-/issues/328389 -https://gitlab.com/gitlab-org/gitlab/-/issues/331051 -https://gitlab.com/gitlab-org/gitlab/-/issues/332420 -https://gitlab.com/gitlab-org/gitlab/-/issues/336460 -https://gitlab.com/gitlab-org/gitlab/-/issues/337824 -https://gitlab.com/gitlab-org/gitlab/-/issues/338721 -https://gitlab.com/gitlab-org/gitlab/-/issues/341832 -https://gitlab.com/gitlab-org/gitlab/-/issues/342988 -https://gitlab.com/gitlab-org/gitlab/-/issues/345657 -https://gitlab.com/gitlab-org/gitlab/-/issues/347284 -https://gitlab.com/gitlab-org/gitlab/-/issues/349148 -https://gitlab.com/gitlab-org/gitlab/-/issues/349382 -https://gitlab.com/gitlab-org/gitlab/-/issues/350687 -https://gitlab.com/gitlab-org/gitlab/-/issues/351823 -https://gitlab.com/gitlab-org/gitlab/-/issues/353018 -https://gitlab.com/gitlab-org/gitlab/-/issues/354948 -https://gitlab.com/gitlab-org/gitlab/-/issues/355509 -https://gitlab.com/gitlab-org/gitlab/-/issues/356665 -https://gitlab.com/gitlab-org/gitlab/-/issues/359142 -https://gitlab.com/gitlab-org/gitlab/-/issues/361179 -https://gitlab.com/gitlab-org/gitlab/-/issues/364252 -https://gitlab.com/gitlab-org/gitlab/-/issues/365427 -https://gitlab.com/gitlab-org/gitlab/-/issues/371098 -https://gitlab.com/gitlab-org/gitlab/-/issues/377810 -https://gitlab.com/gitlab-org/gitlab/-/issues/377978 -https://gitlab.com/gitlab-org/gitlab/-/issues/381815 -https://gitlab.com/gitlab-org/gitlab/-/issues/383709 -https://gitlab.com/gitlab-org/gitlab/-/issues/385050 -https://gitlab.com/gitlab-org/gitlab/-/issues/387185 -https://gitlab.com/gitlab-org/gitlab/-/issues/387638 -https://gitlab.com/gitlab-org/gitlab/-/issues/388132 -https://gitlab.com/gitlab-org/gitlab/-/issues/390910 -https://gitlab.com/gitlab-org/gitlab/-/issues/394960 -https://gitlab.com/gitlab-org/gitlab/-/issues/399774 -https://gitlab.com/gitlab-org/gitlab/-/issues/404613 -https://gitlab.com/gitlab-org/gitlab/-/issues/405150 -https://gitlab.com/gitlab-org/gitlab/-/issues/406235 -https://gitlab.com/gitlab-org/gitlab/-/issues/407166 -https://gitlab.com/gitlab-org/gitlab/-/issues/407374 -https://gitlab.com/gitlab-org/gitlab/-/issues/407783 -https://gitlab.com/gitlab-org/gitlab/-/issues/407830 -https://gitlab.com/gitlab-org/gitlab/-/issues/408359 -https://gitlab.com/gitlab-org/gitlab/-/issues/410433 -https://gitlab.com/gitlab-org/gitlab/-/issues/414367 -https://gitlab.com/gitlab-org/gitlab/-/issues/416161 -https://gitlab.com/gitlab-org/gitlab/-/issues/416252 -https://gitlab.com/gitlab-org/gitlab/-/issues/416945 -https://gitlab.com/gitlab-org/gitlab/-/issues/416957 -https://gitlab.com/gitlab-org/gitlab/-/issues/416961 -https://gitlab.com/gitlab-org/gitlab/-/issues/417481 -https://gitlab.com/gitlab-org/gitlab/-/issues/417594 -https://gitlab.com/gitlab-org/gitlab/-/issues/417896 -https://gitlab.com/gitlab-org/gitlab/-/issues/418115 -https://gitlab.com/gitlab-org/gitlab/-/issues/418226 -https://gitlab.com/gitlab-org/gitlab/-/issues/418770 -https://gitlab.com/gitlab-org/gitlab/-/issues/419857 -https://gitlab.com/gitlab-org/gitlab/-/issues/419972 -https://gitlab.com/gitlab-org/gitlab/-/issues/423357 -https://gitlab.com/gitlab-org/gitlab/-/issues/423835 -https://gitlab.com/gitlab-org/gitlab/-/issues/424882 -https://gitlab.com/gitlab-org/gitlab/-/issues/425361 -https://gitlab.com/gitlab-org/gitlab/-/issues/427827 -https://gitlab.com/gitlab-org/gitlab/-/issues/431345 -https://gitlab.com/gitlab-org/gitlab/-/issues/435500 -https://gitlab.com/gitlab-org/gitlab/-/issues/439240 -https://gitlab.com/gitlab-org/gitlab/issues/30017 -https://gitlab.com/gitlab-org/gitlab/issues/31536 -https://gitlab.com/gitlab-org/omnibus-gitlab/issues/4380 -https://gitlab.com/gnutls/libtasn1/issues/4 -https://gitlab.com/graphviz/graphviz/issues/1512 -https://gitlab.com/graphviz/graphviz/issues/1517 -https://gitlab.com/libtiff/libtiff/-/issues/277 -https://gitlab.com/libtiff/libtiff/-/issues/278 -https://gitlab.com/libtiff/libtiff/-/issues/319 -https://gitlab.com/libtiff/libtiff/-/issues/355 -https://gitlab.com/libtiff/libtiff/-/issues/362 -https://gitlab.com/libtiff/libtiff/-/issues/380 -https://gitlab.com/libtiff/libtiff/-/issues/381 -https://gitlab.com/libtiff/libtiff/-/issues/382 -https://gitlab.com/libtiff/libtiff/-/issues/383 -https://gitlab.com/libtiff/libtiff/-/issues/385 -https://gitlab.com/libtiff/libtiff/-/issues/386 -https://gitlab.com/libtiff/libtiff/-/issues/391 -https://gitlab.com/libtiff/libtiff/-/issues/392 -https://gitlab.com/libtiff/libtiff/-/issues/393 -https://gitlab.com/libtiff/libtiff/-/issues/398 -https://gitlab.com/libtiff/libtiff/-/issues/400 -https://gitlab.com/libtiff/libtiff/-/issues/402 -https://gitlab.com/libtiff/libtiff/-/issues/413 -https://gitlab.com/libtiff/libtiff/-/issues/414 -https://gitlab.com/libtiff/libtiff/-/issues/415 -https://gitlab.com/libtiff/libtiff/-/issues/426 -https://gitlab.com/libtiff/libtiff/-/issues/427 -https://gitlab.com/libtiff/libtiff/-/issues/428 -https://gitlab.com/libtiff/libtiff/-/issues/433 -https://gitlab.com/libtiff/libtiff/-/issues/435 -https://gitlab.com/libtiff/libtiff/-/issues/455 -https://gitlab.com/libtiff/libtiff/-/issues/463 -https://gitlab.com/libtiff/libtiff/-/issues/464 -https://gitlab.com/libtiff/libtiff/-/issues/486 -https://gitlab.com/libtiff/libtiff/-/issues/488 -https://gitlab.com/libtiff/libtiff/-/issues/492 -https://gitlab.com/libtiff/libtiff/-/issues/493 -https://gitlab.com/libtiff/libtiff/-/issues/494 -https://gitlab.com/libtiff/libtiff/-/issues/495 -https://gitlab.com/libtiff/libtiff/-/issues/496 -https://gitlab.com/libtiff/libtiff/-/issues/497 -https://gitlab.com/libtiff/libtiff/-/issues/498 -https://gitlab.com/libtiff/libtiff/-/issues/499 -https://gitlab.com/libtiff/libtiff/-/issues/500 -https://gitlab.com/libtiff/libtiff/-/issues/501 -https://gitlab.com/libtiff/libtiff/-/issues/518 -https://gitlab.com/libtiff/libtiff/-/issues/519 -https://gitlab.com/libtiff/libtiff/-/issues/520 -https://gitlab.com/libtiff/libtiff/-/issues/530 -https://gitlab.com/libtiff/libtiff/-/issues/537 -https://gitlab.com/libtiff/libtiff/-/issues/538 -https://gitlab.com/libtiff/libtiff/-/issues/542 -https://gitlab.com/libtiff/libtiff/-/issues/548 -https://gitlab.com/libtiff/libtiff/-/issues/614 -https://gitlab.com/libtiff/libtiff/-/issues/621 -https://gitlab.com/libtiff/libtiff/-/issues/622 -https://gitlab.com/libtiff/libtiff/-/merge_requests/479 -https://gitlab.com/lucaapp/web/-/issues/1#note_560963608 -https://gitlab.com/nemux/CVE-2018-8072/blob/master/CVE-2018-8072_PoC.txt -https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21/diffs?commit_id=9b0cbb76c8434a8505f02ada02a94263dcae9247#diff-content-b3cfd29983c793bcae2375502abd5baa8f5d1081 -https://gitlab.com/qemu-project/qemu/-/issues/2273 -https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read -https://gitlab.com/sane-project/backends/-/issues/708 -https://gitlab.com/sane-project/backends/-/issues/709 -https://gitlab.com/soundtouch/soundtouch/issues/6 -https://gitlab.com/wg1/jpeg-xl/-/issues/163 -https://gitlab.com/wireshark/wireshark/-/issues/16887 -https://gitlab.com/wireshark/wireshark/-/issues/17232 -https://gitlab.com/wireshark/wireshark/-/issues/17811 -https://gitlab.com/wireshark/wireshark/-/issues/17813 -https://gitlab.com/wireshark/wireshark/-/issues/17840 -https://gitlab.com/wireshark/wireshark/-/issues/18378 -https://gitlab.com/wireshark/wireshark/-/issues/19085 -https://gitlab.com/wireshark/wireshark/-/issues/19086 -https://gitlab.com/wireshark/wireshark/-/issues/19087 -https://gitlab.com/wireshark/wireshark/-/issues/19144 -https://gitlab.com/wireshark/wireshark/-/issues/19229 -https://gitlab.com/wireshark/wireshark/-/issues/19258 -https://gitlab.com/wireshark/wireshark/-/issues/19259 -https://gitlab.com/wireshark/wireshark/-/issues/19404 -https://gitlab.com/wireshark/wireshark/-/issues/19501 -https://gitlab.com/wireshark/wireshark/-/issues/19504 -https://gitlab.com/wireshark/wireshark/-/issues/19724 -https://gitlab.com/wireshark/wireshark/-/issues/19782 -https://gitlab.com/wireshark/wireshark/-/issues/19783 -https://gitlab.com/wireshark/wireshark/-/issues/19784 -https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11 -https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198 -https://gitlab.freedesktop.org/cairo/cairo/issues/341 -https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 -https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8 -https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224 -https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 -https://gitlab.freedesktop.org/libopenraw/exempi/issues/12 -https://gitlab.freedesktop.org/libopenraw/exempi/issues/13 -https://gitlab.freedesktop.org/pixman/pixman/-/issues/63 -https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1013 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230#note_1372177 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282 -https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399 -https://gitlab.freedesktop.org/poppler/poppler/issues/654 -https://gitlab.freedesktop.org/poppler/poppler/issues/659 -https://gitlab.freedesktop.org/poppler/poppler/issues/661 -https://gitlab.freedesktop.org/poppler/poppler/issues/706 -https://gitlab.freedesktop.org/poppler/poppler/issues/728 -https://gitlab.freedesktop.org/poppler/poppler/issues/730 -https://gitlab.freedesktop.org/poppler/poppler/issues/731 -https://gitlab.freedesktop.org/poppler/poppler/issues/741 -https://gitlab.freedesktop.org/poppler/poppler/issues/742 -https://gitlab.freedesktop.org/poppler/poppler/issues/748 -https://gitlab.freedesktop.org/poppler/poppler/issues/750 -https://gitlab.freedesktop.org/poppler/poppler/issues/751 -https://gitlab.freedesktop.org/poppler/poppler/issues/752 -https://gitlab.freedesktop.org/poppler/poppler/issues/802 -https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 -https://gitlab.gnome.org/GNOME/evolution/issues/784 -https://gitlab.gnome.org/GNOME/file-roller/-/issues/108 -https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 -https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 -https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 -https://gitlab.gnome.org/GNOME/gegl/-/issues/298 -https://gitlab.gnome.org/GNOME/gimp/-/issues/8120 -https://gitlab.gnome.org/GNOME/glib/-/issues/2319 -https://gitlab.gnome.org/GNOME/glib/-/issues/2325 -https://gitlab.gnome.org/GNOME/glib/-/issues/3268 -https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7 -https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550 -https://gitlab.gnome.org/GNOME/libcroco/-/issues/8 -https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 -https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 -https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 -https://gitlab.isc.org/isc-projects/bind9/-/issues/4398 -https://gitlab.nic.cz/turris/foris/foris/-/issues/201 -https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742 -https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390 -https://giuliamelottigaribaldi.com/cve-2022-48199/ -https://gkaim.com/cve-2018-11501-vikas-chaudhary/ -https://gkaim.com/cve-2018-13256-vikas-chaudhary/ -https://gkaim.com/cve-2018-14082-vikas-chaudhary/ -https://gkaim.com/cve-2018-14541-vikas-chaudhary/ -https://gkaim.com/cve-2018-15181-vikas-chaudhary/ -https://gkaim.com/cve-2018-15182-vikas-chaudhary/ -https://gkaim.com/cve-2018-15183-vikas-chaudhary/ -https://gkaim.com/cve-2018-15184-vikas-chaudhary/ -https://gkaim.com/cve-2018-15185-vikas-chaudhary/ -https://gkaim.com/cve-2018-15186-vikas-chaudhary/ -https://gkaim.com/cve-2018-15187-vikas-chaudhary/ -https://gkaim.com/cve-2018-15188-vikas-chaudhary/ -https://gkaim.com/cve-2018-15189-vikas-chaudhary/ -https://gkaim.com/cve-2018-15190-vikas-chaudhary/ -https://gkaim.com/cve-2018-15191-vikas-chaudhary/ -https://gkaim.com/cve-2018-15896-vikas-chaudhary/ -https://gkaim.com/cve-2018-15897-vikas-chaudhary/ -https://gkaim.com/cve-2018-20626-vikas-chaudhary/ -https://gkaim.com/cve-2018-20627-vikas-chaudhary/ -https://gkaim.com/cve-2018-20628-vikas-chaudhary/ -https://gkaim.com/cve-2018-20629-vikas-chaudhary/ -https://gkaim.com/cve-2018-20630-vikas-chaudhary/ -https://gkaim.com/cve-2018-20631-vikas-chaudhary/ -https://gkaim.com/cve-2018-20632-vikas-chaudhary/ -https://gkaim.com/cve-2018-20633-vikas-chaudhary/ -https://gkaim.com/cve-2018-20634-vikas-chaudhary/ -https://gkaim.com/cve-2018-20635-vikas-chaudhary/ -https://gkaim.com/cve-2018-20636-vikas-chaudhary/ -https://gkaim.com/cve-2018-20637-vikas-chaudhary/ -https://gkaim.com/cve-2018-20638-vikas-chaudhary/ -https://gkaim.com/cve-2018-20639-vikas-chaudhary/ -https://gkaim.com/cve-2018-20640-vikas-chaudhary/ -https://gkaim.com/cve-2018-20641-vikas-chaudhary/ -https://gkaim.com/cve-2018-20642-vikas-chaudhary/ -https://gkaim.com/cve-2018-20643-vikas-chaudhary/ -https://gkaim.com/cve-2018-20644-vikas-chaudhary/ -https://gkaim.com/cve-2018-20645-vikas-chaudhary/ -https://gkaim.com/cve-2018-20646-vikas-chaudhary/ -https://gkaim.com/cve-2018-20648-vikas-chaudhary/ -https://gkaim.com/cve-2019-14978-vikas-chaudhary/ -https://gkaim.com/cve-2019-14979-vikas-chaudhary/ -https://gkaim.com/cve-2019-7429-vikas-chaudhary/ -https://gkaim.com/cve-2019-7430-vikas-chaudhary/ -https://gkaim.com/cve-2019-7431-vikas-chaudhary/ -https://gkaim.com/cve-2019-7432-vikas-chaudhary/ -https://gkaim.com/cve-2019-7433-vikas-chaudhary/ -https://gkaim.com/cve-2019-7434-vikas-chaudhary/ -https://gkaim.com/cve-2019-7435-vikas-chaudhary/ -https://gkaim.com/cve-2019-7436-vikas-chaudhary/ -https://gkaim.com/cve-2019-7437-vikas-chaudhary/ -https://gkaim.com/cve-2019-7438-html-vikas-chaudhary/ -https://gkaim.com/cve-2019-7438-xss-vikas-chaudhary/ -https://gkaim.com/cve-2019-7439-vikas-chaudhary/ -https://gkaim.com/cve-2019-7440-vikas-chaudhary/ -https://gkaim.com/cve-2019-7441-vikas-chaudhary/ -https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 -https://go.dev/issue/63417 -https://googleinformationsworld.blogspot.com/2023/04/revive-adserver-541-vulnerable-to-brute.html -https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html -https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html -https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html -https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html -https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html -https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-unauthenticated-arbitrary-file-upload-rce-44341831bec8 -https://greenshot.atlassian.net/browse/BUG-3061 -https://griffinbyatt.com/2019/08/02/Das-Vulnerabilities.html -https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client -https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe -https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client -https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe -https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c -https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xss-at-cards-84266b5250f1 -https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xss-at-posts-437c305036e2 -https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xss-at-comments-2ea536ec55e1 -https://grimthereaperteam.medium.com/declined-backdrop-xss-at-pages-26e5d63686bc -https://grimthereaperteam.medium.com/hrsale-v-2-0-0-reflected-cross-site-scripting-17a5617e2c6e -https://grimthereaperteam.medium.com/open-source-point-of-sale-v3-3-7-file-upload-cross-site-scripting-4900d717b2c3 -https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-b15becc1a5ea -https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab -https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ -https://groups.google.com/g/deluge-dev/c/e5zh7wT0rEg -https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74 -https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ -https://gurelahmet.com/cve-2018-11538-csrf-privilege-escalation-creation-of-an-administrator-account-on-searchblox-8-6-6/ -https://gurelahmet.com/searchblox-8-6-7-out-of-band-xml-external-entity-oob-xxe-cve-2018-11586/ -https://gynvael.coldwind.pl/?id=740 -https://gynvael.coldwind.pl/?id=741 -https://gynvael.coldwind.pl/?id=742 -https://gynvael.coldwind.pl/?id=752 -https://gynvael.coldwind.pl/?lang=en&id=733 -https://gynvael.coldwind.pl/?lang=en&id=736 -https://gynvael.coldwind.pl/?lang=en&id=748 -https://h0mbre.github.io/atillk64_exploit/ -https://habr.com/en/post/486856/ -https://habr.com/ru/articles/804863/ -https://habr.com/ru/company/pm/blog/462479/ -https://habr.com/ru/post/486856/ -https://hackdefense.com/publications/cve-2019-18345-davical-caldav-server-vulnerability/ -https://hackdefense.com/publications/cve-2019-18347-davical-caldav-server-vulnerability/ -https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/ -https://hackerdna.com/courses/cve/cve-2024-34899 -https://hackerone.com/reports/1142918 -https://hackerone.com/reports/152958 -https://hackerone.com/reports/1654310 -https://hackerone.com/reports/243156 -https://hackerone.com/reports/308158 -https://hackerone.com/reports/317321 -https://hackerone.com/reports/337680 -https://hackerone.com/reports/446593 -https://hackerone.com/reports/471739 -https://hackerone.com/reports/490946 -https://hackerone.com/reports/588239 -https://hackerone.com/reports/588562 -https://hackerone.com/reports/651518 -https://hackerone.com/reports/681617 -https://hackerone.com/reports/689314 -https://hackerone.com/reports/775693 -https://hackerone.com/reports/792895 -https://hackerone.com/reports/867052 -https://hackerone.com/reports/986365 -https://hackings8n.blogspot.com/2018/06/cve-2018-12705-digisol-wireless-router.html -https://hackings8n.blogspot.com/2018/06/cve-2018-12706-digisol-dg-br4000ng.html -https://hackings8n.blogspot.com/2018/07/cve-2018-13065-modsecurity-300-has-xss.html -https://hackingvila.wordpress.com/2019/02/19/php-scripts-mall-online-food-ordering-script-has-cross-site-request-forgery-csrf-php-script-mall/ -https://hackingvila.wordpress.com/2019/03/06/php-scripts-mall-online-lottery-php-readymade-script-1-7-0-has-cross-site-request-forgery-csrf-for-edit-profile-actionscve-2019-9604/ -https://hackintoanetwork.com/blog/2023-starlink-router-gen2-xss-eng/ -https://hackmag.com/security/aguard-cve/ -https://hackpuntes.com/cve-2018-14430-wordpress-plugin-multi-step-form-125-multiples-xss-reflejados/ -https://hackpuntes.com/cve-2018-15571-wordpress-plugin-export-users-to-csv-1-1-1-csv-injection/ -https://hackpuntes.com/cve-2018-15873-sentrifugo-hrms-3-2-blind-sql-injection/ -https://hackpuntes.com/cve-2018-15917-jorani-leave-management-system-0-6-5-cross-site-scripting-persistente/ -https://hackpuntes.com/cve-2018-15918-jorani-leave-management-system-0-6-5-sql-injection/ -https://hackpuntes.com/cve-2018-18478-libre-nms-1-43-cross-site-scripting-persistente/ -https://hackpuntes.com/cve-2018-18922-ticketly-1-0-escalacion-de-privilegios-crear-cuenta-administrador/ -https://hackpuntes.com/cve-2018-18923-ticketly-1-0-multiples-sql-injections/ -https://hackpuntes.com/cve-2018-19828-integria-ims-5-0-83-cross-site-scripting-reflejado/ -https://hackpuntes.com/cve-2018-19829-integria-ims-5-0-83-cross-site-request-forgery/ -https://hackpuntes.com/cve-2019-14347-escalacion-de-privilegios-en-adive/ -https://hackpuntes.com/cve-2019-7400-rukovoditel-erp-crm-2-4-1-cross-site-scripting-reflejado/ -https://hacks.mozilla.org/2011/06/cross-domain-webgl-textures-disabled-in-firefox-5/ -https://hansesecure.de/vulnerability-in-coolplayer/ -https://hansmi.ch/articles/2018-04-openshift-s2i-security -https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/ -https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/ -https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/ -https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/ -https://heitorgouvea.me/2019/09/17/CVE-2019-15033 -https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm -https://help.passbolt.com/incidents/pwned-password-service-information-leak -https://herolab.usd.de/en/security-advisories/usd-2019-0053/ -https://herolab.usd.de/en/security-advisories/usd-2021-0006 -https://herolab.usd.de/en/security-advisories/usd-2021-0007/ -https://herolab.usd.de/en/security-advisories/usd-2022-0002/ -https://herolab.usd.de/en/security-advisories/usd-2022-0003/ -https://herolab.usd.de/en/security-advisories/usd-2022-0004/ -https://herolab.usd.de/en/security-advisories/usd-2022-0005/ -https://herolab.usd.de/en/security-advisories/usd-2022-0006/ -https://herolab.usd.de/en/security-advisories/usd-2022-0032/ -https://herolab.usd.de/en/security-advisories/usd-2022-0033/ -https://herolab.usd.de/en/security-advisories/usd-2022-0051/ -https://herolab.usd.de/en/security-advisories/usd-2022-0052/ -https://herolab.usd.de/en/security-advisories/usd-2022-0053/ -https://herolab.usd.de/en/security-advisories/usd-2022-0054/ -https://herolab.usd.de/en/security-advisories/usd-2022-0055/ -https://herolab.usd.de/en/security-advisories/usd-2022-0056/ -https://herolab.usd.de/en/security-advisories/usd-2022-0057/ -https://herolab.usd.de/en/security-advisories/usd-2022-0058/ -https://herolab.usd.de/en/security-advisories/usd-2022-0059/ -https://herolab.usd.de/en/security-advisories/usd-2022-0060/ -https://herolab.usd.de/en/security-advisories/usd-2022-0061/ -https://herolab.usd.de/en/security-advisories/usd-2022-0066/ -https://herolab.usd.de/en/security-advisories/usd-2023-0015/ -https://herolab.usd.de/security-advisories/usd-2019-0016/ -https://herolab.usd.de/security-advisories/usd-2019-0046/ -https://herolab.usd.de/security-advisories/usd-2019-0049/ -https://herolab.usd.de/security-advisories/usd-2019-0051/ -https://herolab.usd.de/security-advisories/usd-2019-0052/ -https://herolab.usd.de/security-advisories/usd-2019-0054/ -https://herolab.usd.de/security-advisories/usd-2019-0069/ -https://herolab.usd.de/security-advisories/usd-2019-0070/ -https://herolab.usd.de/security-advisories/usd-2019-0072/ -https://herolab.usd.de/security-advisories/usd-2020-0001/ -https://herolab.usd.de/security-advisories/usd-2020-0002/ -https://herolab.usd.de/security-advisories/usd-2020-0026/ -https://herolab.usd.de/security-advisories/usd-2020-0027/ -https://herolab.usd.de/security-advisories/usd-2020-0028/ -https://herolab.usd.de/security-advisories/usd-2020-0029/ -https://herolab.usd.de/security-advisories/usd-2020-0031/ -https://herolab.usd.de/security-advisories/usd-2020-0033/ -https://herolab.usd.de/security-advisories/usd-2020-0034/ -https://herolab.usd.de/security-advisories/usd-2020-0035/ -https://herolab.usd.de/security-advisories/usd-2020-0038/ -https://herolab.usd.de/security-advisories/usd-2020-0041/ -https://herolab.usd.de/security-advisories/usd-2020-0048/ -https://herolab.usd.de/security-advisories/usd-2020-0049/ -https://herolab.usd.de/security-advisories/usd-2020-0050/ -https://herolab.usd.de/security-advisories/usd-2020-0051/ -https://herolab.usd.de/security-advisories/usd-2020-0052/ -https://herolab.usd.de/security-advisories/usd-2020-0053/ -https://herolab.usd.de/security-advisories/usd-2020-0054/ -https://herolab.usd.de/security-advisories/usd-2021-0008/ -https://herolab.usd.de/security-advisories/usd-2021-0011/ -https://herolab.usd.de/security-advisories/usd-2021-0014/ -https://herolab.usd.de/security-advisories/usd-2021-0015/ -https://herolab.usd.de/security-advisories/usd-2021-0033/ -https://herolab.usd.de/security-advisories/usd-2022-0008/ -https://herolab.usd.de/security-advisories/usd-2022-0009/ -https://herolab.usd.de/security-advisories/usd-2022-0010/ -https://herolab.usd.de/security-advisories/usd-2022-0030/ -https://herolab.usd.de/security-advisories/usd-2022-0031/ -https://herolab.usd.de/security-advisories/usd-2022-0048/ -https://herolab.usd.de/security-advisories/usd-2022-0064/ -https://herolab.usd.de/security-advisories/usd-2023-0002/ -https://herolab.usd.de/security-advisories/usd-2023-0010/ -https://herolab.usd.de/security-advisories/usd-2023-0011/ -https://herolab.usd.de/security-advisories/usd-2023-0012/ -https://herolab.usd.de/security-advisories/usd-2023-0013/ -https://herolab.usd.de/security-advisories/usd-2023-0014/ -https://herolab.usd.de/security-advisories/usd-2023-0019/ -https://herolab.usd.de/security-advisories/usd-2023-0020/ -https://herolab.usd.de/security-advisories/usd-2023-0022/ -https://herolab.usd.de/security-advisories/usd-2023-0024/ -https://herolab.usd.de/security-advisories/usd-2023-0025/ -https://herolab.usd.de/security-advisories/usd-2023-0046/ -https://herolab.usd.de/security-advisories/usd-2023-0047/ -https://herolab.usd.de/security-advisories/usd-2023-0048/ -https://herolab.usd.de/security-advisories/usd-2023-0049/ -https://herolab.usd.de/security-advisories/usd-2023-0050/ -https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html -https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html -https://hibernate.atlassian.net/browse/HV-1012 -https://hibernate.atlassian.net/browse/HV-912 -https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html -https://httpoxy.org/ -https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc -https://https://www.honeywell.com/us/en/product-security -https://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt -https://i.blackhat.com/asia-20/Friday/asia-20-Loke-Patching-Loopholes-Finding-Backdoors-In-Applications.pdf -https://ia-informatica.com/it/CVE-2018-8823 -https://ia-informatica.com/it/CVE-2018-8824 -https://ia-informatica.com/it/CVE-2019-19594 -https://ia-informatica.com/it/CVE-2019-19595 -https://ia-informatica.com/it/CVE-2020-12120 -https://ia-informatica.com/it/CVE-2022-46639 -https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 -https://icepng.github.io/2017/04/21/PoDoFo-1/ -https://icisystem.blogspot.com/2015/09/cisco-notification-alert-prime-dcnm-01.html -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/ -https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/ -https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A -https://ics-cert.us-cert.gov/advisories/ICSA-14-303-01 -https://ics-cert.us-cert.gov/advisories/ICSA-19-050-03 -https://ieeexplore.ieee.org/document/10374117 -https://igniterealtime.org/issues/browse/OF-941 -https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0 -https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor -https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor -https://ikiwiki.info/bugs/XSS_Alert...__33____33____33__/ -https://illikainen.dev/advisories/014-yz1-izarc -https://illuminati.services/2021/04/29/cve-2021-26807-gog-galaxy-v2-0-35-dll-load-order-hijacking/ -https://images.go.hitachienergy.com/Web/ABBEnterpriseSoftware/%7B70b3d323-4866-42e1-8a75-58996729c1d4%7D_8DBD000172-VU-2023-23_Asset_Suite_Tagout_vulnerability_Rev1.pdf -https://imagetragick.com/ -https://imhotepisinvisible.com/druva-lpe/ -https://improsec.com/tech-blog/cam1 -https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm -https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-splashtop-streamer -https://inf0seq.github.io/cve/2019/01/20/Cross-site-scripting-(XSS)-in-OPTOSS-Next-Gen-Network-Management-System-(NG-NetMS).html -https://inf0seq.github.io/cve/2019/01/20/SQL-Injection-in-OPTOSS-Next-Gen-Network-Management-System-(NG-NetMS).html -https://inf0seq.github.io/cve/2020/04/21/OS.html -https://inf0seq.github.io/cve/2020/04/21/Path-Traversal-in-Enterprise-loadbalancer-VA-MAX-v8.3.8-and-earlier.html -https://inf0seq.github.io/cve/2023/04/30/Cross-site-scripting-(XSS)-in-Sophos-Web-Appliance-4.1.1-0.9.html -https://inf0seq.github.io/cve/2023/05/03/Cross-Site-scripting-(XSS)-in-Sophos-iView.html -https://infayer.com/?p=43 -https://infayer.com/archivos/448 -https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns -https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ -https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss -https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-cm-deletet-lfi-local-file-inclusion-and-rce/ -https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-remote-code-execution/ -https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html -https://infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-router.html -https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html -https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ -https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ -https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/ -https://integritylabs.io/advisories/cve-2018-10377 -https://ioactive.com/hootoo-tripmate-routers-are-cute-but/ -https://ioctl.fail/echo-ac-writeup/ -https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/ -https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/ -https://iot-lab-fh-ooe.github.io/netgear_update_vulnerability/ -https://irssi.org/security/irssi_sa_2016.txt -https://isaghojaria.medium.com/softr-v2-0-was-discovered-to-be-vulnerable-to-html-injection-via-the-name-field-of-the-account-page-c6fbd3162254 -https://isc.sans.edu/forums/diary/TR069+NewNTPServer+Exploits+What+we+know+so+far/21763/ -https://isec.pl/en/vulnerabilities/isec-0028-seomatic-ssti-23032020.txt -https://issues.apache.org/jira/browse/AMQ-3294 -https://issues.apache.org/jira/browse/DELTASPIKE-1307 -https://issues.apache.org/jira/browse/ZOOKEEPER-2693 -https://issues.asterisk.org/jira/browse/ASTERISK-20967 -https://issues.chromium.org/issues/325866363 -https://issues.chromium.org/issues/325936438 -https://issues.chromium.org/issues/40058873 -https://issues.chromium.org/issues/40064602 -https://issues.chromium.org/issues/40064754 -https://issues.chromium.org/issues/40944847 -https://issues.chromium.org/issues/40946325 -https://issues.chromium.org/issues/41481374 -https://issues.chromium.org/issues/41485789 -https://issues.chromium.org/issues/41486208 -https://issues.chromium.org/issues/41487933 -https://issues.chromium.org/issues/41491379 -https://issues.chromium.org/issues/41493290 -https://issues.chromium.org/issues/41495060 -https://issues.chromium.org/issues/41495878 -https://issues.igniterealtime.org/browse/OF-1417 -https://issues.igniterealtime.org/browse/OF-1955 -https://issues.igniterealtime.org/browse/OF-1963 -https://issues.igniterealtime.org/projects/SMACK/issues/SMACK-739 -https://issues.jasig.org/browse/CAS-1429 -https://issues.jasig.org/browse/CASC-228 -https://issues.jasig.org/browse/PHPCAS-61 -https://issues.jasig.org/browse/PHPCAS-67 -https://issues.jasig.org/browse/PHPCAS-80 -https://issues.jasig.org/browse/UP-4105 -https://issues.jasig.org/browse/UP-4106 -https://issues.liferay.com/browse/LPE-14964 -https://issues.liferay.com/browse/LPE-16928 -https://issues.liferay.com/browse/LPE-16963 -https://issues.liferay.com/browse/LPE-16981 -https://issues.liferay.com/browse/LPE-17001 -https://issues.liferay.com/browse/LPE-17007 -https://issues.liferay.com/browse/LPE-17009 -https://issues.liferay.com/browse/LPE-17022 -https://issues.liferay.com/browse/LPE-17023 -https://issues.liferay.com/browse/LPE-17029 -https://issues.liferay.com/browse/LPE-17030 -https://issues.liferay.com/browse/LPE-17032 -https://issues.liferay.com/browse/LPE-17039 -https://issues.liferay.com/browse/LPE-17042 -https://issues.liferay.com/browse/LPE-17046 -https://issues.liferay.com/browse/LPE-17049 -https://issues.liferay.com/browse/LPE-17053 -https://issues.liferay.com/browse/LPE-17055 -https://issues.liferay.com/browse/LPE-17061 -https://issues.liferay.com/browse/LPE-17075 -https://issues.liferay.com/browse/LPE-17078 -https://issues.liferay.com/browse/LPE-17093 -https://issues.liferay.com/browse/LPE-17100 -https://issues.liferay.com/browse/LPE-17101 -https://issues.liferay.com/browse/LPE-17102 -https://issues.liferay.com/browse/LPE-17103 -https://issues.liferay.com/browse/LPE-17127 -https://issues.liferay.com/browse/LPE-17131 -https://issues.liferay.com/browse/LPE-17191 -https://issues.liferay.com/browse/LPE-17211 -https://issues.liferay.com/browse/LPE-17342 -https://issues.liferay.com/browse/LPE-17377 -https://issues.liferay.com/browse/LPE-17379 -https://issues.liferay.com/browse/LPE-17381 -https://issues.liferay.com/browse/LPE-17403 -https://issues.liferay.com/browse/LPE-17414 -https://issues.liferay.com/browse/LPE-17435 -https://issues.liferay.com/browse/LPE-17438 -https://issues.liferay.com/browse/LPE-17447 -https://issues.liferay.com/browse/LPE-17448 -https://issues.liferay.com/browse/LPE-17513 -https://issues.liferay.com/browse/LPE-17517 -https://issues.liferay.com/browse/LPE-17518 -https://issues.liferay.com/browse/LPE-17520 -https://issues.liferay.com/browse/LPE-17535 -https://issues.liferay.com/browse/LPE-17593 -https://issues.liferay.com/browse/LPE-17595 -https://issues.liferay.com/browse/LPE-17607 -https://issues.liferay.com/browse/LPE-17632 -https://issues.liferay.com/browse/LPS-64547 -https://issues.liferay.com/browse/LPS-7087 -https://issues.liferay.com/browse/LPS-72307 -https://issues.shibboleth.net/jira/browse/SSPCPP-874 -https://issues.shibboleth.net/jira/browse/SSPCPP-927 -https://issuetracker.google.com/issues/231026247 -https://it-sec.de/schwachstelle-in-archivista-dms/ -https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ -https://jeffs.sh/CVEs/CVE-2020-27518.txt -https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/ -https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ -https://jetpack.com/2021/07/22/severe-vulnerability-patched-in-woocommerce-currency-switcher/ -https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/ -https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/ -https://jeyaseelans.medium.com/cve-2020-35338-9e841f48defa -https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/ -https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/ -https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ -https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/ -https://jgardner100.wordpress.com/2022/01/20/security-heads-up/ -https://jgj212.blogspot.tw/2017/05/a-sql-injection-vulnerability-in.html -https://jgj212.blogspot.tw/2017/05/a-stored-xss-vulnerability-in.html -https://jira.ixsystems.com/browse/NAS-107270 -https://jira.mariadb.org/browse/MDEV-26402 -https://jira.mariadb.org/browse/MDEV-26406 -https://jira.mariadb.org/browse/MDEV-26407 -https://jira.mariadb.org/browse/MDEV-26410 -https://jira.mariadb.org/browse/MDEV-26412 -https://jira.mariadb.org/browse/MDEV-26415 -https://jira.mariadb.org/browse/MDEV-26419 -https://jira.mariadb.org/browse/MDEV-26420 -https://jira.mariadb.org/browse/MDEV-26422 -https://jira.mariadb.org/browse/MDEV-26423 -https://jira.mariadb.org/browse/MDEV-28080 -https://jira.mariadb.org/browse/MDEV-28081 -https://jira.mariadb.org/browse/MDEV-28082 -https://jira.mariadb.org/browse/MDEV-28089 -https://jira.mariadb.org/browse/MDEV-28090 -https://jira.mariadb.org/browse/MDEV-28093 -https://jira.mariadb.org/browse/MDEV-28094 -https://jira.mariadb.org/browse/MDEV-28095 -https://jira.mariadb.org/browse/MDEV-28097 -https://jira.mariadb.org/browse/MDEV-28098 -https://jira.mariadb.org/browse/MDEV-28099 -https://jira.o-ran-sc.org/browse/RIC-1001 -https://jira.o-ran-sc.org/browse/RIC-1002 -https://jira.percona.com/browse/PMM-5232 -https://jira.percona.com/browse/PMM-5233 -https://jira.percona.com/browse/PS-5640 -https://jira.percona.com/browse/PS-8294 -https://jira.percona.com/browse/PXB-2142 -https://jira.percona.com/browse/PXC-3117 -https://jira.xwiki.org/browse/XWIKI-18568 -https://jira.xwiki.org/browse/XWIKI-20096 -https://jira.xwiki.org/browse/XWIKI-20324 -https://jira.xwiki.org/browse/XWIKI-20333 -https://jira.xwiki.org/browse/XWIKI-20334 -https://jira.xwiki.org/browse/XWIKI-20335 -https://jira.xwiki.org/browse/XWIKI-20339 -https://jira.xwiki.org/browse/XWIKI-20340 -https://jira.xwiki.org/browse/XWIKI-20341 -https://jira.xwiki.org/browse/XWIKI-20342 -https://jira.xwiki.org/browse/XWIKI-20343 -https://jira.xwiki.org/browse/XWIKI-20348 -https://jira.xwiki.org/browse/XWIKI-20352 -https://jira.xwiki.org/browse/XWIKI-20360 -https://jira.xwiki.org/browse/XWIKI-20364 -https://jira.xwiki.org/browse/XWIKI-20365 -https://jira.xwiki.org/browse/XWIKI-20370 -https://jira.xwiki.org/browse/XWIKI-20371 -https://jithindkurup.tumblr.com/post/165218785974/d-link-dir-600-authentication-bypass-absolute -https://jizen0x01.blogspot.com/2020/06/neon-dashboard-xss.html -https://joel-malwarebenchmark.github.io -https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparser-in-pyanyapi/ -https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/ -https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/ -https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16764-vulnerability-in-django-make-app/ -https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/ -https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13389-Tenda-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13390-Tenda-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13391-Tenda-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13392-Tenda-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13393-Tenda-vulnerability/ -https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13394-Tenda-vulnerability/ -https://joerngermany.github.io/ezviz_vulnerability/ -https://johnjhacking.com/blog/cve-2022-27226/ -https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/ -https://jondow.eu/cve-2020-28707-xss-in-stockdio-historical-chart-plugin-for-wordpress-before-version-281/ -https://jonpalmisc.com/2021/11/22/cve-2021-40531 -https://jordonlovik.wordpress.com/2019/07/06/roomalert-by-avtech-critical-vulnerability-disclosure/ -https://jovanbulck.github.io/files/ccs19-tale.pdf -https://justi.cz/security/2018/11/14/gvisor-lpe.html -https://justinapplegate.me/2023/glinet-CVE-2023-24261/ -https://justinapplegate.me/2023/glinet-CVE-2023-31475/ -https://justinapplegate.me/2023/glinet-CVE-2023-33621/ -https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ -https://jvn.jp/en/jp/JVN41119755/index.html -https://k4m1ll0.com/cve-2021-41653.html -https://k4m1ll0.com/cve-tplink-tlwr840n-euV620-password-reset.html -https://kaganisildak.com/2019/01/17/discovery-of-dll-hijack-on-trend-micro-antivirus-cve-2018-18333/ -https://kaisersource.github.io/dsl-n14u -https://kaisersource.github.io/dsl-n14u-syn -https://kantega-sso.atlassian.net/wiki/spaces/KSE/pages/1226473473/Security+Vulnerability+HTML+injection+Cross-site+scripting+in+SAML+POST+binding+Kantega+SSO+Enterprise -https://karmainsecurity.com/KIS-2023-12 -https://karmainsecurity.com/pocs/CVE-2023-46817.php -https://kb.cert.org/artifacts/cve-2020-9054.html -https://kb.cert.org/vuls/id/166939/ -https://kb.cert.org/vuls/id/253266 -https://kb.cert.org/vuls/id/417980 -https://kb.cert.org/vuls/id/446598 -https://kb.cert.org/vuls/id/498544/ -https://kb.cert.org/vuls/id/605641/ -https://kb.cert.org/vuls/id/636397/ -https://kb.cert.org/vuls/id/660597/ -https://kb.cert.org/vuls/id/763073/ -https://kb.cert.org/vuls/id/962085/ -https://kb.isc.org/article/AA-01235 -https://kb.isc.org/article/AA-01272 -https://kb.netgear.com/000038435/Security-Advisory-for-ReadyNAS-Surveillance-CSRF-Remote-Code-Execution-PSV-2017-0578 -https://kb.netgear.com/000064141/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0520 -https://kcitls.org -https://kcm.trellix.com/corporate/index?page=content&id=SB10412 -https://kcm.trellix.com/corporate/index?page=content&id=SB10415 -https://kcm.trellix.com/corporate/index?page=content&id=SB10416 -https://kcm.trellix.com/corporate/index?page=content&id=SB10417 -https://kcm.trellix.com/corporate/index?page=content&id=SB10418 -https://kde.org/info/security/advisory-20200730-1.txt -https://kde.org/info/security/advisory-20200827-1.txt -https://kebe.com/blog/?p=505 -https://kee02p.github.io/2024/01/13/CVE-2023-52041/ -https://kee02p.github.io/2024/01/13/CVE-2023-52042/ -https://kee02p.github.io/2024/01/13/CVE-2024-22916/ -https://kevinoclam.github.io/blog/2019/07/31/xiunobbs-upload/ -https://khoori.org/posts/cve-2022-0507/ -https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmscsrf.html -https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmssql-injection.html -https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmsxss.html -https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin -https://klikki.fi/adv/wordpress2.html -https://kmkz-web-blog.blogspot.cz/2016/07/advisory-cve-2016-6175.html -https://know.bishopfox.com/advisories/connectwise-control -https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities -https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities -https://know.bishopfox.com/advisories/news/2019/02/openmrs-insecure-object-deserialization -https://know.bishopfox.com/advisories/oob-to-rce-exploitation-of-the-hobbes-functional-interpreter -https://kongxin.gitbook.io/dedecms-5-7-bug/ -https://kongxin.gitbook.io/empirecms/ -https://kongxin.gitbook.io/yzmcms-3-6-bug/ -https://kongxin.gitbook.io/zzcms-8-2-bug/ -https://korelogic.com/Resources/Advisories/KL-001-2017-022.txt -https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-002.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-004.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-005.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-006.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-008.txt -https://korelogic.com/Resources/Advisories/KL-001-2020-009.txt -https://korelogic.com/Resources/Advisories/KL-001-2021-008.txt -https://korelogic.com/Resources/Advisories/KL-001-2021-009.txt -https://korelogic.com/Resources/Advisories/KL-001-2021-010.txt -https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt -https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt -https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt -https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt -https://koz.io/pinning-cve-2016-2402/ -https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309 -https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3311 -https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318 -https://krastanoel.com/cve/2022-29806 -https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/ -https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ -https://kryptera.se/sarbarhet-i-episerver/ -https://ktln2.org/2020/03/29/exploiting-mips-router/ -https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/ -https://labs.bishopfox.com/advisories/immuta-version-2.8.2 -https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 -https://labs.bishopfox.com/advisories/mautic-version-3.2.2 -https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 -https://labs.bishopfox.com/advisories/secureauth-version-9.3 -https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 -https://labs.ingredous.com/2020/07/13/ois-groupedit-xss/ -https://labs.integrity.pt/advisories/cve-2014-1635/ -https://labs.integrity.pt/advisories/cve-2017-10992/ -https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ -https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ -https://labs.nettitude.com/blog/cve-2017-7351-redcap-7-0-0-7-0-10-sql-injection/ -https://labs.nettitude.com/blog/cve-2017-8116-teltonika-router-unauthenticated-remote-code-execution/ -https://labs.nettitude.com/blog/cve-2018-13442-solarwinds-npm-sql-injection/ -https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ -https://labs.nettitude.com/blog/cve-2018-8955-bitdefender-gravityzone-arbitrary-code-execution/ -https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ -https://labs.nettitude.com/blog/cve-2019-16384-85-cyblesoft-thinfinity-virtualui-path-traversal-http-header-injection/ -https://labs.nettitude.com/blog/cve-2019-7315-genie-access-wip3bvaf-ip-camera-directory-traversal/ -https://labs.nettitude.com/blog/cve-2020-14418-madcodehook-library-local-privilege-escalation/ -https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/ -https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/ -https://labs.nettitude.com/blog/cve-2021-44076-cross-site-scripting-xss-in-crushftp/ -https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/ -https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/ -https://labs.nettitude.com/blog/escaping-avast-sandbox-using-single-ioctl-cve-2016-4025/ -https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ -https://labs.nettitude.com/blog/solarwinds-cve-2018-12897-dameware-mini-remote-control-local-seh-buffer-overflow/ -https://labs.secforce.com/posts/progress-moveit-transfer-2020.1-stored-xss-cve-2020-28647/ -https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/ -https://labs.sentinelone.com/hotcobalt-new-cobalt-strike-dos-vulnerability-that-lets-you-halt-operations/ -https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co -https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability -https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss -https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/ -https://labs.yarix.com/2023/02/siri-wi400-xss-on-login-page-cve-2022-48111/ -https://labs.yarix.com/2023/05/vade-secure-gateway-multiple-xss-cve-2023-29712-cve-2023-29713-cve-2023-29714/ -https://labs.yarix.com/2023/07/gis3w-persistent-xss-in-g3wsuite-3-5-cve-2023-29998/ -https://latestpcsolution.wordpress.com/2021/06/05/wpanel4-cms-authenticated-rce/ -https://launchpad.net/bugs/1175661 -https://launchpad.net/bugs/1175691 -https://launchpad.net/bugs/1449062 -https://launchpad.net/bugs/1678676 -https://launchpad.net/bugs/1700573 -https://launchpad.net/bugs/1726372 -https://launchpad.net/bugs/1793458 -https://launchpad.net/bugs/1822013 -https://launchpad.net/bugs/1881982 -https://launchpad.net/bugs/1883840 -https://launchpad.net/bugs/1895688 -https://launchpad.net/bugs/1939733 -https://launchpad.net/bugs/2048114 -https://launchpad.net/bugs/500625 -https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt -https://laworigin.github.io/2018/03/07/CVE-2018-7700-dedecms%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C/ -https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors -https://le0nc.blogspot.com/2021/04/cve-2021-26797-access-control.html -https://lean0x2f.github.io/liquidfiles_advisory -https://learn.snyk.io/lesson/prototype-pollution/#a0a863a5-fd3a-539f-e1ed-a0769f6c6e3b -https://legalhackers.com -https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html -https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html -https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html -https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html -https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html -https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html -https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html -https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html -https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html -https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html -https://leucosite.com/Microsoft-Edge-RCE/ -https://lf.lc/CVE-2016-7063.txt -https://lgnas.gitbook.io/cve-2022-45546/ -https://liaorj.github.io/2023/03/17/admin-reports-date-from-has-sql-injection-vulnerability/#more -https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html -https://limbenjamin.com/articles/simple-student-result-auth-bypass.html -https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html -https://limbenjamin.com/articles/wp-like-button-auth-bypass.html -https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ -https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf -https://liotree.github.io/2023/webid.html -https://lists.archlinux.org/pipermail/pacman-dev/2016-June/021148.html -https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html -https://lists.debian.org/nbd/2022/01/msg00037.html -https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/ -https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html -https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html -https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00001.html -https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html -https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html -https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html -https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html -https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html -https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html -https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html -https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html -https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html -https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html -https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html -https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html -https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00007.html -https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00008.html -https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00009.html -https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html -https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html -https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html -https://lists.manjaro.org/pipermail/manjaro-security/2018-August/000785.html -https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html -https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html -https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html -https://lists.openwall.net/full-disclosure/2015/12/23/13 -https://lists.openwall.net/full-disclosure/2016/01/11/1 -https://lists.openwall.net/full-disclosure/2016/01/11/4 -https://lists.openwall.net/full-disclosure/2016/01/11/5 -https://lists.openwall.net/full-disclosure/2018/01/10/17 -https://lists.openwall.net/full-disclosure/2019/02/05/11 -https://lists.openwall.net/full-disclosure/2019/02/05/12 -https://lists.openwall.net/full-disclosure/2019/02/05/13 -https://lists.openwall.net/full-disclosure/2019/02/05/14 -https://lists.openwall.net/full-disclosure/2019/02/05/15 -https://lists.openwall.net/full-disclosure/2019/02/05/4 -https://lists.openwall.net/full-disclosure/2019/02/05/5 -https://lists.openwall.net/full-disclosure/2019/02/05/6 -https://lists.openwall.net/full-disclosure/2019/02/05/7 -https://lists.openwall.net/full-disclosure/2019/02/05/8 -https://lists.openwall.net/full-disclosure/2019/02/05/9 -https://lists.openwall.net/full-disclosure/2019/04/05/11 -https://lists.openwall.net/full-disclosure/2019/04/05/12 -https://lists.openwall.net/full-disclosure/2019/04/23/1 -https://lists.openwall.net/full-disclosure/2020/08/07/1 -https://lists.openwall.net/full-disclosure/2020/11/17/2 -https://lists.openwall.net/full-disclosure/2021/09/03/7 -https://lists.openwall.net/linux-kernel/2020/03/24/1803 -https://lists.openwall.net/netdev/2017/12/04/40 -https://litios.github.io/2023/01/14/CVE-2023-0341.html -https://lkml.org/lkml/2010/12/1/543 -https://lkml.org/lkml/2011/11/7/340 -https://lkml.org/lkml/2011/11/7/355 -https://lkml.org/lkml/2015/5/13/739 -https://lkml.org/lkml/2017/3/15/485 -https://lkml.org/lkml/2018/11/20/411 -https://lkml.org/lkml/2020/10/16/84 -https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise -https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ -https://logicaltrust.net/blog/2019/11/cherokee.html -https://logicaltrust.net/blog/2019/12/documents.html#authorization -https://logicaltrust.net/blog/2019/12/documents.html#xss -https://logicaltrust.net/blog/2023/08/opnsense.html -https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 -https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/ -https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/ -https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/ -https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/ -https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ -https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/ -https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/ -https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u -https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks@canonical.com -https://lourcode.kr/posts/CVE-2023-29439-Analysis?_s_id=cve -https://lourcode.kr/posts/CVE-2023-32961-Analysis/ -https://lua-users.org/lists/lua-l/2022-02/msg00001.html -https://lua-users.org/lists/lua-l/2022-02/msg00070.html -https://lua-users.org/lists/lua-l/2022-04/msg00009.html -https://lua-users.org/lists/lua-l/2022-05/msg00035.html -https://lucabarile.github.io/Blog/CVE-2022-38604/index.html -https://lucabarile.github.io/Blog/CVE-2022-43293/index.html -https://lucadidomenico.medium.com/fastgate-gpon-cross-site-request-forgery-cve-2020-13620-e279f3fbaee4 -https://lutrasecurity.com/en/articles/cve-2022-36532/ -https://lwn.net/Articles/464824/ -https://lwn.net/Articles/967180/ -https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ -https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html -https://m3n0sd0n4ld.github.io/patoHackventuras/cve-2023-31505 -https://m4dm0e.github.io/2020/12/07/ipeak-cms-sqli.html -https://m4dm0e.github.io/2021/01/04/mikrotik-xss-reflected.html -https://mantisbt.org/bugs/view.php?id=21611 -https://mantisbt.org/bugs/view.php?id=22816 -https://mantisbt.org/bugs/view.php?id=27056 -https://mantisbt.org/bugs/view.php?id=27275 -https://mantisbt.org/bugs/view.php?id=27304 -https://mantisbt.org/bugs/view.php?id=27357 -https://mantisbt.org/bugs/view.php?id=27370 -https://mantisbt.org/bugs/view.php?id=29135 -https://mantisbt.org/bugs/view.php?id=30384 -https://marc.info/?l=git&m=152761328506724&w=2 -https://marc.info/?l=linux-netdev&m=154661373531512&w=2 -https://marc.info/?l=oss-security&m=167879021709955&w=2 -https://marcograss.github.io/security/android/cve/2016/01/15/cve-2015-7292-amazon-kernel-stack-buffer-overflow.html -https://marketplace.atlassian.com/apps/1212129/saml-single-sign-on-sso-confluence?hosting=server&tab=overview -https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html -https://markus-krell.de/itop-template-injection-inside-customer-portal/ -https://mars-cheng.github.io/blog/2018/CVE-2018-11491/ -https://mars-cheng.github.io/blog/2018/CVE-2018-11492/ -https://mars-cheng.github.io/blog/2019/CVE-2018-16656 -https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ -https://matheus-garbelini.github.io/home/post/esp8266-beacon-frame-crash/ -https://matheus-garbelini.github.io/home/post/zero-pmk-installation/ -https://matthias.sdfeu.org/misp-poc.py -https://mattschmidt.net/2020/11/10/dundas-persistent-xss/ -https://mattschmidt.net/2021/04/14/review-board-xss-discovered/ -https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/ -https://mayaseven.com/nimble-directory-traversal-in-nimble-streamer-version-3-0-2-2-to-3-5-4-9/ -https://mcyoloswagham.github.io/linux/ -https://mdsattacks.com/ -https://mechaneus.github.io/CVE-2023-47350.html -https://mechaneus.github.io/CVE-2023-48201.html -https://mechaneus.github.io/CVE-2023-48202.html -https://mechaneus.github.io/CVE-2024-24115.html -https://media.blackhat.com/us-13/US-13-Butterworth-BIOS-Security-Slides.pdf -https://media.ccc.de/v/eh19-157-smart-vacuum-cleaners-as-remote-wiretapping-devices#t=1779 -https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae -https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 -https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62 -https://medium.com/@0x00crash/xss-reflected-in-extreme-management-center-8-4-1-24-cve-2020-13820-c6febe951219 -https://medium.com/@0x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210 -https://medium.com/@0x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a -https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b -https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 -https://medium.com/@1nf0sk/cve-2021-36450-cross-site-scripting-xss-6f5d8d7db740 -https://medium.com/@2839549219ljk/medicine-tracking-system-rce-vulnerability-1f009165b915 -https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4 -https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03 -https://medium.com/@BaYinMin/cve-2017-12480-sandboxie-installer-dll-hijacking-or-unsafe-dll-loading-vulnerability-41ad0562f41 -https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada -https://medium.com/@J03KR/cve-2021-40577-ec96a831ba71 -https://medium.com/@Pablo0xSantiago/cve-2019-14343-ebc120800053 -https://medium.com/@Pablo0xSantiago/cve-2019-14344-tematres-3-0-cross-site-scripting-reflected-xss-3826a23c7fff -https://medium.com/@Pablo0xSantiago/cve-2019-14345-ff6f6d9fd30f -https://medium.com/@Pablo0xSantiago/cve-2019-20178-peel-shopping-ecommerce-shopping-cart-9-2-1-cross-site-request-forgery-17fc49ab5a65 -https://medium.com/@Pablo0xSantiago/cve-2019-20179-so-planning-1-45-sql-injection-5f0050ad81d1 -https://medium.com/@Pablo0xSantiago/cve-2019-20180-tablepress-version-1-9-2-csv-injection-65309fcc8be8 -https://medium.com/@Pablo0xSantiago/cve-2019-20183-employee-records-system-bypass-file-upload-to-rce-ea2653660b34 -https://medium.com/@Pablo0xSantiago/cve-2019-20184-keepass-2-4-1-csv-injection-33f08de3c11a -https://medium.com/@Pablo0xSantiago/cve-2019-20191-oxygen-xml-editor-21-1-1-allows-xxe-216b816f312b -https://medium.com/@Pavel.Step/security-analysis-of-the-smart-box-router-932f86dc8a9e -https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 -https://medium.com/@TheWindowsTwin/vulnerability-in-freesshd-5a0abc147d7a -https://medium.com/@Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47 -https://medium.com/@_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b -https://medium.com/@_sadshade/file-extention-bypass-in-responsive-filemanager-9-5-5-leading-to-rce-authenticated-3290eddc54e7 -https://medium.com/@adurands82/fluent-bit-dos-vulnerability-cve-2024-23722-4e3e74af9d00 -https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52 -https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0 -https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d -https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 -https://medium.com/@alt3kx/a-reflected-xss-in-print-archive-system-v2015-release-2-6-cve-2019-10685-b60763b7768b -https://medium.com/@alt3kx/ektron-content-management-system-cms-9-20-sp2-remote-re-enabling-users-cve-2018-12596-bdf1e3a05158 -https://medium.com/@arall/sitepress-multilingual-cms-wplugin-wpml-4-3-7-b-2-9c9486c13577 -https://medium.com/@arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9 -https://medium.com/@ayaan.saikia91/formula-injection-vulnerability-on-solarwinds-webhelpdesk-12-7-1-37569cd4cdc1 -https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -https://medium.com/@bugsbunnyy1107/the-tell-tale-of-cve-in-oneplus-phones-91e97342a8b5 -https://medium.com/@c4pt41nnn/cve-2019-18396-command-injection-in-technicolor-router-da5dd2134052 -https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70 -https://medium.com/@crhenr/cve-2019-7634-my-first-cve-61db875dc94a -https://medium.com/@cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107 -https://medium.com/@cyberdivision/cve-2021-35343-c5c298cbb2d4 -https://medium.com/@david_42/complex-password-vs-buffer-overflow-and-the-winner-is-decbc56db5e3 -https://medium.com/@deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227 -https://medium.com/@deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad -https://medium.com/@deepsahu1/yealink-vp59-microsoft-teams-phone-lock-bypass-b7fee9dd9c8c -https://medium.com/@devansh3008/csrf-in-icehrm-31-0-0-0s-in-delete-user-endpoint-86a39ecf253f -https://medium.com/@devansh3008/pluck-cms-v4-7-15-csrf-vulnerability-at-delete-page-9fff0309f9c -https://medium.com/@dk50u1/session-fixation-in-zoneminder-up-to-v1-36-12-3c850b1fbbf3 -https://medium.com/@dk50u1/stored-xss-in-zoneminder-up-to-v1-36-12-f26b4bb68c31 -https://medium.com/@dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0 -https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-translatepress-multilingual-wordpress-plugin-effc08eda514 -https://medium.com/@esterling_/cve-2018-7248-enumerating-active-directory-users-via-unauthenticated-manageengine-servicedesk-a1eda2942eb0 -https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 -https://medium.com/@ex.mi/php-best-support-system-v3-0-4-authenticated-persistent-xss-dfe6d4a06f75 -https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 -https://medium.com/@gondaliyajaimin797/cve-2021-3110-75a24943ca5e -https://medium.com/@guravtushar231/reflected-xss-in-admin-panel-7a459dcb9476 -https://medium.com/@guravtushar231/sql-injection-in-login-field-a9073780f7e8 -https://medium.com/@heishou/dfsms-has-sql-injection-vulnerability-e9cfbc375be8 -https://medium.com/@heishou/inventory-management-system-sql-injection-7b955b5707eb -https://medium.com/@heishou/inventory-management-system-sql-injection-f6d67247c7ae -https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-3-d02f0ce78fe3 -https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-4-cadc2983eb5e -https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-5-5a761e5b73b8 -https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-95b95ab64ccc -https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-a98949964faf -https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe -https://medium.com/@hoanhp/0-day-story-2-delete-all-comments-easily-a854e52a7d50 -https://medium.com/@honeyakshat999/hotel-management-system-sql-injection-on-login-page-a1ca87a31176 -https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed -https://medium.com/@igor.lrgomes/cve-2019-11877-credentials-stealing-through-xss-on-pix-link-repeater-9a98c344f58e -https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2 -https://medium.com/@jalee0606/how-i-found-my-first-one-click-account-takeover-via-deeplink-in-ryde-5406010c36d8 -https://medium.com/@janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826 -https://medium.com/@javarmutt/rapid4-local-file-inclusion-0day-151c830ac74a -https://medium.com/@javierolmedo/cve-2018-18922-ticketly-1-0-privilege-escalation-add-admin-4d1b3696f367 -https://medium.com/@jetnipat.tho/cve-2023-24044-10e48ab940d8 -https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911 -https://medium.com/@julianpedrobraga/router-hacking-destrinchando-o-elo-mais-fraco-de-uma-rede-4d0e7fcfbd9e -https://medium.com/@juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607 -https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e -https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124 -https://medium.com/@k43p/cve-2019-17223-stored-html-injection-dolibarr-crm-erp-ad1e064d0ca5 -https://medium.com/@katikitala.sushmitha078/cve-2023-41013-789841dcad91 -https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd -https://medium.com/@lijohnjefferson/multiple-sql-injection-unauthenticated-in-support-board-v-3-3-3-3e9b4214a4f9 -https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 -https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80 -https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f -https://medium.com/@mohnishdhage/sql-injection-vtiger-crm-v7-1-0-cve-2019-11057-245f84fc5c2c -https://medium.com/@muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710 -https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-39598-9598b92da49c -https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-43319-c2ad758ac2bc -https://medium.com/@n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0 -https://medium.com/@nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7 -https://medium.com/@niteshbiwal2011/my-first-cve-2022-30931-e70b9cbecbba -https://medium.com/@niteshsurana/424f0db73129 -https://medium.com/@pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90 -https://medium.com/@pmmali/my-second-cve-2022-30930-4f9aab047518 -https://medium.com/@rohan_pagey/cve-2022-33077-idor-to-change-address-of-any-customer-via-parameter-pollution-in-nopcommerce-4-5-2fa4bc763cc6 -https://medium.com/@rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a868c695 -https://medium.com/@rsantos_14778/csrf-cve-2019-19995-96c1a2dcc182 -https://medium.com/@rsantos_14778/dos-cve-2019-19996-5ad1be772179 -https://medium.com/@rsantos_14778/hijacked-session-cve-2020-9370-255bbd02975a -https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9476-494a08298c6b -https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9477-29d0ca48d4fa -https://medium.com/@rsantos_14778/remote-control-cve-2019-20004-21f77e976715 -https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1 -https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104 -https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae -https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-information-disclosure-en-faf1a9a13f3f -https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac -https://medium.com/@sarapremashish/osticket-1-10-1-unauthenticated-stored-xss-allows-an-attacker-to-gain-admin-privileges-6a0348761a3a -https://medium.com/@shanunirwan/cve-2024-30979-stored-cross-site-scripting-xss-in-cyber-cafe-management-system-project-ccms-1-44b10f50817b -https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7 -https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb -https://medium.com/@shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062 -https://medium.com/@shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510 -https://medium.com/@shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254 -https://medium.com/@shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23 -https://medium.com/@shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6 -https://medium.com/@shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761 -https://medium.com/@shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3 -https://medium.com/@shiva.infocop/authentication-bypass-park-ticketing-management-system-phpgurukul-427045159c05 -https://medium.com/@shiva.infocop/stored-xss-found-in-small-crm-phpgurukul-7890ea3c04df -https://medium.com/@shiva.infocop/stored-xss-park-ticketing-management-system-phpgurukul-893583dc2e20 -https://medium.com/@shrutukapoor25/cve-2022-35203-2372a0728279 -https://medium.com/@shubhamvpandey/xss-found-in-nokia-g-2425g-a-home-wifi-router-f4fae083ed97 -https://medium.com/@thebinary0x1/safervpn-for-windows-arbitrary-file-overwrite-dos-bdc88fdb5ead -https://medium.com/@tobiasgyoerfi/ea-origin-10-5-55-33574-createdirectory-arbitrary-dacl-write-privilege-escalation-cve-2019-19741-5f18adfabb27 -https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d -https://medium.com/@tomerp_77017/wondershell-a82372914f26 -https://medium.com/@tomhulme_74888/persistent-cross-site-scripting-leading-to-full-account-takeover-on-galaxkey-v5-6-11-4-8bf96be35b54 -https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 -https://medium.com/@venkatajayaram.yalla/whitesource-log-injection-vulnerability-cve-2020-5304-e543b7943c2b -https://medium.com/@victor_14768/replay-attacks-en-autos-206481dcfee1 -https://medium.com/@vificatem/cve-2023-39683-dom-xss-on-json-source-code-panel-in-zalify-easy-email-3fa08f3e0d49 -https://medium.com/@waadalbyalii5/sql-injection-in-wsdl-file-c66fa00042f5 -https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433 -https://medium.com/@windsormoreira/ocs-inventory-2-9-1-cross-site-scripting-xss-cve-2021-46355-a88d72606b7e -https://medium.com/@windsormoreira/samsung-printer-scx-6x55x-improper-access-control-cve-2021-42913-bd50837e5e9a -https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc -https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0 -https://medium.com/iotsploit/faleemi-fsc-880-multiple-security-vulnerabilities-ed1d132c2cce -https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8 -https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa -https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e -https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51 -https://medium.com/nightst0rm/t%E1%BA%A3n-m%E1%BA%A1n-v%E1%BB%81-l%E1%BB%97-h%E1%BB%95ng-trong-atm-diebold-f1040a70f2c9 -https://medium.com/section-9-lab/abusing-ios-url-handlers-on-messages-96979e8b12f5 -https://medium.com/stolabs/path-traversal-in-3cx-7421a8ffdb7a -https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b -https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee -https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 -https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee -https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e -https://melapress.com/support/kb/wp-activity-log-plugin-changelog/ -https://meltdownattack.com/ -https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/ -https://members.backbox.org/fastgate-gpon-cross-site-request-forgery/ -https://members.backbox.org/osticket-sql-injection/ -https://members.backbox.org/saet-tebe-small-supervisor-multiple-vulnerabilities/ -https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes -https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013 -https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014 -https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 -https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-... -https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes -https://metalamin.github.io/MachForm-not-0-day-EN/ -https://metalamin.github.io/Quick-Chat-SQLi-EN/ -https://metamorfosec.com/Files/Advisories/METS-2018-001-A_XSS_Vulnerability_in_OJS_3.0.0_to_3.1.1-1.txt -https://metamorfosec.com/Files/Advisories/METS-2018-002-A_XSS_Vulnerability_in_OMP_1.2.0_to_3.1.1-2.txt -https://metamorfosec.com/Files/Advisories/METS-2018-003-A_XSS_Vulnerability_in_German_Spelling_Dictionary_1.3.txt -https://metamorfosec.com/Files/Advisories/METS-2018-004-A_XSS_Vulnerability_in_Jenzabar_8.2.1_to_9.2.0.txt -https://metamorfosec.com/Files/Advisories/METS-2019-001-Multiple_XSS_Vulnerabilities_in_ProfileDesign_CMS_v6.0.2.5.txt -https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_Vulnerabilities_in_the_MyThemeShop_Launcher_plugin_v1.0.8_for_WordPress.txt -https://metamorfosec.com/Files/Advisories/METS-2019-003-Denial_of_Service_in_PS_PHPCaptcha_WP_before_v1.2.0.txt -https://metamorfosec.com/Files/Advisories/METS-2019-004-A_XSS_Vulnerability_in_Parallax_Scroll_plugin_before_v2.1_for_WordPress.txt -https://metamorfosec.com/Files/Advisories/METS-2019-005-A_division_by_zero_in_Hoteldruid_before_v2.3.1.txt -https://metamorfosec.com/Files/Advisories/METS-2019-006-An_Invalid_Arguments_in_Hoteldruid_before_v2.3.1.txt -https://metamorfosec.com/Files/Advisories/METS-2019-007-A_SQL_Injection_in_HotelDruid_before_v2.3.1.txt -https://metamorfosec.com/Files/Advisories/METS-2019-008-A_SQL_Injection_in_HotelDruid_before_v2.3.1.txt -https://metamorfosec.com/Files/Advisories/METS-2020-001-A_XSS_Vulnerability_in_Sell_Media_Plugin_v2.4.1_for_WordPress.txt -https://metamorfosec.com/Files/Advisories/METS-2020-002-A_Stored_XSS_Vulnerability_in_Galileo_CMS_v0.042.txt -https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/ -https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/ -https://minerva.crocs.fi.muni.cz/ -https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62 -https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ -https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html -https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ -https://momo5502.com/blog/?p=34 -https://moodle.org/mod/forum/discuss.php?d=198623 -https://moodle.org/mod/forum/discuss.php?d=349419 -https://mouha.be/sha-3-buffer-overflow/ -https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/ -https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html -https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ -https://murat.one/?p=118 -https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/ -https://mustafakemalcan.com/cyberark-epm-file-block-bypass-cve-2018-14894/ -https://mycvee.blogspot.com/p/blog-page.html -https://mycvee.blogspot.com/p/csrf.html -https://mycvee.blogspot.com/p/cve-2019-17576.html -https://mycvee.blogspot.com/p/cve-2019-17578.html -https://mycvee.blogspot.com/p/xss1.html -https://mycvee.blogspot.com/p/xss2.html -https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ -https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ -https://n4nj0.github.io/advisories/ibm-infosphere-java-deserialization/ -https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ -https://n4nj0.github.io/advisories/oracle-glassfish-reflected-xss/ -https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ -https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ -https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/ -https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i/ -https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-i/ -https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ -https://n4nj0.github.io/advisories/wowza-streaming-engine-i/ -https://nablarch.atlassian.net/browse/NAB-313 -https://nablarch.atlassian.net/projects/NAB/issues/NAB-295 -https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-dios-7689b1d30f5f -https://nandynarwhals.org/CVE-2017-14994/ -https://nathandavison.com/blog/haproxy-http-request-smuggling -https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt -https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability -https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ -https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/ -https://nealpoole.com/blog/2013/07/code-execution-via-f5-networks-java-applet/ -https://nealpoole.com/blog/2013/07/codeigniter-21-xss-clean-filter-bypass/ -https://neetech18.blogspot.com/2019/03/cross-site-request-forgery-smartvista.html -https://neetech18.blogspot.com/2019/03/error-based-sql-injection-vulnerability.html -https://neetech18.blogspot.com/2019/03/incorrect-access-control-smart-vista.html -https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software.html -https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html -https://neetech18.blogspot.com/2019/03/reflected-xss-vulnerability-in-polaris.html -https://neetech18.blogspot.com/2019/03/session-fixation-smart-vista-svfe-2.html -https://neetech18.blogspot.in/2018/02/stored-xss-vulnerability-in-php-scripts.html -https://neetech18.blogspot.in/2018/03/stored-xss-vulnerability-in-bookme_17.html -https://neetech18.blogspot.in/2018/03/stored-xss-vulnerability-in-hot-scripts.html -https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/ -https://neroteam.com/blog/f-logic-datacube3-vulnerability-report -https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing -https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/ -https://news.ycombinator.com/item?id=26185005 -https://news.ycombinator.com/item?id=26757760 -https://news.ycombinator.com/item?id=26762170 -https://news.ycombinator.com/item?id=27833752 -https://news.ycombinator.com/item?id=30804702 -https://news.ycombinator.com/item?id=31070256 -https://news.ycombinator.com/item?id=34711565 -https://news.ycombinator.com/item?id=35879660 -https://news.ycombinator.com/item?id=37054862 -https://news.ycombinator.com/item?id=37478403 -https://news.ycombinator.com/item?id=37663159 -https://news.ycombinator.com/item?id=39828424 -https://news.ycombinator.com/item?id=39895344 -https://news.ycombinator.com/item?id=40279632 -https://news.ycombinator.com/item?id=7601973 -https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html -https://nhattruong.blog/2021/05/22/cve-2021-28423-teachers-record-management-system-1-0-searchdata-error-based-sql-injection-authenticated/ -https://nhattruong.blog/2021/05/22/cve-2021-28424-teachers-record-management-system-1-0-email-stored-cross-site-scripting-xss-vulnerability-authenticated/ -https://nileshsapariya.blogspot.ae/2018/03/csrf-to-xss-open-auditit-professional-21.html -https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html -https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html -https://nitipoom-jar.github.io/CVE-2023-47488/ -https://nitipoom-jar.github.io/CVE-2023-47489/ -https://nitipoom-jar.github.io/CVE-2023-48028/ -https://nitipoom-jar.github.io/CVE-2023-48029/ -https://nitipoom-jar.github.io/CVE-2023-48031/ -https://nitipoom-jar.github.io/CVE-2023-48197/ -https://nitipoom-jar.github.io/CVE-2023-48198 -https://nitipoom-jar.github.io/CVE-2023-48199/ -https://nitipoom-jar.github.io/CVE-2023-48200/ -https://nitipoom-jar.github.io/CVE-2023-48866/ -https://nitipoom-jar.github.io/CVE-2023-49453/ -https://nitipoom-jar.github.io/CVE-2024-24336/ -https://nitipoom-jar.github.io/CVE-2024-24337/ -https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r -https://nitroteam.kz/index.php?action=researches&slug=librehealth_r -https://nobugescapes.com/blog/creating-a-new-user-with-admin-privilege/ -https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/ -https://nodebb.org/bounty/ -https://northwave-cybersecurity.com/vulnerability-notice/arbitrary-kernel-function-call-in-ivanti-secure-access-client -https://northwave-cybersecurity.com/vulnerability-notice/denial-of-service-in-ivanti-secure-access-client-driver -https://noskill1337.github.io/homematic-ccu3-remote-code-execution -https://noskill1337.github.io/homematic-ccu3-session-fixation -https://noskill1337.github.io/homematic-with-cux-daemon-local-file-inclusion -https://noskill1337.github.io/homematic-with-cux-daemon-remote-code-execution -https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html -https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html -https://notnnor.github.io/research/2021/03/16/weak-password-recovery-mechanism-in-invoiceplane.html -https://notnnor.github.io/research/2021/03/17/full-path-discloure-in-invoiceplane.html -https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ -https://novysodope.github.io/2021/10/29/64/ -https://nullku7.github.io/stuff/exploit/dahua/2017/03/09/dahua-nvr-authbypass.html -https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1 -https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1 -https://nwsec.de/NWSSA-001-2023.txt -https://nwsec.de/NWSSA-002-2023.txt -https://nxnjz.net/2022/08/cve-2021-42052-full-disclosure/ -https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/ -https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/ -https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/ -https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/ -https://okankurtulus.com.tr/2023/06/21/food-ordering-system-v1-0-authenticated-sql-injection/ -https://okankurtulus.com.tr/2023/06/26/cms-made-simple-v2-2-17-file-upload-remote-code-execution-rce-authenticated/ -https://okankurtulus.com.tr/2023/06/27/cms-made-simple-v2-2-17-stored-cross-site-scripting-xss-authenticated/ -https://okankurtulus.com.tr/2023/07/24/october-cms-v3-4-4-stored-cross-site-scripting-xss-authenticated/ -https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/ -https://opcfoundation.org -https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf -https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf -https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf -https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/ -https://opcfoundation.org/security-bulletins/ -https://opcfoundation.org/security/ -https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf -https://openwrt.org/advisory/2020-01-13-1 -https://opnsec.com/2017/10/cve-2016-9263-unpatched-xsf-vulnerability-in-wordpress/ -https://osgeo-org.atlassian.net/browse/GEOS-10229 -https://osgeo-org.atlassian.net/browse/GEOS-10229?focusedCommentId=83508 -https://osgeo-org.atlassian.net/browse/GEOS-11148 -https://osgeo-org.atlassian.net/browse/GEOS-11149 -https://osgeo-org.atlassian.net/browse/GEOS-11152 -https://osgeo-org.atlassian.net/browse/GEOS-11153 -https://osgeo-org.atlassian.net/browse/GEOS-11154 -https://osgeo-org.atlassian.net/browse/GEOS-11155 -https://osgeo-org.atlassian.net/browse/GEOS-11176 -https://osgeo-org.atlassian.net/browse/GEOS-11213 -https://osm.etsi.org/ -https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure -https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities -https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ -https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -https://owasp.org/www-community/attacks/csrf -https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection -https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload -https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30 -https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion -https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom -https://oxnan.com/posts/Snapcast_jsonrpc_rce -https://oxnan.com/posts/WifiBasic_security_5g_DoS -https://oxnan.com/posts/WifiBasic_security_DoS -https://oxnan.com/posts/WifiBasic_ssid_5g_DoS -https://oxnan.com/posts/WifiBasic_wepauth_5g_DoS -https://oxnan.com/posts/WifiBasic_wepauth_DoS -https://oxnan.com/posts/WifiBasic_wepkey1_5g_DoS -https://oxnan.com/posts/WifiBasic_wepkey1_DoS -https://oxnan.com/posts/WifiBasic_wepkey2_5g_DoS -https://oxnan.com/posts/WifiBasic_wepkey2_DoS -https://oxnan.com/posts/WifiBasic_wepkey3_5g_DoS -https://oxnan.com/posts/WifiBasic_wepkey3_DoS -https://oxnan.com/posts/WifiBasic_wepkey4_5g_DoS -https://oxnan.com/posts/WifiBasic_wepkey4_DoS -https://oxnan.com/posts/WifiBasic_wepkey_5g_DoS -https://oxnan.com/posts/WifiBasic_wepkey_DoS -https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS -https://oxnan.com/posts/WifiBasic_wrlEn_DoS -https://oxnan.com/posts/WriteFacMac-Command-Injection -https://packetstormsecurity.com -https://packetstormsecurity.com/2301-exploits/listserv17-idor.txt -https://packetstormsecurity.com/2301-exploits/listserv17-xss.txt -https://packetstormsecurity.com/2307-exploits/mojobox14-replay.txt -https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt -https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt -https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html -https://packetstormsecurity.com/files/101835/Joomla-1.6.0-SQL-Injection.html -https://packetstormsecurity.com/files/102745/VSFTPD-2.3.4-Backdoor-Command-Execution.html -https://packetstormsecurity.com/files/105054/Secunia-Security-Advisory-46005.html -https://packetstormsecurity.com/files/105853/Secunia-Security-Advisory-46387.html -https://packetstormsecurity.com/files/107082/Tiki-Wiki-CMS-Groupware-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html -https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html -https://packetstormsecurity.com/files/111185/Wolf-CMS-0.75-Persistent-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/112323/WebCalendar-1.2.4-Pre-Auth-Remote-Code-Injection.html -https://packetstormsecurity.com/files/112332/WebCalendar-1.2.4-Remote-Code-Execution.html -https://packetstormsecurity.com/files/115927/Chamilo-1.8.8.4-XSS-File-Deletion.html -https://packetstormsecurity.com/files/117391/Ezhometech-EzServer-7.0-Remote-Heap-Corruption.html -https://packetstormsecurity.com/files/118355/D-Link-DSR-250N-Backdoor.html -https://packetstormsecurity.com/files/118491/Safend-Data-Protector-3.4.5586.9772-Privilege-Escalation.html -https://packetstormsecurity.com/files/118854/Netgear-WGR614-Credential-Information.html -https://packetstormsecurity.com/files/119113/C-Panel-WHM-11.34.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/119461/OrangeHRM-2.7.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/120643/Viscosity-setuid-set-ViscosityHelper-Privilege-Escalation.html -https://packetstormsecurity.com/files/121128/TinyWebGallery-1.8.9-Path-Disclosure.html -https://packetstormsecurity.com/files/121391/public_phpInjection-smf204.txt -https://packetstormsecurity.com/files/121917/Xpient-POS-Iris-3.8-Cash-Drawer-Operation-Remote-Trigger.html -https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html -https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html -https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html -https://packetstormsecurity.com/files/123049/PWStore-2010.8.30.0-Cross-Site-Scripting-Denial-Of-Service.html -https://packetstormsecurity.com/files/123557/Uebimiau-2.7.11-Cross-Site-Scripting-Open-Redirection.html -https://packetstormsecurity.com/files/124149/WordPress-Elemin-Shell-Upload.html -https://packetstormsecurity.com/files/125086 -https://packetstormsecurity.com/files/125388 -https://packetstormsecurity.com/files/125682 -https://packetstormsecurity.com/files/125780 -https://packetstormsecurity.com/files/126741/BSS-Continuity-CMS-4.2.22640.0-Denial-Of-Service.html -https://packetstormsecurity.com/files/127786/Vembu-Backup-Disaster-Recovery-6.1-Follow-Up.html -https://packetstormsecurity.com/files/128053/Sierra-Library-Services-Platform-1.2_3-XSS-Enumeration.html -https://packetstormsecurity.com/files/128186/ -https://packetstormsecurity.com/files/128188/ -https://packetstormsecurity.com/files/128310 -https://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html -https://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html -https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html -https://packetstormsecurity.com/files/128997/Drupal-7-Videowhisper-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/129023 -https://packetstormsecurity.com/files/129466/SGI-Tempo-Database-Password-Disclosure.html -https://packetstormsecurity.com/files/129467/SGI-Tempo-Database-Exposure.html -https://packetstormsecurity.com/files/129941/Apache-Qpid-0.30-Denial-Of-Service.html -https://packetstormsecurity.com/files/131657/ -https://packetstormsecurity.com/files/131798/ -https://packetstormsecurity.com/files/131814/ -https://packetstormsecurity.com/files/131957/ -https://packetstormsecurity.com/files/132042/ -https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html -https://packetstormsecurity.com/files/132124/ -https://packetstormsecurity.com/files/132279/ -https://packetstormsecurity.com/files/132402/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html -https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html -https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/132590/ -https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html -https://packetstormsecurity.com/files/132656/wpgdbbpress-lfi.txt -https://packetstormsecurity.com/files/132660/Western-Digital-Arkeia-11.0.13-Remote-Code-Execution.html -https://packetstormsecurity.com/files/132715/phpVibe-Stored-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/132910/ -https://packetstormsecurity.com/files/133362/ -https://packetstormsecurity.com/files/133480/ -https://packetstormsecurity.com/files/133593/ -https://packetstormsecurity.com/files/133594/ -https://packetstormsecurity.com/files/133688/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html -https://packetstormsecurity.com/files/133689/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html -https://packetstormsecurity.com/files/133711/Junos-Pulse-Secure-Meeting-8.0.5-Access-Bypass.html -https://packetstormsecurity.com/files/133778/ -https://packetstormsecurity.com/files/134240/ -https://packetstormsecurity.com/files/134288/Arris-TG1682G-Modem-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/135061/WordPress-NextGEN-Gallery-2.1.10-Shell-Upload.html -https://packetstormsecurity.com/files/135114/WordPress-NextGEN-Gallery-2.1.15-Cross-Site-Scripting-Path-Traversal.html -https://packetstormsecurity.com/files/135125/BulletProof-Security-.52.4-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/135194/Netgear-1.0.0.24-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/135215/Netgear-1.0.0.24-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/135216/Netgear-1.0.0.24-Bypass-Improper-Session-Management.html -https://packetstormsecurity.com/files/135899/libquicktime-1.2.4-Integer-Overflow.html -https://packetstormsecurity.com/files/136109/ATutor-LMS-2.2.1-CSRF-Remote-Code-Execution.html -https://packetstormsecurity.com/files/136445/ -https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html -https://packetstormsecurity.com/files/136646 -https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html -https://packetstormsecurity.com/files/136762/Exponent-CMS-2.3.5-File-Upload-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/136887/ -https://packetstormsecurity.com/files/137121/Magento-Unauthenticated-Arbitrary-File-Write.html -https://packetstormsecurity.com/files/137255/Paessler-PRTG-Network-Monitor-14.4.12.3282-XXE-Injection.html -https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html -https://packetstormsecurity.com/files/137312/Magento-2.0.6-Unserialize-Remote-Code-Execution.html -https://packetstormsecurity.com/files/137343/Valve-Steam-3.42.16.13-Local-Privilege-Escalation.html -https://packetstormsecurity.com/files/137427/ServiceNow-ITSM-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/137648/JIRA-Artezio-Board-1.4-Cross-Site-Scripting-Information-Disclosure.html -https://packetstormsecurity.com/files/137649/JIRA-Mail.ru-Calendar-2.4.2.50_JIRA6-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/137742/Putty-Beta-0.67-DLL-Hijacking.html -https://packetstormsecurity.com/files/138082/Avaya-VOSS-4.1.0.0-SPB-Traffic-Traversal.html -https://packetstormsecurity.com/files/138192/ -https://packetstormsecurity.com/files/138881/TP-Link-Archer-CR-700-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/138928/Ubiquiti-UniFi-AP-AC-Lite-5.2.7-Improper-Access-Control.html -https://packetstormsecurity.com/files/138948/wampserver306-insecure.txt -https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html -https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html -https://packetstormsecurity.com/files/139658/Nero-7.10.1.0-Privilege-Escalation.html -https://packetstormsecurity.com/files/139696/ratemephp-xss.txt -https://packetstormsecurity.com/files/139844/Multitech-RightFax-Faxfinder-Credential-Disclosure.html -https://packetstormsecurity.com/files/140121/XFINITY-Gateway-Technicolor-DPC3941T-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/140141/Joomla-DT-Register-SQL-Injection.html -https://packetstormsecurity.com/files/140279/Wampserver-3.0.6-Privilege-Escalation.html -https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html -https://packetstormsecurity.com/files/140365/Audacity-2.1.2-DLL-Hijacking.html -https://packetstormsecurity.com/files/140366/Akamai-NetSession-1.9.3.1-DLL-Hijacking.html -https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html -https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html -https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html -https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt -https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/141693/digisol-escalate.txt -https://packetstormsecurity.com/files/142022/ManageEngine-Applications-Manager-12-13-XSS-SQL-Injection-Code-Execution.html -https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html -https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt -https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html -https://packetstormsecurity.com/files/142258/Exponent-CMS-2.4.1-SQL-Injection.html -https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html -https://packetstormsecurity.com/files/142406/xampp-dllhijack.txt -https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html -https://packetstormsecurity.com/files/142587/Kodak-InSite-8.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-Execution.html -https://packetstormsecurity.com/files/142799/DNSTracer-1.8.1-Buffer-Overflow.html -https://packetstormsecurity.com/files/142851/Craft-CMS-2.6-Cross-Site-Scripting-File-Upload.html -https://packetstormsecurity.com/files/142862/OTRS-Install-Dialog-Disclosure.html -https://packetstormsecurity.com/files/142944/SimpleCE-2.3.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/142952/SAP-Successfactors-b1702p5e.1190658-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/143116/WordPress-FormCraft-Basic-1.0.5-SQL-Injection.html -https://packetstormsecurity.com/files/143138/phpmailer-xss.txt -https://packetstormsecurity.com/files/143307/Rise-Ultimate-Project-Manager-1.8-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/143328/DataTaker-DT80-dEX-1.50.012-Sensitive-Configuration-Exposure.html -https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html -https://packetstormsecurity.com/files/143357/Sitecore-CMS-8.2-Cross-Site-Scripting-File-Disclosure.html -https://packetstormsecurity.com/files/143383/dotcms411-shell.txt -https://packetstormsecurity.com/files/143542/Flash-Slideshow-Maker-Professional-XSS-Content-Forgery-Redirect.html -https://packetstormsecurity.com/files/143657/Axis-2100-Network-Camera-2.43-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/143666/WordPress-GamePlan-Event-And-Gym-Fitness-Theme-1.5.13.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/143725/nZEDb-0.7.3.3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html -https://packetstormsecurity.com/files/143983/libgedit.a-3.22.1-Denial-Of-Service.html -https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html -https://packetstormsecurity.com/files/144082/Job-Board-Software-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144261/WordPress-2kb-Amazon-Affiliates-Store-2.1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144280/phpMyFAQ-2.9.8-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-Authentication.html -https://packetstormsecurity.com/files/144428/Adult-Script-Pro-2.2.4-SQL-Injection.html -https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html -https://packetstormsecurity.com/files/144430/D-Park-Pro-Domain-Parking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144431/Ingenious-School-Management-System-2.3.0-Arbitrary-File-Upload.html -https://packetstormsecurity.com/files/144432/iProject-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144433/iStock-Management-System-1.0-Arbitrary-File-Upload.html -https://packetstormsecurity.com/files/144434/iTech-Gigs-Script-1.21-SQL-Injection.html -https://packetstormsecurity.com/files/144435/Joomla-NS-Download-Shop-2.2.6-SQL-Injection.html -https://packetstormsecurity.com/files/144436/Joomla-Zh-YandexMap-6.1.1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144437/Mailing-List-Manager-Pro-3.0-SQL-Injection.html -https://packetstormsecurity.com/files/144438/MyBuilder-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144439/PG-All-Share-Video-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144440/PHP-CityPortal-2.0-SQL-Injection.html -https://packetstormsecurity.com/files/144441/Same-Sex-Dating-Software-Pro-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144442/SoftDatepro-Dating-Social-Network-1.3-SQL-Injection.html -https://packetstormsecurity.com/files/144443/Sokial-Social-Network-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/144444/tPanel-2009-SQL-Injection.html -https://packetstormsecurity.com/files/144445/Vastal-I-Tech-Dating-Zone-0.9.9-SQL-Injection.html -https://packetstormsecurity.com/files/144446/ZeeBuddy-2x-SQL-Injection.html -https://packetstormsecurity.com/files/144456/ConverTo-Video-Downloader-And-Converter-1.4.1-Arbitrary-File-Download.html -https://packetstormsecurity.com/files/144558/ASX-To-MP3-Converter-Stack-Overflow.html -https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144583/WordPress-PopCash.Net-Publisher-Code-Integration-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144586/Sync-Breeze-Enterprise-10.1.16-SEH-Overflow.html -https://packetstormsecurity.com/files/144587/OctoberCMS-1.0.425-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144603/phpMyFAQ-2.9.8-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144747/osticket1101-shell.txt -https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html -https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144805/MitraStar-DSL-100HN-T1-GPT-2541GNAC-Privilege-Escalation.html -https://packetstormsecurity.com/files/144914/WordPress-Duplicator-Migration-1.2.28-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144921/WordPress-Ultimate-Instagram-Feed-1.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144965/KirbyCMS-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/144978/WordPress-Affiliate-Ads-For-Clickbank-Products-1.3-XSS.html -https://packetstormsecurity.com/files/145044/WordPress-amtyThumb-8.1.3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145059/WordPress-In-Link-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145060/wpemagmc10-xss.txt -https://packetstormsecurity.com/files/145080/WordPress-Yoast-SEO-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145095/communigatepro-xss.txt -https://packetstormsecurity.com/files/145181/SocuSoft-Co.-Photo-2-Video-Converter-8.0.0-Code-Execution-DoS.html -https://packetstormsecurity.com/files/145202/Amazon-Audible-DLL-Hijacking.html -https://packetstormsecurity.com/files/145217/WordPress-Smart-Marketing-SMS-And-Newsletters-Forms-1.1.1-XSS.html -https://packetstormsecurity.com/files/145218/WordPress-Z-URL-Preview-1.6.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145222/WordPress-WP-Mailster-1.5.4.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145246/DomainSale-PHP-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145247/Simple-Chatting-System-1.0.0-Arbitrary-File-Upload.html -https://packetstormsecurity.com/files/145248/Website-Auction-Marketplace-2.0.5-SQL-Injection.html -https://packetstormsecurity.com/files/145249/Realestate-Crowdfunding-Script-2.7.2-SQL-Injection.html -https://packetstormsecurity.com/files/145250/FS-Thumbtack-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145251/FS-Stackoverflow-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145252/FS-Shutterstock-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145253/FS-Quibids-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145254/FS-Olx-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145255/FS-Monster-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145289/FS-Makemytrip-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145290/Nearbuy-Clone-Script-3.2-SQL-Injection.html -https://packetstormsecurity.com/files/145291/Cab-Booking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145292/Co-work-Space-Search-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145293/CMS-Auditor-Website-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145294/Child-Care-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145296/FS-Trademe-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145297/FS-Expedia-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145298/FS-Foodpanda-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145299/Advance-B2B-Script-2.1.3-SQL-Injection.html -https://packetstormsecurity.com/files/145300/Advance-Online-Learning-Management-Script-3.1-SQL-Injection.html -https://packetstormsecurity.com/files/145301/FS-Crowdfunding-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145302/FS-Care-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145303/FS-Amazon-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145304/Affiliate-MLM-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145305/E-commerce-MLM-Software-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145306/Event-Search-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145308/FS-Indiamart-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145309/Beauty-Parlour-Booking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145310/Consumer-Complaints-Clone-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145311/Entrepreneur-Job-Portal-Script-2.0.6-SQL-Injection.html -https://packetstormsecurity.com/files/145312/Doctor-Search-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145313/FS-IMDB-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145314/FS-Grubhub-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145315/FS-Groupon-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145316/FS-Gigs-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145317/FS-Freelancer-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145318/Basic-B2B-Script-2.0.8-SQL-Injection.html -https://packetstormsecurity.com/files/145319/FS-Ebay-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145320/Facebook-Clone-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145321/Food-Order-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145322/Yoga-Class-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145323/Freelance-Website-Script-2.0.6-SQL-Injection.html -https://packetstormsecurity.com/files/145324/Hot-Scripts-Clone-3.1-SQL-Injection.html -https://packetstormsecurity.com/files/145325/Foodspotting-Clone-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145326/Kickstarter-Clone-Script-2.0-SQL-Injection.html -https://packetstormsecurity.com/files/145327/Secure-E-commerce-Script-2.0.1-SQL-Injection.html -https://packetstormsecurity.com/files/145328/Laundry-Booking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145329/Online-Exam-Test-Application-Script-1.6-SQL-Injection.html -https://packetstormsecurity.com/files/145330/Laundry-Booking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145331/Multivendor-Penny-Auction-Clone-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145332/Lawyer-Search-Script-1.1-SQL-Injection.html -https://packetstormsecurity.com/files/145333/Multivendor-Penny-Auction-Clone-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145334/Online-Exam-Test-Application-Script-1.6-SQL-Injection.html -https://packetstormsecurity.com/files/145335/Opensource-Classified-Ads-Script-3.2-SQL-Injection.html -https://packetstormsecurity.com/files/145336/PHP-Multivendor-Ecommerce-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145337/Professional-Service-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html -https://packetstormsecurity.com/files/145339/Readymade-Video-Sharing-Script-3.2-SQL-Injection.html -https://packetstormsecurity.com/files/145340/Responsive-Realestate-Script-3.2-SQL-Injection.html -https://packetstormsecurity.com/files/145341/Multireligion-Responsive-Matrimonial-4.7.2-SQL-Injection.html -https://packetstormsecurity.com/files/145342/Responsive-Events-And-Movie-Ticket-Booking-Script-3.2.1-SQL-Injection.html -https://packetstormsecurity.com/files/145343/Multiplex-Movie-Theater-Booking-Script-3.1.5-SQL-Injection.html -https://packetstormsecurity.com/files/145344/Single-Theater-Booking-Script-3.2.1-SQL-Injection.html -https://packetstormsecurity.com/files/145345/Advanced-Real-Estate-Script-4.0.7-SQL-Injection.html -https://packetstormsecurity.com/files/145346/Entrepreneur-Bus-Booking-Script-3.0.4-SQL-Injection.html -https://packetstormsecurity.com/files/145347/MLM-Forex-Market-Plan-Script-2.0.4-SQL-Injection.html -https://packetstormsecurity.com/files/145348/MLM-Forced-Matrix-2.0.9-SQL-Injection.html -https://packetstormsecurity.com/files/145349/Car-Rental-Script-2.0.4-SQL-Injection.html -https://packetstormsecurity.com/files/145350/Groupon-Clone-Script-3.01-SQL-Injection.html -https://packetstormsecurity.com/files/145351/Muslim-Matrimonial-Script-3.02-SQL-Injection.html -https://packetstormsecurity.com/files/145352/Advanced-World-Database-2.0.5-SQL-Injection.html -https://packetstormsecurity.com/files/145353/Resume-Clone-Script-2.0.5-SQL-Injection.html -https://packetstormsecurity.com/files/145354/Basic-Job-Site-Script-2.0.5-SQL-Injection.html -https://packetstormsecurity.com/files/145438/Readymade-Video-Sharing-Script-3.2-HTML-Injection.html -https://packetstormsecurity.com/files/145439/Paid-To-Read-Script-2.0.5-SQL-Injection.html -https://packetstormsecurity.com/files/145444/FS-Lynda-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145445/Bus-Booking-Script-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/145459/WordPress-Sagepay-Server-Gateway-For-WooCommerce-1.0.7-XSS.html -https://packetstormsecurity.com/files/145464/WordPress-Share-This-Image-1.03-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145469/Clockwork-SMS-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145511/BEIMS-ContractorWeb-5.18.0.0-SQL-Injection.html -https://packetstormsecurity.com/files/145513/Netis-WF2419-HTML-Injection.html -https://packetstormsecurity.com/files/145530/GetGo-Download-Manager-5.3.0.2712-Buffer-Overflow.html -https://packetstormsecurity.com/files/145572/NetWin-SurgeFTP-23f2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/145724/communigatepro62-spoof -https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html -https://packetstormsecurity.com/files/146032/Netis-WF2419-3.2.41381-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/146117/netiswf2419-xsrf.txt -https://packetstormsecurity.com/files/146128/TSiteBuilder-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/146130/Multilanguage-Real-Estate-MLM-Script-3.0-SQL-Injection.html -https://packetstormsecurity.com/files/146131/Task-Rabbit-Clone-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/146135/Joomla-JS-Support-Ticket-1.1.0-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/146136/Vastal-I-Tech-Facebook-Clone-2.9.9-SQL-Injection.html -https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html -https://packetstormsecurity.com/files/146174/WordPress-Propertyhive-1.4.14-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/146403/WordPress-UltimateMember-2.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/146409/Tejari-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/146425/Tejari-Arbitrary-File-Upload.html -https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html -https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html -https://packetstormsecurity.com/files/146855/Domaintrader-2.5.3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/146982 -https://packetstormsecurity.com/files/147063/Z-Blog-1.5.1.1740-Full-Path-Disclosure.html -https://packetstormsecurity.com/files/147065/YzmCMS-3.6-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/147066/Z-Blog-1.5.1.1740-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/147274/Seagate-Media-Server-Path-Traversal.html -https://packetstormsecurity.com/files/147467/Peel-Shopping-Cart-9.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/147470/Arastta-1.6.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/147501/cspmysqlum231-sql.txt -https://packetstormsecurity.com/files/147525/D-Link-DIR-868L-1.12-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/148001/PageKit-CMS-1.0.13-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/148390/WeChat-Pay-SDK-XXE-Injection.html -https://packetstormsecurity.com/files/148453/Grundig-Smart-Inter-ctive-3.0-Insecure-Direct-Object-Reference.html -https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html -https://packetstormsecurity.com/files/148887/IceWarp-WebMail-12.0.3.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/148993/WordPress-Ninja-Forms-3.3.13-CSV-Injection.html -https://packetstormsecurity.com/files/148999/MyBB-Moderator-Log-Notes-1.1-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/149204 -https://packetstormsecurity.com/files/149259/IDOR-On-ProConf-Peer-Review-And-Conference-Management-6.0-File-Disclosure.html -https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html -https://packetstormsecurity.com/files/149371/Free-MP3-CD-Ripper-2.6-Local-Buffer-Overflow.html -https://packetstormsecurity.com/files/149433/WordPress-Localize-My-Post-1.0-Local-File-Inclusion.html -https://packetstormsecurity.com/files/149568/WordPress-WP-Insert-2.4.2-Arbitrary-File-Upload.html -https://packetstormsecurity.com/files/149573/WordPress-WebARX-Website-Firewall-4.9.8-XSS-Bypass.html -https://packetstormsecurity.com/files/149581/PCProtect-4-8.35-Privilege-Escalation.html -https://packetstormsecurity.com/files/149586/Seqrite-End-Point-Security-7.4-Privilege-Escalation.html -https://packetstormsecurity.com/files/149596/CVE-2018-17595.txt -https://packetstormsecurity.com/files/149665/wppieregister3015-xss.txt -https://packetstormsecurity.com/files/149785/D-Link-DSL-2640T-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/149823/HighPortal-12.5-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/149843 -https://packetstormsecurity.com/files/149894 -https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html -https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html -https://packetstormsecurity.com/files/149982/Webiness-Inventory-2.9-Shell-Upload.html -https://packetstormsecurity.com/files/150125/Brava-Enterprise-Server-16.4-Information-Disclosure.html -https://packetstormsecurity.com/files/150900 -https://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html -https://packetstormsecurity.com/files/151325/CA-Automic-Workload-Automation-12.x-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151691/exacqvisionesm5122-escalate.txt -https://packetstormsecurity.com/files/151706/Find-A-Place-CMS-Directory-1.5-SQL-Injection.html -https://packetstormsecurity.com/files/151925/PRTG-Network-Monitor-7.1.3.3378-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151943/Bold-CMS-3.6.4-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151944/Craft-CMS-3.1.12-Pro-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151957/Mailtraq-WebMail-2.17.7.3550-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151959/Fiberhome-AN5506-04-F-RP2669-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/151963/MarcomCentral-FusionPro-VDP-Creator-Directory-Traversal.html -https://packetstormsecurity.com/files/152042 -https://packetstormsecurity.com/files/152058/robinbhandari-FTP-Remote-Denial-Of-Service.html -https://packetstormsecurity.com/files/152128/exacqVision-9.8-Unquoted-Service-Path-Privilege-Escalation.html -https://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html -https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html -https://packetstormsecurity.com/files/152303/CentOS-Web-Panel-0.9.8.789-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/152410/Uniqkey-Password-Manager-1.14-Credential-Disclosure.html -https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt -https://packetstormsecurity.com/files/152454/EasyIO-30P-Authentication-Bypass-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html -https://packetstormsecurity.com/files/152503/Jobberbase-CMS-2.0-SQL-Injection.html -https://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html -https://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html -https://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html -https://packetstormsecurity.com/files/152511/WordPress-Download-Manager-2.9.92-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html -https://packetstormsecurity.com/files/152552/WordPress-Download-Manager-2.9.93-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/152694/MailCarrier-2.51-HELP-Remote-Buffer-Overflow.html -https://packetstormsecurity.com/files/152975/Horde-Webmail-5.2.22-XSS-CSRF-SQL-Injection-Code-Execution.html -https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html -https://packetstormsecurity.com/files/154369/WordPress-API-Bearer-Auth-20181229-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html -https://packetstormsecurity.com/files/154436/WordPress-Checklist-1.1.5-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html -https://packetstormsecurity.com/files/154691/Akaunting-1.3.17-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/154738/File-Sharing-Wizard-1.5.0-DELETE-SEH-Buffer-Overflow.html -https://packetstormsecurity.com/files/154819/MiniShare-1.4.1-CONNECT-Remote-Buffer-Overflow.html -https://packetstormsecurity.com/files/154898 -https://packetstormsecurity.com/files/154985/Sahi-Pro-8.x-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/155261/FUDForum-3.0.9-Code-Execution-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/155319/ScanGuard-Antivirus-Insecure-Permissions.html -https://packetstormsecurity.com/files/155426/Pagekit-CMS-1.0.17-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html -https://packetstormsecurity.com/files/155505/Xinet-Elegant-6-Asset-Library-Web-Interface-6.1.655-SQL-Injection.html -https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html -https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html -https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html -https://packetstormsecurity.com/files/156033 -https://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/156483/DotNetNuke-CMS-9.5.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html -https://packetstormsecurity.com/files/156889/Joomla-GMapFP-3.30-Arbitrary-File-Upload.html -https://packetstormsecurity.com/files/156910/WordPress-WP-Forms-1.5.8.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/156939/Soluzione-Globale-Ecommerce-CMS-1-SQL-Injection.html -https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html -https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157116/WordPress-Hotel-Booking-System-Pro-1.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157117/Online-Hotel-Booking-System-Pro-1.3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157118/WordPress-Car-Rental-System-1.3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157563/ATutor-LMS-2.2.4-Weak-Password-Reset-Hash.html -https://packetstormsecurity.com/files/157594/iChat-1.6-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157599/Create-Project-Manager-1.07-Cross-Site-Scripting-HTML-Injection.html -https://packetstormsecurity.com/files/157608/WebTareas-2.0p8-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html -https://packetstormsecurity.com/files/157887/We-Com-OpenData-CMS-2.0-SQL-Injection.html -https://packetstormsecurity.com/files/157951/WordPress-Drag-And-Drop-Multi-File-Uploader-Remote-Code-Execution.html -https://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html -https://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html -https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html -https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html -https://packetstormsecurity.com/files/158389/Pandora-FMS-7.0-NG-746-Script-Insertion-Code-Execution.htmlPoC -https://packetstormsecurity.com/files/158391/responsiveonlineblog10poc-sql.txt -https://packetstormsecurity.com/files/158683/Online-Bike-Rental-1.0-Shell-Upload.html -https://packetstormsecurity.com/files/158684/Online-Shopping-Alphaware-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/158704/Online-Bike-Rental-1.0-Shell-Upload.html -https://packetstormsecurity.com/files/158755/GS20200804145053.txt -https://packetstormsecurity.com/files/158795/Car-Rental-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/158811/House-Rental-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/158813/Tailor-MS-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/158818/Cisco-7937G-Privilege-Escalation.html -https://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html -https://packetstormsecurity.com/files/159000/Online-Book-Store-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html -https://packetstormsecurity.com/files/159070/Cabot-0.11.12-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html -https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/159475/Restaurant-Reservation-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html -https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/160051/Anuko-Time-Tracker-1.19.23.5311-Password-Reset.html -https://packetstormsecurity.com/files/160052/Anuko-Time-Tracker-1.19.23.5311-Missing-Rate-Limiting.html -https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html -https://packetstormsecurity.com/files/160310/WonderCMS-3.1.3-Code-Execution-Server-Side-Request-Forgery.html -https://packetstormsecurity.com/files/160311/WonderCMS-3.1.3-Remote-Code-Execution.html -https://packetstormsecurity.com/files/160337/Online-Matrimonial-Project-1.0-Remote-Code-Execution.html -https://packetstormsecurity.com/files/160470/MiniWeb-HTTP-Server-0.8.19-Buffer-Overflow.html -https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/160626/Programi-Bilanc-Build-007-Release-014-31.01.2020-Hardcoded-Credentials.html -https://packetstormsecurity.com/files/160800/ -https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html -https://packetstormsecurity.com/files/160906/SmartAgent-3.1.0-Privilege-Escalation.html -https://packetstormsecurity.com/files/160966/E-Learning-System-1.0-SQL-Injection-Shell-Upload.html -https://packetstormsecurity.com/files/161080/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/161219/Online-Reviewer-System-1.0-SQL-Injection-Shell-Upload.html -https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html -https://packetstormsecurity.com/files/161267/Car-Rental-Project-2.0-Shell-Upload.html -https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/161895/CMS-Made-Simple-2.2.15-SQL-Injection.html -https://packetstormsecurity.com/files/162077/Papoo-CMS-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/162227/ -https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html -https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html -https://packetstormsecurity.com/files/162731/Spotweb-Develop-1.4.9-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/163038/FreeFloat-FTP-Server-1.0-Denial-Of-Service.html -https://packetstormsecurity.com/files/163079/Ability-FTP-Server-2.34-Denial-Of-Service.html -https://packetstormsecurity.com/files/163104/PCMan-FTP-Server-2.0.7-Denial-Of-Service.html -https://packetstormsecurity.com/files/163138/Sami-HTTP-Server-2.0-Denial-Of-Service.html -https://packetstormsecurity.com/files/163171/Teachers-Record-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/163172/Teachers-Record-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html -https://packetstormsecurity.com/files/163335/WinWaste.NET-1.0.6183.16475-Local-Privilege-Escalation.html -https://packetstormsecurity.com/files/163415/Online-Covid-Vaccination-Scheduler-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/163472/ -https://packetstormsecurity.com/files/163574/Online-Shopping-Portal-3.1-SQL-Injection.html -https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html -https://packetstormsecurity.com/files/163625/Vehicle-Parking-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/163626/Vehicle-Parking-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html -https://packetstormsecurity.com/files/163699/ObjectPlanet-Opinio-7.12-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/163707/ObjectPlanet-Opinio-7.13-7.14-XML-Injection.html -https://packetstormsecurity.com/files/163708/ObjectPlanet-Opinio-7.13-Expression-Language-Injection.html -https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html -https://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html -https://packetstormsecurity.com/files/164048/Antminer-Monitor-0.5.0-Authentication-Bypass.html -https://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/164333/Mitrastar-GPT-2541GNAC-N1-Privilege-Escalation.html -https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html -https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html -https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf -https://packetstormsecurity.com/files/164632/ -https://packetstormsecurity.com/files/164947/Mumara-Classic-2.93-SQL-Injection.html -https://packetstormsecurity.com/files/164947/mumaraclassic293-sql.txt -https://packetstormsecurity.com/files/165058/Serva-4.4.0-TFTP-Remote-Buffer-Overflow.html -https://packetstormsecurity.com/files/165272/Online-Thesis-Archiving-System-1.0-SQL-Injection-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/165392/Accu-Time-Systems-MAXIMUS-1.0-Buffer-Overflow-Denial-Of-Service.html -https://packetstormsecurity.com/files/165404/TRIGONE-Remote-System-Monitor-3.61-Unquoted-Service-Path.html -https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html -https://packetstormsecurity.com/files/165555/Online-Diagnostic-Lab-Management-System-1.0-Missing-Access-Control.html -https://packetstormsecurity.com/files/166103/ICL-ScadaFlex-II-SCADA-Controllers-SC-1-SC-2-1.03.07-Remote-File-Modification.html -https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html -https://packetstormsecurity.com/files/166376/3CX-Client-Missing-TLS-Validation.html -https://packetstormsecurity.com/files/166381/Xlight-FTP-3.9.3.2-Buffer-Overflow.html -https://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html -https://packetstormsecurity.com/files/166430 -https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html -https://packetstormsecurity.com/files/166476/ -https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/166530/ -https://packetstormsecurity.com/files/166531/ -https://packetstormsecurity.com/files/166533/ -https://packetstormsecurity.com/files/166534/ -https://packetstormsecurity.com/files/166539 -https://packetstormsecurity.com/files/166564/ -https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/166590/Multi-Store-Inventory-Management-System-1.0-Information-Disclosure.html -https://packetstormsecurity.com/files/166591/Multi-Store-Inventory-Management-System-1.0-Account-Takeover.html -https://packetstormsecurity.com/files/166598/Online-Sports-Complex-Booking-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/166613/CSZCMS-1.3.0-SSRF-LFI-Remote-Code-Execution.html -https://packetstormsecurity.com/files/166622/Small-HTTP-Server-3.06-Remote-Buffer-Overflow.html -https://packetstormsecurity.com/files/166641/Online-Sports-Complex-Booking-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/166683/Razer-Sila-2.0.418-Local-File-Inclusion.html -https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-Injection.html -https://packetstormsecurity.com/files/166786/Pharmacy-Management-System-1.0-Shell-Upload.html -https://packetstormsecurity.com/files/166820/ -https://packetstormsecurity.com/files/166839/ -https://packetstormsecurity.com/files/166840/Prime95-30.7-Build-9-Buffer-Overflow.html -https://packetstormsecurity.com/files/166918/ -https://packetstormsecurity.com/files/166984/ChatBot-Application-With-A-Suggestion-Feature-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/167001/School-Dormitory-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/167240/CLink-Office-2.0-SQL-Injection.html -https://packetstormsecurity.com/files/167290/Ingredient-Stock-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/167291/Ingredient-Stock-Management-System-1.0-Account-Takeover.html -https://packetstormsecurity.com/files/167309/Fast-Food-Ordering-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/167572/Zoo-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/167573/ -https://packetstormsecurity.com/files/167595/ -https://packetstormsecurity.com/files/167597/ -https://packetstormsecurity.com/files/167603/Zoo-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html -https://packetstormsecurity.com/files/167684/ -https://packetstormsecurity.com/files/167706/EQS-Integrity-Line-Cross-Site-Scripting-Information-Disclosure.html -https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.html -https://packetstormsecurity.com/files/167763/Asus-GameSDK-1.0.0.4-Unquoted-Service-Path.html -https://packetstormsecurity.com/files/167797/Patlite-1.46-Buffer-Overflow.html -https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/167864/wpuseronline2876-xss.txt -https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt -https://packetstormsecurity.com/files/167875/Crime-Reporting-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt -https://packetstormsecurity.com/files/167913/IObit-Malware-Fighter-9.2-Tampering-Privilege-Escalation.html -https://packetstormsecurity.com/files/167920/wpdownloadmanager3250-filedelete.txt -https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168065/Fiberhome-AN5506-02-B-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168120/wptransposh1081-authz.txt -https://packetstormsecurity.com/files/168133/10-Strike-Network-Inventory-Explorer-9.3-Buffer-Overflow.html -https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html -https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html -https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/168250/omps10-xss.txt -https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html -https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt -https://packetstormsecurity.com/files/168498/Online-Diagnostic-Lab-Management-System-1.0-SQL-Injection-Shell-Upload.html -https://packetstormsecurity.com/files/168522/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/168524/Online-Birth-Certificate-Management-System-1.0-Insecure-Direct-Object-Reference.html -https://packetstormsecurity.com/files/168529/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168533/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168549/Online-Examination-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168555/Bus-Pass-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168599/Password-Manager-For-IIS-2.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html -https://packetstormsecurity.com/files/169427/AVS-Audio-Converter-10.3-Stack-Overflow.html -https://packetstormsecurity.com/files/169531/Dinstar-FXO-Analog-VoIP-Gateway-DAG2000-16O-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html -https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html -https://packetstormsecurity.com/files/169949/ZTE-ZXHN-H108NS-Stack-Buffer-Overflow-Denial-Of-Service.html -https://packetstormsecurity.com/files/169962/Boa-Web-Server-0.94.13-0.94.14-Authentication-Bypass.html -https://packetstormsecurity.com/files/170205/Judging-Management-System-1.0-Shell-Upload.html -https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.html -https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html -https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html -https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701 -https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt -https://packetstormsecurity.com/files/171300/VX-Search-13.8-Unquoted-Service-Path.html -https://packetstormsecurity.com/files/171301/Wondershare-Dr-Fone-12.9.6-Weak-Permissions-Privilege-Escalation.html -https://packetstormsecurity.com/files/171476/RSA-NetWitness-Endpoint-EDR-Agent-12.x-Incorrect-Access-Control-Code-Execution.html -https://packetstormsecurity.com/files/171523/Suprema-BioStar-2-2.8.16-SQL-Injection.html -https://packetstormsecurity.com/files/171585/Dreamer-CMS-4.0.0-SQL-Injection.html -https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/171686/Sales-Tracker-Management-System-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/171692/Sales-Tracker-Management-System-1.0-Insecure-Direct-Object-Reference.html -https://packetstormsecurity.com/files/171970/Nokia-OneNDS-17-Insecure-Permissions-Privilege-Escalation.html -https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html -https://packetstormsecurity.com/files/172052/MilleGPG5-5.9.2-Local-Privilege-Escalation.html -https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html -https://packetstormsecurity.com/files/172075/CompanyMaps-8.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172141/GV-Edge-Recording-Manager-2.2.3.0-Privilege-Escalation.html -https://packetstormsecurity.com/files/172145/Companymaps-8.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172146/Companymaps-8.0-SQL-Injection.html -https://packetstormsecurity.com/files/172185/Rollout-UI-0.5-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html -https://packetstormsecurity.com/files/172259/Soft-o-Free-Password-Manager-1.1.20-DLL-Hijacking.html -https://packetstormsecurity.com/files/172276/Optoma-1080PSTX-Firmware-C02-Authentication-Bypass.html -https://packetstormsecurity.com/files/172464/Filmora-12-Build-1.0.0.7-Unquoted-Service-Path.html -https://packetstormsecurity.com/files/172466/MobileTrans-4.0.11-Weak-Service-Permissions.html -https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html -https://packetstormsecurity.com/files/172556/FusionInvoice-2023-1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/172559/Service-Provider-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/172560/WFTPD-3.25-Credential-Disclosure.html -https://packetstormsecurity.com/files/172687/Total-CMS-1.7.4-Shell-Upload.html -https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html -https://packetstormsecurity.com/files/172904 -https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html -https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/173146/Office-Suite-Premium-10.9.1.42602-Local-File-Inclusion.html -https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html -https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html -https://packetstormsecurity.com/files/174240/Crypto-Currency-Tracker-CCT-9.5-Add-Administrator.html -https://packetstormsecurity.com/files/174271 -https://packetstormsecurity.com/files/174272 -https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz -https://packetstormsecurity.com/files/174525/OpenCart-CMS-4.0.2.2-Brute-Force.html -https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html -https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html -https://packetstormsecurity.com/files/174815 -https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html -https://packetstormsecurity.com/files/175277/Moodle-4.3-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html -https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html -https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html -https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html -https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html -https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html -https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html -https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html -https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html -https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/176314/WhatACart-2.0.7-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/176333/Ultra-Mini-HTTPd-1.21-Denial-Of-Service.html -https://packetstormsecurity.com/files/176342/FTPDMIN-0.96-Denial-Of-Service.html -https://packetstormsecurity.com/files/176365/WebCalendar-1.3.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/176377/Easy-File-Sharing-FTP-Server-2.0-Denial-Of-Service.html -https://packetstormsecurity.com/files/176381/Easy-Chat-Server-3.1-Denial-Of-Service.html -https://packetstormsecurity.com/files/176403/Form-Tools-3.1.1-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/176411/iGalerie-3.0.22-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/176420/liveSite-2019.1-Remote-Code-Execution.html -https://packetstormsecurity.com/files/176544/ProSSHD-1.2-20090726-Denial-Of-Service.html -https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html -https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html -https://packetstormsecurity.com/files/176633/SpyCamLizard-1.230-Denial-Of-Service.html -https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html -https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html -https://packetstormsecurity.com/files/176663/EzServer-6.4.017-Denial-Of-Service.html -https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html -https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html -https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html -https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html -https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html -https://packetstormsecurity.com/files/177168/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection.html -https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html -https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html -https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/177254/SuperCali-1.1.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html -https://packetstormsecurity.com/files/177440/RAD-SecFlow-2-Path-Traversal.html -https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html -https://packetstormsecurity.com/files/177542/NorthStar-C2-Agent-1.0-Cross-Site-Scripting-Remote-Command-Execution.html -https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html -https://packetstormsecurity.com/files/177660/Tramyardg-Autoexpress-1.3.0-SQL-Injection.html -https://packetstormsecurity.com/files/177661/Tramyardg-Autoexpress-1.3.0-Authentication-Bypass.html -https://packetstormsecurity.com/files/177662/Tramyardg-Autoexpress-1.3.0-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/177708/Lektor-Static-CMS-3.3.10-Arbitrary-File-Upload-Remote-Code-Execution.html -https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html -https://packetstormsecurity.com/files/177857 -https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html -https://packetstormsecurity.com/files/178794/Debezium-UI-2.5-Credential-Disclosure.html -https://packetstormsecurity.com/files/83624/Invision-Power-Board-3.0.4-Cross-Site-Scripting.html -https://packetstormsecurity.com/files/94905/EasyFTP-1.7.0.x-Denial-Of-Service.html -https://packetstormsecurity.com/files/author/11084/ -https://packetstormsecurity.com/files/author/15149 -https://packetstormsecurity.com/files/author/15149/ -https://packetstormsecurity.com/files/author/7547/ -https://packetstormsecurity.com/files/author/8433/ -https://packetstormsecurity.com/files/cve/CVE-2009-5025 -https://packetstormsecurity.com/files/cve/CVE-2010-4662 -https://packetstormsecurity.com/files/cve/CVE-2011-0525 -https://packetstormsecurity.com/files/cve/CVE-2011-2922 -https://packetstormsecurity.com/files/cve/CVE-2012-3806 -https://packetstormsecurity.com/files/cve/CVE-2012-3808 -https://packetstormsecurity.com/files/cve/CVE-2012-3809 -https://packetstormsecurity.com/files/cve/CVE-2012-4760 -https://packetstormsecurity.com/files/cve/CVE-2012-5828 -https://packetstormsecurity.com/files/cve/CVE-2012-6297 -https://packetstormsecurity.com/files/cve/CVE-2013-0803 -https://packetstormsecurity.com/files/cve/CVE-2013-1352/page1/ -https://packetstormsecurity.com/files/cve/CVE-2013-1360 -https://packetstormsecurity.com/files/cve/CVE-2013-1592 -https://packetstormsecurity.com/files/cve/CVE-2013-1593 -https://packetstormsecurity.com/files/cve/CVE-2013-1594 -https://packetstormsecurity.com/files/cve/CVE-2013-1595 -https://packetstormsecurity.com/files/cve/CVE-2013-1596 -https://packetstormsecurity.com/files/cve/CVE-2013-1597 -https://packetstormsecurity.com/files/cve/CVE-2013-1598 -https://packetstormsecurity.com/files/cve/CVE-2013-1599 -https://packetstormsecurity.com/files/cve/CVE-2013-1600 -https://packetstormsecurity.com/files/cve/CVE-2013-1601 -https://packetstormsecurity.com/files/cve/CVE-2013-1602 -https://packetstormsecurity.com/files/cve/CVE-2013-1603 -https://packetstormsecurity.com/files/cve/CVE-2013-2567 -https://packetstormsecurity.com/files/cve/CVE-2013-2568/page1/ -https://packetstormsecurity.com/files/cve/CVE-2013-2569 -https://packetstormsecurity.com/files/cve/CVE-2013-2570 -https://packetstormsecurity.com/files/cve/CVE-2013-2572 -https://packetstormsecurity.com/files/cve/CVE-2013-2573 -https://packetstormsecurity.com/files/cve/CVE-2013-2574 -https://packetstormsecurity.com/files/cve/CVE-2013-4103 -https://packetstormsecurity.com/files/cve/CVE-2013-4211 -https://packetstormsecurity.com/files/cve/CVE-2013-5122 -https://packetstormsecurity.com/files/cve/CVE-2013-5988 -https://packetstormsecurity.com/files/cve/CVE-2013-6236 -https://packetstormsecurity.com/files/cve/CVE-2013-6365 -https://packetstormsecurity.com/files/cve/CVE-2014-1409 -https://packetstormsecurity.com/files/cve/CVE-2014-1617 -https://packetstormsecurity.com/files/cve/CVE-2014-1860 -https://packetstormsecurity.com/files/cve/CVE-2014-3136 -https://packetstormsecurity.com/files/cve/CVE-2015-2802 -https://packetstormsecurity.com/files/cve/CVE-2016-4676 -https://packetstormsecurity.com/files/cve/CVE-2018-17789 -https://packetstormsecurity.com/files/cve/CVE-2018-17790 -https://packetstormsecurity.com/files/cve/CVE-2018-17791 -https://packetstormsecurity.com/files/cve/CVE-2018-17792 -https://packetstormsecurity.com/files/cve/CVE-2022-37661 -https://packetstormsecurity.com/files/cve/CVE-2023-33584 -https://packetstormsecurity.com/files/date/2012-12-14/ -https://pagure.io/389-ds-base/issue/49336 -https://pagure.io/389-ds-base/issue/50329 -https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/ -https://panda002.hashnode.dev/a-stored-cross-site-scripting-xss-vulnerability-in-the-create-the-function-of-zenario-cms-v94 -https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books -https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-new-member -https://panda002.hashnode.dev/badaso-version-297-has-xss-vulnerability-in-add-ranks -https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab -https://pastebin.com/1QEHrj01 -https://pastebin.com/23N5wcC7 -https://pastebin.com/31v5JMcG -https://pastebin.com/5ZDDCqgL -https://pastebin.com/6uT9jhDR -https://pastebin.com/8dj59053 -https://pastebin.com/8dvs5RcJ -https://pastebin.com/9C0QBs8u -https://pastebin.com/9VBiRpAR -https://pastebin.com/Amw08sAj -https://pastebin.com/BXnkY9YY -https://pastebin.com/Bsy6KTxJ -https://pastebin.com/DREqM7AT -https://pastebin.com/Gdd0Shgr -https://pastebin.com/GgpFz3ZW -https://pastebin.com/NtPn3jB8 -https://pastebin.com/PSyqqs1g -https://pastebin.com/QbhRJp4q -https://pastebin.com/Qug7tquW -https://pastebin.com/RVdpLAT8 -https://pastebin.com/SbjwbYVr -https://pastebin.com/SgVPb7Lb -https://pastebin.com/TCEWRZEd -https://pastebin.com/TEJdu9LN -https://pastebin.com/UDEsFq3u -https://pastebin.com/WkkGk0tw -https://pastebin.com/XHMeS7pQ -https://pastebin.com/Y9uEC4nu -https://pastebin.com/YrBcG2Ln -https://pastebin.com/ZGr5tyP2 -https://pastebin.com/ZPECbgZb -https://pastebin.com/a5VhaxYn -https://pastebin.com/aQn3Cr2G -https://pastebin.com/aeqYLK9u -https://pastebin.com/amgw9pE7 -https://pastebin.com/c90h9WfB -https://pastebin.com/caQW37fY -https://pastebin.com/eA5tGKf0 -https://pastebin.com/fsLDebg5 -https://pastebin.com/h8v0qxZH -https://pastebin.com/hwrvFix5 -https://pastebin.com/ia7U4vi9 -https://pastebin.com/ivNL7s0n -https://pastebin.com/kpx9Nvbf -https://pastebin.com/ms1ivjYe -https://pastebin.com/qDedtZf3 -https://pastebin.com/raw/08REmV1X -https://pastebin.com/raw/J9B8Lh0j -https://pastebin.com/raw/nQ648Dif -https://pastebin.com/raw/rVGbwSw0 -https://pastebin.com/raw/rt7LJvyF -https://pastebin.com/sp5nMhvc -https://pastebin.com/tPebQFy4 -https://pastebin.com/tmFrECnZ -https://pastebin.com/vVN00qRh -https://pastebin.com/wqNWnCuN -https://pastebin.com/yUFxs2J7 -https://pastebin.com/ygwczqpP -https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael@niedermayer.cc/ -https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ -https://patsch.dev/2022/07/08/cve-2022-31877-privilege-escalation-in-msi-centers-msi-terminalserver-exe/ -https://pdf-insecurity.org/signature/evaluation_2018.html -https://pdfium.googlesource.com/pdfium/+/4ff7a4246c81a71b4f878e959b3ca304cd76ec8a -https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/ -https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ -https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/ -https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/ -https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/ -https://pentest.blog/advisory-xplico-unauthenticated-remote-code-execution-cve-2017-16666/ -https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ -https://pentest.blog/pardus-21-linux-distro-remote-code-execution-0day-2021/ -https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/ -https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/ -https://pentest.com.tr/exploits/Allied-Telesis-8100L-8-Cross-Site-Scripting.html -https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html -https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html -https://pentest.com.tr/exploits/Dolibarr-ERP-CRM-8-0-3-Cross-Site-Scripting.html -https://pentest.com.tr/exploits/Feng-Office-3-7-0-5-Unauthenticated-Remote-Command-Execution-Metasploit.html -https://pentest.com.tr/exploits/Liferay-CE-Portal-Tomcat-7-1-2-ga3-Groovy-Console-Remote-Command-Execution-Metasploit.html -https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-Auth-Bypass-Remote-Command-Execution.html -https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-SQLi-Remote-Code-Execution.html -https://pentest.com.tr/exploits/OpenKM-DM-6-3-7-Remote-Command-Execution-Metasploit.html -https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html -https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-Authenticated-Remote-Code-Execution.html -https://pentest.com.tr/exploits/Sahi-Pro-v8-x-Unauthenticated-RCE-Exploit-Python.html -https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html -https://pentest.com.tr/exploits/TeemIp-IPAM-2-4-0-new-config-Command-Injection-Metasploit.html -https://pentest.com.tr/exploits/Vtiger-CRM-7-1-0-Remote-Code-Execution.html -https://pentest.com.tr/exploits/Webmin-1900-Remote-Command-Execution.html -https://pentest.com.tr/exploits/Webmin-1910-Package-Updates-Remote-Command-Execution.html -https://pentest.com.tr/exploits/i-doit-CMDB-1-11-2-Remote-Code-Execution.html -https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt -https://peps.python.org/pep-0440/#post-release-spelling -https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/ -https://peter.website/meow-hash-cryptanalysis -https://peterka.tech/blog/posts/cve-2021-28684/ -https://phabricator.wikimedia.org/T108198 -https://phabricator.wikimedia.org/T151735 -https://phabricator.wikimedia.org/T239209 -https://phabricator.wikimedia.org/T259210 -https://phabricator.wikimedia.org/T265810 -https://phabricator.wikimedia.org/T269718 -https://phabricator.wikimedia.org/T323651 -https://phabricator.wikimedia.org/T326952 -https://phabricator.wikimedia.org/T339111 -https://phabricator.wikimedia.org/T64685 -https://phabricator.wikimedia.org/T85113 -https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc -https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html -https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html -https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#backdoor-account -https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#cloud -https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead -https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-root-rce -https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#rsa-lulz -https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html -https://piotrryciak.com/posts/xss-infoblox/ -https://plantplants213607121.wordpress.com/2023/02/16/atutor-2-2-1-cross-site-scripting-via-the-token-body-parameter/ -https://playframework.com/security/vulnerability/CVE-2014-3630-XmlExternalEntity -https://poctestblog.blogspot.com/2017/12/samsung-internet-browser-sop-bypassuxss.html -https://podalirius.net/cves/2020-16147/ -https://podalirius.net/cves/2020-16148/ -https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/ -https://podalirius.net/en/cves/2020-16147/ -https://podalirius.net/en/cves/2020-16148/ -https://podalirius.net/en/cves/2022-26159/ -https://podalirius.net/en/cves/2022-30780/ -https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ -https://portswigger.net/daily-swig/blind-tcp-ip-hijacking-is-resurrected-for-windows-7 -https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack -https://portswigger.net/daily-swig/researcher-discloses-alleged-zero-day-vulnerabilities-in-nuuo-nvrmini2-recording-device -https://portswigger.net/research/bypassing-csp-using-polyglot-jpegs -https://portswigger.net/research/http2 -https://portswigger.net/web-security/cross-site-scripting -https://portswigger.net/web-security/cross-site-scripting/reflected -https://portswigger.net/web-security/cross-site-scripting/stored -https://portswigger.net/web-security/csrf -https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions -https://portswigger.net/web-security/csrf/xss-vs-csrf -https://positive.security/blog/url-open-rce#open-libreoffice -https://poweregg.d-circle.com/support/package/important/20190204_000780/ -https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c -https://prisminfosec.com/cve-2022-34001/ -https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ -https://profundis-labs.com/advisories/CVE-2015-7322.txt -https://profundis-labs.com/advisories/CVE-2015-7323.txt -https://profundis-labs.com/advisories/CVE-2015-7676.txt -https://profundis-labs.com/advisories/CVE-2015-7679.txt -https://profundis-labs.com/advisories/CVE-2015-7680.txt -https://prolink2u.com/product/prs1841/ -https://prophecyinternational.atlassian.net/wiki/spaces/SC7/pages/158760961/Release+Notes+for+Snare+Central+v7.4.5 -https://prosody.im/security/advisory_20220113/ -https://prosody.im/security/advisory_20220113/1.patch -https://public-exposure.inform.social/post/integrity-checking/ -https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55 -https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities -https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf -https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf -https://pulsesecurity.co.nz/advisories/microk8s-privilege-escalation -https://pulsesecurity.co.nz/advisories/phusion-passenger-priv-esc -https://purinechu.github.io/posts/social_slider_widget_reflected_xss/ -https://puzzor.github.io/Linksys-Velop-Authentication-bypass -https://pwning.tech/cve-2022-46640/ -https://pwning.tech/cve-2022-47758 -https://pwning.tech/cve-2022-47758/ -https://pwning.tech/nftables/ -https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2/ -https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ -https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ -https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ -https://quantiano.github.io/cve-2023-47102/ -https://r.sec-consult.com/fortra -https://r.sec-consult.com/hawki -https://r.sec-consult.com/openolat -https://r.sec-consult.com/qognify -https://r.sec-consult.com/unifyroot -https://r0.haxors.org/posts?id=8 -https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26 -https://r4p3.net/threads/teamkilled-new-teamspeak-crash.8144/ -https://raelize.com/advisories/CVE-2020-9275_D-Link-DSL-2640B_Remote-Credentials-Exfiltration_v1.0.txt -https://raelize.com/advisories/CVE-2020-9277_D-Link-DSL-2640B_CGI-Authentication-bypass_v1.0.txt -https://ramihub.github.io/ -https://rastating.github.io/bludit-brute-force-mitigation-bypass/ -https://rastating.github.io/dwnldr-1-0-stored-xss-disclosure/ -https://rastating.github.io/gila-cms-reflected-xss/ -https://rastating.github.io/gila-cms-upload-filter-bypass-and-rce/ -https://rastating.github.io/instalinker-reflected-xss-information-disclosure/ -https://rastating.github.io/ksweb-android-remote-code-execution/ -https://rastating.github.io/miniblog-remote-code-execution/ -https://rastating.github.io/wp-whois-domain-reflected-xss/ -https://rastating.github.io/xbtit-multiple-vulnerabilities/ -https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/sql.txt -https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/xss.txt -https://raw.githubusercontent.com/Siros96/CSRF/master/PoC -https://raw.githubusercontent.com/Siros96/MicroStrategy_CSRF/master/PoC -https://raw.githubusercontent.com/TheLastVvV/Vulnerability-Reports-and-CVE/main/Reports/Discord%20Probot%20-%20Unrestricted%20File%20Upload.txt -https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES -https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES -https://raw.githubusercontent.com/febinrev/tinyfilemanager-2.4.6-exploit/main/exploit.sh -https://raw.githubusercontent.com/me4yoursecurity/Reports/master/README.md -https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt -https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt -https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb -https://raw.githubusercontent.com/rand0mIdas/randomideas/main/ShimoVPN.md?token=GHSAT0AAAAAACA3WX4SPH2YYOCWGV6LLVSGZBIEKEQ -https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/heapless/RUSTSEC-2020-0145.md -https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/noise_search/RUSTSEC-2020-0141.md -https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md -https://raxis.com/blog/cve-2021-27956-manage-engine-xss -https://raxis.com/blog/cve-2021-28382 -https://raxis.com/blog/cve-2021-31813 -https://raxis.com/blog/cve-2021-38156 -https://raxis.com/blog/cve-2022-24681 -https://raxis.com/blog/cve-2022-25245 -https://raxis.com/blog/cve-2022-25373 -https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777 -https://raxis.com/blog/cve-2022-35739 -https://raxis.com/blog/prtg-network-monitor-cve-2021-29643 -https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/ -https://redmine.lighttpd.net/issues/3165 -https://redmine.openinfosecfoundation.org/issues/2501 -https://redmine.openinfosecfoundation.org/issues/2770 -https://redmine.openinfosecfoundation.org/issues/4710 -https://redmine.openinfosecfoundation.org/issues/6444 -https://redmine.pfsense.org/issues/9554#change-40729 -https://redteam.pl/poc/dasan-zhone-znid-gpon-2426a-eu.html -https://redteamzone.com/ThinVNC/ -https://rehmeinfosec.de/labor/cve-2023-45867 -https://rehmeinfosec.de/labor/cve-2023-45869 -https://rehmeinfosec.de/labor/cve-2023-50982 -https://research.checkpoint.com/2019/pxe-dust-finding-a-vulnerability-in-windows-servers-deployment-services/ -https://research.checkpoint.com/2020/apache-guacamole-rce/ -https://research.checkpoint.com/2020/dont-be-silly-its-only-a-lightbulb/ -https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ -https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/ -https://research.checkpoint.com/another-office-equation-rce-vulnerability/ -https://research.checkpoint.com/extracting-code-execution-from-winrar/ -https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ -https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ -https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/ -https://research.checkpoint.com/uncovering-drupalgeddon-2/ -https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc -https://research.cleantalk.org/cve-2023-5237-memberlite-shortcodes-stored-xss-via-shortcode -https://research.cleantalk.org/cve-2023-5307-photos-and-files-contest-gallery-contact-form-21-2-8-1-unauthenticated-stored-xss-via-http-headers -https://research.cleantalk.org/cve-2023-6113-wp-staging-unauth-sensitive-data-exposure-to-account-takeover-poc-exploit/ -https://research.cleantalk.org/cve-2023-6271-backup-migration-unauth-sensitive-data-exposure-to-full-control-of-the-site-poc-exploit -https://research.cleantalk.org/cve-2023-6530-tj-shortcodes-stored-xss-poc/ -https://research.cleantalk.org/cve-2023-6592-fastdup-database-users-password-leak-poc-exploit/ -https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/ -https://research.cleantalk.org/cve-2024-0559/ -https://research.cleantalk.org/cve-2024-2509/ -https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ -https://research.g0blin.co.uk/cve-2014-6444/ -https://research.g0blin.co.uk/cve-2014-7151/ -https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/ -https://research.jfrog.com/vulnerabilities/axum-core-dos/ -https://research.jfrog.com/vulnerabilities/caret-xss-rce/ -https://research.jfrog.com/vulnerabilities/cleo-redos-xray-257186/ -https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/ -https://research.jfrog.com/vulnerabilities/eth-account-redos-xray-248681/ -https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/ -https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/ -https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/ -https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/ -https://research.jfrog.com/vulnerabilities/libxmljs-namespaces-type-confusion-rce-jfsa-2024-001034096/ -https://research.jfrog.com/vulnerabilities/libxmljs2-attrs-type-confusion-rce-jfsa-2024-001034097/ -https://research.jfrog.com/vulnerabilities/libxmljs2-namespaces-type-confusion-rce-jfsa-2024-001034098/ -https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/ -https://research.jfrog.com/vulnerabilities/mleap-path-traversal-rce-xray-532656/ -https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ -https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ -https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/ -https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/ -https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/ -https://research.jfrog.com/vulnerabilities/snowflake-connector-python-redos-xray-257185/ -https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/ -https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/ -https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917 -https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ -https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/ -https://research.jfrog.com/vulnerabilities/vector-admin-filter-bypass/ -https://research.loginsoft.com/bugs/1501/ -https://research.loginsoft.com/bugs/1508/ -https://research.loginsoft.com/bugs/a-heap-buffer-overflow-vulnerability-in-the-function-ap4_bitstreamreadbytes-bento4-1-5-1-628/ -https://research.loginsoft.com/bugs/blind-sql-injection-in-librenms/ -https://research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/ -https://research.loginsoft.com/bugs/heap-buffer-overflow-in-h5olayout-c-hdf5-1-13-0/ -https://research.loginsoft.com/bugs/heap-overflow-in-decompress-c-hdf5-1-13-0/ -https://research.loginsoft.com/bugs/invalid-memory-access-in-adv_png_unfilter_8-advancecomp/ -https://research.loginsoft.com/bugs/invalid-memory-access-in-gatomiccounter-gatomicincrement-xpdf-4-01/ -https://research.loginsoft.com/bugs/invalid-memory-access-in-gfxindexedcolorspacemapcolortobase-pdfalto-0-2/ -https://research.loginsoft.com/bugs/invalid-memory-access-in-textpagefindgaps-xpdf-4-01/ -https://research.loginsoft.com/bugs/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/ -https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ -https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/ -https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5ac-c-hdf5-1-13-0/ -https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-crop_page-podofo-0-9-6/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_listfind-bento4-1-5-1-628/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_trackgetsampleindexfortimestampms-bento4-1-5-1-628/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_ipv6_l4proto-tcpreplay-4-3-1/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_layer4_v6-tcpreplay-4-3-1/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-pdftranslatorsettarget-podofo-0-9-6/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-setsource-podofo-0-9-6-trunk-r1967/ -https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/ -https://research.loginsoft.com/bugs/out-of-bounds-write-in-function-ap4_cttstableentryap4_cttstableentry-bento4-1-5-1-0/ -https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/ -https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/ -https://research.loginsoft.com/bugs/stack-based-buffer-overflow-vulnerability-in-function-md5round1-xpdf-4-01/ -https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/ -https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/ -https://research.loginsoft.com/bugs/uncontrolled-recursion-loop-in-exiv2anonymous-namespacebigtiffimageprintifd-exiv2-0-27/ -https://research.loginsoft.com/bugs/uncontrolled-recursion-loop-in-exiv2imageprinttiffstructure-exiv2-0-27/ -https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/ -https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment -https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ -https://research.nccgroup.com/2020/08/24/technical-advisory-wolfssl-tls-1-3-client-man-in-the-middle-attack/ -https://research.nccgroup.com/2020/09/25/technical-advisory-lansweeper-privilege-escalation-via-csrf-using-http-method-interchange/ -https://research.nccgroup.com/2020/10/20/wrt160nl-cve-2020-26561-bof/ -https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/ -https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/ -https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ -https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/ -https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ -https://research.nccgroup.com/2021/09/14/technical-advisory-pdftron-javascript-urls-allowed-in-webviewer-ui-cve-2021-39307/ -https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ -https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ -https://research.nccgroup.com/2022/05/24/technical-advisory-sercomm-h500s-authenticated-remote-command-execution-cve-2021-44080/ -https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/ -https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ -https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ -https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ -https://research.nccgroup.com/2022/11/17/cve-2022-45163/ -https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ -https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ -https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ -https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224/ -https://research.nccgroup.com/?research=Technical%20advisories -https://research.nccgroup.com/?research=Technical+advisories -https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ -https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html -https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/1318289409/v2021.2+-+March+2021 -https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/807698439/v1.8+HF+1+2+3+OnPrem+v5.3 -https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 -https://rhinosecuritylabs.com/application-security/completeftp-server-local-privesc-cve-2019-16116/ -https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/ -https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/ -https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce -https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce/ -https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/ -https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ -https://ricardojoserf.github.io/CVE-2021-40845/ -https://riklutz.nl/2021/10/30/unauthenticated-file-upload-to-remote-code-execution-in-xerte/ -https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ -https://rioru.github.io/pentest/web/2017/03/28/from-unauthenticated-to-root-supervision.html -https://riteshgohil-25.medium.com/softr-version-2-0-33463a6bf766 -https://robertchen.cc/blog/2021/03/31/asus-rce -https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/ -https://robotattack.org/ -https://robsware.github.io/2023/09/01/firstcve -https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696 -https://rodelllemit.medium.com/insecure-permissions-vulnerability-in-raidenftpd-v2-4-build-4005-2016-04-01-ea7389be3d33 -https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b -https://rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor -https://rstforums.com/forum/88810-csrf-vbulletin-modcp.rst -https://rt.perl.org/Public/Bug/Display.html?id=131665 -https://rt.perl.org/Public/Bug/Display.html?id=131844 -https://rt.perl.org/Public/Bug/Display.html?id=133423 -https://rt.perl.org/Ticket/Display.html?id=133192 -https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html -https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html -https://ruby.sh/helpspot-disclosure-20180206.txt -https://rushter.com/blog/public-ssh-keys/ -https://rustsec.org/advisories/RUSTSEC-2020-0141.html -https://rustsec.org/advisories/RUSTSEC-2020-0142.html -https://rustsec.org/advisories/RUSTSEC-2020-0145.html -https://rustsec.org/advisories/RUSTSEC-2024-0335.html -https://s1gnalcha0s.github.io/ibooks/epub/2017/03/27/This-book-reads-you-using-JavaScript.html -https://s3curityb3ast.github.io/KSA-Dev-001.md -https://s3curityb3ast.github.io/KSA-Dev-002.md -https://s3curityb3ast.github.io/KSA-Dev-004.md -https://s3curityb3ast.github.io/KSA-Dev-005.md -https://s3curityb3ast.github.io/KSA-Dev-006.md -https://s3curityb3ast.github.io/KSA-Dev-007.md -https://s3curityb3ast.github.io/KSA-Dev-008.txt -https://s3curityb3ast.github.io/KSA-Dev-009.txt -https://s3curityb3ast.github.io/KSA-Dev-011.md -https://s3curityb3ast.github.io/KSA-Dev-012.md -https://s3curityb3ast.github.io/KSA-Dev-013.md -https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 -https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/ -https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ -https://sahildhar.github.io/blogpost/Zoho-ManageEngine-CloudSecurityPlus-Remote-Code-Execution-via-Security-Misconfiguration/ -https://saikotwolf.medium.com/f9ed24e14e51 -https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html -https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/ -https://samcurry.net/analysis-of-cve-2019-14994/ -https://samy.pl/slipstream/ -https://sandstorm.io/news/2017-03-02-security-review -https://sangomakb.atlassian.net/wiki/spaces/DVC/pages/45351279/Natural+Access+Software+Download -https://saplingwoodchipper.github.io -https://satoshihunter1.blogspot.com/2023/06/the-bitcoin-app-is-vulnerable-to-hackers.html -https://savannah.gnu.org/bugs/?52264 -https://savannah.gnu.org/bugs/?52265 -https://savannah.gnu.org/bugs/?59897 -https://savannah.gnu.org/bugs/?62387 -https://savannah.gnu.org/bugs/?62977 -https://savannah.gnu.org/bugs/index.php?53566 -https://savannah.gnu.org/bugs/index.php?56683 -https://savannah.gnu.org/bugs/index.php?63000 -https://savannah.gnu.org/bugs/index.php?64503 -https://savannah.nongnu.org/bugs/?46346 -https://sayaanalam.github.io/CVE-2021-35391.html -https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html -https://scarybeastsecurity.blogspot.com/2016/11/0day-poc-incorrect-fix-for-gstreamer.html -https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html -https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html -https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html -https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443 -https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/ -https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 -https://seanpesce.blogspot.com/2022/11/unauthenticated-stored-xss-in-arris.html -https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide -https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ -https://sec-consult.com/en/blog/advisories/cross-site-request-forgery-csrf-in-umbraco-cms/ -https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-service-executable-in-eikon-thomson-reuters-cve-2019-10679/ -https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ -https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ -https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/ -https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/ -https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/ -https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ -https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ -https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ -https://sec-consult.com/vulnerability-lab/advisory/arbitrary-file-upload-and-bypassing-htaccess-rules-in-monospace-directus-headless-cms/ -https://sec-consult.com/vulnerability-lab/advisory/authenticated-command-injection-in-poly-studio/ -https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/ -https://sec-consult.com/vulnerability-lab/advisory/authentication-bypass-genua-genugate/ -https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ -https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/ -https://sec-consult.com/vulnerability-lab/advisory/hardcoded-backdoor-user-outdated-software-components-nexans-ftto-gigaswitch/ -https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/ -https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ -https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/ -https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-pdf24-creator-geek-software-gmbh/ -https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/- -https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ -https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/ -https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ -https://sec-consult.com/vulnerability-lab/advisory/password-reset-poisoning-attack-craft-cms/ -https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-in-csexe-opentext-server-component/ -https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ -https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/ -https://sec-consult.com/vulnerability-lab/advisory/stored-cross-site-scripting-in-mb-support-broker-management-solution-openviva-c2/ -https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/ -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-4Ag3yWbD -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2 -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8 -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-priv-escalate-Xg8zkyPk -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv -https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h -https://sec.maride.cc/posts/abus/ -https://sec.maride.cc/posts/abus/#cve-2018-17559 -https://sec.maride.cc/posts/abus/#cve-2018-17878 -https://sec.maride.cc/posts/abus/#cve-2018-17879 -https://sec.stealthcopter.com/cve-2020-28243/ -https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/ -https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/ -https://seclists.org/bugtraq/2012/Jun/165 -https://seclists.org/bugtraq/2012/Nov/1 -https://seclists.org/bugtraq/2012/Nov/108 -https://seclists.org/bugtraq/2018/Dec/3 -https://seclists.org/bugtraq/2018/Jun/40 -https://seclists.org/bugtraq/2018/Nov/37 -https://seclists.org/bugtraq/2018/Oct/12 -https://seclists.org/bugtraq/2018/Oct/13 -https://seclists.org/bugtraq/2018/Oct/25 -https://seclists.org/bugtraq/2018/Oct/26 -https://seclists.org/bugtraq/2018/Oct/3 -https://seclists.org/bugtraq/2018/Oct/32 -https://seclists.org/bugtraq/2018/Oct/33 -https://seclists.org/bugtraq/2018/Oct/36 -https://seclists.org/bugtraq/2018/Sep/26 -https://seclists.org/bugtraq/2018/Sep/27 -https://seclists.org/bugtraq/2018/Sep/29 -https://seclists.org/bugtraq/2018/Sep/38 -https://seclists.org/bugtraq/2018/Sep/56 -https://seclists.org/bugtraq/2019/Aug/29 -https://seclists.org/bugtraq/2019/Feb/0 -https://seclists.org/bugtraq/2019/Feb/21 -https://seclists.org/bugtraq/2019/Feb/34 -https://seclists.org/bugtraq/2019/Jan/21 -https://seclists.org/bugtraq/2019/Jan/53 -https://seclists.org/bugtraq/2019/Jan/9 -https://seclists.org/bugtraq/2019/Jun/10 -https://seclists.org/bugtraq/2019/Jun/14 -https://seclists.org/bugtraq/2019/Sep/7 -https://seclists.org/fulldisclosure/2010/Apr/331 -https://seclists.org/fulldisclosure/2017/Feb/67 -https://seclists.org/fulldisclosure/2017/Jan/40 -https://seclists.org/fulldisclosure/2018/Nov/23 -https://seclists.org/fulldisclosure/2018/Oct/12 -https://seclists.org/fulldisclosure/2018/Oct/36 -https://seclists.org/fulldisclosure/2018/Sep/28 -https://seclists.org/fulldisclosure/2018/Sep/3 -https://seclists.org/fulldisclosure/2018/Sep/30 -https://seclists.org/fulldisclosure/2018/Sep/39 -https://seclists.org/fulldisclosure/2018/Sep/4 -https://seclists.org/fulldisclosure/2018/Sep/47 -https://seclists.org/fulldisclosure/2019/Apr/12 -https://seclists.org/fulldisclosure/2019/Apr/13 -https://seclists.org/fulldisclosure/2019/May/9 -https://seclists.org/fulldisclosure/2021/Jul/0 -https://seclists.org/fulldisclosure/2022/Apr/1 -https://seclists.org/fulldisclosure/2022/Dec/11 -https://seclists.org/fulldisclosure/2022/Dec/13 -https://seclists.org/fulldisclosure/2022/Jul/11 -https://seclists.org/fulldisclosure/2022/Jun/44 -https://seclists.org/fulldisclosure/2022/Nov/16 -https://seclists.org/fulldisclosure/2022/Nov/18 -https://seclists.org/fulldisclosure/2022/Oct/23 -https://seclists.org/fulldisclosure/2022/Sep/24 -https://seclists.org/fulldisclosure/2022/Sep/29 -https://seclists.org/fulldisclosure/2023/Jul/12 -https://seclists.org/fulldisclosure/2023/Jul/15 -https://seclists.org/fulldisclosure/2023/Jul/33 -https://seclists.org/fulldisclosure/2023/Jul/34 -https://seclists.org/fulldisclosure/2023/Jul/35 -https://seclists.org/fulldisclosure/2023/Jul/36 -https://seclists.org/fulldisclosure/2023/Jul/37 -https://seclists.org/fulldisclosure/2023/Jul/38 -https://seclists.org/fulldisclosure/2023/Jul/39 -https://seclists.org/fulldisclosure/2023/Jul/40 -https://seclists.org/fulldisclosure/2023/Mar/5 -https://seclists.org/fulldisclosure/2023/Nov/2 -https://seclists.org/fulldisclosure/2023/Nov/3 -https://seclists.org/fulldisclosure/2023/Nov/4 -https://seclists.org/fulldisclosure/2023/Nov/5 -https://seclists.org/fulldisclosure/2024/Apr/23 -https://seclists.org/fulldisclosure/2024/Mar/9 -https://seclists.org/oss-sec/2012/q2/396 -https://seclists.org/oss-sec/2022/q2/155 -https://seclists.org/oss-sec/2022/q2/66 -https://seclists.org/oss-sec/2022/q4/178 -https://seclists.org/oss-sec/2022/q4/41 -https://seclists.org/oss-sec/2023/q1/20 -https://seclists.org/oss-sec/2023/q2/276 -https://seclists.org/oss-sec/2023/q3/216 -https://seclists.org/oss-sec/2023/q3/229 -https://seclists.org/oss-sec/2023/q3/242 -https://seclists.org/oss-sec/2023/q4/14 -https://secur1tyadvisory.wordpress.com/2017/03/15/usb-pratirodh-xml-external-entity-injection-vulnerability/ -https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ -https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-cross-site-scripting-vulnerabilities/ -https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ -https://secure77.de/category/subjects/researches/ -https://secure77.de/gog-galaxy-cve-2022-31262/ -https://securelist.com/cve-2018-8453-used-in-targeted-attack -https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html -https://securify.nl/nl/advisory/SFY20180102/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges.html -https://securiteam.io/2019/10/20/cve-2019-12967-moolticute-improper-access-control/ -https://security-consulting.icu/blog/2019/02/wordpress-blog2social-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-contact-form-email-xss-csrf/ -https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/ -https://security-consulting.icu/blog/2019/02/wordpress-give-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-quiz-and-survey-master-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/ -https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/ -https://security.dxw.com/advisories/admin-xss-and-sqli-in-mtouch-quiz-3-0-6/ -https://security.dxw.com/advisories/blind-sqli-vulnerability-in-content-audit-could-allow-a-privileged-attacker-to-exfiltrate-password-hashes/ -https://security.dxw.com/advisories/csrf-and-arbitrary-file-deletion-in-buddypress-activity-plus-1-5/ -https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/ -https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder -https://security.dxw.com/advisories/csrf-and-xss-in-improved-user-search-allow-execution-of-arbitrary-javascript-in-wordpress-admin-area/ -https://security.dxw.com/advisories/csrf-in-contact-form-db-allows-attacker-to-delete-all-stored-form-submissions/ -https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/ -https://security.dxw.com/advisories/csrf-in-member-approval-131109-permits-unapproved-registrations -https://security.dxw.com/advisories/csrf-in-youtube-plugin/ -https://security.dxw.com/advisories/csrf-vulnerability-in-wp-html-sitemap-1-2/ -https://security.dxw.com/advisories/csrfstored-xss-in-quiz-and-survey-master-formerly-quiz-master-next-allows-unauthenticated-attackers-to-do-almost-anything-an-admin-can/ -https://security.dxw.com/advisories/csrfxss-vulnerability-in-private-only-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ -https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 -https://security.dxw.com/advisories/csrfxss-vulnerablity-in-login-widget-with-shortcode-allows-unauthenticated-attackers-to-do-anything-an-admin-can-do -https://security.dxw.com/advisories/end-user-exploitable-local-file-inclusion-vulnerability-in-ajax-pagination-twitter-style-1-1/ -https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/ -https://security.dxw.com/advisories/jw-player-for-flash-html5-video/ -https://security.dxw.com/advisories/local-file-include-vulnerability-in-gd-bbpress-attachments-allows-attackers-to-include-arbitrary-php-files/ -https://security.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ -https://security.dxw.com/advisories/reflected-xss-in-gd-bbpress-attachments-allows-an-attacker-to-do-almost-anything-an-admin-can/ -https://security.dxw.com/advisories/reflected-xss-in-relevanssi-premium-when-using-relevanssi_didyoumean-could-allow-unauthenticated-attacker-to-do-almost-anything-an-admin-can/ -https://security.dxw.com/advisories/reflected-xss-in-the-events-calendar-eventbrite-tickets-allows-unauthenticated-users-to-do-almost-anything-an-admin-can/ -https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do -https://security.dxw.com/advisories/stop-user-enumeration-rest-api/ -https://security.dxw.com/advisories/stored-xss-and-csrf-vulnerabilities-in-subscribe-to-comments-reloaded-140129/ -https://security.dxw.com/advisories/stored-xss-in-plotly-allows-less-privileged-users-to-insert-arbitrary-javascript-into-posts/ -https://security.dxw.com/advisories/stored-xss-in-relevanssi-could-allow-an-unauthenticated-attacker-to-do-almost-anything-an-admin-can-do/ -https://security.dxw.com/advisories/stored-xss-salutation-theme/ -https://security.dxw.com/advisories/the-oauth2-complete-plugin-for-wordpress-uses-a-pseudorandom-number-generator-which-is-non-cryptographically-secure/ -https://security.dxw.com/advisories/vulnerability-in-wp-ban-allows-visitors-to-bypass-the-ip-blacklist-in-some-configurations/ -https://security.dxw.com/advisories/xss-download-manager/ -https://security.dxw.com/advisories/xss-in-unconfirmed-1-2-3/ -https://security.elarlang.eu/cve-2016-10007-and-cve-2016-10008-2-sql-injection-vulnerabilities-in-dotcms-blacklist-defence-bypass.html -https://security.elarlang.eu/cve-2016-4803-dotcms-email-header-injection-vulnerability-full-disclosure.html -https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html -https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html -https://security.elarlang.eu/cve-2018-18809-path-traversal-in-tibco-jaspersoft.html -https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html -https://security.friendsofpresta.org/modules/2023/08/29/cartsguru.html -https://security.friendsofpresta.org/modules/2023/08/29/xmlfeeds.html -https://security.friendsofpresta.org/modules/2023/08/31/leoblog.html -https://security.friendsofpresta.org/modules/2023/08/31/psaffiliate.html -https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html -https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html -https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html -https://security.friendsofpresta.org/modules/2023/10/19/hicarouselspack.html -https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html -https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html -https://security.friendsofpresta.org/modules/2023/10/24/referralbyphone.html -https://security.friendsofpresta.org/modules/2023/10/26/csvfeeds-89.html -https://security.friendsofpresta.org/modules/2023/12/07/bavideotab.html -https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html -https://security.friendsofpresta.org/modules/2024/01/16/jmssetting.html -https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html -https://security.friendsofpresta.org/modules/2024/02/27/ba_importer.html -https://security.friendsofpresta.org/modules/2024/04/25/autosuggest.html -https://security.friendsofpresta.org/modules/2024/04/25/deliveryorderautoupdate.html -https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html -https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html -https://security.humanativaspa.it/nothing-new-under-the-sun/ -https://security.lauritz-holtmann.de/post/sso-security-ssrf/ -https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html -https://security.mioso.com/CVE-2019-11526-en.html -https://security.mioso.com/CVE-2019-11527-en.html -https://security.mioso.com/CVE-2019-11528-en.html -https://security.mioso.com/CVE-2019-15051-en.html -https://security.netapp.com/advisory/ntap-20150127-0001/ -https://security.netapp.com/advisory/ntap-20151029-0001/ -https://security.netapp.com/advisory/ntap-20151106-0001/ -https://security.netapp.com/advisory/ntap-20160211-0001/ -https://security.netapp.com/advisory/ntap-20160217-0002/ -https://security.netapp.com/advisory/ntap-20160310-0004/ -https://security.paloaltonetworks.com/CVE-2020-2036 -https://security.paloaltonetworks.com/CVE-2020-2037 -https://security.paloaltonetworks.com/CVE-2020-2038 -https://security.paloaltonetworks.com/CVE-2020-2039 -https://security.paloaltonetworks.com/CVE-2021-3060 -https://security.paloaltonetworks.com/CVE-2023-0005 -https://security.paloaltonetworks.com/CVE-2024-2432 -https://security.paloaltonetworks.com/CVE-2024-3400 -https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111 -https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112 -https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112 -https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECLOUDTOOLS-2968871 -https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764 -https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 -https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEHTMLUNIT-3252500 -https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378 -https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-3177369 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-3177368 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3175617 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-572317 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557 -https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-7176010 -https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950 -https://security.snyk.io/vuln/SNYK-JS-ACRONTUMFILESYSTEMTEMPLATE-2419071 -https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 -https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 -https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 -https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 -https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318 -https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 -https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876 -https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539 -https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148 -https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148 -https://security.snyk.io/vuln/SNYK-JS-CONFCFGINI-1048973 -https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633 -https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984 -https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951 -https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953 -https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488 -https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404 -https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955 -https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084 -https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337 -https://security.snyk.io/vuln/SNYK-JS-DEFERREDEXEC-1050433 -https://security.snyk.io/vuln/SNYK-JS-DOTLENS-3227646 -https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763 -https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539 -https://security.snyk.io/vuln/SNYK-JS-ETA-2936803 -https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658 -https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 -https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 -https://security.snyk.io/vuln/SNYK-JS-FFMPEGSDK-1050429 -https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149 -https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137 -https://security.snyk.io/vuln/SNYK-JS-FONTCONVERTER-2976194 -https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390 -https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430 -https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174 -https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395 -https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 -https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 -https://security.snyk.io/vuln/SNYK-JS-GOOGLECLOUDSTORAGECOMMANDS-1050431 -https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960 -https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181 -https://security.snyk.io/vuln/SNYK-JS-GRUNTUTILPROPERTY-565088 -https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432 -https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 -https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138 -https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091139 -https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022 -https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029 -https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971 -https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878 -https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970 -https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731 -https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764 -https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165 -https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718 -https://security.snyk.io/vuln/SNYK-JS-LITESERVER-3153540 -https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703 -https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITDECORATE-1044068 -https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067 -https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070 -https://security.snyk.io/vuln/SNYK-JS-MOCKJS-6051365 -https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392 -https://security.snyk.io/vuln/SNYK-JS-MORGANJSON-2976193 -https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915 -https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394 -https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320 -https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3091137 -https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591084 -https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591085 -https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591300 -https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6670046 -https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6861580 -https://security.snyk.io/vuln/SNYK-JS-N158-3183746 -https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747 -https://security.snyk.io/vuln/SNYK-JS-NETWORK-6184371 -https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821 -https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTHSERIALPORT-3311820 -https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691 -https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426 -https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 -https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724 -https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725 -https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 -https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928 -https://security.snyk.io/vuln/SNYK-JS-NPMHELP-1050983 -https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031 -https://security.snyk.io/vuln/SNYK-JS-NTESSERACT-1050982 -https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927 -https://security.snyk.io/vuln/SNYK-JS-P4-3167330 -https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 -https://security.snyk.io/vuln/SNYK-JS-PENDO324GETPROCESSBYNAME-2419094 -https://security.snyk.io/vuln/SNYK-JS-PROGRESSBARJS-3184152 -https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968 -https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616 -https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549 -https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 -https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEREANIMATED-2949507 -https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396 -https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701 -https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373062 -https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064 -https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334 -https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 -https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612 -https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915 -https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916 -https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896 -https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231 -https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108 -https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 -https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391 -https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969 -https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 -https://security.snyk.io/vuln/SNYK-JS-SMOOTHIE-3177364 -https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622 -https://security.snyk.io/vuln/SNYK-JS-SNYKBROKER-570608 -https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679 -https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624 -https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623 -https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677 -https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626 -https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625 -https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680 -https://security.snyk.io/vuln/SNYK-JS-SONARWRAPPER-1050980 -https://security.snyk.io/vuln/SNYK-JS-STATICDEVSERVER-3149917 -https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341 -https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450 -https://security.snyk.io/vuln/SNYK-JS-THENIFY-571690 -https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873 -https://security.snyk.io/vuln/SNYK-JS-TSDEEPMERGE-2959975 -https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450 -https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714 -https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491 -https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614 -https://security.snyk.io/vuln/SNYK-JS-VM2-2990237 -https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858 -https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337 -https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 -https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345 -https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973 -https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381 -https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981 -https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544 -https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222 -https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731 -https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673435 -https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 -https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273 -https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 -https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335 -https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334 -https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336 -https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713 -https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045 -https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234 -https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858 -https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033 -https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 -https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730 -https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 -https://security.snyk.io/vuln/SNYK-PYTHON-PYMONGO-6370597 -https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 -https://security.snyk.io/vuln/SNYK-RUBY-PDFKIT-2869795 -https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107 -https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970 -https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750 -https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751 -https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988732 -https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988735 -https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 -https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 -https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555 -https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720 -https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766 -https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 -https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769 -https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730 -https://security.snyk.io/vuln/SNYK-UNMANAGED-OPEN62541OPEN62541-2988719 -https://security.snyk.io/vuln/SNYK-UNMANAGED-RAYSAN5RAYLIB-5421188 -https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194 -https://security.snyk.io/vuln/npm:pullit:20180214 -https://security.stackexchange.com/questions/225799 -https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html -https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html -https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html -https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35611.html -https://securitybytes.me/posts/cve-2020-9015/ -https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/ -https://securityhitlist.blogspot.com/2019/02/cve-2019-7552-php-scripts-mall.html -https://securityhitlist.blogspot.com/2019/02/cve-2019-7553-stores-xss-in-php-scripts.html -https://securityhitlist.blogspot.com/2019/02/cve-2019-7554-reflected-xss-in-api.html -https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak -https://securitylab.github.com/advisories/GHSL-2020-075-libsane -https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/ -https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET -https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS -https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh/ -https://securitylab.github.com/advisories/GHSL-2020-258-zipslip-bblfshd/ -https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug -https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js -https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ -https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ -https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/ -https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/ -https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ -https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/ -https://securitylab.github.com/advisories/GHSL-2021-027-redos-ProtonMail/ -https://securitylab.github.com/advisories/GHSL-2021-034_043-apache-dubbo/ -https://securitylab.github.com/advisories/GHSL-2021-051-emby/ -https://securitylab.github.com/advisories/GHSL-2021-053-proxyee-down/ -https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ -https://securitylab.github.com/advisories/GHSL-2021-058-moby-hyperkit/ -https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/ -https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/ -https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ -https://securitylab.github.com/advisories/GHSL-2021-065-zstack/ -https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/ -https://securitylab.github.com/advisories/GHSL-2021-1001-textAngular/ -https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/ -https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/ -https://securitylab.github.com/advisories/GHSL-2021-1009-Alpine/ -https://securitylab.github.com/advisories/GHSL-2021-1034_esdoc-publish-html-plugin/ -https://securitylab.github.com/advisories/GHSL-2021-1035_Cockpit_Next/ -https://securitylab.github.com/advisories/GHSL-2021-1042_Baremetrics_Date_Range_Picker/ -https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/ -https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/ -https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/ -https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/ -https://securitylab.github.com/advisories/GHSL-2022-029_nhn_tui_grid/ -https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/ -https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/ -https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/ -https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx -https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/ -https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/ -https://securitylab.github.com/advisories/GHSL-2022-094_discordrb/ -https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/ -https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ -https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/ -https://securitylab.github.com/advisories/GHSL-2023-004_act/ -https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/ -https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/ -https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/ -https://securitylab.github.com/advisories/GHSL-2023-051_React_Native_OneSignal_SDK/ -https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/ -https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/ -https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ -https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos -https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/ -https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/ -https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ -https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ -https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/ -https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ -https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ -https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/ -https://securitylab.github.com/advisories/GHSL-2023-249_Meshery/ -https://securitylab.github.com/advisories/GHSL-2023-253_openrasp -https://securitylab.github.com/advisories/GHSL-2024-013_GHSL-2024-014_Meshery/ -https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss -https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome -https://securitylab.github.com/research/bean-validation-RCE -https://securitylab.github.com/research/github-actions-untrusted-input -https://securitylab.github.com/research/github-actions-untrusted-input/ -https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/ -https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/ -https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/ -https://securityprince.blogspot.in/2017/12/monstra-cms-304-arbitrary-file-upload.html -https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ -https://securityshards.wordpress.com/2018/10/02/cve-2018-17562-faxfinder-5-0-5-8-sqlite-inejection-vulnerability/ -https://securityshards.wordpress.com/2019/04/21/cve-2019-11353-engenius-ews660ap-arbitrary-code-execution/ -https://secwk.blogspot.com/2018/09/seacms-664-xss-vulnerability.html -https://secwk.blogspot.com/2018/09/seacms-664-xss-vulnerability_14.html -https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html -https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ -https://sensepost.com/blog/2020/clash-of-the-spamtitan/ -https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf -https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ -https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data -https://serhack.me/articles/ultimate-member-xss-security-issue -https://sethsec.blogspot.com/2016/11/exploiting-python-code-injection-in-web.html -https://sghosh2402.medium.com/cve-2020-16608-8cdad9f4d9b4 -https://sharemice.github.io/phpcms_xss/ -https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ -https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/ -https://shibboleth.atlassian.net/browse/SSPCPP-961 -https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs -https://shielder.it/blog -https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/ -https://sick.codes/sick-2020-002/ -https://sick.codes/sick-2020-004/ -https://sick.codes/sick-2020-009 -https://sick.codes/sick-2020-012 -https://sick.codes/sick-2021-006 -https://sick.codes/sick-2021-014 -https://sick.codes/sick-2021-018/ -https://sick.codes/sick-2021-111 -https://sick.codes/sick-2022-113 -https://sick.codes/sick-2022-128 -https://sick.codes/sick-2022-42 -https://siggyd.github.io/Advisories/CVE-2017-16566 -https://sinfosec757.blogspot.com/2019/06/exploit-title-workday-32-csv-injection.html -https://sintonen.fi/advisories/aws-cfn-bootstrap-local-code-execution-as-root.txt -https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt -https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt -https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt -https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt -https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243 -https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ -https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/ -https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ -https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/ -https://skypoc.wordpress.com/2023/09/05/vuln1/ -https://sl1nki.page/advisories/CVE-2020-28337 -https://sl1nki.page/blog/2021/02/01/microweber-zip-slip -https://slagle.tech/2020/07/06/cve-2020-15027/ -https://slashd.ga/2020/03/draytek-vulnerabilities/ -https://snicco.io/vulnerability-disclosure/breakdance/client-mode-remote-code-execution-breakdance-1-7-0?_s_id=cve -https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6 -https://snicco.io/vulnerability-disclosure/cwicly/remote-code-execution-cwicly-1-4-0-2?_s_id=cve -https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1 -https://snyk.io/blog/remote-code-execution-rce-sourmint/ -https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction -https://snyk.io/blog/url-confusion-vulnerabilities/ -https://snyk.io/research/sour-mint-malicious-sdk/ -https://snyk.io/research/sour-mint-malicious-sdk/%23rce -https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153 -https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838 -https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152 -https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778 -https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979 -https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINRRRSHOUTRRRPKGUTIL-2849059 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-608301 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGCPIO-570440 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428 -https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441 -https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 -https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874 -https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018 -https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415 -https://snyk.io/vuln/SNYK-JAVA-COMGRAPHHOPPER-1320114 -https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238 -https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988 -https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342 -https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882 -https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450 -https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467402 -https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467404 -https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467406 -https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468868 -https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468869 -https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896 -https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932 -https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1050978 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-572804 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2949784 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050979 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1767165 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910686 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2342127 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2348246 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2632450 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949782 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598862 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293 -https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665 -https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944 -https://snyk.io/vuln/SNYK-JAVA-STROOM-541182 -https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 -https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490 -https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430 -https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421 -https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008 -https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735 -https://snyk.io/vuln/SNYK-JS-ANGULAR-2949781 -https://snyk.io/vuln/SNYK-JS-ANGULAR-534884 -https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849 -https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708 -https://snyk.io/vuln/SNYK-JS-APICONNECTCLIPLUGINS-564427 -https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587 -https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396 -https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799 -https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211 -https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839 -https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424 -https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304 -https://snyk.io/vuln/SNYK-JS-BIGNUM-2388581 -https://snyk.io/vuln/SNYK-JS-BLAMER-559541 -https://snyk.io/vuln/SNYK-JS-BMOOR-2342622 -https://snyk.io/vuln/SNYK-JS-BMOOR-598664 -https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623 -https://snyk.io/vuln/SNYK-JS-BODYMEN-548897 -https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457 -https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 -https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882 -https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657 -https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194 -https://snyk.io/vuln/SNYK-JS-BUNS-1050389 -https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653 -https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555 -https://snyk.io/vuln/SNYK-JS-CASPERJS-572803 -https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493 -https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716 -https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113 -https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431 -https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123 -https://snyk.io/vuln/SNYK-JS-CODECOV-543183 -https://snyk.io/vuln/SNYK-JS-CODECOV-548879 -https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937 -https://snyk.io/vuln/SNYK-JS-COMB-1730083 -https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429 -https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804 -https://snyk.io/vuln/SNYK-JS-COMPONENTFLATTEN-548907 -https://snyk.io/vuln/SNYK-JS-CONFINIT-564433 -https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665 -https://snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337 -https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853 -https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785 -https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212 -https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830 -https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245 -https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244 -https://snyk.io/vuln/SNYK-JS-CONVICT-2340604 -https://snyk.io/vuln/SNYK-JS-CONVICT-2774757 -https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793 -https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870 -https://snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435 -https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434 -https://snyk.io/vuln/SNYK-JS-CURLING-546484 -https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274 -https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106 -https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544 -https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806 -https://snyk.io/vuln/SNYK-JS-DATGUI-1016275 -https://snyk.io/vuln/SNYK-JS-DECAL-1051007 -https://snyk.io/vuln/SNYK-JS-DECAL-1051028 -https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655 -https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666 -https://snyk.io/vuln/SNYK-JS-DEEPLY-451026 -https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984 -https://snyk.io/vuln/SNYK-JS-DEEPS-598667 -https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926 -https://snyk.io/vuln/SNYK-JS-DEXIE-2607042 -https://snyk.io/vuln/SNYK-JS-DICER-2311764 -https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100 -https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425 -https://snyk.io/vuln/SNYK-JS-DJV-1014545 -https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125 -https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952 -https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017 -https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099 -https://snyk.io/vuln/SNYK-JS-DOJO-1535223 -https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668 -https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905 -https://snyk.io/vuln/SNYK-JS-DOTTY-1577292 -https://snyk.io/vuln/SNYK-JS-DROPPY-1023656 -https://snyk.io/vuln/SNYK-JS-DSET-2330881 -https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354 -https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556 -https://snyk.io/vuln/SNYK-JS-EFFECT-564256 -https://snyk.io/vuln/SNYK-JS-EIVIFJDOT-564435 -https://snyk.io/vuln/SNYK-JS-ENPEEM-559007 -https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969 -https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120 -https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404 -https://snyk.io/vuln/SNYK-JS-EXTEND2-2320315 -https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892 -https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 -https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367 -https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368 -https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542 -https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492 -https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269 -https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324 -https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716 -https://snyk.io/vuln/SNYK-JS-FSA-564118 -https://snyk.io/vuln/SNYK-JS-FUNMAP-564436 -https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670 -https://snyk.io/vuln/SNYK-JS-GATSBYPLUGINMDX-2405699 -https://snyk.io/vuln/SNYK-JS-GEDI-598803 -https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 -https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222 -https://snyk.io/vuln/SNYK-JS-GIT-1568518 -https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269 -https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308 -https://snyk.io/vuln/SNYK-JS-GITING-559008 -https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832 -https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310 -https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307 -https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905 -https://snyk.io/vuln/SNYK-JS-GRPC-598671 -https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818 -https://snyk.io/vuln/SNYK-JS-GSAP-1054614 -https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114 -https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126 -https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124 -https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767 -https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029 -https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478 -https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428 -https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355 -https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306 -https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307 -https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656 -https://snyk.io/vuln/SNYK-JS-IMMER-1019369 -https://snyk.io/vuln/SNYK-JS-IMMER-1540542 -https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184 -https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183 -https://snyk.io/vuln/SNYK-JS-INI-1048974 -https://snyk.io/vuln/SNYK-JS-INIPARSER-564122 -https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989 -https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267 -https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672 -https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673 -https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788 -https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766 -https://snyk.io/vuln/SNYK-JS-JAILED-2391490 -https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444 -https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038 -https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578 -https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218 -https://snyk.io/vuln/SNYK-JS-JQUERY-174006 -https://snyk.io/vuln/SNYK-JS-JQUERY-569619 -https://snyk.io/vuln/SNYK-JS-JSCOVER-564250 -https://snyk.io/vuln/SNYK-JS-JSDATA-1023655 -https://snyk.io/vuln/SNYK-JS-JSDATA-1584361 -https://snyk.io/vuln/SNYK-JS-JSEN-1014670 -https://snyk.io/vuln/SNYK-JS-JSGUILANGESSENTIALS-2316897 -https://snyk.io/vuln/SNYK-JS-JSON-597481 -https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287 -https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288 -https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925 -https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939 -https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291 -https://snyk.io/vuln/SNYK-JS-JSPDF-1073626 -https://snyk.io/vuln/SNYK-JS-JSPDF-568273 -https://snyk.io/vuln/SNYK-JS-JSPDF-575256 -https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310 -https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122 -https://snyk.io/vuln/SNYK-JS-JSZIP-1251497 -https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260 -https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 -https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531 -https://snyk.io/vuln/SNYK-JS-KILLING-1078532 -https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535 -https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534 -https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458 -https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708 -https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144 -https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117 -https://snyk.io/vuln/SNYK-JS-LIBPQ-2392366 -https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756 -https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381 -https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520 -https://snyk.io/vuln/SNYK-JS-LINUXCMDLINE-598674 -https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250 -https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597 -https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675 -https://snyk.io/vuln/SNYK-JS-LODASH-1018905 -https://snyk.io/vuln/SNYK-JS-LODASH-1040724 -https://snyk.io/vuln/SNYK-JS-LODASH-450202 -https://snyk.io/vuln/SNYK-JS-LODASH-73639 -https://snyk.io/vuln/SNYK-JS-LSOF-543632 -https://snyk.io/vuln/SNYK-JS-LUTILS-1311023 -https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336 -https://snyk.io/vuln/SNYK-JS-MADGE-1082875 -https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572 -https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676 -https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461 -https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121 -https://snyk.io/vuln/SNYK-JS-MARSCODE-590122 -https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800 -https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880 -https://snyk.io/vuln/SNYK-JS-MERGE-1042987 -https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593 -https://snyk.io/vuln/SNYK-JS-METACALC-2826197 -https://snyk.io/vuln/SNYK-JS-MINDASH-2340605 -https://snyk.io/vuln/SNYK-JS-MINIMIST-559764 -https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212 -https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215 -https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536 -https://snyk.io/vuln/SNYK-JS-MOSC-571492 -https://snyk.io/vuln/SNYK-JS-MOUT-2342654 -https://snyk.io/vuln/SNYK-JS-MPATH-1577289 -https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969 -https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229 -https://snyk.io/vuln/SNYK-JS-MVERSION-573174 -https://snyk.io/vuln/SNYK-JS-NANOID-2332193 -https://snyk.io/vuln/SNYK-JS-NCONF-2395478 -https://snyk.io/vuln/SNYK-JS-NEDB-1305279 -https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977 -https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035 -https://snyk.io/vuln/SNYK-JS-NISUTILS-598799 -https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679 -https://snyk.io/vuln/SNYK-JS-NODEEXTEND-571491 -https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677 -https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261 -https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723 -https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834 -https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415 -https://snyk.io/vuln/SNYK-JS-NODEMPV-564426 -https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678 -https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636 -https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115 -https://snyk.io/vuln/SNYK-JS-NODEPS-1048335 -https://snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-471939 -https://snyk.io/vuln/SNYK-JS-NODERULES-560426 -https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946 -https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115 -https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470 -https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453 -https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 -https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808 -https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259 -https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747 -https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637 -https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857 -https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783 -https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067 -https://snyk.io/vuln/SNYK-JS-PATHVAL-596926 -https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089 -https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360 -https://snyk.io/vuln/SNYK-JS-PGNATIVE-2392365 -https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598 -https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638 -https://snyk.io/vuln/SNYK-JS-PHPJS-598681 -https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539 -https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968 -https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695 -https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533 -https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537 -https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536 -https://snyk.io/vuln/SNYK-JS-POSIX-2400719 -https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595 -https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640 -https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737 -https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581 -https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686 -https://snyk.io/vuln/SNYK-JS-PROMISEPROBE-546816 -https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800 -https://snyk.io/vuln/SNYK-JS-PROTO-1316301 -https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 -https://snyk.io/vuln/SNYK-JS-PSKILL-1078529 -https://snyk.io/vuln/SNYK-JS-PSNODE-1078543 -https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544 -https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122 -https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009 -https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487 -https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488 -https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867 -https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803 -https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907 -https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285 -https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907 -https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908 -https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024 -https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 -https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124 -https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123 -https://snyk.io/vuln/SNYK-JS-RPI-548942 -https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076 -https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801 -https://snyk.io/vuln/SNYK-JS-SAFEREVAL-534901 -https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687 -https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970 -https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884 -https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829 -https://snyk.io/vuln/SNYK-JS-SDS-2385944 -https://snyk.io/vuln/SNYK-JS-SDS-564123 -https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221 -https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222 -https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010 -https://snyk.io/vuln/SNYK-JS-SETIN-2388571 -https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541 -https://snyk.io/vuln/SNYK-JS-SETVALUE-450213 -https://snyk.io/vuln/SNYK-JS-SEY-1727592 -https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199 -https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306 -https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157 -https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607 -https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609 -https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610 -https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611 -https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570612 -https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859 -https://snyk.io/vuln/SNYK-JS-SOCKJS-548397 -https://snyk.io/vuln/SNYK-JS-SOCKJS-575261 -https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333 -https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645 -https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362 -https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388 -https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945 -https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248 -https://snyk.io/vuln/SNYK-JS-SVELTE-2931080 -https://snyk.io/vuln/SNYK-JS-SWIPER-1088062 -https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909 -https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753 -https://snyk.io/vuln/SNYK-JS-TAFFY-546521 -https://snyk.io/vuln/SNYK-JS-TEDDY-1579557 -https://snyk.io/vuln/SNYK-JS-TEMPL8-598770 -https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633 -https://snyk.io/vuln/SNYK-JS-TERSER-2806366 -https://snyk.io/vuln/SNYK-JS-THREE-1064931 -https://snyk.io/vuln/SNYK-JS-TINYCONF-598792 -https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527 -https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671 -https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672 -https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069 -https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607 -https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707 -https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774 -https://snyk.io/vuln/SNYK-JS-TRIM-1017038 -https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850 -https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382 -https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009 -https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334 -https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599 -https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226 -https://snyk.io/vuln/SNYK-JS-UMOUNT-564265 -https://snyk.io/vuln/SNYK-JS-UNDEFSAFE-548940 -https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984 -https://snyk.io/vuln/SNYK-JS-UNGIT-2414099 -https://snyk.io/vuln/SNYK-JS-URLJS-2414030 -https://snyk.io/vuln/SNYK-JS-URLREGEX-569472 -https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497 -https://snyk.io/vuln/SNYK-JS-VALIB-559015 -https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223 -https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429 -https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 -https://snyk.io/vuln/SNYK-JS-VM2-1585918 -https://snyk.io/vuln/SNYK-JS-VM2-2309905 -https://snyk.io/vuln/SNYK-JS-VM2-473188 -https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623 -https://snyk.io/vuln/SNYK-JS-WINCRED-1078538 -https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798 -https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201 -https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314 -https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935 -https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936 -https://snyk.io/vuln/SNYK-JS-Y18N-1021887 -https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381 -https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477 -https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820 -https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585 -https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 -https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969 -https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226 -https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856 -https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885 -https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405 -https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132 -https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297 -https://snyk.io/vuln/SNYK-PHP-SCARTCORE-1047342 -https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036 -https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035 -https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554 -https://snyk.io/vuln/SNYK-PHP-TOPTHINKFRAMEWORK-2385695 -https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879 -https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108 -https://snyk.io/vuln/SNYK-PYTHON-CABOT-609862 -https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 -https://snyk.io/vuln/SNYK-PYTHON-CODECOV-552149 -https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281 -https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189 -https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188 -https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334 -https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107 -https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994 -https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204 -https://snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140 -https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141 -https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345 -https://snyk.io/vuln/SNYK-PYTHON-PYRAD-40000 -https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562 -https://snyk.io/vuln/SNYK-PYTHON-QLIB-1054635 -https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145 -https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324 -https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643 -https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471 -https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560 -https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088 -https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 -https://snyk.io/vuln/SNYK-RUBY-AGOO-569137 -https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602 -https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093 -https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278 -https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280 -https://snyk.io/vuln/SNYK-RUBY-GIT-2421270 -https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136 -https://snyk.io/vuln/SNYK-RUBY-REEL-569135 -https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830 -https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180 -https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336163 -https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336164 -https://snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-2407243 -https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332 -https://snyk.io/vuln/SNYK-UNMANAGED-SPRINFALLWEBCC-2404182 -https://snyk.io/vuln/npm:braces:20180219 -https://snyk.io/vuln/npm:bson:20180225 -https://snyk.io/vuln/npm:highcharts:20180225 -https://snyk.io/vuln/npm:hoek:20180212 -https://snyk.io/vuln/npm:traceroute:20160311 -https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1 -https://somevulnsofadlab.blogspot.com/2017/07/libquicktimeallocation-failed-in.html -https://somevulnsofadlab.blogspot.com/2017/07/libquicktimeallocation-failed-in_30.html -https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ -https://sospiro014.github.io/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-+-Account-Takeover -https://sospiro014.github.io/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection -https://sourceforge.net/p/advancemame/bugs/259/ -https://sourceforge.net/p/advancemame/bugs/271/ -https://sourceforge.net/p/advancemame/bugs/272/ -https://sourceforge.net/p/advancemame/bugs/277/ -https://sourceforge.net/p/atftp/code/ci/abed7d245d8e8bdfeab24f9f7f55a52c3140f96b/ -https://sourceforge.net/p/axtls/mailman/message/36459928/ -https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/ -https://sourceforge.net/p/djvu/bugs/344/ -https://sourceforge.net/p/djvu/bugs/345/ -https://sourceforge.net/p/enigmail/bugs/709/ -https://sourceforge.net/p/enigmail/bugs/984/ -https://sourceforge.net/p/ezxml/bugs/29/ -https://sourceforge.net/p/flexjson/bugs/48/ -https://sourceforge.net/p/flexjson/bugs/49/ -https://sourceforge.net/p/flexjson/bugs/50/ -https://sourceforge.net/p/flexjson/bugs/51/ -https://sourceforge.net/p/giflib/bugs/159/ -https://sourceforge.net/p/giflib/bugs/167/ -https://sourceforge.net/p/gnuplot/bugs/1933/ -https://sourceforge.net/p/gnuplot/bugs/2303/ -https://sourceforge.net/p/gnuplot/bugs/2358/ -https://sourceforge.net/p/graphicsmagick/bugs/430/ -https://sourceforge.net/p/graphicsmagick/bugs/433/ -https://sourceforge.net/p/graphicsmagick/bugs/434/ -https://sourceforge.net/p/graphicsmagick/bugs/435/ -https://sourceforge.net/p/graphicsmagick/bugs/436/ -https://sourceforge.net/p/graphicsmagick/bugs/438/ -https://sourceforge.net/p/graphicsmagick/bugs/446/ -https://sourceforge.net/p/graphicsmagick/bugs/459/ -https://sourceforge.net/p/graphicsmagick/bugs/461/ -https://sourceforge.net/p/graphicsmagick/bugs/512/ -https://sourceforge.net/p/graphicsmagick/bugs/521/ -https://sourceforge.net/p/graphicsmagick/bugs/522/ -https://sourceforge.net/p/graphicsmagick/bugs/523/ -https://sourceforge.net/p/graphicsmagick/bugs/525/ -https://sourceforge.net/p/graphicsmagick/bugs/526/ -https://sourceforge.net/p/graphicsmagick/bugs/533/ -https://sourceforge.net/p/graphicsmagick/bugs/540/ -https://sourceforge.net/p/graphicsmagick/bugs/541/ -https://sourceforge.net/p/graphicsmagick/bugs/554/ -https://sourceforge.net/p/graphicsmagick/bugs/585/ -https://sourceforge.net/p/graphicsmagick/bugs/603/ -https://sourceforge.net/p/graphicsmagick/bugs/619/ -https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/ -https://sourceforge.net/p/ini4j/bugs/56/ -https://sourceforge.net/p/itop/tickets/1585/ -https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/ -https://sourceforge.net/p/lame/bugs/458/ -https://sourceforge.net/p/lame/bugs/460/ -https://sourceforge.net/p/libexif/bugs/130/ -https://sourceforge.net/p/libpng/bugs/300/ -https://sourceforge.net/p/libquicktime/mailman/message/35888849/ -https://sourceforge.net/p/libquicktime/mailman/message/35888850/ -https://sourceforge.net/p/mcj/tickets/125/ -https://sourceforge.net/p/mcj/tickets/28/ -https://sourceforge.net/p/mcj/tickets/57/ -https://sourceforge.net/p/mcj/tickets/58/ -https://sourceforge.net/p/mcj/tickets/59/ -https://sourceforge.net/p/mcj/tickets/61/ -https://sourceforge.net/p/mcj/tickets/62/ -https://sourceforge.net/p/mcj/tickets/63/ -https://sourceforge.net/p/mcj/tickets/64/ -https://sourceforge.net/p/mcj/tickets/65/ -https://sourceforge.net/p/mcj/tickets/71/ -https://sourceforge.net/p/mcj/tickets/72/ -https://sourceforge.net/p/mcj/tickets/73/ -https://sourceforge.net/p/mcj/tickets/74/ -https://sourceforge.net/p/mcj/tickets/75/ -https://sourceforge.net/p/mcj/tickets/76/ -https://sourceforge.net/p/mcj/tickets/77/ -https://sourceforge.net/p/mcj/tickets/78/ -https://sourceforge.net/p/mediainfo/bugs/1101/ -https://sourceforge.net/p/mediainfo/bugs/1127/ -https://sourceforge.net/p/mediainfo/bugs/1154/ -https://sourceforge.net/p/mp3gain/bugs/46/ -https://sourceforge.net/p/mpg123/bugs/255/ -https://sourceforge.net/p/nasm/bugs/561/ -https://sourceforge.net/p/net-snmp/bugs/2615/ -https://sourceforge.net/p/openocd/mailman/message/36188041/ -https://sourceforge.net/p/optipng/bugs/65/ -https://sourceforge.net/p/optipng/bugs/69/ -https://sourceforge.net/p/p7zip/bugs/241/ -https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db/ -https://sourceforge.net/p/peazip/tickets/734/ -https://sourceforge.net/p/plib/bugs/55/ -https://sourceforge.net/p/podofo/code/1969 -https://sourceforge.net/p/podofo/tickets/13/ -https://sourceforge.net/p/podofo/tickets/27/ -https://sourceforge.net/p/podofo/tickets/32/ -https://sourceforge.net/p/podofo/tickets/33/ -https://sourceforge.net/p/podofo/tickets/40/ -https://sourceforge.net/p/podofo/tickets/46/ -https://sourceforge.net/p/podofo/tickets/48/ -https://sourceforge.net/p/podofo/tickets/49/ -https://sourceforge.net/p/podofo/tickets/75/ -https://sourceforge.net/p/snap7/discussion/bugfix/thread/456d76fdde/ -https://sourceforge.net/p/sox/bugs/297/ -https://sourceforge.net/p/sox/bugs/299/ -https://sourceforge.net/p/sox/bugs/360/ -https://sourceforge.net/p/tcpdf/bugs/1005/ -https://sourceforge.net/p/tuxguitar/bugs/126/ -https://sourceforge.net/p/webtareas/tickets/43/ -https://sourceforge.net/p/webtareas/tickets/44/ -https://sourceforge.net/p/yajsw/bugs/166/ -https://sourceforge.net/p/zint/tickets/181/ -https://sourceforge.net/project/shownotes.php?group_id=138780&release_id=571924 -https://sourceware.org/bugzilla/show_bug.cgi?id=22421 -https://sourceware.org/bugzilla/show_bug.cgi?id=31058 -https://spawnzii.github.io/posts/2022/07/how-we-have-pwned-root-me-in-2022/ -https://spectreattack.com/ -https://sploitus.com/exploit?id=1337DAY-ID-37364&utm_source=rss&utm_medium=rss -https://squirro.atlassian.net/wiki/spaces/DOC/pages/2389672672/CVE-2021-27945+-+Cross-Site+Scripting -https://srcincite.io/advisories/src-2018-0007/ -https://srcincite.io/advisories/src-2020-0011/ -https://srcincite.io/advisories/src-2021-0015/ -https://srcincite.io/advisories/src-2022-0014/ -https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html -https://srcincite.io/blog/2018/10/02/old-school-pwning-with-new-school-tricks-vanilla-forums-remote-code-execution.html -https://srcincite.io/pocs/src-2020-0011.py.txt -https://srpopty.github.io/2023/02/15/Vulnerability-Discuz-X3.4-Reflected-XSS-(CVE-2022-45543)/ -https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-group/ -https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-story/ -https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/ -https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp -https://ssl.icu-project.org/trac/changeset/40715 -https://ssl.icu-project.org/trac/ticket/13510 -https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ -https://stackoverflow.com/questions/42170239/security-of-rand-in-ruby-compared-to-other-methods/42170560 -https://starlabs.sg/advisories/22/22-0216/ -https://starlabs.sg/advisories/23/23-1713/ -https://starlabs.sg/advisories/23/23-1714/ -https://starlabs.sg/advisories/23/23-1715/ -https://starlabs.sg/advisories/23/23-1717/ -https://starlabs.sg/advisories/23/23-1718/ -https://starlabs.sg/advisories/23/23-1719/ -https://starlabs.sg/advisories/23/23-1720/ -https://starlabs.sg/advisories/23/23-2017/ -https://starlabs.sg/advisories/23/23-2110/ -https://starlabs.sg/advisories/23/23-2315/ -https://starlabs.sg/advisories/23/23-2316/ -https://starlabs.sg/advisories/23/23-2317/ -https://starlabs.sg/advisories/23/23-2318/ -https://starlabs.sg/advisories/23/23-2971/ -https://starlabs.sg/advisories/23/23-30591/ -https://starlabs.sg/advisories/23/23-3368/ -https://starlabs.sg/advisories/23/23-3513/ -https://starlabs.sg/advisories/23/23-3514/ -https://starlabs.sg/advisories/23/23-3533/ -https://starlabs.sg/advisories/23/23-3545/ -https://starlabs.sg/advisories/23/23-4197 -https://starlabs.sg/advisories/23/23-4198 -https://starlabs.sg/advisories/23/23-4220 -https://starlabs.sg/advisories/23/23-4221 -https://starlabs.sg/advisories/23/23-4222 -https://starlabs.sg/advisories/23/23-4223 -https://starlabs.sg/advisories/23/23-4224 -https://starlabs.sg/advisories/23/23-4225 -https://starlabs.sg/advisories/23/23-4226 -https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ -https://startrekdude.github.io/arqbackup.html -https://startrekdude.github.io/mailbird.html -https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip -https://stigward.github.io/posts/fiio-m6-exploit/ -https://stiltsoft.atlassian.net/browse/VD-1 -https://stiltsoft.atlassian.net/browse/VD-2 -https://stiltsoft.atlassian.net/browse/VD-3 -https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/ -https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3 -https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve -https://stulle123.github.io/posts/kakaotalk-account-takeover/ -https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html -https://sudoat.blogspot.in/2017/04/xss-vulnerability-in-multiple-emli.html -https://suid.ch/research/CVE-2019-25023.html -https://suku90.wordpress.com/2018/12/13/php-b2b-script-stored-xss/ -https://summitinfosec.com/blog/x-ray-vision-identifying-cve-2023-25199-and-cve-2023-25200-in-manufacturing-equipment/ -https://sumukh30.blogspot.com/2020/01/cross-site-scripting-vulnerability-in.html -https://sumukh30.blogspot.com/2020/01/normal-0-false-false-false-en-us-x-none.html?m=1 -https://support.1password.com/kb/202010/ -https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 -https://support.norton.com/sp/static/external/tools/security-advisories.html -https://support.ruckuswireless.com/documents -https://support.zabbix.com/browse/ZBX-10272 -https://support.zabbix.com/browse/ZBX-24505 -https://support.zabbix.com/browse/ZBX-3835 -https://support.zabbix.com/browse/ZBX-4385 -https://support.zabbix.com/browse/ZBX-6097 -https://support.zabbix.com/browse/ZBX-8151 -https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 -https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10190 -https://sushantvkamble.blogspot.com/2021/11/cross-site-scripting-xss.html -https://susos.co/blog/f/cve-disclosureuncovered-sql-injection-in-tripspark-veo-transport -https://suumcuique.org/blog/posts/information-disclosure-vulnerability-universis -https://suumcuique.org/blog/posts/sql-injection-vulnerability-universis/ -https://svn.dd-wrt.com/ticket/7039 -https://swarm.ptsecurity.com/rce-in-f5-big-ip/ -https://sweet32.info/ -https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/ -https://syhack.wordpress.com/2019/09/29/ilch-content-management-system-v-2-1-22-vulnerability-disclosure/ -https://syhack.wordpress.com/2020/04/18/pnotes-insecure-file-upload-vulnerability-code-execution/ -https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ -https://syntegris-sec.github.io/filerun-advisory -https://sysdig.com/blog/cve-2019-8339-falco-vulnerability/ -https://syst1m.cn/2024/01/22/U%E9%AA%8C%E8%AF%81%E7%BD%91%E7%BB%9C%E7%94%A8%E6%88%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ -https://systemoverlord.com/2017/12/18/cve-2017-17704-broken-cryptography-in-istar-ultra-ip-acm-by-software-house.html -https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 -https://t.me/joinchat/bJ9cnUosVh03ZTI0 -https://t2.fi/schedule/2019/ -https://tailscale.com/security-bulletins/#ts-2022-004 -https://tailscale.com/security-bulletins/#ts-2022-005 -https://tailscale.com/security-bulletins/#ts-2023-003 -https://takeonme.org/cves/CVE-2023-0666.html -https://takeonme.org/cves/CVE-2023-0667.html -https://takeonme.org/cves/CVE-2023-0668.html -https://takeonme.org/cves/CVE-2023-2905.html -https://takeonme.org/cves/CVE-2023-2906.html -https://takeonme.org/cves/CVE-2023-4504.html -https://takeonme.org/cves/CVE-2023-5841.html -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0276 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0277 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0291 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0293 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0314 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0320 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0343 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0344 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0345 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0346 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0347 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0348 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0349 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0350 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0352 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0358 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0378 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0380 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0382 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0384 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0385 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0386 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0417 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0447 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0486 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502 -https://talosintelligence.com/vulnerability_reports/TALOS-2017-0507 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0535 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0539 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0554 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0557 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0574 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0576 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0578 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0582 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0586 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0607 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0609 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0612 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0613 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0618 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0622 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0629 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0650 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0651 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0652 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0653 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0658 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0660 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0661 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0662 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0663 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0664 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0665 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0668 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0669 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0671 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0672 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0673 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0674 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0678 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0679 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0702 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0711 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0712 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0713 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0728 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0749 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0752 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0753 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0754 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755 -https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0759 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0760 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0761 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0773 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0775 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0784 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0790 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0793 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0830 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0831 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0832 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0838 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0858 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0859 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0862 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0864 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0878 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0897 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0915 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0920 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0923 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0925 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0932 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0934 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0935 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0939 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0940 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0941 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0955 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0961 -https://talosintelligence.com/vulnerability_reports/TALOS-2019-0965 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1041 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1043 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1062 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1063 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1082 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1084 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1104 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1113 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1114 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1115 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1116 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1120 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1125 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1145 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1161 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1162 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1163 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1165 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1168 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1176 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1178 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1180 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1183 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1190 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1192 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1197 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214 -https://talosintelligence.com/vulnerability_reports/TALOS-2020-1217 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1231 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1264 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1265 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1267 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1282 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1284 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1285 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1287 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1294 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1304 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1307 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1331 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1333 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1335 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1336 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1338 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1356 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1358 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1370 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1393 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431 -https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1469 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1474 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1475 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1477 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1478 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1500 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1529 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1539 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1541 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1546 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1555 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1556 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1557 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1561 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1562 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1563 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1565 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1570 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1595 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1600 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1602 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1606 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1610 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1611 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1614 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1683 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1684 -https://talosintelligence.com/vulnerability_reports/TALOS-2022-1687 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1696 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1698 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1699 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1711 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1722 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1745 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1756 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1845 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1863 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1865 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1866 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1869 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1883 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1884 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897 -https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898 -https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931 -https://talosintelligence.com/vulnerability_reports/TALOS-2024-1958 -https://talosintelligence.com/vulnerability_reports/TALOS-2024-1959 -https://talosintelligence.com/vulnerability_reports/TALOS-2024-1963 -https://tantosec.com/blog/cve-2022-41343/ -https://tanzhuyin.com/posts/cve-2024-25458/ -https://tbutler.org/2021/04/29/teradek-vulnerability-advisory -https://tbutler.org/2021/06/28/cve-2021-35956 -https://tches.iacr.org/index.php/TCHES/article/view/7337 -https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036 -https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912 -https://tech.feedyourhead.at/content/full-disclosure-remote-command-execution-in-phkp -https://tech.feedyourhead.at/content/remote-code-execution-in-suricata-update -https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/ -https://tejaspingulkar.blogspot.com -https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11560-title-clear-text.html -https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11561-title-escalation-via.html -https://tejaspingulkar.blogspot.com/2020/06/cve-2020-13480-verint-html-injection.html -https://tejaspingulkar.blogspot.com/2020/09/cve-2020-23446-verint-workforce.html -https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13473-nch-account-clear-text.html -https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13474-nch-express-accounts.html -https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13475-nch-accounts-cross-site.html -https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways -https://tenable.com/security/research/TRA-2022-35 -https://tenable.com/security/research/tra-2023-16 -https://tenable.com/security/research/tra-2023-33 -https://tenable.com/security/research/tra-2023-36 -https://tenable.com/security/research/tra-2023-43 -https://tetraburst.com/ -https://thanatosxingyu.github.io/ -https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/ -https://thanhlocpanda.wordpress.com/2021/07/31/stored-xss-via-svg-on-suitecrm/ -https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ -https://the-it-wonders.blogspot.com/2021/05/joplin-app-desktop-version-vulnerable.html -https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content.html -https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content_17.html -https://the-it-wonders.blogspot.com/2022/04/csv-injection-in-acunetix-version.html -https://thebestvpn.com/cyberoam-preauth-rce/ -https://thebinary0x1.medium.com/cve-2020-26050-safervpn-for-windows-local-privilege-escalation-da069bb1373c -https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite -https://thehackernews.com/2018/02/wordpress-dos-exploit.html -https://thehackernews.com/2019/04/xiaomi-browser-vulnerability.html -https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG -https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html -https://this-is-y.xyz/2022/11/20/baijiacmsV4-RCE/ -https://thomask.sdf.org/blog/2019/08/07/cve-2019-14432-loom-desktop-rce-vulnerability.html -https://threatpost.com/adobe-cve-2011-2461-remains-exploitable-four-years-after-patch/111754 -https://threatpost.com/scans-cisco-routers-code-execution/141218/ -https://threeshield.ca/easyxdm-2.5.20.html -https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html -https://toandak.blogspot.com/2020/05/csrf-vulnerbility-in-chamilo-lms.html -https://toandak.blogspot.com/2020/05/improper-privilege-management-in.html -https://tomekwasiak.pl/cve-2024-22854/ -https://tomiodarim.io/posts/cve-2024-22632-3/ -https://tomiodarim.io/posts/cve-2024-26504/ -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu -https://tortel.li/post/insecure-scope/ -https://trac.ffmpeg.org/ticket/10686 -https://trac.ffmpeg.org/ticket/10686#no1 -https://trac.ffmpeg.org/ticket/10688 -https://trac.ffmpeg.org/ticket/10691 -https://trac.ffmpeg.org/ticket/10699 -https://trac.ffmpeg.org/ticket/10700 -https://trac.ffmpeg.org/ticket/10701 -https://trac.ffmpeg.org/ticket/10702 -https://trac.ffmpeg.org/ticket/10738 -https://trac.ffmpeg.org/ticket/10743 -https://trac.ffmpeg.org/ticket/10746 -https://trac.ffmpeg.org/ticket/10749 -https://trac.ffmpeg.org/ticket/10753 -https://trac.ffmpeg.org/ticket/10756 -https://trac.ffmpeg.org/ticket/10758 -https://trac.ffmpeg.org/ticket/5992 -https://trac.ffmpeg.org/ticket/8093 -https://trac.ffmpeg.org/ticket/8094 -https://trac.ffmpeg.org/ticket/8176 -https://trac.ffmpeg.org/ticket/8183 -https://trac.ffmpeg.org/ticket/8186 -https://trac.ffmpeg.org/ticket/8188 -https://trac.ffmpeg.org/ticket/8190 -https://trac.ffmpeg.org/ticket/8236 -https://trac.ffmpeg.org/ticket/8239 -https://trac.ffmpeg.org/ticket/8240 -https://trac.ffmpeg.org/ticket/8241 -https://trac.ffmpeg.org/ticket/8242 -https://trac.ffmpeg.org/ticket/8243 -https://trac.ffmpeg.org/ticket/8244 -https://trac.ffmpeg.org/ticket/8246 -https://trac.ffmpeg.org/ticket/8250 -https://trac.ffmpeg.org/ticket/8260 -https://trac.ffmpeg.org/ticket/8261 -https://trac.ffmpeg.org/ticket/8262 -https://trac.ffmpeg.org/ticket/8263 -https://trac.ffmpeg.org/ticket/8264 -https://trac.ffmpeg.org/ticket/8265 -https://trac.ffmpeg.org/ticket/8267 -https://trac.ffmpeg.org/ticket/8273 -https://trac.ffmpeg.org/ticket/8274 -https://trac.ffmpeg.org/ticket/8275 -https://trac.ffmpeg.org/ticket/8281 -https://trac.ffmpeg.org/ticket/8282 -https://trac.ffmpeg.org/ticket/8283 -https://trac.ffmpeg.org/ticket/8284 -https://trac.ffmpeg.org/ticket/8285 -https://trac.ffmpeg.org/ticket/8294 -https://trac.ffmpeg.org/ticket/8295 -https://trac.ffmpeg.org/ticket/8296 -https://trac.ffmpeg.org/ticket/8302 -https://trac.ffmpeg.org/ticket/8303 -https://trac.ffmpeg.org/ticket/8304 -https://trac.ffmpeg.org/ticket/8309 -https://trac.ffmpeg.org/ticket/8310 -https://trac.ffmpeg.org/ticket/8313 -https://trac.ffmpeg.org/ticket/8314 -https://trac.ffmpeg.org/ticket/8315 -https://trac.ffmpeg.org/ticket/8317 -https://trac.ffmpeg.org/ticket/8673 -https://trac.ffmpeg.org/ticket/8863 -https://trac.ffmpeg.org/ticket/9312 -https://trac.transmissionbt.com/ticket/4979 -https://trac.videolan.org/vlc/ticket/10482 -https://trac.videolan.org/vlc/ticket/13389 -https://trac.videolan.org/vlc/ticket/18467 -https://tracker.freecad.org/view.php?id=4809 -https://trmm.net/Thunderstrike -https://trmm.net/Thunderstrike_FAQ -https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt -https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt -https://trovent.github.io/security-advisories/TRSA-2105-02/TRSA-2105-02.txt -https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt -https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt -https://trovent.github.io/security-advisories/TRSA-2303-01/TRSA-2303-01.txt -https://trovent.io/security-advisory-2010-01 -https://trovent.io/security-advisory-2105-01 -https://trovent.io/security-advisory-2105-02 -https://trovent.io/security-advisory-2106-01 -https://trovent.io/security-advisory-2109-01 -https://trovent.io/security-advisory-2303-01/ -https://truedigitalsecurity.com/advisory-summary-2021 -https://truedigitalsecurity.com/services/penetration-testing-services/advisory-summary-2.2022-cve-2021-42940 -https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html -https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html -https://tug.org/pipermail/tex-live/2023-August/049400.html -https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91 -https://tuleap.net/plugins/tracker/?aid=10118 -https://tusharvaidya16.medium.com/local-services-search-engine-management-system-project-lssmes-1-0-af2cae7cbbf -https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html -https://tvrbk.github.io/cve/2021/03/07/rumpus.html -https://typo3.org/security/advisory/typo3-sa-2010-012/#Arbitrary_Code_Execution -https://typo3.org/security/advisory/typo3-sa-2010-012/#Broken_Authentication_and_Session_Management -https://typo3.org/security/advisory/typo3-sa-2010-012/#Header_Injection -https://typo3.org/security/advisory/typo3-sa-2010-012/#Information_Disclosure -https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness -https://typo3.org/security/advisory/typo3-sa-2010-012/#Open_Redirection -https://typo3.org/security/advisory/typo3-sa-2010-012/#SQL_Injection -https://typo3.org/security/advisory/typo3-sa-2010-012/#Spam_Abuse -https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS -https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/ -https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html -https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ -https://unicode-org.atlassian.net/browse/ICU-20246 -https://unicode-org.atlassian.net/browse/ICU-20850 -https://unicode-org.atlassian.net/browse/ICU-20958 -https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities -https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ -https://unit42.paloaltonetworks.com/cve-2024-3400/ -https://unothing.github.io/posts/phpok48278/ -https://unothing.github.io/posts/thinkcmfx223/ -https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ -https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt -https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt -https://unsaflok.com -https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/ -https://updates.mailmate-app.com/2.0/release_notes -https://updates.mailmate-app.com/release_notes -https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01 -https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-288-01 -https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png -https://usn.ubuntu.com/3738-1/ -https://usn.ubuntu.com/4118-1/ -https://usn.ubuntu.com/4559-1/ -https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-update-can-get-you-pwned/ -https://verneet.com/cve-2022-40711/ -https://versprite.com/blog/security-research/windows-registry/ -https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 -https://vigilance.fr/vulnerability/vsftpd-backdoor-in-version-2-3-4-10805 -https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html -https://vinhjaxt.github.io/2019/03/cve-2019-6715 -https://vipinxsec.blogspot.com/2018/04/reflected-xss-in-documentum-d2.html -https://vipinxsec.blogspot.com/2018/04/stored-xss-in-documentum-d2-steps-to.html -https://vipinxsec.blogspot.com/2019/11/alfresco-stored-xss-vulnerability-blind.html -https://visat.me/security/cve-2019-19502/ -https://vishwarajbhattrai.wordpress.com/2019/03/22/content-provider-injection-in-xiaomi-stock-browser -https://vitor-santos.medium.com/xss-in-kyocera-printer-ecosys-m2640idw-cf6d3bc525e3 -https://voidsec.com -https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/ -https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ -https://voidsec.com/advisories/cve-2021-40826/ -https://voidsec.com/advisories/cve-2021-40827/ -https://voidsec.com/advisories/cve-2021-44899/ -https://voidsec.com/advisories/cve-2021-44900/ -https://voidsec.com/advisories/cve-2021-44901/ -https://voidsec.com/advisories/cve-2021-44903/ -https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/ -https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236 -https://voidsec.com/tivoli-madness/ -https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager -https://voidsec.com/vpn-leak/ -https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/ -https://vrls.ws/posts/2021/08/samourai-wallet-bitcoin-pin-authentication-bypass-crypto/ -https://vuldb.com/?id.1022 -https://vuldb.com/?id.113806 -https://vuldb.com/?id.126695 -https://vuldb.com/?id.126699 -https://vuldb.com/?id.159430 -https://vuldb.com/?id.164510 -https://vuldb.com/?id.203178 -https://vuldb.com/?id.205820 -https://vuldb.com/?id.205831 -https://vuldb.com/?id.205837 -https://vuldb.com/?id.206022 -https://vuldb.com/?id.206401 -https://vuldb.com/?id.206486 -https://vuldb.com/?id.206688 -https://vuldb.com/?id.206845 -https://vuldb.com/?id.220638 -https://vuldb.com/?id.242170 -https://vuldb.com/?id.243800 -https://vuldb.com/?id.248952 -https://vuldb.com/?id.249356 -https://vuldb.com/?id.250446 -https://vuldb.com/?id.250716 -https://vuldb.com/?submit.304556 -https://vuldb.com/?submit.304572 -https://vuldb.com/?submit.307752 -https://vuldb.com/?submit.307761 -https://vuldb.com/?submit.320855 -https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759 -https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180 -https://vuln.be/post/rebar3-command-injection/ -https://vuln.be/post/yaws-xxe-and-shell-injections/ -https://vuln.shellcoder.party/2020/07/18/cve-2017-16629-sapphireims-login-page-information-disclosure/ -https://vuln.shellcoder.party/2020/07/18/cve-2017-16630-sapphireims-idor-based-privilege-elevation/ -https://vuln.shellcoder.party/2020/07/18/cve-2017-16631-sapphireims-idor-on-password-reset/ -https://vuln.shellcoder.party/2020/07/18/cve-2017-16632-sapphireims-insecure-storage-of-password/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25560-sapphireims-unauthenticated-remote-command-execution-on-server/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25561-sapphireims-hardcoded-credentials/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25562-sapphireims-csrf/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25563-sapphireims-unauthenticated-remote-command-execution-create-local-admin-on-clients/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25564-sapphireims-unprivileged-user-remote-command-execution-create-local-admin-on-clients/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ -https://vuln.shellcoder.party/2020/09/19/cve-2020-25566-sapphireims-unauthenticated-account-takeover/ -https://vulnerabilities.home.blog/2019/10/27/again-a-vunerability-in-cable-router-ch7465lg-cve-2019-17224/ -https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html -https://vulners.com/exploitdb/EDB-ID:46377 -https://vulners.com/packetstorm/PACKETSTORM:172559 -https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625 -https://vulners.com/zdt/1337DAY-ID-37036 -https://vyshnavvizz.blogspot.com/2020/01/html-injection-in-codoforum-v483.html -https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in.html -https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in_2.html -https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog -https://w1n73r.de/CVE/2019/17584/ -https://warcollar.com/cve-2020-24753.html -https://watchmysys.com/blog/2017/06/cve-2017-8083-compulab-intensepc-lacks-bios-wp/ -https://watchmysys.com/blog/2017/07/cve-2017-9457-compulab-intense-pc-lacks-firmware-validation/ -https://weakdh.org/ -https://weakdh.org/imperfect-forward-secrecy.pdf -https://wearetradecraft.com/advisories/tc-2021-0002/ -https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html -https://web.archive.org/web/20121014055829/http://www.cloudscan.me/2012/09/cve-2012-1500-ghs-5375-ghs-5642.html -https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html -https://web.archive.org/web/20130817120539/http://www.otrs.com/de/open-source/community-news/security-advisories/security-advisory-2013-05/ -https://web.archive.org/web/20150423041900/http://labs.davidsopas.com/2013/10/how-salesman-could-hack-prestashop.html -https://web.archive.org/web/20160317182930/http://www.cloudscan.me/2013/03/cve-2012-1903-stored-xss-javascript.html -https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ -https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html -https://web.archive.org/web/20230315181013/https://github.com/sadwwcxz/Vul -https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 -https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box -https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server -https://websecnerd.blogspot.com/2018/02/mybb-forum-1.html -https://websecnerd.blogspot.in/2017/07/bolt-cms-3.html -https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html -https://websecnerd.blogspot.in/2018/02/mybb-forum-1_21.html -https://weed-1.gitbook.io/cve/mojoportal/directory-traversal-in-mojoportal-v2.7-cve-2022-40123 -https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html -https://weizman.github.io/2023/04/10/snyk-xss/ -https://wekan.github.io/hall-of-fame/fieldbleed/ -https://wekan.github.io/hall-of-fame/filebleed/ -https://weltolk.github.io/p/xunruicms-v4.3.3-to-v4.5.1-backstage-code-injection-vulnerabilityfile-write-and-file-inclusion/ -https://wesleyk.me/2020/01/10/my-first-vulnerability-mimecast-sender-address-verification/ -https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ -https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643 -https://whitehatck01.blogspot.com/2018/06/opencart-v3-0-3-0-user-changes-password.html -https://whitehatck01.blogspot.com/2018/11/charles-427-xml-external-entity.html -https://whitehatck01.blogspot.com/2020/06/dockers-latest-version-of-privilege.html -https://whitehub.net/submissions/1516 -https://whitehub.net/submissions/1517 -https://whitehub.net/submissions/1518 -https://whitehub.net/submissions/2968 -https://whiterosezex.blogspot.com/2021/01/cve-2020-23826-rce-vulnerability-in.html -https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json -https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json -https://wiki.mozilla.org/Platform/2010-12-07 -https://wildix.atlassian.net/wiki/spaces/DOC/pages/30279136/Changelogs -https://winscp.net/forum/viewtopic.php?t=30085 -https://wordpress.org/plugins/peepso-core/#developers -https://wordpress.org/plugins/safe-svg/#developers -https://wordpress.org/support/topic/discovered-security-vulnerabilities-1/ -https://wordpress.org/support/topic/zip-attachments-wordpress-plugin-v114-arbitrary-file-download-vulnerability?replies=1 -https://worthdoingbadly.com/sqlitebug/ -https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/ -https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/ -https://wpscan.com/blog/stored-xss-fixed-in-popup-builder-4-2-3/ -https://wpscan.com/blog/stored-xss-fixed-in-wp-go-maps-9-0-28/ -https://wpscan.com/vulnerability/000e65f1-89cd-4dd5-a09d-5febd9fdfbdb -https://wpscan.com/vulnerability/0035ec5e-d405-4eb7-8fe4-29dd0c71e4bc -https://wpscan.com/vulnerability/004f1872-1576-447f-8837-f29fa319cbdc -https://wpscan.com/vulnerability/005c2300-f6bd-416e-97a6-d42284bbb093 -https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2 -https://wpscan.com/vulnerability/0076a3b8-9a25-41c9-bb07-36ffe2c8c37d -https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8 -https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f -https://wpscan.com/vulnerability/00c34ba8-b82e-4bb9-90b1-1afefae75948 -https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422 -https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608 -https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114ee -https://wpscan.com/vulnerability/011500ac-17e4-4d4f-bbd9-1fec70511776 -https://wpscan.com/vulnerability/0118f245-0e6f-44c1-9bdb-5b3a5d2403d6 -https://wpscan.com/vulnerability/011c2519-fd84-4c95-b8b8-23654af59d70 -https://wpscan.com/vulnerability/012c5b64-ef76-4539-afd8-40f6c329ae88 -https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5 -https://wpscan.com/vulnerability/01419d03-54d6-413d-9a67-64c63c26d741 -https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/ -https://wpscan.com/vulnerability/01483284-57f5-4ae9-b5f1-ae26b623571f -https://wpscan.com/vulnerability/01568da4-2ecf-4cf9-8030-31868ce0a87a -https://wpscan.com/vulnerability/016453e3-803b-4a67-8ea7-2d228c2998d4 -https://wpscan.com/vulnerability/017ca231-e019-4694-afa2-ab7f8481ae63 -https://wpscan.com/vulnerability/0184d70a-548c-4258-b01d-7477f03cc346 -https://wpscan.com/vulnerability/01b9b1c2-439e-44df-bf01-026cb13d7d40 -https://wpscan.com/vulnerability/01d108bb-d134-4651-9c74-babcc88da177 -https://wpscan.com/vulnerability/01d430ea-ef85-4529-9ae4-c1f70016bb75 -https://wpscan.com/vulnerability/0201f365-7acb-4640-bd3f-7119432f4917 -https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b -https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16 -https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe -https://wpscan.com/vulnerability/02928db8-ceb3-471a-b626-ca661d073e4f -https://wpscan.com/vulnerability/02addade-d191-4e45-b7b5-2f3f673679ab -https://wpscan.com/vulnerability/02ba4d8b-f4d2-42cd-9fae-b543e112fa04 -https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b -https://wpscan.com/vulnerability/02d25736-c796-49bd-b774-66e0e3fcf4c9 -https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b -https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/ -https://wpscan.com/vulnerability/03210390-2054-40c0-9508-39d168087878 -https://wpscan.com/vulnerability/03254977-37cc-4365-979b-326f9637be85 -https://wpscan.com/vulnerability/034c4c75-42a4-4884-b63f-f9d4d2d6aebc -https://wpscan.com/vulnerability/0357ecc7-56f5-4843-a928-bf2d3ce75596 -https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c -https://wpscan.com/vulnerability/037a81b2-8fd8-4898-bb5b-d15d9a38778c -https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea -https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 -https://wpscan.com/vulnerability/03a201d2-535e-4574-afac-791dcf23e6e1/ -https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848 -https://wpscan.com/vulnerability/03d061b4-1b71-44f5-b3dc-f82a5fcd92eb -https://wpscan.com/vulnerability/03e0d4d5-0184-4a15-b8ac-fdc2010e4812 -https://wpscan.com/vulnerability/03e7c2dc-1c6d-4cff-af59-6b41ead74978 -https://wpscan.com/vulnerability/0414dad4-e90b-4122-8b77-a8a958ab824d -https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8 -https://wpscan.com/vulnerability/04305e4e-37e3-4f35-bf66-3b79b99d2868 -https://wpscan.com/vulnerability/04560bf1-676b-46fb-9344-4150862f2686 -https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 -https://wpscan.com/vulnerability/047b50c0-0eb3-4371-9e5d-3778fdafc66b -https://wpscan.com/vulnerability/0487c3f6-1a3c-4089-a614-15138f52f69b -https://wpscan.com/vulnerability/04890549-6bd1-44dd-8bce-7125c01be5d4 -https://wpscan.com/vulnerability/04a708a0-b6f3-47d1-aac9-0bb17f57c61e/ -https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/ -https://wpscan.com/vulnerability/04c71873-5ae7-4f94-8ba9-03e03ff55180 -https://wpscan.com/vulnerability/04cea9aa-b21c-49f8-836b-2d312253e09a -https://wpscan.com/vulnerability/04d7cd44-9e18-42b9-9f79-cc9cd6980526 -https://wpscan.com/vulnerability/04dafc55-3a8d-4dd2-96da-7a8b100e5a81/ -https://wpscan.com/vulnerability/04eaf380-c345-425f-8800-142e3f4745a9 -https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 -https://wpscan.com/vulnerability/05034521-6eb9-43b9-8f03-7e0de60e3022 -https://wpscan.com/vulnerability/0529261d-65e1-4c64-b8ed-ecb7356d9067 -https://wpscan.com/vulnerability/053a9815-cf0a-472e-844a-3dea407ce022 -https://wpscan.com/vulnerability/054bd981-dbdd-47dd-bad0-fa327e5860a2 -https://wpscan.com/vulnerability/055a2dcf-77ec-4e54-be7d-9c47f7730d1b -https://wpscan.com/vulnerability/056b5167-3cbc-47d1-9917-52a434796151 -https://wpscan.com/vulnerability/05700942-3143-4978-89eb-814ceff74867 -https://wpscan.com/vulnerability/05976ed8-5a26-4eae-adb2-0ea3b2722391 -https://wpscan.com/vulnerability/05988ebb-7378-4a3a-9d2d-30f8f58fe9ef -https://wpscan.com/vulnerability/05a730bc-2d72-49e3-a608-e4390b19e97f -https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4 -https://wpscan.com/vulnerability/05d3af69-20b4-499a-8322-2b53674d6a58 -https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141 -https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ -https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec -https://wpscan.com/vulnerability/064c7acb-db57-4537-8a6d-32f7ea31c738 -https://wpscan.com/vulnerability/066ba5d4-4aaa-4462-b106-500c1f291c37 -https://wpscan.com/vulnerability/0672f8af-33e2-459c-ac8a-7351247a8a26/ -https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f -https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/ -https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165 -https://wpscan.com/vulnerability/06df2729-21da-4c22-ae1e-dda1f15bdf8f -https://wpscan.com/vulnerability/06e1be38-fc1a-4799-a006-556b678ae701 -https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948 -https://wpscan.com/vulnerability/06e547fd-cddf-4294-87be-54f58d6138a7 -https://wpscan.com/vulnerability/06f1889d-8e2f-481a-b91b-3a8008e00ffc -https://wpscan.com/vulnerability/06f7aa45-b5d0-4afb-95cc-8f1c82f6f8b3 -https://wpscan.com/vulnerability/071a2f69-9cd6-42a8-a56c-264a589784ab -https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/ -https://wpscan.com/vulnerability/07278b12-58e6-4230-b2fb-19237e9785d8 -https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845 -https://wpscan.com/vulnerability/0746ea56-dd88-4fc3-86a3-54408eef1f94 -https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6 -https://wpscan.com/vulnerability/07757d1e-39ad-4199-bc7a-ecb821dfc996 -https://wpscan.com/vulnerability/078bd5f6-64f7-4665-825b-9fd0c2b7b91b -https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62 -https://wpscan.com/vulnerability/078f33cd-0f5c-46fe-b858-2107a09c6b69 -https://wpscan.com/vulnerability/07b1caf1-d00b-4075-b71a-0516d5604286 -https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3 -https://wpscan.com/vulnerability/0805ed7e-395d-48de-b484-6c3ec1cd4b8e -https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/ -https://wpscan.com/vulnerability/084e9494-2f9e-4420-9bf7-78a1a41433d7 -https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e -https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a -https://wpscan.com/vulnerability/08864b76-d898-4dfe-970d-d7cc1b1115a7 -https://wpscan.com/vulnerability/08a8a51c-49d3-4bce-b7e0-e365af1d8f33 -https://wpscan.com/vulnerability/08b66b69-3c69-4a1e-9c0a-5697e31bc04e -https://wpscan.com/vulnerability/08dbe202-0136-4502-87e7-5e984dc27b16 -https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 -https://wpscan.com/vulnerability/08f1d623-0453-4103-a9aa-2d0ddb6eb69e -https://wpscan.com/vulnerability/08f3ce22-94a0-496a-aaf9-d35b6b0f5bb6 -https://wpscan.com/vulnerability/08f4ebf5-6bbe-4fb0-a9d2-c8a994afe39b -https://wpscan.com/vulnerability/08f5089c-36f3-4d12-bca5-99cd3ae78f67 -https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940 -https://wpscan.com/vulnerability/090a3922-febc-4294-82d2-d8339d461893/ -https://wpscan.com/vulnerability/0917b964-f347-487e-b8d7-c4f09c290fe5 -https://wpscan.com/vulnerability/09226067-0289-4d4f-9450-6f2c2ba058a0 -https://wpscan.com/vulnerability/09512431-aa33-4514-8b20-1963c5d89f33 -https://wpscan.com/vulnerability/095cba08-7edd-41fb-9776-da151c0885dd -https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 -https://wpscan.com/vulnerability/09681a6c-57b8-4448-982a-fe8d28c87fc3 -https://wpscan.com/vulnerability/097acd6f-3291-4cdc-a054-4432b6350411 -https://wpscan.com/vulnerability/09871847-1d6a-4dfe-8a8c-f2f53ff87445 -https://wpscan.com/vulnerability/099cf9b4-0b3a-43c6-8ca9-7c2d50f86425 -https://wpscan.com/vulnerability/09aeb6f2-6473-4de7-8598-e417049896d7/ -https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/ -https://wpscan.com/vulnerability/0a08e49d-d34e-4140-a15d-ad64444665a3 -https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/ -https://wpscan.com/vulnerability/0a0ecdff-c961-4947-bf7e-bd2392501e33 -https://wpscan.com/vulnerability/0a16ddc5-5ab9-4a8f-86b5-41edcbeafc50 -https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672 -https://wpscan.com/vulnerability/0a46ae96-41e5-4b52-91c3-409f7387aecc -https://wpscan.com/vulnerability/0a615ce3-93da-459d-a33f-a2a6e74a2f94 -https://wpscan.com/vulnerability/0a6e4c45-3f6d-4150-9546-141c2e3a1782 -https://wpscan.com/vulnerability/0a9830df-5f5d-40a3-9841-40994275136f -https://wpscan.com/vulnerability/0aa5a8d5-e736-4cd3-abfd-8e0a356bb6ef -https://wpscan.com/vulnerability/0acd613e-dbd6-42ae-9f3d-6d6e77a4c1b7 -https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6 -https://wpscan.com/vulnerability/0af030d8-b676-4826-91c0-98706b816f3c -https://wpscan.com/vulnerability/0af475ba-5c02-4f62-876d-6235a745bbd6 -https://wpscan.com/vulnerability/0afa78d3-2403-4e0c-8f16-5b7874b03cd2 -https://wpscan.com/vulnerability/0b094cba-9288-4c9c-87a9-bdce286fe8b6 -https://wpscan.com/vulnerability/0b35ad4a-3d94-49b1-a98d-07acf8dd4962 -https://wpscan.com/vulnerability/0b3c83ad-d490-4ca3-8589-39163ea5e24b -https://wpscan.com/vulnerability/0b432858-722c-4bda-aa95-ad48e2097302 -https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1 -https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c -https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7 -https://wpscan.com/vulnerability/0b6381cd-fa31-4cc7-8b42-063a4c545577 -https://wpscan.com/vulnerability/0b8c5947-bc73-448e-8f10-a4f4456e4000 -https://wpscan.com/vulnerability/0b92becb-8a47-48fd-82e8-f7641cf5c9bc -https://wpscan.com/vulnerability/0b953413-cf41-4de7-ac1f-c6cb995fb158/ -https://wpscan.com/vulnerability/0baedd8d-2bbe-4091-bec4-f99e25d7290d/ -https://wpscan.com/vulnerability/0bd25283-e079-4010-b139-cce9afb1d54d -https://wpscan.com/vulnerability/0bd4f370-f9f8-43ee-8f20-96e899a1efb5 -https://wpscan.com/vulnerability/0be5e06e-4ff1-43d2-8ba7-2530519d517e -https://wpscan.com/vulnerability/0c26ee50-df3d-438a-93bb-faa88b7983af -https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082 -https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/ -https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56 -https://wpscan.com/vulnerability/0c96a128-4473-41f5-82ce-94bba33ca4a3/ -https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136 -https://wpscan.com/vulnerability/0ca62908-4ef5-41e0-9223-f77ad2c333d7 -https://wpscan.com/vulnerability/0cba5349-e916-43f0-a1fe-62cf73e352a2 -https://wpscan.com/vulnerability/0cd5b288-05b3-48b7-9245-f59ce7377861/ -https://wpscan.com/vulnerability/0cea0717-8f54-4f1c-b3ee-aff7dd91bf59 -https://wpscan.com/vulnerability/0cf63b44-f709-4ba4-be14-1eea934c2007 -https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95 -https://wpscan.com/vulnerability/0d07423e-98d2-43a3-824d-562747a3d65a -https://wpscan.com/vulnerability/0d208ebc-7805-457b-aa5f-ffd5adb2f3be -https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e -https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679 -https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816 -https://wpscan.com/vulnerability/0d323b07-c6e7-4aba-85bc-64659ad0c85d -https://wpscan.com/vulnerability/0d422397-69ff-4d05-aafa-7a572e460e5f -https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7 -https://wpscan.com/vulnerability/0d679e0e-891b-44f1-ac7f-a766e12956e0 -https://wpscan.com/vulnerability/0d6b46cb-5244-486f-ad70-4023907ac9eb -https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20 -https://wpscan.com/vulnerability/0d889dde-b9d5-46cf-87d3-4f8a85cf9b98 -https://wpscan.com/vulnerability/0d8fbd1a-9fac-42ac-94e0-f8921deb1696 -https://wpscan.com/vulnerability/0d95ada6-53e3-4a80-a395-eacd7b090f26 -https://wpscan.com/vulnerability/0d95de23-e8f6-4342-b19c-57cd22b2fee2/ -https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67 -https://wpscan.com/vulnerability/0d9ba176-97be-4b6b-9cf1-6c3047321a1e -https://wpscan.com/vulnerability/0db1762e-1401-4006-88ed-d09a4bc6585b -https://wpscan.com/vulnerability/0dbc85dd-736c-492e-9db8-acb7195771aa -https://wpscan.com/vulnerability/0dc931c6-1fce-4d70-a658-a4bbab10dab3 -https://wpscan.com/vulnerability/0dfffe48-e60d-4bab-b194-8a63554246c3 -https://wpscan.com/vulnerability/0e0d2c5f-3396-4a0a-a5c6-6a98de3802c9 -https://wpscan.com/vulnerability/0e12ba6f-a86f-4cc6-9013-8a15586098d0 -https://wpscan.com/vulnerability/0e13c375-044c-4c2e-ab8e-48cb89d90d02 -https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2 -https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9 -https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba -https://wpscan.com/vulnerability/0e874a1d-c866-45fa-b456-c8012dca32af -https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 -https://wpscan.com/vulnerability/0eae5189-81af-4344-9e96-dd1f4e223d41 -https://wpscan.com/vulnerability/0eb07cc8-8a19-4e01-ab90-844495413453 -https://wpscan.com/vulnerability/0eb40cd5-838e-4b53-994d-22cf7c8a6c50 -https://wpscan.com/vulnerability/0ec58310-243d-40c8-9fa6-8753947bfa89 -https://wpscan.com/vulnerability/0ed423dd-4a38-45e0-8645-3f4215a3f15c/ -https://wpscan.com/vulnerability/0ed5e1b3-f2a3-4eb1-b8ae-d3a62f600107 -https://wpscan.com/vulnerability/0ee7d1a8-9782-4db5-b055-e732f2763825 -https://wpscan.com/vulnerability/0eeff1ee-d11e-4d52-a032-5f5bd8a6a2d7 -https://wpscan.com/vulnerability/0f1c1f1c-acdd-4c8a-bd5e-a21f4915e69f -https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b -https://wpscan.com/vulnerability/0f7757c9-69fa-49db-90b0-40f0ff29bee7/ -https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132 -https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f -https://wpscan.com/vulnerability/0fa114a0-29df-4312-9138-eb9f0aedb3c5 -https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4 -https://wpscan.com/vulnerability/0ff435bc-ea20-4993-98ae-1f61b1732b59 -https://wpscan.com/vulnerability/1049e940-49b1-4236-bea2-c636f35c5647 -https://wpscan.com/vulnerability/10528cb2-12a1-43f7-9b7d-d75d18fdf5bb -https://wpscan.com/vulnerability/10660c95-d366-4152-9ce8-b57c57a2ec6c -https://wpscan.com/vulnerability/1069fb40-44f0-468e-9fd4-7a0fb8cde5a5 -https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 -https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 -https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/ -https://wpscan.com/vulnerability/10f63d30-1b36-459b-80eb-509caaf5d377 -https://wpscan.com/vulnerability/10f7e892-7a91-4292-b03e-6ad75756488b -https://wpscan.com/vulnerability/10fdc464-0ddc-4919-8f21-969fff854011 -https://wpscan.com/vulnerability/11040133-c134-4f96-8421-edd04901ed0d -https://wpscan.com/vulnerability/114c0202-39f8-4748-ac0d-013d2d6f02f7 -https://wpscan.com/vulnerability/114d94be-b567-4b4b-9a44-f2c05cdbe18e -https://wpscan.com/vulnerability/11703e49-c042-4eb6-9a5f-6e006e3725a0 -https://wpscan.com/vulnerability/1187e041-3be2-4613-8d56-c2394fcc75fb -https://wpscan.com/vulnerability/11937296-7ecf-4b94-b274-06f7990dbede -https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db -https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864 -https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1 -https://wpscan.com/vulnerability/12062d78-7a0d-4dc1-9bd6-6c54aa6bc761 -https://wpscan.com/vulnerability/120bdcb3-4288-4101-b738-cc84d02da171 -https://wpscan.com/vulnerability/1240797c-7f45-4c36-83f0-501c544ce76a -https://wpscan.com/vulnerability/1270588c-53fe-447e-b83c-1b877dc7a954 -https://wpscan.com/vulnerability/12766537-df59-49d6-815a-4d68265a4c4a -https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00 -https://wpscan.com/vulnerability/12f1ed97-d392-449d-b25c-42d241693888 -https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c -https://wpscan.com/vulnerability/132118aa-4b72-4eaa-8aa1-6ad7b0c7f495 -https://wpscan.com/vulnerability/132b70e5-4368-43b4-81f6-2d01bc09dc8f -https://wpscan.com/vulnerability/13304aca-0722-4bd9-b443-a5fed1ce22da -https://wpscan.com/vulnerability/1330f8f7-4a59-4e9d-acae-21656a4101fe -https://wpscan.com/vulnerability/13621b13-8d31-4214-a665-cb15981f3ec1 -https://wpscan.com/vulnerability/13910e52-5302-4252-8bee-49dd1f0e180a -https://wpscan.com/vulnerability/13966b61-7e65-4493-8bd8-828d6d4441d5 -https://wpscan.com/vulnerability/13a196ba-49c7-4575-9a49-3ef9eb2348f3 -https://wpscan.com/vulnerability/13bb796f-7a17-47c9-a46f-a1d6ca4b6b91 -https://wpscan.com/vulnerability/13c4e065-fde6-41a4-a22b-bca1b10e0d30 -https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c -https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/ -https://wpscan.com/vulnerability/13f59eb4-0744-4fdb-94b5-886ee6bdd867 -https://wpscan.com/vulnerability/140a15b6-12c8-4f03-a877-3876db866852 -https://wpscan.com/vulnerability/14283389-a6b8-4dd8-9441-f16fcc4ab3c0 -https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48 -https://wpscan.com/vulnerability/1453471f-164d-4487-a736-8cea086212fe/ -https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9 -https://wpscan.com/vulnerability/14632fa8-597e-49ff-8583-9797208a3583 -https://wpscan.com/vulnerability/147b4097-dec8-4542-b122-7b237db81c05 -https://wpscan.com/vulnerability/14b29450-2450-4b5f-8630-bb2cbfbd0a83 -https://wpscan.com/vulnerability/14b4f0c5-c7b1-4ac4-8c9c-f8c35ca5de4a -https://wpscan.com/vulnerability/14b679f5-44a8-46d4-89dd-94eb647cb672 -https://wpscan.com/vulnerability/14c75a00-a52b-430b-92da-5145e5aee30a -https://wpscan.com/vulnerability/14c83830-3207-4f92-b8f5-afd7cc93af88 -https://wpscan.com/vulnerability/1512bba9-89e2-493d-b85d-10c7acb903db -https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/ -https://wpscan.com/vulnerability/156d4faf-7d34-4d9f-a654-9064d4eb3aea -https://wpscan.com/vulnerability/157a9a76-3e5f-4d27-aefc-cb9cb88b3286 -https://wpscan.com/vulnerability/15819d33-7497-4f7d-bbb8-b3ab147806c4 -https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c -https://wpscan.com/vulnerability/15b9ab48-c038-4f2e-b823-1e374baae985 -https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375 -https://wpscan.com/vulnerability/15be2d2b-baa3-4845-82cf-3c351c695b47 -https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f -https://wpscan.com/vulnerability/15f345e6-fc53-4bac-bc5a-de898181ea74 -https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974 -https://wpscan.com/vulnerability/162d0029-2adc-4925-9985-1d5d672dbe75 -https://wpscan.com/vulnerability/163069cd-98a8-4cfb-8b58-a6727a7d5c48 -https://wpscan.com/vulnerability/16375a7f-0a9f-4961-8510-d047ffbf3954 -https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/ -https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124 -https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0 -https://wpscan.com/vulnerability/1697351b-c201-4e85-891e-94fdccbdfb55 -https://wpscan.com/vulnerability/169a6c81-6c76-4f29-8f60-b2551042b962 -https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303 -https://wpscan.com/vulnerability/169d21fc-d191-46ff-82e8-9ac887aed8a4 -https://wpscan.com/vulnerability/16cc47aa-cb31-4114-b014-7ac5fbc1d3ee -https://wpscan.com/vulnerability/16d47d20-58aa-4d04-9275-fd91ce926ff3 -https://wpscan.com/vulnerability/16e2d970-19d0-42d1-8fb1-e7cb14ace1d0 -https://wpscan.com/vulnerability/16fc08ec-8476-4f3c-93ea-6a51ed880dd5 -https://wpscan.com/vulnerability/171af8eb-ceeb-403a-abc2-969d9535a4c9/ -https://wpscan.com/vulnerability/17287d8a-ba27-42dc-9370-a931ef404995 -https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed -https://wpscan.com/vulnerability/174b2119-b806-4da4-a23d-c19b552c86cb -https://wpscan.com/vulnerability/17585f16-c62c-422d-ad9c-9138b6da97b7 -https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a -https://wpscan.com/vulnerability/17596b0e-ff45-4d0c-8e57-a31101e30345 -https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/ -https://wpscan.com/vulnerability/176d5761-4f01-4173-a70c-6052a6a9963e -https://wpscan.com/vulnerability/1772417a-1abb-4d97-9694-1254840defd1 -https://wpscan.com/vulnerability/178499a3-97d1-4ab2-abbe-4a9d2ebc85da -https://wpscan.com/vulnerability/178d0c49-3a93-4948-8734-f3d7518361b3 -https://wpscan.com/vulnerability/178d71f2-4666-4f7e-ada5-cb72a50fd663 -https://wpscan.com/vulnerability/17acde5d-44ea-4e77-8670-260d22e28ffe -https://wpscan.com/vulnerability/17de2f77-3e6c-4c22-9196-6e5577ee7fcf -https://wpscan.com/vulnerability/1801c7ae-2b5c-493f-969d-4bb19a9feb15 -https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a -https://wpscan.com/vulnerability/181a729e-fffe-457c-9e8d-a4343fd2e630 -https://wpscan.com/vulnerability/1830e829-4a43-4d98-8214-eecec6bef694 -https://wpscan.com/vulnerability/1854f77f-e12a-4370-9c44-73d16d493685 -https://wpscan.com/vulnerability/18660c71-5a89-4ef6-b0dd-7a166e3449d6 -https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056 -https://wpscan.com/vulnerability/187e6967-6961-4843-a9d5-866f6ebdb7bc -https://wpscan.com/vulnerability/18902832-2973-498d-808e-c75d1aedc11e -https://wpscan.com/vulnerability/18ab1570-2b4a-48a4-86e6-c1d368563691 -https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8 -https://wpscan.com/vulnerability/18c1b3bb-9998-416f-a972-c4a51643579c/ -https://wpscan.com/vulnerability/18d7f9af-7267-4723-9d6f-05b895c94dbe -https://wpscan.com/vulnerability/18fbe9d5-4829-450b-988c-8ba4becd032a/ -https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456/ -https://wpscan.com/vulnerability/19379f08-d667-4b1e-a774-0f4a17ad7bff -https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441 -https://wpscan.com/vulnerability/1965f53d-c94e-4322-9059-49de69df1051 -https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14 -https://wpscan.com/vulnerability/1980c5ca-447d-4875-b542-9212cc7ff77f -https://wpscan.com/vulnerability/19980b57-1954-4a29-b2c2-43eadf758ed3 -https://wpscan.com/vulnerability/19a86448-8d7c-4f02-9290-d9f93810e6e1/ -https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d -https://wpscan.com/vulnerability/19bffa71-705c-42fc-b2ca-bf62fabb70a0 -https://wpscan.com/vulnerability/19c2f456-a41e-4755-912d-13683719bae6 -https://wpscan.com/vulnerability/19d101aa-4b60-4db4-a33b-86c826b288b0 -https://wpscan.com/vulnerability/19ee5e33-acc8-40c5-8f54-c9cb0fa491f0 -https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79 -https://wpscan.com/vulnerability/19f482cb-fcfd-43e6-9a04-143e06351a70 -https://wpscan.com/vulnerability/1a46cfec-24ad-4619-8579-f09bbd8ee748 -https://wpscan.com/vulnerability/1a5cbcfc-fa55-433a-a76b-3881b6c4bea2 -https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71 -https://wpscan.com/vulnerability/1a8c97f9-98fa-4e29-b7f7-bb9abe0c42ea -https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161 -https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e -https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714 -https://wpscan.com/vulnerability/1ab192d7-72ac-4f12-8a51-f28ee4db91bc -https://wpscan.com/vulnerability/1ada2a96-32aa-4e37-809c-705db6026e0b -https://wpscan.com/vulnerability/1af4beb6-ba16-429b-acf2-43f9594f5ace -https://wpscan.com/vulnerability/1afc0e4a-f712-47d4-bf29-7719ccbbbb1b -https://wpscan.com/vulnerability/1b0fe0ac-d0d1-473d-af5b-dad6217933d4 -https://wpscan.com/vulnerability/1b277929-e88b-4ab6-9190-526e75f5ce7a -https://wpscan.com/vulnerability/1b3201da-f254-406f-9b4a-cd5025b6b03d -https://wpscan.com/vulnerability/1b36a184-2138-4a65-8940-07e7764669bb -https://wpscan.com/vulnerability/1b3b51af-ad73-4f8e-ba97-375b8a363b64 -https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d -https://wpscan.com/vulnerability/1b3ff124-f973-4584-a7d7-26cc404bfe2b -https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b -https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b -https://wpscan.com/vulnerability/1b5fce7e-14fc-4548-8747-96fdd58fdd98 -https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d -https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de -https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8 -https://wpscan.com/vulnerability/1bcda9d3-c573-441e-828f-055fbec2e08d -https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091 -https://wpscan.com/vulnerability/1bdebd9e-a7f2-4f55-b5b0-185eb619ebaf -https://wpscan.com/vulnerability/1bf1f255-1571-425c-92b1-02833f6a44a7 -https://wpscan.com/vulnerability/1bf65448-689c-474d-a566-c9b6797d3e4a -https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/ -https://wpscan.com/vulnerability/1bffbbef-7876-43a6-9cb0-6e09bb4ff2b0 -https://wpscan.com/vulnerability/1c126869-0afa-456f-94cc-10334964e5f9 -https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c -https://wpscan.com/vulnerability/1c3ff47a-12a5-49c1-a166-2c57e5c0d0aa -https://wpscan.com/vulnerability/1c46373b-d43d-4d18-b0ae-3711fb0be0f9 -https://wpscan.com/vulnerability/1c4f379d-252a-487b-81c9-bf711ab71dff -https://wpscan.com/vulnerability/1c551234-9c59-41a0-ab74-beea2d27df6b -https://wpscan.com/vulnerability/1c55fda9-e938-4267-be77-a6d73ee46af3 -https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/ -https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210 -https://wpscan.com/vulnerability/1c8c5861-ce87-4813-9e26-470d63c1903a -https://wpscan.com/vulnerability/1c93ea8f-4e68-4da1-994e-35a5873278ba -https://wpscan.com/vulnerability/1cbbab9e-be3d-4081-bc0e-c52d500d9871 -https://wpscan.com/vulnerability/1cc6dc17-b019-49dd-8149-c8bba165eb30 -https://wpscan.com/vulnerability/1cd30913-67c7-46c3-a2de-dcca0c332323 -https://wpscan.com/vulnerability/1cd52d61-af75-43ed-9b99-b46c471c4231 -https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c -https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a -https://wpscan.com/vulnerability/1d1a731b-78f7-4d97-b40d-80f66700edae -https://wpscan.com/vulnerability/1d3636c1-976f-4c84-8cca-413e38170d0c -https://wpscan.com/vulnerability/1d489b05-296e-4268-8082-9737608f9b41 -https://wpscan.com/vulnerability/1d4a2f0e-a371-4e27-98de-528e070f41b0/ -https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 -https://wpscan.com/vulnerability/1d748f91-773b-49d6-8f68-a27d397713c3 -https://wpscan.com/vulnerability/1d7d0372-bbc5-40b2-a668-253c819415c4/ -https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3 -https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 -https://wpscan.com/vulnerability/1dbe0f24-b757-49fe-846f-7c259df9f361 -https://wpscan.com/vulnerability/1dd0f9a8-22ab-4ecc-a925-605822739000 -https://wpscan.com/vulnerability/1df111aa-6057-47a2-8e8b-9ef5ec3bb472 -https://wpscan.com/vulnerability/1df3c17c-990d-4074-b1d5-b26da880d88e -https://wpscan.com/vulnerability/1e13b9ea-a3ef-483b-b967-6ec14bd6d54d -https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f -https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe -https://wpscan.com/vulnerability/1e4dd002-6c96-44f9-bd55-61359265f7ae -https://wpscan.com/vulnerability/1e621d62-13c7-4b2f-96ca-3617a796d037 -https://wpscan.com/vulnerability/1e733ccf-8026-4831-9863-e505c2aecba6 -https://wpscan.com/vulnerability/1eba1c73-a19b-4226-afec-d27c48388a04 -https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea -https://wpscan.com/vulnerability/1ef86546-3467-432c-a863-1ca3e5c65bd4/ -https://wpscan.com/vulnerability/1f0ae535-c560-4510-ae9a-059e2435ad39 -https://wpscan.com/vulnerability/1f2b3c4a-f7e9-4d22-b71e-f6b051fd8349 -https://wpscan.com/vulnerability/1f41fc5c-18d0-493d-9a7d-8b521ab49f85 -https://wpscan.com/vulnerability/1f6bd346-4743-44b8-86d7-4fbe09bad657 -https://wpscan.com/vulnerability/1f8cb0b9-7447-44db-8d13-292db5b17718 -https://wpscan.com/vulnerability/1fa355d1-cca8-4b27-9d21-0b420a2e1bf3 -https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193 -https://wpscan.com/vulnerability/1fbcf5ec-498e-4d40-8577-84b8c7ac3201 -https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6 -https://wpscan.com/vulnerability/1fc0aace-ba85-4939-9007-d150960add4a -https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776 -https://wpscan.com/vulnerability/1fda1356-77d8-4e77-9ee6-8f9ceeb3d380 -https://wpscan.com/vulnerability/200969eb-e2a4-4200-82d7-0c313de089af -https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d -https://wpscan.com/vulnerability/2011dc7b-8e8c-4190-ab34-de288e14685b -https://wpscan.com/vulnerability/2013d79b-e9f6-4a5a-b421-e840a3bae063 -https://wpscan.com/vulnerability/205a24b8-6d14-4458-aecd-79748e1324c7 -https://wpscan.com/vulnerability/2074d0f5-4165-4130-9391-37cb21e8aa1b/ -https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c -https://wpscan.com/vulnerability/211816ce-d2bc-469b-9a8e-e0c2a5c4461b -https://wpscan.com/vulnerability/2138f736-8a50-4390-a239-fcd1d736670a -https://wpscan.com/vulnerability/213d7c08-a37c-49d0-a072-24db711da5ec -https://wpscan.com/vulnerability/2142c3d3-9a7f-4e3c-8776-d469a355d62f -https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/ -https://wpscan.com/vulnerability/218f8015-e14b-46a8-889d-08b2b822f8ae -https://wpscan.com/vulnerability/218fb3af-3a40-486f-8ea9-80211a986fb3/ -https://wpscan.com/vulnerability/21950116-1a69-4848-9da0-e912096c0fce -https://wpscan.com/vulnerability/219767a8-2427-42d5-8734-bd197d9ab46b -https://wpscan.com/vulnerability/21aec131-91ff-4300-ac7a-0bf31d6b2b24 -https://wpscan.com/vulnerability/21ce5baa-8085-4053-8d8b-f7d3e2ae70c1 -https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed -https://wpscan.com/vulnerability/21e7a46f-e9a3-4b20-b44a-a5b6ce7b7ce6 -https://wpscan.com/vulnerability/21f4cc5d-c4b4-495f-acf3-9fdf53591052 -https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759 -https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1 -https://wpscan.com/vulnerability/2262f2fc-8122-46ed-8e67-8c34ee35fc97 -https://wpscan.com/vulnerability/2277d335-1c90-4fa8-b0bf-25873c039c38 -https://wpscan.com/vulnerability/227cbf50-59da-4f4c-85da-1959a108ae7e -https://wpscan.com/vulnerability/229207bb-8f8d-4579-a8e2-54516474ccb4 -https://wpscan.com/vulnerability/229273e6-e849-447f-a95a-0730969ecdae -https://wpscan.com/vulnerability/2296156e-b177-478e-a01c-b1ea4fee0aca -https://wpscan.com/vulnerability/229a065e-1062-44d4-818d-29aa3b6b6d41 -https://wpscan.com/vulnerability/229b93cd-544b-4877-8d9f-e6debda9511c -https://wpscan.com/vulnerability/22dc2661-ba64-49e7-af65-892a617ab02c -https://wpscan.com/vulnerability/22fa478d-e42e-488d-9b4b-a8720dec7cee -https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9 -https://wpscan.com/vulnerability/22fd3f28-9036-4bd5-ad98-ff78bd1b51bc -https://wpscan.com/vulnerability/22fe68c4-8f47-491e-be87-5e8e40535a82 -https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9 -https://wpscan.com/vulnerability/2365a9d0-f6f4-4602-9804-5af23d0cb11d -https://wpscan.com/vulnerability/237541d5-c1a5-44f2-8e5f-82457b8f9497 -https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/ -https://wpscan.com/vulnerability/238842ee-6392-4eb2-96cb-08e4ece6fca1 -https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809 -https://wpscan.com/vulnerability/23b8b8c4-cded-4887-a021-5f3ea610213b -https://wpscan.com/vulnerability/23c22f46-19a2-4a1a-aaef-0a4007eda031 -https://wpscan.com/vulnerability/240bed24-0315-4bbf-ba17-e4947e5ecacb -https://wpscan.com/vulnerability/240ddde9-095f-4919-832a-50279196dac5 -https://wpscan.com/vulnerability/24176ad3-2317-4853-b4db-8394384d52cd -https://wpscan.com/vulnerability/243d417a-6fb9-4e17-9e12-a8c605f9af8a -https://wpscan.com/vulnerability/244c7c00-fc8d-4a73-bbe0-7865c621d410 -https://wpscan.com/vulnerability/244d9ef1-335c-4f65-94ad-27c0c633f6ad -https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14e -https://wpscan.com/vulnerability/24969766-19e3-47cd-b32c-6c3330651d1f -https://wpscan.com/vulnerability/24f933b0-ad57-4ed3-817d-d637256e2fb1 -https://wpscan.com/vulnerability/24fb4eb4-9fe1-4433-8844-8904eaf13c0e -https://wpscan.com/vulnerability/2504dadb-1086-4fa9-8fc7-b93018423515 -https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/ -https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0 -https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864 -https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633 -https://wpscan.com/vulnerability/25a0d41f-3b6f-4d18-b4d5-767ac60ee8a8 -https://wpscan.com/vulnerability/25a28adb-794f-4bdb-89e8-060296b45b38 -https://wpscan.com/vulnerability/25b51add-197c-4aff-b1a8-b92fb11d8697 -https://wpscan.com/vulnerability/25ca8af5-ab48-4e6d-b2ef-fc291742f1d5 -https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ -https://wpscan.com/vulnerability/260c7e2d-d48c-42d6-ae05-bad3f3bac01d -https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/ -https://wpscan.com/vulnerability/262924da-e269-4008-a24f-9f26a033b23e -https://wpscan.com/vulnerability/2660225a-e4c8-40f2-8c98-775ef2301212 -https://wpscan.com/vulnerability/266e417f-ece7-4ff5-a724-4d9c8e2f3faa -https://wpscan.com/vulnerability/267acb2c-1a95-487f-a714-516de05d2b2f -https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0 -https://wpscan.com/vulnerability/26965878-c4c9-4f43-9e9a-6e58d6b46ef2 -https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25 -https://wpscan.com/vulnerability/27134a4f-a59b-40e9-8fc8-abe1f58672ad/ -https://wpscan.com/vulnerability/27264f30-71d5-4d2b-8f36-4009a2be6745 -https://wpscan.com/vulnerability/273a95bf-39fe-4ba7-bc14-9527acfd9f42 -https://wpscan.com/vulnerability/2746101e-e993-42b9-bd6f-dfd5544fa3fe -https://wpscan.com/vulnerability/276a7fc5-3d0d-446d-92cf-20060aecd0ef -https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/ -https://wpscan.com/vulnerability/27816c70-58ad-4ffb-adcc-69eb1b210744 -https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b -https://wpscan.com/vulnerability/27ad58ba-b648-41d9-8074-16e4feeaee69 -https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42 -https://wpscan.com/vulnerability/27e70507-fd68-4915-88cf-0b96ed55208e -https://wpscan.com/vulnerability/28007c80-dc14-4987-a52c-f2a05cfe5905 -https://wpscan.com/vulnerability/281518ff-7816-4007-b712-63aed7828b34 -https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4 -https://wpscan.com/vulnerability/284fbc98-803d-4da5-8920-411eeae4bac8 -https://wpscan.com/vulnerability/28613fc7-1400-4553-bcc3-24df1cee418e -https://wpscan.com/vulnerability/28687291-2369-49e0-8905-dc4359454830 -https://wpscan.com/vulnerability/286b81a0-6f6d-4024-9bbc-6cb373990a7a -https://wpscan.com/vulnerability/286d972d-7bda-455c-a226-fd9ce5f925bd -https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c -https://wpscan.com/vulnerability/287a14dc-d1fc-481d-84af-7eb172dc68c9 -https://wpscan.com/vulnerability/28abe589-1371-4ed2-90b6-2bb96c93832c -https://wpscan.com/vulnerability/28b7ee77-5826-4c98-b09a-8f197e1a6d18 -https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08 -https://wpscan.com/vulnerability/28d34cc1-2294-4409-a60f-c8c441eb3f2d -https://wpscan.com/vulnerability/28e42f4e-e38a-4bf4-b51b-d8f21c40f037 -https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2 -https://wpscan.com/vulnerability/29015c35-0470-41b8-b197-c71b800ae2a9 -https://wpscan.com/vulnerability/29514d8e-9d1c-4fb6-b378-f6b7374989ca -https://wpscan.com/vulnerability/298487b2-4141-4c9f-9bb2-e1450aefc1a8 -https://wpscan.com/vulnerability/298fbe34-62c2-4e56-9bdb-90da570c5bbe -https://wpscan.com/vulnerability/29ab3c7b-58e0-4a72-b7b4-ab12a6d54f5a -https://wpscan.com/vulnerability/29aff4bf-1691-4dc1-a670-1f2c9a765a3b -https://wpscan.com/vulnerability/29fc5b0e-0a5f-4484-a1e6-a0a1206726cc -https://wpscan.com/vulnerability/2a162365-5a86-423d-b7c4-55c9b4d8b024 -https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f -https://wpscan.com/vulnerability/2a29b509-4cd5-43c8-84f4-f86251dd28f8/ -https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785 -https://wpscan.com/vulnerability/2a4557e2-b764-4678-a6d6-af39dd1ba76b/ -https://wpscan.com/vulnerability/2a67c290-2a27-44fe-95ae-2d427e9d7548 -https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65 -https://wpscan.com/vulnerability/2ab59972-ccfd-48f6-b879-58fb38823ca5 -https://wpscan.com/vulnerability/2ac5b87b-1390-41ce-af6e-c50e5709baaa -https://wpscan.com/vulnerability/2adc5995-03a9-4860-b00b-7f8d7fe18058 -https://wpscan.com/vulnerability/2adc8390-bb19-4adf-9805-e9c462d14d22 -https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e -https://wpscan.com/vulnerability/2afadc76-93ad-47e1-a224-e442ac41cbce -https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de -https://wpscan.com/vulnerability/2b4a6459-3e49-4048-8a9f-d7bb350aa2f6 -https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5 -https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4 -https://wpscan.com/vulnerability/2b543740-d4b0-49b5-a021-454a3a72162f -https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d -https://wpscan.com/vulnerability/2b59f640-5568-42bb-87b7-36eb448db5be -https://wpscan.com/vulnerability/2b67005a-476e-4772-b15c-3191911a50b0 -https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a -https://wpscan.com/vulnerability/2b6b0731-4515-498a-82bd-d416f5885268 -https://wpscan.com/vulnerability/2b7445fd-0992-47cd-9a48-f5f18d8171f7 -https://wpscan.com/vulnerability/2bbfc855-6901-462f-8a93-120d7fb5d268 -https://wpscan.com/vulnerability/2bc3af7e-5542-40c4-8141-7c49e8df68f0 -https://wpscan.com/vulnerability/2bd2579e-b383-4d12-b207-6fc32cfb82bc -https://wpscan.com/vulnerability/2bde2030-2dfe-4dd3-afc1-36f7031a91ea -https://wpscan.com/vulnerability/2c2379d0-e373-4587-a747-429d7ee8f6cc -https://wpscan.com/vulnerability/2c274eb7-25f1-49d4-a2c8-8ce8cecebe68 -https://wpscan.com/vulnerability/2c3d8c21-ecd4-41ba-8183-2ecbd9a3df25 -https://wpscan.com/vulnerability/2c3f9038-632d-40ef-a099-6ea202efb550 -https://wpscan.com/vulnerability/2c469e8b-c761-460b-b31d-9219a43006ff -https://wpscan.com/vulnerability/2c735365-69c0-4652-b48e-c4a192dfe0d1 -https://wpscan.com/vulnerability/2c7ca586-def8-4723-b779-09d7f37fa1ab -https://wpscan.com/vulnerability/2cafef43-e64a-4897-8c41-f0ed473d7ead -https://wpscan.com/vulnerability/2cbabde8-1e3e-4205-8a5c-b889447236a0/ -https://wpscan.com/vulnerability/2ce2a387-acc8-482a-9452-a4d9acb187fd -https://wpscan.com/vulnerability/2ce4c837-c62c-41ac-95ca-54bb1a6d1eeb -https://wpscan.com/vulnerability/2ce8c786-ba82-427c-b5e7-e3b300a24c5f/ -https://wpscan.com/vulnerability/2cf9e517-d882-4af2-bd12-e700b75e7a11 -https://wpscan.com/vulnerability/2d0c4872-a341-4974-926c-10b094a5d13c -https://wpscan.com/vulnerability/2d6ecd21-3dd4-423d-80e7-277c45080a9f -https://wpscan.com/vulnerability/2d6f9be0-b9fd-48e5-bd68-94eeb3822c0a -https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b -https://wpscan.com/vulnerability/2d821464-c502-4f71-afee-97b3dea16612 -https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0 -https://wpscan.com/vulnerability/2dc02e5c-1c89-4053-a6a7-29ee7b996183 -https://wpscan.com/vulnerability/2dc82bd7-651f-4af0-ad2a-c20a38eea0d0 -https://wpscan.com/vulnerability/2dfde2ef-1b33-4dc9-aa3e-02d319effb3a -https://wpscan.com/vulnerability/2e28a4e7-e7d3-485c-949c-e300e5b66cbd -https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/ -https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28 -https://wpscan.com/vulnerability/2e38b1bb-4410-45e3-87ca-d47a2cce9e22/ -https://wpscan.com/vulnerability/2e3af480-b1a4-404c-b0fc-2b7b6a6b9c27 -https://wpscan.com/vulnerability/2e78735a-a7fc-41fe-8284-45bf451eff06 -https://wpscan.com/vulnerability/2e829bbe-1843-496d-a852-4150fa6d1f7a -https://wpscan.com/vulnerability/2e9132b5-f8cd-4acc-839c-188d79277270 -https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965 -https://wpscan.com/vulnerability/2ecb18e6-b575-4a20-bd31-94d24f1d1efc -https://wpscan.com/vulnerability/2edab2b0-d4fd-4d50-aca0-2a1b7b37c23d -https://wpscan.com/vulnerability/2ee62f85-7aea-4b7d-8b2d-5d86d9fb8016 -https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558 -https://wpscan.com/vulnerability/2f0f1a32-0c7a-48e6-8617-e0b2dcf62727 -https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/ -https://wpscan.com/vulnerability/2f499945-1924-49f0-ad6e-9192273a5c05 -https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309 -https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5 -https://wpscan.com/vulnerability/2f7fe6e6-c3d0-4e27-8222-572d7a420153 -https://wpscan.com/vulnerability/2f86e418-22fd-4cb8-8de1-062b17cf20a7 -https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909 -https://wpscan.com/vulnerability/2f9ffc1e-c8a9-47bb-a76b-d043c93e63f8 -https://wpscan.com/vulnerability/2faccd1b-4b1c-4b3e-b917-de2d05e860f8 -https://wpscan.com/vulnerability/2fb28c77-3c35-4a2f-91ed-823d0d011048/ -https://wpscan.com/vulnerability/300ba418-63ed-4c03-9031-263742ed522e -https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de/ -https://wpscan.com/vulnerability/3014540c-21b3-481c-83a1-ce3017151af4 -https://wpscan.com/vulnerability/30211ffd-8751-4354-96d3-69b0106100b1 -https://wpscan.com/vulnerability/30544377-b90d-4762-b38a-ec89bda0dfdc/ -https://wpscan.com/vulnerability/30546402-03b8-4e18-ad7e-04a6b556ffd7/ -https://wpscan.com/vulnerability/3061f85e-a70e-49e5-bccf-ae9240f51178 -https://wpscan.com/vulnerability/30635cc9-4415-48bb-9c67-ea670ea1b942 -https://wpscan.com/vulnerability/306ea895-0b90-4276-bb97-eecb34f9bfae -https://wpscan.com/vulnerability/306ecf09-fdf0-449c-930c-9dfa58f0efc2 -https://wpscan.com/vulnerability/307b0fe4-39de-4fbb-8bb0-f7f15ec6ef52 -https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70 -https://wpscan.com/vulnerability/30882a45-ca03-4ff1-a36d-758d9b9b641c -https://wpscan.com/vulnerability/309296d4-c397-4fc7-85fb-a28b5b5b6a8d -https://wpscan.com/vulnerability/309799dd-dea7-489d-8d18-b6014534f5af -https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b -https://wpscan.com/vulnerability/30a74105-8ade-4198-abe2-1c6f2967443e -https://wpscan.com/vulnerability/30aebded-3eb3-4dda-90b5-12de5e622c91 -https://wpscan.com/vulnerability/30c70315-3c17-41f0-a12f-7e3f793e259c -https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305 -https://wpscan.com/vulnerability/30d1d328-9f19-4c4c-b90a-04937d617864 -https://wpscan.com/vulnerability/30f2a0d5-7959-436c-9860-2535020e82d3 -https://wpscan.com/vulnerability/30f31412-8f94-4d5e-a080-3f6f669703cd/ -https://wpscan.com/vulnerability/311974b5-6d6e-4b47-a33d-6d8f468aa528 -https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7 -https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b -https://wpscan.com/vulnerability/31596fc5-4203-40c4-9b0a-e8a37faafddd -https://wpscan.com/vulnerability/3167a83c-291e-4372-a42e-d842205ba722 -https://wpscan.com/vulnerability/3175c56d-27bb-4bf1-b6ba-737541483d40 -https://wpscan.com/vulnerability/31824250-e0d4-4285-97fa-9880b363e075 -https://wpscan.com/vulnerability/31a5b138-3d9e-4cd6-b85c-d20406ab51bd -https://wpscan.com/vulnerability/31b413e1-d4b5-463e-9910-37876881c062 -https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10 -https://wpscan.com/vulnerability/31f401c4-735a-4efb-b81f-ab98c00c526b/ -https://wpscan.com/vulnerability/31fdabb0-bc74-4d25-b0cd-c872aae6cb2f -https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/ -https://wpscan.com/vulnerability/32324655-ff91-4a53-a2c5-ebe6678d4a9d -https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d -https://wpscan.com/vulnerability/323fef8a-aa17-4698-9a02-c12d1d390763/ -https://wpscan.com/vulnerability/3242b820-1da0-41ba-9f35-7be5dbc6d4b0/ -https://wpscan.com/vulnerability/324e6b7b-a2ac-4c08-8b97-0967513f7328 -https://wpscan.com/vulnerability/3256e090-1131-459d-ade5-f052cd5d189f -https://wpscan.com/vulnerability/3258393a-eafb-4356-994e-2ff8ce223c9b -https://wpscan.com/vulnerability/325874f4-2482-4ae5-b5cf-cb9ff0843067 -https://wpscan.com/vulnerability/3266eb59-a8b2-4a5a-ab48-01a9af631b2c -https://wpscan.com/vulnerability/32799efd-99dc-46dd-8648-e9eb872a0371 -https://wpscan.com/vulnerability/327ae124-79eb-4e07-b029-e4f543cbd356/ -https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67 -https://wpscan.com/vulnerability/32a4a2b5-ef65-4e29-af4a-f003dbd0809c -https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f -https://wpscan.com/vulnerability/3313cc05-2267-4d93-a8a8-2c0701c21f66 -https://wpscan.com/vulnerability/332e1e1e-7420-4605-99bc-4074e212ff9b -https://wpscan.com/vulnerability/3351bc30-e5ff-471f-8d1c-b1bcdf419937 -https://wpscan.com/vulnerability/33705003-1f82-4b0c-9b4b-d4de75da309c -https://wpscan.com/vulnerability/33765da5-c56e-42c1-83dd-fcaad976b402 -https://wpscan.com/vulnerability/337ee7ed-9ade-4567-b976-88386cbcf036 -https://wpscan.com/vulnerability/3396b734-9a10-4070-802d-f9d01cc6eb74/ -https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/ -https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56 -https://wpscan.com/vulnerability/33b52dd7-613f-46e4-b8ee-beddd31689eb -https://wpscan.com/vulnerability/33dddaec-a32a-4fce-89d6-164565be13e1 -https://wpscan.com/vulnerability/33e4d7c6-fa6f-459f-84b9-732ec40088b8 -https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b -https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/ -https://wpscan.com/vulnerability/3482a015-a5ed-4913-b516-9eae2b3f89db -https://wpscan.com/vulnerability/3491b889-94dd-4507-9fed-58f48d8275cf -https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d -https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb -https://wpscan.com/vulnerability/34b3fc35-381a-4bd7-87e3-f1ef0a15a349 -https://wpscan.com/vulnerability/34d95d88-4114-4597-b4db-e9f5ef80d322 -https://wpscan.com/vulnerability/3505481d-141a-4516-bdbb-d4dad4e1eb01 -https://wpscan.com/vulnerability/350c3e9a-bcc2-486a-90e6-d1dc13ce1bd5 -https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f -https://wpscan.com/vulnerability/351f31e0-cd13-4079-8fd1-447f319133c9 -https://wpscan.com/vulnerability/35272197-c973-48ad-8405-538bfbafa172 -https://wpscan.com/vulnerability/352a9e05-2d5f-4bf7-8da9-85621fb15d91 -https://wpscan.com/vulnerability/35404d16-7213-4293-ac0d-926bd6c17444 -https://wpscan.com/vulnerability/354b98d8-46a1-4189-b347-198701ea59b9 -https://wpscan.com/vulnerability/3550ba54-7786-4ad9-aeb1-1c0750f189d0 -https://wpscan.com/vulnerability/35516555-c50c-486a-886c-df49c9e51e2c -https://wpscan.com/vulnerability/356a5977-c90c-4fc6-98ed-032d5b27f272 -https://wpscan.com/vulnerability/356c89a1-81b6-4600-9291-1a74788af7f9 -https://wpscan.com/vulnerability/359d145b-c365-4e7c-a12e-c26b7b8617ce -https://wpscan.com/vulnerability/35acd2d8-85fc-4af5-8f6c-224fa7d92900 -https://wpscan.com/vulnerability/35b0126d-9293-4e64-a00f-0903303f960a -https://wpscan.com/vulnerability/35ba38cf-4f23-4344-8de3-cf3004ebf84c -https://wpscan.com/vulnerability/35c9a954-37fc-4818-a71f-34aaaa0fa3db -https://wpscan.com/vulnerability/3620a087-032e-4a5f-99c8-f9e7e9c29813 -https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 -https://wpscan.com/vulnerability/36285052-8464-4fd6-b4b1-c175e730edad -https://wpscan.com/vulnerability/362c56ff-85eb-480f-a825-9670d4c0e3d0/ -https://wpscan.com/vulnerability/363182f1-9fda-4363-8f6a-be37c4c07aa9 -https://wpscan.com/vulnerability/364b0843-a990-4204-848a-60c928cc5bc0 -https://wpscan.com/vulnerability/365007f0-61ac-4e81-8a3a-3a068f2c84bc -https://wpscan.com/vulnerability/365b15e6-3755-4ed5-badd-c9dd962bd9fa -https://wpscan.com/vulnerability/365c09a7-0b10-4145-a415-5c0e9f429ae0 -https://wpscan.com/vulnerability/3673e13f-7ce6-4d72-b179-ae4bab55514c -https://wpscan.com/vulnerability/368828f9-fdd1-4a82-8658-20e0f4c4da0c -https://wpscan.com/vulnerability/36a7b872-31fa-4375-9be7-8f787e616ed5 -https://wpscan.com/vulnerability/36aae14e-4bdf-4da6-a0f9-d71935105d45 -https://wpscan.com/vulnerability/36afc442-9634-498e-961e-4c935880cd2b -https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3 -https://wpscan.com/vulnerability/36cc5151-1d5e-4874-bcec-3b6326235db1 -https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810 -https://wpscan.com/vulnerability/36ced447-84ea-4162-80d2-6df226cb53cb -https://wpscan.com/vulnerability/36d78b6c-0da5-44f8-b7b3-eae78edac505 -https://wpscan.com/vulnerability/36e8efe8-b29f-4c9e-9dd5-3e317aa43e0c -https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/ -https://wpscan.com/vulnerability/36fd6c0d-3f0c-4f7d-aa17-5b2d084ab94c -https://wpscan.com/vulnerability/372a66ca-1c3c-4429-86a5-81dbdaa9ec7d -https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb -https://wpscan.com/vulnerability/37554d0e-68e2-4df9-8c59-65f5cd7f184e -https://wpscan.com/vulnerability/375bd694-1a30-41af-bbd4-8a8ee54f0dbf -https://wpscan.com/vulnerability/3762a77c-b8c9-428f-877c-bbfd7958e7be -https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd -https://wpscan.com/vulnerability/376e2bc7-2eb9-4e0a-809c-1582940ebdc7 -https://wpscan.com/vulnerability/377fd65f-3a8c-4f7a-9e40-046d52ec0eef -https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6 -https://wpscan.com/vulnerability/37c7bdbb-f27f-47d3-9886-69d2e83d7581 -https://wpscan.com/vulnerability/37e0a033-3dee-476d-ae86-68354e8f0b1c -https://wpscan.com/vulnerability/38018695-901d-48d9-b39a-7c00df7f0a4b -https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e -https://wpscan.com/vulnerability/38053e05-4b17-4fa9-acd3-85d8529b202b -https://wpscan.com/vulnerability/381ef15b-aafe-4ef4-a0bc-867d891f7f44 -https://wpscan.com/vulnerability/38274ef2-5100-4669-9544-a42346b6727d -https://wpscan.com/vulnerability/3834a162-2cdc-41e9-9c9d-2b576eed4db9 -https://wpscan.com/vulnerability/3843b867-7784-4976-b5ab-8a1e7d45618a -https://wpscan.com/vulnerability/3851e61e-f462-4259-af0a-8d832809d559 -https://wpscan.com/vulnerability/388cd42d-b61a-42a4-8604-99b812db2357 -https://wpscan.com/vulnerability/389b71d6-b0e6-4e36-b9ca-9d8dab75bb0a -https://wpscan.com/vulnerability/38c337c6-048f-4009-aef8-29c18afa6fdc -https://wpscan.com/vulnerability/38d99c7d-2d10-4910-b95a-1cb545b813c4 -https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252 -https://wpscan.com/vulnerability/39258aba-2449-4214-a490-b8e46945117d -https://wpscan.com/vulnerability/3931daac-3899-4169-8625-4c95fd2adafc -https://wpscan.com/vulnerability/39388900-266d-4308-88e7-d40ca6bbe346 -https://wpscan.com/vulnerability/39392055-8cd3-452f-8bcb-a650f5bddc2e -https://wpscan.com/vulnerability/393be73a-f8dc-462f-8670-f20ab89421fc -https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d -https://wpscan.com/vulnerability/3957056c-df25-41f7-ab0d-1d09222f2fa5 -https://wpscan.com/vulnerability/395bc893-2067-4f76-b49f-9ed8e1e8f330 -https://wpscan.com/vulnerability/3993fa42-b4c3-462b-b568-0a08fe112c19 -https://wpscan.com/vulnerability/3999a1b9-df85-43b1-b412-dc8a6f71cc5d -https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2 -https://wpscan.com/vulnerability/39c964fa-6d8d-404d-ac38-72f6f88d203c -https://wpscan.com/vulnerability/39e127f1-c36e-4699-892f-3755ee17bab6 -https://wpscan.com/vulnerability/39e69487-aa53-4b78-a422-12515a6449bf -https://wpscan.com/vulnerability/39ed4934-3d91-4924-8acc-25759fef9e81 -https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720 -https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5 -https://wpscan.com/vulnerability/3acc6940-13ec-40fb-8471-6b2f0445c543 -https://wpscan.com/vulnerability/3afaed61-6187-4915-acf0-16e79d5c2464 -https://wpscan.com/vulnerability/3afef591-9e00-4af8-a8a6-e04ec5e61795 -https://wpscan.com/vulnerability/3b33c262-e7f0-4310-b26d-4727d7c25c9d -https://wpscan.com/vulnerability/3b45cc0b-7378-49f3-900e-d0e18cd4b878 -https://wpscan.com/vulnerability/3b52b25c-82a1-41c7-83ac-92e244f7c5ab -https://wpscan.com/vulnerability/3b5c377c-3148-4373-996c-89851d5e39e5 -https://wpscan.com/vulnerability/3b6969a7-5cbc-4e16-8f27-5dde481237f5 -https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635 -https://wpscan.com/vulnerability/3b8ba734-7764-4ab6-a7e2-8de55bd46bed/ -https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/ -https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3 -https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329 -https://wpscan.com/vulnerability/3c114e14-9113-411d-91f3-2e2daeb40739/ -https://wpscan.com/vulnerability/3c4318a9-a3c5-409b-a52e-edd8583c3c43 -https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 -https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd -https://wpscan.com/vulnerability/3c5ff229-85c2-49c2-8fb9-6419a8002a4e -https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182 -https://wpscan.com/vulnerability/3c76d0f4-2ea8-433d-afb2-e35e45630899 -https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820 -https://wpscan.com/vulnerability/3ca22b22-fe89-42be-94ec-b164838bcf50 -https://wpscan.com/vulnerability/3ca6d724-cd79-4e07-b8d0-a8c1688abf16 -https://wpscan.com/vulnerability/3ca9ac21-2bce-4480-9079-b4045b261273 -https://wpscan.com/vulnerability/3caf0de0-57f2-4c87-8713-d00a7db9eeef -https://wpscan.com/vulnerability/3cb148fb-1f30-4316-a421-10da51d849f3 -https://wpscan.com/vulnerability/3cb1f707-6093-42a7-a778-2b296bdf1735/ -https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387 -https://wpscan.com/vulnerability/3cd1d8d2-d2a4-45a9-9b5f-c2a56f08be85 -https://wpscan.com/vulnerability/3cec27ca-f470-402d-ae3e-271cb59cf407 -https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c -https://wpscan.com/vulnerability/3cfb6696-18ad-4a38-9ca3-992f0b768b78 -https://wpscan.com/vulnerability/3cfcb8cc-9c4f-409c-934f-9f3f043de6fe -https://wpscan.com/vulnerability/3d15f589-956c-4c71-98b1-3ba89d22262c/ -https://wpscan.com/vulnerability/3d1f90d9-45da-42f8-93f8-15c8a4ff90ca -https://wpscan.com/vulnerability/3d6889e3-a01b-4e7f-868f-af7cc8c7531a -https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d -https://wpscan.com/vulnerability/3db9a8f5-3335-4b8d-a067-091cbfed1efc -https://wpscan.com/vulnerability/3e262cd7-ca64-4190-8d8c-38b07bbe63e0 -https://wpscan.com/vulnerability/3e43156a-b784-4066-be69-23b139aafbad -https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0 -https://wpscan.com/vulnerability/3e8bd875-2435-4a15-8ee8-8a00882b499c -https://wpscan.com/vulnerability/3ed821a6-c3e2-4964-86f8-d14c4a54708a -https://wpscan.com/vulnerability/3ef4783b-4e4a-4691-b858-a7fa8dada4ec -https://wpscan.com/vulnerability/3f2565cd-7050-4ebd-9a50-cd9b9f7c3341 -https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596 -https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669 -https://wpscan.com/vulnerability/3f90347a-6586-4648-9f2c-d4f321bf801a -https://wpscan.com/vulnerability/3fa6c8b3-6b81-4fe3-b997-25c9e5fdec86 -https://wpscan.com/vulnerability/3fafbec0-55e4-41cf-8402-1b57b6615225 -https://wpscan.com/vulnerability/3fc7986e-3b38-4e16-9516-2ae00bc7a581 -https://wpscan.com/vulnerability/3fde5336-552c-4861-8b4d-89a16735c0e2 -https://wpscan.com/vulnerability/3fe712bc-ce7f-4b30-9fc7-1ff15aa5b6ce -https://wpscan.com/vulnerability/3ffcee7c-1e03-448c-8006-a9405658cdb7 -https://wpscan.com/vulnerability/4000ba69-d73f-4c5b-a299-82898304cebb -https://wpscan.com/vulnerability/40191e87-8648-47ef-add0-d7180e8ffe13 -https://wpscan.com/vulnerability/40603382-404b-44a2-8212-f2008366891c -https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea -https://wpscan.com/vulnerability/4086b62c-c527-4721-af63-7f2687c98648 -https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359 -https://wpscan.com/vulnerability/4098b18d-6ff3-462c-af05-48adb6599cf3/ -https://wpscan.com/vulnerability/40c420aa-5da0-42f9-a94f-f68ef57fcdae -https://wpscan.com/vulnerability/40c7e424-9a97-41ab-a312-2a06b607609a -https://wpscan.com/vulnerability/40d347b1-b86e-477d-b4c6-da105935ce37 -https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74 -https://wpscan.com/vulnerability/41096d40-83d4-40b4-9632-afef51e8b00e -https://wpscan.com/vulnerability/413b3a2e-1c05-45ec-b00f-1c137a1ae33e -https://wpscan.com/vulnerability/41508340-8caf-4dca-bd88-350b63b78ab0 -https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e -https://wpscan.com/vulnerability/4188ed01-b64b-4aba-a215-e8dc5b308486 -https://wpscan.com/vulnerability/419054d4-95e8-4f4a-b864-a98b3e18435a -https://wpscan.com/vulnerability/41a2c72c-7db1-473a-8844-47f6ae9d0594 -https://wpscan.com/vulnerability/41abeacb-ef3e-4621-89bb-df0f2eb617da -https://wpscan.com/vulnerability/41d9027c-a982-44c7-889e-721333496b5c -https://wpscan.com/vulnerability/4204682b-f657-42e1-941c-bee7a245e9fd -https://wpscan.com/vulnerability/421194e1-6c3f-4972-8f3c-de1b9d2bcb13 -https://wpscan.com/vulnerability/42127d96-547f-46cb-95d0-a19a8fe7580e -https://wpscan.com/vulnerability/423c8881-628b-4380-9677-65b3f5165efe -https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560 -https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553 -https://wpscan.com/vulnerability/4267109c-0ca2-441d-889d-fb39c235f128 -https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826 -https://wpscan.com/vulnerability/426eafb1-0261-4e7e-8c70-75bf4c476f18 -https://wpscan.com/vulnerability/42760007-0e59-4d45-8d64-86bc0b8dacea -https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc -https://wpscan.com/vulnerability/42a8947f-2ae5-4f12-bd3d-ab3716501df5 -https://wpscan.com/vulnerability/42b1f017-c497-4825-b12a-8dce3e108a55 -https://wpscan.com/vulnerability/42c3ac68-4bbc-4d47-ad53-2c9ed48cd677 -https://wpscan.com/vulnerability/42db1ba5-1b14-41bd-a2b3-7243a84c9d3d -https://wpscan.com/vulnerability/42f1bf1f-95a8-41ee-a637-88deb80ab870 -https://wpscan.com/vulnerability/431901eb-0f95-4033-b943-324e6d3844a5 -https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a/ -https://wpscan.com/vulnerability/4352283f-dd43-4827-b417-0c55d0f4637d -https://wpscan.com/vulnerability/43581d6b-333a-48d9-a1ae-b9479da8ff87 -https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731 -https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf -https://wpscan.com/vulnerability/4365c813-4bd7-4c7c-a15b-ef9a42d32b26 -https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 -https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad -https://wpscan.com/vulnerability/4385370e-cf99-4249-b2c1-90cbfa8378a4 -https://wpscan.com/vulnerability/4394fe86-4240-4454-b724-81464b04123a -https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865 -https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36 -https://wpscan.com/vulnerability/43ab0997-4d15-4ff7-af41-7b528b0ba3c7 -https://wpscan.com/vulnerability/43b8cfb4-f875-432b-8e3b-52653fdee87c -https://wpscan.com/vulnerability/44024299-ba40-4da7-81e1-bd44d10846f3 -https://wpscan.com/vulnerability/4423b023-cf4a-46cb-b314-7a09ac08b29a -https://wpscan.com/vulnerability/4440e7ca-1a55-444d-8f6c-04153302d750 -https://wpscan.com/vulnerability/44448888-cd5d-482e-859e-123e442ce5c1 -https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9 -https://wpscan.com/vulnerability/44555c79-480d-4b6a-9fda-988183c06909 -https://wpscan.com/vulnerability/446de364-720e-41ec-b80e-7678c8f4ad80 -https://wpscan.com/vulnerability/4481731d-4dbf-4bfa-b4cc-64f10bb7e7bf -https://wpscan.com/vulnerability/4492b5ad-c339-47f5-9003-a9c5f23efdd9 -https://wpscan.com/vulnerability/44b51a56-ff05-4d50-9327-fc9bab74d4b7 -https://wpscan.com/vulnerability/44f5a29a-05f9-40d2-80f2-6fb2bda60d79 -https://wpscan.com/vulnerability/4500566a-e5f2-40b8-a185-2bcace221b4e -https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/ -https://wpscan.com/vulnerability/450f94a3-56b1-41c7-ac29-fbda1dc04794 -https://wpscan.com/vulnerability/45117646-88ff-41d4-8abd-e2f18d4b693e -https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523 -https://wpscan.com/vulnerability/451b47d5-7bd2-4a82-9c8e-fe6601bcd2ab -https://wpscan.com/vulnerability/4560eef4-253b-49a4-8e20-9520c45c6f7f -https://wpscan.com/vulnerability/45878983-7e9b-49c2-8f99-4c28aab24f09 -https://wpscan.com/vulnerability/458a576e-a7ed-4758-a80c-cd08c370aaf4 -https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92 -https://wpscan.com/vulnerability/45a43927-a427-46bc-9c61-e0b8532c8138 -https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac -https://wpscan.com/vulnerability/45f43359-98c2-4447-b51b-2d466bad8261 -https://wpscan.com/vulnerability/460a01e5-7ce5-4d49-b068-a93ea1fba0e3 -https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810 -https://wpscan.com/vulnerability/4621e86e-aba4-429c-8e08-32cf9b4c65e6 -https://wpscan.com/vulnerability/4688d39e-ac9b-47f5-a4c1-f9548b63c68c -https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae -https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ -https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d -https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8 -https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f -https://wpscan.com/vulnerability/46b4582f-7651-4b74-a00b-1788587ecfa8 -https://wpscan.com/vulnerability/46b634f6-92bc-4e00-a4c0-c25135c61922 -https://wpscan.com/vulnerability/46ed56db-9b9d-4390-80fc-343a01fcc3c9 -https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db64ccd/ -https://wpscan.com/vulnerability/471f3226-8f90-43d1-b826-f11ef4bbd602 -https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a -https://wpscan.com/vulnerability/47652b24-a6f0-4bbc-834e-496b88523fe7 -https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886 -https://wpscan.com/vulnerability/479704d8-057b-4642-b84a-4a78567ba20b -https://wpscan.com/vulnerability/47a5fbfd-f47c-4356-8567-b29dadb48423 -https://wpscan.com/vulnerability/47d15f1c-b9ca-494d-be8f-63c30e92f9b8 -https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e -https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ -https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347 -https://wpscan.com/vulnerability/4832e223-4571-4b45-97db-2fd403797c49/ -https://wpscan.com/vulnerability/483ed482-a1d1-44f6-8b99-56e653d3e45f -https://wpscan.com/vulnerability/48464b3f-fe57-40fe-8868-398a36099fb9 -https://wpscan.com/vulnerability/48612c44-151d-4438-b91c-c27e96174270 -https://wpscan.com/vulnerability/4869fdc7-4fc7-4917-bc00-b6ced9ccc871 -https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92 -https://wpscan.com/vulnerability/48820f1d-45cb-4f1f-990d-d132bfc5536f -https://wpscan.com/vulnerability/4889ad5a-c8c4-4958-b176-64560490497b -https://wpscan.com/vulnerability/48a3a542-9130-4524-9d19-ff9eccecb148/ -https://wpscan.com/vulnerability/48ade7a5-5abb-4267-b9b6-13e31e1b3e91 -https://wpscan.com/vulnerability/48dccf4c-07e0-4877-867d-f8f43aeb5705 -https://wpscan.com/vulnerability/48ec2e4a-0190-4f36-afd1-d5799ba28c13 -https://wpscan.com/vulnerability/49328498-d3a0-4d27-8a52-24054b5e42f3 -https://wpscan.com/vulnerability/49589867-f764-4c4a-b640-84973c673b23 -https://wpscan.com/vulnerability/495e39db-793d-454b-9ef1-dd91cae2c49b -https://wpscan.com/vulnerability/497d0bf9-b750-4293-9662-1722a74442e2 -https://wpscan.com/vulnerability/4992a4a9-f21a-46e2-babf-954acfc7c5b4/ -https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66 -https://wpscan.com/vulnerability/49abe79c-ab1c-4dbf-824c-8daaac7e079d -https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 -https://wpscan.com/vulnerability/49bc46a8-9d55-4fa1-8e0d-0556a6336fa0 -https://wpscan.com/vulnerability/4a27d374-f690-4a8a-987a-9e0f56bbe143 -https://wpscan.com/vulnerability/4a2dddfc-6ce2-4edd-aaaa-4c130a9356d0 -https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6 -https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531 -https://wpscan.com/vulnerability/4a585d5f-72ba-43e3-b04f-8b3e1b84444a -https://wpscan.com/vulnerability/4a6b278a-4c11-4624-86bf-754212979643 -https://wpscan.com/vulnerability/4a90be69-41eb-43e9-962d-34316497b4df -https://wpscan.com/vulnerability/4a98a024-1f84-482f-9dc9-4714ac42c094 -https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c -https://wpscan.com/vulnerability/4abd1454-380c-4c23-8474-d7da4b2f3b8e -https://wpscan.com/vulnerability/4ac03907-2373-48f0-bca1-8f7073c06b18 -https://wpscan.com/vulnerability/4ad297e5-c92d-403c-abf4-9decf7e8378b -https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee -https://wpscan.com/vulnerability/4ae6bf90-b100-4bb5-bdd7-8acdbd950596 -https://wpscan.com/vulnerability/4b058966-0859-42ed-a796-b6c6cb08a9fc -https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6 -https://wpscan.com/vulnerability/4b4e417d-0ae2-4c3c-81e6-4dcf39eb5697 -https://wpscan.com/vulnerability/4b55f868-62f8-43a1-9817-68cd1fc6190f -https://wpscan.com/vulnerability/4b7c61da-952c-492a-8ce6-3c2126942a7c -https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/ -https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7 -https://wpscan.com/vulnerability/4bda5dff-f577-4cd8-a225-c6b4c32f22b4 -https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f -https://wpscan.com/vulnerability/4c1b0e5e-245a-4d1f-a561-e91af906e62d -https://wpscan.com/vulnerability/4c45df6d-b3f6-49e5-8b1f-edd32a12d71c -https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/ -https://wpscan.com/vulnerability/4c9fe97e-3d9b-4079-88d9-34e2d0605215 -https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e -https://wpscan.com/vulnerability/4ce69d71-87bf-4d95-90f2-63d558c78b69 -https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56 -https://wpscan.com/vulnerability/4d0c60d1-db5a-4c4f-9bdb-669975ac7210 -https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3 -https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626 -https://wpscan.com/vulnerability/4d3b90d8-8a6d-4b72-8bc7-21f861259a1b -https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52 -https://wpscan.com/vulnerability/4d55d1f5-a7b8-4029-942d-7a13e2498f64 -https://wpscan.com/vulnerability/4d594424-8048-482d-b61c-45be1e97a8ba -https://wpscan.com/vulnerability/4d715de6-8595-4da9-808a-04a28e409900 -https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f -https://wpscan.com/vulnerability/4d91f3e1-4de9-46c1-b5ba-cc55b7726867 -https://wpscan.com/vulnerability/4dad1c0d-bcf9-4486-bd8e-387ac8e6c892 -https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed -https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 -https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1 -https://wpscan.com/vulnerability/4e165122-4746-42de-952e-a3bf51393a74 -https://wpscan.com/vulnerability/4e51dffa-027d-4f3d-a190-dcc5269f6435 -https://wpscan.com/vulnerability/4e5aa9a3-65a0-47d6-bc26-a2fb6cb073ff -https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828 -https://wpscan.com/vulnerability/4ea0127e-afef-41bf-a005-c57432f9f58c -https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b -https://wpscan.com/vulnerability/4ed8296e-1306-481f-9a22-723b051122c0 -https://wpscan.com/vulnerability/4ef99f54-68df-4353-8fc0-9b09ac0df7ba/ -https://wpscan.com/vulnerability/4efd2a4d-89bd-472f-ba5a-f9944fd4dd16/ -https://wpscan.com/vulnerability/4f1d45bc-d3bd-472c-959d-05abeff32765 -https://wpscan.com/vulnerability/4f5597f9-ab27-42d2-847c-14455b7d0849 -https://wpscan.com/vulnerability/4f5c3f75-0501-4a1a-95ea-cbfd3fc96852 -https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812 -https://wpscan.com/vulnerability/4fb61b84-ff5f-4b4c-a516-54b749f9611e -https://wpscan.com/vulnerability/4fb90999-6f91-4200-a0cc-bfe9b34a5de9 -https://wpscan.com/vulnerability/4fd2f1ef-39c6-4425-8b4d-1a332dabac8d -https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8 -https://wpscan.com/vulnerability/5001ed18-858e-4c9d-9d7b-a1305fcdf61b -https://wpscan.com/vulnerability/50037028-2790-47ee-aae1-faf0724eb917 -https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14/ -https://wpscan.com/vulnerability/5019db80-0356-497d-b488-a26a5de78676 -https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8 -https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639 -https://wpscan.com/vulnerability/50680797-61e4-4737-898f-e5b394d89117 -https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e -https://wpscan.com/vulnerability/5085ec75-0795-4004-955d-e71b3d2c26c6 -https://wpscan.com/vulnerability/50963747-ae8e-42b4-bb42-cc848be7b92e/ -https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a -https://wpscan.com/vulnerability/50acd35f-eb31-4aba-bf32-b390e9514beb -https://wpscan.com/vulnerability/50ae7008-46f0-4f89-ae98-65dcabe4ef09 -https://wpscan.com/vulnerability/50b6f770-6f53-41ef-b2f3-2a58e9afd332 -https://wpscan.com/vulnerability/50be0ebf-fe6d-41e5-8af9-0d74f33aeb57 -https://wpscan.com/vulnerability/50d81eec-f324-4445-b10f-96e94153917e -https://wpscan.com/vulnerability/50f70927-9677-4ba4-a388-0a41ed356523 -https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab -https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162 -https://wpscan.com/vulnerability/511327d3-499b-4ad9-8fd3-99f9f7deb4f5 -https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3 -https://wpscan.com/vulnerability/512a9ba4-01c0-4614-a991-efdc7fe51abe -https://wpscan.com/vulnerability/514416fa-d915-4953-bf1b-6dbf40b4d7e5 -https://wpscan.com/vulnerability/514ffd28-f2c2-4c95-87b5-d05ce0746f89 -https://wpscan.com/vulnerability/517154dc-d6bd-462d-b955-061a7b7f8da5 -https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db -https://wpscan.com/vulnerability/518204d8-fbf5-4bfa-9db5-835f908f8d8e -https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d -https://wpscan.com/vulnerability/519205ff-2ff6-41e4-9e95-475ab2ce35b9 -https://wpscan.com/vulnerability/51987966-8007-4e12-bc2e-997b92054739 -https://wpscan.com/vulnerability/51b4752a-7922-444d-a022-f1c7159b5d84 -https://wpscan.com/vulnerability/51b91d0e-33af-41ce-b95f-d422586f1d5f -https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670 -https://wpscan.com/vulnerability/51e57f25-b8b2-44ca-9162-d7328eac64eb -https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1 -https://wpscan.com/vulnerability/524928d6-d4e9-4a2f-b410-46958da549d8 -https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014 -https://wpscan.com/vulnerability/52bd94df-8816-48fd-8788-38d045eb57ca -https://wpscan.com/vulnerability/52c8755c-46b9-4383-8c8d-8816f03456b0 -https://wpscan.com/vulnerability/52cf7e3c-2a0c-45c4-be27-be87424f1338 -https://wpscan.com/vulnerability/52d221bd-ae42-435d-a90a-60a5ae530663 -https://wpscan.com/vulnerability/52e29f16-b6dd-4132-9bb8-ad10bd3c39d7 -https://wpscan.com/vulnerability/52eff451-8ce3-4ac4-b530-3196aa82db48 -https://wpscan.com/vulnerability/53085936-fa07-4f00-a7dc-bbe98c51320e -https://wpscan.com/vulnerability/53103cdc-a4bf-40fa-aeb1-790fc7a65f0a -https://wpscan.com/vulnerability/531b3fac-48b9-4821-a3aa-4db073d43aae -https://wpscan.com/vulnerability/533c19d5-219c-4389-a8bf-8b3a35b33b20 -https://wpscan.com/vulnerability/5340ae4e-95ba-4a69-beb1-3459cac17782 -https://wpscan.com/vulnerability/5341cb5d-d204-49e1-b013-f8959461995f/ -https://wpscan.com/vulnerability/53702281-1bd5-4828-b7a4-9f81cf0b6bb6 -https://wpscan.com/vulnerability/5375bd3e-a30d-4f24-9b17-470b28a8231c -https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1 -https://wpscan.com/vulnerability/53816136-4b1a-4b7d-b73b-08a90c2a638f -https://wpscan.com/vulnerability/53868650-aba0-4d07-89d2-a998bb0ee5f6 -https://wpscan.com/vulnerability/5395d196-a39a-4a58-913e-5b5b9d6123a5 -https://wpscan.com/vulnerability/53c8190c-baef-4807-970b-f01ab440576a -https://wpscan.com/vulnerability/53d2c61d-ce73-40e0-a113-9d76d8fecc91 -https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30 -https://wpscan.com/vulnerability/53ff82ec-00ec-4b20-8f60-db9db8c025b4 -https://wpscan.com/vulnerability/54150be5-a53f-4b94-8ce5-04e073e3ab1f -https://wpscan.com/vulnerability/54168861-c0b8-4de6-a9af-0ad5c20b4a45 -https://wpscan.com/vulnerability/541974d6-2df8-4497-9aee-afd3b9024102 -https://wpscan.com/vulnerability/541bbe4c-3295-4073-901d-763556269f48 -https://wpscan.com/vulnerability/542caa40-b199-4397-90bb-4fdb693ebb24 -https://wpscan.com/vulnerability/5433ef4c-4451-4b6e-992b-69c5eccabf90 -https://wpscan.com/vulnerability/5440d177-e995-403e-b2c9-42ceda14579e -https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c -https://wpscan.com/vulnerability/545c9e2f-bacd-4f30-ae01-de1583e26d32 -https://wpscan.com/vulnerability/546c47c2-5b4b-46db-b754-c6b43aef2660 -https://wpscan.com/vulnerability/54a00416-c7e3-44f3-8dd2-ed9e748055e6/ -https://wpscan.com/vulnerability/54e16f0a-667c-44ea-98ad-0306c4a35d9d -https://wpscan.com/vulnerability/54e4494c-a280-4d91-803d-7d55159cdbc5 -https://wpscan.com/vulnerability/54f95b51-5804-4bee-9e4a-f73b8ef9bbd5 -https://wpscan.com/vulnerability/54ff0db8-1d9e-4e67-b71a-142a9e5ed851 -https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495 -https://wpscan.com/vulnerability/550e08ac-4c3a-4e22-8e98-bc5bfc020ca9 -https://wpscan.com/vulnerability/5563c030-bd62-4839-98e8-84bc8191e242 -https://wpscan.com/vulnerability/557c1c49-7195-4085-b67a-9fd8aca57845 -https://wpscan.com/vulnerability/558e06ab-704b-4bb1-ba7f-b5f6bbbd68d9 -https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b -https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5 -https://wpscan.com/vulnerability/55b89de0-30ed-4f98-935e-51f069faf6fc -https://wpscan.com/vulnerability/55cd6d5e-92c1-407a-8c0f-f89d415ebb66 -https://wpscan.com/vulnerability/55d11acf-8c47-40da-be47-24f74fd7566e -https://wpscan.com/vulnerability/55d23184-fc5a-4090-b079-142407b59b05 -https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2 -https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82 -https://wpscan.com/vulnerability/564a66d5-7fab-4de0-868a-e19466a507af -https://wpscan.com/vulnerability/564ad2b0-6ba6-4415-98d7-8d41bc1c3d44 -https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 -https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e -https://wpscan.com/vulnerability/566ff8dc-f820-412b-b2d3-fa789bce528e -https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5 -https://wpscan.com/vulnerability/5687e5db-d987-416d-a7f4-036cce4d56cb -https://wpscan.com/vulnerability/56a1c050-67b5-43bc-b5b6-28d9a5a59eba -https://wpscan.com/vulnerability/56abd1e2-0ea9-47f7-9a1b-2093ac15d39c -https://wpscan.com/vulnerability/56d2d55b-bd09-47af-988c-7f47eec4151f -https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/ -https://wpscan.com/vulnerability/56dae1ae-d5d2-45d3-8991-db69cc47ddb7 -https://wpscan.com/vulnerability/56e1bb56-bfc5-40dd-b2d0-edef43d89bdf -https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553 -https://wpscan.com/vulnerability/5717d729-c24b-4415-bb99-fcdd259328c4 -https://wpscan.com/vulnerability/57267c3c-d55e-4b37-a6d0-c5cd8569625c -https://wpscan.com/vulnerability/574f7607-96d8-4ef8-b96c-0425ad7e7690 -https://wpscan.com/vulnerability/5754a4fd-1adf-47aa-976f-3b28750058c2 -https://wpscan.com/vulnerability/575c02ea-4fe9-428c-bbc8-e161af679b6d -https://wpscan.com/vulnerability/576cc93d-1499-452b-97dd-80f69002e2a0 -https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd -https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7 -https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a -https://wpscan.com/vulnerability/578f4179-e7be-4963-9379-5e694911b451 -https://wpscan.com/vulnerability/57bc6633-1aeb-4c20-a2a5-9b3fa10ba95d -https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e -https://wpscan.com/vulnerability/57e528ce-ec8c-4734-8903-926be36f91e7 -https://wpscan.com/vulnerability/57f0a078-fbeb-4b05-8892-e6d99edb82c1 -https://wpscan.com/vulnerability/57fff222-2c64-4b52-86cd-ab8db4541627 -https://wpscan.com/vulnerability/5855f1fe-28f6-4cd6-a83c-95c23d809b79 -https://wpscan.com/vulnerability/585cb2f2-7adc-431f-89d4-4e947f16af18/ -https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7 -https://wpscan.com/vulnerability/586cf0a5-515c-43ea-8c03-f2f47ed13c2c/ -https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9 -https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/ -https://wpscan.com/vulnerability/58803934-dbd3-422d-88e7-ebbc5e8c0886 -https://wpscan.com/vulnerability/5882ea89-f463-4f0b-a624-150bbaf967c2 -https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587 -https://wpscan.com/vulnerability/58a63507-f0fd-46f1-a80c-6b1c41dddcf5 -https://wpscan.com/vulnerability/58c11f1e-6ea0-468c-b974-4aea9eb94b82 -https://wpscan.com/vulnerability/58c9a007-42db-4142-b096-0b9ba8850f87 -https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/ -https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056 -https://wpscan.com/vulnerability/58f7c9aa-5e59-468f-aba9-b15e7942fd37/ -https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc -https://wpscan.com/vulnerability/5904dc7e-1058-4c40-bca3-66ba57b1414b/ -https://wpscan.com/vulnerability/5909a423-9841-449c-a569-f687c609817b -https://wpscan.com/vulnerability/590b446d-f8bc-49b0-93e7-2a6f2e6f62f1 -https://wpscan.com/vulnerability/5916ea42-eb33-463d-8528-2a142805c91f -https://wpscan.com/vulnerability/5925b263-6d6f-4a03-a98a-620150dff8f7 -https://wpscan.com/vulnerability/59589e74-f901-4f4d-81de-26ad19d1b7fd -https://wpscan.com/vulnerability/597e9686-f4e2-43bf-85ef-c5967e5652bd -https://wpscan.com/vulnerability/598d5c1b-7930-46a6-9a31-5e08a5f14907 -https://wpscan.com/vulnerability/59911ba4-fa06-498a-9e7c-0c337cce691c -https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc -https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf -https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d -https://wpscan.com/vulnerability/59dd3917-01cb-479f-a557-021b2a5147df -https://wpscan.com/vulnerability/59fa32d2-aa66-4980-9ee5-0a7513f3a2b0 -https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/ -https://wpscan.com/vulnerability/5a2756c1-9abf-4fd6-8ce2-9f840514dfcc -https://wpscan.com/vulnerability/5a348b5d-13aa-40c3-9d21-0554683f8019/ -https://wpscan.com/vulnerability/5a363eeb-9510-4535-97e2-9dfd3b10d511 -https://wpscan.com/vulnerability/5a4096e8-abe4-41c4-b741-c44e740e8689 -https://wpscan.com/vulnerability/5a4774ec-c0ee-4c6b-92a6-fa10821ec336 -https://wpscan.com/vulnerability/5a5293ed-ddcb-4a63-9420-09942e7d69c2 -https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0 -https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1 -https://wpscan.com/vulnerability/5a71049a-09a6-40ab-a4e8-44634869d4fb -https://wpscan.com/vulnerability/5a7c6367-a3e6-4411-8865-2a9dbc9f1450 -https://wpscan.com/vulnerability/5ab3fc58-7d1c-4bcd-8bbd-86c62a3f979c -https://wpscan.com/vulnerability/5adb977e-f7bf-4d36-b625-87bc23d379c8 -https://wpscan.com/vulnerability/5aff50fc-ac96-4076-a07c-bb145ae37025 -https://wpscan.com/vulnerability/5b1aacd1-3f75-4a6f-8146-cbb98a713724 -https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2/ -https://wpscan.com/vulnerability/5b983c48-6b05-47cf-85cb-28bbeec17395 -https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/ -https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24c -https://wpscan.com/vulnerability/5be611e8-5b7a-4579-9757-45a4c94a53ca -https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431 -https://wpscan.com/vulnerability/5c21ad35-b2fb-4a51-858f-8ffff685de4a -https://wpscan.com/vulnerability/5c5955d7-24f0-45e6-9c27-78ef50446dad -https://wpscan.com/vulnerability/5c5d41b9-1463-4a9b-862f-e9ee600ef8e1 -https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de -https://wpscan.com/vulnerability/5c73754c-eebe-424a-9d3b-ca83eb53bf87 -https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/ -https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2 -https://wpscan.com/vulnerability/5c8473f4-4b52-430b-9140-b81b0a0901da -https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93 -https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f -https://wpscan.com/vulnerability/5cafbba6-478f-4f5d-a2d4-60c6a22f2f1e -https://wpscan.com/vulnerability/5ccfee43-920d-4613-b976-2ea8966696ba -https://wpscan.com/vulnerability/5cd846df-1d8b-488d-a691-b76850e8687a -https://wpscan.com/vulnerability/5cfbbddd-d941-4665-be8b-a54454527571/ -https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/ -https://wpscan.com/vulnerability/5d70818e-730d-40c9-a2db-652052a5fd5c -https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126 -https://wpscan.com/vulnerability/5d8c28ac-a46c-45d3-acc9-2cd2e6356ba2 -https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b -https://wpscan.com/vulnerability/5da5ce9a-82a6-404f-8dec-795d7905b3f9 -https://wpscan.com/vulnerability/5dc8b671-f2fa-47be-8664-9005c4fdbea8 -https://wpscan.com/vulnerability/5dd6f625-6738-4e6a-81dc-21c0add4368d -https://wpscan.com/vulnerability/5ddc0a9d-c081-4bef-aa87-3b10d037379c -https://wpscan.com/vulnerability/5e1244f7-39b5-4f37-8fef-e3f35fc388f1 -https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7 -https://wpscan.com/vulnerability/5e26c485-9a5a-44a3-95b3-6c063a1c321c -https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b -https://wpscan.com/vulnerability/5e51e239-919b-4e74-a7ee-195f3817f907/ -https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164 -https://wpscan.com/vulnerability/5e66e173-776d-4423-b4a2-eb7316b2502f -https://wpscan.com/vulnerability/5e6e63c2-2675-4b8d-9b94-c16c525a1a0e -https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735 -https://wpscan.com/vulnerability/5e816e9a-84e5-42d2-a7ff-e46be9072278 -https://wpscan.com/vulnerability/5e85917c-7a58-49cb-b8b3-05aa18ffff3e -https://wpscan.com/vulnerability/5eb85df5-8aab-4f30-a401-f776a310b09c -https://wpscan.com/vulnerability/5ec6182c-6917-4c48-90ce-e0ebe38e7595 -https://wpscan.com/vulnerability/5ee77dd7-5a73-4d4e-8038-23e6e763e20c/ -https://wpscan.com/vulnerability/5f011911-5fd1-46d9-b468-3062b4ec6f1e/ -https://wpscan.com/vulnerability/5f2fe510-7513-4d33-82d9-3107b3b3f2ae -https://wpscan.com/vulnerability/5f35572a-4129-4fe0-a465-d25f4c3b4419/ -https://wpscan.com/vulnerability/5f37cbf3-2388-4582-876c-6a7b0943c2a7 -https://wpscan.com/vulnerability/5f5c0c6c-6f76-4366-b590-0aab557f8c60 -https://wpscan.com/vulnerability/5f63d677-20f3-4fe0-bb90-048b6898e6cd -https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a -https://wpscan.com/vulnerability/5fad5245-a089-4ba3-9958-1e2c3d066eea -https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837 -https://wpscan.com/vulnerability/5fc92954-20cf-4563-806e-e7a8e5ccfc72 -https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba -https://wpscan.com/vulnerability/5fd1cb7f-a036-4c5b-9557-0ffd4ef6b834 -https://wpscan.com/vulnerability/5fd2246a-fbd9-4f2a-8b0b-a64c3f91157c -https://wpscan.com/vulnerability/5fd2548a-08de-4417-bff1-f174dab718d5 -https://wpscan.com/vulnerability/5fdd44aa-7f3f-423a-9fb0-dc9dc36f33a3 -https://wpscan.com/vulnerability/5fea3ac3-d599-41f3-8f76-08f0d3552af1 -https://wpscan.com/vulnerability/60067b8b-9fa5-40d1-817a-929779947891 -https://wpscan.com/vulnerability/6010ce4e-3e46-4cc1-96d8-560b30b605ed -https://wpscan.com/vulnerability/60226669-0b7b-441f-93d4-b5933e69478f -https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2 -https://wpscan.com/vulnerability/60843022-fe43-4608-8859-9c9109b35b42 -https://wpscan.com/vulnerability/60c9d78f-ae2c-49e0-aca3-6dce1bd8f697 -https://wpscan.com/vulnerability/60eadf75-8298-49de-877e-ce103fc34d58 -https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a -https://wpscan.com/vulnerability/6130958f-f549-4885-adb1-093aa025920e -https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75 -https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818 -https://wpscan.com/vulnerability/614cf338-c8cf-4570-ae83-4f79cbdcc9d5 -https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/ -https://wpscan.com/vulnerability/6183318f-0230-47a1-87f2-3c5aaef678a5 -https://wpscan.com/vulnerability/61873267-9f4f-4be5-bad6-95229ad54b99 -https://wpscan.com/vulnerability/61b475f1-bbfb-4450-a3b2-b8caf5df2340 -https://wpscan.com/vulnerability/61d5c9b8-5c21-4ab5-b31c-e13ca19ea25c -https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af -https://wpscan.com/vulnerability/625a272f-5c69-4f6a-8eee-32f70cd4a558 -https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643 -https://wpscan.com/vulnerability/626bbc7d-0d0f-4418-ac61-666278a1cbdb/ -https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494 -https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 -https://wpscan.com/vulnerability/62b2548e-6b59-48b8-b1c2-9bd47e634982 -https://wpscan.com/vulnerability/62be0991-f095-43cf-a167-3daaed254594 -https://wpscan.com/vulnerability/62deb3ed-a7e4-4cdc-a615-cad2ec2e1e8f -https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32 -https://wpscan.com/vulnerability/62fb399d-3327-45d0-b10f-769d2d164903 -https://wpscan.com/vulnerability/63328927-5614-4fa1-8f46-46ff0c8eb959 -https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f -https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4 -https://wpscan.com/vulnerability/63a24890-3735-4016-b4b7-4b070a842664 -https://wpscan.com/vulnerability/63be225c-ebee-4cac-b43e-cf033ee7425d -https://wpscan.com/vulnerability/63c58d7f-8e0b-4aa5-b3c8-8726b4f19bf1 -https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92 -https://wpscan.com/vulnerability/63d6ca03-e0df-40db-9839-531c13619094 -https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9 -https://wpscan.com/vulnerability/64267134-9d8c-4e0c-b24f-d18692a5775e -https://wpscan.com/vulnerability/64ba4461-bbba-45eb-981f-bb5f2e5e56e1/ -https://wpscan.com/vulnerability/64cf5f95-bbf0-4c5f-867b-62f1b7f6a42e/ -https://wpscan.com/vulnerability/64e144fb-aa9f-4cfe-9c44-a4e1fa2e8dd5/ -https://wpscan.com/vulnerability/64f2557f-c5e4-4779-9e28-911dfaf2dda5 -https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d -https://wpscan.com/vulnerability/6503da78-a2bf-4b4c-b56d-21c8c55b076e -https://wpscan.com/vulnerability/651dc567-943e-4f57-8ec4-6eee466785f5 -https://wpscan.com/vulnerability/652efc4a-f931-4668-ae74-a58b288a5715 -https://wpscan.com/vulnerability/6536946a-7ebf-4f8f-9446-36ec2a2a3ad2 -https://wpscan.com/vulnerability/654bad15-1c88-446a-b28b-5a412cc0399d -https://wpscan.com/vulnerability/655a68ee-9447-41ca-899e-986a419fb7ed -https://wpscan.com/vulnerability/65a29976-163a-4bbf-a4e8-590ddc4b83f2/ -https://wpscan.com/vulnerability/65a8cf83-d6cc-4d4c-a482-288a83a69879/ -https://wpscan.com/vulnerability/65ff0e71-0fcd-4357-9b00-143cb18901bf -https://wpscan.com/vulnerability/661cb7e3-d7bd-4bc1-bf78-bdb4ba9610d7 -https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833 -https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657 -https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f -https://wpscan.com/vulnerability/66789b32-049e-4440-8b19-658649851010 -https://wpscan.com/vulnerability/6678e064-ce21-4bb2-8c50-061073fb22fb -https://wpscan.com/vulnerability/66bc783b-67e1-4bd0-99c0-322873b3a22a -https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e -https://wpscan.com/vulnerability/67398332-b93e-46ae-8904-68419949a124 -https://wpscan.com/vulnerability/67678666-402b-4010-ac56-7067a0f40185 -https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7 -https://wpscan.com/vulnerability/67910e5d-ea93-418b-af81-c50d0e05d213 -https://wpscan.com/vulnerability/679ca6ed-2343-43f3-9c3e-2c12e12407c1 -https://wpscan.com/vulnerability/67d84549-d368-4504-9fa9-b1fce63cb967 -https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43 -https://wpscan.com/vulnerability/67f5beb8-2cb0-4b43-87c7-dead9c005f9c -https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac -https://wpscan.com/vulnerability/682c0226-28bd-4051-830d-8b679626213d -https://wpscan.com/vulnerability/684941ad-541f-43f9-a7ef-d26c0f4e6e21/ -https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa -https://wpscan.com/vulnerability/68530e63-bba3-4a9a-ae83-516684aa5dc6 -https://wpscan.com/vulnerability/685b068e-0727-45fb-bd8c-66bb1dc3a8e7 -https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1 -https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e -https://wpscan.com/vulnerability/68af14ef-ca66-40d6-a1e5-09f74e2cd971 -https://wpscan.com/vulnerability/68ddf343-6e69-44a7-bd33-72004053d41e -https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf -https://wpscan.com/vulnerability/69263610-f454-4f27-80af-be523d25659e -https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd -https://wpscan.com/vulnerability/69351798-c790-42d4-9485-1813cd325769 -https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881 -https://wpscan.com/vulnerability/6939c405-ac62-4144-bd86-944d7b89d0ad -https://wpscan.com/vulnerability/6940a97e-5a75-405c-be74-bedcc3a8ee00 -https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7 -https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db -https://wpscan.com/vulnerability/69592e52-92db-4e30-92ca-b7b3d5b9185d/ -https://wpscan.com/vulnerability/696868f7-409d-422d-87f4-92fc6bf6e74e -https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/ -https://wpscan.com/vulnerability/698277e6-56f9-4688-9a84-c2fa3ea9f7dc/ -https://wpscan.com/vulnerability/69b178f3-5951-4879-9bbe-183951d002ec -https://wpscan.com/vulnerability/69b75983-1010-453e-bf67-27b4a2a327a8 -https://wpscan.com/vulnerability/69ffb2f1-b291-49bf-80a8-08d03ceca53b -https://wpscan.com/vulnerability/6a2eb871-6b6e-4dbb-99f0-dd74d6c61e83/ -https://wpscan.com/vulnerability/6a36d665-a0ca-4346-8e55-cf9ba45966cc -https://wpscan.com/vulnerability/6a3b6752-8d72-4ab4-9d49-b722a947d2b0 -https://wpscan.com/vulnerability/6a3bcfb3-3ede-459d-969f-b7b30dafd098 -https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5 -https://wpscan.com/vulnerability/6aa9aa0d-b447-4584-a07e-b8a0d1b83a31 -https://wpscan.com/vulnerability/6aad6454-de1b-4304-9c14-05e28d08b253 -https://wpscan.com/vulnerability/6ac1259c-86d9-428b-ba98-7f3d07910644 -https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072 -https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb -https://wpscan.com/vulnerability/6ae719da-c43c-4b3a-bb8a-efa1de20100a -https://wpscan.com/vulnerability/6af63aab-b7a6-4ef6-8604-4b4b99467a34 -https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 -https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/ -https://wpscan.com/vulnerability/6b37fa17-0dcb-47a7-b1eb-f9f6abb458c0 -https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3 -https://wpscan.com/vulnerability/6b540712-fda5-4be6-ae4b-bd30a9d9d698 -https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb -https://wpscan.com/vulnerability/6b6f9e42-7f7f-4daa-99c9-14a24a6d76b0 -https://wpscan.com/vulnerability/6b71eb38-0a4a-49d1-96bc-84bbe675be1e -https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7 -https://wpscan.com/vulnerability/6bb4eb71-d702-4732-b01f-b723077d66ca -https://wpscan.com/vulnerability/6bbea7fe-e966-406b-ad06-0206fcc6f0a0 -https://wpscan.com/vulnerability/6bc6023f-a5e7-4665-896c-95afa5b638fb -https://wpscan.com/vulnerability/6bc8fff1-ff10-4175-8a46-563f0f26f96a -https://wpscan.com/vulnerability/6bea6301-0762-45c3-a4eb-15d6ac4f9f37 -https://wpscan.com/vulnerability/6bed00e4-b363-43b8-a392-d068d342151a -https://wpscan.com/vulnerability/6c25a5f0-a137-4ea5-9422-8ae393d7b76b -https://wpscan.com/vulnerability/6cad602b-7414-4867-8ae2-f0b846c4c8f0 -https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/ -https://wpscan.com/vulnerability/6ccd9990-e15f-4800-b499-f7c74b480051 -https://wpscan.com/vulnerability/6cd7cd6d-1cc1-472c-809b-b66389f149b0 -https://wpscan.com/vulnerability/6cd9ebcf-e78f-4f97-a8f9-b7e4ceab66b7 -https://wpscan.com/vulnerability/6cedb27f-6140-4cba-836f-63de98e521bf -https://wpscan.com/vulnerability/6cf90a27-55e2-4b2c-9df1-5fa34c1bd9d1/ -https://wpscan.com/vulnerability/6d0932bb-d515-4432-b67b-16aba34bd285 -https://wpscan.com/vulnerability/6d09a5d3-046d-47ef-86b4-c024ea09dc0f -https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010 -https://wpscan.com/vulnerability/6d29ba12-f14a-4cee-baae-a6049d83bce6 -https://wpscan.com/vulnerability/6d332a47-e96c-455b-9e8f-db6dbb59b518 -https://wpscan.com/vulnerability/6d3eeba6-5560-4380-a6e9-f008a9112ac6 -https://wpscan.com/vulnerability/6d50d3cc-7563-42c4-977b-f834fee711da -https://wpscan.com/vulnerability/6d596afb-cac3-4ef2-9742-235c068d1006 -https://wpscan.com/vulnerability/6d6c1d46-5c3d-4d56-9728-2f94064132aa -https://wpscan.com/vulnerability/6d71816c-8267-4b84-9087-191fbb976e72 -https://wpscan.com/vulnerability/6d796b83-03c0-49f8-8d07-5c63ce8a32b9 -https://wpscan.com/vulnerability/6ddd1a9e-3f96-4020-9b2b-f818a4d5ba58/ -https://wpscan.com/vulnerability/6df05333-b1f1-4324-a1ba-dd36fbf1778c/ -https://wpscan.com/vulnerability/6df5f5b1-f10b-488e-80b3-2c024bbb8c78 -https://wpscan.com/vulnerability/6dfb4f61-c8cb-40ad-812f-139482be0fb4 -https://wpscan.com/vulnerability/6e096269-eedc-4614-88ce-6795c4adf32f -https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/ -https://wpscan.com/vulnerability/6e167864-c304-402e-8b2d-d47b5a3767d1 -https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0 -https://wpscan.com/vulnerability/6e42f26b-3403-4d55-99ad-2c8e2d76e537 -https://wpscan.com/vulnerability/6e58f099-e8d6-49e4-9f02-d6a556c5b1d2 -https://wpscan.com/vulnerability/6e67bf7f-07e6-432b-a8f4-aa69299aecaf/ -https://wpscan.com/vulnerability/6e7de2bb-5f71-4c27-ae79-4f6b2ba7f86f -https://wpscan.com/vulnerability/6eaef938-ce98-4d57-8a1d-fa9d1ae3d6ed -https://wpscan.com/vulnerability/6ec62eae-2072-4098-8f77-b22d61a89cbf -https://wpscan.com/vulnerability/6ee14423-f7ff-4433-987a-a1a6b7bd65e3 -https://wpscan.com/vulnerability/6ee3e9e2-ff57-41c4-8cc5-b258801a8a02 -https://wpscan.com/vulnerability/6f015e8e-462b-4ef7-a9a1-bb91e7d28e37 -https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/ -https://wpscan.com/vulnerability/6f3d40fa-458b-44f0-9407-763e80b29668 -https://wpscan.com/vulnerability/6f3f460b-542a-4d32-8feb-afa1aef57e37 -https://wpscan.com/vulnerability/6f481d34-6feb-4af2-914c-1f3288f69207 -https://wpscan.com/vulnerability/6f5b764b-d13b-4371-9cc5-91204d9d6358 -https://wpscan.com/vulnerability/6f884688-2c0d-4844-bd31-ef7085edf112 -https://wpscan.com/vulnerability/6f9d1ee5-7ed7-4304-96a2-611b2f0081d2 -https://wpscan.com/vulnerability/6fac1e09-21ab-430d-b56d-195e7238c08c -https://wpscan.com/vulnerability/700f3b04-8298-447c-8d3c-4581880a63b5 -https://wpscan.com/vulnerability/702a4283-1fd6-4186-9db7-6ad387d714ea -https://wpscan.com/vulnerability/702d7bbe-93cc-4bc2-b41d-cb66e08c99a7 -https://wpscan.com/vulnerability/704d8886-df9e-4217-88d1-a72a71924174 -https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 -https://wpscan.com/vulnerability/70840a72-ccdc-4eee-9ad2-874809e5de11 -https://wpscan.com/vulnerability/70aed824-c53e-4672-84c9-039dc34ed5fa -https://wpscan.com/vulnerability/70c39236-f7ae-49bf-a2f0-7cb9aa983e45 -https://wpscan.com/vulnerability/70ce3654-8fd9-4c33-b594-fac13ec26137 -https://wpscan.com/vulnerability/70f823ff-64ad-4f05-9eb3-b69b3b79dc12 -https://wpscan.com/vulnerability/7101ce04-670e-4ce0-9f60-e00494ff379d -https://wpscan.com/vulnerability/712c2154-37f4-424c-ba3b-26ba6aa95bca -https://wpscan.com/vulnerability/71414436-ef54-4ce6-94e2-62e68d1a371d -https://wpscan.com/vulnerability/7142a538-7c3d-4dd0-bd2c-cbd2efaf53c5 -https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2 -https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 -https://wpscan.com/vulnerability/71662b72-311c-42db-86c5-a0276d25535c -https://wpscan.com/vulnerability/71956598-90aa-4557-947a-c4716674543d -https://wpscan.com/vulnerability/71c5b5b5-8694-4738-8e4b-8670a8d21c86 -https://wpscan.com/vulnerability/71c616ff-0a7e-4f6d-950b-79c469a28263 -https://wpscan.com/vulnerability/71db75c0-5907-4237-884f-8db88b1a9b34 -https://wpscan.com/vulnerability/71f5d630-2726-48c7-b9e5-7bebc786b561 -https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6 -https://wpscan.com/vulnerability/721ddc3e-ab24-4834-bd47-4eb6700439a9 -https://wpscan.com/vulnerability/72397fee-9768-462b-933c-400181a5487c -https://wpscan.com/vulnerability/723d0d07-c48b-4fe3-9fb2-7dae3c7d3cfb -https://wpscan.com/vulnerability/724729d9-1c4a-485c-9c90-a27664c47c84 -https://wpscan.com/vulnerability/725f6ae4-7ec5-4d7c-9533-c9b61b59cc2b -https://wpscan.com/vulnerability/72639924-e7a7-4f7d-bd50-015d05ffd4fb -https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095 -https://wpscan.com/vulnerability/72aea0e5-1fa7-4827-a173-59982202d323 -https://wpscan.com/vulnerability/72be4b5c-21be-46af-a3f4-08b4c190a7e2 -https://wpscan.com/vulnerability/72ccdcb9-3d24-41d7-b9fa-c8bd73d30aa6 -https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd -https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294 -https://wpscan.com/vulnerability/73111c7e-c772-4bed-b282-854c1ae57444 -https://wpscan.com/vulnerability/7314f9fa-c047-4e0c-b145-940240a50c02 -https://wpscan.com/vulnerability/73353221-3e6d-44e8-bf41-55a0fe57d81f -https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872 -https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3 -https://wpscan.com/vulnerability/734064e3-afe9-4dfd-8d76-8a757cc94815 -https://wpscan.com/vulnerability/735a33e1-63fb-4f17-812c-3e68709b5c2c -https://wpscan.com/vulnerability/7376666e-9b2a-4239-b11f-8544435b444a -https://wpscan.com/vulnerability/739831e3-cdfb-4a22-9abf-6c594d7e3d75 -https://wpscan.com/vulnerability/73be6e92-ea37-4416-977d-52ee2afa022a -https://wpscan.com/vulnerability/73d1b00e-1f17-4d9a-bfc8-6bc43a46b90b/ -https://wpscan.com/vulnerability/73d588d7-26ae-42e2-8282-aa02bcb109b6 -https://wpscan.com/vulnerability/73db1ee8-06a2-41b6-b287-44e25f5f2e58 -https://wpscan.com/vulnerability/7413d5ec-10a7-4cb8-ac1c-4ef554751518/ -https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb -https://wpscan.com/vulnerability/74613b38-48f2-43d5-bae5-25c89ba7db6e -https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 -https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900 -https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478 -https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0 -https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c -https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/ -https://wpscan.com/vulnerability/74c23d56-e81f-47e9-bf8b-33d3f0e81894 -https://wpscan.com/vulnerability/74cb07fe-fc82-472f-8c52-859c176d9e51 -https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de -https://wpscan.com/vulnerability/75305ea8-730b-4caf-a3c6-cb94adee683c -https://wpscan.com/vulnerability/753df046-9fd7-4d15-9114-45cde6d6539b -https://wpscan.com/vulnerability/7548c1fb-77b5-4290-a297-35820edfe0f8 -https://wpscan.com/vulnerability/754ac750-0262-4f65-b23e-d5523995fbfa -https://wpscan.com/vulnerability/7569f4ac-05c9-43c9-95e0-5cc360524bbd -https://wpscan.com/vulnerability/757412f4-e4f8-4007-8e3b-639a72b33180/ -https://wpscan.com/vulnerability/7593d5c8-cbc2-4469-b36b-5d4fb6d49718 -https://wpscan.com/vulnerability/759b3866-c619-42cc-94a8-0af6d199cc81 -https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755 -https://wpscan.com/vulnerability/75a9fd23-7fa9-4cb1-a55b-ec5deae5d6fa -https://wpscan.com/vulnerability/75abd073-b45f-4fe6-8501-7a6d0163f78d -https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900 -https://wpscan.com/vulnerability/75f7690d-7f6b-48a8-a9d1-95578a657920 -https://wpscan.com/vulnerability/75fbee63-d622-441f-8675-082907b0b1e6/ -https://wpscan.com/vulnerability/7608829d-2820-49e2-a10e-e93eb3005f68 -https://wpscan.com/vulnerability/762c506a-f57d-450f-99c0-32d750306ddc -https://wpscan.com/vulnerability/762ff2ca-5c1f-49ae-b83c-1c22bacbc82f -https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0 -https://wpscan.com/vulnerability/763c08a0-4b2b-4487-b91c-be6cc2b9322e -https://wpscan.com/vulnerability/7643980b-eaa2-45d1-bd9d-9afae0943f43 -https://wpscan.com/vulnerability/76a50157-04b5-43e8-afbc-a6ddf6d1cba3 -https://wpscan.com/vulnerability/76abf4ac-5cc1-41a0-84c3-dff42c659581 -https://wpscan.com/vulnerability/76ad4273-6bf4-41e9-99a8-bf6d634608ac -https://wpscan.com/vulnerability/76d2963c-ebff-498f-9484-3c3008750c14 -https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/ -https://wpscan.com/vulnerability/76e8591f-120c-4cd7-b9a2-79f8d4d98aa8/ -https://wpscan.com/vulnerability/76f0257d-aae7-4054-9b3d-ba10b4005cf1 -https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf -https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ -https://wpscan.com/vulnerability/774655ac-b201-4d9f-8790-9eff8564bc91/ -https://wpscan.com/vulnerability/777d4637-444b-4eda-bc21-95d3a3bf6cd3 -https://wpscan.com/vulnerability/77861a2e-879a-4bd0-b4c0-cd19481ace5d -https://wpscan.com/vulnerability/77a524d8-0b1a-407a-98d2-d8d0ed78fa0f -https://wpscan.com/vulnerability/77aafeb9-af80-490a-b3d7-4fa973bab61c -https://wpscan.com/vulnerability/77b7ca19-294c-4480-8f57-6fddfc67fffb -https://wpscan.com/vulnerability/77b92130-167c-4e8a-bde5-3fd1bd6982c6 -https://wpscan.com/vulnerability/77f50129-4b1f-4e50-8321-9dd32deba6e1 -https://wpscan.com/vulnerability/77fd6749-4fb2-48fa-a191-437b442f28e9 -https://wpscan.com/vulnerability/7800d583-fcfc-4360-9dc3-af3f73e12ab4 -https://wpscan.com/vulnerability/78054bd7-cdc2-4b14-9b5c-30f10e802d6b -https://wpscan.com/vulnerability/78054d08-0227-426c-903d-d146e0919028 -https://wpscan.com/vulnerability/78405609-2105-4011-b18e-1ba5f438972d -https://wpscan.com/vulnerability/7840e664-907f-42d1-950d-8c919032b707 -https://wpscan.com/vulnerability/78575072-4e04-4a8a-baec-f313cfffe829 -https://wpscan.com/vulnerability/7862084a-2821-4ef1-8d01-c9c8b3f28b05 -https://wpscan.com/vulnerability/788c6aa2-14cc-411f-95e8-5994f8c82d70 -https://wpscan.com/vulnerability/788ead78-9aa2-49a3-b191-12114be8270b -https://wpscan.com/vulnerability/78a13958-cd12-4ea8-b326-1e3184da970b/ -https://wpscan.com/vulnerability/78bc7cf1-7563-4ada-aec9-af4c943e3e2c -https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437 -https://wpscan.com/vulnerability/7906c349-97b0-4d82-aef0-97a1175ae88e/ -https://wpscan.com/vulnerability/7915070f-1d9b-43c3-b01e-fec35f633a4d -https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c -https://wpscan.com/vulnerability/792d9f22-abf6-47b2-a247-d0cdb705cd81 -https://wpscan.com/vulnerability/7957f355-c767-4f59-bb28-0302d33386a6 -https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de -https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/ -https://wpscan.com/vulnerability/79982ea9-4733-4b1e-a43e-17629c1136de -https://wpscan.com/vulnerability/79a532e9-bc6e-4722-8d67-9c15720d06a6 -https://wpscan.com/vulnerability/79a56359-f7e8-4c8c-b0aa-6300f5d57880 -https://wpscan.com/vulnerability/79b07f37-2c6b-4846-bb28-91a1e5bf112e/ -https://wpscan.com/vulnerability/79b79e9c-ea4f-4188-a1b5-61dda0b5d434 -https://wpscan.com/vulnerability/79bb5acb-ea56-41a9-83a1-28a181ae41e2 -https://wpscan.com/vulnerability/79f011e4-3422-4307-8736-f27048796aae -https://wpscan.com/vulnerability/7a0aaf85-8130-4fd7-8f09-f8edc929597e -https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2 -https://wpscan.com/vulnerability/7a244fb1-fa0b-4294-9b51-588bf5d673a2 -https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/ -https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/ -https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5 -https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f -https://wpscan.com/vulnerability/7a5078db-e0d4-4076-9de9-5401c3ca0d65 -https://wpscan.com/vulnerability/7a7603ce-d76d-4c49-a886-67653bed8cd3 -https://wpscan.com/vulnerability/7a8a834a-e5d7-4678-9d35-4390d1200437/ -https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 -https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f -https://wpscan.com/vulnerability/7ac217db-f332-404b-a265-6dc86fe747b9 -https://wpscan.com/vulnerability/7aec4ef4-db3b-41fb-9177-88ce9d37bca6 -https://wpscan.com/vulnerability/7b0046d4-cf95-4307-95a5-9b823f2daaaa/ -https://wpscan.com/vulnerability/7b0eeafe-b9bc-43b2-8487-a23d3960f73f -https://wpscan.com/vulnerability/7b19d792-8083-4c0c-a45e-a99c1f5f0df0 -https://wpscan.com/vulnerability/7b1ebd26-ea8b-448c-a775-66a04102e44f -https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d -https://wpscan.com/vulnerability/7b356b82-5d03-4f70-b4ce-f1405304bb52 -https://wpscan.com/vulnerability/7b4d4675-6089-4435-9b56-31496adc4767 -https://wpscan.com/vulnerability/7b51b1f0-17ca-46b7-ada1-20bd926f3023 -https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a -https://wpscan.com/vulnerability/7b80f89b-e724-41c5-aa03-21d1eef50f21 -https://wpscan.com/vulnerability/7ba7849d-e07b-465a-bfb7-10c8186be140 -https://wpscan.com/vulnerability/7bdc1324-8d08-4185-971f-8d49367702cf -https://wpscan.com/vulnerability/7c08e4c1-57c5-471c-a990-dcb9fd7ce0f4 -https://wpscan.com/vulnerability/7c1dff5b-bed3-49f8-96cc-1bc9abe78749 -https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243 -https://wpscan.com/vulnerability/7c4e51b3-87ef-4afc-ab53-9a9bbdcfc9d7 -https://wpscan.com/vulnerability/7c5c602f-499f-431b-80bc-507053984a06 -https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0 -https://wpscan.com/vulnerability/7c6c0aac-1733-4abc-8e95-05416636a127 -https://wpscan.com/vulnerability/7c6fc499-de09-4874-ab96-bdc24d550cfb/ -https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/ -https://wpscan.com/vulnerability/7cd524ed-5eb9-4d6b-b4d2-3d4be6b57879 -https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded -https://wpscan.com/vulnerability/7d3968d9-61ed-4c00-8764-0360cf03255e/ -https://wpscan.com/vulnerability/7d3af3b5-5548-419d-aa32-1f7b51622615 -https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38 -https://wpscan.com/vulnerability/7d4ad1f3-6d27-4655-9796-ce370ef5fced -https://wpscan.com/vulnerability/7d5f58a8-bee4-46be-9c08-d272678338f0 -https://wpscan.com/vulnerability/7d68b0df-7169-46b2-b8e3-4d0c2aa8d605 -https://wpscan.com/vulnerability/7d7fe498-0aa3-4fa7-b560-610b42b2abed -https://wpscan.com/vulnerability/7d8b7871-baa5-4a54-a9e9-2c9d302cdd12 -https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8 -https://wpscan.com/vulnerability/7dde0b9d-9b86-4961-b005-a11b6ffba952 -https://wpscan.com/vulnerability/7de4c313-359e-4450-85f5-d29f3c2f046a -https://wpscan.com/vulnerability/7df70f49-547f-4bdb-bf9b-2e06f93488c6 -https://wpscan.com/vulnerability/7dfdd50d-77f9-4f0a-8673-8f033c0b0e05 -https://wpscan.com/vulnerability/7e11aeb0-b231-407d-86ec-9018c2c7eee3 -https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/ -https://wpscan.com/vulnerability/7ead9fb9-d81f-47c6-a1b4-21f29183cc15 -https://wpscan.com/vulnerability/7eae1434-8c7a-4291-912d-a4a07b73ee56 -https://wpscan.com/vulnerability/7ec9e493-bc48-4a5d-8c7e-34beaba892ae -https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 -https://wpscan.com/vulnerability/7ed6de4d-0a37-497f-971d-b6711893c557 -https://wpscan.com/vulnerability/7ee1efb1-9969-40b2-8ab2-ea427091bbd8 -https://wpscan.com/vulnerability/7ee95a53-5fe9-404c-a77a-d1218265e4aa -https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb -https://wpscan.com/vulnerability/7f2ae2c9-57d4-46a0-a9a1-585ec543b153 -https://wpscan.com/vulnerability/7f2fda5b-45a5-4fc6-968f-90bc9674c999 -https://wpscan.com/vulnerability/7f30ab20-805b-422c-a9a5-21d39c570ee4/ -https://wpscan.com/vulnerability/7f43cb8e-0c1b-4528-8c5c-b81ab42778dc -https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932 -https://wpscan.com/vulnerability/7f5659bd-50c3-4725-95f4-cf88812acf1c -https://wpscan.com/vulnerability/7f8b4275-7586-4e04-afd9-d12bdab6ba9b -https://wpscan.com/vulnerability/7f9271f2-4de4-4be3-8746-2a3f149eb1d1 -https://wpscan.com/vulnerability/7f935916-9a1a-40c7-b6d8-efcc46eb8eaf -https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ -https://wpscan.com/vulnerability/7fa03f00-25c7-4e40-8592-bb4001ce019d -https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa -https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40 -https://wpscan.com/vulnerability/8051142a-4e55-4dc2-9cb1-1b724c67574f -https://wpscan.com/vulnerability/809cea63-9dbe-495c-8388-e294299d3e90 -https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/ -https://wpscan.com/vulnerability/80b0682e-2c3b-441b-9628-6462368e5fc7 -https://wpscan.com/vulnerability/80d475ca-b475-4789-8eef-9c4d880853b7 -https://wpscan.com/vulnerability/80e0e21c-9e6e-406d-b598-18eb222b3e3e/ -https://wpscan.com/vulnerability/8126ff73-c0e5-4c1b-ba10-2e51f690521e -https://wpscan.com/vulnerability/813de343-4814-42b8-b8df-1695320512cd -https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3 -https://wpscan.com/vulnerability/81821bf5-69e1-4005-b3eb-d541490909cc -https://wpscan.com/vulnerability/8189afc4-17b3-4696-89e1-731011cb9e2b -https://wpscan.com/vulnerability/81b89613-18d0-4c13-84e3-9e2e1802fd7c -https://wpscan.com/vulnerability/81dbb5c0-ccdd-4af1-b2f2-71cb1b37fe93/ -https://wpscan.com/vulnerability/81dc093a-545d-4bcd-ab85-ee9472d709e5 -https://wpscan.com/vulnerability/81e42812-93eb-480d-a2d2-5ba5e02dd0ba -https://wpscan.com/vulnerability/820c51d6-186e-4d63-b4a7-bd0a59c02cc8 -https://wpscan.com/vulnerability/821751bb-feaf-45b8-91a9-e173cb0c05fc -https://wpscan.com/vulnerability/82233588-6033-462d-b886-a8ef5ee9adb0 -https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce -https://wpscan.com/vulnerability/8248b550-6485-4108-a701-8446ffa35f06 -https://wpscan.com/vulnerability/825eccf9-f351-4a5b-b238-9969141b94fa -https://wpscan.com/vulnerability/8267046e-870e-4ccd-b920-340233ed3b93 -https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7 -https://wpscan.com/vulnerability/8281fce2-6f24-4d3f-895f-4d8694806609 -https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/ -https://wpscan.com/vulnerability/82a81721-0435-45a6-bd5b-dc90186cf803 -https://wpscan.com/vulnerability/82c2ead1-1d3c-442a-ae68-359a4748447f -https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38 -https://wpscan.com/vulnerability/82e01f95-81c2-46d8-898e-07b3b8a3f8c9 -https://wpscan.com/vulnerability/82f543e3-9397-4364-9546-af5ea134fcd4 -https://wpscan.com/vulnerability/82f8d425-449a-471f-94df-8439924fd628 -https://wpscan.com/vulnerability/831b3afa-8fa3-4cb7-8374-36d0c368292f -https://wpscan.com/vulnerability/83278bbb-90e6-4465-a46d-60b4c703c11a/ -https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551 -https://wpscan.com/vulnerability/832fe086-1d33-430b-bdb5-e444761576b2 -https://wpscan.com/vulnerability/8353aa12-dbb7-433f-9dd9-d61a3f303d4b -https://wpscan.com/vulnerability/83679b90-faa5-454e-924c-89f388eccbd1 -https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571 -https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a -https://wpscan.com/vulnerability/83eca346-7045-414e-81fc-e0d9b735f0bd -https://wpscan.com/vulnerability/83f23a9f-9ace-47d2-a5f3-a4915129b16c -https://wpscan.com/vulnerability/8416cbcf-086d-42ff-b2a4-f3954c8ff0c8 -https://wpscan.com/vulnerability/8428a5e1-dbef-4516-983f-f95605c6dd09 -https://wpscan.com/vulnerability/842f3b1f-395a-4ea2-b7df-a36f70e8c790 -https://wpscan.com/vulnerability/8453e587-cc8c-491a-af09-fc4ab215134b -https://wpscan.com/vulnerability/845bbfdd-fe9f-487c-91a0-5fe10403d8a2 -https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993 -https://wpscan.com/vulnerability/8472dd40-27e3-4084-907a-e251a2a0f339 -https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f -https://wpscan.com/vulnerability/84e83d52-f69a-4de2-80c8-7c1996b30a04 -https://wpscan.com/vulnerability/84f53e27-d8d2-4fa3-91f9-447037508d30 -https://wpscan.com/vulnerability/8514b8ce-ff23-4aba-b2f1-fd36beb7d2ff/ -https://wpscan.com/vulnerability/8527f4fe-312f-45c1-ae4c-7e799702fc26 -https://wpscan.com/vulnerability/854b23d9-e3f8-4835-8d29-140c580f11c9 -https://wpscan.com/vulnerability/8554ca79-5a4b-49df-a75f-5faa4136bb8c -https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba -https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45 -https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0 -https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178 -https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee -https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4 -https://wpscan.com/vulnerability/85cc39b1-416f-4d23-84c1-fdcbffb0dda0 -https://wpscan.com/vulnerability/85d9fad7-ba3d-4140-ae05-46262d2643e6 -https://wpscan.com/vulnerability/85e32913-dc2a-44c9-addd-7abde618e995/ -https://wpscan.com/vulnerability/8601bd21-becf-4809-8c11-d053d1121eae -https://wpscan.com/vulnerability/860b882b-983c-44b5-8c09-b6890df8a0da -https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668 -https://wpscan.com/vulnerability/8670d196-972b-491b-8d9b-25994a345f57 -https://wpscan.com/vulnerability/867248f2-d497-4ea8-b3f8-0f2e8aaaa2bd -https://wpscan.com/vulnerability/8695b157-abac-4aa6-a022-e3ae41c03544 -https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97 -https://wpscan.com/vulnerability/86bfe0cc-a579-43d6-a26b-6e06000251f6 -https://wpscan.com/vulnerability/86f3acc7-8902-4215-bd75-6105d601524e -https://wpscan.com/vulnerability/8728d02a-51db-4447-a843-0264b6ceb413 -https://wpscan.com/vulnerability/872fc8e6-4035-4e5a-9f30-16c482c48c7c -https://wpscan.com/vulnerability/873824f0-e8b1-45bd-8579-bc3c649a54e5/ -https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a -https://wpscan.com/vulnerability/87546554-276a-45fe-b2aa-b18bfc55db2d -https://wpscan.com/vulnerability/8764e550-4127-471e-84e6-494d6106a3b0 -https://wpscan.com/vulnerability/877ce7a5-b1ff-4d03-9cd8-6beed5595af8 -https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f -https://wpscan.com/vulnerability/87c6052c-2628-4987-a9a3-a03b5ca1e083 -https://wpscan.com/vulnerability/87ce3c59-b234-47bf-abca-e690b53bbe82 -https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93 -https://wpscan.com/vulnerability/88162016-9fc7-4194-9e81-44c50991f6e9/ -https://wpscan.com/vulnerability/8816d4c1-9e8e-4b6f-a36a-10a98a7ccfcd -https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7 -https://wpscan.com/vulnerability/88328d17-ffc9-4b94-8b01-ad2fd3047fbc -https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317 -https://wpscan.com/vulnerability/88745c9b-1c20-4004-89f6-d9ee223651f2 -https://wpscan.com/vulnerability/88869380-173d-4d4f-81d8-3c20add5f98d -https://wpscan.com/vulnerability/8886ec5f-8465-448f-adbd-68a3e84c5dec -https://wpscan.com/vulnerability/88b2e479-eb15-4213-9df8-3d353074974e/ -https://wpscan.com/vulnerability/88d70e35-4c22-4bc7-b1a5-24068d55257c -https://wpscan.com/vulnerability/88e706df-ae03-4665-94a3-db226e1f31a9 -https://wpscan.com/vulnerability/88fb064e-0001-446c-8e43-9fe3feff6c1f -https://wpscan.com/vulnerability/892802b1-26e2-4ce1-be6f-71ce29687776 -https://wpscan.com/vulnerability/8953d931-19f9-4b73-991c-9c48db1af8b5 -https://wpscan.com/vulnerability/89570379-769b-4684-b8a7-28c37b408e5d -https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4 -https://wpscan.com/vulnerability/8965a87c-5fe5-4b39-88f3-e00966ca1d94 -https://wpscan.com/vulnerability/8a32896d-bf1b-4d7b-8d84-dc38b877928b -https://wpscan.com/vulnerability/8a466f15-f112-4527-8b02-4544a8032671 -https://wpscan.com/vulnerability/8a588266-54cd-4779-adcf-f9b9e226c297 -https://wpscan.com/vulnerability/8a74a2a0-3d8c-427f-9a83-0160d652c5f0 -https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7 -https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a -https://wpscan.com/vulnerability/8a9efc8d-561a-42c6-8e61-ae5c3be581ea -https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328 -https://wpscan.com/vulnerability/8ad824a6-2d49-4f02-8252-393c59aa9705 -https://wpscan.com/vulnerability/8ae42ec0-7e3a-4ea5-8e76-0aae7b92a8e9 -https://wpscan.com/vulnerability/8aebead0-0eab-4d4e-8ceb-8fea0760374f -https://wpscan.com/vulnerability/8afc3b2a-81e5-4b6f-8f4c-c48492843569 -https://wpscan.com/vulnerability/8afe1638-66fa-44c7-9d02-c81573193b47 -https://wpscan.com/vulnerability/8b08b72e-5584-4f25-ab73-5ab0f47412df -https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a -https://wpscan.com/vulnerability/8b639743-3eb5-4f74-a156-76cb657bbe05 -https://wpscan.com/vulnerability/8b6f4a77-4008-4730-9a91-fa055a8b3e68 -https://wpscan.com/vulnerability/8b765f39-38e0-49c7-843a-a5b9375a32e7 -https://wpscan.com/vulnerability/8b8d316b-96b2-4cdc-9da5-c9ea6108a85b -https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef -https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/ -https://wpscan.com/vulnerability/8bf8ebe8-1063-492d-a0f9-2f824408d0df -https://wpscan.com/vulnerability/8c2adadd-0684-49a8-9185-0c7d9581aef1 -https://wpscan.com/vulnerability/8c46adb1-82d7-4621-a8c3-15cd90e98b96 -https://wpscan.com/vulnerability/8c50321a-dba8-4379-9b9c-4c349e44b2ed -https://wpscan.com/vulnerability/8c727a31-ff65-4472-8191-b1becc08192a/ -https://wpscan.com/vulnerability/8c82d317-f9f9-4e25-a7f1-43edb77e8aba -https://wpscan.com/vulnerability/8c83dd57-9291-4dfc-846d-5ad47534e2ad -https://wpscan.com/vulnerability/8c8dad47-8591-47dc-b84f-8c5cb18b2d78 -https://wpscan.com/vulnerability/8cb8a5e9-2ab6-4d9b-9ffc-ef530e346f8d -https://wpscan.com/vulnerability/8cc7cbbd-f74f-4f30-9483-573641fea733 -https://wpscan.com/vulnerability/8cfd8c1f-2834-4a94-a3fa-c0cfbe78a8b7 -https://wpscan.com/vulnerability/8d015eba-31dc-44cb-a051-4e95df782b75/ -https://wpscan.com/vulnerability/8d0e65ee-fdd1-4fd6-9a27-01664c703d90 -https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee -https://wpscan.com/vulnerability/8d57a534-7630-491a-a0fd-90430f85ae78 -https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 -https://wpscan.com/vulnerability/8d8e5852-3787-47f9-9931-8308bb81beb1 -https://wpscan.com/vulnerability/8d9129ab-33c3-44ee-b150-f7552d88e658 -https://wpscan.com/vulnerability/8d966ff1-9c88-43c7-8f4b-93c88e214677 -https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 -https://wpscan.com/vulnerability/8dfc86e4-56a0-4e30-9050-cf3f328ff993 -https://wpscan.com/vulnerability/8e1d65c3-14e4-482f-ae9e-323e847a8613 -https://wpscan.com/vulnerability/8e286c04-ef32-4af0-be78-d978999b2a90/ -https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 -https://wpscan.com/vulnerability/8e53f15e-8b6a-4d47-a40d-4ebbe6934286 -https://wpscan.com/vulnerability/8e5b1e4f-c132-42ee-b2d0-7306ab4ab615 -https://wpscan.com/vulnerability/8e5ec88e-0e66-44e4-bbf2-74155d849ede -https://wpscan.com/vulnerability/8e63bf7c-7827-4c4d-b0e3-66354b218bee/ -https://wpscan.com/vulnerability/8e713eaf-f332-47e2-a131-c14222201fdc -https://wpscan.com/vulnerability/8e88a5b9-6f1d-40de-99fc-8e1e66646c2b -https://wpscan.com/vulnerability/8e897dcc-6e52-440b-83ad-b119c55751c7 -https://wpscan.com/vulnerability/8e8f6b08-90ab-466a-9828-dca0c0da2c9c -https://wpscan.com/vulnerability/8ea46b9a-5239-476b-949d-49546371eac1 -https://wpscan.com/vulnerability/8eafd84b-6214-450b-869b-0afe7cca4c5f -https://wpscan.com/vulnerability/8eb431a6-59a5-4cee-84e0-156c0b31cfc4 -https://wpscan.com/vulnerability/8ebf56be-46c0-4435-819f-dc30370eafa4 -https://wpscan.com/vulnerability/8ec76242-717d-4d2d-9c0f-3056cd7c2c90 -https://wpscan.com/vulnerability/8ed549fe-7d27-4a7a-b226-c20252964b29 -https://wpscan.com/vulnerability/8edb11bc-9e8d-4a98-8538-aaff0f072109 -https://wpscan.com/vulnerability/8edbdea1-f9bb-407a-bcd1-fff3e146984c -https://wpscan.com/vulnerability/8ef64490-30cd-4e07-9b7c-64f551944f3d -https://wpscan.com/vulnerability/8ef9585f-67d7-4651-977a-fcad113882bd -https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160 -https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea -https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b -https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4 -https://wpscan.com/vulnerability/8f510b8c-b97a-44c9-a36d-2d775a4f7b81 -https://wpscan.com/vulnerability/8f6615e8-f607-4ce4-a0e0-d5fc841ead16 -https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a -https://wpscan.com/vulnerability/8f900d37-6eee-4434-8b9b-d10cc4a9167c -https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e -https://wpscan.com/vulnerability/8fa051ad-5b35-46d8-be95-0ac4e73d5eff -https://wpscan.com/vulnerability/8fbf7efe-0bf2-42c6-aef1-7fcf2708b31b -https://wpscan.com/vulnerability/8fd483fb-d399-4b4f-b4ef-bbfad1b5cf1b -https://wpscan.com/vulnerability/8fd9192a-2d08-4127-adcd-87fb1ea8d6fc -https://wpscan.com/vulnerability/90067336-c039-4cbe-aa9f-5eab5d1e1c3d -https://wpscan.com/vulnerability/906c5122-dd6d-494b-b66c-4162e234ea05 -https://wpscan.com/vulnerability/906d0c31-370e-46b4-af1f-e52fbddd00cb -https://wpscan.com/vulnerability/907792c4-3384-4351-bb75-0ad10f65fbe1 -https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88 -https://wpscan.com/vulnerability/90b8af99-e4a1-4076-99fa-efe805dd4be4/ -https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910 -https://wpscan.com/vulnerability/90c7496b-552f-4566-b7ae-8c953c965352 -https://wpscan.com/vulnerability/90cf8f9d-4d37-405d-b161-239bdb281828 -https://wpscan.com/vulnerability/90ebaedc-89df-413f-b22e-753d4dd5e1c3 -https://wpscan.com/vulnerability/90f9ad6a-4855-4a8e-97f6-5f403eb6455d -https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/ -https://wpscan.com/vulnerability/91064ba5-cf65-46e6-88df-0e4d96a3ef9f/ -https://wpscan.com/vulnerability/911d495c-3867-4259-a73a-572cd4fccdde -https://wpscan.com/vulnerability/91252899-029d-49be-859e-7d2c4a70efea -https://wpscan.com/vulnerability/9130a42d-fca3-4f9c-ab97-d5e0a7a5cef2/ -https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649 -https://wpscan.com/vulnerability/914559e1-eed5-4a69-8371-a48055835453 -https://wpscan.com/vulnerability/9157d6d2-4bda-4fcd-8192-363a63a51ff5 -https://wpscan.com/vulnerability/915b7d79-f9dd-451d-bf8f-6d14ec3e67d2 -https://wpscan.com/vulnerability/915d6add-d3e2-4ced-969e-9523981ac886 -https://wpscan.com/vulnerability/9165d46b-2a27-4e83-a096-73ffe9057c80 -https://wpscan.com/vulnerability/91898762-aa7d-4fbc-a016-3de48901e5de -https://wpscan.com/vulnerability/919e67a1-3a50-4940-bb4f-5c5cc2017a83 -https://wpscan.com/vulnerability/91a5847a-62e7-4b98-a554-5eecb6a06e5b -https://wpscan.com/vulnerability/91bbdeb0-f2df-4500-b856-af0ff68fbb12 -https://wpscan.com/vulnerability/91c00b17-00ba-4c3f-8587-d54449a02659 -https://wpscan.com/vulnerability/91c44a4f-b599-46c0-a8df-d1fb87472abe -https://wpscan.com/vulnerability/91c44c45-994b-4aed-b9f9-7db45924eeb4 -https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe -https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3 -https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/ -https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c -https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748 -https://wpscan.com/vulnerability/921daea1-a06d-4310-8bd9-4db32605e500 -https://wpscan.com/vulnerability/92214311-da6d-49a8-95c9-86f47635264f -https://wpscan.com/vulnerability/92215d07-d129-49b4-a838-0de1a944c06b -https://wpscan.com/vulnerability/922a2037-9b5e-4c94-83d9-99efc494e9e2 -https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 -https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 -https://wpscan.com/vulnerability/929ad37d-9cdb-4117-8cd3-cf7130a7c9d4 -https://wpscan.com/vulnerability/92b0abec-082f-4545-9636-1b2f4dac66fe -https://wpscan.com/vulnerability/92b1c6d8-51db-46aa-bde6-abdfb091aab5 -https://wpscan.com/vulnerability/92db763c-ca6b-43cf-87ff-c1678cf4ade5 -https://wpscan.com/vulnerability/92dcbeb3-17db-4d10-8ae7-c99acdb48c78 -https://wpscan.com/vulnerability/92de9c1b-48dd-4a5f-bbb3-455f8f172b09 -https://wpscan.com/vulnerability/92f1d6fb-c665-419e-a13b-688b1df6c395 -https://wpscan.com/vulnerability/92f43da9-9903-4bcf-99e8-0e269072d389 -https://wpscan.com/vulnerability/9342470a-a0ad-4f0b-b95f-7daa39a6362b -https://wpscan.com/vulnerability/936934c3-5bfe-416e-b6aa-47bed4db05c4 -https://wpscan.com/vulnerability/93693d45-5217-4571-bae5-aab8878cfe62 -https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78 -https://wpscan.com/vulnerability/93acb4ee-1053-48e1-8b69-c09dc3b2f302 -https://wpscan.com/vulnerability/93b40030-3706-4063-bf59-4ec983afdbb6 -https://wpscan.com/vulnerability/93b893be-59ad-4500-8edb-9fa7a45304d5 -https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6 -https://wpscan.com/vulnerability/93cad990-b6be-4ee1-9cdf-0211a7fe6c96 -https://wpscan.com/vulnerability/93edcc23-894a-46c2-84d2-407dcb64ba1e -https://wpscan.com/vulnerability/93faad5b-e1e8-4e49-b19e-b91343d68b51 -https://wpscan.com/vulnerability/941a9aa7-f4b2-474a-84d9-9a74c99079e2 -https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45 -https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51 -https://wpscan.com/vulnerability/9425a9b2-e9b8-41f5-a3ca-623b6da0297c -https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a -https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df -https://wpscan.com/vulnerability/94670822-0251-4e77-8d7f-b47aa7232e52 -https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432 -https://wpscan.com/vulnerability/9486744e-ab24-44e4-b06e-9e0b4be132e2 -https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/ -https://wpscan.com/vulnerability/94ab34f6-86a9-4e14-bf86-26ff6cb4383e -https://wpscan.com/vulnerability/950f46ae-4476-4969-863a-0e55752953b3 -https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/ -https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b -https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc546af61 -https://wpscan.com/vulnerability/9579ff13-9597-4a77-8cb9-997e35265d22 -https://wpscan.com/vulnerability/958f44a5-07e7-4349-9212-2a039a082ba0 -https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d -https://wpscan.com/vulnerability/95a6a11e-da5d-4fac-aff6-a3f7624682b7 -https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af -https://wpscan.com/vulnerability/95ee3257-cfda-480d-b3f7-28235564cf6d -https://wpscan.com/vulnerability/95f92062-08ce-478a-a2bc-6d026adf657c -https://wpscan.com/vulnerability/960a634d-a88a-4d90-9ac3-7d24b1fe07fe -https://wpscan.com/vulnerability/96204946-0b10-4a2c-8079-473883ff95b6 -https://wpscan.com/vulnerability/96396a22-f523-4c51-8b72-52be266988aa -https://wpscan.com/vulnerability/9647e273-5724-4a02-868d-9b79f4bb2b79/ -https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0 -https://wpscan.com/vulnerability/96818024-57ab-419d-bd46-7d2da98269e6 -https://wpscan.com/vulnerability/968c677c-1beb-459b-8fd1-7f70bcaa4f74 -https://wpscan.com/vulnerability/968d87c0-af60-45ea-b34e-8551313cc8df -https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae -https://wpscan.com/vulnerability/96b93253-31d0-4184-94b7-f1e18355d841/ -https://wpscan.com/vulnerability/96bb2fba-4b18-4c29-8344-3ba4d2f06a19 -https://wpscan.com/vulnerability/96e34d3d-627f-42f2-bfdb-c9d47dbf396c -https://wpscan.com/vulnerability/96e9a7fd-9ab8-478e-9420-4bca2a0b23a1 -https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac -https://wpscan.com/vulnerability/9703f42e-bdfe-4787-92c9-47963d9af425 -https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c -https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef -https://wpscan.com/vulnerability/97201998-1859-4428-9b81-9c2748806cf4 -https://wpscan.com/vulnerability/972ecde8-3d44-4dd9-81e3-643d8737434f -https://wpscan.com/vulnerability/972f8c5d-22b7-42de-a981-2e5acb72297b -https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/ -https://wpscan.com/vulnerability/9787e26f-33fe-4c65-abb3-7f5c76ae8d6f -https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f -https://wpscan.com/vulnerability/97adac02-4163-48d4-ba14-0b1badfd3d42 -https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a -https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 -https://wpscan.com/vulnerability/97f1d403-ae96-4c90-8d47-9822f4d68033/ -https://wpscan.com/vulnerability/97f4f7da-22a8-42a6-88ac-82e95a6c06dd -https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28 -https://wpscan.com/vulnerability/9841176d-1d37-4636-9144-0ca42b6f3605 -https://wpscan.com/vulnerability/986024f0-3c8d-44d8-a9c9-1dd284d7db0d -https://wpscan.com/vulnerability/98b2321d-fb66-4e02-9906-63af7b08d647 -https://wpscan.com/vulnerability/98cd761c-7527-4224-965d-d34472b5c19f -https://wpscan.com/vulnerability/98d8c713-e8cd-4fad-a8fb-7a40db2742a2/ -https://wpscan.com/vulnerability/98deb84e-01ca-4b70-a8f8-0a226daa85a6 -https://wpscan.com/vulnerability/98e050cf-5686-4216-bad1-575decf3eaa7/ -https://wpscan.com/vulnerability/99059337-c3cd-4e91-9a03-df32a05b719c -https://wpscan.com/vulnerability/990d1b0a-dbd1-42d0-9a40-c345407c6fe0 -https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc -https://wpscan.com/vulnerability/99389641-ad1e-45c1-a42f-2a010ee22d76 -https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef -https://wpscan.com/vulnerability/994e6198-f0e9-4e30-989f-b5a3dfe95ded -https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e -https://wpscan.com/vulnerability/998395f0-f176-45b9-baf7-b50d30538c7d -https://wpscan.com/vulnerability/9997fe8d-8027-4ae0-9885-a1f5565f2d1a -https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/ -https://wpscan.com/vulnerability/99ec0add-8f4d-4d68-91aa-80b1631a53bf/ -https://wpscan.com/vulnerability/99f30604-d62b-4e30-afcd-b482f8d66413 -https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa -https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c -https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d -https://wpscan.com/vulnerability/9a50d5d0-7a50-47d1-a8f9-e0eb217919d9 -https://wpscan.com/vulnerability/9a934a84-f0c7-42ed-b980-bb168b2c5892 -https://wpscan.com/vulnerability/9ab3d6cf-aad7-41bc-9aae-dc5313f12f7c -https://wpscan.com/vulnerability/9ab9626f-66d5-47e4-bdb8-d8fb519f9515 -https://wpscan.com/vulnerability/9adf7022-5108-43b7-bf0e-a42593185b74 -https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0 -https://wpscan.com/vulnerability/9afa7e11-68b3-4196-975e-8b3f8e68ce56 -https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5 -https://wpscan.com/vulnerability/9afec4aa-1210-4c40-b566-64e37acf2b64 -https://wpscan.com/vulnerability/9b0781e2-ad62-4308-bafc-d45b9a2472be -https://wpscan.com/vulnerability/9b15d47e-43b6-49a8-b2c3-b99c92101e10 -https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb -https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/ -https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63 -https://wpscan.com/vulnerability/9b66819d-8479-4c0b-b206-7f7ff769f758 -https://wpscan.com/vulnerability/9b69544d-6a08-4757-901b-6ccf1cd00ecc -https://wpscan.com/vulnerability/9b77044c-fd3f-4e6f-a759-dcc3082dcbd6 -https://wpscan.com/vulnerability/9b8a00a6-622b-4309-bbbf-fe2c7fc9f8b6 -https://wpscan.com/vulnerability/9b8da6b7-f1d6-4a7d-a621-4ca01e4b7496 -https://wpscan.com/vulnerability/9b9a55d5-c121-4b5b-80df-f9f419c0dc55 -https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8 -https://wpscan.com/vulnerability/9bbfb664-5b83-452b-82bb-562a1e18eb65 -https://wpscan.com/vulnerability/9bd1c040-09cc-4c2d-88c9-8406a653a48b -https://wpscan.com/vulnerability/9be952e0-d8ae-440f-8819-cb19485f35f3 -https://wpscan.com/vulnerability/9c0164f2-464b-4876-a48f-c0ebd63cf397 -https://wpscan.com/vulnerability/9c1acd9c-999f-4a35-a272-1ad31552e685 -https://wpscan.com/vulnerability/9c271619-f478-45c3-91d9-be0f55ee06a2 -https://wpscan.com/vulnerability/9c293098-de54-4a04-b13d-2a702200f02e -https://wpscan.com/vulnerability/9c315404-b66a-448c-a3b7-367a37b53435 -https://wpscan.com/vulnerability/9c3e9c72-3d6c-4e2c-bb8a-f4efce1371d5/ -https://wpscan.com/vulnerability/9c538c51-ae58-461d-b93b-cc9dfebf2bc0 -https://wpscan.com/vulnerability/9c608b14-dc5e-469e-b97a-84696fae804c -https://wpscan.com/vulnerability/9caa8d2e-383b-47d7-8d21-d2ed6b1664cb -https://wpscan.com/vulnerability/9ce0153d-4a8b-4215-b6b6-15ca68c4f52c -https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692 -https://wpscan.com/vulnerability/9cf90ad8-4aa4-466c-a33e-4f2706815765 -https://wpscan.com/vulnerability/9d0d8f8c-f8fb-457f-b557-255a052ccc32 -https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470 -https://wpscan.com/vulnerability/9d416ca3-bd02-4fcf-b3b8-f2f2280d02d2 -https://wpscan.com/vulnerability/9d48313b-76d7-4252-9b81-2fdd0373561b -https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/ -https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd -https://wpscan.com/vulnerability/9d5738f9-9a2e-4878-8a03-745894420bf6 -https://wpscan.com/vulnerability/9d6c628f-cdea-481c-a2e5-101dc167718d -https://wpscan.com/vulnerability/9d7f8ba8-a5d5-4ec3-a48f-5cd4b115e8d5 -https://wpscan.com/vulnerability/9da6eede-10d0-4609-8b97-4a5d38fa8e69/ -https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df -https://wpscan.com/vulnerability/9dbb0d6d-bc84-4b85-8aa5-fa2a8e6fa5e3 -https://wpscan.com/vulnerability/9dc9d377-635d-4d4f-9916-33bcedbba6f0 -https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18 -https://wpscan.com/vulnerability/9de5cc51-f64c-4475-a0f4-d932dc4364a6 -https://wpscan.com/vulnerability/9debe1ea-18ad-44c4-8078-68eb66d36c4a/ -https://wpscan.com/vulnerability/9dec8ac7-befd-4c9d-9a9e-7da9e395dbf2 -https://wpscan.com/vulnerability/9df86d05-1408-4c22-af55-5e3d44249fd0 -https://wpscan.com/vulnerability/9e092aad-0b36-45a9-8987-8d904b34fbb2 -https://wpscan.com/vulnerability/9e1ac711-1f65-49fa-b007-66170a77b265 -https://wpscan.com/vulnerability/9e57285a-0023-4711-874c-6e7b3c2673d1 -https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3 -https://wpscan.com/vulnerability/9ebb8318-ebaf-4de7-b337-c91327685a43 -https://wpscan.com/vulnerability/9ebdd1df-1d6f-4399-8b0f-77a79f841464 -https://wpscan.com/vulnerability/9ec03ef0-0c04-4517-b761-df87af722a64 -https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d -https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/ -https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9 -https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a -https://wpscan.com/vulnerability/9f2f3f85-6812-46b5-9175-c56f6852afd7 -https://wpscan.com/vulnerability/9fa2b3b6-2fe3-40f0-8f71-371dd58fe336 -https://wpscan.com/vulnerability/9fcf6ebe-01d9-4730-a20e-58b192bb6d87 -https://wpscan.com/vulnerability/9fd2eb81-185d-4d42-8acf-925664b7cb2f -https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8 -https://wpscan.com/vulnerability/9ff85b06-819c-459e-90a9-6151bfd70978 -https://wpscan.com/vulnerability/a01844a0-0c43-4d96-b738-57fe5bfbd67a -https://wpscan.com/vulnerability/a03243ea-fee7-46e4-8037-a228afc5297a -https://wpscan.com/vulnerability/a03330c2-3ae0-404d-a114-33b18cc47666 -https://wpscan.com/vulnerability/a04d3808-f4fc-4d77-a1bd-be623cd7053e -https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e -https://wpscan.com/vulnerability/a0787dae-a4b7-4248-9960-aaffabfaeb9f -https://wpscan.com/vulnerability/a087fb45-6f6c-40ac-b48b-2cbceda86cbe -https://wpscan.com/vulnerability/a092548f-1ad5-44d3-9901-cdf4ebcee40a -https://wpscan.com/vulnerability/a0a44f8a-877c-40df-a3ba-b9b806ffb772/ -https://wpscan.com/vulnerability/a0ca68d3-f885-46c9-9f6b-b77ad387d25d/ -https://wpscan.com/vulnerability/a0dd1da8-f8d2-453d-a2f2-711a49fb6466 -https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312 -https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb -https://wpscan.com/vulnerability/a11628e4-f47b-42d8-9c09-7536d49fce4c -https://wpscan.com/vulnerability/a1179959-2044-479f-a5ca-3c9ffc46d00e -https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/ -https://wpscan.com/vulnerability/a14b668f-812f-46ee-827e-0996b378f7f0 -https://wpscan.com/vulnerability/a1786400-dc62-489c-b986-ba17c9833179 -https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c -https://wpscan.com/vulnerability/a1ae4512-0b5b-4f36-8334-14633bf24758 -https://wpscan.com/vulnerability/a1b69615-690a-423b-afdf-729dcd32bc2f -https://wpscan.com/vulnerability/a1c70c80-e952-4cc7-aca0-c2dde3fa08a9 -https://wpscan.com/vulnerability/a1cf08fe-943a-4f14-beb0-25216011b538 -https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb -https://wpscan.com/vulnerability/a1dc0ea9-51dd-43c3-bfd9-c5106193aeb6 -https://wpscan.com/vulnerability/a1e7cd2b-8400-4c5d-8b47-a8ccd1e21675 -https://wpscan.com/vulnerability/a1fe0783-7a88-4d75-967f-cef970b73752 -https://wpscan.com/vulnerability/a21dc4a3-a4f3-4619-b8a3-493a27e14ccb -https://wpscan.com/vulnerability/a224b984-770a-4534-b689-0701b582b388/ -https://wpscan.com/vulnerability/a2424354-2639-4f53-a24f-afc11f6c4cac -https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef -https://wpscan.com/vulnerability/a2758983-d3a7-4718-b5b8-30169df6780a -https://wpscan.com/vulnerability/a2803027-b822-4bf9-8d1d-6f538681af9d -https://wpscan.com/vulnerability/a281f63f-e295-4666-8a08-01b23cd5a744 -https://wpscan.com/vulnerability/a282606f-6abf-4f75-99c9-dab0bea8cc96 -https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028 -https://wpscan.com/vulnerability/a28f52a4-fd57-4f46-8983-f34c71ec88d5 -https://wpscan.com/vulnerability/a29744cd-b760-4757-8564-883d59fa4881 -https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/ -https://wpscan.com/vulnerability/a2ec1308-75a0-49d0-9288-33c6d9ee4328/ -https://wpscan.com/vulnerability/a2f211af-5373-425f-9964-ebbf5efde87b -https://wpscan.com/vulnerability/a30212a0-c910-4657-aee1-4a2d72c77983 -https://wpscan.com/vulnerability/a30a1430-c474-4cd1-877c-35c4ab624170 -https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9 -https://wpscan.com/vulnerability/a31321fe-adc6-4480-a220-35aedca52b8b -https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c -https://wpscan.com/vulnerability/a3573212-2a98-4504-b8f4-b4d46655e17c -https://wpscan.com/vulnerability/a365c050-96ae-4266-aa87-850ee259ee2c -https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d -https://wpscan.com/vulnerability/a39bb807-b143-4863-88ff-1783e407d7d4/ -https://wpscan.com/vulnerability/a39c643f-eaa4-4c71-b75d-2c4fe34ac875 -https://wpscan.com/vulnerability/a3bf24af-417e-4ca2-886c-bb36bb2d952b -https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/ -https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932 -https://wpscan.com/vulnerability/a3cd3115-2181-4e14-8b39-4de096433847/ -https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/ -https://wpscan.com/vulnerability/a4162e96-a3c5-4f38-a60b-aa3ed9508985 -https://wpscan.com/vulnerability/a42272a2-f9ce-4aab-9a94-8a4d85008746 -https://wpscan.com/vulnerability/a438a951-497c-43cd-822f-1a48d4315191 -https://wpscan.com/vulnerability/a4432acd-df49-4a4f-8184-b55cdd5d4d34 -https://wpscan.com/vulnerability/a4599942-2878-4da4-b55d-077775323b61 -https://wpscan.com/vulnerability/a46d686c-6234-4aa8-a656-00a65c55d0b0 -https://wpscan.com/vulnerability/a487c7e7-667c-4c92-a427-c43cc13b348d -https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d -https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288 -https://wpscan.com/vulnerability/a4ad73b2-6a70-48ff-bf4c-28f81b193748 -https://wpscan.com/vulnerability/a4b6a83a-6394-4dfc-8bb3-4982867dab7d -https://wpscan.com/vulnerability/a4c352de-9815-4dfe-ac51-65b5bfb37438 -https://wpscan.com/vulnerability/a5084367-842b-496a-a23c-24dbebac1e8b -https://wpscan.com/vulnerability/a50dc7f8-a9e6-41fa-a047-ad1c3bc309b4 -https://wpscan.com/vulnerability/a53e213f-6011-47f8-93e6-aa5ad30e857e -https://wpscan.com/vulnerability/a5448599-64de-43b0-b04d-c6492366eab1 -https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f/ -https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d -https://wpscan.com/vulnerability/a5837621-ee6e-4876-9f65-82658fc0341f -https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 -https://wpscan.com/vulnerability/a59ebab8-5df7-4093-b853-da9472f53508 -https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06 -https://wpscan.com/vulnerability/a5c9fa61-e6f1-4460-84fe-977a203bd4bc -https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/ -https://wpscan.com/vulnerability/a6331ca8-9603-4134-af39-8e77ac9d511c -https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae -https://wpscan.com/vulnerability/a645daee-42ea-43f8-9480-ef3be69606e0/ -https://wpscan.com/vulnerability/a64a3b2e-7924-47aa-96e8-3aa02a6cdccc -https://wpscan.com/vulnerability/a6571f16-66d2-449e-af83-1c6ddd56edfa -https://wpscan.com/vulnerability/a66af8f7-1d5f-4fe5-a2ba-03337064583b -https://wpscan.com/vulnerability/a67b9c21-a35a-4cdb-9627-a5932334e5f0 -https://wpscan.com/vulnerability/a6b3e927-41e2-4e48-b9e1-8c58a1b9a933 -https://wpscan.com/vulnerability/a6be3fcf-60f7-4f13-b773-871a7296113c -https://wpscan.com/vulnerability/a6bfc150-8e3f-4b2d-a6e1-09406af41dd4 -https://wpscan.com/vulnerability/a6c1676d-9dcb-45f6-833a-9545bccd0ad6 -https://wpscan.com/vulnerability/a6d23f2f-9504-40da-9b71-189033d8bd1d -https://wpscan.com/vulnerability/a6d57fda-79a7-4bf8-b18e-8cf0a4efd1b3 -https://wpscan.com/vulnerability/a6e6c67b-7d9b-4fdb-8115-c33add7bfc3d -https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6 -https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120 -https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643 -https://wpscan.com/vulnerability/a754a516-07fc-44f1-9c34-31e963460301 -https://wpscan.com/vulnerability/a762c25b-5c47-400e-8964-407cf4c94e9f -https://wpscan.com/vulnerability/a76b6d22-1e00-428a-8a04-12162bd0d992 -https://wpscan.com/vulnerability/a7735feb-876e-461c-9a56-ea6067faf277/ -https://wpscan.com/vulnerability/a78d75b2-85a0-41eb-9720-c726ca2e8718 -https://wpscan.com/vulnerability/a7a24e8e-9056-4967-bcad-b96cc0c5b249 -https://wpscan.com/vulnerability/a7fa5896-5a1d-44c6-985c-e4abcc53da0e -https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65 -https://wpscan.com/vulnerability/a8575322-c2cf-486a-9c37-71a22167aac3 -https://wpscan.com/vulnerability/a86240e1-f064-4972-9f97-6b349fdd57f6 -https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92 -https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 -https://wpscan.com/vulnerability/a87040c1-58fc-4bf7-8bfa-0b9712a62ba8 -https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493 -https://wpscan.com/vulnerability/a88ffc42-6611-406e-8660-3af24c9cc5e8 -https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5 -https://wpscan.com/vulnerability/a8ccb09a-9f8c-448f-b2d0-9b01c3a748ac -https://wpscan.com/vulnerability/a8cec792-6435-4047-bca8-597c104dbc1f -https://wpscan.com/vulnerability/a8d314b9-26ac-4b56-a85c-a2528e55e73a -https://wpscan.com/vulnerability/a8dca528-fb70-44f3-8149-21385039179d -https://wpscan.com/vulnerability/a8fd8dd4-5b5e-462e-8dae-065d5e2d003a -https://wpscan.com/vulnerability/a9073616-ffd6-4956-b2e7-0fb2eac6e9b5 -https://wpscan.com/vulnerability/a90a413d-0e00-4da8-a339-d6cdfba70bb3 -https://wpscan.com/vulnerability/a91a01b9-7e36-4280-bc50-f6cff3e66059 -https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f -https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388 -https://wpscan.com/vulnerability/a956f1cd-fce4-4235-b1af-4b7675a60ca2 -https://wpscan.com/vulnerability/a965aeca-d8f9-4070-aa0d-9c9b95493dda -https://wpscan.com/vulnerability/a9918dfd-389c-43eb-afcc-03d29b42b369 -https://wpscan.com/vulnerability/a995dd67-43fc-4087-a7f1-5db57f4c828c -https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ -https://wpscan.com/vulnerability/a9a205a4-eef9-4f30-877a-4c562930650c -https://wpscan.com/vulnerability/a9a54ee5-2b80-4f55-894c-1047030eea7f -https://wpscan.com/vulnerability/a9ab9e84-7f5e-4e7c-8647-114d9e02e59f -https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053 -https://wpscan.com/vulnerability/a9f4aab7-b42b-4bb6-b05d-05407f935230 -https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02 -https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e -https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312 -https://wpscan.com/vulnerability/aa380524-031d-4e49-9d0b-96e62d54557f -https://wpscan.com/vulnerability/aa39de78-55b3-4237-84db-6fdf6820c58d -https://wpscan.com/vulnerability/aa59f811-2375-4593-93d4-f587f9870ed1 -https://wpscan.com/vulnerability/aa69377d-ba9e-4a2f-921c-be2ab5edcb4e -https://wpscan.com/vulnerability/aa868380-cda7-4ec6-8a3f-d9fa692908f2 -https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9 -https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 -https://wpscan.com/vulnerability/aab5d803-d621-4b12-a901-ff4447334d88 -https://wpscan.com/vulnerability/aac4bcc8-b826-4165-aed3-f422dd178692 -https://wpscan.com/vulnerability/aae7a889-195c-45a3-bbe4-e6d4cd2d7fd9 -https://wpscan.com/vulnerability/aaf91707-f03b-4f25-bca9-9fac4945002a/ -https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151 -https://wpscan.com/vulnerability/ab2c94d2-f6c4-418b-bd14-711ed164bcf1 -https://wpscan.com/vulnerability/ab3b0052-1a74-4ba3-b6d2-78cfe56029db -https://wpscan.com/vulnerability/ab53a70c-57d5-400f-b11f-b1b7b2b0cf01 -https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 -https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a -https://wpscan.com/vulnerability/ab78b1a5-e28c-406b-baaf-6d53017f9328/ -https://wpscan.com/vulnerability/ab857454-7c7c-454d-9c7f-1db767961e5f -https://wpscan.com/vulnerability/aba3dd58-7a8e-4129-add5-4dd5972c0426 -https://wpscan.com/vulnerability/aba62286-9a82-4d5b-9b47-1fddde5da487/ -https://wpscan.com/vulnerability/abfbba70-5158-4990-98e5-f302361db367 -https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc -https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf -https://wpscan.com/vulnerability/ac32d265-066e-49ec-9042-3145cd99e2e8 -https://wpscan.com/vulnerability/ac5c2a5d-09b6-470b-a598-2972183413ca -https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b -https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af -https://wpscan.com/vulnerability/ac74df9a-6fbf-4411-a501-97eba1ad1895 -https://wpscan.com/vulnerability/acc9675a-56f6-411a-9594-07144c2aad1b -https://wpscan.com/vulnerability/acd3d98a-aab8-49be-b77e-e8c6ede171ac -https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3 -https://wpscan.com/vulnerability/acf3e369-1290-4b3f-83bf-2209b9dd06e1 -https://wpscan.com/vulnerability/ad07d9cd-8a75-4f7c-bbbe-3b6b89b699f2 -https://wpscan.com/vulnerability/ad12bab7-9baf-4646-a93a-0d3286407c1e -https://wpscan.com/vulnerability/ad163020-8b9c-42cb-a55f-b137b224bafb -https://wpscan.com/vulnerability/ad1ef4c5-60c1-4729-81dd-f626aa0ce3fe/ -https://wpscan.com/vulnerability/ad35fbae-1e90-47a0-b1d2-f8d91a5db90e -https://wpscan.com/vulnerability/ad3f6f3d-e12c-4867-906c-73aa001c7351 -https://wpscan.com/vulnerability/ad5c167e-77f7-453c-9443-df6e07705d89 -https://wpscan.com/vulnerability/ad67e45e-254a-46ce-a243-bfc86839446e -https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d -https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a -https://wpscan.com/vulnerability/ad895200-a03a-4e92-b256-d6991547d38a -https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603 -https://wpscan.com/vulnerability/adc1d752-331e-44af-b5dc-b463d56c2cb4 -https://wpscan.com/vulnerability/adc5dd9b-0781-4cea-8cc5-2c10ac35b968 -https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/ -https://wpscan.com/vulnerability/adc9ed9f-55b4-43a9-a79d-c7120764f47c -https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348 -https://wpscan.com/vulnerability/ae103336-a411-4ebf-a5f0-2f35701e364c -https://wpscan.com/vulnerability/ae1aab4e-b00a-458b-a176-85761655bdcc -https://wpscan.com/vulnerability/ae322f11-d8b4-4b69-9efa-0fb87475fa44 -https://wpscan.com/vulnerability/ae3cd3ed-aecd-4d8c-8a2b-2936aaaef0cf -https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb -https://wpscan.com/vulnerability/ae50cec9-5f80-4221-b6a8-4593ab66c37b -https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997 -https://wpscan.com/vulnerability/ae5b7776-9d0d-4db8-81c3-237b16cd9c62 -https://wpscan.com/vulnerability/ae613148-85d8-47a0-952d-49c29584676f -https://wpscan.com/vulnerability/ae79189a-6b63-4110-9567-cd7c97d71e4f -https://wpscan.com/vulnerability/ae8e225a-5273-4db1-9c72-060304cca658/ -https://wpscan.com/vulnerability/aebf821f-1724-4e4c-8d42-5a94e509d271 -https://wpscan.com/vulnerability/aeefcc01-bbbf-4d86-9cfd-ea0f9a85e1a5/ -https://wpscan.com/vulnerability/af06b96c-105f-429c-b2ad-c8c823897dba -https://wpscan.com/vulnerability/af14ac23-843d-4f80-beaf-237618109edd -https://wpscan.com/vulnerability/af3b32c9-f386-4bb6-a362-86a27f49a739 -https://wpscan.com/vulnerability/af472879-9328-45c2-957f-e7bed77e4c2d -https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338 -https://wpscan.com/vulnerability/af548fab-96c2-4129-b609-e24aad0b1fc4 -https://wpscan.com/vulnerability/af7d62ca-09b3-41c8-b771-be936ce8f6b2 -https://wpscan.com/vulnerability/af9787ee-c496-4f02-a22c-c8f8a97ad902 -https://wpscan.com/vulnerability/af9cbb4a-42fc-43c5-88f3-349b417f1a6a -https://wpscan.com/vulnerability/afa1e159-30bc-42d2-b3f8-8c868b113d3e -https://wpscan.com/vulnerability/afc11c92-a7c5-4e55-8f34-f2235438bd1b/ -https://wpscan.com/vulnerability/afef06f5-71a6-4372-9648-0db59f9b254f -https://wpscan.com/vulnerability/b00b5037-8ce4-4f61-b2ce-33315b39454e -https://wpscan.com/vulnerability/b01a85cc-0e45-4183-a916-19476354d5d4 -https://wpscan.com/vulnerability/b0239208-1e23-4774-9b8c-9611704a07a0 -https://wpscan.com/vulnerability/b027a8db-0fd6-444d-b14a-0ae58f04f931 -https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4 -https://wpscan.com/vulnerability/b064940f-9614-4b7b-b2c4-e79528746833 -https://wpscan.com/vulnerability/b09fe120-ab9b-44f2-b50d-3b4b299d6d15 -https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a -https://wpscan.com/vulnerability/b0e7665a-c8c3-4132-b8d7-8677a90118df -https://wpscan.com/vulnerability/b0f8713f-54b2-4ab2-a475-60a1692a50e9 -https://wpscan.com/vulnerability/b110e2f7-4aa3-47b5-a8f2-0a7fe53cc467 -https://wpscan.com/vulnerability/b125a765-a6b6-421b-bd8a-effec12bc629 -https://wpscan.com/vulnerability/b126d2fc-6cc7-4c18-b95e-d32c2effcc4f -https://wpscan.com/vulnerability/b14f476e-3124-4cbf-91b4-ae53c4dabd7c -https://wpscan.com/vulnerability/b15744de-bf56-4e84-9427-b5652d123c15 -https://wpscan.com/vulnerability/b1704a12-459b-4f5d-aa2d-a96646ddaf3e -https://wpscan.com/vulnerability/b195c373-1db9-4fd7-98d0-0860dacd189e -https://wpscan.com/vulnerability/b19adf7c-3983-487b-9b46-0f2922b08c1c/ -https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa -https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60 -https://wpscan.com/vulnerability/b1aa6f32-c1d5-4fc6-9a4e-d4c5fae78389/ -https://wpscan.com/vulnerability/b1aef75d-0c84-4702-83fc-11f0e98a0821 -https://wpscan.com/vulnerability/b22fe77c-844e-4c24-8023-014441cc1e82 -https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/ -https://wpscan.com/vulnerability/b25af0e1-392f-4305-ad44-50e64ef3dbdf -https://wpscan.com/vulnerability/b28150e7-214b-4bcd-85c0-e819c4223484 -https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/ -https://wpscan.com/vulnerability/b2a92316-e404-4a5e-8426-f88df6e87550/ -https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/ -https://wpscan.com/vulnerability/b2c6fa7d-1b0f-444b-8ca5-8c1c06cea1d9 -https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d -https://wpscan.com/vulnerability/b2f06223-9352-4227-ae94-32061e2c5611 -https://wpscan.com/vulnerability/b2f473b4-268c-48b7-95e8-0a8eeaa3fc28 -https://wpscan.com/vulnerability/b35b3da2-468d-4fe5-bff6-812432197a38 -https://wpscan.com/vulnerability/b378d36d-66d9-4373-a628-e379e4766375 -https://wpscan.com/vulnerability/b37b09c1-1b53-471c-9b10-7d2d05ae11f1 -https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/ -https://wpscan.com/vulnerability/b3b523b9-6c92-4091-837a-d34e3174eb19 -https://wpscan.com/vulnerability/b3d1fbae-88c9-45d1-92c6-0a529b21e3b2/ -https://wpscan.com/vulnerability/b3f2d38f-8eeb-45e9-bb58-2957e416e1cd/ -https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/ -https://wpscan.com/vulnerability/b41e5c09-1034-48a7-ac0f-d4db6e7a3b3e -https://wpscan.com/vulnerability/b427841d-a3ad-4e3a-8964-baad90a9aedb -https://wpscan.com/vulnerability/b430fdaa-191a-429e-b6d2-479b32bb1075 -https://wpscan.com/vulnerability/b4600411-bee1-4cc8-aee9-0a613ac9b55b/ -https://wpscan.com/vulnerability/b463ccbb-2dc1-479f-bc88-becd204b2dc0 -https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa -https://wpscan.com/vulnerability/b47ea36e-f37c-4745-b750-31f5b91f543f -https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0 -https://wpscan.com/vulnerability/b49ca336-5bc2-4d72-a9a5-b8c020057928 -https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd -https://wpscan.com/vulnerability/b4c53bef-e868-46f1-965d-720b5b9a931e -https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0 -https://wpscan.com/vulnerability/b50e7622-c1dc-485b-a5f5-b010b40eef20 -https://wpscan.com/vulnerability/b514b631-c3e3-4793-ab5d-35ed0c38b011/ -https://wpscan.com/vulnerability/b5295bf9-8cf6-416e-b215-074742a5fc63 -https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47 -https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6 -https://wpscan.com/vulnerability/b5578747-298d-4f4b-867e-46b767485a98 -https://wpscan.com/vulnerability/b5624fb3-b110-4b36-a00f-20bbc3a8fdb9 -https://wpscan.com/vulnerability/b57272ea-9a8a-482a-bbaa-5f202ca5b9aa -https://wpscan.com/vulnerability/b57dacdd-43c2-48f8-ac1e-eb8306b22533 -https://wpscan.com/vulnerability/b583de48-1332-4984-8c0c-a7ed4a2397cd -https://wpscan.com/vulnerability/b586b217-f91e-42d3-81f1-cc3ee3a4b01e -https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17 -https://wpscan.com/vulnerability/b5def0e7-2b4a-43e0-8175-28b28aa2f8ae -https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10 -https://wpscan.com/vulnerability/b5fc223c-5ec0-44b2-b2f6-b35f9942d341 -https://wpscan.com/vulnerability/b604afc8-61d0-4e98-8950-f3d29f9e9ee1 -https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed -https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7e54b7/ -https://wpscan.com/vulnerability/b621261b-ae18-4853-9ace-7b773810529a -https://wpscan.com/vulnerability/b62d8fa6-d546-4794-8f7a-c5e4a7f607dc -https://wpscan.com/vulnerability/b63bbfeb-d6f7-4c33-8824-b86d64d3f598/ -https://wpscan.com/vulnerability/b655fc21-47a1-4786-8911-d78ab823c153 -https://wpscan.com/vulnerability/b66d6682-edbc-435f-a73a-dced32a32770 -https://wpscan.com/vulnerability/b69ea1bc-3c9b-47d7-a164-c860ee46a9af -https://wpscan.com/vulnerability/b6ac3e15-6f39-4514-a50d-cca7b9457736 -https://wpscan.com/vulnerability/b6c1ed7a-5b2d-4985-847d-56586b1aae9b -https://wpscan.com/vulnerability/b6c62e53-ae49-4fe0-aed9-0c493fc4442d -https://wpscan.com/vulnerability/b6d38e23-3761-4447-a794-1e5077fd953a -https://wpscan.com/vulnerability/b6ed4d64-ee98-41bd-a97a-8350c2a8a546 -https://wpscan.com/vulnerability/b71f53d7-6b9e-458c-8754-576ad2a52f7d -https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb -https://wpscan.com/vulnerability/b766103a-7f91-4d91-9f9c-bff4bfd53f57 -https://wpscan.com/vulnerability/b76dbf37-a0a2-48cf-bd85-3ebbc2f394dd/ -https://wpscan.com/vulnerability/b7707a15-0987-4051-a8ac-7be2424bcb01 -https://wpscan.com/vulnerability/b7a35c5b-474a-444a-85ee-c50782c7a6c2/ -https://wpscan.com/vulnerability/b7dd81c6-6af1-4976-b928-421ca69bfa90 -https://wpscan.com/vulnerability/b81e824c-d2b1-4381-abee-18c42bb5c2f5 -https://wpscan.com/vulnerability/b82bdd02-b699-4527-86cc-d60b56ab0c55 -https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd -https://wpscan.com/vulnerability/b8390b4a-b43f-4bf6-a61b-dfcbc7b2e7a0 -https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5 -https://wpscan.com/vulnerability/b85920b3-dfc1-4112-abd8-ce6a5d91ae0d -https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/ -https://wpscan.com/vulnerability/b8784995-0deb-4c83-959f-52b37881e05c -https://wpscan.com/vulnerability/b87fcc2f-c2eb-4e23-9757-d1c590f26d3f -https://wpscan.com/vulnerability/b893cac2-6511-4e2a-9eff-baf0f3cc9d7e -https://wpscan.com/vulnerability/b8e6f0d3-a7d1-4ca8-aba8-0d5075167d55 -https://wpscan.com/vulnerability/b92ec5f7-d6a8-476f-a01e-21001a558914/ -https://wpscan.com/vulnerability/b93d9f9d-0fd9-49b8-b465-d32b95351912 -https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f -https://wpscan.com/vulnerability/b960cb36-62de-4b9f-a35d-144a34a4c63d -https://wpscan.com/vulnerability/b968b9a1-67f3-4bef-a3d3-6e8942bb6570 -https://wpscan.com/vulnerability/b9748066-83b7-4762-9124-de021f687477 -https://wpscan.com/vulnerability/b97afbe8-c9ae-40a2-81e5-b1d7a6b31831 -https://wpscan.com/vulnerability/b99dae3d-8230-4427-adc5-4ef9cbfb8ba1 -https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/ -https://wpscan.com/vulnerability/b9a4a3e3-7cdd-4354-8541-4219bd41c854/ -https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27 -https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d -https://wpscan.com/vulnerability/b9dba241-d94c-4ce5-8730-445ba8005e66 -https://wpscan.com/vulnerability/b9f39ced-1e0f-4559-b861-39ddcbcd1249/ -https://wpscan.com/vulnerability/ba1d01dc-16e4-464f-94be-ed311ff6ccf9 -https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2 -https://wpscan.com/vulnerability/ba4503f7-684e-4274-bc53-3aa848712496 -https://wpscan.com/vulnerability/ba50c590-42ee-4523-8aa0-87ac644b77ed -https://wpscan.com/vulnerability/ba653457-415f-4ab3-a792-42640b59302b -https://wpscan.com/vulnerability/ba77704a-32a1-494b-b2c0-e1c2a3f98adc/ -https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/ -https://wpscan.com/vulnerability/baf7ef4d-b2ba-48e0-9c17-74fa27e0c15b -https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/ -https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0 -https://wpscan.com/vulnerability/bb0806d7-21e3-4a65-910c-bf0625c338ec -https://wpscan.com/vulnerability/bb0efc5e-044b-47dc-9101-9aae40cdbaa5 -https://wpscan.com/vulnerability/bb20d732-a5e4-4140-ab51-b2aa1a53db12 -https://wpscan.com/vulnerability/bb2b876f-7216-4f31-9d1f-a45405c545ce -https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 -https://wpscan.com/vulnerability/bb3e56dd-ae2e-45c2-a6c9-a59ae5fc1dc4 -https://wpscan.com/vulnerability/bb437706-a918-4d66-b027-b083ab486074 -https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e -https://wpscan.com/vulnerability/bb5d94ad-e1ce-44e2-8403-d73fe75a146a -https://wpscan.com/vulnerability/bb71f2f9-76bd-43f4-a8c9-35771dd28dff -https://wpscan.com/vulnerability/bb7c2d2b-cdfe-433b-96cf-714e71d12b22/ -https://wpscan.com/vulnerability/bb8e9f06-477b-4da3-b5a6-4f06084ecd57 -https://wpscan.com/vulnerability/bbaa808d-47b1-4c70-b157-f8297f627a07 -https://wpscan.com/vulnerability/bbb4c98c-4dd7-421e-9666-98f15acde761 -https://wpscan.com/vulnerability/bbc0b812-7b30-4ab4-bac8-27c706b3f146 -https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/ -https://wpscan.com/vulnerability/bc167b3a-24ee-4988-9934-189b6216ce40 -https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/ -https://wpscan.com/vulnerability/bc2e5be3-cd2b-4ee9-8d7a-cabce46b7092 -https://wpscan.com/vulnerability/bc7058b1-ca93-4c45-9ced-7848c7ae4150 -https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 -https://wpscan.com/vulnerability/bc90594e-1018-494a-b473-6416e274c59f -https://wpscan.com/vulnerability/bc97dd57-e9f6-4bc3-a4c2-40303786ae4a -https://wpscan.com/vulnerability/bcf38e87-011e-4540-8bfb-c93443a4a490 -https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd -https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8 -https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957 -https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 -https://wpscan.com/vulnerability/bd9dc754-08a4-4bfc-8dda-3f5c0e070f7e -https://wpscan.com/vulnerability/bd9ef7e0-ebbb-4b91-8c58-265218a3c536 -https://wpscan.com/vulnerability/bdb75c8c-87e2-4358-ad3b-f4236e9a43c0 -https://wpscan.com/vulnerability/bdc36f6a-682d-4d66-b587-92e86085d971 -https://wpscan.com/vulnerability/bde93d90-1178-4d55-aea9-e02c4f8bcaa2 -https://wpscan.com/vulnerability/be2fc859-3158-4f06-861d-382381a7551b -https://wpscan.com/vulnerability/be3045b1-72e6-450a-8dd2-4702a9328447/ -https://wpscan.com/vulnerability/be356530-5e00-4f27-8177-b80f3c1ae6e8 -https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e -https://wpscan.com/vulnerability/be55131b-d9f2-4ac1-b667-c544c066887f -https://wpscan.com/vulnerability/be7b102f-3982-46bd-a79c-203498f7c820 -https://wpscan.com/vulnerability/be7bbf4f-6f6a-4a44-bf86-2f096351ae08 -https://wpscan.com/vulnerability/be895016-7365-4ce4-a54f-f36d0ef2d6f1 -https://wpscan.com/vulnerability/be9b25c8-b0d7-4c22-81ff-e41650a4ed41 -https://wpscan.com/vulnerability/be9d6f82-c972-459a-bacf-65b3dfb11a09 -https://wpscan.com/vulnerability/be9e8870-0682-441d-8955-d096d1346bd1 -https://wpscan.com/vulnerability/beca7afd-8f03-4909-bea0-77b63513564b -https://wpscan.com/vulnerability/bed8c81c-04c7-412d-9563-ce4eb64b7754 -https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334 -https://wpscan.com/vulnerability/bf1b8434-b361-4666-9058-d9f08c09d083/ -https://wpscan.com/vulnerability/bf3a31de-a227-4db1-bd18-ce6a78dc96fb/ -https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b -https://wpscan.com/vulnerability/bf540242-5306-4c94-ad50-782d0d5b127f/ -https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882 -https://wpscan.com/vulnerability/bf6f897b-af65-4122-802c-ae6d4f2346f9 -https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b -https://wpscan.com/vulnerability/bfa8f46f-d323-4a2d-b875-39cd9b4cee0a -https://wpscan.com/vulnerability/bfaa7d79-904e-45f1-bc42-ddd90a65ce74 -https://wpscan.com/vulnerability/bfb174d4-7658-4883-a682-d06bda89ec44 -https://wpscan.com/vulnerability/bfb6ed12-ae64-4075-9d0b-5620e998df74 -https://wpscan.com/vulnerability/bfbb32ac-9ef9-46de-8e5e-7d6d6fb868d8 -https://wpscan.com/vulnerability/bfd8a7aa-5977-4fe5-b2fc-12bf93caf3ed -https://wpscan.com/vulnerability/c0136057-f420-4fe7-a147-ecbec7e7a9b5 -https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1 -https://wpscan.com/vulnerability/c0257564-48ee-4d02-865f-82c8b5e793c9 -https://wpscan.com/vulnerability/c028cd73-f30a-4c8b-870f-3071055f0496/ -https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b -https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e -https://wpscan.com/vulnerability/c04ea768-150f-41b8-b08c-78d1ae006bbb -https://wpscan.com/vulnerability/c061e792-e37a-4cf6-b46b-ff111c5a5c84/ -https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91/ -https://wpscan.com/vulnerability/c08e0f24-bd61-4e83-a555-363568cf0e6e -https://wpscan.com/vulnerability/c0a5cdde-732a-432a-86c2-776df5d130a7 -https://wpscan.com/vulnerability/c0a6c253-71f2-415d-a6ec-022f2eafc13b -https://wpscan.com/vulnerability/c0c37787-3c4c-42d5-bb75-5d4ed3e7aa2b -https://wpscan.com/vulnerability/c0cc513e-c306-4920-9afb-e33d95a7292f -https://wpscan.com/vulnerability/c0dd3ef1-579d-43a4-801a-660c41495d58 -https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 -https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 -https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5 -https://wpscan.com/vulnerability/c1194a1e-bf33-4f3f-a4a6-27b76b1b1eeb -https://wpscan.com/vulnerability/c12f6087-1875-4edf-ac32-bec6f712968d -https://wpscan.com/vulnerability/c142e738-bc4b-4058-a03e-1be6fca47207 -https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2 -https://wpscan.com/vulnerability/c15a6032-6495-47a8-828c-37e55ed9665a -https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad -https://wpscan.com/vulnerability/c177f763-0bb5-4734-ba2e-7ba816578937 -https://wpscan.com/vulnerability/c17f2534-d791-4fe3-b45b-875777585dc6 -https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c -https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/ -https://wpscan.com/vulnerability/c234700e-61dd-46a0-90fb-609e704269a9 -https://wpscan.com/vulnerability/c25146fd-4143-463c-8c85-05dd33e9a77b -https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b -https://wpscan.com/vulnerability/c298e3dc-09a7-40bb-a361-f49af4bce77e -https://wpscan.com/vulnerability/c2a9cf01-051a-429a-82ca-280885114b5a -https://wpscan.com/vulnerability/c2bc7d23-5bfd-481c-b42b-da7ee80d9514 -https://wpscan.com/vulnerability/c2c89234-5e9c-47c8-9827-8ab0b10fb7d6 -https://wpscan.com/vulnerability/c2cc3d8e-f3ac-46c6-871e-894cf3ba67f6 -https://wpscan.com/vulnerability/c2d2384c-41b9-4aaf-b918-c1cfda58af5c -https://wpscan.com/vulnerability/c2defd30-7e4c-4a28-8a68-282429061f3f -https://wpscan.com/vulnerability/c2f8e9b9-c044-4c45-8d17-e628e9cb5d59 -https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89 -https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930 -https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41 -https://wpscan.com/vulnerability/c330f92b-1e21-414f-b316-d5e97cb62bd1 -https://wpscan.com/vulnerability/c3406236-aaee-480a-8931-79c867252f11/ -https://wpscan.com/vulnerability/c346ff80-c16b-4219-8983-708c64fa4a61 -https://wpscan.com/vulnerability/c34f8dcc-3be6-44ad-91a4-7c3a0ce2f9d7 -https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255 -https://wpscan.com/vulnerability/c36314c1-a2c0-4816-93c9-e61f9cf7f27a -https://wpscan.com/vulnerability/c36d0ea8-bf5c-4af9-bd3d-911eb02adc14 -https://wpscan.com/vulnerability/c39473a7-47fc-4bce-99ad-28d03f41e74e -https://wpscan.com/vulnerability/c39719e5-dadd-4414-a96d-5e70a1e3d462 -https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f -https://wpscan.com/vulnerability/c3c28edf-19bc-4f3a-b58e-f1c67557aa29 -https://wpscan.com/vulnerability/c3d43aac-66c8-4218-b3f0-5256f895eda3/ -https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63 -https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/ -https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/ -https://wpscan.com/vulnerability/c43b669f-0377-4402-833c-817b75001888 -https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b -https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505 -https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e -https://wpscan.com/vulnerability/c452c5da-05a6-4a14-994d-e5049996d496/ -https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d -https://wpscan.com/vulnerability/c46ecd0d-a132-4ad6-b936-8acde3a09282/ -https://wpscan.com/vulnerability/c47fdca8-74ac-48a4-9780-556927fb4e52 -https://wpscan.com/vulnerability/c493ac9c-67d1-48a9-be21-824b1a1d56c2 -https://wpscan.com/vulnerability/c4ac0b19-58b1-4620-b3b7-fbe6dd6c8dd5 -https://wpscan.com/vulnerability/c4cd3d98-9678-49cb-9d1a-551ef8a810b9 -https://wpscan.com/vulnerability/c4e50dd2-450f-413d-b15f-ece413e42157 -https://wpscan.com/vulnerability/c4ed3e52-cbe0-46dc-ab43-65de78cfb225 -https://wpscan.com/vulnerability/c543b6e2-a7c0-4ba7-a308-e9951dd59fb9 -https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68 -https://wpscan.com/vulnerability/c5765816-4439-4c14-a847-044248ada0ef -https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a -https://wpscan.com/vulnerability/c59a8b49-6f3e-452b-ba9b-50b80c522ee9/ -https://wpscan.com/vulnerability/c5ca22e0-b7a5-468d-8366-1855ff33851b -https://wpscan.com/vulnerability/c5cbe3b4-2829-4fd2-8194-4b3a2ae0e257 -https://wpscan.com/vulnerability/c5cc136a-2fa6-44ff-b5b5-26d367937df9 -https://wpscan.com/vulnerability/c5e395f8-257e-49eb-afbd-9c1e26045373 -https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a -https://wpscan.com/vulnerability/c60a3d40-449c-4c84-8d13-68c04267c1d7 -https://wpscan.com/vulnerability/c62be802-e91a-4bcf-990d-8fd8ef7c9a28 -https://wpscan.com/vulnerability/c6597e36-02d6-46b4-89db-52c160f418be -https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18 -https://wpscan.com/vulnerability/c6cc400a-9bfb-417d-9206-5582a49d0f05 -https://wpscan.com/vulnerability/c6cf792b-054c-4d77-bcae-3b700f42130b -https://wpscan.com/vulnerability/c6d3d308-4bf1-493f-86e9-dd623526e3c6 -https://wpscan.com/vulnerability/c6f24afe-d273-4f87-83ca-a791a385b06b -https://wpscan.com/vulnerability/c722f8d0-f86b-41c2-9f1f-48e475e22864 -https://wpscan.com/vulnerability/c73316d2-ae6a-42db-935b-b8b03a7e4363 -https://wpscan.com/vulnerability/c73818e5-0734-46c9-9703-d211b4f58664 -https://wpscan.com/vulnerability/c73b3276-e6f1-4f22-a888-025e5d0504f2 -https://wpscan.com/vulnerability/c73c7694-1cee-4f26-a425-9c336adce52b -https://wpscan.com/vulnerability/c740ed3b-d6b8-4afc-8c6b-a1ec37597055/ -https://wpscan.com/vulnerability/c761c67c-eab8-4e1b-a332-c9a45e22bb13 -https://wpscan.com/vulnerability/c76a1c0b-8a5b-4639-85b6-9eebc63c3aa6 -https://wpscan.com/vulnerability/c783a746-f1fe-4d68-9d0a-477de5dbb35c -https://wpscan.com/vulnerability/c789ca04-d88c-4789-8be1-812888f0c8f8 -https://wpscan.com/vulnerability/c7906b1d-25c9-4f34-bd02-66824878b88e/ -https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54 -https://wpscan.com/vulnerability/c7a17eb9-2811-45ba-bab3-f53b2fa7d051 -https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586 -https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc -https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18 -https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/ -https://wpscan.com/vulnerability/c7d12fd4-7346-4727-9f6c-7e7e5524a932 -https://wpscan.com/vulnerability/c7feceef-28f1-4cac-b124-4b95e3f17b07 -https://wpscan.com/vulnerability/c8091254-1ced-4363-ab7f-5b880447713d -https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052 -https://wpscan.com/vulnerability/c817c4af-cff2-4720-944d-c59e27544d41 -https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b -https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6 -https://wpscan.com/vulnerability/c85ceab3-7e79-402d-ad48-a028f1ee070c -https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11 -https://wpscan.com/vulnerability/c88b22ba-4fc2-49ad-a457-224157521bad -https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-af6bce6bb4ef -https://wpscan.com/vulnerability/c8917ba2-4cb3-4b09-8a49-b7c612254946 -https://wpscan.com/vulnerability/c8982b8d-985f-4a5d-840d-e8be7c3405bd -https://wpscan.com/vulnerability/c89bf498-f384-49de-820e-6cbd70390db2 -https://wpscan.com/vulnerability/c8dcd7a7-5ad4-452c-a6a5-2362986656e4 -https://wpscan.com/vulnerability/c911bbbd-0196-4e3d-ada3-4efb8a339954 -https://wpscan.com/vulnerability/c92eb2bf-0a5d-40b9-b0be-1820e7b9bebb -https://wpscan.com/vulnerability/c933460b-f77d-4986-9f5a-32d9f3f8b412 -https://wpscan.com/vulnerability/c94b3a68-673b-44d7-9251-f3590cc5ee9e -https://wpscan.com/vulnerability/c959f4ce-b6ea-4aee-9a98-aa98d2a62138 -https://wpscan.com/vulnerability/c969c4bc-82d7-46a0-88ba-e056c0b27de7 -https://wpscan.com/vulnerability/c97b218c-b430-4301-884f-f64d0dd08f07 -https://wpscan.com/vulnerability/c9911236-4af3-4557-9bc0-217face534e1 -https://wpscan.com/vulnerability/c9a106e1-29ae-47ad-907b-01086af3d3fb -https://wpscan.com/vulnerability/c9d80aa4-a26d-4b3f-b7bf-9d2fb0560d7b -https://wpscan.com/vulnerability/ca120255-2c50-4906-97f3-ea660486db4c -https://wpscan.com/vulnerability/ca2e8feb-15d6-4965-ad9c-8da1bc01e0f4 -https://wpscan.com/vulnerability/ca3ca694-54ca-4e7e-82e6-33aa240754e1 -https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/ -https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff -https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d -https://wpscan.com/vulnerability/ca7b6a39-a910-4b4f-b9cc-be444ec44942 -https://wpscan.com/vulnerability/ca8068f7-dcf0-44fd-841d-d02987220d79 -https://wpscan.com/vulnerability/ca83db95-4a08-4615-aa8d-016022404c32/ -https://wpscan.com/vulnerability/ca886a34-cd2b-4032-9de1-8089b5cf3001 -https://wpscan.com/vulnerability/ca954ec6-6ebd-4d72-a323-570474e2e339 -https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81 -https://wpscan.com/vulnerability/caacc50c-822e-46e9-bc0b-681349fd0dda -https://wpscan.com/vulnerability/cac12b64-ed25-4ee2-933f-8ff722605271/ -https://wpscan.com/vulnerability/cada9be9-522a-4ce8-847d-c8fff2ddcc07 -https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f2360a759 -https://wpscan.com/vulnerability/caf36ca5-aafd-48bd-a1e5-30f3973d8eb8 -https://wpscan.com/vulnerability/cb232354-f74d-48bb-b437-7bdddd1df42a -https://wpscan.com/vulnerability/cb2fa587-da2f-460e-a402-225df7744765 -https://wpscan.com/vulnerability/cb3173ec-9891-4bd8-9d05-24fe805b5235 -https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5 -https://wpscan.com/vulnerability/cb6f4953-e68b-48f3-a821-a1d77e5476ef -https://wpscan.com/vulnerability/cb7ed9e6-0fa0-4ebb-9109-8f33defc8b32 -https://wpscan.com/vulnerability/cba4ccdd-9331-4ca0-b910-8f427ed9b540 -https://wpscan.com/vulnerability/cbab7639-fdb2-4ee5-b5ca-9e30701a63b7/ -https://wpscan.com/vulnerability/cbb75383-4351-4488-aaca-ddb0f6f120cd -https://wpscan.com/vulnerability/cbb8fa9f-1c84-4410-ae86-64cb1771ce78 -https://wpscan.com/vulnerability/cbd65b7d-d3c3-4ee3-8e5e-ff0eeeaa7b30 -https://wpscan.com/vulnerability/cbdaf158-f277-4be4-b022-68d18dae4c55 -https://wpscan.com/vulnerability/cbfa7211-ac1f-4cf2-bd79-ebce2fc4baa1 -https://wpscan.com/vulnerability/cc05f760-983d-4dc1-afbb-6b4965aa8abe -https://wpscan.com/vulnerability/cc13db1e-5f7f-49b2-81da-f913cfe70543 -https://wpscan.com/vulnerability/cc308e15-7937-4d41-809d-74f8c13bee23 -https://wpscan.com/vulnerability/cc6585c8-5798-48a1-89f7-a3337f56df3f -https://wpscan.com/vulnerability/ccb27d2e-2d2a-40d3-ba7e-bcd5e5012a9a -https://wpscan.com/vulnerability/ccbb74f5-1b8f-4ea6-96bc-ddf62af7f94d -https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f -https://wpscan.com/vulnerability/ccf293ec-7607-412b-b662-5e237b8690ca -https://wpscan.com/vulnerability/cd288a92-903b-47c9-83ac-8e5b677e949b -https://wpscan.com/vulnerability/cd2fd6cd-a839-4de8-af28-b5134873c40e -https://wpscan.com/vulnerability/cd37ca81-d683-4955-bc97-60204cb9c346 -https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15 -https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c -https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd -https://wpscan.com/vulnerability/cdb3a8bd-4ee0-4ce0-9029-0490273bcfc8 -https://wpscan.com/vulnerability/cdcd3c2c-cb29-4b21-8d3d-7eafbc1d3098 -https://wpscan.com/vulnerability/ce12437a-d440-4c4a-9247-95a8f39d00b9 -https://wpscan.com/vulnerability/ce2e3503-9a06-4f5c-ae0f-f40e7dfb2903 -https://wpscan.com/vulnerability/ce467a2e-081e-4a6c-bfa4-29e4447ebd3b -https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/ -https://wpscan.com/vulnerability/ce4ac9c4-d293-4464-b6a0-82ddf8d4860b/ -https://wpscan.com/vulnerability/ce564628-3d15-4bc5-8b8e-60b71786ac19 -https://wpscan.com/vulnerability/ce5fac6e-8da1-4042-9cf8-7988613f92a5 -https://wpscan.com/vulnerability/ce6d17c3-6741-4c80-ab13-e1824960ae24 -https://wpscan.com/vulnerability/ce8027b8-9473-463e-ba80-49b3d6d16228 -https://wpscan.com/vulnerability/ce8f9648-30fb-4fb9-894e-879dc0f26f98 -https://wpscan.com/vulnerability/cea0ce4b-886a-47cc-8653-a297e9759d09 -https://wpscan.com/vulnerability/ced134cf-82c5-401b-9476-b6456e1924e2/ -https://wpscan.com/vulnerability/cf022415-6614-4b95-913b-802186766ae6 -https://wpscan.com/vulnerability/cf031259-b76e-475c-8a8e-fa6a0d9e7bb4 -https://wpscan.com/vulnerability/cf0a51f9-21d3-4ae8-b7d2-361921038fe8 -https://wpscan.com/vulnerability/cf0b3893-3283-46d6-a497-f3110a35d42a -https://wpscan.com/vulnerability/cf13b0f8-5815-4d27-a276-5eff8985fc0b -https://wpscan.com/vulnerability/cf323f72-8374-40fe-9e2e-810e46de1ec8 -https://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8 -https://wpscan.com/vulnerability/cf376ca2-92f6-44ff-929a-ace809460a33 -https://wpscan.com/vulnerability/cf4b266c-d68e-4add-892a-d01a31987a4b -https://wpscan.com/vulnerability/cf7b0f07-8b9b-40a1-ba7b-e8d34f515a6b -https://wpscan.com/vulnerability/cf7c0207-adb2-44c6-9469-2b24dbfec83a -https://wpscan.com/vulnerability/cf907d53-cc4a-4b02-bed3-64754128112c -https://wpscan.com/vulnerability/cf9305e8-f5bc-45c3-82db-0ef00fd46129 -https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a -https://wpscan.com/vulnerability/cfbc2b43-b8f8-4bcb-a3d3-39d217afa530 -https://wpscan.com/vulnerability/cfc80857-8674-478f-9604-7a8849e5b85e -https://wpscan.com/vulnerability/d00824a3-7df5-4b52-a31b-5fdfb19c970f -https://wpscan.com/vulnerability/d02cf542-2d75-46bc-a0df-67bbe501cc89 -https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96 -https://wpscan.com/vulnerability/d084c5b1-45f1-4e7e-b3e9-3c98ae4bce9c -https://wpscan.com/vulnerability/d0afd17c-09cd-4ab5-95a5-6ac8c3c0a50b -https://wpscan.com/vulnerability/d0b312f8-8b16-45be-b5e5-bf9d4b3e9b1e -https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db -https://wpscan.com/vulnerability/d0da4c0d-622f-4310-a867-6bfdb474073a -https://wpscan.com/vulnerability/d106cd93-cb9b-4558-9a29-0d556fd7c9e1 -https://wpscan.com/vulnerability/d11b79a3-f762-49ab-b7c8-3174624d7638 -https://wpscan.com/vulnerability/d1218c69-4f6a-4b2d-a537-5cc16a46ba7b -https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/ -https://wpscan.com/vulnerability/d16a0c3d-4318-4ecd-9e65-fc4165af8808 -https://wpscan.com/vulnerability/d1784446-b3da-4175-9dac-20b030f19984 -https://wpscan.com/vulnerability/d1885641-9547-4dd5-84be-ba4a160ee1f5 -https://wpscan.com/vulnerability/d18892c6-2b19-4037-bc39-5d170adaf3d9 -https://wpscan.com/vulnerability/d18e695b-4d6e-4ff6-a060-312594a0d2bd -https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a -https://wpscan.com/vulnerability/d1b6f438-f737-4b18-89cf-161238a7421b -https://wpscan.com/vulnerability/d1bfdce3-89bd-441f-8ebb-02cf0ff8b6cc -https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95 -https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f -https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f -https://wpscan.com/vulnerability/d1ebd15a-72ab-4ba2-a212-7e2eea0b0fb0 -https://wpscan.com/vulnerability/d2019e59-db6c-4014-8057-0644c9a00665 -https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec -https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3 -https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/ -https://wpscan.com/vulnerability/d268d7a3-82fd-4444-bc0e-27c7cc279b5a -https://wpscan.com/vulnerability/d27bc628-3de1-421e-8a67-150e9d7a96dd -https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c -https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8 -https://wpscan.com/vulnerability/d2cc0ab2-9bfd-4a09-ac31-bd90e6da12db -https://wpscan.com/vulnerability/d2d9a789-edae-4ae1-92af-e6132db7efcd/ -https://wpscan.com/vulnerability/d2f1fd60-5e5e-4e38-9559-ba2d14ae37bf -https://wpscan.com/vulnerability/d32b2136-d923-4f36-bd76-af4578deb23b -https://wpscan.com/vulnerability/d33241cc-17b6-491a-b836-dd9368652316 -https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/ -https://wpscan.com/vulnerability/d34ed713-4cca-4cef-b431-f132f1b10aa6 -https://wpscan.com/vulnerability/d3653976-9e0a-4f2b-87f7-26b5e7a74b9d -https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5 -https://wpscan.com/vulnerability/d3a2af00-719c-4b86-8877-b1d68a589192 -https://wpscan.com/vulnerability/d3bb0eac-1f4e-4191-8f3b-104a5bb54558 -https://wpscan.com/vulnerability/d3c39e17-1dc3-4275-97d8-543ca7226772 -https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e -https://wpscan.com/vulnerability/d3fb4a2b-ed51-4654-b7c1-4b0f59cd1ecf -https://wpscan.com/vulnerability/d40479de-fb04-41b8-9fb0-41b9eefbd8af -https://wpscan.com/vulnerability/d40c7108-bad6-4ed3-8539-35c0f57e62cc -https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42 -https://wpscan.com/vulnerability/d4298960-eaba-4185-a730-3e621d9680e1 -https://wpscan.com/vulnerability/d42eff41-096f-401d-bbfb-dcd6e08faca5 -https://wpscan.com/vulnerability/d42f74dd-520f-40aa-9cf0-3544db9562c7/ -https://wpscan.com/vulnerability/d442acac-4394-45e4-b6bb-adf4a40960fb -https://wpscan.com/vulnerability/d44e9a45-cbdf-46b1-8b48-7d934b617534 -https://wpscan.com/vulnerability/d453b547-41a8-4a6b-8349-8686b7054805 -https://wpscan.com/vulnerability/d45bb744-4a0d-4af0-aa16-71f7e3ea6e00 -https://wpscan.com/vulnerability/d470dd6c-dcac-4a3e-b42a-2489a31aca45 -https://wpscan.com/vulnerability/d483f7ce-cb3f-4fcb-b060-005cec0ea10f/ -https://wpscan.com/vulnerability/d48c6c50-3734-4191-9833-0d9b09b1bd8a -https://wpscan.com/vulnerability/d4980886-da10-4bbc-a84a-fe071ab3b755/ -https://wpscan.com/vulnerability/d4c32a02-810f-43d8-946a-b7e18ac54f55 -https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ -https://wpscan.com/vulnerability/d4daf0e1-8018-448a-964c-427a355e005f -https://wpscan.com/vulnerability/d4edb5f2-aa1b-4e2d-abb4-76c46def6c6e -https://wpscan.com/vulnerability/d4ff63ee-28e6-486e-9aa7-c878b97f707c -https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49 -https://wpscan.com/vulnerability/d51fcd97-e535-42dd-997a-edc2f5f12269 -https://wpscan.com/vulnerability/d5534ff9-c4af-46b7-8852-0f3dfd644855 -https://wpscan.com/vulnerability/d55caa9b-d50f-4c13-bc69-dc475641735f -https://wpscan.com/vulnerability/d57f2fb2-5251-4069-8c9a-a4af269c5e62 -https://wpscan.com/vulnerability/d5891973-37d0-48cb-a5a3-a26c771b3369 -https://wpscan.com/vulnerability/d594c00d-2905-449b-80cd-95965a96cd4b -https://wpscan.com/vulnerability/d59e6eac-3ebf-40e0-800c-8cbef345423f -https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17 -https://wpscan.com/vulnerability/d5b59e9e-85e5-4d26-aebe-64757c8495fa -https://wpscan.com/vulnerability/d5c6f894-6ad1-46f4-bd77-17ad9234cfc3 -https://wpscan.com/vulnerability/d5ce4b8a-9aa5-4df8-b521-c2105990a87e -https://wpscan.com/vulnerability/d5d39138-a216-46cd-9e5f-fc706a2c93da -https://wpscan.com/vulnerability/d5ea8f7f-7d5a-4b2e-a070-a9aef7cac58a -https://wpscan.com/vulnerability/d60634a3-ca39-43be-893b-ff9ba625360f -https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e -https://wpscan.com/vulnerability/d67b0f7a-fdb1-4305-9976-c5f77b0e3b61 -https://wpscan.com/vulnerability/d6846774-1958-4c8d-bb64-af0d8c46e6e7 -https://wpscan.com/vulnerability/d6a9cfaa-d3fa-442e-a9a1-b06588723e39 -https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/ -https://wpscan.com/vulnerability/d6c72d90-e321-47b9-957a-6fea7c944293 -https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c -https://wpscan.com/vulnerability/d6f7faca-dacf-4455-a837-0404803d0f25 -https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/ -https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351 -https://wpscan.com/vulnerability/d718b993-4de5-499c-84c9-69801396f51f -https://wpscan.com/vulnerability/d72164e2-8449-4fb1-aad3-bfa86d645e47 -https://wpscan.com/vulnerability/d72275bd-0c66-4b2a-940d-d5256b5426cc -https://wpscan.com/vulnerability/d7369f1d-d1a0-4576-a676-c70525a6c743 -https://wpscan.com/vulnerability/d742ab35-4e2d-42a8-bebc-b953b2e10e3c -https://wpscan.com/vulnerability/d7618061-a7fa-4da4-9384-be19bc5e8548 -https://wpscan.com/vulnerability/d7685af2-6034-49ea-93ef-4debe72689bc -https://wpscan.com/vulnerability/d770f1fa-7652-465a-833c-b7178146847d -https://wpscan.com/vulnerability/d79d2f6a-257a-4c9e-b971-9837abd4211c -https://wpscan.com/vulnerability/d7a72183-0cd1-45de-b98b-2e295b27e5db -https://wpscan.com/vulnerability/d7b3917a-d11f-4216-9d2c-30771d83a7b4 -https://wpscan.com/vulnerability/d7bdaf2b-cdd9-4aee-b1bb-01728160ff25 -https://wpscan.com/vulnerability/d7ceafae-65ec-4e05-9ed1-59470771bf07 -https://wpscan.com/vulnerability/d7f0805a-61ce-454a-96fb-5ecacd767578 -https://wpscan.com/vulnerability/d7f2c1c1-75b7-4aec-8574-f38d506d064a -https://wpscan.com/vulnerability/d7f89335-630c-47c6-bebf-92f556caa087 -https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/ -https://wpscan.com/vulnerability/d8005cd0-8232-4d43-a4e4-14728eaf1300 -https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/ -https://wpscan.com/vulnerability/d80e725d-356a-4997-a352-33565e291fc8/ -https://wpscan.com/vulnerability/d8182075-7472-48c8-8e9d-94b12ab6fcf6 -https://wpscan.com/vulnerability/d81d0e72-9bb5-47ef-a796-3b305a4b604f -https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431f -https://wpscan.com/vulnerability/d89eff7d-a3e6-4876-aa0e-6d17e206af83 -https://wpscan.com/vulnerability/d8b76875-cf7f-43a9-b88b-d8aefefab131 -https://wpscan.com/vulnerability/d8da539d-0a1b-46ef-b48d-710c59cf68e1/ -https://wpscan.com/vulnerability/d8e63f78-f38a-4f68-96ba-8059d175cea8 -https://wpscan.com/vulnerability/d9125604-2236-435c-a67c-07951a1fc5b1 -https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65b375a/ -https://wpscan.com/vulnerability/d92db61f-341c-4f3f-b962-326194ddbd1e -https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29 -https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653 -https://wpscan.com/vulnerability/d94bb664-261a-4f3f-8cc3-a2db8230895d -https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f -https://wpscan.com/vulnerability/d9586453-cc5c-4d26-bb45-a6370c9427fe -https://wpscan.com/vulnerability/d973dc0f-3cb4-408d-a8b0-01abeb9ef951 -https://wpscan.com/vulnerability/d993c385-c3ad-49a6-b079-3a1b090864c8 -https://wpscan.com/vulnerability/d99ce21f-fbb6-429c-aa3b-19c4a5eb7557 -https://wpscan.com/vulnerability/d9f00bcb-3746-4a9d-a222-4d532e84615f -https://wpscan.com/vulnerability/d9f28255-0026-4c42-9e67-d17b618c2285 -https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35 -https://wpscan.com/vulnerability/d9fc6f5f-efc1-4e23-899b-e9a49330ed13 -https://wpscan.com/vulnerability/da1f0313-2576-490e-a95f-bf12de340610 -https://wpscan.com/vulnerability/da4ab508-a423-4c7f-a1d4-42ec6f989309 -https://wpscan.com/vulnerability/da4d4d87-07b3-4f7d-bcbd-d29968a30b4f/ -https://wpscan.com/vulnerability/da66d54e-dda8-4aa8-8d27-b8b87100bb21 -https://wpscan.com/vulnerability/da87358a-3a72-4cf7-a2af-a266dd9b4290/ -https://wpscan.com/vulnerability/daa4d93a-f8b1-4809-a18e-8ab63a05de5a -https://wpscan.com/vulnerability/daa9b6c1-1ee1-434c-9f88-fd273b7e20bb -https://wpscan.com/vulnerability/daad48df-6a25-493f-9d1d-17b897462576 -https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a -https://wpscan.com/vulnerability/daf12b85-f5ad-4261-ab39-be6840ad3cdc -https://wpscan.com/vulnerability/db0b3275-40df-404e-aa8d-53558f0122d8 -https://wpscan.com/vulnerability/db0b9480-2ff4-423c-a745-68e983ffa12b -https://wpscan.com/vulnerability/db3c3c78-1724-4791-9ab6-ebb2e8a4c8b8 -https://wpscan.com/vulnerability/db3e4336-117c-47f2-9b43-2ca115525297 -https://wpscan.com/vulnerability/db4ba6b0-887e-4ec1-8935-ab21d369b329 -https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b -https://wpscan.com/vulnerability/db5d41fc-bcd3-414f-aa99-54d5537007bc -https://wpscan.com/vulnerability/db7fb815-945a-41c7-8932-834cc646a806 -https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e -https://wpscan.com/vulnerability/db8ace7b-7a44-4620-9fe8-ddf0ad520f5e -https://wpscan.com/vulnerability/dba60216-2753-40b7-8f2b-6caeba684b2e -https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354 -https://wpscan.com/vulnerability/dbac391b-fc48-4e5e-b63a-2b3ddb0d5552 -https://wpscan.com/vulnerability/dbc18c2c-7547-44fc-8a41-c819757e47a7 -https://wpscan.com/vulnerability/dbe2c6ca-d2f1-40a2-83d5-4623c22d4d61 -https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7 -https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39 -https://wpscan.com/vulnerability/dc1507c1-8894-4ab6-b25f-c5e26a425b03 -https://wpscan.com/vulnerability/dc2ce546-9da1-442c-8ee2-cd660634501f -https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/ -https://wpscan.com/vulnerability/dc368484-f2fe-4c76-ba3d-e00e7f633719 -https://wpscan.com/vulnerability/dc3a841d-a95b-462e-be4b-acaa44e77264 -https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8/ -https://wpscan.com/vulnerability/dc5eace4-542f-47e9-b870-a6aae6a38b0f -https://wpscan.com/vulnerability/dc99ac40-646a-4f8e-b2b9-dc55d6d4c55c -https://wpscan.com/vulnerability/dc9a5d36-7453-46a8-a17f-712449d7987d -https://wpscan.com/vulnerability/dcbcf6e7-e5b3-498b-9f5e-7896d309441f -https://wpscan.com/vulnerability/dcbe3334-357a-4744-b50c-309d10cca30d -https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e -https://wpscan.com/vulnerability/dd19189b-de04-44b6-8ac9-0c32399a8976/ -https://wpscan.com/vulnerability/dd22ea1e-49a9-4b06-8dd9-bb224110f98a -https://wpscan.com/vulnerability/dd2b3f22-5e8b-41cf-bcb8-d2e673e1d21e -https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec -https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b -https://wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53 -https://wpscan.com/vulnerability/dd5cc04a-042d-402a-ab7a-96aff3d57478 -https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3 -https://wpscan.com/vulnerability/dda0593e-cd97-454e-a8c8-15d7f690311c -https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d/ -https://wpscan.com/vulnerability/ddb10f2e-73b8-444c-90b2-5c84cdf6de5c -https://wpscan.com/vulnerability/ddb4c95d-bbee-4095-aed6-25f6b8e63011 -https://wpscan.com/vulnerability/ddc9ed69-d942-4fad-bbf4-1be3b86460d9 -https://wpscan.com/vulnerability/ddd37827-f4c1-4806-8846-d06d9fbf23dd -https://wpscan.com/vulnerability/dde0767d-1dff-4261-adbe-1f3fdf2d9aae -https://wpscan.com/vulnerability/dde3c119-dad9-4205-a931-d49bbf3b6b87 -https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04 -https://wpscan.com/vulnerability/de0d7db7-f911-4f5f-97f6-885ca60822d1 -https://wpscan.com/vulnerability/de162a46-1fdb-47b9-9a61-f12a2c655a7d -https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ -https://wpscan.com/vulnerability/de28543b-c110-4a9f-bfe9-febccfba3a96 -https://wpscan.com/vulnerability/de2cdb38-3a9f-448e-b564-a798d1e93481 -https://wpscan.com/vulnerability/de3e1718-c358-4510-b142-32896ffeb03f -https://wpscan.com/vulnerability/de4cff6d-0030-40e6-8221-fef56e12b4de -https://wpscan.com/vulnerability/de51b970-ab13-41a6-a479-a92cd0e70b71 -https://wpscan.com/vulnerability/de69bcd1-b0b1-4b16-9655-776ee57ad90a -https://wpscan.com/vulnerability/dea6077a-81ee-451f-b049-3749a2252c88 -https://wpscan.com/vulnerability/debd8498-5770-4270-9ee1-1503e675ef34/ -https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ -https://wpscan.com/vulnerability/deca3cd3-f7cf-469f-9f7e-3612f7ae514d -https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4 -https://wpscan.com/vulnerability/df12513b-9664-45be-8824-2924bfddf364 -https://wpscan.com/vulnerability/df1c36bb-9861-4272-89c9-ae76e62f687c -https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883 -https://wpscan.com/vulnerability/df74ed76-af9e-47a8-9a4d-c5c57e9e0f91 -https://wpscan.com/vulnerability/df892e99-c0f6-42b8-a834-fc55d1bde130 -https://wpscan.com/vulnerability/df8a6f2c-e075-45d5-9262-b4eb63c9351e -https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ -https://wpscan.com/vulnerability/dfa21dde-a9fc-4a35-9602-c3fde907ca54 -https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89 -https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88 -https://wpscan.com/vulnerability/dfde5436-dd5c-4c70-a9c2-3cb85cc99c0a -https://wpscan.com/vulnerability/dfe5001f-31b9-4de2-a240-f7f5a992ac49/ -https://wpscan.com/vulnerability/e00b2946-15e5-4458-9b13-2e272630a36f -https://wpscan.com/vulnerability/e012f23a-7daf-4ef3-b116-d0e2ed5bd0a3 -https://wpscan.com/vulnerability/e0131980-d2d3-4780-8a68-a81ee8c90b7a -https://wpscan.com/vulnerability/e0182508-23f4-4bdb-a1ef-1d1be38f3ad1 -https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275 -https://wpscan.com/vulnerability/e0402753-3a80-455b-9fab-a7d2a7687193 -https://wpscan.com/vulnerability/e0741e2c-c529-4815-8744-16e01cdb0aed -https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/ -https://wpscan.com/vulnerability/e09754f2-e241-4bf8-8c95-a3fbc0ba7585 -https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3 -https://wpscan.com/vulnerability/e0be384c-3e63-49f6-b2ab-3024dcd88686 -https://wpscan.com/vulnerability/e0ca257e-6e78-4611-a9ad-be43d37cf474 -https://wpscan.com/vulnerability/e0cc6740-866a-4a81-a93d-ff486b79b7f7 -https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035 -https://wpscan.com/vulnerability/e124d1ab-3e02-4ca5-8218-ce635e8bf074 -https://wpscan.com/vulnerability/e1320c2a-818d-4e91-8dc9-ba95a1dc4377 -https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/ -https://wpscan.com/vulnerability/e1693318-900c-47f1-bb77-008b0d33327f -https://wpscan.com/vulnerability/e1724471-26bd-4cb3-a279-51783102ed0c -https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/ -https://wpscan.com/vulnerability/e186fef4-dca0-461f-b539-082c13a68d13 -https://wpscan.com/vulnerability/e1ba5047-0c39-478f-89c7-b0bb638efdff -https://wpscan.com/vulnerability/e1ca9978-a44d-4717-b963-acaf56258fc9 -https://wpscan.com/vulnerability/e1e09f56-89a4-4d6f-907b-3fb2cb825255 -https://wpscan.com/vulnerability/e1fcde2a-91a5-40cb-876b-884f01c80336 -https://wpscan.com/vulnerability/e20292af-939a-4cb1-91e4-5ff6aa0c7fbe -https://wpscan.com/vulnerability/e20b805d-eb11-4702-9803-77de276000ac -https://wpscan.com/vulnerability/e2185887-3e53-4089-aa3f-981c944ee0bb -https://wpscan.com/vulnerability/e23bf712-d891-4df7-99cc-9ef64f19f685 -https://wpscan.com/vulnerability/e247d78a-7243-486c-a017-7471a8dcb800 -https://wpscan.com/vulnerability/e24dac6d-de48-42c1-bdde-4a45fb331376 -https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3 -https://wpscan.com/vulnerability/e2a59481-db45-4b8e-b17a-447303469364 -https://wpscan.com/vulnerability/e2af8c7f-9bd4-4902-8df8-72ffb414fdbf -https://wpscan.com/vulnerability/e2b6dbf5-8709-4a2c-90be-3214ff55ed56 -https://wpscan.com/vulnerability/e2bda716-76dc-4a26-b26a-7a2a764757b0 -https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/ -https://wpscan.com/vulnerability/e2dcc76c-65ac-4cd6-a5c9-6d813b5ac26d -https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/ -https://wpscan.com/vulnerability/e366881c-d21e-4063-a945-95e6b080a373/ -https://wpscan.com/vulnerability/e370b99a-f485-42bd-96a3-60432a15a4e9/ -https://wpscan.com/vulnerability/e3771938-40b5-4e8b-bb5a-847131a2b4a7 -https://wpscan.com/vulnerability/e37f9aa6-e409-4155-b8e4-566c5bce58d6 -https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d -https://wpscan.com/vulnerability/e392fb53-66e9-4c43-9e4f-f4ea7c561551 -https://wpscan.com/vulnerability/e39b59b0-f24f-4de5-a21c-c4de34c3a14f -https://wpscan.com/vulnerability/e39c0171-ed4a-4143-9a31-c407e3555eec -https://wpscan.com/vulnerability/e39fcf30-1e69-4399-854c-4c5b6ccc22a2 -https://wpscan.com/vulnerability/e3b9ee9f-602d-4e9d-810c-e1e3ba604464 -https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870 -https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5 -https://wpscan.com/vulnerability/e3d72e04-9cdf-4b7d-953e-876e26abdfc6 -https://wpscan.com/vulnerability/e3f6576f-08cb-4278-8c79-3ef4d0b85cd9 -https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/ -https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c -https://wpscan.com/vulnerability/e4804850-2ac2-4cec-bc27-07ed191d96da -https://wpscan.com/vulnerability/e507b1b5-1a56-4b2f-b7e7-e22f6da1e32a -https://wpscan.com/vulnerability/e50bcb39-9a01-433f-81b3-fd4018672b85 -https://wpscan.com/vulnerability/e528e3cd-a45c-4bf7-a37a-101f5c257acd/ -https://wpscan.com/vulnerability/e52c18a9-550a-40b1-a413-0e06e5b4aabc -https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1 -https://wpscan.com/vulnerability/e54804c7-68a9-4c4c-94f9-1c3c9b97e8ca -https://wpscan.com/vulnerability/e5549261-66e2-4a5e-8781-bc555b629ccc -https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987 -https://wpscan.com/vulnerability/e5664da4-5b78-4e42-be6b-e0d7b73a85b0 -https://wpscan.com/vulnerability/e56759ae-7530-467a-b9ba-e9a404afb872 -https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9 -https://wpscan.com/vulnerability/e5a6f834-80a4-406b-acae-57ffeec2e689 -https://wpscan.com/vulnerability/e5c06b38-fab8-44af-84dc-df94eb72ce80 -https://wpscan.com/vulnerability/e5c3e145-6738-4d85-8507-43ca1b1d5877/ -https://wpscan.com/vulnerability/e5d95261-a243-493f-be6a-3c15ccb65435 -https://wpscan.com/vulnerability/e5ef74a2-e04a-4a14-bd0e-d6910cd1c4b4 -https://wpscan.com/vulnerability/e6155d9b-f6bb-4607-ad64-1976a8afe907 -https://wpscan.com/vulnerability/e61dd498-5d0e-45ce-b660-a36c576f8d78 -https://wpscan.com/vulnerability/e61fb245-0d7f-42b0-9b96-c17ade8c04c5 -https://wpscan.com/vulnerability/e62fb8db-384f-4384-ad24-e10eb9058ed5 -https://wpscan.com/vulnerability/e643040b-1f3b-4c13-8a20-acfd069dcc4f -https://wpscan.com/vulnerability/e648633e-868b-45b2-870a-308a2f9cb7f5 -https://wpscan.com/vulnerability/e6602369-87f4-4454-8298-89cc69f8375c -https://wpscan.com/vulnerability/e667854f-56f8-4dbe-9573-6652a8aacc2c -https://wpscan.com/vulnerability/e677e51b-0d3f-44a5-9fcd-c159786b9926 -https://wpscan.com/vulnerability/e6cf694d-c4ae-4b91-97c0-a6bdbafc7d60 -https://wpscan.com/vulnerability/e6d8216d-ace4-48ba-afca-74da0dc5abb5 -https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/ -https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1 -https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5 -https://wpscan.com/vulnerability/e709958c-7bce-45d7-9a0a-6e0ed12cd03f -https://wpscan.com/vulnerability/e70f00b7-6251-476e-9297-60af509e6ad9 -https://wpscan.com/vulnerability/e712f83e-b437-4bc6-9511-2b0290ed315d -https://wpscan.com/vulnerability/e72bbe9b-e51d-40ab-820d-404e0cb86ee6 -https://wpscan.com/vulnerability/e72fa040-3ca5-4570-9a3c-c704574b1ca3 -https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/ -https://wpscan.com/vulnerability/e7506906-5c3d-4963-ae24-55f18c3e5081 -https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de -https://wpscan.com/vulnerability/e770ba87-95d2-40c9-89cc-5d7390e9cbb0 -https://wpscan.com/vulnerability/e777784f-5ba0-4966-be27-e0a0cbbfe056 -https://wpscan.com/vulnerability/e77c2493-993d-418d-9629-a1f07b5a2b6f -https://wpscan.com/vulnerability/e7c52af0-b210-4e7d-a5e0-ee0645ddc08c -https://wpscan.com/vulnerability/e7dc0202-6be4-46fc-a451-fb3a25727b51 -https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6 -https://wpscan.com/vulnerability/e8005d4d-41c3-451d-b85a-2626decaa080 -https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb -https://wpscan.com/vulnerability/e854efee-16fc-4379-9e66-d2883e01fb32 -https://wpscan.com/vulnerability/e8550ccd-3898-4e27-aca9-ade89823ff4d -https://wpscan.com/vulnerability/e866a214-a142-43c7-b93d-ff2301a3e432 -https://wpscan.com/vulnerability/e86d456d-7a54-43e8-acf1-0b6a0a8bb41b -https://wpscan.com/vulnerability/e86ff4d5-d549-4c71-b80e-6a9b3bfddbfc -https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e -https://wpscan.com/vulnerability/e88b7a70-ee71-439f-b3c6-0300adb980b0 -https://wpscan.com/vulnerability/e8a4b6ab-47f8-495d-a22c-dcf914dfb58c -https://wpscan.com/vulnerability/e8b5c609-dc67-4dce-b6bb-7d63c0c2a014 -https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf -https://wpscan.com/vulnerability/e8f32e0b-4a89-460b-bb78-7c83ef5e16b4 -https://wpscan.com/vulnerability/e922b788-7da5-43b4-9b05-839c8610252a -https://wpscan.com/vulnerability/e934af78-9dfd-4e14-853d-dc453de6e365 -https://wpscan.com/vulnerability/e93841ef-e113-41d3-9fa1-b21af85bd812 -https://wpscan.com/vulnerability/e94772af-39ac-4743-a556-52351ebda9fe -https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130 -https://wpscan.com/vulnerability/e95f925f-118e-4fa1-8e8f-9dc1bc698f12 -https://wpscan.com/vulnerability/e95ff3c6-283b-4e5e-bea0-1f1375da08da -https://wpscan.com/vulnerability/e972e2c5-0d56-4d2a-81cc-2b0dff750124 -https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 -https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85 -https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc -https://wpscan.com/vulnerability/e9a228dc-d32e-4918-898d-4d7af4662a14 -https://wpscan.com/vulnerability/e9b48b19-14cc-41ad-a029-f7f9ae236e4e -https://wpscan.com/vulnerability/e9b9a594-c960-4692-823e-23fc60cca7e7 -https://wpscan.com/vulnerability/e9c551a3-7482-4421-8197-5886d028776c -https://wpscan.com/vulnerability/e9ccf1fc-1dbf-4a41-bf4a-90af20b286d6 -https://wpscan.com/vulnerability/e9d35e36-1e60-4483-b8b3-5cbf08fcd49e -https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/ -https://wpscan.com/vulnerability/e9dd62fc-bb79-4a6b-b99c-60e40f010d7a -https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b -https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d -https://wpscan.com/vulnerability/ea0180cd-e018-43ea-88b9-fa8e71bf34bf -https://wpscan.com/vulnerability/ea055ed4-324d-4d77-826a-b6f814413eb2 -https://wpscan.com/vulnerability/ea29413b-494e-410e-ae42-42f96284899c -https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/ -https://wpscan.com/vulnerability/ea3b129d-32d8-40e3-b1af-8b92a760db23 -https://wpscan.com/vulnerability/ea438e84-f842-4cb9-b6c0-550cd8187701 -https://wpscan.com/vulnerability/ea6646ac-f71f-4340-965d-fab272da5189 -https://wpscan.com/vulnerability/ea74257a-f6b0-49e9-a81f-53c0eb81b1da -https://wpscan.com/vulnerability/ea806115-14ab-4bc4-a272-2141cb14454a -https://wpscan.com/vulnerability/eaa28832-74c1-4cd5-9b0f-02338e23b418 -https://wpscan.com/vulnerability/eae63103-3de6-4100-8f48-2bcf9a5c91fb -https://wpscan.com/vulnerability/eaeb5706-b19c-4266-b7df-889558ee2614/ -https://wpscan.com/vulnerability/eb21ebc5-265c-4378-b2c6-62f6bc2f69cd -https://wpscan.com/vulnerability/eb383600-0cff-4f24-8127-1fb118f0565a/ -https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9 -https://wpscan.com/vulnerability/eb58f43e-4304-40e7-9e0f-d0d6fe049724 -https://wpscan.com/vulnerability/eb8e2b9d-f153-49c9-862a-5c016934f9ad -https://wpscan.com/vulnerability/eb983d82-b894-41c5-b51f-94d4bba3ba39/ -https://wpscan.com/vulnerability/eb9e202d-04aa-4343-86a2-4aa2edaa7f6b -https://wpscan.com/vulnerability/eba46f7d-e4db-400c-8032-015f21087bbf -https://wpscan.com/vulnerability/ebd6d13c-572e-4861-b7d1-a7a87332ce0d -https://wpscan.com/vulnerability/ebe3e873-1259-43b9-a027-daa4dbd937f3 -https://wpscan.com/vulnerability/ebe7f625-67e1-4df5-a569-20526dd57b24 -https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc -https://wpscan.com/vulnerability/ec092ed9-eb3e-40a7-a878-ab854104e290/ -https://wpscan.com/vulnerability/ec23734a-5ea7-4e46-aba9-3dee4e6dffb6 -https://wpscan.com/vulnerability/ec4b9bf7-71d6-4528-9dd1-cc7779624760 -https://wpscan.com/vulnerability/ec5c331c-fb74-4ccc-a4d4-446c2b4e703a -https://wpscan.com/vulnerability/ec640d47-bb22-478d-9668-1dab72f12f8d -https://wpscan.com/vulnerability/ec70f02b-02a1-4511-949e-68f2d9d37ca8 -https://wpscan.com/vulnerability/ec9292b1-5cbd-4332-bdb6-2351c94f5ac6 -https://wpscan.com/vulnerability/eca6f099-6af0-4f42-aade-ab61dd792629 -https://wpscan.com/vulnerability/eca883d8-9499-4dbd-8fe1-4447fc2ca28a -https://wpscan.com/vulnerability/ecb1e36f-9c6e-4754-8878-03c97194644d/ -https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ -https://wpscan.com/vulnerability/ecc51420-ee50-4e39-a38d-09686f1996f2 -https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835 -https://wpscan.com/vulnerability/eccd017c-e442-46b6-b5e6-aec7bbd5f836/ -https://wpscan.com/vulnerability/ecddb611-de75-41d5-a470-8fc2cf0780a4 -https://wpscan.com/vulnerability/ece049b2-9a21-463d-9e8b-b4ce61919f0c -https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/ -https://wpscan.com/vulnerability/ecf4b707-dea9-42d0-9ade-d788a9f97190 -https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 -https://wpscan.com/vulnerability/ecf6a082-b563-42c4-9d8c-3757aa6b696f -https://wpscan.com/vulnerability/ed099489-1db4-4b42-9f72-77de39c9e01e -https://wpscan.com/vulnerability/ed0c054b-54bf-4df8-9015-c76704c93484 -https://wpscan.com/vulnerability/ed162ccc-88e6-41e8-b24d-1b9f77a038b6 -https://wpscan.com/vulnerability/ed2971c2-b99c-4320-ac46-bea5a0a493ed -https://wpscan.com/vulnerability/ed2dc1b9-f9f9-4e99-87b3-a614c223dd64 -https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0 -https://wpscan.com/vulnerability/ed9d26be-cc96-4274-a05b-0b7ad9d8cfd9 -https://wpscan.com/vulnerability/eda64678-81ae-4be3-941e-a1e26e54029b -https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2 -https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171 -https://wpscan.com/vulnerability/ee312f22-ca58-451d-a1cb-3f78a6e5ecaf -https://wpscan.com/vulnerability/ee3832e2-ce40-4063-a23e-44c7f7f5f46a -https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079 -https://wpscan.com/vulnerability/ee4f6786-27e4-474c-85e0-715b0c0f2776 -https://wpscan.com/vulnerability/eeb41d7b-8f9e-4a12-b65f-f310f08e4ace -https://wpscan.com/vulnerability/eec0f29f-a985-4285-8eed-d1855d204a20 -https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139 -https://wpscan.com/vulnerability/eed70659-9e3e-42a2-b427-56c52e0fbc0d -https://wpscan.com/vulnerability/eeedbb3b-ae10-4472-a1d3-f196f95b9d96 -https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9 -https://wpscan.com/vulnerability/ef3c1d4f-53a4-439e-9434-b3b4adb687a4 -https://wpscan.com/vulnerability/ef5aa8a7-23a7-4ce0-bb09-d9c986386114 -https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a -https://wpscan.com/vulnerability/ef8029e0-9282-401a-a77d-10b6656adaa6 -https://wpscan.com/vulnerability/ef9ae513-6c29-45c2-b5ae-4a06a217c499 -https://wpscan.com/vulnerability/efa7d91a-447b-4fd8-aa21-5364b177fee9 -https://wpscan.com/vulnerability/efb1ddef-2123-416c-a932-856d41ed836d -https://wpscan.com/vulnerability/efca27e0-bdb6-4497-8330-081f909d6933 -https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f -https://wpscan.com/vulnerability/f00b82f7-d8ad-4f6b-b791-81cc16b6336b -https://wpscan.com/vulnerability/f050aedc-f79f-4b27-acac-0cdb33b25af8 -https://wpscan.com/vulnerability/f06629b5-8b15-48eb-a7a7-78b693e06b71 -https://wpscan.com/vulnerability/f0915b66-0b99-4aeb-9fba-759cafaeb0cb -https://wpscan.com/vulnerability/f0a9e6cc-46cc-4ac2-927a-c006b8e8aa68 -https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d -https://wpscan.com/vulnerability/f0bef96f-dfe2-4988-adf8-e1bd493c5242 -https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86 -https://wpscan.com/vulnerability/f1244c57-d886-4a6e-8cdb-18404e8c153c -https://wpscan.com/vulnerability/f140a928-d297-4bd1-8552-bfebcedba536 -https://wpscan.com/vulnerability/f15f2f2c-2053-4b93-8064-15b5243a4021 -https://wpscan.com/vulnerability/f169567d-c682-4abe-94df-a9d00be90edd -https://wpscan.com/vulnerability/f17ccbaa-2fcd-4f17-a4da-73f2bc8a4fe9 -https://wpscan.com/vulnerability/f1af4267-3a43-4b88-a8b9-c1d5b2aa9d68 -https://wpscan.com/vulnerability/f1b67f40-642f-451e-a67a-b7487918ee34 -https://wpscan.com/vulnerability/f1eb05e8-1b7c-45b1-912d-f668bd68e265 -https://wpscan.com/vulnerability/f250226f-4a05-4d75-93c4-5444a4ce919e -https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4 -https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0 -https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad -https://wpscan.com/vulnerability/f296de1c-b70b-4829-aba7-4afa24f64c51/ -https://wpscan.com/vulnerability/f29f68a5-6575-441d-98c9-867145f2b082 -https://wpscan.com/vulnerability/f2a59eaa-6b44-4098-912f-823289cf33b0 -https://wpscan.com/vulnerability/f2a922ac-6bc9-4caa-b1cc-9ca9cff4bd51 -https://wpscan.com/vulnerability/f34096ec-b1b0-471d-88a4-4699178a3165 -https://wpscan.com/vulnerability/f3459868-28aa-4a5d-94d8-bbc17e3ce653 -https://wpscan.com/vulnerability/f35b7c8f-cfb6-42b6-8a3a-8c07cd1e9da0 -https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 -https://wpscan.com/vulnerability/f360f383-0646-44ca-b49e-e2258dfbf3a6 -https://wpscan.com/vulnerability/f37d1d55-10cc-4202-8d16-9ec2128f54f9 -https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3 -https://wpscan.com/vulnerability/f3a1dcad-528a-4ecc-ac8e-728caa7c9878 -https://wpscan.com/vulnerability/f3b450d2-84ce-4c13-ad6a-b60785dee7e7 -https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164 -https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87 -https://wpscan.com/vulnerability/f4047f1e-d5ea-425f-8def-76dd5e6a497e/ -https://wpscan.com/vulnerability/f4197386-975d-4e53-8fc9-9425732da9af -https://wpscan.com/vulnerability/f426360e-5ba0-4d6b-bfd4-61bc54be3469 -https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610 -https://wpscan.com/vulnerability/f434afd3-7de4-4bf4-a9bb-9f9aeaae1dc5 -https://wpscan.com/vulnerability/f440edd8-94fe-440a-8a5b-e3d24dcfcbc1 -https://wpscan.com/vulnerability/f472ec7d-765c-4266-ab9c-e2d06703ebb4 -https://wpscan.com/vulnerability/f4a7937c-6f4b-49dd-b88a-67ebe718ad19 -https://wpscan.com/vulnerability/f4b2617f-5235-4587-9eaf-d0f6bb23dc27 -https://wpscan.com/vulnerability/f4e4b4a2-c7cb-42ce-9d5b-bd84efcbf54d -https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530 -https://wpscan.com/vulnerability/f4fcf41b-c05d-4236-8e67-a52d0f94c80a -https://wpscan.com/vulnerability/f51a350c-c46d-4d52-b787-762283625d0b -https://wpscan.com/vulnerability/f51d8345-3927-4be2-8145-e201371c8c43 -https://wpscan.com/vulnerability/f5687d0e-98ca-4449-98d6-7170c97c8f54 -https://wpscan.com/vulnerability/f56f7244-e8ec-4a87-9419-643bc13b45a0 -https://wpscan.com/vulnerability/f57615d9-a567-4c2a-9f06-2c6b61f56074 -https://wpscan.com/vulnerability/f5b17c68-c2b0-4d0d-bb7b-19dc30511a89 -https://wpscan.com/vulnerability/f5d43062-4ef3-4dd1-b916-0127f0016f5c -https://wpscan.com/vulnerability/f5ea6c8a-6b07-4263-a1be-dd033f078d49 -https://wpscan.com/vulnerability/f601e637-a486-4f3a-9077-4f294ace7ea1 -https://wpscan.com/vulnerability/f6091d7b-97b5-42f2-b2f4-09a0fe6d5a21 -https://wpscan.com/vulnerability/f6627a35-d158-495e-9d56-69405cfca221/ -https://wpscan.com/vulnerability/f689442a-a851-4140-a10c-ac579f9da142 -https://wpscan.com/vulnerability/f6d3408c-2ceb-4a89-822b-13f5272a5fce -https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251 -https://wpscan.com/vulnerability/f6e165d9-2193-4c76-ae2d-618a739fe4fb -https://wpscan.com/vulnerability/f730f584-2370-49f9-a094-a5bc521671c1 -https://wpscan.com/vulnerability/f74dfc52-46ba-41e3-994b-23115a22984f -https://wpscan.com/vulnerability/f7988a18-ba9d-4ead-82c8-30ea8223846f -https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3 -https://wpscan.com/vulnerability/f7a20bea-c3d5-431b-bdcf-e189c81a561a -https://wpscan.com/vulnerability/f7af0795-f111-4acc-9b1e-63cae5862f8b -https://wpscan.com/vulnerability/f7b95789-43f2-42a5-95e6-eb7accbd5ed3 -https://wpscan.com/vulnerability/f80ef09a-d3e2-4d62-8532-f0ebe59ae110 -https://wpscan.com/vulnerability/f81d9340-cf7e-46c4-b669-e61f2559cb8c -https://wpscan.com/vulnerability/f8405e06-9cf3-4acb-aebb-e80fb402daa9 -https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 -https://wpscan.com/vulnerability/f85b6033-d7c1-45b7-b3b0-8967f7373bb8 -https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e -https://wpscan.com/vulnerability/f85d8b61-eaeb-433c-b857-06ee4db5c7d5/ -https://wpscan.com/vulnerability/f8a29aee-19cd-4e62-b829-afc9107f69bd -https://wpscan.com/vulnerability/f8f84d47-49aa-4258-a8a6-3de8e7342623 -https://wpscan.com/vulnerability/f8fdff8a-f158-46e8-94f1-f051a6c5608b -https://wpscan.com/vulnerability/f903aadd-17af-4ddf-8635-abb3338ac815 -https://wpscan.com/vulnerability/f90c528b-8c3a-4f9a-aa36-099c24abe082 -https://wpscan.com/vulnerability/f915e5ac-e216-4d1c-aec1-c3be11e2a6de -https://wpscan.com/vulnerability/f922695a-b803-4edf-aadc-80c79d99bebb -https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6 -https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049 -https://wpscan.com/vulnerability/f94e91ef-1773-476c-9945-37e89ceefd3f -https://wpscan.com/vulnerability/f95c3a48-5228-4047-9b92-de985741d157 -https://wpscan.com/vulnerability/f9911a43-0f4c-403f-9fca-7822eb693317 -https://wpscan.com/vulnerability/f9ae34a9-84c9-4d48-af6a-9e6c786f856e -https://wpscan.com/vulnerability/f9f8ae7e-6621-4e29-9257-b8306dbe8811 -https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85 -https://wpscan.com/vulnerability/fa23bd68-69f3-440e-902c-a3bb6c8a40b8 -https://wpscan.com/vulnerability/fa34beff-c8ab-4297-9c59-b3b0c52f0536 -https://wpscan.com/vulnerability/fa38f3e6-e04c-467c-969b-0f6736087589 -https://wpscan.com/vulnerability/fa44ed44-9dac-4b4f-aaa3-503b76034578 -https://wpscan.com/vulnerability/fa4eea26-0611-4fa8-a947-f78ddf46a56a/ -https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 -https://wpscan.com/vulnerability/fa7e2b64-ca48-4b76-a2c2-f5e31e42eab7 -https://wpscan.com/vulnerability/fa8ccdd0-7b23-4b12-9aa9-4b29d47256b8 -https://wpscan.com/vulnerability/faaeb685-ea02-4a5a-ac5f-87081efe94e0 -https://wpscan.com/vulnerability/fad16c68-9f14-4866-b241-40468fb71494 -https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 -https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/ -https://wpscan.com/vulnerability/fafbf666-b908-48ef-9041-fea653e9bfeb -https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e -https://wpscan.com/vulnerability/fb007191-b008-4d19-b896-55fbee2a3cf7 -https://wpscan.com/vulnerability/fb0097a0-5d7b-4e5b-97de-aacafa8fffcd -https://wpscan.com/vulnerability/fb42980c-93e5-42d5-a478-c2b348eaea67 -https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe -https://wpscan.com/vulnerability/fb6c407c-713c-4e83-92ce-4e5f791be696 -https://wpscan.com/vulnerability/fb6ce636-9e0d-4c5c-bb95-dde1d2581245 -https://wpscan.com/vulnerability/fb8791f5-2879-431e-9afc-06d5839e4b9d -https://wpscan.com/vulnerability/fb9dbcdf-4ffd-484d-9b67-283683d050fd -https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 -https://wpscan.com/vulnerability/fbc56973-4225-4f44-8c38-d488e57cd551 -https://wpscan.com/vulnerability/fbc71710-123f-4c61-9796-a6a4fd354828 -https://wpscan.com/vulnerability/fbdefab4-614b-493b-a9ae-c5aeff8323ef/ -https://wpscan.com/vulnerability/fbe4aed8-964a-4774-bbc3-d432792bfeb6 -https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d -https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea -https://wpscan.com/vulnerability/fc011990-4ec1-4553-901d-4ff1f482cb79 -https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/ -https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65 -https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0 -https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/ -https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6 -https://wpscan.com/vulnerability/fc3beca7-af38-4ab2-b05f-13b47d042b85/ -https://wpscan.com/vulnerability/fc4cf749-34ef-43b8-a529-5065d698ab81 -https://wpscan.com/vulnerability/fc719d12-2f58-4d1f-b696-0f937e706842 -https://wpscan.com/vulnerability/fcf17278-609f-4f75-8a87-9b4579dee1c8 -https://wpscan.com/vulnerability/fd312bfd-7c98-4682-877d-846442e9c6a2 -https://wpscan.com/vulnerability/fd416d99-1970-418f-81f5-8438490d4479 -https://wpscan.com/vulnerability/fd4352ad-dae0-4404-94d1-11083cb1f44d -https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8 -https://wpscan.com/vulnerability/fd5271ef-1da5-4d09-888e-f1fd71820cde -https://wpscan.com/vulnerability/fd53e40a-516b-47b9-b495-321774432367/ -https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b -https://wpscan.com/vulnerability/fd6ce00b-8c5f-4180-b648-f47b37303670 -https://wpscan.com/vulnerability/fd6ef6ee-15e9-44ac-a2db-976393a3b71a -https://wpscan.com/vulnerability/fd7aaf06-4be7-48d6-83a1-cd5cd6c3d9c2 -https://wpscan.com/vulnerability/fd84dc08-0079-4fcf-81c3-a61d652e3269 -https://wpscan.com/vulnerability/fd8b84b4-6944-4638-bdc1-1cb6aaabd42c -https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4 -https://wpscan.com/vulnerability/fd9853e8-b3ae-4a10-8389-8a4a11a8297c -https://wpscan.com/vulnerability/fdaba4d1-950d-4512-95de-cd43fe9e73e5/ -https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0 -https://wpscan.com/vulnerability/fdbeb137-b404-46c7-85fb-394a3bdac388 -https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af -https://wpscan.com/vulnerability/fdd79bb4-d434-4635-bb2b-84d079ecc746 -https://wpscan.com/vulnerability/fddc5a1c-f267-4ef4-8acf-731dbecac450 -https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99 -https://wpscan.com/vulnerability/fe2c02bf-207c-43da-98bd-4c85d235de8b -https://wpscan.com/vulnerability/fe2f1d52-8421-4b46-b829-6953a0472dcb -https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815 -https://wpscan.com/vulnerability/fe49f48a-f97a-44fe-8d71-be08e7ce4f83 -https://wpscan.com/vulnerability/fe60ea83-b584-465a-8128-b7358d8da3af -https://wpscan.com/vulnerability/fe8c001e-8880-4570-b010-a41fc8ee0c58/ -https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5 -https://wpscan.com/vulnerability/feb4580d-df15-45c8-b59e-ad406e4b064c -https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665 -https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a -https://wpscan.com/vulnerability/fee8652d-cd50-4cb0-b94d-2d124f56af1a -https://wpscan.com/vulnerability/fefc1411-594d-465b-aeb9-78c141b23762 -https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/ -https://wpscan.com/vulnerability/ff5fd894-aff3-400a-8eec-fad9d50f788e -https://wpscan.com/vulnerability/ffa1f718-f2c5-48ef-8eea-33a18a628a2c -https://wpscan.com/vulnerability/ffbdb8a1-19c3-45e9-81b0-ad47a0791c4a -https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/ -https://wpscan.com/vulnerability/ffff8c83-0a59-450a-9b40-c7f3af7205fc -https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/ -https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -https://write-up.github.io/webtitan/ -https://writeups.ayyappan.me/v/tor-iot-mqtt/ -https://wshenk.blogspot.com/2021/01/xss-in-wing-ftps-web-interface-cve-2020.html -https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf -https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html -https://www.0xhuesca.com/2019/11/cve-2019-18655.html -https://www.0xlanks.me/blog/cve-2022-28921-advisory/ -https://www.1e.com/vulnerability-disclosure-policy/ -https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html -https://www.7elements.co.uk/resources/technical-advisories/cve-2015-2342-vmware-vcenter-remote-code-execution/ -https://www.7elements.co.uk/resources/technical-advisories/ipswitch-ws_ftp-professional-local-buffer-overflow-seh-overwrite/ -https://www.7elements.co.uk/resources/technical-advisories/pyrobatchftp-buffer-overflow-seh-overwrite/ -https://www.7elements.co.uk/resources/technical-advisories/webmin-1-840-1-880-unrestricted-access-arbitrary-files-using-local-file-include/ -https://www.abinitio.com/en/security-advisories/ab-2021-001/ -https://www.acronis.com/en-us/blog/posts/backdoor-wide-open-critical-vulnerabilities-uncovered-geovision -https://www.aisec.fraunhofer.de/en/FirmwareProtection.html -https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms -https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 -https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04 -https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html -https://www.akitasecurity.nl/advisory.php?id=AK20090601 -https://www.alexbilz.com/post/2022-05-14-cve-2021-41965/ -https://www.ambionics.io/blog/hacking-watchguard-firewalls -https://www.ambionics.io/blog/typo3-news-module-sqli -https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable -https://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html -https://www.andmp.com/2019/04/unpatched-vulnerability-in-xiaomi-miui-os-lock-screen.html -https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html -https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 -https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044 -https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/ -https://www.aveva.com/en/support-and-success/cyber-security-updates/ -https://www.aveva.com/en/support/cyber-security-updates/ -https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf -https://www.ayrx.me/cryptonote-unauthenticated-json-rpc -https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#ledonoff-command-injection -https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection -https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#sysinit-password-reset -https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#tr069-command-injection -https://www.bankinfosecurity.com/exclusive-aussie-firm-loses-5m-to-backdoored-cryptocurrency-a-11057 -https://www.bbraun.com/productsecurity -https://www.bbraunusa.com/productsecurity -https://www.bencteux.fr/posts/malwarebytes_wfc/ -https://www.bencteux.fr/posts/synaman/ -https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ -https://www.binarly.io/advisories/BRLY-2022-016 -https://www.binarly.io/advisories/BRLY-2022-027 -https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639 -https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams -https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack -https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf -https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf -https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf -https://www.blackhat.com/us-13/archives.html#Butterworth -https://www.blackhat.com/us-13/briefings.html#Prado -https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets -https://www.blackhat.com/us-17/briefings.html#friday-the-13th-json-attacks -https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ -https://www.brokenbrowser.com/detecting-apps-mimetype-malware/ -https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032 -https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/ -https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach -https://www.chtsecurity.com/news/0a4743a5-491e-4685-95ee-df8316ab5284 -https://www.chtsecurity.com/news/0dbe8e1d-0a6c-4604-9cf1-778ddc86a8c1 -https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7 -https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20 -https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ -https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf -https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-05 -https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05 -https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01 -https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 -https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 -https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04 -https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 -https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02 -https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01 -https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03 -https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 -https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01 -https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04 -https://www.cnblogs.com/L0g4n-blog/p/16695155.html -https://www.cnblogs.com/L0g4n-blog/p/16704071.html -https://www.cnblogs.com/Rainy-Day/p/18061399 -https://www.cnblogs.com/echod/articles/10380909.html -https://www.cnblogs.com/tr3e/p/9662324.html -https://www.coalfire.com/The-Coalfire-Blog/August-2019/Getting-more-from-a-compliance-test -https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665 -https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-002_totemo_json_hijacking.txt -https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt -https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt -https://www.compass-security.com/fileadmin/Research/Advisories/2021-09_CSNC-2020-010-codebeamer_ALM_Insecure-RememberMe.txt -https://www.compass-security.com/fileadmin/Research/Advisories/2021-18_CSNC-2021-018-WPMailster_XSS_CSRF.txt -https://www.corelan.be/index.php/2014/05/22/on-cve-2014-1770-zdi-14-140-internet-explorer-8-0day/ -https://www.coresecurity.com/advisories/airlink101-skyipcam1620w-os-command-injection -https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection -https://www.coresecurity.com/advisories/android-wifi-direct-denial-service -https://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities -https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities -https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities -https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality -https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities -https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities -https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities -https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow -https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities -https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities -https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities -https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities -https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities -https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities -https://www.coresecurity.com/advisories/sap-sapcar-heap-based-buffer-overflow-vulnerability -https://www.coresecurity.com/advisories/softnas-cloud-os-command-injection -https://www.coresecurity.com/advisories/tp-link-IP-cameras-multiple-vulnerabilities -https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities -https://www.coresecurity.com/advisories/tp-link-ip-cameras-multiple-vulnerabilities -https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities -https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities -https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities -https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities -https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities -https://www.coresecurity.com/advisories/viper-rgb-driver-multiple-vulnerabilities -https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities -https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities -https://www.coresecurity.com/advisories/zulip-account-takeover-stored-xss -https://www.coresecurity.com/content/SAP-netweaver-msg-srv-multiple-vulnerabilities -https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities -https://www.coresecurity.com/core-labs/advisories/msi-ambient-link-multiple-vulnerabilities -https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities -https://www.coresecurity.com/core-labs/advisories/parallels-ras-os-command-execution -https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities -https://www.coresecurity.com/core-labs/advisories/unified-office-total-connect-sql-injection -https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/ -https://www.crn.com/news/managed-services/solarwinds-rmm-tool-has-open-zero-day-exploit-huntress-labs -https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html -https://www.cryptnetix.com/blog/2023/01/19/Polycom-Trio-Vulnerability-Disclosure.html -https://www.ctrlu.net/vuln/0006.html -https://www.cubeyond.net/blog/my-cves/eza-cve-report -https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html -https://www.curesec.com/blog/article/blog/Plone-XSS-186.html -https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652 -https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25653 -https://www.cyberark.com/resources/threat-research-blog/attacking-kubernetes-clusters-through-your-network-plumbing-part-2 -https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 -https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities -https://www.cyberark.com/resources/threat-research-blog/lorawan-mqtt-what-to-know-when-securing-your-iot-network -https://www.cyberdetails.org/2021/11/mumara-classic-293-sql-injection.html -https://www.cyberiskvision.com/advisory/ -https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 -https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 -https://www.cybersecurity-help.cz/vdb/SB2019041819 -https://www.cybersecurity-help.cz/vdb/SB2020101404 -https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html -https://www.cyderes.com/blog/cve-2023-37798-stored-cross-site-scripting-in-vanderbilt-redcap/ -https://www.cygenta.co.uk/post/buddyboss -https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html -https://www.cymaera.com/articles/everything.html -https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt -https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt -https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt -https://www.cynops.de/techzone/http_over_x509.html -https://www.dark-sec.net/2019/12/supermicro-ipmi-exploitation.html -https://www.datack.my/fallingskies-cloudpanel-0-day/ -https://www.ddosi.org/fastjson-poc/ -https://www.deepcode.ca/index.php/2020/04/07/cve-2020-xss-in-clink-office-v2/ -https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf -https://www.descope.com/blog/post/noauth -https://www.detack.de/en/cve-2019-12731 -https://www.detack.de/en/cve-2019-6265-6266 -https://www.detack.de/en/cve-2019-9005 -https://www.detack.de/en/cve-2021-33923 -https://www.detack.de/en/cve-2021-33924 -https://www.dionach.com/blog/codeigniter-session-decoding-vulnerability -https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued -https://www.dovecot.org/list/dovecot/2019-February/114575.html -https://www.drive-byte.de/en/blog/liveconfig-advisory-cve-2024-22851 -https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 -https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 -https://www.edoardoottavianelli.it/CVE-2022-41392/ -https://www.edoardoottavianelli.it/CVE-2022-44019/ -https://www.edoardoottavianelli.it/CVE-2023-24279 -https://www.edoardoottavianelli.it/CVE-2023-24769 -https://www.edoardoottavianelli.it/CVE-2023-27069/ -https://www.edoardoottavianelli.it/CVE-2023-27070/ -https://www.edoardoottavianelli.it/CVE-2023-30093/ -https://www.edoardoottavianelli.it/CVE-2023-30094/ -https://www.edoardoottavianelli.it/CVE-2023-30095/ -https://www.edoardoottavianelli.it/CVE-2023-30096/ -https://www.edoardoottavianelli.it/CVE-2023-30097/ -https://www.elastic.co/blog/logstash-1-4-3-released -https://www.elastic.co/community/security -https://www.elastic.co/community/security/ -https://www.elttam.com.au/blog/goahead/ -https://www.elttam.com/blog/fuzereview/#content -https://www.elttam.com/blog/pwnassistant/ -https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf -https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ -https://www.esecforte.com/cve-2023-27150-cross-site-scripting-xss/ -https://www.esecforte.com/cve-2023-27151-html-injection-activity-tracker/ -https://www.esecforte.com/cve-2023-27152-opnsense-brute-force/ -https://www.esecforte.com/cve-2023-29973-no-rate-limit/ -https://www.esecforte.com/cve-2023-29974-weak-password-policy/ -https://www.esecforte.com/cve-2023-29975-unverified-password-changed/ -https://www.esecforte.com/cve-2023-40809-html-injection-search/ -https://www.esecforte.com/cve-2023-40810-html-injection-product-creation/ -https://www.esecforte.com/cve-2023-40812-html-injection-accounts-group/ -https://www.esecforte.com/cve-2023-40813-html-injection-saved-search/ -https://www.esecforte.com/cve-2023-40814-html-injection-accounts/ -https://www.esecforte.com/cve-2023-40815-html-injection-category/ -https://www.esecforte.com/cve-2023-40816-html-injection-activity-milestone/ -https://www.esecforte.com/cve-2023-40817-html-injection-product-configuration/ -https://www.esecforte.com/endpoint-protector-india-cososys-dlp/ -https://www.esecforte.com/login-page-brute-force-attack/ -https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-15510-manageengine-desktopcentral-v-10-vulnerable-to-html-injection/ -https://www.esecforte.com/server-side-request-forgery-india-ssrf-rvd-manage-engine/ -https://www.espressif.com/en/news/Espressif_Security_Advisory_Concerning_Fault_Injection_and_Secure_Boot -https://www.espressif.com/en/news/Security_Advisory_Concerning_Fault_Injection_and_eFuse_Protections -https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update -https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-e21-03-server-sql/ -https://www.esri.com/arcgis-blog/products/product/uncategorized/portal-for-arcgis-quick-capture-security-patch-is-now-available -https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/ -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt -https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt -https://www.exploit-db.com/ -https://www.exploit-db.com/author/?a=8844 -https://www.exploit-db.com/docs/47397 -https://www.exploit-db.com/docs/47790 -https://www.exploit-db.com/docs/48175 -https://www.exploit-db.com/docs/50436 -https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf -https://www.exploit-db.com/download/47655 -https://www.exploit-db.com/exploits/1013 -https://www.exploit-db.com/exploits/10183 -https://www.exploit-db.com/exploits/10374 -https://www.exploit-db.com/exploits/107/ -https://www.exploit-db.com/exploits/1106 -https://www.exploit-db.com/exploits/115 -https://www.exploit-db.com/exploits/11650 -https://www.exploit-db.com/exploits/1324 -https://www.exploit-db.com/exploits/1328 -https://www.exploit-db.com/exploits/133 -https://www.exploit-db.com/exploits/1375 -https://www.exploit-db.com/exploits/1398 -https://www.exploit-db.com/exploits/1401 -https://www.exploit-db.com/exploits/1411 -https://www.exploit-db.com/exploits/14146 -https://www.exploit-db.com/exploits/1466 -https://www.exploit-db.com/exploits/1489 -https://www.exploit-db.com/exploits/14941 -https://www.exploit-db.com/exploits/15014 -https://www.exploit-db.com/exploits/15016 -https://www.exploit-db.com/exploits/1512 -https://www.exploit-db.com/exploits/1513 -https://www.exploit-db.com/exploits/1516 -https://www.exploit-db.com/exploits/15206/ -https://www.exploit-db.com/exploits/1525 -https://www.exploit-db.com/exploits/1526 -https://www.exploit-db.com/exploits/1530 -https://www.exploit-db.com/exploits/1533 -https://www.exploit-db.com/exploits/1539 -https://www.exploit-db.com/exploits/1543 -https://www.exploit-db.com/exploits/15445 -https://www.exploit-db.com/exploits/1547 -https://www.exploit-db.com/exploits/1552 -https://www.exploit-db.com/exploits/1556 -https://www.exploit-db.com/exploits/1561 -https://www.exploit-db.com/exploits/1562 -https://www.exploit-db.com/exploits/1566 -https://www.exploit-db.com/exploits/1570 -https://www.exploit-db.com/exploits/1581 -https://www.exploit-db.com/exploits/1582 -https://www.exploit-db.com/exploits/1585 -https://www.exploit-db.com/exploits/1586 -https://www.exploit-db.com/exploits/1587 -https://www.exploit-db.com/exploits/1591 -https://www.exploit-db.com/exploits/1594 -https://www.exploit-db.com/exploits/1595 -https://www.exploit-db.com/exploits/1597 -https://www.exploit-db.com/exploits/1599 -https://www.exploit-db.com/exploits/1600 -https://www.exploit-db.com/exploits/1601 -https://www.exploit-db.com/exploits/1605 -https://www.exploit-db.com/exploits/1608 -https://www.exploit-db.com/exploits/1609 -https://www.exploit-db.com/exploits/1610 -https://www.exploit-db.com/exploits/1611 -https://www.exploit-db.com/exploits/1615 -https://www.exploit-db.com/exploits/1617 -https://www.exploit-db.com/exploits/16181 -https://www.exploit-db.com/exploits/1623 -https://www.exploit-db.com/exploits/1627 -https://www.exploit-db.com/exploits/1629 -https://www.exploit-db.com/exploits/164 -https://www.exploit-db.com/exploits/1641 -https://www.exploit-db.com/exploits/1642 -https://www.exploit-db.com/exploits/1643 -https://www.exploit-db.com/exploits/1645 -https://www.exploit-db.com/exploits/1646 -https://www.exploit-db.com/exploits/1653 -https://www.exploit-db.com/exploits/1655 -https://www.exploit-db.com/exploits/1657 -https://www.exploit-db.com/exploits/1658 -https://www.exploit-db.com/exploits/1662 -https://www.exploit-db.com/exploits/1663 -https://www.exploit-db.com/exploits/1665 -https://www.exploit-db.com/exploits/1666 -https://www.exploit-db.com/exploits/1669 -https://www.exploit-db.com/exploits/1673 -https://www.exploit-db.com/exploits/1677 -https://www.exploit-db.com/exploits/16770/ -https://www.exploit-db.com/exploits/1679 -https://www.exploit-db.com/exploits/1682 -https://www.exploit-db.com/exploits/1683 -https://www.exploit-db.com/exploits/1686 -https://www.exploit-db.com/exploits/1694 -https://www.exploit-db.com/exploits/1695 -https://www.exploit-db.com/exploits/1699 -https://www.exploit-db.com/exploits/17031 -https://www.exploit-db.com/exploits/17058 -https://www.exploit-db.com/exploits/1711 -https://www.exploit-db.com/exploits/1715 -https://www.exploit-db.com/exploits/1718 -https://www.exploit-db.com/exploits/1722 -https://www.exploit-db.com/exploits/1723 -https://www.exploit-db.com/exploits/1724 -https://www.exploit-db.com/exploits/1725 -https://www.exploit-db.com/exploits/1727 -https://www.exploit-db.com/exploits/1728 -https://www.exploit-db.com/exploits/1729 -https://www.exploit-db.com/exploits/1730 -https://www.exploit-db.com/exploits/1732 -https://www.exploit-db.com/exploits/17354 -https://www.exploit-db.com/exploits/1738 -https://www.exploit-db.com/exploits/1740 -https://www.exploit-db.com/exploits/1749 -https://www.exploit-db.com/exploits/1750 -https://www.exploit-db.com/exploits/1751 -https://www.exploit-db.com/exploits/1752 -https://www.exploit-db.com/exploits/1753 -https://www.exploit-db.com/exploits/1758 -https://www.exploit-db.com/exploits/1759 -https://www.exploit-db.com/exploits/1762 -https://www.exploit-db.com/exploits/1763 -https://www.exploit-db.com/exploits/1764 -https://www.exploit-db.com/exploits/1766 -https://www.exploit-db.com/exploits/1774 -https://www.exploit-db.com/exploits/1775 -https://www.exploit-db.com/exploits/1779 -https://www.exploit-db.com/exploits/1785 -https://www.exploit-db.com/exploits/1789 -https://www.exploit-db.com/exploits/1790 -https://www.exploit-db.com/exploits/17929/ -https://www.exploit-db.com/exploits/1795 -https://www.exploit-db.com/exploits/1800 -https://www.exploit-db.com/exploits/18020 -https://www.exploit-db.com/exploits/1805 -https://www.exploit-db.com/exploits/1806 -https://www.exploit-db.com/exploits/1807 -https://www.exploit-db.com/exploits/1808 -https://www.exploit-db.com/exploits/1809 -https://www.exploit-db.com/exploits/1810 -https://www.exploit-db.com/exploits/1811 -https://www.exploit-db.com/exploits/1812 -https://www.exploit-db.com/exploits/1814 -https://www.exploit-db.com/exploits/1817 -https://www.exploit-db.com/exploits/1818 -https://www.exploit-db.com/exploits/1821 -https://www.exploit-db.com/exploits/1823 -https://www.exploit-db.com/exploits/1824 -https://www.exploit-db.com/exploits/1825 -https://www.exploit-db.com/exploits/1827 -https://www.exploit-db.com/exploits/1828 -https://www.exploit-db.com/exploits/1829 -https://www.exploit-db.com/exploits/1835 -https://www.exploit-db.com/exploits/1848 -https://www.exploit-db.com/exploits/1851 -https://www.exploit-db.com/exploits/1852 -https://www.exploit-db.com/exploits/1854 -https://www.exploit-db.com/exploits/1855 -https://www.exploit-db.com/exploits/1857 -https://www.exploit-db.com/exploits/1858 -https://www.exploit-db.com/exploits/1859 -https://www.exploit-db.com/exploits/1860 -https://www.exploit-db.com/exploits/1861 -https://www.exploit-db.com/exploits/1863 -https://www.exploit-db.com/exploits/1864 -https://www.exploit-db.com/exploits/1865 -https://www.exploit-db.com/exploits/1870 -https://www.exploit-db.com/exploits/1871 -https://www.exploit-db.com/exploits/1872 -https://www.exploit-db.com/exploits/1875 -https://www.exploit-db.com/exploits/1876 -https://www.exploit-db.com/exploits/1877 -https://www.exploit-db.com/exploits/18775 -https://www.exploit-db.com/exploits/1881 -https://www.exploit-db.com/exploits/1883 -https://www.exploit-db.com/exploits/1886 -https://www.exploit-db.com/exploits/1891 -https://www.exploit-db.com/exploits/1895 -https://www.exploit-db.com/exploits/1896 -https://www.exploit-db.com/exploits/1898 -https://www.exploit-db.com/exploits/1899 -https://www.exploit-db.com/exploits/1904 -https://www.exploit-db.com/exploits/1905 -https://www.exploit-db.com/exploits/1908 -https://www.exploit-db.com/exploits/1912 -https://www.exploit-db.com/exploits/1918 -https://www.exploit-db.com/exploits/1921 -https://www.exploit-db.com/exploits/1923 -https://www.exploit-db.com/exploits/1929 -https://www.exploit-db.com/exploits/1931 -https://www.exploit-db.com/exploits/1933 -https://www.exploit-db.com/exploits/1935 -https://www.exploit-db.com/exploits/1936 -https://www.exploit-db.com/exploits/1938 -https://www.exploit-db.com/exploits/19381 -https://www.exploit-db.com/exploits/1939 -https://www.exploit-db.com/exploits/1943 -https://www.exploit-db.com/exploits/1948 -https://www.exploit-db.com/exploits/1951 -https://www.exploit-db.com/exploits/1952 -https://www.exploit-db.com/exploits/1953 -https://www.exploit-db.com/exploits/1955 -https://www.exploit-db.com/exploits/1956 -https://www.exploit-db.com/exploits/1957 -https://www.exploit-db.com/exploits/1959 -https://www.exploit-db.com/exploits/1961 -https://www.exploit-db.com/exploits/1963 -https://www.exploit-db.com/exploits/1964 -https://www.exploit-db.com/exploits/1968 -https://www.exploit-db.com/exploits/1971 -https://www.exploit-db.com/exploits/1972 -https://www.exploit-db.com/exploits/1975 -https://www.exploit-db.com/exploits/1976 -https://www.exploit-db.com/exploits/1977 -https://www.exploit-db.com/exploits/1981 -https://www.exploit-db.com/exploits/1982 -https://www.exploit-db.com/exploits/1983 -https://www.exploit-db.com/exploits/1984 -https://www.exploit-db.com/exploits/1985 -https://www.exploit-db.com/exploits/1992 -https://www.exploit-db.com/exploits/1993 -https://www.exploit-db.com/exploits/1994 -https://www.exploit-db.com/exploits/1995 -https://www.exploit-db.com/exploits/1996 -https://www.exploit-db.com/exploits/2009 -https://www.exploit-db.com/exploits/2010 -https://www.exploit-db.com/exploits/2014 -https://www.exploit-db.com/exploits/2018 -https://www.exploit-db.com/exploits/2019 -https://www.exploit-db.com/exploits/2020 -https://www.exploit-db.com/exploits/2021 -https://www.exploit-db.com/exploits/2023 -https://www.exploit-db.com/exploits/2024 -https://www.exploit-db.com/exploits/2026 -https://www.exploit-db.com/exploits/2027 -https://www.exploit-db.com/exploits/2028 -https://www.exploit-db.com/exploits/2030 -https://www.exploit-db.com/exploits/2032 -https://www.exploit-db.com/exploits/2035 -https://www.exploit-db.com/exploits/2036 -https://www.exploit-db.com/exploits/2039 -https://www.exploit-db.com/exploits/2046 -https://www.exploit-db.com/exploits/2052 -https://www.exploit-db.com/exploits/2054 -https://www.exploit-db.com/exploits/2058 -https://www.exploit-db.com/exploits/2060 -https://www.exploit-db.com/exploits/2062 -https://www.exploit-db.com/exploits/2064 -https://www.exploit-db.com/exploits/2068 -https://www.exploit-db.com/exploits/2071 -https://www.exploit-db.com/exploits/2072 -https://www.exploit-db.com/exploits/2077 -https://www.exploit-db.com/exploits/2078 -https://www.exploit-db.com/exploits/2081 -https://www.exploit-db.com/exploits/2083 -https://www.exploit-db.com/exploits/2084 -https://www.exploit-db.com/exploits/2085 -https://www.exploit-db.com/exploits/2086 -https://www.exploit-db.com/exploits/2087 -https://www.exploit-db.com/exploits/2088 -https://www.exploit-db.com/exploits/2089 -https://www.exploit-db.com/exploits/2090 -https://www.exploit-db.com/exploits/2092 -https://www.exploit-db.com/exploits/2093 -https://www.exploit-db.com/exploits/2094 -https://www.exploit-db.com/exploits/2095 -https://www.exploit-db.com/exploits/2096 -https://www.exploit-db.com/exploits/2097 -https://www.exploit-db.com/exploits/2098 -https://www.exploit-db.com/exploits/2099 -https://www.exploit-db.com/exploits/2100 -https://www.exploit-db.com/exploits/2101 -https://www.exploit-db.com/exploits/2102 -https://www.exploit-db.com/exploits/2103 -https://www.exploit-db.com/exploits/2104 -https://www.exploit-db.com/exploits/2105 -https://www.exploit-db.com/exploits/21052 -https://www.exploit-db.com/exploits/2113 -https://www.exploit-db.com/exploits/2115 -https://www.exploit-db.com/exploits/2116 -https://www.exploit-db.com/exploits/2118 -https://www.exploit-db.com/exploits/2119 -https://www.exploit-db.com/exploits/2120 -https://www.exploit-db.com/exploits/2121 -https://www.exploit-db.com/exploits/2123 -https://www.exploit-db.com/exploits/2124 -https://www.exploit-db.com/exploits/2125 -https://www.exploit-db.com/exploits/2128 -https://www.exploit-db.com/exploits/2129 -https://www.exploit-db.com/exploits/2130 -https://www.exploit-db.com/exploits/2131 -https://www.exploit-db.com/exploits/2134 -https://www.exploit-db.com/exploits/2135 -https://www.exploit-db.com/exploits/2138 -https://www.exploit-db.com/exploits/2141 -https://www.exploit-db.com/exploits/2144 -https://www.exploit-db.com/exploits/2146 -https://www.exploit-db.com/exploits/2147 -https://www.exploit-db.com/exploits/2148 -https://www.exploit-db.com/exploits/2149 -https://www.exploit-db.com/exploits/2150 -https://www.exploit-db.com/exploits/2153 -https://www.exploit-db.com/exploits/2155 -https://www.exploit-db.com/exploits/2156 -https://www.exploit-db.com/exploits/2158 -https://www.exploit-db.com/exploits/2159 -https://www.exploit-db.com/exploits/2164 -https://www.exploit-db.com/exploits/2165 -https://www.exploit-db.com/exploits/2166 -https://www.exploit-db.com/exploits/2168 -https://www.exploit-db.com/exploits/2169 -https://www.exploit-db.com/exploits/2170 -https://www.exploit-db.com/exploits/2171 -https://www.exploit-db.com/exploits/2173 -https://www.exploit-db.com/exploits/21739/ -https://www.exploit-db.com/exploits/2174 -https://www.exploit-db.com/exploits/21741/ -https://www.exploit-db.com/exploits/21742/ -https://www.exploit-db.com/exploits/21744/ -https://www.exploit-db.com/exploits/2175 -https://www.exploit-db.com/exploits/2176 -https://www.exploit-db.com/exploits/2177 -https://www.exploit-db.com/exploits/2178 -https://www.exploit-db.com/exploits/2181 -https://www.exploit-db.com/exploits/2182 -https://www.exploit-db.com/exploits/2183 -https://www.exploit-db.com/exploits/2184 -https://www.exploit-db.com/exploits/2186 -https://www.exploit-db.com/exploits/2188 -https://www.exploit-db.com/exploits/2190 -https://www.exploit-db.com/exploits/2191 -https://www.exploit-db.com/exploits/2192 -https://www.exploit-db.com/exploits/2194 -https://www.exploit-db.com/exploits/2196 -https://www.exploit-db.com/exploits/2199 -https://www.exploit-db.com/exploits/2200 -https://www.exploit-db.com/exploits/2201 -https://www.exploit-db.com/exploits/2202 -https://www.exploit-db.com/exploits/2203 -https://www.exploit-db.com/exploits/2204 -https://www.exploit-db.com/exploits/2207 -https://www.exploit-db.com/exploits/2210 -https://www.exploit-db.com/exploits/2211 -https://www.exploit-db.com/exploits/2213 -https://www.exploit-db.com/exploits/2215 -https://www.exploit-db.com/exploits/2217 -https://www.exploit-db.com/exploits/2218 -https://www.exploit-db.com/exploits/2220 -https://www.exploit-db.com/exploits/2221 -https://www.exploit-db.com/exploits/22216 -https://www.exploit-db.com/exploits/2222 -https://www.exploit-db.com/exploits/2225 -https://www.exploit-db.com/exploits/2226 -https://www.exploit-db.com/exploits/2227 -https://www.exploit-db.com/exploits/2228 -https://www.exploit-db.com/exploits/2229 -https://www.exploit-db.com/exploits/2230 -https://www.exploit-db.com/exploits/2232 -https://www.exploit-db.com/exploits/2233 -https://www.exploit-db.com/exploits/2239 -https://www.exploit-db.com/exploits/2245 -https://www.exploit-db.com/exploits/2246 -https://www.exploit-db.com/exploits/2248 -https://www.exploit-db.com/exploits/2249 -https://www.exploit-db.com/exploits/2250 -https://www.exploit-db.com/exploits/2251 -https://www.exploit-db.com/exploits/2252 -https://www.exploit-db.com/exploits/2253 -https://www.exploit-db.com/exploits/2254 -https://www.exploit-db.com/exploits/2255 -https://www.exploit-db.com/exploits/2257 -https://www.exploit-db.com/exploits/2259 -https://www.exploit-db.com/exploits/2260 -https://www.exploit-db.com/exploits/2262 -https://www.exploit-db.com/exploits/2263 -https://www.exploit-db.com/exploits/2264 -https://www.exploit-db.com/exploits/2269 -https://www.exploit-db.com/exploits/2270 -https://www.exploit-db.com/exploits/2271 -https://www.exploit-db.com/exploits/2272 -https://www.exploit-db.com/exploits/2273 -https://www.exploit-db.com/exploits/2275 -https://www.exploit-db.com/exploits/2279 -https://www.exploit-db.com/exploits/2280 -https://www.exploit-db.com/exploits/2281 -https://www.exploit-db.com/exploits/2282 -https://www.exploit-db.com/exploits/2284 -https://www.exploit-db.com/exploits/2287 -https://www.exploit-db.com/exploits/2288 -https://www.exploit-db.com/exploits/2290 -https://www.exploit-db.com/exploits/2293 -https://www.exploit-db.com/exploits/2294 -https://www.exploit-db.com/exploits/2296 -https://www.exploit-db.com/exploits/2297 -https://www.exploit-db.com/exploits/2300 -https://www.exploit-db.com/exploits/2301 -https://www.exploit-db.com/exploits/2303 -https://www.exploit-db.com/exploits/2304 -https://www.exploit-db.com/exploits/2307 -https://www.exploit-db.com/exploits/2308 -https://www.exploit-db.com/exploits/2309 -https://www.exploit-db.com/exploits/2310 -https://www.exploit-db.com/exploits/2311 -https://www.exploit-db.com/exploits/2312 -https://www.exploit-db.com/exploits/2313 -https://www.exploit-db.com/exploits/2315 -https://www.exploit-db.com/exploits/2316 -https://www.exploit-db.com/exploits/2317 -https://www.exploit-db.com/exploits/2318 -https://www.exploit-db.com/exploits/2319 -https://www.exploit-db.com/exploits/2320 -https://www.exploit-db.com/exploits/2323 -https://www.exploit-db.com/exploits/2327 -https://www.exploit-db.com/exploits/2328 -https://www.exploit-db.com/exploits/2329 -https://www.exploit-db.com/exploits/2333 -https://www.exploit-db.com/exploits/2334 -https://www.exploit-db.com/exploits/2335 -https://www.exploit-db.com/exploits/2336 -https://www.exploit-db.com/exploits/2337 -https://www.exploit-db.com/exploits/2338 -https://www.exploit-db.com/exploits/2339 -https://www.exploit-db.com/exploits/2340 -https://www.exploit-db.com/exploits/2342 -https://www.exploit-db.com/exploits/2343 -https://www.exploit-db.com/exploits/2344 -https://www.exploit-db.com/exploits/2346 -https://www.exploit-db.com/exploits/2349 -https://www.exploit-db.com/exploits/2350 -https://www.exploit-db.com/exploits/2352 -https://www.exploit-db.com/exploits/2353 -https://www.exploit-db.com/exploits/2354 -https://www.exploit-db.com/exploits/2356 -https://www.exploit-db.com/exploits/2357 -https://www.exploit-db.com/exploits/2359 -https://www.exploit-db.com/exploits/2361 -https://www.exploit-db.com/exploits/2362 -https://www.exploit-db.com/exploits/2363 -https://www.exploit-db.com/exploits/2364 -https://www.exploit-db.com/exploits/2367 -https://www.exploit-db.com/exploits/2368 -https://www.exploit-db.com/exploits/2370 -https://www.exploit-db.com/exploits/2371 -https://www.exploit-db.com/exploits/2372 -https://www.exploit-db.com/exploits/2373 -https://www.exploit-db.com/exploits/2374 -https://www.exploit-db.com/exploits/2376 -https://www.exploit-db.com/exploits/2377 -https://www.exploit-db.com/exploits/2378 -https://www.exploit-db.com/exploits/2379 -https://www.exploit-db.com/exploits/2380 -https://www.exploit-db.com/exploits/2381 -https://www.exploit-db.com/exploits/2383 -https://www.exploit-db.com/exploits/2384 -https://www.exploit-db.com/exploits/2385 -https://www.exploit-db.com/exploits/2386 -https://www.exploit-db.com/exploits/2388 -https://www.exploit-db.com/exploits/2389 -https://www.exploit-db.com/exploits/2390 -https://www.exploit-db.com/exploits/2391 -https://www.exploit-db.com/exploits/2392 -https://www.exploit-db.com/exploits/2393 -https://www.exploit-db.com/exploits/2394 -https://www.exploit-db.com/exploits/2395 -https://www.exploit-db.com/exploits/2396 -https://www.exploit-db.com/exploits/2397 -https://www.exploit-db.com/exploits/2398 -https://www.exploit-db.com/exploits/2399 -https://www.exploit-db.com/exploits/2401 -https://www.exploit-db.com/exploits/2402 -https://www.exploit-db.com/exploits/2405 -https://www.exploit-db.com/exploits/2406 -https://www.exploit-db.com/exploits/2407 -https://www.exploit-db.com/exploits/2409 -https://www.exploit-db.com/exploits/2410 -https://www.exploit-db.com/exploits/2411 -https://www.exploit-db.com/exploits/2413 -https://www.exploit-db.com/exploits/2415 -https://www.exploit-db.com/exploits/2416 -https://www.exploit-db.com/exploits/2419 -https://www.exploit-db.com/exploits/2420 -https://www.exploit-db.com/exploits/2422 -https://www.exploit-db.com/exploits/2423 -https://www.exploit-db.com/exploits/2424 -https://www.exploit-db.com/exploits/2427 -https://www.exploit-db.com/exploits/2428 -https://www.exploit-db.com/exploits/2429 -https://www.exploit-db.com/exploits/2430 -https://www.exploit-db.com/exploits/2431 -https://www.exploit-db.com/exploits/2432 -https://www.exploit-db.com/exploits/2433 -https://www.exploit-db.com/exploits/2434 -https://www.exploit-db.com/exploits/2435 -https://www.exploit-db.com/exploits/2436 -https://www.exploit-db.com/exploits/2437 -https://www.exploit-db.com/exploits/2439 -https://www.exploit-db.com/exploits/2440 -https://www.exploit-db.com/exploits/2442 -https://www.exploit-db.com/exploits/2443 -https://www.exploit-db.com/exploits/2445 -https://www.exploit-db.com/exploits/2446 -https://www.exploit-db.com/exploits/2447 -https://www.exploit-db.com/exploits/2450 -https://www.exploit-db.com/exploits/2451 -https://www.exploit-db.com/exploits/2452 -https://www.exploit-db.com/exploits/2454 -https://www.exploit-db.com/exploits/2455 -https://www.exploit-db.com/exploits/2456 -https://www.exploit-db.com/exploits/2459 -https://www.exploit-db.com/exploits/2461 -https://www.exploit-db.com/exploits/2462 -https://www.exploit-db.com/exploits/2465 -https://www.exploit-db.com/exploits/2468 -https://www.exploit-db.com/exploits/2469 -https://www.exploit-db.com/exploits/2470 -https://www.exploit-db.com/exploits/2471 -https://www.exploit-db.com/exploits/2472 -https://www.exploit-db.com/exploits/2473 -https://www.exploit-db.com/exploits/2474/ -https://www.exploit-db.com/exploits/2475/ -https://www.exploit-db.com/exploits/2476/ -https://www.exploit-db.com/exploits/2477/ -https://www.exploit-db.com/exploits/2478 -https://www.exploit-db.com/exploits/2479 -https://www.exploit-db.com/exploits/2480 -https://www.exploit-db.com/exploits/2481 -https://www.exploit-db.com/exploits/2482 -https://www.exploit-db.com/exploits/2483 -https://www.exploit-db.com/exploits/2484 -https://www.exploit-db.com/exploits/2485 -https://www.exploit-db.com/exploits/2487 -https://www.exploit-db.com/exploits/2488 -https://www.exploit-db.com/exploits/2489 -https://www.exploit-db.com/exploits/2490 -https://www.exploit-db.com/exploits/2493 -https://www.exploit-db.com/exploits/2495 -https://www.exploit-db.com/exploits/2496 -https://www.exploit-db.com/exploits/2497 -https://www.exploit-db.com/exploits/2500 -https://www.exploit-db.com/exploits/2501 -https://www.exploit-db.com/exploits/2502 -https://www.exploit-db.com/exploits/2503 -https://www.exploit-db.com/exploits/2504 -https://www.exploit-db.com/exploits/2505 -https://www.exploit-db.com/exploits/2506 -https://www.exploit-db.com/exploits/2507 -https://www.exploit-db.com/exploits/2508 -https://www.exploit-db.com/exploits/2509 -https://www.exploit-db.com/exploits/2510 -https://www.exploit-db.com/exploits/2511 -https://www.exploit-db.com/exploits/2512 -https://www.exploit-db.com/exploits/2514 -https://www.exploit-db.com/exploits/2516 -https://www.exploit-db.com/exploits/2517 -https://www.exploit-db.com/exploits/2518 -https://www.exploit-db.com/exploits/2519 -https://www.exploit-db.com/exploits/2520 -https://www.exploit-db.com/exploits/2521 -https://www.exploit-db.com/exploits/2522 -https://www.exploit-db.com/exploits/2523 -https://www.exploit-db.com/exploits/2525 -https://www.exploit-db.com/exploits/2526 -https://www.exploit-db.com/exploits/2528 -https://www.exploit-db.com/exploits/2529 -https://www.exploit-db.com/exploits/2531 -https://www.exploit-db.com/exploits/2532 -https://www.exploit-db.com/exploits/2533 -https://www.exploit-db.com/exploits/2534 -https://www.exploit-db.com/exploits/2535 -https://www.exploit-db.com/exploits/2536 -https://www.exploit-db.com/exploits/2538 -https://www.exploit-db.com/exploits/2539 -https://www.exploit-db.com/exploits/2540 -https://www.exploit-db.com/exploits/2545 -https://www.exploit-db.com/exploits/2546 -https://www.exploit-db.com/exploits/2547 -https://www.exploit-db.com/exploits/2549 -https://www.exploit-db.com/exploits/2550 -https://www.exploit-db.com/exploits/2551 -https://www.exploit-db.com/exploits/2553 -https://www.exploit-db.com/exploits/2555 -https://www.exploit-db.com/exploits/2556 -https://www.exploit-db.com/exploits/2557 -https://www.exploit-db.com/exploits/2558 -https://www.exploit-db.com/exploits/2559 -https://www.exploit-db.com/exploits/2561 -https://www.exploit-db.com/exploits/2562 -https://www.exploit-db.com/exploits/2563 -https://www.exploit-db.com/exploits/2566 -https://www.exploit-db.com/exploits/2567 -https://www.exploit-db.com/exploits/2568 -https://www.exploit-db.com/exploits/2570 -https://www.exploit-db.com/exploits/2571 -https://www.exploit-db.com/exploits/2572 -https://www.exploit-db.com/exploits/2574 -https://www.exploit-db.com/exploits/2576 -https://www.exploit-db.com/exploits/2577 -https://www.exploit-db.com/exploits/2578 -https://www.exploit-db.com/exploits/2582 -https://www.exploit-db.com/exploits/2583 -https://www.exploit-db.com/exploits/2584 -https://www.exploit-db.com/exploits/2588 -https://www.exploit-db.com/exploits/2589 -https://www.exploit-db.com/exploits/2590 -https://www.exploit-db.com/exploits/2591 -https://www.exploit-db.com/exploits/2593 -https://www.exploit-db.com/exploits/2594 -https://www.exploit-db.com/exploits/2595 -https://www.exploit-db.com/exploits/2596 -https://www.exploit-db.com/exploits/2598 -https://www.exploit-db.com/exploits/2599 -https://www.exploit-db.com/exploits/2600 -https://www.exploit-db.com/exploits/2602 -https://www.exploit-db.com/exploits/2604 -https://www.exploit-db.com/exploits/2605 -https://www.exploit-db.com/exploits/2606 -https://www.exploit-db.com/exploits/2607 -https://www.exploit-db.com/exploits/2608 -https://www.exploit-db.com/exploits/2609 -https://www.exploit-db.com/exploits/2611 -https://www.exploit-db.com/exploits/2612 -https://www.exploit-db.com/exploits/2613 -https://www.exploit-db.com/exploits/2614 -https://www.exploit-db.com/exploits/2616 -https://www.exploit-db.com/exploits/2617 -https://www.exploit-db.com/exploits/2620 -https://www.exploit-db.com/exploits/2621 -https://www.exploit-db.com/exploits/2622 -https://www.exploit-db.com/exploits/2623 -https://www.exploit-db.com/exploits/2624 -https://www.exploit-db.com/exploits/26244 -https://www.exploit-db.com/exploits/2625 -https://www.exploit-db.com/exploits/2626 -https://www.exploit-db.com/exploits/2628 -https://www.exploit-db.com/exploits/2630 -https://www.exploit-db.com/exploits/2631 -https://www.exploit-db.com/exploits/2632 -https://www.exploit-db.com/exploits/26323/ -https://www.exploit-db.com/exploits/2633 -https://www.exploit-db.com/exploits/2634 -https://www.exploit-db.com/exploits/2635 -https://www.exploit-db.com/exploits/2636 -https://www.exploit-db.com/exploits/2637 -https://www.exploit-db.com/exploits/2640 -https://www.exploit-db.com/exploits/2644 -https://www.exploit-db.com/exploits/2645 -https://www.exploit-db.com/exploits/2647 -https://www.exploit-db.com/exploits/2650 -https://www.exploit-db.com/exploits/2651 -https://www.exploit-db.com/exploits/2654 -https://www.exploit-db.com/exploits/2655 -https://www.exploit-db.com/exploits/2656 -https://www.exploit-db.com/exploits/2659 -https://www.exploit-db.com/exploits/2660 -https://www.exploit-db.com/exploits/2661 -https://www.exploit-db.com/exploits/2664 -https://www.exploit-db.com/exploits/2665 -https://www.exploit-db.com/exploits/2666 -https://www.exploit-db.com/exploits/2667 -https://www.exploit-db.com/exploits/2669 -https://www.exploit-db.com/exploits/2670 -https://www.exploit-db.com/exploits/2672 -https://www.exploit-db.com/exploits/2673 -https://www.exploit-db.com/exploits/2674 -https://www.exploit-db.com/exploits/2675 -https://www.exploit-db.com/exploits/2677 -https://www.exploit-db.com/exploits/2678 -https://www.exploit-db.com/exploits/2679 -https://www.exploit-db.com/exploits/2681 -https://www.exploit-db.com/exploits/2683 -https://www.exploit-db.com/exploits/2684 -https://www.exploit-db.com/exploits/2685 -https://www.exploit-db.com/exploits/2686 -https://www.exploit-db.com/exploits/2687 -https://www.exploit-db.com/exploits/2688 -https://www.exploit-db.com/exploits/2690 -https://www.exploit-db.com/exploits/2691 -https://www.exploit-db.com/exploits/2692 -https://www.exploit-db.com/exploits/2694 -https://www.exploit-db.com/exploits/2699 -https://www.exploit-db.com/exploits/2702 -https://www.exploit-db.com/exploits/2703 -https://www.exploit-db.com/exploits/2704 -https://www.exploit-db.com/exploits/27044 -https://www.exploit-db.com/exploits/2706 -https://www.exploit-db.com/exploits/2707 -https://www.exploit-db.com/exploits/2709 -https://www.exploit-db.com/exploits/2711 -https://www.exploit-db.com/exploits/2712 -https://www.exploit-db.com/exploits/2713 -https://www.exploit-db.com/exploits/2715 -https://www.exploit-db.com/exploits/2716 -https://www.exploit-db.com/exploits/2717 -https://www.exploit-db.com/exploits/2718 -https://www.exploit-db.com/exploits/2719 -https://www.exploit-db.com/exploits/2720 -https://www.exploit-db.com/exploits/2721 -https://www.exploit-db.com/exploits/2722 -https://www.exploit-db.com/exploits/2723 -https://www.exploit-db.com/exploits/2724 -https://www.exploit-db.com/exploits/2725 -https://www.exploit-db.com/exploits/2726 -https://www.exploit-db.com/exploits/2727 -https://www.exploit-db.com/exploits/2729 -https://www.exploit-db.com/exploits/2731 -https://www.exploit-db.com/exploits/2732 -https://www.exploit-db.com/exploits/2733 -https://www.exploit-db.com/exploits/2734 -https://www.exploit-db.com/exploits/2736 -https://www.exploit-db.com/exploits/2737 -https://www.exploit-db.com/exploits/2738 -https://www.exploit-db.com/exploits/2739 -https://www.exploit-db.com/exploits/2740 -https://www.exploit-db.com/exploits/2741 -https://www.exploit-db.com/exploits/2742 -https://www.exploit-db.com/exploits/2743 -https://www.exploit-db.com/exploits/2745 -https://www.exploit-db.com/exploits/2746 -https://www.exploit-db.com/exploits/2747 -https://www.exploit-db.com/exploits/2748 -https://www.exploit-db.com/exploits/2750 -https://www.exploit-db.com/exploits/2751 -https://www.exploit-db.com/exploits/2752 -https://www.exploit-db.com/exploits/2754 -https://www.exploit-db.com/exploits/2755 -https://www.exploit-db.com/exploits/2756 -https://www.exploit-db.com/exploits/2757 -https://www.exploit-db.com/exploits/2759 -https://www.exploit-db.com/exploits/2760 -https://www.exploit-db.com/exploits/2761 -https://www.exploit-db.com/exploits/2762 -https://www.exploit-db.com/exploits/2763 -https://www.exploit-db.com/exploits/2764 -https://www.exploit-db.com/exploits/2765 -https://www.exploit-db.com/exploits/2766 -https://www.exploit-db.com/exploits/2767 -https://www.exploit-db.com/exploits/2773 -https://www.exploit-db.com/exploits/2775 -https://www.exploit-db.com/exploits/2777 -https://www.exploit-db.com/exploits/2778 -https://www.exploit-db.com/exploits/2779 -https://www.exploit-db.com/exploits/2780 -https://www.exploit-db.com/exploits/2781 -https://www.exploit-db.com/exploits/2782 -https://www.exploit-db.com/exploits/2785 -https://www.exploit-db.com/exploits/2786 -https://www.exploit-db.com/exploits/27878 -https://www.exploit-db.com/exploits/2790 -https://www.exploit-db.com/exploits/2794 -https://www.exploit-db.com/exploits/2795 -https://www.exploit-db.com/exploits/2797 -https://www.exploit-db.com/exploits/2798 -https://www.exploit-db.com/exploits/2799 -https://www.exploit-db.com/exploits/2807 -https://www.exploit-db.com/exploits/2811 -https://www.exploit-db.com/exploits/2813 -https://www.exploit-db.com/exploits/2814 -https://www.exploit-db.com/exploits/2815 -https://www.exploit-db.com/exploits/2817 -https://www.exploit-db.com/exploits/2818 -https://www.exploit-db.com/exploits/2822 -https://www.exploit-db.com/exploits/2827 -https://www.exploit-db.com/exploits/2828 -https://www.exploit-db.com/exploits/2829 -https://www.exploit-db.com/exploits/2830 -https://www.exploit-db.com/exploits/2831 -https://www.exploit-db.com/exploits/2834 -https://www.exploit-db.com/exploits/2835 -https://www.exploit-db.com/exploits/2836 -https://www.exploit-db.com/exploits/2838 -https://www.exploit-db.com/exploits/2839 -https://www.exploit-db.com/exploits/2840 -https://www.exploit-db.com/exploits/2841 -https://www.exploit-db.com/exploits/2843 -https://www.exploit-db.com/exploits/2846 -https://www.exploit-db.com/exploits/2847 -https://www.exploit-db.com/exploits/2848 -https://www.exploit-db.com/exploits/2849 -https://www.exploit-db.com/exploits/2850 -https://www.exploit-db.com/exploits/2851 -https://www.exploit-db.com/exploits/2852 -https://www.exploit-db.com/exploits/2853 -https://www.exploit-db.com/exploits/2858 -https://www.exploit-db.com/exploits/2860 -https://www.exploit-db.com/exploits/2861 -https://www.exploit-db.com/exploits/2863 -https://www.exploit-db.com/exploits/2868 -https://www.exploit-db.com/exploits/2869 -https://www.exploit-db.com/exploits/2870 -https://www.exploit-db.com/exploits/28713/ -https://www.exploit-db.com/exploits/28718/ -https://www.exploit-db.com/exploits/2872 -https://www.exploit-db.com/exploits/2873 -https://www.exploit-db.com/exploits/28743/ -https://www.exploit-db.com/exploits/28744/ -https://www.exploit-db.com/exploits/28745/ -https://www.exploit-db.com/exploits/28746/ -https://www.exploit-db.com/exploits/28747/ -https://www.exploit-db.com/exploits/28748/ -https://www.exploit-db.com/exploits/28749/ -https://www.exploit-db.com/exploits/2875 -https://www.exploit-db.com/exploits/28750/ -https://www.exploit-db.com/exploits/28752/ -https://www.exploit-db.com/exploits/28753/ -https://www.exploit-db.com/exploits/28754/ -https://www.exploit-db.com/exploits/28755/ -https://www.exploit-db.com/exploits/28756/ -https://www.exploit-db.com/exploits/28757/ -https://www.exploit-db.com/exploits/28758/ -https://www.exploit-db.com/exploits/28759/ -https://www.exploit-db.com/exploits/2879 -https://www.exploit-db.com/exploits/2880 -https://www.exploit-db.com/exploits/2881 -https://www.exploit-db.com/exploits/2883 -https://www.exploit-db.com/exploits/2884 -https://www.exploit-db.com/exploits/2885 -https://www.exploit-db.com/exploits/2886 -https://www.exploit-db.com/exploits/2888 -https://www.exploit-db.com/exploits/2889 -https://www.exploit-db.com/exploits/2891 -https://www.exploit-db.com/exploits/2892 -https://www.exploit-db.com/exploits/2893 -https://www.exploit-db.com/exploits/2894 -https://www.exploit-db.com/exploits/2895 -https://www.exploit-db.com/exploits/2896 -https://www.exploit-db.com/exploits/2897 -https://www.exploit-db.com/exploits/2898 -https://www.exploit-db.com/exploits/2902 -https://www.exploit-db.com/exploits/2903 -https://www.exploit-db.com/exploits/2904 -https://www.exploit-db.com/exploits/2905 -https://www.exploit-db.com/exploits/2906 -https://www.exploit-db.com/exploits/2907 -https://www.exploit-db.com/exploits/2908 -https://www.exploit-db.com/exploits/2909 -https://www.exploit-db.com/exploits/2913 -https://www.exploit-db.com/exploits/2914 -https://www.exploit-db.com/exploits/2915 -https://www.exploit-db.com/exploits/2917 -https://www.exploit-db.com/exploits/2918 -https://www.exploit-db.com/exploits/2919 -https://www.exploit-db.com/exploits/2920 -https://www.exploit-db.com/exploits/2921 -https://www.exploit-db.com/exploits/2923 -https://www.exploit-db.com/exploits/2924 -https://www.exploit-db.com/exploits/2925 -https://www.exploit-db.com/exploits/2926 -https://www.exploit-db.com/exploits/2927 -https://www.exploit-db.com/exploits/2930 -https://www.exploit-db.com/exploits/2931 -https://www.exploit-db.com/exploits/2934 -https://www.exploit-db.com/exploits/2938 -https://www.exploit-db.com/exploits/2939 -https://www.exploit-db.com/exploits/2940 -https://www.exploit-db.com/exploits/2941 -https://www.exploit-db.com/exploits/2942 -https://www.exploit-db.com/exploits/2943 -https://www.exploit-db.com/exploits/2944 -https://www.exploit-db.com/exploits/2945 -https://www.exploit-db.com/exploits/2947 -https://www.exploit-db.com/exploits/2950 -https://www.exploit-db.com/exploits/2952 -https://www.exploit-db.com/exploits/2953 -https://www.exploit-db.com/exploits/2955 -https://www.exploit-db.com/exploits/2956 -https://www.exploit-db.com/exploits/2958 -https://www.exploit-db.com/exploits/2960 -https://www.exploit-db.com/exploits/2963 -https://www.exploit-db.com/exploits/2964 -https://www.exploit-db.com/exploits/2965 -https://www.exploit-db.com/exploits/2966 -https://www.exploit-db.com/exploits/2970 -https://www.exploit-db.com/exploits/2971 -https://www.exploit-db.com/exploits/2972 -https://www.exploit-db.com/exploits/2973 -https://www.exploit-db.com/exploits/2974 -https://www.exploit-db.com/exploits/2975 -https://www.exploit-db.com/exploits/2976 -https://www.exploit-db.com/exploits/2979 -https://www.exploit-db.com/exploits/2980 -https://www.exploit-db.com/exploits/2981 -https://www.exploit-db.com/exploits/2982 -https://www.exploit-db.com/exploits/2983 -https://www.exploit-db.com/exploits/2984 -https://www.exploit-db.com/exploits/2985 -https://www.exploit-db.com/exploits/2986 -https://www.exploit-db.com/exploits/2988 -https://www.exploit-db.com/exploits/2989 -https://www.exploit-db.com/exploits/2990 -https://www.exploit-db.com/exploits/2991 -https://www.exploit-db.com/exploits/2992 -https://www.exploit-db.com/exploits/2993 -https://www.exploit-db.com/exploits/2994 -https://www.exploit-db.com/exploits/2995 -https://www.exploit-db.com/exploits/2996 -https://www.exploit-db.com/exploits/2997 -https://www.exploit-db.com/exploits/2998 -https://www.exploit-db.com/exploits/3000 -https://www.exploit-db.com/exploits/3001 -https://www.exploit-db.com/exploits/3002 -https://www.exploit-db.com/exploits/3003 -https://www.exploit-db.com/exploits/3004 -https://www.exploit-db.com/exploits/3005 -https://www.exploit-db.com/exploits/3007 -https://www.exploit-db.com/exploits/3008 -https://www.exploit-db.com/exploits/3009 -https://www.exploit-db.com/exploits/3010 -https://www.exploit-db.com/exploits/3013 -https://www.exploit-db.com/exploits/3015 -https://www.exploit-db.com/exploits/3016 -https://www.exploit-db.com/exploits/3017 -https://www.exploit-db.com/exploits/3019 -https://www.exploit-db.com/exploits/3020 -https://www.exploit-db.com/exploits/3023 -https://www.exploit-db.com/exploits/3025 -https://www.exploit-db.com/exploits/3026 -https://www.exploit-db.com/exploits/3027 -https://www.exploit-db.com/exploits/3028 -https://www.exploit-db.com/exploits/3029 -https://www.exploit-db.com/exploits/3030 -https://www.exploit-db.com/exploits/3031 -https://www.exploit-db.com/exploits/3032 -https://www.exploit-db.com/exploits/3033 -https://www.exploit-db.com/exploits/3034 -https://www.exploit-db.com/exploits/3035 -https://www.exploit-db.com/exploits/3036 -https://www.exploit-db.com/exploits/3037 -https://www.exploit-db.com/exploits/3038 -https://www.exploit-db.com/exploits/3039 -https://www.exploit-db.com/exploits/3040 -https://www.exploit-db.com/exploits/3041 -https://www.exploit-db.com/exploits/3042 -https://www.exploit-db.com/exploits/3044 -https://www.exploit-db.com/exploits/3046 -https://www.exploit-db.com/exploits/3047 -https://www.exploit-db.com/exploits/3048 -https://www.exploit-db.com/exploits/3049 -https://www.exploit-db.com/exploits/3050 -https://www.exploit-db.com/exploits/3051 -https://www.exploit-db.com/exploits/3053 -https://www.exploit-db.com/exploits/3054 -https://www.exploit-db.com/exploits/3056 -https://www.exploit-db.com/exploits/3057 -https://www.exploit-db.com/exploits/3059 -https://www.exploit-db.com/exploits/3061 -https://www.exploit-db.com/exploits/3062 -https://www.exploit-db.com/exploits/3063 -https://www.exploit-db.com/exploits/30637/ -https://www.exploit-db.com/exploits/30639/ -https://www.exploit-db.com/exploits/3064 -https://www.exploit-db.com/exploits/3066 -https://www.exploit-db.com/exploits/3068 -https://www.exploit-db.com/exploits/3073 -https://www.exploit-db.com/exploits/3074 -https://www.exploit-db.com/exploits/3075 -https://www.exploit-db.com/exploits/3076 -https://www.exploit-db.com/exploits/3078 -https://www.exploit-db.com/exploits/3079 -https://www.exploit-db.com/exploits/3080 -https://www.exploit-db.com/exploits/3081 -https://www.exploit-db.com/exploits/3082 -https://www.exploit-db.com/exploits/3083 -https://www.exploit-db.com/exploits/3085 -https://www.exploit-db.com/exploits/3086 -https://www.exploit-db.com/exploits/3089 -https://www.exploit-db.com/exploits/3090 -https://www.exploit-db.com/exploits/3091 -https://www.exploit-db.com/exploits/3093 -https://www.exploit-db.com/exploits/3096 -https://www.exploit-db.com/exploits/3097 -https://www.exploit-db.com/exploits/3098 -https://www.exploit-db.com/exploits/3100 -https://www.exploit-db.com/exploits/3103 -https://www.exploit-db.com/exploits/3104 -https://www.exploit-db.com/exploits/3105 -https://www.exploit-db.com/exploits/3106 -https://www.exploit-db.com/exploits/3108 -https://www.exploit-db.com/exploits/3109 -https://www.exploit-db.com/exploits/3111 -https://www.exploit-db.com/exploits/3113 -https://www.exploit-db.com/exploits/3114 -https://www.exploit-db.com/exploits/3115 -https://www.exploit-db.com/exploits/3116 -https://www.exploit-db.com/exploits/3117 -https://www.exploit-db.com/exploits/3118 -https://www.exploit-db.com/exploits/3120 -https://www.exploit-db.com/exploits/3121 -https://www.exploit-db.com/exploits/3122 -https://www.exploit-db.com/exploits/3123 -https://www.exploit-db.com/exploits/3124 -https://www.exploit-db.com/exploits/3125 -https://www.exploit-db.com/exploits/3126 -https://www.exploit-db.com/exploits/3128 -https://www.exploit-db.com/exploits/3130 -https://www.exploit-db.com/exploits/3134 -https://www.exploit-db.com/exploits/3135 -https://www.exploit-db.com/exploits/3136 -https://www.exploit-db.com/exploits/3139 -https://www.exploit-db.com/exploits/3141 -https://www.exploit-db.com/exploits/3142 -https://www.exploit-db.com/exploits/31427/ -https://www.exploit-db.com/exploits/3143 -https://www.exploit-db.com/exploits/3144 -https://www.exploit-db.com/exploits/3145 -https://www.exploit-db.com/exploits/3147 -https://www.exploit-db.com/exploits/3149 -https://www.exploit-db.com/exploits/3150 -https://www.exploit-db.com/exploits/3151 -https://www.exploit-db.com/exploits/3152 -https://www.exploit-db.com/exploits/3153 -https://www.exploit-db.com/exploits/3154 -https://www.exploit-db.com/exploits/3155 -https://www.exploit-db.com/exploits/3157 -https://www.exploit-db.com/exploits/3160 -https://www.exploit-db.com/exploits/3161 -https://www.exploit-db.com/exploits/3162 -https://www.exploit-db.com/exploits/3163 -https://www.exploit-db.com/exploits/3164 -https://www.exploit-db.com/exploits/3165 -https://www.exploit-db.com/exploits/3169 -https://www.exploit-db.com/exploits/3171 -https://www.exploit-db.com/exploits/3172 -https://www.exploit-db.com/exploits/3175 -https://www.exploit-db.com/exploits/3180 -https://www.exploit-db.com/exploits/3182 -https://www.exploit-db.com/exploits/3183 -https://www.exploit-db.com/exploits/3184 -https://www.exploit-db.com/exploits/3185 -https://www.exploit-db.com/exploits/3186 -https://www.exploit-db.com/exploits/3187 -https://www.exploit-db.com/exploits/3189 -https://www.exploit-db.com/exploits/3190 -https://www.exploit-db.com/exploits/3191 -https://www.exploit-db.com/exploits/3192 -https://www.exploit-db.com/exploits/3194 -https://www.exploit-db.com/exploits/3195 -https://www.exploit-db.com/exploits/3197 -https://www.exploit-db.com/exploits/3198 -https://www.exploit-db.com/exploits/3200 -https://www.exploit-db.com/exploits/3201 -https://www.exploit-db.com/exploits/3202 -https://www.exploit-db.com/exploits/3205 -https://www.exploit-db.com/exploits/3206 -https://www.exploit-db.com/exploits/3207 -https://www.exploit-db.com/exploits/3208 -https://www.exploit-db.com/exploits/3209 -https://www.exploit-db.com/exploits/3210 -https://www.exploit-db.com/exploits/3212 -https://www.exploit-db.com/exploits/3214 -https://www.exploit-db.com/exploits/3215 -https://www.exploit-db.com/exploits/3216 -https://www.exploit-db.com/exploits/3217 -https://www.exploit-db.com/exploits/3221 -https://www.exploit-db.com/exploits/3222 -https://www.exploit-db.com/exploits/3224 -https://www.exploit-db.com/exploits/3225 -https://www.exploit-db.com/exploits/3226 -https://www.exploit-db.com/exploits/3227 -https://www.exploit-db.com/exploits/3228 -https://www.exploit-db.com/exploits/3229 -https://www.exploit-db.com/exploits/3231 -https://www.exploit-db.com/exploits/3232 -https://www.exploit-db.com/exploits/3233 -https://www.exploit-db.com/exploits/3234 -https://www.exploit-db.com/exploits/3235 -https://www.exploit-db.com/exploits/3236 -https://www.exploit-db.com/exploits/3237 -https://www.exploit-db.com/exploits/3238 -https://www.exploit-db.com/exploits/3239 -https://www.exploit-db.com/exploits/3240 -https://www.exploit-db.com/exploits/3241 -https://www.exploit-db.com/exploits/3242 -https://www.exploit-db.com/exploits/3243 -https://www.exploit-db.com/exploits/3245 -https://www.exploit-db.com/exploits/3246 -https://www.exploit-db.com/exploits/3247 -https://www.exploit-db.com/exploits/3248 -https://www.exploit-db.com/exploits/3249 -https://www.exploit-db.com/exploits/3251 -https://www.exploit-db.com/exploits/3252 -https://www.exploit-db.com/exploits/3254 -https://www.exploit-db.com/exploits/3255 -https://www.exploit-db.com/exploits/3256 -https://www.exploit-db.com/exploits/3257 -https://www.exploit-db.com/exploits/3258 -https://www.exploit-db.com/exploits/3259 -https://www.exploit-db.com/exploits/3261 -https://www.exploit-db.com/exploits/3262 -https://www.exploit-db.com/exploits/3263 -https://www.exploit-db.com/exploits/3266 -https://www.exploit-db.com/exploits/3267 -https://www.exploit-db.com/exploits/3268 -https://www.exploit-db.com/exploits/3270 -https://www.exploit-db.com/exploits/3271 -https://www.exploit-db.com/exploits/3272 -https://www.exploit-db.com/exploits/3275 -https://www.exploit-db.com/exploits/3276 -https://www.exploit-db.com/exploits/3277 -https://www.exploit-db.com/exploits/3278 -https://www.exploit-db.com/exploits/3279 -https://www.exploit-db.com/exploits/3280 -https://www.exploit-db.com/exploits/3281 -https://www.exploit-db.com/exploits/3282 -https://www.exploit-db.com/exploits/3283 -https://www.exploit-db.com/exploits/3284 -https://www.exploit-db.com/exploits/3285 -https://www.exploit-db.com/exploits/3286 -https://www.exploit-db.com/exploits/3287 -https://www.exploit-db.com/exploits/3288 -https://www.exploit-db.com/exploits/3289 -https://www.exploit-db.com/exploits/3290 -https://www.exploit-db.com/exploits/3291 -https://www.exploit-db.com/exploits/3292 -https://www.exploit-db.com/exploits/3294 -https://www.exploit-db.com/exploits/3295 -https://www.exploit-db.com/exploits/3296 -https://www.exploit-db.com/exploits/3297 -https://www.exploit-db.com/exploits/3299 -https://www.exploit-db.com/exploits/3301 -https://www.exploit-db.com/exploits/3302 -https://www.exploit-db.com/exploits/3305 -https://www.exploit-db.com/exploits/3307 -https://www.exploit-db.com/exploits/3309 -https://www.exploit-db.com/exploits/3310 -https://www.exploit-db.com/exploits/3311 -https://www.exploit-db.com/exploits/3314 -https://www.exploit-db.com/exploits/33159/ -https://www.exploit-db.com/exploits/3317 -https://www.exploit-db.com/exploits/3318 -https://www.exploit-db.com/exploits/3321 -https://www.exploit-db.com/exploits/3322 -https://www.exploit-db.com/exploits/3323 -https://www.exploit-db.com/exploits/3324 -https://www.exploit-db.com/exploits/3325 -https://www.exploit-db.com/exploits/3326 -https://www.exploit-db.com/exploits/3327 -https://www.exploit-db.com/exploits/3328 -https://www.exploit-db.com/exploits/3330 -https://www.exploit-db.com/exploits/3331 -https://www.exploit-db.com/exploits/3332 -https://www.exploit-db.com/exploits/3334 -https://www.exploit-db.com/exploits/3336 -https://www.exploit-db.com/exploits/3337 -https://www.exploit-db.com/exploits/3338 -https://www.exploit-db.com/exploits/3339 -https://www.exploit-db.com/exploits/33394 -https://www.exploit-db.com/exploits/3341 -https://www.exploit-db.com/exploits/3342 -https://www.exploit-db.com/exploits/3343 -https://www.exploit-db.com/exploits/3346 -https://www.exploit-db.com/exploits/3347 -https://www.exploit-db.com/exploits/3348 -https://www.exploit-db.com/exploits/3349 -https://www.exploit-db.com/exploits/3350 -https://www.exploit-db.com/exploits/3351 -https://www.exploit-db.com/exploits/3352 -https://www.exploit-db.com/exploits/3353 -https://www.exploit-db.com/exploits/3354 -https://www.exploit-db.com/exploits/3355 -https://www.exploit-db.com/exploits/3356 -https://www.exploit-db.com/exploits/3357 -https://www.exploit-db.com/exploits/3360 -https://www.exploit-db.com/exploits/3361 -https://www.exploit-db.com/exploits/3362 -https://www.exploit-db.com/exploits/3365 -https://www.exploit-db.com/exploits/3366 -https://www.exploit-db.com/exploits/3367 -https://www.exploit-db.com/exploits/3370 -https://www.exploit-db.com/exploits/3371 -https://www.exploit-db.com/exploits/3372 -https://www.exploit-db.com/exploits/3373 -https://www.exploit-db.com/exploits/3374 -https://www.exploit-db.com/exploits/3379 -https://www.exploit-db.com/exploits/3381 -https://www.exploit-db.com/exploits/3382 -https://www.exploit-db.com/exploits/3383 -https://www.exploit-db.com/exploits/3385 -https://www.exploit-db.com/exploits/3387 -https://www.exploit-db.com/exploits/3390 -https://www.exploit-db.com/exploits/3392 -https://www.exploit-db.com/exploits/3395 -https://www.exploit-db.com/exploits/3397 -https://www.exploit-db.com/exploits/3398 -https://www.exploit-db.com/exploits/33983/ -https://www.exploit-db.com/exploits/3403 -https://www.exploit-db.com/exploits/3406 -https://www.exploit-db.com/exploits/3408 -https://www.exploit-db.com/exploits/34089/ -https://www.exploit-db.com/exploits/3409 -https://www.exploit-db.com/exploits/3410 -https://www.exploit-db.com/exploits/3411 -https://www.exploit-db.com/exploits/3413 -https://www.exploit-db.com/exploits/3416 -https://www.exploit-db.com/exploits/3419 -https://www.exploit-db.com/exploits/3421 -https://www.exploit-db.com/exploits/3422 -https://www.exploit-db.com/exploits/3423 -https://www.exploit-db.com/exploits/34238 -https://www.exploit-db.com/exploits/3424 -https://www.exploit-db.com/exploits/3426 -https://www.exploit-db.com/exploits/3427 -https://www.exploit-db.com/exploits/3428 -https://www.exploit-db.com/exploits/3429 -https://www.exploit-db.com/exploits/3431 -https://www.exploit-db.com/exploits/3432 -https://www.exploit-db.com/exploits/3434 -https://www.exploit-db.com/exploits/3435 -https://www.exploit-db.com/exploits/3436 -https://www.exploit-db.com/exploits/3437 -https://www.exploit-db.com/exploits/3438 -https://www.exploit-db.com/exploits/3439 -https://www.exploit-db.com/exploits/3442 -https://www.exploit-db.com/exploits/3443 -https://www.exploit-db.com/exploits/3448 -https://www.exploit-db.com/exploits/3449 -https://www.exploit-db.com/exploits/3455 -https://www.exploit-db.com/exploits/3456 -https://www.exploit-db.com/exploits/3457 -https://www.exploit-db.com/exploits/3458 -https://www.exploit-db.com/exploits/3462 -https://www.exploit-db.com/exploits/3463 -https://www.exploit-db.com/exploits/3464 -https://www.exploit-db.com/exploits/3466 -https://www.exploit-db.com/exploits/3467 -https://www.exploit-db.com/exploits/3468 -https://www.exploit-db.com/exploits/3469 -https://www.exploit-db.com/exploits/3470 -https://www.exploit-db.com/exploits/3471 -https://www.exploit-db.com/exploits/3473 -https://www.exploit-db.com/exploits/3476/ -https://www.exploit-db.com/exploits/3477 -https://www.exploit-db.com/exploits/3478 -https://www.exploit-db.com/exploits/34797/ -https://www.exploit-db.com/exploits/3484 -https://www.exploit-db.com/exploits/3485 -https://www.exploit-db.com/exploits/3486 -https://www.exploit-db.com/exploits/3487 -https://www.exploit-db.com/exploits/34879/ -https://www.exploit-db.com/exploits/3488 -https://www.exploit-db.com/exploits/3489 -https://www.exploit-db.com/exploits/3490 -https://www.exploit-db.com/exploits/3492 -https://www.exploit-db.com/exploits/3494 -https://www.exploit-db.com/exploits/3496 -https://www.exploit-db.com/exploits/3497 -https://www.exploit-db.com/exploits/3498 -https://www.exploit-db.com/exploits/3500 -https://www.exploit-db.com/exploits/3501 -https://www.exploit-db.com/exploits/3502 -https://www.exploit-db.com/exploits/3503 -https://www.exploit-db.com/exploits/3504 -https://www.exploit-db.com/exploits/35057/ -https://www.exploit-db.com/exploits/3506 -https://www.exploit-db.com/exploits/3507 -https://www.exploit-db.com/exploits/3508 -https://www.exploit-db.com/exploits/3509 -https://www.exploit-db.com/exploits/3510 -https://www.exploit-db.com/exploits/3511 -https://www.exploit-db.com/exploits/3512 -https://www.exploit-db.com/exploits/35125 -https://www.exploit-db.com/exploits/3513 -https://www.exploit-db.com/exploits/3514 -https://www.exploit-db.com/exploits/3515 -https://www.exploit-db.com/exploits/3516 -https://www.exploit-db.com/exploits/3517 -https://www.exploit-db.com/exploits/3518 -https://www.exploit-db.com/exploits/3519 -https://www.exploit-db.com/exploits/3520 -https://www.exploit-db.com/exploits/3521 -https://www.exploit-db.com/exploits/3522 -https://www.exploit-db.com/exploits/3523 -https://www.exploit-db.com/exploits/3524 -https://www.exploit-db.com/exploits/3525 -https://www.exploit-db.com/exploits/3527 -https://www.exploit-db.com/exploits/3528 -https://www.exploit-db.com/exploits/3529 -https://www.exploit-db.com/exploits/3530 -https://www.exploit-db.com/exploits/3531 -https://www.exploit-db.com/exploits/3532 -https://www.exploit-db.com/exploits/3533 -https://www.exploit-db.com/exploits/3534 -https://www.exploit-db.com/exploits/3536 -https://www.exploit-db.com/exploits/3537 -https://www.exploit-db.com/exploits/3538 -https://www.exploit-db.com/exploits/35385 -https://www.exploit-db.com/exploits/3539 -https://www.exploit-db.com/exploits/3541 -https://www.exploit-db.com/exploits/3542 -https://www.exploit-db.com/exploits/3543 -https://www.exploit-db.com/exploits/3544 -https://www.exploit-db.com/exploits/3545 -https://www.exploit-db.com/exploits/3546 -https://www.exploit-db.com/exploits/3547 -https://www.exploit-db.com/exploits/3548 -https://www.exploit-db.com/exploits/3549 -https://www.exploit-db.com/exploits/3550 -https://www.exploit-db.com/exploits/3551 -https://www.exploit-db.com/exploits/3552 -https://www.exploit-db.com/exploits/3553 -https://www.exploit-db.com/exploits/3556 -https://www.exploit-db.com/exploits/3557 -https://www.exploit-db.com/exploits/3558 -https://www.exploit-db.com/exploits/3560 -https://www.exploit-db.com/exploits/3562 -https://www.exploit-db.com/exploits/3563 -https://www.exploit-db.com/exploits/3564 -https://www.exploit-db.com/exploits/3565 -https://www.exploit-db.com/exploits/3567 -https://www.exploit-db.com/exploits/3568 -https://www.exploit-db.com/exploits/3573 -https://www.exploit-db.com/exploits/35731/ -https://www.exploit-db.com/exploits/3576 -https://www.exploit-db.com/exploits/3578 -https://www.exploit-db.com/exploits/3580 -https://www.exploit-db.com/exploits/3581 -https://www.exploit-db.com/exploits/3582 -https://www.exploit-db.com/exploits/3583 -https://www.exploit-db.com/exploits/35845/ -https://www.exploit-db.com/exploits/3588 -https://www.exploit-db.com/exploits/3589 -https://www.exploit-db.com/exploits/3590 -https://www.exploit-db.com/exploits/3591 -https://www.exploit-db.com/exploits/35913/ -https://www.exploit-db.com/exploits/3592 -https://www.exploit-db.com/exploits/3593 -https://www.exploit-db.com/exploits/3596 -https://www.exploit-db.com/exploits/3597 -https://www.exploit-db.com/exploits/3598 -https://www.exploit-db.com/exploits/3599 -https://www.exploit-db.com/exploits/3600 -https://www.exploit-db.com/exploits/3601 -https://www.exploit-db.com/exploits/3603 -https://www.exploit-db.com/exploits/3605 -https://www.exploit-db.com/exploits/3607 -https://www.exploit-db.com/exploits/3608 -https://www.exploit-db.com/exploits/3610 -https://www.exploit-db.com/exploits/36112/ -https://www.exploit-db.com/exploits/3612 -https://www.exploit-db.com/exploits/3613 -https://www.exploit-db.com/exploits/3614 -https://www.exploit-db.com/exploits/3618 -https://www.exploit-db.com/exploits/3619 -https://www.exploit-db.com/exploits/3620 -https://www.exploit-db.com/exploits/36202/ -https://www.exploit-db.com/exploits/36203/ -https://www.exploit-db.com/exploits/36204/ -https://www.exploit-db.com/exploits/3621 -https://www.exploit-db.com/exploits/3623 -https://www.exploit-db.com/exploits/36232/ -https://www.exploit-db.com/exploits/3624 -https://www.exploit-db.com/exploits/3625 -https://www.exploit-db.com/exploits/3626 -https://www.exploit-db.com/exploits/36264/ -https://www.exploit-db.com/exploits/3628 -https://www.exploit-db.com/exploits/3629 -https://www.exploit-db.com/exploits/3630 -https://www.exploit-db.com/exploits/36305/ -https://www.exploit-db.com/exploits/36306/ -https://www.exploit-db.com/exploits/3631 -https://www.exploit-db.com/exploits/36310/ -https://www.exploit-db.com/exploits/36311/ -https://www.exploit-db.com/exploits/3632 -https://www.exploit-db.com/exploits/3633 -https://www.exploit-db.com/exploits/36369/ -https://www.exploit-db.com/exploits/36372 -https://www.exploit-db.com/exploits/3638 -https://www.exploit-db.com/exploits/3639 -https://www.exploit-db.com/exploits/36392/ -https://www.exploit-db.com/exploits/3640 -https://www.exploit-db.com/exploits/3641 -https://www.exploit-db.com/exploits/36413/ -https://www.exploit-db.com/exploits/3642 -https://www.exploit-db.com/exploits/36422/ -https://www.exploit-db.com/exploits/36423/ -https://www.exploit-db.com/exploits/36439/ -https://www.exploit-db.com/exploits/3644 -https://www.exploit-db.com/exploits/36441/ -https://www.exploit-db.com/exploits/36442/ -https://www.exploit-db.com/exploits/3645 -https://www.exploit-db.com/exploits/3646 -https://www.exploit-db.com/exploits/36463/ -https://www.exploit-db.com/exploits/36465/ -https://www.exploit-db.com/exploits/36466/ -https://www.exploit-db.com/exploits/3648 -https://www.exploit-db.com/exploits/36490/ -https://www.exploit-db.com/exploits/36505/ -https://www.exploit-db.com/exploits/36506/ -https://www.exploit-db.com/exploits/36517/ -https://www.exploit-db.com/exploits/36520/ -https://www.exploit-db.com/exploits/3653 -https://www.exploit-db.com/exploits/3655 -https://www.exploit-db.com/exploits/3656 -https://www.exploit-db.com/exploits/36561/ -https://www.exploit-db.com/exploits/36564/ -https://www.exploit-db.com/exploits/3657 -https://www.exploit-db.com/exploits/36577/ -https://www.exploit-db.com/exploits/36579/ -https://www.exploit-db.com/exploits/36581/ -https://www.exploit-db.com/exploits/3659 -https://www.exploit-db.com/exploits/3660 -https://www.exploit-db.com/exploits/36602/ -https://www.exploit-db.com/exploits/36607/ -https://www.exploit-db.com/exploits/36609/ -https://www.exploit-db.com/exploits/36613/ -https://www.exploit-db.com/exploits/36614/ -https://www.exploit-db.com/exploits/36615/ -https://www.exploit-db.com/exploits/36619/ -https://www.exploit-db.com/exploits/3663 -https://www.exploit-db.com/exploits/3665 -https://www.exploit-db.com/exploits/3666 -https://www.exploit-db.com/exploits/3667 -https://www.exploit-db.com/exploits/3668 -https://www.exploit-db.com/exploits/3669 -https://www.exploit-db.com/exploits/36692/ -https://www.exploit-db.com/exploits/3670 -https://www.exploit-db.com/exploits/3671 -https://www.exploit-db.com/exploits/3672 -https://www.exploit-db.com/exploits/3673 -https://www.exploit-db.com/exploits/36741/ -https://www.exploit-db.com/exploits/36742/ -https://www.exploit-db.com/exploits/36743/ -https://www.exploit-db.com/exploits/36746/ -https://www.exploit-db.com/exploits/36747/ -https://www.exploit-db.com/exploits/3676 -https://www.exploit-db.com/exploits/3677 -https://www.exploit-db.com/exploits/36773/ -https://www.exploit-db.com/exploits/36776/ -https://www.exploit-db.com/exploits/3678 -https://www.exploit-db.com/exploits/36782/ -https://www.exploit-db.com/exploits/36783/ -https://www.exploit-db.com/exploits/3679 -https://www.exploit-db.com/exploits/36802/ -https://www.exploit-db.com/exploits/36803/ -https://www.exploit-db.com/exploits/36805/ -https://www.exploit-db.com/exploits/36807/ -https://www.exploit-db.com/exploits/36808/ -https://www.exploit-db.com/exploits/36809/ -https://www.exploit-db.com/exploits/3681 -https://www.exploit-db.com/exploits/36811/ -https://www.exploit-db.com/exploits/36813/ -https://www.exploit-db.com/exploits/36814/ -https://www.exploit-db.com/exploits/36815/ -https://www.exploit-db.com/exploits/3682 -https://www.exploit-db.com/exploits/36820/ -https://www.exploit-db.com/exploits/36826/ -https://www.exploit-db.com/exploits/36827/ -https://www.exploit-db.com/exploits/3683 -https://www.exploit-db.com/exploits/36839/ -https://www.exploit-db.com/exploits/36842/ -https://www.exploit-db.com/exploits/36844/ -https://www.exploit-db.com/exploits/3685 -https://www.exploit-db.com/exploits/36859/ -https://www.exploit-db.com/exploits/36860/ -https://www.exploit-db.com/exploits/3687 -https://www.exploit-db.com/exploits/36880/ -https://www.exploit-db.com/exploits/3689 -https://www.exploit-db.com/exploits/3690 -https://www.exploit-db.com/exploits/36906/ -https://www.exploit-db.com/exploits/3691 -https://www.exploit-db.com/exploits/3693 -https://www.exploit-db.com/exploits/3694 -https://www.exploit-db.com/exploits/36940/ -https://www.exploit-db.com/exploits/36942 -https://www.exploit-db.com/exploits/36949/ -https://www.exploit-db.com/exploits/3696 -https://www.exploit-db.com/exploits/36962/ -https://www.exploit-db.com/exploits/36964/ -https://www.exploit-db.com/exploits/3697 -https://www.exploit-db.com/exploits/3700 -https://www.exploit-db.com/exploits/3701 -https://www.exploit-db.com/exploits/3702 -https://www.exploit-db.com/exploits/3703 -https://www.exploit-db.com/exploits/3704 -https://www.exploit-db.com/exploits/37049/ -https://www.exploit-db.com/exploits/3705 -https://www.exploit-db.com/exploits/37052/ -https://www.exploit-db.com/exploits/37053/ -https://www.exploit-db.com/exploits/37054/ -https://www.exploit-db.com/exploits/37056/ -https://www.exploit-db.com/exploits/3706 -https://www.exploit-db.com/exploits/37064/ -https://www.exploit-db.com/exploits/37065/ -https://www.exploit-db.com/exploits/37066/ -https://www.exploit-db.com/exploits/37067/ -https://www.exploit-db.com/exploits/3707 -https://www.exploit-db.com/exploits/37074/ -https://www.exploit-db.com/exploits/37080/ -https://www.exploit-db.com/exploits/37088/ -https://www.exploit-db.com/exploits/37089/ -https://www.exploit-db.com/exploits/37107/ -https://www.exploit-db.com/exploits/37108/ -https://www.exploit-db.com/exploits/37109/ -https://www.exploit-db.com/exploits/37110/ -https://www.exploit-db.com/exploits/37112/ -https://www.exploit-db.com/exploits/37114/ -https://www.exploit-db.com/exploits/3712 -https://www.exploit-db.com/exploits/3713 -https://www.exploit-db.com/exploits/37132/ -https://www.exploit-db.com/exploits/3714 -https://www.exploit-db.com/exploits/3716 -https://www.exploit-db.com/exploits/37169/ -https://www.exploit-db.com/exploits/3717 -https://www.exploit-db.com/exploits/37170/ -https://www.exploit-db.com/exploits/37171/ -https://www.exploit-db.com/exploits/37172/ -https://www.exploit-db.com/exploits/3718 -https://www.exploit-db.com/exploits/37200/ -https://www.exploit-db.com/exploits/3722 -https://www.exploit-db.com/exploits/37248/ -https://www.exploit-db.com/exploits/37249/ -https://www.exploit-db.com/exploits/37250/ -https://www.exploit-db.com/exploits/37252 -https://www.exploit-db.com/exploits/37253/ -https://www.exploit-db.com/exploits/37257/ -https://www.exploit-db.com/exploits/37259/ -https://www.exploit-db.com/exploits/37261/ -https://www.exploit-db.com/exploits/37264/ -https://www.exploit-db.com/exploits/37266/ -https://www.exploit-db.com/exploits/3727 -https://www.exploit-db.com/exploits/37271/ -https://www.exploit-db.com/exploits/37272/ -https://www.exploit-db.com/exploits/37274/ -https://www.exploit-db.com/exploits/3729 -https://www.exploit-db.com/exploits/37290/ -https://www.exploit-db.com/exploits/37292/ -https://www.exploit-db.com/exploits/37296/ -https://www.exploit-db.com/exploits/37301/ -https://www.exploit-db.com/exploits/3731 -https://www.exploit-db.com/exploits/3732 -https://www.exploit-db.com/exploits/37322/ -https://www.exploit-db.com/exploits/37325/ -https://www.exploit-db.com/exploits/3733 -https://www.exploit-db.com/exploits/37336/ -https://www.exploit-db.com/exploits/3734 -https://www.exploit-db.com/exploits/3735 -https://www.exploit-db.com/exploits/3736 -https://www.exploit-db.com/exploits/37360/ -https://www.exploit-db.com/exploits/37363/ -https://www.exploit-db.com/exploits/37367/ -https://www.exploit-db.com/exploits/37369/ -https://www.exploit-db.com/exploits/3738 -https://www.exploit-db.com/exploits/37387/ -https://www.exploit-db.com/exploits/37388/ -https://www.exploit-db.com/exploits/37389/ -https://www.exploit-db.com/exploits/3739 -https://www.exploit-db.com/exploits/37394/ -https://www.exploit-db.com/exploits/37395/ -https://www.exploit-db.com/exploits/3741 -https://www.exploit-db.com/exploits/3742 -https://www.exploit-db.com/exploits/37423/ -https://www.exploit-db.com/exploits/37426/ -https://www.exploit-db.com/exploits/37428/ -https://www.exploit-db.com/exploits/37439/ -https://www.exploit-db.com/exploits/3744 -https://www.exploit-db.com/exploits/37447/ -https://www.exploit-db.com/exploits/37449/ -https://www.exploit-db.com/exploits/3745 -https://www.exploit-db.com/exploits/3747 -https://www.exploit-db.com/exploits/3748 -https://www.exploit-db.com/exploits/3749 -https://www.exploit-db.com/exploits/37494 -https://www.exploit-db.com/exploits/3750 -https://www.exploit-db.com/exploits/3751 -https://www.exploit-db.com/exploits/3752 -https://www.exploit-db.com/exploits/37527/ -https://www.exploit-db.com/exploits/3753 -https://www.exploit-db.com/exploits/37532/ -https://www.exploit-db.com/exploits/37533/ -https://www.exploit-db.com/exploits/37534/ -https://www.exploit-db.com/exploits/37536/ -https://www.exploit-db.com/exploits/3754 -https://www.exploit-db.com/exploits/37552 -https://www.exploit-db.com/exploits/3756 -https://www.exploit-db.com/exploits/3757 -https://www.exploit-db.com/exploits/3758 -https://www.exploit-db.com/exploits/3759 -https://www.exploit-db.com/exploits/37592/ -https://www.exploit-db.com/exploits/37594/ -https://www.exploit-db.com/exploits/37596/ -https://www.exploit-db.com/exploits/37597/ -https://www.exploit-db.com/exploits/37599/ -https://www.exploit-db.com/exploits/3760 -https://www.exploit-db.com/exploits/37600/ -https://www.exploit-db.com/exploits/37604/ -https://www.exploit-db.com/exploits/3761 -https://www.exploit-db.com/exploits/37610/ -https://www.exploit-db.com/exploits/3762 -https://www.exploit-db.com/exploits/37623/ -https://www.exploit-db.com/exploits/3763 -https://www.exploit-db.com/exploits/3764 -https://www.exploit-db.com/exploits/3765 -https://www.exploit-db.com/exploits/37657/ -https://www.exploit-db.com/exploits/37659 -https://www.exploit-db.com/exploits/3766 -https://www.exploit-db.com/exploits/37663/ -https://www.exploit-db.com/exploits/37666/ -https://www.exploit-db.com/exploits/37667/ -https://www.exploit-db.com/exploits/37668/ -https://www.exploit-db.com/exploits/3767 -https://www.exploit-db.com/exploits/37672 -https://www.exploit-db.com/exploits/3768 -https://www.exploit-db.com/exploits/37686/ -https://www.exploit-db.com/exploits/3769 -https://www.exploit-db.com/exploits/3770 -https://www.exploit-db.com/exploits/37707/ -https://www.exploit-db.com/exploits/37708/ -https://www.exploit-db.com/exploits/3771 -https://www.exploit-db.com/exploits/37710/ -https://www.exploit-db.com/exploits/3772 -https://www.exploit-db.com/exploits/37721/ -https://www.exploit-db.com/exploits/37722/ -https://www.exploit-db.com/exploits/37723/ -https://www.exploit-db.com/exploits/3773 -https://www.exploit-db.com/exploits/37732/ -https://www.exploit-db.com/exploits/37738/ -https://www.exploit-db.com/exploits/37739/ -https://www.exploit-db.com/exploits/3774 -https://www.exploit-db.com/exploits/3775 -https://www.exploit-db.com/exploits/37755/ -https://www.exploit-db.com/exploits/3776 -https://www.exploit-db.com/exploits/37764/ -https://www.exploit-db.com/exploits/37765/ -https://www.exploit-db.com/exploits/37766/ -https://www.exploit-db.com/exploits/37768/ -https://www.exploit-db.com/exploits/3777 -https://www.exploit-db.com/exploits/37772/ -https://www.exploit-db.com/exploits/3778 -https://www.exploit-db.com/exploits/3779 -https://www.exploit-db.com/exploits/3780 -https://www.exploit-db.com/exploits/37800/ -https://www.exploit-db.com/exploits/3781 -https://www.exploit-db.com/exploits/37812/ -https://www.exploit-db.com/exploits/37816/ -https://www.exploit-db.com/exploits/37824/ -https://www.exploit-db.com/exploits/3783 -https://www.exploit-db.com/exploits/37839/ -https://www.exploit-db.com/exploits/3784 -https://www.exploit-db.com/exploits/37840/ -https://www.exploit-db.com/exploits/37841/ -https://www.exploit-db.com/exploits/37842/ -https://www.exploit-db.com/exploits/37843/ -https://www.exploit-db.com/exploits/37844/ -https://www.exploit-db.com/exploits/37845/ -https://www.exploit-db.com/exploits/37846/ -https://www.exploit-db.com/exploits/37847/ -https://www.exploit-db.com/exploits/37848/ -https://www.exploit-db.com/exploits/37849/ -https://www.exploit-db.com/exploits/3785 -https://www.exploit-db.com/exploits/37850/ -https://www.exploit-db.com/exploits/37851/ -https://www.exploit-db.com/exploits/37852/ -https://www.exploit-db.com/exploits/37853/ -https://www.exploit-db.com/exploits/37854/ -https://www.exploit-db.com/exploits/37855/ -https://www.exploit-db.com/exploits/37856/ -https://www.exploit-db.com/exploits/37857/ -https://www.exploit-db.com/exploits/37858/ -https://www.exploit-db.com/exploits/37859/ -https://www.exploit-db.com/exploits/3786 -https://www.exploit-db.com/exploits/37861/ -https://www.exploit-db.com/exploits/37862/ -https://www.exploit-db.com/exploits/37888/ -https://www.exploit-db.com/exploits/37907/ -https://www.exploit-db.com/exploits/37908/ -https://www.exploit-db.com/exploits/3791 -https://www.exploit-db.com/exploits/37910/ -https://www.exploit-db.com/exploits/37911/ -https://www.exploit-db.com/exploits/37912/ -https://www.exploit-db.com/exploits/37913/ -https://www.exploit-db.com/exploits/37914/ -https://www.exploit-db.com/exploits/37915/ -https://www.exploit-db.com/exploits/37916/ -https://www.exploit-db.com/exploits/37917/ -https://www.exploit-db.com/exploits/37918/ -https://www.exploit-db.com/exploits/37919/ -https://www.exploit-db.com/exploits/3792 -https://www.exploit-db.com/exploits/37920/ -https://www.exploit-db.com/exploits/37921/ -https://www.exploit-db.com/exploits/37922/ -https://www.exploit-db.com/exploits/37923/ -https://www.exploit-db.com/exploits/37924/ -https://www.exploit-db.com/exploits/37925/ -https://www.exploit-db.com/exploits/37928/ -https://www.exploit-db.com/exploits/37929/ -https://www.exploit-db.com/exploits/3793 -https://www.exploit-db.com/exploits/37931/ -https://www.exploit-db.com/exploits/37932/ -https://www.exploit-db.com/exploits/37933/ -https://www.exploit-db.com/exploits/3794 -https://www.exploit-db.com/exploits/37944 -https://www.exploit-db.com/exploits/3795 -https://www.exploit-db.com/exploits/37955/ -https://www.exploit-db.com/exploits/37958/ -https://www.exploit-db.com/exploits/3796 -https://www.exploit-db.com/exploits/37966/ -https://www.exploit-db.com/exploits/37967/ -https://www.exploit-db.com/exploits/3797 -https://www.exploit-db.com/exploits/3798 -https://www.exploit-db.com/exploits/37989/ -https://www.exploit-db.com/exploits/3799 -https://www.exploit-db.com/exploits/37990/ -https://www.exploit-db.com/exploits/3800 -https://www.exploit-db.com/exploits/38000/ -https://www.exploit-db.com/exploits/3802 -https://www.exploit-db.com/exploits/3803 -https://www.exploit-db.com/exploits/38030/ -https://www.exploit-db.com/exploits/38034/ -https://www.exploit-db.com/exploits/38035/ -https://www.exploit-db.com/exploits/38036/ -https://www.exploit-db.com/exploits/3805 -https://www.exploit-db.com/exploits/38051/ -https://www.exploit-db.com/exploits/38054/ -https://www.exploit-db.com/exploits/38074/ -https://www.exploit-db.com/exploits/38086/ -https://www.exploit-db.com/exploits/3809 -https://www.exploit-db.com/exploits/38096/ -https://www.exploit-db.com/exploits/38108/ -https://www.exploit-db.com/exploits/3811 -https://www.exploit-db.com/exploits/38118/ -https://www.exploit-db.com/exploits/38119/ -https://www.exploit-db.com/exploits/3812 -https://www.exploit-db.com/exploits/38124/ -https://www.exploit-db.com/exploits/3813 -https://www.exploit-db.com/exploits/38136/ -https://www.exploit-db.com/exploits/38137/ -https://www.exploit-db.com/exploits/38138/ -https://www.exploit-db.com/exploits/3814 -https://www.exploit-db.com/exploits/38151/ -https://www.exploit-db.com/exploits/38153 -https://www.exploit-db.com/exploits/3816 -https://www.exploit-db.com/exploits/3817 -https://www.exploit-db.com/exploits/38173/ -https://www.exploit-db.com/exploits/3818 -https://www.exploit-db.com/exploits/38187/ -https://www.exploit-db.com/exploits/3819 -https://www.exploit-db.com/exploits/38190/ -https://www.exploit-db.com/exploits/38191/ -https://www.exploit-db.com/exploits/38192/ -https://www.exploit-db.com/exploits/38195/ -https://www.exploit-db.com/exploits/38196/ -https://www.exploit-db.com/exploits/38198/ -https://www.exploit-db.com/exploits/38199/ -https://www.exploit-db.com/exploits/38200/ -https://www.exploit-db.com/exploits/38201/ -https://www.exploit-db.com/exploits/38202/ -https://www.exploit-db.com/exploits/38213/ -https://www.exploit-db.com/exploits/38214/ -https://www.exploit-db.com/exploits/38215/ -https://www.exploit-db.com/exploits/38216/ -https://www.exploit-db.com/exploits/38217/ -https://www.exploit-db.com/exploits/38221/ -https://www.exploit-db.com/exploits/38222/ -https://www.exploit-db.com/exploits/38225/ -https://www.exploit-db.com/exploits/38226/ -https://www.exploit-db.com/exploits/3823 -https://www.exploit-db.com/exploits/3824 -https://www.exploit-db.com/exploits/3825 -https://www.exploit-db.com/exploits/38252/ -https://www.exploit-db.com/exploits/38254/ -https://www.exploit-db.com/exploits/38256/ -https://www.exploit-db.com/exploits/3826 -https://www.exploit-db.com/exploits/38260/ -https://www.exploit-db.com/exploits/38261/ -https://www.exploit-db.com/exploits/38262/ -https://www.exploit-db.com/exploits/38263/ -https://www.exploit-db.com/exploits/38264/ -https://www.exploit-db.com/exploits/38265/ -https://www.exploit-db.com/exploits/38266/ -https://www.exploit-db.com/exploits/38267/ -https://www.exploit-db.com/exploits/38268/ -https://www.exploit-db.com/exploits/38269/ -https://www.exploit-db.com/exploits/3827 -https://www.exploit-db.com/exploits/38270/ -https://www.exploit-db.com/exploits/38271/ -https://www.exploit-db.com/exploits/38272/ -https://www.exploit-db.com/exploits/38273/ -https://www.exploit-db.com/exploits/38274/ -https://www.exploit-db.com/exploits/38275/ -https://www.exploit-db.com/exploits/38276/ -https://www.exploit-db.com/exploits/38277/ -https://www.exploit-db.com/exploits/38278/ -https://www.exploit-db.com/exploits/38279/ -https://www.exploit-db.com/exploits/3828 -https://www.exploit-db.com/exploits/38280/ -https://www.exploit-db.com/exploits/38289/ -https://www.exploit-db.com/exploits/38292/ -https://www.exploit-db.com/exploits/3830 -https://www.exploit-db.com/exploits/38303/ -https://www.exploit-db.com/exploits/3831 -https://www.exploit-db.com/exploits/3832 -https://www.exploit-db.com/exploits/38321/ -https://www.exploit-db.com/exploits/38323/ -https://www.exploit-db.com/exploits/3833 -https://www.exploit-db.com/exploits/38340/ -https://www.exploit-db.com/exploits/38341/ -https://www.exploit-db.com/exploits/38344/ -https://www.exploit-db.com/exploits/38345/ -https://www.exploit-db.com/exploits/38346/ -https://www.exploit-db.com/exploits/38348/ -https://www.exploit-db.com/exploits/3835 -https://www.exploit-db.com/exploits/38351/ -https://www.exploit-db.com/exploits/38352/ -https://www.exploit-db.com/exploits/38353/ -https://www.exploit-db.com/exploits/38369/ -https://www.exploit-db.com/exploits/3837 -https://www.exploit-db.com/exploits/38371/ -https://www.exploit-db.com/exploits/3838 -https://www.exploit-db.com/exploits/38383/ -https://www.exploit-db.com/exploits/3839 -https://www.exploit-db.com/exploits/3840 -https://www.exploit-db.com/exploits/38403/ -https://www.exploit-db.com/exploits/38411/ -https://www.exploit-db.com/exploits/3842 -https://www.exploit-db.com/exploits/38424/ -https://www.exploit-db.com/exploits/3843 -https://www.exploit-db.com/exploits/38447/ -https://www.exploit-db.com/exploits/38453/ -https://www.exploit-db.com/exploits/38454/ -https://www.exploit-db.com/exploits/38455/ -https://www.exploit-db.com/exploits/3846 -https://www.exploit-db.com/exploits/3847 -https://www.exploit-db.com/exploits/38474/ -https://www.exploit-db.com/exploits/3848 -https://www.exploit-db.com/exploits/38488/ -https://www.exploit-db.com/exploits/3849 -https://www.exploit-db.com/exploits/38490/ -https://www.exploit-db.com/exploits/3850 -https://www.exploit-db.com/exploits/38500/ -https://www.exploit-db.com/exploits/38512/ -https://www.exploit-db.com/exploits/3852 -https://www.exploit-db.com/exploits/38527/ -https://www.exploit-db.com/exploits/38528/ -https://www.exploit-db.com/exploits/3853 -https://www.exploit-db.com/exploits/38535/ -https://www.exploit-db.com/exploits/3854 -https://www.exploit-db.com/exploits/38540/ -https://www.exploit-db.com/exploits/38551/ -https://www.exploit-db.com/exploits/38554/ -https://www.exploit-db.com/exploits/38555/ -https://www.exploit-db.com/exploits/38556/ -https://www.exploit-db.com/exploits/38557/ -https://www.exploit-db.com/exploits/38558/ -https://www.exploit-db.com/exploits/3856 -https://www.exploit-db.com/exploits/38566/ -https://www.exploit-db.com/exploits/3857 -https://www.exploit-db.com/exploits/38576/ -https://www.exploit-db.com/exploits/3858 -https://www.exploit-db.com/exploits/38580/ -https://www.exploit-db.com/exploits/38581/ -https://www.exploit-db.com/exploits/3859 -https://www.exploit-db.com/exploits/38599/ -https://www.exploit-db.com/exploits/3860 -https://www.exploit-db.com/exploits/3861 -https://www.exploit-db.com/exploits/38610/ -https://www.exploit-db.com/exploits/38611/ -https://www.exploit-db.com/exploits/38612/ -https://www.exploit-db.com/exploits/38613/ -https://www.exploit-db.com/exploits/38614/ -https://www.exploit-db.com/exploits/3862 -https://www.exploit-db.com/exploits/38629/ -https://www.exploit-db.com/exploits/3863 -https://www.exploit-db.com/exploits/3864 -https://www.exploit-db.com/exploits/38640/ -https://www.exploit-db.com/exploits/38641/ -https://www.exploit-db.com/exploits/3865 -https://www.exploit-db.com/exploits/38657/ -https://www.exploit-db.com/exploits/3867 -https://www.exploit-db.com/exploits/38678 -https://www.exploit-db.com/exploits/3868 -https://www.exploit-db.com/exploits/3869 -https://www.exploit-db.com/exploits/3870 -https://www.exploit-db.com/exploits/38707/ -https://www.exploit-db.com/exploits/38713/ -https://www.exploit-db.com/exploits/38714/ -https://www.exploit-db.com/exploits/38727/ -https://www.exploit-db.com/exploits/38728/ -https://www.exploit-db.com/exploits/3874 -https://www.exploit-db.com/exploits/3875 -https://www.exploit-db.com/exploits/38751/ -https://www.exploit-db.com/exploits/3876 -https://www.exploit-db.com/exploits/38763/ -https://www.exploit-db.com/exploits/38764/ -https://www.exploit-db.com/exploits/38765/ -https://www.exploit-db.com/exploits/38772/ -https://www.exploit-db.com/exploits/38773/ -https://www.exploit-db.com/exploits/38775/ -https://www.exploit-db.com/exploits/3878 -https://www.exploit-db.com/exploits/38787/ -https://www.exploit-db.com/exploits/38788/ -https://www.exploit-db.com/exploits/38789/ -https://www.exploit-db.com/exploits/3879 -https://www.exploit-db.com/exploits/38792/ -https://www.exploit-db.com/exploits/38793/ -https://www.exploit-db.com/exploits/38794/ -https://www.exploit-db.com/exploits/38795/ -https://www.exploit-db.com/exploits/38796/ -https://www.exploit-db.com/exploits/38797/ -https://www.exploit-db.com/exploits/38805/ -https://www.exploit-db.com/exploits/38832/ -https://www.exploit-db.com/exploits/38836/ -https://www.exploit-db.com/exploits/3884 -https://www.exploit-db.com/exploits/38847/ -https://www.exploit-db.com/exploits/38849/ -https://www.exploit-db.com/exploits/3885 -https://www.exploit-db.com/exploits/38859/ -https://www.exploit-db.com/exploits/3886 -https://www.exploit-db.com/exploits/38861/ -https://www.exploit-db.com/exploits/3887 -https://www.exploit-db.com/exploits/3889 -https://www.exploit-db.com/exploits/38905/ -https://www.exploit-db.com/exploits/3891 -https://www.exploit-db.com/exploits/38911/ -https://www.exploit-db.com/exploits/38912/ -https://www.exploit-db.com/exploits/38917/ -https://www.exploit-db.com/exploits/38918/ -https://www.exploit-db.com/exploits/3894 -https://www.exploit-db.com/exploits/3895 -https://www.exploit-db.com/exploits/3896 -https://www.exploit-db.com/exploits/38968/ -https://www.exploit-db.com/exploits/38969/ -https://www.exploit-db.com/exploits/38970/ -https://www.exploit-db.com/exploits/38972/ -https://www.exploit-db.com/exploits/38975/ -https://www.exploit-db.com/exploits/38976/ -https://www.exploit-db.com/exploits/38977/ -https://www.exploit-db.com/exploits/3898 -https://www.exploit-db.com/exploits/38982/ -https://www.exploit-db.com/exploits/38983/ -https://www.exploit-db.com/exploits/3899 -https://www.exploit-db.com/exploits/3900 -https://www.exploit-db.com/exploits/3901 -https://www.exploit-db.com/exploits/39010/ -https://www.exploit-db.com/exploits/39017/ -https://www.exploit-db.com/exploits/39019/ -https://www.exploit-db.com/exploits/3902 -https://www.exploit-db.com/exploits/39020/ -https://www.exploit-db.com/exploits/3903 -https://www.exploit-db.com/exploits/39033/ -https://www.exploit-db.com/exploits/39035/ -https://www.exploit-db.com/exploits/39040/ -https://www.exploit-db.com/exploits/39041/ -https://www.exploit-db.com/exploits/39042/ -https://www.exploit-db.com/exploits/39043/ -https://www.exploit-db.com/exploits/39044/ -https://www.exploit-db.com/exploits/39045/ -https://www.exploit-db.com/exploits/39046/ -https://www.exploit-db.com/exploits/39047/ -https://www.exploit-db.com/exploits/39048/ -https://www.exploit-db.com/exploits/39049/ -https://www.exploit-db.com/exploits/3905 -https://www.exploit-db.com/exploits/39050/ -https://www.exploit-db.com/exploits/39051/ -https://www.exploit-db.com/exploits/39052/ -https://www.exploit-db.com/exploits/39053/ -https://www.exploit-db.com/exploits/39054/ -https://www.exploit-db.com/exploits/3906 -https://www.exploit-db.com/exploits/3907 -https://www.exploit-db.com/exploits/39072/ -https://www.exploit-db.com/exploits/3908 -https://www.exploit-db.com/exploits/3909 -https://www.exploit-db.com/exploits/3910 -https://www.exploit-db.com/exploits/3911 -https://www.exploit-db.com/exploits/39119/ -https://www.exploit-db.com/exploits/3912 -https://www.exploit-db.com/exploits/3913 -https://www.exploit-db.com/exploits/3914 -https://www.exploit-db.com/exploits/3915 -https://www.exploit-db.com/exploits/3916 -https://www.exploit-db.com/exploits/39161/ -https://www.exploit-db.com/exploits/39162/ -https://www.exploit-db.com/exploits/39163/ -https://www.exploit-db.com/exploits/39165/ -https://www.exploit-db.com/exploits/39166/ -https://www.exploit-db.com/exploits/39169/ -https://www.exploit-db.com/exploits/3917 -https://www.exploit-db.com/exploits/39170/ -https://www.exploit-db.com/exploits/3918 -https://www.exploit-db.com/exploits/3919 -https://www.exploit-db.com/exploits/39192/ -https://www.exploit-db.com/exploits/3920 -https://www.exploit-db.com/exploits/39215/ -https://www.exploit-db.com/exploits/39217/ -https://www.exploit-db.com/exploits/39218/ -https://www.exploit-db.com/exploits/39219/ -https://www.exploit-db.com/exploits/39220/ -https://www.exploit-db.com/exploits/39221/ -https://www.exploit-db.com/exploits/39224/ -https://www.exploit-db.com/exploits/39229/ -https://www.exploit-db.com/exploits/3923 -https://www.exploit-db.com/exploits/39230/ -https://www.exploit-db.com/exploits/39231/ -https://www.exploit-db.com/exploits/39232/ -https://www.exploit-db.com/exploits/39233/ -https://www.exploit-db.com/exploits/3924 -https://www.exploit-db.com/exploits/39244/ -https://www.exploit-db.com/exploits/39245/ -https://www.exploit-db.com/exploits/39246/ -https://www.exploit-db.com/exploits/3925 -https://www.exploit-db.com/exploits/39266/ -https://www.exploit-db.com/exploits/39277/ -https://www.exploit-db.com/exploits/39278 -https://www.exploit-db.com/exploits/3928 -https://www.exploit-db.com/exploits/3929 -https://www.exploit-db.com/exploits/3930 -https://www.exploit-db.com/exploits/39305/ -https://www.exploit-db.com/exploits/39308/ -https://www.exploit-db.com/exploits/3931 -https://www.exploit-db.com/exploits/39310/ -https://www.exploit-db.com/exploits/39311/ -https://www.exploit-db.com/exploits/3932 -https://www.exploit-db.com/exploits/3934 -https://www.exploit-db.com/exploits/3935 -https://www.exploit-db.com/exploits/39357/ -https://www.exploit-db.com/exploits/39358/ -https://www.exploit-db.com/exploits/39359/ -https://www.exploit-db.com/exploits/3936 -https://www.exploit-db.com/exploits/39360/ -https://www.exploit-db.com/exploits/39361/ -https://www.exploit-db.com/exploits/39362/ -https://www.exploit-db.com/exploits/39363/ -https://www.exploit-db.com/exploits/39364/ -https://www.exploit-db.com/exploits/39365/ -https://www.exploit-db.com/exploits/39366/ -https://www.exploit-db.com/exploits/39367/ -https://www.exploit-db.com/exploits/39368/ -https://www.exploit-db.com/exploits/39369/ -https://www.exploit-db.com/exploits/39370/ -https://www.exploit-db.com/exploits/39371/ -https://www.exploit-db.com/exploits/39372/ -https://www.exploit-db.com/exploits/39373/ -https://www.exploit-db.com/exploits/39374/ -https://www.exploit-db.com/exploits/39375/ -https://www.exploit-db.com/exploits/3938 -https://www.exploit-db.com/exploits/39382/ -https://www.exploit-db.com/exploits/3939 -https://www.exploit-db.com/exploits/3940 -https://www.exploit-db.com/exploits/39402/ -https://www.exploit-db.com/exploits/39407/ -https://www.exploit-db.com/exploits/39408/ -https://www.exploit-db.com/exploits/39409/ -https://www.exploit-db.com/exploits/3941 -https://www.exploit-db.com/exploits/39412/ -https://www.exploit-db.com/exploits/3942 -https://www.exploit-db.com/exploits/39429/ -https://www.exploit-db.com/exploits/3943 -https://www.exploit-db.com/exploits/39430/ -https://www.exploit-db.com/exploits/39431/ -https://www.exploit-db.com/exploits/39432/ -https://www.exploit-db.com/exploits/39435/ -https://www.exploit-db.com/exploits/39436/ -https://www.exploit-db.com/exploits/39437 -https://www.exploit-db.com/exploits/3944 -https://www.exploit-db.com/exploits/39442/ -https://www.exploit-db.com/exploits/39446/ -https://www.exploit-db.com/exploits/3945 -https://www.exploit-db.com/exploits/39454/ -https://www.exploit-db.com/exploits/3946 -https://www.exploit-db.com/exploits/39460/ -https://www.exploit-db.com/exploits/39461/ -https://www.exploit-db.com/exploits/39462/ -https://www.exploit-db.com/exploits/39463/ -https://www.exploit-db.com/exploits/39465/ -https://www.exploit-db.com/exploits/39466/ -https://www.exploit-db.com/exploits/39467/ -https://www.exploit-db.com/exploits/3947 -https://www.exploit-db.com/exploits/39475/ -https://www.exploit-db.com/exploits/39476/ -https://www.exploit-db.com/exploits/3948 -https://www.exploit-db.com/exploits/39481/ -https://www.exploit-db.com/exploits/39486/ -https://www.exploit-db.com/exploits/39487/ -https://www.exploit-db.com/exploits/3949 -https://www.exploit-db.com/exploits/39495/ -https://www.exploit-db.com/exploits/39500/ -https://www.exploit-db.com/exploits/3951 -https://www.exploit-db.com/exploits/39514/ -https://www.exploit-db.com/exploits/39515/ -https://www.exploit-db.com/exploits/3952 -https://www.exploit-db.com/exploits/39522/ -https://www.exploit-db.com/exploits/39524/ -https://www.exploit-db.com/exploits/39525/ -https://www.exploit-db.com/exploits/3953 -https://www.exploit-db.com/exploits/39530/ -https://www.exploit-db.com/exploits/39531/ -https://www.exploit-db.com/exploits/39533/ -https://www.exploit-db.com/exploits/39535/ -https://www.exploit-db.com/exploits/39537/ -https://www.exploit-db.com/exploits/39538/ -https://www.exploit-db.com/exploits/39539/ -https://www.exploit-db.com/exploits/39540/ -https://www.exploit-db.com/exploits/39541/ -https://www.exploit-db.com/exploits/39544/ -https://www.exploit-db.com/exploits/39549/ -https://www.exploit-db.com/exploits/3955 -https://www.exploit-db.com/exploits/39550/ -https://www.exploit-db.com/exploits/39552 -https://www.exploit-db.com/exploits/39555/ -https://www.exploit-db.com/exploits/39556/ -https://www.exploit-db.com/exploits/39559/ -https://www.exploit-db.com/exploits/3956 -https://www.exploit-db.com/exploits/39560/ -https://www.exploit-db.com/exploits/39561/ -https://www.exploit-db.com/exploits/39562/ -https://www.exploit-db.com/exploits/39564 -https://www.exploit-db.com/exploits/39568/ -https://www.exploit-db.com/exploits/39569/ -https://www.exploit-db.com/exploits/3957 -https://www.exploit-db.com/exploits/39570/ -https://www.exploit-db.com/exploits/39573/ -https://www.exploit-db.com/exploits/39574/ -https://www.exploit-db.com/exploits/3958 -https://www.exploit-db.com/exploits/3959 -https://www.exploit-db.com/exploits/39595/ -https://www.exploit-db.com/exploits/39607/ -https://www.exploit-db.com/exploits/39608/ -https://www.exploit-db.com/exploits/39609/ -https://www.exploit-db.com/exploits/3961 -https://www.exploit-db.com/exploits/39610/ -https://www.exploit-db.com/exploits/39611/ -https://www.exploit-db.com/exploits/39612/ -https://www.exploit-db.com/exploits/39613/ -https://www.exploit-db.com/exploits/39614/ -https://www.exploit-db.com/exploits/39615/ -https://www.exploit-db.com/exploits/39616/ -https://www.exploit-db.com/exploits/3962 -https://www.exploit-db.com/exploits/3963 -https://www.exploit-db.com/exploits/39630/ -https://www.exploit-db.com/exploits/39631/ -https://www.exploit-db.com/exploits/39633/ -https://www.exploit-db.com/exploits/39634/ -https://www.exploit-db.com/exploits/39635/ -https://www.exploit-db.com/exploits/39638/ -https://www.exploit-db.com/exploits/3964 -https://www.exploit-db.com/exploits/39640/ -https://www.exploit-db.com/exploits/39642/ -https://www.exploit-db.com/exploits/39643/ -https://www.exploit-db.com/exploits/39645/ -https://www.exploit-db.com/exploits/39647/ -https://www.exploit-db.com/exploits/39648/ -https://www.exploit-db.com/exploits/39649/ -https://www.exploit-db.com/exploits/39650/ -https://www.exploit-db.com/exploits/39652/ -https://www.exploit-db.com/exploits/39656/ -https://www.exploit-db.com/exploits/39657/ -https://www.exploit-db.com/exploits/39663/ -https://www.exploit-db.com/exploits/39666/ -https://www.exploit-db.com/exploits/39669/ -https://www.exploit-db.com/exploits/3967 -https://www.exploit-db.com/exploits/39670/ -https://www.exploit-db.com/exploits/39671/ -https://www.exploit-db.com/exploits/39675/ -https://www.exploit-db.com/exploits/39683/ -https://www.exploit-db.com/exploits/39685/ -https://www.exploit-db.com/exploits/39686/ -https://www.exploit-db.com/exploits/39687/ -https://www.exploit-db.com/exploits/39691/ -https://www.exploit-db.com/exploits/39694/ -https://www.exploit-db.com/exploits/39698/ -https://www.exploit-db.com/exploits/3970 -https://www.exploit-db.com/exploits/39701/ -https://www.exploit-db.com/exploits/39702/ -https://www.exploit-db.com/exploits/39708/ -https://www.exploit-db.com/exploits/39709/ -https://www.exploit-db.com/exploits/3971 -https://www.exploit-db.com/exploits/39710/ -https://www.exploit-db.com/exploits/39712/ -https://www.exploit-db.com/exploits/39715/ -https://www.exploit-db.com/exploits/39719/ -https://www.exploit-db.com/exploits/3972 -https://www.exploit-db.com/exploits/39735/ -https://www.exploit-db.com/exploits/39736/ -https://www.exploit-db.com/exploits/39738/ -https://www.exploit-db.com/exploits/39739/ -https://www.exploit-db.com/exploits/3974 -https://www.exploit-db.com/exploits/39740/ -https://www.exploit-db.com/exploits/39741/ -https://www.exploit-db.com/exploits/39742/ -https://www.exploit-db.com/exploits/39743/ -https://www.exploit-db.com/exploits/39756/ -https://www.exploit-db.com/exploits/39757/ -https://www.exploit-db.com/exploits/3976 -https://www.exploit-db.com/exploits/39760/ -https://www.exploit-db.com/exploits/39762/ -https://www.exploit-db.com/exploits/39767/ -https://www.exploit-db.com/exploits/39768/ -https://www.exploit-db.com/exploits/39769/ -https://www.exploit-db.com/exploits/3977 -https://www.exploit-db.com/exploits/39770/ -https://www.exploit-db.com/exploits/39777/ -https://www.exploit-db.com/exploits/39778/ -https://www.exploit-db.com/exploits/39779/ -https://www.exploit-db.com/exploits/3978 -https://www.exploit-db.com/exploits/39788/ -https://www.exploit-db.com/exploits/39791/ -https://www.exploit-db.com/exploits/39799/ -https://www.exploit-db.com/exploits/3980 -https://www.exploit-db.com/exploits/39801/ -https://www.exploit-db.com/exploits/39803/ -https://www.exploit-db.com/exploits/39805/ -https://www.exploit-db.com/exploits/39809/ -https://www.exploit-db.com/exploits/3981 -https://www.exploit-db.com/exploits/39813/ -https://www.exploit-db.com/exploits/39816/ -https://www.exploit-db.com/exploits/39821/ -https://www.exploit-db.com/exploits/39822/ -https://www.exploit-db.com/exploits/39823/ -https://www.exploit-db.com/exploits/39824/ -https://www.exploit-db.com/exploits/39825/ -https://www.exploit-db.com/exploits/39826/ -https://www.exploit-db.com/exploits/39827/ -https://www.exploit-db.com/exploits/39828/ -https://www.exploit-db.com/exploits/39829/ -https://www.exploit-db.com/exploits/3983 -https://www.exploit-db.com/exploits/39830/ -https://www.exploit-db.com/exploits/39831/ -https://www.exploit-db.com/exploits/39835/ -https://www.exploit-db.com/exploits/39836/ -https://www.exploit-db.com/exploits/39837/ -https://www.exploit-db.com/exploits/39838/ -https://www.exploit-db.com/exploits/39839/ -https://www.exploit-db.com/exploits/39840/ -https://www.exploit-db.com/exploits/39841/ -https://www.exploit-db.com/exploits/39852/ -https://www.exploit-db.com/exploits/39853/ -https://www.exploit-db.com/exploits/39858/ -https://www.exploit-db.com/exploits/3986 -https://www.exploit-db.com/exploits/39867/ -https://www.exploit-db.com/exploits/3987 -https://www.exploit-db.com/exploits/39874/ -https://www.exploit-db.com/exploits/3988 -https://www.exploit-db.com/exploits/39880/ -https://www.exploit-db.com/exploits/39887/ -https://www.exploit-db.com/exploits/39888/ -https://www.exploit-db.com/exploits/3989 -https://www.exploit-db.com/exploits/39894 -https://www.exploit-db.com/exploits/3990 -https://www.exploit-db.com/exploits/39904/ -https://www.exploit-db.com/exploits/3991 -https://www.exploit-db.com/exploits/39918/ -https://www.exploit-db.com/exploits/39919/ -https://www.exploit-db.com/exploits/3992 -https://www.exploit-db.com/exploits/39920/ -https://www.exploit-db.com/exploits/39921/ -https://www.exploit-db.com/exploits/39922/ -https://www.exploit-db.com/exploits/39923/ -https://www.exploit-db.com/exploits/39924/ -https://www.exploit-db.com/exploits/39925/ -https://www.exploit-db.com/exploits/39926/ -https://www.exploit-db.com/exploits/39927/ -https://www.exploit-db.com/exploits/39928/ -https://www.exploit-db.com/exploits/39929/ -https://www.exploit-db.com/exploits/3993 -https://www.exploit-db.com/exploits/39930/ -https://www.exploit-db.com/exploits/39933/ -https://www.exploit-db.com/exploits/3994 -https://www.exploit-db.com/exploits/3995 -https://www.exploit-db.com/exploits/39958/ -https://www.exploit-db.com/exploits/39959/ -https://www.exploit-db.com/exploits/39960/ -https://www.exploit-db.com/exploits/39967/ -https://www.exploit-db.com/exploits/3997 -https://www.exploit-db.com/exploits/3998 -https://www.exploit-db.com/exploits/39983/ -https://www.exploit-db.com/exploits/3999 -https://www.exploit-db.com/exploits/39990/ -https://www.exploit-db.com/exploits/39991/ -https://www.exploit-db.com/exploits/39992/ -https://www.exploit-db.com/exploits/39993/ -https://www.exploit-db.com/exploits/39994/ -https://www.exploit-db.com/exploits/39995/ -https://www.exploit-db.com/exploits/39996/ -https://www.exploit-db.com/exploits/4000 -https://www.exploit-db.com/exploits/40004/ -https://www.exploit-db.com/exploits/4003 -https://www.exploit-db.com/exploits/40031/ -https://www.exploit-db.com/exploits/40032/ -https://www.exploit-db.com/exploits/40034/ -https://www.exploit-db.com/exploits/40035/ -https://www.exploit-db.com/exploits/40036/ -https://www.exploit-db.com/exploits/40037/ -https://www.exploit-db.com/exploits/40039/ -https://www.exploit-db.com/exploits/4004 -https://www.exploit-db.com/exploits/40041/ -https://www.exploit-db.com/exploits/40046/ -https://www.exploit-db.com/exploits/4005 -https://www.exploit-db.com/exploits/4006 -https://www.exploit-db.com/exploits/40064/ -https://www.exploit-db.com/exploits/4007 -https://www.exploit-db.com/exploits/40084/ -https://www.exploit-db.com/exploits/40085/ -https://www.exploit-db.com/exploits/40086/ -https://www.exploit-db.com/exploits/40087/ -https://www.exploit-db.com/exploits/40088/ -https://www.exploit-db.com/exploits/40089/ -https://www.exploit-db.com/exploits/4009 -https://www.exploit-db.com/exploits/40090/ -https://www.exploit-db.com/exploits/40095/ -https://www.exploit-db.com/exploits/40096/ -https://www.exploit-db.com/exploits/40097/ -https://www.exploit-db.com/exploits/40098/ -https://www.exploit-db.com/exploits/40099/ -https://www.exploit-db.com/exploits/4010 -https://www.exploit-db.com/exploits/40100/ -https://www.exploit-db.com/exploits/40101/ -https://www.exploit-db.com/exploits/40102/ -https://www.exploit-db.com/exploits/40103/ -https://www.exploit-db.com/exploits/40104/ -https://www.exploit-db.com/exploits/40105/ -https://www.exploit-db.com/exploits/40107/ -https://www.exploit-db.com/exploits/40109/ -https://www.exploit-db.com/exploits/40113/ -https://www.exploit-db.com/exploits/40118/ -https://www.exploit-db.com/exploits/40120/ -https://www.exploit-db.com/exploits/40129/ -https://www.exploit-db.com/exploits/40136/ -https://www.exploit-db.com/exploits/4014 -https://www.exploit-db.com/exploits/40141/ -https://www.exploit-db.com/exploits/4015 -https://www.exploit-db.com/exploits/40154/ -https://www.exploit-db.com/exploits/40155/ -https://www.exploit-db.com/exploits/40161/ -https://www.exploit-db.com/exploits/4017 -https://www.exploit-db.com/exploits/40171/ -https://www.exploit-db.com/exploits/40180/ -https://www.exploit-db.com/exploits/40185/ -https://www.exploit-db.com/exploits/4019 -https://www.exploit-db.com/exploits/40194/ -https://www.exploit-db.com/exploits/40195/ -https://www.exploit-db.com/exploits/40196/ -https://www.exploit-db.com/exploits/40197/ -https://www.exploit-db.com/exploits/4020 -https://www.exploit-db.com/exploits/40200/ -https://www.exploit-db.com/exploits/40214 -https://www.exploit-db.com/exploits/40219/ -https://www.exploit-db.com/exploits/4022 -https://www.exploit-db.com/exploits/40224/ -https://www.exploit-db.com/exploits/40225/ -https://www.exploit-db.com/exploits/40229/ -https://www.exploit-db.com/exploits/4023 -https://www.exploit-db.com/exploits/40230/ -https://www.exploit-db.com/exploits/40236/ -https://www.exploit-db.com/exploits/40238/ -https://www.exploit-db.com/exploits/40239/ -https://www.exploit-db.com/exploits/4024 -https://www.exploit-db.com/exploits/40240/ -https://www.exploit-db.com/exploits/40241/ -https://www.exploit-db.com/exploits/40242/ -https://www.exploit-db.com/exploits/4025 -https://www.exploit-db.com/exploits/40253/ -https://www.exploit-db.com/exploits/40255/ -https://www.exploit-db.com/exploits/40256/ -https://www.exploit-db.com/exploits/40257/ -https://www.exploit-db.com/exploits/40258/ -https://www.exploit-db.com/exploits/4026 -https://www.exploit-db.com/exploits/40270/ -https://www.exploit-db.com/exploits/40271/ -https://www.exploit-db.com/exploits/40276/ -https://www.exploit-db.com/exploits/40288/ -https://www.exploit-db.com/exploits/4029 -https://www.exploit-db.com/exploits/40291/ -https://www.exploit-db.com/exploits/4030 -https://www.exploit-db.com/exploits/40307/ -https://www.exploit-db.com/exploits/40308/ -https://www.exploit-db.com/exploits/40309/ -https://www.exploit-db.com/exploits/4031 -https://www.exploit-db.com/exploits/40310/ -https://www.exploit-db.com/exploits/40311/ -https://www.exploit-db.com/exploits/4033 -https://www.exploit-db.com/exploits/40339/ -https://www.exploit-db.com/exploits/4034 -https://www.exploit-db.com/exploits/40346/ -https://www.exploit-db.com/exploits/40354/ -https://www.exploit-db.com/exploits/40355/ -https://www.exploit-db.com/exploits/40356/ -https://www.exploit-db.com/exploits/4036 -https://www.exploit-db.com/exploits/40360/ -https://www.exploit-db.com/exploits/40361/ -https://www.exploit-db.com/exploits/40377/ -https://www.exploit-db.com/exploits/40378/ -https://www.exploit-db.com/exploits/40385/ -https://www.exploit-db.com/exploits/4039 -https://www.exploit-db.com/exploits/40398/ -https://www.exploit-db.com/exploits/40399/ -https://www.exploit-db.com/exploits/4040 -https://www.exploit-db.com/exploits/40405/ -https://www.exploit-db.com/exploits/40406/ -https://www.exploit-db.com/exploits/40409/ -https://www.exploit-db.com/exploits/4041 -https://www.exploit-db.com/exploits/40411/ -https://www.exploit-db.com/exploits/40412/ -https://www.exploit-db.com/exploits/4042 -https://www.exploit-db.com/exploits/40421/ -https://www.exploit-db.com/exploits/40429/ -https://www.exploit-db.com/exploits/4043 -https://www.exploit-db.com/exploits/40430/ -https://www.exploit-db.com/exploits/40435/ -https://www.exploit-db.com/exploits/40436/ -https://www.exploit-db.com/exploits/40437/ -https://www.exploit-db.com/exploits/4044 -https://www.exploit-db.com/exploits/40441/ -https://www.exploit-db.com/exploits/40450/ -https://www.exploit-db.com/exploits/40453/ -https://www.exploit-db.com/exploits/4046 -https://www.exploit-db.com/exploits/40463/ -https://www.exploit-db.com/exploits/40464/ -https://www.exploit-db.com/exploits/40465/ -https://www.exploit-db.com/exploits/40488/ -https://www.exploit-db.com/exploits/40489/ -https://www.exploit-db.com/exploits/40491/ -https://www.exploit-db.com/exploits/40502/ -https://www.exploit-db.com/exploits/40503/ -https://www.exploit-db.com/exploits/40507/ -https://www.exploit-db.com/exploits/40508/ -https://www.exploit-db.com/exploits/40509/ -https://www.exploit-db.com/exploits/4051 -https://www.exploit-db.com/exploits/40510/ -https://www.exploit-db.com/exploits/40515/ -https://www.exploit-db.com/exploits/4054 -https://www.exploit-db.com/exploits/4055 -https://www.exploit-db.com/exploits/4056 -https://www.exploit-db.com/exploits/40561/ -https://www.exploit-db.com/exploits/40562/ -https://www.exploit-db.com/exploits/40564/ -https://www.exploit-db.com/exploits/4057 -https://www.exploit-db.com/exploits/40572/ -https://www.exploit-db.com/exploits/40573/ -https://www.exploit-db.com/exploits/40574/ -https://www.exploit-db.com/exploits/4058 -https://www.exploit-db.com/exploits/40588/ -https://www.exploit-db.com/exploits/40589/ -https://www.exploit-db.com/exploits/4059 -https://www.exploit-db.com/exploits/40590/ -https://www.exploit-db.com/exploits/4060 -https://www.exploit-db.com/exploits/40606/ -https://www.exploit-db.com/exploits/40607/ -https://www.exploit-db.com/exploits/40608/ -https://www.exploit-db.com/exploits/40609/ -https://www.exploit-db.com/exploits/40611/ -https://www.exploit-db.com/exploits/40616/ -https://www.exploit-db.com/exploits/40617/ -https://www.exploit-db.com/exploits/40619/ -https://www.exploit-db.com/exploits/4062 -https://www.exploit-db.com/exploits/40620 -https://www.exploit-db.com/exploits/40627/ -https://www.exploit-db.com/exploits/4063 -https://www.exploit-db.com/exploits/40637/ -https://www.exploit-db.com/exploits/4064 -https://www.exploit-db.com/exploits/40648/ -https://www.exploit-db.com/exploits/40649/ -https://www.exploit-db.com/exploits/40650 -https://www.exploit-db.com/exploits/40651/ -https://www.exploit-db.com/exploits/40652/ -https://www.exploit-db.com/exploits/40653/ -https://www.exploit-db.com/exploits/40654/ -https://www.exploit-db.com/exploits/40655/ -https://www.exploit-db.com/exploits/40656/ -https://www.exploit-db.com/exploits/40657/ -https://www.exploit-db.com/exploits/40658/ -https://www.exploit-db.com/exploits/40659/ -https://www.exploit-db.com/exploits/40660/ -https://www.exploit-db.com/exploits/40661/ -https://www.exploit-db.com/exploits/40662/ -https://www.exploit-db.com/exploits/40663/ -https://www.exploit-db.com/exploits/40664/ -https://www.exploit-db.com/exploits/40665/ -https://www.exploit-db.com/exploits/40666/ -https://www.exploit-db.com/exploits/40667/ -https://www.exploit-db.com/exploits/40668/ -https://www.exploit-db.com/exploits/40669/ -https://www.exploit-db.com/exploits/4067 -https://www.exploit-db.com/exploits/40675/ -https://www.exploit-db.com/exploits/40678/ -https://www.exploit-db.com/exploits/40679/ -https://www.exploit-db.com/exploits/4068 -https://www.exploit-db.com/exploits/40682/ -https://www.exploit-db.com/exploits/40683/ -https://www.exploit-db.com/exploits/40684/ -https://www.exploit-db.com/exploits/40685/ -https://www.exploit-db.com/exploits/40686/ -https://www.exploit-db.com/exploits/40688/ -https://www.exploit-db.com/exploits/40689/ -https://www.exploit-db.com/exploits/4069 -https://www.exploit-db.com/exploits/4070 -https://www.exploit-db.com/exploits/40709/ -https://www.exploit-db.com/exploits/4071 -https://www.exploit-db.com/exploits/40710/ -https://www.exploit-db.com/exploits/4072 -https://www.exploit-db.com/exploits/40721/ -https://www.exploit-db.com/exploits/4074 -https://www.exploit-db.com/exploits/40742/ -https://www.exploit-db.com/exploits/40744/ -https://www.exploit-db.com/exploits/40745/ -https://www.exploit-db.com/exploits/40747/ -https://www.exploit-db.com/exploits/40748/ -https://www.exploit-db.com/exploits/4075 -https://www.exploit-db.com/exploits/40757/ -https://www.exploit-db.com/exploits/40759/ -https://www.exploit-db.com/exploits/4076 -https://www.exploit-db.com/exploits/40763/ -https://www.exploit-db.com/exploits/40764/ -https://www.exploit-db.com/exploits/40765/ -https://www.exploit-db.com/exploits/40766/ -https://www.exploit-db.com/exploits/40768/ -https://www.exploit-db.com/exploits/40773/ -https://www.exploit-db.com/exploits/40774/ -https://www.exploit-db.com/exploits/40779/ -https://www.exploit-db.com/exploits/4078 -https://www.exploit-db.com/exploits/40784/ -https://www.exploit-db.com/exploits/40785/ -https://www.exploit-db.com/exploits/40786/ -https://www.exploit-db.com/exploits/40787/ -https://www.exploit-db.com/exploits/40788/ -https://www.exploit-db.com/exploits/40789/ -https://www.exploit-db.com/exploits/4079 -https://www.exploit-db.com/exploits/40790/ -https://www.exploit-db.com/exploits/40793/ -https://www.exploit-db.com/exploits/40797/ -https://www.exploit-db.com/exploits/40798/ -https://www.exploit-db.com/exploits/4080 -https://www.exploit-db.com/exploits/40805/ -https://www.exploit-db.com/exploits/40806/ -https://www.exploit-db.com/exploits/40807/ -https://www.exploit-db.com/exploits/4081 -https://www.exploit-db.com/exploits/40813/ -https://www.exploit-db.com/exploits/4082 -https://www.exploit-db.com/exploits/40823/ -https://www.exploit-db.com/exploits/40824/ -https://www.exploit-db.com/exploits/40839/ -https://www.exploit-db.com/exploits/4084 -https://www.exploit-db.com/exploits/40840/ -https://www.exploit-db.com/exploits/40841/ -https://www.exploit-db.com/exploits/40842/ -https://www.exploit-db.com/exploits/40844/ -https://www.exploit-db.com/exploits/40845/ -https://www.exploit-db.com/exploits/40846/ -https://www.exploit-db.com/exploits/40847/ -https://www.exploit-db.com/exploits/4085 -https://www.exploit-db.com/exploits/4086 -https://www.exploit-db.com/exploits/40862/ -https://www.exploit-db.com/exploits/40865/ -https://www.exploit-db.com/exploits/4087 -https://www.exploit-db.com/exploits/40871/ -https://www.exploit-db.com/exploits/40874/ -https://www.exploit-db.com/exploits/40875/ -https://www.exploit-db.com/exploits/40878/ -https://www.exploit-db.com/exploits/40879/ -https://www.exploit-db.com/exploits/40880/ -https://www.exploit-db.com/exploits/40881/ -https://www.exploit-db.com/exploits/40887/ -https://www.exploit-db.com/exploits/40888/ -https://www.exploit-db.com/exploits/40889/ -https://www.exploit-db.com/exploits/4089 -https://www.exploit-db.com/exploits/40893/ -https://www.exploit-db.com/exploits/40894/ -https://www.exploit-db.com/exploits/40899/ -https://www.exploit-db.com/exploits/4090 -https://www.exploit-db.com/exploits/40906/ -https://www.exploit-db.com/exploits/40907/ -https://www.exploit-db.com/exploits/40909/ -https://www.exploit-db.com/exploits/4091 -https://www.exploit-db.com/exploits/40911/ -https://www.exploit-db.com/exploits/40915/ -https://www.exploit-db.com/exploits/40916/ -https://www.exploit-db.com/exploits/40920/ -https://www.exploit-db.com/exploits/40921/ -https://www.exploit-db.com/exploits/40923/ -https://www.exploit-db.com/exploits/40931/ -https://www.exploit-db.com/exploits/40935/ -https://www.exploit-db.com/exploits/40936/ -https://www.exploit-db.com/exploits/40937/ -https://www.exploit-db.com/exploits/40938/ -https://www.exploit-db.com/exploits/4094 -https://www.exploit-db.com/exploits/40944/ -https://www.exploit-db.com/exploits/40945/ -https://www.exploit-db.com/exploits/40946/ -https://www.exploit-db.com/exploits/40947/ -https://www.exploit-db.com/exploits/40948/ -https://www.exploit-db.com/exploits/40949/ -https://www.exploit-db.com/exploits/4095 -https://www.exploit-db.com/exploits/40950/ -https://www.exploit-db.com/exploits/40952/ -https://www.exploit-db.com/exploits/40954/ -https://www.exploit-db.com/exploits/40955/ -https://www.exploit-db.com/exploits/40956/ -https://www.exploit-db.com/exploits/40957/ -https://www.exploit-db.com/exploits/40958/ -https://www.exploit-db.com/exploits/40959/ -https://www.exploit-db.com/exploits/4096 -https://www.exploit-db.com/exploits/40960/ -https://www.exploit-db.com/exploits/40961/ -https://www.exploit-db.com/exploits/40962/ -https://www.exploit-db.com/exploits/40963/ -https://www.exploit-db.com/exploits/40967/ -https://www.exploit-db.com/exploits/40968/ -https://www.exploit-db.com/exploits/40969/ -https://www.exploit-db.com/exploits/4097 -https://www.exploit-db.com/exploits/40970/ -https://www.exploit-db.com/exploits/40972/ -https://www.exploit-db.com/exploits/40973/ -https://www.exploit-db.com/exploits/40974/ -https://www.exploit-db.com/exploits/40975/ -https://www.exploit-db.com/exploits/40979/ -https://www.exploit-db.com/exploits/4098 -https://www.exploit-db.com/exploits/40986/ -https://www.exploit-db.com/exploits/40989/ -https://www.exploit-db.com/exploits/4099 -https://www.exploit-db.com/exploits/40990/ -https://www.exploit-db.com/exploits/40997/ -https://www.exploit-db.com/exploits/4100 -https://www.exploit-db.com/exploits/41005/ -https://www.exploit-db.com/exploits/41008/ -https://www.exploit-db.com/exploits/4101 -https://www.exploit-db.com/exploits/41012/ -https://www.exploit-db.com/exploits/41013/ -https://www.exploit-db.com/exploits/41015/ -https://www.exploit-db.com/exploits/4102 -https://www.exploit-db.com/exploits/4103 -https://www.exploit-db.com/exploits/41030/ -https://www.exploit-db.com/exploits/4104 -https://www.exploit-db.com/exploits/41041/ -https://www.exploit-db.com/exploits/41042/ -https://www.exploit-db.com/exploits/41044/ -https://www.exploit-db.com/exploits/4105 -https://www.exploit-db.com/exploits/4106 -https://www.exploit-db.com/exploits/4107 -https://www.exploit-db.com/exploits/4108 -https://www.exploit-db.com/exploits/4109 -https://www.exploit-db.com/exploits/4110 -https://www.exploit-db.com/exploits/4111 -https://www.exploit-db.com/exploits/4112 -https://www.exploit-db.com/exploits/4114 -https://www.exploit-db.com/exploits/41141/ -https://www.exploit-db.com/exploits/41143/ -https://www.exploit-db.com/exploits/41145/ -https://www.exploit-db.com/exploits/4115 -https://www.exploit-db.com/exploits/41151/ -https://www.exploit-db.com/exploits/41153/ -https://www.exploit-db.com/exploits/41155/ -https://www.exploit-db.com/exploits/41156/ -https://www.exploit-db.com/exploits/41157/ -https://www.exploit-db.com/exploits/4116 -https://www.exploit-db.com/exploits/41163/ -https://www.exploit-db.com/exploits/41164/ -https://www.exploit-db.com/exploits/41165/ -https://www.exploit-db.com/exploits/41166/ -https://www.exploit-db.com/exploits/41167/ -https://www.exploit-db.com/exploits/41168/ -https://www.exploit-db.com/exploits/41171/ -https://www.exploit-db.com/exploits/41173/ -https://www.exploit-db.com/exploits/41176/ -https://www.exploit-db.com/exploits/41179/ -https://www.exploit-db.com/exploits/41181/ -https://www.exploit-db.com/exploits/41182/ -https://www.exploit-db.com/exploits/41184/ -https://www.exploit-db.com/exploits/41185/ -https://www.exploit-db.com/exploits/41188/ -https://www.exploit-db.com/exploits/41189/ -https://www.exploit-db.com/exploits/4119 -https://www.exploit-db.com/exploits/41190/ -https://www.exploit-db.com/exploits/41191/ -https://www.exploit-db.com/exploits/41192/ -https://www.exploit-db.com/exploits/41193/ -https://www.exploit-db.com/exploits/41194/ -https://www.exploit-db.com/exploits/41195/ -https://www.exploit-db.com/exploits/41196/ -https://www.exploit-db.com/exploits/4120 -https://www.exploit-db.com/exploits/41205/ -https://www.exploit-db.com/exploits/4121 -https://www.exploit-db.com/exploits/41213/ -https://www.exploit-db.com/exploits/41215/ -https://www.exploit-db.com/exploits/41216/ -https://www.exploit-db.com/exploits/4122 -https://www.exploit-db.com/exploits/4123 -https://www.exploit-db.com/exploits/41233/ -https://www.exploit-db.com/exploits/4124 -https://www.exploit-db.com/exploits/41240/ -https://www.exploit-db.com/exploits/4125 -https://www.exploit-db.com/exploits/4126 -https://www.exploit-db.com/exploits/41261/ -https://www.exploit-db.com/exploits/4127 -https://www.exploit-db.com/exploits/41278/ -https://www.exploit-db.com/exploits/4128 -https://www.exploit-db.com/exploits/41283 -https://www.exploit-db.com/exploits/4129 -https://www.exploit-db.com/exploits/41297/ -https://www.exploit-db.com/exploits/41298/ -https://www.exploit-db.com/exploits/4130 -https://www.exploit-db.com/exploits/4131 -https://www.exploit-db.com/exploits/41312/ -https://www.exploit-db.com/exploits/4132 -https://www.exploit-db.com/exploits/4133 -https://www.exploit-db.com/exploits/4134 -https://www.exploit-db.com/exploits/4135 -https://www.exploit-db.com/exploits/41350/ -https://www.exploit-db.com/exploits/41354/ -https://www.exploit-db.com/exploits/41355/ -https://www.exploit-db.com/exploits/41356/ -https://www.exploit-db.com/exploits/41357/ -https://www.exploit-db.com/exploits/4136 -https://www.exploit-db.com/exploits/41360/ -https://www.exploit-db.com/exploits/41363/ -https://www.exploit-db.com/exploits/41364/ -https://www.exploit-db.com/exploits/41365/ -https://www.exploit-db.com/exploits/41366/ -https://www.exploit-db.com/exploits/41367/ -https://www.exploit-db.com/exploits/41369/ -https://www.exploit-db.com/exploits/41377/ -https://www.exploit-db.com/exploits/4138 -https://www.exploit-db.com/exploits/4139 -https://www.exploit-db.com/exploits/41394/ -https://www.exploit-db.com/exploits/41395/ -https://www.exploit-db.com/exploits/4140 -https://www.exploit-db.com/exploits/4141 -https://www.exploit-db.com/exploits/4142 -https://www.exploit-db.com/exploits/41420/ -https://www.exploit-db.com/exploits/41421/ -https://www.exploit-db.com/exploits/41422/ -https://www.exploit-db.com/exploits/41423/ -https://www.exploit-db.com/exploits/41425/ -https://www.exploit-db.com/exploits/41426/ -https://www.exploit-db.com/exploits/41435/ -https://www.exploit-db.com/exploits/41436/ -https://www.exploit-db.com/exploits/41438/ -https://www.exploit-db.com/exploits/4144 -https://www.exploit-db.com/exploits/41443/ -https://www.exploit-db.com/exploits/41449/ -https://www.exploit-db.com/exploits/4145 -https://www.exploit-db.com/exploits/41451/ -https://www.exploit-db.com/exploits/41453/ -https://www.exploit-db.com/exploits/41454/ -https://www.exploit-db.com/exploits/41457/ -https://www.exploit-db.com/exploits/41458/ -https://www.exploit-db.com/exploits/41459/ -https://www.exploit-db.com/exploits/4147 -https://www.exploit-db.com/exploits/41471 -https://www.exploit-db.com/exploits/41472/ -https://www.exploit-db.com/exploits/41475/ -https://www.exploit-db.com/exploits/41476/ -https://www.exploit-db.com/exploits/41478/ -https://www.exploit-db.com/exploits/41479/ -https://www.exploit-db.com/exploits/4148 -https://www.exploit-db.com/exploits/41480/ -https://www.exploit-db.com/exploits/41482/ -https://www.exploit-db.com/exploits/41485/ -https://www.exploit-db.com/exploits/4149 -https://www.exploit-db.com/exploits/41497/ -https://www.exploit-db.com/exploits/4150 -https://www.exploit-db.com/exploits/41502/ -https://www.exploit-db.com/exploits/4151 -https://www.exploit-db.com/exploits/41511/ -https://www.exploit-db.com/exploits/4152 -https://www.exploit-db.com/exploits/4153 -https://www.exploit-db.com/exploits/41537/ -https://www.exploit-db.com/exploits/4154 -https://www.exploit-db.com/exploits/41540/ -https://www.exploit-db.com/exploits/41542/ -https://www.exploit-db.com/exploits/41545/ -https://www.exploit-db.com/exploits/41547/ -https://www.exploit-db.com/exploits/4155 -https://www.exploit-db.com/exploits/4156 -https://www.exploit-db.com/exploits/41565/ -https://www.exploit-db.com/exploits/41571/ -https://www.exploit-db.com/exploits/41572/ -https://www.exploit-db.com/exploits/41573/ -https://www.exploit-db.com/exploits/41574/ -https://www.exploit-db.com/exploits/41577/ -https://www.exploit-db.com/exploits/41578/ -https://www.exploit-db.com/exploits/4159 -https://www.exploit-db.com/exploits/41592/ -https://www.exploit-db.com/exploits/41594/ -https://www.exploit-db.com/exploits/41596/ -https://www.exploit-db.com/exploits/41598/ -https://www.exploit-db.com/exploits/4160 -https://www.exploit-db.com/exploits/41601/ -https://www.exploit-db.com/exploits/41607/ -https://www.exploit-db.com/exploits/41608/ -https://www.exploit-db.com/exploits/41609/ -https://www.exploit-db.com/exploits/4161 -https://www.exploit-db.com/exploits/41610/ -https://www.exploit-db.com/exploits/41611/ -https://www.exploit-db.com/exploits/41612/ -https://www.exploit-db.com/exploits/41613/ -https://www.exploit-db.com/exploits/41614/ -https://www.exploit-db.com/exploits/41615/ -https://www.exploit-db.com/exploits/41618/ -https://www.exploit-db.com/exploits/41619/ -https://www.exploit-db.com/exploits/41620/ -https://www.exploit-db.com/exploits/41622/ -https://www.exploit-db.com/exploits/41623/ -https://www.exploit-db.com/exploits/41625/ -https://www.exploit-db.com/exploits/41626/ -https://www.exploit-db.com/exploits/4163 -https://www.exploit-db.com/exploits/41633/ -https://www.exploit-db.com/exploits/41639/ -https://www.exploit-db.com/exploits/4164 -https://www.exploit-db.com/exploits/41645/ -https://www.exploit-db.com/exploits/41646/ -https://www.exploit-db.com/exploits/41647/ -https://www.exploit-db.com/exploits/41648/ -https://www.exploit-db.com/exploits/41649/ -https://www.exploit-db.com/exploits/4165 -https://www.exploit-db.com/exploits/41650/ -https://www.exploit-db.com/exploits/41651/ -https://www.exploit-db.com/exploits/41652/ -https://www.exploit-db.com/exploits/41653/ -https://www.exploit-db.com/exploits/41654/ -https://www.exploit-db.com/exploits/41655/ -https://www.exploit-db.com/exploits/41656/ -https://www.exploit-db.com/exploits/41657/ -https://www.exploit-db.com/exploits/41658/ -https://www.exploit-db.com/exploits/41659/ -https://www.exploit-db.com/exploits/4166 -https://www.exploit-db.com/exploits/41660/ -https://www.exploit-db.com/exploits/41661/ -https://www.exploit-db.com/exploits/41662/ -https://www.exploit-db.com/exploits/41666/ -https://www.exploit-db.com/exploits/41668/ -https://www.exploit-db.com/exploits/41669/ -https://www.exploit-db.com/exploits/4167 -https://www.exploit-db.com/exploits/41670/ -https://www.exploit-db.com/exploits/41674 -https://www.exploit-db.com/exploits/4169 -https://www.exploit-db.com/exploits/4171 -https://www.exploit-db.com/exploits/41718/ -https://www.exploit-db.com/exploits/41719/ -https://www.exploit-db.com/exploits/41721/ -https://www.exploit-db.com/exploits/41722/ -https://www.exploit-db.com/exploits/4173 -https://www.exploit-db.com/exploits/41738/ -https://www.exploit-db.com/exploits/4174 -https://www.exploit-db.com/exploits/41740/ -https://www.exploit-db.com/exploits/41741/ -https://www.exploit-db.com/exploits/41742/ -https://www.exploit-db.com/exploits/41743/ -https://www.exploit-db.com/exploits/41745/ -https://www.exploit-db.com/exploits/41746/ -https://www.exploit-db.com/exploits/41747/ -https://www.exploit-db.com/exploits/41748/ -https://www.exploit-db.com/exploits/4175 -https://www.exploit-db.com/exploits/41752/ -https://www.exploit-db.com/exploits/41754/ -https://www.exploit-db.com/exploits/41771/ -https://www.exploit-db.com/exploits/41772/ -https://www.exploit-db.com/exploits/41773/ -https://www.exploit-db.com/exploits/41778/ -https://www.exploit-db.com/exploits/41779/ -https://www.exploit-db.com/exploits/41781/ -https://www.exploit-db.com/exploits/41782/ -https://www.exploit-db.com/exploits/41783/ -https://www.exploit-db.com/exploits/41784/ -https://www.exploit-db.com/exploits/41785/ -https://www.exploit-db.com/exploits/41786/ -https://www.exploit-db.com/exploits/4179 -https://www.exploit-db.com/exploits/41790/ -https://www.exploit-db.com/exploits/41791/ -https://www.exploit-db.com/exploits/41792/ -https://www.exploit-db.com/exploits/41793/ -https://www.exploit-db.com/exploits/41794/ -https://www.exploit-db.com/exploits/41796/ -https://www.exploit-db.com/exploits/41797/ -https://www.exploit-db.com/exploits/41798/ -https://www.exploit-db.com/exploits/41799/ -https://www.exploit-db.com/exploits/4180 -https://www.exploit-db.com/exploits/41800/ -https://www.exploit-db.com/exploits/41801/ -https://www.exploit-db.com/exploits/41802/ -https://www.exploit-db.com/exploits/41803/ -https://www.exploit-db.com/exploits/41804/ -https://www.exploit-db.com/exploits/41805/ -https://www.exploit-db.com/exploits/41806/ -https://www.exploit-db.com/exploits/41807/ -https://www.exploit-db.com/exploits/41808/ -https://www.exploit-db.com/exploits/41809/ -https://www.exploit-db.com/exploits/41810/ -https://www.exploit-db.com/exploits/41811/ -https://www.exploit-db.com/exploits/41812/ -https://www.exploit-db.com/exploits/41813/ -https://www.exploit-db.com/exploits/41814/ -https://www.exploit-db.com/exploits/41821/ -https://www.exploit-db.com/exploits/41823/ -https://www.exploit-db.com/exploits/41824/ -https://www.exploit-db.com/exploits/41825/ -https://www.exploit-db.com/exploits/41826/ -https://www.exploit-db.com/exploits/41828/ -https://www.exploit-db.com/exploits/41829/ -https://www.exploit-db.com/exploits/4183 -https://www.exploit-db.com/exploits/41830/ -https://www.exploit-db.com/exploits/4184 -https://www.exploit-db.com/exploits/41840/ -https://www.exploit-db.com/exploits/41842/ -https://www.exploit-db.com/exploits/4185 -https://www.exploit-db.com/exploits/41850/ -https://www.exploit-db.com/exploits/41851/ -https://www.exploit-db.com/exploits/41852/ -https://www.exploit-db.com/exploits/41854/ -https://www.exploit-db.com/exploits/41855/ -https://www.exploit-db.com/exploits/41861/ -https://www.exploit-db.com/exploits/41863/ -https://www.exploit-db.com/exploits/41865/ -https://www.exploit-db.com/exploits/41866/ -https://www.exploit-db.com/exploits/41867/ -https://www.exploit-db.com/exploits/41868/ -https://www.exploit-db.com/exploits/41869/ -https://www.exploit-db.com/exploits/4187 -https://www.exploit-db.com/exploits/41870/ -https://www.exploit-db.com/exploits/41872/ -https://www.exploit-db.com/exploits/41874/ -https://www.exploit-db.com/exploits/41878/ -https://www.exploit-db.com/exploits/41879/ -https://www.exploit-db.com/exploits/41880/ -https://www.exploit-db.com/exploits/41885/ -https://www.exploit-db.com/exploits/4189 -https://www.exploit-db.com/exploits/41890/ -https://www.exploit-db.com/exploits/41891/ -https://www.exploit-db.com/exploits/41892/ -https://www.exploit-db.com/exploits/41894/ -https://www.exploit-db.com/exploits/41898/ -https://www.exploit-db.com/exploits/4190 -https://www.exploit-db.com/exploits/41901/ -https://www.exploit-db.com/exploits/41902/ -https://www.exploit-db.com/exploits/41903/ -https://www.exploit-db.com/exploits/41904/ -https://www.exploit-db.com/exploits/41905/ -https://www.exploit-db.com/exploits/41906/ -https://www.exploit-db.com/exploits/41907/ -https://www.exploit-db.com/exploits/41908/ -https://www.exploit-db.com/exploits/4191 -https://www.exploit-db.com/exploits/41910/ -https://www.exploit-db.com/exploits/41911/ -https://www.exploit-db.com/exploits/41916/ -https://www.exploit-db.com/exploits/4192 -https://www.exploit-db.com/exploits/41923/ -https://www.exploit-db.com/exploits/41925/ -https://www.exploit-db.com/exploits/41926/ -https://www.exploit-db.com/exploits/41927/ -https://www.exploit-db.com/exploits/41928/ -https://www.exploit-db.com/exploits/4193 -https://www.exploit-db.com/exploits/41931/ -https://www.exploit-db.com/exploits/41932/ -https://www.exploit-db.com/exploits/41933/ -https://www.exploit-db.com/exploits/41934/ -https://www.exploit-db.com/exploits/4194 -https://www.exploit-db.com/exploits/41941/ -https://www.exploit-db.com/exploits/41945/ -https://www.exploit-db.com/exploits/4195 -https://www.exploit-db.com/exploits/41953/ -https://www.exploit-db.com/exploits/41954/ -https://www.exploit-db.com/exploits/41955/ -https://www.exploit-db.com/exploits/41962/ -https://www.exploit-db.com/exploits/41963/ -https://www.exploit-db.com/exploits/41964/ -https://www.exploit-db.com/exploits/41965/ -https://www.exploit-db.com/exploits/41967/ -https://www.exploit-db.com/exploits/4197 -https://www.exploit-db.com/exploits/41972/ -https://www.exploit-db.com/exploits/41974/ -https://www.exploit-db.com/exploits/41975/ -https://www.exploit-db.com/exploits/4198 -https://www.exploit-db.com/exploits/41984/ -https://www.exploit-db.com/exploits/41987/ -https://www.exploit-db.com/exploits/4199 -https://www.exploit-db.com/exploits/41991/ -https://www.exploit-db.com/exploits/41992/ -https://www.exploit-db.com/exploits/41993/ -https://www.exploit-db.com/exploits/41994/ -https://www.exploit-db.com/exploits/41996/ -https://www.exploit-db.com/exploits/41997/ -https://www.exploit-db.com/exploits/42001/ -https://www.exploit-db.com/exploits/42002/ -https://www.exploit-db.com/exploits/42003/ -https://www.exploit-db.com/exploits/42004/ -https://www.exploit-db.com/exploits/42005/ -https://www.exploit-db.com/exploits/42006/ -https://www.exploit-db.com/exploits/42007/ -https://www.exploit-db.com/exploits/42008/ -https://www.exploit-db.com/exploits/42009/ -https://www.exploit-db.com/exploits/4201 -https://www.exploit-db.com/exploits/42010/ -https://www.exploit-db.com/exploits/42011/ -https://www.exploit-db.com/exploits/42014/ -https://www.exploit-db.com/exploits/42017/ -https://www.exploit-db.com/exploits/42018/ -https://www.exploit-db.com/exploits/42019/ -https://www.exploit-db.com/exploits/42020/ -https://www.exploit-db.com/exploits/42021/ -https://www.exploit-db.com/exploits/42024/ -https://www.exploit-db.com/exploits/42028/ -https://www.exploit-db.com/exploits/42029/ -https://www.exploit-db.com/exploits/42030/ -https://www.exploit-db.com/exploits/42031/ -https://www.exploit-db.com/exploits/42033/ -https://www.exploit-db.com/exploits/42034/ -https://www.exploit-db.com/exploits/42036/ -https://www.exploit-db.com/exploits/42039/ -https://www.exploit-db.com/exploits/4204 -https://www.exploit-db.com/exploits/42041/ -https://www.exploit-db.com/exploits/42042/ -https://www.exploit-db.com/exploits/42043/ -https://www.exploit-db.com/exploits/42044/ -https://www.exploit-db.com/exploits/42045/ -https://www.exploit-db.com/exploits/42046/ -https://www.exploit-db.com/exploits/42047/ -https://www.exploit-db.com/exploits/42048/ -https://www.exploit-db.com/exploits/42049/ -https://www.exploit-db.com/exploits/4205 -https://www.exploit-db.com/exploits/42050/ -https://www.exploit-db.com/exploits/42051/ -https://www.exploit-db.com/exploits/42052/ -https://www.exploit-db.com/exploits/42053/ -https://www.exploit-db.com/exploits/42054/ -https://www.exploit-db.com/exploits/42056/ -https://www.exploit-db.com/exploits/4206 -https://www.exploit-db.com/exploits/42060/ -https://www.exploit-db.com/exploits/42063/ -https://www.exploit-db.com/exploits/42064/ -https://www.exploit-db.com/exploits/42066/ -https://www.exploit-db.com/exploits/42067/ -https://www.exploit-db.com/exploits/42068/ -https://www.exploit-db.com/exploits/42071/ -https://www.exploit-db.com/exploits/42072/ -https://www.exploit-db.com/exploits/42075/ -https://www.exploit-db.com/exploits/4208 -https://www.exploit-db.com/exploits/42081/ -https://www.exploit-db.com/exploits/42084/ -https://www.exploit-db.com/exploits/42088/ -https://www.exploit-db.com/exploits/4209 -https://www.exploit-db.com/exploits/42091/ -https://www.exploit-db.com/exploits/42092/ -https://www.exploit-db.com/exploits/42094/ -https://www.exploit-db.com/exploits/42098/ -https://www.exploit-db.com/exploits/4210 -https://www.exploit-db.com/exploits/42103/ -https://www.exploit-db.com/exploits/42104/ -https://www.exploit-db.com/exploits/42105/ -https://www.exploit-db.com/exploits/4211 -https://www.exploit-db.com/exploits/42115/ -https://www.exploit-db.com/exploits/42117/ -https://www.exploit-db.com/exploits/42118/ -https://www.exploit-db.com/exploits/42119/ -https://www.exploit-db.com/exploits/42120/ -https://www.exploit-db.com/exploits/42121/ -https://www.exploit-db.com/exploits/42123/ -https://www.exploit-db.com/exploits/42124/ -https://www.exploit-db.com/exploits/42125/ -https://www.exploit-db.com/exploits/4213 -https://www.exploit-db.com/exploits/42130/ -https://www.exploit-db.com/exploits/42135/ -https://www.exploit-db.com/exploits/42136/ -https://www.exploit-db.com/exploits/42137/ -https://www.exploit-db.com/exploits/42138/ -https://www.exploit-db.com/exploits/4214 -https://www.exploit-db.com/exploits/42140/ -https://www.exploit-db.com/exploits/42141/ -https://www.exploit-db.com/exploits/42143/ -https://www.exploit-db.com/exploits/42145/ -https://www.exploit-db.com/exploits/42146/ -https://www.exploit-db.com/exploits/42147/ -https://www.exploit-db.com/exploits/42148/ -https://www.exploit-db.com/exploits/42149/ -https://www.exploit-db.com/exploits/4215 -https://www.exploit-db.com/exploits/42152/ -https://www.exploit-db.com/exploits/42153/ -https://www.exploit-db.com/exploits/42154/ -https://www.exploit-db.com/exploits/42155/ -https://www.exploit-db.com/exploits/4216 -https://www.exploit-db.com/exploits/42162/ -https://www.exploit-db.com/exploits/42166/ -https://www.exploit-db.com/exploits/4217 -https://www.exploit-db.com/exploits/42172/ -https://www.exploit-db.com/exploits/42173/ -https://www.exploit-db.com/exploits/42175/ -https://www.exploit-db.com/exploits/42176/ -https://www.exploit-db.com/exploits/4218 -https://www.exploit-db.com/exploits/42183/ -https://www.exploit-db.com/exploits/42184/ -https://www.exploit-db.com/exploits/42188/ -https://www.exploit-db.com/exploits/42189/ -https://www.exploit-db.com/exploits/4219 -https://www.exploit-db.com/exploits/42190/ -https://www.exploit-db.com/exploits/42191/ -https://www.exploit-db.com/exploits/42193/ -https://www.exploit-db.com/exploits/42198/ -https://www.exploit-db.com/exploits/42199/ -https://www.exploit-db.com/exploits/4220 -https://www.exploit-db.com/exploits/42200/ -https://www.exploit-db.com/exploits/42201/ -https://www.exploit-db.com/exploits/42202/ -https://www.exploit-db.com/exploits/42203/ -https://www.exploit-db.com/exploits/42204/ -https://www.exploit-db.com/exploits/42207/ -https://www.exploit-db.com/exploits/4221 -https://www.exploit-db.com/exploits/42210/ -https://www.exploit-db.com/exploits/42211/ -https://www.exploit-db.com/exploits/42212/ -https://www.exploit-db.com/exploits/42213/ -https://www.exploit-db.com/exploits/42214/ -https://www.exploit-db.com/exploits/42215/ -https://www.exploit-db.com/exploits/42216/ -https://www.exploit-db.com/exploits/42217/ -https://www.exploit-db.com/exploits/42218/ -https://www.exploit-db.com/exploits/42219/ -https://www.exploit-db.com/exploits/4222 -https://www.exploit-db.com/exploits/42220/ -https://www.exploit-db.com/exploits/42221/ -https://www.exploit-db.com/exploits/42223/ -https://www.exploit-db.com/exploits/42224/ -https://www.exploit-db.com/exploits/42225/ -https://www.exploit-db.com/exploits/42226/ -https://www.exploit-db.com/exploits/42228/ -https://www.exploit-db.com/exploits/42229/ -https://www.exploit-db.com/exploits/42230/ -https://www.exploit-db.com/exploits/42231/ -https://www.exploit-db.com/exploits/42232/ -https://www.exploit-db.com/exploits/42233/ -https://www.exploit-db.com/exploits/42234/ -https://www.exploit-db.com/exploits/42235/ -https://www.exploit-db.com/exploits/42236/ -https://www.exploit-db.com/exploits/42237/ -https://www.exploit-db.com/exploits/42238/ -https://www.exploit-db.com/exploits/42239/ -https://www.exploit-db.com/exploits/4224 -https://www.exploit-db.com/exploits/42240/ -https://www.exploit-db.com/exploits/42241/ -https://www.exploit-db.com/exploits/42242/ -https://www.exploit-db.com/exploits/42243/ -https://www.exploit-db.com/exploits/42244/ -https://www.exploit-db.com/exploits/42246/ -https://www.exploit-db.com/exploits/42247/ -https://www.exploit-db.com/exploits/42248/ -https://www.exploit-db.com/exploits/42249/ -https://www.exploit-db.com/exploits/4225 -https://www.exploit-db.com/exploits/42251/ -https://www.exploit-db.com/exploits/42257/ -https://www.exploit-db.com/exploits/42258/ -https://www.exploit-db.com/exploits/42259/ -https://www.exploit-db.com/exploits/4226 -https://www.exploit-db.com/exploits/42260/ -https://www.exploit-db.com/exploits/42262/ -https://www.exploit-db.com/exploits/42264/ -https://www.exploit-db.com/exploits/42269/ -https://www.exploit-db.com/exploits/4227 -https://www.exploit-db.com/exploits/42270/ -https://www.exploit-db.com/exploits/42271/ -https://www.exploit-db.com/exploits/42272/ -https://www.exploit-db.com/exploits/42273/ -https://www.exploit-db.com/exploits/42274/ -https://www.exploit-db.com/exploits/42275/ -https://www.exploit-db.com/exploits/42276/ -https://www.exploit-db.com/exploits/42277/ -https://www.exploit-db.com/exploits/42278/ -https://www.exploit-db.com/exploits/42279/ -https://www.exploit-db.com/exploits/42282/ -https://www.exploit-db.com/exploits/42283/ -https://www.exploit-db.com/exploits/4229 -https://www.exploit-db.com/exploits/42290/ -https://www.exploit-db.com/exploits/42291/ -https://www.exploit-db.com/exploits/42296/ -https://www.exploit-db.com/exploits/42299/ -https://www.exploit-db.com/exploits/4230 -https://www.exploit-db.com/exploits/42300/ -https://www.exploit-db.com/exploits/42301/ -https://www.exploit-db.com/exploits/42303/ -https://www.exploit-db.com/exploits/42305/ -https://www.exploit-db.com/exploits/42306/ -https://www.exploit-db.com/exploits/42313/ -https://www.exploit-db.com/exploits/42314/ -https://www.exploit-db.com/exploits/42316/ -https://www.exploit-db.com/exploits/42319 -https://www.exploit-db.com/exploits/42324/ -https://www.exploit-db.com/exploits/42327/ -https://www.exploit-db.com/exploits/42332/ -https://www.exploit-db.com/exploits/42333/ -https://www.exploit-db.com/exploits/42334/ -https://www.exploit-db.com/exploits/42335/ -https://www.exploit-db.com/exploits/42336/ -https://www.exploit-db.com/exploits/42337/ -https://www.exploit-db.com/exploits/42338/ -https://www.exploit-db.com/exploits/42340/ -https://www.exploit-db.com/exploits/42342/ -https://www.exploit-db.com/exploits/42345/ -https://www.exploit-db.com/exploits/42346/ -https://www.exploit-db.com/exploits/4235 -https://www.exploit-db.com/exploits/42351 -https://www.exploit-db.com/exploits/42354/ -https://www.exploit-db.com/exploits/42358/ -https://www.exploit-db.com/exploits/42360/ -https://www.exploit-db.com/exploits/42361/ -https://www.exploit-db.com/exploits/42362/ -https://www.exploit-db.com/exploits/42363/ -https://www.exploit-db.com/exploits/42364/ -https://www.exploit-db.com/exploits/42365/ -https://www.exploit-db.com/exploits/42366/ -https://www.exploit-db.com/exploits/42367/ -https://www.exploit-db.com/exploits/42368/ -https://www.exploit-db.com/exploits/4237 -https://www.exploit-db.com/exploits/42373/ -https://www.exploit-db.com/exploits/42375/ -https://www.exploit-db.com/exploits/42376/ -https://www.exploit-db.com/exploits/42378/ -https://www.exploit-db.com/exploits/4238 -https://www.exploit-db.com/exploits/42382/ -https://www.exploit-db.com/exploits/42384/ -https://www.exploit-db.com/exploits/42385/ -https://www.exploit-db.com/exploits/42386/ -https://www.exploit-db.com/exploits/42388/ -https://www.exploit-db.com/exploits/42389/ -https://www.exploit-db.com/exploits/4239 -https://www.exploit-db.com/exploits/42390/ -https://www.exploit-db.com/exploits/42391/ -https://www.exploit-db.com/exploits/42394/ -https://www.exploit-db.com/exploits/42396/ -https://www.exploit-db.com/exploits/42397/ -https://www.exploit-db.com/exploits/42398/ -https://www.exploit-db.com/exploits/42399/ -https://www.exploit-db.com/exploits/4240 -https://www.exploit-db.com/exploits/42400/ -https://www.exploit-db.com/exploits/42401/ -https://www.exploit-db.com/exploits/42402/ -https://www.exploit-db.com/exploits/42407/ -https://www.exploit-db.com/exploits/42408/ -https://www.exploit-db.com/exploits/42409/ -https://www.exploit-db.com/exploits/4241 -https://www.exploit-db.com/exploits/42418/ -https://www.exploit-db.com/exploits/4242 -https://www.exploit-db.com/exploits/42424/ -https://www.exploit-db.com/exploits/42425/ -https://www.exploit-db.com/exploits/42426/ -https://www.exploit-db.com/exploits/42427/ -https://www.exploit-db.com/exploits/42429/ -https://www.exploit-db.com/exploits/4243 -https://www.exploit-db.com/exploits/42433/ -https://www.exploit-db.com/exploits/42434/ -https://www.exploit-db.com/exploits/4244 -https://www.exploit-db.com/exploits/42440 -https://www.exploit-db.com/exploits/42444/ -https://www.exploit-db.com/exploits/42445/ -https://www.exploit-db.com/exploits/42449/ -https://www.exploit-db.com/exploits/4245 -https://www.exploit-db.com/exploits/42453/ -https://www.exploit-db.com/exploits/42454/ -https://www.exploit-db.com/exploits/42459/ -https://www.exploit-db.com/exploits/4246 -https://www.exploit-db.com/exploits/42464/ -https://www.exploit-db.com/exploits/42465/ -https://www.exploit-db.com/exploits/42466/ -https://www.exploit-db.com/exploits/42467/ -https://www.exploit-db.com/exploits/42468/ -https://www.exploit-db.com/exploits/42469/ -https://www.exploit-db.com/exploits/42470/ -https://www.exploit-db.com/exploits/42471/ -https://www.exploit-db.com/exploits/42473/ -https://www.exploit-db.com/exploits/42474/ -https://www.exploit-db.com/exploits/42475/ -https://www.exploit-db.com/exploits/42476/ -https://www.exploit-db.com/exploits/42477/ -https://www.exploit-db.com/exploits/42478/ -https://www.exploit-db.com/exploits/42479/ -https://www.exploit-db.com/exploits/4248 -https://www.exploit-db.com/exploits/42480/ -https://www.exploit-db.com/exploits/42481/ -https://www.exploit-db.com/exploits/42484/ -https://www.exploit-db.com/exploits/42492 -https://www.exploit-db.com/exploits/42499 -https://www.exploit-db.com/exploits/42507 -https://www.exploit-db.com/exploits/4251 -https://www.exploit-db.com/exploits/42517/ -https://www.exploit-db.com/exploits/42518/ -https://www.exploit-db.com/exploits/42519/ -https://www.exploit-db.com/exploits/4252 -https://www.exploit-db.com/exploits/42520/ -https://www.exploit-db.com/exploits/4253 -https://www.exploit-db.com/exploits/42535/ -https://www.exploit-db.com/exploits/4254 -https://www.exploit-db.com/exploits/42541/ -https://www.exploit-db.com/exploits/42542/ -https://www.exploit-db.com/exploits/42543/ -https://www.exploit-db.com/exploits/42544/ -https://www.exploit-db.com/exploits/42546/ -https://www.exploit-db.com/exploits/42547/ -https://www.exploit-db.com/exploits/4255 -https://www.exploit-db.com/exploits/42555/ -https://www.exploit-db.com/exploits/42557 -https://www.exploit-db.com/exploits/42558/ -https://www.exploit-db.com/exploits/42559/ -https://www.exploit-db.com/exploits/4256 -https://www.exploit-db.com/exploits/42560/ -https://www.exploit-db.com/exploits/42577/ -https://www.exploit-db.com/exploits/42581/ -https://www.exploit-db.com/exploits/4259 -https://www.exploit-db.com/exploits/42596/ -https://www.exploit-db.com/exploits/42597/ -https://www.exploit-db.com/exploits/42598/ -https://www.exploit-db.com/exploits/42599/ -https://www.exploit-db.com/exploits/4260 -https://www.exploit-db.com/exploits/42600/ -https://www.exploit-db.com/exploits/42601/ -https://www.exploit-db.com/exploits/42602/ -https://www.exploit-db.com/exploits/42604/ -https://www.exploit-db.com/exploits/42605/ -https://www.exploit-db.com/exploits/42608/ -https://www.exploit-db.com/exploits/4261 -https://www.exploit-db.com/exploits/42610/ -https://www.exploit-db.com/exploits/42611/ -https://www.exploit-db.com/exploits/42614/ -https://www.exploit-db.com/exploits/42618/ -https://www.exploit-db.com/exploits/4262 -https://www.exploit-db.com/exploits/42624/ -https://www.exploit-db.com/exploits/42625/ -https://www.exploit-db.com/exploits/42627/ -https://www.exploit-db.com/exploits/4263 -https://www.exploit-db.com/exploits/42633/ -https://www.exploit-db.com/exploits/4264 -https://www.exploit-db.com/exploits/42648 -https://www.exploit-db.com/exploits/42649/ -https://www.exploit-db.com/exploits/4265 -https://www.exploit-db.com/exploits/42652/ -https://www.exploit-db.com/exploits/42665/ -https://www.exploit-db.com/exploits/42666/ -https://www.exploit-db.com/exploits/4267 -https://www.exploit-db.com/exploits/4268 -https://www.exploit-db.com/exploits/4269 -https://www.exploit-db.com/exploits/42693/ -https://www.exploit-db.com/exploits/42698/ -https://www.exploit-db.com/exploits/42699/ -https://www.exploit-db.com/exploits/42700/ -https://www.exploit-db.com/exploits/42701/ -https://www.exploit-db.com/exploits/42702/ -https://www.exploit-db.com/exploits/42703/ -https://www.exploit-db.com/exploits/42705 -https://www.exploit-db.com/exploits/42706/ -https://www.exploit-db.com/exploits/42708/ -https://www.exploit-db.com/exploits/42709/ -https://www.exploit-db.com/exploits/4271 -https://www.exploit-db.com/exploits/42711/ -https://www.exploit-db.com/exploits/42719/ -https://www.exploit-db.com/exploits/42724/ -https://www.exploit-db.com/exploits/42726/ -https://www.exploit-db.com/exploits/4273 -https://www.exploit-db.com/exploits/42735/ -https://www.exploit-db.com/exploits/42739/ -https://www.exploit-db.com/exploits/42740/ -https://www.exploit-db.com/exploits/42741/ -https://www.exploit-db.com/exploits/42742/ -https://www.exploit-db.com/exploits/42743/ -https://www.exploit-db.com/exploits/42744/ -https://www.exploit-db.com/exploits/42745/ -https://www.exploit-db.com/exploits/42746/ -https://www.exploit-db.com/exploits/42747/ -https://www.exploit-db.com/exploits/42748/ -https://www.exploit-db.com/exploits/42749/ -https://www.exploit-db.com/exploits/4275 -https://www.exploit-db.com/exploits/42750/ -https://www.exploit-db.com/exploits/42756/ -https://www.exploit-db.com/exploits/42758/ -https://www.exploit-db.com/exploits/42759/ -https://www.exploit-db.com/exploits/4276 -https://www.exploit-db.com/exploits/42761/ -https://www.exploit-db.com/exploits/42762/ -https://www.exploit-db.com/exploits/42763/ -https://www.exploit-db.com/exploits/42764/ -https://www.exploit-db.com/exploits/42765/ -https://www.exploit-db.com/exploits/42766/ -https://www.exploit-db.com/exploits/4277 -https://www.exploit-db.com/exploits/42772/ -https://www.exploit-db.com/exploits/42773/ -https://www.exploit-db.com/exploits/42776 -https://www.exploit-db.com/exploits/42777/ -https://www.exploit-db.com/exploits/42779/ -https://www.exploit-db.com/exploits/4278 -https://www.exploit-db.com/exploits/42780/ -https://www.exploit-db.com/exploits/42781/ -https://www.exploit-db.com/exploits/42782/ -https://www.exploit-db.com/exploits/42783/ -https://www.exploit-db.com/exploits/42784/ -https://www.exploit-db.com/exploits/4279 -https://www.exploit-db.com/exploits/42792 -https://www.exploit-db.com/exploits/42794/ -https://www.exploit-db.com/exploits/42795/ -https://www.exploit-db.com/exploits/42796/ -https://www.exploit-db.com/exploits/42797/ -https://www.exploit-db.com/exploits/42798/ -https://www.exploit-db.com/exploits/42799/ -https://www.exploit-db.com/exploits/42800/ -https://www.exploit-db.com/exploits/42801/ -https://www.exploit-db.com/exploits/42802/ -https://www.exploit-db.com/exploits/42804/ -https://www.exploit-db.com/exploits/42805/ -https://www.exploit-db.com/exploits/42806/ -https://www.exploit-db.com/exploits/4281 -https://www.exploit-db.com/exploits/4282 -https://www.exploit-db.com/exploits/4283 -https://www.exploit-db.com/exploits/4284 -https://www.exploit-db.com/exploits/4285 -https://www.exploit-db.com/exploits/4286 -https://www.exploit-db.com/exploits/4287 -https://www.exploit-db.com/exploits/42885/ -https://www.exploit-db.com/exploits/42888/ -https://www.exploit-db.com/exploits/42889/ -https://www.exploit-db.com/exploits/4289 -https://www.exploit-db.com/exploits/42891/ -https://www.exploit-db.com/exploits/42892/ -https://www.exploit-db.com/exploits/42893/ -https://www.exploit-db.com/exploits/42895/ -https://www.exploit-db.com/exploits/4290 -https://www.exploit-db.com/exploits/4291 -https://www.exploit-db.com/exploits/42916/ -https://www.exploit-db.com/exploits/42920/ -https://www.exploit-db.com/exploits/42922/ -https://www.exploit-db.com/exploits/42923/ -https://www.exploit-db.com/exploits/42924/ -https://www.exploit-db.com/exploits/4293 -https://www.exploit-db.com/exploits/42932/ -https://www.exploit-db.com/exploits/42934/ -https://www.exploit-db.com/exploits/42935/ -https://www.exploit-db.com/exploits/42936/ -https://www.exploit-db.com/exploits/42937/ -https://www.exploit-db.com/exploits/42938/ -https://www.exploit-db.com/exploits/42939/ -https://www.exploit-db.com/exploits/4294 -https://www.exploit-db.com/exploits/42940/ -https://www.exploit-db.com/exploits/42941/ -https://www.exploit-db.com/exploits/42942/ -https://www.exploit-db.com/exploits/42943/ -https://www.exploit-db.com/exploits/42944/ -https://www.exploit-db.com/exploits/42945/ -https://www.exploit-db.com/exploits/42946/ -https://www.exploit-db.com/exploits/4295 -https://www.exploit-db.com/exploits/42950/ -https://www.exploit-db.com/exploits/42952/ -https://www.exploit-db.com/exploits/42953/ -https://www.exploit-db.com/exploits/42955/ -https://www.exploit-db.com/exploits/42956 -https://www.exploit-db.com/exploits/4296 -https://www.exploit-db.com/exploits/42960/ -https://www.exploit-db.com/exploits/42962/ -https://www.exploit-db.com/exploits/42966/ -https://www.exploit-db.com/exploits/42970/ -https://www.exploit-db.com/exploits/42971/ -https://www.exploit-db.com/exploits/42973/ -https://www.exploit-db.com/exploits/42974/ -https://www.exploit-db.com/exploits/42978/ -https://www.exploit-db.com/exploits/42979/ -https://www.exploit-db.com/exploits/42980/ -https://www.exploit-db.com/exploits/42981/ -https://www.exploit-db.com/exploits/42982/ -https://www.exploit-db.com/exploits/42983/ -https://www.exploit-db.com/exploits/42984/ -https://www.exploit-db.com/exploits/42986/ -https://www.exploit-db.com/exploits/42987/ -https://www.exploit-db.com/exploits/42988/ -https://www.exploit-db.com/exploits/4299 -https://www.exploit-db.com/exploits/42991/ -https://www.exploit-db.com/exploits/42995/ -https://www.exploit-db.com/exploits/42996/ -https://www.exploit-db.com/exploits/42997/ -https://www.exploit-db.com/exploits/42998/ -https://www.exploit-db.com/exploits/42999/ -https://www.exploit-db.com/exploits/43000/ -https://www.exploit-db.com/exploits/43001/ -https://www.exploit-db.com/exploits/43002/ -https://www.exploit-db.com/exploits/43003/ -https://www.exploit-db.com/exploits/43004/ -https://www.exploit-db.com/exploits/43005/ -https://www.exploit-db.com/exploits/43008/ -https://www.exploit-db.com/exploits/43009/ -https://www.exploit-db.com/exploits/43014/ -https://www.exploit-db.com/exploits/43020/ -https://www.exploit-db.com/exploits/43021/ -https://www.exploit-db.com/exploits/43022/ -https://www.exploit-db.com/exploits/43023/ -https://www.exploit-db.com/exploits/43024/ -https://www.exploit-db.com/exploits/43025/ -https://www.exploit-db.com/exploits/43026/ -https://www.exploit-db.com/exploits/43028/ -https://www.exploit-db.com/exploits/43030/ -https://www.exploit-db.com/exploits/43031/ -https://www.exploit-db.com/exploits/43032 -https://www.exploit-db.com/exploits/4304 -https://www.exploit-db.com/exploits/43045/ -https://www.exploit-db.com/exploits/4305 -https://www.exploit-db.com/exploits/43053/ -https://www.exploit-db.com/exploits/43054/ -https://www.exploit-db.com/exploits/43056/ -https://www.exploit-db.com/exploits/43057/ -https://www.exploit-db.com/exploits/43058/ -https://www.exploit-db.com/exploits/4306 -https://www.exploit-db.com/exploits/43061/ -https://www.exploit-db.com/exploits/43062/ -https://www.exploit-db.com/exploits/43063/ -https://www.exploit-db.com/exploits/43064/ -https://www.exploit-db.com/exploits/43066/ -https://www.exploit-db.com/exploits/43067/ -https://www.exploit-db.com/exploits/43068/ -https://www.exploit-db.com/exploits/43069/ -https://www.exploit-db.com/exploits/4307 -https://www.exploit-db.com/exploits/43070/ -https://www.exploit-db.com/exploits/43071/ -https://www.exploit-db.com/exploits/43072/ -https://www.exploit-db.com/exploits/43073/ -https://www.exploit-db.com/exploits/43074/ -https://www.exploit-db.com/exploits/43075/ -https://www.exploit-db.com/exploits/43076/ -https://www.exploit-db.com/exploits/43077/ -https://www.exploit-db.com/exploits/43078/ -https://www.exploit-db.com/exploits/43079/ -https://www.exploit-db.com/exploits/4308 -https://www.exploit-db.com/exploits/43080/ -https://www.exploit-db.com/exploits/43081/ -https://www.exploit-db.com/exploits/43082/ -https://www.exploit-db.com/exploits/43083/ -https://www.exploit-db.com/exploits/43084/ -https://www.exploit-db.com/exploits/43085/ -https://www.exploit-db.com/exploits/43086/ -https://www.exploit-db.com/exploits/43087/ -https://www.exploit-db.com/exploits/43088/ -https://www.exploit-db.com/exploits/43089/ -https://www.exploit-db.com/exploits/4309 -https://www.exploit-db.com/exploits/43090/ -https://www.exploit-db.com/exploits/43091/ -https://www.exploit-db.com/exploits/43092/ -https://www.exploit-db.com/exploits/43093/ -https://www.exploit-db.com/exploits/43094/ -https://www.exploit-db.com/exploits/43095/ -https://www.exploit-db.com/exploits/43096/ -https://www.exploit-db.com/exploits/43097/ -https://www.exploit-db.com/exploits/43098/ -https://www.exploit-db.com/exploits/43099/ -https://www.exploit-db.com/exploits/4310 -https://www.exploit-db.com/exploits/43100/ -https://www.exploit-db.com/exploits/43101/ -https://www.exploit-db.com/exploits/43102/ -https://www.exploit-db.com/exploits/43103/ -https://www.exploit-db.com/exploits/43105/ -https://www.exploit-db.com/exploits/43106/ -https://www.exploit-db.com/exploits/43108/ -https://www.exploit-db.com/exploits/43109/ -https://www.exploit-db.com/exploits/4311 -https://www.exploit-db.com/exploits/43111/ -https://www.exploit-db.com/exploits/43112/ -https://www.exploit-db.com/exploits/43113 -https://www.exploit-db.com/exploits/43115/ -https://www.exploit-db.com/exploits/43117/ -https://www.exploit-db.com/exploits/43119/ -https://www.exploit-db.com/exploits/43120/ -https://www.exploit-db.com/exploits/43121/ -https://www.exploit-db.com/exploits/43122/ -https://www.exploit-db.com/exploits/43123/ -https://www.exploit-db.com/exploits/43125/ -https://www.exploit-db.com/exploits/43129/ -https://www.exploit-db.com/exploits/4313 -https://www.exploit-db.com/exploits/43131/ -https://www.exploit-db.com/exploits/43133/ -https://www.exploit-db.com/exploits/43134/ -https://www.exploit-db.com/exploits/43136/ -https://www.exploit-db.com/exploits/43137/ -https://www.exploit-db.com/exploits/43138/ -https://www.exploit-db.com/exploits/43139/ -https://www.exploit-db.com/exploits/4314 -https://www.exploit-db.com/exploits/43140/ -https://www.exploit-db.com/exploits/43141/ -https://www.exploit-db.com/exploits/43144/ -https://www.exploit-db.com/exploits/43147/ -https://www.exploit-db.com/exploits/43149/ -https://www.exploit-db.com/exploits/43150/ -https://www.exploit-db.com/exploits/43151/ -https://www.exploit-db.com/exploits/43152/ -https://www.exploit-db.com/exploits/43153/ -https://www.exploit-db.com/exploits/43154/ -https://www.exploit-db.com/exploits/43155/ -https://www.exploit-db.com/exploits/43158/ -https://www.exploit-db.com/exploits/43161/ -https://www.exploit-db.com/exploits/43162/ -https://www.exploit-db.com/exploits/43163/ -https://www.exploit-db.com/exploits/43164/ -https://www.exploit-db.com/exploits/43165/ -https://www.exploit-db.com/exploits/43166/ -https://www.exploit-db.com/exploits/43167/ -https://www.exploit-db.com/exploits/43168/ -https://www.exploit-db.com/exploits/43169/ -https://www.exploit-db.com/exploits/4317 -https://www.exploit-db.com/exploits/43170/ -https://www.exploit-db.com/exploits/43171/ -https://www.exploit-db.com/exploits/43172/ -https://www.exploit-db.com/exploits/43173/ -https://www.exploit-db.com/exploits/43174/ -https://www.exploit-db.com/exploits/43175/ -https://www.exploit-db.com/exploits/43176/ -https://www.exploit-db.com/exploits/43177/ -https://www.exploit-db.com/exploits/43178/ -https://www.exploit-db.com/exploits/4318 -https://www.exploit-db.com/exploits/43180/ -https://www.exploit-db.com/exploits/43181/ -https://www.exploit-db.com/exploits/43182/ -https://www.exploit-db.com/exploits/43183/ -https://www.exploit-db.com/exploits/43184/ -https://www.exploit-db.com/exploits/43185/ -https://www.exploit-db.com/exploits/43186/ -https://www.exploit-db.com/exploits/43187/ -https://www.exploit-db.com/exploits/43188/ -https://www.exploit-db.com/exploits/43194/ -https://www.exploit-db.com/exploits/43195/ -https://www.exploit-db.com/exploits/43196/ -https://www.exploit-db.com/exploits/43198/ -https://www.exploit-db.com/exploits/43199/ -https://www.exploit-db.com/exploits/43200/ -https://www.exploit-db.com/exploits/43201/ -https://www.exploit-db.com/exploits/43205/ -https://www.exploit-db.com/exploits/43206/ -https://www.exploit-db.com/exploits/43208/ -https://www.exploit-db.com/exploits/4321 -https://www.exploit-db.com/exploits/43210/ -https://www.exploit-db.com/exploits/43211/ -https://www.exploit-db.com/exploits/43212/ -https://www.exploit-db.com/exploits/43216/ -https://www.exploit-db.com/exploits/43218/ -https://www.exploit-db.com/exploits/43219/ -https://www.exploit-db.com/exploits/4322 -https://www.exploit-db.com/exploits/43220/ -https://www.exploit-db.com/exploits/43221/ -https://www.exploit-db.com/exploits/43222/ -https://www.exploit-db.com/exploits/43223/ -https://www.exploit-db.com/exploits/43224/ -https://www.exploit-db.com/exploits/43225/ -https://www.exploit-db.com/exploits/4323 -https://www.exploit-db.com/exploits/43231/ -https://www.exploit-db.com/exploits/43233/ -https://www.exploit-db.com/exploits/43234/ -https://www.exploit-db.com/exploits/43235/ -https://www.exploit-db.com/exploits/43236/ -https://www.exploit-db.com/exploits/43237/ -https://www.exploit-db.com/exploits/43238/ -https://www.exploit-db.com/exploits/43239/ -https://www.exploit-db.com/exploits/4324 -https://www.exploit-db.com/exploits/43240/ -https://www.exploit-db.com/exploits/43241/ -https://www.exploit-db.com/exploits/43242/ -https://www.exploit-db.com/exploits/43243/ -https://www.exploit-db.com/exploits/43244/ -https://www.exploit-db.com/exploits/43245/ -https://www.exploit-db.com/exploits/43246/ -https://www.exploit-db.com/exploits/43248/ -https://www.exploit-db.com/exploits/43249/ -https://www.exploit-db.com/exploits/43250/ -https://www.exploit-db.com/exploits/43251/ -https://www.exploit-db.com/exploits/43252/ -https://www.exploit-db.com/exploits/43253/ -https://www.exploit-db.com/exploits/43254/ -https://www.exploit-db.com/exploits/43255/ -https://www.exploit-db.com/exploits/43256/ -https://www.exploit-db.com/exploits/43257/ -https://www.exploit-db.com/exploits/43258/ -https://www.exploit-db.com/exploits/43259/ -https://www.exploit-db.com/exploits/43260/ -https://www.exploit-db.com/exploits/43261/ -https://www.exploit-db.com/exploits/43262/ -https://www.exploit-db.com/exploits/43263/ -https://www.exploit-db.com/exploits/43264/ -https://www.exploit-db.com/exploits/43265/ -https://www.exploit-db.com/exploits/43266/ -https://www.exploit-db.com/exploits/43267/ -https://www.exploit-db.com/exploits/43268/ -https://www.exploit-db.com/exploits/43269/ -https://www.exploit-db.com/exploits/4327 -https://www.exploit-db.com/exploits/43270/ -https://www.exploit-db.com/exploits/43271/ -https://www.exploit-db.com/exploits/43272/ -https://www.exploit-db.com/exploits/43273/ -https://www.exploit-db.com/exploits/43274/ -https://www.exploit-db.com/exploits/43275/ -https://www.exploit-db.com/exploits/43276/ -https://www.exploit-db.com/exploits/43277/ -https://www.exploit-db.com/exploits/43278 -https://www.exploit-db.com/exploits/43279/ -https://www.exploit-db.com/exploits/4328 -https://www.exploit-db.com/exploits/43280/ -https://www.exploit-db.com/exploits/43281/ -https://www.exploit-db.com/exploits/43282/ -https://www.exploit-db.com/exploits/43283/ -https://www.exploit-db.com/exploits/43284/ -https://www.exploit-db.com/exploits/43285/ -https://www.exploit-db.com/exploits/43286/ -https://www.exploit-db.com/exploits/43287/ -https://www.exploit-db.com/exploits/43288/ -https://www.exploit-db.com/exploits/43289/ -https://www.exploit-db.com/exploits/4329 -https://www.exploit-db.com/exploits/43290/ -https://www.exploit-db.com/exploits/43291/ -https://www.exploit-db.com/exploits/43292/ -https://www.exploit-db.com/exploits/43293/ -https://www.exploit-db.com/exploits/43294/ -https://www.exploit-db.com/exploits/43295/ -https://www.exploit-db.com/exploits/43296/ -https://www.exploit-db.com/exploits/43297/ -https://www.exploit-db.com/exploits/43299/ -https://www.exploit-db.com/exploits/4330 -https://www.exploit-db.com/exploits/43300/ -https://www.exploit-db.com/exploits/43301/ -https://www.exploit-db.com/exploits/43302/ -https://www.exploit-db.com/exploits/43304/ -https://www.exploit-db.com/exploits/43305/ -https://www.exploit-db.com/exploits/43306/ -https://www.exploit-db.com/exploits/43307/ -https://www.exploit-db.com/exploits/43308/ -https://www.exploit-db.com/exploits/43309/ -https://www.exploit-db.com/exploits/4331 -https://www.exploit-db.com/exploits/43310/ -https://www.exploit-db.com/exploits/43311/ -https://www.exploit-db.com/exploits/43312/ -https://www.exploit-db.com/exploits/43314/ -https://www.exploit-db.com/exploits/43315/ -https://www.exploit-db.com/exploits/43316/ -https://www.exploit-db.com/exploits/43317/ -https://www.exploit-db.com/exploits/43318/ -https://www.exploit-db.com/exploits/43319/ -https://www.exploit-db.com/exploits/4332 -https://www.exploit-db.com/exploits/43320/ -https://www.exploit-db.com/exploits/43321/ -https://www.exploit-db.com/exploits/43322/ -https://www.exploit-db.com/exploits/43323/ -https://www.exploit-db.com/exploits/43324/ -https://www.exploit-db.com/exploits/43325/ -https://www.exploit-db.com/exploits/43326/ -https://www.exploit-db.com/exploits/43327/ -https://www.exploit-db.com/exploits/43328/ -https://www.exploit-db.com/exploits/43329/ -https://www.exploit-db.com/exploits/4333 -https://www.exploit-db.com/exploits/43330/ -https://www.exploit-db.com/exploits/43331/ -https://www.exploit-db.com/exploits/43332/ -https://www.exploit-db.com/exploits/43333/ -https://www.exploit-db.com/exploits/43334/ -https://www.exploit-db.com/exploits/43335/ -https://www.exploit-db.com/exploits/43336/ -https://www.exploit-db.com/exploits/43337/ -https://www.exploit-db.com/exploits/43340/ -https://www.exploit-db.com/exploits/43342/ -https://www.exploit-db.com/exploits/43343/ -https://www.exploit-db.com/exploits/43344/ -https://www.exploit-db.com/exploits/43345/ -https://www.exploit-db.com/exploits/43348/ -https://www.exploit-db.com/exploits/43354/ -https://www.exploit-db.com/exploits/43355/ -https://www.exploit-db.com/exploits/43356/ -https://www.exploit-db.com/exploits/4336 -https://www.exploit-db.com/exploits/43360/ -https://www.exploit-db.com/exploits/43362/ -https://www.exploit-db.com/exploits/43363/ -https://www.exploit-db.com/exploits/43364/ -https://www.exploit-db.com/exploits/43367/ -https://www.exploit-db.com/exploits/43368/ -https://www.exploit-db.com/exploits/43369/ -https://www.exploit-db.com/exploits/43370/ -https://www.exploit-db.com/exploits/43371/ -https://www.exploit-db.com/exploits/43372/ -https://www.exploit-db.com/exploits/43373/ -https://www.exploit-db.com/exploits/43374/ -https://www.exploit-db.com/exploits/43375/ -https://www.exploit-db.com/exploits/43376/ -https://www.exploit-db.com/exploits/43377/ -https://www.exploit-db.com/exploits/43378/ -https://www.exploit-db.com/exploits/43379/ -https://www.exploit-db.com/exploits/4338 -https://www.exploit-db.com/exploits/43381/ -https://www.exploit-db.com/exploits/43388/ -https://www.exploit-db.com/exploits/4339 -https://www.exploit-db.com/exploits/43390/ -https://www.exploit-db.com/exploits/43391/ -https://www.exploit-db.com/exploits/43393/ -https://www.exploit-db.com/exploits/43394/ -https://www.exploit-db.com/exploits/43396/ -https://www.exploit-db.com/exploits/4340 -https://www.exploit-db.com/exploits/43403/ -https://www.exploit-db.com/exploits/43406/ -https://www.exploit-db.com/exploits/43407/ -https://www.exploit-db.com/exploits/43408/ -https://www.exploit-db.com/exploits/43409/ -https://www.exploit-db.com/exploits/4341 -https://www.exploit-db.com/exploits/43411/ -https://www.exploit-db.com/exploits/43413/ -https://www.exploit-db.com/exploits/4342 -https://www.exploit-db.com/exploits/43420/ -https://www.exploit-db.com/exploits/43422/ -https://www.exploit-db.com/exploits/43427/ -https://www.exploit-db.com/exploits/43428/ -https://www.exploit-db.com/exploits/43429/ -https://www.exploit-db.com/exploits/4343 -https://www.exploit-db.com/exploits/43430/ -https://www.exploit-db.com/exploits/43431/ -https://www.exploit-db.com/exploits/4344 -https://www.exploit-db.com/exploits/43446/ -https://www.exploit-db.com/exploits/43447/ -https://www.exploit-db.com/exploits/43448/ -https://www.exploit-db.com/exploits/43450/ -https://www.exploit-db.com/exploits/43451/ -https://www.exploit-db.com/exploits/43452/ -https://www.exploit-db.com/exploits/43453/ -https://www.exploit-db.com/exploits/43454/ -https://www.exploit-db.com/exploits/43455/ -https://www.exploit-db.com/exploits/43458/ -https://www.exploit-db.com/exploits/4346 -https://www.exploit-db.com/exploits/43460/ -https://www.exploit-db.com/exploits/43462/ -https://www.exploit-db.com/exploits/43464/ -https://www.exploit-db.com/exploits/43466/ -https://www.exploit-db.com/exploits/43467/ -https://www.exploit-db.com/exploits/43468/ -https://www.exploit-db.com/exploits/43469/ -https://www.exploit-db.com/exploits/4347 -https://www.exploit-db.com/exploits/43470/ -https://www.exploit-db.com/exploits/43471/ -https://www.exploit-db.com/exploits/43477/ -https://www.exploit-db.com/exploits/43478/ -https://www.exploit-db.com/exploits/43479/ -https://www.exploit-db.com/exploits/4348 -https://www.exploit-db.com/exploits/43488/ -https://www.exploit-db.com/exploits/4349 -https://www.exploit-db.com/exploits/43491/ -https://www.exploit-db.com/exploits/43492/ -https://www.exploit-db.com/exploits/43493/ -https://www.exploit-db.com/exploits/43494/ -https://www.exploit-db.com/exploits/43495/ -https://www.exploit-db.com/exploits/43499/ -https://www.exploit-db.com/exploits/4350 -https://www.exploit-db.com/exploits/43513/ -https://www.exploit-db.com/exploits/43514/ -https://www.exploit-db.com/exploits/43515/ -https://www.exploit-db.com/exploits/43516/ -https://www.exploit-db.com/exploits/43517/ -https://www.exploit-db.com/exploits/43518/ -https://www.exploit-db.com/exploits/43519/ -https://www.exploit-db.com/exploits/4352 -https://www.exploit-db.com/exploits/43521/ -https://www.exploit-db.com/exploits/43522/ -https://www.exploit-db.com/exploits/43523/ -https://www.exploit-db.com/exploits/4353 -https://www.exploit-db.com/exploits/43535/ -https://www.exploit-db.com/exploits/4354 -https://www.exploit-db.com/exploits/43547/ -https://www.exploit-db.com/exploits/4355 -https://www.exploit-db.com/exploits/4356 -https://www.exploit-db.com/exploits/43560/ -https://www.exploit-db.com/exploits/43567/ -https://www.exploit-db.com/exploits/4358 -https://www.exploit-db.com/exploits/43588/ -https://www.exploit-db.com/exploits/43589/ -https://www.exploit-db.com/exploits/43590/ -https://www.exploit-db.com/exploits/43591/ -https://www.exploit-db.com/exploits/43592/ -https://www.exploit-db.com/exploits/43594/ -https://www.exploit-db.com/exploits/43595/ -https://www.exploit-db.com/exploits/4360 -https://www.exploit-db.com/exploits/4361 -https://www.exploit-db.com/exploits/4362 -https://www.exploit-db.com/exploits/4363 -https://www.exploit-db.com/exploits/4364 -https://www.exploit-db.com/exploits/4365 -https://www.exploit-db.com/exploits/43659/ -https://www.exploit-db.com/exploits/4366 -https://www.exploit-db.com/exploits/43665/ -https://www.exploit-db.com/exploits/43676/ -https://www.exploit-db.com/exploits/4368 -https://www.exploit-db.com/exploits/43683/ -https://www.exploit-db.com/exploits/4369 -https://www.exploit-db.com/exploits/43693/ -https://www.exploit-db.com/exploits/4370 -https://www.exploit-db.com/exploits/4371 -https://www.exploit-db.com/exploits/43710/ -https://www.exploit-db.com/exploits/43713/ -https://www.exploit-db.com/exploits/43715/ -https://www.exploit-db.com/exploits/43717/ -https://www.exploit-db.com/exploits/43718/ -https://www.exploit-db.com/exploits/4372 -https://www.exploit-db.com/exploits/43720/ -https://www.exploit-db.com/exploits/43723/ -https://www.exploit-db.com/exploits/4373 -https://www.exploit-db.com/exploits/43733/ -https://www.exploit-db.com/exploits/4374 -https://www.exploit-db.com/exploits/4375 -https://www.exploit-db.com/exploits/4376 -https://www.exploit-db.com/exploits/4377 -https://www.exploit-db.com/exploits/43775/ -https://www.exploit-db.com/exploits/43776/ -https://www.exploit-db.com/exploits/4378 -https://www.exploit-db.com/exploits/43780/ -https://www.exploit-db.com/exploits/4379 -https://www.exploit-db.com/exploits/4380 -https://www.exploit-db.com/exploits/4381 -https://www.exploit-db.com/exploits/4382 -https://www.exploit-db.com/exploits/4383 -https://www.exploit-db.com/exploits/4384 -https://www.exploit-db.com/exploits/43848/ -https://www.exploit-db.com/exploits/43849/ -https://www.exploit-db.com/exploits/4385 -https://www.exploit-db.com/exploits/43852/ -https://www.exploit-db.com/exploits/43853/ -https://www.exploit-db.com/exploits/43856/ -https://www.exploit-db.com/exploits/43857/ -https://www.exploit-db.com/exploits/4386 -https://www.exploit-db.com/exploits/43860/ -https://www.exploit-db.com/exploits/43861/ -https://www.exploit-db.com/exploits/43862/ -https://www.exploit-db.com/exploits/43863/ -https://www.exploit-db.com/exploits/43864/ -https://www.exploit-db.com/exploits/43865/ -https://www.exploit-db.com/exploits/43866/ -https://www.exploit-db.com/exploits/43867/ -https://www.exploit-db.com/exploits/43868/ -https://www.exploit-db.com/exploits/43869/ -https://www.exploit-db.com/exploits/4387 -https://www.exploit-db.com/exploits/43870/ -https://www.exploit-db.com/exploits/43871/ -https://www.exploit-db.com/exploits/43872/ -https://www.exploit-db.com/exploits/43873/ -https://www.exploit-db.com/exploits/43874/ -https://www.exploit-db.com/exploits/43875/ -https://www.exploit-db.com/exploits/43876/ -https://www.exploit-db.com/exploits/43877/ -https://www.exploit-db.com/exploits/43878/ -https://www.exploit-db.com/exploits/4388 -https://www.exploit-db.com/exploits/43881/ -https://www.exploit-db.com/exploits/4389 -https://www.exploit-db.com/exploits/43898/ -https://www.exploit-db.com/exploits/43899/ -https://www.exploit-db.com/exploits/4390 -https://www.exploit-db.com/exploits/43902/ -https://www.exploit-db.com/exploits/43903/ -https://www.exploit-db.com/exploits/43904/ -https://www.exploit-db.com/exploits/43911/ -https://www.exploit-db.com/exploits/43912/ -https://www.exploit-db.com/exploits/43913/ -https://www.exploit-db.com/exploits/43914/ -https://www.exploit-db.com/exploits/43915/ -https://www.exploit-db.com/exploits/43916/ -https://www.exploit-db.com/exploits/43917/ -https://www.exploit-db.com/exploits/43918/ -https://www.exploit-db.com/exploits/43919/ -https://www.exploit-db.com/exploits/4392 -https://www.exploit-db.com/exploits/43922/ -https://www.exploit-db.com/exploits/43923/ -https://www.exploit-db.com/exploits/43924/ -https://www.exploit-db.com/exploits/43925/ -https://www.exploit-db.com/exploits/43926/ -https://www.exploit-db.com/exploits/43927/ -https://www.exploit-db.com/exploits/43928/ -https://www.exploit-db.com/exploits/43929/ -https://www.exploit-db.com/exploits/4393 -https://www.exploit-db.com/exploits/43931/ -https://www.exploit-db.com/exploits/43932/ -https://www.exploit-db.com/exploits/43933/ -https://www.exploit-db.com/exploits/43934/ -https://www.exploit-db.com/exploits/43935/ -https://www.exploit-db.com/exploits/43936/ -https://www.exploit-db.com/exploits/43937/ -https://www.exploit-db.com/exploits/43939/ -https://www.exploit-db.com/exploits/4394 -https://www.exploit-db.com/exploits/43940 -https://www.exploit-db.com/exploits/43948 -https://www.exploit-db.com/exploits/43949 -https://www.exploit-db.com/exploits/4395 -https://www.exploit-db.com/exploits/43950 -https://www.exploit-db.com/exploits/43957 -https://www.exploit-db.com/exploits/43958 -https://www.exploit-db.com/exploits/43959 -https://www.exploit-db.com/exploits/4396 -https://www.exploit-db.com/exploits/43960/ -https://www.exploit-db.com/exploits/43962/ -https://www.exploit-db.com/exploits/43963/ -https://www.exploit-db.com/exploits/43964/ -https://www.exploit-db.com/exploits/43967/ -https://www.exploit-db.com/exploits/43968/ -https://www.exploit-db.com/exploits/43970/ -https://www.exploit-db.com/exploits/43971/ -https://www.exploit-db.com/exploits/43972/ -https://www.exploit-db.com/exploits/43973/ -https://www.exploit-db.com/exploits/43974/ -https://www.exploit-db.com/exploits/43975/ -https://www.exploit-db.com/exploits/43976/ -https://www.exploit-db.com/exploits/43977 -https://www.exploit-db.com/exploits/43978 -https://www.exploit-db.com/exploits/4398 -https://www.exploit-db.com/exploits/43981/ -https://www.exploit-db.com/exploits/43986/ -https://www.exploit-db.com/exploits/43987/ -https://www.exploit-db.com/exploits/43991/ -https://www.exploit-db.com/exploits/43992/ -https://www.exploit-db.com/exploits/43993/ -https://www.exploit-db.com/exploits/43996/ -https://www.exploit-db.com/exploits/4400 -https://www.exploit-db.com/exploits/44005/ -https://www.exploit-db.com/exploits/44007/ -https://www.exploit-db.com/exploits/44009/ -https://www.exploit-db.com/exploits/4401 -https://www.exploit-db.com/exploits/44010 -https://www.exploit-db.com/exploits/44011 -https://www.exploit-db.com/exploits/44012 -https://www.exploit-db.com/exploits/44013 -https://www.exploit-db.com/exploits/44014 -https://www.exploit-db.com/exploits/44015 -https://www.exploit-db.com/exploits/44016 -https://www.exploit-db.com/exploits/44022/ -https://www.exploit-db.com/exploits/44023/ -https://www.exploit-db.com/exploits/44024/ -https://www.exploit-db.com/exploits/44025/ -https://www.exploit-db.com/exploits/44027/ -https://www.exploit-db.com/exploits/44028/ -https://www.exploit-db.com/exploits/44029/ -https://www.exploit-db.com/exploits/4403 -https://www.exploit-db.com/exploits/44030/ -https://www.exploit-db.com/exploits/44031/ -https://www.exploit-db.com/exploits/44033/ -https://www.exploit-db.com/exploits/44034/ -https://www.exploit-db.com/exploits/44035/ -https://www.exploit-db.com/exploits/44039/ -https://www.exploit-db.com/exploits/4404 -https://www.exploit-db.com/exploits/44042/ -https://www.exploit-db.com/exploits/44047/ -https://www.exploit-db.com/exploits/4405 -https://www.exploit-db.com/exploits/4406 -https://www.exploit-db.com/exploits/4407 -https://www.exploit-db.com/exploits/44075/ -https://www.exploit-db.com/exploits/44076/ -https://www.exploit-db.com/exploits/44077/ -https://www.exploit-db.com/exploits/44078/ -https://www.exploit-db.com/exploits/44079/ -https://www.exploit-db.com/exploits/4408 -https://www.exploit-db.com/exploits/44080/ -https://www.exploit-db.com/exploits/44081/ -https://www.exploit-db.com/exploits/44097/ -https://www.exploit-db.com/exploits/44098/ -https://www.exploit-db.com/exploits/44099/ -https://www.exploit-db.com/exploits/4410 -https://www.exploit-db.com/exploits/44102/ -https://www.exploit-db.com/exploits/44103/ -https://www.exploit-db.com/exploits/44104/ -https://www.exploit-db.com/exploits/4411 -https://www.exploit-db.com/exploits/4412 -https://www.exploit-db.com/exploits/44124/ -https://www.exploit-db.com/exploits/4413 -https://www.exploit-db.com/exploits/44133 -https://www.exploit-db.com/exploits/44134 -https://www.exploit-db.com/exploits/44135 -https://www.exploit-db.com/exploits/44136 -https://www.exploit-db.com/exploits/44137/ -https://www.exploit-db.com/exploits/4414 -https://www.exploit-db.com/exploits/44141/ -https://www.exploit-db.com/exploits/44144/ -https://www.exploit-db.com/exploits/44146/ -https://www.exploit-db.com/exploits/44147/ -https://www.exploit-db.com/exploits/44148/ -https://www.exploit-db.com/exploits/44149/ -https://www.exploit-db.com/exploits/4415 -https://www.exploit-db.com/exploits/44150/ -https://www.exploit-db.com/exploits/44152/ -https://www.exploit-db.com/exploits/44153/ -https://www.exploit-db.com/exploits/44154/ -https://www.exploit-db.com/exploits/44156/ -https://www.exploit-db.com/exploits/44157/ -https://www.exploit-db.com/exploits/44158/ -https://www.exploit-db.com/exploits/4416 -https://www.exploit-db.com/exploits/44166/ -https://www.exploit-db.com/exploits/44167/ -https://www.exploit-db.com/exploits/44168/ -https://www.exploit-db.com/exploits/44169/ -https://www.exploit-db.com/exploits/4417 -https://www.exploit-db.com/exploits/44175/ -https://www.exploit-db.com/exploits/44176/ -https://www.exploit-db.com/exploits/4418 -https://www.exploit-db.com/exploits/44181/ -https://www.exploit-db.com/exploits/44184/ -https://www.exploit-db.com/exploits/44185/ -https://www.exploit-db.com/exploits/44189/ -https://www.exploit-db.com/exploits/4419 -https://www.exploit-db.com/exploits/44192/ -https://www.exploit-db.com/exploits/44194/ -https://www.exploit-db.com/exploits/4420 -https://www.exploit-db.com/exploits/4421 -https://www.exploit-db.com/exploits/44215/ -https://www.exploit-db.com/exploits/44216/ -https://www.exploit-db.com/exploits/44219/ -https://www.exploit-db.com/exploits/4422 -https://www.exploit-db.com/exploits/44220/ -https://www.exploit-db.com/exploits/44221/ -https://www.exploit-db.com/exploits/44222/ -https://www.exploit-db.com/exploits/44223/ -https://www.exploit-db.com/exploits/44226/ -https://www.exploit-db.com/exploits/442321/ -https://www.exploit-db.com/exploits/442322/ -https://www.exploit-db.com/exploits/44247/ -https://www.exploit-db.com/exploits/4425 -https://www.exploit-db.com/exploits/44251/ -https://www.exploit-db.com/exploits/44252 -https://www.exploit-db.com/exploits/44253/ -https://www.exploit-db.com/exploits/44255/ -https://www.exploit-db.com/exploits/44256/ -https://www.exploit-db.com/exploits/4426 -https://www.exploit-db.com/exploits/44262/ -https://www.exploit-db.com/exploits/44264/ -https://www.exploit-db.com/exploits/44265/ -https://www.exploit-db.com/exploits/4427 -https://www.exploit-db.com/exploits/44270/ -https://www.exploit-db.com/exploits/44271/ -https://www.exploit-db.com/exploits/44272/ -https://www.exploit-db.com/exploits/44274/ -https://www.exploit-db.com/exploits/44275/ -https://www.exploit-db.com/exploits/44276/ -https://www.exploit-db.com/exploits/44277/ -https://www.exploit-db.com/exploits/44278/ -https://www.exploit-db.com/exploits/4428 -https://www.exploit-db.com/exploits/44285/ -https://www.exploit-db.com/exploits/44286/ -https://www.exploit-db.com/exploits/44288/ -https://www.exploit-db.com/exploits/44289/ -https://www.exploit-db.com/exploits/4429 -https://www.exploit-db.com/exploits/44290/ -https://www.exploit-db.com/exploits/44291/ -https://www.exploit-db.com/exploits/44292/ -https://www.exploit-db.com/exploits/44293/ -https://www.exploit-db.com/exploits/44294/ -https://www.exploit-db.com/exploits/44295/ -https://www.exploit-db.com/exploits/44297/ -https://www.exploit-db.com/exploits/44298/ -https://www.exploit-db.com/exploits/4430 -https://www.exploit-db.com/exploits/44307/ -https://www.exploit-db.com/exploits/44308/ -https://www.exploit-db.com/exploits/44309/ -https://www.exploit-db.com/exploits/4431 -https://www.exploit-db.com/exploits/44310/ -https://www.exploit-db.com/exploits/44311/ -https://www.exploit-db.com/exploits/44312/ -https://www.exploit-db.com/exploits/44313/ -https://www.exploit-db.com/exploits/44314/ -https://www.exploit-db.com/exploits/44315/ -https://www.exploit-db.com/exploits/44317/ -https://www.exploit-db.com/exploits/44318/ -https://www.exploit-db.com/exploits/4432 -https://www.exploit-db.com/exploits/44324/ -https://www.exploit-db.com/exploits/44325/ -https://www.exploit-db.com/exploits/44326/ -https://www.exploit-db.com/exploits/44327/ -https://www.exploit-db.com/exploits/4433 -https://www.exploit-db.com/exploits/44332/ -https://www.exploit-db.com/exploits/4434 -https://www.exploit-db.com/exploits/44340/ -https://www.exploit-db.com/exploits/44343/ -https://www.exploit-db.com/exploits/44345/ -https://www.exploit-db.com/exploits/44349/ -https://www.exploit-db.com/exploits/4435 -https://www.exploit-db.com/exploits/44350/ -https://www.exploit-db.com/exploits/44351/ -https://www.exploit-db.com/exploits/44352/ -https://www.exploit-db.com/exploits/44354/ -https://www.exploit-db.com/exploits/44356/ -https://www.exploit-db.com/exploits/44357/ -https://www.exploit-db.com/exploits/44358/ -https://www.exploit-db.com/exploits/4436 -https://www.exploit-db.com/exploits/44360/ -https://www.exploit-db.com/exploits/44361/ -https://www.exploit-db.com/exploits/44362/ -https://www.exploit-db.com/exploits/44366/ -https://www.exploit-db.com/exploits/44367/ -https://www.exploit-db.com/exploits/44368/ -https://www.exploit-db.com/exploits/44369/ -https://www.exploit-db.com/exploits/44370/ -https://www.exploit-db.com/exploits/44371/ -https://www.exploit-db.com/exploits/44375/ -https://www.exploit-db.com/exploits/44378/ -https://www.exploit-db.com/exploits/44379/ -https://www.exploit-db.com/exploits/4438 -https://www.exploit-db.com/exploits/44383/ -https://www.exploit-db.com/exploits/44384/ -https://www.exploit-db.com/exploits/44385/ -https://www.exploit-db.com/exploits/44388/ -https://www.exploit-db.com/exploits/4439 -https://www.exploit-db.com/exploits/44391/ -https://www.exploit-db.com/exploits/44392/ -https://www.exploit-db.com/exploits/44393/ -https://www.exploit-db.com/exploits/44394/ -https://www.exploit-db.com/exploits/44396/ -https://www.exploit-db.com/exploits/44397/ -https://www.exploit-db.com/exploits/4440 -https://www.exploit-db.com/exploits/44401/ -https://www.exploit-db.com/exploits/44402/ -https://www.exploit-db.com/exploits/44403/ -https://www.exploit-db.com/exploits/44404/ -https://www.exploit-db.com/exploits/44405/ -https://www.exploit-db.com/exploits/44406/ -https://www.exploit-db.com/exploits/44407/ -https://www.exploit-db.com/exploits/44408/ -https://www.exploit-db.com/exploits/4441 -https://www.exploit-db.com/exploits/44410/ -https://www.exploit-db.com/exploits/44411/ -https://www.exploit-db.com/exploits/44412/ -https://www.exploit-db.com/exploits/44413/ -https://www.exploit-db.com/exploits/44414/ -https://www.exploit-db.com/exploits/44415/ -https://www.exploit-db.com/exploits/44416/ -https://www.exploit-db.com/exploits/44417/ -https://www.exploit-db.com/exploits/44418/ -https://www.exploit-db.com/exploits/44419/ -https://www.exploit-db.com/exploits/4442 -https://www.exploit-db.com/exploits/44421/ -https://www.exploit-db.com/exploits/44422/ -https://www.exploit-db.com/exploits/44424/ -https://www.exploit-db.com/exploits/44427/ -https://www.exploit-db.com/exploits/44428/ -https://www.exploit-db.com/exploits/44429/ -https://www.exploit-db.com/exploits/4443 -https://www.exploit-db.com/exploits/44434/ -https://www.exploit-db.com/exploits/44436/ -https://www.exploit-db.com/exploits/44437/ -https://www.exploit-db.com/exploits/44438/ -https://www.exploit-db.com/exploits/44439/ -https://www.exploit-db.com/exploits/44441/ -https://www.exploit-db.com/exploits/44443/ -https://www.exploit-db.com/exploits/44444/ -https://www.exploit-db.com/exploits/44447/ -https://www.exploit-db.com/exploits/44448/ -https://www.exploit-db.com/exploits/44449/ -https://www.exploit-db.com/exploits/4445 -https://www.exploit-db.com/exploits/44450/ -https://www.exploit-db.com/exploits/44452/ -https://www.exploit-db.com/exploits/44453/ -https://www.exploit-db.com/exploits/44454/ -https://www.exploit-db.com/exploits/44458/ -https://www.exploit-db.com/exploits/44459/ -https://www.exploit-db.com/exploits/4446 -https://www.exploit-db.com/exploits/44460/ -https://www.exploit-db.com/exploits/44461/ -https://www.exploit-db.com/exploits/44462/ -https://www.exploit-db.com/exploits/44463/ -https://www.exploit-db.com/exploits/44464/ -https://www.exploit-db.com/exploits/44465/ -https://www.exploit-db.com/exploits/44466/ -https://www.exploit-db.com/exploits/44469/ -https://www.exploit-db.com/exploits/4447 -https://www.exploit-db.com/exploits/44470/ -https://www.exploit-db.com/exploits/44471/ -https://www.exploit-db.com/exploits/44472/ -https://www.exploit-db.com/exploits/44473/ -https://www.exploit-db.com/exploits/44474/ -https://www.exploit-db.com/exploits/44475/ -https://www.exploit-db.com/exploits/44476/ -https://www.exploit-db.com/exploits/44478/ -https://www.exploit-db.com/exploits/44479/ -https://www.exploit-db.com/exploits/4448 -https://www.exploit-db.com/exploits/44480/ -https://www.exploit-db.com/exploits/44482/ -https://www.exploit-db.com/exploits/44485/ -https://www.exploit-db.com/exploits/44486/ -https://www.exploit-db.com/exploits/44487/ -https://www.exploit-db.com/exploits/44488/ -https://www.exploit-db.com/exploits/44489/ -https://www.exploit-db.com/exploits/4449 -https://www.exploit-db.com/exploits/44493/ -https://www.exploit-db.com/exploits/44495/ -https://www.exploit-db.com/exploits/44496/ -https://www.exploit-db.com/exploits/44497/ -https://www.exploit-db.com/exploits/44498/ -https://www.exploit-db.com/exploits/4450 -https://www.exploit-db.com/exploits/44500/ -https://www.exploit-db.com/exploits/44501/ -https://www.exploit-db.com/exploits/44502/ -https://www.exploit-db.com/exploits/44503/ -https://www.exploit-db.com/exploits/44504/ -https://www.exploit-db.com/exploits/4451 -https://www.exploit-db.com/exploits/44511/ -https://www.exploit-db.com/exploits/44512/ -https://www.exploit-db.com/exploits/44513/ -https://www.exploit-db.com/exploits/44514/ -https://www.exploit-db.com/exploits/44515/ -https://www.exploit-db.com/exploits/4452 -https://www.exploit-db.com/exploits/44522/ -https://www.exploit-db.com/exploits/44524/ -https://www.exploit-db.com/exploits/44526/ -https://www.exploit-db.com/exploits/44527/ -https://www.exploit-db.com/exploits/44528/ -https://www.exploit-db.com/exploits/44529/ -https://www.exploit-db.com/exploits/4453 -https://www.exploit-db.com/exploits/44531/ -https://www.exploit-db.com/exploits/44534/ -https://www.exploit-db.com/exploits/44535/ -https://www.exploit-db.com/exploits/44536/ -https://www.exploit-db.com/exploits/44537/ -https://www.exploit-db.com/exploits/44538/ -https://www.exploit-db.com/exploits/44539/ -https://www.exploit-db.com/exploits/4454 -https://www.exploit-db.com/exploits/44542/ -https://www.exploit-db.com/exploits/44543/ -https://www.exploit-db.com/exploits/44545/ -https://www.exploit-db.com/exploits/44546/ -https://www.exploit-db.com/exploits/44547/ -https://www.exploit-db.com/exploits/4455 -https://www.exploit-db.com/exploits/44551/ -https://www.exploit-db.com/exploits/44553/ -https://www.exploit-db.com/exploits/44557/ -https://www.exploit-db.com/exploits/44559/ -https://www.exploit-db.com/exploits/4456 -https://www.exploit-db.com/exploits/44560/ -https://www.exploit-db.com/exploits/44561/ -https://www.exploit-db.com/exploits/44562/ -https://www.exploit-db.com/exploits/44563/ -https://www.exploit-db.com/exploits/44564/ -https://www.exploit-db.com/exploits/44566/ -https://www.exploit-db.com/exploits/44567/ -https://www.exploit-db.com/exploits/4457 -https://www.exploit-db.com/exploits/44571/ -https://www.exploit-db.com/exploits/44574/ -https://www.exploit-db.com/exploits/44576/ -https://www.exploit-db.com/exploits/44577/ -https://www.exploit-db.com/exploits/4458 -https://www.exploit-db.com/exploits/44581/ -https://www.exploit-db.com/exploits/44584/ -https://www.exploit-db.com/exploits/44585/ -https://www.exploit-db.com/exploits/44586/ -https://www.exploit-db.com/exploits/44587/ -https://www.exploit-db.com/exploits/44589/ -https://www.exploit-db.com/exploits/4459 -https://www.exploit-db.com/exploits/44590/ -https://www.exploit-db.com/exploits/44596/ -https://www.exploit-db.com/exploits/44597/ -https://www.exploit-db.com/exploits/44598/ -https://www.exploit-db.com/exploits/44599/ -https://www.exploit-db.com/exploits/44600/ -https://www.exploit-db.com/exploits/44601/ -https://www.exploit-db.com/exploits/44606/ -https://www.exploit-db.com/exploits/44607/ -https://www.exploit-db.com/exploits/44608/ -https://www.exploit-db.com/exploits/4461 -https://www.exploit-db.com/exploits/44610/ -https://www.exploit-db.com/exploits/44611/ -https://www.exploit-db.com/exploits/44612/ -https://www.exploit-db.com/exploits/44613/ -https://www.exploit-db.com/exploits/44614/ -https://www.exploit-db.com/exploits/44615/ -https://www.exploit-db.com/exploits/44616/ -https://www.exploit-db.com/exploits/44617/ -https://www.exploit-db.com/exploits/44618/ -https://www.exploit-db.com/exploits/44619/ -https://www.exploit-db.com/exploits/4462 -https://www.exploit-db.com/exploits/44621/ -https://www.exploit-db.com/exploits/44623/ -https://www.exploit-db.com/exploits/44624/ -https://www.exploit-db.com/exploits/44625/ -https://www.exploit-db.com/exploits/44626/ -https://www.exploit-db.com/exploits/44628/ -https://www.exploit-db.com/exploits/4463 -https://www.exploit-db.com/exploits/44630/ -https://www.exploit-db.com/exploits/44631/ -https://www.exploit-db.com/exploits/44633/ -https://www.exploit-db.com/exploits/44634/ -https://www.exploit-db.com/exploits/44635/ -https://www.exploit-db.com/exploits/44637/ -https://www.exploit-db.com/exploits/44638/ -https://www.exploit-db.com/exploits/4464 -https://www.exploit-db.com/exploits/44640/ -https://www.exploit-db.com/exploits/44642/ -https://www.exploit-db.com/exploits/44643/ -https://www.exploit-db.com/exploits/44646 -https://www.exploit-db.com/exploits/44648/ -https://www.exploit-db.com/exploits/4465 -https://www.exploit-db.com/exploits/44652/ -https://www.exploit-db.com/exploits/44653/ -https://www.exploit-db.com/exploits/44654/ -https://www.exploit-db.com/exploits/44656/ -https://www.exploit-db.com/exploits/44657/ -https://www.exploit-db.com/exploits/4466 -https://www.exploit-db.com/exploits/44666/ -https://www.exploit-db.com/exploits/4467 -https://www.exploit-db.com/exploits/44677/ -https://www.exploit-db.com/exploits/44678/ -https://www.exploit-db.com/exploits/44687/ -https://www.exploit-db.com/exploits/4469 -https://www.exploit-db.com/exploits/44690/ -https://www.exploit-db.com/exploits/44691/ -https://www.exploit-db.com/exploits/44693/ -https://www.exploit-db.com/exploits/44694/ -https://www.exploit-db.com/exploits/44695/ -https://www.exploit-db.com/exploits/44696/ -https://www.exploit-db.com/exploits/44697/ -https://www.exploit-db.com/exploits/4470 -https://www.exploit-db.com/exploits/4471 -https://www.exploit-db.com/exploits/4472 -https://www.exploit-db.com/exploits/44721/ -https://www.exploit-db.com/exploits/44724/ -https://www.exploit-db.com/exploits/4473 -https://www.exploit-db.com/exploits/4474 -https://www.exploit-db.com/exploits/44741/ -https://www.exploit-db.com/exploits/44747/ -https://www.exploit-db.com/exploits/44749/ -https://www.exploit-db.com/exploits/4475 -https://www.exploit-db.com/exploits/44750/ -https://www.exploit-db.com/exploits/44752/ -https://www.exploit-db.com/exploits/44754/ -https://www.exploit-db.com/exploits/44755/ -https://www.exploit-db.com/exploits/44757/ -https://www.exploit-db.com/exploits/44758/ -https://www.exploit-db.com/exploits/44759/ -https://www.exploit-db.com/exploits/4476 -https://www.exploit-db.com/exploits/44760 -https://www.exploit-db.com/exploits/44763/ -https://www.exploit-db.com/exploits/44764/ -https://www.exploit-db.com/exploits/44765/ -https://www.exploit-db.com/exploits/4477 -https://www.exploit-db.com/exploits/44775/ -https://www.exploit-db.com/exploits/44776/ -https://www.exploit-db.com/exploits/44779/ -https://www.exploit-db.com/exploits/4478 -https://www.exploit-db.com/exploits/44781/ -https://www.exploit-db.com/exploits/44782/ -https://www.exploit-db.com/exploits/44783/ -https://www.exploit-db.com/exploits/4479 -https://www.exploit-db.com/exploits/44790/ -https://www.exploit-db.com/exploits/44793/ -https://www.exploit-db.com/exploits/44794/ -https://www.exploit-db.com/exploits/44795/ -https://www.exploit-db.com/exploits/44796/ -https://www.exploit-db.com/exploits/4480 -https://www.exploit-db.com/exploits/44801/ -https://www.exploit-db.com/exploits/44802/ -https://www.exploit-db.com/exploits/44803/ -https://www.exploit-db.com/exploits/44804/ -https://www.exploit-db.com/exploits/44805/ -https://www.exploit-db.com/exploits/44806/ -https://www.exploit-db.com/exploits/4481 -https://www.exploit-db.com/exploits/44817/ -https://www.exploit-db.com/exploits/4482 -https://www.exploit-db.com/exploits/44822/ -https://www.exploit-db.com/exploits/44825/ -https://www.exploit-db.com/exploits/44826/ -https://www.exploit-db.com/exploits/44827/ -https://www.exploit-db.com/exploits/44828/ -https://www.exploit-db.com/exploits/44829/ -https://www.exploit-db.com/exploits/4483 -https://www.exploit-db.com/exploits/44831/ -https://www.exploit-db.com/exploits/44832/ -https://www.exploit-db.com/exploits/44833/ -https://www.exploit-db.com/exploits/44836/ -https://www.exploit-db.com/exploits/44837/ -https://www.exploit-db.com/exploits/44839/ -https://www.exploit-db.com/exploits/4484 -https://www.exploit-db.com/exploits/44842/ -https://www.exploit-db.com/exploits/44843/ -https://www.exploit-db.com/exploits/44844/ -https://www.exploit-db.com/exploits/44845/ -https://www.exploit-db.com/exploits/44846/ -https://www.exploit-db.com/exploits/44847/ -https://www.exploit-db.com/exploits/44848/ -https://www.exploit-db.com/exploits/44849/ -https://www.exploit-db.com/exploits/4485 -https://www.exploit-db.com/exploits/44855/ -https://www.exploit-db.com/exploits/44858/ -https://www.exploit-db.com/exploits/44859/ -https://www.exploit-db.com/exploits/4486 -https://www.exploit-db.com/exploits/44860/ -https://www.exploit-db.com/exploits/44861/ -https://www.exploit-db.com/exploits/44864/ -https://www.exploit-db.com/exploits/44865/ -https://www.exploit-db.com/exploits/44866/ -https://www.exploit-db.com/exploits/44867/ -https://www.exploit-db.com/exploits/44870/ -https://www.exploit-db.com/exploits/44873/ -https://www.exploit-db.com/exploits/44874/ -https://www.exploit-db.com/exploits/44876/ -https://www.exploit-db.com/exploits/44881/ -https://www.exploit-db.com/exploits/44882/ -https://www.exploit-db.com/exploits/44885/ -https://www.exploit-db.com/exploits/44886/ -https://www.exploit-db.com/exploits/44887/ -https://www.exploit-db.com/exploits/44888/ -https://www.exploit-db.com/exploits/44889/ -https://www.exploit-db.com/exploits/44890/ -https://www.exploit-db.com/exploits/44892/ -https://www.exploit-db.com/exploits/44893/ -https://www.exploit-db.com/exploits/44895/ -https://www.exploit-db.com/exploits/44897/ -https://www.exploit-db.com/exploits/44899/ -https://www.exploit-db.com/exploits/44900/ -https://www.exploit-db.com/exploits/44904/ -https://www.exploit-db.com/exploits/44905/ -https://www.exploit-db.com/exploits/44906/ -https://www.exploit-db.com/exploits/44908/ -https://www.exploit-db.com/exploits/44909/ -https://www.exploit-db.com/exploits/4491 -https://www.exploit-db.com/exploits/44910/ -https://www.exploit-db.com/exploits/44911/ -https://www.exploit-db.com/exploits/44912/ -https://www.exploit-db.com/exploits/44913/ -https://www.exploit-db.com/exploits/44914/ -https://www.exploit-db.com/exploits/44915/ -https://www.exploit-db.com/exploits/44916/ -https://www.exploit-db.com/exploits/44918/ -https://www.exploit-db.com/exploits/44919/ -https://www.exploit-db.com/exploits/4492 -https://www.exploit-db.com/exploits/44920/ -https://www.exploit-db.com/exploits/44922/ -https://www.exploit-db.com/exploits/44924/ -https://www.exploit-db.com/exploits/44925/ -https://www.exploit-db.com/exploits/44926/ -https://www.exploit-db.com/exploits/44928/ -https://www.exploit-db.com/exploits/4493 -https://www.exploit-db.com/exploits/44931/ -https://www.exploit-db.com/exploits/44933/ -https://www.exploit-db.com/exploits/44934/ -https://www.exploit-db.com/exploits/44935/ -https://www.exploit-db.com/exploits/44938/ -https://www.exploit-db.com/exploits/44939/ -https://www.exploit-db.com/exploits/4494 -https://www.exploit-db.com/exploits/44940/ -https://www.exploit-db.com/exploits/44941/ -https://www.exploit-db.com/exploits/44943/ -https://www.exploit-db.com/exploits/44944/ -https://www.exploit-db.com/exploits/44946/ -https://www.exploit-db.com/exploits/4495 -https://www.exploit-db.com/exploits/44950/ -https://www.exploit-db.com/exploits/44952/ -https://www.exploit-db.com/exploits/44953/ -https://www.exploit-db.com/exploits/44954/ -https://www.exploit-db.com/exploits/44955 -https://www.exploit-db.com/exploits/44956/ -https://www.exploit-db.com/exploits/44959/ -https://www.exploit-db.com/exploits/4496 -https://www.exploit-db.com/exploits/44960/ -https://www.exploit-db.com/exploits/44965/ -https://www.exploit-db.com/exploits/44968/ -https://www.exploit-db.com/exploits/44969/ -https://www.exploit-db.com/exploits/4497 -https://www.exploit-db.com/exploits/44970/ -https://www.exploit-db.com/exploits/44971/ -https://www.exploit-db.com/exploits/44973/ -https://www.exploit-db.com/exploits/44976/ -https://www.exploit-db.com/exploits/44977/ -https://www.exploit-db.com/exploits/44978/ -https://www.exploit-db.com/exploits/4498 -https://www.exploit-db.com/exploits/44981/ -https://www.exploit-db.com/exploits/44982/ -https://www.exploit-db.com/exploits/44983/ -https://www.exploit-db.com/exploits/44984/ -https://www.exploit-db.com/exploits/44985/ -https://www.exploit-db.com/exploits/44986/ -https://www.exploit-db.com/exploits/44987/ -https://www.exploit-db.com/exploits/44994/ -https://www.exploit-db.com/exploits/44997/ -https://www.exploit-db.com/exploits/44998/ -https://www.exploit-db.com/exploits/4500 -https://www.exploit-db.com/exploits/45003/ -https://www.exploit-db.com/exploits/45005/ -https://www.exploit-db.com/exploits/4501 -https://www.exploit-db.com/exploits/45010/ -https://www.exploit-db.com/exploits/45011/ -https://www.exploit-db.com/exploits/45012/ -https://www.exploit-db.com/exploits/45013/ -https://www.exploit-db.com/exploits/45014/ -https://www.exploit-db.com/exploits/45015/ -https://www.exploit-db.com/exploits/45016/ -https://www.exploit-db.com/exploits/45017/ -https://www.exploit-db.com/exploits/45019/ -https://www.exploit-db.com/exploits/4502 -https://www.exploit-db.com/exploits/45020/ -https://www.exploit-db.com/exploits/45021/ -https://www.exploit-db.com/exploits/45022/ -https://www.exploit-db.com/exploits/45024/ -https://www.exploit-db.com/exploits/45027/ -https://www.exploit-db.com/exploits/4503 -https://www.exploit-db.com/exploits/45030/ -https://www.exploit-db.com/exploits/45033/ -https://www.exploit-db.com/exploits/4504 -https://www.exploit-db.com/exploits/45043/ -https://www.exploit-db.com/exploits/45044/ -https://www.exploit-db.com/exploits/45046/ -https://www.exploit-db.com/exploits/45047/ -https://www.exploit-db.com/exploits/45048/ -https://www.exploit-db.com/exploits/4505 -https://www.exploit-db.com/exploits/45053/ -https://www.exploit-db.com/exploits/45056/ -https://www.exploit-db.com/exploits/45057/ -https://www.exploit-db.com/exploits/45058/ -https://www.exploit-db.com/exploits/4506 -https://www.exploit-db.com/exploits/45062/ -https://www.exploit-db.com/exploits/45063/ -https://www.exploit-db.com/exploits/45064/ -https://www.exploit-db.com/exploits/45068 -https://www.exploit-db.com/exploits/4507 -https://www.exploit-db.com/exploits/45070/ -https://www.exploit-db.com/exploits/45076/ -https://www.exploit-db.com/exploits/45078/ -https://www.exploit-db.com/exploits/4508 -https://www.exploit-db.com/exploits/45082/ -https://www.exploit-db.com/exploits/45083/ -https://www.exploit-db.com/exploits/45087/ -https://www.exploit-db.com/exploits/45088/ -https://www.exploit-db.com/exploits/45089/ -https://www.exploit-db.com/exploits/4509 -https://www.exploit-db.com/exploits/45090 -https://www.exploit-db.com/exploits/45091 -https://www.exploit-db.com/exploits/45094/ -https://www.exploit-db.com/exploits/45097/ -https://www.exploit-db.com/exploits/45098/ -https://www.exploit-db.com/exploits/4510 -https://www.exploit-db.com/exploits/45100/ -https://www.exploit-db.com/exploits/45103/ -https://www.exploit-db.com/exploits/45105/ -https://www.exploit-db.com/exploits/45106/ -https://www.exploit-db.com/exploits/45107/ -https://www.exploit-db.com/exploits/45108/ -https://www.exploit-db.com/exploits/4511 -https://www.exploit-db.com/exploits/4512 -https://www.exploit-db.com/exploits/45125/ -https://www.exploit-db.com/exploits/45126/ -https://www.exploit-db.com/exploits/45127/ -https://www.exploit-db.com/exploits/4513 -https://www.exploit-db.com/exploits/45130 -https://www.exploit-db.com/exploits/45132 -https://www.exploit-db.com/exploits/45133/ -https://www.exploit-db.com/exploits/45136/ -https://www.exploit-db.com/exploits/45140/ -https://www.exploit-db.com/exploits/45141/ -https://www.exploit-db.com/exploits/45143/ -https://www.exploit-db.com/exploits/45145/ -https://www.exploit-db.com/exploits/45146/ -https://www.exploit-db.com/exploits/45147/ -https://www.exploit-db.com/exploits/45149/ -https://www.exploit-db.com/exploits/45150/ -https://www.exploit-db.com/exploits/45152/ -https://www.exploit-db.com/exploits/45153/ -https://www.exploit-db.com/exploits/45156/ -https://www.exploit-db.com/exploits/45158 -https://www.exploit-db.com/exploits/4516 -https://www.exploit-db.com/exploits/45160/ -https://www.exploit-db.com/exploits/45161/ -https://www.exploit-db.com/exploits/45167/ -https://www.exploit-db.com/exploits/45169/ -https://www.exploit-db.com/exploits/4517 -https://www.exploit-db.com/exploits/45174/ -https://www.exploit-db.com/exploits/45175/ -https://www.exploit-db.com/exploits/45177/ -https://www.exploit-db.com/exploits/45178/ -https://www.exploit-db.com/exploits/4518 -https://www.exploit-db.com/exploits/45184/ -https://www.exploit-db.com/exploits/45187/ -https://www.exploit-db.com/exploits/4519 -https://www.exploit-db.com/exploits/45190/ -https://www.exploit-db.com/exploits/45192/ -https://www.exploit-db.com/exploits/45193/ -https://www.exploit-db.com/exploits/45195/ -https://www.exploit-db.com/exploits/45196/ -https://www.exploit-db.com/exploits/45197/ -https://www.exploit-db.com/exploits/45198/ -https://www.exploit-db.com/exploits/45199/ -https://www.exploit-db.com/exploits/4520 -https://www.exploit-db.com/exploits/45200/ -https://www.exploit-db.com/exploits/45202/ -https://www.exploit-db.com/exploits/45203/ -https://www.exploit-db.com/exploits/45205/ -https://www.exploit-db.com/exploits/45206/ -https://www.exploit-db.com/exploits/45208/ -https://www.exploit-db.com/exploits/4521 -https://www.exploit-db.com/exploits/45210/ -https://www.exploit-db.com/exploits/45212/ -https://www.exploit-db.com/exploits/45213/ -https://www.exploit-db.com/exploits/45214/ -https://www.exploit-db.com/exploits/45215/ -https://www.exploit-db.com/exploits/45217/ -https://www.exploit-db.com/exploits/45218/ -https://www.exploit-db.com/exploits/45219/ -https://www.exploit-db.com/exploits/4522 -https://www.exploit-db.com/exploits/45220/ -https://www.exploit-db.com/exploits/45224/ -https://www.exploit-db.com/exploits/45225/ -https://www.exploit-db.com/exploits/45227/ -https://www.exploit-db.com/exploits/4523 -https://www.exploit-db.com/exploits/45233/ -https://www.exploit-db.com/exploits/45234/ -https://www.exploit-db.com/exploits/4524 -https://www.exploit-db.com/exploits/45240/ -https://www.exploit-db.com/exploits/45242/ -https://www.exploit-db.com/exploits/45244/ -https://www.exploit-db.com/exploits/45253/ -https://www.exploit-db.com/exploits/45254/ -https://www.exploit-db.com/exploits/45255/ -https://www.exploit-db.com/exploits/45256/ -https://www.exploit-db.com/exploits/45258/ -https://www.exploit-db.com/exploits/4526 -https://www.exploit-db.com/exploits/45260/ -https://www.exploit-db.com/exploits/45262/ -https://www.exploit-db.com/exploits/45263 -https://www.exploit-db.com/exploits/45263/ -https://www.exploit-db.com/exploits/45264/ -https://www.exploit-db.com/exploits/45268/ -https://www.exploit-db.com/exploits/45269/ -https://www.exploit-db.com/exploits/4527 -https://www.exploit-db.com/exploits/45271/ -https://www.exploit-db.com/exploits/45272/ -https://www.exploit-db.com/exploits/45273/ -https://www.exploit-db.com/exploits/45274/ -https://www.exploit-db.com/exploits/45279/ -https://www.exploit-db.com/exploits/4528 -https://www.exploit-db.com/exploits/45284/ -https://www.exploit-db.com/exploits/4529 -https://www.exploit-db.com/exploits/45296/ -https://www.exploit-db.com/exploits/4530 -https://www.exploit-db.com/exploits/45303/ -https://www.exploit-db.com/exploits/45305/ -https://www.exploit-db.com/exploits/45306/ -https://www.exploit-db.com/exploits/45307/ -https://www.exploit-db.com/exploits/45309/ -https://www.exploit-db.com/exploits/4531 -https://www.exploit-db.com/exploits/45313/ -https://www.exploit-db.com/exploits/45314/ -https://www.exploit-db.com/exploits/45317/ -https://www.exploit-db.com/exploits/45319/ -https://www.exploit-db.com/exploits/4532 -https://www.exploit-db.com/exploits/45326/ -https://www.exploit-db.com/exploits/45328/ -https://www.exploit-db.com/exploits/4533 -https://www.exploit-db.com/exploits/45332/ -https://www.exploit-db.com/exploits/45336/ -https://www.exploit-db.com/exploits/45338/ -https://www.exploit-db.com/exploits/45339/ -https://www.exploit-db.com/exploits/4534 -https://www.exploit-db.com/exploits/45340/ -https://www.exploit-db.com/exploits/45341/ -https://www.exploit-db.com/exploits/45342/ -https://www.exploit-db.com/exploits/45348/ -https://www.exploit-db.com/exploits/4535 -https://www.exploit-db.com/exploits/45351/ -https://www.exploit-db.com/exploits/4536 -https://www.exploit-db.com/exploits/45367/ -https://www.exploit-db.com/exploits/45369/ -https://www.exploit-db.com/exploits/45379/ -https://www.exploit-db.com/exploits/4538 -https://www.exploit-db.com/exploits/45384/ -https://www.exploit-db.com/exploits/45385/ -https://www.exploit-db.com/exploits/45386/ -https://www.exploit-db.com/exploits/45387/ -https://www.exploit-db.com/exploits/4539 -https://www.exploit-db.com/exploits/45391/ -https://www.exploit-db.com/exploits/45392/ -https://www.exploit-db.com/exploits/45393/ -https://www.exploit-db.com/exploits/45394/ -https://www.exploit-db.com/exploits/45396/ -https://www.exploit-db.com/exploits/45400/ -https://www.exploit-db.com/exploits/45403 -https://www.exploit-db.com/exploits/45409/ -https://www.exploit-db.com/exploits/45412 -https://www.exploit-db.com/exploits/4542 -https://www.exploit-db.com/exploits/45423/ -https://www.exploit-db.com/exploits/45425/ -https://www.exploit-db.com/exploits/45429/ -https://www.exploit-db.com/exploits/4543 -https://www.exploit-db.com/exploits/45431/ -https://www.exploit-db.com/exploits/45432/ -https://www.exploit-db.com/exploits/45433/ -https://www.exploit-db.com/exploits/45434/ -https://www.exploit-db.com/exploits/45435/ -https://www.exploit-db.com/exploits/45436/ -https://www.exploit-db.com/exploits/45437/ -https://www.exploit-db.com/exploits/45438/ -https://www.exploit-db.com/exploits/45439/ -https://www.exploit-db.com/exploits/4544 -https://www.exploit-db.com/exploits/45440/ -https://www.exploit-db.com/exploits/45443/ -https://www.exploit-db.com/exploits/45444/ -https://www.exploit-db.com/exploits/45447/ -https://www.exploit-db.com/exploits/45448/ -https://www.exploit-db.com/exploits/45449/ -https://www.exploit-db.com/exploits/4545 -https://www.exploit-db.com/exploits/45451 -https://www.exploit-db.com/exploits/45452 -https://www.exploit-db.com/exploits/45456 -https://www.exploit-db.com/exploits/4546 -https://www.exploit-db.com/exploits/45462 -https://www.exploit-db.com/exploits/45463/ -https://www.exploit-db.com/exploits/45464/ -https://www.exploit-db.com/exploits/45465/ -https://www.exploit-db.com/exploits/45466/ -https://www.exploit-db.com/exploits/45468/ -https://www.exploit-db.com/exploits/45469/ -https://www.exploit-db.com/exploits/4547 -https://www.exploit-db.com/exploits/45470/ -https://www.exploit-db.com/exploits/45473/ -https://www.exploit-db.com/exploits/45474/ -https://www.exploit-db.com/exploits/45475/ -https://www.exploit-db.com/exploits/45476/ -https://www.exploit-db.com/exploits/45477/ -https://www.exploit-db.com/exploits/45478/ -https://www.exploit-db.com/exploits/45479/ -https://www.exploit-db.com/exploits/4548 -https://www.exploit-db.com/exploits/4549 -https://www.exploit-db.com/exploits/45497/ -https://www.exploit-db.com/exploits/4550 -https://www.exploit-db.com/exploits/45500/ -https://www.exploit-db.com/exploits/45501/ -https://www.exploit-db.com/exploits/45502/ -https://www.exploit-db.com/exploits/45503/ -https://www.exploit-db.com/exploits/45505/ -https://www.exploit-db.com/exploits/45509 -https://www.exploit-db.com/exploits/4551 -https://www.exploit-db.com/exploits/45510 -https://www.exploit-db.com/exploits/45511 -https://www.exploit-db.com/exploits/45514/ -https://www.exploit-db.com/exploits/45516/ -https://www.exploit-db.com/exploits/45518/ -https://www.exploit-db.com/exploits/45524 -https://www.exploit-db.com/exploits/45525/ -https://www.exploit-db.com/exploits/45526/ -https://www.exploit-db.com/exploits/4553 -https://www.exploit-db.com/exploits/45530/ -https://www.exploit-db.com/exploits/45533/ -https://www.exploit-db.com/exploits/4554 -https://www.exploit-db.com/exploits/45542 -https://www.exploit-db.com/exploits/45542/ -https://www.exploit-db.com/exploits/45547/ -https://www.exploit-db.com/exploits/45548/ -https://www.exploit-db.com/exploits/4555 -https://www.exploit-db.com/exploits/45553/ -https://www.exploit-db.com/exploits/45555/ -https://www.exploit-db.com/exploits/45558/ -https://www.exploit-db.com/exploits/45559/ -https://www.exploit-db.com/exploits/4556 -https://www.exploit-db.com/exploits/45560/ -https://www.exploit-db.com/exploits/45561/ -https://www.exploit-db.com/exploits/45562/ -https://www.exploit-db.com/exploits/45564/ -https://www.exploit-db.com/exploits/45568/ -https://www.exploit-db.com/exploits/45571/ -https://www.exploit-db.com/exploits/45572/ -https://www.exploit-db.com/exploits/45573/ -https://www.exploit-db.com/exploits/45574/ -https://www.exploit-db.com/exploits/45575/ -https://www.exploit-db.com/exploits/45577/ -https://www.exploit-db.com/exploits/45578/ -https://www.exploit-db.com/exploits/4558 -https://www.exploit-db.com/exploits/45581/ -https://www.exploit-db.com/exploits/45583/ -https://www.exploit-db.com/exploits/45585/ -https://www.exploit-db.com/exploits/45586/ -https://www.exploit-db.com/exploits/45587/ -https://www.exploit-db.com/exploits/45590/ -https://www.exploit-db.com/exploits/45594/ -https://www.exploit-db.com/exploits/45604/ -https://www.exploit-db.com/exploits/4561 -https://www.exploit-db.com/exploits/45610/ -https://www.exploit-db.com/exploits/45611/ -https://www.exploit-db.com/exploits/4562 -https://www.exploit-db.com/exploits/45624/ -https://www.exploit-db.com/exploits/45625/ -https://www.exploit-db.com/exploits/45626/ -https://www.exploit-db.com/exploits/45628/ -https://www.exploit-db.com/exploits/4563 -https://www.exploit-db.com/exploits/45631/ -https://www.exploit-db.com/exploits/45632/ -https://www.exploit-db.com/exploits/45637/ -https://www.exploit-db.com/exploits/45638/ -https://www.exploit-db.com/exploits/4565 -https://www.exploit-db.com/exploits/45653/ -https://www.exploit-db.com/exploits/4566 -https://www.exploit-db.com/exploits/45668/ -https://www.exploit-db.com/exploits/4567 -https://www.exploit-db.com/exploits/45671/ -https://www.exploit-db.com/exploits/45672/ -https://www.exploit-db.com/exploits/45680/ -https://www.exploit-db.com/exploits/45681/ -https://www.exploit-db.com/exploits/45682/ -https://www.exploit-db.com/exploits/45686/ -https://www.exploit-db.com/exploits/45687/ -https://www.exploit-db.com/exploits/45691/ -https://www.exploit-db.com/exploits/45694/ -https://www.exploit-db.com/exploits/45695/ -https://www.exploit-db.com/exploits/45696/ -https://www.exploit-db.com/exploits/45697/ -https://www.exploit-db.com/exploits/4570 -https://www.exploit-db.com/exploits/45703 -https://www.exploit-db.com/exploits/45704/ -https://www.exploit-db.com/exploits/45707 -https://www.exploit-db.com/exploits/4571 -https://www.exploit-db.com/exploits/45712/ -https://www.exploit-db.com/exploits/45714/ -https://www.exploit-db.com/exploits/45715/ -https://www.exploit-db.com/exploits/45716/ -https://www.exploit-db.com/exploits/45718 -https://www.exploit-db.com/exploits/45719/ -https://www.exploit-db.com/exploits/4572 -https://www.exploit-db.com/exploits/45720/ -https://www.exploit-db.com/exploits/45721/ -https://www.exploit-db.com/exploits/45722/ -https://www.exploit-db.com/exploits/45723/ -https://www.exploit-db.com/exploits/45724/ -https://www.exploit-db.com/exploits/45725/ -https://www.exploit-db.com/exploits/45726/ -https://www.exploit-db.com/exploits/45727/ -https://www.exploit-db.com/exploits/45728/ -https://www.exploit-db.com/exploits/45729/ -https://www.exploit-db.com/exploits/45730/ -https://www.exploit-db.com/exploits/45731/ -https://www.exploit-db.com/exploits/45732/ -https://www.exploit-db.com/exploits/45733/ -https://www.exploit-db.com/exploits/45734/ -https://www.exploit-db.com/exploits/45735/ -https://www.exploit-db.com/exploits/45742/ -https://www.exploit-db.com/exploits/4575 -https://www.exploit-db.com/exploits/45755/ -https://www.exploit-db.com/exploits/4576 -https://www.exploit-db.com/exploits/45760 -https://www.exploit-db.com/exploits/4577 -https://www.exploit-db.com/exploits/45774/ -https://www.exploit-db.com/exploits/45776/ -https://www.exploit-db.com/exploits/4578 -https://www.exploit-db.com/exploits/45780/ -https://www.exploit-db.com/exploits/45782/ -https://www.exploit-db.com/exploits/45783/ -https://www.exploit-db.com/exploits/45785/ -https://www.exploit-db.com/exploits/4579 -https://www.exploit-db.com/exploits/45790/ -https://www.exploit-db.com/exploits/45793/ -https://www.exploit-db.com/exploits/45798/ -https://www.exploit-db.com/exploits/4580 -https://www.exploit-db.com/exploits/45804/ -https://www.exploit-db.com/exploits/45808 -https://www.exploit-db.com/exploits/45809/ -https://www.exploit-db.com/exploits/4581 -https://www.exploit-db.com/exploits/4582 -https://www.exploit-db.com/exploits/45822/ -https://www.exploit-db.com/exploits/45824/ -https://www.exploit-db.com/exploits/45829/ -https://www.exploit-db.com/exploits/4583 -https://www.exploit-db.com/exploits/45832/ -https://www.exploit-db.com/exploits/45839/ -https://www.exploit-db.com/exploits/4584 -https://www.exploit-db.com/exploits/45846/ -https://www.exploit-db.com/exploits/4585 -https://www.exploit-db.com/exploits/45852/ -https://www.exploit-db.com/exploits/45853/ -https://www.exploit-db.com/exploits/45854/ -https://www.exploit-db.com/exploits/4586 -https://www.exploit-db.com/exploits/45861/ -https://www.exploit-db.com/exploits/4587 -https://www.exploit-db.com/exploits/4588 -https://www.exploit-db.com/exploits/45880/ -https://www.exploit-db.com/exploits/45883/ -https://www.exploit-db.com/exploits/45884 -https://www.exploit-db.com/exploits/45886/ -https://www.exploit-db.com/exploits/45890/ -https://www.exploit-db.com/exploits/45892 -https://www.exploit-db.com/exploits/45893/ -https://www.exploit-db.com/exploits/4590 -https://www.exploit-db.com/exploits/45900/ -https://www.exploit-db.com/exploits/45902/ -https://www.exploit-db.com/exploits/45908/ -https://www.exploit-db.com/exploits/45909/ -https://www.exploit-db.com/exploits/4591 -https://www.exploit-db.com/exploits/45913/ -https://www.exploit-db.com/exploits/45914/ -https://www.exploit-db.com/exploits/45915/ -https://www.exploit-db.com/exploits/45916/ -https://www.exploit-db.com/exploits/45918/ -https://www.exploit-db.com/exploits/4592 -https://www.exploit-db.com/exploits/45922/ -https://www.exploit-db.com/exploits/45923/ -https://www.exploit-db.com/exploits/45924/ -https://www.exploit-db.com/exploits/45926/ -https://www.exploit-db.com/exploits/45928/ -https://www.exploit-db.com/exploits/4593 -https://www.exploit-db.com/exploits/45933/ -https://www.exploit-db.com/exploits/45936/ -https://www.exploit-db.com/exploits/45937/ -https://www.exploit-db.com/exploits/45938/ -https://www.exploit-db.com/exploits/45939/ -https://www.exploit-db.com/exploits/4594 -https://www.exploit-db.com/exploits/45941/ -https://www.exploit-db.com/exploits/45942/ -https://www.exploit-db.com/exploits/45945/ -https://www.exploit-db.com/exploits/45946/ -https://www.exploit-db.com/exploits/45947/ -https://www.exploit-db.com/exploits/45948/ -https://www.exploit-db.com/exploits/45949/ -https://www.exploit-db.com/exploits/45951/ -https://www.exploit-db.com/exploits/45952/ -https://www.exploit-db.com/exploits/45954/ -https://www.exploit-db.com/exploits/45957 -https://www.exploit-db.com/exploits/45958/ -https://www.exploit-db.com/exploits/4596 -https://www.exploit-db.com/exploits/45961/ -https://www.exploit-db.com/exploits/45964/ -https://www.exploit-db.com/exploits/45967/ -https://www.exploit-db.com/exploits/45969 -https://www.exploit-db.com/exploits/4597 -https://www.exploit-db.com/exploits/45970/ -https://www.exploit-db.com/exploits/45971/ -https://www.exploit-db.com/exploits/45972/ -https://www.exploit-db.com/exploits/45976 -https://www.exploit-db.com/exploits/45979/ -https://www.exploit-db.com/exploits/4598 -https://www.exploit-db.com/exploits/45982 -https://www.exploit-db.com/exploits/45985/ -https://www.exploit-db.com/exploits/45986/ -https://www.exploit-db.com/exploits/45987 -https://www.exploit-db.com/exploits/45989/ -https://www.exploit-db.com/exploits/4599 -https://www.exploit-db.com/exploits/45990/ -https://www.exploit-db.com/exploits/45991/ -https://www.exploit-db.com/exploits/45998/ -https://www.exploit-db.com/exploits/45999/ -https://www.exploit-db.com/exploits/4600 -https://www.exploit-db.com/exploits/46000/ -https://www.exploit-db.com/exploits/46001/ -https://www.exploit-db.com/exploits/46006/ -https://www.exploit-db.com/exploits/4601 -https://www.exploit-db.com/exploits/46011 -https://www.exploit-db.com/exploits/46012/ -https://www.exploit-db.com/exploits/46013/ -https://www.exploit-db.com/exploits/46014/ -https://www.exploit-db.com/exploits/46015/ -https://www.exploit-db.com/exploits/46017/ -https://www.exploit-db.com/exploits/4602 -https://www.exploit-db.com/exploits/46022/ -https://www.exploit-db.com/exploits/46023/ -https://www.exploit-db.com/exploits/46034/ -https://www.exploit-db.com/exploits/46036/ -https://www.exploit-db.com/exploits/46037 -https://www.exploit-db.com/exploits/4604 -https://www.exploit-db.com/exploits/46048/ -https://www.exploit-db.com/exploits/4605 -https://www.exploit-db.com/exploits/46051/ -https://www.exploit-db.com/exploits/46052/ -https://www.exploit-db.com/exploits/46053/ -https://www.exploit-db.com/exploits/46054/ -https://www.exploit-db.com/exploits/4606 -https://www.exploit-db.com/exploits/46060/ -https://www.exploit-db.com/exploits/46065 -https://www.exploit-db.com/exploits/46067/ -https://www.exploit-db.com/exploits/4607 -https://www.exploit-db.com/exploits/46070/ -https://www.exploit-db.com/exploits/46079/ -https://www.exploit-db.com/exploits/4608 -https://www.exploit-db.com/exploits/46080/ -https://www.exploit-db.com/exploits/46081/ -https://www.exploit-db.com/exploits/46085/ -https://www.exploit-db.com/exploits/46086/ -https://www.exploit-db.com/exploits/4609 -https://www.exploit-db.com/exploits/46092/ -https://www.exploit-db.com/exploits/46093/ -https://www.exploit-db.com/exploits/4610 -https://www.exploit-db.com/exploits/46101/ -https://www.exploit-db.com/exploits/46102/ -https://www.exploit-db.com/exploits/46104/ -https://www.exploit-db.com/exploits/46106/ -https://www.exploit-db.com/exploits/46108/ -https://www.exploit-db.com/exploits/46109 -https://www.exploit-db.com/exploits/4611 -https://www.exploit-db.com/exploits/46118/ -https://www.exploit-db.com/exploits/4613 -https://www.exploit-db.com/exploits/46139 -https://www.exploit-db.com/exploits/4614 -https://www.exploit-db.com/exploits/46140 -https://www.exploit-db.com/exploits/46142/ -https://www.exploit-db.com/exploits/46143 -https://www.exploit-db.com/exploits/46148 -https://www.exploit-db.com/exploits/46149/ -https://www.exploit-db.com/exploits/46153 -https://www.exploit-db.com/exploits/46155/ -https://www.exploit-db.com/exploits/46156/ -https://www.exploit-db.com/exploits/46157/ -https://www.exploit-db.com/exploits/46158/ -https://www.exploit-db.com/exploits/46159/ -https://www.exploit-db.com/exploits/46160/ -https://www.exploit-db.com/exploits/46161/ -https://www.exploit-db.com/exploits/46162/ -https://www.exploit-db.com/exploits/46163/ -https://www.exploit-db.com/exploits/46164/ -https://www.exploit-db.com/exploits/46165/ -https://www.exploit-db.com/exploits/4617 -https://www.exploit-db.com/exploits/46174/ -https://www.exploit-db.com/exploits/46175/ -https://www.exploit-db.com/exploits/46176/ -https://www.exploit-db.com/exploits/46177/ -https://www.exploit-db.com/exploits/46178/ -https://www.exploit-db.com/exploits/46179/ -https://www.exploit-db.com/exploits/4618 -https://www.exploit-db.com/exploits/46180 -https://www.exploit-db.com/exploits/46180/ -https://www.exploit-db.com/exploits/46182/ -https://www.exploit-db.com/exploits/46184/ -https://www.exploit-db.com/exploits/46185/ -https://www.exploit-db.com/exploits/46186/ -https://www.exploit-db.com/exploits/46187/ -https://www.exploit-db.com/exploits/4619 -https://www.exploit-db.com/exploits/46193/ -https://www.exploit-db.com/exploits/4620 -https://www.exploit-db.com/exploits/46200/ -https://www.exploit-db.com/exploits/46201 -https://www.exploit-db.com/exploits/46202/ -https://www.exploit-db.com/exploits/46203/ -https://www.exploit-db.com/exploits/46204/ -https://www.exploit-db.com/exploits/46205/ -https://www.exploit-db.com/exploits/46206/ -https://www.exploit-db.com/exploits/46208/ -https://www.exploit-db.com/exploits/4621 -https://www.exploit-db.com/exploits/46215/ -https://www.exploit-db.com/exploits/4622 -https://www.exploit-db.com/exploits/46221/ -https://www.exploit-db.com/exploits/4623 -https://www.exploit-db.com/exploits/46237/ -https://www.exploit-db.com/exploits/46240/ -https://www.exploit-db.com/exploits/46242/ -https://www.exploit-db.com/exploits/46243/ -https://www.exploit-db.com/exploits/46247/ -https://www.exploit-db.com/exploits/46248/ -https://www.exploit-db.com/exploits/46250/ -https://www.exploit-db.com/exploits/46251/ -https://www.exploit-db.com/exploits/46253/ -https://www.exploit-db.com/exploits/46254/ -https://www.exploit-db.com/exploits/4626 -https://www.exploit-db.com/exploits/46261/ -https://www.exploit-db.com/exploits/46262/ -https://www.exploit-db.com/exploits/46263/ -https://www.exploit-db.com/exploits/4627 -https://www.exploit-db.com/exploits/46273/ -https://www.exploit-db.com/exploits/4628 -https://www.exploit-db.com/exploits/46285/ -https://www.exploit-db.com/exploits/46296/ -https://www.exploit-db.com/exploits/46297/ -https://www.exploit-db.com/exploits/46298/ -https://www.exploit-db.com/exploits/46299/ -https://www.exploit-db.com/exploits/4630 -https://www.exploit-db.com/exploits/46300/ -https://www.exploit-db.com/exploits/46305/ -https://www.exploit-db.com/exploits/4631 -https://www.exploit-db.com/exploits/4632 -https://www.exploit-db.com/exploits/46326/ -https://www.exploit-db.com/exploits/46327/ -https://www.exploit-db.com/exploits/4633 -https://www.exploit-db.com/exploits/46337 -https://www.exploit-db.com/exploits/46339/ -https://www.exploit-db.com/exploits/4634 -https://www.exploit-db.com/exploits/46340/ -https://www.exploit-db.com/exploits/46341/ -https://www.exploit-db.com/exploits/46342/ -https://www.exploit-db.com/exploits/46347 -https://www.exploit-db.com/exploits/46349/ -https://www.exploit-db.com/exploits/4635 -https://www.exploit-db.com/exploits/46353/ -https://www.exploit-db.com/exploits/46356/ -https://www.exploit-db.com/exploits/46357/ -https://www.exploit-db.com/exploits/46358/ -https://www.exploit-db.com/exploits/46359/ -https://www.exploit-db.com/exploits/4636 -https://www.exploit-db.com/exploits/46361 -https://www.exploit-db.com/exploits/46362 -https://www.exploit-db.com/exploits/46363/ -https://www.exploit-db.com/exploits/46364/ -https://www.exploit-db.com/exploits/46365/ -https://www.exploit-db.com/exploits/46366/ -https://www.exploit-db.com/exploits/46369/ -https://www.exploit-db.com/exploits/4637 -https://www.exploit-db.com/exploits/46372/ -https://www.exploit-db.com/exploits/46373/ -https://www.exploit-db.com/exploits/46374/ -https://www.exploit-db.com/exploits/46375/ -https://www.exploit-db.com/exploits/46376/ -https://www.exploit-db.com/exploits/46377/ -https://www.exploit-db.com/exploits/46379/ -https://www.exploit-db.com/exploits/4638 -https://www.exploit-db.com/exploits/46380 -https://www.exploit-db.com/exploits/46381 -https://www.exploit-db.com/exploits/46384/ -https://www.exploit-db.com/exploits/46386/ -https://www.exploit-db.com/exploits/46388/ -https://www.exploit-db.com/exploits/46392/ -https://www.exploit-db.com/exploits/46398/ -https://www.exploit-db.com/exploits/46399/ -https://www.exploit-db.com/exploits/4640 -https://www.exploit-db.com/exploits/46400/ -https://www.exploit-db.com/exploits/46401/ -https://www.exploit-db.com/exploits/46404 -https://www.exploit-db.com/exploits/46405/ -https://www.exploit-db.com/exploits/4641 -https://www.exploit-db.com/exploits/46413/ -https://www.exploit-db.com/exploits/46414/ -https://www.exploit-db.com/exploits/46416 -https://www.exploit-db.com/exploits/4642 -https://www.exploit-db.com/exploits/46424/ -https://www.exploit-db.com/exploits/46425/ -https://www.exploit-db.com/exploits/46428/ -https://www.exploit-db.com/exploits/46429/ -https://www.exploit-db.com/exploits/46431/ -https://www.exploit-db.com/exploits/46433/ -https://www.exploit-db.com/exploits/46436 -https://www.exploit-db.com/exploits/46443 -https://www.exploit-db.com/exploits/46444/ -https://www.exploit-db.com/exploits/46445 -https://www.exploit-db.com/exploits/46446/ -https://www.exploit-db.com/exploits/46448/ -https://www.exploit-db.com/exploits/46449/ -https://www.exploit-db.com/exploits/4645 -https://www.exploit-db.com/exploits/46450/ -https://www.exploit-db.com/exploits/46452/ -https://www.exploit-db.com/exploits/46453/ -https://www.exploit-db.com/exploits/46454/ -https://www.exploit-db.com/exploits/46459/ -https://www.exploit-db.com/exploits/4646 -https://www.exploit-db.com/exploits/46464 -https://www.exploit-db.com/exploits/46465/ -https://www.exploit-db.com/exploits/46467/ -https://www.exploit-db.com/exploits/46469/ -https://www.exploit-db.com/exploits/4647 -https://www.exploit-db.com/exploits/46471 -https://www.exploit-db.com/exploits/46477/ -https://www.exploit-db.com/exploits/46479/ -https://www.exploit-db.com/exploits/4648 -https://www.exploit-db.com/exploits/46481/ -https://www.exploit-db.com/exploits/46485/ -https://www.exploit-db.com/exploits/46486 -https://www.exploit-db.com/exploits/46488/ -https://www.exploit-db.com/exploits/4649 -https://www.exploit-db.com/exploits/46494 -https://www.exploit-db.com/exploits/46495 -https://www.exploit-db.com/exploits/46496 -https://www.exploit-db.com/exploits/46498 -https://www.exploit-db.com/exploits/4650 -https://www.exploit-db.com/exploits/46502/ -https://www.exploit-db.com/exploits/46508/ -https://www.exploit-db.com/exploits/46510/ -https://www.exploit-db.com/exploits/46511/ -https://www.exploit-db.com/exploits/46513/ -https://www.exploit-db.com/exploits/46518/ -https://www.exploit-db.com/exploits/4652 -https://www.exploit-db.com/exploits/46520/ -https://www.exploit-db.com/exploits/46525 -https://www.exploit-db.com/exploits/46526 -https://www.exploit-db.com/exploits/46527/ -https://www.exploit-db.com/exploits/46529/ -https://www.exploit-db.com/exploits/4653 -https://www.exploit-db.com/exploits/46531 -https://www.exploit-db.com/exploits/46534 -https://www.exploit-db.com/exploits/46535 -https://www.exploit-db.com/exploits/46536/ -https://www.exploit-db.com/exploits/46538/ -https://www.exploit-db.com/exploits/46539/ -https://www.exploit-db.com/exploits/46540/ -https://www.exploit-db.com/exploits/46543/ -https://www.exploit-db.com/exploits/46545 -https://www.exploit-db.com/exploits/46546/ -https://www.exploit-db.com/exploits/46549/ -https://www.exploit-db.com/exploits/4655 -https://www.exploit-db.com/exploits/46551/ -https://www.exploit-db.com/exploits/46552/ -https://www.exploit-db.com/exploits/46556/ -https://www.exploit-db.com/exploits/46558/ -https://www.exploit-db.com/exploits/46572/ -https://www.exploit-db.com/exploits/46580/ -https://www.exploit-db.com/exploits/46581/ -https://www.exploit-db.com/exploits/46584/ -https://www.exploit-db.com/exploits/46585/ -https://www.exploit-db.com/exploits/46589/ -https://www.exploit-db.com/exploits/4659 -https://www.exploit-db.com/exploits/46594 -https://www.exploit-db.com/exploits/4660 -https://www.exploit-db.com/exploits/46600/ -https://www.exploit-db.com/exploits/46608/ -https://www.exploit-db.com/exploits/46611 -https://www.exploit-db.com/exploits/46611/ -https://www.exploit-db.com/exploits/46617/ -https://www.exploit-db.com/exploits/46627/ -https://www.exploit-db.com/exploits/46628/ -https://www.exploit-db.com/exploits/46629 -https://www.exploit-db.com/exploits/4663 -https://www.exploit-db.com/exploits/46632/ -https://www.exploit-db.com/exploits/46633/ -https://www.exploit-db.com/exploits/46634/ -https://www.exploit-db.com/exploits/46635/ -https://www.exploit-db.com/exploits/46641 -https://www.exploit-db.com/exploits/46641/ -https://www.exploit-db.com/exploits/4665 -https://www.exploit-db.com/exploits/46655/ -https://www.exploit-db.com/exploits/46659 -https://www.exploit-db.com/exploits/4666 -https://www.exploit-db.com/exploits/46662/ -https://www.exploit-db.com/exploits/46664/ -https://www.exploit-db.com/exploits/46666/ -https://www.exploit-db.com/exploits/46667/ -https://www.exploit-db.com/exploits/46669 -https://www.exploit-db.com/exploits/46669/ -https://www.exploit-db.com/exploits/46674/ -https://www.exploit-db.com/exploits/46675/ -https://www.exploit-db.com/exploits/46676/ -https://www.exploit-db.com/exploits/46677/ -https://www.exploit-db.com/exploits/46678/ -https://www.exploit-db.com/exploits/4668 -https://www.exploit-db.com/exploits/46683/ -https://www.exploit-db.com/exploits/46687 -https://www.exploit-db.com/exploits/46688/ -https://www.exploit-db.com/exploits/4669 -https://www.exploit-db.com/exploits/46691/ -https://www.exploit-db.com/exploits/46693/ -https://www.exploit-db.com/exploits/46694 -https://www.exploit-db.com/exploits/46698/ -https://www.exploit-db.com/exploits/4670 -https://www.exploit-db.com/exploits/46705/ -https://www.exploit-db.com/exploits/46706/ -https://www.exploit-db.com/exploits/4671 -https://www.exploit-db.com/exploits/46710/ -https://www.exploit-db.com/exploits/46712/ -https://www.exploit-db.com/exploits/46713/ -https://www.exploit-db.com/exploits/46714/ -https://www.exploit-db.com/exploits/46715/ -https://www.exploit-db.com/exploits/46716/ -https://www.exploit-db.com/exploits/46717/ -https://www.exploit-db.com/exploits/46718/ -https://www.exploit-db.com/exploits/4672 -https://www.exploit-db.com/exploits/46720 -https://www.exploit-db.com/exploits/46720/ -https://www.exploit-db.com/exploits/46725 -https://www.exploit-db.com/exploits/46725/ -https://www.exploit-db.com/exploits/46726/ -https://www.exploit-db.com/exploits/46727/ -https://www.exploit-db.com/exploits/4673 -https://www.exploit-db.com/exploits/46730/ -https://www.exploit-db.com/exploits/46731/ -https://www.exploit-db.com/exploits/46733/ -https://www.exploit-db.com/exploits/46738/ -https://www.exploit-db.com/exploits/46739/ -https://www.exploit-db.com/exploits/4674 -https://www.exploit-db.com/exploits/46740 -https://www.exploit-db.com/exploits/46740/ -https://www.exploit-db.com/exploits/46741/ -https://www.exploit-db.com/exploits/46743/ -https://www.exploit-db.com/exploits/46747/ -https://www.exploit-db.com/exploits/4675 -https://www.exploit-db.com/exploits/46751/ -https://www.exploit-db.com/exploits/46752/ -https://www.exploit-db.com/exploits/46753 -https://www.exploit-db.com/exploits/46753/ -https://www.exploit-db.com/exploits/46756/ -https://www.exploit-db.com/exploits/46759/ -https://www.exploit-db.com/exploits/4676 -https://www.exploit-db.com/exploits/46765 -https://www.exploit-db.com/exploits/46766 -https://www.exploit-db.com/exploits/46767 -https://www.exploit-db.com/exploits/46768/ -https://www.exploit-db.com/exploits/4677 -https://www.exploit-db.com/exploits/46770/ -https://www.exploit-db.com/exploits/46771/ -https://www.exploit-db.com/exploits/46773/ -https://www.exploit-db.com/exploits/4678 -https://www.exploit-db.com/exploits/46780/ -https://www.exploit-db.com/exploits/46781/ -https://www.exploit-db.com/exploits/46783/ -https://www.exploit-db.com/exploits/46784/ -https://www.exploit-db.com/exploits/46785/ -https://www.exploit-db.com/exploits/46786/ -https://www.exploit-db.com/exploits/46788/ -https://www.exploit-db.com/exploits/4679 -https://www.exploit-db.com/exploits/46793/ -https://www.exploit-db.com/exploits/46794/ -https://www.exploit-db.com/exploits/46795/ -https://www.exploit-db.com/exploits/46796/ -https://www.exploit-db.com/exploits/4680 -https://www.exploit-db.com/exploits/4681 -https://www.exploit-db.com/exploits/4682 -https://www.exploit-db.com/exploits/4683 -https://www.exploit-db.com/exploits/46839 -https://www.exploit-db.com/exploits/4684 -https://www.exploit-db.com/exploits/46841 -https://www.exploit-db.com/exploits/4685 -https://www.exploit-db.com/exploits/46853 -https://www.exploit-db.com/exploits/4686 -https://www.exploit-db.com/exploits/4687 -https://www.exploit-db.com/exploits/4690 -https://www.exploit-db.com/exploits/46903 -https://www.exploit-db.com/exploits/4691 -https://www.exploit-db.com/exploits/4692 -https://www.exploit-db.com/exploits/4693 -https://www.exploit-db.com/exploits/4694 -https://www.exploit-db.com/exploits/4695 -https://www.exploit-db.com/exploits/4696 -https://www.exploit-db.com/exploits/4697 -https://www.exploit-db.com/exploits/46984 -https://www.exploit-db.com/exploits/46991 -https://www.exploit-db.com/exploits/46992 -https://www.exploit-db.com/exploits/46993 -https://www.exploit-db.com/exploits/46999 -https://www.exploit-db.com/exploits/4700 -https://www.exploit-db.com/exploits/47013 -https://www.exploit-db.com/exploits/47030 -https://www.exploit-db.com/exploits/47034 -https://www.exploit-db.com/exploits/4704 -https://www.exploit-db.com/exploits/4705 -https://www.exploit-db.com/exploits/47059 -https://www.exploit-db.com/exploits/4706 -https://www.exploit-db.com/exploits/47060 -https://www.exploit-db.com/exploits/47062 -https://www.exploit-db.com/exploits/47066 -https://www.exploit-db.com/exploits/4707 -https://www.exploit-db.com/exploits/4708 -https://www.exploit-db.com/exploits/4709 -https://www.exploit-db.com/exploits/47109 -https://www.exploit-db.com/exploits/4711 -https://www.exploit-db.com/exploits/47110 -https://www.exploit-db.com/exploits/4712 -https://www.exploit-db.com/exploits/47123 -https://www.exploit-db.com/exploits/47138 -https://www.exploit-db.com/exploits/47150 -https://www.exploit-db.com/exploits/4716 -https://www.exploit-db.com/exploits/4717 -https://www.exploit-db.com/exploits/4719 -https://www.exploit-db.com/exploits/47198 -https://www.exploit-db.com/exploits/4720 -https://www.exploit-db.com/exploits/47206 -https://www.exploit-db.com/exploits/4722 -https://www.exploit-db.com/exploits/47224 -https://www.exploit-db.com/exploits/47225 -https://www.exploit-db.com/exploits/47226 -https://www.exploit-db.com/exploits/47227 -https://www.exploit-db.com/exploits/47228 -https://www.exploit-db.com/exploits/47229 -https://www.exploit-db.com/exploits/47230 -https://www.exploit-db.com/exploits/4724 -https://www.exploit-db.com/exploits/47247 -https://www.exploit-db.com/exploits/4725 -https://www.exploit-db.com/exploits/4726 -https://www.exploit-db.com/exploits/4728 -https://www.exploit-db.com/exploits/47280 -https://www.exploit-db.com/exploits/47289 -https://www.exploit-db.com/exploits/4729 -https://www.exploit-db.com/exploits/47294 -https://www.exploit-db.com/exploits/4730 -https://www.exploit-db.com/exploits/47302 -https://www.exploit-db.com/exploits/47304 -https://www.exploit-db.com/exploits/4731 -https://www.exploit-db.com/exploits/47311 -https://www.exploit-db.com/exploits/47314 -https://www.exploit-db.com/exploits/47315 -https://www.exploit-db.com/exploits/47323 -https://www.exploit-db.com/exploits/47324 -https://www.exploit-db.com/exploits/47326 -https://www.exploit-db.com/exploits/4733 -https://www.exploit-db.com/exploits/47335 -https://www.exploit-db.com/exploits/4734 -https://www.exploit-db.com/exploits/4735 -https://www.exploit-db.com/exploits/4736 -https://www.exploit-db.com/exploits/4737 -https://www.exploit-db.com/exploits/4738 -https://www.exploit-db.com/exploits/47385 -https://www.exploit-db.com/exploits/4739 -https://www.exploit-db.com/exploits/47390 -https://www.exploit-db.com/exploits/4740 -https://www.exploit-db.com/exploits/4741 -https://www.exploit-db.com/exploits/47412 -https://www.exploit-db.com/exploits/4742 -https://www.exploit-db.com/exploits/47422 -https://www.exploit-db.com/exploits/47426 -https://www.exploit-db.com/exploits/4744 -https://www.exploit-db.com/exploits/4745 -https://www.exploit-db.com/exploits/47467 -https://www.exploit-db.com/exploits/47477 -https://www.exploit-db.com/exploits/47493 -https://www.exploit-db.com/exploits/47496 -https://www.exploit-db.com/exploits/47497 -https://www.exploit-db.com/exploits/4750 -https://www.exploit-db.com/exploits/47500 -https://www.exploit-db.com/exploits/47505 -https://www.exploit-db.com/exploits/47507 -https://www.exploit-db.com/exploits/4753 -https://www.exploit-db.com/exploits/47541 -https://www.exploit-db.com/exploits/47542 -https://www.exploit-db.com/exploits/47545 -https://www.exploit-db.com/exploits/4755 -https://www.exploit-db.com/exploits/4757 -https://www.exploit-db.com/exploits/4758 -https://www.exploit-db.com/exploits/4759 -https://www.exploit-db.com/exploits/47596 -https://www.exploit-db.com/exploits/4760 -https://www.exploit-db.com/exploits/4762 -https://www.exploit-db.com/exploits/4763 -https://www.exploit-db.com/exploits/4764 -https://www.exploit-db.com/exploits/4765 -https://www.exploit-db.com/exploits/47654 -https://www.exploit-db.com/exploits/47655 -https://www.exploit-db.com/exploits/4766 -https://www.exploit-db.com/exploits/4767 -https://www.exploit-db.com/exploits/47698 -https://www.exploit-db.com/exploits/4770 -https://www.exploit-db.com/exploits/47702 -https://www.exploit-db.com/exploits/47706 -https://www.exploit-db.com/exploits/47709 -https://www.exploit-db.com/exploits/4771 -https://www.exploit-db.com/exploits/4772 -https://www.exploit-db.com/exploits/47722 -https://www.exploit-db.com/exploits/4773 -https://www.exploit-db.com/exploits/4774 -https://www.exploit-db.com/exploits/4775 -https://www.exploit-db.com/exploits/4776 -https://www.exploit-db.com/exploits/47760 -https://www.exploit-db.com/exploits/47761 -https://www.exploit-db.com/exploits/47763 -https://www.exploit-db.com/exploits/4777 -https://www.exploit-db.com/exploits/47774 -https://www.exploit-db.com/exploits/47776 -https://www.exploit-db.com/exploits/47778 -https://www.exploit-db.com/exploits/4778 -https://www.exploit-db.com/exploits/47806 -https://www.exploit-db.com/exploits/47807 -https://www.exploit-db.com/exploits/47808 -https://www.exploit-db.com/exploits/47809 -https://www.exploit-db.com/exploits/47819 -https://www.exploit-db.com/exploits/4782 -https://www.exploit-db.com/exploits/47820 -https://www.exploit-db.com/exploits/47822 -https://www.exploit-db.com/exploits/47824 -https://www.exploit-db.com/exploits/4783 -https://www.exploit-db.com/exploits/4784 -https://www.exploit-db.com/exploits/47840 -https://www.exploit-db.com/exploits/47841 -https://www.exploit-db.com/exploits/47846 -https://www.exploit-db.com/exploits/4785 -https://www.exploit-db.com/exploits/47854 -https://www.exploit-db.com/exploits/4786 -https://www.exploit-db.com/exploits/4787 -https://www.exploit-db.com/exploits/47871 -https://www.exploit-db.com/exploits/47874 -https://www.exploit-db.com/exploits/47876 -https://www.exploit-db.com/exploits/4788 -https://www.exploit-db.com/exploits/47881 -https://www.exploit-db.com/exploits/47886 -https://www.exploit-db.com/exploits/47887 -https://www.exploit-db.com/exploits/4789 -https://www.exploit-db.com/exploits/4790 -https://www.exploit-db.com/exploits/4791 -https://www.exploit-db.com/exploits/4793 -https://www.exploit-db.com/exploits/4794 -https://www.exploit-db.com/exploits/47946 -https://www.exploit-db.com/exploits/4795 -https://www.exploit-db.com/exploits/4796 -https://www.exploit-db.com/exploits/47960 -https://www.exploit-db.com/exploits/4797 -https://www.exploit-db.com/exploits/4798 -https://www.exploit-db.com/exploits/47985 -https://www.exploit-db.com/exploits/47989 -https://www.exploit-db.com/exploits/4799 -https://www.exploit-db.com/exploits/4800 -https://www.exploit-db.com/exploits/4801 -https://www.exploit-db.com/exploits/4802 -https://www.exploit-db.com/exploits/4804 -https://www.exploit-db.com/exploits/48044 -https://www.exploit-db.com/exploits/4805 -https://www.exploit-db.com/exploits/4808 -https://www.exploit-db.com/exploits/4809 -https://www.exploit-db.com/exploits/48090 -https://www.exploit-db.com/exploits/4810 -https://www.exploit-db.com/exploits/4811 -https://www.exploit-db.com/exploits/48111 -https://www.exploit-db.com/exploits/4812 -https://www.exploit-db.com/exploits/4813 -https://www.exploit-db.com/exploits/48134 -https://www.exploit-db.com/exploits/4814 -https://www.exploit-db.com/exploits/48142 -https://www.exploit-db.com/exploits/4815 -https://www.exploit-db.com/exploits/4816 -https://www.exploit-db.com/exploits/4817 -https://www.exploit-db.com/exploits/48179 -https://www.exploit-db.com/exploits/4818 -https://www.exploit-db.com/exploits/4819 -https://www.exploit-db.com/exploits/48190 -https://www.exploit-db.com/exploits/48196 -https://www.exploit-db.com/exploits/48197 -https://www.exploit-db.com/exploits/4820 -https://www.exploit-db.com/exploits/4821 -https://www.exploit-db.com/exploits/48212 -https://www.exploit-db.com/exploits/48219 -https://www.exploit-db.com/exploits/4822 -https://www.exploit-db.com/exploits/48220 -https://www.exploit-db.com/exploits/48221 -https://www.exploit-db.com/exploits/48228 -https://www.exploit-db.com/exploits/4823 -https://www.exploit-db.com/exploits/4824 -https://www.exploit-db.com/exploits/48241 -https://www.exploit-db.com/exploits/48246 -https://www.exploit-db.com/exploits/4825 -https://www.exploit-db.com/exploits/4826 -https://www.exploit-db.com/exploits/4827 -https://www.exploit-db.com/exploits/4828 -https://www.exploit-db.com/exploits/48289 -https://www.exploit-db.com/exploits/4829 -https://www.exploit-db.com/exploits/48297 -https://www.exploit-db.com/exploits/4830 -https://www.exploit-db.com/exploits/48300 -https://www.exploit-db.com/exploits/48306 -https://www.exploit-db.com/exploits/4831 -https://www.exploit-db.com/exploits/48312 -https://www.exploit-db.com/exploits/4832 -https://www.exploit-db.com/exploits/4833 -https://www.exploit-db.com/exploits/4834 -https://www.exploit-db.com/exploits/4835 -https://www.exploit-db.com/exploits/4836 -https://www.exploit-db.com/exploits/4837 -https://www.exploit-db.com/exploits/4838 -https://www.exploit-db.com/exploits/48385 -https://www.exploit-db.com/exploits/4839 -https://www.exploit-db.com/exploits/4840 -https://www.exploit-db.com/exploits/48404 -https://www.exploit-db.com/exploits/48413 -https://www.exploit-db.com/exploits/48426 -https://www.exploit-db.com/exploits/48429 -https://www.exploit-db.com/exploits/48438 -https://www.exploit-db.com/exploits/48439 -https://www.exploit-db.com/exploits/4844 -https://www.exploit-db.com/exploits/4845 -https://www.exploit-db.com/exploits/4846 -https://www.exploit-db.com/exploits/48462 -https://www.exploit-db.com/exploits/4847 -https://www.exploit-db.com/exploits/48473 -https://www.exploit-db.com/exploits/48479 -https://www.exploit-db.com/exploits/4848 -https://www.exploit-db.com/exploits/48487 -https://www.exploit-db.com/exploits/48489 -https://www.exploit-db.com/exploits/4849 -https://www.exploit-db.com/exploits/48494 -https://www.exploit-db.com/exploits/4851 -https://www.exploit-db.com/exploits/48511 -https://www.exploit-db.com/exploits/48516 -https://www.exploit-db.com/exploits/4852 -https://www.exploit-db.com/exploits/48522 -https://www.exploit-db.com/exploits/48528 -https://www.exploit-db.com/exploits/4853 -https://www.exploit-db.com/exploits/48530 -https://www.exploit-db.com/exploits/48532 -https://www.exploit-db.com/exploits/4854 -https://www.exploit-db.com/exploits/4855 -https://www.exploit-db.com/exploits/4856 -https://www.exploit-db.com/exploits/48561 -https://www.exploit-db.com/exploits/4857 -https://www.exploit-db.com/exploits/4858 -https://www.exploit-db.com/exploits/4859 -https://www.exploit-db.com/exploits/48593 -https://www.exploit-db.com/exploits/4860 -https://www.exploit-db.com/exploits/4861 -https://www.exploit-db.com/exploits/48619 -https://www.exploit-db.com/exploits/4862 -https://www.exploit-db.com/exploits/48626 -https://www.exploit-db.com/exploits/4863 -https://www.exploit-db.com/exploits/48636 -https://www.exploit-db.com/exploits/4864 -https://www.exploit-db.com/exploits/48649 -https://www.exploit-db.com/exploits/4865 -https://www.exploit-db.com/exploits/4866 -https://www.exploit-db.com/exploits/4867 -https://www.exploit-db.com/exploits/4868 -https://www.exploit-db.com/exploits/4869 -https://www.exploit-db.com/exploits/4870 -https://www.exploit-db.com/exploits/48702 -https://www.exploit-db.com/exploits/48704 -https://www.exploit-db.com/exploits/48707 -https://www.exploit-db.com/exploits/4871 -https://www.exploit-db.com/exploits/4872 -https://www.exploit-db.com/exploits/48725 -https://www.exploit-db.com/exploits/4873 -https://www.exploit-db.com/exploits/48734 -https://www.exploit-db.com/exploits/48738 -https://www.exploit-db.com/exploits/48739 -https://www.exploit-db.com/exploits/4874 -https://www.exploit-db.com/exploits/48742 -https://www.exploit-db.com/exploits/48745 -https://www.exploit-db.com/exploits/4875 -https://www.exploit-db.com/exploits/48752 -https://www.exploit-db.com/exploits/48753 -https://www.exploit-db.com/exploits/48756 -https://www.exploit-db.com/exploits/48757 -https://www.exploit-db.com/exploits/48758 -https://www.exploit-db.com/exploits/4876 -https://www.exploit-db.com/exploits/4877 -https://www.exploit-db.com/exploits/48771 -https://www.exploit-db.com/exploits/48773 -https://www.exploit-db.com/exploits/48775 -https://www.exploit-db.com/exploits/48777 -https://www.exploit-db.com/exploits/48778 -https://www.exploit-db.com/exploits/4878 -https://www.exploit-db.com/exploits/48780 -https://www.exploit-db.com/exploits/48783 -https://www.exploit-db.com/exploits/48785 -https://www.exploit-db.com/exploits/48786 -https://www.exploit-db.com/exploits/48787 -https://www.exploit-db.com/exploits/48789 -https://www.exploit-db.com/exploits/4879 -https://www.exploit-db.com/exploits/48791 -https://www.exploit-db.com/exploits/48792 -https://www.exploit-db.com/exploits/4880 -https://www.exploit-db.com/exploits/48804 -https://www.exploit-db.com/exploits/48807 -https://www.exploit-db.com/exploits/48809 -https://www.exploit-db.com/exploits/48811 -https://www.exploit-db.com/exploits/48813 -https://www.exploit-db.com/exploits/4882 -https://www.exploit-db.com/exploits/4883 -https://www.exploit-db.com/exploits/48831 -https://www.exploit-db.com/exploits/4884 -https://www.exploit-db.com/exploits/48840 -https://www.exploit-db.com/exploits/48848 -https://www.exploit-db.com/exploits/48849 -https://www.exploit-db.com/exploits/4885 -https://www.exploit-db.com/exploits/48850 -https://www.exploit-db.com/exploits/48851 -https://www.exploit-db.com/exploits/48852 -https://www.exploit-db.com/exploits/4886 -https://www.exploit-db.com/exploits/48862 -https://www.exploit-db.com/exploits/48865 -https://www.exploit-db.com/exploits/48866 -https://www.exploit-db.com/exploits/4887 -https://www.exploit-db.com/exploits/48879 -https://www.exploit-db.com/exploits/4888 -https://www.exploit-db.com/exploits/48881 -https://www.exploit-db.com/exploits/48883 -https://www.exploit-db.com/exploits/4889 -https://www.exploit-db.com/exploits/48892 -https://www.exploit-db.com/exploits/48897 -https://www.exploit-db.com/exploits/4890 -https://www.exploit-db.com/exploits/48907 -https://www.exploit-db.com/exploits/4891 -https://www.exploit-db.com/exploits/48916 -https://www.exploit-db.com/exploits/4892 -https://www.exploit-db.com/exploits/48920 -https://www.exploit-db.com/exploits/48928 -https://www.exploit-db.com/exploits/4893 -https://www.exploit-db.com/exploits/48931 -https://www.exploit-db.com/exploits/48936 -https://www.exploit-db.com/exploits/4894 -https://www.exploit-db.com/exploits/48941 -https://www.exploit-db.com/exploits/48946 -https://www.exploit-db.com/exploits/48948 -https://www.exploit-db.com/exploits/4895 -https://www.exploit-db.com/exploits/48969 -https://www.exploit-db.com/exploits/4897 -https://www.exploit-db.com/exploits/48972 -https://www.exploit-db.com/exploits/4898 -https://www.exploit-db.com/exploits/48980 -https://www.exploit-db.com/exploits/48981 -https://www.exploit-db.com/exploits/48982 -https://www.exploit-db.com/exploits/48984 -https://www.exploit-db.com/exploits/4899 -https://www.exploit-db.com/exploits/4900 -https://www.exploit-db.com/exploits/4901 -https://www.exploit-db.com/exploits/4902 -https://www.exploit-db.com/exploits/49027 -https://www.exploit-db.com/exploits/4903 -https://www.exploit-db.com/exploits/49032 -https://www.exploit-db.com/exploits/4904 -https://www.exploit-db.com/exploits/4905 -https://www.exploit-db.com/exploits/49052 -https://www.exploit-db.com/exploits/49056 -https://www.exploit-db.com/exploits/49058 -https://www.exploit-db.com/exploits/49059 -https://www.exploit-db.com/exploits/4906 -https://www.exploit-db.com/exploits/4907 -https://www.exploit-db.com/exploits/49075 -https://www.exploit-db.com/exploits/49077 -https://www.exploit-db.com/exploits/49078 -https://www.exploit-db.com/exploits/4908 -https://www.exploit-db.com/exploits/49085 -https://www.exploit-db.com/exploits/4909 -https://www.exploit-db.com/exploits/49093 -https://www.exploit-db.com/exploits/49098 -https://www.exploit-db.com/exploits/49099 -https://www.exploit-db.com/exploits/4910 -https://www.exploit-db.com/exploits/49102 -https://www.exploit-db.com/exploits/49105 -https://www.exploit-db.com/exploits/4911 -https://www.exploit-db.com/exploits/4912 -https://www.exploit-db.com/exploits/49124 -https://www.exploit-db.com/exploits/4913 -https://www.exploit-db.com/exploits/49135 -https://www.exploit-db.com/exploits/49137 -https://www.exploit-db.com/exploits/4914 -https://www.exploit-db.com/exploits/49143 -https://www.exploit-db.com/exploits/49146 -https://www.exploit-db.com/exploits/4915 -https://www.exploit-db.com/exploits/49150 -https://www.exploit-db.com/exploits/49151 -https://www.exploit-db.com/exploits/49152 -https://www.exploit-db.com/exploits/49153 -https://www.exploit-db.com/exploits/49159 -https://www.exploit-db.com/exploits/4916 -https://www.exploit-db.com/exploits/49161 -https://www.exploit-db.com/exploits/49163 -https://www.exploit-db.com/exploits/49164 -https://www.exploit-db.com/exploits/49165 -https://www.exploit-db.com/exploits/49168 -https://www.exploit-db.com/exploits/4917 -https://www.exploit-db.com/exploits/4918 -https://www.exploit-db.com/exploits/49180 -https://www.exploit-db.com/exploits/49181 -https://www.exploit-db.com/exploits/49182 -https://www.exploit-db.com/exploits/49188 -https://www.exploit-db.com/exploits/4919 -https://www.exploit-db.com/exploits/49196 -https://www.exploit-db.com/exploits/4920 -https://www.exploit-db.com/exploits/49203 -https://www.exploit-db.com/exploits/49204 -https://www.exploit-db.com/exploits/49208 -https://www.exploit-db.com/exploits/4921 -https://www.exploit-db.com/exploits/49212 -https://www.exploit-db.com/exploits/49215 -https://www.exploit-db.com/exploits/49217 -https://www.exploit-db.com/exploits/4922 -https://www.exploit-db.com/exploits/49227 -https://www.exploit-db.com/exploits/49228 -https://www.exploit-db.com/exploits/4923 -https://www.exploit-db.com/exploits/49233 -https://www.exploit-db.com/exploits/49234 -https://www.exploit-db.com/exploits/49235 -https://www.exploit-db.com/exploits/4924 -https://www.exploit-db.com/exploits/49241 -https://www.exploit-db.com/exploits/49242 -https://www.exploit-db.com/exploits/49243 -https://www.exploit-db.com/exploits/49247 -https://www.exploit-db.com/exploits/49248 -https://www.exploit-db.com/exploits/4925 -https://www.exploit-db.com/exploits/49253 -https://www.exploit-db.com/exploits/49254 -https://www.exploit-db.com/exploits/49255 -https://www.exploit-db.com/exploits/4926 -https://www.exploit-db.com/exploits/49265 -https://www.exploit-db.com/exploits/4927 -https://www.exploit-db.com/exploits/4928 -https://www.exploit-db.com/exploits/49281 -https://www.exploit-db.com/exploits/49282 -https://www.exploit-db.com/exploits/4929 -https://www.exploit-db.com/exploits/49290 -https://www.exploit-db.com/exploits/49298 -https://www.exploit-db.com/exploits/4930 -https://www.exploit-db.com/exploits/49307 -https://www.exploit-db.com/exploits/4931 -https://www.exploit-db.com/exploits/49314 -https://www.exploit-db.com/exploits/49318 -https://www.exploit-db.com/exploits/4932 -https://www.exploit-db.com/exploits/4933 -https://www.exploit-db.com/exploits/49330 -https://www.exploit-db.com/exploits/49339 -https://www.exploit-db.com/exploits/4934 -https://www.exploit-db.com/exploits/4935 -https://www.exploit-db.com/exploits/49352 -https://www.exploit-db.com/exploits/49358 -https://www.exploit-db.com/exploits/4936 -https://www.exploit-db.com/exploits/49369 -https://www.exploit-db.com/exploits/4937 -https://www.exploit-db.com/exploits/49378 -https://www.exploit-db.com/exploits/4938 -https://www.exploit-db.com/exploits/4939 -https://www.exploit-db.com/exploits/49390 -https://www.exploit-db.com/exploits/49392 -https://www.exploit-db.com/exploits/49396 -https://www.exploit-db.com/exploits/49406 -https://www.exploit-db.com/exploits/4941 -https://www.exploit-db.com/exploits/49410 -https://www.exploit-db.com/exploits/4942 -https://www.exploit-db.com/exploits/49426 -https://www.exploit-db.com/exploits/4943 -https://www.exploit-db.com/exploits/49434 -https://www.exploit-db.com/exploits/49435 -https://www.exploit-db.com/exploits/49437 -https://www.exploit-db.com/exploits/4944 -https://www.exploit-db.com/exploits/4945 -https://www.exploit-db.com/exploits/4946 -https://www.exploit-db.com/exploits/49462 -https://www.exploit-db.com/exploits/49463 -https://www.exploit-db.com/exploits/49468 -https://www.exploit-db.com/exploits/49469 -https://www.exploit-db.com/exploits/4947 -https://www.exploit-db.com/exploits/49484 -https://www.exploit-db.com/exploits/4949 -https://www.exploit-db.com/exploits/49493 -https://www.exploit-db.com/exploits/4950 -https://www.exploit-db.com/exploits/49508 -https://www.exploit-db.com/exploits/4951 -https://www.exploit-db.com/exploits/49513 -https://www.exploit-db.com/exploits/4952 -https://www.exploit-db.com/exploits/49520 -https://www.exploit-db.com/exploits/4953 -https://www.exploit-db.com/exploits/49530 -https://www.exploit-db.com/exploits/4954 -https://www.exploit-db.com/exploits/49546 -https://www.exploit-db.com/exploits/49549 -https://www.exploit-db.com/exploits/4955 -https://www.exploit-db.com/exploits/49551 -https://www.exploit-db.com/exploits/49554 -https://www.exploit-db.com/exploits/49555 -https://www.exploit-db.com/exploits/49556 -https://www.exploit-db.com/exploits/49559 -https://www.exploit-db.com/exploits/4956 -https://www.exploit-db.com/exploits/49562 -https://www.exploit-db.com/exploits/49563 -https://www.exploit-db.com/exploits/49565 -https://www.exploit-db.com/exploits/4957 -https://www.exploit-db.com/exploits/49578 -https://www.exploit-db.com/exploits/4958 -https://www.exploit-db.com/exploits/49580 -https://www.exploit-db.com/exploits/4959 -https://www.exploit-db.com/exploits/49590 -https://www.exploit-db.com/exploits/49595 -https://www.exploit-db.com/exploits/49597 -https://www.exploit-db.com/exploits/49598 -https://www.exploit-db.com/exploits/4960 -https://www.exploit-db.com/exploits/49601 -https://www.exploit-db.com/exploits/49605 -https://www.exploit-db.com/exploits/49607 -https://www.exploit-db.com/exploits/4961 -https://www.exploit-db.com/exploits/49615 -https://www.exploit-db.com/exploits/49616 -https://www.exploit-db.com/exploits/49617 -https://www.exploit-db.com/exploits/49618 -https://www.exploit-db.com/exploits/4962 -https://www.exploit-db.com/exploits/49621 -https://www.exploit-db.com/exploits/49622 -https://www.exploit-db.com/exploits/49630 -https://www.exploit-db.com/exploits/49632 -https://www.exploit-db.com/exploits/49638 -https://www.exploit-db.com/exploits/49641 -https://www.exploit-db.com/exploits/49643 -https://www.exploit-db.com/exploits/49649 -https://www.exploit-db.com/exploits/4965 -https://www.exploit-db.com/exploits/49657 -https://www.exploit-db.com/exploits/4966 -https://www.exploit-db.com/exploits/49660 -https://www.exploit-db.com/exploits/49668 -https://www.exploit-db.com/exploits/4967 -https://www.exploit-db.com/exploits/49670 -https://www.exploit-db.com/exploits/49674 -https://www.exploit-db.com/exploits/49678 -https://www.exploit-db.com/exploits/49679 -https://www.exploit-db.com/exploits/4968 -https://www.exploit-db.com/exploits/4969 -https://www.exploit-db.com/exploits/4970 -https://www.exploit-db.com/exploits/49706 -https://www.exploit-db.com/exploits/49707 -https://www.exploit-db.com/exploits/4971 -https://www.exploit-db.com/exploits/49719 -https://www.exploit-db.com/exploits/4972 -https://www.exploit-db.com/exploits/49722 -https://www.exploit-db.com/exploits/49723 -https://www.exploit-db.com/exploits/49724 -https://www.exploit-db.com/exploits/49726 -https://www.exploit-db.com/exploits/4973 -https://www.exploit-db.com/exploits/4974 -https://www.exploit-db.com/exploits/49740 -https://www.exploit-db.com/exploits/49741 -https://www.exploit-db.com/exploits/4975 -https://www.exploit-db.com/exploits/4976 -https://www.exploit-db.com/exploits/4977 -https://www.exploit-db.com/exploits/49773 -https://www.exploit-db.com/exploits/4978 -https://www.exploit-db.com/exploits/49783 -https://www.exploit-db.com/exploits/4979 -https://www.exploit-db.com/exploits/4980 -https://www.exploit-db.com/exploits/4981 -https://www.exploit-db.com/exploits/4982 -https://www.exploit-db.com/exploits/4983 -https://www.exploit-db.com/exploits/4984 -https://www.exploit-db.com/exploits/4985 -https://www.exploit-db.com/exploits/49859 -https://www.exploit-db.com/exploits/4986 -https://www.exploit-db.com/exploits/49865 -https://www.exploit-db.com/exploits/4987 -https://www.exploit-db.com/exploits/49877 -https://www.exploit-db.com/exploits/4988 -https://www.exploit-db.com/exploits/49884 -https://www.exploit-db.com/exploits/49886 -https://www.exploit-db.com/exploits/49887 -https://www.exploit-db.com/exploits/4989 -https://www.exploit-db.com/exploits/4990 -https://www.exploit-db.com/exploits/49901 -https://www.exploit-db.com/exploits/49902 -https://www.exploit-db.com/exploits/49904 -https://www.exploit-db.com/exploits/4991 -https://www.exploit-db.com/exploits/49910 -https://www.exploit-db.com/exploits/4992 -https://www.exploit-db.com/exploits/49925 -https://www.exploit-db.com/exploits/4993 -https://www.exploit-db.com/exploits/4998 -https://www.exploit-db.com/exploits/49986 -https://www.exploit-db.com/exploits/49987 -https://www.exploit-db.com/exploits/49989 -https://www.exploit-db.com/exploits/4999 -https://www.exploit-db.com/exploits/5000 -https://www.exploit-db.com/exploits/5001 -https://www.exploit-db.com/exploits/50018 -https://www.exploit-db.com/exploits/50019 -https://www.exploit-db.com/exploits/5002 -https://www.exploit-db.com/exploits/5003 -https://www.exploit-db.com/exploits/5004 -https://www.exploit-db.com/exploits/50046 -https://www.exploit-db.com/exploits/50047 -https://www.exploit-db.com/exploits/5005 -https://www.exploit-db.com/exploits/50050 -https://www.exploit-db.com/exploits/5006 -https://www.exploit-db.com/exploits/5007 -https://www.exploit-db.com/exploits/50071 -https://www.exploit-db.com/exploits/5008 -https://www.exploit-db.com/exploits/50083 -https://www.exploit-db.com/exploits/5009 -https://www.exploit-db.com/exploits/50094 -https://www.exploit-db.com/exploits/50097 -https://www.exploit-db.com/exploits/50098 -https://www.exploit-db.com/exploits/5010 -https://www.exploit-db.com/exploits/50105 -https://www.exploit-db.com/exploits/50106 -https://www.exploit-db.com/exploits/50109 -https://www.exploit-db.com/exploits/5011 -https://www.exploit-db.com/exploits/50113 -https://www.exploit-db.com/exploits/50114 -https://www.exploit-db.com/exploits/5012 -https://www.exploit-db.com/exploits/5013 -https://www.exploit-db.com/exploits/50130 -https://www.exploit-db.com/exploits/5014 -https://www.exploit-db.com/exploits/5015 -https://www.exploit-db.com/exploits/50158 -https://www.exploit-db.com/exploits/5016 -https://www.exploit-db.com/exploits/50165 -https://www.exploit-db.com/exploits/5017 -https://www.exploit-db.com/exploits/50170 -https://www.exploit-db.com/exploits/5018 -https://www.exploit-db.com/exploits/50181 -https://www.exploit-db.com/exploits/5019 -https://www.exploit-db.com/exploits/50194 -https://www.exploit-db.com/exploits/50197 -https://www.exploit-db.com/exploits/5020 -https://www.exploit-db.com/exploits/50204 -https://www.exploit-db.com/exploits/50205 -https://www.exploit-db.com/exploits/5021 -https://www.exploit-db.com/exploits/50214 -https://www.exploit-db.com/exploits/5022 -https://www.exploit-db.com/exploits/50248 -https://www.exploit-db.com/exploits/50249 -https://www.exploit-db.com/exploits/5025 -https://www.exploit-db.com/exploits/50259 -https://www.exploit-db.com/exploits/5026 -https://www.exploit-db.com/exploits/50263 -https://www.exploit-db.com/exploits/50267 -https://www.exploit-db.com/exploits/5027 -https://www.exploit-db.com/exploits/5028 -https://www.exploit-db.com/exploits/50288 -https://www.exploit-db.com/exploits/5029 -https://www.exploit-db.com/exploits/50295 -https://www.exploit-db.com/exploits/5030 -https://www.exploit-db.com/exploits/50305 -https://www.exploit-db.com/exploits/50306 -https://www.exploit-db.com/exploits/50308 -https://www.exploit-db.com/exploits/5031 -https://www.exploit-db.com/exploits/50319 -https://www.exploit-db.com/exploits/5032 -https://www.exploit-db.com/exploits/50323 -https://www.exploit-db.com/exploits/5033 -https://www.exploit-db.com/exploits/5034 -https://www.exploit-db.com/exploits/5035 -https://www.exploit-db.com/exploits/50351 -https://www.exploit-db.com/exploits/50355 -https://www.exploit-db.com/exploits/5036 -https://www.exploit-db.com/exploits/50365 -https://www.exploit-db.com/exploits/5037 -https://www.exploit-db.com/exploits/50370 -https://www.exploit-db.com/exploits/50371 -https://www.exploit-db.com/exploits/50372 -https://www.exploit-db.com/exploits/50373 -https://www.exploit-db.com/exploits/5038 -https://www.exploit-db.com/exploits/50382 -https://www.exploit-db.com/exploits/50386 -https://www.exploit-db.com/exploits/5039 -https://www.exploit-db.com/exploits/50391 -https://www.exploit-db.com/exploits/5040 -https://www.exploit-db.com/exploits/50403 -https://www.exploit-db.com/exploits/5041 -https://www.exploit-db.com/exploits/5042 -https://www.exploit-db.com/exploits/50429 -https://www.exploit-db.com/exploits/5043 -https://www.exploit-db.com/exploits/5044 -https://www.exploit-db.com/exploits/50448 -https://www.exploit-db.com/exploits/50449 -https://www.exploit-db.com/exploits/5045 -https://www.exploit-db.com/exploits/50450 -https://www.exploit-db.com/exploits/50451 -https://www.exploit-db.com/exploits/50452 -https://www.exploit-db.com/exploits/50453 -https://www.exploit-db.com/exploits/5046 -https://www.exploit-db.com/exploits/50461 -https://www.exploit-db.com/exploits/50467 -https://www.exploit-db.com/exploits/50468 -https://www.exploit-db.com/exploits/50469 -https://www.exploit-db.com/exploits/5047 -https://www.exploit-db.com/exploits/5048 -https://www.exploit-db.com/exploits/5049 -https://www.exploit-db.com/exploits/5050 -https://www.exploit-db.com/exploits/50502 -https://www.exploit-db.com/exploits/50509 -https://www.exploit-db.com/exploits/5051 -https://www.exploit-db.com/exploits/50518 -https://www.exploit-db.com/exploits/5052 -https://www.exploit-db.com/exploits/50521 -https://www.exploit-db.com/exploits/5053 -https://www.exploit-db.com/exploits/50535 -https://www.exploit-db.com/exploits/5054 -https://www.exploit-db.com/exploits/50542 -https://www.exploit-db.com/exploits/5055 -https://www.exploit-db.com/exploits/5056 -https://www.exploit-db.com/exploits/50560 -https://www.exploit-db.com/exploits/50561 -https://www.exploit-db.com/exploits/5057 -https://www.exploit-db.com/exploits/50573 -https://www.exploit-db.com/exploits/5058 -https://www.exploit-db.com/exploits/50580 -https://www.exploit-db.com/exploits/50587 -https://www.exploit-db.com/exploits/5059 -https://www.exploit-db.com/exploits/50597 -https://www.exploit-db.com/exploits/50599 -https://www.exploit-db.com/exploits/5060 -https://www.exploit-db.com/exploits/5061 -https://www.exploit-db.com/exploits/50614 -https://www.exploit-db.com/exploits/50615 -https://www.exploit-db.com/exploits/50616 -https://www.exploit-db.com/exploits/5062 -https://www.exploit-db.com/exploits/50623 -https://www.exploit-db.com/exploits/5063 -https://www.exploit-db.com/exploits/50633 -https://www.exploit-db.com/exploits/50638 -https://www.exploit-db.com/exploits/5064 -https://www.exploit-db.com/exploits/50645 -https://www.exploit-db.com/exploits/5065 -https://www.exploit-db.com/exploits/50659 -https://www.exploit-db.com/exploits/5066 -https://www.exploit-db.com/exploits/50660 -https://www.exploit-db.com/exploits/50663 -https://www.exploit-db.com/exploits/50665 -https://www.exploit-db.com/exploits/5067 -https://www.exploit-db.com/exploits/50672 -https://www.exploit-db.com/exploits/50673 -https://www.exploit-db.com/exploits/50674 -https://www.exploit-db.com/exploits/5068 -https://www.exploit-db.com/exploits/50682 -https://www.exploit-db.com/exploits/50683 -https://www.exploit-db.com/exploits/5069 -https://www.exploit-db.com/exploits/5070 -https://www.exploit-db.com/exploits/5071 -https://www.exploit-db.com/exploits/50712 -https://www.exploit-db.com/exploits/50713 -https://www.exploit-db.com/exploits/50714 -https://www.exploit-db.com/exploits/5072 -https://www.exploit-db.com/exploits/50725 -https://www.exploit-db.com/exploits/50726 -https://www.exploit-db.com/exploits/5073 -https://www.exploit-db.com/exploits/50730 -https://www.exploit-db.com/exploits/50731 -https://www.exploit-db.com/exploits/50732 -https://www.exploit-db.com/exploits/50739 -https://www.exploit-db.com/exploits/5074 -https://www.exploit-db.com/exploits/50740 -https://www.exploit-db.com/exploits/5075 -https://www.exploit-db.com/exploits/5076 -https://www.exploit-db.com/exploits/50765 -https://www.exploit-db.com/exploits/50768 -https://www.exploit-db.com/exploits/5077 -https://www.exploit-db.com/exploits/5078 -https://www.exploit-db.com/exploits/50780 -https://www.exploit-db.com/exploits/50788 -https://www.exploit-db.com/exploits/5079 -https://www.exploit-db.com/exploits/50798 -https://www.exploit-db.com/exploits/5080 -https://www.exploit-db.com/exploits/50801 -https://www.exploit-db.com/exploits/50802 -https://www.exploit-db.com/exploits/5081 -https://www.exploit-db.com/exploits/50812 -https://www.exploit-db.com/exploits/50815 -https://www.exploit-db.com/exploits/50817 -https://www.exploit-db.com/exploits/5082 -https://www.exploit-db.com/exploits/50821 -https://www.exploit-db.com/exploits/5083 -https://www.exploit-db.com/exploits/50831 -https://www.exploit-db.com/exploits/5084 -https://www.exploit-db.com/exploits/50846 -https://www.exploit-db.com/exploits/5085 -https://www.exploit-db.com/exploits/50853 -https://www.exploit-db.com/exploits/50854 -https://www.exploit-db.com/exploits/50857 -https://www.exploit-db.com/exploits/50859 -https://www.exploit-db.com/exploits/5086 -https://www.exploit-db.com/exploits/50864 -https://www.exploit-db.com/exploits/50865 -https://www.exploit-db.com/exploits/5088 -https://www.exploit-db.com/exploits/5089 -https://www.exploit-db.com/exploits/5090 -https://www.exploit-db.com/exploits/50908 -https://www.exploit-db.com/exploits/5091 -https://www.exploit-db.com/exploits/50918 -https://www.exploit-db.com/exploits/5092 -https://www.exploit-db.com/exploits/5093 -https://www.exploit-db.com/exploits/50939 -https://www.exploit-db.com/exploits/5094 -https://www.exploit-db.com/exploits/50942 -https://www.exploit-db.com/exploits/5096 -https://www.exploit-db.com/exploits/50962 -https://www.exploit-db.com/exploits/5097 -https://www.exploit-db.com/exploits/50972 -https://www.exploit-db.com/exploits/5098 -https://www.exploit-db.com/exploits/50985 -https://www.exploit-db.com/exploits/50988 -https://www.exploit-db.com/exploits/50996 -https://www.exploit-db.com/exploits/50998 -https://www.exploit-db.com/exploits/5100 -https://www.exploit-db.com/exploits/51006 -https://www.exploit-db.com/exploits/51010 -https://www.exploit-db.com/exploits/51015 -https://www.exploit-db.com/exploits/5102 -https://www.exploit-db.com/exploits/51025 -https://www.exploit-db.com/exploits/51029 -https://www.exploit-db.com/exploits/5103 -https://www.exploit-db.com/exploits/5104 -https://www.exploit-db.com/exploits/5105 -https://www.exploit-db.com/exploits/51052 -https://www.exploit-db.com/exploits/5106 -https://www.exploit-db.com/exploits/5107 -https://www.exploit-db.com/exploits/5108 -https://www.exploit-db.com/exploits/5109 -https://www.exploit-db.com/exploits/5110 -https://www.exploit-db.com/exploits/5111 -https://www.exploit-db.com/exploits/5112 -https://www.exploit-db.com/exploits/5113 -https://www.exploit-db.com/exploits/5114 -https://www.exploit-db.com/exploits/51142 -https://www.exploit-db.com/exploits/5115 -https://www.exploit-db.com/exploits/51153 -https://www.exploit-db.com/exploits/5116 -https://www.exploit-db.com/exploits/5117 -https://www.exploit-db.com/exploits/5118 -https://www.exploit-db.com/exploits/5119 -https://www.exploit-db.com/exploits/5120 -https://www.exploit-db.com/exploits/5121 -https://www.exploit-db.com/exploits/5122 -https://www.exploit-db.com/exploits/5123 -https://www.exploit-db.com/exploits/51239 -https://www.exploit-db.com/exploits/5124 -https://www.exploit-db.com/exploits/5125 -https://www.exploit-db.com/exploits/51252 -https://www.exploit-db.com/exploits/5128 -https://www.exploit-db.com/exploits/5129 -https://www.exploit-db.com/exploits/5130 -https://www.exploit-db.com/exploits/51309 -https://www.exploit-db.com/exploits/5131 -https://www.exploit-db.com/exploits/51311 -https://www.exploit-db.com/exploits/5132 -https://www.exploit-db.com/exploits/5133 -https://www.exploit-db.com/exploits/5134 -https://www.exploit-db.com/exploits/5135 -https://www.exploit-db.com/exploits/5136 -https://www.exploit-db.com/exploits/5137 -https://www.exploit-db.com/exploits/5138 -https://www.exploit-db.com/exploits/51383 -https://www.exploit-db.com/exploits/5140 -https://www.exploit-db.com/exploits/51404 -https://www.exploit-db.com/exploits/5141 -https://www.exploit-db.com/exploits/51417 -https://www.exploit-db.com/exploits/5142 -https://www.exploit-db.com/exploits/51422 -https://www.exploit-db.com/exploits/5143 -https://www.exploit-db.com/exploits/5144 -https://www.exploit-db.com/exploits/51449 -https://www.exploit-db.com/exploits/5145 -https://www.exploit-db.com/exploits/51450 -https://www.exploit-db.com/exploits/5146 -https://www.exploit-db.com/exploits/5147 -https://www.exploit-db.com/exploits/5148 -https://www.exploit-db.com/exploits/51482 -https://www.exploit-db.com/exploits/5149 -https://www.exploit-db.com/exploits/51499 -https://www.exploit-db.com/exploits/5150 -https://www.exploit-db.com/exploits/51500 -https://www.exploit-db.com/exploits/51501 -https://www.exploit-db.com/exploits/51502 -https://www.exploit-db.com/exploits/51504 -https://www.exploit-db.com/exploits/51509 -https://www.exploit-db.com/exploits/5151 -https://www.exploit-db.com/exploits/51511 -https://www.exploit-db.com/exploits/5152 -https://www.exploit-db.com/exploits/51520 -https://www.exploit-db.com/exploits/51524 -https://www.exploit-db.com/exploits/51528 -https://www.exploit-db.com/exploits/51529 -https://www.exploit-db.com/exploits/5153 -https://www.exploit-db.com/exploits/5154 -https://www.exploit-db.com/exploits/51542 -https://www.exploit-db.com/exploits/5155 -https://www.exploit-db.com/exploits/5156 -https://www.exploit-db.com/exploits/51564 -https://www.exploit-db.com/exploits/5157 -https://www.exploit-db.com/exploits/51576 -https://www.exploit-db.com/exploits/5158 -https://www.exploit-db.com/exploits/5159 -https://www.exploit-db.com/exploits/5160 -https://www.exploit-db.com/exploits/5161 -https://www.exploit-db.com/exploits/51610 -https://www.exploit-db.com/exploits/5162 -https://www.exploit-db.com/exploits/5163 -https://www.exploit-db.com/exploits/51633 -https://www.exploit-db.com/exploits/5164 -https://www.exploit-db.com/exploits/51641 -https://www.exploit-db.com/exploits/51643 -https://www.exploit-db.com/exploits/5165 -https://www.exploit-db.com/exploits/51656 -https://www.exploit-db.com/exploits/5166 -https://www.exploit-db.com/exploits/51664 -https://www.exploit-db.com/exploits/5167 -https://www.exploit-db.com/exploits/51678 -https://www.exploit-db.com/exploits/51679 -https://www.exploit-db.com/exploits/5168 -https://www.exploit-db.com/exploits/51680 -https://www.exploit-db.com/exploits/51681 -https://www.exploit-db.com/exploits/51682 -https://www.exploit-db.com/exploits/51694 -https://www.exploit-db.com/exploits/51695 -https://www.exploit-db.com/exploits/5170 -https://www.exploit-db.com/exploits/51709 -https://www.exploit-db.com/exploits/5171 -https://www.exploit-db.com/exploits/5172 -https://www.exploit-db.com/exploits/5173 -https://www.exploit-db.com/exploits/5174 -https://www.exploit-db.com/exploits/5175 -https://www.exploit-db.com/exploits/5176 -https://www.exploit-db.com/exploits/5178 -https://www.exploit-db.com/exploits/5179 -https://www.exploit-db.com/exploits/5180 -https://www.exploit-db.com/exploits/5182 -https://www.exploit-db.com/exploits/5183 -https://www.exploit-db.com/exploits/5184 -https://www.exploit-db.com/exploits/5185 -https://www.exploit-db.com/exploits/5186 -https://www.exploit-db.com/exploits/5188 -https://www.exploit-db.com/exploits/5189 -https://www.exploit-db.com/exploits/51893 -https://www.exploit-db.com/exploits/5190 -https://www.exploit-db.com/exploits/51903 -https://www.exploit-db.com/exploits/5191 -https://www.exploit-db.com/exploits/5192 -https://www.exploit-db.com/exploits/51926 -https://www.exploit-db.com/exploits/5193 -https://www.exploit-db.com/exploits/51936 -https://www.exploit-db.com/exploits/5194 -https://www.exploit-db.com/exploits/5195 -https://www.exploit-db.com/exploits/5196 -https://www.exploit-db.com/exploits/5197 -https://www.exploit-db.com/exploits/51977 -https://www.exploit-db.com/exploits/5198 -https://www.exploit-db.com/exploits/51988 -https://www.exploit-db.com/exploits/5199 -https://www.exploit-db.com/exploits/5200 -https://www.exploit-db.com/exploits/52001 -https://www.exploit-db.com/exploits/5201 -https://www.exploit-db.com/exploits/5202 -https://www.exploit-db.com/exploits/5203 -https://www.exploit-db.com/exploits/5204 -https://www.exploit-db.com/exploits/5205 -https://www.exploit-db.com/exploits/5206 -https://www.exploit-db.com/exploits/5207 -https://www.exploit-db.com/exploits/5208 -https://www.exploit-db.com/exploits/5209 -https://www.exploit-db.com/exploits/5211 -https://www.exploit-db.com/exploits/5213 -https://www.exploit-db.com/exploits/5215 -https://www.exploit-db.com/exploits/5217 -https://www.exploit-db.com/exploits/5219 -https://www.exploit-db.com/exploits/5220 -https://www.exploit-db.com/exploits/5222 -https://www.exploit-db.com/exploits/5223 -https://www.exploit-db.com/exploits/5225 -https://www.exploit-db.com/exploits/5226 -https://www.exploit-db.com/exploits/5227 -https://www.exploit-db.com/exploits/5228 -https://www.exploit-db.com/exploits/5229 -https://www.exploit-db.com/exploits/5230 -https://www.exploit-db.com/exploits/5231 -https://www.exploit-db.com/exploits/5232 -https://www.exploit-db.com/exploits/5233 -https://www.exploit-db.com/exploits/5234 -https://www.exploit-db.com/exploits/5235 -https://www.exploit-db.com/exploits/5236 -https://www.exploit-db.com/exploits/5238 -https://www.exploit-db.com/exploits/5239 -https://www.exploit-db.com/exploits/5240 -https://www.exploit-db.com/exploits/5242 -https://www.exploit-db.com/exploits/5243 -https://www.exploit-db.com/exploits/5244 -https://www.exploit-db.com/exploits/5245 -https://www.exploit-db.com/exploits/5246 -https://www.exploit-db.com/exploits/5247 -https://www.exploit-db.com/exploits/5248 -https://www.exploit-db.com/exploits/5249 -https://www.exploit-db.com/exploits/5250 -https://www.exploit-db.com/exploits/5252 -https://www.exploit-db.com/exploits/5254 -https://www.exploit-db.com/exploits/5255 -https://www.exploit-db.com/exploits/5256 -https://www.exploit-db.com/exploits/5257 -https://www.exploit-db.com/exploits/5258 -https://www.exploit-db.com/exploits/5259 -https://www.exploit-db.com/exploits/5260 -https://www.exploit-db.com/exploits/5262 -https://www.exploit-db.com/exploits/5263 -https://www.exploit-db.com/exploits/5264 -https://www.exploit-db.com/exploits/5265 -https://www.exploit-db.com/exploits/5266 -https://www.exploit-db.com/exploits/5269 -https://www.exploit-db.com/exploits/5270 -https://www.exploit-db.com/exploits/5271 -https://www.exploit-db.com/exploits/5272 -https://www.exploit-db.com/exploits/5273 -https://www.exploit-db.com/exploits/5274 -https://www.exploit-db.com/exploits/5275 -https://www.exploit-db.com/exploits/5276 -https://www.exploit-db.com/exploits/5277 -https://www.exploit-db.com/exploits/5278 -https://www.exploit-db.com/exploits/5280 -https://www.exploit-db.com/exploits/5281 -https://www.exploit-db.com/exploits/5283 -https://www.exploit-db.com/exploits/5285 -https://www.exploit-db.com/exploits/5288 -https://www.exploit-db.com/exploits/5289 -https://www.exploit-db.com/exploits/5290 -https://www.exploit-db.com/exploits/5292 -https://www.exploit-db.com/exploits/5293 -https://www.exploit-db.com/exploits/5294 -https://www.exploit-db.com/exploits/5295 -https://www.exploit-db.com/exploits/5296 -https://www.exploit-db.com/exploits/5297 -https://www.exploit-db.com/exploits/5298 -https://www.exploit-db.com/exploits/5301 -https://www.exploit-db.com/exploits/5302 -https://www.exploit-db.com/exploits/5303 -https://www.exploit-db.com/exploits/5304 -https://www.exploit-db.com/exploits/5305 -https://www.exploit-db.com/exploits/5306 -https://www.exploit-db.com/exploits/5307 -https://www.exploit-db.com/exploits/5308 -https://www.exploit-db.com/exploits/5309 -https://www.exploit-db.com/exploits/5310 -https://www.exploit-db.com/exploits/5311 -https://www.exploit-db.com/exploits/5312 -https://www.exploit-db.com/exploits/5313 -https://www.exploit-db.com/exploits/5314 -https://www.exploit-db.com/exploits/5315 -https://www.exploit-db.com/exploits/5317 -https://www.exploit-db.com/exploits/5318 -https://www.exploit-db.com/exploits/5319 -https://www.exploit-db.com/exploits/5322 -https://www.exploit-db.com/exploits/5323 -https://www.exploit-db.com/exploits/5324 -https://www.exploit-db.com/exploits/5325 -https://www.exploit-db.com/exploits/5326 -https://www.exploit-db.com/exploits/5328 -https://www.exploit-db.com/exploits/5329 -https://www.exploit-db.com/exploits/5330 -https://www.exploit-db.com/exploits/5331 -https://www.exploit-db.com/exploits/5332 -https://www.exploit-db.com/exploits/5333 -https://www.exploit-db.com/exploits/5334 -https://www.exploit-db.com/exploits/5337 -https://www.exploit-db.com/exploits/5338 -https://www.exploit-db.com/exploits/5340 -https://www.exploit-db.com/exploits/5341 -https://www.exploit-db.com/exploits/5342 -https://www.exploit-db.com/exploits/5343 -https://www.exploit-db.com/exploits/5345 -https://www.exploit-db.com/exploits/5346 -https://www.exploit-db.com/exploits/5347 -https://www.exploit-db.com/exploits/5348 -https://www.exploit-db.com/exploits/5349 -https://www.exploit-db.com/exploits/5350 -https://www.exploit-db.com/exploits/5352 -https://www.exploit-db.com/exploits/5353 -https://www.exploit-db.com/exploits/5354 -https://www.exploit-db.com/exploits/5355 -https://www.exploit-db.com/exploits/5356 -https://www.exploit-db.com/exploits/5357 -https://www.exploit-db.com/exploits/5358 -https://www.exploit-db.com/exploits/5359 -https://www.exploit-db.com/exploits/5360 -https://www.exploit-db.com/exploits/5362 -https://www.exploit-db.com/exploits/5364 -https://www.exploit-db.com/exploits/5365 -https://www.exploit-db.com/exploits/5367 -https://www.exploit-db.com/exploits/5368 -https://www.exploit-db.com/exploits/5369 -https://www.exploit-db.com/exploits/5370 -https://www.exploit-db.com/exploits/5371 -https://www.exploit-db.com/exploits/5373 -https://www.exploit-db.com/exploits/5375 -https://www.exploit-db.com/exploits/5377 -https://www.exploit-db.com/exploits/5379 -https://www.exploit-db.com/exploits/5380 -https://www.exploit-db.com/exploits/5381 -https://www.exploit-db.com/exploits/5382 -https://www.exploit-db.com/exploits/5383 -https://www.exploit-db.com/exploits/5384 -https://www.exploit-db.com/exploits/5385 -https://www.exploit-db.com/exploits/5386 -https://www.exploit-db.com/exploits/5387 -https://www.exploit-db.com/exploits/5388 -https://www.exploit-db.com/exploits/5389 -https://www.exploit-db.com/exploits/5390 -https://www.exploit-db.com/exploits/5391 -https://www.exploit-db.com/exploits/5392 -https://www.exploit-db.com/exploits/5393 -https://www.exploit-db.com/exploits/5394 -https://www.exploit-db.com/exploits/5395 -https://www.exploit-db.com/exploits/5397 -https://www.exploit-db.com/exploits/5398 -https://www.exploit-db.com/exploits/5399 -https://www.exploit-db.com/exploits/5400 -https://www.exploit-db.com/exploits/5401 -https://www.exploit-db.com/exploits/5402 -https://www.exploit-db.com/exploits/5405 -https://www.exploit-db.com/exploits/5406 -https://www.exploit-db.com/exploits/5407 -https://www.exploit-db.com/exploits/5408 -https://www.exploit-db.com/exploits/5409 -https://www.exploit-db.com/exploits/5410 -https://www.exploit-db.com/exploits/5414 -https://www.exploit-db.com/exploits/5415 -https://www.exploit-db.com/exploits/5416 -https://www.exploit-db.com/exploits/5418 -https://www.exploit-db.com/exploits/5419 -https://www.exploit-db.com/exploits/5420 -https://www.exploit-db.com/exploits/5421 -https://www.exploit-db.com/exploits/5422 -https://www.exploit-db.com/exploits/5423 -https://www.exploit-db.com/exploits/5424 -https://www.exploit-db.com/exploits/5425 -https://www.exploit-db.com/exploits/5426 -https://www.exploit-db.com/exploits/5427 -https://www.exploit-db.com/exploits/5428 -https://www.exploit-db.com/exploits/5429 -https://www.exploit-db.com/exploits/5431 -https://www.exploit-db.com/exploits/5432 -https://www.exploit-db.com/exploits/5433 -https://www.exploit-db.com/exploits/5434 -https://www.exploit-db.com/exploits/5435 -https://www.exploit-db.com/exploits/5436 -https://www.exploit-db.com/exploits/5437 -https://www.exploit-db.com/exploits/5440 -https://www.exploit-db.com/exploits/5442 -https://www.exploit-db.com/exploits/5444 -https://www.exploit-db.com/exploits/5446 -https://www.exploit-db.com/exploits/5447 -https://www.exploit-db.com/exploits/5448 -https://www.exploit-db.com/exploits/5449 -https://www.exploit-db.com/exploits/5450 -https://www.exploit-db.com/exploits/5451 -https://www.exploit-db.com/exploits/5452 -https://www.exploit-db.com/exploits/5453 -https://www.exploit-db.com/exploits/5454 -https://www.exploit-db.com/exploits/5455 -https://www.exploit-db.com/exploits/5456 -https://www.exploit-db.com/exploits/5457 -https://www.exploit-db.com/exploits/5458 -https://www.exploit-db.com/exploits/5459 -https://www.exploit-db.com/exploits/5460 -https://www.exploit-db.com/exploits/5463 -https://www.exploit-db.com/exploits/5464 -https://www.exploit-db.com/exploits/5465 -https://www.exploit-db.com/exploits/5466 -https://www.exploit-db.com/exploits/5467 -https://www.exploit-db.com/exploits/5468 -https://www.exploit-db.com/exploits/5469 -https://www.exploit-db.com/exploits/5470 -https://www.exploit-db.com/exploits/5471 -https://www.exploit-db.com/exploits/5472 -https://www.exploit-db.com/exploits/5474 -https://www.exploit-db.com/exploits/5475 -https://www.exploit-db.com/exploits/5477 -https://www.exploit-db.com/exploits/5478 -https://www.exploit-db.com/exploits/5479 -https://www.exploit-db.com/exploits/5480 -https://www.exploit-db.com/exploits/5481 -https://www.exploit-db.com/exploits/5482 -https://www.exploit-db.com/exploits/5483 -https://www.exploit-db.com/exploits/5484 -https://www.exploit-db.com/exploits/5485 -https://www.exploit-db.com/exploits/5486 -https://www.exploit-db.com/exploits/5487 -https://www.exploit-db.com/exploits/5488 -https://www.exploit-db.com/exploits/5489 -https://www.exploit-db.com/exploits/5491 -https://www.exploit-db.com/exploits/5492 -https://www.exploit-db.com/exploits/5493 -https://www.exploit-db.com/exploits/5494 -https://www.exploit-db.com/exploits/5495 -https://www.exploit-db.com/exploits/5496 -https://www.exploit-db.com/exploits/5499 -https://www.exploit-db.com/exploits/5500 -https://www.exploit-db.com/exploits/5502 -https://www.exploit-db.com/exploits/5503 -https://www.exploit-db.com/exploits/5504 -https://www.exploit-db.com/exploits/5505 -https://www.exploit-db.com/exploits/5506 -https://www.exploit-db.com/exploits/5507 -https://www.exploit-db.com/exploits/5508 -https://www.exploit-db.com/exploits/5509 -https://www.exploit-db.com/exploits/5510 -https://www.exploit-db.com/exploits/5511 -https://www.exploit-db.com/exploits/5515 -https://www.exploit-db.com/exploits/5516 -https://www.exploit-db.com/exploits/5517 -https://www.exploit-db.com/exploits/5518 -https://www.exploit-db.com/exploits/5519 -https://www.exploit-db.com/exploits/5520 -https://www.exploit-db.com/exploits/5521 -https://www.exploit-db.com/exploits/5522 -https://www.exploit-db.com/exploits/5523 -https://www.exploit-db.com/exploits/5524 -https://www.exploit-db.com/exploits/5525 -https://www.exploit-db.com/exploits/5526 -https://www.exploit-db.com/exploits/5527 -https://www.exploit-db.com/exploits/5528 -https://www.exploit-db.com/exploits/5529 -https://www.exploit-db.com/exploits/5530 -https://www.exploit-db.com/exploits/5531 -https://www.exploit-db.com/exploits/5532 -https://www.exploit-db.com/exploits/5533 -https://www.exploit-db.com/exploits/5535 -https://www.exploit-db.com/exploits/5537 -https://www.exploit-db.com/exploits/5538 -https://www.exploit-db.com/exploits/5539 -https://www.exploit-db.com/exploits/5540 -https://www.exploit-db.com/exploits/5541 -https://www.exploit-db.com/exploits/5542 -https://www.exploit-db.com/exploits/5543 -https://www.exploit-db.com/exploits/5544 -https://www.exploit-db.com/exploits/5545 -https://www.exploit-db.com/exploits/5546 -https://www.exploit-db.com/exploits/5547 -https://www.exploit-db.com/exploits/5548 -https://www.exploit-db.com/exploits/5549 -https://www.exploit-db.com/exploits/5550 -https://www.exploit-db.com/exploits/5551 -https://www.exploit-db.com/exploits/5552 -https://www.exploit-db.com/exploits/5553 -https://www.exploit-db.com/exploits/5554 -https://www.exploit-db.com/exploits/5555 -https://www.exploit-db.com/exploits/5556 -https://www.exploit-db.com/exploits/5557 -https://www.exploit-db.com/exploits/5558 -https://www.exploit-db.com/exploits/5559 -https://www.exploit-db.com/exploits/5560 -https://www.exploit-db.com/exploits/5561 -https://www.exploit-db.com/exploits/5563 -https://www.exploit-db.com/exploits/5564 -https://www.exploit-db.com/exploits/5565 -https://www.exploit-db.com/exploits/5566 -https://www.exploit-db.com/exploits/5567 -https://www.exploit-db.com/exploits/5568 -https://www.exploit-db.com/exploits/5569 -https://www.exploit-db.com/exploits/5575 -https://www.exploit-db.com/exploits/5576 -https://www.exploit-db.com/exploits/5577 -https://www.exploit-db.com/exploits/5578 -https://www.exploit-db.com/exploits/5579 -https://www.exploit-db.com/exploits/5580 -https://www.exploit-db.com/exploits/5581 -https://www.exploit-db.com/exploits/5582 -https://www.exploit-db.com/exploits/5583 -https://www.exploit-db.com/exploits/5585 -https://www.exploit-db.com/exploits/5586 -https://www.exploit-db.com/exploits/5587 -https://www.exploit-db.com/exploits/5588 -https://www.exploit-db.com/exploits/5590 -https://www.exploit-db.com/exploits/5591 -https://www.exploit-db.com/exploits/5593 -https://www.exploit-db.com/exploits/5594 -https://www.exploit-db.com/exploits/5595 -https://www.exploit-db.com/exploits/5596 -https://www.exploit-db.com/exploits/5597 -https://www.exploit-db.com/exploits/5598 -https://www.exploit-db.com/exploits/5599 -https://www.exploit-db.com/exploits/5600 -https://www.exploit-db.com/exploits/5601 -https://www.exploit-db.com/exploits/5602 -https://www.exploit-db.com/exploits/5603 -https://www.exploit-db.com/exploits/5604 -https://www.exploit-db.com/exploits/5605 -https://www.exploit-db.com/exploits/5606 -https://www.exploit-db.com/exploits/5607 -https://www.exploit-db.com/exploits/5608 -https://www.exploit-db.com/exploits/5609 -https://www.exploit-db.com/exploits/5610 -https://www.exploit-db.com/exploits/5611 -https://www.exploit-db.com/exploits/5612 -https://www.exploit-db.com/exploits/5613 -https://www.exploit-db.com/exploits/5614 -https://www.exploit-db.com/exploits/5615 -https://www.exploit-db.com/exploits/5616 -https://www.exploit-db.com/exploits/5617 -https://www.exploit-db.com/exploits/5618 -https://www.exploit-db.com/exploits/5619 -https://www.exploit-db.com/exploits/5620 -https://www.exploit-db.com/exploits/5621 -https://www.exploit-db.com/exploits/5622 -https://www.exploit-db.com/exploits/5623 -https://www.exploit-db.com/exploits/5624 -https://www.exploit-db.com/exploits/5626 -https://www.exploit-db.com/exploits/5627 -https://www.exploit-db.com/exploits/5628 -https://www.exploit-db.com/exploits/5629 -https://www.exploit-db.com/exploits/5630 -https://www.exploit-db.com/exploits/5631 -https://www.exploit-db.com/exploits/5632 -https://www.exploit-db.com/exploits/5634 -https://www.exploit-db.com/exploits/5635 -https://www.exploit-db.com/exploits/5637 -https://www.exploit-db.com/exploits/5638 -https://www.exploit-db.com/exploits/5639 -https://www.exploit-db.com/exploits/5640 -https://www.exploit-db.com/exploits/5641 -https://www.exploit-db.com/exploits/5642 -https://www.exploit-db.com/exploits/5645 -https://www.exploit-db.com/exploits/5647 -https://www.exploit-db.com/exploits/5648 -https://www.exploit-db.com/exploits/5650 -https://www.exploit-db.com/exploits/5651 -https://www.exploit-db.com/exploits/5652 -https://www.exploit-db.com/exploits/5653 -https://www.exploit-db.com/exploits/5654 -https://www.exploit-db.com/exploits/5655 -https://www.exploit-db.com/exploits/5657 -https://www.exploit-db.com/exploits/5658 -https://www.exploit-db.com/exploits/5659 -https://www.exploit-db.com/exploits/566/ -https://www.exploit-db.com/exploits/5660 -https://www.exploit-db.com/exploits/5661 -https://www.exploit-db.com/exploits/5662 -https://www.exploit-db.com/exploits/5664 -https://www.exploit-db.com/exploits/5665 -https://www.exploit-db.com/exploits/5666 -https://www.exploit-db.com/exploits/5667 -https://www.exploit-db.com/exploits/5668 -https://www.exploit-db.com/exploits/5669 -https://www.exploit-db.com/exploits/5670 -https://www.exploit-db.com/exploits/5671 -https://www.exploit-db.com/exploits/5672 -https://www.exploit-db.com/exploits/5673 -https://www.exploit-db.com/exploits/5674 -https://www.exploit-db.com/exploits/5675 -https://www.exploit-db.com/exploits/5676 -https://www.exploit-db.com/exploits/5677 -https://www.exploit-db.com/exploits/5678 -https://www.exploit-db.com/exploits/5680 -https://www.exploit-db.com/exploits/5681 -https://www.exploit-db.com/exploits/5682 -https://www.exploit-db.com/exploits/5683 -https://www.exploit-db.com/exploits/5685 -https://www.exploit-db.com/exploits/5687 -https://www.exploit-db.com/exploits/5688 -https://www.exploit-db.com/exploits/5689 -https://www.exploit-db.com/exploits/5690 -https://www.exploit-db.com/exploits/5692 -https://www.exploit-db.com/exploits/5694 -https://www.exploit-db.com/exploits/5695 -https://www.exploit-db.com/exploits/5698 -https://www.exploit-db.com/exploits/5699 -https://www.exploit-db.com/exploits/5700 -https://www.exploit-db.com/exploits/5701 -https://www.exploit-db.com/exploits/5703 -https://www.exploit-db.com/exploits/5704 -https://www.exploit-db.com/exploits/5705 -https://www.exploit-db.com/exploits/5706 -https://www.exploit-db.com/exploits/5707 -https://www.exploit-db.com/exploits/5708 -https://www.exploit-db.com/exploits/5709 -https://www.exploit-db.com/exploits/5710 -https://www.exploit-db.com/exploits/5711 -https://www.exploit-db.com/exploits/5712 -https://www.exploit-db.com/exploits/5713 -https://www.exploit-db.com/exploits/5714 -https://www.exploit-db.com/exploits/5715 -https://www.exploit-db.com/exploits/5716 -https://www.exploit-db.com/exploits/5717 -https://www.exploit-db.com/exploits/5718 -https://www.exploit-db.com/exploits/5719 -https://www.exploit-db.com/exploits/5720 -https://www.exploit-db.com/exploits/5721 -https://www.exploit-db.com/exploits/5722 -https://www.exploit-db.com/exploits/5723 -https://www.exploit-db.com/exploits/5724 -https://www.exploit-db.com/exploits/5725 -https://www.exploit-db.com/exploits/5726 -https://www.exploit-db.com/exploits/5728 -https://www.exploit-db.com/exploits/5729 -https://www.exploit-db.com/exploits/5730 -https://www.exploit-db.com/exploits/5731 -https://www.exploit-db.com/exploits/5732 -https://www.exploit-db.com/exploits/5734 -https://www.exploit-db.com/exploits/5736 -https://www.exploit-db.com/exploits/5737 -https://www.exploit-db.com/exploits/5739 -https://www.exploit-db.com/exploits/5740 -https://www.exploit-db.com/exploits/5741 -https://www.exploit-db.com/exploits/5742 -https://www.exploit-db.com/exploits/5743 -https://www.exploit-db.com/exploits/5744 -https://www.exploit-db.com/exploits/5745 -https://www.exploit-db.com/exploits/5746 -https://www.exploit-db.com/exploits/5747 -https://www.exploit-db.com/exploits/5748 -https://www.exploit-db.com/exploits/5749 -https://www.exploit-db.com/exploits/5750 -https://www.exploit-db.com/exploits/5751 -https://www.exploit-db.com/exploits/5752 -https://www.exploit-db.com/exploits/5753 -https://www.exploit-db.com/exploits/5754 -https://www.exploit-db.com/exploits/5755 -https://www.exploit-db.com/exploits/5756 -https://www.exploit-db.com/exploits/5757 -https://www.exploit-db.com/exploits/5758 -https://www.exploit-db.com/exploits/5759 -https://www.exploit-db.com/exploits/5760 -https://www.exploit-db.com/exploits/5761 -https://www.exploit-db.com/exploits/5762 -https://www.exploit-db.com/exploits/5764 -https://www.exploit-db.com/exploits/5765 -https://www.exploit-db.com/exploits/5766 -https://www.exploit-db.com/exploits/5767 -https://www.exploit-db.com/exploits/5768 -https://www.exploit-db.com/exploits/5769 -https://www.exploit-db.com/exploits/5770 -https://www.exploit-db.com/exploits/5771 -https://www.exploit-db.com/exploits/5772 -https://www.exploit-db.com/exploits/5773 -https://www.exploit-db.com/exploits/5774 -https://www.exploit-db.com/exploits/5775 -https://www.exploit-db.com/exploits/5776 -https://www.exploit-db.com/exploits/5777 -https://www.exploit-db.com/exploits/5778 -https://www.exploit-db.com/exploits/5779 -https://www.exploit-db.com/exploits/5780 -https://www.exploit-db.com/exploits/5781 -https://www.exploit-db.com/exploits/5782 -https://www.exploit-db.com/exploits/5783 -https://www.exploit-db.com/exploits/5784 -https://www.exploit-db.com/exploits/5785 -https://www.exploit-db.com/exploits/5787 -https://www.exploit-db.com/exploits/5788 -https://www.exploit-db.com/exploits/5789 -https://www.exploit-db.com/exploits/5790 -https://www.exploit-db.com/exploits/5791 -https://www.exploit-db.com/exploits/5792 -https://www.exploit-db.com/exploits/5793 -https://www.exploit-db.com/exploits/5794 -https://www.exploit-db.com/exploits/5795 -https://www.exploit-db.com/exploits/5796 -https://www.exploit-db.com/exploits/5797 -https://www.exploit-db.com/exploits/5798 -https://www.exploit-db.com/exploits/5800 -https://www.exploit-db.com/exploits/5801 -https://www.exploit-db.com/exploits/5802 -https://www.exploit-db.com/exploits/5803 -https://www.exploit-db.com/exploits/5804 -https://www.exploit-db.com/exploits/5805 -https://www.exploit-db.com/exploits/5806 -https://www.exploit-db.com/exploits/5807 -https://www.exploit-db.com/exploits/5808 -https://www.exploit-db.com/exploits/5809 -https://www.exploit-db.com/exploits/5810 -https://www.exploit-db.com/exploits/5811 -https://www.exploit-db.com/exploits/5812 -https://www.exploit-db.com/exploits/5813 -https://www.exploit-db.com/exploits/5814 -https://www.exploit-db.com/exploits/5815 -https://www.exploit-db.com/exploits/5817 -https://www.exploit-db.com/exploits/5818 -https://www.exploit-db.com/exploits/5819 -https://www.exploit-db.com/exploits/5820 -https://www.exploit-db.com/exploits/5821 -https://www.exploit-db.com/exploits/5822 -https://www.exploit-db.com/exploits/5823 -https://www.exploit-db.com/exploits/5824 -https://www.exploit-db.com/exploits/5826 -https://www.exploit-db.com/exploits/5827 -https://www.exploit-db.com/exploits/5828 -https://www.exploit-db.com/exploits/5829 -https://www.exploit-db.com/exploits/5830 -https://www.exploit-db.com/exploits/5831 -https://www.exploit-db.com/exploits/5832 -https://www.exploit-db.com/exploits/5833 -https://www.exploit-db.com/exploits/5834 -https://www.exploit-db.com/exploits/5836 -https://www.exploit-db.com/exploits/5837 -https://www.exploit-db.com/exploits/5838 -https://www.exploit-db.com/exploits/5839 -https://www.exploit-db.com/exploits/5840 -https://www.exploit-db.com/exploits/5841 -https://www.exploit-db.com/exploits/5842 -https://www.exploit-db.com/exploits/5843 -https://www.exploit-db.com/exploits/5845 -https://www.exploit-db.com/exploits/5846 -https://www.exploit-db.com/exploits/5847 -https://www.exploit-db.com/exploits/5848 -https://www.exploit-db.com/exploits/5849 -https://www.exploit-db.com/exploits/5850 -https://www.exploit-db.com/exploits/5851 -https://www.exploit-db.com/exploits/5853 -https://www.exploit-db.com/exploits/5854 -https://www.exploit-db.com/exploits/5855 -https://www.exploit-db.com/exploits/5856 -https://www.exploit-db.com/exploits/5857 -https://www.exploit-db.com/exploits/5858 -https://www.exploit-db.com/exploits/5859 -https://www.exploit-db.com/exploits/5860 -https://www.exploit-db.com/exploits/5863 -https://www.exploit-db.com/exploits/5864 -https://www.exploit-db.com/exploits/5865 -https://www.exploit-db.com/exploits/5867 -https://www.exploit-db.com/exploits/5871 -https://www.exploit-db.com/exploits/5872 -https://www.exploit-db.com/exploits/5873 -https://www.exploit-db.com/exploits/5875 -https://www.exploit-db.com/exploits/5876 -https://www.exploit-db.com/exploits/5877 -https://www.exploit-db.com/exploits/5878 -https://www.exploit-db.com/exploits/5879 -https://www.exploit-db.com/exploits/5883 -https://www.exploit-db.com/exploits/5884 -https://www.exploit-db.com/exploits/5885 -https://www.exploit-db.com/exploits/5887 -https://www.exploit-db.com/exploits/5888 -https://www.exploit-db.com/exploits/5889 -https://www.exploit-db.com/exploits/5890 -https://www.exploit-db.com/exploits/5892 -https://www.exploit-db.com/exploits/5893 -https://www.exploit-db.com/exploits/5895 -https://www.exploit-db.com/exploits/5896 -https://www.exploit-db.com/exploits/5897 -https://www.exploit-db.com/exploits/5898 -https://www.exploit-db.com/exploits/5899 -https://www.exploit-db.com/exploits/5900 -https://www.exploit-db.com/exploits/5901 -https://www.exploit-db.com/exploits/5902/ -https://www.exploit-db.com/exploits/5903 -https://www.exploit-db.com/exploits/5904 -https://www.exploit-db.com/exploits/5905 -https://www.exploit-db.com/exploits/5906 -https://www.exploit-db.com/exploits/5908 -https://www.exploit-db.com/exploits/5909 -https://www.exploit-db.com/exploits/5911 -https://www.exploit-db.com/exploits/5913 -https://www.exploit-db.com/exploits/5914 -https://www.exploit-db.com/exploits/5915 -https://www.exploit-db.com/exploits/5916 -https://www.exploit-db.com/exploits/5917 -https://www.exploit-db.com/exploits/5918 -https://www.exploit-db.com/exploits/5919 -https://www.exploit-db.com/exploits/5920 -https://www.exploit-db.com/exploits/5921 -https://www.exploit-db.com/exploits/5924 -https://www.exploit-db.com/exploits/5925 -https://www.exploit-db.com/exploits/5926 -https://www.exploit-db.com/exploits/5927 -https://www.exploit-db.com/exploits/5928 -https://www.exploit-db.com/exploits/5929 -https://www.exploit-db.com/exploits/5930 -https://www.exploit-db.com/exploits/5932 -https://www.exploit-db.com/exploits/5933 -https://www.exploit-db.com/exploits/5934 -https://www.exploit-db.com/exploits/5936 -https://www.exploit-db.com/exploits/5937 -https://www.exploit-db.com/exploits/5938 -https://www.exploit-db.com/exploits/5939 -https://www.exploit-db.com/exploits/5940 -https://www.exploit-db.com/exploits/5941 -https://www.exploit-db.com/exploits/5942 -https://www.exploit-db.com/exploits/5946 -https://www.exploit-db.com/exploits/5947 -https://www.exploit-db.com/exploits/5948 -https://www.exploit-db.com/exploits/5949 -https://www.exploit-db.com/exploits/5950 -https://www.exploit-db.com/exploits/5951 -https://www.exploit-db.com/exploits/5952 -https://www.exploit-db.com/exploits/5954 -https://www.exploit-db.com/exploits/5955 -https://www.exploit-db.com/exploits/5956 -https://www.exploit-db.com/exploits/5957 -https://www.exploit-db.com/exploits/5958 -https://www.exploit-db.com/exploits/5959 -https://www.exploit-db.com/exploits/5960 -https://www.exploit-db.com/exploits/5961 -https://www.exploit-db.com/exploits/5962 -https://www.exploit-db.com/exploits/5963 -https://www.exploit-db.com/exploits/5964 -https://www.exploit-db.com/exploits/5965 -https://www.exploit-db.com/exploits/5966 -https://www.exploit-db.com/exploits/5967 -https://www.exploit-db.com/exploits/5968 -https://www.exploit-db.com/exploits/5969 -https://www.exploit-db.com/exploits/5970 -https://www.exploit-db.com/exploits/5971 -https://www.exploit-db.com/exploits/5973 -https://www.exploit-db.com/exploits/5974 -https://www.exploit-db.com/exploits/5975 -https://www.exploit-db.com/exploits/5976 -https://www.exploit-db.com/exploits/5977 -https://www.exploit-db.com/exploits/5981 -https://www.exploit-db.com/exploits/5982 -https://www.exploit-db.com/exploits/5984 -https://www.exploit-db.com/exploits/5985 -https://www.exploit-db.com/exploits/5987 -https://www.exploit-db.com/exploits/5988 -https://www.exploit-db.com/exploits/5989 -https://www.exploit-db.com/exploits/5991 -https://www.exploit-db.com/exploits/5992 -https://www.exploit-db.com/exploits/5993 -https://www.exploit-db.com/exploits/5996 -https://www.exploit-db.com/exploits/5997 -https://www.exploit-db.com/exploits/5998 -https://www.exploit-db.com/exploits/5999 -https://www.exploit-db.com/exploits/6003 -https://www.exploit-db.com/exploits/6004 -https://www.exploit-db.com/exploits/6007 -https://www.exploit-db.com/exploits/6008 -https://www.exploit-db.com/exploits/6009 -https://www.exploit-db.com/exploits/6010 -https://www.exploit-db.com/exploits/6011 -https://www.exploit-db.com/exploits/6012 -https://www.exploit-db.com/exploits/6013 -https://www.exploit-db.com/exploits/6014 -https://www.exploit-db.com/exploits/6015 -https://www.exploit-db.com/exploits/6016 -https://www.exploit-db.com/exploits/6017 -https://www.exploit-db.com/exploits/6018 -https://www.exploit-db.com/exploits/6019 -https://www.exploit-db.com/exploits/6020 -https://www.exploit-db.com/exploits/6021 -https://www.exploit-db.com/exploits/6022 -https://www.exploit-db.com/exploits/6023 -https://www.exploit-db.com/exploits/6024 -https://www.exploit-db.com/exploits/6025 -https://www.exploit-db.com/exploits/6026 -https://www.exploit-db.com/exploits/6027 -https://www.exploit-db.com/exploits/6028 -https://www.exploit-db.com/exploits/6030 -https://www.exploit-db.com/exploits/6031 -https://www.exploit-db.com/exploits/6032 -https://www.exploit-db.com/exploits/6033 -https://www.exploit-db.com/exploits/6034 -https://www.exploit-db.com/exploits/6035 -https://www.exploit-db.com/exploits/6036 -https://www.exploit-db.com/exploits/6037 -https://www.exploit-db.com/exploits/6038 -https://www.exploit-db.com/exploits/6039 -https://www.exploit-db.com/exploits/6040 -https://www.exploit-db.com/exploits/6042 -https://www.exploit-db.com/exploits/6043 -https://www.exploit-db.com/exploits/6044 -https://www.exploit-db.com/exploits/6046 -https://www.exploit-db.com/exploits/6050 -https://www.exploit-db.com/exploits/6056 -https://www.exploit-db.com/exploits/6057 -https://www.exploit-db.com/exploits/6058 -https://www.exploit-db.com/exploits/6059 -https://www.exploit-db.com/exploits/6060 -https://www.exploit-db.com/exploits/6061 -https://www.exploit-db.com/exploits/6062 -https://www.exploit-db.com/exploits/6063 -https://www.exploit-db.com/exploits/6064 -https://www.exploit-db.com/exploits/6065 -https://www.exploit-db.com/exploits/6066 -https://www.exploit-db.com/exploits/6067 -https://www.exploit-db.com/exploits/6068 -https://www.exploit-db.com/exploits/6069 -https://www.exploit-db.com/exploits/6070 -https://www.exploit-db.com/exploits/6071 -https://www.exploit-db.com/exploits/6073 -https://www.exploit-db.com/exploits/6074 -https://www.exploit-db.com/exploits/6075 -https://www.exploit-db.com/exploits/6077 -https://www.exploit-db.com/exploits/6078 -https://www.exploit-db.com/exploits/6079 -https://www.exploit-db.com/exploits/6080 -https://www.exploit-db.com/exploits/6082 -https://www.exploit-db.com/exploits/6083 -https://www.exploit-db.com/exploits/6084 -https://www.exploit-db.com/exploits/6085 -https://www.exploit-db.com/exploits/6086 -https://www.exploit-db.com/exploits/6087 -https://www.exploit-db.com/exploits/6088 -https://www.exploit-db.com/exploits/6089 -https://www.exploit-db.com/exploits/6090 -https://www.exploit-db.com/exploits/6091 -https://www.exploit-db.com/exploits/6092 -https://www.exploit-db.com/exploits/6094 -https://www.exploit-db.com/exploits/6096 -https://www.exploit-db.com/exploits/6097 -https://www.exploit-db.com/exploits/6098 -https://www.exploit-db.com/exploits/6099 -https://www.exploit-db.com/exploits/6101 -https://www.exploit-db.com/exploits/6102 -https://www.exploit-db.com/exploits/6103 -https://www.exploit-db.com/exploits/6104 -https://www.exploit-db.com/exploits/6105 -https://www.exploit-db.com/exploits/6107 -https://www.exploit-db.com/exploits/6108 -https://www.exploit-db.com/exploits/6109 -https://www.exploit-db.com/exploits/6110 -https://www.exploit-db.com/exploits/6111 -https://www.exploit-db.com/exploits/6112 -https://www.exploit-db.com/exploits/6113 -https://www.exploit-db.com/exploits/6114 -https://www.exploit-db.com/exploits/6115 -https://www.exploit-db.com/exploits/6116 -https://www.exploit-db.com/exploits/6117 -https://www.exploit-db.com/exploits/6118 -https://www.exploit-db.com/exploits/6119 -https://www.exploit-db.com/exploits/6121 -https://www.exploit-db.com/exploits/6122 -https://www.exploit-db.com/exploits/6123 -https://www.exploit-db.com/exploits/6125 -https://www.exploit-db.com/exploits/6126 -https://www.exploit-db.com/exploits/6127 -https://www.exploit-db.com/exploits/6128 -https://www.exploit-db.com/exploits/6130 -https://www.exploit-db.com/exploits/6131 -https://www.exploit-db.com/exploits/6132 -https://www.exploit-db.com/exploits/6133 -https://www.exploit-db.com/exploits/6134 -https://www.exploit-db.com/exploits/6135 -https://www.exploit-db.com/exploits/6137 -https://www.exploit-db.com/exploits/6138 -https://www.exploit-db.com/exploits/6139 -https://www.exploit-db.com/exploits/6140 -https://www.exploit-db.com/exploits/6141 -https://www.exploit-db.com/exploits/6142 -https://www.exploit-db.com/exploits/6143 -https://www.exploit-db.com/exploits/6144 -https://www.exploit-db.com/exploits/6145 -https://www.exploit-db.com/exploits/6146 -https://www.exploit-db.com/exploits/6147 -https://www.exploit-db.com/exploits/6148 -https://www.exploit-db.com/exploits/6149 -https://www.exploit-db.com/exploits/6150 -https://www.exploit-db.com/exploits/6151 -https://www.exploit-db.com/exploits/6152 -https://www.exploit-db.com/exploits/6153 -https://www.exploit-db.com/exploits/6154 -https://www.exploit-db.com/exploits/6156 -https://www.exploit-db.com/exploits/6157 -https://www.exploit-db.com/exploits/6159 -https://www.exploit-db.com/exploits/6160 -https://www.exploit-db.com/exploits/6161 -https://www.exploit-db.com/exploits/6162 -https://www.exploit-db.com/exploits/6163 -https://www.exploit-db.com/exploits/6164 -https://www.exploit-db.com/exploits/6165 -https://www.exploit-db.com/exploits/6167 -https://www.exploit-db.com/exploits/6169 -https://www.exploit-db.com/exploits/6170 -https://www.exploit-db.com/exploits/6171 -https://www.exploit-db.com/exploits/6173 -https://www.exploit-db.com/exploits/6174 -https://www.exploit-db.com/exploits/6176 -https://www.exploit-db.com/exploits/6177 -https://www.exploit-db.com/exploits/6178 -https://www.exploit-db.com/exploits/6179 -https://www.exploit-db.com/exploits/6180 -https://www.exploit-db.com/exploits/6181 -https://www.exploit-db.com/exploits/6182 -https://www.exploit-db.com/exploits/6183 -https://www.exploit-db.com/exploits/6184 -https://www.exploit-db.com/exploits/6185 -https://www.exploit-db.com/exploits/6186 -https://www.exploit-db.com/exploits/6187 -https://www.exploit-db.com/exploits/6189 -https://www.exploit-db.com/exploits/6190 -https://www.exploit-db.com/exploits/6192 -https://www.exploit-db.com/exploits/6193 -https://www.exploit-db.com/exploits/6194 -https://www.exploit-db.com/exploits/6195 -https://www.exploit-db.com/exploits/6196 -https://www.exploit-db.com/exploits/6197 -https://www.exploit-db.com/exploits/6199 -https://www.exploit-db.com/exploits/6200 -https://www.exploit-db.com/exploits/6201 -https://www.exploit-db.com/exploits/6203 -https://www.exploit-db.com/exploits/6204 -https://www.exploit-db.com/exploits/6206 -https://www.exploit-db.com/exploits/6207 -https://www.exploit-db.com/exploits/6208 -https://www.exploit-db.com/exploits/6209 -https://www.exploit-db.com/exploits/621 -https://www.exploit-db.com/exploits/6210 -https://www.exploit-db.com/exploits/6213 -https://www.exploit-db.com/exploits/6214 -https://www.exploit-db.com/exploits/6215 -https://www.exploit-db.com/exploits/6216 -https://www.exploit-db.com/exploits/6218 -https://www.exploit-db.com/exploits/6220 -https://www.exploit-db.com/exploits/6221 -https://www.exploit-db.com/exploits/6222 -https://www.exploit-db.com/exploits/6223 -https://www.exploit-db.com/exploits/6224 -https://www.exploit-db.com/exploits/6225 -https://www.exploit-db.com/exploits/6226 -https://www.exploit-db.com/exploits/6227 -https://www.exploit-db.com/exploits/6228 -https://www.exploit-db.com/exploits/6229 -https://www.exploit-db.com/exploits/6230 -https://www.exploit-db.com/exploits/6231 -https://www.exploit-db.com/exploits/6232 -https://www.exploit-db.com/exploits/6233 -https://www.exploit-db.com/exploits/6234 -https://www.exploit-db.com/exploits/6235 -https://www.exploit-db.com/exploits/6237 -https://www.exploit-db.com/exploits/6238 -https://www.exploit-db.com/exploits/6239 -https://www.exploit-db.com/exploits/6240 -https://www.exploit-db.com/exploits/6244 -https://www.exploit-db.com/exploits/6247 -https://www.exploit-db.com/exploits/6248 -https://www.exploit-db.com/exploits/6249 -https://www.exploit-db.com/exploits/6250 -https://www.exploit-db.com/exploits/6251 -https://www.exploit-db.com/exploits/6252 -https://www.exploit-db.com/exploits/6253 -https://www.exploit-db.com/exploits/6254 -https://www.exploit-db.com/exploits/6255 -https://www.exploit-db.com/exploits/6256 -https://www.exploit-db.com/exploits/6257 -https://www.exploit-db.com/exploits/6258 -https://www.exploit-db.com/exploits/6259 -https://www.exploit-db.com/exploits/6260 -https://www.exploit-db.com/exploits/6261 -https://www.exploit-db.com/exploits/6262 -https://www.exploit-db.com/exploits/6269 -https://www.exploit-db.com/exploits/6270 -https://www.exploit-db.com/exploits/6271 -https://www.exploit-db.com/exploits/6273 -https://www.exploit-db.com/exploits/6276 -https://www.exploit-db.com/exploits/6277 -https://www.exploit-db.com/exploits/6278 -https://www.exploit-db.com/exploits/6279 -https://www.exploit-db.com/exploits/6280 -https://www.exploit-db.com/exploits/6281 -https://www.exploit-db.com/exploits/6282 -https://www.exploit-db.com/exploits/6284 -https://www.exploit-db.com/exploits/6285 -https://www.exploit-db.com/exploits/6286 -https://www.exploit-db.com/exploits/6287 -https://www.exploit-db.com/exploits/6288 -https://www.exploit-db.com/exploits/6293 -https://www.exploit-db.com/exploits/6294 -https://www.exploit-db.com/exploits/6295 -https://www.exploit-db.com/exploits/6296 -https://www.exploit-db.com/exploits/6297 -https://www.exploit-db.com/exploits/6298 -https://www.exploit-db.com/exploits/6300 -https://www.exploit-db.com/exploits/6301 -https://www.exploit-db.com/exploits/6305 -https://www.exploit-db.com/exploits/6307 -https://www.exploit-db.com/exploits/6309 -https://www.exploit-db.com/exploits/6310 -https://www.exploit-db.com/exploits/6312 -https://www.exploit-db.com/exploits/6313 -https://www.exploit-db.com/exploits/6314 -https://www.exploit-db.com/exploits/6315 -https://www.exploit-db.com/exploits/6317 -https://www.exploit-db.com/exploits/6318 -https://www.exploit-db.com/exploits/6319 -https://www.exploit-db.com/exploits/6320 -https://www.exploit-db.com/exploits/6321 -https://www.exploit-db.com/exploits/6322 -https://www.exploit-db.com/exploits/6323 -https://www.exploit-db.com/exploits/6324 -https://www.exploit-db.com/exploits/6326 -https://www.exploit-db.com/exploits/6327 -https://www.exploit-db.com/exploits/6328 -https://www.exploit-db.com/exploits/6329 -https://www.exploit-db.com/exploits/6330 -https://www.exploit-db.com/exploits/6332 -https://www.exploit-db.com/exploits/6333 -https://www.exploit-db.com/exploits/6334 -https://www.exploit-db.com/exploits/6335 -https://www.exploit-db.com/exploits/6336 -https://www.exploit-db.com/exploits/6337 -https://www.exploit-db.com/exploits/6338 -https://www.exploit-db.com/exploits/6339 -https://www.exploit-db.com/exploits/6341 -https://www.exploit-db.com/exploits/6342 -https://www.exploit-db.com/exploits/6343 -https://www.exploit-db.com/exploits/6344 -https://www.exploit-db.com/exploits/6345 -https://www.exploit-db.com/exploits/6346 -https://www.exploit-db.com/exploits/6347 -https://www.exploit-db.com/exploits/6348 -https://www.exploit-db.com/exploits/6349 -https://www.exploit-db.com/exploits/6350 -https://www.exploit-db.com/exploits/6351 -https://www.exploit-db.com/exploits/6352 -https://www.exploit-db.com/exploits/6353 -https://www.exploit-db.com/exploits/6354 -https://www.exploit-db.com/exploits/6355 -https://www.exploit-db.com/exploits/6357 -https://www.exploit-db.com/exploits/6361 -https://www.exploit-db.com/exploits/6362 -https://www.exploit-db.com/exploits/6364 -https://www.exploit-db.com/exploits/6365 -https://www.exploit-db.com/exploits/6366 -https://www.exploit-db.com/exploits/6367 -https://www.exploit-db.com/exploits/6368 -https://www.exploit-db.com/exploits/6369 -https://www.exploit-db.com/exploits/6370 -https://www.exploit-db.com/exploits/6371 -https://www.exploit-db.com/exploits/6372 -https://www.exploit-db.com/exploits/6373 -https://www.exploit-db.com/exploits/6374 -https://www.exploit-db.com/exploits/6375 -https://www.exploit-db.com/exploits/6376 -https://www.exploit-db.com/exploits/6377 -https://www.exploit-db.com/exploits/6378 -https://www.exploit-db.com/exploits/6379 -https://www.exploit-db.com/exploits/6380 -https://www.exploit-db.com/exploits/6381 -https://www.exploit-db.com/exploits/6382 -https://www.exploit-db.com/exploits/6383 -https://www.exploit-db.com/exploits/6385 -https://www.exploit-db.com/exploits/6386 -https://www.exploit-db.com/exploits/6387 -https://www.exploit-db.com/exploits/6388 -https://www.exploit-db.com/exploits/6389 -https://www.exploit-db.com/exploits/6390 -https://www.exploit-db.com/exploits/6392 -https://www.exploit-db.com/exploits/6393 -https://www.exploit-db.com/exploits/6394 -https://www.exploit-db.com/exploits/6395 -https://www.exploit-db.com/exploits/6396 -https://www.exploit-db.com/exploits/6397 -https://www.exploit-db.com/exploits/6398 -https://www.exploit-db.com/exploits/6401 -https://www.exploit-db.com/exploits/6402 -https://www.exploit-db.com/exploits/6403 -https://www.exploit-db.com/exploits/6404 -https://www.exploit-db.com/exploits/6405 -https://www.exploit-db.com/exploits/6406 -https://www.exploit-db.com/exploits/6407 -https://www.exploit-db.com/exploits/6408 -https://www.exploit-db.com/exploits/6409 -https://www.exploit-db.com/exploits/6411 -https://www.exploit-db.com/exploits/6412 -https://www.exploit-db.com/exploits/6413 -https://www.exploit-db.com/exploits/6414 -https://www.exploit-db.com/exploits/6416 -https://www.exploit-db.com/exploits/6417 -https://www.exploit-db.com/exploits/6420 -https://www.exploit-db.com/exploits/6421 -https://www.exploit-db.com/exploits/6422 -https://www.exploit-db.com/exploits/6423 -https://www.exploit-db.com/exploits/6424 -https://www.exploit-db.com/exploits/6425 -https://www.exploit-db.com/exploits/6426 -https://www.exploit-db.com/exploits/6427 -https://www.exploit-db.com/exploits/6428 -https://www.exploit-db.com/exploits/6430 -https://www.exploit-db.com/exploits/6431 -https://www.exploit-db.com/exploits/6432 -https://www.exploit-db.com/exploits/6433 -https://www.exploit-db.com/exploits/6437 -https://www.exploit-db.com/exploits/6442 -https://www.exploit-db.com/exploits/6443 -https://www.exploit-db.com/exploits/6444 -https://www.exploit-db.com/exploits/6445 -https://www.exploit-db.com/exploits/6446 -https://www.exploit-db.com/exploits/6447 -https://www.exploit-db.com/exploits/6449 -https://www.exploit-db.com/exploits/6451 -https://www.exploit-db.com/exploits/6452 -https://www.exploit-db.com/exploits/6453 -https://www.exploit-db.com/exploits/6454 -https://www.exploit-db.com/exploits/6455 -https://www.exploit-db.com/exploits/6456 -https://www.exploit-db.com/exploits/6457 -https://www.exploit-db.com/exploits/6458 -https://www.exploit-db.com/exploits/6459 -https://www.exploit-db.com/exploits/6460 -https://www.exploit-db.com/exploits/6461 -https://www.exploit-db.com/exploits/6462 -https://www.exploit-db.com/exploits/6463 -https://www.exploit-db.com/exploits/6465 -https://www.exploit-db.com/exploits/6466 -https://www.exploit-db.com/exploits/6467 -https://www.exploit-db.com/exploits/6468 -https://www.exploit-db.com/exploits/6469 -https://www.exploit-db.com/exploits/6470 -https://www.exploit-db.com/exploits/6471 -https://www.exploit-db.com/exploits/6472 -https://www.exploit-db.com/exploits/6473 -https://www.exploit-db.com/exploits/6474 -https://www.exploit-db.com/exploits/6475 -https://www.exploit-db.com/exploits/6476 -https://www.exploit-db.com/exploits/6477 -https://www.exploit-db.com/exploits/6478 -https://www.exploit-db.com/exploits/6480 -https://www.exploit-db.com/exploits/6482 -https://www.exploit-db.com/exploits/6483 -https://www.exploit-db.com/exploits/6485 -https://www.exploit-db.com/exploits/6486 -https://www.exploit-db.com/exploits/6487 -https://www.exploit-db.com/exploits/6488 -https://www.exploit-db.com/exploits/6489 -https://www.exploit-db.com/exploits/6490 -https://www.exploit-db.com/exploits/6491 -https://www.exploit-db.com/exploits/6493 -https://www.exploit-db.com/exploits/6494 -https://www.exploit-db.com/exploits/6498 -https://www.exploit-db.com/exploits/6499 -https://www.exploit-db.com/exploits/6500 -https://www.exploit-db.com/exploits/6501 -https://www.exploit-db.com/exploits/6502 -https://www.exploit-db.com/exploits/6503 -https://www.exploit-db.com/exploits/6504 -https://www.exploit-db.com/exploits/6505 -https://www.exploit-db.com/exploits/6506 -https://www.exploit-db.com/exploits/6508 -https://www.exploit-db.com/exploits/6510 -https://www.exploit-db.com/exploits/6511 -https://www.exploit-db.com/exploits/6512 -https://www.exploit-db.com/exploits/6513 -https://www.exploit-db.com/exploits/6514 -https://www.exploit-db.com/exploits/6515 -https://www.exploit-db.com/exploits/6516 -https://www.exploit-db.com/exploits/6517 -https://www.exploit-db.com/exploits/6518 -https://www.exploit-db.com/exploits/6519 -https://www.exploit-db.com/exploits/6520 -https://www.exploit-db.com/exploits/6521 -https://www.exploit-db.com/exploits/6522 -https://www.exploit-db.com/exploits/6524 -https://www.exploit-db.com/exploits/6525 -https://www.exploit-db.com/exploits/6526 -https://www.exploit-db.com/exploits/6527 -https://www.exploit-db.com/exploits/6529 -https://www.exploit-db.com/exploits/6530 -https://www.exploit-db.com/exploits/6531 -https://www.exploit-db.com/exploits/6533 -https://www.exploit-db.com/exploits/6535 -https://www.exploit-db.com/exploits/6536 -https://www.exploit-db.com/exploits/6537 -https://www.exploit-db.com/exploits/6538 -https://www.exploit-db.com/exploits/6539 -https://www.exploit-db.com/exploits/6540 -https://www.exploit-db.com/exploits/6542 -https://www.exploit-db.com/exploits/6543 -https://www.exploit-db.com/exploits/6545 -https://www.exploit-db.com/exploits/6547 -https://www.exploit-db.com/exploits/6549 -https://www.exploit-db.com/exploits/6550 -https://www.exploit-db.com/exploits/6551 -https://www.exploit-db.com/exploits/6552 -https://www.exploit-db.com/exploits/6553 -https://www.exploit-db.com/exploits/6554 -https://www.exploit-db.com/exploits/6555 -https://www.exploit-db.com/exploits/6556 -https://www.exploit-db.com/exploits/6557 -https://www.exploit-db.com/exploits/6558 -https://www.exploit-db.com/exploits/6559 -https://www.exploit-db.com/exploits/6560 -https://www.exploit-db.com/exploits/6561 -https://www.exploit-db.com/exploits/6562 -https://www.exploit-db.com/exploits/6563 -https://www.exploit-db.com/exploits/6565 -https://www.exploit-db.com/exploits/6566 -https://www.exploit-db.com/exploits/6567 -https://www.exploit-db.com/exploits/6568 -https://www.exploit-db.com/exploits/6571 -https://www.exploit-db.com/exploits/6572 -https://www.exploit-db.com/exploits/6574 -https://www.exploit-db.com/exploits/6576 -https://www.exploit-db.com/exploits/6577 -https://www.exploit-db.com/exploits/6578 -https://www.exploit-db.com/exploits/6579 -https://www.exploit-db.com/exploits/6580 -https://www.exploit-db.com/exploits/6582 -https://www.exploit-db.com/exploits/6583 -https://www.exploit-db.com/exploits/6584 -https://www.exploit-db.com/exploits/6585 -https://www.exploit-db.com/exploits/6586 -https://www.exploit-db.com/exploits/6587 -https://www.exploit-db.com/exploits/6588 -https://www.exploit-db.com/exploits/6589 -https://www.exploit-db.com/exploits/6591 -https://www.exploit-db.com/exploits/6592 -https://www.exploit-db.com/exploits/6593 -https://www.exploit-db.com/exploits/6594 -https://www.exploit-db.com/exploits/6595 -https://www.exploit-db.com/exploits/6596 -https://www.exploit-db.com/exploits/6598 -https://www.exploit-db.com/exploits/6599 -https://www.exploit-db.com/exploits/6600 -https://www.exploit-db.com/exploits/6601 -https://www.exploit-db.com/exploits/6602 -https://www.exploit-db.com/exploits/6603 -https://www.exploit-db.com/exploits/6604 -https://www.exploit-db.com/exploits/6605 -https://www.exploit-db.com/exploits/6606 -https://www.exploit-db.com/exploits/6607 -https://www.exploit-db.com/exploits/6608 -https://www.exploit-db.com/exploits/6610 -https://www.exploit-db.com/exploits/6611 -https://www.exploit-db.com/exploits/6612 -https://www.exploit-db.com/exploits/6613 -https://www.exploit-db.com/exploits/6614 -https://www.exploit-db.com/exploits/6616 -https://www.exploit-db.com/exploits/6617 -https://www.exploit-db.com/exploits/6618 -https://www.exploit-db.com/exploits/6619 -https://www.exploit-db.com/exploits/6620 -https://www.exploit-db.com/exploits/6621 -https://www.exploit-db.com/exploits/6622 -https://www.exploit-db.com/exploits/6623 -https://www.exploit-db.com/exploits/6625 -https://www.exploit-db.com/exploits/6626 -https://www.exploit-db.com/exploits/6628 -https://www.exploit-db.com/exploits/663 -https://www.exploit-db.com/exploits/6630 -https://www.exploit-db.com/exploits/6631 -https://www.exploit-db.com/exploits/6632 -https://www.exploit-db.com/exploits/6633 -https://www.exploit-db.com/exploits/6634 -https://www.exploit-db.com/exploits/6635 -https://www.exploit-db.com/exploits/6636 -https://www.exploit-db.com/exploits/6637 -https://www.exploit-db.com/exploits/6638 -https://www.exploit-db.com/exploits/6639 -https://www.exploit-db.com/exploits/6641 -https://www.exploit-db.com/exploits/6642 -https://www.exploit-db.com/exploits/6643 -https://www.exploit-db.com/exploits/6644 -https://www.exploit-db.com/exploits/6645 -https://www.exploit-db.com/exploits/6647 -https://www.exploit-db.com/exploits/6648 -https://www.exploit-db.com/exploits/6649 -https://www.exploit-db.com/exploits/6650 -https://www.exploit-db.com/exploits/6651 -https://www.exploit-db.com/exploits/6652 -https://www.exploit-db.com/exploits/6653 -https://www.exploit-db.com/exploits/6654 -https://www.exploit-db.com/exploits/6655 -https://www.exploit-db.com/exploits/6656 -https://www.exploit-db.com/exploits/6657 -https://www.exploit-db.com/exploits/6658 -https://www.exploit-db.com/exploits/6659 -https://www.exploit-db.com/exploits/6660 -https://www.exploit-db.com/exploits/6661 -https://www.exploit-db.com/exploits/6662 -https://www.exploit-db.com/exploits/6663 -https://www.exploit-db.com/exploits/6664 -https://www.exploit-db.com/exploits/6666 -https://www.exploit-db.com/exploits/6667 -https://www.exploit-db.com/exploits/6668 -https://www.exploit-db.com/exploits/6669 -https://www.exploit-db.com/exploits/6670 -https://www.exploit-db.com/exploits/6671 -https://www.exploit-db.com/exploits/6672 -https://www.exploit-db.com/exploits/6673 -https://www.exploit-db.com/exploits/6674 -https://www.exploit-db.com/exploits/6675 -https://www.exploit-db.com/exploits/6677 -https://www.exploit-db.com/exploits/6678 -https://www.exploit-db.com/exploits/6679 -https://www.exploit-db.com/exploits/6680 -https://www.exploit-db.com/exploits/6682 -https://www.exploit-db.com/exploits/6683 -https://www.exploit-db.com/exploits/6685 -https://www.exploit-db.com/exploits/6686 -https://www.exploit-db.com/exploits/6687 -https://www.exploit-db.com/exploits/6689 -https://www.exploit-db.com/exploits/6690 -https://www.exploit-db.com/exploits/6691 -https://www.exploit-db.com/exploits/6693 -https://www.exploit-db.com/exploits/6694 -https://www.exploit-db.com/exploits/6695 -https://www.exploit-db.com/exploits/6696 -https://www.exploit-db.com/exploits/6697 -https://www.exploit-db.com/exploits/6698 -https://www.exploit-db.com/exploits/6699 -https://www.exploit-db.com/exploits/6700 -https://www.exploit-db.com/exploits/6701 -https://www.exploit-db.com/exploits/6702 -https://www.exploit-db.com/exploits/6703 -https://www.exploit-db.com/exploits/6704 -https://www.exploit-db.com/exploits/6705 -https://www.exploit-db.com/exploits/6706 -https://www.exploit-db.com/exploits/6707 -https://www.exploit-db.com/exploits/6708 -https://www.exploit-db.com/exploits/6709 -https://www.exploit-db.com/exploits/6710 -https://www.exploit-db.com/exploits/6711 -https://www.exploit-db.com/exploits/6713 -https://www.exploit-db.com/exploits/6714 -https://www.exploit-db.com/exploits/6715 -https://www.exploit-db.com/exploits/6716 -https://www.exploit-db.com/exploits/6717 -https://www.exploit-db.com/exploits/6718 -https://www.exploit-db.com/exploits/6719 -https://www.exploit-db.com/exploits/6720 -https://www.exploit-db.com/exploits/6723 -https://www.exploit-db.com/exploits/6724 -https://www.exploit-db.com/exploits/6725 -https://www.exploit-db.com/exploits/6729 -https://www.exploit-db.com/exploits/6730 -https://www.exploit-db.com/exploits/6731 -https://www.exploit-db.com/exploits/6732 -https://www.exploit-db.com/exploits/6733 -https://www.exploit-db.com/exploits/6734 -https://www.exploit-db.com/exploits/6735 -https://www.exploit-db.com/exploits/6736 -https://www.exploit-db.com/exploits/6737 -https://www.exploit-db.com/exploits/6738 -https://www.exploit-db.com/exploits/6739 -https://www.exploit-db.com/exploits/6740 -https://www.exploit-db.com/exploits/6741 -https://www.exploit-db.com/exploits/6742 -https://www.exploit-db.com/exploits/6744 -https://www.exploit-db.com/exploits/6746 -https://www.exploit-db.com/exploits/6747 -https://www.exploit-db.com/exploits/6748 -https://www.exploit-db.com/exploits/6751 -https://www.exploit-db.com/exploits/6752 -https://www.exploit-db.com/exploits/6753 -https://www.exploit-db.com/exploits/6754 -https://www.exploit-db.com/exploits/6755 -https://www.exploit-db.com/exploits/6757 -https://www.exploit-db.com/exploits/6758 -https://www.exploit-db.com/exploits/6759 -https://www.exploit-db.com/exploits/6760 -https://www.exploit-db.com/exploits/6761 -https://www.exploit-db.com/exploits/6762 -https://www.exploit-db.com/exploits/6763 -https://www.exploit-db.com/exploits/6764 -https://www.exploit-db.com/exploits/6765 -https://www.exploit-db.com/exploits/6766 -https://www.exploit-db.com/exploits/6767 -https://www.exploit-db.com/exploits/6768 -https://www.exploit-db.com/exploits/6769 -https://www.exploit-db.com/exploits/6772 -https://www.exploit-db.com/exploits/6773 -https://www.exploit-db.com/exploits/6774 -https://www.exploit-db.com/exploits/6775 -https://www.exploit-db.com/exploits/6776 -https://www.exploit-db.com/exploits/6777 -https://www.exploit-db.com/exploits/6778 -https://www.exploit-db.com/exploits/6779 -https://www.exploit-db.com/exploits/6780 -https://www.exploit-db.com/exploits/6781 -https://www.exploit-db.com/exploits/6782 -https://www.exploit-db.com/exploits/6785 -https://www.exploit-db.com/exploits/6786 -https://www.exploit-db.com/exploits/6788 -https://www.exploit-db.com/exploits/6790 -https://www.exploit-db.com/exploits/6791 -https://www.exploit-db.com/exploits/6792 -https://www.exploit-db.com/exploits/6793 -https://www.exploit-db.com/exploits/6794 -https://www.exploit-db.com/exploits/6795 -https://www.exploit-db.com/exploits/6796 -https://www.exploit-db.com/exploits/6797 -https://www.exploit-db.com/exploits/6800 -https://www.exploit-db.com/exploits/6801 -https://www.exploit-db.com/exploits/6802 -https://www.exploit-db.com/exploits/6803 -https://www.exploit-db.com/exploits/6804 -https://www.exploit-db.com/exploits/6805 -https://www.exploit-db.com/exploits/6806 -https://www.exploit-db.com/exploits/6808 -https://www.exploit-db.com/exploits/6809 -https://www.exploit-db.com/exploits/6812 -https://www.exploit-db.com/exploits/6814 -https://www.exploit-db.com/exploits/6815 -https://www.exploit-db.com/exploits/6816 -https://www.exploit-db.com/exploits/6817 -https://www.exploit-db.com/exploits/6818 -https://www.exploit-db.com/exploits/6819 -https://www.exploit-db.com/exploits/6820 -https://www.exploit-db.com/exploits/6821 -https://www.exploit-db.com/exploits/6822 -https://www.exploit-db.com/exploits/6823 -https://www.exploit-db.com/exploits/6824 -https://www.exploit-db.com/exploits/6827 -https://www.exploit-db.com/exploits/6828 -https://www.exploit-db.com/exploits/6829 -https://www.exploit-db.com/exploits/6830 -https://www.exploit-db.com/exploits/6831 -https://www.exploit-db.com/exploits/6832 -https://www.exploit-db.com/exploits/6833 -https://www.exploit-db.com/exploits/6834 -https://www.exploit-db.com/exploits/6835 -https://www.exploit-db.com/exploits/6836 -https://www.exploit-db.com/exploits/6838 -https://www.exploit-db.com/exploits/6839 -https://www.exploit-db.com/exploits/6840 -https://www.exploit-db.com/exploits/6841 -https://www.exploit-db.com/exploits/6843 -https://www.exploit-db.com/exploits/6844 -https://www.exploit-db.com/exploits/6845 -https://www.exploit-db.com/exploits/6846 -https://www.exploit-db.com/exploits/6848 -https://www.exploit-db.com/exploits/6849 -https://www.exploit-db.com/exploits/6850 -https://www.exploit-db.com/exploits/6852 -https://www.exploit-db.com/exploits/6853 -https://www.exploit-db.com/exploits/6854 -https://www.exploit-db.com/exploits/6855 -https://www.exploit-db.com/exploits/6856 -https://www.exploit-db.com/exploits/6857 -https://www.exploit-db.com/exploits/6859 -https://www.exploit-db.com/exploits/6860 -https://www.exploit-db.com/exploits/6864 -https://www.exploit-db.com/exploits/6866 -https://www.exploit-db.com/exploits/6867 -https://www.exploit-db.com/exploits/6868 -https://www.exploit-db.com/exploits/6869 -https://www.exploit-db.com/exploits/6870 -https://www.exploit-db.com/exploits/6871 -https://www.exploit-db.com/exploits/6872 -https://www.exploit-db.com/exploits/6873 -https://www.exploit-db.com/exploits/6874 -https://www.exploit-db.com/exploits/6875 -https://www.exploit-db.com/exploits/6876 -https://www.exploit-db.com/exploits/6877 -https://www.exploit-db.com/exploits/6878 -https://www.exploit-db.com/exploits/6879 -https://www.exploit-db.com/exploits/6882 -https://www.exploit-db.com/exploits/6883 -https://www.exploit-db.com/exploits/6885 -https://www.exploit-db.com/exploits/6886 -https://www.exploit-db.com/exploits/6888 -https://www.exploit-db.com/exploits/6889 -https://www.exploit-db.com/exploits/6890 -https://www.exploit-db.com/exploits/6891 -https://www.exploit-db.com/exploits/6892 -https://www.exploit-db.com/exploits/6893 -https://www.exploit-db.com/exploits/6894 -https://www.exploit-db.com/exploits/6895 -https://www.exploit-db.com/exploits/6896 -https://www.exploit-db.com/exploits/6897 -https://www.exploit-db.com/exploits/6898 -https://www.exploit-db.com/exploits/6899 -https://www.exploit-db.com/exploits/6900 -https://www.exploit-db.com/exploits/6901 -https://www.exploit-db.com/exploits/6902 -https://www.exploit-db.com/exploits/6903 -https://www.exploit-db.com/exploits/6904 -https://www.exploit-db.com/exploits/6905 -https://www.exploit-db.com/exploits/6906 -https://www.exploit-db.com/exploits/6907 -https://www.exploit-db.com/exploits/6908 -https://www.exploit-db.com/exploits/6909 -https://www.exploit-db.com/exploits/6910 -https://www.exploit-db.com/exploits/6911 -https://www.exploit-db.com/exploits/6912 -https://www.exploit-db.com/exploits/6913 -https://www.exploit-db.com/exploits/6914 -https://www.exploit-db.com/exploits/6915 -https://www.exploit-db.com/exploits/6916 -https://www.exploit-db.com/exploits/6917 -https://www.exploit-db.com/exploits/6918 -https://www.exploit-db.com/exploits/6919 -https://www.exploit-db.com/exploits/6920 -https://www.exploit-db.com/exploits/6922 -https://www.exploit-db.com/exploits/6923 -https://www.exploit-db.com/exploits/6924 -https://www.exploit-db.com/exploits/6925 -https://www.exploit-db.com/exploits/6926 -https://www.exploit-db.com/exploits/6927 -https://www.exploit-db.com/exploits/6928 -https://www.exploit-db.com/exploits/6930 -https://www.exploit-db.com/exploits/6932 -https://www.exploit-db.com/exploits/6933 -https://www.exploit-db.com/exploits/6934 -https://www.exploit-db.com/exploits/6935 -https://www.exploit-db.com/exploits/6936 -https://www.exploit-db.com/exploits/6937 -https://www.exploit-db.com/exploits/6938 -https://www.exploit-db.com/exploits/6939 -https://www.exploit-db.com/exploits/6940 -https://www.exploit-db.com/exploits/6941 -https://www.exploit-db.com/exploits/6942 -https://www.exploit-db.com/exploits/6943 -https://www.exploit-db.com/exploits/6944 -https://www.exploit-db.com/exploits/6945 -https://www.exploit-db.com/exploits/6946 -https://www.exploit-db.com/exploits/6947 -https://www.exploit-db.com/exploits/6948 -https://www.exploit-db.com/exploits/6949 -https://www.exploit-db.com/exploits/6950 -https://www.exploit-db.com/exploits/6951 -https://www.exploit-db.com/exploits/6952 -https://www.exploit-db.com/exploits/6953 -https://www.exploit-db.com/exploits/6954 -https://www.exploit-db.com/exploits/6955 -https://www.exploit-db.com/exploits/6956 -https://www.exploit-db.com/exploits/6957 -https://www.exploit-db.com/exploits/6958 -https://www.exploit-db.com/exploits/6959 -https://www.exploit-db.com/exploits/6960 -https://www.exploit-db.com/exploits/6961 -https://www.exploit-db.com/exploits/6962 -https://www.exploit-db.com/exploits/6963 -https://www.exploit-db.com/exploits/6964 -https://www.exploit-db.com/exploits/6965 -https://www.exploit-db.com/exploits/6966 -https://www.exploit-db.com/exploits/6967 -https://www.exploit-db.com/exploits/6968 -https://www.exploit-db.com/exploits/6969 -https://www.exploit-db.com/exploits/6971 -https://www.exploit-db.com/exploits/6973 -https://www.exploit-db.com/exploits/6974 -https://www.exploit-db.com/exploits/6975 -https://www.exploit-db.com/exploits/6976 -https://www.exploit-db.com/exploits/6977 -https://www.exploit-db.com/exploits/6980 -https://www.exploit-db.com/exploits/6981 -https://www.exploit-db.com/exploits/6983 -https://www.exploit-db.com/exploits/6984 -https://www.exploit-db.com/exploits/6985 -https://www.exploit-db.com/exploits/6986 -https://www.exploit-db.com/exploits/6987 -https://www.exploit-db.com/exploits/6988 -https://www.exploit-db.com/exploits/6989 -https://www.exploit-db.com/exploits/6990 -https://www.exploit-db.com/exploits/6992 -https://www.exploit-db.com/exploits/6993 -https://www.exploit-db.com/exploits/6994 -https://www.exploit-db.com/exploits/6995 -https://www.exploit-db.com/exploits/6996 -https://www.exploit-db.com/exploits/6997 -https://www.exploit-db.com/exploits/6998 -https://www.exploit-db.com/exploits/6999 -https://www.exploit-db.com/exploits/7000 -https://www.exploit-db.com/exploits/7001 -https://www.exploit-db.com/exploits/7002 -https://www.exploit-db.com/exploits/7003 -https://www.exploit-db.com/exploits/7004 -https://www.exploit-db.com/exploits/7006 -https://www.exploit-db.com/exploits/7007 -https://www.exploit-db.com/exploits/7008 -https://www.exploit-db.com/exploits/7009 -https://www.exploit-db.com/exploits/701 -https://www.exploit-db.com/exploits/7010 -https://www.exploit-db.com/exploits/7011 -https://www.exploit-db.com/exploits/7013 -https://www.exploit-db.com/exploits/7014 -https://www.exploit-db.com/exploits/7015 -https://www.exploit-db.com/exploits/7016 -https://www.exploit-db.com/exploits/7017 -https://www.exploit-db.com/exploits/7018 -https://www.exploit-db.com/exploits/7019 -https://www.exploit-db.com/exploits/7021 -https://www.exploit-db.com/exploits/7022 -https://www.exploit-db.com/exploits/7023 -https://www.exploit-db.com/exploits/7024 -https://www.exploit-db.com/exploits/7025 -https://www.exploit-db.com/exploits/7026 -https://www.exploit-db.com/exploits/7028 -https://www.exploit-db.com/exploits/7029 -https://www.exploit-db.com/exploits/7030 -https://www.exploit-db.com/exploits/7031 -https://www.exploit-db.com/exploits/7032 -https://www.exploit-db.com/exploits/7033 -https://www.exploit-db.com/exploits/7034 -https://www.exploit-db.com/exploits/7035 -https://www.exploit-db.com/exploits/7036 -https://www.exploit-db.com/exploits/7037 -https://www.exploit-db.com/exploits/7038 -https://www.exploit-db.com/exploits/7039 -https://www.exploit-db.com/exploits/704 -https://www.exploit-db.com/exploits/7040 -https://www.exploit-db.com/exploits/7041 -https://www.exploit-db.com/exploits/7043 -https://www.exploit-db.com/exploits/7044 -https://www.exploit-db.com/exploits/7045 -https://www.exploit-db.com/exploits/7046 -https://www.exploit-db.com/exploits/7047 -https://www.exploit-db.com/exploits/7048 -https://www.exploit-db.com/exploits/7049 -https://www.exploit-db.com/exploits/7050 -https://www.exploit-db.com/exploits/7051 -https://www.exploit-db.com/exploits/7052 -https://www.exploit-db.com/exploits/7053 -https://www.exploit-db.com/exploits/7054 -https://www.exploit-db.com/exploits/7055 -https://www.exploit-db.com/exploits/7058 -https://www.exploit-db.com/exploits/7059 -https://www.exploit-db.com/exploits/7060 -https://www.exploit-db.com/exploits/7061 -https://www.exploit-db.com/exploits/7062 -https://www.exploit-db.com/exploits/7063 -https://www.exploit-db.com/exploits/7065 -https://www.exploit-db.com/exploits/7066 -https://www.exploit-db.com/exploits/7067 -https://www.exploit-db.com/exploits/7069 -https://www.exploit-db.com/exploits/7070 -https://www.exploit-db.com/exploits/7071 -https://www.exploit-db.com/exploits/7072 -https://www.exploit-db.com/exploits/7074 -https://www.exploit-db.com/exploits/7075 -https://www.exploit-db.com/exploits/7076 -https://www.exploit-db.com/exploits/7078 -https://www.exploit-db.com/exploits/7079 -https://www.exploit-db.com/exploits/7080 -https://www.exploit-db.com/exploits/7081 -https://www.exploit-db.com/exploits/7082 -https://www.exploit-db.com/exploits/7083 -https://www.exploit-db.com/exploits/7084 -https://www.exploit-db.com/exploits/7085 -https://www.exploit-db.com/exploits/7086 -https://www.exploit-db.com/exploits/7087 -https://www.exploit-db.com/exploits/7088 -https://www.exploit-db.com/exploits/7089 -https://www.exploit-db.com/exploits/7090 -https://www.exploit-db.com/exploits/7092 -https://www.exploit-db.com/exploits/7093 -https://www.exploit-db.com/exploits/7094 -https://www.exploit-db.com/exploits/7098 -https://www.exploit-db.com/exploits/7101 -https://www.exploit-db.com/exploits/7102 -https://www.exploit-db.com/exploits/7103 -https://www.exploit-db.com/exploits/7104 -https://www.exploit-db.com/exploits/7105 -https://www.exploit-db.com/exploits/7106 -https://www.exploit-db.com/exploits/7107 -https://www.exploit-db.com/exploits/7109 -https://www.exploit-db.com/exploits/7110 -https://www.exploit-db.com/exploits/7111 -https://www.exploit-db.com/exploits/7112 -https://www.exploit-db.com/exploits/7113 -https://www.exploit-db.com/exploits/7114 -https://www.exploit-db.com/exploits/7118 -https://www.exploit-db.com/exploits/7119 -https://www.exploit-db.com/exploits/7120 -https://www.exploit-db.com/exploits/7121 -https://www.exploit-db.com/exploits/7123 -https://www.exploit-db.com/exploits/7124 -https://www.exploit-db.com/exploits/7125 -https://www.exploit-db.com/exploits/7126 -https://www.exploit-db.com/exploits/7128 -https://www.exploit-db.com/exploits/7130 -https://www.exploit-db.com/exploits/7131 -https://www.exploit-db.com/exploits/7132 -https://www.exploit-db.com/exploits/7134 -https://www.exploit-db.com/exploits/7135 -https://www.exploit-db.com/exploits/7136 -https://www.exploit-db.com/exploits/7137 -https://www.exploit-db.com/exploits/7138 -https://www.exploit-db.com/exploits/7140 -https://www.exploit-db.com/exploits/7141 -https://www.exploit-db.com/exploits/7142 -https://www.exploit-db.com/exploits/7143 -https://www.exploit-db.com/exploits/7144 -https://www.exploit-db.com/exploits/7145 -https://www.exploit-db.com/exploits/7146 -https://www.exploit-db.com/exploits/7147 -https://www.exploit-db.com/exploits/7148 -https://www.exploit-db.com/exploits/7149 -https://www.exploit-db.com/exploits/7150 -https://www.exploit-db.com/exploits/7151 -https://www.exploit-db.com/exploits/7153 -https://www.exploit-db.com/exploits/7155 -https://www.exploit-db.com/exploits/7156 -https://www.exploit-db.com/exploits/7159 -https://www.exploit-db.com/exploits/7160 -https://www.exploit-db.com/exploits/7162 -https://www.exploit-db.com/exploits/7163 -https://www.exploit-db.com/exploits/7164 -https://www.exploit-db.com/exploits/7165 -https://www.exploit-db.com/exploits/7166 -https://www.exploit-db.com/exploits/7167 -https://www.exploit-db.com/exploits/7168 -https://www.exploit-db.com/exploits/7170 -https://www.exploit-db.com/exploits/7171 -https://www.exploit-db.com/exploits/7172 -https://www.exploit-db.com/exploits/7173 -https://www.exploit-db.com/exploits/7175 -https://www.exploit-db.com/exploits/7176 -https://www.exploit-db.com/exploits/7178 -https://www.exploit-db.com/exploits/7179 -https://www.exploit-db.com/exploits/7181 -https://www.exploit-db.com/exploits/7182 -https://www.exploit-db.com/exploits/7183 -https://www.exploit-db.com/exploits/7184 -https://www.exploit-db.com/exploits/7185 -https://www.exploit-db.com/exploits/7186 -https://www.exploit-db.com/exploits/7190 -https://www.exploit-db.com/exploits/7191 -https://www.exploit-db.com/exploits/7195 -https://www.exploit-db.com/exploits/7198 -https://www.exploit-db.com/exploits/7199 -https://www.exploit-db.com/exploits/7200 -https://www.exploit-db.com/exploits/7201 -https://www.exploit-db.com/exploits/7202 -https://www.exploit-db.com/exploits/7203 -https://www.exploit-db.com/exploits/7204 -https://www.exploit-db.com/exploits/7205 -https://www.exploit-db.com/exploits/7206 -https://www.exploit-db.com/exploits/7207 -https://www.exploit-db.com/exploits/7208 -https://www.exploit-db.com/exploits/7215 -https://www.exploit-db.com/exploits/7216 -https://www.exploit-db.com/exploits/7217 -https://www.exploit-db.com/exploits/7218 -https://www.exploit-db.com/exploits/7220 -https://www.exploit-db.com/exploits/7221 -https://www.exploit-db.com/exploits/7222 -https://www.exploit-db.com/exploits/7223 -https://www.exploit-db.com/exploits/7224 -https://www.exploit-db.com/exploits/7225 -https://www.exploit-db.com/exploits/7227 -https://www.exploit-db.com/exploits/7228 -https://www.exploit-db.com/exploits/7229 -https://www.exploit-db.com/exploits/7230 -https://www.exploit-db.com/exploits/7231 -https://www.exploit-db.com/exploits/7233 -https://www.exploit-db.com/exploits/7234 -https://www.exploit-db.com/exploits/7235 -https://www.exploit-db.com/exploits/7236 -https://www.exploit-db.com/exploits/7237 -https://www.exploit-db.com/exploits/7238 -https://www.exploit-db.com/exploits/7239 -https://www.exploit-db.com/exploits/7240 -https://www.exploit-db.com/exploits/7241 -https://www.exploit-db.com/exploits/7243 -https://www.exploit-db.com/exploits/7244 -https://www.exploit-db.com/exploits/7248 -https://www.exploit-db.com/exploits/7249 -https://www.exploit-db.com/exploits/7250 -https://www.exploit-db.com/exploits/7251 -https://www.exploit-db.com/exploits/7253 -https://www.exploit-db.com/exploits/7254 -https://www.exploit-db.com/exploits/7255 -https://www.exploit-db.com/exploits/7256 -https://www.exploit-db.com/exploits/7258 -https://www.exploit-db.com/exploits/7262 -https://www.exploit-db.com/exploits/7263 -https://www.exploit-db.com/exploits/7266 -https://www.exploit-db.com/exploits/7267 -https://www.exploit-db.com/exploits/7268 -https://www.exploit-db.com/exploits/7269 -https://www.exploit-db.com/exploits/7270 -https://www.exploit-db.com/exploits/7271 -https://www.exploit-db.com/exploits/7273 -https://www.exploit-db.com/exploits/7274 -https://www.exploit-db.com/exploits/7275 -https://www.exploit-db.com/exploits/7276 -https://www.exploit-db.com/exploits/7278 -https://www.exploit-db.com/exploits/7279 -https://www.exploit-db.com/exploits/7280 -https://www.exploit-db.com/exploits/7281 -https://www.exploit-db.com/exploits/7282 -https://www.exploit-db.com/exploits/7283 -https://www.exploit-db.com/exploits/7284 -https://www.exploit-db.com/exploits/7285 -https://www.exploit-db.com/exploits/7286 -https://www.exploit-db.com/exploits/7287 -https://www.exploit-db.com/exploits/7288 -https://www.exploit-db.com/exploits/7290 -https://www.exploit-db.com/exploits/7291 -https://www.exploit-db.com/exploits/7292 -https://www.exploit-db.com/exploits/7294 -https://www.exploit-db.com/exploits/7295 -https://www.exploit-db.com/exploits/7296 -https://www.exploit-db.com/exploits/7297 -https://www.exploit-db.com/exploits/7298 -https://www.exploit-db.com/exploits/7299 -https://www.exploit-db.com/exploits/7300 -https://www.exploit-db.com/exploits/7301 -https://www.exploit-db.com/exploits/7302 -https://www.exploit-db.com/exploits/7303 -https://www.exploit-db.com/exploits/7304 -https://www.exploit-db.com/exploits/7305 -https://www.exploit-db.com/exploits/7306 -https://www.exploit-db.com/exploits/7307 -https://www.exploit-db.com/exploits/7309 -https://www.exploit-db.com/exploits/7310 -https://www.exploit-db.com/exploits/7311 -https://www.exploit-db.com/exploits/7312 -https://www.exploit-db.com/exploits/7313 -https://www.exploit-db.com/exploits/7314 -https://www.exploit-db.com/exploits/7316 -https://www.exploit-db.com/exploits/7317 -https://www.exploit-db.com/exploits/7318 -https://www.exploit-db.com/exploits/7319 -https://www.exploit-db.com/exploits/7322 -https://www.exploit-db.com/exploits/7323 -https://www.exploit-db.com/exploits/7324 -https://www.exploit-db.com/exploits/7325 -https://www.exploit-db.com/exploits/7326 -https://www.exploit-db.com/exploits/7327 -https://www.exploit-db.com/exploits/7328 -https://www.exploit-db.com/exploits/7330 -https://www.exploit-db.com/exploits/7331 -https://www.exploit-db.com/exploits/7332 -https://www.exploit-db.com/exploits/7333 -https://www.exploit-db.com/exploits/7335 -https://www.exploit-db.com/exploits/7336 -https://www.exploit-db.com/exploits/7337 -https://www.exploit-db.com/exploits/7338 -https://www.exploit-db.com/exploits/7339 -https://www.exploit-db.com/exploits/7340 -https://www.exploit-db.com/exploits/7341 -https://www.exploit-db.com/exploits/7342 -https://www.exploit-db.com/exploits/7343 -https://www.exploit-db.com/exploits/7344 -https://www.exploit-db.com/exploits/7345 -https://www.exploit-db.com/exploits/7346 -https://www.exploit-db.com/exploits/7348 -https://www.exploit-db.com/exploits/7349 -https://www.exploit-db.com/exploits/7350 -https://www.exploit-db.com/exploits/7351 -https://www.exploit-db.com/exploits/7352 -https://www.exploit-db.com/exploits/7353 -https://www.exploit-db.com/exploits/7354 -https://www.exploit-db.com/exploits/7355 -https://www.exploit-db.com/exploits/7356 -https://www.exploit-db.com/exploits/7357 -https://www.exploit-db.com/exploits/7358 -https://www.exploit-db.com/exploits/7359 -https://www.exploit-db.com/exploits/7360 -https://www.exploit-db.com/exploits/7361 -https://www.exploit-db.com/exploits/7362 -https://www.exploit-db.com/exploits/7363 -https://www.exploit-db.com/exploits/7364 -https://www.exploit-db.com/exploits/7365 -https://www.exploit-db.com/exploits/7366 -https://www.exploit-db.com/exploits/7367 -https://www.exploit-db.com/exploits/7368 -https://www.exploit-db.com/exploits/7370 -https://www.exploit-db.com/exploits/7371 -https://www.exploit-db.com/exploits/7372 -https://www.exploit-db.com/exploits/7374 -https://www.exploit-db.com/exploits/7375 -https://www.exploit-db.com/exploits/7376 -https://www.exploit-db.com/exploits/7377 -https://www.exploit-db.com/exploits/7380 -https://www.exploit-db.com/exploits/7382 -https://www.exploit-db.com/exploits/7384 -https://www.exploit-db.com/exploits/7386 -https://www.exploit-db.com/exploits/7387 -https://www.exploit-db.com/exploits/7390 -https://www.exploit-db.com/exploits/7391 -https://www.exploit-db.com/exploits/7392 -https://www.exploit-db.com/exploits/7395 -https://www.exploit-db.com/exploits/7396 -https://www.exploit-db.com/exploits/7397 -https://www.exploit-db.com/exploits/7398 -https://www.exploit-db.com/exploits/7399 -https://www.exploit-db.com/exploits/7400 -https://www.exploit-db.com/exploits/7401 -https://www.exploit-db.com/exploits/7402 -https://www.exploit-db.com/exploits/7403 -https://www.exploit-db.com/exploits/7406 -https://www.exploit-db.com/exploits/7407 -https://www.exploit-db.com/exploits/7408 -https://www.exploit-db.com/exploits/7409 -https://www.exploit-db.com/exploits/7410 -https://www.exploit-db.com/exploits/7411 -https://www.exploit-db.com/exploits/7412 -https://www.exploit-db.com/exploits/7413 -https://www.exploit-db.com/exploits/7414 -https://www.exploit-db.com/exploits/7415 -https://www.exploit-db.com/exploits/7416 -https://www.exploit-db.com/exploits/7417 -https://www.exploit-db.com/exploits/7418 -https://www.exploit-db.com/exploits/7419 -https://www.exploit-db.com/exploits/7420 -https://www.exploit-db.com/exploits/7422 -https://www.exploit-db.com/exploits/7423 -https://www.exploit-db.com/exploits/7424 -https://www.exploit-db.com/exploits/7425 -https://www.exploit-db.com/exploits/7427 -https://www.exploit-db.com/exploits/7428 -https://www.exploit-db.com/exploits/7429 -https://www.exploit-db.com/exploits/7432 -https://www.exploit-db.com/exploits/7433 -https://www.exploit-db.com/exploits/7435 -https://www.exploit-db.com/exploits/7436 -https://www.exploit-db.com/exploits/7438 -https://www.exploit-db.com/exploits/7439 -https://www.exploit-db.com/exploits/7440 -https://www.exploit-db.com/exploits/7441 -https://www.exploit-db.com/exploits/7442 -https://www.exploit-db.com/exploits/7443 -https://www.exploit-db.com/exploits/7444 -https://www.exploit-db.com/exploits/7445 -https://www.exploit-db.com/exploits/7446 -https://www.exploit-db.com/exploits/7447 -https://www.exploit-db.com/exploits/7449 -https://www.exploit-db.com/exploits/7450 -https://www.exploit-db.com/exploits/7451 -https://www.exploit-db.com/exploits/7453 -https://www.exploit-db.com/exploits/7456 -https://www.exploit-db.com/exploits/7458 -https://www.exploit-db.com/exploits/7459 -https://www.exploit-db.com/exploits/7461 -https://www.exploit-db.com/exploits/7462 -https://www.exploit-db.com/exploits/7463 -https://www.exploit-db.com/exploits/7464 -https://www.exploit-db.com/exploits/7465 -https://www.exploit-db.com/exploits/7466 -https://www.exploit-db.com/exploits/7468 -https://www.exploit-db.com/exploits/7469 -https://www.exploit-db.com/exploits/7470 -https://www.exploit-db.com/exploits/7471 -https://www.exploit-db.com/exploits/7472 -https://www.exploit-db.com/exploits/7474 -https://www.exploit-db.com/exploits/7475 -https://www.exploit-db.com/exploits/7476 -https://www.exploit-db.com/exploits/7477 -https://www.exploit-db.com/exploits/7478 -https://www.exploit-db.com/exploits/7479 -https://www.exploit-db.com/exploits/7480 -https://www.exploit-db.com/exploits/7481 -https://www.exploit-db.com/exploits/7482 -https://www.exploit-db.com/exploits/7483 -https://www.exploit-db.com/exploits/7485 -https://www.exploit-db.com/exploits/7486 -https://www.exploit-db.com/exploits/7487 -https://www.exploit-db.com/exploits/7488 -https://www.exploit-db.com/exploits/7489 -https://www.exploit-db.com/exploits/7491 -https://www.exploit-db.com/exploits/7492 -https://www.exploit-db.com/exploits/7493 -https://www.exploit-db.com/exploits/7495 -https://www.exploit-db.com/exploits/7496 -https://www.exploit-db.com/exploits/7497 -https://www.exploit-db.com/exploits/7499 -https://www.exploit-db.com/exploits/7500 -https://www.exploit-db.com/exploits/7501 -https://www.exploit-db.com/exploits/7504 -https://www.exploit-db.com/exploits/7505 -https://www.exploit-db.com/exploits/7507 -https://www.exploit-db.com/exploits/7509 -https://www.exploit-db.com/exploits/7510 -https://www.exploit-db.com/exploits/7511 -https://www.exploit-db.com/exploits/7513 -https://www.exploit-db.com/exploits/7514 -https://www.exploit-db.com/exploits/7515 -https://www.exploit-db.com/exploits/7517 -https://www.exploit-db.com/exploits/7518 -https://www.exploit-db.com/exploits/7519 -https://www.exploit-db.com/exploits/7520 -https://www.exploit-db.com/exploits/7521 -https://www.exploit-db.com/exploits/7522 -https://www.exploit-db.com/exploits/7523 -https://www.exploit-db.com/exploits/7524 -https://www.exploit-db.com/exploits/7525 -https://www.exploit-db.com/exploits/7526 -https://www.exploit-db.com/exploits/7527 -https://www.exploit-db.com/exploits/7529 -https://www.exploit-db.com/exploits/7530 -https://www.exploit-db.com/exploits/7531 -https://www.exploit-db.com/exploits/7532 -https://www.exploit-db.com/exploits/7533 -https://www.exploit-db.com/exploits/7534 -https://www.exploit-db.com/exploits/7536 -https://www.exploit-db.com/exploits/7537 -https://www.exploit-db.com/exploits/7538 -https://www.exploit-db.com/exploits/7539 -https://www.exploit-db.com/exploits/7541 -https://www.exploit-db.com/exploits/7542 -https://www.exploit-db.com/exploits/7543 -https://www.exploit-db.com/exploits/7544 -https://www.exploit-db.com/exploits/7545 -https://www.exploit-db.com/exploits/7546 -https://www.exploit-db.com/exploits/7547 -https://www.exploit-db.com/exploits/7548 -https://www.exploit-db.com/exploits/7549 -https://www.exploit-db.com/exploits/7550 -https://www.exploit-db.com/exploits/7551 -https://www.exploit-db.com/exploits/7553 -https://www.exploit-db.com/exploits/7554 -https://www.exploit-db.com/exploits/7555 -https://www.exploit-db.com/exploits/7556 -https://www.exploit-db.com/exploits/7557 -https://www.exploit-db.com/exploits/7558 -https://www.exploit-db.com/exploits/7559 -https://www.exploit-db.com/exploits/7560 -https://www.exploit-db.com/exploits/7561 -https://www.exploit-db.com/exploits/7562 -https://www.exploit-db.com/exploits/7563 -https://www.exploit-db.com/exploits/7564 -https://www.exploit-db.com/exploits/7565 -https://www.exploit-db.com/exploits/7566 -https://www.exploit-db.com/exploits/7567 -https://www.exploit-db.com/exploits/7568 -https://www.exploit-db.com/exploits/7570 -https://www.exploit-db.com/exploits/7571 -https://www.exploit-db.com/exploits/7572 -https://www.exploit-db.com/exploits/7573 -https://www.exploit-db.com/exploits/7574 -https://www.exploit-db.com/exploits/7575 -https://www.exploit-db.com/exploits/7576 -https://www.exploit-db.com/exploits/7577 -https://www.exploit-db.com/exploits/7578 -https://www.exploit-db.com/exploits/7579 -https://www.exploit-db.com/exploits/7580 -https://www.exploit-db.com/exploits/7581 -https://www.exploit-db.com/exploits/7582 -https://www.exploit-db.com/exploits/7583 -https://www.exploit-db.com/exploits/7585 -https://www.exploit-db.com/exploits/7586 -https://www.exploit-db.com/exploits/7587 -https://www.exploit-db.com/exploits/7589 -https://www.exploit-db.com/exploits/7592 -https://www.exploit-db.com/exploits/7593 -https://www.exploit-db.com/exploits/7596 -https://www.exploit-db.com/exploits/7597 -https://www.exploit-db.com/exploits/7598 -https://www.exploit-db.com/exploits/7599 -https://www.exploit-db.com/exploits/7600 -https://www.exploit-db.com/exploits/7601 -https://www.exploit-db.com/exploits/7602 -https://www.exploit-db.com/exploits/7603 -https://www.exploit-db.com/exploits/7604 -https://www.exploit-db.com/exploits/7605 -https://www.exploit-db.com/exploits/7607 -https://www.exploit-db.com/exploits/7608 -https://www.exploit-db.com/exploits/7609 -https://www.exploit-db.com/exploits/7610 -https://www.exploit-db.com/exploits/7611 -https://www.exploit-db.com/exploits/7613 -https://www.exploit-db.com/exploits/7614 -https://www.exploit-db.com/exploits/7615 -https://www.exploit-db.com/exploits/7616 -https://www.exploit-db.com/exploits/7617 -https://www.exploit-db.com/exploits/7618 -https://www.exploit-db.com/exploits/7619 -https://www.exploit-db.com/exploits/7620 -https://www.exploit-db.com/exploits/7621 -https://www.exploit-db.com/exploits/7622 -https://www.exploit-db.com/exploits/7623 -https://www.exploit-db.com/exploits/7624 -https://www.exploit-db.com/exploits/7625 -https://www.exploit-db.com/exploits/7627 -https://www.exploit-db.com/exploits/7634 -https://www.exploit-db.com/exploits/7635 -https://www.exploit-db.com/exploits/7636 -https://www.exploit-db.com/exploits/7637 -https://www.exploit-db.com/exploits/7640 -https://www.exploit-db.com/exploits/7641 -https://www.exploit-db.com/exploits/7642 -https://www.exploit-db.com/exploits/7647 -https://www.exploit-db.com/exploits/7648 -https://www.exploit-db.com/exploits/7658 -https://www.exploit-db.com/exploits/7659 -https://www.exploit-db.com/exploits/7660 -https://www.exploit-db.com/exploits/7663 -https://www.exploit-db.com/exploits/7668 -https://www.exploit-db.com/exploits/7670 -https://www.exploit-db.com/exploits/7672 -https://www.exploit-db.com/exploits/7673 -https://www.exploit-db.com/exploits/7674 -https://www.exploit-db.com/exploits/7679 -https://www.exploit-db.com/exploits/7680 -https://www.exploit-db.com/exploits/7682 -https://www.exploit-db.com/exploits/7683 -https://www.exploit-db.com/exploits/7686 -https://www.exploit-db.com/exploits/7687 -https://www.exploit-db.com/exploits/7689 -https://www.exploit-db.com/exploits/7690 -https://www.exploit-db.com/exploits/7691 -https://www.exploit-db.com/exploits/7695 -https://www.exploit-db.com/exploits/7696 -https://www.exploit-db.com/exploits/7697 -https://www.exploit-db.com/exploits/7698 -https://www.exploit-db.com/exploits/7699 -https://www.exploit-db.com/exploits/7708 -https://www.exploit-db.com/exploits/7709 -https://www.exploit-db.com/exploits/7713 -https://www.exploit-db.com/exploits/7714 -https://www.exploit-db.com/exploits/7715 -https://www.exploit-db.com/exploits/7720 -https://www.exploit-db.com/exploits/7727 -https://www.exploit-db.com/exploits/7734 -https://www.exploit-db.com/exploits/7737 -https://www.exploit-db.com/exploits/7742 -https://www.exploit-db.com/exploits/7743 -https://www.exploit-db.com/exploits/7744 -https://www.exploit-db.com/exploits/7746 -https://www.exploit-db.com/exploits/7767 -https://www.exploit-db.com/exploits/7773 -https://www.exploit-db.com/exploits/7778 -https://www.exploit-db.com/exploits/7779 -https://www.exploit-db.com/exploits/7780 -https://www.exploit-db.com/exploits/7786 -https://www.exploit-db.com/exploits/7787 -https://www.exploit-db.com/exploits/7792 -https://www.exploit-db.com/exploits/7793 -https://www.exploit-db.com/exploits/7795 -https://www.exploit-db.com/exploits/7797 -https://www.exploit-db.com/exploits/7798 -https://www.exploit-db.com/exploits/7801 -https://www.exploit-db.com/exploits/7802 -https://www.exploit-db.com/exploits/7805 -https://www.exploit-db.com/exploits/7806 -https://www.exploit-db.com/exploits/7813 -https://www.exploit-db.com/exploits/7814 -https://www.exploit-db.com/exploits/7816 -https://www.exploit-db.com/exploits/7818 -https://www.exploit-db.com/exploits/7819 -https://www.exploit-db.com/exploits/7822 -https://www.exploit-db.com/exploits/7824 -https://www.exploit-db.com/exploits/7831 -https://www.exploit-db.com/exploits/7833 -https://www.exploit-db.com/exploits/7835 -https://www.exploit-db.com/exploits/7839 -https://www.exploit-db.com/exploits/7840 -https://www.exploit-db.com/exploits/7841 -https://www.exploit-db.com/exploits/7842 -https://www.exploit-db.com/exploits/7846 -https://www.exploit-db.com/exploits/7847 -https://www.exploit-db.com/exploits/7849 -https://www.exploit-db.com/exploits/7850 -https://www.exploit-db.com/exploits/7851 -https://www.exploit-db.com/exploits/7852 -https://www.exploit-db.com/exploits/7857 -https://www.exploit-db.com/exploits/7859 -https://www.exploit-db.com/exploits/7862 -https://www.exploit-db.com/exploits/7863 -https://www.exploit-db.com/exploits/7865 -https://www.exploit-db.com/exploits/7867 -https://www.exploit-db.com/exploits/7868 -https://www.exploit-db.com/exploits/7869 -https://www.exploit-db.com/exploits/7873 -https://www.exploit-db.com/exploits/7874 -https://www.exploit-db.com/exploits/7875 -https://www.exploit-db.com/exploits/7876 -https://www.exploit-db.com/exploits/7877 -https://www.exploit-db.com/exploits/7878 -https://www.exploit-db.com/exploits/7879 -https://www.exploit-db.com/exploits/7880 -https://www.exploit-db.com/exploits/7881 -https://www.exploit-db.com/exploits/7883 -https://www.exploit-db.com/exploits/7892 -https://www.exploit-db.com/exploits/7894 -https://www.exploit-db.com/exploits/7899 -https://www.exploit-db.com/exploits/7900 -https://www.exploit-db.com/exploits/7901 -https://www.exploit-db.com/exploits/7902 -https://www.exploit-db.com/exploits/7903 -https://www.exploit-db.com/exploits/7910 -https://www.exploit-db.com/exploits/7912 -https://www.exploit-db.com/exploits/7915 -https://www.exploit-db.com/exploits/7916 -https://www.exploit-db.com/exploits/7917 -https://www.exploit-db.com/exploits/7919 -https://www.exploit-db.com/exploits/7928 -https://www.exploit-db.com/exploits/7932 -https://www.exploit-db.com/exploits/7936 -https://www.exploit-db.com/exploits/7939 -https://www.exploit-db.com/exploits/7940 -https://www.exploit-db.com/exploits/7941 -https://www.exploit-db.com/exploits/7942 -https://www.exploit-db.com/exploits/7946 -https://www.exploit-db.com/exploits/7948 -https://www.exploit-db.com/exploits/7951 -https://www.exploit-db.com/exploits/7952 -https://www.exploit-db.com/exploits/7953 -https://www.exploit-db.com/exploits/7954 -https://www.exploit-db.com/exploits/7955 -https://www.exploit-db.com/exploits/7956 -https://www.exploit-db.com/exploits/7958 -https://www.exploit-db.com/exploits/7961 -https://www.exploit-db.com/exploits/7963 -https://www.exploit-db.com/exploits/7964 -https://www.exploit-db.com/exploits/7965 -https://www.exploit-db.com/exploits/7968 -https://www.exploit-db.com/exploits/7969 -https://www.exploit-db.com/exploits/7970 -https://www.exploit-db.com/exploits/7973 -https://www.exploit-db.com/exploits/7974 -https://www.exploit-db.com/exploits/7975 -https://www.exploit-db.com/exploits/7976 -https://www.exploit-db.com/exploits/7977 -https://www.exploit-db.com/exploits/7979 -https://www.exploit-db.com/exploits/7980 -https://www.exploit-db.com/exploits/7982 -https://www.exploit-db.com/exploits/7984 -https://www.exploit-db.com/exploits/7986 -https://www.exploit-db.com/exploits/7990 -https://www.exploit-db.com/exploits/7993 -https://www.exploit-db.com/exploits/7995 -https://www.exploit-db.com/exploits/7998 -https://www.exploit-db.com/exploits/7999 -https://www.exploit-db.com/exploits/8001 -https://www.exploit-db.com/exploits/8002 -https://www.exploit-db.com/exploits/8005 -https://www.exploit-db.com/exploits/8007 -https://www.exploit-db.com/exploits/8008 -https://www.exploit-db.com/exploits/8010 -https://www.exploit-db.com/exploits/8011 -https://www.exploit-db.com/exploits/8012 -https://www.exploit-db.com/exploits/8014 -https://www.exploit-db.com/exploits/8016 -https://www.exploit-db.com/exploits/8017 -https://www.exploit-db.com/exploits/8018 -https://www.exploit-db.com/exploits/8020 -https://www.exploit-db.com/exploits/8021 -https://www.exploit-db.com/exploits/8023 -https://www.exploit-db.com/exploits/8024 -https://www.exploit-db.com/exploits/8025 -https://www.exploit-db.com/exploits/8029 -https://www.exploit-db.com/exploits/8030 -https://www.exploit-db.com/exploits/8032 -https://www.exploit-db.com/exploits/8033 -https://www.exploit-db.com/exploits/8034 -https://www.exploit-db.com/exploits/8035 -https://www.exploit-db.com/exploits/8037 -https://www.exploit-db.com/exploits/8051 -https://www.exploit-db.com/exploits/8055 -https://www.exploit-db.com/exploits/8058 -https://www.exploit-db.com/exploits/8059 -https://www.exploit-db.com/exploits/8060 -https://www.exploit-db.com/exploits/8068 -https://www.exploit-db.com/exploits/8071 -https://www.exploit-db.com/exploits/8073 -https://www.exploit-db.com/exploits/8074 -https://www.exploit-db.com/exploits/8076 -https://www.exploit-db.com/exploits/8077 -https://www.exploit-db.com/exploits/8079 -https://www.exploit-db.com/exploits/8080 -https://www.exploit-db.com/exploits/8082 -https://www.exploit-db.com/exploits/8090 -https://www.exploit-db.com/exploits/8091 -https://www.exploit-db.com/exploits/8092 -https://www.exploit-db.com/exploits/8094 -https://www.exploit-db.com/exploits/8095 -https://www.exploit-db.com/exploits/8097 -https://www.exploit-db.com/exploits/8098 -https://www.exploit-db.com/exploits/8099 -https://www.exploit-db.com/exploits/8100 -https://www.exploit-db.com/exploits/8101 -https://www.exploit-db.com/exploits/8121 -https://www.exploit-db.com/exploits/8135 -https://www.exploit-db.com/exploits/8144 -https://www.exploit-db.com/exploits/8148 -https://www.exploit-db.com/exploits/8161 -https://www.exploit-db.com/exploits/8163 -https://www.exploit-db.com/exploits/8165 -https://www.exploit-db.com/exploits/8167 -https://www.exploit-db.com/exploits/8168 -https://www.exploit-db.com/exploits/8169 -https://www.exploit-db.com/exploits/8180 -https://www.exploit-db.com/exploits/8190 -https://www.exploit-db.com/exploits/8196 -https://www.exploit-db.com/exploits/8203 -https://www.exploit-db.com/exploits/8206 -https://www.exploit-db.com/exploits/8209 -https://www.exploit-db.com/exploits/8211 -https://www.exploit-db.com/exploits/8212 -https://www.exploit-db.com/exploits/8213 -https://www.exploit-db.com/exploits/8215 -https://www.exploit-db.com/exploits/8216 -https://www.exploit-db.com/exploits/8217 -https://www.exploit-db.com/exploits/8219 -https://www.exploit-db.com/exploits/8220 -https://www.exploit-db.com/exploits/8224 -https://www.exploit-db.com/exploits/8225 -https://www.exploit-db.com/exploits/8226 -https://www.exploit-db.com/exploits/8228 -https://www.exploit-db.com/exploits/8229 -https://www.exploit-db.com/exploits/8230 -https://www.exploit-db.com/exploits/8231 -https://www.exploit-db.com/exploits/8236 -https://www.exploit-db.com/exploits/8238 -https://www.exploit-db.com/exploits/8240 -https://www.exploit-db.com/exploits/8241 -https://www.exploit-db.com/exploits/8243 -https://www.exploit-db.com/exploits/8244 -https://www.exploit-db.com/exploits/8247 -https://www.exploit-db.com/exploits/8249 -https://www.exploit-db.com/exploits/8251 -https://www.exploit-db.com/exploits/8252 -https://www.exploit-db.com/exploits/8257 -https://www.exploit-db.com/exploits/8260 -https://www.exploit-db.com/exploits/8261 -https://www.exploit-db.com/exploits/8262 -https://www.exploit-db.com/exploits/8263 -https://www.exploit-db.com/exploits/8264 -https://www.exploit-db.com/exploits/8265 -https://www.exploit-db.com/exploits/8266 -https://www.exploit-db.com/exploits/8270 -https://www.exploit-db.com/exploits/8271 -https://www.exploit-db.com/exploits/8285 -https://www.exploit-db.com/exploits/8290 -https://www.exploit-db.com/exploits/8291 -https://www.exploit-db.com/exploits/8296 -https://www.exploit-db.com/exploits/8297 -https://www.exploit-db.com/exploits/8304 -https://www.exploit-db.com/exploits/8306 -https://www.exploit-db.com/exploits/8308 -https://www.exploit-db.com/exploits/8313 -https://www.exploit-db.com/exploits/8314 -https://www.exploit-db.com/exploits/8317 -https://www.exploit-db.com/exploits/8320 -https://www.exploit-db.com/exploits/8321 -https://www.exploit-db.com/exploits/8322 -https://www.exploit-db.com/exploits/8324 -https://www.exploit-db.com/exploits/8325 -https://www.exploit-db.com/exploits/8328 -https://www.exploit-db.com/exploits/8331 -https://www.exploit-db.com/exploits/8332 -https://www.exploit-db.com/exploits/8334 -https://www.exploit-db.com/exploits/8341 -https://www.exploit-db.com/exploits/8343 -https://www.exploit-db.com/exploits/8347 -https://www.exploit-db.com/exploits/8350 -https://www.exploit-db.com/exploits/8351 -https://www.exploit-db.com/exploits/8353 -https://www.exploit-db.com/exploits/8355 -https://www.exploit-db.com/exploits/8357 -https://www.exploit-db.com/exploits/8366 -https://www.exploit-db.com/exploits/8367 -https://www.exploit-db.com/exploits/8370 -https://www.exploit-db.com/exploits/8374 -https://www.exploit-db.com/exploits/8382 -https://www.exploit-db.com/exploits/8390 -https://www.exploit-db.com/exploits/8394 -https://www.exploit-db.com/exploits/8402 -https://www.exploit-db.com/exploits/8403 -https://www.exploit-db.com/exploits/8404 -https://www.exploit-db.com/exploits/8405 -https://www.exploit-db.com/exploits/8405/ -https://www.exploit-db.com/exploits/8406 -https://www.exploit-db.com/exploits/8407 -https://www.exploit-db.com/exploits/8410 -https://www.exploit-db.com/exploits/8411 -https://www.exploit-db.com/exploits/8412 -https://www.exploit-db.com/exploits/8413 -https://www.exploit-db.com/exploits/8416 -https://www.exploit-db.com/exploits/8418 -https://www.exploit-db.com/exploits/8420 -https://www.exploit-db.com/exploits/8423 -https://www.exploit-db.com/exploits/8424 -https://www.exploit-db.com/exploits/8425 -https://www.exploit-db.com/exploits/8426 -https://www.exploit-db.com/exploits/8427 -https://www.exploit-db.com/exploits/8428 -https://www.exploit-db.com/exploits/8431 -https://www.exploit-db.com/exploits/8432 -https://www.exploit-db.com/exploits/8434 -https://www.exploit-db.com/exploits/8445 -https://www.exploit-db.com/exploits/8447 -https://www.exploit-db.com/exploits/8451 -https://www.exploit-db.com/exploits/8452 -https://www.exploit-db.com/exploits/8453 -https://www.exploit-db.com/exploits/8454 -https://www.exploit-db.com/exploits/8455 -https://www.exploit-db.com/exploits/8456 -https://www.exploit-db.com/exploits/8457 -https://www.exploit-db.com/exploits/8458 -https://www.exploit-db.com/exploits/846 -https://www.exploit-db.com/exploits/8460 -https://www.exploit-db.com/exploits/8461 -https://www.exploit-db.com/exploits/8464 -https://www.exploit-db.com/exploits/8466 -https://www.exploit-db.com/exploits/8470 -https://www.exploit-db.com/exploits/8474 -https://www.exploit-db.com/exploits/8481 -https://www.exploit-db.com/exploits/8482 -https://www.exploit-db.com/exploits/8489 -https://www.exploit-db.com/exploits/8493 -https://www.exploit-db.com/exploits/8495 -https://www.exploit-db.com/exploits/8501 -https://www.exploit-db.com/exploits/8502 -https://www.exploit-db.com/exploits/8503 -https://www.exploit-db.com/exploits/8504 -https://www.exploit-db.com/exploits/8505 -https://www.exploit-db.com/exploits/8514 -https://www.exploit-db.com/exploits/8516 -https://www.exploit-db.com/exploits/8519 -https://www.exploit-db.com/exploits/8520 -https://www.exploit-db.com/exploits/8523 -https://www.exploit-db.com/exploits/8526 -https://www.exploit-db.com/exploits/8527 -https://www.exploit-db.com/exploits/8529 -https://www.exploit-db.com/exploits/8531 -https://www.exploit-db.com/exploits/8533 -https://www.exploit-db.com/exploits/8536 -https://www.exploit-db.com/exploits/8539 -https://www.exploit-db.com/exploits/8542 -https://www.exploit-db.com/exploits/8545 -https://www.exploit-db.com/exploits/8546 -https://www.exploit-db.com/exploits/8547 -https://www.exploit-db.com/exploits/8548 -https://www.exploit-db.com/exploits/8549 -https://www.exploit-db.com/exploits/8550 -https://www.exploit-db.com/exploits/8551 -https://www.exploit-db.com/exploits/8552 -https://www.exploit-db.com/exploits/8555 -https://www.exploit-db.com/exploits/8563 -https://www.exploit-db.com/exploits/8565 -https://www.exploit-db.com/exploits/8566 -https://www.exploit-db.com/exploits/8569 -https://www.exploit-db.com/exploits/8570 -https://www.exploit-db.com/exploits/8571 -https://www.exploit-db.com/exploits/8572 -https://www.exploit-db.com/exploits/8573 -https://www.exploit-db.com/exploits/8576 -https://www.exploit-db.com/exploits/8577 -https://www.exploit-db.com/exploits/8579 -https://www.exploit-db.com/exploits/8581 -https://www.exploit-db.com/exploits/8593 -https://www.exploit-db.com/exploits/8599 -https://www.exploit-db.com/exploits/8600 -https://www.exploit-db.com/exploits/8602 -https://www.exploit-db.com/exploits/8603 -https://www.exploit-db.com/exploits/8604 -https://www.exploit-db.com/exploits/8605 -https://www.exploit-db.com/exploits/8606 -https://www.exploit-db.com/exploits/8609 -https://www.exploit-db.com/exploits/8610 -https://www.exploit-db.com/exploits/8611 -https://www.exploit-db.com/exploits/8612 -https://www.exploit-db.com/exploits/8613 -https://www.exploit-db.com/exploits/8614 -https://www.exploit-db.com/exploits/8615 -https://www.exploit-db.com/exploits/8616 -https://www.exploit-db.com/exploits/8618 -https://www.exploit-db.com/exploits/8621 -https://www.exploit-db.com/exploits/8622 -https://www.exploit-db.com/exploits/8623 -https://www.exploit-db.com/exploits/8624 -https://www.exploit-db.com/exploits/8625 -https://www.exploit-db.com/exploits/8626 -https://www.exploit-db.com/exploits/8627 -https://www.exploit-db.com/exploits/8628 -https://www.exploit-db.com/exploits/8629 -https://www.exploit-db.com/exploits/8630 -https://www.exploit-db.com/exploits/8631 -https://www.exploit-db.com/exploits/8632 -https://www.exploit-db.com/exploits/8633 -https://www.exploit-db.com/exploits/8634 -https://www.exploit-db.com/exploits/8635 -https://www.exploit-db.com/exploits/8636 -https://www.exploit-db.com/exploits/8638 -https://www.exploit-db.com/exploits/8639 -https://www.exploit-db.com/exploits/8640 -https://www.exploit-db.com/exploits/8642 -https://www.exploit-db.com/exploits/8643 -https://www.exploit-db.com/exploits/8644 -https://www.exploit-db.com/exploits/8645 -https://www.exploit-db.com/exploits/8647 -https://www.exploit-db.com/exploits/8648 -https://www.exploit-db.com/exploits/8649 -https://www.exploit-db.com/exploits/8650 -https://www.exploit-db.com/exploits/8655 -https://www.exploit-db.com/exploits/8656 -https://www.exploit-db.com/exploits/8658 -https://www.exploit-db.com/exploits/8659 -https://www.exploit-db.com/exploits/8664 -https://www.exploit-db.com/exploits/8665 -https://www.exploit-db.com/exploits/8667 -https://www.exploit-db.com/exploits/8668 -https://www.exploit-db.com/exploits/8670 -https://www.exploit-db.com/exploits/8671 -https://www.exploit-db.com/exploits/8672 -https://www.exploit-db.com/exploits/8676 -https://www.exploit-db.com/exploits/8677 -https://www.exploit-db.com/exploits/8679 -https://www.exploit-db.com/exploits/8680 -https://www.exploit-db.com/exploits/8681 -https://www.exploit-db.com/exploits/8683 -https://www.exploit-db.com/exploits/8689 -https://www.exploit-db.com/exploits/8690 -https://www.exploit-db.com/exploits/8691 -https://www.exploit-db.com/exploits/8695 -https://www.exploit-db.com/exploits/8697 -https://www.exploit-db.com/exploits/8698 -https://www.exploit-db.com/exploits/8700 -https://www.exploit-db.com/exploits/8701 -https://www.exploit-db.com/exploits/8702 -https://www.exploit-db.com/exploits/8705 -https://www.exploit-db.com/exploits/8706 -https://www.exploit-db.com/exploits/8707 -https://www.exploit-db.com/exploits/8708 -https://www.exploit-db.com/exploits/8709 -https://www.exploit-db.com/exploits/8710 -https://www.exploit-db.com/exploits/8711 -https://www.exploit-db.com/exploits/8714 -https://www.exploit-db.com/exploits/8715 -https://www.exploit-db.com/exploits/8720 -https://www.exploit-db.com/exploits/8724 -https://www.exploit-db.com/exploits/8726 -https://www.exploit-db.com/exploits/8727 -https://www.exploit-db.com/exploits/8730 -https://www.exploit-db.com/exploits/8731 -https://www.exploit-db.com/exploits/8735 -https://www.exploit-db.com/exploits/8737 -https://www.exploit-db.com/exploits/8741 -https://www.exploit-db.com/exploits/8744 -https://www.exploit-db.com/exploits/8745 -https://www.exploit-db.com/exploits/8748 -https://www.exploit-db.com/exploits/8751 -https://www.exploit-db.com/exploits/8767 -https://www.exploit-db.com/exploits/8770 -https://www.exploit-db.com/exploits/8772 -https://www.exploit-db.com/exploits/8777 -https://www.exploit-db.com/exploits/8781 -https://www.exploit-db.com/exploits/8782 -https://www.exploit-db.com/exploits/8783 -https://www.exploit-db.com/exploits/8790 -https://www.exploit-db.com/exploits/8794 -https://www.exploit-db.com/exploits/8798 -https://www.exploit-db.com/exploits/8802 -https://www.exploit-db.com/exploits/8803 -https://www.exploit-db.com/exploits/8804 -https://www.exploit-db.com/exploits/8808 -https://www.exploit-db.com/exploits/8812 -https://www.exploit-db.com/exploits/8813 -https://www.exploit-db.com/exploits/8814 -https://www.exploit-db.com/exploits/8815 -https://www.exploit-db.com/exploits/8816 -https://www.exploit-db.com/exploits/8822 -https://www.exploit-db.com/exploits/8832 -https://www.exploit-db.com/exploits/8837 -https://www.exploit-db.com/exploits/8841 -https://www.exploit-db.com/exploits/8842 -https://www.exploit-db.com/exploits/8850 -https://www.exploit-db.com/exploits/8851 -https://www.exploit-db.com/exploits/8853 -https://www.exploit-db.com/exploits/8857 -https://www.exploit-db.com/exploits/8858 -https://www.exploit-db.com/exploits/8859 -https://www.exploit-db.com/exploits/8861 -https://www.exploit-db.com/exploits/8865 -https://www.exploit-db.com/exploits/8868 -https://www.exploit-db.com/exploits/8873 -https://www.exploit-db.com/exploits/8878 -https://www.exploit-db.com/exploits/8884 -https://www.exploit-db.com/exploits/8885 -https://www.exploit-db.com/exploits/8886 -https://www.exploit-db.com/exploits/8889 -https://www.exploit-db.com/exploits/8890 -https://www.exploit-db.com/exploits/8891 -https://www.exploit-db.com/exploits/8892 -https://www.exploit-db.com/exploits/8893 -https://www.exploit-db.com/exploits/8894 -https://www.exploit-db.com/exploits/8898 -https://www.exploit-db.com/exploits/8900 -https://www.exploit-db.com/exploits/8901 -https://www.exploit-db.com/exploits/8902 -https://www.exploit-db.com/exploits/8903 -https://www.exploit-db.com/exploits/8906 -https://www.exploit-db.com/exploits/8907 -https://www.exploit-db.com/exploits/8917 -https://www.exploit-db.com/exploits/8918 -https://www.exploit-db.com/exploits/8921 -https://www.exploit-db.com/exploits/8922 -https://www.exploit-db.com/exploits/8927 -https://www.exploit-db.com/exploits/8928 -https://www.exploit-db.com/exploits/893 -https://www.exploit-db.com/exploits/8931 -https://www.exploit-db.com/exploits/8932 -https://www.exploit-db.com/exploits/8934 -https://www.exploit-db.com/exploits/8935 -https://www.exploit-db.com/exploits/8936 -https://www.exploit-db.com/exploits/8937 -https://www.exploit-db.com/exploits/8939 -https://www.exploit-db.com/exploits/8941 -https://www.exploit-db.com/exploits/8942 -https://www.exploit-db.com/exploits/8943 -https://www.exploit-db.com/exploits/8945 -https://www.exploit-db.com/exploits/8946 -https://www.exploit-db.com/exploits/8947 -https://www.exploit-db.com/exploits/8948 -https://www.exploit-db.com/exploits/8951 -https://www.exploit-db.com/exploits/8952 -https://www.exploit-db.com/exploits/8953 -https://www.exploit-db.com/exploits/8954 -https://www.exploit-db.com/exploits/8958 -https://www.exploit-db.com/exploits/8959 -https://www.exploit-db.com/exploits/8961 -https://www.exploit-db.com/exploits/8962 -https://www.exploit-db.com/exploits/8965 -https://www.exploit-db.com/exploits/8966 -https://www.exploit-db.com/exploits/8968 -https://www.exploit-db.com/exploits/8971 -https://www.exploit-db.com/exploits/8975 -https://www.exploit-db.com/exploits/8977 -https://www.exploit-db.com/exploits/8978 -https://www.exploit-db.com/exploits/8979 -https://www.exploit-db.com/exploits/8980 -https://www.exploit-db.com/exploits/8981 -https://www.exploit-db.com/exploits/8988 -https://www.exploit-db.com/exploits/8990 -https://www.exploit-db.com/exploits/8995 -https://www.exploit-db.com/exploits/8996 -https://www.exploit-db.com/exploits/9000 -https://www.exploit-db.com/exploits/9006 -https://www.exploit-db.com/exploits/9007 -https://www.exploit-db.com/exploits/9023 -https://www.exploit-db.com/exploits/9095 -https://www.exploit-db.com/exploits/9134 -https://www.exploit-db.com/exploits/9135 -https://www.exploit-db.com/exploits/9160 -https://www.exploit-db.com/exploits/9209 -https://www.exploit-db.com/exploits/9236 -https://www.exploit-db.com/exploits/9240 -https://www.exploit-db.com/exploits/9284 -https://www.exploit-db.com/exploits/9306 -https://www.exploit-db.com/exploits/9342 -https://www.exploit-db.com/exploits/9387 -https://www.exploit-db.com/exploits/9443 -https://www.exploit-db.com/exploits/9451 -https://www.exploit-db.com/exploits/9654 -https://www.exploit-db.com/exploits/9699 -https://www.exploit-db.com/exploits/983 -https://www.exploit-db.com/exploits/9926 -https://www.exploit-db.com/ghdb/4613/ -https://www.exploit-db.com/papers/47535 -https://www.exploitee.rs/index.php/Belkin_N300#Remote_Root -https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability -https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 -https://www.exsiliumsecurity.com/CVE-2024-27453.html -https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and -https://www.fatalerrors.org/a/analysis-of-the-snakeyaml-deserialization-in-java-security.html -https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ -https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/ -https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H -https://www.flamingspork.com/blog/2019/01/23/cve-2019-6260:-gaining-control-of-bmc-from-the-host-processor/ -https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in--d-link-router-dir868.html -https://www.futureweb.at/security/CVE-2015-9253/ -https://www.futureweb.at/security/CVE-2017-10665/ -https://www.fwhibbit.es/bypassing-spam-titan-my-first-cve -https://www.fwhibbit.es/lfi-en-cisco-small-business-sa500-series-cuando-la-seguridad-de-tu-red-esta-hecha-un-cisco -https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ -https://www.genymotion.com/download/ -https://www.ghostccamm.com/blog/multi_cockpit_vulns/ -https://www.ghostccamm.com/blog/multi_strapi_vulns/ -https://www.greyhathacker.net/?p=1006 -https://www.gruppotim.it/it/footer/red-team.html -https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html -https://www.gruppotim.it/redteam -https://www.gsma.com/security/wp-content/uploads/2023/10/0073-invalid_curve.pdf -https://www.gubello.me/blog/bookly-blind-stored-xss/ -https://www.gubello.me/blog/events-manager-authenticated-stored-xss/ -https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ -https://www.gubello.me/blog/wp-live-chat-support-8-0-05-stored-xss/ -https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html -https://www.hackplayers.com/2023/07/vulnerabilidad-vision1210-unitronics.html -https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html -https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks -https://www.halborn.com/disclosures -https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ -https://www.halfdog.net/Security/2018/LogUserSessionLocalRootPrivilegeEscalation/ -https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ -https://www.hdwsec.fr/blog/20200608-skype/ -https://www.hertzbleed.com/gpu.zip/ -https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf -https://www.hex-rays.com/bugbounty.shtml -https://www.hex-rays.com/vulnfix.shtml -https://www.honeywell.com/us/en/product-security -https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ -https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/ -https://www.horizon3.ai/red-team-blog-cve-2022-28219/ -https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass -https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity -https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 -https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware -https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 -https://www.ihteam.net/advisory/mirth-connect -https://www.ihteam.net/advisory/onionshare/ -https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/ -https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -https://www.iliashn.com/CVE-2018-7580/ -https://www.illumos.org/issues/14424 -https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=33078&sid=5fbb164c3830293138917f9b14264ed1 -https://www.imagemagick.org/script/changelog.php -https://www.immuniweb.com/advisory/HTB22913 -https://www.immuniweb.com/advisory/HTB23039 -https://www.immuniweb.com/advisory/HTB23169 -https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html -https://www.inputzero.io/2018/09/telegram-share-password-in-cleartext.html -https://www.inputzero.io/2019/02/fuzzing-webkit.html -https://www.inputzero.io/2019/09/telegram-privacy-fails-again.html -https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html -https://www.intrinsec.com/publications/ -https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ -https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain -https://www.ipi.fi/pipermail/aide/2022-January/001713.html -https://www.ise.io/casestudies/sohopelessly-broken-2-0/ -https://www.ise.io/research/ -https://www.ise.io/research/studies-and-papers/belkin_f5d8236-4v2/ -https://www.ise.io/research/studies-and-papers/belkin_n900/ -https://www.ise.io/research/studies-and-papers/dlink_dir865l/ -https://www.ise.io/research/studies-and-papers/linksys_wrt310v2/ -https://www.ise.io/research/studies-and-papers/netgear_wndr4700/ -https://www.ise.io/research/studies-and-papers/netgear_wnr3500/ -https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf -https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf -https://www.jfrog.com/jira/browse/RTFACT-17004 -https://www.jianshu.com/p/219755c047a1 -https://www.jinsonvarghese.com/unrestricted-file-upload-in-contact-form-7/ -https://www.jsof-tech.com/ripple20/ -https://www.junebug.site/blog/cve-2020-27191-lionwiki-3-2-11-lfi -https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html -https://www.karansaini.com/os-command-injection-v-sol/ -https://www.kb.cert.org/vuls/id/119704 -https://www.kb.cert.org/vuls/id/144389 -https://www.kb.cert.org/vuls/id/155143 -https://www.kb.cert.org/vuls/id/166743 -https://www.kb.cert.org/vuls/id/167623 -https://www.kb.cert.org/vuls/id/168699 -https://www.kb.cert.org/vuls/id/174715/ -https://www.kb.cert.org/vuls/id/176160 -https://www.kb.cert.org/vuls/id/180049 -https://www.kb.cert.org/vuls/id/192371 -https://www.kb.cert.org/vuls/id/201168 -https://www.kb.cert.org/vuls/id/214283 -https://www.kb.cert.org/vuls/id/240311 -https://www.kb.cert.org/vuls/id/250519 -https://www.kb.cert.org/vuls/id/253266 -https://www.kb.cert.org/vuls/id/257161 -https://www.kb.cert.org/vuls/id/257161/ -https://www.kb.cert.org/vuls/id/257823 -https://www.kb.cert.org/vuls/id/304725 -https://www.kb.cert.org/vuls/id/305448 -https://www.kb.cert.org/vuls/id/307015 -https://www.kb.cert.org/vuls/id/307983 -https://www.kb.cert.org/vuls/id/317277 -https://www.kb.cert.org/vuls/id/327976 -https://www.kb.cert.org/vuls/id/334207 -https://www.kb.cert.org/vuls/id/346175 -https://www.kb.cert.org/vuls/id/355151 -https://www.kb.cert.org/vuls/id/366027 -https://www.kb.cert.org/vuls/id/377260 -https://www.kb.cert.org/vuls/id/396440 -https://www.kb.cert.org/vuls/id/403568 -https://www.kb.cert.org/vuls/id/405600 -https://www.kb.cert.org/vuls/id/417980 -https://www.kb.cert.org/vuls/id/446598 -https://www.kb.cert.org/vuls/id/446847 -https://www.kb.cert.org/vuls/id/457759 -https://www.kb.cert.org/vuls/id/475445 -https://www.kb.cert.org/vuls/id/489392 -https://www.kb.cert.org/vuls/id/490028 -https://www.kb.cert.org/vuls/id/507496 -https://www.kb.cert.org/vuls/id/547255 -https://www.kb.cert.org/vuls/id/548487 -https://www.kb.cert.org/vuls/id/553503 -https://www.kb.cert.org/vuls/id/576313 -https://www.kb.cert.org/vuls/id/576688/ -https://www.kb.cert.org/vuls/id/581311 -https://www.kb.cert.org/vuls/id/583776 -https://www.kb.cert.org/vuls/id/600671 -https://www.kb.cert.org/vuls/id/608209 -https://www.kb.cert.org/vuls/id/614751 -https://www.kb.cert.org/vuls/id/624539 -https://www.kb.cert.org/vuls/id/630239 -https://www.kb.cert.org/vuls/id/630872 -https://www.kb.cert.org/vuls/id/631579 -https://www.kb.cert.org/vuls/id/633847 -https://www.kb.cert.org/vuls/id/636397 -https://www.kb.cert.org/vuls/id/646008 -https://www.kb.cert.org/vuls/id/672565 -https://www.kb.cert.org/vuls/id/677427 -https://www.kb.cert.org/vuls/id/690343 -https://www.kb.cert.org/vuls/id/718152 -https://www.kb.cert.org/vuls/id/719736 -https://www.kb.cert.org/vuls/id/724487 -https://www.kb.cert.org/vuls/id/739007 -https://www.kb.cert.org/vuls/id/742632 -https://www.kb.cert.org/vuls/id/745607 -https://www.kb.cert.org/vuls/id/753264 -https://www.kb.cert.org/vuls/id/756913/ -https://www.kb.cert.org/vuls/id/757840 -https://www.kb.cert.org/vuls/id/763843 -https://www.kb.cert.org/vuls/id/766427 -https://www.kb.cert.org/vuls/id/768331 -https://www.kb.cert.org/vuls/id/772447 -https://www.kb.cert.org/vuls/id/782301 -https://www.kb.cert.org/vuls/id/787952 -https://www.kb.cert.org/vuls/id/792004 -https://www.kb.cert.org/vuls/id/793496 -https://www.kb.cert.org/vuls/id/813296 -https://www.kb.cert.org/vuls/id/845332 -https://www.kb.cert.org/vuls/id/846103 -https://www.kb.cert.org/vuls/id/846320 -https://www.kb.cert.org/vuls/id/857035 -https://www.kb.cert.org/vuls/id/865216 -https://www.kb.cert.org/vuls/id/870744 -https://www.kb.cert.org/vuls/id/873161/ -https://www.kb.cert.org/vuls/id/877625 -https://www.kb.cert.org/vuls/id/877837/ -https://www.kb.cert.org/vuls/id/903500 -https://www.kb.cert.org/vuls/id/913000 -https://www.kb.cert.org/vuls/id/916896 -https://www.kb.cert.org/vuls/id/962459 -https://www.kb.cert.org/vuls/id/972224 -https://www.kb.cert.org/vuls/id/981271 -https://www.kb.cert.org/vuls/id/982149 -https://www.kb.cert.org/vuls/id/992624 -https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R -https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH -https://www.kb.cert.org/vuls/id/GWAN-A26L3F -https://www.kb.cert.org/vuls/id/GWAN-A6LPPW -https://www.kde.org/info/security/advisory-20160724-1.txt -https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz -https://www.kernel.org/pub/linux/kernel/next/patch-v3.15-rc5-next-20140519.xz -https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 -https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.2 -https://www.knowcybersec.com/2018/12/CVE-2018-12651-reflected-XSS.html -https://www.knowcybersec.com/2019/02/CVE-2018-12652-reflected-XSS.html -https://www.knowcybersec.com/2019/02/CVE-2018-12653-reflected-XSS.html -https://www.korelogic.com/Resources/Advisories/KL-001-2014-002.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2015-003.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2015-004.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2015-005.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2015-008.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt -https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt -https://www.kpmg.de/noindex/advisories/KPMG-2018-001.txt -https://www.kpmg.de/noindex/advisories/KPMG-2018-002.txt -https://www.kpmg.de/noindex/advisories/KPMG-2019-001.txt -https://www.krackattacks.com/ -https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch -https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 -https://www.kth.se/polopoly_fs/1.923564.1568098316!/Vulnerability_Report_TTLock_Password_Reset.pdf -https://www.kth.se/polopoly_fs/1.923565.1568098364!/Vulnerability_Report_TTLock_State_Consistency.pdf -https://www.kth.se/polopoly_fs/1.931930.1571073241!/Vulnerability_Report_Glue_State_Consistency.pdf -https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution -https://www.leviathansecurity.com/research/tunnelvision -https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf -https://www.linkedin.com/feed/update/urn:li:activity:6489145511902212096/ -https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 -https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/ -https://www.linkedin.com/pulse/buffer-overflow-exploitation-british-airways-system-marco-gisbert/ -https://www.linkedin.com/pulse/cve-2021-35508-privilege-escalation-via-weak-windows-marshall-mba -https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe -https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies -https://www.logonbox.com/en/ -https://www.magnitude.com/products/data-connectivity -https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1695025.html -https://www.mail-archive.com/fulldisclosure@seclists.org/msg07139.html -https://www.mail-archive.com/fulldisclosure@seclists.org/msg07140.html -https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html -https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg116312.html -https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html -https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html -https://www.manageengine.com/products/self-service-password/kb/our-response-to-CVE-2023-35719.html -https://www.mantisbt.org/bugs/view.php?id=29130 -https://www.mattz.io/posts/cve-2023-50094/ -https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ -https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight -https://www.mdsec.co.uk/2018/08/advisory-cve-2018-8007-apache-couchdb-remote-code-execution/ -https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/ -https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file -https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html -https://www.metabaseq.com/imagemagick-zero-days/ -https://www.michaelrowley.dev/research/posts/nfsdk/nfsdk.html -https://www.mindpointgroup.com/blog/webta-sqli-vulnerability/ -https://www.misp.software/Changelog.txt -https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 -https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-010.pdf -https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-018_en.pdf -https://www.mnemonic.no/blog/introducing-snicat/ -https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt -https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt -https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt -https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt -https://www.modzero.com/advisories/MZ-22-02-CrowdStrike-FalconSensor.txt -https://www.modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html -https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050 -https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ -https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html -https://www.navidkagalwalla.com/booking-core-vulnerabilities -https://www.navidkagalwalla.com/gila-cms-vulnerabilities -https://www.navidkagalwalla.com/icehrm-vulnerabilities -https://www.navsec.net/2022/11/12/kwoksys-xxe.html -https://www.netskope.com/company/security-compliance-and-assurance/netskope-security-advisory-nskpsa-2021-002 -https://www.netsparker.com/critical-xss-sql-injection-vulnerabilities-gnew/ -https://www.netsparker.com/cve-2015-1385-xss-vulnerability-in-blubrry-powerpress/ -https://www.nezami.me/ -https://www.novell.com/support/kb/doc.php?id=7017813 -https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ -https://www.nri-secure.com/blog/new-iot-vulnerability-connmando -https://www.ns-echo.com/posts/nomachine_afo.html -https://www.nussko.com/advisories/advisory-2021-08-01.txt -https://www.nussko.com/advisories/advisory-2021-08-02.txt -https://www.octority.com/2019/05/07/cyberark-enterprise-password-vault-xml-external-entity-xxe-injection/ -https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ -https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf -https://www.on-x.com/wp-content/uploads/2023/01/on-x_-_security_advisory_-_sage_frp_1000_-_cve-2019-25053.pdf -https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components -https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 -https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins -https://www.openoffice.org/security/cves/CVE-2016-6803.html -https://www.openoffice.org/security/cves/CVE-2016-6804.html -https://www.openoffice.org/security/cves/CVE-2017-12607.html -https://www.openoffice.org/security/cves/CVE-2017-12608.html -https://www.openoffice.org/security/cves/CVE-2017-3157.html -https://www.openoffice.org/security/cves/CVE-2018-11790.html -https://www.openoffice.org/security/cves/CVE-2022-37400.html -https://www.openoffice.org/security/cves/CVE-2022-37401.html -https://www.openoffice.org/security/cves/CVE-2022-38745.html -https://www.openoffice.org/security/cves/CVE-2022-47502.html -https://www.openoffice.org/security/cves/CVE-2023-47804.html -https://www.openwall.com/lists/kernel-hardening/2020/03/25/1 -https://www.openwall.com/lists/oss-security/2010/09/17/7 -https://www.openwall.com/lists/oss-security/2011/02/22/14 -https://www.openwall.com/lists/oss-security/2011/02/28/9 -https://www.openwall.com/lists/oss-security/2011/03/14/20 -https://www.openwall.com/lists/oss-security/2011/03/14/21 -https://www.openwall.com/lists/oss-security/2011/08/19/13 -https://www.openwall.com/lists/oss-security/2011/08/22/11 -https://www.openwall.com/lists/oss-security/2011/08/30/5 -https://www.openwall.com/lists/oss-security/2011/08/30/6 -https://www.openwall.com/lists/oss-security/2011/09/30/3 -https://www.openwall.com/lists/oss-security/2011/10/04/7 -https://www.openwall.com/lists/oss-security/2015/04/01/2 -https://www.openwall.com/lists/oss-security/2015/06/17/6 -https://www.openwall.com/lists/oss-security/2015/08/28/4 -https://www.openwall.com/lists/oss-security/2015/09/01/7 -https://www.openwall.com/lists/oss-security/2015/10/27/2 -https://www.openwall.com/lists/oss-security/2015/10/27/4 -https://www.openwall.com/lists/oss-security/2015/12/19/2 -https://www.openwall.com/lists/oss-security/2016/04/16/2 -https://www.openwall.com/lists/oss-security/2016/11/07/2 -https://www.openwall.com/lists/oss-security/2017/06/07/1 -https://www.openwall.com/lists/oss-security/2018/09/25/4 -https://www.openwall.com/lists/oss-security/2018/11/22/3 -https://www.openwall.com/lists/oss-security/2019/04/03/4 -https://www.openwall.com/lists/oss-security/2019/04/03/4/1 -https://www.openwall.com/lists/oss-security/2019/04/18/4 -https://www.openwall.com/lists/oss-security/2019/07/21/1 -https://www.openwall.com/lists/oss-security/2019/11/02/1 -https://www.openwall.com/lists/oss-security/2019/12/11/9 -https://www.openwall.com/lists/oss-security/2020/02/19/1 -https://www.openwall.com/lists/oss-security/2020/05/14/11 -https://www.openwall.com/lists/oss-security/2020/05/19/8 -https://www.openwall.com/lists/oss-security/2020/06/15/3 -https://www.openwall.com/lists/oss-security/2020/07/09/2 -https://www.openwall.com/lists/oss-security/2020/07/28/2 -https://www.openwall.com/lists/oss-security/2020/10/30/1, -https://www.openwall.com/lists/oss-security/2020/11/04/3, -https://www.openwall.com/lists/oss-security/2020/11/05/2, -https://www.openwall.com/lists/oss-security/2020/11/18/1 -https://www.openwall.com/lists/oss-security/2020/11/19/3 -https://www.openwall.com/lists/oss-security/2020/11/20/5, -https://www.openwall.com/lists/oss-security/2021/01/29/2 -https://www.openwall.com/lists/oss-security/2021/03/19/2 -https://www.openwall.com/lists/oss-security/2021/03/19/3 -https://www.openwall.com/lists/oss-security/2021/03/24/2 -https://www.openwall.com/lists/oss-security/2021/04/18/2 -https://www.openwall.com/lists/oss-security/2021/04/18/4 -https://www.openwall.com/lists/oss-security/2021/05/17/1 -https://www.openwall.com/lists/oss-security/2021/05/25/1 -https://www.openwall.com/lists/oss-security/2021/06/08/2 -https://www.openwall.com/lists/oss-security/2021/06/28/2 -https://www.openwall.com/lists/oss-security/2021/07/20/1 -https://www.openwall.com/lists/oss-security/2021/07/20/2 -https://www.openwall.com/lists/oss-security/2021/07/22/1 -https://www.openwall.com/lists/oss-security/2021/10/20/2 -https://www.openwall.com/lists/oss-security/2021/11/25/1 -https://www.openwall.com/lists/oss-security/2022/01/20/3 -https://www.openwall.com/lists/oss-security/2022/01/24/4 -https://www.openwall.com/lists/oss-security/2022/01/30/4 -https://www.openwall.com/lists/oss-security/2022/03/17/1 -https://www.openwall.com/lists/oss-security/2022/03/17/2 -https://www.openwall.com/lists/oss-security/2022/04/07/1 -https://www.openwall.com/lists/oss-security/2022/04/12/3 -https://www.openwall.com/lists/oss-security/2022/04/22/3 -https://www.openwall.com/lists/oss-security/2022/05/31/1 -https://www.openwall.com/lists/oss-security/2022/06/08/10 -https://www.openwall.com/lists/oss-security/2022/06/22/1 -https://www.openwall.com/lists/oss-security/2022/06/30/1 -https://www.openwall.com/lists/oss-security/2022/07/02/3 -https://www.openwall.com/lists/oss-security/2022/08/09/5 -https://www.openwall.com/lists/oss-security/2022/08/09/6 -https://www.openwall.com/lists/oss-security/2022/08/09/7 -https://www.openwall.com/lists/oss-security/2022/09/01/4 -https://www.openwall.com/lists/oss-security/2022/10/13/5 -https://www.openwall.com/lists/oss-security/2022/12/21/3 -https://www.openwall.com/lists/oss-security/2023/01/04/1 -https://www.openwall.com/lists/oss-security/2023/01/05/1 -https://www.openwall.com/lists/oss-security/2023/04/16/3 -https://www.openwall.com/lists/oss-security/2023/05/08/3 -https://www.openwall.com/lists/oss-security/2023/09/22/10 -https://www.openwall.com/lists/oss-security/2024/01/18/2 -https://www.openwall.com/lists/oss-security/2024/01/30/6 -https://www.openwall.com/lists/oss-security/2024/02/14/4 -https://www.openwall.com/lists/oss-security/2024/03/04/2 -https://www.openwall.com/lists/oss-security/2024/03/27/5 -https://www.openwall.com/lists/oss-security/2024/05/16/3 -https://www.oppositionsecurity.com/imagenow-7-1-4-dos/ -https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability -https://www.oracle.com/security-alerts/cpujan2022.html -https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf -https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) -https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067 -https://www.papercut.com/kb/Main/CommonSecurityQuestions/ -https://www.paramiko.org/changelog.html -https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien -https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/ -https://www.pentagrid.ch/en/blog/reflected-xss-vulnerability-in-crealogix-ebics-implementation/ -https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ -https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html -https://www.pentest.com.tr/exploits/PHP-Fusion-9-03-00-Edit-Profile-Remote-Code-Execution.html -https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html -https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html -https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html -https://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html -https://www.pentestpartners.com/security-blog/a-neet-csrf-to-reverse-shell-in-wi-fi-music-streamer/ -https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/ -https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/ -https://www.pentestpartners.com/security-blog/netgear-ex7000-wi-fi-range-extender-minor-xss-and-poor-password-handling/ -https://www.pentestpartners.com/security-blog/nifty-xss-in-annke-sp1-hd-wireless-camera/ -https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ -https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/ -https://www.percona.com/blog/2015/05/06/percona-security-advisory-cve-2015-1027/ -https://www.percona.com/blog/2017/01/12/cve-2016-6225-percona-xtrabackup-encryption-iv-not-set-properly/ -https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/ -https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/ -https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/ -https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/ -https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/ -https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass -https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-jizhicms-v1-5/ -https://www.porlockz.com/A-arbitrary-file-write-vulnerability-in-RGCMS-V1-06/ -https://www.porlockz.com/A-xss-vulnerability-in-RGCMS-V1-06/ -https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/ -https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/ -https://www.prevanders.net/dwarfbug.html -https://www.prevanders.net/dwarfbug.html#DW201609-002 -https://www.prevanders.net/dwarfbug.html#DW202010-001 -https://www.prevanders.net/dwarfbug.html#DW202010-003 -https://www.privacy-wise.com/two-factor-authentication-cross-site-request-forgery-csrf-vulnerability-cve-2018-20231/ -https://www.profundis-labs.com/advisories/CVE-2015-7675.txt -https://www.profundis-labs.com/advisories/CVE-2015-7677.txt -https://www.profundis-labs.com/advisories/CVE-2017-17707.txt -https://www.profundis-labs.com/advisories/CVE-2017-17708.txt -https://www.purplemet.com/blog/openemr-xss-vulnerability -https://www.purplemet.com/blog/palo-alto-firewall-multiple-xss-vulnerabilities -https://www.purplemet.com/blog/sugarcrm-multiple-xss-vulnerabilities -https://www.purplemet.com/blog/typo3-xss-vulnerability -https://www.quali.com/products/cloudshell-pro/ -https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt -https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt -https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt -https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt -https://www.qualys.com/2019/01/09/system-down/system-down.txt -https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt -https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt -https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt -https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt -https://www.qualys.com/security-advisories/ -https://www.r29k.com/articles/bb/stored-xss-in-deskpro -https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor1 -https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor2 -https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html -https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/ -https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ -https://www.rapid7.com/blog/post/2022/03/29/cve-2022-1026-kyocera-net-view-address-book-exposure/ -https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/ -https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/ -https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ -https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ -https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ -https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 -https://www.rcesecurity.com/2014/03/cve-2014-2087-free-download-manager-cdownloads_deleted-updatedownload-remote-code-execution -https://www.rcesecurity.com/2015/09/cve-2014-7216-a-journey-through-yahoos-bug-bounty-program/ -https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/ -https://www.redguard.ch/advisories/abacus_mfa_bypass.txt -https://www.redlinecybersecurity.com/blog/cve-2024-22734 -https://www.redpacketsecurity.com/mobile-mouse-code-execution/ -https://www.redteam-pentesting.de/advisories/rt-sa-2014-004 -https://www.redteam-pentesting.de/advisories/rt-sa-2014-009 -https://www.redteam-pentesting.de/advisories/rt-sa-2014-011 -https://www.redteam-pentesting.de/advisories/rt-sa-2014-014 -https://www.redteam-pentesting.de/advisories/rt-sa-2015-002 -https://www.redteam-pentesting.de/advisories/rt-sa-2015-004 -https://www.redteam-pentesting.de/advisories/rt-sa-2020-002 -https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 -https://www.redteam-pentesting.de/advisories/rt-sa-2020-005 -https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 -https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 -https://www.redteam-pentesting.de/advisories/rt-sa-2021-005 -https://www.redteam-pentesting.de/advisories/rt-sa-2021-006 -https://www.redteam-pentesting.de/advisories/rt-sa-2021-009 -https://www.redteam-pentesting.de/advisories/rt-sa-2023-004/ -https://www.redteam-pentesting.de/advisories/rt-sa-2023-005/ -https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration -https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-003/-metadata-information-disclosure-in-orbiteam-bscw -https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-005/-sql-injection-in-webedition-cms-file-browser -https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-006/-directory-traversal-in-devexpress-asp-net-file-manager -https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-012/-unauthenticated-remote-code-execution-in-ibm-endpoint-manager-mobile-device-management-components -https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0 -https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id -https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-014/-cyberark-password-vault-web-access-remote-code-execution -https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-015/-cyberark-password-vault-memory-disclosure -https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-015/-icewarp-cross-site-scripting-in-notes-for-contacts -https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-016/-icewarp-cross-site-scripting-in-notes -https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component -https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass -https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/-auerswald-compact-multiple-backdoors -https://www.redteam-pentesting.de/en/advisories/rt-sa-2022-004/-starface-authentication-with-password-hash-possible -https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-001/-session-token-enumeration-in-rws-worldserver -https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments -https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection -https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-007/ -https://www.redteam.tips/mango-vulnerability-disclosure-report/ -https://www.revive-adserver.com/security/response-to-cve-2023-26756/ -https://www.riverloopsecurity.com/blog/2020/09/nitf-extract75-cve-2020-13995/ -https://www.rodrigofavarini.com.br/cybersecurity/multiple-xss-on-api-manager-3-1-0/ -https://www.rootshellsecurity.net/remote-heap-corruption-bug-discovery-minidlna/ -https://www.rootshellsecurity.net/rootshell-discover-denial-of-service-flaw-dekart-private-disk-encryption-software/ -https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/ -https://www.rsa.com/en-us/company/vulnerability-response-policy -https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/ -https://www.samba.org/samba/security/CVE-2012-1182 -https://www.samba.org/samba/security/CVE-2017-2619.html -https://www.samba.org/samba/security/CVE-2021-20316.html -https://www.samba.org/samba/security/CVE-2021-43566.html -https://www.saotn.org/wordpress-advisory-akal-theme-xss-vulnerability/ -https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html -https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2023-003.txt -https://www.schutzwerk.com/blog/schutzwerk-sa-2023-003/ -https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ -https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt -https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html -https://www.sec-consult.com/en/blog/2018/05/oracle-access-managers-identity-crisis/ -https://www.sec-consult.com/en/blog/advisories/arbitrary-file-upload-cross-site-scripting-in-mybiz-myprocurenet/ -https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/ -https://www.sec-consult.com/en/blog/advisories/dokuwiki-csv-formula-injection-vulnerability/ -https://www.sec-consult.com/en/blog/advisories/local-root-jailbreak-via-network-file-sharing-flaw-in-all-adb-broadband-gateways-routers/ -https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ -https://www.sec-consult.com/en/blog/advisories/privilege-escalation-via-linux-group-manipulation-in-all-adb-broadband-gateways-routers/ -https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-unserialize-moodle-open-source-learning-platform-cve-2018-14630/ -https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ -https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ -https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ -https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ -https://www.secforce.com/blog/2017/04/cve-2017-3599-pre-auth-mysql-remote-dos/ -https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/ -https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices -https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities -https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ -https://www.secureworks.com/research/swrx-2014-006 -https://www.securifera.com/advisories/ -https://www.securifera.com/advisories/CVE-2016-2345 -https://www.securifera.com/advisories/CVE-2018-6546/ -https://www.securifera.com/advisories/CVE-2018-6547/ -https://www.securifera.com/advisories/CVE-2019-8352/ -https://www.securifera.com/advisories/CVE-2022-40021/ -https://www.securifera.com/advisories/CVE-2022-40022/ -https://www.securifera.com/advisories/cve-2015-8277 -https://www.securifera.com/advisories/cve-2016-3147/ -https://www.securifera.com/advisories/cve-2018-16156/ -https://www.securifera.com/advisories/cve-2018-20052-20053/ -https://www.securifera.com/advisories/cve-2021-27198/ -https://www.securifera.com/advisories/cve-2021-32089/ -https://www.securifera.com/advisories/cve-2022-48580/ -https://www.securifera.com/advisories/cve-2022-48581/ -https://www.securifera.com/advisories/cve-2022-48582/ -https://www.securifera.com/advisories/cve-2022-48583/ -https://www.securifera.com/advisories/cve-2022-48584/ -https://www.securifera.com/advisories/cve-2022-48585/ -https://www.securifera.com/advisories/cve-2022-48586/ -https://www.securifera.com/advisories/cve-2022-48587/ -https://www.securifera.com/advisories/cve-2022-48588/ -https://www.securifera.com/advisories/cve-2022-48589/ -https://www.securifera.com/advisories/cve-2022-48590/ -https://www.securifera.com/advisories/cve-2022-48591/ -https://www.securifera.com/advisories/cve-2022-48592/ -https://www.securifera.com/advisories/cve-2022-48593/ -https://www.securifera.com/advisories/cve-2022-48594/ -https://www.securifera.com/advisories/cve-2022-48595/ -https://www.securifera.com/advisories/cve-2022-48596/ -https://www.securifera.com/advisories/cve-2022-48597/ -https://www.securifera.com/advisories/cve-2022-48598/ -https://www.securifera.com/advisories/cve-2022-48599/ -https://www.securifera.com/advisories/cve-2022-48600/ -https://www.securifera.com/advisories/cve-2022-48601/ -https://www.securifera.com/advisories/cve-2022-48602/ -https://www.securifera.com/advisories/cve-2022-48603/ -https://www.securifera.com/advisories/cve-2022-48604/ -https://www.securifera.com/advisories/sec-2017-0001/ -https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html -https://www.securify.nl/advisory/SFY20140806/command_injection_vulnerability_in_citrix_nitro_sdk_xen_hotfix_page.html -https://www.securify.nl/advisory/SFY20140904/websense_data_security_dlp_incident_forensics_preview_is_vulnerable_to_cross_site_scripting.html -https://www.securify.nl/advisory/SFY20140906/command_injection_vulnerability_in_network_diagnostics_tool_of_websense_appliance_manager.html -https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html -https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html -https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html -https://www.securify.nl/advisory/SFY20141109/emc_m_r__watch4net__lacks_c%20ross_site_request_forgery_protection.html -https://www.securify.nl/advisory/SFY20150503/reflected_cross_site_scripting_in_synology_diskstation_manager.html -https://www.securify.nl/advisory/SFY20150504/synology_photo_station_multiple_cross_site_scripting_vulnerabilities.html -https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html -https://www.securify.nl/advisory/SFY20150809/multiple_cross_site_scripting_vulnerabilities_in_synology_download_station.html -https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html -https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html -https://www.securify.nl/advisory/SFY20180101/cross-site-scripting-vulnerability-in-zimbra-collaboration-suite-due-to-the-way-it-handles-attachment-links.html -https://www.securify.nl/en/advisory/SFY20180806/ivanti-workspace-control-application-whitelist-bypass-via-powergrid-_see-command-line-argument.html -https://www.securityevaluators.com/research/ -https://www.securitylab.ru/news/513051.php -https://www.securityweek.com/connectwise-confirms-screenconnect-flaw-under-active-exploitation/ -https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ -https://www.seebug.org/vuldb/ssvid-97939 -https://www.seebug.org/vuldb/ssvid-97952 -https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/ -https://www.seekurity.com/blog/general/metasploit-web-project-kill-all-running-tasks-csrf-CVE-2017-5244/ -https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ -https://www.seekurity.com/blog/general/reflected-xss-vulnerability-in-simplerisk/ -https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html -https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html -https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html -https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html -https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/ -https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ -https://www.sevenlayers.com/index.php/238-fuelcms-1-4-4-csrf -https://www.sevenlayers.com/index.php/243-cloudberry-backup-local-privilege-escalation -https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli -https://www.sevenlayers.com/index.php/266-hotel-and-lodge-management-system-1-0-sqli -https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/ -https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/ -https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapshot-path-traversal/ -https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/ -https://www.shielder.it/advisories/pfsense-remote-command-execution/ -https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/ -https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/ -https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/ -https://www.shielder.it/advisories/telegram-rlottie-blit-stack-buffer-overflow/ -https://www.shielder.it/advisories/telegram-rlottie-gray_split_cubic-stack-buffer-overflow/ -https://www.shielder.it/advisories/telegram-rlottie-lotcomplayeritem-lotcomplayeritem-type-confusion/ -https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-heap-buffer-overflow/ -https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-integer-overflow/ -https://www.shielder.it/advisories/telegram-rlottie-lottieparserimpl-parsedashproperty-heap-buffer-overflow/ -https://www.shielder.it/advisories/telegram-rlottie-vdasher-vdasher-type-confusion/ -https://www.shielder.it/advisories/telegram-rlottie-vgradientcache-generategradientcolortable-heap-buffer-overflow/ -https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/ -https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ -https://www.shielder.it/blog/mysql-and-cve-2020-11579-exploitation/ -https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/ -https://www.siberas.de/assets/papers/ssa-1705_IPSWITCH_SQLinjection.txt -https://www.sigsac.org/ccs/CCS2022/proceedings/ccs-proceedings.html -https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/ -https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf -https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Gigaset_Maxwell.pdf?_=1541431343 -https://www.slideshare.net/fuguet/bluediot-when-a-mature-and-immature-technology-mixes-becomes-an-idiot-situation-75529672 -https://www.slideshare.net/fuguet/smold-tv-old-smart -https://www.slideshare.net/secret/qrHwDOJ71eLg7f -https://www.somersetrecon.com/blog -https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ -https://www.soteritsecurity.com/blog/2023/01/CMS-Made-Simple_CVE-2021-40961.html -https://www.soteritsecurity.com/blog/2023/01/nostromo_from_directory_traversal_to_RCE.html -https://www.sourcecodester.com/sites/default/files/download/oretnom23/hrm.zip -https://www.spinics.net/lists/linux-bluetooth/msg68892.html -https://www.spinics.net/lists/linux-bluetooth/msg68898.html -https://www.spinics.net/lists/netdev/msg482523.html -https://www.sqlite.org/cgi/src/info/4374860b29383380 -https://www.sqlite.org/forum/forumpost/718c0a8d17 -https://www.sqlite.org/forum/forumpost/d9fce1a89b -https://www.sqlite.org/src/info/23439ea582241138 -https://www.sqlite.org/src/info/7a5279a25c57adf1 -https://www.sqlite.org/src/info/c8d3b9f0a750a529 -https://www.sqlite.org/src/info/cd708fa84d2aaaea -https://www.sqlite.org/src/tktview?name=8f157e8010 -https://www.surecloud.com/resources/blog/lorensbergs-connect2-cross-site-scripting -https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities -https://www.swascan.com/emerson -https://www.swascan.com/entando/ -https://www.swascan.com/it/security-advisory-proietti-planet-time-enterprise-cve-2022-30422/ -https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ -https://www.swascan.com/it/security-advisory-sme-up-erp/ -https://www.swascan.com/it/security-advisory-telenia-software-tvox/ -https://www.swascan.com/it/vulnerability-report-instant-developer/ -https://www.swascan.com/security-advisory-alt-n-security-gateway/ -https://www.swascan.com/security-advisory-docebo-community-edition/ -https://www.swascan.com/security-advisory-dolibarr-17-0-0/ -https://www.swascan.com/security-advisory-forma-lms/ -https://www.swascan.com/security-advisory-libnmap-2/ -https://www.swascan.com/security-advisory-solar-log/ -https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/ -https://www.swascan.com/security-advisory-yeastar-n412-and-n824-configuration-panel/ -https://www.swascan.com/solari-di-udine/ -https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt -https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37161-bulletin---underflow-in-udprxthread.pdf?rev=9395dad86d0b4811ae4a9e37f0568c2e&hash=3D8571C7A3DCC8B7D8DCB89C2DA4BB8D -https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it -https://www.synacktiv.com/posts/systems/icmp-reachable.html -https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle -https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-010.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-011.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-031.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-041.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-062.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-007.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-011.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-012.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-015.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-016.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-017.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-023.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-024.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-026.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-028.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-032.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-033.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-034.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-035.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-036.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-037.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-002.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-004.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-005.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-007.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-008.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-010.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-015.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-016.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-017.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-024.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-025.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-026.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-027.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-032.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-045.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-049.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-052.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-012.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-015.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-024.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-025.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-026.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-027.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-028.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-029.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-031.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-040.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-041.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-042.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-043.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-005.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-010.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-020.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-021.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-024.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-027.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-028.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-029.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-030.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-031.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-032.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-035.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-036.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-037.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-039.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-040.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-042.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-046.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-049.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-051.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-052.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-057.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-059.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-060.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-063.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-064.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-065.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-077.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-078.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-079.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-080.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-004.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-008.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-009.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-013.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-014.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-017.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-018.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-019.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-031.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-032.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-034.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-037.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-038.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-039.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-040.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-046.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-049.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-050.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-054.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-055.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-002.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-004.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-012.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-013.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-014.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-007.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-010.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt -https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SySS-2018-025.txt -https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0242 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0244 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0245 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0246 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0258 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0298 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0299 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0303 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0304 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0322 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0328 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0329 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0331 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0332 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0335 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0353 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0357 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0359 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0360 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0379 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0381 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0383 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0389 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0390 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0397 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0398 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0399 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0400 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0401 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0402 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0403 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0404 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0406 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0407 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0408 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0409 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0410 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0411 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0422 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0423 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0424 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0426 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0428 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0429 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0438 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0440 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0441 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0442 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0444 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0445 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0446 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0448 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0451 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0452 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0453 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0462 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0464 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0471 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0472 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0473 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0475 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0476 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0477 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0478 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0479 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0480 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0481 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0485 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0487 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0492 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0493 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0494 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0495 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0496 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0506 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0508 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0511 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0522 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0532 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0536 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0548 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0549 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0555 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0556 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0573 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0574 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0575 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0583 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0588 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0604 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0606 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0608 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0627 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0635 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0636 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0683 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0705 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0706 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0707 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0708 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0709 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0710 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0715 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0716 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0717 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0718 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0719 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0720 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0721 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0735 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0737 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0738 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0739 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0740 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0741 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0745 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0763 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0764 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0765 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0766 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0767 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0768 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0769 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0770 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0778 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0783 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0791 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0796 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0809 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0878 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1042 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1051 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1082 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1089 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1090 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1104 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1123 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1128 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1130 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1156 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1158 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1251 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1372 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1414 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1467 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1719 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1720 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1721 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1747 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842 -https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1890 -https://www.tarlogic.com/advisories/Tarlogic-2017-001.txt -https://www.tarlogic.com/advisories/Tarlogic-2017-002.txt -https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt -https://www.tarlogic.com/blog/fuzzing-yadifa-dns/ -https://www.tarlogic.com/blog/vulnerabilidades-en-tempobox/ -https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ -https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ -https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 -https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 -https://www.telekom.com/resource/blob/566546/276aaa2eab781729f2544d62edecf002/dl-190322-remote-buffer-overflow-in-a-axtls-data.pdf -https://www.tenable.com/blog/critical-drupal-core-vulnerability-what-you-need-to-know -https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of -https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 -https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils -https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability -https://www.tenable.com/plugins/nessus/133936 -https://www.tenable.com/plugins/was/113449 -https://www.tenable.com/security/research/tra-2015-02 -https://www.tenable.com/security/research/tra-2016-15 -https://www.tenable.com/security/research/tra-2016-17 -https://www.tenable.com/security/research/tra-2016-22 -https://www.tenable.com/security/research/tra-2016-23 -https://www.tenable.com/security/research/tra-2016-26 -https://www.tenable.com/security/research/tra-2016-27 -https://www.tenable.com/security/research/tra-2016-29 -https://www.tenable.com/security/research/tra-2016-30 -https://www.tenable.com/security/research/tra-2016-32 -https://www.tenable.com/security/research/tra-2016-33 -https://www.tenable.com/security/research/tra-2017-03 -https://www.tenable.com/security/research/tra-2017-05 -https://www.tenable.com/security/research/tra-2017-07 -https://www.tenable.com/security/research/tra-2017-08 -https://www.tenable.com/security/research/tra-2017-09 -https://www.tenable.com/security/research/tra-2017-10 -https://www.tenable.com/security/research/tra-2017-12 -https://www.tenable.com/security/research/tra-2017-13 -https://www.tenable.com/security/research/tra-2017-15 -https://www.tenable.com/security/research/tra-2017-16 -https://www.tenable.com/security/research/tra-2017-18 -https://www.tenable.com/security/research/tra-2017-19 -https://www.tenable.com/security/research/tra-2017-20 -https://www.tenable.com/security/research/tra-2017-21 -https://www.tenable.com/security/research/tra-2017-24 -https://www.tenable.com/security/research/tra-2017-28 -https://www.tenable.com/security/research/tra-2017-33 -https://www.tenable.com/security/research/tra-2017-34 -https://www.tenable.com/security/research/tra-2017-36 -https://www.tenable.com/security/research/tra-2018-02 -https://www.tenable.com/security/research/tra-2018-05 -https://www.tenable.com/security/research/tra-2018-07 -https://www.tenable.com/security/research/tra-2018-08 -https://www.tenable.com/security/research/tra-2018-10 -https://www.tenable.com/security/research/tra-2018-11 -https://www.tenable.com/security/research/tra-2018-14 -https://www.tenable.com/security/research/tra-2018-15 -https://www.tenable.com/security/research/tra-2018-21 -https://www.tenable.com/security/research/tra-2018-25 -https://www.tenable.com/security/research/tra-2018-31 -https://www.tenable.com/security/research/tra-2018-33 -https://www.tenable.com/security/research/tra-2018-34 -https://www.tenable.com/security/research/tra-2018-35 -https://www.tenable.com/security/research/tra-2018-36 -https://www.tenable.com/security/research/tra-2018-37 -https://www.tenable.com/security/research/tra-2018-38 -https://www.tenable.com/security/research/tra-2018-40 -https://www.tenable.com/security/research/tra-2018-41 -https://www.tenable.com/security/research/tra-2018-43 -https://www.tenable.com/security/research/tra-2018-46 -https://www.tenable.com/security/research/tra-2018-47 -https://www.tenable.com/security/research/tra-2018-48 -https://www.tenable.com/security/research/tra-2019-02 -https://www.tenable.com/security/research/tra-2019-03 -https://www.tenable.com/security/research/tra-2019-07 -https://www.tenable.com/security/research/tra-2019-08 -https://www.tenable.com/security/research/tra-2019-09 -https://www.tenable.com/security/research/tra-2019-14 -https://www.tenable.com/security/research/tra-2019-16 -https://www.tenable.com/security/research/tra-2019-17 -https://www.tenable.com/security/research/tra-2019-20 -https://www.tenable.com/security/research/tra-2019-27 -https://www.tenable.com/security/research/tra-2019-29 -https://www.tenable.com/security/research/tra-2019-31 -https://www.tenable.com/security/research/tra-2019-32 -https://www.tenable.com/security/research/tra-2019-34 -https://www.tenable.com/security/research/tra-2019-35 -https://www.tenable.com/security/research/tra-2019-36 -https://www.tenable.com/security/research/tra-2019-37 -https://www.tenable.com/security/research/tra-2019-40 -https://www.tenable.com/security/research/tra-2019-42 -https://www.tenable.com/security/research/tra-2019-43 -https://www.tenable.com/security/research/tra-2019-44 -https://www.tenable.com/security/research/tra-2019-46 -https://www.tenable.com/security/research/tra-2019-48 -https://www.tenable.com/security/research/tra-2019-53 -https://www.tenable.com/security/research/tra-2020-01 -https://www.tenable.com/security/research/tra-2020-03 -https://www.tenable.com/security/research/tra-2020-04 -https://www.tenable.com/security/research/tra-2020-05 -https://www.tenable.com/security/research/tra-2020-06 -https://www.tenable.com/security/research/tra-2020-07 -https://www.tenable.com/security/research/tra-2020-09 -https://www.tenable.com/security/research/tra-2020-12 -https://www.tenable.com/security/research/tra-2020-15 -https://www.tenable.com/security/research/tra-2020-16 -https://www.tenable.com/security/research/tra-2020-17 -https://www.tenable.com/security/research/tra-2020-19 -https://www.tenable.com/security/research/tra-2020-20 -https://www.tenable.com/security/research/tra-2020-22 -https://www.tenable.com/security/research/tra-2020-24 -https://www.tenable.com/security/research/tra-2020-25 -https://www.tenable.com/security/research/tra-2020-28 -https://www.tenable.com/security/research/tra-2020-29 -https://www.tenable.com/security/research/tra-2020-31 -https://www.tenable.com/security/research/tra-2020-32 -https://www.tenable.com/security/research/tra-2020-34 -https://www.tenable.com/security/research/tra-2020-35 -https://www.tenable.com/security/research/tra-2020-37 -https://www.tenable.com/security/research/tra-2020-41 -https://www.tenable.com/security/research/tra-2020-42 -https://www.tenable.com/security/research/tra-2020-43 -https://www.tenable.com/security/research/tra-2020-43-0 -https://www.tenable.com/security/research/tra-2020-44-0 -https://www.tenable.com/security/research/tra-2020-46 -https://www.tenable.com/security/research/tra-2020-47 -https://www.tenable.com/security/research/tra-2020-48 -https://www.tenable.com/security/research/tra-2020-49 -https://www.tenable.com/security/research/tra-2020-51 -https://www.tenable.com/security/research/tra-2020-53 -https://www.tenable.com/security/research/tra-2020-55 -https://www.tenable.com/security/research/tra-2020-56 -https://www.tenable.com/security/research/tra-2020-57 -https://www.tenable.com/security/research/tra-2020-58 -https://www.tenable.com/security/research/tra-2020-59 -https://www.tenable.com/security/research/tra-2020-60 -https://www.tenable.com/security/research/tra-2020-61 -https://www.tenable.com/security/research/tra-2020-62 -https://www.tenable.com/security/research/tra-2020-63 -https://www.tenable.com/security/research/tra-2020-66 -https://www.tenable.com/security/research/tra-2020-67 -https://www.tenable.com/security/research/tra-2020-67,https://docs.druva.com/001_inSync_Cloud/Cloud/010_Release_Details/010_inSync_Cloud_Updates -https://www.tenable.com/security/research/tra-2020-71 -https://www.tenable.com/security/research/tra-2021-04 -https://www.tenable.com/security/research/tra-2021-06 -https://www.tenable.com/security/research/tra-2021-07 -https://www.tenable.com/security/research/tra-2021-10 -https://www.tenable.com/security/research/tra-2021-11 -https://www.tenable.com/security/research/tra-2021-13 -https://www.tenable.com/security/research/tra-2021-14 -https://www.tenable.com/security/research/tra-2021-18 -https://www.tenable.com/security/research/tra-2021-22 -https://www.tenable.com/security/research/tra-2021-24 -https://www.tenable.com/security/research/tra-2021-26-0 -https://www.tenable.com/security/research/tra-2021-41 -https://www.tenable.com/security/research/tra-2021-42 -https://www.tenable.com/security/research/tra-2021-44 -https://www.tenable.com/security/research/tra-2021-45 -https://www.tenable.com/security/research/tra-2021-48 -https://www.tenable.com/security/research/tra-2021-51 -https://www.tenable.com/security/research/tra-2021-54 -https://www.tenable.com/security/research/tra-2021-55 -https://www.tenable.com/security/research/tra-2022-05 -https://www.tenable.com/security/research/tra-2022-07 -https://www.tenable.com/security/research/tra-2022-14 -https://www.tenable.com/security/research/tra-2022-17 -https://www.tenable.com/security/research/tra-2022-21 -https://www.tenable.com/security/research/tra-2022-29 -https://www.tenable.com/security/research/tra-2022-31 -https://www.tenable.com/security/research/tra-2022-32 -https://www.tenable.com/security/research/tra-2022-33 -https://www.tenable.com/security/research/tra-2022-34 -https://www.tenable.com/security/research/tra-2023-11 -https://www.tenable.com/security/research/tra-2023-17 -https://www.tenable.com/security/research/tra-2023-18 -https://www.tenable.com/security/research/tra-2023-19 -https://www.tenable.com/security/research/tra-2023-2 -https://www.tenable.com/security/research/tra-2023-20, -https://www.tenable.com/security/research/tra-2023-21 -https://www.tenable.com/security/research/tra-2023-23 -https://www.tenable.com/security/research/tra-2023-24 -https://www.tenable.com/security/research/tra-2023-3 -https://www.tenable.com/security/research/tra-2023-31 -https://www.tenable.com/security/research/tra-2023-32 -https://www.tenable.com/security/research/tra-2023-35 -https://www.tenable.com/security/research/tra-2023-37 -https://www.tenable.com/security/research/tra-2023-39 -https://www.tenable.com/security/research/tra-2023-40 -https://www.tenable.com/security/research/tra-2023-5 -https://www.tenable.com/security/research/tra-2023-7 -https://www.tenable.com/security/research/tra-2023-8 -https://www.tenable.com/security/research/tra-2024-02 -https://www.tenable.com/security/research/tra-2024-05 -https://www.tenable.com/security/research/tra-2024-07 -https://www.tenable.com/security/research/tra-2024-09 -https://www.tenable.com/security/research/tra-2024-13 -https://www.tenable.com/security/research/tra-2024-14 -https://www.tenable.com/security/research/tra-2024-16 -https://www.tenable.com/security/research/tra-227-43 -https://www.tenable.com/security/tns-2016-11 -https://www.tenable.com/security/tns-2016-17 -https://www.tenable.com/security/tns-2016-19 -https://www.tenable.com/security/tns-2017-01 -https://www.tenable.com/security/tns-2017-10 -https://www.tenable.com/security/tns-2017-14 -https://www.tenable.com/security/tns-2017-15 -https://www.tenable.com/security/tns-2018-01 -https://www.tenable.com/security/tns-2018-03 -https://www.tenable.com/security/tns-2018-04 -https://www.tenable.com/security/tns-2018-05 -https://www.tenable.com/security/tns-2018-06 -https://www.tenable.com/security/tns-2018-07 -https://www.tenable.com/security/tns-2018-11 -https://www.tenable.com/security/tns-2018-16 -https://www.tenable.com/security/tns-2018-17 -https://www.tenable.com/security/tns-2019-04 -https://www.tenable.com/security/tns-2019-05 -https://www.tenable.com/security/tns-2019-06 -https://www.tenable.com/security/tns-2019-08 -https://www.tenable.com/security/tns-2020-02 -https://www.tenable.com/security/tns-2020-04 -https://www.tenable.com/security/tns-2020-05 -https://www.tenable.com/security/tns-2020-06 -https://www.tenable.com/security/tns-2020-07 -https://www.tenable.com/security/tns-2020-08 -https://www.tenable.com/security/tns-2020-09 -https://www.tenable.com/security/tns-2020-10 -https://www.tenable.com/security/tns-2020-11 -https://www.tenable.com/security/tns-2021-01 -https://www.tenable.com/security/tns-2021-02 -https://www.tenable.com/security/tns-2021-03 -https://www.tenable.com/security/tns-2021-05 -https://www.tenable.com/security/tns-2021-06 -https://www.tenable.com/security/tns-2021-07 -https://www.tenable.com/security/tns-2021-09 -https://www.tenable.com/security/tns-2021-10 -https://www.tenable.com/security/tns-2021-13 -https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/ -https://www.theregister.co.uk/2018/02/06/openvms_vulnerability/ -https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ -https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ -https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/ -https://www.theregister.com/2022/03/25/honda_civic_hack/ -https://www.theregister.com/2023/10/02/ws_ftp_update/ -https://www.theregister.com/2023/12/20/terrapin_attack_ssh -https://www.theverge.com/2017/11/16/16665064/amazon-key-camera-disable -https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf -https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html -https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8131/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-long-lasting-token-vulnerability -https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/ -https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver -https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904 -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-stored-xss-to-rce-using-beef-and-elfinder-cve-2021-45919/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hunting-for-android-privilege-escalation-with-a-32-line-fuzzer/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/magic-home-pro-mobile-application-authentication-bypass-cve-2020-27199/ -https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/servicenow-username-enumeration-vulnerability-cve-2021-45901/ -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18738 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18896 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18986 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=22113 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26165 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29000 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29172 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29174 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29176 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29225 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29235 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=30693 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797 -https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=32305 -https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-006.txt -https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-007_Xiaomi_Redmi_10sNote-1.txt -https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-001_kyocera-v2.txt -https://www.tuv.com/landingpage/de/schwachstelle/ -https://www.tuv.com/landingpage/en/vulnerability-disclosure/ -https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce -https://www.usenix.org/system/files/sec20-zhang-yue.pdf -https://www.usenix.org/system/files/woot20-paper-obermaier.pdf -https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/ -https://www.vaadata.com/blog/hardcoded-secret-leads-to-account-takeover/ -https://www.valbrux.it/blog/2019/01/22/cve-2018-13042-1password-android-7-0-denial-of-service/ -https://www.vdoo.com/blog/cve-2020-25860-significant-vulnerability-discovered-rauc-embedded-firmware-update-framework -https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day -https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp -https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ -https://www.veracode.com/blog/research/anatomy-cross-site-scripting-flaw-telerik-reporting-module -https://www.vfxcomputing.com/?CVE-2018-19588 -https://www.vfxcomputing.com/?CVE-2019-9657 -https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/ -https://www.vicarius.io/vsociety/posts/shadowray-cve-2023-48022-exploit -https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094 -https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims -https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/ -https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html -https://www.vulnerability-lab.com/get_content.php?id=1373 -https://www.vulnerability-lab.com/get_content.php?id=144 -https://www.vulnerability-lab.com/get_content.php?id=1600 -https://www.vulnerability-lab.com/get_content.php?id=1608 -https://www.vulnerability-lab.com/get_content.php?id=1725 -https://www.vulnerability-lab.com/get_content.php?id=1729 -https://www.vulnerability-lab.com/get_content.php?id=1771 -https://www.vulnerability-lab.com/get_content.php?id=1808 -https://www.vulnerability-lab.com/get_content.php?id=1819 -https://www.vulnerability-lab.com/get_content.php?id=1835 -https://www.vulnerability-lab.com/get_content.php?id=1836 -https://www.vulnerability-lab.com/get_content.php?id=1839 -https://www.vulnerability-lab.com/get_content.php?id=1907 -https://www.vulnerability-lab.com/get_content.php?id=1922 -https://www.vulnerability-lab.com/get_content.php?id=1927 -https://www.vulnerability-lab.com/get_content.php?id=1940 -https://www.vulnerability-lab.com/get_content.php?id=1941 -https://www.vulnerability-lab.com/get_content.php?id=1943 -https://www.vulnerability-lab.com/get_content.php?id=1990 -https://www.vulnerability-lab.com/get_content.php?id=1997 -https://www.vulnerability-lab.com/get_content.php?id=2000 -https://www.vulnerability-lab.com/get_content.php?id=2005 -https://www.vulnerability-lab.com/get_content.php?id=2006 -https://www.vulnerability-lab.com/get_content.php?id=2029 -https://www.vulnerability-lab.com/get_content.php?id=2030 -https://www.vulnerability-lab.com/get_content.php?id=2033 -https://www.vulnerability-lab.com/get_content.php?id=2035 -https://www.vulnerability-lab.com/get_content.php?id=2043 -https://www.vulnerability-lab.com/get_content.php?id=2061 -https://www.vulnerability-lab.com/get_content.php?id=2062 -https://www.vulnerability-lab.com/get_content.php?id=2064 -https://www.vulnerability-lab.com/get_content.php?id=2067 -https://www.vulnerability-lab.com/get_content.php?id=2071 -https://www.vulnerability-lab.com/get_content.php?id=2072 -https://www.vulnerability-lab.com/get_content.php?id=2073 -https://www.vulnerability-lab.com/get_content.php?id=2074 -https://www.vulnerability-lab.com/get_content.php?id=2076 -https://www.vulnerability-lab.com/get_content.php?id=2094 -https://www.vulnerability-lab.com/get_content.php?id=2097 -https://www.vulnerability-lab.com/get_content.php?id=2102 -https://www.vulnerability-lab.com/get_content.php?id=2110 -https://www.vulnerability-lab.com/get_content.php?id=2113 -https://www.vulnerability-lab.com/get_content.php?id=2121 -https://www.vulnerability-lab.com/get_content.php?id=2122 -https://www.vulnerability-lab.com/get_content.php?id=2123 -https://www.vulnerability-lab.com/get_content.php?id=2158 -https://www.vulnerability-lab.com/get_content.php?id=2168 -https://www.vulnerability-lab.com/get_content.php?id=2171 -https://www.vulnerability-lab.com/get_content.php?id=2175 -https://www.vulnerability-lab.com/get_content.php?id=2183 -https://www.vulnerability-lab.com/get_content.php?id=2184 -https://www.vulnerability-lab.com/get_content.php?id=2186 -https://www.vulnerability-lab.com/get_content.php?id=2188 -https://www.vulnerability-lab.com/get_content.php?id=2189 -https://www.vulnerability-lab.com/get_content.php?id=2194 -https://www.vulnerability-lab.com/get_content.php?id=2195 -https://www.vulnerability-lab.com/get_content.php?id=2196 -https://www.vulnerability-lab.com/get_content.php?id=2198 -https://www.vulnerability-lab.com/get_content.php?id=2199 -https://www.vulnerability-lab.com/get_content.php?id=2200 -https://www.vulnerability-lab.com/get_content.php?id=2201 -https://www.vulnerability-lab.com/get_content.php?id=2203 -https://www.vulnerability-lab.com/get_content.php?id=2204 -https://www.vulnerability-lab.com/get_content.php?id=2205 -https://www.vulnerability-lab.com/get_content.php?id=2206 -https://www.vulnerability-lab.com/get_content.php?id=2207 -https://www.vulnerability-lab.com/get_content.php?id=2208 -https://www.vulnerability-lab.com/get_content.php?id=2209 -https://www.vulnerability-lab.com/get_content.php?id=2210 -https://www.vulnerability-lab.com/get_content.php?id=2211 -https://www.vulnerability-lab.com/get_content.php?id=2212 -https://www.vulnerability-lab.com/get_content.php?id=2215 -https://www.vulnerability-lab.com/get_content.php?id=2216 -https://www.vulnerability-lab.com/get_content.php?id=2217 -https://www.vulnerability-lab.com/get_content.php?id=2219 -https://www.vulnerability-lab.com/get_content.php?id=2231 -https://www.vulnerability-lab.com/get_content.php?id=2236 -https://www.vulnerability-lab.com/get_content.php?id=2241 -https://www.vulnerability-lab.com/get_content.php?id=2244 -https://www.vulnerability-lab.com/get_content.php?id=2248 -https://www.vulnerability-lab.com/get_content.php?id=2249 -https://www.vulnerability-lab.com/get_content.php?id=2257 -https://www.vulnerability-lab.com/get_content.php?id=2258 -https://www.vulnerability-lab.com/get_content.php?id=2259 -https://www.vulnerability-lab.com/get_content.php?id=2274 -https://www.vulnerability-lab.com/get_content.php?id=2276 -https://www.vulnerability-lab.com/get_content.php?id=2278 -https://www.vulnerability-lab.com/get_content.php?id=2285 -https://www.vulnerability-lab.com/get_content.php?id=2286 -https://www.vulnerability-lab.com/get_content.php?id=2317 -https://www.vulnerability-lab.com/get_content.php?id=2321 -https://www.vulnerability-lab.com/get_content.php?id=2323 -https://www.vulnerability-lab.com/get_content.php?id=558 -https://www.vulnerability-lab.com/get_content.php?id=702 -https://www.vusec.net/projects/ghostrace/ -https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914 -https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf -https://www.westerndigital.com/support/productsecurity -https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd -https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-s -https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd -https://www.westerndigital.com/support/productsecurity/wdc-19009-sandisk-and-western-digital-ssd-dashboard-vulnerabilities -https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-portal-websites-clickjacking-vulnerability -https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-websites-2-2-0 -https://www.westerndigital.com/support/productsecurity/wdc-19013-my-cloud-home-and-ibi-session-invalidation-vulnerability -https://www.westerndigital.com/support/productsecurity/wdc-20001-ssd-dashboard-setup-privilege-escalation -https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-site-version-2-2-0-134 -https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-xss-vulnerability -https://www.westerndigital.com/support/productsecurity/wdc-20004-wd-discovery-cross-site-request-forgery-csrf -https://www.westerndigital.com/support/productsecurity/wdc-20005-wd-discovery-remote-command-execution-vulnerability -https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 -https://www.westerndigital.com/support/productsecurity/wdc-20008-replay-attack-vulnerabilities-rpmb-protocol-applications -https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 -https://www.westerndigital.com/support/productsecurity/wdc-20010-my-cloud-os5-firmware-5-07-118 -https://www.westerndigital.com/support/productsecurity/wdc-20011-western-digital-dashboard-privilege-escalation -https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122 -https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability -https://www.westerndigital.com/support/productsecurity/wdc-21007-edgerover-windows-app-ver-0-25 -https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo -https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock -https://www.whitehats.nl/blog/xml-signature-wrapping-samlify -https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24338 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24339 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24366 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25917 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25919 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25922 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25923 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25932 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25934 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25938 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25940 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25944 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25960 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25965 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25968 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25988 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25989 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992 -https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994 -https://www.willsroot.io/2022/01/cve-2022-0185.html -https://www.willsroot.io/2022/12/entrybleed.html -https://www.wired.com/story/amazon-key-flaw-let-deliverymen-disable-your-camera/ -https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/ -https://www.wizcase.com/blog/hack-2018/ -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-005 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-002 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-004 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-005 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-006 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-008 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-009 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-010 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-011 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-012 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-004 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2023-004 -https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002 -https://www.wordfence.com/blog/2016/05/jetpack-vulnerability/ -https://www.wordfence.com/blog/2016/06/vulnerability-ewww-image-optimizer/ -https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/ -https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild/ -https://www.wordfence.com/blog/2019/04/zero-day-vulnerability-in-yellow-pencil-visual-theme-customizer-exploited-in-the-wild/ -https://www.wordfence.com/blog/2019/11/high-severity-vulnerability-patched-in-wp-maintenance-plugin/ -https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ -https://www.wordfence.com/blog/2020/02/multiple-vulnerabilities-patched-in-pricing-table-by-supsystic-plugin/ -https://www.wordfence.com/blog/2020/03/vulnerability-patched-in-import-export-wordpress-users/ -https://www.wordfence.com/blog/2020/03/zero-day-vulnerability-in-themerex-addons-now-patched/ -https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/ -https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ -https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ -https://www.wordfence.com/blog/2020/07/2-million-users-affected-by-vulnerability-in-all-in-one-seo-pack/ -https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ -https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ -https://www.wordfence.com/blog/2020/08/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder/ -https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/ -https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/ -https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild -https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/ -https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/ -https://www.wordfence.com/blog/2023/03/vulnerability-patched-in-cozmolabs-profile-builder-plugin-information-disclosure-leads-to-account-takeover/ -https://www.wordfence.com/threat-intel/vulnerabilities/id/09f2cb22-07e2-4fe5-8c2a-9d4420ee26ed?source=cve -https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=cve -https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve -https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve -https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve -https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve -https://www.wpsecurityauditlog.com/plugin-change-log/ -https://www.x41-dsec.de/lab/advisories/x41-2016-001-libotr/ -https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ -https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/ -https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/ -https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/ -https://www.x41-dsec.de/lab/advisories/x41-2020-006-bspatch/ -https://www.x41-dsec.de/lab/advisories/x41-2021-001-yara/ -https://www.x41-dsec.de/lab/advisories/x41-2021-003-telenot-complex-insecure-keygen/ -https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense -https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Android.pdf -https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/ -https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-aanderaa-psa-2021-003.pdf -https://www.youtube.com/watch?v=-7YIzYtWhzM -https://www.youtube.com/watch?v=-WXWqNBEQQc -https://www.youtube.com/watch?v=-cw04rOYREQ -https://www.youtube.com/watch?v=0lngc_zPTSg -https://www.youtube.com/watch?v=1mSXzzwcGMM -https://www.youtube.com/watch?v=2k7e9E0Cw0Y -https://www.youtube.com/watch?v=4WJqcseH5qk -https://www.youtube.com/watch?v=5z_PEZ5PyeA -https://www.youtube.com/watch?v=6dAWGH0-6TY -https://www.youtube.com/watch?v=6iZnIQbRf5M -https://www.youtube.com/watch?v=88qeaLq98Gc -https://www.youtube.com/watch?v=8GZg1IuSfCs -https://www.youtube.com/watch?v=9c9Q4VZQOUk -https://www.youtube.com/watch?v=B0VpK0poTco -https://www.youtube.com/watch?v=BOPLYnveBqk -https://www.youtube.com/watch?v=Bgdbx5TJShI -https://www.youtube.com/watch?v=CLAHE0qUHXs -https://www.youtube.com/watch?v=DMxucOWfLPc -https://www.youtube.com/watch?v=DjMEfQW3bf0 -https://www.youtube.com/watch?v=ECTu2QVAl1c -https://www.youtube.com/watch?v=FM5XlZPdvdo -https://www.youtube.com/watch?v=Grirez2xeas -https://www.youtube.com/watch?v=HUM5myJWbvc -https://www.youtube.com/watch?v=I93aH86BUaE -https://www.youtube.com/watch?v=Iw8sIBLWE_w -https://www.youtube.com/watch?v=KtDjoJlrpAc -https://www.youtube.com/watch?v=La9nMeVCtt4 -https://www.youtube.com/watch?v=MF9lrh1kpDs -https://www.youtube.com/watch?v=MK9AvoJDtxY -https://www.youtube.com/watch?v=MVCe_zYtFsQ -https://www.youtube.com/watch?v=MdIT4mPTX3s -https://www.youtube.com/watch?v=PeNOJORAQsQ -https://www.youtube.com/watch?v=PlVbPIs75D4 -https://www.youtube.com/watch?v=RHaMx8K1GeM -https://www.youtube.com/watch?v=RIyZLeKEC8E -https://www.youtube.com/watch?v=RWw1UTeZee8 -https://www.youtube.com/watch?v=Rcl6VWg_bPY -https://www.youtube.com/watch?v=Ryuz1gymiw8 -https://www.youtube.com/watch?v=SkTKt1nV57I -https://www.youtube.com/watch?v=SonmmgQlLzg -https://www.youtube.com/watch?v=TRTpRlkU3Hc -https://www.youtube.com/watch?v=Txp6IwR24jY -https://www.youtube.com/watch?v=VAlbkvOm_DU -https://www.youtube.com/watch?v=VYKsfgox-bs -https://www.youtube.com/watch?v=X1PY7kMFkVg -https://www.youtube.com/watch?v=Xy9_hmpvvA4&ab_channel=0ta -https://www.youtube.com/watch?v=ZA7R001kE2w -https://www.youtube.com/watch?v=ZqqR89vzZ_I -https://www.youtube.com/watch?v=_ha7XBT_Omo -https://www.youtube.com/watch?v=aPKPUDmmYpc -https://www.youtube.com/watch?v=b5vPDmMtzwQ -https://www.youtube.com/watch?v=bIFot3a-58I -https://www.youtube.com/watch?v=c0nawqA_bdI -https://www.youtube.com/watch?v=eHG1pWaez9w -https://www.youtube.com/watch?v=efmvL235S-8 -https://www.youtube.com/watch?v=ev0VXbiduuQ -https://www.youtube.com/watch?v=fkESBVhIdIA -https://www.youtube.com/watch?v=gnSMrvV5e9w -https://www.youtube.com/watch?v=jZr2JhDd_S8 -https://www.youtube.com/watch?v=kAeJvY6BBps -https://www.youtube.com/watch?v=kCqAVYyahLc -https://www.youtube.com/watch?v=kiLfSvc1SYY -https://www.youtube.com/watch?v=l08DHB08Gow -https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta -https://www.youtube.com/watch?v=m8nW0p69UHU -https://www.youtube.com/watch?v=nGyS2Rp5aEo -https://www.youtube.com/watch?v=oSJscEei5SE&app=desktop -https://www.youtube.com/watch?v=oZXGwC7PWYE -https://www.youtube.com/watch?v=pQS1GdQ3CBc -https://www.youtube.com/watch?v=rNQn--9xR1Q -https://www.youtube.com/watch?v=sIONzwQAngU -https://www.youtube.com/watch?v=sT1cvbu7ZTA -https://www.youtube.com/watch?v=t3nYuhAHOMg -https://www.youtube.com/watch?v=vOb9Fyg3iVo -https://www.youtube.com/watch?v=vsg9YgvGBec -https://www.youtube.com/watch?v=wwHuXfYS8yQ -https://www.youtube.com/watch?v=x-r4lnWPdzY -https://www.youtube.com/watch?v=x-u3eS8-xJg -https://www.youtube.com/watch?v=xYRbXBPubaw -https://www.youtube.com/watch?v=xkdPjbaLngE -https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation -https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler -https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/ -https://www.zdnet.com/article/new-cold-boot-attack-affects-seven-years-of-lg-android-smartphones/ -https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/ -https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/ -https://www.zdnet.com/article/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/ -https://www.zeroscience.mk/en/vulnerabilities -https://www.zeroscience.mk/en/vulnerabilities/ -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5491.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5497.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5515.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5530.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5541.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5544.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5549.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5556.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5562.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5627.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5633.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5634.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5648.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5649.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5651.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5682.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5683.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5685.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5688.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5699.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5700.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5702.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5703.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5704.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5706.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5709.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5720.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5743.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php -https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php -https://www2.deloitte.com/de/de/pages/risk/articles/arxes-tolina-csv-injection.html -https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt -https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ -https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-google-io-2017-android-app/ -https://x-c3ll.github.io -https://x-c3ll.github.io/cves.html -https://x-c3ll.github.io/posts/CVE-2018-7081-RCE-ArubaOS/ -https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/ -https://x1ng.top/2021/10/14/ASUS%E6%A0%88%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ -https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/ -https://xenbits.xen.org/xsa/advisory-241.html -https://xiaodaozhi.com/exploit/117.html -https://xitan.me/posts/connect-box-ch7465lg-rce/ -https://xn--sb-lka.org/cve/INSMA.txt -https://y-security.de/news-en/reminder-for-jira-cross-site-scripting-cve-2023-30453/index.html -https://yadi.sk/i/YdfXr-ofAN2ZWA -https://yadi.sk/i/iIUCJVaGEuSaAw -https://yadi.sk/i/jXV87yn4ZJfSHA -https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/ -https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/ -https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ -https://yoursecuritybores.me/coreftp-vulnerabilities/ -https://youtu.be/-i2KtBgO3Kw -https://youtu.be/3If-Fqwx-4s -https://youtu.be/5oVfJHT_-Ys -https://youtu.be/7bh2BQOqxFo -https://youtu.be/AMODp3iTnqY -https://youtu.be/AeuGjMbAirU -https://youtu.be/B75C13Zw35Y -https://youtu.be/D45FN8QrzDo -https://youtu.be/GOMLavacqSI -https://youtu.be/LQy0_xIK2q0 -https://youtu.be/OpC6neWd2aM -https://youtu.be/VGNEYWR9MgY -https://youtu.be/W0THXbcX5V8 -https://youtu.be/WIeWeuXbkiY -https://youtu.be/WW_a3znugl0 -https://youtu.be/Xc6Jg9I7Pj4 -https://youtu.be/Xh6LPCiLMa8 -https://youtu.be/cPhYW5FzA9A -https://youtu.be/cSileV8YbsQ?t=1028 -https://youtu.be/cSileV8YbsQ?t=655 -https://youtu.be/ffvKH3gwyRE -https://youtu.be/ouwud0PlHkE -https://youtu.be/qCvEXwyaF5U -https://youtu.be/t5K745dBsT0 -https://youtu.be/wFwlbXANRCo -https://youtu.be/yCadG38yZW8 -https://ysec.ch/?p=94 -https://yuyudhn.github.io/CVE-2022-46071/ -https://yuyudhn.github.io/CVE-2022-46072/ -https://yuyudhn.github.io/CVE-2022-46073/ -https://yuyudhn.github.io/CVE-2022-46074/ -https://yuyudhn.github.io/CVE-2022-46443/ -https://yuyudhn.github.io/CVE-2023-24320/ -https://yuyudhn.github.io/pos-codekop-vulnerability/ -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85 -https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86 -https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/ -https://zhhhy.github.io/2019/06/28/zzzcms/ -https://zigrin.com/advisories/misp-bruteforce-protection-not-working-in-very-specific-environments/ -https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/ -https://zigrin.com/advisories/misp-reflected-xss-in-galaxy-view/ -https://zigrin.com/advisories/misp-xss-with-cortex-type-attributes/ -https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/ +CVE-2000-0045 - http://www.securityfocus.com/bid/926 +CVE-2000-0052 - http://www.l0pht.com/advisories/pam_advisory +CVE-2000-0119 - http://marc.info/?l=bugtraq&m=94936267131123&w=2 +CVE-2000-0219 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2000-0275 - http://www.l0pht.com/advisories/cc-pinextract.txt +CVE-2000-0342 - http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 +CVE-2000-0359 - http://www.securityfocus.com/bid/1248 +CVE-2000-0384 - http://www.l0pht.com/advisories/ipivot7180.html +CVE-2000-0405 - http://www.l0pht.com/advisories/asniff_advisory.txt +CVE-2000-0427 - http://www.l0pht.com/advisories/etoken-piepa.txt +CVE-2000-0428 - http://www.nai.com/nai_labs/asp_set/advisory/39_Trend.asp +CVE-2000-0455 - http://www.nai.com/nai_labs/asp_set/advisory/41initialized.asp +CVE-2000-0500 - http://marc.info/?l=bugtraq&m=96161462915381&w=2 +CVE-2000-0538 - http://marc.info/?l=bugtraq&m=96045469627806&w=2 +CVE-2000-0613 - http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml +CVE-2000-0622 - http://www.nai.com/research/covert/advisories/043.asp +CVE-2000-0625 - http://www.l0pht.com/advisories/netzero.txt +CVE-2000-0632 - http://www.nai.com/nai_labs/asp_set/advisory/43_Advisory.asp +CVE-2000-0635 - http://www.zdnet.com/zdnn/stories/news/0,4586,2600258,00.html +CVE-2000-0673 - http://www.nai.com/research/covert/advisories/044.asp +CVE-2000-0778 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A927 +CVE-2000-0867 - http://www.redhat.com/support/errata/RHSA-2000-061.html +CVE-2000-0892 - http://www.kb.cert.org/vuls/id/22404 +CVE-2000-0979 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A996 +CVE-2000-1034 - http://www.securityfocus.com/bid/1899 +CVE-2000-1049 - http://marc.info/?l=bugtraq&m=97310314724964&w=2 +CVE-2000-1050 - http://marc.info/?l=bugtraq&m=97236316510117&w=2 +CVE-2000-1053 - http://marc.info/?l=bugtraq&m=97236125107957&w=2 +CVE-2000-1079 - http://www.nai.com/research/covert/advisories/045.asp +CVE-2000-1081 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 +CVE-2000-1082 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 +CVE-2000-1083 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 +CVE-2000-1084 - http://marc.info/?l=bugtraq&m=97570878710037&w=2 +CVE-2000-1085 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 +CVE-2000-1086 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 +CVE-2000-1087 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 +CVE-2000-1088 - http://marc.info/?l=bugtraq&m=97570884410184&w=2 +CVE-2000-1103 - http://www.securityfocus.com/archive/1/147120 +CVE-2000-1196 - http://packetstormsecurity.org/0004-exploits/ooo1.txt +CVE-2000-1207 - http://marc.info/?l=bugtraq&m=97034397026473&w=2 +CVE-2000-1216 - http://www.kb.cert.org/vuls/id/433499 +CVE-2000-1220 - http://www.l0pht.com/advisories/lpd_advisory +CVE-2000-1221 - http://www.l0pht.com/advisories/lpd_advisory +CVE-2001-0002 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A920 +CVE-2001-0010 - http://www.nai.com/research/covert/advisories/047.asp +CVE-2001-0011 - http://www.nai.com/research/covert/advisories/047.asp +CVE-2001-0012 - http://www.nai.com/research/covert/advisories/047.asp +CVE-2001-0013 - http://www.nai.com/research/covert/advisories/047.asp +CVE-2001-0115 - http://marc.info/?l=bugtraq&m=97934312727101&w=2 +CVE-2001-0134 - http://marc.info/?l=bugtraq&m=97967435023835&w=2 +CVE-2001-0151 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A90 +CVE-2001-0241 - http://marc.info/?l=bugtraq&m=98874912915948&w=2 +CVE-2001-0247 - http://www.nai.com/research/covert/advisories/048.asp +CVE-2001-0248 - http://www.nai.com/research/covert/advisories/048.asp +CVE-2001-0249 - http://www.nai.com/research/covert/advisories/048.asp +CVE-2001-0323 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2001-0328 - http://securityreason.com/securityalert/57 +CVE-2001-0341 - http://marc.info/?l=bugtraq&m=99348216322147&w=2 +CVE-2001-0414 - http://marc.info/?l=bugtraq&m=98642418618512&w=2 +CVE-2001-0441 - http://www.redhat.com/support/errata/RHSA-2001-028.html +CVE-2001-0464 - http://marc.info/?l=bugtraq&m=98761402029302&w=2 +CVE-2001-0465 - http://www.turbotax.com/atr/update/ +CVE-2001-0486 - http://marc.info/?l=bugtraq&m=98865027328391&w=2 +CVE-2001-0498 - http://www.nai.com/research/covert/advisories/049.asp +CVE-2001-0499 - http://www.nai.com/research/covert/advisories/050.asp +CVE-2001-0507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A909 +CVE-2001-0507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A912 +CVE-2001-0515 - http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf +CVE-2001-0516 - http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf +CVE-2001-0517 - http://otn.oracle.com/deploy/security/pdf/net8_dos_alert.pdf +CVE-2001-0548 - http://marc.info/?l=bugtraq&m=99598918914068&w=2 +CVE-2001-0550 - http://marc.info/?l=bugtraq&m=100700363414799&w=2 +CVE-2001-0554 - http://www.redhat.com/support/errata/RHSA-2001-099.html +CVE-2001-0557 - https://exchange.xforce.ibmcloud.com/vulnerabilities/6513 +CVE-2001-0652 - http://marc.info/?l=bugtraq&m=99745571104126&w=2 +CVE-2001-0685 - http://marc.info/?l=bugtraq&m=98339581702282&w=2 +CVE-2001-0727 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A921 +CVE-2001-0740 - http://marc.info/?l=bugtraq&m=100119572524232&w=2 +CVE-2001-0820 - http://marc.info/?l=bugtraq&m=99406263214417&w=2 +CVE-2001-0836 - http://marc.info/?l=bugtraq&m=100342151132277&w=2 +CVE-2001-0853 - http://marc.info/?l=bugtraq&m=100498111712723&w=2 +CVE-2001-0920 - http://marc.info/?l=bugtraq&m=100680319004162&w=2 +CVE-2001-0927 - http://marc.info/?l=bugtraq&m=100689302316077&w=2 +CVE-2001-0931 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 +CVE-2001-0932 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 +CVE-2001-0933 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 +CVE-2001-0934 - http://marc.info/?l=bugtraq&m=100698397818175&w=2 +CVE-2001-0946 - http://marc.info/?l=bugtraq&m=100743394701962&w=2 +CVE-2001-0998 - http://www-1.ibm.com/support/search.wss?rs=0&q=IY20943&apar=only +CVE-2001-1002 - http://marc.info/?l=bugtraq&m=99892644616749&w=2 +CVE-2001-1201 - http://marc.info/?l=bugtraq&m=100863301405266&w=2 +CVE-2001-1288 - http://marc.info/?l=vuln-dev&m=99651044701417&w=2 +CVE-2001-1362 - http://freshmeat.net/releases/51981/ +CVE-2001-1390 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1391 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1392 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1393 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1394 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1395 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1396 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1397 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1398 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1399 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1400 - http://www.redhat.com/support/errata/RHSA-2001-047.html +CVE-2001-1410 - http://marc.info/?l=bugtraq&m=105829174431769&w=2 +CVE-2001-1455 - http://www.securityfocus.com/bid/6060 +CVE-2001-1458 - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/advisories_template.htm%3Findexid%3D12 +CVE-2001-1499 - http://www.osvdb.org/20210 +CVE-2002-0022 - http://marc.info/?l=bugtraq&m=101362984930597&w=2 +CVE-2002-0022 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A925 +CVE-2002-0027 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A974 +CVE-2002-0058 - http://marc.info/?l=bugtraq&m=101534535304228&w=2 +CVE-2002-0073 - http://marc.info/?l=bugtraq&m=101901273810598&w=2 +CVE-2002-0078 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A96 +CVE-2002-0081 - http://marc.info/?l=bugtraq&m=101484705523351&w=2 +CVE-2002-0081 - http://marc.info/?l=bugtraq&m=101537076619812&w=2 +CVE-2002-0081 - http://marc.info/?l=ntbugtraq&m=101484975231922&w=2 +CVE-2002-0081 - http://security.e-matters.de/advisories/012002.html +CVE-2002-0082 - http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html +CVE-2002-0084 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A97 +CVE-2002-0098 - http://www.boozt.com/news_detail.php?id=3 +CVE-2002-0133 - http://marc.info/?l=bugtraq&m=101366658112809&w=2 +CVE-2002-0133 - http://marc.info/?l=bugtraq&m=101424723728817&w=2 +CVE-2002-0134 - http://marc.info/?l=bugtraq&m=101424723728817&w=2 +CVE-2002-0137 - http://marc.info/?l=bugtraq&m=101102759631000&w=2 +CVE-2002-0138 - http://marc.info/?l=bugtraq&m=101102759631000&w=2 +CVE-2002-0138 - http://marc.info/?l=bugtraq&m=101111688819855&w=2 +CVE-2002-0148 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A92 +CVE-2002-0149 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A95 +CVE-2002-0162 - http://marc.info/?l=bugtraq&m=101724766216872 +CVE-2002-0184 - http://marc.info/?l=bugtraq&m=101974610509912&w=2 +CVE-2002-0190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A923 +CVE-2002-0191 - http://marc.info/?l=bugtraq&m=101778302030981&w=2 +CVE-2002-0193 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A99 +CVE-2002-0200 - http://marc.info/?l=bugtraq&m=101174569103289&w=2 +CVE-2002-0201 - http://marc.info/?l=bugtraq&m=101174569103289&w=2 +CVE-2002-0231 - http://marc.info/?l=bugtraq&m=101286747013955&w=2 +CVE-2002-0241 - http://www.cisco.com/warp/public/707/ciscosecure-acs-nds-authentication-vuln-pub.shtml +CVE-2002-0244 - http://marc.info/?l=bugtraq&m=101310622531303&w=2 +CVE-2002-0252 - https://www.exploit-db.com/exploits/4673 +CVE-2002-0280 - http://freshmeat.net/releases/71514/ +CVE-2002-0283 - http://marc.info/?l=bugtraq&m=101408718030099&w=2 +CVE-2002-0287 - http://marc.info/?l=bugtraq&m=101389284625019&w=2 +CVE-2002-0288 - http://marc.info/?l=bugtraq&m=101408906001958&w=2 +CVE-2002-0289 - http://marc.info/?l=bugtraq&m=101408906001958&w=2 +CVE-2002-0292 - http://marc.info/?l=bugtraq&m=101414005501708&w=2 +CVE-2002-0309 - http://marc.info/?l=bugtraq&m=101424307617060&w=2 +CVE-2002-0314 - http://marc.info/?l=bugtraq&m=101441689224760&w=2 +CVE-2002-0315 - http://marc.info/?l=bugtraq&m=101441689224760&w=2 +CVE-2002-0319 - http://marc.info/?l=bugtraq&m=101446366708757&w=2 +CVE-2002-0326 - http://marc.info/?l=bugtraq&m=101474387016066&w=2 +CVE-2002-0346 - http://marc.info/?l=bugtraq&m=101495944202452&w=2 +CVE-2002-0347 - http://marc.info/?l=bugtraq&m=101495944202452&w=2 +CVE-2002-0348 - http://marc.info/?l=bugtraq&m=101495944202452&w=2 +CVE-2002-0354 - http://marc.info/?l=bugtraq&m=102017952204097&w=2 +CVE-2002-0354 - http://marc.info/?l=ntbugtraq&m=102020343728766&w=2 +CVE-2002-0359 - http://marc.info/?l=bugtraq&m=102459162909825&w=2 +CVE-2002-0370 - http://securityreason.com/securityalert/587 +CVE-2002-0371 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A98 +CVE-2002-0391 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9 +CVE-2002-0440 - http://seclists.org/lists/bugtraq/2002/Mar/0162.html +CVE-2002-0470 - http://seclists.org/bugtraq/2002/Mar/0263.html +CVE-2002-0471 - http://seclists.org/bugtraq/2002/Mar/0263.html +CVE-2002-0473 - http://prdownloads.sourceforge.net/phpbb/phpBB-2.0.1.zip +CVE-2002-0598 - http://www.foundstone.com/knowledge/fscan112_advisory.html +CVE-2002-0619 - http://marc.info/?l=bugtraq&m=102139136019862&w=2 +CVE-2002-0648 - http://marc.info/?l=bugtraq&m=103011639524314&w=2 +CVE-2002-0652 - http://marc.info/?l=bugtraq&m=102459162909825&w=2 +CVE-2002-0653 - http://marc.info/?l=bugtraq&m=102513970919836&w=2 +CVE-2002-0662 - http://marc.info/?l=bugtraq&m=103098575826031&w=2 +CVE-2002-0677 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A91 +CVE-2002-0693 - http://marc.info/?l=bugtraq&m=103419115517344&w=2 +CVE-2002-0717 - http://marc.info/?l=bugtraq&m=102734516023281&w=2 +CVE-2002-0727 - http://marc.info/?l=bugtraq&m=101829645415486&w=2 +CVE-2002-0797 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A94 +CVE-2002-0813 - http://marc.info/?l=bugtraq&m=103002169829669&w=2 +CVE-2002-0816 - http://marc.info/?l=bugtraq&m=102709593117171&w=2 +CVE-2002-0817 - http://marc.info/?l=bugtraq&m=102812622416695&w=2 +CVE-2002-0820 - http://marc.info/?l=bugtraq&m=102979180524452&w=2 +CVE-2002-0823 - http://marc.info/?l=bugtraq&m=102822806329440&w=2 +CVE-2002-0838 - http://marc.info/?l=bugtraq&m=103305615613319&w=2 +CVE-2002-0859 - http://marc.info/?l=bugtraq&m=102450188620081&w=2 +CVE-2002-0860 - http://marc.info/?l=bugtraq&m=101829911018463&w=2 +CVE-2002-0861 - http://marc.info/?l=bugtraq&m=101829726516346&w=2 +CVE-2002-0866 - http://www.kb.cert.org/vuls/id/307306 +CVE-2002-0869 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A929 +CVE-2002-0869 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A930 +CVE-2002-0869 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A983 +CVE-2002-0887 - http://marc.info/?l=bugtraq&m=99057164129869&w=2 +CVE-2002-0898 - http://marc.info/?l=ntbugtraq&m=102256058220402&w=2 +CVE-2002-0909 - http://marc.info/?l=bugtraq&m=102306166201275&w=2 +CVE-2002-0909 - http://marc.info/?l=vuln-dev&m=102297259123103&w=2 +CVE-2002-0945 - http://www.seanox.de/projects.devwex.php +CVE-2002-0946 - http://www.seanox.de/projects.devwex.php +CVE-2002-0968 - http://marc.info/?l=bugtraq&m=102563702928443&w=2 +CVE-2002-0985 - http://www.redhat.com/support/errata/RHSA-2002-213.html +CVE-2002-0986 - http://www.redhat.com/support/errata/RHSA-2002-213.html +CVE-2002-1053 - http://www.w3.org/Jigsaw/RelNotes.html#2.2.1 +CVE-2002-1079 - http://www.osvdb.org/3285 +CVE-2002-1091 - http://marc.info/?l=bugtraq&m=103134051120770&w=2 +CVE-2002-1119 - http://www.redhat.com/support/errata/RHSA-2003-048.html +CVE-2002-1120 - https://www.exploit-db.com/exploits/16770/ +CVE-2002-1142 - http://www.foundstone.com/knowledge/randd-advisories-display.html?id=337 +CVE-2002-1143 - http://marc.info/?l=bugtraq&m=103040003014999&w=2 +CVE-2002-1143 - http://marc.info/?l=bugtraq&m=103252858816401&w=2 +CVE-2002-1155 - http://marc.info/?l=bugtraq&m=105474080512376&w=2 +CVE-2002-1155 - http://marc.info/?l=bugtraq&m=105577912106710&w=2 +CVE-2002-1156 - http://www.securityfocus.com/bid/6065 +CVE-2002-1160 - http://marc.info/?l=bugtraq&m=104431622818954&w=2 +CVE-2002-1160 - http://www.kb.cert.org/vuls/id/911505 +CVE-2002-1170 - http://www.redhat.com/support/errata/RHSA-2002-228.html +CVE-2002-1174 - http://marc.info/?l=bugtraq&m=103340148625187&w=2 +CVE-2002-1175 - http://marc.info/?l=bugtraq&m=103340148625187&w=2 +CVE-2002-1180 - http://www.securityfocus.com/bid/6068 +CVE-2002-1180 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A931 +CVE-2002-1181 - http://www.securityfocus.com/bid/6068 +CVE-2002-1181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A942 +CVE-2002-1181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A944 +CVE-2002-1182 - http://www.securityfocus.com/bid/6068 +CVE-2002-1187 - http://marc.info/?l=bugtraq&m=103158601431054&w=2 +CVE-2002-1217 - http://marc.info/?l=bugtraq&m=103470310417576&w=2 +CVE-2002-1217 - http://marc.info/?l=ntbugtraq&m=103470202010570&w=2 +CVE-2002-1254 - http://marc.info/?l=bugtraq&m=103530131201191&w=2 +CVE-2002-1317 - http://www.securityfocus.com/bid/6241 +CVE-2002-1337 - http://marc.info/?l=bugtraq&m=104678739608479&w=2 +CVE-2002-1338 - http://marc.info/?l=bugtraq&m=101830175621193&w=2 +CVE-2002-1339 - http://marc.info/?l=bugtraq&m=101830175621193&w=2 +CVE-2002-1340 - http://marc.info/?l=bugtraq&m=101830175621193&w=2 +CVE-2002-1364 - http://marc.info/?l=bugtraq&m=103858895600963&w=2 +CVE-2002-1365 - http://marc.info/?l=bugtraq&m=103979751818638&w=2 +CVE-2002-1365 - http://security.e-matters.de/advisories/052002.html +CVE-2002-1366 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1367 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1368 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1369 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1371 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1372 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1373 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 +CVE-2002-1373 - http://security.e-matters.de/advisories/042002.html +CVE-2002-1374 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 +CVE-2002-1374 - http://security.e-matters.de/advisories/042002.html +CVE-2002-1375 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 +CVE-2002-1375 - http://security.e-matters.de/advisories/042002.html +CVE-2002-1376 - http://marc.info/?l=bugtraq&m=103971644013961&w=2 +CVE-2002-1376 - http://security.e-matters.de/advisories/042002.html +CVE-2002-1383 - http://marc.info/?l=bugtraq&m=104032149026670&w=2 +CVE-2002-1398 - http://www.novell.com/linux/security/advisories/2002_038_postgresql.html +CVE-2002-1400 - http://www.novell.com/linux/security/advisories/2002_038_postgresql.html +CVE-2002-1444 - http://www.securityfocus.com/bid/5477 +CVE-2002-1456 - http://marc.info/?l=bugtraq&m=103046375002380&w=2 +CVE-2002-1456 - http://marc.info/?l=ntbugtraq&m=103046138631893&w=2 +CVE-2002-1590 - http://www.securityfocus.com/bid/6061 +CVE-2002-1914 - http://www.redhat.com/support/errata/RHSA-2005-583.html +CVE-2002-1996 - http://sourceforge.net/tracker/index.php?func=detail&aid=524777&group_id=27927&atid=392228 +CVE-2002-20001 - https://dheatattack.com +CVE-2002-20001 - https://dheatattack.gitlab.io/ +CVE-2002-20001 - https://github.com/Balasys/dheater +CVE-2002-20001 - https://github.com/mozilla/ssl-config-generator/issues/162 +CVE-2002-20001 - https://gitlab.com/dheatattack/dheater +CVE-2002-20001 - https://ieeexplore.ieee.org/document/10374117 +CVE-2002-20001 - https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/ +CVE-2002-2048 - http://marc.info/?l=vuln-dev&m=102321152215055&w=2 +CVE-2002-2175 - http://marc.info/?l=bugtraq&m=102508071021631&w=2 +CVE-2002-2181 - http://www.securityfocus.com/bid/6063 +CVE-2002-2185 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2002-2185 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2002-2217 - https://www.exploit-db.com/exploits/2318 +CVE-2002-2226 - http://securityreason.com/securityalert/3160 +CVE-2002-2246 - http://www.deerfield.com/products/visnetic_website/ +CVE-2002-2281 - http://marc.info/?l=bugtraq&m=103798147613151&w=2 +CVE-2002-2284 - http://marc.info/?l=bugtraq&m=103798147613151&w=2 +CVE-2002-2380 - http://www.securityfocus.com/bid/6064 +CVE-2002-2381 - http://www.securityfocus.com/bid/6062 +CVE-2002-2426 - http://packetstormsecurity.org/0210-exploits/hackingcitrix.txt +CVE-2002-2435 - http://bugzilla.mozilla.org/show_bug.cgi?id=147777 +CVE-2002-2436 - http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ +CVE-2002-2436 - http://bugzilla.mozilla.org/show_bug.cgi?id=147777 +CVE-2002-2437 - http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ +CVE-2002-2437 - http://bugzilla.mozilla.org/show_bug.cgi?id=147777 +CVE-2003-0001 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2003-0015 - http://security.e-matters.de/advisories/012003.html +CVE-2003-0025 - http://marc.info/?l=bugtraq&m=104204786206563&w=2 +CVE-2003-0056 - http://marc.info/?l=bugtraq&m=104342864418213&w=2 +CVE-2003-0062 - http://marc.info/?l=bugtraq&m=104490777824360&w=2 +CVE-2003-0075 - http://marc.info/?l=bugtraq&m=104428700106672&w=2 +CVE-2003-0091 - http://packetstormsecurity.org/0304-advisories/sa2003-02.txt +CVE-2003-0097 - http://www.slackware.com/changelog/current.php?cpu=i386 +CVE-2003-0100 - http://marc.info/?l=bugtraq&m=104576100719090&w=2 +CVE-2003-0100 - http://marc.info/?l=bugtraq&m=104587206702715&w=2 +CVE-2003-0105 - http://marc.info/?l=bugtraq&m=109215441332682&w=2 +CVE-2003-0106 - http://marc.info/?l=bugtraq&m=104869513822233&w=2 +CVE-2003-0106 - http://marc.info/?l=ntbugtraq&m=104868285106289&w=2 +CVE-2003-0107 - http://marc.info/?l=bugtraq&m=104610337726297&w=2 +CVE-2003-0109 - http://marc.info/?l=bugtraq&m=104861839130254&w=2 +CVE-2003-0113 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A926 +CVE-2003-0114 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A963 +CVE-2003-0121 - http://marc.info/?l=bugtraq&m=104716030503607&w=2 +CVE-2003-0128 - http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 +CVE-2003-0129 - http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 +CVE-2003-0130 - http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 +CVE-2003-0132 - http://marc.info/?l=bugtraq&m=104982175321731&w=2 +CVE-2003-0132 - http://marc.info/?l=bugtraq&m=104994309010974&w=2 +CVE-2003-0132 - http://marc.info/?l=bugtraq&m=105001663120995&w=2 +CVE-2003-0140 - http://marc.info/?l=bugtraq&m=104818814931378&w=2 +CVE-2003-0143 - http://marc.info/?l=bugtraq&m=104739841223916&w=2 +CVE-2003-0148 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp +CVE-2003-0149 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp +CVE-2003-0190 - http://lab.mediaservice.net/advisory/2003-01-openssh.txt +CVE-2003-0190 - http://marc.info/?l=bugtraq&m=105172058404810&w=2 +CVE-2003-0190 - http://www.redhat.com/support/errata/RHSA-2003-222.html +CVE-2003-0197 - http://marc.info/?l=bugtraq&m=104940730819887&w=2 +CVE-2003-0203 - http://marc.info/?l=bugtraq&m=104610380126860&w=2 +CVE-2003-0209 - http://marc.info/?l=bugtraq&m=105111217731583&w=2 +CVE-2003-0219 - http://marc.info/?l=bugtraq&m=105155734411836&w=2 +CVE-2003-0220 - http://marc.info/?l=bugtraq&m=105155734411836&w=2 +CVE-2003-0226 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A933 +CVE-2003-0227 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A936 +CVE-2003-0227 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A966 +CVE-2003-0264 - http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execution.html +CVE-2003-0274 - http://marc.info/?l=bugtraq&m=105241224228693&w=2 +CVE-2003-0281 - http://marc.info/?l=bugtraq&m=105259012802997&w=2 +CVE-2003-0286 - http://packetstormsecurity.org/0305-exploits/snitz_exec.txt +CVE-2003-0306 - http://marc.info/?l=bugtraq&m=105284486526310&w=2 +CVE-2003-0306 - http://marc.info/?l=vuln-dev&m=105241032526289&w=2 +CVE-2003-0309 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A948 +CVE-2003-0330 - http://marc.info/?l=bugtraq&m=105344891005369&w=2 +CVE-2003-0337 - http://marc.info/?l=bugtraq&m=105361879109409&w=2 +CVE-2003-0344 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A922 +CVE-2003-0347 - http://marc.info/?l=bugtraq&m=106262077829157&w=2 +CVE-2003-0349 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A938 +CVE-2003-0353 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A961 +CVE-2003-0353 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A962 +CVE-2003-0377 - http://marc.info/?l=bugtraq&m=105370528728225&w=2 +CVE-2003-0386 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9894 +CVE-2003-0390 - http://marc.info/?l=bugtraq&m=105121918523320&w=2 +CVE-2003-0407 - http://marc.info/?l=bugtraq&m=105405668423102&w=2 +CVE-2003-0408 - http://marc.info/?l=bugtraq&m=105405629622652&w=2 +CVE-2003-0446 - http://marc.info/?l=bugtraq&m=105585986015421&w=2 +CVE-2003-0446 - http://marc.info/?l=bugtraq&m=105595990924165&w=2 +CVE-2003-0446 - http://marc.info/?l=ntbugtraq&m=105585001905002&w=2 +CVE-2003-0449 - http://marc.info/?l=bugtraq&m=105561134624665&w=2 +CVE-2003-0449 - http://marc.info/?l=bugtraq&m=105561189625082&w=2 +CVE-2003-0456 - http://marc.info/?l=bugtraq&m=105733894003737&w=2 +CVE-2003-0461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9330 +CVE-2003-0461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A997 +CVE-2003-0462 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0471 - http://marc.info/?l=bugtraq&m=105648385900792&w=2 +CVE-2003-0476 - http://marc.info/?l=bugtraq&m=105664924024009&w=2 +CVE-2003-0485 - http://marc.info/?l=bugtraq&m=105613243117155&w=2 +CVE-2003-0501 - http://marc.info/?l=bugtraq&m=105621758104242 +CVE-2003-0501 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0504 - http://www.security-corporation.com/articles-20030702-005.html +CVE-2003-0508 - http://marc.info/?l=bugtraq&m=105709569312583&w=2 +CVE-2003-0508 - http://marc.info/?l=bugtraq&m=105785749721291&w=2 +CVE-2003-0509 - http://marc.info/?l=bugtraq&m=105709450711395&w=2 +CVE-2003-0522 - http://marc.info/?l=bugtraq&m=105733145930031&w=2 +CVE-2003-0522 - http://marc.info/?l=bugtraq&m=105760660928715&w=2 +CVE-2003-0524 - http://marc.info/?l=bugtraq&m=105769387706906&w=2 +CVE-2003-0526 - http://marc.info/?l=bugtraq&m=105838519729525&w=2 +CVE-2003-0526 - http://marc.info/?l=ntbugtraq&m=105838590030409&w=2 +CVE-2003-0533 - http://marc.info/?l=bugtraq&m=108325860431471&w=2 +CVE-2003-0533 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A919 +CVE-2003-0542 - http://www.securityfocus.com/bid/9504 +CVE-2003-0542 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458 +CVE-2003-0550 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0551 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0552 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0553 - http://marc.info/?l=bugtraq&m=105820193406838&w=2 +CVE-2003-0560 - http://marc.info/?l=bugtraq&m=105733277731084&w=2 +CVE-2003-0561 - http://marc.info/?l=bugtraq&m=105769805311484&w=2 +CVE-2003-0564 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A914 +CVE-2003-0567 - http://www.cert.org/advisories/CA-2003-17.html +CVE-2003-0575 - http://marc.info/?l=bugtraq&m=105958240709302&w=2 +CVE-2003-0578 - http://marc.info/?l=bugtraq&m=105839150004682&w=2 +CVE-2003-0579 - http://marc.info/?l=bugtraq&m=105838948002337&w=2 +CVE-2003-0580 - http://marc.info/?l=bugtraq&m=105839042603476&w=2 +CVE-2003-0581 - http://marc.info/?l=bugtraq&m=105829691405446&w=2 +CVE-2003-0583 - http://marc.info/?l=bugtraq&m=105846288808846&w=2 +CVE-2003-0584 - http://marc.info/?l=bugtraq&m=105846288808846&w=2 +CVE-2003-0585 - http://marc.info/?l=bugtraq&m=105845898003616&w=2 +CVE-2003-0586 - http://marc.info/?l=bugtraq&m=105845898003616&w=2 +CVE-2003-0594 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A917 +CVE-2003-0594 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9826 +CVE-2003-0605 - http://marc.info/?l=bugtraq&m=105880332428706&w=2 +CVE-2003-0610 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp +CVE-2003-0616 - http://www.nai.com/us/promos/mcafee/epo_vulnerabilities.asp +CVE-2003-0619 - http://marc.info/?l=bugtraq&m=105950927708272&w=2 +CVE-2003-0619 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0621 - http://marc.info/?l=bugtraq&m=106762000607681&w=2 +CVE-2003-0622 - http://marc.info/?l=bugtraq&m=106762000607681&w=2 +CVE-2003-0623 - http://marc.info/?l=bugtraq&m=106762000607681&w=2 +CVE-2003-0624 - http://marc.info/?l=bugtraq&m=106761926906781&w=2 +CVE-2003-0641 - http://marc.info/?l=bugtraq&m=105848106631132&w=2 +CVE-2003-0642 - http://marc.info/?l=bugtraq&m=105848106631132&w=2 +CVE-2003-0655 - http://marc.info/?l=bugtraq&m=105978381618095&w=2 +CVE-2003-0685 - http://marc.info/?l=bugtraq&m=106071059430211&w=2 +CVE-2003-0693 - http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010135.html +CVE-2003-0699 - http://www.redhat.com/support/errata/RHSA-2003-239.html +CVE-2003-0717 - http://marc.info/?l=bugtraq&m=106666713812158&w=2 +CVE-2003-0719 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A903 +CVE-2003-0719 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A951 +CVE-2003-0721 - http://marc.info/?l=bugtraq&m=106367213400313&w=2 +CVE-2003-0727 - https://www.exploit-db.com/exploits/42780/ +CVE-2003-0735 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 +CVE-2003-0736 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 +CVE-2003-0737 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 +CVE-2003-0738 - http://marc.info/?l=bugtraq&m=106062021711496&w=2 +CVE-2003-0739 - http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1106 +CVE-2003-0740 - http://marc.info/?l=bugtraq&m=106260760211958&w=2 +CVE-2003-0746 - http://www.kb.cert.org/vuls/id/377804 +CVE-2003-0758 - http://www.coresecurity.com/common/showdoc.php?idx=366&idxseccion=10 +CVE-2003-0759 - http://www.coresecurity.com/common/showdoc.php?idx=366&idxseccion=10 +CVE-2003-0767 - http://marc.info/?l=bugtraq&m=106304902323758&w=2 +CVE-2003-0770 - http://marc.info/?l=bugtraq&m=106381136115972&w=2 +CVE-2003-0780 - http://marc.info/?l=bugtraq&m=106364207129993&w=2 +CVE-2003-0789 - http://www.securityfocus.com/bid/9504 +CVE-2003-0807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A969 +CVE-2003-0807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A995 +CVE-2003-0812 - http://marc.info/?l=bugtraq&m=106865197102041&w=2 +CVE-2003-0812 - http://www.kb.cert.org/vuls/id/567620 +CVE-2003-0813 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A900 +CVE-2003-0831 - https://www.exploit-db.com/exploits/107/ +CVE-2003-0845 - http://marc.info/?l=bugtraq&m=106546044416498&w=2 +CVE-2003-0845 - http://marc.info/?l=bugtraq&m=106547728803252&w=2 +CVE-2003-0848 - http://marc.info/?l=bugtraq&m=106589631819348&w=2 +CVE-2003-0854 - https://www.exploit-db.com/exploits/115 +CVE-2003-0906 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A959 +CVE-2003-0907 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A904 +CVE-2003-0910 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A911 +CVE-2003-0925 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9692 +CVE-2003-0927 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9691 +CVE-2003-0935 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9802 +CVE-2003-0936 - http://marc.info/?l=bugtraq&m=106875764826251&w=2 +CVE-2003-0946 - http://marc.info/?l=bugtraq&m=106867135830683&w=2 +CVE-2003-0961 - http://marc.info/?l=bugtraq&m=107064830206816&w=2 +CVE-2003-0962 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9415 +CVE-2003-0967 - http://marc.info/?l=bugtraq&m=106944220426970 +CVE-2003-0968 - http://marc.info/?l=bugtraq&m=106986437621130&w=2 +CVE-2003-0974 - http://marc.info/?l=bugtraq&m=107004362416252&w=2 +CVE-2003-0984 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9406 +CVE-2003-0985 - http://isec.pl/vulnerabilities/isec-0013-mremap.txt +CVE-2003-0985 - http://marc.info/?l=bugtraq&m=107332782121916&w=2 +CVE-2003-0985 - http://marc.info/?l=bugtraq&m=107340358402129&w=2 +CVE-2003-0986 - http://www.redhat.com/support/errata/RHSA-2004-017.html +CVE-2003-0986 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9707 +CVE-2003-0990 - http://marc.info/?l=bugtraq&m=107247236124180&w=2 +CVE-2003-1026 - http://marc.info/?l=bugtraq&m=107038202225587&w=2 +CVE-2003-1026 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A643 +CVE-2003-1027 - http://marc.info/?l=bugtraq&m=107038202225587&w=2 +CVE-2003-1028 - http://marc.info/?l=bugtraq&m=107038202225587&w=2 +CVE-2003-1033 - http://marc.info/?l=bugtraq&m=105103613727471&w=2 +CVE-2003-1034 - http://marc.info/?l=bugtraq&m=104914778303805&w=2 +CVE-2003-1040 - http://www.redhat.com/support/errata/RHSA-2004-065.html +CVE-2003-1040 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9423 +CVE-2003-1041 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 +CVE-2003-1041 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A956 +CVE-2003-1048 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 +CVE-2003-1073 - http://isec.pl/vulnerabilities/isec-0008-sun-at.txt +CVE-2003-1094 - http://www.securityfocus.com/bid/8320 +CVE-2003-1143 - http://aluigi.altervista.org/adv/ssboom-adv.txt +CVE-2003-1154 - http://www.computerworld.co.nz/cw.nsf/0/BF9E8E6E2D313E5FCC256DD70016473F?OpenDocument&More= +CVE-2003-1215 - http://marc.info/?l=bugtraq&m=107273069130885&w=2 +CVE-2003-1216 - http://marc.info/?l=bugtraq&m=107196735102970&w=2 +CVE-2003-1292 - https://www.exploit-db.com/exploits/1864 +CVE-2003-1299 - http://packetstormsecurity.org/0305-exploits/baby.txt +CVE-2003-1300 - http://packetstormsecurity.org/0305-exploits/baby.txt +CVE-2003-1310 - http://www.securityfocus.com/bid/8329 +CVE-2003-1314 - https://www.exploit-db.com/exploits/2980 +CVE-2003-1318 - http://marc.info/?l=bugtraq&m=105820430209748&w=2 +CVE-2003-1325 - http://packetstormsecurity.org/0304-exploits/hl-headnut.c +CVE-2003-1339 - http://marc.info/?l=bugtraq&m=107090390002654&w=2 +CVE-2003-1339 - https://www.exploit-db.com/exploits/133 +CVE-2003-1340 - http://securityreason.com/securityalert/3185 +CVE-2003-1348 - http://securityreason.com/securityalert/3227 +CVE-2003-1354 - http://seclists.org/lists/bugtraq/2003/Jan/0178.html +CVE-2003-1358 - http://securityreason.com/securityalert/3236 +CVE-2003-1359 - http://securityreason.com/securityalert/3236 +CVE-2003-1360 - http://securityreason.com/securityalert/3236 +CVE-2003-1376 - http://securityreason.com/securityalert/3265 +CVE-2003-1381 - http://securityreason.com/securityalert/3258 +CVE-2003-1397 - http://securityreason.com/securityalert/3255 +CVE-2003-1418 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2003-1497 - http://securityreason.com/securityalert/3298 +CVE-2003-1531 - http://www.security-corporation.com/index.php?id=advisories&a=013-FR +CVE-2003-1550 - http://www.security-corporation.com/index.php?id=advisories&a=011-FR +CVE-2003-1556 - http://securityreason.com/securityalert/3796 +CVE-2003-1559 - http://securityreason.com/securityalert/3989 +CVE-2003-1560 - http://securityreason.com/securityalert/4004 +CVE-2003-1561 - http://securityreason.com/securityalert/4004 +CVE-2003-1564 - http://www.reddit.com/r/programming/comments/65843/time_to_upgrade_libxml2 +CVE-2003-1571 - https://www.exploit-db.com/exploits/7488 +CVE-2003-1573 - http://seclists.org/bugtraq/2003/Dec/0249.html +CVE-2003-5001 - https://vuldb.com/?id.104 +CVE-2003-5003 - https://vuldb.com/?id.296 +CVE-2004-0001 - http://www.redhat.com/support/errata/RHSA-2004-017.html +CVE-2004-0003 - http://www.redhat.com/support/errata/RHSA-2004-065.html +CVE-2004-0003 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9204 +CVE-2004-0005 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 +CVE-2004-0006 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 +CVE-2004-0007 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 +CVE-2004-0007 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9906 +CVE-2004-0008 - http://marc.info/?l=bugtraq&m=107513690306318&w=2 +CVE-2004-0008 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9469 +CVE-2004-0010 - http://www.redhat.com/support/errata/RHSA-2004-065.html +CVE-2004-0034 - http://marc.info/?l=bugtraq&m=107340481804110&w=2 +CVE-2004-0035 - http://marc.info/?l=bugtraq&m=107340481804110&w=2 +CVE-2004-0055 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9989 +CVE-2004-0059 - http://marc.info/?l=bugtraq&m=107411794303201&w=2 +CVE-2004-0060 - http://marc.info/?l=bugtraq&m=107411794303201&w=2 +CVE-2004-0061 - http://marc.info/?l=bugtraq&m=107411794303201&w=2 +CVE-2004-0065 - http://marc.info/?l=bugtraq&m=107394912715478&w=2 +CVE-2004-0066 - http://marc.info/?l=bugtraq&m=107394912715478&w=2 +CVE-2004-0067 - http://marc.info/?l=bugtraq&m=107394912715478&w=2 +CVE-2004-0069 - http://marc.info/?l=bugtraq&m=107367110805273&w=2 +CVE-2004-0069 - http://marc.info/?l=bugtraq&m=107401398014761&w=2 +CVE-2004-0075 - http://www.redhat.com/support/errata/RHSA-2004-065.html +CVE-2004-0077 - http://marc.info/?l=bugtraq&m=107711762014175&w=2 +CVE-2004-0077 - http://security.gentoo.org/glsa/glsa-200403-02.xml +CVE-2004-0077 - http://www.redhat.com/support/errata/RHSA-2004-065.html +CVE-2004-0079 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975 +CVE-2004-0079 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779 +CVE-2004-0081 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902 +CVE-2004-0083 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612 +CVE-2004-0085 - http://www.securityfocus.com/bid/9504 +CVE-2004-0086 - http://www.securityfocus.com/bid/9504 +CVE-2004-0087 - http://www.securityfocus.com/bid/9504 +CVE-2004-0088 - http://www.securityfocus.com/bid/9504 +CVE-2004-0090 - http://www.securityfocus.com/bid/9504 +CVE-2004-0091 - http://marc.info/?l=bugtraq&m=107462349324945&w=2 +CVE-2004-0091 - http://marc.info/?l=vuln-dev&m=107462499927040&w=2 +CVE-2004-0092 - http://www.securityfocus.com/bid/9504 +CVE-2004-0104 - http://www.kb.cert.org/vuls/id/518518 +CVE-2004-0105 - http://www.kb.cert.org/vuls/id/513062 +CVE-2004-0109 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940 +CVE-2004-0112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928 +CVE-2004-0112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580 +CVE-2004-0116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A955 +CVE-2004-0116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A957 +CVE-2004-0116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A958 +CVE-2004-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A907 +CVE-2004-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A946 +CVE-2004-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A964 +CVE-2004-0123 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A924 +CVE-2004-0131 - http://ftp.gnu.org/gnu/radius/radius-1.2.tar.gz +CVE-2004-0148 - http://www.redhat.com/support/errata/RHSA-2004-096.html +CVE-2004-0154 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9673 +CVE-2004-0155 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9291 +CVE-2004-0155 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A945 +CVE-2004-0164 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A947 +CVE-2004-0164 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9737 +CVE-2004-0176 - http://marc.info/?l=bugtraq&m=108007072215742&w=2 +CVE-2004-0176 - http://www.kb.cert.org/vuls/id/644886 +CVE-2004-0176 - http://www.redhat.com/support/errata/RHSA-2004-136.html +CVE-2004-0178 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9427 +CVE-2004-0180 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9462 +CVE-2004-0183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A972 +CVE-2004-0183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9971 +CVE-2004-0184 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9581 +CVE-2004-0184 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A976 +CVE-2004-0185 - http://www.redhat.com/support/errata/RHSA-2004-096.html +CVE-2004-0189 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A941 +CVE-2004-0191 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A937 +CVE-2004-0197 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A968 +CVE-2004-0199 - http://marc.info/?l=bugtraq&m=108437759930820&w=2 +CVE-2004-0199 - http://marc.info/?l=full-disclosure&m=108430407801825&w=2 +CVE-2004-0199 - http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt +CVE-2004-0199 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-015 +CVE-2004-0200 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028 +CVE-2004-0201 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 +CVE-2004-0202 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-016 +CVE-2004-0203 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-026 +CVE-2004-0204 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017 +CVE-2004-0205 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-021 +CVE-2004-0206 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 +CVE-2004-0207 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 +CVE-2004-0208 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 +CVE-2004-0209 - http://marc.info/?l=bugtraq&m=109829067325779&w=2 +CVE-2004-0209 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 +CVE-2004-0210 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020 +CVE-2004-0211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 +CVE-2004-0212 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-022 +CVE-2004-0213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-019 +CVE-2004-0214 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 +CVE-2004-0215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-018 +CVE-2004-0216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0228 - http://fedoranews.org/updates/FEDORA-2004-111.shtml +CVE-2004-0230 - http://www.kb.cert.org/vuls/id/415294 +CVE-2004-0230 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2004-0230 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 +CVE-2004-0230 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 +CVE-2004-0230 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2004-0233 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A979 +CVE-2004-0234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977 +CVE-2004-0234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881 +CVE-2004-0235 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978 +CVE-2004-0236 - http://marc.info/?l=bugtraq&m=107576894019530&w=2 +CVE-2004-0240 - http://marc.info/?l=bugtraq&m=107582648326448&w=2 +CVE-2004-0241 - http://marc.info/?l=bugtraq&m=107582648326448&w=2 +CVE-2004-0242 - http://marc.info/?l=bugtraq&m=107582648326448&w=2 +CVE-2004-0245 - http://marc.info/?l=bugtraq&m=107586518120516&w=2 +CVE-2004-0247 - http://marc.info/?l=bugtraq&m=107584109420084&w=2 +CVE-2004-0251 - http://marc.info/?l=bugtraq&m=107594183924958&w=2 +CVE-2004-0253 - http://marc.info/?l=bugtraq&m=107604065819233&w=2 +CVE-2004-0254 - http://marc.info/?l=bugtraq&m=107606726417150&w=2 +CVE-2004-0262 - http://marc.info/?l=bugtraq&m=107634556632195&w=2 +CVE-2004-0264 - http://marc.info/?l=bugtraq&m=107634638201570&w=2 +CVE-2004-0265 - http://marc.info/?l=bugtraq&m=107634727520936&w=2 +CVE-2004-0266 - http://marc.info/?l=bugtraq&m=107635110327066&w=2 +CVE-2004-0269 - http://marc.info/?l=bugtraq&m=107643348117646&w=2 +CVE-2004-0271 - http://marc.info/?l=bugtraq&m=107643014606515&w=2 +CVE-2004-0272 - http://marc.info/?l=bugtraq&m=107643014606515&w=2 +CVE-2004-0273 - http://marc.info/?l=bugtraq&m=107642978524321&w=2 +CVE-2004-0276 - http://marc.info/?l=bugtraq&m=107652610506968&w=2 +CVE-2004-0278 - http://marc.info/?l=bugtraq&m=107655269820530&w=2 +CVE-2004-0288 - https://exchange.xforce.ibmcloud.com/vulnerabilities/15209 +CVE-2004-0290 - http://marc.info/?l=bugtraq&m=107695064204362&w=2 +CVE-2004-0292 - http://marc.info/?l=bugtraq&m=107703630913205&w=2 +CVE-2004-0297 - https://exchange.xforce.ibmcloud.com/vulnerabilities/15243 +CVE-2004-0304 - http://marc.info/?l=bugtraq&m=107712159425226&w=2 +CVE-2004-0305 - http://marc.info/?l=bugtraq&m=107712159425226&w=2 +CVE-2004-0314 - http://marc.info/?l=bugtraq&m=107757029514146&w=2 +CVE-2004-0319 - http://marc.info/?l=bugtraq&m=107756639427140&w=2 +CVE-2004-0321 - http://marc.info/?l=bugtraq&m=107756001412888&w=2 +CVE-2004-0332 - http://www.securityfocus.com/bid/9754 +CVE-2004-0339 - http://marc.info/?l=bugtraq&m=107799508130700&w=2 +CVE-2004-0345 - http://marc.info/?l=bugtraq&m=107816217901923&w=2 +CVE-2004-0348 - http://marc.info/?l=bugtraq&m=107833097705486&w=2 +CVE-2004-0350 - http://marc.info/?l=bugtraq&m=107833097705486&w=2 +CVE-2004-0351 - http://marc.info/?l=bugtraq&m=107833097705486&w=2 +CVE-2004-0365 - http://www.redhat.com/support/errata/RHSA-2004-136.html +CVE-2004-0365 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196 +CVE-2004-0367 - http://www.redhat.com/support/errata/RHSA-2004-136.html +CVE-2004-0367 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A905 +CVE-2004-0380 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A990 +CVE-2004-0385 - http://www.kb.cert.org/vuls/id/413006 +CVE-2004-0394 - http://lwn.net/Articles/81773/ +CVE-2004-0396 - http://marc.info/?l=bugtraq&m=108498454829020&w=2 +CVE-2004-0396 - http://security.e-matters.de/advisories/072004.html +CVE-2004-0396 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058 +CVE-2004-0396 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970 +CVE-2004-0397 - http://marc.info/?l=bugtraq&m=108498676517697&w=2 +CVE-2004-0397 - http://security.e-matters.de/advisories/082004.html +CVE-2004-0398 - http://marc.info/?l=bugtraq&m=108498433632333&w=2 +CVE-2004-0403 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A984 +CVE-2004-0411 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954 +CVE-2004-0414 - http://security.e-matters.de/advisories/092004.html +CVE-2004-0414 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A993 +CVE-2004-0415 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9965 +CVE-2004-0416 - http://security.e-matters.de/advisories/092004.html +CVE-2004-0416 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A994 +CVE-2004-0417 - http://security.e-matters.de/advisories/092004.html +CVE-2004-0418 - http://security.e-matters.de/advisories/092004.html +CVE-2004-0420 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024 +CVE-2004-0421 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971 +CVE-2004-0424 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A939 +CVE-2004-0426 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9495 +CVE-2004-0426 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A967 +CVE-2004-0427 - http://fedoranews.org/updates/FEDORA-2004-111.shtml +CVE-2004-0427 - http://www.redhat.com/support/errata/RHSA-2004-260.html +CVE-2004-0452 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938 +CVE-2004-0453 - http://marc.info/?l=bugtraq&m=108723630730487&w=2 +CVE-2004-0494 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854 +CVE-2004-0495 - http://www.redhat.com/support/errata/RHSA-2004-260.html +CVE-2004-0497 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867 +CVE-2004-0498 - http://www.stonesoft.com/support/Security_Advisories/6735.html +CVE-2004-0500 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429 +CVE-2004-0504 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9769 +CVE-2004-0504 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A982 +CVE-2004-0505 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9433 +CVE-2004-0505 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A986 +CVE-2004-0506 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9695 +CVE-2004-0506 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A987 +CVE-2004-0507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A988 +CVE-2004-0510 - http://marc.info/?l=bugtraq&m=109889281711636&w=2 +CVE-2004-0520 - http://marc.info/?l=bugtraq&m=108611554415078&w=2 +CVE-2004-0520 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt +CVE-2004-0523 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991 +CVE-2004-0529 - http://marc.info/?l=bugtraq&m=108663003608211&w=2 +CVE-2004-0537 - http://marc.info/?l=bugtraq&m=108627581717738&w=2 +CVE-2004-0541 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A980 +CVE-2004-0548 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2004-0549 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 +CVE-2004-0554 - http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html +CVE-2004-0554 - http://www.redhat.com/support/errata/RHSA-2004-260.html +CVE-2004-0554 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426 +CVE-2004-0557 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801 +CVE-2004-0558 - https://github.com/fibonascii/CVE-2004-0558 +CVE-2004-0566 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025 +CVE-2004-0567 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 +CVE-2004-0568 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043 +CVE-2004-0569 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-029 +CVE-2004-0571 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 +CVE-2004-0572 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037 +CVE-2004-0573 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-027 +CVE-2004-0574 - http://marc.info/?l=bugtraq&m=109761632831563&w=2 +CVE-2004-0574 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036 +CVE-2004-0574 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4392 +CVE-2004-0575 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-034 +CVE-2004-0587 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9398 +CVE-2004-0594 - http://marc.info/?l=bugtraq&m=108981780109154&w=2 +CVE-2004-0594 - http://www.novell.com/linux/security/advisories/2004_21_php4.html +CVE-2004-0595 - http://marc.info/?l=bugtraq&m=108981780109154&w=2 +CVE-2004-0595 - http://www.novell.com/linux/security/advisories/2004_21_php4.html +CVE-2004-0597 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009 +CVE-2004-0600 - http://marc.info/?l=bugtraq&m=109053195818351&w=2 +CVE-2004-0605 - http://marc.info/?l=bugtraq&m=108766803817406&w=2 +CVE-2004-0607 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9163 +CVE-2004-0608 - http://aluigi.altervista.org/adv/unsecure-adv.txt +CVE-2004-0608 - http://marc.info/?l=bugtraq&m=108787105023304&w=2 +CVE-2004-0619 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9773 +CVE-2004-0620 - http://marc.info/?l=bugtraq&m=108809720026642&w=2 +CVE-2004-0622 - http://citp.princeton.edu/pub/coldboot.pdf +CVE-2004-0633 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9931 +CVE-2004-0635 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721 +CVE-2004-0639 - http://marc.info/?l=bugtraq&m=108611554415078&w=2 +CVE-2004-0639 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt +CVE-2004-0659 - http://marc.info/?l=bugtraq&m=108844316930791&w=2 +CVE-2004-0671 - https://exchange.xforce.ibmcloud.com/vulnerabilities/16609 +CVE-2004-0674 - http://marc.info/?l=bugtraq&m=108886995627906&w=2 +CVE-2004-0675 - http://marc.info/?l=bugtraq&m=108887778628398&w=2 +CVE-2004-0679 - http://securityreason.com/securityalert/560 +CVE-2004-0683 - http://marc.info/?l=bugtraq&m=108938579712894&w=2 +CVE-2004-0687 - http://packetstormsecurity.com/files/170620/Solaris-10-dtprintinfo-libXm-libXpm-Security-Issues.html +CVE-2004-0687 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9187 +CVE-2004-0689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9334 +CVE-2004-0691 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9485 +CVE-2004-0694 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9981 +CVE-2004-0700 - http://packetstormsecurity.org/0407-advisories/modsslFormat.txt +CVE-2004-0718 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9997 +CVE-2004-0722 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9378 +CVE-2004-0724 - http://marc.info/?l=bugtraq&m=108966465302107&w=2 +CVE-2004-0727 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0733 - https://www.exploit-db.com/exploits/3757 +CVE-2004-0735 - http://marc.info/?l=bugtraq&m=109008314631518&w=2 +CVE-2004-0739 - http://marc.info/?l=bugtraq&m=109035224715409&w=2 +CVE-2004-0758 - http://bugzilla.mozilla.org/show_bug.cgi?id=249004 +CVE-2004-0761 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9240 +CVE-2004-0763 - http://marc.info/?l=bugtraq&m=109087067730938&w=2 +CVE-2004-0763 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9436 +CVE-2004-0764 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9419 +CVE-2004-0769 - http://marc.info/?l=bugtraq&m=108745217504379&w=2 +CVE-2004-0771 - http://marc.info/?l=bugtraq&m=108668791510153 +CVE-2004-0771 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9595 +CVE-2004-0775 - http://marc.info/?l=bugtraq&m=109223783402624&w=2 +CVE-2004-0783 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9348 +CVE-2004-0790 - http://securityreason.com/securityalert/57 +CVE-2004-0790 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 +CVE-2004-0790 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 +CVE-2004-0791 - http://securityreason.com/securityalert/57 +CVE-2004-0791 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-0791 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2004-0796 - http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337 +CVE-2004-0798 - https://www.exploit-db.com/exploits/566/ +CVE-2004-0806 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9805 +CVE-2004-0809 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9588 +CVE-2004-0825 - http://www.kb.cert.org/vuls/id/914870 +CVE-2004-0835 - http://www.redhat.com/support/errata/RHSA-2004-611.html +CVE-2004-0836 - http://www.redhat.com/support/errata/RHSA-2004-611.html +CVE-2004-0837 - http://www.redhat.com/support/errata/RHSA-2004-611.html +CVE-2004-0839 - http://marc.info/?l=bugtraq&m=109336221826652&w=2 +CVE-2004-0839 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0840 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5509 +CVE-2004-0841 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0842 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0843 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0844 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0845 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0869 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 +CVE-2004-0870 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 +CVE-2004-0871 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 +CVE-2004-0872 - https://exchange.xforce.ibmcloud.com/vulnerabilities/17417 +CVE-2004-0882 - http://marc.info/?l=bugtraq&m=110054671403755&w=2 +CVE-2004-0882 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969 +CVE-2004-0883 - http://marc.info/?l=bugtraq&m=110072140811965&w=2 +CVE-2004-0883 - http://security.e-matters.de/advisories/142004.html +CVE-2004-0886 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907 +CVE-2004-0888 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714 +CVE-2004-0892 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039 +CVE-2004-0893 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 +CVE-2004-0894 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 +CVE-2004-0897 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-003 +CVE-2004-0899 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 +CVE-2004-0900 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 +CVE-2004-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 +CVE-2004-0902 - http://bugzilla.mozilla.org/show_bug.cgi?id=256316 +CVE-2004-0908 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9745 +CVE-2004-0914 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943 +CVE-2004-0949 - http://marc.info/?l=bugtraq&m=110072140811965&w=2 +CVE-2004-0949 - http://security.e-matters.de/advisories/142004.html +CVE-2004-0953 - http://marc.info/?l=bugtraq&m=110144303826709&w=2 +CVE-2004-0957 - http://www.redhat.com/support/errata/RHSA-2004-611.html +CVE-2004-0959 - http://marc.info/?l=bugtraq&m=109534848430404&w=2 +CVE-2004-0963 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-023 +CVE-2004-0964 - http://marc.info/?l=bugtraq&m=109608092609200&w=2 +CVE-2004-0964 - http://marc.info/?l=bugtraq&m=109638486728548&w=2 +CVE-2004-0966 - https://www.ubuntu.com/usn/usn-5-1/ +CVE-2004-0968 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523 +CVE-2004-0976 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9752 +CVE-2004-0978 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0979 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 +CVE-2004-0989 - http://marc.info/?l=bugtraq&m=109880813013482&w=2 +CVE-2004-0990 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952 +CVE-2004-1008 - http://marc.info/?l=bugtraq&m=109889312917613&w=2 +CVE-2004-1008 - http://www.chiark.greenend.org.uk/~sgtatham/putty/ +CVE-2004-1010 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9848 +CVE-2004-1011 - http://marc.info/?l=bugtraq&m=110123023521619&w=2 +CVE-2004-1011 - http://security.e-matters.de/advisories/152004.html +CVE-2004-1012 - http://marc.info/?l=bugtraq&m=110123023521619&w=2 +CVE-2004-1012 - http://security.e-matters.de/advisories/152004.html +CVE-2004-1013 - http://marc.info/?l=bugtraq&m=110123023521619&w=2 +CVE-2004-1013 - http://security.e-matters.de/advisories/152004.html +CVE-2004-1016 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-1017 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-1017 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9786 +CVE-2004-1018 - http://marc.info/?l=bugtraq&m=110314318531298&w=2 +CVE-2004-1019 - http://marc.info/?l=bugtraq&m=110314318531298&w=2 +CVE-2004-1019 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2004-1036 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9592 +CVE-2004-1049 - http://marc.info/?l=bugtraq&m=110382891718076&w=2 +CVE-2004-1049 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 +CVE-2004-1050 - http://marc.info/?l=bugtraq&m=109942758911846&w=2 +CVE-2004-1052 - http://marc.info/?l=bugtraq&m=110011817627839&w=2 +CVE-2004-1056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795 +CVE-2004-1057 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-1060 - http://securityreason.com/securityalert/57 +CVE-2004-1060 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 +CVE-2004-1061 - https://bugzilla.mozilla.org/show_bug.cgi?id=272620 +CVE-2004-1070 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt +CVE-2004-1070 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450 +CVE-2004-1071 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt +CVE-2004-1071 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9917 +CVE-2004-1072 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt +CVE-2004-1073 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt +CVE-2004-1074 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9751 +CVE-2004-1075 - http://marc.info/?l=bugtraq&m=110138568212036&w=2 +CVE-2004-1075 - http://marc.info/?l=bugtraq&m=110149122529761&w=2 +CVE-2004-1080 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 +CVE-2004-1081 - http://www.securityfocus.com/bid/11802 +CVE-2004-1083 - http://www.securityfocus.com/bid/11802 +CVE-2004-1084 - http://www.securityfocus.com/bid/11802 +CVE-2004-1085 - http://www.securityfocus.com/bid/11802 +CVE-2004-1086 - http://www.securityfocus.com/bid/11802 +CVE-2004-1087 - http://www.securityfocus.com/bid/11802 +CVE-2004-1088 - http://www.securityfocus.com/bid/11802 +CVE-2004-1089 - http://www.securityfocus.com/bid/11802 +CVE-2004-1094 - http://www.networksecurity.fi/advisories/dtsearch.html +CVE-2004-1094 - http://www.networksecurity.fi/advisories/lotus-notes.html +CVE-2004-1094 - http://www.networksecurity.fi/advisories/mcafee-virusscan.html +CVE-2004-1094 - http://www.networksecurity.fi/advisories/multiledger.html +CVE-2004-1094 - http://www.networksecurity.fi/advisories/payroll.html +CVE-2004-1118 - http://marc.info/?l=bugtraq&m=110114233323417&w=2 +CVE-2004-1120 - http://bugs.gentoo.org/show_bug.cgi?id=70090 +CVE-2004-1127 - http://marc.info/?l=bugtraq&m=110144606411674&w=2 +CVE-2004-1137 - http://isec.pl/vulnerabilities/isec-0018-igmp.txt +CVE-2004-1138 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571 +CVE-2004-1139 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2004-1140 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2004-1141 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2004-1141 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9473 +CVE-2004-1142 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2004-1165 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645 +CVE-2004-1166 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2004-1183 - http://www.redhat.com/support/errata/RHSA-2005-019.html +CVE-2004-1183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9743 +CVE-2004-1184 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658 +CVE-2004-1190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9369 +CVE-2004-1193 - http://marc.info/?l=bugtraq&m=110118902823639&w=2 +CVE-2004-1193 - http://marc.info/?l=bugtraq&m=110138413816367&w=2 +CVE-2004-1196 - http://marc.info/?l=bugtraq&m=110140029419018&w=2 +CVE-2004-1197 - http://marc.info/?l=bugtraq&m=110140029419018&w=2 +CVE-2004-1207 - http://marc.info/?l=bugtraq&m=109651567308405&w=2 +CVE-2004-1208 - http://marc.info/?l=bugtraq&m=110176280402580&w=2 +CVE-2004-1210 - http://marc.info/?l=bugtraq&m=110197682705001&w=2 +CVE-2004-1214 - http://marc.info/?l=bugtraq&m=110201776207915&w=2 +CVE-2004-1215 - http://marc.info/?l=bugtraq&m=110201776207915&w=2 +CVE-2004-1216 - http://marc.info/?l=bugtraq&m=110201776207915&w=2 +CVE-2004-1218 - http://marc.info/?l=bugtraq&m=110238855010003&w=2 +CVE-2004-1219 - http://echo.or.id/adv/adv09-y3dips-2004.txt +CVE-2004-1219 - http://marc.info/?l=bugtraq&m=110245123927025&w=2 +CVE-2004-1220 - http://marc.info/?l=bugtraq&m=110244662102167&w=2 +CVE-2004-1224 - http://marc.info/?l=bugtraq&m=110279034910663&w=2 +CVE-2004-1229 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 +CVE-2004-1229 - http://www.man.poznan.pl/~security/gg-adv.txt +CVE-2004-1230 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 +CVE-2004-1230 - http://www.man.poznan.pl/~security/gg-adv.txt +CVE-2004-1231 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 +CVE-2004-1231 - http://www.man.poznan.pl/~security/gg-adv.txt +CVE-2004-1232 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 +CVE-2004-1232 - http://www.man.poznan.pl/~security/gg-adv.txt +CVE-2004-1233 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 +CVE-2004-1233 - http://www.man.poznan.pl/~security/gg-adv.txt +CVE-2004-1234 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-1235 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-1235 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567 +CVE-2004-1244 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009 +CVE-2004-1269 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9545 +CVE-2004-1287 - http://www.redhat.com/support/errata/RHSA-2005-381.html +CVE-2004-1305 - http://marc.info/?l=bugtraq&m=110382854111833&w=2 +CVE-2004-1305 - http://www.kb.cert.org/vuls/id/177584 +CVE-2004-1305 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 +CVE-2004-1306 - http://marc.info/?l=bugtraq&m=110383690219440&w=2 +CVE-2004-1308 - http://www.redhat.com/support/errata/RHSA-2005-019.html +CVE-2004-1308 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9392 +CVE-2004-1316 - http://isec.pl/vulnerabilities/isec-0020-mozilla.txt +CVE-2004-1316 - http://marc.info/?l=bugtraq&m=110436284718949&w=2 +CVE-2004-1316 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9808 +CVE-2004-1317 - http://marc.info/?l=bugtraq&m=110425875504586&w=2 +CVE-2004-1317 - http://marc.info/?l=bugtraq&m=110429204712327&w=2 +CVE-2004-1317 - http://www.hat-squad.com/en/000142.html +CVE-2004-1329 - http://marc.info/?l=bugtraq&m=110355931920123&w=2 +CVE-2004-1329 - https://www.exploit-db.com/exploits/701 +CVE-2004-1330 - http://marc.info/?l=bugtraq&m=110355931920123&w=2 +CVE-2004-1331 - http://securityreason.com/securityalert/3220 +CVE-2004-1335 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2004-1361 - http://marc.info/?l=bugtraq&m=110383690219440&w=2 +CVE-2004-1392 - http://marc.info/?l=bugtraq&m=109898213806099&w=2 +CVE-2004-1392 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279 +CVE-2004-1395 - http://aluigi.altervista.org/adv/lithsock-adv.txt +CVE-2004-1395 - http://marc.info/?l=bugtraq&m=110297515500671&w=2 +CVE-2004-1398 - http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt +CVE-2004-1399 - http://marc.info/?l=bugtraq&m=110304269031484&w=2 +CVE-2004-1401 - http://marc.info/?l=bugtraq&m=110305802005220&w=2 +CVE-2004-1402 - http://marc.info/?l=bugtraq&m=110314454810163&w=2 +CVE-2004-1403 - http://marc.info/?l=bugtraq&m=110313585810712&w=2 +CVE-2004-1414 - http://marc.info/?l=bugtraq&m=110357519312200&w=2 +CVE-2004-1415 - http://marc.info/?l=bugtraq&m=110375900916558&w=2 +CVE-2004-1419 - http://marc.info/?l=bugtraq&m=110391024404947&w=2 +CVE-2004-1423 - https://www.exploit-db.com/exploits/2608 +CVE-2004-1424 - http://marc.info/?l=bugtraq&m=110425409614735&w=2 +CVE-2004-1425 - http://marc.info/?l=bugtraq&m=110425409614735&w=2 +CVE-2004-1469 - http://marc.info/?l=bugtraq&m=109517782910407&w=2 +CVE-2004-1471 - http://security.e-matters.de/advisories/092004.html +CVE-2004-1475 - http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0 +CVE-2004-1476 - http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0 +CVE-2004-1487 - http://marc.info/?l=bugtraq&m=110269474112384&w=2 +CVE-2004-1488 - http://marc.info/?l=bugtraq&m=110269474112384&w=2 +CVE-2004-1488 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750 +CVE-2004-1492 - http://marc.info/?l=bugtraq&m=109889705116038&w=2 +CVE-2004-1493 - http://marc.info/?l=bugtraq&m=109889705116038&w=2 +CVE-2004-1501 - http://marc.info/?l=bugtraq&m=109976745017459&w=2 +CVE-2004-1502 - http://marc.info/?l=bugtraq&m=109976745017459&w=2 +CVE-2004-1504 - http://echo.or.id/adv/adv08-y3dips-2004.txt +CVE-2004-1504 - http://marc.info/?l=bugtraq&m=110004150430309&w=2 +CVE-2004-1505 - http://echo.or.id/adv/adv08-y3dips-2004.txt +CVE-2004-1505 - http://marc.info/?l=bugtraq&m=110004150430309&w=2 +CVE-2004-1506 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 +CVE-2004-1507 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 +CVE-2004-1508 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 +CVE-2004-1509 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 +CVE-2004-1510 - http://marc.info/?l=bugtraq&m=110011618724455&w=2 +CVE-2004-1517 - http://marc.info/?l=bugtraq&m=110020607924001&w=2 +CVE-2004-1518 - http://marc.info/?l=bugtraq&m=110021385926870&w=2 +CVE-2004-1528 - http://marc.info/?l=bugtraq&m=110064626111756&w=2 +CVE-2004-1528 - http://www.waraxe.us/index.php?modname=sa&id=38 +CVE-2004-1529 - http://marc.info/?l=bugtraq&m=110064626111756&w=2 +CVE-2004-1529 - http://www.waraxe.us/index.php?modname=sa&id=38 +CVE-2004-1530 - http://marc.info/?l=bugtraq&m=110064626111756&w=2 +CVE-2004-1530 - http://www.waraxe.us/index.php?modname=sa&id=38 +CVE-2004-1539 - http://marc.info/?l=bugtraq&m=110114770406920&w=2 +CVE-2004-1542 - http://marc.info/?l=bugtraq&m=110124208811327&w=2 +CVE-2004-1543 - http://www.securityfocus.com/bid/11744 +CVE-2004-1546 - http://marc.info/?l=bugtraq&m=109591179510781&w=2 +CVE-2004-1547 - http://aluigi.altervista.org/adv/actp-adv.txt +CVE-2004-1547 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 +CVE-2004-1548 - http://aluigi.altervista.org/adv/actp-adv.txt +CVE-2004-1548 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 +CVE-2004-1549 - http://aluigi.altervista.org/adv/actp-adv.txt +CVE-2004-1549 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 +CVE-2004-1552 - https://www.exploit-db.com/exploits/3546 +CVE-2004-1553 - https://www.exploit-db.com/exploits/6357 +CVE-2004-1553 - https://www.exploit-db.com/exploits/6420 +CVE-2004-1558 - http://marc.info/?l=bugtraq&m=109630699829536&w=2 +CVE-2004-1558 - http://www.hat-squad.com/en/000075.html +CVE-2004-1561 - http://aluigi.altervista.org/adv/iceexec-adv.txt +CVE-2004-1561 - http://marc.info/?l=bugtraq&m=109640005127644&w=2 +CVE-2004-1569 - http://marc.info/?l=bugtraq&m=109668542406346&w=2 +CVE-2004-1571 - http://echo.or.id/adv/adv07-y3dips-2004.txt +CVE-2004-1571 - http://marc.info/?l=bugtraq&m=109664986210763&w=2 +CVE-2004-1572 - http://echo.or.id/adv/adv07-y3dips-2004.txt +CVE-2004-1572 - http://marc.info/?l=bugtraq&m=109664986210763&w=2 +CVE-2004-1573 - http://echo.or.id/adv/adv07-y3dips-2004.txt +CVE-2004-1573 - http://marc.info/?l=bugtraq&m=109664986210763&w=2 +CVE-2004-1574 - http://aluigi.altervista.org/adv/vymesbof-adv.txt +CVE-2004-1574 - http://marc.info/?l=bugtraq&m=109665993315769&w=2 +CVE-2004-1585 - http://marc.info/?l=bugtraq&m=109716787607302&w=2 +CVE-2004-1586 - http://marc.info/?l=bugtraq&m=109716787607302&w=2 +CVE-2004-1587 - http://marc.info/?l=bugtraq&m=109728194025487&w=2 +CVE-2004-1587 - http://marc.info/?l=full-disclosure&m=109727077824860&w=2 +CVE-2004-1595 - http://marc.info/?l=bugtraq&m=109778648232233&w=2 +CVE-2004-1602 - http://marc.info/?l=bugtraq&m=109786760926133&w=2 +CVE-2004-1605 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1606 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1607 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1608 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1609 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1610 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1611 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1612 - http://marc.info/?l=bugtraq&m=109811852218478&w=2 +CVE-2004-1618 - http://aluigi.altervista.org/adv/toneboom-adv.txt +CVE-2004-1618 - http://marc.info/?l=bugtraq&m=109820344806472&w=2 +CVE-2004-1619 - http://marc.info/?l=bugtraq&m=109829017407842&w=2 +CVE-2004-1638 - http://marc.info/?l=bugtraq&m=109880961630050&w=2 +CVE-2004-1639 - http://marc.info/?l=bugtraq&m=109886388528179&w=2 +CVE-2004-1641 - http://marc.info/?l=bugtraq&m=109396159332523&w=2 +CVE-2004-1642 - http://marc.info/?l=bugtraq&m=109396193723317&w=2 +CVE-2004-1647 - http://marc.info/?l=bugtraq&m=109414967003192&w=2 +CVE-2004-1648 - http://marc.info/?l=bugtraq&m=109414967003192&w=2 +CVE-2004-1649 - http://marc.info/?l=bugtraq&m=109413415205017&w=2 +CVE-2004-1649 - http://marc.info/?l=full-disclosure&m=109391133831787&w=2 +CVE-2004-1662 - http://echo.or.id/adv/adv05-y3dips-2004.txt +CVE-2004-1662 - http://marc.info/?l=bugtraq&m=109441750900432&w=2 +CVE-2004-1664 - http://marc.info/?l=bugtraq&m=109449953200587&w=2 +CVE-2004-1667 - http://aluigi.altervista.org/adv/haloboom-adv.txt +CVE-2004-1667 - http://marc.info/?l=bugtraq&m=109479695022024&w=2 +CVE-2004-1668 - http://marc.info/?l=bugtraq&m=109483089621955&w=2 +CVE-2004-1676 - http://marc.info/?l=bugtraq&m=109508834910733&w=2 +CVE-2004-1688 - http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026515.html +CVE-2004-1688 - http://marc.info/?l=bugtraq&m=109543366631724&w=2 +CVE-2004-1695 - http://marc.info/?l=bugtraq&m=109577497718374&w=2 +CVE-2004-1696 - http://marc.info/?l=bugtraq&m=109577497718374&w=2 +CVE-2004-1698 - http://marc.info/?l=bugtraq&m=109581586128899&w=2 +CVE-2004-1699 - http://marc.info/?l=bugtraq&m=109589167110196&w=2 +CVE-2004-1701 - http://marc.info/?l=bugtraq&m=109208394910086&w=2 +CVE-2004-1701 - http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 +CVE-2004-1702 - http://marc.info/?l=bugtraq&m=109208394910086&w=2 +CVE-2004-1702 - http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 +CVE-2004-1705 - http://marc.info/?l=bugtraq&m=109121546120575&w=2 +CVE-2004-1705 - http://marc.info/?l=bugtraq&m=109146099404071&w=2 +CVE-2004-1716 - http://marc.info/?l=bugtraq&m=109267937212298&w=2 +CVE-2004-1723 - http://marc.info/?l=bugtraq&m=109285292901685&w=2 +CVE-2004-1724 - http://marc.info/?l=bugtraq&m=109285292901685&w=2 +CVE-2004-1727 - http://marc.info/?l=bugtraq&m=109309119502208&w=2 +CVE-2004-1738 - http://indohack.sourceforge.net/drponidi/jshop-vuln.txt +CVE-2004-1738 - http://marc.info/?l=bugtraq&m=109327547026265&w=2 +CVE-2004-1739 - http://marc.info/?l=bugtraq&m=109327938924287&w=2 +CVE-2004-1743 - http://marc.info/?l=bugtraq&m=109341398102863&w=2 +CVE-2004-1744 - http://marc.info/?l=bugtraq&m=109341398102863&w=2 +CVE-2004-1745 - http://marc.info/?l=bugtraq&m=109339761608821&w=2 +CVE-2004-1746 - http://marc.info/?l=bugtraq&m=109340580218818&w=2 +CVE-2004-1751 - http://aluigi.altervista.org/adv/gc2boom-adv.txt +CVE-2004-1751 - http://marc.info/?l=bugtraq&m=109357154602892&w=2 +CVE-2004-1752 - http://marc.info/?l=bugtraq&m=109364123707953&w=2 +CVE-2004-1761 - http://www.redhat.com/support/errata/RHSA-2004-136.html +CVE-2004-1763 - http://marc.info/?l=full-disclosure&m=108091662105032&w=2 +CVE-2004-1802 - http://aluigi.altervista.org/adv/chatany-ghost-adv.txt +CVE-2004-1802 - http://marc.info/?l=bugtraq&m=107885946220895&w=2 +CVE-2004-1805 - http://aluigi.altervista.org/adv/unrfs-adv.txt +CVE-2004-1805 - http://marc.info/?l=bugtraq&m=107893764406905&w=2 +CVE-2004-1831 - http://aluigi.altervista.org/adv/chrome-boom-adv.txt +CVE-2004-1831 - http://marc.info/?l=bugtraq&m=107964719614657&w=2 +CVE-2004-1837 - http://marc.info/?l=bugtraq&m=107997967421972&w=2 +CVE-2004-1850 - http://aluigi.altervista.org/adv/ragefreeze-adv.txt +CVE-2004-1850 - http://marc.info/?l=bugtraq&m=108006680013576&w=2 +CVE-2004-1853 - http://aluigi.altervista.org/adv/t3cbof-adv.txt +CVE-2004-1853 - http://marc.info/?l=bugtraq&m=108016076221855&w=2 +CVE-2004-1854 - http://aluigi.altervista.org/adv/picobof-adv.txt +CVE-2004-1854 - http://marc.info/?l=bugtraq&m=108016032220647&w=2 +CVE-2004-1868 - http://marc.info/?l=bugtraq&m=108025234317408&w=2 +CVE-2004-1868 - http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt +CVE-2004-1869 - http://aluigi.altervista.org/adv/ethboom-adv.txt +CVE-2004-1869 - http://marc.info/?l=bugtraq&m=108024309814423&w=2 +CVE-2004-1870 - http://marc.info/?l=bugtraq&m=108057790723123&w=2 +CVE-2004-1871 - http://marc.info/?l=bugtraq&m=108057790723123&w=2 +CVE-2004-1879 - http://marc.info/?l=bugtraq&m=108067894822358&w=2 +CVE-2004-1881 - http://marc.info/?l=bugtraq&m=108075059013762&w=2 +CVE-2004-1882 - http://marc.info/?l=bugtraq&m=108075059013762&w=2 +CVE-2004-1888 - http://marc.info/?l=bugtraq&m=108100973820868&w=2 +CVE-2004-1892 - http://marc.info/?l=bugtraq&m=108100987429960&w=2 +CVE-2004-1900 - http://aluigi.altervista.org/adv/igi2fs-adv.txt +CVE-2004-1900 - http://marc.info/?l=bugtraq&m=108120385811815&w=2 +CVE-2004-1903 - http://marc.info/?l=bugtraq&m=108127833002955&w=2 +CVE-2004-1904 - http://marc.info/?l=bugtraq&m=108130573130482&w=2 +CVE-2004-1905 - http://marc.info/?l=bugtraq&m=108130573130482&w=2 +CVE-2004-1906 - http://marc.info/?l=bugtraq&m=108136872711898&w=2 +CVE-2004-1907 - http://marc.info/?l=bugtraq&m=108137421524251&w=2 +CVE-2004-1908 - http://marc.info/?l=bugtraq&m=108136872711898&w=2 +CVE-2004-1908 - http://marc.info/?l=bugtraq&m=108137545531496&w=2 +CVE-2004-1910 - http://marc.info/?l=bugtraq&m=108136901406896&w=2 +CVE-2004-1915 - http://marc.info/?l=bugtraq&m=108145722229810&w=2 +CVE-2004-1916 - http://marc.info/?l=bugtraq&m=108146376315229&w=2 +CVE-2004-1917 - http://marc.info/?l=bugtraq&m=108146376315229&w=2 +CVE-2004-1918 - http://aluigi.altervista.org/adv/rsniff-adv.txt +CVE-2004-1918 - http://marc.info/?l=bugtraq&m=108152508004665&w=2 +CVE-2004-1938 - http://marc.info/?l=bugtraq&m=108239796512897&w=2 +CVE-2004-1938 - http://www.waraxe.us/index.php?modname=sa&id=19 +CVE-2004-1946 - http://marc.info/?l=bugtraq&m=108249818308672&w=2 +CVE-2004-1947 - http://marc.info/?l=bugtraq&m=108240639427412&w=2 +CVE-2004-1958 - http://aluigi.altervista.org/adv/umod-adv.txt +CVE-2004-1958 - http://marc.info/?l=bugtraq&m=108267310519459&w=2 +CVE-2004-1959 - http://marc.info/?l=bugtraq&m=108276299810121&w=2 +CVE-2004-1959 - http://www.waraxe.us/index.php?modname=sa&id=25 +CVE-2004-1960 - http://www.waraxe.us/index.php?modname=sa&id=25 +CVE-2004-1961 - http://www.waraxe.us/index.php?modname=sa&id=25 +CVE-2004-1962 - http://www.waraxe.us/index.php?modname=sa&id=25 +CVE-2004-1983 - http://marc.info/?l=bugtraq&m=108360001130312&w=2 +CVE-2004-1983 - http://marc.info/?l=bugtraq&m=108420555920369&w=2 +CVE-2004-2003 - http://marc.info/?l=bugtraq&m=108386181021070&w=2 +CVE-2004-2012 - http://marc.info/?l=bugtraq&m=108432258920570&w=2 +CVE-2004-2014 - http://www.securityfocus.com/bid/10361 +CVE-2004-2014 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9830 +CVE-2004-2017 - http://marc.info/?l=bugtraq&m=108481571131866&w=2 +CVE-2004-2017 - http://www.osvdb.org/6344 +CVE-2004-2023 - http://www.packetstormsecurity.org/0405-advisories/zencart112d.txt +CVE-2004-2033 - http://marc.info/?l=bugtraq&m=108559623703422&w=2 +CVE-2004-2037 - http://marc.info/?l=bugtraq&m=108577846011604&w=2 +CVE-2004-2038 - http://marc.info/?l=bugtraq&m=108585789220174&w=2 +CVE-2004-2056 - http://marc.info/?l=bugtraq&m=109087144509299&w=2 +CVE-2004-2057 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 +CVE-2004-2058 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 +CVE-2004-2059 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 +CVE-2004-2060 - http://marc.info/?l=bugtraq&m=109086977330418&w=2 +CVE-2004-2067 - http://www.jaws.com.mx/index.php?gadget=blog&action=single_view&id=10 +CVE-2004-2077 - http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml +CVE-2004-2099 - http://aluigi.altervista.org/adv/nfshp2cbof-adv.txt +CVE-2004-2099 - http://marc.info/?l=bugtraq&m=107479094508691&w=2 +CVE-2004-2100 - http://marc.info/?l=bugtraq&m=107480261825214&w=2 +CVE-2004-2101 - http://marc.info/?l=bugtraq&m=107480261825214&w=2 +CVE-2004-2110 - http://marc.info/?l=bugtraq&m=107487971405960&w=2 +CVE-2004-2114 - http://marc.info/?l=bugtraq&m=107515550931508&w=2 +CVE-2004-2116 - http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html +CVE-2004-2125 - http://marc.info/?l=bugtraq&m=107530966524193&w=2 +CVE-2004-2126 - http://marc.info/?l=bugtraq&m=107530966524193&w=2 +CVE-2004-2137 - http://www.networksecurity.fi/advisories/outlook-bcc.html +CVE-2004-2154 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9940 +CVE-2004-2157 - http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html +CVE-2004-2158 - http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html +CVE-2004-2165 - http://aluigi.altervista.org/adv/lotr3boom-adv.txt +CVE-2004-2165 - http://seclists.org/lists/fulldisclosure/2004/Sep/0660.html +CVE-2004-2262 - https://www.exploit-db.com/exploits/704 +CVE-2004-2274 - http://www.w3.org/Jigsaw/RelNotes.html#2.2.4 +CVE-2004-2289 - http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm +CVE-2004-2289 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015 +CVE-2004-2300 - http://www.packetstormsecurity.org/0405-advisories/snmpdadv.txt +CVE-2004-2360 - http://aluigi.altervista.org/adv/battlemages-adv.txt +CVE-2004-2361 - http://aluigi.altervista.org/adv/hgmcrash-adv.txt +CVE-2004-2361 - http://marc.info/?l=bugtraq&m=107764783411414&w=2 +CVE-2004-2366 - http://www.cuteftp.com/gsftps/history.asp +CVE-2004-2371 - http://aluigi.altervista.org/adv/grboom-adv.txt +CVE-2004-2432 - http://www.packetstormsecurity.org/0406-exploits/WinAgentsTFTP.txt +CVE-2004-2449 - http://aluigi.altervista.org/adv/wilco-again-adv.txt +CVE-2004-2466 - http://packetstormsecurity.com/files/167892/Easy-Chat-Server-3.1-Buffer-Overflow.html +CVE-2004-2466 - https://www.exploit-db.com/exploits/4289 +CVE-2004-2468 - http://www.osvdb.org/4755 +CVE-2004-2479 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9711 +CVE-2004-2489 - http://marc.info/?l=bugtraq&m=107524391217364&w=2 +CVE-2004-2490 - http://marc.info/?l=bugtraq&m=107524391217364&w=2 +CVE-2004-2501 - http://www.hat-squad.com/en/000102.html +CVE-2004-2502 - http://packetstormsecurity.org/0407-advisories/fedora_im-switch_tempfile_race.txt +CVE-2004-2513 - https://www.exploit-db.com/exploits/663 +CVE-2004-2529 - http://marc.info/?l=bugtraq&m=110295777306493&w=2 +CVE-2004-2529 - http://www.man.poznan.pl/~security/gg-adv.txt +CVE-2004-2547 - http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt +CVE-2004-2548 - http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt +CVE-2004-2553 - http://cvs.sourceforge.net/viewcvs.py/ignition/ignitionserver/docs/security/20040302-operator-privilege-escalation.txt?view=markup +CVE-2004-2616 - http://aluigi.altervista.org/adv/actp-adv.txt +CVE-2004-2616 - http://marc.info/?l=bugtraq&m=109597139011373&w=2 +CVE-2004-2622 - http://www.securityfocus.com/bid/11498 +CVE-2004-2627 - http://www.theregister.co.uk/2004/10/22/mobile_java_peril/ +CVE-2004-2643 - http://packetstormsecurity.org/0410-exploits/cabarc.txt +CVE-2004-2646 - http://marc.info/?l=bugtraq&m=109164397601049&w=2 +CVE-2004-2647 - http://marc.info/?l=bugtraq&m=109164397601049&w=2 +CVE-2004-2670 - http://echo.or.id/adv/adv02-y3dips-2004.txt +CVE-2004-2671 - http://echo.or.id/adv/adv02-y3dips-2004.txt +CVE-2004-2685 - https://www.exploit-db.com/exploits/4360 +CVE-2004-2685 - https://www.exploit-db.com/exploits/621 +CVE-2004-2695 - http://www.vbulletin.com/forum/bugs.php?do=view&bugid=3379 +CVE-2004-2719 - https://www.exploit-db.com/exploits/164 +CVE-2004-2720 - http://securityreason.com/securityalert/3200 +CVE-2004-2720 - http://www.sec-tec.co.uk/vulnerability/snitzxss.html +CVE-2004-2721 - http://freshmeat.net/projects/openskat/?branch_id=36295&release_id=178549 +CVE-2004-2738 - http://marc.info/?l=bugtraq&m=110391024404947&w=2 +CVE-2004-2754 - http://securityreason.com/securityalert/3371 +CVE-2004-2760 - http://securityreason.com/securityalert/4100 +CVE-2004-2761 - http://securityreason.com/securityalert/4866 +CVE-2004-2761 - http://www.phreedom.org/research/rogue-ca/ +CVE-2004-2761 - http://www.ubuntu.com/usn/usn-740-1 +CVE-2004-2761 - http://www.win.tue.nl/hashclash/SoftIntCodeSign/ +CVE-2004-2761 - http://www.win.tue.nl/hashclash/rogue-ca/ +CVE-2004-2776 - https://github.com/mikaku/Monitorix/issues/30 +CVE-2005-0001 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2005-0003 - http://www.redhat.com/support/errata/RHSA-2005-017.html +CVE-2005-0003 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512 +CVE-2005-0005 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9925 +CVE-2005-0006 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2005-0007 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2005-0008 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2005-0009 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2005-0010 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2005-0010 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9521 +CVE-2005-0021 - http://www.redhat.com/support/errata/RHSA-2005-025.html +CVE-2005-0022 - http://marc.info/?l=bugtraq&m=110824870908614&w=2 +CVE-2005-0022 - http://www.redhat.com/support/errata/RHSA-2005-025.html +CVE-2005-0023 - http://bugzilla.gnome.org/show_bug.cgi?id=317312 +CVE-2005-0040 - http://www.securityfocus.com/bid/13646 +CVE-2005-0044 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-012 +CVE-2005-0045 - http://www.securityfocus.com/bid/12484 +CVE-2005-0045 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-011 +CVE-2005-0047 - http://marc.info/?l=bugtraq&m=111755870828817&w=2 +CVE-2005-0047 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-012 +CVE-2005-0047 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A901 +CVE-2005-0048 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 +CVE-2005-0049 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-006 +CVE-2005-0050 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-010 +CVE-2005-0051 - http://www.securityfocus.com/bid/12486 +CVE-2005-0051 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-007 +CVE-2005-0053 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 +CVE-2005-0054 - http://marc.info/?l=bugtraq&m=110796851002781&w=2 +CVE-2005-0054 - http://www.kb.cert.org/vuls/id/580299 +CVE-2005-0054 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 +CVE-2005-0055 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 +CVE-2005-0056 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 +CVE-2005-0057 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-015 +CVE-2005-0058 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040 +CVE-2005-0059 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-017 +CVE-2005-0060 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 +CVE-2005-0061 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 +CVE-2005-0063 - http://marc.info/?l=bugtraq&m=111755356016155&w=2 +CVE-2005-0063 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-016 +CVE-2005-0069 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402 +CVE-2005-0075 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9587 +CVE-2005-0078 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9260 +CVE-2005-0084 - http://www.redhat.com/support/errata/RHSA-2005-037.html +CVE-2005-0084 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9140 +CVE-2005-0089 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9811 +CVE-2005-0100 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408 +CVE-2005-0102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9616 +CVE-2005-0108 - http://marc.info/?l=bugtraq&m=110548193312050&w=2 +CVE-2005-0109 - http://www.daemonology.net/hyperthreading-considered-harmful/ +CVE-2005-0109 - http://www.kb.cert.org/vuls/id/911878 +CVE-2005-0109 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747 +CVE-2005-0116 - http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf +CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2004/Dec/3914.html +CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2005/Jan/1089.html +CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2005/Jan/2018.html +CVE-2005-0124 - http://seclists.org/lists/linux-kernel/2005/Jan/2020.html +CVE-2005-0124 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-0135 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0135 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9040 +CVE-2005-0142 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9543 +CVE-2005-0147 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9578 +CVE-2005-0179 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9890 +CVE-2005-0182 - http://marc.info/?l=bugtraq&m=110547469530582&w=2 +CVE-2005-0183 - http://marc.info/?l=bugtraq&m=110549426300953&w=2 +CVE-2005-0184 - http://marc.info/?l=bugtraq&m=110549426300953&w=2 +CVE-2005-0193 - http://marc.info/?l=bugtraq&m=110642400018425&w=2 +CVE-2005-0202 - http://www.redhat.com/support/errata/RHSA-2005-136.html +CVE-2005-0205 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9596 +CVE-2005-0207 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0209 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0211 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9573 +CVE-2005-0212 - http://aluigi.altervista.org/adv/amp2zero-adv.txt +CVE-2005-0212 - http://marc.info/?l=bugtraq&m=110503597505648&w=2 +CVE-2005-0213 - http://marc.info/?l=bugtraq&m=110505334903257&w=2 +CVE-2005-0215 - http://marc.info/?l=bugtraq&m=110512665029209&w=2 +CVE-2005-0216 - http://marc.info/?l=bugtraq&m=110537385427004&w=2 +CVE-2005-0218 - http://seclists.org/lists/fulldisclosure/2005/Jan/0332.html +CVE-2005-0229 - http://marc.info/?l=full-disclosure&m=110824766519417&w=2 +CVE-2005-0229 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-001.txt +CVE-2005-0230 - http://marc.info/?l=bugtraq&m=110780995232064&w=2 +CVE-2005-0230 - https://bugzilla.mozilla.org/show_bug.cgi?id=279945 +CVE-2005-0231 - http://marc.info/?l=bugtraq&m=110781134617144&w=2 +CVE-2005-0232 - http://marc.info/?l=bugtraq&m=110781055630856&w=2 +CVE-2005-0233 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 +CVE-2005-0234 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 +CVE-2005-0235 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 +CVE-2005-0236 - http://marc.info/?l=bugtraq&m=110782704923280&w=2 +CVE-2005-0247 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9345 +CVE-2005-0251 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 +CVE-2005-0251 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 +CVE-2005-0252 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 +CVE-2005-0252 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 +CVE-2005-0253 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 +CVE-2005-0253 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 +CVE-2005-0254 - http://marc.info/?l=bugtraq&m=110868948719773&w=2 +CVE-2005-0254 - http://marc.info/?l=full-disclosure&m=110864983905770&w=2 +CVE-2005-0255 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9111 +CVE-2005-0273 - http://marc.info/?l=bugtraq&m=110486165802196&w=2 +CVE-2005-0274 - http://marc.info/?l=bugtraq&m=110486165802196&w=2 +CVE-2005-0279 - http://marc.info/?l=bugtraq&m=110486654213504&w=2 +CVE-2005-0280 - http://marc.info/?l=bugtraq&m=110486654213504&w=2 +CVE-2005-0281 - http://marc.info/?l=bugtraq&m=110486654213504&w=2 +CVE-2005-0282 - http://marc.info/?l=bugtraq&m=110486566600980&w=2 +CVE-2005-0290 - http://marc.info/?l=bugtraq&m=110599727631560&w=2 +CVE-2005-0291 - http://marc.info/?l=bugtraq&m=110599727631560&w=2 +CVE-2005-0295 - http://marc.info/?l=bugtraq&m=110608422029555&w=2 +CVE-2005-0299 - http://marc.info/?l=bugtraq&m=110627132209963&w=2 +CVE-2005-0300 - http://marc.info/?l=bugtraq&m=110627201120011&w=2 +CVE-2005-0304 - http://aluigi.altervista.org/adv/divxplayer-adv.txt +CVE-2005-0304 - http://marc.info/?l=bugtraq&m=110642748517854&w=2 +CVE-2005-0308 - http://marc.info/?l=bugtraq&m=110661194108205&w=2 +CVE-2005-0309 - http://marc.info/?l=bugtraq&m=110666998407073&w=2 +CVE-2005-0310 - http://marc.info/?l=bugtraq&m=110666998407073&w=2 +CVE-2005-0312 - http://marc.info/?l=bugtraq&m=110687202332039&w=2 +CVE-2005-0316 - http://marc.info/?l=bugtraq&m=110693045507245&w=2 +CVE-2005-0316 - http://www.oliverkarow.de/research/WebWasherCONNECT.txt +CVE-2005-0325 - http://aluigi.altervista.org/adv/xprallyboom-adv.txt +CVE-2005-0325 - http://marc.info/?l=bugtraq&m=110720064811485&w=2 +CVE-2005-0330 - http://aluigi.altervista.org/adv/painkkeybof-adv.txt +CVE-2005-0330 - http://marc.info/?l=bugtraq&m=110736915015707&w=2 +CVE-2005-0332 - http://marc.info/?l=bugtraq&m=110737616324614&w=2 +CVE-2005-0333 - http://marc.info/?l=bugtraq&m=110746524021133&w=2 +CVE-2005-0339 - http://marc.info/?l=bugtraq&m=110763204301080&w=2 +CVE-2005-0340 - http://marc.info/?l=bugtraq&m=110791369419784&w=2 +CVE-2005-0343 - http://marc.info/?l=bugtraq&m=110782042532295&w=2 +CVE-2005-0345 - http://www.securityfocus.com/bid/12482 +CVE-2005-0347 - http://marc.info/?l=bugtraq&m=110792779115794&w=2 +CVE-2005-0348 - http://marc.info/?l=bugtraq&m=110792779115794&w=2 +CVE-2005-0353 - http://marc.info/?l=full-disclosure&m=111072872816405&w=2 +CVE-2005-0369 - http://marc.info/?l=bugtraq&m=110811699206052&w=2 +CVE-2005-0370 - http://marc.info/?l=bugtraq&m=110811699206052&w=2 +CVE-2005-0371 - http://marc.info/?l=bugtraq&m=110811699206052&w=2 +CVE-2005-0372 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9923 +CVE-2005-0374 - http://marc.info/?l=bugtraq&m=110555988111899&w=2 +CVE-2005-0375 - http://marc.info/?l=bugtraq&m=110557050700947&w=2 +CVE-2005-0375 - http://www.waraxe.us/advisory-39.html +CVE-2005-0376 - http://marc.info/?l=bugtraq&m=110557050700947&w=2 +CVE-2005-0376 - http://www.waraxe.us/advisory-39.html +CVE-2005-0377 - http://marc.info/?l=bugtraq&m=110557050700947&w=2 +CVE-2005-0377 - http://www.waraxe.us/advisory-39.html +CVE-2005-0379 - http://marc.info/?l=bugtraq&m=110565373407474&w=2 +CVE-2005-0380 - http://marc.info/?l=bugtraq&m=110565373407474&w=2 +CVE-2005-0382 - http://marc.info/?l=bugtraq&m=110565587010998&w=2 +CVE-2005-0384 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0384 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562 +CVE-2005-0400 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0401 - http://marc.info/?l=bugtraq&m=111168413007891&w=2 +CVE-2005-0401 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9650 +CVE-2005-0403 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435 +CVE-2005-0404 - http://bugs.kde.org/show_bug.cgi?id=96020 +CVE-2005-0406 - http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html +CVE-2005-0406 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt +CVE-2005-0407 - http://seclists.org/lists/fulldisclosure/2005/Feb/0347.html +CVE-2005-0407 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-007.txt +CVE-2005-0408 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt +CVE-2005-0409 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-003.txt +CVE-2005-0410 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-004.txt +CVE-2005-0411 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-005.txt +CVE-2005-0413 - https://www.exploit-db.com/exploits/4822 +CVE-2005-0414 - http://marc.info/?l=bugtraq&m=110797495532358&w=2 +CVE-2005-0416 - http://marc.info/?l=bugtraq&m=110556975827760&w=2 +CVE-2005-0416 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 +CVE-2005-0419 - http://marc.info/?l=bugtraq&m=110780306326130&w=2 +CVE-2005-0430 - http://aluigi.altervista.org/adv/q3infoboom-adv.txt +CVE-2005-0430 - http://marc.info/?l=bugtraq&m=110824822224025&w=2 +CVE-2005-0449 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0468 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9640 +CVE-2005-0469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708 +CVE-2005-0476 - http://marc.info/?l=bugtraq&m=110869187805397&w=2 +CVE-2005-0492 - http://marc.info/?l=bugtraq&m=110879063511486&w=2 +CVE-2005-0501 - http://aluigi.altervista.org/adv/bontagobof-adv.txt +CVE-2005-0504 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9770 +CVE-2005-0511 - http://marc.info/?l=bugtraq&m=110910899415763&w=2 +CVE-2005-0519 - http://www.securityfocus.com/bid/12487 +CVE-2005-0524 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9310 +CVE-2005-0526 - http://marc.info/?l=bugtraq&m=110917641105486&w=2 +CVE-2005-0526 - http://marc.info/?l=bugtraq&m=110917702708589&w=2 +CVE-2005-0526 - http://marc.info/?l=bugtraq&m=110917768511595&w=2 +CVE-2005-0527 - http://marc.info/?l=bugtraq&m=110935267500395&w=2 +CVE-2005-0529 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0530 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0531 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0550 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 +CVE-2005-0551 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 +CVE-2005-0553 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 +CVE-2005-0554 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 +CVE-2005-0555 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 +CVE-2005-0558 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-023 +CVE-2005-0560 - http://marc.info/?l=bugtraq&m=111393947713420&w=2 +CVE-2005-0563 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-029 +CVE-2005-0568 - http://aluigi.altervista.org/adv/sof2guidboom-adv.txt +CVE-2005-0568 - http://marc.info/?l=bugtraq&m=110927288423807&w=2 +CVE-2005-0569 - http://marc.info/?l=bugtraq&m=110927754230666&w=2 +CVE-2005-0570 - http://marc.info/?l=bugtraq&m=110927754230666&w=2 +CVE-2005-0571 - http://marc.info/?l=bugtraq&m=110927754230666&w=2 +CVE-2005-0575 - http://marc.info/?l=bugtraq&m=110943766505666&w=2 +CVE-2005-0575 - http://www.exploit-db.com/exploits/24950 +CVE-2005-0585 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9924 +CVE-2005-0591 - http://marc.info/?l=bugtraq&m=110547286002188&w=2 +CVE-2005-0591 - https://bugzilla.mozilla.org/show_bug.cgi?id=260560 +CVE-2005-0593 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9533 +CVE-2005-0597 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml +CVE-2005-0598 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml +CVE-2005-0599 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml +CVE-2005-0600 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml +CVE-2005-0601 - http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml +CVE-2005-0606 - http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html +CVE-2005-0607 - http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html +CVE-2005-0619 - https://www.exploit-db.com/exploits/846 +CVE-2005-0621 - http://aluigi.altervista.org/adv/scrapboom-adv.txt +CVE-2005-0621 - http://marc.info/?l=full-disclosure&m=110961578504928&w=2 +CVE-2005-0628 - http://marc.info/?l=bugtraq&m=110971101826900&w=2 +CVE-2005-0629 - http://marc.info/?l=bugtraq&m=110970474726113&w=2 +CVE-2005-0629 - http://marc.info/?l=bugtraq&m=110970911514167&w=2 +CVE-2005-0630 - http://marc.info/?l=bugtraq&m=110971002211589&w=2 +CVE-2005-0631 - http://marc.info/?l=bugtraq&m=110970738214608&w=2 +CVE-2005-0632 - http://marc.info/?l=bugtraq&m=110989169008570&w=2 +CVE-2005-0633 - http://marc.info/?l=bugtraq&m=111023000624809&w=2 +CVE-2005-0638 - http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf +CVE-2005-0658 - http://marc.info/?l=bugtraq&m=110995289619649&w=2 +CVE-2005-0671 - http://aluigi.altervista.org/adv/ca3dex-adv.txt +CVE-2005-0672 - http://aluigi.altervista.org/adv/ca3dex-adv.txt +CVE-2005-0688 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 +CVE-2005-0688 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064 +CVE-2005-0693 - http://aluigi.altervista.org/adv/chasercool-adv.txt +CVE-2005-0696 - http://securityreason.com/securityalert/494 +CVE-2005-0699 - http://marc.info/?l=bugtraq&m=111083125521813&w=2 +CVE-2005-0709 - http://marc.info/?l=bugtraq&m=111066115808506&w=2 +CVE-2005-0710 - http://marc.info/?l=bugtraq&m=111065974004648&w=2 +CVE-2005-0711 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591 +CVE-2005-0726 - http://marc.info/?l=bugtraq&m=111056135818279&w=2 +CVE-2005-0729 - http://aluigi.altervista.org/adv/xprallyfs-adv.txt +CVE-2005-0736 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0736 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870 +CVE-2005-0739 - http://marc.info/?l=bugtraq&m=111066805726551&w=2 +CVE-2005-0739 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687 +CVE-2005-0749 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0750 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0753 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9688 +CVE-2005-0758 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797 +CVE-2005-0762 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9736 +CVE-2005-0766 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9866 +CVE-2005-0767 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0768 - http://marc.info/?l=bugtraq&m=111092012415193&w=2 +CVE-2005-0770 - http://marc.info/?l=bugtraq&m=111100269512216&w=2 +CVE-2005-0770 - http://pb.specialised.info/all/adv/ida-debugger-adv.txt +CVE-2005-0774 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 +CVE-2005-0775 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 +CVE-2005-0776 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 +CVE-2005-0777 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 +CVE-2005-0778 - http://marc.info/?l=bugtraq&m=111065868402859&w=2 +CVE-2005-0782 - http://marc.info/?l=bugtraq&m=111221940107161&w=2 +CVE-2005-0786 - http://marc.info/?l=bugtraq&m=111082702422979&w=2 +CVE-2005-0790 - http://securityreason.com/adv/%5BphpAdsNew%202.0.4-pr1%20Multiple%20vulnerabilities%20cXIb8O3.9%5D.asc +CVE-2005-0791 - http://securityreason.com/adv/%5BphpAdsNew%202.0.4-pr1%20Multiple%20vulnerabilities%20cXIb8O3.9%5D.asc +CVE-2005-0799 - http://marc.info/?l=bugtraq&m=111091250923281&w=2 +CVE-2005-0803 - http://marc.info/?l=bugtraq&m=111108743527497&w=2 +CVE-2005-0803 - http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf +CVE-2005-0803 - http://www.kb.cert.org/vuls/id/134756 +CVE-2005-0803 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 +CVE-2005-0804 - http://marc.info/?l=bugtraq&m=111108519331738&w=2 +CVE-2005-0815 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0815 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9307 +CVE-2005-0826 - http://marc.info/?l=bugtraq&m=111125734701262&w=2 +CVE-2005-0836 - http://jouko.iki.fi/adv/ws.html +CVE-2005-0836 - http://marc.info/?l=full-disclosure&m=111117284323657&w=2 +CVE-2005-0839 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0839 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9460 +CVE-2005-0841 - http://marc.info/?l=bugtraq&m=111143649730845&w=2 +CVE-2005-0847 - https://www.exploit-db.com/exploits/893 +CVE-2005-0848 - http://aluigi.altervista.org/adv/funlabsboom-adv.txt +CVE-2005-0849 - http://aluigi.altervista.org/adv/funlabsboom-adv.txt +CVE-2005-0853 - https://www.exploit-db.com/exploits/7499 +CVE-2005-0859 - https://www.exploit-db.com/exploits/2009 +CVE-2005-0867 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0876 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2005-0877 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2005-0891 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710 +CVE-2005-0894 - http://marc.info/?l=bugtraq&m=111176899423078&w=2 +CVE-2005-0897 - http://marc.info/?l=bugtraq&m=111186424600509&w=2 +CVE-2005-0898 - http://marc.info/?l=bugtraq&m=111186424600509&w=2 +CVE-2005-0905 - http://marc.info/?l=full-disclosure&m=111175236620942&w=2 +CVE-2005-0906 - http://aluigi.altervista.org/adv/tincat2bof-adv.txt +CVE-2005-0919 - http://exploitlabs.com/files/advisories/EXPL-A-2005-003-adventiachat.txt +CVE-2005-0919 - http://marc.info/?l=full-disclosure&m=111211930330410&w=2 +CVE-2005-0924 - http://exploitlabs.com/files/advisories/EXPL-A-2005-004-edata.txt +CVE-2005-0924 - http://marc.info/?l=full-disclosure&m=111211945505635&w=2 +CVE-2005-0928 - http://marc.info/?l=bugtraq&m=111205342909640&w=2 +CVE-2005-0929 - http://marc.info/?l=bugtraq&m=111205342909640&w=2 +CVE-2005-0935 - http://marc.info/?l=bugtraq&m=111221890614271&w=2 +CVE-2005-0936 - http://marc.info/?l=bugtraq&m=111221890614271&w=2 +CVE-2005-0941 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9106 +CVE-2005-0948 - http://marc.info/?l=bugtraq&m=111213291118273&w=2 +CVE-2005-0949 - http://marc.info/?l=bugtraq&m=111213291118273&w=2 +CVE-2005-0952 - http://marc.info/?l=bugtraq&m=111221940107161&w=2 +CVE-2005-0955 - http://marc.info/?l=bugtraq&m=111230101127767&w=2 +CVE-2005-0956 - http://marc.info/?l=bugtraq&m=111230101127767&w=2 +CVE-2005-0966 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9185 +CVE-2005-0967 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9657 +CVE-2005-0977 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-0979 - http://marc.info/?l=bugtraq&m=111238364916500&w=2 +CVE-2005-0980 - http://marc.info/?l=bugtraq&m=111247198021626&w=2 +CVE-2005-0981 - http://marc.info/?l=bugtraq&m=111247198021626&w=2 +CVE-2005-0983 - http://aluigi.altervista.org/adv/q3msgboom-adv.txt +CVE-2005-0983 - http://marc.info/?l=bugtraq&m=111246796918067&w=2 +CVE-2005-0984 - http://aluigi.altervista.org/adv/jamsgbof-adv.txt +CVE-2005-0984 - http://marc.info/?l=bugtraq&m=111246855213653&w=2 +CVE-2005-0989 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-0990 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9613 +CVE-2005-0992 - http://www.arrelnet.com/advisories/adv20050403.html +CVE-2005-10001 - https://vuldb.com/?id.1022 +CVE-2005-1003 - http://marc.info/?l=bugtraq&m=111264602406090&w=2 +CVE-2005-1004 - http://marc.info/?l=bugtraq&m=111264602406090&w=2 +CVE-2005-1005 - http://marc.info/?l=bugtraq&m=111264602406090&w=2 +CVE-2005-1007 - http://www.stalker.com/CommuniGatePro/History.html +CVE-2005-1009 - http://www.hat-squad.com/en/000164.html +CVE-2005-1009 - http://www.hat-squad.com/en/000165.html +CVE-2005-1013 - http://marc.info/?l=bugtraq&m=111273637518494&w=2 +CVE-2005-1019 - http://marc.info/?l=bugtraq&m=111262942708249&w=2 +CVE-2005-1023 - http://www.securityreason.com/adv/PHPNuke%206.x-7.6-p1.txt +CVE-2005-1024 - http://www.securityreason.com/adv/PHPNuke%206.x-7.6-p1.txt +CVE-2005-1029 - http://marc.info/?l=bugtraq&m=111280834000432&w=2 +CVE-2005-1030 - http://marc.info/?l=bugtraq&m=111280834000432&w=2 +CVE-2005-1041 - http://www.redhat.com/support/errata/RHSA-2005-366.html +CVE-2005-1041 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9487 +CVE-2005-1046 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5802 +CVE-2005-1048 - http://marc.info/?l=bugtraq&m=111298226029957&w=2 +CVE-2005-1049 - http://marc.info/?l=bugtraq&m=111298226029957&w=2 +CVE-2005-1050 - http://marc.info/?l=bugtraq&m=111298226029957&w=2 +CVE-2005-1051 - http://marc.info/?l=bugtraq&m=111306207306155&w=2 +CVE-2005-1055 - http://marc.info/?l=bugtraq&m=111323802003019&w=2 +CVE-2005-1071 - http://marc.info/?l=bugtraq&m=111331738223323&w=2 +CVE-2005-1077 - http://marc.info/?l=full-disclosure&m=111330048629182&w=2 +CVE-2005-1078 - http://marc.info/?l=full-disclosure&m=111330048629182&w=2 +CVE-2005-1079 - http://marc.info/?l=bugtraq&m=111340031132596&w=2 +CVE-2005-1099 - http://marc.info/?l=bugtraq&m=111339935903880&w=2 +CVE-2005-1100 - http://marc.info/?l=bugtraq&m=111339935903880&w=2 +CVE-2005-1111 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9783 +CVE-2005-1113 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 +CVE-2005-1114 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 +CVE-2005-1115 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 +CVE-2005-1116 - http://marc.info/?l=bugtraq&m=111343406309969&w=2 +CVE-2005-1134 - http://seclists.org/lists/bugtraq/2005/Apr/0195.html +CVE-2005-1141 - http://marc.info/?l=bugtraq&m=111358557823673&w=2 +CVE-2005-1142 - http://marc.info/?l=bugtraq&m=111358557823673&w=2 +CVE-2005-1143 - http://www.snkenjoi.com/secadv/secadv4.txt +CVE-2005-1144 - http://www.snkenjoi.com/secadv/secadv4.txt +CVE-2005-1145 - http://www.snkenjoi.com/secadv/secadv3.txt +CVE-2005-1146 - http://www.snkenjoi.com/secadv/secadv3.txt +CVE-2005-1147 - http://www.snkenjoi.com/secadv/secadv3.txt +CVE-2005-1148 - http://www.snkenjoi.com/secadv/secadv3.txt +CVE-2005-1153 - http://www.mozilla.org/security/announce/mfsa2005-35.html +CVE-2005-1153 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9584 +CVE-2005-1155 - https://bugzilla.mozilla.org/show_bug.cgi?id=290036 +CVE-2005-1157 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9961 +CVE-2005-1158 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100019 +CVE-2005-1159 - http://www.mozilla.org/security/announce/mfsa2005-40.html +CVE-2005-1159 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-1160 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-1161 - http://marc.info/?l=bugtraq&m=111352017704126&w=2 +CVE-2005-1162 - http://marc.info/?l=bugtraq&m=111352017704126&w=2 +CVE-2005-1163 - http://aluigi.altervista.org/adv/yagerbof-adv.txt +CVE-2005-1163 - http://marc.info/?l=bugtraq&m=111352154820865&w=2 +CVE-2005-1164 - http://aluigi.altervista.org/adv/yagerbof-adv.txt +CVE-2005-1164 - http://marc.info/?l=bugtraq&m=111352154820865&w=2 +CVE-2005-1165 - http://aluigi.altervista.org/adv/yagerbof-adv.txt +CVE-2005-1165 - http://marc.info/?l=bugtraq&m=111352154820865&w=2 +CVE-2005-1173 - http://marc.info/?l=bugtraq&m=111384806002021&w=2 +CVE-2005-1175 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902 +CVE-2005-1180 - http://marc.info/?l=bugtraq&m=111359804013536&w=2 +CVE-2005-1184 - http://seclists.org/lists/fulldisclosure/2005/Apr/0358.html +CVE-2005-1191 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-024 +CVE-2005-1192 - http://securityreason.com/securityalert/262 +CVE-2005-1192 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A935 +CVE-2005-1193 - http://www.kb.cert.org/vuls/id/113196 +CVE-2005-1194 - http://www.redhat.com/support/errata/RHSA-2005-381.html +CVE-2005-1199 - http://marc.info/?l=bugtraq&m=111393619021575&w=2 +CVE-2005-1205 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-033 +CVE-2005-1206 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-027 +CVE-2005-1207 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-028 +CVE-2005-1208 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-026 +CVE-2005-1211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-025 +CVE-2005-1212 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-031 +CVE-2005-1213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-030 +CVE-2005-1213 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A989 +CVE-2005-1214 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-032 +CVE-2005-1214 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A906 +CVE-2005-1215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 +CVE-2005-1216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-034 +CVE-2005-1218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041 +CVE-2005-1220 - http://marc.info/?l=bugtraq&m=111402253108991&w=2 +CVE-2005-1223 - http://marc.info/?l=bugtraq&m=111401502007772&w=2 +CVE-2005-1224 - http://marc.info/?l=bugtraq&m=111401172901705&w=2 +CVE-2005-1233 - http://www.snkenjoi.com/secadv/secadv7.txt +CVE-2005-1234 - http://www.snkenjoi.com/secadv/secadv9.txt +CVE-2005-1235 - http://www.snkenjoi.com/secadv/secadv9.txt +CVE-2005-1237 - https://www.exploit-db.com/exploits/3631 +CVE-2005-1263 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-1267 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 +CVE-2005-1268 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9589 +CVE-2005-1269 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9544 +CVE-2005-1275 - http://seclists.org/lists/bugtraq/2005/Apr/0407.html +CVE-2005-1275 - http://www.imagemagick.org/script/changelog.php +CVE-2005-1279 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9601 +CVE-2005-1286 - http://marc.info/?l=bugtraq&m=111420400316397&w=2 +CVE-2005-1287 - http://marc.info/?l=bugtraq&m=111428133317901&w=2 +CVE-2005-1291 - http://marc.info/?l=bugtraq&m=111428393022389&w=2 +CVE-2005-1292 - http://marc.info/?l=bugtraq&m=111428393022389&w=2 +CVE-2005-1293 - http://marc.info/?l=bugtraq&m=111445131808328&w=2 +CVE-2005-1294 - http://marc.info/?l=bugtraq&m=111445064725591&w=2 +CVE-2005-1294 - http://www.digitalmunition.com/DMA%5B2005-0423a%5D.txt +CVE-2005-1306 - http://www.securityfocus.com/bid/13962 +CVE-2005-1328 - http://lostmon.blogspot.com/2005/04/oneworldstore-critical-failure.html +CVE-2005-1329 - http://lostmon.blogspot.com/2005/04/oneworldstore-user-information.html +CVE-2005-1348 - http://marc.info/?l=bugtraq&m=111445834220015&w=2 +CVE-2005-1360 - http://marc.info/?l=bugtraq&m=111454354214982&w=2 +CVE-2005-1361 - http://marc.info/?l=bugtraq&m=111453994718211&w=2 +CVE-2005-1362 - http://marc.info/?l=bugtraq&m=111454090503662&w=2 +CVE-2005-1363 - http://marc.info/?l=bugtraq&m=111454142832023&w=2 +CVE-2005-1364 - http://marc.info/?l=bugtraq&m=111454192928364&w=2 +CVE-2005-1365 - http://marc.info/?l=full-disclosure&m=111625635716712&w=2 +CVE-2005-1365 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-010.txt +CVE-2005-1366 - http://marc.info/?l=full-disclosure&m=111625623909003&w=2 +CVE-2005-1366 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-011.txt +CVE-2005-1367 - http://marc.info/?l=full-disclosure&m=111625623909003&w=2 +CVE-2005-1367 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-012.txt +CVE-2005-1384 - http://marc.info/?l=bugtraq&m=111473522804665&w=2 +CVE-2005-1384 - http://pridels0.blogspot.com/2006/03/phpcoin-poc.html +CVE-2005-1393 - http://marc.info/?l=full-disclosure&m=111489411524630&w=2 +CVE-2005-1393 - http://www.digitalmunition.com/DMA%5B2005-0425a%5D.txt +CVE-2005-1394 - http://marc.info/?l=full-disclosure&m=111489411524630&w=2 +CVE-2005-1394 - http://www.digitalmunition.com/DMA%5B2005-0425a%5D.txt +CVE-2005-1398 - http://lostmon.blogspot.com/2005/04/phpcart-price-manipulation.html +CVE-2005-1401 - http://aluigi.altervista.org/adv/mtpbugs-adv.txt +CVE-2005-1402 - http://aluigi.altervista.org/adv/mtpbugs-adv.txt +CVE-2005-1410 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9343 +CVE-2005-1415 - http://www.cuteftp.com/gsftps/history.asp +CVE-2005-1425 - https://www.exploit-db.com/exploits/8609 +CVE-2005-1426 - https://www.exploit-db.com/exploits/8610 +CVE-2005-1431 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9238 +CVE-2005-1440 - http://lostmon.blogspot.com/2005/04/viart-shop-enterprise-multiple.html +CVE-2005-1454 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9610 +CVE-2005-1455 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9579 +CVE-2005-1456 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9700 +CVE-2005-1457 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9825 +CVE-2005-1460 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9970 +CVE-2005-1461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9853 +CVE-2005-1462 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9713 +CVE-2005-1464 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9534 +CVE-2005-1467 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9654 +CVE-2005-1469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9598 +CVE-2005-1471 - http://marc.info/?l=full-disclosure&m=111537013104724&w=2 +CVE-2005-1476 - http://marc.info/?l=full-disclosure&m=111553138007647&w=2 +CVE-2005-1476 - http://marc.info/?l=full-disclosure&m=111556301530553&w=2 +CVE-2005-1476 - http://www.kb.cert.org/vuls/id/534710 +CVE-2005-1476 - https://bugzilla.mozilla.org/show_bug.cgi?id=293302 +CVE-2005-1477 - http://marc.info/?l=full-disclosure&m=111553138007647&w=2 +CVE-2005-1477 - http://marc.info/?l=full-disclosure&m=111556301530553&w=2 +CVE-2005-1477 - https://bugzilla.mozilla.org/show_bug.cgi?id=293302 +CVE-2005-1477 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9231 +CVE-2005-1480 - http://marc.info/?l=bugtraq&m=111507556127582&w=2 +CVE-2005-1481 - http://marc.info/?l=bugtraq&m=111530675909673&w=2 +CVE-2005-1482 - http://marc.info/?l=bugtraq&m=111530871724865&w=2 +CVE-2005-1483 - http://marc.info/?l=bugtraq&m=111530871724865&w=2 +CVE-2005-1484 - http://marc.info/?l=bugtraq&m=111530871716145&w=2 +CVE-2005-1485 - http://marc.info/?l=bugtraq&m=111530871716145&w=2 +CVE-2005-1486 - http://marc.info/?l=bugtraq&m=111530799109755&w=2 +CVE-2005-1487 - http://marc.info/?l=bugtraq&m=111530799109755&w=2 +CVE-2005-1496 - http://www.red-database-security.com/exploits/oracle_exploit_dbms_scheduler_select_user.html +CVE-2005-1497 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 +CVE-2005-1497 - http://mywebland.com/forums/viewtopic.php?t=180 +CVE-2005-1498 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 +CVE-2005-1498 - http://mywebland.com/forums/viewtopic.php?t=180 +CVE-2005-1499 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 +CVE-2005-1499 - http://mywebland.com/forums/viewtopic.php?t=180 +CVE-2005-1500 - http://marc.info/?l=bugtraq&m=111531904608224&w=2 +CVE-2005-1500 - http://mywebland.com/forums/viewtopic.php?t=180 +CVE-2005-1504 - http://aluigi.altervista.org/adv/gskeyinuse-adv.txt +CVE-2005-1504 - http://marc.info/?l=bugtraq&m=111539740212818&w=2 +CVE-2005-1507 - http://marc.info/?l=bugtraq&m=111541709402784&w=2 +CVE-2005-1513 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html +CVE-2005-1513 - http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html +CVE-2005-1513 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html +CVE-2005-1513 - http://seclists.org/fulldisclosure/2020/May/42 +CVE-2005-1513 - http://seclists.org/fulldisclosure/2023/Jun/2 +CVE-2005-1513 - http://www.openwall.com/lists/oss-security/2020/05/19/8 +CVE-2005-1513 - http://www.openwall.com/lists/oss-security/2023/06/06/3 +CVE-2005-1514 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html +CVE-2005-1514 - http://seclists.org/fulldisclosure/2020/May/42 +CVE-2005-1514 - http://www.openwall.com/lists/oss-security/2020/05/19/8 +CVE-2005-1515 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html +CVE-2005-1515 - http://seclists.org/fulldisclosure/2020/May/42 +CVE-2005-1515 - http://www.openwall.com/lists/oss-security/2020/05/19/8 +CVE-2005-1519 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9976 +CVE-2005-1532 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-1547 - http://marc.info/?l=bugtraq&m=111600439331242&w=2 +CVE-2005-1554 - http://marc.info/?l=bugtraq&m=111575905112831&w=2 +CVE-2005-1556 - http://aluigi.altervista.org/adv/gskeyinuse-adv.txt +CVE-2005-1556 - http://marc.info/?l=bugtraq&m=111575820116969&w=2 +CVE-2005-1561 - http://marc.info/?l=bugtraq&m=111584883727605&w=2 +CVE-2005-1562 - http://marc.info/?l=bugtraq&m=111584883727605&w=2 +CVE-2005-1567 - http://marc.info/?l=bugtraq&m=111592417803514&w=2 +CVE-2005-1568 - http://marc.info/?l=bugtraq&m=111592417803514&w=2 +CVE-2005-1569 - http://marc.info/?l=bugtraq&m=111592417803514&w=2 +CVE-2005-1593 - http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html +CVE-2005-1594 - http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html +CVE-2005-1595 - http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html +CVE-2005-1598 - https://www.exploit-db.com/exploits/1013 +CVE-2005-1612 - http://marc.info/?l=bugtraq&m=111601780332632&w=2 +CVE-2005-1613 - http://marc.info/?l=bugtraq&m=111601780332632&w=2 +CVE-2005-1614 - http://marc.info/?l=bugtraq&m=111600262424876&w=2 +CVE-2005-1615 - http://marc.info/?l=bugtraq&m=111600262424876&w=2 +CVE-2005-1616 - http://marc.info/?l=bugtraq&m=111600262424876&w=2 +CVE-2005-1618 - http://marc.info/?l=bugtraq&m=111601904204055&w=2 +CVE-2005-1619 - http://marc.info/?l=bugtraq&m=111602076500031&w=2 +CVE-2005-1620 - http://marc.info/?l=bugtraq&m=111609838307070&w=2 +CVE-2005-1621 - http://marc.info/?l=bugtraq&m=111627124301526&w=2 +CVE-2005-1636 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504 +CVE-2005-1643 - http://aluigi.altervista.org/adv/zoidboom-adv.txt +CVE-2005-1667 - https://www.exploit-db.com/exploits/983 +CVE-2005-1671 - http://marc.info/?l=bugtraq&m=111643475210982&w=2 +CVE-2005-1679 - http://marc.info/?l=bugtraq&m=111661253517089&w=2 +CVE-2005-1681 - http://marc.info/?l=bugtraq&m=111653168810937&w=2 +CVE-2005-1683 - http://marc.info/?l=bugtraq&m=111653088303057&w=2 +CVE-2005-1686 - http://marc.info/?l=bugtraq&m=111661117701398&w=2 +CVE-2005-1686 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9845 +CVE-2005-1689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819 +CVE-2005-1692 - http://marc.info/?l=bugtraq&m=111670637812128&w=2 +CVE-2005-1702 - http://aluigi.altervista.org/adv/warkings-adv.txt +CVE-2005-1702 - http://marc.info/?l=bugtraq&m=111686776303832&w=2 +CVE-2005-1703 - http://aluigi.altervista.org/adv/warkings-adv.txt +CVE-2005-1703 - http://marc.info/?l=bugtraq&m=111686776303832&w=2 +CVE-2005-1704 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071 +CVE-2005-1712 - http://sourceforge.net/project/shownotes.php?release_id=328092 +CVE-2005-1713 - http://sourceforge.net/project/shownotes.php?release_id=328092 +CVE-2005-1718 - http://aluigi.altervista.org/adv/wartimesboom-adv.txt +CVE-2005-1739 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A960 +CVE-2005-1741 - http://aluigi.altervista.org/adv/haloloop-adv.txt +CVE-2005-1751 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9639 +CVE-2005-1752 - http://marc.info/?l=bugtraq&m=111695779919830&w=2 +CVE-2005-1760 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9522 +CVE-2005-1766 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9509 +CVE-2005-1769 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9852 +CVE-2005-1770 - http://marc.info/?l=bugtraq&m=111712494620031&w=2 +CVE-2005-1770 - http://pb.specialised.info/all/adv/avast-adv.txt +CVE-2005-1772 - http://aluigi.altervista.org/adv/t3wmbof-adv.txt +CVE-2005-1772 - http://marc.info/?l=bugtraq&m=111713248227479&w=2 +CVE-2005-1775 - http://marc.info/?l=bugtraq&m=111713248227479&w=2 +CVE-2005-1776 - http://aluigi.altervista.org/adv/cnedrabof-adv.txt +CVE-2005-1776 - http://marc.info/?l=bugtraq&m=111713300212601&w=2 +CVE-2005-1787 - http://marc.info/?l=bugtraq&m=111721290726958&w=2 +CVE-2005-1790 - http://marc.info/?l=bugtraq&m=111746394106172&w=2 +CVE-2005-1790 - http://www.kb.cert.org/vuls/id/887861 +CVE-2005-1791 - http://marc.info/?l=bugtraq&m=111746303509720&w=2 +CVE-2005-1792 - http://www.networksecurity.fi/advisories/windows-wmi-rpc.html +CVE-2005-1797 - http://cr.yp.to/antiforgery/cachetiming-20050414.pdf +CVE-2005-1808 - http://aluigi.altervista.org/adv/strong2boom-adv.txt +CVE-2005-1808 - http://marc.info/?l=bugtraq&m=111747562806999&w=2 +CVE-2005-1814 - http://marc.info/?l=bugtraq&m=111746551802380&w=2 +CVE-2005-1829 - http://marc.info/?l=bugtraq&m=111746441220149&w=2 +CVE-2005-1830 - http://marc.info/?l=bugtraq&m=111746654827861&w=2 +CVE-2005-1830 - http://pb.specialised.info/all/adv/sice-adv.txt +CVE-2005-1832 - http://marc.info/?l=bugtraq&m=111757191118050&w=2 +CVE-2005-1833 - http://marc.info/?l=bugtraq&m=111757191118050&w=2 +CVE-2005-1840 - http://marc.info/?l=bugtraq&m=111773774916907&w=2 +CVE-2005-1849 - http://www.ubuntulinux.org/usn/usn-151-3 +CVE-2005-1852 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9532 +CVE-2005-1858 - http://www.sven-tantau.de/public_files/fuse/fuse_20050603.txt +CVE-2005-1874 - http://bugs.gentoo.org/show_bug.cgi?id=93079 +CVE-2005-1875 - http://marc.info/?l=bugtraq&m=111773894525119&w=2 +CVE-2005-1891 - http://marc.info/?l=bugtraq&m=111816939928640&w=2 +CVE-2005-1899 - http://aluigi.altervista.org/adv/rakzero-adv.txt +CVE-2005-1899 - http://marc.info/?l=bugtraq&m=111809312423958&w=2 +CVE-2005-1900 - http://www.networksecurity.fi/advisories/sawmill-admin.html +CVE-2005-1901 - http://www.networksecurity.fi/advisories/sawmill-admin.html +CVE-2005-1907 - http://www.networksecurity.fi/advisories/windows-isa-firewall.html +CVE-2005-1918 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946 +CVE-2005-1920 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9434 +CVE-2005-1921 - http://marc.info/?l=bugtraq&m=112008638320145&w=2 +CVE-2005-1921 - http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt +CVE-2005-1924 - http://www.attrition.org/pipermail/vim/2007-July/001710.html +CVE-2005-1924 - https://www.exploit-db.com/exploits/4173 +CVE-2005-1928 - http://securityreason.com/securityalert/259 +CVE-2005-1929 - http://securityreason.com/securityalert/256 +CVE-2005-1929 - http://securityreason.com/securityalert/257 +CVE-2005-1930 - http://securityreason.com/securityalert/258 +CVE-2005-1937 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-1949 - http://marc.info/?l=bugtraq&m=111835539312985&w=2 +CVE-2005-1952 - http://marc.info/?l=bugtraq&m=111852830111316&w=2 +CVE-2005-1953 - http://marc.info/?l=bugtraq&m=111852830111316&w=2 +CVE-2005-1967 - http://echo.or.id/adv/adv16-theday-2005.txt +CVE-2005-1968 - http://echo.or.id/adv/adv16-theday-2005.txt +CVE-2005-1974 - http://securityreason.com/securityalert/56 +CVE-2005-1978 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 +CVE-2005-1979 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 +CVE-2005-1980 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 +CVE-2005-1981 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 +CVE-2005-1982 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 +CVE-2005-1983 - http://www.securiteam.com/windowsntfocus/5YP0E00GKW.html +CVE-2005-1983 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039 +CVE-2005-1984 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-043 +CVE-2005-1985 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-046 +CVE-2005-1985 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A910 +CVE-2005-1987 - http://marc.info/?l=bugtraq&m=112915118302012&w=2 +CVE-2005-1987 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048 +CVE-2005-1988 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 +CVE-2005-1989 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 +CVE-2005-1990 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 +CVE-2005-1994 - http://marc.info/?l=bugtraq&m=111877410528692&w=2 +CVE-2005-2002 - http://marc.info/?l=bugtraq&m=111885974124936&w=2 +CVE-2005-2003 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 +CVE-2005-2004 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 +CVE-2005-2005 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 +CVE-2005-2006 - http://securityreason.com/securityalert/439 +CVE-2005-2008 - http://marc.info/?l=bugtraq&m=111927717726371&w=2 +CVE-2005-2009 - http://echo.or.id/adv/adv18-theday-2005.txt +CVE-2005-2009 - http://marc.info/?l=bugtraq&m=111928552304897&w=2 +CVE-2005-2010 - http://echo.or.id/adv/adv18-theday-2005.txt +CVE-2005-2010 - http://marc.info/?l=bugtraq&m=111928552304897&w=2 +CVE-2005-2011 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 +CVE-2005-2012 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 +CVE-2005-2013 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 +CVE-2005-2014 - http://marc.info/?l=bugtraq&m=111928841328681&w=2 +CVE-2005-2030 - http://marc.info/?l=bugtraq&m=111893777504821&w=2 +CVE-2005-2035 - http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt +CVE-2005-2035 - http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html +CVE-2005-2036 - http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt +CVE-2005-2036 - http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html +CVE-2005-2053 - http://echo.or.id/adv/adv20-theday-2005.txt +CVE-2005-2053 - http://marc.info/?l=bugtraq&m=111954840611126&w=2 +CVE-2005-2062 - http://echo.or.id/adv/adv21-theday-2005.txt +CVE-2005-2062 - http://marc.info/?l=bugtraq&m=111963341429906&w=2 +CVE-2005-2062 - https://www.exploit-db.com/exploits/3550 +CVE-2005-2063 - http://echo.or.id/adv/adv21-theday-2005.txt +CVE-2005-2063 - http://marc.info/?l=bugtraq&m=111963341429906&w=2 +CVE-2005-2064 - http://marc.info/?l=bugtraq&m=111989223906484&w=2 +CVE-2005-2065 - http://marc.info/?l=bugtraq&m=111989223906484&w=2 +CVE-2005-2066 - http://marc.info/?l=bugtraq&m=111989223906484&w=2 +CVE-2005-2067 - http://marc.info/?l=bugtraq&m=111989828622112&w=2 +CVE-2005-2069 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445 +CVE-2005-2071 - http://marc.info/?l=bugtraq&m=111963068714114&w=2 +CVE-2005-2081 - http://marc.info/?l=bugtraq&m=111946399501080&w=2 +CVE-2005-2082 - http://marc.info/?l=bugtraq&m=112006605026261&w=2 +CVE-2005-2086 - http://marc.info/?l=bugtraq&m=111999905917019&w=2 +CVE-2005-2087 - http://marc.info/?l=bugtraq&m=112006764714946&w=2 +CVE-2005-2087 - http://www.kb.cert.org/vuls/id/939605 +CVE-2005-2090 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2005-2096 - http://www.ubuntulinux.org/usn/usn-151-3 +CVE-2005-2098 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9638 +CVE-2005-2099 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9079 +CVE-2005-2102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9283 +CVE-2005-2104 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9411 +CVE-2005-2106 - http://www.drupal.org/security/drupal-sa-2005-002/advisory.txt +CVE-2005-2107 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 +CVE-2005-2108 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 +CVE-2005-2109 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 +CVE-2005-2110 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt +CVE-2005-2110 - http://marc.info/?l=bugtraq&m=112006967221438&w=2 +CVE-2005-2111 - http://marc.info/?l=bugtraq&m=112006558125309&w=2 +CVE-2005-2114 - http://marc.info/?l=bugtraq&m=112008299210033&w=2 +CVE-2005-2114 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9628 +CVE-2005-2117 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 +CVE-2005-2118 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 +CVE-2005-2119 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 +CVE-2005-2120 - http://www.kb.cert.org/vuls/id/214572 +CVE-2005-2120 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047 +CVE-2005-2122 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 +CVE-2005-2123 - http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf +CVE-2005-2123 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 +CVE-2005-2124 - http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf +CVE-2005-2124 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 +CVE-2005-2126 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-044 +CVE-2005-2127 - http://isc.sans.org/diary.php?date=2005-08-18 +CVE-2005-2127 - http://www.kb.cert.org/vuls/id/740372 +CVE-2005-2128 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-050 +CVE-2005-2143 - http://www.freewebs.com/xxosfilexx/HungFPage.html +CVE-2005-2153 - http://seclists.org/lists/bugtraq/2005/Jul/0009.html +CVE-2005-2154 - http://seclists.org/lists/bugtraq/2005/Jul/0009.html +CVE-2005-2159 - http://marc.info/?l=bugtraq&m=112051398718830&w=2 +CVE-2005-2160 - http://marc.info/?l=bugtraq&m=112060187204457&w=2 +CVE-2005-2163 - http://marc.info/?l=bugtraq&m=112059745606348&w=2 +CVE-2005-2177 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2005-2177 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9986 +CVE-2005-2178 - http://marc.info/?l=bugtraq&m=112059815028059&w=2 +CVE-2005-2179 - http://marc.info/?l=bugtraq&m=112067013827970&w=2 +CVE-2005-2180 - http://marc.info/?l=bugtraq&m=112066901231154&w=2 +CVE-2005-2184 - http://marc.info/?l=bugtraq&m=112069267700034&w=2 +CVE-2005-2185 - http://marc.info/?l=bugtraq&m=112069267700034&w=2 +CVE-2005-2186 - http://marc.info/?l=bugtraq&m=112066594312876&w=2 +CVE-2005-2187 - http://marc.info/?l=bugtraq&m=112066594312876&w=2 +CVE-2005-2188 - http://marc.info/?l=bugtraq&m=112066594312876&w=2 +CVE-2005-2190 - http://marc.info/?l=bugtraq&m=112077057001064&w=2 +CVE-2005-2191 - http://marc.info/?l=bugtraq&m=112077057001064&w=2 +CVE-2005-2192 - http://marc.info/?l=bugtraq&m=112075901100640&w=2 +CVE-2005-2193 - http://marc.info/?l=bugtraq&m=112084384928950&w=2 +CVE-2005-2204 - http://marc.info/?l=bugtraq&m=112084050624959&w=2 +CVE-2005-2204 - http://marc.info/?l=bugtraq&m=112110963416714&w=2 +CVE-2005-2220 - http://marc.info/?l=bugtraq&m=112121930328341&w=2 +CVE-2005-2221 - http://marc.info/?l=bugtraq&m=112121930328341&w=2 +CVE-2005-2227 - http://marc.info/?l=bugtraq&m=112120030308592&w=2 +CVE-2005-2229 - http://marc.info/?l=bugtraq&m=112110868021563&w=2 +CVE-2005-2246 - https://www.exploit-db.com/exploits/3596 +CVE-2005-2251 - https://www.exploit-db.com/exploits/2452 +CVE-2005-2260 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html +CVE-2005-2260 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2261 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html +CVE-2005-2261 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-2261 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2262 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html +CVE-2005-2263 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2264 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9887 +CVE-2005-2265 - http://www.mozilla.org/security/announce/mfsa2005-50.html +CVE-2005-2265 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html +CVE-2005-2265 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-2265 - https://bugzilla.mozilla.org/show_bug.cgi?id=295854 +CVE-2005-2265 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2266 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-2266 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2267 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2268 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2269 - http://www.networksecurity.fi/advisories/netscape-multiple-issues.html +CVE-2005-2269 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-2269 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2269 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9777 +CVE-2005-2270 - http://www.redhat.com/support/errata/RHSA-2005-601.html +CVE-2005-2270 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 +CVE-2005-2270 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550 +CVE-2005-2278 - http://marc.info/?l=bugtraq&m=112127188609993&w=2 +CVE-2005-2287 - http://marc.info/?l=bugtraq&m=112122500308722&w=2 +CVE-2005-2295 - http://aluigi.altervista.org/adv/panzone-adv.txt +CVE-2005-2295 - http://marc.info/?l=bugtraq&m=112129258221823&w=2 +CVE-2005-2307 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-045 +CVE-2005-2327 - https://www.exploit-db.com/exploits/1106 +CVE-2005-2337 - http://securityreason.com/securityalert/59 +CVE-2005-2365 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9118 +CVE-2005-2373 - http://marc.info/?l=bugtraq&m=112196537312610&w=2 +CVE-2005-2387 - http://seclists.org/lists/bugtraq/2005/Jul/0402.html +CVE-2005-2389 - http://www.hat-squad.com/en/000170.html +CVE-2005-2392 - http://lostmon.blogspot.com/2005/07/cmsimple-search-variable-xss.html +CVE-2005-2395 - http://securityreason.com/securityalert/8 +CVE-2005-2403 - http://seclists.org/lists/bugtraq/2005/Jul/0403.html +CVE-2005-2414 - http://marc.info/?l=bugtraq&m=112199282029269&w=2 +CVE-2005-2415 - http://marc.info/?l=bugtraq&m=112206702015439&w=2 +CVE-2005-2416 - http://marc.info/?l=bugtraq&m=112206702015439&w=2 +CVE-2005-2417 - http://marc.info/?l=bugtraq&m=112206702015439&w=2 +CVE-2005-2419 - http://marc.info/?l=bugtraq&m=112230649106740&w=2 +CVE-2005-2428 - https://www.exploit-db.com/exploits/39495/ +CVE-2005-2430 - http://marc.info/?l=bugtraq&m=112259845904350&w=2 +CVE-2005-2431 - http://marc.info/?l=bugtraq&m=112259845904350&w=2 +CVE-2005-2438 - http://marc.info/?l=bugtraq&m=112264706213040&w=2 +CVE-2005-2439 - http://marc.info/?l=bugtraq&m=112264706213040&w=2 +CVE-2005-2442 - http://marc.info/?l=bugtraq&m=112239353829324&w=2 +CVE-2005-2458 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-2467 - http://marc.info/?l=bugtraq&m=112292193807958&w=2 +CVE-2005-2468 - http://marc.info/?l=bugtraq&m=112292193807958&w=2 +CVE-2005-2475 - http://securityreason.com/securityalert/32 +CVE-2005-2475 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9975 +CVE-2005-2490 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-2494 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9388 +CVE-2005-2495 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615 +CVE-2005-2495 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998 +CVE-2005-2496 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9669 +CVE-2005-2498 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569 +CVE-2005-2499 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9538 +CVE-2005-2537 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 +CVE-2005-2538 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 +CVE-2005-2539 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 +CVE-2005-2540 - http://marc.info/?l=bugtraq&m=112327238030127&w=2 +CVE-2005-2549 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553 +CVE-2005-2553 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9647 +CVE-2005-2556 - http://marc.info/?l=bugtraq&m=112786017426276&w=2 +CVE-2005-2557 - http://marc.info/?l=bugtraq&m=112786017426276&w=2 +CVE-2005-2562 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 +CVE-2005-2563 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 +CVE-2005-2564 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 +CVE-2005-2565 - http://marc.info/?l=bugtraq&m=112351740803443&w=2 +CVE-2005-2567 - http://marc.info/?l=bugtraq&m=112352095923614&w=2 +CVE-2005-2568 - http://marc.info/?l=bugtraq&m=112352095923614&w=2 +CVE-2005-2569 - http://marc.info/?l=bugtraq&m=112360702307424&w=2 +CVE-2005-2570 - http://marc.info/?l=bugtraq&m=112360702307424&w=2 +CVE-2005-2571 - http://marc.info/?l=bugtraq&m=112360702307424&w=2 +CVE-2005-2577 - http://marc.info/?l=bugtraq&m=112379283900586&w=2 +CVE-2005-2580 - http://marc.info/?l=bugtraq&m=112387501519835&w=2 +CVE-2005-2588 - http://lostmon.blogspot.com/2005/08/dvbbs-multiple-variable-cross-site.html +CVE-2005-2602 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1682 +CVE-2005-2609 - http://www.packetstormsecurity.org/0508-exploits/vegadns-dyn0.txt +CVE-2005-2610 - http://www.packetstormsecurity.org/0508-exploits/vegadns-dyn0.txt +CVE-2005-2628 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 +CVE-2005-2629 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550 +CVE-2005-2635 - http://www.securityreason.com/adv/phpAdsnew.SR.16.asc +CVE-2005-2639 - http://aluigi.altervista.org/adv/chmpokbof-adv.txt +CVE-2005-2639 - http://marc.info/?l=bugtraq&m=112431235221271&w=2 +CVE-2005-2650 - http://packetstormsecurity.org/0508-advisories/emefaGuest.txt +CVE-2005-2650 - http://www.securityfocus.com/bid/14599 +CVE-2005-2651 - http://marc.info/?l=bugtraq&m=112438781604862&w=2 +CVE-2005-2652 - http://marc.info/?l=bugtraq&m=112438781604862&w=2 +CVE-2005-2660 - http://securityreason.com/securityalert/38 +CVE-2005-2661 - http://securityreason.com/securityalert/547 +CVE-2005-2665 - http://marc.info/?l=bugtraq&m=112472951529964&w=2 +CVE-2005-2672 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9993 +CVE-2005-2678 - http://marc.info/?l=bugtraq&m=112474727903399&w=2 +CVE-2005-2683 - http://marc.info/?l=bugtraq&m=112474427221031&w=2 +CVE-2005-2694 - http://marc.info/?l=bugtraq&m=112447630109392&w=2 +CVE-2005-2699 - http://marc.info/?l=bugtraq&m=112474427221031&w=2 +CVE-2005-2701 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9323 +CVE-2005-2704 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9784 +CVE-2005-2708 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-2709 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-2709 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-2710 - http://marc.info/?l=bugtraq&m=112785544325326&w=2 +CVE-2005-2710 - http://marc.info/?l=full-disclosure&m=112775929608219&w=2 +CVE-2005-2710 - http://securityreason.com/securityalert/27 +CVE-2005-2710 - http://securityreason.com/securityalert/41 +CVE-2005-2718 - https://bugs.gentoo.org/show_bug.cgi?id=103555 +CVE-2005-2719 - http://marc.info/?l=bugtraq&m=112483407515020&w=2 +CVE-2005-2726 - http://marc.info/?l=bugtraq&m=112490496918102&w=2 +CVE-2005-2727 - http://marc.info/?l=bugtraq&m=112490496918102&w=2 +CVE-2005-2733 - http://marc.info/?l=bugtraq&m=112511159821143&w=2 +CVE-2005-2753 - http://pb.specialised.info/all/adv/quicktime-mov-io1-adv.txt +CVE-2005-2753 - http://www.securityfocus.com/bid/15306 +CVE-2005-2754 - http://pb.specialised.info/all/adv/quicktime-mov-io2-adv.txt +CVE-2005-2755 - http://pb.specialised.info/all/adv/quicktime-mov-dos-adv.txt +CVE-2005-2755 - http://securityreason.com/securityalert/145 +CVE-2005-2756 - http://pb.specialised.info/all/adv/quicktime-pict-adv.txt +CVE-2005-2756 - http://securityreason.com/securityalert/144 +CVE-2005-2758 - http://securityreason.com/securityalert/48 +CVE-2005-2776 - http://marc.info/?l=bugtraq&m=112516327607001&w=2 +CVE-2005-2777 - http://marc.info/?l=bugtraq&m=112516327607001&w=2 +CVE-2005-2779 - http://marc.info/?l=bugtraq&m=112498693231687&w=2 +CVE-2005-2779 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-014.txt +CVE-2005-2789 - http://aluigi.altervista.org/adv/bfccown-adv.txt +CVE-2005-2789 - http://marc.info/?l=bugtraq&m=112534155318828&w=2 +CVE-2005-2790 - http://aluigi.altervista.org/adv/bfccown-adv.txt +CVE-2005-2790 - http://marc.info/?l=bugtraq&m=112534155318828&w=2 +CVE-2005-2791 - http://aluigi.altervista.org/adv/bfccown-adv.txt +CVE-2005-2791 - http://marc.info/?l=bugtraq&m=112534155318828&w=2 +CVE-2005-2792 - http://marc.info/?l=bugtraq&m=112542447219235&w=2 +CVE-2005-2793 - http://marc.info/?l=bugtraq&m=112542447219235&w=2 +CVE-2005-2798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717 +CVE-2005-2800 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954 +CVE-2005-2813 - http://seclists.org/lists/bugtraq/2005/Aug/0440.html +CVE-2005-2814 - http://seclists.org/lists/bugtraq/2005/Aug/0440.html +CVE-2005-2815 - http://seclists.org/lists/bugtraq/2005/Aug/0440.html +CVE-2005-2827 - http://securityreason.com/securityalert/252 +CVE-2005-2827 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-055 +CVE-2005-2829 - http://securityreason.com/securityalert/254 +CVE-2005-2842 - https://www.exploit-db.com/exploits/42703/ +CVE-2005-2844 - http://marc.info/?l=bugtraq&m=112550635826169&w=2 +CVE-2005-2847 - http://marc.info/?l=bugtraq&m=112560044813390&w=2 +CVE-2005-2848 - http://marc.info/?l=bugtraq&m=112560044813390&w=2 +CVE-2005-2849 - http://marc.info/?l=bugtraq&m=112560044813390&w=2 +CVE-2005-2855 - http://packetstormsecurity.org/0509-exploits/unb153.html +CVE-2005-2856 - http://securityreason.com/securityalert/49 +CVE-2005-2860 - http://marc.info/?l=bugtraq&m=112561344400914&w=2 +CVE-2005-2860 - http://seclists.org/lists/vulnwatch/2005/Jul-Sep/0032.html +CVE-2005-2861 - http://seclists.org/lists/vulnwatch/2005/Jul-Sep/0032.html +CVE-2005-2871 - http://securityreason.com/securityalert/83 +CVE-2005-2871 - https://bugzilla.mozilla.org/show_bug.cgi?id=307259 +CVE-2005-2871 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608 +CVE-2005-2873 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9838 +CVE-2005-2874 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774 +CVE-2005-2880 - http://marc.info/?l=bugtraq&m=112605610624004&w=2 +CVE-2005-2881 - http://marc.info/?l=bugtraq&m=112605610624004&w=2 +CVE-2005-2882 - http://marc.info/?l=bugtraq&m=112605610624004&w=2 +CVE-2005-2890 - http://marc.info/?l=bugtraq&m=112610983428771&w=2 +CVE-2005-2892 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 +CVE-2005-2893 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 +CVE-2005-2894 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 +CVE-2005-2895 - http://marc.info/?l=bugtraq&m=112611338417979&w=2 +CVE-2005-2898 - http://marc.info/?l=bugtraq&m=112577523810442&w=2 +CVE-2005-2898 - http://marc.info/?l=bugtraq&m=112605448327521&w=2 +CVE-2005-2902 - http://marc.info/?l=bugtraq&m=112629627512785&w=2 +CVE-2005-2929 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9712 +CVE-2005-2933 - http://securityreason.com/securityalert/47 +CVE-2005-2933 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858 +CVE-2005-2943 - http://securityreason.com/securityalert/81 +CVE-2005-2947 - http://marc.info/?l=bugtraq&m=112629480300071&w=2 +CVE-2005-2948 - http://marc.info/?l=bugtraq&m=112629480300071&w=2 +CVE-2005-2949 - http://securityreason.com/securityalert/2 +CVE-2005-2950 - http://securityreason.com/securityalert/1 +CVE-2005-2951 - http://marc.info/?l=bugtraq&m=112662698511403&w=2 +CVE-2005-2951 - http://securityreason.com/securityalert/5 +CVE-2005-2952 - http://marc.info/?l=bugtraq&m=112662785418368&w=2 +CVE-2005-2952 - http://securityreason.com/securityalert/4 +CVE-2005-2968 - http://www.ubuntu.com/usn/usn-186-1 +CVE-2005-2973 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-2974 - https://bugzilla.redhat.com/show_bug.cgi?id=494826 +CVE-2005-2975 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697 +CVE-2005-2977 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168181 +CVE-2005-2981 - http://marc.info/?l=bugtraq&m=112680922318639&w=2 +CVE-2005-2982 - http://marc.info/?l=bugtraq&m=112680922318639&w=2 +CVE-2005-2991 - http://securityreason.com/securityalert/12 +CVE-2005-2992 - http://securityreason.com/securityalert/11 +CVE-2005-2993 - http://securityreason.com/securityalert/360 +CVE-2005-3010 - http://securityreason.com/securityalert/14 +CVE-2005-3011 - http://www.vmware.com/support/vi3/doc/esx-2559638-patch.html +CVE-2005-3026 - http://marc.info/?l=bugtraq&m=112714879101323&w=2 +CVE-2005-3026 - http://marc.info/?l=bugtraq&m=112716394925851&w=2 +CVE-2005-3026 - http://securityreason.com/securityalert/13 +CVE-2005-3043 - http://packetstormsecurity.org/0509-exploits/mall23.txt +CVE-2005-3044 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3044 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9561 +CVE-2005-3045 - http://marc.info/?l=bugtraq&m=112741430006983&w=2 +CVE-2005-3046 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 +CVE-2005-3047 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 +CVE-2005-3048 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 +CVE-2005-3049 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 +CVE-2005-3050 - http://marc.info/?l=bugtraq&m=112749230124091&w=2 +CVE-2005-3051 - http://www.vuln.sg/turbosearcher330-en.html +CVE-2005-3052 - http://securityreason.com/securityalert/20 +CVE-2005-3053 - http://www.redhat.com/support/errata/RHSA-2005-808.html +CVE-2005-3055 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472 +CVE-2005-3063 - http://marc.info/?l=bugtraq&m=112758146618234&w=2 +CVE-2005-3063 - http://securityreason.com/securityalert/21 +CVE-2005-3064 - http://aluigi.altervista.org/adv/mtaboom-adv.txt +CVE-2005-3065 - http://securityreason.com/securityalert/26 +CVE-2005-3066 - http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt +CVE-2005-3067 - http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt +CVE-2005-3089 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9280 +CVE-2005-3090 - http://marc.info/?l=bugtraq&m=112786017426276&w=2 +CVE-2005-3092 - http://marc.info/?l=bugtraq&m=112776577002945&w=2 +CVE-2005-3092 - http://securityreason.com/securityalert/25 +CVE-2005-3099 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A943 +CVE-2005-3106 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 +CVE-2005-3108 - http://www.redhat.com/support/errata/RHSA-2005-808.html +CVE-2005-3110 - http://www.redhat.com/support/errata/RHSA-2005-808.html +CVE-2005-3116 - http://seer.support.veritas.com/docs/279553.htm +CVE-2005-3119 - http://www.redhat.com/support/errata/RHSA-2005-808.html +CVE-2005-3120 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257 +CVE-2005-3130 - http://securityreason.com/securityalert/33 +CVE-2005-3134 - http://marc.info/?l=bugtraq&m=112811189420696&w=2 +CVE-2005-3134 - http://securityreason.com/securityalert/39 +CVE-2005-3135 - http://aluigi.altervista.org/adv/virtbugs-adv.txt +CVE-2005-3135 - http://marc.info/?l=bugtraq&m=112811771331997&w=2 +CVE-2005-3136 - http://aluigi.altervista.org/adv/virtbugs-adv.txt +CVE-2005-3136 - http://marc.info/?l=bugtraq&m=112811771331997&w=2 +CVE-2005-3136 - http://securityreason.com/securityalert/40 +CVE-2005-3141 - http://securityreason.com/securityalert/43 +CVE-2005-3142 - http://securityreason.com/securityalert/44 +CVE-2005-3142 - http://www.kaspersky.com/news?id=171512144 +CVE-2005-3152 - http://securityreason.com/securityalert/35 +CVE-2005-3153 - http://marc.info/?l=bugtraq&m=112818273307878&w=2 +CVE-2005-3153 - http://securityreason.com/securityalert/42 +CVE-2005-3154 - http://securityreason.com/securityalert/45 +CVE-2005-3156 - http://marc.info/?l=bugtraq&m=112812059917394&w=2 +CVE-2005-3157 - http://marc.info/?l=bugtraq&m=112793982604963&w=2 +CVE-2005-3158 - http://marc.info/?l=bugtraq&m=112801702000944&w=2 +CVE-2005-3161 - http://securityreason.com/securityalert/54 +CVE-2005-3177 - http://support.microsoft.com/kb/831374 +CVE-2005-3178 - http://marc.info/?l=bugtraq&m=112862493918840&w=2 +CVE-2005-3178 - http://www.redhat.com/support/errata/RHSA-2005-802.html +CVE-2005-3180 - http://www.redhat.com/support/errata/RHSA-2005-808.html +CVE-2005-3180 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-3181 - http://www.redhat.com/support/errata/RHSA-2005-808.html +CVE-2005-3181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467 +CVE-2005-3182 - http://securityreason.com/securityalert/74 +CVE-2005-3183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9653 +CVE-2005-3185 - http://securityreason.com/securityalert/82 +CVE-2005-3185 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810 +CVE-2005-3186 - http://securityreason.com/securityalert/188 +CVE-2005-3186 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503 +CVE-2005-3188 - http://securityreason.com/securityalert/397 +CVE-2005-3191 - http://www.securityfocus.com/archive/1/418883/100/0/threaded +CVE-2005-3191 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760 +CVE-2005-3192 - http://www.securityfocus.com/archive/1/418883/100/0/threaded +CVE-2005-3193 - http://www.securityfocus.com/archive/1/418883/100/0/threaded +CVE-2005-3196 - http://securityreason.com/securityalert/53 +CVE-2005-3198 - http://securityreason.com/securityalert/55 +CVE-2005-3199 - http://securityreason.com/securityalert/52 +CVE-2005-3200 - http://marc.info/?l=bugtraq&m=112872691119874&w=2 +CVE-2005-3201 - http://marc.info/?l=bugtraq&m=112872691119874&w=2 +CVE-2005-3208 - http://marc.info/?l=bugtraq&m=112872593432359&w=2 +CVE-2005-3209 - http://marc.info/?l=bugtraq&m=112872593432359&w=2 +CVE-2005-3210 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3211 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3212 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3213 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3214 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3215 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3216 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3217 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3218 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3219 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3220 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3221 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3222 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3223 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3224 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3225 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3226 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3227 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3228 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3229 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3230 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3231 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3232 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3233 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3234 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3235 - http://marc.info/?l=bugtraq&m=112879611919750&w=2 +CVE-2005-3236 - http://marc.info/?l=bugtraq&m=112879353805769&w=2 +CVE-2005-3236 - http://securityreason.com/securityalert/70 +CVE-2005-3237 - http://marc.info/?l=bugtraq&m=112879353805769&w=2 +CVE-2005-3237 - http://securityreason.com/securityalert/70 +CVE-2005-3243 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9836 +CVE-2005-3244 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9665 +CVE-2005-3249 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9313 +CVE-2005-3257 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 +CVE-2005-3259 - http://marc.info/?l=bugtraq&m=112907535528616&w=2 +CVE-2005-3260 - http://marc.info/?l=bugtraq&m=112907535528616&w=2 +CVE-2005-3261 - http://marc.info/?l=bugtraq&m=112907535528616&w=2 +CVE-2005-3267 - http://marc.info/?l=bugtraq&m=113026202728568&w=2 +CVE-2005-3267 - http://securityreason.com/securityalert/115 +CVE-2005-3269 - http://securityreason.com/securityalert/51 +CVE-2005-3273 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-3273 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9552 +CVE-2005-3274 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3275 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-3276 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-3276 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748 +CVE-2005-3284 - http://securityreason.com/securityalert/80 +CVE-2005-3286 - http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt +CVE-2005-3286 - http://seclists.org/bugtraq/2005/Oct/166 +CVE-2005-3286 - http://securityreason.com/securityalert/78 +CVE-2005-3294 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-016-typsoft-ftpd.txt +CVE-2005-3295 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A992 +CVE-2005-3299 - http://securityreason.com/securityalert/69 +CVE-2005-3300 - http://marc.info/?l=bugtraq&m=113017591414699&w=2 +CVE-2005-3303 - http://securityreason.com/securityalert/146 +CVE-2005-3304 - http://marc.info/?l=bugtraq&m=113017049702436&w=2 +CVE-2005-3310 - http://marc.info/?l=bugtraq&m=113017003617987&w=2 +CVE-2005-3312 - http://marc.info/?l=bugtraq&m=113017003617987&w=2 +CVE-2005-3312 - http://securityreason.com/securityalert/18 +CVE-2005-3312 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1746 +CVE-2005-3314 - http://www.securityfocus.com/bid/15491 +CVE-2005-3319 - http://securityreason.com/securityalert/525 +CVE-2005-3330 - http://marc.info/?l=bugtraq&m=113028858316430&w=2 +CVE-2005-3330 - http://securityreason.com/securityalert/117 +CVE-2005-3350 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9314 +CVE-2005-3352 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2005-3353 - http://securityreason.com/securityalert/525 +CVE-2005-3356 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3358 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3363 - https://www.exploit-db.com/exploits/1530 +CVE-2005-3365 - https://www.exploit-db.com/exploits/4853 +CVE-2005-3383 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 +CVE-2005-3384 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 +CVE-2005-3385 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 +CVE-2005-3386 - http://marc.info/?l=bugtraq&m=113035773010381&w=2 +CVE-2005-3386 - http://securityreason.com/securityalert/120 +CVE-2005-3388 - http://securityreason.com/securityalert/133 +CVE-2005-3389 - http://securityreason.com/securityalert/134 +CVE-2005-3390 - http://securityreason.com/securityalert/132 +CVE-2005-3391 - http://securityreason.com/securityalert/525 +CVE-2005-3392 - http://securityreason.com/securityalert/525 +CVE-2005-3396 - http://securityreason.com/securityalert/261 +CVE-2005-3402 - http://marc.info/?l=bugtraq&m=113028017608146&w=2 +CVE-2005-3412 - http://marc.info/?l=full-disclosure&m=113083841308736&w=2 +CVE-2005-3412 - http://securityreason.com/securityalert/136 +CVE-2005-3415 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 +CVE-2005-3415 - http://securityreason.com/securityalert/130 +CVE-2005-3416 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 +CVE-2005-3416 - http://securityreason.com/securityalert/130 +CVE-2005-3417 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 +CVE-2005-3417 - http://securityreason.com/securityalert/130 +CVE-2005-3418 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 +CVE-2005-3418 - http://securityreason.com/securityalert/130 +CVE-2005-3419 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 +CVE-2005-3419 - http://securityreason.com/securityalert/130 +CVE-2005-3420 - http://marc.info/?l=bugtraq&m=113081113317600&w=2 +CVE-2005-3420 - http://securityreason.com/securityalert/130 +CVE-2005-3427 - http://securityreason.com/securityalert/137 +CVE-2005-3455 - http://www.kb.cert.org/vuls/id/150508 +CVE-2005-3473 - http://securityreason.com/securityalert/138 +CVE-2005-3477 - http://securityreason.com/securityalert/105 +CVE-2005-3482 - http://securityreason.com/securityalert/139 +CVE-2005-3483 - http://aluigi.altervista.org/adv/ggwbof-adv.txt +CVE-2005-3483 - http://marc.info/?l=full-disclosure&m=113095918810489&w=2 +CVE-2005-3485 - http://aluigi.altervista.org/adv/gliderbof-adv.txt +CVE-2005-3485 - http://marc.info/?l=full-disclosure&m=113095975721571&w=2 +CVE-2005-3486 - http://aluigi.altervista.org/adv/scorchbugs-adv.txt +CVE-2005-3486 - http://marc.info/?l=full-disclosure&m=113095941031946&w=2 +CVE-2005-3487 - http://aluigi.altervista.org/adv/scorchbugs-adv.txt +CVE-2005-3487 - http://marc.info/?l=full-disclosure&m=113095941031946&w=2 +CVE-2005-3488 - http://aluigi.altervista.org/adv/scorchbugs-adv.txt +CVE-2005-3488 - http://marc.info/?l=full-disclosure&m=113095941031946&w=2 +CVE-2005-3489 - http://aluigi.altervista.org/adv/asusvsbugs-adv.txt +CVE-2005-3489 - http://marc.info/?l=full-disclosure&m=113096055302614&w=2 +CVE-2005-3490 - http://aluigi.altervista.org/adv/asusvsbugs-adv.txt +CVE-2005-3490 - http://marc.info/?l=full-disclosure&m=113096055302614&w=2 +CVE-2005-3491 - http://aluigi.altervista.org/adv/flatfragz-adv.txt +CVE-2005-3491 - http://marc.info/?l=full-disclosure&m=113096078606274&w=2 +CVE-2005-3492 - http://aluigi.altervista.org/adv/flatfragz-adv.txt +CVE-2005-3492 - http://marc.info/?l=full-disclosure&m=113096078606274&w=2 +CVE-2005-3493 - http://aluigi.altervista.org/adv/bcarrydos-adv.txt +CVE-2005-3493 - http://marc.info/?l=full-disclosure&m=113096122630102&w=2 +CVE-2005-3505 - http://securityreason.com/securityalert/148 +CVE-2005-3510 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2005-3521 - http://marc.info/?l=bugtraq&m=112967223222966&w=2 +CVE-2005-3522 - http://marc.info/?l=bugtraq&m=112967149509401&w=2 +CVE-2005-3525 - http://securityreason.com/securityalert/481 +CVE-2005-3526 - http://securityreason.com/securityalert/577 +CVE-2005-3527 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3555 - http://www.trapkit.de/advisories/TKADV2005-11-001.txt +CVE-2005-3556 - http://www.trapkit.de/advisories/TKADV2005-11-001.txt +CVE-2005-3557 - http://www.trapkit.de/advisories/TKADV2005-11-001.txt +CVE-2005-3560 - http://securityreason.com/securityalert/155 +CVE-2005-3569 - http://www.osvdb.org/20708 +CVE-2005-3571 - http://marc.info/?l=bugtraq&m=113199214723444&w=2 +CVE-2005-3571 - http://securityreason.com/securityalert/176 +CVE-2005-3575 - http://securityreason.com/securityalert/180 +CVE-2005-3579 - http://securityreason.com/securityalert/179 +CVE-2005-3583 - http://securityreason.com/securityalert/143 +CVE-2005-3589 - http://ingehenriksen.blogspot.com/2005/11/filezilla-server-terminal-094d-dos-poc_21.html +CVE-2005-3589 - http://marc.info/?l=bugtraq&m=113140190521377&w=2 +CVE-2005-3591 - http://marc.info/?l=bugtraq&m=113140426614670&w=2 +CVE-2005-3591 - http://securityreason.com/securityalert/149 +CVE-2005-3596 - http://marc.info/?l=bugtraq&m=113156859811594&w=2 +CVE-2005-3622 - http://securityreason.com/securityalert/185 +CVE-2005-3624 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437 +CVE-2005-3625 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575 +CVE-2005-3626 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992 +CVE-2005-3633 - http://marc.info/?l=bugtraq&m=113156438708932&w=2 +CVE-2005-3633 - http://securityreason.com/securityalert/164 +CVE-2005-3634 - http://marc.info/?l=bugtraq&m=113156525006667&w=2 +CVE-2005-3634 - http://securityreason.com/securityalert/163 +CVE-2005-3635 - http://marc.info/?l=bugtraq&m=113156601505542&w=2 +CVE-2005-3635 - http://securityreason.com/securityalert/162 +CVE-2005-3636 - http://marc.info/?l=bugtraq&m=113156601505542&w=2 +CVE-2005-3636 - http://securityreason.com/securityalert/162 +CVE-2005-3644 - https://www.exploit-db.com/exploits/1328 +CVE-2005-3646 - http://securityreason.com/securityalert/172 +CVE-2005-3648 - http://marc.info/?l=bugtraq&m=113165668814241&w=2 +CVE-2005-3649 - http://marc.info/?l=bugtraq&m=113165668814241&w=2 +CVE-2005-3649 - http://securityreason.com/securityalert/168 +CVE-2005-3652 - http://securityreason.com/securityalert/266 +CVE-2005-3654 - http://securityreason.com/securityalert/322 +CVE-2005-3657 - http://securityreason.com/securityalert/279 +CVE-2005-3662 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583 +CVE-2005-3663 - http://securityreason.com/securityalert/187 +CVE-2005-3671 - http://www.securityfocus.com/bid/15416 +CVE-2005-3672 - http://www.stonesoft.com/support/Security_Advisories/7244.html +CVE-2005-3679 - http://marc.info/?l=bugtraq&m=113201260613863&w=2 +CVE-2005-3680 - http://marc.info/?l=bugtraq&m=113199244824660&w=2 +CVE-2005-3681 - http://marc.info/?l=bugtraq&m=113199244824660&w=2 +CVE-2005-3682 - http://securityreason.com/securityalert/181 +CVE-2005-3684 - http://marc.info/?l=full-disclosure&m=113222358007499&w=2 +CVE-2005-3686 - http://packetstormsecurity.org/0511-exploits/unb153pl3_xpl.html +CVE-2005-3694 - https://bugs.gentoo.org/show_bug.cgi?id=100519 +CVE-2005-3732 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9857 +CVE-2005-3734 - http://www.trapkit.de/advisories/TKADV2005-11-004.txt +CVE-2005-3737 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330894 +CVE-2005-3737 - http://securityreason.com/securityalert/58 +CVE-2005-3784 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3784 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174078 +CVE-2005-3784 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9080 +CVE-2005-3790 - http://securityreason.com/securityalert/182 +CVE-2005-3792 - http://securityreason.com/achievement_exploitalert/5 +CVE-2005-3792 - http://www.waraxe.us/advisory-46.html +CVE-2005-3796 - http://securityreason.com/securityalert/184 +CVE-2005-3797 - http://securityreason.com/securityalert/189 +CVE-2005-3798 - http://securityreason.com/securityalert/189 +CVE-2005-3799 - http://securityreason.com/achievement_exploitalert/4 +CVE-2005-3802 - http://securityreason.com/securityalert/186 +CVE-2005-3805 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3806 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3806 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-3806 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9903 +CVE-2005-3807 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3808 - http://seclists.org/lists/linux-kernel/2005/Nov/7839.html +CVE-2005-3813 - http://marc.info/?l=full-disclosure&m=113285451031500&w=2 +CVE-2005-3813 - http://securityreason.com/securityalert/205 +CVE-2005-3822 - http://securityreason.com/securityalert/203 +CVE-2005-3857 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-3857 - http://www.securityfocus.com/archive/1/428028/100/0/threaded +CVE-2005-3857 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9727 +CVE-2005-3858 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9396 +CVE-2005-3859 - http://securityreason.com/securityalert/209 +CVE-2005-3861 - http://securityreason.com/securityalert/210 +CVE-2005-3867 - http://pridels0.blogspot.com/2005/11/revenuepilot-search-engine-xss-vuln.html +CVE-2005-3887 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 +CVE-2005-3888 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 +CVE-2005-3889 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 +CVE-2005-3890 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 +CVE-2005-3891 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 +CVE-2005-3892 - http://marc.info/?l=bugtraq&m=113261573023912&w=2 +CVE-2005-3903 - http://securityreason.com/securityalert/251 +CVE-2005-3915 - http://www.clavister.com/support/support_update_ISAKMP.html +CVE-2005-3919 - http://securityreason.com/securityalert/211 +CVE-2005-3921 - http://securityreason.com/securityalert/227 +CVE-2005-3922 - http://securityreason.com/securityalert/216 +CVE-2005-3924 - http://securityreason.com/securityalert/213 +CVE-2005-3927 - http://securityreason.com/securityalert/212 +CVE-2005-3929 - http://securityreason.com/securityalert/217 +CVE-2005-3931 - http://securityreason.com/securityalert/218 +CVE-2005-3949 - http://securityreason.com/securityalert/215 +CVE-2005-3952 - https://www.exploit-db.com/exploits/3456 +CVE-2005-3961 - http://securityreason.com/securityalert/215 +CVE-2005-3964 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9393 +CVE-2005-3967 - http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html +CVE-2005-3983 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1582 +CVE-2005-3991 - http://securityreason.com/securityalert/221 +CVE-2005-3992 - http://securityreason.com/securityalert/226 +CVE-2005-4005 - http://securityreason.com/securityalert/31 +CVE-2005-4015 - http://securityreason.com/securityalert/214 +CVE-2005-4058 - http://evuln.com/vulns/40/summary.html +CVE-2005-4065 - http://securityreason.com/securityalert/222 +CVE-2005-4066 - http://www.networksecurity.fi/advisories/total-commander.html +CVE-2005-4079 - http://securityreason.com/securityalert/237 +CVE-2005-4080 - http://securityreason.com/securityalert/232 +CVE-2005-4087 - http://securityreason.com/securityalert/239 +CVE-2005-4089 - http://www.hacker.co.il/security/ie/css_import.html +CVE-2005-4089 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2005-4131 - http://securityreason.com/securityalert/584 +CVE-2005-4131 - http://securityreason.com/securityalert/591 +CVE-2005-4131 - http://www.theregister.co.uk/2005/12/10/ebay_pulls_excel_vulnerability_auction/ +CVE-2005-4131 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 +CVE-2005-4134 - http://marc.info/?l=full-disclosure&m=113404911919629&w=2 +CVE-2005-4134 - http://marc.info/?l=full-disclosure&m=113405896025702&w=2 +CVE-2005-4134 - http://www.networksecurity.fi/advisories/netscape-history.html +CVE-2005-4134 - http://www.redhat.com/support/errata/RHSA-2006-0199.html +CVE-2005-4140 - http://securityreason.com/securityalert/244 +CVE-2005-4152 - http://securityreason.com/securityalert/243 +CVE-2005-4154 - http://pear.php.net/advisory-20051104.txt +CVE-2005-4164 - http://www.osvdb.org/21456 +CVE-2005-4195 - https://www.exploit-db.com/exploits/5540 +CVE-2005-4199 - http://securityreason.com/securityalert/294 +CVE-2005-4199 - http://www.trapkit.de/advisories/TKADV2005-12-001.txt +CVE-2005-4218 - https://www.exploit-db.com/exploits/1324 +CVE-2005-4219 - http://securityreason.com/securityalert/250 +CVE-2005-4249 - http://securityreason.com/securityalert/253 +CVE-2005-4267 - http://securityreason.com/securityalert/277 +CVE-2005-4268 - http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237 +CVE-2005-4270 - http://securityreason.com/securityalert/260 +CVE-2005-4287 - http://securityreason.com/securityalert/263 +CVE-2005-4288 - http://securityreason.com/securityalert/264 +CVE-2005-4294 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1910 +CVE-2005-4317 - http://securityreason.com/securityalert/255 +CVE-2005-4318 - http://securityreason.com/securityalert/255 +CVE-2005-4319 - http://securityreason.com/securityalert/255 +CVE-2005-4327 - http://securityreason.com/securityalert/267 +CVE-2005-4329 - http://securityreason.com/securityalert/268 +CVE-2005-4332 - http://securityreason.com/securityalert/265 +CVE-2005-4348 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659 +CVE-2005-4349 - http://marc.info/?l=bugtraq&m=113486637512821&w=2 +CVE-2005-4349 - http://securityreason.com/securityalert/270 +CVE-2005-4351 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt +CVE-2005-4351 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-15.txt +CVE-2005-4352 - http://www.redteam-pentesting.de/advisories/rt-sa-2005-16.txt +CVE-2005-4357 - http://securityreason.com/securityalert/269 +CVE-2005-4358 - http://securityreason.com/securityalert/269 +CVE-2005-4360 - http://securityreason.com/securityalert/271 +CVE-2005-4360 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-041 +CVE-2005-4398 - http://pridels0.blogspot.com/2005/12/lemoon-xss-vuln.html +CVE-2005-4402 - http://marc.info/?l=full-disclosure&m=113502692010867&w=2 +CVE-2005-4411 - https://www.exploit-db.com/exploits/1375 +CVE-2005-4415 - http://packetstormsecurity.org/0512-exploits/ztml.txt +CVE-2005-4416 - http://packetstormsecurity.org/0512-exploits/ztml.txt +CVE-2005-4424 - http://securityreason.com/securityalert/157 +CVE-2005-4432 - http://marc.info/?l=full-disclosure&m=113478814326427&w=2 +CVE-2005-4432 - http://marc.info/?l=full-disclosure&m=113970096305873&w=2 +CVE-2005-4437 - http://securityreason.com/securityalert/274 +CVE-2005-4438 - http://securityreason.com/securityalert/276 +CVE-2005-4449 - http://securityreason.com/securityalert/248 +CVE-2005-4459 - http://securityreason.com/securityalert/282 +CVE-2005-4461 - http://securityreason.com/securityalert/284 +CVE-2005-4462 - http://securityreason.com/securityalert/288 +CVE-2005-4463 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt +CVE-2005-4463 - http://echo.or.id/adv/adv24-theday-2005.txt +CVE-2005-4463 - http://securityreason.com/securityalert/286 +CVE-2005-4466 - http://securityreason.com/securityalert/281 +CVE-2005-4466 - http://www.hat-squad.com/en/000171.html +CVE-2005-4494 - http://pridels0.blogspot.com/2005/12/spip-xss-vuln.html +CVE-2005-4496 - http://pridels0.blogspot.com/2005/12/syntaxcms-xss-vuln.html +CVE-2005-4506 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt +CVE-2005-4507 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt +CVE-2005-4508 - http://www.exploitlabs.com/files/advisories/EXPL-A-2005-017-devhound.txt +CVE-2005-4514 - http://securityreason.com/securityalert/293 +CVE-2005-4516 - http://securityreason.com/securityalert/272 +CVE-2005-4517 - http://securityreason.com/securityalert/272 +CVE-2005-4518 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 +CVE-2005-4518 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4519 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 +CVE-2005-4519 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 +CVE-2005-4519 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4520 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 +CVE-2005-4520 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 +CVE-2005-4520 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4521 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 +CVE-2005-4521 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 +CVE-2005-4521 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4522 - http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 +CVE-2005-4522 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 +CVE-2005-4522 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4523 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 +CVE-2005-4523 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4524 - http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 +CVE-2005-4524 - http://www.trapkit.de/advisories/TKADV2005-11-002.txt +CVE-2005-4549 - http://marc.info/?l=full-disclosure&m=113532626203708&w=2 +CVE-2005-4549 - http://securityreason.com/securityalert/298 +CVE-2005-4550 - http://marc.info/?l=full-disclosure&m=113532633229270&w=2 +CVE-2005-4550 - http://securityreason.com/securityalert/297 +CVE-2005-4563 - http://securityreason.com/securityalert/278 +CVE-2005-4573 - http://securityreason.com/securityalert/273 +CVE-2005-4574 - http://pridels0.blogspot.com/2005/12/commonspot-content-server-vuln.html +CVE-2005-4575 - http://pridels0.blogspot.com/2005/12/commonspot-content-server-vuln.html +CVE-2005-4576 - http://pridels0.blogspot.com/2005/12/fatwire-updateengine-62-multiple-xss.html +CVE-2005-4584 - http://aluigi.altervista.org/adv/bzflagboom-adv.txt +CVE-2005-4585 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9678 +CVE-2005-4593 - http://securityreason.com/securityalert/303 +CVE-2005-4596 - http://pridels0.blogspot.com/2005/12/adesguestbook-xss-vuln.html +CVE-2005-4598 - http://pridels0.blogspot.com/2005/12/ooapp-guestbook-xss-vuln.html +CVE-2005-4600 - http://securityreason.com/securityalert/306 +CVE-2005-4600 - https://www.exploit-db.com/exploits/4441 +CVE-2005-4601 - http://www.ubuntu.com/usn/usn-246-1 +CVE-2005-4602 - http://securityreason.com/securityalert/311 +CVE-2005-4603 - http://securityreason.com/securityalert/310 +CVE-2005-4605 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2005-4606 - http://securityreason.com/securityalert/305 +CVE-2005-4607 - http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html +CVE-2005-4608 - http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html +CVE-2005-4609 - http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html +CVE-2005-4637 - http://pridels0.blogspot.com/2005/12/kayako-supportsuite-multiple-vuln.html +CVE-2005-4638 - http://pridels0.blogspot.com/2005/12/kayako-supportsuite-multiple-vuln.html +CVE-2005-4659 - http://sourceforge.net/tracker/index.php?func=detail&aid=1344032&group_id=40604&atid=428516 +CVE-2005-4668 - http://securityreason.com/securityalert/147 +CVE-2005-4681 - http://seclists.org/lists/bugtraq/2005/Dec/0263.html +CVE-2005-4681 - http://securityreason.com/securityalert/285 +CVE-2005-4681 - http://www.packetstormsecurity.org/0512-exploits/mIRCexploitXPSP2eng.c +CVE-2005-4696 - http://securityreason.com/securityalert/46 +CVE-2005-4696 - https://www.exploit-db.com/exploits/26323/ +CVE-2005-4697 - http://securityreason.com/securityalert/46 +CVE-2005-4698 - http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt +CVE-2005-4699 - http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt +CVE-2005-4700 - http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt +CVE-2005-4715 - http://securityreason.com/securityalert/3 +CVE-2005-4749 - http://www.securityfocus.com/bid/15052 +CVE-2005-4750 - http://www.securityfocus.com/bid/15052 +CVE-2005-4751 - http://www.securityfocus.com/bid/15052 +CVE-2005-4752 - http://www.securityfocus.com/bid/15052 +CVE-2005-4753 - http://www.securityfocus.com/bid/15052 +CVE-2005-4754 - http://www.securityfocus.com/bid/15052 +CVE-2005-4755 - http://www.securityfocus.com/bid/15052 +CVE-2005-4756 - http://www.securityfocus.com/bid/15052 +CVE-2005-4757 - http://www.securityfocus.com/bid/15052 +CVE-2005-4758 - http://www.securityfocus.com/bid/15052 +CVE-2005-4759 - http://www.securityfocus.com/bid/15052 +CVE-2005-4760 - http://www.securityfocus.com/bid/15052 +CVE-2005-4761 - http://dev2dev.bea.com/pub/advisory/152 +CVE-2005-4761 - http://www.securityfocus.com/bid/15052 +CVE-2005-4762 - http://www.securityfocus.com/bid/15052 +CVE-2005-4763 - http://www.securityfocus.com/bid/15052 +CVE-2005-4764 - http://www.securityfocus.com/bid/15052 +CVE-2005-4765 - http://www.securityfocus.com/bid/15052 +CVE-2005-4766 - http://www.securityfocus.com/bid/15052 +CVE-2005-4767 - http://www.securityfocus.com/bid/15052 +CVE-2005-4777 - http://securityreason.com/securityalert/37 +CVE-2005-4783 - http://www.packetstormsecurity.org/0601-advisories/NetBSD-SA2006-001.txt +CVE-2005-4785 - http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt +CVE-2005-4807 - http://bugs.gentoo.org/show_bug.cgi?id=99464 +CVE-2005-4807 - http://www.ubuntu.com/usn/usn-336-1 +CVE-2005-4826 - http://www.blackhat.com/html/bh-europe-05/bh-eu-05-speakers.html#Berrueta +CVE-2005-4837 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9442 +CVE-2005-4848 - http://blog2.lemondeinformatique.fr/management_du_si/2006/05/notre_ami_imad_.html +CVE-2005-4858 - http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt +CVE-2005-4859 - http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt +CVE-2005-4874 - https://bugzilla.mozilla.org/show_bug.cgi?id=297078 +CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/20/9 +CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/21/1 +CVE-2005-4900 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340 +CVE-2006-0001 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054 +CVE-2006-0002 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003 +CVE-2006-0003 - https://www.exploit-db.com/exploits/2052 +CVE-2006-0003 - https://www.exploit-db.com/exploits/2164 +CVE-2006-0004 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-010 +CVE-2006-0006 - http://securityreason.com/securityalert/423 +CVE-2006-0006 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-005 +CVE-2006-0007 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-039 +CVE-2006-0009 - http://isc.sans.org/diary.php?storyid=1618 +CVE-2006-0009 - http://www.darkreading.com/document.asp?doc_id=101970 +CVE-2006-0009 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 +CVE-2006-0012 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015 +CVE-2006-0013 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-008 +CVE-2006-0014 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-016 +CVE-2006-0015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-017 +CVE-2006-0020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-004 +CVE-2006-0021 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-007 +CVE-2006-0021 - https://www.exploit-db.com/exploits/1599 +CVE-2006-0022 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-028 +CVE-2006-0023 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-011 +CVE-2006-0024 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 +CVE-2006-0025 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-024 +CVE-2006-0026 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-034 +CVE-2006-0027 - http://www.kb.cert.org/vuls/id/303452 +CVE-2006-0027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-019 +CVE-2006-0028 - http://securityreason.com/securityalert/583 +CVE-2006-0028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 +CVE-2006-0029 - http://securityreason.com/securityalert/585 +CVE-2006-0029 - http://securityreason.com/securityalert/586 +CVE-2006-0029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 +CVE-2006-0030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 +CVE-2006-0031 - http://securityreason.com/securityalert/589 +CVE-2006-0031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-012 +CVE-2006-0032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-053 +CVE-2006-0033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-039 +CVE-2006-0034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 +CVE-2006-0049 - http://securityreason.com/securityalert/450 +CVE-2006-0049 - http://securityreason.com/securityalert/568 +CVE-2006-0052 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9475 +CVE-2006-0059 - http://www.digitalbond.com/SCADA_Blog/2006/05/us-cert-livedata-iccp-vulnerability.html +CVE-2006-0063 - http://securityreason.com/securityalert/313 +CVE-2006-0064 - https://www.exploit-db.com/exploits/1398 +CVE-2006-0065 - http://evuln.com/vulns/1/summary.html +CVE-2006-0065 - http://securityreason.com/securityalert/315 +CVE-2006-0066 - http://evuln.com/vulns/9/summary.html +CVE-2006-0067 - http://evuln.com/vulns/2/summary.html +CVE-2006-0068 - http://pridels0.blogspot.com/2006/01/primo-cart-sql-inj.html +CVE-2006-0069 - http://evuln.com/vulns/4/summary.html +CVE-2006-0074 - http://evuln.com/vulns/5/summary.html +CVE-2006-0074 - https://www.exploit-db.com/exploits/8706 +CVE-2006-0075 - http://evuln.com/vulns/6/summary.html +CVE-2006-0076 - http://evuln.com/vulns/3/summary.html +CVE-2006-0078 - http://evuln.com/vulns/10/summary.html +CVE-2006-0078 - http://securityreason.com/securityalert/316 +CVE-2006-0079 - http://evuln.com/vulns/11/summary.html +CVE-2006-0079 - http://securityreason.com/securityalert/318 +CVE-2006-0082 - http://securityreason.com/securityalert/500 +CVE-2006-0082 - http://www.ubuntu.com/usn/usn-246-1 +CVE-2006-0084 - http://evuln.com/vulns/13/summary.html +CVE-2006-0087 - http://securityreason.com/securityalert/314 +CVE-2006-0087 - http://www.evuln.com/vulns/12/summary.html +CVE-2006-0088 - http://evuln.com/vulns/8/summary.html +CVE-2006-0095 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2006-0099 - https://www.exploit-db.com/exploits/1401 +CVE-2006-0100 - http://securityreason.com/securityalert/317 +CVE-2006-0102 - http://evuln.com/vulns/14/summary.html +CVE-2006-0102 - http://securityreason.com/securityalert/320 +CVE-2006-0103 - http://evuln.com/vulns/14/summary.html +CVE-2006-0103 - http://securityreason.com/securityalert/320 +CVE-2006-0104 - http://evuln.com/vulns/14/exploit.html +CVE-2006-0104 - http://evuln.com/vulns/14/summary.html +CVE-2006-0104 - http://securityreason.com/securityalert/320 +CVE-2006-0110 - http://evuln.com/vulns/16/summary.html +CVE-2006-0123 - http://evuln.com/vulns/15/summary.html +CVE-2006-0124 - http://evuln.com/vulns/15/summary.html +CVE-2006-0131 - http://echo.or.id/adv/adv26-K-159-2006.txt +CVE-2006-0134 - http://evuln.com/vulns/17/exploit.html +CVE-2006-0134 - http://evuln.com/vulns/17/summary.html +CVE-2006-0135 - http://evuln.com/vulns/17/exploit.html +CVE-2006-0135 - http://evuln.com/vulns/17/summary.html +CVE-2006-0136 - http://evuln.com/vulns/7/exploit.html +CVE-2006-0136 - http://evuln.com/vulns/7/summary.html +CVE-2006-0137 - http://evuln.com/vulns/7/exploit.html +CVE-2006-0137 - http://evuln.com/vulns/7/summary.html +CVE-2006-0140 - http://evuln.com/vulns/19/summary.html +CVE-2006-0143 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html +CVE-2006-0145 - http://securityreason.com/securityalert/405 +CVE-2006-0147 - https://www.exploit-db.com/exploits/1663 +CVE-2006-0153 - http://evuln.com/vulns/18/summary.html +CVE-2006-0154 - http://evuln.com/vulns/18/summary.html +CVE-2006-0155 - http://evuln.com/vulns/18/summary.html +CVE-2006-0156 - http://securityreason.com/securityalert/325 +CVE-2006-0160 - http://evuln.com/vulns/21/summary.html +CVE-2006-0160 - http://securityreason.com/securityalert/326 +CVE-2006-0167 - http://evuln.com/vulns/22/summary.html +CVE-2006-0167 - http://www.securityfocus.com/archive/1/421863/100/0/threaded +CVE-2006-0168 - http://evuln.com/vulns/22/summary.html +CVE-2006-0168 - http://www.securityfocus.com/archive/1/421863/100/0/threaded +CVE-2006-0169 - http://evuln.com/vulns/23/summary.html +CVE-2006-0179 - https://www.exploit-db.com/exploits/1411 +CVE-2006-0180 - http://evuln.com/vulns/24/summary.html +CVE-2006-0182 - http://evuln.com/vulns/25/summary.html +CVE-2006-0183 - http://evuln.com/vulns/25/summary.html +CVE-2006-0184 - http://www.exploitlabs.com/files/advisories/EXPL-A-2006-001-asptopsites.txt +CVE-2006-0192 - http://securityreason.com/securityalert/414 +CVE-2006-0195 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9548 +CVE-2006-0199 - http://www.nukedx.com/?viewdoc=7 +CVE-2006-0200 - http://securityreason.com/securityalert/337 +CVE-2006-0204 - http://evuln.com/vulns/28/summary.html +CVE-2006-0205 - http://evuln.com/vulns/27/summary.html +CVE-2006-0205 - http://evuln.com/vulns/28/summary.html +CVE-2006-0206 - http://evuln.com/vulns/29/exploit.html +CVE-2006-0206 - http://evuln.com/vulns/29/summary.html +CVE-2006-0209 - http://evuln.com/vulns/26/summary.html +CVE-2006-0214 - http://securityreason.com/securityalert/351 +CVE-2006-0225 - http://securityreason.com/securityalert/462 +CVE-2006-0225 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962 +CVE-2006-0226 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson +CVE-2006-0233 - http://evuln.com/vulns/36/summary.html +CVE-2006-0234 - http://evuln.com/vulns/35/summary.html +CVE-2006-0236 - https://bugzilla.mozilla.org/show_bug.cgi?id=300246 +CVE-2006-0242 - http://securityreason.com/securityalert/355 +CVE-2006-0244 - http://securityreason.com/securityalert/353 +CVE-2006-0244 - http://www.arrelnet.com/advisories/adv20060116.html +CVE-2006-0249 - http://evuln.com/vulns/33/summary.html +CVE-2006-0252 - http://evuln.com/vulns/30/summary.html +CVE-2006-0292 - http://www.redhat.com/support/errata/RHSA-2006-0199.html +CVE-2006-0292 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-0296 - http://www.redhat.com/support/errata/RHSA-2006-0199.html +CVE-2006-0296 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-0300 - http://securityreason.com/securityalert/480 +CVE-2006-0300 - http://securityreason.com/securityalert/543 +CVE-2006-0300 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295 +CVE-2006-0301 - http://securityreason.com/securityalert/470 +CVE-2006-0304 - http://aluigi.altervista.org/adv/dualsbof-adv.txt +CVE-2006-0308 - https://www.exploit-db.com/exploits/3524 +CVE-2006-0310 - http://evuln.com/vulns/37/summary.html +CVE-2006-0311 - http://evuln.com/vulns/37/summary.html +CVE-2006-0312 - http://evuln.com/vulns/37/summary.html +CVE-2006-0318 - http://evuln.com/vulns/34/summary +CVE-2006-0320 - http://evuln.com/vulns/31/summary +CVE-2006-0323 - http://securityreason.com/securityalert/690 +CVE-2006-0324 - http://evuln.com/vulns/41/summary.html +CVE-2006-0324 - http://securityreason.com/securityalert/356 +CVE-2006-0328 - http://securityreason.com/securityalert/362 +CVE-2006-0339 - http://securityreason.com/securityalert/357 +CVE-2006-0340 - http://securityreason.com/securityalert/358 +CVE-2006-0341 - http://marc.info/?l=full-disclosure&m=113777628702043&w=2 +CVE-2006-0342 - http://marc.info/?l=full-disclosure&m=113777628702043&w=2 +CVE-2006-0345 - http://evuln.com/vulns/40/summary.html +CVE-2006-0346 - http://evuln.com/vulns/40/summary.html +CVE-2006-0349 - http://evuln.com/vulns/39/summary.html +CVE-2006-0350 - http://evuln.com/vulns/39/summary.html +CVE-2006-0352 - http://evuln.com/vulns/38/summary/bt/ +CVE-2006-0359 - http://securityreason.com/securityalert/354 +CVE-2006-0360 - http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041437.html +CVE-2006-0361 - http://evuln.com/vulns/32/exploit +CVE-2006-0361 - http://evuln.com/vulns/32/summary/ +CVE-2006-0362 - http://isc.sans.org/diary.php?storyid=1042 +CVE-2006-0370 - http://evuln.com/vulns/42/summary.html +CVE-2006-0371 - http://evuln.com/vulns/42/summary.html +CVE-2006-0376 - http://www.theta44.org/karma/ +CVE-2006-0403 - http://evuln.com/vulns/43/summary.html +CVE-2006-0403 - http://securityreason.com/securityalert/370 +CVE-2006-0404 - http://evuln.com/vulns/44/summary.html +CVE-2006-0409 - http://evuln.com/vulns/45/summary.html +CVE-2006-0417 - http://evuln.com/vulns/47/summary.html +CVE-2006-0433 - http://securityreason.com/securityalert/399 +CVE-2006-0435 - http://securityreason.com/securityalert/402 +CVE-2006-0435 - http://securityreason.com/securityalert/403 +CVE-2006-0437 - http://securityreason.com/securityalert/406 +CVE-2006-0438 - http://securityreason.com/securityalert/406 +CVE-2006-0439 - http://evuln.com/vulns/46/summary.html +CVE-2006-0440 - http://evuln.com/vulns/46/summary.html +CVE-2006-0441 - https://www.exploit-db.com/exploits/40675/ +CVE-2006-0443 - http://evuln.com/vulns/49/summary.html +CVE-2006-0450 - http://securityreason.com/securityalert/368 +CVE-2006-0454 - http://www.securityfocus.com/archive/1/427981/100/0/threaded +CVE-2006-0456 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9909 +CVE-2006-0457 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9566 +CVE-2006-0459 - http://securityreason.com/securityalert/570 +CVE-2006-0461 - http://evuln.com/vulns/48/summary.html +CVE-2006-0461 - http://securityreason.com/securityalert/372 +CVE-2006-0462 - http://evuln.com/vulns/50/summary.html +CVE-2006-0468 - http://www.stalker.com/CommuniGatePro/History.html +CVE-2006-0471 - http://evuln.com/vulns/51/ +CVE-2006-0471 - http://evuln.com/vulns/51/summary.html +CVE-2006-0472 - http://evuln.com/vulns/51/ +CVE-2006-0472 - http://evuln.com/vulns/51/summary.html +CVE-2006-0473 - http://evuln.com/vulns/51/ +CVE-2006-0473 - http://evuln.com/vulns/51/summary.html +CVE-2006-0476 - http://securityreason.com/securityalert/398 +CVE-2006-0476 - http://www.heise.de/newsticker/meldung/68981 +CVE-2006-0476 - https://www.exploit-db.com/exploits/3422 +CVE-2006-0489 - http://securityreason.com/securityalert/383 +CVE-2006-0491 - http://securityreason.com/securityalert/396 +CVE-2006-0491 - http://www.evuln.com/vulns/53/summary.html +CVE-2006-0492 - http://securityreason.com/securityalert/394 +CVE-2006-0492 - http://www.evuln.com/vulns/52/summary.html +CVE-2006-0502 - http://securityreason.com/securityalert/390 +CVE-2006-0509 - http://securityreason.com/securityalert/391 +CVE-2006-0513 - http://securityreason.com/securityalert/412 +CVE-2006-0517 - http://securityreason.com/securityalert/395 +CVE-2006-0521 - http://securityreason.com/securityalert/393 +CVE-2006-0527 - http://securityreason.com/securityalert/438 +CVE-2006-0530 - http://securityreason.com/securityalert/404 +CVE-2006-0532 - http://securityreason.com/securityalert/400 +CVE-2006-0533 - http://marc.info/?l=full-disclosure&m=113894933522271&w=2 +CVE-2006-0534 - http://securityreason.com/securityalert/401 +CVE-2006-0537 - http://securityreason.com/securityalert/408 +CVE-2006-0537 - https://www.exploit-db.com/exploits/1466 +CVE-2006-0538 - http://securityreason.com/securityalert/407 +CVE-2006-0540 - http://www.evuln.com/vulns/54/summary.html +CVE-2006-0541 - http://www.evuln.com/vulns/54/summary.html +CVE-2006-0542 - http://www.evuln.com/vulns/56/summary.html +CVE-2006-0555 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9932 +CVE-2006-0557 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9674 +CVE-2006-0563 - http://securityreason.com/securityalert/415 +CVE-2006-0565 - http://securityreason.com/securityalert/410 +CVE-2006-0565 - http://securityreason.com/securityalert/556 +CVE-2006-0566 - http://securityreason.com/securityalert/416 +CVE-2006-0566 - http://www.stalker.com/CommuniGatePro/History.html +CVE-2006-0568 - http://securityreason.com/securityalert/411 +CVE-2006-0570 - http://evuln.com/vulns/61/summary.html +CVE-2006-0570 - http://securityreason.com/securityalert/427 +CVE-2006-0571 - http://evuln.com/vulns/61/summary.html +CVE-2006-0571 - http://securityreason.com/securityalert/427 +CVE-2006-0572 - http://evuln.com/vulns/61/summary.html +CVE-2006-0572 - http://securityreason.com/securityalert/427 +CVE-2006-0573 - http://marc.info/?l=bugtraq&m=113898556313924&w=2 +CVE-2006-0575 - http://marc.info/?l=full-disclosure&m=113890734603201&w=2 +CVE-2006-0588 - http://securityreason.com/securityalert/413 +CVE-2006-0589 - http://securityreason.com/securityalert/413 +CVE-2006-0590 - http://securityreason.com/securityalert/413 +CVE-2006-0602 - http://evuln.com/vulns/58/summary.html +CVE-2006-0603 - http://evuln.com/vulns/58/summary.html +CVE-2006-0604 - http://evuln.com/vulns/58/description.html +CVE-2006-0605 - http://evuln.com/vulns/55/summary.html +CVE-2006-0606 - http://evuln.com/vulns/55/summary.html +CVE-2006-0607 - http://www.evuln.com/vulns/60/summary.html +CVE-2006-0608 - http://www.evuln.com/vulns/60/summary.html +CVE-2006-0609 - http://www.evuln.com/vulns/60/summary.html +CVE-2006-0610 - http://www.evuln.com/vulns/62/summary.html +CVE-2006-0624 - http://securityreason.com/securityalert/418 +CVE-2006-0627 - http://www.evuln.com/vulns/64/summary.html +CVE-2006-0628 - http://securityreason.com/securityalert/409 +CVE-2006-0628 - http://www.evuln.com/vulns/57/summary.html +CVE-2006-0636 - http://securityreason.com/securityalert/419 +CVE-2006-0642 - http://www.packetstormsecurity.org/0602-advisories/Bypass.pdf +CVE-2006-0642 - http://www.packetstormsecurity.org/filedesc/Bypass.pdf.html +CVE-2006-0643 - http://securityreason.com/securityalert/421 +CVE-2006-0644 - http://dragonflycms.org/Forums/viewtopic/p=98034.html +CVE-2006-0644 - http://dragonflycms.org/Forums/viewtopic/p=98034.html#98034 +CVE-2006-0645 - http://securityreason.com/securityalert/446 +CVE-2006-0648 - http://evuln.com/vulns/70/summary.html +CVE-2006-0648 - http://securityreason.com/securityalert/420 +CVE-2006-0653 - http://evuln.com/vulns/59/summary.html +CVE-2006-0654 - http://evuln.com/vulns/59/summary.html +CVE-2006-0655 - http://evuln.com/vulns/59/summary.html +CVE-2006-0657 - http://evuln.com/vulns/63/summary.html +CVE-2006-0657 - http://securityreason.com/securityalert/442 +CVE-2006-0658 - https://www.exploit-db.com/exploits/3702 +CVE-2006-0661 - http://evuln.com/vulns/65/summary.html +CVE-2006-0661 - http://securityreason.com/securityalert/447 +CVE-2006-0670 - http://marc.info/?l=full-disclosure&m=113924625825488&w=2 +CVE-2006-0670 - http://securityreason.com/securityalert/465 +CVE-2006-0670 - http://www.secuobs.com/news/05022006-bluetooth9.shtml#english +CVE-2006-0671 - http://marc.info/?l=bugtraq&m=113926179907655&w=2 +CVE-2006-0671 - http://marc.info/?l=full-disclosure&m=113924661724270&w=2 +CVE-2006-0671 - http://www.secuobs.com/news/05022006-bluetooth7.shtml#english +CVE-2006-0673 - http://evuln.com/vulns/71/summary.html +CVE-2006-0673 - http://securityreason.com/securityalert/459 +CVE-2006-0676 - http://securityreason.com/securityalert/425 +CVE-2006-0677 - http://securityreason.com/securityalert/449 +CVE-2006-0678 - http://securityreason.com/securityalert/498 +CVE-2006-0679 - http://securityreason.com/achievement_securityalert/32 +CVE-2006-0679 - http://securityreason.com/securityalert/440 +CVE-2006-0683 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt +CVE-2006-0684 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt +CVE-2006-0685 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt +CVE-2006-0686 - http://securityreason.com/securityalert/430 +CVE-2006-0686 - http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt +CVE-2006-0687 - http://securityreason.com/securityalert/428 +CVE-2006-0688 - http://echo.or.id/adv/adv26-K-159-2006.txt +CVE-2006-0689 - http://www.evuln.com/vulns/69/summary.html +CVE-2006-0690 - http://www.evuln.com/vulns/69/summary.html +CVE-2006-0691 - http://www.evuln.com/vulns/69/summary.html +CVE-2006-0692 - http://securityreason.com/securityalert/451 +CVE-2006-0692 - http://www.evuln.com/vulns/67/summary.html +CVE-2006-0693 - http://securityreason.com/securityalert/453 +CVE-2006-0693 - http://www.evuln.com/vulns/68/summary.html +CVE-2006-0703 - http://securityreason.com/securityalert/429 +CVE-2006-0708 - http://securityreason.com/securityalert/444 +CVE-2006-0708 - http://securityreason.com/securityalert/492 +CVE-2006-0713 - http://securityreason.com/securityalert/426 +CVE-2006-0714 - http://securityreason.com/securityalert/432 +CVE-2006-0716 - http://securityreason.com/securityalert/431 +CVE-2006-0719 - http://securityreason.com/securityalert/424 +CVE-2006-0720 - http://securityreason.com/securityalert/476 +CVE-2006-0722 - http://evuln.com/vulns/73/summary.html +CVE-2006-0722 - http://securityreason.com/securityalert/468 +CVE-2006-0723 - http://evuln.com/vulns/72/summary.html +CVE-2006-0724 - http://evuln.com/vulns/72/summary.html +CVE-2006-0729 - http://securityreason.com/securityalert/477 +CVE-2006-0729 - http://www.evuln.com/vulns/75/summary.html +CVE-2006-0735 - http://evuln.com/vulns/79/summary.html +CVE-2006-0735 - http://evuln.com/vulns/80/summary.html +CVE-2006-0735 - http://www.evuln.com/vulns/80/summary.html +CVE-2006-0744 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732 +CVE-2006-0746 - http://securityreason.com/securityalert/566 +CVE-2006-0747 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9508 +CVE-2006-0748 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-0748 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-0749 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-0756 - http://securityreason.com/securityalert/434 +CVE-2006-0759 - http://securityreason.com/securityalert/422 +CVE-2006-0764 - http://securityreason.com/securityalert/435 +CVE-2006-0768 - http://www.piotrbania.com/all/adv/kadu-fun.txt +CVE-2006-0771 - http://securityreason.com/securityalert/448 +CVE-2006-0775 - http://securityreason.com/securityalert/467 +CVE-2006-0775 - http://www.evuln.com/vulns/74/summary.html +CVE-2006-0776 - http://securityreason.com/securityalert/490 +CVE-2006-0776 - http://www.evuln.com/vulns/77/summary.html +CVE-2006-0777 - http://securityreason.com/securityalert/489 +CVE-2006-0777 - http://www.evuln.com/vulns/76/summary.html +CVE-2006-0778 - http://www.securityfocus.com/archive/1/425084/100/0/threaded +CVE-2006-0779 - http://www.securityfocus.com/archive/1/425084/100/0/threaded +CVE-2006-0780 - http://evuln.com/vulns/81/summary.html +CVE-2006-0780 - http://securityreason.com/securityalert/508 +CVE-2006-0781 - http://evuln.com/vulns/81/summary.html +CVE-2006-0781 - http://securityreason.com/securityalert/508 +CVE-2006-0782 - http://evuln.com/vulns/81/summary.html +CVE-2006-0782 - http://securityreason.com/securityalert/508 +CVE-2006-0783 - http://securityreason.com/securityalert/443 +CVE-2006-0784 - http://securityreason.com/securityalert/441 +CVE-2006-0786 - http://securityreason.com/securityalert/445 +CVE-2006-0795 - http://evuln.com/vulns/78/summary.html +CVE-2006-0797 - http://www.secuobs.com/news/15022006-nokia_n70.shtml#english +CVE-2006-0800 - http://securityreason.com/securityalert/454 +CVE-2006-0801 - http://securityreason.com/securityalert/454 +CVE-2006-0802 - http://securityreason.com/securityalert/454 +CVE-2006-0805 - http://securityreason.com/securityalert/455 +CVE-2006-0805 - http://www.waraxe.us/advisory-45.html +CVE-2006-0806 - http://securityreason.com/securityalert/452 +CVE-2006-0807 - http://securityreason.com/securityalert/461 +CVE-2006-0809 - http://evuln.com/vulns/84/summary.html +CVE-2006-0809 - http://securityreason.com/securityalert/540 +CVE-2006-0810 - http://evuln.com/vulns/84/summary.html +CVE-2006-0810 - http://securityreason.com/securityalert/540 +CVE-2006-0811 - http://evuln.com/vulns/84/summary.html +CVE-2006-0811 - http://securityreason.com/securityalert/540 +CVE-2006-0813 - http://securityreason.com/securityalert/479 +CVE-2006-0814 - http://securityreason.com/securityalert/523 +CVE-2006-0819 - http://securityreason.com/securityalert/576 +CVE-2006-0821 - https://www.exploit-db.com/exploits/1513 +CVE-2006-0829 - http://evuln.com/vulns/83/summary.html +CVE-2006-0829 - http://securityreason.com/securityalert/528 +CVE-2006-0832 - http://securityreason.com/securityalert/456 +CVE-2006-0836 - http://securityreason.com/securityalert/469 +CVE-2006-0843 - http://securityreason.com/securityalert/522 +CVE-2006-0843 - http://www.evuln.com/vulns/82/summary.html +CVE-2006-0844 - http://securityreason.com/securityalert/522 +CVE-2006-0844 - http://www.evuln.com/vulns/82/summary.html +CVE-2006-0845 - http://securityreason.com/securityalert/522 +CVE-2006-0845 - http://www.evuln.com/vulns/82/summary.html +CVE-2006-0846 - http://securityreason.com/securityalert/522 +CVE-2006-0846 - http://www.evuln.com/vulns/82/summary.html +CVE-2006-0848 - http://www.heise.de/english/newsticker/news/69862 +CVE-2006-0848 - http://www.kb.cert.org/vuls/id/999708 +CVE-2006-0851 - https://www.exploit-db.com/exploits/1516 +CVE-2006-0852 - https://www.exploit-db.com/exploits/1512 +CVE-2006-0855 - http://securityreason.com/securityalert/546 +CVE-2006-0856 - http://www.evuln.com/vulns/66/summary.html +CVE-2006-0861 - http://securityreason.com/securityalert/460 +CVE-2006-0863 - http://securityreason.com/securityalert/473 +CVE-2006-0869 - http://securityreason.com/securityalert/466 +CVE-2006-0870 - http://www.nukedx.com/?viewdoc=9 +CVE-2006-0871 - http://securityreason.com/securityalert/493 +CVE-2006-0877 - http://evuln.com/vulns/85/summary.html +CVE-2006-0883 - http://securityreason.com/securityalert/520 +CVE-2006-0884 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-0888 - https://www.exploit-db.com/exploits/1489 +CVE-2006-0895 - http://securityreason.com/securityalert/478 +CVE-2006-0896 - http://evuln.com/vulns/86/summary.html +CVE-2006-0896 - http://securityreason.com/securityalert/545 +CVE-2006-0898 - http://securityreason.com/securityalert/488 +CVE-2006-0899 - http://securityreason.com/securityalert/518 +CVE-2006-0899 - https://www.exploit-db.com/exploits/1533 +CVE-2006-0900 - http://securityreason.com/securityalert/521 +CVE-2006-0903 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915 +CVE-2006-0908 - http://securityreason.com/securityalert/497 +CVE-2006-0911 - http://securityreason.com/securityalert/472 +CVE-2006-0915 - https://bugzilla.mozilla.org/show_bug.cgi?id=313441 +CVE-2006-0916 - http://securityreason.com/securityalert/464 +CVE-2006-0917 - http://securityreason.com/securityalert/463 +CVE-2006-0918 - http://securityreason.com/securityalert/485 +CVE-2006-0920 - http://securityreason.com/securityalert/483 +CVE-2006-0921 - http://securityreason.com/securityalert/484 +CVE-2006-0922 - http://securityreason.com/securityalert/482 +CVE-2006-0923 - http://securityreason.com/securityalert/491 +CVE-2006-0923 - http://www.nukedx.com/?viewdoc=12 +CVE-2006-0927 - http://www.nukedx.com/?viewdoc=11 +CVE-2006-0930 - http://securityreason.com/securityalert/487 +CVE-2006-0932 - http://securityreason.com/securityalert/486 +CVE-2006-0938 - http://www.nukedx.com/?viewdoc=16 +CVE-2006-0939 - http://securityreason.com/securityalert/495 +CVE-2006-0940 - http://evuln.com/vulns/87/summary.html +CVE-2006-0940 - http://securityreason.com/securityalert/557 +CVE-2006-0941 - http://evuln.com/vulns/87/summary.html +CVE-2006-0941 - http://securityreason.com/securityalert/557 +CVE-2006-0943 - http://securityreason.com/securityalert/496 +CVE-2006-0944 - https://www.exploit-db.com/exploits/3859 +CVE-2006-0948 - http://securityreason.com/securityalert/1416 +CVE-2006-0950 - http://securityreason.com/securityalert/575 +CVE-2006-0957 - http://evuln.com/vulns/89/summary.html +CVE-2006-0958 - http://evuln.com/vulns/89/summary.html +CVE-2006-0959 - http://securityreason.com/securityalert/512 +CVE-2006-0959 - https://www.exploit-db.com/exploits/1539 +CVE-2006-0961 - http://www.nukedx.com/?viewdoc=10 +CVE-2006-0961 - https://www.exploit-db.com/exploits/1562 +CVE-2006-0962 - https://www.exploit-db.com/exploits/1543 +CVE-2006-0968 - http://securityreason.com/securityalert/524 +CVE-2006-0969 - http://securityreason.com/securityalert/507 +CVE-2006-0970 - http://securityreason.com/securityalert/505 +CVE-2006-0971 - http://securityreason.com/securityalert/506 +CVE-2006-0972 - http://securityreason.com/securityalert/501 +CVE-2006-0973 - https://www.exploit-db.com/exploits/1525 +CVE-2006-0978 - http://securityreason.com/securityalert/504 +CVE-2006-0983 - http://securityreason.com/securityalert/510 +CVE-2006-0984 - http://securityreason.com/securityalert/511 +CVE-2006-0985 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt +CVE-2006-0986 - http://NeoSecurityTeam.net/advisories/Advisory-17.txt +CVE-2006-0989 - http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html +CVE-2006-0990 - http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html +CVE-2006-0991 - http://securityresponse.symantec.com/avcenter/security/Content/2006.03.27.html +CVE-2006-0992 - https://www.exploit-db.com/exploits/1679 +CVE-2006-1000 - http://www.nukedx.com/?viewdoc=13 +CVE-2006-1000 - http://www.nukedx.com/?viewdoc=14 +CVE-2006-1001 - https://www.exploit-db.com/exploits/1526 +CVE-2006-1008 - http://securityreason.com/securityalert/562 +CVE-2006-1015 - http://securityreason.com/securityalert/517 +CVE-2006-1017 - http://securityreason.com/securityalert/516 +CVE-2006-1020 - http://evuln.com/vulns/90/summary.html +CVE-2006-1020 - http://securityreason.com/securityalert/574 +CVE-2006-1022 - http://securityreason.com/securityalert/515 +CVE-2006-1027 - http://securityreason.com/securityalert/527 +CVE-2006-1028 - http://securityreason.com/securityalert/527 +CVE-2006-1032 - http://securityreason.com/securityalert/502 +CVE-2006-1042 - http://securityreason.com/securityalert/537 +CVE-2006-1045 - http://securityreason.com/securityalert/514 +CVE-2006-1045 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1046 - http://aluigi.altervista.org/adv/monopdx-adv.txt +CVE-2006-1056 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2006-1056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995 +CVE-2006-1058 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483 +CVE-2006-1073 - http://securityreason.com/securityalert/542 +CVE-2006-1074 - http://aluigi.altervista.org/adv/lieroxxx-adv.txt +CVE-2006-1075 - http://aluigi.altervista.org/adv/lieroxxx-adv.txt +CVE-2006-1075 - http://securityreason.com/securityalert/549 +CVE-2006-1077 - http://securityreason.com/securityalert/544 +CVE-2006-1078 - http://issues.apache.org/bugzilla/show_bug.cgi?id=31975 +CVE-2006-1078 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html +CVE-2006-1078 - http://seclists.org/bugtraq/2004/Oct/0359.html +CVE-2006-1078 - http://seclists.org/fulldisclosure/2023/Nov/13 +CVE-2006-1079 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html +CVE-2006-1079 - http://seclists.org/fulldisclosure/2023/Nov/13 +CVE-2006-1081 - http://securityreason.com/securityalert/536 +CVE-2006-1082 - http://securityreason.com/securityalert/533 +CVE-2006-1091 - http://securityreason.com/securityalert/535 +CVE-2006-1094 - http://www.nukedx.com/?viewdoc=17 +CVE-2006-1096 - http://pridels0.blogspot.com/2006/03/nz-ecommerce-sqlxss-vuln.html +CVE-2006-1097 - http://www.nukedx.com/?viewdoc=17 +CVE-2006-1098 - http://pridels0.blogspot.com/2006/03/nz-ecommerce-sqlxss-vuln.html +CVE-2006-1100 - http://aluigi.altervista.org/adv/evilcube-adv.txt +CVE-2006-1101 - http://aluigi.altervista.org/adv/evilcube-adv.txt +CVE-2006-1102 - http://aluigi.altervista.org/adv/evilcube-adv.txt +CVE-2006-1102 - http://securityreason.com/securityalert/548 +CVE-2006-1103 - http://securityreason.com/securityalert/550 +CVE-2006-1107 - http://evuln.com/vulns/93/summary.html +CVE-2006-1107 - http://securityreason.com/securityalert/595 +CVE-2006-1108 - http://evuln.com/vulns/93/summary.html +CVE-2006-1108 - http://securityreason.com/securityalert/595 +CVE-2006-1109 - http://securityreason.com/securityalert/530 +CVE-2006-1109 - http://www.nukedx.com/?viewdoc=18 +CVE-2006-1110 - https://www.exploit-db.com/exploits/1547 +CVE-2006-1111 - https://www.exploit-db.com/exploits/1547 +CVE-2006-1112 - http://securityreason.com/securityalert/539 +CVE-2006-1112 - https://www.exploit-db.com/exploits/1547 +CVE-2006-1120 - http://securityreason.com/securityalert/392 +CVE-2006-1121 - http://securityreason.com/securityalert/531 +CVE-2006-1122 - http://securityreason.com/securityalert/559 +CVE-2006-1123 - http://securityreason.com/securityalert/559 +CVE-2006-1129 - http://evuln.com/vulns/88/summary.html +CVE-2006-1130 - http://evuln.com/vulns/88/summary.html +CVE-2006-1130 - http://securityreason.com/securityalert/558 +CVE-2006-1132 - http://securityreason.com/securityalert/552 +CVE-2006-1133 - http://securityreason.com/securityalert/552 +CVE-2006-1134 - http://evuln.com/vulns/91/description.html +CVE-2006-1134 - http://securityreason.com/securityalert/582 +CVE-2006-1145 - http://aluigi.altervista.org/adv/aa2k6x-adv.txt +CVE-2006-1146 - http://aluigi.altervista.org/adv/aa2k6x-adv.txt +CVE-2006-1147 - http://aluigi.altervista.org/adv/aa2k6x-adv.txt +CVE-2006-1149 - https://www.exploit-db.com/exploits/1561 +CVE-2006-1153 - https://www.exploit-db.com/exploits/1556 +CVE-2006-1154 - https://www.exploit-db.com/exploits/3027 +CVE-2006-1168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373 +CVE-2006-1182 - http://securityreason.com/securityalert/588 +CVE-2006-1184 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 +CVE-2006-1185 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1186 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1188 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1189 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1190 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A965 +CVE-2006-1191 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1192 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1193 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-029 +CVE-2006-1194 - http://aluigi.altervista.org/adv/enetx-adv.txt +CVE-2006-1195 - http://aluigi.altervista.org/adv/enetx-adv.txt +CVE-2006-1200 - http://securityreason.com/securityalert/553 +CVE-2006-1208 - http://securityreason.com/securityalert/564 +CVE-2006-1209 - http://securityreason.com/securityalert/565 +CVE-2006-1213 - http://www.nukedx.com/?viewdoc=19 +CVE-2006-1216 - http://securityreason.com/securityalert/474 +CVE-2006-1217 - http://evuln.com/vulns/96/summary.html +CVE-2006-1219 - https://www.exploit-db.com/exploits/1566 +CVE-2006-1223 - http://securityreason.com/securityalert/572 +CVE-2006-1224 - http://securityreason.com/securityalert/569 +CVE-2006-1225 - http://securityreason.com/securityalert/579 +CVE-2006-1226 - http://securityreason.com/securityalert/581 +CVE-2006-1227 - http://securityreason.com/securityalert/578 +CVE-2006-1228 - http://securityreason.com/securityalert/580 +CVE-2006-1229 - http://www.osvdb.org/23802 +CVE-2006-1232 - http://evuln.com/vulns/99/summary.html +CVE-2006-1232 - http://securityreason.com/securityalert/626 +CVE-2006-1234 - http://evuln.com/vulns/98/summary.html +CVE-2006-1234 - http://securityreason.com/securityalert/627 +CVE-2006-1234 - http://www.securityfocus.com/archive/1/428807/100/0/threaded +CVE-2006-1236 - http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html +CVE-2006-1236 - https://www.exploit-db.com/exploits/1582 +CVE-2006-1237 - http://evuln.com/vulns/97/summary.html +CVE-2006-1237 - http://securityreason.com/securityalert/623 +CVE-2006-1238 - http://evuln.com/vulns/100/summary.html +CVE-2006-1243 - https://www.exploit-db.com/exploits/1581 +CVE-2006-1245 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1252 - https://www.exploit-db.com/exploits/1570 +CVE-2006-1256 - http://evuln.com/vulns/104/summary.html +CVE-2006-1256 - http://securityreason.com/securityalert/650 +CVE-2006-1257 - http://securityreason.com/securityalert/594 +CVE-2006-1259 - http://evuln.com/vulns/103/summary.html +CVE-2006-1259 - http://securityreason.com/securityalert/645 +CVE-2006-1260 - http://securityreason.com/securityalert/590 +CVE-2006-1262 - http://securityreason.com/securityalert/592 +CVE-2006-1264 - http://evuln.com/vulns/92/summary.html +CVE-2006-1265 - http://evuln.com/vulns/92/summary.html +CVE-2006-1273 - http://securityreason.com/securityalert/593 +CVE-2006-1274 - http://securityreason.com/securityalert/573 +CVE-2006-1275 - http://aluigi.altervista.org/adv/ggzcdos-adv.txt +CVE-2006-1276 - http://evuln.com/vulns/94/summary.html +CVE-2006-1276 - http://securityreason.com/securityalert/613 +CVE-2006-1277 - http://evuln.com/vulns/95/summary.html +CVE-2006-1278 - http://evuln.com/vulns/95/summary.html +CVE-2006-1278 - http://securityreason.com/securityalert/619 +CVE-2006-1278 - https://www.exploit-db.com/exploits/6040 +CVE-2006-1291 - https://www.exploit-db.com/exploits/1586 +CVE-2006-1292 - https://www.exploit-db.com/exploits/1585 +CVE-2006-1293 - http://securityreason.com/securityalert/599 +CVE-2006-1294 - https://www.exploit-db.com/exploits/1587 +CVE-2006-1297 - http://securityreason.com/securityalert/597 +CVE-2006-1300 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-033 +CVE-2006-1301 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-1302 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-1303 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-1304 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-1305 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 +CVE-2006-1306 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-1306 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A950 +CVE-2006-1308 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-1309 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-1311 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-013 +CVE-2006-1313 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023 +CVE-2006-1314 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035 +CVE-2006-1315 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035 +CVE-2006-1316 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 +CVE-2006-1316 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A918 +CVE-2006-1318 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 +CVE-2006-1320 - http://www.securityfocus.com/bid/18999 +CVE-2006-1324 - http://securityreason.com/securityalert/529 +CVE-2006-1324 - http://securityreason.com/securityalert/598 +CVE-2006-1327 - https://www.exploit-db.com/exploits/1594 +CVE-2006-1328 - http://evuln.com/vulns/105/summary.html +CVE-2006-1328 - http://securityreason.com/securityalert/649 +CVE-2006-1332 - http://securityreason.com/securityalert/471 +CVE-2006-1333 - http://www.nukedx.com/?viewdoc=20 +CVE-2006-1334 - http://evuln.com/vulns/101/summary.html +CVE-2006-1334 - http://securityreason.com/securityalert/638 +CVE-2006-1341 - http://evuln.com/vulns/102/description.html +CVE-2006-1341 - http://securityreason.com/securityalert/646 +CVE-2006-1342 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2006-1343 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2006-1346 - https://www.exploit-db.com/exploits/1595 +CVE-2006-1347 - https://www.exploit-db.com/exploits/1595 +CVE-2006-1348 - https://www.exploit-db.com/exploits/1595 +CVE-2006-1353 - http://www.nukedx.com/?viewdoc=21 +CVE-2006-1353 - https://www.exploit-db.com/exploits/1597 +CVE-2006-1357 - http://securityreason.com/securityalert/611 +CVE-2006-1359 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1359 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A985 +CVE-2006-1363 - https://www.exploit-db.com/exploits/1600 +CVE-2006-1364 - https://www.exploit-db.com/exploits/1601 +CVE-2006-1371 - https://www.exploit-db.com/exploits/1605 +CVE-2006-1385 - http://securityreason.com/securityalert/609 +CVE-2006-1388 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 +CVE-2006-1392 - http://www.kb.cert.org/vuls/id/337585 +CVE-2006-1402 - http://aluigi.altervista.org/adv/csdoombof-adv.txt +CVE-2006-1402 - http://www.securityfocus.com/bid/17248 +CVE-2006-1403 - http://aluigi.altervista.org/adv/csdoombof-adv.txt +CVE-2006-1403 - http://www.securityfocus.com/bid/17248 +CVE-2006-1408 - http://aluigi.altervista.org/adv/vaboom-adv.txt +CVE-2006-1409 - http://aluigi.altervista.org/adv/vaboom-adv.txt +CVE-2006-1412 - https://www.exploit-db.com/exploits/1611 +CVE-2006-1422 - https://www.exploit-db.com/exploits/1610 +CVE-2006-1457 - http://www.kb.cert.org/vuls/id/519473 +CVE-2006-1478 - http://securityreason.com/securityalert/641 +CVE-2006-1480 - https://www.exploit-db.com/exploits/1608 +CVE-2006-1481 - https://www.exploit-db.com/exploits/1609 +CVE-2006-1492 - http://www.zataz.com/news/10871/Probleme-de-securite-decouvert-dans-le-logiciel-ExploreXP.html +CVE-2006-1493 - http://www.zataz.com/news/10871/Probleme-de-securite-decouvert-dans-le-logiciel-ExploreXP.html +CVE-2006-1495 - https://www.exploit-db.com/exploits/1617 +CVE-2006-1499 - http://evuln.com/vulns/108/summary.html +CVE-2006-1502 - http://securityreason.com/securityalert/532 +CVE-2006-1510 - http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html +CVE-2006-1511 - http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044482.html +CVE-2006-1516 - http://bugs.debian.org/365938 +CVE-2006-1516 - http://securityreason.com/securityalert/840 +CVE-2006-1516 - http://www.wisec.it/vulns.php?page=7 +CVE-2006-1516 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918 +CVE-2006-1517 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 +CVE-2006-1517 - http://securityreason.com/securityalert/839 +CVE-2006-1517 - http://www.wisec.it/vulns.php?page=8 +CVE-2006-1518 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 +CVE-2006-1518 - http://securityreason.com/securityalert/839 +CVE-2006-1518 - http://www.wisec.it/vulns.php?page=8 +CVE-2006-1520 - http://www.gossamer-threads.com/lists/spf/devel/27053?page=last +CVE-2006-1522 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9325 +CVE-2006-1526 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9929 +CVE-2006-1529 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1530 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1531 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1533 - http://evuln.com/vulns/107/summary.html +CVE-2006-1534 - http://evuln.com/vulns/109/summary.html +CVE-2006-1534 - http://securityreason.com/securityalert/682 +CVE-2006-1537 - http://securityreason.com/securityalert/651 +CVE-2006-1540 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 +CVE-2006-1540 - https://www.exploit-db.com/exploits/1615 +CVE-2006-1541 - http://www.nukedx.com/?viewdoc=22 +CVE-2006-1541 - https://www.exploit-db.com/exploits/1623 +CVE-2006-1542 - https://www.exploit-db.com/exploits/1591 +CVE-2006-1549 - http://securityreason.com/securityalert/2312 +CVE-2006-1551 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php +CVE-2006-1553 - http://evuln.com/vulns/106/description.html +CVE-2006-1554 - http://evuln.com/vulns/106/description.html +CVE-2006-1555 - http://evuln.com/vulns/106/description.html +CVE-2006-1560 - http://securityreason.com/securityalert/680 +CVE-2006-1568 - http://evuln.com/vulns/115/summary.html +CVE-2006-1569 - http://evuln.com/vulns/115/summary.html +CVE-2006-1571 - http://evuln.com/vulns/114/summary.html +CVE-2006-1571 - http://securityreason.com/securityalert/701 +CVE-2006-1574 - http://www.hitachi-support.com/security_e/vuls_e/HS06-005_e/index-e.html +CVE-2006-1575 - http://evuln.com/vulns/113/description.html +CVE-2006-1576 - http://evuln.com/vulns/113/description.html +CVE-2006-1591 - http://securityreason.com/securityalert/700 +CVE-2006-1592 - http://aluigi.altervista.org/adv/zdaebof-adv.txt +CVE-2006-1593 - http://aluigi.altervista.org/adv/zdaebof-adv.txt +CVE-2006-1593 - http://securityreason.com/securityalert/662 +CVE-2006-1594 - https://www.exploit-db.com/exploits/1627 +CVE-2006-1595 - https://www.exploit-db.com/exploits/1627 +CVE-2006-1596 - https://www.exploit-db.com/exploits/1627 +CVE-2006-1610 - https://www.exploit-db.com/exploits/1629 +CVE-2006-1612 - http://evuln.com/vulns/116/summary.html +CVE-2006-1613 - http://evuln.com/vulns/116/summary.html +CVE-2006-1620 - https://www.exploit-db.com/exploits/4730 +CVE-2006-1626 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-1637 - http://evuln.com/vulns/117/summary.html +CVE-2006-1638 - http://evuln.com/vulns/117/summary.html +CVE-2006-1639 - http://evuln.com/vulns/119/summary.html +CVE-2006-1639 - http://securityreason.com/securityalert/734 +CVE-2006-1640 - http://evuln.com/vulns/118/summary.html +CVE-2006-1640 - http://securityreason.com/securityalert/732 +CVE-2006-1641 - http://evuln.com/vulns/118/summary.html +CVE-2006-1649 - http://securityreason.com/securityalert/672 +CVE-2006-1652 - http://securityreason.com/securityalert/674 +CVE-2006-1652 - https://www.exploit-db.com/exploits/1642 +CVE-2006-1652 - https://www.exploit-db.com/exploits/1643 +CVE-2006-1657 - http://evuln.com/vulns/121/summary.html +CVE-2006-1658 - http://evuln.com/vulns/121/summary.html +CVE-2006-1662 - http://securityreason.com/securityalert/519 +CVE-2006-1664 - https://www.exploit-db.com/exploits/1641 +CVE-2006-1667 - https://www.exploit-db.com/exploits/1645 +CVE-2006-1668 - https://www.exploit-db.com/exploits/1645 +CVE-2006-1669 - https://www.exploit-db.com/exploits/1646 +CVE-2006-1690 - http://evuln.com/vulns/123/summary.html +CVE-2006-1690 - http://securityreason.com/securityalert/752 +CVE-2006-1691 - http://evuln.com/vulns/123/summary.html +CVE-2006-1694 - https://www.exploit-db.com/exploits/1655 +CVE-2006-1705 - http://www.securityfocus.com/archive/1/430434/100/0/threaded +CVE-2006-1708 - https://www.exploit-db.com/exploits/1662 +CVE-2006-1710 - https://www.exploit-db.com/exploits/1653 +CVE-2006-1721 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2006-1721 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9861 +CVE-2006-1723 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1724 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1724 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1725 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1725 - https://bugzilla.mozilla.org/show_bug.cgi?id=327014 +CVE-2006-1726 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1727 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1727 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1728 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1728 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1729 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1730 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1730 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1731 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1731 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9604 +CVE-2006-1732 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1733 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1734 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1735 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1737 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1738 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9405 +CVE-2006-1739 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1739 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9817 +CVE-2006-1741 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1741 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9167 +CVE-2006-1742 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1747 - https://www.exploit-db.com/exploits/1658 +CVE-2006-1755 - http://evuln.com/vulns/120/summary.html +CVE-2006-1756 - http://evuln.com/vulns/120/summary.html +CVE-2006-1763 - http://securityreason.com/securityalert/689 +CVE-2006-1776 - https://www.exploit-db.com/exploits/1663 +CVE-2006-1777 - https://www.exploit-db.com/exploits/1663 +CVE-2006-1778 - http://securityreason.com/securityalert/702 +CVE-2006-1778 - https://www.exploit-db.com/exploits/1663 +CVE-2006-1779 - https://www.exploit-db.com/exploits/1663 +CVE-2006-1781 - http://pridels0.blogspot.com/2006/04/monstertoplist.html +CVE-2006-1781 - https://www.exploit-db.com/exploits/3530 +CVE-2006-1784 - https://www.exploit-db.com/exploits/1665 +CVE-2006-1789 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php +CVE-2006-1790 - http://www.redhat.com/support/errata/RHSA-2006-0330.html +CVE-2006-1798 - http://evuln.com/vulns/124/summary.html +CVE-2006-1799 - https://www.exploit-db.com/exploits/1669 +CVE-2006-1817 - http://evuln.com/vulns/125/summary.html +CVE-2006-1818 - http://evuln.com/vulns/125/summary.html +CVE-2006-1819 - https://www.exploit-db.com/exploits/1673 +CVE-2006-1822 - http://securityreason.com/securityalert/710 +CVE-2006-1823 - http://securityreason.com/securityalert/710 +CVE-2006-1828 - https://www.exploit-db.com/exploits/1666 +CVE-2006-1831 - https://www.exploit-db.com/exploits/1677 +CVE-2006-1832 - https://www.exploit-db.com/exploits/1677 +CVE-2006-1834 - http://marc.info/?l=full-disclosure&m=114493114031891&w=2 +CVE-2006-1837 - https://www.exploit-db.com/exploits/1682 +CVE-2006-1838 - https://www.exploit-db.com/exploits/1682 +CVE-2006-1856 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9927 +CVE-2006-1858 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9510 +CVE-2006-1861 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124 +CVE-2006-1862 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9390 +CVE-2006-1864 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2006-1891 - http://securityreason.com/securityalert/765 +CVE-2006-1917 - https://www.exploit-db.com/exploits/1683 +CVE-2006-1919 - https://www.exploit-db.com/exploits/1694 +CVE-2006-1921 - https://www.exploit-db.com/exploits/1695 +CVE-2006-1922 - http://pridels0.blogspot.com/2006/04/totalcalendar-remote-code-execution.html +CVE-2006-1929 - http://pridels0.blogspot.com/2006/04/i-rater-platinum-remote-file-inclusion.html +CVE-2006-1932 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9823 +CVE-2006-1938 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9850 +CVE-2006-1940 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9781 +CVE-2006-1942 - http://www.networksecurity.fi/advisories/netscape-view-image.html +CVE-2006-1942 - http://www.securityfocus.com/archive/1/431267/100/0/threaded +CVE-2006-1942 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1954 - https://www.exploit-db.com/exploits/1699 +CVE-2006-1955 - https://www.exploit-db.com/exploits/1699 +CVE-2006-1964 - http://www.nukedx.com/?getxpl=23 +CVE-2006-1967 - http://securityreason.com/securityalert/503 +CVE-2006-1978 - https://www.exploit-db.com/exploits/1686 +CVE-2006-1979 - http://evuln.com/vulns/122/summary.html +CVE-2006-1979 - http://securityreason.com/securityalert/747 +CVE-2006-1990 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696 +CVE-2006-1992 - http://securityreason.com/securityalert/781 +CVE-2006-1992 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-1993 - http://securityreason.com/securityalert/780 +CVE-2006-1993 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-1994 - http://www.nukedx.com/?viewdoc=27 +CVE-2006-1995 - http://securityreason.com/securityalert/784 +CVE-2006-1996 - http://securityreason.com/securityalert/784 +CVE-2006-1998 - http://aluigi.altervista.org/adv/openttdx-adv.txt +CVE-2006-1999 - http://aluigi.altervista.org/adv/openttdx-adv.txt +CVE-2006-2001 - http://securityreason.com/securityalert/783 +CVE-2006-2002 - http://www.nukedx.com/?viewdoc=28 +CVE-2006-2005 - http://securityreason.com/securityalert/782 +CVE-2006-2005 - http://www.nukedx.com/?getxpl=29 +CVE-2006-2008 - https://www.exploit-db.com/exploits/1711 +CVE-2006-2009 - http://securityreason.com/securityalert/787 +CVE-2006-2012 - http://aluigi.altervista.org/adv/skulltagfs-adv.txt +CVE-2006-2017 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2006-2019 - https://www.exploit-db.com/exploits/1715 +CVE-2006-2024 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9893 +CVE-2006-2027 - http://securityreason.com/securityalert/788 +CVE-2006-2028 - http://www.nukedx.com/?getxpl=25 +CVE-2006-2029 - http://www.nukedx.com/?getxpl=25 +CVE-2006-2032 - http://www.nukedx.com/?getxpl=24 +CVE-2006-2033 - http://www.nukedx.com/?getxpl=24 +CVE-2006-2040 - http://securityreason.com/securityalert/789 +CVE-2006-2046 - https://www.exploit-db.com/exploits/4264 +CVE-2006-2048 - http://securityreason.com/securityalert/786 +CVE-2006-2058 - http://securityreason.com/securityalert/785 +CVE-2006-2059 - http://securityreason.com/securityalert/796 +CVE-2006-2060 - http://securityreason.com/securityalert/796 +CVE-2006-2061 - http://securityreason.com/securityalert/796 +CVE-2006-2066 - http://www.nukedx.com/?viewdoc=26 +CVE-2006-2067 - http://www.nukedx.com/?viewdoc=26 +CVE-2006-2070 - http://securityreason.com/securityalert/800 +CVE-2006-2071 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2006-2071 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9978 +CVE-2006-2081 - http://securityreason.com/securityalert/802 +CVE-2006-2081 - http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html +CVE-2006-2084 - http://securityreason.com/securityalert/812 +CVE-2006-2085 - http://securityreason.com/securityalert/820 +CVE-2006-2088 - http://securityreason.com/securityalert/806 +CVE-2006-2089 - http://securityreason.com/securityalert/807 +CVE-2006-2090 - http://securityreason.com/securityalert/807 +CVE-2006-2091 - http://securityreason.com/securityalert/818 +CVE-2006-2093 - http://securityreason.com/securityalert/817 +CVE-2006-2096 - http://securityreason.com/securityalert/814 +CVE-2006-2097 - http://securityreason.com/securityalert/813 +CVE-2006-2099 - http://securityreason.com/securityalert/815 +CVE-2006-2100 - http://securityreason.com/securityalert/815 +CVE-2006-2101 - http://securityreason.com/securityalert/815 +CVE-2006-2102 - http://securityreason.com/securityalert/815 +CVE-2006-2103 - http://securityreason.com/securityalert/808 +CVE-2006-2107 - http://securityreason.com/securityalert/809 +CVE-2006-2108 - https://www.exploit-db.com/exploits/1718 +CVE-2006-2111 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 +CVE-2006-2114 - http://securityreason.com/securityalert/816 +CVE-2006-2115 - http://securityreason.com/securityalert/816 +CVE-2006-2116 - http://securityreason.com/securityalert/825 +CVE-2006-2117 - http://securityreason.com/securityalert/822 +CVE-2006-2118 - http://securityreason.com/securityalert/821 +CVE-2006-2119 - http://securityreason.com/securityalert/811 +CVE-2006-2120 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9572 +CVE-2006-2121 - http://securityreason.com/securityalert/824 +CVE-2006-2122 - http://securityreason.com/securityalert/823 +CVE-2006-2127 - http://securityreason.com/securityalert/810 +CVE-2006-2128 - http://evuln.com/vulns/130/summary.html +CVE-2006-2129 - http://evuln.com/vulns/130/summary.html +CVE-2006-2130 - http://evuln.com/vulns/131/summary.html +CVE-2006-2131 - http://evuln.com/vulns/131/summary.html +CVE-2006-2134 - https://www.exploit-db.com/exploits/1728 +CVE-2006-2135 - http://evuln.com/vulns/128/ +CVE-2006-2136 - http://evuln.com/vulns/126/ +CVE-2006-2137 - https://www.exploit-db.com/exploits/1727 +CVE-2006-2138 - http://securityreason.com/securityalert/827 +CVE-2006-2139 - http://evuln.com/vulns/129/summary.html +CVE-2006-2142 - https://www.exploit-db.com/exploits/1729 +CVE-2006-2143 - http://securityreason.com/securityalert/828 +CVE-2006-2144 - http://securityreason.com/securityalert/826 +CVE-2006-2145 - http://evuln.com/vulns/127/summary.html +CVE-2006-2146 - http://evuln.com/vulns/127/summary.html +CVE-2006-2149 - https://www.exploit-db.com/exploits/1732 +CVE-2006-2151 - https://www.exploit-db.com/exploits/1722 +CVE-2006-2151 - https://www.exploit-db.com/exploits/1724 +CVE-2006-2152 - https://www.exploit-db.com/exploits/1723 +CVE-2006-2152 - https://www.exploit-db.com/exploits/1725 +CVE-2006-2153 - http://securityreason.com/securityalert/830 +CVE-2006-2156 - https://www.exploit-db.com/exploits/1738 +CVE-2006-2167 - http://securityreason.com/securityalert/831 +CVE-2006-2174 - http://securityreason.com/securityalert/832 +CVE-2006-2175 - https://www.exploit-db.com/exploits/1740 +CVE-2006-2177 - http://securityreason.com/securityalert/833 +CVE-2006-2181 - http://pridels0.blogspot.com/2006/05/albinator-208-remote-file-inclusion.html +CVE-2006-2182 - http://pridels0.blogspot.com/2006/05/albinator-208-remote-file-inclusion.html +CVE-2006-2186 - http://securityreason.com/securityalert/834 +CVE-2006-2189 - http://securityreason.com/securityalert/836 +CVE-2006-2193 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9788 +CVE-2006-2194 - http://www.ubuntu.com/usn/usn-310-1 +CVE-2006-2204 - http://securityreason.com/securityalert/551 +CVE-2006-2218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-2219 - http://securityreason.com/securityalert/837 +CVE-2006-2220 - http://securityreason.com/securityalert/837 +CVE-2006-2223 - http://www.redhat.com/support/errata/RHSA-2006-0525.html +CVE-2006-2223 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985 +CVE-2006-2224 - http://www.redhat.com/support/errata/RHSA-2006-0525.html +CVE-2006-2226 - http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt +CVE-2006-2226 - https://www.exploit-db.com/exploits/1552 +CVE-2006-2231 - http://securityreason.com/securityalert/843 +CVE-2006-2232 - http://securityreason.com/securityalert/844 +CVE-2006-2236 - https://www.exploit-db.com/exploits/1750 +CVE-2006-2239 - http://evuln.com/vulns/133/summary.html +CVE-2006-2242 - https://www.exploit-db.com/exploits/1749 +CVE-2006-2245 - http://pridels0.blogspot.com/2006/05/phpbb-auction-mod-remote-file.html +CVE-2006-2249 - http://securityreason.com/securityalert/860 +CVE-2006-2250 - http://securityreason.com/securityalert/860 +CVE-2006-2253 - https://www.exploit-db.com/exploits/1752 +CVE-2006-2256 - https://www.exploit-db.com/exploits/1764 +CVE-2006-2261 - https://www.exploit-db.com/exploits/1763 +CVE-2006-2263 - https://www.exploit-db.com/exploits/1759 +CVE-2006-2268 - https://www.exploit-db.com/exploits/7622 +CVE-2006-2274 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531 +CVE-2006-2276 - http://www.redhat.com/support/errata/RHSA-2006-0525.html +CVE-2006-2284 - https://www.exploit-db.com/exploits/1766 +CVE-2006-2297 - http://securityreason.com/securityalert/886 +CVE-2006-2314 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9947 +CVE-2006-2315 - https://www.exploit-db.com/exploits/1762 +CVE-2006-2323 - http://securityreason.com/securityalert/156 +CVE-2006-2324 - http://secdev.zoller.lu/research/zango.htm +CVE-2006-2328 - http://securityreason.com/securityalert/883 +CVE-2006-2329 - http://securityreason.com/securityalert/883 +CVE-2006-2330 - http://securityreason.com/securityalert/873 +CVE-2006-2331 - http://securityreason.com/securityalert/873 +CVE-2006-2361 - https://www.exploit-db.com/exploits/1774 +CVE-2006-2363 - https://www.exploit-db.com/exploits/1751 +CVE-2006-2369 - http://seclists.org/fulldisclosure/2022/May/29 +CVE-2006-2369 - http://securityreason.com/securityalert/8355 +CVE-2006-2369 - http://www.intelliadmin.com/blog/2006/05/vnc-flaw-proof-of-concept.html +CVE-2006-2370 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 +CVE-2006-2371 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 +CVE-2006-2372 - http://securityreason.com/securityalert/1201 +CVE-2006-2372 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-036 +CVE-2006-2372 - https://www.exploit-db.com/exploits/2054 +CVE-2006-2373 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 +CVE-2006-2374 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 +CVE-2006-2376 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-026 +CVE-2006-2378 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-022 +CVE-2006-2379 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032 +CVE-2006-2380 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-031 +CVE-2006-2382 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-2383 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-2384 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-2385 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021 +CVE-2006-2386 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-076 +CVE-2006-2387 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 +CVE-2006-2388 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-2389 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-038 +CVE-2006-2392 - https://www.exploit-db.com/exploits/1779 +CVE-2006-2393 - http://aluigi.altervista.org/adv/empiredos-adv.txt +CVE-2006-2395 - http://pridels0.blogspot.com/2006/05/popphoto-remote-file-inclusion-vuln.html +CVE-2006-2399 - http://aluigi.altervista.org/adv/outgunx-adv.txt +CVE-2006-2399 - http://securityreason.com/securityalert/898 +CVE-2006-2400 - http://aluigi.altervista.org/adv/outgunx-adv.txt +CVE-2006-2400 - http://securityreason.com/securityalert/898 +CVE-2006-2401 - http://aluigi.altervista.org/adv/outgunx-adv.txt +CVE-2006-2401 - http://securityreason.com/securityalert/898 +CVE-2006-2402 - http://aluigi.altervista.org/adv/outgunx-adv.txt +CVE-2006-2402 - http://securityreason.com/securityalert/898 +CVE-2006-2407 - http://marc.info/?l=full-disclosure&m=114764338702488&w=2 +CVE-2006-2407 - http://securityreason.com/securityalert/901 +CVE-2006-2408 - http://aluigi.altervista.org/adv/raydiumx-adv.txt +CVE-2006-2408 - http://securityreason.com/securityalert/900 +CVE-2006-2409 - http://aluigi.altervista.org/adv/raydiumx-adv.txt +CVE-2006-2409 - http://securityreason.com/securityalert/900 +CVE-2006-2410 - http://aluigi.altervista.org/adv/raydiumx-adv.txt +CVE-2006-2410 - http://securityreason.com/securityalert/900 +CVE-2006-2411 - http://aluigi.altervista.org/adv/raydiumx-adv.txt +CVE-2006-2411 - http://securityreason.com/securityalert/900 +CVE-2006-2412 - http://aluigi.altervista.org/adv/raydiumx-adv.txt +CVE-2006-2412 - http://securityreason.com/securityalert/900 +CVE-2006-2415 - http://www.osvdb.org/25505 +CVE-2006-2420 - https://bugzilla.mozilla.org/show_bug.cgi?id=313441 +CVE-2006-2424 - https://www.exploit-db.com/exploits/1795 +CVE-2006-2440 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9481 +CVE-2006-2446 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9117 +CVE-2006-2447 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9184 +CVE-2006-2449 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844 +CVE-2006-2450 - http://seclists.org/fulldisclosure/2022/May/29 +CVE-2006-2460 - http://securityreason.com/securityalert/921 +CVE-2006-2460 - https://www.exploit-db.com/exploits/1785 +CVE-2006-2465 - http://packetstormsecurity.com/files/124955/Mp3info-Stack-Buffer-Overflow.html +CVE-2006-2465 - http://packetstormsecurity.com/files/125786/MP3Info-0.8.5-SEH-Buffer-Overflow.html +CVE-2006-2465 - http://www.exploit-db.com/exploits/32358 +CVE-2006-2468 - http://dev2dev.bea.com/pub/advisory/190 +CVE-2006-2483 - https://www.exploit-db.com/exploits/1790 +CVE-2006-2485 - http://www.nukedx.com/?getxpl=30 +CVE-2006-2487 - https://www.exploit-db.com/exploits/1800 +CVE-2006-2491 - http://securityreason.com/securityalert/927 +CVE-2006-2492 - http://isc.sans.org/diary.php?storyid=1345 +CVE-2006-2492 - http://isc.sans.org/diary.php?storyid=1346 +CVE-2006-2494 - https://www.exploit-db.com/exploits/1806 +CVE-2006-2507 - http://securityreason.com/securityalert/932 +CVE-2006-2509 - http://www.securityfocus.com/bid/18046 +CVE-2006-2510 - http://www.securityfocus.com/bid/18046 +CVE-2006-2516 - https://www.exploit-db.com/exploits/1811 +CVE-2006-2521 - https://www.exploit-db.com/exploits/1808 +CVE-2006-2523 - https://www.exploit-db.com/exploits/1805 +CVE-2006-2541 - https://www.exploit-db.com/exploits/1807 +CVE-2006-2548 - http://securityreason.com/securityalert/942 +CVE-2006-2548 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-002.php +CVE-2006-2548 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-003.php +CVE-2006-2550 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-003.php +CVE-2006-2554 - http://aluigi.altervista.org/adv/genecysbof-adv.txt +CVE-2006-2554 - http://securityreason.com/securityalert/944 +CVE-2006-2555 - http://aluigi.altervista.org/adv/genecysbof-adv.txt +CVE-2006-2555 - http://securityreason.com/securityalert/944 +CVE-2006-2557 - http://securityreason.com/securityalert/947 +CVE-2006-2557 - https://www.exploit-db.com/exploits/1789 +CVE-2006-2565 - http://securityreason.com/securityalert/949 +CVE-2006-2566 - http://securityreason.com/securityalert/949 +CVE-2006-2567 - http://securityreason.com/securityalert/949 +CVE-2006-2568 - https://www.exploit-db.com/exploits/1814 +CVE-2006-2569 - https://www.exploit-db.com/exploits/1810 +CVE-2006-2570 - https://www.exploit-db.com/exploits/1809 +CVE-2006-2575 - http://aluigi.altervista.org/adv/panza-adv.txt +CVE-2006-2576 - https://www.exploit-db.com/exploits/1817 +CVE-2006-2583 - http://securityreason.com/securityalert/951 +CVE-2006-2587 - http://aluigi.altervista.org/adv/pbwebbof-adv.txt +CVE-2006-2611 - http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349&r2=14348&pathrev=14349 +CVE-2006-2613 - http://securityreason.com/securityalert/960 +CVE-2006-2613 - https://bugzilla.mozilla.org/show_bug.cgi?id=267645 +CVE-2006-2616 - http://securityreason.com/securityalert/955 +CVE-2006-2617 - http://securityreason.com/securityalert/955 +CVE-2006-2618 - http://securityreason.com/securityalert/955 +CVE-2006-2634 - http://securityreason.com/securityalert/967 +CVE-2006-2639 - http://securityreason.com/securityalert/971 +CVE-2006-2648 - http://www.nukedx.com/?viewdoc=32 +CVE-2006-2651 - http://securityreason.com/securityalert/982 +CVE-2006-2656 - http://marc.info/?l=vuln-dev&m=114857412916909&w=2 +CVE-2006-2665 - https://www.exploit-db.com/exploits/1827 +CVE-2006-2666 - https://www.exploit-db.com/exploits/1827 +CVE-2006-2668 - https://www.exploit-db.com/exploits/1828 +CVE-2006-2669 - http://securityreason.com/securityalert/990 +CVE-2006-2680 - http://securityreason.com/securityalert/992 +CVE-2006-2682 - https://www.exploit-db.com/exploits/1825 +CVE-2006-2683 - https://www.exploit-db.com/exploits/1824 +CVE-2006-2685 - https://www.exploit-db.com/exploits/1823 +CVE-2006-2686 - https://www.exploit-db.com/exploits/1829 +CVE-2006-2693 - http://www.nukedx.com/?viewdoc=37 +CVE-2006-2725 - http://www.nukedx.com/?getxpl=36 +CVE-2006-2725 - http://www.nukedx.com/?viewdoc=36 +CVE-2006-2726 - https://www.exploit-db.com/exploits/1848 +CVE-2006-2727 - http://www.nukedx.com/?viewdoc=36 +CVE-2006-2730 - https://www.exploit-db.com/exploits/1835 +CVE-2006-2731 - http://www.nukedx.com/?getxpl=34 +CVE-2006-2731 - http://www.nukedx.com/?viewdoc=34 +CVE-2006-2732 - http://www.nukedx.com/?getxpl=31 +CVE-2006-2732 - http://www.nukedx.com/?viewdoc=31 +CVE-2006-2733 - http://www.nukedx.com/?getxpl=31 +CVE-2006-2733 - http://www.nukedx.com/?viewdoc=31 +CVE-2006-2734 - http://www.nukedx.com/?getxpl=31 +CVE-2006-2734 - http://www.nukedx.com/?viewdoc=31 +CVE-2006-2735 - http://www.nukedx.com/?getxpl=38 +CVE-2006-2735 - http://www.nukedx.com/?viewdoc=38 +CVE-2006-2736 - http://www.nukedx.com/?getxpl=41 +CVE-2006-2736 - http://www.nukedx.com/?viewdoc=41 +CVE-2006-2739 - http://www.nukedx.com/?getxpl=33 +CVE-2006-2739 - http://www.nukedx.com/?viewdoc=33 +CVE-2006-2740 - http://www.nukedx.com/?getxpl=33 +CVE-2006-2740 - http://www.nukedx.com/?viewdoc=33 +CVE-2006-2741 - http://www.nukedx.com/?getxpl=33 +CVE-2006-2741 - http://www.nukedx.com/?viewdoc=33 +CVE-2006-2743 - https://www.exploit-db.com/exploits/1821 +CVE-2006-2744 - http://www.nukedx.com/?getxpl=35 +CVE-2006-2744 - http://www.nukedx.com/?viewdoc=35 +CVE-2006-2745 - http://www.nukedx.com/?getxpl=35 +CVE-2006-2745 - http://www.nukedx.com/?viewdoc=35 +CVE-2006-2746 - http://www.nukedx.com/?getxpl=35 +CVE-2006-2746 - http://www.nukedx.com/?viewdoc=35 +CVE-2006-2755 - http://www.nukedx.com/?viewdoc=40 +CVE-2006-2763 - https://www.exploit-db.com/exploits/5803 +CVE-2006-2766 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-043 +CVE-2006-2767 - https://www.exploit-db.com/exploits/1854 +CVE-2006-2768 - https://www.exploit-db.com/exploits/1855 +CVE-2006-2769 - http://marc.info/?l=snort-devel&m=114909074311462&w=2 +CVE-2006-2770 - http://securityreason.com/securityalert/1015 +CVE-2006-2775 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2776 - http://www.mozilla.org/security/announce/2006/mfsa2006-37.html +CVE-2006-2776 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2776 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9849 +CVE-2006-2777 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2778 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2778 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703 +CVE-2006-2779 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2779 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9762 +CVE-2006-2780 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2782 - http://www.mozilla.org/security/announce/2006/mfsa2006-41.html +CVE-2006-2782 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2783 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2784 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2784 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768 +CVE-2006-2785 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2786 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2786 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9966 +CVE-2006-2787 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-2787 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9491 +CVE-2006-2788 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-2793 - http://securityreason.com/securityalert/745 +CVE-2006-2793 - http://www.nukedx.com/?viewdoc=39 +CVE-2006-2794 - http://www.nukedx.com/?viewdoc=39 +CVE-2006-2797 - https://www.exploit-db.com/exploits/1818 +CVE-2006-2798 - https://www.exploit-db.com/exploits/1818 +CVE-2006-2802 - https://www.exploit-db.com/exploits/1852 +CVE-2006-2803 - http://securityreason.com/securityalert/1024 +CVE-2006-2810 - http://securityreason.com/securityalert/571 +CVE-2006-2812 - http://securityreason.com/securityalert/1032 +CVE-2006-2818 - https://www.exploit-db.com/exploits/1865 +CVE-2006-2819 - https://www.exploit-db.com/exploits/1863 +CVE-2006-2834 - https://www.exploit-db.com/exploits/1851 +CVE-2006-2841 - https://www.exploit-db.com/exploits/1858 +CVE-2006-2843 - https://www.exploit-db.com/exploits/1861 +CVE-2006-2844 - https://www.exploit-db.com/exploits/1861 +CVE-2006-2845 - https://www.exploit-db.com/exploits/1861 +CVE-2006-2847 - https://www.exploit-db.com/exploits/1859 +CVE-2006-2848 - https://www.exploit-db.com/exploits/1859 +CVE-2006-2849 - https://www.exploit-db.com/exploits/1860 +CVE-2006-2860 - https://www.exploit-db.com/exploits/1871 +CVE-2006-2861 - http://pridels0.blogspot.com/2006/06/particle-wiki-sql-inj.html +CVE-2006-2863 - https://www.exploit-db.com/exploits/1872 +CVE-2006-2864 - https://www.exploit-db.com/exploits/1870 +CVE-2006-2866 - http://securityreason.com/securityalert/1053 +CVE-2006-2867 - http://securityreason.com/securityalert/1052 +CVE-2006-2868 - https://www.exploit-db.com/exploits/1877 +CVE-2006-2871 - http://securityreason.com/securityalert/1051 +CVE-2006-2872 - http://securityreason.com/securityalert/1050 +CVE-2006-2875 - http://aluigi.altervista.org/adv/q3cbof-adv.txt +CVE-2006-2877 - http://securityreason.com/securityalert/1058 +CVE-2006-2879 - http://securityreason.com/securityalert/1057 +CVE-2006-2881 - https://www.exploit-db.com/exploits/1881 +CVE-2006-2882 - http://securityreason.com/securityalert/1056 +CVE-2006-2883 - http://securityreason.com/securityalert/1055 +CVE-2006-2884 - http://securityreason.com/securityalert/1055 +CVE-2006-2887 - http://securityreason.com/securityalert/1054 +CVE-2006-2888 - https://www.exploit-db.com/exploits/1883 +CVE-2006-2889 - http://securityreason.com/securityalert/1061 +CVE-2006-2890 - http://securityreason.com/securityalert/1061 +CVE-2006-2891 - http://securityreason.com/securityalert/1061 +CVE-2006-2892 - http://securityreason.com/securityalert/1060 +CVE-2006-2893 - http://securityreason.com/securityalert/1060 +CVE-2006-2894 - http://securityreason.com/securityalert/1059 +CVE-2006-2895 - http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES +CVE-2006-2896 - https://www.exploit-db.com/exploits/1875 +CVE-2006-2899 - http://securityreason.com/securityalert/1063 +CVE-2006-2900 - http://securityreason.com/securityalert/1059 +CVE-2006-2928 - http://securityreason.com/securityalert/1068 +CVE-2006-2929 - https://www.exploit-db.com/exploits/1886 +CVE-2006-2936 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2006-2937 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html +CVE-2006-2937 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2006-2937 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2006-2937 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2006-2937 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2006-2937 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2006-2940 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html +CVE-2006-2940 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2006-2940 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2006-2940 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2006-2940 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2006-2940 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2006-2941 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9912 +CVE-2006-2962 - https://www.exploit-db.com/exploits/1895 +CVE-2006-2965 - http://securityreason.com/securityalert/1071 +CVE-2006-2966 - http://securityreason.com/securityalert/1070 +CVE-2006-2967 - http://securityreason.com/securityalert/1077 +CVE-2006-2968 - http://securityreason.com/securityalert/1092 +CVE-2006-2969 - http://securityreason.com/securityalert/1091 +CVE-2006-2970 - http://securityreason.com/securityalert/1091 +CVE-2006-2975 - http://securityreason.com/securityalert/1088 +CVE-2006-2982 - https://www.exploit-db.com/exploits/1891 +CVE-2006-2991 - http://securityreason.com/securityalert/1082 +CVE-2006-2994 - http://securityreason.com/securityalert/1081 +CVE-2006-2995 - https://www.exploit-db.com/exploits/1898 +CVE-2006-2996 - https://www.exploit-db.com/exploits/1896 +CVE-2006-2998 - https://www.exploit-db.com/exploits/1899 +CVE-2006-2999 - http://securityreason.com/securityalert/1080 +CVE-2006-3000 - http://securityreason.com/securityalert/1080 +CVE-2006-3001 - http://securityreason.com/securityalert/1080 +CVE-2006-3004 - http://securityreason.com/securityalert/1097 +CVE-2006-3012 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-004.txt +CVE-2006-3013 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-005.txt +CVE-2006-3019 - http://securityreason.com/securityalert/1106 +CVE-2006-3027 - https://www.exploit-db.com/exploits/2986 +CVE-2006-3028 - https://www.exploit-db.com/exploits/1908 +CVE-2006-3042 - http://securityreason.com/securityalert/1098 +CVE-2006-3059 - http://isc.sans.org/diary.php?storyid=1420 +CVE-2006-3059 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 +CVE-2006-3060 - http://securityreason.com/securityalert/1108 +CVE-2006-3061 - http://securityreason.com/securityalert/1107 +CVE-2006-3065 - https://www.exploit-db.com/exploits/1904 +CVE-2006-3081 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516 +CVE-2006-3083 - http://www.ubuntu.com/usn/usn-334-1 +CVE-2006-3083 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515 +CVE-2006-3084 - http://www.ubuntu.com/usn/usn-334-1 +CVE-2006-3086 - http://marc.info/?l=full-disclosure&m=115067840426070&w=2 +CVE-2006-3086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-050 +CVE-2006-3086 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A999 +CVE-2006-3094 - http://marc.info/?l=bugtraq&m=115048898305454&w=2 +CVE-2006-3102 - https://www.exploit-db.com/exploits/1918 +CVE-2006-3109 - http://securityreason.com/securityalert/1114 +CVE-2006-3110 - http://marc.info/?l=bugtraq&m=115024576618386&w=2 +CVE-2006-3111 - http://marc.info/?l=bugtraq&m=115024576618386&w=2 +CVE-2006-3112 - http://marc.info/?l=bugtraq&m=115024576618386&w=2 +CVE-2006-3113 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3113 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3114 - http://securityreason.com/securityalert/1340 +CVE-2006-3117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9704 +CVE-2006-3134 - http://europe.nokia.com/nokia/0,,93034,00.html +CVE-2006-3142 - https://www.exploit-db.com/exploits/4140 +CVE-2006-3144 - https://www.exploit-db.com/exploits/1929 +CVE-2006-3144 - https://www.exploit-db.com/exploits/9699 +CVE-2006-3162 - https://www.exploit-db.com/exploits/1936 +CVE-2006-3172 - http://marc.info/?l=bugtraq&m=115016951316696&w=2 +CVE-2006-3177 - https://www.exploit-db.com/exploits/1912 +CVE-2006-3181 - http://securityreason.com/securityalert/1128 +CVE-2006-3182 - http://securityreason.com/securityalert/1128 +CVE-2006-3183 - http://securityreason.com/securityalert/1128 +CVE-2006-3184 - https://www.exploit-db.com/exploits/1931 +CVE-2006-3185 - http://securityreason.com/securityalert/1127 +CVE-2006-3189 - http://marc.info/?l=bugtraq&m=115041611713385&w=2 +CVE-2006-3192 - https://www.exploit-db.com/exploits/1923 +CVE-2006-3193 - https://www.exploit-db.com/exploits/1933 +CVE-2006-3194 - http://securityreason.com/securityalert/1135 +CVE-2006-3195 - http://securityreason.com/securityalert/1135 +CVE-2006-3196 - http://securityreason.com/securityalert/1135 +CVE-2006-3197 - http://securityreason.com/securityalert/596 +CVE-2006-3200 - http://securityreason.com/securityalert/1132 +CVE-2006-3221 - https://www.exploit-db.com/exploits/1938 +CVE-2006-3221 - https://www.exploit-db.com/exploits/1939 +CVE-2006-3222 - http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-15.html +CVE-2006-3226 - http://securityreason.com/securityalert/1157 +CVE-2006-3228 - https://www.exploit-db.com/exploits/1935 +CVE-2006-3252 - http://securityreason.com/securityalert/1152 +CVE-2006-3253 - http://securityreason.com/securityalert/1155 +CVE-2006-3254 - http://securityreason.com/securityalert/1154 +CVE-2006-3255 - http://securityreason.com/securityalert/1153 +CVE-2006-3259 - http://securityreason.com/securityalert/1151 +CVE-2006-3260 - http://securityreason.com/securityalert/1150 +CVE-2006-3261 - http://securityreason.com/securityalert/1159 +CVE-2006-3262 - http://securityreason.com/securityalert/1158 +CVE-2006-3264 - http://securityreason.com/securityalert/1156 +CVE-2006-3265 - http://securityreason.com/securityalert/538 +CVE-2006-3266 - https://www.exploit-db.com/exploits/1951 +CVE-2006-3269 - https://www.exploit-db.com/exploits/1952 +CVE-2006-3275 - http://marc.info/?l=full-disclosure&m=115102378824221&w=2 +CVE-2006-3279 - http://www.osvdb.org/26831 +CVE-2006-3280 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3281 - http://www.kb.cert.org/vuls/id/655100 +CVE-2006-3281 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-045 +CVE-2006-3294 - https://www.exploit-db.com/exploits/1955 +CVE-2006-3298 - http://www.security.nnov.ru/Gnews281.html +CVE-2006-3299 - http://securityreason.com/securityalert/1170 +CVE-2006-3300 - https://www.exploit-db.com/exploits/1948 +CVE-2006-3304 - https://www.exploit-db.com/exploits/1953 +CVE-2006-3309 - https://www.exploit-db.com/exploits/1957 +CVE-2006-3311 - http://securityreason.com/securityalert/1546 +CVE-2006-3313 - http://securityreason.com/securityalert/1168 +CVE-2006-3315 - http://securityreason.com/securityalert/1176 +CVE-2006-3317 - http://securityreason.com/securityalert/1173 +CVE-2006-3317 - https://www.exploit-db.com/exploits/3528 +CVE-2006-3318 - http://securityreason.com/securityalert/1173 +CVE-2006-3319 - http://securityreason.com/securityalert/1175 +CVE-2006-3320 - http://securityreason.com/securityalert/1174 +CVE-2006-3322 - http://securityreason.com/securityalert/1173 +CVE-2006-3323 - http://securityreason.com/securityalert/1172 +CVE-2006-3324 - http://aluigi.altervista.org/adv/q3cfilevar-adv.txt +CVE-2006-3324 - http://securityreason.com/securityalert/1171 +CVE-2006-3325 - http://aluigi.altervista.org/adv/q3cfilevar-adv.txt +CVE-2006-3325 - http://securityreason.com/securityalert/1171 +CVE-2006-3327 - http://marc.info/?l=bugtraq&m=115109990800428&w=2 +CVE-2006-3329 - http://securityreason.com/securityalert/1179 +CVE-2006-3330 - http://securityreason.com/securityalert/1179 +CVE-2006-3331 - http://securityreason.com/securityalert/1177 +CVE-2006-3335 - http://securityreason.com/securityalert/1178 +CVE-2006-3335 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5676 +CVE-2006-3340 - https://www.exploit-db.com/exploits/1956 +CVE-2006-3341 - https://www.exploit-db.com/exploits/1961 +CVE-2006-3347 - https://www.exploit-db.com/exploits/1968 +CVE-2006-3352 - http://isc.sans.org/diary.php?storyid=1448 +CVE-2006-3353 - https://www.exploit-db.com/exploits/1972 +CVE-2006-3362 - https://www.exploit-db.com/exploits/1964 +CVE-2006-3362 - https://www.exploit-db.com/exploits/2035 +CVE-2006-3362 - https://www.exploit-db.com/exploits/6344 +CVE-2006-3375 - https://www.exploit-db.com/exploits/1971 +CVE-2006-3376 - http://securityreason.com/securityalert/1190 +CVE-2006-3382 - http://securityreason.com/securityalert/1189 +CVE-2006-3387 - https://www.exploit-db.com/exploits/1812 +CVE-2006-3394 - https://www.exploit-db.com/exploits/1975 +CVE-2006-3396 - https://www.exploit-db.com/exploits/1981 +CVE-2006-3399 - http://securityreason.com/securityalert/1196 +CVE-2006-3400 - https://www.exploit-db.com/exploits/1976 +CVE-2006-3401 - https://www.exploit-db.com/exploits/1977 +CVE-2006-3422 - https://www.exploit-db.com/exploits/1982 +CVE-2006-3425 - http://securityreason.com/securityalert/1200 +CVE-2006-3426 - http://securityreason.com/securityalert/1200 +CVE-2006-3430 - http://securityreason.com/securityalert/1200 +CVE-2006-3431 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 +CVE-2006-3434 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 +CVE-2006-3435 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 +CVE-2006-3436 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-056 +CVE-2006-3438 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-050 +CVE-2006-3440 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041 +CVE-2006-3441 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-041 +CVE-2006-3442 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-052 +CVE-2006-3443 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-051 +CVE-2006-3444 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-049 +CVE-2006-3445 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-068 +CVE-2006-3448 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-005 +CVE-2006-3449 - http://securityreason.com/securityalert/1342 +CVE-2006-3449 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048 +CVE-2006-3450 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3451 - http://securityreason.com/securityalert/1343 +CVE-2006-3451 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3459 - http://secunia.com/blog/76 +CVE-2006-3461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9910 +CVE-2006-3465 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9067 +CVE-2006-3467 - http://www.vmware.com/download/esx/esx-254-200610-patch.html +CVE-2006-3468 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9809 +CVE-2006-3469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827 +CVE-2006-3478 - https://www.exploit-db.com/exploits/1983 +CVE-2006-3479 - http://securityreason.com/securityalert/1205 +CVE-2006-3491 - http://aluigi.altervista.org/adv/kailleraex-adv.txt +CVE-2006-3491 - http://marc.info/?l=full-disclosure&m=115220500707900&w=2 +CVE-2006-3493 - http://marc.info/?l=full-disclosure&m=115231380526820&w=2 +CVE-2006-3493 - http://marc.info/?l=full-disclosure&m=115261598510657&w=2 +CVE-2006-3494 - http://securityreason.com/securityalert/1209 +CVE-2006-3514 - http://securityreason.com/securityalert/1202 +CVE-2006-3515 - http://securityreason.com/securityalert/1206 +CVE-2006-3516 - http://securityreason.com/securityalert/1208 +CVE-2006-3517 - http://securityreason.com/securityalert/1207 +CVE-2006-3518 - http://securityreason.com/securityalert/1203 +CVE-2006-3519 - http://securityreason.com/securityalert/1204 +CVE-2006-3520 - https://www.exploit-db.com/exploits/1996 +CVE-2006-3522 - http://marc.info/?l=full-disclosure&m=115249298204354&w=2 +CVE-2006-3522 - http://marc.info/?l=full-disclosure&m=115253898206225&w=2 +CVE-2006-3528 - http://marc.info/?l=bugtraq&m=115876919804966&w=2 +CVE-2006-3528 - https://www.exploit-db.com/exploits/1994 +CVE-2006-3530 - http://securityreason.com/securityalert/1215 +CVE-2006-3530 - https://www.exploit-db.com/exploits/2024 +CVE-2006-3531 - http://securityreason.com/securityalert/1214 +CVE-2006-3532 - http://securityreason.com/securityalert/1214 +CVE-2006-3533 - http://securityreason.com/securityalert/1214 +CVE-2006-3542 - http://securityreason.com/securityalert/1223 +CVE-2006-3546 - http://securityreason.com/securityalert/1232 +CVE-2006-3554 - http://securityreason.com/securityalert/1234 +CVE-2006-3558 - http://securityreason.com/securityalert/1226 +CVE-2006-3559 - http://securityreason.com/securityalert/1226 +CVE-2006-3571 - https://www.exploit-db.com/exploits/1993 +CVE-2006-3572 - https://www.exploit-db.com/exploits/1993 +CVE-2006-3580 - https://www.exploit-db.com/exploits/1931 +CVE-2006-3581 - http://aluigi.altervista.org/adv/adplugbof-adv.txt +CVE-2006-3582 - http://aluigi.altervista.org/adv/adplugbof-adv.txt +CVE-2006-3583 - http://securityreason.com/securityalert/1339 +CVE-2006-3584 - http://securityreason.com/securityalert/1339 +CVE-2006-3585 - http://securityreason.com/securityalert/1339 +CVE-2006-3586 - http://securityreason.com/securityalert/1339 +CVE-2006-3589 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html +CVE-2006-3590 - http://isc.sans.org/diary.php?storyid=1484 +CVE-2006-3590 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048 +CVE-2006-3598 - https://www.exploit-db.com/exploits/5154 +CVE-2006-3619 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9617 +CVE-2006-3626 - http://www.securityfocus.com/bid/18992 +CVE-2006-3628 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9175 +CVE-2006-3632 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9468 +CVE-2006-3637 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3638 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3639 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3640 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3643 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-044 +CVE-2006-3647 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 +CVE-2006-3648 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-051 +CVE-2006-3650 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 +CVE-2006-3651 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 +CVE-2006-3652 - http://www.securityfocus.com/bid/18994 +CVE-2006-3655 - http://www.securityfocus.com/bid/18993 +CVE-2006-3656 - http://packetstormsecurity.org/0607-exploits/mspp-poc3.txt +CVE-2006-3656 - http://www.securityfocus.com/bid/18993 +CVE-2006-3660 - http://www.securityfocus.com/bid/18993 +CVE-2006-3668 - http://aluigi.altervista.org/adv/dumbit-adv.txt +CVE-2006-3668 - http://securityreason.com/securityalert/1240 +CVE-2006-3670 - https://www.exploit-db.com/exploits/2014 +CVE-2006-3675 - http://securityreason.com/securityalert/1308 +CVE-2006-3676 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-006.txt +CVE-2006-3677 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3677 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3683 - http://packetstormsecurity.org/0606-exploits/flipper.txt +CVE-2006-3685 - https://www.exploit-db.com/exploits/2009 +CVE-2006-3689 - http://www.securityfocus.com/bid/18990 +CVE-2006-3690 - http://www.securityfocus.com/bid/18998 +CVE-2006-3690 - https://www.exploit-db.com/exploits/2030 +CVE-2006-3693 - http://securityreason.com/securityalert/1242 +CVE-2006-3694 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983 +CVE-2006-3702 - http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html +CVE-2006-3725 - http://www.securityfocus.com/bid/18995 +CVE-2006-3727 - https://www.exploit-db.com/exploits/2032 +CVE-2006-3730 - http://isc.sans.org/diary.php?storyid=1742 +CVE-2006-3730 - https://www.exploit-db.com/exploits/2440 +CVE-2006-3735 - https://www.exploit-db.com/exploits/2019 +CVE-2006-3736 - https://www.exploit-db.com/exploits/2020 +CVE-2006-3738 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html +CVE-2006-3738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370 +CVE-2006-3739 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-3740 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-3740 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454 +CVE-2006-3743 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9895 +CVE-2006-3747 - http://securityreason.com/securityalert/1312 +CVE-2006-3748 - https://www.exploit-db.com/exploits/2023 +CVE-2006-3749 - http://securityreason.com/securityalert/1249 +CVE-2006-3749 - http://www.securityfocus.com/bid/18991 +CVE-2006-3749 - https://www.exploit-db.com/exploits/2028 +CVE-2006-3750 - http://securityreason.com/securityalert/1249 +CVE-2006-3750 - https://www.exploit-db.com/exploits/2026 +CVE-2006-3751 - http://securityreason.com/securityalert/1249 +CVE-2006-3751 - https://www.exploit-db.com/exploits/2027 +CVE-2006-3754 - https://www.exploit-db.com/exploits/2018 +CVE-2006-3765 - http://securityreason.com/securityalert/1258 +CVE-2006-3768 - http://securityreason.com/securityalert/1300 +CVE-2006-3771 - http://securityreason.com/securityalert/1265 +CVE-2006-3771 - https://www.exploit-db.com/exploits/2046 +CVE-2006-3772 - https://www.exploit-db.com/exploits/2036 +CVE-2006-3773 - https://www.exploit-db.com/exploits/2021 +CVE-2006-3787 - http://www.securityfocus.com/bid/18996 +CVE-2006-3788 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt +CVE-2006-3788 - http://securityreason.com/securityalert/1259 +CVE-2006-3789 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt +CVE-2006-3789 - http://securityreason.com/securityalert/1259 +CVE-2006-3790 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt +CVE-2006-3790 - http://securityreason.com/securityalert/1259 +CVE-2006-3791 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt +CVE-2006-3791 - http://securityreason.com/securityalert/1259 +CVE-2006-3792 - http://aluigi.altervista.org/adv/ufo2ko-adv.txt +CVE-2006-3792 - http://securityreason.com/securityalert/1259 +CVE-2006-3801 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3801 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3802 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3802 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3802 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9611 +CVE-2006-3803 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3803 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3804 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3805 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3805 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3805 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-3806 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3806 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3806 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-3807 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3807 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3807 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-3808 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3808 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3808 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-3809 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3809 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3809 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-3809 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9753 +CVE-2006-3810 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3810 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3811 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3811 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3811 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-3811 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934 +CVE-2006-3812 - http://www.redhat.com/support/errata/RHSA-2006-0608.html +CVE-2006-3812 - http://www.securityfocus.com/archive/1/446658/100/200/threaded +CVE-2006-3813 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9456 +CVE-2006-3814 - http://aluigi.altervista.org/adv/cheesebof-adv.txt +CVE-2006-3814 - http://securityreason.com/securityalert/1291 +CVE-2006-3822 - http://www.packetstormsecurity.org/0607-exploits/geoauctionsSQL.txt +CVE-2006-3823 - http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html +CVE-2006-3823 - http://www.packetstormsecurity.org/0607-exploits/geoauctionsSQL.txt +CVE-2006-3835 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2006-3836 - http://securityreason.com/securityalert/1280 +CVE-2006-3842 - http://securityreason.com/securityalert/1273 +CVE-2006-3847 - https://www.exploit-db.com/exploits/2062 +CVE-2006-3851 - https://www.exploit-db.com/exploits/2068 +CVE-2006-3852 - http://securityreason.com/securityalert/1285 +CVE-2006-3854 - http://securityreason.com/securityalert/1409 +CVE-2006-3859 - http://securityreason.com/securityalert/1408 +CVE-2006-3860 - http://securityreason.com/securityalert/1407 +CVE-2006-3864 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 +CVE-2006-3867 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 +CVE-2006-3868 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-062 +CVE-2006-3869 - http://securityreason.com/securityalert/1441 +CVE-2006-3873 - http://securityreason.com/securityalert/1555 +CVE-2006-3873 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 +CVE-2006-3875 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 +CVE-2006-3876 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 +CVE-2006-3877 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 +CVE-2006-3877 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 +CVE-2006-3879 - http://aluigi.altervista.org/adv/lmmgt2ho-adv.txt +CVE-2006-3879 - http://aluigi.org/poc/lmmgt2ho.zip +CVE-2006-3879 - http://securityreason.com/securityalert/1288 +CVE-2006-3880 - http://securityreason.com/securityalert/1282 +CVE-2006-3883 - http://securityreason.com/securityalert/1287 +CVE-2006-3884 - http://securityreason.com/securityalert/1287 +CVE-2006-3885 - http://www.sec-tec.co.uk/vulnerability/r55w_directory_traversal.html +CVE-2006-3890 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 +CVE-2006-3890 - https://www.exploit-db.com/exploits/2785 +CVE-2006-3903 - http://marc.info/?l=bugtraq&m=114791192612460&w=2 +CVE-2006-3904 - https://www.exploit-db.com/exploits/2071 +CVE-2006-3905 - http://marc.info/?l=bugtraq&m=114791192612460&w=2 +CVE-2006-3908 - http://aluigi.altervista.org/adv/gnefs-adv.txt +CVE-2006-3911 - https://www.exploit-db.com/exploits/2060 +CVE-2006-3912 - https://www.exploit-db.com/exploits/1984 +CVE-2006-3912 - https://www.exploit-db.com/exploits/1985 +CVE-2006-3912 - https://www.exploit-db.com/exploits/1992 +CVE-2006-3913 - http://aluigi.altervista.org/adv/freecivx-adv.txt +CVE-2006-3917 - https://www.exploit-db.com/exploits/2058 +CVE-2006-3922 - http://securityreason.com/securityalert/1310 +CVE-2006-3922 - https://www.exploit-db.com/exploits/2081 +CVE-2006-3928 - https://www.exploit-db.com/exploits/2077 +CVE-2006-3929 - http://securityreason.com/securityalert/1301 +CVE-2006-3930 - http://securityreason.com/securityalert/1309 +CVE-2006-3930 - https://www.exploit-db.com/exploits/2078 +CVE-2006-3931 - http://securityreason.com/securityalert/1303 +CVE-2006-3933 - http://securityreason.com/securityalert/1302 +CVE-2006-3934 - http://securityreason.com/securityalert/1302 +CVE-2006-3935 - http://securityreason.com/securityalert/1302 +CVE-2006-3936 - http://securityreason.com/securityalert/1302 +CVE-2006-3937 - http://securityreason.com/securityalert/1304 +CVE-2006-3938 - http://securityreason.com/securityalert/1307 +CVE-2006-3939 - http://securityreason.com/securityalert/1305 +CVE-2006-3940 - http://securityreason.com/securityalert/1306 +CVE-2006-3942 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063 +CVE-2006-3947 - http://securityreason.com/securityalert/1313 +CVE-2006-3947 - https://www.exploit-db.com/exploits/2086 +CVE-2006-3948 - http://securityreason.com/securityalert/1311 +CVE-2006-3949 - http://securityreason.com/securityalert/1318 +CVE-2006-3951 - https://www.exploit-db.com/exploits/2064 +CVE-2006-3953 - http://securityreason.com/securityalert/1319 +CVE-2006-3954 - http://securityreason.com/securityalert/1319 +CVE-2006-3955 - http://securityreason.com/securityalert/1315 +CVE-2006-3956 - http://securityreason.com/securityalert/1317 +CVE-2006-3962 - https://www.exploit-db.com/exploits/2090 +CVE-2006-3963 - http://marc.info/?l=full-disclosure&m=115423462216111&w=2 +CVE-2006-3964 - http://marc.info/?l=full-disclosure&m=115423462216111&w=2 +CVE-2006-3965 - http://marc.info/?l=full-disclosure&m=115423462216111&w=2 +CVE-2006-3966 - http://securityreason.com/securityalert/1316 +CVE-2006-3966 - https://www.exploit-db.com/exploits/2096 +CVE-2006-3967 - http://securityreason.com/securityalert/1314 +CVE-2006-3969 - https://www.exploit-db.com/exploits/2085 +CVE-2006-3970 - https://www.exploit-db.com/exploits/2092 +CVE-2006-3980 - http://securityreason.com/securityalert/1322 +CVE-2006-3980 - https://www.exploit-db.com/exploits/2084 +CVE-2006-3982 - http://securityreason.com/securityalert/1321 +CVE-2006-3983 - https://www.exploit-db.com/exploits/2095 +CVE-2006-3984 - http://securityreason.com/securityalert/1320 +CVE-2006-3984 - https://www.exploit-db.com/exploits/2100 +CVE-2006-3985 - http://securityreason.com/securityalert/1334 +CVE-2006-3985 - http://vuln.sg/powarc962-en.html +CVE-2006-3986 - http://securityreason.com/securityalert/1328 +CVE-2006-3986 - https://www.exploit-db.com/exploits/2097 +CVE-2006-3987 - http://securityreason.com/securityalert/1327 +CVE-2006-3987 - https://www.exploit-db.com/exploits/2104 +CVE-2006-3988 - http://securityreason.com/securityalert/1326 +CVE-2006-3988 - https://www.exploit-db.com/exploits/2101 +CVE-2006-3989 - http://securityreason.com/securityalert/1325 +CVE-2006-3989 - https://www.exploit-db.com/exploits/2103 +CVE-2006-3990 - http://securityreason.com/securityalert/1324 +CVE-2006-3991 - https://www.exploit-db.com/exploits/2102 +CVE-2006-3993 - http://securityreason.com/securityalert/1323 +CVE-2006-3993 - https://www.exploit-db.com/exploits/2098 +CVE-2006-3994 - https://www.exploit-db.com/exploits/2105 +CVE-2006-3995 - https://www.exploit-db.com/exploits/2089 +CVE-2006-3995 - https://www.exploit-db.com/exploits/3553 +CVE-2006-3996 - http://securityreason.com/securityalert/1330 +CVE-2006-3996 - https://www.exploit-db.com/exploits/2088 +CVE-2006-3997 - http://securityreason.com/securityalert/1329 +CVE-2006-3998 - https://www.exploit-db.com/exploits/2099 +CVE-2006-3999 - http://securityreason.com/securityalert/1338 +CVE-2006-4004 - https://www.exploit-db.com/exploits/2087 +CVE-2006-4005 - http://aluigi.altervista.org/adv/bcloneboom-adv.txt +CVE-2006-4005 - http://aluigi.org/poc/bcloneboom.zip +CVE-2006-4006 - http://aluigi.altervista.org/adv/bcloneboom-adv.txt +CVE-2006-4006 - http://aluigi.org/poc/bcloneboom.zip +CVE-2006-4007 - http://securityreason.com/securityalert/1333 +CVE-2006-4008 - http://securityreason.com/securityalert/1332 +CVE-2006-4009 - http://securityreason.com/securityalert/1331 +CVE-2006-4010 - http://securityreason.com/securityalert/1331 +CVE-2006-4011 - https://www.exploit-db.com/exploits/2115 +CVE-2006-4012 - http://securityreason.com/securityalert/1336 +CVE-2006-4012 - https://www.exploit-db.com/exploits/2113 +CVE-2006-4015 - http://securityreason.com/securityalert/1335 +CVE-2006-4016 - http://securityreason.com/securityalert/1337 +CVE-2006-4020 - http://securityreason.com/securityalert/1341 +CVE-2006-4021 - http://securityreason.com/securityalert/1396 +CVE-2006-4024 - http://aluigi.altervista.org/adv/festahc-adv.txt +CVE-2006-4025 - http://securityreason.com/securityalert/1344 +CVE-2006-4026 - http://securityreason.com/securityalert/1346 +CVE-2006-4026 - https://www.exploit-db.com/exploits/2128 +CVE-2006-4029 - http://securityreason.com/securityalert/1345 +CVE-2006-4029 - http://vuln.sg/agephone1381-en.html +CVE-2006-4032 - http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html#Endler +CVE-2006-4033 - http://securityreason.com/securityalert/1351 +CVE-2006-4033 - http://vuln.sg/lhaplus152-en.html +CVE-2006-4035 - http://securityreason.com/securityalert/1350 +CVE-2006-4036 - http://securityreason.com/securityalert/1348 +CVE-2006-4040 - https://www.exploit-db.com/exploits/2093 +CVE-2006-4042 - http://securityreason.com/securityalert/1347 +CVE-2006-4042 - https://www.exploit-db.com/exploits/2118 +CVE-2006-4043 - http://securityreason.com/securityalert/1347 +CVE-2006-4043 - https://www.exploit-db.com/exploits/2118 +CVE-2006-4045 - https://www.exploit-db.com/exploits/2121 +CVE-2006-4046 - http://aluigi.altervista.org/adv/ocpbof-adv.txt +CVE-2006-4046 - http://securityreason.com/securityalert/1349 +CVE-2006-4046 - https://www.exploit-db.com/exploits/2094 +CVE-2006-4050 - http://securityreason.com/securityalert/1352 +CVE-2006-4051 - http://securityreason.com/securityalert/1369 +CVE-2006-4051 - https://www.exploit-db.com/exploits/2120 +CVE-2006-4052 - https://www.exploit-db.com/exploits/2119 +CVE-2006-4053 - http://securityreason.com/securityalert/1355 +CVE-2006-4055 - http://securityreason.com/securityalert/1354 +CVE-2006-4055 - https://www.exploit-db.com/exploits/2116 +CVE-2006-4057 - http://securityreason.com/securityalert/1368 +CVE-2006-4058 - http://securityreason.com/securityalert/1358 +CVE-2006-4059 - http://securityreason.com/securityalert/1366 +CVE-2006-4059 - https://www.exploit-db.com/exploits/2135 +CVE-2006-4060 - http://securityreason.com/securityalert/1364 +CVE-2006-4060 - https://www.exploit-db.com/exploits/2141 +CVE-2006-4061 - http://www.osvdb.org/29133 +CVE-2006-4062 - https://www.exploit-db.com/exploits/2131 +CVE-2006-4063 - https://www.exploit-db.com/exploits/2129 +CVE-2006-4064 - https://www.exploit-db.com/exploits/2138 +CVE-2006-4065 - https://www.exploit-db.com/exploits/2130 +CVE-2006-4068 - http://securityreason.com/securityalert/1362 +CVE-2006-4070 - http://securityreason.com/securityalert/1361 +CVE-2006-4071 - http://determina.blogspot.com/2007/01/whats-wrong-with-wmf.html +CVE-2006-4071 - http://securityreason.com/securityalert/1353 +CVE-2006-4071 - https://www.exploit-db.com/exploits/3111 +CVE-2006-4072 - https://www.exploit-db.com/exploits/2150 +CVE-2006-4073 - https://www.exploit-db.com/exploits/2134 +CVE-2006-4074 - https://www.exploit-db.com/exploits/2125 +CVE-2006-4075 - http://securityreason.com/securityalert/1367 +CVE-2006-4075 - https://www.exploit-db.com/exploits/2146 +CVE-2006-4078 - http://securityreason.com/securityalert/1381 +CVE-2006-4079 - http://securityreason.com/securityalert/1381 +CVE-2006-4080 - http://securityreason.com/securityalert/1381 +CVE-2006-4081 - http://securityreason.com/securityalert/1363 +CVE-2006-4082 - http://securityreason.com/securityalert/1363 +CVE-2006-4088 - http://securityreason.com/securityalert/1357 +CVE-2006-4089 - http://aluigi.altervista.org/adv/alsapbof-adv.txt +CVE-2006-4089 - http://securityreason.com/securityalert/1356 +CVE-2006-4090 - http://securityreason.com/securityalert/1359 +CVE-2006-4091 - http://securityreason.com/securityalert/1360 +CVE-2006-4092 - http://securityreason.com/securityalert/1365 +CVE-2006-4096 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623 +CVE-2006-4102 - https://www.exploit-db.com/exploits/2123 +CVE-2006-4103 - http://securityreason.com/securityalert/1373 +CVE-2006-4103 - https://www.exploit-db.com/exploits/2148 +CVE-2006-4104 - http://securityreason.com/securityalert/1374 +CVE-2006-4105 - http://securityreason.com/securityalert/1371 +CVE-2006-4106 - http://securityreason.com/securityalert/1372 +CVE-2006-4110 - http://securityreason.com/securityalert/1370 +CVE-2006-4113 - https://www.exploit-db.com/exploits/2149 +CVE-2006-4114 - https://www.exploit-db.com/exploits/2159 +CVE-2006-4115 - http://securityreason.com/securityalert/1375 +CVE-2006-4116 - http://securityreason.com/securityalert/1378 +CVE-2006-4116 - http://vuln.sg/lhaz131-en.html +CVE-2006-4118 - http://securityreason.com/securityalert/1376 +CVE-2006-4121 - https://www.exploit-db.com/exploits/2155 +CVE-2006-4123 - https://www.exploit-db.com/exploits/2153 +CVE-2006-4124 - https://www.exploit-db.com/exploits/2144 +CVE-2006-4125 - http://securityreason.com/securityalert/1377 +CVE-2006-4126 - http://securityreason.com/securityalert/1377 +CVE-2006-4127 - http://securityreason.com/securityalert/1377 +CVE-2006-4128 - http://securityreason.com/securityalert/1380 +CVE-2006-4129 - https://www.exploit-db.com/exploits/2177 +CVE-2006-4130 - http://securityreason.com/securityalert/1379 +CVE-2006-4131 - http://securityreason.com/securityalert/1387 +CVE-2006-4131 - https://www.exploit-db.com/exploits/2156 +CVE-2006-4132 - http://securityreason.com/securityalert/1387 +CVE-2006-4132 - https://www.exploit-db.com/exploits/2156 +CVE-2006-4133 - http://securityreason.com/securityalert/1386 +CVE-2006-4134 - http://securityreason.com/securityalert/1390 +CVE-2006-4138 - http://securityreason.com/securityalert/1382 +CVE-2006-4140 - http://securityreason.com/securityalert/1389 +CVE-2006-4141 - http://securityreason.com/securityalert/1383 +CVE-2006-4142 - http://securityreason.com/securityalert/1384 +CVE-2006-4142 - https://www.exploit-db.com/exploits/2170 +CVE-2006-4143 - http://securityreason.com/securityalert/1388 +CVE-2006-4144 - http://securityreason.com/securityalert/1385 +CVE-2006-4156 - http://securityreason.com/securityalert/1391 +CVE-2006-4158 - https://www.exploit-db.com/exploits/2165 +CVE-2006-4159 - https://www.exploit-db.com/exploits/2169 +CVE-2006-4160 - https://www.exploit-db.com/exploits/2173 +CVE-2006-4161 - http://securityreason.com/securityalert/1395 +CVE-2006-4162 - http://securityreason.com/securityalert/1394 +CVE-2006-4164 - https://www.exploit-db.com/exploits/2168 +CVE-2006-4166 - http://securityreason.com/securityalert/1393 +CVE-2006-4166 - https://www.exploit-db.com/exploits/2158 +CVE-2006-4168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349 +CVE-2006-4184 - http://securityreason.com/securityalert/1392 +CVE-2006-4188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5500 +CVE-2006-4190 - http://securityreason.com/securityalert/1398 +CVE-2006-4191 - http://securityreason.com/securityalert/1411 +CVE-2006-4191 - https://www.exploit-db.com/exploits/2178 +CVE-2006-4192 - http://aluigi.altervista.org/adv/mptho-adv.txt +CVE-2006-4192 - http://securityreason.com/securityalert/1397 +CVE-2006-4192 - https://bugzilla.redhat.com/show_bug.cgi?id=497154 +CVE-2006-4193 - http://securityreason.com/securityalert/1402 +CVE-2006-4195 - http://securityreason.com/securityalert/1406 +CVE-2006-4195 - https://www.exploit-db.com/exploits/2184 +CVE-2006-4196 - http://securityreason.com/securityalert/1400 +CVE-2006-4196 - https://www.exploit-db.com/exploits/2175 +CVE-2006-4197 - http://aluigi.altervista.org/adv/brainzbof-adv.txt +CVE-2006-4197 - http://securityreason.com/securityalert/1399 +CVE-2006-4198 - http://securityreason.com/securityalert/1410 +CVE-2006-4198 - https://www.exploit-db.com/exploits/2174 +CVE-2006-4202 - https://www.exploit-db.com/exploits/2186 +CVE-2006-4203 - https://www.exploit-db.com/exploits/2182 +CVE-2006-4204 - https://www.exploit-db.com/exploits/2190 +CVE-2006-4205 - https://www.exploit-db.com/exploits/2183 +CVE-2006-4206 - http://securityreason.com/securityalert/1405 +CVE-2006-4207 - https://www.exploit-db.com/exploits/2188 +CVE-2006-4208 - http://securityreason.com/securityalert/1401 +CVE-2006-4209 - http://securityreason.com/securityalert/1404 +CVE-2006-4209 - https://www.exploit-db.com/exploits/2171 +CVE-2006-4210 - https://www.exploit-db.com/exploits/2181 +CVE-2006-4213 - https://www.exploit-db.com/exploits/2166 +CVE-2006-4219 - http://securityreason.com/securityalert/1403 +CVE-2006-4221 - http://securityreason.com/securityalert/1424 +CVE-2006-4224 - http://securityreason.com/securityalert/1413 +CVE-2006-4228 - http://securityreason.com/securityalert/1412 +CVE-2006-4230 - http://securityreason.com/securityalert/1415 +CVE-2006-4231 - http://securityreason.com/securityalert/1414 +CVE-2006-4234 - https://www.exploit-db.com/exploits/2191 +CVE-2006-4236 - http://securityreason.com/securityalert/1417 +CVE-2006-4236 - https://www.exploit-db.com/exploits/2201 +CVE-2006-4237 - http://www.securityfocus.com/bid/19567 +CVE-2006-4237 - https://www.exploit-db.com/exploits/2199 +CVE-2006-4238 - https://www.exploit-db.com/exploits/2200 +CVE-2006-4239 - https://www.exploit-db.com/exploits/2192 +CVE-2006-4240 - http://securityreason.com/securityalert/1420 +CVE-2006-4241 - http://securityreason.com/securityalert/1419 +CVE-2006-4242 - http://securityreason.com/securityalert/1418 +CVE-2006-4242 - https://www.exploit-db.com/exploits/2203 +CVE-2006-4244 - http://securityreason.com/securityalert/1472 +CVE-2006-4253 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9528 +CVE-2006-4255 - http://securityreason.com/securityalert/1423 +CVE-2006-4256 - http://securityreason.com/securityalert/1422 +CVE-2006-4259 - http://securityreason.com/securityalert/1421 +CVE-2006-4260 - http://securityreason.com/securityalert/1421 +CVE-2006-4262 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 +CVE-2006-4262 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9661 +CVE-2006-4265 - http://securityreason.com/securityalert/1427 +CVE-2006-4266 - http://securityreason.com/securityalert/1428 +CVE-2006-4267 - http://securityreason.com/securityalert/1429 +CVE-2006-4268 - http://securityreason.com/securityalert/1429 +CVE-2006-4270 - http://securityreason.com/securityalert/1430 +CVE-2006-4270 - https://www.exploit-db.com/exploits/2202 +CVE-2006-4272 - http://securityreason.com/securityalert/1426 +CVE-2006-4275 - http://securityreason.com/securityalert/1433 +CVE-2006-4276 - https://www.exploit-db.com/exploits/2220 +CVE-2006-4278 - https://www.exploit-db.com/exploits/2227 +CVE-2006-4279 - http://securityreason.com/securityalert/1434 +CVE-2006-4281 - http://securityreason.com/securityalert/1435 +CVE-2006-4282 - http://securityreason.com/securityalert/1436 +CVE-2006-4282 - https://www.exploit-db.com/exploits/2213 +CVE-2006-4283 - http://securityreason.com/securityalert/1432 +CVE-2006-4284 - http://securityreason.com/securityalert/1445 +CVE-2006-4284 - https://www.exploit-db.com/exploits/2230 +CVE-2006-4285 - https://www.exploit-db.com/exploits/2221 +CVE-2006-4286 - http://securityreason.com/securityalert/1431 +CVE-2006-4287 - https://www.exploit-db.com/exploits/2226 +CVE-2006-4288 - https://www.exploit-db.com/exploits/2207 +CVE-2006-4291 - https://www.exploit-db.com/exploits/2211 +CVE-2006-4293 - http://securityreason.com/securityalert/1442 +CVE-2006-4296 - https://www.exploit-db.com/exploits/2225 +CVE-2006-4300 - http://securityreason.com/securityalert/1440 +CVE-2006-4300 - https://www.exploit-db.com/exploits/2228 +CVE-2006-4300 - https://www.exploit-db.com/exploits/2232 +CVE-2006-4301 - http://securityreason.com/securityalert/1439 +CVE-2006-4301 - https://www.exploit-db.com/exploits/4251 +CVE-2006-4309 - http://securityreason.com/securityalert/1438 +CVE-2006-4310 - http://securityreason.com/securityalert/1444 +CVE-2006-4314 - http://securityreason.com/securityalert/1437 +CVE-2006-4316 - http://www.ssh.com/company/news/2006/english/security/article/776/ +CVE-2006-4317 - http://securityreason.com/securityalert/1443 +CVE-2006-4318 - http://packetstormsecurity.org/0608-exploits/wftpd_exp.c +CVE-2006-4318 - https://www.exploit-db.com/exploits/2233 +CVE-2006-4321 - https://www.exploit-db.com/exploits/2196 +CVE-2006-4323 - http://evuln.com/vulns/135/description.html +CVE-2006-4324 - http://evuln.com/vulns/135/description.html +CVE-2006-4325 - http://evuln.com/vulns/134/description.html +CVE-2006-4327 - http://evuln.com/vulns/136/description.html +CVE-2006-4328 - http://evuln.com/vulns/136/description.html +CVE-2006-4329 - https://www.exploit-db.com/exploits/2229 +CVE-2006-4330 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9869 +CVE-2006-4334 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-4335 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-4336 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-4337 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-4338 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-4339 - http://www.redhat.com/support/errata/RHSA-2007-0073.html +CVE-2006-4339 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html +CVE-2006-4339 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2006-4339 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2006-4339 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2006-4339 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2006-4339 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2006-4340 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-4342 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 +CVE-2006-4343 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html +CVE-2006-4343 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2006-4343 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2006-4343 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2006-4343 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2006-4343 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2006-4343 - https://www.exploit-db.com/exploits/4773 +CVE-2006-4348 - http://securityreason.com/securityalert/1447 +CVE-2006-4348 - https://www.exploit-db.com/exploits/2215 +CVE-2006-4350 - http://securityreason.com/securityalert/1448 +CVE-2006-4350 - http://securityreason.com/securityalert/1460 +CVE-2006-4351 - http://securityreason.com/securityalert/1448 +CVE-2006-4354 - https://www.exploit-db.com/exploits/2239 +CVE-2006-4357 - http://securityreason.com/securityalert/1454 +CVE-2006-4358 - http://securityreason.com/securityalert/1459 +CVE-2006-4359 - http://vuln.sg/powerzip706-en.html +CVE-2006-4361 - http://securityreason.com/securityalert/1453 +CVE-2006-4362 - http://securityreason.com/securityalert/1452 +CVE-2006-4363 - http://securityreason.com/securityalert/1450 +CVE-2006-4363 - https://www.exploit-db.com/exploits/2217 +CVE-2006-4364 - http://securityreason.com/securityalert/1446 +CVE-2006-4364 - https://www.exploit-db.com/exploits/2245 +CVE-2006-4365 - http://www.nukedx.com/?viewdoc=48 +CVE-2006-4365 - https://www.exploit-db.com/exploits/2251 +CVE-2006-4367 - https://www.exploit-db.com/exploits/2248 +CVE-2006-4368 - http://www.nukedx.com/?viewdoc=47 +CVE-2006-4368 - https://www.exploit-db.com/exploits/2250 +CVE-2006-4369 - http://www.nukedx.com/?viewdoc=47 +CVE-2006-4369 - https://www.exploit-db.com/exploits/2250 +CVE-2006-4370 - http://securityreason.com/securityalert/1455 +CVE-2006-4371 - http://securityreason.com/securityalert/1455 +CVE-2006-4372 - https://www.exploit-db.com/exploits/2222 +CVE-2006-4373 - http://securityreason.com/securityalert/1449 +CVE-2006-4373 - https://www.exploit-db.com/exploits/2249 +CVE-2006-4374 - http://securityreason.com/securityalert/1457 +CVE-2006-4375 - http://securityreason.com/securityalert/1451 +CVE-2006-4376 - http://securityreason.com/securityalert/1458 +CVE-2006-4377 - http://securityreason.com/securityalert/1458 +CVE-2006-4378 - http://securityreason.com/securityalert/1456 +CVE-2006-4381 - http://securityreason.com/securityalert/1551 +CVE-2006-4382 - http://securityreason.com/securityalert/1554 +CVE-2006-4384 - http://securityreason.com/securityalert/1554 +CVE-2006-4385 - http://securityreason.com/securityalert/1554 +CVE-2006-4386 - http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt +CVE-2006-4386 - http://securityreason.com/securityalert/1550 +CVE-2006-4388 - http://securityreason.com/securityalert/1554 +CVE-2006-4389 - http://securityreason.com/securityalert/1554 +CVE-2006-4417 - http://securityreason.com/securityalert/1461 +CVE-2006-4418 - https://www.exploit-db.com/exploits/2252 +CVE-2006-4419 - https://www.exploit-db.com/exploits/2259 +CVE-2006-4420 - https://www.exploit-db.com/exploits/2253 +CVE-2006-4421 - http://securityreason.com/securityalert/1463 +CVE-2006-4423 - http://securityreason.com/securityalert/1462 +CVE-2006-4424 - https://www.exploit-db.com/exploits/2254 +CVE-2006-4426 - https://www.exploit-db.com/exploits/2260 +CVE-2006-4427 - https://www.exploit-db.com/exploits/2255 +CVE-2006-4430 - http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html +CVE-2006-4431 - http://marc.info/?l=full-disclosure&m=115642248226217&w=2 +CVE-2006-4431 - http://securityreason.com/securityalert/1466 +CVE-2006-4432 - http://securityreason.com/securityalert/1466 +CVE-2006-4433 - http://securityreason.com/securityalert/1466 +CVE-2006-4440 - https://www.exploit-db.com/exploits/2263 +CVE-2006-4443 - http://securityreason.com/securityalert/1467 +CVE-2006-4445 - http://www.attrition.org/pipermail/vim/2006-August/001000.html +CVE-2006-4446 - http://securityreason.com/securityalert/1468 +CVE-2006-4446 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 +CVE-2006-4448 - http://securityreason.com/securityalert/1471 +CVE-2006-4448 - https://www.exploit-db.com/exploits/2218 +CVE-2006-4449 - http://securityreason.com/securityalert/1469 +CVE-2006-4450 - http://securityreason.com/securityalert/1470 +CVE-2006-4452 - https://www.exploit-db.com/exploits/2269 +CVE-2006-4455 - https://www.exploit-db.com/exploits/2124 +CVE-2006-4455 - https://www.exploit-db.com/exploits/2147 +CVE-2006-4456 - https://www.exploit-db.com/exploits/2275 +CVE-2006-4458 - https://www.exploit-db.com/exploits/2270 +CVE-2006-4462 - http://securityreason.com/securityalert/1484 +CVE-2006-4463 - http://securityreason.com/securityalert/1483 +CVE-2006-4464 - http://securityreason.com/securityalert/1485 +CVE-2006-4464 - https://www.exploit-db.com/exploits/2176 +CVE-2006-4465 - http://securityreason.com/securityalert/1486 +CVE-2006-4467 - http://securityreason.com/securityalert/1475 +CVE-2006-4477 - http://securityreason.com/securityalert/1479 +CVE-2006-4478 - http://securityreason.com/securityalert/1479 +CVE-2006-4479 - http://securityreason.com/securityalert/1479 +CVE-2006-4480 - http://securityreason.com/securityalert/1478 +CVE-2006-4484 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2006-4484 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9004 +CVE-2006-4487 - http://securityreason.com/securityalert/1482 +CVE-2006-4488 - https://www.exploit-db.com/exploits/2273 +CVE-2006-4489 - https://www.exploit-db.com/exploits/2272 +CVE-2006-4494 - http://securityreason.com/securityalert/1473 +CVE-2006-4495 - http://securityreason.com/securityalert/1474 +CVE-2006-4496 - http://securityreason.com/securityalert/1476 +CVE-2006-4497 - http://securityreason.com/securityalert/1480 +CVE-2006-4498 - http://securityreason.com/securityalert/1477 +CVE-2006-4498 - https://www.exploit-db.com/exploits/2271 +CVE-2006-4500 - http://securityreason.com/securityalert/1481 +CVE-2006-4501 - http://securityreason.com/securityalert/1481 +CVE-2006-4502 - http://securityreason.com/securityalert/1481 +CVE-2006-4503 - http://www.evuln.com/vulns/138/ +CVE-2006-4504 - http://www.evuln.com/vulns/138/ +CVE-2006-4505 - http://www.evuln.com/vulns/138/ +CVE-2006-4514 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413 +CVE-2006-4523 - http://securityreason.com/securityalert/1489 +CVE-2006-4523 - https://www.exploit-db.com/exploits/2246 +CVE-2006-4524 - http://securityreason.com/securityalert/1488 +CVE-2006-4528 - http://securityreason.com/securityalert/1487 +CVE-2006-4529 - http://securityreason.com/securityalert/1487 +CVE-2006-4530 - http://securityreason.com/securityalert/1487 +CVE-2006-4531 - https://www.exploit-db.com/exploits/2281 +CVE-2006-4532 - https://www.exploit-db.com/exploits/2282 +CVE-2006-4533 - http://packetstormsecurity.org/0608-exploits/plume-1.0.6.txt +CVE-2006-4534 - http://isc.sans.org/diary.php?storyid=1669 +CVE-2006-4534 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 +CVE-2006-4536 - https://www.exploit-db.com/exploits/2262 +CVE-2006-4541 - http://securityreason.com/securityalert/1512 +CVE-2006-4543 - http://securityreason.com/securityalert/1490 +CVE-2006-4544 - http://securityreason.com/securityalert/1501 +CVE-2006-4545 - http://www.attrition.org/pipermail/vim/2006-September/001012.html +CVE-2006-4548 - http://securityreason.com/securityalert/1497 +CVE-2006-4553 - http://securityreason.com/securityalert/1491 +CVE-2006-4554 - http://securityreason.com/securityalert/1498 +CVE-2006-4558 - http://securityreason.com/securityalert/1492 +CVE-2006-4560 - http://shampoo.antville.org/stories/1451301/ +CVE-2006-4561 - http://shampoo.antville.org/stories/1451301/ +CVE-2006-4565 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-4566 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9637 +CVE-2006-4568 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-4568 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9843 +CVE-2006-4570 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-4571 - http://www.ubuntu.com/usn/usn-361-1 +CVE-2006-4574 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740 +CVE-2006-4583 - https://www.exploit-db.com/exploits/2293 +CVE-2006-4584 - http://securityreason.com/securityalert/1508 +CVE-2006-4584 - https://www.exploit-db.com/exploits/2297 +CVE-2006-4585 - http://securityreason.com/securityalert/1508 +CVE-2006-4585 - https://www.exploit-db.com/exploits/2297 +CVE-2006-4586 - http://securityreason.com/securityalert/1508 +CVE-2006-4586 - https://www.exploit-db.com/exploits/2297 +CVE-2006-4589 - https://www.exploit-db.com/exploits/2290 +CVE-2006-4592 - https://www.exploit-db.com/exploits/2296 +CVE-2006-4594 - https://www.exploit-db.com/exploits/2279 +CVE-2006-4595 - http://securityreason.com/securityalert/1514 +CVE-2006-4597 - https://www.exploit-db.com/exploits/2287 +CVE-2006-4599 - http://securityreason.com/securityalert/1494 +CVE-2006-4600 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9618 +CVE-2006-4601 - http://securityreason.com/securityalert/1496 +CVE-2006-4602 - http://isc.sans.org/diary.php?storyid=1672 +CVE-2006-4602 - https://www.exploit-db.com/exploits/2288 +CVE-2006-4604 - https://www.exploit-db.com/exploits/2280 +CVE-2006-4605 - http://securityreason.com/securityalert/1499 +CVE-2006-4605 - https://www.exploit-db.com/exploits/8425 +CVE-2006-4606 - http://securityreason.com/securityalert/1499 +CVE-2006-4606 - https://www.exploit-db.com/exploits/3538 +CVE-2006-4606 - https://www.exploit-db.com/exploits/8425 +CVE-2006-4607 - http://securityreason.com/securityalert/1499 +CVE-2006-4607 - https://www.exploit-db.com/exploits/8425 +CVE-2006-4608 - http://securityreason.com/securityalert/1499 +CVE-2006-4608 - https://www.exploit-db.com/exploits/8425 +CVE-2006-4609 - http://securityreason.com/securityalert/1495 +CVE-2006-4610 - http://securityreason.com/securityalert/1513 +CVE-2006-4610 - https://www.exploit-db.com/exploits/2304 +CVE-2006-4611 - http://securityreason.com/securityalert/1493 +CVE-2006-4611 - https://www.exploit-db.com/exploits/2303 +CVE-2006-4623 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9775 +CVE-2006-4624 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756 +CVE-2006-4629 - https://www.exploit-db.com/exploits/2308 +CVE-2006-4630 - https://www.exploit-db.com/exploits/2301 +CVE-2006-4631 - http://securityreason.com/securityalert/1521 +CVE-2006-4631 - https://www.exploit-db.com/exploits/2300 +CVE-2006-4632 - http://securityreason.com/securityalert/1521 +CVE-2006-4632 - https://www.exploit-db.com/exploits/2300 +CVE-2006-4633 - http://securityreason.com/securityalert/1521 +CVE-2006-4633 - https://www.exploit-db.com/exploits/2300 +CVE-2006-4636 - https://www.exploit-db.com/exploits/2310 +CVE-2006-4638 - https://www.exploit-db.com/exploits/2307 +CVE-2006-4641 - https://www.exploit-db.com/exploits/2294 +CVE-2006-4644 - https://www.exploit-db.com/exploits/2313 +CVE-2006-4645 - https://www.exploit-db.com/exploits/2315 +CVE-2006-4647 - https://www.exploit-db.com/exploits/2309 +CVE-2006-4648 - https://www.exploit-db.com/exploits/2312 +CVE-2006-4655 - http://securityreason.com/securityalert/1545 +CVE-2006-4656 - https://www.exploit-db.com/exploits/2317 +CVE-2006-4662 - http://securityreason.com/securityalert/1530 +CVE-2006-4662 - http://www.securityfocus.com/archive/1/445513/100/0/threaded +CVE-2006-4664 - https://www.exploit-db.com/exploits/2311 +CVE-2006-4669 - https://www.exploit-db.com/exploits/2329 +CVE-2006-4670 - https://www.exploit-db.com/exploits/2327 +CVE-2006-4671 - https://www.exploit-db.com/exploits/3027 +CVE-2006-4672 - https://www.exploit-db.com/exploits/2316 +CVE-2006-4676 - https://www.exploit-db.com/exploits/2284 +CVE-2006-4681 - https://www.exploit-db.com/exploits/2320 +CVE-2006-4687 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 +CVE-2006-4688 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 +CVE-2006-4689 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-066 +CVE-2006-4691 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-070 +CVE-2006-4691 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A908 +CVE-2006-4692 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-065 +CVE-2006-4693 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-060 +CVE-2006-4694 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 +CVE-2006-4695 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-017 +CVE-2006-4696 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-063 +CVE-2006-4697 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 +CVE-2006-4702 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 +CVE-2006-4712 - http://securityreason.com/securityalert/1558 +CVE-2006-4712 - http://www.gnucitizen.org/blog/cross-context-scripting-with-sage +CVE-2006-4713 - http://securityreason.com/securityalert/1557 +CVE-2006-4713 - https://www.exploit-db.com/exploits/2340 +CVE-2006-4714 - https://www.exploit-db.com/exploits/2339 +CVE-2006-4715 - https://www.exploit-db.com/exploits/2337 +CVE-2006-4716 - https://www.exploit-db.com/exploits/2319 +CVE-2006-4719 - https://www.exploit-db.com/exploits/2335 +CVE-2006-4720 - http://securityreason.com/securityalert/1556 +CVE-2006-4720 - https://www.exploit-db.com/exploits/2342 +CVE-2006-4721 - https://www.exploit-db.com/exploits/2333 +CVE-2006-4722 - http://securityreason.com/securityalert/1552 +CVE-2006-4723 - https://www.exploit-db.com/exploits/2328 +CVE-2006-4731 - http://securityreason.com/securityalert/1553 +CVE-2006-4732 - http://silversmith.persiangig.com/PoC.rar +CVE-2006-4733 - https://www.exploit-db.com/exploits/3245 +CVE-2006-4735 - http://securityreason.com/securityalert/1564 +CVE-2006-4736 - http://securityreason.com/securityalert/1563 +CVE-2006-4737 - http://securityreason.com/securityalert/1562 +CVE-2006-4738 - http://securityreason.com/securityalert/1562 +CVE-2006-4739 - http://securityreason.com/securityalert/1562 +CVE-2006-4740 - http://securityreason.com/securityalert/1562 +CVE-2006-4741 - http://securityreason.com/securityalert/1561 +CVE-2006-4742 - http://securityreason.com/securityalert/1561 +CVE-2006-4744 - http://securityreason.com/securityalert/1560 +CVE-2006-4745 - http://securityreason.com/securityalert/1559 +CVE-2006-4746 - http://securityreason.com/securityalert/1568 +CVE-2006-4746 - https://www.exploit-db.com/exploits/2318 +CVE-2006-4747 - http://securityreason.com/securityalert/1567 +CVE-2006-4748 - http://securityreason.com/securityalert/1566 +CVE-2006-4750 - https://www.exploit-db.com/exploits/2344 +CVE-2006-4751 - http://securityreason.com/securityalert/1565 +CVE-2006-4752 - http://securityreason.com/securityalert/1565 +CVE-2006-4757 - http://securityreason.com/securityalert/1569 +CVE-2006-4763 - http://securityreason.com/securityalert/1571 +CVE-2006-4764 - http://securityreason.com/securityalert/1570 +CVE-2006-4764 - https://www.exploit-db.com/exploits/2346 +CVE-2006-4765 - http://securityreason.com/securityalert/1575 +CVE-2006-4766 - http://securityreason.com/securityalert/1574 +CVE-2006-4769 - https://www.exploit-db.com/exploits/2350 +CVE-2006-4770 - https://www.exploit-db.com/exploits/2343 +CVE-2006-4771 - http://securityreason.com/securityalert/1573 +CVE-2006-4772 - http://securityreason.com/securityalert/1572 +CVE-2006-4777 - http://securityreason.com/securityalert/1577 +CVE-2006-4777 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 +CVE-2006-4779 - https://www.exploit-db.com/exploits/2353 +CVE-2006-4780 - http://securityreason.com/securityalert/1576 +CVE-2006-4780 - https://www.exploit-db.com/exploits/2349 +CVE-2006-4781 - https://www.exploit-db.com/exploits/2334 +CVE-2006-4782 - https://www.exploit-db.com/exploits/2352 +CVE-2006-4788 - https://www.exploit-db.com/exploits/2354 +CVE-2006-4789 - https://www.exploit-db.com/exploits/2338 +CVE-2006-4790 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9937 +CVE-2006-4793 - https://www.exploit-db.com/exploits/2362 +CVE-2006-4796 - http://securityreason.com/securityalert/1578 +CVE-2006-4797 - http://evuln.com/vulns/137/summary.html +CVE-2006-4797 - http://securityreason.com/securityalert/1580 +CVE-2006-4798 - http://securityreason.com/securityalert/1579 +CVE-2006-4801 - http://www.netragard.com/pdfs/research/ROXIO_RACE_NETRAGARD-20060624.txt +CVE-2006-4810 - http://www.vmware.com/support/vi3/doc/esx-2559638-patch.html +CVE-2006-4812 - http://securityreason.com/securityalert/1691 +CVE-2006-4814 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648 +CVE-2006-4823 - https://www.exploit-db.com/exploits/2363 +CVE-2006-4824 - https://www.exploit-db.com/exploits/2356 +CVE-2006-4825 - http://securityreason.com/securityalert/1582 +CVE-2006-4826 - https://www.exploit-db.com/exploits/2361 +CVE-2006-4827 - https://www.exploit-db.com/exploits/2359 +CVE-2006-4829 - http://securityreason.com/securityalert/1594 +CVE-2006-4837 - https://www.exploit-db.com/exploits/1905 +CVE-2006-4842 - https://www.exploit-db.com/exploits/45433/ +CVE-2006-4845 - https://www.exploit-db.com/exploits/2368 +CVE-2006-4849 - http://attrition.org/pipermail/vim/2007-April/001523.html +CVE-2006-4849 - https://www.exploit-db.com/exploits/2383 +CVE-2006-4850 - https://www.exploit-db.com/exploits/2372 +CVE-2006-4852 - https://www.exploit-db.com/exploits/2384 +CVE-2006-4853 - https://www.exploit-db.com/exploits/2371 +CVE-2006-4855 - http://securityreason.com/securityalert/1591 +CVE-2006-4856 - http://securityreason.com/securityalert/1597 +CVE-2006-4858 - https://www.exploit-db.com/exploits/2367 +CVE-2006-4859 - https://www.exploit-db.com/exploits/2370 +CVE-2006-4863 - http://securityvulns.com/Rdocument844.html +CVE-2006-4866 - http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt +CVE-2006-4867 - https://www.exploit-db.com/exploits/2378 +CVE-2006-4869 - https://www.exploit-db.com/exploits/2357 +CVE-2006-4870 - https://www.exploit-db.com/exploits/2377 +CVE-2006-4878 - https://www.exploit-db.com/exploits/2593 +CVE-2006-4890 - https://www.exploit-db.com/exploits/2380 +CVE-2006-4891 - https://www.exploit-db.com/exploits/2386 +CVE-2006-4892 - https://www.exploit-db.com/exploits/2385 +CVE-2006-4897 - https://www.exploit-db.com/exploits/2388 +CVE-2006-4898 - https://www.exploit-db.com/exploits/2381 +CVE-2006-4906 - https://www.exploit-db.com/exploits/2394 +CVE-2006-4908 - http://securityreason.com/securityalert/1622 +CVE-2006-4912 - https://www.exploit-db.com/exploits/2373 +CVE-2006-4913 - https://www.exploit-db.com/exploits/2389 +CVE-2006-4915 - http://securityreason.com/securityalert/1621 +CVE-2006-4916 - https://www.exploit-db.com/exploits/2395 +CVE-2006-4918 - https://www.exploit-db.com/exploits/2396 +CVE-2006-4919 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 +CVE-2006-4919 - https://www.exploit-db.com/exploits/2374 +CVE-2006-4920 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 +CVE-2006-4920 - https://www.exploit-db.com/exploits/2374 +CVE-2006-4921 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 +CVE-2006-4922 - http://marc.info/?l=bugtraq&m=115869368313367&w=2 +CVE-2006-4922 - https://www.exploit-db.com/exploits/2374 +CVE-2006-4924 - http://bugs.gentoo.org/show_bug.cgi?id=148228 +CVE-2006-4924 - http://www.ubuntu.com/usn/usn-355-1 +CVE-2006-4925 - http://bugs.gentoo.org/show_bug.cgi?id=148228 +CVE-2006-4944 - https://www.exploit-db.com/exploits/2411 +CVE-2006-4945 - https://www.exploit-db.com/exploits/2398 +CVE-2006-4946 - https://www.exploit-db.com/exploits/2399 +CVE-2006-4957 - https://www.exploit-db.com/exploits/2397 +CVE-2006-4958 - http://securityreason.com/securityalert/1623 +CVE-2006-4958 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2555 +CVE-2006-4959 - http://securityreason.com/securityalert/1623 +CVE-2006-4959 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2555 +CVE-2006-4960 - https://www.exploit-db.com/exploits/2402 +CVE-2006-4961 - https://www.exploit-db.com/exploits/2402 +CVE-2006-4962 - https://www.exploit-db.com/exploits/2402 +CVE-2006-4962 - https://www.exploit-db.com/exploits/4277 +CVE-2006-4963 - https://www.exploit-db.com/exploits/2391 +CVE-2006-4965 - http://securityreason.com/securityalert/1631 +CVE-2006-4965 - http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox +CVE-2006-4965 - http://www.gnucitizen.org/blog/backdooring-mp3-files/ +CVE-2006-4965 - http://www.kb.cert.org/vuls/id/751808 +CVE-2006-4966 - http://securityreason.com/securityalert/1630 +CVE-2006-4966 - https://www.exploit-db.com/exploits/2410 +CVE-2006-4967 - http://securityreason.com/securityalert/1625 +CVE-2006-4968 - https://www.exploit-db.com/exploits/2390 +CVE-2006-4969 - https://www.exploit-db.com/exploits/2393 +CVE-2006-4970 - http://securityreason.com/securityalert/1624 +CVE-2006-4970 - https://www.exploit-db.com/exploits/2392 +CVE-2006-4971 - http://securityreason.com/securityalert/1628 +CVE-2006-4972 - http://securityreason.com/securityalert/1628 +CVE-2006-4974 - https://www.exploit-db.com/exploits/2401 +CVE-2006-4975 - http://securityreason.com/securityalert/1626 +CVE-2006-4976 - http://securityreason.com/securityalert/1629 +CVE-2006-4977 - http://securityreason.com/securityalert/1627 +CVE-2006-4977 - https://www.exploit-db.com/exploits/2376 +CVE-2006-4978 - http://securityreason.com/securityalert/1627 +CVE-2006-4978 - https://www.exploit-db.com/exploits/2376 +CVE-2006-4979 - http://securityreason.com/securityalert/1627 +CVE-2006-4979 - https://www.exploit-db.com/exploits/2376 +CVE-2006-4984 - http://securityreason.com/securityalert/1634 +CVE-2006-4985 - http://securityreason.com/securityalert/1634 +CVE-2006-4986 - http://securityreason.com/securityalert/1634 +CVE-2006-4987 - http://securityreason.com/securityalert/1633 +CVE-2006-4988 - http://securityreason.com/securityalert/1633 +CVE-2006-4989 - http://securityreason.com/securityalert/1633 +CVE-2006-4990 - http://securityreason.com/securityalert/1632 +CVE-2006-4990 - http://www.osvdb.org/32251 +CVE-2006-4993 - https://www.exploit-db.com/exploits/2405 +CVE-2006-5015 - http://securityreason.com/securityalert/1644 +CVE-2006-5016 - http://securityreason.com/securityalert/1642 +CVE-2006-5017 - http://securityreason.com/securityalert/1642 +CVE-2006-5018 - http://securityreason.com/securityalert/1639 +CVE-2006-5019 - http://securityreason.com/securityalert/1637 +CVE-2006-5020 - https://www.exploit-db.com/exploits/2413 +CVE-2006-5022 - https://www.exploit-db.com/exploits/2407 +CVE-2006-5023 - https://www.exploit-db.com/exploits/2416 +CVE-2006-5027 - http://securityreason.com/securityalert/1638 +CVE-2006-5028 - http://securityreason.com/securityalert/1643 +CVE-2006-5030 - https://www.exploit-db.com/exploits/2406 +CVE-2006-5032 - https://www.exploit-db.com/exploits/2409 +CVE-2006-5036 - http://securityreason.com/securityalert/1635 +CVE-2006-5037 - http://securityreason.com/securityalert/1635 +CVE-2006-5038 - http://www.osnews.com/story.php/15923/Review-FiWin-SS28S-WiFi-VoIP-SIPSkype-Phone/ +CVE-2006-5043 - https://www.exploit-db.com/exploits/3560 +CVE-2006-5048 - https://www.exploit-db.com/exploits/2083 +CVE-2006-5050 - http://securityreason.com/securityalert/1636 +CVE-2006-5051 - http://www.ubuntu.com/usn/usn-355-1 +CVE-2006-5052 - http://www.redhat.com/support/errata/RHSA-2007-0703.html +CVE-2006-5053 - https://www.exploit-db.com/exploits/2419 +CVE-2006-5054 - https://www.exploit-db.com/exploits/2423 +CVE-2006-5055 - http://marc.info/?l=full-disclosure&m=115913461828660&w=2 +CVE-2006-5055 - https://www.exploit-db.com/exploits/2424 +CVE-2006-5056 - http://securityreason.com/securityalert/1641 +CVE-2006-5057 - http://securityreason.com/securityalert/1640 +CVE-2006-5059 - http://securityreason.com/securityalert/1645 +CVE-2006-5060 - http://securityreason.com/securityalert/1649 +CVE-2006-5061 - https://www.exploit-db.com/exploits/2422 +CVE-2006-5062 - https://www.exploit-db.com/exploits/2428 +CVE-2006-5065 - https://www.exploit-db.com/exploits/2420 +CVE-2006-5066 - http://securityreason.com/securityalert/1648 +CVE-2006-5067 - http://securityreason.com/securityalert/1647 +CVE-2006-5068 - https://www.exploit-db.com/exploits/2432 +CVE-2006-5068 - https://www.exploit-db.com/exploits/2433 +CVE-2006-5069 - http://securityreason.com/securityalert/1646 +CVE-2006-5070 - https://www.exploit-db.com/exploits/2434 +CVE-2006-5077 - https://www.exploit-db.com/exploits/2429 +CVE-2006-5078 - https://www.exploit-db.com/exploits/2427 +CVE-2006-5079 - https://www.exploit-db.com/exploits/2437 +CVE-2006-5083 - https://www.exploit-db.com/exploits/2430 +CVE-2006-5085 - http://securityreason.com/securityalert/1653 +CVE-2006-5086 - http://securityreason.com/securityalert/1653 +CVE-2006-5087 - https://www.exploit-db.com/exploits/2431 +CVE-2006-5092 - https://www.exploit-db.com/exploits/2436 +CVE-2006-5093 - https://www.exploit-db.com/exploits/2450 +CVE-2006-5097 - http://securityreason.com/securityalert/1655 +CVE-2006-5097 - http://www.attrition.org/pipermail/vim/2006-October/001076.html +CVE-2006-5100 - https://www.exploit-db.com/exploits/2435 +CVE-2006-5101 - http://securityreason.com/securityalert/1658 +CVE-2006-5102 - https://www.exploit-db.com/exploits/2439 +CVE-2006-5112 - https://www.exploit-db.com/exploits/2445 +CVE-2006-5113 - http://packetstormsecurity.org/0610-exploits/Exporia-0.3.0.txt +CVE-2006-5114 - http://securityreason.com/securityalert/1665 +CVE-2006-5115 - https://www.exploit-db.com/exploits/2447 +CVE-2006-5116 - http://securityreason.com/securityalert/1677 +CVE-2006-5118 - http://securityreason.com/securityalert/1666 +CVE-2006-5123 - http://securityreason.com/securityalert/1672 +CVE-2006-5124 - https://www.exploit-db.com/exploits/2451 +CVE-2006-5125 - https://www.exploit-db.com/exploits/2451 +CVE-2006-5126 - https://www.exploit-db.com/exploits/2454 +CVE-2006-5133 - http://securityreason.com/securityalert/1675 +CVE-2006-5135 - https://www.exploit-db.com/exploits/2442 +CVE-2006-5140 - https://www.exploit-db.com/exploits/2456 +CVE-2006-5144 - http://securityreason.com/securityalert/1680 +CVE-2006-5145 - http://securityreason.com/securityalert/1680 +CVE-2006-5146 - http://securityreason.com/securityalert/1679 +CVE-2006-5147 - https://www.exploit-db.com/exploits/2461 +CVE-2006-5148 - https://www.exploit-db.com/exploits/2459 +CVE-2006-5151 - http://securityreason.com/securityalert/1688 +CVE-2006-5153 - http://securityreason.com/securityalert/1685 +CVE-2006-5155 - https://www.exploit-db.com/exploits/2455 +CVE-2006-5157 - http://securityreason.com/securityalert/1682 +CVE-2006-5161 - http://securityreason.com/securityalert/1681 +CVE-2006-5162 - http://securityreason.com/securityalert/1683 +CVE-2006-5162 - https://www.exploit-db.com/exploits/2039 +CVE-2006-5163 - http://securityreason.com/securityalert/1686 +CVE-2006-5164 - http://securityreason.com/securityalert/1687 +CVE-2006-5165 - https://www.exploit-db.com/exploits/2446 +CVE-2006-5166 - http://securityreason.com/securityalert/1684 +CVE-2006-5167 - https://www.exploit-db.com/exploits/2465 +CVE-2006-5168 - http://securityreason.com/securityalert/1689 +CVE-2006-5174 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9885 +CVE-2006-5178 - http://securityreason.com/securityalert/1692 +CVE-2006-5180 - https://www.exploit-db.com/exploits/2443 +CVE-2006-5181 - https://www.exploit-db.com/exploits/2462 +CVE-2006-5182 - https://www.exploit-db.com/exploits/2471 +CVE-2006-5186 - https://www.exploit-db.com/exploits/2470 +CVE-2006-5187 - https://www.exploit-db.com/exploits/2468 +CVE-2006-5189 - https://www.exploit-db.com/exploits/2472 +CVE-2006-5190 - https://www.exploit-db.com/exploits/28743/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28744/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28745/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28746/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28747/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28748/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28749/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28750/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28752/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28753/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28754/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28755/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28756/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28757/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28758/ +CVE-2006-5190 - https://www.exploit-db.com/exploits/28759/ +CVE-2006-5191 - https://www.exploit-db.com/exploits/2477/ +CVE-2006-5192 - https://www.exploit-db.com/exploits/2476/ +CVE-2006-5198 - http://isc.sans.org/diary.php?storyid=1861 +CVE-2006-5198 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 +CVE-2006-5202 - https://www.exploit-db.com/exploits/5926 +CVE-2006-5205 - https://www.exploit-db.com/exploits/2473 +CVE-2006-5206 - https://www.exploit-db.com/exploits/2473 +CVE-2006-5207 - https://www.exploit-db.com/exploits/2478 +CVE-2006-5208 - https://www.exploit-db.com/exploits/2479 +CVE-2006-5209 - https://www.exploit-db.com/exploits/2475/ +CVE-2006-5210 - http://securityreason.com/securityalert/1726 +CVE-2006-5216 - http://exploitlabs.com/files/advisories/EXPL-A-2006-005-shttpd.txt +CVE-2006-5216 - https://www.exploit-db.com/exploits/2482 +CVE-2006-5218 - http://scary.beasts.org/security/CESA-2006-003.html +CVE-2006-5219 - http://marc.info/?l=full-disclosure&m=116034301209228&w=2 +CVE-2006-5219 - http://securityreason.com/securityalert/1699 +CVE-2006-5220 - http://securityreason.com/securityalert/1702 +CVE-2006-5220 - https://www.exploit-db.com/exploits/2496 +CVE-2006-5221 - https://www.exploit-db.com/exploits/2485 +CVE-2006-5222 - https://www.exploit-db.com/exploits/2481 +CVE-2006-5223 - https://www.exploit-db.com/exploits/2483 +CVE-2006-5224 - https://www.exploit-db.com/exploits/2480 +CVE-2006-5226 - https://www.exploit-db.com/exploits/2490 +CVE-2006-5230 - https://www.exploit-db.com/exploits/2484 +CVE-2006-5236 - http://securityreason.com/securityalert/1711 +CVE-2006-5236 - https://www.exploit-db.com/exploits/2487 +CVE-2006-5239 - http://marc.info/?l=full-disclosure&m=116042862409660&w=2 +CVE-2006-5240 - https://www.exploit-db.com/exploits/2493 +CVE-2006-5241 - http://securityreason.com/securityalert/1708 +CVE-2006-5241 - https://www.exploit-db.com/exploits/2497 +CVE-2006-5244 - https://www.exploit-db.com/exploits/2495 +CVE-2006-5245 - http://securityreason.com/securityalert/1717 +CVE-2006-5246 - http://securityreason.com/securityalert/1717 +CVE-2006-5247 - http://securityreason.com/securityalert/1717 +CVE-2006-5253 - http://securityreason.com/securityalert/1721 +CVE-2006-5254 - https://www.exploit-db.com/exploits/2379 +CVE-2006-5256 - https://www.exploit-db.com/exploits/2510 +CVE-2006-5257 - https://www.exploit-db.com/exploits/2489 +CVE-2006-5259 - http://marc.info/?l=bugtraq&m=116049484210942&w=2 +CVE-2006-5259 - https://www.exploit-db.com/exploits/2503 +CVE-2006-5261 - http://securityreason.com/securityalert/1720 +CVE-2006-5261 - https://www.exploit-db.com/exploits/2488 +CVE-2006-5263 - https://www.exploit-db.com/exploits/2500 +CVE-2006-5270 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-010 +CVE-2006-5276 - https://www.exploit-db.com/exploits/3362 +CVE-2006-5280 - https://www.exploit-db.com/exploits/2516 +CVE-2006-5281 - https://www.exploit-db.com/exploits/2514 +CVE-2006-5282 - https://www.exploit-db.com/exploits/2518 +CVE-2006-5283 - https://www.exploit-db.com/exploits/2519 +CVE-2006-5284 - https://www.exploit-db.com/exploits/2517 +CVE-2006-5285 - http://marc.info/?l=full-disclosure&m=116062269104422&w=2 +CVE-2006-5285 - http://securityreason.com/securityalert/1735 +CVE-2006-5287 - http://marc.info/?l=full-disclosure&m=116062281632705&w=2 +CVE-2006-5289 - http://securityreason.com/securityalert/1722 +CVE-2006-5289 - https://www.exploit-db.com/exploits/2508 +CVE-2006-5291 - http://securityreason.com/securityalert/1723 +CVE-2006-5291 - https://www.exploit-db.com/exploits/2521 +CVE-2006-5292 - https://www.exploit-db.com/exploits/2509 +CVE-2006-5293 - http://securityreason.com/securityalert/1724 +CVE-2006-5294 - http://securityreason.com/securityalert/1728 +CVE-2006-5296 - http://www.informationweek.com/management/showArticle.jhtml?articleID=193302553 +CVE-2006-5296 - https://www.exploit-db.com/exploits/2523 +CVE-2006-5299 - http://securityreason.com/securityalert/1725 +CVE-2006-5300 - http://securityreason.com/securityalert/1727 +CVE-2006-5301 - https://www.exploit-db.com/exploits/2533 +CVE-2006-5302 - https://www.exploit-db.com/exploits/2534 +CVE-2006-5304 - https://www.exploit-db.com/exploits/2557 +CVE-2006-5305 - http://securityreason.com/securityalert/1729 +CVE-2006-5305 - https://www.exploit-db.com/exploits/2546 +CVE-2006-5306 - https://www.exploit-db.com/exploits/2522 +CVE-2006-5307 - https://www.exploit-db.com/exploits/2529 +CVE-2006-5308 - http://isc.sans.org/diary.php?storyid=1791 +CVE-2006-5308 - https://www.exploit-db.com/exploits/2536 +CVE-2006-5309 - https://www.exploit-db.com/exploits/2550 +CVE-2006-5310 - https://www.exploit-db.com/exploits/2535 +CVE-2006-5312 - https://www.exploit-db.com/exploits/2532 +CVE-2006-5314 - http://securityreason.com/securityalert/1734 +CVE-2006-5314 - https://www.exploit-db.com/exploits/2501 +CVE-2006-5315 - http://securityreason.com/securityalert/1734 +CVE-2006-5315 - https://www.exploit-db.com/exploits/2502 +CVE-2006-5316 - http://securityreason.com/securityalert/1734 +CVE-2006-5316 - https://www.exploit-db.com/exploits/2502 +CVE-2006-5317 - http://securityreason.com/securityalert/1734 +CVE-2006-5317 - https://www.exploit-db.com/exploits/2504 +CVE-2006-5318 - https://www.exploit-db.com/exploits/2505 +CVE-2006-5319 - http://securityreason.com/securityalert/1734 +CVE-2006-5319 - https://www.exploit-db.com/exploits/2506 +CVE-2006-5320 - https://www.exploit-db.com/exploits/2507 +CVE-2006-5331 - http://www.linuxgrill.com/anonymous/kernel/v2.6/ChangeLog-2.6.19 +CVE-2006-5379 - http://securityreason.com/securityalert/1742 +CVE-2006-5383 - https://www.exploit-db.com/exploits/2567 +CVE-2006-5384 - https://www.exploit-db.com/exploits/2540 +CVE-2006-5385 - https://www.exploit-db.com/exploits/2547 +CVE-2006-5386 - https://www.exploit-db.com/exploits/2561 +CVE-2006-5387 - https://www.exploit-db.com/exploits/2538 +CVE-2006-5388 - https://www.exploit-db.com/exploits/2568 +CVE-2006-5390 - https://www.exploit-db.com/exploits/2551 +CVE-2006-5391 - https://www.exploit-db.com/exploits/2571 +CVE-2006-5392 - https://www.exploit-db.com/exploits/2570 +CVE-2006-5398 - https://www.exploit-db.com/exploits/2574 +CVE-2006-5399 - https://www.exploit-db.com/exploits/2584 +CVE-2006-5400 - https://www.exploit-db.com/exploits/2559 +CVE-2006-5401 - https://www.exploit-db.com/exploits/2562 +CVE-2006-5402 - http://marc.info/?l=bugtraq&m=116110988829381&w=2 +CVE-2006-5410 - http://securityreason.com/securityalert/1747 +CVE-2006-5412 - https://www.exploit-db.com/exploits/2588 +CVE-2006-5413 - https://www.exploit-db.com/exploits/2553 +CVE-2006-5415 - https://www.exploit-db.com/exploits/2545 +CVE-2006-5418 - https://www.exploit-db.com/exploits/2549 +CVE-2006-5419 - https://www.exploit-db.com/exploits/2576 +CVE-2006-5421 - https://www.exploit-db.com/exploits/2583 +CVE-2006-5426 - https://www.exploit-db.com/exploits/2595 +CVE-2006-5427 - https://www.exploit-db.com/exploits/2591 +CVE-2006-5429 - https://www.exploit-db.com/exploits/2589 +CVE-2006-5432 - https://www.exploit-db.com/exploits/2590 +CVE-2006-5433 - https://www.exploit-db.com/exploits/2582 +CVE-2006-5434 - https://www.exploit-db.com/exploits/2577 +CVE-2006-5442 - http://securityreason.com/securityalert/1755 +CVE-2006-5448 - http://securityreason.com/securityalert/1756 +CVE-2006-5452 - http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt +CVE-2006-5453 - http://securityreason.com/securityalert/1760 +CVE-2006-5454 - http://securityreason.com/securityalert/1760 +CVE-2006-5455 - http://securityreason.com/securityalert/1760 +CVE-2006-5456 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765 +CVE-2006-5458 - https://www.exploit-db.com/exploits/2526 +CVE-2006-5459 - http://securityreason.com/securityalert/1761 +CVE-2006-5462 - http://www.ubuntu.com/usn/usn-382-1 +CVE-2006-5463 - http://www.ubuntu.com/usn/usn-382-1 +CVE-2006-5463 - https://bugzilla.mozilla.org/show_bug.cgi?id=355655 +CVE-2006-5464 - http://www.ubuntu.com/usn/usn-382-1 +CVE-2006-5464 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9304 +CVE-2006-5469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9537 +CVE-2006-5471 - https://www.exploit-db.com/exploits/2511 +CVE-2006-5472 - https://www.exploit-db.com/exploits/2520 +CVE-2006-5473 - http://securityreason.com/securityalert/1763 +CVE-2006-5474 - http://securityreason.com/securityalert/1767 +CVE-2006-5475 - http://securityreason.com/securityalert/1766 +CVE-2006-5476 - http://securityreason.com/securityalert/1765 +CVE-2006-5477 - http://securityreason.com/securityalert/1764 +CVE-2006-5480 - https://www.exploit-db.com/exploits/2606 +CVE-2006-5485 - http://securityreason.com/securityalert/1762 +CVE-2006-5487 - http://securityreason.com/securityalert/1857 +CVE-2006-5491 - http://securityreason.com/securityalert/1768 +CVE-2006-5493 - https://www.exploit-db.com/exploits/2566 +CVE-2006-5494 - https://www.exploit-db.com/exploits/2599 +CVE-2006-5495 - https://www.exploit-db.com/exploits/2611 +CVE-2006-5496 - http://securityreason.com/securityalert/1769 +CVE-2006-5497 - https://www.exploit-db.com/exploits/2600 +CVE-2006-5499 - http://securityreason.com/securityalert/1771 +CVE-2006-5506 - https://www.exploit-db.com/exploits/2624 +CVE-2006-5507 - http://packetstormsecurity.org/0610-exploits/Derdirigent.txt +CVE-2006-5508 - http://securityreason.com/securityalert/1774 +CVE-2006-5509 - http://securityreason.com/securityalert/1774 +CVE-2006-5510 - https://www.exploit-db.com/exploits/2598 +CVE-2006-5511 - https://www.exploit-db.com/exploits/2616 +CVE-2006-5514 - https://www.exploit-db.com/exploits/2604 +CVE-2006-5517 - https://www.exploit-db.com/exploits/2609 +CVE-2006-5518 - https://www.exploit-db.com/exploits/2605 +CVE-2006-5519 - https://www.exploit-db.com/exploits/2613 +CVE-2006-5521 - https://www.exploit-db.com/exploits/2614 +CVE-2006-5521 - https://www.exploit-db.com/exploits/4755 +CVE-2006-5522 - https://www.exploit-db.com/exploits/2607 +CVE-2006-5523 - https://www.exploit-db.com/exploits/2620 +CVE-2006-5525 - https://www.exploit-db.com/exploits/2617 +CVE-2006-5526 - https://www.exploit-db.com/exploits/2621 +CVE-2006-5527 - https://www.exploit-db.com/exploits/2630 +CVE-2006-5531 - https://www.exploit-db.com/exploits/2631 +CVE-2006-5539 - https://www.exploit-db.com/exploits/2640 +CVE-2006-5543 - https://www.exploit-db.com/exploits/2612 +CVE-2006-5546 - https://www.exploit-db.com/exploits/2622 +CVE-2006-5547 - https://www.exploit-db.com/exploits/2622 +CVE-2006-5548 - https://www.exploit-db.com/exploits/2622 +CVE-2006-5550 - http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html +CVE-2006-5551 - https://www.exploit-db.com/exploits/2625 +CVE-2006-5552 - https://www.exploit-db.com/exploits/2650 +CVE-2006-5554 - https://www.exploit-db.com/exploits/2647 +CVE-2006-5555 - https://www.exploit-db.com/exploits/2596 +CVE-2006-5556 - https://www.exploit-db.com/exploits/2636 +CVE-2006-5557 - https://www.exploit-db.com/exploits/2633 +CVE-2006-5557 - https://www.exploit-db.com/exploits/2634 +CVE-2006-5558 - https://www.exploit-db.com/exploits/2635 +CVE-2006-5559 - http://www.kb.cert.org/vuls/id/589272 +CVE-2006-5559 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009 +CVE-2006-5560 - http://securityreason.com/securityalert/1782 +CVE-2006-5561 - https://www.exploit-db.com/exploits/2644 +CVE-2006-5562 - https://www.exploit-db.com/exploits/2623 +CVE-2006-5566 - http://securityreason.com/securityalert/1791 +CVE-2006-5570 - http://securityreason.com/securityalert/1790 +CVE-2006-5570 - http://vuln.sg/cruiseworks109d-en.html +CVE-2006-5571 - http://securityreason.com/securityalert/1790 +CVE-2006-5571 - http://vuln.sg/cruiseworks109d-en.html +CVE-2006-5574 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-001 +CVE-2006-5577 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 +CVE-2006-5578 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 +CVE-2006-5579 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 +CVE-2006-5581 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-072 +CVE-2006-5583 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-074 +CVE-2006-5584 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-077 +CVE-2006-5586 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2006-5587 - https://www.exploit-db.com/exploits/2626 +CVE-2006-5588 - https://www.exploit-db.com/exploits/2632 +CVE-2006-5590 - https://www.exploit-db.com/exploits/2645 +CVE-2006-5596 - https://www.exploit-db.com/exploits/2637 +CVE-2006-5597 - https://www.exploit-db.com/exploits/2651 +CVE-2006-5599 - http://securityreason.com/securityalert/1792 +CVE-2006-5600 - http://securityreason.com/securityalert/1793 +CVE-2006-5606 - http://www.redteam-pentesting.de/advisories/rt-sa-2006-007.php?lang=en +CVE-2006-5607 - http://securityreason.com/securityalert/1796 +CVE-2006-5609 - http://securityreason.com/securityalert/1797 +CVE-2006-5612 - http://securityreason.com/securityalert/1795 +CVE-2006-5612 - https://www.exploit-db.com/exploits/3467 +CVE-2006-5613 - https://www.exploit-db.com/exploits/2666 +CVE-2006-5614 - https://www.exploit-db.com/exploits/2672 +CVE-2006-5615 - http://securityreason.com/securityalert/1794 +CVE-2006-5617 - http://securityreason.com/securityalert/1798 +CVE-2006-5618 - https://www.exploit-db.com/exploits/2677 +CVE-2006-5619 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9311 +CVE-2006-5620 - http://securityreason.com/securityalert/1803 +CVE-2006-5620 - https://www.exploit-db.com/exploits/2656 +CVE-2006-5621 - https://www.exploit-db.com/exploits/2654 +CVE-2006-5622 - https://www.exploit-db.com/exploits/2660 +CVE-2006-5623 - https://www.exploit-db.com/exploits/2667 +CVE-2006-5625 - https://www.exploit-db.com/exploits/2659 +CVE-2006-5626 - http://securityreason.com/securityalert/1802 +CVE-2006-5627 - https://www.exploit-db.com/exploits/2681 +CVE-2006-5628 - http://securityreason.com/securityalert/1800 +CVE-2006-5629 - https://www.exploit-db.com/exploits/4730 +CVE-2006-5630 - http://securityreason.com/securityalert/1804 +CVE-2006-5633 - https://bugzilla.mozilla.org/show_bug.cgi?id=358797 +CVE-2006-5634 - https://www.exploit-db.com/exploits/2688 +CVE-2006-5635 - http://securityreason.com/securityalert/1801 +CVE-2006-5636 - http://securityreason.com/securityalert/1799 +CVE-2006-5636 - https://www.exploit-db.com/exploits/2673 +CVE-2006-5637 - https://www.exploit-db.com/exploits/2678 +CVE-2006-5638 - https://www.exploit-db.com/exploits/2679 +CVE-2006-5640 - https://www.exploit-db.com/exploits/2684 +CVE-2006-5641 - https://www.exploit-db.com/exploits/2683 +CVE-2006-5650 - http://securityreason.com/securityalert/1830 +CVE-2006-5651 - http://securityreason.com/securityalert/1829 +CVE-2006-5652 - http://securityreason.com/securityalert/1806 +CVE-2006-5653 - http://securityreason.com/securityalert/1805 +CVE-2006-5655 - http://securityreason.com/securityalert/1809 +CVE-2006-5658 - http://securityreason.com/securityalert/1808 +CVE-2006-5661 - http://securityreason.com/securityalert/1807 +CVE-2006-5662 - http://securityreason.com/securityalert/1819 +CVE-2006-5665 - https://www.exploit-db.com/exploits/2686 +CVE-2006-5666 - https://www.exploit-db.com/exploits/2687 +CVE-2006-5667 - http://securityreason.com/securityalert/1811 +CVE-2006-5667 - https://www.exploit-db.com/exploits/2691 +CVE-2006-5669 - https://www.exploit-db.com/exploits/2692 +CVE-2006-5670 - https://www.exploit-db.com/exploits/2669 +CVE-2006-5672 - https://www.exploit-db.com/exploits/2674 +CVE-2006-5673 - https://www.exploit-db.com/exploits/2655 +CVE-2006-5675 - http://sourceforge.net/project/shownotes.php?group_id=140317&release_id=456313 +CVE-2006-5676 - https://www.exploit-db.com/exploits/2661 +CVE-2006-5677 - http://securityreason.com/securityalert/1820 +CVE-2006-5678 - http://securityreason.com/securityalert/1810 +CVE-2006-5702 - http://securityreason.com/securityalert/1816 +CVE-2006-5703 - http://securityreason.com/securityalert/1816 +CVE-2006-5707 - http://securityreason.com/securityalert/1814 +CVE-2006-5707 - https://www.exploit-db.com/exploits/2675 +CVE-2006-5711 - http://securityreason.com/securityalert/1817 +CVE-2006-5712 - http://marc.info/?l=full-disclosure&m=116232831525086&w=2 +CVE-2006-5714 - https://www.exploit-db.com/exploits/2690 +CVE-2006-5715 - https://www.exploit-db.com/exploits/2699 +CVE-2006-5716 - http://securityreason.com/securityalert/1822 +CVE-2006-5717 - http://securityreason.com/securityalert/1815 +CVE-2006-5719 - http://securityreason.com/securityalert/1813 +CVE-2006-5720 - http://securityreason.com/securityalert/1812 +CVE-2006-5721 - http://securityreason.com/securityalert/1821 +CVE-2006-5724 - http://securityreason.com/securityalert/1818 +CVE-2006-5725 - https://www.exploit-db.com/exploits/2637 +CVE-2006-5727 - https://www.exploit-db.com/exploits/2718 +CVE-2006-5728 - https://www.exploit-db.com/exploits/2715 +CVE-2006-5730 - https://www.exploit-db.com/exploits/2706 +CVE-2006-5731 - https://www.exploit-db.com/exploits/2702 +CVE-2006-5732 - https://www.exploit-db.com/exploits/2694 +CVE-2006-5733 - https://www.exploit-db.com/exploits/2707 +CVE-2006-5734 - http://securityreason.com/securityalert/1823 +CVE-2006-5735 - http://securityreason.com/securityalert/1824 +CVE-2006-5736 - http://securityreason.com/securityalert/1824 +CVE-2006-5740 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9482 +CVE-2006-5745 - https://www.exploit-db.com/exploits/2743 +CVE-2006-5747 - http://www.ubuntu.com/usn/usn-382-1 +CVE-2006-5747 - https://bugzilla.mozilla.org/show_bug.cgi?id=355569 +CVE-2006-5748 - http://www.ubuntu.com/usn/usn-382-1 +CVE-2006-5749 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2006-5752 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2006-5753 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2006-5753 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371 +CVE-2006-5755 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9554 +CVE-2006-5758 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson +CVE-2006-5758 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2006-5759 - http://securityreason.com/securityalert/1825 +CVE-2006-5760 - https://www.exploit-db.com/exploits/2717 +CVE-2006-5761 - http://securityreason.com/securityalert/1825 +CVE-2006-5762 - https://www.exploit-db.com/exploits/2670 +CVE-2006-5762 - https://www.exploit-db.com/exploits/3568 +CVE-2006-5763 - https://www.exploit-db.com/exploits/3568 +CVE-2006-5765 - http://securityreason.com/securityalert/1826 +CVE-2006-5766 - https://www.exploit-db.com/exploits/2703 +CVE-2006-5767 - https://www.exploit-db.com/exploits/2713 +CVE-2006-5768 - http://marc.info/?l=bugtraq&m=116283724113571&w=2 +CVE-2006-5768 - https://www.exploit-db.com/exploits/2725 +CVE-2006-5772 - https://www.exploit-db.com/exploits/2704 +CVE-2006-5773 - https://www.exploit-db.com/exploits/2704 +CVE-2006-5776 - http://securityreason.com/securityalert/1827 +CVE-2006-5777 - https://www.exploit-db.com/exploits/2709 +CVE-2006-5779 - http://securityreason.com/securityalert/1831 +CVE-2006-5780 - http://securityreason.com/securityalert/1831 +CVE-2006-5780 - https://www.exploit-db.com/exploits/2729 +CVE-2006-5782 - http://securityreason.com/securityalert/1842 +CVE-2006-5784 - http://securityreason.com/securityalert/1828 +CVE-2006-5784 - https://www.exploit-db.com/exploits/3291 +CVE-2006-5785 - http://securityreason.com/securityalert/1828 +CVE-2006-5786 - https://www.exploit-db.com/exploits/2711 +CVE-2006-5787 - https://www.exploit-db.com/exploits/2731 +CVE-2006-5788 - https://www.exploit-db.com/exploits/2739 +CVE-2006-5789 - http://securityreason.com/securityalert/1832 +CVE-2006-5790 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392016 +CVE-2006-5791 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392016 +CVE-2006-5793 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2006-5795 - http://securityreason.com/securityalert/1834 +CVE-2006-5795 - https://www.exploit-db.com/exploits/2727 +CVE-2006-5796 - http://marc.info/?l=bugtraq&m=116283614914510&w=2 +CVE-2006-5796 - https://www.exploit-db.com/exploits/2724 +CVE-2006-5802 - https://www.exploit-db.com/exploits/2722 +CVE-2006-5803 - https://www.exploit-db.com/exploits/2723 +CVE-2006-5804 - http://securityreason.com/securityalert/1833 +CVE-2006-5811 - http://securityreason.com/securityalert/1844 +CVE-2006-5811 - https://www.exploit-db.com/exploits/2727 +CVE-2006-5816 - http://securityreason.com/securityalert/1836 +CVE-2006-5820 - http://securityreason.com/securityalert/2513 +CVE-2006-5825 - http://securityreason.com/securityalert/1838 +CVE-2006-5826 - http://marc.info/?l=full-disclosure&m=116289234522958&w=2 +CVE-2006-5826 - http://marc.info/?l=full-disclosure&m=116295408114746&w=2 +CVE-2006-5826 - http://securityreason.com/securityalert/1837 +CVE-2006-5826 - https://www.exploit-db.com/exploits/2734 +CVE-2006-5827 - http://securityreason.com/securityalert/1843 +CVE-2006-5828 - https://www.exploit-db.com/exploits/2720 +CVE-2006-5829 - http://securityreason.com/securityalert/1839 +CVE-2006-5830 - http://securityreason.com/securityalert/1839 +CVE-2006-5831 - http://securityreason.com/securityalert/1839 +CVE-2006-5832 - http://securityreason.com/securityalert/1839 +CVE-2006-5833 - http://securityreason.com/securityalert/1841 +CVE-2006-5834 - https://www.exploit-db.com/exploits/2719 +CVE-2006-5837 - https://www.exploit-db.com/exploits/2733 +CVE-2006-5838 - http://securityreason.com/securityalert/1835 +CVE-2006-5839 - https://www.exploit-db.com/exploits/2736 +CVE-2006-5840 - http://securityreason.com/securityalert/1840 +CVE-2006-5841 - https://www.exploit-db.com/exploits/2742 +CVE-2006-5846 - http://marc.info/?l=bugtraq&m=116303405916694&w=2 +CVE-2006-5847 - http://marc.info/?l=bugtraq&m=116303405916694&w=2 +CVE-2006-5849 - https://www.exploit-db.com/exploits/2741 +CVE-2006-5850 - http://securityreason.com/securityalert/1846 +CVE-2006-5850 - https://www.exploit-db.com/exploits/2716 +CVE-2006-5851 - https://www.exploit-db.com/exploits/2737 +CVE-2006-5852 - https://www.exploit-db.com/exploits/2738 +CVE-2006-5853 - http://securityreason.com/securityalert/1845 +CVE-2006-5857 - http://www.piotrbania.com/all/adv/adobe-acrobat-adv.txt +CVE-2006-5863 - https://www.exploit-db.com/exploits/2782 +CVE-2006-5864 - https://www.exploit-db.com/exploits/2858 +CVE-2006-5865 - https://www.exploit-db.com/exploits/2747 +CVE-2006-5866 - http://www.securityfocus.com/archive/1/451318/100/0/threaded +CVE-2006-5866 - https://www.exploit-db.com/exploits/2748 +CVE-2006-5870 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9145 +CVE-2006-5878 - http://trac.edgewall.org/ticket/4049 +CVE-2006-5879 - https://www.exploit-db.com/exploits/2762 +CVE-2006-5880 - https://www.exploit-db.com/exploits/2761 +CVE-2006-5881 - http://securityreason.com/securityalert/1853 +CVE-2006-5881 - https://www.exploit-db.com/exploits/2754 +CVE-2006-5883 - http://securityreason.com/securityalert/1847 +CVE-2006-5884 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 +CVE-2006-5885 - http://securityreason.com/securityalert/1856 +CVE-2006-5885 - https://www.exploit-db.com/exploits/2756 +CVE-2006-5886 - http://securityreason.com/securityalert/1850 +CVE-2006-5886 - https://www.exploit-db.com/exploits/2755 +CVE-2006-5887 - http://securityreason.com/securityalert/1855 +CVE-2006-5887 - https://www.exploit-db.com/exploits/2757 +CVE-2006-5888 - https://www.exploit-db.com/exploits/2765 +CVE-2006-5889 - https://www.exploit-db.com/exploits/2751 +CVE-2006-5890 - https://www.exploit-db.com/exploits/2764 +CVE-2006-5891 - http://securityreason.com/securityalert/1851 +CVE-2006-5891 - https://www.exploit-db.com/exploits/2763 +CVE-2006-5892 - https://www.exploit-db.com/exploits/2746 +CVE-2006-5893 - https://www.exploit-db.com/exploits/2767 +CVE-2006-5894 - https://www.exploit-db.com/exploits/2760 +CVE-2006-5895 - http://securityreason.com/securityalert/1848 +CVE-2006-5895 - https://www.exploit-db.com/exploits/2750 +CVE-2006-5897 - http://securityreason.com/securityalert/1854 +CVE-2006-5898 - http://securityreason.com/securityalert/1852 +CVE-2006-5900 - http://securityreason.com/securityalert/1863 +CVE-2006-5901 - http://securityreason.com/securityalert/1860 +CVE-2006-5904 - http://securityreason.com/securityalert/1849 +CVE-2006-5905 - http://securityreason.com/securityalert/1859 +CVE-2006-5905 - https://www.exploit-db.com/exploits/8878 +CVE-2006-5908 - http://securityreason.com/securityalert/1866 +CVE-2006-5914 - http://securityreason.com/securityalert/1864 +CVE-2006-5915 - http://securityreason.com/securityalert/1864 +CVE-2006-5917 - http://securityreason.com/securityalert/1865 +CVE-2006-5918 - http://securityreason.com/securityalert/1862 +CVE-2006-5919 - http://securityreason.com/securityalert/1861 +CVE-2006-5919 - https://www.exploit-db.com/exploits/2364 +CVE-2006-5920 - http://securityreason.com/securityalert/1858 +CVE-2006-5921 - http://securityreason.com/securityalert/1867 +CVE-2006-5922 - http://securityreason.com/securityalert/1867 +CVE-2006-5923 - https://www.exploit-db.com/exploits/2745 +CVE-2006-5927 - http://securityreason.com/securityalert/1874 +CVE-2006-5928 - http://securityreason.com/securityalert/1869 +CVE-2006-5928 - https://www.exploit-db.com/exploits/2775 +CVE-2006-5930 - http://securityreason.com/securityalert/1868 +CVE-2006-5930 - https://www.exploit-db.com/exploits/2777 +CVE-2006-5933 - http://securityreason.com/securityalert/1873 +CVE-2006-5934 - http://securityreason.com/securityalert/1872 +CVE-2006-5934 - https://www.exploit-db.com/exploits/2773 +CVE-2006-5935 - http://securityreason.com/securityalert/1871 +CVE-2006-5936 - http://securityreason.com/securityalert/1870 +CVE-2006-5937 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 +CVE-2006-5938 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 +CVE-2006-5939 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 +CVE-2006-5940 - http://marc.info/?l=full-disclosure&m=116343152030074&w=2 +CVE-2006-5942 - http://securityreason.com/securityalert/1875 +CVE-2006-5943 - http://securityreason.com/securityalert/1875 +CVE-2006-5944 - http://securityreason.com/securityalert/1876 +CVE-2006-5945 - http://securityreason.com/securityalert/1876 +CVE-2006-5946 - http://securityreason.com/securityalert/1877 +CVE-2006-5948 - https://www.exploit-db.com/exploits/2778 +CVE-2006-5951 - http://securityreason.com/securityalert/1878 +CVE-2006-5952 - https://www.exploit-db.com/exploits/2779 +CVE-2006-5954 - https://www.exploit-db.com/exploits/2780 +CVE-2006-5957 - http://securityreason.com/securityalert/1881 +CVE-2006-5958 - http://securityreason.com/securityalert/1881 +CVE-2006-5959 - http://securityreason.com/securityalert/1880 +CVE-2006-5960 - http://securityreason.com/securityalert/1880 +CVE-2006-5962 - http://securityreason.com/securityalert/1879 +CVE-2006-5962 - https://www.exploit-db.com/exploits/2782 +CVE-2006-5968 - http://securityreason.com/securityalert/1890 +CVE-2006-5975 - http://securityreason.com/securityalert/1882 +CVE-2006-5975 - https://www.exploit-db.com/exploits/2781 +CVE-2006-5976 - http://securityreason.com/securityalert/1882 +CVE-2006-5976 - https://www.exploit-db.com/exploits/2781 +CVE-2006-5977 - http://securityreason.com/securityalert/1883 +CVE-2006-5983 - http://securityreason.com/securityalert/1885 +CVE-2006-5984 - http://securityreason.com/securityalert/1884 +CVE-2006-5987 - http://securityreason.com/securityalert/1886 +CVE-2006-5991 - http://securityreason.com/securityalert/1887 +CVE-2006-5994 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9005698&intsrc=hm_list +CVE-2006-5994 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 +CVE-2006-6007 - http://securityreason.com/securityalert/1888 +CVE-2006-6010 - http://securityreason.com/securityalert/1889 +CVE-2006-6011 - http://securityreason.com/securityalert/1889 +CVE-2006-6018 - http://securityreason.com/securityalert/1891 +CVE-2006-6020 - http://securityreason.com/securityalert/1895 +CVE-2006-6021 - http://securityreason.com/securityalert/1898 +CVE-2006-6022 - http://securityreason.com/securityalert/1898 +CVE-2006-6023 - http://securityreason.com/securityalert/1893 +CVE-2006-6026 - http://www.attrition.org/pipermail/vim/2007-March/001459.html +CVE-2006-6026 - https://www.exploit-db.com/exploits/3531 +CVE-2006-6028 - https://www.exploit-db.com/exploits/2795 +CVE-2006-6029 - http://securityreason.com/securityalert/1894 +CVE-2006-6030 - http://securityreason.com/securityalert/1897 +CVE-2006-6031 - http://securityreason.com/securityalert/1899 +CVE-2006-6032 - http://securityreason.com/securityalert/1896 +CVE-2006-6033 - http://securityreason.com/securityalert/1892 +CVE-2006-6035 - http://marc.info/?l=bugtraq&m=116387287216907&w=2 +CVE-2006-6036 - http://freshmeat.net/projects/openhuman/?branch_id=67092&release_id=240896 +CVE-2006-6038 - https://www.exploit-db.com/exploits/2797 +CVE-2006-6039 - https://www.exploit-db.com/exploits/2798 +CVE-2006-6041 - https://www.exploit-db.com/exploits/2752 +CVE-2006-6042 - https://www.exploit-db.com/exploits/2811 +CVE-2006-6044 - https://www.exploit-db.com/exploits/2814 +CVE-2006-6046 - http://marc.info/?l=bugtraq&m=116373125308955&w=2 +CVE-2006-6047 - https://www.exploit-db.com/exploits/2790 +CVE-2006-6051 - https://www.exploit-db.com/exploits/2807 +CVE-2006-6056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9949 +CVE-2006-6061 - http://www.kb.cert.org/vuls/id/367424 +CVE-2006-6063 - https://www.exploit-db.com/exploits/2815 +CVE-2006-6065 - https://www.exploit-db.com/exploits/2799 +CVE-2006-6070 - https://www.exploit-db.com/exploits/2813 +CVE-2006-6073 - http://marc.info/?l=bugtraq&m=116353137028066&w=2 +CVE-2006-6077 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2006-6077 - https://bugzilla.mozilla.org/show_bug.cgi?id=360493 +CVE-2006-6078 - https://www.exploit-db.com/exploits/2831 +CVE-2006-6080 - http://securityreason.com/securityalert/1908 +CVE-2006-6086 - https://www.exploit-db.com/exploits/2818 +CVE-2006-6087 - http://securityreason.com/securityalert/1919 +CVE-2006-6088 - http://securityreason.com/securityalert/1912 +CVE-2006-6093 - https://www.exploit-db.com/exploits/2817 +CVE-2006-6095 - http://marc.info/?l=bugtraq&m=116387481223790&w=2 +CVE-2006-6096 - http://marc.info/?l=bugtraq&m=116387481223790&w=2 +CVE-2006-6097 - http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html +CVE-2006-6102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991 +CVE-2006-6106 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2006-6107 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9951 +CVE-2006-6115 - https://www.exploit-db.com/exploits/2828 +CVE-2006-6116 - https://www.exploit-db.com/exploits/2830 +CVE-2006-6117 - https://www.exploit-db.com/exploits/2829 +CVE-2006-6121 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2006-6133 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-052 +CVE-2006-6134 - http://www.kb.cert.org/vuls/id/208769 +CVE-2006-6134 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-078 +CVE-2006-6137 - https://www.exploit-db.com/exploits/2847 +CVE-2006-6138 - https://www.exploit-db.com/exploits/2847 +CVE-2006-6142 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9988 +CVE-2006-6149 - https://www.exploit-db.com/exploits/2836 +CVE-2006-6150 - https://www.exploit-db.com/exploits/2839 +CVE-2006-6154 - https://www.exploit-db.com/exploits/2838 +CVE-2006-6157 - https://www.exploit-db.com/exploits/2822 +CVE-2006-6160 - https://www.exploit-db.com/exploits/2846 +CVE-2006-6161 - https://www.exploit-db.com/exploits/7493 +CVE-2006-6169 - http://www.redhat.com/support/errata/RHSA-2006-0754.html +CVE-2006-6177 - http://www.nukedx.com/?getxpl=52 +CVE-2006-6177 - http://www.nukedx.com/?viewdoc=52 +CVE-2006-6184 - http://www.exploit-db.com/exploits/24952 +CVE-2006-6185 - http://securityreason.com/securityalert/1939 +CVE-2006-6186 - http://securityreason.com/securityalert/1940 +CVE-2006-6187 - http://securityreason.com/securityalert/1937 +CVE-2006-6188 - http://securityreason.com/securityalert/1937 +CVE-2006-6191 - https://www.exploit-db.com/exploits/2853 +CVE-2006-6193 - https://www.exploit-db.com/exploits/2848 +CVE-2006-6194 - http://securityreason.com/securityalert/1936 +CVE-2006-6196 - http://securityreason.com/securityalert/1941 +CVE-2006-6199 - https://www.exploit-db.com/exploits/2880 +CVE-2006-6200 - http://securityreason.com/securityalert/1935 +CVE-2006-6202 - https://www.exploit-db.com/exploits/2843 +CVE-2006-6203 - https://www.exploit-db.com/exploits/2852 +CVE-2006-6207 - http://securityreason.com/securityalert/1933 +CVE-2006-6209 - http://securityreason.com/securityalert/1947 +CVE-2006-6211 - http://securityreason.com/securityalert/1945 +CVE-2006-6213 - https://www.exploit-db.com/exploits/2840 +CVE-2006-6214 - https://www.exploit-db.com/exploits/2835 +CVE-2006-6216 - https://www.exploit-db.com/exploits/2851 +CVE-2006-6220 - https://www.exploit-db.com/exploits/2834 +CVE-2006-6222 - http://securityreason.com/securityalert/2033 +CVE-2006-6225 - https://www.exploit-db.com/exploits/1963 +CVE-2006-6226 - http://aluigi.altervista.org/adv/neoenginex-adv.txt +CVE-2006-6227 - http://aluigi.altervista.org/adv/neoenginex-adv.txt +CVE-2006-6235 - http://www.redhat.com/support/errata/RHSA-2006-0754.html +CVE-2006-6236 - https://www.exploit-db.com/exploits/3040 +CVE-2006-6237 - https://www.exploit-db.com/exploits/2841 +CVE-2006-6242 - https://www.exploit-db.com/exploits/2869 +CVE-2006-6243 - http://securityreason.com/securityalert/1959 +CVE-2006-6247 - http://securityreason.com/securityalert/1950 +CVE-2006-6250 - https://www.exploit-db.com/exploits/2861 +CVE-2006-6251 - https://www.exploit-db.com/exploits/2870 +CVE-2006-6251 - https://www.exploit-db.com/exploits/2872 +CVE-2006-6253 - http://securityreason.com/securityalert/1961 +CVE-2006-6254 - http://securityreason.com/securityalert/1961 +CVE-2006-6255 - https://www.exploit-db.com/exploits/2843 +CVE-2006-6261 - https://www.exploit-db.com/exploits/2860 +CVE-2006-6268 - http://www.nukedx.com/?viewdoc=51 +CVE-2006-6271 - http://securityreason.com/securityalert/1960 +CVE-2006-6274 - http://attrition.org/pipermail/vim/2006-November/001147.html +CVE-2006-6274 - http://securityreason.com/securityalert/1956 +CVE-2006-6285 - http://attrition.org/pipermail/vim/2006-December/001159.html +CVE-2006-6285 - https://www.exploit-db.com/exploits/2868 +CVE-2006-6287 - https://www.exploit-db.com/exploits/2873 +CVE-2006-6288 - http://www.securityfocus.com/archive/1/485564/100/100/threaded +CVE-2006-6288 - https://www.exploit-db.com/exploits/4839 +CVE-2006-6293 - https://www.exploit-db.com/exploits/2893 +CVE-2006-6295 - https://www.exploit-db.com/exploits/2885 +CVE-2006-6296 - https://www.exploit-db.com/exploits/2879 +CVE-2006-6311 - http://securityreason.com/securityalert/1968 +CVE-2006-6328 - https://www.exploit-db.com/exploits/2786 +CVE-2006-6329 - https://www.exploit-db.com/exploits/2786 +CVE-2006-6330 - https://www.exploit-db.com/exploits/2786 +CVE-2006-6334 - https://www.exploit-db.com/exploits/5106 +CVE-2006-6341 - https://www.exploit-db.com/exploits/2794 +CVE-2006-6349 - https://www.exploit-db.com/exploits/3015 +CVE-2006-6352 - http://securityreason.com/securityalert/1998 +CVE-2006-6352 - https://www.exploit-db.com/exploits/2892 +CVE-2006-6355 - http://securityreason.com/securityalert/1997 +CVE-2006-6358 - http://marc.info/?l=bugtraq&m=116525508018486&w=2 +CVE-2006-6359 - http://marc.info/?l=bugtraq&m=116525508018486&w=2 +CVE-2006-6360 - https://www.exploit-db.com/exploits/2886 +CVE-2006-6363 - http://securityreason.com/securityalert/1991 +CVE-2006-6364 - http://securityreason.com/securityalert/1990 +CVE-2006-6367 - http://marc.info/?l=bugtraq&m=116508632603388&w=2 +CVE-2006-6368 - https://www.exploit-db.com/exploits/2884 +CVE-2006-6376 - https://www.exploit-db.com/exploits/2883 +CVE-2006-6377 - http://www.securityfocus.com/archive/1/453644/100/0/threaded +CVE-2006-6380 - https://www.exploit-db.com/exploits/2881 +CVE-2006-6381 - https://www.exploit-db.com/exploits/2881 +CVE-2006-6390 - https://www.exploit-db.com/exploits/2889 +CVE-2006-6396 - https://www.exploit-db.com/exploits/2880 +CVE-2006-6405 - http://www.quantenblog.net/security/virus-scanner-bypass +CVE-2006-6406 - http://www.quantenblog.net/security/virus-scanner-bypass +CVE-2006-6407 - http://www.quantenblog.net/security/virus-scanner-bypass +CVE-2006-6408 - http://www.quantenblog.net/security/virus-scanner-bypass +CVE-2006-6409 - http://www.quantenblog.net/security/virus-scanner-bypass +CVE-2006-6410 - https://www.exploit-db.com/exploits/2264 +CVE-2006-6418 - http://www.netragard.com/pdfs/research/HP-TRU64-LIBPTHREAD-20060811.txt +CVE-2006-6421 - http://securityreason.com/securityalert/2005 +CVE-2006-6426 - https://www.exploit-db.com/exploits/2898 +CVE-2006-6445 - https://www.exploit-db.com/exploits/2888 +CVE-2006-6453 - https://www.exploit-db.com/exploits/2895 +CVE-2006-6456 - http://isc.sans.org/diary.php?storyid=1925 +CVE-2006-6456 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 +CVE-2006-6462 - https://www.exploit-db.com/exploits/2897 +CVE-2006-6463 - http://securityreason.com/securityalert/2016 +CVE-2006-6464 - http://securityreason.com/securityalert/2016 +CVE-2006-6465 - https://www.exploit-db.com/exploits/2875 +CVE-2006-6475 - http://securityreason.com/securityalert/2052 +CVE-2006-6476 - http://securityreason.com/securityalert/2052 +CVE-2006-6477 - http://securityreason.com/securityalert/2052 +CVE-2006-6481 - http://www.quantenblog.net/security/virus-scanner-bypass +CVE-2006-6485 - http://securityreason.com/securityalert/2020 +CVE-2006-6501 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9746 +CVE-2006-6502 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9626 +CVE-2006-6512 - http://securityreason.com/securityalert/2032 +CVE-2006-6513 - http://securityreason.com/securityalert/2032 +CVE-2006-6514 - http://securityreason.com/securityalert/2032 +CVE-2006-6516 - https://www.exploit-db.com/exploits/3263 +CVE-2006-6518 - http://securityreason.com/securityalert/2025 +CVE-2006-6519 - http://securityreason.com/securityalert/2025 +CVE-2006-6520 - http://securityreason.com/securityalert/2026 +CVE-2006-6521 - http://securityreason.com/securityalert/2026 +CVE-2006-6523 - http://securityreason.com/securityalert/2028 +CVE-2006-6524 - https://www.exploit-db.com/exploits/2909 +CVE-2006-6526 - https://www.exploit-db.com/exploits/2905 +CVE-2006-6537 - http://securityreason.com/securityalert/2030 +CVE-2006-6538 - http://securityreason.com/securityalert/2029 +CVE-2006-6538 - https://www.exploit-db.com/exploits/2915 +CVE-2006-6539 - http://securityreason.com/securityalert/2032 +CVE-2006-6541 - http://securityreason.com/securityalert/2031 +CVE-2006-6542 - https://www.exploit-db.com/exploits/2906 +CVE-2006-6543 - https://www.exploit-db.com/exploits/2907 +CVE-2006-6545 - https://www.exploit-db.com/exploits/2917 +CVE-2006-6546 - https://www.exploit-db.com/exploits/2891 +CVE-2006-6547 - http://aluigi.altervista.org/adv/mlipodbof-adv.txt +CVE-2006-6549 - http://securityreason.com/securityalert/2034 +CVE-2006-6550 - https://www.exploit-db.com/exploits/2894 +CVE-2006-6551 - https://www.exploit-db.com/exploits/2896 +CVE-2006-6552 - https://www.exploit-db.com/exploits/2923 +CVE-2006-6553 - https://www.exploit-db.com/exploits/2925 +CVE-2006-6558 - https://www.exploit-db.com/exploits/2926 +CVE-2006-6559 - https://www.exploit-db.com/exploits/2908 +CVE-2006-6560 - https://www.exploit-db.com/exploits/2921 +CVE-2006-6563 - https://www.exploit-db.com/exploits/3330 +CVE-2006-6565 - https://www.exploit-db.com/exploits/2914 +CVE-2006-6566 - https://www.exploit-db.com/exploits/2904 +CVE-2006-6566 - https://www.exploit-db.com/exploits/2918 +CVE-2006-6567 - https://www.exploit-db.com/exploits/2924 +CVE-2006-6568 - https://www.exploit-db.com/exploits/2924 +CVE-2006-6569 - http://securityreason.com/securityalert/2035 +CVE-2006-6570 - http://securityreason.com/securityalert/2035 +CVE-2006-6571 - http://securityreason.com/securityalert/2035 +CVE-2006-6575 - https://www.exploit-db.com/exploits/2930 +CVE-2006-6576 - http://packetstormsecurity.com/files/161711/Golden-FTP-Server-4.70-Buffer-Overflow.html +CVE-2006-6577 - http://securityreason.com/securityalert/2037 +CVE-2006-6578 - http://securityreason.com/securityalert/2036 +CVE-2006-6585 - http://securityreason.com/securityalert/2046 +CVE-2006-6586 - https://www.exploit-db.com/exploits/2740 +CVE-2006-6590 - https://www.exploit-db.com/exploits/2931 +CVE-2006-6592 - http://securityreason.com/securityalert/2039 +CVE-2006-6593 - http://securityreason.com/securityalert/2038 +CVE-2006-6598 - https://www.exploit-db.com/exploits/2902 +CVE-2006-6599 - https://www.exploit-db.com/exploits/2903 +CVE-2006-6603 - http://messenger.yahoo.com/security_update.php?id=120806 +CVE-2006-6604 - https://www.exploit-db.com/exploits/2902 +CVE-2006-6605 - http://securityreason.com/securityalert/2053 +CVE-2006-6611 - https://www.exploit-db.com/exploits/2920 +CVE-2006-6612 - https://www.exploit-db.com/exploits/2927 +CVE-2006-6613 - https://www.exploit-db.com/exploits/2913 +CVE-2006-6615 - https://www.exploit-db.com/exploits/2919 +CVE-2006-6624 - https://www.exploit-db.com/exploits/2934 +CVE-2006-6627 - http://securityreason.com/securityalert/2044 +CVE-2006-6631 - https://www.exploit-db.com/exploits/2572 +CVE-2006-6632 - https://www.exploit-db.com/exploits/2539 +CVE-2006-6633 - https://www.exploit-db.com/exploits/2594 +CVE-2006-6635 - https://www.exploit-db.com/exploits/2628 +CVE-2006-6640 - http://securityreason.com/securityalert/2048 +CVE-2006-6642 - http://securityreason.com/securityalert/2050 +CVE-2006-6643 - https://www.exploit-db.com/exploits/2942 +CVE-2006-6644 - https://www.exploit-db.com/exploits/2941 +CVE-2006-6645 - https://www.exploit-db.com/exploits/2939 +CVE-2006-6649 - http://securityreason.com/securityalert/2051 +CVE-2006-6650 - https://www.exploit-db.com/exploits/2940 +CVE-2006-6661 - https://www.exploit-db.com/exploits/2953 +CVE-2006-6665 - https://www.exploit-db.com/exploits/2950 +CVE-2006-6666 - https://www.exploit-db.com/exploits/2944 +CVE-2006-6669 - http://securityreason.com/securityalert/2054 +CVE-2006-6671 - http://securityreason.com/securityalert/2055 +CVE-2006-6673 - https://www.exploit-db.com/exploits/2952 +CVE-2006-6676 - http://securityreason.com/securityalert/2079 +CVE-2006-6677 - http://securityreason.com/securityalert/2079 +CVE-2006-6686 - https://www.exploit-db.com/exploits/2965 +CVE-2006-6690 - http://securityreason.com/securityalert/2056 +CVE-2006-6691 - https://www.exploit-db.com/exploits/2964 +CVE-2006-6694 - https://www.exploit-db.com/exploits/2556 +CVE-2006-6696 - http://isc.sans.org/diary.php?n&storyid=1965 +CVE-2006-6696 - http://www.security.nnov.ru/Gnews944.html +CVE-2006-6696 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 +CVE-2006-6697 - http://securityreason.com/securityalert/2057 +CVE-2006-6701 - http://www.netragard.com/pdfs/research/ATMAIL-XSRF-ADVISORY-20061206.txt +CVE-2006-6710 - https://www.exploit-db.com/exploits/2971 +CVE-2006-6711 - https://www.exploit-db.com/exploits/2970 +CVE-2006-6715 - https://www.exploit-db.com/exploits/2973 +CVE-2006-6716 - https://www.exploit-db.com/exploits/2945 +CVE-2006-6719 - https://www.exploit-db.com/exploits/2947 +CVE-2006-6720 - https://www.exploit-db.com/exploits/2943 +CVE-2006-6722 - https://www.exploit-db.com/exploits/2938 +CVE-2006-6723 - https://www.exploit-db.com/exploits/3013 +CVE-2006-6724 - https://www.exploit-db.com/exploits/2972 +CVE-2006-6726 - https://www.exploit-db.com/exploits/2976 +CVE-2006-6731 - http://www.redhat.com/support/errata/RHSA-2007-0073.html +CVE-2006-6732 - https://www.exploit-db.com/exploits/2958 +CVE-2006-6736 - http://www.redhat.com/support/errata/RHSA-2007-0073.html +CVE-2006-6736 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9729 +CVE-2006-6737 - http://www.redhat.com/support/errata/RHSA-2007-0073.html +CVE-2006-6738 - https://www.exploit-db.com/exploits/2960 +CVE-2006-6739 - https://www.exploit-db.com/exploits/2955 +CVE-2006-6740 - https://www.exploit-db.com/exploits/2956 +CVE-2006-6742 - http://securityreason.com/securityalert/2074 +CVE-2006-6745 - http://www.redhat.com/support/errata/RHSA-2007-0073.html +CVE-2006-6745 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9621 +CVE-2006-6746 - http://securityreason.com/securityalert/2058 +CVE-2006-6747 - http://securityreason.com/securityalert/2058 +CVE-2006-6754 - http://securityreason.com/securityalert/2073 +CVE-2006-6755 - http://securityreason.com/securityalert/2073 +CVE-2006-6755 - https://www.exploit-db.com/exploits/2975 +CVE-2006-6756 - http://securityreason.com/securityalert/2073 +CVE-2006-6756 - https://www.exploit-db.com/exploits/2975 +CVE-2006-6757 - https://www.exploit-db.com/exploits/2963 +CVE-2006-6758 - https://www.exploit-db.com/exploits/2974 +CVE-2006-6759 - https://www.exploit-db.com/exploits/2966 +CVE-2006-6760 - https://www.exploit-db.com/exploits/2578 +CVE-2006-6764 - https://www.exploit-db.com/exploits/2979 +CVE-2006-6765 - https://www.exploit-db.com/exploits/3000 +CVE-2006-6770 - https://www.exploit-db.com/exploits/3003 +CVE-2006-6771 - https://www.exploit-db.com/exploits/3007 +CVE-2006-6773 - http://securityreason.com/securityalert/2077 +CVE-2006-6774 - https://www.exploit-db.com/exploits/3008 +CVE-2006-6775 - https://www.exploit-db.com/exploits/2985 +CVE-2006-6778 - http://securityreason.com/securityalert/2062 +CVE-2006-6780 - https://www.exploit-db.com/exploits/3002 +CVE-2006-6781 - https://www.exploit-db.com/exploits/3002 +CVE-2006-6783 - http://securityreason.com/securityalert/2071 +CVE-2006-6785 - https://www.exploit-db.com/exploits/2981 +CVE-2006-6786 - https://www.exploit-db.com/exploits/2981 +CVE-2006-6787 - https://www.exploit-db.com/exploits/2998 +CVE-2006-6792 - https://www.exploit-db.com/exploits/2993 +CVE-2006-6795 - https://www.exploit-db.com/exploits/3010 +CVE-2006-6796 - https://www.exploit-db.com/exploits/3005 +CVE-2006-6797 - http://www.kb.cert.org/vuls/id/740636 +CVE-2006-6797 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 +CVE-2006-6799 - https://www.exploit-db.com/exploits/3029 +CVE-2006-6800 - http://securityreason.com/securityalert/2059 +CVE-2006-6800 - https://www.exploit-db.com/exploits/3028 +CVE-2006-6801 - https://www.exploit-db.com/exploits/2984 +CVE-2006-6802 - https://www.exploit-db.com/exploits/2991 +CVE-2006-6803 - https://www.exploit-db.com/exploits/2989 +CVE-2006-6804 - https://www.exploit-db.com/exploits/2992 +CVE-2006-6805 - https://www.exploit-db.com/exploits/2988 +CVE-2006-6806 - https://www.exploit-db.com/exploits/2990 +CVE-2006-6807 - https://www.exploit-db.com/exploits/3001 +CVE-2006-6809 - https://www.exploit-db.com/exploits/3026 +CVE-2006-6811 - http://www.kde.org/info/security/advisory-20070109-1.txt +CVE-2006-6811 - https://www.exploit-db.com/exploits/3023 +CVE-2006-6812 - https://www.exploit-db.com/exploits/3019 +CVE-2006-6813 - https://www.exploit-db.com/exploits/2997 +CVE-2006-6820 - https://www.exploit-db.com/exploits/2995 +CVE-2006-6821 - https://www.exploit-db.com/exploits/2996 +CVE-2006-6822 - https://www.exploit-db.com/exploits/2994 +CVE-2006-6823 - https://www.exploit-db.com/exploits/3025 +CVE-2006-6824 - http://lostmon.blogspot.com/2006/12/php-icalendar-multiple-variable-cross.html +CVE-2006-6827 - https://www.exploit-db.com/exploits/3041 +CVE-2006-6830 - https://www.exploit-db.com/exploits/2983 +CVE-2006-6831 - https://www.exploit-db.com/exploits/3031 +CVE-2006-6837 - http://vuln.sg/isowincmd173-en.html +CVE-2006-6837 - http://vuln.sg/isowincmd173-jp.html +CVE-2006-6838 - http://securityreason.com/securityalert/2089 +CVE-2006-6842 - https://www.exploit-db.com/exploits/3033 +CVE-2006-6846 - https://www.exploit-db.com/exploits/3032 +CVE-2006-6847 - https://www.exploit-db.com/exploits/3030 +CVE-2006-6848 - https://www.exploit-db.com/exploits/3035 +CVE-2006-6849 - https://www.exploit-db.com/exploits/3016 +CVE-2006-6850 - https://www.exploit-db.com/exploits/3009 +CVE-2006-6853 - https://www.exploit-db.com/exploits/3037 +CVE-2006-6853 - https://www.exploit-db.com/exploits/3038 +CVE-2006-6855 - https://www.exploit-db.com/exploits/3034 +CVE-2006-6856 - https://www.exploit-db.com/exploits/3036 +CVE-2006-6859 - https://www.exploit-db.com/exploits/3048 +CVE-2006-6863 - https://www.exploit-db.com/exploits/3051 +CVE-2006-6864 - https://www.exploit-db.com/exploits/3050 +CVE-2006-6865 - https://www.exploit-db.com/exploits/3046 +CVE-2006-6866 - https://www.exploit-db.com/exploits/3039 +CVE-2006-6867 - https://www.exploit-db.com/exploits/3059 +CVE-2006-6869 - https://www.exploit-db.com/exploits/3057 +CVE-2006-6870 - http://www.ubuntu.com/usn/usn-402-1 +CVE-2006-6871 - https://www.exploit-db.com/exploits/3004 +CVE-2006-6872 - https://www.exploit-db.com/exploits/3004 +CVE-2006-6873 - https://www.exploit-db.com/exploits/3004 +CVE-2006-6877 - https://www.exploit-db.com/exploits/2982 +CVE-2006-6878 - https://www.exploit-db.com/exploits/3020 +CVE-2006-6879 - https://www.exploit-db.com/exploits/3017 +CVE-2006-6879 - https://www.exploit-db.com/exploits/3020 +CVE-2006-6880 - https://www.exploit-db.com/exploits/3017 +CVE-2006-6885 - https://www.exploit-db.com/exploits/3042 +CVE-2006-6888 - https://www.exploit-db.com/exploits/3054 +CVE-2006-6889 - https://www.exploit-db.com/exploits/3047 +CVE-2006-6890 - https://www.exploit-db.com/exploits/3044 +CVE-2006-6891 - https://www.exploit-db.com/exploits/3053 +CVE-2006-6910 - https://www.exploit-db.com/exploits/3056 +CVE-2006-6911 - https://www.exploit-db.com/exploits/3089 +CVE-2006-6917 - https://www.exploit-db.com/exploits/3086 +CVE-2006-6923 - http://securityreason.com/securityalert/2144 +CVE-2006-6924 - http://securityreason.com/securityalert/2144 +CVE-2006-6925 - http://securityreason.com/securityalert/2144 +CVE-2006-6927 - http://securityreason.com/securityalert/2143 +CVE-2006-6928 - http://securityreason.com/securityalert/2143 +CVE-2006-6929 - http://securityreason.com/securityalert/2142 +CVE-2006-6930 - http://securityreason.com/securityalert/2142 +CVE-2006-6932 - http://securityreason.com/securityalert/2147 +CVE-2006-6934 - http://securityreason.com/securityalert/2150 +CVE-2006-6935 - http://securityreason.com/securityalert/2150 +CVE-2006-6936 - http://securityreason.com/securityalert/2148 +CVE-2006-6937 - http://securityreason.com/securityalert/2148 +CVE-2006-6938 - https://www.exploit-db.com/exploits/2685 +CVE-2006-6941 - https://www.exploit-db.com/exploits/2704 +CVE-2006-6951 - http://securityreason.com/securityalert/2173 +CVE-2006-6957 - http://securityreason.com/securityalert/2194 +CVE-2006-6958 - http://packetstormsecurity.org/0606-exploits/phpbluedragon-2.txt +CVE-2006-6958 - http://securityreason.com/securityalert/2193 +CVE-2006-6959 - http://www.sentinel.gr/advisories/SGA-0001.txt +CVE-2006-6960 - http://www.sentinel.gr/advisories/SGA-0001.txt +CVE-2006-6961 - http://www.sentinel.gr/advisories/SGA-0001.txt +CVE-2006-6962 - https://www.exploit-db.com/exploits/1959 +CVE-2006-6963 - http://securityreason.com/securityalert/2188 +CVE-2006-6976 - https://www.exploit-db.com/exploits/2555 +CVE-2006-7007 - https://www.exploit-db.com/exploits/1758 +CVE-2006-7012 - http://securityreason.com/securityalert/2257 +CVE-2006-7012 - https://www.exploit-db.com/exploits/1876 +CVE-2006-7014 - http://securityreason.com/securityalert/2255 +CVE-2006-7022 - http://securityreason.com/securityalert/2251 +CVE-2006-7023 - http://securityreason.com/securityalert/2251 +CVE-2006-7024 - https://www.exploit-db.com/exploits/1943 +CVE-2006-7025 - http://marc.info/?l=full-disclosure&m=114555163911635&w=2 +CVE-2006-7025 - http://www.osvdb.org/24795 +CVE-2006-7026 - https://www.exploit-db.com/exploits/1730 +CVE-2006-7031 - https://www.exploit-db.com/exploits/1775 +CVE-2006-7032 - https://www.exploit-db.com/exploits/1921 +CVE-2006-7037 - http://securityreason.com/securityalert/2305 +CVE-2006-7051 - https://www.exploit-db.com/exploits/1657 +CVE-2006-7055 - https://www.exploit-db.com/exploits/1753 +CVE-2006-7059 - http://securityreason.com/securityalert/2300 +CVE-2006-7060 - http://securityreason.com/securityalert/2300 +CVE-2006-7061 - http://securityreason.com/securityalert/2300 +CVE-2006-7063 - https://www.exploit-db.com/exploits/1857 +CVE-2006-7067 - http://securityreason.com/securityalert/2328 +CVE-2006-7068 - https://www.exploit-db.com/exploits/2257 +CVE-2006-7069 - https://www.exploit-db.com/exploits/2336 +CVE-2006-7070 - http://securityreason.com/securityalert/2326 +CVE-2006-7070 - https://www.exploit-db.com/exploits/2072 +CVE-2006-7071 - http://securityreason.com/securityalert/2325 +CVE-2006-7071 - https://www.exploit-db.com/exploits/2010 +CVE-2006-7072 - http://securityreason.com/securityalert/2324 +CVE-2006-7073 - http://sourceforge.net/project/shownotes.php?group_id=66311&release_id=445469 +CVE-2006-7075 - http://aluigi.altervista.org/adv/aquabof-adv.txt +CVE-2006-7076 - http://securityreason.com/securityalert/2323 +CVE-2006-7077 - http://securityreason.com/securityalert/2323 +CVE-2006-7078 - http://securityreason.com/securityalert/2329 +CVE-2006-7079 - https://www.exploit-db.com/exploits/2415 +CVE-2006-7080 - https://www.exploit-db.com/exploits/2415 +CVE-2006-7081 - https://www.exploit-db.com/exploits/2323 +CVE-2006-7082 - http://securityreason.com/securityalert/2322 +CVE-2006-7083 - http://securityreason.com/securityalert/2322 +CVE-2006-7085 - http://securityreason.com/securityalert/2322 +CVE-2006-7090 - http://securityreason.com/securityalert/2327 +CVE-2006-7095 - http://aluigi.altervista.org/adv/dim3bof-adv.txt +CVE-2006-7096 - http://aluigi.altervista.org/adv/dim3bof-adv.txt +CVE-2006-7100 - https://www.exploit-db.com/exploits/2525 +CVE-2006-7101 - https://www.exploit-db.com/exploits/2759 +CVE-2006-7102 - https://www.exploit-db.com/exploits/2563 +CVE-2006-7106 - https://www.exploit-db.com/exploits/2602 +CVE-2006-7107 - https://www.exploit-db.com/exploits/2665 +CVE-2006-7108 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689 +CVE-2006-7112 - https://www.exploit-db.com/exploits/2712 +CVE-2006-7115 - http://securityreason.com/securityalert/2357 +CVE-2006-7116 - https://www.exploit-db.com/exploits/2863 +CVE-2006-7117 - https://www.exploit-db.com/exploits/2863 +CVE-2006-7118 - http://securityreason.com/securityalert/2358 +CVE-2006-7119 - https://www.exploit-db.com/exploits/2732 +CVE-2006-7127 - https://www.exploit-db.com/exploits/2474/ +CVE-2006-7127 - https://www.exploit-db.com/exploits/5317 +CVE-2006-7128 - https://www.exploit-db.com/exploits/2469 +CVE-2006-7130 - https://www.exploit-db.com/exploits/2512 +CVE-2006-7131 - https://www.exploit-db.com/exploits/2558 +CVE-2006-7132 - https://www.exploit-db.com/exploits/2664 +CVE-2006-7136 - https://www.exploit-db.com/exploits/2827 +CVE-2006-7147 - https://www.exploit-db.com/exploits/2531 +CVE-2006-7149 - http://securityreason.com/securityalert/2379 +CVE-2006-7150 - http://securityreason.com/securityalert/2379 +CVE-2006-7151 - http://securityreason.com/securityalert/2378 +CVE-2006-7152 - https://www.exploit-db.com/exploits/2849 +CVE-2006-7153 - http://securityreason.com/securityalert/2371 +CVE-2006-7156 - https://www.exploit-db.com/exploits/2528 +CVE-2006-7157 - http://securityreason.com/securityalert/2375 +CVE-2006-7159 - http://securityreason.com/securityalert/2377 +CVE-2006-7160 - http://securityreason.com/securityalert/2376 +CVE-2006-7161 - http://securityreason.com/securityalert/2374 +CVE-2006-7169 - https://www.exploit-db.com/exploits/2721 +CVE-2006-7172 - https://www.exploit-db.com/exploits/3496 +CVE-2006-7172 - https://www.exploit-db.com/exploits/3497 +CVE-2006-7173 - https://www.exploit-db.com/exploits/3502 +CVE-2006-7183 - https://www.exploit-db.com/exploits/2850 +CVE-2006-7185 - https://www.exploit-db.com/exploits/2766 +CVE-2006-7186 - http://www.bantychick.com/live/?action=forum&board=shootbreeze&op=display&num=19&start=15 +CVE-2006-7192 - http://securityreason.com/securityalert/2530 +CVE-2006-7192 - http://www.cpni.gov.uk/docs/re-20061020-00710.pdf +CVE-2006-7194 - http://marc.info/?l=bugtraq&m=116283849004075&w=2 +CVE-2006-7194 - https://www.exploit-db.com/exploits/2726 +CVE-2006-7195 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2006-7196 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2006-7208 - https://www.exploit-db.com/exploits/1995 +CVE-2006-7210 - https://www.exploit-db.com/exploits/2194 +CVE-2006-7210 - https://www.exploit-db.com/exploits/2204 +CVE-2006-7210 - https://www.exploit-db.com/exploits/2210 +CVE-2006-7228 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2006-7233 - http://www.igniterealtime.org/issues/browse/JM-629 +CVE-2006-7234 - https://bugzilla.redhat.com/show_bug.cgi?id=214205 +CVE-2006-7234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9719 +CVE-2007-0001 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9560 +CVE-2007-0006 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9829 +CVE-2007-0008 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0009 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0015 - http://isc.sans.org/diary.html?storyid=2094 +CVE-2007-0015 - http://www.kb.cert.org/vuls/id/442497 +CVE-2007-0015 - https://www.exploit-db.com/exploits/3064 +CVE-2007-0016 - https://www.exploit-db.com/exploits/4051 +CVE-2007-0018 - http://secunia.com/blog/6/ +CVE-2007-0020 - https://www.exploit-db.com/exploits/3160 +CVE-2007-0025 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-012 +CVE-2007-0026 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-011 +CVE-2007-0027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 +CVE-2007-0028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 +CVE-2007-0029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 +CVE-2007-0030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 +CVE-2007-0031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 +CVE-2007-0033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 +CVE-2007-0034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 +CVE-2007-0035 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 +CVE-2007-0038 - http://securityreason.com/securityalert/2542 +CVE-2007-0038 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2007-0039 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 +CVE-2007-0040 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-039 +CVE-2007-0044 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf +CVE-2007-0044 - http://securityreason.com/securityalert/2090 +CVE-2007-0044 - http://www.wisec.it/vulns.php?page=9 +CVE-2007-0045 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf +CVE-2007-0045 - http://securityreason.com/securityalert/2090 +CVE-2007-0045 - http://www.gnucitizen.org/blog/danger-danger-danger/ +CVE-2007-0045 - http://www.wisec.it/vulns.php?page=9 +CVE-2007-0045 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693 +CVE-2007-0046 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf +CVE-2007-0046 - http://securityreason.com/securityalert/2090 +CVE-2007-0046 - http://www.wisec.it/vulns.php?page=9 +CVE-2007-0046 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9684 +CVE-2007-0047 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf +CVE-2007-0048 - http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf +CVE-2007-0048 - http://securityreason.com/securityalert/2090 +CVE-2007-0048 - http://www.wisec.it/vulns.php?page=9 +CVE-2007-0049 - https://www.exploit-db.com/exploits/3068 +CVE-2007-0051 - https://www.exploit-db.com/exploits/3080 +CVE-2007-0052 - https://www.exploit-db.com/exploits/3061 +CVE-2007-0053 - https://www.exploit-db.com/exploits/3062 +CVE-2007-0055 - https://www.exploit-db.com/exploits/3063 +CVE-2007-0059 - http://www.gnucitizen.org/blog/backdooring-quicktime-movies/ +CVE-2007-0059 - http://www.kb.cert.org/vuls/id/304064 +CVE-2007-0061 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-0061 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-0061 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-0061 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-0061 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-0061 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-0062 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-0062 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-0062 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-0062 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-0062 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-0062 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-0063 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-0063 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-0063 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-0063 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-0063 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-0063 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-0064 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-068 +CVE-2007-0065 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-008 +CVE-2007-0066 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001 +CVE-2007-0069 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001 +CVE-2007-0071 - http://isc.sans.org/diary.html?storyid=4465 +CVE-2007-0075 - http://securityreason.com/securityalert/2100 +CVE-2007-0076 - http://securityreason.com/securityalert/2099 +CVE-2007-0077 - http://securityreason.com/securityalert/2098 +CVE-2007-0078 - http://securityreason.com/securityalert/2097 +CVE-2007-0079 - http://securityreason.com/securityalert/2102 +CVE-2007-0081 - http://securityreason.com/securityalert/2095 +CVE-2007-0082 - https://www.exploit-db.com/exploits/3049 +CVE-2007-0083 - http://securityreason.com/securityalert/2101 +CVE-2007-0088 - http://securityreason.com/securityalert/2103 +CVE-2007-0091 - https://www.exploit-db.com/exploits/3066 +CVE-2007-0092 - https://www.exploit-db.com/exploits/3074 +CVE-2007-0093 - http://securityreason.com/securityalert/2106 +CVE-2007-0093 - https://www.exploit-db.com/exploits/3076 +CVE-2007-0094 - http://securityreason.com/securityalert/2105 +CVE-2007-0095 - http://securityreason.com/securityalert/2104 +CVE-2007-0097 - http://vuln.sg/powarc964-en.html +CVE-2007-0098 - https://www.exploit-db.com/exploits/3075 +CVE-2007-0099 - http://isc.sans.org/diary.php?storyid=2004 +CVE-2007-0099 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 +CVE-2007-0106 - http://securityreason.com/securityalert/2114 +CVE-2007-0107 - http://securityreason.com/securityalert/2112 +CVE-2007-0109 - http://securityreason.com/securityalert/2113 +CVE-2007-0111 - http://blog.trendmicro.com/flaw-in-3rd-party-app-weakens-windows-mobile/ +CVE-2007-0112 - http://securityreason.com/securityalert/2111 +CVE-2007-0113 - http://securityreason.com/securityalert/2110 +CVE-2007-0115 - http://securityreason.com/securityalert/2107 +CVE-2007-0116 - http://securityreason.com/securityalert/2109 +CVE-2007-0120 - https://www.exploit-db.com/exploits/3078 +CVE-2007-0121 - http://securityreason.com/securityalert/2108 +CVE-2007-0122 - http://securityreason.com/securityalert/2123 +CVE-2007-0122 - https://www.exploit-db.com/exploits/3085 +CVE-2007-0123 - http://securityreason.com/securityalert/2116 +CVE-2007-0124 - http://securityreason.com/securityalert/2115 +CVE-2007-0128 - https://www.exploit-db.com/exploits/3081 +CVE-2007-0129 - https://www.exploit-db.com/exploits/3073 +CVE-2007-0130 - https://www.exploit-db.com/exploits/3082 +CVE-2007-0132 - https://www.exploit-db.com/exploits/3083 +CVE-2007-0134 - https://www.exploit-db.com/exploits/3083 +CVE-2007-0135 - http://securityreason.com/exploitalert/1698 +CVE-2007-0135 - https://www.exploit-db.com/exploits/3079 +CVE-2007-0140 - http://securityreason.com/securityalert/2122 +CVE-2007-0141 - http://securityreason.com/securityalert/2121 +CVE-2007-0142 - http://securityreason.com/securityalert/2120 +CVE-2007-0143 - https://www.exploit-db.com/exploits/3090 +CVE-2007-0144 - https://www.exploit-db.com/exploits/3089 +CVE-2007-0146 - http://securityreason.com/securityalert/2119 +CVE-2007-0148 - https://www.exploit-db.com/exploits/3098 +CVE-2007-0149 - http://securityreason.com/securityalert/2118 +CVE-2007-0150 - http://securityreason.com/securityalert/2117 +CVE-2007-0153 - http://securityreason.com/securityalert/2127 +CVE-2007-0154 - http://securityreason.com/securityalert/2126 +CVE-2007-0155 - http://securityreason.com/securityalert/2125 +CVE-2007-0156 - http://securityreason.com/securityalert/2124 +CVE-2007-0160 - http://securityreason.com/securityalert/2129 +CVE-2007-0161 - http://securityreason.com/securityalert/2128 +CVE-2007-0162 - http://landonf.bikemonkey.org/code/macosx/MOAB_Day_8.20070109002959.18582.timor.html +CVE-2007-0167 - http://securityreason.com/securityalert/2134 +CVE-2007-0167 - https://www.exploit-db.com/exploits/3104 +CVE-2007-0170 - https://www.exploit-db.com/exploits/3097 +CVE-2007-0171 - https://www.exploit-db.com/exploits/3096 +CVE-2007-0172 - https://www.exploit-db.com/exploits/3093 +CVE-2007-0173 - https://www.exploit-db.com/exploits/3091 +CVE-2007-0176 - http://securityreason.com/securityalert/2133 +CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES +CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES +CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES +CVE-2007-0177 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES +CVE-2007-0178 - http://securityreason.com/securityalert/2132 +CVE-2007-0179 - http://securityreason.com/securityalert/2131 +CVE-2007-0180 - http://vuln.sg/efcommander575-en.html +CVE-2007-0181 - https://www.exploit-db.com/exploits/3100 +CVE-2007-0182 - http://securityreason.com/securityalert/2136 +CVE-2007-0189 - http://securityreason.com/securityalert/2141 +CVE-2007-0190 - http://securityreason.com/securityalert/2139 +CVE-2007-0191 - http://securityreason.com/securityalert/2138 +CVE-2007-0192 - http://securityreason.com/securityalert/2137 +CVE-2007-0196 - https://www.exploit-db.com/exploits/3105 +CVE-2007-0200 - https://www.exploit-db.com/exploits/3108 +CVE-2007-0202 - http://securityreason.com/securityalert/2135 +CVE-2007-0202 - https://www.exploit-db.com/exploits/3103 +CVE-2007-0205 - http://securityreason.com/securityalert/2135 +CVE-2007-0205 - https://www.exploit-db.com/exploits/3103 +CVE-2007-0206 - http://securityreason.com/securityalert/2140 +CVE-2007-0208 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 +CVE-2007-0209 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 +CVE-2007-0210 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-007 +CVE-2007-0211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-006 +CVE-2007-0213 - http://packetstormsecurity.com/files/153533/Microsoft-Exchange-2003-base64-MIME-Remote-Code-Execution.html +CVE-2007-0213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 +CVE-2007-0215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 +CVE-2007-0216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 +CVE-2007-0217 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 +CVE-2007-0218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 +CVE-2007-0219 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 +CVE-2007-0220 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 +CVE-2007-0221 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-026 +CVE-2007-0224 - https://www.exploit-db.com/exploits/3115 +CVE-2007-0225 - https://www.exploit-db.com/exploits/3115 +CVE-2007-0226 - https://www.exploit-db.com/exploits/3106 +CVE-2007-0229 - http://applefun.blogspot.com/2007/01/moab-10-01-2007-apple-dmg-ufs.html +CVE-2007-0232 - http://securityreason.com/securityalert/2146 +CVE-2007-0232 - https://www.exploit-db.com/exploits/3113 +CVE-2007-0233 - https://www.exploit-db.com/exploits/3109 +CVE-2007-0236 - https://www.exploit-db.com/exploits/3130 +CVE-2007-0243 - http://securityreason.com/securityalert/2158 +CVE-2007-0245 - http://www.redhat.com/support/errata/RHSA-2007-0406.html +CVE-2007-0249 - http://securityreason.com/securityalert/2149 +CVE-2007-0250 - http://securityreason.com/securityalert/2149 +CVE-2007-0251 - http://securityreason.com/securityalert/2165 +CVE-2007-0260 - http://securityreason.com/securityalert/2145 +CVE-2007-0261 - https://www.exploit-db.com/exploits/3116 +CVE-2007-0298 - http://securityreason.com/securityalert/2152 +CVE-2007-0298 - https://www.exploit-db.com/exploits/3117 +CVE-2007-0300 - https://www.exploit-db.com/exploits/3118 +CVE-2007-0301 - https://www.exploit-db.com/exploits/3123 +CVE-2007-0302 - http://securityreason.com/securityalert/2164 +CVE-2007-0304 - https://www.exploit-db.com/exploits/3120 +CVE-2007-0305 - http://securityreason.com/securityalert/2151 +CVE-2007-0305 - https://www.exploit-db.com/exploits/3135 +CVE-2007-0306 - https://www.exploit-db.com/exploits/3122 +CVE-2007-0307 - https://www.exploit-db.com/exploits/3121 +CVE-2007-0309 - http://securityreason.com/securityalert/2153 +CVE-2007-0310 - http://securityreason.com/securityalert/2162 +CVE-2007-0311 - https://www.exploit-db.com/exploits/3126 +CVE-2007-0312 - http://securityreason.com/securityalert/2157 +CVE-2007-0314 - https://www.exploit-db.com/exploits/3114 +CVE-2007-0316 - http://securityreason.com/securityalert/2166 +CVE-2007-0319 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-0323 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-0329 - https://www.exploit-db.com/exploits/3125 +CVE-2007-0330 - http://securityreason.com/securityalert/2160 +CVE-2007-0333 - http://securityreason.com/securityalert/2163 +CVE-2007-0335 - http://securityreason.com/securityalert/2161 +CVE-2007-0337 - https://www.exploit-db.com/exploits/3134 +CVE-2007-0338 - https://www.exploit-db.com/exploits/3128 +CVE-2007-0339 - http://securityreason.com/securityalert/2154 +CVE-2007-0340 - https://www.exploit-db.com/exploits/3124 +CVE-2007-0344 - https://www.exploit-db.com/exploits/3139 +CVE-2007-0345 - https://www.exploit-db.com/exploits/3136 +CVE-2007-0347 - http://securityreason.com/securityalert/2192 +CVE-2007-0352 - http://securityreason.com/securityalert/2156 +CVE-2007-0352 - https://www.exploit-db.com/exploits/3149 +CVE-2007-0353 - http://securityreason.com/securityalert/2155 +CVE-2007-0354 - https://www.exploit-db.com/exploits/3141 +CVE-2007-0355 - https://www.exploit-db.com/exploits/3151 +CVE-2007-0356 - https://www.exploit-db.com/exploits/3142 +CVE-2007-0357 - http://securityreason.com/securityalert/2159 +CVE-2007-0359 - https://www.exploit-db.com/exploits/3147 +CVE-2007-0360 - https://www.exploit-db.com/exploits/3150 +CVE-2007-0361 - https://www.exploit-db.com/exploits/3145 +CVE-2007-0364 - http://www.osvdb.org/32850 +CVE-2007-0364 - http://www.osvdb.org/32851 +CVE-2007-0368 - https://www.exploit-db.com/exploits/3154 +CVE-2007-0369 - https://www.exploit-db.com/exploits/3153 +CVE-2007-0370 - https://www.exploit-db.com/exploits/3153 +CVE-2007-0371 - https://www.exploit-db.com/exploits/3155 +CVE-2007-0388 - https://www.exploit-db.com/exploits/3143 +CVE-2007-0388 - https://www.exploit-db.com/exploits/3144 +CVE-2007-0390 - http://securityreason.com/securityalert/2170 +CVE-2007-0395 - https://www.exploit-db.com/exploits/3152 +CVE-2007-0399 - http://securityreason.com/securityalert/2169 +CVE-2007-0400 - http://securityreason.com/securityalert/2167 +CVE-2007-0401 - http://securityreason.com/securityalert/2167 +CVE-2007-0402 - http://securityreason.com/securityalert/2168 +CVE-2007-0403 - http://securityreason.com/securityalert/2168 +CVE-2007-0410 - http://dev2dev.bea.com/pub/advisory/204 +CVE-2007-0427 - http://securityreason.com/securityalert/2177 +CVE-2007-0428 - http://securityreason.com/securityalert/2171 +CVE-2007-0429 - https://www.exploit-db.com/exploits/3157 +CVE-2007-0430 - http://securityreason.com/securityalert/2178 +CVE-2007-0448 - http://securityreason.com/securityalert/2175 +CVE-2007-0450 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-0450 - http://securityreason.com/securityalert/2446 +CVE-2007-0452 - http://securityreason.com/securityalert/2219 +CVE-2007-0452 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758 +CVE-2007-0455 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2007-0464 - https://www.exploit-db.com/exploits/3200 +CVE-2007-0468 - http://securityreason.com/securityalert/2172 +CVE-2007-0471 - http://securityreason.com/securityalert/2179 +CVE-2007-0481 - http://www.kb.cert.org/vuls/id/274760 +CVE-2007-0485 - https://www.exploit-db.com/exploits/3169 +CVE-2007-0486 - http://securityreason.com/securityalert/2174 +CVE-2007-0488 - http://securityreason.com/securityalert/2176 +CVE-2007-0489 - https://www.exploit-db.com/exploits/3175 +CVE-2007-0493 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614 +CVE-2007-0495 - https://www.exploit-db.com/exploits/3161 +CVE-2007-0496 - https://www.exploit-db.com/exploits/3163 +CVE-2007-0497 - http://echo.or.id/adv/adv62-y3dips-2007.txt +CVE-2007-0498 - https://www.exploit-db.com/exploits/3165 +CVE-2007-0499 - https://www.exploit-db.com/exploits/3164 +CVE-2007-0500 - https://www.exploit-db.com/exploits/3162 +CVE-2007-0501 - https://www.exploit-db.com/exploits/3171 +CVE-2007-0502 - https://www.exploit-db.com/exploits/3172 +CVE-2007-0504 - https://www.exploit-db.com/exploits/3180 +CVE-2007-0508 - https://www.exploit-db.com/exploits/3183 +CVE-2007-0511 - https://www.exploit-db.com/exploits/3184 +CVE-2007-0515 - http://isc.sans.org/diary.html?storyid=2133 +CVE-2007-0515 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-014 +CVE-2007-0517 - http://securityreason.com/securityalert/2184 +CVE-2007-0518 - http://securityreason.com/securityalert/2183 +CVE-2007-0519 - http://securityreason.com/securityalert/2182 +CVE-2007-0520 - http://securityreason.com/securityalert/2181 +CVE-2007-0521 - http://securityreason.com/securityalert/2180 +CVE-2007-0522 - http://securityreason.com/securityalert/2180 +CVE-2007-0523 - http://securityreason.com/securityalert/2180 +CVE-2007-0524 - http://securityreason.com/securityalert/2180 +CVE-2007-0526 - http://securityreason.com/securityalert/2186 +CVE-2007-0527 - http://securityreason.com/securityalert/2185 +CVE-2007-0528 - https://www.exploit-db.com/exploits/3189 +CVE-2007-0532 - http://securityreason.com/securityalert/2187 +CVE-2007-0538 - http://securityreason.com/securityalert/2211 +CVE-2007-0539 - http://securityreason.com/securityalert/2191 +CVE-2007-0540 - http://securityreason.com/securityalert/2191 +CVE-2007-0541 - http://securityreason.com/securityalert/2191 +CVE-2007-0542 - http://securityreason.com/securityalert/2190 +CVE-2007-0543 - http://securityreason.com/securityalert/2189 +CVE-2007-0545 - http://securityreason.com/securityalert/2214 +CVE-2007-0546 - http://securityreason.com/securityalert/2213 +CVE-2007-0548 - https://www.exploit-db.com/exploits/3182 +CVE-2007-0549 - http://securityreason.com/securityalert/2212 +CVE-2007-0550 - http://securityreason.com/securityalert/2212 +CVE-2007-0551 - http://securityreason.com/securityalert/2195 +CVE-2007-0554 - https://www.exploit-db.com/exploits/3195 +CVE-2007-0555 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739 +CVE-2007-0558 - https://www.exploit-db.com/exploits/3191 +CVE-2007-0559 - https://www.exploit-db.com/exploits/3185 +CVE-2007-0560 - https://www.exploit-db.com/exploits/3186 +CVE-2007-0561 - https://www.exploit-db.com/exploits/3192 +CVE-2007-0562 - https://www.exploit-db.com/exploits/3190 +CVE-2007-0566 - https://www.exploit-db.com/exploits/3187 +CVE-2007-0568 - https://www.exploit-db.com/exploits/3201 +CVE-2007-0569 - https://www.exploit-db.com/exploits/3216 +CVE-2007-0570 - https://www.exploit-db.com/exploits/3202 +CVE-2007-0571 - https://www.exploit-db.com/exploits/3212 +CVE-2007-0572 - https://www.exploit-db.com/exploits/3207 +CVE-2007-0573 - https://www.exploit-db.com/exploits/3205 +CVE-2007-0576 - https://www.exploit-db.com/exploits/3209 +CVE-2007-0577 - https://www.exploit-db.com/exploits/3206 +CVE-2007-0578 - http://www.mpg123.de/cgi-bin/news.cgi +CVE-2007-0580 - https://www.exploit-db.com/exploits/3215 +CVE-2007-0581 - https://www.exploit-db.com/exploits/3214 +CVE-2007-0582 - https://www.exploit-db.com/exploits/3210 +CVE-2007-0584 - https://www.exploit-db.com/exploits/3217 +CVE-2007-0585 - https://www.exploit-db.com/exploits/3222 +CVE-2007-0588 - http://security-protocols.com/sp-x43-advisory.php +CVE-2007-0589 - https://www.exploit-db.com/exploits/3197 +CVE-2007-0590 - https://www.exploit-db.com/exploits/3197 +CVE-2007-0591 - https://www.exploit-db.com/exploits/3198 +CVE-2007-0592 - http://securityreason.com/securityalert/2196 +CVE-2007-0593 - http://securityreason.com/securityalert/2205 +CVE-2007-0594 - http://securityreason.com/securityalert/2206 +CVE-2007-0596 - http://www.securityfocus.com/archive/1/458076/100/0/threaded +CVE-2007-0597 - http://www.securityfocus.com/archive/1/458076/100/0/threaded +CVE-2007-0598 - http://www.securityfocus.com/archive/1/458076/100/0/threaded +CVE-2007-0599 - http://www.securityfocus.com/archive/1/458076/100/0/threaded +CVE-2007-0600 - https://www.exploit-db.com/exploits/3194 +CVE-2007-0601 - http://www.securityfocus.com/archive/1/458076/100/0/threaded +CVE-2007-0605 - http://securityreason.com/securityalert/2663 +CVE-2007-0608 - http://securityreason.com/securityalert/2661 +CVE-2007-0609 - http://securityreason.com/securityalert/2662 +CVE-2007-0612 - http://securityreason.com/securityalert/2199 +CVE-2007-0617 - http://securityreason.com/securityalert/2210 +CVE-2007-0620 - http://securityreason.com/securityalert/2197 +CVE-2007-0623 - http://securityreason.com/securityalert/2198 +CVE-2007-0624 - http://securityreason.com/securityalert/2198 +CVE-2007-0631 - https://www.exploit-db.com/exploits/3227 +CVE-2007-0633 - https://www.exploit-db.com/exploits/3228 +CVE-2007-0637 - https://www.exploit-db.com/exploits/3225 +CVE-2007-0638 - https://www.exploit-db.com/exploits/3226 +CVE-2007-0639 - https://www.exploit-db.com/exploits/3221 +CVE-2007-0643 - https://www.exploit-db.com/exploits/3229 +CVE-2007-0656 - https://www.exploit-db.com/exploits/3231 +CVE-2007-0662 - https://www.exploit-db.com/exploits/3236 +CVE-2007-0664 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html +CVE-2007-0664 - http://seclists.org/fulldisclosure/2023/Nov/13 +CVE-2007-0667 - http://securityreason.com/securityalert/2217 +CVE-2007-0671 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 +CVE-2007-0673 - http://securityreason.com/securityalert/2218 +CVE-2007-0674 - http://blog.trendmicro.com/trend-micro-finds-more-windows-mobile-flaws/ +CVE-2007-0676 - https://www.exploit-db.com/exploits/3234 +CVE-2007-0677 - http://echo.or.id/adv/adv63-y3dips-2007.txt +CVE-2007-0677 - http://securityreason.com/securityalert/2215 +CVE-2007-0677 - https://www.exploit-db.com/exploits/3237 +CVE-2007-0678 - https://www.exploit-db.com/exploits/3233 +CVE-2007-0679 - https://www.exploit-db.com/exploits/3238 +CVE-2007-0680 - https://www.exploit-db.com/exploits/3235 +CVE-2007-0681 - https://www.exploit-db.com/exploits/3239 +CVE-2007-0682 - https://www.exploit-db.com/exploits/3240 +CVE-2007-0683 - http://marc.info/?l=bugtraq&m=117036933022782&w=2 +CVE-2007-0683 - https://www.exploit-db.com/exploits/3242 +CVE-2007-0684 - https://www.exploit-db.com/exploits/3243 +CVE-2007-0685 - http://blog.trendmicro.com/trend-micro-finds-more-windows-mobile-flaws/ +CVE-2007-0686 - https://www.exploit-db.com/exploits/3224 +CVE-2007-0687 - https://www.exploit-db.com/exploits/3232 +CVE-2007-0688 - https://www.exploit-db.com/exploits/3241 +CVE-2007-0690 - http://securityreason.com/securityalert/2744 +CVE-2007-0692 - http://securityreason.com/securityalert/2741 +CVE-2007-0693 - http://securityreason.com/securityalert/2740 +CVE-2007-0694 - http://securityreason.com/securityalert/2739 +CVE-2007-0697 - https://www.exploit-db.com/exploits/3208 +CVE-2007-0699 - http://securityreason.com/securityalert/2223 +CVE-2007-0700 - http://www.attrition.org/pipermail/vim/2007-February/001280.html +CVE-2007-0700 - https://www.exploit-db.com/exploits/5182 +CVE-2007-0701 - https://www.exploit-db.com/exploits/3247 +CVE-2007-0702 - http://www.attrition.org/pipermail/vim/2007-February/001264.html +CVE-2007-0702 - https://www.exploit-db.com/exploits/3246 +CVE-2007-0703 - https://www.exploit-db.com/exploits/3249 +CVE-2007-0704 - https://www.exploit-db.com/exploits/2329 +CVE-2007-0713 - http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt +CVE-2007-0754 - http://securityreason.com/securityalert/2703 +CVE-2007-0756 - http://securityreason.com/securityalert/2220 +CVE-2007-0756 - https://www.exploit-db.com/exploits/3257 +CVE-2007-0757 - https://www.exploit-db.com/exploits/3251 +CVE-2007-0760 - https://www.exploit-db.com/exploits/3252 +CVE-2007-0761 - https://www.exploit-db.com/exploits/3258 +CVE-2007-0762 - https://www.exploit-db.com/exploits/3259 +CVE-2007-0763 - https://www.exploit-db.com/exploits/3255 +CVE-2007-0764 - https://www.exploit-db.com/exploits/3255 +CVE-2007-0765 - https://www.exploit-db.com/exploits/3256 +CVE-2007-0766 - https://www.exploit-db.com/exploits/3254 +CVE-2007-0771 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9447 +CVE-2007-0775 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0777 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0778 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0778 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9151 +CVE-2007-0779 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0779 - https://bugzilla.mozilla.org/show_bug.cgi?id=361298 +CVE-2007-0780 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0780 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9884 +CVE-2007-0784 - http://securityreason.com/securityalert/2225 +CVE-2007-0785 - https://www.exploit-db.com/exploits/3266 +CVE-2007-0786 - https://www.exploit-db.com/exploits/3261 +CVE-2007-0788 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES +CVE-2007-0790 - https://www.exploit-db.com/exploits/3277 +CVE-2007-0791 - http://securityreason.com/securityalert/2222 +CVE-2007-0792 - http://securityreason.com/securityalert/2222 +CVE-2007-0793 - http://securityreason.com/securityalert/2221 +CVE-2007-0795 - http://securityreason.com/securityalert/2216 +CVE-2007-0797 - https://www.exploit-db.com/exploits/3268 +CVE-2007-0800 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0804 - https://www.exploit-db.com/exploits/3271 +CVE-2007-0806 - http://securityreason.com/securityalert/2226 +CVE-2007-0807 - http://securityreason.com/securityalert/2228 +CVE-2007-0809 - https://www.exploit-db.com/exploits/3270 +CVE-2007-0810 - https://www.exploit-db.com/exploits/3267 +CVE-2007-0811 - https://www.exploit-db.com/exploits/3272 +CVE-2007-0812 - https://www.exploit-db.com/exploits/3262 +CVE-2007-0815 - http://securityreason.com/securityalert/2227 +CVE-2007-0816 - https://www.exploit-db.com/exploits/3248 +CVE-2007-0824 - https://www.exploit-db.com/exploits/3275 +CVE-2007-0825 - https://www.exploit-db.com/exploits/3276 +CVE-2007-0826 - https://www.exploit-db.com/exploits/3278 +CVE-2007-0827 - https://www.exploit-db.com/exploits/3279 +CVE-2007-0828 - http://securityreason.com/securityalert/2229 +CVE-2007-0837 - https://www.exploit-db.com/exploits/3280 +CVE-2007-0839 - https://www.exploit-db.com/exploits/3281 +CVE-2007-0843 - http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html +CVE-2007-0845 - https://www.exploit-db.com/exploits/3282 +CVE-2007-0846 - https://www.exploit-db.com/exploits/3283 +CVE-2007-0847 - https://www.exploit-db.com/exploits/3283 +CVE-2007-0848 - https://www.exploit-db.com/exploits/3284 +CVE-2007-0854 - http://changelog.cpanel.net/index.cgi +CVE-2007-0859 - http://securityreason.com/securityalert/2260 +CVE-2007-0859 - http://www.securityfocus.com/archive/1/460908/100/0/threaded +CVE-2007-0864 - https://www.exploit-db.com/exploits/3288 +CVE-2007-0865 - https://www.exploit-db.com/exploits/3287 +CVE-2007-0867 - https://www.exploit-db.com/exploits/3285 +CVE-2007-0870 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 +CVE-2007-0873 - https://www.exploit-db.com/exploits/3305 +CVE-2007-0881 - http://echo.or.id/adv/adv64-y3dips-2007.txt +CVE-2007-0881 - https://www.exploit-db.com/exploits/3292 +CVE-2007-0882 - http://isc.sans.org/diary.html?storyid=2220 +CVE-2007-0882 - http://www.securityfocus.com/bid/22512 +CVE-2007-0883 - https://www.exploit-db.com/exploits/3294 +CVE-2007-0886 - http://marc.info/?l=full-disclosure&m=117094708423302&w=2 +CVE-2007-0886 - https://www.exploit-db.com/exploits/3289 +CVE-2007-0887 - http://marc.info/?l=full-disclosure&m=117094708423302&w=2 +CVE-2007-0887 - https://www.exploit-db.com/exploits/3290 +CVE-2007-0890 - http://changelog.cpanel.net/index.cgi +CVE-2007-0904 - https://www.exploit-db.com/exploits/3286 +CVE-2007-0906 - http://www.redhat.com/support/errata/RHSA-2007-0088.html +CVE-2007-0907 - http://www.redhat.com/support/errata/RHSA-2007-0088.html +CVE-2007-0908 - http://securityreason.com/securityalert/2321 +CVE-2007-0908 - http://www.redhat.com/support/errata/RHSA-2007-0088.html +CVE-2007-0909 - http://www.redhat.com/support/errata/RHSA-2007-0088.html +CVE-2007-0909 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9722 +CVE-2007-0910 - http://www.redhat.com/support/errata/RHSA-2007-0088.html +CVE-2007-0910 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9514 +CVE-2007-0920 - https://www.exploit-db.com/exploits/3295 +CVE-2007-0927 - https://www.exploit-db.com/exploits/3296 +CVE-2007-0933 - http://www.blackhat.com/presentations/bh-europe-07/Butti/Presentation/bh-eu-07-Butti.pdf +CVE-2007-0934 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030 +CVE-2007-0936 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030 +CVE-2007-0938 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-018 +CVE-2007-0939 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-018 +CVE-2007-0940 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-028 +CVE-2007-0942 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-0943 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-0944 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-0945 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-0946 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-0947 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-0949 - https://www.exploit-db.com/exploits/5032 +CVE-2007-0949 - https://www.exploit-db.com/exploits/5077 +CVE-2007-0955 - http://securityreason.com/securityalert/2249 +CVE-2007-0958 - http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt +CVE-2007-0969 - http://securityreason.com/securityalert/2261 +CVE-2007-0970 - http://securityreason.com/securityalert/2261 +CVE-2007-0971 - https://www.exploit-db.com/exploits/3310 +CVE-2007-0972 - https://www.exploit-db.com/exploits/3311 +CVE-2007-0976 - https://www.exploit-db.com/exploits/3307 +CVE-2007-0976 - https://www.exploit-db.com/exploits/3610 +CVE-2007-0977 - https://www.exploit-db.com/exploits/3302 +CVE-2007-0981 - http://securityreason.com/securityalert/2262 +CVE-2007-0981 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0981 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9730 +CVE-2007-0983 - https://www.exploit-db.com/exploits/3297 +CVE-2007-0984 - https://www.exploit-db.com/exploits/3301 +CVE-2007-0985 - https://www.exploit-db.com/exploits/3299 +CVE-2007-0986 - https://www.exploit-db.com/exploits/3309 +CVE-2007-0987 - https://www.exploit-db.com/exploits/3309 +CVE-2007-0988 - http://securityreason.com/securityalert/2315 +CVE-2007-0988 - http://www.redhat.com/support/errata/RHSA-2007-0088.html +CVE-2007-0994 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 +CVE-2007-0995 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-0996 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-1000 - http://bugzilla.kernel.org/show_bug.cgi?id=8134 +CVE-2007-1001 - http://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.html +CVE-2007-1003 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798 +CVE-2007-1004 - http://securityreason.com/securityalert/2264 +CVE-2007-1008 - http://securityreason.com/securityalert/2278 +CVE-2007-1009 - http://securityreason.com/securityalert/2596 +CVE-2007-1010 - https://www.exploit-db.com/exploits/3314 +CVE-2007-1011 - https://www.exploit-db.com/exploits/3328 +CVE-2007-1012 - http://securityreason.com/securityalert/2267 +CVE-2007-1013 - https://www.exploit-db.com/exploits/3324 +CVE-2007-1014 - https://www.exploit-db.com/exploits/3331 +CVE-2007-1015 - https://www.exploit-db.com/exploits/3318 +CVE-2007-1017 - https://www.exploit-db.com/exploits/3322 +CVE-2007-1019 - https://www.exploit-db.com/exploits/3325 +CVE-2007-1020 - http://securityreason.com/securityalert/2265 +CVE-2007-1021 - https://www.exploit-db.com/exploits/3317 +CVE-2007-1023 - https://www.exploit-db.com/exploits/3321 +CVE-2007-1024 - http://securityreason.com/securityalert/2266 +CVE-2007-1025 - https://www.exploit-db.com/exploits/3323 +CVE-2007-1026 - https://www.exploit-db.com/exploits/3327 +CVE-2007-1029 - http://securityreason.com/securityalert/2277 +CVE-2007-1030 - http://securityreason.com/securityalert/2268 +CVE-2007-1031 - https://www.exploit-db.com/exploits/3326 +CVE-2007-1034 - https://www.exploit-db.com/exploits/3334 +CVE-2007-1040 - https://www.exploit-db.com/exploits/3332 +CVE-2007-1041 - https://www.exploit-db.com/exploits/3342 +CVE-2007-1043 - http://securityreason.com/securityalert/2275 +CVE-2007-1044 - http://securityreason.com/securityalert/2276 +CVE-2007-1045 - http://securityreason.com/securityalert/2272 +CVE-2007-1046 - http://securityreason.com/securityalert/2271 +CVE-2007-1046 - http://www.securityfocus.com/archive/1/460306/100/0/threaded +CVE-2007-1047 - http://www.rhyolite.com/anti-spam/dcc/CHANGES +CVE-2007-1050 - http://securityreason.com/securityalert/2270 +CVE-2007-1051 - http://securityreason.com/securityalert/2279 +CVE-2007-1052 - http://securityreason.com/securityalert/2269 +CVE-2007-1053 - http://securityreason.com/securityalert/2273 +CVE-2007-1054 - http://attrition.org/pipermail/vim/2007-February/001367.html +CVE-2007-1054 - http://securityreason.com/securityalert/2274 +CVE-2007-1054 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES +CVE-2007-1055 - http://securityreason.com/securityalert/2274 +CVE-2007-1055 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES +CVE-2007-1057 - https://www.exploit-db.com/exploits/3356 +CVE-2007-1058 - https://www.exploit-db.com/exploits/3339 +CVE-2007-1059 - https://www.exploit-db.com/exploits/3336 +CVE-2007-1060 - https://www.exploit-db.com/exploits/3348 +CVE-2007-1061 - https://www.exploit-db.com/exploits/3346 +CVE-2007-1069 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 +CVE-2007-1073 - http://securityreason.com/securityalert/2283 +CVE-2007-1074 - https://www.exploit-db.com/exploits/3349 +CVE-2007-1075 - https://www.exploit-db.com/exploits/3341 +CVE-2007-1076 - http://attrition.org/pipermail/vim/2007-February/001377.html +CVE-2007-1078 - https://www.exploit-db.com/exploits/3360 +CVE-2007-1079 - https://www.exploit-db.com/exploits/3343 +CVE-2007-1080 - https://www.exploit-db.com/exploits/3341 +CVE-2007-1082 - https://www.exploit-db.com/exploits/3347 +CVE-2007-1084 - http://www.heise-security.co.uk/news/85728 +CVE-2007-1091 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-1091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 +CVE-2007-1095 - https://bugzilla.mozilla.org/show_bug.cgi?id=371360 +CVE-2007-1104 - https://www.exploit-db.com/exploits/3374 +CVE-2007-1105 - https://www.exploit-db.com/exploits/3370 +CVE-2007-1106 - https://www.exploit-db.com/exploits/3373 +CVE-2007-1107 - https://www.exploit-db.com/exploits/3371 +CVE-2007-1107 - https://www.exploit-db.com/exploits/4950 +CVE-2007-1107 - https://www.exploit-db.com/exploits/4961 +CVE-2007-1108 - https://www.exploit-db.com/exploits/3372 +CVE-2007-1116 - https://bugzilla.mozilla.org/show_bug.cgi?id=371375 +CVE-2007-1118 - https://www.exploit-db.com/exploits/3361 +CVE-2007-1130 - https://www.exploit-db.com/exploits/3366 +CVE-2007-1131 - https://www.exploit-db.com/exploits/3367 +CVE-2007-1133 - https://www.exploit-db.com/exploits/3365 +CVE-2007-1152 - https://www.exploit-db.com/exploits/8095 +CVE-2007-1156 - http://securityreason.com/securityalert/2370 +CVE-2007-1158 - http://marc.info/?l=full-disclosure&m=117251821622820&w=2 +CVE-2007-1158 - http://securityreason.com/securityalert/2336 +CVE-2007-1162 - https://www.exploit-db.com/exploits/3350 +CVE-2007-1163 - https://www.exploit-db.com/exploits/3351 +CVE-2007-1164 - https://www.exploit-db.com/exploits/3353 +CVE-2007-1165 - https://www.exploit-db.com/exploits/3354 +CVE-2007-1166 - http://attrition.org/pipermail/vim/2007-February/001379.html +CVE-2007-1166 - http://securityreason.com/securityalert/2372 +CVE-2007-1166 - https://www.exploit-db.com/exploits/3355 +CVE-2007-1167 - https://www.exploit-db.com/exploits/3357 +CVE-2007-1171 - http://www.waraxe.us/advisory-53.html +CVE-2007-1171 - https://www.exploit-db.com/exploits/3337 +CVE-2007-1172 - https://www.exploit-db.com/exploits/3338 +CVE-2007-1189 - https://www.exploit-db.com/exploits/3383 +CVE-2007-1195 - https://www.exploit-db.com/exploits/3385 +CVE-2007-1201 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-017 +CVE-2007-1202 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 +CVE-2007-1203 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 +CVE-2007-1204 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-019 +CVE-2007-1205 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-020 +CVE-2007-1206 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-022 +CVE-2007-1209 - http://securityreason.com/securityalert/2531 +CVE-2007-1209 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021 +CVE-2007-1211 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2007-1212 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2007-1213 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2007-1214 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-023 +CVE-2007-1215 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 +CVE-2007-1218 - https://bugs.gentoo.org/show_bug.cgi?id=168916 +CVE-2007-1218 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9520 +CVE-2007-1219 - https://www.exploit-db.com/exploits/3382 +CVE-2007-1220 - http://securityreason.com/securityalert/2367 +CVE-2007-1221 - http://securityreason.com/securityalert/2367 +CVE-2007-1224 - https://www.exploit-db.com/exploits/3381 +CVE-2007-1225 - https://www.exploit-db.com/exploits/3381 +CVE-2007-1226 - http://securityreason.com/securityalert/2342 +CVE-2007-1227 - http://securityreason.com/securityalert/2342 +CVE-2007-1233 - https://www.exploit-db.com/exploits/3379 +CVE-2007-1234 - http://securityreason.com/securityalert/2373 +CVE-2007-1235 - http://securityreason.com/securityalert/2373 +CVE-2007-1236 - http://securityreason.com/securityalert/2373 +CVE-2007-1237 - http://securityreason.com/securityalert/2373 +CVE-2007-1248 - http://securityreason.com/securityalert/2343 +CVE-2007-1250 - https://www.exploit-db.com/exploits/3390 +CVE-2007-1251 - http://aluigi.altervista.org/adv/netrekfs-adv.txt +CVE-2007-1254 - https://www.exploit-db.com/exploits/3352 +CVE-2007-1255 - https://www.exploit-db.com/exploits/3352 +CVE-2007-1260 - https://www.exploit-db.com/exploits/3395 +CVE-2007-1263 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1264 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1265 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1266 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1267 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1268 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1269 - http://www.coresecurity.com/?action=item&id=1687 +CVE-2007-1270 - http://securityreason.com/securityalert/2524 +CVE-2007-1271 - http://securityreason.com/securityalert/2524 +CVE-2007-1282 - http://www.redhat.com/support/errata/RHSA-2007-0108.html +CVE-2007-1289 - http://securityreason.com/securityalert/2356 +CVE-2007-1291 - http://securityreason.com/securityalert/2356 +CVE-2007-1292 - http://www.vbulletin.com/forum/showthread.php?postid=1314422 +CVE-2007-1292 - https://www.exploit-db.com/exploits/3387 +CVE-2007-1293 - https://www.exploit-db.com/exploits/3403 +CVE-2007-1294 - https://www.exploit-db.com/exploits/3392 +CVE-2007-1295 - https://www.exploit-db.com/exploits/3411 +CVE-2007-1296 - https://www.exploit-db.com/exploits/3410 +CVE-2007-1297 - https://www.exploit-db.com/exploits/3409 +CVE-2007-1297 - https://www.exploit-db.com/exploits/5593 +CVE-2007-1298 - https://www.exploit-db.com/exploits/3408 +CVE-2007-1299 - https://www.exploit-db.com/exploits/3398 +CVE-2007-1301 - https://www.exploit-db.com/exploits/3397 +CVE-2007-1302 - http://securityreason.com/securityalert/2348 +CVE-2007-1304 - http://securityreason.com/securityalert/2350 +CVE-2007-1305 - http://securityreason.com/securityalert/2350 +CVE-2007-1308 - http://securityreason.com/securityalert/2345 +CVE-2007-1321 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9302 +CVE-2007-1330 - http://securityreason.com/securityalert/2388 +CVE-2007-1331 - http://securityreason.com/securityalert/2385 +CVE-2007-1331 - http://www.scip.ch/publikationen/advisories/scip_advisory-2893_eportfolio_%201.0_java_multiple_vulnerabilities.txt +CVE-2007-1332 - http://securityreason.com/securityalert/2385 +CVE-2007-1332 - http://www.scip.ch/publikationen/advisories/scip_advisory-2893_eportfolio_%201.0_java_multiple_vulnerabilities.txt +CVE-2007-1337 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 +CVE-2007-1339 - https://www.exploit-db.com/exploits/3416 +CVE-2007-1340 - https://www.exploit-db.com/exploits/3406 +CVE-2007-1342 - http://securityreason.com/securityalert/2396 +CVE-2007-1347 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html +CVE-2007-1347 - https://www.exploit-db.com/exploits/3419 +CVE-2007-1350 - http://securityreason.com/securityalert/2395 +CVE-2007-1355 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-1355 - http://securityreason.com/securityalert/2722 +CVE-2007-1357 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2007-1358 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-1371 - http://securityreason.com/securityalert/2399 +CVE-2007-1371 - http://www.radscan.com/conquest/cq-ml/msg00169.html +CVE-2007-1372 - https://www.exploit-db.com/exploits/3423 +CVE-2007-1373 - http://securityreason.com/securityalert/2398 +CVE-2007-1375 - https://www.exploit-db.com/exploits/3424 +CVE-2007-1376 - https://www.exploit-db.com/exploits/3426 +CVE-2007-1376 - https://www.exploit-db.com/exploits/3427 +CVE-2007-1380 - https://www.exploit-db.com/exploits/3413 +CVE-2007-1382 - https://www.exploit-db.com/exploits/3429 +CVE-2007-1391 - https://www.exploit-db.com/exploits/3436 +CVE-2007-1392 - https://www.exploit-db.com/exploits/3435 +CVE-2007-1393 - https://www.exploit-db.com/exploits/3438 +CVE-2007-1394 - https://www.exploit-db.com/exploits/3428 +CVE-2007-1395 - http://securityreason.com/securityalert/2402 +CVE-2007-1397 - http://securityreason.com/securityalert/8216 +CVE-2007-1398 - https://www.exploit-db.com/exploits/3434 +CVE-2007-1401 - http://securityreason.com/securityalert/2405 +CVE-2007-1401 - https://www.exploit-db.com/exploits/3431 +CVE-2007-1403 - https://www.exploit-db.com/exploits/3421 +CVE-2007-1404 - https://www.exploit-db.com/exploits/3432 +CVE-2007-1410 - https://www.exploit-db.com/exploits/3437 +CVE-2007-1411 - http://securityreason.com/securityalert/2407 +CVE-2007-1412 - https://www.exploit-db.com/exploits/3442 +CVE-2007-1413 - https://www.exploit-db.com/exploits/3439 +CVE-2007-1413 - https://www.exploit-db.com/exploits/4204 +CVE-2007-1415 - https://www.exploit-db.com/exploits/3443 +CVE-2007-1417 - https://www.exploit-db.com/exploits/3449 +CVE-2007-1420 - http://securityreason.com/securityalert/2413 +CVE-2007-1420 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530 +CVE-2007-1423 - https://www.exploit-db.com/exploits/3448 +CVE-2007-1425 - https://www.exploit-db.com/exploits/3457 +CVE-2007-1427 - https://www.exploit-db.com/exploits/3458 +CVE-2007-1428 - https://www.exploit-db.com/exploits/3455 +CVE-2007-1436 - http://securityreason.com/securityalert/2436 +CVE-2007-1437 - http://securityreason.com/securityalert/2435 +CVE-2007-1438 - https://www.exploit-db.com/exploits/3469 +CVE-2007-1439 - http://securityreason.com/securityalert/2423 +CVE-2007-1439 - https://www.exploit-db.com/exploits/3468 +CVE-2007-1440 - http://securityreason.com/securityalert/2431 +CVE-2007-1440 - https://www.exploit-db.com/exploits/3470 +CVE-2007-1441 - http://securityreason.com/securityalert/2434 +CVE-2007-1445 - https://www.exploit-db.com/exploits/3466 +CVE-2007-1446 - http://securityreason.com/securityalert/2421 +CVE-2007-1451 - http://securityreason.com/securityalert/2433 +CVE-2007-1454 - http://www.securityfocus.com/bid/22914 +CVE-2007-1459 - https://www.exploit-db.com/exploits/3473 +CVE-2007-1467 - http://securityreason.com/securityalert/2437 +CVE-2007-1468 - http://securityreason.com/securityalert/2442 +CVE-2007-1470 - http://securityreason.com/securityalert/2441 +CVE-2007-1471 - http://securityreason.com/securityalert/2440 +CVE-2007-1472 - http://securityreason.com/securityalert/2428 +CVE-2007-1472 - https://www.exploit-db.com/exploits/3486 +CVE-2007-1475 - http://securityreason.com/securityalert/2439 +CVE-2007-1475 - https://www.exploit-db.com/exploits/3488 +CVE-2007-1476 - http://marc.info/?l=full-disclosure&m=117396596027148&w=2 +CVE-2007-1476 - http://securityreason.com/securityalert/2438 +CVE-2007-1478 - https://www.exploit-db.com/exploits/3494 +CVE-2007-1479 - https://www.exploit-db.com/exploits/3489 +CVE-2007-1480 - https://www.exploit-db.com/exploits/3489 +CVE-2007-1481 - https://www.exploit-db.com/exploits/3490 +CVE-2007-1482 - https://www.exploit-db.com/exploits/3490 +CVE-2007-1483 - https://www.exploit-db.com/exploits/3492 +CVE-2007-1485 - http://securityreason.com/securityalert/2443 +CVE-2007-1486 - http://securityreason.com/securityalert/2432 +CVE-2007-1487 - https://www.exploit-db.com/exploits/3484 +CVE-2007-1493 - http://securityreason.com/securityalert/2430 +CVE-2007-1495 - http://securityreason.com/securityalert/2445 +CVE-2007-1496 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9831 +CVE-2007-1498 - http://securityreason.com/securityalert/2444 +CVE-2007-1499 - http://securityreason.com/securityalert/2448 +CVE-2007-1499 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 +CVE-2007-1501 - https://www.exploit-db.com/exploits/3514 +CVE-2007-1502 - http://securityreason.com/securityalert/2447 +CVE-2007-1503 - http://securityreason.com/securityalert/2447 +CVE-2007-1510 - https://www.exploit-db.com/exploits/3500 +CVE-2007-1511 - http://securityreason.com/securityalert/2470 +CVE-2007-1513 - http://securityreason.com/securityalert/2452 +CVE-2007-1513 - https://www.exploit-db.com/exploits/3485 +CVE-2007-1514 - http://securityreason.com/securityalert/2449 +CVE-2007-1516 - https://www.exploit-db.com/exploits/3487 +CVE-2007-1517 - https://www.exploit-db.com/exploits/3477 +CVE-2007-1519 - http://www.ush.it/2007/03/09/php-nuke-wild-post-xss/ +CVE-2007-1520 - http://www.ush.it/2007/03/09/php-nuke-wild-post-xss/ +CVE-2007-1523 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson +CVE-2007-1524 - https://www.exploit-db.com/exploits/3476/ +CVE-2007-1525 - https://www.exploit-db.com/exploits/3478 +CVE-2007-1539 - https://www.exploit-db.com/exploits/3521 +CVE-2007-1543 - http://aluigi.altervista.org/adv/nasbugs-adv.txt +CVE-2007-1544 - http://aluigi.altervista.org/adv/nasbugs-adv.txt +CVE-2007-1545 - http://aluigi.altervista.org/adv/nasbugs-adv.txt +CVE-2007-1546 - http://aluigi.altervista.org/adv/nasbugs-adv.txt +CVE-2007-1547 - http://aluigi.altervista.org/adv/nasbugs-adv.txt +CVE-2007-1552 - https://www.exploit-db.com/exploits/3516 +CVE-2007-1553 - https://www.exploit-db.com/exploits/3506 +CVE-2007-1555 - https://www.exploit-db.com/exploits/3519 +CVE-2007-1556 - https://www.exploit-db.com/exploits/3498 +CVE-2007-1558 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782 +CVE-2007-1560 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10291 +CVE-2007-1561 - http://marc.info/?l=full-disclosure&m=117432783011737&w=2 +CVE-2007-1561 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html +CVE-2007-1566 - https://www.exploit-db.com/exploits/3520 +CVE-2007-1568 - https://www.exploit-db.com/exploits/3462 +CVE-2007-1568 - https://www.exploit-db.com/exploits/3463 +CVE-2007-1569 - https://www.exploit-db.com/exploits/3464 +CVE-2007-1571 - https://www.exploit-db.com/exploits/3471 +CVE-2007-1577 - https://www.exploit-db.com/exploits/3522 +CVE-2007-1578 - https://www.exploit-db.com/exploits/3527 +CVE-2007-1579 - https://www.exploit-db.com/exploits/3537 +CVE-2007-1580 - https://www.exploit-db.com/exploits/3523 +CVE-2007-1581 - https://www.exploit-db.com/exploits/3529 +CVE-2007-1582 - https://www.exploit-db.com/exploits/3525 +CVE-2007-1584 - https://www.exploit-db.com/exploits/3517 +CVE-2007-1592 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2007-1594 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html +CVE-2007-1596 - https://www.exploit-db.com/exploits/3539 +CVE-2007-1600 - https://www.exploit-db.com/exploits/3533 +CVE-2007-1612 - https://www.exploit-db.com/exploits/3513 +CVE-2007-1613 - https://www.exploit-db.com/exploits/3503 +CVE-2007-1615 - https://www.exploit-db.com/exploits/3509 +CVE-2007-1616 - https://www.exploit-db.com/exploits/3515 +CVE-2007-1617 - https://www.exploit-db.com/exploits/3510 +CVE-2007-1618 - https://www.exploit-db.com/exploits/3507 +CVE-2007-1619 - https://www.exploit-db.com/exploits/3511 +CVE-2007-1620 - https://www.exploit-db.com/exploits/3501 +CVE-2007-1621 - https://www.exploit-db.com/exploits/3504 +CVE-2007-1622 - http://www.buayacorp.com/files/wordpress/wordpress-advisory.txt +CVE-2007-1626 - https://www.exploit-db.com/exploits/3512 +CVE-2007-1628 - https://www.exploit-db.com/exploits/3532 +CVE-2007-1629 - https://www.exploit-db.com/exploits/3536 +CVE-2007-1630 - https://www.exploit-db.com/exploits/3534 +CVE-2007-1633 - https://www.exploit-db.com/exploits/3518 +CVE-2007-1636 - https://www.exploit-db.com/exploits/3548 +CVE-2007-1640 - https://www.exploit-db.com/exploits/3542 +CVE-2007-1641 - https://www.exploit-db.com/exploits/3543 +CVE-2007-1643 - https://www.exploit-db.com/exploits/3545 +CVE-2007-1644 - https://www.exploit-db.com/exploits/3544 +CVE-2007-1645 - https://www.exploit-db.com/exploits/3541 +CVE-2007-1646 - http://securityreason.com/securityalert/2475 +CVE-2007-1647 - https://www.exploit-db.com/exploits/3508 +CVE-2007-1648 - https://www.exploit-db.com/exploits/3547 +CVE-2007-1658 - http://isc.sans.org/diary.html?storyid=2507 +CVE-2007-1658 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9014194 +CVE-2007-1658 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 +CVE-2007-1659 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9725 +CVE-2007-1660 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2007-1667 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776 +CVE-2007-1669 - http://securityreason.com/securityalert/2680 +CVE-2007-1671 - http://securityreason.com/securityalert/2680 +CVE-2007-1672 - http://securityreason.com/securityalert/2680 +CVE-2007-1673 - http://securityreason.com/securityalert/2680 +CVE-2007-1678 - http://securityreason.com/securityalert/2480 +CVE-2007-1679 - http://securityreason.com/securityalert/2487 +CVE-2007-1680 - http://securityreason.com/securityalert/2523 +CVE-2007-1692 - http://isc.sans.org/diary.html?storyid=2517 +CVE-2007-1693 - http://securityreason.com/securityalert/2716 +CVE-2007-1696 - https://www.exploit-db.com/exploits/3556 +CVE-2007-1697 - https://www.exploit-db.com/exploits/3552 +CVE-2007-1698 - https://www.exploit-db.com/exploits/3552 +CVE-2007-1699 - https://www.exploit-db.com/exploits/3557 +CVE-2007-1702 - https://www.exploit-db.com/exploits/3567 +CVE-2007-1703 - https://www.exploit-db.com/exploits/3565 +CVE-2007-1704 - https://www.exploit-db.com/exploits/3564 +CVE-2007-1705 - https://www.exploit-db.com/exploits/3549 +CVE-2007-1706 - https://www.exploit-db.com/exploits/3558 +CVE-2007-1707 - https://www.exploit-db.com/exploits/3562 +CVE-2007-1708 - https://www.exploit-db.com/exploits/3563 +CVE-2007-1709 - http://securityreason.com/securityalert/2512 +CVE-2007-1709 - https://www.exploit-db.com/exploits/3576 +CVE-2007-1710 - https://www.exploit-db.com/exploits/3573 +CVE-2007-1712 - https://www.exploit-db.com/exploits/3551 +CVE-2007-1714 - http://securityreason.com/securityalert/2481 +CVE-2007-1715 - https://www.exploit-db.com/exploits/3568 +CVE-2007-1719 - https://www.exploit-db.com/exploits/3578 +CVE-2007-1720 - https://www.exploit-db.com/exploits/3582 +CVE-2007-1721 - http://securityreason.com/securityalert/2491 +CVE-2007-1721 - https://www.exploit-db.com/exploits/3583 +CVE-2007-1723 - http://securityreason.com/securityalert/2484 +CVE-2007-1725 - https://www.exploit-db.com/exploits/3580 +CVE-2007-1725 - https://www.exploit-db.com/exploits/3581 +CVE-2007-1726 - https://www.exploit-db.com/exploits/3581 +CVE-2007-1728 - http://securityreason.com/securityalert/2485 +CVE-2007-1729 - http://securityreason.com/securityalert/2486 +CVE-2007-1730 - http://securityreason.com/securityalert/2482 +CVE-2007-1732 - http://marc.info/?l=bugtraq&m=117319839710382&w=2 +CVE-2007-1733 - http://securityreason.com/securityalert/2483 +CVE-2007-1733 - https://www.exploit-db.com/exploits/3589 +CVE-2007-1734 - http://securityreason.com/securityalert/2511 +CVE-2007-1735 - http://securityreason.com/securityalert/2489 +CVE-2007-1735 - https://www.exploit-db.com/exploits/3593 +CVE-2007-1736 - http://securityreason.com/securityalert/2488 +CVE-2007-1737 - http://securityreason.com/securityalert/2488 +CVE-2007-1744 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 +CVE-2007-1747 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-025 +CVE-2007-1749 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-050 +CVE-2007-1750 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 +CVE-2007-1751 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 +CVE-2007-1754 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-037 +CVE-2007-1756 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 +CVE-2007-1764 - http://securityreason.com/securityalert/2510 +CVE-2007-1766 - http://securityreason.com/securityalert/2508 +CVE-2007-1766 - https://www.exploit-db.com/exploits/3608 +CVE-2007-1771 - https://www.exploit-db.com/exploits/3592 +CVE-2007-1776 - https://www.exploit-db.com/exploits/3590 +CVE-2007-1778 - https://www.exploit-db.com/exploits/3591 +CVE-2007-1785 - http://securityreason.com/securityalert/2509 +CVE-2007-1787 - https://www.exploit-db.com/exploits/3600 +CVE-2007-1790 - https://www.exploit-db.com/exploits/3607 +CVE-2007-1791 - https://www.exploit-db.com/exploits/3605 +CVE-2007-1797 - http://www.imagemagick.org/script/changelog.php +CVE-2007-1797 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254 +CVE-2007-1800 - http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Dror +CVE-2007-1801 - https://www.exploit-db.com/exploits/3601 +CVE-2007-1804 - http://aluigi.altervista.org/adv/pulsex-adv.txt +CVE-2007-1804 - http://aluigi.org/poc/pulsex.zip +CVE-2007-1805 - https://www.exploit-db.com/exploits/3630 +CVE-2007-1806 - https://www.exploit-db.com/exploits/3633 +CVE-2007-1807 - https://www.exploit-db.com/exploits/3632 +CVE-2007-1808 - https://www.exploit-db.com/exploits/3629 +CVE-2007-1809 - https://www.exploit-db.com/exploits/3628 +CVE-2007-1810 - https://www.exploit-db.com/exploits/3626 +CVE-2007-1811 - https://www.exploit-db.com/exploits/3625 +CVE-2007-1812 - https://www.exploit-db.com/exploits/3624 +CVE-2007-1813 - https://www.exploit-db.com/exploits/3623 +CVE-2007-1814 - https://www.exploit-db.com/exploits/3620 +CVE-2007-1815 - https://www.exploit-db.com/exploits/3619 +CVE-2007-1816 - https://www.exploit-db.com/exploits/3621 +CVE-2007-1817 - https://www.exploit-db.com/exploits/3618 +CVE-2007-1818 - https://www.exploit-db.com/exploits/3613 +CVE-2007-1836 - http://securityreason.com/securityalert/2516 +CVE-2007-1837 - https://www.exploit-db.com/exploits/3598 +CVE-2007-1838 - https://www.exploit-db.com/exploits/3597 +CVE-2007-1839 - https://www.exploit-db.com/exploits/3599 +CVE-2007-1842 - https://www.exploit-db.com/exploits/3614 +CVE-2007-1843 - https://www.exploit-db.com/exploits/3638 +CVE-2007-1844 - http://securityreason.com/securityalert/2515 +CVE-2007-1845 - http://securityreason.com/securityalert/2514 +CVE-2007-1846 - https://www.exploit-db.com/exploits/3603 +CVE-2007-1847 - https://www.exploit-db.com/exploits/3612 +CVE-2007-1848 - http://securityreason.com/securityalert/2522 +CVE-2007-1850 - http://securityreason.com/securityalert/2522 +CVE-2007-1851 - https://www.exploit-db.com/exploits/3641 +CVE-2007-1852 - http://securityreason.com/securityalert/2517 +CVE-2007-1855 - http://securityreason.com/securityalert/2520 +CVE-2007-1858 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-1862 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2007-1863 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824 +CVE-2007-1866 - http://securityreason.com/securityalert/2518 +CVE-2007-1867 - https://www.exploit-db.com/exploits/3648 +CVE-2007-1871 - http://securityreason.com/securityalert/2569 +CVE-2007-1872 - http://securityreason.com/securityalert/2568 +CVE-2007-1876 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 +CVE-2007-1877 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 +CVE-2007-1878 - http://securityreason.com/securityalert/2525 +CVE-2007-1878 - http://www.gnucitizen.org/blog/firebug-goes-evil +CVE-2007-1882 - http://securityreason.com/securityalert/2527 +CVE-2007-1894 - http://chxsecurity.org/advisories/adv-1-mid.txt +CVE-2007-1894 - http://securityreason.com/securityalert/2526 +CVE-2007-1895 - https://www.exploit-db.com/exploits/3657 +CVE-2007-1896 - https://www.exploit-db.com/exploits/3657 +CVE-2007-1897 - https://www.exploit-db.com/exploits/3656 +CVE-2007-1898 - http://securityreason.com/securityalert/2710 +CVE-2007-1899 - https://www.exploit-db.com/exploits/5975 +CVE-2007-1905 - http://securityreason.com/securityalert/2554 +CVE-2007-1906 - http://securityreason.com/securityalert/2533 +CVE-2007-1907 - https://www.exploit-db.com/exploits/3696 +CVE-2007-1908 - https://www.exploit-db.com/exploits/3694 +CVE-2007-1909 - https://www.exploit-db.com/exploits/3691 +CVE-2007-1910 - https://www.exploit-db.com/exploits/3690 +CVE-2007-1911 - https://www.exploit-db.com/exploits/3690 +CVE-2007-1912 - https://www.exploit-db.com/exploits/3693 +CVE-2007-1913 - http://securityreason.com/securityalert/2535 +CVE-2007-1914 - http://securityreason.com/securityalert/2538 +CVE-2007-1915 - http://securityreason.com/securityalert/2538 +CVE-2007-1916 - http://securityreason.com/securityalert/2537 +CVE-2007-1917 - http://securityreason.com/securityalert/2536 +CVE-2007-1918 - http://securityreason.com/securityalert/2540 +CVE-2007-1920 - https://www.exploit-db.com/exploits/3678 +CVE-2007-1921 - http://securityreason.com/securityalert/2541 +CVE-2007-1921 - http://www.piotrbania.com/all/adv/nullsoft-winamp-libsndfile-adv.txt +CVE-2007-1922 - http://securityreason.com/securityalert/2532 +CVE-2007-1923 - http://securityreason.com/securityalert/2552 +CVE-2007-1923 - https://github.com/ledgersmb/LedgerSMB/blob/master/Changelog +CVE-2007-1924 - http://securityreason.com/securityalert/2528 +CVE-2007-1926 - http://securityreason.com/securityalert/2534 +CVE-2007-1927 - http://securityreason.com/securityalert/2529 +CVE-2007-1928 - http://securityreason.com/securityalert/2539 +CVE-2007-1929 - https://www.exploit-db.com/exploits/3676 +CVE-2007-1930 - https://www.exploit-db.com/exploits/3677 +CVE-2007-1931 - https://www.exploit-db.com/exploits/3679 +CVE-2007-1932 - https://www.exploit-db.com/exploits/3687 +CVE-2007-1933 - https://www.exploit-db.com/exploits/3689 +CVE-2007-1934 - https://www.exploit-db.com/exploits/3683 +CVE-2007-1935 - https://www.exploit-db.com/exploits/3682 +CVE-2007-1936 - https://www.exploit-db.com/exploits/3682 +CVE-2007-1937 - https://www.exploit-db.com/exploits/3681 +CVE-2007-1942 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html +CVE-2007-1942 - http://securityreason.com/securityalert/2558 +CVE-2007-1943 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html +CVE-2007-1943 - http://securityreason.com/securityalert/2558 +CVE-2007-1946 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html +CVE-2007-1946 - http://securityreason.com/securityalert/2558 +CVE-2007-1948 - http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html +CVE-2007-1948 - http://securityreason.com/securityalert/2558 +CVE-2007-1949 - http://securityreason.com/securityalert/2557 +CVE-2007-1950 - http://securityreason.com/securityalert/2557 +CVE-2007-1952 - http://securityreason.com/securityalert/2546 +CVE-2007-1956 - http://securityreason.com/securityalert/2545 +CVE-2007-1957 - http://securityreason.com/securityalert/2543 +CVE-2007-1960 - https://www.exploit-db.com/exploits/3666 +CVE-2007-1961 - https://www.exploit-db.com/exploits/3665 +CVE-2007-1962 - https://www.exploit-db.com/exploits/3663 +CVE-2007-1963 - https://www.exploit-db.com/exploits/3653 +CVE-2007-1964 - http://securityreason.com/securityalert/2544 +CVE-2007-1967 - http://securityreason.com/securityalert/2555 +CVE-2007-1968 - http://securityreason.com/securityalert/2548 +CVE-2007-1968 - https://www.exploit-db.com/exploits/3685 +CVE-2007-1969 - http://securityreason.com/securityalert/2549 +CVE-2007-1971 - http://securityreason.com/securityalert/2547 +CVE-2007-1972 - http://securityreason.com/securityalert/2599 +CVE-2007-1973 - http://securityreason.com/securityalert/2563 +CVE-2007-1974 - https://www.exploit-db.com/exploits/3644 +CVE-2007-1974 - https://www.exploit-db.com/exploits/3645 +CVE-2007-1974 - https://www.exploit-db.com/exploits/3646 +CVE-2007-1975 - http://securityreason.com/securityalert/2567 +CVE-2007-1976 - https://www.exploit-db.com/exploits/3642 +CVE-2007-1978 - https://www.exploit-db.com/exploits/3640 +CVE-2007-1979 - https://www.exploit-db.com/exploits/3655 +CVE-2007-1980 - https://www.exploit-db.com/exploits/3639 +CVE-2007-1982 - https://www.exploit-db.com/exploits/3641 +CVE-2007-1983 - https://www.exploit-db.com/exploits/3660 +CVE-2007-1984 - http://securityreason.com/securityalert/2559 +CVE-2007-1985 - http://securityreason.com/securityalert/2564 +CVE-2007-1986 - https://www.exploit-db.com/exploits/3659 +CVE-2007-1987 - http://securityreason.com/securityalert/2551 +CVE-2007-1988 - http://securityreason.com/securityalert/2550 +CVE-2007-1992 - https://www.exploit-db.com/exploits/3706 +CVE-2007-1994 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5624 +CVE-2007-1996 - http://securityreason.com/securityalert/2562 +CVE-2007-1998 - https://www.exploit-db.com/exploits/3697 +CVE-2007-1999 - https://www.exploit-db.com/exploits/3700 +CVE-2007-2000 - https://www.exploit-db.com/exploits/3701 +CVE-2007-2001 - https://www.exploit-db.com/exploits/3701 +CVE-2007-2002 - https://www.exploit-db.com/exploits/3702 +CVE-2007-2003 - https://www.exploit-db.com/exploits/3702 +CVE-2007-2004 - https://www.exploit-db.com/exploits/3702 +CVE-2007-2005 - https://www.exploit-db.com/exploits/3703 +CVE-2007-2006 - https://www.exploit-db.com/exploits/3704 +CVE-2007-2007 - https://www.exploit-db.com/exploits/3704 +CVE-2007-2008 - https://www.exploit-db.com/exploits/3704 +CVE-2007-2009 - https://www.exploit-db.com/exploits/3705 +CVE-2007-2011 - http://securityreason.com/securityalert/2556 +CVE-2007-2015 - http://securityreason.com/securityalert/2553 +CVE-2007-2016 - http://securityreason.com/securityalert/2560 +CVE-2007-2017 - http://pridels0.blogspot.com/2007/03/alstrasoft-video-share-enterprise.html +CVE-2007-2018 - http://pridels0.blogspot.com/2007/03/alstrasoft-video-share-enterprise.html +CVE-2007-2019 - http://securityreason.com/securityalert/2566 +CVE-2007-2020 - http://securityreason.com/securityalert/2561 +CVE-2007-2021 - http://securityreason.com/securityalert/2565 +CVE-2007-2022 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332 +CVE-2007-2027 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9741 +CVE-2007-2043 - https://www.exploit-db.com/exploits/3714 +CVE-2007-2044 - https://www.exploit-db.com/exploits/3712 +CVE-2007-2045 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9127 +CVE-2007-2048 - http://securityreason.com/securityalert/2589 +CVE-2007-2049 - https://www.exploit-db.com/exploits/3713 +CVE-2007-2050 - https://www.exploit-db.com/exploits/3718 +CVE-2007-2052 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-2052 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093 +CVE-2007-2053 - http://securityreason.com/securityalert/2655 +CVE-2007-2054 - http://securityreason.com/securityalert/2657 +CVE-2007-2055 - http://securityreason.com/securityalert/2656 +CVE-2007-2057 - http://securityreason.com/securityalert/2584 +CVE-2007-2060 - http://www.kb.cert.org/vuls/id/319464 +CVE-2007-2060 - http://www.kb.cert.org/vuls/id/MIMG-6ZKP4T +CVE-2007-2061 - http://securityreason.com/securityalert/2572 +CVE-2007-2062 - https://www.exploit-db.com/exploits/3727 +CVE-2007-2064 - http://securityreason.com/securityalert/2587 +CVE-2007-2067 - https://www.exploit-db.com/exploits/3745 +CVE-2007-2068 - https://www.exploit-db.com/exploits/3749 +CVE-2007-2069 - https://www.exploit-db.com/exploits/3747 +CVE-2007-2070 - https://www.exploit-db.com/exploits/3748 +CVE-2007-2072 - http://attrition.org/pipermail/vim/2007-April/001534.html +CVE-2007-2072 - http://securityreason.com/securityalert/2580 +CVE-2007-2073 - http://attrition.org/pipermail/vim/2007-April/001534.html +CVE-2007-2075 - http://sourceforge.net/tracker/index.php?func=detail&aid=1696780&group_id=101952&atid=630783 +CVE-2007-2078 - http://securityreason.com/securityalert/2582 +CVE-2007-2079 - https://www.exploit-db.com/exploits/3738 +CVE-2007-2080 - https://www.exploit-db.com/exploits/3738 +CVE-2007-2081 - http://securityreason.com/securityalert/2581 +CVE-2007-2082 - http://securityreason.com/securityalert/2581 +CVE-2007-2083 - http://securityreason.com/securityalert/2591 +CVE-2007-2084 - http://attrition.org/pipermail/vim/2007-April/001523.html +CVE-2007-2084 - http://securityreason.com/securityalert/2583 +CVE-2007-2086 - https://www.exploit-db.com/exploits/3741 +CVE-2007-2088 - http://securityreason.com/securityalert/2586 +CVE-2007-2089 - https://www.exploit-db.com/exploits/3736 +CVE-2007-2090 - http://securityreason.com/securityalert/2585 +CVE-2007-2091 - https://www.exploit-db.com/exploits/3750 +CVE-2007-2093 - http://securityreason.com/securityalert/2590 +CVE-2007-2093 - https://www.exploit-db.com/exploits/3735 +CVE-2007-2094 - http://www.securityfocus.com/bid/23524 +CVE-2007-2094 - https://www.exploit-db.com/exploits/3751 +CVE-2007-2095 - http://securityreason.com/securityalert/2592 +CVE-2007-2096 - http://securityreason.com/securityalert/2588 +CVE-2007-2097 - http://securityreason.com/securityalert/2573 +CVE-2007-2098 - http://securityreason.com/securityalert/2574 +CVE-2007-2099 - http://securityreason.com/securityalert/2575 +CVE-2007-2100 - http://securityreason.com/securityalert/2570 +CVE-2007-2102 - http://securityreason.com/securityalert/2571 +CVE-2007-2103 - http://securityreason.com/securityalert/2576 +CVE-2007-2104 - http://securityreason.com/securityalert/2577 +CVE-2007-2105 - http://securityreason.com/securityalert/2578 +CVE-2007-2106 - http://securityreason.com/securityalert/2579 +CVE-2007-2135 - http://securityreason.com/securityalert/2612 +CVE-2007-2136 - http://securityreason.com/securityalert/2598 +CVE-2007-2137 - http://securityreason.com/securityalert/2597 +CVE-2007-2138 - http://www.redhat.com/support/errata/RHSA-2007-0337.html +CVE-2007-2139 - http://securityreason.com/securityalert/2628 +CVE-2007-2141 - http://securityreason.com/securityalert/2593 +CVE-2007-2141 - https://www.exploit-db.com/exploits/3758 +CVE-2007-2142 - https://www.exploit-db.com/exploits/3752 +CVE-2007-2143 - https://www.exploit-db.com/exploits/3759 +CVE-2007-2144 - https://www.exploit-db.com/exploits/3753 +CVE-2007-2145 - https://www.exploit-db.com/exploits/3754 +CVE-2007-2147 - http://securityreason.com/securityalert/2595 +CVE-2007-2148 - http://securityreason.com/securityalert/2595 +CVE-2007-2149 - http://securityreason.com/securityalert/2595 +CVE-2007-2153 - http://securityreason.com/securityalert/2594 +CVE-2007-2154 - https://www.exploit-db.com/exploits/3756 +CVE-2007-2156 - https://www.exploit-db.com/exploits/3763 +CVE-2007-2157 - https://www.exploit-db.com/exploits/3764 +CVE-2007-2158 - https://www.exploit-db.com/exploits/3760 +CVE-2007-2164 - http://securityreason.com/securityalert/2600 +CVE-2007-2166 - https://www.exploit-db.com/exploits/3765 +CVE-2007-2167 - https://www.exploit-db.com/exploits/3762 +CVE-2007-2169 - https://www.exploit-db.com/exploits/3761 +CVE-2007-2170 - http://securityreason.com/securityalert/2611 +CVE-2007-2171 - http://securityreason.com/securityalert/2610 +CVE-2007-2175 - http://www.theregister.co.uk/2007/04/20/pwn-2-own_winner/ +CVE-2007-2179 - http://securityreason.com/securityalert/2606 +CVE-2007-2180 - http://securityreason.com/securityalert/2601 +CVE-2007-2180 - https://www.exploit-db.com/exploits/3768 +CVE-2007-2181 - https://www.exploit-db.com/exploits/3778 +CVE-2007-2182 - https://www.exploit-db.com/exploits/3775 +CVE-2007-2183 - https://www.exploit-db.com/exploits/3774 +CVE-2007-2184 - https://www.exploit-db.com/exploits/3773 +CVE-2007-2185 - https://www.exploit-db.com/exploits/3771 +CVE-2007-2186 - https://www.exploit-db.com/exploits/3770 +CVE-2007-2187 - http://www.digit-labs.org/files/exploits/extremail-v9.c +CVE-2007-2187 - https://www.exploit-db.com/exploits/3769 +CVE-2007-2189 - https://www.exploit-db.com/exploits/3766 +CVE-2007-2190 - http://securityreason.com/securityalert/2607 +CVE-2007-2191 - http://securityreason.com/securityalert/2627 +CVE-2007-2192 - https://www.exploit-db.com/exploits/3772 +CVE-2007-2193 - https://www.exploit-db.com/exploits/3776 +CVE-2007-2194 - https://www.exploit-db.com/exploits/3777 +CVE-2007-2196 - http://securityreason.com/securityalert/2603 +CVE-2007-2199 - https://www.exploit-db.com/exploits/3781 +CVE-2007-2199 - https://www.exploit-db.com/exploits/3915 +CVE-2007-2199 - https://www.exploit-db.com/exploits/4111 +CVE-2007-2200 - https://www.exploit-db.com/exploits/3783 +CVE-2007-2201 - http://securityreason.com/securityalert/2653 +CVE-2007-2201 - https://www.exploit-db.com/exploits/3785 +CVE-2007-2202 - http://securityreason.com/securityalert/2609 +CVE-2007-2204 - https://www.exploit-db.com/exploits/3786 +CVE-2007-2205 - http://securityreason.com/securityalert/2630 +CVE-2007-2206 - http://securityreason.com/securityalert/2602 +CVE-2007-2207 - http://securityreason.com/securityalert/2602 +CVE-2007-2208 - http://securityreason.com/securityalert/2608 +CVE-2007-2209 - https://www.exploit-db.com/exploits/3779 +CVE-2007-2210 - http://securityreason.com/securityalert/2604 +CVE-2007-2211 - https://www.exploit-db.com/exploits/3780 +CVE-2007-2214 - http://securityreason.com/securityalert/2605 +CVE-2007-2216 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-2217 - http://www.kb.cert.org/vuls/id/180345 +CVE-2007-2217 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-2217 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-055 +CVE-2007-2217 - https://www.exploit-db.com/exploits/4584 +CVE-2007-2218 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-031 +CVE-2007-2219 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-035 +CVE-2007-2221 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 +CVE-2007-2222 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 +CVE-2007-2223 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-042 +CVE-2007-2224 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-043 +CVE-2007-2225 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 +CVE-2007-2227 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034 +CVE-2007-2228 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-2228 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-058 +CVE-2007-2229 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-032 +CVE-2007-2234 - http://securityreason.com/securityalert/2613 +CVE-2007-2235 - http://securityreason.com/securityalert/2613 +CVE-2007-2236 - http://securityreason.com/securityalert/2613 +CVE-2007-2237 - https://www.exploit-db.com/exploits/4044 +CVE-2007-2240 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-2242 - http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf +CVE-2007-2242 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9574 +CVE-2007-2243 - http://securityreason.com/securityalert/2631 +CVE-2007-2244 - https://www.exploit-db.com/exploits/3793 +CVE-2007-2247 - http://securityreason.com/securityalert/2616 +CVE-2007-2248 - http://securityreason.com/securityalert/2617 +CVE-2007-2248 - http://www.waraxe.us/advisory-49.html +CVE-2007-2249 - http://securityreason.com/securityalert/2617 +CVE-2007-2249 - http://www.waraxe.us/advisory-49.html +CVE-2007-2250 - http://securityreason.com/securityalert/2617 +CVE-2007-2250 - http://www.waraxe.us/advisory-49.html +CVE-2007-2254 - http://securityreason.com/securityalert/2618 +CVE-2007-2255 - http://securityreason.com/securityalert/2619 +CVE-2007-2256 - http://securityreason.com/securityalert/2620 +CVE-2007-2257 - http://securityreason.com/securityalert/2621 +CVE-2007-2258 - http://securityreason.com/securityalert/2622 +CVE-2007-2259 - http://securityreason.com/securityalert/2623 +CVE-2007-2260 - http://securityreason.com/securityalert/2624 +CVE-2007-2261 - http://securityreason.com/securityalert/2625 +CVE-2007-2262 - http://securityreason.com/securityalert/2626 +CVE-2007-2264 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9100 +CVE-2007-2265 - http://securityreason.com/securityalert/2629 +CVE-2007-2270 - https://www.exploit-db.com/exploits/3791 +CVE-2007-2270 - https://www.exploit-db.com/exploits/3792 +CVE-2007-2271 - https://www.exploit-db.com/exploits/3794 +CVE-2007-2272 - https://www.exploit-db.com/exploits/3795 +CVE-2007-2273 - https://www.exploit-db.com/exploits/3796 +CVE-2007-2274 - https://www.exploit-db.com/exploits/3784 +CVE-2007-2277 - http://securityreason.com/securityalert/2614 +CVE-2007-2278 - http://securityreason.com/securityalert/2615 +CVE-2007-2283 - https://www.exploit-db.com/exploits/3798 +CVE-2007-2284 - https://www.exploit-db.com/exploits/3797 +CVE-2007-2285 - http://attrition.org/pipermail/vim/2007-April/001545.html +CVE-2007-2285 - http://attrition.org/pipermail/vim/2007-April/001546.html +CVE-2007-2285 - https://www.exploit-db.com/exploits/3800 +CVE-2007-2290 - http://securityreason.com/securityalert/2632 +CVE-2007-2291 - http://securityreason.com/securityalert/2654 +CVE-2007-2291 - http://www.wisec.it/vulns.php?id=11 +CVE-2007-2292 - http://securityreason.com/securityalert/2654 +CVE-2007-2292 - http://www.wisec.it/vulns.php?id=11 +CVE-2007-2293 - http://securityreason.com/securityalert/2645 +CVE-2007-2294 - http://securityreason.com/securityalert/2646 +CVE-2007-2297 - http://securityreason.com/securityalert/2644 +CVE-2007-2298 - https://www.exploit-db.com/exploits/3732 +CVE-2007-2299 - https://www.exploit-db.com/exploits/3731 +CVE-2007-2300 - http://securityreason.com/securityalert/2643 +CVE-2007-2301 - https://www.exploit-db.com/exploits/3744 +CVE-2007-2302 - https://www.exploit-db.com/exploits/3722 +CVE-2007-2303 - https://www.exploit-db.com/exploits/3742 +CVE-2007-2304 - https://www.exploit-db.com/exploits/3729 +CVE-2007-2305 - https://www.exploit-db.com/exploits/3729 +CVE-2007-2306 - http://securityreason.com/securityalert/2642 +CVE-2007-2307 - https://www.exploit-db.com/exploits/3717 +CVE-2007-2308 - http://securityreason.com/securityalert/2639 +CVE-2007-2310 - http://securityreason.com/securityalert/2640 +CVE-2007-2311 - http://securityreason.com/securityalert/2641 +CVE-2007-2312 - http://securityreason.com/securityalert/2642 +CVE-2007-2313 - https://www.exploit-db.com/exploits/3716 +CVE-2007-2317 - https://www.exploit-db.com/exploits/3707 +CVE-2007-2319 - https://www.exploit-db.com/exploits/3734 +CVE-2007-2320 - https://www.exploit-db.com/exploits/3739 +CVE-2007-2324 - https://www.exploit-db.com/exploits/3799 +CVE-2007-2326 - http://securityreason.com/securityalert/2634 +CVE-2007-2327 - http://securityreason.com/securityalert/2635 +CVE-2007-2328 - http://securityreason.com/securityalert/2636 +CVE-2007-2329 - http://securityreason.com/securityalert/2637 +CVE-2007-2330 - http://securityreason.com/securityalert/2638 +CVE-2007-2331 - http://securityreason.com/securityalert/2633 +CVE-2007-2338 - http://securityreason.com/securityalert/2617 +CVE-2007-2338 - http://www.waraxe.us/advisory-49.html +CVE-2007-2339 - http://securityreason.com/securityalert/2617 +CVE-2007-2339 - http://www.waraxe.us/advisory-49.html +CVE-2007-2340 - https://www.exploit-db.com/exploits/3803 +CVE-2007-2341 - https://www.exploit-db.com/exploits/3802 +CVE-2007-2342 - https://www.exploit-db.com/exploits/3767 +CVE-2007-2345 - https://www.exploit-db.com/exploits/3668 +CVE-2007-2346 - https://www.exploit-db.com/exploits/3669 +CVE-2007-2347 - https://www.exploit-db.com/exploits/3667 +CVE-2007-2350 - http://securityreason.com/securityalert/2652 +CVE-2007-2352 - http://securityreason.com/securityalert/2657 +CVE-2007-2356 - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238422 +CVE-2007-2357 - http://securityreason.com/securityalert/2649 +CVE-2007-2358 - http://attrition.org/pipermail/vim/2007-April/001566.html +CVE-2007-2362 - http://securityreason.com/securityalert/2658 +CVE-2007-2362 - http://www.digit-labs.org/files/exploits/mydns-rr-smash.c +CVE-2007-2363 - https://www.exploit-db.com/exploits/3811 +CVE-2007-2364 - https://www.exploit-db.com/exploits/3809 +CVE-2007-2365 - https://www.exploit-db.com/exploits/3812 +CVE-2007-2366 - https://www.exploit-db.com/exploits/3812 +CVE-2007-2367 - http://securityreason.com/securityalert/2647 +CVE-2007-2368 - https://www.exploit-db.com/exploits/3673 +CVE-2007-2369 - https://www.exploit-db.com/exploits/3673 +CVE-2007-2370 - https://www.exploit-db.com/exploits/3672 +CVE-2007-2371 - https://www.exploit-db.com/exploits/3671 +CVE-2007-2372 - https://www.exploit-db.com/exploits/3671 +CVE-2007-2373 - http://packetstormsecurity.org/0704-exploits/xoopswflinks-sql.txt +CVE-2007-2373 - https://www.exploit-db.com/exploits/3670 +CVE-2007-2408 - http://isc.sans.org/diary.html?storyid=3214 +CVE-2007-2411 - http://securityreason.com/securityalert/2648 +CVE-2007-2412 - http://securityreason.com/securityalert/2651 +CVE-2007-2416 - http://securityreason.com/securityalert/2650 +CVE-2007-2422 - http://securityreason.com/securityalert/2659 +CVE-2007-2424 - https://www.exploit-db.com/exploits/3818 +CVE-2007-2425 - https://www.exploit-db.com/exploits/3817 +CVE-2007-2426 - https://www.exploit-db.com/exploits/3814 +CVE-2007-2427 - https://www.exploit-db.com/exploits/3813 +CVE-2007-2430 - https://www.exploit-db.com/exploits/3816 +CVE-2007-2431 - https://www.exploit-db.com/exploits/3816 +CVE-2007-2438 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876 +CVE-2007-2442 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt +CVE-2007-2442 - http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt +CVE-2007-2442 - http://www.kb.cert.org/vuls/id/356961 +CVE-2007-2443 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt +CVE-2007-2443 - http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt +CVE-2007-2443 - http://www.kb.cert.org/vuls/id/365313 +CVE-2007-2444 - http://securityreason.com/securityalert/2701 +CVE-2007-2445 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2007-2446 - http://securityreason.com/securityalert/2702 +CVE-2007-2447 - http://securityreason.com/securityalert/2700 +CVE-2007-2448 - http://www.ubuntu.com/usn/USN-1053-1 +CVE-2007-2449 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-2450 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-2450 - http://securityreason.com/securityalert/2813 +CVE-2007-2452 - http://securityreason.com/securityalert/2760 +CVE-2007-2453 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9960 +CVE-2007-2456 - https://www.exploit-db.com/exploits/3805 +CVE-2007-2457 - https://www.exploit-db.com/exploits/3733 +CVE-2007-2458 - https://www.exploit-db.com/exploits/3733 +CVE-2007-2471 - https://www.exploit-db.com/exploits/3827 +CVE-2007-2481 - http://securityreason.com/securityalert/2660 +CVE-2007-2481 - https://www.exploit-db.com/exploits/3825 +CVE-2007-2482 - http://securityreason.com/securityalert/2660 +CVE-2007-2482 - http://www.exploit-db.com/exploits/3825 +CVE-2007-2483 - https://www.exploit-db.com/exploits/3824 +CVE-2007-2484 - https://www.exploit-db.com/exploits/3824 +CVE-2007-2485 - https://www.exploit-db.com/exploits/3828 +CVE-2007-2486 - https://www.exploit-db.com/exploits/3831 +CVE-2007-2487 - http://securityreason.com/securityalert/2675 +CVE-2007-2492 - http://securityreason.com/securityalert/2674 +CVE-2007-2492 - https://www.exploit-db.com/exploits/3835 +CVE-2007-2493 - https://www.exploit-db.com/exploits/3833 +CVE-2007-2494 - https://www.exploit-db.com/exploits/3826 +CVE-2007-2495 - https://www.exploit-db.com/exploits/3830 +CVE-2007-2497 - https://www.exploit-db.com/exploits/3819 +CVE-2007-2498 - https://www.exploit-db.com/exploits/3823 +CVE-2007-2503 - http://securityreason.com/securityalert/2673 +CVE-2007-2503 - http://www.attrition.org/pipermail/vim/2007-April/001541.html +CVE-2007-2504 - http://securityreason.com/securityalert/2673 +CVE-2007-2504 - http://www.attrition.org/pipermail/vim/2007-April/001541.html +CVE-2007-2507 - https://www.exploit-db.com/exploits/3832 +CVE-2007-2509 - http://securityreason.com/securityalert/2672 +CVE-2007-2514 - http://securityreason.com/securityalert/2785 +CVE-2007-2519 - http://pear.php.net/advisory-20070507.txt +CVE-2007-2521 - https://www.exploit-db.com/exploits/3846 +CVE-2007-2524 - http://securityreason.com/securityalert/2668 +CVE-2007-2527 - https://www.exploit-db.com/exploits/3868 +CVE-2007-2530 - https://www.exploit-db.com/exploits/3865 +CVE-2007-2531 - https://www.exploit-db.com/exploits/3869 +CVE-2007-2532 - http://securityreason.com/securityalert/2666 +CVE-2007-2534 - http://securityreason.com/securityalert/2669 +CVE-2007-2535 - http://securityreason.com/securityalert/2680 +CVE-2007-2536 - http://securityreason.com/securityalert/2680 +CVE-2007-2537 - http://securityreason.com/securityalert/2670 +CVE-2007-2538 - http://securityreason.com/securityalert/2671 +CVE-2007-2538 - https://www.exploit-db.com/exploits/3850 +CVE-2007-2539 - http://securityreason.com/securityalert/2671 +CVE-2007-2539 - https://www.exploit-db.com/exploits/3850 +CVE-2007-2540 - https://www.exploit-db.com/exploits/3852 +CVE-2007-2541 - https://www.exploit-db.com/exploits/3847 +CVE-2007-2542 - https://www.exploit-db.com/exploits/3848 +CVE-2007-2543 - https://www.exploit-db.com/exploits/3849 +CVE-2007-2544 - https://www.exploit-db.com/exploits/3854 +CVE-2007-2545 - https://www.exploit-db.com/exploits/3853 +CVE-2007-2546 - http://securityreason.com/securityalert/2676 +CVE-2007-2547 - http://securityreason.com/securityalert/2677 +CVE-2007-2547 - http://www.securityfocus.com/bid/23856 +CVE-2007-2548 - http://securityreason.com/securityalert/2677 +CVE-2007-2548 - http://www.securityfocus.com/bid/23856 +CVE-2007-2549 - http://securityreason.com/securityalert/2677 +CVE-2007-2549 - http://www.securityfocus.com/bid/23856 +CVE-2007-2550 - http://securityreason.com/securityalert/2678 +CVE-2007-2554 - http://securityreason.com/securityalert/2679 +CVE-2007-2555 - http://securityreason.com/securityalert/2664 +CVE-2007-2556 - http://securityreason.com/securityalert/2665 +CVE-2007-2556 - https://www.exploit-db.com/exploits/3858 +CVE-2007-2558 - http://securityreason.com/securityalert/2667 +CVE-2007-2559 - http://securityreason.com/securityalert/2681 +CVE-2007-2560 - https://www.exploit-db.com/exploits/3867 +CVE-2007-2561 - http://securityreason.com/securityalert/2688 +CVE-2007-2562 - http://securityreason.com/securityalert/2684 +CVE-2007-2565 - http://securityreason.com/securityalert/2687 +CVE-2007-2566 - http://securityreason.com/securityalert/2683 +CVE-2007-2567 - http://securityreason.com/securityalert/2683 +CVE-2007-2569 - https://www.exploit-db.com/exploits/3864 +CVE-2007-2570 - https://www.exploit-db.com/exploits/3863 +CVE-2007-2571 - https://www.exploit-db.com/exploits/3862 +CVE-2007-2572 - https://www.exploit-db.com/exploits/3861 +CVE-2007-2573 - https://www.exploit-db.com/exploits/3860 +CVE-2007-2574 - https://www.exploit-db.com/exploits/3859 +CVE-2007-2575 - https://www.exploit-db.com/exploits/3857 +CVE-2007-2576 - http://moaxb.blogspot.com/2007/05/moaxb-05-east-wind-software.html +CVE-2007-2576 - https://www.exploit-db.com/exploits/3856 +CVE-2007-2577 - http://securityreason.com/securityalert/2686 +CVE-2007-2578 - http://securityreason.com/securityalert/2686 +CVE-2007-2579 - http://securityreason.com/securityalert/2686 +CVE-2007-2580 - http://securityreason.com/securityalert/2685 +CVE-2007-2581 - http://securityreason.com/securityalert/2682 +CVE-2007-2581 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-2581 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-059 +CVE-2007-2583 - http://packetstormsecurity.com/files/124295/MySQL-5.0.x-Denial-Of-Service.html +CVE-2007-2583 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9930 +CVE-2007-2590 - http://securityreason.com/securityalert/2689 +CVE-2007-2591 - http://securityreason.com/securityalert/2689 +CVE-2007-2592 - http://securityreason.com/securityalert/2689 +CVE-2007-2594 - https://www.exploit-db.com/exploits/3879 +CVE-2007-2596 - https://www.exploit-db.com/exploits/3884 +CVE-2007-2597 - https://www.exploit-db.com/exploits/3885 +CVE-2007-2598 - https://www.exploit-db.com/exploits/3886 +CVE-2007-2599 - https://www.exploit-db.com/exploits/3887 +CVE-2007-2600 - https://www.exploit-db.com/exploits/3887 +CVE-2007-2601 - https://www.exploit-db.com/exploits/3889 +CVE-2007-2602 - http://securityreason.com/securityalert/2708 +CVE-2007-2603 - http://securityreason.com/securityalert/2708 +CVE-2007-2604 - http://securityreason.com/securityalert/2708 +CVE-2007-2605 - http://securityreason.com/securityalert/2708 +CVE-2007-2606 - http://securityreason.com/securityalert/2708 +CVE-2007-2607 - https://www.exploit-db.com/exploits/3870 +CVE-2007-2608 - https://www.exploit-db.com/exploits/3878 +CVE-2007-2609 - https://www.exploit-db.com/exploits/3876 +CVE-2007-2611 - https://www.exploit-db.com/exploits/3874 +CVE-2007-2614 - http://securityreason.com/securityalert/2690 +CVE-2007-2615 - https://www.exploit-db.com/exploits/3875 +CVE-2007-2618 - http://securityreason.com/securityalert/2691 +CVE-2007-2620 - https://www.exploit-db.com/exploits/3894 +CVE-2007-2621 - https://www.exploit-db.com/exploits/3895 +CVE-2007-2622 - https://www.exploit-db.com/exploits/3896 +CVE-2007-2623 - https://www.exploit-db.com/exploits/3891 +CVE-2007-2626 - http://securityreason.com/securityalert/2695 +CVE-2007-2627 - http://securityreason.com/securityalert/2694 +CVE-2007-2628 - http://securityreason.com/securityalert/2693 +CVE-2007-2629 - http://securityreason.com/securityalert/2698 +CVE-2007-2632 - http://marc.info/?l=bugtraq&m=117883301207293&w=2 +CVE-2007-2638 - http://securityreason.com/securityalert/2696 +CVE-2007-2639 - http://securityreason.com/securityalert/2699 +CVE-2007-2641 - http://securityreason.com/securityalert/2692 +CVE-2007-2641 - https://www.exploit-db.com/exploits/3905 +CVE-2007-2642 - https://www.exploit-db.com/exploits/3902 +CVE-2007-2643 - https://www.exploit-db.com/exploits/3901 +CVE-2007-2644 - https://www.exploit-db.com/exploits/3899 +CVE-2007-2646 - http://securityreason.com/securityalert/2706 +CVE-2007-2646 - http://vuln.sg/yenc32-107-en.html +CVE-2007-2647 - https://www.exploit-db.com/exploits/3903 +CVE-2007-2649 - http://securityreason.com/securityalert/2705 +CVE-2007-2654 - http://www.ubuntu.com/usn/usn-516-1 +CVE-2007-2656 - https://www.exploit-db.com/exploits/3898 +CVE-2007-2657 - https://www.exploit-db.com/exploits/3910 +CVE-2007-2658 - https://www.exploit-db.com/exploits/3917 +CVE-2007-2659 - https://www.exploit-db.com/exploits/3918 +CVE-2007-2660 - https://www.exploit-db.com/exploits/3915 +CVE-2007-2661 - https://www.exploit-db.com/exploits/3914 +CVE-2007-2662 - https://www.exploit-db.com/exploits/3911 +CVE-2007-2663 - https://www.exploit-db.com/exploits/3909 +CVE-2007-2664 - https://www.exploit-db.com/exploits/3908 +CVE-2007-2665 - https://www.exploit-db.com/exploits/3906 +CVE-2007-2666 - https://www.exploit-db.com/exploits/3912 +CVE-2007-2667 - https://www.exploit-db.com/exploits/3916 +CVE-2007-2668 - https://www.exploit-db.com/exploits/3913 +CVE-2007-2671 - http://securityreason.com/securityalert/2704 +CVE-2007-2672 - https://www.exploit-db.com/exploits/3839 +CVE-2007-2673 - https://www.exploit-db.com/exploits/3843 +CVE-2007-2674 - https://www.exploit-db.com/exploits/3842 +CVE-2007-2675 - https://www.exploit-db.com/exploits/3840 +CVE-2007-2676 - https://www.exploit-db.com/exploits/3838 +CVE-2007-2677 - https://www.exploit-db.com/exploits/3837 +CVE-2007-2681 - http://securityreason.com/securityalert/2697 +CVE-2007-2691 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559 +CVE-2007-2692 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166 +CVE-2007-2699 - http://packetstormsecurity.com/files/153072/Oracle-Application-Testing-Suite-WebLogic-Server-Administration-Console-War-Deployment.html +CVE-2007-2706 - https://www.exploit-db.com/exploits/3924 +CVE-2007-2707 - https://www.exploit-db.com/exploits/3923 +CVE-2007-2708 - https://www.exploit-db.com/exploits/3920 +CVE-2007-2709 - https://www.exploit-db.com/exploits/3919 +CVE-2007-2711 - https://www.exploit-db.com/exploits/3925 +CVE-2007-2713 - http://securityreason.com/securityalert/2707 +CVE-2007-2715 - https://www.exploit-db.com/exploits/3900 +CVE-2007-2717 - https://www.exploit-db.com/exploits/3907 +CVE-2007-2721 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9397 +CVE-2007-2722 - https://www.exploit-db.com/exploits/3930 +CVE-2007-2724 - http://securityreason.com/securityalert/2713 +CVE-2007-2726 - https://www.exploit-db.com/exploits/3929 +CVE-2007-2729 - http://securityreason.com/securityalert/2714 +CVE-2007-2730 - http://securityreason.com/securityalert/2714 +CVE-2007-2731 - http://securityreason.com/securityalert/2710 +CVE-2007-2732 - http://securityreason.com/securityalert/2711 +CVE-2007-2733 - http://securityreason.com/securityalert/2711 +CVE-2007-2734 - http://securityreason.com/securityalert/2712 +CVE-2007-2735 - https://www.exploit-db.com/exploits/3931 +CVE-2007-2736 - https://www.exploit-db.com/exploits/3928 +CVE-2007-2738 - https://www.exploit-db.com/exploits/3932 +CVE-2007-2743 - https://www.exploit-db.com/exploits/3935 +CVE-2007-2749 - https://www.exploit-db.com/exploits/3943 +CVE-2007-2750 - https://www.exploit-db.com/exploits/3942 +CVE-2007-2751 - https://www.exploit-db.com/exploits/3941 +CVE-2007-2752 - https://www.exploit-db.com/exploits/3936 +CVE-2007-2753 - https://www.exploit-db.com/exploits/3936 +CVE-2007-2755 - https://www.exploit-db.com/exploits/3938 +CVE-2007-2756 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2007-2757 - http://securityreason.com/securityalert/2721 +CVE-2007-2758 - http://vuln.sg/winimage808000-en.html +CVE-2007-2761 - https://www.exploit-db.com/exploits/3945 +CVE-2007-2762 - https://www.exploit-db.com/exploits/3947 +CVE-2007-2770 - https://www.exploit-db.com/exploits/3934 +CVE-2007-2772 - http://securityreason.com/securityalert/2727 +CVE-2007-2772 - https://www.exploit-db.com/exploits/3939 +CVE-2007-2772 - https://www.exploit-db.com/exploits/3940 +CVE-2007-2773 - https://www.exploit-db.com/exploits/3955 +CVE-2007-2774 - https://www.exploit-db.com/exploits/3953 +CVE-2007-2775 - https://www.exploit-db.com/exploits/3957 +CVE-2007-2776 - https://www.exploit-db.com/exploits/3958 +CVE-2007-2777 - https://www.exploit-db.com/exploits/3959 +CVE-2007-2778 - https://www.exploit-db.com/exploits/3949 +CVE-2007-2779 - https://www.exploit-db.com/exploits/3948 +CVE-2007-2780 - http://marc.info/?l=full-disclosure&m=117948032428148&w=2 +CVE-2007-2782 - http://securityreason.com/securityalert/2726 +CVE-2007-2783 - http://securityreason.com/securityalert/2723 +CVE-2007-2785 - http://securityreason.com/securityalert/2729 +CVE-2007-2787 - https://www.exploit-db.com/exploits/3951 +CVE-2007-2787 - https://www.exploit-db.com/exploits/3952 +CVE-2007-2790 - http://securityreason.com/securityalert/2728 +CVE-2007-2792 - http://packetstormsecurity.org/0806-exploits/joomlayanc-sql.txt +CVE-2007-2792 - https://www.exploit-db.com/exploits/3944 +CVE-2007-2793 - https://www.exploit-db.com/exploits/3946 +CVE-2007-2797 - http://securityreason.com/securityalert/3066 +CVE-2007-2798 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt +CVE-2007-2798 - http://www.kb.cert.org/vuls/id/554257 +CVE-2007-2798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996 +CVE-2007-2801 - http://www.securityfocus.com/archive/1/472434/100/0/threaded +CVE-2007-2803 - https://www.exploit-db.com/exploits/4007 +CVE-2007-2809 - http://isc.sans.org/diary.html?storyid=2823 +CVE-2007-2810 - http://securityreason.com/securityalert/2715 +CVE-2007-2812 - http://securityreason.com/securityalert/2724 +CVE-2007-2815 - http://securityreason.com/securityalert/2725 +CVE-2007-2816 - https://www.exploit-db.com/exploits/3962 +CVE-2007-2817 - https://www.exploit-db.com/exploits/3964 +CVE-2007-2820 - http://marc.info/?l=full-disclosure&m=117981953312669&w=2 +CVE-2007-2821 - http://www.waraxe.us/advisory-50.html +CVE-2007-2822 - https://www.exploit-db.com/exploits/3963 +CVE-2007-2824 - https://www.exploit-db.com/exploits/3956 +CVE-2007-2826 - http://securityreason.com/securityalert/2718 +CVE-2007-2826 - https://www.exploit-db.com/exploits/4031 +CVE-2007-2833 - http://www.ubuntu.com/usn/usn-504-1 +CVE-2007-2834 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9967 +CVE-2007-2845 - http://marc.info/?l=full-disclosure&m=118000321419384&w=2 +CVE-2007-2846 - http://marc.info/?l=full-disclosure&m=118007660813710&w=2 +CVE-2007-2851 - https://www.exploit-db.com/exploits/3961 +CVE-2007-2852 - http://securityreason.com/securityalert/2733 +CVE-2007-2853 - https://www.exploit-db.com/exploits/3967 +CVE-2007-2854 - https://www.exploit-db.com/exploits/3970 +CVE-2007-2857 - http://securityreason.com/securityalert/2732 +CVE-2007-2858 - http://securityreason.com/securityalert/2731 +CVE-2007-2859 - http://securityreason.com/securityalert/2735 +CVE-2007-2860 - http://securityreason.com/securityalert/2736 +CVE-2007-2861 - http://securityreason.com/securityalert/2734 +CVE-2007-2862 - http://securityreason.com/securityalert/2730 +CVE-2007-2863 - http://securityreason.com/securityalert/2790 +CVE-2007-2865 - http://marc.info/?l=full-disclosure&m=117987658110713&w=2 +CVE-2007-2870 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9547 +CVE-2007-2872 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424 +CVE-2007-2875 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9251 +CVE-2007-2877 - http://sourceforge.net/project/shownotes.php?group_id=10894&release_id=503937 +CVE-2007-2879 - http://securityreason.com/securityalert/2737 +CVE-2007-2880 - http://securityreason.com/securityalert/2738 +CVE-2007-2883 - http://securityreason.com/securityalert/2753 +CVE-2007-2884 - https://www.exploit-db.com/exploits/3976 +CVE-2007-2884 - https://www.exploit-db.com/exploits/3977 +CVE-2007-2887 - http://securityreason.com/securityalert/2742 +CVE-2007-2888 - https://www.exploit-db.com/exploits/3978 +CVE-2007-2889 - https://www.exploit-db.com/exploits/3980 +CVE-2007-2890 - https://www.exploit-db.com/exploits/3981 +CVE-2007-2891 - https://www.exploit-db.com/exploits/3983 +CVE-2007-2898 - http://securityreason.com/securityalert/2752 +CVE-2007-2898 - http://www.waraxe.us/advisory-51.html +CVE-2007-2899 - https://www.exploit-db.com/exploits/3971 +CVE-2007-2900 - https://www.exploit-db.com/exploits/3972 +CVE-2007-2901 - https://www.exploit-db.com/exploits/3974 +CVE-2007-2902 - https://www.exploit-db.com/exploits/3974 +CVE-2007-2905 - http://securityreason.com/securityalert/2752 +CVE-2007-2905 - http://www.waraxe.us/advisory-51.html +CVE-2007-2908 - http://securityreason.com/securityalert/2751 +CVE-2007-2913 - http://securityreason.com/securityalert/2749 +CVE-2007-2914 - http://securityreason.com/securityalert/2750 +CVE-2007-2915 - http://securityreason.com/securityalert/2746 +CVE-2007-2916 - http://securityreason.com/securityalert/2745 +CVE-2007-2926 - http://www.ubuntu.com/usn/usn-491-1 +CVE-2007-2928 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-2929 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-2930 - http://www.trusteer.com/docs/bind8dns.html +CVE-2007-2931 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-054 +CVE-2007-2932 - http://securityreason.com/securityalert/2743 +CVE-2007-2933 - https://www.exploit-db.com/exploits/4003 +CVE-2007-2934 - https://www.exploit-db.com/exploits/3999 +CVE-2007-2935 - https://www.exploit-db.com/exploits/3998 +CVE-2007-2936 - https://www.exploit-db.com/exploits/3997 +CVE-2007-2937 - https://www.exploit-db.com/exploits/3995 +CVE-2007-2938 - https://www.exploit-db.com/exploits/3993 +CVE-2007-2939 - https://www.exploit-db.com/exploits/3994 +CVE-2007-2940 - https://www.exploit-db.com/exploits/3992 +CVE-2007-2941 - https://www.exploit-db.com/exploits/3990 +CVE-2007-2942 - https://www.exploit-db.com/exploits/3989 +CVE-2007-2943 - https://www.exploit-db.com/exploits/3987 +CVE-2007-2945 - http://securityreason.com/securityalert/2754 +CVE-2007-2946 - https://www.exploit-db.com/exploits/3986 +CVE-2007-2947 - https://www.exploit-db.com/exploits/3991 +CVE-2007-2958 - http://bugs.gentoo.org/show_bug.cgi?id=190104 +CVE-2007-2958 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-2959 - http://securityreason.com/securityalert/2747 +CVE-2007-2961 - http://sourceforge.net/project/shownotes.php?group_id=185741&release_id=512101 +CVE-2007-2962 - http://securityreason.com/securityalert/2748 +CVE-2007-2968 - http://securityreason.com/securityalert/2761 +CVE-2007-2969 - https://www.exploit-db.com/exploits/4000 +CVE-2007-2971 - https://www.exploit-db.com/exploits/3988 +CVE-2007-2972 - http://marc.info/?l=full-disclosure&m=118040810718045&w=2 +CVE-2007-2974 - http://securityreason.com/securityalert/2764 +CVE-2007-2975 - http://www.igniterealtime.org/issues/browse/JM-1049 +CVE-2007-2978 - http://securityreason.com/securityalert/2756 +CVE-2007-2979 - http://securityreason.com/securityalert/2755 +CVE-2007-2985 - https://www.exploit-db.com/exploits/4006 +CVE-2007-2986 - https://www.exploit-db.com/exploits/4005 +CVE-2007-2988 - http://securityreason.com/securityalert/2763 +CVE-2007-2988 - https://www.exploit-db.com/exploits/4004 +CVE-2007-2991 - http://securityreason.com/securityalert/2757 +CVE-2007-2992 - http://securityreason.com/securityalert/2759 +CVE-2007-2993 - http://securityreason.com/securityalert/2759 +CVE-2007-2994 - http://securityreason.com/securityalert/2762 +CVE-2007-2997 - http://securityreason.com/securityalert/2758 +CVE-2007-3000 - http://securityreason.com/securityalert/2768 +CVE-2007-3001 - http://securityreason.com/securityalert/2768 +CVE-2007-3002 - http://securityreason.com/securityalert/2768 +CVE-2007-3003 - http://securityreason.com/securityalert/2769 +CVE-2007-3006 - https://www.exploit-db.com/exploits/4017 +CVE-2007-3006 - https://www.exploit-db.com/exploits/6329 +CVE-2007-3010 - http://marc.info/?l=full-disclosure&m=119002152126755&w=2 +CVE-2007-3010 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php +CVE-2007-3011 - http://securityreason.com/securityalert/2858 +CVE-2007-3011 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php +CVE-2007-3012 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-003.php +CVE-2007-3013 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-004.php +CVE-2007-3014 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-005.php +CVE-2007-3017 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-006.php +CVE-2007-3018 - http://www.redteam-pentesting.de/advisories/rt-sa-2007-007.php +CVE-2007-3027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033 +CVE-2007-3028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-039 +CVE-2007-3029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 +CVE-2007-3030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-036 +CVE-2007-3032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 +CVE-2007-3033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 +CVE-2007-3034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-046 +CVE-2007-3038 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-038 +CVE-2007-3039 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-065 +CVE-2007-3039 - https://www.exploit-db.com/exploits/4745 +CVE-2007-3039 - https://www.exploit-db.com/exploits/4760 +CVE-2007-3039 - https://www.exploit-db.com/exploits/4934 +CVE-2007-3040 - http://securityreason.com/securityalert/3124 +CVE-2007-3040 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-051 +CVE-2007-3041 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 +CVE-2007-3047 - http://securityreason.com/securityalert/2771 +CVE-2007-3051 - https://www.exploit-db.com/exploits/4020 +CVE-2007-3052 - https://www.exploit-db.com/exploits/4026 +CVE-2007-3057 - https://www.exploit-db.com/exploits/4022 +CVE-2007-3059 - http://securityreason.com/securityalert/2770 +CVE-2007-3061 - http://securityreason.com/securityalert/2780 +CVE-2007-3065 - https://www.exploit-db.com/exploits/4019 +CVE-2007-3066 - http://securityreason.com/securityalert/2773 +CVE-2007-3068 - https://www.exploit-db.com/exploits/4024 +CVE-2007-3070 - http://securityreason.com/securityalert/2772 +CVE-2007-3072 - https://bugzilla.mozilla.org/show_bug.cgi?id=367428 +CVE-2007-3073 - https://bugzilla.mozilla.org/show_bug.cgi?id=367428 +CVE-2007-3074 - https://bugzilla.mozilla.org/show_bug.cgi?id=367428 +CVE-2007-3077 - https://www.exploit-db.com/exploits/4030 +CVE-2007-3080 - http://securityreason.com/securityalert/2766 +CVE-2007-3081 - http://securityreason.com/securityalert/2779 +CVE-2007-3082 - https://www.exploit-db.com/exploits/4029 +CVE-2007-3083 - http://securityreason.com/securityalert/2776 +CVE-2007-3085 - http://securityreason.com/securityalert/2777 +CVE-2007-3086 - http://securityreason.com/securityalert/2775 +CVE-2007-3087 - http://securityreason.com/securityalert/2774 +CVE-2007-3088 - http://securityreason.com/securityalert/2778 +CVE-2007-3089 - http://securityreason.com/securityalert/2781 +CVE-2007-3091 - http://securityreason.com/securityalert/2781 +CVE-2007-3091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2007-3092 - http://securityreason.com/securityalert/2781 +CVE-2007-3096 - https://www.exploit-db.com/exploits/4036 +CVE-2007-3098 - https://www.exploit-db.com/exploits/4033 +CVE-2007-3102 - http://www.redhat.com/support/errata/RHSA-2007-0703.html +CVE-2007-3103 - https://www.exploit-db.com/exploits/5167 +CVE-2007-3107 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9936 +CVE-2007-3108 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9984 +CVE-2007-3109 - http://securityreason.com/securityalert/2784 +CVE-2007-3111 - https://www.exploit-db.com/exploits/4023 +CVE-2007-3118 - https://www.exploit-db.com/exploits/4034 +CVE-2007-3119 - https://www.exploit-db.com/exploits/4040 +CVE-2007-3131 - http://securityreason.com/securityalert/2783 +CVE-2007-3132 - http://www.symantec.com/avcenter/security/Content/2007.06.05b.html +CVE-2007-3133 - http://securityreason.com/securityalert/2782 +CVE-2007-3135 - http://securityreason.com/securityalert/2787 +CVE-2007-3136 - https://www.exploit-db.com/exploits/4041 +CVE-2007-3137 - http://securityreason.com/securityalert/2789 +CVE-2007-3138 - https://www.exploit-db.com/exploits/4025 +CVE-2007-3139 - https://www.exploit-db.com/exploits/4025 +CVE-2007-3140 - https://www.exploit-db.com/exploits/4039 +CVE-2007-3141 - http://securityreason.com/securityalert/2786 +CVE-2007-3142 - http://www.0x000000.com/?i=334 +CVE-2007-3143 - http://www.0x000000.com/?i=334 +CVE-2007-3144 - http://www.0x000000.com/?i=334 +CVE-2007-3145 - http://www.0x000000.com/?i=334 +CVE-2007-3146 - http://securityreason.com/securityalert/2788 +CVE-2007-3147 - https://www.exploit-db.com/exploits/4042 +CVE-2007-3148 - https://www.exploit-db.com/exploits/4043 +CVE-2007-3157 - http://securityreason.com/securityalert/2803 +CVE-2007-3157 - http://www.digit-labs.org/files/exploits/safenet-dos.c +CVE-2007-3158 - http://securityreason.com/securityalert/2793 +CVE-2007-3159 - https://www.exploit-db.com/exploits/4046 +CVE-2007-3160 - https://www.exploit-db.com/exploits/4055 +CVE-2007-3161 - https://www.exploit-db.com/exploits/4058 +CVE-2007-3162 - http://www.exploit-db.com/exploits/14938 +CVE-2007-3162 - https://www.exploit-db.com/exploits/4056 +CVE-2007-3166 - https://www.exploit-db.com/exploits/4014 +CVE-2007-3167 - https://www.exploit-db.com/exploits/4015 +CVE-2007-3168 - https://www.exploit-db.com/exploits/4010 +CVE-2007-3169 - https://www.exploit-db.com/exploits/4009 +CVE-2007-3178 - http://securityreason.com/securityalert/2798 +CVE-2007-3179 - http://securityreason.com/securityalert/2799 +CVE-2007-3184 - http://securityreason.com/securityalert/2796 +CVE-2007-3188 - https://www.exploit-db.com/exploits/4057 +CVE-2007-3194 - http://securityreason.com/securityalert/2794 +CVE-2007-3196 - http://securityreason.com/securityalert/2795 +CVE-2007-3198 - http://securityreason.com/securityalert/2797 +CVE-2007-3199 - https://www.exploit-db.com/exploits/4059 +CVE-2007-3201 - http://securityreason.com/securityalert/2791 +CVE-2007-3202 - http://securityreason.com/securityalert/2792 +CVE-2007-3205 - http://securityreason.com/securityalert/2800 +CVE-2007-3214 - https://www.exploit-db.com/exploits/4054 +CVE-2007-3215 - http://seclists.org/fulldisclosure/2011/Oct/223 +CVE-2007-3215 - http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce +CVE-2007-3217 - http://securityreason.com/securityalert/2812 +CVE-2007-3220 - https://www.exploit-db.com/exploits/4070 +CVE-2007-3221 - https://www.exploit-db.com/exploits/4069 +CVE-2007-3222 - https://www.exploit-db.com/exploits/4068 +CVE-2007-3228 - https://www.exploit-db.com/exploits/4071 +CVE-2007-3230 - https://www.exploit-db.com/exploits/4072 +CVE-2007-3233 - https://www.exploit-db.com/exploits/4060 +CVE-2007-3234 - https://www.exploit-db.com/exploits/4062 +CVE-2007-3235 - https://www.exploit-db.com/exploits/4062 +CVE-2007-3236 - https://www.exploit-db.com/exploits/4064 +CVE-2007-3237 - https://www.exploit-db.com/exploits/4063 +CVE-2007-3248 - http://www.securityfocus.com/bid/24473 +CVE-2007-3249 - http://marc.info/?l=full-disclosure&m=118184411720509&w=2 +CVE-2007-3251 - https://www.exploit-db.com/exploits/4054 +CVE-2007-3254 - http://securityreason.com/securityalert/2845 +CVE-2007-3255 - http://securityreason.com/securityalert/2845 +CVE-2007-3256 - http://securityreason.com/securityalert/2845 +CVE-2007-3259 - http://securityreason.com/securityalert/2841 +CVE-2007-3266 - http://securityreason.com/securityalert/2816 +CVE-2007-3267 - http://securityreason.com/securityalert/2815 +CVE-2007-3269 - http://securityreason.com/securityalert/2825 +CVE-2007-3270 - https://www.exploit-db.com/exploits/4074 +CVE-2007-3271 - https://www.exploit-db.com/exploits/4075 +CVE-2007-3272 - https://www.exploit-db.com/exploits/4076 +CVE-2007-3274 - http://securityreason.com/securityalert/2810 +CVE-2007-3281 - http://securityreason.com/securityalert/2811 +CVE-2007-3282 - https://www.exploit-db.com/exploits/4067 +CVE-2007-3284 - http://lostmon.blogspot.com/2007/06/safari-301-552122-for-windows.html +CVE-2007-3288 - http://securityreason.com/securityalert/2826 +CVE-2007-3289 - https://www.exploit-db.com/exploits/4084 +CVE-2007-3290 - https://www.exploit-db.com/exploits/4082 +CVE-2007-3291 - https://www.exploit-db.com/exploits/4082 +CVE-2007-3292 - https://www.exploit-db.com/exploits/4082 +CVE-2007-3293 - https://www.exploit-db.com/exploits/4082 +CVE-2007-3294 - https://www.exploit-db.com/exploits/4080 +CVE-2007-3295 - http://securityreason.com/securityalert/2818 +CVE-2007-3297 - https://www.exploit-db.com/exploits/4085 +CVE-2007-3303 - http://securityreason.com/securityalert/2814 +CVE-2007-3304 - http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2 +CVE-2007-3304 - http://securityreason.com/securityalert/2814 +CVE-2007-3306 - https://www.exploit-db.com/exploits/4079 +CVE-2007-3307 - https://www.exploit-db.com/exploits/4078 +CVE-2007-3311 - http://securityreason.com/securityalert/2817 +CVE-2007-3311 - https://www.exploit-db.com/exploits/3588 +CVE-2007-3312 - https://www.exploit-db.com/exploits/4081 +CVE-2007-3313 - https://www.exploit-db.com/exploits/4081 +CVE-2007-3314 - http://vuln.sg/salamander25-en.html +CVE-2007-3323 - http://securityreason.com/securityalert/2819 +CVE-2007-3324 - http://securityreason.com/securityalert/2819 +CVE-2007-3325 - https://www.exploit-db.com/exploits/4086 +CVE-2007-3326 - http://securityreason.com/securityalert/2820 +CVE-2007-3327 - http://securityreason.com/securityalert/2828 +CVE-2007-3330 - http://securityreason.com/securityalert/2829 +CVE-2007-3331 - http://securityreason.com/securityalert/2829 +CVE-2007-3332 - http://securityreason.com/securityalert/2830 +CVE-2007-3339 - http://securityreason.com/securityalert/2842 +CVE-2007-3340 - http://securityreason.com/securityalert/2822 +CVE-2007-3342 - http://securityreason.com/securityalert/2821 +CVE-2007-3354 - http://securityreason.com/securityalert/2824 +CVE-2007-3355 - http://securityreason.com/securityalert/2824 +CVE-2007-3356 - http://securityreason.com/securityalert/2824 +CVE-2007-3357 - http://securityreason.com/securityalert/2824 +CVE-2007-3358 - https://www.exploit-db.com/exploits/4089 +CVE-2007-3360 - https://www.exploit-db.com/exploits/4087 +CVE-2007-3364 - http://securityreason.com/securityalert/2823 +CVE-2007-3365 - http://securityreason.com/securityalert/2827 +CVE-2007-3370 - https://www.exploit-db.com/exploits/4091 +CVE-2007-3371 - https://www.exploit-db.com/exploits/4090 +CVE-2007-3374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9524 +CVE-2007-3375 - http://vuln.sg/lhaca121-en.html +CVE-2007-3377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904 +CVE-2007-3378 - http://seclists.org/fulldisclosure/2020/Sep/34 +CVE-2007-3378 - http://securityreason.com/achievement_exploitalert/9 +CVE-2007-3378 - http://www.openwall.com/lists/oss-security/2020/09/17/3 +CVE-2007-3380 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9337 +CVE-2007-3382 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-3384 - http://securityreason.com/securityalert/2971 +CVE-2007-3385 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-3385 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9549 +CVE-2007-3386 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2007-3388 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9690 +CVE-2007-3389 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9964 +CVE-2007-3396 - http://securityreason.com/securityalert/2840 +CVE-2007-3398 - http://securityreason.com/securityalert/2835 +CVE-2007-3400 - https://www.exploit-db.com/exploits/4101 +CVE-2007-3401 - https://www.exploit-db.com/exploits/4102 +CVE-2007-3402 - https://www.exploit-db.com/exploits/4107 +CVE-2007-3403 - https://www.exploit-db.com/exploits/4106 +CVE-2007-3404 - https://www.exploit-db.com/exploits/4105 +CVE-2007-3407 - http://securityreason.com/securityalert/2832 +CVE-2007-3425 - https://www.exploit-db.com/exploits/4100 +CVE-2007-3426 - https://www.exploit-db.com/exploits/4100 +CVE-2007-3427 - https://www.exploit-db.com/exploits/4100 +CVE-2007-3429 - https://www.exploit-db.com/exploits/4099 +CVE-2007-3430 - https://www.exploit-db.com/exploits/4098 +CVE-2007-3431 - https://www.exploit-db.com/exploits/4097 +CVE-2007-3432 - https://www.exploit-db.com/exploits/4096 +CVE-2007-3433 - https://www.exploit-db.com/exploits/4095 +CVE-2007-3434 - https://www.exploit-db.com/exploits/4095 +CVE-2007-3435 - https://www.exploit-db.com/exploits/4094 +CVE-2007-3446 - https://www.exploit-db.com/exploits/4103 +CVE-2007-3447 - https://www.exploit-db.com/exploits/4103 +CVE-2007-3448 - https://www.exploit-db.com/exploits/4103 +CVE-2007-3449 - https://www.exploit-db.com/exploits/4104 +CVE-2007-3451 - https://www.exploit-db.com/exploits/4104 +CVE-2007-3452 - https://www.exploit-db.com/exploits/4108 +CVE-2007-3453 - http://securityreason.com/securityalert/2843 +CVE-2007-3456 - http://www.mindedsecurity.com/labs/advisories/MSA01110707 +CVE-2007-3459 - http://securityreason.com/securityalert/2844 +CVE-2007-3459 - https://www.exploit-db.com/exploits/4110 +CVE-2007-3460 - https://www.exploit-db.com/exploits/4112 +CVE-2007-3461 - https://www.exploit-db.com/exploits/4114 +CVE-2007-3470 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9165 +CVE-2007-3472 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2007-3473 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2007-3475 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2007-3475 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728 +CVE-2007-3476 - http://www.redhat.com/support/errata/RHSA-2008-0146.html +CVE-2007-3487 - http://securityreason.com/securityalert/2846 +CVE-2007-3487 - https://www.exploit-db.com/exploits/4119 +CVE-2007-3488 - https://www.exploit-db.com/exploits/4120 +CVE-2007-3489 - http://securityreason.com/securityalert/2848 +CVE-2007-3490 - http://pstgroup.blogspot.com/2007/06/exploitmicrosoft-excel-20002003-sheet.html +CVE-2007-3490 - https://www.exploit-db.com/exploits/4121 +CVE-2007-3491 - http://securityreason.com/securityalert/2851 +CVE-2007-3492 - http://securityreason.com/securityalert/2847 +CVE-2007-3493 - https://www.exploit-db.com/exploits/4109 +CVE-2007-3494 - http://securityreason.com/securityalert/2853 +CVE-2007-3495 - http://securityreason.com/securityalert/2849 +CVE-2007-3496 - http://securityreason.com/securityalert/2850 +CVE-2007-3500 - http://securityreason.com/securityalert/2852 +CVE-2007-3505 - https://www.exploit-db.com/exploits/4115 +CVE-2007-3507 - http://securityreason.com/securityalert/2854 +CVE-2007-3511 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9763 +CVE-2007-3512 - http://vuln.sg/lhaca121-en.html +CVE-2007-3513 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9883 +CVE-2007-3515 - https://www.exploit-db.com/exploits/4130 +CVE-2007-3518 - https://www.exploit-db.com/exploits/4136 +CVE-2007-3519 - https://www.exploit-db.com/exploits/4135 +CVE-2007-3520 - https://www.exploit-db.com/exploits/4134 +CVE-2007-3521 - https://www.exploit-db.com/exploits/4133 +CVE-2007-3522 - https://www.exploit-db.com/exploits/4132 +CVE-2007-3523 - https://www.exploit-db.com/exploits/4131 +CVE-2007-3524 - https://www.exploit-db.com/exploits/4129 +CVE-2007-3526 - https://www.exploit-db.com/exploits/4128 +CVE-2007-3534 - https://www.exploit-db.com/exploits/4125 +CVE-2007-3535 - https://www.exploit-db.com/exploits/4124 +CVE-2007-3536 - https://www.exploit-db.com/exploits/4123 +CVE-2007-3539 - https://www.exploit-db.com/exploits/5222 +CVE-2007-3542 - https://www.exploit-db.com/exploits/4096 +CVE-2007-3543 - http://www.buayacorp.com/files/wordpress/wordpress-advisory.html +CVE-2007-3544 - http://www.buayacorp.com/files/wordpress/wordpress-advisory.html +CVE-2007-3547 - https://www.exploit-db.com/exploits/4116 +CVE-2007-3548 - https://www.exploit-db.com/exploits/4126 +CVE-2007-3549 - https://www.exploit-db.com/exploits/4127 +CVE-2007-3550 - http://securityreason.com/securityalert/2855 +CVE-2007-3555 - http://securityreason.com/securityalert/2857 +CVE-2007-3555 - http://securityvulns.ru/Rdocument391.html +CVE-2007-3555 - http://websecurity.com.ua/1045/ +CVE-2007-3556 - http://securityreason.com/securityalert/2857 +CVE-2007-3557 - http://securityreason.com/securityalert/2856 +CVE-2007-3559 - http://www.xssed.com/advisory/60/PHP-FUSION_FUSION_QUERY_Cross-Site_Scripting_Vulnerability/ +CVE-2007-3562 - https://www.exploit-db.com/exploits/4139 +CVE-2007-3563 - https://www.exploit-db.com/exploits/4138 +CVE-2007-3567 - http://securityreason.com/securityalert/2859 +CVE-2007-3569 - http://securityreason.com/securityalert/2868 +CVE-2007-3573 - http://securityreason.com/securityalert/2860 +CVE-2007-3574 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ +CVE-2007-3575 - http://securityreason.com/securityalert/2862 +CVE-2007-3582 - https://www.exploit-db.com/exploits/4141 +CVE-2007-3583 - https://www.exploit-db.com/exploits/4142 +CVE-2007-3584 - https://www.exploit-db.com/exploits/4147 +CVE-2007-3585 - https://www.exploit-db.com/exploits/4144 +CVE-2007-3586 - https://www.exploit-db.com/exploits/4144 +CVE-2007-3587 - https://www.exploit-db.com/exploits/4145 +CVE-2007-3588 - http://securityreason.com/securityalert/2861 +CVE-2007-3589 - https://www.exploit-db.com/exploits/4122 +CVE-2007-3590 - https://www.exploit-db.com/exploits/4122 +CVE-2007-3597 - http://securityreason.com/securityalert/2866 +CVE-2007-3605 - http://securityreason.com/securityalert/2873 +CVE-2007-3605 - https://www.exploit-db.com/exploits/4148 +CVE-2007-3606 - https://www.exploit-db.com/exploits/4149 +CVE-2007-3607 - http://securityreason.com/securityalert/2873 +CVE-2007-3607 - https://www.exploit-db.com/exploits/4148 +CVE-2007-3607 - https://www.exploit-db.com/exploits/4149 +CVE-2007-3608 - http://securityreason.com/securityalert/2873 +CVE-2007-3608 - https://www.exploit-db.com/exploits/4148 +CVE-2007-3608 - https://www.exploit-db.com/exploits/4149 +CVE-2007-3609 - https://www.exploit-db.com/exploits/4154 +CVE-2007-3610 - https://www.exploit-db.com/exploits/4153 +CVE-2007-3611 - https://www.exploit-db.com/exploits/4150 +CVE-2007-3612 - https://www.exploit-db.com/exploits/4152 +CVE-2007-3613 - http://securityreason.com/securityalert/2865 +CVE-2007-3614 - http://securityreason.com/securityalert/2867 +CVE-2007-3619 - http://securityreason.com/securityalert/2864 +CVE-2007-3619 - http://www.netragard.com/pdfs/research/NETRAGARD-20070628-MAILGUARD.txt +CVE-2007-3621 - http://securityreason.com/securityalert/2863 +CVE-2007-3621 - https://www.exploit-db.com/exploits/4151 +CVE-2007-3630 - https://www.exploit-db.com/exploits/4163 +CVE-2007-3631 - https://www.exploit-db.com/exploits/4159 +CVE-2007-3632 - https://www.exploit-db.com/exploits/4156 +CVE-2007-3633 - https://www.exploit-db.com/exploits/4160 +CVE-2007-3639 - http://securityreason.com/securityalert/2869 +CVE-2007-3640 - http://securityreason.com/securityalert/2882 +CVE-2007-3646 - https://www.exploit-db.com/exploits/4161 +CVE-2007-3647 - http://securityreason.com/securityalert/2870 +CVE-2007-3649 - https://www.exploit-db.com/exploits/4155 +CVE-2007-3655 - http://www.exploit-db.com/exploits/30284 +CVE-2007-3656 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9105 +CVE-2007-3657 - http://www.securityfocus.com/archive/1/473212 +CVE-2007-3658 - http://www.securityfocus.com/archive/1/473212 +CVE-2007-3662 - http://www.securityfocus.com/archive/1/473212 +CVE-2007-3663 - http://www.securityfocus.com/archive/1/473212 +CVE-2007-3665 - http://www.securityfocus.com/archive/1/473212 +CVE-2007-3666 - http://www.securityfocus.com/archive/1/473212 +CVE-2007-3670 - http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/ +CVE-2007-3670 - http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/ +CVE-2007-3671 - http://www.immunityinc.com/downloads/0day_IPO.pdf +CVE-2007-3675 - http://www.kaspersky.com/news?id=207575572 +CVE-2007-3678 - http://vuln.sg/quarkxpress72-en.html +CVE-2007-3681 - https://www.exploit-db.com/exploits/4165 +CVE-2007-3682 - https://www.exploit-db.com/exploits/4167 +CVE-2007-3683 - https://www.exploit-db.com/exploits/4164 +CVE-2007-3687 - https://www.exploit-db.com/exploits/4166 +CVE-2007-3697 - http://securityreason.com/securityalert/2881 +CVE-2007-3697 - https://www.exploit-db.com/exploits/4169 +CVE-2007-3702 - https://www.exploit-db.com/exploits/4171 +CVE-2007-3703 - http://www.exploit-db.com/exploits/4170 +CVE-2007-3726 - http://securityreason.com/securityalert/2880 +CVE-2007-3738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9875 +CVE-2007-3740 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9953 +CVE-2007-3742 - http://isc.sans.org/diary.html?storyid=3214 +CVE-2007-3743 - http://isc.sans.org/diary.html?storyid=3214 +CVE-2007-3768 - http://marc.info/?l=full-disclosure&m=118409539009277&w=2 +CVE-2007-3768 - http://securityreason.com/securityalert/2883 +CVE-2007-3769 - http://marc.info/?l=full-disclosure&m=118409539009277&w=2 +CVE-2007-3772 - https://www.exploit-db.com/exploits/4174 +CVE-2007-3773 - http://chxsecurity.org/advisories/adv-2-mid.txt +CVE-2007-3773 - http://securityreason.com/securityalert/2896 +CVE-2007-3774 - http://securityreason.com/securityalert/2886 +CVE-2007-3777 - http://securityreason.com/securityalert/2887 +CVE-2007-3778 - http://www.attrition.org/pipermail/vim/2007-July/001704.html +CVE-2007-3778 - http://www.attrition.org/pipermail/vim/2007-July/001710.html +CVE-2007-3778 - https://exchange.xforce.ibmcloud.com/vulnerabilities/35363 +CVE-2007-3781 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9195 +CVE-2007-3790 - https://www.exploit-db.com/exploits/4175 +CVE-2007-3792 - http://securityreason.com/securityalert/2888 +CVE-2007-3798 - http://bugs.gentoo.org/show_bug.cgi?id=184815 +CVE-2007-3798 - http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c +CVE-2007-3798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771 +CVE-2007-3799 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9792 +CVE-2007-3803 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf +CVE-2007-3803 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf +CVE-2007-3804 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf +CVE-2007-3804 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf +CVE-2007-3805 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf +CVE-2007-3805 - http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf +CVE-2007-3807 - http://securityreason.com/securityalert/2893 +CVE-2007-3808 - http://www.exploit-db.com/exploits/4186 +CVE-2007-3809 - https://www.exploit-db.com/exploits/4185 +CVE-2007-3810 - https://www.exploit-db.com/exploits/4184 +CVE-2007-3811 - https://www.exploit-db.com/exploits/4183 +CVE-2007-3813 - https://www.exploit-db.com/exploits/4180 +CVE-2007-3814 - https://www.exploit-db.com/exploits/4179 +CVE-2007-3815 - http://securityreason.com/securityalert/2898 +CVE-2007-3821 - http://securityreason.com/securityalert/2890 +CVE-2007-3822 - http://securityreason.com/securityalert/2890 +CVE-2007-3823 - http://packetstormsecurity.org/0707-advisories/wsftp75290-dos.txt +CVE-2007-3824 - http://www.packetstormsecurity.org/0707-exploits/mzkblog-sql.txt +CVE-2007-3826 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-3826 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 +CVE-2007-3834 - http://securityreason.com/securityalert/2889 +CVE-2007-3835 - http://securityreason.com/securityalert/2889 +CVE-2007-3840 - https://www.exploit-db.com/exploits/4187 +CVE-2007-3843 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9670 +CVE-2007-3844 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9493 +CVE-2007-3846 - http://crisp.cs.du.edu/?q=node/36 +CVE-2007-3847 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2007-3871 - http://securityreason.com/securityalert/3129 +CVE-2007-3876 - https://www.exploit-db.com/exploits/4759 +CVE-2007-3881 - https://www.exploit-db.com/exploits/4191 +CVE-2007-3882 - https://www.exploit-db.com/exploits/4189 +CVE-2007-3883 - https://www.exploit-db.com/exploits/4190 +CVE-2007-3883 - https://www.exploit-db.com/exploits/5395 +CVE-2007-3887 - http://www.packetstormsecurity.org/0707-exploits/aspziy-xss.txt +CVE-2007-3889 - https://www.exploit-db.com/exploits/5774 +CVE-2007-3890 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-044 +CVE-2007-3891 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048 +CVE-2007-3892 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-3892 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 +CVE-2007-3893 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-3893 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 +CVE-2007-3895 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-064 +CVE-2007-3896 - http://www.heise-security.co.uk/news/96982 +CVE-2007-3897 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-3897 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-056 +CVE-2007-3898 - http://securityreason.com/securityalert/3373 +CVE-2007-3898 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-062 +CVE-2007-3899 - http://www.securityfocus.com/archive/1/482366/100/0/threaded +CVE-2007-3901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-064 +CVE-2007-3901 - https://www.exploit-db.com/exploits/4866 +CVE-2007-3902 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 +CVE-2007-3903 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 +CVE-2007-3919 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9913 +CVE-2007-3928 - http://securityreason.com/securityalert/2906 +CVE-2007-3932 - https://www.exploit-db.com/exploits/4194 +CVE-2007-3933 - https://www.exploit-db.com/exploits/4193 +CVE-2007-3934 - https://www.exploit-db.com/exploits/4195 +CVE-2007-3935 - https://www.exploit-db.com/exploits/4197 +CVE-2007-3936 - https://www.exploit-db.com/exploits/4198 +CVE-2007-3937 - https://www.exploit-db.com/exploits/4198 +CVE-2007-3938 - https://www.exploit-db.com/exploits/4199 +CVE-2007-3939 - https://www.exploit-db.com/exploits/4192 +CVE-2007-3940 - http://packetstormsecurity.org/0707-advisories/quickersite-xss.txt +CVE-2007-3944 - http://www.nytimes.com/2007/07/23/technology/23iphone.html?_r=1&adxnnl=1&adxnnlx=1185163364-1OTsRJvbylLamj17FY2wnw&oref=slogin +CVE-2007-3951 - http://securityreason.com/securityalert/2912 +CVE-2007-3952 - http://securityreason.com/securityalert/2913 +CVE-2007-3953 - http://securityreason.com/securityalert/2914 +CVE-2007-3955 - https://www.exploit-db.com/exploits/4217 +CVE-2007-3956 - https://www.exploit-db.com/exploits/4205 +CVE-2007-3957 - https://www.exploit-db.com/exploits/4216 +CVE-2007-3958 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html +CVE-2007-3958 - https://www.exploit-db.com/exploits/4215 +CVE-2007-3963 - http://securityreason.com/securityalert/2915 +CVE-2007-3969 - http://securityreason.com/securityalert/2920 +CVE-2007-3970 - http://securityreason.com/securityalert/2922 +CVE-2007-3971 - http://securityreason.com/securityalert/2923 +CVE-2007-3972 - http://securityreason.com/securityalert/2924 +CVE-2007-3973 - https://www.exploit-db.com/exploits/4211 +CVE-2007-3974 - https://www.exploit-db.com/exploits/4211 +CVE-2007-3975 - http://securityreason.com/securityalert/2933 +CVE-2007-3976 - https://www.exploit-db.com/exploits/4213 +CVE-2007-3977 - https://www.exploit-db.com/exploits/4213 +CVE-2007-3978 - https://www.exploit-db.com/exploits/4213 +CVE-2007-3979 - https://www.exploit-db.com/exploits/4206 +CVE-2007-3980 - https://www.exploit-db.com/exploits/4210 +CVE-2007-3981 - https://www.exploit-db.com/exploits/4209 +CVE-2007-3982 - https://www.exploit-db.com/exploits/4208 +CVE-2007-3984 - https://www.exploit-db.com/exploits/4214 +CVE-2007-3988 - http://securityreason.com/securityalert/2926 +CVE-2007-3996 - http://securityreason.com/securityalert/3103 +CVE-2007-3997 - http://securityreason.com/securityalert/3102 +CVE-2007-3997 - https://www.exploit-db.com/exploits/4392 +CVE-2007-3999 - http://securityreason.com/securityalert/3092 +CVE-2007-3999 - http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt +CVE-2007-3999 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9379 +CVE-2007-4000 - http://securityreason.com/securityalert/3092 +CVE-2007-4000 - http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt +CVE-2007-4000 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9278 +CVE-2007-4005 - https://www.exploit-db.com/exploits/4222 +CVE-2007-4007 - https://www.exploit-db.com/exploits/4221 +CVE-2007-4008 - https://www.exploit-db.com/exploits/4220 +CVE-2007-4009 - https://www.exploit-db.com/exploits/4219 +CVE-2007-4010 - https://www.exploit-db.com/exploits/4218 +CVE-2007-4022 - http://securityreason.com/securityalert/2930 +CVE-2007-4031 - https://www.exploit-db.com/exploits/4230 +CVE-2007-4032 - https://www.exploit-db.com/exploits/4229 +CVE-2007-4033 - https://www.exploit-db.com/exploits/4227 +CVE-2007-4038 - http://seclists.org/fulldisclosure/2007/Jul/0557.html +CVE-2007-4039 - http://seclists.org/fulldisclosure/2007/Jul/0557.html +CVE-2007-4040 - http://seclists.org/fulldisclosure/2007/Jul/0557.html +CVE-2007-4045 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9303 +CVE-2007-4046 - https://www.exploit-db.com/exploits/4201 +CVE-2007-4047 - http://securityreason.com/securityalert/2934 +CVE-2007-4053 - https://www.exploit-db.com/exploits/4242 +CVE-2007-4054 - https://www.exploit-db.com/exploits/4241 +CVE-2007-4055 - https://www.exploit-db.com/exploits/4239 +CVE-2007-4056 - https://www.exploit-db.com/exploits/4238 +CVE-2007-4057 - https://www.exploit-db.com/exploits/4235 +CVE-2007-4058 - https://www.exploit-db.com/exploits/4244 +CVE-2007-4059 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-4059 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-4059 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-4059 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-4059 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-4059 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-4059 - https://www.exploit-db.com/exploits/4240 +CVE-2007-4060 - https://www.exploit-db.com/exploits/4243 +CVE-2007-4061 - https://www.exploit-db.com/exploits/4237 +CVE-2007-4065 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9173 +CVE-2007-4067 - https://www.exploit-db.com/exploits/4226 +CVE-2007-4068 - https://www.exploit-db.com/exploits/4224 +CVE-2007-4069 - https://www.exploit-db.com/exploits/4225 +CVE-2007-4071 - http://securityreason.com/securityalert/2946 +CVE-2007-4093 - http://securityreason.com/securityalert/2931 +CVE-2007-4094 - http://securityreason.com/securityalert/2932 +CVE-2007-4095 - http://securityreason.com/securityalert/2935 +CVE-2007-4101 - http://securityreason.com/securityalert/2937 +CVE-2007-4102 - http://securityreason.com/securityalert/2942 +CVE-2007-4108 - http://securityreason.com/securityalert/2948 +CVE-2007-4109 - http://securityreason.com/securityalert/2947 +CVE-2007-4110 - http://securityreason.com/securityalert/2936 +CVE-2007-4111 - http://securityreason.com/securityalert/2949 +CVE-2007-4114 - http://securityreason.com/securityalert/2945 +CVE-2007-4115 - http://securityreason.com/securityalert/2953 +CVE-2007-4117 - http://securityreason.com/securityalert/2940 +CVE-2007-4118 - http://securityreason.com/securityalert/2939 +CVE-2007-4119 - http://securityreason.com/securityalert/2943 +CVE-2007-4120 - http://securityreason.com/securityalert/2941 +CVE-2007-4121 - http://securityreason.com/securityalert/2944 +CVE-2007-4126 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9039 +CVE-2007-4127 - http://securityreason.com/securityalert/2938 +CVE-2007-4128 - https://www.exploit-db.com/exploits/4248 +CVE-2007-4135 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9864 +CVE-2007-4136 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871 +CVE-2007-4138 - http://securityreason.com/securityalert/3135 +CVE-2007-4140 - https://www.exploit-db.com/exploits/4252 +CVE-2007-4145 - http://securityreason.com/securityalert/2959 +CVE-2007-4155 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-4155 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-4155 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-4155 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-4155 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-4155 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-4155 - https://www.exploit-db.com/exploits/4245 +CVE-2007-4156 - https://www.exploit-db.com/exploits/4246 +CVE-2007-4171 - https://www.exploit-db.com/exploits/4254 +CVE-2007-4180 - http://securityreason.com/securityalert/2973 +CVE-2007-4181 - http://securityreason.com/securityalert/2973 +CVE-2007-4182 - http://securityreason.com/securityalert/2972 +CVE-2007-4183 - https://www.exploit-db.com/exploits/4253 +CVE-2007-4186 - http://securityreason.com/securityalert/2979 +CVE-2007-4187 - http://securityreason.com/securityalert/2969 +CVE-2007-4191 - http://securityreason.com/securityalert/2968 +CVE-2007-4203 - http://securityreason.com/securityalert/2970 +CVE-2007-4205 - http://securityreason.com/securityalert/2978 +CVE-2007-4207 - http://securityreason.com/securityalert/2977 +CVE-2007-4208 - http://securityreason.com/securityalert/2976 +CVE-2007-4210 - http://securityreason.com/securityalert/2975 +CVE-2007-4212 - http://securityreason.com/securityalert/2974 +CVE-2007-4213 - http://securityreason.com/securityalert/3034 +CVE-2007-4218 - http://securityreason.com/securityalert/3052 +CVE-2007-4219 - http://securityreason.com/securityalert/3052 +CVE-2007-4224 - http://securityreason.com/securityalert/2982 +CVE-2007-4224 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879 +CVE-2007-4225 - http://securityreason.com/securityalert/2982 +CVE-2007-4226 - http://securityreason.com/securityalert/2986 +CVE-2007-4227 - http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html +CVE-2007-4231 - https://www.exploit-db.com/exploits/4267 +CVE-2007-4232 - https://www.exploit-db.com/exploits/4268 +CVE-2007-4235 - http://securityreason.com/securityalert/2983 +CVE-2007-4242 - http://securityreason.com/securityalert/2981 +CVE-2007-4243 - http://securityreason.com/securityalert/2981 +CVE-2007-4244 - http://securityreason.com/securityalert/2984 +CVE-2007-4245 - http://securityreason.com/securityalert/2980 +CVE-2007-4247 - http://securityreason.com/securityalert/3004 +CVE-2007-4248 - http://securityreason.com/securityalert/3004 +CVE-2007-4249 - http://securityreason.com/securityalert/3004 +CVE-2007-4250 - http://securityreason.com/securityalert/3004 +CVE-2007-4251 - http://securityreason.com/securityalert/3004 +CVE-2007-4252 - https://www.exploit-db.com/exploits/4255 +CVE-2007-4253 - https://www.exploit-db.com/exploits/4256 +CVE-2007-4254 - https://www.exploit-db.com/exploits/4259 +CVE-2007-4255 - https://www.exploit-db.com/exploits/4260 +CVE-2007-4256 - https://www.exploit-db.com/exploits/4261 +CVE-2007-4257 - https://www.exploit-db.com/exploits/4262 +CVE-2007-4257 - https://www.exploit-db.com/exploits/4263 +CVE-2007-4258 - https://www.exploit-db.com/exploits/4265 +CVE-2007-4259 - http://securityreason.com/securityalert/2985 +CVE-2007-4260 - http://securityreason.com/securityalert/2985 +CVE-2007-4261 - http://securityreason.com/securityalert/2985 +CVE-2007-4262 - http://securityreason.com/securityalert/2985 +CVE-2007-4279 - https://www.exploit-db.com/exploits/4269 +CVE-2007-4283 - http://securityreason.com/securityalert/2989 +CVE-2007-4287 - https://www.exploit-db.com/exploits/4271 +CVE-2007-4288 - http://securityreason.com/securityalert/2987 +CVE-2007-4290 - http://securityreason.com/securityalert/2988 +CVE-2007-4297 - http://www.packetstormsecurity.org/0708-exploits/dersimiz-xss.txt +CVE-2007-4309 - http://www.heise-security.co.uk/news/92958 +CVE-2007-4312 - https://www.exploit-db.com/exploits/4275 +CVE-2007-4313 - https://www.exploit-db.com/exploits/4276 +CVE-2007-4314 - https://www.exploit-db.com/exploits/4278 +CVE-2007-4316 - http://securityreason.com/securityalert/3002 +CVE-2007-4317 - http://securityreason.com/securityalert/3002 +CVE-2007-4318 - http://securityreason.com/securityalert/3002 +CVE-2007-4319 - http://securityreason.com/securityalert/3002 +CVE-2007-4320 - https://www.exploit-db.com/exploits/4273 +CVE-2007-4324 - http://scan.flashsec.org/ +CVE-2007-4324 - http://securityreason.com/securityalert/2995 +CVE-2007-4325 - http://securityreason.com/securityalert/2994 +CVE-2007-4327 - http://securityreason.com/securityalert/3000 +CVE-2007-4328 - http://securityreason.com/securityalert/2999 +CVE-2007-4329 - http://securityreason.com/securityalert/2998 +CVE-2007-4330 - http://securityreason.com/securityalert/2997 +CVE-2007-4336 - https://www.exploit-db.com/exploits/4279 +CVE-2007-4339 - http://securityreason.com/securityalert/3008 +CVE-2007-4342 - http://securityreason.com/securityalert/3005 +CVE-2007-4349 - http://securityreason.com/securityalert/4501 +CVE-2007-4350 - http://securityreason.com/securityalert/4447 +CVE-2007-4351 - http://www.cups.org/str.php?L2561 +CVE-2007-4352 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9979 +CVE-2007-4358 - http://aluigi.altervista.org/adv/zoidboom2-adv.txt +CVE-2007-4358 - http://aluigi.org/poc/zoidboom2.zip +CVE-2007-4358 - http://securityreason.com/securityalert/3014 +CVE-2007-4362 - https://www.exploit-db.com/exploits/4284 +CVE-2007-4366 - http://securityreason.com/securityalert/3015 +CVE-2007-4366 - https://www.exploit-db.com/exploits/4281 +CVE-2007-4368 - https://www.exploit-db.com/exploits/4286 +CVE-2007-4369 - https://www.exploit-db.com/exploits/4282 +CVE-2007-4370 - https://www.exploit-db.com/exploits/4283 +CVE-2007-4371 - http://securityreason.com/securityalert/3016 +CVE-2007-4373 - http://aluigi.altervista.org/adv/bv2x-adv.txt +CVE-2007-4373 - http://securityreason.com/securityalert/3024 +CVE-2007-4374 - http://aluigi.altervista.org/adv/bv2x-adv.txt +CVE-2007-4374 - http://securityreason.com/securityalert/3024 +CVE-2007-4375 - http://securityreason.com/securityalert/3018 +CVE-2007-4376 - http://securityreason.com/securityalert/3019 +CVE-2007-4377 - https://www.exploit-db.com/exploits/4287 +CVE-2007-4378 - http://aluigi.altervista.org/adv/bv2x-adv.txt +CVE-2007-4378 - http://securityreason.com/securityalert/3024 +CVE-2007-4379 - http://aluigi.altervista.org/adv/bv2x-adv.txt +CVE-2007-4379 - http://securityreason.com/securityalert/3024 +CVE-2007-4382 - http://securityreason.com/securityalert/3027 +CVE-2007-4382 - https://www.exploit-db.com/exploits/4285 +CVE-2007-4385 - http://securityreason.com/securityalert/3035 +CVE-2007-4386 - https://www.exploit-db.com/exploits/4291 +CVE-2007-4396 - http://securityreason.com/securityalert/3036 +CVE-2007-4397 - http://securityreason.com/securityalert/3036 +CVE-2007-4398 - http://securityreason.com/securityalert/3036 +CVE-2007-4399 - http://securityreason.com/securityalert/3036 +CVE-2007-4400 - http://securityreason.com/securityalert/3036 +CVE-2007-4401 - http://securityreason.com/securityalert/3036 +CVE-2007-4402 - http://securityreason.com/securityalert/3036 +CVE-2007-4403 - http://securityreason.com/securityalert/3036 +CVE-2007-4404 - http://securityreason.com/securityalert/3031 +CVE-2007-4405 - http://securityreason.com/securityalert/3031 +CVE-2007-4406 - http://securityreason.com/securityalert/3031 +CVE-2007-4407 - http://securityreason.com/securityalert/3031 +CVE-2007-4408 - http://securityreason.com/securityalert/3031 +CVE-2007-4409 - http://securityreason.com/securityalert/3031 +CVE-2007-4410 - http://securityreason.com/securityalert/3031 +CVE-2007-4411 - http://securityreason.com/securityalert/3031 +CVE-2007-4420 - https://www.exploit-db.com/exploits/4290 +CVE-2007-4424 - http://securityreason.com/securityalert/3022 +CVE-2007-4425 - http://securityreason.com/securityalert/3030 +CVE-2007-4426 - http://securityreason.com/securityalert/3030 +CVE-2007-4429 - http://blogs.csoonline.com/the_skype_mystery_why_blame_the_august_windows_updates +CVE-2007-4429 - http://en.securitylab.ru/poc/301420.php +CVE-2007-4429 - http://en.securitylab.ru/poc/extra/301419.php +CVE-2007-4429 - http://securityreason.com/securityalert/3032 +CVE-2007-4429 - http://www.securitylab.ru/news/301422.php +CVE-2007-4430 - http://www.heise-security.co.uk/news/94526/ +CVE-2007-4431 - http://www.thespanner.co.uk/2007/08/17/safari-beta-zero-day/ +CVE-2007-4433 - http://www.packetstormsecurity.org/0708-exploits/aspnet-xss.txt +CVE-2007-4434 - http://www.packetstormsecurity.org/0708-exploits/tfsc-xss.txt +CVE-2007-4439 - https://www.exploit-db.com/exploits/4295 +CVE-2007-4440 - https://www.exploit-db.com/exploits/4294 +CVE-2007-4441 - https://www.exploit-db.com/exploits/4293 +CVE-2007-4442 - http://aluigi.org/adv/unrwebdos-adv.txt +CVE-2007-4442 - http://aluigi.org/poc/unrwebdos.zip +CVE-2007-4442 - http://securityreason.com/securityalert/3039 +CVE-2007-4443 - http://aluigi.org/adv/unrwebdos-adv.txt +CVE-2007-4443 - http://aluigi.org/poc/unrwebdos.zip +CVE-2007-4443 - http://securityreason.com/securityalert/3039 +CVE-2007-4444 - http://aluigi.org/poc/rfactorx.zip +CVE-2007-4444 - http://securityreason.com/securityalert/3037 +CVE-2007-4445 - http://aluigi.org/poc/rfactorx.zip +CVE-2007-4445 - http://securityreason.com/securityalert/3037 +CVE-2007-4446 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4446 - http://securityreason.com/securityalert/3033 +CVE-2007-4447 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4447 - http://securityreason.com/securityalert/3033 +CVE-2007-4448 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4448 - http://securityreason.com/securityalert/3033 +CVE-2007-4449 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4449 - http://securityreason.com/securityalert/3033 +CVE-2007-4450 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4450 - http://securityreason.com/securityalert/3033 +CVE-2007-4451 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4451 - http://securityreason.com/securityalert/3033 +CVE-2007-4452 - http://aluigi.org/poc/toribashish.zip +CVE-2007-4452 - http://securityreason.com/securityalert/3033 +CVE-2007-4454 - http://securityreason.com/securityalert/3038 +CVE-2007-4456 - https://www.exploit-db.com/exploits/4296 +CVE-2007-4463 - http://securityreason.com/securityalert/3044 +CVE-2007-4464 - http://securityreason.com/securityalert/3044 +CVE-2007-4465 - http://securityreason.com/securityalert/3113 +CVE-2007-4474 - https://www.exploit-db.com/exploits/4818 +CVE-2007-4474 - https://www.exploit-db.com/exploits/4820 +CVE-2007-4474 - https://www.exploit-db.com/exploits/5111 +CVE-2007-4476 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336 +CVE-2007-4484 - http://securityvulns.com/Rdocument846.html +CVE-2007-4485 - http://securityvulns.com/Rdocument845.html +CVE-2007-4486 - http://securityvulns.com/Rdocument752.html +CVE-2007-4487 - http://securityreason.com/securityalert/3051 +CVE-2007-4488 - http://securityreason.com/securityalert/3050 +CVE-2007-4489 - https://www.exploit-db.com/exploits/4299 +CVE-2007-4490 - http://securityreason.com/securityalert/3052 +CVE-2007-4496 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-4496 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-4496 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-4496 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-4496 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-4496 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-4497 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-4497 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-4497 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-4497 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-4497 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-4497 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-4498 - http://securityreason.com/securityalert/3059 +CVE-2007-4502 - https://www.exploit-db.com/exploits/4310 +CVE-2007-4503 - https://www.exploit-db.com/exploits/4308 +CVE-2007-4503 - https://www.exploit-db.com/exploits/6794 +CVE-2007-4504 - https://www.exploit-db.com/exploits/4307 +CVE-2007-4505 - https://www.exploit-db.com/exploits/4306 +CVE-2007-4506 - https://www.exploit-db.com/exploits/4305 +CVE-2007-4507 - https://www.exploit-db.com/exploits/4304 +CVE-2007-4508 - http://aluigi.altervista.org/adv/asurabof-adv.txt +CVE-2007-4508 - http://securityreason.com/securityalert/3053 +CVE-2007-4509 - https://www.exploit-db.com/exploits/4309 +CVE-2007-4510 - http://securityreason.com/securityalert/3054 +CVE-2007-4512 - http://securityreason.com/securityalert/3107 +CVE-2007-4517 - http://securityreason.com/securityalert/8524 +CVE-2007-4521 - http://securityreason.com/securityalert/3065 +CVE-2007-4522 - http://securityreason.com/securityalert/3058 +CVE-2007-4523 - http://securityreason.com/securityalert/3058 +CVE-2007-4524 - http://securityreason.com/securityalert/3055 +CVE-2007-4524 - https://www.exploit-db.com/exploits/4382 +CVE-2007-4525 - http://securityreason.com/securityalert/3056 +CVE-2007-4528 - https://www.exploit-db.com/exploits/4311 +CVE-2007-4531 - http://aluigi.altervista.org/adv/soldatdos-adv.txt +CVE-2007-4531 - http://aluigi.org/poc/soldatdos.zip +CVE-2007-4532 - http://aluigi.altervista.org/adv/soldatdos-adv.txt +CVE-2007-4532 - http://aluigi.org/poc/soldatdos.zip +CVE-2007-4533 - http://securityreason.com/securityalert/3057 +CVE-2007-4534 - http://securityreason.com/securityalert/3057 +CVE-2007-4535 - http://securityreason.com/securityalert/3057 +CVE-2007-4537 - http://aluigi.altervista.org/adv/skulltaghof-adv.txt +CVE-2007-4537 - http://securityreason.com/securityalert/3067 +CVE-2007-4540 - http://securityreason.com/securityalert/3062 +CVE-2007-4545 - http://securityreason.com/securityalert/3060 +CVE-2007-4546 - http://securityreason.com/securityalert/3060 +CVE-2007-4547 - http://securityreason.com/securityalert/3060 +CVE-2007-4549 - http://vuln.sg/alpass27-en.html +CVE-2007-4550 - http://vuln.sg/alpass27-en.html +CVE-2007-4553 - http://securityreason.com/securityalert/3075 +CVE-2007-4554 - http://securityreason.com/securityalert/3064 +CVE-2007-4555 - http://securityreason.com/securityalert/3068 +CVE-2007-4560 - http://securityreason.com/securityalert/3063 +CVE-2007-4561 - http://securityreason.com/securityalert/3069 +CVE-2007-4566 - http://securityreason.com/securityalert/3061 +CVE-2007-4571 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9053 +CVE-2007-4573 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9735 +CVE-2007-4577 - http://securityreason.com/securityalert/3073 +CVE-2007-4578 - http://securityreason.com/securityalert/3072 +CVE-2007-4581 - https://www.exploit-db.com/exploits/4327 +CVE-2007-4582 - https://www.exploit-db.com/exploits/4322 +CVE-2007-4583 - https://www.exploit-db.com/exploits/4323 +CVE-2007-4583 - https://www.exploit-db.com/exploits/4324 +CVE-2007-4584 - https://www.exploit-db.com/exploits/4321 +CVE-2007-4585 - https://www.exploit-db.com/exploits/4317 +CVE-2007-4586 - https://www.exploit-db.com/exploits/4318 +CVE-2007-4592 - http://securityreason.com/securityalert/3753 +CVE-2007-4596 - https://www.exploit-db.com/exploits/4314 +CVE-2007-4597 - https://www.exploit-db.com/exploits/4313 +CVE-2007-4598 - http://isc.sans.org/diary.html?storyid=3323 +CVE-2007-4600 - http://securityreason.com/securityalert/3248 +CVE-2007-4602 - https://www.exploit-db.com/exploits/4329 +CVE-2007-4603 - https://www.exploit-db.com/exploits/4330 +CVE-2007-4604 - https://www.exploit-db.com/exploits/4331 +CVE-2007-4605 - https://www.exploit-db.com/exploits/4332 +CVE-2007-4606 - https://www.exploit-db.com/exploits/4333 +CVE-2007-4607 - https://www.exploit-db.com/exploits/4328 +CVE-2007-4620 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/04/ca-alert-notification-server-multiple-vulnerabilities.aspx +CVE-2007-4627 - https://www.exploit-db.com/exploits/4338 +CVE-2007-4628 - https://www.exploit-db.com/exploits/4339 +CVE-2007-4630 - http://securityreason.com/securityalert/3080 +CVE-2007-4636 - https://www.exploit-db.com/exploits/4340 +CVE-2007-4637 - https://www.exploit-db.com/exploits/4336 +CVE-2007-4638 - http://securityreason.com/securityalert/3086 +CVE-2007-4640 - https://www.exploit-db.com/exploits/4341 +CVE-2007-4641 - https://www.exploit-db.com/exploits/4341 +CVE-2007-4642 - http://aluigi.altervista.org/adv/dumsdei-adv.txt +CVE-2007-4642 - http://aluigi.org/poc/dumsdei.zip +CVE-2007-4642 - http://securityreason.com/securityalert/3084 +CVE-2007-4643 - http://aluigi.org/poc/dumsdei.zip +CVE-2007-4643 - http://securityreason.com/securityalert/3084 +CVE-2007-4644 - http://aluigi.org/poc/dumsdei.zip +CVE-2007-4644 - http://securityreason.com/securityalert/3084 +CVE-2007-4645 - https://www.exploit-db.com/exploits/4342 +CVE-2007-4646 - https://www.exploit-db.com/exploits/4344 +CVE-2007-4647 - https://www.exploit-db.com/exploits/4343 +CVE-2007-4648 - http://securityreason.com/securityalert/3087 +CVE-2007-4649 - http://securityreason.com/securityalert/3085 +CVE-2007-4653 - https://www.exploit-db.com/exploits/4346 +CVE-2007-4668 - http://tracker.firebirdsql.org/browse/CORE-1312 +CVE-2007-4686 - http://www.trapkit.de/advisories/TKADV2007-001.txt +CVE-2007-4712 - https://www.exploit-db.com/exploits/4356 +CVE-2007-4714 - https://www.exploit-db.com/exploits/4353 +CVE-2007-4715 - https://www.exploit-db.com/exploits/4352 +CVE-2007-4722 - https://www.exploit-db.com/exploits/4868 +CVE-2007-4723 - http://securityreason.com/securityalert/3100 +CVE-2007-4726 - https://www.exploit-db.com/exploits/4362 +CVE-2007-4727 - http://securityreason.com/securityalert/3127 +CVE-2007-4727 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-4731 - http://securityreason.com/securityalert/3128 +CVE-2007-4734 - https://www.exploit-db.com/exploits/4355 +CVE-2007-4735 - https://www.exploit-db.com/exploits/4354 +CVE-2007-4736 - https://www.exploit-db.com/exploits/4349 +CVE-2007-4737 - https://www.exploit-db.com/exploits/4358 +CVE-2007-4744 - https://www.exploit-db.com/exploits/4365 +CVE-2007-4745 - http://securityreason.com/securityalert/3101 +CVE-2007-4748 - https://www.exploit-db.com/exploits/4348 +CVE-2007-4749 - http://securityreason.com/securityalert/3132 +CVE-2007-4750 - http://securityreason.com/securityalert/3150 +CVE-2007-4751 - http://securityreason.com/securityalert/3150 +CVE-2007-4752 - http://securityreason.com/securityalert/3126 +CVE-2007-4753 - http://securityreason.com/securityalert/3104 +CVE-2007-4754 - http://aluigi.altervista.org/adv/aa2k7x-adv.txt +CVE-2007-4754 - http://securityreason.com/securityalert/3105 +CVE-2007-4755 - http://aluigi.altervista.org/adv/aa2k7x-adv.txt +CVE-2007-4755 - http://securityreason.com/securityalert/3105 +CVE-2007-4756 - http://securityreason.com/securityalert/3106 +CVE-2007-4757 - https://www.exploit-db.com/exploits/4368 +CVE-2007-4763 - https://www.exploit-db.com/exploits/4363 +CVE-2007-4768 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9701 +CVE-2007-4769 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804 +CVE-2007-4770 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5507 +CVE-2007-4772 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2007-4776 - https://www.exploit-db.com/exploits/4361 +CVE-2007-4776 - https://www.exploit-db.com/exploits/4431 +CVE-2007-4777 - http://securityreason.com/securityalert/3108 +CVE-2007-4779 - http://securityreason.com/securityalert/3108 +CVE-2007-4780 - http://securityreason.com/securityalert/3108 +CVE-2007-4781 - https://www.exploit-db.com/exploits/4350 +CVE-2007-4782 - http://securityreason.com/securityalert/3109 +CVE-2007-4783 - http://securityreason.com/securityalert/3115 +CVE-2007-4784 - http://securityreason.com/securityalert/3114 +CVE-2007-4785 - http://securityreason.com/securityalert/3118 +CVE-2007-4790 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 +CVE-2007-4790 - https://www.exploit-db.com/exploits/4369 +CVE-2007-4802 - https://www.exploit-db.com/exploits/4366 +CVE-2007-4802 - https://www.exploit-db.com/exploits/4372 +CVE-2007-4803 - https://www.exploit-db.com/exploits/4364 +CVE-2007-4804 - https://www.exploit-db.com/exploits/4385 +CVE-2007-4805 - https://www.exploit-db.com/exploits/4378 +CVE-2007-4806 - https://www.exploit-db.com/exploits/4377 +CVE-2007-4807 - https://www.exploit-db.com/exploits/4377 +CVE-2007-4808 - https://www.exploit-db.com/exploits/4376 +CVE-2007-4809 - https://www.exploit-db.com/exploits/4374 +CVE-2007-4810 - http://securityreason.com/securityalert/3110 +CVE-2007-4811 - http://securityreason.com/securityalert/3110 +CVE-2007-4812 - http://securityreason.com/securityalert/3111 +CVE-2007-4814 - http://securityreason.com/securityalert/3112 +CVE-2007-4814 - https://www.exploit-db.com/exploits/4379 +CVE-2007-4814 - https://www.exploit-db.com/exploits/4398 +CVE-2007-4815 - https://www.exploit-db.com/exploits/4384 +CVE-2007-4816 - https://www.exploit-db.com/exploits/4375 +CVE-2007-4817 - https://www.exploit-db.com/exploits/4383 +CVE-2007-4818 - http://securityreason.com/securityalert/3116 +CVE-2007-4818 - https://www.exploit-db.com/exploits/4381 +CVE-2007-4819 - http://securityreason.com/securityalert/3116 +CVE-2007-4819 - https://www.exploit-db.com/exploits/4381 +CVE-2007-4820 - https://www.exploit-db.com/exploits/4380 +CVE-2007-4821 - https://www.exploit-db.com/exploits/4373 +CVE-2007-4822 - http://securityreason.com/securityalert/3117 +CVE-2007-4825 - http://securityreason.com/securityalert/3119 +CVE-2007-4832 - http://aluigi.altervista.org/adv/cellfucktor-adv.txt +CVE-2007-4832 - http://securityreason.com/securityalert/3130 +CVE-2007-4834 - https://www.exploit-db.com/exploits/4387 +CVE-2007-4835 - http://securityreason.com/securityalert/3120 +CVE-2007-4836 - http://securityreason.com/securityalert/3120 +CVE-2007-4837 - http://securityreason.com/securityalert/3121 +CVE-2007-4838 - http://aluigi.altervista.org/adv/cellfucktor-adv.txt +CVE-2007-4838 - http://aluigi.org/poc/cellfucktor.zip +CVE-2007-4838 - http://securityreason.com/securityalert/3130 +CVE-2007-4840 - http://securityreason.com/securityalert/3122 +CVE-2007-4842 - http://securityreason.com/securityalert/3123 +CVE-2007-4843 - http://securityreason.com/securityalert/3125 +CVE-2007-4844 - http://securityreason.com/securityalert/3125 +CVE-2007-4845 - https://www.exploit-db.com/exploits/4371 +CVE-2007-4846 - https://www.exploit-db.com/exploits/4370 +CVE-2007-4872 - http://securityreason.com/securityalert/3174 +CVE-2007-4873 - http://securityreason.com/securityalert/3173 +CVE-2007-4874 - http://securityreason.com/securityalert/3166 +CVE-2007-4879 - http://0x90.eu/ff_tls_poc.html +CVE-2007-4879 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2007-4879 - https://bugzilla.mozilla.org/show_bug.cgi?id=395399 +CVE-2007-4880 - http://securityreason.com/securityalert/3184 +CVE-2007-4881 - http://securityreason.com/securityalert/3131 +CVE-2007-4886 - https://www.exploit-db.com/exploits/4390 +CVE-2007-4887 - http://securityreason.com/securityalert/3133 +CVE-2007-4889 - http://securityreason.com/securityalert/3134 +CVE-2007-4890 - https://www.exploit-db.com/exploits/4394 +CVE-2007-4891 - https://www.exploit-db.com/exploits/4393 +CVE-2007-4894 - http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html +CVE-2007-4895 - https://www.exploit-db.com/exploits/4386 +CVE-2007-4897 - http://securityreason.com/securityalert/3138 +CVE-2007-4899 - http://securityreason.com/securityalert/3139 +CVE-2007-4900 - http://securityreason.com/securityalert/3137 +CVE-2007-4901 - http://securityreason.com/securityalert/3136 +CVE-2007-4902 - https://www.exploit-db.com/exploits/4388 +CVE-2007-4903 - https://www.exploit-db.com/exploits/4389 +CVE-2007-4905 - https://www.exploit-db.com/exploits/4390 +CVE-2007-4906 - http://securityreason.com/securityalert/3142 +CVE-2007-4906 - https://www.exploit-db.com/exploits/4395 +CVE-2007-4907 - https://www.exploit-db.com/exploits/4396 +CVE-2007-4908 - https://www.exploit-db.com/exploits/4390 +CVE-2007-4909 - http://securityreason.com/securityalert/3141 +CVE-2007-4911 - https://www.exploit-db.com/exploits/4403 +CVE-2007-4915 - http://securityreason.com/securityalert/3151 +CVE-2007-4915 - https://www.exploit-db.com/exploits/4542 +CVE-2007-4916 - http://securityreason.com/securityalert/3143 +CVE-2007-4917 - http://securityreason.com/securityalert/3149 +CVE-2007-4918 - http://securityreason.com/securityalert/3148 +CVE-2007-4918 - https://www.exploit-db.com/exploits/4410 +CVE-2007-4919 - https://www.exploit-db.com/exploits/4408 +CVE-2007-4920 - https://www.exploit-db.com/exploits/4407 +CVE-2007-4921 - https://www.exploit-db.com/exploits/4405 +CVE-2007-4922 - https://www.exploit-db.com/exploits/4400 +CVE-2007-4923 - https://www.exploit-db.com/exploits/4401 +CVE-2007-4924 - https://www.exploit-db.com/exploits/9240 +CVE-2007-4926 - http://securityreason.com/securityalert/3145 +CVE-2007-4927 - http://securityreason.com/securityalert/3145 +CVE-2007-4928 - http://securityreason.com/securityalert/3145 +CVE-2007-4929 - http://securityreason.com/securityalert/3145 +CVE-2007-4930 - http://securityreason.com/securityalert/3145 +CVE-2007-4932 - https://www.exploit-db.com/exploits/4419 +CVE-2007-4933 - https://www.exploit-db.com/exploits/4419 +CVE-2007-4934 - https://www.exploit-db.com/exploits/4406 +CVE-2007-4937 - http://securityreason.com/securityalert/3147 +CVE-2007-4938 - http://securityreason.com/securityalert/3144 +CVE-2007-4939 - http://securityreason.com/securityalert/3144 +CVE-2007-4940 - http://securityreason.com/securityalert/3144 +CVE-2007-4941 - http://securityreason.com/securityalert/3144 +CVE-2007-4952 - https://www.exploit-db.com/exploits/4418 +CVE-2007-4953 - https://www.exploit-db.com/exploits/4417 +CVE-2007-4954 - https://www.exploit-db.com/exploits/4416 +CVE-2007-4955 - https://www.exploit-db.com/exploits/4415 +CVE-2007-4956 - https://www.exploit-db.com/exploits/4412 +CVE-2007-4956 - https://www.exploit-db.com/exploits/4413 +CVE-2007-4956 - https://www.exploit-db.com/exploits/4414 +CVE-2007-4957 - https://www.exploit-db.com/exploits/4411 +CVE-2007-4960 - http://www.gnucitizen.org/blog/ie-pwns-secondlife +CVE-2007-4961 - http://www.gnucitizen.org/blog/ie-pwns-secondlife +CVE-2007-4962 - http://securityreason.com/securityalert/3140 +CVE-2007-4963 - http://securityreason.com/securityalert/3140 +CVE-2007-4964 - http://securityreason.com/securityalert/3140 +CVE-2007-4965 - http://bugs.gentoo.org/show_bug.cgi?id=192876 +CVE-2007-4965 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-4966 - https://www.exploit-db.com/exploits/4404 +CVE-2007-4975 - http://securityreason.com/securityalert/3155 +CVE-2007-4976 - http://securityreason.com/securityalert/3152 +CVE-2007-4977 - http://securityreason.com/securityalert/3152 +CVE-2007-4978 - https://www.exploit-db.com/exploits/4421 +CVE-2007-4979 - https://www.exploit-db.com/exploits/4422 +CVE-2007-4980 - http://securityreason.com/securityalert/3154 +CVE-2007-4981 - http://securityreason.com/securityalert/3153 +CVE-2007-4982 - https://www.exploit-db.com/exploits/4420 +CVE-2007-4983 - https://www.exploit-db.com/exploits/4427 +CVE-2007-4984 - https://www.exploit-db.com/exploits/4425 +CVE-2007-4985 - http://www.imagemagick.org/script/changelog.php +CVE-2007-4986 - http://www.imagemagick.org/script/changelog.php +CVE-2007-4986 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9963 +CVE-2007-4987 - http://www.imagemagick.org/script/changelog.php +CVE-2007-4988 - http://www.imagemagick.org/script/changelog.php +CVE-2007-4988 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656 +CVE-2007-5000 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2007-5000 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9539 +CVE-2007-5009 - https://www.exploit-db.com/exploits/4434 +CVE-2007-5015 - https://www.exploit-db.com/exploits/4430 +CVE-2007-5016 - https://www.exploit-db.com/exploits/4433 +CVE-2007-5017 - https://www.exploit-db.com/exploits/4428 +CVE-2007-5018 - https://www.exploit-db.com/exploits/4429 +CVE-2007-5019 - https://www.exploit-db.com/exploits/4432 +CVE-2007-5020 - http://www.gnucitizen.org/blog/0day-pdf-pwns-windows +CVE-2007-5023 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-5023 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-5023 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-5023 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5023 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-5023 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-5024 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5025 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-5026 - http://securityreason.com/securityalert/3156 +CVE-2007-5027 - http://securityreason.com/securityalert/3159 +CVE-2007-5032 - http://securityreason.com/securityalert/3157 +CVE-2007-5033 - http://securityreason.com/securityalert/3158 +CVE-2007-5036 - https://www.exploit-db.com/exploits/4426 +CVE-2007-5039 - http://securityreason.com/securityalert/3161 +CVE-2007-5040 - http://securityreason.com/securityalert/3161 +CVE-2007-5041 - http://securityreason.com/securityalert/3161 +CVE-2007-5042 - http://securityreason.com/securityalert/3161 +CVE-2007-5043 - http://securityreason.com/securityalert/3161 +CVE-2007-5044 - http://securityreason.com/securityalert/3161 +CVE-2007-5045 - http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox +CVE-2007-5047 - http://securityreason.com/securityalert/3161 +CVE-2007-5050 - https://www.exploit-db.com/exploits/4439 +CVE-2007-5052 - http://securityreason.com/securityalert/3162 +CVE-2007-5053 - https://www.exploit-db.com/exploits/4441 +CVE-2007-5054 - https://www.exploit-db.com/exploits/4441 +CVE-2007-5055 - https://www.exploit-db.com/exploits/4441 +CVE-2007-5056 - https://www.exploit-db.com/exploits/4442 +CVE-2007-5056 - https://www.exploit-db.com/exploits/5090 +CVE-2007-5056 - https://www.exploit-db.com/exploits/5091 +CVE-2007-5056 - https://www.exploit-db.com/exploits/5097 +CVE-2007-5056 - https://www.exploit-db.com/exploits/5098 +CVE-2007-5057 - http://securityreason.com/securityalert/3163 +CVE-2007-5058 - http://securityreason.com/securityalert/3164 +CVE-2007-5060 - http://securityreason.com/securityalert/3165 +CVE-2007-5061 - https://www.exploit-db.com/exploits/4443 +CVE-2007-5062 - https://www.exploit-db.com/exploits/4435 +CVE-2007-5063 - https://www.exploit-db.com/exploits/4436 +CVE-2007-5065 - https://www.exploit-db.com/exploits/4440 +CVE-2007-5067 - https://www.exploit-db.com/exploits/4450 +CVE-2007-5068 - https://www.exploit-db.com/exploits/4449 +CVE-2007-5069 - https://www.exploit-db.com/exploits/4447 +CVE-2007-5070 - https://www.exploit-db.com/exploits/4445 +CVE-2007-5078 - http://securityreason.com/securityalert/3192 +CVE-2007-5089 - http://securityreason.com/securityalert/3168 +CVE-2007-5089 - https://www.exploit-db.com/exploits/4454 +CVE-2007-5092 - http://securityreason.com/securityalert/3169 +CVE-2007-5092 - http://www.waraxe.us/advisory-54.html +CVE-2007-5094 - http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html +CVE-2007-5094 - https://www.exploit-db.com/exploits/4438 +CVE-2007-5095 - http://www.gnucitizen.org/blog/backdooring-windows-media-files +CVE-2007-5098 - https://www.exploit-db.com/exploits/4451 +CVE-2007-5099 - https://www.exploit-db.com/exploits/4448 +CVE-2007-5102 - https://www.exploit-db.com/exploits/4446 +CVE-2007-5103 - https://www.exploit-db.com/exploits/4446 +CVE-2007-5105 - http://securityreason.com/securityalert/3175 +CVE-2007-5106 - http://securityreason.com/securityalert/3175 +CVE-2007-5107 - https://www.exploit-db.com/exploits/4452 +CVE-2007-5109 - http://securityreason.com/securityalert/3176 +CVE-2007-5110 - https://www.exploit-db.com/exploits/4453 +CVE-2007-5111 - https://www.exploit-db.com/exploits/4453 +CVE-2007-5112 - http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/ +CVE-2007-5112 - http://securityreason.com/securityalert/3177 +CVE-2007-5112 - http://www.gnucitizen.org/blog/google-urchin-password-theft-madness +CVE-2007-5117 - https://www.exploit-db.com/exploits/4456 +CVE-2007-5119 - http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html +CVE-2007-5119 - http://securityreason.com/securityalert/3167 +CVE-2007-5120 - http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html +CVE-2007-5120 - http://securityreason.com/securityalert/3167 +CVE-2007-5121 - http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html +CVE-2007-5121 - http://securityreason.com/securityalert/3167 +CVE-2007-5122 - https://www.exploit-db.com/exploits/4457 +CVE-2007-5123 - https://www.exploit-db.com/exploits/4458 +CVE-2007-5127 - http://securityreason.com/securityalert/3171 +CVE-2007-5128 - http://securityreason.com/securityalert/3174 +CVE-2007-5130 - http://securityreason.com/securityalert/3172 +CVE-2007-5131 - https://www.exploit-db.com/exploits/4459 +CVE-2007-5135 - http://securityreason.com/securityalert/3179 +CVE-2007-5135 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-5137 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-5137 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9540 +CVE-2007-5138 - https://www.exploit-db.com/exploits/4461 +CVE-2007-5139 - https://www.exploit-db.com/exploits/4462 +CVE-2007-5140 - https://www.exploit-db.com/exploits/4463 +CVE-2007-5141 - http://securityreason.com/securityalert/3178 +CVE-2007-5141 - http://www.waraxe.us/advisory-55.html +CVE-2007-5149 - https://www.exploit-db.com/exploits/4465 +CVE-2007-5150 - http://securityreason.com/securityalert/3181 +CVE-2007-5150 - http://www.waraxe.us/advisory-56.html +CVE-2007-5151 - http://www.waraxe.us/advisory-58.html +CVE-2007-5155 - http://vuln.sg/iceows420b-en.html +CVE-2007-5156 - http://securityreason.com/securityalert/3182 +CVE-2007-5156 - http://www.securityfocus.com/archive/1/480830/100/0/threaded +CVE-2007-5156 - http://www.waraxe.us/advisory-57.html +CVE-2007-5156 - https://www.exploit-db.com/exploits/5618 +CVE-2007-5156 - https://www.exploit-db.com/exploits/5688 +CVE-2007-5157 - https://www.exploit-db.com/exploits/4464 +CVE-2007-5161 - http://marc.info/?l=full-disclosure&m=119115897930583&w=2 +CVE-2007-5161 - http://securityreason.com/securityalert/3183 +CVE-2007-5162 - http://securityreason.com/securityalert/3180 +CVE-2007-5169 - http://vuln.sg/pagemaker701-en.html +CVE-2007-5173 - https://www.exploit-db.com/exploits/4471 +CVE-2007-5174 - https://www.exploit-db.com/exploits/4472 +CVE-2007-5175 - https://www.exploit-db.com/exploits/4473 +CVE-2007-5177 - https://www.exploit-db.com/exploits/4469 +CVE-2007-5178 - https://www.exploit-db.com/exploits/4470 +CVE-2007-5180 - http://packetstormsecurity.org/0709-exploits/ohesa-sql.txt +CVE-2007-5181 - http://packetstormsecurity.org/0709-exploits/netkamp-sql.txt +CVE-2007-5182 - http://packetstormsecurity.org/0709-exploits/netkamp-sql.txt +CVE-2007-5183 - http://pridels-team.blogspot.com/2007/10/odysseysuite-internet-banking-vuln.html +CVE-2007-5184 - https://www.exploit-db.com/exploits/4478 +CVE-2007-5185 - https://www.exploit-db.com/exploits/4477 +CVE-2007-5186 - https://www.exploit-db.com/exploits/4476 +CVE-2007-5187 - https://www.exploit-db.com/exploits/4475 +CVE-2007-5189 - http://securityreason.com/securityalert/3186 +CVE-2007-5195 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-5196 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-5200 - http://www.novell.com/linux/security/advisories/2007_20_sr.html +CVE-2007-5212 - http://securityreason.com/securityalert/3188 +CVE-2007-5213 - http://securityreason.com/securityalert/3188 +CVE-2007-5214 - http://securityreason.com/securityalert/3188 +CVE-2007-5218 - http://securityreason.com/securityalert/3190 +CVE-2007-5219 - https://www.exploit-db.com/exploits/4479 +CVE-2007-5220 - http://securityreason.com/securityalert/3189 +CVE-2007-5221 - https://www.exploit-db.com/exploits/4481 +CVE-2007-5222 - https://www.exploit-db.com/exploits/4467 +CVE-2007-5223 - http://securityreason.com/securityalert/3191 +CVE-2007-5224 - http://securityreason.com/securityalert/3187 +CVE-2007-5225 - https://www.exploit-db.com/exploits/4516 +CVE-2007-5225 - https://www.exploit-db.com/exploits/5227 +CVE-2007-5229 - http://marc.info/?l=full-disclosure&m=119145344606493&w=2 +CVE-2007-5229 - https://www.exploit-db.com/exploits/30637/ +CVE-2007-5230 - https://www.exploit-db.com/exploits/4466 +CVE-2007-5231 - https://www.exploit-db.com/exploits/4466 +CVE-2007-5232 - http://www.redhat.com/support/errata/RHSA-2007-0963.html +CVE-2007-5232 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9331 +CVE-2007-5233 - https://www.exploit-db.com/exploits/4482 +CVE-2007-5234 - https://www.exploit-db.com/exploits/4483 +CVE-2007-5238 - http://www.redhat.com/support/errata/RHSA-2007-0963.html +CVE-2007-5239 - http://www.redhat.com/support/errata/RHSA-2007-0963.html +CVE-2007-5240 - http://www.redhat.com/support/errata/RHSA-2007-0963.html +CVE-2007-5247 - http://aluigi.altervista.org/adv/fearfspb-adv.txt +CVE-2007-5247 - http://aluigi.org/poc/fearfspb.zip +CVE-2007-5247 - http://securityreason.com/securityalert/3197 +CVE-2007-5248 - http://aluigi.altervista.org/adv/d3engfspb-adv.txt +CVE-2007-5248 - http://aluigi.org/poc/d3engfspb.zip +CVE-2007-5248 - http://securityreason.com/securityalert/3196 +CVE-2007-5249 - http://aluigi.altervista.org/adv/aaboompb-adv.txt +CVE-2007-5249 - http://aluigi.org/poc/aaboompb.zip +CVE-2007-5249 - http://securityreason.com/securityalert/3193 +CVE-2007-5250 - http://aluigi.altervista.org/adv/aaboompb-adv.txt +CVE-2007-5250 - http://aluigi.org/poc/aaboompb.zip +CVE-2007-5250 - http://securityreason.com/securityalert/3193 +CVE-2007-5252 - http://securityreason.com/securityalert/3198 +CVE-2007-5253 - http://securityreason.com/securityalert/3194 +CVE-2007-5253 - https://www.exploit-db.com/exploits/30639/ +CVE-2007-5255 - http://websecurity.com.ua/1368/ +CVE-2007-5256 - http://securityreason.com/securityalert/3195 +CVE-2007-5256 - https://www.exploit-db.com/exploits/4484 +CVE-2007-5257 - https://www.exploit-db.com/exploits/4474 +CVE-2007-5260 - http://securityreason.com/securityalert/3199 +CVE-2007-5261 - https://www.exploit-db.com/exploits/4480 +CVE-2007-5262 - http://aluigi.altervista.org/adv/dropteamz-adv.txt +CVE-2007-5262 - http://securityreason.com/securityalert/3202 +CVE-2007-5263 - http://aluigi.altervista.org/adv/dropteamz-adv.txt +CVE-2007-5263 - http://securityreason.com/securityalert/3202 +CVE-2007-5264 - http://aluigi.altervista.org/adv/dropteamz-adv.txt +CVE-2007-5264 - http://securityreason.com/securityalert/3202 +CVE-2007-5266 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2007-5267 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2007-5268 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2007-5269 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2007-5269 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2007-5269 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-5269 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-5269 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5269 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-5269 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-5271 - https://www.exploit-db.com/exploits/4485 +CVE-2007-5272 - https://www.exploit-db.com/exploits/4486 +CVE-2007-5273 - http://crypto.stanford.edu/dns/dns-rebinding.pdf +CVE-2007-5273 - http://www.redhat.com/support/errata/RHSA-2007-0963.html +CVE-2007-5274 - http://crypto.stanford.edu/dns/dns-rebinding.pdf +CVE-2007-5274 - http://www.redhat.com/support/errata/RHSA-2007-0963.html +CVE-2007-5275 - http://crypto.stanford.edu/dns/dns-rebinding.pdf +CVE-2007-5275 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250 +CVE-2007-5276 - http://crypto.stanford.edu/dns/dns-rebinding.pdf +CVE-2007-5277 - http://crypto.stanford.edu/dns/dns-rebinding.pdf +CVE-2007-5278 - https://www.exploit-db.com/exploits/4466 +CVE-2007-5293 - https://www.exploit-db.com/exploits/4495 +CVE-2007-5294 - https://www.exploit-db.com/exploits/4495 +CVE-2007-5298 - https://www.exploit-db.com/exploits/4491 +CVE-2007-5299 - https://www.exploit-db.com/exploits/4493 +CVE-2007-5300 - https://www.exploit-db.com/exploits/4498 +CVE-2007-5301 - https://www.exploit-db.com/exploits/5424 +CVE-2007-5308 - https://www.exploit-db.com/exploits/4501 +CVE-2007-5309 - http://www.attrition.org/pipermail/vim/2007-October/001823.html +CVE-2007-5309 - http://www.attrition.org/pipermail/vim/2007-October/001824.html +CVE-2007-5309 - https://www.exploit-db.com/exploits/4496 +CVE-2007-5310 - https://www.exploit-db.com/exploits/4497 +CVE-2007-5311 - https://www.exploit-db.com/exploits/4500 +CVE-2007-5312 - https://www.exploit-db.com/exploits/4500 +CVE-2007-5313 - https://www.exploit-db.com/exploits/4492 +CVE-2007-5314 - https://www.exploit-db.com/exploits/4502 +CVE-2007-5315 - https://www.exploit-db.com/exploits/4503 +CVE-2007-5316 - https://www.exploit-db.com/exploits/4504 +CVE-2007-5321 - https://www.exploit-db.com/exploits/4494 +CVE-2007-5322 - https://www.exploit-db.com/exploits/4506 +CVE-2007-5333 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-5340 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9622 +CVE-2007-5342 - http://www.redhat.com/support/errata/RHSA-2008-0862.html +CVE-2007-5342 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-5344 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 +CVE-2007-5347 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 +CVE-2007-5348 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 +CVE-2007-5350 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-066 +CVE-2007-5351 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-063 +CVE-2007-5352 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-002 +CVE-2007-5364 - http://securityreason.com/securityalert/3212 +CVE-2007-5365 - http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962 +CVE-2007-5365 - https://www.exploit-db.com/exploits/4601 +CVE-2007-5371 - http://securityreason.com/securityalert/3215 +CVE-2007-5374 - https://www.exploit-db.com/exploits/4505 +CVE-2007-5375 - http://crypto.stanford.edu/dns/dns-rebinding.pdf +CVE-2007-5378 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2007-5378 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9480 +CVE-2007-5383 - http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/ +CVE-2007-5384 - http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/ +CVE-2007-5385 - http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/ +CVE-2007-5387 - https://www.exploit-db.com/exploits/4519 +CVE-2007-5388 - https://www.exploit-db.com/exploits/4518 +CVE-2007-5390 - https://www.exploit-db.com/exploits/4520 +CVE-2007-5393 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9839 +CVE-2007-5395 - http://bugs.gentoo.org/show_bug.cgi?id=196803 +CVE-2007-5398 - http://securityreason.com/securityalert/3372 +CVE-2007-5400 - http://securityreason.com/securityalert/4048 +CVE-2007-5407 - https://www.exploit-db.com/exploits/4508 +CVE-2007-5408 - https://www.exploit-db.com/exploits/4511 +CVE-2007-5409 - https://www.exploit-db.com/exploits/4512 +CVE-2007-5412 - https://www.exploit-db.com/exploits/4507 +CVE-2007-5416 - http://securityvulns.ru/Sdocument137.html +CVE-2007-5416 - https://www.exploit-db.com/exploits/4510 +CVE-2007-5417 - http://securityvulns.com/Sdocument42.html +CVE-2007-5418 - http://securityvulns.com/Rdocument960.html +CVE-2007-5423 - http://securityvulns.ru/Sdocument162.html +CVE-2007-5423 - https://www.exploit-db.com/exploits/4509 +CVE-2007-5438 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2007-5438 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2007-5438 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-5438 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-5438 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5438 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-5438 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-5440 - http://securityvulns.com/Rdocument959.html +CVE-2007-5446 - https://www.exploit-db.com/exploits/4526 +CVE-2007-5447 - https://www.exploit-db.com/exploits/4517 +CVE-2007-5449 - https://www.exploit-db.com/exploits/4527 +CVE-2007-5450 - https://www.exploit-db.com/exploits/4522 +CVE-2007-5451 - https://www.exploit-db.com/exploits/4524 +CVE-2007-5452 - https://www.exploit-db.com/exploits/4513 +CVE-2007-5453 - https://www.exploit-db.com/exploits/4513 +CVE-2007-5455 - https://www.exploit-db.com/exploits/4529 +CVE-2007-5456 - http://securityreason.com/securityalert/3222 +CVE-2007-5457 - https://www.exploit-db.com/exploits/4521 +CVE-2007-5458 - https://www.exploit-db.com/exploits/4523 +CVE-2007-5461 - http://www.redhat.com/support/errata/RHSA-2008-0862.html +CVE-2007-5461 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-5461 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202 +CVE-2007-5461 - https://www.exploit-db.com/exploits/4530 +CVE-2007-5464 - http://aluigi.altervista.org/adv/lfscbof-adv.txt +CVE-2007-5465 - https://www.exploit-db.com/exploits/4536 +CVE-2007-5466 - http://www.digit-labs.org/files/exploits/extremail-v8.pl +CVE-2007-5466 - https://www.exploit-db.com/exploits/4533 +CVE-2007-5466 - https://www.exploit-db.com/exploits/4534 +CVE-2007-5466 - https://www.exploit-db.com/exploits/4535 +CVE-2007-5467 - http://www.digit-labs.org/files/exploits/extremail-v3.pl +CVE-2007-5467 - https://www.exploit-db.com/exploits/4532 +CVE-2007-5474 - http://securityreason.com/securityalert/4226 +CVE-2007-5481 - http://www.rhyolite.com/anti-spam/dcc/CHANGES +CVE-2007-5484 - https://www.exploit-db.com/exploits/4529 +CVE-2007-5485 - https://www.exploit-db.com/exploits/4528 +CVE-2007-5487 - https://www.exploit-db.com/exploits/4531 +CVE-2007-5489 - https://www.exploit-db.com/exploits/4538 +CVE-2007-5490 - https://www.exploit-db.com/exploits/4539 +CVE-2007-5495 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9705 +CVE-2007-5498 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9452 +CVE-2007-5500 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9868 +CVE-2007-5503 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2007-5503 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-5503 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5503 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-5511 - https://www.exploit-db.com/exploits/4570 +CVE-2007-5511 - https://www.exploit-db.com/exploits/4571 +CVE-2007-5511 - https://www.exploit-db.com/exploits/4572 +CVE-2007-5542 - http://packetstormsecurity.org/0710-advisories/mirandaim-overflows.txt +CVE-2007-5543 - http://packetstormsecurity.org/0710-advisories/mirandaim-overflows.txt +CVE-2007-5573 - https://www.exploit-db.com/exploits/4544 +CVE-2007-5574 - https://www.exploit-db.com/exploits/4543 +CVE-2007-5583 - https://www.exploit-db.com/exploits/4692 +CVE-2007-5592 - https://www.exploit-db.com/exploits/4545 +CVE-2007-5593 - http://www.securityfocus.com/bid/26119 +CVE-2007-5594 - http://www.securityfocus.com/bid/26119 +CVE-2007-5595 - http://www.securityfocus.com/bid/26119 +CVE-2007-5596 - http://www.securityfocus.com/bid/26119 +CVE-2007-5597 - http://www.securityfocus.com/bid/26119 +CVE-2007-5600 - https://www.exploit-db.com/exploits/4538 +CVE-2007-5603 - http://securityreason.com/securityalert/3342 +CVE-2007-5603 - https://www.exploit-db.com/exploits/4594 +CVE-2007-5617 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-5617 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-5617 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-5617 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-5618 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2007-5618 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2007-5618 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5618 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2007-5618 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2007-5619 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2007-5620 - https://www.exploit-db.com/exploits/4546 +CVE-2007-5625 - http://securityreason.com/securityalert/3275 +CVE-2007-5627 - https://www.exploit-db.com/exploits/4554 +CVE-2007-5628 - https://www.exploit-db.com/exploits/4555 +CVE-2007-5630 - https://www.exploit-db.com/exploits/4550 +CVE-2007-5631 - https://www.exploit-db.com/exploits/4551 +CVE-2007-5633 - http://www.bugtrack.almico.com/view.php?id=987 +CVE-2007-5634 - http://www.bugtrack.almico.com/view.php?id=987 +CVE-2007-5639 - http://securityreason.com/securityalert/3273 +CVE-2007-5641 - https://www.exploit-db.com/exploits/4549 +CVE-2007-5642 - https://www.exploit-db.com/exploits/4549 +CVE-2007-5643 - https://www.exploit-db.com/exploits/4548 +CVE-2007-5644 - https://www.exploit-db.com/exploits/4548 +CVE-2007-5646 - http://www.simplemachines.org/community/index.php?topic=196380.0 +CVE-2007-5646 - https://www.exploit-db.com/exploits/4547 +CVE-2007-5647 - http://packetstormsecurity.org/0710-exploits/socketkb-xss.txt +CVE-2007-5649 - http://packetstormsecurity.org/0710-exploits/socketmail-xss.txt +CVE-2007-5650 - http://securityreason.com/securityalert/3285 +CVE-2007-5653 - https://www.exploit-db.com/exploits/4553 +CVE-2007-5654 - https://www.exploit-db.com/exploits/4556 +CVE-2007-5655 - http://www.tibco.com/mk/advisory.jsp +CVE-2007-5656 - http://www.tibco.com/mk/advisory.jsp +CVE-2007-5657 - http://www.tibco.com/mk/advisory.jsp +CVE-2007-5658 - http://www.tibco.com/mk/advisory.jsp +CVE-2007-5659 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9813 +CVE-2007-5663 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9928 +CVE-2007-5671 - http://securityreason.com/securityalert/3922 +CVE-2007-5671 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2007-5674 - https://www.exploit-db.com/exploits/4558 +CVE-2007-5676 - https://www.exploit-db.com/exploits/4563 +CVE-2007-5678 - http://securityreason.com/securityalert/3305 +CVE-2007-5679 - https://www.exploit-db.com/exploits/6250 +CVE-2007-5689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9898 +CVE-2007-5696 - http://securityreason.com/securityalert/3305 +CVE-2007-5697 - https://www.exploit-db.com/exploits/4565 +CVE-2007-5699 - https://www.exploit-db.com/exploits/4566 +CVE-2007-5709 - https://www.exploit-db.com/exploits/4583 +CVE-2007-5710 - http://www.waraxe.us/advisory-59.html +CVE-2007-5711 - http://aluigi.altervista.org/adv/wicassert-adv.txt +CVE-2007-5711 - http://aluigi.org/poc/wicassert.zip +CVE-2007-5719 - https://www.exploit-db.com/exploits/4587 +CVE-2007-5720 - https://www.exploit-db.com/exploits/4586 +CVE-2007-5721 - https://www.exploit-db.com/exploits/4585 +CVE-2007-5731 - https://www.exploit-db.com/exploits/4567 +CVE-2007-5754 - https://www.exploit-db.com/exploits/4588 +CVE-2007-5771 - https://www.exploit-db.com/exploits/4562 +CVE-2007-5772 - https://www.exploit-db.com/exploits/4562 +CVE-2007-5773 - https://www.exploit-db.com/exploits/4561 +CVE-2007-5774 - https://www.exploit-db.com/exploits/4561 +CVE-2007-5779 - https://www.exploit-db.com/exploits/4579 +CVE-2007-5780 - https://www.exploit-db.com/exploits/4582 +CVE-2007-5781 - https://www.exploit-db.com/exploits/4581 +CVE-2007-5782 - https://www.exploit-db.com/exploits/4580 +CVE-2007-5783 - https://www.exploit-db.com/exploits/4578 +CVE-2007-5784 - https://www.exploit-db.com/exploits/4577 +CVE-2007-5785 - https://www.exploit-db.com/exploits/4576 +CVE-2007-5786 - https://www.exploit-db.com/exploits/4575 +CVE-2007-5800 - https://www.exploit-db.com/exploits/4593 +CVE-2007-5802 - http://securityreason.com/securityalert/3335 +CVE-2007-5806 - http://securityreason.com/securityalert/3340 +CVE-2007-5811 - https://www.exploit-db.com/exploits/4590 +CVE-2007-5812 - https://www.exploit-db.com/exploits/4591 +CVE-2007-5813 - https://www.exploit-db.com/exploits/4592 +CVE-2007-5814 - http://securityreason.com/securityalert/3342 +CVE-2007-5815 - http://securityreason.com/securityalert/3342 +CVE-2007-5820 - https://www.exploit-db.com/exploits/4599 +CVE-2007-5821 - https://www.exploit-db.com/exploits/4597 +CVE-2007-5822 - http://securityreason.com/securityalert/3339 +CVE-2007-5822 - https://www.exploit-db.com/exploits/4596 +CVE-2007-5823 - http://securityreason.com/securityalert/3339 +CVE-2007-5823 - https://www.exploit-db.com/exploits/4596 +CVE-2007-5824 - https://www.exploit-db.com/exploits/4600 +CVE-2007-5826 - https://www.exploit-db.com/exploits/4598 +CVE-2007-5828 - http://securityreason.com/securityalert/3338 +CVE-2007-5840 - https://www.exploit-db.com/exploits/4607 +CVE-2007-5841 - https://www.exploit-db.com/exploits/4606 +CVE-2007-5842 - https://www.exploit-db.com/exploits/4605 +CVE-2007-5843 - https://www.exploit-db.com/exploits/4604 +CVE-2007-5844 - https://www.exploit-db.com/exploits/4602 +CVE-2007-5845 - https://www.exploit-db.com/exploits/3221 +CVE-2007-5845 - https://www.exploit-db.com/exploits/4602 +CVE-2007-5846 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 +CVE-2007-5849 - http://www.cups.org/str.php?L2589 +CVE-2007-5887 - https://www.exploit-db.com/exploits/4609 +CVE-2007-5889 - http://securityreason.com/securityalert/3345 +CVE-2007-5898 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2007-5899 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2007-5901 - http://bugs.gentoo.org/show_bug.cgi?id=199214 +CVE-2007-5902 - http://bugs.gentoo.org/show_bug.cgi?id=199214 +CVE-2007-5904 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901 +CVE-2007-5909 - http://vuln.sg/lotusnotes702doc-en.html +CVE-2007-5909 - http://vuln.sg/lotusnotes702mif-en.html +CVE-2007-5909 - http://vuln.sg/lotusnotes702sam-en.html +CVE-2007-5910 - http://vuln.sg/lotusnotes702wpd-en.html +CVE-2007-5911 - https://www.exploit-db.com/exploits/4610 +CVE-2007-5912 - https://www.exploit-db.com/exploits/4611 +CVE-2007-5913 - https://www.exploit-db.com/exploits/4608 +CVE-2007-5914 - https://www.exploit-db.com/exploits/4608 +CVE-2007-5925 - http://bugs.gentoo.org/show_bug.cgi?id=198988 +CVE-2007-5926 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt +CVE-2007-5927 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt +CVE-2007-5928 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt +CVE-2007-5929 - http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt +CVE-2007-5938 - http://bugs.gentoo.org/show_bug.cgi?id=199209 +CVE-2007-5941 - https://www.exploit-db.com/exploits/4613 +CVE-2007-5947 - http://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues +CVE-2007-5947 - http://www.mozilla.org/security/announce/2007/mfsa2007-37.html +CVE-2007-5947 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9873 +CVE-2007-5958 - https://www.exploit-db.com/exploits/5152 +CVE-2007-5960 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9794 +CVE-2007-5962 - https://www.exploit-db.com/exploits/5814 +CVE-2007-5966 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-5973 - https://www.exploit-db.com/exploits/4614 +CVE-2007-5974 - https://www.exploit-db.com/exploits/4611 +CVE-2007-5979 - http://securityreason.com/securityalert/3364 +CVE-2007-5983 - http://securityreason.com/securityalert/3360 +CVE-2007-5984 - http://securityreason.com/securityalert/3360 +CVE-2007-5992 - https://www.exploit-db.com/exploits/4622 +CVE-2007-5993 - http://securityreason.com/securityalert/3369 +CVE-2007-5994 - http://packetstormsecurity.org/0711-exploits/yappa-ng-rfi.txt +CVE-2007-5995 - https://www.exploit-db.com/exploits/4621 +CVE-2007-5996 - https://www.exploit-db.com/exploits/4620 +CVE-2007-5997 - https://www.exploit-db.com/exploits/4619 +CVE-2007-5998 - https://www.exploit-db.com/exploits/4618 +CVE-2007-5999 - https://www.exploit-db.com/exploits/4617 +CVE-2007-6000 - http://securityreason.com/securityalert/3370 +CVE-2007-6004 - https://www.exploit-db.com/exploits/4623 +CVE-2007-6005 - http://marc.info/?l=full-disclosure&m=119498701505838&w=2 +CVE-2007-6012 - http://securityreason.com/securityalert/3374 +CVE-2007-6013 - http://securityreason.com/securityalert/3375 +CVE-2007-6015 - http://bugs.gentoo.org/show_bug.cgi?id=200773 +CVE-2007-6016 - https://www.exploit-db.com/exploits/5205 +CVE-2007-6017 - http://support.veritas.com/docs/300471 +CVE-2007-6026 - http://securityreason.com/securityalert/3376 +CVE-2007-6027 - https://www.exploit-db.com/exploits/4626 +CVE-2007-6028 - http://marc.info/?l=full-disclosure&m=119517573408574&w=2 +CVE-2007-6029 - http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote-code-execution.html +CVE-2007-6032 - http://packetstormsecurity.org/0710-exploits/aleris-sql.txt +CVE-2007-6033 - http://www.digitalbond.com/index.php/2007/11/19/wonderware-intouch-80-netdde-vulnerability-s4-preview/ +CVE-2007-6036 - http://aluigi.altervista.org/adv/live555x-adv.txt +CVE-2007-6037 - http://securityreason.com/securityalert/3377 +CVE-2007-6038 - https://www.exploit-db.com/exploits/4636 +CVE-2007-6039 - http://securityreason.com/securityalert/3365 +CVE-2007-6039 - http://securityreason.com/securityalert/3366 +CVE-2007-6041 - http://aluigi.altervista.org/adv/rorbof-adv.txt +CVE-2007-6041 - http://aluigi.org/poc/rorbof.zip +CVE-2007-6043 - http://www.computerworld.com.au/index.php/id;1165210682;fp;2;fpid;1 +CVE-2007-6055 - http://securityreason.com/securityalert/3379 +CVE-2007-6057 - https://www.exploit-db.com/exploits/4628 +CVE-2007-6058 - https://www.exploit-db.com/exploits/4627 +CVE-2007-6063 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9846 +CVE-2007-6078 - https://www.exploit-db.com/exploits/4638 +CVE-2007-6079 - https://www.exploit-db.com/exploits/4637 +CVE-2007-6080 - https://www.exploit-db.com/exploits/4637 +CVE-2007-6082 - https://www.exploit-db.com/exploits/4635 +CVE-2007-6083 - https://www.exploit-db.com/exploits/4634 +CVE-2007-6084 - https://www.exploit-db.com/exploits/4633 +CVE-2007-6085 - https://www.exploit-db.com/exploits/4632 +CVE-2007-6086 - https://www.exploit-db.com/exploits/4632 +CVE-2007-6087 - https://www.exploit-db.com/exploits/4632 +CVE-2007-6088 - https://www.exploit-db.com/exploits/4631 +CVE-2007-6089 - https://www.exploit-db.com/exploits/4630 +CVE-2007-6103 - http://aluigi.altervista.org/adv/ihudos-adv.txt +CVE-2007-6105 - https://www.exploit-db.com/exploits/4640 +CVE-2007-6106 - https://www.exploit-db.com/exploits/4641 +CVE-2007-6111 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9048 +CVE-2007-6112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9772 +CVE-2007-6113 - http://securityreason.com/securityalert/3095 +CVE-2007-6113 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9841 +CVE-2007-6113 - https://www.exploit-db.com/exploits/4347 +CVE-2007-6115 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9726 +CVE-2007-6116 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9799 +CVE-2007-6119 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9880 +CVE-2007-6120 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488 +CVE-2007-6124 - https://www.exploit-db.com/exploits/4660 +CVE-2007-6125 - https://www.exploit-db.com/exploits/4660 +CVE-2007-6126 - https://www.exploit-db.com/exploits/4655 +CVE-2007-6127 - https://www.exploit-db.com/exploits/4655 +CVE-2007-6128 - https://www.exploit-db.com/exploits/4653 +CVE-2007-6129 - https://www.exploit-db.com/exploits/4652 +CVE-2007-6133 - https://www.exploit-db.com/exploits/4642 +CVE-2007-6134 - https://www.exploit-db.com/exploits/4646 +CVE-2007-6135 - http://www.packetstormsecurity.org/0711-exploits/phpslideshow-xss.txt +CVE-2007-6137 - https://www.exploit-db.com/exploits/4645 +CVE-2007-6139 - https://www.exploit-db.com/exploits/4650 +CVE-2007-6140 - http://www.packetstormsecurity.org/0711-exploits/dora-sql.txt +CVE-2007-6147 - https://www.exploit-db.com/exploits/4659 +CVE-2007-6159 - http://securityreason.com/securityalert/3402 +CVE-2007-6160 - http://securityreason.com/securityalert/3402 +CVE-2007-6161 - http://securityreason.com/securityalert/3402 +CVE-2007-6164 - https://www.exploit-db.com/exploits/4665 +CVE-2007-6165 - http://www.heise-security.co.uk/news/99257 +CVE-2007-6166 - http://securityreason.com/securityalert/3410 +CVE-2007-6166 - http://www.beskerming.com/security/2007/11/25/74/QuickTime_-_Remote_hacker_automatic_control +CVE-2007-6166 - https://www.exploit-db.com/exploits/4648 +CVE-2007-6166 - https://www.exploit-db.com/exploits/6013 +CVE-2007-6172 - https://www.exploit-db.com/exploits/4668 +CVE-2007-6176 - https://www.exploit-db.com/exploits/4647 +CVE-2007-6177 - https://www.exploit-db.com/exploits/4670 +CVE-2007-6178 - https://www.exploit-db.com/exploits/4671 +CVE-2007-6179 - https://www.exploit-db.com/exploits/4672 +CVE-2007-6181 - http://securityreason.com/securityalert/3406 +CVE-2007-6183 - http://securityreason.com/securityalert/3407 +CVE-2007-6184 - https://www.exploit-db.com/exploits/4669 +CVE-2007-6185 - http://securityreason.com/securityalert/3408 +CVE-2007-6185 - https://www.exploit-db.com/exploits/4666 +CVE-2007-6187 - https://www.exploit-db.com/exploits/4675 +CVE-2007-6188 - https://www.exploit-db.com/exploits/4674 +CVE-2007-6189 - http://securityreason.com/securityalert/3405 +CVE-2007-6189 - https://www.exploit-db.com/exploits/4663 +CVE-2007-6191 - http://www.packetstormsecurity.org/0711-exploits/pmapper-rfi.txt +CVE-2007-6195 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5710 +CVE-2007-6202 - https://www.exploit-db.com/exploits/4678 +CVE-2007-6204 - https://www.exploit-db.com/exploits/4724 +CVE-2007-6207 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9471 +CVE-2007-6212 - https://www.exploit-db.com/exploits/4679 +CVE-2007-6213 - https://www.exploit-db.com/exploits/4677 +CVE-2007-6214 - https://www.exploit-db.com/exploits/4680 +CVE-2007-6215 - https://www.exploit-db.com/exploits/4676 +CVE-2007-6217 - https://www.exploit-db.com/exploits/4649 +CVE-2007-6218 - http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt +CVE-2007-6223 - https://www.exploit-db.com/exploits/4686 +CVE-2007-6224 - http://securityreason.com/securityalert/3415 +CVE-2007-6229 - https://www.exploit-db.com/exploits/4685 +CVE-2007-6230 - https://www.exploit-db.com/exploits/4685 +CVE-2007-6231 - https://www.exploit-db.com/exploits/4684 +CVE-2007-6232 - https://www.exploit-db.com/exploits/4681 +CVE-2007-6233 - https://www.exploit-db.com/exploits/4681 +CVE-2007-6234 - https://www.exploit-db.com/exploits/4681 +CVE-2007-6235 - https://www.exploit-db.com/exploits/4683 +CVE-2007-6236 - https://www.exploit-db.com/exploits/4682 +CVE-2007-6237 - http://securityreason.com/securityalert/3416 +CVE-2007-6238 - http://wabisabilabi.blogspot.com/2007/11/quicktime-zeroday-vulnerability-still.html +CVE-2007-6240 - https://www.exploit-db.com/exploits/4687 +CVE-2007-6242 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9188 +CVE-2007-6243 - http://www.securityfocus.com/bid/26929 +CVE-2007-6244 - http://www.securityfocus.com/bid/26929 +CVE-2007-6245 - http://www.securityfocus.com/bid/26929 +CVE-2007-6245 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9546 +CVE-2007-6246 - http://www.securityfocus.com/bid/26929 +CVE-2007-6255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 +CVE-2007-6258 - https://www.exploit-db.com/exploits/5330 +CVE-2007-6258 - https://www.exploit-db.com/exploits/5386 +CVE-2007-6261 - http://www.digit-labs.org/files/exploits/xnu-macho-dos.c +CVE-2007-6262 - http://securityreason.com/securityalert/3420 +CVE-2007-6262 - http://www.coresecurity.com/?action=item&id=2035 +CVE-2007-6268 - http://marc.info/?l=bugtraq&m=119678724111351&w=2 +CVE-2007-6269 - http://marc.info/?l=bugtraq&m=119678724111351&w=2 +CVE-2007-6270 - http://marc.info/?l=bugtraq&m=119678724111351&w=2 +CVE-2007-6271 - http://securityreason.com/securityalert/3421 +CVE-2007-6272 - http://securityreason.com/securityalert/3422 +CVE-2007-6273 - http://marc.info/?l=bugtraq&m=119678272603064&w=2 +CVE-2007-6276 - https://www.exploit-db.com/exploits/4690 +CVE-2007-6283 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977 +CVE-2007-6286 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2007-6289 - https://www.exploit-db.com/exploits/4696 +CVE-2007-6289 - https://www.exploit-db.com/exploits/9284 +CVE-2007-6290 - https://www.exploit-db.com/exploits/4696 +CVE-2007-6292 - https://www.exploit-db.com/exploits/4697 +CVE-2007-6296 - http://securityreason.com/securityalert/3426 +CVE-2007-6297 - http://securityreason.com/securityalert/3426 +CVE-2007-6301 - http://securityreason.com/securityalert/3427 +CVE-2007-6307 - http://securityreason.com/securityalert/3431 +CVE-2007-6310 - https://www.exploit-db.com/exploits/4711 +CVE-2007-6311 - https://www.exploit-db.com/exploits/4711 +CVE-2007-6318 - http://securityreason.com/securityalert/3433 +CVE-2007-6321 - http://securityreason.com/securityalert/3435 +CVE-2007-6322 - https://www.exploit-db.com/exploits/4729 +CVE-2007-6323 - https://www.exploit-db.com/exploits/4728 +CVE-2007-6324 - https://www.exploit-db.com/exploits/4726 +CVE-2007-6325 - https://www.exploit-db.com/exploits/4725 +CVE-2007-6326 - https://www.exploit-db.com/exploits/4717 +CVE-2007-6327 - https://www.exploit-db.com/exploits/4716 +CVE-2007-6328 - http://aluigi.org/poc/dosboxxx.zip +CVE-2007-6328 - http://securityreason.com/securityalert/3442 +CVE-2007-6329 - http://securityreason.com/securityalert/3443 +CVE-2007-6331 - https://www.exploit-db.com/exploits/4720 +CVE-2007-6332 - https://www.exploit-db.com/exploits/4720 +CVE-2007-6333 - https://www.exploit-db.com/exploits/4720 +CVE-2007-6335 - https://www.exploit-db.com/exploits/4862 +CVE-2007-6340 - http://securityreason.com/securityalert/3611 +CVE-2007-6344 - https://www.exploit-db.com/exploits/4719 +CVE-2007-6347 - https://www.exploit-db.com/exploits/4722 +CVE-2007-6348 - http://marc.info/?l=squirrelmail-devel&m=119765235203392&w=2 +CVE-2007-6351 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9420 +CVE-2007-6357 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9052538&source=rss_topic17 +CVE-2007-6359 - http://digit-labs.org/files/exploits/xnu-superblob-dos.c +CVE-2007-6362 - https://www.exploit-db.com/exploits/4691 +CVE-2007-6366 - https://www.exploit-db.com/exploits/4693 +CVE-2007-6367 - https://www.exploit-db.com/exploits/4693 +CVE-2007-6368 - https://www.exploit-db.com/exploits/4694 +CVE-2007-6369 - https://www.exploit-db.com/exploits/4695 +CVE-2007-6377 - http://aluigi.altervista.org/adv/badblue-adv.txt +CVE-2007-6377 - http://securityreason.com/securityalert/3448 +CVE-2007-6377 - https://www.exploit-db.com/exploits/4784 +CVE-2007-6378 - http://aluigi.altervista.org/adv/badblue-adv.txt +CVE-2007-6378 - http://securityreason.com/securityalert/3448 +CVE-2007-6379 - http://aluigi.altervista.org/adv/badblue-adv.txt +CVE-2007-6379 - http://securityreason.com/securityalert/3448 +CVE-2007-6387 - https://www.exploit-db.com/exploits/4825 +CVE-2007-6388 - http://securityreason.com/securityalert/3541 +CVE-2007-6388 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2007-6391 - https://www.exploit-db.com/exploits/4709 +CVE-2007-6392 - https://www.exploit-db.com/exploits/4708 +CVE-2007-6393 - https://www.exploit-db.com/exploits/4707 +CVE-2007-6394 - https://www.exploit-db.com/exploits/4706 +CVE-2007-6395 - https://www.exploit-db.com/exploits/4705 +CVE-2007-6396 - https://www.exploit-db.com/exploits/4705 +CVE-2007-6397 - https://www.exploit-db.com/exploits/4705 +CVE-2007-6398 - https://www.exploit-db.com/exploits/4705 +CVE-2007-6399 - https://www.exploit-db.com/exploits/4705 +CVE-2007-6400 - https://www.exploit-db.com/exploits/4704 +CVE-2007-6401 - http://securityreason.com/securityalert/3453 +CVE-2007-6404 - https://www.exploit-db.com/exploits/4700 +CVE-2007-6405 - https://www.exploit-db.com/exploits/4700 +CVE-2007-6411 - http://securityreason.com/securityalert/3455 +CVE-2007-6414 - https://www.exploit-db.com/exploits/4731 +CVE-2007-6416 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9840 +CVE-2007-6424 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html +CVE-2007-6424 - http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002533.html +CVE-2007-6435 - http://securityreason.com/securityalert/3459 +CVE-2007-6451 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9685 +CVE-2007-6453 - http://securityreason.com/securityalert/3460 +CVE-2007-6454 - http://aluigi.altervista.org/adv/peercasthof-adv.txt +CVE-2007-6454 - http://securityreason.com/securityalert/3461 +CVE-2007-6455 - http://securityreason.com/securityalert/3462 +CVE-2007-6458 - https://www.exploit-db.com/exploits/4733 +CVE-2007-6459 - https://www.exploit-db.com/exploits/4734 +CVE-2007-6460 - http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/ +CVE-2007-6460 - http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/log.php?r1=284&r2=325 +CVE-2007-6460 - http://anonproxyserver.svn.sourceforge.net/viewvc/anonproxyserver/trunk/anon_proxy_server/logerror.php?r1=245&r2=325 +CVE-2007-6462 - https://www.exploit-db.com/exploits/4737 +CVE-2007-6464 - https://www.exploit-db.com/exploits/4736 +CVE-2007-6466 - https://www.exploit-db.com/exploits/4739 +CVE-2007-6466 - https://www.exploit-db.com/exploits/4740 +CVE-2007-6468 - http://sourceforge.net/project/shownotes.php?release_id=562016&group_id=124987 +CVE-2007-6472 - https://www.exploit-db.com/exploits/4750 +CVE-2007-6473 - https://www.exploit-db.com/exploits/4742 +CVE-2007-6474 - https://www.exploit-db.com/exploits/4738 +CVE-2007-6475 - https://www.exploit-db.com/exploits/4738 +CVE-2007-6476 - https://www.exploit-db.com/exploits/4738 +CVE-2007-6478 - http://securityreason.com/securityalert/3470 +CVE-2007-6478 - https://www.exploit-db.com/exploits/5122 +CVE-2007-6479 - https://www.exploit-db.com/exploits/4753 +CVE-2007-6485 - https://www.exploit-db.com/exploits/4735 +CVE-2007-6488 - https://www.exploit-db.com/exploits/4712 +CVE-2007-6489 - https://www.exploit-db.com/exploits/4712 +CVE-2007-6490 - https://www.exploit-db.com/exploits/4712 +CVE-2007-6491 - http://securityreason.com/securityalert/3473 +CVE-2007-6494 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6495 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6496 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6497 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6498 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6499 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6500 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6501 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6502 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6503 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6504 - https://www.exploit-db.com/exploits/4730 +CVE-2007-6506 - http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9053818 +CVE-2007-6506 - https://www.exploit-db.com/exploits/4757 +CVE-2007-6508 - https://www.exploit-db.com/exploits/4758 +CVE-2007-6509 - http://marc.info/?l=full-disclosure&m=119794961212714&w=2 +CVE-2007-6510 - http://aluigi.altervista.org/adv/prowizbof-adv.txt +CVE-2007-6510 - http://aluigi.org/poc/prowizbof.zip +CVE-2007-6511 - http://mrhinkydink.blogspot.com/2007/12/websense-policy-filtering-bypass.html +CVE-2007-6513 - http://www.heise-security.co.uk/news/100934 +CVE-2007-6515 - http://securityreason.com/securityalert/3480 +CVE-2007-6515 - http://www.exploit-db.com/exploits/15987 +CVE-2007-6523 - http://securityreason.com/securityalert/3482 +CVE-2007-6524 - https://bugzilla.mozilla.org/show_bug.cgi?id=408076 +CVE-2007-6528 - http://securityreason.com/securityalert/3484 +CVE-2007-6528 - https://www.exploit-db.com/exploits/4942 +CVE-2007-6530 - http://marc.info/?l=full-disclosure&m=119863639428564&w=2 +CVE-2007-6533 - http://aluigi.altervista.org/adv/zoomprayer-adv.txt +CVE-2007-6533 - http://securityreason.com/securityalert/3486 +CVE-2007-6534 - http://securityreason.com/securityalert/3490 +CVE-2007-6537 - http://aluigi.altervista.org/adv/winuaebof-adv.txt +CVE-2007-6537 - http://aluigi.org/poc/winuaebof.zip +CVE-2007-6537 - http://securityreason.com/securityalert/3487 +CVE-2007-6538 - http://securityreason.com/securityalert/3492 +CVE-2007-6542 - https://www.exploit-db.com/exploits/4764 +CVE-2007-6543 - https://www.exploit-db.com/exploits/4791 +CVE-2007-6544 - https://www.exploit-db.com/exploits/4787 +CVE-2007-6544 - https://www.exploit-db.com/exploits/4790 +CVE-2007-6545 - https://www.exploit-db.com/exploits/4790 +CVE-2007-6546 - https://www.exploit-db.com/exploits/4790 +CVE-2007-6547 - https://www.exploit-db.com/exploits/4790 +CVE-2007-6548 - https://www.exploit-db.com/exploits/4790 +CVE-2007-6550 - https://www.exploit-db.com/exploits/4789 +CVE-2007-6551 - https://www.exploit-db.com/exploits/4788 +CVE-2007-6552 - https://www.exploit-db.com/exploits/4786 +CVE-2007-6553 - https://www.exploit-db.com/exploits/4785 +CVE-2007-6554 - https://www.exploit-db.com/exploits/4785 +CVE-2007-6555 - https://www.exploit-db.com/exploits/4783 +CVE-2007-6556 - https://www.exploit-db.com/exploits/4777 +CVE-2007-6557 - https://www.exploit-db.com/exploits/4778 +CVE-2007-6558 - http://securityreason.com/securityalert/3500 +CVE-2007-6558 - http://www.securityfocus.com/archive/1/485564/100/100/threaded +CVE-2007-6561 - http://securityreason.com/securityalert/3495 +CVE-2007-6565 - https://www.exploit-db.com/exploits/4793 +CVE-2007-6566 - https://www.exploit-db.com/exploits/4794 +CVE-2007-6567 - https://www.exploit-db.com/exploits/4794 +CVE-2007-6568 - https://www.exploit-db.com/exploits/4795 +CVE-2007-6573 - http://securityreason.com/securityalert/3494 +CVE-2007-6575 - https://www.exploit-db.com/exploits/4776 +CVE-2007-6576 - https://www.exploit-db.com/exploits/4775 +CVE-2007-6577 - https://www.exploit-db.com/exploits/4772 +CVE-2007-6578 - https://www.exploit-db.com/exploits/4774 +CVE-2007-6579 - https://www.exploit-db.com/exploits/4771 +CVE-2007-6580 - https://www.exploit-db.com/exploits/4770 +CVE-2007-6581 - https://www.exploit-db.com/exploits/4767 +CVE-2007-6582 - https://www.exploit-db.com/exploits/4766 +CVE-2007-6583 - https://www.exploit-db.com/exploits/4765 +CVE-2007-6584 - https://www.exploit-db.com/exploits/4765 +CVE-2007-6584 - https://www.exploit-db.com/exploits/5434 +CVE-2007-6585 - https://www.exploit-db.com/exploits/4763 +CVE-2007-6586 - https://www.exploit-db.com/exploits/4762 +CVE-2007-6587 - http://packetstormsecurity.com/files/112947/Plogger-Photo-Gallery-SQL-Injection.html +CVE-2007-6587 - http://packetstormsecurity.org/files/112947/Plogger-Photo-Gallery-SQL-Injection.html +CVE-2007-6587 - https://labs.mwrinfosecurity.com/advisories/2007/12/17/plogger-sql-injection/ +CVE-2007-6589 - http://blog.beford.org/?p=8 +CVE-2007-6589 - http://www.mozilla.org/security/announce/2007/mfsa2007-37.html +CVE-2007-6589 - https://bugzilla.mozilla.org/show_bug.cgi?id=403331 +CVE-2007-6593 - http://securityreason.com/securityalert/3499 +CVE-2007-6602 - https://www.exploit-db.com/exploits/4805 +CVE-2007-6603 - https://www.exploit-db.com/exploits/4804 +CVE-2007-6604 - https://www.exploit-db.com/exploits/4802 +CVE-2007-6605 - https://www.exploit-db.com/exploits/4801 +CVE-2007-6606 - http://securityreason.com/securityalert/3502 +CVE-2007-6607 - http://securityreason.com/securityalert/3502 +CVE-2007-6608 - http://securityreason.com/securityalert/3502 +CVE-2007-6614 - https://www.exploit-db.com/exploits/4782 +CVE-2007-6615 - https://www.exploit-db.com/exploits/4782 +CVE-2007-6620 - https://www.exploit-db.com/exploits/4799 +CVE-2007-6621 - https://www.exploit-db.com/exploits/4799 +CVE-2007-6622 - https://www.exploit-db.com/exploits/4798 +CVE-2007-6623 - https://www.exploit-db.com/exploits/4798 +CVE-2007-6624 - https://www.exploit-db.com/exploits/4796 +CVE-2007-6626 - http://aluigi.altervista.org/adv/fengulo-adv.txt +CVE-2007-6626 - http://aluigi.org/poc/fengulo.zip +CVE-2007-6626 - http://securityreason.com/securityalert/3507 +CVE-2007-6627 - http://aluigi.altervista.org/adv/fengulo-adv.txt +CVE-2007-6627 - http://aluigi.org/poc/fengulo.zip +CVE-2007-6627 - http://securityreason.com/securityalert/3507 +CVE-2007-6628 - http://aluigi.altervista.org/adv/fengulo-adv.txt +CVE-2007-6628 - http://aluigi.org/poc/fengulo.zip +CVE-2007-6628 - http://securityreason.com/securityalert/3507 +CVE-2007-6629 - http://aluigi.altervista.org/adv/fengulo-adv.txt +CVE-2007-6629 - http://aluigi.org/poc/fengulo.zip +CVE-2007-6629 - http://securityreason.com/securityalert/3507 +CVE-2007-6630 - http://aluigi.altervista.org/adv/fengulo-adv.txt +CVE-2007-6630 - http://aluigi.org/poc/fengulo.zip +CVE-2007-6630 - http://securityreason.com/securityalert/3507 +CVE-2007-6631 - http://aluigi.altervista.org/adv/libnemesibof-adv.txt +CVE-2007-6631 - http://aluigi.org/poc/libnemesibof.zip +CVE-2007-6631 - http://securityreason.com/securityalert/3513 +CVE-2007-6632 - https://www.exploit-db.com/exploits/4800 +CVE-2007-6637 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828 +CVE-2007-6638 - https://www.exploit-db.com/exploits/4797 +CVE-2007-6639 - https://www.exploit-db.com/exploits/4821 +CVE-2007-6642 - http://securityreason.com/securityalert/3505 +CVE-2007-6647 - https://www.exploit-db.com/exploits/4817 +CVE-2007-6648 - https://www.exploit-db.com/exploits/4816 +CVE-2007-6649 - https://www.exploit-db.com/exploits/4815 +CVE-2007-6650 - http://www.bugreport.ir/?/24 +CVE-2007-6650 - https://www.exploit-db.com/exploits/4814 +CVE-2007-6651 - http://www.bugreport.ir/?/24 +CVE-2007-6651 - https://www.exploit-db.com/exploits/4814 +CVE-2007-6652 - https://www.exploit-db.com/exploits/4813 +CVE-2007-6653 - https://www.exploit-db.com/exploits/4812 +CVE-2007-6654 - https://www.exploit-db.com/exploits/4819 +CVE-2007-6655 - https://www.exploit-db.com/exploits/4811 +CVE-2007-6656 - https://www.exploit-db.com/exploits/4810 +CVE-2007-6657 - https://www.exploit-db.com/exploits/4808 +CVE-2007-6658 - https://www.exploit-db.com/exploits/4809 +CVE-2007-6663 - https://www.exploit-db.com/exploits/4827 +CVE-2007-6664 - https://www.exploit-db.com/exploits/4826 +CVE-2007-6665 - https://www.exploit-db.com/exploits/4824 +CVE-2007-6666 - https://www.exploit-db.com/exploits/4823 +CVE-2007-6667 - https://www.exploit-db.com/exploits/4822 +CVE-2007-6668 - https://www.exploit-db.com/exploits/4741 +CVE-2007-6673 - http://www.packetstormsecurity.org/0712-exploits/makale-xss.txt +CVE-2007-6674 - http://www.packetstormsecurity.org/0801-exploits/rapidshare-xss.txt +CVE-2007-6676 - http://securityreason.com/securityalert/3519 +CVE-2007-6681 - http://aluigi.altervista.org/adv/vlcboffs-adv.txt +CVE-2007-6681 - http://securityreason.com/securityalert/3550 +CVE-2007-6681 - https://www.exploit-db.com/exploits/5667 +CVE-2007-6682 - http://aluigi.altervista.org/adv/vlcboffs-adv.txt +CVE-2007-6682 - http://securityreason.com/securityalert/3550 +CVE-2007-6682 - https://www.exploit-db.com/exploits/5519 +CVE-2007-6685 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6686 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6687 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6688 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6689 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6690 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6691 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6692 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6693 - http://bugs.gentoo.org/show_bug.cgi?id=203217 +CVE-2007-6697 - http://marc.info/?l=bugtraq&m=120110205511630&w=2 +CVE-2007-6697 - http://vexillium.org/?sec-sdlgif +CVE-2007-6699 - http://seclists.org/fulldisclosure/2007/Dec/0561.html +CVE-2007-6702 - https://www.exploit-db.com/exploits/4744 +CVE-2007-6707 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ +CVE-2007-6708 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ +CVE-2007-6709 - http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ +CVE-2007-6712 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9210 +CVE-2007-6720 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2007-6725 - http://www.openwall.com/lists/oss-security/2009/04/01/10 +CVE-2007-6725 - http://www.redhat.com/support/errata/RHSA-2009-0420.html +CVE-2007-6725 - https://bugzilla.redhat.com/show_bug.cgi?id=493442 +CVE-2007-6725 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9507 +CVE-2007-6731 - http://aluigi.altervista.org/adv/xmpbof-adv.txt +CVE-2007-6732 - http://aluigi.altervista.org/adv/xmpbof-adv.txt +CVE-2007-6736 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2007-6737 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2007-6738 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2007-6739 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2007-6740 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2007-6741 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2007-6744 - http://kb.flexerasoftware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=Installation-InstallShield-InstallShield2008Premier-Public-ProductInfo-IS2008PremProReleaseNotes2pdf&sliceId=pdfPage_42 +CVE-2007-6752 - http://groups.drupal.org/node/216314 +CVE-2007-6752 - http://packetstormsecurity.org/files/110404/drupal712-xsrf.txt +CVE-2007-6753 - http://blog.acrossecurity.com/2010/10/breaking-setdlldirectory-protection.html +CVE-2007-6755 - http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ +CVE-2007-6755 - https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html +CVE-2007-6758 - http://attrition.org/pipermail/vim/2007-April/001545.html +CVE-2007-6761 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b29669c065f60501e7289e1950fa2a618962358 +CVE-2008-0001 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709 +CVE-2008-0002 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-0007 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412 +CVE-2008-0010 - https://www.exploit-db.com/exploits/5093 +CVE-2008-0011 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 +CVE-2008-0015 - http://isc.sans.org/diary.html?storyid=6733 +CVE-2008-0015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 +CVE-2008-0016 - https://bugzilla.mozilla.org/show_bug.cgi?id=443288 +CVE-2008-0017 - https://bugzilla.mozilla.org/show_bug.cgi?id=443299 +CVE-2008-0020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 +CVE-2008-0027 - http://securityreason.com/securityalert/3551 +CVE-2008-0062 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt +CVE-2008-0062 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-0062 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9496 +CVE-2008-0063 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt +CVE-2008-0063 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-0067 - http://securityreason.com/securityalert/4885 +CVE-2008-0067 - http://securityreason.com/securityalert/8307 +CVE-2008-0068 - http://aluigi.altervista.org/adv/closedviewx-adv.txt +CVE-2008-0069 - https://www.exploit-db.com/exploits/5346 +CVE-2008-0071 - http://securityreason.com/securityalert/3943 +CVE-2008-0071 - https://www.exploit-db.com/exploits/5918 +CVE-2008-0074 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005 +CVE-2008-0075 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-006 +CVE-2008-0076 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 +CVE-2008-0077 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 +CVE-2008-0078 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 +CVE-2008-0080 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-007 +CVE-2008-0081 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0082 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-050 +CVE-2008-0083 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-022 +CVE-2008-0084 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-004 +CVE-2008-0085 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2008-0085 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2008-0085 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 +CVE-2008-0086 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2008-0086 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2008-0086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 +CVE-2008-0087 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020 +CVE-2008-0088 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-003 +CVE-2008-0089 - https://www.exploit-db.com/exploits/4830 +CVE-2008-0090 - https://www.exploit-db.com/exploits/4829 +CVE-2008-0091 - https://www.exploit-db.com/exploits/4828 +CVE-2008-0092 - http://securityreason.com/securityalert/3511 +CVE-2008-0094 - http://securityreason.com/securityalert/3522 +CVE-2008-0096 - http://aluigi.altervista.org/adv/gswsshit-adv.txt +CVE-2008-0096 - http://securityreason.com/securityalert/3517 +CVE-2008-0097 - http://aluigi.altervista.org/adv/gswsshit-adv.txt +CVE-2008-0097 - http://securityreason.com/securityalert/3517 +CVE-2008-0099 - https://www.exploit-db.com/exploits/4831 +CVE-2008-0100 - http://aluigi.altervista.org/adv/whitedunboffs-adv.txt +CVE-2008-0100 - http://securityreason.com/securityalert/3516 +CVE-2008-0101 - http://aluigi.altervista.org/adv/whitedunboffs-adv.txt +CVE-2008-0101 - http://securityreason.com/securityalert/3516 +CVE-2008-0102 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012 +CVE-2008-0103 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-013 +CVE-2008-0104 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012 +CVE-2008-0105 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 +CVE-2008-0106 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2008-0106 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2008-0106 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 +CVE-2008-0107 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2008-0107 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2008-0107 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 +CVE-2008-0108 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011 +CVE-2008-0108 - https://www.exploit-db.com/exploits/5107 +CVE-2008-0109 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-009 +CVE-2008-0110 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-015 +CVE-2008-0111 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0112 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0113 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016 +CVE-2008-0114 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0115 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0116 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0117 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 +CVE-2008-0117 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5508 +CVE-2008-0118 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016 +CVE-2008-0119 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-027 +CVE-2008-0120 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 +CVE-2008-0121 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 +CVE-2008-0122 - https://bugzilla.redhat.com/show_bug.cgi?id=429149 +CVE-2008-0127 - http://securityreason.com/securityalert/3530 +CVE-2008-0127 - https://www.exploit-db.com/exploits/4878 +CVE-2008-0128 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx +CVE-2008-0129 - https://www.exploit-db.com/exploits/4832 +CVE-2008-0132 - http://aluigi.altervista.org/adv/pragmassh-adv.txt +CVE-2008-0132 - http://aluigi.org/poc/pragmassh.zip +CVE-2008-0133 - https://www.exploit-db.com/exploits/4840 +CVE-2008-0134 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt +CVE-2008-0135 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt +CVE-2008-0136 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt +CVE-2008-0137 - https://www.exploit-db.com/exploits/4838 +CVE-2008-0138 - https://www.exploit-db.com/exploits/4847 +CVE-2008-0139 - https://www.exploit-db.com/exploits/4849 +CVE-2008-0140 - https://www.exploit-db.com/exploits/4846 +CVE-2008-0141 - https://www.exploit-db.com/exploits/4835 +CVE-2008-0142 - https://www.exploit-db.com/exploits/4835 +CVE-2008-0143 - https://www.exploit-db.com/exploits/4834 +CVE-2008-0144 - https://www.exploit-db.com/exploits/4833 +CVE-2008-0147 - https://www.exploit-db.com/exploits/4863 +CVE-2008-0148 - https://www.exploit-db.com/exploits/4861 +CVE-2008-0149 - https://www.exploit-db.com/exploits/4861 +CVE-2008-0151 - http://aluigi.altervista.org/adv/waccaz-adv.txt +CVE-2008-0151 - http://aluigi.altervista.org/adv/wachof-adv.txt +CVE-2008-0152 - http://aluigi.altervista.org/adv/slnetmsg-adv.txt +CVE-2008-0153 - http://aluigi.altervista.org/adv/pragmatel-adv.txt +CVE-2008-0154 - https://www.exploit-db.com/exploits/4865 +CVE-2008-0155 - https://www.exploit-db.com/exploits/4865 +CVE-2008-0157 - https://www.exploit-db.com/exploits/4858 +CVE-2008-0158 - http://packetstormsecurity.org/0801-exploits/shopscript-disclose.txt +CVE-2008-0158 - https://www.exploit-db.com/exploits/4855 +CVE-2008-0159 - https://www.exploit-db.com/exploits/4860 +CVE-2008-0166 - https://www.exploit-db.com/exploits/5622 +CVE-2008-0166 - https://www.exploit-db.com/exploits/5632 +CVE-2008-0166 - https://www.exploit-db.com/exploits/5720 +CVE-2008-0177 - https://www.exploit-db.com/exploits/5191 +CVE-2008-0185 - https://www.exploit-db.com/exploits/4852 +CVE-2008-0186 - https://www.exploit-db.com/exploits/4852 +CVE-2008-0187 - https://www.exploit-db.com/exploits/4836 +CVE-2008-0208 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt +CVE-2008-0209 - http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt +CVE-2008-0210 - https://www.exploit-db.com/exploits/4846 +CVE-2008-0219 - https://www.exploit-db.com/exploits/4867 +CVE-2008-0220 - https://www.exploit-db.com/exploits/4869 +CVE-2008-0220 - https://www.exploit-db.com/exploits/4982 +CVE-2008-0221 - https://www.exploit-db.com/exploits/4869 +CVE-2008-0222 - https://www.exploit-db.com/exploits/4844 +CVE-2008-0224 - https://www.exploit-db.com/exploits/4845 +CVE-2008-0226 - http://securityreason.com/securityalert/3531 +CVE-2008-0227 - http://securityreason.com/securityalert/3531 +CVE-2008-0228 - http://securityreason.com/securityalert/3534 +CVE-2008-0229 - http://securityreason.com/securityalert/3533 +CVE-2008-0230 - http://packetstormsecurity.org/0801-exploits/osdata-lfi.txt +CVE-2008-0230 - https://www.exploit-db.com/exploits/4870 +CVE-2008-0231 - https://www.exploit-db.com/exploits/4876 +CVE-2008-0232 - http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt +CVE-2008-0232 - https://www.exploit-db.com/exploits/4864 +CVE-2008-0233 - http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt +CVE-2008-0233 - https://www.exploit-db.com/exploits/4864 +CVE-2008-0234 - http://securityreason.com/securityalert/3537 +CVE-2008-0234 - http://www.kb.cert.org/vuls/id/112179 +CVE-2008-0234 - https://www.exploit-db.com/exploits/4885 +CVE-2008-0234 - https://www.exploit-db.com/exploits/4906 +CVE-2008-0235 - http://packetstormsecurity.org/0801-exploits/msvfpole-exec.txt +CVE-2008-0235 - https://www.exploit-db.com/exploits/4875 +CVE-2008-0236 - https://www.exploit-db.com/exploits/4873 +CVE-2008-0237 - https://www.exploit-db.com/exploits/4874 +CVE-2008-0244 - http://aluigi.altervista.org/adv/sapone-adv.txt +CVE-2008-0244 - http://securityreason.com/securityalert/3536 +CVE-2008-0244 - https://www.exploit-db.com/exploits/4877 +CVE-2008-0245 - https://www.exploit-db.com/exploits/4871 +CVE-2008-0246 - https://www.exploit-db.com/exploits/4871 +CVE-2008-0248 - https://www.exploit-db.com/exploits/4894 +CVE-2008-0249 - https://www.exploit-db.com/exploits/4872 +CVE-2008-0250 - https://www.exploit-db.com/exploits/4892 +CVE-2008-0253 - https://www.exploit-db.com/exploits/4904 +CVE-2008-0254 - https://www.exploit-db.com/exploits/4901 +CVE-2008-0255 - https://www.exploit-db.com/exploits/4886 +CVE-2008-0256 - https://www.exploit-db.com/exploits/4900 +CVE-2008-0259 - https://www.exploit-db.com/exploits/4902 +CVE-2008-0260 - https://www.exploit-db.com/exploits/4902 +CVE-2008-0262 - https://www.exploit-db.com/exploits/4898 +CVE-2008-0262 - https://www.exploit-db.com/exploits/4905 +CVE-2008-0265 - http://securityreason.com/securityalert/3545 +CVE-2008-0266 - http://securityreason.com/securityalert/3542 +CVE-2008-0267 - http://securityreason.com/securityalert/3542 +CVE-2008-0268 - http://securityreason.com/securityalert/3542 +CVE-2008-0270 - https://www.exploit-db.com/exploits/4899 +CVE-2008-0276 - http://drupal.org/node/208524 +CVE-2008-0278 - https://www.exploit-db.com/exploits/4907 +CVE-2008-0279 - https://www.exploit-db.com/exploits/4908 +CVE-2008-0280 - http://securityreason.com/securityalert/3544 +CVE-2008-0280 - https://www.exploit-db.com/exploits/4882 +CVE-2008-0282 - https://www.exploit-db.com/exploits/4880 +CVE-2008-0283 - https://www.exploit-db.com/exploits/4883 +CVE-2008-0284 - http://securityreason.com/securityalert/3540 +CVE-2008-0286 - http://securityreason.com/securityalert/3546 +CVE-2008-0287 - https://www.exploit-db.com/exploits/4889 +CVE-2008-0288 - http://securityreason.com/securityalert/3548 +CVE-2008-0288 - https://www.exploit-db.com/exploits/4895 +CVE-2008-0289 - http://securityreason.com/securityalert/3547 +CVE-2008-0290 - https://www.exploit-db.com/exploits/4887 +CVE-2008-0291 - https://www.exploit-db.com/exploits/4910 +CVE-2008-0297 - https://www.exploit-db.com/exploits/4897 +CVE-2008-0298 - http://securityreason.com/securityalert/3549 +CVE-2008-0300 - http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php +CVE-2008-0300 - https://www.exploit-db.com/exploits/5232 +CVE-2008-0301 - http://marc.info/?l=full-disclosure&m=120523564611595&w=2 +CVE-2008-0301 - http://securityreason.com/securityalert/3728 +CVE-2008-0301 - http://www.redteam-pentesting.de/advisories/rt-sa-2008-002.php +CVE-2008-0301 - https://www.exploit-db.com/exploits/5233 +CVE-2008-0304 - http://www.ubuntu.com/usn/usn-582-2 +CVE-2008-0310 - https://www.exploit-db.com/exploits/5355 +CVE-2008-0324 - https://www.exploit-db.com/exploits/4911 +CVE-2008-0325 - https://www.exploit-db.com/exploits/4916 +CVE-2008-0326 - https://www.exploit-db.com/exploits/4917 +CVE-2008-0327 - https://www.exploit-db.com/exploits/4914 +CVE-2008-0328 - https://www.exploit-db.com/exploits/4915 +CVE-2008-0329 - https://www.exploit-db.com/exploits/4912 +CVE-2008-0330 - http://www.open.com.au/radiator/history.html +CVE-2008-0332 - https://www.exploit-db.com/exploits/4920 +CVE-2008-0333 - https://www.exploit-db.com/exploits/4921 +CVE-2008-0334 - http://packetstormsecurity.org/0801-exploits/pMachinePro-241-xss.txt +CVE-2008-0337 - https://www.exploit-db.com/exploits/4923 +CVE-2008-0338 - https://www.exploit-db.com/exploits/4923 +CVE-2008-0350 - https://www.exploit-db.com/exploits/4884 +CVE-2008-0351 - https://www.exploit-db.com/exploits/4884 +CVE-2008-0352 - https://www.exploit-db.com/exploits/4893 +CVE-2008-0353 - https://www.exploit-db.com/exploits/4925 +CVE-2008-0355 - https://www.exploit-db.com/exploits/4929 +CVE-2008-0357 - https://www.exploit-db.com/exploits/4930 +CVE-2008-0358 - https://www.exploit-db.com/exploits/4924 +CVE-2008-0359 - https://www.exploit-db.com/exploits/4919 +CVE-2008-0360 - https://www.exploit-db.com/exploits/4919 +CVE-2008-0361 - http://securityreason.com/securityalert/3552 +CVE-2008-0361 - https://www.exploit-db.com/exploits/4926 +CVE-2008-0362 - http://securityreason.com/securityalert/3553 +CVE-2008-0363 - http://securityreason.com/securityalert/3553 +CVE-2008-0364 - http://aluigi.altervista.org/adv/ruttorrent-adv.txt +CVE-2008-0364 - http://aluigi.org/poc/ruttorrent.zip +CVE-2008-0364 - http://securityreason.com/securityalert/3554 +CVE-2008-0365 - http://securityreason.com/securityalert/3555 +CVE-2008-0365 - http://www.coresecurity.com/?action=item&id=2025 +CVE-2008-0366 - http://securityreason.com/securityalert/3555 +CVE-2008-0366 - http://www.coresecurity.com/?action=item&id=2025 +CVE-2008-0371 - https://www.exploit-db.com/exploits/4922 +CVE-2008-0372 - http://securityreason.com/securityalert/3557 +CVE-2008-0376 - https://www.exploit-db.com/exploits/4937 +CVE-2008-0377 - http://securityreason.com/securityalert/3556 +CVE-2008-0379 - https://www.exploit-db.com/exploits/4931 +CVE-2008-0380 - https://www.exploit-db.com/exploits/4932 +CVE-2008-0382 - http://securityreason.com/securityalert/3559 +CVE-2008-0382 - https://www.exploit-db.com/exploits/4927 +CVE-2008-0382 - https://www.exploit-db.com/exploits/4928 +CVE-2008-0383 - http://securityreason.com/securityalert/3558 +CVE-2008-0383 - http://www.waraxe.us/advisory-62.html +CVE-2008-0384 - https://www.exploit-db.com/exploits/4935 +CVE-2008-0385 - http://securityreason.com/securityalert/3707 +CVE-2008-0387 - http://securityreason.com/securityalert/3580 +CVE-2008-0387 - http://www.coresecurity.com/?action=item&id=2095 +CVE-2008-0388 - https://www.exploit-db.com/exploits/4939 +CVE-2008-0390 - https://www.exploit-db.com/exploits/4933 +CVE-2008-0391 - https://www.exploit-db.com/exploits/4922 +CVE-2008-0392 - https://www.exploit-db.com/exploits/4938 +CVE-2008-0393 - https://www.exploit-db.com/exploits/4936 +CVE-2008-0394 - https://www.exploit-db.com/exploits/4949 +CVE-2008-0395 - http://securityreason.com/securityalert/3573 +CVE-2008-0395 - http://www.waraxe.us/advisory-63.html +CVE-2008-0397 - https://www.exploit-db.com/exploits/4958 +CVE-2008-0398 - https://www.exploit-db.com/exploits/4958 +CVE-2008-0399 - https://www.exploit-db.com/exploits/4946 +CVE-2008-0403 - http://securityreason.com/securityalert/3566 +CVE-2008-0403 - https://www.exploit-db.com/exploits/4941 +CVE-2008-0411 - http://scary.beasts.org/security/CESA-2008-001.html +CVE-2008-0411 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557 +CVE-2008-0412 - http://www.ubuntu.com/usn/usn-582-2 +CVE-2008-0413 - http://www.ubuntu.com/usn/usn-582-2 +CVE-2008-0415 - http://www.ubuntu.com/usn/usn-582-2 +CVE-2008-0415 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897 +CVE-2008-0416 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-0418 - http://www.ubuntu.com/usn/usn-582-2 +CVE-2008-0420 - http://www.ubuntu.com/usn/usn-582-2 +CVE-2008-0420 - https://bugzilla.mozilla.org/show_bug.cgi?id=408076 +CVE-2008-0421 - https://www.exploit-db.com/exploits/4966 +CVE-2008-0422 - https://www.exploit-db.com/exploits/4952 +CVE-2008-0423 - https://www.exploit-db.com/exploits/4955 +CVE-2008-0424 - https://www.exploit-db.com/exploits/4951 +CVE-2008-0425 - https://www.exploit-db.com/exploits/4943 +CVE-2008-0427 - http://bugreport.ir/?/27 +CVE-2008-0427 - http://marc.info/?l=bugtraq&m=120093005310107&w=2 +CVE-2008-0427 - https://www.exploit-db.com/exploits/4945 +CVE-2008-0428 - http://bugreport.ir/?/27 +CVE-2008-0428 - http://marc.info/?l=bugtraq&m=120093005310107&w=2 +CVE-2008-0428 - https://www.exploit-db.com/exploits/4945 +CVE-2008-0429 - https://www.exploit-db.com/exploits/4956 +CVE-2008-0429 - https://www.exploit-db.com/exploits/6401 +CVE-2008-0430 - https://www.exploit-db.com/exploits/4944 +CVE-2008-0431 - https://www.exploit-db.com/exploits/4954 +CVE-2008-0434 - https://www.exploit-db.com/exploits/4947 +CVE-2008-0435 - https://www.exploit-db.com/exploits/4953 +CVE-2008-0437 - https://www.exploit-db.com/exploits/4959 +CVE-2008-0438 - http://securityreason.com/securityalert/3571 +CVE-2008-0439 - http://securityreason.com/securityalert/3564 +CVE-2008-0440 - https://www.exploit-db.com/exploits/4956 +CVE-2008-0443 - https://www.exploit-db.com/exploits/4967 +CVE-2008-0446 - https://www.exploit-db.com/exploits/4969 +CVE-2008-0447 - https://www.exploit-db.com/exploits/4968 +CVE-2008-0451 - http://securityreason.com/securityalert/3574 +CVE-2008-0452 - https://www.exploit-db.com/exploits/4973 +CVE-2008-0453 - https://www.exploit-db.com/exploits/4960 +CVE-2008-0454 - http://www.kb.cert.org/vuls/id/248184 +CVE-2008-0455 - http://securityreason.com/securityalert/3575 +CVE-2008-0455 - http://www.mindedsecurity.com/MSA01150108.html +CVE-2008-0456 - http://securityreason.com/securityalert/3575 +CVE-2008-0456 - http://www.mindedsecurity.com/MSA01150108.html +CVE-2008-0457 - https://www.exploit-db.com/exploits/5078 +CVE-2008-0458 - https://www.exploit-db.com/exploits/4975 +CVE-2008-0459 - https://www.exploit-db.com/exploits/4976 +CVE-2008-0461 - https://www.exploit-db.com/exploits/4965 +CVE-2008-0464 - https://www.exploit-db.com/exploits/4977 +CVE-2008-0465 - https://www.exploit-db.com/exploits/4980 +CVE-2008-0466 - http://securityreason.com/securityalert/3584 +CVE-2008-0466 - http://www.bugreport.ir/?/29 +CVE-2008-0466 - http://www.bugreport.ir/?/31 +CVE-2008-0466 - https://www.exploit-db.com/exploits/4970 +CVE-2008-0466 - https://www.exploit-db.com/exploits/4971 +CVE-2008-0468 - https://www.exploit-db.com/exploits/4985 +CVE-2008-0469 - https://www.exploit-db.com/exploits/4984 +CVE-2008-0470 - https://www.exploit-db.com/exploits/4974 +CVE-2008-0473 - http://securityreason.com/securityalert/3584 +CVE-2008-0473 - http://www.bugreport.ir/?/31 +CVE-2008-0473 - https://www.exploit-db.com/exploits/4971 +CVE-2008-0477 - https://www.exploit-db.com/exploits/4979 +CVE-2008-0478 - https://www.exploit-db.com/exploits/4962 +CVE-2008-0479 - http://securityreason.com/securityalert/3588 +CVE-2008-0479 - http://www.bugreport.ir/?/30 +CVE-2008-0479 - https://www.exploit-db.com/exploits/4972 +CVE-2008-0480 - http://securityreason.com/securityalert/3589 +CVE-2008-0480 - http://www.bugreport.ir/?/29 +CVE-2008-0480 - https://www.exploit-db.com/exploits/4970 +CVE-2008-0481 - http://securityreason.com/securityalert/3584 +CVE-2008-0481 - http://www.bugreport.ir/?/31 +CVE-2008-0481 - https://www.exploit-db.com/exploits/4971 +CVE-2008-0485 - http://securityreason.com/securityalert/3607 +CVE-2008-0486 - http://securityreason.com/securityalert/3608 +CVE-2008-0490 - https://www.exploit-db.com/exploits/4992 +CVE-2008-0491 - https://www.exploit-db.com/exploits/4993 +CVE-2008-0492 - https://www.exploit-db.com/exploits/4987 +CVE-2008-0493 - https://www.exploit-db.com/exploits/4998 +CVE-2008-0498 - https://www.exploit-db.com/exploits/5002 +CVE-2008-0501 - https://www.exploit-db.com/exploits/5000 +CVE-2008-0502 - https://www.exploit-db.com/exploits/5012 +CVE-2008-0503 - https://www.exploit-db.com/exploits/5003 +CVE-2008-0506 - http://www.waraxe.us/advisory-65.html +CVE-2008-0506 - https://www.exploit-db.com/exploits/5019 +CVE-2008-0507 - https://www.exploit-db.com/exploits/5013 +CVE-2008-0508 - http://securityreason.com/securityalert/3595 +CVE-2008-0510 - https://www.exploit-db.com/exploits/5007 +CVE-2008-0511 - https://www.exploit-db.com/exploits/5009 +CVE-2008-0512 - https://www.exploit-db.com/exploits/5008 +CVE-2008-0513 - https://www.exploit-db.com/exploits/5006 +CVE-2008-0514 - https://www.exploit-db.com/exploits/5010 +CVE-2008-0515 - https://www.exploit-db.com/exploits/5011 +CVE-2008-0517 - https://www.exploit-db.com/exploits/5016 +CVE-2008-0518 - https://www.exploit-db.com/exploits/5014 +CVE-2008-0519 - https://www.exploit-db.com/exploits/5015 +CVE-2008-0520 - https://www.exploit-db.com/exploits/5017 +CVE-2008-0521 - https://www.exploit-db.com/exploits/5001 +CVE-2008-0538 - http://marc.info/?l=full-disclosure&m=120139657100513&w=2 +CVE-2008-0538 - https://www.exploit-db.com/exploits/4990 +CVE-2008-0541 - https://www.exploit-db.com/exploits/4989 +CVE-2008-0542 - https://www.exploit-db.com/exploits/4989 +CVE-2008-0545 - https://www.exploit-db.com/exploits/4991 +CVE-2008-0546 - http://securityreason.com/securityalert/3600 +CVE-2008-0546 - https://www.exploit-db.com/exploits/4988 +CVE-2008-0547 - http://securityreason.com/securityalert/3600 +CVE-2008-0547 - https://www.exploit-db.com/exploits/4988 +CVE-2008-0548 - http://aluigi.altervista.org/adv/steamcazz-adv.txt +CVE-2008-0549 - http://aluigi.altervista.org/adv/steamcazz-adv.txt +CVE-2008-0549 - http://aluigi.org/poc/steamcazz.zip +CVE-2008-0550 - http://aluigi.altervista.org/adv/steamcazz-adv.txt +CVE-2008-0550 - http://aluigi.org/poc/steamcazz.zip +CVE-2008-0551 - https://www.exploit-db.com/exploits/4986 +CVE-2008-0552 - http://securityreason.com/securityalert/3601 +CVE-2008-0553 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-0554 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056 +CVE-2008-0557 - https://www.exploit-db.com/exploits/5030 +CVE-2008-0561 - https://www.exploit-db.com/exploits/5029 +CVE-2008-0562 - https://www.exploit-db.com/exploits/5031 +CVE-2008-0564 - http://www.ubuntu.com/usn/usn-586-1 +CVE-2008-0565 - https://www.exploit-db.com/exploits/5021 +CVE-2008-0566 - https://www.exploit-db.com/exploits/5022 +CVE-2008-0567 - https://www.exploit-db.com/exploits/5020 +CVE-2008-0572 - https://www.exploit-db.com/exploits/5026 +CVE-2008-0573 - https://www.exploit-db.com/exploits/5004 +CVE-2008-0579 - https://www.exploit-db.com/exploits/5011 +CVE-2008-0580 - http://securityreason.com/securityalert/3611 +CVE-2008-0581 - http://securityreason.com/securityalert/3611 +CVE-2008-0590 - https://www.exploit-db.com/exploits/5044 +CVE-2008-0591 - http://securityreason.com/securityalert/2781 +CVE-2008-0592 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9972 +CVE-2008-0593 - https://bugzilla.mozilla.org/show_bug.cgi?id=397427 +CVE-2008-0594 - https://bugzilla.mozilla.org/show_bug.cgi?id=408164 +CVE-2008-0595 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9353 +CVE-2008-0597 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9492 +CVE-2008-0600 - https://www.exploit-db.com/exploits/5092 +CVE-2008-0601 - https://www.exploit-db.com/exploits/5064 +CVE-2008-0602 - https://www.exploit-db.com/exploits/5061 +CVE-2008-0603 - https://www.exploit-db.com/exploits/5058 +CVE-2008-0606 - https://www.exploit-db.com/exploits/5059 +CVE-2008-0607 - https://www.exploit-db.com/exploits/5038 +CVE-2008-0609 - https://www.exploit-db.com/exploits/5060 +CVE-2008-0611 - https://www.exploit-db.com/exploits/5062 +CVE-2008-0612 - https://www.exploit-db.com/exploits/5057 +CVE-2008-0613 - https://www.exploit-db.com/exploits/5057 +CVE-2008-0614 - https://www.exploit-db.com/exploits/5065 +CVE-2008-0615 - http://securityreason.com/securityalert/3615 +CVE-2008-0615 - https://www.exploit-db.com/exploits/5035 +CVE-2008-0616 - http://securityreason.com/securityalert/3615 +CVE-2008-0616 - https://www.exploit-db.com/exploits/5035 +CVE-2008-0617 - http://securityreason.com/securityalert/3615 +CVE-2008-0617 - https://www.exploit-db.com/exploits/5035 +CVE-2008-0619 - https://www.exploit-db.com/exploits/5063 +CVE-2008-0620 - http://securityreason.com/securityalert/3619 +CVE-2008-0621 - http://securityreason.com/securityalert/3619 +CVE-2008-0621 - https://www.exploit-db.com/exploits/5079 +CVE-2008-0623 - https://www.exploit-db.com/exploits/5043 +CVE-2008-0623 - https://www.exploit-db.com/exploits/5046 +CVE-2008-0623 - https://www.exploit-db.com/exploits/5048 +CVE-2008-0624 - https://www.exploit-db.com/exploits/5051 +CVE-2008-0625 - https://www.exploit-db.com/exploits/5052 +CVE-2008-0628 - http://securityreason.com/securityalert/3621 +CVE-2008-0628 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9847 +CVE-2008-0631 - https://www.exploit-db.com/exploits/4999 +CVE-2008-0632 - http://securityreason.com/securityalert/3617 +CVE-2008-0632 - https://www.exploit-db.com/exploits/5033 +CVE-2008-0633 - http://securityreason.com/securityalert/3618 +CVE-2008-0633 - https://sourceforge.net/project/shownotes.php?group_id=138780&release_id=571924 +CVE-2008-0634 - https://www.exploit-db.com/exploits/5045 +CVE-2008-0635 - http://securityreason.com/securityalert/3620 +CVE-2008-0647 - https://www.exploit-db.com/exploits/5153 +CVE-2008-0648 - https://www.exploit-db.com/exploits/5068 +CVE-2008-0649 - https://www.exploit-db.com/exploits/5071 +CVE-2008-0652 - https://www.exploit-db.com/exploits/5073 +CVE-2008-0653 - https://www.exploit-db.com/exploits/5072 +CVE-2008-0654 - http://securityreason.com/securityalert/3622 +CVE-2008-0656 - http://securityreason.com/securityalert/3626 +CVE-2008-0658 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470 +CVE-2008-0659 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9060483 +CVE-2008-0659 - https://www.exploit-db.com/exploits/5025 +CVE-2008-0660 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9060483 +CVE-2008-0660 - https://www.exploit-db.com/exploits/5049 +CVE-2008-0661 - http://securityreason.com/securityalert/3623 +CVE-2008-0661 - https://www.exploit-db.com/exploits/5067 +CVE-2008-0661 - https://www.exploit-db.com/exploits/5069 +CVE-2008-0662 - http://securityreason.com/securityalert/3627 +CVE-2008-0667 - http://securityreason.com/securityalert/3625 +CVE-2008-0667 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9731 +CVE-2008-0670 - https://www.exploit-db.com/exploits/5081 +CVE-2008-0671 - http://aluigi.altervista.org/adv/rintintin-adv.txt +CVE-2008-0671 - http://securityreason.com/securityalert/3632 +CVE-2008-0672 - http://aluigi.altervista.org/adv/rintintin-adv.txt +CVE-2008-0672 - http://securityreason.com/securityalert/3632 +CVE-2008-0673 - http://aluigi.altervista.org/adv/rintintin-adv.txt +CVE-2008-0673 - http://securityreason.com/securityalert/3632 +CVE-2008-0675 - http://securityreason.com/securityalert/3631 +CVE-2008-0675 - https://www.exploit-db.com/exploits/5037 +CVE-2008-0676 - https://www.exploit-db.com/exploits/5050 +CVE-2008-0677 - https://www.exploit-db.com/exploits/5050 +CVE-2008-0678 - https://www.exploit-db.com/exploits/5042 +CVE-2008-0679 - https://www.exploit-db.com/exploits/5042 +CVE-2008-0680 - https://www.exploit-db.com/exploits/5054 +CVE-2008-0681 - http://securityreason.com/securityalert/3628 +CVE-2008-0681 - https://www.exploit-db.com/exploits/5041 +CVE-2008-0682 - https://www.exploit-db.com/exploits/5039 +CVE-2008-0683 - https://www.exploit-db.com/exploits/5053 +CVE-2008-0686 - https://www.exploit-db.com/exploits/5034 +CVE-2008-0689 - https://www.exploit-db.com/exploits/5055 +CVE-2008-0690 - https://www.exploit-db.com/exploits/5047 +CVE-2008-0692 - https://www.exploit-db.com/exploits/5056 +CVE-2008-0695 - https://www.exploit-db.com/exploits/5040 +CVE-2008-0702 - http://securityreason.com/securityalert/3639 +CVE-2008-0702 - https://www.exploit-db.com/exploits/5036 +CVE-2008-0703 - http://securityreason.com/securityalert/3629 +CVE-2008-0703 - https://www.exploit-db.com/exploits/5027 +CVE-2008-0714 - https://www.exploit-db.com/exploits/5074 +CVE-2008-0719 - https://www.exploit-db.com/exploits/5075 +CVE-2008-0721 - https://www.exploit-db.com/exploits/5076 +CVE-2008-0722 - https://www.exploit-db.com/exploits/4983 +CVE-2008-0724 - http://securityreason.com/securityalert/3631 +CVE-2008-0724 - https://www.exploit-db.com/exploits/5037 +CVE-2008-0729 - http://securityreason.com/securityalert/3630 +CVE-2008-0729 - https://www.exploit-db.com/exploits/4978 +CVE-2008-0734 - https://www.exploit-db.com/exploits/5088 +CVE-2008-0735 - https://www.exploit-db.com/exploits/5105 +CVE-2008-0736 - http://securityreason.com/securityalert/3600 +CVE-2008-0736 - https://www.exploit-db.com/exploits/4988 +CVE-2008-0737 - http://securityreason.com/securityalert/3600 +CVE-2008-0737 - https://www.exploit-db.com/exploits/4988 +CVE-2008-0742 - https://www.exploit-db.com/exploits/5082 +CVE-2008-0745 - https://www.exploit-db.com/exploits/5089 +CVE-2008-0746 - https://www.exploit-db.com/exploits/5084 +CVE-2008-0747 - http://securityreason.com/securityalert/3642 +CVE-2008-0747 - https://www.exploit-db.com/exploits/5085 +CVE-2008-0748 - https://www.exploit-db.com/exploits/5086 +CVE-2008-0748 - https://www.exploit-db.com/exploits/5100 +CVE-2008-0752 - https://www.exploit-db.com/exploits/5083 +CVE-2008-0755 - http://aluigi.altervista.org/adv/cyanuro-adv.txt +CVE-2008-0756 - http://aluigi.altervista.org/adv/cyanuro-adv.txt +CVE-2008-0758 - http://aluigi.altervista.org/adv/ezipirla-adv.txt +CVE-2008-0758 - http://aluigi.org/poc/ezipirla.zip +CVE-2008-0759 - http://aluigi.altervista.org/adv/ezipirla-adv.txt +CVE-2008-0759 - http://aluigi.org/poc/ezipirla.zip +CVE-2008-0761 - https://www.exploit-db.com/exploits/5104 +CVE-2008-0766 - http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt +CVE-2008-0767 - http://aluigi.altervista.org/adv/ezipirla-adv.txt +CVE-2008-0767 - http://aluigi.org/poc/ezipirla.zip +CVE-2008-0770 - https://www.exploit-db.com/exploits/5018 +CVE-2008-0772 - https://www.exploit-db.com/exploits/5080 +CVE-2008-0773 - https://www.exploit-db.com/exploits/5094 +CVE-2008-0776 - https://www.exploit-db.com/exploits/5096 +CVE-2008-0778 - https://www.exploit-db.com/exploits/5110 +CVE-2008-0782 - http://www.attrition.org/pipermail/vim/2008-January/001890.html +CVE-2008-0782 - https://www.exploit-db.com/exploits/4957 +CVE-2008-0787 - http://www.waraxe.us/advisory-64.html +CVE-2008-0787 - https://www.exploit-db.com/exploits/5070 +CVE-2008-0788 - http://securityreason.com/securityalert/3656 +CVE-2008-0789 - http://securityreason.com/securityalert/3655 +CVE-2008-0790 - http://aluigi.altervista.org/adv/winipds-adv.txt +CVE-2008-0790 - http://securityreason.com/securityalert/3658 +CVE-2008-0791 - http://aluigi.altervista.org/adv/winipds-adv.txt +CVE-2008-0791 - http://securityreason.com/securityalert/3658 +CVE-2008-0794 - https://www.exploit-db.com/exploits/5108 +CVE-2008-0795 - https://www.exploit-db.com/exploits/5109 +CVE-2008-0796 - https://www.exploit-db.com/exploits/5115 +CVE-2008-0798 - https://www.exploit-db.com/exploits/5116 +CVE-2008-0799 - https://www.exploit-db.com/exploits/5119 +CVE-2008-0800 - https://www.exploit-db.com/exploits/5118 +CVE-2008-0801 - https://www.exploit-db.com/exploits/5117 +CVE-2008-0802 - https://www.exploit-db.com/exploits/5120 +CVE-2008-0803 - https://www.exploit-db.com/exploits/5121 +CVE-2008-0804 - https://www.exploit-db.com/exploits/5150 +CVE-2008-0805 - https://www.exploit-db.com/exploits/5136 +CVE-2008-0811 - https://www.exploit-db.com/exploits/5130 +CVE-2008-0813 - https://www.exploit-db.com/exploits/5137 +CVE-2008-0814 - https://www.exploit-db.com/exploits/5129 +CVE-2008-0818 - https://www.exploit-db.com/exploits/5124 +CVE-2008-0821 - https://www.exploit-db.com/exploits/5125 +CVE-2008-0822 - https://www.exploit-db.com/exploits/5123 +CVE-2008-0827 - https://www.exploit-db.com/exploits/5147 +CVE-2008-0829 - https://www.exploit-db.com/exploits/5132 +CVE-2008-0830 - https://www.exploit-db.com/exploits/5151 +CVE-2008-0831 - https://www.exploit-db.com/exploits/5103 +CVE-2008-0832 - https://www.exploit-db.com/exploits/5128 +CVE-2008-0833 - https://www.exploit-db.com/exploits/5134 +CVE-2008-0835 - https://www.exploit-db.com/exploits/5131 +CVE-2008-0838 - http://securityreason.com/securityalert/3673 +CVE-2008-0839 - https://www.exploit-db.com/exploits/5138 +CVE-2008-0840 - https://www.exploit-db.com/exploits/5140 +CVE-2008-0841 - https://www.exploit-db.com/exploits/5133 +CVE-2008-0842 - https://www.exploit-db.com/exploits/5146 +CVE-2008-0843 - http://packetstormsecurity.org/1002-exploits/statcountex-disclose.txt +CVE-2008-0844 - https://www.exploit-db.com/exploits/5145 +CVE-2008-0847 - https://www.exploit-db.com/exploits/5148 +CVE-2008-0848 - http://securityreason.com/securityalert/3688 +CVE-2008-0850 - http://securityreason.com/securityalert/3687 +CVE-2008-0851 - http://securityreason.com/securityalert/3687 +CVE-2008-0852 - http://aluigi.altervista.org/adv/freesshdnull-adv.txt +CVE-2008-0857 - http://securityreason.com/securityalert/3680 +CVE-2008-0857 - https://www.exploit-db.com/exploits/5164 +CVE-2008-0871 - http://aluigi.altervista.org/adv/nowsmsz-adv.txt +CVE-2008-0871 - https://www.exploit-db.com/exploits/5695 +CVE-2008-0872 - http://securityreason.com/securityalert/3686 +CVE-2008-0873 - http://securityreason.com/securityalert/3681 +CVE-2008-0873 - https://www.exploit-db.com/exploits/5158 +CVE-2008-0874 - http://securityreason.com/securityalert/3682 +CVE-2008-0874 - https://www.exploit-db.com/exploits/5157 +CVE-2008-0877 - http://securityreason.com/securityalert/3683 +CVE-2008-0878 - https://www.exploit-db.com/exploits/5156 +CVE-2008-0879 - http://packetstormsecurity.com/files/126697/PHP-Nuke-Web-Links-SQL-Injection.html +CVE-2008-0879 - http://securityreason.com/securityalert/3684 +CVE-2008-0880 - https://www.exploit-db.com/exploits/5155 +CVE-2008-0881 - https://www.exploit-db.com/exploits/5159 +CVE-2008-0882 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9625 +CVE-2008-0888 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-0888 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733 +CVE-2008-0891 - http://www.kb.cert.org/vuls/id/661475 +CVE-2008-0894 - http://securityreason.com/securityalert/3685 +CVE-2008-0894 - https://bugzilla.mozilla.org/show_bug.cgi?id=408076 +CVE-2008-0905 - https://www.exploit-db.com/exploits/5162 +CVE-2008-0906 - https://www.exploit-db.com/exploits/5161 +CVE-2008-0907 - https://www.exploit-db.com/exploits/5163 +CVE-2008-0911 - https://www.exploit-db.com/exploits/5166 +CVE-2008-0912 - http://aluigi.altervista.org/adv/mobilinkhof-adv.txt +CVE-2008-0912 - http://securityreason.com/securityalert/3691 +CVE-2008-0916 - https://www.exploit-db.com/exploits/5160 +CVE-2008-0919 - http://securityreason.com/securityalert/3689 +CVE-2008-0919 - https://www.exploit-db.com/exploits/5171 +CVE-2008-0920 - http://securityreason.com/securityalert/3689 +CVE-2008-0920 - https://www.exploit-db.com/exploits/5171 +CVE-2008-0921 - https://www.exploit-db.com/exploits/5170 +CVE-2008-0922 - https://www.exploit-db.com/exploits/5168 +CVE-2008-0923 - http://securityreason.com/securityalert/3700 +CVE-2008-0923 - http://www.coresecurity.com/?action=item&id=2129 +CVE-2008-0923 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-0923 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-0923 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-0923 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-0927 - https://www.exploit-db.com/exploits/5547 +CVE-2008-0928 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706 +CVE-2008-0934 - https://www.exploit-db.com/exploits/5172 +CVE-2008-0939 - https://www.exploit-db.com/exploits/5135 +CVE-2008-0944 - http://aluigi.altervista.org/adv/ipsimene-adv.txt +CVE-2008-0944 - http://securityreason.com/securityalert/3697 +CVE-2008-0945 - http://aluigi.altervista.org/adv/ipsimene-adv.txt +CVE-2008-0945 - http://aluigi.org/poc/ipsimene.zip +CVE-2008-0945 - http://securityreason.com/securityalert/3697 +CVE-2008-0946 - http://aluigi.altervista.org/adv/ipsimene-adv.txt +CVE-2008-0946 - http://aluigi.org/poc/ipsimene.zip +CVE-2008-0946 - http://securityreason.com/securityalert/3697 +CVE-2008-0947 - http://securityreason.com/securityalert/3752 +CVE-2008-0947 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt +CVE-2008-0948 - http://securityreason.com/securityalert/3752 +CVE-2008-0948 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt +CVE-2008-0948 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-0948 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9209 +CVE-2008-0951 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038 +CVE-2008-0955 - https://www.exploit-db.com/exploits/5681 +CVE-2008-0960 - http://securityreason.com/securityalert/3933 +CVE-2008-0960 - http://www.ubuntu.com/usn/usn-685-1 +CVE-2008-0960 - https://bugzilla.redhat.com/show_bug.cgi?id=447974 +CVE-2008-0960 - https://www.exploit-db.com/exploits/5790 +CVE-2008-0964 - https://www.exploit-db.com/exploits/6328 +CVE-2008-0967 - http://securityreason.com/securityalert/3922 +CVE-2008-0967 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-0971 - http://securityreason.com/securityalert/4792 +CVE-2008-0973 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0973 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0973 - http://securityreason.com/securityalert/3698 +CVE-2008-0974 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0974 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0974 - http://securityreason.com/securityalert/3698 +CVE-2008-0975 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0975 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0975 - http://securityreason.com/securityalert/3698 +CVE-2008-0976 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0976 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0976 - http://securityreason.com/securityalert/3698 +CVE-2008-0977 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0977 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0977 - http://securityreason.com/securityalert/3698 +CVE-2008-0978 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0978 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0978 - http://securityreason.com/securityalert/3698 +CVE-2008-0979 - http://aluigi.altervista.org/adv/doubletakedown-adv.txt +CVE-2008-0979 - http://aluigi.org/poc/doubletakedown.zip +CVE-2008-0979 - http://securityreason.com/securityalert/3698 +CVE-2008-0980 - http://securityreason.com/securityalert/3699 +CVE-2008-0981 - http://securityreason.com/securityalert/3699 +CVE-2008-0982 - http://securityreason.com/securityalert/3699 +CVE-2008-0985 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2008-0986 - http://www.coresecurity.com/?action=item&id=2148 +CVE-2008-10001 - http://seclists.org/bugtraq/2008/Sep/0157.html +CVE-2008-1038 - https://www.exploit-db.com/exploits/5189 +CVE-2008-1039 - https://www.exploit-db.com/exploits/5185 +CVE-2008-1041 - http://www.packetstormsecurity.org/0802-exploits/mattswhois-xss.txt +CVE-2008-1042 - https://www.exploit-db.com/exploits/5183 +CVE-2008-1043 - https://www.exploit-db.com/exploits/5180 +CVE-2008-1044 - https://www.exploit-db.com/exploits/5190 +CVE-2008-1046 - https://www.exploit-db.com/exploits/5176 +CVE-2008-1051 - https://www.exploit-db.com/exploits/5175 +CVE-2008-1052 - http://aluigi.altervista.org/adv/surgeftpizza-adv.txt +CVE-2008-1052 - http://securityreason.com/securityalert/3704 +CVE-2008-1053 - https://www.exploit-db.com/exploits/5186 +CVE-2008-1054 - http://aluigi.altervista.org/adv/surgemailz-adv.txt +CVE-2008-1054 - http://securityreason.com/securityalert/3705 +CVE-2008-1055 - http://aluigi.altervista.org/adv/surgemailz-adv.txt +CVE-2008-1055 - http://securityreason.com/securityalert/3705 +CVE-2008-1059 - http://securityreason.com/securityalert/3706 +CVE-2008-1059 - https://www.exploit-db.com/exploits/5194 +CVE-2008-1060 - http://securityreason.com/securityalert/3706 +CVE-2008-1060 - https://www.exploit-db.com/exploits/5194 +CVE-2008-1061 - http://securityreason.com/securityalert/3706 +CVE-2008-1061 - https://www.exploit-db.com/exploits/5194 +CVE-2008-1067 - https://www.exploit-db.com/exploits/5173 +CVE-2008-1068 - https://www.exploit-db.com/exploits/5182 +CVE-2008-1069 - https://www.exploit-db.com/exploits/5174 +CVE-2008-1074 - https://www.exploit-db.com/exploits/5197 +CVE-2008-1077 - https://www.exploit-db.com/exploits/5195 +CVE-2008-1083 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 +CVE-2008-1083 - https://www.exploit-db.com/exploits/5442 +CVE-2008-1083 - https://www.exploit-db.com/exploits/6330 +CVE-2008-1084 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-025 +CVE-2008-1084 - https://www.exploit-db.com/exploits/5518 +CVE-2008-1085 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-024 +CVE-2008-1086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023 +CVE-2008-1087 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021 +CVE-2008-1087 - https://www.exploit-db.com/exploits/5442 +CVE-2008-1087 - https://www.exploit-db.com/exploits/6656 +CVE-2008-1088 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-018 +CVE-2008-1089 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019 +CVE-2008-1090 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019 +CVE-2008-1091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 +CVE-2008-1093 - http://securityreason.com/securityalert/4268 +CVE-2008-1094 - http://securityreason.com/securityalert/4793 +CVE-2008-1094 - https://www.exploit-db.com/exploits/7496 +CVE-2008-1105 - https://www.exploit-db.com/exploits/5712 +CVE-2008-1106 - http://securityreason.com/securityalert/3930 +CVE-2008-1110 - http://bugs.gentoo.org/show_bug.cgi?id=208100 +CVE-2008-1110 - https://www.exploit-db.com/exploits/1641 +CVE-2008-1116 - https://www.exploit-db.com/exploits/5188 +CVE-2008-1117 - http://aluigi.altervista.org/adv/timbuto-adv.txt +CVE-2008-1117 - http://aluigi.org/poc/timbuto.zip +CVE-2008-1117 - http://securityreason.com/securityalert/3741 +CVE-2008-1117 - https://www.exploit-db.com/exploits/4455 +CVE-2008-1117 - https://www.exploit-db.com/exploits/5238 +CVE-2008-1118 - https://www.exploit-db.com/exploits/5238 +CVE-2008-1119 - https://www.exploit-db.com/exploits/5204 +CVE-2008-1121 - https://www.exploit-db.com/exploits/5196 +CVE-2008-1122 - https://www.exploit-db.com/exploits/5198 +CVE-2008-1122 - https://www.exploit-db.com/exploits/5447 +CVE-2008-1123 - https://www.exploit-db.com/exploits/5199 +CVE-2008-1124 - https://www.exploit-db.com/exploits/5200 +CVE-2008-1125 - https://www.exploit-db.com/exploits/5200 +CVE-2008-1126 - https://www.exploit-db.com/exploits/5202 +CVE-2008-1127 - https://www.exploit-db.com/exploits/5201 +CVE-2008-1136 - http://securityreason.com/securityalert/3710 +CVE-2008-1136 - http://www.coresecurity.com/?action=item&id=2070 +CVE-2008-1137 - https://www.exploit-db.com/exploits/5178 +CVE-2008-1138 - https://www.exploit-db.com/exploits/5142 +CVE-2008-1139 - https://www.exploit-db.com/exploits/5143 +CVE-2008-1140 - https://www.exploit-db.com/exploits/5144 +CVE-2008-1141 - https://www.exploit-db.com/exploits/5141 +CVE-2008-1144 - http://securityreason.com/securityalert/4227 +CVE-2008-1145 - https://www.exploit-db.com/exploits/5215 +CVE-2008-1156 - http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml +CVE-2008-1160 - http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf +CVE-2008-1160 - https://www.exploit-db.com/exploits/5289 +CVE-2008-1162 - https://www.exploit-db.com/exploits/5211 +CVE-2008-1163 - https://www.exploit-db.com/exploits/5208 +CVE-2008-1164 - https://www.exploit-db.com/exploits/5209 +CVE-2008-1176 - https://www.exploit-db.com/exploits/5114 +CVE-2008-1177 - https://www.exploit-db.com/exploits/5114 +CVE-2008-1180 - http://securityreason.com/securityalert/3720 +CVE-2008-1181 - http://securityreason.com/securityalert/3719 +CVE-2008-1185 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9672 +CVE-2008-1186 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9585 +CVE-2008-1189 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9582 +CVE-2008-1190 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9914 +CVE-2008-1194 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9542 +CVE-2008-1195 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1195 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486 +CVE-2008-1197 - http://securityreason.com/securityalert/4215 +CVE-2008-1218 - https://www.exploit-db.com/exploits/5257 +CVE-2008-1229 - https://www.exploit-db.com/exploits/5112 +CVE-2008-1230 - https://www.exploit-db.com/exploits/5112 +CVE-2008-1231 - https://www.exploit-db.com/exploits/5112 +CVE-2008-1232 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx +CVE-2008-1232 - http://securityreason.com/securityalert/4098 +CVE-2008-1232 - http://www.redhat.com/support/errata/RHSA-2008-0862.html +CVE-2008-1232 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-1233 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1234 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1234 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551 +CVE-2008-1235 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1236 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1237 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1237 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9651 +CVE-2008-1238 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1238 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9889 +CVE-2008-1240 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1241 - http://www.ubuntu.com/usn/usn-592-1 +CVE-2008-1247 - https://www.exploit-db.com/exploits/5313 +CVE-2008-1247 - https://www.exploit-db.com/exploits/5926 +CVE-2008-1272 - https://www.exploit-db.com/exploits/5223 +CVE-2008-1275 - https://www.exploit-db.com/exploits/5235 +CVE-2008-1276 - http://aluigi.altervista.org/adv/maildisable-adv.txt +CVE-2008-1276 - http://securityreason.com/securityalert/3724 +CVE-2008-1276 - https://www.exploit-db.com/exploits/5249 +CVE-2008-1277 - http://aluigi.altervista.org/adv/maildisable-adv.txt +CVE-2008-1277 - http://securityreason.com/securityalert/3724 +CVE-2008-1278 - http://aluigi.altervista.org/adv/remotelynowhere-adv.txt +CVE-2008-1279 - http://aluigi.altervista.org/adv/acrogroup-adv.txt +CVE-2008-1280 - http://aluigi.altervista.org/adv/acroagent-adv.txt +CVE-2008-1281 - https://www.exploit-db.com/exploits/5230 +CVE-2008-1283 - http://securityreason.com/securityalert/3725 +CVE-2008-1284 - http://securityreason.com/securityalert/3726 +CVE-2008-1295 - https://www.exploit-db.com/exploits/5231 +CVE-2008-1297 - https://www.exploit-db.com/exploits/5226 +CVE-2008-1302 - http://aluigi.altervista.org/adv/perforces-adv.txt +CVE-2008-1302 - http://aluigi.org/poc/perforces.zip +CVE-2008-1302 - http://securityreason.com/securityalert/3735 +CVE-2008-1303 - http://aluigi.altervista.org/adv/perforces-adv.txt +CVE-2008-1303 - http://aluigi.org/poc/perforces.zip +CVE-2008-1303 - http://securityreason.com/securityalert/3735 +CVE-2008-1305 - https://www.exploit-db.com/exploits/5236 +CVE-2008-1307 - https://www.exploit-db.com/exploits/5225 +CVE-2008-1309 - https://www.exploit-db.com/exploits/5332 +CVE-2008-1313 - https://www.exploit-db.com/exploits/5234 +CVE-2008-1316 - https://www.exploit-db.com/exploits/5240 +CVE-2008-1318 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES +CVE-2008-1319 - http://aluigi.altervista.org/adv/versantcmd-adv.txt +CVE-2008-1319 - http://marc.info/?l=bugtraq&m=120468784112145&w=2 +CVE-2008-1319 - http://securityreason.com/securityalert/3738 +CVE-2008-1319 - https://www.exploit-db.com/exploits/5213 +CVE-2008-1320 - http://aluigi.altervista.org/adv/asgulo-adv.txt +CVE-2008-1320 - http://securityreason.com/securityalert/3737 +CVE-2008-1320 - https://www.exploit-db.com/exploits/5229 +CVE-2008-1321 - http://aluigi.altervista.org/adv/asgulo-adv.txt +CVE-2008-1321 - http://securityreason.com/securityalert/3737 +CVE-2008-1321 - https://www.exploit-db.com/exploits/5229 +CVE-2008-1322 - http://aluigi.altervista.org/adv/asgulo-adv.txt +CVE-2008-1322 - http://securityreason.com/securityalert/3737 +CVE-2008-1322 - https://www.exploit-db.com/exploits/5229 +CVE-2008-1331 - https://www.exploit-db.com/exploits/5662 +CVE-2008-1336 - https://www.exploit-db.com/exploits/5206 +CVE-2008-1336 - https://www.exploit-db.com/exploits/5447 +CVE-2008-1337 - http://aluigi.altervista.org/adv/timbuto-adv.txt +CVE-2008-1337 - http://aluigi.org/poc/timbuto.zip +CVE-2008-1337 - http://securityreason.com/securityalert/3741 +CVE-2008-1338 - http://aluigi.altervista.org/adv/perforces-adv.txt +CVE-2008-1338 - http://aluigi.org/poc/perforces.zip +CVE-2008-1338 - http://securityreason.com/securityalert/3735 +CVE-2008-1340 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1340 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1344 - https://www.exploit-db.com/exploits/5246 +CVE-2008-1345 - https://www.exploit-db.com/exploits/5246 +CVE-2008-1346 - https://www.exploit-db.com/exploits/5247 +CVE-2008-1347 - https://www.exploit-db.com/exploits/5247 +CVE-2008-1349 - http://packetstormsecurity.org/0804-exploits/runcms11a-sql.txt +CVE-2008-1349 - https://www.exploit-db.com/exploits/5244 +CVE-2008-1349 - https://www.exploit-db.com/exploits/5340 +CVE-2008-1350 - https://www.exploit-db.com/exploits/5243 +CVE-2008-1351 - https://www.exploit-db.com/exploits/5245 +CVE-2008-1352 - http://securityreason.com/securityalert/3746 +CVE-2008-1354 - http://marc.info/?l=bugtraq&m=120545152114985&w=2 +CVE-2008-1357 - http://aluigi.altervista.org/adv/meccaffi-adv.txt +CVE-2008-1357 - http://securityreason.com/securityalert/3748 +CVE-2008-1358 - https://www.exploit-db.com/exploits/5248 +CVE-2008-1361 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1361 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1361 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1361 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1361 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1362 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1362 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1362 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1362 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1362 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1363 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1363 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1363 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1363 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1363 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1364 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1364 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1364 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1365 - http://aluigi.altervista.org/adv/officescaz-adv.txt +CVE-2008-1366 - http://aluigi.altervista.org/adv/officescaz-adv.txt +CVE-2008-1374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9636 +CVE-2008-1392 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1392 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1398 - https://www.exploit-db.com/exploits/5256 +CVE-2008-1400 - https://www.exploit-db.com/exploits/5269 +CVE-2008-1401 - https://www.exploit-db.com/exploits/5269 +CVE-2008-1402 - https://www.exploit-db.com/exploits/5269 +CVE-2008-1404 - https://www.exploit-db.com/exploits/5254 +CVE-2008-1405 - https://www.exploit-db.com/exploits/5260 +CVE-2008-1406 - https://www.exploit-db.com/exploits/5252 +CVE-2008-1407 - https://www.exploit-db.com/exploits/5255 +CVE-2008-1408 - https://www.exploit-db.com/exploits/5263 +CVE-2008-1409 - https://www.exploit-db.com/exploits/5265 +CVE-2008-1410 - https://www.exploit-db.com/exploits/5228 +CVE-2008-1411 - https://www.exploit-db.com/exploits/5228 +CVE-2008-1413 - http://securityreason.com/securityalert/3757 +CVE-2008-1414 - https://www.exploit-db.com/exploits/5262 +CVE-2008-1415 - https://www.exploit-db.com/exploits/5262 +CVE-2008-1416 - https://www.exploit-db.com/exploits/5266 +CVE-2008-1420 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9500 +CVE-2008-1423 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9851 +CVE-2008-1425 - https://www.exploit-db.com/exploits/5275 +CVE-2008-1426 - https://www.exploit-db.com/exploits/5274 +CVE-2008-1427 - https://www.exploit-db.com/exploits/5273 +CVE-2008-1430 - https://www.exploit-db.com/exploits/5276 +CVE-2008-1434 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026 +CVE-2008-1435 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038 +CVE-2008-1436 - http://isc.sans.org/diary.html?storyid=4306 +CVE-2008-1436 - http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html +CVE-2008-1436 - https://www.exploit-db.com/exploits/6705 +CVE-2008-1437 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 +CVE-2008-1438 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 +CVE-2008-1440 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 +CVE-2008-1441 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 +CVE-2008-1442 - http://securityreason.com/securityalert/3934 +CVE-2008-1442 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031 +CVE-2008-1444 - http://securityreason.com/securityalert/3937 +CVE-2008-1444 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033 +CVE-2008-1445 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035 +CVE-2008-1446 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 +CVE-2008-1447 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-1447 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 +CVE-2008-1447 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627 +CVE-2008-1447 - https://www.exploit-db.com/exploits/6122 +CVE-2008-1447 - https://www.exploit-db.com/exploits/6123 +CVE-2008-1447 - https://www.exploit-db.com/exploits/6130 +CVE-2008-1448 - http://www.coresecurity.com/content/internet-explorer-zone-elevation +CVE-2008-1448 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-048 +CVE-2008-1451 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-034 +CVE-2008-1453 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030 +CVE-2008-1454 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 +CVE-2008-1455 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051 +CVE-2008-1456 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 +CVE-2008-1457 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049 +CVE-2008-1459 - https://www.exploit-db.com/exploits/5278 +CVE-2008-1460 - https://www.exploit-db.com/exploits/5277 +CVE-2008-1461 - http://securityreason.com/securityalert/3761 +CVE-2008-1462 - https://www.exploit-db.com/exploits/5285 +CVE-2008-1465 - https://www.exploit-db.com/exploits/5280 +CVE-2008-1467 - https://www.exploit-db.com/exploits/5283 +CVE-2008-1472 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx +CVE-2008-1472 - https://www.exploit-db.com/exploits/5264 +CVE-2008-1477 - http://securityreason.com/securityalert/3767 +CVE-2008-1478 - https://www.exploit-db.com/exploits/5270 +CVE-2008-1480 - https://www.exploit-db.com/exploits/5258 +CVE-2008-1482 - http://aluigi.altervista.org/adv/xinehof-adv.txt +CVE-2008-1482 - http://aluigi.org/poc/xinehof.zip +CVE-2008-1482 - http://securityreason.com/securityalert/3769 +CVE-2008-1484 - https://www.exploit-db.com/exploits/5165 +CVE-2008-1488 - http://pecl.php.net/bugs/bug.php?id=13415 +CVE-2008-1491 - http://aluigi.altervista.org/adv/asuxdpc-adv.txt +CVE-2008-1491 - http://securityreason.com/securityalert/3771 +CVE-2008-1491 - https://www.exploit-db.com/exploits/5694 +CVE-2008-1492 - http://securityreason.com/securityalert/3772 +CVE-2008-1492 - https://www.exploit-db.com/exploits/5288 +CVE-2008-1493 - https://www.exploit-db.com/exploits/5296 +CVE-2008-1495 - https://www.exploit-db.com/exploits/5281 +CVE-2008-1496 - https://www.exploit-db.com/exploits/5281 +CVE-2008-1498 - https://www.exploit-db.com/exploits/5259 +CVE-2008-1501 - https://www.exploit-db.com/exploits/5306 +CVE-2008-1505 - https://www.exploit-db.com/exploits/5294 +CVE-2008-1506 - https://www.exploit-db.com/exploits/5281 +CVE-2008-1507 - https://www.exploit-db.com/exploits/5281 +CVE-2008-1509 - https://www.exploit-db.com/exploits/5293 +CVE-2008-1512 - https://www.exploit-db.com/exploits/5301 +CVE-2008-1513 - https://www.exploit-db.com/exploits/5239 +CVE-2008-1514 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9555 +CVE-2008-1534 - https://www.exploit-db.com/exploits/5303 +CVE-2008-1535 - https://www.exploit-db.com/exploits/5297 +CVE-2008-1537 - https://www.exploit-db.com/exploits/5302 +CVE-2008-1539 - https://www.exploit-db.com/exploits/5295 +CVE-2008-1541 - https://www.exploit-db.com/exploits/5304 +CVE-2008-1544 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031 +CVE-2008-1545 - http://securityreason.com/securityalert/3786 +CVE-2008-1545 - http://www.mindedsecurity.com/MSA01240108.html +CVE-2008-1546 - http://securityreason.com/securityalert/3794 +CVE-2008-1547 - http://securityreason.com/securityalert/4441 +CVE-2008-1551 - https://www.exploit-db.com/exploits/5290 +CVE-2008-1552 - http://securityreason.com/securityalert/3795 +CVE-2008-1553 - https://www.exploit-db.com/exploits/5312 +CVE-2008-1554 - https://www.exploit-db.com/exploits/5311 +CVE-2008-1555 - https://www.exploit-db.com/exploits/5309 +CVE-2008-1556 - https://www.exploit-db.com/exploits/5309 +CVE-2008-1557 - https://www.exploit-db.com/exploits/5309 +CVE-2008-1558 - https://www.exploit-db.com/exploits/5307 +CVE-2008-1559 - https://www.exploit-db.com/exploits/5310 +CVE-2008-1561 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9315 +CVE-2008-1562 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9318 +CVE-2008-1569 - https://bugs.gentoo.org/show_bug.cgi?id=214403 +CVE-2008-1570 - https://bugs.gentoo.org/show_bug.cgi?id=214403 +CVE-2008-1591 - https://www.exploit-db.com/exploits/5292 +CVE-2008-1602 - http://securityreason.com/securityalert/3798 +CVE-2008-1608 - https://www.exploit-db.com/exploits/5502 +CVE-2008-1609 - https://www.exploit-db.com/exploits/2474/ +CVE-2008-1609 - https://www.exploit-db.com/exploits/5317 +CVE-2008-1610 - http://www.offensive-security.com/0day/quick-tftp-poc.py.txt +CVE-2008-1610 - https://www.exploit-db.com/exploits/5315 +CVE-2008-1611 - https://www.exploit-db.com/exploits/5314 +CVE-2008-1613 - https://www.exploit-db.com/exploits/5482 +CVE-2008-1615 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9563 +CVE-2008-1623 - https://www.exploit-db.com/exploits/5322 +CVE-2008-1624 - https://www.exploit-db.com/exploits/5325 +CVE-2008-1635 - https://www.exploit-db.com/exploits/5324 +CVE-2008-1639 - https://www.exploit-db.com/exploits/5331 +CVE-2008-1640 - https://www.exploit-db.com/exploits/5329 +CVE-2008-1645 - https://www.exploit-db.com/exploits/5328 +CVE-2008-1646 - https://www.exploit-db.com/exploits/5326 +CVE-2008-1647 - https://www.exploit-db.com/exploits/5338 +CVE-2008-1649 - https://www.exploit-db.com/exploits/5333 +CVE-2008-1650 - https://www.exploit-db.com/exploits/5333 +CVE-2008-1651 - https://www.exploit-db.com/exploits/5333 +CVE-2008-1654 - http://www.gnucitizen.org/blog/hacking-the-interwebs/ +CVE-2008-1657 - http://www.ubuntu.com/usn/usn-649-1 +CVE-2008-1663 - http://securityreason.com/securityalert/3979 +CVE-2008-1667 - http://securityreason.com/securityalert/4054 +CVE-2008-1678 - http://securityreason.com/securityalert/3981 +CVE-2008-1678 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9754 +CVE-2008-1679 - http://bugs.python.org/issue1179 +CVE-2008-1680 - https://www.exploit-db.com/exploits/5295 +CVE-2008-1682 - https://www.exploit-db.com/exploits/5345 +CVE-2008-1689 - http://aluigi.altervista.org/adv/slmaildos-adv.txt +CVE-2008-1689 - http://aluigi.org/poc/slmaildos.zip +CVE-2008-1690 - http://aluigi.org/poc/slmaildos.zip +CVE-2008-1691 - http://aluigi.altervista.org/adv/slmaildos-adv.txt +CVE-2008-1696 - https://www.exploit-db.com/exploits/5347 +CVE-2008-1697 - https://www.exploit-db.com/exploits/5342 +CVE-2008-1702 - https://www.exploit-db.com/exploits/5308 +CVE-2008-1705 - http://aluigi.altervista.org/adv/soliduro-adv.txt +CVE-2008-1705 - http://aluigi.org/poc/soliduro.zip +CVE-2008-1706 - http://aluigi.altervista.org/adv/soliduro-adv.txt +CVE-2008-1706 - http://aluigi.org/poc/soliduro.zip +CVE-2008-1707 - http://aluigi.altervista.org/adv/soliduro-adv.txt +CVE-2008-1707 - http://aluigi.org/poc/soliduro.zip +CVE-2008-1708 - http://aluigi.altervista.org/adv/soliduro-adv.txt +CVE-2008-1708 - http://aluigi.org/poc/soliduro.zip +CVE-2008-1709 - https://www.exploit-db.com/exploits/5349 +CVE-2008-1711 - https://www.exploit-db.com/exploits/5364 +CVE-2008-1712 - https://www.exploit-db.com/exploits/5323 +CVE-2008-1713 - https://www.exploit-db.com/exploits/5341 +CVE-2008-1714 - https://www.exploit-db.com/exploits/5334 +CVE-2008-1715 - https://www.exploit-db.com/exploits/5319 +CVE-2008-1721 - http://securityreason.com/securityalert/3802 +CVE-2008-1721 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-1721 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9407 +CVE-2008-1724 - https://www.exploit-db.com/exploits/5398 +CVE-2008-1725 - https://www.exploit-db.com/exploits/5416 +CVE-2008-1726 - https://www.exploit-db.com/exploits/5421 +CVE-2008-1727 - https://www.exploit-db.com/exploits/5418 +CVE-2008-1728 - http://www.igniterealtime.org/issues/browse/JM-1289 +CVE-2008-1730 - https://www.exploit-db.com/exploits/5419 +CVE-2008-1732 - https://www.exploit-db.com/exploits/5410 +CVE-2008-1735 - http://securityreason.com/securityalert/3838 +CVE-2008-1735 - http://www.coresecurity.com/?action=item&id=2249 +CVE-2008-1736 - http://securityreason.com/securityalert/3838 +CVE-2008-1736 - http://www.coresecurity.com/?action=item&id=2249 +CVE-2008-1737 - http://securityreason.com/securityalert/3838 +CVE-2008-1737 - http://www.coresecurity.com/?action=item&id=2249 +CVE-2008-1738 - http://securityreason.com/securityalert/3838 +CVE-2008-1738 - http://www.coresecurity.com/?action=item&id=2249 +CVE-2008-1750 - https://www.exploit-db.com/exploits/5422 +CVE-2008-1751 - https://www.exploit-db.com/exploits/5423 +CVE-2008-1755 - https://www.exploit-db.com/exploits/5420 +CVE-2008-1758 - https://www.exploit-db.com/exploits/5353 +CVE-2008-1759 - https://www.exploit-db.com/exploits/5352 +CVE-2008-1760 - https://www.exploit-db.com/exploits/5365 +CVE-2008-1763 - https://www.exploit-db.com/exploits/5368 +CVE-2008-1765 - https://www.exploit-db.com/exploits/5479 +CVE-2008-1767 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785 +CVE-2008-1770 - https://www.exploit-db.com/exploits/5741 +CVE-2008-1771 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476241 +CVE-2008-1772 - https://www.exploit-db.com/exploits/5402 +CVE-2008-1773 - https://www.exploit-db.com/exploits/5393 +CVE-2008-1774 - https://www.exploit-db.com/exploits/5406 +CVE-2008-1776 - https://www.exploit-db.com/exploits/5348 +CVE-2008-1782 - https://www.exploit-db.com/exploits/5399 +CVE-2008-1783 - https://www.exploit-db.com/exploits/5387 +CVE-2008-1784 - https://www.exploit-db.com/exploits/5388 +CVE-2008-1785 - https://www.exploit-db.com/exploits/5384 +CVE-2008-1786 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx +CVE-2008-1788 - https://www.exploit-db.com/exploits/5371 +CVE-2008-1789 - https://www.exploit-db.com/exploits/5385 +CVE-2008-1790 - https://www.exploit-db.com/exploits/5402 +CVE-2008-1791 - https://www.exploit-db.com/exploits/5401 +CVE-2008-1795 - http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/ +CVE-2008-1795 - http://securityreason.com/securityalert/3810 +CVE-2008-1797 - http://securityreason.com/securityalert/3811 +CVE-2008-1798 - https://www.exploit-db.com/exploits/5369 +CVE-2008-1799 - https://www.exploit-db.com/exploits/5360 +CVE-2008-1801 - https://www.exploit-db.com/exploits/5561 +CVE-2008-1802 - https://www.exploit-db.com/exploits/5585 +CVE-2008-1803 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800 +CVE-2008-1806 - http://www.ubuntu.com/usn/usn-643-1 +CVE-2008-1806 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-1806 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1806 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1806 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1806 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1806 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1806 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321 +CVE-2008-1807 - http://www.ubuntu.com/usn/usn-643-1 +CVE-2008-1807 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-1807 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1807 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1807 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1807 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1807 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767 +CVE-2008-1808 - http://www.ubuntu.com/usn/usn-643-1 +CVE-2008-1808 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-1808 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-1808 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-1808 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-1808 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-1808 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-1838 - https://www.exploit-db.com/exploits/5444 +CVE-2008-1840 - http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=592069 +CVE-2008-1841 - http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=592069 +CVE-2008-1842 - http://aluigi.altervista.org/adv/closedview-adv.txt +CVE-2008-1842 - http://aluigi.org/poc/closedview.zip +CVE-2008-1843 - http://marc.info/?l=bugtraq&m=120792465631586&w=2 +CVE-2008-1844 - http://marc.info/?l=bugtraq&m=120792465631586&w=2 +CVE-2008-1847 - https://www.exploit-db.com/exploits/5432 +CVE-2008-1848 - https://www.exploit-db.com/exploits/5431 +CVE-2008-1849 - https://www.exploit-db.com/exploits/5431 +CVE-2008-1851 - http://aluigi.altervista.org/adv/closedviewx-adv.txt +CVE-2008-1852 - http://aluigi.altervista.org/adv/closedviewx-adv.txt +CVE-2008-1853 - http://aluigi.altervista.org/adv/closedviewx-adv.txt +CVE-2008-1855 - https://www.exploit-db.com/exploits/5343 +CVE-2008-1856 - https://www.exploit-db.com/exploits/5392 +CVE-2008-1857 - https://www.exploit-db.com/exploits/5394 +CVE-2008-1858 - https://www.exploit-db.com/exploits/5400 +CVE-2008-1859 - https://www.exploit-db.com/exploits/5402 +CVE-2008-1860 - https://www.exploit-db.com/exploits/5408 +CVE-2008-1861 - https://www.exploit-db.com/exploits/5405 +CVE-2008-1862 - https://www.exploit-db.com/exploits/5405 +CVE-2008-1863 - https://www.exploit-db.com/exploits/5389 +CVE-2008-1864 - https://www.exploit-db.com/exploits/5390 +CVE-2008-1866 - https://www.exploit-db.com/exploits/5381 +CVE-2008-1867 - https://www.exploit-db.com/exploits/5382 +CVE-2008-1868 - https://www.exploit-db.com/exploits/5380 +CVE-2008-1869 - https://www.exploit-db.com/exploits/5383 +CVE-2008-1870 - https://www.exploit-db.com/exploits/5367 +CVE-2008-1871 - https://www.exploit-db.com/exploits/5377 +CVE-2008-1872 - https://www.exploit-db.com/exploits/5362 +CVE-2008-1874 - https://www.exploit-db.com/exploits/5358 +CVE-2008-1875 - https://www.exploit-db.com/exploits/5364 +CVE-2008-1876 - https://www.exploit-db.com/exploits/5375 +CVE-2008-1878 - https://www.exploit-db.com/exploits/5458 +CVE-2008-1881 - http://aluigi.altervista.org/adv/vlcboffs-adv.txt +CVE-2008-1881 - http://aluigi.org/adv/vlcboffs-adv.txt +CVE-2008-1881 - https://www.exploit-db.com/exploits/5250 +CVE-2008-1883 - http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/ +CVE-2008-1883 - http://securityreason.com/securityalert/3810 +CVE-2008-1885 - http://seclists.org/bugtraq/2008/Apr/0065.html +CVE-2008-1885 - https://www.exploit-db.com/exploits/5397 +CVE-2008-1886 - http://seclists.org/bugtraq/2008/Apr/0065.html +CVE-2008-1886 - https://www.exploit-db.com/exploits/5397 +CVE-2008-1887 - http://bugs.python.org/issue2587 +CVE-2008-1887 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-1889 - https://www.exploit-db.com/exploits/5457 +CVE-2008-1895 - https://www.exploit-db.com/exploits/5456 +CVE-2008-1896 - https://www.exploit-db.com/exploits/5456 +CVE-2008-1898 - https://www.exploit-db.com/exploits/5460 +CVE-2008-1898 - https://www.exploit-db.com/exploits/5530 +CVE-2008-1903 - https://www.exploit-db.com/exploits/5429 +CVE-2008-1904 - https://www.exploit-db.com/exploits/5433 +CVE-2008-1906 - https://www.exploit-db.com/exploits/5437 +CVE-2008-1907 - https://www.exploit-db.com/exploits/5437 +CVE-2008-1908 - https://www.exploit-db.com/exploits/5437 +CVE-2008-1909 - https://www.exploit-db.com/exploits/5428 +CVE-2008-1910 - https://www.exploit-db.com/exploits/5427 +CVE-2008-1911 - https://www.exploit-db.com/exploits/5434 +CVE-2008-1912 - https://www.exploit-db.com/exploits/5453 +CVE-2008-1912 - https://www.exploit-db.com/exploits/5492 +CVE-2008-1913 - https://www.exploit-db.com/exploits/5454 +CVE-2008-1914 - https://www.exploit-db.com/exploits/5451 +CVE-2008-1915 - https://www.exploit-db.com/exploits/5480 +CVE-2008-1918 - https://www.exploit-db.com/exploits/5470 +CVE-2008-1918 - https://www.exploit-db.com/exploits/7576 +CVE-2008-1919 - https://www.exploit-db.com/exploits/5471 +CVE-2008-1921 - https://www.exploit-db.com/exploits/5464 +CVE-2008-1926 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9833 +CVE-2008-1927 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792 +CVE-2008-1927 - http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156 +CVE-2008-1933 - https://www.exploit-db.com/exploits/5489 +CVE-2008-1934 - https://www.exploit-db.com/exploits/5481 +CVE-2008-1935 - https://www.exploit-db.com/exploits/5488 +CVE-2008-1936 - https://www.exploit-db.com/exploits/5450 +CVE-2008-1939 - https://www.exploit-db.com/exploits/5475 +CVE-2008-1945 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905 +CVE-2008-1947 - http://www.redhat.com/support/errata/RHSA-2008-0862.html +CVE-2008-1947 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-1948 - http://securityreason.com/securityalert/3902 +CVE-2008-1949 - http://securityreason.com/securityalert/3902 +CVE-2008-1949 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519 +CVE-2008-1950 - http://securityreason.com/securityalert/3902 +CVE-2008-1951 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635 +CVE-2008-1954 - https://www.exploit-db.com/exploits/5485 +CVE-2008-1957 - https://www.exploit-db.com/exploits/5483 +CVE-2008-1958 - https://www.exploit-db.com/exploits/5483 +CVE-2008-1961 - https://www.exploit-db.com/exploits/5469 +CVE-2008-1962 - https://www.exploit-db.com/exploits/5474 +CVE-2008-1963 - https://www.exploit-db.com/exploits/5463 +CVE-2008-1965 - http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability +CVE-2008-1968 - http://securityreason.com/securityalert/3830 +CVE-2008-1971 - https://www.exploit-db.com/exploits/5467 +CVE-2008-1973 - https://www.exploit-db.com/exploits/5472 +CVE-2008-1974 - http://securityreason.com/securityalert/3831 +CVE-2008-1975 - https://www.exploit-db.com/exploits/5487 +CVE-2008-1979 - http://aluigi.altervista.org/adv/carcbackazz-adv.txt +CVE-2008-1982 - https://www.exploit-db.com/exploits/5486 +CVE-2008-1984 - http://aluigi.altervista.org/adv/ecsqdamn-adv.txt +CVE-2008-1989 - https://www.exploit-db.com/exploits/5459 +CVE-2008-1990 - http://securityreason.com/securityalert/3842 +CVE-2008-1990 - https://www.exploit-db.com/exploits/5478 +CVE-2008-1991 - http://securityreason.com/securityalert/3842 +CVE-2008-1991 - https://www.exploit-db.com/exploits/5478 +CVE-2008-1992 - http://securityreason.com/securityalert/3842 +CVE-2008-1992 - https://www.exploit-db.com/exploits/5478 +CVE-2008-1993 - http://securityreason.com/securityalert/3842 +CVE-2008-1993 - https://www.exploit-db.com/exploits/5478 +CVE-2008-1999 - http://securityreason.com/securityalert/3833 +CVE-2008-2000 - http://securityreason.com/securityalert/3833 +CVE-2008-2001 - http://securityreason.com/securityalert/3833 +CVE-2008-2002 - http://securityreason.com/securityalert/3839 +CVE-2008-2003 - http://securityreason.com/securityalert/3832 +CVE-2008-2005 - https://www.exploit-db.com/exploits/6474 +CVE-2008-2006 - http://securityreason.com/securityalert/3901 +CVE-2008-2012 - https://www.exploit-db.com/exploits/5495 +CVE-2008-2013 - https://www.exploit-db.com/exploits/5500 +CVE-2008-2014 - http://securityreason.com/securityalert/3835 +CVE-2008-2015 - https://www.exploit-db.com/exploits/5496 +CVE-2008-2016 - http://securityreason.com/securityalert/3837 +CVE-2008-2017 - http://securityreason.com/securityalert/3837 +CVE-2008-2018 - https://www.exploit-db.com/exploits/5506 +CVE-2008-2019 - http://securityreason.com/securityalert/3836 +CVE-2008-2020 - http://securityreason.com/securityalert/3834 +CVE-2008-2022 - http://www.bugreport.ir/?/37 +CVE-2008-2022 - https://www.exploit-db.com/exploits/5507 +CVE-2008-2023 - http://www.bugreport.ir/?/37 +CVE-2008-2023 - https://www.exploit-db.com/exploits/5507 +CVE-2008-2024 - https://www.exploit-db.com/exploits/5494 +CVE-2008-2026 - http://securityreason.com/securityalert/3848 +CVE-2008-2027 - http://securityreason.com/securityalert/3850 +CVE-2008-2028 - https://www.exploit-db.com/exploits/5494 +CVE-2008-2029 - https://www.exploit-db.com/exploits/5494 +CVE-2008-2036 - https://www.exploit-db.com/exploits/5448 +CVE-2008-2040 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573 +CVE-2008-2040 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680 +CVE-2008-2042 - http://securityreason.com/securityalert/3861 +CVE-2008-2044 - http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47 +CVE-2008-2044 - http://securityreason.com/securityalert/3845 +CVE-2008-2045 - https://www.exploit-db.com/exploits/5521 +CVE-2008-2047 - https://www.exploit-db.com/exploits/5503 +CVE-2008-2048 - https://www.exploit-db.com/exploits/5503 +CVE-2008-2049 - http://vuln.sg/epostmailserver410-en.html +CVE-2008-2051 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2008-2055 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml +CVE-2008-2056 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml +CVE-2008-2057 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml +CVE-2008-2058 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml +CVE-2008-2059 - http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml +CVE-2008-2063 - https://www.exploit-db.com/exploits/5520 +CVE-2008-2065 - https://www.exploit-db.com/exploits/5508 +CVE-2008-2069 - http://securityreason.com/securityalert/3847 +CVE-2008-2069 - https://www.exploit-db.com/exploits/5515 +CVE-2008-2070 - http://securityreason.com/securityalert/3866 +CVE-2008-2071 - http://securityreason.com/securityalert/3866 +CVE-2008-2072 - https://www.exploit-db.com/exploits/5529 +CVE-2008-2073 - https://www.exploit-db.com/exploits/5529 +CVE-2008-2074 - https://www.exploit-db.com/exploits/5525 +CVE-2008-2076 - https://www.exploit-db.com/exploits/5528 +CVE-2008-2079 - http://bugs.mysql.com/bug.php?id=32167 +CVE-2008-2081 - https://www.exploit-db.com/exploits/5499 +CVE-2008-2082 - https://www.exploit-db.com/exploits/5499 +CVE-2008-2083 - http://securityreason.com/securityalert/3853 +CVE-2008-2083 - https://www.exploit-db.com/exploits/5516 +CVE-2008-2084 - https://www.exploit-db.com/exploits/5505 +CVE-2008-2086 - http://securityreason.com/securityalert/4693 +CVE-2008-2087 - http://securityreason.com/securityalert/3855 +CVE-2008-2087 - https://www.exploit-db.com/exploits/5517 +CVE-2008-2088 - https://www.exploit-db.com/exploits/5504 +CVE-2008-2091 - https://www.exploit-db.com/exploits/5477 +CVE-2008-2093 - https://www.exploit-db.com/exploits/5491 +CVE-2008-2095 - https://www.exploit-db.com/exploits/5484 +CVE-2008-2096 - http://securityreason.com/securityalert/3857 +CVE-2008-2096 - https://www.exploit-db.com/exploits/5546 +CVE-2008-2097 - http://securityreason.com/securityalert/3922 +CVE-2008-2097 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-2100 - http://securityreason.com/securityalert/3922 +CVE-2008-2100 - http://www.vmware.com/security/advisories/VMSA-2008-0009.html +CVE-2008-2101 - http://securityreason.com/securityalert/4202 +CVE-2008-2101 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-2106 - http://aluigi.altervista.org/adv/cod4statz-adv.txt +CVE-2008-2106 - http://securityreason.com/securityalert/3858 +CVE-2008-2107 - http://securityreason.com/securityalert/3859 +CVE-2008-2107 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2008-2108 - http://securityreason.com/securityalert/3859 +CVE-2008-2108 - http://www.redhat.com/support/errata/RHSA-2008-0546.html +CVE-2008-2113 - https://www.exploit-db.com/exploits/5552 +CVE-2008-2114 - https://www.exploit-db.com/exploits/5551 +CVE-2008-2115 - https://www.exploit-db.com/exploits/5549 +CVE-2008-2116 - https://www.exploit-db.com/exploits/5549 +CVE-2008-2119 - https://www.exploit-db.com/exploits/5749 +CVE-2008-2124 - https://www.exploit-db.com/exploits/5553 +CVE-2008-2125 - https://www.exploit-db.com/exploits/5560 +CVE-2008-2127 - https://www.exploit-db.com/exploits/5558 +CVE-2008-2128 - https://www.exploit-db.com/exploits/5558 +CVE-2008-2129 - https://www.exploit-db.com/exploits/5554 +CVE-2008-2131 - http://users.own-hero.net/~decoder/advisories/mvnforum-jsxss.txt +CVE-2008-2132 - https://www.exploit-db.com/exploits/5556 +CVE-2008-2135 - https://www.exploit-db.com/exploits/5559 +CVE-2008-2137 - http://kerneltrap.org/mailarchive/git-commits-head/2008/5/8/1760604 +CVE-2008-2145 - http://securityreason.com/securityalert/3868 +CVE-2008-2146 - http://trac.wordpress.org/ticket/4748 +CVE-2008-2152 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9787 +CVE-2008-2161 - https://www.exploit-db.com/exploits/5563 +CVE-2008-2175 - https://www.exploit-db.com/exploits/5533 +CVE-2008-2177 - https://www.exploit-db.com/exploits/5537 +CVE-2008-2180 - https://www.exploit-db.com/exploits/5538 +CVE-2008-2181 - https://www.exploit-db.com/exploits/5538 +CVE-2008-2183 - https://www.exploit-db.com/exploits/5535 +CVE-2008-2186 - https://www.exploit-db.com/exploits/7532 +CVE-2008-2189 - http://securityreason.com/securityalert/3874 +CVE-2008-2189 - https://www.exploit-db.com/exploits/5543 +CVE-2008-2190 - https://www.exploit-db.com/exploits/5542 +CVE-2008-2190 - https://www.exploit-db.com/exploits/8711 +CVE-2008-2191 - http://securityreason.com/securityalert/3876 +CVE-2008-2191 - https://www.exploit-db.com/exploits/5541 +CVE-2008-2192 - https://www.exploit-db.com/exploits/5532 +CVE-2008-2193 - https://www.exploit-db.com/exploits/5539 +CVE-2008-2194 - https://www.exploit-db.com/exploits/5550 +CVE-2008-2195 - https://www.exploit-db.com/exploits/5550 +CVE-2008-2197 - https://www.exploit-db.com/exploits/5548 +CVE-2008-2198 - http://securityreason.com/securityalert/3877 +CVE-2008-2198 - https://www.exploit-db.com/exploits/5544 +CVE-2008-2199 - http://securityreason.com/securityalert/3878 +CVE-2008-2199 - https://www.exploit-db.com/exploits/5545 +CVE-2008-2215 - https://www.exploit-db.com/exploits/5523 +CVE-2008-2216 - https://www.exploit-db.com/exploits/5523 +CVE-2008-2217 - https://www.exploit-db.com/exploits/5510 +CVE-2008-2220 - https://www.exploit-db.com/exploits/5526 +CVE-2008-2222 - https://www.exploit-db.com/exploits/5603 +CVE-2008-2223 - https://www.exploit-db.com/exploits/5565 +CVE-2008-2224 - https://www.exploit-db.com/exploits/5566 +CVE-2008-2225 - https://www.exploit-db.com/exploits/5555 +CVE-2008-2228 - https://www.exploit-db.com/exploits/5567 +CVE-2008-2231 - http://securityreason.com/securityalert/3923 +CVE-2008-2240 - http://www.attrition.org/pipermail/vim/2008-May/001988.html +CVE-2008-2240 - http://www.attrition.org/pipermail/vim/2008-May/001989.html +CVE-2008-2244 - http://isc.sans.org/diary.html?storyid=4696 +CVE-2008-2245 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-046 +CVE-2008-2245 - https://www.exploit-db.com/exploits/6732 +CVE-2008-2246 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047 +CVE-2008-2247 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039 +CVE-2008-2248 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039 +CVE-2008-2249 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071 +CVE-2008-2250 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 +CVE-2008-2251 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 +CVE-2008-2252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 +CVE-2008-2253 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054 +CVE-2008-2254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 +CVE-2008-2255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 +CVE-2008-2256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 +CVE-2008-2257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 +CVE-2008-2258 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 +CVE-2008-2259 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045 +CVE-2008-2263 - https://www.exploit-db.com/exploits/5611 +CVE-2008-2265 - https://www.exploit-db.com/exploits/5609 +CVE-2008-2267 - https://www.exploit-db.com/exploits/5600 +CVE-2008-2269 - https://www.exploit-db.com/exploits/5615 +CVE-2008-2270 - https://www.exploit-db.com/exploits/5621 +CVE-2008-2276 - http://marc.info/?l=bugtraq&m=121130774617956&w=4 +CVE-2008-2276 - https://www.exploit-db.com/exploits/5657 +CVE-2008-2277 - https://www.exploit-db.com/exploits/5614 +CVE-2008-2278 - https://www.exploit-db.com/exploits/5613 +CVE-2008-2279 - https://www.exploit-db.com/exploits/5613 +CVE-2008-2281 - https://www.exploit-db.com/exploits/5619 +CVE-2008-2282 - https://www.exploit-db.com/exploits/5617 +CVE-2008-2283 - https://www.exploit-db.com/exploits/5612 +CVE-2008-2285 - http://www.ubuntu.com/usn/usn-612-5 +CVE-2008-2292 - http://www.ubuntu.com/usn/usn-685-1 +CVE-2008-2293 - https://www.exploit-db.com/exploits/5630 +CVE-2008-2294 - https://www.exploit-db.com/exploits/5627 +CVE-2008-2295 - https://www.exploit-db.com/exploits/5620 +CVE-2008-2296 - https://www.exploit-db.com/exploits/5620 +CVE-2008-2297 - https://www.exploit-db.com/exploits/5628 +CVE-2008-2298 - https://www.exploit-db.com/exploits/5629 +CVE-2008-2301 - https://www.exploit-db.com/exploits/5623 +CVE-2008-2304 - http://securityreason.com/securityalert/3988 +CVE-2008-2304 - https://www.exploit-db.com/exploits/6043 +CVE-2008-2315 - http://www.openwall.com/lists/oss-security/2008/11/05/2 +CVE-2008-2315 - http://www.openwall.com/lists/oss-security/2008/11/05/3 +CVE-2008-2315 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-2315 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9761 +CVE-2008-2335 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html +CVE-2008-2335 - http://packetstormsecurity.com/files/130755/Vastal-I-tech-phpVID-1.2.3-Cross-Site-Scripting.html +CVE-2008-2335 - http://seclists.org/fulldisclosure/2015/Mar/59 +CVE-2008-2335 - https://www.exploit-db.com/exploits/6422 +CVE-2008-2336 - https://www.exploit-db.com/exploits/5626 +CVE-2008-2337 - https://www.exploit-db.com/exploits/5631 +CVE-2008-2338 - https://www.exploit-db.com/exploits/5616 +CVE-2008-2340 - https://www.exploit-db.com/exploits/5624 +CVE-2008-2341 - https://www.exploit-db.com/exploits/5624 +CVE-2008-2342 - https://www.exploit-db.com/exploits/5624 +CVE-2008-2343 - https://www.exploit-db.com/exploits/5624 +CVE-2008-2346 - https://www.exploit-db.com/exploits/5645 +CVE-2008-2347 - https://www.exploit-db.com/exploits/5650 +CVE-2008-2348 - https://www.exploit-db.com/exploits/5648 +CVE-2008-2349 - https://www.exploit-db.com/exploits/5634 +CVE-2008-2350 - http://lostmon.blogspot.com/2008/05/bcoos-highlightphp-traversal-file.html +CVE-2008-2351 - https://www.exploit-db.com/exploits/5641 +CVE-2008-2352 - https://www.exploit-db.com/exploits/5640 +CVE-2008-2353 - https://www.exploit-db.com/exploits/5647 +CVE-2008-2355 - https://www.exploit-db.com/exploits/5637 +CVE-2008-2356 - https://www.exploit-db.com/exploits/5635 +CVE-2008-2357 - http://seclists.org/fulldisclosure/2008/May/0488.html +CVE-2008-2357 - http://securityreason.com/securityalert/3903 +CVE-2008-2358 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9644 +CVE-2008-2360 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329 +CVE-2008-2364 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2008-2364 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577 +CVE-2008-2365 - http://securityreason.com/securityalert/3965 +CVE-2008-2370 - http://securityreason.com/securityalert/4099 +CVE-2008-2370 - http://www.redhat.com/support/errata/RHSA-2008-0862.html +CVE-2008-2370 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-2372 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383 +CVE-2008-2374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9973 +CVE-2008-2376 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9863 +CVE-2008-2379 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764 +CVE-2008-2382 - http://securityreason.com/securityalert/4803 +CVE-2008-2382 - http://www.coresecurity.com/content/vnc-remote-dos +CVE-2008-2383 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317 +CVE-2008-2390 - https://www.exploit-db.com/exploits/5511 +CVE-2008-2393 - https://www.exploit-db.com/exploits/5654 +CVE-2008-2394 - https://www.exploit-db.com/exploits/5642 +CVE-2008-2395 - https://www.exploit-db.com/exploits/5652 +CVE-2008-2396 - https://www.exploit-db.com/exploits/5651 +CVE-2008-2399 - http://vuln.sg/fireftp0971-en.html +CVE-2008-2411 - http://securityreason.com/securityalert/3900 +CVE-2008-2411 - https://www.exploit-db.com/exploits/5576 +CVE-2008-2416 - https://www.exploit-db.com/exploits/5639 +CVE-2008-2417 - https://www.exploit-db.com/exploits/5638 +CVE-2008-2427 - http://securityreason.com/securityalert/3956 +CVE-2008-2427 - https://www.exploit-db.com/exploits/5951 +CVE-2008-2430 - http://securityreason.com/securityalert/3976 +CVE-2008-2433 - http://securityreason.com/securityalert/4191 +CVE-2008-2434 - http://securityreason.com/securityalert/4802 +CVE-2008-2436 - http://securityreason.com/securityalert/4228 +CVE-2008-2437 - http://securityreason.com/securityalert/4263 +CVE-2008-2441 - http://securityreason.com/securityalert/4216 +CVE-2008-2443 - https://www.exploit-db.com/exploits/5610 +CVE-2008-2444 - https://www.exploit-db.com/exploits/5607 +CVE-2008-2445 - https://www.exploit-db.com/exploits/5606 +CVE-2008-2446 - https://www.exploit-db.com/exploits/5606 +CVE-2008-2447 - https://www.exploit-db.com/exploits/5605 +CVE-2008-2448 - https://www.exploit-db.com/exploits/5608 +CVE-2008-2453 - https://www.exploit-db.com/exploits/5599 +CVE-2008-2454 - https://www.exploit-db.com/exploits/5587 +CVE-2008-2455 - https://www.exploit-db.com/exploits/5604 +CVE-2008-2456 - https://www.exploit-db.com/exploits/5658 +CVE-2008-2457 - https://www.exploit-db.com/exploits/5660 +CVE-2008-2459 - https://www.exploit-db.com/exploits/5655 +CVE-2008-2461 - https://www.exploit-db.com/exploits/5661 +CVE-2008-2468 - http://securityreason.com/securityalert/4269 +CVE-2008-2469 - http://securityreason.com/securityalert/4487 +CVE-2008-2469 - https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025 +CVE-2008-2469 - https://www.exploit-db.com/exploits/6805 +CVE-2008-2474 - http://securityreason.com/securityalert/4320 +CVE-2008-2477 - https://www.exploit-db.com/exploits/5659 +CVE-2008-2480 - https://www.exploit-db.com/exploits/5672 +CVE-2008-2481 - https://www.exploit-db.com/exploits/5671 +CVE-2008-2482 - https://www.exploit-db.com/exploits/5669 +CVE-2008-2483 - https://www.exploit-db.com/exploits/5673 +CVE-2008-2484 - https://www.exploit-db.com/exploits/5673 +CVE-2008-2487 - https://www.exploit-db.com/exploits/5676 +CVE-2008-2488 - https://www.exploit-db.com/exploits/5674 +CVE-2008-2496 - https://www.exploit-db.com/exploits/5668 +CVE-2008-2501 - https://www.exploit-db.com/exploits/5683 +CVE-2008-2504 - https://www.exploit-db.com/exploits/5665 +CVE-2008-2505 - https://www.exploit-db.com/exploits/5664 +CVE-2008-2506 - https://www.exploit-db.com/exploits/5664 +CVE-2008-2511 - http://retrogod.altervista.org/9sg_CA_poc.html +CVE-2008-2511 - https://www.exploit-db.com/exploits/5682 +CVE-2008-2519 - http://vuln.sg/coreftp211565-en.html +CVE-2008-2520 - https://www.exploit-db.com/exploits/5596 +CVE-2008-2521 - https://www.exploit-db.com/exploits/5598 +CVE-2008-2522 - https://www.exploit-db.com/exploits/5597 +CVE-2008-2529 - https://www.exploit-db.com/exploits/5581 +CVE-2008-2530 - https://www.exploit-db.com/exploits/5588 +CVE-2008-2532 - https://www.exploit-db.com/exploits/5602 +CVE-2008-2533 - https://www.exploit-db.com/exploits/5578 +CVE-2008-2534 - https://www.exploit-db.com/exploits/5578 +CVE-2008-2535 - https://www.exploit-db.com/exploits/5578 +CVE-2008-2536 - https://www.exploit-db.com/exploits/5601 +CVE-2008-2537 - https://www.exploit-db.com/exploits/5577 +CVE-2008-2540 - http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html +CVE-2008-2540 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 +CVE-2008-2540 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015 +CVE-2008-2542 - http://securityreason.com/securityalert/3924 +CVE-2008-2549 - https://www.exploit-db.com/exploits/5687 +CVE-2008-2551 - http://securityreason.com/securityalert/3926 +CVE-2008-2551 - https://www.exploit-db.com/exploits/5732 +CVE-2008-2554 - http://securityreason.com/securityalert/3925 +CVE-2008-2554 - https://www.exploit-db.com/exploits/5705 +CVE-2008-2555 - https://www.exploit-db.com/exploits/5706 +CVE-2008-2556 - https://www.exploit-db.com/exploits/5703 +CVE-2008-2560 - https://www.exploit-db.com/exploits/5742 +CVE-2008-2561 - https://www.exploit-db.com/exploits/5742 +CVE-2008-2562 - https://www.exploit-db.com/exploits/5744 +CVE-2008-2564 - https://www.exploit-db.com/exploits/5737 +CVE-2008-2565 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html +CVE-2008-2565 - https://www.exploit-db.com/exploits/5739 +CVE-2008-2565 - https://www.exploit-db.com/exploits/9023 +CVE-2008-2566 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html +CVE-2008-2566 - https://www.exploit-db.com/exploits/5739 +CVE-2008-2568 - https://www.exploit-db.com/exploits/5743 +CVE-2008-2568 - https://www.exploit-db.com/exploits/5833 +CVE-2008-2569 - https://www.exploit-db.com/exploits/5740 +CVE-2008-2572 - http://securityreason.com/securityalert/3927 +CVE-2008-2572 - https://www.exploit-db.com/exploits/5685 +CVE-2008-2573 - https://www.exploit-db.com/exploits/5709 +CVE-2008-2573 - https://www.exploit-db.com/exploits/5751 +CVE-2008-2574 - http://securityreason.com/securityalert/3928 +CVE-2008-2574 - https://www.exploit-db.com/exploits/5728 +CVE-2008-2595 - https://www.exploit-db.com/exploits/6101 +CVE-2008-2626 - https://www.exploit-db.com/exploits/5731 +CVE-2008-2627 - https://www.exploit-db.com/exploits/5730 +CVE-2008-2628 - https://www.exploit-db.com/exploits/5723 +CVE-2008-2629 - https://www.exploit-db.com/exploits/5724 +CVE-2008-2630 - https://www.exploit-db.com/exploits/5734 +CVE-2008-2632 - https://www.exploit-db.com/exploits/5721 +CVE-2008-2633 - http://packetstormsecurity.org/0806-exploits/joomlajoomradio-sql.txt +CVE-2008-2633 - https://www.exploit-db.com/exploits/5729 +CVE-2008-2634 - https://www.exploit-db.com/exploits/5717 +CVE-2008-2635 - http://vuln.sg/bitkinex293-en.html +CVE-2008-2636 - http://securityreason.com/securityalert/3929 +CVE-2008-2637 - http://securityreason.com/securityalert/3931 +CVE-2008-2638 - https://www.exploit-db.com/exploits/5736 +CVE-2008-2639 - http://isc.sans.org/diary.html?storyid=4556 +CVE-2008-2639 - http://securityreason.com/securityalert/3944 +CVE-2008-2639 - https://www.exploit-db.com/exploits/6387 +CVE-2008-2641 - http://isc.sans.org/diary.html?storyid=4616 +CVE-2008-2642 - http://securityreason.com/securityalert/3932 +CVE-2008-2643 - https://www.exploit-db.com/exploits/5710 +CVE-2008-2644 - https://www.exploit-db.com/exploits/5725 +CVE-2008-2645 - https://www.exploit-db.com/exploits/5722 +CVE-2008-2646 - https://www.exploit-db.com/exploits/5716 +CVE-2008-2647 - https://www.exploit-db.com/exploits/5716 +CVE-2008-2648 - https://www.exploit-db.com/exploits/5716 +CVE-2008-2649 - https://www.exploit-db.com/exploits/5715 +CVE-2008-2650 - https://www.exploit-db.com/exploits/5700 +CVE-2008-2651 - https://www.exploit-db.com/exploits/5719 +CVE-2008-2652 - https://www.exploit-db.com/exploits/5725 +CVE-2008-2664 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9646 +CVE-2008-2665 - http://securityreason.com/securityalert/3941 +CVE-2008-2666 - http://securityreason.com/securityalert/3942 +CVE-2008-2668 - http://securityreason.com/securityalert/3935 +CVE-2008-2668 - https://www.exploit-db.com/exploits/5773 +CVE-2008-2669 - http://securityreason.com/securityalert/3935 +CVE-2008-2669 - https://www.exploit-db.com/exploits/5773 +CVE-2008-2670 - http://securityreason.com/securityalert/3938 +CVE-2008-2670 - https://www.exploit-db.com/exploits/5774 +CVE-2008-2671 - http://securityreason.com/securityalert/3939 +CVE-2008-2671 - https://www.exploit-db.com/exploits/5772 +CVE-2008-2672 - http://securityreason.com/securityalert/3936 +CVE-2008-2672 - https://www.exploit-db.com/exploits/5771 +CVE-2008-2673 - https://www.exploit-db.com/exploits/5768 +CVE-2008-2676 - https://www.exploit-db.com/exploits/5761 +CVE-2008-2677 - https://www.exploit-db.com/exploits/5764 +CVE-2008-2678 - https://www.exploit-db.com/exploits/5764 +CVE-2008-2679 - https://www.exploit-db.com/exploits/5766 +CVE-2008-2680 - https://www.exploit-db.com/exploits/5766 +CVE-2008-2681 - https://www.exploit-db.com/exploits/5766 +CVE-2008-2682 - https://www.exploit-db.com/exploits/5766 +CVE-2008-2683 - http://securityreason.com/securityalert/8276 +CVE-2008-2683 - http://securityreason.com/securityalert/8277 +CVE-2008-2683 - https://www.exploit-db.com/exploits/5750 +CVE-2008-2684 - https://www.exploit-db.com/exploits/5750 +CVE-2008-2686 - https://www.exploit-db.com/exploits/5767 +CVE-2008-2687 - https://www.exploit-db.com/exploits/5762 +CVE-2008-2688 - https://www.exploit-db.com/exploits/5765 +CVE-2008-2689 - https://www.exploit-db.com/exploits/5757 +CVE-2008-2691 - https://www.exploit-db.com/exploits/5753 +CVE-2008-2692 - https://www.exploit-db.com/exploits/5755 +CVE-2008-2693 - https://www.exploit-db.com/exploits/5746 +CVE-2008-2693 - https://www.exploit-db.com/exploits/5747 +CVE-2008-2694 - https://www.exploit-db.com/exploits/5754 +CVE-2008-2695 - https://www.exploit-db.com/exploits/5754 +CVE-2008-2697 - https://www.exploit-db.com/exploits/5759 +CVE-2008-2698 - http://securityreason.com/securityalert/3940 +CVE-2008-2699 - https://www.exploit-db.com/exploits/5758 +CVE-2008-2700 - https://www.exploit-db.com/exploits/5760 +CVE-2008-2701 - http://packetstormsecurity.org/0806-exploits/joomlagameq-sql.txt +CVE-2008-2701 - https://www.exploit-db.com/exploits/5752 +CVE-2008-2702 - http://vuln.sg/alftp41b2-en.html +CVE-2008-2712 - http://securityreason.com/securityalert/3951 +CVE-2008-2712 - http://www.openwall.com/lists/oss-security/2008/10/15/1 +CVE-2008-2717 - http://securityreason.com/securityalert/3945 +CVE-2008-2718 - http://securityreason.com/securityalert/3945 +CVE-2008-2725 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9606 +CVE-2008-2726 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9959 +CVE-2008-2742 - https://www.exploit-db.com/exploits/5770 +CVE-2008-2744 - http://securityreason.com/securityalert/3946 +CVE-2008-2745 - https://www.exploit-db.com/exploits/5777 +CVE-2008-2745 - https://www.exploit-db.com/exploits/5778 +CVE-2008-2746 - https://www.exploit-db.com/exploits/5796 +CVE-2008-2747 - http://securityreason.com/securityalert/3952 +CVE-2008-2748 - http://aluigi.org/poc/skulltagloop.zip +CVE-2008-2748 - http://securityreason.com/securityalert/3953 +CVE-2008-2751 - http://securityreason.com/securityalert/3949 +CVE-2008-2753 - https://www.exploit-db.com/exploits/5788 +CVE-2008-2754 - https://www.exploit-db.com/exploits/5785 +CVE-2008-2755 - https://www.exploit-db.com/exploits/5789 +CVE-2008-2756 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2756 - http://securityreason.com/securityalert/3950 +CVE-2008-2756 - http://www.securityfocus.com/bid/29672 +CVE-2008-2757 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2757 - http://securityreason.com/securityalert/3950 +CVE-2008-2757 - http://www.securityfocus.com/bid/29672 +CVE-2008-2758 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2758 - http://securityreason.com/securityalert/3950 +CVE-2008-2758 - http://www.securityfocus.com/bid/29672 +CVE-2008-2759 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2759 - http://securityreason.com/securityalert/3950 +CVE-2008-2759 - http://www.securityfocus.com/bid/29672 +CVE-2008-2760 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2760 - http://securityreason.com/securityalert/3950 +CVE-2008-2760 - http://www.securityfocus.com/bid/29672 +CVE-2008-2761 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2761 - http://securityreason.com/securityalert/3950 +CVE-2008-2761 - http://www.securityfocus.com/bid/29672 +CVE-2008-2762 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2762 - http://securityreason.com/securityalert/3950 +CVE-2008-2762 - http://www.securityfocus.com/bid/29672 +CVE-2008-2763 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2763 - http://securityreason.com/securityalert/3950 +CVE-2008-2763 - http://www.securityfocus.com/bid/29672 +CVE-2008-2764 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2764 - http://securityreason.com/securityalert/3950 +CVE-2008-2764 - http://www.securityfocus.com/bid/29672 +CVE-2008-2765 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2765 - http://securityreason.com/securityalert/3950 +CVE-2008-2765 - http://www.securityfocus.com/bid/29672 +CVE-2008-2766 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2766 - http://securityreason.com/securityalert/3950 +CVE-2008-2766 - http://www.securityfocus.com/bid/29672 +CVE-2008-2767 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2767 - http://securityreason.com/securityalert/3950 +CVE-2008-2767 - http://www.securityfocus.com/bid/29672 +CVE-2008-2768 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 +CVE-2008-2768 - http://securityreason.com/securityalert/3950 +CVE-2008-2768 - http://www.securityfocus.com/bid/29672 +CVE-2008-2769 - http://securityreason.com/securityalert/3947 +CVE-2008-2770 - https://www.exploit-db.com/exploits/5787 +CVE-2008-2774 - https://www.exploit-db.com/exploits/5678 +CVE-2008-2778 - https://www.exploit-db.com/exploits/5677 +CVE-2008-2779 - http://vuln.sg/cuteftp820-en.html +CVE-2008-2781 - http://securityreason.com/securityalert/3954 +CVE-2008-2782 - https://www.exploit-db.com/exploits/5680 +CVE-2008-2785 - https://bugzilla.mozilla.org/show_bug.cgi?id=440230 +CVE-2008-2785 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900 +CVE-2008-2787 - http://securityreason.com/securityalert/3948 +CVE-2008-2789 - http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt +CVE-2008-2789 - https://www.exploit-db.com/exploits/5836 +CVE-2008-2790 - https://www.exploit-db.com/exploits/5840 +CVE-2008-2791 - https://www.exploit-db.com/exploits/5834 +CVE-2008-2792 - https://www.exploit-db.com/exploits/5846 +CVE-2008-2793 - https://www.exploit-db.com/exploits/5839 +CVE-2008-2795 - http://vuln.sg/ultraedit1400b-en.html +CVE-2008-2796 - http://securityreason.com/securityalert/3973 +CVE-2008-2796 - https://www.exploit-db.com/exploits/5838 +CVE-2008-2798 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2798 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2799 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2799 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2800 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2800 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2800 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9386 +CVE-2008-2801 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2801 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2802 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2802 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2803 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2803 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2805 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2805 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2807 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2807 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2807 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432 +CVE-2008-2808 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2808 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2808 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668 +CVE-2008-2809 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2809 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2809 - https://bugzilla.mozilla.org/show_bug.cgi?id=402347 +CVE-2008-2810 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2810 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2810 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9593 +CVE-2008-2811 - http://www.redhat.com/support/errata/RHSA-2008-0547.html +CVE-2008-2811 - http://www.redhat.com/support/errata/RHSA-2008-0549.html +CVE-2008-2811 - https://bugzilla.mozilla.org/show_bug.cgi?id=439735 +CVE-2008-2811 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9865 +CVE-2008-2813 - https://www.exploit-db.com/exploits/5813 +CVE-2008-2815 - https://www.exploit-db.com/exploits/5832 +CVE-2008-2816 - https://www.exploit-db.com/exploits/5828 +CVE-2008-2817 - https://www.exploit-db.com/exploits/5830 +CVE-2008-2818 - https://www.exploit-db.com/exploits/5801 +CVE-2008-2820 - http://securityreason.com/securityalert/3955 +CVE-2008-2820 - https://www.exploit-db.com/exploits/5831 +CVE-2008-2821 - http://vuln.sg/glubsecureftp2515-en.html +CVE-2008-2822 - http://vuln.sg/3dftp801-en.html +CVE-2008-2823 - https://www.exploit-db.com/exploits/5820 +CVE-2008-2830 - http://it.slashdot.org/it/08/06/18/1919224.shtml +CVE-2008-2832 - https://www.exploit-db.com/exploits/5850 +CVE-2008-2833 - https://www.exploit-db.com/exploits/5887 +CVE-2008-2834 - https://www.exploit-db.com/exploits/5885 +CVE-2008-2835 - https://www.exploit-db.com/exploits/5898 +CVE-2008-2836 - https://www.exploit-db.com/exploits/5847 +CVE-2008-2837 - https://www.exploit-db.com/exploits/5863 +CVE-2008-2838 - https://www.exploit-db.com/exploits/5848 +CVE-2008-2839 - https://www.exploit-db.com/exploits/5848 +CVE-2008-2841 - https://www.exploit-db.com/exploits/5795 +CVE-2008-2842 - http://www.bugreport.ir/?/43 +CVE-2008-2842 - https://www.exploit-db.com/exploits/5849 +CVE-2008-2843 - http://www.bugreport.ir/?/43 +CVE-2008-2843 - https://www.exploit-db.com/exploits/5849 +CVE-2008-2844 - https://www.exploit-db.com/exploits/5857 +CVE-2008-2845 - https://www.exploit-db.com/exploits/5854 +CVE-2008-2846 - https://www.exploit-db.com/exploits/5858 +CVE-2008-2847 - https://www.exploit-db.com/exploits/5853 +CVE-2008-2853 - https://www.exploit-db.com/exploits/5855 +CVE-2008-2854 - https://www.exploit-db.com/exploits/5864 +CVE-2008-2855 - https://www.exploit-db.com/exploits/5860 +CVE-2008-2856 - https://www.exploit-db.com/exploits/5860 +CVE-2008-2857 - https://www.exploit-db.com/exploits/5821 +CVE-2008-2860 - https://www.exploit-db.com/exploits/5867 +CVE-2008-2861 - http://securityreason.com/securityalert/3957 +CVE-2008-2861 - https://www.exploit-db.com/exploits/5859 +CVE-2008-2862 - http://securityreason.com/securityalert/3957 +CVE-2008-2862 - http://www.bugreport.ir/?/45 +CVE-2008-2862 - https://www.exploit-db.com/exploits/5859 +CVE-2008-2863 - http://securityreason.com/securityalert/3957 +CVE-2008-2863 - http://www.bugreport.ir/?/45 +CVE-2008-2863 - https://www.exploit-db.com/exploits/5859 +CVE-2008-2864 - http://securityreason.com/securityalert/3957 +CVE-2008-2864 - http://www.bugreport.ir/?/45 +CVE-2008-2864 - https://www.exploit-db.com/exploits/5859 +CVE-2008-2865 - https://www.exploit-db.com/exploits/5842 +CVE-2008-2866 - https://www.exploit-db.com/exploits/5865 +CVE-2008-2867 - https://www.exploit-db.com/exploits/5929 +CVE-2008-2868 - https://www.exploit-db.com/exploits/5927 +CVE-2008-2869 - https://www.exploit-db.com/exploits/5930 +CVE-2008-2870 - https://www.exploit-db.com/exploits/5925 +CVE-2008-2872 - https://www.exploit-db.com/exploits/5895 +CVE-2008-2873 - https://www.exploit-db.com/exploits/5895 +CVE-2008-2874 - https://www.exploit-db.com/exploits/5934 +CVE-2008-2875 - https://www.exploit-db.com/exploits/5932 +CVE-2008-2876 - https://www.exploit-db.com/exploits/5933 +CVE-2008-2877 - https://www.exploit-db.com/exploits/5921 +CVE-2008-2878 - http://securityreason.com/securityalert/3959 +CVE-2008-2878 - http://www.bugreport.ir/?/44 +CVE-2008-2879 - http://securityreason.com/securityalert/3958 +CVE-2008-2881 - http://e-rdc.org/v1/news.php?readmore=101 +CVE-2008-2881 - https://www.exploit-db.com/exploits/5924 +CVE-2008-2882 - http://securityreason.com/securityalert/3962 +CVE-2008-2882 - https://www.exploit-db.com/exploits/5895 +CVE-2008-2883 - https://www.exploit-db.com/exploits/5876 +CVE-2008-2884 - https://www.exploit-db.com/exploits/5900 +CVE-2008-2885 - https://www.exploit-db.com/exploits/5906 +CVE-2008-2886 - http://securityreason.com/securityalert/3961 +CVE-2008-2886 - https://www.exploit-db.com/exploits/5876 +CVE-2008-2887 - https://www.exploit-db.com/exploits/5872 +CVE-2008-2888 - https://www.exploit-db.com/exploits/5901 +CVE-2008-2889 - http://vuln.sg/wiseftp558-en.html +CVE-2008-2890 - http://securityreason.com/securityalert/3960 +CVE-2008-2890 - https://www.exploit-db.com/exploits/5889 +CVE-2008-2891 - https://www.exploit-db.com/exploits/5878 +CVE-2008-2892 - https://www.exploit-db.com/exploits/5893 +CVE-2008-2893 - https://www.exploit-db.com/exploits/5890 +CVE-2008-2894 - http://vuln.sg/classicftp102-en.html +CVE-2008-2895 - https://www.exploit-db.com/exploits/5884 +CVE-2008-2896 - https://www.exploit-db.com/exploits/5871 +CVE-2008-2897 - https://www.exploit-db.com/exploits/5899 +CVE-2008-2898 - https://www.exploit-db.com/exploits/5904 +CVE-2008-2900 - https://www.exploit-db.com/exploits/5892 +CVE-2008-2901 - https://www.exploit-db.com/exploits/5811 +CVE-2008-2902 - https://www.exploit-db.com/exploits/5821 +CVE-2008-2903 - https://www.exploit-db.com/exploits/5823 +CVE-2008-2904 - https://www.exploit-db.com/exploits/5812 +CVE-2008-2905 - https://www.exploit-db.com/exploits/5808 +CVE-2008-2906 - https://www.exploit-db.com/exploits/5802 +CVE-2008-2907 - https://www.exploit-db.com/exploits/5798 +CVE-2008-2909 - https://www.exploit-db.com/exploits/5794 +CVE-2008-2910 - https://www.exploit-db.com/exploits/5793 +CVE-2008-2911 - https://www.exploit-db.com/exploits/5810 +CVE-2008-2912 - https://www.exploit-db.com/exploits/5810 +CVE-2008-2913 - https://www.exploit-db.com/exploits/5822 +CVE-2008-2914 - https://www.exploit-db.com/exploits/5807 +CVE-2008-2915 - https://www.exploit-db.com/exploits/5809 +CVE-2008-2916 - http://e-rdc.org/v1/news.php?readmore=98 +CVE-2008-2916 - http://securityreason.com/securityalert/3963 +CVE-2008-2916 - https://www.exploit-db.com/exploits/5804 +CVE-2008-2917 - http://securityreason.com/securityalert/3964 +CVE-2008-2917 - https://www.exploit-db.com/exploits/5805 +CVE-2008-2918 - https://www.exploit-db.com/exploits/5815 +CVE-2008-2919 - https://www.exploit-db.com/exploits/5806 +CVE-2008-2920 - https://www.exploit-db.com/exploits/5819 +CVE-2008-2921 - https://www.exploit-db.com/exploits/5819 +CVE-2008-2922 - https://www.exploit-db.com/exploits/5817 +CVE-2008-2935 - http://securityreason.com/securityalert/4078 +CVE-2008-2935 - http://www.ocert.org/advisories/ocert-2008-009.html +CVE-2008-2936 - http://securityreason.com/securityalert/4160 +CVE-2008-2936 - https://www.exploit-db.com/exploits/6337 +CVE-2008-2938 - http://securityreason.com/securityalert/4148 +CVE-2008-2938 - http://www.redhat.com/support/errata/RHSA-2008-0862.html +CVE-2008-2938 - https://www.exploit-db.com/exploits/6229 +CVE-2008-2947 - http://www.kb.cert.org/vuls/id/923508 +CVE-2008-2947 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 +CVE-2008-2948 - http://sirdarckcat.blogspot.com/2008/05/ghosts-for-ie8-and-ie75730.html +CVE-2008-2948 - http://www.gnucitizen.org/blog/ghost-busters/ +CVE-2008-2948 - http://www.kb.cert.org/vuls/id/516627 +CVE-2008-2949 - http://www.kb.cert.org/vuls/id/516627 +CVE-2008-2950 - http://securityreason.com/securityalert/3977 +CVE-2008-2950 - http://www.ocert.org/advisories/ocert-2008-007.html +CVE-2008-2950 - https://www.exploit-db.com/exploits/6032 +CVE-2008-2955 - http://securityreason.com/securityalert/3966 +CVE-2008-2956 - http://crisp.cs.du.edu/?q=ca2007-1 +CVE-2008-2957 - http://crisp.cs.du.edu/?q=ca2007-1 +CVE-2008-2957 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076 +CVE-2008-2959 - https://www.exploit-db.com/exploits/5851 +CVE-2008-2961 - https://www.exploit-db.com/exploits/5896 +CVE-2008-2962 - https://www.exploit-db.com/exploits/5913 +CVE-2008-2963 - https://www.exploit-db.com/exploits/5913 +CVE-2008-2964 - https://www.exploit-db.com/exploits/5911 +CVE-2008-2965 - https://www.exploit-db.com/exploits/5877 +CVE-2008-2966 - https://www.exploit-db.com/exploits/5877 +CVE-2008-2967 - http://securityreason.com/securityalert/3959 +CVE-2008-2967 - http://www.bugreport.ir/?/44 +CVE-2008-2968 - http://securityreason.com/securityalert/3959 +CVE-2008-2968 - http://www.bugreport.ir/?/44 +CVE-2008-2969 - http://securityreason.com/securityalert/3959 +CVE-2008-2969 - http://www.bugreport.ir/?/44 +CVE-2008-2970 - http://securityreason.com/securityalert/3959 +CVE-2008-2970 - http://www.bugreport.ir/?/44 +CVE-2008-2971 - https://www.exploit-db.com/exploits/5875 +CVE-2008-2972 - https://www.exploit-db.com/exploits/5883 +CVE-2008-2973 - https://www.exploit-db.com/exploits/5919 +CVE-2008-2974 - https://www.exploit-db.com/exploits/5919 +CVE-2008-2975 - https://www.exploit-db.com/exploits/5917 +CVE-2008-2976 - https://www.exploit-db.com/exploits/5917 +CVE-2008-2977 - https://www.exploit-db.com/exploits/5920 +CVE-2008-2978 - https://www.exploit-db.com/exploits/5920 +CVE-2008-2979 - http://securityreason.com/securityalert/3968 +CVE-2008-2979 - https://www.exploit-db.com/exploits/5920 +CVE-2008-2980 - https://www.exploit-db.com/exploits/5903 +CVE-2008-2981 - https://www.exploit-db.com/exploits/5903 +CVE-2008-2982 - https://www.exploit-db.com/exploits/5903 +CVE-2008-2983 - https://www.exploit-db.com/exploits/5914 +CVE-2008-2984 - https://www.exploit-db.com/exploits/5905 +CVE-2008-2985 - https://www.exploit-db.com/exploits/5905 +CVE-2008-2986 - https://www.exploit-db.com/exploits/5897 +CVE-2008-2987 - http://securityreason.com/securityalert/3958 +CVE-2008-2988 - http://securityreason.com/securityalert/3958 +CVE-2008-2989 - https://www.exploit-db.com/exploits/5908 +CVE-2008-2990 - http://securityreason.com/securityalert/3967 +CVE-2008-2990 - https://www.exploit-db.com/exploits/5915 +CVE-2008-2992 - http://securityreason.com/securityalert/4549 +CVE-2008-2992 - http://www.coresecurity.com/content/adobe-reader-buffer-overflow +CVE-2008-2992 - https://www.exploit-db.com/exploits/6994 +CVE-2008-2992 - https://www.exploit-db.com/exploits/7006 +CVE-2008-2993 - http://securityreason.com/securityalert/3971 +CVE-2008-2993 - http://www.securityfocus.com/bid/29651 +CVE-2008-2993 - https://www.exploit-db.com/exploits/5784 +CVE-2008-2994 - http://securityreason.com/securityalert/3969 +CVE-2008-2995 - http://securityreason.com/securityalert/3969 +CVE-2008-2996 - http://securityreason.com/securityalert/3970 +CVE-2008-2996 - https://www.exploit-db.com/exploits/5791 +CVE-2008-2997 - http://securityreason.com/securityalert/3970 +CVE-2008-2997 - https://www.exploit-db.com/exploits/5791 +CVE-2008-3003 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 +CVE-2008-3004 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 +CVE-2008-3005 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 +CVE-2008-3006 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043 +CVE-2008-3007 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-055 +CVE-2008-3008 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053 +CVE-2008-3008 - https://www.exploit-db.com/exploits/6454 +CVE-2008-3009 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076 +CVE-2008-3010 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076 +CVE-2008-3012 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 +CVE-2008-3013 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 +CVE-2008-3014 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 +CVE-2008-3015 - http://www.evilfingers.com/patchTuesday/MS08_052_GDI+_Vulnerability_ver2.txt +CVE-2008-3015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-052 +CVE-2008-3015 - https://www.exploit-db.com/exploits/6619 +CVE-2008-3015 - https://www.exploit-db.com/exploits/6716 +CVE-2008-3018 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 +CVE-2008-3019 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 +CVE-2008-3020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 +CVE-2008-3021 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 +CVE-2008-3022 - http://securityreason.com/securityalert/3972 +CVE-2008-3022 - https://www.exploit-db.com/exploits/5996 +CVE-2008-3024 - http://securityreason.com/securityalert/3974 +CVE-2008-3025 - https://www.exploit-db.com/exploits/5988 +CVE-2008-3026 - https://www.exploit-db.com/exploits/5984 +CVE-2008-3027 - https://www.exploit-db.com/exploits/5985 +CVE-2008-3030 - https://www.exploit-db.com/exploits/5987 +CVE-2008-3031 - https://www.exploit-db.com/exploits/5982 +CVE-2008-3033 - http://securityreason.com/securityalert/3975 +CVE-2008-3034 - http://securityreason.com/securityalert/3975 +CVE-2008-3035 - https://www.exploit-db.com/exploits/5991 +CVE-2008-3036 - https://www.exploit-db.com/exploits/5992 +CVE-2008-3068 - http://securityreason.com/securityalert/3978 +CVE-2008-3068 - https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt +CVE-2008-3068 - https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt +CVE-2008-3068 - https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt +CVE-2008-3068 - https://www.cynops.de/techzone/http_over_x509.html +CVE-2008-3074 - http://www.openwall.com/lists/oss-security/2008/10/15/1 +CVE-2008-3075 - http://www.openwall.com/lists/oss-security/2008/10/15/1 +CVE-2008-3080 - https://www.exploit-db.com/exploits/5975 +CVE-2008-3083 - https://www.exploit-db.com/exploits/5993 +CVE-2008-3087 - https://www.exploit-db.com/exploits/6007 +CVE-2008-3088 - https://www.exploit-db.com/exploits/6007 +CVE-2008-3089 - https://www.exploit-db.com/exploits/6010 +CVE-2008-3090 - http://vuln.sg/blognplus255-en.html +CVE-2008-3093 - https://www.exploit-db.com/exploits/6008 +CVE-2008-3098 - http://securityreason.com/securityalert/4303 +CVE-2008-3100 - http://securityreason.com/securityalert/4057 +CVE-2008-3101 - http://securityreason.com/securityalert/4208 +CVE-2008-3102 - http://securityreason.com/securityalert/4298 +CVE-2008-3103 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3104 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3104 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3104 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9565 +CVE-2008-3105 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3106 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3106 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3107 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3108 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3108 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3109 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3110 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3111 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3111 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3112 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3112 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3113 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3113 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3114 - http://www.redhat.com/support/errata/RHSA-2008-0790.html +CVE-2008-3114 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3114 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9755 +CVE-2008-3115 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-3116 - http://securityreason.com/securityalert/3982 +CVE-2008-3117 - https://www.exploit-db.com/exploits/5938 +CVE-2008-3118 - https://www.exploit-db.com/exploits/5938 +CVE-2008-3119 - http://securityreason.com/securityalert/3980 +CVE-2008-3119 - https://www.exploit-db.com/exploits/6034 +CVE-2008-3123 - https://www.exploit-db.com/exploits/6022 +CVE-2008-3124 - https://www.exploit-db.com/exploits/6021 +CVE-2008-3125 - https://www.exploit-db.com/exploits/6020 +CVE-2008-3125 - https://www.exploit-db.com/exploits/6027 +CVE-2008-3127 - https://www.exploit-db.com/exploits/5981 +CVE-2008-3128 - https://www.exploit-db.com/exploits/5973 +CVE-2008-3129 - https://www.exploit-db.com/exploits/5974 +CVE-2008-3131 - http://securityreason.com/securityalert/3984 +CVE-2008-3131 - https://www.exploit-db.com/exploits/5977 +CVE-2008-3132 - https://www.exploit-db.com/exploits/5965 +CVE-2008-3133 - https://www.exploit-db.com/exploits/5971 +CVE-2008-3135 - http://aluigi.altervista.org/adv/usurdat-adv.txt +CVE-2008-3135 - http://securityreason.com/securityalert/3983 +CVE-2008-3136 - https://www.exploit-db.com/exploits/5976 +CVE-2008-3142 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-3143 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-3144 - http://bugs.python.org/issue2588 +CVE-2008-3144 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-3145 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9020 +CVE-2008-3147 - http://securityreason.com/securityalert/3987 +CVE-2008-3148 - https://www.exploit-db.com/exploits/6031 +CVE-2008-3149 - http://securityreason.com/securityalert/3985 +CVE-2008-3150 - https://www.exploit-db.com/exploits/6018 +CVE-2008-3151 - http://securityreason.com/securityalert/3986 +CVE-2008-3152 - https://www.exploit-db.com/exploits/6014 +CVE-2008-3152 - https://www.exploit-db.com/exploits/6019 +CVE-2008-3153 - https://www.exploit-db.com/exploits/6017 +CVE-2008-3154 - https://www.exploit-db.com/exploits/5997 +CVE-2008-3155 - https://www.exploit-db.com/exploits/6004 +CVE-2008-3156 - https://www.exploit-db.com/exploits/6004 +CVE-2008-3164 - https://www.exploit-db.com/exploits/6016 +CVE-2008-3165 - http://securityreason.com/securityalert/3995 +CVE-2008-3165 - https://www.exploit-db.com/exploits/6009 +CVE-2008-3166 - http://securityreason.com/securityalert/3994 +CVE-2008-3166 - https://www.exploit-db.com/exploits/6028 +CVE-2008-3167 - http://securityreason.com/securityalert/3993 +CVE-2008-3167 - https://www.exploit-db.com/exploits/6024 +CVE-2008-3178 - http://securityreason.com/securityalert/3991 +CVE-2008-3178 - https://www.exploit-db.com/exploits/6015 +CVE-2008-3179 - http://securityreason.com/securityalert/3992 +CVE-2008-3179 - https://www.exploit-db.com/exploits/6037 +CVE-2008-3180 - http://securityreason.com/securityalert/3990 +CVE-2008-3180 - https://www.exploit-db.com/exploits/6011 +CVE-2008-3181 - https://www.exploit-db.com/exploits/6011 +CVE-2008-3182 - http://securityreason.com/securityalert/3997 +CVE-2008-3182 - https://www.exploit-db.com/exploits/6030 +CVE-2008-3182 - https://www.exploit-db.com/exploits/6039 +CVE-2008-3183 - http://securityreason.com/securityalert/3998 +CVE-2008-3183 - https://www.exploit-db.com/exploits/6036 +CVE-2008-3184 - http://securityreason.com/securityalert/4000 +CVE-2008-3185 - http://e-rdc.org/v1/news.php?readmore=101 +CVE-2008-3185 - http://securityreason.com/securityalert/4002 +CVE-2008-3185 - https://www.exploit-db.com/exploits/5924 +CVE-2008-3189 - https://www.exploit-db.com/exploits/6035 +CVE-2008-3190 - http://securityreason.com/securityalert/4001 +CVE-2008-3190 - https://www.exploit-db.com/exploits/6071 +CVE-2008-3191 - http://securityreason.com/securityalert/4003 +CVE-2008-3191 - https://www.exploit-db.com/exploits/6068 +CVE-2008-3192 - http://securityreason.com/securityalert/3999 +CVE-2008-3192 - https://www.exploit-db.com/exploits/6057 +CVE-2008-3193 - http://securityreason.com/securityalert/3999 +CVE-2008-3193 - https://www.exploit-db.com/exploits/6057 +CVE-2008-3194 - http://securityreason.com/securityalert/3996 +CVE-2008-3194 - https://www.exploit-db.com/exploits/6074 +CVE-2008-3195 - http://securityreason.com/securityalert/4265 +CVE-2008-3195 - https://www.exploit-db.com/exploits/6269 +CVE-2008-3200 - http://securityreason.com/securityalert/4005 +CVE-2008-3200 - https://www.exploit-db.com/exploits/6058 +CVE-2008-3203 - https://www.exploit-db.com/exploits/6033 +CVE-2008-3204 - http://securityreason.com/securityalert/4006 +CVE-2008-3204 - https://www.exploit-db.com/exploits/6044 +CVE-2008-3205 - http://securityreason.com/securityalert/4007 +CVE-2008-3205 - https://www.exploit-db.com/exploits/6042 +CVE-2008-3206 - http://securityreason.com/securityalert/4008 +CVE-2008-3207 - http://securityreason.com/securityalert/4010 +CVE-2008-3207 - https://www.exploit-db.com/exploits/6078 +CVE-2008-3208 - http://securityreason.com/securityalert/4011 +CVE-2008-3208 - https://www.exploit-db.com/exploits/6059 +CVE-2008-3209 - http://securityreason.com/securityalert/4012 +CVE-2008-3209 - https://www.exploit-db.com/exploits/6083 +CVE-2008-3210 - http://securityreason.com/securityalert/4013 +CVE-2008-3210 - https://www.exploit-db.com/exploits/6046 +CVE-2008-3211 - http://securityreason.com/securityalert/4014 +CVE-2008-3211 - https://www.exploit-db.com/exploits/6070 +CVE-2008-3213 - http://securityreason.com/securityalert/4009 +CVE-2008-3213 - https://www.exploit-db.com/exploits/6056 +CVE-2008-3214 - http://www.openwall.com/lists/oss-security/2008/07/03/4 +CVE-2008-3214 - http://www.openwall.com/lists/oss-security/2008/07/08/8 +CVE-2008-3214 - http://www.openwall.com/lists/oss-security/2008/07/12/3 +CVE-2008-3214 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2008-3234 - https://www.exploit-db.com/exploits/6094 +CVE-2008-3237 - http://securityreason.com/securityalert/4015 +CVE-2008-3237 - https://www.exploit-db.com/exploits/6069 +CVE-2008-3238 - http://securityreason.com/securityalert/4015 +CVE-2008-3238 - https://www.exploit-db.com/exploits/6069 +CVE-2008-3239 - http://securityreason.com/securityalert/4022 +CVE-2008-3239 - https://www.exploit-db.com/exploits/6085 +CVE-2008-3240 - http://securityreason.com/securityalert/4016 +CVE-2008-3240 - https://www.exploit-db.com/exploits/6087 +CVE-2008-3241 - http://securityreason.com/securityalert/4021 +CVE-2008-3241 - https://www.exploit-db.com/exploits/6067 +CVE-2008-3242 - http://securityreason.com/securityalert/4019 +CVE-2008-3242 - https://www.exploit-db.com/exploits/6090 +CVE-2008-3245 - https://www.exploit-db.com/exploits/6091 +CVE-2008-3250 - http://securityreason.com/securityalert/4017 +CVE-2008-3250 - https://www.exploit-db.com/exploits/6097 +CVE-2008-3250 - https://www.exploit-db.com/exploits/6113 +CVE-2008-3251 - http://securityreason.com/securityalert/4018 +CVE-2008-3251 - https://www.exploit-db.com/exploits/6088 +CVE-2008-3254 - https://www.exploit-db.com/exploits/6096 +CVE-2008-3256 - https://www.exploit-db.com/exploits/6099 +CVE-2008-3257 - http://www.attrition.org/pipermail/vim/2008-July/002035.html +CVE-2008-3257 - http://www.attrition.org/pipermail/vim/2008-July/002036.html +CVE-2008-3257 - https://www.exploit-db.com/exploits/6089 +CVE-2008-3260 - http://securityreason.com/securityalert/4020 +CVE-2008-3261 - http://securityreason.com/securityalert/4020 +CVE-2008-3262 - http://securityreason.com/securityalert/4020 +CVE-2008-3265 - http://securityreason.com/securityalert/4023 +CVE-2008-3265 - https://www.exploit-db.com/exploits/6086 +CVE-2008-3266 - http://securityreason.com/securityalert/4028 +CVE-2008-3266 - https://www.exploit-db.com/exploits/6105 +CVE-2008-3267 - http://securityreason.com/securityalert/4029 +CVE-2008-3267 - https://www.exploit-db.com/exploits/6110 +CVE-2008-3269 - http://securityreason.com/securityalert/4030 +CVE-2008-3269 - https://www.exploit-db.com/exploits/6077 +CVE-2008-3271 - http://securityreason.com/securityalert/4396 +CVE-2008-3274 - http://www.freeipa.org/page/Downloads +CVE-2008-3280 - https://www.exploit-db.com/exploits/5720 +CVE-2008-3281 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 +CVE-2008-3285 - http://securityreason.com/securityalert/4027 +CVE-2008-3287 - http://securityreason.com/securityalert/4031 +CVE-2008-3288 - http://securityreason.com/securityalert/4026 +CVE-2008-3289 - http://securityreason.com/securityalert/4025 +CVE-2008-3290 - http://securityreason.com/securityalert/4024 +CVE-2008-3291 - http://securityreason.com/securityalert/4032 +CVE-2008-3291 - https://www.exploit-db.com/exploits/6098 +CVE-2008-3292 - http://securityreason.com/securityalert/4033 +CVE-2008-3292 - https://www.exploit-db.com/exploits/6115 +CVE-2008-3293 - http://securityreason.com/securityalert/4034 +CVE-2008-3293 - https://www.exploit-db.com/exploits/6112 +CVE-2008-3297 - http://securityreason.com/securityalert/4035 +CVE-2008-3298 - http://securityreason.com/securityalert/4035 +CVE-2008-3301 - https://www.exploit-db.com/exploits/6073 +CVE-2008-3302 - http://securityreason.com/securityalert/4036 +CVE-2008-3302 - https://www.exploit-db.com/exploits/6073 +CVE-2008-3303 - http://securityreason.com/securityalert/4036 +CVE-2008-3303 - https://www.exploit-db.com/exploits/6073 +CVE-2008-3304 - https://www.exploit-db.com/exploits/6073 +CVE-2008-3305 - http://securityreason.com/securityalert/4037 +CVE-2008-3305 - https://www.exploit-db.com/exploits/6117 +CVE-2008-3307 - http://securityreason.com/securityalert/4037 +CVE-2008-3307 - https://www.exploit-db.com/exploits/6117 +CVE-2008-3308 - http://securityreason.com/securityalert/4037 +CVE-2008-3308 - https://www.exploit-db.com/exploits/6117 +CVE-2008-3309 - http://securityreason.com/securityalert/4038 +CVE-2008-3309 - https://www.exploit-db.com/exploits/6104 +CVE-2008-3310 - http://securityreason.com/securityalert/4039 +CVE-2008-3310 - https://www.exploit-db.com/exploits/6119 +CVE-2008-3311 - http://securityreason.com/securityalert/4040 +CVE-2008-3314 - http://aluigi.altervista.org/adv/zdaemonull-adv.txt +CVE-2008-3314 - http://aluigi.org/poc/zdaemonull.zip +CVE-2008-3314 - http://securityreason.com/securityalert/4043 +CVE-2008-3315 - http://securityreason.com/securityalert/4041 +CVE-2008-3317 - http://securityreason.com/securityalert/4042 +CVE-2008-3317 - https://www.exploit-db.com/exploits/6066 +CVE-2008-3318 - https://www.exploit-db.com/exploits/6064 +CVE-2008-3319 - http://www.securityfocus.com/bid/30205 +CVE-2008-3319 - https://www.exploit-db.com/exploits/6062 +CVE-2008-3320 - https://www.exploit-db.com/exploits/6061 +CVE-2008-3321 - https://www.exploit-db.com/exploits/6065 +CVE-2008-3322 - https://www.exploit-db.com/exploits/6063 +CVE-2008-3323 - http://securityreason.com/securityalert/4051 +CVE-2008-3323 - https://bugzilla.redhat.com/show_bug.cgi?id=449929 +CVE-2008-3324 - http://seclists.org/fulldisclosure/2008/Aug/0302.html +CVE-2008-3326 - https://www.exploit-db.com/exploits/6653 +CVE-2008-3331 - http://marc.info/?l=bugtraq&m=121130774617956&w=4 +CVE-2008-3331 - http://securityreason.com/securityalert/4044 +CVE-2008-3331 - https://www.exploit-db.com/exploits/5657 +CVE-2008-3332 - http://marc.info/?l=bugtraq&m=121130774617956&w=4 +CVE-2008-3332 - http://securityreason.com/securityalert/4044 +CVE-2008-3332 - https://www.exploit-db.com/exploits/5657 +CVE-2008-3333 - http://www.mantisbt.org/bugs/view.php?id=9154 +CVE-2008-3333 - https://bugzilla.redhat.com/show_bug.cgi?id=456044 +CVE-2008-3335 - http://punbb.informer.com/ +CVE-2008-3336 - http://punbb.informer.com/ +CVE-2008-3342 - http://securityreason.com/securityalert/4050 +CVE-2008-3343 - http://securityreason.com/securityalert/4050 +CVE-2008-3344 - http://securityreason.com/securityalert/4049 +CVE-2008-3345 - http://securityreason.com/securityalert/4049 +CVE-2008-3346 - http://securityreason.com/securityalert/4045 +CVE-2008-3346 - https://www.exploit-db.com/exploits/6114 +CVE-2008-3347 - http://securityreason.com/securityalert/4046 +CVE-2008-3348 - http://securityreason.com/securityalert/4046 +CVE-2008-3350 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2008-3351 - http://securityreason.com/securityalert/4053 +CVE-2008-3351 - https://www.exploit-db.com/exploits/6125 +CVE-2008-3352 - http://securityreason.com/securityalert/4052 +CVE-2008-3352 - https://www.exploit-db.com/exploits/6128 +CVE-2008-3355 - http://securityreason.com/securityalert/4047 +CVE-2008-3355 - https://www.exploit-db.com/exploits/6132 +CVE-2008-3360 - http://securityreason.com/securityalert/4058 +CVE-2008-3360 - https://www.exploit-db.com/exploits/6103 +CVE-2008-3360 - https://www.exploit-db.com/exploits/6116 +CVE-2008-3360 - https://www.exploit-db.com/exploits/6121 +CVE-2008-3360 - https://www.exploit-db.com/exploits/6238 +CVE-2008-3361 - http://securityreason.com/securityalert/4059 +CVE-2008-3361 - https://www.exploit-db.com/exploits/6118 +CVE-2008-3361 - https://www.exploit-db.com/exploits/6227 +CVE-2008-3362 - http://securityreason.com/securityalert/4060 +CVE-2008-3362 - https://www.exploit-db.com/exploits/6127 +CVE-2008-3363 - http://securityreason.com/securityalert/4056 +CVE-2008-3363 - https://www.exploit-db.com/exploits/6149 +CVE-2008-3364 - http://securityreason.com/securityalert/4061 +CVE-2008-3364 - https://www.exploit-db.com/exploits/6152 +CVE-2008-3365 - http://securityreason.com/securityalert/4062 +CVE-2008-3365 - https://www.exploit-db.com/exploits/6150 +CVE-2008-3366 - http://securityreason.com/securityalert/4063 +CVE-2008-3366 - https://www.exploit-db.com/exploits/6146 +CVE-2008-3367 - http://securityreason.com/securityalert/4055 +CVE-2008-3368 - http://securityreason.com/securityalert/4064 +CVE-2008-3368 - https://www.exploit-db.com/exploits/6153 +CVE-2008-3369 - http://securityreason.com/securityalert/4065 +CVE-2008-3369 - https://www.exploit-db.com/exploits/6154 +CVE-2008-3370 - http://securityreason.com/securityalert/4066 +CVE-2008-3371 - http://securityreason.com/securityalert/4067 +CVE-2008-3371 - http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt +CVE-2008-3371 - https://www.exploit-db.com/exploits/6148 +CVE-2008-3371 - https://www.exploit-db.com/exploits/6451 +CVE-2008-3371 - https://www.exploit-db.com/exploits/9095 +CVE-2008-3372 - http://securityreason.com/securityalert/4068 +CVE-2008-3372 - https://www.exploit-db.com/exploits/6143 +CVE-2008-3374 - https://www.exploit-db.com/exploits/6159 +CVE-2008-3375 - http://securityreason.com/securityalert/4069 +CVE-2008-3377 - http://securityreason.com/securityalert/4070 +CVE-2008-3377 - https://www.exploit-db.com/exploits/6134 +CVE-2008-3378 - http://securityreason.com/securityalert/4071 +CVE-2008-3378 - https://www.exploit-db.com/exploits/6133 +CVE-2008-3380 - http://securityreason.com/securityalert/4072 +CVE-2008-3382 - https://www.exploit-db.com/exploits/6108 +CVE-2008-3383 - https://www.exploit-db.com/exploits/6111 +CVE-2008-3384 - http://securityreason.com/securityalert/4073 +CVE-2008-3384 - https://www.exploit-db.com/exploits/6107 +CVE-2008-3385 - http://securityreason.com/securityalert/4074 +CVE-2008-3385 - https://www.exploit-db.com/exploits/6080 +CVE-2008-3386 - http://securityreason.com/securityalert/4075 +CVE-2008-3386 - https://www.exploit-db.com/exploits/6092 +CVE-2008-3387 - http://securityreason.com/securityalert/4076 +CVE-2008-3387 - https://www.exploit-db.com/exploits/6102 +CVE-2008-3388 - http://securityreason.com/securityalert/4079 +CVE-2008-3390 - http://securityreason.com/securityalert/4080 +CVE-2008-3390 - https://www.exploit-db.com/exploits/6156 +CVE-2008-3396 - http://aluigi.altervista.org/adv/ut2004null-adv.txt +CVE-2008-3396 - http://aluigi.org/poc/ut2004null.zip +CVE-2008-3398 - http://securityreason.com/securityalert/4081 +CVE-2008-3398 - https://www.exploit-db.com/exploits/6131 +CVE-2008-3399 - http://securityreason.com/securityalert/4081 +CVE-2008-3399 - https://www.exploit-db.com/exploits/6131 +CVE-2008-3400 - http://securityreason.com/securityalert/4081 +CVE-2008-3400 - https://www.exploit-db.com/exploits/6131 +CVE-2008-3401 - http://securityreason.com/securityalert/4082 +CVE-2008-3401 - https://www.exploit-db.com/exploits/6161 +CVE-2008-3402 - http://securityreason.com/securityalert/4083 +CVE-2008-3402 - https://www.exploit-db.com/exploits/6162 +CVE-2008-3403 - http://securityreason.com/securityalert/4084 +CVE-2008-3403 - https://www.exploit-db.com/exploits/6109 +CVE-2008-3404 - http://securityreason.com/securityalert/4085 +CVE-2008-3405 - http://securityreason.com/securityalert/4086 +CVE-2008-3405 - https://www.exploit-db.com/exploits/6164 +CVE-2008-3406 - http://securityreason.com/securityalert/4087 +CVE-2008-3406 - https://www.exploit-db.com/exploits/6140 +CVE-2008-3407 - http://securityreason.com/securityalert/4087 +CVE-2008-3407 - https://www.exploit-db.com/exploits/6140 +CVE-2008-3408 - http://securityreason.com/securityalert/4088 +CVE-2008-3408 - https://www.exploit-db.com/exploits/6157 +CVE-2008-3409 - http://aluigi.altervista.org/adv/ut3mendo-adv.txt +CVE-2008-3409 - http://aluigi.org/poc/ut3mendo.zip +CVE-2008-3410 - http://aluigi.altervista.org/adv/ut3mendo-adv.txt +CVE-2008-3410 - http://aluigi.org/poc/ut3mendo.zip +CVE-2008-3411 - http://securityreason.com/securityalert/4089 +CVE-2008-3412 - http://securityreason.com/securityalert/4090 +CVE-2008-3412 - https://www.exploit-db.com/exploits/6139 +CVE-2008-3413 - http://securityreason.com/securityalert/4091 +CVE-2008-3413 - https://www.exploit-db.com/exploits/6144 +CVE-2008-3414 - http://securityreason.com/securityalert/4092 +CVE-2008-3414 - https://www.exploit-db.com/exploits/6145 +CVE-2008-3415 - http://securityreason.com/securityalert/4093 +CVE-2008-3415 - https://www.exploit-db.com/exploits/6142 +CVE-2008-3416 - http://securityreason.com/securityalert/4094 +CVE-2008-3416 - https://www.exploit-db.com/exploits/6137 +CVE-2008-3417 - http://securityreason.com/securityalert/4095 +CVE-2008-3417 - https://www.exploit-db.com/exploits/6135 +CVE-2008-3418 - http://securityreason.com/securityalert/4077 +CVE-2008-3418 - https://www.exploit-db.com/exploits/6141 +CVE-2008-3419 - http://securityreason.com/securityalert/4096 +CVE-2008-3419 - https://www.exploit-db.com/exploits/6147 +CVE-2008-3420 - http://securityreason.com/securityalert/4097 +CVE-2008-3420 - https://www.exploit-db.com/exploits/6138 +CVE-2008-3430 - http://packetstormsecurity.org/0807-exploits/siol-overflow.txt +CVE-2008-3431 - http://securityreason.com/securityalert/4107 +CVE-2008-3431 - http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability +CVE-2008-3431 - https://www.exploit-db.com/exploits/6218 +CVE-2008-3443 - http://securityreason.com/securityalert/4158 +CVE-2008-3443 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570 +CVE-2008-3443 - https://www.exploit-db.com/exploits/6239 +CVE-2008-3445 - http://securityreason.com/securityalert/4103 +CVE-2008-3445 - https://www.exploit-db.com/exploits/6180 +CVE-2008-3446 - http://securityreason.com/securityalert/4101 +CVE-2008-3446 - https://www.exploit-db.com/exploits/6179 +CVE-2008-3447 - https://www.exploit-db.com/exploits/6174 +CVE-2008-3448 - http://securityreason.com/securityalert/4102 +CVE-2008-3452 - http://securityreason.com/securityalert/4104 +CVE-2008-3452 - https://www.exploit-db.com/exploits/6171 +CVE-2008-3454 - http://securityreason.com/securityalert/4105 +CVE-2008-3454 - https://www.exploit-db.com/exploits/6163 +CVE-2008-3455 - http://securityreason.com/securityalert/4106 +CVE-2008-3455 - https://www.exploit-db.com/exploits/6160 +CVE-2008-3460 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-044 +CVE-2008-3464 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-066 +CVE-2008-3464 - https://www.exploit-db.com/exploits/6757 +CVE-2008-3465 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071 +CVE-2008-3466 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-059 +CVE-2008-3471 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 +CVE-2008-3472 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 +CVE-2008-3473 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 +CVE-2008-3474 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 +CVE-2008-3475 - http://ifsec.blogspot.com/2008/10/internet-explorer-6-componentfrompoint.html +CVE-2008-3475 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 +CVE-2008-3476 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 +CVE-2008-3477 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 +CVE-2008-3479 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-065 +CVE-2008-3480 - http://securityreason.com/securityalert/4197 +CVE-2008-3480 - http://www.coresecurity.com/content/anzio-web-print-object-buffer-overflow +CVE-2008-3480 - https://www.exploit-db.com/exploits/6278 +CVE-2008-3481 - http://securityreason.com/securityalert/4108 +CVE-2008-3481 - https://www.exploit-db.com/exploits/6178 +CVE-2008-3484 - http://securityreason.com/securityalert/4109 +CVE-2008-3484 - https://www.exploit-db.com/exploits/6187 +CVE-2008-3485 - http://securityreason.com/securityalert/4110 +CVE-2008-3486 - http://securityreason.com/securityalert/4108 +CVE-2008-3486 - https://www.exploit-db.com/exploits/6178 +CVE-2008-3487 - http://securityreason.com/securityalert/4111 +CVE-2008-3487 - https://www.exploit-db.com/exploits/6182 +CVE-2008-3489 - http://securityreason.com/securityalert/4112 +CVE-2008-3489 - https://www.exploit-db.com/exploits/6176 +CVE-2008-3490 - http://securityreason.com/securityalert/4113 +CVE-2008-3490 - https://www.exploit-db.com/exploits/6184 +CVE-2008-3491 - http://securityreason.com/securityalert/4117 +CVE-2008-3491 - https://www.exploit-db.com/exploits/6185 +CVE-2008-3491 - https://www.exploit-db.com/exploits/6186 +CVE-2008-3492 - http://aluigi.altervista.org/adv/armynchia-adv.txt +CVE-2008-3492 - http://aluigi.org/poc/armynchia.zip +CVE-2008-3493 - https://www.exploit-db.com/exploits/6181 +CVE-2008-3497 - http://securityreason.com/securityalert/4115 +CVE-2008-3497 - https://www.exploit-db.com/exploits/5937 +CVE-2008-3498 - http://securityreason.com/securityalert/4114 +CVE-2008-3498 - https://www.exploit-db.com/exploits/5939 +CVE-2008-3505 - http://securityreason.com/securityalert/4116 +CVE-2008-3505 - https://www.exploit-db.com/exploits/5941 +CVE-2008-3506 - http://securityreason.com/securityalert/4116 +CVE-2008-3506 - https://www.exploit-db.com/exploits/5941 +CVE-2008-3507 - https://www.exploit-db.com/exploits/6207 +CVE-2008-3508 - https://www.exploit-db.com/exploits/6206 +CVE-2008-3509 - https://www.exploit-db.com/exploits/6209 +CVE-2008-3509 - https://www.exploit-db.com/exploits/6210 +CVE-2008-3514 - http://securityreason.com/securityalert/4150 +CVE-2008-3520 - http://www.ubuntu.com/usn/USN-742-1 +CVE-2008-3521 - http://bugs.gentoo.org/attachment.cgi?id=163282&action=view +CVE-2008-3521 - http://www.ubuntu.com/usn/USN-742-1 +CVE-2008-3522 - http://bugs.gentoo.org/attachment.cgi?id=163282&action=view +CVE-2008-3522 - http://www.ubuntu.com/usn/USN-742-1 +CVE-2008-3525 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364 +CVE-2008-3528 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-3529 - https://www.exploit-db.com/exploits/8798 +CVE-2008-3533 - http://bugzilla.gnome.org/show_bug.cgi?id=546364 +CVE-2008-3533 - https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860 +CVE-2008-3536 - http://securityreason.com/securityalert/4209 +CVE-2008-3537 - http://securityreason.com/securityalert/4209 +CVE-2008-3539 - http://securityreason.com/securityalert/4236 +CVE-2008-3542 - http://securityreason.com/securityalert/4346 +CVE-2008-3544 - http://securityreason.com/securityalert/4397 +CVE-2008-3545 - http://securityreason.com/securityalert/4399 +CVE-2008-3546 - http://kerneltrap.org/mailarchive/git/2008/7/16/2529284 +CVE-2008-3554 - https://www.exploit-db.com/exploits/6214 +CVE-2008-3555 - http://securityreason.com/securityalert/4120 +CVE-2008-3555 - https://www.exploit-db.com/exploits/6208 +CVE-2008-3556 - http://securityreason.com/securityalert/4119 +CVE-2008-3557 - http://securityreason.com/securityalert/4118 +CVE-2008-3557 - https://www.exploit-db.com/exploits/6213 +CVE-2008-3558 - https://www.exploit-db.com/exploits/6220 +CVE-2008-3560 - http://lostmon.blogspot.com/2008/08/kshop-module-search-variable-and-field.html +CVE-2008-3563 - http://securityreason.com/securityalert/4121 +CVE-2008-3563 - https://www.exploit-db.com/exploits/6204 +CVE-2008-3564 - http://securityreason.com/securityalert/4122 +CVE-2008-3564 - https://www.exploit-db.com/exploits/6203 +CVE-2008-3568 - http://securityreason.com/securityalert/4123 +CVE-2008-3569 - http://securityreason.com/securityalert/4127 +CVE-2008-3570 - http://securityreason.com/securityalert/4124 +CVE-2008-3570 - https://www.exploit-db.com/exploits/6183 +CVE-2008-3571 - http://securityreason.com/securityalert/4128 +CVE-2008-3571 - https://www.exploit-db.com/exploits/6196 +CVE-2008-3572 - http://securityreason.com/securityalert/4129 +CVE-2008-3574 - http://securityreason.com/securityalert/4125 +CVE-2008-3575 - http://securityreason.com/securityalert/4130 +CVE-2008-3578 - http://securityreason.com/securityalert/4126 +CVE-2008-3578 - https://www.exploit-db.com/exploits/6201 +CVE-2008-3580 - http://securityreason.com/securityalert/4131 +CVE-2008-3580 - https://www.exploit-db.com/exploits/6192 +CVE-2008-3581 - http://securityreason.com/securityalert/4131 +CVE-2008-3581 - https://www.exploit-db.com/exploits/6192 +CVE-2008-3582 - http://securityreason.com/securityalert/4132 +CVE-2008-3583 - https://www.exploit-db.com/exploits/6195 +CVE-2008-3585 - http://securityreason.com/securityalert/4133 +CVE-2008-3585 - https://www.exploit-db.com/exploits/6189 +CVE-2008-3586 - https://www.exploit-db.com/exploits/6199 +CVE-2008-3587 - http://securityreason.com/securityalert/4134 +CVE-2008-3588 - http://securityreason.com/securityalert/4135 +CVE-2008-3588 - https://www.exploit-db.com/exploits/6190 +CVE-2008-3589 - http://securityreason.com/securityalert/4136 +CVE-2008-3589 - https://www.exploit-db.com/exploits/6194 +CVE-2008-3591 - http://securityreason.com/securityalert/4137 +CVE-2008-3591 - https://www.exploit-db.com/exploits/6177 +CVE-2008-3592 - http://securityreason.com/securityalert/4137 +CVE-2008-3592 - https://www.exploit-db.com/exploits/6177 +CVE-2008-3593 - http://securityreason.com/securityalert/4138 +CVE-2008-3593 - https://www.exploit-db.com/exploits/6200 +CVE-2008-3594 - http://securityreason.com/securityalert/4139 +CVE-2008-3594 - https://www.exploit-db.com/exploits/6193 +CVE-2008-3595 - https://www.exploit-db.com/exploits/6224 +CVE-2008-3597 - http://aluigi.altervista.org/adv/skulltagod-adv.txt +CVE-2008-3598 - http://securityreason.com/securityalert/4140 +CVE-2008-3598 - https://www.exploit-db.com/exploits/6226 +CVE-2008-3599 - http://securityreason.com/securityalert/4141 +CVE-2008-3599 - https://www.exploit-db.com/exploits/6228 +CVE-2008-3600 - http://securityreason.com/securityalert/4142 +CVE-2008-3600 - https://www.exploit-db.com/exploits/6222 +CVE-2008-3601 - http://securityreason.com/securityalert/4144 +CVE-2008-3601 - https://www.exploit-db.com/exploits/6223 +CVE-2008-3602 - http://securityreason.com/securityalert/4143 +CVE-2008-3602 - https://www.exploit-db.com/exploits/6225 +CVE-2008-3603 - https://www.exploit-db.com/exploits/6221 +CVE-2008-3604 - http://securityreason.com/securityalert/4145 +CVE-2008-3604 - https://www.exploit-db.com/exploits/6230 +CVE-2008-3606 - http://securityreason.com/securityalert/4146 +CVE-2008-3607 - http://securityreason.com/securityalert/4147 +CVE-2008-3640 - http://www.cups.org/str.php?L2919 +CVE-2008-3641 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9666 +CVE-2008-3648 - http://packetstormsecurity.org/0808-advisories/Nslookup-Crash.txt +CVE-2008-3649 - http://securityreason.com/securityalert/4149 +CVE-2008-3649 - https://www.exploit-db.com/exploits/6167 +CVE-2008-3656 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9682 +CVE-2008-3657 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9793 +CVE-2008-3658 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9724 +CVE-2008-3660 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9597 +CVE-2008-3663 - http://securityreason.com/securityalert/4304 +CVE-2008-3664 - http://securityreason.com/securityalert/4229 +CVE-2008-3669 - http://securityreason.com/securityalert/4151 +CVE-2008-3669 - https://www.exploit-db.com/exploits/6165 +CVE-2008-3670 - http://securityreason.com/securityalert/4149 +CVE-2008-3670 - https://www.exploit-db.com/exploits/6167 +CVE-2008-3673 - http://securityreason.com/securityalert/4153 +CVE-2008-3673 - https://www.exploit-db.com/exploits/6169 +CVE-2008-3674 - http://securityreason.com/securityalert/4152 +CVE-2008-3674 - https://www.exploit-db.com/exploits/6170 +CVE-2008-3675 - http://securityreason.com/securityalert/4154 +CVE-2008-3675 - https://www.exploit-db.com/exploits/6235 +CVE-2008-3676 - http://securityreason.com/securityalert/4155 +CVE-2008-3679 - http://www.securityfocus.com/bid/30665 +CVE-2008-3679 - http://www.securityfocus.com/bid/30665/exploit +CVE-2008-3680 - http://aluigi.altervista.org/adv/ventrilobotomy-adv.txt +CVE-2008-3680 - http://aluigi.org/poc/ventrilobotomy.zip +CVE-2008-3680 - http://securityreason.com/securityalert/4156 +CVE-2008-3680 - https://www.exploit-db.com/exploits/6237 +CVE-2008-3681 - http://securityreason.com/securityalert/4157 +CVE-2008-3681 - https://www.exploit-db.com/exploits/6234 +CVE-2008-3691 - http://securityreason.com/securityalert/4202 +CVE-2008-3691 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3691 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3691 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3691 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3691 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3691 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3691 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3692 - http://securityreason.com/securityalert/4202 +CVE-2008-3692 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3692 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3692 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3692 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3692 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3692 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3692 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3693 - http://securityreason.com/securityalert/4202 +CVE-2008-3693 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3693 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3693 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3693 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3693 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3693 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3693 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3694 - http://securityreason.com/securityalert/4202 +CVE-2008-3694 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3694 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3694 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3694 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3694 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3694 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3694 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3695 - http://securityreason.com/securityalert/4202 +CVE-2008-3695 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3695 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3695 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3695 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3695 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3695 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3695 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3696 - http://securityreason.com/securityalert/4202 +CVE-2008-3696 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3696 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3696 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3696 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3696 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3696 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3696 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3697 - http://securityreason.com/securityalert/4202 +CVE-2008-3697 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3697 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3698 - http://securityreason.com/securityalert/4202 +CVE-2008-3698 - http://www.vmware.com/security/advisories/VMSA-2008-0014.html +CVE-2008-3698 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3698 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3698 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3698 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3698 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3698 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3702 - http://securityreason.com/securityalert/4159 +CVE-2008-3702 - https://www.exploit-db.com/exploits/6216 +CVE-2008-3703 - http://securityreason.com/securityalert/4161 +CVE-2008-3704 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 +CVE-2008-3704 - https://www.exploit-db.com/exploits/6244 +CVE-2008-3704 - https://www.exploit-db.com/exploits/6317 +CVE-2008-3706 - http://securityreason.com/securityalert/4162 +CVE-2008-3706 - https://www.exploit-db.com/exploits/6249 +CVE-2008-3707 - http://packetstormsecurity.org/0808-exploits/cyboards-rfilfixss.txt +CVE-2008-3708 - http://securityreason.com/securityalert/4163 +CVE-2008-3708 - https://www.exploit-db.com/exploits/6247 +CVE-2008-3709 - http://packetstormsecurity.org/0808-exploits/cyboards-rfilfixss.txt +CVE-2008-3710 - http://packetstormsecurity.org/0808-exploits/cyboards-rfilfixss.txt +CVE-2008-3711 - http://securityreason.com/securityalert/4167 +CVE-2008-3711 - https://www.exploit-db.com/exploits/6255 +CVE-2008-3712 - http://securityreason.com/securityalert/4164 +CVE-2008-3713 - http://securityreason.com/securityalert/4165 +CVE-2008-3713 - https://www.exploit-db.com/exploits/6258 +CVE-2008-3714 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432 +CVE-2008-3714 - http://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764 +CVE-2008-3715 - http://securityreason.com/securityalert/4166 +CVE-2008-3718 - http://securityreason.com/securityalert/4168 +CVE-2008-3718 - https://www.exploit-db.com/exploits/6260 +CVE-2008-3719 - https://www.exploit-db.com/exploits/6270 +CVE-2008-3720 - http://securityreason.com/securityalert/4169 +CVE-2008-3720 - https://www.exploit-db.com/exploits/6250 +CVE-2008-3721 - http://securityreason.com/securityalert/4169 +CVE-2008-3721 - https://www.exploit-db.com/exploits/6250 +CVE-2008-3723 - http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.html +CVE-2008-3723 - http://packetstormsecurity.org/0808-exploits/phpizabi-traverse.txt +CVE-2008-3724 - http://www.osvdb.org/47554 +CVE-2008-3725 - https://www.exploit-db.com/exploits/6271 +CVE-2008-3726 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 +CVE-2008-3726 - http://securityreason.com/securityalert/4172 +CVE-2008-3726 - http://www.oliverkarow.de/research/mailscan.txt +CVE-2008-3727 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 +CVE-2008-3727 - http://securityreason.com/securityalert/4172 +CVE-2008-3727 - http://www.oliverkarow.de/research/mailscan.txt +CVE-2008-3727 - https://www.exploit-db.com/exploits/6407 +CVE-2008-3728 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 +CVE-2008-3728 - http://securityreason.com/securityalert/4172 +CVE-2008-3728 - http://www.oliverkarow.de/research/mailscan.txt +CVE-2008-3729 - http://marc.info/?l=bugtraq&m=121881329424635&w=2 +CVE-2008-3729 - http://securityreason.com/securityalert/4172 +CVE-2008-3729 - http://www.oliverkarow.de/research/mailscan.txt +CVE-2008-3732 - http://securityreason.com/securityalert/4170 +CVE-2008-3732 - https://www.exploit-db.com/exploits/6252 +CVE-2008-3733 - http://securityreason.com/securityalert/4171 +CVE-2008-3733 - https://www.exploit-db.com/exploits/6253 +CVE-2008-3734 - http://securityreason.com/securityalert/4173 +CVE-2008-3734 - https://www.exploit-db.com/exploits/6257 +CVE-2008-3735 - http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.html +CVE-2008-3735 - http://packetstormsecurity.org/0808-exploits/phpizabi-traverse.txt +CVE-2008-3748 - http://securityreason.com/securityalert/4174 +CVE-2008-3748 - https://www.exploit-db.com/exploits/6277 +CVE-2008-3749 - http://securityreason.com/securityalert/4175 +CVE-2008-3749 - https://www.exploit-db.com/exploits/6276 +CVE-2008-3749 - https://www.exploit-db.com/exploits/6936 +CVE-2008-3750 - http://packetstormsecurity.org/0808-exploits/urlrotator-sql.txt +CVE-2008-3750 - https://www.exploit-db.com/exploits/6949 +CVE-2008-3751 - http://packetstormsecurity.org/0808-exploits/shorturl-sql.txt +CVE-2008-3751 - https://www.exploit-db.com/exploits/6940 +CVE-2008-3752 - http://www.packetstormsecurity.org/0808-exploits/adexchange-sql.txt +CVE-2008-3753 - http://www.packetstormsecurity.org/0808-exploits/prograte-sql.txt +CVE-2008-3754 - http://www.packetstormsecurity.org/0808-exploits/stylishtextads-sql.txt +CVE-2008-3755 - http://packetstormsecurity.org/0808-exploits/classifieds-sql.txt +CVE-2008-3755 - https://www.exploit-db.com/exploits/6945 +CVE-2008-3756 - http://packetstormsecurity.org/0808-exploits/viral-sql.txt +CVE-2008-3756 - https://www.exploit-db.com/exploits/6941 +CVE-2008-3757 - http://www.packetstormsecurity.org/0808-exploits/forcedmatrix-sql.txt +CVE-2008-3757 - https://www.exploit-db.com/exploits/6939 +CVE-2008-3758 - http://securityreason.com/securityalert/4176 +CVE-2008-3761 - http://securityreason.com/securityalert/4177 +CVE-2008-3761 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2008-3761 - https://www.exploit-db.com/exploits/6262 +CVE-2008-3762 - http://securityreason.com/securityalert/4178 +CVE-2008-3762 - https://www.exploit-db.com/exploits/6261 +CVE-2008-3763 - http://securityreason.com/securityalert/4178 +CVE-2008-3763 - https://www.exploit-db.com/exploits/6261 +CVE-2008-3764 - http://securityreason.com/securityalert/4178 +CVE-2008-3764 - https://www.exploit-db.com/exploits/6261 +CVE-2008-3765 - http://packetstormsecurity.org/0808-exploits/quickpoll-sql.txt +CVE-2008-3765 - https://www.exploit-db.com/exploits/7105 +CVE-2008-3767 - http://securityreason.com/securityalert/4179 +CVE-2008-3767 - https://www.exploit-db.com/exploits/6280 +CVE-2008-3768 - http://securityreason.com/securityalert/4180 +CVE-2008-3768 - https://www.exploit-db.com/exploits/6273 +CVE-2008-3769 - http://securityreason.com/securityalert/4181 +CVE-2008-3770 - http://securityreason.com/securityalert/4181 +CVE-2008-3771 - https://www.exploit-db.com/exploits/6279 +CVE-2008-3772 - https://www.exploit-db.com/exploits/6279 +CVE-2008-3773 - http://marc.info/?l=bugtraq&m=121933258013788&w=2 +CVE-2008-3773 - http://securityreason.com/securityalert/4182 +CVE-2008-3773 - http://www.coresecurity.com/content/vbulletin-cross-site-scripting-vulnerability +CVE-2008-3774 - http://packetstormsecurity.org/0808-exploits/simasycms-sql.txt +CVE-2008-3775 - http://securityreason.com/securityalert/4183 +CVE-2008-3779 - http://securityreason.com/securityalert/4184 +CVE-2008-3779 - https://www.exploit-db.com/exploits/6294 +CVE-2008-3780 - http://securityreason.com/securityalert/4184 +CVE-2008-3780 - https://www.exploit-db.com/exploits/6294 +CVE-2008-3783 - http://securityreason.com/securityalert/4185 +CVE-2008-3783 - https://www.exploit-db.com/exploits/6297 +CVE-2008-3784 - http://securityreason.com/securityalert/4186 +CVE-2008-3784 - https://www.exploit-db.com/exploits/6296 +CVE-2008-3785 - http://securityreason.com/securityalert/4189 +CVE-2008-3785 - https://www.exploit-db.com/exploits/6295 +CVE-2008-3787 - http://securityreason.com/securityalert/4187 +CVE-2008-3787 - https://www.exploit-db.com/exploits/6298 +CVE-2008-3788 - http://packetstormsecurity.org/0808-exploits/photocart-sql.txt +CVE-2008-3788 - http://securityreason.com/securityalert/4188 +CVE-2008-3788 - https://www.exploit-db.com/exploits/6285 +CVE-2008-3792 - http://securityreason.com/securityalert/4210 +CVE-2008-3794 - http://securityreason.com/securityalert/4190 +CVE-2008-3794 - https://www.exploit-db.com/exploits/6293 +CVE-2008-3795 - http://securityreason.com/securityalert/4173 +CVE-2008-3795 - https://www.exploit-db.com/exploits/6257 +CVE-2008-3821 - http://securityreason.com/securityalert/4916 +CVE-2008-3823 - http://securityreason.com/securityalert/4245 +CVE-2008-3824 - http://securityreason.com/securityalert/4245 +CVE-2008-3825 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2008-3827 - http://securityreason.com/securityalert/4326 +CVE-2008-3827 - http://www.ocert.org/advisories/ocert-2008-013.html +CVE-2008-3833 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980 +CVE-2008-3834 - https://www.exploit-db.com/exploits/7822 +CVE-2008-3835 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9643 +CVE-2008-3837 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-3837 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9950 +CVE-2008-3840 - http://securityreason.com/securityalert/4192 +CVE-2008-3841 - http://securityreason.com/securityalert/4181 +CVE-2008-3842 - http://securityreason.com/securityalert/4193 +CVE-2008-3843 - http://securityreason.com/securityalert/4193 +CVE-2008-3845 - http://securityreason.com/securityalert/4192 +CVE-2008-3845 - https://www.exploit-db.com/exploits/6307 +CVE-2008-3848 - https://www.exploit-db.com/exploits/6309 +CVE-2008-3851 - http://securityreason.com/securityalert/4195 +CVE-2008-3851 - https://www.exploit-db.com/exploits/6300 +CVE-2008-3859 - http://securityreason.com/securityalert/4196 +CVE-2008-3859 - https://www.exploit-db.com/exploits/6314 +CVE-2008-3861 - http://securityreason.com/securityalert/4198 +CVE-2008-3861 - https://www.exploit-db.com/exploits/6320 +CVE-2008-3862 - http://securityreason.com/securityalert/4489 +CVE-2008-3863 - http://securityreason.com/securityalert/4488 +CVE-2008-3863 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9939 +CVE-2008-3864 - http://securityreason.com/securityalert/4937 +CVE-2008-3865 - http://securityreason.com/securityalert/4937 +CVE-2008-3867 - http://securityreason.com/securityalert/4537 +CVE-2008-3868 - http://securityreason.com/securityalert/4537 +CVE-2008-3874 - http://securityreason.com/securityalert/4176 +CVE-2008-3877 - http://securityreason.com/securityalert/4199 +CVE-2008-3877 - https://www.exploit-db.com/exploits/6322 +CVE-2008-3877 - https://www.exploit-db.com/exploits/7577 +CVE-2008-3878 - http://securityreason.com/securityalert/4200 +CVE-2008-3878 - https://www.exploit-db.com/exploits/6318 +CVE-2008-3879 - http://securityreason.com/securityalert/4201 +CVE-2008-3879 - https://www.exploit-db.com/exploits/6319 +CVE-2008-3883 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-3889 - http://securityreason.com/securityalert/4239 +CVE-2008-3889 - https://www.exploit-db.com/exploits/6472 +CVE-2008-3892 - http://securityreason.com/securityalert/4202 +CVE-2008-3892 - http://www.vmware.com/support/ace/doc/releasenotes_ace.html +CVE-2008-3892 - http://www.vmware.com/support/player/doc/releasenotes_player.html +CVE-2008-3892 - http://www.vmware.com/support/player2/doc/releasenotes_player2.html +CVE-2008-3892 - http://www.vmware.com/support/server/doc/releasenotes_server.html +CVE-2008-3892 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html +CVE-2008-3892 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2008-3892 - https://www.exploit-db.com/exploits/6345 +CVE-2008-3894 - http://securityreason.com/securityalert/4207 +CVE-2008-3895 - http://securityreason.com/securityalert/4211 +CVE-2008-3896 - http://securityreason.com/securityalert/4204 +CVE-2008-3896 - http://securityreason.com/securityalert/4206 +CVE-2008-3897 - http://securityreason.com/securityalert/4212 +CVE-2008-3898 - http://securityreason.com/securityalert/4213 +CVE-2008-3899 - http://securityreason.com/securityalert/4203 +CVE-2008-3900 - http://securityreason.com/securityalert/4205 +CVE-2008-3902 - http://securityreason.com/securityalert/4214 +CVE-2008-3905 - http://www.openwall.com/lists/oss-security/2008/09/03/3 +CVE-2008-3908 - http://securityreason.com/securityalert/4217 +CVE-2008-3909 - http://www.djangoproject.com/weblog/2008/sep/02/security/ +CVE-2008-3909 - https://bugzilla.redhat.com/show_bug.cgi?id=460966 +CVE-2008-3917 - http://securityreason.com/securityalert/4219 +CVE-2008-3921 - http://securityreason.com/securityalert/4218 +CVE-2008-3922 - http://securityreason.com/securityalert/4218 +CVE-2008-3922 - https://www.exploit-db.com/exploits/6368 +CVE-2008-3923 - http://securityreason.com/securityalert/4220 +CVE-2008-3923 - https://www.exploit-db.com/exploits/6313 +CVE-2008-3924 - http://securityreason.com/securityalert/4220 +CVE-2008-3924 - https://www.exploit-db.com/exploits/6313 +CVE-2008-3925 - http://securityreason.com/securityalert/4220 +CVE-2008-3925 - https://www.exploit-db.com/exploits/6313 +CVE-2008-3926 - http://securityreason.com/securityalert/4220 +CVE-2008-3926 - https://www.exploit-db.com/exploits/6313 +CVE-2008-3927 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-3928 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-3929 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-3930 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-3931 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-3933 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9620 +CVE-2008-3934 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9920 +CVE-2008-3936 - http://securityreason.com/securityalert/4221 +CVE-2008-3936 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3807 +CVE-2008-3941 - http://securityreason.com/securityalert/4222 +CVE-2008-3942 - http://packetstormsecurity.org/0808-exploits/phpemlak-sql.txt +CVE-2008-3943 - http://securityreason.com/securityalert/4223 +CVE-2008-3943 - https://www.exploit-db.com/exploits/6361 +CVE-2008-3944 - http://securityreason.com/securityalert/4224 +CVE-2008-3944 - https://www.exploit-db.com/exploits/6362 +CVE-2008-3945 - http://securityreason.com/securityalert/4225 +CVE-2008-3945 - https://www.exploit-db.com/exploits/6336 +CVE-2008-3948 - http://securityreason.com/securityalert/4229 +CVE-2008-3950 - http://securityreason.com/securityalert/4264 +CVE-2008-3950 - http://www.coresecurity.com/content/iphone-safari-javascript-alert-denial-of-service +CVE-2008-3951 - http://securityreason.com/securityalert/4230 +CVE-2008-3951 - https://www.exploit-db.com/exploits/6371 +CVE-2008-3952 - http://securityreason.com/securityalert/4231 +CVE-2008-3952 - https://www.exploit-db.com/exploits/6383 +CVE-2008-3953 - http://securityreason.com/securityalert/4232 +CVE-2008-3953 - https://www.exploit-db.com/exploits/6385 +CVE-2008-3954 - http://securityreason.com/securityalert/4233 +CVE-2008-3954 - https://www.exploit-db.com/exploits/6396 +CVE-2008-3955 - http://securityreason.com/securityalert/4234 +CVE-2008-3955 - https://www.exploit-db.com/exploits/6395 +CVE-2008-3968 - http://punbb.informer.com/forums/topic/19682/punbb-1220-and-13rc-hotfix-released/ +CVE-2008-3979 - https://www.exploit-db.com/exploits/8074 +CVE-2008-4019 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-057 +CVE-2008-4020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-056 +CVE-2008-4023 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-060 +CVE-2008-4024 - http://www.coresecurity.com/content/word-arbitrary-free +CVE-2008-4024 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4025 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4026 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4029 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 +CVE-2008-4030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-077 +CVE-2008-4033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 +CVE-2008-4036 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-064 +CVE-2008-4037 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-068 +CVE-2008-4037 - https://www.exploit-db.com/exploits/7125 +CVE-2008-4038 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-063 +CVE-2008-4039 - http://securityreason.com/securityalert/4237 +CVE-2008-4039 - https://www.exploit-db.com/exploits/6354 +CVE-2008-4041 - http://securityreason.com/securityalert/4238 +CVE-2008-4043 - http://securityreason.com/securityalert/4240 +CVE-2008-4043 - https://www.exploit-db.com/exploits/6350 +CVE-2008-4044 - http://securityreason.com/securityalert/4241 +CVE-2008-4044 - https://www.exploit-db.com/exploits/6351 +CVE-2008-4048 - http://securityreason.com/securityalert/4242 +CVE-2008-4048 - https://www.exploit-db.com/exploits/6323 +CVE-2008-4049 - http://securityreason.com/securityalert/4243 +CVE-2008-4049 - https://www.exploit-db.com/exploits/6324 +CVE-2008-4050 - http://securityreason.com/securityalert/4244 +CVE-2008-4050 - https://www.exploit-db.com/exploits/6334 +CVE-2008-4054 - http://securityreason.com/securityalert/4235 +CVE-2008-4054 - https://www.exploit-db.com/exploits/6310 +CVE-2008-4058 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4058 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9679 +CVE-2008-4059 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9529 +CVE-2008-4060 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4061 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4062 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4063 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4064 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4064 - https://bugzilla.mozilla.org/show_bug.cgi?id=441995 +CVE-2008-4065 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4067 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4068 - http://www.redhat.com/support/errata/RHSA-2008-0879.html +CVE-2008-4071 - http://securityreason.com/securityalert/4257 +CVE-2008-4071 - https://www.exploit-db.com/exploits/6424 +CVE-2008-4072 - http://securityreason.com/securityalert/4246 +CVE-2008-4072 - https://www.exploit-db.com/exploits/6431 +CVE-2008-4073 - http://securityreason.com/securityalert/4248 +CVE-2008-4073 - https://www.exploit-db.com/exploits/6426 +CVE-2008-4074 - http://securityreason.com/securityalert/4247 +CVE-2008-4074 - https://www.exploit-db.com/exploits/6433 +CVE-2008-4075 - http://securityreason.com/securityalert/4249 +CVE-2008-4075 - https://www.exploit-db.com/exploits/6430 +CVE-2008-4077 - http://securityreason.com/securityalert/4250 +CVE-2008-4078 - http://securityreason.com/securityalert/4250 +CVE-2008-4080 - http://securityreason.com/securityalert/4252 +CVE-2008-4080 - https://www.exploit-db.com/exploits/6402 +CVE-2008-4080 - https://www.youtube.com/watch?v=mm4bfsZdLmA&t=1h53m +CVE-2008-4081 - http://securityreason.com/securityalert/4258 +CVE-2008-4081 - https://www.exploit-db.com/exploits/6406 +CVE-2008-4082 - http://securityreason.com/securityalert/4251 +CVE-2008-4082 - https://www.exploit-db.com/exploits/6332 +CVE-2008-4083 - http://securityreason.com/securityalert/4251 +CVE-2008-4083 - https://www.exploit-db.com/exploits/6332 +CVE-2008-4084 - http://securityreason.com/securityalert/4254 +CVE-2008-4084 - https://www.exploit-db.com/exploits/6342 +CVE-2008-4085 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4086 - http://securityreason.com/securityalert/4253 +CVE-2008-4086 - https://www.exploit-db.com/exploits/6349 +CVE-2008-4087 - http://securityreason.com/securityalert/4259 +CVE-2008-4087 - https://www.exploit-db.com/exploits/6333 +CVE-2008-4088 - http://securityreason.com/securityalert/4255 +CVE-2008-4088 - https://www.exploit-db.com/exploits/6338 +CVE-2008-4089 - https://www.exploit-db.com/exploits/6338 +CVE-2008-4090 - http://securityreason.com/securityalert/4260 +CVE-2008-4090 - https://www.exploit-db.com/exploits/6348 +CVE-2008-4091 - https://www.exploit-db.com/exploits/6335 +CVE-2008-4092 - http://securityreason.com/securityalert/4261 +CVE-2008-4092 - https://www.exploit-db.com/exploits/6347 +CVE-2008-4093 - http://securityreason.com/securityalert/4256 +CVE-2008-4093 - https://www.exploit-db.com/exploits/6321 +CVE-2008-4096 - http://fd.the-wildcat.de/pma_e36a091q11.php +CVE-2008-4098 - http://bugs.mysql.com/bug.php?id=32167 +CVE-2008-4100 - https://www.exploit-db.com/exploits/6197 +CVE-2008-4101 - http://www.openwall.com/lists/oss-security/2008/09/11/3 +CVE-2008-4102 - http://securityreason.com/securityalert/4271 +CVE-2008-4103 - http://securityreason.com/securityalert/4275 +CVE-2008-4104 - http://securityreason.com/securityalert/4275 +CVE-2008-4105 - http://securityreason.com/securityalert/4275 +CVE-2008-4106 - http://securityreason.com/securityalert/4272 +CVE-2008-4106 - https://www.exploit-db.com/exploits/6397 +CVE-2008-4106 - https://www.exploit-db.com/exploits/6421 +CVE-2008-4107 - http://securityreason.com/securityalert/4271 +CVE-2008-4108 - http://securityreason.com/securityalert/4274 +CVE-2008-4109 - http://www.ubuntu.com/usn/usn-649-1 +CVE-2008-4110 - http://securityreason.com/securityalert/4262 +CVE-2008-4113 - http://securityreason.com/securityalert/4266 +CVE-2008-4113 - https://www.exploit-db.com/exploits/7618 +CVE-2008-4114 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 +CVE-2008-4114 - https://www.exploit-db.com/exploits/6463 +CVE-2008-4115 - http://securityreason.com/securityalert/4267 +CVE-2008-4115 - https://www.exploit-db.com/exploits/6451 +CVE-2008-4116 - http://securityreason.com/securityalert/4270 +CVE-2008-4116 - https://www.exploit-db.com/exploits/6471 +CVE-2008-4119 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/09/25.aspx +CVE-2008-4119 - http://securityreason.com/securityalert/4318 +CVE-2008-4120 - http://securityreason.com/securityalert/4324 +CVE-2008-4121 - http://securityreason.com/securityalert/4448 +CVE-2008-4122 - http://securityreason.com/securityalert/4794 +CVE-2008-4127 - http://securityreason.com/securityalert/4273 +CVE-2008-4128 - https://www.exploit-db.com/exploits/6476 +CVE-2008-4128 - https://www.exploit-db.com/exploits/6477 +CVE-2008-4133 - http://securityreason.com/securityalert/4276 +CVE-2008-4134 - http://securityreason.com/securityalert/4277 +CVE-2008-4134 - https://www.exploit-db.com/exploits/6473 +CVE-2008-4135 - http://securityreason.com/securityalert/4278 +CVE-2008-4135 - https://www.exploit-db.com/exploits/6459 +CVE-2008-4136 - https://www.exploit-db.com/exploits/6458 +CVE-2008-4137 - https://www.exploit-db.com/exploits/6475 +CVE-2008-4138 - https://www.exploit-db.com/exploits/6478 +CVE-2008-4141 - http://packetstormsecurity.org/0809-exploits/x10media-rfi.txt +CVE-2008-4141 - http://securityreason.com/securityalert/4294 +CVE-2008-4141 - https://www.exploit-db.com/exploits/6480 +CVE-2008-4142 - https://www.exploit-db.com/exploits/6483 +CVE-2008-4144 - https://www.exploit-db.com/exploits/6364 +CVE-2008-4145 - https://www.exploit-db.com/exploits/6485 +CVE-2008-4146 - http://securityreason.com/securityalert/4295 +CVE-2008-4146 - https://www.exploit-db.com/exploits/6482 +CVE-2008-4150 - http://securityreason.com/securityalert/4296 +CVE-2008-4150 - https://www.exploit-db.com/exploits/6488 +CVE-2008-4151 - http://securityreason.com/securityalert/4297 +CVE-2008-4151 - https://www.exploit-db.com/exploits/6487 +CVE-2008-4154 - http://securityreason.com/securityalert/4279 +CVE-2008-4154 - https://www.exploit-db.com/exploits/6281 +CVE-2008-4155 - http://securityreason.com/securityalert/4280 +CVE-2008-4155 - https://www.exploit-db.com/exploits/6288 +CVE-2008-4156 - http://securityreason.com/securityalert/4281 +CVE-2008-4156 - https://www.exploit-db.com/exploits/6284 +CVE-2008-4157 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html +CVE-2008-4157 - http://packetstormsecurity.com/files/130754/Vastal-I-tech-phpVID-1.2.3-SQL-Injection.html +CVE-2008-4157 - http://seclists.org/fulldisclosure/2015/Mar/58 +CVE-2008-4157 - http://securityreason.com/securityalert/4291 +CVE-2008-4157 - https://www.exploit-db.com/exploits/6422 +CVE-2008-4158 - http://securityreason.com/securityalert/4290 +CVE-2008-4158 - https://www.exploit-db.com/exploits/6413 +CVE-2008-4159 - http://securityreason.com/securityalert/4283 +CVE-2008-4159 - https://www.exploit-db.com/exploits/6423 +CVE-2008-4161 - http://securityreason.com/securityalert/4287 +CVE-2008-4161 - https://www.exploit-db.com/exploits/6490 +CVE-2008-4162 - http://securityreason.com/securityalert/4289 +CVE-2008-4164 - http://securityreason.com/securityalert/4288 +CVE-2008-4164 - https://www.exploit-db.com/exploits/6393 +CVE-2008-4166 - http://securityreason.com/securityalert/4284 +CVE-2008-4167 - http://securityreason.com/securityalert/4282 +CVE-2008-4167 - https://www.exploit-db.com/exploits/6437 +CVE-2008-4168 - http://securityreason.com/securityalert/4285 +CVE-2008-4168 - http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3809 +CVE-2008-4169 - http://securityreason.com/securityalert/4286 +CVE-2008-4169 - https://www.exploit-db.com/exploits/6467 +CVE-2008-4170 - http://securityreason.com/securityalert/4293 +CVE-2008-4172 - http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt +CVE-2008-4173 - http://securityreason.com/securityalert/4292 +CVE-2008-4173 - https://www.exploit-db.com/exploits/6486 +CVE-2008-4174 - http://packetstormsecurity.org/0809-exploits/dynamicmp3-xss.txt +CVE-2008-4175 - http://securityreason.com/securityalert/4299 +CVE-2008-4175 - https://www.exploit-db.com/exploits/6466 +CVE-2008-4176 - http://securityreason.com/securityalert/4309 +CVE-2008-4176 - https://www.exploit-db.com/exploits/6453 +CVE-2008-4177 - http://securityreason.com/securityalert/4310 +CVE-2008-4177 - https://www.exploit-db.com/exploits/6465 +CVE-2008-4178 - http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt +CVE-2008-4178 - https://www.exploit-db.com/exploits/6946 +CVE-2008-4178 - https://www.exploit-db.com/exploits/6947 +CVE-2008-4178 - https://www.exploit-db.com/exploits/6950 +CVE-2008-4178 - https://www.exploit-db.com/exploits/6951 +CVE-2008-4179 - http://securityreason.com/securityalert/4289 +CVE-2008-4180 - http://securityreason.com/securityalert/4289 +CVE-2008-4181 - http://securityreason.com/securityalert/4301 +CVE-2008-4181 - https://www.exploit-db.com/exploits/6461 +CVE-2008-4182 - http://packetstormsecurity.org/0809-exploits/turba-xss.txt +CVE-2008-4183 - http://securityreason.com/securityalert/4300 +CVE-2008-4183 - https://www.exploit-db.com/exploits/6390 +CVE-2008-4185 - http://securityreason.com/securityalert/4314 +CVE-2008-4185 - https://www.exploit-db.com/exploits/6370 +CVE-2008-4187 - http://securityreason.com/securityalert/4315 +CVE-2008-4187 - https://www.exploit-db.com/exploits/6489 +CVE-2008-4190 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4190 - https://www.exploit-db.com/exploits/9135 +CVE-2008-4191 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4192 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4193 - http://securityreason.com/securityalert/4302 +CVE-2008-4193 - https://www.exploit-db.com/exploits/5718 +CVE-2008-4193 - https://www.exploit-db.com/exploits/5827 +CVE-2008-4201 - http://bugs.gentoo.org/show_bug.cgi?id=238445 +CVE-2008-4202 - http://securityreason.com/securityalert/4305 +CVE-2008-4202 - https://www.exploit-db.com/exploits/6469 +CVE-2008-4203 - http://securityreason.com/securityalert/4306 +CVE-2008-4203 - https://www.exploit-db.com/exploits/6462 +CVE-2008-4204 - http://securityreason.com/securityalert/4308 +CVE-2008-4204 - https://www.exploit-db.com/exploits/6470 +CVE-2008-4205 - http://e-rdc.org/v1/news.php?readmore=108 +CVE-2008-4205 - http://securityreason.com/securityalert/4307 +CVE-2008-4205 - https://www.exploit-db.com/exploits/6468 +CVE-2008-4206 - http://e-rdc.org/v1/news.php?readmore=108 +CVE-2008-4206 - http://securityreason.com/securityalert/4307 +CVE-2008-4206 - https://www.exploit-db.com/exploits/6468 +CVE-2008-4207 - http://e-rdc.org/v1/news.php?readmore=108 +CVE-2008-4207 - http://securityreason.com/securityalert/4307 +CVE-2008-4207 - https://www.exploit-db.com/exploits/6468 +CVE-2008-4210 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511 +CVE-2008-4226 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9888 +CVE-2008-4241 - http://securityreason.com/securityalert/4316 +CVE-2008-4241 - https://www.exploit-db.com/exploits/6536 +CVE-2008-4242 - http://securityreason.com/securityalert/4313 +CVE-2008-4243 - http://aluigi.org/adv/ut3webown-adv.txt +CVE-2008-4243 - http://securityreason.com/securityalert/4317 +CVE-2008-4243 - https://www.exploit-db.com/exploits/6506 +CVE-2008-4244 - http://securityreason.com/securityalert/4312 +CVE-2008-4244 - https://www.exploit-db.com/exploits/6521 +CVE-2008-4245 - http://securityreason.com/securityalert/4311 +CVE-2008-4245 - https://www.exploit-db.com/exploits/6513 +CVE-2008-4247 - http://securityreason.com/securityalert/4313 +CVE-2008-4247 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2008-4250 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 +CVE-2008-4250 - https://www.exploit-db.com/exploits/6824 +CVE-2008-4250 - https://www.exploit-db.com/exploits/6841 +CVE-2008-4250 - https://www.exploit-db.com/exploits/7104 +CVE-2008-4250 - https://www.exploit-db.com/exploits/7132 +CVE-2008-4252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 +CVE-2008-4253 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 +CVE-2008-4254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 +CVE-2008-4255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 +CVE-2008-4256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070 +CVE-2008-4258 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 +CVE-2008-4259 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 +CVE-2008-4260 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 +CVE-2008-4261 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073 +CVE-2008-4264 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 +CVE-2008-4265 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 +CVE-2008-4266 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-074 +CVE-2008-4268 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075 +CVE-2008-4269 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-075 +CVE-2008-4278 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-4279 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html +CVE-2008-4295 - https://www.exploit-db.com/exploits/6582 +CVE-2008-4296 - http://securityreason.com/securityalert/4319 +CVE-2008-4299 - http://securityreason.com/securityalert/4323 +CVE-2008-4300 - http://securityreason.com/securityalert/4325 +CVE-2008-4307 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-4307 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233 +CVE-2008-4309 - http://www.ubuntu.com/usn/usn-685-1 +CVE-2008-4309 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860 +CVE-2008-4310 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10250 +CVE-2008-4313 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9556 +CVE-2008-4314 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684 +CVE-2008-4315 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9431 +CVE-2008-4318 - http://securityreason.com/securityalert/4322 +CVE-2008-4318 - https://www.exploit-db.com/exploits/6559 +CVE-2008-4319 - https://www.exploit-db.com/exploits/6567 +CVE-2008-4321 - http://securityreason.com/securityalert/4327 +CVE-2008-4321 - https://www.exploit-db.com/exploits/6240 +CVE-2008-4321 - https://www.exploit-db.com/exploits/6248 +CVE-2008-4321 - https://www.exploit-db.com/exploits/6256 +CVE-2008-4323 - https://www.exploit-db.com/exploits/6616 +CVE-2008-4324 - http://securityreason.com/securityalert/4321 +CVE-2008-4324 - http://www.secniche.org/moz303/index.html +CVE-2008-4324 - https://www.exploit-db.com/exploits/6614 +CVE-2008-4327 - https://www.exploit-db.com/exploits/6588 +CVE-2008-4328 - http://securityreason.com/securityalert/4337 +CVE-2008-4329 - https://www.exploit-db.com/exploits/6571 +CVE-2008-4330 - https://www.exploit-db.com/exploits/6562 +CVE-2008-4331 - https://www.exploit-db.com/exploits/6563 +CVE-2008-4332 - https://www.exploit-db.com/exploits/6566 +CVE-2008-4333 - https://www.exploit-db.com/exploits/6566 +CVE-2008-4334 - https://www.exploit-db.com/exploits/6568 +CVE-2008-4335 - https://www.exploit-db.com/exploits/6572 +CVE-2008-4335 - https://www.exploit-db.com/exploits/6574 +CVE-2008-4336 - https://www.exploit-db.com/exploits/6572 +CVE-2008-4338 - http://securityreason.com/securityalert/4338 +CVE-2008-4340 - http://secniche.org/gcrds.html +CVE-2008-4340 - http://securityreason.com/securityalert/4339 +CVE-2008-4340 - https://www.exploit-db.com/exploits/6554 +CVE-2008-4341 - https://www.exploit-db.com/exploits/6531 +CVE-2008-4342 - https://www.exploit-db.com/exploits/6491 +CVE-2008-4343 - https://www.exploit-db.com/exploits/6537 +CVE-2008-4344 - http://packetstormsecurity.org/0809-exploits/6rbscriptcat-sql.txt +CVE-2008-4345 - https://www.exploit-db.com/exploits/6443 +CVE-2008-4346 - http://securityreason.com/securityalert/4267 +CVE-2008-4346 - https://www.exploit-db.com/exploits/6451 +CVE-2008-4347 - https://www.exploit-db.com/exploits/6447 +CVE-2008-4348 - http://packetstormsecurity.org/0809-exploits/phpportfolio-sql.txt +CVE-2008-4350 - https://www.exploit-db.com/exploits/6446 +CVE-2008-4351 - https://www.exploit-db.com/exploits/6452 +CVE-2008-4352 - https://www.exploit-db.com/exploits/6452 +CVE-2008-4353 - https://www.exploit-db.com/exploits/6455 +CVE-2008-4354 - https://www.exploit-db.com/exploits/6444 +CVE-2008-4355 - https://www.exploit-db.com/exploits/6442 +CVE-2008-4356 - https://www.exploit-db.com/exploits/6460 +CVE-2008-4357 - https://www.exploit-db.com/exploits/6449 +CVE-2008-4361 - http://securityreason.com/securityalert/4340 +CVE-2008-4361 - https://www.exploit-db.com/exploits/6604 +CVE-2008-4362 - http://securityreason.com/securityalert/4341 +CVE-2008-4362 - https://www.exploit-db.com/exploits/6515 +CVE-2008-4363 - http://digit-labs.org/files/exploits/deslock-probe-read.c +CVE-2008-4363 - http://securityreason.com/securityalert/4342 +CVE-2008-4363 - https://www.exploit-db.com/exploits/6498 +CVE-2008-4364 - http://securityreason.com/securityalert/4343 +CVE-2008-4364 - https://www.exploit-db.com/exploits/6610 +CVE-2008-4366 - http://securityreason.com/securityalert/4344 +CVE-2008-4366 - https://www.exploit-db.com/exploits/6594 +CVE-2008-4369 - http://securityreason.com/securityalert/4330 +CVE-2008-4369 - https://www.exploit-db.com/exploits/6411 +CVE-2008-4370 - http://securityreason.com/securityalert/4330 +CVE-2008-4370 - https://www.exploit-db.com/exploits/6411 +CVE-2008-4371 - http://securityreason.com/securityalert/4331 +CVE-2008-4371 - https://www.exploit-db.com/exploits/6409 +CVE-2008-4372 - http://securityreason.com/securityalert/4331 +CVE-2008-4372 - https://www.exploit-db.com/exploits/6409 +CVE-2008-4373 - http://securityreason.com/securityalert/4332 +CVE-2008-4373 - https://www.exploit-db.com/exploits/6417 +CVE-2008-4374 - http://securityreason.com/securityalert/4333 +CVE-2008-4374 - https://www.exploit-db.com/exploits/6408 +CVE-2008-4375 - http://securityreason.com/securityalert/4334 +CVE-2008-4375 - https://www.exploit-db.com/exploits/6412 +CVE-2008-4376 - http://securityreason.com/securityalert/4328 +CVE-2008-4376 - https://www.exploit-db.com/exploits/6404 +CVE-2008-4377 - http://securityreason.com/securityalert/4335 +CVE-2008-4377 - https://www.exploit-db.com/exploits/6405 +CVE-2008-4378 - http://securityreason.com/securityalert/4336 +CVE-2008-4378 - https://www.exploit-db.com/exploits/6403 +CVE-2008-4378 - https://www.exploit-db.com/exploits/8918 +CVE-2008-4379 - http://securityreason.com/securityalert/4336 +CVE-2008-4379 - https://www.exploit-db.com/exploits/6403 +CVE-2008-4380 - http://securityreason.com/securityalert/4329 +CVE-2008-4380 - https://www.exploit-db.com/exploits/6394 +CVE-2008-4381 - http://securityreason.com/securityalert/4345 +CVE-2008-4381 - http://www.openwall.com/lists/oss-security/2008/10/03/7 +CVE-2008-4381 - http://www.openwall.com/lists/oss-security/2008/10/03/8 +CVE-2008-4383 - http://securityreason.com/securityalert/4347 +CVE-2008-4392 - http://www.your.org/dnscache/ +CVE-2008-4392 - http://www.your.org/dnscache/djbdns.pdf +CVE-2008-4396 - http://packetstormsecurity.org/0809-advisories/filealyzer-overflow.txt +CVE-2008-4397 - http://securityreason.com/securityalert/4412 +CVE-2008-4408 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_1/phase3/RELEASE-NOTES +CVE-2008-4408 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_2/phase3/RELEASE-NOTES +CVE-2008-4411 - http://securityreason.com/securityalert/4398 +CVE-2008-4413 - http://securityreason.com/securityalert/4545 +CVE-2008-4414 - http://securityreason.com/securityalert/4567 +CVE-2008-4415 - http://securityreason.com/securityalert/4601 +CVE-2008-4416 - http://securityreason.com/securityalert/4686 +CVE-2008-4418 - http://securityreason.com/securityalert/4705 +CVE-2008-4420 - http://vuln.sg/dynazip5007-en.html +CVE-2008-4420 - http://vuln.sg/turbozip6-en.html +CVE-2008-4421 - http://securityreason.com/securityalert/4360 +CVE-2008-4421 - https://www.exploit-db.com/exploits/6686 +CVE-2008-4423 - http://securityreason.com/securityalert/4350 +CVE-2008-4423 - https://www.exploit-db.com/exploits/6232 +CVE-2008-4425 - http://securityreason.com/securityalert/4348 +CVE-2008-4425 - https://www.exploit-db.com/exploits/6215 +CVE-2008-4426 - http://securityreason.com/securityalert/4348 +CVE-2008-4426 - https://www.exploit-db.com/exploits/6215 +CVE-2008-4427 - http://securityreason.com/securityalert/4349 +CVE-2008-4427 - https://www.exploit-db.com/exploits/6231 +CVE-2008-4428 - http://securityreason.com/securityalert/4349 +CVE-2008-4428 - https://www.exploit-db.com/exploits/6231 +CVE-2008-4432 - http://lostmon.blogspot.com/2008/08/rmsoft-minishop-module-multiple.html +CVE-2008-4433 - http://lostmon.blogspot.com/2008/08/rmsoft-minishop-module-multiple.html +CVE-2008-4436 - http://securityreason.com/securityalert/4351 +CVE-2008-4436 - https://www.exploit-db.com/exploits/6233 +CVE-2008-4440 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4441 - http://securityreason.com/securityalert/4400 +CVE-2008-4444 - http://securityreason.com/securityalert/4917 +CVE-2008-4447 - http://packetstormsecurity.org/0810-exploits/webshell431-xssxsrf.txt +CVE-2008-4448 - http://packetstormsecurity.org/0810-exploits/webshell431-xssxsrf.txt +CVE-2008-4449 - http://securityreason.com/securityalert/4352 +CVE-2008-4449 - https://www.exploit-db.com/exploits/6654 +CVE-2008-4449 - https://www.exploit-db.com/exploits/6666 +CVE-2008-4451 - http://securityreason.com/securityalert/4353 +CVE-2008-4451 - https://www.exploit-db.com/exploits/6647 +CVE-2008-4452 - http://securityreason.com/securityalert/4356 +CVE-2008-4452 - https://www.exploit-db.com/exploits/6651 +CVE-2008-4453 - http://securityreason.com/securityalert/4355 +CVE-2008-4453 - https://www.exploit-db.com/exploits/6638 +CVE-2008-4455 - https://www.exploit-db.com/exploits/6641 +CVE-2008-4456 - http://securityreason.com/securityalert/4357 +CVE-2008-4457 - http://securityreason.com/securityalert/4288 +CVE-2008-4457 - https://www.exploit-db.com/exploits/6393 +CVE-2008-4460 - https://www.exploit-db.com/exploits/6379 +CVE-2008-4461 - https://www.exploit-db.com/exploits/6388 +CVE-2008-4462 - https://www.exploit-db.com/exploits/6373 +CVE-2008-4463 - http://securityreason.com/securityalert/4358 +CVE-2008-4463 - https://www.exploit-db.com/exploits/6378 +CVE-2008-4464 - https://www.exploit-db.com/exploits/6380 +CVE-2008-4465 - https://www.exploit-db.com/exploits/6376 +CVE-2008-4466 - https://www.exploit-db.com/exploits/6382 +CVE-2008-4467 - https://www.exploit-db.com/exploits/6374 +CVE-2008-4468 - https://www.exploit-db.com/exploits/6375 +CVE-2008-4469 - http://securityreason.com/securityalert/4359 +CVE-2008-4469 - https://www.exploit-db.com/exploits/6381 +CVE-2008-4470 - http://securityreason.com/securityalert/4354 +CVE-2008-4470 - https://www.exploit-db.com/exploits/6389 +CVE-2008-4471 - http://securityreason.com/securityalert/4361 +CVE-2008-4471 - https://www.exploit-db.com/exploits/6630 +CVE-2008-4472 - http://securityreason.com/securityalert/4361 +CVE-2008-4472 - https://www.exploit-db.com/exploits/6630 +CVE-2008-4473 - http://securityreason.com/securityalert/4429 +CVE-2008-4474 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4475 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4476 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4477 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4478 - http://securityreason.com/securityalert/4406 +CVE-2008-4479 - http://securityreason.com/securityalert/4405 +CVE-2008-4480 - http://securityreason.com/securityalert/4404 +CVE-2008-4483 - http://securityreason.com/securityalert/4366 +CVE-2008-4483 - https://www.exploit-db.com/exploits/6645 +CVE-2008-4484 - http://securityreason.com/securityalert/4365 +CVE-2008-4484 - https://www.exploit-db.com/exploits/6586 +CVE-2008-4485 - http://marc.info/?l=bugtraq&m=122210321731789&w=2 +CVE-2008-4485 - http://marc.info/?l=bugtraq&m=122298544725313&w=2 +CVE-2008-4485 - http://securityreason.com/securityalert/4367 +CVE-2008-4486 - http://securityreason.com/securityalert/4368 +CVE-2008-4486 - https://www.exploit-db.com/exploits/6687 +CVE-2008-4490 - http://securityreason.com/securityalert/4364 +CVE-2008-4490 - https://www.exploit-db.com/exploits/6679 +CVE-2008-4491 - http://securityreason.com/securityalert/4363 +CVE-2008-4492 - http://securityreason.com/securityalert/4362 +CVE-2008-4492 - https://www.exploit-db.com/exploits/6693 +CVE-2008-4493 - http://securityreason.com/securityalert/4376 +CVE-2008-4493 - https://www.exploit-db.com/exploits/6699 +CVE-2008-4494 - http://securityreason.com/securityalert/4375 +CVE-2008-4494 - https://www.exploit-db.com/exploits/6698 +CVE-2008-4495 - http://securityreason.com/securityalert/4369 +CVE-2008-4495 - https://www.exploit-db.com/exploits/6695 +CVE-2008-4496 - http://securityreason.com/securityalert/4374 +CVE-2008-4496 - https://www.exploit-db.com/exploits/6694 +CVE-2008-4497 - http://securityreason.com/securityalert/4373 +CVE-2008-4497 - https://www.exploit-db.com/exploits/6697 +CVE-2008-4498 - http://securityreason.com/securityalert/4372 +CVE-2008-4498 - https://www.exploit-db.com/exploits/6696 +CVE-2008-4499 - http://securityreason.com/securityalert/4371 +CVE-2008-4500 - http://securityreason.com/securityalert/4377 +CVE-2008-4500 - https://www.exploit-db.com/exploits/6660 +CVE-2008-4501 - http://securityreason.com/securityalert/4378 +CVE-2008-4501 - https://www.exploit-db.com/exploits/6661 +CVE-2008-4502 - http://securityreason.com/securityalert/4370 +CVE-2008-4502 - https://www.exploit-db.com/exploits/6700 +CVE-2008-4509 - http://securityreason.com/securityalert/4379 +CVE-2008-4509 - https://www.exploit-db.com/exploits/6670 +CVE-2008-4509 - https://www.exploit-db.com/exploits/6674 +CVE-2008-4509 - https://www.exploit-db.com/exploits/6680 +CVE-2008-4510 - http://securityreason.com/securityalert/4388 +CVE-2008-4510 - https://www.exploit-db.com/exploits/6671 +CVE-2008-4511 - http://securityreason.com/securityalert/4380 +CVE-2008-4512 - http://securityreason.com/securityalert/4395 +CVE-2008-4514 - http://securityreason.com/securityalert/4394 +CVE-2008-4514 - https://www.exploit-db.com/exploits/6689 +CVE-2008-4516 - http://securityreason.com/securityalert/4381 +CVE-2008-4516 - https://www.exploit-db.com/exploits/6675 +CVE-2008-4517 - http://securityreason.com/securityalert/4382 +CVE-2008-4517 - https://www.exploit-db.com/exploits/6677 +CVE-2008-4518 - http://securityreason.com/securityalert/4383 +CVE-2008-4518 - https://www.exploit-db.com/exploits/6678 +CVE-2008-4519 - http://securityreason.com/securityalert/4383 +CVE-2008-4519 - https://www.exploit-db.com/exploits/6678 +CVE-2008-4521 - http://securityreason.com/securityalert/4384 +CVE-2008-4521 - https://www.exploit-db.com/exploits/6682 +CVE-2008-4522 - http://securityreason.com/securityalert/4386 +CVE-2008-4522 - https://www.exploit-db.com/exploits/6669 +CVE-2008-4523 - http://securityreason.com/securityalert/4389 +CVE-2008-4523 - https://www.exploit-db.com/exploits/6657 +CVE-2008-4524 - http://securityreason.com/securityalert/4392 +CVE-2008-4524 - https://www.exploit-db.com/exploits/6662 +CVE-2008-4526 - http://securityreason.com/securityalert/4387 +CVE-2008-4526 - https://www.exploit-db.com/exploits/6663 +CVE-2008-4527 - http://securityreason.com/securityalert/4385 +CVE-2008-4527 - https://www.exploit-db.com/exploits/6683 +CVE-2008-4528 - http://securityreason.com/securityalert/4390 +CVE-2008-4528 - https://www.exploit-db.com/exploits/6667 +CVE-2008-4529 - http://securityreason.com/securityalert/4391 +CVE-2008-4529 - https://www.exploit-db.com/exploits/6685 +CVE-2008-4532 - http://securityreason.com/securityalert/4393 +CVE-2008-4540 - http://securityreason.com/securityalert/4402 +CVE-2008-4546 - http://securityreason.com/securityalert/4401 +CVE-2008-4546 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2008-4547 - http://securityreason.com/securityalert/4407 +CVE-2008-4547 - https://www.exploit-db.com/exploits/4903 +CVE-2008-4548 - http://securityreason.com/securityalert/4411 +CVE-2008-4548 - https://www.exploit-db.com/exploits/4918 +CVE-2008-4549 - http://securityreason.com/securityalert/4410 +CVE-2008-4549 - https://www.exploit-db.com/exploits/4981 +CVE-2008-4553 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4555 - http://securityreason.com/securityalert/4409 +CVE-2008-4556 - http://securityreason.com/securityalert/4408 +CVE-2008-4556 - https://www.exploit-db.com/exploits/6786 +CVE-2008-4557 - http://securityreason.com/securityalert/4403 +CVE-2008-4557 - https://www.exploit-db.com/exploits/4851 +CVE-2008-4558 - http://www.coresecurity.com/content/vlc-xspf-memory-corruption +CVE-2008-4558 - http://www.exploit-db.com/exploits/6756 +CVE-2008-4569 - http://securityreason.com/securityalert/4417 +CVE-2008-4569 - https://www.exploit-db.com/exploits/6731 +CVE-2008-4570 - http://securityreason.com/securityalert/4418 +CVE-2008-4570 - https://www.exploit-db.com/exploits/6736 +CVE-2008-4572 - http://securityreason.com/securityalert/4422 +CVE-2008-4572 - https://www.exploit-db.com/exploits/6738 +CVE-2008-4573 - http://securityreason.com/securityalert/4420 +CVE-2008-4573 - https://www.exploit-db.com/exploits/6725 +CVE-2008-4574 - http://securityreason.com/securityalert/4426 +CVE-2008-4574 - https://www.exploit-db.com/exploits/6720 +CVE-2008-4576 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9822 +CVE-2008-4582 - http://securityreason.com/securityalert/4416 +CVE-2008-4582 - https://bugzilla.mozilla.org/show_bug.cgi?id=455311 +CVE-2008-4583 - http://securityreason.com/securityalert/4427 +CVE-2008-4583 - https://www.exploit-db.com/exploits/5028 +CVE-2008-4584 - http://securityreason.com/securityalert/4424 +CVE-2008-4584 - https://www.exploit-db.com/exploits/5005 +CVE-2008-4585 - http://securityreason.com/securityalert/4414 +CVE-2008-4586 - http://securityreason.com/securityalert/4425 +CVE-2008-4586 - https://www.exploit-db.com/exploits/4913 +CVE-2008-4587 - http://securityreason.com/securityalert/4428 +CVE-2008-4587 - https://www.exploit-db.com/exploits/4909 +CVE-2008-4588 - http://securityreason.com/securityalert/4415 +CVE-2008-4588 - https://www.exploit-db.com/exploits/6752 +CVE-2008-4589 - http://securityreason.com/securityalert/4421 +CVE-2008-4590 - http://securityreason.com/securityalert/4413 +CVE-2008-4590 - https://www.exploit-db.com/exploits/6714 +CVE-2008-4591 - http://securityreason.com/securityalert/4419 +CVE-2008-4591 - https://www.exploit-db.com/exploits/6425 +CVE-2008-4592 - http://securityreason.com/securityalert/4423 +CVE-2008-4592 - https://www.exploit-db.com/exploits/6427 +CVE-2008-4599 - http://securityreason.com/securityalert/4430 +CVE-2008-4599 - https://www.exploit-db.com/exploits/6763 +CVE-2008-4600 - http://securityreason.com/securityalert/4431 +CVE-2008-4600 - https://www.exploit-db.com/exploits/6766 +CVE-2008-4602 - http://securityreason.com/securityalert/4432 +CVE-2008-4602 - https://www.exploit-db.com/exploits/6772 +CVE-2008-4603 - http://securityreason.com/securityalert/4433 +CVE-2008-4603 - https://www.exploit-db.com/exploits/6769 +CVE-2008-4604 - http://securityreason.com/securityalert/4434 +CVE-2008-4604 - https://www.exploit-db.com/exploits/6762 +CVE-2008-4605 - http://securityreason.com/securityalert/4434 +CVE-2008-4605 - https://www.exploit-db.com/exploits/6762 +CVE-2008-4606 - http://securityreason.com/securityalert/4435 +CVE-2008-4606 - https://www.exploit-db.com/exploits/6765 +CVE-2008-4609 - http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked +CVE-2008-4609 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2008-4609 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 +CVE-2008-4611 - http://securityreason.com/securityalert/4436 +CVE-2008-4612 - http://securityreason.com/securityalert/4439 +CVE-2008-4612 - https://www.exploit-db.com/exploits/4848 +CVE-2008-4613 - http://securityreason.com/securityalert/4439 +CVE-2008-4613 - https://www.exploit-db.com/exploits/4848 +CVE-2008-4614 - http://securityreason.com/securityalert/4439 +CVE-2008-4614 - https://www.exploit-db.com/exploits/4848 +CVE-2008-4616 - http://securityreason.com/securityalert/4438 +CVE-2008-4617 - http://securityreason.com/securityalert/4437 +CVE-2008-4617 - https://www.exploit-db.com/exploits/5337 +CVE-2008-4619 - http://securityreason.com/securityalert/4440 +CVE-2008-4619 - https://www.exploit-db.com/exploits/6775 +CVE-2008-4620 - http://securityreason.com/securityalert/4450 +CVE-2008-4620 - https://www.exploit-db.com/exploits/6781 +CVE-2008-4621 - http://securityreason.com/securityalert/4451 +CVE-2008-4621 - https://www.exploit-db.com/exploits/6780 +CVE-2008-4622 - http://securityreason.com/securityalert/4452 +CVE-2008-4622 - https://www.exploit-db.com/exploits/6779 +CVE-2008-4623 - http://securityreason.com/securityalert/4453 +CVE-2008-4623 - https://www.exploit-db.com/exploits/6792 +CVE-2008-4624 - http://securityreason.com/securityalert/4454 +CVE-2008-4624 - https://www.exploit-db.com/exploits/6785 +CVE-2008-4625 - http://securityreason.com/securityalert/4446 +CVE-2008-4625 - https://www.exploit-db.com/exploits/6777 +CVE-2008-4626 - http://securityreason.com/securityalert/4444 +CVE-2008-4626 - https://www.exploit-db.com/exploits/6788 +CVE-2008-4627 - http://securityreason.com/securityalert/4443 +CVE-2008-4627 - https://www.exploit-db.com/exploits/6790 +CVE-2008-4628 - http://securityreason.com/securityalert/4442 +CVE-2008-4628 - https://www.exploit-db.com/exploits/6782 +CVE-2008-4632 - http://securityreason.com/securityalert/4445 +CVE-2008-4632 - https://www.exploit-db.com/exploits/6767 +CVE-2008-4642 - http://securityreason.com/securityalert/4449 +CVE-2008-4642 - https://www.exploit-db.com/exploits/6758 +CVE-2008-4643 - http://securityreason.com/securityalert/4455 +CVE-2008-4643 - https://www.exploit-db.com/exploits/6759 +CVE-2008-4644 - http://securityreason.com/securityalert/4455 +CVE-2008-4644 - https://www.exploit-db.com/exploits/6759 +CVE-2008-4645 - http://securityreason.com/securityalert/4456 +CVE-2008-4645 - https://www.exploit-db.com/exploits/6755 +CVE-2008-4648 - http://packetstormsecurity.org/0810-exploits/elxis-xss.txt +CVE-2008-4649 - http://packetstormsecurity.org/0810-exploits/elxis-xss.txt +CVE-2008-4650 - http://securityreason.com/securityalert/4457 +CVE-2008-4650 - https://www.exploit-db.com/exploits/6760 +CVE-2008-4652 - http://securityreason.com/securityalert/4458 +CVE-2008-4652 - https://www.exploit-db.com/exploits/6793 +CVE-2008-4652 - https://www.exploit-db.com/exploits/6840 +CVE-2008-4653 - http://securityreason.com/securityalert/4459 +CVE-2008-4653 - https://www.exploit-db.com/exploits/6795 +CVE-2008-4654 - http://securityreason.com/securityalert/4460 +CVE-2008-4662 - http://securityreason.com/securityalert/4463 +CVE-2008-4662 - https://www.exploit-db.com/exploits/6744 +CVE-2008-4665 - http://securityreason.com/securityalert/4466 +CVE-2008-4665 - https://www.exploit-db.com/exploits/6626 +CVE-2008-4666 - http://securityreason.com/securityalert/4467 +CVE-2008-4666 - https://www.exploit-db.com/exploits/6576 +CVE-2008-4667 - http://securityreason.com/securityalert/4468 +CVE-2008-4667 - https://www.exploit-db.com/exploits/6628 +CVE-2008-4668 - http://securityreason.com/securityalert/4464 +CVE-2008-4668 - https://www.exploit-db.com/exploits/6618 +CVE-2008-4673 - http://securityreason.com/securityalert/4461 +CVE-2008-4673 - https://www.exploit-db.com/exploits/6623 +CVE-2008-4674 - http://securityreason.com/securityalert/4469 +CVE-2008-4674 - https://www.exploit-db.com/exploits/6599 +CVE-2008-4675 - http://securityreason.com/securityalert/4465 +CVE-2008-4675 - https://www.exploit-db.com/exploits/6611 +CVE-2008-4680 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2922 +CVE-2008-4680 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9605 +CVE-2008-4682 - http://securityreason.com/securityalert/4462 +CVE-2008-4682 - https://www.exploit-db.com/exploits/6622 +CVE-2008-4683 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9821 +CVE-2008-4687 - http://securityreason.com/securityalert/4470 +CVE-2008-4687 - https://www.exploit-db.com/exploits/44611/ +CVE-2008-4687 - https://www.exploit-db.com/exploits/6768 +CVE-2008-4696 - http://securityreason.com/securityalert/4504 +CVE-2008-4696 - https://www.exploit-db.com/exploits/6801 +CVE-2008-4699 - http://securityreason.com/securityalert/4471 +CVE-2008-4699 - https://www.exploit-db.com/exploits/6414 +CVE-2008-4700 - http://securityreason.com/securityalert/4472 +CVE-2008-4700 - https://www.exploit-db.com/exploits/6416 +CVE-2008-4702 - http://securityreason.com/securityalert/4419 +CVE-2008-4702 - https://www.exploit-db.com/exploits/6425 +CVE-2008-4703 - http://securityreason.com/securityalert/4474 +CVE-2008-4703 - https://www.exploit-db.com/exploits/5446 +CVE-2008-4704 - http://securityreason.com/securityalert/4473 +CVE-2008-4704 - https://www.exploit-db.com/exploits/6751 +CVE-2008-4705 - http://securityreason.com/securityalert/4477 +CVE-2008-4705 - https://www.exploit-db.com/exploits/6754 +CVE-2008-4706 - http://securityreason.com/securityalert/4480 +CVE-2008-4706 - https://www.exploit-db.com/exploits/6593 +CVE-2008-4707 - http://securityreason.com/securityalert/4493 +CVE-2008-4707 - https://www.exploit-db.com/exploits/6617 +CVE-2008-4708 - http://securityreason.com/securityalert/4495 +CVE-2008-4708 - https://www.exploit-db.com/exploits/6621 +CVE-2008-4709 - http://securityreason.com/securityalert/4496 +CVE-2008-4709 - https://www.exploit-db.com/exploits/6613 +CVE-2008-4711 - http://securityreason.com/securityalert/4486 +CVE-2008-4711 - https://www.exploit-db.com/exploits/6595 +CVE-2008-4712 - http://securityreason.com/securityalert/4481 +CVE-2008-4712 - https://www.exploit-db.com/exploits/6601 +CVE-2008-4713 - http://securityreason.com/securityalert/4482 +CVE-2008-4713 - https://www.exploit-db.com/exploits/6578 +CVE-2008-4714 - http://securityreason.com/securityalert/4497 +CVE-2008-4714 - https://www.exploit-db.com/exploits/6580 +CVE-2008-4715 - http://securityreason.com/securityalert/4485 +CVE-2008-4715 - https://www.exploit-db.com/exploits/5493 +CVE-2008-4716 - http://securityreason.com/securityalert/4500 +CVE-2008-4716 - https://www.exploit-db.com/exploits/6605 +CVE-2008-4717 - http://securityreason.com/securityalert/4479 +CVE-2008-4717 - https://www.exploit-db.com/exploits/6608 +CVE-2008-4718 - http://securityreason.com/securityalert/4499 +CVE-2008-4718 - https://www.exploit-db.com/exploits/6592 +CVE-2008-4718 - https://www.exploit-db.com/exploits/6607 +CVE-2008-4719 - http://securityreason.com/securityalert/4478 +CVE-2008-4719 - https://www.exploit-db.com/exploits/6585 +CVE-2008-4720 - http://securityreason.com/securityalert/4503 +CVE-2008-4720 - https://www.exploit-db.com/exploits/6587 +CVE-2008-4721 - http://securityreason.com/securityalert/4502 +CVE-2008-4721 - https://www.exploit-db.com/exploits/6625 +CVE-2008-4725 - http://securityreason.com/securityalert/4504 +CVE-2008-4725 - https://www.exploit-db.com/exploits/6801 +CVE-2008-4726 - http://securityreason.com/securityalert/4498 +CVE-2008-4726 - https://www.exploit-db.com/exploits/6804 +CVE-2008-4727 - http://securityreason.com/securityalert/4494 +CVE-2008-4728 - https://www.exploit-db.com/exploits/6773 +CVE-2008-4728 - https://www.exploit-db.com/exploits/6774 +CVE-2008-4728 - https://www.exploit-db.com/exploits/6776 +CVE-2008-4729 - http://securityreason.com/securityalert/4505 +CVE-2008-4729 - https://www.exploit-db.com/exploits/6761 +CVE-2008-4730 - http://securityreason.com/securityalert/4484 +CVE-2008-4732 - http://chxsecurity.org/advisories/adv-3-full.txt +CVE-2008-4732 - http://securityreason.com/securityalert/4492 +CVE-2008-4732 - https://www.exploit-db.com/exploits/6747 +CVE-2008-4733 - http://chxsecurity.org/advisories/adv-3-full.txt +CVE-2008-4733 - http://securityreason.com/securityalert/4492 +CVE-2008-4734 - http://chxsecurity.org/advisories/adv-3-full.txt +CVE-2008-4734 - http://securityreason.com/securityalert/4492 +CVE-2008-4735 - https://www.exploit-db.com/exploits/6598 +CVE-2008-4736 - http://securityreason.com/securityalert/4483 +CVE-2008-4736 - https://www.exploit-db.com/exploits/6589 +CVE-2008-4738 - http://securityreason.com/securityalert/4476 +CVE-2008-4738 - https://www.exploit-db.com/exploits/6603 +CVE-2008-4739 - http://securityreason.com/securityalert/4475 +CVE-2008-4739 - https://www.exploit-db.com/exploits/6602 +CVE-2008-4740 - http://securityreason.com/securityalert/4506 +CVE-2008-4740 - https://www.exploit-db.com/exploits/6287 +CVE-2008-4741 - http://marc.info/?l=bugtraq&m=121933211712734&w=2 +CVE-2008-4741 - http://securityreason.com/securityalert/4507 +CVE-2008-4743 - http://www.packetstormsecurity.org/0808-exploits/faqman-sql.txt +CVE-2008-4744 - http://www.packetstormsecurity.org/0808-exploits/dxshopcart-sql.txt +CVE-2008-4748 - http://securityreason.com/securityalert/4508 +CVE-2008-4748 - https://www.exploit-db.com/exploits/6832 +CVE-2008-4749 - http://securityreason.com/securityalert/4509 +CVE-2008-4749 - https://www.exploit-db.com/exploits/6828 +CVE-2008-4750 - http://securityreason.com/securityalert/4509 +CVE-2008-4750 - https://www.exploit-db.com/exploits/6828 +CVE-2008-4751 - http://packetstormsecurity.org/0810-exploits/ipei-xss.txt +CVE-2008-4751 - http://securityreason.com/securityalert/4510 +CVE-2008-4752 - http://securityreason.com/securityalert/4511 +CVE-2008-4752 - https://www.exploit-db.com/exploits/6836 +CVE-2008-4753 - http://securityreason.com/securityalert/4512 +CVE-2008-4753 - https://www.exploit-db.com/exploits/6829 +CVE-2008-4754 - http://securityreason.com/securityalert/4513 +CVE-2008-4754 - https://www.exploit-db.com/exploits/6843 +CVE-2008-4755 - http://securityreason.com/securityalert/4521 +CVE-2008-4755 - https://www.exploit-db.com/exploits/6839 +CVE-2008-4756 - https://www.exploit-db.com/exploits/6833 +CVE-2008-4757 - https://www.exploit-db.com/exploits/6833 +CVE-2008-4758 - http://securityreason.com/securityalert/4527 +CVE-2008-4758 - https://www.exploit-db.com/exploits/6833 +CVE-2008-4759 - http://securityreason.com/securityalert/4520 +CVE-2008-4759 - https://www.exploit-db.com/exploits/6835 +CVE-2008-4760 - http://securityreason.com/securityalert/4519 +CVE-2008-4760 - https://www.exploit-db.com/exploits/6844 +CVE-2008-4762 - http://securityreason.com/securityalert/4515 +CVE-2008-4762 - https://www.exploit-db.com/exploits/6800 +CVE-2008-4762 - https://www.exploit-db.com/exploits/6812 +CVE-2008-4763 - http://securityreason.com/securityalert/4514 +CVE-2008-4764 - https://www.exploit-db.com/exploits/5435 +CVE-2008-4765 - http://packetstormsecurity.org/0804-exploits/pollbooth20-sql.txt +CVE-2008-4765 - https://www.exploit-db.com/exploits/5436 +CVE-2008-4770 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367 +CVE-2008-4771 - http://securityreason.com/securityalert/4517 +CVE-2008-4771 - https://www.exploit-db.com/exploits/5193 +CVE-2008-4772 - http://securityreason.com/securityalert/4523 +CVE-2008-4772 - https://www.exploit-db.com/exploits/6853 +CVE-2008-4773 - http://securityreason.com/securityalert/4523 +CVE-2008-4773 - https://www.exploit-db.com/exploits/6853 +CVE-2008-4774 - http://securityreason.com/securityalert/4523 +CVE-2008-4774 - https://www.exploit-db.com/exploits/6853 +CVE-2008-4775 - http://securityreason.com/securityalert/4516 +CVE-2008-4778 - http://securityreason.com/securityalert/4525 +CVE-2008-4778 - https://www.exploit-db.com/exploits/5414 +CVE-2008-4778 - https://www.exploit-db.com/exploits/5447 +CVE-2008-4779 - http://securityreason.com/securityalert/4528 +CVE-2008-4779 - https://www.exploit-db.com/exploits/6831 +CVE-2008-4780 - http://securityreason.com/securityalert/4522 +CVE-2008-4780 - https://www.exploit-db.com/exploits/6846 +CVE-2008-4781 - http://securityreason.com/securityalert/4526 +CVE-2008-4781 - https://www.exploit-db.com/exploits/6850 +CVE-2008-4782 - http://securityreason.com/securityalert/4518 +CVE-2008-4782 - https://www.exploit-db.com/exploits/6854 +CVE-2008-4783 - http://securityreason.com/securityalert/4529 +CVE-2008-4783 - https://www.exploit-db.com/exploits/6848 +CVE-2008-4784 - http://securityreason.com/securityalert/4524 +CVE-2008-4784 - https://www.exploit-db.com/exploits/6818 +CVE-2008-4785 - http://securityreason.com/securityalert/4530 +CVE-2008-4785 - https://www.exploit-db.com/exploits/6849 +CVE-2008-4786 - http://securityreason.com/securityalert/4531 +CVE-2008-4786 - https://www.exploit-db.com/exploits/6852 +CVE-2008-4800 - http://securityreason.com/securityalert/4532 +CVE-2008-4813 - http://securityreason.com/securityalert/4564 +CVE-2008-4827 - http://securityreason.com/securityalert/4879 +CVE-2008-4829 - http://securityreason.com/securityalert/4647 +CVE-2008-4834 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 +CVE-2008-4835 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001 +CVE-2008-4837 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-072 +CVE-2008-4841 - http://securityreason.com/securityalert/4711 +CVE-2008-4841 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 +CVE-2008-4841 - https://www.exploit-db.com/exploits/6560 +CVE-2008-4844 - http://isc.sans.org/diary.html?storyid=5458 +CVE-2008-4844 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078 +CVE-2008-4844 - https://www.exploit-db.com/exploits/7403 +CVE-2008-4844 - https://www.exploit-db.com/exploits/7410 +CVE-2008-4844 - https://www.exploit-db.com/exploits/7477 +CVE-2008-4844 - https://www.exploit-db.com/exploits/7583 +CVE-2008-4864 - http://www.openwall.com/lists/oss-security/2008/10/29/3 +CVE-2008-4864 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-4871 - http://securityreason.com/securityalert/4533 +CVE-2008-4873 - http://securityreason.com/securityalert/4534 +CVE-2008-4873 - https://www.exploit-db.com/exploits/6864 +CVE-2008-4874 - http://securityreason.com/securityalert/4536 +CVE-2008-4874 - https://www.exploit-db.com/exploits/5113 +CVE-2008-4875 - http://securityreason.com/securityalert/4536 +CVE-2008-4875 - https://www.exploit-db.com/exploits/5113 +CVE-2008-4876 - http://securityreason.com/securityalert/4536 +CVE-2008-4876 - https://www.exploit-db.com/exploits/5113 +CVE-2008-4877 - http://securityreason.com/securityalert/4535 +CVE-2008-4877 - https://www.exploit-db.com/exploits/6869 +CVE-2008-4878 - http://securityreason.com/securityalert/4535 +CVE-2008-4878 - https://www.exploit-db.com/exploits/6869 +CVE-2008-4879 - http://securityreason.com/securityalert/4543 +CVE-2008-4879 - https://www.exploit-db.com/exploits/6953 +CVE-2008-4880 - http://securityreason.com/securityalert/4548 +CVE-2008-4880 - https://www.exploit-db.com/exploits/6958 +CVE-2008-4881 - https://www.exploit-db.com/exploits/6943 +CVE-2008-4882 - http://securityreason.com/securityalert/4540 +CVE-2008-4882 - https://www.exploit-db.com/exploits/6938 +CVE-2008-4883 - https://www.exploit-db.com/exploits/6937 +CVE-2008-4884 - http://securityreason.com/securityalert/4538 +CVE-2008-4884 - https://www.exploit-db.com/exploits/6948 +CVE-2008-4885 - http://securityreason.com/securityalert/4541 +CVE-2008-4885 - https://www.exploit-db.com/exploits/6942 +CVE-2008-4886 - http://securityreason.com/securityalert/4539 +CVE-2008-4886 - https://www.exploit-db.com/exploits/6952 +CVE-2008-4887 - http://securityreason.com/securityalert/4544 +CVE-2008-4887 - https://www.exploit-db.com/exploits/6957 +CVE-2008-4888 - https://www.exploit-db.com/exploits/6957 +CVE-2008-4889 - http://securityreason.com/securityalert/4552 +CVE-2008-4889 - https://www.exploit-db.com/exploits/6961 +CVE-2008-4890 - http://securityreason.com/securityalert/4553 +CVE-2008-4890 - https://www.exploit-db.com/exploits/6960 +CVE-2008-4894 - https://www.exploit-db.com/exploits/6888 +CVE-2008-4895 - https://www.exploit-db.com/exploits/6935 +CVE-2008-4897 - http://packetstormsecurity.org/0810-exploits/logzpodcast-sql.txt +CVE-2008-4897 - http://securityreason.com/securityalert/4546 +CVE-2008-4897 - http://securityreason.com/securityalert/4555 +CVE-2008-4897 - https://www.exploit-db.com/exploits/6896 +CVE-2008-4900 - https://www.exploit-db.com/exploits/6944 +CVE-2008-4901 - https://www.exploit-db.com/exploits/6912 +CVE-2008-4902 - https://www.exploit-db.com/exploits/6917 +CVE-2008-4903 - http://securityreason.com/securityalert/4550 +CVE-2008-4904 - http://securityreason.com/securityalert/4550 +CVE-2008-4905 - http://securityreason.com/securityalert/4550 +CVE-2008-4906 - http://securityreason.com/securityalert/4551 +CVE-2008-4906 - https://www.exploit-db.com/exploits/6885 +CVE-2008-4910 - http://securityreason.com/securityalert/4542 +CVE-2008-4912 - http://securityreason.com/securityalert/4547 +CVE-2008-4912 - https://www.exploit-db.com/exploits/5426 +CVE-2008-4913 - http://securityreason.com/securityalert/4554 +CVE-2008-4913 - https://www.exploit-db.com/exploits/5522 +CVE-2008-4916 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2008-4916 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439 +CVE-2008-4918 - http://securityreason.com/securityalert/4556 +CVE-2008-4919 - http://securityreason.com/securityalert/4558 +CVE-2008-4919 - https://www.exploit-db.com/exploits/6875 +CVE-2008-4921 - http://securityreason.com/securityalert/4559 +CVE-2008-4921 - https://www.exploit-db.com/exploits/6959 +CVE-2008-4922 - http://securityreason.com/securityalert/4560 +CVE-2008-4922 - https://www.exploit-db.com/exploits/6878 +CVE-2008-4923 - http://securityreason.com/securityalert/4561 +CVE-2008-4923 - https://www.exploit-db.com/exploits/6870 +CVE-2008-4924 - http://securityreason.com/securityalert/4562 +CVE-2008-4924 - https://www.exploit-db.com/exploits/6871 +CVE-2008-4925 - http://securityreason.com/securityalert/4563 +CVE-2008-4925 - https://www.exploit-db.com/exploits/6872 +CVE-2008-4926 - https://www.exploit-db.com/exploits/6873 +CVE-2008-4928 - http://www.openwall.com/lists/oss-security/2008/11/01/2 +CVE-2008-4929 - http://www.openwall.com/lists/oss-security/2008/11/01/2 +CVE-2008-4930 - http://www.openwall.com/lists/oss-security/2008/11/01/2 +CVE-2008-4931 - http://securityreason.com/securityalert/4566 +CVE-2008-4932 - http://securityreason.com/securityalert/4565 +CVE-2008-4932 - https://www.exploit-db.com/exploits/6898 +CVE-2008-4935 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4936 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4937 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4938 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4939 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4940 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4941 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4942 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4943 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4944 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4945 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4946 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4947 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4948 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4949 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4950 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4951 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4952 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4953 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4954 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4955 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4956 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4957 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4958 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4959 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4960 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4964 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4965 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4966 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4967 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4968 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4969 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4970 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4971 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4972 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4973 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4974 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4975 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4976 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4977 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4978 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4979 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4980 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4981 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4982 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4983 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4984 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4985 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4986 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4987 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4988 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4993 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4993 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9576 +CVE-2008-4994 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4995 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4996 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4997 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4998 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-4999 - http://securityreason.com/securityalert/4568 +CVE-2008-5000 - http://securityreason.com/securityalert/4572 +CVE-2008-5000 - https://www.exploit-db.com/exploits/6996 +CVE-2008-5002 - http://securityreason.com/securityalert/4571 +CVE-2008-5002 - https://www.exploit-db.com/exploits/6963 +CVE-2008-5003 - http://securityreason.com/securityalert/4569 +CVE-2008-5003 - https://www.exploit-db.com/exploits/6934 +CVE-2008-5004 - https://www.exploit-db.com/exploits/6925 +CVE-2008-5005 - http://marc.info/?l=full-disclosure&m=122572590212610&w=4 +CVE-2008-5005 - http://securityreason.com/securityalert/4570 +CVE-2008-5005 - https://bugzilla.redhat.com/show_bug.cgi?id=469667 +CVE-2008-5007 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-5013 - https://bugzilla.mozilla.org/show_bug.cgi?id=433610 +CVE-2008-5013 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9660 +CVE-2008-5014 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157 +CVE-2008-5018 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872 +CVE-2008-5021 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642 +CVE-2008-5023 - https://bugzilla.mozilla.org/show_bug.cgi?id=424733 +CVE-2008-5023 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908 +CVE-2008-5024 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063 +CVE-2008-5029 - http://securityreason.com/securityalert/4573 +CVE-2008-5029 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9558 +CVE-2008-5031 - http://www.openwall.com/lists/oss-security/2008/11/05/2 +CVE-2008-5031 - http://www.openwall.com/lists/oss-security/2008/11/05/3 +CVE-2008-5031 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-5034 - https://bugs.gentoo.org/show_bug.cgi?id=235770 +CVE-2008-5036 - https://www.exploit-db.com/exploits/7051 +CVE-2008-5039 - http://securityreason.com/securityalert/4575 +CVE-2008-5040 - http://securityreason.com/securityalert/4577 +CVE-2008-5040 - https://www.exploit-db.com/exploits/6857 +CVE-2008-5042 - http://securityreason.com/securityalert/4574 +CVE-2008-5042 - https://www.exploit-db.com/exploits/7070 +CVE-2008-5043 - http://securityreason.com/securityalert/4578 +CVE-2008-5044 - http://securityreason.com/securityalert/4576 +CVE-2008-5045 - http://securityreason.com/securityalert/4583 +CVE-2008-5045 - https://www.exploit-db.com/exploits/6926 +CVE-2008-5046 - http://securityreason.com/securityalert/4589 +CVE-2008-5046 - https://www.exploit-db.com/exploits/7030 +CVE-2008-5047 - http://securityreason.com/securityalert/4580 +CVE-2008-5047 - https://www.exploit-db.com/exploits/7043 +CVE-2008-5049 - http://securityreason.com/securityalert/4582 +CVE-2008-5049 - https://www.exploit-db.com/exploits/7054 +CVE-2008-5050 - http://securityreason.com/securityalert/4579 +CVE-2008-5051 - http://securityreason.com/securityalert/4581 +CVE-2008-5051 - https://www.exploit-db.com/exploits/7078 +CVE-2008-5052 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9449 +CVE-2008-5053 - http://securityreason.com/securityalert/4584 +CVE-2008-5054 - https://www.exploit-db.com/exploits/7015 +CVE-2008-5058 - https://www.exploit-db.com/exploits/7004 +CVE-2008-5059 - http://securityreason.com/securityalert/4587 +CVE-2008-5059 - https://www.exploit-db.com/exploits/6916 +CVE-2008-5060 - http://securityreason.com/securityalert/4587 +CVE-2008-5060 - https://www.exploit-db.com/exploits/6916 +CVE-2008-5061 - http://securityreason.com/securityalert/4590 +CVE-2008-5061 - https://www.exploit-db.com/exploits/7049 +CVE-2008-5062 - http://securityreason.com/securityalert/4590 +CVE-2008-5062 - https://www.exploit-db.com/exploits/7049 +CVE-2008-5063 - http://securityreason.com/securityalert/4586 +CVE-2008-5065 - http://securityreason.com/securityalert/4585 +CVE-2008-5065 - https://www.exploit-db.com/exploits/6860 +CVE-2008-5066 - http://securityreason.com/securityalert/4592 +CVE-2008-5066 - https://www.exploit-db.com/exploits/6859 +CVE-2008-5069 - https://www.exploit-db.com/exploits/6577 +CVE-2008-5070 - http://securityreason.com/securityalert/4593 +CVE-2008-5070 - https://www.exploit-db.com/exploits/6612 +CVE-2008-5071 - http://securityreason.com/securityalert/4591 +CVE-2008-5071 - https://www.exploit-db.com/exploits/6606 +CVE-2008-5072 - http://packetstormsecurity.org/filedesc/klite-dos-tgz.html +CVE-2008-5072 - http://securityreason.com/securityalert/4588 +CVE-2008-5072 - https://www.exploit-db.com/exploits/6565 +CVE-2008-5073 - http://securityreason.com/securityalert/4595 +CVE-2008-5074 - http://securityreason.com/securityalert/4594 +CVE-2008-5074 - https://www.exploit-db.com/exploits/6620 +CVE-2008-5075 - http://securityreason.com/securityalert/4596 +CVE-2008-5075 - https://www.exploit-db.com/exploits/6596 +CVE-2008-5077 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155 +CVE-2008-5079 - http://securityreason.com/securityalert/4694 +CVE-2008-5080 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21 +CVE-2008-5081 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987 +CVE-2008-5081 - https://www.exploit-db.com/exploits/7520 +CVE-2008-5086 - http://www.ubuntu.com/usn/usn-694-1 +CVE-2008-5088 - http://securityreason.com/securityalert/4599 +CVE-2008-5088 - https://www.exploit-db.com/exploits/6510 +CVE-2008-5089 - http://vuln.sg/ddarviewer2501314-en.html +CVE-2008-5090 - http://securityreason.com/securityalert/4598 +CVE-2008-5090 - https://www.exploit-db.com/exploits/6499 +CVE-2008-5097 - http://securityreason.com/securityalert/4597 +CVE-2008-5097 - https://www.exploit-db.com/exploits/6501 +CVE-2008-5100 - http://securityreason.com/securityalert/4605 +CVE-2008-5105 - http://securityreason.com/securityalert/4603 +CVE-2008-5106 - http://securityreason.com/securityalert/4603 +CVE-2008-5120 - http://securityreason.com/securityalert/4602 +CVE-2008-5121 - http://securityreason.com/securityalert/4600 +CVE-2008-5121 - https://www.exploit-db.com/exploits/5837 +CVE-2008-5123 - http://securityreason.com/securityalert/4604 +CVE-2008-5123 - https://www.exploit-db.com/exploits/5888 +CVE-2008-5124 - http://securityreason.com/securityalert/4606 +CVE-2008-5125 - http://securityreason.com/securityalert/4604 +CVE-2008-5125 - https://www.exploit-db.com/exploits/5888 +CVE-2008-5127 - https://www.exploit-db.com/exploits/7244 +CVE-2008-5131 - http://securityreason.com/securityalert/4607 +CVE-2008-5131 - https://www.exploit-db.com/exploits/7014 +CVE-2008-5132 - http://securityreason.com/securityalert/4608 +CVE-2008-5132 - https://www.exploit-db.com/exploits/7114 +CVE-2008-5158 - http://aluigi.org/adv/wincomalpd-adv.txt +CVE-2008-5158 - http://aluigi.org/poc/wincomalpd.zip +CVE-2008-5158 - http://securityreason.com/securityalert/4610 +CVE-2008-5159 - http://aluigi.org/adv/wincomalpd-adv.txt +CVE-2008-5159 - http://aluigi.org/poc/wincomalpd.zip +CVE-2008-5159 - http://securityreason.com/securityalert/4610 +CVE-2008-5160 - http://securityreason.com/securityalert/4609 +CVE-2008-5160 - https://www.exploit-db.com/exploits/5184 +CVE-2008-5161 - http://isc.sans.org/diary.html?storyid=5366 +CVE-2008-5163 - http://securityreason.com/securityalert/4612 +CVE-2008-5164 - http://securityreason.com/securityalert/4612 +CVE-2008-5166 - http://securityreason.com/securityalert/4615 +CVE-2008-5166 - https://www.exploit-db.com/exploits/5946 +CVE-2008-5167 - http://securityreason.com/securityalert/4616 +CVE-2008-5167 - https://www.exploit-db.com/exploits/5955 +CVE-2008-5167 - https://www.exploit-db.com/exploits/6282 +CVE-2008-5168 - http://securityreason.com/securityalert/4614 +CVE-2008-5168 - https://www.exploit-db.com/exploits/5947 +CVE-2008-5169 - http://securityreason.com/securityalert/4617 +CVE-2008-5169 - https://www.exploit-db.com/exploits/5949 +CVE-2008-5170 - http://securityreason.com/securityalert/4618 +CVE-2008-5170 - https://www.exploit-db.com/exploits/5950 +CVE-2008-5171 - https://www.exploit-db.com/exploits/5952 +CVE-2008-5174 - http://securityreason.com/securityalert/4613 +CVE-2008-5174 - https://www.exploit-db.com/exploits/5948 +CVE-2008-5175 - http://vuln.sg/aceftp3803-en.html +CVE-2008-5176 - http://aluigi.org/adv/wincomalpd-adv.txt +CVE-2008-5176 - http://aluigi.org/poc/wincomalpd.zip +CVE-2008-5176 - http://securityreason.com/securityalert/4610 +CVE-2008-5178 - https://www.exploit-db.com/exploits/7135 +CVE-2008-5180 - https://www.exploit-db.com/exploits/7262 +CVE-2008-5183 - http://www.openwall.com/lists/oss-security/2008/11/20/1 +CVE-2008-5183 - https://www.exploit-db.com/exploits/7150 +CVE-2008-5185 - http://www.openwall.com/lists/oss-security/2008/11/20/4 +CVE-2008-5188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607 +CVE-2008-5190 - http://securityreason.com/securityalert/4619 +CVE-2008-5190 - https://www.exploit-db.com/exploits/5970 +CVE-2008-5191 - http://securityreason.com/securityalert/4623 +CVE-2008-5191 - https://www.exploit-db.com/exploits/5960 +CVE-2008-5192 - http://securityreason.com/securityalert/4621 +CVE-2008-5192 - https://www.exploit-db.com/exploits/5958 +CVE-2008-5193 - http://securityreason.com/securityalert/4621 +CVE-2008-5193 - https://www.exploit-db.com/exploits/5958 +CVE-2008-5194 - http://securityreason.com/securityalert/4622 +CVE-2008-5194 - https://www.exploit-db.com/exploits/5964 +CVE-2008-5195 - http://securityreason.com/securityalert/4620 +CVE-2008-5195 - https://www.exploit-db.com/exploits/5967 +CVE-2008-5196 - http://securityreason.com/securityalert/4639 +CVE-2008-5196 - https://www.exploit-db.com/exploits/5942 +CVE-2008-5197 - http://securityreason.com/securityalert/4640 +CVE-2008-5197 - https://www.exploit-db.com/exploits/5961 +CVE-2008-5198 - http://securityreason.com/securityalert/4641 +CVE-2008-5198 - https://www.exploit-db.com/exploits/5969 +CVE-2008-5199 - http://securityreason.com/securityalert/4642 +CVE-2008-5200 - http://securityreason.com/securityalert/4643 +CVE-2008-5200 - https://www.exploit-db.com/exploits/5966 +CVE-2008-5201 - http://securityreason.com/securityalert/4644 +CVE-2008-5201 - https://www.exploit-db.com/exploits/5957 +CVE-2008-5202 - http://securityreason.com/securityalert/4644 +CVE-2008-5202 - https://www.exploit-db.com/exploits/5957 +CVE-2008-5203 - https://www.exploit-db.com/exploits/5962 +CVE-2008-5204 - https://www.exploit-db.com/exploits/5962 +CVE-2008-5205 - http://securityreason.com/securityalert/4645 +CVE-2008-5208 - http://securityreason.com/securityalert/4624 +CVE-2008-5208 - https://www.exploit-db.com/exploits/5583 +CVE-2008-5209 - http://securityreason.com/securityalert/4625 +CVE-2008-5209 - https://www.exploit-db.com/exploits/5575 +CVE-2008-5210 - https://www.exploit-db.com/exploits/5586 +CVE-2008-5211 - http://securityreason.com/securityalert/4629 +CVE-2008-5211 - http://users.own-hero.net/~decoder/advisories/sphider134-xss.txt +CVE-2008-5212 - http://securityreason.com/securityalert/4627 +CVE-2008-5212 - https://www.exploit-db.com/exploits/5591 +CVE-2008-5213 - http://securityreason.com/securityalert/4632 +CVE-2008-5213 - https://www.exploit-db.com/exploits/5590 +CVE-2008-5213 - https://www.exploit-db.com/exploits/6927 +CVE-2008-5214 - http://securityreason.com/securityalert/4628 +CVE-2008-5214 - https://www.exploit-db.com/exploits/5595 +CVE-2008-5215 - http://securityreason.com/securityalert/4628 +CVE-2008-5215 - https://www.exploit-db.com/exploits/5595 +CVE-2008-5216 - http://securityreason.com/securityalert/4636 +CVE-2008-5216 - https://www.exploit-db.com/exploits/5594 +CVE-2008-5217 - http://securityreason.com/securityalert/4626 +CVE-2008-5217 - https://www.exploit-db.com/exploits/5579 +CVE-2008-5218 - http://securityreason.com/securityalert/4633 +CVE-2008-5218 - https://www.exploit-db.com/exploits/7140 +CVE-2008-5219 - http://securityreason.com/securityalert/4634 +CVE-2008-5219 - https://www.exploit-db.com/exploits/7149 +CVE-2008-5220 - https://www.exploit-db.com/exploits/7165 +CVE-2008-5221 - http://securityreason.com/securityalert/4631 +CVE-2008-5221 - https://www.exploit-db.com/exploits/7170 +CVE-2008-5222 - http://securityreason.com/securityalert/4635 +CVE-2008-5223 - http://securityreason.com/securityalert/4637 +CVE-2008-5223 - https://www.exploit-db.com/exploits/5689 +CVE-2008-5225 - http://securityreason.com/securityalert/4638 +CVE-2008-5226 - http://securityreason.com/securityalert/4630 +CVE-2008-5226 - https://www.exploit-db.com/exploits/5692 +CVE-2008-5229 - http://securityreason.com/securityalert/4646 +CVE-2008-5230 - http://radajo.blogspot.com/2008/11/wpatkip-chopchop-attack.html +CVE-2008-5230 - http://www.aircrack-ng.org/doku.php?id=tkiptun-ng +CVE-2008-5232 - http://packetstormsecurity.org/0808-exploits/wms-overflow.txt +CVE-2008-5233 - http://securityreason.com/securityalert/4648 +CVE-2008-5234 - http://securityreason.com/securityalert/4648 +CVE-2008-5236 - http://securityreason.com/securityalert/4648 +CVE-2008-5237 - http://securityreason.com/securityalert/4648 +CVE-2008-5238 - http://securityreason.com/securityalert/4648 +CVE-2008-5239 - http://securityreason.com/securityalert/4648 +CVE-2008-5240 - http://securityreason.com/securityalert/4648 +CVE-2008-5241 - http://securityreason.com/securityalert/4648 +CVE-2008-5242 - http://securityreason.com/securityalert/4648 +CVE-2008-5243 - http://securityreason.com/securityalert/4648 +CVE-2008-5247 - http://securityreason.com/securityalert/4648 +CVE-2008-5264 - http://securityreason.com/securityalert/4655 +CVE-2008-5265 - http://securityreason.com/securityalert/4656 +CVE-2008-5265 - https://www.exploit-db.com/exploits/5782 +CVE-2008-5266 - http://securityreason.com/securityalert/4659 +CVE-2008-5267 - http://securityreason.com/securityalert/4654 +CVE-2008-5267 - https://www.exploit-db.com/exploits/5776 +CVE-2008-5268 - http://securityreason.com/securityalert/4653 +CVE-2008-5268 - https://www.exploit-db.com/exploits/5775 +CVE-2008-5269 - http://securityreason.com/securityalert/4652 +CVE-2008-5269 - https://www.exploit-db.com/exploits/5745 +CVE-2008-5270 - http://securityreason.com/securityalert/4651 +CVE-2008-5270 - https://www.exploit-db.com/exploits/5783 +CVE-2008-5271 - https://www.exploit-db.com/exploits/5779 +CVE-2008-5272 - http://securityreason.com/securityalert/4660 +CVE-2008-5272 - https://www.exploit-db.com/exploits/5779 +CVE-2008-5273 - http://securityreason.com/securityalert/4658 +CVE-2008-5273 - https://www.exploit-db.com/exploits/5781 +CVE-2008-5275 - http://vuln.sg/net2ftp096-en.html +CVE-2008-5276 - http://securityreason.com/securityalert/4680 +CVE-2008-5278 - http://securityreason.com/securityalert/4662 +CVE-2008-5279 - http://aluigi.altervista.org/adv/zilabzcsx-adv.txt +CVE-2008-5279 - http://aluigi.org/poc/zilabzcsx.zip +CVE-2008-5280 - http://aluigi.altervista.org/adv/zilabzcsx-adv.txt +CVE-2008-5280 - http://aluigi.org/poc/zilabzcsx.zip +CVE-2008-5281 - http://packetstormsecurity.org/0802-exploits/titan-heap-py.txt +CVE-2008-5282 - http://securityreason.com/securityalert/4657 +CVE-2008-5284 - http://aluigi.altervista.org/adv/emerdal-adv.txt +CVE-2008-5285 - http://securityreason.com/securityalert/4663 +CVE-2008-5287 - http://securityreason.com/securityalert/4664 +CVE-2008-5287 - https://www.exploit-db.com/exploits/7224 +CVE-2008-5288 - http://securityreason.com/securityalert/4665 +CVE-2008-5288 - https://www.exploit-db.com/exploits/7229 +CVE-2008-5289 - http://securityreason.com/securityalert/4666 +CVE-2008-5289 - https://www.exploit-db.com/exploits/7228 +CVE-2008-5289 - https://www.exploit-db.com/exploits/7230 +CVE-2008-5290 - http://securityreason.com/securityalert/4666 +CVE-2008-5290 - https://www.exploit-db.com/exploits/7228 +CVE-2008-5291 - http://securityreason.com/securityalert/4667 +CVE-2008-5291 - https://www.exploit-db.com/exploits/7231 +CVE-2008-5292 - http://securityreason.com/securityalert/4668 +CVE-2008-5292 - https://www.exploit-db.com/exploits/7234 +CVE-2008-5293 - http://securityreason.com/securityalert/4669 +CVE-2008-5293 - https://www.exploit-db.com/exploits/7222 +CVE-2008-5294 - http://securityreason.com/securityalert/4670 +CVE-2008-5294 - https://www.exploit-db.com/exploits/7223 +CVE-2008-5295 - http://securityreason.com/securityalert/4671 +CVE-2008-5295 - https://www.exploit-db.com/exploits/7235 +CVE-2008-5297 - http://securityreason.com/securityalert/4672 +CVE-2008-5297 - https://www.exploit-db.com/exploits/7151 +CVE-2008-5300 - http://securityreason.com/securityalert/4673 +CVE-2008-5303 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9699 +CVE-2008-5305 - http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-5305 +CVE-2008-5306 - http://securityreason.com/securityalert/4674 +CVE-2008-5306 - https://www.exploit-db.com/exploits/7200 +CVE-2008-5307 - http://securityreason.com/securityalert/4678 +CVE-2008-5307 - https://www.exploit-db.com/exploits/7201 +CVE-2008-5308 - http://securityreason.com/securityalert/4676 +CVE-2008-5308 - https://www.exploit-db.com/exploits/7191 +CVE-2008-5309 - http://securityreason.com/securityalert/4675 +CVE-2008-5309 - https://www.exploit-db.com/exploits/7208 +CVE-2008-5310 - http://securityreason.com/securityalert/4677 +CVE-2008-5310 - https://www.exploit-db.com/exploits/7198 +CVE-2008-5311 - http://securityreason.com/securityalert/4679 +CVE-2008-5311 - https://www.exploit-db.com/exploits/7199 +CVE-2008-5314 - https://www.exploit-db.com/exploits/7330 +CVE-2008-5315 - http://securityreason.com/securityalert/4681 +CVE-2008-5318 - http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki/branches/2.0/changelog.txt?view=markup +CVE-2008-5319 - http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki/branches/2.0/changelog.txt?view=markup +CVE-2008-5320 - http://securityreason.com/securityalert/4683 +CVE-2008-5320 - https://www.exploit-db.com/exploits/6791 +CVE-2008-5321 - http://securityreason.com/securityalert/4682 +CVE-2008-5321 - https://www.exploit-db.com/exploits/6778 +CVE-2008-5322 - http://packetstormsecurity.org/0810-exploits/wysiwikiwyg-lfixssdisclose.txt +CVE-2008-5322 - https://www.exploit-db.com/exploits/6042 +CVE-2008-5323 - http://packetstormsecurity.org/0810-exploits/wysiwikiwyg-lfixssdisclose.txt +CVE-2008-5323 - https://www.exploit-db.com/exploits/6042 +CVE-2008-5332 - http://securityreason.com/securityalert/4687 +CVE-2008-5332 - https://www.exploit-db.com/exploits/7221 +CVE-2008-5333 - http://securityreason.com/securityalert/4691 +CVE-2008-5333 - https://www.exploit-db.com/exploits/7218 +CVE-2008-5334 - http://securityreason.com/securityalert/4691 +CVE-2008-5334 - https://www.exploit-db.com/exploits/7218 +CVE-2008-5335 - http://securityreason.com/securityalert/4688 +CVE-2008-5335 - https://www.exploit-db.com/exploits/7173 +CVE-2008-5336 - http://securityreason.com/securityalert/4690 +CVE-2008-5336 - https://www.exploit-db.com/exploits/7216 +CVE-2008-5336 - https://www.exploit-db.com/exploits/7236 +CVE-2008-5337 - http://securityreason.com/securityalert/4689 +CVE-2008-5337 - https://www.exploit-db.com/exploits/7215 +CVE-2008-5338 - http://securityreason.com/securityalert/4689 +CVE-2008-5338 - https://www.exploit-db.com/exploits/7215 +CVE-2008-5340 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5341 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5342 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5343 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5348 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6549 +CVE-2008-5351 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5353 - http://blog.cr0.org/2009/05/write-once-own-everyone.html +CVE-2008-5353 - http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html +CVE-2008-5356 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5357 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5358 - http://www.redhat.com/support/errata/RHSA-2009-0369.html +CVE-2008-5361 - http://securityreason.com/securityalert/4692 +CVE-2008-5362 - http://securityreason.com/securityalert/4692 +CVE-2008-5363 - http://securityreason.com/securityalert/4692 +CVE-2008-5365 - https://www.exploit-db.com/exploits/7287 +CVE-2008-5377 - https://www.exploit-db.com/exploits/7550 +CVE-2008-5381 - http://securityreason.com/securityalert/4697 +CVE-2008-5383 - http://securityreason.com/securityalert/4698 +CVE-2008-5383 - https://www.exploit-db.com/exploits/7307 +CVE-2008-5393 - http://securityreason.com/securityalert/4696 +CVE-2008-5394 - http://bugs.debian.org/505071 +CVE-2008-5394 - http://bugs.debian.org/505271 +CVE-2008-5394 - http://securityreason.com/securityalert/4695 +CVE-2008-5394 - https://www.exploit-db.com/exploits/7313 +CVE-2008-5399 - http://securityreason.com/securityalert/4699 +CVE-2008-5400 - http://securityreason.com/securityalert/4699 +CVE-2008-5401 - http://securityreason.com/securityalert/4700 +CVE-2008-5402 - http://securityreason.com/securityalert/4701 +CVE-2008-5403 - http://securityreason.com/securityalert/4702 +CVE-2008-5405 - http://securityreason.com/securityalert/4703 +CVE-2008-5405 - https://www.exploit-db.com/exploits/7297 +CVE-2008-5405 - https://www.exploit-db.com/exploits/7309 +CVE-2008-5406 - http://securityreason.com/securityalert/4704 +CVE-2008-5406 - https://www.exploit-db.com/exploits/7296 +CVE-2008-5409 - https://www.exploit-db.com/exploits/7178 +CVE-2008-5415 - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/12/10.aspx +CVE-2008-5415 - http://securityreason.com/securityalert/4708 +CVE-2008-5416 - http://securityreason.com/securityalert/4706 +CVE-2008-5416 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2008-5416 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2008-5416 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-004 +CVE-2008-5416 - https://www.exploit-db.com/exploits/7501 +CVE-2008-5418 - http://securityreason.com/securityalert/4707 +CVE-2008-5418 - https://www.exploit-db.com/exploits/7168 +CVE-2008-5419 - http://securityreason.com/securityalert/4710 +CVE-2008-5420 - http://securityreason.com/securityalert/4709 +CVE-2008-5424 - http://securityreason.com/securityalert/4721 +CVE-2008-5425 - http://securityreason.com/securityalert/4721 +CVE-2008-5426 - http://securityreason.com/securityalert/4721 +CVE-2008-5427 - http://securityreason.com/securityalert/4721 +CVE-2008-5428 - http://securityreason.com/securityalert/4721 +CVE-2008-5429 - http://securityreason.com/securityalert/4721 +CVE-2008-5431 - http://securityreason.com/securityalert/4722 +CVE-2008-5433 - http://punbb.informer.com/ +CVE-2008-5434 - http://punbb.informer.com/ +CVE-2008-5435 - http://punbb.informer.com/ +CVE-2008-5486 - http://securityreason.com/securityalert/4719 +CVE-2008-5486 - https://www.exploit-db.com/exploits/7124 +CVE-2008-5487 - http://securityreason.com/securityalert/4719 +CVE-2008-5487 - https://www.exploit-db.com/exploits/7124 +CVE-2008-5488 - https://www.exploit-db.com/exploits/7037 +CVE-2008-5489 - http://securityreason.com/securityalert/4713 +CVE-2008-5489 - https://www.exploit-db.com/exploits/7128 +CVE-2008-5490 - http://securityreason.com/securityalert/4718 +CVE-2008-5490 - https://www.exploit-db.com/exploits/7131 +CVE-2008-5491 - http://securityreason.com/securityalert/4717 +CVE-2008-5491 - https://www.exploit-db.com/exploits/7121 +CVE-2008-5492 - http://securityreason.com/securityalert/4715 +CVE-2008-5492 - https://www.exploit-db.com/exploits/7126 +CVE-2008-5493 - http://securityreason.com/securityalert/4720 +CVE-2008-5493 - https://www.exploit-db.com/exploits/7134 +CVE-2008-5494 - http://securityreason.com/securityalert/4712 +CVE-2008-5494 - https://www.exploit-db.com/exploits/7093 +CVE-2008-5496 - http://securityreason.com/securityalert/4714 +CVE-2008-5496 - https://www.exploit-db.com/exploits/7098 +CVE-2008-5497 - http://securityreason.com/securityalert/4716 +CVE-2008-5497 - https://www.exploit-db.com/exploits/7113 +CVE-2008-5498 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9667 +CVE-2008-5500 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5503 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5504 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5506 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5507 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5507 - https://bugzilla.mozilla.org/show_bug.cgi?id=461735 +CVE-2008-5507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376 +CVE-2008-5508 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5510 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5510 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662 +CVE-2008-5511 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5512 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5512 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814 +CVE-2008-5513 - http://www.ubuntu.com/usn/usn-690-2 +CVE-2008-5515 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-5516 - http://securityreason.com/securityalert/4919 +CVE-2008-5518 - https://www.exploit-db.com/exploits/8458 +CVE-2008-5520 - http://securityreason.com/securityalert/4723 +CVE-2008-5521 - http://securityreason.com/securityalert/4723 +CVE-2008-5522 - http://securityreason.com/securityalert/4723 +CVE-2008-5523 - http://securityreason.com/securityalert/4723 +CVE-2008-5524 - http://securityreason.com/securityalert/4723 +CVE-2008-5525 - http://securityreason.com/securityalert/4723 +CVE-2008-5526 - http://securityreason.com/securityalert/4723 +CVE-2008-5527 - http://securityreason.com/securityalert/4723 +CVE-2008-5528 - http://securityreason.com/securityalert/4723 +CVE-2008-5529 - http://securityreason.com/securityalert/4723 +CVE-2008-5530 - http://securityreason.com/securityalert/4723 +CVE-2008-5531 - http://securityreason.com/securityalert/4723 +CVE-2008-5532 - http://securityreason.com/securityalert/4723 +CVE-2008-5533 - http://securityreason.com/securityalert/4723 +CVE-2008-5534 - http://securityreason.com/securityalert/4723 +CVE-2008-5535 - http://securityreason.com/securityalert/4723 +CVE-2008-5536 - http://securityreason.com/securityalert/4723 +CVE-2008-5537 - http://securityreason.com/securityalert/4723 +CVE-2008-5538 - http://securityreason.com/securityalert/4723 +CVE-2008-5539 - http://securityreason.com/securityalert/4723 +CVE-2008-5540 - http://securityreason.com/securityalert/4723 +CVE-2008-5541 - http://securityreason.com/securityalert/4723 +CVE-2008-5542 - http://securityreason.com/securityalert/4723 +CVE-2008-5543 - http://securityreason.com/securityalert/4723 +CVE-2008-5544 - http://securityreason.com/securityalert/4723 +CVE-2008-5545 - http://securityreason.com/securityalert/4723 +CVE-2008-5546 - http://securityreason.com/securityalert/4723 +CVE-2008-5547 - http://securityreason.com/securityalert/4723 +CVE-2008-5548 - http://securityreason.com/securityalert/4723 +CVE-2008-5551 - http://securityreason.com/securityalert/4724 +CVE-2008-5558 - http://securityreason.com/securityalert/4769 +CVE-2008-5559 - http://securityreason.com/securityalert/4725 +CVE-2008-5559 - https://www.exploit-db.com/exploits/7398 +CVE-2008-5560 - http://securityreason.com/securityalert/4725 +CVE-2008-5560 - https://www.exploit-db.com/exploits/7398 +CVE-2008-5561 - http://securityreason.com/securityalert/4726 +CVE-2008-5561 - https://www.exploit-db.com/exploits/7396 +CVE-2008-5562 - http://securityreason.com/securityalert/4727 +CVE-2008-5562 - https://www.exploit-db.com/exploits/7361 +CVE-2008-5563 - http://securityreason.com/securityalert/4728 +CVE-2008-5564 - http://securityreason.com/securityalert/4729 +CVE-2008-5565 - http://securityreason.com/securityalert/4730 +CVE-2008-5565 - https://www.exploit-db.com/exploits/7365 +CVE-2008-5566 - http://securityreason.com/securityalert/4751 +CVE-2008-5566 - https://www.exploit-db.com/exploits/7400 +CVE-2008-5567 - http://securityreason.com/securityalert/4731 +CVE-2008-5567 - https://www.exploit-db.com/exploits/7366 +CVE-2008-5568 - http://securityreason.com/securityalert/4735 +CVE-2008-5568 - https://www.exploit-db.com/exploits/7364 +CVE-2008-5569 - http://securityreason.com/securityalert/4745 +CVE-2008-5570 - http://securityreason.com/securityalert/4751 +CVE-2008-5570 - https://www.exploit-db.com/exploits/7400 +CVE-2008-5571 - http://securityreason.com/securityalert/4749 +CVE-2008-5571 - https://www.exploit-db.com/exploits/7390 +CVE-2008-5572 - http://securityreason.com/securityalert/4748 +CVE-2008-5572 - https://www.exploit-db.com/exploits/7371 +CVE-2008-5573 - http://securityreason.com/securityalert/4741 +CVE-2008-5573 - https://www.exploit-db.com/exploits/7391 +CVE-2008-5574 - http://securityreason.com/securityalert/4747 +CVE-2008-5574 - https://www.exploit-db.com/exploits/7407 +CVE-2008-5575 - http://securityreason.com/securityalert/4752 +CVE-2008-5576 - http://securityreason.com/securityalert/4739 +CVE-2008-5576 - https://www.exploit-db.com/exploits/5149 +CVE-2008-5577 - http://securityreason.com/securityalert/4739 +CVE-2008-5577 - https://www.exploit-db.com/exploits/5149 +CVE-2008-5578 - http://securityreason.com/securityalert/4739 +CVE-2008-5578 - https://www.exploit-db.com/exploits/5149 +CVE-2008-5579 - http://securityreason.com/securityalert/4733 +CVE-2008-5579 - https://www.exploit-db.com/exploits/6733 +CVE-2008-5580 - http://securityreason.com/securityalert/4733 +CVE-2008-5580 - https://www.exploit-db.com/exploits/6733 +CVE-2008-5581 - http://securityreason.com/securityalert/4733 +CVE-2008-5581 - https://www.exploit-db.com/exploits/6733 +CVE-2008-5582 - http://securityreason.com/securityalert/4732 +CVE-2008-5582 - https://www.exploit-db.com/exploits/5192 +CVE-2008-5583 - http://securityreason.com/securityalert/4734 +CVE-2008-5584 - http://securityreason.com/securityalert/4734 +CVE-2008-5585 - http://packetstormsecurity.org/0812-exploits/icxbbportal-rfi.txt +CVE-2008-5585 - http://securityreason.com/securityalert/4738 +CVE-2008-5585 - https://www.exploit-db.com/exploits/7341 +CVE-2008-5586 - http://securityreason.com/securityalert/4736 +CVE-2008-5586 - https://www.exploit-db.com/exploits/7328 +CVE-2008-5587 - http://securityreason.com/securityalert/4737 +CVE-2008-5587 - https://www.exploit-db.com/exploits/7363 +CVE-2008-5588 - http://securityreason.com/securityalert/4740 +CVE-2008-5588 - https://www.exploit-db.com/exploits/7349 +CVE-2008-5589 - http://securityreason.com/securityalert/4746 +CVE-2008-5589 - https://www.exploit-db.com/exploits/7350 +CVE-2008-5590 - http://securityreason.com/securityalert/4743 +CVE-2008-5590 - https://www.exploit-db.com/exploits/7368 +CVE-2008-5591 - http://securityreason.com/securityalert/4742 +CVE-2008-5591 - https://www.exploit-db.com/exploits/7351 +CVE-2008-5592 - http://securityreason.com/securityalert/4742 +CVE-2008-5592 - https://www.exploit-db.com/exploits/7351 +CVE-2008-5593 - http://securityreason.com/securityalert/4750 +CVE-2008-5593 - https://www.exploit-db.com/exploits/7375 +CVE-2008-5594 - http://securityreason.com/securityalert/4744 +CVE-2008-5594 - https://www.exploit-db.com/exploits/7374 +CVE-2008-5595 - http://packetstormsecurity.org/0812-exploits/aspautodealer-sqldisclose.txt +CVE-2008-5595 - http://securityreason.com/securityalert/4754 +CVE-2008-5595 - https://www.exploit-db.com/exploits/7356 +CVE-2008-5596 - http://securityreason.com/securityalert/4755 +CVE-2008-5596 - https://www.exploit-db.com/exploits/7372 +CVE-2008-5597 - http://securityreason.com/securityalert/4756 +CVE-2008-5597 - https://www.exploit-db.com/exploits/7353 +CVE-2008-5598 - http://securityreason.com/securityalert/4760 +CVE-2008-5598 - https://www.exploit-db.com/exploits/7377 +CVE-2008-5599 - http://securityreason.com/securityalert/4757 +CVE-2008-5599 - https://www.exploit-db.com/exploits/7352 +CVE-2008-5600 - http://securityreason.com/securityalert/4757 +CVE-2008-5600 - https://www.exploit-db.com/exploits/7352 +CVE-2008-5601 - http://securityreason.com/securityalert/4758 +CVE-2008-5601 - https://www.exploit-db.com/exploits/7338 +CVE-2008-5602 - http://securityreason.com/securityalert/4761 +CVE-2008-5602 - https://www.exploit-db.com/exploits/7370 +CVE-2008-5603 - http://securityreason.com/securityalert/4762 +CVE-2008-5603 - https://www.exploit-db.com/exploits/7359 +CVE-2008-5604 - http://securityreason.com/securityalert/4765 +CVE-2008-5604 - https://www.exploit-db.com/exploits/7342 +CVE-2008-5605 - http://securityreason.com/securityalert/4763 +CVE-2008-5605 - https://www.exploit-db.com/exploits/7357 +CVE-2008-5606 - http://securityreason.com/securityalert/4764 +CVE-2008-5606 - https://www.exploit-db.com/exploits/7376 +CVE-2008-5607 - http://securityreason.com/securityalert/4759 +CVE-2008-5607 - https://www.exploit-db.com/exploits/7331 +CVE-2008-5608 - http://securityreason.com/securityalert/4754 +CVE-2008-5608 - https://www.exploit-db.com/exploits/7356 +CVE-2008-5608 - https://www.exploit-db.com/exploits/7360 +CVE-2008-5619 - https://www.exploit-db.com/exploits/7549 +CVE-2008-5619 - https://www.exploit-db.com/exploits/7553 +CVE-2008-5621 - http://securityreason.com/securityalert/4753 +CVE-2008-5621 - https://www.exploit-db.com/exploits/7382 +CVE-2008-5625 - https://www.exploit-db.com/exploits/7171 +CVE-2008-5626 - http://securityreason.com/securityalert/4766 +CVE-2008-5626 - https://www.exploit-db.com/exploits/6741 +CVE-2008-5627 - https://www.exploit-db.com/exploits/7282 +CVE-2008-5628 - http://securityreason.com/securityalert/4781 +CVE-2008-5628 - https://www.exploit-db.com/exploits/7269 +CVE-2008-5629 - https://www.exploit-db.com/exploits/7256 +CVE-2008-5630 - http://securityreason.com/securityalert/4780 +CVE-2008-5630 - https://www.exploit-db.com/exploits/7238 +CVE-2008-5631 - https://www.exploit-db.com/exploits/7279 +CVE-2008-5632 - https://www.exploit-db.com/exploits/7301 +CVE-2008-5633 - https://www.exploit-db.com/exploits/7275 +CVE-2008-5634 - https://www.exploit-db.com/exploits/7273 +CVE-2008-5635 - https://www.exploit-db.com/exploits/7278 +CVE-2008-5636 - http://securityreason.com/securityalert/4779 +CVE-2008-5636 - https://www.exploit-db.com/exploits/7294 +CVE-2008-5637 - http://securityreason.com/securityalert/4778 +CVE-2008-5637 - https://www.exploit-db.com/exploits/7239 +CVE-2008-5638 - http://securityreason.com/securityalert/4768 +CVE-2008-5638 - https://www.exploit-db.com/exploits/7300 +CVE-2008-5639 - http://securityreason.com/securityalert/4777 +CVE-2008-5639 - https://www.exploit-db.com/exploits/7241 +CVE-2008-5640 - http://securityreason.com/securityalert/4776 +CVE-2008-5640 - https://www.exploit-db.com/exploits/7290 +CVE-2008-5641 - http://securityreason.com/securityalert/4767 +CVE-2008-5641 - https://www.exploit-db.com/exploits/7299 +CVE-2008-5642 - http://securityreason.com/securityalert/4775 +CVE-2008-5642 - https://www.exploit-db.com/exploits/7285 +CVE-2008-5643 - http://securityreason.com/securityalert/4774 +CVE-2008-5643 - https://www.exploit-db.com/exploits/7092 +CVE-2008-5645 - http://securityreason.com/securityalert/4773 +CVE-2008-5648 - https://www.exploit-db.com/exploits/7025 +CVE-2008-5649 - http://securityreason.com/securityalert/4772 +CVE-2008-5649 - https://www.exploit-db.com/exploits/7102 +CVE-2008-5650 - http://securityreason.com/securityalert/4771 +CVE-2008-5650 - https://www.exploit-db.com/exploits/7103 +CVE-2008-5651 - https://www.exploit-db.com/exploits/7053 +CVE-2008-5652 - http://securityreason.com/securityalert/4770 +CVE-2008-5652 - https://www.exploit-db.com/exploits/7045 +CVE-2008-5653 - https://www.exploit-db.com/exploits/7044 +CVE-2008-5654 - https://www.exploit-db.com/exploits/7046 +CVE-2008-5659 - http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38417 +CVE-2008-5660 - http://www.coresecurity.com/content/vinagre-format-string +CVE-2008-5660 - https://bugzilla.redhat.com/show_bug.cgi?id=475070 +CVE-2008-5660 - https://www.exploit-db.com/exploits/7401 +CVE-2008-5663 - http://securityreason.com/securityalert/4782 +CVE-2008-5663 - https://www.exploit-db.com/exploits/6706 +CVE-2008-5663 - https://www.exploit-db.com/exploits/6711 +CVE-2008-5664 - http://securityreason.com/securityalert/4783 +CVE-2008-5664 - https://www.exploit-db.com/exploits/7492 +CVE-2008-5665 - http://securityreason.com/securityalert/4784 +CVE-2008-5665 - https://www.exploit-db.com/exploits/6748 +CVE-2008-5666 - http://securityreason.com/securityalert/4785 +CVE-2008-5666 - https://www.exploit-db.com/exploits/6717 +CVE-2008-5667 - https://www.exploit-db.com/exploits/6658 +CVE-2008-5668 - http://securityreason.com/securityalert/4786 +CVE-2008-5669 - http://securityreason.com/securityalert/4786 +CVE-2008-5670 - http://securityreason.com/securityalert/4786 +CVE-2008-5671 - http://securityreason.com/securityalert/4787 +CVE-2008-5674 - http://securityreason.com/securityalert/4788 +CVE-2008-5677 - http://securityreason.com/securityalert/4789 +CVE-2008-5677 - https://www.exploit-db.com/exploits/6664 +CVE-2008-5678 - http://securityreason.com/securityalert/4790 +CVE-2008-5678 - https://www.exploit-db.com/exploits/6653 +CVE-2008-5679 - http://securityreason.com/securityalert/4791 +CVE-2008-5689 - http://securityreason.com/securityalert/4801 +CVE-2008-5691 - http://securityreason.com/securityalert/4795 +CVE-2008-5691 - https://www.exploit-db.com/exploits/7505 +CVE-2008-5692 - http://securityreason.com/securityalert/4799 +CVE-2008-5693 - http://securityreason.com/securityalert/4799 +CVE-2008-5695 - http://securityreason.com/securityalert/4798 +CVE-2008-5695 - http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html +CVE-2008-5695 - https://www.exploit-db.com/exploits/5066 +CVE-2008-5697 - http://securityreason.com/securityalert/4797 +CVE-2008-5697 - https://www.exploit-db.com/exploits/6690 +CVE-2008-5698 - http://securityreason.com/securityalert/4796 +CVE-2008-5698 - https://www.exploit-db.com/exploits/6718 +CVE-2008-5700 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2008-5705 - http://securityreason.com/securityalert/4800 +CVE-2008-5705 - https://www.exploit-db.com/exploits/7183 +CVE-2008-5706 - http://securityreason.com/securityalert/4800 +CVE-2008-5706 - https://www.exploit-db.com/exploits/7183 +CVE-2008-5708 - http://securityreason.com/securityalert/4804 +CVE-2008-5708 - https://www.exploit-db.com/exploits/6729 +CVE-2008-5711 - http://securityreason.com/securityalert/4805 +CVE-2008-5711 - https://www.exploit-db.com/exploits/5102 +CVE-2008-5712 - http://securityreason.com/securityalert/4806 +CVE-2008-5712 - https://www.exploit-db.com/exploits/6704 +CVE-2008-5713 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9385 +CVE-2008-5715 - http://securityreason.com/securityalert/4807 +CVE-2008-5715 - https://www.exploit-db.com/exploits/7554 +CVE-2008-5722 - http://securityreason.com/securityalert/4808 +CVE-2008-5722 - https://www.exploit-db.com/exploits/7578 +CVE-2008-5725 - http://securityreason.com/securityalert/4809 +CVE-2008-5725 - https://www.exploit-db.com/exploits/7533 +CVE-2008-5726 - http://securityreason.com/securityalert/4810 +CVE-2008-5726 - https://www.exploit-db.com/exploits/7565 +CVE-2008-5727 - http://securityreason.com/securityalert/4818 +CVE-2008-5727 - https://www.exploit-db.com/exploits/7559 +CVE-2008-5728 - http://securityreason.com/securityalert/4819 +CVE-2008-5728 - https://www.exploit-db.com/exploits/7560 +CVE-2008-5729 - http://securityreason.com/securityalert/4819 +CVE-2008-5729 - https://www.exploit-db.com/exploits/7560 +CVE-2008-5730 - http://securityreason.com/securityalert/4819 +CVE-2008-5730 - https://www.exploit-db.com/exploits/7560 +CVE-2008-5731 - http://securityreason.com/securityalert/4811 +CVE-2008-5731 - http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php +CVE-2008-5731 - https://www.exploit-db.com/exploits/7556 +CVE-2008-5732 - http://securityreason.com/securityalert/4812 +CVE-2008-5732 - https://www.exploit-db.com/exploits/7537 +CVE-2008-5733 - http://securityreason.com/securityalert/4814 +CVE-2008-5733 - https://www.exploit-db.com/exploits/7598 +CVE-2008-5735 - http://securityreason.com/securityalert/4813 +CVE-2008-5735 - https://www.exploit-db.com/exploits/7536 +CVE-2008-5735 - https://www.exploit-db.com/exploits/7547 +CVE-2008-5736 - http://securityreason.com/securityalert/8124 +CVE-2008-5736 - http://www.exploit-db.com/exploits/16951 +CVE-2008-5736 - https://www.exploit-db.com/exploits/7581 +CVE-2008-5737 - http://securityreason.com/securityalert/4815 +CVE-2008-5737 - https://www.exploit-db.com/exploits/7551 +CVE-2008-5738 - http://securityreason.com/securityalert/4816 +CVE-2008-5738 - https://www.exploit-db.com/exploits/7513 +CVE-2008-5739 - http://securityreason.com/securityalert/4817 +CVE-2008-5739 - https://www.exploit-db.com/exploits/7544 +CVE-2008-5742 - http://securityreason.com/securityalert/4819 +CVE-2008-5742 - https://www.exploit-db.com/exploits/7560 +CVE-2008-5745 - http://securityreason.com/securityalert/4823 +CVE-2008-5745 - https://www.exploit-db.com/exploits/7585 +CVE-2008-5747 - http://securityreason.com/securityalert/4822 +CVE-2008-5748 - http://securityreason.com/securityalert/4820 +CVE-2008-5748 - https://www.exploit-db.com/exploits/7580 +CVE-2008-5749 - http://securityreason.com/securityalert/4821 +CVE-2008-5749 - https://www.exploit-db.com/exploits/7566 +CVE-2008-5750 - http://securityreason.com/securityalert/4821 +CVE-2008-5750 - https://www.exploit-db.com/exploits/7566 +CVE-2008-5751 - http://securityreason.com/securityalert/4824 +CVE-2008-5751 - https://www.exploit-db.com/exploits/7596 +CVE-2008-5752 - http://securityreason.com/securityalert/4836 +CVE-2008-5752 - https://www.exploit-db.com/exploits/7543 +CVE-2008-5753 - http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html +CVE-2008-5753 - http://securityreason.com/securityalert/4835 +CVE-2008-5753 - http://www.kb.cert.org/vuls/id/565580 +CVE-2008-5753 - https://www.exploit-db.com/exploits/37056/ +CVE-2008-5753 - https://www.exploit-db.com/exploits/7571 +CVE-2008-5754 - https://www.exploit-db.com/exploits/7589 +CVE-2008-5754 - https://www.exploit-db.com/exploits/8420 +CVE-2008-5755 - http://securityreason.com/securityalert/4839 +CVE-2008-5755 - https://www.exploit-db.com/exploits/7582 +CVE-2008-5756 - http://securityreason.com/securityalert/4838 +CVE-2008-5756 - https://www.exploit-db.com/exploits/7592 +CVE-2008-5761 - http://securityreason.com/securityalert/4825 +CVE-2008-5761 - https://www.exploit-db.com/exploits/7461 +CVE-2008-5762 - http://securityreason.com/securityalert/4847 +CVE-2008-5762 - https://www.exploit-db.com/exploits/7444 +CVE-2008-5763 - https://www.exploit-db.com/exploits/7444 +CVE-2008-5764 - http://securityreason.com/securityalert/4831 +CVE-2008-5764 - https://www.exploit-db.com/exploits/7481 +CVE-2008-5765 - https://www.exploit-db.com/exploits/7481 +CVE-2008-5766 - http://securityreason.com/securityalert/4830 +CVE-2008-5766 - https://www.exploit-db.com/exploits/7487 +CVE-2008-5767 - http://securityreason.com/securityalert/4829 +CVE-2008-5767 - https://www.exploit-db.com/exploits/7495 +CVE-2008-5768 - http://securityreason.com/securityalert/4854 +CVE-2008-5768 - https://www.exploit-db.com/exploits/7479 +CVE-2008-5770 - http://securityreason.com/securityalert/4826 +CVE-2008-5770 - https://www.exploit-db.com/exploits/7451 +CVE-2008-5771 - http://securityreason.com/securityalert/4826 +CVE-2008-5771 - https://www.exploit-db.com/exploits/7451 +CVE-2008-5772 - http://securityreason.com/securityalert/4848 +CVE-2008-5772 - https://www.exploit-db.com/exploits/7464 +CVE-2008-5773 - http://securityreason.com/securityalert/4840 +CVE-2008-5773 - https://www.exploit-db.com/exploits/7491 +CVE-2008-5774 - https://www.exploit-db.com/exploits/7462 +CVE-2008-5775 - http://securityreason.com/securityalert/4844 +CVE-2008-5775 - https://www.exploit-db.com/exploits/7482 +CVE-2008-5776 - https://www.exploit-db.com/exploits/7482 +CVE-2008-5777 - http://securityreason.com/securityalert/4832 +CVE-2008-5777 - https://www.exploit-db.com/exploits/7480 +CVE-2008-5778 - http://securityreason.com/securityalert/4852 +CVE-2008-5778 - https://www.exploit-db.com/exploits/7489 +CVE-2008-5779 - http://securityreason.com/securityalert/4849 +CVE-2008-5779 - https://www.exploit-db.com/exploits/7474 +CVE-2008-5780 - http://securityreason.com/securityalert/4842 +CVE-2008-5780 - https://www.exploit-db.com/exploits/7466 +CVE-2008-5781 - http://securityreason.com/securityalert/4850 +CVE-2008-5781 - https://www.exploit-db.com/exploits/7483 +CVE-2008-5782 - http://securityreason.com/securityalert/4845 +CVE-2008-5782 - https://www.exploit-db.com/exploits/7072 +CVE-2008-5783 - http://securityreason.com/securityalert/4843 +CVE-2008-5783 - https://www.exploit-db.com/exploits/7069 +CVE-2008-5784 - https://www.exploit-db.com/exploits/7063 +CVE-2008-5785 - http://securityreason.com/securityalert/4846 +CVE-2008-5785 - https://www.exploit-db.com/exploits/7061 +CVE-2008-5787 - http://securityreason.com/securityalert/4851 +CVE-2008-5787 - https://www.exploit-db.com/exploits/7019 +CVE-2008-5788 - http://securityreason.com/securityalert/4833 +CVE-2008-5788 - https://www.exploit-db.com/exploits/7052 +CVE-2008-5789 - http://securityreason.com/securityalert/4827 +CVE-2008-5789 - https://www.exploit-db.com/exploits/7040 +CVE-2008-5790 - https://www.exploit-db.com/exploits/7039 +CVE-2008-5792 - http://securityreason.com/securityalert/4853 +CVE-2008-5792 - https://www.exploit-db.com/exploits/7059 +CVE-2008-5793 - http://securityreason.com/securityalert/4841 +CVE-2008-5793 - https://www.exploit-db.com/exploits/7038 +CVE-2008-5794 - http://securityreason.com/securityalert/4834 +CVE-2008-5794 - https://www.exploit-db.com/exploits/7022 +CVE-2008-5802 - https://www.exploit-db.com/exploits/7048 +CVE-2008-5803 - http://securityreason.com/securityalert/4855 +CVE-2008-5803 - https://www.exploit-db.com/exploits/7041 +CVE-2008-5804 - http://securityreason.com/securityalert/4828 +CVE-2008-5804 - https://www.exploit-db.com/exploits/7050 +CVE-2008-5805 - https://www.exploit-db.com/exploits/7047 +CVE-2008-5806 - http://securityreason.com/securityalert/4837 +CVE-2008-5806 - https://www.exploit-db.com/exploits/7023 +CVE-2008-5810 - http://securityreason.com/securityalert/4856 +CVE-2008-5811 - http://securityreason.com/securityalert/4857 +CVE-2008-5811 - https://www.exploit-db.com/exploits/7587 +CVE-2008-5815 - http://securityreason.com/securityalert/4859 +CVE-2008-5815 - https://www.exploit-db.com/exploits/7621 +CVE-2008-5816 - http://securityreason.com/securityalert/4858 +CVE-2008-5816 - https://www.exploit-db.com/exploits/7570 +CVE-2008-5817 - http://securityreason.com/securityalert/4860 +CVE-2008-5817 - https://www.exploit-db.com/exploits/7602 +CVE-2008-5818 - http://securityreason.com/securityalert/4861 +CVE-2008-5818 - https://www.exploit-db.com/exploits/7604 +CVE-2008-5819 - http://securityreason.com/securityalert/4864 +CVE-2008-5819 - https://www.exploit-db.com/exploits/7603 +CVE-2008-5820 - http://securityreason.com/securityalert/4863 +CVE-2008-5820 - https://www.exploit-db.com/exploits/7619 +CVE-2008-5821 - http://packetstormsecurity.org/0812-exploits/safari_webkit_ml.txt +CVE-2008-5822 - http://www.packetstormsecurity.org/0812-exploits/mzff_libxul_ml.txt +CVE-2008-5828 - http://securityreason.com/securityalert/4862 +CVE-2008-5838 - https://www.exploit-db.com/exploits/6398 +CVE-2008-5840 - http://securityreason.com/securityalert/4865 +CVE-2008-5840 - https://www.exploit-db.com/exploits/6526 +CVE-2008-5841 - http://securityreason.com/securityalert/4867 +CVE-2008-5841 - https://www.exploit-db.com/exploits/6540 +CVE-2008-5847 - http://securityreason.com/securityalert/4868 +CVE-2008-5847 - https://www.exploit-db.com/exploits/7529 +CVE-2008-5851 - http://securityreason.com/securityalert/4869 +CVE-2008-5851 - https://www.exploit-db.com/exploits/7522 +CVE-2008-5852 - http://securityreason.com/securityalert/4876 +CVE-2008-5852 - https://www.exploit-db.com/exploits/7534 +CVE-2008-5853 - http://securityreason.com/securityalert/4872 +CVE-2008-5853 - https://www.exploit-db.com/exploits/7532 +CVE-2008-5854 - http://securityreason.com/securityalert/4873 +CVE-2008-5854 - https://www.exploit-db.com/exploits/7526 +CVE-2008-5855 - http://securityreason.com/securityalert/4873 +CVE-2008-5855 - https://www.exploit-db.com/exploits/7526 +CVE-2008-5856 - https://www.exploit-db.com/exploits/7579 +CVE-2008-5859 - http://securityreason.com/securityalert/4868 +CVE-2008-5859 - https://www.exploit-db.com/exploits/7529 +CVE-2008-5860 - http://securityreason.com/securityalert/4868 +CVE-2008-5860 - https://www.exploit-db.com/exploits/7529 +CVE-2008-5861 - http://securityreason.com/securityalert/4875 +CVE-2008-5861 - https://www.exploit-db.com/exploits/7527 +CVE-2008-5862 - http://securityreason.com/securityalert/4877 +CVE-2008-5862 - https://www.exploit-db.com/exploits/7521 +CVE-2008-5863 - http://securityreason.com/securityalert/4874 +CVE-2008-5863 - https://www.exploit-db.com/exploits/7530 +CVE-2008-5864 - http://securityreason.com/securityalert/4871 +CVE-2008-5864 - https://www.exploit-db.com/exploits/7539 +CVE-2008-5865 - http://securityreason.com/securityalert/4870 +CVE-2008-5865 - https://www.exploit-db.com/exploits/7538 +CVE-2008-5866 - http://securityreason.com/securityalert/4884 +CVE-2008-5868 - http://securityreason.com/securityalert/4882 +CVE-2008-5868 - https://www.exploit-db.com/exploits/7608 +CVE-2008-5869 - http://securityreason.com/securityalert/4884 +CVE-2008-5870 - http://securityreason.com/securityalert/4878 +CVE-2008-5870 - https://www.exploit-db.com/exploits/6673 +CVE-2008-5873 - http://securityreason.com/securityalert/4883 +CVE-2008-5873 - https://www.exploit-db.com/exploits/6691 +CVE-2008-5874 - https://www.exploit-db.com/exploits/7568 +CVE-2008-5874 - https://www.exploit-db.com/exploits/7575 +CVE-2008-5875 - http://securityreason.com/securityalert/4880 +CVE-2008-5875 - https://www.exploit-db.com/exploits/7567 +CVE-2008-5877 - http://securityreason.com/securityalert/4881 +CVE-2008-5877 - https://www.exploit-db.com/exploits/7515 +CVE-2008-5878 - http://securityreason.com/securityalert/4881 +CVE-2008-5878 - https://www.exploit-db.com/exploits/7515 +CVE-2008-5879 - http://securityreason.com/securityalert/4881 +CVE-2008-5879 - https://www.exploit-db.com/exploits/7515 +CVE-2008-5880 - http://securityreason.com/securityalert/4886 +CVE-2008-5880 - https://www.exploit-db.com/exploits/7518 +CVE-2008-5881 - http://securityreason.com/securityalert/4888 +CVE-2008-5881 - https://www.exploit-db.com/exploits/7687 +CVE-2008-5882 - http://securityreason.com/securityalert/4889 +CVE-2008-5883 - http://securityreason.com/securityalert/4897 +CVE-2008-5883 - https://www.exploit-db.com/exploits/6734 +CVE-2008-5884 - http://securityreason.com/securityalert/4900 +CVE-2008-5884 - https://www.exploit-db.com/exploits/6668 +CVE-2008-5885 - http://securityreason.com/securityalert/4898 +CVE-2008-5885 - https://www.exploit-db.com/exploits/7446 +CVE-2008-5886 - http://securityreason.com/securityalert/4899 +CVE-2008-5886 - https://www.exploit-db.com/exploits/7445 +CVE-2008-5887 - http://securityreason.com/securityalert/4901 +CVE-2008-5888 - http://securityreason.com/securityalert/4902 +CVE-2008-5888 - https://www.exploit-db.com/exploits/7486 +CVE-2008-5889 - https://www.exploit-db.com/exploits/7486 +CVE-2008-5890 - https://www.exploit-db.com/exploits/7517 +CVE-2008-5892 - http://securityreason.com/securityalert/4903 +CVE-2008-5892 - https://www.exploit-db.com/exploits/7485 +CVE-2008-5893 - http://securityreason.com/securityalert/4903 +CVE-2008-5893 - https://www.exploit-db.com/exploits/7485 +CVE-2008-5894 - http://securityreason.com/securityalert/4904 +CVE-2008-5894 - https://www.exploit-db.com/exploits/7458 +CVE-2008-5895 - http://securityreason.com/securityalert/4905 +CVE-2008-5895 - https://www.exploit-db.com/exploits/7476 +CVE-2008-5896 - http://securityreason.com/securityalert/4906 +CVE-2008-5896 - https://www.exploit-db.com/exploits/7472 +CVE-2008-5897 - https://www.exploit-db.com/exploits/7470 +CVE-2008-5898 - http://securityreason.com/securityalert/4907 +CVE-2008-5898 - https://www.exploit-db.com/exploits/7468 +CVE-2008-5899 - https://www.exploit-db.com/exploits/7469 +CVE-2008-5900 - http://securityreason.com/securityalert/4909 +CVE-2008-5900 - https://www.exploit-db.com/exploits/7471 +CVE-2008-5901 - http://securityreason.com/securityalert/4908 +CVE-2008-5901 - https://www.exploit-db.com/exploits/7449 +CVE-2008-5902 - http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf +CVE-2008-5903 - http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf +CVE-2008-5904 - http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf +CVE-2008-5905 - http://ktorrent.org/?q=node/23 +CVE-2008-5906 - http://ktorrent.org/?q=node/23 +CVE-2008-5912 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 +CVE-2008-5913 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 +CVE-2008-5914 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 +CVE-2008-5915 - http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 +CVE-2008-5916 - http://securityreason.com/securityalert/4922 +CVE-2008-5918 - http://securityreason.com/securityalert/4928 +CVE-2008-5918 - https://www.exploit-db.com/exploits/6822 +CVE-2008-5919 - http://securityreason.com/securityalert/4928 +CVE-2008-5919 - https://www.exploit-db.com/exploits/6822 +CVE-2008-5920 - http://securityreason.com/securityalert/4928 +CVE-2008-5920 - https://www.exploit-db.com/exploits/6822 +CVE-2008-5921 - http://securityreason.com/securityalert/4924 +CVE-2008-5921 - https://www.exploit-db.com/exploits/7439 +CVE-2008-5922 - http://securityreason.com/securityalert/4926 +CVE-2008-5922 - https://www.exploit-db.com/exploits/7459 +CVE-2008-5923 - http://packetstormsecurity.org/0812-exploits/aspdevxmdiary-sqldisclose.txt +CVE-2008-5925 - http://packetstormsecurity.org/0812-exploits/aspdevxmdiary-sqldisclose.txt +CVE-2008-5926 - http://securityreason.com/securityalert/4925 +CVE-2008-5926 - https://www.exploit-db.com/exploits/7447 +CVE-2008-5927 - http://securityreason.com/securityalert/4927 +CVE-2008-5927 - https://www.exploit-db.com/exploits/7443 +CVE-2008-5928 - http://securityreason.com/securityalert/4929 +CVE-2008-5928 - https://www.exploit-db.com/exploits/7453 +CVE-2008-5929 - http://securityreason.com/securityalert/4930 +CVE-2008-5929 - https://www.exploit-db.com/exploits/7438 +CVE-2008-5930 - http://securityreason.com/securityalert/4931 +CVE-2008-5930 - https://www.exploit-db.com/exploits/7436 +CVE-2008-5931 - http://securityreason.com/securityalert/4931 +CVE-2008-5931 - https://www.exploit-db.com/exploits/7436 +CVE-2008-5932 - http://securityreason.com/securityalert/4932 +CVE-2008-5932 - https://www.exploit-db.com/exploits/7450 +CVE-2008-5933 - http://securityreason.com/securityalert/4933 +CVE-2008-5933 - https://www.exploit-db.com/exploits/7465 +CVE-2008-5934 - http://securityreason.com/securityalert/4933 +CVE-2008-5934 - https://www.exploit-db.com/exploits/7465 +CVE-2008-5935 - http://securityreason.com/securityalert/4934 +CVE-2008-5936 - https://www.exploit-db.com/exploits/6734 +CVE-2008-5937 - http://securityreason.com/securityalert/4939 +CVE-2008-5937 - https://www.exploit-db.com/exploits/6672 +CVE-2008-5938 - http://securityreason.com/securityalert/4940 +CVE-2008-5938 - https://www.exploit-db.com/exploits/7204 +CVE-2008-5939 - http://securityreason.com/securityalert/4940 +CVE-2008-5939 - https://www.exploit-db.com/exploits/7204 +CVE-2008-5947 - http://packetstormsecurity.org/0808-exploits/yapbb-rfi.txt +CVE-2008-5948 - https://www.exploit-db.com/exploits/7345 +CVE-2008-5949 - https://www.exploit-db.com/exploits/7336 +CVE-2008-5950 - https://www.exploit-db.com/exploits/7339 +CVE-2008-5951 - https://www.exploit-db.com/exploits/7339 +CVE-2008-5952 - https://www.exploit-db.com/exploits/7305 +CVE-2008-5953 - https://www.exploit-db.com/exploits/7304 +CVE-2008-5955 - https://www.exploit-db.com/exploits/7337 +CVE-2008-5956 - https://www.exploit-db.com/exploits/7337 +CVE-2008-5957 - https://www.exploit-db.com/exploits/7343 +CVE-2008-5958 - https://www.exploit-db.com/exploits/7295 +CVE-2008-5959 - https://www.exploit-db.com/exploits/7276 +CVE-2008-5962 - https://www.exploit-db.com/exploits/7344 +CVE-2008-5963 - https://www.exploit-db.com/exploits/7344 +CVE-2008-5965 - https://www.exploit-db.com/exploits/6737 +CVE-2008-5966 - https://www.exploit-db.com/exploits/6735 +CVE-2008-5967 - https://www.exploit-db.com/exploits/6519 +CVE-2008-5968 - https://www.exploit-db.com/exploits/6519 +CVE-2008-5969 - https://www.exploit-db.com/exploits/7323 +CVE-2008-5972 - https://www.exploit-db.com/exploits/7302 +CVE-2008-5973 - https://www.exploit-db.com/exploits/7281 +CVE-2008-5974 - https://www.exploit-db.com/exploits/7283 +CVE-2008-5976 - http://www.packetstormsecurity.org/0812-exploits/phpjobwebsite-cmsqlxss.txt +CVE-2008-5977 - http://www.packetstormsecurity.org/0812-exploits/phpjobwebsite-cmsqlxss.txt +CVE-2008-5978 - https://www.exploit-db.com/exploits/7319 +CVE-2008-5979 - https://www.exploit-db.com/exploits/7319 +CVE-2008-5980 - https://www.exploit-db.com/exploits/7319 +CVE-2008-5981 - https://www.exploit-db.com/exploits/7318 +CVE-2008-5983 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2008-5988 - https://www.exploit-db.com/exploits/6555 +CVE-2008-5989 - https://www.exploit-db.com/exploits/6553 +CVE-2008-5990 - https://www.exploit-db.com/exploits/6551 +CVE-2008-5991 - https://www.exploit-db.com/exploits/6552 +CVE-2008-5992 - https://www.exploit-db.com/exploits/6549 +CVE-2008-5993 - https://www.exploit-db.com/exploits/6558 +CVE-2008-5997 - http://packetstormsecurity.org/0809-exploits/omnicom-traverse.txt +CVE-2008-5998 - http://drupal.org/node/312968 +CVE-2008-5999 - http://drupal.org/node/312968 +CVE-2008-6001 - https://www.exploit-db.com/exploits/6557 +CVE-2008-6002 - https://www.exploit-db.com/exploits/6556 +CVE-2008-6003 - https://www.exploit-db.com/exploits/6561 +CVE-2008-6004 - https://www.exploit-db.com/exploits/6561 +CVE-2008-6006 - https://www.exploit-db.com/exploits/6632 +CVE-2008-6007 - https://www.exploit-db.com/exploits/6637 +CVE-2008-6009 - https://www.exploit-db.com/exploits/6635 +CVE-2008-6010 - https://www.exploit-db.com/exploits/6631 +CVE-2008-6011 - https://www.exploit-db.com/exploits/6631 +CVE-2008-6011 - https://www.exploit-db.com/exploits/6634 +CVE-2008-6012 - https://www.exploit-db.com/exploits/6639 +CVE-2008-6014 - https://www.exploit-db.com/exploits/6636 +CVE-2008-6017 - https://www.exploit-db.com/exploits/7514 +CVE-2008-6018 - https://www.exploit-db.com/exploits/7519 +CVE-2008-6022 - https://www.exploit-db.com/exploits/6254 +CVE-2008-6023 - https://www.exploit-db.com/exploits/6254 +CVE-2008-6025 - https://www.exploit-db.com/exploits/6530 +CVE-2008-6028 - https://www.exploit-db.com/exploits/6535 +CVE-2008-6029 - https://www.exploit-db.com/exploits/6527 +CVE-2008-6030 - https://www.exploit-db.com/exploits/6517 +CVE-2008-6031 - https://www.exploit-db.com/exploits/6524 +CVE-2008-6032 - https://www.exploit-db.com/exploits/6529 +CVE-2008-6033 - https://www.exploit-db.com/exploits/6525 +CVE-2008-6035 - http://packetstormsecurity.org/0809-exploits/achievo-xss.txt +CVE-2008-6036 - https://www.exploit-db.com/exploits/6533 +CVE-2008-6037 - https://www.exploit-db.com/exploits/6522 +CVE-2008-6042 - https://www.exploit-db.com/exploits/6518 +CVE-2008-6050 - https://www.exploit-db.com/exploits/7504 +CVE-2008-6057 - https://www.exploit-db.com/exploits/7493 +CVE-2008-6064 - https://www.exploit-db.com/exploits/4888 +CVE-2008-6068 - https://www.exploit-db.com/exploits/5748 +CVE-2008-6074 - https://www.exploit-db.com/exploits/6806 +CVE-2008-6076 - https://www.exploit-db.com/exploits/6802 +CVE-2008-6077 - https://www.exploit-db.com/exploits/6808 +CVE-2008-6078 - https://www.exploit-db.com/exploits/6796 +CVE-2008-6080 - https://www.exploit-db.com/exploits/6809 +CVE-2008-6081 - https://www.exploit-db.com/exploits/5468 +CVE-2008-6082 - https://www.exploit-db.com/exploits/6753 +CVE-2008-6083 - https://www.exploit-db.com/exploits/6816 +CVE-2008-6084 - https://www.exploit-db.com/exploits/6803 +CVE-2008-6086 - https://www.exploit-db.com/exploits/6710 +CVE-2008-6087 - https://www.exploit-db.com/exploits/6710 +CVE-2008-6088 - https://www.exploit-db.com/exploits/6709 +CVE-2008-6089 - https://www.exploit-db.com/exploits/6715 +CVE-2008-6090 - https://www.exploit-db.com/exploits/6713 +CVE-2008-6091 - https://www.exploit-db.com/exploits/6642 +CVE-2008-6092 - https://www.exploit-db.com/exploits/6649 +CVE-2008-6093 - https://www.exploit-db.com/exploits/6644 +CVE-2008-6099 - https://www.exploit-db.com/exploits/6648 +CVE-2008-6100 - https://www.exploit-db.com/exploits/6643 +CVE-2008-6101 - https://www.exploit-db.com/exploits/6909 +CVE-2008-6101 - https://www.exploit-db.com/exploits/9387 +CVE-2008-6102 - https://www.exploit-db.com/exploits/6650 +CVE-2008-6103 - http://packetstormsecurity.org/0809-exploits/a4deskphp-rfi.txt +CVE-2008-6105 - http://www-1.ibm.com/support/docview.wss?uid=swg1PJ33180 +CVE-2008-6106 - http://www-1.ibm.com/support/docview.wss?uid=swg1PJ33180 +CVE-2008-6108 - https://www.exploit-db.com/exploits/5758 +CVE-2008-6111 - https://www.exploit-db.com/exploits/7186 +CVE-2008-6112 - https://www.exploit-db.com/exploits/7190 +CVE-2008-6114 - https://www.exploit-db.com/exploits/7184 +CVE-2008-6115 - https://www.exploit-db.com/exploits/7195 +CVE-2008-6116 - https://www.exploit-db.com/exploits/7182 +CVE-2008-6117 - https://www.exploit-db.com/exploits/7202 +CVE-2008-6118 - https://www.exploit-db.com/exploits/7205 +CVE-2008-6123 - http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367 +CVE-2008-6129 - http://marc.info/?l=bugtraq&m=122278832621348&w=2 +CVE-2008-6130 - http://marc.info/?l=bugtraq&m=122278832621348&w=2 +CVE-2008-6131 - http://marc.info/?l=bugtraq&m=122278832621348&w=2 +CVE-2008-6133 - https://www.exploit-db.com/exploits/6659 +CVE-2008-6138 - https://www.exploit-db.com/exploits/6703 +CVE-2008-6139 - https://www.exploit-db.com/exploits/6703 +CVE-2008-6142 - https://www.exploit-db.com/exploits/7624 +CVE-2008-6143 - https://www.exploit-db.com/exploits/7597 +CVE-2008-6146 - https://www.exploit-db.com/exploits/7593 +CVE-2008-6147 - https://www.exploit-db.com/exploits/7599 +CVE-2008-6148 - https://www.exploit-db.com/exploits/7573 +CVE-2008-6149 - https://www.exploit-db.com/exploits/7574 +CVE-2008-6150 - https://www.exploit-db.com/exploits/7613 +CVE-2008-6151 - https://www.exploit-db.com/exploits/7609 +CVE-2008-6152 - https://www.exploit-db.com/exploits/7610 +CVE-2008-6153 - https://www.exploit-db.com/exploits/7627 +CVE-2008-6154 - https://www.exploit-db.com/exploits/6701 +CVE-2008-6156 - https://www.exploit-db.com/exploits/6702 +CVE-2008-6157 - https://www.exploit-db.com/exploits/7613 +CVE-2008-6162 - https://www.exploit-db.com/exploits/6652 +CVE-2008-6163 - https://www.exploit-db.com/exploits/6655 +CVE-2008-6165 - https://www.exploit-db.com/exploits/6814 +CVE-2008-6166 - https://www.exploit-db.com/exploits/6827 +CVE-2008-6167 - https://www.exploit-db.com/exploits/6821 +CVE-2008-6168 - https://www.exploit-db.com/exploits/6821 +CVE-2008-6172 - https://www.exploit-db.com/exploits/6817 +CVE-2008-6175 - https://www.exploit-db.com/exploits/6815 +CVE-2008-6177 - https://www.exploit-db.com/exploits/6797 +CVE-2008-6178 - https://www.exploit-db.com/exploits/8060 +CVE-2008-6179 - https://www.exploit-db.com/exploits/6746 +CVE-2008-6180 - https://www.exploit-db.com/exploits/6739 +CVE-2008-6181 - https://www.exploit-db.com/exploits/6724 +CVE-2008-6182 - https://www.exploit-db.com/exploits/6723 +CVE-2008-6183 - https://www.exploit-db.com/exploits/6740 +CVE-2008-6184 - https://www.exploit-db.com/exploits/6730 +CVE-2008-6185 - https://www.exploit-db.com/exploits/6719 +CVE-2008-6186 - https://www.exploit-db.com/exploits/6742 +CVE-2008-6187 - https://www.exploit-db.com/exploits/6707 +CVE-2008-6188 - https://www.exploit-db.com/exploits/6708 +CVE-2008-6190 - http://packetstormsecurity.org/0810-exploits/eebcms-xss.txt +CVE-2008-6193 - https://www.exploit-db.com/exploits/5913 +CVE-2008-6197 - https://www.exploit-db.com/exploits/5350 +CVE-2008-6198 - https://www.exploit-db.com/exploits/5379 +CVE-2008-6199 - https://www.exploit-db.com/exploits/5465 +CVE-2008-6201 - https://www.exploit-db.com/exploits/5449 +CVE-2008-6202 - https://www.exploit-db.com/exploits/5373 +CVE-2008-6204 - https://www.exploit-db.com/exploits/5409 +CVE-2008-6209 - https://www.exploit-db.com/exploits/5359 +CVE-2008-6209 - https://www.exploit-db.com/exploits/6377 +CVE-2008-6210 - https://www.exploit-db.com/exploits/5415 +CVE-2008-6213 - https://www.exploit-db.com/exploits/6874 +CVE-2008-6214 - https://www.exploit-db.com/exploits/6877 +CVE-2008-6215 - https://www.exploit-db.com/exploits/6876 +CVE-2008-6216 - https://www.exploit-db.com/exploits/6876 +CVE-2008-6220 - https://www.exploit-db.com/exploits/6987 +CVE-2008-6221 - https://www.exploit-db.com/exploits/7002 +CVE-2008-6222 - https://www.exploit-db.com/exploits/6980 +CVE-2008-6223 - https://www.exploit-db.com/exploits/6992 +CVE-2008-6224 - https://www.exploit-db.com/exploits/6992 +CVE-2008-6225 - https://www.exploit-db.com/exploits/7009 +CVE-2008-6226 - https://www.exploit-db.com/exploits/7003 +CVE-2008-6227 - https://www.exploit-db.com/exploits/6999 +CVE-2008-6228 - https://www.exploit-db.com/exploits/6999 +CVE-2008-6230 - https://www.exploit-db.com/exploits/6997 +CVE-2008-6231 - https://www.exploit-db.com/exploits/7000 +CVE-2008-6232 - https://www.exploit-db.com/exploits/6998 +CVE-2008-6233 - https://www.exploit-db.com/exploits/7007 +CVE-2008-6234 - https://www.exploit-db.com/exploits/5207 +CVE-2008-6237 - https://www.exploit-db.com/exploits/6915 +CVE-2008-6241 - https://www.exploit-db.com/exploits/7615 +CVE-2008-6242 - https://www.exploit-db.com/exploits/6922 +CVE-2008-6243 - https://www.exploit-db.com/exploits/6903 +CVE-2008-6244 - https://www.exploit-db.com/exploits/6924 +CVE-2008-6245 - https://www.exploit-db.com/exploits/6910 +CVE-2008-6246 - https://www.exploit-db.com/exploits/6913 +CVE-2008-6247 - https://www.exploit-db.com/exploits/6920 +CVE-2008-6248 - https://www.exploit-db.com/exploits/6075 +CVE-2008-6249 - https://www.exploit-db.com/exploits/6075 +CVE-2008-6250 - http://e-rdc.org/v1/news.php?readmore=102 +CVE-2008-6250 - https://www.exploit-db.com/exploits/6079 +CVE-2008-6251 - https://www.exploit-db.com/exploits/7143 +CVE-2008-6252 - https://www.exploit-db.com/exploits/7088 +CVE-2008-6253 - https://www.exploit-db.com/exploits/7153 +CVE-2008-6254 - https://www.exploit-db.com/exploits/7144 +CVE-2008-6256 - http://www.waraxe.us/advisory-68.html +CVE-2008-6257 - https://www.exploit-db.com/exploits/7137 +CVE-2008-6258 - https://www.exploit-db.com/exploits/7141 +CVE-2008-6259 - https://www.exploit-db.com/exploits/7141 +CVE-2008-6260 - https://www.exploit-db.com/exploits/7148 +CVE-2008-6261 - https://www.exploit-db.com/exploits/7138 +CVE-2008-6263 - https://www.exploit-db.com/exploits/7147 +CVE-2008-6264 - http://packetstormsecurity.org/0811-exploits/slidepopups-sql.txt +CVE-2008-6264 - https://www.exploit-db.com/exploits/7036 +CVE-2008-6265 - https://www.exploit-db.com/exploits/7065 +CVE-2008-6267 - https://www.exploit-db.com/exploits/6974 +CVE-2008-6268 - https://www.exploit-db.com/exploits/6974 +CVE-2008-6269 - https://www.exploit-db.com/exploits/6955 +CVE-2008-6270 - https://www.exploit-db.com/exploits/6969 +CVE-2008-6271 - https://www.exploit-db.com/exploits/6973 +CVE-2008-6272 - https://www.exploit-db.com/exploits/6969 +CVE-2008-6274 - https://www.exploit-db.com/exploits/7248 +CVE-2008-6277 - http://packetstormsecurity.com/0811-exploits/rakhi-sqlxssfpd.txt +CVE-2008-6277 - https://www.exploit-db.com/exploits/7250 +CVE-2008-6278 - http://packetstormsecurity.com/0811-exploits/rakhi-sqlxssfpd.txt +CVE-2008-6279 - http://packetstormsecurity.com/0811-exploits/rakhi-sqlxssfpd.txt +CVE-2008-6280 - http://packetstormsecurity.org/0811-exploits/linksys-xss.txt +CVE-2008-6281 - https://www.exploit-db.com/exploits/7268 +CVE-2008-6282 - https://www.exploit-db.com/exploits/7237 +CVE-2008-6284 - https://www.exploit-db.com/exploits/7311 +CVE-2008-6285 - https://www.exploit-db.com/exploits/7284 +CVE-2008-6286 - https://www.exploit-db.com/exploits/7280 +CVE-2008-6287 - https://www.exploit-db.com/exploits/7310 +CVE-2008-6288 - https://www.exploit-db.com/exploits/6126 +CVE-2008-6289 - https://www.exploit-db.com/exploits/6988 +CVE-2008-6290 - https://www.exploit-db.com/exploits/6990 +CVE-2008-6291 - https://www.exploit-db.com/exploits/6966 +CVE-2008-6292 - https://www.exploit-db.com/exploits/6968 +CVE-2008-6293 - https://www.exploit-db.com/exploits/6964 +CVE-2008-6294 - https://www.exploit-db.com/exploits/6965 +CVE-2008-6296 - https://www.exploit-db.com/exploits/6954 +CVE-2008-6297 - http://lostmon.blogspot.com/2008/11/dhcart-multiple-variable-xss-and-stored.html +CVE-2008-6301 - https://www.exploit-db.com/exploits/6995 +CVE-2008-6302 - https://www.exploit-db.com/exploits/7106 +CVE-2008-6303 - https://www.exploit-db.com/exploits/7176 +CVE-2008-6305 - https://www.exploit-db.com/exploits/7155 +CVE-2008-6307 - https://www.exploit-db.com/exploits/7156 +CVE-2008-6308 - https://www.exploit-db.com/exploits/7159 +CVE-2008-6309 - https://www.exploit-db.com/exploits/7166 +CVE-2008-6310 - https://www.exploit-db.com/exploits/7163 +CVE-2008-6311 - https://www.exploit-db.com/exploits/7411 +CVE-2008-6312 - https://www.exploit-db.com/exploits/7397 +CVE-2008-6313 - https://www.exploit-db.com/exploits/7417 +CVE-2008-6314 - https://www.exploit-db.com/exploits/7386 +CVE-2008-6315 - https://www.exploit-db.com/exploits/7392 +CVE-2008-6316 - https://www.exploit-db.com/exploits/7392 +CVE-2008-6317 - https://www.exploit-db.com/exploits/7399 +CVE-2008-6318 - https://www.exploit-db.com/exploits/7399 +CVE-2008-6319 - https://www.exploit-db.com/exploits/7413 +CVE-2008-6320 - https://www.exploit-db.com/exploits/7412 +CVE-2008-6321 - https://www.exploit-db.com/exploits/7412 +CVE-2008-6322 - https://www.exploit-db.com/exploits/7415 +CVE-2008-6323 - https://www.exploit-db.com/exploits/7414 +CVE-2008-6324 - https://www.exploit-db.com/exploits/7416 +CVE-2008-6327 - https://www.exploit-db.com/exploits/7397 +CVE-2008-6328 - https://www.exploit-db.com/exploits/5797 +CVE-2008-6328 - https://www.exploit-db.com/exploits/7411 +CVE-2008-6329 - https://www.exploit-db.com/exploits/7164 +CVE-2008-6330 - https://www.exploit-db.com/exploits/7160 +CVE-2008-6332 - https://www.exploit-db.com/exploits/7146 +CVE-2008-6333 - https://www.exploit-db.com/exploits/7541 +CVE-2008-6334 - https://www.exploit-db.com/exploits/7525 +CVE-2008-6335 - https://www.exploit-db.com/exploits/7524 +CVE-2008-6336 - https://www.exploit-db.com/exploits/7542 +CVE-2008-6337 - https://www.exploit-db.com/exploits/7546 +CVE-2008-6345 - https://www.exploit-db.com/exploits/7548 +CVE-2008-6347 - https://www.exploit-db.com/exploits/6976 +CVE-2008-6348 - https://www.exploit-db.com/exploits/7016 +CVE-2008-6349 - https://www.exploit-db.com/exploits/7029 +CVE-2008-6350 - https://www.exploit-db.com/exploits/7035 +CVE-2008-6351 - https://www.exploit-db.com/exploits/7035 +CVE-2008-6352 - https://www.exploit-db.com/exploits/7432 +CVE-2008-6353 - https://www.exploit-db.com/exploits/7429 +CVE-2008-6354 - https://www.exploit-db.com/exploits/7427 +CVE-2008-6355 - https://www.exploit-db.com/exploits/7428 +CVE-2008-6356 - https://www.exploit-db.com/exploits/7419 +CVE-2008-6357 - https://www.exploit-db.com/exploits/7420 +CVE-2008-6358 - https://www.exploit-db.com/exploits/7433 +CVE-2008-6359 - http://packetstormsecurity.org/files/110772/Maxs-Guestbook-1.0-Local-File-Inclusion-Path-Disclosure.html +CVE-2008-6361 - https://www.exploit-db.com/exploits/7422 +CVE-2008-6362 - https://www.exploit-db.com/exploits/7346 +CVE-2008-6363 - https://www.exploit-db.com/exploits/7362 +CVE-2008-6364 - https://www.exploit-db.com/exploits/7425 +CVE-2008-6365 - https://www.exploit-db.com/exploits/7424 +CVE-2008-6366 - https://www.exploit-db.com/exploits/7423 +CVE-2008-6367 - https://www.exploit-db.com/exploits/7435 +CVE-2008-6369 - https://www.exploit-db.com/exploits/7244 +CVE-2008-6370 - https://www.exploit-db.com/exploits/7244 +CVE-2008-6371 - https://www.exploit-db.com/exploits/7254 +CVE-2008-6372 - https://www.exploit-db.com/exploits/7271 +CVE-2008-6374 - https://www.exploit-db.com/exploits/7325 +CVE-2008-6375 - http://packetstormsecurity.org/0812-exploits/jbook-disclosesql.txt +CVE-2008-6376 - http://packetstormsecurity.org/0812-exploits/jbook-disclosesql.txt +CVE-2008-6377 - https://www.exploit-db.com/exploits/7335 +CVE-2008-6378 - https://www.exploit-db.com/exploits/7327 +CVE-2008-6379 - https://www.exploit-db.com/exploits/7326 +CVE-2008-6380 - https://www.exploit-db.com/exploits/7298 +CVE-2008-6381 - https://www.exploit-db.com/exploits/7317 +CVE-2008-6382 - https://www.exploit-db.com/exploits/7316 +CVE-2008-6386 - http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt +CVE-2008-6387 - https://www.exploit-db.com/exploits/7303 +CVE-2008-6388 - https://www.exploit-db.com/exploits/7324 +CVE-2008-6389 - https://www.exploit-db.com/exploits/7333 +CVE-2008-6390 - https://www.exploit-db.com/exploits/7254 +CVE-2008-6392 - http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt +CVE-2008-6393 - https://www.exploit-db.com/exploits/7555 +CVE-2008-6394 - https://www.exploit-db.com/exploits/6352 +CVE-2008-6396 - http://packetstormsecurity.org/0809-exploits/uploader6-xss.txt +CVE-2008-6401 - https://www.exploit-db.com/exploits/6542 +CVE-2008-6402 - https://www.exploit-db.com/exploits/6539 +CVE-2008-6403 - https://www.exploit-db.com/exploits/6538 +CVE-2008-6405 - https://www.exploit-db.com/exploits/6545 +CVE-2008-6407 - https://www.exploit-db.com/exploits/6547 +CVE-2008-6408 - https://www.exploit-db.com/exploits/6547 +CVE-2008-6409 - https://www.exploit-db.com/exploits/6547 +CVE-2008-6410 - https://www.exploit-db.com/exploits/6543 +CVE-2008-6411 - https://www.exploit-db.com/exploits/6500 +CVE-2008-6414 - https://www.exploit-db.com/exploits/6550 +CVE-2008-6419 - https://www.exploit-db.com/exploits/5701 +CVE-2008-6420 - https://www.exploit-db.com/exploits/5711 +CVE-2008-6421 - https://www.exploit-db.com/exploits/5707 +CVE-2008-6422 - https://www.exploit-db.com/exploits/5699 +CVE-2008-6423 - https://www.exploit-db.com/exploits/5704 +CVE-2008-6424 - http://vuln.sg/FFFTP196b-en.html +CVE-2008-6425 - https://www.exploit-db.com/exploits/5713 +CVE-2008-6427 - http://e-rdc.org/v1/news.php?readmore=91 +CVE-2008-6427 - https://www.exploit-db.com/exploits/5698 +CVE-2008-6427 - https://www.exploit-db.com/exploits/5928 +CVE-2008-6429 - https://www.exploit-db.com/exploits/5708 +CVE-2008-6430 - https://www.exploit-db.com/exploits/5714 +CVE-2008-6438 - https://www.exploit-db.com/exploits/5666 +CVE-2008-6438 - https://www.exploit-db.com/exploits/6346 +CVE-2008-6438 - https://www.exploit-db.com/exploits/6856 +CVE-2008-6441 - http://aluigi.altervista.org/adv/unrealcfs-adv.txt +CVE-2008-6446 - https://www.exploit-db.com/exploits/7322 +CVE-2008-6447 - https://www.exploit-db.com/exploits/7402 +CVE-2008-6451 - https://www.exploit-db.com/exploits/6505 +CVE-2008-6452 - https://www.exploit-db.com/exploits/6504 +CVE-2008-6453 - https://www.exploit-db.com/exploits/6520 +CVE-2008-6454 - https://www.exploit-db.com/exploits/6511 +CVE-2008-6464 - https://www.exploit-db.com/exploits/6508 +CVE-2008-6466 - https://www.exploit-db.com/exploits/6516 +CVE-2008-6467 - https://www.exploit-db.com/exploits/6512 +CVE-2008-6468 - https://www.exploit-db.com/exploits/6502 +CVE-2008-6469 - https://www.exploit-db.com/exploits/6503 +CVE-2008-6471 - https://www.exploit-db.com/exploits/6494 +CVE-2008-6472 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9629 +CVE-2008-6473 - https://www.exploit-db.com/exploits/5370 +CVE-2008-6475 - https://www.exploit-db.com/exploits/5391 +CVE-2008-6477 - https://www.exploit-db.com/exploits/5440 +CVE-2008-6481 - https://www.exploit-db.com/exploits/5989 +CVE-2008-6482 - https://www.exploit-db.com/exploits/6928 +CVE-2008-6483 - https://www.exploit-db.com/exploits/6975 +CVE-2008-6484 - https://www.exploit-db.com/exploits/7010 +CVE-2008-6485 - https://www.exploit-db.com/exploits/7026 +CVE-2008-6487 - https://www.exploit-db.com/exploits/7067 +CVE-2008-6488 - https://www.exploit-db.com/exploits/7021 +CVE-2008-6489 - https://www.exploit-db.com/exploits/5318 +CVE-2008-6490 - https://www.exploit-db.com/exploits/5407 +CVE-2008-6492 - https://www.exploit-db.com/exploits/7354 +CVE-2008-6493 - https://www.exploit-db.com/exploits/7340 +CVE-2008-6494 - https://www.exploit-db.com/exploits/7332 +CVE-2008-6495 - http://packetstormsecurity.org/0812-exploits/yappang-xss.txt +CVE-2008-6496 - https://www.exploit-db.com/exploits/7358 +CVE-2008-6497 - https://www.exploit-db.com/exploits/7387 +CVE-2008-6498 - https://www.exploit-db.com/exploits/7384 +CVE-2008-6499 - https://www.exploit-db.com/exploits/7384 +CVE-2008-6500 - http://packetstormsecurity.org/0812-exploits/aspshoppingcart-xss.txt +CVE-2008-6501 - https://www.exploit-db.com/exploits/7409 +CVE-2008-6502 - https://www.exploit-db.com/exploits/7409 +CVE-2008-6508 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt +CVE-2008-6508 - http://www.igniterealtime.org/issues/browse/JM-1489 +CVE-2008-6508 - https://www.exploit-db.com/exploits/7075 +CVE-2008-6509 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt +CVE-2008-6509 - http://www.igniterealtime.org/issues/browse/JM-1488 +CVE-2008-6509 - https://www.exploit-db.com/exploits/7075 +CVE-2008-6510 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt +CVE-2008-6510 - http://www.igniterealtime.org/issues/browse/JM-629 +CVE-2008-6510 - https://www.exploit-db.com/exploits/7075 +CVE-2008-6511 - http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt +CVE-2008-6511 - https://www.exploit-db.com/exploits/7075 +CVE-2008-6513 - https://www.exploit-db.com/exploits/7312 +CVE-2008-6515 - http://packetstormsecurity.org/0812-exploits/yappang-xss.txt +CVE-2008-6518 - https://www.exploit-db.com/exploits/6259 +CVE-2008-6519 - http://www.bratax.be/advisories/b013.html +CVE-2008-6519 - https://www.exploit-db.com/exploits/5354 +CVE-2008-6520 - http://www.bratax.be/advisories/b013.html +CVE-2008-6523 - https://www.exploit-db.com/exploits/5466 +CVE-2008-6524 - https://www.exploit-db.com/exploits/5466 +CVE-2008-6525 - https://www.exploit-db.com/exploits/7018 +CVE-2008-6526 - https://www.exploit-db.com/exploits/6962 +CVE-2008-6527 - https://www.exploit-db.com/exploits/6930 +CVE-2008-6528 - https://www.exploit-db.com/exploits/7442 +CVE-2008-6529 - https://www.exploit-db.com/exploits/7408 +CVE-2008-6530 - https://www.exploit-db.com/exploits/7408 +CVE-2008-6534 - http://vuln.sg/nullftpserver1107-en.html +CVE-2008-6534 - https://www.exploit-db.com/exploits/7355 +CVE-2008-6535 - https://www.exploit-db.com/exploits/7367 +CVE-2008-6537 - https://www.exploit-db.com/exploits/5425 +CVE-2008-6538 - https://www.exploit-db.com/exploits/5298 +CVE-2008-6539 - https://www.exploit-db.com/exploits/5305 +CVE-2008-6551 - https://www.exploit-db.com/exploits/7031 +CVE-2008-6553 - https://www.exploit-db.com/exploits/6933 +CVE-2008-6558 - https://www.exploit-db.com/exploits/5356 +CVE-2008-6559 - https://www.exploit-db.com/exploits/5357 +CVE-2008-6580 - https://www.exploit-db.com/exploits/7440 +CVE-2008-6581 - https://www.exploit-db.com/exploits/7418 +CVE-2008-6582 - https://www.exploit-db.com/exploits/7586 +CVE-2008-6583 - https://www.exploit-db.com/exploits/5455 +CVE-2008-6592 - https://www.exploit-db.com/exploits/5452 +CVE-2008-6593 - https://www.exploit-db.com/exploits/5452 +CVE-2008-6598 - http://freshmeat.net/projects/wanpipe/releases/276026 +CVE-2008-6602 - http://freshmeat.net/projects/download-center-lite/releases/275651 +CVE-2008-6604 - https://www.exploit-db.com/exploits/5690 +CVE-2008-6605 - https://www.exploit-db.com/exploits/7060 +CVE-2008-6606 - https://www.exploit-db.com/exploits/6967 +CVE-2008-6606 - https://www.exploit-db.com/exploits/6971 +CVE-2008-6607 - https://www.exploit-db.com/exploits/6971 +CVE-2008-6608 - https://www.exploit-db.com/exploits/7013 +CVE-2008-6609 - http://packetstormsecurity.org/0812-exploits/phpcksec-xssdisclose.txt +CVE-2008-6610 - http://packetstormsecurity.org/0812-exploits/phpcksec-xssdisclose.txt +CVE-2008-6611 - https://www.exploit-db.com/exploits/7306 +CVE-2008-6612 - https://www.exploit-db.com/exploits/7306 +CVE-2008-6613 - https://www.exploit-db.com/exploits/7306 +CVE-2008-6614 - https://www.exploit-db.com/exploits/9699 +CVE-2008-6617 - https://www.exploit-db.com/exploits/5726 +CVE-2008-6622 - https://www.exploit-db.com/exploits/6977 +CVE-2008-6623 - https://www.exploit-db.com/exploits/6989 +CVE-2008-6624 - https://www.exploit-db.com/exploits/6983 +CVE-2008-6625 - https://www.exploit-db.com/exploits/6984 +CVE-2008-6626 - https://www.exploit-db.com/exploits/6985 +CVE-2008-6627 - https://www.exploit-db.com/exploits/6986 +CVE-2008-6629 - https://www.exploit-db.com/exploits/6974 +CVE-2008-6632 - https://www.exploit-db.com/exploits/5653 +CVE-2008-6633 - https://www.exploit-db.com/exploits/5670 +CVE-2008-6634 - https://www.exploit-db.com/exploits/5675 +CVE-2008-6635 - https://www.exploit-db.com/exploits/5916 +CVE-2008-6636 - https://www.exploit-db.com/exploits/5916 +CVE-2008-6638 - https://www.exploit-db.com/exploits/5272 +CVE-2008-6638 - https://www.exploit-db.com/exploits/5569 +CVE-2008-6641 - https://www.exploit-db.com/exploits/5564 +CVE-2008-6642 - https://www.exploit-db.com/exploits/5509 +CVE-2008-6647 - https://www.exploit-db.com/exploits/5580 +CVE-2008-6648 - https://www.exploit-db.com/exploits/5582 +CVE-2008-6649 - https://www.exploit-db.com/exploits/5582 +CVE-2008-6650 - https://www.exploit-db.com/exploits/5568 +CVE-2008-6651 - https://www.exploit-db.com/exploits/5524 +CVE-2008-6652 - https://www.exploit-db.com/exploits/5557 +CVE-2008-6653 - https://www.exploit-db.com/exploits/5527 +CVE-2008-6656 - https://www.exploit-db.com/exploits/5531 +CVE-2008-6657 - https://www.exploit-db.com/exploits/6993 +CVE-2008-6658 - https://www.exploit-db.com/exploits/6993 +CVE-2008-6659 - https://www.exploit-db.com/exploits/7011 +CVE-2008-6661 - http://marc.info/?l=bugtraq&m=122893066212987&w=2 +CVE-2008-6663 - https://www.exploit-db.com/exploits/5879 +CVE-2008-6664 - https://www.exploit-db.com/exploits/5829 +CVE-2008-6665 - https://www.exploit-db.com/exploits/5824 +CVE-2008-6667 - https://www.exploit-db.com/exploits/5954 +CVE-2008-6668 - https://www.exploit-db.com/exploits/5856 +CVE-2008-6669 - https://www.exploit-db.com/exploits/5856 +CVE-2008-6670 - http://aluigi.altervista.org/adv/sunagex-adv.txt +CVE-2008-6670 - http://aluigi.org/poc/sunagex.zip +CVE-2008-6671 - http://aluigi.altervista.org/adv/sunagex-adv.txt +CVE-2008-6671 - http://aluigi.org/poc/sunagex.zip +CVE-2008-6672 - http://aluigi.altervista.org/adv/sunagex-adv.txt +CVE-2008-6672 - http://aluigi.org/poc/sunagex.zip +CVE-2008-6679 - http://www.openwall.com/lists/oss-security/2009/04/01/10 +CVE-2008-6679 - https://bugzilla.redhat.com/show_bug.cgi?id=493445 +CVE-2008-6683 - https://www.exploit-db.com/exploits/6956 +CVE-2008-6684 - https://www.exploit-db.com/exploits/6956 +CVE-2008-6700 - https://www.exploit-db.com/exploits/5797 +CVE-2008-6702 - http://aluigi.altervista.org/adv/stalkerboom-adv.txt +CVE-2008-6703 - http://aluigi.altervista.org/adv/stalker39x-adv.txt +CVE-2008-6704 - http://aluigi.altervista.org/adv/stalker39x-adv.txt +CVE-2008-6705 - http://aluigi.altervista.org/adv/stalker39x-adv.txt +CVE-2008-6713 - http://aluigi.altervista.org/adv/wicboom-adv.txt +CVE-2008-6714 - https://www.exploit-db.com/exploits/5818 +CVE-2008-6715 - https://www.exploit-db.com/exploits/7017 +CVE-2008-6716 - https://www.exploit-db.com/exploits/7017 +CVE-2008-6717 - https://www.exploit-db.com/exploits/7032 +CVE-2008-6718 - https://www.exploit-db.com/exploits/7033 +CVE-2008-6719 - https://www.exploit-db.com/exploits/7034 +CVE-2008-6720 - https://www.exploit-db.com/exploits/7024 +CVE-2008-6721 - https://www.exploit-db.com/exploits/6932 +CVE-2008-6723 - https://www.exploit-db.com/exploits/7028 +CVE-2008-6725 - https://www.exploit-db.com/exploits/7625 +CVE-2008-6726 - https://www.exploit-db.com/exploits/7625 +CVE-2008-6727 - https://www.exploit-db.com/exploits/7607 +CVE-2008-6729 - https://www.exploit-db.com/exploits/7557 +CVE-2008-6730 - https://www.exploit-db.com/exploits/7616 +CVE-2008-6731 - https://www.exploit-db.com/exploits/7600 +CVE-2008-6734 - https://www.exploit-db.com/exploits/5940 +CVE-2008-6734 - https://www.exploit-db.com/exploits/5956 +CVE-2008-6735 - https://www.exploit-db.com/exploits/5841 +CVE-2008-6737 - http://aluigi.altervista.org/adv/crysislog-adv.txt +CVE-2008-6738 - https://www.exploit-db.com/exploits/5845 +CVE-2008-6739 - https://www.exploit-db.com/exploits/5780 +CVE-2008-6740 - https://www.exploit-db.com/exploits/5902/ +CVE-2008-6741 - https://www.exploit-db.com/exploits/5826 +CVE-2008-6742 - https://www.exploit-db.com/exploits/5843 +CVE-2008-6743 - https://www.exploit-db.com/exploits/7497 +CVE-2008-6745 - https://www.exploit-db.com/exploits/5909 +CVE-2008-6748 - https://www.exploit-db.com/exploits/7623 +CVE-2008-6749 - https://www.exploit-db.com/exploits/7614 +CVE-2008-6750 - https://www.exploit-db.com/exploits/7614 +CVE-2008-6751 - https://www.exploit-db.com/exploits/7531 +CVE-2008-6752 - https://www.exploit-db.com/exploits/7523 +CVE-2008-6761 - https://www.exploit-db.com/exploits/7622 +CVE-2008-6763 - https://www.exploit-db.com/exploits/7601 +CVE-2008-6768 - https://www.exploit-db.com/exploits/7500 +CVE-2008-6769 - https://www.exploit-db.com/exploits/7545 +CVE-2008-6770 - https://www.exploit-db.com/exploits/7545 +CVE-2008-6771 - https://www.exploit-db.com/exploits/7545 +CVE-2008-6772 - https://www.exploit-db.com/exploits/7545 +CVE-2008-6773 - https://www.exploit-db.com/exploits/7545 +CVE-2008-6776 - https://www.exploit-db.com/exploits/6914 +CVE-2008-6777 - https://www.exploit-db.com/exploits/6879 +CVE-2008-6778 - https://www.exploit-db.com/exploits/6918 +CVE-2008-6779 - http://packetstormsecurity.org/0810-exploits/phpnukesarkilar-sql.txt +CVE-2008-6780 - https://www.exploit-db.com/exploits/6911 +CVE-2008-6781 - https://www.exploit-db.com/exploits/6894 +CVE-2008-6781 - https://www.exploit-db.com/exploits/6906 +CVE-2008-6782 - https://www.exploit-db.com/exploits/6905 +CVE-2008-6783 - https://www.exploit-db.com/exploits/6907 +CVE-2008-6784 - https://www.exploit-db.com/exploits/6895 +CVE-2008-6785 - https://www.exploit-db.com/exploits/7509 +CVE-2008-6787 - https://www.exploit-db.com/exploits/7507 +CVE-2008-6788 - https://www.exploit-db.com/exploits/6819 +CVE-2008-6789 - https://www.exploit-db.com/exploits/6820 +CVE-2008-6790 - https://www.exploit-db.com/exploits/6820 +CVE-2008-6791 - https://www.exploit-db.com/exploits/6838 +CVE-2008-6793 - http://www.ikkisoft.com/stuff/LC-2008-07.txt +CVE-2008-6793 - https://www.exploit-db.com/exploits/7001 +CVE-2008-6794 - https://www.exploit-db.com/exploits/6923 +CVE-2008-6795 - https://www.exploit-db.com/exploits/6981 +CVE-2008-6796 - https://www.exploit-db.com/exploits/7008 +CVE-2008-6797 - http://www.mitel.com/resources/NuPoint_and_Exchange.pdf +CVE-2008-6798 - https://www.exploit-db.com/exploits/7094 +CVE-2008-6804 - https://www.exploit-db.com/exploits/6886 +CVE-2008-6805 - https://www.exploit-db.com/exploits/6764 +CVE-2008-6806 - https://www.exploit-db.com/exploits/6866 +CVE-2008-6808 - https://www.exploit-db.com/exploits/6908 +CVE-2008-6809 - https://www.exploit-db.com/exploits/7253 +CVE-2008-6810 - https://www.exploit-db.com/exploits/7263 +CVE-2008-6811 - https://www.exploit-db.com/exploits/6867 +CVE-2008-6812 - https://www.exploit-db.com/exploits/5999 +CVE-2008-6813 - https://www.exploit-db.com/exploits/5998 +CVE-2008-6814 - https://www.exploit-db.com/exploits/6868 +CVE-2008-6815 - https://www.exploit-db.com/exploits/6855 +CVE-2008-6822 - https://www.exploit-db.com/exploits/6830 +CVE-2008-6823 - https://www.exploit-db.com/exploits/6899 +CVE-2008-6824 - https://www.exploit-db.com/exploits/6899 +CVE-2008-6825 - https://www.exploit-db.com/exploits/6026 +CVE-2008-6826 - https://www.exploit-db.com/exploits/6845 +CVE-2008-6829 - https://www.exploit-db.com/exploits/6834 +CVE-2008-6833 - https://www.exploit-db.com/exploits/6060 +CVE-2008-6834 - https://www.exploit-db.com/exploits/6016 +CVE-2008-6840 - http://packetstormsecurity.org/0807-exploits/vwebmail-rfi.txt +CVE-2008-6841 - https://www.exploit-db.com/exploits/6003 +CVE-2008-6842 - https://www.exploit-db.com/exploits/8271 +CVE-2008-6844 - https://www.exploit-db.com/exploits/7406 +CVE-2008-6847 - http://packetstormsecurity.org/0812-exploits/preaspjob-xsscm.txt +CVE-2008-6848 - https://www.exploit-db.com/exploits/7561 +CVE-2008-6849 - https://www.exploit-db.com/exploits/7561 +CVE-2008-6851 - https://www.exploit-db.com/exploits/7558 +CVE-2008-6852 - https://www.exploit-db.com/exploits/7572 +CVE-2008-6853 - https://www.exploit-db.com/exploits/7611 +CVE-2008-6854 - https://www.exploit-db.com/exploits/6902 +CVE-2008-6855 - https://www.exploit-db.com/exploits/6901 +CVE-2008-6856 - https://www.exploit-db.com/exploits/6900 +CVE-2008-6857 - http://www.securityfocus.com/bid/32003 +CVE-2008-6857 - https://www.exploit-db.com/exploits/6882 +CVE-2008-6858 - https://www.exploit-db.com/exploits/6890 +CVE-2008-6859 - https://www.exploit-db.com/exploits/6893 +CVE-2008-6860 - https://www.exploit-db.com/exploits/6883 +CVE-2008-6861 - https://www.exploit-db.com/exploits/6904 +CVE-2008-6862 - https://www.exploit-db.com/exploits/6889 +CVE-2008-6863 - https://www.exploit-db.com/exploits/6891 +CVE-2008-6864 - https://www.exploit-db.com/exploits/6892 +CVE-2008-6867 - https://www.exploit-db.com/exploits/6919 +CVE-2008-6869 - https://www.exploit-db.com/exploits/7286 +CVE-2008-6870 - https://www.exploit-db.com/exploits/7348 +CVE-2008-6871 - https://www.exploit-db.com/exploits/7348 +CVE-2008-6872 - https://www.exploit-db.com/exploits/7292 +CVE-2008-6873 - https://www.exploit-db.com/exploits/7288 +CVE-2008-6874 - https://www.exploit-db.com/exploits/7463 +CVE-2008-6877 - https://www.exploit-db.com/exploits/6038 +CVE-2008-6878 - https://www.exploit-db.com/exploits/6038 +CVE-2008-6881 - https://www.exploit-db.com/exploits/7441 +CVE-2008-6882 - https://www.exploit-db.com/exploits/7441 +CVE-2008-6883 - https://www.exploit-db.com/exploits/7441 +CVE-2008-6884 - https://www.exploit-db.com/exploits/7380 +CVE-2008-6887 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt +CVE-2008-6888 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt +CVE-2008-6889 - https://www.exploit-db.com/exploits/7274 +CVE-2008-6890 - http://packetstormsecurity.org/0812-exploits/aspforum-cmsqlxss.txt +CVE-2008-6891 - http://packetstormsecurity.org/0812-exploits/aspforum-cmsqlxss.txt +CVE-2008-6892 - https://www.exploit-db.com/exploits/7395 +CVE-2008-6897 - https://www.exploit-db.com/exploits/7564 +CVE-2008-6898 - https://www.exploit-db.com/exploits/7617 +CVE-2008-6900 - https://www.exploit-db.com/exploits/7456 +CVE-2008-6901 - https://www.exploit-db.com/exploits/7510 +CVE-2008-6902 - https://www.exploit-db.com/exploits/7510 +CVE-2008-6905 - https://www.exploit-db.com/exploits/7475 +CVE-2008-6906 - https://www.exploit-db.com/exploits/7475 +CVE-2008-6907 - https://www.exploit-db.com/exploits/7511 +CVE-2008-6911 - https://www.exploit-db.com/exploits/6023 +CVE-2008-6912 - https://www.exploit-db.com/exploits/7066 +CVE-2008-6913 - https://www.exploit-db.com/exploits/7062 +CVE-2008-6914 - https://www.exploit-db.com/exploits/7058 +CVE-2008-6915 - https://www.exploit-db.com/exploits/7058 +CVE-2008-6916 - https://www.exploit-db.com/exploits/7055 +CVE-2008-6917 - https://www.exploit-db.com/exploits/7071 +CVE-2008-6918 - https://www.exploit-db.com/exploits/7620 +CVE-2008-6919 - https://www.exploit-db.com/exploits/7605 +CVE-2008-6920 - https://www.exploit-db.com/exploits/7563 +CVE-2008-6921 - https://www.exploit-db.com/exploits/7562 +CVE-2008-6922 - https://www.exploit-db.com/exploits/6012 +CVE-2008-6923 - https://www.exploit-db.com/exploits/6025 +CVE-2008-6926 - https://www.exploit-db.com/exploits/6897 +CVE-2008-6927 - https://www.exploit-db.com/exploits/6897 +CVE-2008-6928 - https://www.exploit-db.com/exploits/7084 +CVE-2008-6929 - https://www.exploit-db.com/exploits/7082 +CVE-2008-6930 - https://www.exploit-db.com/exploits/7085 +CVE-2008-6931 - https://www.exploit-db.com/exploits/7083 +CVE-2008-6932 - https://www.exploit-db.com/exploits/7101 +CVE-2008-6933 - https://www.exploit-db.com/exploits/7130 +CVE-2008-6934 - https://www.exploit-db.com/exploits/7079 +CVE-2008-6935 - https://www.exploit-db.com/exploits/7145 +CVE-2008-6935 - https://www.exploit-db.com/exploits/7167 +CVE-2008-6936 - https://www.exploit-db.com/exploits/7167 +CVE-2008-6938 - https://www.exploit-db.com/exploits/7109 +CVE-2008-6939 - https://www.exploit-db.com/exploits/7107 +CVE-2008-6940 - https://www.exploit-db.com/exploits/7107 +CVE-2008-6941 - https://www.exploit-db.com/exploits/7107 +CVE-2008-6942 - https://www.exploit-db.com/exploits/7110 +CVE-2008-6943 - https://www.exploit-db.com/exploits/7112 +CVE-2008-6944 - https://www.exploit-db.com/exploits/7111 +CVE-2008-6945 - http://ftp.icdevgroup.org/interchange/5.7/WHATSNEW +CVE-2008-6945 - http://www.icdevgroup.org/i/dev/news?id=ssEkj9j8&mv_arg=00030&mv_pc=96 +CVE-2008-6946 - https://www.exploit-db.com/exploits/7076 +CVE-2008-6947 - https://www.exploit-db.com/exploits/7076 +CVE-2008-6948 - https://www.exploit-db.com/exploits/7076 +CVE-2008-6949 - https://www.exploit-db.com/exploits/7076 +CVE-2008-6950 - https://www.exploit-db.com/exploits/7120 +CVE-2008-6951 - https://www.exploit-db.com/exploits/7203 +CVE-2008-6952 - https://www.exploit-db.com/exploits/7162 +CVE-2008-6953 - http://retrogod.altervista.org/9sg_oovoo_url_poc.html +CVE-2008-6953 - https://www.exploit-db.com/exploits/7090 +CVE-2008-6955 - https://www.exploit-db.com/exploits/7136 +CVE-2008-6956 - https://www.exploit-db.com/exploits/7136 +CVE-2008-6957 - https://www.exploit-db.com/exploits/7185 +CVE-2008-6958 - https://www.exploit-db.com/exploits/7119 +CVE-2008-6959 - https://www.exploit-db.com/exploits/7142 +CVE-2008-6960 - https://www.exploit-db.com/exploits/7074 +CVE-2008-6963 - https://www.exploit-db.com/exploits/7118 +CVE-2008-6964 - https://www.exploit-db.com/exploits/7123 +CVE-2008-6965 - https://www.exploit-db.com/exploits/7087 +CVE-2008-6966 - https://www.exploit-db.com/exploits/7087 +CVE-2008-6971 - https://www.exploit-db.com/exploits/6392 +CVE-2008-6974 - https://www.exploit-db.com/exploits/9209 +CVE-2008-6975 - https://www.exploit-db.com/exploits/9209 +CVE-2008-6976 - https://www.exploit-db.com/exploits/6366 +CVE-2008-6977 - https://www.exploit-db.com/exploits/6357 +CVE-2008-6977 - https://www.exploit-db.com/exploits/6420 +CVE-2008-6978 - https://www.exploit-db.com/exploits/6357 +CVE-2008-6978 - https://www.exploit-db.com/exploits/6420 +CVE-2008-6982 - http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download +CVE-2008-6982 - https://www.exploit-db.com/exploits/6369 +CVE-2008-6983 - https://www.exploit-db.com/exploits/6369 +CVE-2008-6985 - http://www.zen-cart.com/forum/showthread.php?p=604473 +CVE-2008-6986 - http://www.zen-cart.com/forum/showthread.php?p=604473 +CVE-2008-6988 - https://www.exploit-db.com/exploits/6428 +CVE-2008-6989 - https://www.exploit-db.com/exploits/6428 +CVE-2008-6991 - https://www.exploit-db.com/exploits/6343 +CVE-2008-6994 - http://www.infoworld.com/d/security-central/critical-vulnerability-patched-in-googles-chrome-599 +CVE-2008-6994 - https://www.exploit-db.com/exploits/6365 +CVE-2008-6994 - https://www.exploit-db.com/exploits/6367 +CVE-2008-6995 - https://www.exploit-db.com/exploits/6353 +CVE-2008-6996 - https://www.exploit-db.com/exploits/6355 +CVE-2008-6997 - https://www.exploit-db.com/exploits/6386 +CVE-2008-6998 - https://www.exploit-db.com/exploits/6372 +CVE-2008-7001 - https://www.exploit-db.com/exploits/6405 +CVE-2008-7003 - https://www.exploit-db.com/exploits/7478 +CVE-2008-7004 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39903 +CVE-2008-7005 - https://www.exploit-db.com/exploits/6432 +CVE-2008-7006 - https://www.exploit-db.com/exploits/6456 +CVE-2008-7007 - https://www.exploit-db.com/exploits/6457 +CVE-2008-7010 - http://packetstormsecurity.org/0809-exploits/skalinks-editor.txt +CVE-2008-7010 - https://www.exploit-db.com/exploits/6445 +CVE-2008-7014 - https://www.exploit-db.com/exploits/6493 +CVE-2008-7017 - http://www.cynops.de/advisories/AKLINK-SA-2008-007.txt +CVE-2008-7019 - https://www.exploit-db.com/exploits/6583 +CVE-2008-7021 - https://www.exploit-db.com/exploits/6514 +CVE-2008-7022 - https://www.exploit-db.com/exploits/6600 +CVE-2008-7024 - https://www.exploit-db.com/exploits/6584 +CVE-2008-7026 - https://www.exploit-db.com/exploits/6633 +CVE-2008-7027 - https://www.exploit-db.com/exploits/6579 +CVE-2008-7028 - https://www.exploit-db.com/exploits/6591 +CVE-2008-7031 - http://aluigi.org/adv/wachof-adv.txt +CVE-2008-7038 - https://www.exploit-db.com/exploits/5203 +CVE-2008-7038 - https://www.exploit-db.com/exploits/5242 +CVE-2008-7041 - https://www.exploit-db.com/exploits/7089 +CVE-2008-7042 - https://www.exploit-db.com/exploits/7080 +CVE-2008-7043 - https://www.exploit-db.com/exploits/7080 +CVE-2008-7044 - https://www.exploit-db.com/exploits/7086 +CVE-2008-7045 - https://www.exploit-db.com/exploits/7086 +CVE-2008-7047 - https://www.exploit-db.com/exploits/7179 +CVE-2008-7049 - https://www.exploit-db.com/exploits/7172 +CVE-2008-7049 - https://www.exploit-db.com/exploits/7175 +CVE-2008-7051 - https://www.exploit-db.com/exploits/7081 +CVE-2008-7052 - https://www.exploit-db.com/exploits/7094 +CVE-2008-7053 - https://www.exploit-db.com/exploits/6326 +CVE-2008-7054 - https://www.exploit-db.com/exploits/6301 +CVE-2008-7055 - https://www.exploit-db.com/exploits/6301 +CVE-2008-7056 - https://www.exploit-db.com/exploits/6286 +CVE-2008-7057 - https://www.exploit-db.com/exploits/6286 +CVE-2008-7058 - https://www.exploit-db.com/exploits/6286 +CVE-2008-7062 - https://www.exploit-db.com/exploits/7233 +CVE-2008-7063 - https://www.exploit-db.com/exploits/7258 +CVE-2008-7064 - https://www.exploit-db.com/exploits/7217 +CVE-2008-7065 - https://www.exploit-db.com/exploits/7220 +CVE-2008-7066 - https://www.exploit-db.com/exploits/7291 +CVE-2008-7067 - https://www.exploit-db.com/exploits/7255 +CVE-2008-7069 - https://www.exploit-db.com/exploits/7266 +CVE-2008-7070 - https://www.exploit-db.com/exploits/7181 +CVE-2008-7071 - https://www.exploit-db.com/exploits/7227 +CVE-2008-7072 - https://www.exploit-db.com/exploits/7227 +CVE-2008-7073 - https://www.exploit-db.com/exploits/7225 +CVE-2008-7074 - https://www.exploit-db.com/exploits/7249 +CVE-2008-7075 - https://www.exploit-db.com/exploits/7240 +CVE-2008-7075 - https://www.exploit-db.com/exploits/7243 +CVE-2008-7076 - https://www.exploit-db.com/exploits/7251 +CVE-2008-7077 - https://www.exploit-db.com/exploits/7267 +CVE-2008-7078 - https://www.exploit-db.com/exploits/7314 +CVE-2008-7079 - https://www.exploit-db.com/exploits/7207 +CVE-2008-7080 - https://www.exploit-db.com/exploits/7206 +CVE-2008-7083 - https://www.exploit-db.com/exploits/7270 +CVE-2008-7084 - https://www.exploit-db.com/exploits/6151 +CVE-2008-7085 - https://www.exploit-db.com/exploits/6084 +CVE-2008-7086 - https://www.exploit-db.com/exploits/6050 +CVE-2008-7088 - https://www.exploit-db.com/exploits/6082 +CVE-2008-7089 - https://www.exploit-db.com/exploits/6173 +CVE-2008-7090 - https://www.exploit-db.com/exploits/6173 +CVE-2008-7091 - https://www.exploit-db.com/exploits/6173 +CVE-2008-7097 - https://www.exploit-db.com/exploits/6312 +CVE-2008-7098 - https://www.exploit-db.com/exploits/6312 +CVE-2008-7099 - https://www.exploit-db.com/exploits/6312 +CVE-2008-7103 - https://www.exploit-db.com/exploits/6327 +CVE-2008-7107 - https://www.exploit-db.com/exploits/6251 +CVE-2008-7114 - https://www.exploit-db.com/exploits/6315 +CVE-2008-7115 - https://www.exploit-db.com/exploits/6305 +CVE-2008-7116 - https://www.exploit-db.com/exploits/6339 +CVE-2008-7117 - https://www.exploit-db.com/exploits/6339 +CVE-2008-7118 - https://www.exploit-db.com/exploits/6339 +CVE-2008-7119 - https://www.exploit-db.com/exploits/6341 +CVE-2008-7120 - http://www.packetstormsecurity.org/0809-exploits/hotlinks-sql.txt +CVE-2008-7121 - http://www.packetstormsecurity.org/0809-exploits/hotlinks-sql.txt +CVE-2008-7122 - https://www.exploit-db.com/exploits/5271 +CVE-2008-7123 - https://www.exploit-db.com/exploits/5220 +CVE-2008-7124 - https://www.exploit-db.com/exploits/5219 +CVE-2008-7124 - https://www.exploit-db.com/exploits/5220 +CVE-2008-7126 - http://aluigi.altervista.org/adv/visibroken-adv.txt +CVE-2008-7127 - http://aluigi.altervista.org/adv/visibroken-adv.txt +CVE-2008-7136 - https://www.exploit-db.com/exploits/5217 +CVE-2008-7149 - http://freshmeat.net/projects/agilewiki/releases/273210 +CVE-2008-7153 - https://www.exploit-db.com/exploits/4879 +CVE-2008-7153 - https://www.exploit-db.com/exploits/4891 +CVE-2008-7154 - https://www.exploit-db.com/exploits/4879 +CVE-2008-7156 - https://www.exploit-db.com/exploits/4859 +CVE-2008-7157 - https://www.exploit-db.com/exploits/4859 +CVE-2008-7163 - https://www.exploit-db.com/exploits/4854 +CVE-2008-7166 - http://aluigi.altervista.org/adv/ruttorrent2-adv.txt +CVE-2008-7167 - https://www.exploit-db.com/exploits/5936 +CVE-2008-7169 - https://www.exploit-db.com/exploits/5963 +CVE-2008-7171 - https://www.exploit-db.com/exploits/5873 +CVE-2008-7172 - https://www.exploit-db.com/exploits/5873 +CVE-2008-7176 - https://www.exploit-db.com/exploits/5792 +CVE-2008-7178 - https://www.exploit-db.com/exploits/5756 +CVE-2008-7179 - https://www.exploit-db.com/exploits/5959 +CVE-2008-7180 - https://www.exploit-db.com/exploits/5769 +CVE-2008-7181 - https://www.exploit-db.com/exploits/5800 +CVE-2008-7182 - https://www.exploit-db.com/exploits/5968 +CVE-2008-7185 - http://packetstormsecurity.org/0806-advisories/rhythmbox-dos.txt +CVE-2008-7188 - https://www.exploit-db.com/exploits/4837 +CVE-2008-7189 - http://freshmeat.net/projects/localmediabrowser/releases/269578 +CVE-2008-7203 - https://www.exploit-db.com/exploits/4856 +CVE-2008-7208 - https://www.exploit-db.com/exploits/4857 +CVE-2008-7209 - https://www.exploit-db.com/exploits/4857 +CVE-2008-7210 - https://www.exploit-db.com/exploits/4890 +CVE-2008-7220 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html +CVE-2008-7220 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2008-7220 - https://seclists.org/bugtraq/2019/May/18 +CVE-2008-7223 - http://freshmeat.net/projects/linpha/releases/271366 +CVE-2008-7225 - http://aluigi.org/adv/wachof-adv.txt +CVE-2008-7232 - http://aluigi.altervista.org/adv/xtacacsdz-adv.txt +CVE-2008-7232 - http://aluigi.org/poc/xtacacsdz.zip +CVE-2008-7240 - https://www.exploit-db.com/exploits/5179 +CVE-2008-7251 - http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11536&r2=11535&pathrev=11536 +CVE-2008-7254 - http://packetstormsecurity.org/0808-exploits/pepsicms-rfi.txt +CVE-2008-7258 - http://marc.info/?l=oss-security&m=128013391907262&w=2 +CVE-2008-7258 - http://marc.info/?l=oss-security&m=128017258305041&w=2 +CVE-2008-7258 - http://marc.info/?l=oss-security&m=128077707318085&w=2 +CVE-2008-7258 - http://www.openwall.com/lists/oss-security/2010/08/19/6 +CVE-2008-7262 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2008-7263 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2008-7264 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2008-7267 - https://www.exploit-db.com/exploits/6823 +CVE-2008-7268 - https://www.exploit-db.com/exploits/6823 +CVE-2008-7269 - https://www.exploit-db.com/exploits/6823 +CVE-2008-7303 - http://www.coresecurity.com/content/apple-osx-sandbox-bypass +CVE-2009-0004 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6211 +CVE-2009-0023 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2009-0026 - http://securityreason.com/securityalert/4942 +CVE-2009-0028 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0033 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0041 - http://securityreason.com/securityalert/4910 +CVE-2009-0042 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/26/ca20090126-01-ca-anti-virus-engine-detection-evasion-multiple-vulnerabilities.aspx +CVE-2009-0043 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/07.aspx +CVE-2009-0043 - http://securityreason.com/securityalert/4887 +CVE-2009-0066 - http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk +CVE-2009-0066 - http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html +CVE-2009-0070 - https://www.exploit-db.com/exploits/7673 +CVE-2009-0071 - https://www.exploit-db.com/exploits/8091 +CVE-2009-0071 - https://www.exploit-db.com/exploits/8219 +CVE-2009-0075 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002 +CVE-2009-0075 - https://www.exploit-db.com/exploits/8077 +CVE-2009-0075 - https://www.exploit-db.com/exploits/8079 +CVE-2009-0075 - https://www.exploit-db.com/exploits/8080 +CVE-2009-0075 - https://www.exploit-db.com/exploits/8082 +CVE-2009-0076 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002 +CVE-2009-0077 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 +CVE-2009-0081 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 +CVE-2009-0082 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 +CVE-2009-0083 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 +CVE-2009-0084 - http://www.piotrbania.com/all/adv/ms-directx-mjpeg-adv.txt +CVE-2009-0084 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-011 +CVE-2009-0085 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-007 +CVE-2009-0086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 +CVE-2009-0087 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 +CVE-2009-0088 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 +CVE-2009-0089 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 +CVE-2009-0090 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 +CVE-2009-0091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 +CVE-2009-0093 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 +CVE-2009-0094 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 +CVE-2009-0095 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 +CVE-2009-0096 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 +CVE-2009-0097 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005 +CVE-2009-0098 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 +CVE-2009-0099 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003 +CVE-2009-0100 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 +CVE-2009-0102 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-074 +CVE-2009-0103 - http://securityreason.com/securityalert/4888 +CVE-2009-0103 - https://www.exploit-db.com/exploits/7687 +CVE-2009-0104 - http://securityreason.com/securityalert/4890 +CVE-2009-0104 - https://www.exploit-db.com/exploits/7680 +CVE-2009-0105 - http://securityreason.com/securityalert/4890 +CVE-2009-0105 - https://www.exploit-db.com/exploits/7680 +CVE-2009-0106 - https://www.exploit-db.com/exploits/7672 +CVE-2009-0107 - https://www.exploit-db.com/exploits/7672 +CVE-2009-0108 - http://securityreason.com/securityalert/4891 +CVE-2009-0108 - https://www.exploit-db.com/exploits/7674 +CVE-2009-0109 - http://securityreason.com/securityalert/4892 +CVE-2009-0109 - https://www.exploit-db.com/exploits/7682 +CVE-2009-0110 - http://securityreason.com/securityalert/4893 +CVE-2009-0110 - https://www.exploit-db.com/exploits/7679 +CVE-2009-0111 - http://securityreason.com/securityalert/4894 +CVE-2009-0111 - https://www.exploit-db.com/exploits/7683 +CVE-2009-0112 - http://securityreason.com/securityalert/4895 +CVE-2009-0113 - http://securityreason.com/securityalert/4896 +CVE-2009-0113 - https://www.exploit-db.com/exploits/7691 +CVE-2009-0114 - http://isc.sans.org/diary.html?storyid=5929 +CVE-2009-0115 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9214 +CVE-2009-0119 - http://securityreason.com/securityalert/4912 +CVE-2009-0119 - https://www.exploit-db.com/exploits/7720 +CVE-2009-0120 - http://securityreason.com/securityalert/4911 +CVE-2009-0123 - http://isc.sans.org/diary.html?storyid=5689 +CVE-2009-0133 - http://securityreason.com/securityalert/4914 +CVE-2009-0133 - https://www.exploit-db.com/exploits/7727 +CVE-2009-0134 - http://securityreason.com/securityalert/4913 +CVE-2009-0134 - https://www.exploit-db.com/exploits/7779 +CVE-2009-0135 - http://securityreason.com/securityalert/4915 +CVE-2009-0136 - http://securityreason.com/securityalert/4915 +CVE-2009-0146 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9632 +CVE-2009-0147 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941 +CVE-2009-0148 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9633 +CVE-2009-0153 - http://bugs.icu-project.org/trac/ticket/5691 +CVE-2009-0159 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0159 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9634 +CVE-2009-0166 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9778 +CVE-2009-0168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5503 +CVE-2009-0174 - http://securityreason.com/securityalert/4918 +CVE-2009-0174 - https://www.exploit-db.com/exploits/7709 +CVE-2009-0174 - https://www.exploit-db.com/exploits/7713 +CVE-2009-0174 - https://www.exploit-db.com/exploits/7714 +CVE-2009-0174 - https://www.exploit-db.com/exploits/7715 +CVE-2009-0175 - http://securityreason.com/securityalert/4920 +CVE-2009-0175 - https://www.exploit-db.com/exploits/7708 +CVE-2009-0177 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-0177 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433 +CVE-2009-0177 - https://www.exploit-db.com/exploits/7647 +CVE-2009-0181 - http://securityreason.com/securityalert/4921 +CVE-2009-0182 - http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.html +CVE-2009-0182 - http://securityreason.com/securityalert/4923 +CVE-2009-0182 - https://www.exploit-db.com/exploits/7695 +CVE-2009-0183 - https://www.exploit-db.com/exploits/7986 +CVE-2009-0217 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-0220 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0221 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0222 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0223 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0224 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0225 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0226 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0227 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0228 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 +CVE-2009-0229 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 +CVE-2009-0230 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 +CVE-2009-0231 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 +CVE-2009-0232 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 +CVE-2009-0233 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 +CVE-2009-0234 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008 +CVE-2009-0235 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010 +CVE-2009-0237 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 +CVE-2009-0238 - http://isc.sans.org/diary.html?storyid=5923 +CVE-2009-0238 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 +CVE-2009-0239 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-023 +CVE-2009-0241 - http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html +CVE-2009-0243 - http://isc.sans.org/diary.html?storyid=5695 +CVE-2009-0244 - http://securityreason.com/securityalert/4938 +CVE-2009-0246 - http://securityreason.com/securityalert/4941 +CVE-2009-0248 - https://www.exploit-db.com/exploits/7805 +CVE-2009-0249 - https://www.exploit-db.com/exploits/7805 +CVE-2009-0250 - http://securityreason.com/securityalert/4935 +CVE-2009-0250 - https://www.exploit-db.com/exploits/7780 +CVE-2009-0251 - http://securityreason.com/securityalert/4935 +CVE-2009-0251 - https://www.exploit-db.com/exploits/7780 +CVE-2009-0252 - https://www.exploit-db.com/exploits/7801 +CVE-2009-0253 - http://securityreason.com/securityalert/4936 +CVE-2009-0253 - https://www.exploit-db.com/exploits/7842 +CVE-2009-0259 - https://www.exploit-db.com/exploits/6560 +CVE-2009-0261 - https://www.exploit-db.com/exploits/7839 +CVE-2009-0262 - https://www.exploit-db.com/exploits/7737 +CVE-2009-0263 - https://www.exploit-db.com/exploits/7742 +CVE-2009-0269 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0279 - https://www.exploit-db.com/exploits/7851 +CVE-2009-0280 - https://www.exploit-db.com/exploits/7850 +CVE-2009-0281 - https://www.exploit-db.com/exploits/7802 +CVE-2009-0284 - https://www.exploit-db.com/exploits/7862 +CVE-2009-0286 - https://www.exploit-db.com/exploits/7863 +CVE-2009-0290 - https://www.exploit-db.com/exploits/7792 +CVE-2009-0291 - https://www.exploit-db.com/exploits/7883 +CVE-2009-0292 - https://www.exploit-db.com/exploits/7874 +CVE-2009-0293 - https://www.exploit-db.com/exploits/7877 +CVE-2009-0295 - https://www.exploit-db.com/exploits/7867 +CVE-2009-0296 - https://www.exploit-db.com/exploits/7873 +CVE-2009-0297 - https://www.exploit-db.com/exploits/7880 +CVE-2009-0298 - https://www.exploit-db.com/exploits/7869 +CVE-2009-0299 - https://www.exploit-db.com/exploits/7878 +CVE-2009-0299 - https://www.exploit-db.com/exploits/9236 +CVE-2009-0301 - https://www.exploit-db.com/exploits/7868 +CVE-2009-0304 - https://www.exploit-db.com/exploits/7865 +CVE-2009-0315 - https://bugzilla.redhat.com/show_bug.cgi?id=481560 +CVE-2009-0316 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305 +CVE-2009-0316 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493937 +CVE-2009-0316 - https://bugzilla.redhat.com/show_bug.cgi?id=481565 +CVE-2009-0317 - https://bugzilla.redhat.com/show_bug.cgi?id=481570 +CVE-2009-0321 - http://lostmon.blogspot.com/2009/01/safari-for-windows-321-remote-http-uri.html +CVE-2009-0322 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0323 - http://www.coresecurity.com/content/amaya-buffer-overflows +CVE-2009-0323 - https://www.exploit-db.com/exploits/7902 +CVE-2009-0324 - https://www.exploit-db.com/exploits/7814 +CVE-2009-0325 - https://www.exploit-db.com/exploits/7831 +CVE-2009-0327 - https://www.exploit-db.com/exploits/7798 +CVE-2009-0328 - https://www.exploit-db.com/exploits/7816 +CVE-2009-0329 - https://www.exploit-db.com/exploits/7824 +CVE-2009-0330 - https://www.exploit-db.com/exploits/7818 +CVE-2009-0331 - https://www.exploit-db.com/exploits/7819 +CVE-2009-0333 - https://www.exploit-db.com/exploits/7833 +CVE-2009-0334 - https://www.exploit-db.com/exploits/7806 +CVE-2009-0335 - https://www.exploit-db.com/exploits/7806 +CVE-2009-0336 - https://www.exploit-db.com/exploits/7806 +CVE-2009-0337 - https://www.exploit-db.com/exploits/7806 +CVE-2009-0340 - https://www.exploit-db.com/exploits/7813 +CVE-2009-0349 - https://www.exploit-db.com/exploits/7852 +CVE-2009-0350 - https://www.exploit-db.com/exploits/7857 +CVE-2009-0351 - https://www.exploit-db.com/exploits/7875 +CVE-2009-0352 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0353 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0354 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9796 +CVE-2009-0355 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0355 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9161 +CVE-2009-0356 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9922 +CVE-2009-0357 - https://bugzilla.mozilla.org/show_bug.cgi?id=380418 +CVE-2009-0357 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9459 +CVE-2009-0369 - https://www.exploit-db.com/exploits/7912 +CVE-2009-0371 - https://www.exploit-db.com/exploits/7879 +CVE-2009-0372 - https://www.exploit-db.com/exploits/7859 +CVE-2009-0373 - https://www.exploit-db.com/exploits/7881 +CVE-2009-0374 - https://www.exploit-db.com/exploits/7903 +CVE-2009-0377 - https://www.exploit-db.com/exploits/7847 +CVE-2009-0378 - https://www.exploit-db.com/exploits/7847 +CVE-2009-0379 - https://www.exploit-db.com/exploits/7846 +CVE-2009-0380 - https://www.exploit-db.com/exploits/7841 +CVE-2009-0381 - https://www.exploit-db.com/exploits/7840 +CVE-2009-0383 - https://www.exploit-db.com/exploits/7835 +CVE-2009-0384 - https://www.exploit-db.com/exploits/7849 +CVE-2009-0386 - http://www.redhat.com/support/errata/RHSA-2009-0271.html +CVE-2009-0387 - http://www.redhat.com/support/errata/RHSA-2009-0271.html +CVE-2009-0388 - http://www.coresecurity.com/content/vnc-integer-overflows +CVE-2009-0388 - https://www.exploit-db.com/exploits/7990 +CVE-2009-0388 - https://www.exploit-db.com/exploits/8024 +CVE-2009-0389 - https://www.exploit-db.com/exploits/7910 +CVE-2009-0392 - https://www.exploit-db.com/exploits/7915 +CVE-2009-0393 - https://www.exploit-db.com/exploits/7915 +CVE-2009-0394 - https://www.exploit-db.com/exploits/7917 +CVE-2009-0395 - https://www.exploit-db.com/exploits/7916 +CVE-2009-0397 - http://www.redhat.com/support/errata/RHSA-2009-0271.html +CVE-2009-0397 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9942 +CVE-2009-0398 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9886 +CVE-2009-0399 - https://www.exploit-db.com/exploits/7894 +CVE-2009-0400 - https://www.exploit-db.com/exploits/7900 +CVE-2009-0401 - http://packetstormsecurity.org/0901-exploits/ephpcmscid-sql.txt +CVE-2009-0403 - https://www.exploit-db.com/exploits/7894 +CVE-2009-0404 - http://freshmeat.net/projects/htmlawed/?branch_id=74760&release_id=293026 +CVE-2009-0405 - https://www.exploit-db.com/exploits/7901 +CVE-2009-0406 - https://www.exploit-db.com/exploits/7892 +CVE-2009-0407 - https://www.exploit-db.com/exploits/7876 +CVE-2009-0409 - https://www.exploit-db.com/exploits/7899 +CVE-2009-0419 - https://bugzilla.mozilla.org/show_bug.cgi?id=380418 +CVE-2009-0420 - https://www.exploit-db.com/exploits/7795 +CVE-2009-0421 - https://www.exploit-db.com/exploits/7793 +CVE-2009-0422 - https://www.exploit-db.com/exploits/7778 +CVE-2009-0423 - https://www.exploit-db.com/exploits/7786 +CVE-2009-0425 - https://www.exploit-db.com/exploits/7797 +CVE-2009-0426 - https://www.exploit-db.com/exploits/7767 +CVE-2009-0427 - https://www.exploit-db.com/exploits/7773 +CVE-2009-0428 - https://www.exploit-db.com/exploits/7787 +CVE-2009-0431 - http://packetstormsecurity.org/0901-exploits/linkspro-sql.txt +CVE-2009-0441 - https://www.exploit-db.com/exploits/7965 +CVE-2009-0442 - https://www.exploit-db.com/exploits/7980 +CVE-2009-0443 - https://www.exploit-db.com/exploits/7942 +CVE-2009-0444 - https://www.exploit-db.com/exploits/7979 +CVE-2009-0445 - https://www.exploit-db.com/exploits/7968 +CVE-2009-0445 - https://www.exploit-db.com/exploits/9451 +CVE-2009-0446 - https://www.exploit-db.com/exploits/7961 +CVE-2009-0447 - https://www.exploit-db.com/exploits/7963 +CVE-2009-0448 - https://www.exploit-db.com/exploits/7977 +CVE-2009-0450 - https://www.exploit-db.com/exploits/7975 +CVE-2009-0451 - https://www.exploit-db.com/exploits/7932 +CVE-2009-0452 - https://www.exploit-db.com/exploits/7956 +CVE-2009-0453 - https://www.exploit-db.com/exploits/7956 +CVE-2009-0454 - https://www.exploit-db.com/exploits/7970 +CVE-2009-0456 - https://www.exploit-db.com/exploits/7946 +CVE-2009-0457 - https://www.exploit-db.com/exploits/7939 +CVE-2009-0458 - https://www.exploit-db.com/exploits/7940 +CVE-2009-0459 - https://www.exploit-db.com/exploits/7941 +CVE-2009-0460 - https://www.exploit-db.com/exploits/7951 +CVE-2009-0461 - https://www.exploit-db.com/exploits/7952 +CVE-2009-0462 - https://www.exploit-db.com/exploits/7953 +CVE-2009-0463 - https://www.exploit-db.com/exploits/7954 +CVE-2009-0464 - https://www.exploit-db.com/exploits/7955 +CVE-2009-0465 - https://www.exploit-db.com/exploits/7928 +CVE-2009-0467 - https://www.exploit-db.com/exploits/7919 +CVE-2009-0468 - https://www.exploit-db.com/exploits/7919 +CVE-2009-0476 - https://www.exploit-db.com/exploits/7958 +CVE-2009-0476 - https://www.exploit-db.com/exploits/7973 +CVE-2009-0476 - https://www.exploit-db.com/exploits/7974 +CVE-2009-0478 - https://www.exploit-db.com/exploits/8021 +CVE-2009-0490 - http://bugs.gentoo.org/show_bug.cgi?id=253493 +CVE-2009-0490 - https://www.exploit-db.com/exploits/7634 +CVE-2009-0491 - https://www.exploit-db.com/exploits/7637 +CVE-2009-0493 - https://www.exploit-db.com/exploits/7686 +CVE-2009-0494 - https://www.exploit-db.com/exploits/7734 +CVE-2009-0495 - https://www.exploit-db.com/exploits/7743 +CVE-2009-0496 - http://www.coresecurity.com/content/openfire-multiple-vulnerabilities +CVE-2009-0496 - http://www.igniterealtime.org/issues/browse/JM-1506 +CVE-2009-0497 - http://www.coresecurity.com/content/openfire-multiple-vulnerabilities +CVE-2009-0498 - https://www.exploit-db.com/exploits/7744 +CVE-2009-0513 - https://www.exploit-db.com/exploits/8025 +CVE-2009-0514 - https://www.exploit-db.com/exploits/8025 +CVE-2009-0515 - https://www.exploit-db.com/exploits/8020 +CVE-2009-0516 - https://www.exploit-db.com/exploits/8011 +CVE-2009-0517 - https://www.exploit-db.com/exploits/7948 +CVE-2009-0518 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-0519 - http://isc.sans.org/diary.html?storyid=5929 +CVE-2009-0520 - http://isc.sans.org/diary.html?storyid=5929 +CVE-2009-0521 - http://isc.sans.org/diary.html?storyid=5929 +CVE-2009-0522 - http://isc.sans.org/diary.html?storyid=5929 +CVE-2009-0526 - https://www.exploit-db.com/exploits/8016 +CVE-2009-0527 - https://www.exploit-db.com/exploits/8016 +CVE-2009-0528 - https://www.exploit-db.com/exploits/8007 +CVE-2009-0529 - https://www.exploit-db.com/exploits/8017 +CVE-2009-0530 - https://www.exploit-db.com/exploits/8017 +CVE-2009-0531 - https://www.exploit-db.com/exploits/8012 +CVE-2009-0534 - https://www.exploit-db.com/exploits/8018 +CVE-2009-0535 - https://www.exploit-db.com/exploits/8029 +CVE-2009-0537 - https://www.exploit-db.com/exploits/8163 +CVE-2009-0542 - https://www.exploit-db.com/exploits/8037 +CVE-2009-0545 - http://www.ikkisoft.com/stuff/LC-2009-01.txt +CVE-2009-0545 - https://www.exploit-db.com/exploits/8023 +CVE-2009-0546 - https://www.exploit-db.com/exploits/7995 +CVE-2009-0546 - https://www.exploit-db.com/exploits/8010 +CVE-2009-0547 - https://bugzilla.redhat.com/show_bug.cgi?id=484925 +CVE-2009-0547 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9619 +CVE-2009-0549 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-0550 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 +CVE-2009-0550 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 +CVE-2009-0551 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 +CVE-2009-0552 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 +CVE-2009-0553 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 +CVE-2009-0554 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014 +CVE-2009-0555 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-051 +CVE-2009-0556 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-0557 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-0558 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-0559 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-0560 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-0561 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-0562 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 +CVE-2009-0563 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027 +CVE-2009-0565 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027 +CVE-2009-0566 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-030 +CVE-2009-0568 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-026 +CVE-2009-0570 - https://www.exploit-db.com/exploits/8001 +CVE-2009-0571 - https://www.exploit-db.com/exploits/8001 +CVE-2009-0572 - https://www.exploit-db.com/exploits/7969 +CVE-2009-0574 - https://www.exploit-db.com/exploits/8002 +CVE-2009-0577 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9968 +CVE-2009-0580 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0580 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9101 +CVE-2009-0583 - http://bugs.gentoo.org/show_bug.cgi?id=261087 +CVE-2009-0584 - http://bugs.gentoo.org/show_bug.cgi?id=261087 +CVE-2009-0585 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9599 +CVE-2009-0586 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9694 +CVE-2009-0590 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html +CVE-2009-0590 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198 +CVE-2009-0592 - https://www.exploit-db.com/exploits/7658 +CVE-2009-0593 - https://www.exploit-db.com/exploits/7663 +CVE-2009-0594 - https://www.exploit-db.com/exploits/7648 +CVE-2009-0595 - https://www.exploit-db.com/exploits/7648 +CVE-2009-0596 - https://www.exploit-db.com/exploits/7648 +CVE-2009-0597 - https://www.exploit-db.com/exploits/7640 +CVE-2009-0598 - https://www.exploit-db.com/exploits/7660 +CVE-2009-0599 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9677 +CVE-2009-0602 - https://www.exploit-db.com/exploits/7998 +CVE-2009-0604 - https://www.exploit-db.com/exploits/8014 +CVE-2009-0611 - http://packetstormsecurity.org/0902-exploits/nqfs-xss.txt +CVE-2009-0639 - https://www.exploit-db.com/exploits/8005 +CVE-2009-0641 - https://www.exploit-db.com/exploits/8055 +CVE-2009-0643 - https://www.exploit-db.com/exploits/7999 +CVE-2009-0645 - https://www.exploit-db.com/exploits/7976 +CVE-2009-0646 - https://www.exploit-db.com/exploits/7964 +CVE-2009-0649 - https://www.exploit-db.com/exploits/8051 +CVE-2009-0650 - https://www.exploit-db.com/exploits/8058 +CVE-2009-0652 - http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike +CVE-2009-0652 - https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf +CVE-2009-0653 - http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike +CVE-2009-0653 - https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf +CVE-2009-0658 - http://isc.sans.org/diary.html?n&storyid=5902 +CVE-2009-0658 - http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219 +CVE-2009-0658 - https://www.exploit-db.com/exploits/8090 +CVE-2009-0658 - https://www.exploit-db.com/exploits/8099 +CVE-2009-0663 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499 +CVE-2009-0672 - https://www.exploit-db.com/exploits/8068 +CVE-2009-0673 - https://www.exploit-db.com/exploits/8068 +CVE-2009-0674 - https://www.exploit-db.com/exploits/8068 +CVE-2009-0675 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0676 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0677 - https://www.exploit-db.com/exploits/8068 +CVE-2009-0678 - https://www.exploit-db.com/exploits/8068 +CVE-2009-0680 - https://www.exploit-db.com/exploits/8008 +CVE-2009-0686 - https://www.exploit-db.com/exploits/8322 +CVE-2009-0687 - https://www.exploit-db.com/exploits/8406 +CVE-2009-0687 - https://www.exploit-db.com/exploits/8581 +CVE-2009-0688 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/69 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/71 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/72 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/73 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/75 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/76 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/77 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/78 +CVE-2009-0689 - http://securityreason.com/achievement_securityalert/81 +CVE-2009-0689 - https://bugzilla.mozilla.org/show_bug.cgi?id=516396 +CVE-2009-0689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9541 +CVE-2009-0690 - http://www.kb.cert.org/vuls/id/251793 +CVE-2009-0691 - http://www.kb.cert.org/vuls/id/251793 +CVE-2009-0692 - http://www.kb.cert.org/vuls/id/410676 +CVE-2009-0693 - http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/ +CVE-2009-0695 - http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/ +CVE-2009-0696 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0701 - https://www.exploit-db.com/exploits/7668 +CVE-2009-0702 - https://www.exploit-db.com/exploits/7670 +CVE-2009-0703 - https://www.exploit-db.com/exploits/7635 +CVE-2009-0704 - https://www.exploit-db.com/exploits/7659 +CVE-2009-0705 - https://www.exploit-db.com/exploits/7641 +CVE-2009-0706 - http://packetstormsecurity.org/0901-exploits/joomlasimplereview-sql.txt +CVE-2009-0707 - https://www.exploit-db.com/exploits/7642 +CVE-2009-0711 - https://www.exploit-db.com/exploits/7636 +CVE-2009-0714 - https://www.exploit-db.com/exploits/9006 +CVE-2009-0714 - https://www.exploit-db.com/exploits/9007 +CVE-2009-0722 - https://www.exploit-db.com/exploits/8032 +CVE-2009-0726 - https://www.exploit-db.com/exploits/7746 +CVE-2009-0727 - http://e-rdc.org/v1/news.php?readmore=126 +CVE-2009-0727 - https://www.exploit-db.com/exploits/8098 +CVE-2009-0728 - https://www.exploit-db.com/exploits/8100 +CVE-2009-0731 - https://www.exploit-db.com/exploits/8094 +CVE-2009-0733 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9742 +CVE-2009-0735 - https://www.exploit-db.com/exploits/8030 +CVE-2009-0737 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES +CVE-2009-0737 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES +CVE-2009-0738 - https://www.exploit-db.com/exploits/8033 +CVE-2009-0739 - https://www.exploit-db.com/exploits/8034 +CVE-2009-0740 - https://www.exploit-db.com/exploits/8035 +CVE-2009-0744 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6066 +CVE-2009-0745 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0746 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0747 - http://bugzilla.kernel.org/show_bug.cgi?id=12375 +CVE-2009-0747 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0747 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200 +CVE-2009-0748 - http://bugzilla.kernel.org/show_bug.cgi?id=12371 +CVE-2009-0748 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0750 - https://www.exploit-db.com/exploits/8076 +CVE-2009-0751 - https://www.exploit-db.com/exploits/8148 +CVE-2009-0753 - https://www.exploit-db.com/exploits/8097 +CVE-2009-0760 - https://www.exploit-db.com/exploits/7982 +CVE-2009-0761 - https://www.exploit-db.com/exploits/7982 +CVE-2009-0763 - https://www.exploit-db.com/exploits/7993 +CVE-2009-0765 - https://www.exploit-db.com/exploits/7993 +CVE-2009-0767 - https://www.exploit-db.com/exploits/7993 +CVE-2009-0768 - https://www.exploit-db.com/exploits/7984 +CVE-2009-0772 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0772 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9609 +CVE-2009-0774 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0775 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0775 - https://bugzilla.mozilla.org/show_bug.cgi?id=474456 +CVE-2009-0775 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9681 +CVE-2009-0776 - http://www.redhat.com/support/errata/RHSA-2009-0258.html +CVE-2009-0776 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9241 +CVE-2009-0778 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0781 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0783 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0787 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0788 - http://www.redhat.com/support/errata/RHSA-2011-0434.html +CVE-2009-0792 - http://www.redhat.com/support/errata/RHSA-2009-0420.html +CVE-2009-0796 - https://bugzilla.redhat.com/show_bug.cgi?id=494402 +CVE-2009-0798 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9955 +CVE-2009-0799 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-0800 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-0807 - https://www.exploit-db.com/exploits/8092 +CVE-2009-0810 - https://www.exploit-db.com/exploits/8101 +CVE-2009-0812 - https://www.exploit-db.com/exploits/8121 +CVE-2009-0813 - https://www.exploit-db.com/exploits/8144 +CVE-2009-0820 - http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/check.php?r1=318&r2=332 +CVE-2009-0826 - https://www.exploit-db.com/exploits/7689 +CVE-2009-0827 - https://www.exploit-db.com/exploits/7690 +CVE-2009-0828 - https://www.exploit-db.com/exploits/7699 +CVE-2009-0831 - https://www.exploit-db.com/exploits/7697 +CVE-2009-0832 - https://www.exploit-db.com/exploits/7698 +CVE-2009-0833 - https://www.exploit-db.com/exploits/7696 +CVE-2009-0834 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-0834 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600 +CVE-2009-0836 - http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html +CVE-2009-0836 - http://www.coresecurity.com/content/foxit-reader-vulnerabilities +CVE-2009-0837 - http://www.coresecurity.com/content/foxit-reader-vulnerabilities +CVE-2009-0844 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt +CVE-2009-0844 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9474 +CVE-2009-0845 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt +CVE-2009-0846 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt +CVE-2009-0847 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt +CVE-2009-0851 - https://www.exploit-db.com/exploits/8161 +CVE-2009-0852 - https://www.exploit-db.com/exploits/8161 +CVE-2009-0853 - https://www.exploit-db.com/exploits/8161 +CVE-2009-0855 - http://packetstormsecurity.com/files/170073/IBM-Websphere-Application-Server-7.0-Cross-Site-Scripting.html +CVE-2009-0863 - https://www.exploit-db.com/exploits/8071 +CVE-2009-0864 - https://www.exploit-db.com/exploits/8071 +CVE-2009-0865 - https://www.exploit-db.com/exploits/8059 +CVE-2009-0866 - https://www.exploit-db.com/exploits/8073 +CVE-2009-0879 - https://www.exploit-db.com/exploits/8190 +CVE-2009-0881 - https://www.exploit-db.com/exploits/8167 +CVE-2009-0883 - https://www.exploit-db.com/exploits/8165 +CVE-2009-0885 - https://www.exploit-db.com/exploits/8135 +CVE-2009-0886 - https://www.exploit-db.com/exploits/8168 +CVE-2009-0886 - https://www.exploit-db.com/exploits/8169 +CVE-2009-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 +CVE-2009-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 +CVE-2009-0901 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 +CVE-2009-0908 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-0909 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-0910 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-0920 - http://securityreason.com/securityalert/8308 +CVE-2009-0920 - http://www.coresecurity.com/content/openview-buffer-overflows +CVE-2009-0921 - http://www.coresecurity.com/content/openview-buffer-overflows +CVE-2009-0932 - http://securityreason.com/securityalert/8077 +CVE-2009-0949 - http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability +CVE-2009-0949 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631 +CVE-2009-0950 - https://www.exploit-db.com/exploits/8861 +CVE-2009-0950 - https://www.exploit-db.com/exploits/8934 +CVE-2009-0963 - https://www.exploit-db.com/exploits/8226 +CVE-2009-0964 - https://www.exploit-db.com/exploits/8226 +CVE-2009-0965 - https://www.exploit-db.com/exploits/8228 +CVE-2009-0966 - https://www.exploit-db.com/exploits/8230 +CVE-2009-0967 - https://www.exploit-db.com/exploits/8212 +CVE-2009-0968 - https://www.exploit-db.com/exploits/8229 +CVE-2009-0969 - http://packetstormsecurity.org/0903-exploits/phpfox1621-xsrf.txt +CVE-2009-0981 - https://www.exploit-db.com/exploits/8456 +CVE-2009-10001 - https://vuldb.com/?id.218296 +CVE-2009-1022 - https://www.exploit-db.com/exploits/8225 +CVE-2009-1023 - https://www.exploit-db.com/exploits/8220 +CVE-2009-1024 - https://www.exploit-db.com/exploits/8216 +CVE-2009-1025 - https://www.exploit-db.com/exploits/8216 +CVE-2009-1026 - https://www.exploit-db.com/exploits/8209 +CVE-2009-1028 - http://securityreason.com/securityalert/8217 +CVE-2009-1028 - https://www.exploit-db.com/exploits/8180 +CVE-2009-1029 - https://www.exploit-db.com/exploits/8203 +CVE-2009-1030 - https://www.exploit-db.com/exploits/8196 +CVE-2009-1031 - https://www.exploit-db.com/exploits/8211 +CVE-2009-1032 - https://www.exploit-db.com/exploits/8238 +CVE-2009-1033 - https://www.exploit-db.com/exploits/8240 +CVE-2009-1038 - https://www.exploit-db.com/exploits/8217 +CVE-2009-1039 - https://www.exploit-db.com/exploits/8231 +CVE-2009-1040 - https://www.exploit-db.com/exploits/8224 +CVE-2009-1041 - https://www.exploit-db.com/exploits/8261 +CVE-2009-1044 - https://bugzilla.mozilla.org/show_bug.cgi?id=484320 +CVE-2009-1045 - https://www.exploit-db.com/exploits/8213 +CVE-2009-1049 - https://www.exploit-db.com/exploits/8243 +CVE-2009-1049 - https://www.exploit-db.com/exploits/8244 +CVE-2009-1050 - https://www.exploit-db.com/exploits/8243 +CVE-2009-1051 - http://e-rdc.org/v1/news.php?readmore=131 +CVE-2009-1052 - http://e-rdc.org/v1/news.php?readmore=130 +CVE-2009-1053 - http://e-rdc.org/v1/news.php?readmore=129 +CVE-2009-1057 - https://www.exploit-db.com/exploits/8180 +CVE-2009-1058 - https://www.exploit-db.com/exploits/8180 +CVE-2009-1059 - https://www.exploit-db.com/exploits/8180 +CVE-2009-1060 - http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9129978 +CVE-2009-1063 - https://www.exploit-db.com/exploits/8270 +CVE-2009-1064 - http://www.waraxe.us/advisory-73.html +CVE-2009-1064 - https://www.exploit-db.com/exploits/8257 +CVE-2009-1066 - https://www.exploit-db.com/exploits/8252 +CVE-2009-1067 - https://www.exploit-db.com/exploits/8252 +CVE-2009-1068 - https://www.exploit-db.com/exploits/8249 +CVE-2009-1068 - https://www.exploit-db.com/exploits/8251 +CVE-2009-1071 - https://www.exploit-db.com/exploits/8236 +CVE-2009-1072 - http://www.redhat.com/support/errata/RHSA-2009-1081.html +CVE-2009-1072 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1072 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1087 - https://www.exploit-db.com/exploits/8215 +CVE-2009-1088 - https://www.exploit-db.com/exploits/8247 +CVE-2009-1092 - https://www.exploit-db.com/exploits/8206 +CVE-2009-1093 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1093 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1094 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1094 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1095 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1095 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1096 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1096 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1097 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1097 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1098 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1098 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1098 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9956 +CVE-2009-1099 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1099 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1100 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1100 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1101 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1101 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1102 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1103 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1103 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1104 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1104 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1105 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1105 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1106 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1106 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1107 - http://www.redhat.com/support/errata/RHSA-2009-1038.html +CVE-2009-1107 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1122 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 +CVE-2009-1123 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 +CVE-2009-1124 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 +CVE-2009-1125 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 +CVE-2009-1126 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025 +CVE-2009-1127 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 +CVE-2009-1128 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-1129 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-1130 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-1131 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-1132 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-049 +CVE-2009-1133 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-044 +CVE-2009-1134 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021 +CVE-2009-1135 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-031 +CVE-2009-1136 - http://isc.sans.org/diary.html?storyid=6778 +CVE-2009-1136 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 +CVE-2009-1137 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 +CVE-2009-1138 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018 +CVE-2009-1139 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018 +CVE-2009-1140 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1141 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1146 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-1147 - http://www.vmware.com/security/advisories/VMSA-2009-0005.html +CVE-2009-1151 - http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ +CVE-2009-1151 - https://www.exploit-db.com/exploits/8921 +CVE-2009-1152 - https://www.exploit-db.com/exploits/8260 +CVE-2009-1169 - https://bugzilla.mozilla.org/show_bug.cgi?id=485217 +CVE-2009-1169 - https://www.exploit-db.com/exploits/8285 +CVE-2009-1171 - https://www.exploit-db.com/exploits/8297 +CVE-2009-1179 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1180 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1180 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9926 +CVE-2009-1181 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1181 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9683 +CVE-2009-1182 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1183 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1184 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1185 - http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html +CVE-2009-1185 - https://www.exploit-db.com/exploits/8572 +CVE-2009-1187 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1188 - http://www.kb.cert.org/vuls/id/196617 +CVE-2009-1188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9957 +CVE-2009-1190 - http://www.packetstormsecurity.org/hitb06/DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf +CVE-2009-1191 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2009-1192 - http://www.redhat.com/support/errata/RHSA-2009-1081.html +CVE-2009-1192 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1192 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1204 - http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki/branches/2.0/changelog.txt?view=markup +CVE-2009-1209 - https://www.exploit-db.com/exploits/8314 +CVE-2009-1209 - https://www.exploit-db.com/exploits/8321 +CVE-2009-1210 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9526 +CVE-2009-1210 - https://www.exploit-db.com/exploits/8308 +CVE-2009-1212 - https://www.exploit-db.com/exploits/8332 +CVE-2009-1218 - http://www.coresecurity.com/content/sun-calendar-express +CVE-2009-1219 - http://www.coresecurity.com/content/sun-calendar-express +CVE-2009-1222 - https://www.exploit-db.com/exploits/8328 +CVE-2009-1224 - https://www.exploit-db.com/exploits/8331 +CVE-2009-1226 - https://www.exploit-db.com/exploits/8324 +CVE-2009-1227 - https://www.exploit-db.com/exploits/8313 +CVE-2009-1228 - https://www.exploit-db.com/exploits/8296 +CVE-2009-1229 - https://www.exploit-db.com/exploits/8304 +CVE-2009-1230 - https://www.exploit-db.com/exploits/8324 +CVE-2009-1232 - https://bugzilla.mozilla.org/show_bug.cgi?id=485941 +CVE-2009-1232 - https://www.exploit-db.com/exploits/8306 +CVE-2009-1233 - https://www.exploit-db.com/exploits/8325 +CVE-2009-1234 - https://www.exploit-db.com/exploits/8320 +CVE-2009-1235 - https://www.exploit-db.com/exploits/8266 +CVE-2009-1236 - http://www.digit-labs.org/files/exploits/xnu-appletalk-zip.c +CVE-2009-1236 - https://www.exploit-db.com/exploits/8262 +CVE-2009-1237 - http://www.digit-labs.org/files/exploits/xnu-macfsstat-leak.c +CVE-2009-1237 - http://www.digit-labs.org/files/exploits/xnu-profil-leak.c +CVE-2009-1237 - https://www.exploit-db.com/exploits/8263 +CVE-2009-1237 - https://www.exploit-db.com/exploits/8264 +CVE-2009-1238 - http://www.digit-labs.org/files/exploits/xnu-vfssysctl-dos.c +CVE-2009-1238 - https://www.exploit-db.com/exploits/8265 +CVE-2009-1240 - http://blog.zoller.lu/2009/04/ibm-proventia-evasion-limited-details.html +CVE-2009-1241 - http://blog.zoller.lu/2009/04/clamav-094-and-below-evasion-and-bypass.html +CVE-2009-1242 - http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of,20090402,8311 +CVE-2009-1242 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1243 - http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-proc-net-udp-8586 +CVE-2009-1246 - https://www.exploit-db.com/exploits/8290 +CVE-2009-1247 - https://www.exploit-db.com/exploits/8291 +CVE-2009-1248 - https://www.exploit-db.com/exploits/8291 +CVE-2009-1252 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1256 - https://www.exploit-db.com/exploits/8355 +CVE-2009-1257 - https://www.exploit-db.com/exploits/8343 +CVE-2009-1259 - https://www.exploit-db.com/exploits/8351 +CVE-2009-1260 - https://www.exploit-db.com/exploits/8343 +CVE-2009-1263 - https://www.exploit-db.com/exploits/8353 +CVE-2009-1265 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1277 - https://www.exploit-db.com/exploits/8350 +CVE-2009-1278 - https://www.exploit-db.com/exploits/8350 +CVE-2009-1282 - https://www.exploit-db.com/exploits/8347 +CVE-2009-1283 - https://www.exploit-db.com/exploits/8347 +CVE-2009-1298 - http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/ +CVE-2009-1303 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9455 +CVE-2009-1304 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9535 +CVE-2009-1308 - http://www.theregister.co.uk/2009/03/08/ebay_scam_wizardy/ +CVE-2009-1308 - https://bugzilla.mozilla.org/show_bug.cgi?id=481558 +CVE-2009-1309 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9494 +CVE-2009-1312 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9818 +CVE-2009-1314 - https://www.exploit-db.com/exploits/8382 +CVE-2009-1315 - https://www.exploit-db.com/exploits/8424 +CVE-2009-1316 - https://www.exploit-db.com/exploits/8424 +CVE-2009-1317 - https://www.exploit-db.com/exploits/8432 +CVE-2009-1318 - https://www.exploit-db.com/exploits/8423 +CVE-2009-1319 - https://www.exploit-db.com/exploits/8431 +CVE-2009-1321 - https://www.exploit-db.com/exploits/8418 +CVE-2009-1322 - https://www.exploit-db.com/exploits/8418 +CVE-2009-1323 - https://www.exploit-db.com/exploits/8382 +CVE-2009-1324 - https://www.exploit-db.com/exploits/8407 +CVE-2009-1324 - https://www.exploit-db.com/exploits/8412 +CVE-2009-1325 - https://www.exploit-db.com/exploits/8402 +CVE-2009-1325 - https://www.exploit-db.com/exploits/8416 +CVE-2009-1326 - https://www.exploit-db.com/exploits/8404 +CVE-2009-1326 - https://www.exploit-db.com/exploits/8410 +CVE-2009-1327 - https://www.exploit-db.com/exploits/8403 +CVE-2009-1327 - https://www.exploit-db.com/exploits/8411 +CVE-2009-1328 - https://www.exploit-db.com/exploits/8405 +CVE-2009-1328 - https://www.exploit-db.com/exploits/8413 +CVE-2009-1329 - https://www.exploit-db.com/exploits/8405/ +CVE-2009-1329 - https://www.exploit-db.com/exploits/8426 +CVE-2009-1330 - https://www.exploit-db.com/exploits/39933/ +CVE-2009-1330 - https://www.exploit-db.com/exploits/8427 +CVE-2009-1331 - https://www.exploit-db.com/exploits/8445 +CVE-2009-1336 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1336 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1337 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1337 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1338 - http://www.redhat.com/support/errata/RHSA-2009-1081.html +CVE-2009-1338 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1341 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680 +CVE-2009-1345 - https://www.exploit-db.com/exploits/8455 +CVE-2009-1346 - https://www.exploit-db.com/exploits/8457 +CVE-2009-1347 - https://www.exploit-db.com/exploits/8461 +CVE-2009-1348 - http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html +CVE-2009-1351 - https://www.exploit-db.com/exploits/8451 +CVE-2009-1352 - https://www.exploit-db.com/exploits/8434 +CVE-2009-1353 - https://www.exploit-db.com/exploits/8447 +CVE-2009-1354 - https://www.exploit-db.com/exploits/8428 +CVE-2009-1356 - https://www.exploit-db.com/exploits/8452 +CVE-2009-1357 - http://www.coresecurity.com/content/sun-delegated-administrator +CVE-2009-1360 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1367 - https://www.exploit-db.com/exploits/8394 +CVE-2009-1368 - https://www.exploit-db.com/exploits/8394 +CVE-2009-1369 - https://www.exploit-db.com/exploits/8394 +CVE-2009-1370 - https://www.exploit-db.com/exploits/8390 +CVE-2009-1373 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005 +CVE-2009-1377 - http://www.ubuntu.com/usn/USN-792-1 +CVE-2009-1377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9663 +CVE-2009-1378 - http://www.ubuntu.com/usn/USN-792-1 +CVE-2009-1378 - https://www.exploit-db.com/exploits/8720 +CVE-2009-1379 - http://www.ubuntu.com/usn/USN-792-1 +CVE-2009-1379 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9744 +CVE-2009-1384 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-1384 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9652 +CVE-2009-1385 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1385 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1386 - http://www.ubuntu.com/usn/USN-792-1 +CVE-2009-1386 - https://www.exploit-db.com/exploits/8873 +CVE-2009-1387 - http://www.ubuntu.com/usn/USN-792-1 +CVE-2009-1388 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1389 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1392 - http://www.securityfocus.com/bid/35370 +CVE-2009-1392 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9501 +CVE-2009-1403 - https://www.exploit-db.com/exploits/8501 +CVE-2009-1404 - https://www.exploit-db.com/exploits/8502 +CVE-2009-1405 - https://www.exploit-db.com/exploits/8502 +CVE-2009-1406 - https://www.exploit-db.com/exploits/8503 +CVE-2009-1407 - https://www.exploit-db.com/exploits/8504 +CVE-2009-1408 - https://www.exploit-db.com/exploits/8453 +CVE-2009-1409 - https://www.exploit-db.com/exploits/8495 +CVE-2009-1410 - https://www.exploit-db.com/exploits/8505 +CVE-2009-1411 - https://www.exploit-db.com/exploits/8482 +CVE-2009-1437 - https://hansesecure.de/vulnerability-in-coolplayer/ +CVE-2009-1437 - https://www.exploit-db.com/exploits/8489 +CVE-2009-1437 - https://www.exploit-db.com/exploits/8519 +CVE-2009-1437 - https://www.exploit-db.com/exploits/8520 +CVE-2009-1438 - https://bugzilla.redhat.com/show_bug.cgi?id=496834 +CVE-2009-1439 - http://www.redhat.com/support/errata/RHSA-2009-1081.html +CVE-2009-1439 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1439 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1444 - https://www.exploit-db.com/exploits/8516 +CVE-2009-1445 - https://www.exploit-db.com/exploits/8516 +CVE-2009-1446 - https://www.exploit-db.com/exploits/8514 +CVE-2009-1447 - https://www.exploit-db.com/exploits/8474 +CVE-2009-1449 - https://www.exploit-db.com/exploits/8527 +CVE-2009-1450 - https://www.exploit-db.com/exploits/7936 +CVE-2009-1451 - https://www.exploit-db.com/exploits/7936 +CVE-2009-1452 - https://www.exploit-db.com/exploits/8460 +CVE-2009-1453 - https://www.exploit-db.com/exploits/8464 +CVE-2009-1467 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-001 +CVE-2009-1467 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-002 +CVE-2009-1468 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-003 +CVE-2009-1469 - http://www.redteam-pentesting.de/advisories/rt-sa-2009-004 +CVE-2009-1480 - https://www.exploit-db.com/exploits/8533 +CVE-2009-1483 - https://www.exploit-db.com/exploits/8481 +CVE-2009-1486 - https://www.exploit-db.com/exploits/8549 +CVE-2009-1487 - https://www.exploit-db.com/exploits/8493 +CVE-2009-1488 - https://www.exploit-db.com/exploits/8493 +CVE-2009-1489 - https://www.exploit-db.com/exploits/8493 +CVE-2009-1492 - https://www.exploit-db.com/exploits/8569 +CVE-2009-1493 - https://www.exploit-db.com/exploits/8570 +CVE-2009-1495 - https://www.exploit-db.com/exploits/8374 +CVE-2009-1496 - https://www.exploit-db.com/exploits/8367 +CVE-2009-1497 - https://www.exploit-db.com/exploits/8370 +CVE-2009-1498 - https://www.exploit-db.com/exploits/8357 +CVE-2009-1499 - https://www.exploit-db.com/exploits/8366 +CVE-2009-1500 - https://www.exploit-db.com/exploits/8565 +CVE-2009-1502 - https://www.exploit-db.com/exploits/8566 +CVE-2009-1503 - https://www.exploit-db.com/exploits/8571 +CVE-2009-1504 - https://www.exploit-db.com/exploits/8529 +CVE-2009-1506 - https://www.exploit-db.com/exploits/8563 +CVE-2009-1508 - https://www.exploit-db.com/exploits/8317 +CVE-2009-1509 - https://www.exploit-db.com/exploits/8341 +CVE-2009-1510 - https://www.exploit-db.com/exploits/8334 +CVE-2009-1511 - https://www.exploit-db.com/exploits/8466 +CVE-2009-1512 - https://www.exploit-db.com/exploits/8317 +CVE-2009-1514 - https://www.exploit-db.com/exploits/8573 +CVE-2009-1516 - https://www.exploit-db.com/exploits/8542 +CVE-2009-1517 - https://www.exploit-db.com/exploits/8523 +CVE-2009-1519 - https://www.exploit-db.com/exploits/8593 +CVE-2009-1523 - https://bugzilla.redhat.com/show_bug.cgi?id=499867 +CVE-2009-1524 - https://bugzilla.redhat.com/show_bug.cgi?id=499867 +CVE-2009-1528 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1529 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1530 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1531 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1532 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019 +CVE-2009-1533 - http://blogs.technet.com/srd/archive/2009/06/09/ms09-024.aspx +CVE-2009-1533 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-024 +CVE-2009-1534 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 +CVE-2009-1535 - http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html +CVE-2009-1535 - http://isc.sans.org/diary.html?n&storyid=6397 +CVE-2009-1535 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 +CVE-2009-1537 - http://isc.sans.org/diary.html?storyid=6481 +CVE-2009-1537 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 +CVE-2009-1538 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 +CVE-2009-1539 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 +CVE-2009-1542 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-033 +CVE-2009-1544 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-041 +CVE-2009-1545 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-038 +CVE-2009-1546 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-038 +CVE-2009-1547 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 +CVE-2009-1548 - https://www.exploit-db.com/exploits/8600 +CVE-2009-1549 - https://www.exploit-db.com/exploits/8599 +CVE-2009-1550 - https://www.exploit-db.com/exploits/8555 +CVE-2009-1551 - https://www.exploit-db.com/exploits/8602 +CVE-2009-1557 - http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/ +CVE-2009-1560 - http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/ +CVE-2009-1561 - http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt +CVE-2009-1564 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2009-1565 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2009-1570 - http://www.redhat.com/support/errata/RHSA-2011-0837.html +CVE-2009-1571 - https://bugzilla.mozilla.org/show_bug.cgi?id=526500 +CVE-2009-1574 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9624 +CVE-2009-1577 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9837 +CVE-2009-1578 - https://bugzilla.redhat.com/show_bug.cgi?id=500363 +CVE-2009-1582 - https://www.exploit-db.com/exploits/8605 +CVE-2009-1583 - https://www.exploit-db.com/exploits/8615 +CVE-2009-1584 - https://www.exploit-db.com/exploits/8615 +CVE-2009-1584 - https://www.exploit-db.com/exploits/8616 +CVE-2009-1586 - https://www.exploit-db.com/exploits/8612 +CVE-2009-1587 - https://www.exploit-db.com/exploits/8604 +CVE-2009-1592 - https://www.exploit-db.com/exploits/8611 +CVE-2009-1592 - https://www.exploit-db.com/exploits/8614 +CVE-2009-1602 - https://www.exploit-db.com/exploits/8606 +CVE-2009-1607 - https://www.exploit-db.com/exploits/8618 +CVE-2009-1609 - https://www.exploit-db.com/exploits/8647 +CVE-2009-1610 - https://www.exploit-db.com/exploits/8639 +CVE-2009-1611 - https://www.exploit-db.com/exploits/8613 +CVE-2009-1611 - https://www.exploit-db.com/exploits/8621 +CVE-2009-1612 - https://www.exploit-db.com/exploits/8579 +CVE-2009-1613 - https://www.exploit-db.com/exploits/8576 +CVE-2009-1613 - https://www.exploit-db.com/exploits/8577 +CVE-2009-1614 - https://www.exploit-db.com/exploits/8577 +CVE-2009-1615 - https://www.exploit-db.com/exploits/8577 +CVE-2009-1617 - https://www.exploit-db.com/exploits/8550 +CVE-2009-1618 - https://www.exploit-db.com/exploits/8552 +CVE-2009-1619 - https://www.exploit-db.com/exploits/8551 +CVE-2009-1621 - https://www.exploit-db.com/exploits/8539 +CVE-2009-1622 - https://www.exploit-db.com/exploits/8548 +CVE-2009-1623 - https://www.exploit-db.com/exploits/8545 +CVE-2009-1624 - https://www.exploit-db.com/exploits/8545 +CVE-2009-1625 - https://www.exploit-db.com/exploits/8546 +CVE-2009-1626 - https://www.exploit-db.com/exploits/8547 +CVE-2009-1627 - https://www.exploit-db.com/exploits/8531 +CVE-2009-1627 - https://www.exploit-db.com/exploits/8536 +CVE-2009-1630 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1630 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1630 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990 +CVE-2009-1633 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1633 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1633 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9525 +CVE-2009-1637 - https://www.exploit-db.com/exploits/8638 +CVE-2009-1638 - https://www.exploit-db.com/exploits/8627 +CVE-2009-1641 - https://www.exploit-db.com/exploits/8631 +CVE-2009-1641 - https://www.exploit-db.com/exploits/8632 +CVE-2009-1642 - https://packetstormsecurity.com/files/144558/ASX-To-MP3-Converter-Stack-Overflow.html +CVE-2009-1642 - https://www.exploit-db.com/exploits/8629 +CVE-2009-1642 - https://www.exploit-db.com/exploits/8630 +CVE-2009-1643 - https://www.exploit-db.com/exploits/8624 +CVE-2009-1644 - https://www.exploit-db.com/exploits/8625 +CVE-2009-1644 - https://www.exploit-db.com/exploits/8640 +CVE-2009-1645 - https://www.exploit-db.com/exploits/8633 +CVE-2009-1645 - https://www.exploit-db.com/exploits/8634 +CVE-2009-1646 - https://www.exploit-db.com/exploits/8628 +CVE-2009-1647 - https://www.exploit-db.com/exploits/8526 +CVE-2009-1649 - https://www.exploit-db.com/exploits/8680 +CVE-2009-1650 - https://www.exploit-db.com/exploits/8679 +CVE-2009-1651 - https://www.exploit-db.com/exploits/8689 +CVE-2009-1652 - https://www.exploit-db.com/exploits/8689 +CVE-2009-1653 - https://www.exploit-db.com/exploits/8667 +CVE-2009-1654 - https://www.exploit-db.com/exploits/8690 +CVE-2009-1655 - https://www.exploit-db.com/exploits/8690 +CVE-2009-1658 - https://www.exploit-db.com/exploits/8643 +CVE-2009-1659 - https://www.exploit-db.com/exploits/8603 +CVE-2009-1660 - https://www.exploit-db.com/exploits/8644 +CVE-2009-1661 - https://www.exploit-db.com/exploits/8655 +CVE-2009-1662 - https://www.exploit-db.com/exploits/8642 +CVE-2009-1663 - https://www.exploit-db.com/exploits/8690 +CVE-2009-1664 - https://www.exploit-db.com/exploits/8690 +CVE-2009-1665 - https://www.exploit-db.com/exploits/8690 +CVE-2009-1668 - https://www.exploit-db.com/exploits/8650 +CVE-2009-1669 - https://www.exploit-db.com/exploits/8659 +CVE-2009-1670 - https://www.exploit-db.com/exploits/8626 +CVE-2009-1671 - https://www.exploit-db.com/exploits/8665 +CVE-2009-1672 - https://www.exploit-db.com/exploits/8665 +CVE-2009-1674 - https://www.exploit-db.com/exploits/8656 +CVE-2009-1675 - https://www.exploit-db.com/exploits/8623 +CVE-2009-1677 - https://www.exploit-db.com/exploits/8659 +CVE-2009-1678 - https://www.exploit-db.com/exploits/8659 +CVE-2009-1692 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-1692 - https://www.exploit-db.com/exploits/9160 +CVE-2009-1698 - http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html +CVE-2009-1698 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484 +CVE-2009-1699 - https://www.exploit-db.com/exploits/8907 +CVE-2009-1725 - https://bugzilla.redhat.com/show_bug.cgi?id=513813 +CVE-2009-1729 - http://seclists.org/fulldisclosure/2009/May/0177.html +CVE-2009-1729 - http://www.coresecurity.com/content/sun-communications-express +CVE-2009-1731 - http://securityreason.com/exploitalert/6198 +CVE-2009-1734 - https://www.exploit-db.com/exploits/8737 +CVE-2009-1735 - https://www.exploit-db.com/exploits/8737 +CVE-2009-1736 - https://www.exploit-db.com/exploits/8731 +CVE-2009-1738 - http://drupal.org/node/453098 +CVE-2009-1738 - http://drupal.org/node/461706 +CVE-2009-1739 - https://www.exploit-db.com/exploits/8735 +CVE-2009-1741 - https://www.exploit-db.com/exploits/8741 +CVE-2009-1742 - https://www.exploit-db.com/exploits/8709 +CVE-2009-1743 - https://www.exploit-db.com/exploits/8670 +CVE-2009-1744 - https://www.exploit-db.com/exploits/8670 +CVE-2009-1746 - https://www.exploit-db.com/exploits/8727 +CVE-2009-1747 - https://www.exploit-db.com/exploits/8751 +CVE-2009-1748 - https://www.exploit-db.com/exploits/8745 +CVE-2009-1749 - https://www.exploit-db.com/exploits/8745 +CVE-2009-1750 - https://www.exploit-db.com/exploits/8730 +CVE-2009-1751 - https://www.exploit-db.com/exploits/8748 +CVE-2009-1752 - https://www.exploit-db.com/exploits/8744 +CVE-2009-1759 - https://www.exploit-db.com/exploits/8470 +CVE-2009-1761 - http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-01-ca-arcserve-backup-message-engine-denial-of-service-vulnerabilities.aspx +CVE-2009-1764 - https://www.exploit-db.com/exploits/8726 +CVE-2009-1765 - https://www.exploit-db.com/exploits/8715 +CVE-2009-1766 - https://www.exploit-db.com/exploits/8724 +CVE-2009-1767 - https://www.exploit-db.com/exploits/8691 +CVE-2009-1768 - https://www.exploit-db.com/exploits/8700 +CVE-2009-1770 - https://www.exploit-db.com/exploits/8714 +CVE-2009-1771 - https://www.exploit-db.com/exploits/8714 +CVE-2009-1774 - https://www.exploit-db.com/exploits/8681 +CVE-2009-1778 - https://www.exploit-db.com/exploits/8664 +CVE-2009-1779 - https://www.exploit-db.com/exploits/8658 +CVE-2009-1780 - https://www.exploit-db.com/exploits/8658 +CVE-2009-1781 - https://www.exploit-db.com/exploits/8658 +CVE-2009-1783 - http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html +CVE-2009-1784 - http://blog.zoller.lu/2009/04/avg-zip-evasion-bypass.html +CVE-2009-1786 - https://www.exploit-db.com/exploits/9306 +CVE-2009-1787 - https://www.exploit-db.com/exploits/8710 +CVE-2009-1789 - https://www.exploit-db.com/exploits/8695 +CVE-2009-1792 - http://www.coresecurity.com/content/StoneTrip-S3DPlayers +CVE-2009-1799 - http://marc.info/?l=bugtraq&m=124171333011782&w=2 +CVE-2009-1799 - https://www.exploit-db.com/exploits/8636 +CVE-2009-1804 - https://www.exploit-db.com/exploits/8635 +CVE-2009-1809 - https://www.exploit-db.com/exploits/8707 +CVE-2009-1810 - https://www.exploit-db.com/exploits/8707 +CVE-2009-1811 - https://www.exploit-db.com/exploits/8708 +CVE-2009-1812 - https://www.exploit-db.com/exploits/8708 +CVE-2009-1813 - https://www.exploit-db.com/exploits/8683 +CVE-2009-1814 - https://www.exploit-db.com/exploits/8706 +CVE-2009-1815 - https://www.exploit-db.com/exploits/8698 +CVE-2009-1815 - https://www.exploit-db.com/exploits/8701 +CVE-2009-1816 - https://www.exploit-db.com/exploits/8676 +CVE-2009-1817 - https://www.exploit-db.com/exploits/8677 +CVE-2009-1818 - https://www.exploit-db.com/exploits/8672 +CVE-2009-1819 - https://www.exploit-db.com/exploits/8702 +CVE-2009-1820 - https://www.exploit-db.com/exploits/8702 +CVE-2009-1821 - https://www.exploit-db.com/exploits/8705 +CVE-2009-1822 - https://www.exploit-db.com/exploits/8697 +CVE-2009-1824 - https://www.exploit-db.com/exploits/8782 +CVE-2009-1825 - https://www.exploit-db.com/exploits/8707 +CVE-2009-1826 - https://www.exploit-db.com/exploits/8708 +CVE-2009-1827 - http://blog.zoller.lu/2009/04/advisory-firefox-dos-condition.html +CVE-2009-1827 - https://bugzilla.mozilla.org/show_bug.cgi?id=465615 +CVE-2009-1827 - https://www.exploit-db.com/exploits/8794 +CVE-2009-1828 - http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html +CVE-2009-1828 - https://bugzilla.mozilla.org/show_bug.cgi?id=469565 +CVE-2009-1828 - https://www.exploit-db.com/exploits/8822 +CVE-2009-1829 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9270 +CVE-2009-1830 - https://www.exploit-db.com/exploits/8777 +CVE-2009-1830 - https://www.exploit-db.com/exploits/8804 +CVE-2009-1831 - https://www.exploit-db.com/exploits/8767 +CVE-2009-1831 - https://www.exploit-db.com/exploits/8770 +CVE-2009-1831 - https://www.exploit-db.com/exploits/8772 +CVE-2009-1831 - https://www.exploit-db.com/exploits/8783 +CVE-2009-1835 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9803 +CVE-2009-1836 - https://bugzilla.mozilla.org/show_bug.cgi?id=479880 +CVE-2009-1837 - https://bugzilla.mozilla.org/show_bug.cgi?id=486269 +CVE-2009-1839 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9256 +CVE-2009-1840 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9448 +CVE-2009-1841 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9815 +CVE-2009-1846 - https://www.exploit-db.com/exploits/8816 +CVE-2009-1847 - https://www.exploit-db.com/exploits/8815 +CVE-2009-1848 - https://www.exploit-db.com/exploits/8814 +CVE-2009-1850 - https://www.exploit-db.com/exploits/8808 +CVE-2009-1852 - https://www.exploit-db.com/exploits/8803 +CVE-2009-1853 - https://www.exploit-db.com/exploits/8802 +CVE-2009-1854 - https://www.exploit-db.com/exploits/8813 +CVE-2009-1861 - http://www.kb.cert.org/vuls/id/568153 +CVE-2009-1862 - http://isc.sans.org/diary.html?storyid=6847 +CVE-2009-1862 - http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability +CVE-2009-1869 - http://roeehay.blogspot.com/2009/08/exploitation-of-cve-2009-1869.html +CVE-2009-1873 - https://www.exploit-db.com/exploits/9443 +CVE-2009-1879 - http://www.gdssecurity.com/l/b/2009/08/20/adobe-flex-3-3-sdk-dom-based-xss/ +CVE-2009-1882 - http://imagemagick.org/script/changelog.php +CVE-2009-1883 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9513 +CVE-2009-1885 - https://bugzilla.redhat.com/show_bug.cgi?id=515515 +CVE-2009-1887 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9716 +CVE-2009-1890 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2009-1890 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9403 +CVE-2009-1891 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248 +CVE-2009-1894 - http://www.akitasecurity.nl/advisory.php?id=AK20090602 +CVE-2009-1894 - https://bugzilla.redhat.com/show_bug.cgi?id=510071 +CVE-2009-1895 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-1895 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9453 +CVE-2009-1897 - http://isc.sans.org/diary.html?storyid=6820 +CVE-2009-1902 - https://www.exploit-db.com/exploits/8241 +CVE-2009-1904 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780 +CVE-2009-1910 - https://www.exploit-db.com/exploits/8648 +CVE-2009-1911 - https://www.exploit-db.com/exploits/8649 +CVE-2009-1912 - https://www.exploit-db.com/exploits/8622 +CVE-2009-1913 - https://www.exploit-db.com/exploits/8645 +CVE-2009-1914 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1915 - https://www.exploit-db.com/exploits/8832 +CVE-2009-1916 - https://www.exploit-db.com/exploits/8454 +CVE-2009-1917 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 +CVE-2009-1918 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 +CVE-2009-1919 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-034 +CVE-2009-1920 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-045 +CVE-2009-1922 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-040 +CVE-2009-1923 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-039 +CVE-2009-1924 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-039 +CVE-2009-1925 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 +CVE-2009-1926 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 +CVE-2009-1929 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-044 +CVE-2009-1930 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-042 +CVE-2009-1936 - https://www.exploit-db.com/exploits/8790 +CVE-2009-1941 - https://www.exploit-db.com/exploits/8850 +CVE-2009-1944 - https://www.exploit-db.com/exploits/8837 +CVE-2009-1945 - https://www.exploit-db.com/exploits/8857 +CVE-2009-1946 - https://www.exploit-db.com/exploits/8851 +CVE-2009-1947 - https://www.exploit-db.com/exploits/8841 +CVE-2009-1948 - https://www.exploit-db.com/exploits/8841 +CVE-2009-1949 - https://www.exploit-db.com/exploits/8841 +CVE-2009-1950 - https://www.exploit-db.com/exploits/8859 +CVE-2009-1951 - https://www.exploit-db.com/exploits/8858 +CVE-2009-1952 - https://www.exploit-db.com/exploits/8858 +CVE-2009-1955 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2009-1955 - https://www.exploit-db.com/exploits/8842 +CVE-2009-1956 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2009-1960 - https://www.exploit-db.com/exploits/8781 +CVE-2009-1960 - https://www.exploit-db.com/exploits/8812 +CVE-2009-1961 - http://www.ubuntu.com/usn/usn-793-1 +CVE-2009-1996 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-2003 - https://www.exploit-db.com/exploits/8668 +CVE-2009-2010 - https://www.exploit-db.com/exploits/8671 +CVE-2009-2011 - http://www.coresecurity.com/content/DXStudio-player-firefox-plugin +CVE-2009-2011 - https://www.exploit-db.com/exploits/8922 +CVE-2009-2013 - https://www.exploit-db.com/exploits/8900 +CVE-2009-2014 - https://www.exploit-db.com/exploits/8891 +CVE-2009-2015 - https://www.exploit-db.com/exploits/8898 +CVE-2009-2016 - https://www.exploit-db.com/exploits/8894 +CVE-2009-2017 - https://www.exploit-db.com/exploits/8893 +CVE-2009-2018 - https://www.exploit-db.com/exploits/8886 +CVE-2009-2019 - https://www.exploit-db.com/exploits/8901 +CVE-2009-2020 - https://www.exploit-db.com/exploits/8901 +CVE-2009-2021 - https://www.exploit-db.com/exploits/8892 +CVE-2009-2022 - https://www.exploit-db.com/exploits/8890 +CVE-2009-2023 - https://www.exploit-db.com/exploits/8906 +CVE-2009-2024 - https://www.exploit-db.com/exploits/8889 +CVE-2009-2025 - https://www.exploit-db.com/exploits/8903 +CVE-2009-2033 - https://www.exploit-db.com/exploits/8932 +CVE-2009-2034 - https://www.exploit-db.com/exploits/8932 +CVE-2009-2036 - https://www.exploit-db.com/exploits/8927 +CVE-2009-2037 - https://www.exploit-db.com/exploits/8853 +CVE-2009-2040 - https://www.exploit-db.com/exploits/8902 +CVE-2009-2042 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2009-2060 - https://bugzilla.mozilla.org/show_bug.cgi?id=479880 +CVE-2009-2071 - https://bugzilla.mozilla.org/show_bug.cgi?id=479880 +CVE-2009-2080 - https://www.exploit-db.com/exploits/8917 +CVE-2009-2081 - https://www.exploit-db.com/exploits/8928 +CVE-2009-2095 - https://www.exploit-db.com/exploits/8948 +CVE-2009-2096 - https://www.exploit-db.com/exploits/8962 +CVE-2009-2098 - https://www.exploit-db.com/exploits/8966 +CVE-2009-2099 - https://www.exploit-db.com/exploits/8959 +CVE-2009-2100 - https://www.exploit-db.com/exploits/8946 +CVE-2009-2101 - https://www.exploit-db.com/exploits/8931 +CVE-2009-2102 - https://www.exploit-db.com/exploits/8968 +CVE-2009-2109 - https://www.exploit-db.com/exploits/8979 +CVE-2009-2110 - https://www.exploit-db.com/exploits/8952 +CVE-2009-2111 - https://www.exploit-db.com/exploits/8951 +CVE-2009-2112 - https://www.exploit-db.com/exploits/8975 +CVE-2009-2113 - https://www.exploit-db.com/exploits/8980 +CVE-2009-2117 - https://www.exploit-db.com/exploits/8981 +CVE-2009-2120 - https://www.exploit-db.com/exploits/8977 +CVE-2009-2122 - https://www.exploit-db.com/exploits/8961 +CVE-2009-2123 - https://www.exploit-db.com/exploits/8953 +CVE-2009-2123 - https://www.exploit-db.com/exploits/9342 +CVE-2009-2124 - https://www.exploit-db.com/exploits/8953 +CVE-2009-2127 - https://www.exploit-db.com/exploits/8953 +CVE-2009-2129 - https://www.exploit-db.com/exploits/8953 +CVE-2009-2130 - https://www.exploit-db.com/exploits/8953 +CVE-2009-2131 - https://www.exploit-db.com/exploits/8936 +CVE-2009-2133 - https://www.exploit-db.com/exploits/8941 +CVE-2009-2134 - https://www.exploit-db.com/exploits/8941 +CVE-2009-2138 - https://www.exploit-db.com/exploits/8942 +CVE-2009-2141 - https://www.exploit-db.com/exploits/8942 +CVE-2009-2142 - https://www.exploit-db.com/exploits/8935 +CVE-2009-2143 - https://www.exploit-db.com/exploits/8945 +CVE-2009-2145 - https://www.exploit-db.com/exploits/8943 +CVE-2009-2147 - https://www.exploit-db.com/exploits/8939 +CVE-2009-2148 - https://www.exploit-db.com/exploits/8937 +CVE-2009-2149 - https://www.exploit-db.com/exploits/8937 +CVE-2009-2150 - https://www.exploit-db.com/exploits/8937 +CVE-2009-2151 - https://www.exploit-db.com/exploits/8954 +CVE-2009-2152 - https://www.exploit-db.com/exploits/8954 +CVE-2009-2153 - https://www.exploit-db.com/exploits/8947 +CVE-2009-2154 - https://www.exploit-db.com/exploits/8947 +CVE-2009-2156 - http://www.waraxe.us/advisory-74.html +CVE-2009-2156 - https://www.exploit-db.com/exploits/8958 +CVE-2009-2157 - http://www.waraxe.us/advisory-74.html +CVE-2009-2157 - https://www.exploit-db.com/exploits/8958 +CVE-2009-2158 - http://www.waraxe.us/advisory-74.html +CVE-2009-2158 - https://www.exploit-db.com/exploits/8958 +CVE-2009-2159 - http://www.waraxe.us/advisory-74.html +CVE-2009-2159 - https://www.exploit-db.com/exploits/8958 +CVE-2009-2160 - http://www.waraxe.us/advisory-74.html +CVE-2009-2160 - https://www.exploit-db.com/exploits/8958 +CVE-2009-2161 - http://www.waraxe.us/advisory-74.html +CVE-2009-2161 - https://www.exploit-db.com/exploits/8958 +CVE-2009-2164 - https://www.exploit-db.com/exploits/8884 +CVE-2009-2164 - https://www.exploit-db.com/exploits/8885 +CVE-2009-2166 - https://www.exploit-db.com/exploits/8868 +CVE-2009-2167 - https://www.exploit-db.com/exploits/8865 +CVE-2009-2168 - https://www.exploit-db.com/exploits/8865 +CVE-2009-2172 - https://www.exploit-db.com/exploits/8965 +CVE-2009-2173 - https://www.exploit-db.com/exploits/8971 +CVE-2009-2176 - https://www.exploit-db.com/exploits/8978 +CVE-2009-2177 - https://www.exploit-db.com/exploits/8978 +CVE-2009-2178 - https://www.exploit-db.com/exploits/8990 +CVE-2009-2179 - https://www.exploit-db.com/exploits/8990 +CVE-2009-2180 - https://www.exploit-db.com/exploits/8988 +CVE-2009-2181 - https://www.exploit-db.com/exploits/8995 +CVE-2009-2182 - https://www.exploit-db.com/exploits/8995 +CVE-2009-2183 - https://www.exploit-db.com/exploits/8995 +CVE-2009-2184 - https://www.exploit-db.com/exploits/8996 +CVE-2009-2204 - http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf +CVE-2009-2209 - https://www.exploit-db.com/exploits/9000 +CVE-2009-2210 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9994 +CVE-2009-2216 - http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html +CVE-2009-2223 - http://www.exploit-db.com/exploits/9015 +CVE-2009-2230 - http://www.exploit-db.com/exploits/9001 +CVE-2009-2254 - http://www.zen-cart.com/forum/attachment.php?attachmentid=5965 +CVE-2009-2255 - http://www.zen-cart.com/forum/attachment.php?attachmentid=5965 +CVE-2009-2261 - http://www.exploit-db.com/exploits/8881 +CVE-2009-2265 - http://isc.sans.org/diary.html?storyid=6724 +CVE-2009-2265 - http://packetstormsecurity.com/files/163271/Adobe-ColdFusion-8-Remote-Command-Execution.html +CVE-2009-2286 - http://www.openwall.com/lists/oss-security/2009/07/03/1 +CVE-2009-2294 - http://www.ocert.org/advisories/ocert-2009-008.html +CVE-2009-2295 - http://www.ocert.org/advisories/ocert-2009-009.html +CVE-2009-2308 - http://packetstormsecurity.org/0906-exploits/punbbaffiliations-blindsql.txt +CVE-2009-2308 - http://packetstormsecurity.org/0906-exploits/punbbaffiliationsin-blindsql.txt +CVE-2009-2325 - http://www.osvdb.org/55484 +CVE-2009-2334 - http://www.exploit-db.com/exploits/9110 +CVE-2009-2335 - http://www.exploit-db.com/exploits/9110 +CVE-2009-2336 - http://www.exploit-db.com/exploits/9110 +CVE-2009-2347 - http://www.ocert.org/advisories/ocert-2009-012.html +CVE-2009-2360 - http://bugs.horde.org/ticket/8398 +CVE-2009-2361 - http://osticket.com/forums/project.php?issueid=118 +CVE-2009-2362 - http://packetstormsecurity.org/0907-exploits/audioplus-overflow.txt +CVE-2009-2363 - http://packetstormsecurity.org/0907-exploits/audiopluspls-overflow.txt +CVE-2009-2370 - http://drupal.org/node/507580 +CVE-2009-2371 - http://drupal.org/node/507580 +CVE-2009-2382 - http://www.exploit-db.com/exploits/9053 +CVE-2009-2384 - http://www.exploit-db.com/exploits/9061 +CVE-2009-2386 - http://www.coresecurity.com/content/winds3d-viewer-advisory +CVE-2009-2397 - http://www.exploit-db.com/exploits/9041 +CVE-2009-2401 - http://www.exploit-db.com/exploits/9014 +CVE-2009-2402 - http://www.exploit-db.com/exploits/9014 +CVE-2009-2403 - http://www.exploit-db.com/exploits/9033 +CVE-2009-2404 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-2404 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2009-2406 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2407 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2408 - http://isc.sans.org/diary.html?storyid=7003 +CVE-2009-2408 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-2409 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html +CVE-2009-2412 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9958 +CVE-2009-2414 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2416 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2416 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 +CVE-2009-2417 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2433 - http://www.exploit-db.com/exploits/9100 +CVE-2009-2436 - http://packetstormsecurity.org/0907-exploits/myphpdating10-sql.txt +CVE-2009-2437 - http://packetstormsecurity.org/0907-exploits/rentventory-xss.txt +CVE-2009-2438 - http://packetstormsecurity.org/0907-exploits/clansphere-xss.txt +CVE-2009-2439 - http://packetstormsecurity.org/0907-exploits/alibabaclone-sql.txt +CVE-2009-2440 - http://packetstormsecurity.org/0907-exploits/jnm-xss.txt +CVE-2009-2441 - http://www.packetstormsecurity.com/0907-exploits/ogp51-xss.txt +CVE-2009-2442 - http://www.packetstormsecurity.com/0907-exploits/linea-xss.txt +CVE-2009-2443 - http://www.packetstormsecurity.org/0907-exploits/siteframe-sqlphpinfo.txt +CVE-2009-2447 - http://www.packetstormsecurity.com/0907-exploits/ogp51-morexss.txt +CVE-2009-2451 - http://www.exploit-db.com/exploits/8558 +CVE-2009-2464 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9594 +CVE-2009-2466 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9820 +CVE-2009-2467 - https://bugzilla.mozilla.org/show_bug.cgi?id=493601 +CVE-2009-2472 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 +CVE-2009-2473 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9461 +CVE-2009-2477 - http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/ +CVE-2009-2477 - http://isc.sans.org/diary.html?storyid=6796 +CVE-2009-2477 - http://www.kb.cert.org/vuls/id/443060 +CVE-2009-2477 - https://www.exploit-db.com/exploits/40936/ +CVE-2009-2479 - http://blog.mozilla.com/security/2009/07/19/milw0rm-9158-stack-overflow-crash-not-exploitable-cve-2009-2479/ +CVE-2009-2479 - http://www.exploit-db.com/exploits/9158 +CVE-2009-2479 - https://bugzilla.mozilla.org/show_bug.cgi?id=504342 +CVE-2009-2479 - https://bugzilla.mozilla.org/show_bug.cgi?id=504343 +CVE-2009-2484 - http://www.exploit-db.com/exploits/9029 +CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 +CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 +CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 +CVE-2009-2493 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 +CVE-2009-2494 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 +CVE-2009-2495 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035 +CVE-2009-2495 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060 +CVE-2009-2496 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 +CVE-2009-2497 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061 +CVE-2009-2498 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-047 +CVE-2009-2499 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-047 +CVE-2009-2500 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2501 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2502 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2503 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2504 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2506 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-073 +CVE-2009-2507 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-057 +CVE-2009-2510 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-056 +CVE-2009-2511 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-056 +CVE-2009-2512 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-063 +CVE-2009-2513 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 +CVE-2009-2514 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065 +CVE-2009-2515 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 +CVE-2009-2516 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 +CVE-2009-2517 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-058 +CVE-2009-2518 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2518 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6430 +CVE-2009-2519 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-046 +CVE-2009-2524 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059 +CVE-2009-2525 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-051 +CVE-2009-2526 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 +CVE-2009-2527 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-052 +CVE-2009-2528 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-2529 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 +CVE-2009-2530 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 +CVE-2009-2531 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-054 +CVE-2009-2532 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 +CVE-2009-2533 - http://www.coresecurity.com/content/real-helix-dna +CVE-2009-2533 - http://www.exploit-db.com/exploits/9198 +CVE-2009-2534 - http://www.coresecurity.com/content/real-helix-dna +CVE-2009-2534 - http://www.exploit-db.com/exploits/9198 +CVE-2009-2535 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2535 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2535 - https://bugzilla.mozilla.org/show_bug.cgi?id=460713 +CVE-2009-2536 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2536 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2537 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2537 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2538 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2538 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2539 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2539 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2540 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2540 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2541 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2541 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2542 - http://www.exploit-db.com/exploits/9160 +CVE-2009-2542 - http://www.g-sec.lu/one-bug-to-rule-them-all.html +CVE-2009-2547 - http://aluigi.altervista.org/adv/armadioz-adv.txt +CVE-2009-2548 - http://aluigi.altervista.org/adv/armazzofs-adv.txt +CVE-2009-2549 - http://aluigi.altervista.org/adv/armazzo-adv.txt +CVE-2009-2550 - http://www.exploit-db.com/exploits/9157 +CVE-2009-2551 - http://packetstormsecurity.org/0907-exploits/eid-xss.txt +CVE-2009-2560 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6416 +CVE-2009-2564 - http://www.exploit-db.com/exploits/9199 +CVE-2009-2568 - http://www.exploit-db.com/exploits/8617 +CVE-2009-2570 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 +CVE-2009-2571 - http://packetstormsecurity.org/0905-exploits/verliadmin-xss.txt +CVE-2009-2573 - http://www.exploit-db.com/exploits/8586 +CVE-2009-2584 - http://xorl.wordpress.com/2009/07/21/linux-kernel-sgi-gru-driver-off-by-one-overwrite/ +CVE-2009-2586 - http://packetstormsecurity.org/0907-exploits/ezarticles-xss.txt +CVE-2009-2587 - http://packetstormsecurity.org/0907-exploits/dragdopcart-xss.txt +CVE-2009-2588 - http://packetstormsecurity.org/0907-exploits/hotscriptsclone-xss.txt +CVE-2009-2589 - http://packetstormsecurity.org/0907-exploits/hutscript-sqlxss.txt +CVE-2009-2590 - http://packetstormsecurity.org/0907-exploits/hutscript-sqlxss.txt +CVE-2009-2605 - http://www.exploit-db.com/exploits/8831 +CVE-2009-2607 - http://www.exploit-db.com/exploits/9017 +CVE-2009-2617 - http://marc.info/?l=full-disclosure&m=124624413120440&w=2 +CVE-2009-2617 - http://marc.info/?l=full-disclosure&m=124627617220913&w=2 +CVE-2009-2620 - http://tracker.firebirdsql.org/browse/CORE-2563 +CVE-2009-2620 - http://www.coresecurity.com/content/firebird-sql-dos +CVE-2009-2620 - http://www.exploit-db.com/exploits/9295 +CVE-2009-2625 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-2625 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2625 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356 +CVE-2009-2628 - http://www.kb.cert.org/vuls/id/444513 +CVE-2009-2631 - http://www.kb.cert.org/vuls/id/261869 +CVE-2009-2631 - http://www.stonesoft.com/en/support/security_advisories/2009_03_12.html +CVE-2009-2640 - http://packetstormsecurity.org/files/110437/Interlogy-Profile-Manager-Basic-Insecure-Cookie-Handling.html +CVE-2009-2648 - http://packetstormsecurity.org/0907-exploits/flashden-disclose.txt +CVE-2009-2649 - https://www.exploit-db.com/exploits/9134 +CVE-2009-2650 - http://www.exploit-db.com/exploits/9173 +CVE-2009-2654 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9686 +CVE-2009-2655 - http://www.exploit-db.com/exploits/9253 +CVE-2009-2656 - http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf +CVE-2009-2660 - https://bugs.gentoo.org/show_bug.cgi?id=276235 +CVE-2009-2663 - https://bugzilla.redhat.com/show_bug.cgi?id=516259 +CVE-2009-2663 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9506 +CVE-2009-2664 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9806 +CVE-2009-2670 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2671 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2672 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2672 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359 +CVE-2009-2673 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2675 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2676 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2689 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9603 +CVE-2009-2690 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443 +CVE-2009-2692 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2693 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-2693 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2009-2694 - http://www.coresecurity.com/content/libpurple-arbitrary-write +CVE-2009-2695 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9882 +CVE-2009-2697 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9586 +CVE-2009-2698 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2698 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 +CVE-2009-2699 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2009-2703 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6435 +CVE-2009-2715 - http://www.exploit-db.com/exploits/9323 +CVE-2009-2716 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2718 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2719 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2720 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2721 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2722 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2723 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2724 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2730 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2735 - http://www.exploit-db.com/exploits/9371 +CVE-2009-2736 - http://www.exploit-db.com/exploits/9371 +CVE-2009-2761 - http://blog.zoller.lu/2009/01/tzo-2009-2-avira-antivir-priviledge.html +CVE-2009-2762 - http://www.exploit-db.com/exploits/9410 +CVE-2009-2764 - http://www.exploit-db.com/exploits/9362 +CVE-2009-2765 - http://isc.sans.org/diary.html?storyid=6853 +CVE-2009-2765 - http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/ +CVE-2009-2771 - http://packetstormsecurity.org/0907-exploits/fas-xss.txt +CVE-2009-2772 - http://packetstormsecurity.org/0907-exploits/pgroomate-xss.txt +CVE-2009-2773 - http://www.exploit-db.com/exploits/9269 +CVE-2009-2776 - http://packetstormsecurity.org/0907-exploits/smartasp-sql.txt +CVE-2009-2779 - http://packetstormsecurity.org/0907-exploits/ajmatrixdna-sql.txt +CVE-2009-2780 - http://packetstormsecurity.org/0907-exploits/68classifieds-xss.txt +CVE-2009-2783 - http://marc.info/?l=bugtraq&m=124905075425380&w=2 +CVE-2009-2784 - http://www.exploit-db.com/exploits/9310 +CVE-2009-2785 - http://packetstormsecurity.org/0907-exploits/openclassifieds-xss.txt +CVE-2009-2787 - http://packetstormsecurity.org/0907-exploits/punbbrep-lfi.txt +CVE-2009-2790 - http://packetstormsecurity.org/0907-exploits/softbizdating-sql.txt +CVE-2009-2791 - http://www.exploit-db.com/exploits/9331 +CVE-2009-2792 - http://www.exploit-db.com/exploits/9313 +CVE-2009-2813 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191 +CVE-2009-2820 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9153 +CVE-2009-2841 - http://threatpost.com/en_us/blogs/apple-patches-critical-safari-vulnerabilities-111109 +CVE-2009-2842 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5915 +CVE-2009-2847 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2848 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html +CVE-2009-2848 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9766 +CVE-2009-2876 - http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html +CVE-2009-2878 - http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-013-cisco.html +CVE-2009-2881 - http://www.exploit-db.com/exploits/9246 +CVE-2009-2882 - http://packetstormsecurity.org/0907-exploits/pgmatchmaking-xss.txt +CVE-2009-2884 - http://packetstormsecurity.org/0907-exploits/tallestbuildings-sql.txt +CVE-2009-2885 - http://packetstormsecurity.org/0907-exploits/tallestbuildings-sql.txt +CVE-2009-2886 - http://packetstormsecurity.org/0907-exploits/presidentbios-sqlxss.txt +CVE-2009-2887 - http://packetstormsecurity.org/0907-exploits/presidentbios-sqlxss.txt +CVE-2009-2888 - http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt +CVE-2009-2889 - http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt +CVE-2009-2890 - http://packetstormsecurity.org/0907-exploits/riddledepot-sqlxss.txt +CVE-2009-2891 - http://packetstormsecurity.org/0907-exploits/riddledepot-sqlxss.txt +CVE-2009-2892 - http://www.exploit-db.com/exploits/9252 +CVE-2009-2893 - http://packetstormsecurity.org/0907-exploits/xzero-xss.txt +CVE-2009-2894 - http://packetstormsecurity.org/0907-exploits/clone2009-sql.txt +CVE-2009-2896 - http://www.exploit-db.com/exploits/9220 +CVE-2009-2897 - http://www.coresecurity.com/content/hyperic-hq-vulnerabilities +CVE-2009-2898 - http://www.coresecurity.com/content/hyperic-hq-vulnerabilities +CVE-2009-2901 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-2901 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2009-2902 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-2902 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2009-2904 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9862 +CVE-2009-2905 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9664 +CVE-2009-2906 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944 +CVE-2009-2915 - http://packetstormsecurity.org/0908-exploits/discuz60-sql.txt +CVE-2009-2916 - http://aluigi.altervista.org/adv/vietcong2fs-adv.txt +CVE-2009-2917 - http://www.exploit-db.com/exploits/9382 +CVE-2009-2919 - http://securityreason.com/exploitalert/5644 +CVE-2009-2921 - http://www.exploit-db.com/exploits/9353 +CVE-2009-2923 - http://www.exploit-db.com/exploits/9444 +CVE-2009-2925 - http://www.exploit-db.com/exploits/9140 +CVE-2009-2949 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-2949 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10176 +CVE-2009-2950 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-2957 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2009-2958 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2009-2958 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9816 +CVE-2009-2961 - http://www.exploit-db.com/exploits/9467 +CVE-2009-3003 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html +CVE-2009-3004 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html +CVE-2009-3005 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html +CVE-2009-3006 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html +CVE-2009-3006 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6437 +CVE-2009-3007 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html +CVE-2009-3008 - http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html +CVE-2009-3031 - http://sotiriu.de/adv/NSOADV-2009-001.txt +CVE-2009-3038 - http://www.exploit-db.com/exploits/9517 +CVE-2009-3042 - http://seclists.org/fulldisclosure/2009/Aug/0143.html +CVE-2009-3042 - http://www.exploit-db.com/exploits/9416 +CVE-2009-3050 - http://bugs.gentoo.org/show_bug.cgi?id=278186 +CVE-2009-3050 - http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt +CVE-2009-3050 - http://www.openwall.com/lists/oss-security/2009/07/25/3 +CVE-2009-3057 - http://packetstormsecurity.org/0909-exploits/beex-xss.txt +CVE-2009-3058 - http://packetstormsecurity.org/0909-exploits/akplayer-overflow.txt +CVE-2009-3059 - http://packetstormsecurity.org/0908-exploits/jboard-sql.txt +CVE-2009-3060 - http://packetstormsecurity.org/0908-exploits/jboard-sql.txt +CVE-2009-3061 - http://packetstormsecurity.org/0909-exploits/alqatarigroup-sql.txt +CVE-2009-3065 - http://www.exploit-db.com/exploits/9577 +CVE-2009-3066 - http://packetstormsecurity.org/0909-exploits/propertywatch-xss.txt +CVE-2009-3067 - http://packetstormsecurity.org/0909-exploits/resvman-xss.txt +CVE-2009-3069 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3070 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3071 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3072 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3073 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3074 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3074 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9444 +CVE-2009-3075 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3076 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3076 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9306 +CVE-2009-3077 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3078 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3079 - http://www.novell.com/linux/security/advisories/2009_48_firefox.html +CVE-2009-3085 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6434 +CVE-2009-3095 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9363 +CVE-2009-3103 - http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html +CVE-2009-3103 - http://isc.sans.org/diary.html?storyid=7093 +CVE-2009-3103 - http://www.exploit-db.com/exploits/9594 +CVE-2009-3103 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050 +CVE-2009-3111 - http://www.openwall.com/lists/oss-security/2009/09/09/1 +CVE-2009-3111 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9919 +CVE-2009-3112 - http://www.oxidforge.org/wiki/Security_bulletins/2009-001 +CVE-2009-3114 - http://www.scip.ch/?vuldb.4021 +CVE-2009-3118 - http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt +CVE-2009-3119 - http://packetstormsecurity.org/0908-exploits/phpfusiondsmsf-sql.txt +CVE-2009-3123 - http://packetstormsecurity.org/0908-exploits/wapmotor-lfi.txt +CVE-2009-3124 - http://packetstormsecurity.org/0908-exploits/quarkmail-lfi.txt +CVE-2009-3126 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062 +CVE-2009-3127 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3128 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3129 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3130 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3131 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3132 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3133 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3134 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-067 +CVE-2009-3135 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-068 +CVE-2009-3147 - http://packetstormsecurity.org/0907-exploits/reviewpost-xss.txt +CVE-2009-3148 - http://www.exploit-db.com/exploits/9325 +CVE-2009-3149 - http://www.exploit-db.com/exploits/9355 +CVE-2009-3151 - http://www.exploit-db.com/exploits/9307 +CVE-2009-3152 - http://packetstormsecurity.org/0907-exploits/ntsoft-xss.txt +CVE-2009-3153 - http://packetstormsecurity.org/0907-exploits/x10mp3se-xss.txt +CVE-2009-3158 - http://www.exploit-db.com/exploits/9337 +CVE-2009-3162 - http://packetstormsecurity.org/0908-exploits/multiwebsite-xss.txt +CVE-2009-3170 - http://www.exploit-db.com/exploits/9561 +CVE-2009-3171 - http://packetstormsecurity.org/0909-exploits/gazellecms-xss.txt +CVE-2009-3182 - http://www.exploit-db.com/exploits/9433 +CVE-2009-3184 - http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt +CVE-2009-3185 - http://www.exploit-db.com/exploits/9529 +CVE-2009-3186 - http://packetstormsecurity.org/0908-exploits/videogirls-xss.txt +CVE-2009-3187 - http://packetstormsecurity.org/0908-exploits/saa-xss.txt +CVE-2009-3189 - http://packetstormsecurity.org/0908-exploits/digiozgb-xss.txt +CVE-2009-3192 - http://packetstormsecurity.org/0908-exploits/linkorcms-xss.txt +CVE-2009-3194 - http://packetstormsecurity.org/0908-exploits/searchfeed-xss.txt +CVE-2009-3195 - http://packetstormsecurity.org/0908-exploits/auctionrsscs-xss.txt +CVE-2009-3196 - http://packetstormsecurity.org/0908-exploits/phpvideoyoutube-xss.txt +CVE-2009-3197 - http://packetstormsecurity.org/0908-exploits/phpcalsearch-xss.txt +CVE-2009-3198 - http://packetstormsecurity.org/0908-exploits/ams-xss.txt +CVE-2009-3201 - http://www.exploit-db.com/exploits/9620 +CVE-2009-3202 - http://packetstormsecurity.org/0908-exploits/uloki-xss.txt +CVE-2009-3203 - http://packetstormsecurity.org/0908-exploits/ajauctionoopd2-sql.txt +CVE-2009-3204 - http://packetstormsecurity.org/0908-exploits/stivaforum-xss.txt +CVE-2009-3205 - http://packetstormsecurity.org/0908-exploits/cbauthority-sql.txt +CVE-2009-3208 - http://packetstormsecurity.org/0908-exploits/phpfreebb-sql.txt +CVE-2009-3209 - http://packetstormsecurity.org/0908-exploits/phpem-sql.txt +CVE-2009-3211 - http://packetstormsecurity.org/0908-exploits/infinity-disclose.txt +CVE-2009-3212 - http://packetstormsecurity.org/0908-exploits/infinity-disclose.txt +CVE-2009-3213 - http://packetstormsecurity.org/0908-exploits/broid-overflow.txt +CVE-2009-3215 - http://www.exploit-db.com/exploits/9276 +CVE-2009-3216 - http://www.exploit-db.com/exploits/9266 +CVE-2009-3217 - http://www.exploit-db.com/exploits/9266 +CVE-2009-3221 - http://packetstormsecurity.org/0907-exploits/alp-overflow.txt +CVE-2009-3222 - http://packetstormsecurity.org/0907-exploits/honesttraffic-xss.txt +CVE-2009-3223 - http://www.exploit-db.com/exploits/9271 +CVE-2009-3225 - http://packetstormsecurity.org/0907-exploits/almondclassifieds-xss.txt +CVE-2009-3226 - http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt +CVE-2009-3227 - http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt +CVE-2009-3228 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9409 +CVE-2009-3244 - http://www.exploit-db.com/exploits/9682 +CVE-2009-3245 - http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html +CVE-2009-3245 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790 +CVE-2009-3246 - http://www.packetstormsecurity.com/0909-exploits/mybuxscript-sql.txt +CVE-2009-3249 - http://securityreason.com/securityalert/8118 +CVE-2009-3253 - http://www.exploit-db.com/exploits/9546 +CVE-2009-3255 - http://packetstormsecurity.org/0908-exploits/rqms-bypass.txt +CVE-2009-3256 - http://packetstormsecurity.org/0908-exploits/livestreet-xss.txt +CVE-2009-3260 - http://packetstormsecurity.org/0908-exploits/livestreet-xss.txt +CVE-2009-3261 - http://packetstormsecurity.org/0908-exploits/livestreet-xss.txt +CVE-2009-3263 - http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ +CVE-2009-3265 - http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ +CVE-2009-3266 - http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ +CVE-2009-3266 - http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/ +CVE-2009-3274 - https://bugzilla.mozilla.org/show_bug.cgi?id=514823 +CVE-2009-3274 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9641 +CVE-2009-3286 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757 +CVE-2009-3292 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9982 +CVE-2009-3295 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-003.txt +CVE-2009-3301 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-3302 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-3308 - http://www.exploit-db.com/exploits/9719 +CVE-2009-3311 - http://packetstormsecurity.org/0909-exploits/rssms-xss.txt +CVE-2009-3316 - http://www.exploit-db.com/exploits/9713 +CVE-2009-3320 - http://packetstormsecurity.org/0909-exploits/paolink-xss.txt +CVE-2009-3334 - http://www.exploit-db.com/exploits/9732 +CVE-2009-3338 - http://www.exploit-db.com/exploits/9659 +CVE-2009-3342 - https://www.exploit-db.com/exploits/9654 +CVE-2009-3348 - http://www.exploit-db.com/exploits/9640 +CVE-2009-3349 - http://www.exploit-db.com/exploits/9640 +CVE-2009-3350 - http://drupal.org/node/572852 +CVE-2009-3351 - http://drupal.org/node/572852 +CVE-2009-3352 - http://drupal.org/node/572852 +CVE-2009-3353 - http://drupal.org/node/572852 +CVE-2009-3354 - http://drupal.org/node/572852 +CVE-2009-3355 - http://packetstormsecurity.org/0909-exploits/buydatingsite-xss.txt +CVE-2009-3357 - http://e-rdc.org/v1/news.php?readmore=142 +CVE-2009-3357 - http://www.exploit-db.com/exploits/9648 +CVE-2009-3359 - http://packetstormsecurity.org/0909-exploits/matchagencybiz-xss.txt +CVE-2009-3360 - http://packetstormsecurity.org/0909-exploits/datemill-xss.txt +CVE-2009-3362 - http://packetstormsecurity.org/0909-exploits/sznews-rfi.txt +CVE-2009-3368 - http://e-rdc.org/v1/news.php?readmore=142 +CVE-2009-3368 - http://www.exploit-db.com/exploits/9648 +CVE-2009-3370 - https://bugzilla.mozilla.org/show_bug.cgi?id=511615 +CVE-2009-3371 - https://bugzilla.mozilla.org/show_bug.cgi?id=514554 +CVE-2009-3373 - https://bugzilla.mozilla.org/show_bug.cgi?id=511689 +CVE-2009-3374 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9789 +CVE-2009-3380 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9463 +CVE-2009-3389 - http://www.theora.org/news/#libtheora-1.1.0 +CVE-2009-3410 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3411 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3412 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3413 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3414 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3415 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3416 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3421 - http://www.exploit-db.com/exploits/9293 +CVE-2009-3422 - http://www.exploit-db.com/exploits/9294 +CVE-2009-3423 - http://www.exploit-db.com/exploits/9292 +CVE-2009-3425 - http://www.exploit-db.com/exploits/9350 +CVE-2009-3426 - http://www.exploit-db.com/exploits/9350 +CVE-2009-3434 - http://packetstormsecurity.org/0909-exploits/mambojoomlatupinambis-sql.txt +CVE-2009-3436 - http://packetstormsecurity.org/0909-exploits/maxwebportal-sql.txt +CVE-2009-3438 - http://packetstormsecurity.org/0909-exploits/joomlafb-sql.txt +CVE-2009-3443 - http://packetstormsecurity.org/0909-exploits/joomlafastball-sql.txt +CVE-2009-3446 - http://www.exploit-db.com/exploits/9733 +CVE-2009-3449 - http://www.exploit-db.com/exploits/9689 +CVE-2009-3457 - http://seclists.org/fulldisclosure/2009/Sep/0369.html +CVE-2009-3459 - http://isc.sans.org/diary.html?storyid=7300 +CVE-2009-3478 - http://vuln.sg/fireftp105-en.html +CVE-2009-3483 - http://www.packetstormsecurity.org/0909-exploits/Dr_IDE-CuteFTP_FTP_8.3.3-PoC.py.txt +CVE-2009-3484 - http://www.packetstormsecurity.org/0909-exploits/coreftp_local.py.txt +CVE-2009-3491 - http://packetstormsecurity.org/0909-exploits/joomlasportfusion-sql.txt +CVE-2009-3493 - http://packetstormsecurity.org/0909-exploits/paobacheca-xss.txt +CVE-2009-3497 - http://www.packetstormsecurity.org/0909-exploits/realestaterealtors-sql.txt +CVE-2009-3498 - http://packetstormsecurity.org/0909-exploits/hbcms-sql.txt +CVE-2009-3500 - http://packetstormsecurity.org/0909-exploits/bpgames-sql.txt +CVE-2009-3501 - http://packetstormsecurity.org/0909-exploits/bpstudent-sql.txt +CVE-2009-3502 - http://packetstormsecurity.org/0909-exploits/bpmusic-sql.txt +CVE-2009-3503 - http://packetstormsecurity.org/0909-exploits/bpholidaylettings-sql.txt +CVE-2009-3504 - http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt +CVE-2009-3505 - http://packetstormsecurity.org/0909-exploits/mmorpgzone-sql.txt +CVE-2009-3506 - http://www.exploit-db.com/exploits/9311 +CVE-2009-3507 - http://www.exploit-db.com/exploits/9311 +CVE-2009-3508 - http://www.exploit-db.com/exploits/9314 +CVE-2009-3509 - http://packetstormsecurity.org/0907-exploits/cjdynamicpoll-xss.txt +CVE-2009-3510 - http://www.exploit-db.com/exploits/9316 +CVE-2009-3511 - http://www.exploit-db.com/exploits/9308 +CVE-2009-3512 - http://packetstormsecurity.org/0907-exploits/myweight-xss.txt +CVE-2009-3513 - http://packetstormsecurity.org/0907-exploits/etraining-xss.txt +CVE-2009-3514 - http://www.exploit-db.com/exploits/9312 +CVE-2009-3515 - http://www.exploit-db.com/exploits/9312 +CVE-2009-3520 - http://packetstormsecurity.org/0909-exploits/cmsphp-xsrf.txt +CVE-2009-3525 - http://www.openwall.com/lists/oss-security/2009/09/25/1 +CVE-2009-3525 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466 +CVE-2009-3531 - http://packetstormsecurity.org/0907-exploits/universecms-sql.txt +CVE-2009-3532 - http://www.packetstormsecurity.org/0907-advisories/DDIVRT-2009-26.txt +CVE-2009-3535 - http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt +CVE-2009-3536 - http://www.exploit-db.com/exploits/9200 +CVE-2009-3539 - http://packetstormsecurity.org/0907-exploits/ultraclassifieds-xss.txt +CVE-2009-3542 - http://packetstormsecurity.org/0907-exploits/ls-lfi.txt +CVE-2009-3547 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9327 +CVE-2009-3548 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-3548 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2009-3553 - http://www.cups.org/str.php?L3200 +CVE-2009-3555 - http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html +CVE-2009-3555 - http://clicky.me/tlsvuln +CVE-2009-3555 - http://seclists.org/fulldisclosure/2009/Nov/139 +CVE-2009-3555 - http://ubuntu.com/usn/usn-923-1 +CVE-2009-3555 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2009-3555 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-3555 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2009-3555 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2009-3555 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2009-3555 - http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html +CVE-2009-3555 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html +CVE-2009-3555 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-3555 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2009-3555 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html +CVE-2009-3556 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9738 +CVE-2009-3563 - https://www.kb.cert.org/vuls/id/417980 +CVE-2009-3574 - http://www.exploit-db.com/exploits/9671 +CVE-2009-3576 - http://www.coresecurity.com/content/softimage-arbitrary-command-execution +CVE-2009-3577 - http://www.coresecurity.com/content/3dsmax-arbitrary-command-execution +CVE-2009-3578 - http://www.coresecurity.com/content/maya-arbitrary-command-execution +CVE-2009-3579 - http://www.coresecurity.com/content/jetty-persistent-xss +CVE-2009-3579 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-3585 - http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch +CVE-2009-3585 - http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch +CVE-2009-3585 - http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch +CVE-2009-3586 - http://census-labs.com/news/2009/12/02/corehttp-web-server/ +CVE-2009-3592 - http://packetstormsecurity.org/0910-exploits/X-Cart-submail-XSS.txt +CVE-2009-3593 - http://packetstormsecurity.org/0907-exploits/freelancers-xss.txt +CVE-2009-3598 - http://packetstormsecurity.org/0907-exploits/formxp-xss.txt +CVE-2009-3599 - http://packetstormsecurity.org/0907-exploits/hubscript-xssphpinfo.txt +CVE-2009-3600 - http://packetstormsecurity.org/0907-exploits/hubscript-xssphpinfo.txt +CVE-2009-3601 - http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt +CVE-2009-3603 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9671 +CVE-2009-3604 - http://site.pi3.com.pl/adv/xpdf.txt +CVE-2009-3608 - http://www.ocert.org/advisories/ocert-2009-016.html +CVE-2009-3608 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9536 +CVE-2009-3612 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10395 +CVE-2009-3615 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9414 +CVE-2009-3616 - https://bugzilla.redhat.com/show_bug.cgi?id=508567 +CVE-2009-3620 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891 +CVE-2009-3621 - http://lkml.org/lkml/2009/10/19/50 +CVE-2009-3621 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9921 +CVE-2009-3622 - http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ +CVE-2009-3622 - http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html +CVE-2009-3622 - https://bugzilla.redhat.com/show_bug.cgi?id=530056 +CVE-2009-3625 - http://www.openwall.com/lists/oss-security/2009/10/22/3 +CVE-2009-3625 - http://www.openwall.com/lists/oss-security/2009/10/22/6 +CVE-2009-3625 - https://bugzilla.redhat.com/show_bug.cgi?id=530255 +CVE-2009-3626 - http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973 +CVE-2009-3626 - http://www.openwall.com/lists/oss-security/2009/10/23/8 +CVE-2009-3641 - http://marc.info/?l=oss-security&m=125649553414700&w=2 +CVE-2009-3641 - http://seclists.org/fulldisclosure/2009/Oct/299 +CVE-2009-3641 - https://bugzilla.redhat.com/show_bug.cgi?id=530863 +CVE-2009-3642 - http://packetstormsecurity.org/0909-exploits/heat-sql.txt +CVE-2009-3643 - http://packetstormsecurity.org/0910-exploits/XM-ftp-dos.txt +CVE-2009-3644 - http://packetstormsecurity.org/0910-exploits/joomlasoundset-sql.txt +CVE-2009-3645 - http://packetstormsecurity.org/0910-exploits/joomlacbrb-sql.txt +CVE-2009-3648 - http://www.madirish.net/?article=251 +CVE-2009-3661 - http://www.exploit-db.com/exploits/9693 +CVE-2009-3663 - http://www.exploit-db.com/exploits/9657 +CVE-2009-3668 - http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt +CVE-2009-3669 - http://www.exploit-db.com/exploits/9697 +CVE-2009-3671 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 +CVE-2009-3672 - http://www.symantec.com/connect/blogs/zero-day-internet-explorer-exploit-published +CVE-2009-3672 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 +CVE-2009-3673 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 +CVE-2009-3674 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072 +CVE-2009-3675 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-069 +CVE-2009-3676 - http://g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html +CVE-2009-3676 - http://seclists.org/fulldisclosure/2009/Nov/134 +CVE-2009-3676 - http://secunia.com/blog/66/ +CVE-2009-3678 - http://isc.sans.org/diary.html?storyid=8809 +CVE-2009-3694 - http://securityreason.com/expldownload/1/7380/1 +CVE-2009-3704 - http://packetstormsecurity.org/0910-exploits/zoiper_dos.py.txt +CVE-2009-3705 - http://packetstormsecurity.org/0909-exploits/achievo134-rfi.txt +CVE-2009-3707 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2009-3709 - http://packetstormsecurity.org/0910-exploits/alleycode-overflow.txt +CVE-2009-3710 - http://packetstormsecurity.org/0910-exploits/riorey-passwd.txt +CVE-2009-3714 - http://www.exploit-db.com/exploits/9205 +CVE-2009-3715 - http://www.exploit-db.com/exploits/9205 +CVE-2009-3716 - http://www.exploit-db.com/exploits/9205 +CVE-2009-3717 - http://www.exploit-db.com/exploits/9102 +CVE-2009-3721 - http://www.ocert.org/advisories/ocert-2009-013.html +CVE-2009-3722 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9892 +CVE-2009-3724 - https://snyk.io/vuln/SNYK-PYTHON-PYRAD-40000 +CVE-2009-3726 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9734 +CVE-2009-3732 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2009-3734 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon +CVE-2009-3735 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 +CVE-2009-3742 - http://issues.liferay.com/browse/LPS-6034 +CVE-2009-3747 - http://packetstormsecurity.org/0910-exploits/tbmnetcms-xss.txt +CVE-2009-3748 - http://sotiriu.de/adv/NSOADV-2009-003.txt +CVE-2009-3749 - http://sotiriu.de/adv/NSOADV-2009-002.txt +CVE-2009-3754 - http://www.exploit-db.com/exploits/9101 +CVE-2009-3755 - http://www.exploit-db.com/exploits/9101 +CVE-2009-3756 - http://www.exploit-db.com/exploits/9101 +CVE-2009-3757 - http://www.exploit-db.com/exploits/9106 +CVE-2009-3758 - http://www.exploit-db.com/exploits/9106 +CVE-2009-3759 - http://www.exploit-db.com/exploits/9106 +CVE-2009-3760 - http://www.exploit-db.com/exploits/9106 +CVE-2009-3762 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-3763 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-3764 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2009-3787 - http://www.waraxe.us/advisory-75.html +CVE-2009-3788 - http://www.packetstormsecurity.org/0910-exploits/opendocman-sqlxss.txt +CVE-2009-3789 - http://www.packetstormsecurity.org/0910-exploits/opendocman-sqlxss.txt +CVE-2009-3793 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2009-3802 - http://packetstormsecurity.org/0910-exploits/ONSEC-09-005.txt +CVE-2009-3803 - http://packetstormsecurity.org/0910-exploits/ONSEC-09-004.txt +CVE-2009-3805 - http://www.packetstormsecurity.com/0910-exploits/gpg2kleo-dos.txt +CVE-2009-3807 - http://www.exploit-db.com/exploits/9147 +CVE-2009-3808 - http://www.exploit-db.com/exploits/9178 +CVE-2009-3809 - http://www.exploit-db.com/exploits/9212 +CVE-2009-3810 - http://www.exploit-db.com/exploits/9213 +CVE-2009-3811 - http://liquidworm.blogspot.com/2009/07/music-tag-editor-161-build-212-remote.html +CVE-2009-3811 - http://www.exploit-db.com/exploits/9167 +CVE-2009-3812 - http://packetstormsecurity.org/0907-exploits/otsav-overflow.txt +CVE-2009-3812 - http://www.exploit-db.com/exploits/9113 +CVE-2009-3822 - http://www.packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt +CVE-2009-3825 - http://www.exploit-db.com/exploits/9103 +CVE-2009-3829 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9945 +CVE-2009-3833 - http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt +CVE-2009-3834 - http://packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt +CVE-2009-3835 - http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt +CVE-2009-3837 - http://www.packetstormsecurity.org/0910-exploits/eurekamc-dos.txt +CVE-2009-3838 - http://www.packetstormsecurity.org/0910-exploits/pegasusmc-dos.txt +CVE-2009-3840 - http://seclists.org/fulldisclosure/2009/Nov/199 +CVE-2009-3840 - http://www.coresecurity.com/content/openview_nnm_internaldb_dos +CVE-2009-3850 - http://www.coresecurity.com/content/blender-scripting-injection +CVE-2009-3857 - http://www.exploit-db.com/exploits/9133 +CVE-2009-3858 - http://packetstormsecurity.org/0907-exploits/gejosoft-xss.txt +CVE-2009-3859 - http://www.exploit-db.com/exploits/9114 +CVE-2009-3863 - http://www.exploit-db.com/exploits/9683 +CVE-2009-3867 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3868 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3869 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3871 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3871 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9360 +CVE-2009-3872 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3873 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3873 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9602 +CVE-2009-3874 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3875 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3876 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3877 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2009-3879 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9568 +CVE-2009-3887 - http://ocert.org/advisories/ocert-2009-013.html +CVE-2009-3887 - https://www.akitasecurity.nl/advisory.php?id=AK20090601 +CVE-2009-3896 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035 +CVE-2009-3901 - http://packetstormsecurity.org/0911-exploits/ecourier-xss.txt +CVE-2009-3904 - http://www.acunetix.com/blog/websecuritynews/cubecart-4-session-management-bypass-leads-to-administrator-access/ +CVE-2009-3909 - https://bugzilla.gnome.org/show_bug.cgi?id=600741 +CVE-2009-3911 - http://packetstormsecurity.org/0911-exploits/tftgallery-traversal.txt +CVE-2009-3912 - http://packetstormsecurity.org/0911-exploits/tftgallery-traversal.txt +CVE-2009-3924 - http://aluigi.altervista.org/adv/sof2pbbof-adv.txt +CVE-2009-3924 - http://aluigi.org/poc/sof2pbbof.zip +CVE-2009-3931 - http://securethoughts.com/2009/11/using-blended-browser-threats-involving-chrome-to-steal-files-on-your-computer/ +CVE-2009-3938 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680 +CVE-2009-3938 - http://bugs.freedesktop.org/show_bug.cgi?id=23074 +CVE-2009-3947 - http://www.exploit-db.com/exploits/9131 +CVE-2009-3948 - http://www.exploit-db.com/exploits/9139 +CVE-2009-3956 - http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt +CVE-2009-3960 - https://www.exploit-db.com/exploits/41855/ +CVE-2009-3967 - http://www.exploit-db.com/exploits/9480 +CVE-2009-3969 - http://www.exploit-db.com/exploits/9487 +CVE-2009-3977 - http://seclists.org/fulldisclosure/2009/Nov/199 +CVE-2009-3977 - http://www.coresecurity.com/content/openview_nnm_internaldb_dos +CVE-2009-3983 - https://bugzilla.mozilla.org/show_bug.cgi?id=487872 +CVE-2009-3984 - https://bugzilla.mozilla.org/show_bug.cgi?id=521461 +CVE-2009-3984 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9791 +CVE-2009-3985 - https://bugzilla.mozilla.org/show_bug.cgi?id=514232 +CVE-2009-3985 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9911 +CVE-2009-3988 - https://bugzilla.mozilla.org/show_bug.cgi?id=504862 +CVE-2009-3988 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9384 +CVE-2009-4008 - http://unbound.nlnetlabs.nl/downloads/unbound-1.4.4.tar.gz +CVE-2009-4017 - http://seclists.org/fulldisclosure/2009/Nov/228 +CVE-2009-4017 - http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/ +CVE-2009-4017 - http://www.openwall.com/lists/oss-security/2009/11/20/7 +CVE-2009-4030 - http://bugs.mysql.com/bug.php?id=32167 +CVE-2009-4056 - http://www.packetstormsecurity.org/0911-exploits/betsycms-lfi.txt +CVE-2009-4057 - http://www.packetstormsecurity.org/0911-exploits/joomlanexus-sql.txt +CVE-2009-4059 - http://packetstormsecurity.org/0911-exploits/joomlajoomclip-sql.txt +CVE-2009-4065 - http://drupal.org/node/636462 +CVE-2009-4073 - http://www.theregister.co.uk/2009/11/23/internet_explorer_file_disclosure_bug/ +CVE-2009-4074 - http://www.theregister.co.uk/2009/11/20/internet_explorer_security_flaw/ +CVE-2009-4074 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2009-4082 - http://packetstormsecurity.org/0911-exploits/opt-rfi.txt +CVE-2009-4082 - http://www.exploit-db.com/exploits/10218 +CVE-2009-4086 - http://packetstormsecurity.org/0911-exploits/xerver-split.txt +CVE-2009-4087 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt +CVE-2009-4088 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt +CVE-2009-4089 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt +CVE-2009-4090 - http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt +CVE-2009-4091 - http://www.exploit-db.com/exploits/10180 +CVE-2009-4092 - http://www.exploit-db.com/exploits/10180 +CVE-2009-4093 - http://www.exploit-db.com/exploits/10180 +CVE-2009-4096 - http://packetstormsecurity.org/0911-exploits/istek-disclose.txt +CVE-2009-4097 - http://packetstormsecurity.org/0911-exploits/serenityaudio-overflow.txt +CVE-2009-4099 - http://packetstormsecurity.org/0911-exploits/joomlagcalendar-sql.txt +CVE-2009-4100 - http://www.net-security.org/secworld.php?id=8527 +CVE-2009-4102 - http://www.net-security.org/secworld.php?id=8527 +CVE-2009-4104 - http://securityreason.com/exploitalert/7480 +CVE-2009-4107 - http://hjafari.blogspot.com/2009/09/invisible-browsing-5052-ibkey-local.html +CVE-2009-4113 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4115 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4116 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4118 - http://packetstormsecurity.org/0911-exploits/sybsec-adv17.txt +CVE-2009-4131 - http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/ +CVE-2009-4136 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9358 +CVE-2009-4137 - http://www.suspekt.org/2009/12/09/advisory-032009-piwik-cookie-unserialize-vulnerability/ +CVE-2009-4138 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9527 +CVE-2009-4140 - http://packetstormsecurity.com/files/123493/wpseowatcher-exec.txt +CVE-2009-4140 - http://packetstormsecurity.com/files/123494/wpslimstatex-exec.txt +CVE-2009-4140 - http://packetstormsecurity.org/0910-exploits/piwik-upload.txt +CVE-2009-4141 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9201 +CVE-2009-4146 - http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html +CVE-2009-4147 - http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html +CVE-2009-4148 - http://www.coresecurity.com/content/dazstudio-scripting-injection +CVE-2009-4151 - http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch +CVE-2009-4151 - http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch +CVE-2009-4151 - http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch +CVE-2009-4154 - http://packetstormsecurity.org/0911-exploits/elxiscms-disclose.txt +CVE-2009-4156 - http://www.exploit-db.com/exploits/10259 +CVE-2009-4168 - http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt +CVE-2009-4172 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4173 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4174 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4175 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4201 - http://liquidworm.blogspot.com/2009/05/mp3-tag-assistant-pro-292-tag-metadata.html +CVE-2009-4212 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt +CVE-2009-4216 - http://packetstormsecurity.org/0911-exploits/klinza-lfi.txt +CVE-2009-4220 - http://packetstormsecurity.org/0911-exploits/pointcomma-rfi.txt +CVE-2009-4220 - http://www.exploit-db.com/exploits/10220 +CVE-2009-4221 - http://packetstormsecurity.org/0911-exploits/phpbazar211fix-sql.txt +CVE-2009-4222 - http://packetstormsecurity.org/0911-exploits/phpbazar-access.txt +CVE-2009-4223 - http://www.exploit-db.com/exploits/10216 +CVE-2009-4224 - http://packetstormsecurity.org/0911-exploits/sweetrice-rfilfi.txt +CVE-2009-4224 - http://www.exploit-db.com/exploits/10246 +CVE-2009-4227 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274 +CVE-2009-4227 - https://bugzilla.redhat.com/show_bug.cgi?id=543905 +CVE-2009-4228 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274 +CVE-2009-4228 - https://bugzilla.redhat.com/show_bug.cgi?id=543905 +CVE-2009-4231 - http://packetstormsecurity.org/0911-exploits/sweetrice-rfilfi.txt +CVE-2009-4234 - http://packetstormsecurity.org/0911-exploits/micronet-xss.txt +CVE-2009-4237 - http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities +CVE-2009-4238 - http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities +CVE-2009-4245 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9998 +CVE-2009-4249 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4250 - http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt +CVE-2009-4251 - http://www.packetstormsecurity.org/0912-exploits/jasc-overflow.txt +CVE-2009-4261 - http://www.ocert.org/advisories/ocert-2009-019.html +CVE-2009-4261 - http://www.openwall.com/lists/oss-security/2009/12/17/5 +CVE-2009-4262 - http://www.packetstormsecurity.org/0912-exploits/hbns-admin.txt +CVE-2009-4264 - http://www.exploit-db.com/exploits/10329 +CVE-2009-4269 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2009-4307 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9874 +CVE-2009-4308 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2009-4315 - http://packetstormsecurity.org/0912-exploits/nuggetz-exec.txt +CVE-2009-4317 - http://packetstormsecurity.org/0912-exploits/ezcart-xss.txt +CVE-2009-4318 - http://packetstormsecurity.org/0912-exploits/rem101-xss.txt +CVE-2009-4321 - http://www.zen-cart.com/forum/showthread.php?t=142784 +CVE-2009-4322 - http://www.zen-cart.com/forum/showthread.php?t=142784 +CVE-2009-4323 - http://www.zen-cart.com/forum/showthread.php?t=142784 +CVE-2009-4324 - http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html +CVE-2009-4324 - http://www.symantec.com/connect/blogs/zero-day-xmas-present +CVE-2009-4347 - http://packetstormsecurity.org/0912-exploits/daloradius-xss.txt +CVE-2009-4349 - http://packetstormsecurity.org/0912-exploits/linkupgold-xsrf.txt +CVE-2009-4350 - http://packetstormsecurity.com/0912-exploits/arcticissue-xss.txt +CVE-2009-4359 - http://www.packetstormsecurity.org/0911-exploits/xoopssmartmedia-xss.txt +CVE-2009-4360 - http://securityreason.com/exploitalert/7494 +CVE-2009-4360 - http://www.packetstormsecurity.org/0911-exploits/xoopscontent-sql.txt +CVE-2009-4365 - http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt +CVE-2009-4366 - http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt +CVE-2009-4367 - http://www.exploit-db.com/exploits/10513 +CVE-2009-4369 - http://www.madirish.net/?article=441 +CVE-2009-4371 - http://www.madirish.net/?article=442 +CVE-2009-4372 - http://www.exploit-db.com/exploits/10480 +CVE-2009-4377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9564 +CVE-2009-4381 - http://packetstormsecurity.org/0912-exploits/mps-xss.txt +CVE-2009-4382 - http://packetstormsecurity.org/0912-exploits/phpfabercms-xss.txt +CVE-2009-4384 - http://packetstormsecurity.org/0912-exploits/ezpollhoster-xssxsrf.txt +CVE-2009-4384 - http://www.exploit-db.com/exploits/10439 +CVE-2009-4385 - http://packetstormsecurity.org/0912-exploits/ezpollhoster-xssxsrf.txt +CVE-2009-4385 - http://www.exploit-db.com/exploits/10439 +CVE-2009-4386 - http://packetstormsecurity.org/0912-exploits/b2cbcs-sql.txt +CVE-2009-4387 - http://www.scip.ch/?vuldb.4063 +CVE-2009-4403 - http://www.exploit-db.com/exploits/10534 +CVE-2009-4406 - http://www.packetstormsecurity.org/0912-exploits/apc-xss.txt +CVE-2009-4413 - http://www.exploit-db.com/exploits/10338 +CVE-2009-4417 - http://www.suspekt.org/2009/12/09/advisory-032009-piwik-cookie-unserialize-vulnerability/ +CVE-2009-4419 - http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf +CVE-2009-4423 - http://packetstormsecurity.org/0912-exploits/weencompany-sql.txt +CVE-2009-4424 - http://packetstormsecurity.org/0912-exploits/wppyrmont-sql.txt +CVE-2009-4425 - http://packetstormsecurity.org/0912-exploits/idevcart-xss.txt +CVE-2009-4426 - http://packetstormsecurity.org/0912-exploits/ignition-lfi.txt +CVE-2009-4426 - http://www.exploit-db.com/exploits/10569 +CVE-2009-4428 - http://packetstormsecurity.org/0912-exploits/joomlaportfolio-sql.txt +CVE-2009-4429 - http://www.madirish.net/?article=440 +CVE-2009-4431 - http://packetstormsecurity.org/0912-exploits/joomlajcalpro-rfi.txt +CVE-2009-4432 - http://packetstormsecurity.org/0912-exploits/videocms-sql.txt +CVE-2009-4433 - http://packetstormsecurity.org/0912-exploits/isupport-lfixss.txt +CVE-2009-4434 - http://packetstormsecurity.org/0912-exploits/isupport-lfixss.txt +CVE-2009-4435 - http://packetstormsecurity.org/0912-exploits/f3site2009-lfi.txt +CVE-2009-4437 - http://packetstormsecurity.org/0912-exploits/activeauctionhouse-sql.txt +CVE-2009-4458 - http://www.exploit-db.com/exploits/10645 +CVE-2009-4463 - http://blog.48bits.com/?p=781 +CVE-2009-4464 - http://www.packetstormsecurity.org/0912-exploits/abd-xss.txt +CVE-2009-4474 - http://www.exploit-db.com/exploits/9588 +CVE-2009-4475 - http://packetstormsecurity.org/0909-exploits/joomlajoomlub-sql.txt +CVE-2009-4477 - http://www.exploit-db.com/exploits/9565 +CVE-2009-4478 - http://www.exploit-db.com/exploits/9565 +CVE-2009-4484 - http://bugs.mysql.com/bug.php?id=50227 +CVE-2009-4484 - http://isc.sans.org/diary.html?storyid=7900 +CVE-2009-4484 - https://bugzilla.redhat.com/show_bug.cgi?id=555313 +CVE-2009-4487 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4488 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4489 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4490 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4491 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html +CVE-2009-4491 - http://seclists.org/fulldisclosure/2023/Nov/13 +CVE-2009-4491 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4492 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4493 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4494 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4495 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4496 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4500 - https://support.zabbix.com/browse/ZBX-993 +CVE-2009-4512 - http://packetstormsecurity.org/0910-exploits/oscailt33-lfi.txt +CVE-2009-4512 - http://securityreason.com/exploitalert/7422 +CVE-2009-4522 - http://packetstormsecurity.org/0910-exploits/bloofoxcms-xss.txt +CVE-2009-4523 - http://www.packetstormsecurity.org/0910-exploits/zainu-xss.txt +CVE-2009-4529 - http://www.packetstormsecurity.org/0910-exploits/navicopa-disclose.txt +CVE-2009-4530 - http://packetstormsecurity.org/0910-exploits/mongoose-disclose.txt +CVE-2009-4531 - http://packetstormsecurity.org/0910-exploits/httpdx-disclose.txt +CVE-2009-4536 - http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ +CVE-2009-4537 - http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ +CVE-2009-4537 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9439 +CVE-2009-4538 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9702 +CVE-2009-4541 - http://www.exploit-db.com/exploits/9397 +CVE-2009-4542 - http://www.exploit-db.com/exploits/9397 +CVE-2009-4543 - http://www.exploit-db.com/exploits/9396 +CVE-2009-4544 - http://www.exploit-db.com/exploits/9396 +CVE-2009-4547 - http://packetstormsecurity.org/0908-exploits/viartcms-xss.txt +CVE-2009-4548 - http://packetstormsecurity.org/0908-exploits/viarthd-xss.txt +CVE-2009-4553 - http://www.exploit-db.com/exploits/9392 +CVE-2009-4567 - http://packetstormsecurity.org/0912-exploits/viscacha-xss.txt +CVE-2009-4567 - http://www.exploit-db.com/exploits/10354 +CVE-2009-4569 - http://packetstormsecurity.org/0912-exploits/elkagroupv-sql.txt +CVE-2009-4574 - http://packetstormsecurity.org/0912-exploits/iescorts-sql.txt +CVE-2009-4576 - http://packetstormsecurity.org/0912-exploits/joomlabeeheard-sql.txt +CVE-2009-4578 - http://packetstormsecurity.org/0912-exploits/joomlafacileforms-xss.txt +CVE-2009-4579 - http://packetstormsecurity.org/0912-exploits/joomlaartistavenue-xss.txt +CVE-2009-4580 - http://packetstormsecurity.org/0912-exploits/hastablog-xss.txt +CVE-2009-4581 - http://packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt +CVE-2009-4581 - http://www.exploit-db.com/exploits/10793 +CVE-2009-4583 - http://packetstormsecurity.org/0912-exploits/joomladhforum-sql.txt +CVE-2009-4584 - http://packetstormsecurity.org/0912-exploits/dbmastersmm-insecure.txt +CVE-2009-4585 - http://packetstormsecurity.org/0912-exploits/uranyumsoft-disclose.txt +CVE-2009-4586 - http://lostmon.blogspot.com/2009/10/wowd-search-client-multiple-variable.html +CVE-2009-4586 - http://packetstormsecurity.org/0910-exploits/wowd-xss.txt +CVE-2009-4587 - http://xc0re.wordpress.com/2009/10/25/cherokee-web-server-0-5-4-denial-of-service/ +CVE-2009-4588 - http://www.exploit-db.com/exploits/9116 +CVE-2009-4596 - http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txt +CVE-2009-4597 - http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txt +CVE-2009-4598 - http://packetstormsecurity.org/0912-exploits/joomlajphoto-sql.txt +CVE-2009-4599 - http://packetstormsecurity.org/0912-exploits/joomlajobs-sql.txt +CVE-2009-4601 - http://packetstormsecurity.org/0912-exploits/zeejob-xss.txt +CVE-2009-4604 - http://packetstormsecurity.org/0912-exploits/joomlamamboleto-rfi.txt +CVE-2009-4604 - http://www.exploit-db.com/exploits/10369 +CVE-2009-4609 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-4610 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-4611 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-4611 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt +CVE-2009-4612 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-4621 - http://www.exploit-db.com/exploits/9576 +CVE-2009-4627 - http://www.exploit-db.com/exploits/9525 +CVE-2009-4628 - http://evilc0de.blogspot.com/2009/09/tpdugg-joomla-component-11-blind-sql.html +CVE-2009-4630 - https://bugzilla.mozilla.org/show_bug.cgi?id=453403 +CVE-2009-4656 - http://www.exploit-db.com/exploits/9691 +CVE-2009-4659 - http://www.exploit-db.com/exploits/9707 +CVE-2009-4661 - http://www.exploit-db.com/exploits/9695 +CVE-2009-4661 - http://www.exploit-db.com/exploits/9734 +CVE-2009-4668 - http://www.exploit-db.com/exploits/8780 +CVE-2009-4673 - http://www.exploit-db.com/exploits/8788 +CVE-2009-4678 - http://packetstormsecurity.org/0912-exploits/winngb-xss.txt +CVE-2009-4680 - http://packetstormsecurity.org/0907-exploits/wbd-sqlxss.txt +CVE-2009-4681 - http://packetstormsecurity.org/0907-exploits/wbd-sqlxss.txt +CVE-2009-4684 - http://packetstormsecurity.org/0907-exploits/ezodiak-xss.txt +CVE-2009-4685 - http://packetstormsecurity.org/0907-exploits/astrology-xss.txt +CVE-2009-4686 - http://packetstormsecurity.org/0907-exploits/adquick-xss.txt +CVE-2009-4688 - http://packetstormsecurity.org/0907-exploits/scsc-sqlxss.txt +CVE-2009-4689 - http://packetstormsecurity.org/0907-exploits/scsc-sqlxss.txt +CVE-2009-4690 - http://packetstormsecurity.org/0907-exploits/programsrating-xss.txt +CVE-2009-4691 - http://packetstormsecurity.org/0907-exploits/linktrader-sqlxss.txt +CVE-2009-4712 - http://packetstormsecurity.org/0907-exploits/tukanasec-sql.txt +CVE-2009-4714 - http://packetstormsecurity.org/0907-exploits/xoopsceleparquiz-xss.txt +CVE-2009-4715 - http://packetstormsecurity.org/0907-exploits/rtce-xss.txt +CVE-2009-4716 - http://packetstormsecurity.org/0907-exploits/ezwebsearch-xss.txt +CVE-2009-4717 - http://packetstormsecurity.org/0907-exploits/webstatcaffe-xss.txt +CVE-2009-4722 - http://www.exploit-db.com/exploits/9281 +CVE-2009-4723 - http://www.exploit-db.com/exploits/9333 +CVE-2009-4726 - http://www.exploit-db.com/exploits/9334 +CVE-2009-4731 - http://packetstormsecurity.org/0907-exploits/articlepubpro-sql.txt +CVE-2009-4732 - http://www.exploit-db.com/exploits/9335 +CVE-2009-4733 - http://www.exploit-db.com/exploits/9336 +CVE-2009-4736 - http://packetstormsecurity.org/0607-exploits/newangels-11.txt +CVE-2009-4748 - http://packetstormsecurity.org/0907-exploits/wpmco-sql.txt +CVE-2009-4749 - http://packetstormsecurity.org/0907-exploits/phplive-sql.txt +CVE-2009-4750 - http://www.packetstormsecurity.org/0907-exploits/toppaidmailer-rfi.txt +CVE-2009-4751 - http://www.packetstormsecurity.org/0907-exploits/swingerclub-sqlrfi.txt +CVE-2009-4752 - http://www.packetstormsecurity.org/0907-exploits/swingerclub-sqlrfi.txt +CVE-2009-4754 - http://www.exploit-db.com/exploits/8578 +CVE-2009-4756 - http://www.exploit-db.com/exploits/8588 +CVE-2009-4757 - http://www.exploit-db.com/exploits/8601 +CVE-2009-4758 - http://www.exploit-db.com/exploits/8568 +CVE-2009-4759 - http://www.exploit-db.com/exploits/8607 +CVE-2009-4765 - http://packetstormsecurity.org/1001-exploits/aspcnrhikaye-disclose.txt +CVE-2009-4766 - http://packetstormsecurity.org/1001-exploits/ypportal-disclose.txt +CVE-2009-4775 - http://www.exploit-db.com/exploits/9607 +CVE-2009-4775 - http://www.packetstormsecurity.org/0909-exploits/nocoolnameforawsftppoc.pl.txt +CVE-2009-4779 - http://www.exploit-db.com/exploits/10217 +CVE-2009-4782 - http://packetstormsecurity.org/0912-exploits/theeta-sqlxss.txt +CVE-2009-4783 - http://packetstormsecurity.org/0912-exploits/theeta-sqlxss.txt +CVE-2009-4784 - http://packetstormsecurity.org/0912-exploits/joomlajoaktree-sql.txt +CVE-2009-4785 - http://packetstormsecurity.org/0911-exploits/joomla-quicknews.txt +CVE-2009-4789 - http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt +CVE-2009-4791 - http://www.exploit-db.com/exploits/8319 +CVE-2009-4792 - http://www.exploit-db.com/exploits/8309 +CVE-2009-4793 - http://www.exploit-db.com/exploits/8309 +CVE-2009-4797 - http://e-rdc.org/v1/news.php?readmore=132 +CVE-2009-4797 - http://www.exploit-db.com/exploits/8318 +CVE-2009-4811 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2009-4834 - http://www.exploit-db.com/exploits/9590 +CVE-2009-4836 - http://www.exploit-db.com/exploits/8871 +CVE-2009-4854 - http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt +CVE-2009-4856 - http://packetstormsecurity.org/0908-exploits/pesc-xss.txt +CVE-2009-4857 - http://packetstormsecurity.org/0908-exploits/ppv-xss.txt +CVE-2009-4858 - http://packetstormsecurity.org/0908-exploits/yac-xss.txt +CVE-2009-4859 - http://packetstormsecurity.org/0908-exploits/owosasp-xss.txt +CVE-2009-4861 - http://packetstormsecurity.org/0908-exploits/supportpro-xss.txt +CVE-2009-4863 - http://www.exploit-db.com/exploits/9368 +CVE-2009-4864 - http://packetstormsecurity.org/0908-exploits/des-xss.txt +CVE-2009-4865 - http://packetstormsecurity.org/0908-exploits/des-xss.txt +CVE-2009-4866 - http://packetstormsecurity.org/0908-exploits/simplesearch-xss.txt +CVE-2009-4867 - http://www.exploit-db.com/exploits/9364 +CVE-2009-4868 - http://packetstormsecurity.org/0908-exploits/hitronsam-xss.txt +CVE-2009-4869 - http://packetstormsecurity.org/0908-exploits/nasimgb-xss.txt +CVE-2009-4871 - http://www.exploit-db.com/exploits/9389 +CVE-2009-4874 - http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt +CVE-2009-4883 - http://www.exploit-db.com/exploits/8182 +CVE-2009-4887 - http://www.exploit-db.com/exploits/8172 +CVE-2009-4888 - http://packetstormsecurity.org/0903-exploits/phortail-xss.txt +CVE-2009-4897 - http://bugs.ghostscript.com/show_bug.cgi?id=690523 +CVE-2009-4904 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt +CVE-2009-4906 - http://packetstormsecurity.org/0912-exploits/ape-xsrf.txt +CVE-2009-4907 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt +CVE-2009-4908 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt +CVE-2009-4909 - http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt +CVE-2009-4931 - http://www.exploit-db.com/exploits/8485 +CVE-2009-4932 - http://www.exploit-db.com/exploits/8484 +CVE-2009-4936 - http://www.exploit-db.com/exploits/8819 +CVE-2009-4937 - http://www.exploit-db.com/exploits/8819 +CVE-2009-4973 - http://www.exploit-db.com/exploits/9524 +CVE-2009-4974 - http://www.exploit-db.com/exploits/9524 +CVE-2009-4977 - http://www.exploit-db.com/exploits/9365 +CVE-2009-4978 - http://www.exploit-db.com/exploits/9365 +CVE-2009-4983 - http://packetstormsecurity.org/0908-exploits/silurus-xss.txt +CVE-2009-4984 - http://www.exploit-db.com/exploits/9370 +CVE-2009-4985 - http://www.exploit-db.com/exploits/9370 +CVE-2009-4988 - http://www.exploit-db.com/exploits/9319 +CVE-2009-4989 - http://packetstormsecurity.org/0908-exploits/ajauctionprooopd-xss.txt +CVE-2009-4991 - http://packetstormsecurity.org/0908-exploits/omnistarrecruiting-xss.txt +CVE-2009-4992 - http://www.exploit-db.com/exploits/9383 +CVE-2009-4993 - http://www.exploit-db.com/exploits/9383 +CVE-2009-5003 - http://packetstormsecurity.org/0907-exploits/bes-sql.txt +CVE-2009-5010 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2009-5011 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2009-5012 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2009-5013 - http://code.google.com/p/pyftpdlib/issues/detail?id=119 +CVE-2009-5013 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2009-5018 - https://bugzilla.redhat.com/show_bug.cgi?id=547515 +CVE-2009-5021 - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz +CVE-2009-5025 - https://packetstormsecurity.com/files/cve/CVE-2009-5025 +CVE-2009-5028 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2009-5031 - http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html +CVE-2009-5045 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-5046 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-5047 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-5048 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-5049 - http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt +CVE-2009-5065 - http://support.novell.com/security/cve/CVE-2009-5065.html +CVE-2009-5067 - http://packetstormsecurity.org/files/81614/html2ps-1.0-beta5-File-Disclosure.html +CVE-2009-5087 - http://securityreason.com/securityalert/8372 +CVE-2009-5087 - http://www.exploit-db.com/exploits/8041 +CVE-2009-5097 - http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-11-remote-file-access.html +CVE-2009-5098 - http://securityreason.com/securityalert/8373 +CVE-2009-5098 - http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-version-11-floating.html +CVE-2009-5118 - https://kc.mcafee.com/corporate/index?page=content&id=SB10013 +CVE-2009-5125 - http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html +CVE-2009-5132 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78570 +CVE-2009-5134 - http://www.exploit-db.com/exploits/9539 +CVE-2009-5135 - http://www.exploit-db.com/exploits/8191/ +CVE-2009-5142 - http://packetstormsecurity.com/files/127724/WordPress-Gamespeed-Theme-Cross-Site-Scripting.html +CVE-2009-5149 - http://www.kb.cert.org/vuls/id/419568 +CVE-2009-5154 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb +CVE-2009-5159 - https://packetstormsecurity.com/files/83624/Invision-Power-Board-3.0.4-Cross-Site-Scripting.html +CVE-2009-5159 - https://www.exploit-db.com/exploits/33394 +CVE-2010-0003 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0007 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0007 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9630 +CVE-2010-0008 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0010 - http://blog.pi3.com.pl/?p=69 +CVE-2010-0010 - http://packetstormsecurity.org/1001-exploits/modproxy-overflow.txt +CVE-2010-0010 - http://site.pi3.com.pl/adv/mod_proxy.txt +CVE-2010-0012 - https://launchpad.net/bugs/500625 +CVE-2010-0027 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0066 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0067 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0068 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0069 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0070 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0071 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0072 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0074 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0075 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0076 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0077 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0078 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0079 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0080 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html +CVE-2010-0081 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0082 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0082 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0082 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0082 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0083 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0084 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0084 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0084 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0084 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0084 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0085 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0085 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0085 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0085 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0085 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0086 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0087 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0087 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0087 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0087 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0088 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0088 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0088 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0088 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0088 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0089 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0089 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0089 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0090 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0090 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0090 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0091 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0091 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0091 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0091 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0091 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0091 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9855 +CVE-2010-0092 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0092 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0092 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0092 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0093 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0093 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0093 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0093 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0093 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9877 +CVE-2010-0094 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0094 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0094 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0094 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0094 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0095 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0095 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0095 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0095 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0095 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0097 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9357 +CVE-2010-0103 - http://www.symantec.com/connect/blogs/trojan-found-usb-battery-charger-software +CVE-2010-0105 - http://securityreason.com/achievement_securityalert/83 +CVE-2010-0149 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0150 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0151 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0157 - http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt +CVE-2010-0158 - http://packetstormsecurity.org/1001-exploits/joomlabamboo-sql.txt +CVE-2010-0159 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9590 +CVE-2010-0160 - https://bugzilla.mozilla.org/show_bug.cgi?id=531222 +CVE-2010-0160 - https://bugzilla.mozilla.org/show_bug.cgi?id=533000 +CVE-2010-0164 - https://bugzilla.mozilla.org/show_bug.cgi?id=547143 +CVE-2010-0167 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9835 +CVE-2010-0174 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9502 +CVE-2010-0175 - https://bugzilla.mozilla.org/show_bug.cgi?id=540100 +CVE-2010-0175 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9834 +CVE-2010-0176 - https://bugzilla.mozilla.org/show_bug.cgi?id=538308 +CVE-2010-0177 - https://bugzilla.mozilla.org/show_bug.cgi?id=538310 +CVE-2010-0179 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-0179 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9446 +CVE-2010-0182 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375 +CVE-2010-0183 - https://bugzilla.mozilla.org/show_bug.cgi?id=557174 +CVE-2010-0184 - http://www.tibco.com/mk/advisory.jsp +CVE-2010-0187 - https://bugzilla.redhat.com/show_bug.cgi?id=564287 +CVE-2010-0211 - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 +CVE-2010-0212 - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 +CVE-2010-0216 - http://securityreason.com/securityalert/8245 +CVE-2010-0217 - http://securityreason.com/securityalert/8255 +CVE-2010-0219 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-0219 - http://www.exploit-db.com/exploits/15869 +CVE-2010-0220 - http://isc.sans.org/diary.html?storyid=7897 +CVE-2010-0244 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0245 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0246 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0247 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0248 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0249 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 +CVE-2010-0252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 +CVE-2010-0252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 +CVE-2010-0254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-028 +CVE-2010-0255 - http://isc.sans.org/diary.html?n&storyid=8152 +CVE-2010-0255 - http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag +CVE-2010-0255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 +CVE-2010-0256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-028 +CVE-2010-0266 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-045 +CVE-2010-0267 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0277 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9421 +CVE-2010-0280 - http://www.coresecurity.com/content/google-sketchup-vulnerability +CVE-2010-0287 - http://www.exploit-db.com/exploits/11141 +CVE-2010-0288 - http://www.exploit-db.com/exploits/11141 +CVE-2010-0291 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0296 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2010-0296 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2010-0296 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-0296 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2010-0304 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9933 +CVE-2010-0307 - http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of%2C20100202%2C15754.html +CVE-2010-0307 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0319 - http://packetstormsecurity.org/1001-exploits/docmintcms-xss.txt +CVE-2010-0320 - http://packetstormsecurity.org/1001-exploits/glittercentral-xss.txt +CVE-2010-0321 - http://packetstormsecurity.org/1001-exploits/jamitjobboard-xss.txt +CVE-2010-0365 - http://www.packetstormsecurity.com/1001-exploits/bitsvs-xssuploadrfi.txt +CVE-2010-0366 - http://www.packetstormsecurity.com/1001-exploits/bitsvs-xssuploadrfi.txt +CVE-2010-0367 - http://www.packetstormsecurity.com/1001-exploits/bitsvs-xssuploadrfi.txt +CVE-2010-0370 - http://packetstormsecurity.org/1001-exploits/drupalnb-xss.txt +CVE-2010-0371 - http://packetstormsecurity.org/1001-exploits/galleriehitmaaan-xss.txt +CVE-2010-0372 - http://packetstormsecurity.org/1001-exploits/joomlaarticlemanager-sql.txt +CVE-2010-0373 - http://packetstormsecurity.org/1001-exploits/joomlalibros-sql.txt +CVE-2010-0374 - http://www.packetstormsecurity.com/1001-exploits/joomlamarketplace-xss.txt +CVE-2010-0376 - http://packetstormsecurity.org/1001-exploits/phpcalendars-xss.txt +CVE-2010-0377 - http://packetstormsecurity.org/1001-exploits/phpmyspace-sql.txt +CVE-2010-0380 - http://packetstormsecurity.org/1001-exploits/phpcalendars-xss.txt +CVE-2010-0395 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0405 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html +CVE-2010-0408 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 +CVE-2010-0408 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2010-0408 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9935 +CVE-2010-0410 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0411 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675 +CVE-2010-0415 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0415 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9399 +CVE-2010-0421 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9417 +CVE-2010-0423 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9842 +CVE-2010-0425 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2010-0425 - http://www.senseofsecurity.com.au/advisories/SOS-10-002 +CVE-2010-0425 - https://www.exploit-db.com/exploits/11650 +CVE-2010-0433 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0433 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0433 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856 +CVE-2010-0434 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 +CVE-2010-0434 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2010-0436 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999 +CVE-2010-0437 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0440 - http://www.coresecurity.com/content/cisco-secure-desktop-xss +CVE-2010-0442 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9720 +CVE-2010-0453 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0454 - http://packetstormsecurity.org/1001-exploits/publique-sql.txt +CVE-2010-0455 - http://www.packetstormsecurity.com/1001-exploits/punbb13-xss.txt +CVE-2010-0456 - http://www.exploit-db.com/exploits/11222 +CVE-2010-0457 - http://packetstormsecurity.org/1001-exploits/magicportal-sql.txt +CVE-2010-0458 - http://packetstormsecurity.org/0512-exploits/blog12SQL.txt +CVE-2010-0459 - http://packetstormsecurity.org/1001-exploits/joomlamochigames-sql.txt +CVE-2010-0459 - http://www.exploit-db.com/exploits/11243 +CVE-2010-0460 - http://packetstormsecurity.org/1001-advisories/kayako-xss.txt +CVE-2010-0461 - http://packetstormsecurity.org/1001-exploits/joomlacasino1-sql.txt +CVE-2010-0467 - http://www.exploit-db.com/exploits/11277 +CVE-2010-0469 - http://packetstormsecurity.org/1001-advisories/DDIVRT-2009-27.txt +CVE-2010-0470 - http://packetstormsecurity.org/1001-exploits/comtrend-xss.txt +CVE-2010-0478 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-025 +CVE-2010-0480 - http://securityreason.com/securityalert/8336 +CVE-2010-0483 - http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt +CVE-2010-0483 - http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk +CVE-2010-0483 - http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ +CVE-2010-0483 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170 +CVE-2010-0484 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 +CVE-2010-0485 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 +CVE-2010-0486 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 +CVE-2010-0487 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 +CVE-2010-0488 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0489 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0490 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0491 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0492 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0494 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0550 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication +CVE-2010-0551 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication +CVE-2010-0552 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-001/-geo-r-gncaster-insecure-handling-of-long-urls +CVE-2010-0553 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-002/-geo-r-gncaster-insecure-handling-of-nmea-data +CVE-2010-0554 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication +CVE-2010-0555 - http://isc.sans.org/diary.html?n&storyid=8152 +CVE-2010-0555 - http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag +CVE-2010-0565 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0565 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56339 +CVE-2010-0566 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0567 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0568 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0569 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml +CVE-2010-0601 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-0602 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-0603 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-0604 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-0605 - http://osticket.com/forums/project.php?issueid=176 +CVE-2010-0605 - http://packetstormsecurity.org/1002-exploits/osTicket-1.6-RC5-SQLi.pdf +CVE-2010-0605 - http://www.exploit-db.com/exploits/11380 +CVE-2010-0606 - http://osticket.com/forums/project.php?issueid=176 +CVE-2010-0606 - http://packetstormsecurity.org/1002-exploits/osTicket-1.6-RC5-ReflectedXSS.pdf +CVE-2010-0607 - http://marc.info/?l=full-disclosure&m=126531284626756&w=2 +CVE-2010-0607 - http://packetstormsecurity.org/1002-exploits/sterlite-xss.txt +CVE-2010-0608 - http://packetstormsecurity.org/1001-exploits/novaboard112-sql.txt +CVE-2010-0610 - http://packetstormsecurity.org/1002-exploits/joomlaphotoblog-bsql.txt +CVE-2010-0611 - http://packetstormsecurity.org/1002-exploits/baalsystems-sql.txt +CVE-2010-0611 - http://www.exploit-db.com/exploits/11346 +CVE-2010-0614 - http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt +CVE-2010-0615 - http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt +CVE-2010-0616 - http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt +CVE-2010-0622 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0622 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9655 +CVE-2010-0628 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt +CVE-2010-0629 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567052 +CVE-2010-0629 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt +CVE-2010-0629 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9489 +CVE-2010-0630 - http://packetstormsecurity.org/1002-exploits/evernewfjs-sql.txt +CVE-2010-0632 - http://packetstormsecurity.org/1001-exploits/joomlasimplefaq-sql.txt +CVE-2010-0661 - http://flock.com/security/ +CVE-2010-0671 - http://packetstormsecurity.org/1002-exploits/pogodnycms-sql.txt +CVE-2010-0672 - http://packetstormsecurity.org/1002-exploits/wsnguest102-sql.txt +CVE-2010-0673 - http://packetstormsecurity.org/1002-exploits/wpcopperleaf-sql.txt +CVE-2010-0674 - http://packetstormsecurity.org/1002-exploits/statcountex-disclose.txt +CVE-2010-0675 - http://packetstormsecurity.org/1002-exploits/bgscms-xss.txt +CVE-2010-0676 - http://packetstormsecurity.org/1002-exploits/joomlarwcards-lfi.txt +CVE-2010-0677 - http://packetstormsecurity.org/1002-exploits/katalog-rfisql.txt +CVE-2010-0678 - http://packetstormsecurity.org/1002-exploits/katalog-rfisql.txt +CVE-2010-0679 - http://packetstormsecurity.org/1002-advisories/chemviewx-overflow.txt +CVE-2010-0679 - http://packetstormsecurity.org/1002-exploits/hyleoschemview-heap.rb.txt +CVE-2010-0682 - http://hakre.wordpress.com/2010/02/16/the-short-memory-of-wordpress-org-security/ +CVE-2010-0689 - http://sotiriu.de/adv/NSOADV-2010-003.txt +CVE-2010-0690 - http://packetstormsecurity.org/1002-exploits/videogamesrental-sql.txt +CVE-2010-0693 - http://packetstormsecurity.org/1002-exploits/trademanager-sql.txt +CVE-2010-0694 - http://packetstormsecurity.org/1001-exploits/joomlaperchagallery-sql.txt +CVE-2010-0695 - http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt +CVE-2010-0698 - http://packetstormsecurity.org/1002-exploits/wsccms-sql.txt +CVE-2010-0699 - http://packetstormsecurity.org/1002-exploits/vss-xss.txt +CVE-2010-0700 - http://zeroscience.mk/codes/wamp_xss.txt +CVE-2010-0700 - http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php +CVE-2010-0701 - http://packetstormsecurity.org/1002-exploits/omnidocs-sql.txt +CVE-2010-0702 - http://packetstormsecurity.org/1002-exploits/tribox-sql.txt +CVE-2010-0703 - http://packetstormsecurity.org/1002-exploits/PR09-04.txt +CVE-2010-0706 - http://www.packetstormsecurity.org/1002-exploits/nikara-xss.txt +CVE-2010-0709 - http://www.exploit-db.com/exploits/11477 +CVE-2010-0709 - http://www.exploit-db.com/exploits/11478 +CVE-2010-0711 - http://packetstormsecurity.org/1002-exploits/aspcodecms-xssxsrf.txt +CVE-2010-0719 - http://www.scmagazineus.com/malta-researchers-find-windows-bug-that-crashes-pcs/article/164439/ +CVE-2010-0720 - http://packetstormsecurity.org/1002-exploits/erotik-sql.txt +CVE-2010-0721 - http://packetstormsecurity.org/1002-exploits/auktionshausgelb-sql.txt +CVE-2010-0723 - http://packetstormsecurity.org/1002-exploits/eroauktion20-sql.txt +CVE-2010-0723 - http://packetstormsecurity.org/1002-exploits/eroauktion2010-sql.txt +CVE-2010-0724 - http://packetstormsecurity.org/1002-exploits/arabcart-sqlxss.txt +CVE-2010-0725 - http://packetstormsecurity.org/1002-exploits/arabcart-sqlxss.txt +CVE-2010-0730 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0731 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759 +CVE-2010-0734 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0738 - http://securityreason.com/securityalert/8408 +CVE-2010-0740 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0740 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0746 - https://bugzilla.redhat.com/show_bug.cgi?id=523178 +CVE-2010-0753 - http://www.exploit-db.com/exploits/11549 +CVE-2010-0753 - http://www.packetstormsecurity.com/1002-exploits/joomlasqlreport-sql.txt +CVE-2010-0754 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt +CVE-2010-0754 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-006.txt +CVE-2010-0755 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt +CVE-2010-0756 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt +CVE-2010-0757 - http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt +CVE-2010-0758 - http://packetstormsecurity.org/1002-exploits/softbizjobs-sql.txt +CVE-2010-0759 - http://packetstormsecurity.org/1002-exploits/joomlascriptegrator-lfi.txt +CVE-2010-0761 - http://packetstormsecurity.org/1002-exploits/ebooksrental-sql.txt +CVE-2010-0761 - http://www.exploit-db.com/exploits/11402 +CVE-2010-0762 - http://packetstormsecurity.org/1002-exploits/cdrentals-sql.txt +CVE-2010-0762 - http://www.exploit-db.com/exploits/11401 +CVE-2010-0764 - http://packetstormsecurity.org/1002-exploits/esmile-sql.txt +CVE-2010-0765 - http://packetstormsecurity.org/1001-exploits/fipsforum-disclose.txt +CVE-2010-0766 - http://www.coresecurity.com/content/luxology-modo-lxo-vulnerability +CVE-2010-0795 - http://www.exploit-db.com/exploits/11292 +CVE-2010-0796 - http://packetstormsecurity.org/1001-exploits/joomlajequiz-sql.txt +CVE-2010-0796 - http://www.exploit-db.com/exploits/11287 +CVE-2010-0799 - http://packetstormsecurity.org/1001-exploits/phpunity-lfi.txt +CVE-2010-0801 - http://packetstormsecurity.org/1001-exploits/joomlaautartitarot-traversal.txt +CVE-2010-0802 - http://packetstormsecurity.org/1001-exploits/ipbawards-sql.txt +CVE-2010-0803 - http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-sql.txt +CVE-2010-0803 - http://www.exploit-db.com/exploits/11280 +CVE-2010-0804 - http://packetstormsecurity.org/1001-exploits/iboutique-xss.txt +CVE-2010-0805 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0806 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0807 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 +CVE-2010-0808 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-0811 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 +CVE-2010-0811 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 +CVE-2010-0814 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 +CVE-2010-0815 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-031 +CVE-2010-0816 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-030 +CVE-2010-0817 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 +CVE-2010-0819 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-037 +CVE-2010-0825 - https://bugs.launchpad.net/ubuntu/+bug/531569 +CVE-2010-0826 - http://www.ubuntu.com/usn/USN-922-1 +CVE-2010-0829 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718 +CVE-2010-0835 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0836 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0837 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0837 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0837 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0837 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0837 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0838 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0838 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0838 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0838 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0838 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0839 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0839 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0839 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0839 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0840 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0840 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0840 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0840 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0840 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0840 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974 +CVE-2010-0841 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0841 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0841 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0841 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0842 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0842 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0842 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0842 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0843 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0843 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0843 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0843 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0844 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0844 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0844 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0845 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0845 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0845 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0845 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0845 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9896 +CVE-2010-0846 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0846 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0846 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0846 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0847 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0847 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0847 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0847 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0847 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0848 - http://ubuntu.com/usn/usn-923-1 +CVE-2010-0848 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0848 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0848 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0848 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0848 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9899 +CVE-2010-0849 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0849 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0849 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0849 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0850 - http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html +CVE-2010-0850 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0850 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0851 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0852 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0853 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0854 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0855 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0856 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0857 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0858 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0859 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0860 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0861 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0862 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0863 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0864 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0865 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0866 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0867 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0868 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0869 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0870 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0871 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0872 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0873 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0874 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0875 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0876 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0877 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0878 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0879 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0880 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0881 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0882 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0883 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0884 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0885 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0886 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-0886 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-0888 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0889 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0890 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0891 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0892 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0893 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0894 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0895 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0896 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0897 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html +CVE-2010-0898 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0899 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0900 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0901 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0902 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0903 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0904 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0905 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0906 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0907 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0908 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0909 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0910 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0911 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0912 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0913 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0914 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0915 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0916 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-0917 - http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt +CVE-2010-0917 - http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ +CVE-2010-0924 - http://nobytes.com/exploits/Safari_4.0.4_background_DoS_pl.txt +CVE-2010-0925 - http://nobytes.com/exploits/Safari_4.0.4_background_DoS_pl.txt +CVE-2010-0928 - http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf +CVE-2010-0928 - http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/ +CVE-2010-0938 - http://packetstormsecurity.org/1001-exploits/todooforum-xss.txt +CVE-2010-0939 - http://packetstormsecurity.org/1001-exploits/abbforums-dislclose.txt +CVE-2010-0940 - http://packetstormsecurity.org/1001-exploits/simplephpgb-xss.txt +CVE-2010-0941 - http://packetstormsecurity.org/1001-exploits/hitcounter-xss.txt +CVE-2010-0942 - http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-traversal.txt +CVE-2010-0943 - http://packetstormsecurity.org/1001-exploits/joomlajashowcase-traversal.txt +CVE-2010-0944 - http://packetstormsecurity.org/1001-exploits/joomlajcollection-traversal.txt +CVE-2010-0945 - http://www.packetstormsecurity.org/0912-exploits/joomlahotbrackets-sql.txt +CVE-2010-0947 - http://packetstormsecurity.org/1003-exploits/bbsmax-xss.txt +CVE-2010-0948 - http://packetstormsecurity.org/1003-exploits/bigforum-sql.txt +CVE-2010-0949 - http://www.packetstormsecurity.com/1003-exploits/natychmiast-sqlxss.txt +CVE-2010-0950 - http://www.packetstormsecurity.com/1003-exploits/natychmiast-sqlxss.txt +CVE-2010-0951 - http://packetstormsecurity.org/1003-exploits/dev4u-sql.txt +CVE-2010-0952 - http://packetstormsecurity.org/1003-exploits/onecmsv25-sql.txt +CVE-2010-0954 - http://evilc0de.blogspot.com/2010/03/pre-e-learning-portal-sql-injection.html +CVE-2010-0954 - http://www.packetstormsecurity.com/1003-exploits/preelearningportal-sql.txt +CVE-2010-0955 - http://packetstormsecurity.org/1003-exploits/bildflirt-sql.txt +CVE-2010-0956 - http://packetstormsecurity.org/1003-exploits/opencart-sql.txt +CVE-2010-0957 - http://packetstormsecurity.org/1002-exploits/saskiashopsystem-lfi.txt +CVE-2010-0958 - http://packetstormsecurity.org/1003-exploits/tribisur-lfi.txt +CVE-2010-0958 - http://www.exploit-db.com/exploits/11655 +CVE-2010-0964 - http://packetstormsecurity.org/1003-exploits/eroserotikwebkat-sql.txt +CVE-2010-0965 - http://packetstormsecurity.org/1003-exploits/jevci-disclose.txt +CVE-2010-0966 - http://www.exploit-db.com/exploits/11735 +CVE-2010-0970 - http://www.exploit-db.com/exploits/11737 +CVE-2010-0971 - http://packetstormsecurity.org/1003-exploits/atutor-xss.txt +CVE-2010-0974 - http://www.packetstormsecurity.com/1003-exploits/phpcityportal-sqlrfi.txt +CVE-2010-0975 - http://packetstormsecurity.org/1003-exploits/phpcityportal-sqlrfi.txt +CVE-2010-0976 - http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt +CVE-2010-0977 - http://packetstormsecurity.org/1001-exploits/pdportal-disclose.txt +CVE-2010-0978 - http://packetstormsecurity.org/1001-exploits/kmsoftgb-disclose.txt +CVE-2010-0979 - http://packetstormsecurity.org/1001-exploits/odig-xss.txt +CVE-2010-0980 - http://greyhathackers.wordpress.com/2010/01/02/left-4-dead-stats-1-1-sql-injection-vulnerability/ +CVE-2010-0980 - http://packetstormsecurity.org/1001-exploits/left4deadstats-sql.txt +CVE-2010-0980 - http://www.exploit-db.com/exploits/10930 +CVE-2010-0981 - http://packetstormsecurity.org/0912-exploits/joomlatpjobs-sql.txt +CVE-2010-0982 - http://packetstormsecurity.org/1001-exploits/joomlacartweberp-lfi.txt +CVE-2010-0983 - http://packetstormsecurity.org/1001-exploits/rezervi-rfi.txt +CVE-2010-0983 - http://www.exploit-db.com/exploits/10967 +CVE-2010-0984 - http://packetstormsecurity.org/1001-exploits/acidcatcms-disclose.txt +CVE-2010-10001 - http://seclists.org/bugtraq/2010/Jul/60 +CVE-2010-10001 - https://vuldb.com/?id.4143 +CVE-2010-10001 - https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt +CVE-2010-10011 - https://vuldb.com/?id.250446 +CVE-2010-10011 - https://www.exploit-db.com/exploits/15445 +CVE-2010-1003 - http://www.coresecurity.com/content/efront-php-file-inclusion +CVE-2010-1028 - http://blog.mozilla.com/security/2010/02/22/secunia-advisory-sa38608/ +CVE-2010-1028 - http://blog.mozilla.com/security/2010/03/18/update-on-secunia-advisory-sa38608/ +CVE-2010-1028 - https://bugzilla.mozilla.org/show_bug.cgi?id=552216 +CVE-2010-1029 - http://www.exploit-db.com/exploits/11567 +CVE-2010-1044 - http://packetstormsecurity.org/1002-exploits/oputils_5-sql.txt +CVE-2010-1046 - http://www.exploit-db.com/exploits/11356 +CVE-2010-1047 - http://packetstormsecurity.org/1002-exploits/masa2elmc-sql.txt +CVE-2010-1050 - http://packetstormsecurity.org/1002-exploits/audistats-sql.txt +CVE-2010-1053 - http://www.exploit-db.com/exploits/11345 +CVE-2010-1054 - http://packetstormsecurity.org/1003-exploits/parscms-sql.txt +CVE-2010-1055 - http://evilc0de.blogspot.com/2010/03/osdate-rfi-vuln.html +CVE-2010-1056 - http://packetstormsecurity.org/1003-exploits/joomlarokdownloads-lfi.txt +CVE-2010-1058 - http://packetstormsecurity.org/1003-exploits/addressbookscript-lfi.txt +CVE-2010-1060 - http://packetstormsecurity.org/1003-exploits/shorturl-lfi.txt +CVE-2010-1062 - http://packetstormsecurity.org/1003-exploits/frecf-lfi.txt +CVE-2010-1064 - http://packetstormsecurity.org/1001-exploits/erolife-disclose.txt +CVE-2010-1066 - http://packetstormsecurity.org/1001-exploits/awcm-backup.txt +CVE-2010-1068 - http://packetstormsecurity.org/1001-exploits/surgeftp-xss.txt +CVE-2010-1069 - http://packetstormsecurity.org/1001-exploits/proarcadescripttogame-sql.txt +CVE-2010-1070 - http://packetstormsecurity.org/1001-exploits/imagoscriptsdac-sql.txt +CVE-2010-1071 - http://packetstormsecurity.org/1001-exploits/phpmdj103-sql.txt +CVE-2010-1072 - http://greyhathackers.wordpress.com/2010/01/07/sniggabo-cms-v2-21-xss-vulnerability/ +CVE-2010-1072 - http://packetstormsecurity.org/1001-exploits/sniggabocms-xss.txt +CVE-2010-1075 - http://packetstormsecurity.org/1002-exploits/elcms-sql.txt +CVE-2010-1077 - http://packetstormsecurity.org/1002-exploits/vbseo-lfi.txt +CVE-2010-1078 - http://www.packetstormsecurity.org/1002-exploits/spherecms-sql.txt +CVE-2010-1080 - http://packetstormsecurity.org/1002-exploits/pulsecms-xss.txt +CVE-2010-1081 - http://packetstormsecurity.org/1002-exploits/joomlacp-lfi.txt +CVE-2010-1083 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-1084 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1085 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1086 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1087 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1088 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1089 - http://packetstormsecurity.org/1003-exploits/phptroubleticket-sql.txt +CVE-2010-1090 - http://packetstormsecurity.org/1002-exploits/phpmysite-sqlxss.txt +CVE-2010-1090 - http://www.exploit-db.com/exploits/11588 +CVE-2010-1091 - http://packetstormsecurity.org/1002-exploits/phpmysite-sqlxss.txt +CVE-2010-1091 - http://www.exploit-db.com/exploits/11588 +CVE-2010-1105 - http://www.packetstormsecurity.com/1001-exploits/advertisemanager-xssrfitraversal.txt +CVE-2010-1106 - http://www.packetstormsecurity.com/1001-exploits/advertisemanager-xssrfitraversal.txt +CVE-2010-1109 - http://packetstormsecurity.org/1001-exploits/phpmysport-sqlaccess.txt +CVE-2010-1109 - http://phpmysport.sourceforge.net/en/forum/bugs/sujet_2851.html +CVE-2010-1110 - http://packetstormsecurity.org/1001-exploits/phpmysport-sqlaccess.txt +CVE-2010-1110 - http://phpmysport.sourceforge.net/en/forum/bugs/sujet_2851.html +CVE-2010-1111 - http://www.packetstormsecurity.com/1001-exploits/jokescomplete-xss.txt +CVE-2010-1112 - http://packetstormsecurity.org/1001-exploits/klonews-xss.txt +CVE-2010-1113 - http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt +CVE-2010-1114 - http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt +CVE-2010-1115 - http://www.packetstormsecurity.com/1001-exploits/webservercreator-traversalxssrfi.txt +CVE-2010-1116 - http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt +CVE-2010-1121 - https://bugzilla.mozilla.org/show_bug.cgi?id=555109 +CVE-2010-1122 - https://bugzilla.mozilla.org/show_bug.cgi?id=552216 +CVE-2010-1125 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 +CVE-2010-1126 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 +CVE-2010-1127 - http://securityreason.com/exploitalert/7731 +CVE-2010-1130 - http://securityreason.com/achievement_securityalert/82 +CVE-2010-1130 - http://securityreason.com/securityalert/7008 +CVE-2010-1132 - http://www.exploit-db.com/exploits/11662 +CVE-2010-1138 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2010-1139 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2010-1140 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2010-1141 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2010-1142 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html +CVE-2010-1150 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES +CVE-2010-1150 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES +CVE-2010-1157 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1157 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-1158 - http://www.openwall.com/lists/oss-security/2010/04/08/9 +CVE-2010-1158 - http://www.openwall.com/lists/oss-security/2010/04/14/3 +CVE-2010-1158 - https://bugzilla.redhat.com/show_bug.cgi?id=580605 +CVE-2010-1163 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382 +CVE-2010-1168 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807 +CVE-2010-1171 - http://www.redhat.com/support/errata/RHSA-2011-0434.html +CVE-2010-1173 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1176 - http://www.exploit-db.com/exploits/11891 +CVE-2010-1179 - http://www.exploit-db.com/exploits/11890 +CVE-2010-1184 - http://www.theregister.co.uk/2010/03/26/open_source_wireless_sniffer/ +CVE-2010-1186 - http://www.coresecurity.com/content/nextgen-gallery-xss-vulnerability +CVE-2010-1186 - http://www.exploit-db.com/exploits/12098 +CVE-2010-1187 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1187 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9832 +CVE-2010-1188 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878 +CVE-2010-1190 - http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES +CVE-2010-1196 - https://bugzilla.mozilla.org/show_bug.cgi?id=534666 +CVE-2010-1198 - https://bugzilla.mozilla.org/show_bug.cgi?id=532246 +CVE-2010-1199 - https://bugzilla.mozilla.org/show_bug.cgi?id=554255 +CVE-2010-1208 - https://bugzilla.mozilla.org/show_bug.cgi?id=572986 +CVE-2010-1209 - https://bugzilla.mozilla.org/show_bug.cgi?id=552110 +CVE-2010-1213 - https://bugzilla.mozilla.org/show_bug.cgi?id=568148 +CVE-2010-1214 - https://bugzilla.mozilla.org/show_bug.cgi?id=572985 +CVE-2010-1216 - http://www.exploit-db.com/exploits/11832 +CVE-2010-1217 - http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt +CVE-2010-1225 - http://www.coresecurity.com/content/virtual-pc-2007-hypervisor-memory-protection-bug +CVE-2010-1226 - http://www.exploit-db.com/exploits/11769 +CVE-2010-1227 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-1236 - http://flock.com/security/ +CVE-2010-1239 - http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ +CVE-2010-1239 - http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ +CVE-2010-1240 - http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ +CVE-2010-1240 - http://blog.didierstevens.com/2010/06/29/quickpost-no-escape-from-pdf/ +CVE-2010-1241 - http://www.blackhat.com/html/bh-eu-10/bh-eu-10-briefings.html#Li +CVE-2010-1255 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-032 +CVE-2010-1256 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-040 +CVE-2010-1257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 +CVE-2010-1257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 +CVE-2010-1258 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 +CVE-2010-1259 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 +CVE-2010-1260 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 +CVE-2010-1261 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 +CVE-2010-1262 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035 +CVE-2010-1263 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-036 +CVE-2010-1264 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-039 +CVE-2010-1265 - http://packetstormsecurity.org/1003-exploits/joomladcsflashgames-sql.txt +CVE-2010-1266 - http://packetstormsecurity.org/1003-exploits/webmaid-rfilfi.txt +CVE-2010-1266 - http://www.exploit-db.com/exploits/11831 +CVE-2010-1267 - http://packetstormsecurity.org/1003-exploits/webmaid-rfilfi.txt +CVE-2010-1267 - http://www.exploit-db.com/exploits/11831 +CVE-2010-1268 - http://packetstormsecurity.org/1003-exploits/justvisual-lfi.txt +CVE-2010-1269 - http://packetstormsecurity.org/1003-exploits/phpscripte24-sql.txt +CVE-2010-1270 - http://packetstormsecurity.org/1003-exploits/multiauktions-sql.txt +CVE-2010-1271 - http://packetstormsecurity.org/1003-exploits/smartplugs-sql.txt +CVE-2010-1272 - http://packetstormsecurity.org/1003-exploits/gnattgp-rfi.txt +CVE-2010-1272 - http://www.exploit-db.com/exploits/11621 +CVE-2010-1277 - http://legalhackers.com/advisories/zabbix181api-sql.txt +CVE-2010-1280 - http://www.zeroscience.mk/codes/shockwave_mem.txt +CVE-2010-1280 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php +CVE-2010-1296 - http://www.exploit-db.com/exploits/12751 +CVE-2010-1296 - http://www.exploit-db.com/exploits/12752 +CVE-2010-1296 - http://www.exploit-db.com/exploits/12753 +CVE-2010-1296 - http://www.zeroscience.mk/codes/psbrush_bof.txt +CVE-2010-1296 - http://www.zeroscience.mk/codes/psgradient_bof.txt +CVE-2010-1296 - http://www.zeroscience.mk/codes/psstyle_bof.txt +CVE-2010-1296 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4938.php +CVE-2010-1296 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4939.php +CVE-2010-1296 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4940.php +CVE-2010-1297 - http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ +CVE-2010-1297 - http://www.exploit-db.com/exploits/13787 +CVE-2010-1297 - http://www.kb.cert.org/vuls/id/486225 +CVE-2010-1297 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-1299 - http://packetstormsecurity.org/1004-exploits/dynpgcms-rfi.txt +CVE-2010-1299 - http://www.exploit-db.com/exploits/11994 +CVE-2010-1300 - http://packetstormsecurity.org/1003-exploits/yamamah-sql.txt +CVE-2010-1301 - http://packetstormsecurity.org/1004-exploits/centreon-sql.txt +CVE-2010-1301 - http://www.exploit-db.com/exploits/11979 +CVE-2010-1302 - http://packetstormsecurity.org/1003-exploits/joomladwgraph-lfi.txt +CVE-2010-1303 - http://drupal.org/node/758756 +CVE-2010-1305 - http://packetstormsecurity.org/1004-exploits/jinventory-lfi.txt +CVE-2010-1306 - http://packetstormsecurity.org/1004-exploits/joomlapicasa-lfi.txt +CVE-2010-1306 - http://www.exploit-db.com/exploits/12058 +CVE-2010-1307 - http://packetstormsecurity.org/1004-exploits/joomlaupdater-lfi.txt +CVE-2010-1307 - http://www.exploit-db.com/exploits/12070 +CVE-2010-1308 - http://packetstormsecurity.org/1004-exploits/joomlasvmap-lfi.txt +CVE-2010-1308 - http://www.exploit-db.com/exploits/12066 +CVE-2010-1312 - http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt +CVE-2010-1312 - http://www.exploit-db.com/exploits/12077 +CVE-2010-1313 - http://www.exploit-db.com/exploits/12082 +CVE-2010-1314 - http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt +CVE-2010-1314 - http://www.exploit-db.com/exploits/12086 +CVE-2010-1315 - http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt +CVE-2010-1320 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490 +CVE-2010-1320 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt +CVE-2010-1321 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt +CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-1321 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-1321 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-1321 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1323 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt +CVE-2010-1323 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2010-1323 - http://www.redhat.com/support/errata/RHSA-2010-0925.html +CVE-2010-1323 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-1324 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt +CVE-2010-1324 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2010-1324 - http://www.redhat.com/support/errata/RHSA-2010-0925.html +CVE-2010-1335 - http://packetstormsecurity.org/1003-exploits/inskycms-rfi.txt +CVE-2010-1337 - http://www.packetstormsecurity.com/1003-exploits/vanilla-rfi.txt +CVE-2010-1338 - http://packetstormsecurity.org/1003-exploits/woltlabb-sql.txt +CVE-2010-1340 - http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt +CVE-2010-1344 - http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt +CVE-2010-1345 - http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt +CVE-2010-1346 - http://packetstormsecurity.org/1003-exploits/minicmsribafs-sql.txt +CVE-2010-1346 - http://www.exploit-db.com/exploits/11835 +CVE-2010-1349 - http://www.exploit-db.com/exploits/11622 +CVE-2010-1350 - http://packetstormsecurity.org/1004-exploits/joomlajpjobs-sql.txt +CVE-2010-1352 - http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt +CVE-2010-1352 - http://www.exploit-db.com/exploits/12084 +CVE-2010-1353 - http://packetstormsecurity.org/1004-exploits/joomlaloginbox-lfi.txt +CVE-2010-1353 - http://www.exploit-db.com/exploits/12068 +CVE-2010-1354 - http://packetstormsecurity.org/1004-exploits/joomlavjdeo-lfi.txt +CVE-2010-1354 - http://www.exploit-db.com/exploits/12102 +CVE-2010-1357 - http://packetstormsecurity.org/1001-exploits/sbddirectory-xss.txt +CVE-2010-1360 - http://packetstormsecurity.org/1001-exploits/faqengine-rfi.txt +CVE-2010-1361 - http://packetstormsecurity.org/1001-exploits/phpeppershopws-xss.txt +CVE-2010-1363 - http://packetstormsecurity.org/1001-exploits/joomlajprojects-sql.txt +CVE-2010-1364 - http://packetstormsecurity.org/1002-exploits/uigapersonalportal-sql.txt +CVE-2010-1365 - http://packetstormsecurity.org/1002-exploits/uigafc-sql.txt +CVE-2010-1366 - http://packetstormsecurity.org/1002-exploits/uigafanclub-sql.txt +CVE-2010-1366 - http://www.exploit-db.com/exploits/11593 +CVE-2010-1368 - http://packetstormsecurity.org/1002-exploits/gamescript-sql.txt +CVE-2010-1369 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt +CVE-2010-1369 - http://www.exploit-db.com/exploits/11589 +CVE-2010-1370 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt +CVE-2010-1371 - http://packetstormsecurity.org/0812-exploits/preclass-sqlxss.txt +CVE-2010-1372 - http://packetstormsecurity.org/1002-exploits/joomlahdflvplayer-sql.txt +CVE-2010-1422 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 +CVE-2010-1429 - https://www.exploit-db.com/exploits/44009/ +CVE-2010-1431 - http://seclists.org/fulldisclosure/2010/Apr/272 +CVE-2010-1436 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1437 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1437 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715 +CVE-2010-1439 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9232 +CVE-2010-1457 - http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz +CVE-2010-1461 - http://www.exploit-db.com/exploits/12232 +CVE-2010-1466 - http://www.exploit-db.com/exploits/12193 +CVE-2010-1467 - http://www.exploit-db.com/exploits/12193 +CVE-2010-1468 - http://packetstormsecurity.org/1004-exploits/joomlamvrmm-sql.txt +CVE-2010-1469 - http://packetstormsecurity.org/1004-exploits/joomlajprojectmanager-lfi.txt +CVE-2010-1469 - http://www.exploit-db.com/exploits/12146 +CVE-2010-1470 - http://packetstormsecurity.org/1004-exploits/joomlawebtv-lfi.txt +CVE-2010-1470 - http://www.exploit-db.com/exploits/12166 +CVE-2010-1471 - http://packetstormsecurity.org/1004-exploits/joomlaaddressbook-lfi.txt +CVE-2010-1471 - http://www.exploit-db.com/exploits/12170 +CVE-2010-1472 - http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt +CVE-2010-1472 - http://www.exploit-db.com/exploits/12167 +CVE-2010-1473 - http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt +CVE-2010-1473 - http://www.exploit-db.com/exploits/12171 +CVE-2010-1474 - http://packetstormsecurity.org/1004-exploits/joomlasweetykeeper-lfi.txt +CVE-2010-1474 - http://www.exploit-db.com/exploits/12182 +CVE-2010-1475 - http://packetstormsecurity.org/1004-exploits/joomlapr-lfi.txt +CVE-2010-1475 - http://www.exploit-db.com/exploits/12147 +CVE-2010-1476 - http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt +CVE-2010-1476 - http://www.exploit-db.com/exploits/12150 +CVE-2010-1477 - http://packetstormsecurity.org/1004-exploits/joomlasermonspeaker-sql.txt +CVE-2010-1478 - http://packetstormsecurity.org/1004-exploits/joomlajfeedback-lfi.txt +CVE-2010-1478 - http://www.exploit-db.com/exploits/12145 +CVE-2010-1479 - http://packetstormsecurity.org/1004-exploits/joomlarokmodule-bsql.txt +CVE-2010-1479 - http://www.exploit-db.com/exploits/12148 +CVE-2010-1486 - http://www.coresecurity.com/content/cactushop-xss-persistent-vulnerability +CVE-2010-1489 - http://p42.us/ie8xss/ +CVE-2010-1489 - http://p42.us/ie8xss/Abusing_IE8s_XSS_Filters.pdf +CVE-2010-1491 - http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt +CVE-2010-1491 - http://www.exploit-db.com/exploits/12318 +CVE-2010-1493 - http://packetstormsecurity.org/1004-exploits/joomlaawdwall-lfisql.txt +CVE-2010-1493 - http://www.exploit-db.com/exploits/12113 +CVE-2010-1494 - http://packetstormsecurity.org/1004-exploits/joomlaawdwall-lfisql.txt +CVE-2010-1494 - http://www.exploit-db.com/exploits/12113 +CVE-2010-1495 - http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt +CVE-2010-1495 - http://www.exploit-db.com/exploits/12286 +CVE-2010-1496 - http://packetstormsecurity.org/1004-exploits/joomlajoltcard-sql.txt +CVE-2010-1497 - http://packetstormsecurity.org/1004-exploits/dlstats-sqlxssadmin.txt +CVE-2010-1498 - http://packetstormsecurity.org/1004-exploits/dlstats-sqlxssadmin.txt +CVE-2010-1499 - http://packetstormsecurity.org/1004-exploits/musicbox33-sql.txt +CVE-2010-1529 - http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt +CVE-2010-1531 - http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt +CVE-2010-1531 - http://www.exploit-db.com/exploits/12054 +CVE-2010-1532 - http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt +CVE-2010-1532 - http://www.exploit-db.com/exploits/12118 +CVE-2010-1533 - http://www.exploit-db.com/exploits/12142 +CVE-2010-1534 - http://www.exploit-db.com/exploits/12067 +CVE-2010-1535 - http://www.exploit-db.com/exploits/12151 +CVE-2010-1537 - http://packetstormsecurity.org/1002-exploits/phpcdb-lfi.txt +CVE-2010-1537 - http://www.exploit-db.com/exploits/11585 +CVE-2010-1538 - http://packetstormsecurity.org/1002-exploits/phpraincheck-sql.txt +CVE-2010-1538 - http://www.exploit-db.com/exploits/11586 +CVE-2010-1544 - http://packetstormsecurity.org/1002-exploits/rcadcm425-dos.txt +CVE-2010-1546 - http://www.madirish.net/?article=458 +CVE-2010-1547 - http://www.madirish.net/?article=458 +CVE-2010-1548 - http://www.madirish.net/?article=458 +CVE-2010-1549 - https://www.exploit-db.com/exploits/43411/ +CVE-2010-1552 - http://securityreason.com/securityalert/8157 +CVE-2010-1553 - http://securityreason.com/securityalert/8153 +CVE-2010-1554 - http://securityreason.com/securityalert/8154 +CVE-2010-1561 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-1562 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-1563 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-1565 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-1567 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml +CVE-2010-1583 - http://www.exploit-db.com/exploits/12452 +CVE-2010-1583 - http://www.madirish.net/?article=456 +CVE-2010-1584 - http://drupal.org/node/794718 +CVE-2010-1584 - http://www.madirish.net/?article=457 +CVE-2010-1584 - http://www.packetstormsecurity.com/1005-exploits/drupalab-xss.txt +CVE-2010-1584 - http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ +CVE-2010-1586 - http://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse +CVE-2010-1594 - http://packetstormsecurity.org/1001-exploits/ocsinventoryng-sqlxss.txt +CVE-2010-1595 - http://packetstormsecurity.org/1001-exploits/ocsinventoryng-sqlxss.txt +CVE-2010-1599 - http://packetstormsecurity.org/1004-exploits/nkinfoweb-sql.txt +CVE-2010-1600 - http://www.exploit-db.com/exploits/12234 +CVE-2010-1600 - http://www.packetstormsecurity.com/1004-exploits/joomlamediamallfactory-bsql.txt +CVE-2010-1601 - http://packetstormsecurity.org/1004-exploits/joomlajacomment-lfi.txt +CVE-2010-1601 - http://www.exploit-db.com/exploits/12236 +CVE-2010-1602 - http://packetstormsecurity.org/1004-exploits/joomlazimbcomment-lfi.txt +CVE-2010-1602 - http://www.exploit-db.com/exploits/12283 +CVE-2010-1603 - http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt +CVE-2010-1603 - http://www.exploit-db.com/exploits/12284 +CVE-2010-1604 - http://packetstormsecurity.org/1004-exploits/nctjobsportal-sqlxss.txt +CVE-2010-1606 - http://packetstormsecurity.org/1004-exploits/nctjobsportal-sqlxss.txt +CVE-2010-1607 - http://www.exploit-db.com/exploits/12316 +CVE-2010-1611 - http://packetstormsecurity.org/1002-exploits/alegrocart-xsrf.txt +CVE-2010-1618 - http://www.ja-sig.org/issues/browse/PHPCAS-52 +CVE-2010-1620 - http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz +CVE-2010-1622 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2010-1624 - http://www.securityfocus.com/bid/40138 +CVE-2010-1626 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490 +CVE-2010-1634 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2010-1635 - https://bugzilla.samba.org/show_bug.cgi?id=7229 +CVE-2010-1637 - http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 +CVE-2010-1638 - http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74 +CVE-2010-1641 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-1641 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916 +CVE-2010-1651 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 +CVE-2010-1652 - http://packetstormsecurity.org/1004-exploits/helpcenterlive-lfi.txt +CVE-2010-1652 - http://www.exploit-db.com/exploits/12421 +CVE-2010-1653 - http://packetstormsecurity.org/1004-exploits/joomlagraphics-lfi.txt +CVE-2010-1653 - http://www.exploit-db.com/exploits/12430 +CVE-2010-1654 - http://packetstormsecurity.org/1004-exploits/ireee-sql.txt +CVE-2010-1657 - http://packetstormsecurity.org/1004-exploits/joomlasmartsite-lfi.txt +CVE-2010-1657 - http://www.exploit-db.com/exploits/12428 +CVE-2010-1658 - http://packetstormsecurity.org/1004-exploits/joomlnoticeboard-lfi.txt +CVE-2010-1658 - http://www.exploit-db.com/exploits/12427 +CVE-2010-1659 - http://packetstormsecurity.org/1004-exploits/joomlaultimateportfolio-lfi.txt +CVE-2010-1659 - http://www.exploit-db.com/exploits/12426 +CVE-2010-1660 - http://packetstormsecurity.org/1004-exploits/clscriptclassfieds-sql.txt +CVE-2010-1661 - http://packetstormsecurity.org/1004-exploits/phpquickarcade-sqlxss.txt +CVE-2010-1661 - http://www.exploit-db.com/exploits/12416 +CVE-2010-1662 - http://packetstormsecurity.org/1004-exploits/phpquickarcade-sqlxss.txt +CVE-2010-1662 - http://www.exploit-db.com/exploits/12416 +CVE-2010-1681 - http://www.coresecurity.com/content/ms-visio-dxf-buffer-overflow +CVE-2010-1685 - https://seclists.org/fulldisclosure/2010/Apr/331 +CVE-2010-1689 - http://www.coresecurity.com/content/CORE-2010-0424-windows-smtp-dns-query-id-bugs +CVE-2010-1690 - http://www.coresecurity.com/content/CORE-2010-0424-windows-smtp-dns-query-id-bugs +CVE-2010-1702 - http://packetstormsecurity.org/1004-exploits/whmcs-sql.txt +CVE-2010-1703 - http://packetstormsecurity.org/1004-exploits/aps-sqlxss.txt +CVE-2010-1704 - http://packetstormsecurity.org/1004-exploits/aps-sqlxss.txt +CVE-2010-1706 - http://packetstormsecurity.org/1004-exploits/2daybizauctionscript-sql.txt +CVE-2010-1708 - http://packetstormsecurity.org/1004-exploits/freerealty-sql.txt +CVE-2010-1710 - http://packetstormsecurity.org/1004-exploits/siestta-lfixss.txt +CVE-2010-1711 - http://packetstormsecurity.org/1004-exploits/siestta-lfixss.txt +CVE-2010-1713 - http://packetstormsecurity.org/1004-exploits/postnukemodload-sql.txt +CVE-2010-1714 - http://packetstormsecurity.org/1004-exploits/joomlaarcadegames-lfi.txt +CVE-2010-1714 - http://www.exploit-db.com/exploits/12168 +CVE-2010-1715 - http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt +CVE-2010-1715 - http://www.exploit-db.com/exploits/12174 +CVE-2010-1717 - http://www.exploit-db.com/exploits/12291 +CVE-2010-1718 - http://www.exploit-db.com/exploits/12282 +CVE-2010-1719 - http://packetstormsecurity.org/1004-exploits/joomlamtfireeagle-lfi.txt +CVE-2010-1719 - http://www.exploit-db.com/exploits/12233 +CVE-2010-1722 - http://packetstormsecurity.org/1004-exploits/joomlaonlinemarket-lfi.txt +CVE-2010-1722 - http://www.exploit-db.com/exploits/12177 +CVE-2010-1723 - http://www.exploit-db.com/exploits/12289 +CVE-2010-1725 - http://packetstormsecurity.org/1004-exploits/alibabacloneplatinum-sql.txt +CVE-2010-1726 - http://packetstormsecurity.org/1004-exploits/ec21clone-sql.txt +CVE-2010-1727 - http://packetstormsecurity.org/1004-exploits/jobpost-sql.txt +CVE-2010-1734 - http://vigilance.fr/vulnerability/Windows-denials-of-service-of-win32k-sys-9607 +CVE-2010-1735 - http://vigilance.fr/vulnerability/Windows-denials-of-service-of-win32k-sys-9607 +CVE-2010-1736 - http://packetstormsecurity.org/1004-exploits/krmhaber-disclose.txt +CVE-2010-1737 - http://packetstormsecurity.org/1005-exploits/gallo-rfi.txt +CVE-2010-1737 - http://www.exploit-db.com/exploits/12488 +CVE-2010-1739 - http://packetstormsecurity.org/1004-exploits/joomlanewsfeeds-sql.txt +CVE-2010-1740 - http://packetstormsecurity.org/1005-exploits/guppy-sql.txt +CVE-2010-1741 - http://packetstormsecurity.org/1005-exploits/billwerx-sql.txt +CVE-2010-1742 - http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt +CVE-2010-1743 - http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt +CVE-2010-1744 - http://packetstormsecurity.org/1004-exploits/b2bgoldscript-sql.txt +CVE-2010-1748 - http://cups.org/str.php?L3577 +CVE-2010-1748 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723 +CVE-2010-1818 - http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010 +CVE-2010-1851 - http://www.cnet.com/8301-31361_1-20004265-254.html +CVE-2010-1852 - http://www.cnet.com/8301-31361_1-20004265-254.html +CVE-2010-1855 - http://packetstormsecurity.org/1003-exploits/ppwb-sql.txt +CVE-2010-1856 - http://packetstormsecurity.org/1003-exploits/repairshop2-xss.txt +CVE-2010-1858 - http://packetstormsecurity.org/1003-exploits/joomlasmestorage-lfi.txt +CVE-2010-1870 - http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html +CVE-2010-1870 - http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html +CVE-2010-1870 - http://seclists.org/fulldisclosure/2020/Oct/23 +CVE-2010-1870 - http://securityreason.com/securityalert/8345 +CVE-2010-1870 - http://www.exploit-db.com/exploits/14360 +CVE-2010-1872 - http://packetstormsecurity.org/1004-exploits/flashcard-xss.txt +CVE-2010-1873 - http://packetstormsecurity.org/1004-exploits/joomlajvehicles-sql.txt +CVE-2010-1873 - http://www.exploit-db.com/exploits/12190 +CVE-2010-1876 - http://packetstormsecurity.org/1004-exploits/ajshoppingcart-sql.txt +CVE-2010-1877 - http://packetstormsecurity.org/1004-exploits/joomlajtmreseller-sql.txt +CVE-2010-1878 - http://packetstormsecurity.org/1004-exploits/joomlaorgchart-lfi.txt +CVE-2010-1878 - http://www.exploit-db.com/exploits/12317 +CVE-2010-1881 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 +CVE-2010-1886 - http://support.microsoft.com/kb/982316 +CVE-2010-1887 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 +CVE-2010-1891 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-069 +CVE-2010-1894 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 +CVE-2010-1895 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 +CVE-2010-1896 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 +CVE-2010-1897 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-048 +CVE-2010-1918 - http://packetstormsecurity.org/1005-exploits/MOPS-2010-018.pdf +CVE-2010-1919 - http://www.packetstormsecurity.org/1005-advisories/ESA-2010-007.txt +CVE-2010-1920 - http://packetstormsecurity.org/1005-exploits/openmairie-rfilfi.txt +CVE-2010-1920 - http://www.exploit-db.com/exploits/12486 +CVE-2010-1921 - http://packetstormsecurity.org/1005-exploits/openmairie-rfilfi.txt +CVE-2010-1921 - http://www.exploit-db.com/exploits/12486 +CVE-2010-1922 - http://packetstormsecurity.org/1005-exploits/29o3cms-rfi.txt +CVE-2010-1923 - http://packetstormsecurity.org/1005-exploits/web20snfcs-sql.txt +CVE-2010-1925 - http://packetstormsecurity.org/1005-exploits/teknoportal-sql.txt +CVE-2010-1926 - http://packetstormsecurity.org/1004-exploits/opencourrier-rfilfi.txt +CVE-2010-1926 - http://www.exploit-db.com/exploits/12398 +CVE-2010-1927 - http://packetstormsecurity.org/1004-exploits/opencourrier-rfilfi.txt +CVE-2010-1927 - http://www.exploit-db.com/exploits/12398 +CVE-2010-1928 - http://packetstormsecurity.org/1004-exploits/openplanning-rfilfi.txt +CVE-2010-1928 - http://www.exploit-db.com/exploits/12365 +CVE-2010-1929 - http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities +CVE-2010-1929 - http://www.exploit-db.com/exploits/14010 +CVE-2010-1930 - http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities +CVE-2010-1930 - http://www.exploit-db.com/exploits/14010 +CVE-2010-1931 - http://www.coresecurity.com/content/cubecart-php-shopping-cart-sql-injection +CVE-2010-1932 - http://www.coresecurity.com/content/XnView-MBM-Processing-Heap-Overflow +CVE-2010-1934 - http://packetstormsecurity.org/1004-exploits/openplanning-rfilfi.txt +CVE-2010-1934 - http://www.exploit-db.com/exploits/12365 +CVE-2010-1935 - http://packetstormsecurity.org/1004-exploits/openpresse-lfi.txt +CVE-2010-1935 - http://www.exploit-db.com/exploits/12364 +CVE-2010-1936 - http://packetstormsecurity.org/1004-exploits/opencominterne-lfi.txt +CVE-2010-1936 - http://www.exploit-db.com/exploits/12396 +CVE-2010-1938 - http://securityreason.com/achievement_securityalert/87 +CVE-2010-1938 - http://securityreason.com/securityalert/7450 +CVE-2010-1938 - http://site.pi3.com.pl/adv/libopie-adv.txt +CVE-2010-1938 - http://www.exploit-db.com/exploits/12762 +CVE-2010-1939 - http://h07.w.interia.pl/Safari.rar +CVE-2010-1944 - http://packetstormsecurity.org/1005-exploits/opencimetiere-rfi.txt +CVE-2010-1944 - http://www.exploit-db.com/exploits/12476 +CVE-2010-1945 - http://packetstormsecurity.org/1004-exploits/openfoncier-rfilfi.txt +CVE-2010-1945 - http://www.exploit-db.com/exploits/12366 +CVE-2010-1946 - http://packetstormsecurity.org/1004-exploits/openregistrecil-rfilfi.txt +CVE-2010-1946 - http://www.exploit-db.com/exploits/12313 +CVE-2010-1947 - http://packetstormsecurity.org/1004-exploits/openregistrecil-rfilfi.txt +CVE-2010-1947 - http://www.exploit-db.com/exploits/12313 +CVE-2010-1948 - http://packetstormsecurity.org/1004-exploits/openfoncier-rfilfi.txt +CVE-2010-1948 - http://www.exploit-db.com/exploits/12366 +CVE-2010-1949 - http://www.exploit-db.com/exploits/12305 +CVE-2010-1951 - http://www.exploit-db.com/exploits/12249 +CVE-2010-1952 - http://packetstormsecurity.org/1004-exploits/joomlabeeheardlite-lfi.txt +CVE-2010-1952 - http://www.exploit-db.com/exploits/12239 +CVE-2010-1953 - http://www.exploit-db.com/exploits/12288 +CVE-2010-1954 - http://www.exploit-db.com/exploits/12287 +CVE-2010-1955 - http://packetstormsecurity.org/1004-exploits/joomladeluxeblog-lfi.txt +CVE-2010-1955 - http://www.exploit-db.com/exploits/12238 +CVE-2010-1956 - http://packetstormsecurity.org/1004-exploits/joomlagadgetfactory-lfi.txt +CVE-2010-1956 - http://www.exploit-db.com/exploits/12285 +CVE-2010-1957 - http://packetstormsecurity.org/1004-exploits/joomlalovefactory-lfi.txt +CVE-2010-1957 - http://www.exploit-db.com/exploits/12235 +CVE-2010-1958 - http://www.madirish.net/?article=461 +CVE-2010-1964 - http://securityreason.com/securityalert/8155 +CVE-2010-1977 - http://www.exploit-db.com/exploits/12083 +CVE-2010-1979 - http://www.exploit-db.com/exploits/12088 +CVE-2010-1980 - http://packetstormsecurity.org/1004-exploits/joomlaflickr-lfi.txt +CVE-2010-1980 - http://www.exploit-db.com/exploits/12085 +CVE-2010-1981 - http://packetstormsecurity.org/1004-exploits/joomlafabrik-lfi.txt +CVE-2010-1981 - http://www.exploit-db.com/exploits/12087 +CVE-2010-1982 - http://packetstormsecurity.org/1004-exploits/joomlajavoice-lfi.txt +CVE-2010-1983 - http://evilc0de.blogspot.com/2010/04/joomla-component-redtwitter-lfi-vuln.html +CVE-2010-1983 - http://packetstormsecurity.org/1004-exploits/joomlaredtwitter-lfi.txt +CVE-2010-1983 - http://www.exploit-db.com/exploits/12055 +CVE-2010-1997 - http://packetstormsecurity.org/1005-exploits/sauruscms-xss.txt +CVE-2010-1999 - http://packetstormsecurity.org/1005-exploits/opencatalogue-lfi.txt +CVE-2010-1999 - http://www.exploit-db.com/exploits/12475 +CVE-2010-2000 - http://drupal.org/node/797192 +CVE-2010-2003 - http://packetstormsecurity.org/1005-exploits/advancedpoll208-xss.txt +CVE-2010-2005 - http://www.packetstormsecurity.com/1001-exploits/datalifeengine83-rfi.txt +CVE-2010-2008 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-2009 - http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt +CVE-2010-2009 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php +CVE-2010-2012 - http://packetstormsecurity.org/1005-exploits/migascms-sql.txt +CVE-2010-2016 - http://packetstormsecurity.org/1005-exploits/iceberg-sql.txt +CVE-2010-2017 - http://packetstormsecurity.org/1005-exploits/lokomediacms-xss.txt +CVE-2010-2018 - http://packetstormsecurity.org/1005-exploits/lokomediacms-disclose.txt +CVE-2010-2021 - http://www.madirish.net/?article=460 +CVE-2010-2031 - http://www.exploit-db.com/exploits/12710 +CVE-2010-2032 - http://packetstormsecurity.org/1005-exploits/cauchoresin312-xss.txt +CVE-2010-2033 - http://packetstormsecurity.org/1005-exploits/joomlaperchact-lfi.txt +CVE-2010-2034 - http://packetstormsecurity.org/1005-exploits/joomlaperchaia-lfi.txt +CVE-2010-2035 - http://packetstormsecurity.org/1005-exploits/joomlaperchagl-lfi.txt +CVE-2010-2036 - http://packetstormsecurity.org/1005-exploits/joomlaperchafa-lfi.txt +CVE-2010-2037 - http://packetstormsecurity.org/1005-exploits/joomlaperchada-lfi.txt +CVE-2010-2038 - http://packetstormsecurity.org/1005-exploits/gpeasycms-xss.txt +CVE-2010-2039 - http://packetstormsecurity.org/1004-exploits/gpeasy-xsrf.txt +CVE-2010-2040 - http://www.packetstormsecurity.org/1005-exploits/shopzillaas-xss.txt +CVE-2010-2041 - http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt +CVE-2010-2042 - http://packetstormsecurity.org/1005-exploits/ecshopsearch-sql.txt +CVE-2010-2043 - http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html +CVE-2010-2043 - http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt +CVE-2010-2044 - http://packetstormsecurity.org/1005-exploits/joomlakonsultasi-sql.txt +CVE-2010-2045 - http://packetstormsecurity.org/1005-exploits/joomlafdione-lfi.txt +CVE-2010-2045 - http://www.exploit-db.com/exploits/12595 +CVE-2010-2046 - http://packetstormsecurity.org/1005-exploits/joomlaactivehelper-xss.txt +CVE-2010-2047 - http://www.exploit-db.com/exploits/12641 +CVE-2010-2050 - http://packetstormsecurity.org/1005-exploits/joomlamscomment-lfi.txt +CVE-2010-2051 - http://packetstormsecurity.org/1005-exploits/dbcart-sql.txt +CVE-2010-2055 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183 +CVE-2010-2055 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316 +CVE-2010-2062 - https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/ +CVE-2010-2063 - http://www.samba.org/samba/security/CVE-2010-2063.html +CVE-2010-2063 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859 +CVE-2010-2066 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2068 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2010-2068 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2010-2070 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2078 - http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html +CVE-2010-2078 - http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt +CVE-2010-2079 - http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html +CVE-2010-2079 - http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt +CVE-2010-2085 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf +CVE-2010-2086 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf +CVE-2010-2087 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf +CVE-2010-2088 - http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf +CVE-2010-2089 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2010-2089 - https://bugzilla.redhat.com/show_bug.cgi?id=598197 +CVE-2010-2102 - http://www.exploit-db.com/exploits/12740 +CVE-2010-2103 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-2103 - http://www.exploit-db.com/exploits/12689 +CVE-2010-2111 - http://cross-site-scripting.blogspot.com/2010/05/pacific-timesheet-674-cross-site.html +CVE-2010-2113 - http://cross-site-scripting.blogspot.com/2010/05/uniform-server-565-xsrf.html +CVE-2010-2114 - http://cross-site-scripting.blogspot.com/2010/05/brekeke-pbx-2448-cross-site-request.html +CVE-2010-2122 - http://packetstormsecurity.org/1005-exploits/joomlasimpledownload-lfi.txt +CVE-2010-2124 - http://packetstormsecurity.org/1005-exploits/conpresso407-sql.txt +CVE-2010-2126 - http://packetstormsecurity.org/1004-exploits/snipegallery-rfi.txt +CVE-2010-2127 - http://packetstormsecurity.org/1005-exploits/jv2foldergallery-rfi.txt +CVE-2010-2129 - http://packetstormsecurity.org/1005-exploits/joomlaajaxec-lfi.txt +CVE-2010-2130 - http://packetstormsecurity.org/1002-exploits/arisg5-xss.txt +CVE-2010-2132 - http://www.packetstormsecurity.com/1002-exploits/oes-rfi.txt +CVE-2010-2133 - http://packetstormsecurity.org/1003-exploits/mlf-sql.txt +CVE-2010-2134 - http://www.exploit-db.com/exploits/11584 +CVE-2010-2135 - http://packetstormsecurity.org/1002-exploits/hazelpresslite-sql.txt +CVE-2010-2135 - http://www.exploit-db.com/exploits/11602 +CVE-2010-2136 - http://www.packetstormsecurity.com/1002-exploits/articlefriendly-lfi.txt +CVE-2010-2137 - http://packetstormsecurity.org/1002-exploits/proman-rfilfi.txt +CVE-2010-2137 - http://www.exploit-db.com/exploits/11587 +CVE-2010-2138 - http://packetstormsecurity.org/1002-exploits/proman-rfilfi.txt +CVE-2010-2138 - http://www.exploit-db.com/exploits/11587 +CVE-2010-2141 - http://packetstormsecurity.org/1005-exploits/nitro-sql.txt +CVE-2010-2142 - http://packetstormsecurity.org/1005-exploits/cyberhost-sql.txt +CVE-2010-2143 - http://packetstormsecurity.org/1005-exploits/symphony-lfi.txt +CVE-2010-2143 - http://www.exploit-db.com/exploits/12809 +CVE-2010-2144 - http://packetstormsecurity.org/1005-exploits/zeeways-xss.txt +CVE-2010-2153 - http://cross-site-scripting.blogspot.com/2010/06/tcexam-101006-arbitrary-upload.html +CVE-2010-2153 - http://www.packetstormsecurity.org/1006-exploits/tcexam-shell.txt +CVE-2010-2160 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2161 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2162 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2163 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2164 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2165 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2166 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2167 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2169 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2170 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2171 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2172 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2173 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2174 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2175 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2176 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2177 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2178 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2179 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2180 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2181 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2182 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2183 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2184 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2185 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2186 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2187 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2188 - http://www.redhat.com/support/errata/RHSA-2010-0470.html +CVE-2010-2226 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2227 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2227 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-2235 - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz +CVE-2010-2240 - http://www.redhat.com/support/errata/RHSA-2010-0670.html +CVE-2010-2243 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad6759fbf35d104dbf573cd6f4c6784ad6823f7e +CVE-2010-2248 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2252 - http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html +CVE-2010-2252 - http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00031.html +CVE-2010-2254 - http://packetstormsecurity.org/1001-exploits/joomlaboh-sql.txt +CVE-2010-2255 - http://packetstormsecurity.org/1001-exploits/joomlabfsurveypro-sql.txt +CVE-2010-2256 - http://packetstormsecurity.org/1001-exploits/ppmvcs-sqlxss.txt +CVE-2010-2257 - http://packetstormsecurity.org/1001-exploits/ppmvcs-sqlxss.txt +CVE-2010-2258 - http://packetstormsecurity.org/1001-exploits/phpbannerexchange-xss.txt +CVE-2010-2259 - http://packetstormsecurity.org/1001-exploits/joomlabfsurvey-lfi.txt +CVE-2010-2260 - http://packetstormsecurity.org/1001-exploits/bandwidthmeter-xss.txt +CVE-2010-2263 - http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html +CVE-2010-2263 - http://www.exploit-db.com/exploits/13822 +CVE-2010-2273 - http://bugs.dojotoolkit.org/ticket/10773 +CVE-2010-2273 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 +CVE-2010-2273 - http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/ +CVE-2010-2274 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 +CVE-2010-2275 - http://bugs.dojotoolkit.org/ticket/10773 +CVE-2010-2275 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 +CVE-2010-2275 - http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/ +CVE-2010-2276 - http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833 +CVE-2010-2295 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 +CVE-2010-2301 - https://bugs.webkit.org/show_bug.cgi?id=38922 +CVE-2010-2311 - http://www.exploit-db.com/exploits/13820 +CVE-2010-2313 - http://packetstormsecurity.org/1006-exploits/simm-lfi.txt +CVE-2010-2313 - http://www.exploit-db.com/exploits/12848/ +CVE-2010-2314 - http://packetstormsecurity.org/1005-exploits/nucleustwitter-rfi.txt +CVE-2010-2314 - http://www.exploit-db.com/exploits/12790/ +CVE-2010-2318 - http://packetstormsecurity.org/1001-exploits/phpcityportal-xss.txt +CVE-2010-2321 - http://www.exploit-db.com/exploits/13817 +CVE-2010-2321 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4941.php +CVE-2010-2324 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 +CVE-2010-2328 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829 +CVE-2010-2329 - http://packetstormsecurity.org/1006-exploits/rosoft444-overflow.txt +CVE-2010-2330 - http://www.exploit-db.com/exploits/13876 +CVE-2010-2335 - http://www.exploit-db.com/exploits/13845 +CVE-2010-2336 - http://www.exploit-db.com/exploits/13845 +CVE-2010-2338 - http://packetstormsecurity.org/1006-exploits/vuwebvisitoranalyst-sql.txt +CVE-2010-2339 - http://packetstormsecurity.org/1006-advisories/major_rls73.txt +CVE-2010-2340 - http://packetstormsecurity.org/1006-exploits/arabportal22x-sql.txt +CVE-2010-2341 - http://packetstormsecurity.org/1006-exploits/ezpxphotoblog-rfi.txt +CVE-2010-2343 - http://www.exploit-db.com/exploits/13760 +CVE-2010-2343 - http://www.exploit-db.com/exploits/13763 +CVE-2010-2349 - http://www.exploit-db.com/exploits/13920 +CVE-2010-2351 - http://www.exploit-db.com/exploits/13906 +CVE-2010-2354 - http://packetstormsecurity.org/1006-exploits/elms-sql-xss.txt +CVE-2010-2356 - http://packetstormsecurity.org/1006-exploits/elms-sql-xss.txt +CVE-2010-2358 - http://packetstormsecurity.org/1006-exploits/nakid-rfi.txt +CVE-2010-2359 - http://packetstormsecurity.org/1006-exploits/ewebquizv8-sql.txt +CVE-2010-2370 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2371 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2372 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2373 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2374 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2375 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2376 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2377 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2378 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2379 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2380 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2381 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2382 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2383 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2384 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2385 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2386 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2388 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2389 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2390 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2391 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2392 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2393 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2394 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2395 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2396 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2397 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2398 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2399 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2400 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2401 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2402 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2403 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2404 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2405 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2406 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2407 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2408 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2409 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2410 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2411 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2412 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2413 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2414 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2415 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2416 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2417 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2418 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2419 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-2429 - http://www.splunk.com/view/SP-CAAAFHY +CVE-2010-2439 - http://www.exploit-db.com/exploits/13934 +CVE-2010-2440 - http://www.exploit-db.com/exploits/13965 +CVE-2010-2441 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 +CVE-2010-2442 - https://bugzilla.mozilla.org/show_bug.cgi?id=552255 +CVE-2010-2445 - http://packetstormsecurity.com/files/163311/Android-2.0-FreeCIV-Arbitrary-Code-Execution.html +CVE-2010-2456 - http://packetstormsecurity.org/1006-exploits/linkerimg-rfi.txt +CVE-2010-2458 - http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt +CVE-2010-2459 - http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt +CVE-2010-2461 - http://packetstormsecurity.org/1006-exploits/overstock-sql.txt +CVE-2010-2462 - http://packetstormsecurity.org/1006-exploits/orohyip-sql.txt +CVE-2010-2464 - http://packetstormsecurity.org/1006-exploits/joomlarscomments-xss.txt +CVE-2010-2465 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html +CVE-2010-2465 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon +CVE-2010-2466 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html +CVE-2010-2466 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon +CVE-2010-2467 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html +CVE-2010-2467 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon +CVE-2010-2468 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html +CVE-2010-2468 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon +CVE-2010-2469 - http://www.darkreading.com/blog/archives/2010/04/attacking_door.html +CVE-2010-2469 - http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon +CVE-2010-2480 - http://bugs.python.org/issue9061 +CVE-2010-2480 - https://bugzilla.redhat.com/show_bug.cgi?id=609573 +CVE-2010-2490 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2490 +CVE-2010-2492 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-2492 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-2502 - http://www.splunk.com/view/SP-CAAAFGD +CVE-2010-2503 - http://www.splunk.com/view/SP-CAAAFGD +CVE-2010-2504 - http://www.splunk.com/view/SP-CAAAFGD +CVE-2010-2505 - http://www.exploit-db.com/exploits/13888 +CVE-2010-2507 - http://packetstormsecurity.org/1006-exploits/joomlapicasa2gallery-lfi.txt +CVE-2010-2513 - http://packetstormsecurity.org/1006-exploits/joomlajeajax-sql.txt +CVE-2010-2514 - http://packetstormsecurity.org/1006-exploits/joomlajfaq-sqlxss.txt +CVE-2010-2515 - http://packetstormsecurity.org/1006-exploits/joomlajfaq-sqlxss.txt +CVE-2010-2521 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2524 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2525 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2646a1f61a3b5525914757f10fa12b5b94713648 +CVE-2010-2526 - http://www.ubuntu.com/usn/USN-1001-1 +CVE-2010-2535 - http://www.ocert.org/advisories/ocert-2010-002.html +CVE-2010-2535 - http://www.openwall.com/lists/oss-security/2010/07/20/2 +CVE-2010-2535 - http://www.openwall.com/lists/oss-security/2010/07/21/8 +CVE-2010-2537 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-2538 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-2549 - http://seclists.org/fulldisclosure/2010/Jul/3 +CVE-2010-2549 - http://www.exploit-db.com/exploits/14156 +CVE-2010-2556 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 +CVE-2010-2557 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 +CVE-2010-2558 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 +CVE-2010-2559 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 +CVE-2010-2560 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-053 +CVE-2010-2561 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-051 +CVE-2010-2563 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-067 +CVE-2010-2568 - http://isc.sans.edu/diary.html?storyid=9181 +CVE-2010-2568 - http://isc.sans.edu/diary.html?storyid=9190 +CVE-2010-2586 - http://forums.winamp.com/showthread.php?t=324322 +CVE-2010-2609 - http://packetstormsecurity.org/1006-exploits/jobsearchengine-sql.txt +CVE-2010-2611 - http://packetstormsecurity.org/1006-exploits/inetsolutionjobsearch-sql.txt +CVE-2010-2613 - http://packetstormsecurity.org/1006-exploits/joomlaawdsong-xss.txt +CVE-2010-2616 - http://www.packetstormsecurity.com/1006-exploits/phpbiblesearch-sqlxss.txt +CVE-2010-2617 - http://www.packetstormsecurity.com/1006-exploits/phpbiblesearch-sqlxss.txt +CVE-2010-2618 - http://packetstormsecurity.org/1006-exploits/adaptcms200-rfi.txt +CVE-2010-2618 - http://www.exploit-db.com/exploits/14016 +CVE-2010-2621 - http://aluigi.org/adv/qtsslame-adv.txt +CVE-2010-2621 - http://aluigi.org/poc/qtsslame.zip +CVE-2010-2632 - http://securityreason.com/achievement_securityalert/89 +CVE-2010-2632 - http://securityreason.com/achievement_securityalert/97 +CVE-2010-2632 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-2669 - http://cross-site-scripting.blogspot.com/2010/07/orbis-102-reflected-xss.html +CVE-2010-2673 - http://packetstormsecurity.org/1003-exploits/devana-sql.txt +CVE-2010-2674 - http://packetstormsecurity.org/1003-exploits/tsokacms-sqlxss.txt +CVE-2010-2675 - http://packetstormsecurity.org/1003-exploits/tsokacms-sqlxss.txt +CVE-2010-2676 - http://packetstormsecurity.org/1003-exploits/owa123-lfirfi.txt +CVE-2010-2677 - http://packetstormsecurity.org/1003-exploits/owa123-lfirfi.txt +CVE-2010-2679 - http://packetstormsecurity.org/1003-exploits/joomlaweblinks-sql.txt +CVE-2010-2680 - http://packetstormsecurity.org/1006-exploits/joomlajesectionfinder-lfi.txt +CVE-2010-2682 - http://packetstormsecurity.org/1004-exploits/joomlarealtyna-lfi.txt +CVE-2010-2683 - http://packetstormsecurity.org/1006-exploits/pagedirector-sql.txt +CVE-2010-2683 - http://www.exploit-db.com/exploits/14112 +CVE-2010-2684 - http://packetstormsecurity.org/1006-exploits/pagedirector-sqladdadmin.txt +CVE-2010-2685 - http://packetstormsecurity.org/1006-exploits/pagedirector-sqladdadmin.txt +CVE-2010-2687 - http://packetstormsecurity.org/1006-exploits/boatclassifieds-sql.txt +CVE-2010-2688 - http://packetstormsecurity.org/1006-exploits/boatclassdetail-sql.txt +CVE-2010-2689 - http://packetstormsecurity.org/1006-exploits/webdm-sql.txt +CVE-2010-2690 - http://www.exploit-db.com/exploits/14126 +CVE-2010-2691 - http://www.packetstormsecurity.com/1006-exploits/2daybiztshirt-sql.txt +CVE-2010-2692 - http://www.packetstormsecurity.com/1006-exploits/2daybiztshirt-sql.txt +CVE-2010-2694 - http://www.exploit-db.com/exploits/14312 +CVE-2010-2702 - http://aluigi.altervista.org/adv/unrealcbof-adv.txt +CVE-2010-2709 - http://securityreason.com/securityalert/8150 +CVE-2010-2709 - http://www.coresecurity.com/content/hp-nnm-ovjavalocale-buffer-overflow +CVE-2010-2709 - http://www.exploit-db.com/exploits/14547 +CVE-2010-2716 - http://packetstormsecurity.org/1007-exploits/psnews-sql.txt +CVE-2010-2718 - http://packetstormsecurity.org/1007-exploits/cruxpa-xss.txt +CVE-2010-2721 - http://packetstormsecurity.org/1007-exploits/lyrics-sql.txt +CVE-2010-2743 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-073 +CVE-2010-2744 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-073 +CVE-2010-2751 - https://bugzilla.mozilla.org/show_bug.cgi?id=536466 +CVE-2010-2752 - https://bugzilla.mozilla.org/show_bug.cgi?id=574059 +CVE-2010-2753 - https://bugzilla.mozilla.org/show_bug.cgi?id=571106 +CVE-2010-2754 - https://bugzilla.mozilla.org/show_bug.cgi?id=568564 +CVE-2010-2760 - https://bugzilla.mozilla.org/show_bug.cgi?id=585815 +CVE-2010-2761 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-2761 - https://bugzilla.mozilla.org/show_bug.cgi?id=591165 +CVE-2010-2765 - https://bugzilla.mozilla.org/show_bug.cgi?id=576447 +CVE-2010-2766 - https://bugzilla.mozilla.org/show_bug.cgi?id=580445 +CVE-2010-2768 - https://bugzilla.mozilla.org/show_bug.cgi?id=579744 +CVE-2010-2769 - https://bugzilla.mozilla.org/show_bug.cgi?id=520189 +CVE-2010-2770 - https://bugzilla.mozilla.org/show_bug.cgi?id=583520 +CVE-2010-2772 - http://infoworld.com/d/security-central/new-weaponized-virus-targets-industrial-secrets-725 +CVE-2010-2772 - http://www.wired.com/threatlevel/2010/07/siemens-scada/ +CVE-2010-2791 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2010-2795 - https://issues.jasig.org/browse/PHPCAS-61 +CVE-2010-2796 - https://issues.jasig.org/browse/PHPCAS-67 +CVE-2010-2797 - http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html +CVE-2010-2798 - http://www.redhat.com/support/errata/RHSA-2010-0670.html +CVE-2010-2798 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-2800 - http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=95 +CVE-2010-2801 - http://libmspack.svn.sourceforge.net/viewvc/libmspack?view=revision&revision=118 +CVE-2010-2806 - https://bugzilla.redhat.com/show_bug.cgi?id=621980 +CVE-2010-2844 - http://cross-site-scripting.blogspot.com/2010/07/news-office-2018-reflected-xss.html +CVE-2010-2844 - http://packetstormsecurity.org/1007-exploits/newsoffice-xss.txt +CVE-2010-2845 - http://packetstormsecurity.org/1007-exploits/joomlaquickfaq-sql.txt +CVE-2010-2846 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt +CVE-2010-2847 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt +CVE-2010-2848 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt +CVE-2010-2849 - http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-reflected-xss.html +CVE-2010-2849 - http://packetstormsecurity.org/1007-exploits/nubuilder-xss.txt +CVE-2010-2850 - http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-local-file-inclusion.html +CVE-2010-2850 - http://packetstormsecurity.org/1007-exploits/nubuilder-lfi.txt +CVE-2010-2852 - http://cross-site-scripting.blogspot.com/2010/07/runcms-21-magpie-rss-module-reflected.html +CVE-2010-2853 - http://packetstormsecurity.org/1004-exploits/iscriptsvisualcaster-sql.txt +CVE-2010-2857 - http://packetstormsecurity.org/1007-exploits/joomlamusicmanager-lfi.txt +CVE-2010-2858 - http://packetstormsecurity.org/1007-exploits/simpnews-xss.txt +CVE-2010-2859 - http://packetstormsecurity.org/1007-exploits/simpnews-xss.txt +CVE-2010-2861 - http://securityreason.com/securityalert/8148 +CVE-2010-2861 - http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/ +CVE-2010-2863 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2864 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2865 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2866 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2867 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2868 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2869 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2870 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2871 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2872 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2873 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2874 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2875 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2876 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2877 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2878 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2879 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2880 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2881 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2882 - http://www.adobe.com/support/security/bulletins/apsb10-20.html +CVE-2010-2891 - http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow +CVE-2010-2891 - http://www.exploit-db.com/exploits/15293 +CVE-2010-2892 - http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability +CVE-2010-2892 - http://www.exploit-db.com/exploits/15488 +CVE-2010-2904 - http://packetstormsecurity.org/1007-advisories/DSECRG-09-068.txt +CVE-2010-2907 - http://packetstormsecurity.org/1004-exploits/joomlahuruhelpdesk-sql.txt +CVE-2010-2908 - http://packetstormsecurity.org/1007-exploits/joomlajoomdle-sql.txt +CVE-2010-2910 - http://packetstormsecurity.org/1007-exploits/joomlaoziogallery-sql.txt +CVE-2010-2911 - http://packetstormsecurity.org/1007-exploits/kayakoesupport37002-sql.txt +CVE-2010-2912 - http://packetstormsecurity.org/1007-exploits/kayakoesupport-sql.txt +CVE-2010-2915 - http://packetstormsecurity.org/0907-exploits/ajhypeprime-sql.txt +CVE-2010-2915 - http://www.exploit-db.com/exploits/14435 +CVE-2010-2916 - http://packetstormsecurity.org/1007-exploits/ajhyipmeridian-sql.txt +CVE-2010-2916 - http://www.exploit-db.com/exploits/14436 +CVE-2010-2917 - http://packetstormsecurity.org/1007-exploits/ajarticle-xss.txt +CVE-2010-2918 - http://packetstormsecurity.org/0804-exploits/joomlavisites-rfi.txt +CVE-2010-2919 - http://packetstormsecurity.org/1007-exploits/joomlastaticxt-sql.txt +CVE-2010-2920 - http://packetstormsecurity.org/1004-exploits/joomlafoobla-lfi.txt +CVE-2010-2920 - http://www.exploit-db.com/exploits/12120 +CVE-2010-2921 - http://packetstormsecurity.org/1007-exploits/joomlagolfcourseguide-sql.txt +CVE-2010-2922 - http://packetstormsecurity.org/1007-exploits/akyblog-sql.txt +CVE-2010-2923 - http://packetstormsecurity.org/1007-exploits/joomlayoutube-sql.txt +CVE-2010-2925 - http://packetstormsecurity.org/1007-exploits/freewaycms-sql.txt +CVE-2010-2928 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2928 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html +CVE-2010-2932 - http://www.exploit-db.com/exploits/14504 +CVE-2010-2935 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-2936 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-2936 - https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6 +CVE-2010-2938 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-2939 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-2942 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-2943 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-2943 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-2950 - https://bugzilla.redhat.com/show_bug.cgi?id=598537 +CVE-2010-2962 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-2965 - http://www.kb.cert.org/vuls/id/MAPG-86EPFA +CVE-2010-2975 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2976 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2977 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2978 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2979 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2980 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2981 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2982 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2983 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2984 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2986 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2987 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-2988 - http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html +CVE-2010-3015 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3023 - http://packetstormsecurity.org/1008-exploits/diamondlist-xssxsrf.txt +CVE-2010-3024 - http://marc.info/?l=bugtraq&m=128104130309426&w=2 +CVE-2010-3024 - http://packetstormsecurity.org/1008-exploits/diamondlist-xssxsrf.txt +CVE-2010-3024 - http://www.exploit-db.com/exploits/14565 +CVE-2010-3025 - http://packetstormsecurity.org/1008-exploits/openblog-xssxsrf.txt +CVE-2010-3026 - http://packetstormsecurity.org/1008-exploits/openblog-xssxsrf.txt +CVE-2010-3026 - http://www.exploit-db.com/exploits/14562 +CVE-2010-3027 - http://packetstormsecurity.org/1008-exploits/tycoonrecord-sql.txt +CVE-2010-3039 - http://seclists.org/fulldisclosure/2010/Nov/40 +CVE-2010-3048 - http://www.fuzzmyapp.com/advisories/FMA-2010-002/FMA-2010-002-EN.xml +CVE-2010-3056 - http://yehg.net/lab/pr0js/advisories/phpmyadmin/%5Bphpmyadmin-3.3.5%5D_cross_site_scripting%28XSS%29 +CVE-2010-3066 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3067 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3067 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3069 - http://www.vmware.com/security/advisories/VMSA-2010-0019.html +CVE-2010-3073 - https://bugzilla.redhat.com/show_bug.cgi?id=630460 +CVE-2010-3074 - https://bugzilla.redhat.com/show_bug.cgi?id=630460 +CVE-2010-3075 - https://bugzilla.redhat.com/show_bug.cgi?id=630460 +CVE-2010-3076 - http://packetstormsecurity.org/1009-exploits/smbind-sql.txt +CVE-2010-3077 - http://seclists.org/fulldisclosure/2010/Sep/82 +CVE-2010-3078 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3078 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3079 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3080 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3081 - http://sota.gen.nz/compat1/ +CVE-2010-3081 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3086 - http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread +CVE-2010-3086 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3107 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12074 +CVE-2010-3113 - http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=628032 +CVE-2010-3125 - http://www.exploit-db.com/exploits/14747 +CVE-2010-3127 - http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html +CVE-2010-3130 - http://www.exploit-db.com/exploits/14764 +CVE-2010-3131 - https://bugzilla.mozilla.org/show_bug.cgi?id=579593 +CVE-2010-3138 - http://www.exploit-db.com/exploits/14765 +CVE-2010-3138 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php +CVE-2010-3138 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014 +CVE-2010-3139 - http://www.exploit-db.com/exploits/14758 +CVE-2010-3144 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-097 +CVE-2010-3145 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-001 +CVE-2010-3146 - http://www.exploit-db.com/exploits/14746/ +CVE-2010-3146 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-016 +CVE-2010-3147 - http://www.exploit-db.com/exploits/14745/ +CVE-2010-3147 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-096 +CVE-2010-3148 - http://www.exploit-db.com/exploits/14744/ +CVE-2010-3148 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-055 +CVE-2010-3166 - https://bugzilla.mozilla.org/show_bug.cgi?id=579655 +CVE-2010-3167 - https://bugzilla.mozilla.org/show_bug.cgi?id=576070 +CVE-2010-3168 - https://bugzilla.mozilla.org/show_bug.cgi?id=576075 +CVE-2010-3173 - https://bugzilla.mozilla.org/show_bug.cgi?id=587234 +CVE-2010-3175 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3176 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3178 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3178 - https://bugzilla.mozilla.org/show_bug.cgi?id=576616 +CVE-2010-3179 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3180 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3182 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3183 - http://www.ubuntu.com/usn/USN-998-1 +CVE-2010-3187 - http://seclists.org/fulldisclosure/2010/Jul/317 +CVE-2010-3187 - http://seclists.org/fulldisclosure/2010/Jul/324 +CVE-2010-3187 - http://seclists.org/fulldisclosure/2010/Jul/337 +CVE-2010-3201 - https://www.exploit-db.com/exploits/34797/ +CVE-2010-3202 - http://flock.com/security/ +CVE-2010-3204 - http://packetstormsecurity.org/1008-exploits/peciocms-rfi.txt +CVE-2010-3205 - http://packetstormsecurity.org/1008-exploits/textpattern-rfi.txt +CVE-2010-3206 - http://packetstormsecurity.org/1008-exploits/diycms-rfi.txt +CVE-2010-3207 - http://packetstormsecurity.org/1008-exploits/galeriashqip-sql.txt +CVE-2010-3208 - http://www.packetstormsecurity.com/1008-exploits/wiccle-xss.txt +CVE-2010-3209 - http://packetstormsecurity.org/1008-exploits/seagull-rfi.txt +CVE-2010-3210 - http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt +CVE-2010-3212 - http://packetstormsecurity.org/1008-exploits/seagull-sql.txt +CVE-2010-3212 - http://www.exploit-db.com/exploits/14838 +CVE-2010-3213 - http://sites.google.com/site/tentacoloviola/pwning-corporate-webmails +CVE-2010-3213 - http://www.exploit-db.com/exploits/14285 +CVE-2010-3222 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-084 +CVE-2010-3227 - http://www.exploit-db.com/exploits/13921/ +CVE-2010-3243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072 +CVE-2010-3262 - http://flock.com/security/ +CVE-2010-3266 - http://www.coresecurity.com/content/multiple-vulnerabilities-in-bugtracker +CVE-2010-3266 - http://www.exploit-db.com/exploits/15653 +CVE-2010-3267 - http://www.coresecurity.com/content/multiple-vulnerabilities-in-bugtracker +CVE-2010-3267 - http://www.exploit-db.com/exploits/15653 +CVE-2010-3268 - http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos +CVE-2010-3269 - http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities +CVE-2010-3270 - http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities +CVE-2010-3271 - http://securityreason.com/securityalert/8281 +CVE-2010-3271 - http://www.coresecurity.com/content/IBM-WebSphere-CSRF +CVE-2010-3271 - http://www.exploit-db.com/exploits/17404 +CVE-2010-3272 - http://securityreason.com/securityalert/8089 +CVE-2010-3272 - http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities +CVE-2010-3273 - http://securityreason.com/securityalert/8089 +CVE-2010-3273 - http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities +CVE-2010-3274 - http://securityreason.com/securityalert/8089 +CVE-2010-3274 - http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities +CVE-2010-3275 - http://securityreason.com/securityalert/8162 +CVE-2010-3275 - http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files +CVE-2010-3276 - http://securityreason.com/securityalert/8162 +CVE-2010-3276 - http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files +CVE-2010-3296 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3296 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3297 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3298 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3298 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3301 - http://sota.gen.nz/compat2/ +CVE-2010-3301 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3305 - https://www.exploit-db.com/exploits/15014 +CVE-2010-3305 - https://www.openwall.com/lists/oss-security/2010/09/17/7 +CVE-2010-3313 - http://www.exploit-db.com/exploits/11777/ +CVE-2010-3314 - http://www.exploit-db.com/exploits/11777/ +CVE-2010-3315 - http://www.ubuntu.com/usn/USN-1053-1 +CVE-2010-3322 - http://www.splunk.com/view/SP-CAAAFQ6 +CVE-2010-3323 - http://www.splunk.com/view/SP-CAAAFQ6 +CVE-2010-3324 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3324 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072 +CVE-2010-3325 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3326 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3327 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3328 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3329 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3330 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3331 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 +CVE-2010-3332 - http://threatpost.com/en_us/blogs/new-crypto-attack-affects-millions-aspnet-apps-091310 +CVE-2010-3338 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-092 +CVE-2010-3340 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3342 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3343 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3345 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3346 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3348 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3405 - http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc +CVE-2010-3406 - http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc +CVE-2010-3407 - http://www.exploit-db.com/exploits/15005 +CVE-2010-3419 - http://packetstormsecurity.org/1009-exploits/fcms-rfi.txt +CVE-2010-3425 - http://cloudscan.blogspot.com/2010/09/vendorsmarterstats-bug-cross-site.html +CVE-2010-3426 - http://packetstormsecurity.org/1009-exploits/joomlajphone-lfi.txt +CVE-2010-3429 - http://www.ocert.org/advisories/ocert-2010-004.html +CVE-2010-3429 - http://www.openwall.com/lists/oss-security/2010/09/28/4 +CVE-2010-3432 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3432 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3439 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3439 +CVE-2010-3442 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3442 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3444 - https://bugzilla.redhat.com/show_bug.cgi?id=565997 +CVE-2010-3450 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-3451 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-3452 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-3453 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-3454 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-3455 - http://packetstormsecurity.org/1009-exploits/achecker-xss.txt +CVE-2010-3456 - http://packetstormsecurity.org/1009-exploits/essimpledownload-lfi.txt +CVE-2010-3457 - http://packetstormsecurity.org/1009-exploits/symphony-sqlxss.txt +CVE-2010-3458 - http://packetstormsecurity.org/1009-exploits/symphony-sqlxss.txt +CVE-2010-3460 - http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt +CVE-2010-3462 - http://packetstormsecurity.org/1009-exploits/mollify16-xss.txt +CVE-2010-3463 - http://packetstormsecurity.org/1009-exploits/santafox-xssxsrf.txt +CVE-2010-3464 - http://packetstormsecurity.org/1009-exploits/santafox-xssxsrf.txt +CVE-2010-3467 - http://packetstormsecurity.org/1009-exploits/exoopport-sql.txt +CVE-2010-3468 - http://www.exploit-db.com/exploits/15120 +CVE-2010-3477 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3477 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3479 - http://packetstormsecurity.org/1009-exploits/boutikone-sql.txt +CVE-2010-3480 - http://www.exploit-db.com/exploits/15011 +CVE-2010-3481 - http://www.exploit-db.com/exploits/15011 +CVE-2010-3482 - http://packetstormsecurity.org/1009-exploits/primitive-sqlxss.txt +CVE-2010-3482 - http://www.exploit-db.com/exploits/15064 +CVE-2010-3483 - http://packetstormsecurity.org/1009-exploits/primitive-sqlxss.txt +CVE-2010-3483 - http://www.exploit-db.com/exploits/15064 +CVE-2010-3484 - http://packetstormsecurity.org/1009-exploits/lightneasy-sql.txt +CVE-2010-3484 - http://www.exploit-db.com/exploits/15060 +CVE-2010-3486 - http://cloudscan.blogspot.com/2010/09/smarter-stats-533819-file-fuzzing.html +CVE-2010-3486 - http://packetstormsecurity.org/1009-exploits/smartermail-traversal.txt +CVE-2010-3487 - http://packetstormsecurity.org/1009-exploits/pinky10-traversal.txt +CVE-2010-3488 - http://packetstormsecurity.org/1009-exploits/quickshare10-traversal.txt +CVE-2010-3489 - http://packetstormsecurity.org/1009-exploits/ZSL-2010-4964.txt +CVE-2010-3489 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4964.php +CVE-2010-3493 - https://bugzilla.redhat.com/show_bug.cgi?id=632200 +CVE-2010-3494 - http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY +CVE-2010-3496 - http://www.n00bz.net/antivirus-cve +CVE-2010-3497 - http://www.n00bz.net/antivirus-cve +CVE-2010-3498 - http://www.n00bz.net/antivirus-cve +CVE-2010-3499 - http://www.n00bz.net/antivirus-cve +CVE-2010-3500 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3501 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3502 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3503 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3504 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3505 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3506 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3507 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3508 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3509 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3510 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3511 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3512 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3513 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3514 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3515 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3516 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3517 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3518 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3519 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3520 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3521 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3522 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3523 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3524 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3525 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3526 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3527 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3528 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3529 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3530 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3531 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3532 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3533 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3534 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3535 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3536 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3537 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3538 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3539 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3540 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3541 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3541 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3541 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3541 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3541 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3542 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3544 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3545 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3546 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3547 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3548 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3548 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3548 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3548 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3548 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3549 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3549 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3549 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3549 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3549 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3550 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3550 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3550 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3551 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3551 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3551 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3551 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3551 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3552 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3553 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3553 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3553 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3553 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3553 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3554 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3554 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3554 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3554 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3555 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3555 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3555 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3556 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3556 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3556 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3556 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3557 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3557 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3557 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3557 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3557 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3558 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3558 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3559 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3559 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3559 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3560 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3560 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3561 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3561 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3561 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3561 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3562 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3562 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3562 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3562 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3562 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3563 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3563 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3564 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3564 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3565 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3565 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3565 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3565 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3565 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3566 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3566 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3566 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3566 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3567 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3567 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3567 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3567 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3568 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3568 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3568 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3568 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3568 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3569 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3569 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3569 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3569 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3569 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3570 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3571 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3571 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3571 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3571 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3572 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3572 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3572 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3572 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3573 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3573 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3573 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3573 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3573 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3574 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3574 - http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html +CVE-2010-3574 - http://www.redhat.com/support/errata/RHSA-2010-0865.html +CVE-2010-3574 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-3574 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3575 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3576 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3577 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3578 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3579 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3580 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3581 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3582 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3583 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3584 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3585 - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html +CVE-2010-3586 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3587 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3588 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3589 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3590 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3591 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3592 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3593 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3594 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3595 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3596 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3597 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3598 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3599 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3600 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-3601 - http://packetstormsecurity.org/1009-exploits/ibphotohost-sql.txt +CVE-2010-3602 - http://packetstormsecurity.org/1009-advisories/moaub16-mojoportal.pdf +CVE-2010-3602 - http://packetstormsecurity.org/1009-exploits/moaub-mojoportal.txt +CVE-2010-3603 - http://packetstormsecurity.org/1009-advisories/moaub16-mojoportal.pdf +CVE-2010-3603 - http://packetstormsecurity.org/1009-exploits/moaub-mojoportal.txt +CVE-2010-3608 - http://packetstormsecurity.org/1009-exploits/wpquiz27-sql.txt +CVE-2010-3654 - http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html +CVE-2010-3658 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7225 +CVE-2010-3659 - https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/ +CVE-2010-3660 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3660 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS +CVE-2010-3661 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3661 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Open_Redirection +CVE-2010-3662 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3662 - https://typo3.org/security/advisory/typo3-sa-2010-012/#SQL_Injection +CVE-2010-3663 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3663 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Arbitrary_Code_Execution +CVE-2010-3664 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3664 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Information_Disclosure +CVE-2010-3665 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3665 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS +CVE-2010-3666 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3666 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness +CVE-2010-3667 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3667 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Spam_Abuse +CVE-2010-3668 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3668 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Header_Injection +CVE-2010-3669 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3669 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS +CVE-2010-3670 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3670 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness +CVE-2010-3671 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3671 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Broken_Authentication_and_Session_Management +CVE-2010-3672 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3672 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS +CVE-2010-3673 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3673 - https://typo3.org/security/advisory/typo3-sa-2010-012/#Information_Disclosure +CVE-2010-3674 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 +CVE-2010-3674 - https://typo3.org/security/advisory/typo3-sa-2010-012/#XSS +CVE-2010-3676 - https://bugzilla.redhat.com/show_bug.cgi?id=628660 +CVE-2010-3677 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3677 - https://bugzilla.redhat.com/show_bug.cgi?id=628040 +CVE-2010-3678 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3679 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3680 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3681 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3682 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3682 - https://bugzilla.redhat.com/show_bug.cgi?id=628328 +CVE-2010-3683 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3689 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-3690 - https://issues.jasig.org/browse/PHPCAS-80 +CVE-2010-3691 - https://issues.jasig.org/browse/PHPCAS-80 +CVE-2010-3692 - https://issues.jasig.org/browse/PHPCAS-80 +CVE-2010-3695 - http://securityreason.com/securityalert/8170 +CVE-2010-3699 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3699 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3709 - http://securityreason.com/achievement_securityalert/90 +CVE-2010-3709 - http://www.exploit-db.com/exploits/15431 +CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/13/8 +CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/14/22 +CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/18/3 +CVE-2010-3712 - http://www.openwall.com/lists/oss-security/2011/03/18/5 +CVE-2010-3712 - http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.5.20%5D_cross_site_scripting(XSS) +CVE-2010-3742 - http://packetstormsecurity.org/1008-exploits/freesimplesoftware-rfi.txt +CVE-2010-3747 - http://securityreason.com/securityalert/8147 +CVE-2010-3765 - http://www.exploit-db.com/exploits/15342 +CVE-2010-3765 - http://www.ubuntu.com/usn/USN-1011-2 +CVE-2010-3765 - https://bugzilla.mozilla.org/show_bug.cgi?id=607222 +CVE-2010-3765 - https://bugzilla.mozilla.org/show_bug.cgi?id=607222#c53 +CVE-2010-3766 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3766 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3766 - https://bugzilla.mozilla.org/show_bug.cgi?id=590771 +CVE-2010-3767 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3767 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3767 - https://bugzilla.mozilla.org/show_bug.cgi?id=599468 +CVE-2010-3768 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3768 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3769 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3770 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3770 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3771 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3771 - http://www.mozilla.org/security/announce/2010/mfsa2010-76.html +CVE-2010-3771 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3772 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3772 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3772 - https://bugzilla.mozilla.org/show_bug.cgi?id=594547 +CVE-2010-3773 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3773 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3774 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3774 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3774 - https://bugzilla.mozilla.org/show_bug.cgi?id=602780 +CVE-2010-3775 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3775 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3776 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3776 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3777 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3777 - http://www.redhat.com/support/errata/RHSA-2010-0966.html +CVE-2010-3778 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html +CVE-2010-3787 - http://www.kb.cert.org/vuls/id/309873 +CVE-2010-3833 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3834 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3835 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3836 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3837 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3838 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3839 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3840 - http://www.ubuntu.com/usn/USN-1017-1 +CVE-2010-3847 - https://www.exploit-db.com/exploits/44024/ +CVE-2010-3847 - https://www.exploit-db.com/exploits/44025/ +CVE-2010-3856 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2010-3856 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html +CVE-2010-3856 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2010-3856 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2010-3856 - https://www.exploit-db.com/exploits/44025/ +CVE-2010-3858 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3858 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3858 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3859 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3859 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3861 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3861 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-3864 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html +CVE-2010-3865 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3865 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3865 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3874 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3876 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3876 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3876 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3877 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3879 - http://www.halfdog.net/Security/FuseTimerace/ +CVE-2010-3879 - https://bugs.launchpad.net/bugs/670622 +CVE-2010-3879 - https://bugzilla.redhat.com/show_bug.cgi?id=651183 +CVE-2010-3880 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-3880 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-3880 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3888 - http://www.securelist.com/en/blog/2291/Myrtus_and_Guava_Episode_MS10_061 +CVE-2010-3888 - http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities +CVE-2010-3889 - http://www.securelist.com/en/blog/2291/Myrtus_and_Guava_Episode_MS10_061 +CVE-2010-3889 - http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities +CVE-2010-3904 - http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html +CVE-2010-3904 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-3904 - https://www.exploit-db.com/exploits/44677/ +CVE-2010-3906 - http://www.exploit-db.com/exploits/15744 +CVE-2010-3908 - http://ffmpeg.mplayerhq.hu/ +CVE-2010-3909 - http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt +CVE-2010-3910 - http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt +CVE-2010-3911 - http://www.ush.it/team/ush/hack-vtigercrm_520/vtigercrm_520.txt +CVE-2010-3915 - http://www.symantec.com/connect/blogs/new-ichitaro-vulnerability-confirmed +CVE-2010-3934 - http://packetstormsecurity.org/1009-exploits/blackberry-crossorigin.txt +CVE-2010-3962 - http://www.exploit-db.com/exploits/15421 +CVE-2010-3962 - http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks +CVE-2010-3962 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 +CVE-2010-3970 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2010-3970 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-006 +CVE-2010-3971 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2010-3972 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2010-3972 - http://www.exploit-db.com/exploits/15803 +CVE-2010-3973 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2010-3973 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 +CVE-2010-3974 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-024 +CVE-2010-3976 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29 +CVE-2010-3979 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-3980 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-3981 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-3982 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-3983 - http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf +CVE-2010-4006 - http://www.exploit-db.com/exploits/15607 +CVE-2010-4020 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt +CVE-2010-4020 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2010-4020 - http://www.redhat.com/support/errata/RHSA-2010-0925.html +CVE-2010-4021 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt +CVE-2010-4051 - http://seclists.org/fulldisclosure/2011/Jan/78 +CVE-2010-4051 - http://securityreason.com/achievement_securityalert/93 +CVE-2010-4051 - http://securityreason.com/securityalert/8003 +CVE-2010-4051 - http://www.exploit-db.com/exploits/15935 +CVE-2010-4052 - http://seclists.org/fulldisclosure/2011/Jan/78 +CVE-2010-4052 - http://securityreason.com/achievement_securityalert/93 +CVE-2010-4052 - http://securityreason.com/securityalert/8003 +CVE-2010-4052 - http://www.exploit-db.com/exploits/15935 +CVE-2010-4055 - http://aluigi.altervista.org/adv/soliddb_1-adv.txt +CVE-2010-4055 - http://www.exploit-db.com/exploits/15261 +CVE-2010-4056 - http://aluigi.altervista.org/adv/soliddb_1-adv.txt +CVE-2010-4056 - http://www.exploit-db.com/exploits/15261 +CVE-2010-4057 - http://aluigi.altervista.org/adv/soliddb_1-adv.txt +CVE-2010-4057 - http://www.exploit-db.com/exploits/15261 +CVE-2010-4072 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4072 - http://www.ubuntu.com/usn/USN-1041-1 +CVE-2010-4072 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4073 - http://securityreason.com/securityalert/8366 +CVE-2010-4073 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4073 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4074 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4075 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4075 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4076 - https://bugzilla.redhat.com/show_bug.cgi?id=648661 +CVE-2010-4077 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4079 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4080 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4080 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4081 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4081 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4082 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4083 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-4083 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4083 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4093 - http://www.kb.cert.org/vuls/id/189929 +CVE-2010-4099 - http://www.exploit-db.com/exploits/15318 +CVE-2010-4107 - http://securityreason.com/securityalert/8328 +CVE-2010-4107 - http://www.exploit-db.com/exploits/15631 +CVE-2010-4142 - http://aluigi.org/adv/realwin_1-adv.txt +CVE-2010-4142 - http://www.exploit-db.com/exploits/15259 +CVE-2010-4144 - http://packetstormsecurity.org/1010-exploits/kisiselradyoscript-disclose.txt +CVE-2010-4145 - http://packetstormsecurity.org/1010-exploits/kisiselradyoscript-disclose.txt +CVE-2010-4148 - http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt +CVE-2010-4149 - http://packetstormsecurity.org/1010-exploits/freshftp-traversal.txt +CVE-2010-4151 - http://packetstormsecurity.org/1010-exploits/deluxebb13x-sql.txt +CVE-2010-4154 - http://packetstormsecurity.org/1010-exploits/ftpvoyager-traversal.txt +CVE-2010-4155 - http://www.packetstormsecurity.com/1010-exploits/exv2-xss.txt +CVE-2010-4155 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4970.php +CVE-2010-4157 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-4157 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4158 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4158 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4160 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4161 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-4161 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4162 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4163 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4165 - http://securityreason.com/securityalert/8111 +CVE-2010-4167 - http://www.imagemagick.org/script/changelog.php +CVE-2010-4167 - http://www.ubuntu.com/usn/USN-1028-1 +CVE-2010-4170 - http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html +CVE-2010-4170 - https://www.exploit-db.com/exploits/46730/ +CVE-2010-4185 - http://www.exploit-db.com/exploits/15327 +CVE-2010-4193 - http://www.kb.cert.org/vuls/id/189929 +CVE-2010-4194 - http://www.kb.cert.org/vuls/id/189929 +CVE-2010-4195 - http://www.kb.cert.org/vuls/id/189929 +CVE-2010-4196 - http://www.kb.cert.org/vuls/id/189929 +CVE-2010-4210 - https://www.exploit-db.com/exploits/15206/ +CVE-2010-4228 - http://securityreason.com/securityalert/8149 +CVE-2010-4230 - http://www.exploit-db.com/exploits/15504 +CVE-2010-4230 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt +CVE-2010-4231 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt +CVE-2010-4232 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt +CVE-2010-4233 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt +CVE-2010-4234 - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt +CVE-2010-4238 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4239 - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-lfi.txt +CVE-2010-4240 - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-xss.txt +CVE-2010-4241 - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-xsrf.txt +CVE-2010-4242 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-4242 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4242 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4243 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4247 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-4247 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4248 - http://www.redhat.com/support/errata/RHSA-2011-0004.html +CVE-2010-4248 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4248 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4249 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4249 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4251 - http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread +CVE-2010-4251 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4252 - https://bugzilla.redhat.com/show_bug.cgi?id=659297 +CVE-2010-4253 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4254 - http://www.exploit-db.com/exploits/15974 +CVE-2010-4255 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4257 - http://www.xakep.ru/magazine/xa/124/052/1.asp +CVE-2010-4258 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177 +CVE-2010-4258 - https://lkml.org/lkml/2010/12/1/543 +CVE-2010-4259 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html +CVE-2010-4259 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html +CVE-2010-4259 - http://openwall.com/lists/oss-security/2010/12/02/5 +CVE-2010-4259 - http://openwall.com/lists/oss-security/2010/12/02/8 +CVE-2010-4259 - http://www.exploit-db.com/exploits/15732 +CVE-2010-4259 - https://bugzilla.redhat.com/show_bug.cgi?id=659359 +CVE-2010-4262 - http://www.openwall.com/lists/oss-security/2010/12/03/2 +CVE-2010-4262 - http://www.openwall.com/lists/oss-security/2010/12/06/8 +CVE-2010-4262 - https://bugzilla.redhat.com/show_bug.cgi?id=659676 +CVE-2010-4263 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4263 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4268 - http://packetstormsecurity.org/1011-exploits/joomlaflipwall-sql.txt +CVE-2010-4269 - http://packetstormsecurity.org/1011-exploits/collabtive065-sql.txt +CVE-2010-4269 - http://www.exploit-db.com/exploits/15381 +CVE-2010-4272 - http://packetstormsecurity.org/1011-exploits/joomlasponsorwall-sql.txt +CVE-2010-4273 - http://packetstormsecurity.org/1010-exploits/accimoveis-sql.txt +CVE-2010-4278 - http://seclists.org/fulldisclosure/2010/Nov/326 +CVE-2010-4278 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download +CVE-2010-4278 - http://www.exploit-db.com/exploits/15640 +CVE-2010-4279 - http://packetstormsecurity.com/files/129830/Pandora-3.1-Auth-Bypass-Arbitrary-File-Upload.html +CVE-2010-4279 - http://seclists.org/fulldisclosure/2010/Nov/326 +CVE-2010-4279 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download +CVE-2010-4279 - http://www.exploit-db.com/exploits/15639 +CVE-2010-4279 - https://www.exploit-db.com/exploits/35731/ +CVE-2010-4280 - http://seclists.org/fulldisclosure/2010/Nov/326 +CVE-2010-4280 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download +CVE-2010-4280 - http://www.exploit-db.com/exploits/15641 +CVE-2010-4280 - http://www.exploit-db.com/exploits/15642 +CVE-2010-4281 - http://seclists.org/fulldisclosure/2010/Nov/326 +CVE-2010-4281 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download +CVE-2010-4281 - http://www.exploit-db.com/exploits/15643 +CVE-2010-4282 - http://seclists.org/fulldisclosure/2010/Nov/326 +CVE-2010-4282 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download +CVE-2010-4282 - http://www.exploit-db.com/exploits/15643 +CVE-2010-4283 - http://seclists.org/fulldisclosure/2010/Nov/326 +CVE-2010-4283 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download +CVE-2010-4283 - http://www.exploit-db.com/exploits/15643 +CVE-2010-4300 - http://www.exploit-db.com/exploits/15676 +CVE-2010-4301 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14713 +CVE-2010-4313 - http://www.exploit-db.com/exploits/15636 +CVE-2010-4323 - http://securityreason.com/securityalert/8092 +CVE-2010-4323 - http://securityreason.com/securityalert/8094 +CVE-2010-4328 - http://securityreason.com/securityalert/8096 +CVE-2010-4330 - http://www.exploit-db.com/exploits/15691 +CVE-2010-4331 - http://www.exploit-db.com/exploits/16000 +CVE-2010-4332 - http://www.exploit-db.com/exploits/15740 +CVE-2010-4333 - http://www.exploit-db.com/exploits/15741 +CVE-2010-4333 - http://www.securityfocus.com/archive/1/515306/100/0/threaded +CVE-2010-4335 - http://securityreason.com/securityalert/8026 +CVE-2010-4335 - http://www.exploit-db.com/exploits/16011 +CVE-2010-4343 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4344 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2010-4344 - http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ +CVE-2010-4345 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2010-4345 - http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ +CVE-2010-4346 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4346 - https://bugzilla.redhat.com/show_bug.cgi?id=662189 +CVE-2010-4348 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php +CVE-2010-4348 - https://bugzilla.redhat.com/show_bug.cgi?id=663230 +CVE-2010-4349 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php +CVE-2010-4349 - https://bugzilla.redhat.com/show_bug.cgi?id=663230 +CVE-2010-4350 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php +CVE-2010-4350 - https://bugzilla.redhat.com/show_bug.cgi?id=663230 +CVE-2010-4352 - https://bugs.freedesktop.org/show_bug.cgi?id=32321 +CVE-2010-4358 - http://evuln.com/vulns/144/summary.html +CVE-2010-4363 - http://evuln.com/vulns/146/summary.html +CVE-2010-4370 - http://forums.winamp.com/showthread.php?t=324322 +CVE-2010-4371 - http://forums.winamp.com/showthread.php?t=324322 +CVE-2010-4372 - http://forums.winamp.com/showthread.php?t=324322 +CVE-2010-4373 - http://forums.winamp.com/showthread.php?t=324322 +CVE-2010-4374 - http://forums.winamp.com/showthread.php?t=324322 +CVE-2010-4398 - http://isc.sans.edu/diary.html?storyid=9988 +CVE-2010-4398 - http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/ +CVE-2010-4398 - http://www.exploit-db.com/exploits/15609/ +CVE-2010-4399 - http://www.exploit-db.com/exploits/15646 +CVE-2010-4400 - http://www.exploit-db.com/exploits/15646 +CVE-2010-4401 - http://www.exploit-db.com/exploits/15646 +CVE-2010-4406 - http://www.exploit-db.com/exploits/15656 +CVE-2010-4407 - http://evuln.com/vulns/151/summary.html +CVE-2010-4409 - http://www.exploit-db.com/exploits/15722 +CVE-2010-4411 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-4411 - https://bugzilla.mozilla.org/show_bug.cgi?id=591165 +CVE-2010-4413 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4414 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4415 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4416 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4417 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4417 - https://www.exploit-db.com/exploits/38859/ +CVE-2010-4418 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4419 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4420 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4421 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4422 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4422 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4423 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4424 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4425 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4426 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4427 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4428 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4429 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4430 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4431 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4432 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4433 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4434 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4435 - http://securityreason.com/securityalert/8069 +CVE-2010-4435 - http://www.exploit-db.com/exploits/16137 +CVE-2010-4435 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4436 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4437 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4438 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4439 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4440 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4441 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4442 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4443 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4444 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4445 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4446 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4447 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4447 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4448 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4448 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4448 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4449 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4450 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4450 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4451 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4452 - http://securityreason.com/securityalert/8145 +CVE-2010-4452 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4452 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4452 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4453 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4454 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4454 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4454 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4455 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4456 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4457 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4458 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4459 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4460 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4461 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4462 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4462 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4462 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4463 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4463 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4464 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html +CVE-2010-4465 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4465 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4465 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4465 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14034 +CVE-2010-4466 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4466 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4467 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4467 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4468 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4468 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4468 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4469 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4470 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4470 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4471 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4471 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4471 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4472 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4472 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4473 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4473 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4473 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4474 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4475 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4475 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4476 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4476 - http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html +CVE-2010-4476 - http://www.redhat.com/support/errata/RHSA-2011-0880.html +CVE-2010-4478 - https://bugzilla.redhat.com/show_bug.cgi?id=659297 +CVE-2010-4480 - http://www.exploit-db.com/exploits/15699 +CVE-2010-4486 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11630 +CVE-2010-4508 - https://wiki.mozilla.org/Platform/2010-12-07 +CVE-2010-4512 - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz +CVE-2010-4513 - http://marc.info/?l=bugtraq&m=129182251500541&w=2 +CVE-2010-4523 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 +CVE-2010-4523 - http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html +CVE-2010-4524 - http://openwall.com/lists/oss-security/2010/12/21/4 +CVE-2010-4524 - http://openwall.com/lists/oss-security/2010/12/22/4 +CVE-2010-4524 - https://bugzilla.redhat.com/show_bug.cgi?id=664718 +CVE-2010-4525 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4526 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4538 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539 +CVE-2010-4539 - http://www.ubuntu.com/usn/USN-1053-1 +CVE-2010-4539 - https://bugzilla.redhat.com/show_bug.cgi?id=667407 +CVE-2010-4540 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 +CVE-2010-4540 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 +CVE-2010-4541 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 +CVE-2010-4541 - http://www.redhat.com/support/errata/RHSA-2011-0837.html +CVE-2010-4541 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 +CVE-2010-4542 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 +CVE-2010-4542 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 +CVE-2010-4543 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 +CVE-2010-4543 - http://www.redhat.com/support/errata/RHSA-2011-0837.html +CVE-2010-4543 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 +CVE-2010-4566 - http://securityreason.com/securityalert/8119 +CVE-2010-4567 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-4568 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-4568 - https://bugzilla.mozilla.org/show_bug.cgi?id=619594 +CVE-2010-4569 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-4570 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-4572 - http://www.bugzilla.org/security/3.2.9/ +CVE-2010-4588 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2010-4595 - http://www-01.ibm.com/support/docview.wss?uid=swg1IZ86207 +CVE-2010-4597 - http://www.exploit-db.com/exploits/15767 +CVE-2010-4603 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM22186 +CVE-2010-4604 - http://www.securityfocus.com/archive/1/515263/100/0/threaded +CVE-2010-4607 - http://www.exploit-db.com/exploits/15799 +CVE-2010-4608 - http://www.exploit-db.com/exploits/15799 +CVE-2010-4609 - http://www.exploit-db.com/exploits/15800 +CVE-2010-4610 - http://www.exploit-db.com/exploits/15800 +CVE-2010-4611 - http://www.exploit-db.com/exploits/15800 +CVE-2010-4612 - http://www.exploit-db.com/exploits/15797 +CVE-2010-4613 - http://www.exploit-db.com/exploits/15797 +CVE-2010-4614 - http://www.exploit-db.com/exploits/15769 +CVE-2010-4630 - http://packetstormsecurity.org/1011-exploits/wpsurvey-xss.txt +CVE-2010-4631 - http://packetstormsecurity.org/1011-exploits/aspilotpilotcart-sqlxssinject.txt +CVE-2010-4632 - http://packetstormsecurity.org/1011-exploits/aspilotpilotcart-sqlxssinject.txt +CVE-2010-4633 - http://packetstormsecurity.org/1011-exploits/digishop-sql.txt +CVE-2010-4634 - http://packetstormsecurity.org/1011-exploits/osticket-lfi.txt +CVE-2010-4634 - http://www.attrition.org/pipermail/vim/2010-November/002468.html +CVE-2010-4634 - http://www.attrition.org/pipermail/vim/2010-November/002469.html +CVE-2010-4635 - http://packetstormsecurity.org/1011-exploits/site2nitevr-sql.txt +CVE-2010-4637 - http://packetstormsecurity.org/1011-exploits/wpfeedlist-xss.txt +CVE-2010-4639 - http://packetstormsecurity.org/1011-exploits/mysourcematrix-sql.txt +CVE-2010-4643 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2010-4644 - http://www.ubuntu.com/usn/USN-1053-1 +CVE-2010-4647 - http://openwall.com/lists/oss-security/2011/01/06/16 +CVE-2010-4647 - http://openwall.com/lists/oss-security/2011/01/06/7 +CVE-2010-4647 - http://yehg.net/lab/pr0js/advisories/eclipse/%5Beclipse_help_server%5D_cross_site_scripting +CVE-2010-4655 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4662 - https://packetstormsecurity.com/files/cve/CVE-2010-4662 +CVE-2010-4668 - http://www.redhat.com/support/errata/RHSA-2011-0007.html +CVE-2010-4669 - http://www.youtube.com/watch?v=00yjWB6gGy8 +CVE-2010-4670 - http://www.youtube.com/watch?v=00yjWB6gGy8 +CVE-2010-4671 - http://www.youtube.com/watch?v=00yjWB6gGy8 +CVE-2010-4694 - https://bugzilla.redhat.com/show_bug.cgi?id=547515 +CVE-2010-4695 - https://bugzilla.redhat.com/show_bug.cgi?id=547515 +CVE-2010-4698 - http://seclists.org/fulldisclosure/2010/Dec/180 +CVE-2010-4701 - http://www.exploit-db.com/exploits/15839 +CVE-2010-4704 - http://ffmpeg.mplayerhq.hu/ +CVE-2010-4709 - http://www.exploit-db.com/exploits/16040 +CVE-2010-4721 - http://www.exploit-db.com/exploits/15754 +CVE-2010-4740 - http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt +CVE-2010-4740 - http://securityreason.com/securityalert/8083 +CVE-2010-4748 - http://securityreason.com/securityalert/8113 +CVE-2010-4749 - http://securityreason.com/securityalert/8112 +CVE-2010-4749 - http://www.exploit-db.com/exploits/15743 +CVE-2010-4750 - http://securityreason.com/securityalert/8112 +CVE-2010-4750 - http://www.exploit-db.com/exploits/15743 +CVE-2010-4754 - http://securityreason.com/achievement_securityalert/89 +CVE-2010-4754 - http://securityreason.com/exploitalert/9223 +CVE-2010-4754 - http://securityreason.com/securityalert/8116 +CVE-2010-4755 - http://securityreason.com/achievement_securityalert/89 +CVE-2010-4755 - http://securityreason.com/exploitalert/9223 +CVE-2010-4755 - http://securityreason.com/securityalert/8116 +CVE-2010-4756 - http://securityreason.com/achievement_securityalert/89 +CVE-2010-4756 - http://securityreason.com/exploitalert/9223 +CVE-2010-4770 - http://securityreason.com/securityalert/8159 +CVE-2010-4774 - http://www.exploit-db.com/exploits/15594 +CVE-2010-4776 - http://securityreason.com/securityalert/8158 +CVE-2010-4780 - http://securityreason.com/securityalert/8183 +CVE-2010-4780 - http://www.exploit-db.com/exploits/15645 +CVE-2010-4781 - http://securityreason.com/securityalert/8183 +CVE-2010-4781 - http://www.exploit-db.com/exploits/15645 +CVE-2010-4782 - http://securityreason.com/securityalert/8185 +CVE-2010-4783 - http://evuln.com/vulns/148/summary.html +CVE-2010-4784 - http://evuln.com/vulns/147/summary.html +CVE-2010-4784 - http://securityreason.com/securityalert/8184 +CVE-2010-4790 - http://packetstormsecurity.org/1010-exploits/filterftp-traversal.txt +CVE-2010-4791 - http://packetstormsecurity.org/1010-exploits/phpfusionmguser-sql.txt +CVE-2010-4791 - http://securityreason.com/securityalert/8219 +CVE-2010-4791 - http://www.exploit-db.com/exploits/15227 +CVE-2010-4792 - http://packetstormsecurity.org/1010-exploits/overlook-xss.txt +CVE-2010-4792 - http://securityreason.com/securityalert/8220 +CVE-2010-4793 - http://packetstormsecurity.org/1010-exploits/autoemanager-sql.txt +CVE-2010-4797 - http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt +CVE-2010-4798 - http://www.exploit-db.com/exploits/15232 +CVE-2010-4799 - http://packetstormsecurity.org/1010-exploits/chipmunkpwngame-sql.txt +CVE-2010-4800 - http://packetstormsecurity.org/1010-exploits/baconmap10-sql.txt +CVE-2010-4800 - http://securityreason.com/securityalert/8225 +CVE-2010-4800 - http://www.exploit-db.com/exploits/15233 +CVE-2010-4801 - http://packetstormsecurity.org/1010-exploits/baconmap10-lfi.txt +CVE-2010-4801 - http://securityreason.com/securityalert/8229 +CVE-2010-4801 - http://www.exploit-db.com/exploits/15234 +CVE-2010-4804 - http://www.csc.ncsu.edu/faculty/jiang/nexuss.html +CVE-2010-4805 - http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread +CVE-2010-4819 - https://bugs.freedesktop.org/show_bug.cgi?id=28801 +CVE-2010-4839 - http://www.exploit-db.com/exploits/15513 +CVE-2010-4843 - http://securityreason.com/securityalert/8395 +CVE-2010-4844 - http://securityreason.com/securityalert/8396 +CVE-2010-4844 - http://www.exploit-db.com/exploits/15755 +CVE-2010-4847 - http://securityreason.com/securityalert/8397 +CVE-2010-4847 - http://www.exploit-db.com/exploits/15756 +CVE-2010-4848 - http://evuln.com/vulns/139/summary.html +CVE-2010-4850 - http://securityreason.com/securityalert/8398 +CVE-2010-4850 - http://www.exploit-db.com/exploits/15633 +CVE-2010-4851 - http://securityreason.com/securityalert/8399 +CVE-2010-4851 - http://www.exploit-db.com/exploits/15644 +CVE-2010-4852 - http://securityreason.com/securityalert/8399 +CVE-2010-4852 - http://www.exploit-db.com/exploits/15644 +CVE-2010-4853 - http://packetstormsecurity.org/1011-exploits/joomlaccinvoices-sql.txt +CVE-2010-4855 - http://packetstormsecurity.org/1010-exploits/xweblog22-sql.txt +CVE-2010-4857 - http://packetstormsecurity.org/1010-exploits/cagcms-sqlxss.txt +CVE-2010-4857 - http://securityreason.com/securityalert/8415 +CVE-2010-4857 - http://www.exploit-db.com/exploits/15210 +CVE-2010-4858 - http://packetstormsecurity.org/1010-exploits/dnetlivestats-lfi.txt +CVE-2010-4858 - http://securityreason.com/securityalert/8417 +CVE-2010-4858 - http://www.exploit-db.com/exploits/15204 +CVE-2010-4859 - http://packetstormsecurity.org/1005-exploits/webasyst-sql.txt +CVE-2010-4860 - http://packetstormsecurity.org/1009-exploits/myphpauction-sql.txt +CVE-2010-4861 - http://packetstormsecurity.org/1009-exploits/webspell421-sql.txt +CVE-2010-4863 - http://packetstormsecurity.org/1009-exploits/getsimplecms201-xss.txt +CVE-2010-4863 - http://securityreason.com/securityalert/8420 +CVE-2010-4864 - http://packetstormsecurity.org/1010-exploits/joomlaclubmanager-sql.txt +CVE-2010-4866 - http://packetstormsecurity.org/1010-exploits/chipmunkboard13-sql.txt +CVE-2010-4866 - http://securityreason.com/securityalert/8423 +CVE-2010-4866 - http://www.exploit-db.com/exploits/15175 +CVE-2010-4868 - http://packetstormsecurity.org/1010-exploits/wagora-lfixss.txt +CVE-2010-4869 - http://www.exploit-db.com/exploits/15309 +CVE-2010-4870 - http://packetstormsecurity.org/1010-exploits/bloofoxcms-sql.txt +CVE-2010-4870 - http://securityreason.com/securityalert/8427 +CVE-2010-4870 - http://www.exploit-db.com/exploits/15328 +CVE-2010-4873 - http://packetstormsecurity.org/1011-exploits/webid085p1-xss.txt +CVE-2010-4873 - http://securityreason.com/securityalert/8429 +CVE-2010-4874 - http://packetstormsecurity.org/1010-exploits/ninkobb-xss.txt +CVE-2010-4874 - http://securityreason.com/securityalert/8430 +CVE-2010-4874 - http://www.exploit-db.com/exploits/15330 +CVE-2010-4875 - http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt +CVE-2010-4875 - http://securityreason.com/securityalert/8431 +CVE-2010-4877 - http://packetstormsecurity.org/1009-exploits/onecms-xss.txt +CVE-2010-4877 - http://securityreason.com/securityalert/8432 +CVE-2010-4880 - http://packetstormsecurity.org/1008-advisories/apphp-xssxsrf.txt +CVE-2010-4880 - http://securityreason.com/securityalert/8433 +CVE-2010-4881 - http://packetstormsecurity.org/1008-advisories/apphp-xssxsrf.txt +CVE-2010-4881 - http://securityreason.com/securityalert/8433 +CVE-2010-4882 - http://securityreason.com/securityalert/8434 +CVE-2010-4883 - http://packetstormsecurity.org/1009-exploits/modx202pl-xss.txt +CVE-2010-4883 - http://securityreason.com/securityalert/8435 +CVE-2010-4884 - http://packetstormsecurity.org/1008-exploits/hinnendahlgb-rfi.txt +CVE-2010-4884 - http://securityreason.com/securityalert/8436 +CVE-2010-4893 - http://www.exploit-db.com/exploits/14948 +CVE-2010-4894 - http://packetstormsecurity.org/1009-exploits/chillycms-sqlxss.txt +CVE-2010-4894 - http://securityreason.com/securityalert/8437 +CVE-2010-4894 - http://www.exploit-db.com/exploits/14897 +CVE-2010-4895 - http://packetstormsecurity.org/1009-exploits/chillycms-sqlxss.txt +CVE-2010-4895 - http://securityreason.com/securityalert/8437 +CVE-2010-4895 - http://www.exploit-db.com/exploits/14897 +CVE-2010-4899 - http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt +CVE-2010-4899 - http://securityreason.com/securityalert/8438 +CVE-2010-4899 - http://websecurity.com.ua/4146/ +CVE-2010-4900 - http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt +CVE-2010-4900 - http://securityreason.com/securityalert/8438 +CVE-2010-4900 - http://websecurity.com.ua/4146/ +CVE-2010-4901 - http://securityreason.com/securityalert/8439 +CVE-2010-4901 - http://www.packetstormsecurity.org/1009-advisories/ZSL-2010-4962.txt +CVE-2010-4901 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4962.php +CVE-2010-4902 - http://packetstormsecurity.org/1009-exploits/joomlaclantools-sql.txt +CVE-2010-4902 - http://securityreason.com/securityalert/8440 +CVE-2010-4903 - http://securityreason.com/securityalert/8441 +CVE-2010-4904 - http://www.exploit-db.com/exploits/14922 +CVE-2010-4906 - http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt +CVE-2010-4906 - http://securityreason.com/securityalert/8442 +CVE-2010-4907 - http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt +CVE-2010-4907 - http://securityreason.com/securityalert/8442 +CVE-2010-4908 - http://packetstormsecurity.org/0908-exploits/vsm-sql.txt +CVE-2010-4908 - http://securityreason.com/securityalert/8443 +CVE-2010-4909 - http://packetstormsecurity.org/1009-exploits/mechbunnypsr-xss.txt +CVE-2010-4909 - http://securityreason.com/securityalert/8444 +CVE-2010-4910 - http://packetstormsecurity.org/1009-exploits/coldcalendar-sql.txt +CVE-2010-4910 - http://securityreason.com/securityalert/8445 +CVE-2010-4911 - http://packetstormsecurity.org/1009-exploits/phpclassifiedsads-sql.txt +CVE-2010-4911 - http://securityreason.com/securityalert/8447 +CVE-2010-4912 - http://packetstormsecurity.org/1009-exploits/ucenter-sql.txt +CVE-2010-4912 - http://securityreason.com/securityalert/8446 +CVE-2010-4913 - http://packetstormsecurity.org/1009-exploits/coldusergroup-sql.txt +CVE-2010-4913 - http://securityreason.com/securityalert/8448 +CVE-2010-4915 - http://packetstormsecurity.org/1009-exploits/coldbookmarks-sql.txt +CVE-2010-4915 - http://securityreason.com/securityalert/8449 +CVE-2010-4915 - http://www.exploit-db.com/exploits/14933 +CVE-2010-4916 - http://packetstormsecurity.org/1009-exploits/coldusergroup-sql.txt +CVE-2010-4916 - http://securityreason.com/securityalert/8448 +CVE-2010-4917 - http://packetstormsecurity.org/1009-exploits/ablog-sql.txt +CVE-2010-4918 - http://packetstormsecurity.org/1009-exploits/ijoomlamagazine-rfi.txt +CVE-2010-4921 - http://packetstormsecurity.org/1009-exploits/dmxreadypbm-sql.txt +CVE-2010-4922 - http://securityreason.com/securityalert/8453 +CVE-2010-4923 - http://packetstormsecurity.org/0908-exploits/vbs-sql.txt +CVE-2010-4923 - http://securityreason.com/securityalert/8460 +CVE-2010-4925 - http://packetstormsecurity.org/1008-exploits/nukedklanpartenaires-sql.txt +CVE-2010-4926 - http://packetstormsecurity.org/1009-exploits/joomlatimetrack-sql.txt +CVE-2010-4927 - http://packetstormsecurity.org/1009-exploits/joomlarestaurantguide-sqlxsslfi.txt +CVE-2010-4928 - http://packetstormsecurity.org/1009-exploits/joomlarestaurantguide-sqlxsslfi.txt +CVE-2010-4930 - http://securityreason.com/securityalert/8455 +CVE-2010-4933 - http://packetstormsecurity.org/1009-exploits/geeklog138-sql.txt +CVE-2010-4936 - http://packetstormsecurity.org/1008-exploits/joomlaslideshow-sql.txt +CVE-2010-4940 - http://packetstormsecurity.org/1009-exploits/wanewsletter-sql.txt +CVE-2010-4942 - http://packetstormsecurity.org/1009-exploits/exoopportecal-sql.txt +CVE-2010-4945 - http://packetstormsecurity.org/0901-exploits/joomlacamel-sql.txt +CVE-2010-4945 - http://packetstormsecurity.org/1008-exploits/joomlacamelcitydb2-sql.txt +CVE-2010-4950 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4951 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4952 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4953 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4954 - http://packetstormsecurity.org/1009-exploits/xtcommercegambio-sql.txt +CVE-2010-4955 - http://packetstormsecurity.org/1008-exploits/apboard-sql.txt +CVE-2010-4956 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4957 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4958 - http://packetstormsecurity.org/1008-exploits/pradoportal-xss.txt +CVE-2010-4958 - http://securityreason.com/securityalert/8468 +CVE-2010-4959 - http://www.packetstormsecurity.com/1007-exploits/prepodcastportal-sql.txt +CVE-2010-4960 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4961 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4962 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/ +CVE-2010-4963 - http://packetstormsecurity.org/1008-exploits/bxr-sqlxssxsrf.txt +CVE-2010-4963 - http://securityreason.com/securityalert/8470 +CVE-2010-4968 - http://packetstormsecurity.org/1007-exploits/joomlawmtpic-sql.txt +CVE-2010-4969 - http://www.exploit-db.com/exploits/14241 +CVE-2010-4970 - http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt +CVE-2010-4970 - http://securityreason.com/securityalert/8491 +CVE-2010-4970 - http://www.exploit-db.com/exploits/14217 +CVE-2010-4971 - http://packetstormsecurity.org/1006-exploits/joomlavideowhisper-xss.txt +CVE-2010-4972 - http://packetstormsecurity.org/1006-exploits/ypnincjokescript-sql.txt +CVE-2010-4972 - http://securityreason.com/securityalert/8490 +CVE-2010-4972 - http://www.exploit-db.com/exploits/14107 +CVE-2010-4974 - http://packetstormsecurity.org/1007-exploits/bsautodealer-sql.txt +CVE-2010-4974 - http://securityreason.com/securityalert/8489 +CVE-2010-4974 - http://www.exploit-db.com/exploits/14239 +CVE-2010-4976 - http://www.packetstormsecurity.com/1006-exploits/metinfo-xss.txt +CVE-2010-4977 - http://packetstormsecurity.org/1007-exploits/joomlacanteen-lfisql.txt +CVE-2010-4978 - http://www.packetstormsecurity.com/1006-exploits/candid-sql.txt +CVE-2010-4979 - http://www.packetstormsecurity.com/1006-exploits/candid-sql.txt +CVE-2010-4980 - http://packetstormsecurity.org/1007-exploits/reservelogic-sql.txt +CVE-2010-4982 - http://www.exploit-db.com/exploits/14326 +CVE-2010-4983 - http://packetstormsecurity.org/1007-exploits/cybermatch-sql.txt +CVE-2010-4983 - http://www.salvatorefresta.net/files/adv/iScripts%20CyberMatch%201.0%20Blind%20SQL%20Injection%20Vulnerability-02072010.txt +CVE-2010-4984 - http://packetstormsecurity.org/1007-exploits/mykazaamnms-sqlxss.txt +CVE-2010-4985 - http://packetstormsecurity.org/1007-exploits/mykazaamnms-sqlxss.txt +CVE-2010-4992 - http://packetstormsecurity.org/1007-exploits/joomlapaymentsplus-sql.txt +CVE-2010-4993 - http://packetstormsecurity.org/1007-exploits/joomlaeventcal-sql.txt +CVE-2010-4994 - http://packetstormsecurity.org/1007-exploits/joomlajobspro-sql.txt +CVE-2010-4995 - http://packetstormsecurity.org/1007-exploits/joomlaneorecruit-sql.txt +CVE-2010-4998 - http://packetstormsecurity.org/1006-exploits/ardeacore-rfi.txt +CVE-2010-4998 - http://securityreason.com/securityalert/8503 +CVE-2010-4998 - http://www.exploit-db.com/exploits/13832/ +CVE-2010-5000 - http://packetstormsecurity.org/1006-exploits/mcloginsystem-sql.txt +CVE-2010-5002 - http://packetstormsecurity.org/1007-exploits/exponentcms-xss.txt +CVE-2010-5002 - http://securityreason.com/securityalert/8485 +CVE-2010-5003 - http://packetstormsecurity.org/1007-exploits/joomlaautartimonial-sql.txt +CVE-2010-5006 - http://packetstormsecurity.org/1006-exploits/emorealtymanager-sql.txt +CVE-2010-5007 - http://packetstormsecurity.org/1006-exploits/utstats-sqlxss.txt +CVE-2010-5008 - http://packetstormsecurity.org/1006-exploits/brightsuite-sql.txt +CVE-2010-5009 - http://packetstormsecurity.org/1006-exploits/utstats-sqlxss.txt +CVE-2010-5010 - http://packetstormsecurity.org/1006-exploits/schoolmation-sqlxss.txt +CVE-2010-5011 - http://packetstormsecurity.org/1006-exploits/schoolmation-sqlxss.txt +CVE-2010-5012 - http://packetstormsecurity.org/1006-exploits/dalogin-sqlxssdisclose.txt +CVE-2010-5013 - http://packetstormsecurity.org/1006-exploits/virtualrealestate-sql.txt +CVE-2010-5015 - http://www.packetstormsecurity.com/1006-exploits/2daybiz-sqlxss.txt +CVE-2010-5017 - http://www.exploit-db.com/exploits/10978 +CVE-2010-5018 - http://packetstormsecurity.org/1006-exploits/2daybizocs-sqlxss.txt +CVE-2010-5019 - http://packetstormsecurity.org/1006-exploits/2daybizocs-sqlxss.txt +CVE-2010-5021 - http://packetstormsecurity.org/1006-exploits/digitalinterchangelibrary-sql.txt +CVE-2010-5023 - http://packetstormsecurity.org/1006-exploits/digitalinterchange-sql.txt +CVE-2010-5024 - http://packetstormsecurity.org/1006-exploits/cutesitecms-sql.txt +CVE-2010-5024 - http://securityreason.com/securityalert/8515 +CVE-2010-5025 - http://packetstormsecurity.org/1006-exploits/cutesitecms-xss.txt +CVE-2010-5025 - http://securityreason.com/securityalert/8514 +CVE-2010-5026 - http://packetstormsecurity.org/1006-exploits/fairinabox-sqlxss.txt +CVE-2010-5027 - http://packetstormsecurity.org/1006-exploits/fairinabox-sqlxss.txt +CVE-2010-5029 - http://packetstormsecurity.org/1006-exploits/ecomatcms-sql.txt +CVE-2010-5029 - http://securityreason.com/securityalert/8518 +CVE-2010-5030 - http://packetstormsecurity.org/1006-exploits/ecomatcms-xss.txt +CVE-2010-5030 - http://securityreason.com/securityalert/8517 +CVE-2010-5031 - http://packetstormsecurity.org/1006-exploits/filenicescript-xss.txt +CVE-2010-5032 - http://packetstormsecurity.org/1005-exploits/joomla_com_bfquiz_sploit.py.txt +CVE-2010-5032 - http://www.packetstormsecurity.org/1005-exploits/joomlabfquiz-sql.txt +CVE-2010-5033 - http://packetstormsecurity.org/1005-exploits/fusebox-sql.txt +CVE-2010-5033 - http://securityreason.com/securityalert/8520 +CVE-2010-5033 - http://www.exploit-db.com/exploits/12786 +CVE-2010-5034 - http://packetstormsecurity.org/1006-exploits/iscriptseasybiller-sql.txt +CVE-2010-5035 - http://packetstormsecurity.org/1006-exploits/iscriptsewap-sqlxss.txt +CVE-2010-5036 - http://packetstormsecurity.org/1006-exploits/iscriptsewap-sqlxss.txt +CVE-2010-5037 - http://packetstormsecurity.org/1006-exploits/commonsensecms-sql.txt +CVE-2010-5038 - http://packetstormsecurity.org/1005-exploits/groonescf-rfi.txt +CVE-2010-5040 - http://www.exploit-db.com/exploits/12787/ +CVE-2010-5041 - http://www.exploit-db.com/exploits/12787/ +CVE-2010-5046 - http://packetstormsecurity.org/1005-exploits/ecocms-xss.txt +CVE-2010-5047 - http://packetstormsecurity.org/1005-exploits/pressrelease-sql.txt +CVE-2010-5048 - http://packetstormsecurity.org/1005-exploits/joomlajcomments-xss.txt +CVE-2010-5049 - http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt +CVE-2010-5053 - http://packetstormsecurity.org/1004-exploits/joomlaxobbix-sql.txt +CVE-2010-5053 - http://www.exploit-db.com/exploits/12097 +CVE-2010-5055 - http://packetstormsecurity.org/1004-exploits/almnrzm-sql.txt +CVE-2010-5056 - http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt +CVE-2010-5057 - http://packetstormsecurity.org/1004-exploits/cmsariadna-sql.txt +CVE-2010-5059 - http://packetstormsecurity.org/1004-exploits/cmscout-sql.txt +CVE-2010-5060 - http://packetstormsecurity.org/1003-exploits/nusnewssystem-sql.txt +CVE-2010-5061 - http://packetstormsecurity.org/1003-exploits/rsstatic-sql.txt +CVE-2010-5062 - http://packetstormsecurity.org/1003-exploits/mhproducts-sql.txt +CVE-2010-5063 - http://seclists.org/fulldisclosure/2010/Aug/235 +CVE-2010-5064 - http://seclists.org/fulldisclosure/2010/Aug/235 +CVE-2010-5065 - http://seclists.org/fulldisclosure/2010/Aug/235 +CVE-2010-5066 - http://seclists.org/fulldisclosure/2010/Aug/235 +CVE-2010-5067 - http://seclists.org/fulldisclosure/2010/Aug/235 +CVE-2010-5074 - http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ +CVE-2010-5082 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-012 +CVE-2010-5083 - http://www.exploit-db.com/exploits/14589 +CVE-2010-5085 - http://marc.info/?l=bugtraq&m=128104795219200&w=2 +CVE-2010-5086 - http://cross-site-scripting.blogspot.com/2010/07/bit-weaver-27-local-file-inclusion.html +CVE-2010-5091 - http://dl.packetstormsecurity.net/1006-exploits/silverstripe-shell.txt +CVE-2010-5107 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2010-5107 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2010-5144 - http://mrhinkydink.blogspot.com/2010/05/websense-633-via-bypass.html +CVE-2010-5150 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5150 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5151 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5151 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5152 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5152 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5153 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5153 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5154 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5154 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5155 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5155 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5156 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5156 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5157 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5157 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5158 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5158 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5159 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5159 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5160 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5160 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5161 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5161 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5162 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5162 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5163 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5163 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5164 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5164 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5165 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5165 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5166 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5166 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5167 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5167 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5168 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5168 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5169 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5169 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5170 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5170 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5171 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5171 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5172 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5172 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5173 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5173 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5174 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5174 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5175 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5175 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5176 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5176 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5177 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5177 - http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-earth-shaker/ +CVE-2010-5177 - http://nakedsecurity.sophos.com/2010/05/11/khobe-vulnerability-game-security-software/ +CVE-2010-5177 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5178 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5178 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5179 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5179 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5180 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5180 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5181 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5181 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5182 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5182 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5183 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5183 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5184 - http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ +CVE-2010-5184 - http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ +CVE-2010-5204 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bibm_lotus_symphony%5D_3-beta-4_insecure_dll_hijacking +CVE-2010-5205 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Be-press-one_office%5D_insecure_dll_hijacking +CVE-2010-5206 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Be-press-one_office%5D_insecure_dll_hijacking +CVE-2010-5207 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bcelframe_office%5D_2008_insecure_dll_hijacking +CVE-2010-5208 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bkingsoft_office%5D_2010_insecure_dll_hijacking +CVE-2010-5209 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bnuance_pdf_reader%5D_6.0_insecure_dll_hijacking +CVE-2010-5211 - http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Balsee%5D_6.20.0.1_insecure_dll_hijacking +CVE-2010-5218 - http://packetstormsecurity.org/1010-exploits/dupehunter-dllhijack.txt +CVE-2010-5219 - http://packetstormsecurity.org/1010-exploits/smartftp4-dllhijack.txt +CVE-2010-5220 - http://packetstormsecurity.org/1010-exploits/meo-dllhijack.txt +CVE-2010-5221 - http://packetstormsecurity.org/1010-exploits/stdu-dllhijack.txt +CVE-2010-5223 - http://packetstormsecurity.org/1010-exploits/phoenix-dllhijack.txt +CVE-2010-5224 - http://packetstormsecurity.org/1010-exploits/cooliphoneringtone-dllhijack.txt +CVE-2010-5225 - http://xlocux.wordpress.com/2010/11/22/babylon-pro-8-xx-dll-hijacking/ +CVE-2010-5231 - http://secunia.com/blog/120 +CVE-2010-5232 - http://secunia.com/blog/120 +CVE-2010-5237 - http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html +CVE-2010-5238 - http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html +CVE-2010-5240 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4953.php +CVE-2010-5240 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4954.php +CVE-2010-5243 - http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html +CVE-2010-5263 - http://packetstormsecurity.org/1009-exploits/sothinkswf-dllhijack.txt +CVE-2010-5264 - http://packetstormsecurity.org/1009-exploits/yloader-dllhijack.txt +CVE-2010-5265 - http://packetstormsecurity.org/1009-exploits/smartsniff-dllhijack.txt +CVE-2010-5266 - http://packetstormsecurity.org/1009-exploits/videocharge-dllhijack.txt +CVE-2010-5267 - http://packetstormsecurity.org/1009-exploits/seasyofficerecovery-dllhijack.txt +CVE-2010-5268 - http://www.coresecurity.com/content/amazon-kindle-for-pc-wintab32-dll-hijacking-exploit-10-5 +CVE-2010-5278 - http://packetstormsecurity.org/1009-exploits/modx202pl-lfi.txt +CVE-2010-5279 - http://seclists.org/fulldisclosure/2010/Aug/235 +CVE-2010-5280 - http://packetstormsecurity.org/1010-exploits/joomlacbe-lfi.txt +CVE-2010-5280 - http://www.exploit-db.com/exploits/15222 +CVE-2010-5281 - http://packetstormsecurity.org/1009-exploits/cmscout209-lfi.txt +CVE-2010-5282 - http://packetstormsecurity.org/1009-exploits/opentext-xsrfxss.txt +CVE-2010-5283 - http://packetstormsecurity.org/1009-exploits/opentext-xsrfxss.txt +CVE-2010-5284 - http://packetstormsecurity.org/1010-exploits/collabtive-xssxsrf.txt +CVE-2010-5284 - http://www.exploit-db.com/exploits/15240 +CVE-2010-5285 - http://packetstormsecurity.org/1010-exploits/collabtive-xssxsrf.txt +CVE-2010-5285 - http://www.exploit-db.com/exploits/15240 +CVE-2010-5286 - http://packetstormsecurity.org/1010-exploits/joomlajstore-lfi.txt +CVE-2010-5289 - http://www.exploit-db.com/exploits/12030/ +CVE-2010-5290 - http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/ +CVE-2010-5298 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2010-5298 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2010-5298 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2010-5298 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2010-5298 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html +CVE-2010-5298 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2010-5298 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2010-5299 - http://packetstormsecurity.com/files/125723/MicroP-0.1.1.1600-Buffer-Overflow.html +CVE-2010-5300 - http://packetstormsecurity.com/files/126216/Jzip-2.0.0.132900-Buffer-Overflow.html +CVE-2010-5300 - http://seclists.org/fulldisclosure/2010/Apr/79 +CVE-2010-5300 - http://www.exploit-db.com/exploits/32899 +CVE-2010-5312 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2010-5312 - https://www.drupal.org/sa-core-2022-002 +CVE-2010-5313 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2010-5313 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2010-5313 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2010-5322 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html +CVE-2010-5322 - https://github.com/ZeusCart/zeuscart/issues/28 +CVE-2010-5324 - http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html +CVE-2010-5325 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2010-5327 - https://issues.liferay.com/browse/LPE-14964 +CVE-2010-5327 - https://issues.liferay.com/browse/LPS-64547 +CVE-2010-5327 - https://issues.liferay.com/browse/LPS-7087 +CVE-2010-5329 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc0a80798576f80ca10b3f6c9c7097f12fd1d64e +CVE-2010-5330 - https://www.exploit-db.com/exploits/14146 +CVE-2010-5333 - https://www.exploit-db.com/exploits/14941 +CVE-2010-5333 - https://www.exploit-db.com/exploits/15016 +CVE-2010-5334 - https://vuldb.com/?id.142994 +CVE-2010-5335 - https://vuldb.com/?id.142994 +CVE-2010-5336 - https://vuldb.com/?id.142993 +CVE-2010-5337 - https://vuldb.com/?id.142993 +CVE-2010-5338 - https://vuldb.com/?id.142993 +CVE-2010-5339 - https://vuldb.com/?id.142993 +CVE-2010-5340 - https://vuldb.com/?id.142993 +CVE-2011-0004 - http://openwall.com/lists/oss-security/2011/01/06/1 +CVE-2011-0013 - http://securityreason.com/securityalert/8093 +CVE-2011-0020 - https://bugzilla.redhat.com/show_bug.cgi?id=671122 +CVE-2011-0027 - http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow/ +CVE-2011-0028 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-033 +CVE-2011-0032 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015 +CVE-2011-0041 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-029 +CVE-2011-0042 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015 +CVE-2011-0043 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013 +CVE-2011-0045 - http://securityreason.com/securityalert/8110 +CVE-2011-0046 - http://www.bugzilla.org/security/3.2.9/ +CVE-2011-0046 - https://bugzilla.mozilla.org/show_bug.cgi?id=621090 +CVE-2011-0048 - http://www.bugzilla.org/security/3.2.9/ +CVE-2011-0049 - http://securityreason.com/securityalert/8061 +CVE-2011-0049 - http://www.exploit-db.com/exploits/16103 +CVE-2011-0050 - http://securityreason.com/securityalert/8097 +CVE-2011-0051 - https://bugzilla.mozilla.org/show_bug.cgi?id=616659 +CVE-2011-0054 - https://bugzilla.mozilla.org/show_bug.cgi?id=615657 +CVE-2011-0055 - https://bugzilla.mozilla.org/show_bug.cgi?id=616009 +CVE-2011-0056 - https://bugzilla.mozilla.org/show_bug.cgi?id=622015 +CVE-2011-0057 - https://bugzilla.mozilla.org/show_bug.cgi?id=626631 +CVE-2011-0063 - http://securityreason.com/securityalert/8133 +CVE-2011-0063 - http://sotiriu.de/adv/NSOADV-2011-003.txt +CVE-2011-0064 - https://bugzilla.mozilla.org/show_bug.cgi?id=606997 +CVE-2011-0065 - http://securityreason.com/securityalert/8326 +CVE-2011-0065 - http://securityreason.com/securityalert/8331 +CVE-2011-0070 - https://bugzilla.mozilla.org/show_bug.cgi?id=645565 +CVE-2011-0071 - https://bugzilla.mozilla.org/show_bug.cgi?id=624764 +CVE-2011-0073 - https://bugzilla.mozilla.org/show_bug.cgi?id=630919 +CVE-2011-0075 - https://bugzilla.mozilla.org/show_bug.cgi?id=635977 +CVE-2011-0076 - https://bugzilla.mozilla.org/show_bug.cgi?id=634724 +CVE-2011-0077 - https://bugzilla.mozilla.org/show_bug.cgi?id=623998 +CVE-2011-0078 - https://bugzilla.mozilla.org/show_bug.cgi?id=635705 +CVE-2011-0083 - https://bugzilla.mozilla.org/show_bug.cgi?id=648090 +CVE-2011-0084 - https://bugzilla.mozilla.org/show_bug.cgi?id=648094 +CVE-2011-0085 - https://bugzilla.mozilla.org/show_bug.cgi?id=648100 +CVE-2011-0091 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013 +CVE-2011-0096 - http://blogs.technet.com/b/msrc/archive/2011/01/28/microsoft-releases-security-advisory-2501696.aspx +CVE-2011-0096 - http://www.exploit-db.com/exploits/16071 +CVE-2011-0107 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 +CVE-2011-0182 - http://securityreason.com/securityalert/8402 +CVE-2011-0222 - http://securityreason.com/securityalert/8313 +CVE-2011-0226 - http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html +CVE-2011-0228 - http://securityreason.com/securityalert/8361 +CVE-2011-0257 - http://securityreason.com/securityalert/8365 +CVE-2011-0258 - http://securityreason.com/securityalert/8368 +CVE-2011-0266 - http://securityreason.com/securityalert/8151 +CVE-2011-0267 - http://securityreason.com/securityalert/8156 +CVE-2011-0281 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-0282 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-0284 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt +CVE-2011-0285 - http://securityreason.com/securityalert/8200 +CVE-2011-0285 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt +CVE-2011-0322 - http://securityreason.com/securityalert/8142 +CVE-2011-0342 - http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02 +CVE-2011-0346 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2011-0347 - http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx +CVE-2011-0355 - http://securityreason.com/securityalert/8090 +CVE-2011-0364 - http://securityreason.com/securityalert/8095 +CVE-2011-0379 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0382 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0383 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0385 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0386 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0388 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0391 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0392 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml +CVE-2011-0406 - http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html +CVE-2011-0406 - http://www.exploit-db.com/exploits/15957 +CVE-2011-0411 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0412 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0418 - http://securityreason.com/achievement_securityalert/97 +CVE-2011-0418 - http://securityreason.com/securityalert/8228 +CVE-2011-0419 - http://securityreason.com/achievement_securityalert/98 +CVE-2011-0419 - http://securityreason.com/securityalert/8246 +CVE-2011-0419 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-0419 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2011-0420 - http://securityreason.com/achievement_securityalert/94 +CVE-2011-0420 - http://securityreason.com/securityalert/8087 +CVE-2011-0420 - http://www.exploit-db.com/exploits/16182 +CVE-2011-0421 - http://securityreason.com/securityalert/8146 +CVE-2011-0421 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-0469 - https://bugzilla.suse.com/show_bug.cgi?id=679325 +CVE-2011-0471 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64662 +CVE-2011-0480 - http://ffmpeg.mplayerhq.hu/ +CVE-2011-0500 - http://www.exploit-db.com/exploits/15936 +CVE-2011-0501 - http://www.exploit-db.com/exploits/15901 +CVE-2011-0502 - http://www.exploit-db.com/exploits/15897 +CVE-2011-0503 - http://www.exploit-db.com/exploits/15968 +CVE-2011-0504 - http://www.exploit-db.com/exploits/15968 +CVE-2011-0509 - http://dev.vaadin.com/ticket/6257 +CVE-2011-0510 - http://www.exploit-db.com/exploits/16003 +CVE-2011-0512 - http://www.exploit-db.com/exploits/16004 +CVE-2011-0514 - http://www.exploit-db.com/exploits/15940 +CVE-2011-0521 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-0522 - http://securityreason.com/securityalert/8064 +CVE-2011-0522 - http://www.exploit-db.com/exploits/16108 +CVE-2011-0525 - https://packetstormsecurity.com/files/cve/CVE-2011-0525 +CVE-2011-0526 - http://openwall.com/lists/oss-security/2011/01/27/2 +CVE-2011-0526 - http://openwall.com/lists/oss-security/2011/01/27/5 +CVE-2011-0526 - http://yehg.net/lab/pr0js/advisories/%5Bvanilla_forums-2.0.16%5D_cross_site_scripting +CVE-2011-0531 - http://www.openwall.com/lists/oss-security/2011/01/31/4 +CVE-2011-0531 - http://www.openwall.com/lists/oss-security/2011/01/31/8 +CVE-2011-0533 - http://securityreason.com/securityalert/8091 +CVE-2011-0535 - http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html +CVE-2011-0535 - http://openwall.com/lists/oss-security/2011/02/01/1 +CVE-2011-0535 - http://openwall.com/lists/oss-security/2011/02/03/1 +CVE-2011-0535 - http://seclists.org/fulldisclosure/2011/Feb/0 +CVE-2011-0535 - http://securityreason.com/securityalert/8067 +CVE-2011-0536 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-0545 - http://sotiriu.de/adv/NSOADV-2011-001.txt +CVE-2011-0546 - http://securityreason.com/securityalert/8300 +CVE-2011-0560 - http://www.kb.cert.org/vuls/id/812969 +CVE-2011-0561 - http://www.kb.cert.org/vuls/id/812969 +CVE-2011-0562 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0563 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0565 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0566 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0567 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0585 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0586 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0587 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0589 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0590 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0591 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0592 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0593 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0594 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0595 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0596 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0598 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0599 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0600 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0602 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0603 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0604 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0606 - http://www.redhat.com/support/errata/RHSA-2011-0301.html +CVE-2011-0609 - http://securityreason.com/securityalert/8152 +CVE-2011-0611 - http://secunia.com/blog/210/ +CVE-2011-0614 - http://securityreason.com/securityalert/8253 +CVE-2011-0614 - http://www.exploit-db.com/exploits/17278/ +CVE-2011-0614 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5012.php +CVE-2011-0635 - http://www.exploit-db.com/exploits/16016 +CVE-2011-0636 - http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7677-1391+00.htm +CVE-2011-0636 - http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7681-487+00.htm +CVE-2011-0653 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 +CVE-2011-0654 - http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx +CVE-2011-0694 - http://securityreason.com/securityalert/8098 +CVE-2011-0696 - http://www.djangoproject.com/weblog/2011/feb/08/security/ +CVE-2011-0696 - https://bugzilla.redhat.com/show_bug.cgi?id=676357 +CVE-2011-0697 - http://www.djangoproject.com/weblog/2011/feb/08/security/ +CVE-2011-0698 - http://www.djangoproject.com/weblog/2011/feb/08/security/ +CVE-2011-0708 - http://bugs.php.net/bug.php?id=54002 +CVE-2011-0708 - http://openwall.com/lists/oss-security/2011/02/14/1 +CVE-2011-0708 - http://openwall.com/lists/oss-security/2011/02/16/7 +CVE-2011-0708 - http://securityreason.com/securityalert/8114 +CVE-2011-0708 - http://www.exploit-db.com/exploits/16261/ +CVE-2011-0708 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-0710 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-0722 - http://ffmpeg.mplayerhq.hu/ +CVE-2011-0723 - http://ffmpeg.mplayerhq.hu/ +CVE-2011-0725 - https://bugs.launchpad.net/bugs/722228 +CVE-2011-0727 - http://www.ubuntu.com/usn/USN-1099-1 +CVE-2011-0740 - http://www.autosectools.com/Advisories/WordPress.RSS.Feed.Reader.for.WordPress.0.1_Reflected.Cross-site.Scripting_82.html +CVE-2011-0742 - http://telussecuritylabs.com/threats/show/FSC20110125-06 +CVE-2011-0745 - http://securityreason.com/securityalert/8141 +CVE-2011-0745 - http://www.redteam-pentesting.de/advisories/rt-sa-2011-002 +CVE-2011-0751 - http://securityreason.com/securityalert/8140 +CVE-2011-0751 - http://www.redteam-pentesting.de/advisories/rt-sa-2011-001 +CVE-2011-0761 - http://securityreason.com/securityalert/8248 +CVE-2011-0761 - http://www.toucan-system.com/advisories/tssa-2011-03.txt +CVE-2011-0762 - http://securityreason.com/achievement_securityalert/95 +CVE-2011-0762 - http://securityreason.com/securityalert/8109 +CVE-2011-0762 - http://www.exploit-db.com/exploits/16270 +CVE-2011-0764 - http://securityreason.com/securityalert/8171 +CVE-2011-0764 - http://www.toucan-system.com/advisories/tssa-2011-01.txt +CVE-2011-0772 - http://securityreason.com/securityalert/8062 +CVE-2011-0773 - http://securityreason.com/securityalert/8063 +CVE-2011-0773 - http://www.autosectools.com/Advisories/PivotX.2.2.2_Reflected.Cross-site.Scripting_76.html +CVE-2011-0785 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0786 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0786 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0787 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0788 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0788 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0789 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0790 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0791 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0792 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0793 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0794 - http://www.kb.cert.org/vuls/id/520721 +CVE-2011-0794 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0795 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0796 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0797 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0798 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0799 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0800 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0801 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0802 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0802 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0802 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0803 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0804 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0805 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0806 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0807 - http://securityreason.com/securityalert/8327 +CVE-2011-0807 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0808 - http://www.kb.cert.org/vuls/id/520721 +CVE-2011-0808 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0809 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0810 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0811 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0812 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0813 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0814 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0814 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0814 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0815 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0815 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0815 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0816 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0817 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0817 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0818 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0819 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0820 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0821 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0822 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0823 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0824 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0825 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0826 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0827 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0828 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0829 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0830 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0831 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0832 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0833 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0834 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0835 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0836 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0837 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0838 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0839 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0840 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0841 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0843 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0844 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0845 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0846 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0847 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0848 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0849 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0850 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0851 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0852 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0853 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0854 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0855 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0856 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0857 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0858 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0859 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0860 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0861 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html +CVE-2011-0862 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0862 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0862 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0863 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0863 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0864 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0864 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0865 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0865 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0865 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0866 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0866 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0866 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0867 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0867 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0867 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0868 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0868 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0868 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0869 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0869 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0869 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0870 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0871 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0871 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0871 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0872 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0872 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0872 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0873 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-0873 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0873 - http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html +CVE-2011-0875 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0876 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0877 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0879 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0880 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0881 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0882 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0883 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0884 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-0885 - http://seclists.org/bugtraq/2011/Feb/36 +CVE-2011-0885 - http://securityreason.com/securityalert/8066 +CVE-2011-0885 - http://www.exploit-db.com/exploits/16123/ +CVE-2011-0886 - http://seclists.org/bugtraq/2011/Feb/36 +CVE-2011-0886 - http://securityreason.com/securityalert/8068 +CVE-2011-0886 - http://www.exploit-db.com/exploits/16123/ +CVE-2011-0887 - http://seclists.org/bugtraq/2011/Feb/36 +CVE-2011-0887 - http://securityreason.com/securityalert/8068 +CVE-2011-0887 - http://www.exploit-db.com/exploits/16123/ +CVE-2011-0895 - http://securityreason.com/securityalert/8186 +CVE-2011-0904 - https://bugzilla.gnome.org/show_bug.cgi?id=641802 +CVE-2011-0908 - http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 +CVE-2011-0909 - http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 +CVE-2011-0910 - http://www.vanillaforums.org/discussion/comment/134729/#Comment_134729 +CVE-2011-0923 - http://securityreason.com/securityalert/8261 +CVE-2011-0923 - http://securityreason.com/securityalert/8323 +CVE-2011-0923 - http://securityreason.com/securityalert/8329 +CVE-2011-0975 - https://exchange.xforce.ibmcloud.com/vulnerabilities/65135 +CVE-2011-0977 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 +CVE-2011-0978 - http://securityreason.com/securityalert/8231 +CVE-2011-0997 - https://www.exploit-db.com/exploits/37623/ +CVE-2011-10005 - https://vuldb.com/?id.250716 +CVE-2011-10005 - https://www.exploit-db.com/exploits/17354 +CVE-2011-1007 - https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4 +CVE-2011-1009 - https://www.openwall.com/lists/oss-security/2011/02/22/14 +CVE-2011-1010 - http://securityreason.com/securityalert/8115 +CVE-2011-1010 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1012 - http://securityreason.com/securityalert/8115 +CVE-2011-1017 - http://securityreason.com/securityalert/8115 +CVE-2011-1047 - http://securityreason.com/securityalert/8099 +CVE-2011-1049 - https://www.hex-rays.com/vulnfix.shtml +CVE-2011-1050 - https://www.hex-rays.com/vulnfix.shtml +CVE-2011-1051 - https://www.hex-rays.com/vulnfix.shtml +CVE-2011-1052 - https://www.hex-rays.com/vulnfix.shtml +CVE-2011-1053 - https://www.hex-rays.com/vulnfix.shtml +CVE-2011-1054 - https://www.hex-rays.com/vulnfix.shtml +CVE-2011-1055 - http://www.exploit-db.com/exploits/16171 +CVE-2011-1060 - http://evuln.com/vulns/174/summary.html +CVE-2011-1060 - http://securityreason.com/securityalert/8101 +CVE-2011-1061 - http://evuln.com/vulns/175/summary.html +CVE-2011-1061 - http://securityreason.com/securityalert/8102 +CVE-2011-1062 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4990.php +CVE-2011-1063 - http://securityreason.com/securityalert/8103 +CVE-2011-1069 - https://www.openwall.com/lists/oss-security/2011/02/28/9 +CVE-2011-1071 - http://bugs.debian.org/615120 +CVE-2011-1071 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1073 - http://securityreason.com/securityalert/8117 +CVE-2011-1074 - http://securityreason.com/securityalert/8117 +CVE-2011-1079 - http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html +CVE-2011-1086 - https://www.exploit-db.com/exploits/35125 +CVE-2011-1087 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4931.php +CVE-2011-1090 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1092 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1095 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1096 - http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts +CVE-2011-1099 - http://securityreason.com/securityalert/8121 +CVE-2011-1099 - http://www.exploit-db.com/exploits/16933 +CVE-2011-1100 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4992.php +CVE-2011-1127 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip +CVE-2011-1128 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip +CVE-2011-1129 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip +CVE-2011-1130 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip +CVE-2011-1131 - http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip +CVE-2011-1137 - http://www.exploit-db.com/exploits/16129/ +CVE-2011-1141 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5732 +CVE-2011-1150 - https://www.openwall.com/lists/oss-security/2011/03/14/20 +CVE-2011-1151 - https://packetstormsecurity.com/files/101835/Joomla-1.6.0-SQL-Injection.html +CVE-2011-1151 - https://www.openwall.com/lists/oss-security/2011/03/14/21 +CVE-2011-1153 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1163 - http://securityreason.com/securityalert/8189 +CVE-2011-1170 - http://securityreason.com/securityalert/8278 +CVE-2011-1171 - http://securityreason.com/securityalert/8278 +CVE-2011-1172 - http://securityreason.com/securityalert/8278 +CVE-2011-1173 - http://securityreason.com/securityalert/8279 +CVE-2011-1178 - http://www.redhat.com/support/errata/RHSA-2011-0837.html +CVE-2011-1183 - http://securityreason.com/securityalert/8187 +CVE-2011-1206 - http://securityreason.com/securityalert/8213 +CVE-2011-1213 - http://securityreason.com/securityalert/8285 +CVE-2011-1220 - http://www.securityfocus.com/archive/1/518199/100/0/threaded +CVE-2011-1243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-027 +CVE-2011-1249 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-046 +CVE-2011-1249 - https://www.exploit-db.com/exploits/40564/ +CVE-2011-1252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 +CVE-2011-1257 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1260 - http://securityreason.com/securityalert/8275 +CVE-2011-1276 - http://securityreason.com/securityalert/8330 +CVE-2011-1331 - http://www.symantec.com/connect/blogs/targeted-attacks-2011-using-ichitaro-zero-day-vulnerability +CVE-2011-1345 - https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011 +CVE-2011-1346 - https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011 +CVE-2011-1347 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1347 - https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011 +CVE-2011-1407 - http://www.ubuntu.com/usn/USN-1135-1 +CVE-2011-1411 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2011-1412 - http://securityreason.com/securityalert/8324 +CVE-2011-1428 - http://savannah.nongnu.org/patch/index.php?7459 +CVE-2011-1429 - http://securityreason.com/securityalert/8143 +CVE-2011-1431 - http://securityreason.com/securityalert/8144 +CVE-2011-1464 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1466 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1467 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1469 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1470 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1471 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 +CVE-2011-1473 - http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html +CVE-2011-1473 - http://www.ietf.org/mail-archive/web/tls/current/msg07553.html +CVE-2011-1474 - http://seclists.org/oss-sec/2011/q1/579 +CVE-2011-1475 - http://securityreason.com/securityalert/8188 +CVE-2011-1478 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1480 - http://www.openwall.com/lists/oss-security/2011/03/23/7 +CVE-2011-1480 - http://www.openwall.com/lists/oss-security/2011/03/30/6 +CVE-2011-1481 - http://www.openwall.com/lists/oss-security/2011/03/23/8 +CVE-2011-1481 - http://www.openwall.com/lists/oss-security/2011/03/30/7 +CVE-2011-1482 - http://www.openwall.com/lists/oss-security/2011/03/23/9 +CVE-2011-1482 - http://www.openwall.com/lists/oss-security/2011/03/30/8 +CVE-2011-1487 - https://bugzilla.redhat.com/show_bug.cgi?id=692898 +CVE-2011-1488 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488 +CVE-2011-1489 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 +CVE-2011-1490 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 +CVE-2011-1494 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1495 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1502 - http://issues.liferay.com/browse/LPS-14927 +CVE-2011-1503 - http://issues.liferay.com/browse/LPS-13762 +CVE-2011-1503 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 +CVE-2011-1504 - http://issues.liferay.com/browse/LPS-11506 +CVE-2011-1504 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 +CVE-2011-1508 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 +CVE-2011-1509 - http://securityreason.com/securityalert/8385 +CVE-2011-1510 - http://securityreason.com/securityalert/8385 +CVE-2011-1511 - http://securityreason.com/securityalert/8254 +CVE-2011-1511 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-1512 - http://securityreason.com/securityalert/8263 +CVE-2011-1516 - http://www.coresecurity.com/content/apple-osx-sandbox-bypass +CVE-2011-1523 - http://openwall.com/lists/oss-security/2011/03/25/3 +CVE-2011-1523 - https://bugzilla.redhat.com/show_bug.cgi?id=690877 +CVE-2011-1524 - http://securityreason.com/securityalert/8166 +CVE-2011-1524 - http://sotiriu.de/adv/NSOADV-2011-001.txt +CVE-2011-1525 - http://aluigi.org/adv/real_5-adv.txt +CVE-2011-1525 - http://securityreason.com/securityalert/8181 +CVE-2011-1525 - http://www.exploit-db.com/exploits/17019 +CVE-2011-1526 - http://securityreason.com/securityalert/8301 +CVE-2011-1527 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt +CVE-2011-1528 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt +CVE-2011-1529 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt +CVE-2011-1546 - http://securityreason.com/securityalert/8172 +CVE-2011-1546 - http://www.exploit-db.com/exploits/17084/ +CVE-2011-1547 - http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080031.html +CVE-2011-1548 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544 +CVE-2011-1552 - http://securityreason.com/securityalert/8171 +CVE-2011-1552 - http://www.toucan-system.com/advisories/tssa-2011-01.txt +CVE-2011-1553 - http://securityreason.com/securityalert/8171 +CVE-2011-1553 - http://www.toucan-system.com/advisories/tssa-2011-01.txt +CVE-2011-1554 - http://securityreason.com/securityalert/8171 +CVE-2011-1554 - http://www.toucan-system.com/advisories/tssa-2011-01.txt +CVE-2011-1556 - http://www.autosectools.com/Advisories/Andy%27s.PHP.Knowledgebase.Project.0.95.4_SQL.Injection_161.html +CVE-2011-1556 - http://www.exploit-db.com/exploits/17061/ +CVE-2011-1563 - http://aluigi.org/adv/realwin_2-adv.txt +CVE-2011-1563 - http://aluigi.org/adv/realwin_3-adv.txt +CVE-2011-1563 - http://aluigi.org/adv/realwin_4-adv.txt +CVE-2011-1563 - http://aluigi.org/adv/realwin_5-adv.txt +CVE-2011-1563 - http://aluigi.org/adv/realwin_7-adv.txt +CVE-2011-1563 - http://aluigi.org/adv/realwin_8-adv.txt +CVE-2011-1563 - http://securityreason.com/securityalert/8176 +CVE-2011-1563 - http://www.exploit-db.com/exploits/17025 +CVE-2011-1564 - http://aluigi.org/adv/realwin_6-adv.txt +CVE-2011-1564 - http://securityreason.com/securityalert/8177 +CVE-2011-1564 - http://www.exploit-db.com/exploits/17025 +CVE-2011-1565 - http://aluigi.org/adv/igss_1-adv.txt +CVE-2011-1565 - http://securityreason.com/securityalert/8178 +CVE-2011-1565 - http://www.exploit-db.com/exploits/17024 +CVE-2011-1566 - http://aluigi.org/adv/igss_8-adv.txt +CVE-2011-1566 - http://www.exploit-db.com/exploits/17024 +CVE-2011-1567 - http://aluigi.org/adv/igss_2-adv.txt +CVE-2011-1567 - http://aluigi.org/adv/igss_3-adv.txt +CVE-2011-1567 - http://aluigi.org/adv/igss_4-adv.txt +CVE-2011-1567 - http://aluigi.org/adv/igss_5-adv.txt +CVE-2011-1567 - http://aluigi.org/adv/igss_7-adv.txt +CVE-2011-1567 - http://securityreason.com/securityalert/8179 +CVE-2011-1567 - http://securityreason.com/securityalert/8251 +CVE-2011-1567 - http://www.exploit-db.com/exploits/17024 +CVE-2011-1568 - http://aluigi.org/adv/igss_6-adv.txt +CVE-2011-1568 - http://securityreason.com/securityalert/8182 +CVE-2011-1568 - http://www.exploit-db.com/exploits/17024 +CVE-2011-1569 - http://securityreason.com/securityalert/8180 +CVE-2011-1569 - http://soroush.secproject.com/blog/2011/01/unrestricted_file_download_v1_0/ +CVE-2011-1569 - http://www.exploit-db.com/exploits/17011 +CVE-2011-1570 - http://issues.liferay.com/browse/LPS-12628 +CVE-2011-1570 - http://issues.liferay.com/browse/LPS-13250 +CVE-2011-1570 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 +CVE-2011-1571 - http://issues.liferay.com/browse/LPS-14726 +CVE-2011-1571 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 +CVE-2011-1590 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15050 +CVE-2011-1591 - http://www.exploit-db.com/exploits/17195 +CVE-2011-1591 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836 +CVE-2011-1595 - https://bugzilla.redhat.com/show_bug.cgi?id=676252 +CVE-2011-1652 - http://resources.infosecinstitute.com/slaac-attack/ +CVE-2011-1657 - https://bugs.php.net/bug.php?id=54681 +CVE-2011-1658 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1659 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2011-1666 - http://securityreason.com/securityalert/8191 +CVE-2011-1667 - http://securityreason.com/securityalert/8192 +CVE-2011-1667 - http://www.exploit-db.com/exploits/17102 +CVE-2011-1668 - http://securityreason.com/securityalert/8193 +CVE-2011-1669 - http://www.autosectools.com/Advisories/WordPress.WP.Custom.Pages.0.5.0.1_Local.File.Inclusion_169.html +CVE-2011-1669 - http://www.exploit-db.com/exploits/17119 +CVE-2011-1670 - http://securityreason.com/securityalert/8195 +CVE-2011-1670 - http://www.exploit-db.com/exploits/17098 +CVE-2011-1671 - http://securityreason.com/securityalert/8196 +CVE-2011-1671 - http://www.mavitunasecurity.com/XSS-vulnerability-in-Tracks/ +CVE-2011-1685 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 +CVE-2011-1686 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 +CVE-2011-1687 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 +CVE-2011-1688 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 +CVE-2011-1689 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 +CVE-2011-1690 - https://bugzilla.redhat.com/show_bug.cgi?id=696795 +CVE-2011-1714 - http://www.autosectools.com/Advisories/eyeOS.2.3_Reflected.Cross-site.Scripting_172.html +CVE-2011-1714 - http://www.exploit-db.com/exploits/17127 +CVE-2011-1715 - http://www.autosectools.com/Advisories/eyeOS.2.3_Local.File.Inclusion_173.html +CVE-2011-1715 - http://www.exploit-db.com/exploits/17127 +CVE-2011-1717 - http://www.androidpolice.com/2011/04/14/exclusive-vulnerability-in-skype-for-android-is-exposing-your-name-phone-number-chat-logs-and-a-lot-more/ +CVE-2011-1717 - http://www.theregister.co.uk/2011/04/15/skype_for_android_vulnerable/ +CVE-2011-1721 - http://securityreason.com/securityalert/8212 +CVE-2011-1723 - http://securityreason.com/securityalert/8211 +CVE-2011-1723 - http://www.mavitunasecurity.com/XSS-vulnerability-in-Redmine/ +CVE-2011-1749 - http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download +CVE-2011-1751 - https://github.com/nelhage/virtunoid +CVE-2011-1760 - https://bugzilla.redhat.com/show_bug.cgi?id=700883 +CVE-2011-1761 - http://www.exploit-db.com/exploits/17222 +CVE-2011-1771 - http://securityreason.com/securityalert/8367 +CVE-2011-1776 - http://securityreason.com/securityalert/8369 +CVE-2011-1829 - http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog +CVE-2011-1833 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-1838 - http://securityreason.com/securityalert/8257 +CVE-2011-1838 - http://www.mavitunasecurity.com/XSS-vulnerability-in-Twiki/ +CVE-2011-1857 - http://securityreason.com/securityalert/8273 +CVE-2011-1858 - http://securityreason.com/securityalert/8273 +CVE-2011-1859 - http://securityreason.com/securityalert/8273 +CVE-2011-1860 - http://securityreason.com/securityalert/8273 +CVE-2011-1861 - http://securityreason.com/securityalert/8273 +CVE-2011-1862 - http://securityreason.com/securityalert/8273 +CVE-2011-1863 - http://securityreason.com/securityalert/8273 +CVE-2011-1865 - http://securityreason.com/securityalert/8288 +CVE-2011-1865 - http://www.exploit-db.com/exploits/17458 +CVE-2011-1865 - http://www.exploit-db.com/exploits/17490 +CVE-2011-1866 - http://securityreason.com/securityalert/8289 +CVE-2011-1866 - http://www.exploit-db.com/exploits/17461 +CVE-2011-1867 - http://securityreason.com/securityalert/8302 +CVE-2011-1890 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 +CVE-2011-1891 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 +CVE-2011-1892 - http://securityreason.com/securityalert/8386 +CVE-2011-1892 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 +CVE-2011-1893 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074 +CVE-2011-1938 - http://securityreason.com/securityalert/8294 +CVE-2011-1939 - https://bugs.php.net/bug.php?id=47802 +CVE-2011-1944 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2011-1952 - http://securityreason.com/securityalert/8270 +CVE-2011-1953 - http://securityreason.com/securityalert/8270 +CVE-2011-1954 - http://securityreason.com/securityalert/8270 +CVE-2011-1960 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1961 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1962 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1963 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1964 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-1968 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-065 +CVE-2011-1974 - https://www.exploit-db.com/exploits/40627/ +CVE-2011-1976 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-067 +CVE-2011-1982 - http://www.kb.cert.org/vuls/id/909022 +CVE-2011-1984 - http://securityreason.com/securityalert/8378 +CVE-2011-2003 - http://securityreason.com/securityalert/8473 +CVE-2011-2009 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-076 +CVE-2011-2023 - http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14121 +CVE-2011-2039 - http://securityreason.com/securityalert/8272 +CVE-2011-2074 - http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/ +CVE-2011-2076 - http://securityreason.com/securityalert/8245 +CVE-2011-2077 - http://securityreason.com/securityalert/8245 +CVE-2011-2078 - http://securityreason.com/securityalert/8245 +CVE-2011-2079 - http://securityreason.com/securityalert/8245 +CVE-2011-2080 - http://securityreason.com/securityalert/8245 +CVE-2011-2081 - http://securityreason.com/securityalert/8245 +CVE-2011-2089 - http://www.exploit-db.com/exploits/17240 +CVE-2011-2105 - http://www.kb.cert.org/vuls/id/264729 +CVE-2011-2122 - http://www.securityfocus.com/archive/1/518439/100/0/threaded +CVE-2011-2131 - http://securityreason.com/securityalert/8347 +CVE-2011-2133 - http://securityreason.com/securityalert/8334 +CVE-2011-2151 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-2154 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-2155 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-2158 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-2160 - http://ffmpeg.mplayerhq.hu/ +CVE-2011-2161 - http://ffmpeg.mplayerhq.hu/ +CVE-2011-2168 - http://securityreason.com/achievement_securityalert/97 +CVE-2011-2174 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5908 +CVE-2011-2179 - http://securityreason.com/securityalert/8274 +CVE-2011-2189 - http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289 +CVE-2011-2189 - https://bugzilla.redhat.com/show_bug.cgi?id=711134 +CVE-2011-2189 - https://bugzilla.redhat.com/show_bug.cgi?id=711245 +CVE-2011-2193 - http://securityreason.com/securityalert/8304 +CVE-2011-2195 - https://seclists.org/bugtraq/2011/Jun/34 +CVE-2011-2198 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2011-2198 - https://bugzilla.redhat.com/show_bug.cgi?id=712148 +CVE-2011-2201 - https://bugzilla.redhat.com/show_bug.cgi?id=712694 +CVE-2011-2207 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2207 +CVE-2011-2214 - http://securityreason.com/securityalert/8265 +CVE-2011-2220 - http://securityreason.com/securityalert/8305 +CVE-2011-2230 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2231 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2232 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2237 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2238 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2239 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2240 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2241 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2242 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2243 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2244 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2245 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2246 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2248 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2249 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2250 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2251 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2252 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2253 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2255 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2257 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2258 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2259 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2260 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2261 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2262 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2263 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2264 - http://www.kb.cert.org/vuls/id/103425 +CVE-2011-2264 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2267 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2271 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2272 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2273 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2274 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2275 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2277 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2278 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2279 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2280 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2281 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2282 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2283 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2284 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2285 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2286 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2287 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2288 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2289 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2290 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2291 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2292 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2293 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2294 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2295 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2296 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2297 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2298 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2299 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2300 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2301 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2302 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2303 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2304 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2305 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2306 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2307 - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html +CVE-2011-2308 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2309 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2310 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2311 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2312 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2313 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2314 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2315 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2316 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2317 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2318 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2319 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2320 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2321 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2322 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2323 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2324 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2325 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2326 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-2327 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-2330 - http://www.securityfocus.com/archive/1/518199/100/0/threaded +CVE-2011-2357 - http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html +CVE-2011-2357 - http://seclists.org/fulldisclosure/2011/Aug/9 +CVE-2011-2357 - http://securityreason.com/securityalert/8335 +CVE-2011-2363 - https://bugzilla.mozilla.org/show_bug.cgi?id=648160 +CVE-2011-2365 - https://bugzilla.mozilla.org/show_bug.cgi?id=655742 +CVE-2011-2366 - https://bugzilla.mozilla.org/show_bug.cgi?id=655987 +CVE-2011-2366 - https://bugzilla.mozilla.org/show_bug.cgi?id=656277 +CVE-2011-2366 - https://bugzilla.mozilla.org/show_bug.cgi?id=659349 +CVE-2011-2366 - https://hacks.mozilla.org/2011/06/cross-domain-webgl-textures-disabled-in-firefox-5/ +CVE-2011-2369 - https://bugzilla.mozilla.org/show_bug.cgi?id=650001 +CVE-2011-2371 - https://bugzilla.mozilla.org/show_bug.cgi?id=664009 +CVE-2011-2372 - https://bugzilla.mozilla.org/show_bug.cgi?id=657462 +CVE-2011-2378 - https://bugzilla.mozilla.org/show_bug.cgi?id=648065 +CVE-2011-2382 - http://ju12.tistory.com/attachment/cfile4.uf@151FAB4C4DDC9E0002A6FE.ppt +CVE-2011-2382 - http://www.networkworld.com/community/node/74259 +CVE-2011-2382 - http://www.theregister.co.uk/2011/05/25/microsoft_internet_explorer_cookiejacking/ +CVE-2011-2382 - http://www.youtube.com/watch?v=V95CX-3JpK0 +CVE-2011-2382 - http://www.youtube.com/watch?v=VsSkcnIFCxM +CVE-2011-2382 - https://sites.google.com/site/tentacoloviola/cookiejacking/Cookiejacking2011_final.ppt +CVE-2011-2383 - http://ju12.tistory.com/attachment/cfile4.uf@151FAB4C4DDC9E0002A6FE.ppt +CVE-2011-2383 - http://www.networkworld.com/community/node/74259 +CVE-2011-2383 - http://www.theregister.co.uk/2011/05/25/microsoft_internet_explorer_cookiejacking/ +CVE-2011-2383 - http://www.youtube.com/watch?v=V95CX-3JpK0 +CVE-2011-2383 - http://www.youtube.com/watch?v=VsSkcnIFCxM +CVE-2011-2383 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057 +CVE-2011-2383 - https://sites.google.com/site/tentacoloviola/cookiejacking/Cookiejacking2011_final.ppt +CVE-2011-2395 - http://securityreason.com/securityalert/8271 +CVE-2011-2398 - http://securityreason.com/securityalert/8303 +CVE-2011-2399 - http://securityreason.com/securityalert/8320 +CVE-2011-2402 - http://securityreason.com/securityalert/8321 +CVE-2011-2403 - http://securityreason.com/securityalert/8321 +CVE-2011-2404 - http://securityreason.com/securityalert/8332 +CVE-2011-2406 - http://securityreason.com/securityalert/8333 +CVE-2011-2407 - http://securityreason.com/securityalert/8333 +CVE-2011-2412 - http://securityreason.com/securityalert/8390 +CVE-2011-2443 - http://securityreason.com/securityalert/8410 +CVE-2011-2443 - http://www.exploit-db.com/exploits/17918/ +CVE-2011-2443 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php +CVE-2011-2461 - http://packetstormsecurity.com/files/131376/Magento-eCommerce-Vulnerable-Adobe-Flex-SDK.html +CVE-2011-2461 - https://threatpost.com/adobe-cve-2011-2461-remains-exploitable-four-years-after-patch/111754 +CVE-2011-2467 - https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt +CVE-2011-2471 - https://bugzilla.redhat.com/show_bug.cgi?id=700883 +CVE-2011-2472 - https://bugzilla.redhat.com/show_bug.cgi?id=700883 +CVE-2011-2494 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-2494 - https://bugzilla.redhat.com/show_bug.cgi?id=716842 +CVE-2011-2495 - https://bugzilla.redhat.com/show_bug.cgi?id=716825 +CVE-2011-2500 - http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download +CVE-2011-2505 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html +CVE-2011-2505 - http://securityreason.com/securityalert/8306 +CVE-2011-2506 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html +CVE-2011-2506 - http://securityreason.com/securityalert/8306 +CVE-2011-2507 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html +CVE-2011-2507 - http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html +CVE-2011-2507 - http://securityreason.com/securityalert/8306 +CVE-2011-2508 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html +CVE-2011-2508 - http://securityreason.com/securityalert/8306 +CVE-2011-2509 - http://www.openwall.com/lists/oss-security/2011/06/28/4 +CVE-2011-2509 - http://www.openwall.com/lists/oss-security/2011/06/29/12 +CVE-2011-2522 - http://securityreason.com/securityalert/8317 +CVE-2011-2522 - http://www.exploit-db.com/exploits/17577 +CVE-2011-2522 - https://bugzilla.samba.org/show_bug.cgi?id=8290 +CVE-2011-2523 - http://packetstormsecurity.com/files/162145/vsftpd-2.3.4-Backdoor-Command-Execution.html +CVE-2011-2523 - https://packetstormsecurity.com/files/102745/VSFTPD-2.3.4-Backdoor-Command-Execution.html +CVE-2011-2523 - https://vigilance.fr/vulnerability/vsftpd-backdoor-in-version-2-3-4-10805 +CVE-2011-2525 - http://kerneltrap.org/mailarchive/linux-netdev/2010/5/21/6277805 +CVE-2011-2543 - http://securityreason.com/securityalert/8393 +CVE-2011-2543 - http://www.exploit-db.com/exploits/17871 +CVE-2011-2544 - http://securityreason.com/securityalert/8393 +CVE-2011-2544 - http://www.exploit-db.com/exploits/17871 +CVE-2011-2577 - http://securityreason.com/securityalert/8387 +CVE-2011-2577 - http://www.exploit-db.com/exploits/17871 +CVE-2011-2598 - http://www.theregister.co.uk/2011/06/16/webgl_security_threats_redux/ +CVE-2011-2608 - http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt +CVE-2011-2685 - http://www.kb.cert.org/vuls/id/953183 +CVE-2011-2694 - https://bugzilla.samba.org/show_bug.cgi?id=8289 +CVE-2011-2697 - http://www.openwall.com/lists/oss-security/2011/07/13/3 +CVE-2011-2697 - http://www.openwall.com/lists/oss-security/2011/07/18/3 +CVE-2011-2697 - http://www.openwall.com/lists/oss-security/2011/07/28/1 +CVE-2011-2698 - http://www.openwall.com/lists/oss-security/2011/07/19/5 +CVE-2011-2698 - http://www.openwall.com/lists/oss-security/2011/07/20/2 +CVE-2011-2698 - https://bugzilla.redhat.com/show_bug.cgi?id=723215 +CVE-2011-2699 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-2701 - http://securityreason.com/securityalert/8325 +CVE-2011-2702 - http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/ +CVE-2011-2707 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-2710 - http://www.openwall.com/lists/oss-security/2011/07/22/1 +CVE-2011-2710 - http://www.openwall.com/lists/oss-security/2011/07/22/5 +CVE-2011-2716 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2011-2716 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2011-2716 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2011-2716 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2011-2719 - http://securityreason.com/securityalert/8322 +CVE-2011-2725 - http://packetstormsecurity.com/files/105610/Ark-2.16-Directory-Traversal.html +CVE-2011-2725 - https://bugzilla.redhat.com/show_bug.cgi?id=725764 +CVE-2011-2730 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2011-2743 - http://securityreason.com/securityalert/8312 +CVE-2011-2743 - http://www.ocert.org/advisories/ocert-2011-001.html +CVE-2011-2744 - http://securityreason.com/securityalert/8312 +CVE-2011-2744 - http://www.ocert.org/advisories/ocert-2011-001.html +CVE-2011-2744 - http://www.openwall.com/lists/oss-security/2011/07/13/5 +CVE-2011-2745 - http://securityreason.com/securityalert/8314 +CVE-2011-2745 - http://www.openwall.com/lists/oss-security/2011/07/13/5 +CVE-2011-2750 - http://aluigi.org/adv/nfr_2-adv.txt +CVE-2011-2750 - http://securityreason.com/securityalert/8309 +CVE-2011-2762 - http://securityreason.com/securityalert/8364 +CVE-2011-2763 - http://securityreason.com/securityalert/8363 +CVE-2011-2764 - http://securityreason.com/securityalert/8324 +CVE-2011-2780 - http://securityreason.com/securityalert/8312 +CVE-2011-2780 - http://www.ocert.org/advisories/ocert-2011-001.html +CVE-2011-2780 - http://www.openwall.com/lists/oss-security/2011/07/13/5 +CVE-2011-2837 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14139 +CVE-2011-2841 - http://securityreason.com/securityalert/8411 +CVE-2011-2841 - https://www.exploit-db.com/exploits/17929/ +CVE-2011-2891 - http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html +CVE-2011-2892 - http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html +CVE-2011-2900 - http://securityreason.com/securityalert/8337 +CVE-2011-2904 - https://support.zabbix.com/browse/ZBX-3835 +CVE-2011-2905 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-2906 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-2917 - http://www.openwall.com/lists/oss-security/2011/08/12/6 +CVE-2011-2917 - http://yehg.net/lab/pr0js/advisories/%5Bmambo4.6_x%5D_sql_injection +CVE-2011-2918 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-2921 - http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html +CVE-2011-2922 - https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html +CVE-2011-2922 - https://packetstormsecurity.com/files/cve/CVE-2011-2922 +CVE-2011-2928 - http://securityreason.com/securityalert/8360 +CVE-2011-2934 - https://www.openwall.com/lists/oss-security/2011/08/19/13 +CVE-2011-2935 - https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities +CVE-2011-2936 - https://oss-security.openwall.narkive.com/1UH3NYx8/cve-request-elgg-1-7-10-multiple-vulnerabilities +CVE-2011-2938 - http://packetstormsecurity.org/files/104149 +CVE-2011-2938 - http://securityreason.com/securityalert/8391 +CVE-2011-2944 - http://packetstormsecurity.org/files/110166/The-Uploader-2.0.4-Eng-Ita-Remote-File-Upload.html +CVE-2011-2964 - http://www.openwall.com/lists/oss-security/2011/07/13/3 +CVE-2011-2964 - http://www.openwall.com/lists/oss-security/2011/07/18/3 +CVE-2011-2964 - http://www.openwall.com/lists/oss-security/2011/07/28/1 +CVE-2011-2987 - https://bugzilla.mozilla.org/show_bug.cgi?id=665934 +CVE-2011-2988 - https://bugzilla.mozilla.org/show_bug.cgi?id=665936 +CVE-2011-2989 - https://bugzilla.mozilla.org/show_bug.cgi?id=674042 +CVE-2011-3001 - https://bugzilla.mozilla.org/show_bug.cgi?id=672485 +CVE-2011-3003 - https://bugzilla.mozilla.org/show_bug.cgi?id=682335 +CVE-2011-3010 - http://www.mavitunasecurity.com/xss-vulnerability-in-twiki5 +CVE-2011-3011 - http://securityreason.com/securityalert/8338 +CVE-2011-3012 - http://securityreason.com/securityalert/8324 +CVE-2011-3038 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15106 +CVE-2011-3046 - https://plus.google.com/u/0/116651741222993143554/posts/5Eq5d9XgFqs +CVE-2011-3079 - https://bugzilla.mozilla.org/show_bug.cgi?id=1087565 +CVE-2011-3140 - http://securityreason.com/securityalert/8339 +CVE-2011-3143 - http://www.digitalbond.com/scadapedia/vulnerability-notes/heap-overflow-vulnerability/ +CVE-2011-3144 - http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/ +CVE-2011-3182 - http://marc.info/?l=full-disclosure&m=131373057621672&w=2 +CVE-2011-3182 - http://securityreason.com/achievement_securityalert/101 +CVE-2011-3183 - https://www.openwall.com/lists/oss-security/2011/08/22/11 +CVE-2011-3187 - http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html +CVE-2011-3188 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-3190 - http://securityreason.com/securityalert/8362 +CVE-2011-3191 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-3192 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3192 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-3192 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3192 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2011-3201 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2011-3202 - https://www.openwall.com/lists/oss-security/2011/08/30/5 +CVE-2011-3203 - https://www.openwall.com/lists/oss-security/2011/08/30/6 +CVE-2011-3250 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15825 +CVE-2011-3296 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3297 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3298 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3299 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3300 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3301 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3302 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3303 - http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml +CVE-2011-3322 - http://securityreason.com/securityalert/8374 +CVE-2011-3322 - http://www.exploit-db.com/exploits/17827 +CVE-2011-3332 - http://www.kb.cert.org/vuls/id/225833 +CVE-2011-3336 - http://seclists.org/fulldisclosure/2014/Mar/166 +CVE-2011-3336 - https://cxsecurity.com/issue/WLB-2011110082 +CVE-2011-3340 - http://census-labs.com/news/2011/10/03/netvolution-referer-SQLi/ +CVE-2011-3348 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2011-3352 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3352 +CVE-2011-3352 - https://www.immuniweb.com/advisory/HTB23039 +CVE-2011-3353 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-3356 - http://securityreason.com/securityalert/8392 +CVE-2011-3356 - http://www.mantisbt.org/bugs/view.php?id=13191 +CVE-2011-3356 - http://www.mantisbt.org/bugs/view.php?id=13281 +CVE-2011-3357 - http://securityreason.com/securityalert/8392 +CVE-2011-3357 - http://www.mantisbt.org/bugs/view.php?id=13281 +CVE-2011-3358 - http://securityreason.com/securityalert/8392 +CVE-2011-3362 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog +CVE-2011-3362 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog +CVE-2011-3368 - http://www.exploit-db.com/exploits/17969 +CVE-2011-3368 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2011-3368 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-3386 - http://www.darkreading.com/security/vulnerabilities/231300312/getting-root-on-the-human-body.html +CVE-2011-3386 - http://www.hanselman.com/blog/HackersCanKillDiabeticsWithInsulinPumpsFromAHalfMileAwayUmNoFactsVsJournalisticFearMongering.aspx +CVE-2011-3386 - http://www.scmagazineus.com/black-hat-insulin-pumps-can-be-hacked/article/209106/ +CVE-2011-3389 - http://vnhacker.blogspot.com/2011/09/beast.html +CVE-2011-3389 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3389 - http://www.imperialviolet.org/2011/09/23/chromeandbeast.html +CVE-2011-3389 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2011-3389 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2011-3389 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3389 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 +CVE-2011-3390 - http://securityreason.com/securityalert/8370 +CVE-2011-3390 - http://voidroot.blogspot.com/2011/08/xss-in-ibm-open-admin-tool.html +CVE-2011-3393 - http://securityreason.com/securityalert/8376 +CVE-2011-3394 - http://securityreason.com/securityalert/8376 +CVE-2011-3402 - http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two +CVE-2011-3402 - http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit +CVE-2011-3402 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 +CVE-2011-3410 - http://www.kb.cert.org/vuls/id/361441 +CVE-2011-3410 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 +CVE-2011-3411 - http://www.kb.cert.org/vuls/id/361441 +CVE-2011-3411 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 +CVE-2011-3412 - http://www.kb.cert.org/vuls/id/361441 +CVE-2011-3412 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 +CVE-2011-3414 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-3478 - https://www.exploit-db.com/exploits/38599/ +CVE-2011-3487 - https://www.exploit-db.com/exploits/42706/ +CVE-2011-3488 - http://aluigi.altervista.org/adv/metastock_1-adv.txt +CVE-2011-3489 - http://aluigi.altervista.org/adv/rslogix_1-adv.txt +CVE-2011-3489 - http://securityreason.com/securityalert/8383 +CVE-2011-3490 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt +CVE-2011-3490 - http://securityreason.com/securityalert/8382 +CVE-2011-3490 - http://www.exploit-db.com/exploits/17848 +CVE-2011-3491 - http://aluigi.altervista.org/adv/movicon_1-adv.txt +CVE-2011-3492 - http://aluigi.altervista.org/adv/daqfactory_1-adv.txt +CVE-2011-3492 - http://www.exploit-db.com/exploits/17855 +CVE-2011-3493 - http://aluigi.altervista.org/adv/cogent_1-adv.txt +CVE-2011-3494 - http://aluigi.altervista.org/adv/esignal_1-adv.txt +CVE-2011-3495 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt +CVE-2011-3495 - http://securityreason.com/securityalert/8382 +CVE-2011-3496 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt +CVE-2011-3496 - http://securityreason.com/securityalert/8382 +CVE-2011-3496 - http://www.exploit-db.com/exploits/17848 +CVE-2011-3497 - http://aluigi.altervista.org/adv/scadapro_1-adv.txt +CVE-2011-3497 - http://securityreason.com/securityalert/8382 +CVE-2011-3498 - http://aluigi.altervista.org/adv/movicon_1-adv.txt +CVE-2011-3499 - http://aluigi.altervista.org/adv/movicon_3-adv.txt +CVE-2011-3501 - http://aluigi.altervista.org/adv/cogent_3-adv.txt +CVE-2011-3504 - http://ubuntu.com/usn/usn-1320-1 +CVE-2011-3504 - http://ubuntu.com/usn/usn-1333-1 +CVE-2011-3504 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog +CVE-2011-3504 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog +CVE-2011-3506 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3507 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3508 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3509 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3510 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3511 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3512 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3513 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3514 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3515 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3516 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3516 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3517 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3518 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3519 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3520 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3521 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3521 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3522 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3523 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3524 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3525 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3526 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3527 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3528 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3529 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3530 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3531 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3532 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3533 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3534 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3535 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3536 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3537 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3538 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3539 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3541 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3542 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3543 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3544 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3544 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3545 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3545 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3546 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3546 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3547 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3547 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3548 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3548 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3549 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3549 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3550 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3550 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3551 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3551 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3552 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3552 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3553 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3553 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3554 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3554 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3555 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3555 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3556 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3556 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3557 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3557 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3558 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3558 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3559 - http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html +CVE-2011-3560 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3560 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3561 - http://www.ibm.com/developerworks/java/jdk/alerts/ +CVE-2011-3561 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html +CVE-2011-3562 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-3563 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2011-3563 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2011-3564 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3565 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3566 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3568 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3569 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3570 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3571 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3573 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3574 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-3578 - http://securityreason.com/securityalert/8392 +CVE-2011-3578 - http://www.mantisbt.org/bugs/view.php?id=13281 +CVE-2011-3579 - http://securityreason.com/securityalert/8404 +CVE-2011-3580 - http://securityreason.com/securityalert/8404 +CVE-2011-3582 - https://www.openwall.com/lists/oss-security/2011/09/30/3 +CVE-2011-3595 - http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-stable%5D_cross_site_scripting%28XSS%29 +CVE-2011-3595 - https://www.openwall.com/lists/oss-security/2011/10/04/7 +CVE-2011-3596 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3596 +CVE-2011-3607 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/ +CVE-2011-3607 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html +CVE-2011-3607 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2011-3607 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-3609 - https://bugzilla.redhat.com/show_bug.cgi?id=743006 +CVE-2011-3609 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3609 +CVE-2011-3610 - https://packetstormsecurity.com/files/105054/Secunia-Security-Advisory-46005.html +CVE-2011-3611 - https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html +CVE-2011-3611 - https://www.immuniweb.com/advisory/HTB22913 +CVE-2011-3612 - https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html +CVE-2011-3612 - https://www.immuniweb.com/advisory/HTB22913 +CVE-2011-3613 - https://packetstormsecurity.com/files/105853/Secunia-Security-Advisory-46387.html +CVE-2011-3614 - https://packetstormsecurity.com/files/105853/Secunia-Security-Advisory-46387.html +CVE-2011-3640 - http://blog.acrossecurity.com/2011/10/google-chrome-pkcs11txt-file-planting.html +CVE-2011-3645 - http://securityreason.com/securityalert/8394 +CVE-2011-3648 - https://bugzilla.mozilla.org/show_bug.cgi?id=690225 +CVE-2011-3657 - https://bugzilla.mozilla.org/show_bug.cgi?id=697699 +CVE-2011-3658 - https://bugzilla.mozilla.org/show_bug.cgi?id=708186 +CVE-2011-3659 - https://bugzilla.mozilla.org/show_bug.cgi?id=708198 +CVE-2011-3663 - https://bugzilla.mozilla.org/show_bug.cgi?id=704482 +CVE-2011-3668 - https://bugzilla.mozilla.org/show_bug.cgi?id=703975 +CVE-2011-3669 - https://bugzilla.mozilla.org/show_bug.cgi?id=703983 +CVE-2011-3671 - https://bugzilla.mozilla.org/show_bug.cgi?id=739343 +CVE-2011-3713 - http://packetstormsecurity.com/files/129666 +CVE-2011-3829 - http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt +CVE-2011-3833 - http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt +CVE-2011-3881 - http://www.rafayhackingarticles.net/2014/10/a-tale-of-another-sop-bypass-in-android.html +CVE-2011-3901 - https://seclists.org/fulldisclosure/2012/May/19 +CVE-2011-3923 - http://seclists.org/fulldisclosure/2014/Jul/38 +CVE-2011-3923 - http://www.exploit-db.com/exploits/24874 +CVE-2011-3929 - http://ffmpeg.org/ +CVE-2011-3936 - http://ffmpeg.org/ +CVE-2011-3937 - http://ffmpeg.org/security.html +CVE-2011-3940 - http://ffmpeg.org/ +CVE-2011-3945 - http://ffmpeg.org/ +CVE-2011-3947 - http://ffmpeg.org/ +CVE-2011-3951 - http://ffmpeg.org/ +CVE-2011-3952 - http://ffmpeg.org/ +CVE-2011-3973 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog +CVE-2011-3973 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog +CVE-2011-3974 - http://www.ffmpeg.org/releases/ffmpeg-0.7.5.changelog +CVE-2011-3974 - http://www.ffmpeg.org/releases/ffmpeg-0.8.4.changelog +CVE-2011-3975 - http://news.cnet.com/8301-1035_3-20114556-94/ +CVE-2011-3975 - http://www.androidpolice.com/2011/10/01/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more/ +CVE-2011-3976 - http://www.exploit-db.com/exploits/17876 +CVE-2011-3979 - http://securityreason.com/securityalert/8409 +CVE-2011-3981 - http://www.exploit-db.com/exploits/17861 +CVE-2011-4024 - http://securityreason.com/securityalert/8477 +CVE-2011-4024 - http://www.exploit-db.com/exploits/18005 +CVE-2011-4040 - http://www.kb.cert.org/vuls/id/819630 +CVE-2011-4060 - http://securityreason.com/securityalert/8475 +CVE-2011-4060 - http://www.nth-dimension.org.uk/pub/NDSA20110310.txt.asc +CVE-2011-4061 - http://securityreason.com/securityalert/8476 +CVE-2011-4062 - http://www.exploit-db.com/exploits/17908 +CVE-2011-4066 - http://www.exploit-db.com/exploits/17992 +CVE-2011-4075 - http://www.exploit-db.com/exploits/18021/ +CVE-2011-4081 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-4089 - http://seclists.org/fulldisclosure/2011/Oct/804 +CVE-2011-4089 - http://www.exploit-db.com/exploits/18147 +CVE-2011-4089 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862 +CVE-2011-4091 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2011-4093 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2011-4094 - https://www.exploit-db.com/exploits/18020 +CVE-2011-4106 - http://www.exploit-db.com/exploits/17602 +CVE-2011-4106 - http://www.exploit-db.com/exploits/17872 +CVE-2011-4107 - https://bugzilla.redhat.com/show_bug.cgi?id=751112 +CVE-2011-4112 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-4122 - http://c-skills.blogspot.com/2011/11/openpam-trickery.html +CVE-2011-4122 - http://stealth.openwall.net/xSports/pamslam +CVE-2011-4124 - https://bugs.launchpad.net/calibre/+bug/885027 +CVE-2011-4124 - https://lwn.net/Articles/464824/ +CVE-2011-4125 - https://bugs.launchpad.net/calibre/+bug/885027 +CVE-2011-4125 - https://lwn.net/Articles/464824/ +CVE-2011-4126 - https://bugs.launchpad.net/calibre/+bug/885027 +CVE-2011-4126 - https://lwn.net/Articles/464824/ +CVE-2011-4151 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt +CVE-2011-4153 - http://cxsecurity.com/research/103 +CVE-2011-4153 - http://www.exploit-db.com/exploits/18370/ +CVE-2011-4161 - http://isc.sans.org/diary/Hacking+HP+Printers+for+Fun+and+Profit/12112 +CVE-2011-4231 - http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_34s.html +CVE-2011-4293 - http://moodle.org/mod/forum/discuss.php?d=182736 +CVE-2011-4314 - http://openid.net/2011/05/05/attribute-exchange-security-alert/ +CVE-2011-4317 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2011-4317 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-4317 - https://community.qualys.com/blogs/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issue +CVE-2011-4324 - https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 +CVE-2011-4336 - https://seclists.org/bugtraq/2011/Nov/140 +CVE-2011-4337 - http://www.exploit-db.com/exploits/18132/ +CVE-2011-4337 - http://www.openwall.com/lists/oss-security/2011/11/22/3 +CVE-2011-4339 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2011-4340 - http://seclists.org/bugtraq/2011/Nov/8 +CVE-2011-4340 - http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/ +CVE-2011-4341 - http://seclists.org/bugtraq/2011/Nov/8 +CVE-2011-4341 - http://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-symphony-cms/ +CVE-2011-4342 - http://seclists.org/fulldisclosure/2011/Mar/328 +CVE-2011-4342 - http://www.exploit-db.com/exploits/17056 +CVE-2011-4342 - http://www.openwall.com/lists/oss-security/2011/11/22/10 +CVE-2011-4342 - http://www.openwall.com/lists/oss-security/2011/11/22/7 +CVE-2011-4344 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2011-11-08.cb +CVE-2011-4345 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2011-4348 - http://www.openwall.com/lists/oss-security/2012/03/05/2 +CVE-2011-4349 - http://www.openwall.com/lists/oss-security/2011/11/25/4 +CVE-2011-4350 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350 +CVE-2011-4352 - http://ffmpeg.org/ +CVE-2011-4352 - http://ubuntu.com/usn/usn-1320-1 +CVE-2011-4352 - http://ubuntu.com/usn/usn-1333-1 +CVE-2011-4353 - http://ffmpeg.org/ +CVE-2011-4353 - http://ubuntu.com/usn/usn-1320-1 +CVE-2011-4353 - http://ubuntu.com/usn/usn-1333-1 +CVE-2011-4354 - http://openwall.com/lists/oss-security/2011/12/01/6 +CVE-2011-4358 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-4360 - https://bugzilla.redhat.com/show_bug.cgi?id=758171 +CVE-2011-4361 - https://bugzilla.redhat.com/show_bug.cgi?id=758171 +CVE-2011-4362 - http://blog.pi3.com.pl/?p=277 +CVE-2011-4362 - http://www.exploit-db.com/exploits/18295 +CVE-2011-4364 - http://ffmpeg.org/ +CVE-2011-4364 - http://ubuntu.com/usn/usn-1320-1 +CVE-2011-4364 - http://ubuntu.com/usn/usn-1333-1 +CVE-2011-4403 - http://seclists.org/fulldisclosure/2012/Feb/171 +CVE-2011-4415 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/ +CVE-2011-4415 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html +CVE-2011-4431 - http://securityreason.com/securityalert/8530 +CVE-2011-4432 - http://securityreason.com/securityalert/8530 +CVE-2011-4453 - http://www.exploit-db.com/exploits/18149/ +CVE-2011-4454 - https://packetstormsecurity.com/files/107082/Tiki-Wiki-CMS-Groupware-Cross-Site-Scripting.html +CVE-2011-4455 - https://packetstormsecurity.com/files/107082/Tiki-Wiki-CMS-Groupware-Cross-Site-Scripting.html +CVE-2011-4457 - http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457 +CVE-2011-4461 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-4461 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2011-4461 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2011-4461 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2011-4462 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-4499 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4500 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4501 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4502 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4503 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4504 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4505 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4506 - http://www.kb.cert.org/vuls/id/357851 +CVE-2011-4516 - http://www.kb.cert.org/vuls/id/887409 +CVE-2011-4516 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-4517 - http://www.kb.cert.org/vuls/id/887409 +CVE-2011-4517 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-4529 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt +CVE-2011-4530 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt +CVE-2011-4531 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt +CVE-2011-4532 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt +CVE-2011-4558 - https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html +CVE-2011-4559 - http://seclists.org/fulldisclosure/2011/Oct/224 +CVE-2011-4559 - http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin +CVE-2011-4566 - http://www.redhat.com/support/errata/RHSA-2012-0019.html +CVE-2011-4579 - http://ffmpeg.org/ +CVE-2011-4579 - http://ubuntu.com/usn/usn-1320-1 +CVE-2011-4579 - http://ubuntu.com/usn/usn-1333-1 +CVE-2011-4582 - http://moodle.org/mod/forum/discuss.php?d=191748 +CVE-2011-4591 - http://moodle.org/mod/forum/discuss.php?d=191760 +CVE-2011-4592 - http://moodle.org/mod/forum/discuss.php?d=191761 +CVE-2011-4594 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 +CVE-2011-4599 - http://bugs.icu-project.org/trac/ticket/8984 +CVE-2011-4613 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652249 +CVE-2011-4642 - http://www.splunk.com/view/SP-CAAAGMM +CVE-2011-4643 - http://www.splunk.com/view/SP-CAAAGMM +CVE-2011-4650 - https://icisystem.blogspot.com/2015/09/cisco-notification-alert-prime-dcnm-01.html +CVE-2011-4670 - http://seclists.org/fulldisclosure/2011/Oct/154 +CVE-2011-4670 - http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_XSS +CVE-2011-4670 - https://www.exploit-db.com/exploits/36203/ +CVE-2011-4670 - https://www.exploit-db.com/exploits/36204/ +CVE-2011-4671 - http://www.exploit-db.com/exploits/18114 +CVE-2011-4672 - http://seclists.org/fulldisclosure/2011/Nov/303 +CVE-2011-4672 - http://www.exploit-db.com/exploits/18128 +CVE-2011-4674 - http://www.exploit-db.com/exploits/18155 +CVE-2011-4674 - https://support.zabbix.com/browse/ZBX-4385 +CVE-2011-4709 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5057.php +CVE-2011-4713 - http://seclists.org/fulldisclosure/2011/Nov/117 +CVE-2011-4713 - http://www.exploit-db.com/exploits/18099 +CVE-2011-4722 - http://www.exploit-db.com/exploits/18189/ +CVE-2011-4725 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4726 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4727 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4728 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4729 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4730 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4731 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4732 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4733 - http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html +CVE-2011-4734 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4735 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4736 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4737 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4738 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4739 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4740 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4741 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4742 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4743 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4744 - http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html +CVE-2011-4745 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html +CVE-2011-4746 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html +CVE-2011-4747 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html +CVE-2011-4748 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html +CVE-2011-4749 - http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html +CVE-2011-4750 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-4751 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-4752 - http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html +CVE-2011-4753 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4754 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4755 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4756 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4757 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4758 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4759 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4760 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4761 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4762 - http://xss.cx/examples/plesk-reports/plesk-10.2.0.html +CVE-2011-4763 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html +CVE-2011-4764 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html +CVE-2011-4765 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html +CVE-2011-4766 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html +CVE-2011-4767 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html +CVE-2011-4768 - http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html +CVE-2011-4776 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4777 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4778 - http://www.splunk.com/view/SP-CAAAGMM +CVE-2011-4801 - http://www.exploit-db.com/exploits/18117 +CVE-2011-4806 - http://www.exploit-db.com/exploits/18045 +CVE-2011-4807 - http://www.exploit-db.com/exploits/18045 +CVE-2011-4815 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-4832 - http://www.exploit-db.com/exploits/18066 +CVE-2011-4834 - http://0a29.blogspot.com/2011/12/0a29-11-2-privilege-escalation.html +CVE-2011-4838 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-4847 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4848 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4849 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4850 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4851 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4852 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4853 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4854 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4855 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4856 - http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html +CVE-2011-4858 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-4858 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py +CVE-2011-4873 - http://aluigi.altervista.org/adv/atvise_1-adv.txt +CVE-2011-4885 - http://www.exploit-db.com/exploits/18305 +CVE-2011-4885 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-4885 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2011-4885 - http://www.redhat.com/support/errata/RHSA-2012-0019.html +CVE-2011-4885 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py +CVE-2011-4898 - http://www.exploit-db.com/exploits/18417 +CVE-2011-4899 - http://www.exploit-db.com/exploits/18417 +CVE-2011-4905 - https://issues.apache.org/jira/browse/AMQ-3294 +CVE-2011-4906 - https://www.exploit-db.com/exploits/10183 +CVE-2011-4908 - https://www.exploit-db.com/exploits/9926 +CVE-2011-4915 - http://www.openwall.com/lists/oss-security/2011/11/07/9 +CVE-2011-4915 - https://lkml.org/lkml/2011/11/7/340 +CVE-2011-4915 - https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131 +CVE-2011-4916 - https://lkml.org/lkml/2011/11/7/355 +CVE-2011-4917 - https://lkml.org/lkml/2011/11/7/340 +CVE-2011-4938 - https://seclists.org/bugtraq/2011/Dec/7 +CVE-2011-4942 - http://www.openwall.com/lists/oss-security/2011/03/18/8 +CVE-2011-4942 - http://yehg.net/lab/pr0js/advisories/%5Bgeeklog1.7.1%5D_cross_site_scripting +CVE-2011-4944 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2011-4946 - http://www.openwall.com/lists/oss-security/2012/03/29/3 +CVE-2011-4947 - http://www.openwall.com/lists/oss-security/2012/03/29/3 +CVE-2011-4948 - http://packetstormsecurity.org/files/101676/eGroupware-1.8.001.20110421-Local-File-Inclusion.html +CVE-2011-4949 - http://packetstormsecurity.org/files/100179/eGroupware-1.8.001-SQL-Injection.html +CVE-2011-4950 - http://packetstormsecurity.org/files/100180/eGroupware-1.8.001-Cross-Site-Scripting.html +CVE-2011-4951 - http://packetstormsecurity.org/files/101675/eGroupware-1.8.001.20110421-Open-Redirect.html +CVE-2011-4966 - https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 +CVE-2011-4969 - http://bugs.jquery.com/ticket/9521 +CVE-2011-4970 - http://site.pi3.com.pl/adv/disk_pool_manager_1.txt +CVE-2011-4970 - http://www.openwall.com/lists/oss-security/2013/03/10/1 +CVE-2011-4971 - http://insecurety.net/?p=872 +CVE-2011-5004 - http://www.vulnerability-lab.com/get_content.php?id=342 +CVE-2011-5012 - http://www.exploit-db.com/exploits/18119 +CVE-2011-5018 - http://www.cloudscan.me/2011/12/cve-2011-5018-koala-framework-xss.html +CVE-2011-5020 - http://www.cloudscan.me/2012/02/cve-2011-5020-online-tv-database-sql.html +CVE-2011-5033 - http://www.exploit-db.com/exploits/18225 +CVE-2011-5034 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-5034 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py +CVE-2011-5035 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-5035 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2011-5035 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2011-5035 - https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py +CVE-2011-5036 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-5037 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2011-5039 - http://www.exploit-db.com/exploits/18259 +CVE-2011-5039 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5064.php +CVE-2011-5039 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5065.php +CVE-2011-5040 - http://www.exploit-db.com/exploits/18259 +CVE-2011-5040 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5064.php +CVE-2011-5044 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5062.php +CVE-2011-5046 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-008 +CVE-2011-5050 - http://www.vulnerability-lab.com/get_content.php?id=60 +CVE-2011-5053 - http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ +CVE-2011-5054 - http://c-skills.blogspot.com/2011/11/openpam-trickery.html +CVE-2011-5075 - http://www.exploit-db.com/exploits/18132/ +CVE-2011-5075 - http://www.openwall.com/lists/oss-security/2011/11/22/3 +CVE-2011-5081 - http://seclists.org/bugtraq/2011/Apr/266 +CVE-2011-5082 - http://www.primothemes.com/forums/viewtopic.php?f=4&t=16173#p56982 +CVE-2011-5083 - http://cxsecurity.com/issue/WLB-2011090012 +CVE-2011-5083 - http://vigilance.fr/vulnerability/Dotclear-file-upload-via-swfupload-swf-11396 +CVE-2011-5094 - http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html +CVE-2011-5094 - http://www.ietf.org/mail-archive/web/tls/current/msg07553.html +CVE-2011-5098 - http://tickets.opscode.com/browse/CHEF-2649 +CVE-2011-5099 - http://packetstormsecurity.org/files/112092/Joomla-CCNewsLetter-1.0.7-SQL-Injection.html +CVE-2011-5109 - http://www.exploit-db.com/exploits/18127 +CVE-2011-5110 - http://sourceforge.net/tracker/?func=detail&aid=3506818&group_id=219284&atid=1045881 +CVE-2011-5110 - http://www.exploit-db.com/exploits/18129 +CVE-2011-5114 - http://www.vulnerability-lab.com/get_content.php?id=33 +CVE-2011-5115 - http://packetstormsecurity.org/files/106859/dlguardshoppingcart-xss.txt +CVE-2011-5116 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5053.php +CVE-2011-5129 - http://packetstormsecurity.org/files/107312/xchat-dos.txt +CVE-2011-5129 - http://www.exploit-db.com/exploits/18159 +CVE-2011-5130 - http://www.exploit-db.com/exploits/18198 +CVE-2011-5135 - http://www.exploit-db.com/exploits/18224 +CVE-2011-5136 - http://seclists.org/fulldisclosure/2011/Dec/125 +CVE-2011-5139 - http://www.exploit-db.com/exploits/18009 +CVE-2011-5147 - http://www.exploit-db.com/exploits/18121 +CVE-2011-5148 - http://www.exploit-db.com/exploits/18287 +CVE-2011-5149 - http://www.exploit-db.com/exploits/18261 +CVE-2011-5149 - http://www.vulnerability-lab.com/get_content.php?id=91 +CVE-2011-5155 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5009.php +CVE-2011-5158 - http://sotiriu.de/adv/NSOADV-2010-010.txt +CVE-2011-5165 - http://www.exploit-db.com/exploits/11975 +CVE-2011-5165 - http://www.exploit-db.com/exploits/11976 +CVE-2011-5165 - http://www.exploit-db.com/exploits/18142 +CVE-2011-5165 - https://www.exploit-db.com/exploits/36465/ +CVE-2011-5165 - https://www.exploit-db.com/exploits/36826/ +CVE-2011-5165 - https://www.exploit-db.com/exploits/36827/ +CVE-2011-5166 - http://www.exploit-db.com/exploits/17856 +CVE-2011-5167 - http://www.exploit-db.com/exploits/18092 +CVE-2011-5169 - http://www.vulnerability-lab.com/get_content.php?id=196 +CVE-2011-5171 - http://www.exploit-db.com/exploits/18220 +CVE-2011-5175 - http://packetstormsecurity.org/files/115772/Banana-Dance-CMS-B.2.1-XSS-SQL-Injection.html +CVE-2011-5178 - http://seclists.org/fulldisclosure/2011/Nov/158 +CVE-2011-5183 - http://www.exploit-db.com/exploits/18091 +CVE-2011-5184 - http://0a29.blogspot.com/2011/11/0a29-11-1-cross-site-scripting.html +CVE-2011-5186 - http://www.exploit-db.com/exploits/18056 +CVE-2011-5195 - http://www.exploit-db.com/exploits/18266 +CVE-2011-5196 - http://www.exploit-db.com/exploits/18266 +CVE-2011-5197 - http://www.exploit-db.com/exploits/18266 +CVE-2011-5205 - http://packetstormsecurity.org/files/108239/rapidleech-xss.txt +CVE-2011-5209 - http://packetstormsecurity.org/files/108145/graphicclone-xss.txt +CVE-2011-5210 - http://www.autosectools.com/Advisories/Limny.3.0.0_Local.File.Inclusion_99.html +CVE-2011-5215 - http://packetstormsecurity.org/files/107970/videoportalneu-sql.txt +CVE-2011-5222 - http://packetstormsecurity.org/files/107971/flirtportal-sql.txt +CVE-2011-5228 - http://www.exploit-db.com/exploits/18249 +CVE-2011-5228 - http://www.vulnerability-lab.com/get_content.php?id=362 +CVE-2011-5229 - http://www.exploit-db.com/exploits/18249 +CVE-2011-5229 - http://www.vulnerability-lab.com/get_content.php?id=362 +CVE-2011-5230 - http://www.exploit-db.com/exploits/18246 +CVE-2011-5233 - http://www.exploit-db.com/exploits/18257 +CVE-2011-5234 - http://packetstormsecurity.org/files/107972/social2-sql.txt +CVE-2011-5252 - http://www.mavitunasecurity.com/open-redirection-vulnerability-in-orchard/ +CVE-2011-5257 - http://www.exploit-db.com/exploits/18053 +CVE-2011-5267 - http://www.autosectools.com/Advisories/WikiWig.5.01_Persistent-Reflected.Cross-site.Scripting_139.html +CVE-2011-5267 - http://www.exploit-db.com/exploits/16988 +CVE-2011-5268 - https://projects.duckcorp.org/versions/13 +CVE-2011-5279 - http://seclists.org/fulldisclosure/2012/Apr/0 +CVE-2011-5283 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2011-5284 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2011-5325 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2011-5325 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2011-5325 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2011-5325 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2011-5330 - https://www.exploit-db.com/exploits/17031 +CVE-2011-5331 - https://www.exploit-db.com/exploits/17058 +CVE-2012-0014 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 +CVE-2012-0015 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 +CVE-2012-0021 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-0025 - http://www.exploit-db.com/exploits/18256 +CVE-2012-0031 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-0036 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2012-0044 - http://www.ubuntu.com/usn/USN-1556-1 +CVE-2012-0053 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2012-0053 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-0060 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-0061 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-0071 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0072 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0073 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0074 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0075 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0076 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0077 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0078 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0079 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0080 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0081 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0082 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0083 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0084 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0085 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0086 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0087 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0088 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0089 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0090 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0091 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0092 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0093 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0094 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0095 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0096 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0097 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0098 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0099 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0100 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0101 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0102 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0103 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0104 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0105 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0106 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0107 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0108 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0109 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0110 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0111 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0112 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0113 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0114 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0115 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0116 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0117 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0118 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0119 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0120 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0134 - http://www.securityfocus.com/archive/1/522386 +CVE-2012-0154 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-008 +CVE-2012-0158 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-027 +CVE-2012-0206 - http://doc.powerdns.com/powerdns-advisory-2012-01.html +CVE-2012-0206 - https://bugzilla.redhat.com/show_bug.cgi?id=772570 +CVE-2012-0208 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0209 - http://eromang.zataz.com/2012/02/15/cve-2012-0209-horde-backdoor-analysis/ +CVE-2012-0209 - http://packetstormsecurity.org/files/109874/Horde-3.3.12-Backdoor-Arbitrary-PHP-Code-Execution.html +CVE-2012-0217 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0217 - https://www.exploit-db.com/exploits/28718/ +CVE-2012-0217 - https://www.exploit-db.com/exploits/46508/ +CVE-2012-0249 - http://www.kb.cert.org/vuls/id/551715 +CVE-2012-0250 - http://www.kb.cert.org/vuls/id/551715 +CVE-2012-0255 - http://www.kb.cert.org/vuls/id/551715 +CVE-2012-0324 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-03-05.cb +CVE-2012-0325 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-03-05.cb +CVE-2012-0358 - http://www.kb.cert.org/vuls/id/339177 +CVE-2012-0360 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-0389 - http://www.exploit-db.com/exploits/18447 +CVE-2012-0391 - http://www.exploit-db.com/exploits/18329 +CVE-2012-0392 - http://www.exploit-db.com/exploits/18329 +CVE-2012-0393 - http://www.exploit-db.com/exploits/18329 +CVE-2012-0394 - http://www.exploit-db.com/exploits/18329 +CVE-2012-0394 - http://www.exploit-db.com/exploits/31434 +CVE-2012-0406 - http://aluigi.altervista.org/adv/dpa_1-adv.txt +CVE-2012-0406 - http://www.exploit-db.com/exploits/18688/ +CVE-2012-0407 - http://aluigi.altervista.org/adv/dpa_1-adv.txt +CVE-2012-0407 - http://www.exploit-db.com/exploits/18688/ +CVE-2012-0435 - http://www.kb.cert.org/vuls/id/806908 +CVE-2012-0440 - https://bugzilla.mozilla.org/show_bug.cgi?id=718319 +CVE-2012-0441 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-0441 - https://bugzilla.mozilla.org/show_bug.cgi?id=715073 +CVE-2012-0444 - https://bugzilla.mozilla.org/show_bug.cgi?id=719612 +CVE-2012-0451 - https://bugzilla.mozilla.org/show_bug.cgi?id=717511 +CVE-2012-0453 - https://bugzilla.mozilla.org/show_bug.cgi?id=725663 +CVE-2012-0454 - https://bugzilla.mozilla.org/show_bug.cgi?id=684555 +CVE-2012-0455 - https://bugzilla.mozilla.org/show_bug.cgi?id=704354 +CVE-2012-0458 - https://bugzilla.mozilla.org/show_bug.cgi?id=719994 +CVE-2012-0459 - https://bugzilla.mozilla.org/show_bug.cgi?id=723446 +CVE-2012-0464 - http://www.zdnet.com/blog/security/mozilla-knew-of-pwn2own-bug-before-cansecwest/10757 +CVE-2012-0464 - http://www.zdnet.com/blog/security/researchers-hack-into-newest-firefox-with-zero-day-flaw/10663 +CVE-2012-0464 - https://bugzilla.mozilla.org/show_bug.cgi?id=735104 +CVE-2012-0466 - https://bugzilla.mozilla.org/show_bug.cgi?id=745397 +CVE-2012-0472 - https://bugzilla.mozilla.org/show_bug.cgi?id=744480 +CVE-2012-0474 - https://bugzilla.mozilla.org/show_bug.cgi?id=687745 +CVE-2012-0479 - https://bugzilla.mozilla.org/show_bug.cgi?id=714631 +CVE-2012-0484 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0485 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0486 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0487 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0488 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0489 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0490 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0491 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0492 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0493 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0494 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0495 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0496 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html +CVE-2012-0497 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0497 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0498 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0498 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0499 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0499 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0500 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0501 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0501 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0502 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0503 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0504 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0505 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0506 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0507 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0508 - http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html +CVE-2012-0509 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0510 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0511 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0512 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0513 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0514 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0515 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0516 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0517 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0518 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-0519 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0520 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0521 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0522 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0523 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0524 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0525 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0526 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0527 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0528 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0529 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0530 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0531 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0532 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0533 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0534 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0535 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0536 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0537 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0538 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0539 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0540 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-0541 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0542 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0543 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0544 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0545 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0546 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0548 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0549 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0550 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0551 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0551 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-0552 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0554 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0555 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0556 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0557 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0558 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0559 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0560 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0561 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0562 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0563 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-0564 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0565 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0566 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0567 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0568 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2012-0570 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2012-0571 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0572 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-0573 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0574 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-0575 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0576 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0577 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0578 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-0579 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0580 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0581 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0582 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0583 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-0668 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15821 +CVE-2012-0694 - https://seclists.org/bugtraq/2012/Jun/165 +CVE-2012-0694 - https://www.exploit-db.com/exploits/19381 +CVE-2012-0698 - http://packetstormsecurity.com/files/118281/TrouSerS-Denial-Of-Service.html +CVE-2012-0699 - http://www.exploit-db.com/exploits/18667 +CVE-2012-0781 - http://cxsecurity.com/research/103 +CVE-2012-0781 - http://www.exploit-db.com/exploits/18370/ +CVE-2012-0782 - http://www.exploit-db.com/exploits/18417 +CVE-2012-0785 - https://www.cloudbees.com/jenkins-security-advisory-2012-01-12 +CVE-2012-0786 - https://github.com/hercules-team/augeas/commit/16387744 +CVE-2012-0815 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-0825 - http://openid.net/2011/05/05/attribute-exchange-security-alert/ +CVE-2012-0829 - http://www.openwall.com/lists/oss-security/2012/02/02/10 +CVE-2012-0830 - http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ +CVE-2012-0830 - https://gist.github.com/1725489 +CVE-2012-0839 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2012-0841 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2012-0845 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2012-0846 - http://www.openwall.com/lists/oss-security/2012/02/12/3 +CVE-2012-0846 - http://www.openwall.com/lists/oss-security/2012/02/13/6 +CVE-2012-0847 - http://ffmpeg.org/security.html +CVE-2012-0848 - http://ffmpeg.org/security.html +CVE-2012-0849 - http://ffmpeg.org/security.html +CVE-2012-0850 - http://ffmpeg.org/security.html +CVE-2012-0851 - http://ffmpeg.org/security.html +CVE-2012-0851 - http://ffmpeg.org/trac/ffmpeg/ticket/758 +CVE-2012-0852 - http://ffmpeg.org/security.html +CVE-2012-0853 - http://ffmpeg.org/trac/ffmpeg/ticket/780 +CVE-2012-0854 - http://ffmpeg.org/security.html +CVE-2012-0855 - http://ffmpeg.org/security.html +CVE-2012-0856 - http://ffmpeg.org/security.html +CVE-2012-0856 - http://ffmpeg.org/trac/ffmpeg/ticket/757 +CVE-2012-0857 - http://ffmpeg.org/security.html +CVE-2012-0858 - http://ffmpeg.org/ +CVE-2012-0859 - http://ffmpeg.org/security.html +CVE-2012-0865 - http://www.openwall.com/lists/oss-security/2012/02/12/4 +CVE-2012-0865 - http://www.openwall.com/lists/oss-security/2012/02/13/5 +CVE-2012-0865 - http://www.openwall.com/lists/oss-security/2012/02/18/1 +CVE-2012-0865 - http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0.x%5D_open_url_redirection +CVE-2012-0869 - http://www.openwall.com/lists/oss-security/2012/02/20/1 +CVE-2012-0872 - http://www.openwall.com/lists/oss-security/2012/02/20/10 +CVE-2012-0872 - http://www.openwall.com/lists/oss-security/2012/02/20/5 +CVE-2012-0872 - http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss +CVE-2012-0873 - http://www.openwall.com/lists/oss-security/2012/02/20/11 +CVE-2012-0873 - http://www.openwall.com/lists/oss-security/2012/02/20/6 +CVE-2012-0873 - http://yehg.net/lab/pr0js/advisories/%5BDolphin_7.0.7%5D_xss +CVE-2012-0874 - http://www.exploit-db.com/exploits/30211 +CVE-2012-0876 - http://bugs.python.org/issue13703#msg151870 +CVE-2012-0876 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2012-0876 - http://www.ubuntu.com/usn/USN-1527-1 +CVE-2012-0876 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2012-0876 - https://www.tenable.com/security/tns-2016-20 +CVE-2012-0879 - http://www.ubuntu.com/usn/USN-1408-1 +CVE-2012-0881 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2012-0895 - http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt +CVE-2012-0895 - http://www.exploit-db.com/exploits/18355 +CVE-2012-0896 - http://packetstormsecurity.org/files/108631/countperday-downloadxss.txt +CVE-2012-0896 - http://www.exploit-db.com/exploits/18355 +CVE-2012-0900 - http://www.darksecurity.de/advisories/SSCHADV2011-042.txt +CVE-2012-0903 - http://seclists.org/fulldisclosure/2012/Jan/244 +CVE-2012-0903 - http://www.vulnerability-lab.com/get_content.php?id=378 +CVE-2012-0904 - http://www.exploit-db.com/exploits/18309 +CVE-2012-0905 - http://www.exploit-db.com/exploits/18385 +CVE-2012-0906 - http://www.exploit-db.com/exploits/18386 +CVE-2012-0907 - http://aluigi.altervista.org/adv/neoaxis_1-adv.txt +CVE-2012-0911 - http://www.exploit-db.com/exploits/19573 +CVE-2012-0911 - http://www.exploit-db.com/exploits/19630 +CVE-2012-0929 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 +CVE-2012-0930 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 +CVE-2012-0931 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-12-020-03 +CVE-2012-0932 - http://packetstormsecurity.org/files/108887/leadcapturepagesystem-xss.txt +CVE-2012-0933 - http://packetstormsecurity.org/files/108869/acidcat-xss.txt +CVE-2012-0936 - http://issues.opennms.org/browse/NMS-5128?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel#issue-tabs +CVE-2012-0936 - http://issues.opennms.org/browse/NMS/fixforversion/10824#atl_token=BCL8-RCDX-MB62-2EZT%7C38eaf469042162355c28f5393587690a8388d556%7Clout&selectedTab=com.atlassian.jira.plugin.system.project%3Aversion-summary-panel +CVE-2012-0936 - http://issues.opennms.org/browse/NMS/fixforversion/10825 +CVE-2012-0937 - http://www.exploit-db.com/exploits/18417 +CVE-2012-0941 - http://packetstormsecurity.org/files/109168/VL-144.txt +CVE-2012-0941 - https://fortiguard.com/psirt/FG-IR-012-001 +CVE-2012-0941 - https://www.vulnerability-lab.com/get_content.php?id=144 +CVE-2012-0954 - http://seclists.org/fulldisclosure/2012/Jun/289 +CVE-2012-0957 - http://www.openwall.com/lists/oss-security/2012/10/09/4 +CVE-2012-0979 - http://packetstormsecurity.org/files/109246/twiki-xss.txt +CVE-2012-0979 - http://st2tea.blogspot.com/2012/01/cross-site-scripting-twiki.html +CVE-2012-0984 - http://packetstormsecurity.org/files/111958/XOOPS-2.5.4-Cross-Site-Scripting.html +CVE-2012-0984 - http://www.exploit-db.com/exploits/18753 +CVE-2012-0985 - http://www.exploit-db.com/exploits/18958 +CVE-2012-10005 - https://vuldb.com/?id.218155 +CVE-2012-10012 - https://github.com/wp-plugins/facebook-button-plugin/commit/33144ae5a45ed07efe7fceca901d91365fdbf7cb +CVE-2012-1002 - http://www.exploit-db.com/exploits/18820 +CVE-2012-1004 - http://st2tea.blogspot.com/2012/02/foswiki-cross-site-scripting.html +CVE-2012-1007 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2012-1007 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2012-1008 - http://www.exploit-db.com/exploits/18453 +CVE-2012-1009 - http://www.exploit-db.com/exploits/18454 +CVE-2012-1014 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt +CVE-2012-1015 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt +CVE-2012-1017 - http://www.exploit-db.com/exploits/18465 +CVE-2012-1018 - http://dl.packetstormsecurity.net/1202-exploits/joomlacurrencyconverter-xss.txt +CVE-2012-1019 - http://packetstormsecurity.org/files/109447/XWiki-Enterprise-3.4-Cross-Site-Scripting.html +CVE-2012-1019 - http://st2tea.blogspot.com/2012/02/xwiki-cross-site-scripting.html +CVE-2012-1020 - http://marc.info/?l=full-disclosure&m=132852645911072&w=2 +CVE-2012-1020 - http://www.vulnerability-lab.com/get_content.php?id=304 +CVE-2012-1021 - http://packetstormsecurity.org/files/109290/4images-xss.txt +CVE-2012-1022 - http://packetstormsecurity.org/files/109290/4images-xss.txt +CVE-2012-1023 - http://packetstormsecurity.org/files/109290/4images-xss.txt +CVE-2012-1027 - http://www.kb.cert.org/vuls/id/732115 +CVE-2012-1029 - http://packetstormsecurity.org/files/109485/Tube-Ace-SQL-Injection.html +CVE-2012-1029 - http://www.exploit-db.com/exploits/18466 +CVE-2012-1031 - http://world.episerver.com/Blogs/Jens-N/Dates/2012/1/Security-vulnerability---Elevation-of-privilege/ +CVE-2012-1033 - http://www.kb.cert.org/vuls/id/542123 +CVE-2012-1035 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2012-1047 - http://www.exploit-db.com/exploits/18473 +CVE-2012-1047 - http://www.vulnerability-lab.com/get_content.php?id=405 +CVE-2012-1048 - http://www.vulnerability-lab.com/get_content.php?id=423 +CVE-2012-1049 - http://packetstormsecurity.org/files/109528 +CVE-2012-1049 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5070.php +CVE-2012-1056 - http://drupal.org/node/1425150 +CVE-2012-1057 - http://drupal.org/node/1425150 +CVE-2012-1058 - http://packetstormsecurity.org/files/109507/Flyspray-0.9.9.6-Cross-Site-Request-Forgery.html +CVE-2012-1059 - http://packetstormsecurity.org/files/109389/VL-407.txt +CVE-2012-1059 - http://www.exploit-db.com/exploits/18455 +CVE-2012-1059 - http://www.vulnerability-lab.com/get_content.php?id=407 +CVE-2012-1062 - http://www.vulnerability-lab.com/get_content.php?id=115 +CVE-2012-1063 - http://www.vulnerability-lab.com/get_content.php?id=115 +CVE-2012-1097 - http://www.openwall.com/lists/oss-security/2012/03/05/1 +CVE-2012-1110 - http://www.openwall.com/lists/oss-security/2012/03/05/15 +CVE-2012-1110 - http://www.openwall.com/lists/oss-security/2012/03/05/21 +CVE-2012-1110 - http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss +CVE-2012-1112 - http://www.openwall.com/lists/oss-security/2012/03/05/14 +CVE-2012-1112 - http://www.openwall.com/lists/oss-security/2012/03/05/23 +CVE-2012-1112 - http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi +CVE-2012-1125 - http://www.exploit-db.com/exploits/18412 +CVE-2012-1148 - http://www.ubuntu.com/usn/USN-1527-1 +CVE-2012-1150 - http://bugs.python.org/issue13703 +CVE-2012-1150 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2012-1153 - http://www.exploit-db.com/exploits/18392 +CVE-2012-1153 - http://www.exploit-db.com/exploits/18922 +CVE-2012-1173 - https://bugzilla.redhat.com/show_bug.cgi?id=803078 +CVE-2012-1182 - https://www.samba.org/samba/security/CVE-2012-1182 +CVE-2012-1198 - http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html +CVE-2012-1199 - http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html +CVE-2012-1200 - http://packetstormsecurity.org/files/109669/Nova-CMS-Remote-File-Inclusion.html +CVE-2012-1207 - http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2012-1208 - http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2012-1210 - http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1211 - http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1212 - http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html +CVE-2012-1212 - http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html +CVE-2012-1213 - http://packetstormsecurity.org/files/109710/Zimbra-Cross-Site-Scripting.html +CVE-2012-1213 - http://st2tea.blogspot.com/2012/02/zimbra-cross-site-scripting.html +CVE-2012-1214 - http://packetstormsecurity.org/files/109618/#comment-10343 +CVE-2012-1214 - http://packetstormsecurity.org/files/109618/Yoono-Desktop-1.8.16-Cross-Site-Scripting.html +CVE-2012-1215 - http://packetstormsecurity.org/files/109617/#comment-10344 +CVE-2012-1215 - http://packetstormsecurity.org/files/109617/Yoono-Firefox-7.7.0-Cross-Site-Scripting.html +CVE-2012-1216 - http://packetstormsecurity.org/files/109706/PBBoard-2.1.4-Cross-Site-Request-Forgery-Shell-Upload.html +CVE-2012-1217 - http://packetstormsecurity.org/files/109665/STHS-v2-Web-Portal-2.2-SQL-Injection.html +CVE-2012-1218 - http://www.vulnerability-lab.com/get_content.php?id=402 +CVE-2012-1219 - http://www.vulnerability-lab.com/get_content.php?id=402 +CVE-2012-1224 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-004.txt +CVE-2012-1226 - http://www.exploit-db.com/exploits/18480 +CVE-2012-1226 - http://www.securityfocus.com/archive/1/521583 +CVE-2012-1226 - http://www.vulnerability-lab.com/get_content.php?id=428 +CVE-2012-1257 - http://developer.pidgin.im/ticket/14830 +CVE-2012-1258 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1258 - http://www.exploit-db.com/exploits/18750 +CVE-2012-1259 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1259 - http://www.exploit-db.com/exploits/18750 +CVE-2012-1260 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1260 - http://www.exploit-db.com/exploits/18750 +CVE-2012-1261 - http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1261 - http://www.exploit-db.com/exploits/18750 +CVE-2012-1262 - http://packetstormsecurity.org/files/110203/Movable-Type-Publishing-Platform-Cross-Site-Scripting.html +CVE-2012-1293 - http://www.openwall.com/lists/oss-security/2012/02/20/1 +CVE-2012-1294 - http://packetstormsecurity.org/files/109849/Impulsio-CMS-SQL-Injection.html +CVE-2012-1297 - http://packetstormsecurity.org/files/110214/ContaoCMS-2.11.0-Cross-Site-Request-Forgery.html +CVE-2012-1317 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-1366 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-1370 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html +CVE-2012-1417 - http://packetstormsecurity.org/files/110320/yealink-xss.txt +CVE-2012-1464 - http://www.exploit-db.com/exploits/18543 +CVE-2012-1465 - http://www.exploit-db.com/exploits/18541 +CVE-2012-1466 - http://www.exploit-db.com/exploits/18542 +CVE-2012-1467 - https://www.htbridge.com/advisory/HTB23079 +CVE-2012-1468 - https://www.htbridge.com/advisory/HTB23079 +CVE-2012-1469 - https://www.htbridge.com/advisory/HTB23079 +CVE-2012-1493 - http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/ +CVE-2012-1495 - https://packetstormsecurity.com/files/112323/WebCalendar-1.2.4-Pre-Auth-Remote-Code-Injection.html +CVE-2012-1495 - https://packetstormsecurity.com/files/112332/WebCalendar-1.2.4-Remote-Code-Execution.html +CVE-2012-1495 - https://www.exploit-db.com/exploits/18775 +CVE-2012-1498 - http://packetstormsecurity.org/files/110294/WebfolioCMS-1.1.4-Cross-Site-Request-Forgery.html +CVE-2012-1500 - https://web.archive.org/web/20121014055829/http://www.cloudscan.me/2012/09/cve-2012-1500-ghs-5375-ghs-5642.html +CVE-2012-1500 - https://www.exploit-db.com/exploits/21052 +CVE-2012-1503 - http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html +CVE-2012-1503 - http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html +CVE-2012-1503 - http://www.exploit-db.com/exploits/22151 +CVE-2012-1516 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html +CVE-2012-1517 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html +CVE-2012-1523 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1531 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-1531 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-1531 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-1532 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-1532 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-1533 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-1533 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-1541 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2012-1543 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2012-1545 - http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621 +CVE-2012-1561 - http://drupal.org/node/1432318 +CVE-2012-1563 - https://www.exploit-db.com/exploits/41156/ +CVE-2012-1580 - https://bugzilla.wikimedia.org/show_bug.cgi?id=35317 +CVE-2012-1584 - http://www.openwall.com/lists/oss-security/2012/03/21/11 +CVE-2012-1584 - http://www.openwall.com/lists/oss-security/2012/03/26/4 +CVE-2012-1593 - http://www.exploit-db.com/exploits/18758 +CVE-2012-1602 - http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html +CVE-2012-1603 - http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html +CVE-2012-1604 - http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html +CVE-2012-1613 - http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html +CVE-2012-1614 - http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html +CVE-2012-1626 - http://drupal.org/node/1401026 +CVE-2012-1632 - http://drupal.org/node/1401678 +CVE-2012-1633 - http://drupal.org/node/1401678 +CVE-2012-1641 - http://drupal.org/node/1432318 +CVE-2012-1654 - http://drupal.org/node/1470980 +CVE-2012-1661 - http://packetstormsecurity.org/files/113644/ESRI-ArcMap-Arbitrary-Code-Execution.html +CVE-2012-1661 - http://www.exploit-db.com/exploits/19138 +CVE-2012-1663 - http://www.exploit-db.com/exploits/24865 +CVE-2012-1667 - http://www.kb.cert.org/vuls/id/381699 +CVE-2012-1669 - http://packetstormsecurity.com/files/111114/phpMoneyBooks-1.0.2-Local-File-Inclusion.html +CVE-2012-1669 - http://seclists.org/fulldisclosure/2012/Mar/259 +CVE-2012-1669 - http://www.exploit-db.com/exploits/18648 +CVE-2012-1670 - http://www.exploit-db.com/exploits/18647/ +CVE-2012-1671 - http://www.exploit-db.com/exploits/18701 +CVE-2012-1672 - http://www.exploit-db.com/exploits/18702/ +CVE-2012-1673 - http://www.exploit-db.com/exploits/18700/ +CVE-2012-1674 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1675 - http://seclists.org/fulldisclosure/2012/Apr/204 +CVE-2012-1675 - http://seclists.org/fulldisclosure/2012/Apr/343 +CVE-2012-1675 - http://www.kb.cert.org/vuls/id/359816 +CVE-2012-1676 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1679 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1681 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1683 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1684 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1685 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-1686 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-1687 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1688 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1689 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1690 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1691 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1692 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1693 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1694 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1695 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1695 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2012-1696 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1697 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1698 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1702 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-1703 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1704 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1705 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-1706 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1707 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1708 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1709 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1710 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html +CVE-2012-1711 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1713 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1713 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1715 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1716 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1717 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1717 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1718 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1718 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1719 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1720 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1720 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1721 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1722 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1723 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1724 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1724 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1725 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1726 - http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html +CVE-2012-1727 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1728 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1729 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1730 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1731 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1732 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1733 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1734 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1735 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1736 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1737 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1738 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1739 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1740 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1741 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1742 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1743 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1744 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1745 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1746 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1747 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1748 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1749 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1750 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1751 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-1752 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1753 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1754 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1756 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1757 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1758 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1759 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1760 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1761 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1762 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1763 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-1764 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1765 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1766 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1766 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1767 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1767 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1768 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1768 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1769 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1769 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1770 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1770 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1771 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1771 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1772 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1772 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1773 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-1773 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-1777 - http://packetstormsecurity.org/files/111276/F5-FirePass-SSL-VPN-6.x-7.x-SQL-Injection.html +CVE-2012-1777 - http://seclists.org/fulldisclosure/2012/Mar/324 +CVE-2012-1779 - http://packetstormsecurity.org/files/110212/idev-BusinessDirectory-3.0-Cross-Site-Scripting.html +CVE-2012-1780 - http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1781 - http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-1782 - http://www.vulnerability-lab.com/get_content.php?id=461 +CVE-2012-1783 - http://www.exploit-db.com/exploits/18524 +CVE-2012-1784 - http://packetstormsecurity.org/files/110225/MyJobList-0.1.3-SQL-Injection.html +CVE-2012-1787 - http://packetstormsecurity.org/files/110219/Webglimpse-Brute-Force-Cross-Site-Scripting.html +CVE-2012-1788 - http://packetstormsecurity.org/files/110224/WonderDesk-Cross-Site-Scripting.html +CVE-2012-1788 - http://st2tea.blogspot.com/2012/02/wonderdesk-cross-site-scripting.html +CVE-2012-1790 - http://packetstormsecurity.org/files/110216 +CVE-2012-1790 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5075.php +CVE-2012-1803 - http://www.kb.cert.org/vuls/id/889195 +CVE-2012-1803 - http://www.kb.cert.org/vuls/id/MAPG-8RCPEN +CVE-2012-1825 - http://www.kb.cert.org/vuls/id/815532 +CVE-2012-1825 - http://www.kb.cert.org/vuls/id/MAPG-8TWMEJ +CVE-2012-1826 - http://dotcms.com/dotCMSVersions/ +CVE-2012-1826 - http://www.kb.cert.org/vuls/id/898083 +CVE-2012-1827 - http://www.kb.cert.org/vuls/id/773035 +CVE-2012-1827 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 +CVE-2012-1828 - http://www.kb.cert.org/vuls/id/773035 +CVE-2012-1828 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 +CVE-2012-1829 - http://www.kb.cert.org/vuls/id/773035 +CVE-2012-1829 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 +CVE-2012-1836 - http://www.kb.cert.org/vuls/id/212651 +CVE-2012-1839 - http://www.kb.cert.org/vuls/id/504019 +CVE-2012-1840 - http://www.kb.cert.org/vuls/id/504019 +CVE-2012-1841 - http://www.kb.cert.org/vuls/id/913483 +CVE-2012-1841 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 +CVE-2012-1841 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY +CVE-2012-1842 - http://www.kb.cert.org/vuls/id/913483 +CVE-2012-1842 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 +CVE-2012-1842 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY +CVE-2012-1843 - http://www.kb.cert.org/vuls/id/913483 +CVE-2012-1843 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 +CVE-2012-1843 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY +CVE-2012-1844 - http://www.kb.cert.org/vuls/id/913483 +CVE-2012-1844 - http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 +CVE-2012-1844 - http://www.kb.cert.org/vuls/id/MAPG-8NVRPY +CVE-2012-1844 - http://www.kb.cert.org/vuls/id/MORO-8QNJLE +CVE-2012-1845 - http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588 +CVE-2012-1846 - http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588 +CVE-2012-1856 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-060 +CVE-2012-1858 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1870 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-049 +CVE-2012-1872 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1873 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1874 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1875 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1876 - http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621 +CVE-2012-1876 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1877 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1878 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1879 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1880 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1881 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1882 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 +CVE-2012-1897 - http://packetstormsecurity.org/files/111116/Wolfcms-0.75-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-1898 - http://packetstormsecurity.org/files/111116/Wolfcms-0.75-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-1899 - http://packetstormsecurity.org/files/110524/Webfolio-CMS-1.1.4-Cross-Site-Scripting.html +CVE-2012-1900 - http://packetstormsecurity.org/files/110593/RazorCMS-1.2.1-STABLE-Cross-Site-Request-Forgery.html +CVE-2012-1900 - http://www.exploit-db.com/exploits/18575 +CVE-2012-1903 - https://web.archive.org/web/20160317182930/http://www.cloudscan.me/2013/03/cve-2012-1903-stored-xss-javascript.html +CVE-2012-1904 - http://packetstormsecurity.org/files/111162/RealPlayer-1.1.4-Memory-Corruption.html +CVE-2012-1908 - http://www.splunk.com/view/SP-CAAAGTK#38585 +CVE-2012-1910 - https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831 +CVE-2012-1911 - http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929 +CVE-2012-1911 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt +CVE-2012-1911 - http://www.exploit-db.com/exploits/18578 +CVE-2012-1912 - http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929 +CVE-2012-1912 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt +CVE-2012-1912 - http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html +CVE-2012-1912 - http://www.exploit-db.com/exploits/18578 +CVE-2012-1916 - http://www.kb.cert.org/vuls/id/743555 +CVE-2012-1917 - http://www.kb.cert.org/vuls/id/743555 +CVE-2012-1918 - http://www.kb.cert.org/vuls/id/743555 +CVE-2012-1919 - http://www.kb.cert.org/vuls/id/743555 +CVE-2012-1920 - http://www.kb.cert.org/vuls/id/743555 +CVE-2012-1921 - http://packetstormsecurity.org/files/110770/Sitecom-WLM-2501-Cross-Site-Request-Forgery.html +CVE-2012-1932 - https://packetstormsecurity.com/files/111185/Wolf-CMS-0.75-Persistent-Cross-Site-Scripting.html +CVE-2012-1933 - http://dev.sourcefabric.org/browse/CS-4179 +CVE-2012-1933 - http://www.exploit-db.com/exploits/18752 +CVE-2012-1934 - http://dev.sourcefabric.org/browse/CS-4179 +CVE-2012-1934 - http://dev.sourcefabric.org/browse/CS-4181 +CVE-2012-1934 - http://www.exploit-db.com/exploits/18752 +CVE-2012-1935 - http://dev.sourcefabric.org/browse/CS-4179 +CVE-2012-1935 - http://dev.sourcefabric.org/browse/CS-4182 +CVE-2012-1935 - http://dev.sourcefabric.org/browse/CS-4183 +CVE-2012-1935 - http://www.exploit-db.com/exploits/18752 +CVE-2012-1942 - https://bugzilla.mozilla.org/show_bug.cgi?id=748764 +CVE-2012-1943 - https://bugzilla.mozilla.org/show_bug.cgi?id=750850 +CVE-2012-1944 - https://bugzilla.mozilla.org/show_bug.cgi?id=751422 +CVE-2012-1945 - https://bugzilla.mozilla.org/show_bug.cgi?id=670514 +CVE-2012-1946 - https://bugzilla.mozilla.org/show_bug.cgi?id=750109 +CVE-2012-1948 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1948 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1949 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1950 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1950 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1950 - https://bugzilla.mozilla.org/show_bug.cgi?id=724247 +CVE-2012-1950 - https://bugzilla.mozilla.org/show_bug.cgi?id=724599 +CVE-2012-1950 - https://bugzilla.mozilla.org/show_bug.cgi?id=725611 +CVE-2012-1951 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1951 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1952 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1952 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1953 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1953 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1954 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1954 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1955 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1955 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1955 - https://bugzilla.mozilla.org/show_bug.cgi?id=757376 +CVE-2012-1956 - https://bugzilla.mozilla.org/show_bug.cgi?id=756719 +CVE-2012-1957 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1957 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1957 - https://bugzilla.mozilla.org/show_bug.cgi?id=750096 +CVE-2012-1958 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1958 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1958 - https://bugzilla.mozilla.org/show_bug.cgi?id=750820 +CVE-2012-1959 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1959 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1960 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1961 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1961 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1962 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1962 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1963 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1963 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1963 - https://bugzilla.mozilla.org/show_bug.cgi?id=767778 +CVE-2012-1964 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1964 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1965 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1965 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1966 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1966 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1966 - https://bugzilla.mozilla.org/show_bug.cgi?id=734076 +CVE-2012-1967 - http://rhn.redhat.com/errata/RHSA-2012-1088.html +CVE-2012-1967 - http://www.ubuntu.com/usn/USN-1509-1 +CVE-2012-1978 - http://packetstormsecurity.com/files/111408/Simple-PHP-Agenda-2.2.8-Cross-Site-Request-Forgery.html +CVE-2012-1979 - http://packetstormsecurity.org/files/111405/SyndeoCMS-3.0.01-Cross-Site-Scripting.html +CVE-2012-20001 - https://seclists.org/bugtraq/2012/Nov/1 +CVE-2012-2052 - http://seclists.org/bugtraq/2012/May/58 +CVE-2012-2056 - http://drupal.org/node/1482126 +CVE-2012-2057 - http://drupal.org/node/1482126 +CVE-2012-2058 - http://drupal.org/node/1482126 +CVE-2012-2059 - http://drupal.org/node/1482126 +CVE-2012-2060 - http://drupal.org/node/1482126 +CVE-2012-2061 - http://drupal.org/node/1482126 +CVE-2012-2062 - http://drupal.org/node/1482126 +CVE-2012-2096 - http://drupal.org/node/1528614 +CVE-2012-2098 - http://packetstormsecurity.org/files/113014/Apache-Commons-Compress-Apache-Ant-Denial-Of-Service.html +CVE-2012-2098 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2012-2098 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2012-2099 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-005.txt +CVE-2012-2102 - http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/ +CVE-2012-2113 - https://bugzilla.redhat.com/show_bug.cgi?id=810551 +CVE-2012-2115 - http://seclists.org/fulldisclosure/2012/Jan/27 +CVE-2012-2115 - http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/ +CVE-2012-2115 - http://www.openwall.com/lists/oss-security/2012/04/17/1 +CVE-2012-2115 - http://www.openwall.com/lists/oss-security/2012/04/18/7 +CVE-2012-2121 - http://www.ubuntu.com/usn/USN-1577-1 +CVE-2012-2123 - https://bugzilla.redhat.com/show_bug.cgi?id=806722 +CVE-2012-2124 - https://bugzilla.redhat.com/show_bug.cgi?id=814671 +CVE-2012-2127 - http://www.kernel.org/pub/linux/kernel/v3.x/ +CVE-2012-2127 - http://www.ubuntu.com/usn/USN-1594-1 +CVE-2012-2128 - http://seclists.org/bugtraq/2012/Apr/121 +CVE-2012-2128 - http://www.openwall.com/lists/oss-security/2012/04/22/4 +CVE-2012-2128 - http://www.openwall.com/lists/oss-security/2012/04/23/1 +CVE-2012-2128 - https://bugzilla.redhat.com/show_bug.cgi?id=815122 +CVE-2012-2129 - http://seclists.org/bugtraq/2012/Apr/121 +CVE-2012-2129 - http://www.openwall.com/lists/oss-security/2012/04/22/4 +CVE-2012-2129 - http://www.openwall.com/lists/oss-security/2012/04/23/1 +CVE-2012-2129 - https://bugzilla.redhat.com/show_bug.cgi?id=815122 +CVE-2012-2135 - http://www.ubuntu.com/usn/USN-1616-1 +CVE-2012-2137 - http://www.ubuntu.com/usn/USN-1594-1 +CVE-2012-2139 - https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f +CVE-2012-2149 - http://packetstormsecurity.org/files/112862/libwpd-WPXContentListener-_closeTableRow-Memory-Overwrite.html +CVE-2012-2150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2012-2208 - http://www.exploit-db.com/exploits/18782 +CVE-2012-2209 - http://www.exploit-db.com/exploits/18782 +CVE-2012-2211 - http://packetstormsecurity.org/files/111626/egroupware-xss.txt +CVE-2012-2227 - http://www.exploit-db.com/exploits/18828 +CVE-2012-2234 - http://packetstormsecurity.org/files/111905/ +CVE-2012-2243 - https://bugs.launchpad.net/mahara/+bug/1055232 +CVE-2012-2246 - https://bugs.launchpad.net/mahara/+bug/1057240 +CVE-2012-2270 - http://packetstormsecurity.org/files/111956/ownCloud-3.0.0-Cross-Site-Scripting.html +CVE-2012-2271 - http://www.exploit-db.com/exploits/18892/ +CVE-2012-2275 - http://packetstormsecurity.org/files/116275/TestLink-1.9.3-Cross-Site-Request-Forgery.html +CVE-2012-2275 - http://www.exploit-db.com/exploits/21135 +CVE-2012-2276 - http://aluigi.org/adv/irm_1-adv.txt +CVE-2012-2276 - http://www.exploit-db.com/exploits/18734 +CVE-2012-2277 - http://aluigi.org/adv/irm_1-adv.txt +CVE-2012-2277 - http://www.exploit-db.com/exploits/18734 +CVE-2012-2371 - http://packetstormsecurity.org/files/112658/WordPress-WP-FaceThumb-Gallery-0.1-Cross-Site-Scripting.html +CVE-2012-2372 - http://www.ubuntu.com/usn/USN-1556-1 +CVE-2012-2376 - http://isc.sans.edu/diary.html?storyid=13255 +CVE-2012-2376 - http://openwall.com/lists/oss-security/2012/05/20/2 +CVE-2012-2376 - https://bugzilla.redhat.com/show_bug.cgi?id=823464 +CVE-2012-2395 - https://github.com/cobbler/cobbler/commit/6d9167e5da44eca56bdf42b5776097a6779aaadf +CVE-2012-2396 - http://www.exploit-db.com/exploits/18757/ +CVE-2012-2399 - http://make.wordpress.org/core/2013/06/21/secure-swfupload/ +CVE-2012-2399 - http://packetstormsecurity.com/files/120746/SWFUpload-Content-Spoofing-Cross-Site-Scripting.html +CVE-2012-2399 - http://packetstormsecurity.com/files/122399/tinymce11-xss.txt +CVE-2012-2401 - https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ +CVE-2012-2425 - http://packetstormsecurity.org/files/111403/Intuit-Help-System-Protocol-File-Retrieval.html +CVE-2012-2437 - http://packetstormsecurity.org/files/117975/AWCM-2.2-Access-Bypass.html +CVE-2012-2438 - http://packetstormsecurity.org/files/117975/AWCM-2.2-Access-Bypass.html +CVE-2012-2441 - http://www.kb.cert.org/vuls/id/889195 +CVE-2012-2442 - http://packetstormsecurity.org/files/112295/Nokia-CP-Suite-Video-Manager-7.1.180.64-Denial-Of-Service.html +CVE-2012-2442 - http://www.exploit-db.com/exploits/18795 +CVE-2012-2446 - http://www.kb.cert.org/vuls/id/763795 +CVE-2012-2447 - http://www.kb.cert.org/vuls/id/763795 +CVE-2012-2448 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html +CVE-2012-2449 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html +CVE-2012-2450 - http://www.vmware.com/security/advisories/VMSA-2012-0009.html +CVE-2012-2498 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html +CVE-2012-2499 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html +CVE-2012-2500 - http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html +CVE-2012-2511 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities +CVE-2012-2512 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities +CVE-2012-2513 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities +CVE-2012-2514 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities +CVE-2012-2568 - http://www.kb.cert.org/vuls/id/515283 +CVE-2012-2570 - http://www.exploit-db.com/exploits/20010 +CVE-2012-2576 - http://www.exploit-db.com/exploits/18833 +CVE-2012-2577 - http://www.kb.cert.org/vuls/id/174119 +CVE-2012-2582 - http://www.kb.cert.org/vuls/id/582879 +CVE-2012-2585 - http://www.exploit-db.com/exploits/20356/ +CVE-2012-2591 - http://packetstormsecurity.org/files/115354/EmailArchitect-Enterprise-Email-Server-10.0-Cross-Site-Scripting.html +CVE-2012-2601 - http://www.exploit-db.com/exploits/20035 +CVE-2012-2601 - http://www.kb.cert.org/vuls/id/777007 +CVE-2012-2602 - http://www.kb.cert.org/vuls/id/174119 +CVE-2012-2603 - http://www.kb.cert.org/vuls/id/442595 +CVE-2012-2603 - http://www.kb.cert.org/vuls/id/MAPG-8RJPJX +CVE-2012-2604 - http://www.kb.cert.org/vuls/id/709939 +CVE-2012-2604 - http://www.kb.cert.org/vuls/id/MAPG-8TJKAF +CVE-2012-2605 - http://www.kb.cert.org/vuls/id/709939 +CVE-2012-2605 - http://www.kb.cert.org/vuls/id/MAPG-8TJKAF +CVE-2012-2606 - http://www.kb.cert.org/vuls/id/709939 +CVE-2012-2606 - http://www.kb.cert.org/vuls/id/MAPG-8TJKAF +CVE-2012-2607 - http://www.kb.cert.org/vuls/id/977312 +CVE-2012-2607 - http://www.kb.cert.org/vuls/id/MORO-8UYN8P +CVE-2012-2611 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities +CVE-2012-2612 - http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities +CVE-2012-2614 - http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow +CVE-2012-2614 - http://www.exploit-db.com/exploits/19340 +CVE-2012-2619 - http://www.coresecurity.com/content/broadcom-input-validation-BCM4325-BCM4329 +CVE-2012-2619 - http://www.kb.cert.org/vuls/id/160027 +CVE-2012-2629 - http://packetstormsecurity.com/files/112748/Axous-1.1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-2657 - http://www.openwall.com/lists/oss-security/2012/05/29/10 +CVE-2012-2657 - http://www.openwall.com/lists/oss-security/2012/05/29/7 +CVE-2012-2658 - http://www.openwall.com/lists/oss-security/2012/05/29/10 +CVE-2012-2658 - http://www.openwall.com/lists/oss-security/2012/05/29/7 +CVE-2012-2664 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-2670 - http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html +CVE-2012-2671 - https://github.com/rtomayko/rack-cache/blob/master/CHANGES +CVE-2012-2673 - http://www.ubuntu.com/usn/USN-1546-1 +CVE-2012-2679 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79260 +CVE-2012-2687 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2012-2720 - http://drupal.org/node/1619808 +CVE-2012-2724 - http://drupal.org/node/1619818 +CVE-2012-2724 - http://drupal.org/node/1619848 +CVE-2012-2737 - http://www.ubuntu.com/usn/USN-1485-1 +CVE-2012-2738 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2012-2739 - http://www.ocert.org/advisories/ocert-2011-003.html +CVE-2012-2740 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php +CVE-2012-2741 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php +CVE-2012-2751 - http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html +CVE-2012-2751 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2012-2760 - http://packetstormsecurity.org/files/112991/Mod_Auth_OpenID-Session-Stealing.html +CVE-2012-2763 - http://www.openwall.com/lists/oss-security/2012/05/31/1 +CVE-2012-2763 - http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html +CVE-2012-2772 - http://ffmpeg.org/security.html +CVE-2012-2774 - http://ffmpeg.org/security.html +CVE-2012-2775 - http://ffmpeg.org/security.html +CVE-2012-2776 - http://ffmpeg.org/security.html +CVE-2012-2777 - http://ffmpeg.org/security.html +CVE-2012-2779 - http://ffmpeg.org/security.html +CVE-2012-2782 - http://ffmpeg.org/security.html +CVE-2012-2783 - http://ffmpeg.org/security.html +CVE-2012-2784 - http://ffmpeg.org/security.html +CVE-2012-2785 - http://ffmpeg.org/security.html +CVE-2012-2786 - http://ffmpeg.org/security.html +CVE-2012-2787 - http://ffmpeg.org/security.html +CVE-2012-2788 - http://ffmpeg.org/security.html +CVE-2012-2789 - http://ffmpeg.org/security.html +CVE-2012-2790 - http://ffmpeg.org/security.html +CVE-2012-2791 - http://ffmpeg.org/security.html +CVE-2012-2792 - http://ffmpeg.org/security.html +CVE-2012-2793 - http://ffmpeg.org/security.html +CVE-2012-2794 - http://ffmpeg.org/security.html +CVE-2012-2795 - http://ffmpeg.org/security.html +CVE-2012-2796 - http://ffmpeg.org/security.html +CVE-2012-2797 - http://ffmpeg.org/security.html +CVE-2012-2798 - http://ffmpeg.org/security.html +CVE-2012-2799 - http://ffmpeg.org/security.html +CVE-2012-2800 - http://ffmpeg.org/security.html +CVE-2012-2801 - http://ffmpeg.org/security.html +CVE-2012-2802 - http://ffmpeg.org/security.html +CVE-2012-2803 - http://ffmpeg.org/security.html +CVE-2012-2804 - http://ffmpeg.org/security.html +CVE-2012-2808 - http://blog.watchfire.com/files/androiddnsweakprng.pdf +CVE-2012-2814 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2012-2843 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15569 +CVE-2012-2889 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15829 +CVE-2012-2903 - http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html +CVE-2012-2905 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5091.php +CVE-2012-2906 - http://packetstormsecurity.org/files/112804/Artiphp-CMS-5.5.0-Cross-Site-Scripting.html +CVE-2012-2906 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php +CVE-2012-2908 - http://www.exploit-db.com/exploits/18873 +CVE-2012-2908 - http://www.vulnerability-lab.com/get_content.php?id=525 +CVE-2012-2909 - http://www.exploit-db.com/exploits/18873 +CVE-2012-2909 - http://www.vulnerability-lab.com/get_content.php?id=525 +CVE-2012-2910 - http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html +CVE-2012-2910 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php +CVE-2012-2911 - http://packetstormsecurity.org/files/112801/SiliSoftware-backupDB-1.2.7a-Cross-Site-Scripting.html +CVE-2012-2911 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5089.php +CVE-2012-2912 - http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html +CVE-2012-2913 - http://packetstormsecurity.org/files/112699/WordPress-Leaflet-0.0.1-Cross-Site-Scripting.html +CVE-2012-2914 - http://packetstormsecurity.org/files/112785/Unijimpe-Captcha-Cross-Site-Scripting.html +CVE-2012-2916 - http://packetstormsecurity.org/files/112692/WordPress-SABRE-1.2.0-Cross-Site-Scripting.html +CVE-2012-2917 - http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html +CVE-2012-2918 - http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html +CVE-2012-2919 - http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html +CVE-2012-2921 - https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706 +CVE-2012-2921 - https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py +CVE-2012-2923 - http://www.exploit-db.com/exploits/18858 +CVE-2012-2924 - http://www.exploit-db.com/exploits/18858 +CVE-2012-2925 - http://www.exploit-db.com/exploits/18845 +CVE-2012-2938 - http://www.exploit-db.com/exploits/18871 +CVE-2012-2938 - http://www.vulnerability-lab.com/get_content.php?id=530 +CVE-2012-2939 - http://iel-sayed.blogspot.com/2012/05/travelon-express-cms-v622-multiple-web.html +CVE-2012-2939 - http://www.exploit-db.com/exploits/18871 +CVE-2012-2939 - http://www.vulnerability-lab.com/get_content.php?id=530 +CVE-2012-2941 - http://packetstormsecurity.org/files/112945/Yandex.Server-2010-9.0-Enterprise-Cross-Site-Scripting.html +CVE-2012-2943 - http://packetstormsecurity.org/files/112859/Cryptographp-Local-File-Inclusion-HTTP-Response-Splitting.html +CVE-2012-2956 - http://www.exploit-db.com/exploits/20063 +CVE-2012-2959 - http://www.kb.cert.org/vuls/id/221180 +CVE-2012-2971 - http://packetstormsecurity.com/files/119543/Security-Notice-For-CA-ARCserve-Backup.html +CVE-2012-2972 - http://packetstormsecurity.com/files/119543/Security-Notice-For-CA-ARCserve-Backup.html +CVE-2012-2972 - http://www.kb.cert.org/vuls/id/408099 +CVE-2012-2974 - http://www.kb.cert.org/vuls/id/377915 +CVE-2012-2975 - http://www.kb.cert.org/vuls/id/143395 +CVE-2012-2980 - http://www.kb.cert.org/vuls/id/251635 +CVE-2012-2980 - http://www.kb.cert.org/vuls/id/MAPG-8R5LD6 +CVE-2012-2981 - http://www.kb.cert.org/vuls/id/788478 +CVE-2012-2982 - http://www.kb.cert.org/vuls/id/788478 +CVE-2012-2983 - http://www.kb.cert.org/vuls/id/788478 +CVE-2012-2984 - http://www.kb.cert.org/vuls/id/318779 +CVE-2012-2985 - http://www.kb.cert.org/vuls/id/247235 +CVE-2012-2986 - http://www.kb.cert.org/vuls/id/441363 +CVE-2012-2991 - http://www.kb.cert.org/vuls/id/459446 +CVE-2012-2993 - http://www.kb.cert.org/vuls/id/389795 +CVE-2012-2994 - http://www.kb.cert.org/vuls/id/591667 +CVE-2012-2995 - http://www.kb.cert.org/vuls/id/471364 +CVE-2012-2996 - http://www.kb.cert.org/vuls/id/471364 +CVE-2012-2998 - http://www.kb.cert.org/vuls/id/950795 +CVE-2012-2999 - http://www.kb.cert.org/vuls/id/989684 +CVE-2012-3000 - http://packetstormsecurity.com/files/119739/F5-BIG-IP-11.2.0-SQL-Injection.html +CVE-2012-3002 - http://www.kb.cert.org/vuls/id/265532 +CVE-2012-3062 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-3106 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-3106 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3107 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-3107 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3108 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-3108 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3109 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-3109 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3110 - http://www.kb.cert.org/vuls/id/118913 +CVE-2012-3110 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3111 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3112 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3113 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3114 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3115 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3116 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3117 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3118 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3119 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3120 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3121 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3122 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3123 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3124 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3125 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3126 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3127 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3128 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3129 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3130 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3131 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3132 - http://www.darkreading.com/database-security/167901020/security/news/240004776/hacking-oracle-database-indexes.html +CVE-2012-3132 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3134 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3135 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html +CVE-2012-3137 - http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ +CVE-2012-3137 - http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular +CVE-2012-3137 - http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html +CVE-2012-3137 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2012-3137 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3138 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3139 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3140 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3141 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3142 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3143 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-3143 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-3144 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3144 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3145 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3146 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3147 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3147 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3148 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3149 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3149 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3150 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3150 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3151 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3152 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3152 - http://www.youtube.com/watch?v=NinvMDOj7sM +CVE-2012-3153 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3154 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3155 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3156 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3156 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3157 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3158 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3158 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3159 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-3159 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-3160 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3160 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3161 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3162 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3163 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3163 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3164 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3165 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3166 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3166 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3167 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3167 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3171 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3173 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3173 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3175 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3176 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3177 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3177 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3179 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3180 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3180 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3181 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3182 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3183 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3184 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3185 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3186 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3187 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3188 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3189 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3191 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3193 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3194 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3195 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3196 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3197 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3197 - http://www.ubuntu.com/usn/USN-1621-1 +CVE-2012-3198 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3199 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3200 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3201 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3202 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3203 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3204 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3205 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3206 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3207 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3208 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3209 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3210 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3211 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3212 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3213 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2012-3214 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3215 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3216 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-3216 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-3217 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3221 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3222 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3223 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3224 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3225 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3226 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3227 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3228 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3229 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3230 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-3236 - http://www.exploit-db.com/exploits/19482 +CVE-2012-3236 - http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html +CVE-2012-3342 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2012-3347 - http://www.kb.cert.org/vuls/id/773035 +CVE-2012-3347 - http://www.kb.cert.org/vuls/id/MAPG-8RQL83 +CVE-2012-3350 - http://www.exploit-db.com/exploits/19629 +CVE-2012-3351 - https://www.exploit-db.com/exploits/37552 +CVE-2012-3351 - https://www.exploit-db.com/exploits/37672 +CVE-2012-3358 - http://www.openwall.com/lists/oss-security/2012/07/11/1 +CVE-2012-3362 - http://www.autosectools.com/Advisories/eXtplorer.2.1.RC3_Cross-site.Request.Forgery_174.html +CVE-2012-3372 - http://www.theregister.co.uk/2012/07/07/cyberoam_tor_ssl_spying_flap/ +CVE-2012-3386 - https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html +CVE-2012-3399 - http://www.openwall.com/lists/oss-security/2012/07/09/4 +CVE-2012-3399 - http://www.openwall.com/lists/oss-security/2012/07/10/1 +CVE-2012-3400 - http://www.ubuntu.com/usn/USN-1556-1 +CVE-2012-3400 - http://www.ubuntu.com/usn/USN-1557-1 +CVE-2012-3407 - http://www.openwall.com/lists/oss-security/2012/07/11/16 +CVE-2012-3410 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278 +CVE-2012-3411 - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2012-3412 - http://www.ubuntu.com/usn/USN-1568-1 +CVE-2012-3412 - http://www.ubuntu.com/usn/USN-1577-1 +CVE-2012-3414 - http://make.wordpress.org/core/2013/06/21/secure-swfupload/ +CVE-2012-3414 - http://packetstormsecurity.com/files/122399/TinyMCE-Image-Manager-1.1-Cross-Site-Scripting.html +CVE-2012-3414 - https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ +CVE-2012-3418 - https://bugzilla.redhat.com/show_bug.cgi?id=840920 +CVE-2012-3430 - http://www.ubuntu.com/usn/USN-1568-1 +CVE-2012-3430 - http://www.ubuntu.com/usn/USN-1577-1 +CVE-2012-3434 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt +CVE-2012-3440 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-3448 - https://www.exploit-db.com/exploits/38030/ +CVE-2012-3450 - https://bugs.php.net/bug.php?id=61755 +CVE-2012-3455 - http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf +CVE-2012-3456 - http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf +CVE-2012-3483 - http://www.openwall.com/lists/oss-security/2012/08/14/1 +CVE-2012-3484 - http://www.openwall.com/lists/oss-security/2012/08/14/1 +CVE-2012-3485 - http://www.openwall.com/lists/oss-security/2012/08/14/1 +CVE-2012-3486 - http://www.openwall.com/lists/oss-security/2012/08/14/1 +CVE-2012-3487 - http://www.openwall.com/lists/oss-security/2012/08/14/1 +CVE-2012-3511 - http://www.ubuntu.com/usn/USN-1577-1 +CVE-2012-3512 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684075 +CVE-2012-3515 - http://www.ubuntu.com/usn/USN-1590-1 +CVE-2012-3520 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2012-3520 - https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea +CVE-2012-3524 - http://stealth.openwall.net/null/dzug.c +CVE-2012-3524 - http://www.exploit-db.com/exploits/21323 +CVE-2012-3544 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2012-3544 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2012-3544 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2012-3569 - http://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html +CVE-2012-3569 - http://www.vmware.com/security/advisories/VMSA-2012-0015.html +CVE-2012-3571 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-3577 - http://packetstormsecurity.org/files/113287/WordPress-Nmedia-WP-Member-Conversation-1.35.0-Shell-Upload.html +CVE-2012-3578 - http://packetstormsecurity.org/files/113323/WordPress-FCChat-Widget-2.x-Shell-Upload.html +CVE-2012-3579 - http://packetstormsecurity.com/files/116277/Symantec-Messaging-Gateway-9.5-Default-SSH-Password.html +CVE-2012-3585 - http://www.reactionpenetrationtesting.co.uk/Irfanview-JLS-Heap-Overflow.html +CVE-2012-3647 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17516 +CVE-2012-3752 - http://packetstormsecurity.com/files/118359/Apple-QuickTime-7.7.2-TeXML-Style-Element-font-table-Field-Stack-Buffer-Overflow.html +CVE-2012-3753 - http://packetstormsecurity.com/files/118421/Apple-QuickTime-7.7.2-MIME-Type-Buffer-Overflow.html +CVE-2012-3755 - http://packetstormsecurity.org/files/118231/Apple-QuickTime-7.7.2-Buffer-Overflow.html +CVE-2012-3791 - http://www.exploit-db.com/exploits/18955 +CVE-2012-3792 - http://aluigi.org/adv/proservrex_1-adv.txt +CVE-2012-3793 - http://aluigi.org/adv/proservrex_1-adv.txt +CVE-2012-3794 - http://aluigi.org/adv/proservrex_1-adv.txt +CVE-2012-3795 - http://aluigi.org/adv/proservrex_1-adv.txt +CVE-2012-3796 - http://aluigi.org/adv/proservrex_1-adv.txt +CVE-2012-3797 - http://aluigi.org/adv/proservrex_1-adv.txt +CVE-2012-3800 - http://drupalcode.org/project/og.git/commitdiff/d48fef5 +CVE-2012-3806 - https://packetstormsecurity.com/files/cve/CVE-2012-3806 +CVE-2012-3806 - https://www.tenable.com/plugins/nessus/65612 +CVE-2012-3807 - https://packetstormsecurity.com/files/cve/CVE-2012-3806 +CVE-2012-3807 - https://www.tenable.com/plugins/nessus/65612 +CVE-2012-3808 - https://packetstormsecurity.com/files/cve/CVE-2012-3808 +CVE-2012-3808 - https://www.tenable.com/plugins/nessus/65612 +CVE-2012-3809 - https://packetstormsecurity.com/files/cve/CVE-2012-3809 +CVE-2012-3809 - https://www.tenable.com/plugins/nessus/65612 +CVE-2012-3810 - https://packetstormsecurity.com/files/cve/CVE-2012-3809 +CVE-2012-3810 - https://www.tenable.com/plugins/nessus/65612 +CVE-2012-3816 - http://www.exploit-db.com/exploits/18945 +CVE-2012-3828 - http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html +CVE-2012-3829 - http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html +CVE-2012-3830 - http://www.redteam-pentesting.de/en/advisories/rt-sa-2012-002/-php-decoda-cross-site-scripting-in-video-tags +CVE-2012-3832 - https://github.com/milesj/php-decoda/commit/6f2b9fb48bc110edeab17459038feb2627d52320 +CVE-2012-3833 - http://packetstormsecurity.org/files/112243/Quick.CMS-4.0-Cross-Site-Scripting.html +CVE-2012-3834 - http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html +CVE-2012-3834 - http://www.exploit-db.com/exploits/18800 +CVE-2012-3835 - http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html +CVE-2012-3835 - http://www.exploit-db.com/exploits/18800 +CVE-2012-3836 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php +CVE-2012-3837 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php +CVE-2012-3838 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php +CVE-2012-3839 - http://www.exploit-db.com/exploits/18814 +CVE-2012-3840 - http://www.exploit-db.com/exploits/18814 +CVE-2012-3841 - http://packetstormsecurity.org/files/112218/KMPlayer-3.2.0.19-DLL-Hijack.html +CVE-2012-3842 - http://www.vulnerability-lab.com/get_content.php?id=509 +CVE-2012-3843 - http://packetstormsecurity.org/files/112241/e107-Cross-Site-Scripting.html +CVE-2012-3844 - http://packetstormsecurity.org/files/112385/vBulletin-4.1.12-Cross-Site-Scripting.html +CVE-2012-3846 - http://packetstormsecurity.org/files/112375/PHP-Pastebin-Cross-Site-Scripting.html +CVE-2012-3870 - http://packetstormsecurity.org/files/115276/Openconstructor-CMS-3.12.0-Cross-Site-Scripting.html +CVE-2012-3871 - http://packetstormsecurity.org/files/115285/Openconstructor-CMS-3.12.0-i_hybrid.php-XSS.html +CVE-2012-3872 - http://packetstormsecurity.org/files/115284/Openconstructor-CMS-3.12.0-Reflected-XSS.html +CVE-2012-3873 - http://packetstormsecurity.org/files/115286/Openconstructor-CMS-3.12.0-SQL-Injection.html +CVE-2012-3935 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-cupxcp +CVE-2012-3946 - http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_caveats_15_3_2s.html +CVE-2012-3965 - https://bugzilla.mozilla.org/show_bug.cgi?id=769108 +CVE-2012-3972 - https://bugzilla.mozilla.org/show_bug.cgi?id=746855 +CVE-2012-3973 - https://bugzilla.mozilla.org/show_bug.cgi?id=757128 +CVE-2012-3980 - https://bugzilla.mozilla.org/show_bug.cgi?id=771859 +CVE-2012-3984 - https://bugzilla.mozilla.org/show_bug.cgi?id=575294 +CVE-2012-3992 - https://bugzilla.mozilla.org/show_bug.cgi?id=775009 +CVE-2012-3993 - https://bugzilla.mozilla.org/show_bug.cgi?id=768101 +CVE-2012-3996 - http://www.exploit-db.com/exploits/19573 +CVE-2012-3996 - http://www.exploit-db.com/exploits/19630 +CVE-2012-4024 - http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel +CVE-2012-4025 - http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel +CVE-2012-4026 - http://www.kb.cert.org/vuls/id/977312 +CVE-2012-4026 - http://www.kb.cert.org/vuls/id/MORO-8UYN8P +CVE-2012-4029 - https://packetstormsecurity.com/files/115927/Chamilo-1.8.8.4-XSS-File-Deletion.html +CVE-2012-4032 - http://packetstormsecurity.org/files/114541/WebsitePanel-CMS-Open-Redirect.html +CVE-2012-4037 - http://www.madirish.net/541 +CVE-2012-4037 - https://trac.transmissionbt.com/ticket/4979 +CVE-2012-4051 - http://www.kb.cert.org/vuls/id/555668 +CVE-2012-4055 - http://packetstormsecurity.org/files/112287/Uiga-FanClub-SQL-Injection.html +CVE-2012-4056 - http://packetstormsecurity.org/files/112288/Uiga-Personal-Portal-SQL-Injection.html +CVE-2012-4057 - http://www.exploit-db.com/exploits/18799 +CVE-2012-4058 - http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-4059 - http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-4060 - http://packetstormsecurity.org/files/112259/ASP-DEv-XM-Forums-SQL-Injection.html +CVE-2012-4061 - http://packetstormsecurity.org/files/112257/ASP-DEv-XM-Diary-SQL-Injection.html +CVE-2012-4097 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4097 +CVE-2012-4098 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098 +CVE-2012-4099 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099 +CVE-2012-4172 - http://www.kb.cert.org/vuls/id/872545 +CVE-2012-4173 - http://www.kb.cert.org/vuls/id/872545 +CVE-2012-4174 - http://www.kb.cert.org/vuls/id/872545 +CVE-2012-4175 - http://www.kb.cert.org/vuls/id/872545 +CVE-2012-4176 - http://www.kb.cert.org/vuls/id/872545 +CVE-2012-4177 - http://seclists.org/fulldisclosure/2012/Jul/375 +CVE-2012-4178 - http://www.exploit-db.com/exploits/20123 +CVE-2012-4189 - https://bugzilla.mozilla.org/show_bug.cgi?id=790296 +CVE-2012-4192 - http://www.thespanner.co.uk/2012/10/10/firefox-knows-what-your-friends-did-last-summer/ +CVE-2012-4192 - https://bugzilla.mozilla.org/show_bug.cgi?id=799952 +CVE-2012-4194 - http://www.ubuntu.com/usn/USN-1620-2 +CVE-2012-4194 - https://bugzilla.mozilla.org/show_bug.cgi?id=800666 +CVE-2012-4195 - http://www.ubuntu.com/usn/USN-1620-2 +CVE-2012-4196 - http://www.ubuntu.com/usn/USN-1620-2 +CVE-2012-4206 - https://bugzilla.mozilla.org/show_bug.cgi?id=792106 +CVE-2012-4209 - https://bugzilla.mozilla.org/show_bug.cgi?id=792405 +CVE-2012-4210 - https://bugzilla.mozilla.org/show_bug.cgi?id=796866 +CVE-2012-4220 - http://www.kb.cert.org/vuls/id/702452 +CVE-2012-4221 - http://www.kb.cert.org/vuls/id/702452 +CVE-2012-4222 - http://www.kb.cert.org/vuls/id/702452 +CVE-2012-4226 - http://packetstormsecurity.com/files/115463/WordPress-Quick-Post-Widget-1.9.1-Cross-Site-Scripting.html +CVE-2012-4226 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-016.txt +CVE-2012-4230 - http://packetstormsecurity.com/files/120750/TinyMCE-3.5.8-Cross-Site-Scripting.html +CVE-2012-4230 - http://seclists.org/fulldisclosure/2013/Mar/114 +CVE-2012-4230 - http://www.madirish.net/554 +CVE-2012-4234 - http://packetstormsecurity.org/files/116057/Phorum-5.2.18-Cross-Site-Scripting.html +CVE-2012-4236 - http://www.openwall.com/lists/oss-security/2012/08/13/7 +CVE-2012-4241 - http://packetstormsecurity.com/files/116714/Microcart-1.0-Checkout-Cross-Site-Scripting.html +CVE-2012-4241 - http://packetstormsecurity.com/files/116721/Microcart-1.0-Cross-Site-Scripting.html +CVE-2012-4248 - http://www.kb.cert.org/vuls/id/122656 +CVE-2012-4248 - http://www.kb.cert.org/vuls/id/MORO-8WKGBN +CVE-2012-4249 - http://www.kb.cert.org/vuls/id/122656 +CVE-2012-4249 - http://www.kb.cert.org/vuls/id/MORO-8WKGBN +CVE-2012-4251 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html +CVE-2012-4252 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html +CVE-2012-4253 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html +CVE-2012-4254 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html +CVE-2012-4255 - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html +CVE-2012-4256 - http://packetstormsecurity.org/files/112233/jNews-7.5.1-Information-Disclosure.html +CVE-2012-4257 - http://packetstormsecurity.org/files/112248/Yaqas-CMS-Alpha1-Information-Disclosure.html +CVE-2012-4258 - http://packetstormsecurity.org/files/112480/MYRE-Real-Estate-Mobile-2012-2-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-4258 - http://www.exploit-db.com/exploits/18843 +CVE-2012-4258 - http://www.vulnerability-lab.com/get_content.php?id=516 +CVE-2012-4259 - http://www.exploit-db.com/exploits/18802 +CVE-2012-4260 - http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-4260 - http://www.exploit-db.com/exploits/18844 +CVE-2012-4260 - http://www.vulnerability-lab.com/get_content.php?id=524 +CVE-2012-4262 - http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-4262 - http://www.exploit-db.com/exploits/18844 +CVE-2012-4262 - http://www.vulnerability-lab.com/get_content.php?id=524 +CVE-2012-4263 - http://packetstormsecurity.org/files/112617/WordPress-Better-WP-Security-Cross-Site-Scripting.html +CVE-2012-4265 - http://www.exploit-db.com/exploits/18872 +CVE-2012-4265 - http://www.vulnerability-lab.com/get_content.php?id=512 +CVE-2012-4266 - http://www.exploit-db.com/exploits/18872 +CVE-2012-4266 - http://www.vulnerability-lab.com/get_content.php?id=512 +CVE-2012-4268 - http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html +CVE-2012-4269 - http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html +CVE-2012-4270 - http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html +CVE-2012-4271 - http://packetstormsecurity.org/files/112619/WordPress-Bad-Behavior-Cross-Site-Scripting.html +CVE-2012-4273 - http://packetstormsecurity.org/files/112615/WordPress-2-Click-Socialmedia-Buttons-Cross-Site-Scripting.html +CVE-2012-4278 - http://www.exploit-db.com/exploits/18874 +CVE-2012-4278 - http://www.vulnerability-lab.com/get_content.php?id=513 +CVE-2012-4279 - http://www.exploit-db.com/exploits/18874 +CVE-2012-4279 - http://www.vulnerability-lab.com/get_content.php?id=513 +CVE-2012-4280 - http://www.exploit-db.com/exploits/18874 +CVE-2012-4280 - http://www.vulnerability-lab.com/get_content.php?id=513 +CVE-2012-4281 - http://www.exploit-db.com/exploits/18871 +CVE-2012-4281 - http://www.vulnerability-lab.com/get_content.php?id=530 +CVE-2012-4282 - http://packetstormsecurity.org/files/112488/Trombinoscope-3.5-SQL-Injection.html +CVE-2012-4284 - https://packetstormsecurity.com/files/120643/Viscosity-setuid-set-ViscosityHelper-Privilege-Escalation.html +CVE-2012-4287 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7572 +CVE-2012-4288 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7571 +CVE-2012-4290 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7573 +CVE-2012-4291 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7570 +CVE-2012-4301 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2012-4303 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2012-4305 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2012-4324 - http://packetstormsecurity.org/files/111564/Vacation-Rental-Listing-Cross-Site-Request-Forgery.html +CVE-2012-4326 - http://packetstormsecurity.org/files/111563/AlstraSoft-Site-Uptime-Cross-Site-Request-Forgery.html +CVE-2012-4329 - http://aluigi.org/adv/samsux_1-adv.txt +CVE-2012-4329 - http://www.exploit-db.com/exploits/18751 +CVE-2012-4330 - http://aluigi.org/adv/samsux_1-adv.txt +CVE-2012-4330 - http://www.exploit-db.com/exploits/18751 +CVE-2012-4333 - http://www.exploit-db.com/exploits/18765 +CVE-2012-4334 - http://www.exploit-db.com/exploits/18765 +CVE-2012-4335 - http://www.exploit-db.com/exploits/18765 +CVE-2012-4344 - http://www.exploit-db.com/exploits/20035 +CVE-2012-4344 - http://www.kb.cert.org/vuls/id/777007 +CVE-2012-4353 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4354 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4355 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4356 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4357 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4358 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4359 - http://aluigi.org/adv/winlog_2-adv.txt +CVE-2012-4361 - http://www.exploit-db.com/exploits/18901/ +CVE-2012-4361 - http://www.kb.cert.org/vuls/id/441363 +CVE-2012-4362 - http://www.exploit-db.com/exploits/18901/ +CVE-2012-4362 - http://www.kb.cert.org/vuls/id/441363 +CVE-2012-4385 - https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759 +CVE-2012-4399 - http://seclists.org/bugtraq/2012/Jul/101 +CVE-2012-4399 - http://www.exploit-db.com/exploits/19863 +CVE-2012-4405 - http://www.securityfocus.com/bid/55494 +CVE-2012-4409 - http://packetstormsecurity.org/files/116268/mcrypt-2.6.8-Buffer-Overflow-Proof-Of-Concept.html +CVE-2012-4409 - http://www.openwall.com/lists/oss-security/2012/09/06/4 +CVE-2012-4412 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2012-4412 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2012-4412 - http://sourceware.org/bugzilla/show_bug.cgi?id=14547 +CVE-2012-4412 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2012-4414 - http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/ +CVE-2012-4416 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-4420 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4420 +CVE-2012-4424 - http://sourceware.org/bugzilla/show_bug.cgi?id=14547 +CVE-2012-4425 - http://www.exploit-db.com/exploits/21323 +CVE-2012-4428 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428 +CVE-2012-4438 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 +CVE-2012-4439 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 +CVE-2012-4440 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 +CVE-2012-4441 - https://www.cloudbees.com/jenkins-security-advisory-2012-09-17 +CVE-2012-4448 - http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html +CVE-2012-4469 - http://drupal.org/node/1650784 +CVE-2012-4481 - https://bugzilla.redhat.com/show_bug.cgi?id=863484 +CVE-2012-4484 - http://drupal.org/node/1691446 +CVE-2012-4492 - http://drupal.org/node/1719392 +CVE-2012-4494 - http://drupal.org/node/1719392 +CVE-2012-4496 - http://www.madirish.net/538 +CVE-2012-4512 - http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html +CVE-2012-4512 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc +CVE-2012-4513 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc +CVE-2012-4514 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc +CVE-2012-4515 - http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc +CVE-2012-4528 - http://seclists.org/fulldisclosure/2012/Oct/113 +CVE-2012-4530 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b66c5984017533316fd1951770302649baf1aa33 +CVE-2012-4530 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 +CVE-2012-4530 - https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33 +CVE-2012-4532 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-014.txt +CVE-2012-4540 - https://bugzilla.redhat.com/show_bug.cgi?id=869040 +CVE-2012-4553 - http://drupal.org/node/1815912 +CVE-2012-4554 - http://drupal.org/node/1815912 +CVE-2012-4573 - http://packetstormsecurity.com/files/118733/Red-Hat-Security-Advisory-2012-1558-01.html +CVE-2012-4577 - http://www.digitalbond.com/2012/06/13/korenix-and-oring-insecurity +CVE-2012-4600 - http://www.kb.cert.org/vuls/id/511404 +CVE-2012-4611 - http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html +CVE-2012-4615 - http://packetstormsecurity.org/files/118358/EMC-Smarts-Network-Configuration-Manager-Bypass.html +CVE-2012-4638 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-4658 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-4676 - http://www.openwall.com/lists/oss-security/2012/08/14/1 +CVE-2012-4679 - http://dev.sourcefabric.org/browse/CS-4184 +CVE-2012-4680 - http://www.foofus.net/?page_id=616 +CVE-2012-4681 - http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html +CVE-2012-4681 - https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day +CVE-2012-4700 - http://www.integraxor.com/blog/security-issue-for-activex-enabled-browser-vulnerability-note +CVE-2012-4728 - http://packetstormsecurity.com/files/120713/Corel-Quattro-Pro-X6-Standard-Edition-NULL-Pointer-Dereference.html +CVE-2012-4743 - http://www.vulnerability-lab.com/get_content.php?id=504 +CVE-2012-4744 - http://www.vulnerability-lab.com/get_content.php?id=504 +CVE-2012-4745 - http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6.x_(asp)%5D_xss +CVE-2012-4750 - https://packetstormsecurity.com/files/117391/Ezhometech-EzServer-7.0-Remote-Heap-Corruption.html +CVE-2012-4751 - http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html +CVE-2012-4751 - http://www.kb.cert.org/vuls/id/603276 +CVE-2012-4754 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5068.php +CVE-2012-4755 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php +CVE-2012-4760 - https://packetstormsecurity.com/files/cve/CVE-2012-4760 +CVE-2012-4760 - https://seclists.org/bugtraq/2012/Nov/108 +CVE-2012-4761 - https://packetstormsecurity.com/files/cve/CVE-2012-4760 +CVE-2012-4761 - https://seclists.org/bugtraq/2012/Nov/108 +CVE-2012-4767 - https://packetstormsecurity.com/files/118491/Safend-Data-Protector-3.4.5586.9772-Privilege-Escalation.html +CVE-2012-4768 - http://packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txt +CVE-2012-4771 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html +CVE-2012-4771 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5105.php +CVE-2012-4772 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html +CVE-2012-4773 - http://packetstormsecurity.org/files/116433 +CVE-2012-4773 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html +CVE-2012-4773 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5106.php +CVE-2012-4792 - http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html +CVE-2012-4792 - http://www.kb.cert.org/vuls/id/154201 +CVE-2012-4820 - http://seclists.org/bugtraq/2012/Sep/38 +CVE-2012-4820 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-4821 - http://seclists.org/bugtraq/2012/Sep/38 +CVE-2012-4821 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-4822 - http://seclists.org/bugtraq/2012/Sep/38 +CVE-2012-4822 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-4823 - http://seclists.org/bugtraq/2012/Sep/38 +CVE-2012-4823 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-4856 - http://www.kb.cert.org/vuls/id/194604 +CVE-2012-4864 - http://packetstormsecurity.org/files/111034 +CVE-2012-4864 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5080.php +CVE-2012-4865 - http://packetstormsecurity.org/files/111031 +CVE-2012-4865 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5079.php +CVE-2012-4866 - http://packetstormsecurity.org/files/110949/Xtreme-RAT-DLL-Hijack.html +CVE-2012-4867 - http://packetstormsecurity.org/files/111075/Vtiger-5.1.0-Local-File-Inclusion.html +CVE-2012-4869 - http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html +CVE-2012-4869 - http://seclists.org/fulldisclosure/2012/Mar/234 +CVE-2012-4869 - http://www.exploit-db.com/exploits/18649 +CVE-2012-4870 - http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html +CVE-2012-4870 - http://seclists.org/fulldisclosure/2012/Mar/234 +CVE-2012-4870 - http://www.exploit-db.com/exploits/18649 +CVE-2012-4871 - http://packetstormsecurity.org/files/110974/LiteSpeed-4.1.11-Cross-Site-Scripting.html +CVE-2012-4872 - http://st2tea.blogspot.com/2012/03/kayako-fusion-cross-site-scripting.html +CVE-2012-4876 - http://www.exploit-db.com/exploits/18675 +CVE-2012-4877 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html +CVE-2012-4877 - http://www.vulnerability-lab.com/get_content.php?id=487 +CVE-2012-4878 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html +CVE-2012-4878 - http://www.vulnerability-lab.com/get_content.php?id=487 +CVE-2012-4886 - http://packetstormsecurity.com/files/121431/WPS-Office-Stack-Buffer-Overflow.html +CVE-2012-4886 - http://seclists.org/fulldisclosure/2013/Apr/247 +CVE-2012-4886 - http://www.exploit-db.com/exploits/25140 +CVE-2012-4889 - http://packetstormsecurity.org/files/111474/VL-437.txt +CVE-2012-4889 - http://www.vulnerability-lab.com/get_content.php?id=437 +CVE-2012-4890 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html +CVE-2012-4890 - http://www.vulnerability-lab.com/get_content.php?id=487 +CVE-2012-4891 - http://packetstormsecurity.com/files/130169/ManageEngine-Firewall-Analyzer-8.0-Directory-Traversal-XSS.html +CVE-2012-4893 - http://www.kb.cert.org/vuls/id/788478 +CVE-2012-4897 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html +CVE-2012-4901 - https://www.exploit-db.com/exploits/21742/ +CVE-2012-4902 - https://www.exploit-db.com/exploits/21742/ +CVE-2012-4922 - https://trac.torproject.org/projects/tor/ticket/6811 +CVE-2012-4923 - http://packetstormsecurity.org/files/109942/Endian-UTM-Firewall-2.4.x-Cross-Site-Scripting.html +CVE-2012-4923 - http://www.vulnerability-lab.com/get_content.php?id=436 +CVE-2012-4924 - http://www.exploit-db.com/exploits/18538 +CVE-2012-4925 - http://www.exploit-db.com/exploits/18544 +CVE-2012-4926 - http://www.exploit-db.com/exploits/18544 +CVE-2012-4927 - http://freecode.com/projects/limesurvey/releases/342070 +CVE-2012-4927 - http://packetstormsecurity.org/files/110100/limesurvey-sql.txt +CVE-2012-4928 - http://packetstormsecurity.org/files/110046/Oxwall-1.1.1-Cross-Site-Scripting.html +CVE-2012-4929 - http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor +CVE-2012-4929 - http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312 +CVE-2012-4929 - http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512 +CVE-2012-4929 - http://www.theregister.co.uk/2012/09/14/crime_tls_attack/ +CVE-2012-4929 - https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls +CVE-2012-4929 - https://github.com/mpgn/CRIME-poc +CVE-2012-4929 - https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212 +CVE-2012-4930 - http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312 +CVE-2012-4930 - http://www.theregister.co.uk/2012/09/14/crime_tls_attack/ +CVE-2012-4930 - https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls +CVE-2012-4934 - http://www.kb.cert.org/vuls/id/207540 +CVE-2012-4935 - http://www.kb.cert.org/vuls/id/802596 +CVE-2012-4936 - http://www.kb.cert.org/vuls/id/802596 +CVE-2012-4937 - http://www.kb.cert.org/vuls/id/802596 +CVE-2012-4938 - http://www.kb.cert.org/vuls/id/802596 +CVE-2012-4939 - http://www.kb.cert.org/vuls/id/203844 +CVE-2012-4941 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4942 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4943 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4944 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4945 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4946 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4947 - http://www.kb.cert.org/vuls/id/427547 +CVE-2012-4949 - http://www.kb.cert.org/vuls/id/795644 +CVE-2012-4950 - http://www.kb.cert.org/vuls/id/802596 +CVE-2012-4951 - http://www.kb.cert.org/vuls/id/180091 +CVE-2012-4953 - http://www.kb.cert.org/vuls/id/985625 +CVE-2012-4955 - http://www.kb.cert.org/vuls/id/558132 +CVE-2012-4956 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 +CVE-2012-4957 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 +CVE-2012-4958 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 +CVE-2012-4959 - https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 +CVE-2012-4969 - http://www.securityweek.com/new-internet-explorer-zero-day-being-exploited-wild +CVE-2012-4987 - http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html +CVE-2012-4988 - http://seclists.org/fulldisclosure/2012/Oct/36 +CVE-2012-4988 - http://www.reactionpenetrationtesting.co.uk/xnview-jls-heap.html +CVE-2012-4988 - https://www.exploit-db.com/exploits/21741/ +CVE-2012-4992 - http://seclists.org/fulldisclosure/2012/Mar/7 +CVE-2012-4992 - http://www.exploit-db.com/exploits/18555 +CVE-2012-4992 - http://www.vulnerability-lab.com/get_content.php?id=462 +CVE-2012-4994 - http://freecode.com/projects/limesurvey/releases/342070 +CVE-2012-4995 - http://freecode.com/projects/limesurvey/releases/342070 +CVE-2012-4997 - http://www.exploit-db.com/exploits/18559 +CVE-2012-4998 - http://packetstormsecurity.org/files/110376/starcms-xss.txt +CVE-2012-5000 - http://www.exploit-db.com/exploits/18558 +CVE-2012-5004 - http://www.vulnerability-lab.com/get_content.php?id=392 +CVE-2012-5014 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-5017 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-5032 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-5037 - http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf +CVE-2012-5050 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html +CVE-2012-5051 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html +CVE-2012-5054 - http://packetstormsecurity.org/files/116435/Adobe-Flash-Player-Matrix3D-Integer-Overflow-Code-Execution.html +CVE-2012-5058 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5060 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-5061 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5063 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5064 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5065 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5066 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5067 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5068 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5068 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5069 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5069 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5070 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5071 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5071 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5072 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5072 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5073 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5073 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5074 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5075 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5075 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5076 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5077 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5078 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5079 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5079 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5080 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5081 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5081 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5082 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5082 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15827 +CVE-2012-5083 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5083 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5083 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5084 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5084 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5085 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5085 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5086 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5087 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5088 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5089 - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 +CVE-2012-5089 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html +CVE-2012-5090 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5091 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5092 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5093 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5094 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5095 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html +CVE-2012-5096 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-5103 - http://packetstormsecurity.org/files/108389/ggbguestbook-xss.txt +CVE-2012-5104 - http://packetstormsecurity.org/files/108353/ubbforum-xss.txt +CVE-2012-5104 - http://st2tea.blogspot.com/2012/01/ubb-forum756-cross-site-scripting.html +CVE-2012-5166 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-5193 - https://www.exploit-db.com/exploits/22216 +CVE-2012-5195 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-5215 - http://www.kb.cert.org/vuls/id/782451 +CVE-2012-5223 - http://www.vbseo.com/f5/vbseo-security-bulletin-all-supported-versions-patch-release-52783/ +CVE-2012-5225 - http://st2tea.blogspot.com/2012/01/xclick-cart-cross-site-scripting.html +CVE-2012-5242 - http://www.exploit-db.com/exploits/23573 +CVE-2012-5243 - http://www.exploit-db.com/exploits/23573 +CVE-2012-5244 - http://www.exploit-db.com/exploits/23573/ +CVE-2012-5290 - http://packetstormsecurity.org/files/108342/EasyWebRealEstate-Blind-SQL-Injection.html +CVE-2012-5293 - http://www.exploit-db.com/exploits/18342 +CVE-2012-5293 - http://www.osvdb.org/82476 +CVE-2012-5305 - http://www.vulnerability-lab.com/get_content.php?id=486 +CVE-2012-5306 - http://www.exploit-db.com/exploits/18673 +CVE-2012-5313 - http://marc.info/?l=full-disclosure&m=132706457510193&w=2 +CVE-2012-5313 - http://www.vulnerability-lab.com/get_content.php?id=384 +CVE-2012-5314 - http://st2tea.blogspot.com/2012/01/viewgit-cross-site-scripting.html +CVE-2012-5316 - http://www.vulnerability-lab.com/get_content.php?id=28 +CVE-2012-5321 - http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html +CVE-2012-5322 - http://packetstormsecurity.org/files/109987/Xavi-7968-ADSL-Router-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-5323 - http://packetstormsecurity.org/files/109987/Xavi-7968-ADSL-Router-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-5324 - http://www.exploit-db.com/exploits/18427 +CVE-2012-5324 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5067.php +CVE-2012-5334 - http://www.exploit-db.com/exploits/18616 +CVE-2012-5337 - http://www.zerodaylab.com/zdl-advisories/2012-5337.html +CVE-2012-5338 - http://www.zerodaylab.com/zdl-advisories/2012-5338.html +CVE-2012-5340 - http://www.exploit-db.com/exploits/23246 +CVE-2012-5341 - http://packetstormsecurity.org/files/108340/statit4-xss.txt +CVE-2012-5341 - http://st2tea.blogspot.com/2012/01/otterware-statit4-cross-site-scripting.html +CVE-2012-5342 - http://packetstormsecurity.org/files/108426/CommonSense-CMS-Blind-SQL-Injection.html +CVE-2012-5343 - http://packetstormsecurity.org/files/108355/ZSL-2012-5066.txt +CVE-2012-5343 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5066.php +CVE-2012-5346 - http://packetstormsecurity.org/files/108282/wplivephp-xss.txt +CVE-2012-5347 - http://www.exploit-db.com/exploits/18322 +CVE-2012-5348 - http://www.exploit-db.com/exploits/18335 +CVE-2012-5349 - http://www.exploit-db.com/exploits/18330 +CVE-2012-5350 - http://www.exploit-db.com/exploits/18330 +CVE-2012-5351 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2012-5356 - https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/1016643 +CVE-2012-5367 - http://packetstormsecurity.org/files/117925/OrangeHRM-2.7.1-rc.1-Cross-Site-Request-Forgery-SQL-Injection.html +CVE-2012-5370 - http://www.ocert.org/advisories/ocert-2012-001.html +CVE-2012-5371 - http://www.ocert.org/advisories/ocert-2012-001.html +CVE-2012-5372 - http://www.ocert.org/advisories/ocert-2012-001.html +CVE-2012-5373 - http://www.ocert.org/advisories/ocert-2012-001.html +CVE-2012-5373 - https://bugzilla.redhat.com/show_bug.cgi?id=880705 +CVE-2012-5387 - http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-5388 - http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2012-5450 - http://packetstormsecurity.org/files/117951/CMS-Made-Simple-1.11.2-Cross-Site-Request-Forgery.html +CVE-2012-5452 - http://packetstormsecurity.org/files/116434/Subrion-CMS-2.2.1-Cross-Site-Scripting.html +CVE-2012-5452 - http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html +CVE-2012-5452 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5105.php +CVE-2012-5458 - http://www.vmware.com/security/advisories/VMSA-2012-0015.html +CVE-2012-5459 - http://www.vmware.com/security/advisories/VMSA-2012-0015.html +CVE-2012-5470 - http://www.exploit-db.com/exploits/21889/ +CVE-2012-5517 - http://www.kernel.org/pub/linux/kernel/v3.x/ +CVE-2012-5526 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-5529 - http://tracker.firebirdsql.org/browse/CORE-3884 +CVE-2012-5532 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2012-5533 - http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html +CVE-2012-5533 - http://www.exploit-db.com/exploits/22902 +CVE-2012-5553 - http://drupal.org/node/1834046 +CVE-2012-5553 - http://www.madirish.net/551 +CVE-2012-5558 - http://drupal.org/node/1840892 +CVE-2012-5563 - https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5 +CVE-2012-5574 - https://bugs.gentoo.org/show_bug.cgi?id=444696 +CVE-2012-5578 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5578 +CVE-2012-5611 - http://seclists.org/fulldisclosure/2012/Dec/4 +CVE-2012-5611 - http://www.exploit-db.com/exploits/23075 +CVE-2012-5611 - http://www.openwall.com/lists/oss-security/2012/12/02/3 +CVE-2012-5611 - http://www.openwall.com/lists/oss-security/2012/12/02/4 +CVE-2012-5611 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-5612 - http://seclists.org/fulldisclosure/2012/Dec/5 +CVE-2012-5612 - http://www.exploit-db.com/exploits/23076 +CVE-2012-5612 - http://www.openwall.com/lists/oss-security/2012/12/02/3 +CVE-2012-5612 - http://www.openwall.com/lists/oss-security/2012/12/02/4 +CVE-2012-5612 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2012-5613 - http://www.openwall.com/lists/oss-security/2012/12/02/3 +CVE-2012-5613 - http://www.openwall.com/lists/oss-security/2012/12/02/4 +CVE-2012-5614 - http://seclists.org/fulldisclosure/2012/Dec/7 +CVE-2012-5614 - http://www.openwall.com/lists/oss-security/2012/12/02/3 +CVE-2012-5614 - http://www.openwall.com/lists/oss-security/2012/12/02/4 +CVE-2012-5614 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2012-5615 - http://www.openwall.com/lists/oss-security/2012/12/02/3 +CVE-2012-5615 - http://www.openwall.com/lists/oss-security/2012/12/02/4 +CVE-2012-5615 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2012-5615 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2012-5619 - http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/ +CVE-2012-5627 - http://seclists.org/fulldisclosure/2012/Dec/58 +CVE-2012-5633 - http://packetstormsecurity.com/files/120213/Apache-CXF-WS-Security-URIMappingInterceptor-Bypass.html +CVE-2012-5656 - http://www.openwall.com/lists/oss-security/2012/12/20/3 +CVE-2012-5656 - https://bugs.launchpad.net/inkscape/+bug/1025185 +CVE-2012-5667 - https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473 +CVE-2012-5668 - http://www.freetype.org/ +CVE-2012-5669 - http://www.freetype.org/ +CVE-2012-5670 - http://www.freetype.org/ +CVE-2012-5683 - http://packetstormsecurity.com/files/117894/ZPanel-10.0.1-XSS-CSRF-SQL-Injection.html +CVE-2012-5684 - http://packetstormsecurity.com/files/117894/ZPanel-10.0.1-XSS-CSRF-SQL-Injection.html +CVE-2012-5687 - http://packetstormsecurity.org/files/117749/TP-LINK-TL-WR841N-Local-File-Inclusion.html +CVE-2012-5688 - http://www.ubuntu.com/usn/USN-1657-1 +CVE-2012-5700 - http://www.exploit-db.com/exploits/22741 +CVE-2012-5701 - http://packetstormsecurity.com/files/118274/dotProject-2.1.6-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5703 - http://www.coresecurity.com/content/vmware-esx-input-validation-error +CVE-2012-5723 - http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html +CVE-2012-5777 - http://packetstormsecurity.com/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html +CVE-2012-5777 - http://packetstormsecurity.org/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html +CVE-2012-5783 - http://www.ubuntu.com/usn/USN-2769-1 +CVE-2012-5828 - https://packetstormsecurity.com/files/cve/CVE-2012-5828 +CVE-2012-5849 - http://www.exploit-db.com/exploits/23252 +CVE-2012-5853 - http://seclists.org/bugtraq/2012/Nov/33 +CVE-2012-5856 - http://packetstormsecurity.org/files/118053/WordPress-UK-Cookie-Cross-Site-Scripting.html +CVE-2012-5858 - http://packetstormsecurity.org/files/118154/Kies-Air-Denial-Of-Service-Authorization-Bypass.html +CVE-2012-5859 - http://packetstormsecurity.org/files/118154/Kies-Air-Denial-Of-Service-Authorization-Bypass.html +CVE-2012-5860 - http://www.kb.cert.org/vuls/id/659615 +CVE-2012-5865 - http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5866 - http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5872 - https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/ +CVE-2012-5873 - https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/ +CVE-2012-5874 - http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html +CVE-2012-5874 - http://www.exploit-db.com/exploits/23575 +CVE-2012-5875 - http://www.exploit-db.com/exploits/23574 +CVE-2012-5876 - http://www.exploit-db.com/exploits/24022 +CVE-2012-5877 - http://www.exploit-db.com/exploits/24022 +CVE-2012-5890 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-002/ +CVE-2012-5891 - http://packetstormsecurity.org/files/111402/Dalbum-144-Build-174-Cross-Site-Request-Forgery.html +CVE-2012-5891 - http://www.exploit-db.com/exploits/18685 +CVE-2012-5892 - http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html +CVE-2012-5893 - http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html +CVE-2012-5894 - http://packetstormsecurity.org/files/111358/Havalite-CMS-Shell-Upload-SQL-Injection-Disclosure.html +CVE-2012-5896 - http://packetstormsecurity.org/files/111312/Quest-InTrust-10.4.x-Annotation-Objects-Code-Execution.html +CVE-2012-5896 - http://packetstormsecurity.org/files/111853/Quest-InTrust-Annotation-Objects-Uninitialized-Pointer.html +CVE-2012-5896 - http://www.exploit-db.com/exploits/18674 +CVE-2012-5898 - http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5898 - http://vulnerability-lab.com/get_content.php?id=485 +CVE-2012-5898 - http://www.exploit-db.com/exploits/18687 +CVE-2012-5899 - http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5899 - http://vulnerability-lab.com/get_content.php?id=485 +CVE-2012-5899 - http://www.exploit-db.com/exploits/18687 +CVE-2012-5900 - http://packetstormsecurity.org/files/111415/Landshop-0.9.2-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5900 - http://vulnerability-lab.com/get_content.php?id=485 +CVE-2012-5900 - http://www.exploit-db.com/exploits/18687 +CVE-2012-5901 - http://packetstormsecurity.org/files/111360/PTK-1.0.5-Cross-Site-Scripting-Unrestricted-Access.html +CVE-2012-5902 - http://packetstormsecurity.org/files/111360/PTK-1.0.5-Cross-Site-Scripting-Unrestricted-Access.html +CVE-2012-5903 - http://packetstormsecurity.org/files/111356/SMF-2.0.2-Cross-Site-Scripting.html +CVE-2012-5905 - http://packetstormsecurity.org/files/111296/KnFTPd-1.0.0-Denial-Of-Service.html +CVE-2012-5905 - http://www.exploit-db.com/exploits/18671 +CVE-2012-5906 - http://lostmon.blogspot.com/2012/03/greenbrowser-about-dialog-xss-and.html +CVE-2012-5906 - http://packetstormsecurity.org/files/111252/GreenBrowser-6.1.x-Cross-Site-Scripting.html +CVE-2012-5907 - http://packetstormsecurity.org/files/111291/TomatoCart-1.2.0-Alpha-2-Local-File-Inclusion.html +CVE-2012-5907 - http://www.mavitunasecurity.com/local-file-inclusion-vulnerability-in-tomatocart/ +CVE-2012-5908 - http://packetstormsecurity.org/files/111238/MyBB-1.6.6-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5909 - http://packetstormsecurity.org/files/111238/MyBB-1.6.6-Cross-Site-Scripting-SQL-Injection.html +CVE-2012-5910 - http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html +CVE-2012-5910 - http://vulnerability-lab.com/get_content.php?id=482 +CVE-2012-5911 - http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html +CVE-2012-5911 - http://vulnerability-lab.com/get_content.php?id=482 +CVE-2012-5912 - http://packetstormsecurity.org/files/111274/PicoPublisher-2.0-SQL-Injection.html +CVE-2012-5912 - http://www.exploit-db.com/exploits/18670 +CVE-2012-5913 - http://packetstormsecurity.org/files/111249/WordPress-Integrator-1.32-Cross-Site-Scripting.html +CVE-2012-5913 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-010.txt +CVE-2012-5914 - http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html +CVE-2012-5915 - http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html +CVE-2012-5916 - http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html +CVE-2012-5919 - http://packetstormsecurity.org/files/112089/Havalite-CMS-1.0.4-Cross-Site-Scripting.html +CVE-2012-5919 - http://www.vulnerability-lab.com/get_content.php?id=520 +CVE-2012-5956 - http://www.kb.cert.org/vuls/id/571068 +CVE-2012-5958 - http://packetstormsecurity.com/files/160242/libupnp-1.6.18-Denial-Of-Service.html +CVE-2012-5958 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5958 - https://www.tenable.com/security/research/tra-2017-10 +CVE-2012-5959 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5959 - https://www.tenable.com/security/research/tra-2017-10 +CVE-2012-5960 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5960 - https://www.tenable.com/security/research/tra-2017-10 +CVE-2012-5961 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5962 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5963 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5964 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5965 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp +CVE-2012-5966 - http://www.kb.cert.org/vuls/id/876780 +CVE-2012-5968 - http://www.kb.cert.org/vuls/id/871148 +CVE-2012-5969 - http://www.kb.cert.org/vuls/id/871148 +CVE-2012-5970 - http://www.kb.cert.org/vuls/id/871148 +CVE-2012-6029 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029 +CVE-2012-6039 - http://www.exploit-db.com/exploits/18352 +CVE-2012-6045 - http://packetstormsecurity.org/files/112495/Ramui-Forum-Script-Cross-Site-Scripting.html +CVE-2012-6046 - http://packetstormsecurity.org/files/112536/PHP-Enter-Code-Injection.html +CVE-2012-6048 - http://www.exploit-db.com/exploits/18851 +CVE-2012-6049 - http://packetstormsecurity.org/files/112242/Quick.Cart-5.0-Information-Disclosure.html +CVE-2012-6050 - http://www.133tsec.com/2012/04/30/0day-ddos-mikrotik-server-side-ddos-attack/ +CVE-2012-6050 - http://www.exploit-db.com/exploits/18817 +CVE-2012-6064 - http://packetstormsecurity.org/files/117951/CMS-Made-Simple-1.11.2-Cross-Site-Request-Forgery.html +CVE-2012-6065 - http://drupal.org/node/1834046 +CVE-2012-6065 - http://www.madirish.net/551 +CVE-2012-6068 - http://www.digitalbond.com/tools/basecamp/3s-codesys/ +CVE-2012-6069 - http://www.digitalbond.com/tools/basecamp/3s-codesys/ +CVE-2012-6072 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb +CVE-2012-6073 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb +CVE-2012-6074 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb +CVE-2012-6081 - http://www.exploit-db.com/exploits/25304 +CVE-2012-6084 - http://www.ratbox.org/download/ircd-ratbox-3.0.8.tar.bz2 +CVE-2012-6084 - http://www.stack.nl/~jilles/irc/charybdis-3.4.2.tbz2 +CVE-2012-6119 - https://github.com/candlepin/candlepin/commit/f4d93230e58b969c506b4c9778e04482a059b08c +CVE-2012-6134 - https://github.com/intridea/omniauth-oauth2/pull/25 +CVE-2012-6153 - http://www.ubuntu.com/usn/USN-2769-1 +CVE-2012-6270 - http://www.kb.cert.org/vuls/id/546769 +CVE-2012-6271 - http://www.kb.cert.org/vuls/id/519137 +CVE-2012-6273 - http://www.kb.cert.org/vuls/id/990652 +CVE-2012-6274 - http://www.kb.cert.org/vuls/id/990652 +CVE-2012-6275 - http://www.kb.cert.org/vuls/id/990652 +CVE-2012-6290 - http://packetstormsecurity.com/files/119806/ImageCMS-4.0.0b-SQL-Injection.html +CVE-2012-6297 - https://packetstormsecurity.com/files/cve/CVE-2012-6297 +CVE-2012-6301 - http://packetstormsecurity.org/files/118539/Android-4.0.3-Browser-Crash.html +CVE-2012-6303 - http://www.exploit-db.com/exploits/19772 +CVE-2012-6307 - https://www.exploit-db.com/exploits/21739/ +CVE-2012-6329 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2012-6334 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html +CVE-2012-6335 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html +CVE-2012-6336 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html +CVE-2012-6337 - http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html +CVE-2012-6340 - https://packetstormsecurity.com/files/118854/Netgear-WGR614-Credential-Information.html +CVE-2012-6341 - https://packetstormsecurity.com/files/date/2012-12-14/ +CVE-2012-6342 - http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html +CVE-2012-6342 - http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities +CVE-2012-6346 - https://www.vulnerability-lab.com/get_content.php?id=702 +CVE-2012-6347 - https://www.vulnerability-lab.com/get_content.php?id=558 +CVE-2012-6369 - http://packetstormsecurity.org/files/118467/Agilebits-1Password-3.9.9-Cross-Site-Scripting.html +CVE-2012-6369 - http://www.youtube.com/watch?v=A1kPL9ggRi4 +CVE-2012-6422 - http://forum.xda-developers.com/showthread.php?p=35469999 +CVE-2012-6422 - http://forum.xda-developers.com/showthread.php?t=2051290 +CVE-2012-6422 - http://www.securityweek.com/new-vulnerability-exposed-samsungs-android-devices +CVE-2012-6429 - http://packetstormsecurity.com/files/119423/Samsung-Kies-2.5.0.12114_1-Buffer-Overflow.html +CVE-2012-6430 - http://packetstormsecurity.com/files/119422/Quick.Cms-5.0-Quick.Cart-6.0-Cross-Site-Scripting.html +CVE-2012-6448 - https://www.exploit-db.com/exploits/38153 +CVE-2012-6449 - https://packetstormsecurity.com/files/119113/C-Panel-WHM-11.34.0-Cross-Site-Scripting.html +CVE-2012-6493 - http://packetstormsecurity.com/files/119260/Nexpose-Security-Console-Cross-Site-Request-Forgery.html +CVE-2012-6493 - http://www.exploit-db.com/exploits/23924 +CVE-2012-6498 - http://thaicert.or.th/alerts/admin/2012/al2012ad025.html +CVE-2012-6498 - http://www.youtube.com/watch?v=CfvTCSS3LGY +CVE-2012-6504 - http://www.exploit-db.com/exploits/18788 +CVE-2012-6505 - http://www.exploit-db.com/exploits/18788 +CVE-2012-6507 - http://packetstormsecurity.org/files/112106/ChurchCMS-0.0.1-SQL-Injection.html +CVE-2012-6508 - http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html +CVE-2012-6508 - http://www.vulnerability-lab.com/get_content.php?id=502 +CVE-2012-6509 - http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html +CVE-2012-6509 - http://www.vulnerability-lab.com/get_content.php?id=502 +CVE-2012-6510 - http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html +CVE-2012-6510 - http://www.vulnerability-lab.com/get_content.php?id=502 +CVE-2012-6511 - http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html +CVE-2012-6512 - http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html +CVE-2012-6514 - http://packetstormsecurity.org/files/112235/Joomla-nBill-Lite-Cross-Site-Scripting.html +CVE-2012-6516 - http://www.exploit-db.com/exploits/18778 +CVE-2012-6517 - http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html +CVE-2012-6517 - http://www.exploit-db.com/exploits/18804 +CVE-2012-6517 - http://www.vulnerability-lab.com/get_content.php?id=518 +CVE-2012-6518 - http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html +CVE-2012-6518 - http://www.exploit-db.com/exploits/18804 +CVE-2012-6518 - http://www.vulnerability-lab.com/get_content.php?id=518 +CVE-2012-6519 - http://packetstormsecurity.org/files/112224/DIY-CMS-1.0-Poll-XSS-CSRF-SQL-Injection.html +CVE-2012-6519 - http://www.exploit-db.com/exploits/18804 +CVE-2012-6519 - http://www.vulnerability-lab.com/get_content.php?id=518 +CVE-2012-6520 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-005.txt +CVE-2012-6520 - http://www.openwall.com/lists/oss-security/2012/04/13/4 +CVE-2012-6520 - http://www.openwall.com/lists/oss-security/2012/04/15/1 +CVE-2012-6521 - http://packetstormsecurity.org/files/115253/Elefant-CMS-1.2.0-Cross-Site-Scripting.html +CVE-2012-6522 - http://www.exploit-db.com/exploits/18711 +CVE-2012-6526 - http://packetstormsecurity.org/files/108756/vastalfreelance-sql.txt +CVE-2012-6528 - http://www.darksecurity.de/advisories/2012/SSCHADV2012-002.txt +CVE-2012-6534 - http://seclists.org/fulldisclosure/2012/Oct/25 +CVE-2012-6534 - https://www.exploit-db.com/exploits/21744/ +CVE-2012-6542 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2012-6544 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2012-6545 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2012-6546 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2012-6547 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2012-6548 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2012-6548 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2012-6548 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2012-6549 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2012-6549 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2012-6553 - http://waleedassar.blogspot.com/2012/05/resource-hacker-heap-overflow.html +CVE-2012-6558 - http://waleedassar.blogspot.com/2012/05/pe-explorer-heap-overflow-vulnerability.html +CVE-2012-6561 - http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip +CVE-2012-6562 - http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip +CVE-2012-6563 - http://elgg.org/getelgg.php?forward=elgg-1.8.5.zip +CVE-2012-6572 - http://www.madirish.net/550 +CVE-2012-6586 - http://www.exploit-db.com/exploits/22712/ +CVE-2012-6587 - http://www.exploit-db.com/exploits/22712/ +CVE-2012-6607 - https://github.com/hercules-team/augeas/commit/16387744 +CVE-2012-6608 - http://packetstormsecurity.com/files/118454/Elastix-2.3.0-Cross-Site-Scripting.html +CVE-2012-6611 - https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html +CVE-2012-6611 - https://www.exploit-db.com/exploits/43032 +CVE-2012-6613 - http://www.exploit-db.com/exploits/22930/ +CVE-2012-6614 - http://www.exploit-db.com/exploits/22930/ +CVE-2012-6614 - https://packetstormsecurity.com/files/118355/D-Link-DSR-250N-Backdoor.html +CVE-2012-6621 - http://packetstormsecurity.com/files/124711 +CVE-2012-6621 - http://packetstormsecurity.org/files/112643/GetSimple-CMS-3.1-Cross-Site-Scripting.html +CVE-2012-6621 - http://www.vulnerability-lab.com/get_content.php?id=521 +CVE-2012-6622 - http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html +CVE-2012-6623 - http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html +CVE-2012-6624 - http://packetstormsecurity.org/files/112689/WordPress-Soundcloud-Is-Gold-2.1-Cross-Site-Scripting.html +CVE-2012-6625 - http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html +CVE-2012-6626 - http://www.exploit-db.com/exploits/18882 +CVE-2012-6627 - http://packetstormsecurity.org/files/112694/WordPress-Newsletter-Manager-1.0-Cross-Site-Scripting.html +CVE-2012-6628 - http://packetstormsecurity.org/files/112694/WordPress-Newsletter-Manager-1.0-Cross-Site-Scripting.html +CVE-2012-6630 - http://packetstormsecurity.org/files/112697/WordPress-Media-Categories-1.1.1-Cross-Site-Scripting.html +CVE-2012-6631 - http://packetstormsecurity.org/files/112655/NetBill-Billing-System-1.2-CSRF-XSS.html +CVE-2012-6632 - http://packetstormsecurity.org/files/112655/NetBill-Billing-System-1.2-CSRF-XSS.html +CVE-2012-6636 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2012-6637 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt +CVE-2012-6637 - http://seclists.org/bugtraq/2014/Jan/96 +CVE-2012-6637 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2012-6643 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt +CVE-2012-6644 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt +CVE-2012-6645 - http://drupal.org/node/1432318 +CVE-2012-6658 - http://www.exploit-db.com/exploits/20063 +CVE-2012-6666 - https://www.exploit-db.com/exploits/37944 +CVE-2012-6684 - http://co3k.org/blog/redcloth-unfixed-xss-en +CVE-2012-6684 - http://seclists.org/fulldisclosure/2014/Dec/50 +CVE-2012-6687 - https://bugzilla.redhat.com/show_bug.cgi?id=1189958 +CVE-2012-6692 - http://packetstormsecurity.com/files/132294/WordPress-Yoast-2.1.1-Cross-Site-Scripting.html +CVE-2012-6698 - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 +CVE-2012-6699 - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 +CVE-2012-6700 - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 +CVE-2012-6702 - https://www.tenable.com/security/tns-2016-20 +CVE-2012-6705 - http://st2tea.blogspot.com/2012/02/jamroom-cross-site-scripting.html +CVE-2012-6706 - http://telussecuritylabs.com/threats/show/TSL20121207-01 +CVE-2012-6706 - https://lock.cmpxchg8b.com/sophailv2.pdf +CVE-2012-6708 - http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html +CVE-2012-6708 - http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html +CVE-2012-6708 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2012-6710 - http://itsecuritysolutions.org/2012-12-31-eXtplorer-v2.1-authentication-bypass-vulnerability +CVE-2012-6720 - http://seclists.org/oss-sec/2012/q2/396 +CVE-2012-6721 - https://seclists.org/oss-sec/2012/q2/396 +CVE-2013-0008 - http://www.exploit-db.com/exploits/24485 +CVE-2013-0019 - https://www.exploit-db.com/exploits/40879/ +CVE-2013-0077 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-011 +CVE-2013-0079 - http://www.kb.cert.org/vuls/id/851777 +CVE-2013-0086 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-025 +CVE-2013-0090 - http://packetstormsecurity.com/files/140186/Microsoft-Internet-Explorer-9-IEFRAME-CView-EnsureSize-Use-After-Free.html +CVE-2013-0090 - https://www.exploit-db.com/exploits/40935/ +CVE-2013-0109 - http://www.kb.cert.org/vuls/id/957036 +CVE-2013-0110 - http://www.kb.cert.org/vuls/id/957036 +CVE-2013-0111 - http://www.kb.cert.org/vuls/id/957036 +CVE-2013-0113 - http://www.kb.cert.org/vuls/id/248449 +CVE-2013-0120 - http://www.kb.cert.org/vuls/id/160460 +CVE-2013-0122 - http://www.kb.cert.org/vuls/id/131263 +CVE-2013-0123 - http://www.kb.cert.org/vuls/id/406596 +CVE-2013-0124 - http://www.kb.cert.org/vuls/id/406596 +CVE-2013-0126 - http://www.kb.cert.org/vuls/id/278204 +CVE-2013-0135 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html +CVE-2013-0140 - http://www.kb.cert.org/vuls/id/209131 +CVE-2013-0140 - https://kc.mcafee.com/corporate/index?page=content&id=SB10042 +CVE-2013-0141 - http://www.kb.cert.org/vuls/id/209131 +CVE-2013-0141 - https://kc.mcafee.com/corporate/index?page=content&id=SB10042 +CVE-2013-0149 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-0150 - https://nealpoole.com/blog/2013/07/code-execution-via-f5-networks-java-applet/ +CVE-2013-0156 - http://www.insinuator.net/2013/01/rails-yaml/ +CVE-2013-0156 - https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156 +CVE-2013-0158 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-01-04.cb +CVE-2013-0160 - http://www.openwall.com/lists/oss-security/2013/01/08/3 +CVE-2013-0160 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-0160 - https://bugzilla.redhat.com/show_bug.cgi?id=892983 +CVE-2013-0169 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-0169 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-0175 - https://github.com/sferik/multi_xml/pull/34 +CVE-2013-0177 - http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html +CVE-2013-0191 - http://sourceforge.net/p/pam-pgsql/bugs/13/ +CVE-2013-0216 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0217 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0228 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0228 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2013-0230 - https://www.exploit-db.com/exploits/36839/ +CVE-2013-0232 - http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/ +CVE-2013-0234 - http://packetstormsecurity.com/files/119903/Elgg-Twitter-Widget-Cross-Site-Scripting.html +CVE-2013-0236 - https://bugzilla.redhat.com/show_bug.cgi?id=904121 +CVE-2013-0238 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267 +CVE-2013-0238 - http://www.openwall.com/lists/oss-security/2013/01/29/8 +CVE-2013-0239 - http://packetstormsecurity.com/files/120214/Apache-CXF-WS-Security-UsernameToken-Bypass.html +CVE-2013-0244 - http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html +CVE-2013-0245 - http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html +CVE-2013-0246 - http://packetstormsecurity.com/files/119598/Drupal-Core-6.x-7.x-Cross-Site-Scripting-Access-Bypass.html +CVE-2013-0248 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2013-0249 - http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/ +CVE-2013-0249 - http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html +CVE-2013-0249 - http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html +CVE-2013-0249 - http://www.exploit-db.com/exploits/24487 +CVE-2013-0249 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-0255 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2013-0261 - http://rhn.redhat.com/errata/RHSA-2013-0595.html +CVE-2013-0263 - https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ +CVE-2013-0266 - http://rhn.redhat.com/errata/RHSA-2013-0595.html +CVE-2013-0286 - http://www.openwall.com/lists/oss-security/2013/02/14/4 +CVE-2013-0290 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0291 - http://www.openwall.com/lists/oss-security/2013/02/15/3 +CVE-2013-0292 - http://www.exploit-db.com/exploits/33614 +CVE-2013-0292 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-0308 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2013-0311 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0322 - http://drupal.org/node/1922136 +CVE-2013-0327 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb +CVE-2013-0328 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb +CVE-2013-0329 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb +CVE-2013-0330 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb +CVE-2013-0331 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb +CVE-2013-0334 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2013-0338 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-0338 - http://www.ubuntu.com/usn/USN-1782-1 +CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/33 +CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/34 +CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/35 +CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/38 +CVE-2013-0340 - http://seclists.org/fulldisclosure/2021/Sep/39 +CVE-2013-0343 - http://www.ubuntu.com/usn/USN-1976-1 +CVE-2013-0349 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2013-0351 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0367 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0368 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0371 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0375 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0383 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0384 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0385 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0386 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0389 - http://www.ubuntu.com/usn/USN-1703-1 +CVE-2013-0398 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-0401 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-0401 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ +CVE-2013-0402 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-0402 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ +CVE-2013-0403 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0404 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0405 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0406 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0408 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0409 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0410 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0411 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0412 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0413 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0416 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-0419 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0422 - http://immunityproducts.blogspot.ca/2013/01/confirmed-java-only-fixed-one-of-two.html +CVE-2013-0422 - http://krebsonsecurity.com/2013/01/zero-day-java-exploit-debuts-in-crimeware/ +CVE-2013-0422 - http://seclists.org/bugtraq/2013/Jan/48 +CVE-2013-0422 - https://threatpost.com/en_us/blogs/nasty-new-java-zero-day-found-exploit-kits-already-have-it-011013 +CVE-2013-0423 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0424 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0425 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0426 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0427 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0428 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0428 - https://bugzilla.redhat.com/show_bug.cgi?id=907207 +CVE-2013-0429 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0430 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0431 - http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ +CVE-2013-0431 - http://seclists.org/fulldisclosure/2013/Jan/142 +CVE-2013-0431 - http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717 +CVE-2013-0431 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0432 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0433 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0434 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0435 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0436 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0437 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0438 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0439 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0440 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0441 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0442 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0443 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0444 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0445 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0446 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0447 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0448 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0449 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0450 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-0499 - http://seclists.org/bugtraq/2013/May/83 +CVE-2013-0577 - http://www-01.ibm.com/support/docview.wss?uid=swg21651990 +CVE-2013-0579 - http://www-01.ibm.com/support/docview.wss?uid=swg21651990 +CVE-2013-0580 - http://www-01.ibm.com/support/docview.wss?uid=swg21651990 +CVE-2013-0597 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-0608 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16037 +CVE-2013-0618 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15822 +CVE-2013-0657 - https://www.exploit-db.com/exploits/45218/ +CVE-2013-0662 - https://www.exploit-db.com/exploits/45219/ +CVE-2013-0662 - https://www.exploit-db.com/exploits/45220/ +CVE-2013-0663 - https://www.exploit-db.com/exploits/44678/ +CVE-2013-0722 - http://www.exploit-db.com/exploits/23945/ +CVE-2013-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=805121 +CVE-2013-0753 - https://bugzilla.mozilla.org/show_bug.cgi?id=814001 +CVE-2013-0754 - https://bugzilla.mozilla.org/show_bug.cgi?id=814026 +CVE-2013-0755 - https://bugzilla.mozilla.org/show_bug.cgi?id=814027 +CVE-2013-0756 - https://bugzilla.mozilla.org/show_bug.cgi?id=814029 +CVE-2013-0757 - https://bugzilla.mozilla.org/show_bug.cgi?id=813901 +CVE-2013-0758 - https://bugzilla.mozilla.org/show_bug.cgi?id=813906 +CVE-2013-0774 - https://bugzilla.mozilla.org/show_bug.cgi?id=827193 +CVE-2013-0787 - https://bugzilla.mozilla.org/show_bug.cgi?id=848644 +CVE-2013-0788 - https://bugzilla.mozilla.org/show_bug.cgi?id=813442 +CVE-2013-0788 - https://bugzilla.mozilla.org/show_bug.cgi?id=840263 +CVE-2013-0791 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-0793 - https://bugzilla.mozilla.org/show_bug.cgi?id=803870 +CVE-2013-0797 - https://bugzilla.mozilla.org/show_bug.cgi?id=830134 +CVE-2013-0799 - https://bugzilla.mozilla.org/show_bug.cgi?id=848417 +CVE-2013-0803 - https://packetstormsecurity.com/files/cve/CVE-2013-0803 +CVE-2013-0805 - http://packetstormsecurity.com/files/119767/iTop-Cross-Site-Scripting.html +CVE-2013-0807 - http://packetstormsecurity.com/files/119805/gpEasy-3.5.2-Cross-Site-Scripting.html +CVE-2013-0809 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19076 +CVE-2013-0871 - http://www.openwall.com/lists/oss-security/2013/02/15/16 +CVE-2013-0871 - http://www.ubuntu.com/usn/USN-1737-1 +CVE-2013-0871 - http://www.ubuntu.com/usn/USN-1741-1 +CVE-2013-0894 - http://www.ubuntu.com/usn/USN-1790-1 +CVE-2013-0913 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2013-0914 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0914 - http://www.ubuntu.com/usn/USN-1788-1 +CVE-2013-0946 - https://www.exploit-db.com/exploits/42719/ +CVE-2013-10001 - https://vuldb.com/?id.8900 +CVE-2013-10003 - https://vuldb.com/?id.12789 +CVE-2013-1034 - http://www.cloudscan.me/2013/09/cve-2013-1034-stored-xss-xxe-os-x.html +CVE-2013-1052 - http://www.ubuntu.com/usn/USN-1766-1 +CVE-2013-1054 - https://launchpad.net/bugs/1175661 +CVE-2013-1055 - https://launchpad.net/bugs/1175691 +CVE-2013-1060 - http://www.ubuntu.com/usn/USN-1938-1 +CVE-2013-1100 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100 +CVE-2013-1115 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex +CVE-2013-1116 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex +CVE-2013-1117 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex +CVE-2013-1118 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex +CVE-2013-1119 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex +CVE-2013-1124 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1124 +CVE-2013-1140 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1140 +CVE-2013-1142 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat +CVE-2013-1145 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-cce +CVE-2013-1300 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-1306 - http://packetstormsecurity.com/files/140092/Microsoft-Internet-Explorer-9-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html +CVE-2013-1306 - https://www.exploit-db.com/exploits/40894/ +CVE-2013-1309 - http://packetstormsecurity.com/files/140094/Microsoft-Internet-Explorer-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html +CVE-2013-1309 - https://www.exploit-db.com/exploits/40893/ +CVE-2013-1340 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-1345 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-1352 - https://packetstormsecurity.com/files/cve/CVE-2013-1352/page1/ +CVE-2013-1353 - https://packetstormsecurity.com/files/119461/OrangeHRM-2.7.1-Cross-Site-Scripting.html +CVE-2013-1359 - https://packetstormsecurity.com/files/author/7547/ +CVE-2013-1359 - https://seclists.org/fulldisclosure/2013/Jan/125 +CVE-2013-1360 - http://www.exploit-db.com/exploits/24203 +CVE-2013-1360 - https://packetstormsecurity.com/files/cve/CVE-2013-1360 +CVE-2013-1364 - https://support.zabbix.com/browse/ZBX-6097 +CVE-2013-1393 - http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html +CVE-2013-1393 - http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html +CVE-2013-1408 - http://packetstormsecurity.com/files/120089/WordPress-Wysija-Newsletters-2.2-SQL-Injection.html +CVE-2013-1409 - http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html +CVE-2013-1410 - https://www.exploit-database.net/?id=59355 +CVE-2013-1414 - http://www.exploit-db.com/exploits/26528/ +CVE-2013-1418 - https://github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d +CVE-2013-1436 - http://www.openwall.com/lists/oss-security/2013/07/26/5 +CVE-2013-1438 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-1450 - http://pastebin.com/raw.php?i=rz9BcBey +CVE-2013-1450 - http://www.youtube.com/ChristianHaiderPoC +CVE-2013-1450 - http://www.youtube.com/watch?v=TPqagWAvo8U +CVE-2013-1451 - http://pastebin.com/raw.php?i=rz9BcBey +CVE-2013-1451 - http://www.youtube.com/ChristianHaiderPoC +CVE-2013-1451 - http://www.youtube.com/watch?v=TPqagWAvo8U +CVE-2013-1453 - http://karmainsecurity.com/KIS-2013-03 +CVE-2013-1463 - http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html +CVE-2013-1464 - http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html +CVE-2013-1465 - http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html +CVE-2013-1466 - http://packetstormsecurity.com/files/120423/glFusion-1.2.2-Cross-Site-Scripting.html +CVE-2013-1466 - http://www.exploit-db.com/exploits/24536 +CVE-2013-1468 - http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html +CVE-2013-1468 - http://www.exploit-db.com/exploits/24561 +CVE-2013-1469 - http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html +CVE-2013-1469 - http://www.exploit-db.com/exploits/24561 +CVE-2013-1469 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php +CVE-2013-1470 - http://packetstormsecurity.com/files/120593/Geeklog-1.8.2-Cross-Site-Scripting.html +CVE-2013-1471 - http://www.vulnerability-lab.com/get_content.php?id=701 +CVE-2013-1471 - http://www.youtube.com/watch?v=5d7cIaM80oY +CVE-2013-1472 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1473 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1474 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1474 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16378 +CVE-2013-1475 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1476 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1477 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1478 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1479 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1480 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1481 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1482 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1483 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1488 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1488 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ +CVE-2013-1489 - http://seclists.org/fulldisclosure/2013/Jan/241 +CVE-2013-1489 - http://thenextweb.com/insider/2013/01/28/new-vulnerability-bypasses-oracles-attempt-to-stop-malware-drive-by-downloads-via-java-applets/ +CVE-2013-1489 - http://www.informationweek.com/security/application-security/java-security-work-remains-bug-hunter-sa/240147150 +CVE-2013-1489 - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html +CVE-2013-1489 - http://www.zdnet.com/java-update-doesnt-prevent-silent-exploits-at-all-7000010422/ +CVE-2013-1490 - http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ +CVE-2013-1490 - http://seclists.org/fulldisclosure/2013/Jan/142 +CVE-2013-1490 - http://www.informationweek.com/security/application-security/java-hacker-uncovers-two-flaws-in-latest/240146717 +CVE-2013-1491 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1491 - http://www.zdnet.com/pwn2own-down-go-all-the-browsers-7000012283/ +CVE-2013-1493 - http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident +CVE-2013-1494 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1495 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1496 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1497 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1498 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1499 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1500 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-1500 - http://www.securityfocus.com/bid/60627 +CVE-2013-1501 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1502 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-1502 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1503 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1504 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1505 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1506 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1507 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1508 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1509 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1510 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1511 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-1511 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1512 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1513 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1514 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1515 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1516 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1517 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1518 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1518 - https://bugzilla.redhat.com/show_bug.cgi?id=952646 +CVE-2013-1519 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1520 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1521 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1522 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1523 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1524 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1525 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1526 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1527 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1528 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1529 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1530 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1531 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1532 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1533 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1534 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1535 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1536 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1537 - http://seclists.org/fulldisclosure/2013/Feb/18 +CVE-2013-1537 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1538 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1539 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1540 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1541 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1542 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1543 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1544 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1545 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1546 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1547 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1548 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1549 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1550 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1551 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1552 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1553 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1554 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1555 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1556 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1557 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1558 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1559 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1560 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1561 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1562 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1563 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1564 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1565 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1566 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1567 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1568 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1569 - http://bugs.icu-project.org/trac/ticket/10107 +CVE-2013-1569 - http://site.icu-project.org/download/51#TOC-Known-Issues +CVE-2013-1569 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2013-1569 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-1569 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-1570 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-1571 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-1571 - http://www.securityfocus.com/bid/60634 +CVE-2013-1586 - http://anonsvn.wireshark.org/viewvc/trunk/epan/reassemble.c?r1=46999&r2=46998&pathrev=46999 +CVE-2013-1592 - http://www.coresecurity.com/content/SAP-netweaver-msg-srv-multiple-vulnerabilities +CVE-2013-1592 - http://www.exploit-db.com/exploits/24511 +CVE-2013-1592 - https://packetstormsecurity.com/files/cve/CVE-2013-1592 +CVE-2013-1593 - https://packetstormsecurity.com/files/cve/CVE-2013-1593 +CVE-2013-1593 - https://www.coresecurity.com/content/SAP-netweaver-msg-srv-multiple-vulnerabilities +CVE-2013-1594 - http://www.exploit-db.com/exploits/25139 +CVE-2013-1594 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt +CVE-2013-1594 - https://packetstormsecurity.com/files/cve/CVE-2013-1594 +CVE-2013-1594 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities +CVE-2013-1595 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt +CVE-2013-1595 - https://packetstormsecurity.com/files/cve/CVE-2013-1595 +CVE-2013-1595 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities +CVE-2013-1596 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt +CVE-2013-1596 - https://packetstormsecurity.com/files/cve/CVE-2013-1596 +CVE-2013-1596 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities +CVE-2013-1597 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt +CVE-2013-1597 - https://packetstormsecurity.com/files/cve/CVE-2013-1597 +CVE-2013-1597 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities +CVE-2013-1598 - https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt +CVE-2013-1598 - https://packetstormsecurity.com/files/cve/CVE-2013-1598 +CVE-2013-1598 - https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities +CVE-2013-1599 - http://www.exploit-db.com/exploits/25138 +CVE-2013-1599 - https://packetstormsecurity.com/files/cve/CVE-2013-1599 +CVE-2013-1599 - https://seclists.org/fulldisclosure/2013/Apr/253 +CVE-2013-1599 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities +CVE-2013-1600 - https://packetstormsecurity.com/files/cve/CVE-2013-1600 +CVE-2013-1600 - https://vuldb.com/?id.8572 +CVE-2013-1600 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities +CVE-2013-1601 - https://packetstormsecurity.com/files/cve/CVE-2013-1601 +CVE-2013-1601 - https://vuldb.com/?id.8573 +CVE-2013-1601 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities +CVE-2013-1602 - https://packetstormsecurity.com/files/cve/CVE-2013-1602 +CVE-2013-1602 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities +CVE-2013-1603 - https://packetstormsecurity.com/files/cve/CVE-2013-1603 +CVE-2013-1603 - https://vuldb.com/?id.8575 +CVE-2013-1603 - https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities +CVE-2013-1604 - http://seclists.org/fulldisclosure/2013/May/194 +CVE-2013-1604 - http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities +CVE-2013-1604 - http://www.exploit-db.com/exploits/25813 +CVE-2013-1605 - http://packetstormsecurity.com/files/121787/MayGion-IP-Camera-Path-Traversal-Buffer-Overflow.html +CVE-2013-1605 - http://seclists.org/fulldisclosure/2013/May/194 +CVE-2013-1605 - http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities +CVE-2013-1605 - http://www.exploit-db.com/exploits/25813 +CVE-2013-1606 - http://www.coresecurity.com/advisories/buffer-overflow-ubiquiti-aircam-rtsp-service +CVE-2013-1606 - http://www.exploit-db.com/exploits/26138/ +CVE-2013-1616 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html +CVE-2013-1617 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html +CVE-2013-1618 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-1619 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-1620 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-1620 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-1620 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1620 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-1621 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-1623 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-1624 - http://www.isg.rhul.ac.uk/tls/TLStiming.pdf +CVE-2013-1629 - http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/ +CVE-2013-1629 - https://github.com/pypa/pip/issues/425 +CVE-2013-1630 - http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/ +CVE-2013-1630 - https://github.com/mardiros/pyshop/blob/master/CHANGES.txt +CVE-2013-1633 - http://www.reddit.com/r/Python/comments/17rfh7/warning_dont_use_pip_in_an_untrusted_network_a/ +CVE-2013-1636 - http://packetstormsecurity.com/files/120433/WordPress-Pretty-Link-1.6.3-Cross-Site-Scripting.html +CVE-2013-1636 - http://packetstormsecurity.com/files/121623/Joomla-Jnews-8.0.1-Cross-Site-Scripting.html +CVE-2013-1640 - http://ubuntu.com/usn/usn-1759-1 +CVE-2013-1641 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt +CVE-2013-1642 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt +CVE-2013-1652 - http://ubuntu.com/usn/usn-1759-1 +CVE-2013-1653 - http://ubuntu.com/usn/usn-1759-1 +CVE-2013-1654 - http://ubuntu.com/usn/usn-1759-1 +CVE-2013-1655 - http://ubuntu.com/usn/usn-1759-1 +CVE-2013-1667 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1668 - http://www.exploit-db.com/exploits/24629 +CVE-2013-1672 - https://bugzilla.mozilla.org/show_bug.cgi?id=850492 +CVE-2013-1682 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1684 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1685 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1686 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1687 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1690 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1692 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1692 - https://bugzilla.mozilla.org/show_bug.cgi?id=866915 +CVE-2013-1693 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1693 - https://bugzilla.mozilla.org/show_bug.cgi?id=711043 +CVE-2013-1694 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1697 - http://www.ubuntu.com/usn/USN-1891-1 +CVE-2013-1705 - https://bugzilla.mozilla.org/show_bug.cgi?id=882865 +CVE-2013-1706 - https://bugzilla.mozilla.org/show_bug.cgi?id=888361 +CVE-2013-1707 - https://bugzilla.mozilla.org/show_bug.cgi?id=888314 +CVE-2013-1712 - https://bugzilla.mozilla.org/show_bug.cgi?id=859072 +CVE-2013-1721 - https://bugzilla.mozilla.org/show_bug.cgi?id=890277 +CVE-2013-1726 - https://bugzilla.mozilla.org/show_bug.cgi?id=890853 +CVE-2013-1733 - https://bugzilla.mozilla.org/show_bug.cgi?id=911593 +CVE-2013-1734 - https://bugzilla.mozilla.org/show_bug.cgi?id=913904 +CVE-2013-1739 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-1739 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1739 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-1740 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-1740 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1740 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-1741 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-1741 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1741 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-1742 - https://bugzilla.mozilla.org/show_bug.cgi?id=924802 +CVE-2013-1744 - http://infosecabsurdity.wordpress.com/research/isa-2013-002/ +CVE-2013-1758 - http://packetstormsecurity.com/files/120378/WordPress-Marekkis-Watermark-Cross-Site-Scripting.html +CVE-2013-1759 - http://packetstormsecurity.com/files/120379/WordPress-Responsive-Logo-Slideshow-Cross-Site-Scripting.html +CVE-2013-1763 - http://www.exploit-db.com/exploits/33336 +CVE-2013-1763 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1763 - http://www.openwall.com/lists/oss-security/2013/02/24/3 +CVE-2013-1767 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1767 - http://www.ubuntu.com/usn/USN-1788-1 +CVE-2013-1768 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-1773 - http://www.exploit-db.com/exploits/23248/ +CVE-2013-1774 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2013-1775 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1776 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1781 - http://drupal.org/node/1929486 +CVE-2013-1786 - http://drupalcode.org/project/company.git/commitdiff/d9a99da +CVE-2013-1792 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1792 - http://www.ubuntu.com/usn/USN-1788-1 +CVE-2013-1796 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1796 - http://www.ubuntu.com/usn/USN-1808-1 +CVE-2013-1797 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1798 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html +CVE-2013-1798 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1803 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html +CVE-2013-1804 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html +CVE-2013-1806 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html +CVE-2013-1807 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html +CVE-2013-1808 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb +CVE-2013-1808 - http://www.openwall.com/lists/oss-security/2013/03/10/2 +CVE-2013-1812 - https://github.com/openid/ruby-openid/pull/43 +CVE-2013-1813 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2013-1813 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2013-1813 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2013-1813 - http://seclists.org/fulldisclosure/2020/Mar/15 +CVE-2013-1813 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2013-1815 - http://rhn.redhat.com/errata/RHSA-2013-0671.html +CVE-2013-1819 - http://www.ubuntu.com/usn/USN-1973-1 +CVE-2013-1828 - http://www.exploit-db.com/exploits/24747 +CVE-2013-1828 - https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1 +CVE-2013-1848 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1848 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2013-1852 - http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html +CVE-2013-1858 - http://stealth.openwall.net/xSports/clown-newuser.c +CVE-2013-1859 - http://packetstormsecurity.com/files/120788/Drupal-Node-Parameter-Control-6.x-Access-Bypass.html +CVE-2013-1860 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1860 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2013-1861 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-1862 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-1875 - http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html +CVE-2013-1887 - http://packetstormsecurity.com/files/120892/Drupal-Views-7.x-Cross-Site-Scripting.html +CVE-2013-1892 - http://www.exploit-db.com/exploits/24947 +CVE-2013-1896 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-1900 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2013-1902 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2013-1903 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2013-1905 - http://packetstormsecurity.com/files/120985/Drupal-Zero-Point-7.x-Cross-Site-Scripting.html +CVE-2013-1907 - http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html +CVE-2013-1908 - http://packetstormsecurity.com/files/120995/Drupal-Common-Wikis-7.x-Access-Bypass-Privilege-Escalation.html +CVE-2013-1914 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html +CVE-2013-1914 - http://seclists.org/fulldisclosure/2021/Sep/0 +CVE-2013-1916 - https://www.exploit-db.com/exploits/16181 +CVE-2013-1925 - http://packetstormsecurity.com/files/121072/Drupal-Chaos-Tool-Suite-7.x-Access-Bypass.html +CVE-2013-1929 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1929 - http://www.ubuntu.com/usn/USN-1834-1 +CVE-2013-1937 - http://immunityservices.blogspot.com/2019/02/cvss.html +CVE-2013-1937 - http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html +CVE-2013-1940 - https://bugs.freedesktop.org/show_bug.cgi?id=63353 +CVE-2013-1942 - https://github.com/happyworm/jPlayer/commit/e8ca190f7f972a6a421cb95f09e138720e40ed6d +CVE-2013-1944 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-1954 - http://trac.videolan.org/vlc/ticket/8024 +CVE-2013-1959 - http://www.openwall.com/lists/oss-security/2013/04/29/1 +CVE-2013-1965 - http://struts.apache.org/development/2.x/docs/s2-012.html +CVE-2013-1966 - http://struts.apache.org/development/2.x/docs/s2-013.html +CVE-2013-1966 - https://cwiki.apache.org/confluence/display/WW/S2-013 +CVE-2013-1967 - https://github.com/johndyer/mediaelement/commit/9223dc6bfc50251a9a3cba0210e71be80fc38ecd +CVE-2013-1977 - https://bugs.launchpad.net/devstack/+bug/1168252 +CVE-2013-1979 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-1979 - http://www.openwall.com/lists/oss-security/2013/04/29/1 +CVE-2013-20002 - https://en.0day.today/exploit/22090 +CVE-2013-20002 - https://packetstormsecurity.com/files/124149/WordPress-Elemin-Shell-Upload.html +CVE-2013-20002 - https://themify.me/blog/urgent-vulnerability-found-in-themify-framework-please-read +CVE-2013-20003 - https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/ +CVE-2013-20003 - https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf +CVE-2013-2006 - https://bugs.launchpad.net/ossn/+bug/1168252 +CVE-2013-2010 - http://packetstormsecurity.com/files/130999/WordPress-W3-Total-Cache-PHP-Code-Execution.html +CVE-2013-2017 - http://www.openwall.com/lists/oss-security/2013/04/29/10 +CVE-2013-2018 - http://www.openwall.com/lists/oss-security/2013/04/29/11 +CVE-2013-2019 - http://www.openwall.com/lists/oss-security/2013/04/29/11 +CVE-2013-2024 - http://www.openwall.com/lists/oss-security/2013/04/29/13 +CVE-2013-2025 - https://github.com/ushahidi/Ushahidi_Web/issues/1009 +CVE-2013-2027 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2013-2028 - http://packetstormsecurity.com/files/121675/Nginx-1.3.9-1.4.0-Denial-Of-Service.html +CVE-2013-2028 - https://github.com/rapid7/metasploit-framework/pull/1834 +CVE-2013-2031 - https://bugzilla.wikimedia.org/show_bug.cgi?id=47304 +CVE-2013-2033 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb +CVE-2013-2034 - http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb +CVE-2013-2036 - https://drupal.org/node/1983356 +CVE-2013-2050 - http://packetstormsecurity.com/files/124609/cfme_manageiq_evm_pass_reset.rb.txt +CVE-2013-2061 - https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc +CVE-2013-2064 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2013-2067 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2013-2088 - https://www.exploit-db.com/exploits/40507/ +CVE-2013-2090 - http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html +CVE-2013-2094 - http://packetstormsecurity.com/files/121616/semtex.c +CVE-2013-2094 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2094 - http://www.reddit.com/r/netsec/comments/1eb9iw +CVE-2013-2095 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095 +CVE-2013-2097 - http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html +CVE-2013-2097 - http://www.exploit-db.com/exploits/25519 +CVE-2013-2105 - http://vapid.dhs.org/advisories/show_in_browser.html +CVE-2013-2105 - http://www.openwall.com/lists/oss-security/2013/05/18/4 +CVE-2013-2107 - http://seclists.org/oss-sec/2013/q2/356 +CVE-2013-2115 - http://struts.apache.org/development/2.x/docs/s2-014.html +CVE-2013-2115 - https://cwiki.apache.org/confluence/display/WW/S2-014 +CVE-2013-2131 - https://github.com/oetiker/rrdtool-1.x/pull/397 +CVE-2013-2134 - http://struts.apache.org/development/2.x/docs/s2-015.html +CVE-2013-2134 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-2134 - https://cwiki.apache.org/confluence/display/WW/S2-015 +CVE-2013-2135 - http://struts.apache.org/development/2.x/docs/s2-015.html +CVE-2013-2135 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-2135 - https://cwiki.apache.org/confluence/display/WW/S2-015 +CVE-2013-2140 - http://www.ubuntu.com/usn/USN-1938-1 +CVE-2013-2141 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2143 - http://packetstormsecurity.com/files/125866/Katello-Red-Hat-Satellite-users-update_roles-Missing-Authorization.html +CVE-2013-2146 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2162 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711600 +CVE-2013-2164 - https://bugzilla.redhat.com/show_bug.cgi?id=973100 +CVE-2013-2165 - http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html +CVE-2013-2166 - http://www.securityfocus.com/bid/60684 +CVE-2013-2167 - http://www.securityfocus.com/bid/60680 +CVE-2013-2172 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-2172 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-2172 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-2174 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-2174 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-2178 - http://www.openwall.com/lists/oss-security/2013/06/13/7 +CVE-2013-2182 - http://www.openwall.com/lists/oss-security/2013/06/14/11 +CVE-2013-2182 - https://github.com/monkey/monkey/issues/92 +CVE-2013-2186 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-2186 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-2186 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-2186 - https://www.tenable.com/security/research/tra-2016-23 +CVE-2013-2205 - http://make.wordpress.org/core/2013/06/21/secure-swfupload/ +CVE-2013-2224 - http://www.openwall.com/lists/oss-security/2013/06/30/7 +CVE-2013-2226 - http://www.securityfocus.com/bid/60693 +CVE-2013-2226 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php +CVE-2013-2227 - http://www.securityfocus.com/bid/60692 +CVE-2013-2227 - https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html +CVE-2013-2232 - http://www.ubuntu.com/usn/USN-1938-1 +CVE-2013-2233 - https://github.com/ansible/ansible/issues/857 +CVE-2013-2234 - http://www.ubuntu.com/usn/USN-1938-1 +CVE-2013-2237 - http://www.ubuntu.com/usn/USN-1973-1 +CVE-2013-2248 - http://struts.apache.org/release/2.3.x/docs/s2-017.html +CVE-2013-2248 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-2251 - http://cxsecurity.com/issue/WLB-2014010087 +CVE-2013-2251 - http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html +CVE-2013-2251 - http://struts.apache.org/release/2.3.x/docs/s2-016.html +CVE-2013-2251 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 +CVE-2013-2251 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-2270 - http://packetstormsecurity.com/files/120594/Airvana-HubBub-C1-600-RT-Cross-Site-Scripting.html +CVE-2013-2271 - http://packetstormsecurity.com/files/120613/dlinkdsl2740b-bypass.txt +CVE-2013-2275 - http://ubuntu.com/usn/usn-1759-1 +CVE-2013-2277 - http://www.ubuntu.com/usn/USN-1790-1 +CVE-2013-2294 - http://packetstormsecurity.com/files/120862/ViewGit-0.0.6-Cross-Site-Scripting.html +CVE-2013-2294 - http://seclists.org/fulldisclosure/2013/Mar/174 +CVE-2013-2294 - http://www.exploit-db.com/exploits/24862 +CVE-2013-2299 - http://ics-cert.us-cert.gov/advisories/ICSA-13-225-01 +CVE-2013-2352 - http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/ +CVE-2013-2371 - http://www.tibco.com/mk/advisory.jsp +CVE-2013-2372 - http://www.tibco.com/mk/advisory.jsp +CVE-2013-2373 - http://www.tibco.com/mk/advisory.jsp +CVE-2013-2374 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2375 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2376 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-2376 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2377 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2378 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2379 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2380 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2381 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2382 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2383 - http://bugs.icu-project.org/trac/ticket/10107 +CVE-2013-2383 - http://site.icu-project.org/download/51#TOC-Known-Issues +CVE-2013-2383 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2013-2383 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-2383 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2384 - http://bugs.icu-project.org/trac/ticket/10107 +CVE-2013-2384 - http://site.icu-project.org/download/51#TOC-Known-Issues +CVE-2013-2384 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2013-2384 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-2384 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2385 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2386 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2387 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2388 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2389 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2390 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2391 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2392 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2393 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2394 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2395 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2396 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2397 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2398 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2399 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2400 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2401 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2402 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2403 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2404 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2405 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2406 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2407 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2407 - http://www.securityfocus.com/bid/60653 +CVE-2013-2408 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2409 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2410 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2411 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2412 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2412 - http://www.securityfocus.com/bid/60618 +CVE-2013-2413 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2414 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2415 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2416 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2417 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2418 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2419 - http://bugs.icu-project.org/trac/ticket/10107 +CVE-2013-2419 - http://site.icu-project.org/download/51#TOC-Known-Issues +CVE-2013-2419 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2013-2419 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-2419 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2420 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2421 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2422 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2423 - http://www.exploit-db.com/exploits/24976 +CVE-2013-2423 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2424 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2425 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2426 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2427 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2428 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2429 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2430 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2431 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2432 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2433 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2434 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2435 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2436 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2437 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2437 - http://www.securityfocus.com/bid/60636 +CVE-2013-2438 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2439 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2440 - http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html +CVE-2013-2441 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html +CVE-2013-2442 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2442 - http://www.securityfocus.com/bid/60643 +CVE-2013-2443 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2443 - http://www.securityfocus.com/bid/60646 +CVE-2013-2444 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2444 - http://www.securityfocus.com/bid/60633 +CVE-2013-2445 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2445 - http://www.securityfocus.com/bid/60639 +CVE-2013-2446 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2446 - http://www.securityfocus.com/bid/60620 +CVE-2013-2447 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2447 - http://www.securityfocus.com/bid/60629 +CVE-2013-2448 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2448 - http://www.securityfocus.com/bid/60640 +CVE-2013-2449 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2450 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2450 - http://www.securityfocus.com/bid/60638 +CVE-2013-2451 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2451 - http://www.securityfocus.com/bid/60625 +CVE-2013-2452 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2452 - http://www.securityfocus.com/bid/60617 +CVE-2013-2453 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2453 - http://www.securityfocus.com/bid/60644 +CVE-2013-2454 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2454 - http://www.securityfocus.com/bid/60650 +CVE-2013-2455 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2455 - http://www.securityfocus.com/bid/60619 +CVE-2013-2456 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2456 - http://www.securityfocus.com/bid/60641 +CVE-2013-2457 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2457 - http://www.securityfocus.com/bid/60632 +CVE-2013-2458 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2459 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2459 - http://www.securityfocus.com/bid/60647 +CVE-2013-2460 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2460 - https://bugzilla.redhat.com/show_bug.cgi?id=975122 +CVE-2013-2461 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-2461 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2461 - http://www.securityfocus.com/bid/60645 +CVE-2013-2461 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-2462 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2463 - http://www.informationweek.com/security/vulnerabilities/hackers-target-java-6-with-security-expl/240160443 +CVE-2013-2463 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2463 - http://www.securityfocus.com/bid/60655 +CVE-2013-2464 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2464 - http://www.securityfocus.com/bid/60631 +CVE-2013-2465 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2465 - http://www.securityfocus.com/bid/60657 +CVE-2013-2466 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2466 - http://www.securityfocus.com/bid/60624 +CVE-2013-2467 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2468 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2468 - http://www.securityfocus.com/bid/60637 +CVE-2013-2469 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2469 - http://www.securityfocus.com/bid/60658 +CVE-2013-2470 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2470 - http://www.securityfocus.com/bid/60651 +CVE-2013-2471 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2471 - http://www.securityfocus.com/bid/60659 +CVE-2013-2472 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2472 - http://www.securityfocus.com/bid/60656 +CVE-2013-2473 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-2473 - http://www.securityfocus.com/bid/60623 +CVE-2013-2474 - http://www.exploit-db.com/exploits/24906 +CVE-2013-2475 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8274 +CVE-2013-2492 - http://tracker.firebirdsql.org/browse/CORE-4058 +CVE-2013-2492 - https://gist.github.com/zeroSteiner/85daef257831d904479c +CVE-2013-2495 - http://www.ubuntu.com/usn/USN-1790-1 +CVE-2013-2496 - http://www.ubuntu.com/usn/USN-1790-1 +CVE-2013-2501 - http://packetstormsecurity.com/files/120730/WordPress-Terillion-Reviews-Cross-Site-Scripting.html +CVE-2013-2503 - http://blog.c22.cc/2013/03/11/privoxy-proxy-authentication-credential-exposure-cve-2013-2503/ +CVE-2013-2507 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2507 - http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html +CVE-2013-2512 - http://vapidlabs.com/advisory.php?v=34 +CVE-2013-2516 - http://www.vapidlabs.com/advisory.php?v=36 +CVE-2013-2546 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2547 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2548 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2558 - http://immunityproducts.blogspot.com/2013/03/infiltrate-preview-truetype-font.html +CVE-2013-2561 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2013-2562 - http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt +CVE-2013-2563 - http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt +CVE-2013-2564 - http://packetstormsecurity.com/files/108462/mambocms465-permdosdisclose.txt +CVE-2013-2566 - http://www.isg.rhul.ac.uk/tls/ +CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2013-2566 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2013-2567 - http://www.coresecurity.com/advisories/zavio-IP-cameras-multiple-vulnerabilities +CVE-2013-2567 - http://www.exploit-db.com/exploits/25815 +CVE-2013-2567 - https://packetstormsecurity.com/files/cve/CVE-2013-2567 +CVE-2013-2568 - https://packetstormsecurity.com/files/cve/CVE-2013-2568/page1/ +CVE-2013-2568 - https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities +CVE-2013-2569 - https://packetstormsecurity.com/files/cve/CVE-2013-2569 +CVE-2013-2569 - https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities +CVE-2013-2570 - https://packetstormsecurity.com/files/cve/CVE-2013-2570 +CVE-2013-2570 - https://www.coresecurity.com/advisories/zavio-ip-cameras-multiple-vulnerabilities +CVE-2013-2571 - http://www.exploit-db.com/exploits/25987 +CVE-2013-2571 - https://packetstormsecurity.com/files/121917/Xpient-POS-Iris-3.8-Cash-Drawer-Operation-Remote-Trigger.html +CVE-2013-2572 - http://www.exploit-db.com/exploits/25812 +CVE-2013-2572 - https://packetstormsecurity.com/files/cve/CVE-2013-2572 +CVE-2013-2572 - https://www.coresecurity.com/advisories/tp-link-ip-cameras-multiple-vulnerabilities +CVE-2013-2573 - https://packetstormsecurity.com/files/cve/CVE-2013-2573 +CVE-2013-2573 - https://vuldb.com/?id.8912 +CVE-2013-2573 - https://www.coresecurity.com/advisories/tp-link-IP-cameras-multiple-vulnerabilities +CVE-2013-2574 - http://www.coresecurity.com/advisories/foscam-ip-cameras-improper-access-restrictions +CVE-2013-2574 - http://www.exploit-db.com/exploits/27076 +CVE-2013-2574 - https://packetstormsecurity.com/files/cve/CVE-2013-2574 +CVE-2013-2576 - http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability +CVE-2013-2576 - http://www.exploit-db.com/exploits/27047 +CVE-2013-2577 - http://www.coresecurity.com/advisories/xnview-buffer-overflow-vulnerability +CVE-2013-2577 - http://www.exploit-db.com/exploits/27049 +CVE-2013-2578 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras +CVE-2013-2579 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras +CVE-2013-2580 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras +CVE-2013-2581 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras +CVE-2013-2585 - http://www.isecauditors.com/advisories-2013#2013-004 +CVE-2013-2586 - http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html +CVE-2013-2586 - http://www.exploit-db.com/exploits/28654 +CVE-2013-2594 - http://packetstormsecurity.com/files/121402/Hornbill-Supportworks-ITSM-1.0.0-SQL-Injection.html +CVE-2013-2596 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2596 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2013-2615 - http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html +CVE-2013-2615 - http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html +CVE-2013-2616 - http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html +CVE-2013-2617 - http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html +CVE-2013-2617 - http://seclists.org/fulldisclosure/2013/Mar/124 +CVE-2013-2618 - http://packetstormsecurity.com/files/121034/Network-Weathermap-0.97a-Cross-Site-Scripting.html +CVE-2013-2619 - http://packetstormsecurity.com/files/121035/Aspen-0.8-Directory-Traversal.html +CVE-2013-2619 - http://seclists.org/fulldisclosure/2013/Apr/2 +CVE-2013-2621 - https://www.isecauditors.com/advisories-2013#2013-009 +CVE-2013-2622 - https://packetstormsecurity.com/files/123557/Uebimiau-2.7.11-Cross-Site-Scripting-Open-Redirection.html +CVE-2013-2623 - https://www.isecauditors.com/advisories-2013#2013-009 +CVE-2013-2624 - https://www.isecauditors.com/advisories-2013#2013-009 +CVE-2013-2631 - https://packetstormsecurity.com/files/121128/TinyWebGallery-1.8.9-Path-Disclosure.html +CVE-2013-2631 - https://www.isecauditors.com/advisories-2013#2013-012 +CVE-2013-2634 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2634 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2013-2635 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2635 - http://www.ubuntu.com/usn/USN-1814-1 +CVE-2013-2651 - http://packetstormsecurity.com/files/123558 +CVE-2013-2652 - http://packetstormsecurity.com/files/123771/WebCollab-3.30-HTTP-Response-Splitting.html +CVE-2013-2653 - http://seclists.org/bugtraq/2013/Aug/12 +CVE-2013-2670 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2670 - http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html +CVE-2013-2671 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2671 - http://www.cloudscan.me/2013/05/xss-javascript-injection-brother-mfc.html +CVE-2013-2672 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2673 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2674 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2675 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2676 - http://packetstormsecurity.com/files/121553/Brother-MFC-9970CDW-Firmware-0D-Cross-Site-Scripting.html +CVE-2013-2678 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2678 - http://www.exploit-db.com/exploits/25292 +CVE-2013-2679 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2679 - http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html +CVE-2013-2680 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2681 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2682 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2683 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2684 - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2013-2686 - http://telussecuritylabs.com/threats/show/TSL20130327-01 +CVE-2013-2686 - https://issues.asterisk.org/jira/browse/ASTERISK-20967 +CVE-2013-2687 - http://aluigi.altervista.org/adv/qnxph_1-adv.txt +CVE-2013-2687 - http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01 +CVE-2013-2688 - http://aluigi.altervista.org/adv/qnxph_1-adv.txt +CVE-2013-2688 - http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01 +CVE-2013-2690 - http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html +CVE-2013-2690 - http://www.exploit-db.com/exploits/24898 +CVE-2013-2712 - http://www.exploit-db.com/exploits/24965 +CVE-2013-2713 - http://www.exploit-db.com/exploits/24965 +CVE-2013-2741 - http://packetstormsecurity.com/files/120923 +CVE-2013-2742 - http://packetstormsecurity.com/files/120923 +CVE-2013-2743 - http://packetstormsecurity.com/files/120923 +CVE-2013-2744 - http://packetstormsecurity.com/files/120923 +CVE-2013-2748 - http://www.exploit-db.com/exploits/24924 +CVE-2013-2751 - http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html +CVE-2013-2754 - http://packetstormsecurity.com/files/121564/UMI.CMS-2.9-Cross-Site-Request-Forgery.html +CVE-2013-2760 - http://www.exploit-db.com/exploits/24930/ +CVE-2013-2766 - http://www.splunk.com/view/SP-CAAAHSQ +CVE-2013-2767 - http://www.kb.cert.org/vuls/id/521612 +CVE-2013-2776 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-2817 - http://ics-cert.us-cert.gov/advisories/ICSA-14-051-02 +CVE-2013-2842 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15914 +CVE-2013-2850 - http://www.ubuntu.com/usn/USN-1847-1 +CVE-2013-2852 - http://www.ubuntu.com/usn/USN-1915-1 +CVE-2013-2874 - https://code.google.com/p/chromium/issues/detail?id=237611 +CVE-2013-2877 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-2877 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-2877 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-2888 - http://www.ubuntu.com/usn/USN-1976-1 +CVE-2013-2892 - http://www.ubuntu.com/usn/USN-1976-1 +CVE-2013-2924 - http://bugs.icu-project.org/trac/ticket/10318 +CVE-2013-2929 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-2930 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-2945 - http://packetstormsecurity.com/files/121481/b2evolution-4.1.6-SQL-Injection.html +CVE-2013-2967 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-2976 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-3006 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3007 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3008 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3009 - http://seclists.org/fulldisclosure/2016/Apr/3 +CVE-2013-3009 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3010 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3011 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3012 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-3029 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-3050 - http://packetstormsecurity.com/files/121202/ZAPms-1.41-SQL-Injection.html +CVE-2013-3050 - http://www.exploit-db.com/exploits/24942 +CVE-2013-3067 - https://www.ise.io/research/studies-and-papers/linksys_wrt310v2/ +CVE-2013-3070 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-3072 - https://www.ise.io/research/studies-and-papers/netgear_wndr4700/ +CVE-2013-3073 - https://vuldb.com/?id.8471 +CVE-2013-3073 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-3085 - https://www.ise.io/research/studies-and-papers/belkin_f5d8236-4v2/ +CVE-2013-3088 - https://www.ise.io/research/studies-and-papers/belkin_n900/ +CVE-2013-3091 - https://www.ise.io/research/studies-and-papers/belkin_n900/ +CVE-2013-3096 - https://www.ise.io/research/studies-and-papers/dlink_dir865l/ +CVE-2013-3111 - http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html +CVE-2013-3111 - https://www.exploit-db.com/exploits/40907/ +CVE-2013-3120 - https://www.exploit-db.com/exploits/40844/ +CVE-2013-3129 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-3143 - http://packetstormsecurity.com/files/140166/Microsoft-Internet-Explorer-9-IEFRAME-CMarkup..RemovePointerPos-Use-After-Free.html +CVE-2013-3143 - https://www.exploit-db.com/exploits/40923/ +CVE-2013-3154 - http://blogs.technet.com/b/srd/archive/2013/07/09/assessing-risk-for-the-july-2013-security-updates.aspx +CVE-2013-3154 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-058 +CVE-2013-3167 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-3172 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-3173 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-3221 - http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/ +CVE-2013-3222 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3223 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3224 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3225 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3227 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3228 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3229 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3231 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3232 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3233 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3234 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3235 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-3242 - http://karmainsecurity.com/KIS-2013-04 +CVE-2013-3242 - http://www.exploit-db.com/exploits/25087 +CVE-2013-3245 - http://seclists.org/fulldisclosure/2013/Jul/71 +CVE-2013-3245 - http://seclists.org/fulldisclosure/2013/Jul/77 +CVE-2013-3245 - http://seclists.org/fulldisclosure/2013/Jul/79 +CVE-2013-3245 - http://secunia.com/blog/372/ +CVE-2013-3245 - http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia +CVE-2013-3281 - http://www.kb.cert.org/vuls/id/466876 +CVE-2013-3294 - http://packetstormsecurity.com/files/121643/Exponent-CMS-2.2.0-Beta-3-LFI-SQL-Injection.html +CVE-2013-3294 - http://seclists.org/bugtraq/2013/May/57 +CVE-2013-3299 - http://seclists.org/bugtraq/2013/Jul/18 +CVE-2013-3301 - http://www.ubuntu.com/usn/USN-1834-1 +CVE-2013-3302 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 +CVE-2013-3311 - http://www.exploit-db.com/exploits/27878 +CVE-2013-3312 - https://www.exploit-db.com/exploits/27878 +CVE-2013-3313 - https://www.exploit-db.com/exploits/27878 +CVE-2013-3314 - http://www.exploit-db.com/exploits/27878 +CVE-2013-3315 - http://www.tibco.com/mk/advisory.jsp +CVE-2013-3316 - http://www.exploit-db.com/exploits/24916/ +CVE-2013-3317 - http://www.exploit-db.com/exploits/24916/ +CVE-2013-3319 - http://labs.integrity.pt/advisories/cve-2013-3319/ +CVE-2013-3321 - https://www.securityfocus.com/archive/1/526552 +CVE-2013-3322 - https://www.securityfocus.com/archive/1/526552 +CVE-2013-3366 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-3367 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-3402 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-3403 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-3404 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-3412 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-3433 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-3434 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-3482 - http://www.secunia.com/blog/366 +CVE-2013-3484 - https://github.com/dotCMS/dotCMS/issues/2949 +CVE-2013-3499 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3500 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3501 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3502 - http://www.exploit-db.com/exploits/25001 +CVE-2013-3502 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3503 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3504 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3505 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3506 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3507 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3508 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3509 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3510 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3511 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3512 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3513 - http://www.kb.cert.org/vuls/id/345260 +CVE-2013-3514 - http://seclists.org/bugtraq/2013/Jul/27 +CVE-2013-3515 - http://seclists.org/bugtraq/2013/Jul/27 +CVE-2013-3515 - http://www.exploit-db.com/exploits/26624 +CVE-2013-3516 - https://www.ise.io/research/studies-and-papers/netgear_wnr3500/ +CVE-2013-3524 - http://www.exploit-db.com/exploits/24960 +CVE-2013-3525 - http://packetstormsecurity.com/files/121245/RT-Request-Tracker-4.0.10-SQL-Injection.html +CVE-2013-3526 - http://packetstormsecurity.com/files/121167/WordPress-Traffic-Analyzer-Cross-Site-Scripting.html +CVE-2013-3527 - http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html +CVE-2013-3529 - http://packetstormsecurity.com/files/121030/WordPress-FuneralPress-1.1.6-Cross-Site-Scripting.html +CVE-2013-3530 - http://packetstormsecurity.com/files/121204/WordPress-Spiffy-XSPF-Player-0.1-SQL-Injection.html +CVE-2013-3531 - http://packetstormsecurity.com/files/121091/Radio-CMS-2.2-SQL-Injection.html +CVE-2013-3532 - http://packetstormsecurity.com/files/121250/WordPress-Spider-Video-Player-2.1-SQL-Injection.html +CVE-2013-3532 - http://packetstormsecurity.com/files/128851/WordPress-HTML5-Flash-Player-SQL-Injection.html +CVE-2013-3533 - http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html +CVE-2013-3535 - http://packetstormsecurity.com/files/121303/CMSLogik-1.2.1-Cross-Site-Scripting.html +CVE-2013-3535 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php +CVE-2013-3536 - http://packetstormsecurity.com/files/121046/WHMCS-Grouppay-1.5-SQL-Injection.html +CVE-2013-3537 - http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html +CVE-2013-3538 - http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html +CVE-2013-3539 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3540 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3541 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3542 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3542 - https://www.youtube.com/watch?v=XkCBs4lenhI +CVE-2013-3543 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3577 - http://www.kb.cert.org/vuls/id/217836 +CVE-2013-3578 - http://www.kb.cert.org/vuls/id/217836 +CVE-2013-3579 - http://www.kb.cert.org/vuls/id/704828 +CVE-2013-3580 - http://www.kb.cert.org/vuls/id/709806 +CVE-2013-3582 - http://www.kb.cert.org/vuls/id/912156 +CVE-2013-3582 - http://www.kb.cert.org/vuls/id/BLUU-99HSLA +CVE-2013-3582 - https://media.blackhat.com/us-13/US-13-Butterworth-BIOS-Security-Slides.pdf +CVE-2013-3582 - https://www.blackhat.com/us-13/archives.html#Butterworth +CVE-2013-3583 - http://www.kb.cert.org/vuls/id/595142 +CVE-2013-3584 - http://www.kb.cert.org/vuls/id/595142 +CVE-2013-3585 - http://www.kb.cert.org/vuls/id/882286 +CVE-2013-3586 - http://www.kb.cert.org/vuls/id/882286 +CVE-2013-3587 - http://breachattack.com/ +CVE-2013-3587 - https://www.blackhat.com/us-13/briefings.html#Prado +CVE-2013-3591 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3594 - http://www.kb.cert.org/vuls/id/122582 +CVE-2013-3595 - http://www.kb.cert.org/vuls/id/122582 +CVE-2013-3599 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3600 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3601 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3602 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3603 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3604 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3605 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-3606 - http://www.kb.cert.org/vuls/id/122582 +CVE-2013-3607 - http://www.kb.cert.org/vuls/id/648646 +CVE-2013-3608 - http://www.kb.cert.org/vuls/id/648646 +CVE-2013-3609 - http://www.kb.cert.org/vuls/id/648646 +CVE-2013-3616 - http://www.kb.cert.org/vuls/id/521348 +CVE-2013-3617 - http://www.kb.cert.org/vuls/id/533894 +CVE-2013-3617 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3626 - http://www.kb.cert.org/vuls/id/436214 +CVE-2013-3627 - http://www.kb.cert.org/vuls/id/613886 +CVE-2013-3628 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3629 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3630 - http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html +CVE-2013-3630 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3631 - http://www.kb.cert.org/vuls/id/326830 +CVE-2013-3631 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3632 - https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats +CVE-2013-3635 - http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html +CVE-2013-3636 - http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html +CVE-2013-3637 - http://packetstormsecurity.com/files/122341/Project-Pier-0.8.8-XSS-Insecure-Cookies.html +CVE-2013-3639 - http://packetstormsecurity.com/files/122174/Xaraya-2.4.0-b1-Cross-Site-Scripting.html +CVE-2013-3660 - http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ +CVE-2013-3660 - http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw +CVE-2013-3660 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 +CVE-2013-3661 - http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ +CVE-2013-3661 - http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw +CVE-2013-3662 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html +CVE-2013-3663 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html +CVE-2013-3664 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html +CVE-2013-3666 - https://plus.google.com/110348415484169880343/posts/9KxBtkyuYcj +CVE-2013-3670 - http://ffmpeg.org/security.html +CVE-2013-3671 - http://ffmpeg.org/security.html +CVE-2013-3672 - http://ffmpeg.org/security.html +CVE-2013-3673 - http://ffmpeg.org/security.html +CVE-2013-3674 - http://ffmpeg.org/security.html +CVE-2013-3675 - http://ffmpeg.org/security.html +CVE-2013-3678 - http://packetstormsecurity.com/files/129083/SAP-GRC-Bypass-Privilege-Escalation-Program-Execution.html +CVE-2013-3685 - https://androidvulnerabilities.org/all +CVE-2013-3686 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3687 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3688 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3688 - http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras +CVE-2013-3689 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3690 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3691 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3693 - http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=1C7CE6911426BCFAF2A80C3834F4DF0F?externalId=KB35139&sliceId=1&cmd=displayKC&docType=kc&noCount=true&ViewedDocsListHelper=com.kanisa.apps.common.BaseViewedDocsListHelperImpl +CVE-2013-3718 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-3718 +CVE-2013-3720 - http://www.darksecurity.de/advisories/2013/SSCHADV2013-004.txt +CVE-2013-3721 - http://packetstormsecurity.com/files/120976/PsychoStats-3.2.2b-Blind-SQL-Injection.html +CVE-2013-3727 - http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html +CVE-2013-3727 - http://seclists.org/bugtraq/2013/Jul/26 +CVE-2013-3728 - http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html +CVE-2013-3728 - http://seclists.org/bugtraq/2013/Jul/26 +CVE-2013-3729 - http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html +CVE-2013-3729 - http://seclists.org/bugtraq/2013/Jul/26 +CVE-2013-3734 - https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ +CVE-2013-3739 - http://www.exploit-db.com/exploits/26125 +CVE-2013-3743 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-3743 - http://www.securityfocus.com/bid/60626 +CVE-2013-3744 - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html +CVE-2013-3744 - http://www.securityfocus.com/bid/60654 +CVE-2013-3745 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3746 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3747 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3748 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3749 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3750 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3751 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-3751 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-3751 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3751 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-3752 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3753 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3754 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3755 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3756 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3757 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3758 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3759 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3760 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3761 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3762 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3763 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3764 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3765 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3766 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3767 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3768 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3769 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3770 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3771 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3772 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3773 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3774 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-3774 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-3774 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3774 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-3775 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3776 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3777 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3778 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3779 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3780 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3781 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3782 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3783 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3784 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3785 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3786 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3787 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3788 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3789 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3790 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3791 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3792 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3793 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-3793 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3794 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-3794 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3795 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3796 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3797 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3798 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3799 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3800 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3801 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-3801 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3802 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3803 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3804 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3805 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-3805 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3806 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3807 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3808 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3809 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-3809 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3810 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3811 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3812 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-3812 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3813 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3814 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3816 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3818 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3819 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3820 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3821 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3822 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3823 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3824 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3825 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html +CVE-2013-3826 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3827 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3828 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3829 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3829 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-3831 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3832 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3833 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3834 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3835 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3836 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3837 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3838 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3839 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3840 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3841 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3842 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-3893 - http://packetstormsecurity.com/files/162585/Microsoft-Internet-Explorer-8-SetMouseCapture-Use-After-Free.html +CVE-2013-3918 - http://www.darkreading.com/vulnerability/new-ie-vulnerability-found-in-the-wild-s/240163814/ +CVE-2013-3928 - http://longinox.blogspot.com/2013/08/explot-stack-based-overflow-bypassing.html +CVE-2013-3928 - http://packetstormsecurity.com/files/122810/Chasys-Draw-IES-Buffer-Overflow.html +CVE-2013-3928 - http://www.exploit-db.com/exploits/27609 +CVE-2013-3960 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18896 +CVE-2013-3961 - http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html +CVE-2013-3961 - http://seclists.org/fulldisclosure/2013/Jun/67 +CVE-2013-3961 - http://www.exploit-db.com/exploits/26136 +CVE-2013-3961 - http://www.webera.fr/advisory-02-php-agenda-isql-exploit +CVE-2013-3962 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3963 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3964 - http://seclists.org/fulldisclosure/2013/Jun/84 +CVE-2013-3969 - http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/ +CVE-2013-4002 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013 +CVE-2013-4002 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-4002 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2013-4004 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-4005 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 +CVE-2013-4057 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR48815 +CVE-2013-4057 - http://www-01.ibm.com/support/docview.wss?uid=swg21666684 +CVE-2013-4058 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR48815 +CVE-2013-4058 - http://www-01.ibm.com/support/docview.wss?uid=swg21666684 +CVE-2013-4059 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR48815 +CVE-2013-4059 - http://www-01.ibm.com/support/docview.wss?uid=swg21666684 +CVE-2013-4074 - http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html +CVE-2013-4078 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8729 +CVE-2013-4091 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html +CVE-2013-4092 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html +CVE-2013-4093 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html +CVE-2013-4094 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html +CVE-2013-4095 - http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html +CVE-2013-4096 - http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html +CVE-2013-4097 - http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html +CVE-2013-4098 - http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html +CVE-2013-4103 - http://packetstormsecurity.com/files/134252/Cryptocat-Script-Insertion.html +CVE-2013-4103 - https://packetstormsecurity.com/files/cve/CVE-2013-4103 +CVE-2013-4106 - https://vuldb.com/pl/?id.9433 +CVE-2013-4109 - https://vuldb.com/es/?id.9445 +CVE-2013-4116 - https://github.com/npm/npm/issues/3635 +CVE-2013-4117 - http://openwall.com/lists/oss-security/2013/07/11/11 +CVE-2013-4117 - http://packetstormsecurity.com/files/122259/WordPress-Category-Grid-View-Gallery-XSS.html +CVE-2013-4162 - http://www.ubuntu.com/usn/USN-1938-1 +CVE-2013-4163 - http://www.ubuntu.com/usn/USN-1938-1 +CVE-2013-4164 - https://hackerone.com/reports/499 +CVE-2013-4165 - https://github.com/bitcoin/bitcoin/issues/2838 +CVE-2013-4165 - https://github.com/bitcoin/bitcoin/pull/2845 +CVE-2013-4179 - http://www.ubuntu.com/usn/USN-2005-1 +CVE-2013-4183 - http://www.ubuntu.com/usn/USN-2005-1 +CVE-2013-4202 - http://www.ubuntu.com/usn/USN-2005-1 +CVE-2013-4211 - https://packetstormsecurity.com/files/cve/CVE-2013-4211 +CVE-2013-4227 - https://drupal.org/node/2058655 +CVE-2013-4233 - http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ +CVE-2013-4234 - http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ +CVE-2013-4238 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-4238 - http://www.ubuntu.com/usn/USN-1982-1 +CVE-2013-4238 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-4240 - http://seclists.org/fulldisclosure/2013/Aug/96 +CVE-2013-4240 - http://seclists.org/fulldisclosure/2013/Aug/98 +CVE-2013-4241 - http://seclists.org/fulldisclosure/2013/Aug/96 +CVE-2013-4241 - http://seclists.org/fulldisclosure/2013/Aug/98 +CVE-2013-4242 - http://www.kb.cert.org/vuls/id/976534 +CVE-2013-4242 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-4249 - http://seclists.org/oss-sec/2013/q3/369 +CVE-2013-4249 - https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued +CVE-2013-4254 - http://www.ubuntu.com/usn/USN-1973-1 +CVE-2013-4256 - http://radscan.com/pipermail/nas/2013-August/001270.html +CVE-2013-4258 - http://radscan.com/pipermail/nas/2013-August/001270.html +CVE-2013-4262 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-4274 - http://www.madirish.net/557 +CVE-2013-4275 - http://www.madirish.net/?article=452 +CVE-2013-4275 - https://drupal.org/node/754000 +CVE-2013-4286 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-4286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-4286 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-4286 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-4288 - http://seclists.org/oss-sec/2013/q3/626 +CVE-2013-4288 - http://www.openwall.com/lists/oss-security/2013/09/18/4 +CVE-2013-4298 - http://www.imagemagick.org/script/changelog.php +CVE-2013-4299 - http://www.ubuntu.com/usn/USN-2044-1 +CVE-2013-4305 - https://bugzilla.wikimedia.org/show_bug.cgi?id=49070 +CVE-2013-4311 - http://www.openwall.com/lists/oss-security/2013/09/18/6 +CVE-2013-4312 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2013-4312 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2013-4318 - http://www.openwall.com/lists/oss-security/2013/09/09/10 +CVE-2013-4322 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-4322 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2013-4322 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-4322 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-4322 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-4324 - http://www.openwall.com/lists/oss-security/2013/09/18/6 +CVE-2013-4326 - http://www.openwall.com/lists/oss-security/2013/09/18/6 +CVE-2013-4327 - http://www.openwall.com/lists/oss-security/2013/09/18/6 +CVE-2013-4330 - http://packetstormsecurity.com/files/123454/ +CVE-2013-4341 - http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html +CVE-2013-4345 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-4346 - https://github.com/simplegeo/python-oauth2/issues/129 +CVE-2013-4353 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2013-4378 - http://seclists.org/oss-sec/2013/q3/679 +CVE-2013-4444 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2013-4447 - http://packetstormsecurity.com/files/123660/Drupal-Simplenews-6.x-7.x-Cross-Site-Scripting.html +CVE-2013-4449 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-4465 - https://github.com/SimpleMachines/SMF2.1/issues/701 +CVE-2013-4470 - http://www.ubuntu.com/usn/USN-2044-1 +CVE-2013-4472 - http://seclists.org/oss-sec/2013/q4/181 +CVE-2013-4472 - http://seclists.org/oss-sec/2013/q4/183 +CVE-2013-4473 - http://www.openwall.com/lists/oss-security/2013/10/29/1 +CVE-2013-4474 - http://www.openwall.com/lists/oss-security/2013/10/29/1 +CVE-2013-4497 - https://bugs.launchpad.net/nova/+bug/1202266 +CVE-2013-4511 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-4513 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-4514 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-4515 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-4517 - http://packetstormsecurity.com/files/124554/Java-XML-Signature-Denial-Of-Service-Attack.html +CVE-2013-4545 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2013-4545 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-4545 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-4548 - https://hackerone.com/reports/500 +CVE-2013-4550 - https://projects.duckcorp.org/versions/13 +CVE-2013-4561 - https://github.com/openshift/origin-server/commit/f1abe972794e35a4bfba597694ce829990f14d39 +CVE-2013-4565 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729279 +CVE-2013-4579 - http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html +CVE-2013-4579 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-4587 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-4587 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-4590 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2013-4590 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-4591 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.2 +CVE-2013-4602 - https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html +CVE-2013-4602 - https://vuldb.com/?id.9151 +CVE-2013-4625 - http://packetstormsecurity.com/files/122535/WordPress-Duplicator-0.4.4-Cross-Site-Scripting.html +CVE-2013-4630 - http://www.exploit-db.com/exploits/25295 +CVE-2013-4649 - http://packetstormsecurity.com/files/122792/DotNetNuke-DNN-7.1.0-6.2.8-Cross-Site-Scripting.html +CVE-2013-4654 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-4655 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-4656 - https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf +CVE-2013-4658 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf +CVE-2013-4659 - https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html +CVE-2013-4660 - https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/ +CVE-2013-4664 - https://www.exploit-db.com/exploits/26244 +CVE-2013-4665 - https://www.exploit-db.com/exploits/26244 +CVE-2013-4670 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html +CVE-2013-4671 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html +CVE-2013-4672 - http://packetstormsecurity.com/files/122556/Symantec-Web-Gateway-XSS-CSRF-SQL-Injection-Command-Injection.html +CVE-2013-4692 - http://packetstormsecurity.com/files/122224/Xorbin-Analog-Flash-Clock-1.0-For-Joomla-XSS.html +CVE-2013-4693 - http://packetstormsecurity.com/files/122223/Xorbin-Digital-Flash-Clock-1.0-For-WordPress-XSS.html +CVE-2013-4694 - http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html +CVE-2013-4694 - http://packetstormsecurity.com/files/122978 +CVE-2013-4694 - http://seclists.org/fulldisclosure/2013/Jul/4 +CVE-2013-4694 - http://www.exploit-db.com/exploits/26558 +CVE-2013-4694 - https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 +CVE-2013-4695 - http://www.exploit-db.com/exploits/26557 +CVE-2013-4717 - https://web.archive.org/web/20130817120539/http://www.otrs.com/de/open-source/community-news/security-advisories/security-advisory-2013-05/ +CVE-2013-4718 - https://web.archive.org/web/20130817120539/http://www.otrs.com/de/open-source/community-news/security-advisories/security-advisory-2013-05/ +CVE-2013-4722 - http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html +CVE-2013-4723 - http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html +CVE-2013-4726 - http://packetstormsecurity.com/files/122954/CM3-AcoraCMS-XSS-CSRF-Redirection-Disclosure.html +CVE-2013-4744 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ +CVE-2013-4748 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ +CVE-2013-4751 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4751 +CVE-2013-4759 - http://packetstormsecurity.com/files/122527/Magnolia-CMS-5.0.1-Community-Edition-Cross-Site-Scripting.html +CVE-2013-4772 - http://packetstormsecurity.com/files/122314/D-Link-DIR-505L-DIR-826L-Authentication-Bypass.html +CVE-2013-4777 - https://plus.google.com/110348415484169880343/posts/5ofgPNrSu3J +CVE-2013-4784 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-4786 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2013-4787 - http://www.zdnet.com/google-releases-fix-to-oems-for-blue-security-android-security-hole-7000017782/ +CVE-2013-4788 - http://hmarco.org/bugs/CVE-2013-4788.html +CVE-2013-4788 - http://seclists.org/fulldisclosure/2015/Sep/23 +CVE-2013-4788 - http://www.openwall.com/lists/oss-security/2013/07/15/9 +CVE-2013-4791 - http://davidsopaslabs.blogspot.com/2013/07/prestashop-persistent-xss-and-csrf.html +CVE-2013-4792 - http://davidsopaslabs.blogspot.com/2013/07/prestashop-persistent-xss-and-csrf.html +CVE-2013-4795 - http://seclists.org/bugtraq/2013/Aug/69 +CVE-2013-4800 - http://packetstormsecurity.com/files/123533 +CVE-2013-4806 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-4810 - https://www.exploit-db.com/exploits/28713/ +CVE-2013-4821 - http://www.kb.cert.org/vuls/id/895524 +CVE-2013-4848 - https://vuldb.com/?id.10495 +CVE-2013-4848 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf +CVE-2013-4855 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf +CVE-2013-4856 - https://www.ise.io/wp-content/uploads/2017/06/soho_defcon21.pdf +CVE-2013-4860 - http://packetstormsecurity.com/files/122657/Radio-Thermostat-Of-America-Inc-Lack-Of-Authentication.html +CVE-2013-4861 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html +CVE-2013-4861 - http://www.exploit-db.com/exploits/27286 +CVE-2013-4861 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt +CVE-2013-4862 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html +CVE-2013-4862 - http://www.exploit-db.com/exploits/27286 +CVE-2013-4862 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt +CVE-2013-4863 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html +CVE-2013-4863 - http://www.exploit-db.com/exploits/27286 +CVE-2013-4863 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt +CVE-2013-4864 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html +CVE-2013-4864 - http://www.exploit-db.com/exploits/27286 +CVE-2013-4864 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt +CVE-2013-4865 - http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-Traversal-Authorization-CSRF-Disclosure.html +CVE-2013-4865 - http://www.exploit-db.com/exploits/27286 +CVE-2013-4865 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txt +CVE-2013-4866 - http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html +CVE-2013-4867 - http://www.exploit-db.com/exploits/27285 +CVE-2013-4868 - http://www.exploit-db.com/exploits/27285 +CVE-2013-4869 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm +CVE-2013-4873 - http://staff.tumblr.com/post/55648373578/important-security-update-for-iphone-ipad-users +CVE-2013-4873 - http://www.theregister.co.uk/2013/07/17/tumblr_ios_snafu_fixed/ +CVE-2013-4874 - http://www.kb.cert.org/vuls/id/458007 +CVE-2013-4874 - http://www.kb.cert.org/vuls/id/BLUU-997M5B +CVE-2013-4875 - http://www.kb.cert.org/vuls/id/458007 +CVE-2013-4875 - http://www.kb.cert.org/vuls/id/BLUU-997M5B +CVE-2013-4876 - http://www.kb.cert.org/vuls/id/458007 +CVE-2013-4876 - http://www.kb.cert.org/vuls/id/BLUU-997M5B +CVE-2013-4877 - http://www.kb.cert.org/vuls/id/458007 +CVE-2013-4877 - http://www.kb.cert.org/vuls/id/BLUU-997M5B +CVE-2013-4885 - http://packetstormsecurity.com/files/122719/TWSL2013-025.txt +CVE-2013-4891 - https://github.com/bcit-ci/CodeIgniter/issues/4020 +CVE-2013-4891 - https://nealpoole.com/blog/2013/07/codeigniter-21-xss-clean-filter-bypass/ +CVE-2013-4900 - http://www.exploit-db.com/exploits/27777 +CVE-2013-4922 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094&r2=50093&pathrev=50094 +CVE-2013-4923 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094&r2=50093&pathrev=50094 +CVE-2013-4930 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474&r2=50473&pathrev=50474 +CVE-2013-4937 - http://reviews.cnet.com/8301-3132_7-57594003-98 +CVE-2013-4948 - http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html +CVE-2013-4949 - http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html +CVE-2013-4950 - http://packetstormsecurity.com/files/122255/Machform-Form-Maker-2-XSS-Shell-Upload-SQL-Injection.html +CVE-2013-4952 - http://www.exploit-db.com/exploits/26416 +CVE-2013-4973 - http://www.kb.cert.org/vuls/id/246524 +CVE-2013-4975 - http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities +CVE-2013-4976 - http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities +CVE-2013-4977 - http://packetstormsecurity.com/files/122718/Hikvision-IP-Cameras-Overflow-Bypass-Privilege-Escalation.html +CVE-2013-4977 - http://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities +CVE-2013-4978 - http://www.coresecurity.com/advisories/aloaha-pdf-suite-buffer-overflow-vulnerability +CVE-2013-4979 - http://www.coresecurity.com/advisories/eps-viewer-buffer-overflow-vulnerability +CVE-2013-4980 - http://seclists.org/fulldisclosure/2013/Aug/284 +CVE-2013-4980 - http://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities +CVE-2013-4981 - http://seclists.org/fulldisclosure/2013/Aug/284 +CVE-2013-4981 - http://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities +CVE-2013-4982 - http://seclists.org/fulldisclosure/2013/Aug/284 +CVE-2013-4982 - https://www.coresecurity.com/advisories/avtech-dvr-multiple-vulnerabilities +CVE-2013-4983 - http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities +CVE-2013-4984 - http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities +CVE-2013-4985 - http://www.coresecurity.com/advisories/vivotek-ip-cameras-rtsp-authentication-bypass +CVE-2013-4985 - http://www.exploit-db.com/exploits/29516 +CVE-2013-4986 - http://packetstormsecurity.com/files/123476 +CVE-2013-4986 - http://www.coresecurity.com/advisories/pdfcool-studio-buffer-overflow-vulnerability +CVE-2013-4987 - http://www.coresecurity.com/advisories/pinapp-mail-secure-access-control-failure +CVE-2013-4988 - http://packetstormsecurity.com/files/124380/IcoFX-2.5.0.0-Buffer-Overflow.html +CVE-2013-4988 - http://packetstormsecurity.com/files/162995/IcoFX-2.6-Buffer-Overflow.html +CVE-2013-4988 - http://seclists.org/fulldisclosure/2013/Dec/54 +CVE-2013-4988 - http://www.coresecurity.com/advisories/icofx-buffer-overflow-vulnerability +CVE-2013-4988 - http://www.exploit-db.com/exploits/30208 +CVE-2013-5005 - http://www.zerodaylab.com/zdl-advisories/2013-5005.html +CVE-2013-5014 - http://www.exploit-db.com/exploits/31853 +CVE-2013-5014 - http://www.exploit-db.com/exploits/31917 +CVE-2013-5015 - http://www.exploit-db.com/exploits/31853 +CVE-2013-5015 - http://www.exploit-db.com/exploits/31917 +CVE-2013-5019 - https://www.exploit-db.com/exploits/44472/ +CVE-2013-5027 - https://www.immuniweb.com/advisory/HTB23169 +CVE-2013-5028 - http://packetstormsecurity.com/files/123193 +CVE-2013-5030 - http://www.kb.cert.org/vuls/id/742932 +CVE-2013-5037 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html +CVE-2013-5037 - http://www.youtube.com/watch?v=CPlT09ZIj48 +CVE-2013-5038 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html +CVE-2013-5038 - http://www.youtube.com/watch?v=CPlT09ZIj48 +CVE-2013-5039 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html +CVE-2013-5039 - http://www.youtube.com/watch?v=CPlT09ZIj48 +CVE-2013-5045 - http://packetstormsecurity.com/files/127245/MS13-097-Registry-Symlink-IE-Sandbox-Escape.html +CVE-2013-5065 - https://www.exploit-db.com/exploits/37732/ +CVE-2013-5092 - http://packetstormsecurity.com/files/122737/algosec-xss.txt +CVE-2013-5094 - http://packetstormsecurity.com/files/120721/McAfee-Vulnerability-Manager-7.5-Cross-Site-Scripting.html +CVE-2013-5094 - http://www.tenable.com/plugins/index.php?view=single&id=65738 +CVE-2013-5099 - http://www.exploit-db.com/exploits/26958 +CVE-2013-5100 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-001/ +CVE-2013-5112 - https://blog.c22.cc/advisories/cve-2013-5112-evernote-android-insecure-storage-of-pin-data-bypass-of-pin-protection/ +CVE-2013-5113 - http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/ +CVE-2013-5113 - https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/ +CVE-2013-5114 - http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/ +CVE-2013-5114 - https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/ +CVE-2013-5116 - https://packetstormsecurity.com/files/author/8433/ +CVE-2013-5117 - http://seclists.org/fulldisclosure/2013/Sep/9 +CVE-2013-5117 - http://www.exploit-db.com/exploits/27602 +CVE-2013-5120 - http://www.exploit-db.com/exploits/27430 +CVE-2013-5121 - http://www.exploit-db.com/exploits/27430 +CVE-2013-5122 - https://packetstormsecurity.com/files/cve/CVE-2013-5122 +CVE-2013-5211 - http://www.kb.cert.org/vuls/id/348126 +CVE-2013-5211 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2013-5212 - http://seclists.org/fulldisclosure/2013/Oct/224 +CVE-2013-5215 - http://packetstormsecurity.com/files/123943/FOSCAM-Wireless-IP-Camera-Cross-Site-Scripting.html +CVE-2013-5218 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html +CVE-2013-5218 - http://www.youtube.com/watch?v=CPlT09ZIj48 +CVE-2013-5219 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html +CVE-2013-5219 - http://www.youtube.com/watch?v=CPlT09ZIj48 +CVE-2013-5220 - http://packetstormsecurity.com/files/123901/HOTBOX-2.1.11-CSRF-Traversal-Denial-Of-Service.html +CVE-2013-5220 - http://www.youtube.com/watch?v=CPlT09ZIj48 +CVE-2013-5223 - http://packetstormsecurity.com/files/123976 +CVE-2013-5223 - http://seclists.org/fulldisclosure/2013/Nov/76 +CVE-2013-5300 - http://packetstormsecurity.com/files/122547/Alienvault-OSSIM-Cross-Site-Scripting.html +CVE-2013-5301 - http://packetstormsecurity.com/files/122735/Trustport-Webfilter-Traversal-File-Disclosure.html +CVE-2013-5311 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html +CVE-2013-5312 - http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html +CVE-2013-5316 - http://packetstormsecurity.com/files/122663/Rite-CMS-1.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-5317 - http://packetstormsecurity.com/files/122663/Rite-CMS-1.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-5319 - http://packetstormsecurity.com/files/122721 +CVE-2013-5319 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5151.php +CVE-2013-5320 - http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html +CVE-2013-5321 - http://www.exploit-db.com/exploits/26406 +CVE-2013-5326 - http://www.kb.cert.org/vuls/id/295276 +CVE-2013-5331 - https://hackerone.com/reports/2106 +CVE-2013-5385 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-5385 - http://www.kb.cert.org/vuls/id/BLUU-985QTG +CVE-2013-5431 - http://www.kb.cert.org/vuls/id/596990 +CVE-2013-5447 - http://packetstormsecurity.com/files/124658 +CVE-2013-5528 - http://packetstormsecurity.com/files/140071/Cisco-Unified-Communications-Manager-7-8-9-Directory-Traversal.html +CVE-2013-5528 - https://www.exploit-db.com/exploits/40887/ +CVE-2013-5573 - http://packetstormsecurity.com/files/124513 +CVE-2013-5573 - http://seclists.org/bugtraq/2013/Dec/104 +CVE-2013-5573 - http://seclists.org/fulldisclosure/2013/Dec/159 +CVE-2013-5573 - http://www.exploit-db.com/exploits/30408 +CVE-2013-5576 - http://www.cso.com.au/article/523528/joomla_patches_file_manager_vulnerability_responsible_hijacked_websites/ +CVE-2013-5576 - http://www.kb.cert.org/vuls/id/639620 +CVE-2013-5576 - https://github.com/joomla/joomla-cms/commit/fa5645208eefd70f521cd2e4d53d5378622133d8 +CVE-2013-5586 - http://packetstormsecurity.com/files/123196 +CVE-2013-5593 - https://bugzilla.mozilla.org/show_bug.cgi?id=868327 +CVE-2013-5598 - https://bugzilla.mozilla.org/show_bug.cgi?id=920515 +CVE-2013-5605 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-5605 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-5605 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-5606 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2013-5606 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-5606 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-5607 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-5609 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5609 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-5610 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5611 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5612 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5613 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5613 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-5614 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5615 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5615 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-5616 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5616 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-5618 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5618 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-5619 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-5639 - http://packetstormsecurity.com/files/123482 +CVE-2013-5639 - http://www.exploit-db.com/exploits/28684 +CVE-2013-5640 - http://packetstormsecurity.com/files/123482 +CVE-2013-5640 - http://www.exploit-db.com/exploits/28684 +CVE-2013-5647 - http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html +CVE-2013-5648 - https://bugs.mageia.org/show_bug.cgi?id=11100 +CVE-2013-5658 - https://packetstormsecurity.com/files/123049/PWStore-2010.8.30.0-Cross-Site-Scripting-Denial-Of-Service.html +CVE-2013-5660 - http://packetstormsecurity.com/files/121512/Winarchiver-3.2-Buffer-Overflow.html +CVE-2013-5660 - http://realpentesting.blogspot.com.es/p/blog-page_3.html +CVE-2013-5667 - http://www.7elements.co.uk/news/cve-2013-5667/ +CVE-2013-5667 - http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ +CVE-2013-5668 - http://www.7elements.co.uk/news/cve-2013-5668/ +CVE-2013-5668 - http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ +CVE-2013-5669 - http://www.7elements.co.uk/news/cve-2013-5669/ +CVE-2013-5669 - http://www.7elements.co.uk/resources/blog/multiple-vulnerabilities-thecus-nas/ +CVE-2013-5672 - http://packetstormsecurity.com/files/123036 +CVE-2013-5672 - http://seclists.org/fulldisclosure/2013/Sep/5 +CVE-2013-5672 - http://www.exploit-db.com/exploits/28054 +CVE-2013-5673 - http://packetstormsecurity.com/files/123036 +CVE-2013-5673 - http://seclists.org/fulldisclosure/2013/Sep/5 +CVE-2013-5673 - http://www.exploit-db.com/exploits/28054 +CVE-2013-5676 - http://seclists.org/fulldisclosure/2013/Dec/37 +CVE-2013-5679 - http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html +CVE-2013-5679 - http://www.securityfocus.com/bid/62415 +CVE-2013-5680 - http://www.exploit-db.com/exploits/28683 +CVE-2013-5694 - http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html +CVE-2013-5701 - http://seclists.org/fulldisclosure/2013/Sep/43 +CVE-2013-5703 - http://www.kb.cert.org/vuls/id/101462 +CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-5704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2013-5704 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2013-5706 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-5707 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-5708 - http://www.kb.cert.org/vuls/id/960908 +CVE-2013-5716 - http://www.exploit-db.com/exploits/28080 +CVE-2013-5726 - http://seclists.org/fulldisclosure/2013/Nov/9 +CVE-2013-5730 - http://packetstormsecurity.com/files/123200/D-Link-DSL-2740B-Cross-Site-Request-Forgery.html +CVE-2013-5745 - https://bugzilla.gnome.org/show_bug.cgi?id=707905 +CVE-2013-5748 - http://packetstormsecurity.com/files/123455/SimpleRisk-20130915-01-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-5749 - http://packetstormsecurity.com/files/123455/SimpleRisk-20130915-01-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-5756 - http://www.exploit-db.com/exploits/33740 +CVE-2013-5757 - http://www.exploit-db.com/exploits/33740 +CVE-2013-5758 - http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html +CVE-2013-5758 - http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html +CVE-2013-5758 - http://www.exploit-db.com/exploits/33741 +CVE-2013-5758 - http://www.exploit-db.com/exploits/33742 +CVE-2013-5761 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5762 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5763 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5765 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5766 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5767 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5768 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5769 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5770 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5771 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5772 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5772 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5773 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5774 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5774 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5775 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5776 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5777 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5778 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5778 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5779 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5780 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5780 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5781 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5782 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5782 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5783 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5783 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5784 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5784 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5786 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5787 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5788 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5789 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5790 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5790 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5791 - http://www.citadelo.com/en/ms13-105-oracle-outside-in-mdb-parsing-vulnerability-cve-2013-5791/ +CVE-2013-5791 - http://www.exploit-db.com/exploits/31222 +CVE-2013-5791 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5792 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5793 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5794 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5796 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5797 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5797 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5798 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5799 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5800 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5801 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5802 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5802 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5803 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5803 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5804 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5804 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5805 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5806 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5807 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5809 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5809 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5810 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5811 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5812 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5813 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5814 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5814 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5815 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5816 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5817 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5817 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5818 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5819 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5820 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5820 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5822 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5823 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5823 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5824 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5825 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5825 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5826 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5827 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5828 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5829 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5829 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5830 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5830 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5831 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5832 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5835 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5836 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5837 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5838 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5839 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5840 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5840 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5841 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5842 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5842 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5843 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5844 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5845 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5846 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5847 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5848 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5849 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5849 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5850 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5850 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5851 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5851 - http://www.ubuntu.com/usn/USN-2033-1 +CVE-2013-5852 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5854 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5855 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-5855 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2013-5855 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-5855 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-5856 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5857 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5859 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5861 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5862 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5863 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5864 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5865 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5866 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5867 - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html +CVE-2013-5870 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5878 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5884 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5887 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5888 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5889 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5891 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-5893 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5895 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5896 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5898 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5899 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5902 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5904 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5905 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5906 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5907 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5910 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2013-5930 - http://packetstormsecurity.com/files/123138/realestatephpscript-xss.txt +CVE-2013-5931 - http://packetstormsecurity.com/files/123138/realestatephpscript-xss.txt +CVE-2013-5933 - https://plus.google.com/110348415484169880343/posts/5ofgPNrSu3J +CVE-2013-5939 - http://packetstormsecurity.com/files/123746/PHPCMS-Guestbook-Cross-Site-Scripting.html +CVE-2013-5948 - http://seclists.org/fulldisclosure/2014/Apr/59 +CVE-2013-5952 - http://packetstormsecurity.com/files/125737 +CVE-2013-5953 - http://packetstormsecurity.com/files/125738 +CVE-2013-5954 - http://packetstormsecurity.com/files/125735 +CVE-2013-5954 - http://seclists.org/fulldisclosure/2014/Mar/270 +CVE-2013-5955 - http://packetstormsecurity.com/files/125734 +CVE-2013-5955 - http://seclists.org/fulldisclosure/2014/Mar/269 +CVE-2013-5956 - http://packetstormsecurity.com/files/125732/Joomla-Youtube-Gallery-3.4.0-Cross-Site-Scripting.html +CVE-2013-5956 - http://seclists.org/fulldisclosure/2014/Mar/264 +CVE-2013-5956 - http://seclists.org/fulldisclosure/2014/Mar/288 +CVE-2013-5960 - http://lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html +CVE-2013-5960 - http://www.securityfocus.com/bid/62415 +CVE-2013-5961 - http://packetstormsecurity.com/files/123349 +CVE-2013-5962 - http://packetstormsecurity.com/files/123303 +CVE-2013-5962 - http://www.exploit-db.com/exploits/28377 +CVE-2013-5962 - http://www.vulnerability-lab.com/get_content.php?id=1080 +CVE-2013-5963 - http://packetstormsecurity.com/files/123235 +CVE-2013-5973 - http://www.vmware.com/security/advisories/VMSA-2013-0016.html +CVE-2013-5977 - http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-5977 - http://seclists.org/bugtraq/2013/Oct/52 +CVE-2013-5977 - http://www.exploit-db.com/exploits/28959 +CVE-2013-5978 - http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-5978 - http://seclists.org/bugtraq/2013/Oct/52 +CVE-2013-5978 - http://www.exploit-db.com/exploits/28959 +CVE-2013-5979 - https://bugs.launchpad.net/xibo/+bug/1093967 +CVE-2013-5983 - http://packetstormsecurity.com/files/123747 +CVE-2013-5984 - http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html +CVE-2013-5988 - https://packetstormsecurity.com/files/cve/CVE-2013-5988 +CVE-2013-6010 - http://packetstormsecurity.com/files/123327 +CVE-2013-6017 - http://www.kb.cert.org/vuls/id/204950 +CVE-2013-6021 - http://www.kb.cert.org/vuls/id/233990 +CVE-2013-6021 - https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/ +CVE-2013-6022 - http://www.kb.cert.org/vuls/id/450646 +CVE-2013-6023 - http://www.exploit-db.com/exploits/29959 +CVE-2013-6023 - http://www.kb.cert.org/vuls/id/785838 +CVE-2013-6025 - http://www.kb.cert.org/vuls/id/303900 +CVE-2013-6025 - https://www.exploit-db.com/exploits/38805/ +CVE-2013-6026 - http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ +CVE-2013-6027 - http://pastebin.com/raw.php?i=vbiG42VD +CVE-2013-6028 - http://www.kb.cert.org/vuls/id/204950 +CVE-2013-6029 - http://www.kb.cert.org/vuls/id/346278 +CVE-2013-6030 - http://www.kb.cert.org/vuls/id/168751 +CVE-2013-6037 - http://www.kb.cert.org/vuls/id/687278 +CVE-2013-6038 - http://www.kb.cert.org/vuls/id/586958 +CVE-2013-6039 - http://www.kb.cert.org/vuls/id/268662 +CVE-2013-6040 - http://www.exploit-db.com/exploits/31176 +CVE-2013-6040 - http://www.exploit-db.com/exploits/31177 +CVE-2013-6040 - http://www.kb.cert.org/vuls/id/219470 +CVE-2013-6044 - http://seclists.org/oss-sec/2013/q3/369 +CVE-2013-6044 - https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued +CVE-2013-6048 - https://github.com/munin-monitoring/munin/blob/2.0.18/ChangeLog +CVE-2013-6058 - http://packetstormsecurity.com/files/123929 +CVE-2013-6074 - http://packetstormsecurity.com/files/123934/Open-Xchange-AppSuite-Script-Insertion.html +CVE-2013-6078 - http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/ +CVE-2013-6079 - http://packetstormsecurity.com/files/122677 +CVE-2013-6114 - http://www.exploit-db.com/exploits/28811/ +CVE-2013-6117 - http://blog.depthsecurity.com/2013/11/dahua-dvr-authentication-bypass-cve.html +CVE-2013-6117 - http://packetstormsecurity.com/files/124022/Dahua-DVR-Authentication-Bypass.html +CVE-2013-6117 - http://seclists.org/bugtraq/2013/Nov/62 +CVE-2013-6117 - http://www.exploit-db.com/exploits/29673 +CVE-2013-6127 - http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 +CVE-2013-6127 - http://www.exploit-db.com/exploits/28084/ +CVE-2013-6128 - http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 +CVE-2013-6128 - http://www.exploit-db.com/exploits/28085/ +CVE-2013-6129 - http://www.net-security.org/secworld.php?id=15743 +CVE-2013-6162 - http://www.exploit-db.com/exploits/30373 +CVE-2013-6163 - http://packetstormsecurity.com/files/123916 +CVE-2013-6164 - http://packetstormsecurity.com/files/123915 +CVE-2013-6164 - http://www.exploit-db.com/exploits/29517 +CVE-2013-6173 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html +CVE-2013-6173 - http://www.kb.cert.org/vuls/id/346982 +CVE-2013-6174 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html +CVE-2013-6174 - http://www.kb.cert.org/vuls/id/346982 +CVE-2013-6175 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html +CVE-2013-6175 - http://www.kb.cert.org/vuls/id/346982 +CVE-2013-6176 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html +CVE-2013-6176 - http://www.kb.cert.org/vuls/id/346982 +CVE-2013-6177 - http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html +CVE-2013-6177 - http://www.kb.cert.org/vuls/id/346982 +CVE-2013-6181 - http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure.html +CVE-2013-6182 - http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html +CVE-2013-6221 - http://packetstormsecurity.com/files/127247/HP-AutoPass-License-Server-File-Upload.html +CVE-2013-6223 - http://seclists.org/fulldisclosure/2013/Nov/210 +CVE-2013-6224 - http://packetstormsecurity.com/files/124222 +CVE-2013-6225 - http://www.exploit-db.com/exploits/29672 +CVE-2013-6227 - https://www.exploit-db.com/exploits/46206/ +CVE-2013-6229 - http://www.isecauditors.com/advisories-2013#2013-014 +CVE-2013-6231 - http://www.exploit-db.com/exploits/31990 +CVE-2013-6232 - http://packetstormsecurity.com/files/125495 +CVE-2013-6232 - http://www.exploit-db.com/exploits/32038 +CVE-2013-6233 - http://packetstormsecurity.com/files/125496 +CVE-2013-6233 - http://www.exploit-db.com/exploits/32039 +CVE-2013-6234 - http://packetstormsecurity.com/files/125497 +CVE-2013-6234 - http://www.exploit-db.com/exploits/32040 +CVE-2013-6235 - http://packetstormsecurity.com/files/124933 +CVE-2013-6235 - http://seclists.org/fulldisclosure/2014/Jan/164 +CVE-2013-6236 - https://packetstormsecurity.com/files/cve/CVE-2013-6236 +CVE-2013-6236 - https://seclists.org/bugtraq/2013/Oct/149 +CVE-2013-6237 - http://packetstormsecurity.com/files/124274/ISL-Light-Desktop-3.5.4-Information-Disclosure.html +CVE-2013-6239 - http://packetstormsecurity.com/files/123764 +CVE-2013-6242 - http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html +CVE-2013-6242 - http://seclists.org/bugtraq/2013/Nov/127 +CVE-2013-6246 - http://packetstormsecurity.com/files/123703/quest-captcha.txt +CVE-2013-6267 - http://packetstormsecurity.com/files/124200 +CVE-2013-6271 - http://seclists.org/fulldisclosure/2013/Nov/204 +CVE-2013-6271 - http://www.theregister.co.uk/2013/12/10/android_has_lockbypass_bug/ +CVE-2013-6272 - http://packetstormsecurity.com/files/127359/Android-OS-Authorization-Missing.html +CVE-2013-6272 - http://seclists.org/fulldisclosure/2014/Jul/13 +CVE-2013-6275 - http://www.exploit-db.com/exploits/29274 +CVE-2013-6281 - http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html +CVE-2013-6282 - https://www.exploit-db.com/exploits/40975/ +CVE-2013-6283 - http://www.exploit-db.com/exploits/27700 +CVE-2013-6295 - http://davidsopaslabs.blogspot.com/2013/ +CVE-2013-6295 - http://davidsopaslabs.blogspot.com/2013/10/how-salesman-could-hack-prestashop.html +CVE-2013-6327 - http://www-01.ibm.com/support/docview.wss?uid=swg21659907 +CVE-2013-6341 - http://packetstormsecurity.com/files/124201 +CVE-2013-6348 - http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html +CVE-2013-6358 - https://web.archive.org/web/20150423041900/http://labs.davidsopas.com/2013/10/how-salesman-could-hack-prestashop.html +CVE-2013-6359 - https://github.com/munin-monitoring/munin/blob/2.0.18/ChangeLog +CVE-2013-6364 - http://www.exploit-db.com/exploits/29519 +CVE-2013-6364 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-6364 +CVE-2013-6365 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-6365 +CVE-2013-6365 - https://packetstormsecurity.com/files/cve/CVE-2013-6365 +CVE-2013-6367 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-6367 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-6368 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-6370 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-6371 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-6376 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-6380 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-6380 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-6382 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-6383 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-6397 - http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html +CVE-2013-6418 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2013-6420 - https://hackerone.com/reports/523 +CVE-2013-6420 - https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html +CVE-2013-6421 - http://www.openwall.com/lists/oss-security/2013/12/03/1 +CVE-2013-6421 - http://www.openwall.com/lists/oss-security/2013/12/03/6 +CVE-2013-6422 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2013-6435 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2013-6438 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-6438 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-6438 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-6438 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-6440 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2013-6444 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-6449 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-6449 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2013-6449 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-6449 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-6449 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-6450 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2013-6450 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2013-6450 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2013-6450 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2013-6450 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2013-6462 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2013-6466 - https://cert.vde.com/en-us/advisories/vde-2017-001 +CVE-2013-6489 - http://www.securityfocus.com/bid/65192 +CVE-2013-6618 - http://www.exploit-db.com/exploits/29544 +CVE-2013-6618 - http://www.senseofsecurity.com.au/advisories/SOS-13-003 +CVE-2013-6627 - http://blog.skylined.nl/20161219001.html +CVE-2013-6627 - http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html +CVE-2013-6627 - https://www.exploit-db.com/exploits/40944/ +CVE-2013-6629 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-6629 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2013-6629 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-6629 - https://bugzilla.mozilla.org/show_bug.cgi?id=891693 +CVE-2013-6630 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-6630 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-6630 - https://bugzilla.mozilla.org/show_bug.cgi?id=891693 +CVE-2013-6661 - https://code.google.com/p/chromium/issues/detail?id=333885 +CVE-2013-6661 - https://code.google.com/p/chromium/issues/detail?id=334274 +CVE-2013-6671 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-6671 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-6672 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-6673 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2013-6673 - http://www.ubuntu.com/usn/USN-2053-1 +CVE-2013-6674 - http://packetstormsecurity.com/files/124965/Mozilla-Thunderbird-Filter-Bypass.html +CVE-2013-6674 - http://seclists.org/fulldisclosure/2014/Jan/182 +CVE-2013-6674 - http://www.kb.cert.org/vuls/id/863369 +CVE-2013-6674 - https://bugzilla.mozilla.org/show_bug.cgi?id=868267 +CVE-2013-6735 - http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html +CVE-2013-6763 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-6767 - http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-Buffer-Overflow.html +CVE-2013-6767 - http://seclists.org/bugtraq/2013/Dec/90 +CVE-2013-6767 - http://www.exploit-db.com/exploits/30374 +CVE-2013-6767 - http://www.vulnerability-lab.com/get_content.php?id=1171 +CVE-2013-6780 - http://packetstormsecurity.com/files/130527/Cisco-Ironport-AsyncOS-Cross-Site-Scripting.html +CVE-2013-6789 - http://seclists.org/bugtraq/2013/Aug/12 +CVE-2013-6793 - http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html +CVE-2013-6793 - http://seclists.org/bugtraq/2013/Oct/154 +CVE-2013-6793 - http://www.exploit-db.com/exploits/29279 +CVE-2013-6793 - http://www.vulnerability-lab.com/get_content.php?id=1125 +CVE-2013-6795 - http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html +CVE-2013-6795 - https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0 +CVE-2013-6796 - http://packetstormsecurity.com/files/124054 +CVE-2013-6799 - http://cxsecurity.com/issue/WLB-2013110059 +CVE-2013-6800 - https://github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d +CVE-2013-6805 - https://github.com/koto/exceed-mitm +CVE-2013-6806 - https://github.com/koto/exceed-mitm +CVE-2013-6807 - https://github.com/koto/exceed-mitm +CVE-2013-6809 - http://packetstormsecurity.com/files/124275/Tftpd32-Client-Side-Format-String.html +CVE-2013-6809 - http://seclists.org/fulldisclosure/2013/Dec/15 +CVE-2013-6810 - https://www.exploit-db.com/exploits/42701/ +CVE-2013-6810 - https://www.exploit-db.com/exploits/42702/ +CVE-2013-6825 - http://packetstormsecurity.com/files/126883/DCMTK-Privilege-Escalation.html +CVE-2013-6825 - http://seclists.org/fulldisclosure/2014/Jun/11 +CVE-2013-6826 - http://packetstormsecurity.com/files/123980/fortianalyzer-xsrf.txt +CVE-2013-6835 - http://seclists.org/bugtraq/2014/Mar/63 +CVE-2013-6835 - http://seclists.org/fulldisclosure/2014/Mar/92 +CVE-2013-6837 - http://cxsecurity.com/issue/WLB-2013110149 +CVE-2013-6837 - http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html +CVE-2013-6853 - http://packetstormsecurity.com/files/124800/Y-Toolbar-Cross-Site-Scripting.html +CVE-2013-6853 - http://www.cloudscan.me/2014/01/cve-2013-6853-stored-xss-in-y-toolbar.html +CVE-2013-6872 - http://packetstormsecurity.com/files/124777/Collabtive-1.1-SQL-Injection.html +CVE-2013-6872 - http://seclists.org/fulldisclosure/2014/Jan/72 +CVE-2013-6872 - http://www.exploit-db.com/exploits/30946 +CVE-2013-6873 - http://packetstormsecurity.com/files/124035/testa-sql.txt +CVE-2013-6876 - http://packetstormsecurity.com/files/126887/s3dvt-Privilege-Escalation.html +CVE-2013-6877 - http://packetstormsecurity.com/files/124535 +CVE-2013-6877 - http://www.coresecurity.com/advisories/realplayer-heap-based-buffer-overflow-vulnerability +CVE-2013-6880 - http://www.7elements.co.uk/resources/blog/cve-2013-6880-proof-concept +CVE-2013-6881 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html +CVE-2013-6882 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html +CVE-2013-6883 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html +CVE-2013-6884 - http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html +CVE-2013-6885 - http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924 +CVE-2013-6919 - http://www.rafayhackingarticles.net/2013/11/phpthumb-server-side-request-forgery.html +CVE-2013-6922 - http://www.exploit-db.com/exploits/30726 +CVE-2013-6923 - http://packetstormsecurity.com/files/124685 +CVE-2013-6923 - http://www.exploit-db.com/exploits/30727 +CVE-2013-6924 - http://packetstormsecurity.com/files/124688/Seagate-BlackArmor-NAS-sg2000-2000.1331-Remote-Command-Execution.html +CVE-2013-6933 - http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html +CVE-2013-6934 - http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html +CVE-2013-6935 - http://packetstormsecurity.com/files/133899/Watermark-Master-Buffer-Overflow-SEH.html +CVE-2013-6935 - http://www.exploit-db.com/exploits/29327 +CVE-2013-6936 - http://packetstormsecurity.com/files/124091/MyBB-Ajaxfs-SQL-Injection.html +CVE-2013-6945 - http://www.darkreading.com/vulnerability/anatomy-of-an-electronic-health-record-e/240164441/ +CVE-2013-6948 - http://www.kb.cert.org/vuls/id/656302 +CVE-2013-6949 - http://www.kb.cert.org/vuls/id/656302 +CVE-2013-6950 - http://www.kb.cert.org/vuls/id/656302 +CVE-2013-6951 - http://www.kb.cert.org/vuls/id/656302 +CVE-2013-6952 - http://www.kb.cert.org/vuls/id/656302 +CVE-2013-6954 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2013-6955 - http://www.kb.cert.org/vuls/id/615910 +CVE-2013-6976 - http://packetstormsecurity.com/files/124449/Cisco-EPC3925-Cross-Site-Request-Forgery.html +CVE-2013-6976 - http://www.exploit-db.com/exploits/30362/ +CVE-2013-6986 - http://packetstormsecurity.com/files/124330/ZippyYum-3.4-Insecure-Data-Storage.html +CVE-2013-6987 - http://packetstormsecurity.com/files/124563 +CVE-2013-6994 - https://github.com/koto/exceed-mitm +CVE-2013-7002 - http://packetstormsecurity.com/files/124344 +CVE-2013-7003 - http://packetstormsecurity.com/files/124374/LiveZilla-5.1.1.0-Cross-Site-Scripting.html +CVE-2013-7008 - http://ffmpeg.org/security.html +CVE-2013-7009 - http://ffmpeg.org/security.html +CVE-2013-7010 - http://ffmpeg.org/security.html +CVE-2013-7011 - http://ffmpeg.org/security.html +CVE-2013-7012 - http://ffmpeg.org/security.html +CVE-2013-7013 - http://ffmpeg.org/security.html +CVE-2013-7014 - http://ffmpeg.org/security.html +CVE-2013-7015 - http://ffmpeg.org/security.html +CVE-2013-7016 - http://ffmpeg.org/security.html +CVE-2013-7017 - http://ffmpeg.org/security.html +CVE-2013-7018 - http://ffmpeg.org/security.html +CVE-2013-7019 - http://ffmpeg.org/security.html +CVE-2013-7020 - http://ffmpeg.org/security.html +CVE-2013-7021 - http://ffmpeg.org/security.html +CVE-2013-7022 - http://ffmpeg.org/security.html +CVE-2013-7023 - http://ffmpeg.org/security.html +CVE-2013-7024 - http://ffmpeg.org/security.html +CVE-2013-7025 - http://seclists.org/fulldisclosure/2013/Dec/32 +CVE-2013-7025 - http://www.exploit-db.com/exploits/30054 +CVE-2013-7025 - http://www.vulnerability-lab.com/get_content.php?id=1099 +CVE-2013-7027 - http://www.ubuntu.com/usn/USN-2076-1 +CVE-2013-7027 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7030 - http://www.exploit-db.com/exploits/30237/ +CVE-2013-7033 - http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html +CVE-2013-7043 - http://www.exploit-db.com/exploits/29927/ +CVE-2013-7049 - http://seclists.org/oss-sec/2013/q4/482 +CVE-2013-7050 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849 +CVE-2013-7051 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt +CVE-2013-7051 - http://www.exploit-db.com/exploits/31425 +CVE-2013-7052 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt +CVE-2013-7053 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt +CVE-2013-7054 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt +CVE-2013-7055 - http://pigstarter.krebsco.de/report/2013-12-18_dir100.txt +CVE-2013-7057 - http://www.exploit-db.com/exploits/35046 +CVE-2013-7070 - https://github.com/mikaku/Monitorix/issues/30 +CVE-2013-7071 - https://github.com/mikaku/Monitorix/issues/30 +CVE-2013-7085 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732006 +CVE-2013-7086 - http://packetstormsecurity.com/files/124421 +CVE-2013-7091 - http://packetstormsecurity.com/files/124321 +CVE-2013-7091 - http://www.exploit-db.com/exploits/30472 +CVE-2013-7092 - http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html +CVE-2013-7103 - http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html +CVE-2013-7104 - http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html +CVE-2013-7127 - http://www.securelist.com/en/blog/8168/Loophole_in_Safari +CVE-2013-7129 - http://packetstormsecurity.com/files/124240 +CVE-2013-7136 - http://www.planitcomputing.ie/upc-wifi-attack.pdf +CVE-2013-7140 - http://seclists.org/bugtraq/2014/Jan/57 +CVE-2013-7141 - http://seclists.org/bugtraq/2014/Jan/57 +CVE-2013-7142 - http://seclists.org/bugtraq/2014/Jan/57 +CVE-2013-7143 - http://seclists.org/bugtraq/2014/Jan/57 +CVE-2013-7144 - https://www.thaicert.or.th/papers/general/2013/pa2013ge010.html +CVE-2013-7175 - http://www.kb.cert.org/vuls/id/869702 +CVE-2013-7179 - http://www.kb.cert.org/vuls/id/431726 +CVE-2013-7183 - http://www.kb.cert.org/vuls/id/431726 +CVE-2013-7184 - http://www.exploit-db.com/exploits/30414 +CVE-2013-7185 - http://www.exploit-db.com/exploits/30413 +CVE-2013-7186 - http://packetstormsecurity.com/files/124282 +CVE-2013-7186 - http://packetstormsecurity.com/files/124283 +CVE-2013-7186 - http://packetstormsecurity.com/files/124284 +CVE-2013-7187 - http://packetstormsecurity.com/files/124343/wpformcraft-sql.txt +CVE-2013-7187 - http://www.exploit-db.com/exploits/30002 +CVE-2013-7191 - http://makthepla.net/blog/=/helpdesk-pilot-add-admin +CVE-2013-7192 - http://packetstormsecurity.com/files/124451 +CVE-2013-7193 - http://packetstormsecurity.com/files/124441/c2cfac-sql.txt +CVE-2013-7194 - http://packetstormsecurity.com/files/124400 +CVE-2013-7194 - http://www.exploit-db.com/exploits/30213 +CVE-2013-7201 - https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/ +CVE-2013-7202 - https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/ +CVE-2013-7203 - http://packetstormsecurity.com/files/149438/ManageEngine-SupportCenter-Plus-8.1.0-Cross-Site-Scripting.html +CVE-2013-7209 - http://packetstormsecurity.com/files/124598/JForum-Cross-Site-Request-Forgery.html +CVE-2013-7216 - http://packetstormsecurity.com/files/124442 +CVE-2013-7220 - https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j +CVE-2013-7226 - https://bugs.php.net/bug.php?id=66356 +CVE-2013-7226 - https://hackerone.com/reports/1356 +CVE-2013-7234 - http://seclists.org/fulldisclosure/2013/Dec/83 +CVE-2013-7234 - http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ +CVE-2013-7235 - http://seclists.org/fulldisclosure/2013/Dec/83 +CVE-2013-7235 - http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ +CVE-2013-7236 - http://seclists.org/fulldisclosure/2013/Dec/83 +CVE-2013-7236 - http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/ +CVE-2013-7240 - http://seclists.org/oss-sec/2013/q4/566 +CVE-2013-7240 - http://seclists.org/oss-sec/2013/q4/570 +CVE-2013-7243 - http://packetstormsecurity.com/files/124711 +CVE-2013-7246 - http://packetstormsecurity.com/files/124886 +CVE-2013-7246 - http://seclists.org/fulldisclosure/2014/Jan/132 +CVE-2013-7246 - http://www.exploit-db.com/exploits/31179 +CVE-2013-7257 - http://packetstormsecurity.com/files/124537 +CVE-2013-7257 - https://github.com/Codiad/Codiad/issues/584 +CVE-2013-7259 - https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j +CVE-2013-7260 - http://www.kb.cert.org/vuls/id/698278 +CVE-2013-7262 - https://github.com/mapserver/mapserver/issues/4834 +CVE-2013-7263 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7264 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7265 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7266 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7266 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7267 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7267 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7268 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7268 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7269 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7269 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7270 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7270 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7271 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2013-7271 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7276 - http://packetstormsecurity.com/files/124587/WordPress-Recommend-Cross-Site-Scripting.html +CVE-2013-7277 - https://www.netsparker.com/critical-xss-vulnerabilities-andy-php-knowledgebase +CVE-2013-7278 - http://packetstormsecurity.com/files/124624 +CVE-2013-7280 - http://packetstormsecurity.com/files/120611/Hanso-Player-2.1.0-Buffer-Overflow.html +CVE-2013-7280 - http://www.exploit-db.com/exploits/24556 +CVE-2013-7281 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2013-7285 - http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html +CVE-2013-7285 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2013-7286 - http://seclists.org/fulldisclosure/2014/Apr/21 +CVE-2013-7287 - http://seclists.org/fulldisclosure/2014/Apr/21 +CVE-2013-7292 - http://www.kb.cert.org/vuls/id/612076 +CVE-2013-7306 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7306 - http://www.kb.cert.org/vuls/id/BLUU-98MS25 +CVE-2013-7307 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7307 - http://www.kb.cert.org/vuls/id/BLUU-97KQ2C +CVE-2013-7308 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7308 - http://www.kb.cert.org/vuls/id/BLUU-985QRV +CVE-2013-7309 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7309 - http://www.kb.cert.org/vuls/id/BLUU-985QSE +CVE-2013-7310 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7310 - http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ +CVE-2013-7311 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7311 - http://www.kb.cert.org/vuls/id/BLUU-985QRC +CVE-2013-7312 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7312 - http://www.kb.cert.org/vuls/id/BLUU-985QS8 +CVE-2013-7313 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7313 - http://www.kb.cert.org/vuls/id/BLUU-97KQ26 +CVE-2013-7314 - http://www.kb.cert.org/vuls/id/229804 +CVE-2013-7314 - http://www.kb.cert.org/vuls/id/BLUU-985QUQ +CVE-2013-7317 - http://www.kb.cert.org/vuls/id/405942 +CVE-2013-7318 - http://packetstormsecurity.com/files/122899/algosec64-xss.txt +CVE-2013-7326 - http://packetstormsecurity.com/files/124402 +CVE-2013-7327 - https://bugs.php.net/bug.php?id=66356 +CVE-2013-7328 - https://bugs.php.net/bug.php?id=66356 +CVE-2013-7331 - https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ +CVE-2013-7332 - https://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/ +CVE-2013-7334 - http://packetstormsecurity.com/files/119806/ImageCMS-4.0.0b-SQL-Injection.html +CVE-2013-7349 - http://packetstormsecurity.com/files/122771 +CVE-2013-7349 - http://packetstormsecurity.com/files/123482 +CVE-2013-7349 - http://www.exploit-db.com/exploits/28684 +CVE-2013-7349 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php +CVE-2013-7349 - https://www.netsparker.com/critical-xss-sql-injection-vulnerabilities-gnew/ +CVE-2013-7351 - http://seclists.org/oss-sec/2014/q2/1 +CVE-2013-7352 - http://packetstormsecurity.com/files/121481/b2evolution-4.1.6-SQL-Injection.html +CVE-2013-7368 - http://packetstormsecurity.com/files/122771 +CVE-2013-7368 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5153.php +CVE-2013-7368 - https://www.netsparker.com/critical-xss-sql-injection-vulnerabilities-gnew/ +CVE-2013-7373 - http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/ +CVE-2013-7373 - http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5 +CVE-2013-7375 - http://packetstormsecurity.com/files/120368/PHP-Fusion-CMS-7.02.05-SQL-Injection.html +CVE-2013-7375 - http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html +CVE-2013-7375 - http://seclists.org/bugtraq/2013/Feb/80 +CVE-2013-7376 - http://seclists.org/bugtraq/2013/Jul/27 +CVE-2013-7385 - http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html +CVE-2013-7388 - http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html +CVE-2013-7389 - http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt +CVE-2013-7392 - http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ +CVE-2013-7393 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2013-7409 - http://packetstormsecurity.com/files/123554/ALLPlayer-5.6.2-Buffer-Overflow.html +CVE-2013-7409 - http://packetstormsecurity.com/files/123986/ALLPlayer-5.6.2-SEH-Buffer-Overflow.html +CVE-2013-7409 - http://packetstormsecurity.com/files/124161/ALLPlayer-5.7-Buffer-Overflow.html +CVE-2013-7409 - http://packetstormsecurity.com/files/125519/ALLPlayer-5.8.1-Buffer-Overflow.html +CVE-2013-7409 - http://www.exploit-db.com/exploits/28855 +CVE-2013-7409 - http://www.exploit-db.com/exploits/29549 +CVE-2013-7417 - http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-7417 - http://sourceforge.net/p/ipcop/bugs/807/ +CVE-2013-7418 - http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2013-7418 - http://sourceforge.net/p/ipcop/bugs/807/ +CVE-2013-7419 - http://packetstormsecurity.com/files/124239/WordPress-Js-Multi-Hotel-2.2.1-Cross-Site-Scripting.html +CVE-2013-7421 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2013-7421 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2013-7421 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2013-7421 - http://www.ubuntu.com/usn/USN-2543-1 +CVE-2013-7421 - https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu +CVE-2013-7423 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html +CVE-2013-7423 - http://seclists.org/fulldisclosure/2021/Sep/0 +CVE-2013-7435 - https://bugs.launchpad.net/evergreen/+bug/1206589 +CVE-2013-7446 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2013-7446 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2013-7447 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2013-7447 - http://www.securityfocus.com/bid/83239 +CVE-2013-7447 - http://www.ubuntu.com/usn/USN-2898-1 +CVE-2013-7450 - https://github.com/pulp/pulp/pull/627 +CVE-2013-7458 - https://github.com/antirez/linenoise/issues/121 +CVE-2013-7458 - https://github.com/antirez/redis/blob/3.2/00-RELEASENOTES +CVE-2013-7458 - https://github.com/antirez/redis/pull/3322 +CVE-2013-7466 - http://hauntit.blogspot.com/2013/04/en-smf-204-full-disclosure.html +CVE-2013-7467 - http://hauntit.blogspot.com/2013/04/en-smf-204-full-disclosure.html +CVE-2013-7468 - https://packetstormsecurity.com/files/121391/public_phpInjection-smf204.txt +CVE-2013-7471 - https://www.exploit-db.com/exploits/27044 +CVE-2013-7485 - http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html +CVE-2013-7485 - http://seclists.org/bugtraq/2013/Nov/127 +CVE-2013-7486 - http://packetstormsecurity.com/files/124185/Open-Xchange-frontend6-6.22.4-backend-7.4.0-Cross-Site-Scripting.html +CVE-2013-7486 - http://seclists.org/bugtraq/2013/Nov/127 +CVE-2013-7487 - http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html +CVE-2013-7489 - https://www.openwall.com/lists/oss-security/2020/05/14/11 +CVE-2013-7490 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014 +CVE-2013-7491 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013 +CVE-2014-0014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2014-0015 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0015 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2014-0015 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0015 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-0015 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0030 - https://www.exploit-db.com/exploits/45341/ +CVE-2014-0032 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-0033 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0033 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0033 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0033 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0038 - http://www.openwall.com/lists/oss-security/2014/01/31/2 +CVE-2014-0038 - https://www.exploit-db.com/exploits/40503/ +CVE-2014-0040 - https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3 +CVE-2014-0041 - https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3CONFIRM: +CVE-2014-0042 - https://github.com/openstack/heat-templates/commit/65a4f8bebc72da71c616e2e378b7b1ac354db1a3 +CVE-2014-0050 - http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html +CVE-2014-0050 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0050 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0050 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0050 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-0050 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0050 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2014-0060 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0061 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0062 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0063 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0064 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0064 - https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a +CVE-2014-0065 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0066 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0071 - http://rhn.redhat.com/errata/RHSA-2014-0233.html +CVE-2014-0072 - https://github.com/apache/cordova-plugin-file-transfer/commit/a1d6fc07e8a40c1b2b16f4103c403b30e1089668 +CVE-2014-0075 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0075 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0075 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0075 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0075 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0076 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-0076 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0076 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0076 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2014-0088 - https://hackerone.com/reports/4689 +CVE-2014-0094 - http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html +CVE-2014-0094 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-0095 - http://seclists.org/fulldisclosure/2014/May/134 +CVE-2014-0095 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0096 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0096 - http://seclists.org/fulldisclosure/2014/May/135 +CVE-2014-0096 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0096 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0096 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0096 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0097 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2014-0098 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0098 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0098 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0098 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0099 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0099 - http://seclists.org/fulldisclosure/2014/May/138 +CVE-2014-0099 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0099 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0099 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0106 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-0107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0107 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-0107 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2014-0107 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2014-0112 - http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html +CVE-2014-0112 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-0113 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-0114 - http://openwall.com/lists/oss-security/2014/07/08/1 +CVE-2014-0114 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0114 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2014-0114 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0114 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0114 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0114 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0114 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2014-0116 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-0117 - http://seclists.org/fulldisclosure/2014/Jul/117 +CVE-2014-0117 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0118 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0118 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2014-0118 - https://hackerone.com/reports/20861 +CVE-2014-0119 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0119 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0119 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0119 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0119 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0130 - https://hackerone.com/reports/3370 +CVE-2014-0133 - https://hackerone.com/reports/4690 +CVE-2014-0138 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0138 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-0138 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0139 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-0156 - https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff +CVE-2014-0160 - http://seclists.org/fulldisclosure/2014/Apr/173 +CVE-2014-0160 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0160 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-0160 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0160 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0160 - https://hackerone.com/reports/6626 +CVE-2014-0160 - https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html +CVE-2014-0181 - http://www.openwall.com/lists/oss-security/2023/04/16/3 +CVE-2014-0185 - https://bugs.php.net/bug.php?id=67060 +CVE-2014-0185 - https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d +CVE-2014-0191 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0191 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-0195 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0195 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-0195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0195 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0195 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0195 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0195 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html +CVE-2014-0195 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0195 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2014-0196 - http://pastebin.com/raw.php?i=yTSFUBgZ +CVE-2014-0196 - http://www.exploit-db.com/exploits/33516 +CVE-2014-0196 - https://bugzilla.redhat.com/show_bug.cgi?id=1094232 +CVE-2014-0198 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0198 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0198 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0198 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0198 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0198 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html +CVE-2014-0198 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0198 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2014-0207 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-0207 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-0209 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0209 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0209 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0210 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0210 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0210 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0211 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0211 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0211 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0220 - http://packetstormsecurity.com/files/126956/Cloudera-Manager-4.8.2-5.0.0-Information-Disclosure.html +CVE-2014-0221 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0221 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-0221 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0221 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0221 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0221 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0221 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html +CVE-2014-0221 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0221 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2014-0224 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0224 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-0224 - http://www.kb.cert.org/vuls/id/978508 +CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0224 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-0224 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0224 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0224 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-0224 - http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download +CVE-2014-0224 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html +CVE-2014-0224 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0224 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2014-0226 - http://seclists.org/fulldisclosure/2014/Jul/114 +CVE-2014-0226 - http://www.exploit-db.com/exploits/34133 +CVE-2014-0226 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0226 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2014-0227 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-0227 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-0227 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-0228 - http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html +CVE-2014-0230 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-0230 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-0230 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-0231 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html +CVE-2014-0231 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-0231 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2014-0232 - http://packetstormsecurity.com/files/127929/Apache-OFBiz-11.04.04-12.04.03-Cross-Site-Scripting.html +CVE-2014-0237 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-0237 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-0238 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-0238 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-0243 - http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html +CVE-2014-0243 - http://seclists.org/fulldisclosure/2014/May/145 +CVE-2014-0243 - http://www.openwall.com/lists/oss-security/2014/05/28/1 +CVE-2014-0250 - https://github.com/FreeRDP/FreeRDP/issues/1871 +CVE-2014-0254 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-006 +CVE-2014-0257 - http://packetstormsecurity.com/files/127246/MS14-009-.NET-Deployment-Service-IE-Sandbox-Escape.html +CVE-2014-0282 - http://www.exploit-db.com/exploits/33860 +CVE-2014-0315 - http://seclists.org/fulldisclosure/2020/Jul/33 +CVE-2014-0329 - http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html +CVE-2014-0329 - http://www.kb.cert.org/vuls/id/228886 +CVE-2014-0330 - http://www.kb.cert.org/vuls/id/813382 +CVE-2014-0331 - http://seclists.org/fulldisclosure/2014/Apr/53 +CVE-2014-0331 - http://www.kb.cert.org/vuls/id/667340 +CVE-2014-0332 - http://www.kb.cert.org/vuls/id/727318 +CVE-2014-0332 - http://www.sonicwall.com/us/shared/download/Support_Bulletin_GMS_Vulnerability_XSS_Resolved_in_7.1_SP2_and_7.2.pdf +CVE-2014-0335 - http://www.kb.cert.org/vuls/id/823452 +CVE-2014-0336 - http://www.kb.cert.org/vuls/id/823452 +CVE-2014-0337 - http://www.kb.cert.org/vuls/id/917700 +CVE-2014-0338 - http://seclists.org/fulldisclosure/2014/Mar/154 +CVE-2014-0338 - http://www.kb.cert.org/vuls/id/807134 +CVE-2014-0339 - http://seclists.org/fulldisclosure/2014/Mar/274 +CVE-2014-0339 - http://www.kb.cert.org/vuls/id/381692 +CVE-2014-0341 - http://www.kb.cert.org/vuls/id/901156 +CVE-2014-0342 - http://www.kb.cert.org/vuls/id/901156 +CVE-2014-0357 - http://www.kb.cert.org/vuls/id/251628 +CVE-2014-0358 - http://www.kb.cert.org/vuls/id/657622 +CVE-2014-0359 - http://www.kb.cert.org/vuls/id/657622 +CVE-2014-0361 - http://www.kb.cert.org/vuls/id/622950 +CVE-2014-0362 - http://www.kb.cert.org/vuls/id/673313 +CVE-2014-0363 - http://issues.igniterealtime.org/browse/SMACK-410 +CVE-2014-0363 - http://www.kb.cert.org/vuls/id/489228 +CVE-2014-0364 - http://www.kb.cert.org/vuls/id/489228 +CVE-2014-0368 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0373 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0375 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0376 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0382 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0384 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0387 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0403 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0410 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0411 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0413 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0414 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0415 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0416 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0417 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0418 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0420 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-0421 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0422 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0423 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0424 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0426 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0428 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 +CVE-2014-0429 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0432 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0436 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-0436 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-0436 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-0442 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0446 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0447 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0448 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0449 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0450 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0451 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0452 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0453 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0454 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0455 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0456 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0457 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0458 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0459 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0460 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0461 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0463 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0464 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0465 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0476 - http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html +CVE-2014-0476 - https://www.exploit-db.com/exploits/38775/ +CVE-2014-0491 - https://hackerone.com/reports/2107 +CVE-2014-0502 - https://hackerone.com/reports/2170 +CVE-2014-0503 - https://hackerone.com/reports/6380 +CVE-2014-0508 - https://hackerone.com/reports/2140 +CVE-2014-0514 - http://packetstormsecurity.com/files/127113/Adobe-Reader-for-Android-addJavascriptInterface-Exploit.html +CVE-2014-0514 - http://seclists.org/fulldisclosure/2014/Apr/192 +CVE-2014-0514 - http://www.exploit-db.com/exploits/32884 +CVE-2014-0514 - http://www.securify.nl/advisory/SFY20140401/adobe_reader_for_android_exposes_insecure_javascript_interfaces.html +CVE-2014-0535 - https://hackerone.com/reports/15362 +CVE-2014-0538 - https://hackerone.com/reports/12497 +CVE-2014-0554 - https://hackerone.com/reports/27651 +CVE-2014-0556 - http://packetstormsecurity.com/files/131516/Adobe-Flash-Player-copyPixelsToByteArray-Integer-Overflow.html +CVE-2014-0556 - https://www.exploit-db.com/exploits/36808/ +CVE-2014-0619 - http://packetstormsecurity.com/files/128739/Hamster-Free-ZIP-Archiver-2.0.1.7-DLL-Hijacking.html +CVE-2014-0620 - http://www.exploit-db.com/exploits/30668 +CVE-2014-0621 - http://www.exploit-db.com/exploits/30667 +CVE-2014-0639 - http://packetstormsecurity.com/files/126788/RSA-Archer-GRC-Cross-Site-Scripting.html +CVE-2014-0659 - https://github.com/elvanderb/TCP-32764 +CVE-2014-0679 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140226-pi +CVE-2014-0683 - https://www.exploit-db.com/exploits/45986/ +CVE-2014-0749 - http://packetstormsecurity.com/files/126651/Torque-2.5.13-Buffer-Overflow.html +CVE-2014-0749 - http://packetstormsecurity.com/files/126855/TORQUE-Resource-Manager-2.5.13-Buffer-Overflow.html +CVE-2014-0749 - http://www.exploit-db.com/exploits/33554 +CVE-2014-0749 - https://labs.mwrinfosecurity.com/advisories/2014/05/14/torque-buffer-overflow +CVE-2014-0780 - https://www.exploit-db.com/exploits/42699/ +CVE-2014-0781 - https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities +CVE-2014-0783 - https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities +CVE-2014-0784 - https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities +CVE-2014-0787 - https://www.exploit-db.com/exploits/42724/ +CVE-2014-0792 - https://support.sonatype.com/entries/37828023-Nexus-Security-Vulnerability +CVE-2014-0834 - http://www-01.ibm.com/support/docview.wss?uid=swg1IV52863 +CVE-2014-0864 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0864 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0865 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0865 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0866 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0866 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0867 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0867 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0868 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0868 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0869 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0869 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0870 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0870 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0871 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0871 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0892 - http://www.kb.cert.org/vuls/id/350089 +CVE-2014-0894 - http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html +CVE-2014-0894 - http://seclists.org/fulldisclosure/2014/Jun/173 +CVE-2014-0907 - http://packetstormsecurity.com/files/126940/IBM-DB2-Privilege-Escalation.html +CVE-2014-0907 - http://seclists.org/fulldisclosure/2014/Jun/7 +CVE-2014-0907 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-0980 - http://packetstormsecurity.com/files/125089 +CVE-2014-0980 - http://seclists.org/fulldisclosure/2014/Feb/34 +CVE-2014-0980 - http://www.coresecurity.com/advisories/publish-it-buffer-overflow-vulnerability +CVE-2014-0980 - http://www.exploit-db.com/exploits/31461 +CVE-2014-0981 - http://seclists.org/fulldisclosure/2014/Mar/95 +CVE-2014-0981 - http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities +CVE-2014-0981 - http://www.exploit-db.com/exploits/32208 +CVE-2014-0981 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0983 - http://seclists.org/fulldisclosure/2014/Mar/95 +CVE-2014-0983 - http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities +CVE-2014-0983 - http://www.exploit-db.com/exploits/32208 +CVE-2014-0983 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-0984 - http://www.coresecurity.com/advisories/sap-router-password-timing-attack +CVE-2014-0984 - http://www.exploit-db.com/exploits/32919 +CVE-2014-0993 - http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-buffer-overflow +CVE-2014-0993 - http://www.kb.cert.org/vuls/id/646748 +CVE-2014-0994 - http://seclists.org/fulldisclosure/2014/Sep/57 +CVE-2014-0994 - http://www.coresecurity.com/advisories/delphi-and-c-builder-vcl-library-heap-buffer-overflow +CVE-2014-0995 - http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html +CVE-2014-0995 - http://seclists.org/fulldisclosure/2014/Oct/76 +CVE-2014-0995 - http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability +CVE-2014-0997 - http://packetstormsecurity.com/files/130107/Android-WiFi-Direct-Denial-Of-Service.html +CVE-2014-0997 - http://seclists.org/fulldisclosure/2015/Jan/104 +CVE-2014-0997 - https://www.coresecurity.com/advisories/android-wifi-direct-denial-service +CVE-2014-0997 - https://www.exploit-db.com/exploits/35913/ +CVE-2014-0998 - http://seclists.org/fulldisclosure/2015/Jan/107 +CVE-2014-0998 - http://www.coresecurity.com/advisories/freebsd-kernel-multiple-vulnerabilities +CVE-2014-0999 - http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html +CVE-2014-0999 - http://seclists.org/fulldisclosure/2015/May/95 +CVE-2014-0999 - http://www.exploit-db.com/exploits/37114 +CVE-2014-100003 - http://packetstormsecurity.com/files/128668/YourMembers-Blind-SQL-Injection.html +CVE-2014-100005 - http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ +CVE-2014-100008 - http://packetstormsecurity.com/files/125959 +CVE-2014-100009 - http://packetstormsecurity.com/files/125959 +CVE-2014-10001 - http://packetstormsecurity.com/files/124755 +CVE-2014-100014 - http://www.exploit-db.com/exploits/31763 +CVE-2014-100015 - http://packetstormsecurity.com/files/125361 +CVE-2014-100015 - http://www.exploit-db.com/exploits/32163 +CVE-2014-100016 - http://packetstormsecurity.com/files/124986/WordPress-Photocrati-Cross-Site-Scripting.html +CVE-2014-100017 - http://packetstormsecurity.com/files/128179/PhpOnlineChat-3.0-Cross-Site-Scripting.html +CVE-2014-100018 - https://security.dxw.com/advisories/xss-in-unconfirmed-1-2-3/ +CVE-2014-100020 - http://www.exploit-db.com/exploits/31140 +CVE-2014-100022 - https://security.dxw.com/advisories/admin-xss-and-sqli-in-mtouch-quiz-3-0-6/ +CVE-2014-100023 - https://security.dxw.com/advisories/admin-xss-and-sqli-in-mtouch-quiz-3-0-6/ +CVE-2014-100025 - http://packetstormsecurity.com/files/125379 +CVE-2014-100027 - https://github.com/getusedtoit/wp-slimstat/issues/3 +CVE-2014-100028 - http://packetstormsecurity.com/files/124682 +CVE-2014-100029 - http://packetstormsecurity.com/files/125464 +CVE-2014-10003 - http://packetstormsecurity.com/files/124918 +CVE-2014-100030 - http://packetstormsecurity.com/files/125464 +CVE-2014-100031 - http://packetstormsecurity.com/files/125464 +CVE-2014-100032 - http://packetstormsecurity.com/files/128213/Airties-Air6372SO-Modem-Web-Interface-Cross-Site-Scripting.html +CVE-2014-100036 - https://www.netsparker.com/critical-xss-vulnerabilities-in-flatpress/ +CVE-2014-100037 - https://www.netsparker.com/xss-vulnerability-in-storytlr/ +CVE-2014-100038 - https://www.netsparker.com/critical-xss-vulnerabilities-in-storytlr/ +CVE-2014-10004 - http://packetstormsecurity.com/files/124918 +CVE-2014-10005 - http://packetstormsecurity.com/files/124918 +CVE-2014-10006 - http://packetstormsecurity.com/files/124918 +CVE-2014-10007 - https://www.netsparker.com/critical-xss-vulnerabilities-in-maian-weblog/ +CVE-2014-10008 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5169.php +CVE-2014-10009 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5169.php +CVE-2014-10010 - http://packetstormsecurity.com/files/124755 +CVE-2014-10011 - http://packetstormsecurity.com/files/129262/TRENDnet-SecurView-Wireless-Network-Camera-TV-IP422WN-Buffer-Overflow.html +CVE-2014-10011 - http://www.zeroscience.mk/codes/trendnet_bof.txt +CVE-2014-10011 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5211.php +CVE-2014-10012 - http://packetstormsecurity.com/files/129035/Another-WordPress-Classifieds-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-10013 - http://packetstormsecurity.com/files/129035/Another-WordPress-Classifieds-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-10013 - http://www.exploit-db.com/exploits/35204 +CVE-2014-10014 - http://packetstormsecurity.com/files/124753/eventbookingcalendar-xssxsrfsql.txt +CVE-2014-10015 - http://packetstormsecurity.com/files/124753/eventbookingcalendar-xssxsrfsql.txt +CVE-2014-10016 - http://packetstormsecurity.com/files/125513 +CVE-2014-10017 - http://packetstormsecurity.com/files/125513 +CVE-2014-10020 - http://packetstormsecurity.com/files/124914 +CVE-2014-10020 - http://www.exploit-db.com/exploits/31142 +CVE-2014-10023 - http://packetstormsecurity.com/files/125007 +CVE-2014-10029 - http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html +CVE-2014-10029 - http://seclists.org/fulldisclosure/2014/Nov/73 +CVE-2014-10033 - http://www.exploit-db.com/exploits/31515 +CVE-2014-10033 - http://www.secgeek.net/oscommerce-v2x-sql-injection-vulnerability/ +CVE-2014-10034 - http://packetstormsecurity.com/files/125480 +CVE-2014-10034 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5170.php +CVE-2014-10035 - http://packetstormsecurity.com/files/125480 +CVE-2014-10035 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5170.php +CVE-2014-10036 - https://www.netsparker.com/critical-xss-vulnerabilities-in-teamcity/ +CVE-2014-10038 - http://packetstormsecurity.com/files/124801 +CVE-2014-10039 - http://www.securityfocus.com/bid/103671 +CVE-2014-10043 - http://www.securityfocus.com/bid/103671 +CVE-2014-10044 - http://www.securityfocus.com/bid/103671 +CVE-2014-10045 - http://www.securityfocus.com/bid/103671 +CVE-2014-10046 - http://www.securityfocus.com/bid/103671 +CVE-2014-10047 - http://www.securityfocus.com/bid/103671 +CVE-2014-10048 - http://www.securityfocus.com/bid/103671 +CVE-2014-10050 - http://www.securityfocus.com/bid/103671 +CVE-2014-10051 - http://www.securityfocus.com/bid/103671 +CVE-2014-10052 - http://www.securityfocus.com/bid/103671 +CVE-2014-10053 - http://www.securityfocus.com/bid/103671 +CVE-2014-10054 - http://www.securityfocus.com/bid/103671 +CVE-2014-10055 - http://www.securityfocus.com/bid/103671 +CVE-2014-10056 - http://www.securityfocus.com/bid/103671 +CVE-2014-10057 - http://www.securityfocus.com/bid/103671 +CVE-2014-10058 - http://www.securityfocus.com/bid/103671 +CVE-2014-10059 - http://www.securityfocus.com/bid/103671 +CVE-2014-10062 - http://www.securityfocus.com/bid/103671 +CVE-2014-10063 - http://www.securityfocus.com/bid/103671 +CVE-2014-10074 - http://issues.umbraco.org/issue/U4-5901 +CVE-2014-10076 - http://www.vapidlabs.com/advisory.php?v=81 +CVE-2014-10078 - https://www.exploit-db.com/exploits/46549/ +CVE-2014-10079 - https://packetstormsecurity.com/files/127786/Vembu-Backup-Disaster-Recovery-6.1-Follow-Up.html +CVE-2014-10079 - https://www.exploit-db.com/exploits/46549/ +CVE-2014-10377 - https://wpvulndb.com/vulnerabilities/9812 +CVE-2014-10392 - https://wpvulndb.com/vulnerabilities/9621 +CVE-2014-10396 - https://packetstormsecurity.com/files/128186/ +CVE-2014-10397 - https://packetstormsecurity.com/files/128188/ +CVE-2014-10398 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt +CVE-2014-10401 - https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a +CVE-2014-10401 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014 +CVE-2014-1201 - https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-report.txt +CVE-2014-1201 - https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-testcase.html +CVE-2014-1202 - http://baraktawily.blogspot.com/2014/01/soapui-code-execution-vulnerability-cve.html +CVE-2014-1202 - http://packetstormsecurity.com/files/124773/SoapUI-Remote-Code-Execution.html +CVE-2014-1202 - http://www.exploit-db.com/exploits/30908 +CVE-2014-1202 - http://www.youtube.com/watch?v=3lCLE64rsc0 +CVE-2014-1204 - http://www.exploit-db.com/exploits/31578 +CVE-2014-1206 - http://www.exploit-db.com/exploits/31738 +CVE-2014-1213 - http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html +CVE-2014-1213 - http://seclists.org/fulldisclosure/2014/Feb/1 +CVE-2014-1224 - http://seclists.org/fulldisclosure/2014/Mar/389 +CVE-2014-1224 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-002/-rexx-recruitment-cross-site-scripting-in-user-registration +CVE-2014-1226 - http://seclists.org/fulldisclosure/2014/Jun/12 +CVE-2014-1237 - http://packetstormsecurity.com/files/125062 +CVE-2014-125026 - https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898 +CVE-2014-125029 - https://vuldb.com/?id.217150 +CVE-2014-125033 - https://vuldb.com/?id.217178 +CVE-2014-125035 - https://github.com/mrbobbybryant/Jobs-Plugin/commit/b8a56718b1d42834c6ec51d9c489c5dc20471d7b +CVE-2014-125049 - https://vuldb.com/?id.217560 +CVE-2014-125082 - https://github.com/nivit/redports/commit/fc2c1ea1b8d795094abb15ac73cab90830534e04 +CVE-2014-125087 - https://github.com/jmurty/java-xmlbuilder/issues/6 +CVE-2014-1359 - http://packetstormsecurity.com/files/167630/launchd-Heap-Corruption.html +CVE-2014-1372 - https://code.google.com/p/google-security-research/issues/detail?id=18 +CVE-2014-1401 - http://packetstormsecurity.com/files/125079 +CVE-2014-1402 - http://openwall.com/lists/oss-security/2014/01/10/2 +CVE-2014-1402 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 +CVE-2014-1403 - http://seclists.org/fulldisclosure/2014/Feb/5 +CVE-2014-1409 - http://seclists.org/fulldisclosure/2014/Apr/21 +CVE-2014-1409 - https://packetstormsecurity.com/files/cve/CVE-2014-1409 +CVE-2014-1438 - http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/ +CVE-2014-1438 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2014-1441 - http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html +CVE-2014-1441 - http://seclists.org/fulldisclosure/2014/Feb/39 +CVE-2014-1442 - http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html +CVE-2014-1442 - http://seclists.org/fulldisclosure/2014/Feb/39 +CVE-2014-1443 - http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html +CVE-2014-1443 - http://seclists.org/fulldisclosure/2014/Feb/39 +CVE-2014-1444 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2014-1445 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2014-1446 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2014-1446 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2014-1449 - http://browser-shredders.blogspot.com/2014/01/cve-2014-1449-maxthon-cloud-browser-for.html +CVE-2014-1455 - http://www.securityfocus.com/bid/66689 +CVE-2014-1457 - https://www.secureworks.com/research/swrx-2014-006 +CVE-2014-1459 - http://packetstormsecurity.com/files/125078 +CVE-2014-1459 - http://www.exploit-db.com/exploits/31521 +CVE-2014-1466 - http://packetstormsecurity.com/files/124724/cspmysql-sql.txt +CVE-2014-1477 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1478 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1479 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1479 - https://bugzilla.mozilla.org/show_bug.cgi?id=911864 +CVE-2014-1480 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1480 - https://bugzilla.mozilla.org/show_bug.cgi?id=916726 +CVE-2014-1481 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1482 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1483 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1483 - https://bugzilla.mozilla.org/show_bug.cgi?id=950427 +CVE-2014-1484 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1485 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1486 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1486 - https://bugzilla.mozilla.org/show_bug.cgi?id=942164 +CVE-2014-1487 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1488 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1489 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1490 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-1490 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-1490 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-1491 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-1491 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-1491 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-1492 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-1492 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-1492 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-1493 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1494 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1496 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1496 - https://bugzilla.mozilla.org/show_bug.cgi?id=925747 +CVE-2014-1497 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1498 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1499 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1500 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1500 - https://bugzilla.mozilla.org/show_bug.cgi?id=956524 +CVE-2014-1501 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1502 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1504 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1504 - https://bugzilla.mozilla.org/show_bug.cgi?id=911547 +CVE-2014-1505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1506 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1507 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1508 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1509 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1510 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1510 - https://bugzilla.mozilla.org/show_bug.cgi?id=982906 +CVE-2014-1511 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1512 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1512 - https://bugzilla.mozilla.org/show_bug.cgi?id=982957 +CVE-2014-1513 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1513 - https://bugzilla.mozilla.org/show_bug.cgi?id=982974 +CVE-2014-1514 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1516 - http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/ +CVE-2014-1517 - https://bugzilla.mozilla.org/show_bug.cgi?id=713926 +CVE-2014-1518 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1519 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1520 - http://packetstormsecurity.com/files/161696/Mozilla-Arbitrary-Code-Execution-Privilege-Escalation.html +CVE-2014-1520 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1520 - https://bugzilla.mozilla.org/show_bug.cgi?id=961676 +CVE-2014-1522 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1522 - https://bugzilla.mozilla.org/show_bug.cgi?id=995289 +CVE-2014-1523 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1524 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1525 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1526 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1527 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1528 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1528 - https://bugzilla.mozilla.org/show_bug.cgi?id=963962 +CVE-2014-1529 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1530 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1531 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1532 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1533 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1534 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1002340 +CVE-2014-1536 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1537 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1538 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1539 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1539 - https://bugzilla.mozilla.org/show_bug.cgi?id=995603 +CVE-2014-1540 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1541 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1542 - http://www.mozilla.org/security/announce/2014/mfsa2014-53.html +CVE-2014-1542 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1542 - https://bugzilla.mozilla.org/show_bug.cgi?id=991533 +CVE-2014-1543 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1543 - https://bugzilla.mozilla.org/show_bug.cgi?id=1011859 +CVE-2014-1544 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1544 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-1545 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1545 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-1546 - https://bugzilla.mozilla.org/show_bug.cgi?id=1036213 +CVE-2014-1547 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1547 - https://bugzilla.mozilla.org/show_bug.cgi?id=1012694 +CVE-2014-1547 - https://bugzilla.mozilla.org/show_bug.cgi?id=1019684 +CVE-2014-1548 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1002702 +CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020008 +CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020041 +CVE-2014-1548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1021240 +CVE-2014-1549 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1549 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020205 +CVE-2014-1550 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1550 - https://bugzilla.mozilla.org/show_bug.cgi?id=1020411 +CVE-2014-1551 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1551 - https://bugzilla.mozilla.org/show_bug.cgi?id=1018234 +CVE-2014-1552 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1553 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1553 - https://bugzilla.mozilla.org/show_bug.cgi?id=1022945 +CVE-2014-1554 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1555 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1556 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1557 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1559 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1561 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1561 - https://bugzilla.mozilla.org/show_bug.cgi?id=910375 +CVE-2014-1562 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1563 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1563 - https://bugzilla.mozilla.org/show_bug.cgi?id=1018524 +CVE-2014-1564 - http://packetstormsecurity.com/files/128132/Mozilla-Firefox-Secret-Leak.html +CVE-2014-1564 - http://seclists.org/fulldisclosure/2014/Sep/18 +CVE-2014-1564 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1564 - https://bugzilla.mozilla.org/show_bug.cgi?id=1045977 +CVE-2014-1565 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1565 - https://bugzilla.mozilla.org/show_bug.cgi?id=1047831 +CVE-2014-1566 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1567 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1568 - http://www.kb.cert.org/vuls/id/772676 +CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-1568 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-1568 - https://bugzilla.mozilla.org/show_bug.cgi?id=1064636 +CVE-2014-1568 - https://bugzilla.mozilla.org/show_bug.cgi?id=1069405 +CVE-2014-1569 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1569 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-1569 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-1569 - https://bugzilla.mozilla.org/show_bug.cgi?id=1064670 +CVE-2014-1569 - https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02 +CVE-2014-1571 - http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html +CVE-2014-1572 - http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html +CVE-2014-1572 - http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/ +CVE-2014-1572 - https://bugzilla.mozilla.org/show_bug.cgi?id=1074812 +CVE-2014-1573 - http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html +CVE-2014-1573 - http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/ +CVE-2014-1573 - https://bugzilla.mozilla.org/show_bug.cgi?id=1075578 +CVE-2014-1574 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1575 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1576 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1576 - https://bugzilla.mozilla.org/show_bug.cgi?id=1041512 +CVE-2014-1577 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1578 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1578 - https://bugzilla.mozilla.org/show_bug.cgi?id=1063327 +CVE-2014-1580 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1581 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1581 - https://bugzilla.mozilla.org/show_bug.cgi?id=1068218 +CVE-2014-1582 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1583 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1584 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1585 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1586 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1587 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1587 - https://bugzilla.mozilla.org/show_bug.cgi?id=1072847 +CVE-2014-1588 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1588 - https://bugzilla.mozilla.org/show_bug.cgi?id=1026037 +CVE-2014-1588 - https://bugzilla.mozilla.org/show_bug.cgi?id=1075546 +CVE-2014-1588 - https://bugzilla.mozilla.org/show_bug.cgi?id=1096026 +CVE-2014-1589 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1590 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1591 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1591 - https://bugzilla.mozilla.org/show_bug.cgi?id=1069762 +CVE-2014-1592 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1592 - https://bugzilla.mozilla.org/show_bug.cgi?id=1088635 +CVE-2014-1593 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1594 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-1595 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-1595 - http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/ +CVE-2014-1595 - https://bugzilla.mozilla.org/show_bug.cgi?id=1092855 +CVE-2014-1603 - http://seclists.org/fulldisclosure/2014/May/53 +CVE-2014-1604 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263 +CVE-2014-1610 - http://www.exploit-db.com/exploits/31329/ +CVE-2014-1610 - https://bugzilla.wikimedia.org/show_bug.cgi?id=60339 +CVE-2014-1611 - http://packetstormsecurity.com/files/124803/Drupal-Anonymous-Posting-7.x-Cross-Site-Scripting.html +CVE-2014-1612 - http://packetstormsecurity.com/files/124931/Mediatrix-4402-Cross-Site-Scripting.html +CVE-2014-1612 - http://www.kb.cert.org/vuls/id/252294 +CVE-2014-1617 - https://packetstormsecurity.com/files/cve/CVE-2014-1617 +CVE-2014-1618 - http://packetstormsecurity.com/files/124723/uaepdshopping-sql.txt +CVE-2014-1619 - http://packetstormsecurity.com/files/124652 +CVE-2014-1620 - http://packetstormsecurity.com/files/124681/Hiox-Guest-Book-5.0-Cross-Site-Scripting.html +CVE-2014-1635 - https://labs.integrity.pt/advisories/cve-2014-1635/ +CVE-2014-1636 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html +CVE-2014-1637 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html +CVE-2014-1648 - http://seclists.org/fulldisclosure/2014/Apr/256 +CVE-2014-1665 - https://packetstormsecurity.com/files/125086 +CVE-2014-1665 - https://www.exploit-db.com/exploits/31427/ +CVE-2014-1670 - http://www.youtube.com/watch?v=_j1RKtTxZ3k +CVE-2014-1673 - http://packetstormsecurity.com/files/124967 +CVE-2014-1673 - http://seclists.org/fulldisclosure/2014/Jan/185 +CVE-2014-1677 - http://seclists.org/fulldisclosure/2016/Jul/67 +CVE-2014-1677 - http://www.exploit-db.com/exploits/31894 +CVE-2014-1677 - https://packetstormsecurity.com/files/125388 +CVE-2014-1680 - http://packetstormsecurity.com/files/125059 +CVE-2014-1683 - http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html +CVE-2014-1683 - http://seclists.org/fulldisclosure/2014/Jan/159 +CVE-2014-1683 - http://www.exploit-db.com/exploits/31183 +CVE-2014-1684 - https://trac.videolan.org/vlc/ticket/10482 +CVE-2014-1686 - https://packetstormsecurity.com/files/125682 +CVE-2014-1690 - http://www.ubuntu.com/usn/USN-2140-1 +CVE-2014-1695 - http://adamziaja.com/poc/201401-xss-otrs.html +CVE-2014-1695 - http://packetstormsecurity.com/files/131654/OTRS-3.x-Cross-Site-Scripting.html +CVE-2014-1695 - https://www.exploit-db.com/exploits/36842/ +CVE-2014-1737 - http://www.openwall.com/lists/oss-security/2014/05/09/2 +CVE-2014-1738 - http://www.openwall.com/lists/oss-security/2014/05/09/2 +CVE-2014-1739 - http://speirofr.appspot.com/cve-2014-1739-kernel-infoleak-vulnerability-in-media_enum_entities.html +CVE-2014-1739 - http://www.openwall.com/lists/oss-security/2014/06/15/1 +CVE-2014-1750 - http://seclists.org/oss-sec/2014/q1/173 +CVE-2014-1757 - http://www.kb.cert.org/vuls/id/882841 +CVE-2014-1767 - https://www.exploit-db.com/exploits/39446/ +CVE-2014-1767 - https://www.exploit-db.com/exploits/39525/ +CVE-2014-1770 - https://www.corelan.be/index.php/2014/05/22/on-cve-2014-1770-zdi-14-140-internet-explorer-8-0day/ +CVE-2014-1776 - http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ +CVE-2014-1785 - http://packetstormsecurity.com/files/140233/Microsoft-Internet-Explorer-11-MSHTML-CSpliceTreeEngine-RemoveSplice-Use-After-Free.html +CVE-2014-1785 - https://www.exploit-db.com/exploits/40946/ +CVE-2014-1826 - http://www.madirish.net/559 +CVE-2014-1827 - http://www.madirish.net/559 +CVE-2014-1828 - http://www.madirish.net/559 +CVE-2014-1833 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737160 +CVE-2014-1836 - http://seclists.org/fulldisclosure/2014/Feb/14 +CVE-2014-1836 - https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt +CVE-2014-1840 - http://osandamalith.wordpress.com/2014/02/02/mybb-1-6-12-post-xss-0day/ +CVE-2014-1840 - http://packetstormsecurity.com/files/125038/MyBB-1.6.12-POST-Cross-Site-Scripting.html +CVE-2014-1849 - http://seclists.org/fulldisclosure/2014/May/35 +CVE-2014-1854 - http://www.exploit-db.com/exploits/31834 +CVE-2014-1855 - http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html +CVE-2014-1860 - http://www.openwall.com/lists/oss-security/2014/02/03/14 +CVE-2014-1860 - https://packetstormsecurity.com/files/cve/CVE-2014-1860 +CVE-2014-1860 - https://www.exploit-database.net/?id=21609 +CVE-2014-1861 - http://blog.quaji.com/2014/02/remote-code-execution-on-all-enterprise.html +CVE-2014-1874 - http://www.ubuntu.com/usn/USN-2129-1 +CVE-2014-1874 - http://www.ubuntu.com/usn/USN-2136-1 +CVE-2014-1874 - http://www.ubuntu.com/usn/USN-2140-1 +CVE-2014-1876 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-1877 - http://seclists.org/oss-sec/2014/q1/258 +CVE-2014-1881 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt +CVE-2014-1881 - http://seclists.org/bugtraq/2014/Jan/96 +CVE-2014-1881 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1882 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt +CVE-2014-1882 - http://seclists.org/bugtraq/2014/Jan/96 +CVE-2014-1882 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1883 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt +CVE-2014-1883 - http://seclists.org/bugtraq/2014/Jan/96 +CVE-2014-1883 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1884 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt +CVE-2014-1884 - http://seclists.org/bugtraq/2014/Jan/96 +CVE-2014-1884 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1885 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1886 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1887 - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf +CVE-2014-1888 - http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html +CVE-2014-1903 - http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html +CVE-2014-1903 - http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html +CVE-2014-1906 - http://packetstormsecurity.com/files/125454 +CVE-2014-1907 - http://packetstormsecurity.com/files/125454 +CVE-2014-1912 - http://bugs.python.org/issue20246 +CVE-2014-1912 - http://pastebin.com/raw.php?i=GHXSmNEg +CVE-2014-1912 - http://www.exploit-db.com/exploits/31875 +CVE-2014-1912 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2014-1912 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-1914 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html +CVE-2014-1915 - http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html +CVE-2014-1963 - https://erpscan.io/advisories/erpscan-14-001-sap-netweaver-message-server-dos/ +CVE-2014-2008 - http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-Information-Disclosure-SQL-Injection.html +CVE-2014-2008 - http://seclists.org/fulldisclosure/2014/Sep/23 +CVE-2014-2008 - http://www.exploit-db.com/exploits/34586 +CVE-2014-2009 - http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-Information-Disclosure-SQL-Injection.html +CVE-2014-2009 - http://seclists.org/fulldisclosure/2014/Sep/23 +CVE-2014-2009 - http://www.exploit-db.com/exploits/34586 +CVE-2014-2013 - http://bugs.ghostscript.com/show_bug.cgi?id=694957 +CVE-2014-2013 - http://seclists.org/fulldisclosure/2014/Jan/130 +CVE-2014-2013 - http://www.exploit-db.com/exploits/31090 +CVE-2014-2018 - http://www.kb.cert.org/vuls/id/863369 +CVE-2014-2018 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-2018 - http://www.vulnerability-lab.com/get_content.php?id=953 +CVE-2014-2018 - https://bugzilla.mozilla.org/show_bug.cgi?id=875818 +CVE-2014-2020 - https://bugs.php.net/bug.php?id=66356 +CVE-2014-2021 - http://packetstormsecurity.com/files/128691/vBulletin-5.x-4.x-Persistent-Cross-Site-Scripting.html +CVE-2014-2021 - http://seclists.org/fulldisclosure/2014/Oct/55 +CVE-2014-2021 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2021 +CVE-2014-2022 - http://packetstormsecurity.com/files/128696/vBulletin-4.x-SQL-Injection.html +CVE-2014-2022 - http://seclists.org/fulldisclosure/2014/Oct/56 +CVE-2014-2022 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2022 +CVE-2014-2023 - http://packetstormsecurity.com/files/128854/vBulletin-4.x-Tapatalk-Blind-SQL-Injection.html +CVE-2014-2023 - http://seclists.org/fulldisclosure/2014/Oct/57 +CVE-2014-2023 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2023 +CVE-2014-2024 - https://github.com/open-classifieds/openclassifieds2/issues/556 +CVE-2014-2025 - http://www.christian-schneider.net/advisories/CVE-2014-2025.txt +CVE-2014-2026 - http://packetstormsecurity.com/files/129590/Intrexx-Professional-6.0-5.2-Cross-Site-Scripting.html +CVE-2014-2026 - http://www.christian-schneider.net/advisories/CVE-2014-2026.txt +CVE-2014-2027 - http://openwall.com/lists/oss-security/2014/02/19/10 +CVE-2014-2027 - http://openwall.com/lists/oss-security/2014/02/19/4 +CVE-2014-2034 - https://support.sonatype.com/entries/42374566-CVE-2014-2034-Nexus-Security-Advisory-REST-API +CVE-2014-2038 - http://www.ubuntu.com/usn/USN-2140-1 +CVE-2014-2040 - http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/index.html +CVE-2014-2044 - http://packetstormsecurity.com/files/125585/ownCloud-4.0.x-4.5.x-Remote-Code-Execution.html +CVE-2014-2044 - http://www.exploit-db.com/exploits/32162 +CVE-2014-2045 - http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html +CVE-2014-2045 - https://www.exploit-db.com/exploits/39407/ +CVE-2014-2072 - http://packetstormsecurity.com/files/125308/Catia-V5-6R2013-Stack-Buffer-Overflow.html +CVE-2014-2073 - http://packetstormsecurity.com/files/125325/Catia-V5-6R2013-Stack-Buffer-Overflow.html +CVE-2014-2075 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-2081 - http://packetstormsecurity.com/files/127997/VTLS-Virtua-SQL-Injection.html +CVE-2014-2087 - http://seclists.org/fulldisclosure/2014/Mar/137 +CVE-2014-2087 - https://www.rcesecurity.com/2014/03/cve-2014-2087-free-download-manager-cdownloads_deleted-updatedownload-remote-code-execution +CVE-2014-2088 - http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html +CVE-2014-2089 - http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html +CVE-2014-2090 - http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html +CVE-2014-2091 - http://packetstormsecurity.com/files/125348/ATutor-2.1.1-Cross-Site-Scripting.html +CVE-2014-2092 - http://packetstormsecurity.com/files/125353/CMSMadeSimple-1.11.10-Cross-Site-Scripting.html +CVE-2014-2132 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex +CVE-2014-2133 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex +CVE-2014-2134 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex +CVE-2014-2135 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex +CVE-2014-2136 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex +CVE-2014-2177 - http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html +CVE-2014-2177 - http://seclists.org/fulldisclosure/2014/Nov/6 +CVE-2014-2178 - http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html +CVE-2014-2178 - http://seclists.org/fulldisclosure/2014/Nov/6 +CVE-2014-2179 - http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html +CVE-2014-2179 - http://seclists.org/fulldisclosure/2014/Nov/6 +CVE-2014-2198 - http://www.securityfocus.com/bid/68334 +CVE-2014-2206 - http://www.rcesecurity.com/2014/03/cve-2014-2206-getgo-download-manager-http-response-header-buffer-overflow-remote-code-execution +CVE-2014-2223 - http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html +CVE-2014-2225 - http://seclists.org/fulldisclosure/2014/Jul/126 +CVE-2014-2225 - http://sethsec.blogspot.com/2014/07/cve-2014-2225.html +CVE-2014-2226 - http://packetstormsecurity.com/files/127616/Ubiquiti-UbiFi-Controller-2.4.5-Password-Hash-Disclosure.html +CVE-2014-2226 - http://seclists.org/fulldisclosure/2014/Jul/127 +CVE-2014-2226 - http://sethsec.blogspot.com/2014/07/cve-2014-2226.html +CVE-2014-2227 - http://seclists.org/fulldisclosure/2014/Jul/128 +CVE-2014-2227 - http://sethsec.blogspot.com/2014/07/cve-2014-2227.html +CVE-2014-2230 - http://packetstormsecurity.com/files/128718/OpenX-2.8.10-Open-Redirect.html +CVE-2014-2230 - http://seclists.org/fulldisclosure/2014/Oct/72 +CVE-2014-2232 - http://www.christian-schneider.net/advisories/CVE-2014-2232.txt +CVE-2014-2233 - http://www.christian-schneider.net/advisories/CVE-2014-2233.txt +CVE-2014-2240 - http://www.freetype.org/index.html +CVE-2014-2242 - https://bugzilla.wikimedia.org/show_bug.cgi?id=60771 +CVE-2014-2249 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf +CVE-2014-2250 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf +CVE-2014-2252 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf +CVE-2014-2254 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf +CVE-2014-2256 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf +CVE-2014-2258 - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf +CVE-2014-2260 - http://packetstormsecurity.com/files/124804/Ajenti-1.2.13-Cross-Site-Scripting.html +CVE-2014-2265 - http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/ +CVE-2014-2274 - https://security.dxw.com/advisories/stored-xss-and-csrf-vulnerabilities-in-subscribe-to-comments-reloaded-140129/ +CVE-2014-2278 - http://packetstormsecurity.com/files/125726 +CVE-2014-2279 - http://packetstormsecurity.com/files/125726 +CVE-2014-2280 - http://packetstormsecurity.com/files/125726 +CVE-2014-2299 - http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html +CVE-2014-2301 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-003/-metadata-information-disclosure-in-orbiteam-bscw +CVE-2014-2302 - http://packetstormsecurity.com/files/126861/webEdition-CMS-2.8.0.0-Remote-Command-Execution.html +CVE-2014-2302 - http://seclists.org/fulldisclosure/2014/May/147 +CVE-2014-2302 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-004 +CVE-2014-2303 - http://packetstormsecurity.com/files/126862/webEdition-CMS-6.3.8.0-svn6985-SQL-Injection.html +CVE-2014-2303 - http://seclists.org/fulldisclosure/2014/May/148 +CVE-2014-2303 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-005/-sql-injection-in-webedition-cms-file-browser +CVE-2014-2315 - http://packetstormsecurity.com/files/125397 +CVE-2014-2318 - http://packetstormsecurity.com/files/125507 +CVE-2014-2322 - http://www.openwall.com/lists/oss-security/2014/03/10/8 +CVE-2014-2322 - http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html +CVE-2014-2325 - http://seclists.org/fulldisclosure/2014/Mar/110 +CVE-2014-2326 - http://packetstormsecurity.com/files/125849/Deutsche-Telekom-CERT-Advisory-DTC-A-20140324-001.html +CVE-2014-2341 - http://www.exploit-db.com/exploits/32830 +CVE-2014-2364 - http://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html +CVE-2014-2382 - http://packetstormsecurity.com/files/129172/Faronics-Deep-Freeze-Arbitrary-Code-Execution.html +CVE-2014-2383 - https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce +CVE-2014-2384 - http://seclists.org/fulldisclosure/2014/Apr/163 +CVE-2014-2385 - http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html +CVE-2014-2388 - http://packetstormsecurity.com/files/127850 +CVE-2014-2388 - http://packetstormsecurity.com/files/127850/BlackBerry-Z10-Authentication-Bypass.html +CVE-2014-2388 - http://www.modzero.ch/advisories/MZ-13-04-Blackberry_Z10-File-Exchange-Authentication-By-Pass.txt +CVE-2014-2397 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2398 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2399 - http://packetstormsecurity.com/files/127222/Endeca-Latitude-2.2.2-Cross-Site-Request-Forgery.html +CVE-2014-2399 - http://seclists.org/fulldisclosure/2014/Jun/123 +CVE-2014-2399 - http://www.exploit-db.com/exploits/33897 +CVE-2014-2399 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2400 - http://packetstormsecurity.com/files/127223/Endeca-Latitude-2.2.2-Cross-Site-Scripting.html +CVE-2014-2400 - http://seclists.org/fulldisclosure/2014/Jun/124 +CVE-2014-2400 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2401 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2402 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2403 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2404 - http://packetstormsecurity.com/files/127047/Oracle-Access-Manager-Information-Disclosure.html +CVE-2014-2404 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2406 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2407 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2408 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2409 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2410 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2411 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2412 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2413 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2414 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2415 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2416 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2417 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2418 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2419 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2419 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2420 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2421 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2422 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2423 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2424 - http://packetstormsecurity.com/files/127365/Oracle-Event-Processing-FileUploadServlet-Arbitrary-File-Upload.html +CVE-2014-2424 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2425 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2426 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2427 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2428 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2429 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2430 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2430 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2431 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2431 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2432 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2432 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2433 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2434 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2435 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2436 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2436 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2437 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2438 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2439 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2440 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2440 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2441 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2442 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2443 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2444 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2445 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2446 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2447 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2448 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2449 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2450 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2451 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2452 - http://packetstormsecurity.com/files/127047/Oracle-Access-Manager-Information-Disclosure.html +CVE-2014-2452 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2453 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2454 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2455 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2456 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2456 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2456 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2457 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2458 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2459 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2460 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2461 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2463 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2464 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2465 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2466 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2467 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2468 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2470 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2471 - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html +CVE-2014-2472 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2473 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2474 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2475 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2476 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2477 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2477 - http://www.exploit-db.com/exploits/34333 +CVE-2014-2477 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2477 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2478 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2479 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2479 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2479 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2480 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2480 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2480 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2481 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2481 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2481 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2482 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2482 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2482 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2483 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2483 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2483 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2484 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2484 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2484 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2485 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2485 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2485 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2486 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2486 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2486 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2487 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2487 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2487 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2488 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2488 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2488 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2489 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2489 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2489 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2490 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2490 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2490 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2491 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2491 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2491 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2492 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2492 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2492 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2493 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2493 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2493 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2494 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2494 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2494 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2494 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2495 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2495 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2495 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2496 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-2496 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-2496 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-2497 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-2497 - https://bugs.php.net/bug.php?id=66901 +CVE-2014-2497 - https://bugzilla.redhat.com/show_bug.cgi?id=1076676 +CVE-2014-2502 - http://packetstormsecurity.com/files/126897/RSA-Adaptive-Authentication-Cross-Site-Scripting.html +CVE-2014-2503 - http://packetstormsecurity.com/files/126947/EMC-Documentum-Digital-Asset-Manager-Blind-DQL-Injection.html +CVE-2014-2506 - http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html +CVE-2014-2507 - http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html +CVE-2014-2508 - http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html +CVE-2014-2509 - http://packetstormsecurity.com/files/127301/EMC-Network-Configuration-Manager-NCM-Session-Fixation.html +CVE-2014-2512 - http://packetstormsecurity.com/files/127309/EMC-Documentum-eRoom-Cross-Site-Scripting.html +CVE-2014-2512 - http://packetstormsecurity.com/files/127321/EMC-Documentum-eRoom-Stored-Cross-Site-Scripting.html +CVE-2014-2512 - http://seclists.org/fulldisclosure/2014/Jul/0 +CVE-2014-2526 - http://packetstormsecurity.com/files/125766 +CVE-2014-2531 - http://www.exploit-db.com/exploits/32516 +CVE-2014-2532 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2014-2532 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-2532 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-2533 - http://seclists.org/bugtraq/2014/Mar/66 +CVE-2014-2533 - http://seclists.org/fulldisclosure/2014/Mar/98 +CVE-2014-2533 - https://www.exploit-db.com/exploits/45575/ +CVE-2014-2534 - http://seclists.org/bugtraq/2014/Mar/66 +CVE-2014-2534 - http://seclists.org/fulldisclosure/2014/Mar/98 +CVE-2014-2540 - http://www.exploit-db.com/exploits/32792 +CVE-2014-2541 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-2542 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-2543 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-2544 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-2545 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-2550 - https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/ +CVE-2014-2558 - http://seclists.org/fulldisclosure/2014/Apr/305 +CVE-2014-2559 - http://packetstormsecurity.com/files/126134 +CVE-2014-2559 - http://seclists.org/fulldisclosure/2014/Apr/172 +CVE-2014-2559 - https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 +CVE-2014-2560 - https://seclists.org/bugtraq/2014/Mar/185 +CVE-2014-2570 - http://codalabs.net/cla-2014-001 +CVE-2014-2575 - http://packetstormsecurity.com/files/126953/DevExpress-ASP.NET-File-Manager-13.2.8-Directory-Traversal.html +CVE-2014-2575 - http://seclists.org/fulldisclosure/2014/Jun/24 +CVE-2014-2575 - http://www.exploit-db.com/exploits/33700 +CVE-2014-2575 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-006/-directory-traversal-in-devexpress-asp-net-file-manager +CVE-2014-2577 - http://packetstormsecurity.com/files/126907/Transform-Foundation-Server-4.3.1-5.2-Cross-Site-Scripting.html +CVE-2014-2577 - http://seclists.org/fulldisclosure/2014/Jun/15 +CVE-2014-2586 - http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html +CVE-2014-2587 - http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html +CVE-2014-2588 - http://packetstormsecurity.com/files/125775/McAfee-Cloud-SSO-Asset-Manager-Issues.html +CVE-2014-2589 - http://www.vulnerability-lab.com/get_content.php?id=1100 +CVE-2014-2595 - http://packetstormsecurity.com/files/127740/Barracuda-WAF-Authentication-Bypass.html +CVE-2014-2595 - http://seclists.org/fulldisclosure/2014/Aug/5 +CVE-2014-2595 - https://www.exploit-db.com/exploits/39278 +CVE-2014-2598 - http://packetstormsecurity.com/files/126127 +CVE-2014-2598 - http://seclists.org/fulldisclosure/2014/Apr/171 +CVE-2014-2598 - http://www.exploit-db.com/exploits/32867 +CVE-2014-2598 - https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/ +CVE-2014-2623 - http://packetstormsecurity.com/files/130658/HP-Data-Protector-8.10-Remote-Command-Execution.html +CVE-2014-2623 - http://www.exploit-db.com/exploits/34066/ +CVE-2014-2623 - http://www.exploit-db.com/exploits/36304 +CVE-2014-2630 - http://packetstormsecurity.com/files/156206/xglance-bin-Local-Root-Privilege-Escalation.html +CVE-2014-2630 - http://packetstormsecurity.com/files/157528/HP-Performance-Monitoring-xglance-Privilege-Escalation.html +CVE-2014-2630 - http://seclists.org/fulldisclosure/2020/Feb/1 +CVE-2014-2640 - http://www.kb.cert.org/vuls/id/125228 +CVE-2014-2647 - http://www.exploit-db.com/exploits/35076 +CVE-2014-2653 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-2665 - https://bugzilla.wikimedia.org/show_bug.cgi?id=62497 +CVE-2014-2668 - http://packetstormsecurity.com/files/125889 +CVE-2014-2669 - https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a +CVE-2014-2671 - http://packetstormsecurity.com/files/125834 +CVE-2014-2671 - http://www.exploit-db.com/exploits/32477/ +CVE-2014-2674 - https://security.dxw.com/advisories/end-user-exploitable-local-file-inclusion-vulnerability-in-ajax-pagination-twitter-style-1-1/ +CVE-2014-2675 - https://security.dxw.com/advisories/csrf-vulnerability-in-wp-html-sitemap-1-2/ +CVE-2014-2710 - http://packetstormsecurity.com/files/136731/Oliver-1.3.0-1.3.1-Cross-Site-Scripting.html +CVE-2014-2710 - http://seclists.org/fulldisclosure/2016/Apr/66 +CVE-2014-2716 - http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html +CVE-2014-2718 - http://packetstormsecurity.com/files/128904/ASUS-Router-Man-In-The-Middle.html +CVE-2014-2718 - http://seclists.org/fulldisclosure/2014/Oct/122 +CVE-2014-2721 - https://fortiguard.com/advisory/FG-IR-14-010 +CVE-2014-2722 - https://fortiguard.com/advisory/FG-IR-14-010 +CVE-2014-2723 - https://fortiguard.com/advisory/FG-IR-14-010 +CVE-2014-2729 - http://packetstormsecurity.com/files/126187/Ektron-CMS-8.7-Cross-Site-Scripting.html +CVE-2014-2734 - http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html +CVE-2014-2734 - http://seclists.org/fulldisclosure/2014/Apr/231 +CVE-2014-2734 - http://seclists.org/fulldisclosure/2014/May/13 +CVE-2014-2734 - https://gist.github.com/emboss/91696b56cd227c8a0c13 +CVE-2014-2734 - https://news.ycombinator.com/item?id=7601973 +CVE-2014-2734 - https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/ +CVE-2014-2815 - http://packetstormsecurity.com/files/164419/Microsoft-Office-OneNote-2007-Remote-Code-Execution.html +CVE-2014-2838 - http://seclists.org/fulldisclosure/2014/Mar/399 +CVE-2014-2838 - https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/ +CVE-2014-2839 - http://seclists.org/fulldisclosure/2014/Mar/399 +CVE-2014-2839 - https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/ +CVE-2014-2843 - http://www.christian-schneider.net/advisories/CVE-2014-2843.txt +CVE-2014-2844 - http://seclists.org/fulldisclosure/2014/Apr/223 +CVE-2014-2846 - http://seclists.org/fulldisclosure/2014/Apr/257 +CVE-2014-2859 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2860 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2861 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2862 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2863 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2864 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2865 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2866 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2867 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2868 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2869 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2870 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2871 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2872 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2873 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2874 - http://www.kb.cert.org/vuls/id/437385 +CVE-2014-2879 - http://seclists.org/fulldisclosure/2014/Mar/409 +CVE-2014-2879 - http://www.vulnerability-lab.com/get_content.php?id=1191 +CVE-2014-2880 - http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html +CVE-2014-2880 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-2906 - https://github.com/fish-shell/fish-shell/issues/1437 +CVE-2014-2908 - https://www.exploit-db.com/exploits/44687/ +CVE-2014-2913 - http://seclists.org/fulldisclosure/2014/Apr/240 +CVE-2014-2913 - http://seclists.org/fulldisclosure/2014/Apr/242 +CVE-2014-2921 - https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt +CVE-2014-2922 - https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt +CVE-2014-2925 - http://seclists.org/fulldisclosure/2014/Apr/59 +CVE-2014-2926 - http://www.kb.cert.org/vuls/id/204988 +CVE-2014-2938 - http://www.kb.cert.org/vuls/id/767044 +CVE-2014-2939 - http://www.kb.cert.org/vuls/id/537684 +CVE-2014-2940 - http://www.kb.cert.org/vuls/id/460687 +CVE-2014-2941 - http://www.kb.cert.org/vuls/id/269991 +CVE-2014-2942 - http://www.kb.cert.org/vuls/id/882207 +CVE-2014-2946 - http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html +CVE-2014-2946 - http://www.kb.cert.org/vuls/id/325636 +CVE-2014-2947 - http://www.kb.cert.org/vuls/id/112412 +CVE-2014-2948 - http://www.kb.cert.org/vuls/id/112412 +CVE-2014-2950 - http://www.kb.cert.org/vuls/id/917348 +CVE-2014-2951 - http://www.kb.cert.org/vuls/id/917348 +CVE-2014-2956 - http://www.kb.cert.org/vuls/id/960193 +CVE-2014-2957 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2014-2962 - http://www.kb.cert.org/vuls/id/774788 +CVE-2014-2962 - https://www.exploit-db.com/exploits/38488/ +CVE-2014-2963 - http://www.kb.cert.org/vuls/id/100972 +CVE-2014-2964 - http://www.kb.cert.org/vuls/id/882207 +CVE-2014-2965 - http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html +CVE-2014-2965 - http://seclists.org/fulldisclosure/2014/Jun/113 +CVE-2014-2966 - http://www.kb.cert.org/vuls/id/162308 +CVE-2014-2968 - http://www.kb.cert.org/vuls/id/688812 +CVE-2014-2969 - http://www.kb.cert.org/vuls/id/143740 +CVE-2014-2974 - http://www.kb.cert.org/vuls/id/867980 +CVE-2014-2975 - http://www.kb.cert.org/vuls/id/867980 +CVE-2014-2994 - http://an7isec.blogspot.co.il/2014/04/pown-noobs-acunetix-0day.html +CVE-2014-2994 - http://osandamalith.wordpress.com/2014/04/24/pwning-script-kiddies-acunetix-buffer-overflow/ +CVE-2014-2994 - http://packetstormsecurity.com/files/126306/Acunetix-8-Stack-Buffer-Overflow.html +CVE-2014-2994 - http://packetstormsecurity.com/files/126307/Acunetix-8-Scanner-Buffer-Overflow.html +CVE-2014-2994 - http://www.exploit-db.com/exploits/32997 +CVE-2014-2994 - https://www.youtube.com/watch?v=RHaMx8K1GeM +CVE-2014-2995 - http://packetstormsecurity.com/files/126134 +CVE-2014-2995 - http://seclists.org/fulldisclosure/2014/Apr/172 +CVE-2014-2995 - https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 +CVE-2014-3004 - http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html +CVE-2014-3004 - http://seclists.org/fulldisclosure/2014/May/142 +CVE-2014-3004 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2014-3004 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2014-3005 - https://support.zabbix.com/browse/ZBX-8151 +CVE-2014-3065 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-3074 - http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html +CVE-2014-3080 - http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html +CVE-2014-3080 - http://seclists.org/fulldisclosure/2014/Jul/113 +CVE-2014-3080 - http://www.exploit-db.com/exploits/34132/ +CVE-2014-3080 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983 +CVE-2014-3081 - http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html +CVE-2014-3081 - http://seclists.org/fulldisclosure/2014/Jul/113 +CVE-2014-3081 - http://www.exploit-db.com/exploits/34132/ +CVE-2014-3081 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983 +CVE-2014-3085 - http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html +CVE-2014-3085 - http://www.exploit-db.com/exploits/34132/ +CVE-2014-3085 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983 +CVE-2014-3088 - http://packetstormsecurity.com/files/127294 +CVE-2014-3088 - http://packetstormsecurity.com/files/127829/IBM-Sametime-Meet-Server-8.5-Arbitrary-File-Upload.html +CVE-2014-3094 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT02593 +CVE-2014-3100 - http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html +CVE-2014-3100 - http://www.slideshare.net/ibmsecurity/android-keystorestackbufferoverflow +CVE-2014-3110 - https://www.exploit-db.com/exploits/44749/ +CVE-2014-3111 - http://seclists.org/fulldisclosure/2014/May/60 +CVE-2014-3115 - http://www.kb.cert.org/vuls/id/902790 +CVE-2014-3120 - https://www.elastic.co/blog/logstash-1-4-3-released +CVE-2014-3120 - https://www.elastic.co/community/security/ +CVE-2014-3127 - http://seclists.org/oss-sec/2014/q2/191 +CVE-2014-3127 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306 +CVE-2014-3135 - http://packetstormsecurity.com/files/126226/vBulletin-5.1-Cross-Site-Scripting.html +CVE-2014-3136 - https://packetstormsecurity.com/files/cve/CVE-2014-3136 +CVE-2014-3138 - http://packetstormsecurity.com/files/126171/Xerox-DocuShare-SQL-Injection.html +CVE-2014-3144 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05ab8f2647e4221cbdb3856dd7d32bd5407316b3 +CVE-2014-3144 - https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 +CVE-2014-3145 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05ab8f2647e4221cbdb3856dd7d32bd5407316b3 +CVE-2014-3145 - https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 +CVE-2014-3146 - http://seclists.org/fulldisclosure/2014/Apr/210 +CVE-2014-3146 - http://seclists.org/fulldisclosure/2014/Apr/319 +CVE-2014-3148 - http://packetstormsecurity.com/files/128338/OKCupid-Cross-Site-Scripting.html +CVE-2014-3149 - http://packetstormsecurity.com/files/127328/IP.Board-3.4.x-3.3.x-Cross-Site-Scripting.html +CVE-2014-3149 - http://www.christian-schneider.net/advisories/CVE-2014-3149.txt +CVE-2014-3158 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-3182 - https://code.google.com/p/google-security-research/issues/detail?id=89 +CVE-2014-3187 - https://medium.com/section-9-lab/abusing-ios-url-handlers-on-messages-96979e8b12f5 +CVE-2014-3205 - https://www.exploit-db.com/exploits/33159/ +CVE-2014-3206 - https://www.exploit-db.com/exploits/33159/ +CVE-2014-3207 - https://bugzilla.mozilla.org/show_bug.cgi?id=952077 +CVE-2014-3210 - http://packetstormsecurity.com/files/126762/WordPress-Booking-System-SQL-Injection.html +CVE-2014-3215 - http://openwall.com/lists/oss-security/2014/05/08/1 +CVE-2014-3215 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-3216 - http://www.exploit-db.com/exploits/33335 +CVE-2014-3220 - http://seclists.org/fulldisclosure/2014/May/16 +CVE-2014-3225 - http://packetstormsecurity.com/files/126553/Cobbler-Local-File-Inclusion.html +CVE-2014-3225 - http://www.exploit-db.com/exploits/33252 +CVE-2014-3227 - http://openwall.com/lists/oss-security/2014/04/29/4 +CVE-2014-3227 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306 +CVE-2014-3247 - http://www.exploit-db.com/exploits/33250 +CVE-2014-3248 - http://puppetlabs.com/security/cve/cve-2014-3248 +CVE-2014-3249 - http://puppetlabs.com/security/cve/cve-2014-3249 +CVE-2014-3250 - https://puppet.com/security/cve/CVE-2014-3250 +CVE-2014-3251 - http://puppetlabs.com/security/cve/cve-2014-3251 +CVE-2014-3289 - http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html +CVE-2014-3289 - http://seclists.org/fulldisclosure/2014/Jun/57 +CVE-2014-3306 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ciscosa-20140716-cm +CVE-2014-3414 - http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html +CVE-2014-3415 - http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html +CVE-2014-3416 - https://issues.jasig.org/browse/UP-4105 +CVE-2014-3417 - https://issues.jasig.org/browse/UP-4106 +CVE-2014-3418 - http://seclists.org/fulldisclosure/2014/Jul/35 +CVE-2014-3418 - http://www.exploit-db.com/exploits/34030 +CVE-2014-3419 - http://packetstormsecurity.com/files/127410/Infoblox-6.8.4.x-Weak-MySQL-Password.html +CVE-2014-3427 - http://packetstormsecurity.com/files/127081/Yealink-VoIP-Phones-XSS-CRLF-Injection.html +CVE-2014-3427 - http://seclists.org/fulldisclosure/2014/Jun/74 +CVE-2014-3428 - http://packetstormsecurity.com/files/127081/Yealink-VoIP-Phones-XSS-CRLF-Injection.html +CVE-2014-3428 - http://seclists.org/fulldisclosure/2014/Jun/74 +CVE-2014-3429 - https://github.com/ipython/ipython/pull/4845 +CVE-2014-3434 - http://packetstormsecurity.com/files/127772/Symantec-Endpoint-Protection-11.x-12.x-Kernel-Pool-Overflow.html +CVE-2014-3437 - http://seclists.org/fulldisclosure/2014/Nov/7 +CVE-2014-3438 - http://seclists.org/fulldisclosure/2014/Nov/7 +CVE-2014-3439 - http://seclists.org/fulldisclosure/2014/Nov/7 +CVE-2014-3441 - http://packetstormsecurity.com/files/126564/VLC-Player-2.1.3-Memory-Corruption.html +CVE-2014-3442 - http://packetstormsecurity.com/files/126636 +CVE-2014-3443 - http://www.exploit-db.com/exploits/33332 +CVE-2014-3444 - http://packetstormsecurity.com/files/126637 +CVE-2014-3445 - http://packetstormsecurity.com/files/126844/HandsomeWeb-SOS-Webpages-1.1.11-Backup-Hash-Disclosure.html +CVE-2014-3445 - http://seclists.org/fulldisclosure/2014/May/130 +CVE-2014-3447 - https://packetstormsecurity.com/files/126741/BSS-Continuity-CMS-4.2.22640.0-Denial-Of-Service.html +CVE-2014-3448 - http://packetstormsecurity.com/files/126740/BSS-Continuity-CMS-4.2.22640.0-Code-Execution.html +CVE-2014-3449 - http://packetstormsecurity.com/files/126739/BSS-Continuity-CMS-4.2.22640.0-Authentication-Bypass.html +CVE-2014-3451 - http://packetstormsecurity.com/files/131614/OpenFire-XMPP-3.9.3-Certificate-Handling.html +CVE-2014-3452 - http://packetstormsecurity.com/files/126613/klite1045-corrupt.txt +CVE-2014-3453 - http://seclists.org/fulldisclosure/2014/May/44 +CVE-2014-3470 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-3470 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 +CVE-2014-3470 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3470 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-3470 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-3470 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-3470 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html +CVE-2014-3470 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-3470 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 +CVE-2014-3474 - https://bugs.launchpad.net/horizon/+bug/1322197 +CVE-2014-3478 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3478 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3479 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3479 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3480 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3480 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3482 - https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J +CVE-2014-3482 - https://hackerone.com/reports/28449 +CVE-2014-3483 - https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J +CVE-2014-3483 - https://hackerone.com/reports/28450 +CVE-2014-3486 - https://bugzilla.redhat.com/show_bug.cgi?id=1107528 +CVE-2014-3487 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3487 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3490 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2014-3496 - https://bugzilla.redhat.com/show_bug.cgi?id=1110470 +CVE-2014-3503 - http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html +CVE-2014-3504 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3505 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3506 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3507 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3508 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3509 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3510 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3511 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3512 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-3515 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3515 - https://hackerone.com/reports/28445 +CVE-2014-3517 - https://bugs.launchpad.net/nova/+bug/1325128 +CVE-2014-3519 - http://www.openwall.com/lists/oss-security/2014/06/24/16 +CVE-2014-3522 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3528 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3531 - https://github.com/theforeman/foreman/pull/1580 +CVE-2014-3532 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2014-3533 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2014-3538 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3538 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3538 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-3538 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3544 - http://osandamalith.wordpress.com/2014/07/25/moodle-2-7-persistent-xss/ +CVE-2014-3544 - http://packetstormsecurity.com/files/127624/Moodle-2.7-Cross-Site-Scripting.html +CVE-2014-3544 - http://www.exploit-db.com/exploits/34169 +CVE-2014-3558 - https://hibernate.atlassian.net/browse/HV-912 +CVE-2014-3564 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3565 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3566 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-3566 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2014-3566 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-3566 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-3566 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3566 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2014-3566 - https://github.com/mpgn/poodle-PoC +CVE-2014-3566 - https://www.elastic.co/blog/logstash-1-4-3-released +CVE-2014-3567 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-3567 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3569 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2014-3569 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-3569 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3569 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-3570 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2014-3570 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-3570 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3570 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-3571 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-3571 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3571 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-3572 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2014-3572 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-3572 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3572 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-3576 - http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html +CVE-2014-3576 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2014-3576 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-3577 - http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html +CVE-2014-3577 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-3577 - http://www.ubuntu.com/usn/USN-2769-1 +CVE-2014-3581 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-3581 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-3583 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-3583 - https://hackerone.com/reports/36264 +CVE-2014-3587 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3587 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3587 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-3587 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3587 - http://www.ubuntu.com/usn/USN-2344-1 +CVE-2014-3592 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3592 +CVE-2014-3596 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2014-3597 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3597 - http://www.ubuntu.com/usn/USN-2344-1 +CVE-2014-3597 - https://github.com/php/php-src/commit/2fefae47716d501aec41c1102f3fd4531f070b05 +CVE-2014-3601 - http://www.ubuntu.com/usn/USN-2358-1 +CVE-2014-3610 - http://www.ubuntu.com/usn/USN-2394-1 +CVE-2014-3611 - http://www.ubuntu.com/usn/USN-2394-1 +CVE-2014-3613 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3613 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3613 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3614 - http://seclists.org/oss-sec/2014/q3/589 +CVE-2014-3629 - http://packetstormsecurity.com/files/129034/Apache-Qpid-0.30-Induced-HTTP-Requests.html +CVE-2014-3630 - https://playframework.com/security/vulnerability/CVE-2014-3630-XmlExternalEntity +CVE-2014-3631 - http://www.exploit-db.com/exploits/36268 +CVE-2014-3634 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3635 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-3637 - http://www.openwall.com/lists/oss-security/2019/06/24/13 +CVE-2014-3637 - http://www.openwall.com/lists/oss-security/2019/06/24/14 +CVE-2014-3643 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2014-3646 - http://www.ubuntu.com/usn/USN-2394-1 +CVE-2014-3647 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3647 - http://www.ubuntu.com/usn/USN-2394-1 +CVE-2014-3647 - https://bugzilla.redhat.com/show_bug.cgi?id=1144897 +CVE-2014-3660 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3660 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-3665 - https://www.cloudbees.com/jenkins-security-advisory-2014-10-30 +CVE-2014-3668 - http://linux.oracle.com/errata/ELSA-2014-1768.html +CVE-2014-3668 - http://www.ubuntu.com/usn/USN-2391-1 +CVE-2014-3668 - https://hackerone.com/reports/104011 +CVE-2014-3669 - http://linux.oracle.com/errata/ELSA-2014-1768.html +CVE-2014-3669 - http://www.ubuntu.com/usn/USN-2391-1 +CVE-2014-3669 - https://bugs.php.net/bug.php?id=68044 +CVE-2014-3669 - https://hackerone.com/reports/104012 +CVE-2014-3670 - http://linux.oracle.com/errata/ELSA-2014-1768.html +CVE-2014-3670 - http://www.ubuntu.com/usn/USN-2391-1 +CVE-2014-3672 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-3683 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-3688 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 +CVE-2014-3690 - http://www.openwall.com/lists/oss-security/2014/10/21/4 +CVE-2014-3690 - http://www.openwall.com/lists/oss-security/2014/10/29/7 +CVE-2014-3703 - http://rhn.redhat.com/errata/RHSA-2014-1691.html +CVE-2014-3704 - http://packetstormsecurity.com/files/128720/Drupal-7.X-SQL-Injection.html +CVE-2014-3704 - http://packetstormsecurity.com/files/128721/Drupal-7.31-SQL-Injection.html +CVE-2014-3704 - http://packetstormsecurity.com/files/128741/Drupal-HTTP-Parameter-Key-Value-SQL-Injection.html +CVE-2014-3704 - http://seclists.org/fulldisclosure/2014/Oct/75 +CVE-2014-3704 - http://www.exploit-db.com/exploits/34984 +CVE-2014-3704 - http://www.exploit-db.com/exploits/34993 +CVE-2014-3704 - http://www.exploit-db.com/exploits/35150 +CVE-2014-3704 - http://www.openwall.com/lists/oss-security/2014/10/15/23 +CVE-2014-3704 - https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html +CVE-2014-3704 - https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html +CVE-2014-3707 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-3707 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-3707 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-3707 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3707 - https://hackerone.com/reports/104014 +CVE-2014-3710 - http://linux.oracle.com/errata/ELSA-2014-1768.html +CVE-2014-3710 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-3710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-3710 - http://www.ubuntu.com/usn/USN-2391-1 +CVE-2014-3710 - http://www.ubuntu.com/usn/USN-2494-1 +CVE-2014-3718 - http://packetstormsecurity.com/files/126654/Aleph-500-Cross-Site-Scripting.html +CVE-2014-3719 - http://packetstormsecurity.com/files/126635/Aleph-500-SQL-Injection.html +CVE-2014-3735 - http://packetstormsecurity.com/files/126640/Intel-Ideo-Video-4.5-Memory-Corruption.html +CVE-2014-3737 - http://packetstormsecurity.com/files/127221/Storesprite-7-Cross-Site-Scripting.html +CVE-2014-3738 - http://packetstormsecurity.com/files/127623/Zenoss-Monitoring-System-4.2.5-2108-Cross-Site-Scripting.html +CVE-2014-3738 - http://www.exploit-db.com/exploits/34165 +CVE-2014-3738 - http://www.openwall.com/lists/oss-security/2014/05/14/5 +CVE-2014-3739 - http://www.openwall.com/lists/oss-security/2014/05/14/5 +CVE-2014-3740 - http://packetstormsecurity.com/files/126596/SpiceWorks-7.2.00174-Cross-Site-Scripting.html +CVE-2014-3740 - http://packetstormsecurity.com/files/126994/SpiceWorks-IT-Ticketing-System-Cross-Site-Scripting.html +CVE-2014-3740 - http://seclists.org/fulldisclosure/2014/Jun/42 +CVE-2014-3740 - http://www.exploit-db.com/exploits/33330 +CVE-2014-3752 - http://packetstormsecurity.com/files/127227/G-Data-TotalProtection-2014-Code-Execution.html +CVE-2014-3753 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18986 +CVE-2014-3758 - http://seclists.org/fulldisclosure/2014/Apr/314 +CVE-2014-3759 - http://seclists.org/fulldisclosure/2014/Apr/314 +CVE-2014-3772 - https://github.com/nilsteampassnet/TeamPass/commit/7715512f2bd5659cc69e063a1c513c19e384340f +CVE-2014-3773 - https://github.com/nilsteampassnet/TeamPass/commit/7715512f2bd5659cc69e063a1c513c19e384340f +CVE-2014-3775 - http://www.ubuntu.com/usn/USN-2215-1 +CVE-2014-3777 - http://packetstormsecurity.com/files/127280/Reportico-Admin-Credential-Leak.html +CVE-2014-3778 - http://www.exploit-db.com/exploits/33792 +CVE-2014-3779 - http://packetstormsecurity.com/files/129803/ADSelfservice-Plus-5.1-Cross-Site-Scripting.html +CVE-2014-3781 - http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html +CVE-2014-3783 - http://packetstormsecurity.com/files/126768/Dotclear-2.6.2-SQL-Injection.html +CVE-2014-3786 - http://packetstormsecurity.com/files/126870/Pixie-CMS-1.04-Cross-Site-Scripting.html +CVE-2014-3791 - http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day +CVE-2014-3791 - http://packetstormsecurity.com/files/126614/Easy-File-Sharing-Web-Server-6.8-Buffer-Overflow.html +CVE-2014-3792 - http://packetstormsecurity.com/files/126426/Beetel-450TC2-Cross-Site-Request-Forgery.html +CVE-2014-3793 - http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html +CVE-2014-3797 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-3797 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-3803 - http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/ +CVE-2014-3804 - https://www.exploit-db.com/exploits/42708/ +CVE-2014-3805 - https://www.exploit-db.com/exploits/42709/ +CVE-2014-3806 - http://packetstormsecurity.com/files/126550/VM-Turbo-Operations-Manager-4.5.x-Directory-Traversal.html +CVE-2014-3807 - http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html +CVE-2014-3810 - http://packetstormsecurity.com/files/127148/Dolphin-7.1.4-SQL-Injection.html +CVE-2014-3826 - http://adamziaja.com/poc/201312-xss-mybb.html +CVE-2014-3827 - https://adamziaja.com/poc/201312-xss-mybb.html +CVE-2014-3828 - http://seclists.org/fulldisclosure/2014/Oct/78 +CVE-2014-3828 - http://www.kb.cert.org/vuls/id/298796 +CVE-2014-3829 - http://seclists.org/fulldisclosure/2014/Oct/78 +CVE-2014-3829 - http://www.kb.cert.org/vuls/id/298796 +CVE-2014-3830 - http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-3840 - http://www.exploit-db.com/exploits/33493 +CVE-2014-3842 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html +CVE-2014-3842 - http://seclists.org/fulldisclosure/2014/Apr/265 +CVE-2014-3842 - http://www.exploit-db.com/exploits/33076 +CVE-2014-3846 - http://packetstormsecurity.com/files/126735/flyingcart-xss.txt +CVE-2014-3848 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html +CVE-2014-3848 - http://seclists.org/fulldisclosure/2014/Apr/265 +CVE-2014-3848 - http://www.exploit-db.com/exploits/33076 +CVE-2014-3849 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html +CVE-2014-3849 - http://seclists.org/fulldisclosure/2014/Apr/265 +CVE-2014-3849 - http://www.exploit-db.com/exploits/33076 +CVE-2014-3850 - http://seclists.org/fulldisclosure/2014/Jun/63 +CVE-2014-3850 - https://security.dxw.com/advisories/csrf-in-member-approval-131109-permits-unapproved-registrations +CVE-2014-3851 - http://www.openwall.com/lists/oss-security/2014/05/14/3 +CVE-2014-3851 - http://www.openwall.com/lists/oss-security/2014/05/23/1 +CVE-2014-3852 - http://www.openwall.com/lists/oss-security/2014/05/14/3 +CVE-2014-3852 - http://www.openwall.com/lists/oss-security/2014/05/23/1 +CVE-2014-3853 - http://www.openwall.com/lists/oss-security/2014/05/14/3 +CVE-2014-3853 - http://www.openwall.com/lists/oss-security/2014/05/23/1 +CVE-2014-3854 - http://www.openwall.com/lists/oss-security/2014/05/14/3 +CVE-2014-3854 - http://www.openwall.com/lists/oss-security/2014/05/23/1 +CVE-2014-3855 - http://www.openwall.com/lists/oss-security/2014/05/14/3 +CVE-2014-3855 - http://www.openwall.com/lists/oss-security/2014/05/23/1 +CVE-2014-3856 - https://github.com/fish-shell/fish-shell/issues/1437 +CVE-2014-3857 - http://fereidani.com/articles/show/76_kerio_control_8_3_1_boolean_based_blind_sql_injection +CVE-2014-3857 - http://packetstormsecurity.com/files/127320/Kerio-Control-8.3.1-Blind-SQL-Injection.html +CVE-2014-3857 - http://www.exploit-db.com/exploits/33954 +CVE-2014-3860 - http://packetstormsecurity.com/files/126882/Xilisoft-Video-Converter-Ultimate-7.8.1-build-20140505-DLL-Hijacking.html +CVE-2014-3863 - http://packetstormsecurity.com/files/127372/Joomla-JChatSocial-2.2-Cross-Site-Scripting.html +CVE-2014-3864 - http://openwall.com/lists/oss-security/2014/05/25/2 +CVE-2014-3864 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746498 +CVE-2014-3865 - http://openwall.com/lists/oss-security/2014/05/25/2 +CVE-2014-3868 - http://packetstormsecurity.com/files/127196/ZeusCart-4.x-Remote-SQL-Injection.html +CVE-2014-3868 - http://seclists.org/fulldisclosure/2014/Jun/116 +CVE-2014-3868 - https://github.com/ZeusCart/zeuscart/pull/23 +CVE-2014-3870 - http://packetstormsecurity.com/files/126782/wpbib2html-xss.txt +CVE-2014-3871 - http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html +CVE-2014-3875 - http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html +CVE-2014-3875 - http://seclists.org/fulldisclosure/2014/Jun/1 +CVE-2014-3876 - http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html +CVE-2014-3877 - http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html +CVE-2014-3878 - http://packetstormsecurity.com/files/126948/IPSwitch-IMail-12.4-Cross-Site-Scripting.html +CVE-2014-3878 - http://seclists.org/fulldisclosure/2014/Jun/19 +CVE-2014-3878 - http://www.exploit-db.com/exploits/33633 +CVE-2014-3888 - http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html +CVE-2014-3903 - https://wpvulndb.com/vulnerabilities/7534 +CVE-2014-3913 - http://packetstormsecurity.com/files/127152/Ericom-AccessNow-Server-Buffer-Overflow.html +CVE-2014-3917 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-3921 - http://packetstormsecurity.com/files/126763/WordPress-Simple-Popup-Cross-Site-Scripting.html +CVE-2014-3922 - http://packetstormsecurity.com/files/126847/InterScan-Messaging-Security-Virtual-Appliance-8.5.1.1516-Cross-Site-Scripting.html +CVE-2014-3922 - http://seclists.org/fulldisclosure/2014/May/164 +CVE-2014-3928 - https://github.com/Cougar/lg/issues/4 +CVE-2014-3934 - http://packetstormsecurity.com/files/126803/phpnuke83news-sql.txt +CVE-2014-3935 - http://packetstormsecurity.com/files/126701 +CVE-2014-3936 - http://packetstormsecurity.com/files/127427/D-Link-HNAP-Request-Remote-Buffer-Overflow.html +CVE-2014-3936 - http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug +CVE-2014-3956 - http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html +CVE-2014-3961 - http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html +CVE-2014-3962 - http://packetstormsecurity.com/files/126866/Videos-Tube-1.0-SQL-Injection.html +CVE-2014-3974 - http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2014-3975 - http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2014-3976 - http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html +CVE-2014-3976 - http://seclists.org/fulldisclosure/2014/Apr/16 +CVE-2014-3976 - http://www.exploit-db.com/exploits/32702 +CVE-2014-3977 - http://packetstormsecurity.com/files/127067/IBM-AIX-6.1.8-Privilege-Escalation.html +CVE-2014-3978 - http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-3981 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-3990 - http://packetstormsecurity.com/files/127460/OpenCart-1.5.6.4-PHP-Object-Injection.html +CVE-2014-3991 - http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html +CVE-2014-3992 - http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html +CVE-2014-3996 - http://packetstormsecurity.com/files/127973/ManageEngine-Password-Manager-MetadataServlet.dat-SQL-Injection.html +CVE-2014-3996 - http://seclists.org/fulldisclosure/2014/Aug/55 +CVE-2014-3996 - http://seclists.org/fulldisclosure/2014/Aug/85 +CVE-2014-3997 - http://seclists.org/fulldisclosure/2014/Aug/55 +CVE-2014-3997 - http://seclists.org/fulldisclosure/2014/Aug/85 +CVE-2014-4003 - http://packetstormsecurity.com/files/126986/SAP-SLD-Information-Tampering.html +CVE-2014-4014 - http://www.exploit-db.com/exploits/33824 +CVE-2014-4017 - http://packetstormsecurity.com/files/126781/WordPress-Conversion-Ninja-Cross-Site-Scripting.html +CVE-2014-4018 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html +CVE-2014-4018 - http://www.exploit-db.com/exploits/33803 +CVE-2014-4018 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ +CVE-2014-4019 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html +CVE-2014-4019 - http://www.exploit-db.com/exploits/33803 +CVE-2014-4019 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ +CVE-2014-4027 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4030 - http://seclists.org/fulldisclosure/2014/Jun/64 +CVE-2014-4030 - https://security.dxw.com/advisories/jw-player-for-flash-html5-video/ +CVE-2014-4032 - http://packetstormsecurity.com/files/126856/Fiyo-CMS-1.5.7-Cross-Site-Scripting.html +CVE-2014-4033 - http://packetstormsecurity.com/files/127006/eFront-3.6.14.4-Cross-Site-Scripting.html +CVE-2014-4034 - http://packetstormsecurity.com/files/127005/ZeroCMS-1.0-SQL-Injection.html +CVE-2014-4034 - http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html +CVE-2014-4034 - http://seclists.org/fulldisclosure/2015/Feb/4 +CVE-2014-4034 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5186.php +CVE-2014-4035 - http://packetstormsecurity.com/files/126949/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html +CVE-2014-4035 - http://packetstormsecurity.com/files/154024/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html +CVE-2014-4036 - http://packetstormsecurity.com/files/126909/ImpressCMS-1.3.6.1-Cross-Site-Scripting.html +CVE-2014-4037 - http://packetstormsecurity.com/files/126902/FCKeditor-2.6.10-Cross-Site-Scripting.html +CVE-2014-4043 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2014-4043 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2014-4043 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2014-4043 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2014-4043 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2014-4043 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2014-4045 - http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html +CVE-2014-4046 - http://packetstormsecurity.com/files/127088/Asterisk-Project-Security-Advisory-AST-2014-006.html +CVE-2014-4047 - http://packetstormsecurity.com/files/127089/Asterisk-Project-Security-Advisory-AST-2014-007.html +CVE-2014-4048 - http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html +CVE-2014-4049 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-4076 - http://www.exploit-db.com/exploits/35936 +CVE-2014-4076 - https://www.exploit-db.com/exploits/37755/ +CVE-2014-4101 - http://www.securityfocus.com/bid/69609 +CVE-2014-4113 - http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html +CVE-2014-4113 - https://www.exploit-db.com/exploits/37064/ +CVE-2014-4113 - https://www.exploit-db.com/exploits/39666/ +CVE-2014-4114 - http://www.exploit-db.com/exploits/35019 +CVE-2014-4114 - http://www.exploit-db.com/exploits/35055 +CVE-2014-4138 - http://blog.skylined.nl/20161221001.html +CVE-2014-4138 - http://packetstormsecurity.com/files/140258/Microsoft-Internet-Explorer-11-MSHTML-CPasteCommand-ConvertBitmaptoPng-Buffer-Overflow.html +CVE-2014-4138 - https://www.exploit-db.com/exploits/40960/ +CVE-2014-4141 - https://www.exploit-db.com/exploits/40685/ +CVE-2014-4154 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html +CVE-2014-4154 - http://www.exploit-db.com/exploits/33803 +CVE-2014-4154 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ +CVE-2014-4155 - http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html +CVE-2014-4155 - http://www.exploit-db.com/exploits/33803 +CVE-2014-4155 - https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities +CVE-2014-4158 - http://packetstormsecurity.com/files/126332/Kolibri-2.0-Stack-Buffer-Overflow.html +CVE-2014-4162 - http://packetstormsecurity.com/files/126812/Zyxel-P-660HW-T1-Cross-Site-Request-Forgery.html +CVE-2014-4163 - http://seclists.org/fulldisclosure/2014/Jun/62 +CVE-2014-4164 - http://packetstormsecurity.com/files/127001/AlogoSec-FireFlow-6.3-Cross-Site-Scripting.html +CVE-2014-4165 - http://packetstormsecurity.com/files/127043/ntop-xss.txt +CVE-2014-4166 - http://packetstormsecurity.com/files/127074/SHOUTcast-DNAS-2.2.1-Cross-Site-Scripting.html +CVE-2014-4166 - http://www.exploit-db.com/exploits/33714 +CVE-2014-4170 - http://packetstormsecurity.com/files/127701/Free-Reprintables-ArticleFR-11.06.2014-Improper-Access-Control.html +CVE-2014-4171 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4172 - https://issues.jasig.org/browse/CASC-228 +CVE-2014-4187 - http://packetstormsecurity.com/files/127098/ClipBucket-CMS-Cross-Site-Scripting.html +CVE-2014-4194 - http://packetstormsecurity.com/files/127164/ZeroCMS-1.0-SQL-Injection.html +CVE-2014-4195 - http://packetstormsecurity.com/files/127262/ZeroCMS-1.0-Cross-Site-Scripting.html +CVE-2014-4196 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt +CVE-2014-4197 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt +CVE-2014-4198 - https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt +CVE-2014-4199 - http://seclists.org/fulldisclosure/2014/Aug/71 +CVE-2014-4200 - http://seclists.org/fulldisclosure/2014/Aug/71 +CVE-2014-4201 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4201 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4201 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4202 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4202 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4202 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4203 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4203 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4203 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4204 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4204 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4204 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4205 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4205 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4205 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4206 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4206 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4206 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4207 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4207 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-4207 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4207 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4208 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4208 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4208 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4209 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4209 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4209 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4210 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4210 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4210 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4211 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4211 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4211 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4212 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4212 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-4212 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4212 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4213 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4213 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4213 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4214 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4214 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4214 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4215 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4215 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4215 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4216 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4216 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4216 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4217 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4217 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4217 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4218 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4218 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4218 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4219 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4219 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4219 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4220 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4220 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4220 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4221 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4221 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4221 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4222 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4222 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4222 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4223 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4223 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4223 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4224 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4224 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4224 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4225 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4225 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4225 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4226 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4226 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4226 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4227 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4227 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4227 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4228 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4228 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4228 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4229 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4229 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4229 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4230 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4230 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4230 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4231 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4231 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4231 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4232 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4232 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4232 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4233 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4233 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4233 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4234 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4234 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4234 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4235 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4235 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4235 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4236 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4236 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4236 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4237 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4237 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4237 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4238 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4238 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4238 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4239 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4239 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4239 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4240 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4240 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4240 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4241 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4241 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4241 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4242 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4242 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4242 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4243 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4243 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-4243 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4243 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4244 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4244 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4244 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4244 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 +CVE-2014-4245 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4245 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4245 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4246 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4246 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4246 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4247 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4247 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4247 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4248 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4248 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4248 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4249 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4249 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4249 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4250 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4250 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4250 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4251 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4251 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4251 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4252 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4252 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4252 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4253 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4253 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4253 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4254 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4254 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4254 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4255 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4255 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4255 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4256 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4256 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4256 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4257 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4257 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4257 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4258 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4258 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-4258 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4258 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4259 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-4260 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4260 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-4260 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4260 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4261 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4261 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4261 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4262 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4262 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4262 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4263 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4263 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4263 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4263 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 +CVE-2014-4264 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4264 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4264 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4264 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 +CVE-2014-4265 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4265 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4265 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4266 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4266 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4266 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4267 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4267 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4267 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4268 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4268 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4268 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4269 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4269 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4269 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4270 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4270 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4270 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4271 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-4271 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html +CVE-2014-4271 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-4271 - https://exchange.xforce.ibmcloud.com/vulnerabilities/94562 +CVE-2014-4274 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-4274 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4275 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4276 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4277 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4278 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4279 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-4280 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4281 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4282 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4283 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4284 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4285 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4287 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-4287 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4288 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-4288 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4289 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4290 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4291 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4292 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4293 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4294 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4295 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4296 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4297 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4298 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4299 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4300 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4301 - https://www.netsparker.com/critical-xss-vulnerabilities-in-ajenti +CVE-2014-4302 - http://packetstormsecurity.com/files/127050/HAM3D-Shop-Engine-CMS-Cross-Site-Scripting.html +CVE-2014-4304 - https://www.netsparker.com/critical-xss-vulnerability-in-sql-buddy +CVE-2014-4305 - http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html +CVE-2014-4306 - http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html +CVE-2014-4307 - http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html +CVE-2014-4308 - http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html +CVE-2014-4309 - http://packetstormsecurity.com/files/127044/Openfiler-NAS-SAN-Appliance-2.99-XSS-Traversal-Command-Injection.html +CVE-2014-4310 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-4311 - http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html +CVE-2014-4311 - http://seclists.org/fulldisclosure/2014/Oct/2 +CVE-2014-4312 - http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html +CVE-2014-4312 - http://seclists.org/fulldisclosure/2014/Oct/2 +CVE-2014-4313 - http://packetstormsecurity.com/files/128564/Epicor-Procurement-SQL-Injection.html +CVE-2014-4326 - https://www.elastic.co/community/security/ +CVE-2014-4329 - http://packetstormsecurity.com/files/127329/Ntop-NG-1.1-Cross-Site-Scripting.html +CVE-2014-4330 - http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html +CVE-2014-4330 - http://seclists.org/fulldisclosure/2014/Sep/84 +CVE-2014-4330 - http://seclists.org/oss-sec/2014/q3/692 +CVE-2014-4331 - http://packetstormsecurity.com/files/127404/OctavoCMS-Cross-Site-Scripting.html +CVE-2014-4334 - http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html +CVE-2014-4334 - http://www.exploit-db.com/exploits/33804 +CVE-2014-4334 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5187.php +CVE-2014-4335 - http://packetstormsecurity.com/files/127128/BarracudaDrive-6.7.2-Cross-Site-Scripting.html +CVE-2014-4341 - https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 +CVE-2014-4342 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-4342 - https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 +CVE-2014-4343 - https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f +CVE-2014-4344 - https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b +CVE-2014-4344 - https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc +CVE-2014-4345 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt +CVE-2014-4345 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-4345 - https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1 +CVE-2014-4346 - http://seclists.org/fulldisclosure/2014/Jul/77 +CVE-2014-4347 - http://seclists.org/fulldisclosure/2014/Jul/77 +CVE-2014-4395 - https://code.google.com/p/google-security-research/issues/detail?id=29 +CVE-2014-4402 - https://code.google.com/p/google-security-research/issues/detail?id=33 +CVE-2014-4406 - http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html +CVE-2014-4492 - http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html +CVE-2014-4498 - https://trmm.net/Thunderstrike +CVE-2014-4511 - http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ +CVE-2014-4511 - http://packetstormsecurity.com/files/127281/Gitlist-0.4.0-Remote-Code-Execution.html +CVE-2014-4511 - http://packetstormsecurity.com/files/127364/Gitlist-Unauthenticated-Remote-Command-Execution.html +CVE-2014-4511 - http://www.exploit-db.com/exploits/33990 +CVE-2014-4514 - http://codevigilant.com/disclosure/wp-plugin-alipay-a3-cross-site-scripting-xss +CVE-2014-4515 - http://codevigilant.com/disclosure/wp-plugin-anyfont-a3-cross-site-scripting-xss +CVE-2014-4516 - http://codevigilant.com/disclosure/wp-plugin-bic-media-a3-cross-site-scripting-xss +CVE-2014-4519 - http://codevigilant.com/disclosure/wp-plugin-conversador-a3-cross-site-scripting-xss +CVE-2014-4520 - http://codevigilant.com/disclosure/wp-plugin-dmca-watermarker-a3-cross-site-scripting-xss +CVE-2014-4523 - http://codevigilant.com/disclosure/wp-plugin-easy-career-openings-a3-cross-site-scripting-xss +CVE-2014-4524 - http://codevigilant.com/disclosure/wp-plugin-easy-post-types-a3-cross-site-scripting-xss +CVE-2014-4526 - http://codevigilant.com/disclosure/wp-plugin-efence-a3-cross-site-scripting-xss +CVE-2014-4527 - http://codevigilant.com/disclosure/wp-plugin-envialosimple-email-marketing-y-newsletters-gratis-a3-cross-site-scripting-xss +CVE-2014-4528 - http://codevigilant.com/disclosure/wp-plugin-fbpromotions-a3-cross-site-scripting-xss +CVE-2014-4537 - http://codevigilant.com/disclosure/wp-plugin-keyword-strategy-internal-links-a3-cross-site-scripting-xss +CVE-2014-4538 - http://codevigilant.com/disclosure/wp-plugin-malware-finder-a3-cross-site-scripting-xss +CVE-2014-4540 - http://codevigilant.com/disclosure/wp-plugin-oleggo-livestream-a3-cross-site-scripting-xss +CVE-2014-4541 - http://codevigilant.com/disclosure/wp-plugin-omfg-mobile-a3-cross-site-scripting-xss +CVE-2014-4547 - http://codevigilant.com/disclosure/wp-plugin-rezgo-online-booking-a3-cross-site-scripting-xss +CVE-2014-4554 - http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss +CVE-2014-4557 - http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-jigoshop-a3-cross-site-scripting-xss +CVE-2014-4558 - http://codevigilant.com/disclosure/wp-plugin-swipehq-payment-gateway-woocommerce-a3-cross-site-scripting-xss +CVE-2014-4574 - http://codevigilant.com/disclosure/wp-plugin-webengage-a3-cross-site-scripting-xss +CVE-2014-4604 - http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss +CVE-2014-4611 - https://hackerone.com/reports/17688 +CVE-2014-4613 - http://packetstormsecurity.com/files/125438/Piwigo-2.6.1-Cross-Site-Request-Forgery.html +CVE-2014-4616 - https://hackerone.com/reports/12297 +CVE-2014-4617 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-4619 - http://packetstormsecurity.com/files/128005/RSA-Identity-Management-And-Governance-Authentication-Bypass.html +CVE-2014-4620 - http://packetstormsecurity.com/files/128841/EMC-NetWorker-Module-For-MEDITECH-NMMEDI-Information-Disclosure.html +CVE-2014-4623 - http://packetstormsecurity.com/files/128842/EMC-Avamar-Weak-Password-Storage.html +CVE-2014-4624 - http://packetstormsecurity.com/files/128843/EMC-Avamar-Sensitive-Information-Disclosure.html +CVE-2014-4624 - http://packetstormsecurity.com/files/128850/VMware-Security-Advisory-2014-0011.html +CVE-2014-4626 - http://www.kb.cert.org/vuls/id/315340 +CVE-2014-4626 - https://docs.google.com/spreadsheets/d/1DiiUPCPvmaliWcfwPSc36y2mDvuidkDKQBWqaIuJi0A/edit?usp=sharing +CVE-2014-4627 - http://packetstormsecurity.com/files/128986/RSA-Web-Threat-Detection-SQL-Injection.html +CVE-2014-4629 - http://packetstormsecurity.com/files/129376/EMC-Documentum-Content-Server-Insecure-Direct-Object-Reference.html +CVE-2014-4635 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html +CVE-2014-4636 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html +CVE-2014-4637 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html +CVE-2014-4638 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html +CVE-2014-4639 - http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html +CVE-2014-4643 - http://packetstormsecurity.com/files/127075/Core-FTP-LE-2.2-Heap-Overflow.html +CVE-2014-4643 - http://www.exploit-db.com/exploits/33713 +CVE-2014-4652 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4653 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4654 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4655 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4656 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4663 - http://packetstormsecurity.com/files/127192/TimThumb-2.8.13-Remote-Code-Execution.html +CVE-2014-4663 - http://seclists.org/fulldisclosure/2014/Jul/4 +CVE-2014-4663 - http://seclists.org/fulldisclosure/2014/Jun/117 +CVE-2014-4663 - http://www.exploit-db.com/exploits/33851 +CVE-2014-4667 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-4669 - http://packetstormsecurity.com/files/127239/HP-Enterprise-Maps-1.00-Authenticated-XXE-Injection.html +CVE-2014-4670 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-4670 - https://bugs.php.net/bug.php?id=67538 +CVE-2014-4671 - http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/ +CVE-2014-4677 - https://bierbaumer.net/security/cve-2014-4677/ +CVE-2014-4688 - https://www.exploit-db.com/exploits/43560/ +CVE-2014-4698 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-4698 - https://bugs.php.net/bug.php?id=67539 +CVE-2014-4699 - http://openwall.com/lists/oss-security/2014/07/05/4 +CVE-2014-4699 - http://openwall.com/lists/oss-security/2014/07/08/16 +CVE-2014-4699 - http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html +CVE-2014-4699 - http://www.exploit-db.com/exploits/34134 +CVE-2014-4699 - http://www.openwall.com/lists/oss-security/2014/07/04/4 +CVE-2014-4701 - http://legalhackers.com/advisories/nagios-check_dhcp.txt +CVE-2014-4701 - http://seclists.org/fulldisclosure/2014/May/74 +CVE-2014-4701 - http://www.exploit-db.com/exploits/33387 +CVE-2014-4703 - http://seclists.org/fulldisclosure/2014/Jun/141 +CVE-2014-4710 - http://packetstormsecurity.com/files/127634/ZeroCMS-1.0-Cross-Site-Scripting.html +CVE-2014-4710 - https://community.qualys.com/blogs/securitylabs/2014/07/24/yet-another-zerocms-cross-site-scripting-vulnerability-cve-2014-4710 +CVE-2014-4716 - http://packetstormsecurity.com/files/127244/Thomson-TWG87OUIR-Cross-Site-Request-Forgery.html +CVE-2014-4717 - http://packetstormsecurity.com/files/127238/WordPress-Simple-Share-Buttons-Adder-4.4-CSRF-XSS.html +CVE-2014-4717 - http://seclists.org/fulldisclosure/2014/Jun/138 +CVE-2014-4717 - https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder +CVE-2014-4718 - http://packetstormsecurity.com/files/127188/Lunar-CMS-3.3-CSRF-Cross-Site-Scripting.html +CVE-2014-4718 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php +CVE-2014-4719 - http://packetstormsecurity.com/files/127177/User-Friendly-SVN-Cross-Site-Scripting.html +CVE-2014-4721 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-4721 - https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html +CVE-2014-4722 - http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scripting.html +CVE-2014-4723 - http://packetstormsecurity.com/files/127293/WordPress-Easy-Banners-1.4-Cross-Site-Scripting.html +CVE-2014-4724 - http://packetstormsecurity.com/files/127291/WordPress-Custom-Banners-1.2.2.2-Cross-Site-Scripting.html +CVE-2014-4727 - http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html +CVE-2014-4727 - http://seclists.org/fulldisclosure/2014/Sep/80 +CVE-2014-4728 - http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html +CVE-2014-4728 - http://seclists.org/fulldisclosure/2014/Sep/80 +CVE-2014-4734 - http://packetstormsecurity.com/files/127499/e107-2.0-alpha2-Cross-Site-Scripting.html +CVE-2014-4735 - http://packetstormsecurity.com/files/128140/MyWebSQL-3.4-Cross-Site-Scripting.html +CVE-2014-4736 - http://packetstormsecurity.com/files/127594/E2-2844-SQL-Injection.html +CVE-2014-4737 - http://packetstormsecurity.com/files/128519/Textpattern-4.5.5-Cross-Site-Scripting.html +CVE-2014-4741 - http://packetstormsecurity.com/files/127370/xClassified-1.2-SQL-Injection.html +CVE-2014-4742 - https://www.netsparker.com/critical-xss-vulnerability-in-kajonacms +CVE-2014-4744 - https://www.netsparker.com/critical-xss-vulnerabilities-in-osticket/ +CVE-2014-4747 - http://packetstormsecurity.com/files/127830/IBM-Sametime-Meet-Server-8.5-Password-Disclosure.html +CVE-2014-4748 - http://packetstormsecurity.com/files/127831/IBM-Sametime-Meet-Server-8.5-Cross-Site-Scripting.html +CVE-2014-4770 - http://www.kb.cert.org/vuls/id/573356 +CVE-2014-4816 - http://www.kb.cert.org/vuls/id/573356 +CVE-2014-4845 - http://packetstormsecurity.com/files/127289/WordPress-Bannerman-0.2.4-Cross-Site-Scripting.html +CVE-2014-4846 - http://packetstormsecurity.com/files/127288/WordPress-ml-slider-2.5-Cross-Site-Scripting.html +CVE-2014-4847 - http://packetstormsecurity.com/files/127292/WordPress-Random-Banner-1.1.2.1-Cross-Site-Scripting.html +CVE-2014-4848 - http://packetstormsecurity.com/files/127290/WordPress-Blogstand-Smart-Banner-1.0-Cross-Site-Scripting.html +CVE-2014-4849 - http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html +CVE-2014-4850 - http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html +CVE-2014-4851 - http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html +CVE-2014-4852 - http://packetstormsecurity.com/files/127371/Atom-CMS-Shell-Upload-SQL-Injection.html +CVE-2014-4853 - http://packetstormsecurity.com/files/127330/OpenDocMan-1.2.7.2-Cross-Site-Scripting.html +CVE-2014-4853 - https://github.com/opendocman/opendocman/issues/163 +CVE-2014-4854 - http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html +CVE-2014-4858 - http://www.kb.cert.org/vuls/id/394540 +CVE-2014-4859 - http://www.kb.cert.org/vuls/id/552286 +CVE-2014-4860 - http://www.kb.cert.org/vuls/id/552286 +CVE-2014-4865 - http://seclists.org/fulldisclosure/2014/Sep/38 +CVE-2014-4865 - http://www.kb.cert.org/vuls/id/241508 +CVE-2014-4867 - http://www.kb.cert.org/vuls/id/280844 +CVE-2014-4868 - http://www.kb.cert.org/vuls/id/111588 +CVE-2014-4869 - http://www.kb.cert.org/vuls/id/111588 +CVE-2014-4870 - http://www.kb.cert.org/vuls/id/111588 +CVE-2014-4871 - http://www.kb.cert.org/vuls/id/941108 +CVE-2014-4872 - http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html +CVE-2014-4873 - http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html +CVE-2014-4874 - http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html +CVE-2014-4875 - http://www.kb.cert.org/vuls/id/301788 +CVE-2014-4875 - http://www.kb.cert.org/vuls/id/JLAD-9X4SPN +CVE-2014-4877 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-4877 - https://github.com/rapid7/metasploit-framework/pull/4088 +CVE-2014-4877 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2014-4880 - http://packetstormsecurity.com/files/129187/Hikvision-DVR-RTSP-Request-Remote-Code-Execution.html +CVE-2014-4881 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4881 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4882 - http://www.kb.cert.org/vuls/id/595884 +CVE-2014-4884 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4884 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4885 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4885 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4887 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4887 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4888 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4888 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4889 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4889 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4890 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4890 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4891 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4891 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4892 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4892 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4894 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4894 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4895 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4895 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4896 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4896 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4897 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4897 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4898 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4898 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4899 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4899 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4900 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4900 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4901 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4901 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4903 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4903 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4904 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4904 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4905 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4905 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4906 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-4906 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-4909 - https://bugs.gentoo.org/show_bug.cgi?id=516822 +CVE-2014-4912 - https://www.exploit-db.com/exploits/33983/ +CVE-2014-4925 - http://packetstormsecurity.com/files/129864/Good-For-Enterprise-Android-HTML-Injection.html +CVE-2014-4925 - http://seclists.org/fulldisclosure/2015/Jan/17 +CVE-2014-4927 - http://packetstormsecurity.com/files/127544/ACME-micro_httpd-Denial-Of-Service.html +CVE-2014-4930 - http://packetstormsecurity.com/files/128012/ManageEngine-EventLog-Analyzer-7-Cross-Site-Scripting.html +CVE-2014-4936 - http://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and +CVE-2014-4936 - http://packetstormsecurity.com/files/130244/Malwarebytes-Anti-Malware-Anti-Exploit-Update-Remote-Code-Execution.html +CVE-2014-4943 - http://www.exploit-db.com/exploits/36267 +CVE-2014-4944 - http://packetstormsecurity.com/files/127407/WordPress-BSK-PDF-Manager-1.3.2-SQL-Injection.html +CVE-2014-4958 - http://packetstormsecurity.com/files/128414/Telerik-ASP.NET-AJAX-RadEditor-Control-2014.1.403.35-XSS.html +CVE-2014-4959 - http://packetstormsecurity.com/files/127651/Android-SDK-SQL-Injection.html +CVE-2014-4959 - http://seclists.org/fulldisclosure/2014/Jul/138 +CVE-2014-4959 - http://seclists.org/fulldisclosure/2014/Jul/139 +CVE-2014-4960 - http://packetstormsecurity.com/files/127497/Joomla-Youtube-Gallery-4.1.7-SQL-Injection.html +CVE-2014-4962 - http://seclists.org/fulldisclosure/2014/Jul/38 +CVE-2014-4963 - http://seclists.org/fulldisclosure/2014/Jul/38 +CVE-2014-4964 - http://seclists.org/fulldisclosure/2014/Jul/38 +CVE-2014-4965 - http://seclists.org/fulldisclosure/2014/Jul/38 +CVE-2014-4968 - http://www.exploit-db.com/exploits/34088/ +CVE-2014-4971 - http://packetstormsecurity.com/files/127535/Microsoft-XP-SP3-BthPan.sys-Arbitrary-Write-Privilege-Escalation.html +CVE-2014-4971 - http://packetstormsecurity.com/files/127536/Microsoft-XP-SP3-MQAC.sys-Arbitrary-Write-Privilege-Escalation.html +CVE-2014-4971 - http://packetstormsecurity.com/files/128674/Microsoft-Bluetooth-Personal-Area-Networking-BthPan.sys-Privilege-Escalation.html +CVE-2014-4971 - http://seclists.org/fulldisclosure/2014/Jul/96 +CVE-2014-4971 - http://seclists.org/fulldisclosure/2014/Jul/97 +CVE-2014-4971 - http://www.exploit-db.com/exploits/34112 +CVE-2014-4971 - http://www.exploit-db.com/exploits/34131 +CVE-2014-4971 - http://www.exploit-db.com/exploits/34982 +CVE-2014-4971 - https://www.korelogic.com/Resources/Advisories/KL-001-2014-002.txt +CVE-2014-4971 - https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt +CVE-2014-4972 - https://g0blin.co.uk/cve-2014-4972/ +CVE-2014-4972 - https://wpvulndb.com/vulnerabilities/8232 +CVE-2014-4974 - http://packetstormsecurity.com/files/128874/ESET-7.0-Kernel-Memory-Leak.html +CVE-2014-4975 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-4976 - http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html +CVE-2014-4977 - http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html +CVE-2014-4977 - http://packetstormsecurity.com/files/137098/Dell-SonicWALL-Scrutinizer-11.01-methodDetail-SQL-Injection.html +CVE-2014-4977 - https://www.exploit-db.com/exploits/39836/ +CVE-2014-4980 - http://packetstormsecurity.com/files/127532/Tenable-Nessus-5.2.7-Parameter-Tampering-Authentication-Bypass.html +CVE-2014-4980 - http://www.halock.com/blog/cve-2014-4980-parameter-tampering-nessus-web-ui/ +CVE-2014-4981 - http://ocert.org/advisories/ocert-2014-005.html +CVE-2014-4981 - http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html +CVE-2014-4981 - http://www.openwall.com/lists/oss-security/2014/07/23/6 +CVE-2014-4982 - http://packetstormsecurity.com/files/127593/LPAR2RRD-3.5-4.53-Command-Injection.html +CVE-2014-4982 - http://www.openwall.com/lists/oss-security/2014/07/23/6 +CVE-2014-4984 - http://packetstormsecurity.com/files/127769/Crescendo-Sales-CRM-SQL-Injection.html +CVE-2014-5005 - http://seclists.org/fulldisclosure/2014/Aug/88 +CVE-2014-5005 - http://www.exploit-db.com/exploits/34594 +CVE-2014-5006 - http://seclists.org/fulldisclosure/2014/Aug/88 +CVE-2014-5006 - http://www.exploit-db.com/exploits/34594 +CVE-2014-5007 - http://seclists.org/fulldisclosure/2014/Aug/88 +CVE-2014-5016 - http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html +CVE-2014-5017 - http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html +CVE-2014-5018 - http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html +CVE-2014-5023 - http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ +CVE-2014-5024 - http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html +CVE-2014-5024 - http://seclists.org/fulldisclosure/2014/Jul/125 +CVE-2014-5029 - https://cups.org/str.php?L4455 +CVE-2014-5030 - https://cups.org/str.php?L4455 +CVE-2014-5031 - https://cups.org/str.php?L4455 +CVE-2014-5034 - https://github.com/0pc0deFR/wordpress-sploit-framework/blob/master/exploits/Brute_Force_Login_Protection_1_3_Cross_Site_Request_Forgery +CVE-2014-5035 - http://packetstormsecurity.com/files/127843/Opendaylight-1.0-Local-File-Inclusion-Remote-File-Inclusion.html +CVE-2014-5072 - https://www.wpsecurityauditlog.com/plugin-change-log/ +CVE-2014-5073 - http://packetstormsecurity.com/files/127864/VMTurbo-Operations-Manager-4.6-vmtadmin.cgi-Remote-Command-Execution.html +CVE-2014-5074 - https://www.exploit-db.com/exploits/44693/ +CVE-2014-5076 - https://www.youtube.com/watch?v=MF9lrh1kpDs +CVE-2014-5077 - http://www.ubuntu.com/usn/USN-2335-1 +CVE-2014-5077 - http://www.ubuntu.com/usn/USN-2358-1 +CVE-2014-5081 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5081 - https://www.exploit-db.com/exploits/34238 +CVE-2014-5082 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5082 - http://www.exploit-db.com/exploits/34189 +CVE-2014-5083 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5084 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5085 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5086 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5087 - http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html +CVE-2014-5088 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5089 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5090 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5091 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5091 - http://www.exploit-db.com/exploits/34239 +CVE-2014-5092 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5093 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5094 - http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html +CVE-2014-5097 - http://packetstormsecurity.com/files/127943/ArticleFR-3.0.4-SQL-Injection.html +CVE-2014-5098 - http://packetstormsecurity.com/files/127854/Jamroom-5.2.6-Cross-Site-Scripting.html +CVE-2014-5100 - http://packetstormsecurity.com/files/127523/Omeka-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-5100 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5193.php +CVE-2014-5101 - http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html +CVE-2014-5102 - http://packetstormsecurity.com/files/127537/vBulletin-5.1.2-SQL-Injection.html +CVE-2014-5103 - http://packetstormsecurity.com/files/127568/EventLog-Analyzer-9.0-Build-9000-Cross-Site-Scripting.html +CVE-2014-5104 - http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-5105 - http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-5107 - http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html +CVE-2014-5108 - http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html +CVE-2014-5109 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html +CVE-2014-5110 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html +CVE-2014-5111 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html +CVE-2014-5112 - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html +CVE-2014-5113 - http://packetstormsecurity.com/files/127545/MyConnection-Server-MCS-9.7i-Cross-Site-Scripting.html +CVE-2014-5113 - http://treadstonesecurity.blogspot.ca/2014/07/myconnection-server-mcs-reflective-xss.html +CVE-2014-5114 - http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html +CVE-2014-5115 - http://packetstormsecurity.com/files/127642/DirPHP-1.0-Local-File-Inclusion.html +CVE-2014-5115 - http://www.exploit-db.com/exploits/34173 +CVE-2014-5116 - http://www.exploit-db.com/exploits/33384 +CVE-2014-5119 - http://seclists.org/fulldisclosure/2014/Aug/69 +CVE-2014-5120 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-5121 - http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html +CVE-2014-5122 - http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html +CVE-2014-5127 - http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html +CVE-2014-5128 - http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html +CVE-2014-5129 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html +CVE-2014-5130 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html +CVE-2014-5131 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html +CVE-2014-5132 - http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html +CVE-2014-5138 - https://packetstormsecurity.com/files/128053/Sierra-Library-Services-Platform-1.2_3-XSS-Enumeration.html +CVE-2014-5139 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm +CVE-2014-5140 - http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html +CVE-2014-5140 - http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/ +CVE-2014-5140 - http://www.exploit-db.com/exploits/34552 +CVE-2014-5144 - https://www.exploit-db.com/exploits/36463/ +CVE-2014-5171 - http://packetstormsecurity.com/files/127666/SAP-HANA-XS-Missing-Encryption.html +CVE-2014-5172 - http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html +CVE-2014-5173 - http://packetstormsecurity.com/files/127667/SAP-HANA-IU5-SDK-Authentication-Bypass.html +CVE-2014-5174 - http://packetstormsecurity.com/files/127671/SAP-Netweaver-Business-Warehouse-Missing-Authorization.html +CVE-2014-5176 - http://packetstormsecurity.com/files/127669/SAP-FI-Manager-Self-Service-Hardcoded-Username.html +CVE-2014-5178 - http://packetstormsecurity.com/files/127622/Easy-File-Sharing-Persistent-Cross-Site-Scripting.html +CVE-2014-5188 - http://packetstormsecurity.com/files/127672/Lyris-ListManagerWeb-8.95a-Cross-Site-Scripting.html +CVE-2014-5189 - http://packetstormsecurity.com/files/127640/WordPress-Lead-Octopus-Power-SQL-Injection.html +CVE-2014-5190 - http://packetstormsecurity.com/files/127723/WordPress-SI-CAPTCHA-Cross-Site-Scripting.html +CVE-2014-5192 - http://www.exploit-db.com/exploits/34189 +CVE-2014-5193 - http://www.exploit-db.com/exploits/34189 +CVE-2014-5194 - http://packetstormsecurity.com/files/159715/Sphider-Search-Engine-1.3.6-Remote-Code-Execution.html +CVE-2014-5194 - http://www.exploit-db.com/exploits/34189 +CVE-2014-5196 - https://security.dxw.com/advisories/csrf-and-xss-in-improved-user-search-allow-execution-of-arbitrary-javascript-in-wordpress-admin-area/ +CVE-2014-5200 - http://packetstormsecurity.com/files/127639 +CVE-2014-5201 - http://packetstormsecurity.com/files/127533/WordPress-Gallery-Objects-0.4-SQL-Injection.html +CVE-2014-5201 - http://www.homelab.it/index.php/2014/07/18/wordpress-gallery-objects-0-4-sql-injection/#sthash.ftMVwBVK.dpbs +CVE-2014-5202 - http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html +CVE-2014-5207 - http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html +CVE-2014-5208 - https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A +CVE-2014-5214 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html +CVE-2014-5214 - http://seclists.org/fulldisclosure/2014/Dec/78 +CVE-2014-5215 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html +CVE-2014-5215 - http://seclists.org/fulldisclosure/2014/Dec/78 +CVE-2014-5216 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html +CVE-2014-5216 - http://seclists.org/fulldisclosure/2014/Dec/78 +CVE-2014-5217 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html +CVE-2014-5217 - http://seclists.org/fulldisclosure/2014/Dec/78 +CVE-2014-5234 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html +CVE-2014-5235 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html +CVE-2014-5236 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html +CVE-2014-5237 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html +CVE-2014-5238 - http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html +CVE-2014-5243 - https://bugzilla.wikimedia.org/show_bug.cgi?id=65778 +CVE-2014-5246 - http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html +CVE-2014-5247 - http://packetstormsecurity.com/files/127851/Ganeti-Insecure-Archive-Permission.html +CVE-2014-5247 - http://www.ocert.org/advisories/ocert-2014-006.html +CVE-2014-5249 - https://www.drupal.org/node/2316717 +CVE-2014-5250 - https://www.drupal.org/node/2316717 +CVE-2014-5257 - http://packetstormsecurity.com/files/128978/Forma-Lms-1.2.1-Cross-Site-Scripting.html +CVE-2014-5258 - http://packetstormsecurity.com/files/128301/webEdition-6.3.8.0-Path-Traversal.html +CVE-2014-5259 - http://packetstormsecurity.com/files/128141/BlackCat-CMS-1.0.3-Cross-Site-Scripting.html +CVE-2014-5269 - https://github.com/plack/Plack/issues/405 +CVE-2014-5275 - http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html +CVE-2014-5276 - http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html +CVE-2014-5284 - http://packetstormsecurity.com/files/129111/OSSEC-2.8-Privilege-Escalation.html +CVE-2014-5284 - https://github.com/ossec/ossec-hids/releases/tag/2.8.1 +CVE-2014-5285 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-5286 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-5287 - http://packetstormsecurity.com/files/131284/Kemp-Load-Master-7.1-16-CSRF-XSS-DoS-Code-Execution.html +CVE-2014-5287 - https://www.exploit-db.com/exploits/36609/ +CVE-2014-5288 - http://packetstormsecurity.com/files/131284/Kemp-Load-Master-7.1-16-CSRF-XSS-DoS-Code-Execution.html +CVE-2014-5288 - https://www.exploit-db.com/exploits/36609/ +CVE-2014-5289 - http://packetstormsecurity.com/files/127912/Senkas-Kolibri-WebServer-2.0-Buffer-Overflow.html +CVE-2014-5297 - http://packetstormsecurity.com/files/128352/X2Engine-4.1.7-PHP-Object-Injection.html +CVE-2014-5298 - http://packetstormsecurity.com/files/128353/X2Engine-4.1.7-Unrestricted-File-Upload.html +CVE-2014-5300 - http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html +CVE-2014-5300 - http://www.exploit-db.com/exploits/34865 +CVE-2014-5301 - http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html +CVE-2014-5301 - http://packetstormsecurity.com/files/130020/ManageEngine-Multiple-Products-Authenticated-File-Upload.html +CVE-2014-5301 - http://seclists.org/fulldisclosure/2015/Jan/5 +CVE-2014-5301 - https://www.exploit-db.com/exploits/35845/ +CVE-2014-5302 - http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html +CVE-2014-5302 - http://seclists.org/fulldisclosure/2015/Jan/12 +CVE-2014-5302 - http://seclists.org/fulldisclosure/2015/Jan/5 +CVE-2014-5307 - http://packetstormsecurity.com/files/127948/Panda-Security-2014-Privilege-Escalation.html +CVE-2014-5308 - http://packetstormsecurity.com/files/128521/TestLink-1.9.11-SQL-Injection.html +CVE-2014-5308 - http://seclists.org/fulldisclosure/2014/Oct/13 +CVE-2014-5332 - http://nvidia.custhelp.com/app/answers/detail/a_id/3618 +CVE-2014-5334 - https://bugs.freenas.org/issues/5844 +CVE-2014-5337 - https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/ +CVE-2014-5338 - http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html +CVE-2014-5339 - http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html +CVE-2014-5340 - http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html +CVE-2014-5343 - http://packetstormsecurity.com/files/127777/Feng-Office-Cross-Site-Scripting.html +CVE-2014-5345 - http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html +CVE-2014-5347 - http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html +CVE-2014-5347 - http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-5348 - http://seclists.org/fulldisclosure/2014/Aug/41 +CVE-2014-5349 - http://www.exploit-db.com/exploits/33951 +CVE-2014-5349 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5190.php +CVE-2014-5350 - http://seclists.org/fulldisclosure/2014/Jul/78 +CVE-2014-5351 - https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca +CVE-2014-5352 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt +CVE-2014-5353 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-5355 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-5355 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-5355 - https://github.com/krb5/krb5/commit/102bb6ebf20f9174130c85c3b052ae104e5073ec +CVE-2014-5360 - http://seclists.org/fulldisclosure/2015/Feb/6 +CVE-2014-5361 - http://packetstormsecurity.com/files/131496/Landesk-Management-Suite-9.5-RFI-CSRF.html +CVE-2014-5362 - http://packetstormsecurity.com/files/131496/Landesk-Management-Suite-9.5-RFI-CSRF.html +CVE-2014-5368 - http://seclists.org/oss-sec/2014/q3/407 +CVE-2014-5370 - http://packetstormsecurity.com/files/131504/BlueDragon-CFChart-Servlet-7.1.1.17759-Directory-Traversal.html +CVE-2014-5370 - https://www.exploit-db.com/exploits/36815/ +CVE-2014-5375 - http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html +CVE-2014-5376 - http://packetstormsecurity.com/files/128485/Moab-Insecure-Message-Signing-Authentication-Bypass.html +CVE-2014-5377 - http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html +CVE-2014-5377 - http://seclists.org/fulldisclosure/2014/Aug/75 +CVE-2014-5377 - http://seclists.org/fulldisclosure/2014/Aug/76 +CVE-2014-5377 - http://seclists.org/fulldisclosure/2014/Aug/84 +CVE-2014-5377 - http://www.exploit-db.com/exploits/34449 +CVE-2014-5380 - http://packetstormsecurity.com/files/128003/Grand-MA-300-Fingerprint-Reader-Weak-PIN-Verification.html +CVE-2014-5380 - http://seclists.org/fulldisclosure/2014/Aug/70 +CVE-2014-5381 - http://packetstormsecurity.com/files/128003/Grand-MA-300-Fingerprint-Reader-Weak-PIN-Verification.html +CVE-2014-5381 - http://seclists.org/fulldisclosure/2014/Aug/70 +CVE-2014-5382 - http://seclists.org/fulldisclosure/2014/Jul/40 +CVE-2014-5385 - http://seclists.org/fulldisclosure/2014/Jul/38 +CVE-2014-5387 - http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html +CVE-2014-5387 - http://seclists.org/fulldisclosure/2014/Nov/2 +CVE-2014-5389 - http://packetstormsecurity.com/files/128525/WordPress-Content-Audit-1.6-Blind-SQL-Injection.html +CVE-2014-5389 - http://seclists.org/fulldisclosure/2014/Oct/8 +CVE-2014-5389 - https://security.dxw.com/advisories/blind-sqli-vulnerability-in-content-audit-could-allow-a-privileged-attacker-to-exfiltrate-password-hashes/ +CVE-2014-5391 - http://packetstormsecurity.com/files/128180/JobScheduler-Cross-Site-Scripting.html +CVE-2014-5391 - http://www.christian-schneider.net/advisories/CVE-2014-5391.txt +CVE-2014-5392 - http://packetstormsecurity.com/files/128181/JobScheduler-XML-eXternal-Entity-Injection.html +CVE-2014-5392 - http://www.christian-schneider.net/advisories/CVE-2014-5392.txt +CVE-2014-5393 - http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html +CVE-2014-5393 - http://www.christian-schneider.net/advisories/CVE-2014-5393.txt +CVE-2014-5395 - https://www.exploit-db.com/exploits/46092/ +CVE-2014-5396 - http://seclists.org/fulldisclosure/2014/Jul/40 +CVE-2014-5408 - https://ics-cert.us-cert.gov/advisories/ICSA-14-303-01 +CVE-2014-5437 - http://seclists.org/fulldisclosure/2014/Dec/57 +CVE-2014-5437 - http://seclists.org/fulldisclosure/2014/Dec/58 +CVE-2014-5438 - http://seclists.org/fulldisclosure/2014/Dec/58 +CVE-2014-5439 - http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html +CVE-2014-5440 - http://packetstormsecurity.com/files/128064/MX-SmartTimer-13.18.5.11-SQL-Injection.html +CVE-2014-5441 - http://packetstormsecurity.com/files/127978/Fatt-Free-CRM-Cross-Site-Scripting.html +CVE-2014-5445 - http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html +CVE-2014-5445 - http://seclists.org/fulldisclosure/2014/Dec/9 +CVE-2014-5446 - http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html +CVE-2014-5446 - http://seclists.org/fulldisclosure/2014/Dec/9 +CVE-2014-5451 - http://packetstormsecurity.com/files/128302/MODX-Revolution-2.3.1-pl-Cross-Site-Scripting.html +CVE-2014-5453 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5191.php +CVE-2014-5454 - http://packetstormsecurity.com/files/127866/SAS-Visual-Analytics-6.4M1-Arbitrary-File-Upload.html +CVE-2014-5455 - http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html +CVE-2014-5455 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php +CVE-2014-5459 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-5460 - http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html +CVE-2014-5460 - http://whitexploit.blogspot.mx/2014/08/wordpress-slideshow-gallery-146-shell.html +CVE-2014-5460 - http://www.exploit-db.com/exploits/34514 +CVE-2014-5462 - http://packetstormsecurity.com/files/129403/OpenEMR-4.1.2-7-SQL-Injection.html +CVE-2014-5462 - http://seclists.org/fulldisclosure/2014/Dec/24 +CVE-2014-5462 - https://github.com/openemr/openemr/issues/1782 +CVE-2014-5464 - http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html +CVE-2014-5465 - http://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-Inclusion.html +CVE-2014-5465 - http://www.exploit-db.com/exploits/34436 +CVE-2014-5468 - http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html +CVE-2014-5468 - http://www.exploit-db.com/exploits/34669 +CVE-2014-5471 - http://www.ubuntu.com/usn/USN-2358-1 +CVE-2014-5472 - http://www.ubuntu.com/usn/USN-2358-1 +CVE-2014-5507 - http://packetstormsecurity.com/files/128806/iBackup-10.0.0.32-Local-Privilege-Escalation.html +CVE-2014-5516 - http://packetstormsecurity.com/files/128342/KonaKart-Storefront-Application-Cross-Site-Request-Forgery.html +CVE-2014-5519 - http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html +CVE-2014-5519 - http://seclists.org/fulldisclosure/2014/Aug/77 +CVE-2014-5519 - http://seclists.org/oss-sec/2014/q3/456 +CVE-2014-5520 - http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html +CVE-2014-5520 - http://seclists.org/fulldisclosure/2014/Aug/78 +CVE-2014-5520 - http://www.openwall.com/lists/oss-security/2014/08/27/4 +CVE-2014-5521 - http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html +CVE-2014-5521 - http://seclists.org/fulldisclosure/2014/Aug/78 +CVE-2014-5521 - http://www.openwall.com/lists/oss-security/2014/08/27/4 +CVE-2014-5524 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5524 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5525 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5525 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5526 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5526 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5527 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5527 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5528 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5528 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5529 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5529 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5531 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5531 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5532 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5532 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5534 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5534 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5535 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5535 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5536 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5536 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5537 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5537 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5538 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5538 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5539 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5539 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5540 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5540 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5541 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5541 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5542 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5542 - http://www.kb.cert.org/vuls/id/638641 +CVE-2014-5542 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5543 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5543 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5544 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5544 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5545 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5545 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5546 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5546 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5547 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5547 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5548 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5548 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5549 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5549 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5550 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5550 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5551 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5551 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5552 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5552 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5553 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5553 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5554 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5554 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5555 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5555 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5556 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5556 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5557 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5557 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5558 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5558 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5559 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5559 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5560 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5560 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5561 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5561 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5562 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5562 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5563 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5563 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5564 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5564 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5565 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5565 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5566 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5566 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5567 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5567 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5568 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5568 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5569 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5569 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5570 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5570 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5571 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5571 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5572 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5572 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5573 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5573 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5574 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5574 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5576 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5576 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5577 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5577 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5578 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5578 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5579 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5579 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5580 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5580 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5581 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5581 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5582 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5582 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5583 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5583 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5584 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5584 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5585 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5585 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5586 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5586 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5587 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5587 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5588 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5588 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5589 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5589 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5590 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5590 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5591 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5591 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5592 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5592 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5593 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5593 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5594 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5594 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5595 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5595 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5596 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5596 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5597 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5597 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5598 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5598 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5599 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5599 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5600 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5600 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5601 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5601 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5602 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5602 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5603 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5603 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5604 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5604 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5605 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5605 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5606 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5606 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5607 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5607 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5608 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5608 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5609 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5609 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5610 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5610 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5611 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5611 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5612 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5612 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5613 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5613 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5614 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5614 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5615 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5615 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5616 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5616 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5617 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5617 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5618 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5618 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5620 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5620 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5621 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5621 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5622 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5622 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5623 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5623 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5624 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5624 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5625 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5625 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5626 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5626 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5627 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5627 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5628 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5628 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5629 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5629 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5630 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5630 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5631 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5631 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5632 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5632 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5633 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5633 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5634 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5634 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5635 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5635 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5636 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5636 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5637 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5637 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5638 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5638 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5639 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5639 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5640 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5640 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5641 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5641 - http://www.kb.cert.org/vuls/id/714937 +CVE-2014-5641 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5642 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5642 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5643 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5643 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5644 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5644 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5645 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5645 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5646 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5646 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5647 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5647 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5648 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5648 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5649 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5649 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5650 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5650 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5651 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5651 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5652 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5652 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5653 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5653 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5654 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5654 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5655 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5655 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5656 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5656 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5657 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5657 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5658 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5658 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5659 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5659 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5660 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5660 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5661 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5661 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5662 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5662 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5663 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5663 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5664 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5664 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5665 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5665 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5666 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5666 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5667 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5667 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5668 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5668 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5669 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5669 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5670 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5670 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5671 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5671 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5672 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5672 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5673 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5673 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5674 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5674 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5675 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5675 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5676 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5676 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5677 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5677 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5678 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5678 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5679 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5679 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5680 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5680 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5681 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5681 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5682 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5682 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5683 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5683 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5684 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5684 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5685 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5685 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5686 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5686 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5687 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5687 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5688 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5688 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5689 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5689 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5690 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5690 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5691 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5691 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5692 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5692 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5693 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5693 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5694 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5694 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5695 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5695 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5696 - http://www.kb.cert.org/vuls/id/148041 +CVE-2014-5696 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5696 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5697 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5697 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5698 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5698 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5699 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5699 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5700 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5700 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5701 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5701 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5702 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5702 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5703 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5703 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5704 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5704 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-5704 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5705 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5705 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5706 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5706 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5707 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5707 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5708 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5708 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5709 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5709 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5710 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5710 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5711 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5711 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5712 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5712 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5713 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5713 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5714 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5714 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5715 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5715 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5716 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5716 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5717 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5717 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5719 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5719 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5720 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5720 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5721 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5721 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5722 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5722 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5723 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5723 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5724 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5724 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5725 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5725 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5726 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5726 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5727 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5727 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5728 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5728 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5729 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5729 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5730 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5730 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5731 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5731 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5732 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5732 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5733 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5733 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5734 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5734 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5735 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5735 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5736 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5736 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5737 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5737 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5738 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5738 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5739 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5739 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5740 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5740 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5741 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5741 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5742 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5742 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5743 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5743 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5744 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5744 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5745 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5745 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5746 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5746 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5747 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5747 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5748 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5748 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5749 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5749 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5750 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5750 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5751 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5751 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5752 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5752 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5753 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5754 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5754 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5755 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5755 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5756 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5756 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5757 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5757 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5758 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5758 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5759 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5759 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5760 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5760 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5761 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5761 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5762 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5762 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5763 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5763 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5764 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5764 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5765 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5765 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5766 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5766 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5767 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5767 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5768 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5768 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5769 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5769 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5770 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5770 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5771 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5771 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5772 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5772 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5773 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5773 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5774 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5774 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5775 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5775 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5776 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5776 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5777 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5777 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5778 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5778 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5779 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5779 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5780 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5780 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5781 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5781 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5782 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5782 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5783 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5783 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5784 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5784 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5785 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5785 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5786 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5786 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5787 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5787 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5788 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5788 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5789 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5789 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5790 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5790 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5791 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5791 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5792 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5792 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5793 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5793 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5794 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5794 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5796 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5796 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5797 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5797 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5798 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5798 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5799 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5799 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5800 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5800 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5801 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5801 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5802 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5802 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5803 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5803 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5804 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5804 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5805 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5805 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5806 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5806 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5807 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5807 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5808 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5808 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5809 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5809 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5810 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5810 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5811 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5811 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5812 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5812 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5813 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5813 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5815 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5815 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5816 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5816 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5817 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5817 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5818 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5818 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5819 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5819 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5820 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5820 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5821 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5821 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5822 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5822 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5823 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5823 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5824 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5824 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5825 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5825 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5826 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5826 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5827 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5827 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5828 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5828 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5829 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5829 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5830 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5830 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5831 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5831 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5832 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5832 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5833 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5833 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5834 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5834 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5835 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5835 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5836 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5836 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5837 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5837 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5838 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5838 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5839 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5839 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5840 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5840 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5841 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5841 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5842 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5842 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5843 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5843 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5844 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5844 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5845 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5845 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5846 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5846 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5847 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5847 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5848 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5848 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5849 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5849 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5850 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5850 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5851 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5851 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5852 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5852 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5853 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5853 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5854 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5854 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5855 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5855 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5856 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5856 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5857 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5857 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5858 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5858 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5859 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5859 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5860 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5860 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5861 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5861 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5862 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5862 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5863 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5863 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5864 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5864 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5865 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5865 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5866 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5866 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5867 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5867 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5868 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5868 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5869 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5869 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5870 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5870 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5871 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5871 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5872 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5872 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5873 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5873 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5874 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5874 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5875 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5875 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5876 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5876 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5877 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5877 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5878 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5878 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5879 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5879 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5881 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5881 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5882 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5882 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5883 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5883 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5884 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5884 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5885 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5885 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5886 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5886 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5887 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5887 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5888 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5888 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5889 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5889 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5890 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5890 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5891 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5891 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5892 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5892 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5893 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5893 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5894 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5894 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5895 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5895 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5896 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5896 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5897 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5897 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5898 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5898 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5899 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5899 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5900 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5900 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5901 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5901 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5902 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5902 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5903 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5903 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5904 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5904 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5905 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5905 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5906 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5906 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5907 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5907 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5908 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5908 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5909 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5909 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5910 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5910 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5911 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5911 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5912 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5912 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5913 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5913 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5914 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5914 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5915 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5915 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5916 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5916 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5917 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5917 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5918 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5918 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5919 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5919 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5920 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5920 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5921 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5921 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5922 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5922 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5923 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5923 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5924 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5924 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5925 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5925 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5926 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5926 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5927 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5927 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5928 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5928 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5929 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5929 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5930 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5930 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5931 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5931 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5932 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5932 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5933 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5933 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5934 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5934 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5935 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5935 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5936 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5936 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5937 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5937 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5938 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5938 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5939 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5939 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5940 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5940 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5941 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5941 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5942 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5942 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5943 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5943 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5944 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5944 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5945 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5945 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5946 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5946 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5947 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5947 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5948 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5948 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5949 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5949 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5950 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5950 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5951 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5951 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5952 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5952 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5953 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5953 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5954 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5954 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5955 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5955 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5956 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5956 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5957 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5957 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5958 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5958 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5959 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5959 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5960 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5960 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5961 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5961 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5962 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5962 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5963 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5963 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5964 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5964 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5965 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5965 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5966 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5966 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5967 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5967 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5968 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5968 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5969 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5969 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5970 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5970 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5971 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5971 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5972 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5972 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5973 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5973 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5974 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5974 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5975 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5975 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5976 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5976 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5977 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5977 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5978 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5978 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5979 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5979 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5980 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5980 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5981 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5981 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5982 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5982 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5983 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5983 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5984 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5984 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5985 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5985 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5986 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5986 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5987 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5987 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5988 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5988 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5989 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5989 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5990 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5990 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5991 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5991 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5992 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5992 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5993 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5993 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5994 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5994 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5995 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5995 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5996 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5996 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5997 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5997 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5998 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5998 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-5999 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-5999 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6000 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6000 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6001 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6001 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6002 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6002 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6003 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6003 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6004 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6004 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6005 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6005 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6006 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6006 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6007 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6007 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6008 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6008 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6009 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6009 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6010 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6010 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6011 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6011 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6012 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6012 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6013 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6013 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6014 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6014 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6015 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6015 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6016 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6016 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6017 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6017 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6018 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6018 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6019 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6019 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6020 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6020 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6021 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6021 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6022 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6022 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6023 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6023 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6024 - http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html +CVE-2014-6024 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6024 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6025 - http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html +CVE-2014-6025 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6025 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6027 - http://www.openwall.com/lists/oss-security/2014/09/02/3 +CVE-2014-6027 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759574 +CVE-2014-6028 - http://www.openwall.com/lists/oss-security/2014/09/02/3 +CVE-2014-6029 - http://www.openwall.com/lists/oss-security/2014/09/02/3 +CVE-2014-6030 - http://packetstormsecurity.com/files/128296/ClassApps-SelectSurvey.net-4.124.004-SQL-Injection.html +CVE-2014-6032 - http://packetstormsecurity.com/files/128915/F5-Big-IP-11.3.0.39.0-XML-External-Entity-Injection-1.html +CVE-2014-6034 - http://seclists.org/fulldisclosure/2014/Sep/110 +CVE-2014-6035 - http://seclists.org/fulldisclosure/2014/Sep/110 +CVE-2014-6036 - http://seclists.org/fulldisclosure/2014/Sep/110 +CVE-2014-6037 - http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html +CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Aug/86 +CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Sep/1 +CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Sep/19 +CVE-2014-6037 - http://seclists.org/fulldisclosure/2014/Sep/20 +CVE-2014-6037 - http://www.exploit-db.com/exploits/34519 +CVE-2014-6038 - http://packetstormsecurity.com/files/128996/ManageEngine-EventLog-Analyzer-SQL-Credential-Disclosure.html +CVE-2014-6038 - http://seclists.org/fulldisclosure/2014/Nov/12 +CVE-2014-6039 - http://packetstormsecurity.com/files/128996/ManageEngine-EventLog-Analyzer-SQL-Credential-Disclosure.html +CVE-2014-6039 - http://seclists.org/fulldisclosure/2014/Nov/12 +CVE-2014-6041 - http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html +CVE-2014-6043 - http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html +CVE-2014-6043 - http://seclists.org/fulldisclosure/2014/Aug/86 +CVE-2014-6043 - http://seclists.org/fulldisclosure/2014/Sep/19 +CVE-2014-6043 - http://www.exploit-db.com/exploits/34519 +CVE-2014-6051 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6052 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6059 - http://packetstormsecurity.com/files/128137/WordPress-Advanced-Access-Manager-2.8.2-File-Write-Code-Execution.html +CVE-2014-6070 - http://packetstormsecurity.com/files/128121/LogAnalyzer-3.6.5-Cross-Site-Scripting.html +CVE-2014-6070 - http://seclists.org/fulldisclosure/2014/Sep/17 +CVE-2014-6070 - http://www.exploit-db.com/exploits/34525 +CVE-2014-6071 - http://seclists.org/fulldisclosure/2014/Sep/10 +CVE-2014-6071 - https://bugzilla.redhat.com/show_bug.cgi?id=1136683 +CVE-2014-6071 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2014-6130 - http://www.kb.cert.org/vuls/id/432608 +CVE-2014-6140 - http://packetstormsecurity.com/files/129349/IBM-Endpoint-Manager-For-Mobile-Devices-Code-Execution.html +CVE-2014-6140 - http://seclists.org/fulldisclosure/2014/Dec/3 +CVE-2014-6140 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-012/-unauthenticated-remote-code-execution-in-ibm-endpoint-manager-mobile-device-management-components +CVE-2014-6173 - http://www-01.ibm.com/support/docview.wss?uid=swg1JR50241 +CVE-2014-6230 - http://seclists.org/fulldisclosure/2014/Sep/60 +CVE-2014-6230 - https://security.dxw.com/advisories/vulnerability-in-wp-ban-allows-visitors-to-bypass-the-ip-blacklist-in-some-configurations/ +CVE-2014-6242 - http://packetstormsecurity.com/files/128419/All-In-One-WP-Security-3.8.2-SQL-Injection.html +CVE-2014-6242 - http://www.exploit-db.com/exploits/34781 +CVE-2014-6243 - http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html +CVE-2014-6252 - https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/ +CVE-2014-6253 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6253 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6254 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6254 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6255 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6255 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6256 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6256 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6257 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6257 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6258 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6258 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6259 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6259 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6260 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6260 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6261 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6261 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6262 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-6262 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-6270 - http://www.ubuntu.com/usn/USN-2921-1 +CVE-2014-6271 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html +CVE-2014-6271 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html +CVE-2014-6271 - http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html +CVE-2014-6271 - http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html +CVE-2014-6271 - http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html +CVE-2014-6271 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 +CVE-2014-6271 - http://www.qnap.com/i/en/support/con_show.php?cid=61 +CVE-2014-6271 - https://hackerone.com/reports/29839 +CVE-2014-6271 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2014-6271 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 +CVE-2014-6271 - https://www.exploit-db.com/exploits/34879/ +CVE-2014-6271 - https://www.exploit-db.com/exploits/37816/ +CVE-2014-6271 - https://www.exploit-db.com/exploits/38849/ +CVE-2014-6271 - https://www.exploit-db.com/exploits/39918/ +CVE-2014-6271 - https://www.exploit-db.com/exploits/40619/ +CVE-2014-6271 - https://www.exploit-db.com/exploits/40938/ +CVE-2014-6271 - https://www.exploit-db.com/exploits/42938/ +CVE-2014-6273 - http://www.ubuntu.com/usn/USN-2353-1 +CVE-2014-6277 - http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html +CVE-2014-6277 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html +CVE-2014-6277 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 +CVE-2014-6277 - http://www.qnap.com/i/en/support/con_show.php?cid=61 +CVE-2014-6277 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 +CVE-2014-6278 - http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html +CVE-2014-6278 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html +CVE-2014-6278 - http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html +CVE-2014-6278 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 +CVE-2014-6278 - http://www.qnap.com/i/en/support/con_show.php?cid=61 +CVE-2014-6278 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 +CVE-2014-6278 - https://www.exploit-db.com/exploits/39568/ +CVE-2014-6278 - https://www.exploit-db.com/exploits/39887/ +CVE-2014-6280 - http://packetstormsecurity.com/files/128286/OsClass-3.4.1-Cross-Site-Scripting.html +CVE-2014-6280 - https://www.netsparker.com/xss-vulnerabilities-in-osclass/ +CVE-2014-6284 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-004/?fid=6200 +CVE-2014-6287 - http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html +CVE-2014-6287 - http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html +CVE-2014-6287 - http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html +CVE-2014-6287 - http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html +CVE-2014-6287 - https://www.exploit-db.com/exploits/39161/ +CVE-2014-6308 - http://packetstormsecurity.com/files/128285/OsClass-3.4.1-Local-File-Inclusion.html +CVE-2014-6308 - https://www.netsparker.com/lfi-vulnerability-in-osclass/ +CVE-2014-6312 - http://seclists.org/fulldisclosure/2014/Sep/58 +CVE-2014-6312 - http://www.exploit-db.com/exploits/34762 +CVE-2014-6312 - https://security.dxw.com/advisories/csrfxss-vulnerablity-in-login-widget-with-shortcode-allows-unauthenticated-attackers-to-do-anything-an-admin-can-do +CVE-2014-6313 - http://seclists.org/fulldisclosure/2014/Sep/59 +CVE-2014-6313 - https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do +CVE-2014-6315 - http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html +CVE-2014-6321 - http://www.kb.cert.org/vuls/id/505120 +CVE-2014-6321 - http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/ +CVE-2014-6332 - http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html +CVE-2014-6332 - http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html +CVE-2014-6332 - http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html +CVE-2014-6332 - http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html +CVE-2014-6332 - http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html +CVE-2014-6332 - http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows +CVE-2014-6332 - http://www.kb.cert.org/vuls/id/158647 +CVE-2014-6332 - https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt +CVE-2014-6332 - https://www.exploit-db.com/exploits/37668/ +CVE-2014-6332 - https://www.exploit-db.com/exploits/37800/ +CVE-2014-6332 - https://www.exploit-db.com/exploits/38500/ +CVE-2014-6332 - https://www.exploit-db.com/exploits/38512/ +CVE-2014-6363 - https://www.exploit-db.com/exploits/40721/ +CVE-2014-6389 - http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html +CVE-2014-6389 - http://seclists.org/fulldisclosure/2014/Oct/7 +CVE-2014-6389 - http://www.exploit-db.com/exploits/34861 +CVE-2014-6392 - http://seclists.org/fulldisclosure/2014/Sep/13 +CVE-2014-6409 - http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html +CVE-2014-6409 - http://seclists.org/fulldisclosure/2014/Sep/71 +CVE-2014-6409 - http://www.exploit-db.com/exploits/34718 +CVE-2014-6412 - http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html +CVE-2014-6412 - http://seclists.org/fulldisclosure/2015/Feb/42 +CVE-2014-6413 - http://seclists.org/fulldisclosure/2014/Sep/70 +CVE-2014-6413 - https://packetstormsecurity.com/files/128310 +CVE-2014-6420 - http://packetstormsecurity.com/files/128293/Livefyre-LiveComments-3.0-Cross-Site-Scripting.html +CVE-2014-6427 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381 +CVE-2014-6435 - http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html +CVE-2014-6436 - http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html +CVE-2014-6437 - http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html +CVE-2014-6439 - http://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html +CVE-2014-6439 - https://www.elastic.co/community/security/ +CVE-2014-6444 - https://research.g0blin.co.uk/cve-2014-6444/ +CVE-2014-6444 - https://wpvulndb.com/vulnerabilities/8233 +CVE-2014-6445 - http://research.g0blin.co.uk/cve-2014-6445/ +CVE-2014-6446 - http://packetstormsecurity.com/files/131002/Wordpress-InfusionSoft-Shell-Upload.html +CVE-2014-6446 - http://research.g0blin.co.uk/cve-2014-6446/ +CVE-2014-6452 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6453 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6454 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6455 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6456 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6456 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6457 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6457 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6458 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6458 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6459 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6460 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6461 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6462 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6463 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6463 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6464 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6464 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6464 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6465 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6466 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6466 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6467 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6468 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6469 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6469 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6469 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6470 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6471 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6472 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6473 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6474 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6475 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6476 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6476 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6477 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6478 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6478 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6479 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6480 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6481 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6482 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6483 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6484 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6484 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6485 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6486 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6487 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6488 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6489 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6490 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6491 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6491 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6491 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6492 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6492 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6493 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6493 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6494 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6494 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6494 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6495 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6495 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6496 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6496 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6497 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6498 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6499 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6500 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6500 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6500 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6501 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6502 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6502 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6503 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6503 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6504 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6505 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6505 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6506 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6506 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6507 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6507 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6507 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6508 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6509 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6510 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6511 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6511 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-6511 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6512 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6512 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6513 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6513 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6514 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6515 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6515 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6516 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6517 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6518 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6519 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6520 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6520 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6521 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6522 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6523 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6524 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6525 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6526 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6527 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6527 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6528 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6529 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6530 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6530 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6531 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6531 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6532 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6532 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6533 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6534 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6535 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6536 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6537 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6538 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6539 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6540 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6541 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6542 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6543 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6544 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6545 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6546 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6547 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6548 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6549 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6550 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6551 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6551 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6552 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6553 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6554 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6555 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6555 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6555 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6556 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6557 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6558 - http://www-01.ibm.com/support/docview.wss?uid=swg21688283 +CVE-2014-6558 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6559 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6559 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6559 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6560 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6561 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6562 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6563 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6564 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html +CVE-2014-6565 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6566 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6567 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6568 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-6568 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-6568 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6569 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6570 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6571 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6572 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6573 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6574 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6575 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6576 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6577 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6578 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6579 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6580 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6581 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6582 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6583 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6584 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6585 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-6585 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6585 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2014-6586 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6587 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6587 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2014-6588 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6589 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6590 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6591 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-6591 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6591 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2014-6592 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6593 - http://packetstormsecurity.com/files/134251/Java-Secure-Socket-Extension-JSSE-SKIP-TLS.html +CVE-2014-6593 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6593 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2014-6593 - https://www.exploit-db.com/exploits/38641/ +CVE-2014-6594 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6595 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6596 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6597 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6598 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6599 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6600 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6601 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2014-6601 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2014-6602 - http://packetstormsecurity.com/files/128320/Nokia-Asha-501-Lock-Bypass.html +CVE-2014-6603 - http://packetstormsecurity.com/files/128382/Suricata-2.0.3-Out-Of-Bounds-Access.html +CVE-2014-6607 - http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html +CVE-2014-6607 - http://seclists.org/fulldisclosure/2014/Sep/71 +CVE-2014-6607 - http://www.exploit-db.com/exploits/34718 +CVE-2014-6616 - http://packetstormsecurity.com/files/128975/Softing-FG-100-PB-Cross-Site-Scripting.html +CVE-2014-6617 - http://packetstormsecurity.com/files/128976/Softing-FG-100-PB-Hardcoded-Backdoor.html +CVE-2014-6618 - http://packetstormsecurity.com/files/128336/Your-Online-Shop-Cross-Site-Scripting.html +CVE-2014-6619 - http://packetstormsecurity.com/files/128337 +CVE-2014-6619 - http://www.exploit-db.com/exploits/34760 +CVE-2014-6635 - http://packetstormsecurity.com/files/128335/Exponent-CMS-2.3.0-Cross-Site-Scripting.html +CVE-2014-6636 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6636 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6637 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6637 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6638 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6638 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6639 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6639 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6640 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6640 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6641 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6641 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6642 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6642 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6643 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6643 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6645 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6645 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6646 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6646 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6647 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6647 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6648 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6648 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6649 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6649 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6650 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6650 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6651 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6651 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6652 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6652 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6653 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6653 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6654 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6654 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6655 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6655 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6656 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6656 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6657 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6657 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6658 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6658 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6659 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6659 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6660 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6660 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6661 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6661 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6662 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6662 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6663 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6663 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6664 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6664 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6665 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6665 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6666 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6666 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6667 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6667 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6668 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6668 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6669 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6669 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6670 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6670 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6671 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6671 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6672 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6672 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6673 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6673 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6674 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6674 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6675 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6675 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6676 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6676 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6677 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6677 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6678 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6678 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6679 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6679 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6680 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6680 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6681 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6681 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6682 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6682 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6683 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6683 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6684 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6684 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6685 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6685 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6686 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6686 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6687 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6687 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6688 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6688 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6689 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6689 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6690 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6690 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6691 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6691 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6692 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6692 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6693 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6693 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6694 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6694 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6695 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6695 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6696 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6696 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6697 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6697 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6698 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6698 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6699 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6699 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6700 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6700 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6701 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6701 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6702 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6702 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6703 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6703 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6704 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6704 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6705 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6705 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6706 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6706 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6707 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6707 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6708 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6708 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6709 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6709 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6710 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6710 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6711 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6711 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6712 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6712 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6713 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6713 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6714 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6714 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6715 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6715 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6716 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6716 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6717 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6717 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6718 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6718 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6719 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6719 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6720 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6720 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6721 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6721 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6722 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6722 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6723 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6723 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6724 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6724 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6725 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6725 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6726 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6726 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6727 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6727 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6728 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6728 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6729 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6729 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6730 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6730 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6731 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6731 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6732 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6732 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6733 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6733 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6734 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6734 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6735 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6735 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6736 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6736 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6737 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6737 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6738 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6738 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6739 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6739 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6740 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6740 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6741 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6741 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6742 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6742 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6743 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6743 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6744 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6744 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6745 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6745 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6746 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6746 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6747 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6747 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6748 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6748 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6749 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6749 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6750 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6750 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6751 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6751 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6752 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6752 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6753 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6754 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6754 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6755 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6755 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6756 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6756 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6757 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6757 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6758 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6758 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6759 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6759 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6760 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6760 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6761 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6761 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6762 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6762 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6763 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6763 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6764 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6764 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6765 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6765 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6766 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6766 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6767 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6767 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6768 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6768 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6769 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6769 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6770 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6770 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6771 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6771 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6772 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6772 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6773 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6773 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6774 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6774 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6775 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6775 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6776 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6776 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6777 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6777 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6778 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6778 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6779 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6779 - http://www.kb.cert.org/vuls/id/781201 +CVE-2014-6779 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6780 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6780 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6781 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6781 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6782 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6782 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6783 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6783 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6784 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6784 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6785 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6785 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6786 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6786 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6787 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6787 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6788 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6788 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6789 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6789 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6790 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6790 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6791 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6791 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6792 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6792 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6793 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6793 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6794 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6794 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6795 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6795 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6796 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6796 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6797 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6797 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6798 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6798 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6799 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6799 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6800 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6800 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6801 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6801 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6802 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6802 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6803 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6803 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6804 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6804 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6805 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6805 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6806 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6806 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6807 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6807 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6808 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6808 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6810 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6810 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6812 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6812 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6813 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6813 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6814 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6814 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6815 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6815 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6816 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6816 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6817 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6817 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6818 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6818 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6819 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6819 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6820 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6820 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6821 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6821 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6822 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6822 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6823 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6823 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6824 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6824 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6825 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6825 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6826 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6826 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6827 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6827 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6828 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6828 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6829 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6829 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6830 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6830 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6831 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6831 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6832 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6832 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6833 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6833 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6834 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6834 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6835 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6835 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6836 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6836 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6837 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6837 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6838 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6838 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6839 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6839 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6840 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6840 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6841 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6841 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6842 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6842 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6843 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6843 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6844 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6844 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6845 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6845 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6846 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6846 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6847 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6847 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6848 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6848 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6850 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6850 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6851 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6851 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6852 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6852 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6853 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6853 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6854 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6854 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6855 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6855 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6856 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6856 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6857 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6857 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6858 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6858 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6859 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6859 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6860 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6860 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6861 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6861 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6862 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6862 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6863 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6863 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6864 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6864 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6865 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6865 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6866 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6866 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6867 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6867 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6868 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6868 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6869 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6869 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6870 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6870 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6871 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6871 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6872 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6872 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6873 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6873 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6874 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6874 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6875 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6875 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6876 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6876 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6877 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6877 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6878 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6878 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6879 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6879 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6880 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6880 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6881 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6881 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6882 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6882 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6883 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6883 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6884 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6884 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6885 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6885 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6886 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6886 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6887 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6887 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6888 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6888 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6889 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6889 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6890 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6890 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6891 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6891 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6892 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6892 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6893 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6893 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6894 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6894 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6895 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6895 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6896 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6896 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6897 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6897 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6898 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6898 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6899 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6899 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6900 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6900 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6901 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6901 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6902 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6902 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6903 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6903 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6904 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6904 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6905 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6905 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6906 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6906 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6907 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6907 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6908 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6908 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6909 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6909 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6910 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6910 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6911 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6911 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6912 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6912 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6913 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6913 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6914 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6914 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6916 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6916 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6917 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6917 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6918 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6918 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6919 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6919 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6920 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6920 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6921 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6921 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6922 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6922 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6923 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6923 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6924 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6924 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6925 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6925 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6926 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6926 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6927 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6927 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6928 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6928 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6929 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6929 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6930 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6930 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6931 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6931 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6932 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6932 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6933 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6933 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6934 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6934 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6935 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6935 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6936 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6936 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6937 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6937 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6938 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6938 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6939 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6939 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6940 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6940 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6941 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6941 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6942 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6942 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6943 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6943 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6944 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6944 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6945 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6945 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6946 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6946 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6947 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6947 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6948 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6948 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6949 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6949 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6950 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6950 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6951 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6951 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6952 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6952 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6953 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6953 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6954 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6954 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6955 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6955 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6956 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6956 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6957 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6957 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6958 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6958 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6959 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6959 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6960 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6960 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6961 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6961 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6962 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6962 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6963 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6963 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6964 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6964 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6965 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6965 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6966 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6966 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6967 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6967 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6968 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6968 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6969 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6969 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6970 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6970 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6971 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6971 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6972 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6972 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6973 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6973 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6974 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6974 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6975 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6975 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6976 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6976 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6977 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6977 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6978 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6978 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6979 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6979 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6980 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6980 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6981 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6981 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6982 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6982 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6983 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6983 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6984 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6984 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6985 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6985 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6986 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6986 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6987 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6987 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6988 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6988 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6989 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6989 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6990 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6990 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6991 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6991 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6992 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6992 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6993 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6993 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6994 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6994 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6995 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6995 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6996 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6996 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6997 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6997 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6998 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6998 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-6999 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-6999 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7000 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7000 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7001 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7001 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7002 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7002 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7003 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7003 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7004 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7004 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7005 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7005 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7006 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7006 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7007 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7007 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7008 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7008 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7009 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7009 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7010 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7010 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7011 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7011 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7012 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7012 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7013 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7013 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7015 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7015 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7016 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7016 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7017 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7017 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7018 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7018 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7019 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7019 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7020 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7020 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7021 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7021 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7022 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7022 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7023 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7023 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7024 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7024 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7025 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7025 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7026 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7026 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7027 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7027 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7028 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7028 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7029 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7029 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7030 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7030 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7031 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7031 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7032 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7032 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7033 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7033 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7034 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7034 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7035 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7035 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7036 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7036 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7037 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7037 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7038 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7038 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7039 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7039 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7040 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7040 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7041 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7041 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7042 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7042 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7043 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7043 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7044 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7044 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7045 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7045 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7046 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7046 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7047 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7047 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7048 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7048 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7049 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7049 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7050 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7050 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7052 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7052 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7053 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7053 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7054 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7054 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7055 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7055 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7056 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7056 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7057 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7057 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7058 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7058 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7059 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7059 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7060 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7060 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7061 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7061 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7062 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7062 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7063 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7063 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7064 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7064 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7065 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7065 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7066 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7066 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7067 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7067 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7068 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7068 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7069 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7069 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7070 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7070 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7071 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7071 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7072 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7072 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7073 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7073 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7075 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7075 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7076 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7076 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7077 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7077 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7078 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7078 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7079 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7079 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7080 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7080 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7082 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7082 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7083 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7083 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7084 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7084 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7085 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7085 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7086 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7086 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7087 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7087 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7088 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7088 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7089 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7089 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7090 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7090 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7091 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7091 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7092 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7092 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7093 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7093 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7098 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7098 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7099 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7099 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7100 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7100 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7101 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7101 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7102 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7102 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7103 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7103 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7104 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7104 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7106 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7106 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7107 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7107 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7108 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7108 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7109 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7109 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7111 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7111 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7113 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7113 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7115 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7115 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7116 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7116 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7117 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7117 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7118 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7118 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7119 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7119 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7120 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7120 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7121 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7121 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7122 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7122 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7123 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7123 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7124 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7124 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7125 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7125 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7127 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7127 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7128 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7128 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7129 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7129 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7131 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7131 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7132 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7132 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7134 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7134 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7135 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7135 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7136 - http://packetstormsecurity.com/files/129474/K7-Computing-Multiple-Products-K7FWFilt.sys-Privilege-Escalation.html +CVE-2014-7137 - http://packetstormsecurity.com/files/129175/Dolibarr-ERP-And-CRM-3.5.3-SQL-Injection.html +CVE-2014-7138 - http://packetstormsecurity.com/files/128626/WordPress-Google-Calendar-Events-2.0.1-Cross-Site-Scripting.html +CVE-2014-7139 - http://packetstormsecurity.com/files/128625/WordPress-Contact-Form-DB-2.8.13-Cross-Site-Scripting.html +CVE-2014-7145 - http://www.ubuntu.com/usn/USN-2394-1 +CVE-2014-7146 - http://www.mantisbt.org/bugs/view.php?id=17725 +CVE-2014-7151 - https://research.g0blin.co.uk/cve-2014-7151/ +CVE-2014-7151 - https://wpvulndb.com/vulnerabilities/8237 +CVE-2014-7152 - http://research.g0blin.co.uk/cve-2014-7152/ +CVE-2014-7153 - http://packetstormsecurity.com/files/128118/WordPress-Huge-IT-Image-Gallery-1.0.0-SQL-Injection.html +CVE-2014-7157 - http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html +CVE-2014-7157 - http://seclists.org/fulldisclosure/2014/Sep/108 +CVE-2014-7158 - http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html +CVE-2014-7158 - http://seclists.org/fulldisclosure/2014/Sep/108 +CVE-2014-7169 - http://linux.oracle.com/errata/ELSA-2014-1306.html +CVE-2014-7169 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html +CVE-2014-7169 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html +CVE-2014-7169 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 +CVE-2014-7169 - http://www.qnap.com/i/en/support/con_show.php?cid=61 +CVE-2014-7169 - http://www.ubuntu.com/usn/USN-2363-1 +CVE-2014-7169 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2014-7169 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 +CVE-2014-7169 - https://www.exploit-db.com/exploits/34879/ +CVE-2014-7173 - https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html +CVE-2014-7174 - https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html +CVE-2014-7175 - https://www.justanotherhacker.com/2016/09/jahx164_-_farlinx_x25_gateway_multiple_vulnerabilities.html +CVE-2014-7176 - http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html +CVE-2014-7177 - http://seclists.org/fulldisclosure/2014/Oct/120 +CVE-2014-7178 - http://seclists.org/fulldisclosure/2014/Oct/121 +CVE-2014-7180 - http://packetstormsecurity.com/files/128819/ElectricCommander-4.2.4.71224-Privilege-Escalation.html +CVE-2014-7181 - http://packetstormsecurity.com/files/128693/WordPress-MaxButtons-1.26.0-Cross-Site-Scripting.html +CVE-2014-7182 - http://packetstormsecurity.com/files/128694/WordPress-WP-Google-Maps-6.0.26-Cross-Site-Scripting.html +CVE-2014-7183 - http://packetstormsecurity.com/files/128768/LiteCart-1.1.2.1-Cross-Site-Scripting.html +CVE-2014-7183 - https://www.netsparker.com/xss-vulnerabilities-in-litecart/ +CVE-2014-7185 - http://www.openwall.com/lists/oss-security/2014/09/23/5 +CVE-2014-7185 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-7185 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-7185 - https://bugzilla.redhat.com/show_bug.cgi?id=1146026 +CVE-2014-7186 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html +CVE-2014-7186 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html +CVE-2014-7186 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 +CVE-2014-7186 - http://www.qnap.com/i/en/support/con_show.php?cid=61 +CVE-2014-7186 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 +CVE-2014-7187 - http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html +CVE-2014-7187 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html +CVE-2014-7187 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 +CVE-2014-7187 - http://www.qnap.com/i/en/support/con_show.php?cid=61 +CVE-2014-7187 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 +CVE-2014-7188 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf +CVE-2014-7190 - http://packetstormsecurity.com/files/128455/Openfiler-2.99.1-Denial-Of-Service.html +CVE-2014-7190 - http://seclists.org/fulldisclosure/2014/Sep/109 +CVE-2014-7191 - https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8 +CVE-2014-7194 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-7195 - http://www.tibco.com/mk/advisory.jsp +CVE-2014-7200 - http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-7200 - http://seclists.org/fulldisclosure/2014/Sep/89 +CVE-2014-7201 - http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-7201 - http://seclists.org/fulldisclosure/2014/Sep/89 +CVE-2014-7202 - https://github.com/zeromq/libzmq/issues/1190 +CVE-2014-7205 - https://www.exploit-db.com/exploits/40689/ +CVE-2014-7208 - http://seclists.org/fulldisclosure/2014/Dec/77 +CVE-2014-7208 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-7216 - http://packetstormsecurity.com/files/133443/Yahoo-Messenger-11.5.0.228-Buffer-Overflow.html +CVE-2014-7216 - http://seclists.org/fulldisclosure/2015/Sep/24 +CVE-2014-7216 - https://www.rcesecurity.com/2015/09/cve-2014-7216-a-journey-through-yahoos-bug-bounty-program/ +CVE-2014-7221 - https://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html +CVE-2014-7222 - http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html +CVE-2014-7226 - http://packetstormsecurity.com/files/128532/HTTP-File-Server-2.3a-2.3b-2.3c-Remote-Command-Execution.html +CVE-2014-7226 - http://www.exploit-db.com/exploits/34852 +CVE-2014-7228 - http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/ +CVE-2014-7228 - https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html +CVE-2014-7235 - http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html +CVE-2014-7235 - https://www.exploit-db.com/exploits/41005/ +CVE-2014-7236 - http://packetstormsecurity.com/files/128623/Twiki-Perl-Code-Execution.html +CVE-2014-7238 - https://wpvulndb.com/vulnerabilities/8235 +CVE-2014-7240 - https://g0blin.co.uk/cve-2014-7240/ +CVE-2014-7240 - https://wpvulndb.com/vulnerabilities/8234 +CVE-2014-7271 - https://github.com/sddm/sddm/pull/279/files +CVE-2014-7272 - https://github.com/sddm/sddm/pull/280 +CVE-2014-7277 - http://packetstormsecurity.com/files/128551/ZyXEL-SBG-3300-Security-Gateway-Cross-Site-Scripting.html +CVE-2014-7278 - http://packetstormsecurity.com/files/128550/ZyXEL-SBG-3300-Security-Gateway-Denial-Of-Service.html +CVE-2014-7280 - http://packetstormsecurity.com/files/128579/Nessus-Web-UI-2.3.3-Cross-Site-Scripting.html +CVE-2014-7280 - http://seclists.org/fulldisclosure/2014/Oct/26 +CVE-2014-7280 - http://www.exploit-db.com/exploits/34929 +CVE-2014-7280 - http://www.tenable.com/security/tns-2014-08 +CVE-2014-7281 - http://packetstormsecurity.com/files/128671/Tenda-A32-Cross-Site-Request-Forgery.html +CVE-2014-7284 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 +CVE-2014-7285 - http://packetstormsecurity.com/files/130612/Symantec-Web-Gateway-5-restore.php-Command-Injection.html +CVE-2014-7289 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html +CVE-2014-7289 - http://seclists.org/fulldisclosure/2015/Jan/91 +CVE-2014-7290 - http://packetstormsecurity.com/files/129114/Atlas-Systems-Aeon-3.5-3.6-Cross-Site-Scripting.html +CVE-2014-7290 - http://seclists.org/fulldisclosure/2014/Nov/32 +CVE-2014-7292 - http://packetstormsecurity.com/files/128749/Newtelligence-dasBlog-2.3-Open-Redirect.html +CVE-2014-7293 - http://seclists.org/fulldisclosure/2014/Dec/125 +CVE-2014-7294 - http://packetstormsecurity.com/files/129756/Ex-Libris-Patron-Directory-Services-2.1-Open-Redirect.html +CVE-2014-7294 - http://seclists.org/fulldisclosure/2014/Dec/127 +CVE-2014-7297 - https://wpvulndb.com/vulnerabilities/9809 +CVE-2014-7298 - http://www.centrify.com/support/announcements.asp#20141014 +CVE-2014-7301 - https://packetstormsecurity.com/files/129466/SGI-Tempo-Database-Password-Disclosure.html +CVE-2014-7302 - http://packetstormsecurity.com/files/129465/SGI-Tempo-vx-Setuid-Privilege-Escalation.html +CVE-2014-7302 - https://labs.mwrinfosecurity.com/advisories/2014/12/02/sgi-suid-root-privilege-escalation/ +CVE-2014-7303 - https://packetstormsecurity.com/files/129467/SGI-Tempo-Database-Exposure.html +CVE-2014-7307 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7307 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7309 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7309 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7310 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7310 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7313 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7313 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7314 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7314 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7315 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7315 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7316 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7316 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7317 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7317 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7320 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7320 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7321 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7321 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7323 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7323 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7325 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7325 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7326 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7326 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7327 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7327 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7328 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7328 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7329 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7329 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7330 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7330 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7331 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7331 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7333 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7333 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7334 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7334 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7335 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7335 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7336 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7336 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7337 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7337 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7338 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7338 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7339 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7339 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7340 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7340 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7341 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7341 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7342 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7342 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7344 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7344 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7345 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7345 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7346 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7346 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7348 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7348 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7351 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7351 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7352 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7352 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7353 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7353 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7354 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7354 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7357 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7357 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7358 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7358 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7359 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7359 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7360 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7360 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7361 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7361 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7362 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7362 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7364 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7364 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7366 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7366 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7367 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7367 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7368 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7368 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7369 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7369 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7370 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7370 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7371 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7371 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7372 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7372 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7373 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7373 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7374 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7374 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7375 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7375 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7376 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7376 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7378 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7378 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7379 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7379 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7380 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7380 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7382 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7382 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7384 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7384 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7385 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7385 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7387 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7387 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7388 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7388 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7389 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7389 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7390 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7390 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7391 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7391 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7392 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7392 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7393 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7393 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7394 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7394 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7395 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7395 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7396 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7396 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7397 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7397 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7398 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7398 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7399 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7399 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7402 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7402 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7403 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7403 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7405 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7405 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7406 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7406 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7407 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7407 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7408 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7408 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7409 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7409 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7410 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7410 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7413 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7413 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7414 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7414 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7415 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7415 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7416 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7416 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7417 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7417 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7418 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7418 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7419 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7419 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7420 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7420 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7421 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7421 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7422 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7422 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7423 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7423 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7424 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7424 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7425 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7425 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7427 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7427 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7428 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7428 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7430 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7430 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7431 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7431 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7432 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7432 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7433 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7433 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7434 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7434 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7435 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7435 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7436 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7436 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7437 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7437 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7439 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7439 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7441 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7441 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7443 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7443 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7444 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7444 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7445 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7445 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7446 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7446 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7447 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7447 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7448 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7448 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7449 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7449 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7450 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7450 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7452 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7452 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7454 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7454 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7455 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7455 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7456 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7456 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7457 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7457 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7458 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7458 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7459 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7459 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7460 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7460 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7461 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7461 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7462 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7462 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7463 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7463 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7464 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7464 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7465 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7465 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7466 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7466 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7467 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7467 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7468 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7468 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7469 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7469 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7470 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7470 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7471 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7471 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7472 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7472 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7475 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7475 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7476 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7476 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7478 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7478 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7481 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7481 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7483 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7483 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7484 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7484 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7485 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7485 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7486 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7486 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7487 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7487 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7488 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7488 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7490 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7490 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7491 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7491 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7492 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7492 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7493 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7493 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7494 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7494 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7495 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7495 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7497 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7498 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7498 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7499 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7499 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7501 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7501 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7502 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7502 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7505 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7505 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7506 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7506 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7507 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7507 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7508 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7508 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7509 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7509 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7510 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7510 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7513 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7513 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7515 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7515 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7516 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7516 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7517 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7517 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7518 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7518 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7519 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7519 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7520 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7520 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7521 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7521 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7522 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7522 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7523 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7523 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7524 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7524 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7525 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7525 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7526 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7526 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7527 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7527 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7528 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7528 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7529 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7529 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7530 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7530 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7532 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7532 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7533 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7533 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7534 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7534 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7535 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7535 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7536 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7536 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7538 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7538 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7539 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7539 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7542 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7542 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7543 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7543 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7544 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7544 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7546 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7546 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7547 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7547 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7550 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7550 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7551 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7551 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7552 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7552 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7553 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7553 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7554 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7554 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7555 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7555 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7557 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7557 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7558 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7558 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7559 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7559 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7560 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7560 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7562 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7562 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7563 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7563 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7564 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7564 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7565 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7565 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7566 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7566 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7567 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7567 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7568 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7568 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7569 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7569 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7570 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7570 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7571 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7571 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7572 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7572 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7573 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7573 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7575 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7575 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7576 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7576 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7577 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7577 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7578 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7578 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7580 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7580 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7581 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7581 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7582 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7582 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7584 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7584 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7585 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7585 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7587 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7587 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7589 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7589 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7590 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7590 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7591 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7591 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7592 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7592 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7593 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7593 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7595 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7595 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7596 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7596 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7597 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7597 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7598 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7598 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7602 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7602 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7603 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7603 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7604 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7604 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7605 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7605 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7606 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7606 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7607 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7607 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7608 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7608 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7609 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7609 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7610 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7610 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7611 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7611 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7612 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7612 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7613 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7613 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7614 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7614 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7616 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7616 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7617 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7617 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7618 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7618 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7620 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7620 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7621 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7621 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7622 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7622 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7624 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7624 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7626 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7626 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7628 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7628 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7629 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7629 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7630 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7630 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7631 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7631 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7632 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7632 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7633 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7633 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7634 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7634 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7636 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7636 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7638 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7638 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7640 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7640 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7642 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7642 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7643 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7643 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7644 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7644 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7646 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7646 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7647 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7647 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7648 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7648 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7649 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7649 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7650 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7650 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7652 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7652 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7655 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7655 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7656 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7656 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7659 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7659 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7660 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7660 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7661 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7661 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7663 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7663 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7664 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7664 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7666 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7666 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7667 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7667 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7668 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7668 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7670 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7670 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7671 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7671 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7674 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7674 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7676 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7676 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7677 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7677 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7681 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7681 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7682 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7682 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7683 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7683 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7685 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7685 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7686 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7686 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7688 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7688 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7689 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7689 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7690 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7690 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7691 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7691 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7692 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7692 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7693 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7693 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7694 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7694 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7695 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7695 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7696 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7696 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7697 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7697 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7698 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7698 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7700 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7700 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7701 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7701 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7702 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7702 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7703 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7703 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7705 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7705 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7707 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7707 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7708 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7708 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7710 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7710 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7712 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7712 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7713 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7713 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7714 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7714 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7715 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7715 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7716 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7716 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7717 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7717 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7718 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7718 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7719 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7719 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7720 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7720 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7721 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7721 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7722 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7722 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7723 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7723 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7724 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7724 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7725 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7725 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7726 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7726 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7727 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7727 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7728 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7728 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7731 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7731 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7733 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7733 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7734 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7734 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7735 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7735 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7737 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7737 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7739 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7739 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7740 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7740 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7741 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7741 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7742 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7742 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7743 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7743 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7744 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7744 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7745 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7745 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7746 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7746 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7748 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7748 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7749 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7749 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7750 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7750 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7751 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7751 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7752 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7752 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7753 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7754 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7754 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7755 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7755 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7756 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7756 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7757 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7757 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7758 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7758 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7759 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7759 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7760 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7760 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7761 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7761 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7762 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7762 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7763 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7763 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7764 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7764 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7765 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7765 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7766 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7766 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7767 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7767 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7768 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7768 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7769 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7769 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7770 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7770 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7771 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7771 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7772 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7772 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7773 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7773 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7774 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7774 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7775 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7775 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7776 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7776 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7777 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7777 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7778 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7778 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7779 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7779 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7780 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7780 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7781 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7781 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7782 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7782 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7783 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7783 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7784 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7784 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7785 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7785 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7786 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7786 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7787 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7787 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7788 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7788 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7789 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7789 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7791 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7791 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7793 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7793 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7794 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7794 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7795 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7795 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7796 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7796 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7797 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7797 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7798 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7798 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7799 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7799 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7800 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7800 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7802 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7802 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7803 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7803 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7804 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-7804 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-7809 - http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html +CVE-2014-7809 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-7809 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-7809 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-7810 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-7810 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-7810 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-7817 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2014-7817 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2014-7818 - https://puppet.com/security/cve/cve-2014-7829 +CVE-2014-7821 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-7822 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-7822 - http://www.ubuntu.com/usn/USN-2543-1 +CVE-2014-7822 - https://www.exploit-db.com/exploits/36743/ +CVE-2014-7829 - https://hackerone.com/reports/43440 +CVE-2014-7829 - https://puppet.com/security/cve/cve-2014-7829 +CVE-2014-7840 - https://bugzilla.redhat.com/show_bug.cgi?id=1163075 +CVE-2014-7841 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 +CVE-2014-7841 - https://bugzilla.redhat.com/show_bug.cgi?id=1163087 +CVE-2014-7842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-7842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-7842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-7842 - https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 +CVE-2014-7843 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 +CVE-2014-7857 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html +CVE-2014-7858 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html +CVE-2014-7859 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html +CVE-2014-7860 - http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html +CVE-2014-7862 - http://packetstormsecurity.com/files/129769/Desktop-Central-Add-Administrator.html +CVE-2014-7862 - http://seclists.org/fulldisclosure/2015/Jan/2 +CVE-2014-7862 - https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_dc9_admin.txt +CVE-2014-7863 - http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html +CVE-2014-7863 - http://seclists.org/fulldisclosure/2015/Jan/114 +CVE-2014-7864 - http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html +CVE-2014-7864 - http://seclists.org/fulldisclosure/2015/Jan/114 +CVE-2014-7866 - http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html +CVE-2014-7866 - http://seclists.org/fulldisclosure/2014/Nov/21 +CVE-2014-7868 - http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html +CVE-2014-7868 - http://seclists.org/fulldisclosure/2014/Nov/21 +CVE-2014-7870 - http://seclists.org/fulldisclosure/2014/Apr/41 +CVE-2014-7871 - http://packetstormsecurity.com/files/129020/OX-App-Suite-7.6.0-SQL-Injection.html +CVE-2014-7872 - http://packetstormsecurity.com/files/135841/Comodo-Internet-Security-VNC-Server-Exposure.html +CVE-2014-7872 - https://www.exploit-db.com/exploits/37065/ +CVE-2014-7884 - http://www.kb.cert.org/vuls/id/868948 +CVE-2014-7885 - http://www.kb.cert.org/vuls/id/868948 +CVE-2014-7910 - https://www.exploit-db.com/exploits/34879/ +CVE-2014-7911 - http://seclists.org/fulldisclosure/2014/Nov/51 +CVE-2014-7922 - http://isciurus.blogspot.com/2015/01/android-app-with-full-control-over-your.html +CVE-2014-7922 - https://gist.github.com/isciurus/df4d7edd9c3efb4a0753 +CVE-2014-7923 - http://bugs.icu-project.org/trac/ticket/11370 +CVE-2014-7923 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-7923 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-7926 - http://bugs.icu-project.org/trac/ticket/11369 +CVE-2014-7926 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-7926 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-7940 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-7940 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-7951 - http://packetstormsecurity.com/files/131510/ADB-Backup-Traversal-File-Overwrite.html +CVE-2014-7951 - https://www.exploit-db.com/exploits/36813/ +CVE-2014-7952 - http://packetstormsecurity.com/files/132645/ADB-Backup-APK-Injection.html +CVE-2014-7952 - http://seclists.org/fulldisclosure/2015/Jul/46 +CVE-2014-7952 - http://www.search-lab.hu/about-us/news/110-android-adb-backup-apk-injection-vulnerability +CVE-2014-7952 - https://github.com/irsl/ADB-Backup-APK-Injection/ +CVE-2014-7954 - http://packetstormsecurity.com/files/131509/Android-4.4-MTP-Path-Traversal.html +CVE-2014-7956 - http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html +CVE-2014-7956 - http://seclists.org/fulldisclosure/2015/Jan/26 +CVE-2014-7957 - http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html +CVE-2014-7957 - http://seclists.org/fulldisclosure/2015/Jan/26 +CVE-2014-7958 - http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html +CVE-2014-7959 - http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html +CVE-2014-7960 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-7970 - http://www.openwall.com/lists/oss-security/2014/10/08/21 +CVE-2014-7970 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2014-7985 - http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html +CVE-2014-7986 - http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html +CVE-2014-7987 - http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html +CVE-2014-8069 - http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html +CVE-2014-8070 - http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html +CVE-2014-8071 - http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html +CVE-2014-8072 - http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html +CVE-2014-8073 - http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html +CVE-2014-8080 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-8082 - http://packetstormsecurity.com/files/128824/TestLink-1.9.12-Path-Disclosure.html +CVE-2014-8083 - http://packetstormsecurity.com/files/129775/Osclass-3.4.2-SQL-Injection.html +CVE-2014-8083 - http://seclists.org/fulldisclosure/2014/Dec/132 +CVE-2014-8084 - http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html +CVE-2014-8084 - http://seclists.org/fulldisclosure/2014/Dec/133 +CVE-2014-8085 - http://packetstormsecurity.com/files/129777/Osclass-3.4.2-Shell-Upload.html +CVE-2014-8085 - http://seclists.org/fulldisclosure/2014/Dec/134 +CVE-2014-8087 - https://g0blin.co.uk/cve-2014-8087/ +CVE-2014-8087 - https://wpvulndb.com/vulnerabilities/8240 +CVE-2014-8088 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8090 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-8091 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8091 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8091 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8092 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8093 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8093 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8094 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8095 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8095 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8095 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8096 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8096 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8096 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8097 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8097 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8097 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8098 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8098 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8099 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8100 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8100 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8100 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8101 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8101 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8102 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8102 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8102 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8103 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8109 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2014-8109 - https://bugzilla.redhat.com/show_bug.cgi?id=1174077 +CVE-2014-8116 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-8116 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8116 - http://www.ubuntu.com/usn/USN-2494-1 +CVE-2014-8117 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-8117 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8117 - http://www.ubuntu.com/usn/USN-2494-1 +CVE-2014-8124 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8134 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-8137 - http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html +CVE-2014-8137 - http://www.ubuntu.com/usn/USN-2483-2 +CVE-2014-8138 - http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html +CVE-2014-8138 - http://www.ubuntu.com/usn/USN-2483-2 +CVE-2014-8142 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8142 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-8142 - https://bugs.php.net/bug.php?id=68594 +CVE-2014-8145 - http://packetstormsecurity.com/files/129699/SoX-14.4.1-Heap-Buffer-Overflow.html +CVE-2014-8145 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8146 - http://bugs.icu-project.org/trac/changeset/37162 +CVE-2014-8146 - http://openwall.com/lists/oss-security/2015/05/05/6 +CVE-2014-8146 - http://seclists.org/fulldisclosure/2015/May/14 +CVE-2014-8146 - http://www.kb.cert.org/vuls/id/602540 +CVE-2014-8146 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8146 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-8147 - http://bugs.icu-project.org/trac/changeset/37080 +CVE-2014-8147 - http://openwall.com/lists/oss-security/2015/05/05/6 +CVE-2014-8147 - http://seclists.org/fulldisclosure/2015/May/14 +CVE-2014-8147 - http://www.kb.cert.org/vuls/id/602540 +CVE-2014-8147 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8147 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-8150 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8150 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-8150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8150 - https://hackerone.com/reports/73242 +CVE-2014-8157 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-8157 - http://www.ubuntu.com/usn/USN-2483-2 +CVE-2014-8158 - http://www.ubuntu.com/usn/USN-2483-2 +CVE-2014-8160 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2014-8160 - https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b +CVE-2014-8169 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8240 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8240 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8241 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-8241 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8243 - http://www.kb.cert.org/vuls/id/447516 +CVE-2014-8244 - http://www.kb.cert.org/vuls/id/447516 +CVE-2014-8246 - http://www.kb.cert.org/vuls/id/343060 +CVE-2014-8247 - http://www.kb.cert.org/vuls/id/343060 +CVE-2014-8248 - http://www.kb.cert.org/vuls/id/343060 +CVE-2014-8266 - http://www.kb.cert.org/vuls/id/546340 +CVE-2014-8267 - http://www.kb.cert.org/vuls/id/546340 +CVE-2014-8268 - http://www.kb.cert.org/vuls/id/546340 +CVE-2014-8269 - http://www.kb.cert.org/vuls/id/659684 +CVE-2014-8272 - http://www.kb.cert.org/vuls/id/843044 +CVE-2014-8272 - http://www.kb.cert.org/vuls/id/BLUU-9RDQHM +CVE-2014-8275 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2014-8275 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-8275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2014-8275 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2014-8293 - http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html +CVE-2014-8294 - http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html +CVE-2014-8295 - http://packetstormsecurity.com/files/128480/Bacula-web-5.2.10-SQL-Injection.html +CVE-2014-8295 - http://www.exploit-db.com/exploits/34851 +CVE-2014-8296 - https://www.drupal.org/node/2189751 +CVE-2014-8298 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8305 - http://seclists.org/fulldisclosure/2014/Sep/55 +CVE-2014-8306 - http://seclists.org/fulldisclosure/2014/Sep/55 +CVE-2014-8307 - http://seclists.org/fulldisclosure/2014/Sep/55 +CVE-2014-8308 - http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html +CVE-2014-8310 - http://packetstormsecurity.com/files/128600/SAP-Business-Objects-Denial-Of-Service-Via-CORBA.html +CVE-2014-8311 - http://packetstormsecurity.com/files/128601/SAP-Business-Objects-Information-Disclosure-Via-CORBA.html +CVE-2014-8312 - http://packetstormsecurity.com/files/128603/SAP-Business-Warehouse-Missing-Authorization-Check.html +CVE-2014-8313 - http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html +CVE-2014-8314 - http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html +CVE-2014-8316 - http://packetstormsecurity.com/files/128633/SAP-BusinessObjects-Explorer-14.0.5-XXE-Injection.html +CVE-2014-8319 - http://www.securityfocus.com/bid/65527 +CVE-2014-8320 - http://seclists.org/fulldisclosure/2014/Apr/41 +CVE-2014-8321 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html +CVE-2014-8322 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html +CVE-2014-8323 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html +CVE-2014-8324 - http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html +CVE-2014-8325 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-013/ +CVE-2014-8325 - http://www.openwall.com/lists/oss-security/2014/10/17/11 +CVE-2014-8327 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-014/ +CVE-2014-8329 - http://seclists.org/fulldisclosure/2014/Jul/40 +CVE-2014-8330 - http://packetstormsecurity.com/files/127827/Espo-CRM-Cross-Site-Scripting.html +CVE-2014-8334 - http://packetstormsecurity.com/files/128785/WordPress-Database-Manager-2.7.1-Command-Injection-Credential-Leak.html +CVE-2014-8334 - http://seclists.org/fulldisclosure/2014/Oct/99 +CVE-2014-8334 - http://seclists.org/oss-sec/2014/q4/365 +CVE-2014-8334 - http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html +CVE-2014-8335 - http://packetstormsecurity.com/files/128785/WordPress-Database-Manager-2.7.1-Command-Injection-Credential-Leak.html +CVE-2014-8335 - http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html +CVE-2014-8336 - http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html +CVE-2014-8337 - http://packetstormsecurity.com/files/128979/HelpDEZk-1.0.1-Unrestricted-File-Upload.html +CVE-2014-8338 - https://packetstormsecurity.com/files/128997/Drupal-7-Videowhisper-Cross-Site-Scripting.html +CVE-2014-8339 - http://packetstormsecurity.com/files/128909/Nuevolabs-Nuevoplayer-For-Clipshare-SQL-Injection.html +CVE-2014-8339 - http://www.youtube.com/watch?v=_-oOI1LnEdk +CVE-2014-8340 - http://packetstormsecurity.com/files/129445/phpTrafficA-2.3-SQL-Injection.html +CVE-2014-8347 - http://packetstormsecurity.com/files/128853/Filemaker-Login-Bypass-Privilege-Escalation.html +CVE-2014-8349 - http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html +CVE-2014-8351 - http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-8351 - http://seclists.org/fulldisclosure/2014/Nov/3 +CVE-2014-8351 - https://github.com/LaboCNIL/CookieViz/commit/489b6050f6c53fe7b24c4bed3eeb9c25543960e2 +CVE-2014-8352 - http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-8352 - http://seclists.org/fulldisclosure/2014/Nov/3 +CVE-2014-8352 - https://github.com/LaboCNIL/CookieViz/commit/489b6050f6c53fe7b24c4bed3eeb9c25543960e2 +CVE-2014-8354 - http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html +CVE-2014-8355 - http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html +CVE-2014-8356 - http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html +CVE-2014-8356 - https://www.exploit-db.com/exploits/38453/ +CVE-2014-8357 - http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html +CVE-2014-8357 - https://www.exploit-db.com/exploits/38453/ +CVE-2014-8358 - https://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html +CVE-2014-8359 - http://osandamalith.wordpress.com/2014/10/20/escalating-local-privileges-using-mobile-partner/ +CVE-2014-8359 - http://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html +CVE-2014-8361 - http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html +CVE-2014-8361 - https://www.exploit-db.com/exploits/37169/ +CVE-2014-8362 - http://packetstormsecurity.com/files/136040/Vivint-Sky-Control-Panel-Unauthenticated-Access.html +CVE-2014-8363 - http://packetstormsecurity.com/files/127771/WordPress-WPSS-0.62-SQL-Injection.html +CVE-2014-8364 - http://packetstormsecurity.com/files/127770/WordPress-WPSS-0.62-Cross-Site-Scripting.html +CVE-2014-8365 - http://packetstormsecurity.com/files/127003/Xornic-Contact-Us-Form-CAPTCHA-Bypass-XSS.html +CVE-2014-8366 - http://packetstormsecurity.com/files/127284/openSIS-5.3-SQL-Injection.html +CVE-2014-8366 - http://seclists.org/fulldisclosure/2014/Jun/151 +CVE-2014-8371 - http://seclists.org/fulldisclosure/2014/Dec/23 +CVE-2014-8371 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html +CVE-2014-8373 - http://packetstormsecurity.com/files/129455/VMware-Security-Advisory-2014-0013.html +CVE-2014-8373 - http://seclists.org/fulldisclosure/2014/Dec/33 +CVE-2014-8375 - http://packetstormsecurity.com/files/127833/WordPress-GB-Gallery-Slideshow-1.5-SQL-Injection.html +CVE-2014-8375 - http://www.homelab.it/index.php/2014/08/10/wordpress-gb-gallery-slideshow +CVE-2014-8377 - http://packetstormsecurity.com/files/127946/Webasyst-Shop-Script-5.2.2.30933-Cross-Site-Scripting.html +CVE-2014-8380 - http://packetstormsecurity.com/files/126813/Splunk-6.1.1-Cross-Site-Scripting.html +CVE-2014-8380 - https://www.exploit-db.com/exploits/40997/ +CVE-2014-8381 - http://packetstormsecurity.com/files/128725/Megapolis.Portal-Manager-Cross-Site-Scripting.html +CVE-2014-8381 - http://seclists.org/fulldisclosure/2014/Oct/77 +CVE-2014-8383 - http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html +CVE-2014-8383 - http://seclists.org/fulldisclosure/2015/Apr/88 +CVE-2014-8383 - http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities +CVE-2014-8384 - http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html +CVE-2014-8384 - http://seclists.org/fulldisclosure/2015/Apr/88 +CVE-2014-8384 - http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities +CVE-2014-8386 - http://seclists.org/fulldisclosure/2014/Nov/57 +CVE-2014-8386 - http://www.coresecurity.com/advisories/advantech-adamView-buffer-overflow +CVE-2014-8387 - http://seclists.org/fulldisclosure/2014/Nov/58 +CVE-2014-8387 - http://www.coresecurity.com/advisories/advantech-eki-6340-command-injection +CVE-2014-8389 - http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html +CVE-2014-8389 - http://seclists.org/fulldisclosure/2015/Jul/29 +CVE-2014-8389 - https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection +CVE-2014-8390 - http://www.coresecurity.com/advisories/schneider-vampset-stack-and-heap-buffer-overflow +CVE-2014-8391 - http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html +CVE-2014-8391 - http://seclists.org/fulldisclosure/2015/May/95 +CVE-2014-8391 - https://www.exploit-db.com/exploits/37114/ +CVE-2014-8393 - http://packetstormsecurity.com/files/129922/Corel-Software-DLL-Hijacking.html +CVE-2014-8393 - http://seclists.org/fulldisclosure/2015/Jan/33 +CVE-2014-8393 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking +CVE-2014-8394 - http://seclists.org/fulldisclosure/2015/Jan/33 +CVE-2014-8394 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking +CVE-2014-8395 - http://seclists.org/fulldisclosure/2015/Jan/33 +CVE-2014-8395 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking +CVE-2014-8396 - http://seclists.org/fulldisclosure/2015/Jan/33 +CVE-2014-8396 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking +CVE-2014-8397 - http://seclists.org/fulldisclosure/2015/Jan/33 +CVE-2014-8397 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking +CVE-2014-8398 - http://seclists.org/fulldisclosure/2015/Jan/33 +CVE-2014-8398 - http://www.coresecurity.com/advisories/corel-software-dll-hijacking +CVE-2014-8419 - http://packetstormsecurity.com/files/129234/CodeMeter-Weak-Service-Permissions.html +CVE-2014-8426 - http://packetstormsecurity.com/files/130027/Barracuda-Load-Balancer-ADC-Key-Recovery-Password-Reset.html +CVE-2014-8428 - http://packetstormsecurity.com/files/130027/Barracuda-Load-Balancer-ADC-Key-Recovery-Password-Reset.html +CVE-2014-8440 - https://www.exploit-db.com/exploits/36880/ +CVE-2014-8469 - http://packetstormsecurity.com/files/129153/PHPFox-Cross-Site-Scripting.html +CVE-2014-8475 - http://packetstormsecurity.com/files/128972/FreeBSD-Security-Advisory-sshd-Denial-Of-Service.html +CVE-2014-8480 - http://www.openwall.com/lists/oss-security/2014/10/23/7 +CVE-2014-8481 - http://www.openwall.com/lists/oss-security/2014/10/23/7 +CVE-2014-8484 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8485 - http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html +CVE-2014-8485 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8489 - http://packetstormsecurity.com/files/129454/PingFederate-6.10.1-SP-Endpoints-Open-Redirect.html +CVE-2014-8489 - http://seclists.org/fulldisclosure/2014/Dec/35 +CVE-2014-8491 - https://g0blin.co.uk/cve-2014-8491/ +CVE-2014-8491 - https://wpvulndb.com/vulnerabilities/8238 +CVE-2014-8492 - https://g0blin.co.uk/cve-2014-8492/ +CVE-2014-8492 - https://wpvulndb.com/vulnerabilities/8239 +CVE-2014-8493 - http://packetstormsecurity.com/files/129139/ZTE-ZXHN-H108L-Access-Bypass.html +CVE-2014-8493 - http://seclists.org/fulldisclosure/2014/Nov/46 +CVE-2014-8493 - http://www.exploit-db.com/exploits/35272 +CVE-2014-8493 - http://www.exploit-db.com/exploits/35276 +CVE-2014-8494 - http://packetstormsecurity.com/files/128868/ESTsoft-ALUpdate-8.5.1.0.0-Privilege-Escalation.html +CVE-2014-8496 - https://www.youtube.com/watch?v=La9nMeVCtt4 +CVE-2014-8498 - http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html +CVE-2014-8498 - http://seclists.org/fulldisclosure/2014/Nov/18 +CVE-2014-8498 - http://www.exploit-db.com/exploits/35210 +CVE-2014-8499 - http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html +CVE-2014-8499 - http://seclists.org/fulldisclosure/2014/Nov/18 +CVE-2014-8499 - http://www.exploit-db.com/exploits/35210 +CVE-2014-8500 - http://www.kb.cert.org/vuls/id/264212 +CVE-2014-8500 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8500 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-8501 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8502 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8503 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8505 - http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-8506 - http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-8507 - http://packetstormsecurity.com/files/129283/Android-WAPPushManager-SQL-Injection.html +CVE-2014-8507 - http://seclists.org/fulldisclosure/2014/Nov/86 +CVE-2014-8516 - https://packetstormsecurity.com/files/129023 +CVE-2014-8517 - https://www.exploit-db.com/exploits/43112/ +CVE-2014-8520 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8521 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8522 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8523 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8524 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8525 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8526 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8527 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8528 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8529 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8530 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8531 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8532 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8533 - https://kc.mcafee.com/corporate/index?page=content&id=SB10053 +CVE-2014-8538 - http://www.kb.cert.org/vuls/id/582497 +CVE-2014-8538 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing +CVE-2014-8539 - http://packetstormsecurity.com/files/129171/Joomla-Simple-Email-Form-1.8.5-Cross-Site-Scripting.html +CVE-2014-8540 - https://about.gitlab.com/2014/10/30/gitlab-7-4-3-released/ +CVE-2014-8541 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2014-8555 - http://packetstormsecurity.com/files/129052/Progress-OpenEdge-11.2-Directory-Traversal.html +CVE-2014-8557 - http://packetstormsecurity.com/files/129009/JExperts-Tecnologia-Channel-Software-Cross-Site-Scripting.html +CVE-2014-8558 - http://packetstormsecurity.com/files/129010/JExperts-Tecnologia-Channel-Software-Privilege-Escalation.html +CVE-2014-8559 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8561 - http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html +CVE-2014-8561 - http://seclists.org/fulldisclosure/2014/Nov/1 +CVE-2014-8562 - https://bugzilla.redhat.com/show_bug.cgi?id=1159362 +CVE-2014-8562 - https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html +CVE-2014-8566 - http://linux.oracle.com/errata/ELSA-2014-1803.html +CVE-2014-8567 - http://linux.oracle.com/errata/ELSA-2014-1803.html +CVE-2014-8567 - https://github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647 +CVE-2014-8577 - http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html +CVE-2014-8577 - http://www.exploit-db.com/exploits/34959 +CVE-2014-8577 - http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php +CVE-2014-8585 - http://packetstormsecurity.com/files/128852/WordPress-Download-Manager-Arbitrary-File-Download.html +CVE-2014-8586 - http://packetstormsecurity.com/files/128814/WordPress-CP-Multi-View-Event-Calendar-1.01-SQL-Injection.html +CVE-2014-8586 - http://www.exploit-db.com/exploits/35073 +CVE-2014-8592 - https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/ +CVE-2014-8593 - http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-8596 - http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html +CVE-2014-8596 - http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html +CVE-2014-8596 - http://seclists.org/fulldisclosure/2015/Oct/23 +CVE-2014-8601 - http://www.kb.cert.org/vuls/id/264212 +CVE-2014-8602 - http://www.kb.cert.org/vuls/id/264212 +CVE-2014-8602 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8603 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ +CVE-2014-8604 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ +CVE-2014-8605 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ +CVE-2014-8606 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ +CVE-2014-8607 - http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ +CVE-2014-8608 - http://packetstormsecurity.com/files/129470/K7-Computing-Multiple-Products-Null-Pointer-Dereference.html +CVE-2014-8609 - http://packetstormsecurity.com/files/129281/Android-Settings-Pendingintent-Leak.html +CVE-2014-8609 - http://seclists.org/fulldisclosure/2014/Nov/81 +CVE-2014-8610 - http://packetstormsecurity.com/files/129282/Android-SMS-Resend.html +CVE-2014-8610 - http://seclists.org/fulldisclosure/2014/Nov/85 +CVE-2014-8612 - http://seclists.org/fulldisclosure/2015/Jan/107 +CVE-2014-8612 - http://www.coresecurity.com/advisories/freebsd-kernel-multiple-vulnerabilities +CVE-2014-8617 - http://seclists.org/fulldisclosure/2015/Mar/5 +CVE-2014-8621 - https://g0blin.co.uk/cve-2014-8621/ +CVE-2014-8621 - https://wpvulndb.com/vulnerabilities/8241 +CVE-2014-8622 - http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html +CVE-2014-8629 - http://packetstormsecurity.com/files/129112/Pandora-FMS-5.1SP1-Cross-Site-Scripting.html +CVE-2014-8629 - http://seclists.org/fulldisclosure/2014/Nov/35 +CVE-2014-8630 - https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 +CVE-2014-8631 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8632 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8634 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-8635 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8636 - http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html +CVE-2014-8636 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8637 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8638 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-8638 - http://www.securityfocus.com/bid/72047 +CVE-2014-8638 - https://bugzilla.mozilla.org/show_bug.cgi?id=1080987 +CVE-2014-8639 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-8640 - http://www.mozilla.org/security/announce/2014/mfsa2015-05.html +CVE-2014-8640 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8641 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-8642 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8643 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-8643 - https://bugzilla.mozilla.org/show_bug.cgi?id=1117140 +CVE-2014-8652 - http://firebitsbr.wordpress.com/2014/07/16/vsla-security-advisory-fire-scada-dos-2013-001-http-dos-requests-flooding-crash-device-vulnerabilities-elipse-e3-scada-plc/ +CVE-2014-8652 - http://seclists.org/fulldisclosure/2014/Jul/69 +CVE-2014-8653 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html +CVE-2014-8653 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php +CVE-2014-8654 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html +CVE-2014-8654 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php +CVE-2014-8655 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html +CVE-2014-8656 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html +CVE-2014-8656 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php +CVE-2014-8657 - http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html +CVE-2014-8657 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php +CVE-2014-8658 - http://packetstormsecurity.com/files/128907/Confluence-RefinedWiki-Original-Theme-Cross-Site-Scripting.html +CVE-2014-8658 - http://seclists.org/fulldisclosure/2014/Oct/126 +CVE-2014-8664 - http://service.sap.com/sap/support/notes/0001810405 +CVE-2014-8670 - http://packetstormsecurity.com/files/128958/vBulletin-4.2.1-Open-Redirect.html +CVE-2014-8673 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html +CVE-2014-8673 - http://seclists.org/fulldisclosure/2015/Jul/44 +CVE-2014-8673 - https://www.exploit-db.com/exploits/37604/ +CVE-2014-8674 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html +CVE-2014-8674 - http://seclists.org/fulldisclosure/2015/Jul/44 +CVE-2014-8674 - https://www.exploit-db.com/exploits/37604/ +CVE-2014-8675 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html +CVE-2014-8675 - http://seclists.org/fulldisclosure/2015/Jul/44 +CVE-2014-8675 - https://www.exploit-db.com/exploits/37604/ +CVE-2014-8676 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html +CVE-2014-8676 - http://seclists.org/fulldisclosure/2015/Jul/44 +CVE-2014-8676 - https://www.exploit-db.com/exploits/37604/ +CVE-2014-8677 - http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html +CVE-2014-8677 - http://seclists.org/fulldisclosure/2015/Jul/44 +CVE-2014-8677 - https://www.exploit-db.com/exploits/37604/ +CVE-2014-8681 - http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html +CVE-2014-8681 - http://seclists.org/fulldisclosure/2014/Nov/31 +CVE-2014-8681 - http://www.exploit-db.com/exploits/35237 +CVE-2014-8682 - http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html +CVE-2014-8682 - http://seclists.org/fulldisclosure/2014/Nov/33 +CVE-2014-8682 - http://www.exploit-db.com/exploits/35238 +CVE-2014-8683 - http://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html +CVE-2014-8683 - http://seclists.org/fulldisclosure/2014/Nov/34 +CVE-2014-8684 - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html +CVE-2014-8684 - https://github.com/kohana/core/pull/492 +CVE-2014-8686 - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html +CVE-2014-8686 - https://beyondbinary.io/articles/seagate-nas-rce/ +CVE-2014-8686 - https://www.dionach.com/blog/codeigniter-session-decoding-vulnerability +CVE-2014-8687 - http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html +CVE-2014-8687 - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html +CVE-2014-8687 - https://beyondbinary.io/articles/seagate-nas-rce/ +CVE-2014-8687 - https://www.exploit-db.com/exploits/36202/ +CVE-2014-8687 - https://www.exploit-db.com/exploits/36264/ +CVE-2014-8688 - https://blog.zimperium.com/telegram-hack/ +CVE-2014-8690 - http://packetstormsecurity.com/files/130382/Exponent-CMS-2.3.1-Cross-Site-Scripting.html +CVE-2014-8710 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8711 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8711 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8712 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8712 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8713 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-8713 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8713 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8714 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2014-8714 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8714 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8722 - http://packetstormsecurity.com/files/162906/GetSimple-CMS-3.3.4-Information-Disclosure.html +CVE-2014-8724 - http://packetstormsecurity.com/files/129626/W3-Total-Cache-0.9.4-Cross-Site-Scripting.html +CVE-2014-8727 - http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html +CVE-2014-8731 - http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html +CVE-2014-8732 - http://packetstormsecurity.com/files/129090/PHPMemcachedAdmin-1.2.2-Cross-Site-Scripting.html +CVE-2014-8737 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8738 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-8739 - https://www.exploit-db.com/exploits/35057/ +CVE-2014-8739 - https://www.exploit-db.com/exploits/36811/ +CVE-2014-8751 - http://packetstormsecurity.com/files/129443/goYWP-WebPress-13.00.06-Cross-Site-Scripting.html +CVE-2014-8751 - http://seclists.org/fulldisclosure/2014/Dec/34 +CVE-2014-8753 - http://packetstormsecurity.com/files/130392/Cit-e-Net-6-Cross-Site-Scripting.html +CVE-2014-8754 - http://packetstormsecurity.com/files/129290/WordPress-Ad-Manager-1.1.2-Open-Redirect.html +CVE-2014-8757 - http://packetstormsecurity.com/files/130286/LG-On-Screen-Phone-Authentication-Bypass.html +CVE-2014-8757 - http://seclists.org/fulldisclosure/2015/Feb/26 +CVE-2014-8758 - https://g0blin.co.uk/cve-2014-8758/ +CVE-2014-8758 - https://wpvulndb.com/vulnerabilities/8236 +CVE-2014-8766 - http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-8767 - http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html +CVE-2014-8768 - http://packetstormsecurity.com/files/129156/tcpdump-4.6.2-Geonet-Denial-Of-Service.html +CVE-2014-8769 - http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html +CVE-2014-8778 - http://packetstormsecurity.com/files/133437/Checkmarx-CxQL-7.1.5-Sandbox-Bypass.html +CVE-2014-8778 - http://seclists.org/fulldisclosure/2015/Sep/17 +CVE-2014-8779 - http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html +CVE-2014-8780 - https://www.vulnerability-lab.com/get_content.php?id=1373 +CVE-2014-8788 - http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html +CVE-2014-8789 - http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html +CVE-2014-8790 - http://packetstormsecurity.com/files/129778/GetSimple-CMS-3.3.4-XML-External-Entity-Injection.html +CVE-2014-8790 - http://seclists.org/fulldisclosure/2014/Dec/135 +CVE-2014-8791 - http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html +CVE-2014-8793 - http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html +CVE-2014-8793 - http://packetstormsecurity.com/files/129622/Revive-Adserver-3.0.5-Cross-Site-Scripting.html +CVE-2014-8793 - http://www.revive-adserver.com/security/revive-sa-2014-002/ +CVE-2014-8799 - http://www.exploit-db.com/exploits/35346 +CVE-2014-8800 - http://www.exploit-db.com/exploits/35439 +CVE-2014-8801 - http://packetstormsecurity.com/files/129189/Paid-Memberships-Pro-1.7.14.2-Path-Traversal.html +CVE-2014-8801 - http://www.exploit-db.com/exploits/35303 +CVE-2014-8810 - http://www.exploit-db.com/exploits/35505 +CVE-2014-8826 - http://packetstormsecurity.com/files/130147/OS-X-Gatekeeper-Bypass.html +CVE-2014-8826 - https://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html +CVE-2014-8835 - http://packetstormsecurity.com/files/135701/OS-X-Sysmond-XPC-Type-Confusion-Privilege-Escalation.html +CVE-2014-8835 - http://www.exploit-db.com/exploits/35742/ +CVE-2014-8839 - http://www.theregister.co.uk/2015/01/10/spotlight_caught_spreading_your_delicates/ +CVE-2014-8868 - http://seclists.org/fulldisclosure/2014/Dec/2 +CVE-2014-8868 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-011 +CVE-2014-8869 - http://seclists.org/fulldisclosure/2015/Jan/31 +CVE-2014-8869 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0 +CVE-2014-8871 - http://packetstormsecurity.com/files/130444/Hybris-Commerce-Software-Suite-5.x-File-Disclosure-Traversal.html +CVE-2014-8871 - http://seclists.org/fulldisclosure/2015/Feb/63 +CVE-2014-8872 - http://packetstormsecurity.com/files/130040/AVM-FRITZ-Box-Firmware-Signature-Bypass.html +CVE-2014-8872 - http://seclists.org/fulldisclosure/2015/Jan/86 +CVE-2014-8874 - http://seclists.org/fulldisclosure/2014/Dec/1 +CVE-2014-8874 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-009 +CVE-2014-8875 - http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html +CVE-2014-8875 - http://www.revive-adserver.com/security/revive-sa-2014-002/ +CVE-2014-8877 - http://packetstormsecurity.com/files/129183/WordPress-CM-Download-Manager-2.0.0-Code-Injection.html +CVE-2014-8884 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 +CVE-2014-8886 - http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html +CVE-2014-8886 - http://seclists.org/fulldisclosure/2016/Jan/12 +CVE-2014-8886 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-014 +CVE-2014-8889 - http://packetstormsecurity.com/files/130767/Dropbox-SDK-For-Android-Remote-Exploitation.html +CVE-2014-8889 - https://securityintelligence.com/droppedin-remotely-exploitable-vulnerability-in-the-dropbox-sdk-for-android/ +CVE-2014-8891 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015 +CVE-2014-8892 - http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015 +CVE-2014-8904 - https://www.exploit-db.com/exploits/38576/ +CVE-2014-8948 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html +CVE-2014-8948 - http://seclists.org/fulldisclosure/2014/Apr/265 +CVE-2014-8948 - http://www.exploit-db.com/exploits/33076 +CVE-2014-8949 - http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html +CVE-2014-8949 - http://seclists.org/fulldisclosure/2014/Apr/265 +CVE-2014-8949 - http://www.exploit-db.com/exploits/33076 +CVE-2014-8953 - http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html +CVE-2014-8954 - http://packetstormsecurity.com/files/129104/phpSound-Music-Sharing-Platform-1.0.5-Cross-Site-Scripting.html +CVE-2014-8955 - http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html +CVE-2014-8956 - http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html +CVE-2014-8957 - http://packetstormsecurity.com/files/130723/OpenKM-Stored-Cross-Site-Scripting.html +CVE-2014-8962 - http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html +CVE-2014-8962 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-8993 - http://packetstormsecurity.com/files/129811/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Cross-Site-Scripting.html +CVE-2014-8995 - http://packetstormsecurity.com/files/129135/Maarch-LetterBox-2.8-Insecure-Cookie-Handling.html +CVE-2014-8996 - http://packetstormsecurity.com/files/129133/Nibbleblog-4.0.1-Cross-Site-Scripting.html +CVE-2014-8996 - http://seclists.org/fulldisclosure/2014/Nov/38 +CVE-2014-8997 - http://packetstormsecurity.com/files/129108/Digi-Online-Examination-System-2.0-Shell-Upload.html +CVE-2014-8998 - http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_replace-PHP-Code-Execution.html +CVE-2014-8999 - http://packetstormsecurity.com/files/129134/XOOPS-2.5.6-SQL-Injection.html +CVE-2014-8999 - http://seclists.org/fulldisclosure/2014/Nov/39 +CVE-2014-9000 - http://packetstormsecurity.com/files/128799 +CVE-2014-9001 - http://seclists.org/fulldisclosure/2014/Oct/101 +CVE-2014-9002 - http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html +CVE-2014-9003 - http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html +CVE-2014-9006 - http://packetstormsecurity.com/files/129082/Monstra-3.0.1-Bruteforce-Mitigation-Bypass.html +CVE-2014-9013 - https://www.exploit-db.com/exploits/36490/ +CVE-2014-9014 - https://www.exploit-db.com/exploits/36466/ +CVE-2014-9015 - https://www.drupal.org/SA-CORE-2014-006 +CVE-2014-9016 - https://www.drupal.org/SA-CORE-2014-006 +CVE-2014-9017 - http://packetstormsecurity.com/files/130723/OpenKM-Stored-Cross-Site-Scripting.html +CVE-2014-9017 - http://seclists.org/fulldisclosure/2015/Mar/48 +CVE-2014-9017 - http://seclists.org/fulldisclosure/2015/Mar/51 +CVE-2014-9019 - http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html +CVE-2014-9020 - http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html +CVE-2014-9020 - http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html +CVE-2014-9021 - http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html +CVE-2014-9027 - http://packetstormsecurity.com/files/129041 +CVE-2014-9028 - http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html +CVE-2014-9028 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-9029 - http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html +CVE-2014-9029 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-9031 - http://klikki.fi/adv/wordpress.html +CVE-2014-9031 - http://seclists.org/fulldisclosure/2014/Nov/62 +CVE-2014-9089 - https://www.mantisbt.org/bugs/view.php?id=17841 +CVE-2014-9095 - http://packetstormsecurity.com/files/127525/Raritan-PowerIQ-Unauthenticated-SQL-Injection.html +CVE-2014-9096 - http://packetstormsecurity.com/files/127615/Pligg-2.0.1-SQL-Injection-Command-Execution.html +CVE-2014-9097 - http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9098 - http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9099 - http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html +CVE-2014-9100 - http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html +CVE-2014-9101 - http://packetstormsecurity.com/files/127652/Oxwall-1.7.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9101 - http://packetstormsecurity.com/files/127690/SkaDate-Lite-2.0-CSRF-Cross-Site-Scripting.html +CVE-2014-9101 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5195.php +CVE-2014-9101 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5197.php +CVE-2014-9102 - http://packetstormsecurity.com/files/127683/Joomla-Kunena-Forum-3.0.5-SQL-Injection.html +CVE-2014-9103 - http://packetstormsecurity.com/files/127684/joomlakunena305-xss.txt +CVE-2014-9104 - http://seclists.org/fulldisclosure/2014/Jul/76 +CVE-2014-9104 - https://www.youtube.com/watch?v=qhgysgfvQh8 +CVE-2014-9112 - http://seclists.org/fulldisclosure/2014/Nov/74 +CVE-2014-9112 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-9113 - http://packetstormsecurity.com/files/129323/CCH-Wolters-Kluwer-PFX-Engagement-7.1-Privilege-Escalation.html +CVE-2014-9115 - http://seclists.org/fulldisclosure/2014/Nov/23 +CVE-2014-9118 - http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html +CVE-2014-9118 - https://www.exploit-db.com/exploits/38453/ +CVE-2014-9119 - http://seclists.org/oss-sec/2014/q4/1059 +CVE-2014-9119 - https://wpvulndb.com/vulnerabilities/7726 +CVE-2014-9120 - https://www.netsparker.com/xss-vulnerability-in-subrion-cms/ +CVE-2014-9126 - http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html +CVE-2014-9127 - http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html +CVE-2014-9129 - http://packetstormsecurity.com/files/129357/WordPress-CM-Download-Manager-2.0.6-XSS-CSRF.html +CVE-2014-9130 - http://www.ubuntu.com/usn/USN-2461-1 +CVE-2014-9140 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html +CVE-2014-9142 - http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html +CVE-2014-9143 - http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html +CVE-2014-9144 - http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html +CVE-2014-9145 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html +CVE-2014-9146 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html +CVE-2014-9147 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html +CVE-2014-9147 - https://www.exploit-db.com/exploits/36581/ +CVE-2014-9148 - http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html +CVE-2014-9148 - https://www.exploit-db.com/exploits/36581/ +CVE-2014-9161 - http://packetstormsecurity.com/files/134394/Adobe-Reader-X-XI-Out-Of-Bounds-Read.html +CVE-2014-9173 - http://www.exploit-db.com/exploits/35371 +CVE-2014-9174 - https://wpvulndb.com/vulnerabilities/7692 +CVE-2014-9175 - http://packetstormsecurity.com/files/129232/WordPress-wpDataTables-1.5.3-SQL-Injection.html +CVE-2014-9175 - http://www.exploit-db.com/exploits/35340 +CVE-2014-9175 - http://www.homelab.it/index.php/2014/11/23/wordpress-wpdatatables-sql-injection-vulnerability +CVE-2014-9176 - http://h4x0resec.blogspot.com/2014/11/wordpress-sexy-squeeze-pages-plugin.html +CVE-2014-9176 - http://packetstormsecurity.com/files/129285/WordPress-Sexy-Squeeze-Pages-Cross-Site-Scripting.html +CVE-2014-9177 - http://h4x0resec.blogspot.com/2014/11/wordpress-html5-mp3-player-with.html +CVE-2014-9177 - http://packetstormsecurity.com/files/129286/WordPress-Html5-Mp3-Player-Full-Path-Disclosure.html +CVE-2014-9178 - http://packetstormsecurity.com/files/129212/WordPress-SP-Client-Document-Manager-2.4.1-SQL-Injection.html +CVE-2014-9179 - http://packetstormsecurity.com/files/129103/WordPress-SupportEzzy-Ticket-System-1.2.5-Cross-Site-Scripting.html +CVE-2014-9180 - http://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html +CVE-2014-9182 - http://packetstormsecurity.com/files/129042/Anchor-CMS-0.9.2-Header-Injection.html +CVE-2014-9183 - http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html +CVE-2014-9184 - http://packetstormsecurity.com/files/129015/ZTE-ZXDSL-831CII-Insecure-Direct-Object-Reference.html +CVE-2014-9185 - http://packetstormsecurity.com/files/129624/Morfy-CMS-1.05-Remote-Command-Execution.html +CVE-2014-9185 - http://seclists.org/fulldisclosure/2014/Dec/70 +CVE-2014-9185 - http://www.vulnerability-lab.com/get_content.php?id=1367 +CVE-2014-9185 - https://github.com/Awilum/monstra-cms/issues/351 +CVE-2014-9195 - https://www.exploit-db.com/exploits/37066/ +CVE-2014-9208 - https://www.exploit-db.com/exploits/38108/ +CVE-2014-9211 - https://packetstormsecurity.com/files/author/11084/ +CVE-2014-9212 - http://packetstormsecurity.com/files/129372/Altitude-uAgent-Altitude-uCI-7.5-XSS.html +CVE-2014-9215 - https://www.youtube.com/watch?v=AQiGvH5xrJg +CVE-2014-9218 - https://github.com/phpmyadmin/phpmyadmin/commit/62b2c918d26cc78d1763945e3d44d1a63294a819 +CVE-2014-9222 - http://www.kb.cert.org/vuls/id/561444 +CVE-2014-9224 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html +CVE-2014-9224 - http://seclists.org/fulldisclosure/2015/Jan/91 +CVE-2014-9225 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html +CVE-2014-9225 - http://seclists.org/fulldisclosure/2015/Jan/91 +CVE-2014-9226 - http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html +CVE-2014-9226 - http://seclists.org/fulldisclosure/2015/Jan/91 +CVE-2014-9234 - http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html +CVE-2014-9235 - http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9235 - http://seclists.org/fulldisclosure/2014/Nov/45 +CVE-2014-9236 - http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9236 - http://seclists.org/fulldisclosure/2014/Nov/45 +CVE-2014-9237 - http://packetstormsecurity.com/files/129129/Proticaret-E-Commerce-Script-3.0-SQL-Injection.html +CVE-2014-9237 - http://seclists.org/fulldisclosure/2014/Nov/43 +CVE-2014-9238 - http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html +CVE-2014-9239 - http://seclists.org/fulldisclosure/2014/Nov/20 +CVE-2014-9240 - http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9241 - http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9242 - http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html +CVE-2014-9242 - http://seclists.org/fulldisclosure/2014/Nov/44 +CVE-2014-9243 - http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html +CVE-2014-9243 - http://seclists.org/fulldisclosure/2014/Nov/44 +CVE-2014-9245 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9245 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9247 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9247 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9248 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9248 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9249 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9249 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9250 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9250 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9251 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9251 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9252 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9252 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9258 - http://www.exploit-db.com/exploits/35528 +CVE-2014-9260 - http://packetstormsecurity.com/files/130690/WordPress-Download-Manager-2.7.2-Privilege-Escalation.html +CVE-2014-9261 - http://packetstormsecurity.com/files/130739/Codoforum-2.5.1-Arbitrary-File-Download.html +CVE-2014-9261 - http://www.exploit-db.com/exploits/36320 +CVE-2014-9262 - https://www.exploit-db.com/exploits/36112/ +CVE-2014-9272 - https://www.mantisbt.org/bugs/view.php?id=17297 +CVE-2014-9280 - http://www.mantisbt.org/bugs/view.php?id=17875 +CVE-2014-9281 - http://seclists.org/oss-sec/2014/q4/913 +CVE-2014-9281 - https://www.mantisbt.org/bugs/view.php?id=17876 +CVE-2014-9293 - http://www.kb.cert.org/vuls/id/852879 +CVE-2014-9293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-9294 - http://www.kb.cert.org/vuls/id/852879 +CVE-2014-9294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-9295 - http://www.kb.cert.org/vuls/id/852879 +CVE-2014-9295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-9295 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2014-9296 - http://www.kb.cert.org/vuls/id/852879 +CVE-2014-9296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2014-9300 - http://seclists.org/bugtraq/2014/Jul/72 +CVE-2014-9301 - http://seclists.org/bugtraq/2014/Jul/72 +CVE-2014-9302 - http://seclists.org/bugtraq/2014/Jul/72 +CVE-2014-9303 - http://seclists.org/fulldisclosure/2014/Dec/2 +CVE-2014-9303 - https://www.redteam-pentesting.de/advisories/rt-sa-2014-011 +CVE-2014-9305 - http://packetstormsecurity.com/files/129395/Cart66-Lite-WordPress-Ecommerce-1.5.1.17-SQL-Injection.html +CVE-2014-9305 - http://www.exploit-db.com/exploits/35459 +CVE-2014-9308 - http://packetstormsecurity.com/files/129875/WordPress-Shopping-Cart-3.0.4-Unrestricted-File-Upload.html +CVE-2014-9308 - http://www.exploit-db.com/exploits/35730 +CVE-2014-9311 - http://packetstormsecurity.com/files/131321/WordPress-Shareaholic-7.6.0.3-Cross-Site-Scripting.html +CVE-2014-9312 - http://packetstormsecurity.com/files/130104/Photo-Gallery-1.2.5-Shell-Upload.html +CVE-2014-9312 - http://packetstormsecurity.com/files/130384/WordPress-Photo-Gallery-1.2.5-Unrestricted-File-Upload.html +CVE-2014-9320 - http://packetstormsecurity.com/files/129613/SAP-Business-Objects-Search-Token-Privilege-Escalation.html +CVE-2014-9322 - http://www.exploit-db.com/exploits/36266 +CVE-2014-9325 - http://packetstormsecurity.com/files/129654/TWiki-6.0.1-QUERYSTRING-QUERYPARAMSTRING-XSS.html +CVE-2014-9330 - http://seclists.org/fulldisclosure/2014/Dec/97 +CVE-2014-9330 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2014-9330 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-9331 - http://packetstormsecurity.com/files/130219/ManageEngine-Desktop-Central-9-Cross-Site-Request-Forgery.html +CVE-2014-9331 - http://www.exploit-db.com/exploits/35980 +CVE-2014-9334 - http://packetstormsecurity.com/files/129623/WordPress-Bird-Feeder-1.2.3-CSRF-XSS.html +CVE-2014-9334 - http://seclists.org/fulldisclosure/2014/Dec/69 +CVE-2014-9334 - http://www.vulnerability-lab.com/get_content.php?id=1372 +CVE-2014-9335 - http://packetstormsecurity.com/files/129575/WordPress-DandyID-Services-ID-1.5.9-CSRF-XSS.html +CVE-2014-9336 - http://packetstormsecurity.com/files/129576/WordPress-iTwitter-WP-0.04-CSRF-XSS.html +CVE-2014-9336 - http://seclists.org/fulldisclosure/2014/Dec/72 +CVE-2014-9337 - http://packetstormsecurity.com/files/129577/Mikiurl-WordPress-Eklentisi-2.0-CSRF-XSS.html +CVE-2014-9338 - http://packetstormsecurity.com/files/129578/WordPress-O2Tweet-0.0.4-CSRF-XSS.html +CVE-2014-9339 - http://packetstormsecurity.com/files/129580/WordPress-SPNbabble-1.4.1-CSRF-XSS.html +CVE-2014-9340 - http://packetstormsecurity.com/files/129581/WordPress-wpCommentTwit-0.5-CSRF-XSS.html +CVE-2014-9341 - http://packetstormsecurity.com/files/129582/WordPress-yURL-ReTwitt-WP-1.4-CSRF-XSS.html +CVE-2014-9343 - http://packetstormsecurity.com/files/129162/Snowfox-CMS-1.0-Open-Redirect.html +CVE-2014-9343 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5206.php +CVE-2014-9344 - http://packetstormsecurity.com/files/129164/Snowfox-CMS-1.0-Cross-Site-Request-Forgery.html +CVE-2014-9344 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5205.php +CVE-2014-9345 - http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html +CVE-2014-9345 - http://www.exploit-db.com/exploits/35463 +CVE-2014-9348 - http://packetstormsecurity.com/files/129229/RobotStats-1.0-SQL-Injection.html +CVE-2014-9349 - http://packetstormsecurity.com/files/129230/RobotStats-1.0-Cross-Site-Scripting.html +CVE-2014-9350 - http://packetstormsecurity.com/files/129227/TP-Link-TL-WR740N-Denial-Of-Service.html +CVE-2014-9350 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5210.php +CVE-2014-9352 - http://seclists.org/fulldisclosure/2014/Oct/133 +CVE-2014-9360 - http://seclists.org/fulldisclosure/2014/Oct/133 +CVE-2014-9361 - https://www.drupal.org/node/2299467 +CVE-2014-9364 - https://www.drupal.org/node/2299467 +CVE-2014-9365 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-9365 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-9367 - http://packetstormsecurity.com/files/129655/TWiki-6.0.0-6.0.1-WebSearch-Cross-Site-Scripting.html +CVE-2014-9368 - http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.html +CVE-2014-9374 - http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html +CVE-2014-9382 - http://packetstormsecurity.com/files/132121/FreeBox-3.0.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9382 - http://seclists.org/fulldisclosure/2015/Jun/1 +CVE-2014-9385 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9385 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9386 - http://www.kb.cert.org/vuls/id/449452 +CVE-2014-9386 - https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing +CVE-2014-9389 - https://support.sonatype.com/entries/84705937-CVE-2014-9389-Nexus-Security-Advisory-Directory-Traversal +CVE-2014-9391 - http://packetstormsecurity.com/files/129637/WordPress-gSlideShow-0.1-CSRF-XSS.html +CVE-2014-9392 - http://packetstormsecurity.com/files/129638/WordPress-PictoBrowser-0.3.1-CSRF-XSS.html +CVE-2014-9393 - http://packetstormsecurity.com/files/129639/WordPress-Twitter-0.7-CSRF-XSS.html +CVE-2014-9394 - http://packetstormsecurity.com/files/129640/WordPress-PWG-Random-1.11-CSRF-XSS.html +CVE-2014-9395 - http://packetstormsecurity.com/files/129641/WordPress-Simplelife-1.2-CSRF-XSS.html +CVE-2014-9396 - http://packetstormsecurity.com/files/129642/WordPress-SimpleFlickr-3.0.3-CSRF-XSS.html +CVE-2014-9397 - http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9398 - http://packetstormsecurity.com/files/129644/WordPress-Twitter-LiveBlog-1.1.2-CSRF-XSS.html +CVE-2014-9399 - http://packetstormsecurity.com/files/129645/WordPress-TweetScribe-1.1-CSRF-XSS.html +CVE-2014-9400 - http://packetstormsecurity.com/files/129646/WordPress-WP-Unique-Article-Header-Image-1.0-CSRF-XSS.html +CVE-2014-9401 - http://packetstormsecurity.com/files/129647/WordPress-WP-Limit-Posts-Automatically-0.7-CSRF-XSS.html +CVE-2014-9402 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2014-9402 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2014-9402 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2014-9402 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2014-9402 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2014-9402 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2014-9402 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2014-9405 - http://packetstormsecurity.com/files/132121/FreeBox-3.0.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9405 - http://seclists.org/fulldisclosure/2015/Jun/1 +CVE-2014-9406 - http://seclists.org/fulldisclosure/2014/Dec/57 +CVE-2014-9408 - http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html +CVE-2014-9412 - http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html +CVE-2014-9412 - http://seclists.org/fulldisclosure/2014/Dec/78 +CVE-2014-9413 - http://packetstormsecurity.com/files/129500/WordPress-IP-Ban-1.2.3-CSRF-XSS.html +CVE-2014-9414 - http://packetstormsecurity.com/files/129512/W3-Total-Cache-0.9.4-Cross-Site-Request-Forgery.html +CVE-2014-9414 - http://seclists.org/fulldisclosure/2014/Dec/67 +CVE-2014-9415 - http://packetstormsecurity.com/files/152965/Huawei-eSpace-1.1.11.103-Unicode-Stack-Buffer-Overflow.html +CVE-2014-9416 - http://packetstormsecurity.com/files/152966/Huawei-eSpace-1.1.11.103-DLL-Hijacking.html +CVE-2014-9417 - http://packetstormsecurity.com/files/152967/Huawei-eSpace-1.1.11.103-Meeting-Image-File-Format-Handling-Buffer-Overflow.html +CVE-2014-9418 - http://packetstormsecurity.com/files/152968/Huawei-eSpace-1.1.11.103-Meeting-Heap-Overflow.html +CVE-2014-9420 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9421 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt +CVE-2014-9422 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt +CVE-2014-9423 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt +CVE-2014-9427 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9427 - https://hackerone.com/reports/73234 +CVE-2014-9429 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9430 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9431 - http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2014-9432 - http://packetstormsecurity.com/files/129709/CMS-Serendipity-2.0-rc1-Cross-Site-Scripting.html +CVE-2014-9432 - http://seclists.org/fulldisclosure/2014/Dec/108 +CVE-2014-9433 - http://packetstormsecurity.com/files/129713/CMS-Contenido-4.9.5-Cross-Site-Scripting.html +CVE-2014-9433 - http://seclists.org/fulldisclosure/2014/Dec/111 +CVE-2014-9434 - http://seclists.org/fulldisclosure/2014/Dec/131 +CVE-2014-9435 - http://seclists.org/fulldisclosure/2014/Dec/131 +CVE-2014-9436 - http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html +CVE-2014-9436 - http://seclists.org/fulldisclosure/2014/Dec/99 +CVE-2014-9437 - http://packetstormsecurity.com/files/129509 +CVE-2014-9438 - http://packetstormsecurity.com/files/129619/vBulletin-Moderator-Control-Panel-4.2.2-CSRF.html +CVE-2014-9438 - https://rstforums.com/forum/88810-csrf-vbulletin-modcp.rst +CVE-2014-9440 - http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9440 - http://www.exploit-db.com/exploits/35591 +CVE-2014-9441 - http://packetstormsecurity.com/files/129507 +CVE-2014-9444 - http://packetstormsecurity.com/files/129749/WordPress-Frontend-Uploader-0.9.2-Cross-Site-Scripting.html +CVE-2014-9444 - http://seclists.org/fulldisclosure/2014/Dec/122 +CVE-2014-9448 - http://www.exploit-db.com/exploits/35105 +CVE-2014-9451 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9451 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9452 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9452 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9453 - http://packetstormsecurity.com/files/129502/WordPress-Simple-Visitor-Stat-Cross-Site-Scripting.html +CVE-2014-9454 - http://packetstormsecurity.com/files/129503/WordPress-Simple-Sticky-Footer-1.3.2-CSRF-XSS.html +CVE-2014-9455 - http://packetstormsecurity.com/files/129451/ClassAd-3.0-SQL-Injection.html +CVE-2014-9456 - http://www.exploit-db.com/exploits/35589 +CVE-2014-9457 - http://www.exploit-db.com/exploits/35625 +CVE-2014-9458 - https://www.hex-rays.com/bugbounty.shtml +CVE-2014-9458 - https://www.hex-rays.com/vulnfix.shtml +CVE-2014-9459 - http://packetstormsecurity.com/files/129751/e107-2.0-Alpha2-Cross-Site-Request-Forgery.html +CVE-2014-9459 - http://seclists.org/fulldisclosure/2014/Dec/124 +CVE-2014-9460 - http://packetstormsecurity.com/files/129501/WordPress-WP-ViperGB-1.3.10-CSRF-XSS.html +CVE-2014-9463 - https://blog.sucuri.net/2015/01/serious-vulnerability-on-vbseo.html +CVE-2014-9463 - https://www.exploit-db.com/exploits/36232/ +CVE-2014-9464 - https://github.com/microweber/microweber/commit/4ee09f9dda35cd1b15daa351f335c2a4a0538d29 +CVE-2014-9466 - http://packetstormsecurity.com/files/130379/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Exposure.html +CVE-2014-9469 - http://packetstormsecurity.com/files/130393/vBulletin-5.1.3-Cross-Site-Scripting.html +CVE-2014-9471 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147 +CVE-2014-9480 - https://phabricator.wikimedia.org/T69180 +CVE-2014-9491 - http://seclists.org/oss-sec/2015/q1/27 +CVE-2014-9493 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-9496 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2014-9512 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2014-9512 - http://www.ubuntu.com/usn/USN-2879-1 +CVE-2014-9515 - https://github.com/DozerMapper/dozer/issues/217 +CVE-2014-9515 - https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rce +CVE-2014-9515 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2014-9517 - http://packetstormsecurity.com/files/129609/D-Link-DCS-2103-Brute-Force-Cross-Site-Scripting.html +CVE-2014-9522 - http://packetstormsecurity.com/files/129586/CMS-Papoo-6.0.0-Revision-4701-Cross-Site-Scripting.html +CVE-2014-9523 - http://packetstormsecurity.com/files/129499/WordPress-Our-Team-Showcase-1.2-CSRF-XSS.html +CVE-2014-9524 - http://packetstormsecurity.com/files/129506/WordPress-Facebook-Like-Box-2.8.2-CSRF-XSS.html +CVE-2014-9525 - http://packetstormsecurity.com/files/129510/WordPress-Timed-Popup-1.3-CSRF-XSS.html +CVE-2014-9526 - http://packetstormsecurity.com/files/129446/Concrete5-CMS-5.7.2-5.7.2.1-Cross-Site-Scripting.html +CVE-2014-9526 - http://seclists.org/fulldisclosure/2014/Dec/38 +CVE-2014-9528 - http://packetstormsecurity.com/files/129440/Humhub-0.10.0-rc.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2014-9528 - http://seclists.org/fulldisclosure/2014/Dec/31 +CVE-2014-9528 - http://www.exploit-db.com/exploits/35510 +CVE-2014-9529 - http://www.ubuntu.com/usn/USN-2512-1 +CVE-2014-9529 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2014-9557 - http://packetstormsecurity.com/files/130076/SmartCMS-2-Cross-Site-Scripting.html +CVE-2014-9558 - http://packetstormsecurity.com/files/130075/SmartCMS-2-SQL-Injection.html +CVE-2014-9560 - http://packetstormsecurity.com/files/129888/SoftBB-0.1.3-SQL-Injection.html +CVE-2014-9560 - http://seclists.org/fulldisclosure/2015/Jan/20 +CVE-2014-9561 - http://packetstormsecurity.com/files/129889/SoftBB-0.1.3-Cross-Site-Scripting.html +CVE-2014-9561 - http://seclists.org/fulldisclosure/2015/Jan/21 +CVE-2014-9562 - http://seclists.org/fulldisclosure/2015/Feb/8 +CVE-2014-9566 - http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html +CVE-2014-9567 - http://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html +CVE-2014-9568 - http://puppetlabs.com/security/cve/cve-2014-9568 +CVE-2014-9575 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9575 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9576 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9576 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9577 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9577 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9578 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9578 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9579 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html +CVE-2014-9579 - http://seclists.org/fulldisclosure/2014/Dec/76 +CVE-2014-9580 - http://packetstormsecurity.com/files/129666 +CVE-2014-9583 - http://packetstormsecurity.com/files/129815/ASUSWRT-3.0.0.4.376_1071-LAN-Backdoor-Command-Execution.html +CVE-2014-9583 - https://www.exploit-db.com/exploits/44524/ +CVE-2014-9584 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9584 - http://www.ubuntu.com/usn/USN-2512-1 +CVE-2014-9584 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2014-9585 - http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html +CVE-2014-9585 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2014-9597 - https://trac.videolan.org/vlc/ticket/13389 +CVE-2014-9599 - http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html +CVE-2014-9600 - http://packetstormsecurity.com/files/129764/iExplorer-3.6.3.0-DLL-Hijacking.html +CVE-2014-9605 - https://www.exploit-db.com/exploits/37928/ +CVE-2014-9606 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9607 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9608 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9609 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9610 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9610 - https://www.exploit-db.com/exploits/37929/ +CVE-2014-9611 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9611 - https://www.exploit-db.com/exploits/37931/ +CVE-2014-9612 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9613 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9614 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9615 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9616 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9617 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9618 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9618 - https://www.exploit-db.com/exploits/37933/ +CVE-2014-9619 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html +CVE-2014-9619 - https://www.exploit-db.com/exploits/37932/ +CVE-2014-9620 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-9622 - http://seclists.org/fulldisclosure/2014/Nov/36 +CVE-2014-9623 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9632 - http://packetstormsecurity.com/files/130248/AVG-Internet-Security-2015.0.5315-Privilege-Escalation.html +CVE-2014-9633 - http://packetstormsecurity.com/files/130094/Comodo-Backup-4.4.0.0-NULL-Pointer-Dereference.html +CVE-2014-9636 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9642 - http://packetstormsecurity.com/files/130247/BullGuard-14.1.285.4-Privilege-Escalation.html +CVE-2014-9643 - http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html +CVE-2014-9644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-9644 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2014-9644 - http://www.ubuntu.com/usn/USN-2543-1 +CVE-2014-9644 - https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu +CVE-2014-9645 - http://seclists.org/fulldisclosure/2020/Mar/15 +CVE-2014-9645 - https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu +CVE-2014-9652 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9652 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-9653 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2014-9653 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-9654 - http://bugs.icu-project.org/trac/changeset/36801 +CVE-2014-9654 - http://bugs.icu-project.org/trac/ticket/11371 +CVE-2014-9654 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9655 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2014-9655 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2014-9656 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9657 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9658 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9659 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9660 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9661 - http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html +CVE-2014-9661 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9663 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9664 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9666 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9667 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9669 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9670 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9671 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9672 - http://packetstormsecurity.com/files/134395/FreeType-2.5.3-Mac-FOND-Resource-Parsing-Out-Of-Bounds-Read-From-Stack.html +CVE-2014-9672 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9673 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9674 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9675 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9677 - http://www.theregister.co.uk/2014/12/23/wikileaks_pdf_viewer_vuln/ +CVE-2014-9678 - http://www.theregister.co.uk/2014/12/23/wikileaks_pdf_viewer_vuln/ +CVE-2014-9679 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-9680 - http://openwall.com/lists/oss-security/2014/10/15/24 +CVE-2014-9683 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9686 - http://seclists.org/fulldisclosure/2014/Feb/53 +CVE-2014-9701 - https://www.mantisbt.org/bugs/view.php?id=17362#c40613 +CVE-2014-9705 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9705 - https://bugs.php.net/bug.php?id=68552 +CVE-2014-9705 - https://hackerone.com/reports/104013 +CVE-2014-9706 - http://www.openwall.com/lists/oss-security/2015/03/21/1 +CVE-2014-9707 - http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html +CVE-2014-9708 - http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html +CVE-2014-9708 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2014-9709 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-9709 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9711 - http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html +CVE-2014-9711 - http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html +CVE-2014-9711 - https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html +CVE-2014-9711 - https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html +CVE-2014-9715 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 +CVE-2014-9715 - http://www.openwall.com/lists/oss-security/2015/04/08/1 +CVE-2014-9715 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2014-9717 - http://www.openwall.com/lists/oss-security/2015/04/17/4 +CVE-2014-9727 - http://www.exploit-db.com/exploits/33136 +CVE-2014-9734 - http://packetstormsecurity.com/files/132366/WordPress-Revslider-4.2.2-XSS-Information-Disclosure.html +CVE-2014-9734 - http://www.exploit-db.com/exploits/34511 +CVE-2014-9734 - https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html +CVE-2014-9735 - http://seclists.org/fulldisclosure/2014/Nov/78 +CVE-2014-9735 - https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ +CVE-2014-9735 - https://wpvulndb.com/vulnerabilities/7954 +CVE-2014-9743 - http://seclists.org/fulldisclosure/2014/Mar/324 +CVE-2014-9746 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2014-9750 - http://www.kb.cert.org/vuls/id/852879 +CVE-2014-9750 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-9751 - http://www.kb.cert.org/vuls/id/852879 +CVE-2014-9751 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2014-9752 - http://packetstormsecurity.com/files/134215/ATutor-2.2-File-Upload.html +CVE-2014-9754 - http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html +CVE-2014-9755 - http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html +CVE-2014-9757 - http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html +CVE-2014-9758 - http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/ +CVE-2014-9761 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2014-9761 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2014-9761 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2014-9761 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2014-9761 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2014-9761 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2014-9766 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2014-9773 - http://www.openwall.com/lists/oss-security/2016/05/03/1 +CVE-2014-9803 - https://www.kernel.org/pub/linux/kernel/next/patch-v3.15-rc5-next-20140519.xz +CVE-2014-9862 - http://seclists.org/fulldisclosure/2020/Jul/8 +CVE-2014-9862 - http://www.openwall.com/lists/oss-security/2020/07/09/2 +CVE-2014-9911 - http://bugs.icu-project.org/trac/changeset/35699 +CVE-2014-9911 - http://bugs.icu-project.org/trac/ticket/1089 +CVE-2014-9911 - https://bugs.php.net/bug.php?id=67397 +CVE-2014-9912 - https://bugs.php.net/bug.php?id=67397 +CVE-2014-9913 - https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 +CVE-2014-9917 - https://www.exploit-db.com/exploits/34089/ +CVE-2014-9918 - https://www.exploit-db.com/exploits/34089/ +CVE-2014-9919 - https://www.exploit-db.com/exploits/34089/ +CVE-2014-9938 - https://github.com/njhartwell/pw3nage +CVE-2014-9945 - http://www.securityfocus.com/bid/98246 +CVE-2014-9953 - http://www.securityfocus.com/bid/98874 +CVE-2014-9954 - http://www.securityfocus.com/bid/98874 +CVE-2014-9955 - http://www.securityfocus.com/bid/98874 +CVE-2014-9956 - http://www.securityfocus.com/bid/98874 +CVE-2014-9957 - http://www.securityfocus.com/bid/98874 +CVE-2014-9958 - http://www.securityfocus.com/bid/98874 +CVE-2014-9959 - http://www.securityfocus.com/bid/98874 +CVE-2014-9960 - http://www.securityfocus.com/bid/98874 +CVE-2014-9961 - http://www.securityfocus.com/bid/98874 +CVE-2014-9962 - http://www.securityfocus.com/bid/98874 +CVE-2014-9963 - http://www.securityfocus.com/bid/98874 +CVE-2014-9964 - http://www.securityfocus.com/bid/98874 +CVE-2014-9965 - http://www.securityfocus.com/bid/98874 +CVE-2014-9966 - http://www.securityfocus.com/bid/98874 +CVE-2014-9967 - http://www.securityfocus.com/bid/98874 +CVE-2014-9971 - http://www.securityfocus.com/bid/103671 +CVE-2014-9972 - http://www.securityfocus.com/bid/103671 +CVE-2014-9976 - http://www.securityfocus.com/bid/103671 +CVE-2014-9981 - http://www.securityfocus.com/bid/103671 +CVE-2014-9983 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172 +CVE-2014-9984 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2014-9984 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2014-9984 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2014-9984 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2014-9984 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2014-9984 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2014-9985 - http://www.securityfocus.com/bid/103671 +CVE-2014-9986 - http://www.securityfocus.com/bid/103671 +CVE-2014-9987 - http://www.securityfocus.com/bid/103671 +CVE-2014-9988 - http://www.securityfocus.com/bid/103671 +CVE-2014-9989 - http://www.securityfocus.com/bid/103671 +CVE-2014-9990 - http://www.securityfocus.com/bid/103671 +CVE-2014-9991 - http://www.securityfocus.com/bid/103671 +CVE-2014-9993 - http://www.securityfocus.com/bid/103671 +CVE-2014-9994 - http://www.securityfocus.com/bid/103671 +CVE-2014-9995 - http://www.securityfocus.com/bid/103671 +CVE-2014-9996 - http://www.securityfocus.com/bid/103671 +CVE-2014-9997 - http://www.securityfocus.com/bid/103671 +CVE-2014-9998 - http://www.securityfocus.com/bid/103671 +CVE-2015-0001 - http://packetstormsecurity.com/files/134392/Microsoft-Windows-8.1-Ahcache.sys-NtApphelpCacheControl-Privilege-Escalation.html +CVE-2015-0002 - http://www.zdnet.com/article/google-discloses-unpatched-windows-vulnerability/ +CVE-2015-0005 - http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html +CVE-2015-0005 - http://seclists.org/fulldisclosure/2015/Mar/60 +CVE-2015-0005 - http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation +CVE-2015-0008 - http://packetstormsecurity.com/files/155002/Microsoft-Windows-Server-2012-Group-Policy-Remote-Code-Execution.html +CVE-2015-0008 - http://www.kb.cert.org/vuls/id/787252 +CVE-2015-0009 - http://packetstormsecurity.com/files/155007/Microsoft-Windows-Server-2012-Group-Policy-Security-Feature-Bypass.html +CVE-2015-0016 - http://packetstormsecurity.com/files/130201/MS15-004-Microsoft-Remote-Desktop-Services-Web-Proxy-IE-Sandbox-Escape.html +CVE-2015-0030 - http://www.securityfocus.com/bid/72444 +CVE-2015-0040 - https://www.exploit-db.com/exploits/40757/ +CVE-2015-0050 - https://www.exploit-db.com/exploits/40841/ +CVE-2015-0057 - https://www.exploit-db.com/exploits/39035/ +CVE-2015-0064 - https://www.exploit-db.com/exploits/37967/ +CVE-2015-0065 - https://www.exploit-db.com/exploits/37966/ +CVE-2015-0072 - http://innerht.ml/blog/ie-uxss.html +CVE-2015-0072 - http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html +CVE-2015-0072 - http://www.pcworld.com/article/2879372/dangerous-ie-vulnerability-opens-door-to-powerful-phishing-attacks.html +CVE-2015-0072 - https://nakedsecurity.sophos.com/2015/02/04/internet-explorer-has-a-cross-site-scripting-zero-day-bug/ +CVE-2015-0097 - https://www.exploit-db.com/exploits/37657/ +CVE-2015-0138 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0179 - https://www.exploit-db.com/exploits/42605/ +CVE-2015-0192 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0197 - http://www-304.ibm.com/support/docview.wss?uid=swg21902662 +CVE-2015-0198 - http://www-304.ibm.com/support/docview.wss?uid=swg21902662 +CVE-2015-0199 - http://www-304.ibm.com/support/docview.wss?uid=swg21902662 +CVE-2015-0203 - https://packetstormsecurity.com/files/129941/Apache-Qpid-0.30-Denial-Of-Service.html +CVE-2015-0204 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0204 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2015-0204 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-0204 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-0204 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0204 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0204 - http://www.securityfocus.com/bid/91787 +CVE-2015-0205 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2015-0205 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-0205 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0205 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0205 - http://www.securityfocus.com/bid/91787 +CVE-2015-0206 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 +CVE-2015-0206 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-0206 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0206 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0206 - http://www.securityfocus.com/bid/91787 +CVE-2015-0207 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0207 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0208 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0208 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0209 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0209 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0223 - http://packetstormsecurity.com/files/130106/Apache-Qpid-0.30-Anonymous-Action-Prevention.html +CVE-2015-0224 - http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html +CVE-2015-0225 - http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html +CVE-2015-0228 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-0228 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0228 - http://www.securityfocus.com/bid/91787 +CVE-2015-0228 - https://hackerone.com/reports/103991 +CVE-2015-0231 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0232 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0235 - http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/ +CVE-2015-0235 - http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html +CVE-2015-0235 - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html +CVE-2015-0235 - http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html +CVE-2015-0235 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2015-0235 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html +CVE-2015-0235 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html +CVE-2015-0235 - http://seclists.org/fulldisclosure/2015/Jan/111 +CVE-2015-0235 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2015-0235 - http://seclists.org/fulldisclosure/2021/Sep/0 +CVE-2015-0235 - http://seclists.org/fulldisclosure/2022/Jun/36 +CVE-2015-0235 - http://seclists.org/oss-sec/2015/q1/274 +CVE-2015-0235 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0235 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0235 - http://www.securityfocus.com/bid/91787 +CVE-2015-0235 - https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability +CVE-2015-0235 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2015-0235 - https://kc.mcafee.com/corporate/index?page=content&id=SB10100 +CVE-2015-0235 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2015-0235 - https://security.netapp.com/advisory/ntap-20150127-0001/ +CVE-2015-0235 - https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt +CVE-2015-0239 - http://www.openwall.com/lists/oss-security/2015/01/27/6 +CVE-2015-0239 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0239 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0239 - http://www.ubuntu.com/usn/USN-2514-1 +CVE-2015-0240 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0240 - http://www.ubuntu.com/usn/USN-2508-1 +CVE-2015-0240 - https://www.exploit-db.com/exploits/36741/ +CVE-2015-0245 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0247 - http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html +CVE-2015-0248 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0250 - http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html +CVE-2015-0250 - http://seclists.org/fulldisclosure/2015/Mar/142 +CVE-2015-0251 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0252 - http://packetstormsecurity.com/files/131756/Apache-Xerces-C-XML-Parser-Denial-Of-Service.html +CVE-2015-0252 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-0252 - https://www.exploit-db.com/exploits/36906/ +CVE-2015-0253 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0253 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0254 - http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html +CVE-2015-0254 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-0254 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2015-0254 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2015-0255 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0255 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0258 - http://packetstormsecurity.com/files/133736/Collabtive-2.0-Shell-Upload.html +CVE-2015-0261 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html +CVE-2015-0265 - http://www.slideshare.net/wojdwo/big-problems-with-big-data-hadoop-interfaces-security +CVE-2015-0266 - http://www.slideshare.net/wojdwo/big-problems-with-big-data-hadoop-interfaces-security +CVE-2015-0272 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0273 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0273 - https://bugs.php.net/bug.php?id=68942 +CVE-2015-0274 - http://www.ubuntu.com/usn/USN-2543-1 +CVE-2015-0275 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0279 - http://packetstormsecurity.com/files/153734/Tufin-Secure-Change-Remote-Code-Execution.html +CVE-2015-0279 - http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html +CVE-2015-0279 - http://seclists.org/fulldisclosure/2019/Jul/21 +CVE-2015-0285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0285 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0286 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-0286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0286 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0287 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0288 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0288 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0288 - https://hackerone.com/reports/73236 +CVE-2015-0289 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0289 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0290 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0290 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0291 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0291 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0292 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0293 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-0293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-0293 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-0299 - http://packetstormsecurity.com/files/133737/Open-Source-Point-Of-Sale-2.3.1-Cross-Site-Scripting.html +CVE-2015-0313 - http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.html +CVE-2015-0313 - https://www.exploit-db.com/exploits/36579/ +CVE-2015-0336 - https://www.exploit-db.com/exploits/36962/ +CVE-2015-0343 - http://packetstormsecurity.com/files/132269/Adobe-Connect-9.3-Cross-Site-Scripting.html +CVE-2015-0343 - http://seclists.org/bugtraq/2015/Jun/61 +CVE-2015-0343 - http://seclists.org/fulldisclosure/2015/Jun/35 +CVE-2015-0362 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0363 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0364 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0365 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0366 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0367 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0368 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0369 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0370 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0371 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0372 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0373 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0374 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0374 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0374 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0375 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0376 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0377 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf +CVE-2015-0377 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0378 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0379 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0380 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0381 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0381 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0381 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0382 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0382 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0382 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0382 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0383 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0383 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0384 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0385 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0386 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0387 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0388 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0389 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0390 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0391 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0392 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0393 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0394 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0395 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0395 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0396 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0397 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0398 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0399 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0400 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0400 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0401 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0402 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0403 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0403 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0404 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0405 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0406 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0406 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0407 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0407 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0408 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0408 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0409 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0409 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0410 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0410 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0411 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0411 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0411 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0411 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0412 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0412 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0413 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0413 - http://www.vmware.com/security/advisories/VMSA-2015-0003.html +CVE-2015-0414 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0415 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0416 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0417 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0418 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0419 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0420 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0421 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0422 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0423 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0423 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0424 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0425 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0426 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0427 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0428 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0429 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0430 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0431 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0432 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0432 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0432 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0433 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0433 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0433 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0433 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0434 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0435 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0436 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0437 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html +CVE-2015-0438 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0439 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0440 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0441 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0443 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0444 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0445 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0446 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0447 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0448 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0449 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0450 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0451 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0452 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0453 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0455 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0456 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0457 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0458 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0458 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0459 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0459 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0460 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0460 - http://www.ubuntu.com/usn/USN-2573-1 +CVE-2015-0461 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0462 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0463 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0464 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0465 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0466 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0467 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0468 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-0469 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0469 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0469 - http://www.ubuntu.com/usn/USN-2573-1 +CVE-2015-0470 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0471 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0472 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0473 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0474 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0475 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0476 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0477 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0477 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0477 - http://www.ubuntu.com/usn/USN-2573-1 +CVE-2015-0478 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0478 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0478 - http://www.ubuntu.com/usn/USN-2573-1 +CVE-2015-0479 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0480 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0480 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0480 - http://www.ubuntu.com/usn/USN-2573-1 +CVE-2015-0482 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0483 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0484 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0485 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0486 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0486 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0487 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0488 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0488 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0488 - http://www.ubuntu.com/usn/USN-2573-1 +CVE-2015-0489 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0490 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0491 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-0491 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0492 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0493 - http://packetstormsecurity.com/files/131494/Oracle-Outside-In-ibpsd2.dll-PSD-File-Processing-Buffer-Overflow.html +CVE-2015-0493 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0494 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0495 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0496 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0497 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0498 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0499 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0499 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0499 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0500 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-0500 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0501 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0502 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0503 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0504 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0505 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-0505 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0506 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0507 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0508 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0509 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0510 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0511 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-0514 - http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html +CVE-2015-0514 - https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html +CVE-2015-0519 - http://packetstormsecurity.com/files/130284/EMC-Captiva-Capture-Sensitive-Information-Disclosure.html +CVE-2015-0521 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html +CVE-2015-0522 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html +CVE-2015-0523 - http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html +CVE-2015-0524 - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html +CVE-2015-0525 - http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html +CVE-2015-0527 - http://packetstormsecurity.com/files/130959/EMC-Documentum-xMS-Sensitive-Information-Disclosure.html +CVE-2015-0528 - http://packetstormsecurity.com/files/131035/EMC-Isilon-OneFS-Privilege-Escalation.html +CVE-2015-0529 - http://packetstormsecurity.com/files/131250/EMC-PowerPath-Virtual-Appliance-Undocumented-User-Accounts.html +CVE-2015-0531 - http://packetstormsecurity.com/files/131748/EMC-SourceOne-Email-Management-Account-Lockout-Policy.html +CVE-2015-0532 - http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html +CVE-2015-0538 - http://packetstormsecurity.com/files/131749/EMC-AutoStart-5.4.3-5.5.0-Packet-Injection.html +CVE-2015-0553 - http://packetstormsecurity.com/files/130008/CMS-Websitebaker-2.8.3-SP3-Cross-Site-Scripting.html +CVE-2015-0554 - http://packetstormsecurity.com/files/129828/Pirelli-ADSL2-2-Wireless-Router-P.DGA4001N-Information-Disclosure.html +CVE-2015-0555 - http://packetstormsecurity.com/files/131421/Samsung-iPOLiS-1.12.2-ReadConfigValue-Remote-Code-Execution.html +CVE-2015-0555 - http://seclists.org/fulldisclosure/2015/Feb/81 +CVE-2015-0558 - http://packetstormsecurity.com/files/129817/Pirelli-Router-P.DG-A4001N-WPA-Key-Reverse-Engineering.html +CVE-2015-0561 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0561 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773 +CVE-2015-0562 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0562 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0563 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0563 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0564 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html +CVE-2015-0564 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0565 - https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html +CVE-2015-0565 - https://www.exploit-db.com/exploits/36310/ +CVE-2015-0565 - https://www.exploit-db.com/exploits/36311/ +CVE-2015-0569 - https://www.exploit-db.com/exploits/39308/ +CVE-2015-0574 - http://www.securityfocus.com/bid/103671 +CVE-2015-0576 - http://www.securityfocus.com/bid/103671 +CVE-2015-0624 - http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html +CVE-2015-0635 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani +CVE-2015-0636 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani +CVE-2015-0637 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani +CVE-2015-0659 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0659 +CVE-2015-0779 - http://seclists.org/fulldisclosure/2015/Apr/21 +CVE-2015-0779 - https://www.exploit-db.com/exploits/36964/ +CVE-2015-0797 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0798 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0799 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0800 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0801 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0801 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0801 - https://bugzilla.mozilla.org/show_bug.cgi?id=1146339 +CVE-2015-0802 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0802 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0802 - https://www.exploit-db.com/exploits/37958/ +CVE-2015-0803 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0803 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0804 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0804 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0805 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0805 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0806 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0806 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0807 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0807 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0808 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0808 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0810 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0810 - https://bugzilla.mozilla.org/show_bug.cgi?id=1125013 +CVE-2015-0811 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0811 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0812 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0812 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0812 - https://bugzilla.mozilla.org/show_bug.cgi?id=1128126 +CVE-2015-0813 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0813 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0814 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0814 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0815 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0815 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0816 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0816 - http://www.ubuntu.com/usn/USN-2550-1 +CVE-2015-0816 - https://www.exploit-db.com/exploits/37958/ +CVE-2015-0817 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1145255 +CVE-2015-0818 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0818 - https://bugzilla.mozilla.org/show_bug.cgi?id=1144988 +CVE-2015-0819 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0820 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0821 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0821 - https://bugzilla.mozilla.org/show_bug.cgi?id=1111960 +CVE-2015-0822 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0822 - https://bugzilla.mozilla.org/show_bug.cgi?id=1110557 +CVE-2015-0823 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0824 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0825 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0826 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0827 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0828 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0829 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0830 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0831 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0831 - https://bugzilla.mozilla.org/show_bug.cgi?id=1130541 +CVE-2015-0832 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0833 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0833 - https://bugzilla.mozilla.org/show_bug.cgi?id=945192 +CVE-2015-0834 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0835 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-0835 - https://bugzilla.mozilla.org/show_bug.cgi?id=1092947 +CVE-2015-0836 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-0836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1111243 +CVE-2015-0836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1111248 +CVE-2015-0836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1117406 +CVE-2015-0848 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-0852 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2015-0860 - https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html +CVE-2015-0884 - http://www.kb.cert.org/vuls/id/632140 +CVE-2015-0899 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-0901 - https://wpvulndb.com/vulnerabilities/7872 +CVE-2015-0917 - http://packetstormsecurity.com/files/129826/Kajona-CMS-4.6-Cross-Site-Scripting.html +CVE-2015-0917 - http://seclists.org/fulldisclosure/2015/Jan/11 +CVE-2015-0918 - http://packetstormsecurity.com/files/129825/Sefrengo-CMS-1.6.0-Cross-Site-Scripting.html +CVE-2015-0918 - http://seclists.org/fulldisclosure/2015/Jan/10 +CVE-2015-0919 - http://packetstormsecurity.com/files/129824/Sefrengo-CMS-1.6.0-SQL-Injection.html +CVE-2015-0919 - http://seclists.org/fulldisclosure/2015/Jan/9 +CVE-2015-0920 - http://packetstormsecurity.com/files/129804/WordPress-Banner-Effect-Header-1.2.6-XSS-CSRF.html +CVE-2015-0921 - http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html +CVE-2015-0921 - http://seclists.org/fulldisclosure/2015/Jan/8 +CVE-2015-0921 - https://kc.mcafee.com/corporate/index?page=content&id=SB10095 +CVE-2015-0922 - http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html +CVE-2015-0922 - http://seclists.org/fulldisclosure/2015/Jan/8 +CVE-2015-0922 - https://kc.mcafee.com/corporate/index?page=content&id=SB10095 +CVE-2015-0923 - http://www.kb.cert.org/vuls/id/377644 +CVE-2015-0925 - http://www.kb.cert.org/vuls/id/110652 +CVE-2015-0926 - http://www.kb.cert.org/vuls/id/637068 +CVE-2015-0931 - http://www.kb.cert.org/vuls/id/377644 +CVE-2015-0933 - http://www.kb.cert.org/vuls/id/302668 +CVE-2015-0934 - http://www.kb.cert.org/vuls/id/302668 +CVE-2015-0935 - http://www.kb.cert.org/vuls/id/978652 +CVE-2015-0935 - https://www.exploit-db.com/exploits/39958/ +CVE-2015-0936 - http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html +CVE-2015-0936 - http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html +CVE-2015-0937 - http://www.kb.cert.org/vuls/id/274244 +CVE-2015-0938 - http://www.kb.cert.org/vuls/id/274244 +CVE-2015-0943 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-0949 - http://www.kb.cert.org/vuls/id/631788 +CVE-2015-0950 - http://www.kb.cert.org/vuls/id/924124 +CVE-2015-0951 - http://www.kb.cert.org/vuls/id/924124 +CVE-2015-0961 - http://www.kb.cert.org/vuls/id/534407 +CVE-2015-0962 - http://www.kb.cert.org/vuls/id/534407 +CVE-2015-0974 - http://packetstormsecurity.com/files/129808/ZTE-Datacard-MF19-Privilege-Escalation-DLL-Hijacking.html +CVE-2015-0984 - http://seclists.org/fulldisclosure/2015/Apr/79 +CVE-2015-1000013 - http://www.vapidlabs.com/advisory.php?v=153 +CVE-2015-10001 - https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734 +CVE-2015-10001 - https://www.openwall.com/lists/oss-security/2015/06/17/6 +CVE-2015-10007 - https://github.com/82Flex/WEIPDCRM/commit/43bad79392332fa39e31b95268e76fbda9fec3a4 +CVE-2015-10008 - https://github.com/82Flex/WEIPDCRM/commit/43bad79392332fa39e31b95268e76fbda9fec3a4 +CVE-2015-10009 - https://vuldb.com/?id.217187 +CVE-2015-10028 - https://vuldb.com/?ctiid.217624 +CVE-2015-10030 - https://vuldb.com/?ctiid.217642 +CVE-2015-10032 - https://vuldb.com/?id.217663 +CVE-2015-10041 - https://vuldb.com/?id.218304 +CVE-2015-10063 - https://vuldb.com/?ctiid.218453 +CVE-2015-10073 - https://vuldb.com/?id.220215 +CVE-2015-10075 - https://vuldb.com/?id.220219 +CVE-2015-10087 - https://vuldb.com/?id.221809 +CVE-2015-10087 - https://www.exploit-db.com/exploits/36372 +CVE-2015-10090 - https://github.com/wp-plugins/landing-pages/commit/c8e22c1340c11fedfb0a0a67ea690421bdb62b94 +CVE-2015-10101 - https://github.com/wp-plugins/google-analytics-top-posts-widget/commit/25bb1dea113716200a6f0f3135801d84a7a65540 +CVE-2015-10129 - https://vuldb.com/?id.252716 +CVE-2015-1026 - http://packetstormsecurity.com/files/130737/Manage-Engine-AD-Audit-Manager-Plus-Cross-Site-Scripting.html +CVE-2015-1027 - https://www.percona.com/blog/2015/05/06/percona-security-advisory-cve-2015-1027/ +CVE-2015-1028 - http://www.exploit-db.com/exploits/35747 +CVE-2015-1028 - http://www.exploit-db.com/exploits/35750 +CVE-2015-1028 - http://www.exploit-db.com/exploits/35751 +CVE-2015-1028 - http://www.xlabs.com.br/blog/?p=339 +CVE-2015-1029 - http://puppetlabs.com/security/cve/cve-2015-1029 +CVE-2015-1032 - http://packetstormsecurity.com/files/130007/Kiwix-Cross-Site-Scripting.html +CVE-2015-1040 - http://packetstormsecurity.com/files/129865/CMS-BEdita-3.4.0-Cross-Site-Scripting.html +CVE-2015-1041 - http://packetstormsecurity.com/files/129872/CMS-e107-1.0.4-Cross-Site-Scripting.html +CVE-2015-1041 - http://www.securityfocus.com/bid/71977 +CVE-2015-1042 - http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html +CVE-2015-1050 - http://packetstormsecurity.com/files/129911/F5-BIG-IP-Application-Security-Manager-ASM-XSS.html +CVE-2015-1050 - http://seclists.org/fulldisclosure/2015/Jan/43 +CVE-2015-1052 - http://packetstormsecurity.com/files/129917/CMS-PHPKit-WCMS-1.6.6-Cross-Site-Scripting.html +CVE-2015-1052 - http://seclists.org/fulldisclosure/2015/Jan/25 +CVE-2015-1053 - http://packetstormsecurity.com/files/129916/CMS-Croogo-2.2.0-Cross-Site-Scripting.html +CVE-2015-1053 - http://seclists.org/fulldisclosure/2015/Jan/24 +CVE-2015-1054 - http://codecanyon.net/item/crea8social-php-social-networking-platform-v31/9211270/support +CVE-2015-1054 - http://packetstormsecurity.com/files/129816/Crea8Social-2.0-Cross-Site-Scripting.html +CVE-2015-1054 - http://www.exploit-db.com/exploits/35691 +CVE-2015-1056 - http://packetstormsecurity.com/files/129841/Brother-MFC-J4410DW-Cross-Site-Scripting.html +CVE-2015-1058 - http://packetstormsecurity.com/files/129812/AdaptCMS-3.0.3-Cross-Site-Scripting.html +CVE-2015-1058 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5218.php +CVE-2015-1059 - http://packetstormsecurity.com/files/129814/AdaptCMS-3.0.3-Remote-Command-Execution.html +CVE-2015-1059 - http://zeroscience.mk/en/vulnerabilities/ZSL-2015-5220.php +CVE-2015-1060 - http://packetstormsecurity.com/files/129813/AdaptCMS-3.0.3-HTTP-Referer-Header-Open-Redirect.html +CVE-2015-1060 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5219.php +CVE-2015-1100 - https://www.exploit-db.com/exploits/36814/ +CVE-2015-1130 - https://www.exploit-db.com/exploits/36692/ +CVE-2015-1157 - http://www.reddit.com/r/apple/comments/37e8c1/malicious_text_message/ +CVE-2015-1158 - http://www.kb.cert.org/vuls/id/810572 +CVE-2015-1158 - https://www.cups.org/str.php?L4609 +CVE-2015-1158 - https://www.exploit-db.com/exploits/37336/ +CVE-2015-1158 - https://www.exploit-db.com/exploits/41233/ +CVE-2015-1159 - http://www.kb.cert.org/vuls/id/810572 +CVE-2015-1159 - https://www.cups.org/str.php?L4609 +CVE-2015-1169 - http://packetstormsecurity.com/files/130053/CAS-Server-3.5.2-LDAP-Authentication-Bypass.html +CVE-2015-1169 - https://issues.jasig.org/browse/CAS-1429 +CVE-2015-1170 - http://nvidia.custhelp.com/app/answers/detail/a_id/3634 +CVE-2015-1171 - http://packetstormsecurity.com/files/129992/simeditor-overflow.txt +CVE-2015-1171 - https://osandamalith.wordpress.com/2015/01/16/sim-editor-stack-based-buffer-overflow/ +CVE-2015-1171 - https://www.youtube.com/watch?v=tljbFpYtDTk +CVE-2015-1172 - http://packetstormsecurity.com/files/130282/WordPress-Holding-Pattern-0.6-Shell-Upload.html +CVE-2015-1172 - https://wpvulndb.com/vulnerabilities/7784 +CVE-2015-1173 - http://packetstormsecurity.com/files/133147/UNIT4TETA-TETA-WEB-22.62.3.4-Authorization-Bypass.html +CVE-2015-1174 - http://packetstormsecurity.com/files/133296/UNIT4TETA-TETA-WEB-22.62.3.4-Session-Fixation.html +CVE-2015-1175 - http://packetstormsecurity.com/files/130026/Prestashop-1.6.0.9-Cross-Site-Scripting.html +CVE-2015-1176 - http://packetstormsecurity.com/files/130057/osTicket-1.9.4-Cross-Site-Scripting.html +CVE-2015-1177 - http://packetstormsecurity.com/files/130058/Exponent-CMS-2.3.2-Cross-Site-Scripting.html +CVE-2015-1178 - http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html +CVE-2015-1179 - http://packetstormsecurity.com/files/130062/Mango-Automation-SCADA-HMI-2.4.0-Cross-Site-Scripting.html +CVE-2015-1180 - http://packetstormsecurity.com/files/130063/EventSentry-3.1.0-Cross-Site-Scripting.html +CVE-2015-1187 - http://packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.html +CVE-2015-1187 - http://packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.html +CVE-2015-1188 - http://seclists.org/fulldisclosure/2015/Apr/103 +CVE-2015-1195 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1197 - http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html +CVE-2015-1204 - https://wpvulndb.com/vulnerabilities/7744 +CVE-2015-1205 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1209 - http://www.ubuntu.com/usn/USN-2495-1 +CVE-2015-1210 - http://www.ubuntu.com/usn/USN-2495-1 +CVE-2015-1211 - http://www.ubuntu.com/usn/USN-2495-1 +CVE-2015-1212 - http://www.ubuntu.com/usn/USN-2495-1 +CVE-2015-1265 - https://www.exploit-db.com/exploits/37766/ +CVE-2015-1270 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-1279 - https://code.google.com/p/chromium/issues/detail?id=483981 +CVE-2015-1282 - https://pdfium.googlesource.com/pdfium/+/4ff7a4246c81a71b4f878e959b3ca304cd76ec8a +CVE-2015-1283 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-1283 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2015-1283 - https://www.tenable.com/security/tns-2016-20 +CVE-2015-1300 - https://github.com/w3c/resource-timing/issues/29 +CVE-2015-1305 - http://packetstormsecurity.com/files/130177/McAfee-Data-Loss-Prevention-Endpoint-Privilege-Escalation.html +CVE-2015-1313 - https://beyondbinary.io/articles/teamcity-account-creation/ +CVE-2015-1314 - http://packetstormsecurity.com/files/130067/USAA-Mobile-App-Information-Disclosure.html +CVE-2015-1318 - https://www.exploit-db.com/exploits/36782/ +CVE-2015-1318 - https://www.exploit-db.com/exploits/43971/ +CVE-2015-1324 - http://www.ubuntu.com/usn/USN-2609-1 +CVE-2015-1324 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1452239 +CVE-2015-1325 - http://www.ubuntu.com/usn/USN-2609-1 +CVE-2015-1325 - https://www.exploit-db.com/exploits/37088/ +CVE-2015-1328 - https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html +CVE-2015-1328 - https://www.exploit-db.com/exploits/37292/ +CVE-2015-1331 - https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842 +CVE-2015-1333 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1335 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1336 - http://packetstormsecurity.com/files/140759/Man-db-2.6.7.1-Privilege-Escalation.html +CVE-2015-1336 - http://www.halfdog.net/Security/2015/MandbSymlinkLocalRootPrivilegeEscalation/ +CVE-2015-1338 - http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html +CVE-2015-1338 - http://seclists.org/fulldisclosure/2015/Sep/101 +CVE-2015-1338 - http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/ +CVE-2015-1338 - https://www.exploit-db.com/exploits/38353/ +CVE-2015-1345 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1349 - https://kb.isc.org/article/AA-01235 +CVE-2015-1351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1351 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-1352 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-1362 - http://packetstormsecurity.com/files/130037/Exif-Pilot-4.7.2-Buffer-Overflow.html +CVE-2015-1363 - http://packetstormsecurity.com/files/130066/articleFR-CMS-3.0.5-Cross-Site-Scripting.html +CVE-2015-1363 - http://seclists.org/fulldisclosure/2015/Jan/101 +CVE-2015-1364 - http://seclists.org/fulldisclosure/2015/Jan/81 +CVE-2015-1364 - http://www.exploit-db.com/exploits/35857 +CVE-2015-1365 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html +CVE-2015-1365 - http://seclists.org/fulldisclosure/2015/Jan/75 +CVE-2015-1365 - http://www.exploit-db.com/exploits/35846 +CVE-2015-1366 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html +CVE-2015-1366 - http://seclists.org/fulldisclosure/2015/Jan/75 +CVE-2015-1366 - http://www.exploit-db.com/exploits/35846 +CVE-2015-1367 - http://packetstormsecurity.com/files/129990/CatBot-0.4.2-SQL-Injection.html +CVE-2015-1367 - http://seclists.org/fulldisclosure/2015/Jan/63 +CVE-2015-1367 - http://www.vulnerability-lab.com/get_content.php?id=1408 +CVE-2015-1368 - http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html +CVE-2015-1368 - http://seclists.org/fulldisclosure/2015/Jan/52 +CVE-2015-1368 - http://www.exploit-db.com/exploits/35786 +CVE-2015-1375 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html +CVE-2015-1375 - http://seclists.org/fulldisclosure/2015/Jan/75 +CVE-2015-1375 - http://www.exploit-db.com/exploits/35846 +CVE-2015-1376 - http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html +CVE-2015-1376 - http://seclists.org/fulldisclosure/2015/Jan/75 +CVE-2015-1376 - http://www.exploit-db.com/exploits/35846 +CVE-2015-1384 - http://seclists.org/fulldisclosure/2015/Feb/2 +CVE-2015-1384 - https://www.netsparker.com/cve-2015-1384-xss-vulnerability-in-banner-effect-header/ +CVE-2015-1385 - http://packetstormsecurity.com/files/130155/Blubrry-PowerPress-6.0-Cross-Site-Scripting.html +CVE-2015-1385 - http://seclists.org/fulldisclosure/2015/Jan/130 +CVE-2015-1385 - https://www.netsparker.com/cve-2015-1385-xss-vulnerability-in-blubrry-powerpress/ +CVE-2015-1386 - http://www.openwall.com/lists/oss-security/2015/01/27/27 +CVE-2015-1386 - https://bugzilla.redhat.com/show_bug.cgi?id=1185717 +CVE-2015-1389 - http://packetstormsecurity.com/files/132060/Aruba-ClearPass-Policy-Manager-6.4-Cross-Site-Scripting.html +CVE-2015-1389 - https://www.exploit-db.com/exploits/37172/ +CVE-2015-1395 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873 +CVE-2015-1397 - https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html +CVE-2015-1400 - http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html +CVE-2015-1401 - http://www.openwall.com/lists/oss-security/2015/01/11/7 +CVE-2015-1402 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/ +CVE-2015-1402 - http://www.openwall.com/lists/oss-security/2015/01/11/7 +CVE-2015-1403 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/ +CVE-2015-1403 - http://www.openwall.com/lists/oss-security/2015/01/11/7 +CVE-2015-1404 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/ +CVE-2015-1404 - http://www.openwall.com/lists/oss-security/2015/01/11/7 +CVE-2015-1405 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/ +CVE-2015-1405 - http://www.openwall.com/lists/oss-security/2015/01/11/7 +CVE-2015-1415 - http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-Disclosure.html +CVE-2015-1418 - http://rachelbythebay.com/w/2018/04/05/bangpatch/ +CVE-2015-1418 - https://bugs.debian.org/894667 +CVE-2015-1420 - http://www.ubuntu.com/usn/USN-2665-1 +CVE-2015-1422 - http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html +CVE-2015-1422 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php +CVE-2015-1423 - http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html +CVE-2015-1423 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php +CVE-2015-1424 - http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html +CVE-2015-1424 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php +CVE-2015-1427 - http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html +CVE-2015-1427 - http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html +CVE-2015-1427 - https://www.elastic.co/community/security/ +CVE-2015-1428 - http://www.exploit-db.com/exploits/35972 +CVE-2015-1434 - http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-1435 - http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-1436 - http://packetstormsecurity.com/files/130355/WordPress-Easing-Slider-2.2.0.6-Cross-Site-Scripting.html +CVE-2015-1437 - http://packetstormsecurity.com/files/130187/Asus-RT-N10-Plus-Cross-Site-Scripting.html +CVE-2015-1438 - http://packetstormsecurity.com/files/132682/Panda-Security-1.0.0.13-Arbitrary-Code-Execution.html +CVE-2015-1442 - http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html +CVE-2015-1442 - http://seclists.org/fulldisclosure/2015/Feb/4 +CVE-2015-1450 - http://packetstormsecurity.com/files/130122/Restaurantbiller-SQL-Injection-Shell-Upload.html +CVE-2015-1451 - http://seclists.org/fulldisclosure/2015/Jan/125 +CVE-2015-1452 - http://seclists.org/fulldisclosure/2015/Jan/125 +CVE-2015-1455 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html +CVE-2015-1456 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html +CVE-2015-1457 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html +CVE-2015-1458 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html +CVE-2015-1459 - http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html +CVE-2015-1467 - http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html +CVE-2015-1472 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2015-1472 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2015-1472 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2015-1472 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2015-1472 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-1472 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1472 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2015-1472 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2015-1473 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1474 - http://packetstormsecurity.com/files/130778/Google-Android-Integer-Oveflow-Heap-Corruption.html +CVE-2015-1474 - http://seclists.org/fulldisclosure/2015/Mar/63 +CVE-2015-1475 - http://packetstormsecurity.com/files/130220/My-Little-Forum-2.3.3-2.2-1.7-Cross-Site-Scripting.html +CVE-2015-1476 - http://packetstormsecurity.com/files/130073/ecommerceMajor-SQL-Injection.html +CVE-2015-1476 - http://www.exploit-db.com/exploits/35878 +CVE-2015-1477 - http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-1477 - http://www.exploit-db.com/exploits/35911 +CVE-2015-1478 - http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-1478 - http://www.exploit-db.com/exploits/35911 +CVE-2015-1479 - http://packetstormsecurity.com/files/130079/ManageEngine-ServiceDesk-9.0-SQL-Injection.html +CVE-2015-1479 - http://www.exploit-db.com/exploits/35890 +CVE-2015-1479 - http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-sql-injection-vulnerability +CVE-2015-1480 - http://packetstormsecurity.com/files/130081/ManageEngine-ServiceDesk-Plus-9.0-Privilege-Escalation.html +CVE-2015-1480 - http://www.exploit-db.com/exploits/35904 +CVE-2015-1480 - http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-privileges-management-vulnerability +CVE-2015-1481 - http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html +CVE-2015-1481 - http://seclists.org/fulldisclosure/2015/Jan/52 +CVE-2015-1481 - http://www.exploit-db.com/exploits/35786 +CVE-2015-1482 - http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html +CVE-2015-1482 - http://seclists.org/fulldisclosure/2015/Jan/52 +CVE-2015-1482 - http://www.exploit-db.com/exploits/35786 +CVE-2015-1486 - https://www.exploit-db.com/exploits/37812/ +CVE-2015-1487 - https://www.exploit-db.com/exploits/37812/ +CVE-2015-1489 - https://www.exploit-db.com/exploits/37812/ +CVE-2015-1497 - http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html +CVE-2015-1497 - https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features +CVE-2015-1497 - https://www.exploit-db.com/exploits/40491/ +CVE-2015-1503 - http://packetstormsecurity.com/files/147505/IceWarp-Mail-Server-Directory-Traversal.html +CVE-2015-1503 - https://www.exploit-db.com/exploits/44587/ +CVE-2015-1503 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-001/?fid=5614 +CVE-2015-1512 - http://packetstormsecurity.com/files/130119/FancyFon-FAMOC-3.16.5-Cross-Site-Scripting.html +CVE-2015-1512 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-011.txt +CVE-2015-1513 - http://packetstormsecurity.com/files/130194/SIPhone-Enterprise-PBX-SQL-Injection.html +CVE-2015-1514 - http://packetstormsecurity.com/files/130117/FancyFon-FAMOC-3.16.5-SQL-Injection.html +CVE-2015-1514 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-010.txt +CVE-2015-1516 - http://adrianhayter.com/exploits.php +CVE-2015-1517 - http://packetstormsecurity.com/files/130440/Piwigo-2.7.3-SQL-Injection.html +CVE-2015-1518 - http://packetstormsecurity.com/files/130322/Radexscript-CMS-2.2.0-SQL-Injection.html +CVE-2015-1518 - http://seclists.org/fulldisclosure/2015/Feb/39 +CVE-2015-1518 - http://www.exploit-db.com/exploits/36023 +CVE-2015-1536 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-1538 - http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html +CVE-2015-1538 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-1538 - https://www.exploit-db.com/exploits/38124/ +CVE-2015-1539 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-1541 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-1547 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-1547 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-1547 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-1554 - https://bugzilla.redhat.com/show_bug.cgi?id=1186590 +CVE-2015-1560 - http://packetstormsecurity.com/files/132607/Merethis-Centreon-2.5.4-SQL-Injection-Remote-Command-Execution.html +CVE-2015-1561 - http://packetstormsecurity.com/files/132607/Merethis-Centreon-2.5.4-SQL-Injection-Remote-Command-Execution.html +CVE-2015-1564 - http://seclists.org/fulldisclosure/2015/Jan/79 +CVE-2015-1571 - http://seclists.org/fulldisclosure/2015/Jan/125 +CVE-2015-1574 - http://packetstormsecurity.com/files/130388/Google-Email-4.4.2.0200-Denial-Of-Service.html +CVE-2015-1574 - http://seclists.org/fulldisclosure/2015/Feb/58 +CVE-2015-1575 - http://packetstormsecurity.com/files/130292/u5CMS-3.9.3-Cross-Site-Scripting.html +CVE-2015-1575 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5223.php +CVE-2015-1576 - http://packetstormsecurity.com/files/130326/u5CMS-3.9.3-SQL-Injection.html +CVE-2015-1576 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5225.php +CVE-2015-1577 - http://packetstormsecurity.com/files/130325/u5CMS-3.9.3-Arbitrary-File-Deletion.html +CVE-2015-1577 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5226.php +CVE-2015-1578 - http://packetstormsecurity.com/files/130317/u5CMS-3.9.3-Open-Redirect.html +CVE-2015-1578 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5227.php +CVE-2015-1579 - https://wpvulndb.com/vulnerabilities/7540 +CVE-2015-1580 - http://packetstormsecurity.com/files/130314/WordPress-Redirection-Page-1.2-CSRF-XSS.html +CVE-2015-1581 - http://packetstormsecurity.com/files/130316/WordPress-Mobile-Domain-1.5.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-1582 - http://packetstormsecurity.com/files/130318/WordPress-Spider-Facebook-1.0.10-Cross-Site-Scripting.html +CVE-2015-1583 - http://packetstormsecurity.com/files/130598/ATutor-LCMS-2.2-Cross-Site-Request-Forgery.html +CVE-2015-1583 - https://edricteo.com/cve-2015-1583-atutor-lcms-csrf-vulnerability/ +CVE-2015-1585 - http://packetstormsecurity.com/files/130410/Fat-Free-CRM-0.13.5-Cross-Site-Request-Forgery.html +CVE-2015-1587 - http://packetstormsecurity.com/files/130383/Maarch-LetterBox-2.8-Unrestricted-File-Upload.html +CVE-2015-1587 - http://www.exploit-db.com/exploits/35113 +CVE-2015-1588 - http://packetstormsecurity.com/files/131649/Open-Xchange-Server-6-OX-AppSuite-Cross-Site-Scripting.html +CVE-2015-1589 - http://www.openwall.com/lists/oss-security/2015/02/12/16 +CVE-2015-1589 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776164 +CVE-2015-1590 - https://github.com/kamailio/kamailio/issues/48 +CVE-2015-1591 - https://github.com/kamailio/kamailio/issues/48 +CVE-2015-1600 - http://packetstormsecurity.com/files/130401/Netatmo-Weather-Station-Cleartext-Password-Leak.html +CVE-2015-1603 - http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html +CVE-2015-1604 - http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html +CVE-2015-1614 - http://packetstormsecurity.com/files/130404/WordPress-Image-Metadata-Cruncher-Cross-Site-Scripting.html +CVE-2015-1635 - http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html +CVE-2015-1635 - https://www.exploit-db.com/exploits/36773/ +CVE-2015-1635 - https://www.exploit-db.com/exploits/36776/ +CVE-2015-1645 - http://packetstormsecurity.com/files/131457/Microsoft-Windows-GDI-MRSETDIBITSTODEVICE-bPlay-EMF-Parsing-Memory-Corruption.html +CVE-2015-1674 - https://www.exploit-db.com/exploits/37052/ +CVE-2015-1701 - http://seclists.org/fulldisclosure/2020/May/34 +CVE-2015-1701 - https://www.exploit-db.com/exploits/37049/ +CVE-2015-1701 - https://www.exploit-db.com/exploits/37367/ +CVE-2015-1721 - https://www.exploit-db.com/exploits/38274/ +CVE-2015-1722 - https://www.exploit-db.com/exploits/38265/ +CVE-2015-1722 - https://www.exploit-db.com/exploits/38275/ +CVE-2015-1723 - https://www.exploit-db.com/exploits/38273/ +CVE-2015-1724 - https://www.exploit-db.com/exploits/38272/ +CVE-2015-1725 - https://www.exploit-db.com/exploits/38270/ +CVE-2015-1725 - https://www.exploit-db.com/exploits/38271/ +CVE-2015-1726 - https://www.exploit-db.com/exploits/38269/ +CVE-2015-1727 - https://www.exploit-db.com/exploits/38268/ +CVE-2015-1730 - http://blog.skylined.nl/20161206001.html +CVE-2015-1730 - http://packetstormsecurity.com/files/140050/Microsoft-Internet-Explorer-9-jscript9-JavaScriptStackWalker-Memory-Corruption.html +CVE-2015-1730 - https://www.exploit-db.com/exploits/40881/ +CVE-2015-1776 - http://www.securityfocus.com/bid/83259 +CVE-2015-1779 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1781 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1782 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1784 - https://blog.nettitude.com/uk/crsf-and-unsafe-arbitrary-file-upload-in-nextgen-gallery-plugin-for-wordpress +CVE-2015-1784 - https://wpscan.com/vulnerability/c894727a-b779-4583-a860-13c2c27275d4 +CVE-2015-1785 - https://blog.nettitude.com/uk/crsf-and-unsafe-arbitrary-file-upload-in-nextgen-gallery-plugin-for-wordpress +CVE-2015-1785 - https://wpscan.com/vulnerability/c894727a-b779-4583-a860-13c2c27275d4 +CVE-2015-1787 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-1787 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1788 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1788 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1788 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1788 - http://www.securityfocus.com/bid/91787 +CVE-2015-1788 - https://hackerone.com/reports/73241 +CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1789 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1789 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1789 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1789 - http://www.securityfocus.com/bid/91787 +CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1790 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1790 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1790 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1790 - http://www.securityfocus.com/bid/91787 +CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1791 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1791 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1791 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1791 - http://www.securityfocus.com/bid/91787 +CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1792 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1792 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1792 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1792 - http://www.securityfocus.com/bid/91787 +CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-1793 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-1793 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-1793 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1793 - http://www.securityfocus.com/bid/91787 +CVE-2015-1793 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2015-1793 - https://www.exploit-db.com/exploits/38640/ +CVE-2015-1794 - http://fortiguard.com/advisory/openssl-advisory-december-2015 +CVE-2015-1794 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-1794 - http://www.ubuntu.com/usn/USN-2830-1 +CVE-2015-1798 - http://www.kb.cert.org/vuls/id/374268 +CVE-2015-1798 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1798 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1799 - http://www.kb.cert.org/vuls/id/374268 +CVE-2015-1799 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1802 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1802 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-1803 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1803 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-1804 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1804 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-1805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1815 - http://www.openwall.com/lists/oss-security/2015/03/26/1 +CVE-2015-1815 - https://bugzilla.redhat.com/show_bug.cgi?id=1203352 +CVE-2015-1815 - https://www.exploit-db.com/exploits/36564/ +CVE-2015-1819 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-1819 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1821 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1822 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-1829 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-1830 - http://packetstormsecurity.com/files/156643/Apache-ActiveMQ-5.11.1-Directory-Traversal-Shell-Upload.html +CVE-2015-1832 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2015-1832 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2015-1832 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2015-1833 - http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html +CVE-2015-1833 - https://www.exploit-db.com/exploits/37110/ +CVE-2015-1835 - http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-apache-vulnerability-that-allows-one-click-modification-of-android-apps/ +CVE-2015-1842 - http://rhn.redhat.com/errata/RHSA-2015-0789.html +CVE-2015-1842 - http://rhn.redhat.com/errata/RHSA-2015-0831.html +CVE-2015-1842 - http://rhn.redhat.com/errata/RHSA-2015-0832.html +CVE-2015-1842 - https://access.redhat.com/errata/RHSA-2015:0789 +CVE-2015-1842 - https://access.redhat.com/errata/RHSA-2015:0831 +CVE-2015-1842 - https://access.redhat.com/errata/RHSA-2015:0832 +CVE-2015-1852 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1855 - https://puppetlabs.com/security/cve/cve-2015-1855 +CVE-2015-1856 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-1862 - http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html +CVE-2015-1862 - http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html +CVE-2015-1862 - http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html +CVE-2015-1862 - https://www.exploit-db.com/exploits/36746/ +CVE-2015-1862 - https://www.exploit-db.com/exploits/36747/ +CVE-2015-1863 - http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html +CVE-2015-1863 - http://seclists.org/fulldisclosure/2015/Apr/82 +CVE-2015-1872 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-1874 - http://packetstormsecurity.com/files/130654/WordPress-Contact-Form-DB-2.8.29-Cross-Site-Request-Forgery.html +CVE-2015-1874 - http://seclists.org/fulldisclosure/2015/Mar/21 +CVE-2015-1874 - https://security.dxw.com/advisories/csrf-in-contact-form-db-allows-attacker-to-delete-all-stored-form-submissions/ +CVE-2015-1875 - http://packetstormsecurity.com/files/130698/Elastix-2.5.0-SQL-Injection.html +CVE-2015-1875 - https://www.exploit-db.com/exploits/36305/ +CVE-2015-1876 - http://packetstormsecurity.com/files/130431/ES-File-Explorer-3.2.4.1-Path-Traversal.html +CVE-2015-1877 - http://www.openwall.com/lists/oss-security/2015/02/18/7 +CVE-2015-1877 - http://www.openwall.com/lists/oss-security/2015/02/18/9 +CVE-2015-1879 - http://packetstormsecurity.com/files/130309/WordPress-Google-Doc-Embedder-2.5.18-Cross-Site-Scripting.html +CVE-2015-1892 - http://www.kb.cert.org/vuls/id/550620 +CVE-2015-1914 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-1916 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-1926 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-1935 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT08543 +CVE-2015-1969 - http://www-01.ibm.com/support/docview.wss?uid=swg21967384 +CVE-2015-20019 - https://seclists.org/bugtraq/2015/Dec/124 +CVE-2015-20019 - https://wpscan.com/vulnerability/4f92b211-e09c-4ed0-bc98-27e0b51b1f86 +CVE-2015-20067 - https://seclists.org/fulldisclosure/2015/Jul/73 +CVE-2015-20067 - https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a +CVE-2015-20105 - https://packetstormsecurity.com/files/131814/ +CVE-2015-20105 - https://seclists.org/bugtraq/2015/May/45 +CVE-2015-20105 - https://wpscan.com/vulnerability/2bc3af7e-5542-40c4-8141-7c49e8df68f0 +CVE-2015-20106 - https://wpscan.com/vulnerability/907792c4-3384-4351-bb75-0ad10f65fbe1 +CVE-2015-20107 - https://github.com/python/cpython/issues/68966 +CVE-2015-2023 - https://www.exploit-db.com/exploits/38751/ +CVE-2015-2025 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2026 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2027 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2028 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2029 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2030 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2031 - http://www-01.ibm.com/support/docview.wss?uid=swg21966044 +CVE-2015-2034 - http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-2035 - http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-2039 - http://packetstormsecurity.com/files/130306/WordPress-Acobot-Live-Chat-And-Contact-Form-2.0-CSRF-XSS.html +CVE-2015-2040 - http://packetstormsecurity.com/files/130311/WordPress-Contact-Form-DB-2.8.26-Cross-Site-Scripting.html +CVE-2015-2041 - https://github.com/torvalds/linux/commit/6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49 +CVE-2015-2043 - http://packetstormsecurity.com/files/130490/MyConnection-Server-8.2b-Cross-Site-Scripting.html +CVE-2015-2049 - http://www.kb.cert.org/vuls/id/377348 +CVE-2015-2049 - https://www.exploit-db.com/exploits/39192/ +CVE-2015-2050 - http://www.kb.cert.org/vuls/id/184100 +CVE-2015-2051 - https://www.exploit-db.com/exploits/37171/ +CVE-2015-2054 - http://seclists.org/fulldisclosure/2015/Jan/58 +CVE-2015-2055 - http://www.exploit-db.com/exploits/35859 +CVE-2015-2062 - http://packetstormsecurity.com/files/130796/WordPress-Huge-IT-Slider-2.6.8-SQL-Injection.html +CVE-2015-2064 - http://seclists.org/fulldisclosure/2015/Feb/66 +CVE-2015-2065 - http://packetstormsecurity.com/files/130371/WordPress-Video-Gallery-2.7-SQL-Injection.html +CVE-2015-2065 - http://www.exploit-db.com/exploits/36058 +CVE-2015-2066 - http://seclists.org/fulldisclosure/2015/Feb/69 +CVE-2015-2067 - http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2015-2068 - http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2015-2069 - http://packetstormsecurity.com/files/130458/WordPress-WooCommerce-2.2.10-Cross-Site-Scripting.html +CVE-2015-2069 - http://seclists.org/fulldisclosure/2015/Feb/75 +CVE-2015-2070 - http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html +CVE-2015-2071 - http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html +CVE-2015-2072 - http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html +CVE-2015-2073 - http://packetstormsecurity.com/files/130520/SAP-Business-Objects-Unauthorized-File-Repository-Server-Read.html +CVE-2015-2074 - http://packetstormsecurity.com/files/130521/SAP-Business-Objects-Unauthorized-File-Repository-Server-Write.html +CVE-2015-2075 - http://packetstormsecurity.com/files/130522/SAP-Business-Objects-Unauthorized-Audit-Information-Delete.html +CVE-2015-2076 - http://packetstormsecurity.com/files/130523/SAP-Business-Objects-Unauthorized-Audit-Information-Access.html +CVE-2015-2080 - http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html +CVE-2015-2080 - http://seclists.org/fulldisclosure/2015/Mar/12 +CVE-2015-2080 - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html +CVE-2015-2082 - http://packetstormsecurity.com/files/130396/UNIT4-Prosoft-HRMS-8.14.230.47-Cross-Site-Scripting.html +CVE-2015-2083 - http://packetstormsecurity.com/files/130441/Ilch-CMS-Cross-Site-Request-Forgery.html +CVE-2015-2084 - http://packetstormsecurity.com/files/130461/WordPress-Easy-Social-Icons-1.2.2-CSRF-XSS.html +CVE-2015-2084 - http://seclists.org/fulldisclosure/2015/Feb/76 +CVE-2015-2084 - http://www.exploit-db.com/exploits/36161 +CVE-2015-2087 - https://www.drupal.org/node/2427069 +CVE-2015-2089 - http://packetstormsecurity.com/files/130313/WordPress-Cross-Slide-2.0.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-2090 - http://packetstormsecurity.com/files/130381/WordPress-Survey-And-Poll-1.1.7-Blind-SQL-Injection.html +CVE-2015-2090 - http://www.exploit-db.com/exploits/36054 +CVE-2015-2094 - http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html +CVE-2015-2094 - https://www.exploit-db.com/exploits/36517/ +CVE-2015-2097 - http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html +CVE-2015-2097 - http://seclists.org/fulldisclosure/2015/Feb/90 +CVE-2015-2097 - https://www.exploit-db.com/exploits/36505/ +CVE-2015-2097 - https://www.exploit-db.com/exploits/36602/ +CVE-2015-2097 - https://www.exploit-db.com/exploits/36607/ +CVE-2015-2102 - http://packetstormsecurity.com/files/130485/Clipbucket-2.7.0.4.v2929-rc3-Blind-SQL-Injection.html +CVE-2015-2102 - http://www.exploit-db.com/exploits/36156 +CVE-2015-2103 - http://packetstormsecurity.com/files/130403/Cosmoshop-Cross-Site-Scripting.html +CVE-2015-2125 - https://www.exploit-db.com/exploits/37250/ +CVE-2015-2150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2150 - http://www.ubuntu.com/usn/USN-2632-1 +CVE-2015-2151 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2153 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html +CVE-2015-2153 - https://www.exploit-db.com/exploits/37663/ +CVE-2015-2154 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html +CVE-2015-2155 - http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html +CVE-2015-2156 - https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass +CVE-2015-2165 - http://packetstormsecurity.com/files/131232/Ericsson-Drutt-MSDP-Report-Viewer-Cross-Site-Scripting.html +CVE-2015-2166 - http://packetstormsecurity.com/files/131233/Ericsson-Drutt-MSDP-Instance-Monitor-Directory-Traversal-File-Access.html +CVE-2015-2166 - https://www.exploit-db.com/exploits/36619/ +CVE-2015-2167 - http://packetstormsecurity.com/files/131230/Ericsson-Drutt-MSDP-3PI-Manager-Open-Redirect.html +CVE-2015-2169 - http://packetstormsecurity.com/files/132433/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html +CVE-2015-2169 - http://seclists.org/fulldisclosure/2015/Jun/74 +CVE-2015-2169 - http://techtootech.blogspot.in/2015/06/found-xss-vulnerability-in-manage.html +CVE-2015-2169 - https://www.exploit-db.com/exploits/37395/ +CVE-2015-2177 - https://www.exploit-db.com/exploits/44802/ +CVE-2015-2180 - https://github.com/roundcube/roundcubemail/issues/4757 +CVE-2015-2181 - https://github.com/roundcube/roundcubemail/issues/4757 +CVE-2015-2182 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-2182 - https://github.com/ZeusCart/zeuscart/issues/28 +CVE-2015-2183 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-2183 - https://github.com/ZeusCart/zeuscart/issues/28 +CVE-2015-2184 - http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-2184 - https://github.com/ZeusCart/zeuscart/issues/28 +CVE-2015-2188 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-2188 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2189 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-2189 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2190 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-2191 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2194 - http://packetstormsecurity.com/files/130397/WordPress-Fusion-3.1-Arbitrary-File-Upload.html +CVE-2015-2198 - http://www.exploit-db.com/exploits/36154 +CVE-2015-2199 - http://www.exploit-db.com/exploits/36086 +CVE-2015-2203 - https://bugs.launchpad.net/evergreen/+bug/1206589 +CVE-2015-2207 - http://packetstormsecurity.com/files/132807/NetCracker-Resource-Management-System-8.0-Cross-Site-Scripting.html +CVE-2015-2208 - http://packetstormsecurity.com/files/130685/PHPMoAdmin-1.1.2-Remote-Code-Execution.html +CVE-2015-2208 - http://seclists.org/fulldisclosure/2015/Mar/19 +CVE-2015-2208 - http://www.exploit-db.com/exploits/36251 +CVE-2015-2209 - http://seclists.org/fulldisclosure/2015/Feb/67 +CVE-2015-2210 - http://packetstormsecurity.com/files/131732/Epicor-Retail-Store-Help-System-3.2.03.01.008-Code-Execution.html +CVE-2015-2213 - https://wpvulndb.com/vulnerabilities/8126 +CVE-2015-2214 - http://packetstormsecurity.com/files/130583/NetCat-CMS-5.01-3.12-Full-Path-Disclosure.html +CVE-2015-2216 - http://packetstormsecurity.com/files/130595/WordPress-Photocrati-Theme-4.x.x-SQL-Injection.html +CVE-2015-2216 - https://wpvulndb.com/vulnerabilities/7818 +CVE-2015-2217 - http://packetstormsecurity.com/files/130684/Ultimate-PHP-Board-UPB-2.2.7-Cross-Site-Scripting.html +CVE-2015-2217 - https://github.com/PHP-Outburst/myUPB/issues/17 +CVE-2015-2218 - http://www.exploit-db.com/exploits/36086 +CVE-2015-2220 - http://packetstormsecurity.com/files/130369/WordPress-Ninja-Forms-2.8.8-Cross-Site-Scripting.html +CVE-2015-2223 - http://packetstormsecurity.com/files/131182/Palo-Alto-Traps-Server-3.1.2.1546-Cross-Site-Scripting.html +CVE-2015-2237 - http://packetstormsecurity.com/files/130696/Betster-1.0.4-SQL-Injection-Authentication-Bypass.html +CVE-2015-2237 - https://www.exploit-db.com/exploits/36306/ +CVE-2015-2242 - http://packetstormsecurity.com/files/130656/Webshop-Hun-1.062S-SQL-Injection.html +CVE-2015-2243 - http://packetstormsecurity.com/files/130653/Webshop-Hun-1.062S-Directory-Traversal.html +CVE-2015-2244 - http://packetstormsecurity.com/files/130648/Webshop-Hun-1.062S-Cross-Site-Scripting.html +CVE-2015-2247 - http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/ +CVE-2015-2247 - https://speakerdeck.com/richo/building-a-hipster-catapult-or-how2own-your-skateboard +CVE-2015-2248 - http://packetstormsecurity.com/files/131762/Dell-SonicWALL-Secure-Remote-Access-7.5-8.0-CSRF.html +CVE-2015-2248 - http://www.scip.ch/en/?vuldb.75111 +CVE-2015-2248 - https://www.exploit-db.com/exploits/36940/ +CVE-2015-2250 - http://packetstormsecurity.com/files/131882/Concrete5-5.7.3.1-Cross-Site-Scripting.html +CVE-2015-2250 - http://seclists.org/fulldisclosure/2015/May/51 +CVE-2015-2250 - https://www.netsparker.com/cve-2015-2250-multiple-xss-vulnerabilities-identified-in-concrete5/ +CVE-2015-2264 - http://www.kb.cert.org/vuls/id/794095 +CVE-2015-2275 - http://packetstormsecurity.com/files/130766/Community-Gallery-2.0-Cross-Site-Scripting.html +CVE-2015-2275 - http://seclists.org/fulldisclosure/2015/Mar/65 +CVE-2015-2275 - http://www.exploit-db.com/exploits/36368 +CVE-2015-2278 - http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html +CVE-2015-2278 - http://seclists.org/fulldisclosure/2015/May/50 +CVE-2015-2278 - http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities +CVE-2015-2279 - http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html +CVE-2015-2279 - http://seclists.org/fulldisclosure/2015/Jul/29 +CVE-2015-2279 - https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection +CVE-2015-2279 - https://www.exploit-db.com/exploits/37532/ +CVE-2015-2280 - http://packetstormsecurity.com/files/132609/AirLink101-SkyIPCam1620W-OS-Command-Injection.html +CVE-2015-2280 - http://seclists.org/fulldisclosure/2015/Jul/40 +CVE-2015-2280 - http://www.securityfocus.com/bid/75597 +CVE-2015-2280 - https://www.coresecurity.com/advisories/airlink101-skyipcam1620w-os-command-injection +CVE-2015-2280 - https://www.exploit-db.com/exploits/37527/ +CVE-2015-2281 - http://seclists.org/fulldisclosure/2015/Mar/111 +CVE-2015-2281 - http://www.coresecurity.com/advisories/fortinet-single-sign-on-stack-overflow +CVE-2015-2281 - https://www.exploit-db.com/exploits/36422/ +CVE-2015-2282 - http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html +CVE-2015-2282 - http://seclists.org/fulldisclosure/2015/May/50 +CVE-2015-2282 - http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities +CVE-2015-2285 - http://packetstormsecurity.com/files/130587/Ubuntu-Vivid-Upstart-Privilege-Escalation.html +CVE-2015-2285 - http://seclists.org/fulldisclosure/2015/Mar/7 +CVE-2015-2289 - http://packetstormsecurity.com/files/130838/Serendipity-CMS-2.0-Cross-Site-Scripting.html +CVE-2015-2291 - http://packetstormsecurity.com/files/130854/Intel-Network-Adapter-Diagnostic-Driver-IOCTL-DoS.html +CVE-2015-2291 - https://www.exploit-db.com/exploits/36392/ +CVE-2015-2292 - http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html +CVE-2015-2292 - http://seclists.org/fulldisclosure/2015/Mar/73 +CVE-2015-2292 - https://wpvulndb.com/vulnerabilities/7841 +CVE-2015-2292 - https://www.exploit-db.com/exploits/36413/ +CVE-2015-2293 - http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html +CVE-2015-2293 - http://seclists.org/fulldisclosure/2015/Mar/73 +CVE-2015-2293 - https://wpvulndb.com/vulnerabilities/7841 +CVE-2015-2294 - http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-2294 - https://www.exploit-db.com/exploits/36506/ +CVE-2015-2295 - http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-2295 - https://www.exploit-db.com/exploits/36506/ +CVE-2015-2298 - https://github.com/ether/etherpad-lite/releases/tag/1.5.2 +CVE-2015-2301 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2305 - http://www.kb.cert.org/vuls/id/695940 +CVE-2015-2305 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2314 - http://klikki.fi/adv/wpml.html +CVE-2015-2314 - http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html +CVE-2015-2315 - http://klikki.fi/adv/wpml.html +CVE-2015-2315 - http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html +CVE-2015-2316 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-2317 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-2321 - http://packetstormsecurity.com/files/132931/WordPress-Job-Manager-0.7.22-Cross-Site-Scripting.html +CVE-2015-2321 - https://wpvulndb.com/vulnerabilities/8129 +CVE-2015-2321 - https://www.exploit-db.com/exploits/37738/ +CVE-2015-2328 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-2331 - https://hackerone.com/reports/73239 +CVE-2015-2342 - http://seclists.org/fulldisclosure/2015/Oct/1 +CVE-2015-2342 - https://www.7elements.co.uk/resources/technical-advisories/cve-2015-2342-vmware-vcenter-remote-code-execution/ +CVE-2015-2346 - http://packetstormsecurity.com/files/131459/Huawei-SEQ-Analyst-XXE-Injection.html +CVE-2015-2346 - http://seclists.org/fulldisclosure/2015/Apr/42 +CVE-2015-2347 - http://packetstormsecurity.com/files/131460/Huawei-SEQ-Analyst-Cross-Site-Scripting.html +CVE-2015-2347 - http://seclists.org/fulldisclosure/2015/Apr/43 +CVE-2015-2347 - https://drive.google.com/folderview?id=0B-LWHbwdK3P9fnBlLWZqWlZqNnB0b2xHWFpYUWt3bmY3Y0lPUHVLNm9VTUlFcWhYTHlZSUU&usp=sharing +CVE-2015-2348 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2349 - http://packetstormsecurity.com/files/130751/SuperWebMailer-5.50.0.01160-Cross-Site-Scripting.html +CVE-2015-2349 - http://seclists.org/fulldisclosure/2015/Mar/55 +CVE-2015-2350 - http://packetstormsecurity.com/files/130722/MikroTik-RouterOS-Cross-Site-Request-Forgery.html +CVE-2015-2350 - http://seclists.org/fulldisclosure/2015/Mar/49 +CVE-2015-2351 - http://packetstormsecurity.com/files/130812/Alkacon-OpenCms-9.5.1-Cross-Site-Scripting.html +CVE-2015-2365 - https://www.exploit-db.com/exploits/38267/ +CVE-2015-2366 - https://www.exploit-db.com/exploits/38266/ +CVE-2015-2370 - https://www.exploit-db.com/exploits/37768/ +CVE-2015-2418 - http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html +CVE-2015-2426 - http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/ +CVE-2015-2426 - https://www.exploit-db.com/exploits/38222/ +CVE-2015-2431 - https://www.exploit-db.com/exploits/37911/ +CVE-2015-2432 - https://www.exploit-db.com/exploits/37920/ +CVE-2015-2433 - https://www.exploit-db.com/exploits/38222/ +CVE-2015-2444 - https://www.exploit-db.com/exploits/37764/ +CVE-2015-2455 - https://www.exploit-db.com/exploits/37919/ +CVE-2015-2456 - https://www.exploit-db.com/exploits/37918/ +CVE-2015-2458 - https://www.exploit-db.com/exploits/37923/ +CVE-2015-2459 - https://www.exploit-db.com/exploits/37922/ +CVE-2015-2460 - https://www.exploit-db.com/exploits/37921/ +CVE-2015-2461 - https://www.exploit-db.com/exploits/37917/ +CVE-2015-2462 - https://www.exploit-db.com/exploits/37916/ +CVE-2015-2463 - https://www.exploit-db.com/exploits/37915/ +CVE-2015-2464 - https://www.exploit-db.com/exploits/37914/ +CVE-2015-2467 - https://www.exploit-db.com/exploits/37913/ +CVE-2015-2468 - https://www.exploit-db.com/exploits/37912/ +CVE-2015-2469 - https://www.exploit-db.com/exploits/37910/ +CVE-2015-2470 - https://www.exploit-db.com/exploits/37924/ +CVE-2015-2482 - https://www.exploit-db.com/exploits/40798/ +CVE-2015-2502 - http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild +CVE-2015-2507 - https://www.exploit-db.com/exploits/38279/ +CVE-2015-2508 - https://www.exploit-db.com/exploits/38198/ +CVE-2015-2509 - https://www.exploit-db.com/exploits/38151/ +CVE-2015-2509 - https://www.exploit-db.com/exploits/38195/ +CVE-2015-2510 - https://www.exploit-db.com/exploits/38217/ +CVE-2015-2511 - https://www.exploit-db.com/exploits/38276/ +CVE-2015-2512 - https://www.exploit-db.com/exploits/38280/ +CVE-2015-2517 - https://www.exploit-db.com/exploits/38278/ +CVE-2015-2518 - https://www.exploit-db.com/exploits/38277/ +CVE-2015-2520 - https://www.exploit-db.com/exploits/38215/ +CVE-2015-2521 - https://www.exploit-db.com/exploits/38216/ +CVE-2015-2522 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-2523 - https://www.exploit-db.com/exploits/38214/ +CVE-2015-2524 - https://www.exploit-db.com/exploits/38202/ +CVE-2015-2525 - https://www.exploit-db.com/exploits/38200/ +CVE-2015-2527 - https://www.exploit-db.com/exploits/38199/ +CVE-2015-2528 - http://packetstormsecurity.com/files/159109/Microsoft-Windows-CloudExperienceHostBroker-Privilege-Escalation.html +CVE-2015-2528 - https://www.exploit-db.com/exploits/38201/ +CVE-2015-2552 - http://packetstormsecurity.com/files/133962/Microsoft-Trusted-Boot-Security-Feature-Bypass.html +CVE-2015-2553 - http://packetstormsecurity.com/files/133971/Windows-Sandboxed-Mount-Reparse-Point-Creation-Mitigation-Bypass.html +CVE-2015-2553 - https://www.exploit-db.com/exploits/38474/ +CVE-2015-2554 - https://www.exploit-db.com/exploits/38580/ +CVE-2015-2560 - http://packetstormsecurity.com/files/131062/Manage-Engine-Desktop-Central-9-Unauthorized-Administrative-Password-Reset.html +CVE-2015-2562 - http://packetstormsecurity.com/files/130896/Joomla-ECommerce-WD-1.2.5-SQL-Injection.html +CVE-2015-2562 - http://seclists.org/fulldisclosure/2015/Mar/123 +CVE-2015-2562 - https://www.exploit-db.com/exploits/36439/ +CVE-2015-2563 - http://packetstormsecurity.com/files/130754/Vastal-I-tech-phpVID-1.2.3-SQL-Injection.html +CVE-2015-2563 - http://seclists.org/fulldisclosure/2015/Mar/58 +CVE-2015-2564 - http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html +CVE-2015-2564 - http://seclists.org/fulldisclosure/2015/Mar/30 +CVE-2015-2564 - http://www.exploit-db.com/exploits/36303 +CVE-2015-2565 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2566 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2567 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2568 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-2568 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2568 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2568 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2570 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2571 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2571 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2571 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2572 - http://packetstormsecurity.com/files/131507/Oracle-Hyperion-Smart-View-For-Office-11.1.2.3.000-DoS.html +CVE-2015-2572 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2572 - https://www.exploit-db.com/exploits/36783/ +CVE-2015-2573 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2573 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2573 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2574 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2575 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2576 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2577 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2578 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2579 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html +CVE-2015-2580 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2581 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2582 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2582 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2583 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2584 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2585 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2586 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2587 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2588 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2589 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2590 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2591 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2592 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2593 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2594 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2595 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2596 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2597 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2598 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2599 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2600 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2601 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2602 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2603 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2604 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2605 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2606 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2607 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2608 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-2609 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2610 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2611 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2612 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2613 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2614 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2615 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2616 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2617 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2618 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2619 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2620 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2620 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2621 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2622 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2623 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2624 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2625 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2626 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2627 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2628 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2629 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2630 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2631 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2632 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2633 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-2634 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2635 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2636 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2637 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2638 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2639 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2640 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2641 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2642 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-2643 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2643 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2644 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2645 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2646 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2647 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2648 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2648 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2649 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2650 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2651 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2652 - http://seclists.org/fulldisclosure/2015/Oct/33 +CVE-2015-2652 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2653 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2654 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2655 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2656 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2657 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2658 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2659 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2660 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2661 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2662 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2663 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2664 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2667 - http://packetstormsecurity.com/files/131731/GNS3-1.2.3-DLL-Hijacking.html +CVE-2015-2674 - https://bugzilla.redhat.com/show_bug.cgi?id=1202837 +CVE-2015-2676 - http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-2677 - http://packetstormsecurity.com/files/130729/ocPortal-9.0.16-Cross-Site-Scripting.html +CVE-2015-2678 - http://packetstormsecurity.com/files/130771/GeniXCMS-0.0.1-Cross-Site-Scripting.html +CVE-2015-2678 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5233.php +CVE-2015-2679 - http://packetstormsecurity.com/files/130770/GeniXCMS-0.0.1-SQL-Injection.html +CVE-2015-2679 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5232.php +CVE-2015-2680 - http://packetstormsecurity.com/files/130772/GeniXCMS-0.0.1-Cross-Site-Request-Forgery.html +CVE-2015-2680 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5234.php +CVE-2015-2681 - http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-2682 - http://packetstormsecurity.com/files/130928/Citrix-Command-Center-Configuration-Disclosure.html +CVE-2015-2682 - http://seclists.org/fulldisclosure/2015/Mar/126 +CVE-2015-2682 - https://www.exploit-db.com/exploits/36441/ +CVE-2015-2683 - http://packetstormsecurity.com/files/130930/Citrx-Command-Center-Advent-JMX-Servlet-Accessible.html +CVE-2015-2683 - http://seclists.org/fulldisclosure/2015/Mar/127 +CVE-2015-2690 - http://packetstormsecurity.com/files/131591/FreePBX-12.0.43-Cross-Site-Scripting.html +CVE-2015-2694 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2694 - https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604 +CVE-2015-2695 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2695 - https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d +CVE-2015-2696 - https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a +CVE-2015-2697 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2697 - https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789 +CVE-2015-2698 - https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd +CVE-2015-2702 - http://packetstormsecurity.com/files/130898/Websense-Email-Security-Cross-Site-Scripting.html +CVE-2015-2703 - http://packetstormsecurity.com/files/130902/Websense-Data-Security-Cross-Site-Scripting.html +CVE-2015-2703 - http://packetstormsecurity.com/files/130908/Websense-Content-Gateway-Error-Message-Cross-Site-Scripting.html +CVE-2015-2704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2706 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2708 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2709 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2710 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2711 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2712 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2712 - https://bugzilla.mozilla.org/show_bug.cgi?id=1152280 +CVE-2015-2713 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2714 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2715 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2716 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2716 - https://bugzilla.mozilla.org/show_bug.cgi?id=1140537 +CVE-2015-2716 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2015-2716 - https://www.tenable.com/security/tns-2016-20 +CVE-2015-2717 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2717 - https://bugzilla.mozilla.org/show_bug.cgi?id=1154683 +CVE-2015-2718 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2718 - https://bugzilla.mozilla.org/show_bug.cgi?id=1146724 +CVE-2015-2720 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2721 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-2721 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-2721 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2721 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2721 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-2721 - http://www.securityfocus.com/bid/91787 +CVE-2015-2722 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2722 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2724 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2724 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2725 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2725 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2726 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2726 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2727 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2728 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2728 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2729 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2729 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2730 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2730 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2730 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-2731 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2731 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2733 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2733 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2734 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2734 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2735 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2735 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2736 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2736 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2737 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2737 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2738 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2738 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2739 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2739 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2740 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2740 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2741 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2741 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2742 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2742 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2743 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2743 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1101158 +CVE-2015-2746 - http://packetstormsecurity.com/files/130899/Websense-Appliance-Manager-Command-Injection.html +CVE-2015-2746 - https://www.exploit-db.com/exploits/36423/ +CVE-2015-2746 - https://www.securify.nl/advisory/SFY20140906/command_injection_vulnerability_in_network_diagnostics_tool_of_websense_appliance_manager.html +CVE-2015-2747 - http://packetstormsecurity.com/files/130897/Websense-Data-Security-DLP-Incident-Forensics-Preview-XSS.html +CVE-2015-2747 - https://www.securify.nl/advisory/SFY20140904/websense_data_security_dlp_incident_forensics_preview_is_vulnerable_to_cross_site_scripting.html +CVE-2015-2748 - http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html +CVE-2015-2755 - http://packetstormsecurity.com/files/130960/WordPress-AB-Google-Map-Travel-CSRF-XSS.html +CVE-2015-2755 - http://packetstormsecurity.com/files/131155/WordPress-Google-Map-Travel-3.4-XSS-CSRF.html +CVE-2015-2774 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-2780 - https://www.exploit-db.com/exploits/36520/ +CVE-2015-2781 - http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html +CVE-2015-2781 - http://seclists.org/fulldisclosure/2015/Apr/18 +CVE-2015-2783 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2783 - https://bugs.php.net/bug.php?id=69324 +CVE-2015-2783 - https://hackerone.com/reports/73238 +CVE-2015-2787 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2787 - https://hackerone.com/reports/73235 +CVE-2015-2789 - http://packetstormsecurity.com/files/130840/Foxit-Reader-7.0.6.1126-Privilege-Escalation.html +CVE-2015-2789 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5235.php +CVE-2015-2790 - http://www.exploit-db.com/exploits/36334 +CVE-2015-2790 - http://www.exploit-db.com/exploits/36335 +CVE-2015-2791 - http://klikki.fi/adv/wpml.html +CVE-2015-2791 - http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html +CVE-2015-2792 - http://klikki.fi/adv/wpml.html +CVE-2015-2792 - http://packetstormsecurity.com/files/130839/WordPress-WPML-Missing-Authentication.html +CVE-2015-2792 - http://seclists.org/fulldisclosure/2015/Mar/79 +CVE-2015-2793 - https://ikiwiki.info/bugs/XSS_Alert...__33____33____33__/ +CVE-2015-2794 - http://www.dnnsoftware.com/community/security/security-center +CVE-2015-2794 - https://www.exploit-db.com/exploits/39777/ +CVE-2015-2797 - https://www.exploit-db.com/exploits/36577/ +CVE-2015-2797 - https://www.exploit-db.com/exploits/37170/ +CVE-2015-2798 - https://www.exploit-db.com/exploits/36561/ +CVE-2015-2802 - https://packetstormsecurity.com/files/cve/CVE-2015-2802 +CVE-2015-2803 - http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html +CVE-2015-2803 - http://seclists.org/fulldisclosure/2015/Jun/43 +CVE-2015-2803 - https://www.exploit-db.com/exploits/37301/ +CVE-2015-2803 - https://www.redteam-pentesting.de/advisories/rt-sa-2015-002 +CVE-2015-2804 - http://packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html +CVE-2015-2804 - http://seclists.org/fulldisclosure/2015/Jun/22 +CVE-2015-2804 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id +CVE-2015-2805 - http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html +CVE-2015-2805 - http://seclists.org/fulldisclosure/2015/Jun/23 +CVE-2015-2805 - https://www.exploit-db.com/exploits/37261/ +CVE-2015-2805 - https://www.redteam-pentesting.de/advisories/rt-sa-2015-004 +CVE-2015-2806 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-2807 - http://packetstormsecurity.com/files/133350/WordPress-Navis-DocumentCloud-0.1-Cross-Site-Scripting.html +CVE-2015-2807 - http://seclists.org/fulldisclosure/2015/Aug/78 +CVE-2015-2807 - https://security.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ +CVE-2015-2807 - https://wpvulndb.com/vulnerabilities/8164 +CVE-2015-2808 - http://www-01.ibm.com/support/docview.wss?uid=swg21883640 +CVE-2015-2808 - http://www-304.ibm.com/support/docview.wss?uid=swg21960015 +CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-2808 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-2808 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-2808 - http://www.securityfocus.com/bid/91787 +CVE-2015-2808 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2015-2808 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 +CVE-2015-2809 - http://www.kb.cert.org/vuls/id/550620 +CVE-2015-2809 - http://www.kb.cert.org/vuls/id/BLUU-9TLSHD +CVE-2015-2810 - http://seclists.org/bugtraq/2015/Apr/89 +CVE-2015-2811 - http://packetstormsecurity.com/files/132358/SAP-NetWeaver-Portal-7.31-XXE-Injection.html +CVE-2015-2812 - http://packetstormsecurity.com/files/132356/SAP-NetWeaver-Portal-7.31-XXE-Injection.html +CVE-2015-2813 - http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html +CVE-2015-2815 - http://packetstormsecurity.com/files/132353/SAP-NetWeaver-Dispatcher-Buffer-Overflow.html +CVE-2015-2816 - http://packetstormsecurity.com/files/132363/SAP-Afaria-7-Missing-Authorization-Check.html +CVE-2015-2817 - http://packetstormsecurity.com/files/132359/SAP-Management-Console-Information-Disclosure.html +CVE-2015-2819 - http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html +CVE-2015-2819 - https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/ +CVE-2015-2820 - http://packetstormsecurity.com/files/132362/SAP-Afaria-7-Denial-Of-Service.html +CVE-2015-2820 - https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/ +CVE-2015-2824 - http://packetstormsecurity.com/files/131280/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-SQL-Injection.html +CVE-2015-2824 - http://seclists.org/fulldisclosure/2015/Apr/6 +CVE-2015-2824 - http://seclists.org/fulldisclosure/2015/Apr/7 +CVE-2015-2824 - https://www.exploit-db.com/exploits/36613/ +CVE-2015-2825 - http://packetstormsecurity.com/files/131282/WordPress-Simple-Ads-Manager-2.5.94-File-Upload.html +CVE-2015-2825 - http://seclists.org/fulldisclosure/2015/Apr/8 +CVE-2015-2825 - https://www.exploit-db.com/exploits/36614/ +CVE-2015-2826 - http://packetstormsecurity.com/files/131281/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-Information-Disclosure.html +CVE-2015-2826 - http://seclists.org/fulldisclosure/2015/Apr/10 +CVE-2015-2826 - https://www.exploit-db.com/exploits/36615/ +CVE-2015-2827 - http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html +CVE-2015-2828 - http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html +CVE-2015-2830 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2830 - http://www.ubuntu.com/usn/USN-2632-1 +CVE-2015-2838 - http://packetstormsecurity.com/files/130937/Citrix-NITRO-SDK-Command-Injection.html +CVE-2015-2838 - http://seclists.org/fulldisclosure/2015/Mar/129 +CVE-2015-2838 - https://www.exploit-db.com/exploits/36442/ +CVE-2015-2838 - https://www.securify.nl/advisory/SFY20140806/command_injection_vulnerability_in_citrix_nitro_sdk_xen_hotfix_page.html +CVE-2015-2839 - http://packetstormsecurity.com/files/130931/Citrix-NITRO-SDK-xen_hotfix-Cross-Site-Scripting.html +CVE-2015-2839 - http://seclists.org/fulldisclosure/2015/Mar/128 +CVE-2015-2839 - https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html +CVE-2015-2840 - http://packetstormsecurity.com/files/130936/Citrix-NetScaler-VPX-Cross-Site-Scripting.html +CVE-2015-2841 - http://seclists.org/fulldisclosure/2015/Mar/95 +CVE-2015-2841 - https://www.exploit-db.com/exploits/36369/ +CVE-2015-2842 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html +CVE-2015-2842 - https://www.exploit-db.com/exploits/36807/ +CVE-2015-2843 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html +CVE-2015-2843 - https://www.exploit-db.com/exploits/36807/ +CVE-2015-2843 - https://www.exploit-db.com/exploits/42296/ +CVE-2015-2844 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html +CVE-2015-2844 - https://www.exploit-db.com/exploits/36807/ +CVE-2015-2845 - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html +CVE-2015-2845 - https://www.exploit-db.com/exploits/36807/ +CVE-2015-2845 - https://www.exploit-db.com/exploits/42296/ +CVE-2015-2847 - http://www.kb.cert.org/vuls/id/857948 +CVE-2015-2848 - http://www.kb.cert.org/vuls/id/857948 +CVE-2015-2849 - http://www.kb.cert.org/vuls/id/485324 +CVE-2015-2850 - http://www.kb.cert.org/vuls/id/485324 +CVE-2015-2851 - http://www.kb.cert.org/vuls/id/551972 +CVE-2015-2851 - http://www.kb.cert.org/vuls/id/BLUU-9VBU45 +CVE-2015-2852 - http://www.kb.cert.org/vuls/id/498348 +CVE-2015-2853 - http://www.kb.cert.org/vuls/id/498348 +CVE-2015-2854 - http://www.kb.cert.org/vuls/id/498348 +CVE-2015-2855 - http://www.kb.cert.org/vuls/id/498348 +CVE-2015-2857 - http://packetstormsecurity.com/files/132665/Accellion-FTA-getStatus-verify_oauth_token-Command-Execution.html +CVE-2015-2857 - https://community.rapid7.com/community/metasploit/blog/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857 +CVE-2015-2857 - https://www.exploit-db.com/exploits/37597/ +CVE-2015-2859 - http://www.kb.cert.org/vuls/id/264092 +CVE-2015-2860 - http://www.kb.cert.org/vuls/id/555984 +CVE-2015-2861 - http://www.kb.cert.org/vuls/id/842780 +CVE-2015-2862 - http://www.kb.cert.org/vuls/id/919604 +CVE-2015-2863 - http://www.kb.cert.org/vuls/id/919604 +CVE-2015-2864 - http://www.kb.cert.org/vuls/id/101500 +CVE-2015-2864 - https://www.youtube.com/watch?v=MB8AL5u7JCA +CVE-2015-2866 - http://www.kb.cert.org/vuls/id/253708 +CVE-2015-2866 - https://www.exploit-db.com/exploits/40441/ +CVE-2015-2869 - http://www.kb.cert.org/vuls/id/813631 +CVE-2015-2870 - http://www.kb.cert.org/vuls/id/360431 +CVE-2015-2871 - http://www.kb.cert.org/vuls/id/360431 +CVE-2015-2872 - http://www.kb.cert.org/vuls/id/248692 +CVE-2015-2873 - http://www.kb.cert.org/vuls/id/248692 +CVE-2015-2874 - https://www.kb.cert.org/vuls/id/903500 +CVE-2015-2874 - https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH +CVE-2015-2874 - https://www.kb.cert.org/vuls/id/GWAN-A26L3F +CVE-2015-2875 - https://www.kb.cert.org/vuls/id/903500 +CVE-2015-2875 - https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH +CVE-2015-2875 - https://www.kb.cert.org/vuls/id/GWAN-A26L3F +CVE-2015-2876 - https://www.kb.cert.org/vuls/id/903500 +CVE-2015-2876 - https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH +CVE-2015-2876 - https://www.kb.cert.org/vuls/id/GWAN-A26L3F +CVE-2015-2877 - http://www.antoniobarresi.com/files/cain_advisory.txt +CVE-2015-2878 - https://www.exploit-db.com/exploits/37686/ +CVE-2015-2890 - http://www.kb.cert.org/vuls/id/577140 +CVE-2015-2890 - http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L +CVE-2015-2894 - https://www.kb.cert.org/vuls/id/377260 +CVE-2015-2895 - https://www.kb.cert.org/vuls/id/377260 +CVE-2015-2896 - https://www.kb.cert.org/vuls/id/377260 +CVE-2015-2898 - http://www.kb.cert.org/vuls/id/675052 +CVE-2015-2899 - http://www.kb.cert.org/vuls/id/675052 +CVE-2015-2900 - http://www.kb.cert.org/vuls/id/675052 +CVE-2015-2901 - http://www.kb.cert.org/vuls/id/675052 +CVE-2015-2902 - http://www.kb.cert.org/vuls/id/350508 +CVE-2015-2903 - http://www.kb.cert.org/vuls/id/350508 +CVE-2015-2904 - http://www.kb.cert.org/vuls/id/335192 +CVE-2015-2905 - http://www.kb.cert.org/vuls/id/335192 +CVE-2015-2909 - http://www.kb.cert.org/vuls/id/276148 +CVE-2015-2912 - https://www.kb.cert.org/vuls/id/845332 +CVE-2015-2913 - https://www.kb.cert.org/vuls/id/845332 +CVE-2015-2914 - http://www.kb.cert.org/vuls/id/906576 +CVE-2015-2915 - http://www.kb.cert.org/vuls/id/906576 +CVE-2015-2916 - http://www.kb.cert.org/vuls/id/906576 +CVE-2015-2917 - http://www.kb.cert.org/vuls/id/906576 +CVE-2015-2918 - https://www.kb.cert.org/vuls/id/845332 +CVE-2015-2922 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-2922 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2923 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6fd99094de2b83d1d4c8457f2c83483b2828e75a +CVE-2015-2924 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2925 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-2925 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-2926 - http://packetstormsecurity.com/files/131332/phpTrafficA-2.3-Cross-Site-Scripting.html +CVE-2015-2936 - https://phabricator.wikimedia.org/T64685 +CVE-2015-2939 - https://phabricator.wikimedia.org/T85113 +CVE-2015-2973 - https://wpvulndb.com/vulnerabilities/8114 +CVE-2015-2993 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2993 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-2994 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2994 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-2995 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2995 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-2995 - https://www.exploit-db.com/exploits/37667/ +CVE-2015-2996 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2996 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-2997 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2997 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-2998 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2998 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-2999 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-2999 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-3000 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-3000 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-3001 - http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html +CVE-2015-3001 - http://seclists.org/fulldisclosure/2015/Jun/8 +CVE-2015-3008 - http://packetstormsecurity.com/files/131364/Asterisk-Project-Security-Advisory-AST-2015-003.html +CVE-2015-3026 - http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html +CVE-2015-3026 - http://www.openwall.com/lists/oss-security/2015/04/08/11 +CVE-2015-3026 - http://www.openwall.com/lists/oss-security/2015/04/08/8 +CVE-2015-3035 - http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html +CVE-2015-3035 - http://seclists.org/fulldisclosure/2015/Apr/26 +CVE-2015-3036 - http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html +CVE-2015-3036 - http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html +CVE-2015-3036 - http://seclists.org/fulldisclosure/2015/May/74 +CVE-2015-3036 - http://www.kb.cert.org/vuls/id/177092 +CVE-2015-3036 - https://www.exploit-db.com/exploits/38454/ +CVE-2015-3036 - https://www.exploit-db.com/exploits/38566/ +CVE-2015-3042 - https://www.exploit-db.com/exploits/37839/ +CVE-2015-3043 - https://www.exploit-db.com/exploits/37536/ +CVE-2015-3073 - https://www.exploit-db.com/exploits/38344/ +CVE-2015-3080 - https://www.exploit-db.com/exploits/37853/ +CVE-2015-3081 - https://www.exploit-db.com/exploits/37842/ +CVE-2015-3082 - https://www.exploit-db.com/exploits/37840/ +CVE-2015-3083 - https://www.exploit-db.com/exploits/37841/ +CVE-2015-3087 - https://www.exploit-db.com/exploits/37843/ +CVE-2015-3088 - https://www.exploit-db.com/exploits/37844/ +CVE-2015-3089 - https://www.exploit-db.com/exploits/37845/ +CVE-2015-3093 - https://www.exploit-db.com/exploits/37846/ +CVE-2015-3106 - https://www.exploit-db.com/exploits/37847/ +CVE-2015-3107 - https://www.exploit-db.com/exploits/37850/ +CVE-2015-3118 - https://www.exploit-db.com/exploits/37848/ +CVE-2015-3124 - https://www.exploit-db.com/exploits/37849/ +CVE-2015-3134 - https://www.exploit-db.com/exploits/37862/ +CVE-2015-3138 - https://github.com/the-tcpdump-group/tcpdump/issues/446 +CVE-2015-3141 - http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html +CVE-2015-3141 - https://www.exploit-db.com/exploits/36949/ +CVE-2015-3143 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-3143 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3144 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-3144 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3144 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-3145 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-3145 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3148 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3148 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3152 - http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html +CVE-2015-3153 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-3153 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3153 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-3153 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-3163 - https://bugzilla.redhat.com/show_bug.cgi?id=1215034 +CVE-2015-3166 - http://ubuntu.com/usn/usn-2621-1 +CVE-2015-3167 - http://ubuntu.com/usn/usn-2621-1 +CVE-2015-3182 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3183 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3183 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-3183 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-3183 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-3183 - http://www.securityfocus.com/bid/91787 +CVE-2015-3183 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2015-3188 - http://packetstormsecurity.com/files/132417/Apache-Storm-0.10.0-beta-Code-Execution.html +CVE-2015-3192 - https://jira.spring.io/browse/SPR-13136 +CVE-2015-3193 - http://fortiguard.com/advisory/openssl-advisory-december-2015 +CVE-2015-3193 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3193 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3193 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-3193 - http://www.securityfocus.com/bid/91787 +CVE-2015-3193 - http://www.ubuntu.com/usn/USN-2830-1 +CVE-2015-3193 - https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-3193.html +CVE-2015-3193 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 +CVE-2015-3194 - http://fortiguard.com/advisory/openssl-advisory-december-2015 +CVE-2015-3194 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3194 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3194 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-3194 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3194 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3194 - http://www.securityfocus.com/bid/91787 +CVE-2015-3194 - http://www.ubuntu.com/usn/USN-2830-1 +CVE-2015-3194 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 +CVE-2015-3195 - http://fortiguard.com/advisory/openssl-advisory-december-2015 +CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-3195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3195 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-3195 - http://www.securityfocus.com/bid/91787 +CVE-2015-3195 - http://www.ubuntu.com/usn/USN-2830-1 +CVE-2015-3195 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 +CVE-2015-3196 - http://fortiguard.com/advisory/openssl-advisory-december-2015 +CVE-2015-3196 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3196 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-3196 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3196 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3196 - http://www.ubuntu.com/usn/USN-2830-1 +CVE-2015-3196 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 +CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-3197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-3197 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3197 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3197 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-3197 - http://www.securityfocus.com/bid/91787 +CVE-2015-3197 - https://www.kb.cert.org/vuls/id/257823 +CVE-2015-3200 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-3202 - http://packetstormsecurity.com/files/132021/Fuse-Local-Privilege-Escalation.html +CVE-2015-3202 - http://www.ubuntu.com/usn/USN-2617-2 +CVE-2015-3202 - https://www.exploit-db.com/exploits/37089/ +CVE-2015-3203 - https://www.exploit-db.com/exploits/38256/ +CVE-2015-3205 - http://packetstormsecurity.com/files/132257/Libmimedir-VCF-Memory-Corruption-Proof-Of-Concept.html +CVE-2015-3205 - https://www.exploit-db.com/exploits/37249/ +CVE-2015-3212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3212 - http://www.ubuntu.com/usn/USN-2716-1 +CVE-2015-3214 - https://www.exploit-db.com/exploits/37990/ +CVE-2015-3217 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-3217 - https://bugzilla.redhat.com/show_bug.cgi?id=1228283 +CVE-2015-3222 - http://packetstormsecurity.com/files/132281/OSSEC-2.8.1-Local-Root-Escalation.html +CVE-2015-3223 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3226 - https://hackerone.com/reports/47280 +CVE-2015-3228 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-3231 - https://www.drupal.org/SA-CORE-2015-002 +CVE-2015-3232 - https://www.drupal.org/SA-CORE-2015-002 +CVE-2015-3233 - https://www.drupal.org/SA-CORE-2015-002 +CVE-2015-3234 - https://www.drupal.org/SA-CORE-2015-002 +CVE-2015-3236 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3236 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-3236 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3236 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-3236 - http://www.securityfocus.com/bid/91787 +CVE-2015-3237 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3237 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-3237 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-3237 - http://www.securityfocus.com/bid/91787 +CVE-2015-3238 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3240 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3241 - https://github.com/openstack/ossa/blob/482576204dec96f580817b119e3166d71c757731/ossa/OSSA-2015-015.yaml +CVE-2015-3244 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-3244 - https://bugzilla.redhat.com/show_bug.cgi?id=1232908 +CVE-2015-3245 - https://www.exploit-db.com/exploits/44633/ +CVE-2015-3245 - https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt +CVE-2015-3246 - https://www.exploit-db.com/exploits/44633/ +CVE-2015-3246 - https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt +CVE-2015-3253 - http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html +CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-3253 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-3253 - http://www.securityfocus.com/bid/91787 +CVE-2015-3253 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2015-3256 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3256 - https://bugzilla.redhat.com/show_bug.cgi?id=1245684 +CVE-2015-3258 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3268 - http://packetstormsecurity.com/files/136638/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html +CVE-2015-3276 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3279 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3280 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-3290 - https://www.exploit-db.com/exploits/37722/ +CVE-2015-3300 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html +CVE-2015-3300 - https://www.exploit-db.com/exploits/36860/ +CVE-2015-3301 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html +CVE-2015-3301 - https://www.exploit-db.com/exploits/36860/ +CVE-2015-3302 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html +CVE-2015-3302 - https://www.exploit-db.com/exploits/36860/ +CVE-2015-3306 - http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html +CVE-2015-3306 - http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html +CVE-2015-3306 - http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html +CVE-2015-3306 - http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html +CVE-2015-3306 - http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html +CVE-2015-3306 - https://www.exploit-db.com/exploits/36742/ +CVE-2015-3306 - https://www.exploit-db.com/exploits/36803/ +CVE-2015-3307 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3307 - https://bugs.php.net/bug.php?id=69443 +CVE-2015-3307 - https://hackerone.com/reports/104026 +CVE-2015-3313 - http://packetstormsecurity.com/files/131530/WordPress-Community-Events-1.3.5-SQL-Injection.html +CVE-2015-3313 - https://www.exploit-db.com/exploits/36805/ +CVE-2015-3314 - http://packetstormsecurity.com/files/131558/WordPress-Tune-Library-1.5.4-SQL-Injection.html +CVE-2015-3314 - https://www.exploit-db.com/exploits/36802/ +CVE-2015-3315 - https://www.exploit-db.com/exploits/44097/ +CVE-2015-3319 - http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html +CVE-2015-3319 - http://seclists.org/fulldisclosure/2015/Apr/18 +CVE-2015-3325 - http://packetstormsecurity.com/files/131801/WordPress-WP-Symposium-15.1-SQL-Injection.html +CVE-2015-3325 - https://www.exploit-db.com/exploits/37080/ +CVE-2015-3326 - http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html +CVE-2015-3329 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3329 - https://bugs.php.net/bug.php?id=69441 +CVE-2015-3329 - https://hackerone.com/reports/73237 +CVE-2015-3330 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3331 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3331 - http://www.ubuntu.com/usn/USN-2632-1 +CVE-2015-3337 - http://packetstormsecurity.com/files/131646/Elasticsearch-Directory-Traversal.html +CVE-2015-3337 - https://www.elastic.co/community/security +CVE-2015-3337 - https://www.exploit-db.com/exploits/37054/ +CVE-2015-3339 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3339 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3346 - https://www.drupal.org/node/2402905 +CVE-2015-3395 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-3404 - https://www.drupal.org/node/2415947 +CVE-2015-3405 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-3405 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3411 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3412 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3414 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-3414 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-3415 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-3415 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-3416 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-3416 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-3418 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-3419 - http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud +CVE-2015-3422 - http://packetstormsecurity.com/files/132341/SearchBlox-8.2-Cross-Site-Scripting.html +CVE-2015-3423 - http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html +CVE-2015-3424 - http://packetstormsecurity.com/files/134176/Accentis-Content-Resource-Management-System-SQL-Injection.html +CVE-2015-3425 - http://packetstormsecurity.com/files/134177/Accentis-Content-Resource-Management-System-Cross-Site-Scripting.html +CVE-2015-3429 - http://packetstormsecurity.com/files/131802/WordPress-Twenty-Fifteen-4.2.1-Cross-Site-Scripting.html +CVE-2015-3429 - http://seclists.org/fulldisclosure/2015/May/41 +CVE-2015-3429 - https://wpvulndb.com/vulnerabilities/7965 +CVE-2015-3429 - https://www.netsparker.com/cve-2015-3429-dom-xss-vulnerability-in-twenty-fifteen-wordpress-theme/ +CVE-2015-3438 - https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/ +CVE-2015-3438 - https://wpvulndb.com/vulnerabilities/7929 +CVE-2015-3439 - http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html +CVE-2015-3439 - https://wpvulndb.com/vulnerabilities/7933 +CVE-2015-3440 - http://packetstormsecurity.com/files/131644/WordPress-4.2-Cross-Site-Scripting.html +CVE-2015-3440 - http://seclists.org/fulldisclosure/2015/Apr/84 +CVE-2015-3440 - https://klikki.fi/adv/wordpress2.html +CVE-2015-3440 - https://wpvulndb.com/vulnerabilities/7945 +CVE-2015-3440 - https://www.exploit-db.com/exploits/36844/ +CVE-2015-3442 - http://packetstormsecurity.com/files/132549/Soreco-AG-Xpert.Line-3.0-Authentication-Bypass.html +CVE-2015-3443 - https://www.exploit-db.com/exploits/37394/ +CVE-2015-3447 - http://seclists.org/fulldisclosure/2015/Apr/97 +CVE-2015-3447 - http://www.vulnerability-lab.com/get_content.php?id=1359 +CVE-2015-3449 - http://packetstormsecurity.com/files/132681/SAP-Afaria-XeService.exe-7.0.6398.0-Weak-File-Permissions.html +CVE-2015-3455 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3456 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-3456 - https://www.exploit-db.com/exploits/37053/ +CVE-2015-3459 - http://hextechsecurity.com/?p=123 +CVE-2015-3620 - http://packetstormsecurity.com/files/131766/Fortinet-FortiAnalyzer-FortiManager-Cross-Site-Scripting.html +CVE-2015-3620 - http://seclists.org/fulldisclosure/2015/May/13 +CVE-2015-3621 - http://packetstormsecurity.com/files/132680/SAP-ECC-Privilege-Escalation.html +CVE-2015-3622 - http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html +CVE-2015-3622 - http://seclists.org/fulldisclosure/2015/Apr/109 +CVE-2015-3623 - http://packetstormsecurity.com/files/133499/Qlikview-11.20-SR4-Blind-XXE-Injection.html +CVE-2015-3623 - https://www.exploit-db.com/exploits/38118/ +CVE-2015-3624 - http://packetstormsecurity.com/files/132104/Ektron-CMS-9.10-SP1-Cross-Site-Request-Forgery.html +CVE-2015-3624 - https://www.exploit-db.com/exploits/37296/ +CVE-2015-3627 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html +CVE-2015-3628 - http://packetstormsecurity.com/files/134434/F5-iControl-iCall-Script-Root-Command-Execution.html +CVE-2015-3628 - https://www.exploit-db.com/exploits/38764/ +CVE-2015-3629 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html +CVE-2015-3630 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html +CVE-2015-3631 - http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html +CVE-2015-3632 - http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html +CVE-2015-3632 - https://www.exploit-db.com/exploits/36859/ +CVE-2015-3636 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-3636 - http://www.ubuntu.com/usn/USN-2632-1 +CVE-2015-3643 - https://www.exploit-db.com/exploits/36820/ +CVE-2015-3646 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-3647 - http://packetstormsecurity.com/files/131976/WordPress-WP-Photo-Album-Plus-6.1.2-Cross-Site-Scripting.html +CVE-2015-3648 - http://packetstormsecurity.com/files/132142/ResourceSpace-7.1.6513-Local-File-Inclusion.html +CVE-2015-3673 - https://www.exploit-db.com/exploits/38036/ +CVE-2015-3693 - http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html +CVE-2015-3704 - http://packetstormsecurity.com/files/133547/OS-X-Privilege-Escalation.html +CVE-2015-3704 - https://www.exploit-db.com/exploits/38138/ +CVE-2015-3783 - https://www.exploit-db.com/exploits/38264/ +CVE-2015-3796 - https://www.exploit-db.com/exploits/38263/ +CVE-2015-3798 - https://www.exploit-db.com/exploits/38262/ +CVE-2015-3810 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3811 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-3811 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3812 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-3812 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3813 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-3814 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2015-3824 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3826 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3827 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3828 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3829 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3831 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3832 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3833 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3834 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3835 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3836 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3837 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3839 - http://blog.trendmicro.com/trendlabs-security-intelligence/os-x-zero-days-on-the-rise-a-2015-midyear-review-on-advanced-attack-surfaces/ +CVE-2015-3839 - http://blog.trendmicro.com/trendlabs-security-intelligence/two-new-android-bugs-mess-up-messaging-may-lead-to-multiple-send-charges/ +CVE-2015-3840 - http://blog.trendmicro.com/trendlabs-security-intelligence/os-x-zero-days-on-the-rise-a-2015-midyear-review-on-advanced-attack-surfaces/ +CVE-2015-3840 - http://blog.trendmicro.com/trendlabs-security-intelligence/two-new-android-bugs-mess-up-messaging-may-lead-to-multiple-send-charges/ +CVE-2015-3842 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3843 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3844 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-3854 - http://seclists.org/fulldisclosure/2016/May/71 +CVE-2015-3854 - http://seclists.org/fulldisclosure/2016/May/72 +CVE-2015-3860 - http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-bypass/ +CVE-2015-3864 - https://www.exploit-db.com/exploits/38226/ +CVE-2015-3864 - https://www.exploit-db.com/exploits/39640/ +CVE-2015-3864 - https://www.exploit-db.com/exploits/40436/ +CVE-2015-3868 - http://packetstormsecurity.com/files/134132/Libstagefright-Saio-Tag-Integer-Overflow-Heap-Corruption.html +CVE-2015-3884 - http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html +CVE-2015-3885 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-3888 - http://sotiriu.de/adv/NSOADV-2015-001.txt +CVE-2015-3897 - http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html +CVE-2015-3898 - http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html +CVE-2015-3900 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-3900 - https://hackerone.com/reports/103993 +CVE-2015-3903 - http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html +CVE-2015-3904 - http://packetstormsecurity.com/files/131934/WordPress-Roomcloud-1.1-Cross-Site-Scripting.html +CVE-2015-3904 - http://seclists.org/fulldisclosure/2015/May/40 +CVE-2015-3905 - https://github.com/kohler/t1utils/blob/master/NEWS +CVE-2015-3905 - https://github.com/kohler/t1utils/issues/4 +CVE-2015-3908 - http://www.openwall.com/lists/oss-security/2015/07/14/4 +CVE-2015-3921 - http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html +CVE-2015-3922 - http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html +CVE-2015-3923 - http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html +CVE-2015-3931 - http://packetstormsecurity.com/files/132473/Microsec-e-Szigno-Netlock-Mokka-XML-Signature-Wrapping.html +CVE-2015-3931 - http://www.neih.gov.hu/?q=node/66 +CVE-2015-3932 - http://packetstormsecurity.com/files/132473/Microsec-e-Szigno-Netlock-Mokka-XML-Signature-Wrapping.html +CVE-2015-3932 - http://www.neih.gov.hu/?q=node/66 +CVE-2015-3933 - https://www.exploit-db.com/exploits/37363/ +CVE-2015-3934 - http://packetstormsecurity.com/files/132479/Fiyo-CMS-2.0_1.9.1-SQL-Injection.html +CVE-2015-3935 - http://packetstormsecurity.com/files/132108/Dolibarr-3.5-3.6-HTML-Injection.html +CVE-2015-3935 - http://seclists.org/fulldisclosure/2015/May/126 +CVE-2015-3935 - https://github.com/Dolibarr/dolibarr/issues/2857 +CVE-2015-3964 - http://seclists.org/fulldisclosure/2015/Sep/51 +CVE-2015-3986 - http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html +CVE-2015-3986 - https://www.exploit-db.com/exploits/36860/ +CVE-2015-3994 - http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html +CVE-2015-3995 - http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html +CVE-2015-3999 - http://seclists.org/fulldisclosure/2015/May/72 +CVE-2015-4000 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-4000 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4000 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4000 - http://www.securityfocus.com/bid/91787 +CVE-2015-4000 - https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/ +CVE-2015-4000 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 +CVE-2015-4000 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2015-4000 - https://weakdh.org/ +CVE-2015-4000 - https://weakdh.org/imperfect-forward-secrecy.pdf +CVE-2015-4000 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2015-4001 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c +CVE-2015-4001 - http://www.ubuntu.com/usn/USN-2665-1 +CVE-2015-4001 - https://github.com/torvalds/linux/commit/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c +CVE-2015-4002 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 +CVE-2015-4002 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d114b9fe78c8d6fc6e70808c2092aa307c36dc8e +CVE-2015-4002 - http://www.ubuntu.com/usn/USN-2665-1 +CVE-2015-4002 - https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 +CVE-2015-4002 - https://github.com/torvalds/linux/commit/d114b9fe78c8d6fc6e70808c2092aa307c36dc8e +CVE-2015-4003 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04bf464a5dfd9ade0dda918e44366c2c61fce80b +CVE-2015-4003 - http://www.ubuntu.com/usn/USN-2665-1 +CVE-2015-4003 - https://github.com/torvalds/linux/commit/04bf464a5dfd9ade0dda918e44366c2c61fce80b +CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2015-4004 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2015-4004 - https://lkml.org/lkml/2015/5/13/739 +CVE-2015-4010 - http://packetstormsecurity.com/files/132209/WordPress-Encrypted-Contact-Form-1.0.4-CSRF-XSS.html +CVE-2015-4010 - http://seclists.org/fulldisclosure/2015/May/63 +CVE-2015-4010 - https://wpvulndb.com/vulnerabilities/7992 +CVE-2015-4010 - https://www.exploit-db.com/exploits/37264/ +CVE-2015-4018 - http://packetstormsecurity.com/files/131974/WordPress-FeedWordPress-2015.0426-SQL-Injection.html +CVE-2015-4018 - http://seclists.org/fulldisclosure/2015/May/75 +CVE-2015-4018 - https://www.exploit-db.com/exploits/37067/ +CVE-2015-4020 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-4021 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4021 - https://bugs.php.net/bug.php?id=69453 +CVE-2015-4021 - https://hackerone.com/reports/104027 +CVE-2015-4022 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4022 - https://hackerone.com/reports/73240 +CVE-2015-4024 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4024 - https://bugs.php.net/bug.php?id=69364 +CVE-2015-4025 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4026 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4027 - http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html +CVE-2015-4027 - https://www.exploit-db.com/exploits/38847/ +CVE-2015-4029 - http://seclists.org/fulldisclosure/2015/Jul/66 +CVE-2015-4038 - http://packetstormsecurity.com/files/132012/WordPress-WP-Membership-1.2.3-Privilege-Escalation.html +CVE-2015-4038 - https://wpvulndb.com/vulnerabilities/7998 +CVE-2015-4039 - http://packetstormsecurity.com/files/132011/WordPress-WP-Membership-1.2.3-Cross-Site-Scripting.html +CVE-2015-4039 - https://www.exploit-db.com/exploits/37074/ +CVE-2015-4040 - http://packetstormsecurity.com/files/133931/F5-BigIP-10.2.4-Build-595.0-HF3-Path-Traversal.html +CVE-2015-4045 - https://sysdream.com/uploads/media/default/0001/01/8c6a70098657b4474fe7abe9bcdd5e73b234b610.pdf +CVE-2015-4045 - https://www.alienvault.com/forums/discussion/5127/ +CVE-2015-4046 - https://sysdream.com/uploads/media/default/0001/01/8c6a70098657b4474fe7abe9bcdd5e73b234b610.pdf +CVE-2015-4046 - https://www.alienvault.com/forums/discussion/5127/ +CVE-2015-4047 - http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html +CVE-2015-4051 - http://packetstormsecurity.com/files/132168/Beckhoff-IPC-Diagnositcs-Authentication-Bypass.html +CVE-2015-4051 - http://packetstormsecurity.com/files/134071/Beckoff-CX9020-CPU-Model-Remote-Code-Execution.html +CVE-2015-4051 - http://seclists.org/fulldisclosure/2015/Jun/10 +CVE-2015-4054 - https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5 +CVE-2015-4062 - http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-4062 - https://www.exploit-db.com/exploits/37107/ +CVE-2015-4063 - http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-4063 - https://www.exploit-db.com/exploits/37107/ +CVE-2015-4064 - http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-4064 - https://www.exploit-db.com/exploits/37108/ +CVE-2015-4065 - http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-4065 - https://www.exploit-db.com/exploits/37108/ +CVE-2015-4066 - http://packetstormsecurity.com/files/132036/WordPress-GigPress-2.3.8-SQL-Injection.html +CVE-2015-4066 - https://www.exploit-db.com/exploits/37109/ +CVE-2015-4071 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html +CVE-2015-4071 - http://seclists.org/fulldisclosure/2015/Jul/102 +CVE-2015-4071 - https://www.exploit-db.com/exploits/37666/ +CVE-2015-4072 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html +CVE-2015-4072 - http://seclists.org/fulldisclosure/2015/Jul/102 +CVE-2015-4072 - https://www.exploit-db.com/exploits/37666/ +CVE-2015-4073 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html +CVE-2015-4073 - http://seclists.org/fulldisclosure/2015/Jul/102 +CVE-2015-4073 - https://www.exploit-db.com/exploits/37666/ +CVE-2015-4074 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html +CVE-2015-4074 - http://seclists.org/fulldisclosure/2015/Jul/102 +CVE-2015-4074 - https://www.exploit-db.com/exploits/37666/ +CVE-2015-4075 - http://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html +CVE-2015-4075 - http://seclists.org/fulldisclosure/2015/Jul/102 +CVE-2015-4075 - https://www.exploit-db.com/exploits/37666/ +CVE-2015-4077 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html +CVE-2015-4077 - http://seclists.org/fulldisclosure/2015/Sep/0 +CVE-2015-4077 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities +CVE-2015-4077 - https://www.exploit-db.com/exploits/45149/ +CVE-2015-4080 - http://packetstormsecurity.com/files/132210/Kankun-Smart-Socket-Mobile-App-Hardcoded-AES-Key.html +CVE-2015-4080 - https://plus.google.com/109112844319840106704/posts +CVE-2015-4084 - http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html +CVE-2015-4084 - https://www.exploit-db.com/exploits/37132/ +CVE-2015-4089 - https://wpvulndb.com/vulnerabilities/9756 +CVE-2015-4091 - http://packetstormsecurity.com/files/133122/SAP-NetWeaver-AS-Java-XXE-Injection.html +CVE-2015-4093 - http://packetstormsecurity.com/files/132232/Kibana-4.0.2-Cross-Site-Scripting.html +CVE-2015-4093 - https://www.elastic.co/community/security/ +CVE-2015-4108 - http://packetstormsecurity.com/files/132179/Wing-FTP-4.4.6-Code-Execution-Cross-Site-Request-Forgery.html +CVE-2015-4108 - http://packetstormsecurity.com/files/132180/Wing-FTP-4.4.6-Cross-Site-Request-Forgery.html +CVE-2015-4109 - http://packetstormsecurity.com/files/132181/WordPress-Users-Ultra-1.5.15-SQL-Injection.html +CVE-2015-4116 - https://bugs.php.net/bug.php?id=69737 +CVE-2015-4117 - https://www.exploit-db.com/exploits/37369/ +CVE-2015-4118 - http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html +CVE-2015-4118 - https://www.exploit-db.com/exploits/37259/ +CVE-2015-4119 - http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html +CVE-2015-4119 - https://www.exploit-db.com/exploits/37259/ +CVE-2015-4127 - http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html +CVE-2015-4127 - https://www.exploit-db.com/exploits/37112/ +CVE-2015-4129 - http://www.kb.cert.org/vuls/id/110532 +CVE-2015-4133 - http://packetstormsecurity.com/files/130845/ +CVE-2015-4133 - http://packetstormsecurity.com/files/131515/ +CVE-2015-4133 - https://wpvulndb.com/vulnerabilities/7867 +CVE-2015-4133 - https://www.exploit-db.com/exploits/36809/ +CVE-2015-4134 - http://packetstormsecurity.com/files/132033/phpwind-8.7-Open-Redirect.html +CVE-2015-4135 - http://packetstormsecurity.com/files/132030/phpwind-8.7-Cross-Site-Scripting.html +CVE-2015-4137 - http://packetstormsecurity.com/files/131981/Milw0rm-Clone-Script-1.0-SQL-Injection.html +CVE-2015-4137 - https://www.exploit-db.com/exploits/37248/ +CVE-2015-4138 - http://www.kb.cert.org/vuls/id/498348 +CVE-2015-4139 - http://www.openwall.com/lists/oss-security/2015/05/29/1 +CVE-2015-4140 - http://www.openwall.com/lists/oss-security/2015/05/29/1 +CVE-2015-4141 - http://www.ubuntu.com/usn/USN-2650-1 +CVE-2015-4142 - http://www.ubuntu.com/usn/USN-2650-1 +CVE-2015-4143 - http://www.ubuntu.com/usn/USN-2650-1 +CVE-2015-4144 - http://www.ubuntu.com/usn/USN-2650-1 +CVE-2015-4145 - http://www.ubuntu.com/usn/USN-2650-1 +CVE-2015-4146 - http://www.ubuntu.com/usn/USN-2650-1 +CVE-2015-4147 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4148 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4152 - http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html +CVE-2015-4152 - https://www.elastic.co/blog/logstash-1-4-3-released +CVE-2015-4152 - https://www.elastic.co/community/security/ +CVE-2015-4153 - http://packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html +CVE-2015-4153 - https://www.exploit-db.com/exploits/37200/ +CVE-2015-4165 - http://packetstormsecurity.com/files/132234/Elasticsearch-1.5.2-File-Creation.html +CVE-2015-4165 - https://www.elastic.co/community/security/ +CVE-2015-4167 - http://www.ubuntu.com/usn/USN-2632-1 +CVE-2015-4170 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4170 - https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz +CVE-2015-4173 - http://packetstormsecurity.com/files/133302/Dell-SonicWall-NetExtender-7.5.215-Privilege-Escalation.html +CVE-2015-4174 - http://packetstormsecurity.com/files/132514/Climatix-BACnet-IP-Communication-Module-Cross-Site-Scripting.html +CVE-2015-4179 - http://www.openwall.com/lists/oss-security/2015/06/03/3 +CVE-2015-4325 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151006-vcs +CVE-2015-4336 - http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html +CVE-2015-4337 - http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html +CVE-2015-4338 - http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html +CVE-2015-4342 - http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html +CVE-2015-4342 - http://seclists.org/fulldisclosure/2015/Jun/19 +CVE-2015-4345 - https://www.drupal.org/node/2428857 +CVE-2015-4356 - https://www.drupal.org/node/2445297 +CVE-2015-4357 - https://www.drupal.org/node/2445297 +CVE-2015-4374 - https://www.drupal.org/node/2454063 +CVE-2015-4381 - https://www.drupal.org/node/2474135 +CVE-2015-4382 - https://www.drupal.org/node/2474135 +CVE-2015-4400 - https://blog.fortinet.com/2016/01/22/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell +CVE-2015-4410 - https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html +CVE-2015-4411 - https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html +CVE-2015-4412 - https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html +CVE-2015-4413 - http://packetstormsecurity.com/files/132425/WordPress-Nextend-Facebook-Connect-1.5.4-Cross-Site-Scripting.html +CVE-2015-4413 - http://seclists.org/fulldisclosure/2015/Jun/70 +CVE-2015-4414 - http://packetstormsecurity.com/files/132266/WordPress-SE-HTML5-Album-Audio-Player-1.1.0-Directory-Traversal.html +CVE-2015-4414 - https://wpvulndb.com/vulnerabilities/8032 +CVE-2015-4414 - https://www.exploit-db.com/exploits/37274/ +CVE-2015-4420 - https://www.exploit-db.com/exploits/37271/ +CVE-2015-4427 - http://packetstormsecurity.com/files/132105/Ektron-CMS-9.10-SP1-Cross-Site-Scripting.html +CVE-2015-4453 - http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html +CVE-2015-4455 - http://packetstormsecurity.com/files/132256/WordPress-Aviary-Image-Editor-Add-On-For-Gravity-Forms-3.0-Beta-Shell-Upload.html +CVE-2015-4459 - https://hackerone.com/reports/66724 +CVE-2015-4460 - https://packetstormsecurity.com/files/132475/C2Box-4.0.0-r19171-Cross-Site-Request-Forgery.html +CVE-2015-4460 - https://raw.githubusercontent.com/Siros96/CSRF/master/PoC +CVE-2015-4460 - https://www.exploit-db.com/exploits/37447/ +CVE-2015-4464 - http://packetstormsecurity.com/files/132437/Kguard-Digital-Video-Recorder-Bypass-Issues.html +CVE-2015-4473 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4474 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4475 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4476 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4477 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4477 - https://bugzilla.mozilla.org/show_bug.cgi?id=1179484 +CVE-2015-4478 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4479 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4479 - https://bugzilla.mozilla.org/show_bug.cgi?id=1185115 +CVE-2015-4480 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4481 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4481 - https://bugzilla.mozilla.org/show_bug.cgi?id=1171518 +CVE-2015-4481 - https://www.exploit-db.com/exploits/37925/ +CVE-2015-4482 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4483 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4483 - https://bugzilla.mozilla.org/show_bug.cgi?id=1148732 +CVE-2015-4484 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4485 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4486 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4487 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4488 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4489 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4490 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4491 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4491 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-4491 - https://bugzilla.gnome.org/show_bug.cgi?id=752297 +CVE-2015-4492 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4493 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4495 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4495 - https://www.exploit-db.com/exploits/37772/ +CVE-2015-4496 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1149605 +CVE-2015-4497 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4497 - http://www.ubuntu.com/usn/USN-2723-1 +CVE-2015-4497 - https://bugzilla.mozilla.org/show_bug.cgi?id=1164766 +CVE-2015-4497 - https://bugzilla.mozilla.org/show_bug.cgi?id=1175278 +CVE-2015-4498 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4498 - http://www.ubuntu.com/usn/USN-2723-1 +CVE-2015-4498 - https://bugzilla.mozilla.org/show_bug.cgi?id=1042699 +CVE-2015-4499 - http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html +CVE-2015-4499 - https://bugzilla.mozilla.org/show_bug.cgi?id=1202447 +CVE-2015-4500 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4500 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4501 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4502 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4503 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4504 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4505 - https://bugzilla.mozilla.org/show_bug.cgi?id=1177861 +CVE-2015-4506 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4507 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4508 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4509 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4509 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1198435 +CVE-2015-4510 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4510 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4511 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4512 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4513 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4513 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4513 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-4514 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4515 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4516 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4517 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4517 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4518 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4518 - https://bugzilla.mozilla.org/show_bug.cgi?id=1136692 +CVE-2015-4518 - https://bugzilla.mozilla.org/show_bug.cgi?id=1182778 +CVE-2015-4519 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4519 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4519 - https://bugzilla.mozilla.org/show_bug.cgi?id=1189814 +CVE-2015-4520 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4520 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4521 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4522 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4522 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4538 - http://packetstormsecurity.com/files/133405/EMC-Atmos-2.3.0-XML-External-Entity-Injection.html +CVE-2015-4541 - http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html +CVE-2015-4542 - http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html +CVE-2015-4543 - http://packetstormsecurity.com/files/133682/RSA-Archer-GRC-5.5.3-XSS-Improper-Authorization-Information-Disclosure.html +CVE-2015-4544 - http://packetstormsecurity.com/files/133441/EMC-Documentum-Content-Server-Privilege-Escalation.html +CVE-2015-4546 - http://packetstormsecurity.com/files/133784/RSA-OneStep-6.9-Path-Traversal.html +CVE-2015-4547 - http://packetstormsecurity.com/files/133779/RSA-Web-Threat-Detection-Privilege-Escalation-Information-Disclosure.html +CVE-2015-4548 - http://packetstormsecurity.com/files/133779/RSA-Web-Threat-Detection-Privilege-Escalation-Information-Disclosure.html +CVE-2015-4551 - http://www.openoffice.org/security/cves/CVE-2015-4551.html +CVE-2015-4551 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4552 - http://adrianhayter.com/exploits.php +CVE-2015-4553 - https://www.exploit-db.com/exploits/37423/ +CVE-2015-4554 - http://www.tibco.com/mk/advisory.jsp +CVE-2015-4555 - http://www.tibco.com/mk/advisory.jsp +CVE-2015-4557 - http://packetstormsecurity.com/files/132432/WordPress-Nextend-Twitter-Connect-1.5.1-Cross-Site-Scripting.html +CVE-2015-4557 - http://seclists.org/fulldisclosure/2015/Jun/71 +CVE-2015-4586 - http://packetstormsecurity.com/files/132324/CellPipe-7130-Cross-Site-Request-Forgery.html +CVE-2015-4587 - http://packetstormsecurity.com/files/132327/CellPipe-7130-Cross-Site-Scripting.html +CVE-2015-4588 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4591 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html +CVE-2015-4591 - https://www.exploit-db.com/exploits/39402/ +CVE-2015-4592 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html +CVE-2015-4592 - https://www.exploit-db.com/exploits/39402/ +CVE-2015-4593 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html +CVE-2015-4593 - https://www.exploit-db.com/exploits/39402/ +CVE-2015-4594 - http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html +CVE-2015-4594 - https://www.exploit-db.com/exploits/39402/ +CVE-2015-4598 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4599 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4601 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4602 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4603 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4604 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4605 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4614 - https://www.exploit-db.com/exploits/37534/ +CVE-2015-4616 - https://www.exploit-db.com/exploits/37534/ +CVE-2015-4620 - https://kb.isc.org/article/AA-01306 +CVE-2015-4624 - http://packetstormsecurity.com/files/133052/WiFi-Pineapple-Predictable-CSRF-Token.html +CVE-2015-4624 - http://packetstormsecurity.com/files/139212/Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection-2.html +CVE-2015-4624 - https://www.exploit-db.com/exploits/40609/ +CVE-2015-4626 - https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html +CVE-2015-4630 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html +CVE-2015-4630 - https://seclists.org/fulldisclosure/2015/Jun/80 +CVE-2015-4630 - https://www.exploit-db.com/exploits/37389/ +CVE-2015-4631 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html +CVE-2015-4631 - https://seclists.org/fulldisclosure/2015/Jun/80 +CVE-2015-4631 - https://www.exploit-db.com/exploits/37389/ +CVE-2015-4632 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html +CVE-2015-4632 - https://seclists.org/fulldisclosure/2015/Jun/80 +CVE-2015-4632 - https://www.exploit-db.com/exploits/37388/ +CVE-2015-4633 - https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-SQL-Injection.html +CVE-2015-4633 - https://seclists.org/fulldisclosure/2015/Jun/80 +CVE-2015-4633 - https://www.exploit-db.com/exploits/37387/ +CVE-2015-4640 - http://www.kb.cert.org/vuls/id/155412 +CVE-2015-4640 - https://github.com/nowsecure/samsung-ime-rce-poc/ +CVE-2015-4640 - https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ +CVE-2015-4641 - http://www.kb.cert.org/vuls/id/155412 +CVE-2015-4641 - https://github.com/nowsecure/samsung-ime-rce-poc/ +CVE-2015-4641 - https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ +CVE-2015-4642 - https://bugs.php.net/bug.php?id=69646 +CVE-2015-4643 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4643 - https://hackerone.com/reports/104028 +CVE-2015-4644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4651 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-4654 - http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html +CVE-2015-4655 - https://www.securify.nl/advisory/SFY20150503/reflected_cross_site_scripting_in_synology_diskstation_manager.html +CVE-2015-4656 - https://www.securify.nl/advisory/SFY20150504/synology_photo_station_multiple_cross_site_scripting_vulnerabilities.html +CVE-2015-4658 - https://www.exploit-db.com/exploits/37290/ +CVE-2015-4659 - https://www.exploit-db.com/exploits/37266/ +CVE-2015-4660 - http://packetstormsecurity.com/files/132122/Enhanced-SQL-Portal-5.0.7961-Cross-Site-Scripting.html +CVE-2015-4661 - http://packetstormsecurity.com/files/132193/Symphony-CMS-2.6.2-Cross-Site-Scripting.html +CVE-2015-4664 - http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html +CVE-2015-4664 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt +CVE-2015-4664 - https://www.exploit-db.com/exploits/37708/ +CVE-2015-4665 - http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html +CVE-2015-4665 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt +CVE-2015-4665 - https://www.exploit-db.com/exploits/37708/ +CVE-2015-4666 - http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html +CVE-2015-4666 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt +CVE-2015-4666 - https://www.exploit-db.com/exploits/37708/ +CVE-2015-4667 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt +CVE-2015-4667 - https://www.exploit-db.com/exploits/37708/ +CVE-2015-4668 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt +CVE-2015-4668 - https://www.exploit-db.com/exploits/37708/ +CVE-2015-4669 - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt +CVE-2015-4669 - https://www.exploit-db.com/exploits/37708/ +CVE-2015-4671 - http://packetstormsecurity.com/files/135163/OpenCart-2.1.0.1-Cross-Site-Scripting.html +CVE-2015-4671 - http://seclists.org/fulldisclosure/2016/Jan/17 +CVE-2015-4674 - http://seclists.org/fulldisclosure/2015/Jun/105 +CVE-2015-4675 - http://packetstormsecurity.com/files/132196/TinySRP-Buffer-Overflow.html +CVE-2015-4676 - http://packetstormsecurity.com/files/132186/TickFa-1.x-SQL-Injection.html +CVE-2015-4677 - https://www.exploit-db.com/exploits/37257/ +CVE-2015-4678 - http://packetstormsecurity.com/files/132216/Persian-Car-CMS-1.0-SQL-Injection.html +CVE-2015-4679 - http://packetstormsecurity.com/files/132178/Airties-RT210-Cross-Site-Scripting.html +CVE-2015-4680 - http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html +CVE-2015-4681 - http://seclists.org/fulldisclosure/2015/Jun/81 +CVE-2015-4681 - https://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html +CVE-2015-4681 - https://www.exploit-db.com/exploits/37449/ +CVE-2015-4682 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html +CVE-2015-4682 - http://seclists.org/fulldisclosure/2015/Jun/81 +CVE-2015-4682 - https://www.exploit-db.com/exploits/37449/ +CVE-2015-4683 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html +CVE-2015-4683 - http://seclists.org/fulldisclosure/2015/Jun/81 +CVE-2015-4683 - https://www.exploit-db.com/exploits/37449/ +CVE-2015-4684 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html +CVE-2015-4684 - http://seclists.org/fulldisclosure/2015/Jun/81 +CVE-2015-4684 - https://www.exploit-db.com/exploits/37449/ +CVE-2015-4685 - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html +CVE-2015-4685 - http://seclists.org/fulldisclosure/2015/Jun/81 +CVE-2015-4685 - https://www.exploit-db.com/exploits/37449/ +CVE-2015-4687 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html +CVE-2015-4688 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html +CVE-2015-4689 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html +CVE-2015-4694 - http://www.openwall.com/lists/oss-security/2015/06/12/4 +CVE-2015-4694 - http://www.openwall.com/lists/oss-security/2015/06/21/2 +CVE-2015-4694 - https://wordpress.org/support/topic/zip-attachments-wordpress-plugin-v114-arbitrary-file-download-vulnerability?replies=1 +CVE-2015-4694 - https://wpvulndb.com/vulnerabilities/8047 +CVE-2015-4695 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4696 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4697 - http://seclists.org/fulldisclosure/2015/Jun/57 +CVE-2015-4697 - https://wordpress.org/support/topic/discovered-security-vulnerabilities-1/ +CVE-2015-4699 - http://seclists.org/fulldisclosure/2015/Dec/48 +CVE-2015-4700 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 +CVE-2015-4700 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4703 - http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-File-Download.html +CVE-2015-4703 - https://wpvulndb.com/vulnerabilities/8055 +CVE-2015-4704 - http://packetstormsecurity.com/files/132459/Download-Zip-Attachments-1.0-File-Download.html +CVE-2015-4713 - http://packetstormsecurity.com/files/132369/ApPHP-Hotel-Site-3.x.x-SQL-Injection.html +CVE-2015-4714 - http://packetstormsecurity.com/files/132214/DreamBox-DM500s-Cross-Site-Scripting.html +CVE-2015-4725 - http://packetstormsecurity.com/files/132337/Audio-Share-2.0.2-Cross-Site-Scripting-Remote-File-Inclusion.html +CVE-2015-4726 - http://packetstormsecurity.com/files/132337/Audio-Share-2.0.2-Cross-Site-Scripting-Remote-File-Inclusion.html +CVE-2015-4727 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4728 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4729 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4730 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4731 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4732 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4733 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4734 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4734 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4735 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4736 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4737 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4737 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4738 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4739 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4740 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4741 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4742 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4743 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4744 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4745 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4746 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4747 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4748 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4749 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4750 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4751 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4752 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4752 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4753 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4754 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4755 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4756 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4757 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4758 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4759 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4760 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4761 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4762 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4763 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4764 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4765 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4766 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4767 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4768 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4769 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4770 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4771 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4772 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4773 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4774 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4775 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4776 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4777 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4778 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4779 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4780 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4781 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4782 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4783 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4784 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4785 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4786 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4787 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4788 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4789 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4790 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html +CVE-2015-4791 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4792 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4792 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4792 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4793 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4794 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4795 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4796 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4797 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4798 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4799 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4800 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4801 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4802 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4802 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4802 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4803 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4803 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4804 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4805 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4806 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4806 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4807 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4807 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4808 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4809 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4810 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4811 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4812 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4813 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4815 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4815 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4815 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4816 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4816 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4816 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4817 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4818 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4819 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4819 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4819 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4820 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4821 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4822 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4823 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4824 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4825 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4826 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4826 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4827 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4828 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4830 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4830 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4831 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4832 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4833 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4834 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4835 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4835 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4836 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4836 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4836 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4837 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4838 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4839 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4840 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4840 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4841 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4842 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4843 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4843 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4844 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4844 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4845 - http://packetstormsecurity.com/files/134098/Oracle-E-Business-Suite-12.2.4-Database-User-Enumeration.html +CVE-2015-4845 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4846 - http://packetstormsecurity.com/files/134099/Oracle-E-Business-Suite-12.1.3-12.1.4-SQL-Injection.html +CVE-2015-4846 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4847 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4848 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4849 - http://packetstormsecurity.com/files/134118/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html +CVE-2015-4849 - http://seclists.org/fulldisclosure/2015/Oct/112 +CVE-2015-4849 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4850 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4851 - http://packetstormsecurity.com/files/134119/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html +CVE-2015-4851 - http://seclists.org/fulldisclosure/2015/Oct/113 +CVE-2015-4851 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4852 - http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ +CVE-2015-4852 - http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html +CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-4852 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-4852 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4852 - https://www.exploit-db.com/exploits/42806/ +CVE-2015-4852 - https://www.exploit-db.com/exploits/46628/ +CVE-2015-4854 - http://packetstormsecurity.com/files/134100/Oracle-E-Business-Suite-12.1.4-Cross-Site-Scripting.html +CVE-2015-4854 - http://seclists.org/fulldisclosure/2015/Oct/100 +CVE-2015-4854 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4856 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4857 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4858 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4858 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4858 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4859 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4860 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4860 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4861 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4861 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4861 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4862 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4863 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4864 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4864 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4865 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4866 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4867 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4868 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4868 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4869 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4870 - http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html +CVE-2015-4870 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4870 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4870 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4870 - https://www.exploit-db.com/exploits/39867/ +CVE-2015-4871 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4871 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-4871 - http://www.ubuntu.com/usn/USN-2818-1 +CVE-2015-4872 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4872 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4873 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4874 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4875 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4876 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4877 - http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html +CVE-2015-4877 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4877 - https://www.exploit-db.com/exploits/38788/ +CVE-2015-4878 - http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html +CVE-2015-4878 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4878 - https://www.exploit-db.com/exploits/38789/ +CVE-2015-4879 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4879 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4879 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4880 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4881 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4881 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4882 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4882 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4883 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4883 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4884 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4885 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4886 - http://packetstormsecurity.com/files/134117/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html +CVE-2015-4886 - http://seclists.org/fulldisclosure/2015/Oct/111 +CVE-2015-4886 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4887 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4888 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4890 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4891 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4892 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4893 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4893 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4894 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4895 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4896 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4898 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4899 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4900 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4901 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4902 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4903 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4903 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4904 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4905 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4906 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4907 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4908 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4909 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4910 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4911 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4911 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-4912 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4913 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-4913 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4913 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-4914 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4915 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4916 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4917 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html +CVE-2015-4919 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4920 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4921 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4922 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4923 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4924 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4925 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-4926 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-5053 - http://nvidia.custhelp.com/app/answers/detail/a_id/3802 +CVE-2015-5054 - http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html +CVE-2015-5057 - https://wpvulndb.com/vulnerabilities/8064 +CVE-2015-5061 - http://www.vulnerability-lab.com/get_content.php?id=1488 +CVE-2015-5061 - https://packetstormsecurity.com/files/132402/ManageEngine-Asset-Explorer-6.1-Cross-Site-Scripting.html +CVE-2015-5062 - http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt +CVE-2015-5062 - http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html +CVE-2015-5063 - http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt +CVE-2015-5063 - http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html +CVE-2015-5064 - http://packetstormsecurity.com/files/132420/MySQL-Lite-Administrator-Beta-1-Cross-Site-Scripting.html +CVE-2015-5065 - http://packetstormsecurity.com/files/132278/WordPress-Paypal-Currency-Converter-Basic-For-Woocommerce-1.3-File-Read.html +CVE-2015-5065 - https://www.exploit-db.com/exploits/37253/ +CVE-2015-5066 - http://packetstormsecurity.com/files/132397/GeniXCMS-0.0.3-Cross-Site-Scripting.html +CVE-2015-5066 - https://www.exploit-db.com/exploits/37360/ +CVE-2015-5067 - http://packetstormsecurity.com/files/133515/SAP-NetWeaver-AS-FKCDBFTRACE-ABAP-Hardcoded-Credentials.html +CVE-2015-5067 - http://packetstormsecurity.com/files/133516/SAP-NetWeaver-AS-LSCT1I13-ABAP-Hardcoded-Credentials.html +CVE-2015-5068 - http://packetstormsecurity.com/files/133514/SAP-Mobile-Platform-3-XXE-Injection.html +CVE-2015-5071 - https://packetstormsecurity.com/files/133688/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html +CVE-2015-5072 - https://packetstormsecurity.com/files/133689/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html +CVE-2015-5073 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5074 - http://packetstormsecurity.com/files/133717/X2Engine-4.2-Arbitrary-File-Upload.html +CVE-2015-5074 - http://seclists.org/fulldisclosure/2015/Sep/92 +CVE-2015-5074 - https://github.com/X2Engine/X2CRM/commit/10b72bfe7a1b9694f19a0adef72d85a754d4d3f8#diff-26a90fcab2707d6ef509fccb3588790f +CVE-2015-5074 - https://www.exploit-db.com/exploits/38323/ +CVE-2015-5075 - http://packetstormsecurity.com/files/133718/X2Engine-4.2-Cross-Site-Request-Forgery.html +CVE-2015-5075 - http://seclists.org/fulldisclosure/2015/Sep/93 +CVE-2015-5075 - https://www.exploit-db.com/exploits/38321/ +CVE-2015-5076 - http://packetstormsecurity.com/files/133716/X2Engine-4.2-Cross-Site-Scripting.html +CVE-2015-5076 - http://seclists.org/fulldisclosure/2015/Sep/91 +CVE-2015-5079 - http://packetstormsecurity.com/files/132541/BlackCat-CMS-1.1.1-Path-Traversal.html +CVE-2015-5082 - http://packetstormsecurity.com/files/133469/Endian-Firewall-Proxy-Password-Change-Command-Injection.html +CVE-2015-5082 - https://www.exploit-db.com/exploits/37426/ +CVE-2015-5082 - https://www.exploit-db.com/exploits/37428/ +CVE-2015-5082 - https://www.exploit-db.com/exploits/38096/ +CVE-2015-5116 - https://www.exploit-db.com/exploits/37851/ +CVE-2015-5119 - http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/ +CVE-2015-5119 - https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html +CVE-2015-5122 - http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html +CVE-2015-5122 - https://perception-point.io/new/breaking-cfi.php +CVE-2015-5122 - https://www.exploit-db.com/exploits/37599/ +CVE-2015-5123 - http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ +CVE-2015-5123 - http://www.kb.cert.org/vuls/id/918568 +CVE-2015-5125 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5125 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5127 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5127 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5127 - https://www.exploit-db.com/exploits/37861/ +CVE-2015-5129 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5129 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5130 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5130 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5130 - https://www.exploit-db.com/exploits/37854/ +CVE-2015-5131 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5131 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5131 - https://www.exploit-db.com/exploits/37856/ +CVE-2015-5132 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5132 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5132 - https://www.exploit-db.com/exploits/37857/ +CVE-2015-5133 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5133 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5133 - https://www.exploit-db.com/exploits/37858/ +CVE-2015-5134 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5134 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5134 - https://www.exploit-db.com/exploits/37852/ +CVE-2015-5143 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-5144 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-5148 - https://www.exploit-db.com/exploits/37325/ +CVE-2015-5149 - http://packetstormsecurity.com/files/132376/ManageEngine-SupportCenter-Plus-7.90-XSS-Traversal-Password-Disclosure.html +CVE-2015-5149 - http://www.vulnerability-lab.com/get_content.php?id=1501 +CVE-2015-5149 - https://www.exploit-db.com/exploits/37322/ +CVE-2015-5150 - http://packetstormsecurity.com/files/132376/ManageEngine-SupportCenter-Plus-7.90-XSS-Traversal-Password-Disclosure.html +CVE-2015-5150 - http://www.vulnerability-lab.com/get_content.php?id=1501 +CVE-2015-5150 - https://www.exploit-db.com/exploits/37322/ +CVE-2015-5151 - http://packetstormsecurity.com/files/132366/WordPress-Revslider-4.2.2-XSS-Information-Disclosure.html +CVE-2015-5156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5157 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5157 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5161 - http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt +CVE-2015-5161 - http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html +CVE-2015-5161 - http://seclists.org/fulldisclosure/2015/Aug/46 +CVE-2015-5161 - https://www.exploit-db.com/exploits/37765/ +CVE-2015-5162 - https://launchpad.net/bugs/1449062 +CVE-2015-5165 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5174 - http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html +CVE-2015-5174 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-5180 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2015-5194 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5195 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5207 - http://packetstormsecurity.com/files/136840/Apache-Cordova-iOS-3.9.1-Access-Bypass.html +CVE-2015-5208 - http://packetstormsecurity.com/files/136839/Apache-Cordova-iOS-3.9.1-Arbitrary-Plugin-Execution.html +CVE-2015-5211 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/ +CVE-2015-5212 - http://www.openoffice.org/security/cves/CVE-2015-5212.html +CVE-2015-5212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5213 - http://www.openoffice.org/security/cves/CVE-2015-5213.html +CVE-2015-5213 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5214 - http://www.openoffice.org/security/cves/CVE-2015-5214.html +CVE-2015-5214 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5219 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5223 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-5223 - https://bugs.launchpad.net/swift/+bug/1449212 +CVE-2015-5227 - https://wpvulndb.com/vulnerabilities/8200 +CVE-2015-5229 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5234 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5235 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5243 - https://github.com/jsmitty12/phpWhois/blob/master/CHANGELOG.md +CVE-2015-5243 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180425-01_phpWhois_Code_Execution +CVE-2015-5248 - https://bugzilla.redhat.com/show_bug.cgi?id=1272326 +CVE-2015-5248 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-017/?fid=7150 +CVE-2015-5252 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-5252 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5254 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-5254 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-5255 - http://packetstormsecurity.com/files/134506/Apache-Flex-BlazeDS-4.7.1-SSRF.html +CVE-2015-5256 - http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html +CVE-2015-5260 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5261 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5262 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-5262 - http://www.ubuntu.com/usn/USN-2769-1 +CVE-2015-5273 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5277 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2015-5277 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2015-5277 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5277 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2015-5279 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5281 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5283 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5285 - http://packetstormsecurity.com/files/133897/Kallithea-0.2.9-HTTP-Response-Splitting.html +CVE-2015-5285 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5267.php +CVE-2015-5285 - https://www.exploit-db.com/exploits/38424/ +CVE-2015-5287 - http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html +CVE-2015-5287 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5287 - https://www.exploit-db.com/exploits/38832/ +CVE-2015-5288 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5289 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5291 - https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ +CVE-2015-5292 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5295 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-5296 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-5296 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5299 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-5299 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5300 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-5302 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5307 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-5307 - https://bugzilla.redhat.com/show_bug.cgi?id=1277172 +CVE-2015-5308 - https://wpvulndb.com/vulnerabilities/8221 +CVE-2015-5310 - http://www.ubuntu.com/usn/USN-2808-1 +CVE-2015-5312 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-5312 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5314 - http://www.ubuntu.com/usn/USN-2808-1 +CVE-2015-5315 - http://www.ubuntu.com/usn/USN-2808-1 +CVE-2015-5316 - http://www.ubuntu.com/usn/USN-2808-1 +CVE-2015-5327 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206 +CVE-2015-5330 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5333 - http://packetstormsecurity.com/files/133998/Qualys-Security-Advisory-LibreSSL-Leak-Overflow.html +CVE-2015-5334 - http://packetstormsecurity.com/files/133998/Qualys-Security-Advisory-LibreSSL-Leak-Overflow.html +CVE-2015-5345 - http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html +CVE-2015-5345 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-5345 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-5346 - http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html +CVE-2015-5346 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-5346 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-5348 - http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html +CVE-2015-5351 - http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html +CVE-2015-5351 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-5351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-5351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-5352 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-5352 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5353 - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html +CVE-2015-5353 - https://www.exploit-db.com/exploits/37439/ +CVE-2015-5354 - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html +CVE-2015-5354 - https://www.exploit-db.com/exploits/37439/ +CVE-2015-5355 - http://packetstormsecurity.com/files/132481/GetSimple-CMS-5.7.3.1-Cross-Site-Scripting.html +CVE-2015-5356 - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1059 +CVE-2015-5364 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 +CVE-2015-5364 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5364 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5365 - http://packetstormsecurity.com/files/132418/Zurmo-CRM-3.0.2-Cross-Site-Scripting.html +CVE-2015-5366 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6 +CVE-2015-5366 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5366 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5370 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5370 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2015-5372 - http://packetstormsecurity.com/files/133628/nevisAuth-Authentication-Bypass.html +CVE-2015-5374 - https://www.exploit-db.com/exploits/44103/ +CVE-2015-5375 - http://packetstormsecurity.com/files/133674/Open-Xchange-Server-6-OX-AppSuite-Cross-Site-Scripting.html +CVE-2015-5378 - http://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html +CVE-2015-5378 - https://www.elastic.co/community/security +CVE-2015-5379 - http://packetstormsecurity.com/files/132764/Axigen-Cross-Site-Scripting.html +CVE-2015-5381 - https://github.com/roundcube/roundcubemail/commit/b782815dacda55eee6793249b5da1789256206fc +CVE-2015-5399 - https://packetstormsecurity.com/files/132715/phpVibe-Stored-Cross-Site-Scripting.html +CVE-2015-5399 - https://www.exploit-db.com/exploits/37659 +CVE-2015-5452 - http://packetstormsecurity.com/files/132498/Watchguard-XCS-10.0-SQL-Injection-Command-Execution.html +CVE-2015-5452 - http://packetstormsecurity.com/files/133721/Watchguard-XCS-Remote-Command-Execution.html +CVE-2015-5452 - https://www.exploit-db.com/exploits/38346/ +CVE-2015-5453 - http://packetstormsecurity.com/files/132498/Watchguard-XCS-10.0-SQL-Injection-Command-Execution.html +CVE-2015-5453 - http://packetstormsecurity.com/files/133721/Watchguard-XCS-Remote-Command-Execution.html +CVE-2015-5453 - https://www.exploit-db.com/exploits/38346/ +CVE-2015-5454 - http://packetstormsecurity.com/files/132461/Nucleus-CMS-3.65-Cross-Site-Scripting.html +CVE-2015-5454 - https://github.com/NucleusCMS/NucleusCMS/issues/83 +CVE-2015-5455 - http://packetstormsecurity.com/files/132513/X-Cart-4.5.0-Cross-Site-Scripting.html +CVE-2015-5456 - http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html +CVE-2015-5457 - http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html +CVE-2015-5458 - http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html +CVE-2015-5459 - http://packetstormsecurity.com/files/132511/ManageEngine-Password-Manager-Pro-8.1-SQL-Injection.html +CVE-2015-5459 - http://seclists.org/fulldisclosure/2015/Jun/104 +CVE-2015-5460 - http://packetstormsecurity.com/files/132552/Snorby-2.6.2-Cross-Site-Scripting.html +CVE-2015-5461 - http://packetstormsecurity.com/files/132553/WordPress-StageShow-5.0.8-Open-Redirect.html +CVE-2015-5461 - http://seclists.org/fulldisclosure/2015/Jul/27 +CVE-2015-5461 - https://wpvulndb.com/vulnerabilities/8073 +CVE-2015-5465 - http://packetstormsecurity.com/files/133399/SiS-Windows-VGA-Display-Manager-Privilege-Escalation.html +CVE-2015-5465 - http://seclists.org/fulldisclosure/2015/Sep/1 +CVE-2015-5465 - https://www.exploit-db.com/exploits/38054/ +CVE-2015-5465 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-003.txt +CVE-2015-5466 - http://packetstormsecurity.com/files/133400/XGI-Windows-VGA-Display-Manager-Privilege-Escalation.html +CVE-2015-5466 - http://seclists.org/fulldisclosure/2015/Sep/2 +CVE-2015-5466 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-004.txt +CVE-2015-5471 - http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html +CVE-2015-5471 - https://wpvulndb.com/vulnerabilities/8071 +CVE-2015-5472 - https://wpvulndb.com/vulnerabilities/8091 +CVE-2015-5477 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718 +CVE-2015-5477 - http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html +CVE-2015-5477 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-5477 - https://kb.isc.org/article/AA-01272 +CVE-2015-5477 - https://kb.isc.org/article/AA-01306 +CVE-2015-5477 - https://www.exploit-db.com/exploits/37721/ +CVE-2015-5477 - https://www.exploit-db.com/exploits/37723/ +CVE-2015-5479 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-5481 - http://packetstormsecurity.com/files/132657/WordPress-GD-bbPress-Attachments-2.1-Cross-Site-Scripting.html +CVE-2015-5481 - http://seclists.org/fulldisclosure/2015/Jul/53 +CVE-2015-5481 - https://security.dxw.com/advisories/reflected-xss-in-gd-bbpress-attachments-allows-an-attacker-to-do-almost-anything-an-admin-can/ +CVE-2015-5481 - https://wpvulndb.com/vulnerabilities/8088 +CVE-2015-5482 - https://packetstormsecurity.com/files/132656/wpgdbbpress-lfi.txt +CVE-2015-5482 - https://security.dxw.com/advisories/local-file-include-vulnerability-in-gd-bbpress-attachments-allows-attackers-to-include-arbitrary-php-files/ +CVE-2015-5482 - https://wpvulndb.com/vulnerabilities/8087 +CVE-2015-5483 - http://packetstormsecurity.com/files/133349/WordPress-Private-Only-3.5.1-CSRF-Cross-Site-Scripting.html +CVE-2015-5483 - http://seclists.org/fulldisclosure/2015/Aug/77 +CVE-2015-5483 - https://security.dxw.com/advisories/csrfxss-vulnerability-in-private-only-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ +CVE-2015-5484 - http://seclists.org/fulldisclosure/2015/Jul/68 +CVE-2015-5484 - https://security.dxw.com/advisories/stored-xss-in-plotly-allows-less-privileged-users-to-insert-arbitrary-javascript-into-posts/ +CVE-2015-5485 - http://packetstormsecurity.com/files/132676/The-Events-Calender-Eventbrite-Tickets-3.9.6-Cross-Site-Scripting.html +CVE-2015-5485 - http://seclists.org/fulldisclosure/2015/Jul/67 +CVE-2015-5485 - https://security.dxw.com/advisories/reflected-xss-in-the-events-calendar-eventbrite-tickets-allows-unauthenticated-users-to-do-almost-anything-an-admin-can/ +CVE-2015-5519 - http://packetstormsecurity.com/files/132584/WideImage-11.02.19-Cross-Site-Scripting.html +CVE-2015-5520 - http://packetstormsecurity.com/files/132583/Orchard-CMS-1.9.0-1.8.2-1.7.3-Cross-Site-Scripting.html +CVE-2015-5520 - http://seclists.org/fulldisclosure/2015/Jul/32 +CVE-2015-5520 - https://www.exploit-db.com/exploits/37533/ +CVE-2015-5521 - http://packetstormsecurity.com/files/132589/Black-Cat-CMS-1.1.2-Cross-Site-Scripting.html +CVE-2015-5522 - http://www.openwall.com/lists/oss-security/2015/06/04/2 +CVE-2015-5523 - http://www.openwall.com/lists/oss-security/2015/06/04/2 +CVE-2015-5524 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2015-5528 - http://packetstormsecurity.com/files/132670/WordPress-Floating-Social-Bar-1.1.5-Cross-Site-Scripting.html +CVE-2015-5528 - https://wpvulndb.com/vulnerabilities/8098 +CVE-2015-5529 - http://packetstormsecurity.com/files/132683/ArticleFR-3.0.6-Cross-Site-Scripting.html +CVE-2015-5529 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5247.php +CVE-2015-5529 - https://www.exploit-db.com/exploits/37596/ +CVE-2015-5530 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5248.php +CVE-2015-5530 - https://www.exploit-db.com/exploits/37596/ +CVE-2015-5531 - http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversal.html +CVE-2015-5531 - http://packetstormsecurity.com/files/133797/ElasticSearch-Path-Traversal-Arbitrary-File-Download.html +CVE-2015-5531 - http://packetstormsecurity.com/files/133964/ElasticSearch-Snapshot-API-Directory-Traversal.html +CVE-2015-5531 - https://www.elastic.co/community/security/ +CVE-2015-5531 - https://www.exploit-db.com/exploits/38383/ +CVE-2015-5532 - http://packetstormsecurity.com/files/132812/WordPress-Paid-Memberships-Pro-1.8.4.2-Cross-Site-Scripting.html +CVE-2015-5532 - https://wpvulndb.com/vulnerabilities/8109 +CVE-2015-5533 - http://packetstormsecurity.com/files/132811/WordPress-Count-Per-Day-3.4-SQL-Injection.html +CVE-2015-5533 - https://wpvulndb.com/vulnerabilities/8110 +CVE-2015-5533 - https://www.exploit-db.com/exploits/37707/ +CVE-2015-5534 - http://packetstormsecurity.com/files/134124/Oxwall-1.7.4-Cross-Site-Request-Forgery.html +CVE-2015-5534 - https://www.exploit-db.com/exploits/38581/ +CVE-2015-5535 - http://packetstormsecurity.com/files/132916/WordPress-qTranslate-2.5.39-Cross-Site-Scripting.html +CVE-2015-5535 - https://wpvulndb.com/vulnerabilities/8120 +CVE-2015-5539 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5539 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5539 - https://www.exploit-db.com/exploits/37855/ +CVE-2015-5540 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5540 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5540 - https://www.exploit-db.com/exploits/37859/ +CVE-2015-5541 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5541 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5544 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5544 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5545 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5545 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5546 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5546 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5547 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5547 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5548 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5548 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5549 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5549 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5550 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5550 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5551 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5551 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5552 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5552 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5553 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5553 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5554 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5554 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5555 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5555 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5556 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5556 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5557 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5557 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5558 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5558 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5559 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5559 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5560 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5560 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5561 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5561 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5562 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5562 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5563 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5563 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5564 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5564 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5565 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5565 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5566 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5566 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5567 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5567 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5568 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5568 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5568 - https://www.exploit-db.com/exploits/38348/ +CVE-2015-5570 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5570 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5571 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5571 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5572 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5572 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5573 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5573 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5574 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5574 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5574 - https://www.exploit-db.com/exploits/39652/ +CVE-2015-5575 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5575 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5576 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5576 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5577 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5577 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5578 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5578 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5579 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5579 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5580 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5580 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5581 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5581 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5582 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5582 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5584 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5584 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5587 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5587 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5588 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-5588 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-5591 - http://packetstormsecurity.com/files/132667/ZenPhoto-1.4.8-XSS-SQL-Injection-Traversal.html +CVE-2015-5592 - http://packetstormsecurity.com/files/132667/ZenPhoto-1.4.8-XSS-SQL-Injection-Traversal.html +CVE-2015-5599 - http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html +CVE-2015-5599 - http://seclists.org/fulldisclosure/2015/Jul/64 +CVE-2015-5600 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-5600 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-5600 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-5600 - http://www.securityfocus.com/bid/91787 +CVE-2015-5600 - https://security.netapp.com/advisory/ntap-20151106-0001/ +CVE-2015-5602 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-5602 - https://www.exploit-db.com/exploits/37710/ +CVE-2015-5603 - http://packetstormsecurity.com/files/133401/Jira-HipChat-For-Jira-Java-Code-Execution.html +CVE-2015-5603 - https://www.exploit-db.com/exploits/38551/ +CVE-2015-5603 - https://www.exploit-db.com/exploits/38905/ +CVE-2015-5610 - http://www.kb.cert.org/vuls/id/912036 +CVE-2015-5611 - https://www.youtube.com/watch?v=MK0SrxBC1xs&feature=youtu.be +CVE-2015-5612 - http://www.openwall.com/lists/oss-security/2015/07/21/5 +CVE-2015-5612 - https://github.com/octobercms/october/issues/1302 +CVE-2015-5613 - https://github.com/octobercms/october/issues/1302 +CVE-2015-5617 - http://packetstormsecurity.com/files/133082/Enorth-Webpublisher-CMS-SQL-Injection.html +CVE-2015-5618 - http://www.kb.cert.org/vuls/id/360431 +CVE-2015-5619 - http://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html +CVE-2015-5621 - https://sourceforge.net/p/net-snmp/bugs/2615/ +CVE-2015-5621 - https://www.exploit-db.com/exploits/45547/ +CVE-2015-5622 - https://wpvulndb.com/vulnerabilities/8111 +CVE-2015-5623 - https://wpvulndb.com/vulnerabilities/8111 +CVE-2015-5664 - https://www.qnap.com/i/en/support/con_show.php?cid=93 +CVE-2015-5673 - https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7dab14203fa +CVE-2015-5675 - http://packetstormsecurity.com/files/133335/FreeBSD-Security-Advisory-IRET-Handler-Privilege-Escalation.html +CVE-2015-5681 - http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html +CVE-2015-5681 - http://seclists.org/fulldisclosure/2015/Jul/64 +CVE-2015-5687 - http://seclists.org/fulldisclosure/2015/Aug/83 +CVE-2015-5696 - http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html +CVE-2015-5696 - https://www.exploit-db.com/exploits/37739/ +CVE-2015-5697 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-5697 - http://www.ubuntu.com/usn/USN-2732-1 +CVE-2015-5697 - https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16 +CVE-2015-5698 - http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html +CVE-2015-5703 - http://packetstormsecurity.com/files/133672/Guard-2.0.0-rev7-SQL-Injection.html +CVE-2015-5711 - http://www.tibco.com/mk/advisory.jsp +CVE-2015-5712 - http://www.tibco.com/mk/advisory.jsp +CVE-2015-5713 - http://www.tibco.com/mk/advisory.jsp +CVE-2015-5714 - https://github.com/WordPress/WordPress/commit/f72b21af23da6b6d54208e5c1d65ececdaa109c8 +CVE-2015-5714 - https://wpvulndb.com/vulnerabilities/8186 +CVE-2015-5715 - https://wpvulndb.com/vulnerabilities/8188 +CVE-2015-5718 - http://packetstormsecurity.com/files/132968/Websense-Triton-Content-Manager-8.0.0-Build-1165-Buffer-Overflow.html +CVE-2015-5718 - http://seclists.org/fulldisclosure/2015/Aug/8 +CVE-2015-5722 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-5722 - https://kb.isc.org/article/AA-01306 +CVE-2015-5725 - https://github.com/bcit-ci/CodeIgniter/issues/4020 +CVE-2015-5729 - http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html +CVE-2015-5729 - http://seclists.org/fulldisclosure/2015/Dec/79 +CVE-2015-5730 - https://wpvulndb.com/vulnerabilities/8130 +CVE-2015-5732 - https://wpvulndb.com/vulnerabilities/8131 +CVE-2015-5733 - https://wpvulndb.com/vulnerabilities/8132 +CVE-2015-5734 - https://wpvulndb.com/vulnerabilities/8133 +CVE-2015-5735 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html +CVE-2015-5735 - http://seclists.org/fulldisclosure/2015/Sep/0 +CVE-2015-5735 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities +CVE-2015-5736 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html +CVE-2015-5736 - http://seclists.org/fulldisclosure/2015/Sep/0 +CVE-2015-5736 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities +CVE-2015-5736 - https://www.exploit-db.com/exploits/41721/ +CVE-2015-5736 - https://www.exploit-db.com/exploits/41722/ +CVE-2015-5736 - https://www.exploit-db.com/exploits/45149/ +CVE-2015-5737 - http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html +CVE-2015-5737 - http://seclists.org/fulldisclosure/2015/Sep/0 +CVE-2015-5737 - http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities +CVE-2015-5742 - http://packetstormsecurity.com/files/133906/Veeam-Backup-And-Replication-6-7-8-Privilege-Escalation.html +CVE-2015-5754 - http://packetstormsecurity.com/files/133550/OS-X-Suid-Privilege-Escalation.html +CVE-2015-5754 - https://www.exploit-db.com/exploits/38136/ +CVE-2015-5764 - http://packetstormsecurity.com/files/133847/Apple-Safari-8.0.8-URI-Spoofing.html +CVE-2015-5764 - http://seclists.org/fulldisclosure/2015/Oct/16 +CVE-2015-5784 - https://www.exploit-db.com/exploits/38137/ +CVE-2015-5889 - http://packetstormsecurity.com/files/133826/issetugid-rsh-libmalloc-OS-X-Local-Root.html +CVE-2015-5889 - http://packetstormsecurity.com/files/134087/Mac-OS-X-10.9.5-10.10.5-rsh-libmalloc-Privilege-Escalation.html +CVE-2015-5889 - https://www.exploit-db.com/exploits/38371/ +CVE-2015-5889 - https://www.exploit-db.com/exploits/38540/ +CVE-2015-5914 - https://trmm.net/Thunderstrike_FAQ +CVE-2015-5917 - https://cxsecurity.com/issue/WLB-2013040082 +CVE-2015-5947 - https://github.com/XiphosResearch/exploits/tree/master/suiteshell +CVE-2015-5947 - https://github.com/salesagility/SuiteCRM/issues/333 +CVE-2015-5948 - https://github.com/XiphosResearch/exploits/tree/master/suiteshell +CVE-2015-5948 - https://github.com/salesagility/SuiteCRM/issues/333 +CVE-2015-5949 - http://packetstormsecurity.com/files/133266/VLC-2.2.1-Arbitrary-Pointer-Dereference.html +CVE-2015-5949 - http://www.openwall.com/lists/oss-security/2015/08/20/8 +CVE-2015-5950 - http://nvidia.custhelp.com/app/answers/detail/a_id/3763/~/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia +CVE-2015-5951 - http://packetstormsecurity.com/files/133003/Thomson-Reuters-FATCA-Arbitrary-File-Upload.html +CVE-2015-5956 - http://packetstormsecurity.com/files/133551/Typo3-CMS-6.2.14-4.5.40-Cross-Site-Scripting.html +CVE-2015-5956 - http://seclists.org/fulldisclosure/2015/Sep/57 +CVE-2015-5958 - http://packetstormsecurity.com/files/132865/phpFileManager-0.9.8-Remote-Command-Execution.html +CVE-2015-5963 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-5964 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-5986 - https://kb.isc.org/article/AA-01306 +CVE-2015-5987 - https://www.kb.cert.org/vuls/id/201168 +CVE-2015-5988 - https://www.kb.cert.org/vuls/id/201168 +CVE-2015-5989 - https://www.kb.cert.org/vuls/id/201168 +CVE-2015-5990 - https://www.kb.cert.org/vuls/id/201168 +CVE-2015-5991 - http://www.kb.cert.org/vuls/id/525276 +CVE-2015-5992 - http://www.kb.cert.org/vuls/id/525276 +CVE-2015-5993 - http://www.kb.cert.org/vuls/id/525276 +CVE-2015-5994 - https://www.kb.cert.org/vuls/id/630872 +CVE-2015-5995 - https://www.kb.cert.org/vuls/id/630872 +CVE-2015-5996 - https://www.exploit-db.com/exploits/45078/ +CVE-2015-5996 - https://www.kb.cert.org/vuls/id/630872 +CVE-2015-5997 - http://www.kb.cert.org/vuls/id/549807 +CVE-2015-5998 - http://www.kb.cert.org/vuls/id/549807 +CVE-2015-5999 - http://packetstormsecurity.com/files/134379/D-Link-DIR-816L-Cross-Site-Request-Forgery.html +CVE-2015-5999 - http://seclists.org/fulldisclosure/2015/Nov/45 +CVE-2015-5999 - https://www.exploit-db.com/exploits/38707/ +CVE-2015-6000 - http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html +CVE-2015-6000 - https://www.exploit-db.com/exploits/38345/ +CVE-2015-6003 - http://www.kb.cert.org/vuls/id/751328 +CVE-2015-6003 - https://www.qnap.com/i/en/support/con_show.php?cid=85 +CVE-2015-6004 - https://www.kb.cert.org/vuls/id/176160 +CVE-2015-6005 - https://www.kb.cert.org/vuls/id/176160 +CVE-2015-6006 - http://www.kb.cert.org/vuls/id/675052 +CVE-2015-6007 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-6008 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-6008 - https://www.exploit-db.com/exploits/38292/ +CVE-2015-6009 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-6009 - https://www.exploit-db.com/exploits/38292/ +CVE-2015-6010 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-6011 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-6012 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-6013 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-6013 - https://www.kb.cert.org/vuls/id/916896 +CVE-2015-6014 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-6014 - https://www.kb.cert.org/vuls/id/916896 +CVE-2015-6015 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-6015 - https://www.kb.cert.org/vuls/id/916896 +CVE-2015-6016 - https://www.kb.cert.org/vuls/id/870744 +CVE-2015-6016 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R +CVE-2015-6017 - https://www.kb.cert.org/vuls/id/870744 +CVE-2015-6017 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R +CVE-2015-6018 - https://www.exploit-db.com/exploits/38455/ +CVE-2015-6018 - https://www.kb.cert.org/vuls/id/870744 +CVE-2015-6018 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R +CVE-2015-6019 - https://www.kb.cert.org/vuls/id/870744 +CVE-2015-6019 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R +CVE-2015-6020 - https://www.kb.cert.org/vuls/id/870744 +CVE-2015-6020 - https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R +CVE-2015-6023 - http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html +CVE-2015-6023 - http://seclists.org/fulldisclosure/2016/May/13 +CVE-2015-6023 - http://seclists.org/fulldisclosure/2016/May/18 +CVE-2015-6023 - https://www.exploit-db.com/exploits/39762/ +CVE-2015-6024 - http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html +CVE-2015-6024 - http://seclists.org/fulldisclosure/2016/May/13 +CVE-2015-6024 - http://seclists.org/fulldisclosure/2016/May/18 +CVE-2015-6024 - https://www.exploit-db.com/exploits/39762/ +CVE-2015-6029 - http://www.kb.cert.org/vuls/id/842252 +CVE-2015-6030 - http://www.kb.cert.org/vuls/id/842252 +CVE-2015-6032 - http://www.kb.cert.org/vuls/id/573848 +CVE-2015-6033 - http://www.kb.cert.org/vuls/id/573848 +CVE-2015-6086 - https://www.exploit-db.com/exploits/39698/ +CVE-2015-6098 - http://packetstormsecurity.com/files/134521/Microsoft-Windows-Ndis.sys-Buffer-Overflow.html +CVE-2015-6098 - https://www.exploit-db.com/exploits/38793/ +CVE-2015-6099 - http://packetstormsecurity.com/files/134314/Microsoft-.NET-Framework-XSS-Privilege-Escalation.html +CVE-2015-6100 - https://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 +CVE-2015-6100 - https://www.exploit-db.com/exploits/38796/ +CVE-2015-6101 - https://www.exploit-db.com/exploits/38795/ +CVE-2015-6102 - http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html +CVE-2015-6102 - https://www.exploit-db.com/exploits/38794/ +CVE-2015-6103 - http://packetstormsecurity.com/files/134397/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html +CVE-2015-6103 - https://www.exploit-db.com/exploits/38714/ +CVE-2015-6104 - http://packetstormsecurity.com/files/134398/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html +CVE-2015-6104 - https://www.exploit-db.com/exploits/38713/ +CVE-2015-6127 - https://www.exploit-db.com/exploits/38912/ +CVE-2015-6128 - https://www.exploit-db.com/exploits/38918/ +CVE-2015-6131 - https://www.exploit-db.com/exploits/38911/ +CVE-2015-6132 - https://www.exploit-db.com/exploits/38968/ +CVE-2015-6152 - https://www.exploit-db.com/exploits/38972/ +CVE-2015-6168 - http://seclists.org/fulldisclosure/2016/Dec/4 +CVE-2015-6168 - https://www.exploit-db.com/exploits/40878/ +CVE-2015-6238 - https://wpvulndb.com/vulnerabilities/8159 +CVE-2015-6238 - https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/ +CVE-2015-6240 - https://bugzilla.redhat.com/show_bug.cgi?id=1243468 +CVE-2015-6241 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6242 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6243 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6243 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6244 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6244 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6245 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6245 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6246 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6246 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6247 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6248 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6248 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6249 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-6250 - https://github.com/claviska/simple-php-captcha/issues/16 +CVE-2015-6305 - http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html +CVE-2015-6305 - https://www.exploit-db.com/exploits/38289/ +CVE-2015-6306 - http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html +CVE-2015-6306 - https://www.exploit-db.com/exploits/38303/ +CVE-2015-6306 - https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html +CVE-2015-6318 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151007-vcs +CVE-2015-6352 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-ucd +CVE-2015-6357 - http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Certificate-Validation.html +CVE-2015-6357 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fmc +CVE-2015-6357 - http://wadofstuff.blogspot.com.au/2015/11/cve-2015-6357-firepwner-exploit-for.html +CVE-2015-6361 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-xb3 +CVE-2015-6364 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-vds +CVE-2015-6396 - https://www.exploit-db.com/exploits/45986/ +CVE-2015-6401 - https://www.exploit-db.com/exploits/39904/ +CVE-2015-6402 - https://www.exploit-db.com/exploits/39904/ +CVE-2015-6409 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab +CVE-2015-6420 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization +CVE-2015-6420 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-6420 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-6420 - https://www.kb.cert.org/vuls/id/581311 +CVE-2015-6435 - http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution.html +CVE-2015-6472 - http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html +CVE-2015-6472 - http://seclists.org/fulldisclosure/2016/Mar/4 +CVE-2015-6473 - http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html +CVE-2015-6473 - http://seclists.org/fulldisclosure/2016/Mar/4 +CVE-2015-6477 - http://packetstormsecurity.com/files/135068/Nordex-Control-2-NC2-SCADA-16-Cross-Site-Scripting.html +CVE-2015-6477 - http://seclists.org/fulldisclosure/2015/Dec/117 +CVE-2015-6497 - http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html +CVE-2015-6497 - http://packetstormsecurity.com/files/133544/Magento-1.9.2-File-Inclusion.html +CVE-2015-6497 - http://seclists.org/fulldisclosure/2015/Sep/48 +CVE-2015-6498 - http://packetstormsecurity.com/files/134191/Alcatel-Lucent-Home-Device-Manager-Spoofing.html +CVE-2015-6498 - http://seclists.org/fulldisclosure/2015/Nov/6 +CVE-2015-6500 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt +CVE-2015-6507 - http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html +CVE-2015-6507 - http://seclists.org/fulldisclosure/2015/Sep/109 +CVE-2015-6512 - http://packetstormsecurity.com/files/132673/FreiChat-9.6-SQL-Injection.html +CVE-2015-6512 - https://www.exploit-db.com/exploits/37592/ +CVE-2015-6513 - http://packetstormsecurity.com/files/132658/Joomla-J2Store-3.1.6-SQL-Injection.html +CVE-2015-6516 - http://packetstormsecurity.com/files/132672/sysPass-1.0.9-SQL-Injection.html +CVE-2015-6516 - https://www.exploit-db.com/exploits/37610/ +CVE-2015-6516 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-031.txt +CVE-2015-6517 - http://packetstormsecurity.com/files/132580/phpLiteAdmin-1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-6518 - http://packetstormsecurity.com/files/132580/phpLiteAdmin-1.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-6519 - http://packetstormsecurity.com/files/132648/Arab-Portal-3-SQL-Injection.html +CVE-2015-6519 - https://www.exploit-db.com/exploits/37594/ +CVE-2015-6519 - https://youtu.be/5nFblYE90Vk +CVE-2015-6522 - https://wpvulndb.com/vulnerabilities/8140 +CVE-2015-6522 - https://www.exploit-db.com/exploits/37824/ +CVE-2015-6523 - http://seclists.org/fulldisclosure/2015/Jul/104 +CVE-2015-6523 - https://wpvulndb.com/vulnerabilities/8108 +CVE-2015-6526 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6527 - https://hackerone.com/reports/104017 +CVE-2015-6528 - http://packetstormsecurity.com/files/133059/Coppermine-Photo-Gallery-1.5.36-Cross-Site-Scripting.html +CVE-2015-6529 - http://packetstormsecurity.com/files/133055/phpipam-1.1.010-Cross-Site-Scripting.html +CVE-2015-6530 - http://packetstormsecurity.com/files/133247/OpenText-Secure-MFT-2014-R2-SP4-Cross-Site-Scripting.html +CVE-2015-6530 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-041.txt +CVE-2015-6531 - https://www.tenable.com/security/research/tra-2015-02 +CVE-2015-6535 - http://packetstormsecurity.com/files/133340/WordPress-YouTube-Embed-3.3.2-Cross-Site-Scripting.html +CVE-2015-6535 - https://wpvulndb.com/vulnerabilities/8163 +CVE-2015-6537 - https://www.kb.cert.org/vuls/id/630239 +CVE-2015-6538 - https://www.kb.cert.org/vuls/id/630239 +CVE-2015-6540 - http://packetstormsecurity.com/files/134767/Intellect-Core-Cross-Site-Scripting.html +CVE-2015-6541 - http://seclists.org/fulldisclosure/2016/Feb/121 +CVE-2015-6541 - https://www.exploit-db.com/exploits/39500/ +CVE-2015-6545 - http://packetstormsecurity.com/files/133404/Cerb-7.0.3-Cross-Site-Request-Forgery.html +CVE-2015-6545 - https://github.com/wgm/cerb/commit/12de87ff9961a4f3ad2946c8f47dd0c260607144 +CVE-2015-6545 - https://www.exploit-db.com/exploits/38074/ +CVE-2015-6563 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-6563 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-6563 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6564 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-6564 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-6564 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6565 - http://openwall.com/lists/oss-security/2017/01/26/2 +CVE-2015-6565 - https://www.exploit-db.com/exploits/41173/ +CVE-2015-6567 - http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html +CVE-2015-6567 - https://www.exploit-db.com/exploits/38000/ +CVE-2015-6567 - https://www.exploit-db.com/exploits/40004/ +CVE-2015-6568 - http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html +CVE-2015-6568 - https://www.exploit-db.com/exploits/38000/ +CVE-2015-6568 - https://www.exploit-db.com/exploits/40004/ +CVE-2015-6569 - https://floodlight.atlassian.net/wiki/spaces/floodlightcontroller/pages/24805419/Floodlight+v1.2 +CVE-2015-6574 - https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf +CVE-2015-6575 - https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ +CVE-2015-6576 - http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html +CVE-2015-6584 - http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html +CVE-2015-6584 - http://seclists.org/fulldisclosure/2015/Sep/37 +CVE-2015-6584 - https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/ +CVE-2015-6585 - https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf +CVE-2015-6588 - http://packetstormsecurity.com/files/134529/MODX-2.3.5-Cross-Site-Scripting.html +CVE-2015-6589 - http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html +CVE-2015-6589 - https://www.exploit-db.com/exploits/38351/ +CVE-2015-6591 - http://packetstormsecurity.com/files/134081/articleFR-3.0.7-Arbitrary-File-Read.html +CVE-2015-6602 - https://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/ +CVE-2015-6602 - https://support.silentcircle.com/customer/en/portal/articles/2145864-privatos-1-1-12-release-notes +CVE-2015-6602 - https://threatpost.com/stagefright-2-0-vulnerabilities-affect-1-billion-android-devices/114863/ +CVE-2015-6639 - http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html +CVE-2015-6639 - http://seclists.org/fulldisclosure/2023/May/26 +CVE-2015-6639 - https://www.exploit-db.com/exploits/39757/ +CVE-2015-6647 - http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html +CVE-2015-6647 - http://seclists.org/fulldisclosure/2023/May/26 +CVE-2015-6655 - http://packetstormsecurity.com/files/133299/Pligg-CMS-2.0.2-Cross-Site-Request-Forgery.html +CVE-2015-6655 - https://www.exploit-db.com/exploits/37955/ +CVE-2015-6662 - http://packetstormsecurity.com/files/134507/SAP-NetWeaver-7.4-XXE-Injection.html +CVE-2015-6662 - http://seclists.org/fulldisclosure/2015/Nov/92 +CVE-2015-6662 - https://erpscan.io/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/ +CVE-2015-6663 - http://packetstormsecurity.com/files/134508/SAP-Afaria-7-Cross-Site-Scripting.html +CVE-2015-6664 - http://packetstormsecurity.com/files/134509/SAP-Mobile-Platform-2.3-XXE-Injection.html +CVE-2015-6664 - http://seclists.org/fulldisclosure/2015/Nov/96 +CVE-2015-6664 - https://erpscan.io/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/ +CVE-2015-6668 - https://wpvulndb.com/vulnerabilities/8167 +CVE-2015-6673 - https://bugzilla.redhat.com/show_bug.cgi?id=1251749 +CVE-2015-6676 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-6676 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-6677 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-6677 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-6678 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-6678 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-6679 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-6679 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-6682 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-6682 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-6734 - https://phabricator.wikimedia.org/T108198 +CVE-2015-6742 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-6743 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-6744 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-6745 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-6746 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-6747 - http://seclists.org/fulldisclosure/2015/Jul/120 +CVE-2015-6748 - https://hibernate.atlassian.net/browse/HV-1012 +CVE-2015-6750 - http://packetstormsecurity.com/files/133248/Ricoh-FTP-Server-1.1.0.6-Buffer-Overflow.html +CVE-2015-6763 - http://packetstormsecurity.com/files/134482/Google-Chrome-Integer-Overflow.html +CVE-2015-6763 - https://www.exploit-db.com/exploits/38763/ +CVE-2015-6765 - https://codereview.chromium.org/1463463003/ +CVE-2015-6769 - https://codereview.chromium.org/1362203002/ +CVE-2015-6787 - https://www.exploit-db.com/exploits/39162/ +CVE-2015-6787 - https://www.exploit-db.com/exploits/39163/ +CVE-2015-6787 - https://www.exploit-db.com/exploits/39165/ +CVE-2015-6805 - https://wpvulndb.com/vulnerabilities/8154 +CVE-2015-6805 - https://www.exploit-db.com/exploits/37907/ +CVE-2015-6809 - https://github.com/bedita/bedita/issues/623 +CVE-2015-6809 - https://www.exploit-db.com/exploits/38051/ +CVE-2015-6810 - https://www.exploit-db.com/exploits/37989/ +CVE-2015-6811 - http://packetstormsecurity.com/files/133378/Cyberoam-CR500iNG-XP-10.6.2-MR-1-Blind-SQL-Injection.html +CVE-2015-6811 - https://www.exploit-db.com/exploits/38034/ +CVE-2015-6818 - http://ffmpeg.org/security.html +CVE-2015-6818 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-6819 - http://ffmpeg.org/security.html +CVE-2015-6820 - http://ffmpeg.org/security.html +CVE-2015-6820 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-6821 - http://ffmpeg.org/security.html +CVE-2015-6822 - http://ffmpeg.org/security.html +CVE-2015-6823 - http://ffmpeg.org/security.html +CVE-2015-6824 - http://ffmpeg.org/security.html +CVE-2015-6824 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-6825 - http://ffmpeg.org/security.html +CVE-2015-6826 - http://ffmpeg.org/security.html +CVE-2015-6826 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-6827 - http://packetstormsecurity.com/files/133498/Autoexchanger-5.1.0-Cross-Site-Request-Forgery.html +CVE-2015-6827 - https://www.exploit-db.com/exploits/38119/ +CVE-2015-6828 - https://wpvulndb.com/vulnerabilities/8179 +CVE-2015-6829 - https://wpvulndb.com/vulnerabilities/8178 +CVE-2015-6831 - https://bugs.php.net/bug.php?id=70168 +CVE-2015-6831 - https://bugs.php.net/bug.php?id=70169 +CVE-2015-6831 - https://hackerone.com/reports/104018 +CVE-2015-6832 - https://bugs.php.net/bug.php?id=70068 +CVE-2015-6832 - https://hackerone.com/reports/104016 +CVE-2015-6833 - https://hackerone.com/reports/104019 +CVE-2015-6834 - https://bugs.php.net/bug.php?id=70172 +CVE-2015-6834 - https://bugs.php.net/bug.php?id=70365 +CVE-2015-6834 - https://bugs.php.net/bug.php?id=70366 +CVE-2015-6834 - https://hackerone.com/reports/103995 +CVE-2015-6834 - https://hackerone.com/reports/103996 +CVE-2015-6834 - https://hackerone.com/reports/103997 +CVE-2015-6835 - https://bugs.php.net/bug.php?id=70219 +CVE-2015-6835 - https://hackerone.com/reports/103998 +CVE-2015-6836 - https://hackerone.com/reports/104010 +CVE-2015-6839 - https://www.youtube.com/watch?v=CTOCspLn6Zk +CVE-2015-6843 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html +CVE-2015-6844 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html +CVE-2015-6845 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html +CVE-2015-6846 - http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html +CVE-2015-6847 - http://packetstormsecurity.com/files/134420/EMC-VPLEX-Sensitive-Information-Exposure.html +CVE-2015-6850 - http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html +CVE-2015-6851 - http://packetstormsecurity.com/files/135013/RSA-SecurID-Web-Agent-Authentication-Bypass.html +CVE-2015-6852 - http://packetstormsecurity.com/files/135044/EMC-Secure-Remote-Services-Virtual-Edition-Path-Traversal.html +CVE-2015-6856 - http://packetstormsecurity.com/files/134987/Dell-Authentication-Driver-Uncontrolled-Write.html +CVE-2015-6856 - http://seclists.org/fulldisclosure/2015/Dec/81 +CVE-2015-6856 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-008.txt +CVE-2015-6908 - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240 +CVE-2015-6908 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6908 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-6909 - http://packetstormsecurity.com/files/133520/Synology-Download-Station-3.5-2956-3.5-2962-Cross-Site-Scripting.html +CVE-2015-6909 - https://www.securify.nl/advisory/SFY20150809/multiple_cross_site_scripting_vulnerabilities_in_synology_download_station.html +CVE-2015-6910 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html +CVE-2015-6910 - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html +CVE-2015-6911 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html +CVE-2015-6911 - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html +CVE-2015-6912 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html +CVE-2015-6912 - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html +CVE-2015-6913 - http://packetstormsecurity.com/files/133520/Synology-Download-Station-3.5-2956-3.5-2962-Cross-Site-Scripting.html +CVE-2015-6913 - https://www.securify.nl/advisory/SFY20150809/multiple_cross_site_scripting_vulnerabilities_in_synology_download_station.html +CVE-2015-6914 - http://packetstormsecurity.com/files/133251/SiteFactory-CMS-5.5.9-Directory-Traversal.html +CVE-2015-6915 - http://packetstormsecurity.com/files/133297/ResourceSpace-CMS-7.3.7009-SQL-Injection.html +CVE-2015-6919 - http://packetstormsecurity.com/files/133375/Joomla-GoogleSearch-CSE-3.0.2-Cross-Site-Scripting.html +CVE-2015-6920 - http://packetstormsecurity.com/files/133371/WordPress-sourceAFRICA-0.1.3-Cross-Site-Scripting.html +CVE-2015-6920 - https://wpvulndb.com/vulnerabilities/8169 +CVE-2015-6922 - http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html +CVE-2015-6922 - https://www.exploit-db.com/exploits/38351/ +CVE-2015-6923 - http://packetstormsecurity.com/files/133620/VBox-Satellite-Express-Arbitrary-Write-Privilege-Escalation.html +CVE-2015-6923 - http://seclists.org/fulldisclosure/2015/Sep/72 +CVE-2015-6923 - https://www.exploit-db.com/exploits/38225/ +CVE-2015-6923 - https://www.korelogic.com/Resources/Advisories/KL-001-2015-005.txt +CVE-2015-6925 - https://github.com/IAIK/wolfSSL-DoS +CVE-2015-6928 - http://packetstormsecurity.com/files/133535/CubeCart-6.0.6-Administrative-Bypass.html +CVE-2015-6928 - http://seclists.org/fulldisclosure/2015/Sep/40 +CVE-2015-6929 - http://packetstormsecurity.com/files/133538/Nokia-Solutions-And-Networks-Cross-Site-Scripting.html +CVE-2015-6929 - http://seclists.org/fulldisclosure/2015/Sep/42 +CVE-2015-6934 - http://www.vmware.com/security/advisories/VMSA-2015-0009.html +CVE-2015-6937 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-6937 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-6939 - http://packetstormsecurity.com/files/133907/Joomla-CMS-3.4.3-Cross-Site-Scripting.html +CVE-2015-6940 - http://packetstormsecurity.com/files/133601/Pentaho-5.2.x-BA-Suite-PDI-Information-Disclosure.html +CVE-2015-6943 - http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html +CVE-2015-6943 - http://seclists.org/fulldisclosure/2015/Sep/10 +CVE-2015-6944 - http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-6945 - http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2015-6959 - https://www.youtube.com/watch?v=-WXWqNBEQQc +CVE-2015-6962 - http://packetstormsecurity.com/files/133610/Farol-SQL-Injection.html +CVE-2015-6962 - https://www.exploit-db.com/exploits/38213/ +CVE-2015-6965 - http://packetstormsecurity.com/files/133463/WordPress-Contact-Form-Generator-2.0.1-CSRF.html +CVE-2015-6965 - https://wpvulndb.com/vulnerabilities/8176 +CVE-2015-6965 - https://www.exploit-db.com/exploits/38086/ +CVE-2015-6966 - http://seclists.org/fulldisclosure/2015/Sep/4 +CVE-2015-6967 - http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html +CVE-2015-6967 - http://seclists.org/fulldisclosure/2015/Sep/5 +CVE-2015-6968 - http://packetstormsecurity.com/files/133426/Serendipity-2.0.1-Shell-Upload.html +CVE-2015-6968 - http://seclists.org/fulldisclosure/2015/Sep/6 +CVE-2015-6969 - http://packetstormsecurity.com/files/133427/Serendipity-2.0.1-Cross-Site-Scripting.html +CVE-2015-6969 - http://seclists.org/fulldisclosure/2015/Sep/9 +CVE-2015-6970 - https://www.exploit-db.com/exploits/38369/ +CVE-2015-6971 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-018/?fid=7172 +CVE-2015-6972 - http://packetstormsecurity.com/files/133558/Openfire-3.10.2-Cross-Site-Scripting.html +CVE-2015-6972 - https://www.exploit-db.com/exploits/38191/ +CVE-2015-6973 - http://packetstormsecurity.com/files/133554/Openfire-3.10.2-Cross-Site-Request-Forgery.html +CVE-2015-6973 - https://www.exploit-db.com/exploits/38192/ +CVE-2015-7007 - http://packetstormsecurity.com/files/134072/Safari-User-Assisted-Applescript-Exec-Attack.html +CVE-2015-7007 - https://www.exploit-db.com/exploits/38535/ +CVE-2015-7039 - https://www.exploit-db.com/exploits/38917/ +CVE-2015-7047 - https://www.exploit-db.com/exploits/39371/ +CVE-2015-7047 - https://www.exploit-db.com/exploits/39373/ +CVE-2015-7047 - https://www.exploit-db.com/exploits/39374/ +CVE-2015-7047 - https://www.exploit-db.com/exploits/39375/ +CVE-2015-7077 - https://www.exploit-db.com/exploits/39368/ +CVE-2015-7078 - https://www.exploit-db.com/exploits/39370/ +CVE-2015-7084 - https://www.exploit-db.com/exploits/39357/ +CVE-2015-7084 - https://www.exploit-db.com/exploits/39366/ +CVE-2015-7106 - https://www.exploit-db.com/exploits/39369/ +CVE-2015-7108 - https://www.exploit-db.com/exploits/39372/ +CVE-2015-7110 - https://www.exploit-db.com/exploits/39365/ +CVE-2015-7174 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7174 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7175 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7175 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7176 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7176 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7177 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7177 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7178 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7178 - https://bugzilla.mozilla.org/show_bug.cgi?id=1189860 +CVE-2015-7179 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7179 - https://bugzilla.mozilla.org/show_bug.cgi?id=1190526 +CVE-2015-7180 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7180 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7181 - http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html +CVE-2015-7181 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-7181 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-7181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-7181 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7181 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7181 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-7181 - http://www.securityfocus.com/bid/91787 +CVE-2015-7181 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7182 - http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html +CVE-2015-7182 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-7182 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-7182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-7182 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7182 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7182 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-7182 - http://www.securityfocus.com/bid/91787 +CVE-2015-7182 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7183 - http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html +CVE-2015-7183 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-7183 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-7183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7183 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-7183 - http://www.securityfocus.com/bid/91787 +CVE-2015-7183 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7184 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7184 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208339 +CVE-2015-7185 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7185 - https://bugzilla.mozilla.org/show_bug.cgi?id=1149000 +CVE-2015-7186 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7186 - https://bugzilla.mozilla.org/show_bug.cgi?id=1193027 +CVE-2015-7187 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7188 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7188 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7188 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7188 - https://bugzilla.mozilla.org/show_bug.cgi?id=1199430 +CVE-2015-7189 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7189 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7189 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7190 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7190 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208520 +CVE-2015-7191 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7192 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7193 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7193 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7193 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7194 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7194 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7194 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7194 - https://bugzilla.mozilla.org/show_bug.cgi?id=1211262 +CVE-2015-7195 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7196 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7196 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7197 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7197 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7197 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7198 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7198 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7198 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7199 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7199 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7199 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7200 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7200 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7200 - http://www.ubuntu.com/usn/USN-2819-1 +CVE-2015-7201 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7201 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7201 - https://bugzilla.mozilla.org/show_bug.cgi?id=1203135 +CVE-2015-7205 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7205 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1220493 +CVE-2015-7207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1185256 +CVE-2015-7207 - https://github.com/w3c/resource-timing/issues/29 +CVE-2015-7210 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7211 - https://bugzilla.mozilla.org/show_bug.cgi?id=1221444 +CVE-2015-7212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7212 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7213 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7213 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7213 - https://bugzilla.mozilla.org/show_bug.cgi?id=1206211 +CVE-2015-7214 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7214 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7214 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228950 +CVE-2015-7217 - https://bugzilla.mozilla.org/show_bug.cgi?id=1203078 +CVE-2015-7218 - https://bugzilla.mozilla.org/show_bug.cgi?id=1194818 +CVE-2015-7219 - https://bugzilla.mozilla.org/show_bug.cgi?id=1194820 +CVE-2015-7222 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7222 - https://bugzilla.mozilla.org/show_bug.cgi?id=1216748 +CVE-2015-7235 - https://wpvulndb.com/vulnerabilities/8193 +CVE-2015-7235 - https://www.exploit-db.com/exploits/38187/ +CVE-2015-7236 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-7236 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7239 - http://packetstormsecurity.com/files/134801/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html +CVE-2015-7239 - http://seclists.org/fulldisclosure/2015/Dec/66 +CVE-2015-7239 - https://erpscan.io/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/ +CVE-2015-7241 - http://packetstormsecurity.com/files/133627/SAP-Netweaver-XML-External-Entity-Injection.html +CVE-2015-7241 - https://www.exploit-db.com/exploits/38261/ +CVE-2015-7242 - http://ds-develop.de/advisories/advisory-2016-01-07-1-avm.txt +CVE-2015-7242 - http://packetstormsecurity.com/files/135168/AVM-FRITZ-OS-HTML-Injection.html +CVE-2015-7243 - http://packetstormsecurity.com/files/133377/Boxoft-WAV-To-MP3-Converter-Buffer-Overflow.html +CVE-2015-7243 - http://packetstormsecurity.com/files/137277/Boxoft-Wav-To-MP3-Converter-1.0-Buffer-Overflow.html +CVE-2015-7243 - https://www.exploit-db.com/exploits/38035/ +CVE-2015-7243 - https://www.exploit-db.com/exploits/44971/ +CVE-2015-7244 - http://www.kb.cert.org/vuls/id/316888 +CVE-2015-7245 - http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html +CVE-2015-7245 - https://www.exploit-db.com/exploits/39409/ +CVE-2015-7246 - http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html +CVE-2015-7246 - https://www.exploit-db.com/exploits/39409/ +CVE-2015-7247 - http://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html +CVE-2015-7247 - https://www.exploit-db.com/exploits/39409/ +CVE-2015-7248 - https://www.exploit-db.com/exploits/38773/ +CVE-2015-7249 - https://www.exploit-db.com/exploits/38773/ +CVE-2015-7250 - https://www.exploit-db.com/exploits/38773/ +CVE-2015-7251 - https://www.exploit-db.com/exploits/38773/ +CVE-2015-7252 - https://www.exploit-db.com/exploits/38773/ +CVE-2015-7253 - http://www.kb.cert.org/vuls/id/866432 +CVE-2015-7254 - https://github.com/0xAdrian/scripts/blob/master/2015_7254_exploit.py +CVE-2015-7254 - https://www.exploit-db.com/exploits/45991/ +CVE-2015-7257 - http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html +CVE-2015-7257 - http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html +CVE-2015-7257 - https://www.exploit-db.com/exploits/38772/ +CVE-2015-7258 - http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html +CVE-2015-7258 - http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html +CVE-2015-7258 - https://www.exploit-db.com/exploits/38772/ +CVE-2015-7259 - http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html +CVE-2015-7259 - http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html +CVE-2015-7259 - https://www.exploit-db.com/exploits/38772/ +CVE-2015-7270 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 +CVE-2015-7271 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 +CVE-2015-7272 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 +CVE-2015-7273 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 +CVE-2015-7274 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 +CVE-2015-7274 - http://www.securityfocus.com/bid/97545 +CVE-2015-7274 - http://www.securityfocus.com/bid/97546 +CVE-2015-7275 - http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 +CVE-2015-7285 - http://www.kb.cert.org/vuls/id/428280 +CVE-2015-7285 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL +CVE-2015-7286 - http://www.kb.cert.org/vuls/id/428280 +CVE-2015-7286 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL +CVE-2015-7287 - http://www.kb.cert.org/vuls/id/428280 +CVE-2015-7287 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL +CVE-2015-7288 - http://www.kb.cert.org/vuls/id/428280 +CVE-2015-7288 - http://www.kb.cert.org/vuls/id/BLUU-A3NQAL +CVE-2015-7289 - http://www.kb.cert.org/vuls/id/419568 +CVE-2015-7290 - http://www.kb.cert.org/vuls/id/419568 +CVE-2015-7291 - http://www.kb.cert.org/vuls/id/419568 +CVE-2015-7292 - https://marcograss.github.io/security/android/cve/2016/01/15/cve-2015-7292-amazon-kernel-stack-buffer-overflow.html +CVE-2015-7293 - http://packetstormsecurity.com/files/133889/Zope-Management-Interface-4.3.7-Cross-Site-Request-Forgery.html +CVE-2015-7293 - https://www.exploit-db.com/exploits/38411/ +CVE-2015-7296 - http://www.kb.cert.org/vuls/id/906576 +CVE-2015-7297 - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html +CVE-2015-7297 - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html +CVE-2015-7297 - https://www.exploit-db.com/exploits/38797/ +CVE-2015-7297 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ +CVE-2015-7299 - http://packetstormsecurity.com/files/133953/K2-SmartForms-BlackPearl-SQL-Injection.html +CVE-2015-7309 - http://packetstormsecurity.com/files/133539/CMS-Bolt-2.2.4-File-Upload.html +CVE-2015-7309 - http://seclists.org/fulldisclosure/2015/Aug/66 +CVE-2015-7309 - https://www.exploit-db.com/exploits/38196/ +CVE-2015-7319 - http://packetstormsecurity.com/files/133757/WordPress-Appointment-Booking-Calendar-1.1.7-SQL-Injection.html +CVE-2015-7319 - https://wpvulndb.com/vulnerabilities/8199 +CVE-2015-7320 - http://packetstormsecurity.com/files/133743/WordPress-Appointment-Booking-Calendar-1.1.7-XSS.html +CVE-2015-7320 - https://wpvulndb.com/vulnerabilities/8199 +CVE-2015-7322 - https://profundis-labs.com/advisories/CVE-2015-7322.txt +CVE-2015-7323 - http://seclists.org/fulldisclosure/2015/Sep/98 +CVE-2015-7323 - https://packetstormsecurity.com/files/133711/Junos-Pulse-Secure-Meeting-8.0.5-Access-Bypass.html +CVE-2015-7323 - https://profundis-labs.com/advisories/CVE-2015-7323.txt +CVE-2015-7324 - http://seclists.org/fulldisclosure/2015/Oct/11 +CVE-2015-7324 - https://www.davidsopas.com/komento-joomla-component-persistent-xss/ +CVE-2015-7326 - http://packetstormsecurity.com/files/134178/Milton-Webdav-2.7.0.1-XXE-Injection.html +CVE-2015-7327 - https://bugzilla.mozilla.org/show_bug.cgi?id=1153672 +CVE-2015-7327 - https://bugzilla.mozilla.org/show_bug.cgi?id=1167489 +CVE-2015-7346 - http://packetstormsecurity.com/files/132286/ZCMS-1.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-7346 - https://www.exploit-db.com/exploits/37272/ +CVE-2015-7347 - http://packetstormsecurity.com/files/132286/ZCMS-1.1-Cross-Site-Scripting-SQL-Injection.html +CVE-2015-7347 - https://www.exploit-db.com/exploits/37272/ +CVE-2015-7348 - http://packetstormsecurity.com/files/134391/zTree-3.5.19.1-Cross-Site-Scripting.html +CVE-2015-7348 - http://seclists.org/fulldisclosure/2015/Nov/80 +CVE-2015-7357 - http://packetstormsecurity.com/files/133867/WordPress-U-Design-Theme-2.7.9-Cross-Site-Scripting.html +CVE-2015-7357 - https://wpvulndb.com/vulnerabilities/8177 +CVE-2015-7358 - http://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.html +CVE-2015-7358 - https://www.exploit-db.com/exploits/38403/ +CVE-2015-7359 - http://packetstormsecurity.com/files/133877/Truecrypt-7-Privilege-Escalation.html +CVE-2015-7360 - http://packetstormsecurity.com/files/132930/FortiSandbox-3000D-2.02-build0042-Cross-Site-Scripting.html +CVE-2015-7361 - http://fortiguard.com/advisory/zebos-routing-remote-shell-service-enabled +CVE-2015-7362 - http://fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privilege-escalation-vulnerability +CVE-2015-7364 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7364 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7365 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7365 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7366 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7366 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7367 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7367 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7368 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7368 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7369 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7369 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7370 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7370 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7371 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7371 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7372 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7372 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7373 - http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html +CVE-2015-7373 - http://www.revive-adserver.com/security/revive-sa-2015-001 +CVE-2015-7377 - http://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html +CVE-2015-7377 - https://wpvulndb.com/vulnerabilities/8212 +CVE-2015-7378 - http://packetstormsecurity.com/files/136607/Panda-Security-URL-Filtering-Privilege-Escalation.html +CVE-2015-7378 - https://www.exploit-db.com/exploits/39670/ +CVE-2015-7381 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-7382 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-7383 - http://www.kb.cert.org/vuls/id/374092 +CVE-2015-7384 - https://bugzilla.redhat.com/show_bug.cgi?id=1268791 +CVE-2015-7385 - http://packetstormsecurity.com/files/134415/Open-Xchange-Guard-2.0-Cross-Site-Scripting.html +CVE-2015-7386 - http://packetstormsecurity.com/files/133494/WordPress-Easy-Media-Gallery-1.3.47-Cross-Site-Scripting.html +CVE-2015-7386 - https://wpvulndb.com/vulnerabilities/8181 +CVE-2015-7387 - http://packetstormsecurity.com/files/133581/ManageEngine-EventLog-Analyzer-10.6-Build-10060-SQL-Query-Execution.html +CVE-2015-7387 - http://packetstormsecurity.com/files/133747/ManageEngine-EventLog-Analyzer-Remote-Code-Execution.html +CVE-2015-7387 - http://seclists.org/fulldisclosure/2015/Sep/59 +CVE-2015-7387 - https://www.exploit-db.com/exploits/38173/ +CVE-2015-7387 - https://www.exploit-db.com/exploits/38352/ +CVE-2015-7392 - http://packetstormsecurity.com/files/133781/freeswitch-Heap-Overflow.html +CVE-2015-7450 - https://www.exploit-db.com/exploits/41613/ +CVE-2015-7474 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 +CVE-2015-7484 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 +CVE-2015-7485 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 +CVE-2015-7486 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 +CVE-2015-7497 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7498 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7499 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7500 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-7500 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7501 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-7501 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-7501 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-7501 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2015-7505 - http://seclists.org/fulldisclosure/2015/Dec/70 +CVE-2015-7506 - http://seclists.org/fulldisclosure/2015/Dec/70 +CVE-2015-7507 - http://seclists.org/fulldisclosure/2015/Dec/73 +CVE-2015-7508 - http://seclists.org/fulldisclosure/2015/Dec/73 +CVE-2015-7510 - https://github.com/systemd/systemd/issues/2002 +CVE-2015-7511 - http://www.securityfocus.com/bid/83253 +CVE-2015-7512 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7513 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-7513 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-7515 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2015-7515 - https://www.exploit-db.com/exploits/39544/ +CVE-2015-7517 - https://wpvulndb.com/vulnerabilities/8345 +CVE-2015-7521 - http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html +CVE-2015-7527 - http://packetstormsecurity.com/files/134626/WordPress-Cool-Video-Gallery-1.9-Command-Injection.html +CVE-2015-7527 - https://wpvulndb.com/vulnerabilities/8348 +CVE-2015-7540 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7545 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7545 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7545 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7546 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7547 - http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow +CVE-2015-7547 - http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html +CVE-2015-7547 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2015-7547 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html +CVE-2015-7547 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html +CVE-2015-7547 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2015-7547 - http://seclists.org/fulldisclosure/2021/Sep/0 +CVE-2015-7547 - http://seclists.org/fulldisclosure/2022/Jun/36 +CVE-2015-7547 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-7547 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-7547 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7547 - http://www.securityfocus.com/bid/83265 +CVE-2015-7547 - https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html +CVE-2015-7547 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-7547 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2015-7547 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2015-7547 - https://security.netapp.com/advisory/ntap-20160217-0002/ +CVE-2015-7547 - https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 +CVE-2015-7547 - https://www.exploit-db.com/exploits/39454/ +CVE-2015-7547 - https://www.exploit-db.com/exploits/40339/ +CVE-2015-7547 - https://www.kb.cert.org/vuls/id/457759 +CVE-2015-7547 - https://www.tenable.com/security/research/tra-2017-08 +CVE-2015-7550 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-7551 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7554 - http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html +CVE-2015-7554 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-7554 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-7555 - http://packetstormsecurity.com/files/135034/giflib-5.1.1-Heap-Overflow.html +CVE-2015-7555 - http://seclists.org/fulldisclosure/2015/Dec/83 +CVE-2015-7562 - https://www.exploit-db.com/exploits/39559/ +CVE-2015-7563 - https://www.exploit-db.com/exploits/39559/ +CVE-2015-7564 - https://www.exploit-db.com/exploits/39559/ +CVE-2015-7566 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2015-7566 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2015-7566 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2015-7566 - https://bugzilla.redhat.com/show_bug.cgi?id=1283371 +CVE-2015-7566 - https://www.exploit-db.com/exploits/39540/ +CVE-2015-7567 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html +CVE-2015-7567 - http://seclists.org/fulldisclosure/2016/Feb/44 +CVE-2015-7567 - https://www.exploit-db.com/exploits/39436/ +CVE-2015-7568 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html +CVE-2015-7568 - http://seclists.org/fulldisclosure/2016/Feb/44 +CVE-2015-7568 - https://www.exploit-db.com/exploits/39436/ +CVE-2015-7569 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html +CVE-2015-7569 - http://seclists.org/fulldisclosure/2016/Feb/44 +CVE-2015-7569 - https://www.exploit-db.com/exploits/39436/ +CVE-2015-7570 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html +CVE-2015-7570 - http://seclists.org/fulldisclosure/2016/Feb/44 +CVE-2015-7570 - https://www.exploit-db.com/exploits/39436/ +CVE-2015-7571 - http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html +CVE-2015-7571 - http://seclists.org/fulldisclosure/2016/Feb/44 +CVE-2015-7571 - https://www.exploit-db.com/exploits/39436/ +CVE-2015-7575 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2015-7575 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-7575 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-7575 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-7575 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7575 - http://www.securityfocus.com/bid/91787 +CVE-2015-7596 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7597 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7598 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7599 - https://security.netapp.com/advisory/ntap-20151029-0001/ +CVE-2015-7601 - http://packetstormsecurity.com/files/133756/PCMan-FTP-Server-2.0.7-Directory-Traversal.html +CVE-2015-7601 - https://www.exploit-db.com/exploits/38340/ +CVE-2015-7602 - http://packetstormsecurity.com/files/133749/BisonWare-BisonFTP-3.5-Directory-Traversal.html +CVE-2015-7602 - https://www.exploit-db.com/exploits/38341/ +CVE-2015-7603 - https://www.exploit-db.com/exploits/38260/ +CVE-2015-7609 - https://bugzilla.zimbra.com/show_bug.cgi?id=101435 +CVE-2015-7611 - http://packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.html +CVE-2015-7611 - http://packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.html +CVE-2015-7613 - http://www.openwall.com/lists/oss-security/2015/10/01/8 +CVE-2015-7613 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7613 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7622 - https://www.exploit-db.com/exploits/38787/ +CVE-2015-7645 - http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/ +CVE-2015-7645 - http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html +CVE-2015-7645 - https://www.exploit-db.com/exploits/38490/ +CVE-2015-7647 - https://www.exploit-db.com/exploits/38969/ +CVE-2015-7648 - https://www.exploit-db.com/exploits/38970/ +CVE-2015-7652 - https://www.exploit-db.com/exploits/39020/ +CVE-2015-7666 - https://wpvulndb.com/vulnerabilities/8210 +CVE-2015-7667 - https://wpvulndb.com/vulnerabilities/8204 +CVE-2015-7668 - https://wpvulndb.com/vulnerabilities/8205 +CVE-2015-7669 - https://wpvulndb.com/vulnerabilities/8206 +CVE-2015-7670 - https://wpvulndb.com/vulnerabilities/8207 +CVE-2015-7672 - https://www.youtube.com/watch?v=sIONzwQAngU +CVE-2015-7674 - http://www.openwall.com/lists/oss-security/2015/10/05/7 +CVE-2015-7675 - http://packetstormsecurity.com/files/135457/Ipswitch-MOVEit-DMZ-8.1-Authorization-Bypass.html +CVE-2015-7675 - https://www.profundis-labs.com/advisories/CVE-2015-7675.txt +CVE-2015-7676 - http://packetstormsecurity.com/files/135458/Ipswitch-MOVEit-DMZ-8.1-Persistent-Cross-Site-Scripting.html +CVE-2015-7676 - https://profundis-labs.com/advisories/CVE-2015-7676.txt +CVE-2015-7677 - http://packetstormsecurity.com/files/135459/Ipswitch-MOVEit-DMZ-8.1-File-ID-Enumeration.html +CVE-2015-7677 - https://www.profundis-labs.com/advisories/CVE-2015-7677.txt +CVE-2015-7678 - http://packetstormsecurity.com/files/135460/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Request-Forgery.html +CVE-2015-7679 - http://packetstormsecurity.com/files/135461/Ipswitch-MOVEit-Mobile-1.2.0.962-Cross-Site-Scripting.html +CVE-2015-7679 - https://profundis-labs.com/advisories/CVE-2015-7679.txt +CVE-2015-7680 - http://packetstormsecurity.com/files/135462/Ipswitch-MOVEit-DMZ-8.1-Information-Disclosure.html +CVE-2015-7680 - https://profundis-labs.com/advisories/CVE-2015-7680.txt +CVE-2015-7682 - http://packetstormsecurity.com/files/133929/WordPress-Pie-Register-2.0.18-SQL-Injection.html +CVE-2015-7682 - https://wpvulndb.com/vulnerabilities/8213 +CVE-2015-7683 - http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.html +CVE-2015-7683 - https://wpvulndb.com/vulnerabilities/8214 +CVE-2015-7691 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7692 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7701 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7702 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7703 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7704 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7704 - https://eprint.iacr.org/2015/1020.pdf +CVE-2015-7704 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2015-7704 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7705 - http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html +CVE-2015-7705 - https://eprint.iacr.org/2015/1020.pdf +CVE-2015-7705 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7706 - http://packetstormsecurity.com/files/134760/Secure-Data-Space-3.1.1-2-Cross-Site-Scripting.html +CVE-2015-7706 - http://seclists.org/fulldisclosure/2015/Dec/36 +CVE-2015-7707 - http://packetstormsecurity.com/files/133559/Openfire-3.10.2-Privilege-Escalation.html +CVE-2015-7707 - https://igniterealtime.org/issues/browse/OF-941 +CVE-2015-7707 - https://www.exploit-db.com/exploits/38190/ +CVE-2015-7708 - http://packetstormsecurity.com/files/133712/4images-1.7.11-Cross-Site-Scripting.html +CVE-2015-7708 - http://seclists.org/fulldisclosure/2015/Sep/95 +CVE-2015-7709 - https://packetstormsecurity.com/files/132660/Western-Digital-Arkeia-11.0.13-Remote-Code-Execution.html +CVE-2015-7709 - https://www.exploit-db.com/exploits/37600/ +CVE-2015-7711 - http://packetstormsecurity.com/files/134217/ATutor-2.2-Cross-Site-Scripting.html +CVE-2015-7712 - http://packetstormsecurity.com/files/134218/ATutor-2.2-PHP-Code-Injection.html +CVE-2015-7713 - http://www.securityfocus.com/bid/76960 +CVE-2015-7714 - http://packetstormsecurity.com/files/134066/Realtyna-RPL-8.9.2-SQL-Injection.html +CVE-2015-7714 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5272.php +CVE-2015-7714 - https://www.exploit-db.com/exploits/38527/ +CVE-2015-7715 - http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html +CVE-2015-7715 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php +CVE-2015-7715 - https://www.exploit-db.com/exploits/38528/ +CVE-2015-7723 - http://packetstormsecurity.com/files/134121/AMD-fglrx-driver-14.4.2-Privilege-Escalation.html +CVE-2015-7723 - http://seclists.org/fulldisclosure/2015/Oct/104 +CVE-2015-7724 - http://packetstormsecurity.com/files/134120/AMD-fglrx-driver-15.7-Privilege-Escalation.html +CVE-2015-7724 - http://seclists.org/fulldisclosure/2015/Oct/103 +CVE-2015-7725 - http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html +CVE-2015-7725 - http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html +CVE-2015-7725 - http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html +CVE-2015-7725 - http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html +CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/110 +CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/111 +CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/113 +CVE-2015-7725 - http://seclists.org/fulldisclosure/2015/Sep/118 +CVE-2015-7726 - http://seclists.org/fulldisclosure/2015/Sep/114 +CVE-2015-7727 - http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html +CVE-2015-7727 - http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html +CVE-2015-7727 - http://seclists.org/fulldisclosure/2015/Sep/115 +CVE-2015-7727 - http://seclists.org/fulldisclosure/2015/Sep/117 +CVE-2015-7728 - http://seclists.org/fulldisclosure/2015/Sep/116 +CVE-2015-7729 - http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html +CVE-2015-7729 - http://seclists.org/fulldisclosure/2015/Sep/112 +CVE-2015-7743 - https://packetstormsecurity.com/files/137255/Paessler-PRTG-Network-Monitor-14.4.12.3282-XXE-Injection.html +CVE-2015-7744 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7744 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-7755 - https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554 +CVE-2015-7756 - https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554 +CVE-2015-7765 - http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html +CVE-2015-7765 - http://seclists.org/fulldisclosure/2015/Sep/66 +CVE-2015-7765 - https://www.exploit-db.com/exploits/38221/ +CVE-2015-7766 - http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html +CVE-2015-7766 - http://seclists.org/fulldisclosure/2015/Sep/66 +CVE-2015-7766 - https://www.exploit-db.com/exploits/38221/ +CVE-2015-7767 - https://www.exploit-db.com/exploits/37908/ +CVE-2015-7767 - https://www.exploit-db.com/exploits/38252/ +CVE-2015-7768 - http://packetstormsecurity.com/files/133621/Konica-Minolta-FTP-Utility-1.00-Post-Auth-CWD-Command-SEH-Overflow.html +CVE-2015-7768 - http://packetstormsecurity.com/files/137252/Konica-Minolta-FTP-Utility-1.0-SEH-Buffer-Overflow.html +CVE-2015-7768 - https://www.exploit-db.com/exploits/38254/ +CVE-2015-7768 - https://www.exploit-db.com/exploits/39215/ +CVE-2015-7791 - https://wpvulndb.com/vulnerabilities/8356 +CVE-2015-7799 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-7803 - https://bugs.php.net/bug.php?id=69720 +CVE-2015-7803 - https://hackerone.com/reports/103990 +CVE-2015-7804 - https://hackerone.com/reports/104008 +CVE-2015-7805 - http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html +CVE-2015-7805 - http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/ +CVE-2015-7805 - https://www.exploit-db.com/exploits/38447/ +CVE-2015-7806 - https://wpvulndb.com/vulnerabilities/8220 +CVE-2015-7808 - http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ +CVE-2015-7808 - http://packetstormsecurity.com/files/134331/vBulletin-5.1.2-Unserialize-Code-Execution.html +CVE-2015-7808 - https://www.exploit-db.com/exploits/38629/ +CVE-2015-7815 - http://packetstormsecurity.com/files/134219/Piwik-2.14.3-Local-File-Inclusion.html +CVE-2015-7816 - http://packetstormsecurity.com/files/134220/Piwik-2.14.3-PHP-Object-Injection.html +CVE-2015-7822 - http://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html +CVE-2015-7823 - http://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html +CVE-2015-7828 - http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html +CVE-2015-7830 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-7833 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2015-7833 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2015-7848 - http://www.talosintelligence.com/reports/TALOS-2015-0052/ +CVE-2015-7852 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7853 - http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html +CVE-2015-7853 - http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html +CVE-2015-7855 - https://www.exploit-db.com/exploits/40840/ +CVE-2015-7857 - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html +CVE-2015-7857 - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html +CVE-2015-7857 - https://www.exploit-db.com/exploits/38797/ +CVE-2015-7857 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ +CVE-2015-7858 - http://packetstormsecurity.com/files/134097/Joomla-3.44-SQL-Injection.html +CVE-2015-7858 - http://packetstormsecurity.com/files/134494/Joomla-Content-History-SQL-Injection-Remote-Code-Execution.html +CVE-2015-7858 - https://www.exploit-db.com/exploits/38797/ +CVE-2015-7858 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ +CVE-2015-7860 - http://www.kb.cert.org/vuls/id/966927 +CVE-2015-7861 - http://www.kb.cert.org/vuls/id/966927 +CVE-2015-7862 - https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features +CVE-2015-7863 - https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features +CVE-2015-7865 - http://packetstormsecurity.com/files/134520/NVIDIA-Stereoscopic-3D-Driver-Service-Arbitrary-Run-Key-Creation.html +CVE-2015-7865 - https://www.exploit-db.com/exploits/38792/ +CVE-2015-7872 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-7872 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7874 - https://www.exploit-db.com/exploits/39119/ +CVE-2015-7880 - https://www.drupal.org/node/2582015 +CVE-2015-7888 - http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html +CVE-2015-7889 - http://packetstormsecurity.com/files/134105/Samsung-SecEmailComposer-QUICK_REPLY_BACKGROUND-Permission-Weakness.html +CVE-2015-7889 - https://www.exploit-db.com/exploits/38558/ +CVE-2015-7890 - http://packetstormsecurity.com/files/134106/Samsung-Seiren-Kernel-Driver-Buffer-Overflow.html +CVE-2015-7890 - https://www.exploit-db.com/exploits/38556/ +CVE-2015-7891 - http://packetstormsecurity.com/files/134107/Samsung-Fimg2d-FIMG2D_BITBLT_BLIT-Ioctl-Concurrency-Flaw.html +CVE-2015-7891 - https://www.exploit-db.com/exploits/38557/ +CVE-2015-7892 - http://packetstormsecurity.com/files/134108/Samsung-M2m1shot-Kernel-Driver-Buffer-Overflow.html +CVE-2015-7892 - https://www.exploit-db.com/exploits/38555/ +CVE-2015-7893 - http://packetstormsecurity.com/files/135643/Samsung-SecEmailUI-Script-Injection.html +CVE-2015-7893 - https://www.exploit-db.com/exploits/38554/ +CVE-2015-7894 - http://packetstormsecurity.com/files/134197/Samsung-LibQjpeg-Image-Decoding-Memory-Corruption.html +CVE-2015-7894 - https://www.exploit-db.com/exploits/38614/ +CVE-2015-7895 - http://packetstormsecurity.com/files/134950/Samsung-Galaxy-S6-Samsung-Gallery-Bitmap-Decoding-Crash.html +CVE-2015-7895 - https://www.exploit-db.com/exploits/38613/ +CVE-2015-7896 - http://packetstormsecurity.com/files/134198/Samsung-Galaxy-S6-LibQjpeg-DoIntegralUpsample-Crash.html +CVE-2015-7896 - https://www.exploit-db.com/exploits/38612/ +CVE-2015-7897 - http://packetstormsecurity.com/files/134199/Samsung-Galaxy-S6-Android.media.process-Face-Recognition-Memory-Corruption.html +CVE-2015-7897 - https://www.exploit-db.com/exploits/38611/ +CVE-2015-7898 - http://packetstormsecurity.com/files/134951/Samsung-Galaxy-S6-Samsung-Gallery-GIF-Parsing-Crash.html +CVE-2015-7898 - https://www.exploit-db.com/exploits/38610/ +CVE-2015-7901 - https://www.exploit-db.com/exploits/42698/ +CVE-2015-7924 - http://seclists.org/fulldisclosure/2015/Dec/118 +CVE-2015-7925 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html +CVE-2015-7925 - http://seclists.org/fulldisclosure/2015/Dec/118 +CVE-2015-7926 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html +CVE-2015-7926 - http://seclists.org/fulldisclosure/2015/Dec/118 +CVE-2015-7927 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html +CVE-2015-7927 - http://seclists.org/fulldisclosure/2015/Dec/118 +CVE-2015-7928 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html +CVE-2015-7928 - http://seclists.org/fulldisclosure/2015/Dec/118 +CVE-2015-7929 - http://packetstormsecurity.com/files/135069/eWON-XSS-CSRF-Session-Management-RBAC-Issues.html +CVE-2015-7929 - http://seclists.org/fulldisclosure/2015/Dec/118 +CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2015-7940 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2015-7940 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2015-7940 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2015-7941 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-7941 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7942 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-7942 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7944 - http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html +CVE-2015-7944 - https://www.exploit-db.com/exploits/39169/ +CVE-2015-7945 - http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html +CVE-2015-7945 - https://www.exploit-db.com/exploits/39169/ +CVE-2015-7961 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7962 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7963 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7964 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7965 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7966 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7967 - https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/ +CVE-2015-7973 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7975 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7976 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7977 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7977 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7978 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7978 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7979 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-7979 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-7981 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-7981 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-7984 - https://www.exploit-db.com/exploits/38765/ +CVE-2015-7985 - http://packetstormsecurity.com/files/134513/Steam-2.10.91.91-Weak-File-Permissions-Privilege-Escalation.html +CVE-2015-7986 - http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html +CVE-2015-7986 - http://seclists.org/fulldisclosure/2016/Jan/94 +CVE-2015-7986 - https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/ +CVE-2015-7986 - https://www.exploit-db.com/exploits/39382/ +CVE-2015-7987 - http://www.kb.cert.org/vuls/id/143335 +CVE-2015-7987 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-7988 - http://www.kb.cert.org/vuls/id/143335 +CVE-2015-7988 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-7989 - https://wpvulndb.com/vulnerabilities/8187 +CVE-2015-7990 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-7990 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-7990 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-7991 - http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html +CVE-2015-7992 - http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html +CVE-2015-7993 - http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html +CVE-2015-7994 - http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html +CVE-2015-7995 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-7995 - https://bugzilla.redhat.com/show_bug.cgi?id=1257962 +CVE-2015-8000 - http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html +CVE-2015-8000 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2015-8000 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8000 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8025 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-8036 - https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/ +CVE-2015-8041 - https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog +CVE-2015-8044 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8044 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8046 - https://www.exploit-db.com/exploits/39019/ +CVE-2015-8048 - https://www.exploit-db.com/exploits/39649/ +CVE-2015-8051 - http://seclists.org/fulldisclosure/2015/Nov/81 +CVE-2015-8051 - http://www.vulnerability-lab.com/get_content.php?id=1478 +CVE-2015-8080 - http://www.openwall.com/lists/oss-security/2015/11/06/4 +CVE-2015-8080 - https://github.com/antirez/redis/issues/2855 +CVE-2015-8090 - http://www.tibco.com/mk/advisory.jsp +CVE-2015-8096 - http://packetstormsecurity.com/files/134084/Google-Picasa-Phase-One-Tags-Processing-Integer-Overflow.html +CVE-2015-8100 - http://packetstormsecurity.com/files/134323/OpenBSD-net-snmp-Information-Disclosure.html +CVE-2015-8103 - http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jenkins +CVE-2015-8103 - http://packetstormsecurity.com/files/134805/Jenkins-CLI-RMI-Java-Deserialization.html +CVE-2015-8103 - https://www.exploit-db.com/exploits/38983/ +CVE-2015-8104 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8104 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8104 - http://www.securityfocus.com/bid/91787 +CVE-2015-8124 - http://seclists.org/fulldisclosure/2015/Dec/89 +CVE-2015-8126 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-8126 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-8126 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8131 - https://www.elastic.co/community/security/ +CVE-2015-8138 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8138 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-8139 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-8140 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-8148 - http://www.securityfocus.com/bid/83271 +CVE-2015-8149 - http://www.securityfocus.com/bid/83270 +CVE-2015-8150 - http://www.securityfocus.com/bid/83269 +CVE-2015-8151 - http://www.securityfocus.com/bid/83268 +CVE-2015-8157 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00 +CVE-2015-8158 - https://www.kb.cert.org/vuls/id/718152 +CVE-2015-8215 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8221 - http://packetstormsecurity.com/files/134315/Google-Picasa-CAMF-Section-Integer-Overflow.html +CVE-2015-8241 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8241 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8242 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8242 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8247 - http://packetstormsecurity.com/files/134797/Synnefo-Client-Cross-Site-Scripting.html +CVE-2015-8249 - http://packetstormsecurity.com/files/134806/ManageEngine-Desktop-Central-9-FileUploadServlet-ConnectionId.html +CVE-2015-8249 - https://community.rapid7.com/community/infosec/blog/2015/12/14/r7-2015-22-manageengine-desktop-central-9-fileuploadservlet-connectionid-vulnerability-cve-2015-8249 +CVE-2015-8249 - https://www.exploit-db.com/exploits/38982/ +CVE-2015-8252 - https://www.kb.cert.org/vuls/id/792004 +CVE-2015-8253 - https://www.kb.cert.org/vuls/id/792004 +CVE-2015-8254 - https://www.kb.cert.org/vuls/id/792004 +CVE-2015-8255 - https://www.exploit-db.com/exploits/41626/ +CVE-2015-8256 - http://packetstormsecurity.com/files/141674/AXIS-Network-Camera-Cross-Site-Scripting.html +CVE-2015-8256 - https://www.exploit-db.com/exploits/39683/ +CVE-2015-8257 - http://packetstormsecurity.com/files/138083/AXIS-Authenticated-Remote-Command-Execution.html +CVE-2015-8257 - https://www.exploit-db.com/exploits/40171/ +CVE-2015-8258 - https://www.exploit-db.com/exploits/41625/ +CVE-2015-8261 - https://www.exploit-db.com/exploits/39231/ +CVE-2015-8261 - https://www.kb.cert.org/vuls/id/753264 +CVE-2015-8262 - https://www.kb.cert.org/vuls/id/646008 +CVE-2015-8263 - https://www.kb.cert.org/vuls/id/403568 +CVE-2015-8264 - http://seclists.org/fulldisclosure/2016/Mar/64 +CVE-2015-8265 - https://www.kb.cert.org/vuls/id/972224 +CVE-2015-8267 - https://www.kb.cert.org/vuls/id/757840 +CVE-2015-8268 - http://www.kb.cert.org/vuls/id/204232 +CVE-2015-8269 - https://www.kb.cert.org/vuls/id/719736 +CVE-2015-8269 - https://www.kb.cert.org/vuls/id/GWAN-A6LPPW +CVE-2015-8270 - http://www.talosintelligence.com/reports/TALOS-2016-0066/ +CVE-2015-8271 - http://www.talosintelligence.com/reports/TALOS-2016-0067/ +CVE-2015-8272 - http://www.talosintelligence.com/reports/TALOS-2016-0068/ +CVE-2015-8277 - http://www.kb.cert.org/vuls/id/485744 +CVE-2015-8277 - https://www.securifera.com/advisories/cve-2015-8277 +CVE-2015-8279 - https://www.kb.cert.org/vuls/id/913000 +CVE-2015-8280 - https://www.kb.cert.org/vuls/id/913000 +CVE-2015-8281 - https://www.kb.cert.org/vuls/id/913000 +CVE-2015-8282 - http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html +CVE-2015-8282 - http://seclists.org/fulldisclosure/2016/Jan/58 +CVE-2015-8282 - https://www.exploit-db.com/exploits/39266/ +CVE-2015-8283 - http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html +CVE-2015-8283 - http://seclists.org/fulldisclosure/2016/Jan/58 +CVE-2015-8283 - https://www.exploit-db.com/exploits/39266/ +CVE-2015-8284 - http://packetstormsecurity.com/files/135311/SeaWell-Networks-Spectrum-SDC-02.05.00-Traversal-Privilege-Escalation.html +CVE-2015-8284 - http://seclists.org/fulldisclosure/2016/Jan/58 +CVE-2015-8284 - https://www.exploit-db.com/exploits/39266/ +CVE-2015-8285 - https://www.exploit-db.com/exploits/39475/ +CVE-2015-8286 - http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html +CVE-2015-8286 - http://seclists.org/bugtraq/2015/Jun/117 +CVE-2015-8286 - http://www.kb.cert.org/vuls/id/899080 +CVE-2015-8288 - http://www.kb.cert.org/vuls/id/778696 +CVE-2015-8289 - http://kb.netgear.com/app/answers/detail/a_id/30490 +CVE-2015-8289 - http://www.kb.cert.org/vuls/id/778696 +CVE-2015-8298 - http://packetstormsecurity.com/files/134525/RXTEC-RXAdmin-SQL-Injection.html +CVE-2015-8298 - http://seclists.org/fulldisclosure/2015/Nov/90 +CVE-2015-8298 - https://github.com/sbaresearch/advisories/tree/public/2015/RXTEC_20150513 +CVE-2015-8299 - http://packetstormsecurity.com/files/134524/KNX-ETS-4.1.5-Build-3246-Buffer-Overflow.html +CVE-2015-8299 - https://github.com/sbaresearch/advisories/tree/public/2015/knAx_20150101 +CVE-2015-8300 - http://packetstormsecurity.com/files/134523/Polycom-BTOE-Connector-2.3.0-Local-Privilege-Escalation.html +CVE-2015-8300 - http://seclists.org/fulldisclosure/2015/Nov/88 +CVE-2015-8300 - https://github.com/sbaresearch/advisories/tree/public/2015/Polycom_20150513 +CVE-2015-8309 - https://www.exploit-db.com/exploits/40361/ +CVE-2015-8317 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8317 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8320 - http://packetstormsecurity.com/files/134496/Apache-Cordova-Android-3.6.4-BridgeSecret-Weak-Randomization.html +CVE-2015-8324 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8327 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8329 - http://packetstormsecurity.com/files/135761/SAP-MII-12.2-14.0-15.0-Cryptography-Issues.html +CVE-2015-8330 - http://packetstormsecurity.com/files/135775/SAP-PCo-2.2-2.3-15.0-15.1-Denial-Of-Service.html +CVE-2015-8330 - https://erpscan.io/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/ +CVE-2015-8350 - http://packetstormsecurity.com/files/134598/WordPress-Calls-To-Action-2.4.3-Cross-Site-Scripting.html +CVE-2015-8351 - http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html +CVE-2015-8351 - https://www.exploit-db.com/exploits/38861/ +CVE-2015-8352 - https://www.exploit-db.com/exploits/39017/ +CVE-2015-8353 - http://packetstormsecurity.com/files/134600/WordPress-Role-Scoper-1.3.66-Cross-Site-Scripting.html +CVE-2015-8353 - https://wpvulndb.com/vulnerabilities/8347 +CVE-2015-8354 - http://packetstormsecurity.com/files/134601/WordPress-Ultimate-Member-1.3.28-Cross-Site-Scripting.html +CVE-2015-8354 - https://wpvulndb.com/vulnerabilities/8346 +CVE-2015-8356 - http://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html +CVE-2015-8356 - https://www.exploit-db.com/exploits/39246/ +CVE-2015-8357 - http://packetstormsecurity.com/files/134765/bitrix.scan-Bitrix-1.0.3-Path-Traversal.html +CVE-2015-8357 - https://www.exploit-db.com/exploits/38976/ +CVE-2015-8358 - http://packetstormsecurity.com/files/134766/bitrix.mpbuilder-Bitrix-1.0.10-Local-File-Inclusion.html +CVE-2015-8358 - https://www.exploit-db.com/exploits/38975/ +CVE-2015-8360 - http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html +CVE-2015-8361 - http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html +CVE-2015-8362 - http://seclists.org/fulldisclosure/2016/Jan/63 +CVE-2015-8362 - https://www.kb.cert.org/vuls/id/992624 +CVE-2015-8364 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-8365 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2015-8366 - http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html +CVE-2015-8367 - http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html +CVE-2015-8368 - http://packetstormsecurity.com/files/134593/ntop-ng-2.0.15102-Privilege-Escalation.html +CVE-2015-8368 - http://seclists.org/fulldisclosure/2015/Dec/10 +CVE-2015-8368 - https://www.exploit-db.com/exploits/38836/ +CVE-2015-8369 - http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html +CVE-2015-8369 - http://seclists.org/fulldisclosure/2015/Dec/8 +CVE-2015-8370 - http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html +CVE-2015-8370 - http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html +CVE-2015-8370 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-8370 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8374 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2015-8374 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-8374 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-8376 - http://seclists.org/fulldisclosure/2015/Dec/101 +CVE-2015-8376 - http://seclists.org/fulldisclosure/2015/Dec/7 +CVE-2015-8379 - http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html +CVE-2015-8379 - http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html +CVE-2015-8385 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8386 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8388 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8391 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8396 - http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/ +CVE-2015-8396 - http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html +CVE-2015-8396 - https://www.exploit-db.com/exploits/39229/ +CVE-2015-8397 - http://packetstormsecurity.com/files/135206/GDCM-2.6.0-2.6.1-Out-Of-Bounds-Read.html +CVE-2015-8398 - https://www.exploit-db.com/exploits/39170/ +CVE-2015-8399 - https://www.exploit-db.com/exploits/39170/ +CVE-2015-8410 - https://www.exploit-db.com/exploits/39040/ +CVE-2015-8411 - https://www.exploit-db.com/exploits/39041/ +CVE-2015-8412 - https://www.exploit-db.com/exploits/39042/ +CVE-2015-8413 - https://www.exploit-db.com/exploits/39043/ +CVE-2015-8415 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8415 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8416 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8416 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8417 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8417 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8418 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8418 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8419 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8419 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8420 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8420 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8420 - https://www.exploit-db.com/exploits/39044/ +CVE-2015-8421 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8421 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8421 - https://www.exploit-db.com/exploits/39045/ +CVE-2015-8422 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8422 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8422 - https://www.exploit-db.com/exploits/39046/ +CVE-2015-8423 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8423 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8423 - https://www.exploit-db.com/exploits/39047/ +CVE-2015-8424 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8424 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8424 - https://www.exploit-db.com/exploits/39048/ +CVE-2015-8425 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8425 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8425 - https://www.exploit-db.com/exploits/39049/ +CVE-2015-8426 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8426 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8426 - https://www.exploit-db.com/exploits/39650/ +CVE-2015-8427 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8427 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8427 - https://www.exploit-db.com/exploits/39050/ +CVE-2015-8428 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8428 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8428 - https://www.exploit-db.com/exploits/39051/ +CVE-2015-8429 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8429 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8429 - https://www.exploit-db.com/exploits/39052/ +CVE-2015-8430 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8430 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8430 - https://www.exploit-db.com/exploits/39053/ +CVE-2015-8431 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8431 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8431 - https://www.exploit-db.com/exploits/39054/ +CVE-2015-8432 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8432 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8433 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8433 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8434 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8434 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8434 - https://www.exploit-db.com/exploits/39072/ +CVE-2015-8435 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8435 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8436 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8436 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8437 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8437 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8438 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8438 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8439 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8439 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8440 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8440 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8441 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8441 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8442 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8442 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8443 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8443 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8444 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8444 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8445 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8445 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8446 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8446 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8447 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8447 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8448 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8448 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8449 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8449 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8450 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8450 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8451 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8451 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8452 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8452 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8453 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8453 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8454 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8454 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8455 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8455 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8456 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8456 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8457 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8457 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8459 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8459 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8460 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8460 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8472 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2015-8472 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html +CVE-2015-8508 - http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html +CVE-2015-8508 - https://bugzilla.mozilla.org/show_bug.cgi?id=1221518 +CVE-2015-8509 - http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html +CVE-2015-8509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1232785 +CVE-2015-8510 - https://bugzilla.mozilla.org/show_bug.cgi?id=1190038 +CVE-2015-8540 - http://www.openwall.com/lists/oss-security/2015/12/17/10 +CVE-2015-8540 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-8542 - http://packetstormsecurity.com/files/136069/Open-Xchange-Guard-2.2.0-2.0-Private-Key-Disclosure.html +CVE-2015-8543 - http://www.openwall.com/lists/oss-security/2015/12/09/5 +CVE-2015-8543 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8543 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-8543 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-8546 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2015-8550 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8554 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8555 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8556 - http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html +CVE-2015-8556 - https://www.exploit-db.com/exploits/39010/ +CVE-2015-8557 - http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html +CVE-2015-8557 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8560 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8562 - http://packetstormsecurity.com/files/134949/Joomla-HTTP-Header-Unauthenticated-Remote-Code-Execution.html +CVE-2015-8562 - http://packetstormsecurity.com/files/135100/Joomla-3.4.5-Object-Injection.html +CVE-2015-8562 - https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html +CVE-2015-8562 - https://www.exploit-db.com/exploits/38977/ +CVE-2015-8562 - https://www.exploit-db.com/exploits/39033/ +CVE-2015-8567 - http://www.ubuntu.com/usn/USN-2891-1 +CVE-2015-8568 - https://bugzilla.redhat.com/show_bug.cgi?id=1289816 +CVE-2015-8569 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-8569 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-8575 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-8575 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-8577 - https://kc.mcafee.com/corporate/index?page=content&id=SB10142 +CVE-2015-8593 - http://www.securityfocus.com/bid/103671 +CVE-2015-8594 - http://www.securityfocus.com/bid/103671 +CVE-2015-8603 - http://packetstormsecurity.com/files/135164/Serendipity-2.0.2-Cross-Site-Scripting.html +CVE-2015-8603 - http://seclists.org/fulldisclosure/2016/Jan/18 +CVE-2015-8604 - http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html +CVE-2015-8604 - http://seclists.org/fulldisclosure/2016/Jan/16 +CVE-2015-8605 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8606 - http://seclists.org/fulldisclosure/2015/Dec/55 +CVE-2015-8606 - http://www.openwall.com/lists/oss-security/2015/12/17/1 +CVE-2015-8606 - http://www.openwall.com/lists/oss-security/2015/12/17/11 +CVE-2015-8606 - http://www.openwall.com/lists/oss-security/2015/12/18/5 +CVE-2015-8606 - http://www.silverstripe.org/download/security-releases/ss-2015-026 +CVE-2015-8606 - https://cybersecurityworks.com/zerodays/cve-2015-8606-silverstripe.html +CVE-2015-8607 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-8607 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2015-8608 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2015-8608 - https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html +CVE-2015-8608 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2015-8612 - http://packetstormsecurity.com/files/135047/Slackware-Security-Advisory-blueman-Updates.html +CVE-2015-8612 - https://www.exploit-db.com/exploits/46186/ +CVE-2015-8616 - https://bugs.php.net/bug.php?id=71020 +CVE-2015-8618 - https://github.com/golang/go/issues/13515 +CVE-2015-8620 - http://packetstormsecurity.com/files/135859/Avast-11.1.2245-Heap-Overflow.html +CVE-2015-8629 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8629 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8629 - https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb +CVE-2015-8630 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8630 - https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b +CVE-2015-8631 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8631 - https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 +CVE-2015-8634 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8634 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8634 - https://www.exploit-db.com/exploits/39221/ +CVE-2015-8635 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8635 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8635 - https://www.exploit-db.com/exploits/39220/ +CVE-2015-8636 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8636 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8636 - https://www.exploit-db.com/exploits/39219/ +CVE-2015-8638 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8638 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8639 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8639 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8640 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8640 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8641 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8641 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8642 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8642 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8643 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8643 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8644 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8644 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8644 - https://www.exploit-db.com/exploits/39476/ +CVE-2015-8645 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8645 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8646 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8646 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8647 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8647 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8648 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8648 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8649 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8649 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8650 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8650 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8651 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2015-8651 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2015-8660 - http://packetstormsecurity.com/files/135151/Ubuntu-14.04-LTS-15.10-overlayfs-Local-Root.html +CVE-2015-8660 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8660 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8660 - https://www.exploit-db.com/exploits/39166/ +CVE-2015-8660 - https://www.exploit-db.com/exploits/39230/ +CVE-2015-8660 - https://www.exploit-db.com/exploits/40688/ +CVE-2015-8665 - http://www.openwall.com/lists/oss-security/2015/12/24/2 +CVE-2015-8665 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8665 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8665 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8667 - https://packetstormsecurity.com/files/136763/Exponent-CMS-2.3.5-Cross-Site-Scripting.html +CVE-2015-8668 - http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html +CVE-2015-8668 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8668 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8683 - http://www.openwall.com/lists/oss-security/2015/12/25/1 +CVE-2015-8683 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8683 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8683 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8684 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1323-exponent-cms-235-file-upload-cross-site-scripting-vulnerability +CVE-2015-8684 - https://packetstormsecurity.com/files/136762/Exponent-CMS-2.3.5-File-Upload-Cross-Site-Scripting.html +CVE-2015-8685 - http://packetstormsecurity.com/files/135256/dolibarr-HTML-Injection.html +CVE-2015-8685 - http://seclists.org/fulldisclosure/2016/Jan/40 +CVE-2015-8687 - http://seclists.org/fulldisclosure/2016/Jan/0 +CVE-2015-8704 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2015-8704 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8709 - http://www.openwall.com/lists/oss-security/2015/12/17/12 +CVE-2015-8711 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8712 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8713 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8714 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8715 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8716 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8717 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8718 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8719 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8720 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8721 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8722 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8723 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8724 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8726 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8727 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8728 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8729 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8730 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8731 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8732 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8733 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2015-8741 - http://www.wireshark.org/security/wnpa-sec-2015-59.html +CVE-2015-8751 - http://www.openwall.com/lists/oss-security/2016/01/07/10 +CVE-2015-8765 - https://www.kb.cert.org/vuls/id/576313 +CVE-2015-8766 - http://seclists.org/fulldisclosure/2015/Dec/60 +CVE-2015-8767 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8767 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8767 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2015-8767 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2015-8768 - https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF +CVE-2015-8770 - http://packetstormsecurity.com/files/135274/Roundcube-1.1.3-Path-Traversal.html +CVE-2015-8770 - https://www.exploit-db.com/exploits/39245/ +CVE-2015-8776 - http://www.securityfocus.com/bid/83277 +CVE-2015-8777 - http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html +CVE-2015-8778 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2015-8778 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2015-8778 - http://www.securityfocus.com/bid/83275 +CVE-2015-8778 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2015-8779 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2015-8779 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2015-8779 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2015-8779 - https://sourceware.org/bugzilla/show_bug.cgi?id=17905 +CVE-2015-8780 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2015-0001 +CVE-2015-8781 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8781 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8781 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8782 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8782 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8782 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8783 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8783 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8783 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8784 - http://www.openwall.com/lists/oss-security/2016/01/24/8 +CVE-2015-8784 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8784 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8784 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2015-8785 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8785 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2015-8785 - http://www.ubuntu.com/usn/USN-2886-1 +CVE-2015-8786 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8787 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8787 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2015-8787 - http://www.ubuntu.com/usn/USN-2890-3 +CVE-2015-8798 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00 +CVE-2015-8799 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00 +CVE-2015-8800 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00 +CVE-2015-8806 - http://www.openwall.com/lists/oss-security/2016/02/03/5 +CVE-2015-8806 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-8812 - http://www.securityfocus.com/bid/83218 +CVE-2015-8812 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2015-8816 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8816 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2015-8830 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2015-8831 - http://packetstormsecurity.com/files/134353/dotclear-2.8.1-Cross-Site-Scripting.html +CVE-2015-8831 - http://seclists.org/fulldisclosure/2015/Nov/59 +CVE-2015-8832 - http://packetstormsecurity.com/files/134352/dotclear-2.8.1-Shell-Upload.html +CVE-2015-8835 - https://bugs.php.net/bug.php?id=70081 +CVE-2015-8836 - https://bugzilla.redhat.com/show_bug.cgi?id=863102 +CVE-2015-8837 - https://bugzilla.redhat.com/show_bug.cgi?id=863091 +CVE-2015-8841 - http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html +CVE-2015-8853 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2015-8853 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-8853 - https://rt.perl.org/Public/Bug/Display.html?id=123562 +CVE-2015-8864 - https://github.com/roundcube/roundcubemail/issues/4949 +CVE-2015-8865 - https://hackerone.com/reports/476179 +CVE-2015-8868 - http://www.openwall.com/lists/oss-security/2016/04/12/1 +CVE-2015-8868 - https://bugs.freedesktop.org/show_bug.cgi?id=93476 +CVE-2015-8869 - http://www.openwall.com/lists/oss-security/2016/04/29/1 +CVE-2015-8869 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8871 - https://github.com/uclouvain/openjpeg/blob/master/CHANGELOG.md +CVE-2015-8873 - https://bugs.php.net/bug.php?id=69793 +CVE-2015-8895 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8895 - http://www.securityfocus.com/bid/91025 +CVE-2015-8896 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8897 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8898 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2015-8916 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8917 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8919 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8920 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8921 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8922 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8923 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8924 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8924 - https://github.com/libarchive/libarchive/issues/515 +CVE-2015-8925 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8926 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8928 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8930 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8931 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8932 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8934 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2015-8934 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2015-8935 - https://hackerone.com/reports/145392 +CVE-2015-8947 - https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e +CVE-2015-8952 - https://usn.ubuntu.com/3582-1/ +CVE-2015-8953 - http://www.openwall.com/lists/oss-security/2016/08/23/9 +CVE-2015-8960 - https://kcitls.org +CVE-2015-8965 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2015-8965 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2015-8968 - https://hackerone.com/reports/104465 +CVE-2015-8969 - https://hackerone.com/reports/105190 +CVE-2015-8973 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2015-8974 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2015-8975 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2015-8976 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2015-8977 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2015-8979 - http://packetstormsecurity.com/files/140191/DCMTK-storescp-DICOM-storage-C-STORE-SCP-Remote-Stack-Buffer-Overflow.html +CVE-2015-8979 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php +CVE-2015-8994 - http://marc.info/?l=php-internals&m=147921016724565&w=2 +CVE-2015-8994 - http://seclists.org/oss-sec/2016/q4/343 +CVE-2015-8994 - http://seclists.org/oss-sec/2017/q1/520 +CVE-2015-8994 - https://bugs.php.net/bug.php?id=69090 +CVE-2015-9008 - http://www.securityfocus.com/bid/98874 +CVE-2015-9009 - http://www.securityfocus.com/bid/98874 +CVE-2015-9010 - http://www.securityfocus.com/bid/98874 +CVE-2015-9011 - http://www.securityfocus.com/bid/98874 +CVE-2015-9012 - http://www.securityfocus.com/bid/98874 +CVE-2015-9013 - http://www.securityfocus.com/bid/98874 +CVE-2015-9014 - http://www.securityfocus.com/bid/98874 +CVE-2015-9015 - http://www.securityfocus.com/bid/98874 +CVE-2015-9020 - http://www.securityfocus.com/bid/98874 +CVE-2015-9021 - http://www.securityfocus.com/bid/98874 +CVE-2015-9022 - http://www.securityfocus.com/bid/98874 +CVE-2015-9023 - http://www.securityfocus.com/bid/98874 +CVE-2015-9024 - http://www.securityfocus.com/bid/98874 +CVE-2015-9025 - http://www.securityfocus.com/bid/98874 +CVE-2015-9026 - http://www.securityfocus.com/bid/98874 +CVE-2015-9027 - http://www.securityfocus.com/bid/98874 +CVE-2015-9028 - http://www.securityfocus.com/bid/98874 +CVE-2015-9029 - http://www.securityfocus.com/bid/98874 +CVE-2015-9030 - http://www.securityfocus.com/bid/98874 +CVE-2015-9031 - http://www.securityfocus.com/bid/98874 +CVE-2015-9032 - http://www.securityfocus.com/bid/98874 +CVE-2015-9033 - http://www.securityfocus.com/bid/98874 +CVE-2015-9056 - https://www.elastic.co/community/security +CVE-2015-9063 - http://www.securityfocus.com/bid/103671 +CVE-2015-9064 - http://www.securityfocus.com/bid/103671 +CVE-2015-9065 - http://www.securityfocus.com/bid/103671 +CVE-2015-9066 - http://www.securityfocus.com/bid/103671 +CVE-2015-9098 - https://www.exploit-db.com/exploits/42444/ +CVE-2015-9101 - https://blogs.gentoo.org/ago/2017/06/17/lame-heap-based-buffer-overflow-in-fill_buffer_resample-util-c/ +CVE-2015-9101 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2015-9101 +CVE-2015-9108 - http://www.securityfocus.com/bid/103671 +CVE-2015-9109 - http://www.securityfocus.com/bid/103671 +CVE-2015-9110 - http://www.securityfocus.com/bid/103671 +CVE-2015-9111 - http://www.securityfocus.com/bid/103671 +CVE-2015-9112 - http://www.securityfocus.com/bid/103671 +CVE-2015-9113 - http://www.securityfocus.com/bid/103671 +CVE-2015-9114 - http://www.securityfocus.com/bid/103671 +CVE-2015-9115 - http://www.securityfocus.com/bid/103671 +CVE-2015-9116 - http://www.securityfocus.com/bid/103671 +CVE-2015-9118 - http://www.securityfocus.com/bid/103671 +CVE-2015-9119 - http://www.securityfocus.com/bid/103671 +CVE-2015-9120 - http://www.securityfocus.com/bid/103671 +CVE-2015-9122 - http://www.securityfocus.com/bid/103671 +CVE-2015-9123 - http://www.securityfocus.com/bid/103671 +CVE-2015-9124 - http://www.securityfocus.com/bid/103671 +CVE-2015-9126 - http://www.securityfocus.com/bid/103671 +CVE-2015-9127 - http://www.securityfocus.com/bid/103671 +CVE-2015-9128 - http://www.securityfocus.com/bid/103671 +CVE-2015-9129 - http://www.securityfocus.com/bid/103671 +CVE-2015-9130 - http://www.securityfocus.com/bid/103671 +CVE-2015-9131 - http://www.securityfocus.com/bid/103671 +CVE-2015-9132 - http://www.securityfocus.com/bid/103671 +CVE-2015-9133 - http://www.securityfocus.com/bid/103671 +CVE-2015-9134 - http://www.securityfocus.com/bid/103671 +CVE-2015-9135 - http://www.securityfocus.com/bid/103671 +CVE-2015-9136 - http://www.securityfocus.com/bid/103671 +CVE-2015-9137 - http://www.securityfocus.com/bid/103671 +CVE-2015-9138 - http://www.securityfocus.com/bid/103671 +CVE-2015-9139 - http://www.securityfocus.com/bid/103671 +CVE-2015-9140 - http://www.securityfocus.com/bid/103671 +CVE-2015-9141 - http://www.securityfocus.com/bid/103671 +CVE-2015-9142 - http://www.securityfocus.com/bid/103671 +CVE-2015-9143 - http://www.securityfocus.com/bid/103671 +CVE-2015-9144 - http://www.securityfocus.com/bid/103671 +CVE-2015-9145 - http://www.securityfocus.com/bid/103671 +CVE-2015-9146 - http://www.securityfocus.com/bid/103671 +CVE-2015-9147 - http://www.securityfocus.com/bid/103671 +CVE-2015-9148 - http://www.securityfocus.com/bid/103671 +CVE-2015-9149 - http://www.securityfocus.com/bid/103671 +CVE-2015-9150 - http://www.securityfocus.com/bid/103671 +CVE-2015-9151 - http://www.securityfocus.com/bid/103671 +CVE-2015-9152 - http://www.securityfocus.com/bid/103671 +CVE-2015-9153 - http://www.securityfocus.com/bid/103671 +CVE-2015-9156 - http://www.securityfocus.com/bid/103671 +CVE-2015-9157 - http://www.securityfocus.com/bid/103671 +CVE-2015-9158 - http://www.securityfocus.com/bid/103671 +CVE-2015-9159 - http://www.securityfocus.com/bid/103671 +CVE-2015-9160 - http://www.securityfocus.com/bid/103671 +CVE-2015-9161 - http://www.securityfocus.com/bid/103671 +CVE-2015-9162 - http://www.securityfocus.com/bid/103671 +CVE-2015-9163 - http://www.securityfocus.com/bid/103671 +CVE-2015-9164 - http://www.securityfocus.com/bid/103671 +CVE-2015-9165 - http://www.securityfocus.com/bid/103671 +CVE-2015-9166 - http://www.securityfocus.com/bid/103671 +CVE-2015-9167 - http://www.securityfocus.com/bid/103671 +CVE-2015-9169 - http://www.securityfocus.com/bid/103671 +CVE-2015-9170 - http://www.securityfocus.com/bid/103671 +CVE-2015-9171 - http://www.securityfocus.com/bid/103671 +CVE-2015-9172 - http://www.securityfocus.com/bid/103671 +CVE-2015-9173 - http://www.securityfocus.com/bid/103671 +CVE-2015-9174 - http://www.securityfocus.com/bid/103671 +CVE-2015-9175 - http://www.securityfocus.com/bid/103671 +CVE-2015-9176 - http://www.securityfocus.com/bid/103671 +CVE-2015-9177 - http://www.securityfocus.com/bid/103671 +CVE-2015-9178 - http://www.securityfocus.com/bid/103671 +CVE-2015-9179 - http://www.securityfocus.com/bid/103671 +CVE-2015-9180 - http://www.securityfocus.com/bid/103671 +CVE-2015-9181 - http://www.securityfocus.com/bid/103671 +CVE-2015-9182 - http://www.securityfocus.com/bid/103671 +CVE-2015-9183 - http://www.securityfocus.com/bid/103671 +CVE-2015-9184 - http://www.securityfocus.com/bid/103671 +CVE-2015-9185 - http://www.securityfocus.com/bid/103671 +CVE-2015-9186 - http://www.securityfocus.com/bid/103671 +CVE-2015-9187 - http://www.securityfocus.com/bid/103671 +CVE-2015-9188 - http://www.securityfocus.com/bid/103671 +CVE-2015-9189 - http://www.securityfocus.com/bid/103671 +CVE-2015-9190 - http://www.securityfocus.com/bid/103671 +CVE-2015-9191 - http://www.securityfocus.com/bid/103671 +CVE-2015-9192 - http://www.securityfocus.com/bid/103671 +CVE-2015-9193 - http://www.securityfocus.com/bid/103671 +CVE-2015-9194 - http://www.securityfocus.com/bid/103671 +CVE-2015-9195 - http://www.securityfocus.com/bid/103671 +CVE-2015-9196 - http://www.securityfocus.com/bid/103671 +CVE-2015-9197 - http://www.securityfocus.com/bid/103671 +CVE-2015-9198 - http://www.securityfocus.com/bid/103671 +CVE-2015-9199 - http://www.securityfocus.com/bid/103671 +CVE-2015-9200 - http://www.securityfocus.com/bid/103671 +CVE-2015-9201 - http://www.securityfocus.com/bid/103671 +CVE-2015-9202 - http://www.securityfocus.com/bid/103671 +CVE-2015-9203 - http://www.securityfocus.com/bid/103671 +CVE-2015-9204 - http://www.securityfocus.com/bid/103671 +CVE-2015-9205 - http://www.securityfocus.com/bid/103671 +CVE-2015-9206 - http://www.securityfocus.com/bid/103671 +CVE-2015-9207 - http://www.securityfocus.com/bid/103671 +CVE-2015-9208 - http://www.securityfocus.com/bid/103671 +CVE-2015-9209 - http://www.securityfocus.com/bid/103671 +CVE-2015-9210 - http://www.securityfocus.com/bid/103671 +CVE-2015-9211 - http://www.securityfocus.com/bid/103671 +CVE-2015-9212 - http://www.securityfocus.com/bid/103671 +CVE-2015-9213 - http://www.securityfocus.com/bid/103671 +CVE-2015-9215 - http://www.securityfocus.com/bid/103671 +CVE-2015-9216 - http://www.securityfocus.com/bid/103671 +CVE-2015-9217 - http://www.securityfocus.com/bid/103671 +CVE-2015-9218 - http://www.securityfocus.com/bid/103671 +CVE-2015-9219 - http://www.securityfocus.com/bid/103671 +CVE-2015-9220 - http://www.securityfocus.com/bid/103671 +CVE-2015-9221 - http://www.securityfocus.com/bid/103671 +CVE-2015-9222 - http://www.securityfocus.com/bid/103671 +CVE-2015-9222 - https://www.exploit-db.com/exploits/39739/ +CVE-2015-9223 - http://www.securityfocus.com/bid/103671 +CVE-2015-9224 - http://www.securityfocus.com/bid/103671 +CVE-2015-9226 - http://packetstormsecurity.com/files/134362/AlegroCart-1.2.8-SQL-Injection.html +CVE-2015-9226 - http://seclists.org/fulldisclosure/2015/Nov/68 +CVE-2015-9226 - https://www.exploit-db.com/exploits/38727/ +CVE-2015-9227 - http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html +CVE-2015-9227 - http://seclists.org/fulldisclosure/2015/Nov/67 +CVE-2015-9227 - https://www.exploit-db.com/exploits/38728/ +CVE-2015-9228 - http://www.openwall.com/lists/oss-security/2015/10/27/6 +CVE-2015-9228 - https://github.com/cybersecurityworks/Disclosed/issues/6 +CVE-2015-9228 - https://packetstormsecurity.com/files/135061/WordPress-NextGEN-Gallery-2.1.10-Shell-Upload.html +CVE-2015-9228 - https://wpvulndb.com/vulnerabilities/9758 +CVE-2015-9229 - https://cybersecurityworks.com/zerodays/cve-2015-9229-nextgen-gallery.html +CVE-2015-9229 - https://github.com/cybersecurityworks/Disclosed/issues/5 +CVE-2015-9230 - http://www.openwall.com/lists/oss-security/2015/10/27/3 +CVE-2015-9230 - https://cxsecurity.com/issue/WLB-2016010011 +CVE-2015-9230 - https://cybersecurityworks.com/zerodays/cve-2015-9230-bulletproof.html +CVE-2015-9230 - https://forum.ait-pro.com/forums/topic/bps-changelog/ +CVE-2015-9230 - https://github.com/cybersecurityworks/Disclosed/issues/3 +CVE-2015-9230 - https://packetstormsecurity.com/files/135125/BulletProof-Security-.52.4-Cross-Site-Scripting.html +CVE-2015-9230 - https://wpvulndb.com/vulnerabilities/8224 +CVE-2015-9232 - https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt +CVE-2015-9233 - http://seclists.org/fulldisclosure/2015/Jul/49 +CVE-2015-9234 - http://seclists.org/fulldisclosure/2015/Jul/49 +CVE-2015-9236 - https://github.com/hapijs/hapi/issues/2850 +CVE-2015-9251 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html +CVE-2015-9251 - http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html +CVE-2015-9251 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html +CVE-2015-9251 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2015-9251 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2015-9251 - https://github.com/jquery/jquery/pull/2588 +CVE-2015-9251 - https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2 +CVE-2015-9251 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2015-9251 - https://seclists.org/bugtraq/2019/May/18 +CVE-2015-9251 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2015-9251 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2015-9251 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2015-9251 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2015-9251 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2015-9251 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2015-9251 - https://www.tenable.com/security/tns-2019-08 +CVE-2015-9253 - https://www.futureweb.at/security/CVE-2015-9253/ +CVE-2015-9260 - https://cybersecurityworks.com/zerodays/cve-2015-9260-bedita.html +CVE-2015-9260 - https://github.com/bedita/bedita/issues/755#issuecomment-148036760 +CVE-2015-9260 - https://github.com/cybersecurityworks/Disclosed/issues/8 +CVE-2015-9261 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2015-9261 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2015-9261 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html +CVE-2015-9261 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2015-9261 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2015-9261 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2015-9261 - http://seclists.org/fulldisclosure/2022/Jun/36 +CVE-2015-9261 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2015-9261 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2015-9263 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php +CVE-2015-9263 - https://www.exploit-db.com/exploits/37888/ +CVE-2015-9266 - https://hackerone.com/reports/73480 +CVE-2015-9266 - https://www.exploit-db.com/exploits/39701/ +CVE-2015-9266 - https://www.exploit-db.com/exploits/39853/ +CVE-2015-9269 - https://seclists.org/fulldisclosure/2015/Jul/97 +CVE-2015-9270 - https://seclists.org/fulldisclosure/2015/Jul/125 +CVE-2015-9272 - https://www.openwall.com/lists/oss-security/2015/04/01/2 +CVE-2015-9285 - https://lists.openwall.net/full-disclosure/2015/12/23/13 +CVE-2015-9286 - https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625 +CVE-2015-9286 - https://www.vulnerability-lab.com/get_content.php?id=1608 +CVE-2015-9297 - https://wpvulndb.com/vulnerabilities/9761 +CVE-2015-9298 - https://wpvulndb.com/vulnerabilities/9761 +CVE-2015-9302 - https://wpvulndb.com/vulnerabilities/8342 +CVE-2015-9304 - https://wpvulndb.com/vulnerabilities/9764 +CVE-2015-9307 - https://wpvulndb.com/vulnerabilities/9766 +CVE-2015-9308 - https://wpvulndb.com/vulnerabilities/9766 +CVE-2015-9309 - https://wpvulndb.com/vulnerabilities/9766 +CVE-2015-9316 - https://www.exploit-db.com/exploits/38678 +CVE-2015-9320 - https://wpvulndb.com/vulnerabilities/9769 +CVE-2015-9324 - https://wpvulndb.com/vulnerabilities/9770 +CVE-2015-9333 - https://wpvulndb.com/vulnerabilities/9773 +CVE-2015-9380 - https://wpvulndb.com/vulnerabilities/7225 +CVE-2015-9383 - https://savannah.nongnu.org/bugs/?46346 +CVE-2015-9384 - https://wpvulndb.com/vulnerabilities/8361 +CVE-2015-9385 - https://wpvulndb.com/vulnerabilities/8359 +CVE-2015-9386 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ +CVE-2015-9387 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ +CVE-2015-9388 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ +CVE-2015-9389 - https://www.davidsopas.com/multiple-vulns-on-mtouch-quiz-wordpress-plugin/ +CVE-2015-9391 - https://wpvulndb.com/vulnerabilities/8351 +CVE-2015-9392 - https://seclists.org/bugtraq/2015/Dec/13 +CVE-2015-9392 - https://wpvulndb.com/vulnerabilities/8350 +CVE-2015-9393 - https://wpvulndb.com/vulnerabilities/8350 +CVE-2015-9394 - https://wpvulndb.com/vulnerabilities/8350 +CVE-2015-9395 - https://seclists.org/bugtraq/2015/Dec/12 +CVE-2015-9395 - https://wpvulndb.com/vulnerabilities/8349/ +CVE-2015-9396 - https://wpvulndb.com/vulnerabilities/8344 +CVE-2015-9397 - https://wpvulndb.com/vulnerabilities/8322 +CVE-2015-9398 - https://wpvulndb.com/vulnerabilities/8322 +CVE-2015-9399 - https://wpvulndb.com/vulnerabilities/8316 +CVE-2015-9400 - https://wpvulndb.com/vulnerabilities/8304 +CVE-2015-9401 - https://wpvulndb.com/vulnerabilities/8293 +CVE-2015-9402 - https://seclists.org/bugtraq/2015/Nov/93 +CVE-2015-9402 - https://wpvulndb.com/vulnerabilities/8243 +CVE-2015-9403 - https://packetstormsecurity.com/files/134240/ +CVE-2015-9404 - https://packetstormsecurity.com/files/134240/ +CVE-2015-9405 - https://wpvulndb.com/vulnerabilities/8216 +CVE-2015-9406 - https://packetstormsecurity.com/files/133778/ +CVE-2015-9406 - https://wpvulndb.com/vulnerabilities/9890 +CVE-2015-9407 - https://packetstormsecurity.com/files/133593/ +CVE-2015-9407 - https://wpvulndb.com/vulnerabilities/8194 +CVE-2015-9408 - https://packetstormsecurity.com/files/133593/ +CVE-2015-9408 - https://wpvulndb.com/vulnerabilities/8194 +CVE-2015-9409 - https://packetstormsecurity.com/files/133594/ +CVE-2015-9409 - https://wpvulndb.com/vulnerabilities/8190 +CVE-2015-9410 - https://cybersecurityworks.com/zerodays/cve-2015-9410-blubrry.html +CVE-2015-9410 - https://github.com/cybersecurityworks/Disclosed/issues/7 +CVE-2015-9411 - https://wpvulndb.com/vulnerabilities/8183 +CVE-2015-9412 - https://wpvulndb.com/vulnerabilities/8182 +CVE-2015-9413 - https://packetstormsecurity.com/files/133480/ +CVE-2015-9413 - https://wpvulndb.com/vulnerabilities/8180 +CVE-2015-9414 - https://wpvulndb.com/vulnerabilities/8175 +CVE-2015-9415 - https://wpvulndb.com/vulnerabilities/8174 +CVE-2015-9416 - https://wpvulndb.com/vulnerabilities/8173 +CVE-2015-9417 - https://wpvulndb.com/vulnerabilities/8170 +CVE-2015-9418 - https://advisories.dxw.com/advisories/csrf-in-watu-pro-allows-unauthenticated-attackers-to-delete-quizzes/ +CVE-2015-9419 - https://packetstormsecurity.com/files/133362/ +CVE-2015-9420 - https://wpvulndb.com/vulnerabilities/8306 +CVE-2015-9421 - https://wpvulndb.com/vulnerabilities/8338 +CVE-2015-9422 - https://wpvulndb.com/vulnerabilities/8331 +CVE-2015-9423 - https://wpvulndb.com/vulnerabilities/8331 +CVE-2015-9424 - https://wpvulndb.com/vulnerabilities/8330 +CVE-2015-9425 - https://wpvulndb.com/vulnerabilities/8327 +CVE-2015-9426 - https://wpvulndb.com/vulnerabilities/8297 +CVE-2015-9427 - http://packetstormsecurity.com/files/133267/ +CVE-2015-9427 - https://wpvulndb.com/vulnerabilities/8158 +CVE-2015-9428 - https://wpvulndb.com/vulnerabilities/8291 +CVE-2015-9429 - https://wpvulndb.com/vulnerabilities/8285 +CVE-2015-9430 - https://wpvulndb.com/vulnerabilities/8281 +CVE-2015-9431 - https://wpvulndb.com/vulnerabilities/8279 +CVE-2015-9432 - https://wpvulndb.com/vulnerabilities/8268 +CVE-2015-9433 - https://wpvulndb.com/vulnerabilities/8252 +CVE-2015-9434 - https://wpvulndb.com/vulnerabilities/8290 +CVE-2015-9435 - https://security.dxw.com/advisories/the-oauth2-complete-plugin-for-wordpress-uses-a-pseudorandom-number-generator-which-is-non-cryptographically-secure/ +CVE-2015-9436 - https://wpvulndb.com/vulnerabilities/8258 +CVE-2015-9437 - https://wpvulndb.com/vulnerabilities/8258 +CVE-2015-9438 - https://wpvulndb.com/vulnerabilities/8247 +CVE-2015-9439 - https://wpvulndb.com/vulnerabilities/8246 +CVE-2015-9440 - http://packetstormsecurity.com/files/133002/ +CVE-2015-9441 - http://packetstormsecurity.com/files/133001/ +CVE-2015-9442 - http://packetstormsecurity.com/files/132992/ +CVE-2015-9443 - http://packetstormsecurity.com/files/132911/ +CVE-2015-9444 - http://packetstormsecurity.com/files/132908/ +CVE-2015-9445 - http://packetstormsecurity.com/files/132842/ +CVE-2015-9445 - https://wpvulndb.com/vulnerabilities/8113 +CVE-2015-9446 - http://packetstormsecurity.com/files/132842/ +CVE-2015-9446 - https://wpvulndb.com/vulnerabilities/8113 +CVE-2015-9447 - http://packetstormsecurity.com/files/132842/ +CVE-2015-9447 - https://wpvulndb.com/vulnerabilities/8113 +CVE-2015-9448 - https://wpvulndb.com/vulnerabilities/8324 +CVE-2015-9449 - https://wpvulndb.com/vulnerabilities/8321 +CVE-2015-9450 - https://wpvulndb.com/vulnerabilities/8340 +CVE-2015-9451 - https://wpvulndb.com/vulnerabilities/8340 +CVE-2015-9452 - https://wpvulndb.com/vulnerabilities/8336 +CVE-2015-9453 - https://wpvulndb.com/vulnerabilities/8333 +CVE-2015-9454 - https://wpvulndb.com/vulnerabilities/8284 +CVE-2015-9455 - https://security.dxw.com/advisories/csrf-and-arbitrary-file-deletion-in-buddypress-activity-plus-1-5/ +CVE-2015-9456 - https://wpvulndb.com/vulnerabilities/8315 +CVE-2015-9457 - https://wpvulndb.com/vulnerabilities/8249 +CVE-2015-9460 - https://wpvulndb.com/vulnerabilities/8339 +CVE-2015-9461 - https://wpvulndb.com/vulnerabilities/8311 +CVE-2015-9462 - https://wpvulndb.com/vulnerabilities/8311 +CVE-2015-9463 - http://packetstormsecurity.com/files/132578/ +CVE-2015-9464 - https://www.exploit-db.com/exploits/37494 +CVE-2015-9465 - https://wpvulndb.com/vulnerabilities/8309 +CVE-2015-9466 - https://wpvulndb.com/vulnerabilities/8318 +CVE-2015-9467 - https://wpvulndb.com/vulnerabilities/8320 +CVE-2015-9469 - https://packetstormsecurity.com/files/132910/ +CVE-2015-9470 - https://packetstormsecurity.com/files/132279/ +CVE-2015-9471 - https://packetstormsecurity.com/files/132124/ +CVE-2015-9471 - https://wpvulndb.com/vulnerabilities/8019 +CVE-2015-9472 - https://wpvulndb.com/vulnerabilities/8015 +CVE-2015-9473 - https://packetstormsecurity.com/files/132042/ +CVE-2015-9474 - https://wpvulndb.com/vulnerabilities/8061 +CVE-2015-9475 - https://wpvulndb.com/vulnerabilities/8061 +CVE-2015-9476 - https://wpvulndb.com/vulnerabilities/8061 +CVE-2015-9477 - https://wpvulndb.com/vulnerabilities/8061 +CVE-2015-9479 - https://packetstormsecurity.com/files/132590/ +CVE-2015-9480 - https://www.exploit-db.com/exploits/37252 +CVE-2015-9481 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9482 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9483 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9484 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9485 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9486 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9487 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9488 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9489 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9490 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9491 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9492 - https://packetstormsecurity.com/files/131957/ +CVE-2015-9493 - https://wpvulndb.com/vulnerabilities/7937 +CVE-2015-9494 - https://wpvulndb.com/vulnerabilities/7982 +CVE-2015-9495 - https://wpvulndb.com/vulnerabilities/7981 +CVE-2015-9496 - https://wpvulndb.com/vulnerabilities/7972 +CVE-2015-9496 - https://www.exploit-db.com/exploits/36942 +CVE-2015-9497 - https://packetstormsecurity.com/files/131798/ +CVE-2015-9497 - https://wpvulndb.com/vulnerabilities/7974 +CVE-2015-9498 - https://wpvulndb.com/vulnerabilities/8011 +CVE-2015-9499 - https://wpvulndb.com/vulnerabilities/7955 +CVE-2015-9499 - https://www.exploit-db.com/exploits/35385 +CVE-2015-9500 - https://packetstormsecurity.com/files/131657/ +CVE-2015-9501 - https://wpvulndb.com/vulnerabilities/7994 +CVE-2015-9502 - https://wpvulndb.com/vulnerabilities/7987 +CVE-2015-9503 - https://wpvulndb.com/vulnerabilities/7986 +CVE-2015-9504 - https://wpvulndb.com/vulnerabilities/7957 +CVE-2015-9537 - https://cybersecurityworks.com/zerodays/cve-2015-9537-nextgen.html +CVE-2015-9537 - https://github.com/cybersecurityworks/Disclosed/issues/1 +CVE-2015-9537 - https://www.openwall.com/lists/oss-security/2015/10/27/4 +CVE-2015-9538 - https://cxsecurity.com/issue/WLB-2015080165 +CVE-2015-9538 - https://cybersecurityworks.com/zerodays/cve-2015-9538-nextgen.html +CVE-2015-9538 - https://github.com/cybersecurityworks/Disclosed/issues/2 +CVE-2015-9538 - https://packetstormsecurity.com/files/135114/WordPress-NextGEN-Gallery-2.1.15-Cross-Site-Scripting-Path-Traversal.html +CVE-2015-9538 - https://www.openwall.com/lists/oss-security/2015/08/28/4 +CVE-2015-9538 - https://www.openwall.com/lists/oss-security/2015/09/01/7 +CVE-2015-9539 - https://cybersecurityworks.com/zerodays/cve-2015-9539-fastsecure.html +CVE-2015-9539 - https://github.com/cybersecurityworks/Disclosed/issues/4 +CVE-2015-9539 - https://www.openwall.com/lists/oss-security/2015/10/27/2 +CVE-2015-9544 - https://github.com/ofirdagan/cross-domain-local-storage/issues/17 +CVE-2015-9544 - https://github.com/ofirdagan/cross-domain-local-storage/pull/19 +CVE-2015-9544 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe +CVE-2015-9545 - https://github.com/ofirdagan/cross-domain-local-storage/issues/17 +CVE-2015-9545 - https://github.com/ofirdagan/cross-domain-local-storage/pull/19 +CVE-2015-9545 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client +CVE-2015-9546 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2015-9547 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2015-9548 - https://mattermost.com/security-updates/ +CVE-2015-9549 - https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html +CVE-2015-9549 - https://github.com/cybersecurityworks/Disclosed/issues/11 +CVE-2015-9549 - https://www.openwall.com/lists/oss-security/2015/12/19/2 +CVE-2016-0006 - https://www.exploit-db.com/exploits/39311/ +CVE-2016-0007 - https://code.google.com/p/google-security-research/issues/detail?id=589 +CVE-2016-0007 - https://www.exploit-db.com/exploits/39310/ +CVE-2016-0007 - https://www.exploit-db.com/exploits/39311/ +CVE-2016-0015 - http://packetstormsecurity.com/files/135232/Microsoft-DirectShow-Remote-Code-Execution.html +CVE-2016-0015 - https://www.exploit-db.com/exploits/39232/ +CVE-2016-0016 - https://www.exploit-db.com/exploits/39233/ +CVE-2016-0040 - https://www.exploit-db.com/exploits/44586/ +CVE-2016-0049 - http://packetstormsecurity.com/files/135797/Windows-Kerberos-Security-Feature-Bypass.html +CVE-2016-0049 - https://www.exploit-db.com/exploits/39442/ +CVE-2016-0051 - https://www.exploit-db.com/exploits/39432/ +CVE-2016-0051 - https://www.exploit-db.com/exploits/39788/ +CVE-2016-0051 - https://www.exploit-db.com/exploits/40085/ +CVE-2016-0063 - https://www.exploit-db.com/exploits/40845/ +CVE-2016-0073 - https://www.exploit-db.com/exploits/40574/ +CVE-2016-0075 - https://www.exploit-db.com/exploits/40573/ +CVE-2016-0079 - https://www.exploit-db.com/exploits/40608/ +CVE-2016-0093 - https://www.exploit-db.com/exploits/39648/ +CVE-2016-0094 - https://www.exploit-db.com/exploits/39647/ +CVE-2016-0099 - https://www.exploit-db.com/exploits/39574/ +CVE-2016-0099 - https://www.exploit-db.com/exploits/39719/ +CVE-2016-0099 - https://www.exploit-db.com/exploits/39809/ +CVE-2016-0099 - https://www.exploit-db.com/exploits/40107/ +CVE-2016-0108 - https://www.exploit-db.com/exploits/39562/ +CVE-2016-0111 - https://www.exploit-db.com/exploits/39663/ +CVE-2016-0120 - https://www.exploit-db.com/exploits/39561/ +CVE-2016-0121 - https://www.exploit-db.com/exploits/39560/ +CVE-2016-0122 - https://www.exploit-db.com/exploits/39694/ +CVE-2016-0128 - https://www.kb.cert.org/vuls/id/813296 +CVE-2016-0143 - https://www.exploit-db.com/exploits/39712/ +CVE-2016-0145 - https://www.exploit-db.com/exploits/39743/ +CVE-2016-0148 - http://packetstormsecurity.com/files/136671/.NET-Framework-4.6-DLL-Hijacking.html +CVE-2016-0151 - https://www.exploit-db.com/exploits/39740/ +CVE-2016-0153 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-044 +CVE-2016-0160 - http://packetstormsecurity.com/files/136702/Microsoft-Internet-Explorer-11-DLL-Hijacking.html +CVE-2016-0160 - http://seclists.org/fulldisclosure/2016/Apr/61 +CVE-2016-0165 - https://www.exploit-db.com/exploits/44480/ +CVE-2016-0168 - http://packetstormsecurity.com/files/137094/Microsoft-Windows-gdi32.dll-Information-Disclosure.html +CVE-2016-0169 - http://packetstormsecurity.com/files/137095/Microsoft-Windows-gdi32.dll-Data-Copy.html +CVE-2016-0170 - http://packetstormsecurity.com/files/137096/Microsoft-Windows-gdi32.dll-ExtEscape-Buffer-Overflow.html +CVE-2016-0171 - http://packetstormsecurity.com/files/137502/Windows-7-win32k-Bitmap-Use-After-Free.html +CVE-2016-0171 - https://www.exploit-db.com/exploits/39959/ +CVE-2016-0173 - http://packetstormsecurity.com/files/137503/Windows-7-win32k-Bitmap-Use-After-Free.html +CVE-2016-0173 - https://www.exploit-db.com/exploits/39960/ +CVE-2016-0185 - https://www.exploit-db.com/exploits/39805/ +CVE-2016-0189 - https://www.exploit-db.com/exploits/40118/ +CVE-2016-0189 - https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/ +CVE-2016-0199 - http://packetstormsecurity.com/files/137533/Microsoft-Internet-Explorer-11-Garbage-Collector-Attribute-Type-Confusion.html +CVE-2016-0199 - http://seclists.org/fulldisclosure/2016/Jun/44 +CVE-2016-0199 - https://www.exploit-db.com/exploits/39994/ +CVE-2016-0219 - http://www-01.ibm.com/support/docview.wss?uid=swg21983720 +CVE-2016-0237 - http://www-01.ibm.com/support/docview.wss?uid=swg21981631 +CVE-2016-0354 - http://www.securityfocus.com/bid/100599 +CVE-2016-0355 - http://www.securityfocus.com/bid/100599 +CVE-2016-0356 - http://www.securityfocus.com/bid/100599 +CVE-2016-0363 - http://seclists.org/fulldisclosure/2016/Apr/3 +CVE-2016-0376 - http://seclists.org/fulldisclosure/2016/Apr/43 +CVE-2016-0392 - http://packetstormsecurity.com/files/137373/IBM-GPFS-Spectrum-Scale-Command-Injection.html +CVE-2016-0400 - https://www.exploit-db.com/exploits/40039/ +CVE-2016-0401 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0402 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0402 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0403 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0404 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0405 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0406 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0407 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0408 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0409 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0411 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0412 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0413 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0414 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0415 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0416 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0417 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0418 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0419 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0420 - http://packetstormsecurity.com/files/138509/JD-Edwards-9.1-EnterpriseOne-Server-Create-Users.html +CVE-2016-0420 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0421 - http://packetstormsecurity.com/files/138508/JD-Edwards-9.1-EnterpriseOne-Server-Manager-Shutdown.html +CVE-2016-0421 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0422 - http://packetstormsecurity.com/files/138507/JD-Edwards-9.1-EnterpriseOne-Server-JDENet-Password-Disclosure.html +CVE-2016-0422 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0423 - http://packetstormsecurity.com/files/138512/JD-Edwards-9.1-EnterpriseOne-Server-JDENET-Denial-Of-Service.html +CVE-2016-0423 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0424 - http://packetstormsecurity.com/files/138510/JD-Edwards-9.1-EnterpriseOne-Server-Denial-Of-Service.html +CVE-2016-0424 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0425 - http://packetstormsecurity.com/files/138511/JD-Edwards-9.1-EnterpriseOne-Server-Password-Disclosure.html +CVE-2016-0425 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0426 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0427 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0428 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0429 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0430 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0431 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0432 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0433 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0434 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0435 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0436 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0437 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0438 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0439 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0440 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0441 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0442 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0443 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0444 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0445 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0446 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0447 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0448 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0448 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0449 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0450 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0451 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0452 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0453 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0454 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0455 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0456 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0456 - https://erpscan.io/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/ +CVE-2016-0457 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0457 - https://erpscan.io/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/ +CVE-2016-0458 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0459 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0460 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0461 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0462 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0463 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0464 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0465 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0466 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0466 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0467 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0468 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0469 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0470 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0471 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0472 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0473 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0474 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0475 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0475 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0476 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0477 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0478 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0479 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0480 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0481 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0482 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0483 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0483 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0484 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0485 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0486 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0487 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0488 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0489 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0490 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0491 - http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html +CVE-2016-0491 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0491 - https://www.exploit-db.com/exploits/39691/ +CVE-2016-0491 - https://www.exploit-db.com/exploits/39852/ +CVE-2016-0492 - http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html +CVE-2016-0492 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0492 - https://www.exploit-db.com/exploits/39691/ +CVE-2016-0492 - https://www.exploit-db.com/exploits/39852/ +CVE-2016-0493 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0494 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0494 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0495 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0496 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0497 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0498 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0499 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0500 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0501 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0502 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0503 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0504 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0505 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0505 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0505 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0506 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0507 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0508 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0509 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0510 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0511 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0512 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0513 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0514 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0515 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0516 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0517 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0518 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0519 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0520 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0521 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0522 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0523 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0524 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0525 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0526 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0527 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0528 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0529 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0530 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0531 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0532 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0533 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0534 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0535 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0536 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0537 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0538 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0539 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0540 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0541 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0542 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0543 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0544 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0545 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0546 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0546 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0546 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0547 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0548 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0549 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0550 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0551 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0552 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0553 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0554 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0555 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0556 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0557 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0558 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0559 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0560 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0561 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0562 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0563 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0564 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0565 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0566 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0567 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0568 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0569 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0570 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0571 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0572 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0573 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0574 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0575 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0576 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0577 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0578 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0579 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0580 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0581 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0582 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0583 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0584 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0585 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0586 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0587 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0588 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0589 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0590 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0591 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0592 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0594 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0595 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0596 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0596 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0596 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0597 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0597 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0597 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0598 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0598 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0598 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0599 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0600 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0600 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0600 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0601 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0602 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0605 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0606 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0606 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0606 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0607 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0608 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0608 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0608 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0609 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0609 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0609 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0610 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0611 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0614 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0616 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0616 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0616 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0617 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0618 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html +CVE-2016-0623 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-0635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-0635 - http://www.securityfocus.com/bid/91787 +CVE-2016-0635 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-0636 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0638 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0639 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0639 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0640 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0640 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0640 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0641 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0641 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0641 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0642 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0642 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0643 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0643 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0644 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0644 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0644 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0646 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0646 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0646 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0647 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0647 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0647 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0648 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0648 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0648 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0649 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0649 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0649 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0650 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0650 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0650 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0651 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0652 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0653 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0654 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0655 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0655 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0656 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0657 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0658 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0659 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0661 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0661 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0662 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0663 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0665 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0665 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0666 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0666 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0666 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0667 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0668 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0668 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-0669 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0671 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0672 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0673 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0674 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0675 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0676 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0677 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0678 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0679 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0680 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0681 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0682 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0683 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0684 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0685 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0686 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0686 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0687 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0687 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0688 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0689 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0690 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0691 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0692 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0693 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0694 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0695 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0695 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0696 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0697 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0698 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0699 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0700 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0701 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0701 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-0701 - http://www.securityfocus.com/bid/91787 +CVE-2016-0701 - https://www.kb.cert.org/vuls/id/257823 +CVE-2016-0701 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-0701 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-0701 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-0701 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-0702 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0702 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0702 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0702 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-0702 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0703 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-0703 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0703 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-0703 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0703 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0704 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-0704 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0704 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-0704 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0704 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0705 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0705 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0705 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0705 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0705 - http://www.securityfocus.com/bid/91787 +CVE-2016-0705 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 +CVE-2016-0705 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-0705 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0706 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-0706 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-0706 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-0706 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0709 - http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and +CVE-2016-0709 - http://packetstormsecurity.com/files/136489/Apache-Jetspeed-Arbitrary-File-Upload.html +CVE-2016-0709 - https://www.exploit-db.com/exploits/39643/ +CVE-2016-0710 - http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and +CVE-2016-0710 - http://packetstormsecurity.com/files/136489/Apache-Jetspeed-Arbitrary-File-Upload.html +CVE-2016-0710 - https://www.exploit-db.com/exploits/39643/ +CVE-2016-0714 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-0714 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-0714 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-0714 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0718 - http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html +CVE-2016-0718 - http://seclists.org/fulldisclosure/2017/Feb/68 +CVE-2016-0718 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-0718 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-0718 - http://www.ubuntu.com/usn/USN-2983-1 +CVE-2016-0718 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2016-0718 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-0723 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0723 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-0723 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-0723 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-0723 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2016-0727 - http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html +CVE-2016-0728 - http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/ +CVE-2016-0728 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0728 - http://www.ubuntu.com/usn/USN-2872-2 +CVE-2016-0728 - https://security.netapp.com/advisory/ntap-20160211-0001/ +CVE-2016-0728 - https://www.exploit-db.com/exploits/39277/ +CVE-2016-0729 - http://packetstormsecurity.com/files/135949/Apache-Xerces-C-XML-Parser-Buffer-Overflow.html +CVE-2016-0729 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-0729 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0729 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-0736 - https://www.exploit-db.com/exploits/40961/ +CVE-2016-0737 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0738 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0741 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0742 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2016-0746 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2016-0747 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2016-0749 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0752 - https://www.exploit-db.com/exploits/40561/ +CVE-2016-0755 - http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html +CVE-2016-0755 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-0758 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0762 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2016-0762 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-0763 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-0763 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-0773 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0774 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0777 - http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html +CVE-2016-0777 - http://seclists.org/fulldisclosure/2016/Jan/44 +CVE-2016-0777 - http://www.openwall.com/lists/oss-security/2016/01/14/7 +CVE-2016-0777 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2016-0777 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0777 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2016-0777 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-0778 - http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html +CVE-2016-0778 - http://seclists.org/fulldisclosure/2016/Jan/44 +CVE-2016-0778 - http://www.openwall.com/lists/oss-security/2016/01/14/7 +CVE-2016-0778 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html +CVE-2016-0778 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0778 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2016-0778 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-0779 - http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html +CVE-2016-0782 - http://packetstormsecurity.com/files/136215/Apache-ActiveMQ-5.13.0-Cross-Site-Scripting.html +CVE-2016-0783 - http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code +CVE-2016-0783 - http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html +CVE-2016-0784 - http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code +CVE-2016-0784 - http://packetstormsecurity.com/files/136484/Apache-OpenMeetings-3.1.0-Path-Traversal.html +CVE-2016-0784 - https://www.exploit-db.com/exploits/39642/ +CVE-2016-0787 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0792 - https://www.exploit-db.com/exploits/42394/ +CVE-2016-0792 - https://www.exploit-db.com/exploits/43375/ +CVE-2016-0793 - http://packetstormsecurity.com/files/136323/Wildfly-Filter-Restriction-Bypass-Information-Disclosure.html +CVE-2016-0793 - https://www.exploit-db.com/exploits/39573/ +CVE-2016-0796 - http://www.vapidlabs.com/advisory.php?v=162 +CVE-2016-0797 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0797 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0797 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-0797 - http://www.securityfocus.com/bid/91787 +CVE-2016-0797 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-0797 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0798 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0798 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0798 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0798 - http://www.securityfocus.com/bid/91787 +CVE-2016-0798 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0799 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0799 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-0799 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-0799 - http://www.securityfocus.com/bid/91787 +CVE-2016-0799 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 +CVE-2016-0799 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-0799 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0800 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-0800 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-0800 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-0800 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-0800 - http://www.securityfocus.com/bid/91787 +CVE-2016-0800 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953 +CVE-2016-0800 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554 +CVE-2016-0800 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2016-0800 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 +CVE-2016-0800 - https://www.kb.cert.org/vuls/id/583776 +CVE-2016-0801 - https://www.exploit-db.com/exploits/39801/ +CVE-2016-0821 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-0823 - http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html +CVE-2016-0846 - https://www.exploit-db.com/exploits/39686/ +CVE-2016-0854 - https://www.exploit-db.com/exploits/39735/ +CVE-2016-0861 - http://packetstormsecurity.com/files/135586/GE-Industrial-Solutions-UPS-SNMP-Adapter-Command-Injection.html +CVE-2016-0861 - http://seclists.org/fulldisclosure/2016/Feb/21 +CVE-2016-0861 - https://www.exploit-db.com/exploits/39408/ +CVE-2016-0862 - http://packetstormsecurity.com/files/135586/GE-Industrial-Solutions-UPS-SNMP-Adapter-Command-Injection.html +CVE-2016-0862 - http://seclists.org/fulldisclosure/2016/Feb/21 +CVE-2016-0862 - https://www.exploit-db.com/exploits/39408/ +CVE-2016-0887 - http://packetstormsecurity.com/files/136656/RSA-BSAFE-Lenstras-Attack.html +CVE-2016-0891 - http://packetstormsecurity.com/files/136837/EMC-ViPR-SRM-Cross-Site-Request-Forgery.html +CVE-2016-0891 - https://www.exploit-db.com/exploits/39738/ +CVE-2016-0891 - https://www.securify.nl/advisory/SFY20141109/emc_m_r__watch4net__lacks_c%20ross_site_request_forgery_protection.html +CVE-2016-0892 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html +CVE-2016-0893 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html +CVE-2016-0894 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html +CVE-2016-0895 - http://packetstormsecurity.com/files/136888/RSA-Data-Loss-Prevention-XSS-Information-Disclosure.html +CVE-2016-0900 - http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html +CVE-2016-0901 - http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html +CVE-2016-0902 - http://packetstormsecurity.com/files/136994/RSA-Authentication-Manager-XSS-HTTP-Response-Splitting.html +CVE-2016-0926 - https://pivotal.io/security/cve-2016-0926 +CVE-2016-0951 - https://www.exploit-db.com/exploits/39429/ +CVE-2016-0952 - https://www.exploit-db.com/exploits/39430/ +CVE-2016-0953 - https://www.exploit-db.com/exploits/39431/ +CVE-2016-0954 - https://www.exploit-db.com/exploits/39533/ +CVE-2016-0956 - http://packetstormsecurity.com/files/135720/Apache-Sling-Framework-2.3.6-Information-Disclosure.html +CVE-2016-0956 - http://seclists.org/fulldisclosure/2016/Feb/48 +CVE-2016-0956 - https://www.exploit-db.com/exploits/39435/ +CVE-2016-0964 - https://www.exploit-db.com/exploits/39467/ +CVE-2016-0965 - https://www.exploit-db.com/exploits/39460/ +CVE-2016-0967 - https://www.exploit-db.com/exploits/39466/ +CVE-2016-0971 - https://www.exploit-db.com/exploits/39465/ +CVE-2016-0974 - https://www.exploit-db.com/exploits/39463/ +CVE-2016-0984 - https://www.exploit-db.com/exploits/39462/ +CVE-2016-0985 - https://www.exploit-db.com/exploits/39461/ +CVE-2016-0997 - https://www.exploit-db.com/exploits/39613/ +CVE-2016-0998 - https://www.exploit-db.com/exploits/39612/ +CVE-2016-0998 - https://www.exploit-db.com/exploits/39631/ +CVE-2016-0999 - https://www.exploit-db.com/exploits/39611/ +CVE-2016-1000 - https://www.exploit-db.com/exploits/39610/ +CVE-2016-1000000 - https://www.tenable.com/security/research/tra-2016-15 +CVE-2016-1000028 - http://www.securityfocus.com/bid/92134 +CVE-2016-1000028 - https://www.tenable.com/security/tns-2016-11 +CVE-2016-1000029 - http://www.securityfocus.com/bid/92134 +CVE-2016-1000029 - https://www.tenable.com/security/tns-2016-11 +CVE-2016-1000031 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000031 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-1000031 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-1000031 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-1000031 - https://www.tenable.com/security/research/tra-2016-23 +CVE-2016-1000031 - https://www.tenable.com/security/research/tra-2016-30 +CVE-2016-1000107 - https://httpoxy.org/ +CVE-2016-1000109 - https://httpoxy.org/ +CVE-2016-1000110 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 +CVE-2016-1000113 - http://www.vapidlabs.com/advisory.php?v=164 +CVE-2016-1000114 - http://www.vapidlabs.com/advisory.php?v=164 +CVE-2016-1000123 - https://www.exploit-db.com/exploits/42596/ +CVE-2016-1000124 - https://www.exploit-db.com/exploits/42597/ +CVE-2016-1000125 - https://www.exploit-db.com/exploits/42598/ +CVE-2016-1000131 - http://www.securityfocus.com/bid/93867 +CVE-2016-1000218 - https://www.elastic.co/community/security +CVE-2016-1000219 - https://www.elastic.co/community/security +CVE-2016-1000220 - https://www.elastic.co/community/security +CVE-2016-1000221 - https://www.elastic.co/community/security +CVE-2016-1000222 - https://www.elastic.co/community/security +CVE-2016-1000271 - https://packetstormsecurity.com/files/140141/Joomla-DT-Register-SQL-Injection.html +CVE-2016-1000338 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000339 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000340 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000341 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000342 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000343 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000344 - https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f +CVE-2016-1000344 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000345 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000346 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-1000352 - https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f +CVE-2016-1000352 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-10005 - http://packetstormsecurity.com/files/140232/SAP-Solman-7.31-Information-Disclosure.html +CVE-2016-10005 - http://seclists.org/fulldisclosure/2016/Dec/69 +CVE-2016-10005 - https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/ +CVE-2016-10007 - https://security.elarlang.eu/cve-2016-10007-and-cve-2016-10008-2-sql-injection-vulnerabilities-in-dotcms-blacklist-defence-bypass.html +CVE-2016-10008 - https://security.elarlang.eu/cve-2016-10007-and-cve-2016-10008-2-sql-injection-vulnerabilities-in-dotcms-blacklist-defence-bypass.html +CVE-2016-10009 - http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html +CVE-2016-10009 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html +CVE-2016-10009 - https://www.exploit-db.com/exploits/40963/ +CVE-2016-1001 - https://www.exploit-db.com/exploits/39609/ +CVE-2016-10010 - http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html +CVE-2016-10010 - https://www.exploit-db.com/exploits/40962/ +CVE-2016-1002 - https://www.exploit-db.com/exploits/39608/ +CVE-2016-10027 - https://issues.igniterealtime.org/projects/SMACK/issues/SMACK-739 +CVE-2016-10030 - https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee +CVE-2016-10031 - http://forum.wampserver.com/read.php?2,144473 +CVE-2016-10031 - https://packetstormsecurity.com/files/140279/Wampserver-3.0.6-Privilege-Escalation.html +CVE-2016-10031 - https://www.exploit-db.com/exploits/40967/ +CVE-2016-10033 - http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html +CVE-2016-10033 - http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html +CVE-2016-10033 - http://seclists.org/fulldisclosure/2016/Dec/78 +CVE-2016-10033 - https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html +CVE-2016-10033 - https://www.exploit-db.com/exploits/40968/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/40969/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/40970/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/40974/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/40986/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/41962/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/41996/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/42024/ +CVE-2016-10033 - https://www.exploit-db.com/exploits/42221/ +CVE-2016-10034 - https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html +CVE-2016-10034 - https://www.exploit-db.com/exploits/40979/ +CVE-2016-10034 - https://www.exploit-db.com/exploits/40986/ +CVE-2016-10034 - https://www.exploit-db.com/exploits/42221/ +CVE-2016-10036 - http://packetstormsecurity.com/files/147378/Jfrog-Artifactory-Code-Execution-Shell-Upload.html +CVE-2016-10036 - https://www.exploit-db.com/exploits/44543/ +CVE-2016-10043 - https://www.exploit-db.com/exploits/41179/ +CVE-2016-10045 - http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html +CVE-2016-10045 - http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html +CVE-2016-10045 - http://seclists.org/fulldisclosure/2016/Dec/81 +CVE-2016-10045 - https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html +CVE-2016-10045 - https://www.exploit-db.com/exploits/40969/ +CVE-2016-10045 - https://www.exploit-db.com/exploits/40986/ +CVE-2016-10045 - https://www.exploit-db.com/exploits/42221/ +CVE-2016-10063 - https://bugzilla.redhat.com/show_bug.cgi?id=1410476 +CVE-2016-10072 - http://forum.wampserver.com/read.php?2,144473 +CVE-2016-10072 - https://packetstormsecurity.com/files/138948/wampserver306-insecure.txt +CVE-2016-10073 - http://packetstormsecurity.com/files/142486/Vanilla-Forums-2.3-Remote-Code-Execution.html +CVE-2016-10073 - https://exploitbox.io/vuln/Vanilla-Forums-Exploit-Host-Header-Injection-CVE-2016-10073-0day.html +CVE-2016-10073 - https://www.exploit-db.com/exploits/41996/ +CVE-2016-10074 - http://packetstormsecurity.com/files/140290/SwiftMailer-Remote-Code-Execution.html +CVE-2016-10074 - http://seclists.org/fulldisclosure/2016/Dec/86 +CVE-2016-10074 - https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html +CVE-2016-10074 - https://www.exploit-db.com/exploits/40972/ +CVE-2016-10074 - https://www.exploit-db.com/exploits/40986/ +CVE-2016-10074 - https://www.exploit-db.com/exploits/42221/ +CVE-2016-10079 - https://www.exploit-db.com/exploits/41030/ +CVE-2016-10081 - https://www.exploit-db.com/exploits/41435/ +CVE-2016-10092 - http://bugzilla.maptools.org/show_bug.cgi?id=2620 +CVE-2016-10092 - http://bugzilla.maptools.org/show_bug.cgi?id=2622 +CVE-2016-10092 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10092 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092 +CVE-2016-10092 - https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a +CVE-2016-10093 - http://bugzilla.maptools.org/show_bug.cgi?id=2610 +CVE-2016-10093 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10093 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093 +CVE-2016-10094 - http://bugzilla.maptools.org/show_bug.cgi?id=2640 +CVE-2016-10094 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10095 - http://bugzilla.maptools.org/show_bug.cgi?id=2625 +CVE-2016-10095 - http://www.openwall.com/lists/oss-security/2017/01/01/7 +CVE-2016-10095 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-stack-based-buffer-overflow-in-_tiffvgetfield-tif_dir-c/ +CVE-2016-10096 - https://github.com/semplon/GeniXCMS/issues/58 +CVE-2016-10097 - http://www.cloudscan.me/2016/03/xxe-dork-open-am-1010-xml-injection.html +CVE-2016-10108 - http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html +CVE-2016-1011 - http://packetstormsecurity.com/files/137050/Adobe-Flash-MovieClip.duplicateMovieClip-Use-After-Free.html +CVE-2016-1011 - https://www.exploit-db.com/exploits/39779/ +CVE-2016-10114 - https://github.com/qemm/joomlasqli +CVE-2016-10114 - https://www.exploit-db.com/exploits/40973/ +CVE-2016-10127 - https://github.com/rohe/pysaml2/issues/366 +CVE-2016-1013 - https://www.exploit-db.com/exploits/39778/ +CVE-2016-10131 - https://gist.github.com/Zenexer/40d02da5e07f151adeaeeaa11af9ab36 +CVE-2016-10131 - https://github.com/bcit-ci/CodeIgniter/issues/4963 +CVE-2016-10133 - https://bugs.ghostscript.com/show_bug.cgi?id=697401 +CVE-2016-10134 - https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html +CVE-2016-10136 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html +CVE-2016-10137 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html +CVE-2016-10138 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html +CVE-2016-10139 - https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html +CVE-2016-1014 - http://packetstormsecurity.com/files/137532/Adobe-Flash-Player-DLL-Hijacking.html +CVE-2016-1014 - http://seclists.org/fulldisclosure/2016/Jun/39 +CVE-2016-10140 - http://seclists.org/bugtraq/2017/Feb/6 +CVE-2016-10140 - http://seclists.org/fulldisclosure/2017/Feb/11 +CVE-2016-10141 - https://bugs.ghostscript.com/show_bug.cgi?id=697448 +CVE-2016-10142 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 +CVE-2016-10144 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485 +CVE-2016-10145 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851483 +CVE-2016-10148 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html +CVE-2016-10149 - https://github.com/rohe/pysaml2/issues/366 +CVE-2016-10151 - https://github.com/achernya/hesiod/pull/9 +CVE-2016-10152 - https://github.com/achernya/hesiod/pull/10 +CVE-2016-10156 - https://bugzilla.suse.com/show_bug.cgi?id=1020601 +CVE-2016-10156 - https://www.exploit-db.com/exploits/41171/ +CVE-2016-10157 - https://packetstormsecurity.com/files/140366/Akamai-NetSession-1.9.3.1-DLL-Hijacking.html +CVE-2016-10161 - https://hackerone.com/reports/200909 +CVE-2016-10162 - https://hackerone.com/reports/195688 +CVE-2016-10164 - http://www.openwall.com/lists/oss-security/2017/01/22/2 +CVE-2016-10165 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-10173 - https://github.com/halostatue/minitar/issues/16 +CVE-2016-10174 - http://seclists.org/fulldisclosure/2016/Dec/72 +CVE-2016-10174 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt +CVE-2016-10174 - https://www.exploit-db.com/exploits/40949/ +CVE-2016-10174 - https://www.exploit-db.com/exploits/41719/ +CVE-2016-10175 - http://seclists.org/fulldisclosure/2016/Dec/72 +CVE-2016-10175 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt +CVE-2016-10175 - https://www.exploit-db.com/exploits/40949/ +CVE-2016-10176 - http://seclists.org/fulldisclosure/2016/Dec/72 +CVE-2016-10176 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt +CVE-2016-10176 - https://www.exploit-db.com/exploits/40949/ +CVE-2016-10177 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10178 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10179 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10180 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10181 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10182 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10183 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10184 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10185 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10186 - https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html +CVE-2016-10190 - https://trac.ffmpeg.org/ticket/5992 +CVE-2016-10192 - https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 +CVE-2016-10194 - https://github.com/spejman/festivaltts4r/issues/1 +CVE-2016-10196 - https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5 +CVE-2016-10196 - https://github.com/libevent/libevent/issues/318 +CVE-2016-10196 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2016-10197 - https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e +CVE-2016-10197 - https://github.com/libevent/libevent/issues/332 +CVE-2016-10198 - https://bugzilla.gnome.org/show_bug.cgi?id=775450 +CVE-2016-10199 - https://bugzilla.gnome.org/show_bug.cgi?id=775451 +CVE-2016-10208 - http://seclists.org/fulldisclosure/2016/Nov/75 +CVE-2016-10217 - https://bugs.ghostscript.com/show_bug.cgi?id=697456 +CVE-2016-10218 - https://bugs.ghostscript.com/show_bug.cgi?id=697444 +CVE-2016-10219 - https://bugs.ghostscript.com/show_bug.cgi?id=697453 +CVE-2016-10220 - https://bugs.ghostscript.com/show_bug.cgi?id=697450 +CVE-2016-10221 - https://bugs.ghostscript.com/show_bug.cgi?id=697400 +CVE-2016-10222 - https://bugs.webkit.org/show_bug.cgi?id=164123 +CVE-2016-10225 - http://www.openwall.com/lists/oss-security/2016/10/05/16 +CVE-2016-10226 - https://bugs.webkit.org/show_bug.cgi?id=165091 +CVE-2016-10228 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2016-10243 - https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/ +CVE-2016-10244 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-10249 - https://blogs.gentoo.org/ago/2016/10/23/jasper-heap-based-buffer-overflow-in-jpc_dec_tiledecode-jpc_dec-c/ +CVE-2016-10250 - https://blogs.gentoo.org/ago/2016/10/23/jasper-null-pointer-dereference-in-jp2_colr_destroy-jp2_cod-c-incomplete-fix-for-cve-2016-8887/ +CVE-2016-10251 - https://blogs.gentoo.org/ago/2016/11/04/jasper-use-of-uninitialized-value-in-jpc_pi_nextcprl-jpc_t2cod-c/ +CVE-2016-10251 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-10254 - https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/ +CVE-2016-10255 - https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ +CVE-2016-10266 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero +CVE-2016-10267 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-divide-by-zero +CVE-2016-10268 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10269 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10269 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10269 +CVE-2016-10270 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10271 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10271 - https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a +CVE-2016-10272 - https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ +CVE-2016-10272 - https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a +CVE-2016-10277 - https://www.exploit-db.com/exploits/42601/ +CVE-2016-10298 - http://www.securityfocus.com/bid/98874 +CVE-2016-10299 - http://www.securityfocus.com/bid/98874 +CVE-2016-10304 - https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/ +CVE-2016-10310 - https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/ +CVE-2016-10311 - https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/ +CVE-2016-10317 - https://bugs.ghostscript.com/show_bug.cgi?id=697459 +CVE-2016-10320 - http://seclists.org/oss-sec/2016/q4/442 +CVE-2016-10328 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-10332 - http://www.securityfocus.com/bid/98874 +CVE-2016-10333 - http://www.securityfocus.com/bid/98874 +CVE-2016-10334 - http://www.securityfocus.com/bid/98874 +CVE-2016-10335 - http://www.securityfocus.com/bid/98874 +CVE-2016-10336 - http://www.securityfocus.com/bid/98874 +CVE-2016-10337 - http://www.securityfocus.com/bid/98874 +CVE-2016-10338 - http://www.securityfocus.com/bid/98874 +CVE-2016-10339 - http://www.securityfocus.com/bid/98874 +CVE-2016-10340 - http://www.securityfocus.com/bid/98874 +CVE-2016-10341 - http://www.securityfocus.com/bid/98874 +CVE-2016-10342 - http://www.securityfocus.com/bid/98874 +CVE-2016-10349 - https://github.com/libarchive/libarchive/issues/834 +CVE-2016-10350 - https://github.com/libarchive/libarchive/issues/835 +CVE-2016-10362 - https://www.elastic.co/community/security +CVE-2016-10363 - https://www.elastic.co/community/security +CVE-2016-10364 - https://www.elastic.co/community/security +CVE-2016-10365 - https://www.elastic.co/community/security +CVE-2016-10366 - https://www.elastic.co/community/security +CVE-2016-10367 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-016/?fid=8341 +CVE-2016-10368 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-016/?fid=8341 +CVE-2016-10370 - https://alephsecurity.com/vulns/aleph-2017022 +CVE-2016-10372 - https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/ +CVE-2016-10372 - https://isc.sans.edu/forums/diary/TR069+NewNTPServer+Exploits+What+we+know+so+far/21763/ +CVE-2016-10378 - http://code610.blogspot.com/2016/09/sql-injection-in-latest-e107-cms.html +CVE-2016-10379 - http://code610.blogspot.com/2016/08/testing-sql-injections-in-comvirtuemart.html +CVE-2016-10380 - http://www.securityfocus.com/bid/103671 +CVE-2016-10381 - http://www.securityfocus.com/bid/103671 +CVE-2016-10384 - http://www.securityfocus.com/bid/103671 +CVE-2016-10385 - http://www.securityfocus.com/bid/103671 +CVE-2016-10386 - http://www.securityfocus.com/bid/103671 +CVE-2016-10387 - http://www.securityfocus.com/bid/103671 +CVE-2016-10390 - http://www.securityfocus.com/bid/103671 +CVE-2016-10392 - http://www.securityfocus.com/bid/103671 +CVE-2016-10396 - https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 +CVE-2016-10401 - https://www.exploit-db.com/exploits/43105/ +CVE-2016-10406 - http://www.securityfocus.com/bid/103671 +CVE-2016-10407 - http://www.securityfocus.com/bid/103671 +CVE-2016-10409 - http://www.securityfocus.com/bid/103671 +CVE-2016-10410 - http://www.securityfocus.com/bid/103671 +CVE-2016-10411 - http://www.securityfocus.com/bid/103671 +CVE-2016-10412 - http://www.securityfocus.com/bid/103671 +CVE-2016-10414 - http://www.securityfocus.com/bid/103671 +CVE-2016-10415 - http://www.securityfocus.com/bid/103671 +CVE-2016-10416 - http://www.securityfocus.com/bid/103671 +CVE-2016-10417 - http://www.securityfocus.com/bid/103671 +CVE-2016-10418 - http://www.securityfocus.com/bid/103671 +CVE-2016-10419 - http://www.securityfocus.com/bid/103671 +CVE-2016-10420 - http://www.securityfocus.com/bid/103671 +CVE-2016-10421 - http://www.securityfocus.com/bid/103671 +CVE-2016-10422 - http://www.securityfocus.com/bid/103671 +CVE-2016-10423 - http://www.securityfocus.com/bid/103671 +CVE-2016-10424 - http://www.securityfocus.com/bid/103671 +CVE-2016-10425 - http://www.securityfocus.com/bid/103671 +CVE-2016-10426 - http://www.securityfocus.com/bid/103671 +CVE-2016-10427 - http://www.securityfocus.com/bid/103671 +CVE-2016-10428 - http://www.securityfocus.com/bid/103671 +CVE-2016-10429 - http://www.securityfocus.com/bid/103671 +CVE-2016-10430 - http://www.securityfocus.com/bid/103671 +CVE-2016-10431 - http://www.securityfocus.com/bid/103671 +CVE-2016-10432 - http://www.securityfocus.com/bid/103671 +CVE-2016-10433 - http://www.securityfocus.com/bid/103671 +CVE-2016-10434 - http://www.securityfocus.com/bid/103671 +CVE-2016-10435 - http://www.securityfocus.com/bid/103671 +CVE-2016-10436 - http://www.securityfocus.com/bid/103671 +CVE-2016-10437 - http://www.securityfocus.com/bid/103671 +CVE-2016-10438 - http://www.securityfocus.com/bid/103671 +CVE-2016-10439 - http://www.securityfocus.com/bid/103671 +CVE-2016-10440 - http://www.securityfocus.com/bid/103671 +CVE-2016-10441 - http://www.securityfocus.com/bid/103671 +CVE-2016-10442 - http://www.securityfocus.com/bid/103671 +CVE-2016-10443 - http://www.securityfocus.com/bid/103671 +CVE-2016-10444 - http://www.securityfocus.com/bid/103671 +CVE-2016-10445 - http://www.securityfocus.com/bid/103671 +CVE-2016-10446 - http://www.securityfocus.com/bid/103671 +CVE-2016-10447 - http://www.securityfocus.com/bid/103671 +CVE-2016-10448 - http://www.securityfocus.com/bid/103671 +CVE-2016-10449 - http://www.securityfocus.com/bid/103671 +CVE-2016-10450 - http://www.securityfocus.com/bid/103671 +CVE-2016-10451 - http://www.securityfocus.com/bid/103671 +CVE-2016-10452 - http://www.securityfocus.com/bid/103671 +CVE-2016-10454 - http://www.securityfocus.com/bid/103671 +CVE-2016-10455 - http://www.securityfocus.com/bid/103671 +CVE-2016-10456 - http://www.securityfocus.com/bid/103671 +CVE-2016-10457 - http://www.securityfocus.com/bid/103671 +CVE-2016-10458 - http://www.securityfocus.com/bid/103671 +CVE-2016-10459 - http://www.securityfocus.com/bid/103671 +CVE-2016-10460 - http://www.securityfocus.com/bid/103671 +CVE-2016-10461 - http://www.securityfocus.com/bid/103671 +CVE-2016-10462 - http://www.securityfocus.com/bid/103671 +CVE-2016-10464 - http://www.securityfocus.com/bid/103671 +CVE-2016-10466 - http://www.securityfocus.com/bid/103671 +CVE-2016-10467 - http://www.securityfocus.com/bid/103671 +CVE-2016-10469 - http://www.securityfocus.com/bid/103671 +CVE-2016-10471 - http://www.securityfocus.com/bid/103671 +CVE-2016-10472 - http://www.securityfocus.com/bid/103671 +CVE-2016-10473 - http://www.securityfocus.com/bid/103671 +CVE-2016-10474 - http://www.securityfocus.com/bid/103671 +CVE-2016-10475 - http://www.securityfocus.com/bid/103671 +CVE-2016-10476 - http://www.securityfocus.com/bid/103671 +CVE-2016-10477 - http://www.securityfocus.com/bid/103671 +CVE-2016-10478 - http://www.securityfocus.com/bid/103671 +CVE-2016-10479 - http://www.securityfocus.com/bid/103671 +CVE-2016-10480 - http://www.securityfocus.com/bid/103671 +CVE-2016-10481 - http://www.securityfocus.com/bid/103671 +CVE-2016-10482 - http://www.securityfocus.com/bid/103671 +CVE-2016-10483 - http://www.securityfocus.com/bid/103671 +CVE-2016-10484 - http://www.securityfocus.com/bid/103671 +CVE-2016-10485 - http://www.securityfocus.com/bid/103671 +CVE-2016-10486 - http://www.securityfocus.com/bid/103671 +CVE-2016-10487 - http://www.securityfocus.com/bid/103671 +CVE-2016-10489 - http://www.securityfocus.com/bid/103671 +CVE-2016-10490 - http://www.securityfocus.com/bid/103671 +CVE-2016-10491 - http://www.securityfocus.com/bid/103671 +CVE-2016-10492 - http://www.securityfocus.com/bid/103671 +CVE-2016-10493 - http://www.securityfocus.com/bid/103671 +CVE-2016-10494 - http://www.securityfocus.com/bid/103671 +CVE-2016-10495 - http://www.securityfocus.com/bid/103671 +CVE-2016-10496 - http://www.securityfocus.com/bid/103671 +CVE-2016-10497 - http://www.securityfocus.com/bid/103671 +CVE-2016-10498 - http://www.securityfocus.com/bid/103671 +CVE-2016-10499 - http://www.securityfocus.com/bid/103671 +CVE-2016-10501 - http://www.securityfocus.com/bid/103671 +CVE-2016-10504 - https://github.com/uclouvain/openjpeg/issues/835 +CVE-2016-10504 - https://www.exploit-db.com/exploits/42600/ +CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/776 +CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/784 +CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/785 +CVE-2016-10505 - https://github.com/uclouvain/openjpeg/issues/792 +CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/731 +CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/732 +CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/777 +CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/778 +CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/779 +CVE-2016-10506 - https://github.com/uclouvain/openjpeg/issues/780 +CVE-2016-10507 - https://github.com/uclouvain/openjpeg/issues/833 +CVE-2016-10511 - https://hackerone.com/reports/168538 +CVE-2016-10512 - https://packetstormsecurity.com/files/139844/Multitech-RightFax-Faxfinder-Credential-Disclosure.html +CVE-2016-10513 - https://github.com/Piwigo/Piwigo/commit/9a93d1f44b06605af84520509e7a0e8b64ab0c05 +CVE-2016-10517 - https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES +CVE-2016-10517 - https://www.reddit.com/r/redis/comments/5r8wxn/redis_327_is_out_important_security_fixes_inside/ +CVE-2016-10518 - https://gist.github.com/c0nrad/e92005446c480707a74a +CVE-2016-10519 - https://github.com/feross/bittorrent-dht/issues/87 +CVE-2016-10523 - https://github.com/mqttjs/mqtt-packet/pull/8 +CVE-2016-10541 - https://github.com/advisories/GHSA-qg8p-v9q4-gh34 +CVE-2016-10547 - https://github.com/matt-/nunjucks_test +CVE-2016-10548 - https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9 +CVE-2016-10701 - http://jira.pentaho.com/browse/BISERVER-13207 +CVE-2016-10702 - https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ +CVE-2016-10705 - https://wpvulndb.com/vulnerabilities/8517 +CVE-2016-10706 - https://www.wordfence.com/blog/2016/05/jetpack-vulnerability/ +CVE-2016-10708 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2016-10709 - https://www.exploit-db.com/exploits/39709/ +CVE-2016-10710 - http://threat.tevora.com/biscom-secure-file-transfer-arbitrary-file-download/ +CVE-2016-10715 - https://packetstormsecurity.com/files/137648/JIRA-Artezio-Board-1.4-Cross-Site-Scripting-Information-Disclosure.html +CVE-2016-10716 - https://packetstormsecurity.com/files/137649/JIRA-Mail.ru-Calendar-2.4.2.50_JIRA6-Cross-Site-Scripting.html +CVE-2016-10717 - https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/ +CVE-2016-10717 - https://github.com/mspaling/mbam-exclusions-poc- +CVE-2016-10717 - https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt +CVE-2016-10717 - https://www.youtube.com/watch?v=LF5ic5nOoUY +CVE-2016-10718 - https://github.com/brave/browser-laptop/issues/5006 +CVE-2016-10718 - https://github.com/brave/browser-laptop/issues/5007 +CVE-2016-10718 - https://www.exploit-db.com/exploits/44475/ +CVE-2016-10719 - https://packetstormsecurity.com/files/138881/TP-Link-Archer-CR-700-Cross-Site-Scripting.html +CVE-2016-10721 - https://github.com/Thomas-Tsai/partclone/issues/82 +CVE-2016-10722 - https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/ +CVE-2016-10722 - https://github.com/Thomas-Tsai/partclone/issues/71 +CVE-2016-10728 - https://github.com/kirillwow/ids_bypass +CVE-2016-10729 - https://www.exploit-db.com/exploits/39217/ +CVE-2016-10730 - https://www.exploit-db.com/exploits/39244/ +CVE-2016-10735 - https://access.redhat.com/errata/RHSA-2020:0133 +CVE-2016-10736 - https://advisories.dxw.com/advisories/reflected-xss-in-social-pug-easy-social-share-buttons-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ +CVE-2016-10737 - https://www.exploit-db.com/exploits/40650 +CVE-2016-10738 - https://www.exploit-db.com/exploits/40620 +CVE-2016-10742 - https://support.zabbix.com/browse/ZBX-10272 +CVE-2016-10743 - http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html +CVE-2016-10745 - https://usn.ubuntu.com/4011-1/ +CVE-2016-10746 - https://github.com/libvirt/libvirt/compare/11288f5...8fd6867 +CVE-2016-10749 - https://github.com/DaveGamble/cJSON/issues/30 +CVE-2016-10749 - https://www.openwall.com/lists/oss-security/2016/11/07/2 +CVE-2016-10761 - https://www.kb.cert.org/vuls/id/981271 +CVE-2016-10763 - https://hackerone.com/reports/152958 +CVE-2016-1077 - http://packetstormsecurity.com/files/137035/Adobe-Reader-DC-15.010.20060-Memory-Corruption.html +CVE-2016-1077 - https://0patch.blogspot.com/2016/06/writing-0patch-for-acrobat-readers-use.html +CVE-2016-1077 - https://www.exploit-db.com/exploits/39799/ +CVE-2016-10861 - https://www.pentestpartners.com/security-blog/a-neet-csrf-to-reverse-shell-in-wi-fi-music-streamer/ +CVE-2016-10862 - https://www.pentestpartners.com/security-blog/a-neet-csrf-to-reverse-shell-in-wi-fi-music-streamer/ +CVE-2016-10864 - https://www.pentestpartners.com/security-blog/netgear-ex7000-wi-fi-range-extender-minor-xss-and-poor-password-handling/ +CVE-2016-10867 - https://wpvulndb.com/vulnerabilities/9736 +CVE-2016-10872 - https://wpvulndb.com/vulnerabilities/9738 +CVE-2016-10873 - https://wpvulndb.com/vulnerabilities/9739 +CVE-2016-10874 - https://wpvulndb.com/vulnerabilities/9739 +CVE-2016-10875 - https://wpvulndb.com/vulnerabilities/9740 +CVE-2016-10878 - https://wpvulndb.com/vulnerabilities/9741 +CVE-2016-10884 - https://wpvulndb.com/vulnerabilities/9744 +CVE-2016-10905 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2016-10905 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2016-10905 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36e4ad0316c017d5b271378ed9a1c9a4b77fab5f +CVE-2016-10906 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2016-10906 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c278c253f3d992c6994d08aa0efb2b6806ca396f +CVE-2016-10907 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d47964bfd471f0dd4c89f28556aec68bffa0020 +CVE-2016-10935 - https://wpvulndb.com/vulnerabilities/9825 +CVE-2016-10938 - https://advisories.dxw.com/advisories/copy-me-vulnerable-to-csrf-allowing-unauthenticated-attacker-to-copy-posts/ +CVE-2016-10938 - https://wpvulndb.com/vulnerabilities/8706 +CVE-2016-10939 - http://lenonleite.com.br/en/blog/2016/12/16/xtreme-locator-dealer-locator-plugin-wordpress-sql-injection/ +CVE-2016-10940 - http://lenonleite.com.br/en/2016/12/16/zm-gallery-1-plugin-wordpress-blind-injection/ +CVE-2016-10943 - http://lenonleite.com.br/en/2016/12/16/english-zx_csv-upload-1-plugin-wordpress-sql-injection/ +CVE-2016-10943 - https://wpvulndb.com/vulnerabilities/8702 +CVE-2016-10944 - https://advisories.dxw.com/advisories/csrf-vulnerability-in-multisite-post-duplicator-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can-do/ +CVE-2016-10945 - https://wpvulndb.com/vulnerabilities/8681 +CVE-2016-10946 - https://wpvulndb.com/vulnerabilities/8679 +CVE-2016-10947 - https://advisories.dxw.com/advisories/sql-injection-in-post-indexer-allows-super-admins-to-read-the-contents-of-the-database/ +CVE-2016-10948 - https://advisories.dxw.com/advisories/unserialisation-in-post-indexer-could-allow-man-in-the-middle-to-execute-arbitrary-code-in-some-circumstances/ +CVE-2016-10949 - https://advisories.dxw.com/advisories/sql-injection-and-unserialization-vulnerability-in-relevanssi-premium-could-allow-admins-to-execute-arbitrary-code-in-some-circumstances/ +CVE-2016-10950 - http://lenonleite.com.br/en/2016/11/10/sirv-1-3-1-plugin-for-wordpress/ +CVE-2016-10950 - https://wpvulndb.com/vulnerabilities/8673 +CVE-2016-10951 - http://lenonleite.com.br/en/2016/11/10/firestorm-shopping-cart-ecommerce-plugin-2-07-02-for-wordpress/ +CVE-2016-10951 - https://wpvulndb.com/vulnerabilities/8672 +CVE-2016-10952 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_quotes_collection_wordpress_plugin.html +CVE-2016-10952 - https://wpvulndb.com/vulnerabilities/8649 +CVE-2016-10953 - https://wpvulndb.com/vulnerabilities/8641 +CVE-2016-10954 - https://wpvulndb.com/vulnerabilities/8622 +CVE-2016-10955 - https://wpvulndb.com/vulnerabilities/8612 +CVE-2016-10956 - https://cxsecurity.com/issue/WLB-2016080220 +CVE-2016-10956 - https://wpvulndb.com/vulnerabilities/8609 +CVE-2016-10957 - https://wpvulndb.com/vulnerabilities/8607 +CVE-2016-10957 - https://www.saotn.org/wordpress-advisory-akal-theme-xss-vulnerability/ +CVE-2016-1096 - http://packetstormsecurity.com/files/137051/Adobe-Flash-MP4-File-Stack-Corruption.html +CVE-2016-1096 - https://www.exploit-db.com/exploits/39828/ +CVE-2016-10961 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_colorway_wordpress_theme.html +CVE-2016-10961 - https://wpvulndb.com/vulnerabilities/8568 +CVE-2016-10964 - https://rastating.github.io/dwnldr-1-0-stored-xss-disclosure/ +CVE-2016-10965 - https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ +CVE-2016-10966 - https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ +CVE-2016-10967 - https://mukarramkhalid.com/wordpress-real-3d-flipbook-plugin-exploit/ +CVE-2016-10968 - https://wordpress.org/plugins/peepso-core/#developers +CVE-2016-10972 - https://wpvulndb.com/vulnerabilities/8852 +CVE-2016-10972 - https://www.exploit-db.com/exploits/39894 +CVE-2016-10973 - https://wpvulndb.com/vulnerabilities/8614 +CVE-2016-10976 - https://wpvulndb.com/vulnerabilities/8497 +CVE-2016-10977 - https://wpvulndb.com/vulnerabilities/8491 +CVE-2016-10978 - https://wpvulndb.com/vulnerabilities/8486 +CVE-2016-10980 - https://www.openwall.com/lists/oss-security/2016/04/16/2 +CVE-2016-10983 - https://packetstormsecurity.com/files/136887/ +CVE-2016-10984 - https://0x62626262.wordpress.com/2016/04/21/echosign-plugin-for-wordpress-xss-vulnerability/ +CVE-2016-10984 - https://wpvulndb.com/vulnerabilities/8465 +CVE-2016-10985 - https://0x62626262.wordpress.com/2016/04/21/echosign-plugin-for-wordpress-xss-vulnerability/ +CVE-2016-10985 - https://wpvulndb.com/vulnerabilities/8465 +CVE-2016-10986 - https://0x62626262.wordpress.com/2016/04/21/tweet-wheel-xss-vulnerability/ +CVE-2016-10986 - https://wpvulndb.com/vulnerabilities/8464 +CVE-2016-10987 - https://0x62626262.wordpress.com/2016/04/21/persian-woocommerce-sms-xss-vulnerability/ +CVE-2016-10987 - https://wpvulndb.com/vulnerabilities/8463 +CVE-2016-10988 - https://wpvulndb.com/vulnerabilities/8457 +CVE-2016-10989 - https://wpvulndb.com/vulnerabilities/8457 +CVE-2016-10990 - https://wpvulndb.com/vulnerabilities/8430 +CVE-2016-10991 - https://wpvulndb.com/vulnerabilities/8426 +CVE-2016-10992 - https://packetstormsecurity.com/files/136445/ +CVE-2016-10992 - https://wpvulndb.com/vulnerabilities/8429 +CVE-2016-10993 - https://wpvulndb.com/vulnerabilities/8431 +CVE-2016-10993 - https://www.vulnerability-lab.com/get_content.php?id=1808 +CVE-2016-10994 - https://wpvulndb.com/vulnerabilities/8478 +CVE-2016-10994 - https://www.vulnerability-lab.com/get_content.php?id=1839 +CVE-2016-10995 - https://wpvulndb.com/vulnerabilities/8482 +CVE-2016-10997 - https://wpvulndb.com/vulnerabilities/8412 +CVE-2016-10997 - https://www.exploit-db.com/exploits/39552 +CVE-2016-10998 - https://wpvulndb.com/vulnerabilities/8425 +CVE-2016-10999 - https://www.vulnerability-lab.com/get_content.php?id=1771 +CVE-2016-11005 - https://rastating.github.io/instalinker-reflected-xss-information-disclosure/ +CVE-2016-11006 - https://wpvulndb.com/vulnerabilities/8378 +CVE-2016-11007 - https://wpvulndb.com/vulnerabilities/8378 +CVE-2016-11008 - https://wpvulndb.com/vulnerabilities/8378 +CVE-2016-11009 - https://wpvulndb.com/vulnerabilities/8378 +CVE-2016-1101 - http://packetstormsecurity.com/files/137052/Adobe-Flash-ATF-Processing-Heap-Overflow.html +CVE-2016-1101 - https://www.exploit-db.com/exploits/39827/ +CVE-2016-11010 - https://wpvulndb.com/vulnerabilities/8378 +CVE-2016-11011 - https://wpvulndb.com/vulnerabilities/8378 +CVE-2016-11012 - https://wpvulndb.com/vulnerabilities/8389 +CVE-2016-11013 - https://github.com/agentevolution/wp-listings/pull/52 +CVE-2016-11014 - https://cybersecurityworks.com/zerodays/cve-2016-11014-netgear.html +CVE-2016-11014 - https://github.com/cybersecurityworks/Disclosed/issues/14 +CVE-2016-11014 - https://lists.openwall.net/full-disclosure/2016/01/11/5 +CVE-2016-11014 - https://packetstormsecurity.com/files/135216/Netgear-1.0.0.24-Bypass-Improper-Session-Management.html +CVE-2016-11015 - https://cybersecurityworks.com/zerodays/cve-2016-11015-netgear.html +CVE-2016-11015 - https://github.com/cybersecurityworks/Disclosed/issues/13 +CVE-2016-11015 - https://lists.openwall.net/full-disclosure/2016/01/11/4 +CVE-2016-11015 - https://packetstormsecurity.com/files/135215/Netgear-1.0.0.24-Cross-Site-Request-Forgery.html +CVE-2016-11016 - https://cybersecurityworks.com/zerodays/cve-2016-11016-netgear.html +CVE-2016-11016 - https://github.com/cybersecurityworks/Disclosed/issues/12 +CVE-2016-11016 - https://lists.openwall.net/full-disclosure/2016/01/11/1 +CVE-2016-11016 - https://packetstormsecurity.com/files/135194/Netgear-1.0.0.24-Cross-Site-Scripting.html +CVE-2016-11017 - https://ctrlu.net/vuln/0002.html +CVE-2016-11017 - https://www.exploit-db.com/exploits/39564 +CVE-2016-1102 - http://packetstormsecurity.com/files/137053/Adobe-Flash-JXR-Processing-Out-Of-Bounds-Read.html +CVE-2016-1102 - https://www.exploit-db.com/exploits/39824/ +CVE-2016-11021 - https://www.exploit-db.com/exploits/39437 +CVE-2016-11022 - http://firmware.re/vulns/acsa-2015-002.php +CVE-2016-11025 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11026 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11027 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11028 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11029 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-1103 - http://packetstormsecurity.com/files/137054/Adobe-Flash-Raw-565-Texture-Processing-Overflow.html +CVE-2016-1103 - https://www.exploit-db.com/exploits/39826/ +CVE-2016-11030 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11031 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11032 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11033 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11034 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11035 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11036 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11038 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11039 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-1104 - http://packetstormsecurity.com/files/137055/Adobe-Flash-Object-Placing-Out-Of-Bounds-Read.html +CVE-2016-1104 - https://www.exploit-db.com/exploits/39825/ +CVE-2016-11040 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11041 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11042 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11043 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11044 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11045 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11046 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11047 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11048 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11049 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-1105 - http://packetstormsecurity.com/files/137056/Adobe-Flash-FileReference-Type-Confusion.html +CVE-2016-1105 - https://www.exploit-db.com/exploits/39829/ +CVE-2016-11050 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11052 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11053 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2016-11054 - https://kb.netgear.com/31245/DGN2200v4-Command-Execution-and-FTP-Insecure-Root-Directory-Security-Vulnerability +CVE-2016-11055 - https://kb.netgear.com/30114/NETGEAR-Product-Vulnerability-Advisory-CSRF-LocalFile-XSS +CVE-2016-11056 - https://kb.netgear.com/30275/ReadyNAS-Surveillance-Security-Vulnerability-Announcement +CVE-2016-11057 - https://kb.netgear.com/29960/NETGEAR-Product-Vulnerability-Advisory-Potential-security-issue-associated-with-remote-management +CVE-2016-1106 - http://packetstormsecurity.com/files/137057/Adobe-Flash-SetNative-Use-After-Free.html +CVE-2016-1106 - https://www.exploit-db.com/exploits/39831/ +CVE-2016-11060 - https://kb.netgear.com/31426/SSL-Renegotiation-Denial-of-Service-Vulnerability +CVE-2016-11062 - https://mattermost.com/security-updates/ +CVE-2016-11063 - https://mattermost.com/security-updates/ +CVE-2016-11064 - https://mattermost.com/security-updates/ +CVE-2016-11065 - https://mattermost.com/security-updates/ +CVE-2016-11066 - https://mattermost.com/security-updates/ +CVE-2016-11067 - https://mattermost.com/security-updates/ +CVE-2016-11068 - https://mattermost.com/security-updates/ +CVE-2016-11069 - https://mattermost.com/security-updates/ +CVE-2016-11070 - https://mattermost.com/security-updates/ +CVE-2016-11071 - https://mattermost.com/security-updates/ +CVE-2016-11072 - https://mattermost.com/security-updates/ +CVE-2016-11073 - https://mattermost.com/security-updates/ +CVE-2016-11074 - https://mattermost.com/security-updates/ +CVE-2016-11075 - https://mattermost.com/security-updates/ +CVE-2016-11076 - https://mattermost.com/security-updates/ +CVE-2016-11077 - https://mattermost.com/security-updates/ +CVE-2016-11078 - https://mattermost.com/security-updates/ +CVE-2016-11079 - https://mattermost.com/security-updates/ +CVE-2016-11080 - https://mattermost.com/security-updates/ +CVE-2016-11081 - https://mattermost.com/security-updates/ +CVE-2016-11082 - https://mattermost.com/security-updates/ +CVE-2016-11083 - https://mattermost.com/security-updates/ +CVE-2016-11084 - https://mattermost.com/security-updates/ +CVE-2016-11085 - https://security.dxw.com/advisories/csrfstored-xss-in-quiz-and-survey-master-formerly-quiz-master-next-allows-unauthenticated-attackers-to-do-almost-anything-an-admin-can/ +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-1181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-1181 - http://www.securityfocus.com/bid/91787 +CVE-2016-1181 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-1181 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-1181 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-1182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-1182 - http://www.securityfocus.com/bid/91787 +CVE-2016-1182 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-1182 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-1182 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-1183 - http://jvn.jp/en/jp/JVN74659077/index.html +CVE-2016-1209 - http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html +CVE-2016-1209 - http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities +CVE-2016-1209 - https://wpvulndb.com/vulnerabilities/8485 +CVE-2016-1234 - http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html +CVE-2016-1234 - http://seclists.org/fulldisclosure/2021/Sep/0 +CVE-2016-1240 - http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html +CVE-2016-1240 - http://packetstormsecurity.com/files/170857/Apache-Tomcat-On-Ubuntu-Log-Init-Privilege-Escalation.html +CVE-2016-1240 - https://www.exploit-db.com/exploits/40450/ +CVE-2016-1243 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248 +CVE-2016-1244 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248 +CVE-2016-1247 - http://packetstormsecurity.com/files/139750/Nginx-Debian-Based-Distros-Root-Privilege-Escalation.html +CVE-2016-1247 - http://seclists.org/fulldisclosure/2016/Nov/78 +CVE-2016-1247 - https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html +CVE-2016-1247 - https://www.exploit-db.com/exploits/40768/ +CVE-2016-1247 - https://www.youtube.com/watch?v=aTswN1k1fQs +CVE-2016-1248 - https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a +CVE-2016-1252 - http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html +CVE-2016-1252 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 +CVE-2016-1252 - https://www.exploit-db.com/exploits/40916/ +CVE-2016-1281 - http://seclists.org/fulldisclosure/2016/Jan/22 +CVE-2016-1283 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1283 - https://www.tenable.com/security/tns-2017-14 +CVE-2016-1285 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-1285 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1285 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1286 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1286 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1286 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1287 - http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html +CVE-2016-1287 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike +CVE-2016-1287 - https://www.exploit-db.com/exploits/39823/ +CVE-2016-1287 - https://www.kb.cert.org/vuls/id/327976 +CVE-2016-1291 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode +CVE-2016-1328 - https://www.exploit-db.com/exploits/39904/ +CVE-2016-1334 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-wap +CVE-2016-1336 - https://www.exploit-db.com/exploits/39904/ +CVE-2016-1337 - https://www.exploit-db.com/exploits/39904/ +CVE-2016-1415 - https://www.exploit-db.com/exploits/40509/ +CVE-2016-1417 - http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html +CVE-2016-1421 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp +CVE-2016-1421 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp +CVE-2016-1421 - https://www.tenable.com/security/research/tra-2020-24 +CVE-2016-1446 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms +CVE-2016-1447 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms1 +CVE-2016-1448 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms2 +CVE-2016-1449 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms3 +CVE-2016-1450 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms4 +CVE-2016-1464 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-meetings-player +CVE-2016-1464 - https://www.exploit-db.com/exploits/40508/ +CVE-2016-1489 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html +CVE-2016-1489 - http://seclists.org/fulldisclosure/2016/Jan/67 +CVE-2016-1489 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities +CVE-2016-1490 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html +CVE-2016-1490 - http://seclists.org/fulldisclosure/2016/Jan/67 +CVE-2016-1490 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities +CVE-2016-1491 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html +CVE-2016-1491 - http://seclists.org/fulldisclosure/2016/Jan/67 +CVE-2016-1491 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities +CVE-2016-1492 - http://packetstormsecurity.com/files/135378/Lenovo-ShareIT-Information-Disclosure-Hardcoded-Password.html +CVE-2016-1492 - http://seclists.org/fulldisclosure/2016/Jan/67 +CVE-2016-1492 - http://www.coresecurity.com/advisories/lenovo-shareit-multiple-vulnerabilities +CVE-2016-1493 - http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html +CVE-2016-1493 - http://seclists.org/fulldisclosure/2016/Jan/56 +CVE-2016-1493 - http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm +CVE-2016-1499 - http://packetstormsecurity.com/files/135158/ownCloud-8.2.1-8.1.4-8.0.9-Information-Exposure.html +CVE-2016-1499 - https://hackerone.com/reports/110655 +CVE-2016-1499 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-062.txt +CVE-2016-15002 - https://youtu.be/KKlwi-u6wyA +CVE-2016-15003 - https://vuldb.com/?id.97204 +CVE-2016-15003 - https://www.exploit-db.com/exploits/39803/ +CVE-2016-15003 - https://youtu.be/r06VwwJ9J4M +CVE-2016-1501 - https://hackerone.com/reports/85201 +CVE-2016-1501 - https://hackerone.com/reports/87505 +CVE-2016-15038 - https://www.exploit-db.com/exploits/40214 +CVE-2016-1513 - http://www.openoffice.org/security/cves/CVE-2016-1513.html +CVE-2016-1516 - https://github.com/opencv/opencv/issues/5956 +CVE-2016-1517 - https://github.com/opencv/opencv/issues/5956 +CVE-2016-1518 - http://packetstormsecurity.com/files/136280/Grandstream-Wave-1.0.1.26-Man-In-The-Middle.html +CVE-2016-1519 - http://packetstormsecurity.com/files/136290/Grandstream-Wave-1.0.1.26-TLS-Man-In-The-Middle.html +CVE-2016-1520 - http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html +CVE-2016-1521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1521 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-1522 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1522 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1523 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1523 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1523 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246093 +CVE-2016-1524 - http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html +CVE-2016-1524 - http://seclists.org/fulldisclosure/2016/Feb/30 +CVE-2016-1524 - http://www.kb.cert.org/vuls/id/777024 +CVE-2016-1524 - https://www.exploit-db.com/exploits/39412/ +CVE-2016-1525 - http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html +CVE-2016-1525 - http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html +CVE-2016-1525 - http://seclists.org/fulldisclosure/2016/Feb/30 +CVE-2016-1525 - http://www.kb.cert.org/vuls/id/777024 +CVE-2016-1525 - https://www.exploit-db.com/exploits/39412/ +CVE-2016-1525 - https://www.exploit-db.com/exploits/39515/ +CVE-2016-1526 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1531 - http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html +CVE-2016-1531 - https://www.exploit-db.com/exploits/39535/ +CVE-2016-1531 - https://www.exploit-db.com/exploits/39549/ +CVE-2016-1531 - https://www.exploit-db.com/exploits/39702/ +CVE-2016-1541 - http://www.kb.cert.org/vuls/id/862384 +CVE-2016-1541 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1541 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1542 - http://packetstormsecurity.com/files/136461/BMC-Server-Automation-BSA-RSCD-Agent-User-Enumeration.html +CVE-2016-1542 - https://www.exploit-db.com/exploits/43902/ +CVE-2016-1542 - https://www.exploit-db.com/exploits/43939/ +CVE-2016-1543 - http://packetstormsecurity.com/files/136462/BMC-Server-Automation-BSA-RSCD-Agent-Unauthorized-Password-Reset.html +CVE-2016-1543 - https://www.exploit-db.com/exploits/43902/ +CVE-2016-1543 - https://www.exploit-db.com/exploits/43939/ +CVE-2016-1546 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-1547 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1547 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1548 - http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-1548 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1548 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1548 - https://www.kb.cert.org/vuls/id/718152 +CVE-2016-1549 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1549 - http://www.talosintelligence.com/reports/TALOS-2016-0083/ +CVE-2016-1550 - http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-1550 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1550 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1550 - https://www.kb.cert.org/vuls/id/718152 +CVE-2016-1551 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-1555 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html +CVE-2016-1555 - https://www.exploit-db.com/exploits/45909/ +CVE-2016-1556 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html +CVE-2016-1557 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html +CVE-2016-1558 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html +CVE-2016-1559 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html +CVE-2016-1560 - http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html +CVE-2016-1561 - http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html +CVE-2016-1562 - http://www.kb.cert.org/vuls/id/713312 +CVE-2016-1564 - https://wpvulndb.com/vulnerabilities/8358 +CVE-2016-1566 - https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/ +CVE-2016-1575 - http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/ +CVE-2016-1575 - https://launchpad.net/bugs/1534961 +CVE-2016-1576 - http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ +CVE-2016-1576 - https://bugs.launchpad.net/bugs/1535150 +CVE-2016-1583 - http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html +CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-1583 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-1583 - https://www.exploit-db.com/exploits/39992/ +CVE-2016-1593 - http://packetstormsecurity.com/files/136717/Novell-ServiceDesk-Authenticated-File-Upload.html +CVE-2016-1593 - https://packetstormsecurity.com/files/136646 +CVE-2016-1593 - https://www.exploit-db.com/exploits/39687/ +CVE-2016-1593 - https://www.exploit-db.com/exploits/39708/ +CVE-2016-1594 - https://packetstormsecurity.com/files/136646 +CVE-2016-1594 - https://www.exploit-db.com/exploits/39687/ +CVE-2016-1595 - https://packetstormsecurity.com/files/136646 +CVE-2016-1595 - https://www.exploit-db.com/exploits/39687/ +CVE-2016-1596 - https://packetstormsecurity.com/files/136646 +CVE-2016-1596 - https://www.exploit-db.com/exploits/39687/ +CVE-2016-1606 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php +CVE-2016-1606 - https://cxsecurity.com/issue/WLB-2016050136 +CVE-2016-1607 - http://seclists.org/bugtraq/2016/Jul/119 +CVE-2016-1607 - https://www.exploit-db.com/exploits/40161/ +CVE-2016-1608 - http://seclists.org/bugtraq/2016/Jul/119 +CVE-2016-1608 - https://www.exploit-db.com/exploits/40161/ +CVE-2016-1609 - http://seclists.org/bugtraq/2016/Jul/119 +CVE-2016-1609 - https://www.exploit-db.com/exploits/40161/ +CVE-2016-1610 - http://seclists.org/bugtraq/2016/Jul/119 +CVE-2016-1610 - https://www.exploit-db.com/exploits/40161/ +CVE-2016-1611 - http://seclists.org/bugtraq/2016/Jul/119 +CVE-2016-1611 - https://www.exploit-db.com/exploits/40161/ +CVE-2016-1626 - https://codereview.chromium.org/1583233008 +CVE-2016-1713 - http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html +CVE-2016-1713 - https://www.exploit-db.com/exploits/44379/ +CVE-2016-1714 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1715 - https://kc.mcafee.com/corporate/index?page=content&id=SB10145 +CVE-2016-1719 - http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html +CVE-2016-1719 - http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html +CVE-2016-1719 - http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html +CVE-2016-1719 - http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html +CVE-2016-1719 - http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html +CVE-2016-1719 - http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html +CVE-2016-1719 - https://www.exploit-db.com/exploits/39359/ +CVE-2016-1719 - https://www.exploit-db.com/exploits/39360/ +CVE-2016-1719 - https://www.exploit-db.com/exploits/39361/ +CVE-2016-1719 - https://www.exploit-db.com/exploits/39362/ +CVE-2016-1719 - https://www.exploit-db.com/exploits/39363/ +CVE-2016-1719 - https://www.exploit-db.com/exploits/39364/ +CVE-2016-1720 - http://packetstormsecurity.com/files/135435/IOKit-Methods-Being-Called-Without-Locks-From-IOServiceClose.html +CVE-2016-1720 - https://www.exploit-db.com/exploits/39367/ +CVE-2016-1721 - http://packetstormsecurity.com/files/135444/iOS-OS-X-Kernel-Uninitialized-Variable-Code-Execution.html +CVE-2016-1721 - https://www.exploit-db.com/exploits/39358/ +CVE-2016-1723 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html +CVE-2016-1723 - http://www.securityfocus.com/bid/81263 +CVE-2016-1724 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html +CVE-2016-1724 - http://www.securityfocus.com/bid/81263 +CVE-2016-1725 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html +CVE-2016-1725 - http://www.securityfocus.com/bid/81263 +CVE-2016-1726 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html +CVE-2016-1726 - http://www.securityfocus.com/bid/81263 +CVE-2016-1727 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html +CVE-2016-1727 - http://www.securityfocus.com/bid/81263 +CVE-2016-1728 - http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html +CVE-2016-1728 - http://www.securityfocus.com/bid/81263 +CVE-2016-1741 - https://www.exploit-db.com/exploits/39615/ +CVE-2016-1743 - https://www.exploit-db.com/exploits/39675/ +CVE-2016-1744 - https://www.exploit-db.com/exploits/39616/ +CVE-2016-1749 - https://www.exploit-db.com/exploits/39607/ +CVE-2016-1755 - https://www.exploit-db.com/exploits/39614/ +CVE-2016-1757 - https://www.exploit-db.com/exploits/39595/ +CVE-2016-1757 - https://www.exploit-db.com/exploits/39741/ +CVE-2016-1762 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1762 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1767 - https://www.exploit-db.com/exploits/39633/ +CVE-2016-1768 - https://www.exploit-db.com/exploits/39634/ +CVE-2016-1769 - https://www.exploit-db.com/exploits/39635/ +CVE-2016-1793 - http://packetstormsecurity.com/files/137401/OS-X-AppleGraphicsDeviceControl-NULL-Pointer-Dereference.html +CVE-2016-1793 - https://www.exploit-db.com/exploits/39923/ +CVE-2016-1794 - http://packetstormsecurity.com/files/137402/OS-X-AppleMuxControl.kext-NULL-Pointer-Dereference.html +CVE-2016-1794 - https://www.exploit-db.com/exploits/39922/ +CVE-2016-1801 - https://www.kb.cert.org/vuls/id/877625 +CVE-2016-1803 - http://packetstormsecurity.com/files/137399/OS-X-CoreCaptureResponder-NULL-Pointer-Dereference.html +CVE-2016-1803 - https://www.exploit-db.com/exploits/39925/ +CVE-2016-1807 - http://packetstormsecurity.com/files/137395/OS-X-iOS-Kernel-IOHDIXControllerUserClient-Use-After-Free.html +CVE-2016-1807 - https://www.exploit-db.com/exploits/39929/ +CVE-2016-1813 - http://packetstormsecurity.com/files/137400/OS-X-IOAccelSharedUserClient2-page_off_resource-NULL-Pointer-Dereference.html +CVE-2016-1813 - https://www.exploit-db.com/exploits/39924/ +CVE-2016-1819 - http://packetstormsecurity.com/files/137396/OS-X-Kernel-Use-After-Free-From-IOAcceleratorFamily2-Bad-Locking.html +CVE-2016-1819 - https://www.exploit-db.com/exploits/39928/ +CVE-2016-1821 - https://www.exploit-db.com/exploits/39926/ +CVE-2016-1823 - http://packetstormsecurity.com/files/137397/OS-X-Kernel-Raw-Cast-Out-Of-Bounds-Read.html +CVE-2016-1823 - https://www.exploit-db.com/exploits/39927/ +CVE-2016-1833 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1833 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1833 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1834 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1834 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1834 - https://bugzilla.gnome.org/show_bug.cgi?id=763071 +CVE-2016-1835 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1835 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1835 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1836 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1836 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1836 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1837 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1837 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1837 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1838 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1838 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1838 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1839 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1839 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1839 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1839 - https://bugzilla.gnome.org/show_bug.cgi?id=758605 +CVE-2016-1840 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-1840 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-1840 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1840 - https://bugzilla.gnome.org/show_bug.cgi?id=757711 +CVE-2016-1846 - http://packetstormsecurity.com/files/137403/OS-X-GeForce.kext-NULL-Pointer-Dereference.html +CVE-2016-1846 - https://www.exploit-db.com/exploits/39920/ +CVE-2016-1848 - https://www.exploit-db.com/exploits/39839/ +CVE-2016-1854 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html +CVE-2016-1856 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html +CVE-2016-1857 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html +CVE-2016-1858 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html +CVE-2016-1859 - http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html +CVE-2016-1861 - https://www.exploit-db.com/exploits/39930/ +CVE-2016-1863 - http://www.securityfocus.com/bid/91828 +CVE-2016-1863 - https://www.exploit-db.com/exploits/40652/ +CVE-2016-1865 - http://www.securityfocus.com/bid/91828 +CVE-2016-1867 - http://www.openwall.com/lists/oss-security/2016/01/13/2 +CVE-2016-1867 - http://www.openwall.com/lists/oss-security/2016/01/13/6 +CVE-2016-1879 - http://packetstormsecurity.com/files/135369/FreeBSD-SCTP-ICMPv6-Denial-Of-Service.html +CVE-2016-1879 - https://www.exploit-db.com/exploits/39305/ +CVE-2016-1881 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-1885 - http://packetstormsecurity.com/files/136276/FreeBSD-Kernel-amd64_set_ldt-Heap-Overflow.html +CVE-2016-1885 - http://seclists.org/fulldisclosure/2016/Mar/56 +CVE-2016-1885 - http://www.coresecurity.com/advisories/freebsd-kernel-amd64setldt-heap-overflow +CVE-2016-1885 - https://www.exploit-db.com/exploits/39570/ +CVE-2016-1886 - http://cturt.github.io/SETFKEY.html +CVE-2016-1887 - http://cturt.github.io/sendmsg.html +CVE-2016-1897 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2016-1897 - https://www.kb.cert.org/vuls/id/772447 +CVE-2016-1898 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2016-1898 - https://www.kb.cert.org/vuls/id/772447 +CVE-2016-1903 - http://www.openwall.com/lists/oss-security/2016/01/14/8 +CVE-2016-1903 - https://bugs.php.net/bug.php?id=70976 +CVE-2016-1904 - http://www.openwall.com/lists/oss-security/2016/01/14/8 +CVE-2016-1904 - https://bugs.php.net/bug.php?id=71270 +CVE-2016-1905 - https://github.com/kubernetes/kubernetes/issues/19479 +CVE-2016-1906 - https://github.com/openshift/origin/pull/6576 +CVE-2016-1907 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2016-1907 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-1908 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1909 - http://packetstormsecurity.com/files/135225/FortiGate-OS-5.0.7-SSH-Backdoor.html +CVE-2016-1909 - https://www.exploit-db.com/exploits/39224/ +CVE-2016-1910 - https://www.exploit-db.com/exploits/43495/ +CVE-2016-1911 - http://seclists.org/fulldisclosure/2016/Apr/58 +CVE-2016-1912 - http://packetstormsecurity.com/files/135201/Dolibarr-3.8.3-Cross-Site-Scripting.html +CVE-2016-1912 - https://github.com/Dolibarr/dolibarr/issues/4341 +CVE-2016-1914 - http://seclists.org/fulldisclosure/2016/Feb/95 +CVE-2016-1914 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038033 +CVE-2016-1914 - https://www.exploit-db.com/exploits/39481/ +CVE-2016-1915 - http://seclists.org/fulldisclosure/2016/Feb/95 +CVE-2016-1915 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038033 +CVE-2016-1915 - https://www.exploit-db.com/exploits/39481/ +CVE-2016-1919 - http://packetstormsecurity.com/files/135303/Samsung-KNOX-1.0-Weak-eCryptFS-Key-Generation.html +CVE-2016-1923 - http://www.openwall.com/lists/oss-security/2016/01/18/4 +CVE-2016-1923 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-1924 - http://www.openwall.com/lists/oss-security/2016/01/18/4 +CVE-2016-1924 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-1926 - http://packetstormsecurity.com/files/135328/OpenVAS-Greenbone-Security-Assistant-Cross-Site-Scripting.html +CVE-2016-1929 - http://seclists.org/fulldisclosure/2016/Apr/59 +CVE-2016-1930 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1935 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1938 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-1938 - http://www.securityfocus.com/bid/91787 +CVE-2016-1941 - https://bugzilla.mozilla.org/show_bug.cgi?id=1116385 +CVE-2016-1942 - https://bugzilla.mozilla.org/show_bug.cgi?id=1189082 +CVE-2016-1943 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228590 +CVE-2016-1946 - https://bugzilla.mozilla.org/show_bug.cgi?id=1232069 +CVE-2016-1949 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245724 +CVE-2016-1950 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-1950 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-1950 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-1950 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1950 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1952 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1954 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1954 - https://bugzilla.mozilla.org/show_bug.cgi?id=1243178 +CVE-2016-1955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208946 +CVE-2016-1957 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1958 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1958 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228754 +CVE-2016-1959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1234949 +CVE-2016-1960 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1960 - https://www.exploit-db.com/exploits/42484/ +CVE-2016-1960 - https://www.exploit-db.com/exploits/44294/ +CVE-2016-1961 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1961 - https://bugzilla.mozilla.org/show_bug.cgi?id=1249377 +CVE-2016-1962 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1964 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1965 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1965 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245264 +CVE-2016-1966 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1966 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246054 +CVE-2016-1967 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246956 +CVE-2016-1973 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1974 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1974 - https://bugzilla.mozilla.org/show_bug.cgi?id=1228103 +CVE-2016-1977 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-1977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1248876 +CVE-2016-1978 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-1978 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1978 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1978 - http://www.securityfocus.com/bid/91787 +CVE-2016-1979 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-1979 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-1979 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-1979 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-1984 - http://seclists.org/fulldisclosure/2016/Jan/63 +CVE-2016-1984 - https://www.kb.cert.org/vuls/id/992624 +CVE-2016-20009 - https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ +CVE-2016-20010 - https://www.wordfence.com/blog/2016/06/vulnerability-ewww-image-optimizer/ +CVE-2016-20012 - https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097 +CVE-2016-20012 - https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185 +CVE-2016-20012 - https://rushter.com/blog/public-ssh-keys/ +CVE-2016-20016 - https://www.exploit-db.com/exploits/41471 +CVE-2016-20017 - https://www.exploit-db.com/exploits/44760 +CVE-2016-20018 - https://github.com/knex/knex/issues/1227 +CVE-2016-2004 - http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html +CVE-2016-2004 - http://packetstormsecurity.com/files/137341/HP-Data-Protector-Encrypted-Communication-Remote-Command-Execution.html +CVE-2016-2004 - http://www.kb.cert.org/vuls/id/267328 +CVE-2016-2004 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 +CVE-2016-2004 - https://www.exploit-db.com/exploits/39858/ +CVE-2016-2004 - https://www.exploit-db.com/exploits/39874/ +CVE-2016-2005 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 +CVE-2016-2006 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 +CVE-2016-2007 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 +CVE-2016-2008 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 +CVE-2016-2031 - http://packetstormsecurity.com/files/136997/Aruba-Authentication-Bypass-Insecure-Transport-Tons-Of-Issues.html +CVE-2016-2031 - http://seclists.org/fulldisclosure/2016/May/19 +CVE-2016-2032 - http://packetstormsecurity.com/files/136997/Aruba-Authentication-Bypass-Insecure-Transport-Tons-Of-Issues.html +CVE-2016-2032 - http://seclists.org/fulldisclosure/2016/May/19 +CVE-2016-2039 - https://github.com/phpmyadmin/phpmyadmin/commit/f20970d32c3dfdf82aef7b6c244da1f769043813 +CVE-2016-2046 - http://packetstormsecurity.com/files/135709/Sophos-UTM-9-Cross-Site-Scripting.html +CVE-2016-2046 - http://seclists.org/fulldisclosure/2016/Feb/60 +CVE-2016-2046 - http://www.halock.com/blog/cve-2016-2046-cross-site-scripting-sophos-utm-9/ +CVE-2016-2047 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-2047 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2047 - http://www.ubuntu.com/usn/USN-2953-1 +CVE-2016-2052 - https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5 +CVE-2016-2054 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html +CVE-2016-2055 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html +CVE-2016-2056 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html +CVE-2016-2056 - http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html +CVE-2016-2057 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html +CVE-2016-2058 - http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html +CVE-2016-2069 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2069 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2069 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2073 - http://www.openwall.com/lists/oss-security/2016/01/25/6 +CVE-2016-2073 - http://www.openwall.com/lists/oss-security/2016/01/26/7 +CVE-2016-2073 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2076 - http://www.vmware.com/security/advisories/VMSA-2016-0004.html +CVE-2016-2078 - http://packetstormsecurity.com/files/137189/VMWare-vSphere-Web-Client-6.0-Cross-Site-Scripting.html +CVE-2016-2085 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2016-2086 - http://www.securityfocus.com/bid/83282 +CVE-2016-2087 - http://packetstormsecurity.com/files/136564/Hexchat-IRC-Client-2.11.0-Directory-Traversal.html +CVE-2016-2087 - https://www.exploit-db.com/exploits/39656/ +CVE-2016-2089 - http://www.openwall.com/lists/oss-security/2016/01/28/4 +CVE-2016-2091 - http://www.openwall.com/lists/oss-security/2016/01/19/3 +CVE-2016-2098 - https://www.exploit-db.com/exploits/40086/ +CVE-2016-2099 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-2105 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html +CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-2105 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2105 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-2105 - http://www.securityfocus.com/bid/91787 +CVE-2016-2105 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-2106 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html +CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-2106 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2106 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-2106 - http://www.securityfocus.com/bid/91787 +CVE-2016-2106 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-2106 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 +CVE-2016-2107 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html +CVE-2016-2107 - http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2107 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-2107 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2107 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2107 - http://www.securityfocus.com/bid/91787 +CVE-2016-2107 - https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/ +CVE-2016-2107 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-2107 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 +CVE-2016-2107 - https://www.exploit-db.com/exploits/39768/ +CVE-2016-2108 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html +CVE-2016-2108 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-2108 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2108 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2108 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2108 - http://www.securityfocus.com/bid/91787 +CVE-2016-2108 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 +CVE-2016-2109 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html +CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-2109 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2109 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-2109 - http://www.securityfocus.com/bid/91787 +CVE-2016-2109 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-2109 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 +CVE-2016-2110 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2110 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2111 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2111 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2112 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2112 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2113 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2113 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2114 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2114 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2115 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2115 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2117 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2117 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-2117 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-2118 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2118 - http://www.ubuntu.com/usn/USN-2950-3 +CVE-2016-2118 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2016-2118 - https://www.kb.cert.org/vuls/id/813296 +CVE-2016-2119 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2126 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 +CVE-2016-2143 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2145 - https://github.com/UNINETT/mod_auth_mellon/pull/71 +CVE-2016-2146 - https://github.com/UNINETT/mod_auth_mellon/pull/71 +CVE-2016-2147 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2016-2147 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2016-2147 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2016-2147 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2016-2147 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2016-2147 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2016-2147 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2016-2148 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2016-2148 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2016-2148 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2016-2148 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2016-2148 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2016-2148 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2016-2148 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2016-2150 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2160 - https://github.com/openshift/origin/pull/7864 +CVE-2016-2163 - http://packetstormsecurity.com/files/136433/Apache-OpenMeetings-3.0.7-Cross-Site-Scripting.html +CVE-2016-2164 - http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html +CVE-2016-2166 - http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html +CVE-2016-2167 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-2168 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-2170 - http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html +CVE-2016-2171 - http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and +CVE-2016-2175 - http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html +CVE-2016-2176 - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html +CVE-2016-2176 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-2176 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-2176 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2176 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2176 - http://www.securityfocus.com/bid/91787 +CVE-2016-2176 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 +CVE-2016-2177 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2177 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2177 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2177 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2177 - http://www.ubuntu.com/usn/USN-3181-1 +CVE-2016-2177 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2177 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2178 - http://eprint.iacr.org/2016/594.pdf +CVE-2016-2178 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2178 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2178 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2178 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2178 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2178 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2179 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2179 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2179 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2179 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2180 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2180 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2180 - https://hackerone.com/reports/221789 +CVE-2016-2180 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2180 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2181 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2181 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2181 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2181 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2182 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2182 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2182 - https://hackerone.com/reports/221788 +CVE-2016-2182 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2182 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2183 - http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html +CVE-2016-2183 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-2183 - http://seclists.org/fulldisclosure/2017/May/105 +CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-2183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2183 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2183 - https://access.redhat.com/articles/2548661 +CVE-2016-2183 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us +CVE-2016-2183 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 +CVE-2016-2183 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-2183 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-2183 - https://kc.mcafee.com/corporate/index?page=content&id=SB10197 +CVE-2016-2183 - https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ +CVE-2016-2183 - https://sweet32.info/ +CVE-2016-2183 - https://www.exploit-db.com/exploits/42091/ +CVE-2016-2183 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-2183 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-2183 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-2183 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-2183 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-2183 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-2184 - http://seclists.org/bugtraq/2016/Mar/88 +CVE-2016-2184 - http://seclists.org/bugtraq/2016/Mar/89 +CVE-2016-2184 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-2184 - https://www.exploit-db.com/exploits/39555/ +CVE-2016-2185 - http://seclists.org/bugtraq/2016/Mar/90 +CVE-2016-2185 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-2185 - https://bugzilla.redhat.com/show_bug.cgi?id=1283362 +CVE-2016-2185 - https://bugzilla.redhat.com/show_bug.cgi?id=1283363 +CVE-2016-2186 - http://seclists.org/bugtraq/2016/Mar/85 +CVE-2016-2186 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-2187 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-2188 - http://seclists.org/bugtraq/2016/Mar/87 +CVE-2016-2188 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-2188 - https://www.exploit-db.com/exploits/39556/ +CVE-2016-2191 - http://packetstormsecurity.com/files/136553/Optipng-Invalid-Write.html +CVE-2016-2203 - http://packetstormsecurity.com/files/136758/Symantec-Brightmail-10.6.0-7-LDAP-Credential-Grabber.html +CVE-2016-2203 - https://www.exploit-db.com/exploits/39715/ +CVE-2016-2207 - https://www.exploit-db.com/exploits/40031/ +CVE-2016-2208 - https://www.exploit-db.com/exploits/39835/ +CVE-2016-2209 - https://www.exploit-db.com/exploits/40037/ +CVE-2016-2210 - https://www.exploit-db.com/exploits/40032/ +CVE-2016-2212 - http://karmainsecurity.com/KIS-2016-02 +CVE-2016-2212 - http://packetstormsecurity.com/files/135941/Magento-1.9.2.2-RSS-Feed-Information-Disclosure.html +CVE-2016-2212 - http://seclists.org/fulldisclosure/2016/Feb/105 +CVE-2016-2213 - http://git.videolan.org/?p=ffmpeg.git;a=commit;h=0aada30510d809bccfd539a90ea37b61188f2cb4 +CVE-2016-2216 - http://packetstormsecurity.com/files/135711/Node.js-HTTP-Response-Splitting.html +CVE-2016-2221 - https://wpvulndb.com/vulnerabilities/8377 +CVE-2016-2222 - https://wpvulndb.com/vulnerabilities/8376 +CVE-2016-2226 - https://www.exploit-db.com/exploits/42386/ +CVE-2016-2230 - http://www.kb.cert.org/vuls/id/544527 +CVE-2016-2231 - https://debihiga.wordpress.com/sa-whip/ +CVE-2016-2233 - http://packetstormsecurity.com/files/136563/Hexchat-IRC-Client-2.11.0-CAP-LS-Handling-Buffer-Overflow.html +CVE-2016-2233 - https://www.exploit-db.com/exploits/39657/ +CVE-2016-2242 - http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html +CVE-2016-2268 - http://packetstormsecurity.com/files/135617/Dell-SecureWorks-iOS-Certificate-Validation-Failure.html +CVE-2016-2270 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-2278 - https://www.exploit-db.com/exploits/39522/ +CVE-2016-2279 - https://www.exploit-db.com/exploits/44626/ +CVE-2016-2285 - http://seclists.org/fulldisclosure/2016/May/7 +CVE-2016-2286 - http://seclists.org/fulldisclosure/2016/May/7 +CVE-2016-2288 - https://www.exploit-db.com/exploits/39630/ +CVE-2016-2295 - http://seclists.org/fulldisclosure/2016/May/7 +CVE-2016-2296 - https://www.exploit-db.com/exploits/39822/ +CVE-2016-2314 - https://debihiga.wordpress.com/sa-ftp/ +CVE-2016-2315 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2315 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2317 - http://www.securityfocus.com/bid/83241 +CVE-2016-2318 - http://www.securityfocus.com/bid/83241 +CVE-2016-2324 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2324 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2326 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2016-2330 - http://www.ubuntu.com/usn/USN-2944-1 +CVE-2016-2334 - http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html +CVE-2016-2335 - http://www.talosintel.com/reports/TALOS-2016-0094/ +CVE-2016-2336 - http://www.talosintelligence.com/reports/TALOS-2016-0029/ +CVE-2016-2337 - http://www.talosintelligence.com/reports/TALOS-2016-0031/ +CVE-2016-2338 - http://www.talosintelligence.com/reports/TALOS-2016-0032/ +CVE-2016-2339 - http://www.talosintelligence.com/reports/TALOS-2016-0034/ +CVE-2016-2340 - http://www.kb.cert.org/vuls/id/279472 +CVE-2016-2342 - http://www.kb.cert.org/vuls/id/270232 +CVE-2016-2342 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2345 - http://packetstormsecurity.com/files/136293/Solarwinds-Dameware-Mini-Remote-Code-Execution.html +CVE-2016-2345 - http://www.kb.cert.org/vuls/id/897144 +CVE-2016-2345 - https://www.securifera.com/advisories/CVE-2016-2345 +CVE-2016-2346 - http://www.kb.cert.org/vuls/id/229047 +CVE-2016-2346 - https://adamcaudill.com/2016/02/02/plsql-developer-nonexistent-encryption/ +CVE-2016-2347 - http://www.talosintelligence.com/reports/TALOS-2016-0095/ +CVE-2016-2350 - http://www.kb.cert.org/vuls/id/505560 +CVE-2016-2351 - http://www.kb.cert.org/vuls/id/505560 +CVE-2016-2352 - http://www.kb.cert.org/vuls/id/505560 +CVE-2016-2353 - http://www.kb.cert.org/vuls/id/505560 +CVE-2016-2356 - https://www.youtube.com/watch?v=scckkI7CAW0 +CVE-2016-2357 - https://www.youtube.com/watch?v=scckkI7CAW0 +CVE-2016-2358 - https://www.youtube.com/watch?v=scckkI7CAW0 +CVE-2016-2359 - https://www.youtube.com/watch?v=scckkI7CAW0 +CVE-2016-2360 - https://www.youtube.com/watch?v=scckkI7CAW0 +CVE-2016-2362 - http://www.kb.cert.org/vuls/id/754056 +CVE-2016-2363 - http://www.kb.cert.org/vuls/id/754056 +CVE-2016-2364 - http://www.kb.cert.org/vuls/id/754056 +CVE-2016-2381 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2381 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2381 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2381 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-2381 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-2384 - http://www.securityfocus.com/bid/83256 +CVE-2016-2384 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2384 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2384 - https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384 +CVE-2016-2385 - http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html +CVE-2016-2385 - https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/ +CVE-2016-2385 - https://www.exploit-db.com/exploits/39638/ +CVE-2016-2386 - http://packetstormsecurity.com/files/137129/SAP-NetWeaver-AS-JAVA-7.5-SQL-Injection.html +CVE-2016-2386 - http://seclists.org/fulldisclosure/2016/May/56 +CVE-2016-2386 - https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/ +CVE-2016-2386 - https://github.com/vah13/SAP_exploit +CVE-2016-2386 - https://www.exploit-db.com/exploits/39840/ +CVE-2016-2386 - https://www.exploit-db.com/exploits/43495/ +CVE-2016-2387 - http://packetstormsecurity.com/files/137045/SAP-NetWeaver-AS-JAVA-7.4-Cross-Site-Scripting.html +CVE-2016-2387 - http://seclists.org/fulldisclosure/2016/May/39 +CVE-2016-2387 - https://erpscan.io/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/ +CVE-2016-2388 - http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html +CVE-2016-2388 - http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html +CVE-2016-2388 - https://www.exploit-db.com/exploits/39841/ +CVE-2016-2388 - https://www.exploit-db.com/exploits/43495/ +CVE-2016-2389 - http://packetstormsecurity.com/files/137046/SAP-MII-15.0-Directory-Traversal.html +CVE-2016-2389 - http://seclists.org/fulldisclosure/2016/May/40 +CVE-2016-2389 - https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/ +CVE-2016-2389 - https://www.exploit-db.com/exploits/39837/ +CVE-2016-2391 - http://www.securityfocus.com/bid/83263 +CVE-2016-2392 - http://www.securityfocus.com/bid/83274 +CVE-2016-2398 - http://www.kb.cert.org/vuls/id/418072 +CVE-2016-2399 - http://www.nemux.org/2016/02/23/libquicktime-1-2-4/ +CVE-2016-2399 - https://packetstormsecurity.com/files/135899/libquicktime-1.2.4-Integer-Overflow.html +CVE-2016-2399 - https://www.exploit-db.com/exploits/39487/ +CVE-2016-2402 - https://koz.io/pinning-cve-2016-2402/ +CVE-2016-2408 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40241/ +CVE-2016-2417 - https://www.exploit-db.com/exploits/39685/ +CVE-2016-2494 - http://packetstormsecurity.com/files/137404/Android-system-bin-sdcard-Stack-Buffer-Overflow.html +CVE-2016-2494 - https://www.exploit-db.com/exploits/39921/ +CVE-2016-2510 - https://github.com/frohoff/ysoserial/pull/13 +CVE-2016-2510 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-2511 - http://packetstormsecurity.com/files/135886/WebSVN-2.3.3-Cross-Site-Scripting.html +CVE-2016-2511 - http://seclists.org/fulldisclosure/2016/Feb/99 +CVE-2016-2512 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2513 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2516 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2516 - https://www.kb.cert.org/vuls/id/718152 +CVE-2016-2517 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2517 - https://www.kb.cert.org/vuls/id/718152 +CVE-2016-2518 - http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-2518 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2518 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2518 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2518 - https://www.kb.cert.org/vuls/id/718152 +CVE-2016-2519 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2519 - https://www.kb.cert.org/vuls/id/718152 +CVE-2016-2521 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2523 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-2525 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077 +CVE-2016-2526 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983 +CVE-2016-2527 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982 +CVE-2016-2528 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984 +CVE-2016-2530 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2531 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2532 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2533 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html +CVE-2016-2539 - https://packetstormsecurity.com/files/136109/ATutor-LMS-2.2.1-CSRF-Remote-Code-Execution.html +CVE-2016-2539 - https://www.exploit-db.com/exploits/39524/ +CVE-2016-2541 - https://fortiguard.com/zeroday/FG-VD-15-118 +CVE-2016-2542 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2016-2542 - https://www.tenable.com/security/tns-2019-08 +CVE-2016-2543 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2543 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2544 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2544 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2544 - https://bugzilla.redhat.com/show_bug.cgi?id=1311558 +CVE-2016-2545 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2545 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2546 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2546 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2547 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2547 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2548 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2548 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2549 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2549 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2550 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-2550 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2016-2555 - https://github.com/atutor/ATutor/commit/629b2c992447f7670a2fecc484abfad8c4c2d298 +CVE-2016-2555 - https://www.exploit-db.com/exploits/39514/ +CVE-2016-2560 - https://github.com/phpmyadmin/phpmyadmin/commit/ab1283e8366c97a155d4e9ae58628a248458ea32 +CVE-2016-2561 - https://github.com/phpmyadmin/phpmyadmin/commit/f33a42f1da9db943a67bda7d29f7dd91957a8e7e +CVE-2016-2563 - http://seclists.org/fulldisclosure/2016/Mar/22 +CVE-2016-2563 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563 +CVE-2016-2564 - https://medium.com/@iancarroll/bypassing-authentication-in-invision-power-board-with-cve-2016-2564-9a24ea3655f9 +CVE-2016-2569 - http://www.openwall.com/lists/oss-security/2016/02/26/2 +CVE-2016-2569 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt +CVE-2016-2569 - https://usn.ubuntu.com/3557-1/ +CVE-2016-2570 - http://www.openwall.com/lists/oss-security/2016/02/26/2 +CVE-2016-2570 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt +CVE-2016-2570 - https://usn.ubuntu.com/3557-1/ +CVE-2016-2571 - http://www.openwall.com/lists/oss-security/2016/02/26/2 +CVE-2016-2571 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt +CVE-2016-2571 - http://www.ubuntu.com/usn/USN-2921-1 +CVE-2016-2571 - https://usn.ubuntu.com/3557-1/ +CVE-2016-2572 - http://www.openwall.com/lists/oss-security/2016/02/26/2 +CVE-2016-2572 - http://www.squid-cache.org/Advisories/SQUID-2016_2.txt +CVE-2016-2774 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-2776 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2776 - https://www.exploit-db.com/exploits/40453/ +CVE-2016-2782 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-2782 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-2782 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2016-2782 - https://www.exploit-db.com/exploits/39539/ +CVE-2016-2783 - https://packetstormsecurity.com/files/138082/Avaya-VOSS-4.1.0.0-SPB-Traffic-Traversal.html +CVE-2016-2784 - http://packetstormsecurity.com/files/136897/CMS-Made-Simple-Cache-Poisoning.html +CVE-2016-2784 - http://seclists.org/fulldisclosure/2016/May/15 +CVE-2016-2784 - https://www.exploit-db.com/exploits/39760/ +CVE-2016-2790 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2791 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2792 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2793 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2794 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2795 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2796 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2797 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2798 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2799 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2800 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2801 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2802 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html +CVE-2016-2803 - http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html +CVE-2016-2804 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2804 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2804 - https://bugzilla.mozilla.org/show_bug.cgi?id=1240880 +CVE-2016-2805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2806 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2806 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2806 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2807 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2807 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2807 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2808 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2808 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2808 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246061 +CVE-2016-2809 - https://bugzilla.mozilla.org/show_bug.cgi?id=1212939 +CVE-2016-2810 - https://bugzilla.mozilla.org/show_bug.cgi?id=1229681 +CVE-2016-2811 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2811 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2811 - https://bugzilla.mozilla.org/show_bug.cgi?id=1252330 +CVE-2016-2812 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2812 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2814 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2814 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2814 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2816 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2816 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2816 - https://bugzilla.mozilla.org/show_bug.cgi?id=1223743 +CVE-2016-2817 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2817 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2818 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2818 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2819 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2819 - https://bugzilla.mozilla.org/show_bug.cgi?id=1270381 +CVE-2016-2819 - https://www.exploit-db.com/exploits/44293/ +CVE-2016-2820 - http://www.ubuntu.com/usn/USN-2936-1 +CVE-2016-2820 - http://www.ubuntu.com/usn/USN-2936-3 +CVE-2016-2820 - https://bugzilla.mozilla.org/show_bug.cgi?id=870870 +CVE-2016-2821 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2821 - https://bugzilla.mozilla.org/show_bug.cgi?id=1271460 +CVE-2016-2822 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2822 - https://bugzilla.mozilla.org/show_bug.cgi?id=1273129 +CVE-2016-2824 - https://bugzilla.mozilla.org/show_bug.cgi?id=1248580 +CVE-2016-2825 - https://bugzilla.mozilla.org/show_bug.cgi?id=1193093 +CVE-2016-2826 - https://bugzilla.mozilla.org/show_bug.cgi?id=1237219 +CVE-2016-2827 - https://bugzilla.mozilla.org/show_bug.cgi?id=1289085 +CVE-2016-2828 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2830 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2831 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2834 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-2834 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-2836 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2837 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2837 - https://bugzilla.mozilla.org/show_bug.cgi?id=1274637 +CVE-2016-2838 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2840 - http://packetstormsecurity.com/files/136543/Open-Xchange-7.8.0-Cross-Site-Scripting.html +CVE-2016-2842 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-2842 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 +CVE-2016-2842 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-2845 - http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html +CVE-2016-2847 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-2847 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-2847 - http://www.ubuntu.com/usn/USN-2948-2 +CVE-2016-2851 - http://seclists.org/fulldisclosure/2016/Mar/21 +CVE-2016-2851 - https://www.exploit-db.com/exploits/39550/ +CVE-2016-2851 - https://www.x41-dsec.de/lab/advisories/x41-2016-001-libotr/ +CVE-2016-2855 - http://packetstormsecurity.com/files/137025/Huawei-Mobile-Broadband-HL-Service-22.001.25.00.03-Local-Privilege-Escalation.html +CVE-2016-2855 - http://seclists.org/fulldisclosure/2016/May/34 +CVE-2016-2959 - http://www.securityfocus.com/bid/100599 +CVE-2016-2965 - http://www.securityfocus.com/bid/100599 +CVE-2016-2969 - http://www.securityfocus.com/bid/100599 +CVE-2016-2971 - http://www.securityfocus.com/bid/100599 +CVE-2016-2972 - http://www.securityfocus.com/bid/100599 +CVE-2016-2973 - http://www.securityfocus.com/bid/100599 +CVE-2016-2977 - http://www.securityfocus.com/bid/100599 +CVE-2016-2979 - http://www.securityfocus.com/bid/100599 +CVE-2016-3029 - http://www.ibm.com/support/docview.wss?uid=swg21995345 +CVE-2016-3053 - https://www.exploit-db.com/exploits/40709/ +CVE-2016-3062 - https://bugzilla.libav.org/show_bug.cgi?id=929 +CVE-2016-3063 - https://security.netapp.com/advisory/ntap-20160310-0004/ +CVE-2016-3068 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-3068 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3069 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-3069 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3074 - http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html +CVE-2016-3074 - http://seclists.org/fulldisclosure/2016/Apr/72 +CVE-2016-3074 - https://www.exploit-db.com/exploits/39736/ +CVE-2016-3078 - http://www.openwall.com/lists/oss-security/2016/04/28/1 +CVE-2016-3078 - https://www.exploit-db.com/exploits/39742/ +CVE-2016-3081 - http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html +CVE-2016-3081 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3081 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3081 - http://www.securityfocus.com/bid/91787 +CVE-2016-3081 - https://www.exploit-db.com/exploits/39756/ +CVE-2016-3085 - http://packetstormsecurity.com/files/137390/Apache-CloudStack-4.5.0-Authentication-Bypass.html +CVE-2016-3087 - https://www.exploit-db.com/exploits/39919/ +CVE-2016-3088 - https://www.exploit-db.com/exploits/42283/ +CVE-2016-3089 - http://packetstormsecurity.com/files/138313/Apache-OpenMeetings-3.1.0-Cross-Site-Scripting.html +CVE-2016-3092 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-3092 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-3092 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-3092 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3092 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-3094 - http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html +CVE-2016-3096 - https://github.com/ansible/ansible-modules-extras/pull/1941 +CVE-2016-3096 - https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4 +CVE-2016-3109 - http://packetstormsecurity.com/files/136781/Shopware-Remote-Code-Execution.html +CVE-2016-3109 - https://github.com/shopware/shopware/commit/d73e9031a5b2ab6e918eb86d1e2b2e873cd3558d +CVE-2016-3115 - http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html +CVE-2016-3115 - http://seclists.org/fulldisclosure/2016/Mar/46 +CVE-2016-3115 - http://seclists.org/fulldisclosure/2016/Mar/47 +CVE-2016-3115 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-3115 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3115 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3115 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115 +CVE-2016-3115 - https://www.exploit-db.com/exploits/39569/ +CVE-2016-3116 - http://packetstormsecurity.com/files/136251/Dropbear-SSHD-xauth-Command-Injection-Bypass.html +CVE-2016-3116 - http://seclists.org/fulldisclosure/2016/Mar/47 +CVE-2016-3116 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115 +CVE-2016-3128 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038913 +CVE-2016-3129 - http://support.blackberry.com/kb/articleDetail?articleNumber=000038814&language=None +CVE-2016-3132 - https://bugs.php.net/bug.php?id=71735 +CVE-2016-3134 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3134 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-3134 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-3134 - http://www.ubuntu.com/usn/USN-2932-1 +CVE-2016-3134 - https://code.google.com/p/google-security-research/issues/detail?id=758 +CVE-2016-3135 - http://www.ubuntu.com/usn/USN-2930-2 +CVE-2016-3135 - http://www.ubuntu.com/usn/USN-3056-1 +CVE-2016-3135 - https://code.google.com/p/google-security-research/issues/detail?id=758 +CVE-2016-3136 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3136 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3136 - https://bugzilla.redhat.com/show_bug.cgi?id=1283370 +CVE-2016-3136 - https://bugzilla.redhat.com/show_bug.cgi?id=1317007 +CVE-2016-3136 - https://www.exploit-db.com/exploits/39541/ +CVE-2016-3137 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3137 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3138 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3139 - https://bugzilla.redhat.com/show_bug.cgi?id=1283375 +CVE-2016-3139 - https://bugzilla.redhat.com/show_bug.cgi?id=1283377 +CVE-2016-3139 - https://www.exploit-db.com/exploits/39538/ +CVE-2016-3140 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3140 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3140 - https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f +CVE-2016-3140 - https://www.exploit-db.com/exploits/39537/ +CVE-2016-3141 - https://bugs.php.net/bug.php?id=71587 +CVE-2016-3142 - https://bugs.php.net/bug.php?id=71498 +CVE-2016-3147 - https://www.securifera.com/advisories/cve-2016-3147/ +CVE-2016-3149 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html +CVE-2016-3150 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html +CVE-2016-3151 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html +CVE-2016-3152 - http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html +CVE-2016-3156 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3156 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-3156 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3157 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3157 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3158 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3159 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3161 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 +CVE-2016-3172 - http://www.openwall.com/lists/oss-security/2016/03/10/13 +CVE-2016-3172 - http://www.openwall.com/lists/oss-security/2016/03/15/11 +CVE-2016-3173 - http://packetstormsecurity.com/files/137187/Open-Xchange-OX-AppSuite-7.8.0-XSS-Open-Redirect.html +CVE-2016-3174 - http://packetstormsecurity.com/files/137187/Open-Xchange-OX-AppSuite-7.8.0-XSS-Open-Redirect.html +CVE-2016-3183 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-3185 - https://bugs.php.net/bug.php?id=70081 +CVE-2016-3185 - https://bugs.php.net/bug.php?id=71610 +CVE-2016-3186 - https://bugzilla.redhat.com/show_bug.cgi?id=1319503 +CVE-2016-3186 - https://usn.ubuntu.com/3606-1/ +CVE-2016-3189 - http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html +CVE-2016-3189 - http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html +CVE-2016-3189 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3189 - https://seclists.org/bugtraq/2019/Aug/4 +CVE-2016-3189 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-3191 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3196 - http://seclists.org/fulldisclosure/2016/Aug/4 +CVE-2016-3196 - http://www.vulnerability-lab.com/get_content.php?id=1687 +CVE-2016-3216 - https://www.exploit-db.com/exploits/39990/ +CVE-2016-3219 - https://www.exploit-db.com/exploits/39993/ +CVE-2016-3220 - https://www.exploit-db.com/exploits/39991/ +CVE-2016-3222 - http://packetstormsecurity.com/files/140043/Microsoft-Edge-CBase-Scriptable-Private-Query-Interface-Memory-Corruption.html +CVE-2016-3222 - https://www.exploit-db.com/exploits/40880/ +CVE-2016-3223 - http://packetstormsecurity.com/files/138248/Microsoft-Windows-7-Group-Policy-Privilege-Escalation.html +CVE-2016-3223 - https://www.exploit-db.com/exploits/40219/ +CVE-2016-3225 - https://www.exploit-db.com/exploits/45562/ +CVE-2016-3235 - http://packetstormsecurity.com/files/137490/Microsoft-Visio-DLL-Hijacking.html +CVE-2016-3237 - https://www.exploit-db.com/exploits/40409/ +CVE-2016-3247 - http://blog.skylined.nl/20161118002.html +CVE-2016-3247 - http://seclists.org/fulldisclosure/2016/Nov/111 +CVE-2016-3247 - https://www.exploit-db.com/exploits/40797/ +CVE-2016-3288 - https://www.exploit-db.com/exploits/40253/ +CVE-2016-3301 - https://www.exploit-db.com/exploits/40255/ +CVE-2016-3303 - https://www.exploit-db.com/exploits/40256/ +CVE-2016-3304 - https://www.exploit-db.com/exploits/40257/ +CVE-2016-3309 - https://www.exploit-db.com/exploits/42960/ +CVE-2016-3310 - https://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 +CVE-2016-3313 - https://www.exploit-db.com/exploits/40224/ +CVE-2016-3316 - https://www.exploit-db.com/exploits/40238/ +CVE-2016-3321 - http://seclists.org/fulldisclosure/2016/Aug/44 +CVE-2016-3321 - https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html +CVE-2016-3324 - https://www.exploit-db.com/exploits/40748/ +CVE-2016-3325 - https://www.exploit-db.com/exploits/40747/ +CVE-2016-3351 - https://www.brokenbrowser.com/detecting-apps-mimetype-malware/ +CVE-2016-3357 - https://www.exploit-db.com/exploits/40406/ +CVE-2016-3371 - https://www.exploit-db.com/exploits/40429/ +CVE-2016-3373 - https://www.exploit-db.com/exploits/40430/ +CVE-2016-3374 - http://blog.malerisch.net/2016/09/microsoft--out-of-bounds-read-pdf-library-cve-2016-3374.html +CVE-2016-3387 - https://www.exploit-db.com/exploits/40607/ +CVE-2016-3388 - https://www.exploit-db.com/exploits/40606/ +CVE-2016-3403 - http://seclists.org/fulldisclosure/2017/Jan/30 +CVE-2016-3403 - https://sysdream.com/news/lab/2017-01-12-cve-2016-3403-multiple-csrf-in-zimbra-administration-interface/ +CVE-2016-3411 - https://www.exploit-db.com/exploits/45177/ +CVE-2016-3416 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3417 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3418 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3419 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3420 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3421 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3422 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3423 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3424 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3424 - http://www.securityfocus.com/bid/91787 +CVE-2016-3425 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3426 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3426 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3427 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3427 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3428 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3429 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3431 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3432 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3432 - http://www.securityfocus.com/bid/91787 +CVE-2016-3433 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3433 - http://www.securityfocus.com/bid/91787 +CVE-2016-3434 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3435 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3436 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3437 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3438 - http://packetstormsecurity.com/files/138564/Oracle-E-Business-Suite-12.2-Cross-Site-Scripting.html +CVE-2016-3438 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3439 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3440 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3440 - http://www.securityfocus.com/bid/91787 +CVE-2016-3441 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3442 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3443 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3444 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3444 - http://www.securityfocus.com/bid/91787 +CVE-2016-3445 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3445 - http://www.securityfocus.com/bid/91787 +CVE-2016-3446 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3446 - http://www.securityfocus.com/bid/91787 +CVE-2016-3447 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3448 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3448 - http://www.securityfocus.com/bid/91787 +CVE-2016-3449 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3450 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3450 - http://www.securityfocus.com/bid/91787 +CVE-2016-3451 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3451 - http://www.securityfocus.com/bid/91787 +CVE-2016-3452 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3452 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3452 - http://www.securityfocus.com/bid/91787 +CVE-2016-3453 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3453 - http://www.securityfocus.com/bid/91787 +CVE-2016-3454 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3455 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3456 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3457 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3458 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3458 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3458 - http://www.securityfocus.com/bid/91787 +CVE-2016-3459 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3459 - http://www.securityfocus.com/bid/91787 +CVE-2016-3460 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3461 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3462 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3463 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3464 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3465 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3466 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html +CVE-2016-3467 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3467 - http://www.securityfocus.com/bid/91787 +CVE-2016-3468 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3468 - http://www.securityfocus.com/bid/91787 +CVE-2016-3469 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3469 - http://www.securityfocus.com/bid/91787 +CVE-2016-3470 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3470 - http://www.securityfocus.com/bid/91787 +CVE-2016-3471 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3471 - http://www.securityfocus.com/bid/91787 +CVE-2016-3472 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3472 - http://www.securityfocus.com/bid/91787 +CVE-2016-3473 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3473 - https://www.exploit-db.com/exploits/40590/ +CVE-2016-3474 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3474 - http://www.securityfocus.com/bid/91787 +CVE-2016-3475 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3475 - http://www.securityfocus.com/bid/91787 +CVE-2016-3476 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3476 - http://www.securityfocus.com/bid/91787 +CVE-2016-3477 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3477 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3477 - http://www.securityfocus.com/bid/91787 +CVE-2016-3478 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3478 - http://www.securityfocus.com/bid/91787 +CVE-2016-3479 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3479 - http://www.securityfocus.com/bid/91787 +CVE-2016-3480 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3480 - http://www.securityfocus.com/bid/91787 +CVE-2016-3481 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3481 - http://www.securityfocus.com/bid/91787 +CVE-2016-3482 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3482 - http://www.securityfocus.com/bid/91787 +CVE-2016-3483 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3483 - http://www.securityfocus.com/bid/91787 +CVE-2016-3484 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3484 - http://www.securityfocus.com/bid/91787 +CVE-2016-3485 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3485 - http://www.securityfocus.com/bid/91787 +CVE-2016-3486 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3486 - http://www.securityfocus.com/bid/91787 +CVE-2016-3487 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3487 - http://www.securityfocus.com/bid/91787 +CVE-2016-3488 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3488 - http://www.securityfocus.com/bid/91787 +CVE-2016-3489 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3489 - http://www.securityfocus.com/bid/91787 +CVE-2016-3490 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3490 - http://www.securityfocus.com/bid/91787 +CVE-2016-3491 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3491 - http://www.securityfocus.com/bid/91787 +CVE-2016-3491 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 +CVE-2016-3492 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3493 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3493 - http://www.securityfocus.com/bid/91787 +CVE-2016-3494 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3494 - http://www.securityfocus.com/bid/91787 +CVE-2016-3495 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3496 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3496 - http://www.securityfocus.com/bid/91787 +CVE-2016-3497 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3497 - http://www.securityfocus.com/bid/91787 +CVE-2016-3498 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3498 - http://www.securityfocus.com/bid/91787 +CVE-2016-3499 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3499 - http://www.securityfocus.com/bid/91787 +CVE-2016-3500 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3500 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3500 - http://www.securityfocus.com/bid/91787 +CVE-2016-3501 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3501 - http://www.securityfocus.com/bid/91787 +CVE-2016-3502 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3502 - http://www.securityfocus.com/bid/91787 +CVE-2016-3503 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3503 - http://www.securityfocus.com/bid/91787 +CVE-2016-3504 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3504 - http://www.securityfocus.com/bid/91787 +CVE-2016-3505 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-3506 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-3506 - http://www.securityfocus.com/bid/91787 +CVE-2016-3507 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3507 - http://www.securityfocus.com/bid/91787 +CVE-2016-3508 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3508 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3508 - http://www.securityfocus.com/bid/91787 +CVE-2016-3509 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3509 - http://www.securityfocus.com/bid/91787 +CVE-2016-3510 - http://packetstormsecurity.com/files/152324/Oracle-Weblogic-Server-Deserialization-MarshalledObject-Remote-Code-Execution.html +CVE-2016-3510 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3510 - http://www.securityfocus.com/bid/91787 +CVE-2016-3511 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3511 - http://www.securityfocus.com/bid/91787 +CVE-2016-3512 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3512 - http://www.securityfocus.com/bid/91787 +CVE-2016-3513 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3513 - http://www.securityfocus.com/bid/91787 +CVE-2016-3514 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3514 - http://www.securityfocus.com/bid/91787 +CVE-2016-3515 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3515 - http://www.securityfocus.com/bid/91787 +CVE-2016-3516 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3516 - http://www.securityfocus.com/bid/91787 +CVE-2016-3517 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3517 - http://www.securityfocus.com/bid/91787 +CVE-2016-3518 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3518 - http://www.securityfocus.com/bid/91787 +CVE-2016-3519 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3519 - http://www.securityfocus.com/bid/91787 +CVE-2016-3520 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3520 - http://www.securityfocus.com/bid/91787 +CVE-2016-3521 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3521 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3521 - http://www.securityfocus.com/bid/91787 +CVE-2016-3522 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3522 - http://www.securityfocus.com/bid/91787 +CVE-2016-3523 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3523 - http://www.securityfocus.com/bid/91787 +CVE-2016-3524 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3524 - http://www.securityfocus.com/bid/91787 +CVE-2016-3525 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3525 - http://www.securityfocus.com/bid/91787 +CVE-2016-3526 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3526 - http://www.securityfocus.com/bid/91787 +CVE-2016-3527 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3527 - http://www.securityfocus.com/bid/91787 +CVE-2016-3528 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3528 - http://www.securityfocus.com/bid/91787 +CVE-2016-3529 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3529 - http://www.securityfocus.com/bid/91787 +CVE-2016-3530 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3530 - http://www.securityfocus.com/bid/91787 +CVE-2016-3531 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3531 - http://www.securityfocus.com/bid/91787 +CVE-2016-3532 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3532 - http://www.securityfocus.com/bid/91787 +CVE-2016-3532 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 +CVE-2016-3533 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3533 - http://www.securityfocus.com/bid/91787 +CVE-2016-3533 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 +CVE-2016-3534 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3534 - http://www.securityfocus.com/bid/91787 +CVE-2016-3534 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 +CVE-2016-3535 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3535 - http://www.securityfocus.com/bid/91787 +CVE-2016-3535 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 +CVE-2016-3536 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3536 - http://www.securityfocus.com/bid/91787 +CVE-2016-3536 - https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 +CVE-2016-3537 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3537 - http://www.securityfocus.com/bid/91787 +CVE-2016-3538 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3538 - http://www.securityfocus.com/bid/91787 +CVE-2016-3539 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3539 - http://www.securityfocus.com/bid/91787 +CVE-2016-3540 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3540 - http://www.securityfocus.com/bid/91787 +CVE-2016-3541 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3541 - http://www.securityfocus.com/bid/91787 +CVE-2016-3542 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3542 - http://www.securityfocus.com/bid/91787 +CVE-2016-3543 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3543 - http://www.securityfocus.com/bid/91787 +CVE-2016-3544 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3544 - http://www.securityfocus.com/bid/91787 +CVE-2016-3545 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3545 - http://www.securityfocus.com/bid/91787 +CVE-2016-3546 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3546 - http://www.securityfocus.com/bid/91787 +CVE-2016-3547 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3547 - http://www.securityfocus.com/bid/91787 +CVE-2016-3548 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3548 - http://www.securityfocus.com/bid/91787 +CVE-2016-3549 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3549 - http://www.securityfocus.com/bid/91787 +CVE-2016-3550 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3550 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3550 - http://www.securityfocus.com/bid/91787 +CVE-2016-3551 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3552 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3552 - http://www.securityfocus.com/bid/91787 +CVE-2016-3553 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3553 - http://www.securityfocus.com/bid/91787 +CVE-2016-3554 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3554 - http://www.securityfocus.com/bid/91787 +CVE-2016-3555 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3555 - http://www.securityfocus.com/bid/91787 +CVE-2016-3556 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3556 - http://www.securityfocus.com/bid/91787 +CVE-2016-3557 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3557 - http://www.securityfocus.com/bid/91787 +CVE-2016-3558 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3558 - http://www.securityfocus.com/bid/91787 +CVE-2016-3559 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3559 - http://www.securityfocus.com/bid/91787 +CVE-2016-3560 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3560 - http://www.securityfocus.com/bid/91787 +CVE-2016-3561 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3561 - http://www.securityfocus.com/bid/91787 +CVE-2016-3562 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-3563 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3563 - http://www.securityfocus.com/bid/91787 +CVE-2016-3564 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3564 - http://www.securityfocus.com/bid/91787 +CVE-2016-3565 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3565 - http://www.securityfocus.com/bid/91787 +CVE-2016-3566 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3566 - http://www.securityfocus.com/bid/91787 +CVE-2016-3567 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3567 - http://www.securityfocus.com/bid/91787 +CVE-2016-3568 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3568 - http://www.securityfocus.com/bid/91787 +CVE-2016-3569 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3569 - http://www.securityfocus.com/bid/91787 +CVE-2016-3570 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3570 - http://www.securityfocus.com/bid/91787 +CVE-2016-3571 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3571 - http://www.securityfocus.com/bid/91787 +CVE-2016-3572 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3572 - http://www.securityfocus.com/bid/91787 +CVE-2016-3573 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3573 - http://www.securityfocus.com/bid/91787 +CVE-2016-3574 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3574 - http://www.securityfocus.com/bid/91787 +CVE-2016-3575 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3575 - http://www.securityfocus.com/bid/91787 +CVE-2016-3576 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3576 - http://www.securityfocus.com/bid/91787 +CVE-2016-3577 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3577 - http://www.securityfocus.com/bid/91787 +CVE-2016-3578 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3578 - http://www.securityfocus.com/bid/91787 +CVE-2016-3579 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3579 - http://www.securityfocus.com/bid/91787 +CVE-2016-3580 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3580 - http://www.securityfocus.com/bid/91787 +CVE-2016-3581 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3581 - http://www.securityfocus.com/bid/91787 +CVE-2016-3582 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3582 - http://www.securityfocus.com/bid/91787 +CVE-2016-3583 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3583 - http://www.securityfocus.com/bid/91787 +CVE-2016-3584 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3584 - http://www.securityfocus.com/bid/91787 +CVE-2016-3585 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3585 - http://www.securityfocus.com/bid/91787 +CVE-2016-3586 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3586 - http://www.securityfocus.com/bid/91787 +CVE-2016-3587 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3587 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3587 - http://www.securityfocus.com/bid/91787 +CVE-2016-3588 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3588 - http://www.securityfocus.com/bid/91787 +CVE-2016-3589 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3589 - http://www.securityfocus.com/bid/91787 +CVE-2016-3590 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3590 - http://www.securityfocus.com/bid/91787 +CVE-2016-3591 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3591 - http://www.securityfocus.com/bid/91787 +CVE-2016-3592 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3592 - http://www.securityfocus.com/bid/91787 +CVE-2016-3593 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3593 - http://www.securityfocus.com/bid/91787 +CVE-2016-3594 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3594 - http://www.securityfocus.com/bid/91787 +CVE-2016-3595 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3595 - http://www.securityfocus.com/bid/91787 +CVE-2016-3596 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3596 - http://www.securityfocus.com/bid/91787 +CVE-2016-3597 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3597 - http://www.securityfocus.com/bid/91787 +CVE-2016-3598 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3598 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3598 - http://www.securityfocus.com/bid/91787 +CVE-2016-3606 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3606 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3606 - http://www.securityfocus.com/bid/91787 +CVE-2016-3607 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2016-3607 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3607 - http://www.securityfocus.com/bid/91787 +CVE-2016-3608 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3608 - http://www.securityfocus.com/bid/91787 +CVE-2016-3609 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3609 - http://www.securityfocus.com/bid/91787 +CVE-2016-3610 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3610 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3610 - http://www.securityfocus.com/bid/91787 +CVE-2016-3611 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3611 - http://www.securityfocus.com/bid/91787 +CVE-2016-3612 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3612 - http://www.securityfocus.com/bid/91787 +CVE-2016-3613 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3613 - http://www.securityfocus.com/bid/91787 +CVE-2016-3614 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3614 - http://www.securityfocus.com/bid/91787 +CVE-2016-3615 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-3615 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3615 - http://www.securityfocus.com/bid/91787 +CVE-2016-3627 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3627 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3627 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3628 - http://www.tibco.com/mk/advisory.jsp +CVE-2016-3630 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-3632 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3632 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3638 - http://packetstormsecurity.com/files/139096/SAP-SLDREG-Memory-Corruption.html +CVE-2016-3639 - http://packetstormsecurity.com/files/138428/SAP-HANA-1.00.091.00.1418659308-Information-Disclosure.html +CVE-2016-3642 - http://packetstormsecurity.com/files/137486/Solarwinds-Virtualization-Manager-6.3.1-Java-Deserialization.html +CVE-2016-3642 - http://seclists.org/fulldisclosure/2016/Jun/25 +CVE-2016-3642 - http://seclists.org/fulldisclosure/2016/Jun/29 +CVE-2016-3643 - http://packetstormsecurity.com/files/137487/Solarwinds-Virtualization-Manager-6.3.1-Privilege-Escalation.html +CVE-2016-3643 - http://seclists.org/fulldisclosure/2016/Jun/26 +CVE-2016-3643 - https://www.exploit-db.com/exploits/39967/ +CVE-2016-3644 - https://www.exploit-db.com/exploits/40034/ +CVE-2016-3645 - https://www.exploit-db.com/exploits/40035/ +CVE-2016-3646 - https://www.exploit-db.com/exploits/40036/ +CVE-2016-3652 - https://www.exploit-db.com/exploits/40041/ +CVE-2016-3653 - https://www.exploit-db.com/exploits/40041/ +CVE-2016-3658 - http://www.openwall.com/lists/oss-security/2016/04/08/12 +CVE-2016-3659 - http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html +CVE-2016-3659 - http://seclists.org/fulldisclosure/2016/Apr/4 +CVE-2016-3664 - http://packetstormsecurity.com/files/137020/Trend-Micro-Mobile-Security-Man-In-The-Middle.html +CVE-2016-3670 - http://packetstormsecurity.com/files/137279/Liferay-CE-Stored-Cross-Site-Scripting.html +CVE-2016-3670 - https://www.exploit-db.com/exploits/39880/ +CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-3672 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-3672 - https://www.exploit-db.com/exploits/39669/ +CVE-2016-3684 - http://packetstormsecurity.com/files/136172/SAP-Download-Manager-2.1.142-Weak-Encryption.html +CVE-2016-3684 - http://seclists.org/fulldisclosure/2016/Mar/20 +CVE-2016-3684 - http://www.coresecurity.com/advisories/sap-download-manager-password-weak-encryption +CVE-2016-3685 - http://packetstormsecurity.com/files/136172/SAP-Download-Manager-2.1.142-Weak-Encryption.html +CVE-2016-3685 - http://seclists.org/fulldisclosure/2016/Mar/20 +CVE-2016-3685 - http://www.coresecurity.com/advisories/sap-download-manager-password-weak-encryption +CVE-2016-3688 - http://packetstormsecurity.com/files/136548/DotCMS-3.3-SQL-Injection.html +CVE-2016-3688 - http://seclists.org/fulldisclosure/2016/Apr/11 +CVE-2016-3688 - http://seclists.org/fulldisclosure/2016/Apr/5 +CVE-2016-3689 - http://www.ubuntu.com/usn/USN-2970-1 +CVE-2016-3689 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3694 - http://packetstormsecurity.com/files/136734/modified-eCommerce-2.0.0.0-Rev-9678-SQL-Injection.html +CVE-2016-3694 - https://www.exploit-db.com/exploits/39710/ +CVE-2016-3697 - https://github.com/opencontainers/runc/pull/708 +CVE-2016-3698 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3698 - https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f +CVE-2016-3705 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3705 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3705 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3710 - http://rhn.redhat.com/errata/RHSA-2016-0725.html +CVE-2016-3710 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3710 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3712 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3714 - http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html +CVE-2016-3714 - http://www.openwall.com/lists/oss-security/2016/05/03/13 +CVE-2016-3714 - http://www.openwall.com/lists/oss-security/2016/05/03/18 +CVE-2016-3714 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3714 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3714 - https://imagetragick.com/ +CVE-2016-3714 - https://www.exploit-db.com/exploits/39767/ +CVE-2016-3714 - https://www.exploit-db.com/exploits/39791/ +CVE-2016-3714 - https://www.imagemagick.org/script/changelog.php +CVE-2016-3714 - https://www.kb.cert.org/vuls/id/250519 +CVE-2016-3715 - http://www.openwall.com/lists/oss-security/2016/05/03/18 +CVE-2016-3715 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3715 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3715 - https://www.exploit-db.com/exploits/39767/ +CVE-2016-3715 - https://www.imagemagick.org/script/changelog.php +CVE-2016-3716 - http://www.openwall.com/lists/oss-security/2016/05/03/18 +CVE-2016-3716 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3716 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3716 - https://www.exploit-db.com/exploits/39767/ +CVE-2016-3716 - https://www.imagemagick.org/script/changelog.php +CVE-2016-3717 - http://www.openwall.com/lists/oss-security/2016/05/03/18 +CVE-2016-3717 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3717 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3717 - https://www.exploit-db.com/exploits/39767/ +CVE-2016-3717 - https://www.imagemagick.org/script/changelog.php +CVE-2016-3718 - http://www.openwall.com/lists/oss-security/2016/05/03/18 +CVE-2016-3718 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-3718 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-3718 - https://www.exploit-db.com/exploits/39767/ +CVE-2016-3718 - https://www.imagemagick.org/script/changelog.php +CVE-2016-3721 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3722 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3723 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3724 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3725 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3726 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3727 - https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 +CVE-2016-3737 - https://www.tenable.com/security/research/tra-2016-22 +CVE-2016-3739 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-3739 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-3740 - https://0patch.blogspot.com/2016/07/0patching-foxit-readers-heap-buffer.html +CVE-2016-3861 - https://www.exploit-db.com/exploits/40354/ +CVE-2016-3912 - https://android.googlesource.com/platform/frameworks/base/+/6c049120c2d749f0c0289d822ec7d0aa692f55c5 +CVE-2016-3914 - https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/3a3a5d145d380deef2d5b7c3150864cd04be397f +CVE-2016-3943 - http://packetstormsecurity.com/files/136606/Panda-Endpoint-Administration-Agent-Privilege-Escalation.html +CVE-2016-3943 - https://www.exploit-db.com/exploits/39671/ +CVE-2016-3945 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3945 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3948 - https://usn.ubuntu.com/3557-1/ +CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-3951 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-3952 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ +CVE-2016-3953 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ +CVE-2016-3954 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ +CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-3955 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-3957 - https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/ +CVE-2016-3960 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3961 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-3961 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-3961 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-3962 - https://www.exploit-db.com/exploits/40120/ +CVE-2016-3963 - https://www.exploit-db.com/exploits/44721/ +CVE-2016-3968 - http://packetstormsecurity.com/files/136561/Sophos-Cyberoam-NG-Series-Cross-Site-Scripting.html +CVE-2016-3968 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5313.php +CVE-2016-3971 - http://seclists.org/fulldisclosure/2016/Apr/37 +CVE-2016-3972 - http://seclists.org/fulldisclosure/2016/Apr/36 +CVE-2016-3973 - http://packetstormsecurity.com/files/137579/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html +CVE-2016-3974 - http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html +CVE-2016-3974 - http://seclists.org/fulldisclosure/2016/Jun/41 +CVE-2016-3974 - https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/ +CVE-2016-3974 - https://www.exploit-db.com/exploits/39995/ +CVE-2016-3975 - http://packetstormsecurity.com/files/137529/SAP-NetWeaver-AS-JAVA-7.5-Cross-Site-Scripting.html +CVE-2016-3975 - http://seclists.org/fulldisclosure/2016/Jun/42 +CVE-2016-3975 - https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/ +CVE-2016-3976 - http://packetstormsecurity.com/files/137528/SAP-NetWeaver-AS-JAVA-7.5-Directory-Traversal.html +CVE-2016-3976 - http://seclists.org/fulldisclosure/2016/Jun/40 +CVE-2016-3976 - https://erpscan.io/advisories/erpscan-16-012/ +CVE-2016-3976 - https://launchpad.support.sap.com/#/notes/2234971 +CVE-2016-3976 - https://www.exploit-db.com/exploits/39996/ +CVE-2016-3977 - https://bugzilla.redhat.com/show_bug.cgi?id=1325771 +CVE-2016-3978 - http://seclists.org/fulldisclosure/2016/Mar/68 +CVE-2016-3979 - http://packetstormsecurity.com/files/137589/SAP-NetWeaver-AS-JAVA-7.4-icman-Denial-Of-Service.html +CVE-2016-3979 - https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/ +CVE-2016-3980 - http://packetstormsecurity.com/files/137591/SAP-NetWeaver-AS-JAVA-7.4-jstart-Denial-Of-Service.html +CVE-2016-3980 - https://erpscan.io/advisories/erpscan-16-018-sap-java-jstart-dos/ +CVE-2016-3984 - http://lab.mediaservice.net/advisory/2016-01-mcafee.txt +CVE-2016-3984 - http://seclists.org/fulldisclosure/2016/Mar/13 +CVE-2016-3984 - https://www.exploit-db.com/exploits/39531/ +CVE-2016-3986 - http://packetstormsecurity.com/files/136090/Avast-Authenticode-Parsing-Memory-Corruption.html +CVE-2016-3986 - https://www.exploit-db.com/exploits/39530/ +CVE-2016-3987 - http://blog.trendmicro.com/information-on-reported-vulnerabilities-in-trend-micro-password-manager/ +CVE-2016-3987 - http://packetstormsecurity.com/files/135222/TrendMicro-Node.js-HTTP-Server-Command-Execution.html +CVE-2016-3987 - https://www.exploit-db.com/exploits/39218/ +CVE-2016-3989 - https://www.exploit-db.com/exploits/40120/ +CVE-2016-3990 - http://bugzilla.maptools.org/show_bug.cgi?id=2544 +CVE-2016-3990 - http://www.openwall.com/lists/oss-security/2016/04/12/2 +CVE-2016-3990 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3990 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3991 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-3991 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-3996 - http://packetstormsecurity.com/files/136710/KNOX-2.3-Clipboard-Data-Disclosure.html +CVE-2016-4000 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-4000 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-4000 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-4000 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-4000 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-4000 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-4004 - https://www.exploit-db.com/exploits/39486/ +CVE-2016-4006 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4006 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268 +CVE-2016-4008 - http://www.openwall.com/lists/oss-security/2016/04/11/3 +CVE-2016-4010 - https://packetstormsecurity.com/files/137121/Magento-Unauthenticated-Arbitrary-File-Write.html +CVE-2016-4010 - https://packetstormsecurity.com/files/137312/Magento-2.0.6-Unserialize-Remote-Code-Execution.html +CVE-2016-4010 - https://www.exploit-db.com/exploits/39838/ +CVE-2016-4014 - http://packetstormsecurity.com/files/137919/SAP-NetWeaver-AS-JAVA-7.4-XXE-Injection.html +CVE-2016-4014 - http://seclists.org/fulldisclosure/2016/Jul/45 +CVE-2016-4014 - https://erpscan.io/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/ +CVE-2016-4015 - https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/ +CVE-2016-4016 - http://packetstormsecurity.com/files/137920/SAP-xMII-15-Cross-Site-Scripting.html +CVE-2016-4016 - http://seclists.org/fulldisclosure/2016/Jul/46 +CVE-2016-4016 - https://erpscan.io/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/ +CVE-2016-4021 - http://seclists.org/bugtraq/2016/Apr/99 +CVE-2016-4021 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt +CVE-2016-4025 - https://labs.nettitude.com/blog/escaping-avast-sandbox-using-single-ioctl-cve-2016-4025/ +CVE-2016-4027 - http://packetstormsecurity.com/files/137599/Open-Xchange-App-Suite-7.8.1-Information-Disclosure.html +CVE-2016-4029 - https://wpvulndb.com/vulnerabilities/8473 +CVE-2016-4030 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 +CVE-2016-4031 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 +CVE-2016-4032 - https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004 +CVE-2016-4051 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-4051 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4051 - http://www.securityfocus.com/bid/86788 +CVE-2016-4051 - http://www.securityfocus.com/bid/91787 +CVE-2016-4052 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-4052 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4052 - http://www.securityfocus.com/bid/86788 +CVE-2016-4052 - http://www.securityfocus.com/bid/91787 +CVE-2016-4053 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-4053 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4053 - http://www.securityfocus.com/bid/86788 +CVE-2016-4053 - http://www.securityfocus.com/bid/91787 +CVE-2016-4054 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4054 - http://www.securityfocus.com/bid/86788 +CVE-2016-4055 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-4055 - https://www.tenable.com/security/tns-2019-02 +CVE-2016-4068 - https://github.com/roundcube/roundcubemail/issues/4949 +CVE-2016-4070 - https://bugs.php.net/bug.php?id=71798 +CVE-2016-4070 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4071 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4071 - https://www.exploit-db.com/exploits/39645/ +CVE-2016-4072 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4075 - http://abhikafle.com.np/opera-url-spoofing-poc/ +CVE-2016-4078 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4079 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4080 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4081 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4082 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4085 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-4108 - http://packetstormsecurity.com/files/137058/Adobe-Flash-addProperty-Use-After-Free.html +CVE-2016-4108 - https://www.exploit-db.com/exploits/39830/ +CVE-2016-4117 - https://www.exploit-db.com/exploits/46339/ +CVE-2016-4119 - https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader +CVE-2016-4135 - https://www.exploit-db.com/exploits/40087/ +CVE-2016-4136 - https://www.exploit-db.com/exploits/40088/ +CVE-2016-4137 - https://www.exploit-db.com/exploits/40089/ +CVE-2016-4138 - https://www.exploit-db.com/exploits/40090/ +CVE-2016-4175 - https://www.exploit-db.com/exploits/40103/ +CVE-2016-4176 - https://www.exploit-db.com/exploits/40105/ +CVE-2016-4177 - https://www.exploit-db.com/exploits/40104/ +CVE-2016-4179 - https://www.exploit-db.com/exploits/40102/ +CVE-2016-4201 - https://www.exploit-db.com/exploits/40101/ +CVE-2016-4203 - https://www.exploit-db.com/exploits/40097/ +CVE-2016-4204 - https://www.exploit-db.com/exploits/40096/ +CVE-2016-4205 - https://www.exploit-db.com/exploits/40095/ +CVE-2016-4206 - https://www.exploit-db.com/exploits/40100/ +CVE-2016-4207 - https://www.exploit-db.com/exploits/40099/ +CVE-2016-4208 - https://www.exploit-db.com/exploits/40098/ +CVE-2016-4226 - https://www.exploit-db.com/exploits/40308/ +CVE-2016-4227 - https://www.exploit-db.com/exploits/40307/ +CVE-2016-4228 - https://www.exploit-db.com/exploits/40309/ +CVE-2016-4229 - http://packetstormsecurity.com/files/138531/Adobe-Flash-BitmapData.copyPixels-Use-After-Free.html +CVE-2016-4229 - https://www.exploit-db.com/exploits/40310/ +CVE-2016-4230 - http://packetstormsecurity.com/files/138532/Adobe-Flash-MovieClip-Transform-Use-After-Free.html +CVE-2016-4230 - https://www.exploit-db.com/exploits/40311/ +CVE-2016-4231 - https://www.exploit-db.com/exploits/40356/ +CVE-2016-4232 - https://www.exploit-db.com/exploits/40355/ +CVE-2016-4264 - http://legalhackers.com/advisories/Adobe-ColdFusion-11-XXE-Exploit-CVE-2016-4264.txt +CVE-2016-4264 - https://helpx.adobe.com/security/products/coldfusion/apsb16-30.html +CVE-2016-4264 - https://www.exploit-db.com/exploits/40346/ +CVE-2016-4271 - https://blog.bjornweb.nl/2017/02/flash-bypassing-local-sandbox-data-exfiltration-credentials-leak/ +CVE-2016-4273 - https://www.exploit-db.com/exploits/40510/ +CVE-2016-4275 - https://www.exploit-db.com/exploits/40421/ +CVE-2016-4289 - http://www.talosintelligence.com/reports/TALOS-2016-0127/ +CVE-2016-4293 - http://www.talosintelligence.com/reports/TALOS-2016-0148/ +CVE-2016-4294 - http://www.talosintelligence.com/reports/TALOS-2016-0149/ +CVE-2016-4295 - http://www.talosintelligence.com/reports/TALOS-2016-0150/ +CVE-2016-4296 - http://www.talosintelligence.com/reports/TALOS-2016-0151/ +CVE-2016-4298 - http://www.talosintelligence.com/reports/TALOS-2016-0144/ +CVE-2016-4300 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4300 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4301 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4301 - http://www.talosintel.com/reports/TALOS-2016-0153/ +CVE-2016-4302 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4302 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4302 - https://github.com/libarchive/libarchive/issues/719 +CVE-2016-4303 - http://www.talosintelligence.com/reports/TALOS-2016-0164/ +CVE-2016-4304 - http://www.talosintelligence.com/reports/TALOS-2016-0166/ +CVE-2016-4305 - http://www.talosintelligence.com/reports/TALOS-2016-0167/ +CVE-2016-4306 - http://www.talosintelligence.com/reports/TALOS-2016-0168/ +CVE-2016-4307 - http://www.talosintelligence.com/reports/TALOS-2016-0169/ +CVE-2016-4309 - http://hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt +CVE-2016-4309 - http://packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html +CVE-2016-4309 - https://www.exploit-db.com/exploits/39983/ +CVE-2016-4311 - http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt +CVE-2016-4311 - http://packetstormsecurity.com/files/138329/WSO2-Identity-Server-5.1.0-XML-Injection.html +CVE-2016-4311 - https://www.exploit-db.com/exploits/40239/ +CVE-2016-4312 - http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt +CVE-2016-4312 - http://packetstormsecurity.com/files/138329/WSO2-Identity-Server-5.1.0-XML-Injection.html +CVE-2016-4312 - https://www.exploit-db.com/exploits/40239/ +CVE-2016-4313 - http://packetstormsecurity.com/files/137031/eXtplorer-2.1.9-Path-Traversal.html +CVE-2016-4313 - https://www.exploit-db.com/exploits/39816/ +CVE-2016-4314 - http://packetstormsecurity.com/files/138330/WSO2-Carbon-4.4.5-Local-File-Inclusion.html +CVE-2016-4314 - https://www.exploit-db.com/exploits/40240/ +CVE-2016-4315 - http://packetstormsecurity.com/files/138332/WSO2-Carbon-4.4.5-Cross-Site-Request-Forgery-Denial-Of-Service.html +CVE-2016-4315 - https://www.exploit-db.com/exploits/40242/ +CVE-2016-4316 - http://packetstormsecurity.com/files/138331/WSO2-Carbon-4.4.5-Cross-Site-Scripting.html +CVE-2016-4316 - https://www.exploit-db.com/exploits/40241/ +CVE-2016-4322 - http://packetstormsecurity.com/files/138600/BMC-BladeLogic-Server-Automation-For-Linux-8.7-Directory-Dump.html +CVE-2016-4325 - http://www.kb.cert.org/vuls/id/785823 +CVE-2016-4326 - http://www.kb.cert.org/vuls/id/586503 +CVE-2016-4327 - http://packetstormsecurity.com/files/137073/WSO2-SOA-Enablement-Server-Cross-Site-Scripting.html +CVE-2016-4329 - http://www.talosintelligence.com/reports/TALOS-2016-0175/ +CVE-2016-4330 - http://www.talosintelligence.com/reports/TALOS-2016-0176/ +CVE-2016-4331 - http://www.talosintelligence.com/reports/TALOS-2016-0177/ +CVE-2016-4332 - http://www.talosintelligence.com/reports/TALOS-2016-0178/ +CVE-2016-4333 - http://www.talosintelligence.com/reports/TALOS-2016-0179/ +CVE-2016-4335 - http://www.talosintelligence.com/reports/TALOS-2016-0172/ +CVE-2016-4336 - http://www.talosintelligence.com/reports/TALOS-2016-0173/ +CVE-2016-4337 - http://packetstormsecurity.com/files/137734/Ktools-Photostore-4.7.5-Blind-SQL-Injection.html +CVE-2016-4337 - https://www.exploit-db.com/exploits/40046/ +CVE-2016-4338 - http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html +CVE-2016-4338 - http://seclists.org/fulldisclosure/2016/May/9 +CVE-2016-4338 - https://www.exploit-db.com/exploits/39769/ +CVE-2016-4340 - http://packetstormsecurity.com/files/138368/GitLab-Impersonate-Privilege-Escalation.html +CVE-2016-4340 - https://www.exploit-db.com/exploits/40236/ +CVE-2016-4342 - https://bugs.php.net/bug.php?id=71354 +CVE-2016-4342 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4343 - https://bugs.php.net/bug.php?id=71331 +CVE-2016-4343 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4344 - https://bugs.php.net/bug.php?id=71637 +CVE-2016-4345 - https://bugs.php.net/bug.php?id=71637 +CVE-2016-4346 - https://bugs.php.net/bug.php?id=71637 +CVE-2016-4360 - https://www.tenable.com/security/research/tra-2016-17 +CVE-2016-4361 - https://www.tenable.com/security/research/tra-2016-26 +CVE-2016-4372 - https://www.exploit-db.com/exploits/42756/ +CVE-2016-4384 - https://www.tenable.com/security/research/tra-2016-26 +CVE-2016-4385 - https://www.tenable.com/security/research/tra-2016-27 +CVE-2016-4393 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4394 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4395 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4395 - https://www.tenable.com/security/research/tra-2016-32 +CVE-2016-4396 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4396 - https://www.tenable.com/security/research/tra-2016-32 +CVE-2016-4417 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4418 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4421 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4425 - https://github.com/akheron/jansson/issues/282 +CVE-2016-4428 - https://bugs.launchpad.net/horizon/+bug/1567673 +CVE-2016-4429 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2016-4430 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-4431 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-4432 - http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html +CVE-2016-4433 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-4436 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-4437 - http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html +CVE-2016-4437 - http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html +CVE-2016-4438 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-4447 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4447 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4447 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4448 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4448 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4448 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4449 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-4449 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4449 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4463 - http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html +CVE-2016-4463 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-4463 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-4465 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-4469 - http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html +CVE-2016-4469 - http://seclists.org/fulldisclosure/2016/Jul/37 +CVE-2016-4469 - https://www.exploit-db.com/exploits/40109/ +CVE-2016-4470 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4470 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4470 - http://www.ubuntu.com/usn/USN-3052-1 +CVE-2016-4470 - http://www.ubuntu.com/usn/USN-3056-1 +CVE-2016-4472 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2016-4472 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-4476 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2016-4477 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2016-4478 - http://www.openwall.com/lists/oss-security/2016/05/03/1 +CVE-2016-4480 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4483 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4484 - http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html +CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-4485 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-4486 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-4486 - https://www.exploit-db.com/exploits/46006/ +CVE-2016-4491 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 +CVE-2016-4509 - https://ics-cert.us-cert.gov/advisories/ICSA-16-182-01 +CVE-2016-4512 - https://ics-cert.us-cert.gov/advisories/ICSA-16-182-01 +CVE-2016-4534 - http://packetstormsecurity.com/files/download/136089/mcafeevses-bypass.html +CVE-2016-4534 - http://seclists.org/fulldisclosure/2016/Mar/13 +CVE-2016-4534 - https://lab.mediaservice.net/advisory/2016-01-mcafee.txt +CVE-2016-4534 - https://www.exploit-db.com/exploits/39531/ +CVE-2016-4535 - http://packetstormsecurity.com/files/136907/McAfee-Relocation-Processing-Memory-Corruption.html +CVE-2016-4535 - https://www.exploit-db.com/exploits/39770/ +CVE-2016-4537 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4538 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4539 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4540 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4541 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4542 - https://bugs.php.net/bug.php?id=72094 +CVE-2016-4542 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4543 - https://bugs.php.net/bug.php?id=72094 +CVE-2016-4543 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-4544 - https://bugs.php.net/bug.php?id=72094 +CVE-2016-4553 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4554 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4555 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4556 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4557 - https://www.exploit-db.com/exploits/40759/ +CVE-2016-4560 - http://www-01.ibm.com/support/docview.wss?uid=swg21985483 +CVE-2016-4562 - http://www.imagemagick.org/script/changelog.php +CVE-2016-4562 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4562 - https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950 +CVE-2016-4563 - http://www.imagemagick.org/script/changelog.php +CVE-2016-4563 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4563 - https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950 +CVE-2016-4564 - http://www.imagemagick.org/script/changelog.php +CVE-2016-4564 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4564 - https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950 +CVE-2016-4565 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-4565 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4565 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4565 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-4565 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-4565 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-4566 - https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e +CVE-2016-4566 - https://wpvulndb.com/vulnerabilities/8489 +CVE-2016-4567 - https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c +CVE-2016-4567 - https://wpvulndb.com/vulnerabilities/8488 +CVE-2016-4568 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab +CVE-2016-4578 - https://www.exploit-db.com/exploits/46529/ +CVE-2016-4581 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4581 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3000-1 +CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3002-1 +CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3003-1 +CVE-2016-4581 - http://www.ubuntu.com/usn/USN-3004-1 +CVE-2016-4582 - http://www.securityfocus.com/bid/91828 +CVE-2016-4583 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4585 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4586 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4587 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4588 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4589 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4590 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4591 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4592 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4622 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4623 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4624 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4625 - https://www.exploit-db.com/exploits/40653/ +CVE-2016-4625 - https://www.exploit-db.com/exploits/40669/ +CVE-2016-4651 - http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html +CVE-2016-4655 - https://www.exploit-db.com/exploits/44836/ +CVE-2016-4656 - https://www.exploit-db.com/exploits/44836/ +CVE-2016-4657 - https://www.exploit-db.com/exploits/44836/ +CVE-2016-4657 - https://www.youtube.com/watch?v=xkdPjbaLngE +CVE-2016-4669 - http://packetstormsecurity.com/files/158874/Safari-Webkit-For-iOS-7.1.2-JIT-Optimization-Bug.html +CVE-2016-4669 - https://www.exploit-db.com/exploits/40654/ +CVE-2016-4676 - https://packetstormsecurity.com/files/cve/CVE-2016-4676 +CVE-2016-4758 - http://mksben.l0.cm/2016/09/safari-uxss-showModalDialog.html +CVE-2016-4788 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40208 +CVE-2016-4793 - http://legalhackers.com/advisories/CakePHP-IP-Spoofing-Vulnerability.txt +CVE-2016-4793 - https://www.exploit-db.com/exploits/39813/ +CVE-2016-4794 - http://www.ubuntu.com/usn/USN-3056-1 +CVE-2016-4796 - https://github.com/uclouvain/openjpeg/issues/774 +CVE-2016-4796 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-4797 - https://github.com/uclouvain/openjpeg/issues/733 +CVE-2016-4797 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-4800 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-4803 - http://seclists.org/fulldisclosure/2016/May/69 +CVE-2016-4803 - https://dotcms.com/docs/latest/change-log#release-3.3.2 +CVE-2016-4803 - https://security.elarlang.eu/cve-2016-4803-dotcms-email-header-injection-vulnerability-full-disclosure.html +CVE-2016-4805 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4805 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-4806 - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html +CVE-2016-4806 - https://www.exploit-db.com/exploits/39821/ +CVE-2016-4807 - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html +CVE-2016-4807 - https://www.exploit-db.com/exploits/39821/ +CVE-2016-4808 - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html +CVE-2016-4808 - https://www.exploit-db.com/exploits/39821/ +CVE-2016-4809 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4833 - https://wpvulndb.com/vulnerabilities/8580 +CVE-2016-4838 - http://www.sourcenext.com/support/i/160725_1 +CVE-2016-4839 - http://www.sourcenext.com/support/i/160725_1 +CVE-2016-4855 - https://github.com/ADOdb/ADOdb/issues/274 +CVE-2016-4913 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4913 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-4945 - http://packetstormsecurity.com/files/137221/Citrix-Netscaler-11.0-Build-64.35-Cross-Site-Scripting.html +CVE-2016-4951 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4951 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-4953 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-4953 - http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html +CVE-2016-4953 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-4954 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-4954 - http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html +CVE-2016-4954 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-4955 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-4955 - http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html +CVE-2016-4955 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-4956 - http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-4956 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-4957 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html +CVE-2016-4959 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 +CVE-2016-4959 - http://www.tripwire.com/state-of-security/vulnerability-management/warning-this-post-contains-graphic-nvidia-content/ +CVE-2016-4960 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 +CVE-2016-4961 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 +CVE-2016-4962 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-4965 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities +CVE-2016-4965 - https://www.kb.cert.org/vuls/id/724487 +CVE-2016-4966 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities +CVE-2016-4966 - https://www.kb.cert.org/vuls/id/724487 +CVE-2016-4967 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities +CVE-2016-4967 - https://www.kb.cert.org/vuls/id/724487 +CVE-2016-4968 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities +CVE-2016-4968 - https://www.kb.cert.org/vuls/id/724487 +CVE-2016-4969 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities +CVE-2016-4969 - https://www.kb.cert.org/vuls/id/724487 +CVE-2016-4971 - http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html +CVE-2016-4971 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-4971 - https://www.exploit-db.com/exploits/40064/ +CVE-2016-4974 - http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html +CVE-2016-4975 - https://hackerone.com/reports/409512 +CVE-2016-4978 - https://access.redhat.com/errata/RHSA-2017:1835 +CVE-2016-4978 - https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf +CVE-2016-4979 - http://packetstormsecurity.com/files/137771/Apache-2.4.20-X509-Authentication-Bypass.html +CVE-2016-4979 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-4989 - http://seclists.org/oss-sec/2016/q2/574 +CVE-2016-4997 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4997 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-4997 - https://www.exploit-db.com/exploits/40435/ +CVE-2016-4997 - https://www.exploit-db.com/exploits/40489/ +CVE-2016-4998 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-4998 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-5000 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-5003 - http://www.openwall.com/lists/oss-security/2020/01/24/2 +CVE-2016-5005 - http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html +CVE-2016-5005 - http://seclists.org/fulldisclosure/2016/Jul/38 +CVE-2016-5017 - http://packetstormsecurity.com/files/138755/ZooKeeper-3.4.8-3.5.2-Buffer-Overflow.html +CVE-2016-5017 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-5018 - http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html +CVE-2016-5018 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-5019 - http://packetstormsecurity.com/files/138920/Apache-MyFaces-Trinidad-Information-Disclosure.html +CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-5019 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-5019 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-5019 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-5025 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 +CVE-2016-5027 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5028 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5028 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5029 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5029 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5030 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5030 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5031 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5031 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5032 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5032 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5033 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5033 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5034 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5034 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5035 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5035 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5036 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5036 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5037 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5037 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5038 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5038 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5039 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5039 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5040 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5040 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5041 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5041 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5042 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5042 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5043 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5043 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5044 - http://www.openwall.com/lists/oss-security/2016/05/24/1 +CVE-2016-5044 - https://www.prevanders.net/dwarfbug.html +CVE-2016-5048 - http://www.kb.cert.org/vuls/id/294272 +CVE-2016-5049 - http://www.kb.cert.org/vuls/id/294272 +CVE-2016-5050 - http://www.kb.cert.org/vuls/id/294272 +CVE-2016-5051 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5052 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5053 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5054 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5055 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5056 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5057 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5058 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5059 - https://community.rapid7.com/community/infosec/blog/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059 +CVE-2016-5060 - http://packetstormsecurity.com/files/137469/nGrinder-3.3-Cross-Site-Scripting.html +CVE-2016-5060 - http://seclists.org/fulldisclosure/2016/Jun/23 +CVE-2016-5061 - http://www.kb.cert.org/vuls/id/706359 +CVE-2016-5062 - http://www.kb.cert.org/vuls/id/706359 +CVE-2016-5063 - https://www.exploit-db.com/exploits/43902/ +CVE-2016-5063 - https://www.exploit-db.com/exploits/43934/ +CVE-2016-5080 - http://packetstormsecurity.com/files/137970/Objective-Systems-Inc.-ASN1C-For-C-C-Heap-Memory-Corruption.html +CVE-2016-5080 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-5081 - http://www.kb.cert.org/vuls/id/301735 +CVE-2016-5084 - http://www.kb.cert.org/vuls/id/884840 +CVE-2016-5084 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS +CVE-2016-5085 - http://www.kb.cert.org/vuls/id/884840 +CVE-2016-5085 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS +CVE-2016-5086 - http://www.kb.cert.org/vuls/id/884840 +CVE-2016-5086 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS +CVE-2016-5093 - https://bugs.php.net/bug.php?id=72241 +CVE-2016-5094 - https://bugs.php.net/bug.php?id=72135 +CVE-2016-5095 - https://bugs.php.net/bug.php?id=72135 +CVE-2016-5102 - https://usn.ubuntu.com/3606-1/ +CVE-2016-5104 - http://www.ubuntu.com/usn/USN-3026-1 +CVE-2016-5118 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5118 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-5119 - https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html +CVE-2016-5124 - http://packetstormsecurity.com/files/137894/Open-Xchange-App-Suite-7.8.1-Cross-Site-Scripting.html +CVE-2016-5126 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5134 - https://www.kb.cert.org/vuls/id/877625 +CVE-2016-5180 - https://c-ares.haxx.se/adv_20160929.html +CVE-2016-5195 - http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html +CVE-2016-5195 - http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html +CVE-2016-5195 - http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html +CVE-2016-5195 - http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html +CVE-2016-5195 - http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html +CVE-2016-5195 - http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html +CVE-2016-5195 - http://rhn.redhat.com/errata/RHSA-2016-2126.html +CVE-2016-5195 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux +CVE-2016-5195 - http://www.openwall.com/lists/oss-security/2022/03/07/1 +CVE-2016-5195 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-5195 - https://bugzilla.redhat.com/show_bug.cgi?id=1384344 +CVE-2016-5195 - https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs +CVE-2016-5195 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2016-5195 - https://www.exploit-db.com/exploits/40611/ +CVE-2016-5195 - https://www.exploit-db.com/exploits/40616/ +CVE-2016-5195 - https://www.exploit-db.com/exploits/40839/ +CVE-2016-5195 - https://www.exploit-db.com/exploits/40847/ +CVE-2016-5203 - http://www.securityfocus.com/bid/94633 +CVE-2016-5204 - http://www.securityfocus.com/bid/94633 +CVE-2016-5205 - http://www.securityfocus.com/bid/94633 +CVE-2016-5206 - http://www.securityfocus.com/bid/94633 +CVE-2016-5207 - http://www.securityfocus.com/bid/94633 +CVE-2016-5208 - http://www.securityfocus.com/bid/94633 +CVE-2016-5209 - http://www.securityfocus.com/bid/94633 +CVE-2016-5210 - http://www.securityfocus.com/bid/94633 +CVE-2016-5211 - http://www.securityfocus.com/bid/94633 +CVE-2016-5212 - http://www.securityfocus.com/bid/94633 +CVE-2016-5213 - http://www.securityfocus.com/bid/94633 +CVE-2016-5214 - http://www.securityfocus.com/bid/94633 +CVE-2016-5215 - http://www.securityfocus.com/bid/94633 +CVE-2016-5216 - http://www.securityfocus.com/bid/94633 +CVE-2016-5217 - http://www.securityfocus.com/bid/94633 +CVE-2016-5218 - http://www.securityfocus.com/bid/94633 +CVE-2016-5219 - http://www.securityfocus.com/bid/94633 +CVE-2016-5220 - http://www.securityfocus.com/bid/94633 +CVE-2016-5221 - http://www.securityfocus.com/bid/94633 +CVE-2016-5222 - http://www.securityfocus.com/bid/94633 +CVE-2016-5223 - http://www.securityfocus.com/bid/94633 +CVE-2016-5224 - http://www.securityfocus.com/bid/94633 +CVE-2016-5225 - http://www.securityfocus.com/bid/94633 +CVE-2016-5226 - http://www.securityfocus.com/bid/94633 +CVE-2016-5228 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php +CVE-2016-5228 - https://cxsecurity.com/issue/WLB-2016050136 +CVE-2016-5228 - https://www.exploit-db.com/exploits/40649/ +CVE-2016-5229 - http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html +CVE-2016-5237 - https://packetstormsecurity.com/files/137343/Valve-Steam-3.42.16.13-Local-Privilege-Escalation.html +CVE-2016-5237 - https://www.exploit-db.com/exploits/39888/ +CVE-2016-5239 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-5240 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html +CVE-2016-5243 - http://www.ubuntu.com/usn/USN-3052-1 +CVE-2016-5243 - http://www.ubuntu.com/usn/USN-3056-1 +CVE-2016-5244 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-5248 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-012/?fid=8073 +CVE-2016-5249 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-012/?fid=8073 +CVE-2016-5252 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5253 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246944 +CVE-2016-5254 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5257 - https://bugzilla.mozilla.org/show_bug.cgi?id=1289280 +CVE-2016-5258 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5259 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5261 - https://bugzilla.mozilla.org/show_bug.cgi?id=1287266 +CVE-2016-5262 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5263 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5264 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5265 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5265 - https://bugzilla.mozilla.org/show_bug.cgi?id=1278013 +CVE-2016-5266 - https://bugzilla.mozilla.org/show_bug.cgi?id=1226977 +CVE-2016-5268 - https://bugzilla.mozilla.org/show_bug.cgi?id=1253673 +CVE-2016-5284 - https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95 +CVE-2016-5289 - http://www.securityfocus.com/bid/94337 +CVE-2016-5291 - https://bugzilla.mozilla.org/show_bug.cgi?id=1292159 +CVE-2016-5292 - http://www.securityfocus.com/bid/94337 +CVE-2016-5293 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246945 +CVE-2016-5294 - https://bugzilla.mozilla.org/show_bug.cgi?id=1246972 +CVE-2016-5295 - http://www.securityfocus.com/bid/94337 +CVE-2016-5295 - https://bugzilla.mozilla.org/show_bug.cgi?id=1247239 +CVE-2016-5298 - http://www.securityfocus.com/bid/94337 +CVE-2016-5298 - https://bugzilla.mozilla.org/show_bug.cgi?id=1227538 +CVE-2016-5299 - http://www.securityfocus.com/bid/94337 +CVE-2016-5299 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245791 +CVE-2016-5300 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-5300 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5300 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2016-5300 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-5304 - https://www.exploit-db.com/exploits/40041/ +CVE-2016-5309 - https://www.exploit-db.com/exploits/40405/ +CVE-2016-5310 - https://www.exploit-db.com/exploits/40405/ +CVE-2016-5312 - http://packetstormsecurity.com/files/138891/Symantec-Messaging-Gateway-10.6.1-Directory-Traversal.html +CVE-2016-5312 - https://www.exploit-db.com/exploits/40437/ +CVE-2016-5313 - http://packetstormsecurity.com/files/139006/Symantec-Web-Gateway-5.2.2-OS-Command-Injection.html +CVE-2016-5314 - http://www.openwall.com/lists/oss-security/2016/06/15/9 +CVE-2016-5314 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-5318 - http://www.openwall.com/lists/oss-security/2016/04/27/6 +CVE-2016-5318 - https://usn.ubuntu.com/3606-1/ +CVE-2016-5319 - http://www.openwall.com/lists/oss-security/2016/04/27/6 +CVE-2016-5330 - https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html +CVE-2016-5331 - http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html +CVE-2016-5331 - http://seclists.org/fulldisclosure/2016/Aug/38 +CVE-2016-5333 - http://www.theregister.co.uk/2016/08/16/vmware_shipped_public_key_with_its_photon_osforcontainers/ +CVE-2016-5346 - https://github.com/ele7enxxh/poc-exp/tree/master/CVE-2016-5346 +CVE-2016-5348 - https://www.exploit-db.com/exploits/40502/ +CVE-2016-5350 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5351 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5352 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5353 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5354 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5355 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5355 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394 +CVE-2016-5356 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5356 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395 +CVE-2016-5357 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5357 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396 +CVE-2016-5358 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5384 - http://www.ubuntu.com/usn/USN-3063-1 +CVE-2016-5385 - http://www.kb.cert.org/vuls/id/797896 +CVE-2016-5385 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-5385 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-5385 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5385 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-5385 - https://httpoxy.org/ +CVE-2016-5386 - http://www.kb.cert.org/vuls/id/797896 +CVE-2016-5386 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-5386 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5386 - https://httpoxy.org/ +CVE-2016-5387 - http://www.kb.cert.org/vuls/id/797896 +CVE-2016-5387 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-5387 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-5387 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5387 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-5387 - https://httpoxy.org/ +CVE-2016-5388 - http://www.kb.cert.org/vuls/id/797896 +CVE-2016-5388 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-5388 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-5388 - https://httpoxy.org/ +CVE-2016-5399 - http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html +CVE-2016-5399 - http://seclists.org/fulldisclosure/2016/Jul/72 +CVE-2016-5399 - http://www.openwall.com/lists/oss-security/2016/07/21/1 +CVE-2016-5399 - https://www.exploit-db.com/exploits/40155/ +CVE-2016-5403 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5403 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-5404 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5408 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5418 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5419 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-5419 - http://www.securityfocus.com/bid/92319 +CVE-2016-5420 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-5421 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-5425 - http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html +CVE-2016-5425 - http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt +CVE-2016-5425 - http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html +CVE-2016-5425 - https://www.exploit-db.com/exploits/40488/ +CVE-2016-5425 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-5429 - https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b#diff-2a982d82ef0f673fd0ba2beba0e18420R138 +CVE-2016-5431 - https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b +CVE-2016-5434 - http://www.openwall.com/lists/oss-security/2016/06/11/4 +CVE-2016-5434 - https://lists.archlinux.org/pipermail/pacman-dev/2016-June/021148.html +CVE-2016-5436 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5436 - http://www.securityfocus.com/bid/91787 +CVE-2016-5437 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5437 - http://www.securityfocus.com/bid/91787 +CVE-2016-5439 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5439 - http://www.securityfocus.com/bid/91787 +CVE-2016-5440 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5440 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5440 - http://www.securityfocus.com/bid/91787 +CVE-2016-5441 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5441 - http://www.securityfocus.com/bid/91787 +CVE-2016-5442 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5442 - http://www.securityfocus.com/bid/91787 +CVE-2016-5443 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5443 - http://www.securityfocus.com/bid/91787 +CVE-2016-5444 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5444 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5444 - http://www.securityfocus.com/bid/91787 +CVE-2016-5445 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5445 - http://www.securityfocus.com/bid/91787 +CVE-2016-5446 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5446 - http://www.securityfocus.com/bid/91787 +CVE-2016-5447 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5447 - http://www.securityfocus.com/bid/91787 +CVE-2016-5448 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5448 - http://www.securityfocus.com/bid/91787 +CVE-2016-5449 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5449 - http://www.securityfocus.com/bid/91787 +CVE-2016-5450 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5450 - http://www.securityfocus.com/bid/91787 +CVE-2016-5451 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5451 - http://www.securityfocus.com/bid/91787 +CVE-2016-5452 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5452 - http://www.securityfocus.com/bid/91787 +CVE-2016-5453 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5453 - http://www.securityfocus.com/bid/91787 +CVE-2016-5454 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5454 - http://www.securityfocus.com/bid/91787 +CVE-2016-5455 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5455 - http://www.securityfocus.com/bid/91787 +CVE-2016-5456 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5456 - http://www.securityfocus.com/bid/91787 +CVE-2016-5457 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5457 - http://www.securityfocus.com/bid/91787 +CVE-2016-5458 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5458 - http://www.securityfocus.com/bid/91787 +CVE-2016-5459 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5459 - http://www.securityfocus.com/bid/91787 +CVE-2016-5460 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5460 - http://www.securityfocus.com/bid/91787 +CVE-2016-5461 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5461 - http://www.securityfocus.com/bid/91787 +CVE-2016-5462 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5462 - http://www.securityfocus.com/bid/91787 +CVE-2016-5463 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5463 - http://www.securityfocus.com/bid/91787 +CVE-2016-5464 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5464 - http://www.securityfocus.com/bid/91787 +CVE-2016-5465 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5465 - http://www.securityfocus.com/bid/91787 +CVE-2016-5466 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5466 - http://www.securityfocus.com/bid/91787 +CVE-2016-5467 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5467 - http://www.securityfocus.com/bid/91787 +CVE-2016-5468 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5468 - http://www.securityfocus.com/bid/91787 +CVE-2016-5469 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5469 - http://www.securityfocus.com/bid/91787 +CVE-2016-5470 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5470 - http://www.securityfocus.com/bid/91787 +CVE-2016-5471 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5471 - http://www.securityfocus.com/bid/91787 +CVE-2016-5472 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5472 - http://www.securityfocus.com/bid/91787 +CVE-2016-5473 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5473 - http://www.securityfocus.com/bid/91787 +CVE-2016-5474 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5474 - http://www.securityfocus.com/bid/91787 +CVE-2016-5475 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5475 - http://www.securityfocus.com/bid/91787 +CVE-2016-5476 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5476 - http://www.securityfocus.com/bid/91787 +CVE-2016-5477 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html +CVE-2016-5477 - http://www.securityfocus.com/bid/91787 +CVE-2016-5479 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5480 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5481 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5482 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5486 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5487 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5488 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5489 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5490 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5491 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5492 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5493 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5495 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5497 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5498 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5499 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5500 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5501 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5502 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5503 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5504 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5505 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5506 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5507 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5508 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5509 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5510 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5511 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5512 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5513 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5514 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5515 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5516 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5517 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5518 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5519 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5521 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5522 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5523 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5524 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5525 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5526 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5527 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5528 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5529 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5530 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5531 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5532 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5533 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5534 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5535 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5535 - https://www.tenable.com/security/research/tra-2016-33 +CVE-2016-5536 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5537 - http://hyp3rlinx.altervista.org/advisories/ORACLE-NETBEANS-IDE-DIRECTORY-TRAVERSAL.txt +CVE-2016-5537 - http://packetstormsecurity.com/files/139259/Oracle-Netbeans-IDE-8.1-Directory-Traversal.html +CVE-2016-5537 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5537 - https://www.exploit-db.com/exploits/40588/ +CVE-2016-5538 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5539 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5540 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5541 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5542 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5543 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5544 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5545 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5546 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5547 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5548 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5549 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5551 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2016-5552 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5553 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5554 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5555 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5556 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5557 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5558 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5559 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5560 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5561 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5562 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5563 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5564 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5565 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5566 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5567 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5568 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5569 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5570 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5571 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5572 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5573 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5574 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5575 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5576 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5577 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5578 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5579 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5580 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5581 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5582 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5583 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5584 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5585 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5586 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5587 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5588 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5589 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5590 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5591 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5592 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5593 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5594 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5595 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5596 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5597 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5598 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5599 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5600 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5601 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5602 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5603 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5604 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5605 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5606 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5607 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5608 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5609 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5610 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5611 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5612 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5613 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5614 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5615 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5618 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5619 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5620 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5621 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5622 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5623 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-5624 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5625 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5626 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5627 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5628 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5629 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5630 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5631 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5632 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5633 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5634 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5635 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-5636 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5636 - https://bugs.python.org/issue26171 +CVE-2016-5637 - http://www.kb.cert.org/vuls/id/123799 +CVE-2016-5638 - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html +CVE-2016-5639 - https://www.exploit-db.com/exploits/40813/ +CVE-2016-5648 - http://packetstormsecurity.com/files/137775/Acer-Portal-Android-Application-3.9.3.2006-Man-In-The-Middle.html +CVE-2016-5648 - https://www.kb.cert.org/vuls/id/690343 +CVE-2016-5649 - http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html +CVE-2016-5649 - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html +CVE-2016-5650 - http://www.kb.cert.org/vuls/id/301735 +CVE-2016-5653 - http://www.kb.cert.org/vuls/id/682704 +CVE-2016-5654 - http://www.kb.cert.org/vuls/id/682704 +CVE-2016-5655 - http://www.kb.cert.org/vuls/id/682704 +CVE-2016-5660 - http://www.kb.cert.org/vuls/id/665280 +CVE-2016-5660 - http://www.kb.cert.org/vuls/id/JLAD-ABMPVA +CVE-2016-5661 - http://www.kb.cert.org/vuls/id/665280 +CVE-2016-5661 - http://www.kb.cert.org/vuls/id/JLAD-ABMPVA +CVE-2016-5662 - http://www.kb.cert.org/vuls/id/305607 +CVE-2016-5663 - http://www.kb.cert.org/vuls/id/305607 +CVE-2016-5664 - http://www.kb.cert.org/vuls/id/305607 +CVE-2016-5672 - http://packetstormsecurity.com/files/138107/Intel-Crosswalk-Project-Man-In-The-Middle.html +CVE-2016-5672 - http://www.kb.cert.org/vuls/id/217871 +CVE-2016-5672 - https://blogs.intel.com/evangelists/2016/07/28/crosswalk-security-vulnerability/ +CVE-2016-5673 - http://www.kb.cert.org/vuls/id/735416 +CVE-2016-5673 - http://www.kb.cert.org/vuls/id/BLUU-A9WQVP +CVE-2016-5674 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5674 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5675 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5675 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5676 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5676 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5677 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5677 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5678 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5678 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5679 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5679 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5680 - http://www.kb.cert.org/vuls/id/856152 +CVE-2016-5680 - https://www.exploit-db.com/exploits/40200/ +CVE-2016-5681 - http://www.kb.cert.org/vuls/id/332115 +CVE-2016-5683 - http://www.kb.cert.org/vuls/id/294272 +CVE-2016-5684 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-5686 - http://www.kb.cert.org/vuls/id/884840 +CVE-2016-5686 - http://www.kb.cert.org/vuls/id/BLUU-A9SQRS +CVE-2016-5687 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5688 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5689 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5690 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5691 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5696 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5696 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-5696 - https://github.com/Gnoxter/mountain_goat +CVE-2016-5699 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5709 - http://packetstormsecurity.com/files/137525/Solarwinds-Virtualization-Manager-6.3.1-Weak-Crypto.html +CVE-2016-5709 - http://seclists.org/fulldisclosure/2016/Jun/38 +CVE-2016-5715 - http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html +CVE-2016-5725 - http://packetstormsecurity.com/files/138809/jsch-0.1.53-Path-Traversal.html +CVE-2016-5725 - http://seclists.org/fulldisclosure/2016/Sep/53 +CVE-2016-5725 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725 +CVE-2016-5725 - https://www.exploit-db.com/exploits/40411/ +CVE-2016-5725 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2016-5725 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2016-5725 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-5734 - https://www.exploit-db.com/exploits/40185/ +CVE-2016-5737 - https://github.com/openstack-infra/puppet-gerrit/commit/8573c2ee172f66c1667de49685c88fdc8883ca8b +CVE-2016-5740 - http://packetstormsecurity.com/files/138700/Open-Xchange-App-Suite-7.8.2-Cross-Site-Scripting.html +CVE-2016-5740 - https://www.exploit-db.com/exploits/40378/ +CVE-2016-5746 - https://github.com/yast/yast-storage/pull/224 +CVE-2016-5756 - https://www.novell.com/support/kb/doc.php?id=7017813 +CVE-2016-5760 - http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html +CVE-2016-5760 - http://seclists.org/fulldisclosure/2016/Aug/123 +CVE-2016-5761 - http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html +CVE-2016-5761 - http://seclists.org/fulldisclosure/2016/Aug/123 +CVE-2016-5762 - http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html +CVE-2016-5762 - http://seclists.org/fulldisclosure/2016/Aug/123 +CVE-2016-5764 - https://www.exploit-db.com/exploits/40651/ +CVE-2016-5766 - https://bugs.php.net/bug.php?id=72339 +CVE-2016-5767 - https://bugs.php.net/bug.php?id=72446 +CVE-2016-5769 - https://bugs.php.net/bug.php?id=72455 +CVE-2016-5770 - https://bugs.php.net/bug.php?id=72262 +CVE-2016-5771 - https://bugs.php.net/bug.php?id=72433 +CVE-2016-5773 - https://bugs.php.net/bug.php?id=72434 +CVE-2016-5782 - https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01-0 +CVE-2016-5787 - https://ics-cert.us-cert.gov/advisories/ICSA-16-194-02 +CVE-2016-5809 - https://www.exploit-db.com/exploits/44640/ +CVE-2016-5817 - https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01 +CVE-2016-5821 - http://packetstormsecurity.com/files/137733/Huawei-HiSuite-For-Windows-4.0.3.301-Privilege-Escalation.html +CVE-2016-5829 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-5832 - https://wpvulndb.com/vulnerabilities/8522 +CVE-2016-5833 - https://wpvulndb.com/vulnerabilities/8518 +CVE-2016-5834 - https://wpvulndb.com/vulnerabilities/8518 +CVE-2016-5835 - https://wpvulndb.com/vulnerabilities/8519 +CVE-2016-5836 - https://wpvulndb.com/vulnerabilities/8523 +CVE-2016-5837 - https://wpvulndb.com/vulnerabilities/8520 +CVE-2016-5838 - https://wpvulndb.com/vulnerabilities/8524 +CVE-2016-5840 - https://www.exploit-db.com/exploits/40180/ +CVE-2016-5841 - http://www.openwall.com/lists/oss-security/2016/06/23/1 +CVE-2016-5841 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5842 - http://www.openwall.com/lists/oss-security/2016/06/23/1 +CVE-2016-5842 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5844 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-5844 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-5845 - http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html +CVE-2016-5845 - http://seclists.org/fulldisclosure/2016/Aug/46 +CVE-2016-5845 - https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities +CVE-2016-5845 - https://www.exploit-db.com/exploits/40230/ +CVE-2016-5847 - http://packetstormsecurity.com/files/138284/SAP-CAR-Archive-Tool-Denial-Of-Service-Security-Bypass.html +CVE-2016-5847 - http://seclists.org/fulldisclosure/2016/Aug/46 +CVE-2016-5847 - https://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities +CVE-2016-5847 - https://www.exploit-db.com/exploits/40230/ +CVE-2016-5851 - http://www.openwall.com/lists/oss-security/2016/06/28/7 +CVE-2016-5852 - http://nvidia.custhelp.com/app/answers/detail/a_id/4213 +CVE-2016-5873 - https://bugs.php.net/bug.php?id=71719 +CVE-2016-5878 - http://www.securityfocus.com/bid/92279 +CVE-2016-5943 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 +CVE-2016-5944 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 +CVE-2016-5945 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 +CVE-2016-5946 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 +CVE-2016-5947 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944 +CVE-2016-5980 - http://www.ibm.com/support/docview.wss?uid=swg21991992 +CVE-2016-6020 - http://www.securityfocus.com/bid/95098 +CVE-2016-6079 - https://www.exploit-db.com/exploits/40710/ +CVE-2016-6128 - https://bugs.php.net/72494 +CVE-2016-6137 - http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html +CVE-2016-6138 - http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html +CVE-2016-6139 - http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html +CVE-2016-6140 - http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html +CVE-2016-6142 - http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html +CVE-2016-6144 - http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html +CVE-2016-6144 - https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components +CVE-2016-6145 - http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html +CVE-2016-6145 - https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components +CVE-2016-6146 - http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html +CVE-2016-6147 - http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html +CVE-2016-6148 - http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html +CVE-2016-6149 - http://packetstormsecurity.com/files/138456/SAP-HANA-SPS09-1.00.091.00.1418659308-EXPORT-Information-Disclosure.html +CVE-2016-6150 - http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html +CVE-2016-6153 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt +CVE-2016-6153 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6164 - http://git.videolan.org/gitweb.cgi/ffmpeg.git/?a=commit;h=8a3221cc67a516dfc1700bdae3566ec52c7ee823 +CVE-2016-6167 - https://packetstormsecurity.com/files/137742/Putty-Beta-0.67-DLL-Hijacking.html +CVE-2016-6174 - http://karmainsecurity.com/KIS-2016-11 +CVE-2016-6174 - http://packetstormsecurity.com/files/137804/IPS-Community-Suite-4.1.12.3-PHP-Code-Injection.html +CVE-2016-6174 - http://seclists.org/fulldisclosure/2016/Jul/19 +CVE-2016-6174 - https://www.exploit-db.com/exploits/40084/ +CVE-2016-6175 - https://kmkz-web-blog.blogspot.cz/2016/07/advisory-cve-2016-6175.html +CVE-2016-6175 - https://www.exploit-db.com/exploits/40154/ +CVE-2016-6185 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-6185 - https://rt.cpan.org/Public/Bug/Display.html?id=115808 +CVE-2016-6186 - http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html +CVE-2016-6186 - http://seclists.org/fulldisclosure/2016/Jul/53 +CVE-2016-6186 - http://www.vulnerability-lab.com/get_content.php?id=1869 +CVE-2016-6186 - https://www.exploit-db.com/exploits/40129/ +CVE-2016-6195 - http://www.securityfocus.com/bid/92687 +CVE-2016-6195 - https://github.com/drewlong/vbully +CVE-2016-6197 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-6197 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-6198 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-6198 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-6199 - https://discuss.gradle.org/t/a-security-issue-about-gradle-rce/17726 +CVE-2016-6201 - http://packetstormsecurity.com/files/143014/Ektron-CMS-9.10SP1-Cross-Site-Scripting.html +CVE-2016-6207 - http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html +CVE-2016-6210 - https://www.exploit-db.com/exploits/40113/ +CVE-2016-6210 - https://www.exploit-db.com/exploits/40136/ +CVE-2016-6214 - https://github.com/libgd/libgd/issues/247#issuecomment-232084241 +CVE-2016-6225 - https://www.percona.com/blog/2017/01/12/cve-2016-6225-percona-xtrabackup-encryption-iv-not-set-properly/ +CVE-2016-6231 - https://support.kaspersky.com/vulnerability.aspx?el=12430#280716 +CVE-2016-6232 - https://www.kde.org/info/security/advisory-20160724-1.txt +CVE-2016-6239 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6240 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6241 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6242 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6243 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6245 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6246 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6247 - http://www.openwall.com/lists/oss-security/2016/07/14/5 +CVE-2016-6250 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-6253 - http://packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html +CVE-2016-6253 - https://www.exploit-db.com/exploits/40141/ +CVE-2016-6253 - https://www.exploit-db.com/exploits/40385/ +CVE-2016-6255 - https://www.exploit-db.com/exploits/40589/ +CVE-2016-6255 - https://www.tenable.com/security/research/tra-2017-10 +CVE-2016-6256 - http://packetstormsecurity.com/files/142597/SAP-Business-One-For-Android-1.2.3-XML-Injection.html +CVE-2016-6256 - https://www.exploit-db.com/exploits/42036/ +CVE-2016-6258 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-6264 - http://www.openwall.com/lists/oss-security/2016/06/29/3 +CVE-2016-6264 - http://www.openwall.com/lists/oss-security/2016/07/21/2 +CVE-2016-6264 - http://www.openwall.com/lists/oss-security/2016/07/21/6 +CVE-2016-6266 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ +CVE-2016-6267 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ +CVE-2016-6268 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ +CVE-2016-6269 - https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ +CVE-2016-6270 - https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ +CVE-2016-6271 - https://github.com/gteissier/CVE-2016-6271 +CVE-2016-6272 - http://packetstormsecurity.com/files/146418/EPIC-MyChart-SQL-Injection.html +CVE-2016-6272 - https://www.exploit-db.com/exploits/44098/ +CVE-2016-6273 - https://www.tenable.com/security/research/tra-2016-29 +CVE-2016-6277 - http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html +CVE-2016-6277 - https://www.exploit-db.com/exploits/40889/ +CVE-2016-6277 - https://www.exploit-db.com/exploits/41598/ +CVE-2016-6283 - http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html +CVE-2016-6283 - http://seclists.org/fulldisclosure/2017/Jan/3 +CVE-2016-6283 - https://www.exploit-db.com/exploits/40989/ +CVE-2016-6285 - http://packetstormsecurity.com/files/140548/Atlassian-Jira-7.1.7-Cross-Site-Scripting.html +CVE-2016-6289 - http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities +CVE-2016-6289 - https://bugs.php.net/72513 +CVE-2016-6290 - https://bugs.php.net/72562 +CVE-2016-6295 - https://bugs.php.net/72479 +CVE-2016-6296 - http://www.ubuntu.com/usn/USN-3059-1 +CVE-2016-6296 - https://bugs.php.net/72606 +CVE-2016-6297 - http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities +CVE-2016-6301 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html +CVE-2016-6301 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2016-6301 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2016-6301 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2016-6301 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2016-6301 - http://seclists.org/fulldisclosure/2020/Mar/15 +CVE-2016-6301 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2016-6301 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6302 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-6302 - https://hackerone.com/reports/221787 +CVE-2016-6302 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-6302 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6303 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6303 - https://hackerone.com/reports/221785 +CVE-2016-6303 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-6303 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6304 - http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html +CVE-2016-6304 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6304 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-6304 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-6304 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6305 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6305 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6306 - http://seclists.org/fulldisclosure/2017/Jul/31 +CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6306 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6306 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-6306 - https://hackerone.com/reports/221790 +CVE-2016-6306 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 +CVE-2016-6306 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-6306 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-6306 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-6306 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-6306 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6307 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6307 - https://hackerone.com/reports/221791 +CVE-2016-6307 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6308 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6308 - https://hackerone.com/reports/221792 +CVE-2016-6308 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6309 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-6309 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-6309 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6309 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-6317 - https://hackerone.com/reports/139321 +CVE-2016-6321 - http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html +CVE-2016-6321 - http://seclists.org/fulldisclosure/2016/Oct/96 +CVE-2016-6321 - https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt +CVE-2016-6329 - https://sweet32.info/ +CVE-2016-6330 - https://www.tenable.com/security/research/tra-2016-22 +CVE-2016-6348 - https://bugzilla.redhat.com/show_bug.cgi?id=1372129 +CVE-2016-6350 - http://www.openwall.com/lists/oss-security/2016/07/26/6 +CVE-2016-6350 - http://www.openwall.com/lists/oss-security/2016/07/26/8 +CVE-2016-6366 - https://www.exploit-db.com/exploits/40258/ +CVE-2016-6367 - https://www.exploit-db.com/exploits/40271/ +CVE-2016-6369 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160824-anyconnect +CVE-2016-6374 - http://www.securityfocus.com/bid/93095 +CVE-2016-6423 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ios-ikev +CVE-2016-6433 - http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html +CVE-2016-6433 - https://www.exploit-db.com/exploits/40463/ +CVE-2016-6433 - https://www.exploit-db.com/exploits/41041/ +CVE-2016-6433 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt +CVE-2016-6434 - https://www.exploit-db.com/exploits/40465/ +CVE-2016-6434 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt +CVE-2016-6435 - https://www.exploit-db.com/exploits/40464/ +CVE-2016-6435 - https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt +CVE-2016-6438 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8 +CVE-2016-6447 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms +CVE-2016-6448 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms1 +CVE-2016-6461 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-asa +CVE-2016-6483 - http://legalhackers.com/advisories/vBulletin-SSRF-Vulnerability-Exploit.txt +CVE-2016-6483 - https://www.exploit-db.com/exploits/40225/ +CVE-2016-6484 - http://packetstormsecurity.com/files/138615/Infoblox-7.0.1-CRLF-Injection-HTTP-Response-Splitting.html +CVE-2016-6489 - http://www.ubuntu.com/usn/USN-3193-1 +CVE-2016-6489 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-6491 - http://www.openwall.com/lists/oss-security/2016/07/28/13 +CVE-2016-6491 - http://www.openwall.com/lists/oss-security/2016/07/28/15 +CVE-2016-6491 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html +CVE-2016-6492 - http://packetstormsecurity.com/files/138113/MediaTek-Driver-Privilege-Escalation.html +CVE-2016-6496 - https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf +CVE-2016-6497 - https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf +CVE-2016-6501 - https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf +CVE-2016-6503 - https://www.exploit-db.com/exploits/40196/ +CVE-2016-6504 - https://www.exploit-db.com/exploits/40194/ +CVE-2016-6505 - https://www.exploit-db.com/exploits/40197/ +CVE-2016-6512 - https://www.exploit-db.com/exploits/40195/ +CVE-2016-6515 - http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html +CVE-2016-6515 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6515 - https://www.exploit-db.com/exploits/40888/ +CVE-2016-6516 - http://www.openwall.com/lists/oss-security/2016/07/31/6 +CVE-2016-6520 - http://www.imagemagick.org/script/changelog.php +CVE-2016-6521 - https://github.com/sheehan/grails-console/issues/54 +CVE-2016-6521 - https://github.com/sheehan/grails-console/issues/55 +CVE-2016-6523 - http://www.openwall.com/lists/oss-security/2016/08/02/3 +CVE-2016-6557 - https://www.kb.cert.org/vuls/id/763843 +CVE-2016-6558 - https://www.kb.cert.org/vuls/id/763843 +CVE-2016-6559 - https://www.kb.cert.org/vuls/id/548487 +CVE-2016-6563 - http://seclists.org/fulldisclosure/2016/Nov/38 +CVE-2016-6563 - https://www.exploit-db.com/exploits/40805/ +CVE-2016-6563 - https://www.kb.cert.org/vuls/id/677427 +CVE-2016-6564 - https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack +CVE-2016-6564 - https://www.kb.cert.org/vuls/id/624539 +CVE-2016-6565 - https://www.kb.cert.org/vuls/id/346175 +CVE-2016-6566 - https://www.kb.cert.org/vuls/id/846103 +CVE-2016-6567 - https://www.kb.cert.org/vuls/id/167623 +CVE-2016-6578 - https://www.kb.cert.org/vuls/id/865216 +CVE-2016-6582 - http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html +CVE-2016-6593 - http://packetstormsecurity.com/files/140098/Symantec-VIP-Access-Arbitrary-DLL-Execution.html +CVE-2016-6597 - http://packetstormsecurity.com/files/138210/Sophos-Mobile-Control-3.5.0.3-Open-Reverse-Proxy.html +CVE-2016-6598 - http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html +CVE-2016-6598 - http://seclists.org/fulldisclosure/2018/Jan/92 +CVE-2016-6598 - https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt +CVE-2016-6599 - http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html +CVE-2016-6599 - http://seclists.org/fulldisclosure/2018/Jan/92 +CVE-2016-6599 - https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt +CVE-2016-6600 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html +CVE-2016-6600 - http://seclists.org/fulldisclosure/2016/Aug/54 +CVE-2016-6600 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt +CVE-2016-6600 - https://www.exploit-db.com/exploits/40229/ +CVE-2016-6601 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html +CVE-2016-6601 - http://seclists.org/fulldisclosure/2016/Aug/54 +CVE-2016-6601 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt +CVE-2016-6601 - https://www.exploit-db.com/exploits/40229/ +CVE-2016-6602 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html +CVE-2016-6602 - http://seclists.org/fulldisclosure/2016/Aug/54 +CVE-2016-6602 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt +CVE-2016-6602 - https://www.exploit-db.com/exploits/40229/ +CVE-2016-6603 - http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html +CVE-2016-6603 - http://seclists.org/fulldisclosure/2016/Aug/54 +CVE-2016-6603 - https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt +CVE-2016-6603 - https://www.exploit-db.com/exploits/40229/ +CVE-2016-6615 - http://www.securityfocus.com/bid/95041 +CVE-2016-6616 - http://www.securityfocus.com/bid/95042 +CVE-2016-6617 - http://www.securityfocus.com/bid/95044 +CVE-2016-6618 - http://www.securityfocus.com/bid/95047 +CVE-2016-6619 - http://www.securityfocus.com/bid/95048 +CVE-2016-6622 - http://www.securityfocus.com/bid/95049 +CVE-2016-6634 - https://wpvulndb.com/vulnerabilities/8474 +CVE-2016-6635 - https://wpvulndb.com/vulnerabilities/8475 +CVE-2016-6662 - http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html +CVE-2016-6662 - http://seclists.org/fulldisclosure/2016/Sep/23 +CVE-2016-6662 - http://www.openwall.com/lists/oss-security/2016/09/12/3 +CVE-2016-6662 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6662 - https://www.exploit-db.com/exploits/40360/ +CVE-2016-6662 - https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/ +CVE-2016-6663 - http://seclists.org/fulldisclosure/2016/Nov/4 +CVE-2016-6663 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6663 - https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html +CVE-2016-6663 - https://www.exploit-db.com/exploits/40678/ +CVE-2016-6663 - https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ +CVE-2016-6664 - http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html +CVE-2016-6664 - http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html +CVE-2016-6664 - http://seclists.org/fulldisclosure/2016/Nov/4 +CVE-2016-6664 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-6664 - https://www.exploit-db.com/exploits/40679/ +CVE-2016-6664 - https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ +CVE-2016-6668 - http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html +CVE-2016-6671 - http://www.openwall.com/lists/oss-security/2016/08/12/6 +CVE-2016-6689 - https://www.exploit-db.com/exploits/40515/ +CVE-2016-6707 - https://www.exploit-db.com/exploits/40874/ +CVE-2016-6754 - https://www.exploit-db.com/exploits/40846/ +CVE-2016-6772 - https://www.exploit-db.com/exploits/40945/ +CVE-2016-6793 - https://www.tenable.com/security/research/tra-2016-23 +CVE-2016-6794 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-6796 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-6797 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2016-6802 - http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html +CVE-2016-6803 - https://www.openoffice.org/security/cves/CVE-2016-6803.html +CVE-2016-6804 - https://www.openoffice.org/security/cves/CVE-2016-6804.html +CVE-2016-6808 - http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html +CVE-2016-6814 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-6814 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-6814 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-6814 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-6814 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-6814 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-6816 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-6816 - https://www.exploit-db.com/exploits/41783/ +CVE-2016-6823 - http://www.openwall.com/lists/oss-security/2016/09/26/3 +CVE-2016-6837 - https://mantisbt.org/bugs/view.php?id=21611 +CVE-2016-6840 - http://packetstormsecurity.com/files/138061/Huawei-ISM-Professional-Cross-Site-Scripting.html +CVE-2016-6851 - http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html +CVE-2016-6851 - https://www.exploit-db.com/exploits/40377/ +CVE-2016-6853 - http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html +CVE-2016-6853 - https://www.exploit-db.com/exploits/40377/ +CVE-2016-6854 - http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html +CVE-2016-6854 - https://www.exploit-db.com/exploits/40377/ +CVE-2016-6855 - http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html +CVE-2016-6855 - http://www.ubuntu.com/usn/USN-3069-1 +CVE-2016-6855 - https://bugzilla.gnome.org/show_bug.cgi?id=770143 +CVE-2016-6855 - https://www.exploit-db.com/exploits/40291/ +CVE-2016-6881 - http://www.openwall.com/lists/oss-security/2016/09/26/6 +CVE-2016-6890 - https://www.kb.cert.org/vuls/id/396440 +CVE-2016-6891 - https://www.kb.cert.org/vuls/id/396440 +CVE-2016-6892 - https://www.kb.cert.org/vuls/id/396440 +CVE-2016-6896 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html +CVE-2016-6896 - https://wpvulndb.com/vulnerabilities/8606 +CVE-2016-6896 - https://www.exploit-db.com/exploits/40288/ +CVE-2016-6897 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html +CVE-2016-6897 - https://wpvulndb.com/vulnerabilities/8606 +CVE-2016-6897 - https://www.exploit-db.com/exploits/40288/ +CVE-2016-6902 - https://github.com/ghantoos/lshell/issues/147 +CVE-2016-6905 - https://github.com/libgd/libgd/issues/248 +CVE-2016-6909 - http://fortiguard.com/advisory/FG-IR-16-023 +CVE-2016-6909 - http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html +CVE-2016-6909 - https://www.exploit-db.com/exploits/40276/ +CVE-2016-6913 - http://seclists.org/fulldisclosure/2016/Aug/122 +CVE-2016-6914 - http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html +CVE-2016-6914 - https://hackerone.com/reports/140793 +CVE-2016-6914 - https://www.exploit-db.com/exploits/43390/ +CVE-2016-6920 - http://packetstormsecurity.com/files/138618/ffmpeg-3.1.2-Heap-Overflow.html +CVE-2016-7039 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html +CVE-2016-7044 - https://irssi.org/security/irssi_sa_2016.txt +CVE-2016-7045 - https://irssi.org/security/irssi_sa_2016.txt +CVE-2016-7048 - https://bugzilla.redhat.com/show_bug.cgi?id=1378043 +CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-7052 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-7052 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7052 - https://www.tenable.com/security/tns-2016-20 +CVE-2016-7054 - https://www.exploit-db.com/exploits/40899/ +CVE-2016-7055 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-7055 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2016-7055 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-7063 - https://lf.lc/CVE-2016-7063.txt +CVE-2016-7065 - http://seclists.org/fulldisclosure/2016/Nov/143 +CVE-2016-7065 - https://www.exploit-db.com/exploits/40842/ +CVE-2016-7079 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7080 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7081 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7082 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7083 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7083 - https://www.exploit-db.com/exploits/40398/ +CVE-2016-7084 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7084 - https://www.exploit-db.com/exploits/40399/ +CVE-2016-7085 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7086 - http://www.vmware.com/security/advisories/VMSA-2016-0014.html +CVE-2016-7089 - http://packetstormsecurity.com/files/138393/ESCALATEPLOWMAN-WatchGuard-Privilege-Escalation.html +CVE-2016-7089 - https://www.exploit-db.com/exploits/40270/ +CVE-2016-7092 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-7094 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-7097 - http://www.ubuntu.com/usn/USN-3146-1 +CVE-2016-7097 - http://www.ubuntu.com/usn/USN-3147-1 +CVE-2016-7098 - http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html +CVE-2016-7098 - http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html +CVE-2016-7098 - https://www.exploit-db.com/exploits/40824/ +CVE-2016-7101 - http://www.openwall.com/lists/oss-security/2016/09/26/8 +CVE-2016-7103 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-7103 - https://www.drupal.org/sa-core-2022-002 +CVE-2016-7103 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2016-7103 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2016-7103 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-7103 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2016-7103 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-7103 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7115 - https://github.com/haakonnessjoen/MAC-Telnet/commit/b69d11727d4f0f8cf719c79e3fb700f55ca03e9a +CVE-2016-7119 - http://www.dnnsoftware.com/community/security/security-center +CVE-2016-7124 - https://bugs.php.net/bug.php?id=72663 +CVE-2016-7124 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7125 - https://bugs.php.net/bug.php?id=72681 +CVE-2016-7125 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7126 - https://bugs.php.net/bug.php?id=72697 +CVE-2016-7126 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7127 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7128 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7129 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7130 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7131 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7132 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7133 - https://bugs.php.net/bug.php?id=72742 +CVE-2016-7135 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html +CVE-2016-7135 - http://seclists.org/fulldisclosure/2016/Oct/80 +CVE-2016-7136 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html +CVE-2016-7136 - http://seclists.org/fulldisclosure/2016/Oct/80 +CVE-2016-7137 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html +CVE-2016-7137 - http://seclists.org/fulldisclosure/2016/Oct/80 +CVE-2016-7138 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html +CVE-2016-7138 - http://seclists.org/fulldisclosure/2016/Oct/80 +CVE-2016-7139 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html +CVE-2016-7139 - http://seclists.org/fulldisclosure/2016/Oct/80 +CVE-2016-7140 - http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html +CVE-2016-7140 - http://seclists.org/fulldisclosure/2016/Oct/80 +CVE-2016-7141 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-7146 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html +CVE-2016-7147 - https://www.curesec.com/blog/article/blog/Plone-XSS-186.html +CVE-2016-7148 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html +CVE-2016-7154 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf +CVE-2016-7154 - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html +CVE-2016-7163 - http://www.openwall.com/lists/oss-security/2016/09/08/3 +CVE-2016-7163 - https://github.com/uclouvain/openjpeg/issues/826 +CVE-2016-7163 - https://github.com/uclouvain/openjpeg/pull/809 +CVE-2016-7164 - http://www.openwall.com/lists/oss-security/2016/09/08/1 +CVE-2016-7165 - http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html +CVE-2016-7166 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html +CVE-2016-7166 - https://github.com/libarchive/libarchive/issues/660 +CVE-2016-7167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-7168 - http://www.openwall.com/lists/oss-security/2016/09/08/19 +CVE-2016-7168 - http://www.openwall.com/lists/oss-security/2016/09/08/24 +CVE-2016-7168 - https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html +CVE-2016-7168 - https://wpvulndb.com/vulnerabilities/8615 +CVE-2016-7169 - https://wpvulndb.com/vulnerabilities/8616 +CVE-2016-7172 - https://kb.netapp.com/support/s/article/NTAP-20161220-0001 +CVE-2016-7177 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12750 +CVE-2016-7178 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751 +CVE-2016-7179 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12752 +CVE-2016-7185 - https://www.exploit-db.com/exploits/40572/ +CVE-2016-7188 - https://www.exploit-db.com/exploits/40562/ +CVE-2016-7200 - http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html +CVE-2016-7200 - https://github.com/theori-io/chakra-2016-11 +CVE-2016-7200 - https://www.exploit-db.com/exploits/40785/ +CVE-2016-7200 - https://www.exploit-db.com/exploits/40990/ +CVE-2016-7201 - http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html +CVE-2016-7201 - https://github.com/theori-io/chakra-2016-11 +CVE-2016-7201 - https://www.exploit-db.com/exploits/40784/ +CVE-2016-7201 - https://www.exploit-db.com/exploits/40990/ +CVE-2016-7202 - https://www.exploit-db.com/exploits/40786/ +CVE-2016-7202 - https://www.exploit-db.com/exploits/40793/ +CVE-2016-7203 - https://www.exploit-db.com/exploits/40787/ +CVE-2016-7216 - https://www.exploit-db.com/exploits/40766/ +CVE-2016-7224 - https://www.exploit-db.com/exploits/40765/ +CVE-2016-7225 - https://www.exploit-db.com/exploits/40764/ +CVE-2016-7226 - https://www.exploit-db.com/exploits/40763/ +CVE-2016-7237 - https://www.exploit-db.com/exploits/40744/ +CVE-2016-7240 - https://www.exploit-db.com/exploits/40773/ +CVE-2016-7241 - http://packetstormsecurity.com/files/139991/Microsoft-Edge-JSON.parse-Information-Leak.html +CVE-2016-7241 - https://www.exploit-db.com/exploits/40875/ +CVE-2016-7255 - http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html +CVE-2016-7255 - https://github.com/mwrlabs/CVE-2016-7255 +CVE-2016-7255 - https://www.exploit-db.com/exploits/40745/ +CVE-2016-7255 - https://www.exploit-db.com/exploits/40823/ +CVE-2016-7255 - https://www.exploit-db.com/exploits/41015/ +CVE-2016-7259 - http://packetstormsecurity.com/files/140172/Microsoft-Windows-Type-1-Font-Processing-Privilege-Escalation.html +CVE-2016-7274 - https://www.exploit-db.com/exploits/41615/ +CVE-2016-7286 - http://packetstormsecurity.com/files/140250/Microsoft-Edge-SIMD.toLocaleString-Uninitialized-Memory.html +CVE-2016-7286 - https://www.exploit-db.com/exploits/40947/ +CVE-2016-7287 - http://packetstormsecurity.com/files/140251/Microsoft-Edge-Internationalization-Type-Confusion.html +CVE-2016-7287 - https://www.exploit-db.com/exploits/40948/ +CVE-2016-7288 - http://packetstormsecurity.com/files/140994/Microsoft-Edge-TypedArray.sort-Use-After-Free.html +CVE-2016-7288 - https://www.exploit-db.com/exploits/41357/ +CVE-2016-7289 - http://fortiguard.com/advisory/FG-VD-16-068 +CVE-2016-7381 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7382 - http://nvidia.custhelp.com/app/answers/detail/a_id/4246 +CVE-2016-7382 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7383 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7384 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7384 - https://www.exploit-db.com/exploits/40655/ +CVE-2016-7385 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7385 - https://www.exploit-db.com/exploits/40657/ +CVE-2016-7386 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7386 - https://www.exploit-db.com/exploits/40656/ +CVE-2016-7387 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7387 - https://www.exploit-db.com/exploits/40659/ +CVE-2016-7388 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7389 - http://nvidia.custhelp.com/app/answers/detail/a_id/4246 +CVE-2016-7390 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7390 - https://www.exploit-db.com/exploits/40658/ +CVE-2016-7391 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-7391 - https://www.exploit-db.com/exploits/40661/ +CVE-2016-7398 - https://bugs.php.net/bug.php?id=73055 +CVE-2016-7398 - https://bugs.php.net/bug.php?id=73055&edit=1 +CVE-2016-7400 - https://www.exploit-db.com/exploits/40412/ +CVE-2016-7410 - http://www.openwall.com/lists/oss-security/2016/09/13/5 +CVE-2016-7411 - https://bugs.php.net/bug.php?id=73052 +CVE-2016-7411 - https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 +CVE-2016-7412 - https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 +CVE-2016-7412 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7413 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7414 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7415 - https://bugs.php.net/bug.php?id=73007 +CVE-2016-7415 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7416 - https://bugs.php.net/bug.php?id=73007 +CVE-2016-7416 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7417 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7418 - https://bugs.php.net/bug.php?id=73065 +CVE-2016-7418 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-7419 - https://hackerone.com/reports/145355 +CVE-2016-7420 - https://github.com/weidai11/cryptopp/issues/277 +CVE-2016-7425 - http://www.ubuntu.com/usn/USN-3145-1 +CVE-2016-7425 - http://www.ubuntu.com/usn/USN-3146-1 +CVE-2016-7425 - http://www.ubuntu.com/usn/USN-3147-1 +CVE-2016-7426 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7427 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7428 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7429 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-7429 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7431 - http://packetstormsecurity.com/files/140240/FreeBSD-Security-Advisory-FreeBSD-SA-16.39.ntp.html +CVE-2016-7431 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-7431 - http://www.ubuntu.com/usn/USN-3349-1 +CVE-2016-7431 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7433 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-7433 - http://www.ubuntu.com/usn/USN-3349-1 +CVE-2016-7433 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7434 - https://hackerone.com/reports/147310 +CVE-2016-7434 - https://www.exploit-db.com/exploits/40806/ +CVE-2016-7434 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-7440 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-7445 - http://www.openwall.com/lists/oss-security/2016/09/18/4 +CVE-2016-7445 - https://github.com/uclouvain/openjpeg/issues/843 +CVE-2016-7454 - https://packetstormsecurity.com/files/140121/XFINITY-Gateway-Technicolor-DPC3941T-Cross-Site-Request-Forgery.html +CVE-2016-7478 - https://bugs.php.net/bug.php?id=73093 +CVE-2016-7479 - https://bugs.php.net/bug.php?id=73092 +CVE-2016-7504 - http://bugs.ghostscript.com/show_bug.cgi?id=697142 +CVE-2016-7505 - http://bugs.ghostscript.com/show_bug.cgi?id=697140 +CVE-2016-7506 - http://bugs.ghostscript.com/show_bug.cgi?id=697141 +CVE-2016-7508 - https://github.com/glpi-project/glpi/issues/1047 +CVE-2016-7508 - https://www.exploit-db.com/exploits/42262/ +CVE-2016-7510 - https://bugzilla.redhat.com/show_bug.cgi?id=1377015 +CVE-2016-7510 - https://sourceforge.net/p/libdwarf/bugs/4/ +CVE-2016-7511 - https://sourceforge.net/p/libdwarf/bugs/3/ +CVE-2016-7511 - https://www.prevanders.net/dwarfbug.html#DW201609-002 +CVE-2016-7521 - https://github.com/ImageMagick/ImageMagick/issues/92 +CVE-2016-7526 - https://github.com/ImageMagick/ImageMagick/commit/b60d1ed0af37c50b91a40937825b4c61e8458095 +CVE-2016-7538 - https://github.com/ImageMagick/ImageMagick/issues/148 +CVE-2016-7540 - https://github.com/ImageMagick/ImageMagick/pull/223 +CVE-2016-7541 - http://fortiguard.com/advisory/FG-IR-16-088 +CVE-2016-7542 - http://fortiguard.com/advisory/FG-IR-16-050 +CVE-2016-7560 - http://fortiguard.com/advisory/FG-IR-16-029 +CVE-2016-7563 - https://bugs.ghostscript.com/show_bug.cgi?id=697136 +CVE-2016-7564 - https://bugs.ghostscript.com/show_bug.cgi?id=697137 +CVE-2016-7565 - http://www.openwall.com/lists/oss-security/2016/09/22/6 +CVE-2016-7567 - https://www.exploit-db.com/exploits/45804/ +CVE-2016-7568 - https://bugs.php.net/bug.php?id=73003 +CVE-2016-7568 - https://github.com/libgd/libgd/issues/308 +CVE-2016-7569 - http://www.openwall.com/lists/oss-security/2016/09/28/2 +CVE-2016-7569 - http://www.openwall.com/lists/oss-security/2016/09/28/4 +CVE-2016-7596 - http://www.securityfocus.com/bid/94903 +CVE-2016-7600 - http://www.securityfocus.com/bid/94903 +CVE-2016-7602 - http://www.securityfocus.com/bid/94903 +CVE-2016-7603 - http://www.securityfocus.com/bid/94903 +CVE-2016-7604 - http://www.securityfocus.com/bid/94903 +CVE-2016-7605 - http://www.securityfocus.com/bid/94903 +CVE-2016-7608 - http://www.securityfocus.com/bid/94903 +CVE-2016-7609 - http://www.securityfocus.com/bid/94903 +CVE-2016-7612 - https://www.exploit-db.com/exploits/40955/ +CVE-2016-7617 - http://www.securityfocus.com/bid/94903 +CVE-2016-7617 - https://www.exploit-db.com/exploits/40952/ +CVE-2016-7618 - http://www.securityfocus.com/bid/94903 +CVE-2016-7620 - http://www.securityfocus.com/bid/94903 +CVE-2016-7621 - https://www.exploit-db.com/exploits/40956/ +CVE-2016-7622 - http://www.securityfocus.com/bid/94903 +CVE-2016-7624 - http://www.securityfocus.com/bid/94903 +CVE-2016-7625 - http://www.securityfocus.com/bid/94903 +CVE-2016-7626 - https://www.exploit-db.com/exploits/40906/ +CVE-2016-7628 - http://www.securityfocus.com/bid/94903 +CVE-2016-7629 - http://www.securityfocus.com/bid/94903 +CVE-2016-7633 - http://www.securityfocus.com/bid/94903 +CVE-2016-7633 - https://www.exploit-db.com/exploits/40954/ +CVE-2016-7637 - https://www.exploit-db.com/exploits/40931/ +CVE-2016-7637 - https://www.exploit-db.com/exploits/40957/ +CVE-2016-7644 - https://www.exploit-db.com/exploits/40931/ +CVE-2016-7660 - https://www.exploit-db.com/exploits/40959/ +CVE-2016-7661 - https://www.exploit-db.com/exploits/40931/ +CVE-2016-7661 - https://www.exploit-db.com/exploits/40958/ +CVE-2016-7780 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7781 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7782 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7783 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7784 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7786 - https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html +CVE-2016-7786 - https://www.exploit-db.com/exploits/44469/ +CVE-2016-7788 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7789 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-7790 - http://www.openwall.com/lists/oss-security/2016/09/22/6 +CVE-2016-7791 - http://www.openwall.com/lists/oss-security/2016/09/29/11 +CVE-2016-7792 - https://packetstormsecurity.com/files/138928/Ubiquiti-UniFi-AP-AC-Lite-5.2.7-Improper-Access-Control.html +CVE-2016-7795 - http://www.openwall.com/lists/oss-security/2016/09/28/9 +CVE-2016-7795 - http://www.openwall.com/lists/oss-security/2016/09/30/1 +CVE-2016-7795 - https://github.com/systemd/systemd/issues/4234 +CVE-2016-7796 - http://www.openwall.com/lists/oss-security/2016/09/30/1 +CVE-2016-7796 - https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 +CVE-2016-7809 - http://www.securityfocus.com/bid/94248 +CVE-2016-7810 - http://www.securityfocus.com/bid/94248 +CVE-2016-7811 - http://www.securityfocus.com/bid/94248 +CVE-2016-7851 - https://www.exploit-db.com/exploits/40742/ +CVE-2016-7866 - http://hyp3rlinx.altervista.org/advisories/ADOBE-ANIMATE-MEMORY-CORRUPTION-VULNERABILITY.txt +CVE-2016-7866 - http://packetstormsecurity.com/files/140164/Adobe-Animate-15.2.1.95-Buffer-Overflow.html +CVE-2016-7866 - http://seclists.org/fulldisclosure/2016/Dec/45 +CVE-2016-7866 - https://www.exploit-db.com/exploits/40915/ +CVE-2016-7904 - http://www.openwall.com/lists/oss-security/2017/01/16/1 +CVE-2016-7919 - https://www.youtube.com/watch?v=pQS1GdQ3CBc +CVE-2016-7966 - http://www.openwall.com/lists/oss-security/2016/10/05/1 +CVE-2016-7967 - http://www.openwall.com/lists/oss-security/2016/10/05/1 +CVE-2016-7968 - http://www.openwall.com/lists/oss-security/2016/10/05/1 +CVE-2016-7977 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-7980 - http://www.openwall.com/lists/oss-security/2016/10/12/6 +CVE-2016-7980 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-exec-code-cross-site-request-forgery-cve-2016-7980/ +CVE-2016-7981 - http://www.openwall.com/lists/oss-security/2016/10/12/7 +CVE-2016-7982 - http://www.openwall.com/lists/oss-security/2016/10/12/8 +CVE-2016-7982 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-1-3-1-2-file-enumeration-path-traversal-cve-2016-7982/ +CVE-2016-7998 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-template-compiler-composer-php-code-execution-cve-2016-7998/ +CVE-2016-7999 - http://www.openwall.com/lists/oss-security/2016/10/12/10 +CVE-2016-7999 - https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-server-side-request-forgery-cve-2016-7999/ +CVE-2016-8006 - https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html +CVE-2016-8007 - https://kc.mcafee.com/corporate/index?page=content&id=SB10173 +CVE-2016-8016 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8017 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8018 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8019 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8020 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8021 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8022 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8023 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8024 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8025 - https://www.exploit-db.com/exploits/40911/ +CVE-2016-8027 - https://kc.mcafee.com/corporate/index?page=content&id=SB10187 +CVE-2016-8201 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 +CVE-2016-8201 - https://www.kb.cert.org/vuls/id/192371 +CVE-2016-8220 - https://docs.pivotal.io/gemfire-cf/relnotes.html +CVE-2016-8235 - http://www.securityfocus.com/bid/97543 +CVE-2016-8281 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8282 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8283 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8284 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8288 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8289 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8290 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8291 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html +CVE-2016-8297 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8298 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8299 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8300 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8301 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8302 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8303 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8304 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8305 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8306 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8307 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8308 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8309 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8310 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8311 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8312 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8313 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8314 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8315 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8316 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8317 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8318 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8319 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8320 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8322 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8323 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8324 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8325 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8327 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8328 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8329 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8330 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2016-8332 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-8366 - https://www.exploit-db.com/exploits/45586/ +CVE-2016-8371 - https://www.exploit-db.com/exploits/45590/ +CVE-2016-8377 - https://www.exploit-db.com/exploits/42700/ +CVE-2016-8380 - https://www.exploit-db.com/exploits/45590/ +CVE-2016-8385 - http://www.talosintelligence.com/reports/TALOS-2016-0210/ +CVE-2016-8386 - http://www.talosintelligence.com/reports/TALOS-2016-0211/ +CVE-2016-8387 - http://www.talosintelligence.com/reports/TALOS-2016-0212/ +CVE-2016-8388 - http://www.talosintelligence.com/reports/TALOS-2016-0213/ +CVE-2016-8389 - http://www.talosintelligence.com/reports/TALOS-2016-0214/ +CVE-2016-8462 - https://github.com/CunningLogic/PixelDump_CVE-2016-8462 +CVE-2016-8462 - https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ +CVE-2016-8492 - https://fortiguard.com/advisory/FG-IR-16-067 +CVE-2016-8513 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-8514 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-8515 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-8516 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-8517 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-8518 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2016-8519 - https://www.tenable.com/security/research/tra-2017-05 +CVE-2016-8523 - https://www.exploit-db.com/exploits/41297/ +CVE-2016-8525 - https://www.tenable.com/security/research/tra-2017-09 +CVE-2016-8526 - https://www.exploit-db.com/exploits/41482/ +CVE-2016-8527 - https://www.exploit-db.com/exploits/41482/ +CVE-2016-8530 - https://www.tenable.com/security/research/tra-2017-09 +CVE-2016-8568 - https://github.com/libgit2/libgit2/issues/3936 +CVE-2016-8580 - https://www.exploit-db.com/exploits/40682/ +CVE-2016-8581 - https://www.exploit-db.com/exploits/40683/ +CVE-2016-8582 - https://www.exploit-db.com/exploits/40684/ +CVE-2016-8584 - http://packetstormsecurity.com/files/142227/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-Session-Generation-Authentication-Bypass.html +CVE-2016-8585 - http://packetstormsecurity.com/files/142223/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-admin_sys_time.cgi-Remote-Code-Execution.html +CVE-2016-8585 - http://packetstormsecurity.com/files/142224/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-admin_sys_time.cgi-Remote-Code-Execution.html +CVE-2016-8586 - http://packetstormsecurity.com/files/142222/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-detected_potential_files.cgi-Remote-Code-Execution.html +CVE-2016-8587 - http://packetstormsecurity.com/files/142221/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-dlp_policy_upload.cgi-Remote-Code-Execution.html +CVE-2016-8588 - http://packetstormsecurity.com/files/142220/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-hotfix_upload.cgi-Remote-Code-Execution.html +CVE-2016-8589 - http://packetstormsecurity.com/files/142219/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_dae.cgi-Remote-Code-Execution.html +CVE-2016-8590 - http://packetstormsecurity.com/files/142218/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_dlp.cgi-Remote-Code-Execution.html +CVE-2016-8591 - http://packetstormsecurity.com/files/142217/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query.cgi-Remote-Code-Execution.html +CVE-2016-8592 - http://packetstormsecurity.com/files/142216/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query_system.cgi-Remote-Code-Execution.html +CVE-2016-8593 - http://packetstormsecurity.com/files/142215/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-upload.cgi-Remote-Code-Execution.html +CVE-2016-8600 - http://seclists.org/fulldisclosure/2016/Oct/63 +CVE-2016-8600 - https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html +CVE-2016-8605 - http://www.openwall.com/lists/oss-security/2016/10/12/1 +CVE-2016-8610 - http://seclists.org/oss-sec/2016/q4/224 +CVE-2016-8610 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2016-8610 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2016-8610 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-8610 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-8610 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2016-8615 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8616 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8617 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8618 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8619 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8620 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8621 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8622 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8623 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8624 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-8624 - https://hackerone.com/reports/180434 +CVE-2016-8641 - https://www.exploit-db.com/exploits/40774/ +CVE-2016-8645 - http://www.openwall.com/lists/oss-security/2016/11/30/3 +CVE-2016-8650 - http://seclists.org/fulldisclosure/2016/Nov/76 +CVE-2016-8654 - https://github.com/mdadams/jasper/issues/93 +CVE-2016-8654 - https://github.com/mdadams/jasper/issues/94 +CVE-2016-8655 - http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html +CVE-2016-8655 - https://www.exploit-db.com/exploits/40871/ +CVE-2016-8655 - https://www.exploit-db.com/exploits/44696/ +CVE-2016-8658 - http://www.ubuntu.com/usn/USN-3145-1 +CVE-2016-8658 - http://www.ubuntu.com/usn/USN-3146-1 +CVE-2016-8661 - https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one +CVE-2016-8676 - http://www.openwall.com/lists/oss-security/2016/12/04/3 +CVE-2016-8676 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-8704 - http://www.talosintelligence.com/reports/TALOS-2016-0219/ +CVE-2016-8705 - http://www.talosintelligence.com/reports/TALOS-2016-0220/ +CVE-2016-8706 - http://www.talosintelligence.com/reports/TALOS-2016-0221/ +CVE-2016-8712 - http://www.talosintelligence.com/reports/TALOS-2016-0225/ +CVE-2016-8714 - http://www.talosintelligence.com/reports/TALOS-2016-0227/ +CVE-2016-8718 - http://www.talosintelligence.com/reports/TALOS-2016-0232/ +CVE-2016-8719 - http://www.talosintelligence.com/reports/TALOS-2016-0233/ +CVE-2016-8720 - http://www.talosintelligence.com/reports/TALOS-2016-0234/ +CVE-2016-8721 - http://www.talosintelligence.com/reports/TALOS-2016-0235/ +CVE-2016-8722 - http://www.talosintelligence.com/reports/TALOS-2016-0236/ +CVE-2016-8723 - http://www.talosintelligence.com/reports/TALOS-2016-0237/ +CVE-2016-8724 - http://www.talosintelligence.com/reports/TALOS-2016-0238/ +CVE-2016-8725 - http://www.talosintelligence.com/reports/TALOS-2016-0239/ +CVE-2016-8726 - http://www.talosintelligence.com/reports/TALOS-2016-0240/ +CVE-2016-8727 - http://www.talosintelligence.com/reports/TALOS-2016-0241/ +CVE-2016-8728 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0242 +CVE-2016-8730 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0244 +CVE-2016-8731 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0245 +CVE-2016-8732 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0246 +CVE-2016-8734 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2016-8735 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-8735 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-8735 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-8737 - https://brooklyn.apache.org/community/security/CVE-2016-8737.html +CVE-2016-8740 - http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html +CVE-2016-8740 - https://www.exploit-db.com/exploits/40909/ +CVE-2016-8742 - https://www.exploit-db.com/exploits/40865/ +CVE-2016-8743 - https://hackerone.com/reports/244459 +CVE-2016-8744 - https://brooklyn.apache.org/community/security/CVE-2016-8744.html +CVE-2016-8745 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-8769 - https://www.exploit-db.com/exploits/40807/ +CVE-2016-8802 - http://www.securityfocus.com/bid/94538 +CVE-2016-8805 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8805 - https://www.exploit-db.com/exploits/40667/ +CVE-2016-8806 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8806 - https://www.exploit-db.com/exploits/40663/ +CVE-2016-8807 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8807 - https://www.exploit-db.com/exploits/40668/ +CVE-2016-8808 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8808 - https://www.exploit-db.com/exploits/40666/ +CVE-2016-8809 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8809 - https://www.exploit-db.com/exploits/40664/ +CVE-2016-8810 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8810 - https://www.exploit-db.com/exploits/40665/ +CVE-2016-8811 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8811 - https://www.exploit-db.com/exploits/40662/ +CVE-2016-8812 - http://nvidia.custhelp.com/app/answers/detail/a_id/4247 +CVE-2016-8812 - https://www.exploit-db.com/exploits/40660/ +CVE-2016-8820 - http://www.securityfocus.com/bid/95045 +CVE-2016-8855 - https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html +CVE-2016-8855 - https://www.exploit-db.com/exploits/41618/ +CVE-2016-8862 - https://github.com/ImageMagick/ImageMagick/issues/271 +CVE-2016-8863 - https://www.tenable.com/security/research/tra-2017-10 +CVE-2016-8866 - https://github.com/ImageMagick/ImageMagick/issues/271 +CVE-2016-8869 - https://medium.com/@showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.rq4qh1v4r +CVE-2016-8869 - https://www.exploit-db.com/exploits/40637/ +CVE-2016-8870 - https://medium.com/@showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.rq4qh1v4r +CVE-2016-8870 - https://www.exploit-db.com/exploits/40637/ +CVE-2016-8887 - http://www.openwall.com/lists/oss-security/2016/10/23/6 +CVE-2016-8897 - http://www.openwall.com/lists/oss-security/2016/09/30/5 +CVE-2016-8898 - http://www.openwall.com/lists/oss-security/2016/09/30/5 +CVE-2016-8899 - http://www.openwall.com/lists/oss-security/2016/09/30/5 +CVE-2016-8900 - http://www.openwall.com/lists/oss-security/2016/09/30/5 +CVE-2016-8902 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8902 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8903 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8903 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8904 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8904 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8905 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8905 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8906 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8906 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8907 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8907 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8908 - http://seclists.org/fulldisclosure/2016/Nov/0 +CVE-2016-8908 - https://security.elarlang.eu/multiple-sql-injection-vulnerabilities-in-dotcms-8x-cve-full-disclosure.html +CVE-2016-8972 - https://www.exploit-db.com/exploits/40950/ +CVE-2016-9017 - http://bugs.ghostscript.com/show_bug.cgi?id=697171 +CVE-2016-9018 - https://www.exploit-db.com/exploits/40617/ +CVE-2016-9019 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-9020 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-9036 - http://www.talosintelligence.com/reports/TALOS-2016-0254/ +CVE-2016-9037 - http://www.talosintelligence.com/reports/TALOS-2016-0255/ +CVE-2016-9039 - http://www.talosintelligence.com/reports/TALOS-2016-0257/ +CVE-2016-9040 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0258 +CVE-2016-9042 - http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html +CVE-2016-9042 - http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html +CVE-2016-9042 - http://www.ubuntu.com/usn/USN-3349-1 +CVE-2016-9044 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315 +CVE-2016-9045 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0314 +CVE-2016-9048 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0313 +CVE-2016-9049 - http://www.talosintelligence.com/reports/TALOS-2016-0263/ +CVE-2016-9050 - http://www.talosintelligence.com/reports/TALOS-2016-0264/ +CVE-2016-9051 - http://www.talosintelligence.com/reports/TALOS-2016-0265/ +CVE-2016-9052 - http://www.talosintelligence.com/reports/TALOS-2016-0266/ +CVE-2016-9053 - http://www.talosintelligence.com/reports/TALOS-2016-0267/ +CVE-2016-9054 - http://www.talosintelligence.com/reports/TALOS-2016-0268/ +CVE-2016-9061 - http://www.securityfocus.com/bid/94337 +CVE-2016-9061 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245795 +CVE-2016-9062 - http://www.securityfocus.com/bid/94337 +CVE-2016-9063 - http://www.securityfocus.com/bid/94337 +CVE-2016-9066 - https://bugzilla.mozilla.org/show_bug.cgi?id=1299686 +CVE-2016-9067 - http://www.securityfocus.com/bid/94337 +CVE-2016-9068 - http://www.securityfocus.com/bid/94337 +CVE-2016-9069 - http://www.securityfocus.com/bid/94337 +CVE-2016-9070 - http://www.securityfocus.com/bid/94337 +CVE-2016-9071 - http://www.securityfocus.com/bid/94337 +CVE-2016-9071 - https://bugzilla.mozilla.org/show_bug.cgi?id=1285003 +CVE-2016-9072 - http://www.securityfocus.com/bid/94337 +CVE-2016-9073 - http://www.securityfocus.com/bid/94337 +CVE-2016-9075 - http://www.securityfocus.com/bid/94337 +CVE-2016-9076 - http://www.securityfocus.com/bid/94337 +CVE-2016-9077 - http://www.securityfocus.com/bid/94337 +CVE-2016-9078 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317641 +CVE-2016-9079 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321066 +CVE-2016-9079 - https://www.exploit-db.com/exploits/41151/ +CVE-2016-9079 - https://www.exploit-db.com/exploits/42327/ +CVE-2016-9086 - https://hackerone.com/reports/178152 +CVE-2016-9087 - http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html +CVE-2016-9091 - https://www.exploit-db.com/exploits/41785/ +CVE-2016-9091 - https://www.exploit-db.com/exploits/41786/ +CVE-2016-9109 - https://bugs.ghostscript.com/show_bug.cgi?id=697136#c4 +CVE-2016-9111 - https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html +CVE-2016-9111 - https://vuldb.com/?id.93250 +CVE-2016-9111 - https://www.exploit-db.com/exploits/40686/ +CVE-2016-9112 - https://github.com/uclouvain/openjpeg/issues/855 +CVE-2016-9112 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-9113 - https://github.com/uclouvain/openjpeg/issues/856 +CVE-2016-9114 - https://github.com/uclouvain/openjpeg/issues/857 +CVE-2016-9115 - https://github.com/uclouvain/openjpeg/issues/858 +CVE-2016-9116 - https://github.com/uclouvain/openjpeg/issues/859 +CVE-2016-9117 - https://github.com/uclouvain/openjpeg/issues/860 +CVE-2016-9118 - https://github.com/uclouvain/openjpeg/issues/861 +CVE-2016-9136 - http://bugs.ghostscript.com/show_bug.cgi?id=697244 +CVE-2016-9137 - https://bugs.php.net/bug.php?id=73147 +CVE-2016-9137 - https://www.tenable.com/security/tns-2016-19 +CVE-2016-9138 - https://bugs.php.net/bug.php?id=73147 +CVE-2016-9148 - http://packetstormsecurity.com/files/139660/CA-Service-Desk-Manaager-12.9-14.1-Code-Execution.html +CVE-2016-9150 - https://www.exploit-db.com/exploits/40790/ +CVE-2016-9151 - https://www.exploit-db.com/exploits/40788/ +CVE-2016-9151 - https://www.exploit-db.com/exploits/40789/ +CVE-2016-9164 - http://packetstormsecurity.com/files/139661/CA-Unified-Infrastructure-Management-Bypass-Traversal-Disclosure.html +CVE-2016-9176 - https://www.exploit-db.com/exploits/40648/ +CVE-2016-9177 - https://github.com/perwendel/spark/issues/700 +CVE-2016-9186 - https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html +CVE-2016-9187 - https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html +CVE-2016-9188 - https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html +CVE-2016-9192 - https://github.com/serializingme/cve-2016-9192 +CVE-2016-9192 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1 +CVE-2016-9207 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-expressway +CVE-2016-9244 - http://packetstormsecurity.com/files/141017/Ticketbleed-F5-TLS-Information-Disclosure.html +CVE-2016-9244 - https://blog.filippo.io/finding-ticketbleed/ +CVE-2016-9244 - https://www.exploit-db.com/exploits/41298/ +CVE-2016-9259 - https://www.tenable.com/security/tns-2016-17 +CVE-2016-9262 - https://blogs.gentoo.org/ago/2016/11/07/jasper-use-after-free-in-jas_realloc-jas_malloc-c +CVE-2016-9262 - https://bugzilla.redhat.com/show_bug.cgi?id=1393882 +CVE-2016-9263 - https://opnsec.com/2017/10/cve-2016-9263-unpatched-xsf-vulnerability-in-wordpress/ +CVE-2016-9264 - https://blogs.gentoo.org/ago/2016/11/07/libming-listmp3-global-buffer-overflow-in-printmp3headers-listmp3-c/ +CVE-2016-9265 - https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-divide-by-zero-in-printmp3headers-list +CVE-2016-9266 - https://blogs.gentoo.org/ago/2016/11/09/libming-listmp3-left-shift-in-listmp3-c +CVE-2016-9271 - https://docs.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html#tsb_210 +CVE-2016-9274 - https://github.com/git-for-windows/git/issues/944 +CVE-2016-9275 - https://blogs.gentoo.org/ago/2016/11/07/libdwarf-heap-based-buffer-overflow-in-_dwarf_skim_forms-dwarf_macro5-c +CVE-2016-9276 - https://blogs.gentoo.org/ago/2016/11/07/libdwarf-heap-based-buffer-overflow-in-dwarf_get_aranges_list-dwarf_arange-c +CVE-2016-9294 - http://bugs.ghostscript.com/show_bug.cgi?id=697172 +CVE-2016-9296 - https://github.com/yangke/7zip-null-pointer-dereference +CVE-2016-9296 - https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db/ +CVE-2016-9297 - http://bugzilla.maptools.org/show_bug.cgi?id=2590 +CVE-2016-9299 - http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition +CVE-2016-9299 - https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ +CVE-2016-9299 - https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 +CVE-2016-9299 - https://www.exploit-db.com/exploits/44642/ +CVE-2016-9310 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-9311 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-9312 - https://www.kb.cert.org/vuls/id/633847 +CVE-2016-9313 - http://www.openwall.com/lists/oss-security/2016/07/22/1 +CVE-2016-9318 - https://github.com/lsh123/xmlsec/issues/43 +CVE-2016-9332 - https://www.exploit-db.com/exploits/40779/ +CVE-2016-9349 - https://www.exploit-db.com/exploits/42401/ +CVE-2016-9349 - https://www.exploit-db.com/exploits/42402/ +CVE-2016-9351 - https://www.exploit-db.com/exploits/42402/ +CVE-2016-9387 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9387 - https://bugzilla.redhat.com/show_bug.cgi?id=1396959 +CVE-2016-9388 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9388 - https://bugzilla.redhat.com/show_bug.cgi?id=1396962 +CVE-2016-9389 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9389 - https://bugzilla.redhat.com/show_bug.cgi?id=1396963 +CVE-2016-9389 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-9390 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9390 - https://bugzilla.redhat.com/show_bug.cgi?id=1396965 +CVE-2016-9391 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9391 - https://bugzilla.redhat.com/show_bug.cgi?id=1396967 +CVE-2016-9392 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9392 - https://bugzilla.redhat.com/show_bug.cgi?id=1396971 +CVE-2016-9392 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-9393 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9394 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9395 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9395 - https://bugzilla.redhat.com/show_bug.cgi?id=1396977 +CVE-2016-9396 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9396 - https://bugzilla.redhat.com/show_bug.cgi?id=1396978 +CVE-2016-9397 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9397 - https://bugzilla.redhat.com/show_bug.cgi?id=1396979 +CVE-2016-9398 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9398 - https://bugzilla.redhat.com/show_bug.cgi?id=1396980 +CVE-2016-9399 - https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure +CVE-2016-9399 - https://bugzilla.redhat.com/show_bug.cgi?id=1396981 +CVE-2016-9402 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9403 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9404 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9405 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9406 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9407 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9408 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9409 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9410 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9411 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9412 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9413 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9414 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9415 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9416 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9417 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9418 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9419 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9420 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9421 - http://www.openwall.com/lists/oss-security/2016/11/18/1 +CVE-2016-9422 - http://www.securityfocus.com/bid/94407 +CVE-2016-9423 - http://www.securityfocus.com/bid/94407 +CVE-2016-9423 - https://github.com/tats/w3m/issues/9 +CVE-2016-9424 - http://www.securityfocus.com/bid/94407 +CVE-2016-9425 - http://www.securityfocus.com/bid/94407 +CVE-2016-9425 - https://github.com/tats/w3m/issues/21 +CVE-2016-9426 - http://www.securityfocus.com/bid/94407 +CVE-2016-9427 - http://www.securityfocus.com/bid/94407 +CVE-2016-9428 - http://www.securityfocus.com/bid/94407 +CVE-2016-9429 - http://www.securityfocus.com/bid/94407 +CVE-2016-9430 - http://www.securityfocus.com/bid/94407 +CVE-2016-9431 - http://www.securityfocus.com/bid/94407 +CVE-2016-9432 - http://www.securityfocus.com/bid/94407 +CVE-2016-9433 - http://www.securityfocus.com/bid/94407 +CVE-2016-9434 - http://www.securityfocus.com/bid/94407 +CVE-2016-9435 - http://www.securityfocus.com/bid/94407 +CVE-2016-9436 - http://www.securityfocus.com/bid/94407 +CVE-2016-9437 - http://www.securityfocus.com/bid/94407 +CVE-2016-9438 - http://www.securityfocus.com/bid/94407 +CVE-2016-9439 - http://www.securityfocus.com/bid/94407 +CVE-2016-9440 - http://www.securityfocus.com/bid/94407 +CVE-2016-9441 - http://www.securityfocus.com/bid/94407 +CVE-2016-9442 - http://www.securityfocus.com/bid/94407 +CVE-2016-9443 - http://www.securityfocus.com/bid/94407 +CVE-2016-9445 - http://www.openwall.com/lists/oss-security/2016/11/18/12 +CVE-2016-9445 - http://www.openwall.com/lists/oss-security/2016/11/18/13 +CVE-2016-9445 - https://bugzilla.gnome.org/show_bug.cgi?id=774533 +CVE-2016-9445 - https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe +CVE-2016-9445 - https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html +CVE-2016-9446 - http://www.openwall.com/lists/oss-security/2016/11/18/12 +CVE-2016-9446 - http://www.openwall.com/lists/oss-security/2016/11/18/13 +CVE-2016-9446 - https://bugzilla.gnome.org/show_bug.cgi?id=774533 +CVE-2016-9446 - https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe +CVE-2016-9446 - https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html +CVE-2016-9447 - http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html +CVE-2016-9447 - http://www.openwall.com/lists/oss-security/2016/11/18/12 +CVE-2016-9447 - http://www.openwall.com/lists/oss-security/2016/11/18/13 +CVE-2016-9453 - http://bugzilla.maptools.org/show_bug.cgi?id=2579 +CVE-2016-9459 - https://hackerone.com/reports/146278 +CVE-2016-9460 - https://hackerone.com/reports/145463 +CVE-2016-9461 - https://hackerone.com/reports/145950 +CVE-2016-9462 - https://hackerone.com/reports/146067 +CVE-2016-9463 - https://github.com/nextcloud/apps/commit/decb91fd31f4ffab191cbf09ce4e5c55c67a4087 +CVE-2016-9463 - https://hackerone.com/reports/148151 +CVE-2016-9463 - https://rhinosecuritylabs.com/2016/10/operation-ownedcloud-exploitation-post-exploitation-persistence/ +CVE-2016-9464 - https://hackerone.com/reports/153905 +CVE-2016-9465 - https://hackerone.com/reports/163338 +CVE-2016-9466 - https://hackerone.com/reports/165686 +CVE-2016-9467 - https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d +CVE-2016-9467 - https://hackerone.com/reports/154827 +CVE-2016-9468 - https://hackerone.com/reports/149798 +CVE-2016-9469 - https://gitlab.com/gitlab-org/gitlab-ce/issues/25064 +CVE-2016-9469 - https://hackerone.com/reports/186194 +CVE-2016-9470 - https://www.revive-adserver.com/security/revive-sa-2016-002/ +CVE-2016-9471 - https://www.revive-adserver.com/security/revive-sa-2016-002/ +CVE-2016-9472 - https://hackerone.com/reports/170156 +CVE-2016-9472 - https://www.revive-adserver.com/security/revive-sa-2016-002/ +CVE-2016-9473 - https://cxsecurity.com/issue/WLB-2017010042 +CVE-2016-9473 - https://hackerone.com/reports/175958 +CVE-2016-9480 - https://www.prevanders.net/dwarfbug.html +CVE-2016-9485 - https://www.kb.cert.org/vuls/id/768331 +CVE-2016-9486 - https://www.kb.cert.org/vuls/id/768331 +CVE-2016-9488 - http://packetstormsecurity.com/files/158554/ManageEngine-Applications-Manager-13-SQL-Injection.html +CVE-2016-9488 - http://seclists.org/fulldisclosure/2017/Apr/9 +CVE-2016-9488 - https://packetstormsecurity.com/files/142022/ManageEngine-Applications-Manager-12-13-XSS-SQL-Injection-Code-Execution.html +CVE-2016-9489 - http://seclists.org/fulldisclosure/2017/Apr/9 +CVE-2016-9490 - http://seclists.org/fulldisclosure/2017/Apr/9 +CVE-2016-9490 - https://packetstormsecurity.com/files/142022/ManageEngine-Applications-Manager-12-13-XSS-SQL-Injection-Code-Execution.html +CVE-2016-9491 - http://seclists.org/fulldisclosure/2017/Apr/9 +CVE-2016-9494 - https://www.kb.cert.org/vuls/id/614751 +CVE-2016-9495 - https://www.kb.cert.org/vuls/id/614751 +CVE-2016-9496 - https://www.kb.cert.org/vuls/id/614751 +CVE-2016-9497 - https://www.kb.cert.org/vuls/id/614751 +CVE-2016-9498 - http://seclists.org/fulldisclosure/2017/Apr/9 +CVE-2016-9499 - https://www.kb.cert.org/vuls/id/745607 +CVE-2016-9500 - https://www.kb.cert.org/vuls/id/745607 +CVE-2016-9555 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8 +CVE-2016-9556 - http://www.openwall.com/lists/oss-security/2016/12/01/4 +CVE-2016-9556 - https://blogs.gentoo.org/ago/2016/11/19/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h +CVE-2016-9557 - https://blogs.gentoo.org/ago/2016/11/19/jasper-signed-integer-overflow-in-jas_image-c +CVE-2016-9558 - http://www.openwall.com/lists/oss-security/2016/11/19/6 +CVE-2016-9558 - https://blogs.gentoo.org/ago/2016/11/19/libdwarf-negation-overflow-in-dwarf_leb-c/ +CVE-2016-9558 - https://www.prevanders.net/dwarfbug.html +CVE-2016-9559 - http://www.openwall.com/lists/oss-security/2016/11/19/7 +CVE-2016-9559 - https://blogs.gentoo.org/ago/2016/11/19/imagemagick-null-pointer-must-never-be-null-tiff-c/ +CVE-2016-9559 - https://github.com/ImageMagick/ImageMagick/issues/298 +CVE-2016-9560 - http://www.openwall.com/lists/oss-security/2016/11/20/1 +CVE-2016-9560 - https://blogs.gentoo.org/ago/2016/11/20/jasper-stack-based-buffer-overflow-in-jpc_tsfb_getbands2-jpc_tsfb-c/ +CVE-2016-9560 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-9560 +CVE-2016-9562 - https://erpscan.io/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/ +CVE-2016-9563 - https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/ +CVE-2016-9565 - http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html +CVE-2016-9565 - http://seclists.org/fulldisclosure/2016/Dec/57 +CVE-2016-9565 - https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html +CVE-2016-9565 - https://www.exploit-db.com/exploits/40920/ +CVE-2016-9566 - http://seclists.org/fulldisclosure/2016/Dec/58 +CVE-2016-9566 - https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html +CVE-2016-9566 - https://www.exploit-db.com/exploits/40921/ +CVE-2016-9568 - https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ +CVE-2016-9569 - https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ +CVE-2016-9570 - https://labs.nettitude.com/blog/carbon-black-security-advisories-cve-2016-9570-cve-2016-9568-and-cve-2016-9569/ +CVE-2016-9572 - https://github.com/uclouvain/openjpeg/issues/863 +CVE-2016-9573 - https://github.com/uclouvain/openjpeg/issues/862 +CVE-2016-9580 - https://github.com/uclouvain/openjpeg/issues/871 +CVE-2016-9581 - https://github.com/uclouvain/openjpeg/issues/872 +CVE-2016-9583 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2016-9586 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-9587 - https://www.exploit-db.com/exploits/41013/ +CVE-2016-9588 - https://usn.ubuntu.com/3822-1/ +CVE-2016-9601 - https://bugs.ghostscript.com/show_bug.cgi?id=697457 +CVE-2016-9604 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f +CVE-2016-9634 - https://bugzilla.gnome.org/show_bug.cgi?id=774834 +CVE-2016-9634 - https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html +CVE-2016-9635 - https://bugzilla.gnome.org/show_bug.cgi?id=774834 +CVE-2016-9635 - https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html +CVE-2016-9636 - https://bugzilla.gnome.org/show_bug.cgi?id=774834 +CVE-2016-9636 - https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html +CVE-2016-9644 - http://www.ubuntu.com/usn/USN-3146-1 +CVE-2016-9650 - http://www.securityfocus.com/bid/94633 +CVE-2016-9651 - http://www.securityfocus.com/bid/94633 +CVE-2016-9651 - https://www.exploit-db.com/exploits/42175/ +CVE-2016-9652 - http://www.securityfocus.com/bid/94633 +CVE-2016-9682 - https://www.exploit-db.com/exploits/42342/ +CVE-2016-9722 - https://www.exploit-db.com/exploits/45005/ +CVE-2016-9726 - http://www.ibm.com/support/docview.wss?uid=swg21999542 +CVE-2016-9727 - http://www.ibm.com/support/docview.wss?uid=swg21999542 +CVE-2016-9756 - https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c +CVE-2016-9773 - http://www.openwall.com/lists/oss-security/2016/12/01/4 +CVE-2016-9773 - https://blogs.gentoo.org/ago/2016/12/01/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h-incomplete-fix-for-cve-2016-9556/ +CVE-2016-9774 - http://www.ubuntu.com/usn/USN-3177-1 +CVE-2016-9775 - http://www.ubuntu.com/usn/USN-3177-1 +CVE-2016-9775 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2016-9793 - https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793 +CVE-2016-9796 - http://blog.malerisch.net/2016/12/alcatel-omnivista-8770-unauth-rce-giop-corba.html +CVE-2016-9796 - https://github.com/malerisch/omnivista-8770-unauth-rce +CVE-2016-9796 - https://www.exploit-db.com/exploits/40862/ +CVE-2016-9797 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9798 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9799 - https://www.spinics.net/lists/linux-bluetooth/msg68898.html +CVE-2016-9800 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9801 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9802 - https://www.spinics.net/lists/linux-bluetooth/msg68898.html +CVE-2016-9803 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9804 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9807 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9807 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9807 - https://bugzilla.gnome.org/show_bug.cgi?id=774859 +CVE-2016-9808 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9808 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9808 - https://scarybeastsecurity.blogspot.com/2016/11/0day-poc-incorrect-fix-for-gstreamer.html +CVE-2016-9809 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9809 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9809 - https://bugzilla.gnome.org/show_bug.cgi?id=774896 +CVE-2016-9810 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9810 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9810 - https://bugzilla.gnome.org/show_bug.cgi?id=774897 +CVE-2016-9811 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9811 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9811 - https://bugzilla.gnome.org/show_bug.cgi?id=774902 +CVE-2016-9812 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9812 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9812 - https://bugzilla.gnome.org/show_bug.cgi?id=775048 +CVE-2016-9813 - http://www.openwall.com/lists/oss-security/2016/12/01/2 +CVE-2016-9813 - http://www.openwall.com/lists/oss-security/2016/12/05/8 +CVE-2016-9813 - https://bugzilla.gnome.org/show_bug.cgi?id=775120 +CVE-2016-9813 - https://www.exploit-db.com/exploits/42162/ +CVE-2016-9819 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9820 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9821 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9822 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9823 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9824 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9825 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9826 - https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/ +CVE-2016-9827 - http://www.openwall.com/lists/oss-security/2016/12/01/7 +CVE-2016-9827 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c/ +CVE-2016-9828 - http://www.openwall.com/lists/oss-security/2016/12/01/8 +CVE-2016-9828 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-null-pointer-dereference-in-dumpbuffer-read-c/ +CVE-2016-9829 - http://www.openwall.com/lists/oss-security/2016/12/01/5 +CVE-2016-9829 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_definefont-parser-c/ +CVE-2016-9830 - https://blogs.gentoo.org/ago/2016/12/01/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c +CVE-2016-9831 - http://www.openwall.com/lists/oss-security/2016/12/01/6 +CVE-2016-9831 - https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_rgba-parser-c/ +CVE-2016-9832 - http://packetstormsecurity.com/files/140062/PwC-ACE-Software-For-SAP-Security-8.10.304-ABAP-Injection.html +CVE-2016-9834 - http://seclists.org/bugtraq/2017/Jun/4 +CVE-2016-9835 - https://github.com/zikula/core/issues/3237 +CVE-2016-9836 - https://github.com/XiphosResearch/exploits/tree/master/Joomraa +CVE-2016-9838 - https://www.exploit-db.com/exploits/41157/ +CVE-2016-9840 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-9840 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-9840 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-9841 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-9841 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-9841 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-9841 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-9842 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-9842 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-9842 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-9843 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-9843 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2016-9843 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-9843 - https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 +CVE-2016-9843 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2016-9844 - https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 +CVE-2016-9847 - https://www.phpmyadmin.net/security/PMASA-2016-58 +CVE-2016-9878 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2016-9878 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2016-9888 - https://github.com/GNOME/libgsf/commit/95a8351a75758cf10b3bf6abae0b6b461f90d9e5 +CVE-2016-9892 - http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html +CVE-2016-9892 - http://seclists.org/fulldisclosure/2017/Feb/68 +CVE-2016-9899 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317409 +CVE-2016-9899 - https://www.exploit-db.com/exploits/41042/ +CVE-2016-9900 - https://bugzilla.mozilla.org/show_bug.cgi?id=1319122 +CVE-2016-9901 - https://bugzilla.mozilla.org/show_bug.cgi?id=1320057 +CVE-2016-9902 - https://bugzilla.mozilla.org/show_bug.cgi?id=1320039 +CVE-2016-9903 - https://bugzilla.mozilla.org/show_bug.cgi?id=1315435 +CVE-2016-9917 - https://www.spinics.net/lists/linux-bluetooth/msg68892.html +CVE-2016-9918 - https://www.spinics.net/lists/linux-bluetooth/msg68898.html +CVE-2016-9920 - https://blog.ripstech.com/2016/roundcube-command-execution-via-email/ +CVE-2016-9933 - https://bugs.php.net/bug.php?id=72696 +CVE-2016-9933 - https://github.com/libgd/libgd/issues/215 +CVE-2016-9934 - https://bugs.php.net/bug.php?id=73331 +CVE-2016-9936 - https://bugs.php.net/bug.php?id=72978 +CVE-2016-9941 - https://github.com/LibVNC/libvncserver/pull/137 +CVE-2016-9942 - https://github.com/LibVNC/libvncserver/pull/137 +CVE-2016-9949 - https://bugs.launchpad.net/apport/+bug/1648806 +CVE-2016-9949 - https://github.com/DonnchaC/ubuntu-apport-exploitation +CVE-2016-9949 - https://www.exploit-db.com/exploits/40937/ +CVE-2016-9950 - https://bugs.launchpad.net/apport/+bug/1648806 +CVE-2016-9950 - https://github.com/DonnchaC/ubuntu-apport-exploitation +CVE-2016-9950 - https://www.exploit-db.com/exploits/40937/ +CVE-2016-9951 - https://bugs.launchpad.net/apport/+bug/1648806 +CVE-2016-9951 - https://github.com/DonnchaC/ubuntu-apport-exploitation +CVE-2016-9951 - https://www.exploit-db.com/exploits/40937/ +CVE-2016-9957 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html +CVE-2016-9958 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html +CVE-2016-9959 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html +CVE-2016-9960 - https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html +CVE-2016-9961 - https://scarybeastsecurity.blogspot.cz/2016/12/redux-compromising-linux-using-snes.html +CVE-2017-0003 - http://fortiguard.com/advisory/FG-VD-16-079 +CVE-2017-0022 - https://0patch.blogspot.com/2017/09/exploit-kit-rendezvous-and-cve-2017-0022.html +CVE-2017-0037 - https://0patch.blogspot.si/2017/03/0patching-another-0-day-internet.html +CVE-2017-0037 - https://www.exploit-db.com/exploits/41454/ +CVE-2017-0037 - https://www.exploit-db.com/exploits/42354/ +CVE-2017-0037 - https://www.exploit-db.com/exploits/43125/ +CVE-2017-0038 - https://0patch.blogspot.com/2017/02/0patching-0-day-windows-gdi32dll-memory.html +CVE-2017-0038 - https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS +CVE-2017-0038 - https://www.exploit-db.com/exploits/41363/ +CVE-2017-0045 - http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt +CVE-2017-0045 - https://www.exploit-db.com/exploits/41619/ +CVE-2017-0058 - https://www.exploit-db.com/exploits/41879/ +CVE-2017-0059 - https://www.exploit-db.com/exploits/41661/ +CVE-2017-0059 - https://www.exploit-db.com/exploits/42354/ +CVE-2017-0059 - https://www.exploit-db.com/exploits/43125/ +CVE-2017-0060 - https://www.exploit-db.com/exploits/41656/ +CVE-2017-0061 - https://www.exploit-db.com/exploits/41657/ +CVE-2017-0062 - https://www.exploit-db.com/exploits/41658/ +CVE-2017-0063 - https://www.exploit-db.com/exploits/41659/ +CVE-2017-0070 - https://www.exploit-db.com/exploits/41623/ +CVE-2017-0072 - https://www.exploit-db.com/exploits/41654/ +CVE-2017-0083 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0084 - https://www.exploit-db.com/exploits/41648/ +CVE-2017-0085 - https://www.exploit-db.com/exploits/41646/ +CVE-2017-0086 - https://www.exploit-db.com/exploits/41649/ +CVE-2017-0087 - https://www.exploit-db.com/exploits/41650/ +CVE-2017-0088 - https://www.exploit-db.com/exploits/41651/ +CVE-2017-0089 - https://www.exploit-db.com/exploits/41652/ +CVE-2017-0090 - https://www.exploit-db.com/exploits/41653/ +CVE-2017-0091 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0092 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0100 - http://blog.inspired-sec.com/archive/2017/03/17/COM-Moniker-Privesc.html +CVE-2017-0100 - https://www.exploit-db.com/exploits/41607/ +CVE-2017-0101 - https://www.exploit-db.com/exploits/44479/ +CVE-2017-0103 - https://www.exploit-db.com/exploits/41645/ +CVE-2017-0108 - https://www.exploit-db.com/exploits/41647/ +CVE-2017-0111 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0112 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0113 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0114 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0115 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0116 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0117 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0118 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0119 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0120 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0121 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0122 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0123 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0124 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0125 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0126 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0127 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0128 - https://www.exploit-db.com/exploits/41655/ +CVE-2017-0135 - https://www.freebuf.com/articles/web/164871.html +CVE-2017-0141 - http://packetstormsecurity.com/files/172826/Microsoft-ChakaCore-Remote-Code-Execution.html +CVE-2017-0143 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html +CVE-2017-0143 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html +CVE-2017-0143 - https://www.exploit-db.com/exploits/41891/ +CVE-2017-0143 - https://www.exploit-db.com/exploits/41987/ +CVE-2017-0143 - https://www.exploit-db.com/exploits/43970/ +CVE-2017-0144 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html +CVE-2017-0144 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html +CVE-2017-0144 - https://www.exploit-db.com/exploits/41891/ +CVE-2017-0144 - https://www.exploit-db.com/exploits/41987/ +CVE-2017-0144 - https://www.exploit-db.com/exploits/42030/ +CVE-2017-0144 - https://www.exploit-db.com/exploits/42031/ +CVE-2017-0145 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html +CVE-2017-0145 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html +CVE-2017-0145 - https://www.exploit-db.com/exploits/41891/ +CVE-2017-0145 - https://www.exploit-db.com/exploits/41987/ +CVE-2017-0146 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html +CVE-2017-0146 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html +CVE-2017-0146 - https://www.exploit-db.com/exploits/41891/ +CVE-2017-0146 - https://www.exploit-db.com/exploits/41987/ +CVE-2017-0146 - https://www.exploit-db.com/exploits/43970/ +CVE-2017-0147 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html +CVE-2017-0147 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html +CVE-2017-0147 - https://www.exploit-db.com/exploits/41891/ +CVE-2017-0147 - https://www.exploit-db.com/exploits/41987/ +CVE-2017-0147 - https://www.exploit-db.com/exploits/43970/ +CVE-2017-0148 - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html +CVE-2017-0148 - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html +CVE-2017-0148 - https://www.exploit-db.com/exploits/41891/ +CVE-2017-0148 - https://www.exploit-db.com/exploits/41987/ +CVE-2017-0160 - https://www.exploit-db.com/exploits/41903/ +CVE-2017-0165 - https://www.exploit-db.com/exploits/41901/ +CVE-2017-0167 - https://www.exploit-db.com/exploits/41880/ +CVE-2017-0175 - https://www.exploit-db.com/exploits/42009/ +CVE-2017-0199 - http://rewtin.blogspot.nl/2017/04/cve-2017-0199-practical-exploitation-poc.html +CVE-2017-0199 - https://www.exploit-db.com/exploits/41894/ +CVE-2017-0199 - https://www.exploit-db.com/exploits/41934/ +CVE-2017-0199 - https://www.exploit-db.com/exploits/42995/ +CVE-2017-0202 - https://www.exploit-db.com/exploits/41941/ +CVE-2017-0211 - https://www.exploit-db.com/exploits/41902/ +CVE-2017-0213 - https://www.exploit-db.com/exploits/42020/ +CVE-2017-0214 - https://www.exploit-db.com/exploits/42021/ +CVE-2017-0220 - https://www.exploit-db.com/exploits/42009/ +CVE-2017-0245 - https://www.exploit-db.com/exploits/42008/ +CVE-2017-0258 - https://www.exploit-db.com/exploits/42006/ +CVE-2017-0259 - https://www.exploit-db.com/exploits/42007/ +CVE-2017-0263 - https://www.exploit-db.com/exploits/44478/ +CVE-2017-0263 - https://xiaodaozhi.com/exploit/117.html +CVE-2017-0282 - https://www.exploit-db.com/exploits/42237/ +CVE-2017-0283 - https://0patch.blogspot.com/2017/07/0patching-quick-brown-fox-of-cve-2017.html +CVE-2017-0283 - https://www.exploit-db.com/exploits/42234/ +CVE-2017-0284 - https://www.exploit-db.com/exploits/42235/ +CVE-2017-0285 - https://www.exploit-db.com/exploits/42236/ +CVE-2017-0286 - https://www.exploit-db.com/exploits/42238/ +CVE-2017-0287 - https://www.exploit-db.com/exploits/42239/ +CVE-2017-0288 - https://www.exploit-db.com/exploits/42241/ +CVE-2017-0289 - https://www.exploit-db.com/exploits/42240/ +CVE-2017-0290 - https://0patch.blogspot.si/2017/05/0patching-worst-windows-remote-code.html +CVE-2017-0290 - https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/ +CVE-2017-0290 - https://www.exploit-db.com/exploits/41975/ +CVE-2017-0299 - https://www.exploit-db.com/exploits/42219/ +CVE-2017-0300 - https://www.exploit-db.com/exploits/42244/ +CVE-2017-0308 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0309 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0310 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0311 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0312 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0312 - https://www.exploit-db.com/exploits/41364/ +CVE-2017-0313 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0313 - https://www.exploit-db.com/exploits/41365/ +CVE-2017-0314 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0315 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0317 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0318 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0319 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0320 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0321 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0322 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0323 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0324 - http://nvidia.custhelp.com/app/answers/detail/a_id/4398 +CVE-2017-0341 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0342 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0343 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0344 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0345 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0346 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0347 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0348 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0349 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0350 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0351 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0352 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0353 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0354 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0355 - http://nvidia.custhelp.com/app/answers/detail/a_id/4462 +CVE-2017-0358 - http://www.openwall.com/lists/oss-security/2017/02/04/1 +CVE-2017-0358 - https://www.exploit-db.com/exploits/41240/ +CVE-2017-0358 - https://www.exploit-db.com/exploits/41356/ +CVE-2017-0366 - https://phabricator.wikimedia.org/T151735 +CVE-2017-0379 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-0379 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-0384 - https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe +CVE-2017-0390 - https://android.googlesource.com/platform/external/tremolo/+/5dc99237d49e73c27d3eca54f6ccd97d13f94de0 +CVE-2017-0399 - https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac +CVE-2017-0400 - https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac +CVE-2017-0401 - https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe +CVE-2017-0402 - https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac +CVE-2017-0402 - https://android.googlesource.com/platform/hardware/qcom/audio/+/d72ea85c78a1a68bf99fd5804ad9784b4102fe57 +CVE-2017-0411 - https://www.exploit-db.com/exploits/41354/ +CVE-2017-0412 - https://www.exploit-db.com/exploits/41355/ +CVE-2017-0425 - http://www.securityfocus.com/bid/96106 +CVE-2017-0478 - https://github.com/JiounDai/CVE-2017-0478 +CVE-2017-0510 - https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/ +CVE-2017-0541 - https://github.com/JiounDai/CVE-2017-0541 +CVE-2017-0551 - https://android.googlesource.com/platform/external/libavc/+/8b5fd8f24eba5dd19ab2f80ea11a9125aa882ae2 +CVE-2017-0561 - https://www.exploit-db.com/exploits/41805/ +CVE-2017-0561 - https://www.exploit-db.com/exploits/41806/ +CVE-2017-0563 - http://seclists.org/fulldisclosure/2017/May/19 +CVE-2017-0563 - https://alephsecurity.com/vulns/aleph-2017009 +CVE-2017-0569 - https://www.exploit-db.com/exploits/41808/ +CVE-2017-0576 - https://github.com/derrekr/android_security/commit/0dd1a733e60cf5239c0a185d4219ba2ef1118a8b +CVE-2017-0594 - https://android.googlesource.com/platform/frameworks/av/+/594bf934384920618d2b6ce0bcda1f60144cb3eb +CVE-2017-0595 - https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1 +CVE-2017-0596 - https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1 +CVE-2017-0600 - https://android.googlesource.com/platform/frameworks/av/+/961e5ac5788b52304e64b9a509781beaf5201fb0 +CVE-2017-0635 - https://android.googlesource.com/platform/frameworks/av/+/523f6b49c1a2289161f40cf9fe80b92e592e9441 +CVE-2017-0750 - https://usn.ubuntu.com/3583-2/ +CVE-2017-0781 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-0781 - https://www.exploit-db.com/exploits/44415/ +CVE-2017-0782 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-0783 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-0785 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-0785 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-0810 - https://android.googlesource.com/platform/external/libmpeg2/+/7737780815fe523ad7b0e49456eb75d27a30818a +CVE-2017-0811 - https://android.googlesource.com/platform/external/libhevc/+/25c0ffbe6a181b4a373c3c9b421ea449d457e6ed +CVE-2017-0812 - https://android.googlesource.com/device/google/dragon/+/7df7ec13b1d222ac3a66797fbe432605ea8f973f +CVE-2017-0814 - https://android.googlesource.com/platform/external/tremolo/+/eeb4e45d5683f88488c083ecf142dc89bc3f0b47 +CVE-2017-0817 - https://android.googlesource.com/platform/frameworks/av/+/d834160d9759f1098df692b34e6eeb548f9e317b +CVE-2017-0818 - https://android.googlesource.com/platform/frameworks/av/+/d07f5c14e811951ff9b411ceb84e7288e0d04aaf +CVE-2017-0819 - https://android.googlesource.com/platform/external/libhevc/+/87fb7909c49e6a4510ba86ace1ffc83459c7e1b9 +CVE-2017-0820 - https://android.googlesource.com/platform/frameworks/av/+/8a3a2f6ea7defe1a81bb32b3c9f3537f84749b9d +CVE-2017-0861 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229 +CVE-2017-0861 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-0861 - https://usn.ubuntu.com/3583-2/ +CVE-2017-0861 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-0883 - https://hackerone.com/reports/169680 +CVE-2017-0884 - https://hackerone.com/reports/169680 +CVE-2017-0885 - https://hackerone.com/reports/174524 +CVE-2017-0886 - https://hackerone.com/reports/174524 +CVE-2017-0887 - https://hackerone.com/reports/173622 +CVE-2017-0888 - https://hackerone.com/reports/179073 +CVE-2017-0889 - https://hackerone.com/reports/713 +CVE-2017-0890 - https://hackerone.com/reports/213227 +CVE-2017-0891 - https://hackerone.com/reports/216812 +CVE-2017-0892 - https://hackerone.com/reports/191979 +CVE-2017-0893 - https://hackerone.com/reports/222838 +CVE-2017-0894 - https://hackerone.com/reports/218876 +CVE-2017-0895 - https://hackerone.com/reports/203594 +CVE-2017-0898 - https://hackerone.com/reports/212241 +CVE-2017-0899 - https://hackerone.com/reports/226335 +CVE-2017-0900 - https://hackerone.com/reports/243003 +CVE-2017-0901 - https://hackerone.com/reports/243156 +CVE-2017-0901 - https://www.exploit-db.com/exploits/42611/ +CVE-2017-0902 - https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32 +CVE-2017-0902 - https://hackerone.com/reports/218088 +CVE-2017-0903 - https://hackerone.com/reports/274990 +CVE-2017-0904 - https://edoverflow.com/2017/ruby-resolv-bug/ +CVE-2017-0904 - https://github.com/jtdowney/private_address_check/issues/1 +CVE-2017-0904 - https://hackerone.com/reports/287245 +CVE-2017-0909 - https://hackerone.com/reports/288950 +CVE-2017-0913 - https://hackerone.com/reports/301406 +CVE-2017-0914 - https://hackerone.com/reports/298176 +CVE-2017-0915 - https://hackerone.com/reports/298873 +CVE-2017-0916 - https://hackerone.com/reports/299473 +CVE-2017-0918 - https://hackerone.com/reports/301432 +CVE-2017-0919 - https://hackerone.com/reports/301137 +CVE-2017-0928 - https://hackerone.com/reports/308158 +CVE-2017-0930 - https://hackerone.com/reports/296282 +CVE-2017-0931 - https://github.com/guardian/html-janitor/issues/34 +CVE-2017-0931 - https://hackerone.com/reports/308155 +CVE-2017-0932 - https://hackerone.com/reports/239719 +CVE-2017-0933 - https://hackerone.com/reports/240098 +CVE-2017-0934 - https://hackerone.com/reports/241044 +CVE-2017-0935 - https://hackerone.com/reports/242407 +CVE-2017-0936 - https://hackerone.com/reports/297751 +CVE-2017-10000 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1000010 - https://packetstormsecurity.com/files/140365/Audacity-2.1.2-DLL-Hijacking.html +CVE-2017-1000027 - https://cp270.wordpress.com/2017/02/02/security-advisory-open-url-redirect-in-sme-server/ +CVE-2017-1000028 - https://www.exploit-db.com/exploits/45196/ +CVE-2017-1000028 - https://www.exploit-db.com/exploits/45198/ +CVE-2017-1000028 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904 +CVE-2017-1000029 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037 +CVE-2017-1000030 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037 +CVE-2017-1000033 - https://cjc.im/advisories/0007/ +CVE-2017-1000033 - https://wpvulndb.com/vulnerabilities/8862 +CVE-2017-1000034 - http://doc.akka.io/docs/akka/2.4/security/2017-02-10-java-serialization.html +CVE-2017-1000037 - https://github.com/justinsteven/advisories/blob/master/2017_rvm_cd_command_execution.md +CVE-2017-1000038 - https://security.dxw.com/advisories/stored-xss-in-relevanssi-could-allow-an-unauthenticated-attacker-to-do-almost-anything-an-admin-can-do/ +CVE-2017-1000042 - https://hackerone.com/reports/54327 +CVE-2017-1000043 - https://hackerone.com/reports/99245 +CVE-2017-1000047 - https://github.com/justinsteven/advisories/blob/master/2017_rbenv_ruby_version_directory_traversal.md +CVE-2017-1000060 - https://rioru.github.io/pentest/web/2017/03/28/from-unauthenticated-to-root-supervision.html +CVE-2017-1000061 - https://github.com/lsh123/xmlsec/issues/43 +CVE-2017-1000061 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2017-1000062 - https://elixirforum.com/t/kitto-a-framework-for-interactive-dashboards/2089/13 +CVE-2017-1000063 - https://elixirforum.com/t/kitto-a-framework-for-interactive-dashboards/2089/13 +CVE-2017-1000064 - https://elixirforum.com/t/kitto-a-framework-for-interactive-dashboards/2089/13 +CVE-2017-1000072 - https://github.com/marcobambini/gravity/issues/123 +CVE-2017-1000075 - https://github.com/marcobambini/gravity/issues/133 +CVE-2017-1000083 - http://seclists.org/oss-sec/2017/q3/128 +CVE-2017-1000083 - https://bugzilla.gnome.org/show_bug.cgi?id=784630 +CVE-2017-1000083 - https://www.exploit-db.com/exploits/45824/ +CVE-2017-1000083 - https://www.exploit-db.com/exploits/46341/ +CVE-2017-10001 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1000112 - https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 +CVE-2017-1000112 - https://hackerone.com/reports/684573 +CVE-2017-1000112 - https://www.exploit-db.com/exploits/45147/ +CVE-2017-1000116 - https://hackerone.com/reports/260005 +CVE-2017-1000117 - https://hackerone.com/reports/260005 +CVE-2017-1000117 - https://www.exploit-db.com/exploits/42599/ +CVE-2017-1000119 - http://packetstormsecurity.com/files/154390/October-CMS-Upload-Protection-Bypass-Code-Execution.html +CVE-2017-1000120 - http://tech.mantz-it.com/2016/12/sql-injection-in-frappe-framework.html +CVE-2017-1000126 - http://www.openwall.com/lists/oss-security/2017/06/30/1 +CVE-2017-1000127 - http://www.openwall.com/lists/oss-security/2017/06/30/1 +CVE-2017-1000128 - http://www.openwall.com/lists/oss-security/2017/06/30/1 +CVE-2017-1000136 - https://bugs.launchpad.net/mahara/+bug/1363873 +CVE-2017-1000140 - https://bugs.launchpad.net/mahara/+bug/1404117 +CVE-2017-1000147 - https://bugs.launchpad.net/mahara/+bug/1480329 +CVE-2017-1000158 - https://bugs.python.org/issue30657 +CVE-2017-1000163 - https://elixirforum.com/t/security-releases-for-phoenix/4143 +CVE-2017-1000170 - http://packetstormsecurity.com/files/161900/WordPress-Delightful-Downloads-Jquery-File-Tree-1.6.6-Path-Traversal.html +CVE-2017-1000170 - https://github.com/jqueryfiletree/jqueryfiletree/issues/66 +CVE-2017-1000172 - https://github.com/marcobambini/gravity/issues/144 +CVE-2017-1000173 - https://github.com/marcobambini/gravity/issues/172 +CVE-2017-1000174 - https://github.com/matthiaskramm/swftools/issues/21 +CVE-2017-1000176 - https://github.com/matthiaskramm/swftools/issues/23 +CVE-2017-1000182 - https://github.com/matthiaskramm/swftools/issues/30 +CVE-2017-1000185 - https://github.com/matthiaskramm/swftools/issues/33 +CVE-2017-1000186 - https://github.com/matthiaskramm/swftools/issues/34 +CVE-2017-1000187 - https://github.com/matthiaskramm/swftools/issues/36 +CVE-2017-1000190 - https://github.com/ngallagher/simplexml/issues/18 +CVE-2017-10002 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1000212 - https://github.com/tonini/alchemist-server/issues/14 +CVE-2017-1000218 - https://github.com/hfiref0x/LightFTP/issues/5 +CVE-2017-1000221 - https://opencast.jira.com/browse/MH-11862 +CVE-2017-1000224 - https://security.dxw.com/advisories/csrf-in-youtube-plugin/ +CVE-2017-1000225 - https://security.dxw.com/advisories/reflected-xss-in-relevanssi-premium-when-using-relevanssi_didyoumean-could-allow-unauthenticated-attacker-to-do-almost-anything-an-admin-can/ +CVE-2017-1000226 - https://security.dxw.com/advisories/stop-user-enumeration-rest-api/ +CVE-2017-1000227 - https://security.dxw.com/advisories/stored-xss-salutation-theme/ +CVE-2017-1000227 - https://wpvulndb.com/vulnerabilities/9734 +CVE-2017-1000229 - https://sourceforge.net/p/optipng/bugs/65/ +CVE-2017-1000250 - https://www.kb.cert.org/vuls/id/240311 +CVE-2017-1000251 - https://www.exploit-db.com/exploits/42762/ +CVE-2017-1000251 - https://www.kb.cert.org/vuls/id/240311 +CVE-2017-1000253 - https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt +CVE-2017-1000257 - https://hackerone.com/reports/278231 +CVE-2017-10003 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1000353 - http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html +CVE-2017-1000353 - https://www.exploit-db.com/exploits/41965/ +CVE-2017-1000353 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2017-1000364 - https://www.exploit-db.com/exploits/45625/ +CVE-2017-1000364 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000365 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000366 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2017-1000366 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2017-1000366 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2017-1000366 - https://www.exploit-db.com/exploits/42274/ +CVE-2017-1000366 - https://www.exploit-db.com/exploits/42275/ +CVE-2017-1000366 - https://www.exploit-db.com/exploits/42276/ +CVE-2017-1000366 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000367 - http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html +CVE-2017-1000367 - http://seclists.org/fulldisclosure/2017/Jun/3 +CVE-2017-1000367 - https://www.exploit-db.com/exploits/42183/ +CVE-2017-1000369 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000370 - https://www.exploit-db.com/exploits/42273/ +CVE-2017-1000370 - https://www.exploit-db.com/exploits/42274/ +CVE-2017-1000370 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000371 - https://www.exploit-db.com/exploits/42273/ +CVE-2017-1000371 - https://www.exploit-db.com/exploits/42276/ +CVE-2017-1000371 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000372 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000373 - https://www.exploit-db.com/exploits/42271/ +CVE-2017-1000373 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000374 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000375 - https://www.exploit-db.com/exploits/42272/ +CVE-2017-1000375 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000376 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2017-1000376 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000377 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000378 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000379 - https://www.exploit-db.com/exploits/42275/ +CVE-2017-1000379 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1000380 - http://www.openwall.com/lists/oss-security/2017/06/12/2 +CVE-2017-1000385 - https://robotattack.org/ +CVE-2017-1000385 - https://www.kb.cert.org/vuls/id/144389 +CVE-2017-10004 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1000405 - https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0 +CVE-2017-1000405 - https://www.exploit-db.com/exploits/43199/ +CVE-2017-1000407 - https://usn.ubuntu.com/3583-2/ +CVE-2017-1000408 - https://www.exploit-db.com/exploits/43331/ +CVE-2017-1000409 - https://www.exploit-db.com/exploits/43331/ +CVE-2017-1000410 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-1000415 - https://www.youtube.com/watch?v=FW--c_F_cY8 +CVE-2017-1000416 - https://www.youtube.com/watch?v=FW--c_F_cY8 +CVE-2017-1000417 - https://www.youtube.com/watch?v=FW--c_F_cY8 +CVE-2017-1000418 - https://github.com/Mindwerks/wildmidi/issues/178 +CVE-2017-1000422 - https://bugzilla.gnome.org/show_bug.cgi?id=785973 +CVE-2017-1000432 - https://www.exploit-db.com/exploits/43462/ +CVE-2017-1000434 - https://cjc.im/advisories/0008/ +CVE-2017-1000434 - https://wpvulndb.com/vulnerabilities/8992 +CVE-2017-1000437 - https://github.com/marcobambini/gravity/issues/186 +CVE-2017-1000448 - https://github.com/structured-data/linter/issues/41 +CVE-2017-1000450 - https://github.com/opencv/opencv/issues/9723 +CVE-2017-1000452 - https://www.whitehats.nl/blog/xml-signature-wrapping-samlify +CVE-2017-1000457 - https://www.mojoportal.com/mojoportal-2-6 +CVE-2017-1000458 - https://bro-tracker.atlassian.net/browse/BIT-1856 +CVE-2017-1000466 - https://github.com/invoiceninja/invoiceninja/issues/1727 +CVE-2017-1000474 - https://www.exploit-db.com/exploits/44318/ +CVE-2017-1000475 - https://www.exploit-db.com/exploits/48044 +CVE-2017-1000477 - https://github.com/pravednik/xmlBundle +CVE-2017-1000477 - https://github.com/pravednik/xmlBundle/issues/2 +CVE-2017-1000486 - https://github.com/primefaces/primefaces/issues/1152 +CVE-2017-1000486 - https://www.exploit-db.com/exploits/43733/ +CVE-2017-1000491 - https://github.com/rhysd/Shiba/commit/e8a65b0f81eb04903eedd29500d7e1bedf249eab +CVE-2017-1000491 - https://github.com/rhysd/Shiba/issues/42 +CVE-2017-1000499 - http://cyberworldmirror.com/vulnerability-phpmyadmin-lets-attacker-perform-drop-table-single-click/ +CVE-2017-1000499 - https://www.exploit-db.com/exploits/45284/ +CVE-2017-10005 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10006 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1000600 - https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ +CVE-2017-1000600 - https://youtu.be/GePBmsNJw6Y?t=1763 +CVE-2017-10007 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10008 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10009 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10010 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1001000 - https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab +CVE-2017-1001002 - https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170 +CVE-2017-1001003 - https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170 +CVE-2017-10011 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10012 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10013 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10015 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10016 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10017 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10018 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10019 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10020 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-1002000 - https://www.exploit-db.com/exploits/41540/ +CVE-2017-1002001 - https://www.exploit-db.com/exploits/41540/ +CVE-2017-1002002 - https://www.exploit-db.com/exploits/41540/ +CVE-2017-1002003 - https://www.exploit-db.com/exploits/41540/ +CVE-2017-1002008 - https://wpvulndb.com/vulnerabilities/8777 +CVE-2017-1002008 - https://www.exploit-db.com/exploits/41622/ +CVE-2017-1002020 - https://wpvulndb.com/vulnerabilities/8833 +CVE-2017-1002021 - https://wpvulndb.com/vulnerabilities/8833 +CVE-2017-1002022 - https://wpvulndb.com/vulnerabilities/8833 +CVE-2017-1002027 - https://wpvulndb.com/vulnerabilities/8889 +CVE-2017-1002028 - https://wpvulndb.com/vulnerabilities/8888 +CVE-2017-10021 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10022 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10023 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10024 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10025 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10026 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10027 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10028 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10029 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10030 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10031 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10032 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10033 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10033 - https://www.exploit-db.com/exploits/44757/ +CVE-2017-10034 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10035 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10036 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10037 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10038 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10039 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10040 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10041 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10042 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10043 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10044 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10045 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10046 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10046 - https://www.exploit-db.com/exploits/44141/ +CVE-2017-10047 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10048 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10049 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10050 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10051 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10052 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10053 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10053 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10054 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10055 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10056 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10057 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10058 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10059 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10060 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10061 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10062 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10063 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10064 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10065 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10066 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10067 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10068 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-10069 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10070 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10071 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10072 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10073 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10074 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10075 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10076 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10077 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10078 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10078 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10079 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10080 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10081 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10082 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10083 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10084 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10085 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10086 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10087 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10088 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10089 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10090 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10091 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10092 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10093 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10094 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10095 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10096 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10097 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10098 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10099 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10100 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10101 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10102 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10102 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10103 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10104 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10105 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10106 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10106 - https://erpscan.io/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/ +CVE-2017-10107 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10108 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10108 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10109 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10110 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10111 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10112 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10113 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10114 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10115 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10115 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10116 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10116 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10117 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10118 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10118 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10119 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10120 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10121 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10122 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10123 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10125 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10126 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10128 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10129 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10129 - https://www.exploit-db.com/exploits/42426/ +CVE-2017-10130 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10131 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10132 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10133 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10134 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10135 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10135 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10136 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10137 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10140 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-10141 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10142 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10143 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10144 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10145 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10146 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10147 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10147 - https://erpscan.io/advisories/erpscan-17-041-unauthorized-container-shutdown-servermigrationcoordinator/ +CVE-2017-10147 - https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10147 +CVE-2017-10148 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10148 - https://erpscan.io/advisories/erpscan-17-042-anonymous-log-injection-in-fscm/ +CVE-2017-10148 - https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10148 +CVE-2017-10149 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10150 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10152 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10153 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10154 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10155 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10156 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10157 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10158 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10159 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10160 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10161 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10162 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10163 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10164 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10165 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10166 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10168 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10169 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10170 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10171 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10172 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10173 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10174 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10175 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10176 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10176 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10177 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10178 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10179 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10180 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10181 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10182 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10183 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10184 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10185 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10186 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10187 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10188 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10189 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10190 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10191 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10192 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10193 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10194 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10195 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10196 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10198 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10198 - https://cert.vde.com/en-us/advisories/vde-2017-002 +CVE-2017-10199 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10200 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10201 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10202 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10203 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10204 - http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html +CVE-2017-10204 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10204 - https://www.exploit-db.com/exploits/42425/ +CVE-2017-10205 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10206 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10207 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10208 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10209 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10210 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10211 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10212 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10213 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10214 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10215 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10216 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10217 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10218 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10219 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10220 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10221 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10222 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10223 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10224 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10225 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10226 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10227 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10228 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10229 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10230 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10231 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10232 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10233 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10234 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10235 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10236 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10237 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10238 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10239 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10240 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10241 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10242 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10243 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10244 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10245 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10246 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10246 - https://www.exploit-db.com/exploits/42340/ +CVE-2017-10247 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10248 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10249 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10250 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10251 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10252 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10253 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10254 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10255 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10256 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10257 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10258 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-10259 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10260 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10261 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10262 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-10263 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10264 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10265 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10268 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10270 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10271 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10271 - https://www.exploit-db.com/exploits/43458/ +CVE-2017-10271 - https://www.exploit-db.com/exploits/43924/ +CVE-2017-10273 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-10273 - https://www.exploit-db.com/exploits/43848/ +CVE-2017-10274 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10276 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10277 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10279 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10280 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10281 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10282 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-10283 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10284 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10299 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10300 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10301 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-10302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10303 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10306 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10308 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10309 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10309 - https://www.exploit-db.com/exploits/43103/ +CVE-2017-10310 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10311 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10312 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10313 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10314 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10315 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10316 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10317 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10318 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10319 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10320 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10321 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10322 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10323 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10324 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10325 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10326 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10327 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10328 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10329 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10330 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10331 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10332 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10333 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10334 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10335 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10336 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10337 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10338 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10339 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10340 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10341 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10342 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10343 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10344 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10345 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10346 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10347 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10348 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10349 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10350 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10351 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10352 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-10352 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10353 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10354 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10355 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10356 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10357 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10358 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10359 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10360 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10361 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10362 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10363 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10364 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10365 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10366 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10366 - https://www.exploit-db.com/exploits/43594/ +CVE-2017-10367 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10368 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10369 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10370 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10372 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10373 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10375 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10378 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10379 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10380 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10381 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10382 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10383 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10384 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10385 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10386 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10387 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10388 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10389 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10391 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10392 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10393 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10394 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10395 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10396 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10397 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10398 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10399 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10400 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10401 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10402 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10403 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10404 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10405 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10406 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10407 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10408 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10409 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10410 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10411 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10412 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10413 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10414 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10415 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10416 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10417 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10418 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10419 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10420 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10421 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10422 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10423 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10424 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10425 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10426 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10427 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10428 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-10616 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qx9c-49m4-f3vj +CVE-2017-10617 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wjp8-8qf6-vqmc +CVE-2017-10661 - https://www.exploit-db.com/exploits/43345/ +CVE-2017-10665 - https://www.futureweb.at/security/CVE-2017-10665/ +CVE-2017-10668 - http://seclists.org/fulldisclosure/2017/Jun/44 +CVE-2017-10669 - http://seclists.org/fulldisclosure/2017/Jun/44 +CVE-2017-10670 - http://seclists.org/fulldisclosure/2017/Jun/44 +CVE-2017-10672 - https://hackerone.com/reports/259390 +CVE-2017-10672 - https://rt.cpan.org/Public/Bug/Display.html?id=122246 +CVE-2017-10678 - https://github.com/Piwigo/Piwigo/issues/721 +CVE-2017-10679 - https://github.com/Piwigo/Piwigo/issues/721 +CVE-2017-10680 - https://github.com/Piwigo/Piwigo/issues/721 +CVE-2017-10681 - https://github.com/Piwigo/Piwigo/issues/721 +CVE-2017-10682 - https://www.exploit-db.com/exploits/43337/ +CVE-2017-10684 - https://bugzilla.redhat.com/show_bug.cgi?id=1464687 +CVE-2017-10685 - https://bugzilla.redhat.com/show_bug.cgi?id=1464692 +CVE-2017-10686 - https://bugzilla.nasm.us/show_bug.cgi?id=3392414 +CVE-2017-10688 - http://bugzilla.maptools.org/show_bug.cgi?id=2712 +CVE-2017-10688 - https://www.exploit-db.com/exploits/42299/ +CVE-2017-10699 - https://trac.videolan.org/vlc/ticket/18467 +CVE-2017-10700 - https://www.qnap.com/en/support/con_show.php?cid=128 +CVE-2017-10708 - https://launchpad.net/bugs/1700573 +CVE-2017-10709 - https://www.reddit.com/r/netsec/comments/6kajkc/elephone_p9000_lock_screen_lockout_bypass_with/ +CVE-2017-10711 - https://www.seekurity.com/blog/general/reflected-xss-vulnerability-in-simplerisk/ +CVE-2017-10711 - https://www.youtube.com/watch?v=jOUKEYW0RQw +CVE-2017-10718 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10718 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10719 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10719 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10720 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10720 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10721 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10721 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10722 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10722 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10723 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10723 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10724 - http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html +CVE-2017-10724 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf +CVE-2017-10784 - https://hackerone.com/reports/223363 +CVE-2017-10789 - https://github.com/perl5-dbi/DBD-mysql/issues/110 +CVE-2017-10790 - https://bugzilla.redhat.com/show_bug.cgi?id=1464141 +CVE-2017-10793 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ +CVE-2017-10795 - https://github.com/intelliants/subrion/issues/467 +CVE-2017-10801 - https://www.seekurity.com/blog/advisories/cross-sitescripting-vulnerability-in-phpsocial-aka-phpdolphin-social-network-script/ +CVE-2017-1082 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1083 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1084 - https://www.exploit-db.com/exploits/42277/ +CVE-2017-1084 - https://www.exploit-db.com/exploits/42278/ +CVE-2017-1084 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1085 - https://www.exploit-db.com/exploits/42279/ +CVE-2017-1085 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt +CVE-2017-1092 - https://www.exploit-db.com/exploits/42091/ +CVE-2017-1092 - https://www.exploit-db.com/exploits/42541/ +CVE-2017-10924 - https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10924 +CVE-2017-10928 - https://github.com/ImageMagick/ImageMagick/issues/539 +CVE-2017-10952 - https://0patch.blogspot.com/2017/08/0patching-foxit-readers-saveas-0day-cve.html +CVE-2017-10971 - https://bugzilla.suse.com/show_bug.cgi?id=1035283 +CVE-2017-10972 - https://bugzilla.suse.com/show_bug.cgi?id=1035283 +CVE-2017-10974 - http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt +CVE-2017-10974 - https://www.exploit-db.com/exploits/42303/ +CVE-2017-10976 - https://github.com/matthiaskramm/swftools/issues/28 +CVE-2017-10989 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-10991 - https://lorexxar.cn/2017/07/07/WordPress%20WP%20Statistics%20authenticated%20xss%20Vulnerability(WP%20Statistics%20-=12.0.9)/ +CVE-2017-10992 - https://labs.integrity.pt/advisories/cve-2017-10992/ +CVE-2017-11004 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-11011 - http://www.securityfocus.com/bid/103671 +CVE-2017-11088 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-11089 - https://usn.ubuntu.com/3620-1/ +CVE-2017-11096 - https://github.com/matthiaskramm/swftools/issues/25 +CVE-2017-11097 - https://github.com/matthiaskramm/swftools/issues/24 +CVE-2017-11098 - https://github.com/matthiaskramm/swftools/issues/32 +CVE-2017-11099 - https://github.com/matthiaskramm/swftools/issues/31 +CVE-2017-11100 - https://github.com/matthiaskramm/swftools/issues/27 +CVE-2017-11101 - https://github.com/matthiaskramm/swftools/issues/26 +CVE-2017-11105 - https://alephsecurity.com/vulns/aleph-2017026 +CVE-2017-11107 - https://bugs.launchpad.net/ubuntu/+source/phpldapadmin/+bug/1701731 +CVE-2017-11111 - https://bugzilla.nasm.us/show_bug.cgi?id=3392415 +CVE-2017-11112 - https://bugzilla.redhat.com/show_bug.cgi?id=1464686 +CVE-2017-11113 - https://bugzilla.redhat.com/show_bug.cgi?id=1464691 +CVE-2017-11114 - http://seclists.org/fulldisclosure/2017/Jul/76 +CVE-2017-11115 - http://seclists.org/fulldisclosure/2017/Jul/77 +CVE-2017-11116 - http://seclists.org/fulldisclosure/2017/Jul/77 +CVE-2017-11117 - http://seclists.org/fulldisclosure/2017/Jul/77 +CVE-2017-11118 - http://seclists.org/fulldisclosure/2017/Jul/77 +CVE-2017-11119 - http://seclists.org/fulldisclosure/2017/Jul/78 +CVE-2017-11120 - http://packetstormsecurity.com/files/144328/Broadcom-802.11k-Neighbor-Report-Response-Out-Of-Bounds-Write.html +CVE-2017-11120 - https://www.exploit-db.com/exploits/42784/ +CVE-2017-11121 - http://packetstormsecurity.com/files/144329/Broadcom-802.11r-FT-Reassociation-Response-Overflows.html +CVE-2017-11122 - http://packetstormsecurity.com/files/144461/Broadcom-ICMPv6-Information-Leak.html +CVE-2017-11124 - https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_unserialize-archive-c/ +CVE-2017-11125 - https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_get_path-util-c/ +CVE-2017-11126 - https://blogs.gentoo.org/ago/2017/07/03/mpg123-global-buffer-overflow-in-iii_i_stereo-layer3-c/ +CVE-2017-11127 - https://websecnerd.blogspot.in/2017/07/bolt-cms-3.html +CVE-2017-11128 - https://websecnerd.blogspot.in/2017/07/bolt-cms-3.html +CVE-2017-11141 - https://github.com/ImageMagick/ImageMagick/issues/469 +CVE-2017-11144 - https://hackerone.com/reports/248609 +CVE-2017-11145 - https://hackerone.com/reports/248659 +CVE-2017-11151 - https://www.exploit-db.com/exploits/42434/ +CVE-2017-11152 - https://www.exploit-db.com/exploits/42434/ +CVE-2017-11153 - https://www.exploit-db.com/exploits/42434/ +CVE-2017-11154 - https://www.exploit-db.com/exploits/42434/ +CVE-2017-11155 - https://www.exploit-db.com/exploits/42434/ +CVE-2017-11164 - http://openwall.com/lists/oss-security/2017/07/11/3 +CVE-2017-11165 - https://packetstormsecurity.com/files/143328/DataTaker-DT80-dEX-1.50.012-Sensitive-Configuration-Exposure.html +CVE-2017-11165 - https://www.exploit-db.com/exploits/42313/ +CVE-2017-11166 - https://github.com/ImageMagick/ImageMagick/issues/471 +CVE-2017-11170 - https://github.com/ImageMagick/ImageMagick/issues/472 +CVE-2017-11171 - https://bugzilla.suse.com/show_bug.cgi?id=1025068 +CVE-2017-11173 - https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html +CVE-2017-11175 - https://github.com/miruser/Roche-CVEs/blob/master/CVE-2017-11175.md +CVE-2017-11176 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-11176 - https://www.exploit-db.com/exploits/45553/ +CVE-2017-11181 - https://packetstormsecurity.com/files/143307/Rise-Ultimate-Project-Manager-1.8-Cross-Site-Scripting.html +CVE-2017-11182 - https://packetstormsecurity.com/files/143307/Rise-Ultimate-Project-Manager-1.8-Cross-Site-Scripting.html +CVE-2017-11191 - http://packetstormsecurity.com/files/143532/FreeIPA-2.213-Session-Hijacking.html +CVE-2017-11197 - https://www.exploit-db.com/exploits/42319 +CVE-2017-11198 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Reflected-XSS-in-get-image-php +CVE-2017-11200 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Authenticated-SQL-injection +CVE-2017-11201 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Stored-XSS-in-images-php +CVE-2017-11202 - http://lorexxar.cn/2017/07/11/Some%20Vulnerability%20for%20FineCMS%20through%202017.7.11/#Stored-XSS-in-visitors-php +CVE-2017-11281 - https://www.exploit-db.com/exploits/42781/ +CVE-2017-11281 - https://www.exploit-db.com/exploits/42782/ +CVE-2017-11281 - https://www.youtube.com/watch?v=CvmnUeza9zw +CVE-2017-11282 - http://packetstormsecurity.com/files/144332/Adobe-Flash-appleToRange-Out-Of-Bounds-Read.html +CVE-2017-11282 - https://www.exploit-db.com/exploits/42783/ +CVE-2017-11282 - https://www.youtube.com/watch?v=6iZnIQbRf5M +CVE-2017-1129 - https://www.exploit-db.com/exploits/42602/ +CVE-2017-1130 - https://www.exploit-db.com/exploits/42604/ +CVE-2017-11309 - http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt +CVE-2017-11309 - http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html +CVE-2017-11309 - https://www.exploit-db.com/exploits/43121/ +CVE-2017-11310 - https://github.com/ImageMagick/ImageMagick/issues/517 +CVE-2017-11317 - http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html +CVE-2017-11317 - https://www.exploit-db.com/exploits/43874/ +CVE-2017-11318 - https://www.tarlogic.com/advisories/Tarlogic-2017-002.txt +CVE-2017-11319 - http://packetstormsecurity.com/files/145230/Perspective-ICM-Investigation-And-Case-5.1.1.16-Privilege-Escalation.html +CVE-2017-11319 - https://www.exploit-db.com/exploits/43210/ +CVE-2017-11320 - http://seclists.org/fulldisclosure/2017/Aug/3 +CVE-2017-11320 - https://www.exploit-db.com/exploits/42427/ +CVE-2017-11321 - https://sysdream.com/news/lab/2017-09-29-cve-2017-11321-ucopia-wireless-appliance-5-1-8-restricted-shell-escape/ +CVE-2017-11321 - https://www.exploit-db.com/exploits/42937/ +CVE-2017-11322 - https://sysdream.com/news/lab/2017-09-29-cve-2017-11322-ucopia-wireless-appliance-5-1-8-privileges-escalation/ +CVE-2017-11322 - https://www.exploit-db.com/exploits/42936/ +CVE-2017-11323 - http://exploit.kitploit.com/2017/08/alzip-851-buffer-overflow.html +CVE-2017-11330 - http://seclists.org/fulldisclosure/2017/Jul/79 +CVE-2017-11330 - https://www.exploit-db.com/exploits/42396/ +CVE-2017-11331 - http://seclists.org/fulldisclosure/2017/Jul/80 +CVE-2017-11331 - https://www.exploit-db.com/exploits/42397/ +CVE-2017-11332 - http://seclists.org/fulldisclosure/2017/Jul/81 +CVE-2017-11332 - https://www.exploit-db.com/exploits/42398/ +CVE-2017-11333 - http://seclists.org/fulldisclosure/2017/Jul/82 +CVE-2017-11333 - https://www.exploit-db.com/exploits/42399/ +CVE-2017-11335 - http://bugzilla.maptools.org/show_bug.cgi?id=2715 +CVE-2017-11336 - https://bugzilla.redhat.com/show_bug.cgi?id=1470729 +CVE-2017-11337 - https://bugzilla.redhat.com/show_bug.cgi?id=1470737 +CVE-2017-11338 - https://bugzilla.redhat.com/show_bug.cgi?id=1470913 +CVE-2017-11339 - https://bugzilla.redhat.com/show_bug.cgi?id=1470946 +CVE-2017-11340 - https://bugzilla.redhat.com/show_bug.cgi?id=1470950 +CVE-2017-11341 - https://bugzilla.redhat.com/show_bug.cgi?id=1470714 +CVE-2017-11342 - https://bugzilla.redhat.com/show_bug.cgi?id=1470722 +CVE-2017-11346 - https://www.exploit-db.com/exploits/42358/ +CVE-2017-11355 - http://seclists.org/fulldisclosure/2017/Jul/28 +CVE-2017-11355 - https://www.exploit-db.com/exploits/42335/ +CVE-2017-11356 - http://seclists.org/fulldisclosure/2017/Jul/28 +CVE-2017-11356 - https://www.exploit-db.com/exploits/42335/ +CVE-2017-11357 - https://www.exploit-db.com/exploits/43874/ +CVE-2017-11358 - http://seclists.org/fulldisclosure/2017/Jul/81 +CVE-2017-11358 - https://www.exploit-db.com/exploits/42398/ +CVE-2017-11359 - http://seclists.org/fulldisclosure/2017/Jul/81 +CVE-2017-11359 - https://www.exploit-db.com/exploits/42398/ +CVE-2017-11360 - https://github.com/ImageMagick/ImageMagick/issues/518 +CVE-2017-11366 - http://www.jianshu.com/p/41ac7ac2a7af +CVE-2017-11367 - https://hackerone.com/reports/250581 +CVE-2017-11379 - https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities +CVE-2017-11380 - https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities +CVE-2017-11381 - https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities +CVE-2017-11394 - https://www.exploit-db.com/exploits/42971/ +CVE-2017-11395 - http://www.coresecurity.com/advisories/trend-micro-smart-protection-os-command-injection +CVE-2017-11398 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities +CVE-2017-11398 - https://www.exploit-db.com/exploits/43388/ +CVE-2017-11399 - https://github.com/FFmpeg/FFmpeg/commit/96349da5ec8eda9f0368446e557fe0c8ba0e66b7 +CVE-2017-11399 - https://github.com/FFmpeg/FFmpeg/commit/ba4beaf6149f7241c8bd85fe853318c2f6837ad0 +CVE-2017-11403 - https://blogs.gentoo.org/ago/2017/07/12/graphicsmagick-use-after-free-in-closeblob-blob-c/ +CVE-2017-11420 - http://www.openwall.com/lists/oss-security/2017/07/13/1 +CVE-2017-11421 - https://bugs.debian.org/868705 +CVE-2017-11421 - https://github.com/gnome-exe-thumbnailer/gnome-exe-thumbnailer/commit/1d8e3102dd8fd23431ae6127d14a236da6b4a4a5 +CVE-2017-11423 - https://bugzilla.clamav.net/show_bug.cgi?id=11873 +CVE-2017-11427 - https://www.kb.cert.org/vuls/id/475445 +CVE-2017-11428 - https://www.kb.cert.org/vuls/id/475445 +CVE-2017-11429 - https://www.kb.cert.org/vuls/id/475445 +CVE-2017-11430 - https://www.kb.cert.org/vuls/id/475445 +CVE-2017-11439 - https://packetstormsecurity.com/files/143357/Sitecore-CMS-8.2-Cross-Site-Scripting-File-Disclosure.html +CVE-2017-11440 - https://packetstormsecurity.com/files/143357/Sitecore-CMS-8.2-Cross-Site-Scripting-File-Disclosure.html +CVE-2017-11444 - https://github.com/intelliants/subrion/issues/479 +CVE-2017-11446 - https://github.com/ImageMagick/ImageMagick/issues/537 +CVE-2017-11447 - https://github.com/ImageMagick/ImageMagick/issues/556 +CVE-2017-11448 - https://github.com/ImageMagick/ImageMagick/issues/556 +CVE-2017-11449 - https://github.com/ImageMagick/ImageMagick/issues/556 +CVE-2017-11450 - https://github.com/ImageMagick/ImageMagick/issues/556 +CVE-2017-11457 - https://erpscan.io/advisories/erpscan-17-018-sap-netweaver-java-7-5-xxe-com-sap-km-cm-ice/ +CVE-2017-11458 - https://erpscan.io/advisories/erpscan-17-017-sap-netweaver-java-7-3-java-xss-ctcprotocolprotocol-servlet/ +CVE-2017-11459 - https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/ +CVE-2017-11460 - https://erpscan.io/advisories/erpscan-17-016-sap-netweaver-java-7-4-dataarchivingservice-servlet-xss/ +CVE-2017-11466 - http://seclists.org/fulldisclosure/2017/Jul/33 +CVE-2017-11466 - https://github.com/dotCMS/core/issues/12131 +CVE-2017-11466 - https://packetstormsecurity.com/files/143383/dotcms411-shell.txt +CVE-2017-11478 - https://github.com/ImageMagick/ImageMagick/issues/528 +CVE-2017-11494 - https://www.exploit-db.com/exploits/42408/ +CVE-2017-11495 - https://github.com/ZIllR0/Routers/blob/master/PHICOMM +CVE-2017-11500 - http://blackwolfsec.cc/2017/07/20/Metinfo-directory-traversal-bypass/ +CVE-2017-11503 - https://cxsecurity.com/issue/WLB-2017060181 +CVE-2017-11503 - https://packetstormsecurity.com/files/143138/phpmailer-xss.txt +CVE-2017-11505 - https://github.com/ImageMagick/ImageMagick/issues/526 +CVE-2017-11507 - https://www.tenable.com/security/research/tra-2017-20 +CVE-2017-11509 - https://www.tenable.com/security/research/tra-2017-36 +CVE-2017-11510 - https://www.tenable.com/security/research/tra-2017-33 +CVE-2017-11517 - https://www.exploit-db.com/exploits/41153/ +CVE-2017-11519 - https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html +CVE-2017-11522 - https://github.com/ImageMagick/ImageMagick/issues/586 +CVE-2017-11523 - https://github.com/ImageMagick/ImageMagick/issues/591 +CVE-2017-11525 - https://github.com/ImageMagick/ImageMagick/issues/519 +CVE-2017-11526 - https://github.com/ImageMagick/ImageMagick/issues/527 +CVE-2017-11527 - https://github.com/ImageMagick/ImageMagick/issues/523 +CVE-2017-11528 - https://github.com/ImageMagick/ImageMagick/issues/522 +CVE-2017-11529 - https://github.com/ImageMagick/ImageMagick/issues/525 +CVE-2017-11530 - https://github.com/ImageMagick/ImageMagick/issues/524 +CVE-2017-11531 - https://github.com/ImageMagick/ImageMagick/issues/566 +CVE-2017-11532 - https://github.com/ImageMagick/ImageMagick/issues/563 +CVE-2017-11533 - https://github.com/ImageMagick/ImageMagick/issues/562 +CVE-2017-11534 - https://github.com/ImageMagick/ImageMagick/issues/564 +CVE-2017-11535 - https://github.com/ImageMagick/ImageMagick/issues/561 +CVE-2017-11536 - https://github.com/ImageMagick/ImageMagick/issues/567 +CVE-2017-11537 - https://github.com/ImageMagick/ImageMagick/issues/560 +CVE-2017-11538 - https://github.com/ImageMagick/ImageMagick/issues/569 +CVE-2017-11539 - http://www.securityfocus.com/bid/99936 +CVE-2017-11539 - https://github.com/ImageMagick/ImageMagick/issues/582 +CVE-2017-11540 - https://github.com/ImageMagick/ImageMagick/issues/581 +CVE-2017-11541 - https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print +CVE-2017-11542 - https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim +CVE-2017-11543 - https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl +CVE-2017-11546 - http://seclists.org/fulldisclosure/2017/Jul/83 +CVE-2017-11547 - http://seclists.org/fulldisclosure/2017/Jul/83 +CVE-2017-11548 - http://seclists.org/fulldisclosure/2017/Jul/84 +CVE-2017-11548 - https://www.exploit-db.com/exploits/42400/ +CVE-2017-11549 - http://seclists.org/fulldisclosure/2017/Jul/83 +CVE-2017-11550 - http://seclists.org/fulldisclosure/2017/Jul/85 +CVE-2017-11551 - http://seclists.org/fulldisclosure/2017/Jul/85 +CVE-2017-11552 - http://seclists.org/fulldisclosure/2017/Jul/94 +CVE-2017-11552 - https://www.exploit-db.com/exploits/42409/ +CVE-2017-11553 - https://bugzilla.redhat.com/show_bug.cgi?id=1471772 +CVE-2017-11555 - https://bugzilla.redhat.com/show_bug.cgi?id=1471782 +CVE-2017-11556 - https://bugzilla.redhat.com/show_bug.cgi?id=1471786 +CVE-2017-11557 - https://www.manageengine.com/ +CVE-2017-11557 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18738 +CVE-2017-11559 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 +CVE-2017-11560 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 +CVE-2017-11561 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18736 +CVE-2017-11563 - http://seclists.org/fulldisclosure/2018/Aug/18 +CVE-2017-11563 - https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf +CVE-2017-11564 - http://seclists.org/fulldisclosure/2018/Aug/19 +CVE-2017-11564 - https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf +CVE-2017-11567 - http://hyp3rlinx.altervista.org/advisories/MONGOOSE-WEB-SERVER-v6.5-CSRF-COMMAND-EXECUTION.txt +CVE-2017-11567 - http://seclists.org/fulldisclosure/2017/Sep/3 +CVE-2017-11567 - https://www.exploit-db.com/exploits/42614/ +CVE-2017-11568 - https://github.com/fontforge/fontforge/issues/3089 +CVE-2017-11569 - https://github.com/fontforge/fontforge/issues/3093 +CVE-2017-11570 - https://github.com/fontforge/fontforge/issues/3097 +CVE-2017-11571 - https://github.com/fontforge/fontforge/issues/3087 +CVE-2017-11572 - https://github.com/fontforge/fontforge/issues/3092 +CVE-2017-11573 - https://github.com/fontforge/fontforge/issues/3098 +CVE-2017-11574 - https://github.com/fontforge/fontforge/issues/3090 +CVE-2017-11575 - https://github.com/fontforge/fontforge/issues/3096 +CVE-2017-11576 - https://github.com/fontforge/fontforge/issues/3091 +CVE-2017-11577 - https://github.com/fontforge/fontforge/issues/3088 +CVE-2017-11578 - http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html +CVE-2017-11578 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Blipcare_sec_issues.pdf +CVE-2017-11579 - http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html +CVE-2017-11579 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Blipcare_sec_issues.pdf +CVE-2017-11580 - http://packetstormsecurity.com/files/153225/Blipcare-Clear-Text-Communication-Memory-Corruption.html +CVE-2017-11580 - https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Blipcare_sec_issues.pdf +CVE-2017-11581 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#Reflected-XSS +CVE-2017-11582 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-after-limit-via-system-num-parameter +CVE-2017-11583 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-in-action-related-catid-parameter +CVE-2017-11584 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-via-system-field-parameter +CVE-2017-11585 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#remote-php-code-execution +CVE-2017-11586 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#URL-Redirector-Abuse +CVE-2017-11600 - http://seclists.org/bugtraq/2017/Jul/30 +CVE-2017-11605 - https://bugzilla.redhat.com/show_bug.cgi?id=1474019 +CVE-2017-11608 - https://bugzilla.redhat.com/show_bug.cgi?id=1474276 +CVE-2017-11610 - https://www.exploit-db.com/exploits/42779/ +CVE-2017-11611 - https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc +CVE-2017-11613 - https://gist.github.com/dazhouzhou/1a3b7400547f23fe316db303ab9b604f +CVE-2017-11613 - https://usn.ubuntu.com/3606-1/ +CVE-2017-11628 - https://hackerone.com/reports/248601 +CVE-2017-11629 - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#api-php-Reflected-XSS +CVE-2017-11631 - https://github.com/FiyoCMS/FiyoCMS/issues/7 +CVE-2017-11639 - https://github.com/ImageMagick/ImageMagick/issues/588 +CVE-2017-11640 - https://github.com/ImageMagick/ImageMagick/issues/584 +CVE-2017-11644 - https://github.com/ImageMagick/ImageMagick/issues/587 +CVE-2017-11652 - http://packetstormsecurity.com/files/143516/Razer-Synapse-2.20-DLL-Hijacking.html +CVE-2017-11653 - http://packetstormsecurity.com/files/143516/Razer-Synapse-2.20-DLL-Hijacking.html +CVE-2017-11658 - https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 +CVE-2017-11658 - https://wpvulndb.com/vulnerabilities/8872 +CVE-2017-11661 - http://seclists.org/fulldisclosure/2017/Aug/12 +CVE-2017-11661 - https://www.exploit-db.com/exploits/42433/ +CVE-2017-11662 - http://seclists.org/fulldisclosure/2017/Aug/12 +CVE-2017-11662 - https://www.exploit-db.com/exploits/42433/ +CVE-2017-11663 - http://seclists.org/fulldisclosure/2017/Aug/12 +CVE-2017-11663 - https://www.exploit-db.com/exploits/42433/ +CVE-2017-11664 - http://seclists.org/fulldisclosure/2017/Aug/12 +CVE-2017-11664 - https://www.exploit-db.com/exploits/42433/ +CVE-2017-11673 - http://code610.blogspot.com/2017/07/readwrite-access-violation-acunetix.html +CVE-2017-11674 - http://code610.blogspot.com/2017/07/readwrite-access-violation-acunetix.html +CVE-2017-11675 - https://github.com/imp0wd3r/vuln-papers/tree/master/zencart-155e-auth-rce +CVE-2017-11677 - https://github.com/curlyboi/hashtopus/issues/63 +CVE-2017-11678 - https://github.com/curlyboi/hashtopus/issues/63 +CVE-2017-11679 - https://github.com/curlyboi/hashtopus/issues/63 +CVE-2017-11680 - https://github.com/s3inlc/hashtopussy/issues/241 +CVE-2017-11681 - https://github.com/s3inlc/hashtopussy/issues/241 +CVE-2017-11682 - https://github.com/s3inlc/hashtopussy/issues/241 +CVE-2017-11683 - https://bugzilla.redhat.com/show_bug.cgi?id=1475124 +CVE-2017-11684 - https://bugzilla.libav.org/show_bug.cgi?id=1073 +CVE-2017-11692 - https://github.com/jbeder/yaml-cpp/issues/519 +CVE-2017-11695 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html +CVE-2017-11695 - http://seclists.org/fulldisclosure/2017/Aug/17 +CVE-2017-11696 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html +CVE-2017-11696 - http://seclists.org/fulldisclosure/2017/Aug/17 +CVE-2017-11697 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html +CVE-2017-11697 - http://seclists.org/fulldisclosure/2017/Aug/17 +CVE-2017-11698 - http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html +CVE-2017-11698 - http://seclists.org/fulldisclosure/2017/Aug/17 +CVE-2017-11714 - https://bugs.ghostscript.com/show_bug.cgi?id=698158 +CVE-2017-11719 - https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92 +CVE-2017-11719 - https://github.com/FFmpeg/FFmpeg/commit/f31fc4755f69ab26bf6e8be47875b7dcede8e29e +CVE-2017-11720 - https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/ +CVE-2017-11720 - https://sourceforge.net/p/lame/bugs/460/ +CVE-2017-11723 - https://github.com/JojoCMS/Jojo-CMS/issues/30 +CVE-2017-11724 - https://github.com/ImageMagick/ImageMagick/issues/624 +CVE-2017-11734 - https://github.com/libming/libming/issues/83 +CVE-2017-11738 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 +CVE-2017-11739 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 +CVE-2017-11740 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18734 +CVE-2017-11741 - http://seclists.org/fulldisclosure/2017/Aug/0 +CVE-2017-11741 - https://www.exploit-db.com/exploits/43224/ +CVE-2017-11750 - https://github.com/ImageMagick/ImageMagick/issues/632 +CVE-2017-11751 - https://github.com/ImageMagick/ImageMagick/issues/631 +CVE-2017-11752 - https://github.com/ImageMagick/ImageMagick/issues/628 +CVE-2017-11753 - https://github.com/ImageMagick/ImageMagick/issues/629 +CVE-2017-11754 - https://github.com/ImageMagick/ImageMagick/issues/633 +CVE-2017-11755 - https://github.com/ImageMagick/ImageMagick/issues/634 +CVE-2017-11764 - https://www.exploit-db.com/exploits/42765/ +CVE-2017-11785 - https://www.exploit-db.com/exploits/43001/ +CVE-2017-11793 - https://www.exploit-db.com/exploits/43368/ +CVE-2017-11799 - https://www.exploit-db.com/exploits/42998/ +CVE-2017-11802 - https://www.exploit-db.com/exploits/43000/ +CVE-2017-11809 - https://www.exploit-db.com/exploits/42999/ +CVE-2017-11810 - https://www.exploit-db.com/exploits/43131/ +CVE-2017-11811 - https://www.exploit-db.com/exploits/43152/ +CVE-2017-11823 - https://www.exploit-db.com/exploits/42997/ +CVE-2017-11826 - https://0patch.blogspot.com/2017/11/0patching-pretty-nasty-microsoft-word.html +CVE-2017-11826 - https://www.tarlogic.com/en/blog/exploiting-word-cve-2017-11826/ +CVE-2017-11830 - https://www.exploit-db.com/exploits/43162/ +CVE-2017-11831 - https://www.exploit-db.com/exploits/43165/ +CVE-2017-11839 - https://www.exploit-db.com/exploits/43180/ +CVE-2017-11840 - https://www.exploit-db.com/exploits/43183/ +CVE-2017-11841 - https://www.exploit-db.com/exploits/43181/ +CVE-2017-11855 - https://www.exploit-db.com/exploits/43371/ +CVE-2017-11861 - https://www.exploit-db.com/exploits/43153/ +CVE-2017-11870 - https://www.exploit-db.com/exploits/43182/ +CVE-2017-11873 - https://www.exploit-db.com/exploits/43154/ +CVE-2017-11882 - http://reversingminds-blog.logdown.com/posts/3907313-fileless-attack-in-word-without-macros-cve-2017-11882 +CVE-2017-11882 - https://0patch.blogspot.com/2017/11/did-microsoft-just-manually-patch-their.html +CVE-2017-11882 - https://0patch.blogspot.com/2017/11/official-patch-for-cve-2017-11882-meets.html +CVE-2017-11882 - https://github.com/0x09AL/CVE-2017-11882-metasploit +CVE-2017-11882 - https://github.com/embedi/CVE-2017-11882 +CVE-2017-11882 - https://github.com/rxwx/CVE-2017-11882 +CVE-2017-11882 - https://researchcenter.paloaltonetworks.com/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/ +CVE-2017-11882 - https://web.archive.org/web/20181104111128/https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/ +CVE-2017-11882 - https://www.exploit-db.com/exploits/43163/ +CVE-2017-11885 - https://www.exploit-db.com/exploits/44616/ +CVE-2017-11890 - https://www.exploit-db.com/exploits/43369/ +CVE-2017-11893 - https://www.exploit-db.com/exploits/43466/ +CVE-2017-11903 - https://www.exploit-db.com/exploits/43367/ +CVE-2017-11906 - https://www.exploit-db.com/exploits/43372/ +CVE-2017-11907 - https://www.exploit-db.com/exploits/43370/ +CVE-2017-11909 - https://www.exploit-db.com/exploits/43467/ +CVE-2017-11911 - https://www.exploit-db.com/exploits/43468/ +CVE-2017-11914 - https://www.exploit-db.com/exploits/43713/ +CVE-2017-11918 - https://www.exploit-db.com/exploits/43469/ +CVE-2017-12065 - https://github.com/Cacti/cacti/issues/877 +CVE-2017-12066 - https://github.com/Cacti/cacti/issues/877 +CVE-2017-12067 - https://github.com/hackerlib/hackerlib-vul/tree/master/potrace/heap-buffer-overflow-mkbitmap +CVE-2017-12068 - https://github.com/kevins1022/cve/blob/master/wordpress-event-list.md +CVE-2017-12081 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433 +CVE-2017-12082 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434 +CVE-2017-12086 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0438 +CVE-2017-12088 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0440 +CVE-2017-12089 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0441 +CVE-2017-12090 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0442 +CVE-2017-12092 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0444 +CVE-2017-12093 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0445 +CVE-2017-12094 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0446 +CVE-2017-12095 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0447 +CVE-2017-12096 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0448 +CVE-2017-12099 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0451 +CVE-2017-12100 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0452 +CVE-2017-12101 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0453 +CVE-2017-12102 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454 +CVE-2017-12103 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455 +CVE-2017-12104 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456 +CVE-2017-12105 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457 +CVE-2017-12110 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0462 +CVE-2017-12112 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0464 +CVE-2017-12119 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0471 +CVE-2017-12120 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0472 +CVE-2017-12121 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0473 +CVE-2017-12123 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0475 +CVE-2017-12124 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0476 +CVE-2017-12125 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0477 +CVE-2017-12126 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0478 +CVE-2017-12127 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0479 +CVE-2017-12128 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0480 +CVE-2017-12129 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0481 +CVE-2017-12130 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0486 +CVE-2017-12131 - https://github.com/kevins1022/cve/blob/master/wordpress-Easy-Testimonials.md +CVE-2017-12138 - https://github.com/XOOPS/XoopsCore25/issues/523 +CVE-2017-12140 - https://github.com/ImageMagick/ImageMagick/issues/533 +CVE-2017-12143 - https://somevulnsofadlab.blogspot.com/2017/07/libquicktimeallocation-failed-in.html +CVE-2017-12143 - https://sourceforge.net/p/libquicktime/mailman/message/35888850/ +CVE-2017-12145 - https://somevulnsofadlab.blogspot.com/2017/07/libquicktimeallocation-failed-in_30.html +CVE-2017-12145 - https://sourceforge.net/p/libquicktime/mailman/message/35888849/ +CVE-2017-12149 - https://github.com/gottburgm/Exploits/tree/master/CVE-2017-12149 +CVE-2017-12153 - http://seclists.org/oss-sec/2017/q3/437 +CVE-2017-12153 - https://usn.ubuntu.com/3583-2/ +CVE-2017-12154 - https://usn.ubuntu.com/3698-1/ +CVE-2017-12154 - https://usn.ubuntu.com/3698-2/ +CVE-2017-12190 - https://usn.ubuntu.com/3582-1/ +CVE-2017-12190 - https://usn.ubuntu.com/3583-2/ +CVE-2017-12192 - https://usn.ubuntu.com/3583-2/ +CVE-2017-12193 - https://usn.ubuntu.com/3698-1/ +CVE-2017-12193 - https://usn.ubuntu.com/3698-2/ +CVE-2017-12199 - https://github.com/kevins1022/cve/blob/master/wordpress-product-catalog.md +CVE-2017-12200 - https://github.com/kevins1022/cve/blob/master/wordpress-product-catalog.md +CVE-2017-12374 - https://bugzilla.clamav.net/show_bug.cgi?id=11939 +CVE-2017-12375 - https://bugzilla.clamav.net/show_bug.cgi?id=11940 +CVE-2017-12376 - https://bugzilla.clamav.net/show_bug.cgi?id=11942 +CVE-2017-12377 - https://bugzilla.clamav.net/show_bug.cgi?id=11943 +CVE-2017-12378 - https://bugzilla.clamav.net/show_bug.cgi?id=11946 +CVE-2017-12379 - https://bugzilla.clamav.net/show_bug.cgi?id=11944 +CVE-2017-12380 - https://bugzilla.clamav.net/show_bug.cgi?id=11945 +CVE-2017-12413 - https://packetstormsecurity.com/files/143657/Axis-2100-Network-Camera-2.43-Cross-Site-Scripting.html +CVE-2017-12415 - https://bugs.oxid-esales.com/view.php?id=6674 +CVE-2017-12418 - https://github.com/ImageMagick/ImageMagick/issues/643 +CVE-2017-12427 - https://github.com/ImageMagick/ImageMagick/issues/636 +CVE-2017-12432 - https://github.com/ImageMagick/ImageMagick/issues/536 +CVE-2017-12439 - https://packetstormsecurity.com/files/143542/Flash-Slideshow-Maker-Professional-XSS-Content-Forgery-Redirect.html +CVE-2017-12441 - http://seclists.org/fulldisclosure/2017/Aug/15 +CVE-2017-12442 - http://seclists.org/fulldisclosure/2017/Aug/15 +CVE-2017-12443 - http://seclists.org/fulldisclosure/2017/Aug/15 +CVE-2017-12444 - http://seclists.org/fulldisclosure/2017/Aug/15 +CVE-2017-12445 - http://seclists.org/fulldisclosure/2017/Aug/15 +CVE-2017-12447 - https://github.com/hackerlib/hackerlib-vul/tree/master/gnome +CVE-2017-12472 - https://github.com/cn-uofbasel/ccn-lite/issues/138 +CVE-2017-12477 - https://www.exploit-db.com/exploits/43031/ +CVE-2017-12478 - https://www.exploit-db.com/exploits/43030/ +CVE-2017-12478 - https://www.exploit-db.com/exploits/45559/ +CVE-2017-12480 - https://medium.com/@BaYinMin/cve-2017-12480-sandboxie-installer-dll-hijacking-or-unsafe-dll-loading-vulnerability-41ad0562f41 +CVE-2017-12500 - https://www.exploit-db.com/exploits/44648/ +CVE-2017-12542 - https://www.exploit-db.com/exploits/44005/ +CVE-2017-12556 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us +CVE-2017-12557 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us +CVE-2017-12557 - https://www.exploit-db.com/exploits/45952/ +CVE-2017-12558 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us +CVE-2017-12559 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03777en_us +CVE-2017-12560 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03777en_us +CVE-2017-12573 - http://seclists.org/fulldisclosure/2018/Aug/29 +CVE-2017-12574 - http://seclists.org/fulldisclosure/2018/Aug/25 +CVE-2017-12575 - http://seclists.org/fulldisclosure/2018/Aug/26 +CVE-2017-12576 - http://seclists.org/fulldisclosure/2018/Aug/27 +CVE-2017-12577 - http://seclists.org/fulldisclosure/2018/Aug/28 +CVE-2017-12579 - https://www.exploit-db.com/exploits/43223/ +CVE-2017-12581 - https://blog.doyensec.com/2017/08/03/electron-framework-security.html +CVE-2017-12583 - https://github.com/splitbrain/dokuwiki/issues/2061 +CVE-2017-12584 - https://github.com/slims/slims8_akasia/issues/49 +CVE-2017-12586 - https://github.com/slims/slims8_akasia/issues/48 +CVE-2017-12587 - https://github.com/ImageMagick/ImageMagick/issues/535 +CVE-2017-12595 - https://github.com/qpdf/qpdf/issues/146 +CVE-2017-12597 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12598 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12599 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12601 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12603 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12604 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12605 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12606 - https://github.com/opencv/opencv/issues/9309 +CVE-2017-12607 - https://www.openoffice.org/security/cves/CVE-2017-12607.html +CVE-2017-12608 - https://www.openoffice.org/security/cves/CVE-2017-12608.html +CVE-2017-12610 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-12615 - http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html +CVE-2017-12615 - https://github.com/breaktoprotect/CVE-2017-12615 +CVE-2017-12615 - https://www.exploit-db.com/exploits/42953/ +CVE-2017-12617 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-12617 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-12617 - https://www.exploit-db.com/exploits/42966/ +CVE-2017-12617 - https://www.exploit-db.com/exploits/43008/ +CVE-2017-12626 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2017-12626 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-12626 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2017-12626 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2017-12626 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-12626 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-12626 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-12627 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2017-12629 - https://www.exploit-db.com/exploits/43009/ +CVE-2017-12635 - https://www.exploit-db.com/exploits/44498/ +CVE-2017-12635 - https://www.exploit-db.com/exploits/45019/ +CVE-2017-12636 - https://www.exploit-db.com/exploits/44913/ +CVE-2017-12636 - https://www.exploit-db.com/exploits/45019/ +CVE-2017-12640 - https://github.com/ImageMagick/ImageMagick/issues/542 +CVE-2017-12641 - https://github.com/ImageMagick/ImageMagick/issues/550 +CVE-2017-12642 - https://github.com/ImageMagick/ImageMagick/issues/552 +CVE-2017-12643 - https://github.com/ImageMagick/ImageMagick/issues/549 +CVE-2017-12644 - https://github.com/ImageMagick/ImageMagick/issues/551 +CVE-2017-12645 - https://issues.liferay.com/browse/LPS-72307 +CVE-2017-12650 - https://wpvulndb.com/vulnerabilities/8883 +CVE-2017-12651 - https://wpvulndb.com/vulnerabilities/8884 +CVE-2017-12662 - https://github.com/ImageMagick/ImageMagick/issues/576 +CVE-2017-12663 - https://github.com/ImageMagick/ImageMagick/issues/573 +CVE-2017-12664 - https://github.com/ImageMagick/ImageMagick/issues/574 +CVE-2017-12665 - https://github.com/ImageMagick/ImageMagick/issues/577 +CVE-2017-12666 - https://github.com/ImageMagick/ImageMagick/issues/572 +CVE-2017-12667 - https://github.com/ImageMagick/ImageMagick/issues/553 +CVE-2017-12668 - https://github.com/ImageMagick/ImageMagick/issues/575 +CVE-2017-12669 - https://github.com/ImageMagick/ImageMagick/issues/571 +CVE-2017-12691 - https://github.com/ImageMagick/ImageMagick/issues/656 +CVE-2017-12692 - https://github.com/ImageMagick/ImageMagick/issues/653 +CVE-2017-12693 - https://github.com/ImageMagick/ImageMagick/issues/652 +CVE-2017-12718 - https://www.exploit-db.com/exploits/43776/ +CVE-2017-1274 - http://packetstormsecurity.com/files/152786/Lotus-Domino-8.5.3-EXAMINE-Stack-Buffer-Overflow.html +CVE-2017-12754 - https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/Asus_DeleteOfflineClientOverflow.txt +CVE-2017-12757 - https://www.exploit-db.com/exploits/42507 +CVE-2017-12758 - https://www.exploit-db.com/exploits/42492 +CVE-2017-12759 - https://www.exploit-db.com/exploits/42499 +CVE-2017-12760 - https://www.exploit-db.com/exploits/41283 +CVE-2017-12761 - https://www.exploit-db.com/exploits/42440 +CVE-2017-12762 - https://usn.ubuntu.com/3620-1/ +CVE-2017-12778 - https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada +CVE-2017-12779 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12779 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12779 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12780 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12780 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12780 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12781 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12781 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12781 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12782 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12782 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12782 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12783 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12783 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12783 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12785 - https://www.exploit-db.com/exploits/42518/ +CVE-2017-12786 - https://www.exploit-db.com/exploits/42518/ +CVE-2017-12787 - https://www.exploit-db.com/exploits/42518/ +CVE-2017-12788 - https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md +CVE-2017-12789 - https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md +CVE-2017-12790 - https://github.com/lemon666/vuln/blob/master/MetInfo5.3.md +CVE-2017-12800 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12800 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12800 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12801 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12801 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12801 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12802 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12802 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12802 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12803 - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html +CVE-2017-12803 - http://seclists.org/fulldisclosure/2017/Nov/19 +CVE-2017-12803 - https://github.com/Matroska-Org/foundation-source/issues/24 +CVE-2017-12804 - https://github.com/jsummers/imageworsener/issues/30 +CVE-2017-12805 - https://github.com/ImageMagick/ImageMagick/issues/664 +CVE-2017-12806 - https://github.com/ImageMagick/ImageMagick/issues/660 +CVE-2017-12814 - https://hackerone.com/reports/272497 +CVE-2017-12814 - https://rt.perl.org/Public/Bug/Display.html?id=131665 +CVE-2017-12814 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-12816 - https://support.kaspersky.com/vulnerability.aspx?el=12430#090817 +CVE-2017-12817 - https://support.kaspersky.com/vulnerability.aspx?el=12430#090817 +CVE-2017-12823 - https://support.kaspersky.com/vulnerability.aspx?el=12430#091017 +CVE-2017-12837 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-12839 - https://sourceforge.net/p/mpg123/bugs/255/ +CVE-2017-12844 - https://youtu.be/MI4dhEia1d4 +CVE-2017-12853 - https://www.exploit-db.com/exploits/42449/ +CVE-2017-12856 - https://github.com/cooltey/C.P.Sub/issues/2 +CVE-2017-12858 - https://hackerone.com/reports/260414 +CVE-2017-12862 - https://github.com/opencv/opencv/issues/9370 +CVE-2017-12863 - https://github.com/opencv/opencv/issues/9371 +CVE-2017-12864 - https://github.com/opencv/opencv/issues/9372 +CVE-2017-12865 - https://www.nri-secure.com/blog/new-iot-vulnerability-connmando +CVE-2017-12875 - https://github.com/ImageMagick/ImageMagick/issues/659 +CVE-2017-12876 - http://www.openwall.com/lists/oss-security/2017/08/16/3 +CVE-2017-12876 - https://blogs.gentoo.org/ago/2017/08/10/imagemagick-heap-based-buffer-overflow-in-omp_outlined-32-enhance-c/ +CVE-2017-12877 - http://www.openwall.com/lists/oss-security/2017/08/16/2 +CVE-2017-12877 - https://blogs.gentoo.org/ago/2017/08/10/imagemagick-use-after-free-in-destroyimage-image-c/ +CVE-2017-12879 - https://drive.google.com/open?id=0B6WbMqXSfqQFODZHUGtLdzU3eDA +CVE-2017-12879 - https://youtu.be/QOLdH2oey8Q +CVE-2017-12883 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-12904 - https://github.com/akrennmair/newsbeuter/commit/96e9506ae9e252c548665152d1b8968297128307 +CVE-2017-12904 - https://github.com/akrennmair/newsbeuter/issues/591 +CVE-2017-12919 - http://www.openwall.com/lists/oss-security/2017/08/17/13 +CVE-2017-12919 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-heap-based-buffer-overflow-in-olestreamwritevt_lpstr-olestrm-cpp/ +CVE-2017-12920 - http://www.openwall.com/lists/oss-security/2017/08/17/12 +CVE-2017-12920 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-cdirectorygetdirentry-dir-cxx/ +CVE-2017-12921 - http://www.openwall.com/lists/oss-security/2017/08/17/10 +CVE-2017-12921 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-pfileflashpixviewgetglobalinfoproperty-f_fpxvw-cpp/ +CVE-2017-12922 - http://www.openwall.com/lists/oss-security/2017/08/17/11 +CVE-2017-12922 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-wchar-c/ +CVE-2017-12923 - http://www.openwall.com/lists/oss-security/2017/08/17/9 +CVE-2017-12923 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-olestreamwritevt_lpstr-olestrm-cpp/ +CVE-2017-12924 - http://www.openwall.com/lists/oss-security/2017/08/17/8 +CVE-2017-12924 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-divide-by-zero-in-cdirvectorgettable-dirfunc-hxx/ +CVE-2017-12925 - http://www.openwall.com/lists/oss-security/2017/08/17/14 +CVE-2017-12925 - https://blogs.gentoo.org/ago/2017/08/09/libfpx-double-free-in-dffromlb-docfile-cxx/ +CVE-2017-12928 - http://packetstormsecurity.com/files/144259/DlxSpot-Hardcoded-Password.html +CVE-2017-12929 - http://packetstormsecurity.com/files/144258/DlxSpot-Shell-Upload.html +CVE-2017-12930 - http://packetstormsecurity.com/files/144257/DlxSpot-SQL-Injection.html +CVE-2017-12932 - https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4 +CVE-2017-12932 - https://hackerone.com/reports/261335 +CVE-2017-12933 - https://hackerone.com/reports/261336 +CVE-2017-12934 - https://hackerone.com/reports/261338 +CVE-2017-12935 - https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/ +CVE-2017-12936 - https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-use-after-free-in-readwmfimage-wmf-c/ +CVE-2017-12937 - https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-heap-based-buffer-overflow-in-readsunimage-sun-c/ +CVE-2017-12938 - http://seclists.org/oss-sec/2017/q3/290 +CVE-2017-12940 - http://seclists.org/oss-sec/2017/q3/290 +CVE-2017-12941 - http://seclists.org/oss-sec/2017/q3/290 +CVE-2017-12942 - http://seclists.org/oss-sec/2017/q3/290 +CVE-2017-12943 - https://jithindkurup.tumblr.com/post/165218785974/d-link-dir-600-authentication-bypass-absolute +CVE-2017-12943 - https://www.exploit-db.com/exploits/42581/ +CVE-2017-12943 - https://www.youtube.com/watch?v=PeNOJORAQsQ +CVE-2017-12944 - https://usn.ubuntu.com/3606-1/ +CVE-2017-12945 - http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html +CVE-2017-12945 - https://www.exploit-db.com/exploits/47722 +CVE-2017-12950 - http://seclists.org/fulldisclosure/2017/Aug/39 +CVE-2017-12950 - https://www.exploit-db.com/exploits/42546/ +CVE-2017-12951 - http://seclists.org/fulldisclosure/2017/Aug/39 +CVE-2017-12951 - https://www.exploit-db.com/exploits/42546/ +CVE-2017-12952 - http://seclists.org/fulldisclosure/2017/Aug/39 +CVE-2017-12952 - https://www.exploit-db.com/exploits/42546/ +CVE-2017-12953 - http://seclists.org/fulldisclosure/2017/Aug/39 +CVE-2017-12953 - https://www.exploit-db.com/exploits/42546/ +CVE-2017-12954 - http://seclists.org/fulldisclosure/2017/Aug/39 +CVE-2017-12954 - https://www.exploit-db.com/exploits/42546/ +CVE-2017-12955 - https://bugzilla.redhat.com/show_bug.cgi?id=1482295 +CVE-2017-12956 - https://bugzilla.redhat.com/show_bug.cgi?id=1482296 +CVE-2017-12957 - https://bugzilla.redhat.com/show_bug.cgi?id=1482423 +CVE-2017-12962 - https://bugzilla.redhat.com/show_bug.cgi?id=1482331 +CVE-2017-12963 - https://bugzilla.redhat.com/show_bug.cgi?id=1482335 +CVE-2017-12964 - https://bugzilla.redhat.com/show_bug.cgi?id=1482397 +CVE-2017-12965 - http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt +CVE-2017-12965 - http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html +CVE-2017-12965 - https://www.exploit-db.com/exploits/42520/ +CVE-2017-12969 - http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-VIEWERCTRL-ACTIVE-X-BUFFER-OVERFLOW-0DAY.txt +CVE-2017-12969 - http://packetstormsecurity.com/files/144882/Avaya-IP-Office-IPO-10.1-Active-X-Buffer-Overflow.html +CVE-2017-12969 - http://seclists.org/fulldisclosure/2017/Nov/17 +CVE-2017-12969 - https://www.exploit-db.com/exploits/43120/ +CVE-2017-1297 - https://www.exploit-db.com/exploits/42260/ +CVE-2017-12970 - http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt +CVE-2017-12970 - http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html +CVE-2017-12970 - https://www.exploit-db.com/exploits/42520/ +CVE-2017-12971 - http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt +CVE-2017-12971 - http://packetstormsecurity.com/files/143863/Apache2Triad-1.5.4-CSRF-XSS-Session-Fixation.html +CVE-2017-12971 - https://www.exploit-db.com/exploits/42520/ +CVE-2017-12979 - https://github.com/splitbrain/dokuwiki/issues/2080 +CVE-2017-12980 - https://github.com/splitbrain/dokuwiki/issues/2081 +CVE-2017-12982 - https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/ +CVE-2017-12982 - https://github.com/uclouvain/openjpeg/issues/983 +CVE-2017-12983 - https://github.com/ImageMagick/ImageMagick/issues/682 +CVE-2017-12984 - https://www.exploit-db.com/exploits/42535/ +CVE-2017-12985 - https://hackerone.com/reports/268803 +CVE-2017-12986 - https://hackerone.com/reports/268804 +CVE-2017-13008 - https://hackerone.com/reports/268805 +CVE-2017-13009 - https://hackerone.com/reports/268806 +CVE-2017-13010 - https://hackerone.com/reports/268807 +CVE-2017-13038 - https://hackerone.com/reports/268808 +CVE-2017-13056 - http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html +CVE-2017-13063 - https://sourceforge.net/p/graphicsmagick/bugs/434/ +CVE-2017-13064 - https://sourceforge.net/p/graphicsmagick/bugs/436/ +CVE-2017-13065 - https://sourceforge.net/p/graphicsmagick/bugs/435/ +CVE-2017-13066 - https://sourceforge.net/p/graphicsmagick/bugs/430/ +CVE-2017-13077 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13077 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13077 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-13077 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13077 - https://cert.vde.com/en-us/advisories/vde-2017-003 +CVE-2017-13077 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13077 - https://hackerone.com/reports/286740 +CVE-2017-13077 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13077 - https://www.krackattacks.com/ +CVE-2017-13078 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13078 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13078 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-13078 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13078 - https://cert.vde.com/en-us/advisories/vde-2017-003 +CVE-2017-13078 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13078 - https://hackerone.com/reports/286740 +CVE-2017-13078 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13078 - https://www.krackattacks.com/ +CVE-2017-13079 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13079 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13079 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-13079 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13079 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13079 - https://hackerone.com/reports/286740 +CVE-2017-13079 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13079 - https://www.krackattacks.com/ +CVE-2017-13080 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13080 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13080 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-13080 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13080 - https://cert.vde.com/en-us/advisories/vde-2017-003 +CVE-2017-13080 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13080 - https://hackerone.com/reports/286740 +CVE-2017-13080 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13080 - https://www.krackattacks.com/ +CVE-2017-13081 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13081 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13081 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-13081 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13081 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13081 - https://hackerone.com/reports/286740 +CVE-2017-13081 - https://www.krackattacks.com/ +CVE-2017-13082 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13082 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13082 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-13082 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13082 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13082 - https://hackerone.com/reports/286740 +CVE-2017-13082 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13082 - https://www.krackattacks.com/ +CVE-2017-13084 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13084 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13084 - https://hackerone.com/reports/286740 +CVE-2017-13084 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13084 - https://www.krackattacks.com/ +CVE-2017-13086 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13086 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13086 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13086 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13086 - https://hackerone.com/reports/286740 +CVE-2017-13086 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13086 - https://www.krackattacks.com/ +CVE-2017-13087 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13087 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13087 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13087 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13087 - https://hackerone.com/reports/286740 +CVE-2017-13087 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13087 - https://www.krackattacks.com/ +CVE-2017-13088 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt +CVE-2017-13088 - http://www.kb.cert.org/vuls/id/228519 +CVE-2017-13088 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-13088 - http://www.ubuntu.com/usn/USN-3455-1 +CVE-2017-13088 - https://cert.vde.com/en-us/advisories/vde-2017-005 +CVE-2017-13088 - https://hackerone.com/reports/286740 +CVE-2017-13088 - https://support.lenovo.com/us/en/product_security/LEN-17420 +CVE-2017-13088 - https://www.krackattacks.com/ +CVE-2017-13089 - https://github.com/r1b/CVE-2017-13089 +CVE-2017-13089 - https://hackerone.com/reports/287666 +CVE-2017-13090 - https://hackerone.com/reports/287667 +CVE-2017-13091 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13092 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13093 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13094 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13095 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13096 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13097 - https://www.kb.cert.org/vuls/id/739007 +CVE-2017-13098 - http://www.kb.cert.org/vuls/id/144389 +CVE-2017-13098 - https://robotattack.org/ +CVE-2017-13098 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-13099 - http://www.kb.cert.org/vuls/id/144389 +CVE-2017-13099 - https://robotattack.org/ +CVE-2017-13100 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13101 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13102 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13104 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13105 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13106 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13107 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13108 - https://www.kb.cert.org/vuls/id/787952 +CVE-2017-13129 - http://seclists.org/bugtraq/2017/Sep/19 +CVE-2017-13129 - http://seclists.org/fulldisclosure/2017/Sep/38 +CVE-2017-13135 - https://github.com/ebel34/bpg-web-encoder/issues/1 +CVE-2017-13136 - https://github.com/ebel34/bpg-web-encoder/issues/1 +CVE-2017-13137 - https://packetstormsecurity.com/files/143116/WordPress-FormCraft-Basic-1.0.5-SQL-Injection.html +CVE-2017-13138 - https://wpvulndb.com/vulnerabilities/8892 +CVE-2017-13143 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870012 +CVE-2017-13143 - https://github.com/ImageMagick/ImageMagick/issues/362 +CVE-2017-13147 - https://sourceforge.net/p/graphicsmagick/bugs/446/ +CVE-2017-13156 - http://packetstormsecurity.com/files/155189/Android-Janus-APK-Signature-Bypass.html +CVE-2017-13166 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-13168 - https://usn.ubuntu.com/3753-1/ +CVE-2017-13168 - https://usn.ubuntu.com/3753-2/ +CVE-2017-13168 - https://usn.ubuntu.com/3820-1/ +CVE-2017-13168 - https://usn.ubuntu.com/3822-1/ +CVE-2017-13189 - https://android.googlesource.com/platform/external/libavc/+/5acaa6fc86c73a750e5f4900c4e2d44bf22f683a +CVE-2017-13194 - https://android.googlesource.com/platform/external/libvpx/+/55cd1dd7c8d0a3de907d22e0f12718733f4e41d9 +CVE-2017-13200 - https://android.googlesource.com/platform/frameworks/av/+/dd3ca4d6b81a9ae2ddf358b7b93d2f8c010921f5 +CVE-2017-13203 - https://android.googlesource.com/platform/external/libavc/+/e86d3cfd2bc28dac421092106751e5638d54a848 +CVE-2017-13204 - https://android.googlesource.com/platform/external/libavc/+/42cf02965b11c397dd37a0063e683cef005bc0ae +CVE-2017-13209 - https://www.exploit-db.com/exploits/43513/ +CVE-2017-13216 - https://www.exploit-db.com/exploits/43464/ +CVE-2017-13218 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-13220 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51bda2bca53b265715ca1852528f38dc67429d9a +CVE-2017-13236 - https://www.exploit-db.com/exploits/43996/ +CVE-2017-13253 - https://www.exploit-db.com/exploits/44291/ +CVE-2017-13258 - https://www.exploit-db.com/exploits/44326/ +CVE-2017-13258 - https://www.exploit-db.com/exploits/44327/ +CVE-2017-13260 - https://www.exploit-db.com/exploits/44326/ +CVE-2017-13260 - https://www.exploit-db.com/exploits/44327/ +CVE-2017-13261 - https://www.exploit-db.com/exploits/44326/ +CVE-2017-13261 - https://www.exploit-db.com/exploits/44327/ +CVE-2017-13262 - https://www.exploit-db.com/exploits/44326/ +CVE-2017-13262 - https://www.exploit-db.com/exploits/44327/ +CVE-2017-13648 - https://sourceforge.net/p/graphicsmagick/bugs/433/ +CVE-2017-13692 - https://github.com/htacg/tidy-html5/issues/588 +CVE-2017-13695 - https://usn.ubuntu.com/3696-1/ +CVE-2017-13696 - https://www.exploit-db.com/exploits/42557 +CVE-2017-13696 - https://www.exploit-db.com/exploits/42558/ +CVE-2017-13696 - https://www.exploit-db.com/exploits/42559/ +CVE-2017-13696 - https://www.exploit-db.com/exploits/42560/ +CVE-2017-13704 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-13704 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-13706 - http://packetstormsecurity.com/files/144527/Lansweeper-6.0.100.29-XXE-Injection.html +CVE-2017-13706 - http://seclists.org/fulldisclosure/2017/Oct/14 +CVE-2017-13708 - http://packetstormsecurity.com/files/143949/VX-Search-Enterprise-10.0.14-Buffer-Overflow.html +CVE-2017-13713 - http://packetstormsecurity.com/files/143978/Wireless-Repeater-BE126-Remote-Code-Execution.html +CVE-2017-13713 - https://www.exploit-db.com/exploits/42608/ +CVE-2017-13717 - http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html +CVE-2017-13718 - http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html +CVE-2017-13719 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html +CVE-2017-13726 - http://bugzilla.maptools.org/show_bug.cgi?id=2727 +CVE-2017-13727 - http://bugzilla.maptools.org/show_bug.cgi?id=2728 +CVE-2017-13733 - https://bugzilla.redhat.com/show_bug.cgi?id=1484290 +CVE-2017-13734 - https://bugzilla.redhat.com/show_bug.cgi?id=1484291 +CVE-2017-13745 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-13745 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-13754 - http://seclists.org/fulldisclosure/2017/Sep/1 +CVE-2017-13754 - https://www.exploit-db.com/exploits/42610/ +CVE-2017-13754 - https://www.vulnerability-lab.com/get_content.php?id=2074 +CVE-2017-13757 - https://sourceware.org/bugzilla/show_bug.cgi?id=22018 +CVE-2017-13771 - http://packetstormsecurity.com/files/143975/Lexmark-Scan-To-Network-SNF-3.2.9-Information-Disclosure.html +CVE-2017-13771 - http://seclists.org/fulldisclosure/2017/Aug/46 +CVE-2017-13772 - http://packetstormsecurity.com/files/158999/TP-Link-WDR4300-Remote-Code-Execution.html +CVE-2017-13772 - https://www.exploit-db.com/exploits/43022/ +CVE-2017-13772 - https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/ +CVE-2017-13775 - http://openwall.com/lists/oss-security/2017/08/31/3 +CVE-2017-13776 - http://openwall.com/lists/oss-security/2017/08/31/2 +CVE-2017-13777 - http://openwall.com/lists/oss-security/2017/08/31/1 +CVE-2017-13782 - http://packetstormsecurity.com/files/172827/Apple-XNU-Kernel-Memory-Exposure.html +CVE-2017-13783 - https://www.exploit-db.com/exploits/43172/ +CVE-2017-13784 - https://www.exploit-db.com/exploits/43171/ +CVE-2017-13785 - https://www.exploit-db.com/exploits/43170/ +CVE-2017-13791 - https://www.exploit-db.com/exploits/43176/ +CVE-2017-13792 - https://www.exploit-db.com/exploits/43167/ +CVE-2017-13794 - https://www.exploit-db.com/exploits/43174/ +CVE-2017-13795 - https://www.exploit-db.com/exploits/43169/ +CVE-2017-13796 - https://www.exploit-db.com/exploits/43166/ +CVE-2017-13797 - https://www.exploit-db.com/exploits/43168/ +CVE-2017-13798 - https://www.exploit-db.com/exploits/43175/ +CVE-2017-13802 - https://www.exploit-db.com/exploits/43173/ +CVE-2017-13847 - https://www.exploit-db.com/exploits/43326/ +CVE-2017-13849 - https://www.exploit-db.com/exploits/43161/ +CVE-2017-13855 - https://www.exploit-db.com/exploits/43318/ +CVE-2017-13861 - http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html +CVE-2017-13861 - https://www.exploit-db.com/exploits/43320/ +CVE-2017-13865 - https://www.exploit-db.com/exploits/43321/ +CVE-2017-13867 - https://www.exploit-db.com/exploits/43328/ +CVE-2017-13868 - https://github.com/bazad/ctl_ctloutput-leak +CVE-2017-13869 - https://www.exploit-db.com/exploits/43319/ +CVE-2017-13872 - https://www.exploit-db.com/exploits/43201/ +CVE-2017-13872 - https://www.exploit-db.com/exploits/43248/ +CVE-2017-13875 - https://www.exploit-db.com/exploits/43327/ +CVE-2017-13876 - https://www.exploit-db.com/exploits/43325/ +CVE-2017-13878 - https://www.exploit-db.com/exploits/43780/ +CVE-2017-13904 - http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html +CVE-2017-14016 - https://www.exploit-db.com/exploits/43340/ +CVE-2017-14034 - https://github.com/ebel34/bpg-web-encoder/issues/1 +CVE-2017-14039 - https://blogs.gentoo.org/ago/2017/08/28/openjpeg-heap-based-buffer-overflow-in-opj_t2_encode_packet-t2-c/ +CVE-2017-14039 - https://github.com/uclouvain/openjpeg/issues/992 +CVE-2017-14040 - https://blogs.gentoo.org/ago/2017/08/28/openjpeg-invalid-memory-write-in-tgatoimage-convert-c/ +CVE-2017-14040 - https://github.com/uclouvain/openjpeg/issues/995 +CVE-2017-14041 - https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/ +CVE-2017-14041 - https://github.com/uclouvain/openjpeg/issues/997 +CVE-2017-14042 - https://blogs.gentoo.org/ago/2017/08/28/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c-2/ +CVE-2017-14051 - https://usn.ubuntu.com/3583-2/ +CVE-2017-14064 - https://hackerone.com/reports/209949 +CVE-2017-14075 - http://packetstormsecurity.com/files/144045/Jungo-DriverWizard-WinDrive-OOB-Write-Privilege-Escalation.html +CVE-2017-14075 - https://www.exploit-db.com/exploits/42625/ +CVE-2017-14083 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14083-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-ENCRYPTION-KEY-DISCLOSURE.txt +CVE-2017-14083 - http://packetstormsecurity.com/files/144398/TrendMicro-OfficeScan-11.0-XG-12.0-Encryption-Key-Disclosure.html +CVE-2017-14083 - http://seclists.org/fulldisclosure/2017/Sep/90 +CVE-2017-14083 - https://www.exploit-db.com/exploits/42889/ +CVE-2017-14084 - http://packetstormsecurity.com/files/144400/TrendMicro-OfficeScan-11.0-XG-12.0-Man-In-The-Middle.html +CVE-2017-14084 - https://www.exploit-db.com/exploits/42891/ +CVE-2017-14085 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14085-TRENDMICRO-OFFICESCAN-XG-REMOTE-NT-DOMAIN-PHP-INFO-DISCLOSURE.txt +CVE-2017-14085 - http://packetstormsecurity.com/files/144402/TrendMicro-OfficeScan-11.0-XG-12.0-Information-Disclosure.html +CVE-2017-14085 - http://seclists.org/fulldisclosure/2017/Sep/85 +CVE-2017-14085 - https://www.exploit-db.com/exploits/42893/ +CVE-2017-14086 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt +CVE-2017-14086 - http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html +CVE-2017-14086 - http://seclists.org/fulldisclosure/2017/Sep/88 +CVE-2017-14086 - https://www.exploit-db.com/exploits/42892/ +CVE-2017-14087 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt +CVE-2017-14087 - http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html +CVE-2017-14087 - http://seclists.org/fulldisclosure/2017/Sep/86 +CVE-2017-14087 - https://www.exploit-db.com/exploits/42895/ +CVE-2017-14089 - http://hyp3rlinx.altervista.org/advisories/CVE-2017-14089-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-MEMORY-CORRUPTION.txt +CVE-2017-14089 - http://packetstormsecurity.com/files/144464/TrendMicro-OfficeScan-11.0-XG-12.0-Memory-Corruption.html +CVE-2017-14089 - http://seclists.org/fulldisclosure/2017/Sep/91 +CVE-2017-14089 - https://www.exploit-db.com/exploits/42920/ +CVE-2017-14090 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities +CVE-2017-14091 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities +CVE-2017-14092 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities +CVE-2017-14093 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities +CVE-2017-14094 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities +CVE-2017-14094 - https://www.exploit-db.com/exploits/43388/ +CVE-2017-14095 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities +CVE-2017-14095 - https://www.exploit-db.com/exploits/43388/ +CVE-2017-14096 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities +CVE-2017-14096 - https://www.exploit-db.com/exploits/43388/ +CVE-2017-14097 - https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities +CVE-2017-14097 - https://www.exploit-db.com/exploits/43388/ +CVE-2017-14103 - https://blogs.gentoo.org/ago/2017/09/01/graphicsmagick-use-after-free-in-closeblob-blob-c-incomplete-fix-for-cve-2017-11403/ +CVE-2017-14105 - https://github.com/theguly/CVE-2017-14105 +CVE-2017-14106 - https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html +CVE-2017-14107 - https://blogs.gentoo.org/ago/2017/09/01/libzip-memory-allocation-failure-in-_zip_cdir_grow-zip_dirent-c/ +CVE-2017-14108 - https://bugzilla.gnome.org/show_bug.cgi?id=791037 +CVE-2017-14108 - https://cxsecurity.com/issue/WLB-2017090008 +CVE-2017-14108 - https://packetstormsecurity.com/files/143983/libgedit.a-3.22.1-Denial-Of-Service.html +CVE-2017-14115 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ +CVE-2017-14116 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ +CVE-2017-14117 - https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ +CVE-2017-14120 - http://www.openwall.com/lists/oss-security/2017/08/20/1 +CVE-2017-14120 - https://bugs.debian.org/874059 +CVE-2017-14121 - http://www.openwall.com/lists/oss-security/2017/08/20/1 +CVE-2017-14122 - http://www.openwall.com/lists/oss-security/2017/08/20/1 +CVE-2017-14125 - http://seclists.org/fulldisclosure/2017/Sep/55 +CVE-2017-14125 - https://wpvulndb.com/vulnerabilities/8907 +CVE-2017-14126 - https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html +CVE-2017-14126 - https://www.exploit-db.com/exploits/42618/ +CVE-2017-14128 - https://sourceware.org/bugzilla/show_bug.cgi?id=22059 +CVE-2017-14129 - https://sourceware.org/bugzilla/show_bug.cgi?id=22047 +CVE-2017-14130 - https://sourceware.org/bugzilla/show_bug.cgi?id=22058 +CVE-2017-14132 - https://github.com/mdadams/jasper/issues/147 +CVE-2017-14138 - https://github.com/ImageMagick/ImageMagick/issues/639 +CVE-2017-14139 - https://github.com/ImageMagick/ImageMagick/issues/578 +CVE-2017-14140 - https://usn.ubuntu.com/3583-2/ +CVE-2017-14143 - https://www.exploit-db.com/exploits/43028/ +CVE-2017-14143 - https://www.exploit-db.com/exploits/43876/ +CVE-2017-14147 - http://packetstormsecurity.com/files/144022/FiberHome-Unauthenticated-ADSL-Router-Factory-Reset.html +CVE-2017-14147 - https://www.exploit-db.com/exploits/42649/ +CVE-2017-14151 - https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_mqc_flush-mqc-c/ +CVE-2017-14151 - https://github.com/uclouvain/openjpeg/issues/982 +CVE-2017-14152 - https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c/ +CVE-2017-14152 - https://github.com/uclouvain/openjpeg/commit/4241ae6fbbf1de9658764a80944dc8108f2b4154 +CVE-2017-14152 - https://github.com/uclouvain/openjpeg/issues/985 +CVE-2017-14153 - http://packetstormsecurity.com/files/144046/Jungo-DriverWizard-WinDrive-Overflow.html +CVE-2017-14153 - https://www.exploit-db.com/exploits/42624/ +CVE-2017-14156 - https://usn.ubuntu.com/3583-2/ +CVE-2017-14159 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2017-14160 - http://openwall.com/lists/oss-security/2017/09/21/2 +CVE-2017-14164 - https://blogs.gentoo.org/ago/2017/09/06/heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c-incomplete-fix-for-cve-2017-14152/ +CVE-2017-14164 - https://github.com/uclouvain/openjpeg/issues/991 +CVE-2017-14165 - https://blogs.gentoo.org/ago/2017/09/06/graphicsmagick-memory-allocation-failure-in-magickmalloc-memory-c-2/ +CVE-2017-14166 - https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/ +CVE-2017-14172 - https://github.com/ImageMagick/ImageMagick/issues/715 +CVE-2017-14173 - https://github.com/ImageMagick/ImageMagick/issues/713 +CVE-2017-14174 - https://github.com/ImageMagick/ImageMagick/issues/714 +CVE-2017-14175 - https://github.com/ImageMagick/ImageMagick/issues/712 +CVE-2017-14177 - https://launchpad.net/bugs/1726372 +CVE-2017-14177 - https://usn.ubuntu.com/usn/usn-3480-1 +CVE-2017-14179 - https://launchpad.net/bugs/1726372 +CVE-2017-14179 - https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14179 +CVE-2017-14180 - https://launchpad.net/bugs/1726372 +CVE-2017-14180 - https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14180 +CVE-2017-14180 - https://usn.ubuntu.com/usn/usn-3480-1 +CVE-2017-14181 - https://blogs.gentoo.org/ago/2017/09/07/aacplusenc-null-pointer-dereference-in-deletebitbuffer-bitbuffer-c/ +CVE-2017-14181 - https://github.com/teknoraver/aacplusenc/issues/1 +CVE-2017-14182 - http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html +CVE-2017-14184 - https://fortiguard.com/advisory/FG-IR-17-214 +CVE-2017-14190 - https://fortiguard.com/advisory/FG-IR-17-262 +CVE-2017-14199 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12 +CVE-2017-14201 - https://github.com/zephyrproject-rtos/zephyr/pull/13260 +CVE-2017-14201 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17 +CVE-2017-14202 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18 +CVE-2017-14219 - https://www.exploit-db.com/exploits/42633/ +CVE-2017-14227 - https://bugzilla.redhat.com/show_bug.cgi?id=1489356 +CVE-2017-14229 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-14232 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-14243 - https://www.exploit-db.com/exploits/42739/ +CVE-2017-14244 - https://www.exploit-db.com/exploits/42740/ +CVE-2017-14245 - https://usn.ubuntu.com/4013-1/ +CVE-2017-14246 - https://usn.ubuntu.com/4013-1/ +CVE-2017-14248 - https://github.com/ImageMagick/ImageMagick/issues/717 +CVE-2017-14249 - https://github.com/ImageMagick/ImageMagick/issues/708 +CVE-2017-14257 - https://github.com/axiomatic-systems/Bento4/issues/181 +CVE-2017-14258 - https://github.com/axiomatic-systems/Bento4/issues/181 +CVE-2017-14259 - https://github.com/axiomatic-systems/Bento4/issues/181 +CVE-2017-14260 - https://github.com/axiomatic-systems/Bento4/issues/181 +CVE-2017-14261 - https://github.com/axiomatic-systems/Bento4/issues/181 +CVE-2017-14266 - https://www.exploit-db.com/exploits/42652/ +CVE-2017-14267 - http://seclists.org/fulldisclosure/2017/Sep/13 +CVE-2017-14267 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup +CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/AddProfileCSRFXSSPoc.html +CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFInternetDCPoC.html +CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFPocRedirectSMS.html +CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/CSRFPocResetDefaults.html +CVE-2017-14267 - https://github.com/JamesIT/vuln-advisories-/blob/master/EE-4GEE-Multiple-Vulns/CSRF/uploadBinarySettingsCSRFPoC.html +CVE-2017-14268 - http://seclists.org/fulldisclosure/2017/Sep/13 +CVE-2017-14268 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup +CVE-2017-14269 - http://seclists.org/fulldisclosure/2017/Sep/13 +CVE-2017-14269 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup +CVE-2017-14311 - https://www.exploit-db.com/exploits/42735/ +CVE-2017-14312 - https://github.com/NagiosEnterprises/nagioscore/issues/424 +CVE-2017-14313 - https://wpvulndb.com/vulnerabilities/8901 +CVE-2017-14322 - https://www.exploit-db.com/exploits/44513/ +CVE-2017-14324 - https://github.com/ImageMagick/ImageMagick/issues/739 +CVE-2017-14325 - https://github.com/ImageMagick/ImageMagick/issues/741 +CVE-2017-14326 - https://github.com/ImageMagick/ImageMagick/issues/740 +CVE-2017-14339 - https://www.tarlogic.com/blog/fuzzing-yadifa-dns/ +CVE-2017-14341 - https://github.com/ImageMagick/ImageMagick/issues/654 +CVE-2017-14342 - https://github.com/ImageMagick/ImageMagick/issues/650 +CVE-2017-14343 - https://github.com/ImageMagick/ImageMagick/issues/649 +CVE-2017-14344 - http://srcincite.io/advisories/src-2017-0027/ +CVE-2017-14344 - https://www.exploit-db.com/exploits/42665/ +CVE-2017-14355 - https://www.exploit-db.com/exploits/43857/ +CVE-2017-14400 - https://github.com/ImageMagick/ImageMagick/issues/746 +CVE-2017-14406 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-null-pointer-dereference-in-sync_buffer-mpglibdblinterface-c/ +CVE-2017-14407 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-filteryule-gain_analysis-c/ +CVE-2017-14408 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-dct36-mpglibdbllayer3-c/ +CVE-2017-14409 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_dequantize_sample-mpglibdbllayer3-c/ +CVE-2017-14410 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-global-buffer-overflow-in-iii_i_stereo-mpglibdbllayer3-c/ +CVE-2017-14411 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-copy_mp-mpglibdblinterface-c/ +CVE-2017-14412 - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-invalid-memory-write-in-copy_mp-mpglibdblinterface-c/ +CVE-2017-14432 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 +CVE-2017-14433 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 +CVE-2017-14434 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 +CVE-2017-14435 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 +CVE-2017-14436 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 +CVE-2017-14437 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0474 +CVE-2017-14438 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0487 +CVE-2017-14439 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0487 +CVE-2017-14443 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0492 +CVE-2017-14444 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0493 +CVE-2017-14445 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0494 +CVE-2017-14446 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0495 +CVE-2017-14447 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0496 +CVE-2017-14451 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0500 +CVE-2017-14452 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 +CVE-2017-14453 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 +CVE-2017-14454 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502 +CVE-2017-14455 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 +CVE-2017-14458 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0506 +CVE-2017-14459 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0507 +CVE-2017-14460 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0508 +CVE-2017-14461 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510 +CVE-2017-14461 - https://usn.ubuntu.com/3587-2/ +CVE-2017-14462 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14463 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14464 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14465 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14466 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14467 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14468 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14469 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14470 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14471 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14472 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14473 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 +CVE-2017-14482 - http://www.openwall.com/lists/oss-security/2017/09/11/1 +CVE-2017-14482 - https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28350 +CVE-2017-14489 - https://usn.ubuntu.com/3583-2/ +CVE-2017-14489 - https://www.exploit-db.com/exploits/42932/ +CVE-2017-14491 - http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html +CVE-2017-14491 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-14491 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-14491 - https://www.exploit-db.com/exploits/42941/ +CVE-2017-14492 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-14492 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-14492 - https://www.exploit-db.com/exploits/42942/ +CVE-2017-14493 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-14493 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-14493 - https://www.exploit-db.com/exploits/42943/ +CVE-2017-14494 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-14494 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-14494 - https://www.exploit-db.com/exploits/42944/ +CVE-2017-14495 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-14495 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-14495 - https://www.exploit-db.com/exploits/42945/ +CVE-2017-14496 - http://thekelleys.org.uk/dnsmasq/CHANGELOG +CVE-2017-14496 - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html +CVE-2017-14496 - https://www.exploit-db.com/exploits/42946/ +CVE-2017-14498 - http://lists.openwall.net/full-disclosure/2017/09/14/2 +CVE-2017-14506 - http://baraktawily.blogspot.co.il/2017/09/gem-in-box-xss-vulenrability-cve-2017.html +CVE-2017-14507 - https://wpvulndb.com/vulnerabilities/8921 +CVE-2017-14507 - https://www.exploit-db.com/exploits/42794/ +CVE-2017-14508 - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ +CVE-2017-14509 - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ +CVE-2017-14510 - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ +CVE-2017-14513 - https://github.com/phantom0301/vulns/blob/master/Metinfo2.md +CVE-2017-14516 - https://blogs.sap.com/2017/06/13/sap-security-patch-day-june2017/ +CVE-2017-14517 - https://bugs.freedesktop.org/show_bug.cgi?id=102687 +CVE-2017-14518 - https://bugs.freedesktop.org/show_bug.cgi?id=102688 +CVE-2017-14519 - https://bugs.freedesktop.org/show_bug.cgi?id=102701 +CVE-2017-14520 - https://bugs.freedesktop.org/show_bug.cgi?id=102719 +CVE-2017-14521 - https://www.exploit-db.com/exploits/43963/ +CVE-2017-14523 - https://www.exploit-db.com/exploits/43964/ +CVE-2017-14524 - http://seclists.org/fulldisclosure/2017/Sep/57 +CVE-2017-14525 - http://seclists.org/fulldisclosure/2017/Sep/57 +CVE-2017-14528 - http://bugzilla.maptools.org/show_bug.cgi?id=2730 +CVE-2017-14529 - https://sourceware.org/bugzilla/show_bug.cgi?id=22113 +CVE-2017-14530 - https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html +CVE-2017-14530 - https://github.com/cybersecurityworks/Disclosed/issues/9 +CVE-2017-14533 - https://github.com/ImageMagick/ImageMagick/issues/648 +CVE-2017-14535 - http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html +CVE-2017-14535 - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ +CVE-2017-14535 - https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t +CVE-2017-14536 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-cross-site-scripting-vulnerabilities/ +CVE-2017-14537 - http://packetstormsecurity.com/files/162853/Trixbox-2.8.0.4-Path-Traversal.html +CVE-2017-14537 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ +CVE-2017-14572 - https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14572 +CVE-2017-14596 - https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/ +CVE-2017-14600 - https://github.com/delta/pragyan/issues/228 +CVE-2017-14601 - https://github.com/delta/pragyan/issues/228 +CVE-2017-14604 - https://bugzilla.gnome.org/show_bug.cgi?id=777991 +CVE-2017-14604 - https://github.com/freedomofpress/securedrop/issues/2238 +CVE-2017-14604 - https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/ +CVE-2017-1461 - http://www.ibm.com/support/docview.wss?uid=swg22010321 +CVE-2017-14615 - http://seclists.org/bugtraq/2017/Sep/22 +CVE-2017-14617 - https://bugs.freedesktop.org/show_bug.cgi?id=102854 +CVE-2017-14618 - https://packetstormsecurity.com/files/144280/phpMyFAQ-2.9.8-Cross-Site-Scripting.html +CVE-2017-14618 - https://www.exploit-db.com/exploits/42761/ +CVE-2017-14619 - https://packetstormsecurity.com/files/144603/phpMyFAQ-2.9.8-Cross-Site-Scripting.html +CVE-2017-14619 - https://www.exploit-db.com/exploits/42987/ +CVE-2017-14620 - http://xss.cx/cve/2017/14620/smarterstats.v11-3-6347.html +CVE-2017-14620 - https://www.exploit-db.com/exploits/42923/ +CVE-2017-14622 - https://packetstormsecurity.com/files/144261/WordPress-2kb-Amazon-Affiliates-Store-2.1.0-Cross-Site-Scripting.html +CVE-2017-14627 - https://www.exploit-db.com/exploits/42777/ +CVE-2017-14627 - https://www.exploit-db.com/exploits/45985/ +CVE-2017-14628 - https://github.com/pts/sam2p/issues/14 +CVE-2017-14629 - https://github.com/pts/sam2p/issues/14 +CVE-2017-14630 - https://github.com/pts/sam2p/issues/14 +CVE-2017-14631 - https://github.com/pts/sam2p/issues/14 +CVE-2017-14634 - https://usn.ubuntu.com/4013-1/ +CVE-2017-14636 - https://github.com/pts/sam2p/issues/14 +CVE-2017-14637 - https://github.com/pts/sam2p/issues/14 +CVE-2017-14638 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_atomsettype-ap4atom-h/ +CVE-2017-14638 - https://github.com/axiomatic-systems/Bento4/issues/182 +CVE-2017-14639 - https://blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-underflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/ +CVE-2017-14639 - https://github.com/axiomatic-systems/Bento4/issues/190 +CVE-2017-14640 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_atomsampletablegetsample-ap4atomsampletable-cpp/ +CVE-2017-14640 - https://github.com/axiomatic-systems/Bento4/issues/183 +CVE-2017-14641 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_dataatomap4_dataatom-ap4metadata-cpp/ +CVE-2017-14641 - https://github.com/axiomatic-systems/Bento4/issues/184 +CVE-2017-14642 - https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_stdcfilebytestreamreadpartial-ap4stdcfilebytestream-cpp/ +CVE-2017-14642 - https://github.com/axiomatic-systems/Bento4/issues/185 +CVE-2017-14643 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_bytestouint32be-ap4utils-h/ +CVE-2017-14643 - https://github.com/axiomatic-systems/Bento4/issues/187 +CVE-2017-14644 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_hdlratomap4_hdlratom-ap4hdlratom-cpp/ +CVE-2017-14645 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_bitstreamreadbytes-ap4bitstream-cpp/ +CVE-2017-14646 - https://blogs.gentoo.org/ago/2017/09/14/bento4-heap-based-buffer-overflow-in-ap4_databuffersetdata-ap4databuffer-cpp/ +CVE-2017-14646 - https://github.com/axiomatic-systems/Bento4/issues/188 +CVE-2017-14647 - https://blogs.gentoo.org/ago/2017/09/14/bento4-stack-based-buffer-overflow-in-ap4_visualsampleentryreadfields-ap4sampleentry-cpp/ +CVE-2017-14649 - https://blogs.gentoo.org/ago/2017/09/19/graphicsmagick-assertion-failure-in-pixel_cache-c/ +CVE-2017-14650 - https://github.com/horde/horde/commit/eb3afd14c22c77ae0d29e2848f5ac726ef6e7c5b +CVE-2017-14651 - https://cybersecurityworks.com/zerodays/cve-2017-14651-wso2.html +CVE-2017-14651 - https://github.com/cybersecurityworks/Disclosed/issues/15 +CVE-2017-14652 - http://adrianhayter.com/exploits.php +CVE-2017-14680 - http://seclists.org/bugtraq/2017/Sep/20 +CVE-2017-14680 - http://seclists.org/fulldisclosure/2017/Sep/39 +CVE-2017-14683 - http://baraktawily.blogspot.co.il/2017/09/gem-in-box-xss-vulenrability-cve-2017.html +CVE-2017-14684 - https://github.com/ImageMagick/ImageMagick/issues/770 +CVE-2017-14685 - https://bugs.ghostscript.com/show_bug.cgi?id=698539 +CVE-2017-14686 - https://bugs.ghostscript.com/show_bug.cgi?id=698540 +CVE-2017-14687 - https://bugs.ghostscript.com/show_bug.cgi?id=698558 +CVE-2017-14702 - https://github.com/wshepherd0010/advisories/blob/master/CVE-2017-14702.md +CVE-2017-14702 - https://www.exploit-db.com/exploits/42952/ +CVE-2017-14703 - https://www.exploit-db.com/exploits/42772/ +CVE-2017-14704 - https://www.exploit-db.com/exploits/42773/ +CVE-2017-14705 - https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/ +CVE-2017-14706 - https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/ +CVE-2017-14712 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 +CVE-2017-14712 - https://www.exploit-db.com/exploits/42950/ +CVE-2017-14713 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 +CVE-2017-14714 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 +CVE-2017-14715 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 +CVE-2017-14716 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 +CVE-2017-14717 - https://forum.epesibim.com/d/4956-security-issue-multiple-stored-xss-in-epesi-version-1-8-2-rev20170830 +CVE-2017-14717 - https://www.exploit-db.com/exploits/42950/ +CVE-2017-14719 - https://wpvulndb.com/vulnerabilities/8911 +CVE-2017-14722 - https://wpvulndb.com/vulnerabilities/8912 +CVE-2017-14723 - https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e +CVE-2017-14724 - https://wpvulndb.com/vulnerabilities/8913 +CVE-2017-14725 - https://wpvulndb.com/vulnerabilities/8910 +CVE-2017-14726 - https://wpvulndb.com/vulnerabilities/8914 +CVE-2017-14729 - https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/ +CVE-2017-14730 - https://github.com/gentoo/gentoo/pull/5665 +CVE-2017-14731 - https://github.com/libofx/libofx/issues/10 +CVE-2017-14735 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-14735 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-14735 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2017-14735 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-14735 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2017-14735 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-14738 - https://www.exploit-db.com/exploits/42922/ +CVE-2017-14742 - https://www.exploit-db.com/exploits/43236/ +CVE-2017-14743 - https://medium.com/iotsploit/faleemi-fsc-880-multiple-security-vulnerabilities-ed1d132c2cce +CVE-2017-14745 - https://sourceware.org/bugzilla/show_bug.cgi?id=22148 +CVE-2017-14748 - https://us.battle.net/forums/en/overwatch/topic/20759216554 +CVE-2017-14749 - https://github.com/jerryscript-project/jerryscript/issues/2008 +CVE-2017-14757 - https://www.exploit-db.com/exploits/42939/ +CVE-2017-14758 - https://www.exploit-db.com/exploits/42940/ +CVE-2017-14766 - https://limbenjamin.com/articles/simple-student-result-auth-bypass.html +CVE-2017-14766 - https://wpvulndb.com/vulnerabilities/8920 +CVE-2017-14767 - https://github.com/FFmpeg/FFmpeg/commit/c42a1388a6d1bfd8001bf6a4241d8ca27e49326d +CVE-2017-14770 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf +CVE-2017-14771 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf +CVE-2017-14772 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf +CVE-2017-14773 - https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Product_Security_Advisory_9_28_17.pdf +CVE-2017-14795 - https://github.com/leonzhao7/vulnerability/blob/master/An%20Out-of-Bounds%20Read%20%28DoS%29%20Vulnerability%20in%20hevc.c%20of%20libbpg.md +CVE-2017-14796 - https://github.com/leonzhao7/vulnerability/blob/master/An%20integer%20underflow%20vulnerability%20in%20sao_filter_CTB%20of%20libbpg.md +CVE-2017-14798 - https://bugzilla.suse.com/show_bug.cgi?id=1062722 +CVE-2017-14798 - https://www.exploit-db.com/exploits/45184/ +CVE-2017-14838 - https://www.exploit-db.com/exploits/42795/ +CVE-2017-14839 - https://www.exploit-db.com/exploits/42797/ +CVE-2017-14840 - https://www.exploit-db.com/exploits/42796/ +CVE-2017-14841 - https://www.exploit-db.com/exploits/42799/ +CVE-2017-14842 - https://www.exploit-db.com/exploits/42798/ +CVE-2017-14843 - https://www.exploit-db.com/exploits/42804/ +CVE-2017-14844 - https://www.exploit-db.com/exploits/42801/ +CVE-2017-14845 - https://www.exploit-db.com/exploits/42800/ +CVE-2017-14846 - https://www.exploit-db.com/exploits/42802/ +CVE-2017-14847 - https://www.exploit-db.com/exploits/42805/ +CVE-2017-14848 - https://wpvulndb.com/vulnerabilities/8929 +CVE-2017-14848 - https://www.exploit-db.com/exploits/42924/ +CVE-2017-14857 - https://bugzilla.redhat.com/show_bug.cgi?id=1495043 +CVE-2017-14858 - https://bugzilla.redhat.com/show_bug.cgi?id=1494782 +CVE-2017-14859 - https://bugzilla.redhat.com/show_bug.cgi?id=1494780 +CVE-2017-14860 - https://bugzilla.redhat.com/show_bug.cgi?id=1494776 +CVE-2017-14861 - https://bugzilla.redhat.com/show_bug.cgi?id=1494787 +CVE-2017-14862 - https://bugzilla.redhat.com/show_bug.cgi?id=1494786 +CVE-2017-14863 - https://bugzilla.redhat.com/show_bug.cgi?id=1494443 +CVE-2017-14864 - https://bugzilla.redhat.com/show_bug.cgi?id=1494467 +CVE-2017-14865 - https://bugzilla.redhat.com/show_bug.cgi?id=1494778 +CVE-2017-14866 - https://bugzilla.redhat.com/show_bug.cgi?id=1494781 +CVE-2017-14904 - https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html +CVE-2017-14926 - https://bugs.freedesktop.org/show_bug.cgi?id=102601 +CVE-2017-14927 - https://bugs.freedesktop.org/show_bug.cgi?id=102604 +CVE-2017-14928 - https://bugs.freedesktop.org/show_bug.cgi?id=102607 +CVE-2017-14929 - https://bugs.freedesktop.org/show_bug.cgi?id=102969 +CVE-2017-14930 - https://sourceware.org/bugzilla/show_bug.cgi?id=22191 +CVE-2017-14931 - http://seclists.org/fulldisclosure/2017/Sep/34 +CVE-2017-14931 - https://github.com/skysider/openexif_vulnerabilities +CVE-2017-14932 - https://sourceware.org/bugzilla/show_bug.cgi?id=22204 +CVE-2017-14933 - https://sourceware.org/bugzilla/show_bug.cgi?id=22210 +CVE-2017-14934 - https://sourceware.org/bugzilla/show_bug.cgi?id=22219 +CVE-2017-14937 - https://www.researchgate.net/publication/321183727_Security_Evaluation_of_an_Airbag-ECU_by_Reusing_Threat_Modeling_Artefacts +CVE-2017-14938 - http://www.securityfocus.com/bid/101212 +CVE-2017-14938 - https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/ +CVE-2017-14939 - https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/ +CVE-2017-14939 - https://www.exploit-db.com/exploits/42970/ +CVE-2017-14940 - https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/ +CVE-2017-14942 - https://www.exploit-db.com/exploits/42916/ +CVE-2017-14945 - https://bugs.ghostscript.com/show_bug.cgi?id=698537 +CVE-2017-14946 - https://bugs.ghostscript.com/show_bug.cgi?id=698538 +CVE-2017-14947 - https://bugs.ghostscript.com/show_bug.cgi?id=698551 +CVE-2017-14952 - http://bugs.icu-project.org/trac/changeset/40324/trunk/icu4c/source/i18n/zonemeta.cpp +CVE-2017-14953 - http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html +CVE-2017-14955 - https://www.exploit-db.com/exploits/43021/ +CVE-2017-14956 - http://packetstormsecurity.com/files/144617/AlienVault-USM-5.4.2-Cross-Site-Request-Forgery.html +CVE-2017-14956 - https://www.exploit-db.com/exploits/42988/ +CVE-2017-14960 - http://seclists.org/fulldisclosure/2018/Jan/6 +CVE-2017-14960 - https://www.exploit-db.com/exploits/43422/ +CVE-2017-14961 - http://packetstormsecurity.com/files/144955/IKARUS-AntiVirus-2.16.7-Privilege-Escalation.html +CVE-2017-14961 - https://www.exploit-db.com/exploits/43139/ +CVE-2017-14977 - https://bugs.freedesktop.org/show_bug.cgi?id=103045 +CVE-2017-14979 - https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php +CVE-2017-14980 - http://packetstormsecurity.com/files/144452/Sync-Breeze-Enterprise-10.0.28-Buffer-Overflow.html +CVE-2017-14981 - https://github.com/atutor/ATutor/issues/135 +CVE-2017-14988 - https://github.com/openexr/openexr/issues/248 +CVE-2017-14994 - https://nandynarwhals.org/CVE-2017-14994/ +CVE-2017-14994 - https://sourceforge.net/p/graphicsmagick/bugs/512/ +CVE-2017-15008 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b +CVE-2017-15009 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b +CVE-2017-15011 - https://hackinparis.com/data/slides/2017/2017_Cohen_Gil_The_forgotten_interface_Windows_named_pipes.pdf +CVE-2017-15011 - https://www.youtube.com/watch?v=m6zISgWPGGY +CVE-2017-15012 - https://www.exploit-db.com/exploits/43003/ +CVE-2017-15013 - https://www.exploit-db.com/exploits/43004/ +CVE-2017-15014 - https://www.exploit-db.com/exploits/43005/ +CVE-2017-15020 - https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/ +CVE-2017-15021 - https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/ +CVE-2017-15022 - https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/ +CVE-2017-15023 - https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/ +CVE-2017-15024 - https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/ +CVE-2017-15025 - https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/ +CVE-2017-15035 - https://www.7elements.co.uk/resources/technical-advisories/pyrobatchftp-buffer-overflow-seh-overwrite/ +CVE-2017-15035 - https://www.exploit-db.com/exploits/42962/ +CVE-2017-15043 - https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/swi-psa-2018-003-technical-bulletin-reaper/ +CVE-2017-15045 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-15045 +CVE-2017-15048 - http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html +CVE-2017-15048 - https://www.exploit-db.com/exploits/43355/ +CVE-2017-15049 - http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html +CVE-2017-15049 - http://seclists.org/fulldisclosure/2017/Dec/47 +CVE-2017-15049 - https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt +CVE-2017-15049 - https://www.exploit-db.com/exploits/43354/ +CVE-2017-15051 - http://blog.amossys.fr/teampass-multiple-cve-01.html +CVE-2017-15052 - http://blog.amossys.fr/teampass-multiple-cve-01.html +CVE-2017-15053 - http://blog.amossys.fr/teampass-multiple-cve-01.html +CVE-2017-15054 - http://blog.amossys.fr/teampass-multiple-cve-01.html +CVE-2017-15055 - http://blog.amossys.fr/teampass-multiple-cve-01.html +CVE-2017-15056 - https://github.com/upx/upx/issues/128 +CVE-2017-15063 - https://github.com/intelliants/subrion/issues/570 +CVE-2017-15081 - http://w00troot.blogspot.in/2017/10/php-melody-2.html +CVE-2017-15081 - https://www.exploit-db.com/exploits/43062/ +CVE-2017-15095 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-15095 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-15095 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-15095 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-15102 - https://usn.ubuntu.com/3583-2/ +CVE-2017-15115 - https://usn.ubuntu.com/3581-1/ +CVE-2017-15115 - https://usn.ubuntu.com/3582-1/ +CVE-2017-15115 - https://usn.ubuntu.com/3583-2/ +CVE-2017-15118 - https://www.exploit-db.com/exploits/43194/ +CVE-2017-15130 - https://usn.ubuntu.com/3587-2/ +CVE-2017-15134 - https://pagure.io/389-ds-base/c/6aa2acdc3cad9 +CVE-2017-1515 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-1516 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-15185 - http://seclists.org/fulldisclosure/2017/Jul/82 +CVE-2017-15185 - https://www.exploit-db.com/exploits/42399/ +CVE-2017-15216 - https://www.misp.software/Changelog.txt +CVE-2017-15218 - http://www.securityfocus.com/bid/101233 +CVE-2017-15220 - https://www.exploit-db.com/exploits/42973/ +CVE-2017-15221 - http://packetstormsecurity.com/files/144590/ASX-To-MP3-3.1.3.7-Buffer-Overflow.html +CVE-2017-15221 - http://packetstormsecurity.com/files/154788/ASX-To-MP3-Converter-3.1.3.7-Stack-Overflow.html +CVE-2017-15221 - https://www.exploit-db.com/exploits/42974/ +CVE-2017-15222 - https://www.exploit-db.com/exploits/43025/ +CVE-2017-15222 - https://www.exploit-db.com/exploits/43448/ +CVE-2017-15222 - https://www.exploit-db.com/exploits/46070/ +CVE-2017-15223 - https://www.exploit-db.com/exploits/43026/ +CVE-2017-15225 - https://sourceware.org/bugzilla/show_bug.cgi?id=22212 +CVE-2017-15232 - https://github.com/mozilla/mozjpeg/issues/268 +CVE-2017-15265 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-15265 - https://usn.ubuntu.com/3698-1/ +CVE-2017-15265 - https://usn.ubuntu.com/3698-2/ +CVE-2017-15265 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-15266 - https://bugzilla.redhat.com/show_bug.cgi?id=1499599 +CVE-2017-15267 - https://bugzilla.redhat.com/show_bug.cgi?id=1499600 +CVE-2017-15269 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html +CVE-2017-15270 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html +CVE-2017-15270 - https://www.exploit-db.com/exploits/43144/ +CVE-2017-15271 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html +CVE-2017-15271 - https://www.exploit-db.com/exploits/43144/ +CVE-2017-15272 - http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html +CVE-2017-15274 - https://usn.ubuntu.com/3583-2/ +CVE-2017-15276 - https://www.exploit-db.com/exploits/43002/ +CVE-2017-15277 - https://hackerone.com/reports/302885 +CVE-2017-15284 - https://packetstormsecurity.com/files/144587/OctoberCMS-1.0.425-Cross-Site-Scripting.html +CVE-2017-15284 - https://www.exploit-db.com/exploits/42978/ +CVE-2017-15286 - https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md +CVE-2017-15287 - https://www.exploit-db.com/exploits/42986/ +CVE-2017-15288 - https://github.com/scala/scala/pull/6108 +CVE-2017-15291 - https://www.exploit-db.com/exploits/43023/ +CVE-2017-15293 - https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/ +CVE-2017-15295 - https://erpscan.io/advisories/erpscan-17-033-sap-pos-missing-authentication-xpressserver/ +CVE-2017-15296 - https://erpscan.io/advisories/erpscan-17-036-csrf-sap-java-crm/ +CVE-2017-15305 - https://github.com/C0der1iu/Nexusphppoc/blob/master/xss2.txt +CVE-2017-15312 - http://www.huawei.com/en/psirt/security-notices/huawei-sn-20171201-01-smartcare-en +CVE-2017-15313 - http://www.huawei.com/en/psirt/security-notices/huawei-sn-20171201-01-smartcare-en +CVE-2017-1532 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-15357 - https://www.exploit-db.com/exploits/43218/ +CVE-2017-15358 - https://www.exploit-db.com/exploits/45107/ +CVE-2017-15359 - https://www.exploit-db.com/exploits/42991/ +CVE-2017-15360 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b +CVE-2017-15361 - https://www.kb.cert.org/vuls/id/307015 +CVE-2017-15363 - https://extensions.typo3.org/extension/download/restler/1.7.1/zip/ +CVE-2017-15365 - https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/ +CVE-2017-15367 - https://www.exploit-db.com/exploits/44272/ +CVE-2017-15369 - https://bugs.ghostscript.com/show_bug.cgi?id=698592 +CVE-2017-15370 - https://bugzilla.redhat.com/show_bug.cgi?id=1500554 +CVE-2017-15371 - https://bugzilla.redhat.com/show_bug.cgi?id=1500570 +CVE-2017-15372 - https://bugzilla.redhat.com/show_bug.cgi?id=1500553 +CVE-2017-15373 - https://www.exploit-db.com/exploits/42979/ +CVE-2017-15374 - https://www.exploit-db.com/exploits/43849/ +CVE-2017-15374 - https://www.vulnerability-lab.com/get_content.php?id=1922 +CVE-2017-15375 - https://www.vulnerability-lab.com/get_content.php?id=1941 +CVE-2017-15376 - https://www.vulnerability-lab.com/get_content.php?id=2097 +CVE-2017-15378 - https://www.exploit-db.com/exploits/42981/ +CVE-2017-15379 - https://www.exploit-db.com/exploits/42980/ +CVE-2017-15380 - https://www.exploit-db.com/exploits/42983/ +CVE-2017-15381 - https://www.exploit-db.com/exploits/42982/ +CVE-2017-15383 - https://cxsecurity.com/issue/WLB-2016110092 +CVE-2017-15383 - https://packetstormsecurity.com/files/139658/Nero-7.10.1.0-Privilege-Escalation.html +CVE-2017-15384 - https://cxsecurity.com/issue/WLB-2016110122 +CVE-2017-15384 - https://packetstormsecurity.com/files/139696/ratemephp-xss.txt +CVE-2017-15396 - http://bugs.icu-project.org/trac/changeset/40494 +CVE-2017-1540 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-1545 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-1546 - http://www.ibm.com/support/docview.wss?uid=swg22010321 +CVE-2017-15539 - https://github.com/imsebao/404team/blob/master/zorovavi-blog-sql-injection.md +CVE-2017-15565 - https://bugs.freedesktop.org/show_bug.cgi?id=103016 +CVE-2017-15580 - http://0day.today/exploits/28864 +CVE-2017-15580 - https://cxsecurity.com/issue/WLB-2017100187 +CVE-2017-15580 - https://packetstormsecurity.com/files/144747/osticket1101-shell.txt +CVE-2017-15580 - https://www.exploit-db.com/exploits/45169/ +CVE-2017-15588 - https://xenbits.xen.org/xsa/advisory-241.html +CVE-2017-15595 - https://www.exploit-db.com/exploits/43014/ +CVE-2017-1560 - http://www.ibm.com/support/docview.wss?uid=swg22010321 +CVE-2017-15600 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html +CVE-2017-15600 - https://bugzilla.redhat.com/show_bug.cgi?id=1501695 +CVE-2017-15601 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html +CVE-2017-15602 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html +CVE-2017-15613 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15614 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15615 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15616 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15617 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15618 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15619 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15620 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15621 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15622 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15623 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15624 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15625 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15626 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15627 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15628 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15629 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-1563 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-15630 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15631 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15632 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15633 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15634 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15635 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15636 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15637 - https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +CVE-2017-15639 - https://www.exploit-db.com/exploits/43045/ +CVE-2017-15642 - https://sourceforge.net/p/sox/bugs/297/ +CVE-2017-15649 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e +CVE-2017-15651 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b +CVE-2017-15653 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html +CVE-2017-15653 - http://seclists.org/fulldisclosure/2018/Jan/63 +CVE-2017-15654 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html +CVE-2017-15654 - http://seclists.org/fulldisclosure/2018/Jan/63 +CVE-2017-15655 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html +CVE-2017-15655 - http://seclists.org/fulldisclosure/2018/Jan/63 +CVE-2017-15655 - http://sploit.tech/2018/01/16/ASUS-part-I.html +CVE-2017-15656 - http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html +CVE-2017-15656 - http://seclists.org/fulldisclosure/2018/Jan/63 +CVE-2017-15662 - http://packetstormsecurity.com/files/145764/VX-Search-Enterprise-10.1.12-Denial-Of-Service.html +CVE-2017-15662 - https://www.exploit-db.com/exploits/43451/ +CVE-2017-15663 - http://packetstormsecurity.com/files/145763/Disk-Pulse-Enterprise-10.1.18-Denial-Of-Service.html +CVE-2017-15663 - https://www.exploit-db.com/exploits/43452/ +CVE-2017-15663 - https://www.exploit-db.com/exploits/43589/ +CVE-2017-15664 - http://packetstormsecurity.com/files/145760/Sync-Breeze-Enterprise-10.1.16-Denial-Of-Service.html +CVE-2017-15664 - https://www.exploit-db.com/exploits/43453/ +CVE-2017-15665 - http://packetstormsecurity.com/files/145756/DiskBoss-Enterprise-8.5.12-Denial-Of-Service.html +CVE-2017-15665 - https://www.exploit-db.com/exploits/43454/ +CVE-2017-15667 - https://www.exploit-db.com/exploits/43403/ +CVE-2017-1567 - http://www.ibm.com/support/docview.wss?uid=swg22012789 +CVE-2017-15673 - http://packetstormsecurity.com/files/145096/CSC-Cart-4.6.2-Shell-Upload.html +CVE-2017-15680 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15681 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15682 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15683 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15684 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15685 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15686 - https://docs.craftercms.org/en/3.0/security/advisory.html +CVE-2017-15687 - https://www.exploit-db.com/exploits/43024/ +CVE-2017-15706 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-15707 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-15708 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2017-15708 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-15715 - https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html +CVE-2017-15727 - https://www.exploit-db.com/exploits/43063/ +CVE-2017-15730 - https://www.exploit-db.com/exploits/43064/ +CVE-2017-15805 - https://www.fwhibbit.es/lfi-en-cisco-small-business-sa500-series-cuando-la-seguridad-de-tu-red-esta-hecha-un-cisco +CVE-2017-15806 - https://www.exploit-db.com/exploits/43155/ +CVE-2017-15810 - https://packetstormsecurity.com/files/144583/WordPress-PopCash.Net-Publisher-Code-Integration-1.0-Cross-Site-Scripting.html +CVE-2017-15810 - https://wpvulndb.com/vulnerabilities/8936 +CVE-2017-15811 - https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html +CVE-2017-15811 - https://wpvulndb.com/vulnerabilities/8930 +CVE-2017-15812 - https://wpvulndb.com/vulnerabilities/8937 +CVE-2017-15841 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-15867 - https://wpvulndb.com/vulnerabilities/8939 +CVE-2017-15868 - https://usn.ubuntu.com/3583-2/ +CVE-2017-15878 - https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html +CVE-2017-15878 - https://www.exploit-db.com/exploits/43054/ +CVE-2017-15879 - https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html +CVE-2017-15879 - https://www.exploit-db.com/exploits/43053/ +CVE-2017-15883 - https://knowledgebase.progress.com/articles/Article/Sitefinity-Security-Advisory-for-cryptographic-vulnerability-CVE-2017-15883 +CVE-2017-15884 - https://www.exploit-db.com/exploits/43222/ +CVE-2017-15885 - https://distributedcompute.com/2017/10/24/axis-2100-network-camera-2-03-xss-vulnerability/ +CVE-2017-15889 - http://packetstormsecurity.com/files/157807/Synology-DiskStation-Manager-smart.cgi-Remote-Command-Execution.html +CVE-2017-15895 - https://www.synology.com/en-global/support/security/Synology_SA_17_71_SRM +CVE-2017-15906 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2017-15911 - https://issues.igniterealtime.org/browse/OF-1417 +CVE-2017-15917 - https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b +CVE-2017-15918 - https://www.exploit-db.com/exploits/43221/ +CVE-2017-15919 - https://wpvulndb.com/vulnerabilities/8935 +CVE-2017-15920 - http://packetstormsecurity.com/files/144786/Watchdog-Development-Anti-Malware-Online-Security-Pro-NULL-Pointer-Dereference.html +CVE-2017-15920 - https://www.exploit-db.com/exploits/43058/ +CVE-2017-15921 - http://packetstormsecurity.com/files/144786/Watchdog-Development-Anti-Malware-Online-Security-Pro-NULL-Pointer-Dereference.html +CVE-2017-15921 - https://www.exploit-db.com/exploits/43058/ +CVE-2017-15922 - http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html +CVE-2017-15924 - http://openwall.com/lists/oss-security/2017/10/13/2 +CVE-2017-15924 - https://github.com/shadowsocks/shadowsocks-libev/issues/1734 +CVE-2017-15924 - https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/ +CVE-2017-15928 - https://github.com/ohler55/ox/issues/194 +CVE-2017-1593 - http://www.ibm.com/support/docview.wss?uid=swg22010321 +CVE-2017-15931 - https://github.com/radare/radare2/issues/8731 +CVE-2017-15932 - https://github.com/radare/radare2/issues/8743 +CVE-2017-15934 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d +CVE-2017-15935 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d +CVE-2017-15936 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d +CVE-2017-15937 - https://medium.com/stolabs/security-issue-on-pandora-fms-enterprise-be630059a72d +CVE-2017-15938 - https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/ +CVE-2017-15939 - https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/ +CVE-2017-15944 - https://www.exploit-db.com/exploits/43342/ +CVE-2017-15944 - https://www.exploit-db.com/exploits/44597/ +CVE-2017-15946 - https://www.vulnerability-lab.com/get_content.php?id=2061 +CVE-2017-15947 - https://www.vulnerability-lab.com/get_content.php?id=2072 +CVE-2017-15948 - https://www.vulnerability-lab.com/get_content.php?id=2067 +CVE-2017-15949 - https://www.vulnerability-lab.com/get_content.php?id=2076 +CVE-2017-15950 - http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html +CVE-2017-15953 - https://github.com/extramaster/bchunk/issues/2 +CVE-2017-15954 - https://github.com/extramaster/bchunk/issues/3 +CVE-2017-15955 - https://github.com/extramaster/bchunk/issues/4 +CVE-2017-15956 - https://packetstormsecurity.com/files/144456/ConverTo-Video-Downloader-And-Converter-1.4.1-Arbitrary-File-Download.html +CVE-2017-15957 - https://packetstormsecurity.com/files/144431/Ingenious-School-Management-System-2.3.0-Arbitrary-File-Upload.html +CVE-2017-15957 - https://www.exploit-db.com/exploits/43102/ +CVE-2017-15958 - https://packetstormsecurity.com/files/144430/D-Park-Pro-Domain-Parking-Script-1.0-SQL-Injection.html +CVE-2017-15958 - https://www.exploit-db.com/exploits/43101/ +CVE-2017-15959 - https://packetstormsecurity.com/files/144428/Adult-Script-Pro-2.2.4-SQL-Injection.html +CVE-2017-15959 - https://www.exploit-db.com/exploits/43100/ +CVE-2017-15960 - https://packetstormsecurity.com/files/144429/Article-Directory-Script-3.0-SQL-Injection.html +CVE-2017-15960 - https://www.exploit-db.com/exploits/43099/ +CVE-2017-15961 - https://packetstormsecurity.com/files/144432/iProject-Management-System-1.0-SQL-Injection.html +CVE-2017-15961 - https://www.exploit-db.com/exploits/43098/ +CVE-2017-15962 - https://packetstormsecurity.com/files/144433/iStock-Management-System-1.0-Arbitrary-File-Upload.html +CVE-2017-15962 - https://www.exploit-db.com/exploits/43097/ +CVE-2017-15963 - https://packetstormsecurity.com/files/144434/iTech-Gigs-Script-1.21-SQL-Injection.html +CVE-2017-15963 - https://www.exploit-db.com/exploits/43096/ +CVE-2017-15964 - https://packetstormsecurity.com/files/144082/Job-Board-Software-1.0-SQL-Injection.html +CVE-2017-15964 - https://www.exploit-db.com/exploits/43095/ +CVE-2017-15965 - https://packetstormsecurity.com/files/144435/Joomla-NS-Download-Shop-2.2.6-SQL-Injection.html +CVE-2017-15965 - https://www.exploit-db.com/exploits/43094/ +CVE-2017-15966 - https://packetstormsecurity.com/files/144436/Joomla-Zh-YandexMap-6.1.1.0-SQL-Injection.html +CVE-2017-15966 - https://www.exploit-db.com/exploits/43093/ +CVE-2017-15967 - https://packetstormsecurity.com/files/144437/Mailing-List-Manager-Pro-3.0-SQL-Injection.html +CVE-2017-15967 - https://www.exploit-db.com/exploits/43092/ +CVE-2017-15968 - https://packetstormsecurity.com/files/144438/MyBuilder-Clone-1.0-SQL-Injection.html +CVE-2017-15968 - https://www.exploit-db.com/exploits/43091/ +CVE-2017-15969 - https://packetstormsecurity.com/files/144439/PG-All-Share-Video-1.0-SQL-Injection.html +CVE-2017-15969 - https://www.exploit-db.com/exploits/43090/ +CVE-2017-15970 - https://packetstormsecurity.com/files/144440/PHP-CityPortal-2.0-SQL-Injection.html +CVE-2017-15970 - https://www.exploit-db.com/exploits/43089/ +CVE-2017-15971 - https://packetstormsecurity.com/files/144441/Same-Sex-Dating-Software-Pro-1.0-SQL-Injection.html +CVE-2017-15971 - https://www.exploit-db.com/exploits/43088/ +CVE-2017-15972 - https://packetstormsecurity.com/files/144442/SoftDatepro-Dating-Social-Network-1.3-SQL-Injection.html +CVE-2017-15972 - https://www.exploit-db.com/exploits/43087/ +CVE-2017-15973 - https://packetstormsecurity.com/files/144443/Sokial-Social-Network-Script-1.0-SQL-Injection.html +CVE-2017-15973 - https://www.exploit-db.com/exploits/43086/ +CVE-2017-15974 - https://packetstormsecurity.com/files/144444/tPanel-2009-SQL-Injection.html +CVE-2017-15974 - https://www.exploit-db.com/exploits/43085/ +CVE-2017-15975 - https://packetstormsecurity.com/files/144445/Vastal-I-Tech-Dating-Zone-0.9.9-SQL-Injection.html +CVE-2017-15975 - https://www.exploit-db.com/exploits/43084/ +CVE-2017-15976 - https://packetstormsecurity.com/files/144446/ZeeBuddy-2x-SQL-Injection.html +CVE-2017-15976 - https://www.exploit-db.com/exploits/43083/ +CVE-2017-15977 - https://www.exploit-db.com/exploits/43082/ +CVE-2017-15978 - https://www.exploit-db.com/exploits/43081/ +CVE-2017-15979 - https://www.exploit-db.com/exploits/43080/ +CVE-2017-15980 - https://www.exploit-db.com/exploits/43079/ +CVE-2017-15981 - https://www.exploit-db.com/exploits/43078/ +CVE-2017-15982 - https://www.exploit-db.com/exploits/43077/ +CVE-2017-15983 - https://www.exploit-db.com/exploits/43076/ +CVE-2017-15984 - https://www.exploit-db.com/exploits/43075/ +CVE-2017-15985 - https://www.exploit-db.com/exploits/43074/ +CVE-2017-15986 - https://www.exploit-db.com/exploits/43073/ +CVE-2017-15987 - https://www.exploit-db.com/exploits/43072/ +CVE-2017-15988 - https://www.exploit-db.com/exploits/43071/ +CVE-2017-15989 - https://www.exploit-db.com/exploits/43070/ +CVE-2017-15990 - https://www.exploit-db.com/exploits/43069/ +CVE-2017-15991 - https://www.exploit-db.com/exploits/43068/ +CVE-2017-15992 - https://www.exploit-db.com/exploits/43067/ +CVE-2017-15993 - https://www.exploit-db.com/exploits/43066/ +CVE-2017-16001 - https://www.exploit-db.com/exploits/43220/ +CVE-2017-16007 - http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html +CVE-2017-16010 - https://github.com/i18next/i18next/pull/826 +CVE-2017-16013 - https://github.com/hapijs/hapi/issues/3466 +CVE-2017-16016 - https://github.com/punkave/sanitize-html/issues/100 +CVE-2017-16018 - https://github.com/restify/node-restify/issues/1018 +CVE-2017-16026 - https://github.com/request/request/issues/1904 +CVE-2017-16036 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server +CVE-2017-16037 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy +CVE-2017-16039 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp +CVE-2017-16083 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router +CVE-2017-16084 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream +CVE-2017-16085 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2 +CVE-2017-16088 - https://github.com/hacksparrow/safe-eval/issues/5 +CVE-2017-16089 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr +CVE-2017-16090 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fsk-server +CVE-2017-16092 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho +CVE-2017-16093 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js +CVE-2017-16094 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-http +CVE-2017-16095 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1 +CVE-2017-16096 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan +CVE-2017-16097 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http +CVE-2017-16100 - https://github.com/skoranga/node-dns-sync/issues/5 +CVE-2017-16101 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg +CVE-2017-16102 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui +CVE-2017-16103 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt +CVE-2017-16104 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/citypredict.whauwiller +CVE-2017-16105 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl +CVE-2017-16106 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock +CVE-2017-16107 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket +CVE-2017-16108 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server +CVE-2017-16109 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick +CVE-2017-16110 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons +CVE-2017-16114 - https://github.com/chjj/marked/issues/937 +CVE-2017-16120 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing +CVE-2017-16121 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/datachannel-client +CVE-2017-16122 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci +CVE-2017-16123 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket +CVE-2017-16124 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront +CVE-2017-16125 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/rtcmulticonnection-client +CVE-2017-16130 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx +CVE-2017-16131 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list +CVE-2017-16132 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry +CVE-2017-16133 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv +CVE-2017-16134 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple +CVE-2017-16135 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy +CVE-2017-16139 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jikes +CVE-2017-16140 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95 +CVE-2017-16141 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu +CVE-2017-16142 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver +CVE-2017-16143 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood +CVE-2017-16144 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/myserver.alexcthomas18 +CVE-2017-16145 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa +CVE-2017-16146 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve +CVE-2017-16147 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server +CVE-2017-16148 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46 +CVE-2017-16149 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver +CVE-2017-16150 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123 +CVE-2017-16152 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server +CVE-2017-16153 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan +CVE-2017-16154 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird +CVE-2017-16155 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli +CVE-2017-16156 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz +CVE-2017-16157 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr +CVE-2017-16158 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http +CVE-2017-16159 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode +CVE-2017-16160 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli +CVE-2017-16161 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru +CVE-2017-16162 - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian +CVE-2017-16163 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo +CVE-2017-16164 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio +CVE-2017-16165 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server +CVE-2017-16166 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix +CVE-2017-16167 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack +CVE-2017-16168 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve +CVE-2017-16169 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake +CVE-2017-16170 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver +CVE-2017-16171 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver +CVE-2017-16172 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12 +CVE-2017-16173 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder +CVE-2017-16174 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast +CVE-2017-16175 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6 +CVE-2017-16176 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework +CVE-2017-16177 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista +CVE-2017-16178 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package +CVE-2017-16179 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio +CVE-2017-16180 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc +CVE-2017-16181 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev +CVE-2017-16182 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx +CVE-2017-16183 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server +CVE-2017-16184 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app +CVE-2017-16185 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server +CVE-2017-16186 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm +CVE-2017-16187 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device +CVE-2017-16188 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver +CVE-2017-16189 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sly07 +CVE-2017-16190 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc +CVE-2017-16191 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver +CVE-2017-16192 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne +CVE-2017-16193 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs +CVE-2017-16194 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard +CVE-2017-16195 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce +CVE-2017-16196 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver +CVE-2017-16197 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve +CVE-2017-16198 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp +CVE-2017-16199 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum +CVE-2017-16200 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo +CVE-2017-16201 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver +CVE-2017-16208 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6 +CVE-2017-16209 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver +CVE-2017-16210 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server +CVE-2017-16211 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex +CVE-2017-16212 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt +CVE-2017-16213 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver +CVE-2017-16214 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver +CVE-2017-16215 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve +CVE-2017-16216 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server +CVE-2017-16217 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client +CVE-2017-16218 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6 +CVE-2017-16219 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy +CVE-2017-16220 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc +CVE-2017-16221 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt +CVE-2017-16222 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding +CVE-2017-16223 - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa +CVE-2017-16229 - https://github.com/ohler55/ox/issues/195 +CVE-2017-16231 - http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html +CVE-2017-16231 - http://seclists.org/fulldisclosure/2018/Dec/33 +CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/11 +CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/3 +CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/7 +CVE-2017-16231 - http://www.openwall.com/lists/oss-security/2017/11/01/8 +CVE-2017-16232 - http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html +CVE-2017-16232 - http://seclists.org/fulldisclosure/2018/Dec/32 +CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/11 +CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/3 +CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/7 +CVE-2017-16232 - http://www.openwall.com/lists/oss-security/2017/11/01/8 +CVE-2017-16237 - https://www.exploit-db.com/exploits/43109/ +CVE-2017-16244 - https://www.exploit-db.com/exploits/43106/ +CVE-2017-16249 - http://packetstormsecurity.com/files/144908/Debut-Embedded-httpd-1.20-Denial-Of-Service.html +CVE-2017-16249 - https://www.exploit-db.com/exploits/43119/ +CVE-2017-16249 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2017-017/?fid=10211 +CVE-2017-16249 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Denial-of-Service-Vulnerability-in-Brother-Printers/?page=1&year=0&month=0&LangType=1033 +CVE-2017-16252 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16253 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16254 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16255 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16256 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16257 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16258 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16259 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16260 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16261 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16262 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16263 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16264 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16265 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16266 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16267 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16268 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16269 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16270 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16271 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16272 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16273 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16274 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16275 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16276 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16277 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16278 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16279 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16280 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16281 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16282 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16283 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16284 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16285 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16286 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16287 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16288 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16289 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16290 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16291 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16292 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16293 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16294 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16295 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16296 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16297 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16298 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16299 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16300 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16301 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16302 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16303 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16304 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16305 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16306 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16307 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16308 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16309 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16310 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16311 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16312 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16313 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16314 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16315 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16316 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16317 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16318 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16319 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16320 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16321 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16322 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16323 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16324 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16325 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16326 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16327 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16328 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16329 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16330 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16331 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16332 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16333 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16334 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16335 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16336 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16337 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483 +CVE-2017-16338 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16339 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16340 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16341 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16342 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16343 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16344 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16345 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16346 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16347 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484 +CVE-2017-16348 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0485 +CVE-2017-16352 - https://www.exploit-db.com/exploits/43111/ +CVE-2017-16353 - https://www.exploit-db.com/exploits/43111/ +CVE-2017-16356 - http://packetstormsecurity.com/files/146422/Joomla-Kubik-Rubik-SIGE-3.2.3-Cross-Site-Scripting.html +CVE-2017-16356 - https://www.exploit-db.com/exploits/44104/ +CVE-2017-16357 - https://github.com/radare/radare2/issues/8742 +CVE-2017-16358 - https://github.com/radare/radare2/issues/8748 +CVE-2017-16510 - https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html +CVE-2017-16513 - https://www.7elements.co.uk/resources/technical-advisories/ipswitch-ws_ftp-professional-local-buffer-overflow-seh-overwrite/ +CVE-2017-16513 - https://www.exploit-db.com/exploits/43115/ +CVE-2017-16516 - https://github.com/brianmario/yajl-ruby/issues/176 +CVE-2017-16522 - https://packetstormsecurity.com/files/144805/MitraStar-DSL-100HN-T1-GPT-2541GNAC-Privilege-Escalation.html +CVE-2017-16522 - https://www.exploit-db.com/exploits/43061/ +CVE-2017-16523 - https://packetstormsecurity.com/files/144805/MitraStar-DSL-100HN-T1-GPT-2541GNAC-Privilege-Escalation.html +CVE-2017-16523 - https://www.exploit-db.com/exploits/43061/ +CVE-2017-16524 - https://github.com/realistic-security/CVE-2017-16524 +CVE-2017-16524 - https://www.exploit-db.com/exploits/43138/ +CVE-2017-16525 - https://usn.ubuntu.com/3583-2/ +CVE-2017-16530 - https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ +CVE-2017-16531 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-16541 - https://bugzilla.mozilla.org/show_bug.cgi?id=1412081 +CVE-2017-16541 - https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/ +CVE-2017-16542 - http://code610.blogspot.com/2017/11/sql-injection-in-manageengine.html +CVE-2017-16542 - https://www.exploit-db.com/exploits/43129/ +CVE-2017-16543 - http://code610.blogspot.com/2017/11/sql-injection-in-manageengine.html +CVE-2017-16543 - https://www.exploit-db.com/exploits/43129/ +CVE-2017-16544 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2017-16544 - http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html +CVE-2017-16544 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html +CVE-2017-16544 - http://seclists.org/fulldisclosure/2019/Jun/18 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2020/Mar/15 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2020/Sep/6 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2021/Aug/21 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2021/Jan/39 +CVE-2017-16544 - http://seclists.org/fulldisclosure/2022/Jun/36 +CVE-2017-16544 - https://seclists.org/bugtraq/2019/Jun/14 +CVE-2017-16544 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2017-16560 - https://medium.com/@esterling_/cve-2017-16560-sandisk-secure-access-leaves-plain-text-copies-of-files-on-disk-4eabeca6bdbc +CVE-2017-16561 - https://www.exploit-db.com/exploits/43108/ +CVE-2017-16562 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681?s_rank=9 +CVE-2017-16562 - https://wpvulndb.com/vulnerabilities/8950 +CVE-2017-16562 - https://www.exploit-db.com/exploits/43117/ +CVE-2017-16563 - https://distributedcompute.com/2017/11/04/vonage-ht802-multiple-vulnerabilities/ +CVE-2017-16564 - https://distributedcompute.com/2017/11/04/vonage-ht802-multiple-vulnerabilities/ +CVE-2017-16565 - https://distributedcompute.com/2017/11/04/vonage-ht802-multiple-vulnerabilities/ +CVE-2017-16566 - https://siggyd.github.io/Advisories/CVE-2017-16566 +CVE-2017-16567 - https://www.exploit-db.com/exploits/43122/ +CVE-2017-16568 - https://www.exploit-db.com/exploits/43123/ +CVE-2017-16570 - https://www.exploit-db.com/exploits/43922/ +CVE-2017-16607 - https://www.tenable.com/security/research/tra-2018-02 +CVE-2017-16608 - https://www.tenable.com/security/research/tra-2018-02 +CVE-2017-16609 - https://www.tenable.com/security/research/tra-2018-02 +CVE-2017-16610 - https://www.tenable.com/security/research/tra-2018-02 +CVE-2017-16615 - https://github.com/thanethomson/MLAlchemy/issues/1 +CVE-2017-16615 - https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/ +CVE-2017-16616 - https://github.com/Stranger6667/pyanyapi/issues/41 +CVE-2017-16616 - https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparser-in-pyanyapi/ +CVE-2017-16618 - https://github.com/tadashi-aikawa/owlmixin/issues/12 +CVE-2017-16618 - https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/ +CVE-2017-16629 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16629-sapphireims-login-page-information-disclosure/ +CVE-2017-16630 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16630-sapphireims-idor-based-privilege-elevation/ +CVE-2017-16631 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16631-sapphireims-idor-on-password-reset/ +CVE-2017-16632 - https://vuln.shellcoder.party/2020/07/18/cve-2017-16632-sapphireims-insecure-storage-of-password/ +CVE-2017-16635 - https://www.vulnerability-lab.com/get_content.php?id=1997 +CVE-2017-16636 - https://www.vulnerability-lab.com/get_content.php?id=2000 +CVE-2017-16637 - https://www.vulnerability-lab.com/get_content.php?id=2102 +CVE-2017-16639 - http://packetstormsecurity.com/files/149351/Tor-Browser-SMB-Deanonymization-Information-Disclosure.html +CVE-2017-16639 - https://seclists.org/bugtraq/2018/Sep/29 +CVE-2017-16639 - https://www.wearesegment.com/research/tor-browser-deanonymization-with-smb/ +CVE-2017-16641 - https://github.com/Cacti/cacti/issues/1057 +CVE-2017-16642 - https://hackerone.com/reports/283644 +CVE-2017-16642 - https://www.exploit-db.com/exploits/43133/ +CVE-2017-16649 - https://usn.ubuntu.com/3822-1/ +CVE-2017-16651 - http://packetstormsecurity.com/files/161226/Roundcube-Webmail-1.2-File-Disclosure.html +CVE-2017-16666 - http://packetstormsecurity.com/files/145639/Xplico-Remote-Code-Execution.html +CVE-2017-16666 - https://pentest.blog/advisory-xplico-unauthenticated-remote-code-execution-cve-2017-16666/ +CVE-2017-16666 - https://www.exploit-db.com/exploits/43430/ +CVE-2017-16670 - http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html +CVE-2017-16678 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16679 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16680 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16681 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16682 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16683 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16684 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16685 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16687 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16689 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16690 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16691 - https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/ +CVE-2017-16709 - http://packetstormsecurity.com/files/154362/AwindInc-SNMP-Service-Command-Injection.html +CVE-2017-16709 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2017-16711 - https://github.com/matthiaskramm/swftools/issues/46 +CVE-2017-16716 - https://www.exploit-db.com/exploits/43928/ +CVE-2017-16720 - https://www.exploit-db.com/exploits/44278/ +CVE-2017-16741 - https://cert.vde.com/en-us/advisories/vde-2017-006 +CVE-2017-16743 - https://cert.vde.com/en-us/advisories/vde-2017-006 +CVE-2017-16755 - https://ruby.sh/helpspot-disclosure-20180206.txt +CVE-2017-16756 - https://ruby.sh/helpspot-disclosure-20180206.txt +CVE-2017-16757 - https://www.vulnerability-lab.com/get_content.php?id=2062 +CVE-2017-16758 - https://packetstormsecurity.com/files/144921/WordPress-Ultimate-Instagram-Feed-1.2-Cross-Site-Scripting.html +CVE-2017-16758 - https://wpvulndb.com/vulnerabilities/8947 +CVE-2017-16763 - https://github.com/bbengfort/confire/issues/24 +CVE-2017-16763 - https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/ +CVE-2017-16764 - https://github.com/illagrenan/django-make-app/issues/5 +CVE-2017-16764 - https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16764-vulnerability-in-django-make-app/ +CVE-2017-16775 - https://www.synology.com/security/advisory/Synology_SA_18_28 +CVE-2017-16777 - https://www.exploit-db.com/exploits/43219/ +CVE-2017-16778 - https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection +CVE-2017-1678 - http://www.ibm.com/support/docview.wss?uid=swg22010321 +CVE-2017-16780 - https://www.exploit-db.com/exploits/43136/ +CVE-2017-16781 - https://www.exploit-db.com/exploits/43137/ +CVE-2017-16783 - http://packetstormsecurity.com/files/159690/CMS-Made-Simple-2.1.6-Server-Side-Template-Injection.html +CVE-2017-16783 - https://www.netsparker.com/web-applications-advisories/ns-17-032-server-side-template-injection-vulnerability-in-cms-made-simple/ +CVE-2017-16784 - https://www.netsparker.com/web-applications-advisories/ns-17-031-reflected-xss-vulnerability-in-cms-made-simple/ +CVE-2017-16785 - https://github.com/Cacti/cacti/issues/1071 +CVE-2017-16786 - http://packetstormsecurity.com/files/145388/Meinberg-LANTIME-Web-Configuration-Utility-6.16.008-Arbitrary-File-Read.html +CVE-2017-16786 - http://seclists.org/fulldisclosure/2017/Dec/50 +CVE-2017-16787 - http://seclists.org/fulldisclosure/2017/Dec/33 +CVE-2017-16787 - https://www.exploit-db.com/exploits/43332/ +CVE-2017-16788 - http://seclists.org/fulldisclosure/2017/Dec/32 +CVE-2017-16793 - https://github.com/matthiaskramm/swftools/issues/47 +CVE-2017-16794 - https://github.com/matthiaskramm/swftools/issues/50 +CVE-2017-16798 - https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20UPLOAD%20FILE%20XSS.md +CVE-2017-16799 - https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md +CVE-2017-16803 - https://bugzilla.libav.org/show_bug.cgi?id=1098 +CVE-2017-16806 - https://www.exploit-db.com/exploits/43141/ +CVE-2017-16807 - https://packetstormsecurity.com/files/144965/KirbyCMS-Cross-Site-Scripting.html +CVE-2017-16807 - https://www.exploit-db.com/exploits/43140/ +CVE-2017-16808 - http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html +CVE-2017-16808 - https://github.com/the-tcpdump-group/tcpdump/issues/645 +CVE-2017-16815 - https://packetstormsecurity.com/files/144914/WordPress-Duplicator-Migration-1.2.28-Cross-Site-Scripting.html +CVE-2017-16819 - https://www.exploit-db.com/exploits/43158/ +CVE-2017-16826 - https://sourceware.org/bugzilla/show_bug.cgi?id=22376 +CVE-2017-16827 - https://sourceware.org/bugzilla/show_bug.cgi?id=22306 +CVE-2017-16828 - https://sourceware.org/bugzilla/show_bug.cgi?id=22386 +CVE-2017-16829 - https://sourceware.org/bugzilla/show_bug.cgi?id=22307 +CVE-2017-16830 - https://sourceware.org/bugzilla/show_bug.cgi?id=22384 +CVE-2017-16831 - https://sourceware.org/bugzilla/show_bug.cgi?id=22385 +CVE-2017-16832 - https://sourceware.org/bugzilla/show_bug.cgi?id=22373 +CVE-2017-16836 - https://packetstormsecurity.com/files/134288/Arris-TG1682G-Modem-Cross-Site-Scripting.html +CVE-2017-16836 - https://www.exploit-db.com/exploits/38657/ +CVE-2017-16841 - https://www.exploit-db.com/exploits/43149/ +CVE-2017-16842 - https://packetstormsecurity.com/files/145080/WordPress-Yoast-SEO-Cross-Site-Scripting.html +CVE-2017-16843 - https://www.exploit-db.com/exploits/43150/ +CVE-2017-16846 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html +CVE-2017-16847 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html +CVE-2017-16848 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html +CVE-2017-16849 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html +CVE-2017-16850 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html +CVE-2017-16851 - http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html +CVE-2017-16860 - https://ecosystem.atlassian.net/browse/APL-1363 +CVE-2017-16867 - https://www.theverge.com/2017/11/16/16665064/amazon-key-camera-disable +CVE-2017-16867 - https://www.wired.com/story/amazon-key-flaw-let-deliverymen-disable-your-camera/ +CVE-2017-16868 - https://github.com/matthiaskramm/swftools/issues/52 +CVE-2017-16870 - https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated-ssrf +CVE-2017-16871 - https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated--upload-file-and-php-code-execution +CVE-2017-16879 - http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html +CVE-2017-16884 - http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt +CVE-2017-16884 - http://packetstormsecurity.com/files/145182/MistServer-2.12-Cross-Site-Scripting.html +CVE-2017-16884 - http://seclists.org/fulldisclosure/2017/Dec/2 +CVE-2017-16884 - https://www.exploit-db.com/exploits/43205/ +CVE-2017-16885 - https://www.exploit-db.com/exploits/43460/ +CVE-2017-16886 - https://www.exploit-db.com/exploits/43460/ +CVE-2017-16887 - https://www.exploit-db.com/exploits/43460/ +CVE-2017-16890 - https://github.com/matthiaskramm/swftools/issues/57 +CVE-2017-16893 - https://github.com/Piwigo/Piwigo/issues/804 +CVE-2017-16894 - http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html +CVE-2017-16895 - https://www.exploit-db.com/exploits/43216/ +CVE-2017-16899 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881143 +CVE-2017-16902 - https://www.exploit-db.com/exploits/43164/ +CVE-2017-16906 - http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html +CVE-2017-16907 - http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html +CVE-2017-16908 - http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html +CVE-2017-16914 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49 +CVE-2017-16921 - http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html +CVE-2017-16921 - https://www.exploit-db.com/exploits/43853/ +CVE-2017-16923 - https://github.com/Iolop/Poc/tree/master/Router/Tenda +CVE-2017-16926 - https://bugs.debian.org/882372 +CVE-2017-16928 - http://packetstormsecurity.com/files/146158/Arq-5.10-Local-Privilege-Escalation.html +CVE-2017-16928 - https://m4.rkw.io/blog/two-local-root-privesc-bugs-in-arq-backup--510.html +CVE-2017-16928 - https://www.exploit-db.com/exploits/43925/ +CVE-2017-16929 - http://www.openwall.com/lists/oss-security/2017/12/04/3 +CVE-2017-16929 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16929 +CVE-2017-16929 - https://www.exploit-db.com/exploits/43231/ +CVE-2017-16930 - http://www.openwall.com/lists/oss-security/2017/12/04/3 +CVE-2017-16930 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16930 +CVE-2017-16930 - https://www.exploit-db.com/exploits/43231/ +CVE-2017-16931 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-16936 - https://github.com/Iolop/Poc/tree/master/Router/Tenda +CVE-2017-16938 - https://sourceforge.net/p/optipng/bugs/69/ +CVE-2017-16942 - https://usn.ubuntu.com/4013-1/ +CVE-2017-16943 - http://openwall.com/lists/oss-security/2017/11/25/2 +CVE-2017-16943 - http://openwall.com/lists/oss-security/2017/11/25/3 +CVE-2017-16943 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2017-16943 - https://bugs.exim.org/show_bug.cgi?id=2199 +CVE-2017-16943 - https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944 +CVE-2017-16943 - https://hackerone.com/reports/296991 +CVE-2017-16944 - http://openwall.com/lists/oss-security/2017/11/25/2 +CVE-2017-16944 - http://openwall.com/lists/oss-security/2017/11/25/3 +CVE-2017-16944 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2017-16944 - https://bugs.exim.org/show_bug.cgi?id=2201 +CVE-2017-16944 - https://hackerone.com/reports/296994 +CVE-2017-16944 - https://www.exploit-db.com/exploits/43184/ +CVE-2017-16945 - http://packetstormsecurity.com/files/146159/Arq-5.10-Local-Privilege-Escalation.html +CVE-2017-16945 - https://m4.rkw.io/blog/two-local-root-privesc-bugs-in-arq-backup--510.html +CVE-2017-16945 - https://www.exploit-db.com/exploits/43926/ +CVE-2017-16948 - https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference1 +CVE-2017-16949 - http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html +CVE-2017-16949 - https://wpvulndb.com/vulnerabilities/8977 +CVE-2017-16949 - https://www.exploit-db.com/exploits/43324/ +CVE-2017-16951 - https://www.exploit-db.com/exploits/43186/ +CVE-2017-16952 - https://www.exploit-db.com/exploits/43185/ +CVE-2017-16953 - http://packetstormsecurity.com/files/145121/ZTE-ZXDSL-831-Unauthorized-Configuration-Access-Bypass.html +CVE-2017-16953 - https://www.exploit-db.com/exploits/43188/ +CVE-2017-16955 - https://packetstormsecurity.com/files/145059/WordPress-In-Link-1.0-SQL-Injection.html +CVE-2017-16955 - https://wpvulndb.com/vulnerabilities/8962 +CVE-2017-16961 - https://github.com/bigtreecms/BigTree-CMS/issues/323 +CVE-2017-16962 - https://packetstormsecurity.com/files/145095/communigatepro-xss.txt +CVE-2017-16962 - https://www.exploit-db.com/exploits/43177/ +CVE-2017-16994 - https://www.exploit-db.com/exploits/43178/ +CVE-2017-16995 - http://openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-16995 - https://www.exploit-db.com/exploits/44298/ +CVE-2017-16995 - https://www.exploit-db.com/exploits/45010/ +CVE-2017-16995 - https://www.exploit-db.com/exploits/45058/ +CVE-2017-16996 - http://openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-1700 - http://www.ibm.com/support/docview.wss?uid=swg22015635 +CVE-2017-17043 - https://packetstormsecurity.com/files/145060/wpemagmc10-xss.txt +CVE-2017-17043 - https://wpvulndb.com/vulnerabilities/8964 +CVE-2017-17049 - https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference_0x82730010 +CVE-2017-17050 - https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerDereference_0x82730020 +CVE-2017-17055 - http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt +CVE-2017-17055 - http://packetstormsecurity.com/files/145183/Artica-Web-Proxy-3.06.112216-Remote-Code-Execution.html +CVE-2017-17055 - http://seclists.org/fulldisclosure/2017/Dec/3 +CVE-2017-17055 - https://www.exploit-db.com/exploits/43206/ +CVE-2017-17056 - http://packetstormsecurity.com/files/145160/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Request-Forgery.html +CVE-2017-17057 - http://packetstormsecurity.com/files/145159/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Scripting.html +CVE-2017-17058 - https://www.exploit-db.com/exploits/43196/ +CVE-2017-17058 - https://www.exploit-db.com/ghdb/4613/ +CVE-2017-17059 - https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 +CVE-2017-17059 - https://packetstormsecurity.com/files/145044/WordPress-amtyThumb-8.1.3-Cross-Site-Scripting.html +CVE-2017-17062 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2017-17062 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2017-17062 - https://www.exploit-db.com/exploits/44881/ +CVE-2017-17068 - https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/ +CVE-2017-17069 - https://packetstormsecurity.com/files/145202/Amazon-Audible-DLL-Hijacking.html +CVE-2017-17080 - https://sourceware.org/bugzilla/show_bug.cgi?id=22421 +CVE-2017-17085 - https://www.exploit-db.com/exploits/43233/ +CVE-2017-17088 - http://packetstormsecurity.com/files/145435/Sync-Breeze-10.2.12-Denial-Of-Service.html +CVE-2017-17088 - http://seclists.org/fulldisclosure/2017/Dec/45 +CVE-2017-17088 - https://www.exploit-db.com/exploits/43344/ +CVE-2017-17090 - https://www.exploit-db.com/exploits/43992/ +CVE-2017-17091 - https://wpvulndb.com/vulnerabilities/8969 +CVE-2017-17093 - https://wpvulndb.com/vulnerabilities/8968 +CVE-2017-17095 - http://bugzilla.maptools.org/show_bug.cgi?id=2750 +CVE-2017-17095 - http://www.openwall.com/lists/oss-security/2017/11/30/3 +CVE-2017-17095 - https://usn.ubuntu.com/3606-1/ +CVE-2017-17095 - https://www.exploit-db.com/exploits/43322/ +CVE-2017-17096 - https://wpvulndb.com/vulnerabilities/8971 +CVE-2017-17097 - https://www.exploit-db.com/exploits/43431/ +CVE-2017-17098 - https://www.exploit-db.com/exploits/43431/ +CVE-2017-17099 - https://packetstormsecurity.com/files/144586/Sync-Breeze-Enterprise-10.1.16-SEH-Overflow.html +CVE-2017-17099 - https://www.exploit-db.com/exploits/42984/ +CVE-2017-17101 - https://youtu.be/B75C13Zw35Y +CVE-2017-17102 - https://github.com/FiyoCMS/FiyoCMS/issues/9 +CVE-2017-17103 - https://github.com/FiyoCMS/FiyoCMS/issues/10 +CVE-2017-17104 - https://github.com/FiyoCMS/FiyoCMS/issues/11 +CVE-2017-17105 - http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html +CVE-2017-17105 - http://packetstormsecurity.com/files/158120/Zivif-Camera-2.3.4.2103-iptest.cgi-Blind-Remote-Command-Execution.html +CVE-2017-17106 - http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html +CVE-2017-17107 - http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html +CVE-2017-17110 - http://packetstormsecurity.com/files/145231/Techno-Portfolio-Management-Panel-1.0-SQL-Injection.html +CVE-2017-17110 - https://www.exploit-db.com/exploits/43211/ +CVE-2017-17111 - http://packetstormsecurity.com/files/145237/Readymade-Classifieds-Script-1.0-SQL-Injection.html +CVE-2017-17111 - https://www.exploit-db.com/exploits/43212/ +CVE-2017-17112 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Pool_Corruption_1 +CVE-2017-17113 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Null_Pointer_Dereference_1 +CVE-2017-17114 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/IKARUS-Antivirus/Memory_Corruption_1_0x83000084 +CVE-2017-17121 - https://sourceware.org/bugzilla/show_bug.cgi?id=22506 +CVE-2017-17122 - https://sourceware.org/bugzilla/show_bug.cgi?id=22508 +CVE-2017-17123 - https://sourceware.org/bugzilla/show_bug.cgi?id=22509 +CVE-2017-17124 - https://sourceware.org/bugzilla/show_bug.cgi?id=22507 +CVE-2017-17125 - https://sourceware.org/bugzilla/show_bug.cgi?id=22443 +CVE-2017-17126 - https://sourceware.org/bugzilla/show_bug.cgi?id=22510 +CVE-2017-17127 - https://bugzilla.libav.org/show_bug.cgi?id=1099 +CVE-2017-17128 - https://bugzilla.libav.org/show_bug.cgi?id=1104 +CVE-2017-17129 - https://bugzilla.libav.org/show_bug.cgi?id=1101 +CVE-2017-17130 - https://bugzilla.libav.org/show_bug.cgi?id=1100 +CVE-2017-1725 - http://www.ibm.com/support/docview.wss?uid=swg22015635 +CVE-2017-17309 - http://packetstormsecurity.com/files/155954/Huawei-HG255-Directory-Traversal.html +CVE-2017-1734 - http://www.ibm.com/support/docview.wss?uid=swg22015635 +CVE-2017-17382 - https://robotattack.org/ +CVE-2017-17382 - https://www.kb.cert.org/vuls/id/144389 +CVE-2017-17405 - https://hackerone.com/reports/294462 +CVE-2017-17405 - https://www.exploit-db.com/exploits/43381/ +CVE-2017-17406 - https://www.tenable.com/security/research/tra-2018-02 +CVE-2017-17411 - https://www.exploit-db.com/exploits/43363/ +CVE-2017-17411 - https://www.exploit-db.com/exploits/43429/ +CVE-2017-17417 - https://www.exploit-db.com/exploits/46446/ +CVE-2017-17427 - https://robotattack.org/ +CVE-2017-17427 - https://www.kb.cert.org/vuls/id/144389 +CVE-2017-17428 - https://www.kb.cert.org/vuls/id/144389 +CVE-2017-17431 - https://code610.blogspot.com/2017/12/modus-operandi-genixcms-115.html +CVE-2017-17439 - https://github.com/heimdal/heimdal/issues/353 +CVE-2017-17440 - https://bugs.debian.org/883528#35 +CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html +CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html +CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html +CVE-2017-17440 - https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html +CVE-2017-17442 - http://support.blackberry.com/kb/articleDetail?articleNumber=000047227 +CVE-2017-17446 - https://bitbucket.org/mpyne/game-music-emu/issues/14/addresssanitizer-negative-size-param-size +CVE-2017-17446 - https://bugs.debian.org/883691 +CVE-2017-17448 - https://usn.ubuntu.com/3620-1/ +CVE-2017-17450 - https://usn.ubuntu.com/3583-2/ +CVE-2017-17451 - https://packetstormsecurity.com/files/145222/WordPress-WP-Mailster-1.5.4.0-Cross-Site-Scripting.html +CVE-2017-17451 - https://wpvulndb.com/vulnerabilities/8973 +CVE-2017-17458 - https://bz.mercurial-scm.org/show_bug.cgi?id=5730 +CVE-2017-17458 - https://hackerone.com/reports/294147 +CVE-2017-17458 - https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html +CVE-2017-17464 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002570 +CVE-2017-17465 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002574 +CVE-2017-17466 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730088 +CVE-2017-17467 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730074 +CVE-2017-17468 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730020 +CVE-2017-17469 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730008 +CVE-2017-17470 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730054 +CVE-2017-17471 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82732140 +CVE-2017-17472 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730030 +CVE-2017-17473 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730050 +CVE-2017-17474 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730070 +CVE-2017-17475 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82736068 +CVE-2017-17482 - https://www.theregister.co.uk/2018/02/06/openvms_vulnerability/ +CVE-2017-17484 - https://github.com/znc/znc/issues/1459 +CVE-2017-17484 - https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp +CVE-2017-17484 - https://ssl.icu-project.org/trac/changeset/40714 +CVE-2017-17484 - https://ssl.icu-project.org/trac/changeset/40715 +CVE-2017-17484 - https://ssl.icu-project.org/trac/ticket/13490 +CVE-2017-17484 - https://ssl.icu-project.org/trac/ticket/13510 +CVE-2017-17485 - https://github.com/irsl/jackson-rce-via-spel/ +CVE-2017-17485 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-17497 - https://github.com/htacg/tidy-html5/issues/656 +CVE-2017-17498 - https://sourceforge.net/p/graphicsmagick/bugs/525/ +CVE-2017-17499 - https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=33078&sid=5fbb164c3830293138917f9b14264ed1 +CVE-2017-17500 - https://sourceforge.net/p/graphicsmagick/bugs/523/ +CVE-2017-17501 - https://sourceforge.net/p/graphicsmagick/bugs/526/ +CVE-2017-17502 - https://sourceforge.net/p/graphicsmagick/bugs/521/ +CVE-2017-17503 - https://sourceforge.net/p/graphicsmagick/bugs/522/ +CVE-2017-17537 - https://www.exploit-db.com/exploits/43200/ +CVE-2017-17538 - https://www.exploit-db.com/exploits/43317/ +CVE-2017-17539 - https://fortiguard.com/advisory/FG-IR-17-274 +CVE-2017-17540 - https://fortiguard.com/advisory/FG-IR-17-274 +CVE-2017-17541 - https://fortiguard.com/advisory/FG-IR-17-305 +CVE-2017-17543 - https://fortiguard.com/advisory/FG-IR-17-214 +CVE-2017-17554 - https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20%20aubio_source_avcodec_readframe%20of%20aubio.md +CVE-2017-17555 - https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20swri_audio_convert%20of%20ffmpeg%20libswresample.md +CVE-2017-17557 - https://blog.0patch.com/2018/05/0patching-foxit-reader-buffer-oops.html +CVE-2017-17558 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-17560 - https://download.exploitee.rs/file/generic/Exploiteers-DEFCON25.pdf +CVE-2017-17560 - https://www.exploit-db.com/exploits/43356/ +CVE-2017-17561 - http://www.jianshu.com/p/35af80b97ee6 +CVE-2017-17562 - https://www.elttam.com.au/blog/goahead/ +CVE-2017-17562 - https://www.exploit-db.com/exploits/43360/ +CVE-2017-17562 - https://www.exploit-db.com/exploits/43877/ +CVE-2017-17570 - https://packetstormsecurity.com/files/145297/FS-Expedia-Clone-1.0-SQL-Injection.html +CVE-2017-17570 - https://www.exploit-db.com/exploits/43261/ +CVE-2017-17571 - https://packetstormsecurity.com/files/145298/FS-Foodpanda-Clone-1.0-SQL-Injection.html +CVE-2017-17571 - https://www.exploit-db.com/exploits/43262/ +CVE-2017-17572 - https://packetstormsecurity.com/files/145303/FS-Amazon-Clone-1.0-SQL-Injection.html +CVE-2017-17572 - https://www.exploit-db.com/exploits/43259/ +CVE-2017-17573 - https://packetstormsecurity.com/files/145319/FS-Ebay-Clone-1.0-SQL-Injection.html +CVE-2017-17573 - https://www.exploit-db.com/exploits/43256/ +CVE-2017-17574 - https://packetstormsecurity.com/files/145302/FS-Care-Clone-1.0-SQL-Injection.html +CVE-2017-17574 - https://www.exploit-db.com/exploits/43258/ +CVE-2017-17575 - https://packetstormsecurity.com/files/145315/FS-Groupon-Clone-1.0-SQL-Injection.html +CVE-2017-17575 - https://www.exploit-db.com/exploits/43253/ +CVE-2017-17576 - https://packetstormsecurity.com/files/145316/FS-Gigs-Script-1.0-SQL-Injection.html +CVE-2017-17576 - https://www.exploit-db.com/exploits/43254/ +CVE-2017-17577 - https://packetstormsecurity.com/files/145296/FS-Trademe-Clone-1.0-SQL-Injection.html +CVE-2017-17577 - https://www.exploit-db.com/exploits/43260/ +CVE-2017-17578 - https://packetstormsecurity.com/files/145301/FS-Crowdfunding-Script-1.0-SQL-Injection.html +CVE-2017-17578 - https://www.exploit-db.com/exploits/43257/ +CVE-2017-17579 - https://packetstormsecurity.com/files/145317/FS-Freelancer-Clone-1.0-SQL-Injection.html +CVE-2017-17579 - https://www.exploit-db.com/exploits/43255/ +CVE-2017-17580 - https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html +CVE-2017-17580 - https://www.exploit-db.com/exploits/43249/ +CVE-2017-17581 - https://packetstormsecurity.com/files/145253/FS-Quibids-Clone-1.0-SQL-Injection.html +CVE-2017-17581 - https://www.exploit-db.com/exploits/43243/ +CVE-2017-17582 - https://packetstormsecurity.com/files/145314/FS-Grubhub-Clone-1.0-SQL-Injection.html +CVE-2017-17582 - https://www.exploit-db.com/exploits/43252/ +CVE-2017-17583 - https://packetstormsecurity.com/files/145252/FS-Shutterstock-Clone-1.0-SQL-Injection.html +CVE-2017-17583 - https://www.exploit-db.com/exploits/43242/ +CVE-2017-17584 - https://packetstormsecurity.com/files/145289/FS-Makemytrip-Clone-1.0-SQL-Injection.html +CVE-2017-17584 - https://www.exploit-db.com/exploits/43246/ +CVE-2017-17585 - https://packetstormsecurity.com/files/145255/FS-Monster-Clone-1.0-SQL-Injection.html +CVE-2017-17585 - https://www.exploit-db.com/exploits/43245/ +CVE-2017-17586 - https://packetstormsecurity.com/files/145254/FS-Olx-Clone-1.0-SQL-Injection.html +CVE-2017-17586 - https://www.exploit-db.com/exploits/43244/ +CVE-2017-17587 - https://packetstormsecurity.com/files/145308/FS-Indiamart-Clone-1.0-SQL-Injection.html +CVE-2017-17587 - https://www.exploit-db.com/exploits/43250/ +CVE-2017-17588 - https://packetstormsecurity.com/files/145313/FS-IMDB-Clone-1.0-SQL-Injection.html +CVE-2017-17588 - https://www.exploit-db.com/exploits/43251/ +CVE-2017-17589 - https://packetstormsecurity.com/files/145250/FS-Thumbtack-Clone-1.0-SQL-Injection.html +CVE-2017-17589 - https://www.exploit-db.com/exploits/43240/ +CVE-2017-17590 - https://packetstormsecurity.com/files/145251/FS-Stackoverflow-Clone-1.0-SQL-Injection.html +CVE-2017-17590 - https://www.exploit-db.com/exploits/43241/ +CVE-2017-17591 - https://packetstormsecurity.com/files/145249/Realestate-Crowdfunding-Script-2.7.2-SQL-Injection.html +CVE-2017-17591 - https://www.exploit-db.com/exploits/43239/ +CVE-2017-17592 - https://packetstormsecurity.com/files/145248/Website-Auction-Marketplace-2.0.5-SQL-Injection.html +CVE-2017-17592 - https://www.exploit-db.com/exploits/43238/ +CVE-2017-17593 - https://packetstormsecurity.com/files/145247/Simple-Chatting-System-1.0.0-Arbitrary-File-Upload.html +CVE-2017-17593 - https://www.exploit-db.com/exploits/43237/ +CVE-2017-17594 - https://packetstormsecurity.com/files/145246/DomainSale-PHP-Script-1.0-SQL-Injection.html +CVE-2017-17594 - https://www.exploit-db.com/exploits/43235/ +CVE-2017-17595 - https://packetstormsecurity.com/files/145309/Beauty-Parlour-Booking-Script-1.0-SQL-Injection.html +CVE-2017-17595 - https://www.exploit-db.com/exploits/43267/ +CVE-2017-17596 - https://packetstormsecurity.com/files/145311/Entrepreneur-Job-Portal-Script-2.0.6-SQL-Injection.html +CVE-2017-17596 - https://www.exploit-db.com/exploits/43275/ +CVE-2017-17597 - https://packetstormsecurity.com/files/145290/Nearbuy-Clone-Script-3.2-SQL-Injection.html +CVE-2017-17597 - https://www.exploit-db.com/exploits/43268/ +CVE-2017-17598 - https://packetstormsecurity.com/files/145304/Affiliate-MLM-Script-1.0-SQL-Injection.html +CVE-2017-17598 - https://www.exploit-db.com/exploits/43265/ +CVE-2017-17599 - https://packetstormsecurity.com/files/145300/Advance-Online-Learning-Management-Script-3.1-SQL-Injection.html +CVE-2017-17599 - https://www.exploit-db.com/exploits/43264/ +CVE-2017-17600 - https://packetstormsecurity.com/files/145318/Basic-B2B-Script-2.0.8-SQL-Injection.html +CVE-2017-17600 - https://www.exploit-db.com/exploits/43266/ +CVE-2017-17601 - https://packetstormsecurity.com/files/145291/Cab-Booking-Script-1.0-SQL-Injection.html +CVE-2017-17601 - https://www.exploit-db.com/exploits/43269/ +CVE-2017-17602 - https://packetstormsecurity.com/files/145299/Advance-B2B-Script-2.1.3-SQL-Injection.html +CVE-2017-17602 - https://www.exploit-db.com/exploits/43263/ +CVE-2017-17603 - https://packetstormsecurity.com/files/145345/Advanced-Real-Estate-Script-4.0.7-SQL-Injection.html +CVE-2017-17603 - https://www.exploit-db.com/exploits/43304/ +CVE-2017-17604 - https://packetstormsecurity.com/files/145346/Entrepreneur-Bus-Booking-Script-3.0.4-SQL-Injection.html +CVE-2017-17604 - https://www.exploit-db.com/exploits/43305/ +CVE-2017-17605 - https://packetstormsecurity.com/files/145310/Consumer-Complaints-Clone-Script-1.0-SQL-Injection.html +CVE-2017-17605 - https://www.exploit-db.com/exploits/43274/ +CVE-2017-17606 - https://packetstormsecurity.com/files/145292/Co-work-Space-Search-Script-1.0-SQL-Injection.html +CVE-2017-17606 - https://www.exploit-db.com/exploits/43273/ +CVE-2017-17607 - https://packetstormsecurity.com/files/145293/CMS-Auditor-Website-1.0-SQL-Injection.html +CVE-2017-17607 - https://www.exploit-db.com/exploits/43272/ +CVE-2017-17608 - https://packetstormsecurity.com/files/145294/Child-Care-Script-1.0-SQL-Injection.html +CVE-2017-17608 - https://www.exploit-db.com/exploits/43271/ +CVE-2017-17609 - https://packetstormsecurity.com/files/145295/Chartered-Accountant-Booking-Script-1.0-SQL-Injection.html +CVE-2017-17609 - https://www.exploit-db.com/exploits/43270/ +CVE-2017-17610 - https://packetstormsecurity.com/files/145305/E-commerce-MLM-Software-1.0-SQL-Injection.html +CVE-2017-17610 - https://www.exploit-db.com/exploits/43277/ +CVE-2017-17611 - https://packetstormsecurity.com/files/145312/Doctor-Search-Script-1.0-SQL-Injection.html +CVE-2017-17611 - https://www.exploit-db.com/exploits/43276/ +CVE-2017-17612 - https://packetstormsecurity.com/files/145324/Hot-Scripts-Clone-3.1-SQL-Injection.html +CVE-2017-17612 - https://www.exploit-db.com/exploits/43284/ +CVE-2017-17612 - https://www.exploit-db.com/exploits/43916/ +CVE-2017-17613 - https://packetstormsecurity.com/files/145323/Freelance-Website-Script-2.0.6-SQL-Injection.html +CVE-2017-17613 - https://www.exploit-db.com/exploits/43283/ +CVE-2017-17614 - https://packetstormsecurity.com/files/145321/Food-Order-Script-1.0-SQL-Injection.html +CVE-2017-17614 - https://www.exploit-db.com/exploits/43281/ +CVE-2017-17615 - https://packetstormsecurity.com/files/145320/Facebook-Clone-Script-1.0-SQL-Injection.html +CVE-2017-17615 - https://www.exploit-db.com/exploits/43280/ +CVE-2017-17616 - https://packetstormsecurity.com/files/145306/Event-Search-Script-1.0-SQL-Injection.html +CVE-2017-17616 - https://www.exploit-db.com/exploits/43279/ +CVE-2017-17617 - https://packetstormsecurity.com/files/145325/Foodspotting-Clone-Script-1.0-SQL-Injection.html +CVE-2017-17617 - https://www.exploit-db.com/exploits/43285/ +CVE-2017-17618 - https://packetstormsecurity.com/files/145326/Kickstarter-Clone-Script-2.0-SQL-Injection.html +CVE-2017-17618 - https://www.exploit-db.com/exploits/43286/ +CVE-2017-17619 - https://packetstormsecurity.com/files/145328/Laundry-Booking-Script-1.0-SQL-Injection.html +CVE-2017-17619 - https://packetstormsecurity.com/files/145330/Laundry-Booking-Script-1.0-SQL-Injection.html +CVE-2017-17619 - https://www.exploit-db.com/exploits/43288/ +CVE-2017-17620 - https://packetstormsecurity.com/files/145332/Lawyer-Search-Script-1.1-SQL-Injection.html +CVE-2017-17620 - https://www.exploit-db.com/exploits/43289/ +CVE-2017-17621 - https://packetstormsecurity.com/files/145331/Multivendor-Penny-Auction-Clone-Script-1.0-SQL-Injection.html +CVE-2017-17621 - https://packetstormsecurity.com/files/145333/Multivendor-Penny-Auction-Clone-Script-1.0-SQL-Injection.html +CVE-2017-17621 - https://www.exploit-db.com/exploits/43290/ +CVE-2017-17622 - https://packetstormsecurity.com/files/145329/Online-Exam-Test-Application-Script-1.6-SQL-Injection.html +CVE-2017-17622 - https://packetstormsecurity.com/files/145334/Online-Exam-Test-Application-Script-1.6-SQL-Injection.html +CVE-2017-17622 - https://www.exploit-db.com/exploits/43291/ +CVE-2017-17623 - https://packetstormsecurity.com/files/145335/Opensource-Classified-Ads-Script-3.2-SQL-Injection.html +CVE-2017-17623 - https://www.exploit-db.com/exploits/43292/ +CVE-2017-17624 - https://packetstormsecurity.com/files/145336/PHP-Multivendor-Ecommerce-1.0-SQL-Injection.html +CVE-2017-17624 - https://www.exploit-db.com/exploits/43293/ +CVE-2017-17625 - https://packetstormsecurity.com/files/145337/Professional-Service-Script-1.0-SQL-Injection.html +CVE-2017-17625 - https://www.exploit-db.com/exploits/43294/ +CVE-2017-17626 - https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html +CVE-2017-17626 - https://www.exploit-db.com/exploits/43295/ +CVE-2017-17627 - https://packetstormsecurity.com/files/145339/Readymade-Video-Sharing-Script-3.2-SQL-Injection.html +CVE-2017-17627 - https://www.exploit-db.com/exploits/43296/ +CVE-2017-17628 - https://packetstormsecurity.com/files/145340/Responsive-Realestate-Script-3.2-SQL-Injection.html +CVE-2017-17628 - https://www.exploit-db.com/exploits/43297/ +CVE-2017-17629 - https://packetstormsecurity.com/files/145327/Secure-E-commerce-Script-2.0.1-SQL-Injection.html +CVE-2017-17629 - https://www.exploit-db.com/exploits/43287/ +CVE-2017-17630 - https://packetstormsecurity.com/files/145322/Yoga-Class-Script-1.0-SQL-Injection.html +CVE-2017-17630 - https://www.exploit-db.com/exploits/43282/ +CVE-2017-17631 - https://packetstormsecurity.com/files/145341/Multireligion-Responsive-Matrimonial-4.7.2-SQL-Injection.html +CVE-2017-17631 - https://www.exploit-db.com/exploits/43299/ +CVE-2017-17632 - https://packetstormsecurity.com/files/145342/Responsive-Events-And-Movie-Ticket-Booking-Script-3.2.1-SQL-Injection.html +CVE-2017-17632 - https://www.exploit-db.com/exploits/43300/ +CVE-2017-17633 - https://packetstormsecurity.com/files/145343/Multiplex-Movie-Theater-Booking-Script-3.1.5-SQL-Injection.html +CVE-2017-17633 - https://www.exploit-db.com/exploits/43301/ +CVE-2017-17634 - https://packetstormsecurity.com/files/145344/Single-Theater-Booking-Script-3.2.1-SQL-Injection.html +CVE-2017-17634 - https://www.exploit-db.com/exploits/43302/ +CVE-2017-17635 - https://packetstormsecurity.com/files/145347/MLM-Forex-Market-Plan-Script-2.0.4-SQL-Injection.html +CVE-2017-17635 - https://www.exploit-db.com/exploits/43306/ +CVE-2017-17636 - https://packetstormsecurity.com/files/145348/MLM-Forced-Matrix-2.0.9-SQL-Injection.html +CVE-2017-17636 - https://www.exploit-db.com/exploits/43307/ +CVE-2017-17637 - https://packetstormsecurity.com/files/145349/Car-Rental-Script-2.0.4-SQL-Injection.html +CVE-2017-17637 - https://www.exploit-db.com/exploits/43308/ +CVE-2017-17638 - https://packetstormsecurity.com/files/145350/Groupon-Clone-Script-3.01-SQL-Injection.html +CVE-2017-17638 - https://www.exploit-db.com/exploits/43309/ +CVE-2017-17639 - https://packetstormsecurity.com/files/145351/Muslim-Matrimonial-Script-3.02-SQL-Injection.html +CVE-2017-17639 - https://www.exploit-db.com/exploits/43310/ +CVE-2017-17640 - https://packetstormsecurity.com/files/145352/Advanced-World-Database-2.0.5-SQL-Injection.html +CVE-2017-17640 - https://www.exploit-db.com/exploits/43311/ +CVE-2017-17641 - https://packetstormsecurity.com/files/145353/Resume-Clone-Script-2.0.5-SQL-Injection.html +CVE-2017-17641 - https://www.exploit-db.com/exploits/43312/ +CVE-2017-17642 - https://packetstormsecurity.com/files/145354/Basic-Job-Site-Script-2.0.5-SQL-Injection.html +CVE-2017-17642 - https://www.exploit-db.com/exploits/43314/ +CVE-2017-17643 - https://packetstormsecurity.com/files/145444/FS-Lynda-Clone-1.0-SQL-Injection.html +CVE-2017-17643 - https://www.exploit-db.com/exploits/43335/ +CVE-2017-17645 - https://packetstormsecurity.com/files/145445/Bus-Booking-Script-1.0-SQL-Injection.html +CVE-2017-17645 - https://www.exploit-db.com/exploits/43336/ +CVE-2017-17648 - https://www.exploit-db.com/exploits/43278 +CVE-2017-17649 - https://packetstormsecurity.com/files/145438/Readymade-Video-Sharing-Script-3.2-HTML-Injection.html +CVE-2017-17649 - https://www.exploit-db.com/exploits/43333/ +CVE-2017-17651 - https://packetstormsecurity.com/files/145439/Paid-To-Read-Script-2.0.5-SQL-Injection.html +CVE-2017-17651 - https://www.exploit-db.com/exploits/43334/ +CVE-2017-17662 - http://packetstormsecurity.com/files/145770/Yawcam-0.6.0-Directory-Traversal.html +CVE-2017-17669 - https://github.com/Exiv2/exiv2/issues/187 +CVE-2017-17672 - https://www.exploit-db.com/exploits/43362/ +CVE-2017-17681 - https://github.com/ImageMagick/ImageMagick/issues/869 +CVE-2017-17682 - https://github.com/ImageMagick/ImageMagick/issues/870 +CVE-2017-17683 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c44 +CVE-2017-17684 - https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c04_ +CVE-2017-17692 - http://packetstormsecurity.com/files/145510/Samsung-Internet-Browser-SOP-Bypass.html +CVE-2017-17692 - https://www.exploit-db.com/exploits/43376/ +CVE-2017-17704 - https://systemoverlord.com/2017/12/18/cve-2017-17704-broken-cryptography-in-istar-ultra-ip-acm-by-software-house.html +CVE-2017-17707 - https://www.profundis-labs.com/advisories/CVE-2017-17707.txt +CVE-2017-17708 - https://www.profundis-labs.com/advisories/CVE-2017-17708.txt +CVE-2017-17712 - https://usn.ubuntu.com/3581-1/ +CVE-2017-17712 - https://usn.ubuntu.com/3582-1/ +CVE-2017-17713 - https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/ +CVE-2017-17713 - https://www.youtube.com/watch?v=RWw1UTeZee8 +CVE-2017-17713 - https://www.youtube.com/watch?v=Txp6IwR24jY +CVE-2017-17713 - https://www.youtube.com/watch?v=efmvL235S-8 +CVE-2017-17714 - https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/ +CVE-2017-17714 - https://www.youtube.com/watch?v=Txp6IwR24jY +CVE-2017-17716 - https://gitlab.com/gitlab-org/gitlab-ce/issues/30420 +CVE-2017-17719 - http://seclists.org/fulldisclosure/2017/Dec/71 +CVE-2017-17719 - https://wpvulndb.com/vulnerabilities/8981 +CVE-2017-17721 - https://0day.today/exploit/29277 +CVE-2017-17721 - https://cxsecurity.com/issue/WLB-2017120155 +CVE-2017-17721 - https://packetstormsecurity.com/files/145511/BEIMS-ContractorWeb-5.18.0.0-SQL-Injection.html +CVE-2017-17721 - https://www.exploit-db.com/exploits/43379/ +CVE-2017-17722 - https://bugzilla.redhat.com/show_bug.cgi?id=1524116 +CVE-2017-17723 - https://bugzilla.redhat.com/show_bug.cgi?id=1524104 +CVE-2017-17724 - https://bugzilla.redhat.com/show_bug.cgi?id=1524107 +CVE-2017-17724 - https://github.com/Exiv2/exiv2/issues/263 +CVE-2017-17724 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md +CVE-2017-17725 - https://bugzilla.redhat.com/show_bug.cgi?id=1525055 +CVE-2017-17725 - https://github.com/Exiv2/exiv2/issues/188 +CVE-2017-17733 - http://www.0day5.com/archives/4383/ +CVE-2017-17737 - https://www.exploit-db.com/exploits/43364/ +CVE-2017-17738 - https://www.exploit-db.com/exploits/43364/ +CVE-2017-17739 - https://www.exploit-db.com/exploits/43364/ +CVE-2017-17740 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2017-17740 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2017-17741 - https://usn.ubuntu.com/3620-1/ +CVE-2017-17742 - https://hackerone.com/reports/153794 +CVE-2017-17744 - http://seclists.org/fulldisclosure/2017/Dec/72 +CVE-2017-17744 - https://wpvulndb.com/vulnerabilities/8982 +CVE-2017-17745 - http://seclists.org/fulldisclosure/2017/Dec/67 +CVE-2017-17746 - http://seclists.org/fulldisclosure/2017/Dec/67 +CVE-2017-17747 - http://seclists.org/fulldisclosure/2017/Dec/67 +CVE-2017-17752 - https://www.exploit-db.com/exploits/43378/ +CVE-2017-17753 - http://seclists.org/fulldisclosure/2017/Dec/73 +CVE-2017-17759 - https://www.exploit-db.com/exploits/43377/ +CVE-2017-17760 - https://github.com/opencv/opencv/issues/10351 +CVE-2017-17762 - https://kryptera.se/sarbarhet-i-episerver/ +CVE-2017-17774 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/piwigo.md +CVE-2017-17775 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/piwigo.md +CVE-2017-17780 - https://packetstormsecurity.com/files/145469/Clockwork-SMS-Cross-Site-Scripting.html +CVE-2017-17786 - https://bugzilla.gnome.org/show_bug.cgi?id=739134 +CVE-2017-17787 - https://bugzilla.gnome.org/show_bug.cgi?id=790853 +CVE-2017-17789 - https://bugzilla.gnome.org/show_bug.cgi?id=790849 +CVE-2017-17790 - https://github.com/ruby/ruby/pull/1777 +CVE-2017-17792 - https://github.com/BlogoText/blogotext/issues/345 +CVE-2017-17793 - https://github.com/BlogoText/blogotext/issues/345 +CVE-2017-17794 - https://github.com/BlogoText/blogotext/issues/345 +CVE-2017-17795 - https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000088 +CVE-2017-17796 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x827300A4 +CVE-2017-17797 - https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000058 +CVE-2017-17798 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x8273A0A0 +CVE-2017-17799 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x82730068 +CVE-2017-17800 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273A0A0 +CVE-2017-17801 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273E060 +CVE-2017-17802 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x8273E080 +CVE-2017-17803 - https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x82736068 +CVE-2017-17804 - https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000084 +CVE-2017-17805 - https://usn.ubuntu.com/3620-1/ +CVE-2017-17806 - https://usn.ubuntu.com/3583-2/ +CVE-2017-17807 - https://usn.ubuntu.com/3620-1/ +CVE-2017-17809 - https://github.com/VerSprite/research/blob/master/advisories/VS-2017-007.md +CVE-2017-17822 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md +CVE-2017-17823 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md +CVE-2017-17824 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md +CVE-2017-17825 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Stored%20XSS%20Vulnerabilities%20in%20Piwigo%202.9.2.md +CVE-2017-17826 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Stored%20XSS%20Vulnerabilities%20in%20Piwigo%202.9.2.md +CVE-2017-17827 - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Cross%20Site%20Request%20Forgery%20in%20Piwigo%202.9.2.md +CVE-2017-17828 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md +CVE-2017-17829 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md +CVE-2017-17830 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md +CVE-2017-17832 - http://packetstormsecurity.com/files/145517/ServersCheck-Monitoring-Software-Cross-Site-Scripting.html +CVE-2017-17837 - https://issues.apache.org/jira/browse/DELTASPIKE-1307 +CVE-2017-17847 - https://sourceforge.net/p/enigmail/bugs/709/ +CVE-2017-17848 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2017-17848 - https://sourceforge.net/p/enigmail/bugs/709/ +CVE-2017-17849 - https://packetstormsecurity.com/files/145530/GetGo-Download-Manager-5.3.0.2712-Buffer-Overflow.html +CVE-2017-17849 - https://www.exploit-db.com/exploits/43391/ +CVE-2017-17849 - https://www.exploit-db.com/exploits/45087/ +CVE-2017-17852 - http://www.openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-17853 - http://www.openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-17854 - http://www.openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-17855 - http://www.openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-17856 - http://www.openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-17857 - http://www.openwall.com/lists/oss-security/2017/12/21/2 +CVE-2017-17859 - https://poctestblog.blogspot.com/2017/12/samsung-internet-browser-sop-bypassuxss.html +CVE-2017-17860 - https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM +CVE-2017-17866 - https://bugs.ghostscript.com/show_bug.cgi?id=698699 +CVE-2017-17867 - https://neonsea.uk/blog/2017/12/23/rce-inteno-iopsys.html +CVE-2017-17867 - https://www.exploit-db.com/exploits/43428/ +CVE-2017-17868 - https://cxsecurity.com/issue/WLB-2017120169 +CVE-2017-17869 - https://cxsecurity.com/issue/WLB-2017120183 +CVE-2017-17870 - https://www.exploit-db.com/exploits/43323/ +CVE-2017-17871 - https://www.exploit-db.com/exploits/43329/ +CVE-2017-17872 - https://www.exploit-db.com/exploits/43330/ +CVE-2017-17873 - https://www.exploit-db.com/exploits/43316/ +CVE-2017-17874 - https://www.exploit-db.com/exploits/43315/ +CVE-2017-17875 - https://www.exploit-db.com/exploits/43393/ +CVE-2017-17876 - https://www.exploit-db.com/exploits/43394/ +CVE-2017-1789 - https://exchange.xforce.ibmcloud.com/vulnerabilities/137034 +CVE-2017-17891 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md +CVE-2017-17892 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md +CVE-2017-17893 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade-Video-Sharing-Script.md +CVE-2017-17894 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md +CVE-2017-17895 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md +CVE-2017-17896 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md +CVE-2017-17901 - http://packetstormsecurity.com/files/145548/ZyXEL-P-660HW-TTL-Expiry-Denial-Of-Service.html +CVE-2017-17903 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/FS%20Lynda%20Clone.md +CVE-2017-17904 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/FS%20Lynda%20Clone.md +CVE-2017-17905 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md +CVE-2017-17906 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md +CVE-2017-17907 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Car-Rental-Script.md +CVE-2017-17908 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Responsive%20Realestate%20Script.md +CVE-2017-17909 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Responsive%20Realestate%20Script.md +CVE-2017-17912 - https://sourceforge.net/p/graphicsmagick/bugs/533/ +CVE-2017-17924 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17925 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17926 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17927 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17928 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17929 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17930 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Professional-Service-Script.md +CVE-2017-17932 - https://www.exploit-db.com/exploits/43406/ +CVE-2017-17932 - https://www.exploit-db.com/exploits/43407/ +CVE-2017-17932 - https://www.exploit-db.com/exploits/43523/ +CVE-2017-17933 - https://packetstormsecurity.com/files/145572/NetWin-SurgeFTP-23f2-Cross-Site-Scripting.html +CVE-2017-17934 - https://github.com/ImageMagick/ImageMagick/issues/920 +CVE-2017-17936 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Vanguard.md +CVE-2017-17937 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Vanguard.md +CVE-2017-17938 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md +CVE-2017-17939 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md +CVE-2017-17940 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md +CVE-2017-17941 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md +CVE-2017-17942 - http://bugzilla.maptools.org/show_bug.cgi?id=2767 +CVE-2017-17944 - http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues +CVE-2017-17945 - http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues +CVE-2017-17946 - https://sidechannel.tempestsi.com/password-manager-flaw-allows-for-arbitrary-command-execution-b6bb273206b1 +CVE-2017-17951 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17952 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17953 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17954 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17955 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17956 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17957 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17958 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17959 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17960 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/PHP%20Multivendor%20Ecommerce.md +CVE-2017-17968 - https://www.exploit-db.com/exploits/43408/ +CVE-2017-17970 - http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html +CVE-2017-17970 - https://www.exploit-db.com/exploits/43477/ +CVE-2017-17971 - https://github.com/Dolibarr/dolibarr/issues/8000 +CVE-2017-17976 - http://packetstormsecurity.com/files/145903/PerfexCRM-1.9.7-Arbitrary-File-Upload.html +CVE-2017-17976 - https://www.exploit-db.com/exploits/43590/ +CVE-2017-17981 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17982 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17983 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17984 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17985 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17986 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17987 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17988 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md +CVE-2017-17989 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17990 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17991 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17992 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17993 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17994 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17995 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Biometric-Shift-Employee-Management-System.md +CVE-2017-17996 - http://seclists.org/fulldisclosure/2018/Feb/10 +CVE-2017-17996 - http://www.ryantzj.com/flexense-syncbreeze-entreprise-10314-buffer-overflow-seh-bypass.html +CVE-2017-17999 - http://packetstormsecurity.com/files/145902/RISE-1.9-SQL-Injection.html +CVE-2017-17999 - https://www.exploit-db.com/exploits/43591/ +CVE-2017-18001 - https://www.exploit-db.com/exploits/44047/ +CVE-2017-18008 - https://github.com/ImageMagick/ImageMagick/issues/921 +CVE-2017-18009 - https://github.com/opencv/opencv/issues/10479 +CVE-2017-18010 - https://packetstormsecurity.com/files/145217/WordPress-Smart-Marketing-SMS-And-Newsletters-Forms-1.1.1-XSS.html +CVE-2017-18010 - https://wpvulndb.com/vulnerabilities/8974 +CVE-2017-18011 - https://packetstormsecurity.com/files/144978/WordPress-Affiliate-Ads-For-Clickbank-Products-1.3-XSS.html +CVE-2017-18011 - https://wpvulndb.com/vulnerabilities/8989 +CVE-2017-18012 - https://packetstormsecurity.com/files/145218/WordPress-Z-URL-Preview-1.6.1-Cross-Site-Scripting.html +CVE-2017-18012 - https://wpvulndb.com/vulnerabilities/8990 +CVE-2017-18013 - https://usn.ubuntu.com/3606-1/ +CVE-2017-18015 - https://packetstormsecurity.com/files/145464/WordPress-Share-This-Image-1.03-Cross-Site-Scripting.html +CVE-2017-18015 - https://wpvulndb.com/vulnerabilities/8991 +CVE-2017-18016 - http://www.openwall.com/lists/oss-security/2018/01/10/1 +CVE-2017-18016 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 +CVE-2017-18016 - https://www.exploit-db.com/exploits/43499/ +CVE-2017-18017 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-18017 - https://usn.ubuntu.com/3583-2/ +CVE-2017-18020 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18021 - https://github.com/IJHack/QtPass/issues/338 +CVE-2017-18022 - https://github.com/ImageMagick/ImageMagick/issues/904 +CVE-2017-18023 - http://packetstormsecurity.com/files/145775/Office-Tracker-11.2.5-Cross-Site-Scripting.html +CVE-2017-18024 - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html +CVE-2017-18025 - https://www.exploit-db.com/exploits/43343/ +CVE-2017-18032 - https://security.dxw.com/advisories/xss-download-manager/ +CVE-2017-18044 - https://www.securifera.com/advisories/sec-2017-0001/ +CVE-2017-18047 - https://www.exploit-db.com/exploits/42011/ +CVE-2017-18047 - https://www.exploit-db.com/exploits/43236/ +CVE-2017-18047 - https://www.exploit-db.com/exploits/43518/ +CVE-2017-18048 - https://securityprince.blogspot.in/2017/12/monstra-cms-304-arbitrary-file-upload.html +CVE-2017-18048 - https://www.exploit-db.com/exploits/43348/ +CVE-2017-18049 - https://www.exploit-db.com/exploits/43396/ +CVE-2017-18071 - http://www.securityfocus.com/bid/103671 +CVE-2017-18072 - http://www.securityfocus.com/bid/103671 +CVE-2017-18073 - http://www.securityfocus.com/bid/103671 +CVE-2017-18074 - http://www.securityfocus.com/bid/103671 +CVE-2017-18078 - http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html +CVE-2017-18078 - http://www.openwall.com/lists/oss-security/2018/01/29/3 +CVE-2017-18078 - https://www.exploit-db.com/exploits/43935/ +CVE-2017-18096 - https://ecosystem.atlassian.net/browse/APL-1359 +CVE-2017-18111 - https://ecosystem.atlassian.net/browse/APL-1338 +CVE-2017-18120 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878739 +CVE-2017-18120 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881120 +CVE-2017-18124 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18125 - http://www.securityfocus.com/bid/103671 +CVE-2017-18126 - http://www.securityfocus.com/bid/103671 +CVE-2017-18127 - http://www.securityfocus.com/bid/103671 +CVE-2017-18128 - http://www.securityfocus.com/bid/103671 +CVE-2017-18129 - http://www.securityfocus.com/bid/103671 +CVE-2017-18130 - http://www.securityfocus.com/bid/103671 +CVE-2017-18131 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18132 - http://www.securityfocus.com/bid/103671 +CVE-2017-18133 - http://www.securityfocus.com/bid/103671 +CVE-2017-18134 - http://www.securityfocus.com/bid/103671 +CVE-2017-18135 - http://www.securityfocus.com/bid/103671 +CVE-2017-18136 - http://www.securityfocus.com/bid/103671 +CVE-2017-18137 - http://www.securityfocus.com/bid/103671 +CVE-2017-18138 - http://www.securityfocus.com/bid/103671 +CVE-2017-18139 - http://www.securityfocus.com/bid/103671 +CVE-2017-18140 - http://www.securityfocus.com/bid/103671 +CVE-2017-18141 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18142 - http://www.securityfocus.com/bid/103671 +CVE-2017-18143 - http://www.securityfocus.com/bid/103671 +CVE-2017-18144 - http://www.securityfocus.com/bid/103671 +CVE-2017-18145 - http://www.securityfocus.com/bid/103671 +CVE-2017-18146 - http://www.securityfocus.com/bid/103671 +CVE-2017-18147 - http://www.securityfocus.com/bid/103671 +CVE-2017-18156 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18157 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18160 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18170 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18171 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18172 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18173 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18175 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html +CVE-2017-18176 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html +CVE-2017-18177 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html +CVE-2017-18178 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html +CVE-2017-18179 - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html +CVE-2017-18189 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121 +CVE-2017-18195 - https://www.exploit-db.com/exploits/44194/ +CVE-2017-18198 - https://savannah.gnu.org/bugs/?52265 +CVE-2017-18199 - https://savannah.gnu.org/bugs/?52264 +CVE-2017-18212 - https://github.com/jerryscript-project/jerryscript/issues/2140 +CVE-2017-18214 - https://www.tenable.com/security/tns-2019-02 +CVE-2017-18219 - https://sourceforge.net/p/graphicsmagick/bugs/459/ +CVE-2017-18220 - https://sourceforge.net/p/graphicsmagick/bugs/438/ +CVE-2017-18222 - http://www.securityfocus.com/bid/103349 +CVE-2017-18229 - https://sourceforge.net/p/graphicsmagick/bugs/461/ +CVE-2017-18242 - https://bugzilla.libav.org/show_bug.cgi?id=1093 +CVE-2017-18243 - https://bugzilla.libav.org/show_bug.cgi?id=1088 +CVE-2017-18244 - https://bugzilla.libav.org/show_bug.cgi?id=1105 +CVE-2017-18245 - https://bugzilla.libav.org/show_bug.cgi?id=1094 +CVE-2017-18246 - https://bugzilla.libav.org/show_bug.cgi?id=1095 +CVE-2017-18247 - https://bugzilla.libav.org/show_bug.cgi?id=1089 +CVE-2017-18249 - https://usn.ubuntu.com/3932-1/ +CVE-2017-18255 - https://usn.ubuntu.com/3696-1/ +CVE-2017-18256 - https://www.exploit-db.com/exploits/44474/ +CVE-2017-18257 - https://usn.ubuntu.com/3696-1/ +CVE-2017-18258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2017-18263 - https://packetstormsecurity.com/files/147274/Seagate-Media-Server-Path-Traversal.html +CVE-2017-18263 - https://sumofpwn.nl/advisory/2017/seagate-media-server-path-traversal-vulnerability.html +CVE-2017-18267 - https://bugzilla.freedesktop.org/show_bug.cgi?id=103238 +CVE-2017-18274 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18275 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18276 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18277 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18278 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18279 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18280 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18282 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18283 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18285 - https://bugs.gentoo.org/641842 +CVE-2017-18286 - https://packetstormsecurity.com/files/143725/nZEDb-0.7.3.3-Cross-Site-Scripting.html +CVE-2017-18292 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18293 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18294 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18295 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18296 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18297 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18298 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18299 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18300 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18301 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18302 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18303 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18304 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18305 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18308 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18309 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18310 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18311 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18312 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18313 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18314 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18315 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18316 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18317 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18318 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18319 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18320 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18321 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18322 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18323 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18324 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18326 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18327 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18328 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18329 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18330 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18331 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18332 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-18344 - https://www.exploit-db.com/exploits/45175/ +CVE-2017-18345 - https://www.exploit-db.com/exploits/44252 +CVE-2017-18346 - https://vuldb.com/?id.123295 +CVE-2017-18346 - https://www.exploit-db.com/exploits/42577/ +CVE-2017-18347 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html +CVE-2017-18348 - https://korelogic.com/Resources/Advisories/KL-001-2017-022.txt +CVE-2017-18349 - https://fortiguard.com/encyclopedia/ips/44059 +CVE-2017-18357 - http://packetstormsecurity.com/files/152995/Shopware-createInstanceFromNamedArguments-PHP-Object-Instantiation.html +CVE-2017-18358 - https://blog.ripstech.com/2018/limesurvey-persistent-xss-to-code-execution/ +CVE-2017-18362 - https://github.com/kbni/owlky +CVE-2017-18364 - http://packetstormsecurity.com/files/153591/phpFK-lite-version-Cross-Site-Scripting.html +CVE-2017-18364 - https://www.netsparker.com/web-applications-advisories/ns-17-030-multiple-reflected-xss-vulnerabilities-in-phpfkl-lite/ +CVE-2017-18368 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18368 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18368 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18369 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18369 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18369 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18370 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18370 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18370 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18371 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18371 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18371 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18372 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18372 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18372 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18373 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18373 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18373 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18374 - https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt +CVE-2017-18374 - https://seclists.org/fulldisclosure/2017/Jan/40 +CVE-2017-18374 - https://ssd-disclosure.com/index.php/archives/2910 +CVE-2017-18376 - https://gist.github.com/RaJiska/c1b4521aefd77ed43b06045ca05e2591 +CVE-2017-18377 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-root-rce +CVE-2017-18378 - https://kb.netgear.com/000049072/Security-Advisory-for-Command-Injection-in-ReadyNAS-Surveillance-Application-PSV-2017-2653 +CVE-2017-18378 - https://www.exploit-db.com/exploits/42956 +CVE-2017-18483 - https://www.pentestpartners.com/security-blog/nifty-xss-in-annke-sp1-hd-wireless-camera/ +CVE-2017-18486 - https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-Authentication.html +CVE-2017-18486 - https://www.exploit-db.com/exploits/42776 +CVE-2017-18486 - https://www.trustedsec.com/2017/09/full-disclosure-jitbit-helpdesk-authentication-bypass-0-day +CVE-2017-18499 - https://wpvulndb.com/vulnerabilities/9718 +CVE-2017-18508 - https://wpvulndb.com/vulnerabilities/9719 +CVE-2017-18509 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2017-18509 - https://lists.openwall.net/netdev/2017/12/04/40 +CVE-2017-18509 - https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf +CVE-2017-18538 - https://wpvulndb.com/vulnerabilities/9723 +CVE-2017-18539 - https://wpvulndb.com/vulnerabilities/9724 +CVE-2017-18540 - https://wpvulndb.com/vulnerabilities/9725 +CVE-2017-18549 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860 +CVE-2017-18550 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860 +CVE-2017-18551 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa +CVE-2017-18552 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=780e982905bef61d13496d9af5310bf4af3a64d3 +CVE-2017-18559 - https://wpvulndb.com/vulnerabilities/9727 +CVE-2017-18594 - https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF +CVE-2017-18595 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8 +CVE-2017-18596 - https://wpvulndb.com/vulnerabilities/8965 +CVE-2017-18597 - http://lenonleite.com.br/en/2017/09/11/jtrt-responsive-tables-wordpress-plugin-sql-injection/ +CVE-2017-18597 - https://wpvulndb.com/vulnerabilities/8953 +CVE-2017-18598 - https://wpvulndb.com/vulnerabilities/8934 +CVE-2017-18599 - https://wpvulndb.com/vulnerabilities/8900 +CVE-2017-18600 - https://wpvulndb.com/vulnerabilities/8877 +CVE-2017-18601 - https://www.exploit-db.com/exploits/42351 +CVE-2017-18602 - https://www.exploit-db.com/exploits/42351 +CVE-2017-18604 - https://wpvulndb.com/vulnerabilities/8829 +CVE-2017-18605 - https://wpvulndb.com/vulnerabilities/8824 +CVE-2017-18606 - https://wpvulndb.com/vulnerabilities/8801 +CVE-2017-18607 - https://wpvulndb.com/vulnerabilities/8801 +CVE-2017-18608 - https://wpvulndb.com/vulnerabilities/9360 +CVE-2017-18609 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_magic_fields_1_wordpress_plugin.html +CVE-2017-18610 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_magic_fields_1_wordpress_plugin.html +CVE-2017-18611 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_magic_fields_1_wordpress_plugin.html +CVE-2017-18612 - https://rastating.github.io/wp-whois-domain-reflected-xss/ +CVE-2017-18613 - https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_trust_form_wordpress_plugin.html +CVE-2017-18614 - https://seclists.org/fulldisclosure/2017/Feb/67 +CVE-2017-18635 - https://github.com/ShielderSec/cve-2017-18635 +CVE-2017-18635 - https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ +CVE-2017-18638 - https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf +CVE-2017-18639 - https://www.exploit-db.com/exploits/42792 +CVE-2017-18640 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2017-18643 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18644 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18645 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18646 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18647 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18648 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18649 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18650 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18651 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18652 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18653 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18654 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18655 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18656 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18657 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18658 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18659 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18660 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18661 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18662 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18663 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18664 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18665 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18666 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18667 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18668 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18669 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18670 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18671 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18672 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18673 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18674 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18675 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18676 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18677 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18678 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18679 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18680 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18681 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18682 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18683 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18684 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18685 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18686 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18687 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18688 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18689 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18690 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18691 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18692 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18693 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18694 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18695 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18696 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2017-18697 - https://kb.netgear.com/000053205/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2628 +CVE-2017-18699 - https://kb.netgear.com/000053203/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2595 +CVE-2017-18700 - https://kb.netgear.com/000053202/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-Extenders-PSV-2017-0342 +CVE-2017-18704 - https://kb.netgear.com/000053198/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-and-Gateways-PSV-2017-0590 +CVE-2017-18711 - https://kb.netgear.com/000053137/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2016-0131 +CVE-2017-18712 - https://kb.netgear.com/000053136/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-and-Gateways-PSV-2016-0127 +CVE-2017-18715 - https://kb.netgear.com/000053133/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Extenders-PSV-2016-0075 +CVE-2017-18718 - https://kb.netgear.com/000052279/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2152 +CVE-2017-18722 - https://kb.netgear.com/000052275/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2146 +CVE-2017-18724 - https://kb.netgear.com/000052273/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2144 +CVE-2017-18726 - https://kb.netgear.com/000051529/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2139 +CVE-2017-18728 - https://kb.netgear.com/000051527/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2136 +CVE-2017-18730 - https://kb.netgear.com/000051525/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2134 +CVE-2017-18732 - https://kb.netgear.com/000051523/Security-Advisory-for-Authentication-Bypass-on-R6300v2-PLW1000v2-and-PLW1010v2-PSV-2016-0069 +CVE-2017-18738 - https://kb.netgear.com/000051517/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Extenders-PSV-2017-0706 +CVE-2017-18747 - https://kb.netgear.com/000051507/Security-Advisory-for-Security-Misconfiguration-on-Some-Extenders-PSV-2016-0115 +CVE-2017-18751 - https://kb.netgear.com/000051503/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2517 +CVE-2017-18754 - https://kb.netgear.com/000051494/Security-Advisory-for-Post-Authentication-Command-Injection-on-Routers-PSV-2017-0329 +CVE-2017-18757 - https://kb.netgear.com/000051491/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2016-0120 +CVE-2017-18758 - https://kb.netgear.com/000051487/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2157 +CVE-2017-18759 - https://kb.netgear.com/000051486/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R8300-and-R8500-PSV-2017-2227 +CVE-2017-18761 - https://kb.netgear.com/000051484/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R8000-PSV-2017-2229 +CVE-2017-18765 - https://kb.netgear.com/000051480/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2017-0648 +CVE-2017-18767 - https://kb.netgear.com/000051476/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2017-0320 +CVE-2017-18768 - https://kb.netgear.com/000051475/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Extenders-PSV-2016-0130 +CVE-2017-18770 - https://kb.netgear.com/000051473/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Powerlines-and-a-Router-PSV-2016-0121 +CVE-2017-18775 - https://kb.netgear.com/000049553/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-and-Gateways-PSV-2017-0388 +CVE-2017-18782 - https://kb.netgear.com/000049537/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2017-2953 +CVE-2017-18783 - https://kb.netgear.com/000049536/Security-Advisory-for-Cross-Site-Scripting-on-Some-Routers-PSV-2017-2952 +CVE-2017-18784 - https://kb.netgear.com/000049535/Security-Advisory-for-Cross-Site-Scripting-on-Some-Routers-PSV-2017-2951 +CVE-2017-18788 - https://kb.netgear.com/000049527/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2947 +CVE-2017-18798 - https://kb.netgear.com/000049358/Security-Advisory-for-Security-Misconfiguration-Vulnerability-on-Some-Routers-and-Some-DSL-Modem-Routers-PSV-2017-2159 +CVE-2017-18800 - https://kb.netgear.com/000049356/Security-Advisory-for-Reflected-Cross-Site-Scripting-Vulnerability-on-R6700v2-and-R6800-PSV-2017-2162 +CVE-2017-18801 - https://kb.netgear.com/000049355/Security-Advisory-for-Command-Injection-Vulnerability-on-D7000-and-Some-Routers-PSV-2017-2151 +CVE-2017-18807 - https://kb.netgear.com/000049058/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-2001 +CVE-2017-18809 - https://kb.netgear.com/000049056/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0301 +CVE-2017-18810 - https://kb.netgear.com/000049055/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0300 +CVE-2017-18812 - https://kb.netgear.com/000049053/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0298 +CVE-2017-18813 - https://kb.netgear.com/000049052/Security-Advisory-for-Stored-Cross-Site-Scripting-Vulnerability-on-Some-ReadyNAS-Devices-PSV-2017-0296 +CVE-2017-18831 - https://kb.netgear.com/000049031/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Fully-Managed-Switches-PSV-2017-1952 +CVE-2017-18833 - https://kb.netgear.com/000049029/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Fully-Managed-Switches-PSV-2017-1955 +CVE-2017-18835 - https://kb.netgear.com/000049027/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Fully-Managed-Switches-PSV-2017-1957 +CVE-2017-18836 - https://kb.netgear.com/000049026/Security-Advisory-for-Denial-of-Service-on-Some-Fully-Managed-Switches-PSV-2017-1959 +CVE-2017-18841 - https://kb.netgear.com/000049018/Security-Advisory-for-Command-Injection-on-Some-Routers-and-a-Modem-Router-PSV-2017-2158 +CVE-2017-18844 - https://kb.netgear.com/000049015/Security-Advisory-for-an-Admin-Credential-Disclosure-on-Some-Routers-PSV-2017-2149 +CVE-2017-18849 - https://kb.netgear.com/000048999/Security-Advisory-for-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2017-1209 +CVE-2017-18851 - https://kb.netgear.com/000045850/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2017-1207 +CVE-2017-18852 - https://kb.netgear.com/000045849/Security-Advisory-for-CSRF-and-Authentication-Bypass-on-Some-Routers-PSV-2017-1206 +CVE-2017-18853 - https://kb.netgear.com/000045848/Security-Advisory-for-Password-Recovery-and-File-Access-on-Some-Routers-and-Modem-Routers-PSV-2017-0677 +CVE-2017-18854 - https://kb.netgear.com/000044333/Security-Advisory-for-Operating-System-Command-Injection-on-ReadyNAS-OS-6-Storage-Systems-PSV-2017-2002 +CVE-2017-18855 - https://kb.netgear.com/000038833/Security-Advisory-for-Unauthenticated-Command-Execution-on-WNR854T-PSV-2017-2317 +CVE-2017-18856 - https://kb.netgear.com/000044333/Security-Advisory-for-Operating-System-Command-Injection-on-ReadyNAS-OS-6-Storage-Systems-PSV-2017-2002 +CVE-2017-18857 - https://kb.netgear.com/000038799/Security-Fix-for-Password-Management-in-NETGEAR-Insight-App-PSV-2017-1978 +CVE-2017-18860 - https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857 +CVE-2017-18864 - https://kb.netgear.com/000051495/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Routers-PSV-2017-0791 +CVE-2017-18867 - https://kb.netgear.com/000049554/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2017-2198 +CVE-2017-18870 - https://mattermost.com/security-updates/ +CVE-2017-18871 - https://mattermost.com/security-updates/ +CVE-2017-18872 - https://mattermost.com/security-updates/ +CVE-2017-18873 - https://mattermost.com/security-updates/ +CVE-2017-18874 - https://mattermost.com/security-updates/ +CVE-2017-18875 - https://mattermost.com/security-updates/ +CVE-2017-18876 - https://mattermost.com/security-updates/ +CVE-2017-18877 - https://mattermost.com/security-updates/ +CVE-2017-18878 - https://mattermost.com/security-updates/ +CVE-2017-18879 - https://mattermost.com/security-updates/ +CVE-2017-18880 - https://mattermost.com/security-updates/ +CVE-2017-18881 - https://mattermost.com/security-updates/ +CVE-2017-18882 - https://mattermost.com/security-updates/ +CVE-2017-18883 - https://mattermost.com/security-updates/ +CVE-2017-18884 - https://mattermost.com/security-updates/ +CVE-2017-18885 - https://mattermost.com/security-updates/ +CVE-2017-18886 - https://mattermost.com/security-updates/ +CVE-2017-18887 - https://mattermost.com/security-updates/ +CVE-2017-18888 - https://mattermost.com/security-updates/ +CVE-2017-18889 - https://mattermost.com/security-updates/ +CVE-2017-18890 - https://mattermost.com/security-updates/ +CVE-2017-18891 - https://mattermost.com/security-updates/ +CVE-2017-18892 - https://mattermost.com/security-updates/ +CVE-2017-18893 - https://mattermost.com/security-updates/ +CVE-2017-18894 - https://mattermost.com/security-updates/ +CVE-2017-18895 - https://mattermost.com/security-updates/ +CVE-2017-18896 - https://mattermost.com/security-updates/ +CVE-2017-18897 - https://mattermost.com/security-updates/ +CVE-2017-18898 - https://mattermost.com/security-updates/ +CVE-2017-18899 - https://mattermost.com/security-updates/ +CVE-2017-18900 - https://mattermost.com/security-updates/ +CVE-2017-18901 - https://mattermost.com/security-updates/ +CVE-2017-18902 - https://mattermost.com/security-updates/ +CVE-2017-18903 - https://mattermost.com/security-updates/ +CVE-2017-18904 - https://mattermost.com/security-updates/ +CVE-2017-18905 - https://mattermost.com/security-updates/ +CVE-2017-18906 - https://mattermost.com/security-updates/ +CVE-2017-18907 - https://mattermost.com/security-updates/ +CVE-2017-18908 - https://mattermost.com/security-updates/ +CVE-2017-18909 - https://mattermost.com/security-updates/ +CVE-2017-18910 - https://mattermost.com/security-updates/ +CVE-2017-18911 - https://mattermost.com/security-updates/ +CVE-2017-18912 - https://mattermost.com/security-updates/ +CVE-2017-18913 - https://mattermost.com/security-updates/ +CVE-2017-18914 - https://mattermost.com/security-updates/ +CVE-2017-18915 - https://mattermost.com/security-updates/ +CVE-2017-18916 - https://mattermost.com/security-updates/ +CVE-2017-18917 - https://mattermost.com/security-updates/ +CVE-2017-18918 - https://mattermost.com/security-updates/ +CVE-2017-18919 - https://mattermost.com/security-updates/ +CVE-2017-18920 - https://mattermost.com/security-updates/ +CVE-2017-18921 - https://mattermost.com/security-updates/ +CVE-2017-18923 - https://beronet.atlassian.net/wiki/spaces/PUB/pages/88768529/Security+Issues +CVE-2017-18924 - https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467 +CVE-2017-18926 - https://www.openwall.com/lists/oss-security/2017/06/07/1 +CVE-2017-20004 - https://github.com/rust-lang/rust/pull/41624 +CVE-2017-20008 - https://wpscan.com/vulnerability/3175c56d-27bb-4bf1-b6ba-737541483d40 +CVE-2017-20011 - https://vuldb.com/?id.101969 +CVE-2017-20012 - https://vuldb.com/?id.101969 +CVE-2017-20012 - https://vuldb.com/?id.101970 +CVE-2017-20013 - https://vuldb.com/?id.101969 +CVE-2017-20013 - https://vuldb.com/?id.101971 +CVE-2017-20014 - https://vuldb.com/?id.101969 +CVE-2017-20014 - https://vuldb.com/?id.101972 +CVE-2017-20015 - https://vuldb.com/?id.101969 +CVE-2017-20015 - https://vuldb.com/?id.101973 +CVE-2017-20016 - https://vuldb.com/?id.101969 +CVE-2017-20016 - https://vuldb.com/?id.101974 +CVE-2017-20017 - https://vuldb.com/?id.105833 +CVE-2017-20018 - https://packetstormsecurity.com/files/142406/xampp-dllhijack.txt +CVE-2017-20019 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20020 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20021 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20022 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20023 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20024 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20025 - http://seclists.org/fulldisclosure/2017/Mar/58 +CVE-2017-20026 - http://seclists.org/fulldisclosure/2017/Mar/47 +CVE-2017-20027 - http://seclists.org/fulldisclosure/2017/Mar/47 +CVE-2017-20028 - http://seclists.org/fulldisclosure/2017/Mar/48 +CVE-2017-20029 - http://seclists.org/fulldisclosure/2017/Mar/45 +CVE-2017-20029 - https://vuldb.com/?id.98915 +CVE-2017-20030 - http://seclists.org/fulldisclosure/2017/Mar/45 +CVE-2017-20031 - http://seclists.org/fulldisclosure/2017/Mar/45 +CVE-2017-20031 - https://vuldb.com/?id.98917 +CVE-2017-20032 - http://seclists.org/fulldisclosure/2017/Mar/45 +CVE-2017-20033 - http://seclists.org/fulldisclosure/2017/Mar/46 +CVE-2017-20034 - http://seclists.org/fulldisclosure/2017/Mar/46 +CVE-2017-20035 - http://seclists.org/fulldisclosure/2017/Mar/46 +CVE-2017-20036 - http://seclists.org/fulldisclosure/2017/Mar/46 +CVE-2017-20041 - http://seclists.org/fulldisclosure/2017/Mar/36 +CVE-2017-20041 - https://vuldb.com/?id.98214 +CVE-2017-20042 - http://seclists.org/fulldisclosure/2017/Mar/24 +CVE-2017-20043 - http://seclists.org/fulldisclosure/2017/Mar/24 +CVE-2017-20044 - http://seclists.org/fulldisclosure/2017/Mar/24 +CVE-2017-20045 - http://seclists.org/fulldisclosure/2017/Mar/24 +CVE-2017-20046 - http://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20047 - http://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20047 - https://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20048 - http://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20048 - https://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20049 - http://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20050 - http://seclists.org/fulldisclosure/2017/Mar/41 +CVE-2017-20053 - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html +CVE-2017-20054 - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery___cross_site_scripting_in_contact_form_manager_wordpress_plugin.html +CVE-2017-20055 - http://seclists.org/fulldisclosure/2017/Feb/100 +CVE-2017-20055 - https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html +CVE-2017-20056 - https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_user_login_log_wordpress_plugin.html +CVE-2017-20056 - https://vuldb.com/?id.97386 +CVE-2017-20057 - http://seclists.org/fulldisclosure/2017/Feb/36 +CVE-2017-20058 - http://seclists.org/fulldisclosure/2017/Feb/36 +CVE-2017-20059 - http://seclists.org/fulldisclosure/2017/Feb/36 +CVE-2017-20060 - http://seclists.org/fulldisclosure/2017/Feb/36 +CVE-2017-20061 - http://seclists.org/fulldisclosure/2017/Feb/36 +CVE-2017-20062 - http://seclists.org/fulldisclosure/2017/Feb/37 +CVE-2017-20063 - http://seclists.org/fulldisclosure/2017/Feb/39 +CVE-2017-20064 - http://seclists.org/fulldisclosure/2017/Feb/39 +CVE-2017-20065 - https://vuldb.com/?id.97385 +CVE-2017-20065 - https://www.exploit-db.com/exploits/41485/ +CVE-2017-20066 - https://sumofpwn.nl/advisory/2016/wordpress_adminer_plugin_allows_public__local__database_login.html +CVE-2017-20067 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20068 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20069 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20070 - https://vuldb.com/?id.95410 +CVE-2017-20070 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20071 - https://vuldb.com/?id.95411 +CVE-2017-20071 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20072 - https://vuldb.com/?id.95412 +CVE-2017-20072 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20073 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20074 - https://vuldb.com/?id.95414 +CVE-2017-20074 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20075 - https://vuldb.com/?id.95415 +CVE-2017-20075 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20076 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20077 - https://vuldb.com/?id.95417 +CVE-2017-20077 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20078 - https://vuldb.com/?id.95418 +CVE-2017-20078 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20079 - https://vuldb.com/?id.95419 +CVE-2017-20079 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20080 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20081 - https://www.exploit-db.com/exploits/41044/ +CVE-2017-20082 - http://seclists.org/fulldisclosure/2017/Feb/18 +CVE-2017-20082 - https://vuldb.com/?id.96815 +CVE-2017-20083 - http://seclists.org/fulldisclosure/2017/Feb/18 +CVE-2017-20083 - https://vuldb.com/?id.96816 +CVE-2017-20084 - http://seclists.org/fulldisclosure/2017/Feb/18 +CVE-2017-20084 - https://vuldb.com/?id.96817 +CVE-2017-20100 - https://www.vulnerability-lab.com/get_content.php?id=2035 +CVE-2017-20101 - http://seclists.org/fulldisclosure/2017/Feb/58 +CVE-2017-20101 - https://youtu.be/Xc6Jg9I7Pj4 +CVE-2017-20102 - https://www.vulnerability-lab.com/get_content.php?id=2033 +CVE-2017-20103 - http://seclists.org/fulldisclosure/2017/Feb/67 +CVE-2017-20104 - http://seclists.org/bugtraq/2017/Feb/39 +CVE-2017-20104 - https://vuldb.com/?id.97252 +CVE-2017-20105 - http://seclists.org/bugtraq/2017/Feb/40 +CVE-2017-20106 - https://vuldb.com/?id.97265 +CVE-2017-20106 - https://www.vulnerability-lab.com/get_content.php?id=2030 +CVE-2017-20107 - http://seclists.org/fulldisclosure/2017/Feb/28 +CVE-2017-20107 - https://vuldb.com/?id.97122 +CVE-2017-20108 - http://seclists.org/fulldisclosure/2017/Feb/24 +CVE-2017-20109 - http://seclists.org/fulldisclosure/2017/Feb/13 +CVE-2017-20109 - https://vuldb.com/?id.96805 +CVE-2017-20110 - http://seclists.org/fulldisclosure/2017/Feb/13 +CVE-2017-20111 - http://seclists.org/fulldisclosure/2017/Feb/13 +CVE-2017-20112 - http://seclists.org/fulldisclosure/2017/Feb/14 +CVE-2017-20112 - https://vuldb.com/?id.96655 +CVE-2017-20113 - https://vuldb.com/?id.96627 +CVE-2017-20113 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20114 - https://vuldb.com/?id.96628 +CVE-2017-20114 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20115 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20116 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20117 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20118 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20119 - https://vuldb.com/?id.96633 +CVE-2017-20119 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20120 - https://www.exploit-db.com/exploits/41184/ +CVE-2017-20121 - https://vuldb.com/?id.97279 +CVE-2017-20123 - http://seclists.org/fulldisclosure/2017/Feb/1 +CVE-2017-20124 - https://vuldb.com/?id.96624 +CVE-2017-20124 - https://www.exploit-db.com/exploits/41182/ +CVE-2017-20125 - https://www.exploit-db.com/exploits/41181/ +CVE-2017-20126 - https://www.exploit-db.com/exploits/41166/ +CVE-2017-20127 - https://www.exploit-db.com/exploits/41167/ +CVE-2017-20128 - https://vuldb.com/?id.96619 +CVE-2017-20128 - https://www.exploit-db.com/exploits/41168/ +CVE-2017-20130 - https://www.exploit-db.com/exploits/41195/ +CVE-2017-20131 - https://vuldb.com/?id.96288 +CVE-2017-20131 - https://www.exploit-db.com/exploits/41194/ +CVE-2017-20132 - https://www.exploit-db.com/exploits/41193/ +CVE-2017-20134 - https://www.exploit-db.com/exploits/41191/ +CVE-2017-20135 - https://www.exploit-db.com/exploits/41190/ +CVE-2017-20136 - https://www.exploit-db.com/exploits/41189/ +CVE-2017-20137 - https://vuldb.com/?id.96281 +CVE-2017-20137 - https://www.exploit-db.com/exploits/41188/ +CVE-2017-20139 - https://www.exploit-db.com/exploits/41155/ +CVE-2017-20140 - https://www.exploit-db.com/exploits/41155/ +CVE-2017-20141 - https://vuldb.com/?id.96255 +CVE-2017-20141 - https://www.exploit-db.com/exploits/41155/ +CVE-2017-20142 - https://www.exploit-db.com/exploits/41155/ +CVE-2017-20143 - https://vuldb.com/?id.96257 +CVE-2017-20143 - https://www.exploit-db.com/exploits/41155/ +CVE-2017-20144 - https://www.vulnerability-lab.com/get_content.php?id=2029 +CVE-2017-20145 - http://seclists.org/fulldisclosure/2017/Feb/19 +CVE-2017-20146 - https://github.com/gorilla/handlers/pull/116 +CVE-2017-20149 - https://github.com/BigNerd95/Chimay-Red +CVE-2017-20149 - https://www.bleepingcomputer.com/news/security/hajime-botnet-makes-a-comeback-with-massive-scan-for-mikrotik-routers/ +CVE-2017-20152 - https://github.com/aerouk/imageserve/pull/27 +CVE-2017-20153 - https://github.com/aerouk/imageserve/pull/27 +CVE-2017-20154 - https://github.com/ghostlander/Phoenixcoin/releases/tag/v0.6.6.1-pxc +CVE-2017-20162 - https://github.com/vercel/ms/pull/89 +CVE-2017-20183 - https://github.com/zzxiang/external-media-without-import/releases/tag/v1.0.1 +CVE-2017-20184 - https://www.exploit-db.com/exploits/42705 +CVE-2017-20189 - https://clojure.atlassian.net/browse/CLJ-2204 +CVE-2017-20189 - https://github.com/frohoff/ysoserial/pull/68/files +CVE-2017-20189 - https://hackmd.io/@fe1w0/HyefvRQKp +CVE-2017-20189 - https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378 +CVE-2017-2096 - http://jvn.jp/en/jp/JVN50197114/index.html +CVE-2017-2122 - https://www.tenable.com/security/tns-2017-01 +CVE-2017-2137 - https://kb.netgear.com/000038443/Security-Advisory-for-Insecure-SOAP-Access-in-ProSAFE-Plus-Configuration-Utility-PSV-2017-1997 +CVE-2017-2168 - https://wpvulndb.com/vulnerabilities/8830 +CVE-2017-2176 - http://www.mod.go.jp/asdf/information/index.html +CVE-2017-2178 - http://www.mod.go.jp/atla/souhon/cals/nyusatsu_top.html +CVE-2017-2195 - https://wpvulndb.com/vulnerabilities/8844 +CVE-2017-2208 - http://www.mod.go.jp/atla/souhon/cals/nyusatsu_top.html +CVE-2017-2224 - https://wpvulndb.com/vulnerabilities/8859 +CVE-2017-2284 - https://wpvulndb.com/vulnerabilities/8878 +CVE-2017-2285 - https://wpvulndb.com/vulnerabilities/8879 +CVE-2017-2353 - https://www.exploit-db.com/exploits/41164/ +CVE-2017-2360 - https://www.exploit-db.com/exploits/41165/ +CVE-2017-2361 - https://www.exploit-db.com/exploits/41443/ +CVE-2017-2362 - https://www.exploit-db.com/exploits/41213/ +CVE-2017-2363 - https://www.exploit-db.com/exploits/41449/ +CVE-2017-2364 - https://www.exploit-db.com/exploits/41799/ +CVE-2017-2365 - https://www.exploit-db.com/exploits/41453/ +CVE-2017-2367 - https://www.exploit-db.com/exploits/41801/ +CVE-2017-2369 - https://www.exploit-db.com/exploits/41215/ +CVE-2017-2370 - https://www.exploit-db.com/exploits/41163/ +CVE-2017-2371 - https://www.exploit-db.com/exploits/41451/ +CVE-2017-2373 - https://www.exploit-db.com/exploits/41216/ +CVE-2017-2380 - http://www.securityfocus.com/bid/97138 +CVE-2017-2384 - http://www.securityfocus.com/bid/97138 +CVE-2017-2393 - http://www.securityfocus.com/bid/97138 +CVE-2017-2397 - http://www.securityfocus.com/bid/97138 +CVE-2017-2399 - http://www.securityfocus.com/bid/97138 +CVE-2017-2400 - http://www.securityfocus.com/bid/97138 +CVE-2017-2404 - http://www.securityfocus.com/bid/97138 +CVE-2017-2412 - http://www.securityfocus.com/bid/97138 +CVE-2017-2414 - http://www.securityfocus.com/bid/97138 +CVE-2017-2416 - https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/ +CVE-2017-2426 - https://s1gnalcha0s.github.io/ibooks/epub/2017/03/27/This-book-reads-you-using-JavaScript.html +CVE-2017-2434 - http://www.securityfocus.com/bid/97138 +CVE-2017-2442 - https://www.exploit-db.com/exploits/41800/ +CVE-2017-2443 - https://www.exploit-db.com/exploits/41790/ +CVE-2017-2445 - https://www.exploit-db.com/exploits/41802/ +CVE-2017-2446 - https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/ +CVE-2017-2446 - https://www.exploit-db.com/exploits/41741/ +CVE-2017-2446 - https://www.exploit-db.com/exploits/41742/ +CVE-2017-2447 - https://www.exploit-db.com/exploits/41743/ +CVE-2017-2452 - http://www.securityfocus.com/bid/97138 +CVE-2017-2454 - https://www.exploit-db.com/exploits/41807/ +CVE-2017-2455 - https://www.exploit-db.com/exploits/41809/ +CVE-2017-2456 - https://www.exploit-db.com/exploits/41778/ +CVE-2017-2457 - https://www.exploit-db.com/exploits/41803/ +CVE-2017-2459 - https://www.exploit-db.com/exploits/41810/ +CVE-2017-2460 - https://www.exploit-db.com/exploits/41811/ +CVE-2017-2464 - https://www.exploit-db.com/exploits/41931/ +CVE-2017-2466 - https://www.exploit-db.com/exploits/41812/ +CVE-2017-2468 - https://www.exploit-db.com/exploits/41868/ +CVE-2017-2469 - https://www.exploit-db.com/exploits/41869/ +CVE-2017-2470 - https://www.exploit-db.com/exploits/41867/ +CVE-2017-2471 - https://www.exploit-db.com/exploits/41813/ +CVE-2017-2472 - https://www.exploit-db.com/exploits/41791/ +CVE-2017-2473 - https://www.exploit-db.com/exploits/41792/ +CVE-2017-2474 - https://www.exploit-db.com/exploits/41793/ +CVE-2017-2476 - https://www.exploit-db.com/exploits/41814/ +CVE-2017-2478 - https://www.exploit-db.com/exploits/41794/ +CVE-2017-2479 - https://www.exploit-db.com/exploits/41866/ +CVE-2017-2480 - https://www.exploit-db.com/exploits/41865/ +CVE-2017-2482 - https://www.exploit-db.com/exploits/41796/ +CVE-2017-2483 - https://www.exploit-db.com/exploits/41797/ +CVE-2017-2484 - http://www.securityfocus.com/bid/97138 +CVE-2017-2489 - https://www.exploit-db.com/exploits/41798/ +CVE-2017-2490 - https://www.exploit-db.com/exploits/41804/ +CVE-2017-2491 - https://www.exploit-db.com/exploits/41964/ +CVE-2017-2495 - http://www.securityfocus.com/bid/98474 +CVE-2017-2496 - http://www.securityfocus.com/bid/98474 +CVE-2017-2501 - https://www.exploit-db.com/exploits/42054/ +CVE-2017-2504 - https://www.exploit-db.com/exploits/42064/ +CVE-2017-2506 - http://www.securityfocus.com/bid/98474 +CVE-2017-2508 - http://www.securityfocus.com/bid/98474 +CVE-2017-2508 - https://www.exploit-db.com/exploits/42066/ +CVE-2017-2509 - https://www.exploit-db.com/exploits/42046/ +CVE-2017-2510 - http://www.securityfocus.com/bid/98474 +CVE-2017-2510 - https://www.exploit-db.com/exploits/42067/ +CVE-2017-2514 - http://www.securityfocus.com/bid/98474 +CVE-2017-2514 - https://www.exploit-db.com/exploits/42063/ +CVE-2017-2515 - https://www.exploit-db.com/exploits/42068/ +CVE-2017-2516 - https://www.exploit-db.com/exploits/42047/ +CVE-2017-2521 - https://www.exploit-db.com/exploits/42103/ +CVE-2017-2522 - https://www.exploit-db.com/exploits/42049/ +CVE-2017-2523 - https://www.exploit-db.com/exploits/42050/ +CVE-2017-2524 - https://www.exploit-db.com/exploits/42051/ +CVE-2017-2526 - http://www.securityfocus.com/bid/98474 +CVE-2017-2527 - https://www.exploit-db.com/exploits/42052/ +CVE-2017-2528 - http://www.securityfocus.com/bid/98474 +CVE-2017-2528 - https://www.exploit-db.com/exploits/42105/ +CVE-2017-2531 - https://www.exploit-db.com/exploits/42104/ +CVE-2017-2533 - https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc +CVE-2017-2533 - https://www.exploit-db.com/exploits/42146/ +CVE-2017-2536 - https://www.exploit-db.com/exploits/42125/ +CVE-2017-2538 - http://www.securityfocus.com/bid/98474 +CVE-2017-2539 - http://www.securityfocus.com/bid/98474 +CVE-2017-2544 - http://www.securityfocus.com/bid/98474 +CVE-2017-2547 - http://www.securityfocus.com/bid/98474 +CVE-2017-2547 - https://www.exploit-db.com/exploits/42190/ +CVE-2017-2619 - https://bugzilla.redhat.com/show_bug.cgi?id=1429472 +CVE-2017-2619 - https://www.exploit-db.com/exploits/41740/ +CVE-2017-2619 - https://www.samba.org/samba/security/CVE-2017-2619.html +CVE-2017-2624 - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ +CVE-2017-2625 - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ +CVE-2017-2626 - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ +CVE-2017-2636 - http://www.openwall.com/lists/oss-security/2017/03/07/6 +CVE-2017-2636 - https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html +CVE-2017-2641 - https://moodle.org/mod/forum/discuss.php?d=349419 +CVE-2017-2641 - https://www.exploit-db.com/exploits/41828/ +CVE-2017-2662 - https://access.redhat.com/errata/RHSA-2021:1313 +CVE-2017-2671 - https://github.com/danieljiang0415/android_kernel_crash_poc +CVE-2017-2671 - https://www.exploit-db.com/exploits/42135/ +CVE-2017-2741 - https://www.exploit-db.com/exploits/42176/ +CVE-2017-2741 - https://www.exploit-db.com/exploits/45273/ +CVE-2017-2779 - https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html +CVE-2017-2780 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0276 +CVE-2017-2781 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0277 +CVE-2017-2782 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0278 +CVE-2017-2783 - http://www.talosintelligence.com/reports/TALOS-2017-0279/ +CVE-2017-2784 - http://www.talosintelligence.com/reports/TALOS-2017-0274/ +CVE-2017-2791 - http://www.talosintelligence.com/reports/TALOS-2016-0199/ +CVE-2017-2792 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0284 +CVE-2017-2794 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0286 +CVE-2017-2795 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0288 +CVE-2017-2797 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0290 +CVE-2017-2798 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0291 +CVE-2017-2799 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0292 +CVE-2017-2800 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0293 +CVE-2017-2800 - https://www.exploit-db.com/exploits/41984/ +CVE-2017-2804 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0298 +CVE-2017-2805 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0299 +CVE-2017-2807 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0303 +CVE-2017-2808 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0304 +CVE-2017-2809 - https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04 +CVE-2017-2809 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305 +CVE-2017-2810 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307 +CVE-2017-2814 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311 +CVE-2017-2817 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0318 +CVE-2017-2818 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319 +CVE-2017-2819 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0320 +CVE-2017-2820 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321 +CVE-2017-2821 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0322 +CVE-2017-2823 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0324 +CVE-2017-2824 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 +CVE-2017-2825 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326 +CVE-2017-2826 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 +CVE-2017-2827 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0328 +CVE-2017-2828 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0329 +CVE-2017-2829 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330 +CVE-2017-2830 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0331 +CVE-2017-2831 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0332 +CVE-2017-2832 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0335 +CVE-2017-2833 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334 +CVE-2017-2834 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336 +CVE-2017-2835 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337 +CVE-2017-2836 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338 +CVE-2017-2837 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339 +CVE-2017-2838 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340 +CVE-2017-2839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341 +CVE-2017-2841 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0343 +CVE-2017-2842 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0344 +CVE-2017-2843 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0345 +CVE-2017-2844 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0346 +CVE-2017-2845 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0347 +CVE-2017-2846 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0348 +CVE-2017-2847 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0349 +CVE-2017-2848 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0350 +CVE-2017-2849 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351 +CVE-2017-2850 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0352 +CVE-2017-2851 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0353 +CVE-2017-2853 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0355 +CVE-2017-2854 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0357 +CVE-2017-2855 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0358 +CVE-2017-2856 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0359 +CVE-2017-2857 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0360 +CVE-2017-2861 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0365 +CVE-2017-2863 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0367 +CVE-2017-2867 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0373 +CVE-2017-2868 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0374 +CVE-2017-2869 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0375 +CVE-2017-2871 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0378 +CVE-2017-2872 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0379 +CVE-2017-2873 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0380 +CVE-2017-2874 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0381 +CVE-2017-2875 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0382 +CVE-2017-2876 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0383 +CVE-2017-2877 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0384 +CVE-2017-2878 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0385 +CVE-2017-2879 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0386 +CVE-2017-2882 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0389 +CVE-2017-2883 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0390 +CVE-2017-2885 - http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html +CVE-2017-2885 - http://seclists.org/fulldisclosure/2020/Dec/3 +CVE-2017-2885 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392 +CVE-2017-2890 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0397 +CVE-2017-2891 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0398 +CVE-2017-2892 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0399 +CVE-2017-2893 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0400 +CVE-2017-2894 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0401 +CVE-2017-2895 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0402 +CVE-2017-2896 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0403 +CVE-2017-2897 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0404 +CVE-2017-2898 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 +CVE-2017-2899 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0406 +CVE-2017-2900 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0407 +CVE-2017-2901 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0408 +CVE-2017-2902 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0409 +CVE-2017-2903 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0410 +CVE-2017-2904 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0411 +CVE-2017-2905 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412 +CVE-2017-2906 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413 +CVE-2017-2907 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414 +CVE-2017-2908 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0415 +CVE-2017-2910 - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0417 +CVE-2017-2915 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0422 +CVE-2017-2916 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0423 +CVE-2017-2917 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0424 +CVE-2017-2918 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0425 +CVE-2017-2919 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0426 +CVE-2017-2921 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0428 +CVE-2017-2922 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0429 +CVE-2017-2930 - http://packetstormsecurity.com/files/140463/Adobe-Flash-24.0.0.186-Code-Execution.html +CVE-2017-2930 - https://www.exploit-db.com/exploits/41008/ +CVE-2017-2930 - https://www.exploit-db.com/exploits/41012/ +CVE-2017-2931 - https://www.exploit-db.com/exploits/41608/ +CVE-2017-2932 - https://www.exploit-db.com/exploits/41609/ +CVE-2017-2933 - https://www.exploit-db.com/exploits/41610/ +CVE-2017-2934 - https://www.exploit-db.com/exploits/41611/ +CVE-2017-2935 - https://www.exploit-db.com/exploits/41612/ +CVE-2017-2985 - https://www.exploit-db.com/exploits/41422/ +CVE-2017-2986 - https://www.exploit-db.com/exploits/41423/ +CVE-2017-2988 - https://www.exploit-db.com/exploits/41421/ +CVE-2017-2992 - https://www.exploit-db.com/exploits/41420/ +CVE-2017-3006 - http://hyp3rlinx.altervista.org/advisories/ADOBE-CREATIVE-CLOUD-PRIVILEGE-ESCALATION.txt +CVE-2017-3006 - https://www.exploit-db.com/exploits/41878/ +CVE-2017-3011 - http://www.securityfocus.com/bid/97548 +CVE-2017-3012 - http://www.securityfocus.com/bid/97547 +CVE-2017-3013 - http://www.securityfocus.com/bid/97547 +CVE-2017-3034 - http://www.securityfocus.com/bid/97548 +CVE-2017-3042 - http://www.securityfocus.com/bid/97549 +CVE-2017-3048 - http://www.securityfocus.com/bid/97549 +CVE-2017-3049 - http://www.securityfocus.com/bid/97549 +CVE-2017-3055 - http://www.securityfocus.com/bid/97549 +CVE-2017-3061 - https://www.exploit-db.com/exploits/42018/ +CVE-2017-3064 - https://www.exploit-db.com/exploits/42019/ +CVE-2017-3066 - https://www.exploit-db.com/exploits/43993/ +CVE-2017-3068 - https://www.exploit-db.com/exploits/42017/ +CVE-2017-3076 - https://www.exploit-db.com/exploits/42247/ +CVE-2017-3077 - https://www.exploit-db.com/exploits/42248/ +CVE-2017-3078 - https://www.exploit-db.com/exploits/42249/ +CVE-2017-3106 - https://www.exploit-db.com/exploits/42480/ +CVE-2017-3126 - https://fortiguard.com/psirt/FG-IR-17-014 +CVE-2017-3128 - https://fortiguard.com/psirt/FG-IR-17-057 +CVE-2017-3130 - https://fortiguard.com/advisory/FG-IR-17-073 +CVE-2017-3131 - https://fortiguard.com/advisory/FG-IR-17-104 +CVE-2017-3131 - https://www.exploit-db.com/exploits/42388/ +CVE-2017-3132 - https://fortiguard.com/advisory/FG-IR-17-104 +CVE-2017-3132 - https://www.exploit-db.com/exploits/42388/ +CVE-2017-3133 - https://fortiguard.com/advisory/FG-IR-17-104 +CVE-2017-3133 - https://www.exploit-db.com/exploits/42388/ +CVE-2017-3141 - https://www.exploit-db.com/exploits/42121/ +CVE-2017-3157 - https://www.openoffice.org/security/cves/CVE-2017-3157.html +CVE-2017-3160 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-3164 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-3165 - https://brooklyn.apache.org/community/security/CVE-2017-3165.html +CVE-2017-3167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3169 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3169 - https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 +CVE-2017-3183 - https://www.kb.cert.org/vuls/id/742632 +CVE-2017-3184 - https://www.kb.cert.org/vuls/id/355151 +CVE-2017-3185 - https://www.kb.cert.org/vuls/id/355151 +CVE-2017-3186 - https://www.kb.cert.org/vuls/id/355151 +CVE-2017-3187 - https://www.kb.cert.org/vuls/id/168699 +CVE-2017-3188 - https://www.kb.cert.org/vuls/id/168699 +CVE-2017-3189 - https://www.kb.cert.org/vuls/id/168699 +CVE-2017-3191 - https://www.kb.cert.org/vuls/id/553503 +CVE-2017-3191 - https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ +CVE-2017-3192 - https://www.kb.cert.org/vuls/id/553503 +CVE-2017-3192 - https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ +CVE-2017-3193 - https://www.kb.cert.org/vuls/id/305448 +CVE-2017-3194 - https://www.scmagazine.com/pandora-apple-app-vulnerable-to-mitm-attacks/article/647106/ +CVE-2017-3195 - http://redr2e.com/commvault-edge-cve-2017-3195/ +CVE-2017-3195 - https://www.exploit-db.com/exploits/41823/ +CVE-2017-3195 - https://www.kb.cert.org/vuls/id/214283 +CVE-2017-3196 - http://blog.rewolf.pl/blog/?p=1778 +CVE-2017-3196 - https://www.itsecuritynews.info/vuln-printing-communications-association-rawether-cve-2017-3196-local-privilege-escalation-vulnerability/ +CVE-2017-3196 - https://www.kb.cert.org/vuls/id/600671 +CVE-2017-3197 - https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2017-01-002.md +CVE-2017-3197 - https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html +CVE-2017-3197 - https://www.kb.cert.org/vuls/id/507496 +CVE-2017-3198 - https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html +CVE-2017-3198 - https://www.kb.cert.org/vuls/id/507496 +CVE-2017-3199 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3199 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3199 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3200 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3200 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3200 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3201 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3201 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3201 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3202 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3202 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3202 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3203 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3203 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3203 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3206 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3206 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3206 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3207 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3207 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3207 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3208 - http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution +CVE-2017-3208 - https://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-3208 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-3209 - https://www.kb.cert.org/vuls/id/334207 +CVE-2017-3216 - http://www.kb.cert.org/vuls/id/350135 +CVE-2017-3218 - https://www.kb.cert.org/vuls/id/846320 +CVE-2017-3219 - https://www.kb.cert.org/vuls/id/489392 +CVE-2017-3223 - https://www.kb.cert.org/vuls/id/547255 +CVE-2017-3224 - https://www.kb.cert.org/vuls/id/793496 +CVE-2017-3225 - https://www.kb.cert.org/vuls/id/166743 +CVE-2017-3226 - https://www.kb.cert.org/vuls/id/166743 +CVE-2017-3230 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3231 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3232 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3233 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3234 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3235 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3236 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3237 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3238 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3239 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3240 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3241 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3241 - https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/ +CVE-2017-3241 - https://www.exploit-db.com/exploits/41145/ +CVE-2017-3242 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3243 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3244 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3245 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3246 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3247 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3248 - http://packetstormsecurity.com/files/152357/Oracle-Weblogic-Server-Deserialization-RMI-UnicastRef-Remote-Code-Execution.html +CVE-2017-3248 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3248 - https://www.exploit-db.com/exploits/44998/ +CVE-2017-3248 - https://www.tenable.com/security/research/tra-2017-07 +CVE-2017-3249 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3250 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3251 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3252 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3253 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3254 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3255 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3256 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3257 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3258 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3259 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3260 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3261 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3262 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3263 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3264 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3265 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3266 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3267 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3268 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3269 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3270 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3271 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3272 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3273 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3274 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3275 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3276 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3277 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3278 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3279 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3280 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3281 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3282 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3283 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3284 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3285 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3286 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3287 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3288 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3289 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3290 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3291 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3292 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3293 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3294 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3294 - https://www.tenable.com/security/research/tra-2017-03 +CVE-2017-3295 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3295 - https://www.tenable.com/security/research/tra-2017-03 +CVE-2017-3296 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3297 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3298 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3299 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3300 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3300 - https://erpscan.io/advisories/erpscan-17-005-oracle-peoplesoft-xss-vulnerability/ +CVE-2017-3301 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3302 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3303 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3304 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3305 - http://riddle.link/ +CVE-2017-3305 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3306 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3307 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3308 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3309 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3310 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3311 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3312 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3313 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3314 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3315 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3316 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3316 - https://www.exploit-db.com/exploits/41196/ +CVE-2017-3317 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3318 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3319 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3320 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3321 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3322 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3323 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3324 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3325 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3326 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3327 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3328 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3329 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3330 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3331 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3332 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3333 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3334 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3335 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3336 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3337 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3338 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3339 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3340 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3341 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3342 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3343 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3344 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3345 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3346 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3347 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3348 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3349 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3350 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3351 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3352 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3353 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3354 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3355 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3356 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3357 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3358 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3359 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3360 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3361 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3362 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3363 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3364 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3365 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3366 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3367 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3368 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3369 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3370 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3371 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3372 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3373 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3374 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3375 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3376 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3377 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3378 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3379 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3380 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3381 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3382 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3383 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3384 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3385 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3386 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3387 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3388 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3389 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3390 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3391 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3392 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3393 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3394 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3395 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3396 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3397 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3398 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3399 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3400 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3401 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3402 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3403 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3404 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3405 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3406 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3407 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3408 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3409 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3410 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3411 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3412 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3413 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3414 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3415 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3416 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3417 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3418 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3419 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3420 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3421 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3422 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3423 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3424 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3425 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3426 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3427 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3428 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3429 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3430 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3431 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3432 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3433 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3434 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3435 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3436 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3437 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3438 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3439 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3440 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3441 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3442 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3443 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html +CVE-2017-3444 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3445 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3446 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3450 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3451 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3452 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3453 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3454 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3455 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3456 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3457 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3458 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3459 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3460 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3461 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3462 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3463 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3464 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3465 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3467 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3468 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3469 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3470 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3471 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3472 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3473 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3474 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3475 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3476 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3477 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3478 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3479 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3480 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3481 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3482 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3483 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3484 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3485 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3486 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3487 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3488 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3489 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3490 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3491 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3492 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3493 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3494 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3495 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3496 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3497 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3498 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3499 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3500 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3501 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3502 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3503 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3504 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3505 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3506 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3507 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3508 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3509 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3510 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3511 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3512 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3513 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3514 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3515 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3516 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3517 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3518 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3519 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3520 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3521 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3522 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3523 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3524 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3525 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3526 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3527 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3528 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3528 - https://www.exploit-db.com/exploits/43592/ +CVE-2017-3529 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3530 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3531 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3531 - https://www.tenable.com/security/research/tra-2017-16 +CVE-2017-3532 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3533 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3534 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3535 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3536 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3537 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3538 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3539 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3540 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3541 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3542 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3543 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3544 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3545 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3546 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3546 - https://erpscan.io/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/ +CVE-2017-3546 - https://www.exploit-db.com/exploits/42034/ +CVE-2017-3547 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3547 - https://erpscan.io/advisories/erpscan-17-023-crlf-injection-peoplesoft-imservlet/ +CVE-2017-3548 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3548 - https://erpscan.io/advisories/erpscan-17-020-xxe-via-doctype-peoplesoft/ +CVE-2017-3548 - https://www.exploit-db.com/exploits/41925/ +CVE-2017-3549 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3549 - https://erpscan.io/advisories/erpscan-17-021-sql-injection-e-business-suite-iesfootprint/ +CVE-2017-3549 - https://www.exploit-db.com/exploits/41926/ +CVE-2017-3550 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3551 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3552 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3553 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3554 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3555 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3555 - https://erpscan.io/advisories/erpscan-17-024-dos-oracle-e-business-suite-anonymouslogin/ +CVE-2017-3556 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3556 - https://erpscan.io/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/ +CVE-2017-3557 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3558 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3558 - https://www.exploit-db.com/exploits/41904/ +CVE-2017-3559 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3560 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3561 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3561 - https://www.exploit-db.com/exploits/41905/ +CVE-2017-3562 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3563 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3563 - https://www.exploit-db.com/exploits/41908/ +CVE-2017-3564 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3565 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3567 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3568 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3569 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3570 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3571 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3572 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3573 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3574 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3575 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3575 - https://www.exploit-db.com/exploits/41906/ +CVE-2017-3576 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3576 - https://www.exploit-db.com/exploits/41907/ +CVE-2017-3577 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3578 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3579 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3580 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3581 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3582 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3583 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3584 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3585 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3586 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3587 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3587 - https://www.exploit-db.com/exploits/41932/ +CVE-2017-3588 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3589 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3590 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3591 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3592 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3593 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3594 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3595 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3596 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3597 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3598 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3599 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3599 - https://www.exploit-db.com/exploits/41954/ +CVE-2017-3599 - https://www.secforce.com/blog/2017/04/cve-2017-3599-pre-auth-mysql-remote-dos/ +CVE-2017-3600 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3601 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3602 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3603 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3604 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3605 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3606 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3607 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3608 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3609 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3610 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3611 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3612 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3613 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3614 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3615 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3616 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3617 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3618 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3619 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3620 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3621 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3622 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3622 - https://www.exploit-db.com/exploits/45479/ +CVE-2017-3623 - http://packetstormsecurity.com/files/155876/EBBISLAND-EBBSHAVE-6100-09-04-1441-Remote-Buffer-Overflow.html +CVE-2017-3623 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3625 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3626 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html +CVE-2017-3629 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html +CVE-2017-3629 - https://www.exploit-db.com/exploits/42270/ +CVE-2017-3629 - https://www.exploit-db.com/exploits/45625/ +CVE-2017-3630 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html +CVE-2017-3630 - https://www.exploit-db.com/exploits/42270/ +CVE-2017-3630 - https://www.exploit-db.com/exploits/45625/ +CVE-2017-3631 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html +CVE-2017-3631 - https://www.exploit-db.com/exploits/42270/ +CVE-2017-3631 - https://www.exploit-db.com/exploits/45625/ +CVE-2017-3632 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3633 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3633 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-3634 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3635 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3636 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3637 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3638 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3639 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3640 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3641 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3642 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3643 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3644 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3645 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3646 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3647 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3648 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3649 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3650 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3651 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3652 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3653 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3730 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3730 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3730 - https://www.exploit-db.com/exploits/41192/ +CVE-2017-3731 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3731 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3731 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3732 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3732 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-3732 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3733 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3733 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-3735 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3735 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-3735 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-3735 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-3735 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-3735 - https://www.tenable.com/security/tns-2017-14 +CVE-2017-3735 - https://www.tenable.com/security/tns-2017-15 +CVE-2017-3736 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3736 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-3736 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-3736 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-3736 - https://www.tenable.com/security/tns-2017-14 +CVE-2017-3736 - https://www.tenable.com/security/tns-2017-15 +CVE-2017-3737 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3737 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-3738 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-3738 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-3738 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-3738 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-3738 - https://www.tenable.com/security/tns-2018-04 +CVE-2017-3738 - https://www.tenable.com/security/tns-2018-06 +CVE-2017-3738 - https://www.tenable.com/security/tns-2018-07 +CVE-2017-3807 - https://www.exploit-db.com/exploits/41369/ +CVE-2017-3813 - https://www.exploit-db.com/exploits/41476/ +CVE-2017-3823 - https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html +CVE-2017-3881 - https://www.exploit-db.com/exploits/41872/ +CVE-2017-3881 - https://www.exploit-db.com/exploits/41874/ +CVE-2017-3891 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 +CVE-2017-3892 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 +CVE-2017-3893 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 +CVE-2017-3912 - https://kc.mcafee.com/corporate/index?page=content&id=SB10224 +CVE-2017-3980 - https://kc.mcafee.com/corporate/index?page=content&id=SB10196 +CVE-2017-4898 - http://www.vmware.com/security/advisories/VMSA-2017-0003.html +CVE-2017-4899 - http://www.vmware.com/security/advisories/VMSA-2017-0003.html +CVE-2017-4900 - http://www.vmware.com/security/advisories/VMSA-2017-0003.html +CVE-2017-4907 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4908 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4909 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4910 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4911 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4912 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4913 - http://www.vmware.com/security/advisories/VMSA-2017-0008.html +CVE-2017-4914 - http://www.vmware.com/security/advisories/VMSA-2017-0010.html +CVE-2017-4914 - https://www.exploit-db.com/exploits/42152/ +CVE-2017-4915 - https://www.exploit-db.com/exploits/42045/ +CVE-2017-4916 - https://www.exploit-db.com/exploits/42140/ +CVE-2017-4917 - http://www.vmware.com/security/advisories/VMSA-2017-0010.html +CVE-2017-4918 - https://www.vmware.com/security/advisories/VMSA-2017-0011.html +CVE-2017-4924 - https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html +CVE-2017-4930 - https://www.vmware.com/us/security/advisories/VMSA-2017-0016.html +CVE-2017-4931 - https://www.vmware.com/us/security/advisories/VMSA-2017-0016.html +CVE-2017-4932 - https://www.vmware.com/us/security/advisories/VMSA-2017-0016.html +CVE-2017-5005 - https://github.com/payatu/QuickHeal +CVE-2017-5031 - https://bugzilla.mozilla.org/show_bug.cgi?id=1328762 +CVE-2017-5116 - https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html +CVE-2017-5123 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51 +CVE-2017-5124 - https://github.com/Bo0oM/CVE-2017-5124 +CVE-2017-5124 - https://www.reddit.com/r/netsec/comments/7cus2h/chrome_61_uxss_exploit_cve20175124/ +CVE-2017-5130 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-5135 - https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication_bypass/ +CVE-2017-5173 - https://www.exploit-db.com/exploits/41360/ +CVE-2017-5174 - https://www.exploit-db.com/exploits/41360/ +CVE-2017-5177 - https://www.exploit-db.com/exploits/42693/ +CVE-2017-5179 - https://www.tenable.com/security/tns-2017-01 +CVE-2017-5184 - https://www.tenable.com/security/research/tra-2017-15 +CVE-2017-5185 - https://www.tenable.com/security/research/tra-2017-15 +CVE-2017-5198 - http://blog.0xlabs.com/2017/03/solarwinds-lem-ssh-jailbreak-and.html +CVE-2017-5199 - http://blog.0xlabs.com/2017/03/solarwinds-lem-ssh-jailbreak-and.html +CVE-2017-5204 - https://hackerone.com/reports/202960 +CVE-2017-5206 - https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51 +CVE-2017-5206 - https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e +CVE-2017-5207 - https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc +CVE-2017-5207 - https://github.com/netblue30/firejail/issues/1023 +CVE-2017-5214 - https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt +CVE-2017-5215 - https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt +CVE-2017-5218 - http://research.aurainfosec.io/disclosures/sagecrm-CVE-2017-5219-CVE-2017-5218/ +CVE-2017-5219 - http://research.aurainfosec.io/disclosures/sagecrm-CVE-2017-5219-CVE-2017-5218/ +CVE-2017-5223 - https://www.exploit-db.com/exploits/43056/ +CVE-2017-5225 - http://bugzilla.maptools.org/show_bug.cgi?id=2656 +CVE-2017-5225 - http://bugzilla.maptools.org/show_bug.cgi?id=2657 +CVE-2017-5226 - https://github.com/projectatomic/bubblewrap/issues/142 +CVE-2017-5227 - https://www.exploit-db.com/exploits/41745/ +CVE-2017-5227 - https://www.qnap.com/en/support/con_show.php?cid=113 +CVE-2017-5244 - https://www.seekurity.com/blog/general/metasploit-web-project-kill-all-running-tasks-csrf-CVE-2017-5244/ +CVE-2017-5255 - https://www.exploit-db.com/exploits/43413/ +CVE-2017-5264 - https://www.exploit-db.com/exploits/43911/ +CVE-2017-5329 - https://www.exploit-db.com/exploits/41176/ +CVE-2017-5340 - https://bugs.php.net/bug.php?id=73832 +CVE-2017-5340 - https://hackerone.com/reports/195950 +CVE-2017-5341 - https://hackerone.com/reports/202965 +CVE-2017-5342 - https://hackerone.com/reports/202968 +CVE-2017-5344 - http://seclists.org/fulldisclosure/2017/Feb/34 +CVE-2017-5344 - https://www.exploit-db.com/exploits/41377/ +CVE-2017-5346 - http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.html +CVE-2017-5358 - http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt +CVE-2017-5358 - http://packetstormsecurity.com/files/141299/EasyCom-AS400-PHP-API-Buffer-Overflow.html +CVE-2017-5358 - http://seclists.org/fulldisclosure/2017/Feb/60 +CVE-2017-5358 - https://www.exploit-db.com/exploits/41425/ +CVE-2017-5359 - http://hyp3rlinx.altervista.org/advisories/EASYCOM-SQL-IPLUG-DENIAL-OF-SERVICE.txt +CVE-2017-5359 - http://packetstormsecurity.com/files/141300/EasyCom-SQL-iPlug-Denial-Of-Service.html +CVE-2017-5359 - http://seclists.org/fulldisclosure/2017/Feb/61 +CVE-2017-5359 - https://www.exploit-db.com/exploits/41426/ +CVE-2017-5367 - http://seclists.org/bugtraq/2017/Feb/6 +CVE-2017-5367 - http://seclists.org/fulldisclosure/2017/Feb/11 +CVE-2017-5368 - http://seclists.org/bugtraq/2017/Feb/6 +CVE-2017-5368 - http://seclists.org/fulldisclosure/2017/Feb/11 +CVE-2017-5371 - http://packetstormsecurity.com/files/140610/SAP-ASE-ODATA-Server-16-Denial-Of-Service.html +CVE-2017-5371 - https://erpscan.io/advisories/erpscan-16-036-sap-ase-odata-server-denial-service/ +CVE-2017-5372 - http://packetstormsecurity.com/files/140611/SAP-NetWeaver-AS-Java-P4-MSPRUNTIMEINTERFACE-Information-Disclosure.html +CVE-2017-5372 - http://seclists.org/fulldisclosure/2017/Jan/50 +CVE-2017-5372 - https://erpscan.io/advisories/erpscan-16-037-sap-java-p4-mspruntimeinterface-information-disclosure/ +CVE-2017-5373 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5375 - https://bugzilla.mozilla.org/show_bug.cgi?id=1325200 +CVE-2017-5375 - https://www.exploit-db.com/exploits/42327/ +CVE-2017-5375 - https://www.exploit-db.com/exploits/44293/ +CVE-2017-5375 - https://www.exploit-db.com/exploits/44294/ +CVE-2017-5375 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5376 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5378 - https://bugzilla.mozilla.org/show_bug.cgi?id=1312001 +CVE-2017-5378 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5380 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5383 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5384 - https://bugzilla.mozilla.org/show_bug.cgi?id=1255474 +CVE-2017-5386 - https://bugzilla.mozilla.org/show_bug.cgi?id=1319070 +CVE-2017-5387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1295023 +CVE-2017-5390 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5394 - https://bugzilla.mozilla.org/show_bug.cgi?id=1222798 +CVE-2017-5395 - https://bugzilla.mozilla.org/show_bug.cgi?id=1293463 +CVE-2017-5396 - https://www.mozilla.org/security/advisories/mfsa2017-03/ +CVE-2017-5400 - https://bugzilla.mozilla.org/show_bug.cgi?id=1334933 +CVE-2017-5404 - https://bugzilla.mozilla.org/show_bug.cgi?id=1340138 +CVE-2017-5404 - https://www.exploit-db.com/exploits/41660/ +CVE-2017-5407 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336622 +CVE-2017-5409 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321814 +CVE-2017-5411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1325511 +CVE-2017-5414 - https://bugzilla.mozilla.org/show_bug.cgi?id=1319370 +CVE-2017-5415 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321719 +CVE-2017-5420 - https://bugzilla.mozilla.org/show_bug.cgi?id=1284395 +CVE-2017-5421 - https://bugzilla.mozilla.org/show_bug.cgi?id=1301876 +CVE-2017-5428 - https://bugzilla.mozilla.org/show_bug.cgi?id=1348168 +CVE-2017-5429 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5430 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5432 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5433 - https://bugzilla.mozilla.org/show_bug.cgi?id=1347168 +CVE-2017-5433 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5434 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5435 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5436 - https://bugzilla.mozilla.org/show_bug.cgi?id=1345461 +CVE-2017-5436 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5438 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336828 +CVE-2017-5438 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5439 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336830 +CVE-2017-5439 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5440 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336832 +CVE-2017-5440 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5441 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5442 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5443 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5444 - https://bugzilla.mozilla.org/show_bug.cgi?id=1344461 +CVE-2017-5444 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5445 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5446 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5447 - https://bugzilla.mozilla.org/show_bug.cgi?id=1343552 +CVE-2017-5447 - https://www.exploit-db.com/exploits/42071/ +CVE-2017-5447 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5448 - https://bugzilla.mozilla.org/show_bug.cgi?id=1346648 +CVE-2017-5448 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5449 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5450 - https://bugzilla.mozilla.org/show_bug.cgi?id=1325955 +CVE-2017-5451 - https://bugzilla.mozilla.org/show_bug.cgi?id=1273537 +CVE-2017-5451 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5454 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5455 - https://bugzilla.mozilla.org/show_bug.cgi?id=1341191 +CVE-2017-5455 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5456 - https://bugzilla.mozilla.org/show_bug.cgi?id=1344415 +CVE-2017-5456 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5459 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5460 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5461 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-5461 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-5461 - https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 +CVE-2017-5461 - https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes +CVE-2017-5461 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-5462 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5464 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5465 - https://bugzilla.mozilla.org/show_bug.cgi?id=1347617 +CVE-2017-5465 - https://www.exploit-db.com/exploits/42072/ +CVE-2017-5465 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5466 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5467 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5469 - https://www.mozilla.org/security/advisories/mfsa2017-12/ +CVE-2017-5473 - https://www.exploit-db.com/exploits/41141/ +CVE-2017-5475 - https://github.com/s9y/Serendipity/issues/439 +CVE-2017-5476 - https://github.com/s9y/Serendipity/issues/439 +CVE-2017-5482 - https://hackerone.com/reports/202969 +CVE-2017-5484 - https://hackerone.com/reports/202967 +CVE-2017-5487 - https://wpvulndb.com/vulnerabilities/8715 +CVE-2017-5487 - https://www.exploit-db.com/exploits/41497/ +CVE-2017-5488 - https://wpvulndb.com/vulnerabilities/8716 +CVE-2017-5489 - https://wpvulndb.com/vulnerabilities/8717 +CVE-2017-5490 - https://wpvulndb.com/vulnerabilities/8718 +CVE-2017-5491 - https://wpvulndb.com/vulnerabilities/8719 +CVE-2017-5492 - https://wpvulndb.com/vulnerabilities/8720 +CVE-2017-5493 - https://wpvulndb.com/vulnerabilities/8721 +CVE-2017-5495 - http://www.securityfocus.com/bid/95745 +CVE-2017-5496 - http://packetstormsecurity.com/files/141177/Sawmill-Enterprise-8.7.9-Authentication-Bypass.html +CVE-2017-5496 - https://www.exploit-db.com/exploits/41395/ +CVE-2017-5498 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ +CVE-2017-5499 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ +CVE-2017-5500 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ +CVE-2017-5501 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ +CVE-2017-5502 - https://blogs.gentoo.org/ago/2017/01/16/jasper-multiple-crashes-with-ubsan/ +CVE-2017-5503 - http://www.openwall.com/lists/oss-security/2017/01/16/3 +CVE-2017-5503 - https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-write-in-dec_clnpass-jpc_t1dec-c/ +CVE-2017-5504 - https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jpc_undo_roi-jpc_dec-c/ +CVE-2017-5505 - http://www.openwall.com/lists/oss-security/2017/01/16/5 +CVE-2017-5505 - https://blogs.gentoo.org/ago/2017/01/16/jasper-invalid-memory-read-in-jas_matrix_asl-jas_seq-c/ +CVE-2017-5506 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851383 +CVE-2017-5506 - https://github.com/ImageMagick/ImageMagick/issues/354 +CVE-2017-5507 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 +CVE-2017-5508 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851381 +CVE-2017-5509 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851377 +CVE-2017-5509 - https://github.com/ImageMagick/ImageMagick/issues/350 +CVE-2017-5510 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851376 +CVE-2017-5510 - https://github.com/ImageMagick/ImageMagick/issues/348 +CVE-2017-5511 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851374 +CVE-2017-5511 - https://github.com/ImageMagick/ImageMagick/issues/347 +CVE-2017-5516 - https://github.com/semplon/GeniXCMS/issues/65 +CVE-2017-5517 - https://github.com/semplon/GeniXCMS/issues/66 +CVE-2017-5518 - https://github.com/semplon/GeniXCMS/issues/64 +CVE-2017-5520 - https://github.com/semplon/GeniXCMS/issues/62 +CVE-2017-5521 - https://www.exploit-db.com/exploits/41205/ +CVE-2017-5529 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-5529 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-5529 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-5533 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-5533 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-5533 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-5545 - https://github.com/libimobiledevice/libplist/issues/87 +CVE-2017-5554 - https://www.xda-developers.com/oneplus-33t-bootloader-vulnerability-allows-changing-of-selinux-to-permissive-mode-in-fastboot/ +CVE-2017-5563 - http://bugzilla.maptools.org/show_bug.cgi?id=2664 +CVE-2017-5563 - https://usn.ubuntu.com/3606-1/ +CVE-2017-5565 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ +CVE-2017-5565 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ +CVE-2017-5566 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ +CVE-2017-5566 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ +CVE-2017-5567 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ +CVE-2017-5567 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ +CVE-2017-5574 - https://github.com/semplon/GeniXCMS/issues/69 +CVE-2017-5575 - https://github.com/semplon/GeniXCMS/issues/68 +CVE-2017-5585 - http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html +CVE-2017-5586 - http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html +CVE-2017-5586 - https://www.exploit-db.com/exploits/41366/ +CVE-2017-5594 - https://www.exploit-db.com/exploits/41143/ +CVE-2017-5595 - http://seclists.org/bugtraq/2017/Feb/6 +CVE-2017-5595 - http://seclists.org/fulldisclosure/2017/Feb/11 +CVE-2017-5607 - http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt +CVE-2017-5607 - http://seclists.org/fulldisclosure/2017/Mar/89 +CVE-2017-5607 - https://www.exploit-db.com/exploits/41779/ +CVE-2017-5607 - https://www.splunk.com/view/SP-CAAAPZ3#InformationLeakageviaJavaScriptCVE20175607 +CVE-2017-5610 - https://wpvulndb.com/vulnerabilities/8729 +CVE-2017-5611 - https://wpvulndb.com/vulnerabilities/8730 +CVE-2017-5611 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2017-5612 - https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849 +CVE-2017-5612 - https://wpvulndb.com/vulnerabilities/8731 +CVE-2017-5627 - https://bugs.ghostscript.com/show_bug.cgi?id=697497 +CVE-2017-5628 - https://bugs.ghostscript.com/show_bug.cgi?id=697496 +CVE-2017-5630 - https://www.exploit-db.com/exploits/41185/ +CVE-2017-5631 - https://www.exploit-db.com/exploits/42042/ +CVE-2017-5633 - http://seclists.org/fulldisclosure/2017/Feb/70 +CVE-2017-5634 - https://www.youtube.com/watch?v=2j9gP5Qu2WA +CVE-2017-5637 - https://issues.apache.org/jira/browse/ZOOKEEPER-2693 +CVE-2017-5637 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-5637 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-5638 - http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html +CVE-2017-5638 - http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ +CVE-2017-5638 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-5638 - https://github.com/rapid7/metasploit-framework/issues/8064 +CVE-2017-5638 - https://isc.sans.edu/diary/22169 +CVE-2017-5638 - https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt +CVE-2017-5638 - https://www.exploit-db.com/exploits/41614/ +CVE-2017-5641 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-5644 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-5645 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-5645 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-5645 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-5645 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2017-5645 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-5645 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-5647 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-5650 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-5651 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-5651 - http://www.securityfocus.com/bid/97544 +CVE-2017-5662 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-5662 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-5662 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-5664 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-5664 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-5664 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-5665 - https://blogs.gentoo.org/ago/2017/01/29/mp3splt-null-pointer-dereference-in-splt_cue_export_to_file-cue-c/ +CVE-2017-5666 - https://blogs.gentoo.org/ago/2017/01/29/mp3splt-invalid-free-in-free_options-options_manager-c/ +CVE-2017-5669 - https://bugzilla.kernel.org/show_bug.cgi?id=192931 +CVE-2017-5669 - https://usn.ubuntu.com/3583-2/ +CVE-2017-5671 - https://akerva.com/blog/intermec-industrial-printers-local-root-with-busybox-jailbreak/ +CVE-2017-5671 - https://github.com/kmkz/exploit/blob/master/CVE-2017-5671-Credits.pdf +CVE-2017-5671 - https://www.exploit-db.com/exploits/41754/ +CVE-2017-5672 - http://packetstormsecurity.com/files/142012/Kony-EMM-4.2.0-Private-Key-Disclosure.html +CVE-2017-5673 - http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.html +CVE-2017-5677 - http://seclists.org/fulldisclosure/2017/Feb/12 +CVE-2017-5689 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html +CVE-2017-5689 - https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability +CVE-2017-5706 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-5709 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-5715 - http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html +CVE-2017-5715 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html +CVE-2017-5715 - http://www.kb.cert.org/vuls/id/584653 +CVE-2017-5715 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-5715 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-5715 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-5715 - https://cert.vde.com/en-us/advisories/vde-2018-002 +CVE-2017-5715 - https://cert.vde.com/en-us/advisories/vde-2018-003 +CVE-2017-5715 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html +CVE-2017-5715 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2017-5715 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2017-5715 - https://spectreattack.com/ +CVE-2017-5715 - https://usn.ubuntu.com/3540-2/ +CVE-2017-5715 - https://usn.ubuntu.com/3580-1/ +CVE-2017-5715 - https://usn.ubuntu.com/3581-1/ +CVE-2017-5715 - https://usn.ubuntu.com/3582-1/ +CVE-2017-5715 - https://usn.ubuntu.com/3597-2/ +CVE-2017-5715 - https://usn.ubuntu.com/3777-3/ +CVE-2017-5715 - https://www.exploit-db.com/exploits/43427/ +CVE-2017-5715 - https://www.kb.cert.org/vuls/id/180049 +CVE-2017-5715 - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 +CVE-2017-5715 - https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ +CVE-2017-5715 - https://www.synology.com/support/security/Synology_SA_18_01 +CVE-2017-5717 - https://www.exploit-db.com/exploits/43373/ +CVE-2017-5753 - http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html +CVE-2017-5753 - http://www.kb.cert.org/vuls/id/584653 +CVE-2017-5753 - https://cert.vde.com/en-us/advisories/vde-2018-002 +CVE-2017-5753 - https://cert.vde.com/en-us/advisories/vde-2018-003 +CVE-2017-5753 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html +CVE-2017-5753 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2017-5753 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2017-5753 - https://spectreattack.com/ +CVE-2017-5753 - https://usn.ubuntu.com/3540-2/ +CVE-2017-5753 - https://usn.ubuntu.com/3541-1/ +CVE-2017-5753 - https://usn.ubuntu.com/3580-1/ +CVE-2017-5753 - https://usn.ubuntu.com/3597-2/ +CVE-2017-5753 - https://www.exploit-db.com/exploits/43427/ +CVE-2017-5753 - https://www.kb.cert.org/vuls/id/180049 +CVE-2017-5753 - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 +CVE-2017-5753 - https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ +CVE-2017-5753 - https://www.synology.com/support/security/Synology_SA_18_01 +CVE-2017-5754 - http://www.kb.cert.org/vuls/id/584653 +CVE-2017-5754 - https://cert.vde.com/en-us/advisories/vde-2018-002 +CVE-2017-5754 - https://cert.vde.com/en-us/advisories/vde-2018-003 +CVE-2017-5754 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html +CVE-2017-5754 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-5754 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2017-5754 - https://meltdownattack.com/ +CVE-2017-5754 - https://usn.ubuntu.com/3540-2/ +CVE-2017-5754 - https://usn.ubuntu.com/3597-2/ +CVE-2017-5754 - https://usn.ubuntu.com/usn/usn-3525-1/ +CVE-2017-5754 - https://www.kb.cert.org/vuls/id/180049 +CVE-2017-5754 - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 +CVE-2017-5754 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-5754 - https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ +CVE-2017-5754 - https://www.synology.com/support/security/Synology_SA_18_01 +CVE-2017-5787 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 +CVE-2017-5789 - https://www.tenable.com/security/research/tra-2017-13 +CVE-2017-5790 - https://www.tenable.com/security/research/tra-2017-12 +CVE-2017-5792 - https://www.exploit-db.com/exploits/43927/ +CVE-2017-5792 - https://www.tenable.com/security/research/tra-2017-18 +CVE-2017-5798 - https://www.exploit-db.com/exploits/41927/ +CVE-2017-5799 - https://www.exploit-db.com/exploits/41927/ +CVE-2017-5802 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03734en_us +CVE-2017-5816 - https://www.exploit-db.com/exploits/43198/ +CVE-2017-5816 - https://www.exploit-db.com/exploits/43493/ +CVE-2017-5817 - https://www.exploit-db.com/exploits/43195/ +CVE-2017-5817 - https://www.exploit-db.com/exploits/43492/ +CVE-2017-5824 - http://www.securityfocus.com/bid/98722 +CVE-2017-5825 - http://www.securityfocus.com/bid/98722 +CVE-2017-5826 - http://www.securityfocus.com/bid/98722 +CVE-2017-5827 - http://www.securityfocus.com/bid/98722 +CVE-2017-5828 - http://www.securityfocus.com/bid/98722 +CVE-2017-5829 - http://www.securityfocus.com/bid/98722 +CVE-2017-5835 - https://github.com/libimobiledevice/libplist/issues/88 +CVE-2017-5837 - https://bugzilla.gnome.org/show_bug.cgi?id=777262 +CVE-2017-5838 - https://bugzilla.gnome.org/show_bug.cgi?id=777263 +CVE-2017-5839 - https://bugzilla.gnome.org/show_bug.cgi?id=777265 +CVE-2017-5840 - https://bugzilla.gnome.org/show_bug.cgi?id=777469 +CVE-2017-5844 - https://bugzilla.gnome.org/show_bug.cgi?id=777525 +CVE-2017-5846 - https://bugzilla.gnome.org/show_bug.cgi?id=777937 +CVE-2017-5847 - https://bugzilla.gnome.org/show_bug.cgi?id=777955#c3 +CVE-2017-5849 - http://bugzilla.maptools.org/show_bug.cgi?id=2654 +CVE-2017-5849 - http://bugzilla.maptools.org/show_bug.cgi?id=2655 +CVE-2017-5850 - http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html +CVE-2017-5850 - http://seclists.org/fulldisclosure/2017/Feb/15 +CVE-2017-5850 - https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html +CVE-2017-5850 - https://www.exploit-db.com/exploits/41278/ +CVE-2017-5851 - https://blogs.gentoo.org/ago/2017/02/01/mp3splt-null-pointer-dereference-in-free_options-options_manager-c/ +CVE-2017-5852 - http://www.openwall.com/lists/oss-security/2017/02/01/12 +CVE-2017-5852 - https://blogs.gentoo.org/ago/2017/02/01/podofo-infinite-loop-in-podofopdfpagegetinheritedkeyfromobject-pdfpage-cpp/ +CVE-2017-5853 - https://blogs.gentoo.org/ago/2017/02/01/podofo-signed-integer-overflow-in-pdfparser-cpp/ +CVE-2017-5854 - http://www.openwall.com/lists/oss-security/2017/02/01/14 +CVE-2017-5854 - https://blogs.gentoo.org/ago/2017/02/01/podofo-null-pointer-dereference-in-pdfoutputstream-cpp/ +CVE-2017-5855 - https://blogs.gentoo.org/ago/2017/02/01/podofo-null-pointer-dereference-in-podofopdfparserreadxrefsubsection-pdfparser-cpp/ +CVE-2017-5856 - https://bugzilla.redhat.com/show_bug.cgi?id=1418342 +CVE-2017-5868 - https://hackerone.com/reports/231508 +CVE-2017-5868 - https://hackerone.com/reports/232327 +CVE-2017-5869 - http://www.openwall.com/lists/oss-security/2017/03/23/6 +CVE-2017-5869 - https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/ +CVE-2017-5869 - https://www.exploit-db.com/exploits/41748/ +CVE-2017-5870 - http://www.openwall.com/lists/oss-security/2017/05/03/8 +CVE-2017-5870 - https://sysdream.com/news/lab/2017-05-03-cve-2017-5870-multiple-xss-vulnerabilities-in-vimbadmin/ +CVE-2017-5871 - https://sysdream.com/news/lab/2017-11-20-cve-2017-5871-odoo-url-redirection-to-distrusted-site-open-redirect/ +CVE-2017-5872 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=42 +CVE-2017-5875 - https://github.com/dotCMS/core/issues/10643 +CVE-2017-5876 - https://github.com/dotCMS/core/issues/10643 +CVE-2017-5877 - https://github.com/dotCMS/core/issues/10643 +CVE-2017-5879 - https://github.com/exponentcms/exponent-cms/issues/73 +CVE-2017-5881 - https://www.exploit-db.com/exploits/41367/ +CVE-2017-5884 - https://bugzilla.gnome.org/show_bug.cgi?id=778048 +CVE-2017-5885 - https://bugzilla.gnome.org/show_bug.cgi?id=778050 +CVE-2017-5886 - https://blogs.gentoo.org/ago/2017/02/03/podofo-heap-based-buffer-overflow-in-podofopdftokenizergetnexttoken-pdftokenizer-cpp/ +CVE-2017-5891 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ +CVE-2017-5892 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ +CVE-2017-5896 - http://www.openwall.com/lists/oss-security/2017/02/06/3 +CVE-2017-5896 - https://bugs.ghostscript.com/show_bug.cgi?id=697515 +CVE-2017-5899 - http://www.openwall.com/lists/oss-security/2017/01/27/7 +CVE-2017-5900 - http://seclists.org/fulldisclosure/2017/Mar/75 +CVE-2017-5925 - https://www.vusec.net/projects/anc +CVE-2017-5926 - https://www.vusec.net/projects/anc +CVE-2017-5927 - https://www.vusec.net/projects/anc +CVE-2017-5928 - https://www.vusec.net/projects/anc +CVE-2017-5940 - https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f +CVE-2017-5940 - https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef +CVE-2017-5940 - https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863 +CVE-2017-5941 - http://packetstormsecurity.com/files/161356/Node.JS-Remote-Code-Execution.html +CVE-2017-5941 - http://packetstormsecurity.com/files/163222/Node.JS-Remote-Code-Execution.html +CVE-2017-5942 - https://cjc.im/advisories/0006/ +CVE-2017-5945 - https://github.com/justinhunt/moodle-filter_poodll/issues/23 +CVE-2017-5946 - https://github.com/rubyzip/rubyzip/issues/315 +CVE-2017-5948 - https://alephsecurity.com/vulns/aleph-2017008 +CVE-2017-5949 - https://bugs.webkit.org/show_bug.cgi?id=167239 +CVE-2017-5951 - https://bugs.ghostscript.com/show_bug.cgi?id=697548 +CVE-2017-5953 - https://usn.ubuntu.com/4016-1/ +CVE-2017-5959 - https://github.com/semplon/GeniXCMS/issues/70 +CVE-2017-5961 - https://github.com/ionize/ionize/issues/393 +CVE-2017-5969 - https://hackerone.com/reports/262665 +CVE-2017-5971 - https://www.exploit-db.com/exploits/41261/ +CVE-2017-5972 - https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html +CVE-2017-5972 - https://www.exploit-db.com/exploits/41350/ +CVE-2017-5974 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c/ +CVE-2017-5975 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get64-fetch-c/ +CVE-2017-5976 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-zzip_mem_entry_extra_block-memdisk-c/ +CVE-2017-5977 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-invalid-memory-read-in-zzip_mem_entry_extra_block-memdisk-c/ +CVE-2017-5978 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-out-of-bounds-read-in-zzip_mem_entry_new-memdisk-c/ +CVE-2017-5979 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-null-pointer-dereference-in-prescan_entry-fseeko-c/ +CVE-2017-5980 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-null-pointer-dereference-in-zzip_mem_entry_new-memdisk-c/ +CVE-2017-5981 - https://blogs.gentoo.org/ago/2017/02/09/zziplib-assertion-failure-in-seeko-c/ +CVE-2017-5982 - http://packetstormsecurity.com/files/141043/Kodi-17.1-Arbitrary-File-Disclosure.html +CVE-2017-5982 - https://www.exploit-db.com/exploits/41312/ +CVE-2017-5983 - http://codewhitesec.blogspot.com/2017/04/amf.html +CVE-2017-5983 - https://www.kb.cert.org/vuls/id/307983 +CVE-2017-5984 - https://bugzilla.libav.org/show_bug.cgi?id=1019 +CVE-2017-5991 - https://bugs.ghostscript.com/show_bug.cgi?id=697500 +CVE-2017-5991 - https://www.exploit-db.com/exploits/42138/ +CVE-2017-5992 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854442 +CVE-2017-5997 - https://erpscan.io/advisories/erpscan-16-038-sap-message-server-http-remote-dos/ +CVE-2017-6008 - https://www.exploit-db.com/exploits/43057/ +CVE-2017-6019 - https://www.exploit-db.com/exploits/41537/ +CVE-2017-6020 - https://www.exploit-db.com/exploits/42885/ +CVE-2017-6026 - https://www.exploit-db.com/exploits/45918/ +CVE-2017-6050 - https://www.tenable.com/security/research/tra-2017-24 +CVE-2017-6056 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-6060 - http://www.openwall.com/lists/oss-security/2017/02/18/1 +CVE-2017-6060 - https://blogs.gentoo.org/ago/2017/02/17/mupdf-mujstest-stack-based-buffer-overflow-in-main-jstest_main-c/ +CVE-2017-6060 - https://bugs.ghostscript.com/show_bug.cgi?id=697551 +CVE-2017-6061 - http://packetstormsecurity.com/files/141349/SAP-BusinessObjects-Financial-Consolidation-10.0.0.1933-Cross-Site-Scripting.html +CVE-2017-6065 - https://github.com/semplon/GeniXCMS/issues/71 +CVE-2017-6070 - https://daylight-it.com/security-advisory-dlcs0001.html +CVE-2017-6071 - https://daylight-it.com/security-advisory-dlcs0001.html +CVE-2017-6072 - https://daylight-it.com/security-advisory-dlcs0001.html +CVE-2017-6074 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-6074 - https://hackerone.com/reports/347282 +CVE-2017-6074 - https://www.exploit-db.com/exploits/41457/ +CVE-2017-6074 - https://www.exploit-db.com/exploits/41458/ +CVE-2017-6077 - https://www.exploit-db.com/exploits/41394/ +CVE-2017-6078 - https://github.com/ilsani/rd/tree/master/security-advisories/faststone/maxview-cve-2017-6078 +CVE-2017-6086 - http://www.openwall.com/lists/oss-security/2017/05/03/7 +CVE-2017-6086 - https://www.exploit-db.com/exploits/41967/ +CVE-2017-6087 - http://www.openwall.com/lists/oss-security/2017/03/23/5 +CVE-2017-6087 - https://sysdream.com/news/lab/2017-03-14-cve-2017-6087-eon-5-0-remote-code-execution/ +CVE-2017-6087 - https://www.exploit-db.com/exploits/41746/ +CVE-2017-6088 - http://www.openwall.com/lists/oss-security/2017/03/23/4 +CVE-2017-6088 - https://sysdream.com/news/lab/2017-03-14-cve-2017-6088-eon-5-0-multiple-sql-injection/ +CVE-2017-6088 - https://www.exploit-db.com/exploits/41747/ +CVE-2017-6089 - https://sysdream.com/news/lab/2017-09-29-cve-2017-6089-phpcollab-2-5-1-multiple-sql-injections-unauthenticated/ +CVE-2017-6089 - https://www.exploit-db.com/exploits/42935/ +CVE-2017-6090 - https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/ +CVE-2017-6090 - https://www.exploit-db.com/exploits/42934/ +CVE-2017-6090 - https://www.exploit-db.com/exploits/43519/ +CVE-2017-6095 - https://wpvulndb.com/vulnerabilities/8740 +CVE-2017-6095 - https://www.exploit-db.com/exploits/41438/ +CVE-2017-6096 - https://wpvulndb.com/vulnerabilities/8740 +CVE-2017-6096 - https://www.exploit-db.com/exploits/41438/ +CVE-2017-6097 - https://wpvulndb.com/vulnerabilities/8740 +CVE-2017-6097 - https://www.exploit-db.com/exploits/41438/ +CVE-2017-6098 - https://wpvulndb.com/vulnerabilities/8740 +CVE-2017-6098 - https://www.exploit-db.com/exploits/41438/ +CVE-2017-6100 - https://sourceforge.net/p/tcpdf/bugs/1005/ +CVE-2017-6102 - https://wpvulndb.com/vulnerabilities/8763 +CVE-2017-6104 - https://wpvulndb.com/vulnerabilities/8743 +CVE-2017-6104 - https://www.exploit-db.com/exploits/41540/ +CVE-2017-6127 - http://seclists.org/fulldisclosure/2017/Feb/66 +CVE-2017-6168 - https://robotattack.org/ +CVE-2017-6168 - https://www.kb.cert.org/vuls/id/144389 +CVE-2017-6178 - http://packetstormsecurity.com/files/141526/USBPcap-1.1.0.0-Privilege-Escalation.html +CVE-2017-6178 - https://www.exploit-db.com/exploits/41542/ +CVE-2017-6181 - https://bugs.ruby-lang.org/issues/13234 +CVE-2017-6182 - https://www.exploit-db.com/exploits/42332/ +CVE-2017-6186 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ +CVE-2017-6186 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ +CVE-2017-6187 - https://www.exploit-db.com/exploits/41436/ +CVE-2017-6189 - http://packetstormsecurity.com/files/141366/Amazon-Kindle-DLL-Hijacking.html +CVE-2017-6189 - http://seclists.org/fulldisclosure/2017/Feb/71 +CVE-2017-6190 - https://cxsecurity.com/blad/WLB-2017040033 +CVE-2017-6190 - https://www.exploit-db.com/exploits/41840/ +CVE-2017-6191 - https://www.exploit-db.com/exploits/41670/ +CVE-2017-6192 - https://www.exploit-db.com/exploits/41668/ +CVE-2017-6192 - https://www.exploit-db.com/exploits/41669/ +CVE-2017-6193 - https://www.exploit-db.com/exploits/41668/ +CVE-2017-6193 - https://www.exploit-db.com/exploits/41669/ +CVE-2017-6194 - https://github.com/radare/radare2/issues/6829 +CVE-2017-6195 - https://www.siberas.de/assets/papers/ssa-1705_IPSWITCH_SQLinjection.txt +CVE-2017-6196 - https://bugs.ghostscript.com/show_bug.cgi?id=697596 +CVE-2017-6197 - https://github.com/radare/radare2/issues/6816 +CVE-2017-6199 - https://sandstorm.io/news/2017-03-02-security-review +CVE-2017-6200 - https://sandstorm.io/news/2017-03-02-security-review +CVE-2017-6201 - https://sandstorm.io/news/2017-03-02-security-review +CVE-2017-6206 - https://github.com/varangamin/CVE-2017-6206 +CVE-2017-6206 - https://www.exploit-db.com/exploits/41662/ +CVE-2017-6266 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6267 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6268 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6269 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6270 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6271 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6272 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6275 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2017-6277 - http://nvidia.custhelp.com/app/answers/detail/a_id/4544 +CVE-2017-6297 - https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/ +CVE-2017-6307 - https://github.com/verdammelt/tnef/blob/master/ChangeLog +CVE-2017-6308 - https://github.com/verdammelt/tnef/blob/master/ChangeLog +CVE-2017-6309 - https://github.com/verdammelt/tnef/blob/master/ChangeLog +CVE-2017-6310 - https://github.com/verdammelt/tnef/blob/master/ChangeLog +CVE-2017-6315 - https://www.exploit-db.com/exploits/42726/ +CVE-2017-6316 - https://www.exploit-db.com/exploits/42345/ +CVE-2017-6316 - https://www.exploit-db.com/exploits/42346/ +CVE-2017-6320 - https://www.exploit-db.com/exploits/42333/ +CVE-2017-6326 - https://www.exploit-db.com/exploits/42251/ +CVE-2017-6327 - https://www.exploit-db.com/exploits/42519/ +CVE-2017-6331 - https://www.exploit-db.com/exploits/43134/ +CVE-2017-6334 - https://www.exploit-db.com/exploits/41459/ +CVE-2017-6334 - https://www.exploit-db.com/exploits/41472/ +CVE-2017-6334 - https://www.exploit-db.com/exploits/42257/ +CVE-2017-6351 - https://www.exploit-db.com/exploits/41480/ +CVE-2017-6359 - https://www.exploit-db.com/exploits/41842/ +CVE-2017-6359 - https://www.qnap.com/en/support/con_show.php?cid=113 +CVE-2017-6360 - https://www.exploit-db.com/exploits/41842/ +CVE-2017-6360 - https://www.qnap.com/en/support/con_show.php?cid=113 +CVE-2017-6361 - https://www.exploit-db.com/exploits/41842/ +CVE-2017-6361 - https://www.qnap.com/en/support/con_show.php?cid=113 +CVE-2017-6366 - https://www.exploit-db.com/exploits/41472/ +CVE-2017-6367 - https://www.exploit-db.com/exploits/41596/ +CVE-2017-6369 - http://tracker.firebirdsql.org/browse/CORE-5474 +CVE-2017-6370 - https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request +CVE-2017-6371 - http://packetstormsecurity.com/files/141396/Synchronet-BBS-3.16c-For-Windows-Denial-Of-Service.html +CVE-2017-6371 - https://www.exploit-db.com/exploits/41475/ +CVE-2017-6390 - https://github.com/soruly/whatanime.ga/issues/8 +CVE-2017-6392 - https://github.com/kaltura/server/issues/5303 +CVE-2017-6393 - https://github.com/NagVis/nagvis/issues/91 +CVE-2017-6394 - https://github.com/openemr/openemr/issues/498 +CVE-2017-6395 - https://github.com/jacobwb/hashover-next/issues/152 +CVE-2017-6396 - https://github.com/WPO-Foundation/webpagetest/issues/820 +CVE-2017-6397 - https://github.com/Ysurac/FlightAirMap/issues/275 +CVE-2017-6411 - https://www.exploit-db.com/exploits/41478/ +CVE-2017-6416 - https://www.exploit-db.com/exploits/41479/ +CVE-2017-6417 - http://cybellum.com/doubleagent-taking-full-control-antivirus/ +CVE-2017-6417 - http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ +CVE-2017-6427 - https://www.exploit-db.com/exploits/41547/ +CVE-2017-6429 - https://github.com/appneta/tcpreplay/issues/278 +CVE-2017-6430 - https://github.com/Ettercap/ettercap/issues/782 +CVE-2017-6432 - https://nullku7.github.io/stuff/exploit/dahua/2017/03/09/dahua-nvr-authbypass.html +CVE-2017-6435 - https://github.com/libimobiledevice/libplist/issues/93 +CVE-2017-6436 - https://github.com/libimobiledevice/libplist/issues/94 +CVE-2017-6438 - https://github.com/libimobiledevice/libplist/issues/98 +CVE-2017-6439 - https://github.com/libimobiledevice/libplist/issues/95 +CVE-2017-6440 - https://github.com/libimobiledevice/libplist/issues/99 +CVE-2017-6443 - http://seclists.org/fulldisclosure/2017/Mar/5 +CVE-2017-6443 - https://www.exploit-db.com/exploits/41502/ +CVE-2017-6444 - https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html +CVE-2017-6444 - https://www.exploit-db.com/exploits/41601/ +CVE-2017-6458 - http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html +CVE-2017-6458 - http://www.ubuntu.com/usn/USN-3349-1 +CVE-2017-6465 - http://packetstormsecurity.com/files/141456/FTPShell-Client-6.53-Buffer-Overflow.html +CVE-2017-6465 - https://www.exploit-db.com/exploits/41511/ +CVE-2017-6481 - https://github.com/phpipam/phpipam/issues/992 +CVE-2017-6483 - https://github.com/atutor/ATutor/issues/129 +CVE-2017-6484 - https://github.com/INTER-Mediator/INTER-Mediator/issues/772 +CVE-2017-6485 - https://github.com/jasonjoh/php-calendar/issues/4 +CVE-2017-6486 - https://github.com/reasoncms/reasoncms/issues/264 +CVE-2017-6492 - https://github.com/hamkovic/Admidio-3.2.5-SQLi +CVE-2017-6506 - http://packetstormsecurity.com/files/141502/Azure-Data-Expert-Ultimate-2.2.16-Buffer-Overflow.html +CVE-2017-6506 - https://www.exploit-db.com/exploits/41545/ +CVE-2017-6513 - https://gist.github.com/sedrubal/a83fa22f1091025a5c1a14aabd711ad7 +CVE-2017-6516 - https://www.exploit-db.com/exploits/44150/ +CVE-2017-6517 - http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html +CVE-2017-6517 - http://seclists.org/fulldisclosure/2017/Mar/44 +CVE-2017-6526 - https://www.exploit-db.com/exploits/41578/ +CVE-2017-6526 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ +CVE-2017-6527 - https://www.exploit-db.com/exploits/41578/ +CVE-2017-6527 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ +CVE-2017-6528 - https://www.exploit-db.com/exploits/41578/ +CVE-2017-6528 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ +CVE-2017-6529 - https://www.exploit-db.com/exploits/41578/ +CVE-2017-6529 - https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ +CVE-2017-6530 - https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt +CVE-2017-6531 - https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt +CVE-2017-6532 - https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt +CVE-2017-6533 - https://github.com/WPO-Foundation/webpagetest/issues/833 +CVE-2017-6534 - https://github.com/WPO-Foundation/webpagetest/issues/835 +CVE-2017-6535 - https://github.com/WPO-Foundation/webpagetest/issues/832 +CVE-2017-6536 - https://github.com/WPO-Foundation/webpagetest/issues/838 +CVE-2017-6537 - https://github.com/WPO-Foundation/webpagetest/issues/837 +CVE-2017-6538 - https://github.com/WPO-Foundation/webpagetest/issues/836 +CVE-2017-6539 - https://github.com/WPO-Foundation/webpagetest/issues/831 +CVE-2017-6540 - https://github.com/WPO-Foundation/webpagetest/issues/830 +CVE-2017-6541 - https://github.com/WPO-Foundation/webpagetest/issues/834 +CVE-2017-6542 - http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html +CVE-2017-6542 - https://www.exploit-db.com/exploits/42137/ +CVE-2017-6547 - https://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss +CVE-2017-6547 - https://www.exploit-db.com/exploits/41571/ +CVE-2017-6548 - https://bierbaumer.net/security/asuswrt/#remote-code-execution +CVE-2017-6548 - https://www.exploit-db.com/exploits/41573/ +CVE-2017-6549 - https://bierbaumer.net/security/asuswrt/#session-stealing +CVE-2017-6549 - https://www.exploit-db.com/exploits/41572/ +CVE-2017-6550 - http://packetstormsecurity.com/files/141575/Kinseys-Infor-Lawson-SQL-Injection.html +CVE-2017-6550 - http://seclists.org/fulldisclosure/2017/Mar/31 +CVE-2017-6550 - https://www.exploit-db.com/exploits/41577/ +CVE-2017-6552 - https://www.exploit-db.com/exploits/41565/ +CVE-2017-6552 - https://www.youtube.com/watch?v=ShCs5_8mBlM&t=37s +CVE-2017-6553 - https://0xdeadface.wordpress.com/2017/04/07/multiple-vulnerabilities-in-quest-privilege-manager-6-0-0-xx-cve-2017-6553-cve-2017-6554/ +CVE-2017-6553 - https://www.exploit-db.com/exploits/42010/ +CVE-2017-6554 - http://packetstormsecurity.com/files/142095/Quest-Privilege-Manager-6.0.0-Arbitrary-File-Write.html +CVE-2017-6554 - https://0xdeadface.wordpress.com/2017/04/07/multiple-vulnerabilities-in-quest-privilege-manager-6-0-0-xx-cve-2017-6553-cve-2017-6554/ +CVE-2017-6554 - https://www.exploit-db.com/exploits/41861/ +CVE-2017-6558 - https://www.youtube.com/watch?v=8GZg1IuSfCs +CVE-2017-6559 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html +CVE-2017-6560 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html +CVE-2017-6561 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html +CVE-2017-6562 - https://packetstormsecurity.com/files/141507/Agora-Project-3.2.2-Cross-Site-Scripting.html +CVE-2017-6590 - https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1668321 +CVE-2017-6622 - https://www.exploit-db.com/exploits/42888/ +CVE-2017-6736 - https://github.com/artkond/cisco-snmp-rce +CVE-2017-6736 - https://www.exploit-db.com/exploits/43450/ +CVE-2017-6802 - https://github.com/Yeraze/ytnef/issues/34 +CVE-2017-6803 - http://hyp3rlinx.altervista.org/advisories/FTP-VOYAGER-SCHEDULER-CSRF-REMOTE-CMD-EXECUTION.txt +CVE-2017-6803 - http://packetstormsecurity.com/files/141567/FTP-Voyager-Scheduler-16.2.0-CSRF-Denial-Of-Service.html +CVE-2017-6803 - https://www.exploit-db.com/exploits/41574/ +CVE-2017-6805 - http://hyp3rlinx.altervista.org/advisories/MOBAXTERM-TFTP-PATH-TRAVERSAL-REMOTE-FILE-ACCESS.txt +CVE-2017-6805 - http://packetstormsecurity.com/files/141582/MobaXterm-Personal-Edition-9.4-Path-Traversal.html +CVE-2017-6805 - http://seclists.org/fulldisclosure/2017/Mar/34 +CVE-2017-6805 - https://www.exploit-db.com/exploits/41592/ +CVE-2017-6814 - http://openwall.com/lists/oss-security/2017/03/06/8 +CVE-2017-6814 - https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html +CVE-2017-6814 - https://wpvulndb.com/vulnerabilities/8765 +CVE-2017-6816 - https://wpvulndb.com/vulnerabilities/8767 +CVE-2017-6817 - https://wpvulndb.com/vulnerabilities/8768 +CVE-2017-6818 - https://wpvulndb.com/vulnerabilities/8769 +CVE-2017-6819 - http://openwall.com/lists/oss-security/2017/03/06/7 +CVE-2017-6819 - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html +CVE-2017-6819 - https://wpvulndb.com/vulnerabilities/8770 +CVE-2017-6823 - https://www.exploit-db.com/exploits/41594/ +CVE-2017-6827 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcminitializecoefficients-msadpcm-cpp/ +CVE-2017-6828 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-readvalue-filehandle-cpp/ +CVE-2017-6829 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-global-buffer-overflow-in-decodesample-ima-cpp/ +CVE-2017-6829 - https://github.com/mpruett/audiofile/issues/33 +CVE-2017-6830 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-alaw2linear_buf-g711-cpp/ +CVE-2017-6830 - https://github.com/mpruett/audiofile/issues/34 +CVE-2017-6831 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/ +CVE-2017-6831 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831 +CVE-2017-6831 - https://github.com/mpruett/audiofile/issues/35 +CVE-2017-6832 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcmdecodeblock-msadpcm-cpp/ +CVE-2017-6832 - https://github.com/mpruett/audiofile/issues/36 +CVE-2017-6833 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecrunpull-blockcodec-cpp/ +CVE-2017-6833 - https://github.com/mpruett/audiofile/issues/37 +CVE-2017-6834 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-ulaw2linear_buf-g711-cpp/ +CVE-2017-6834 - https://github.com/mpruett/audiofile/issues/38 +CVE-2017-6835 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecreset1-blockcodec-cpp/ +CVE-2017-6835 - https://github.com/mpruett/audiofile/issues/39 +CVE-2017-6836 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-expand3to4modulerun-simplemodule-h/ +CVE-2017-6836 - https://github.com/mpruett/audiofile/issues/40 +CVE-2017-6837 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ +CVE-2017-6837 - https://github.com/mpruett/audiofile/issues/41 +CVE-2017-6838 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ +CVE-2017-6838 - https://github.com/mpruett/audiofile/issues/41 +CVE-2017-6839 - https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/ +CVE-2017-6839 - https://github.com/mpruett/audiofile/issues/41 +CVE-2017-6840 - https://blogs.gentoo.org/ago/2017/03/02/podofo-invalid-memory-read-in-colorchangergetcolorfromstack-colorchanger-cpp/ +CVE-2017-6841 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementtgraphicsstackelement-graphicsstack-h/ +CVE-2017-6842 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-colorchangergetcolorfromstack-colorchanger-cpp/ +CVE-2017-6843 - https://blogs.gentoo.org/ago/2017/03/02/podofo-heap-based-buffer-overflow-in-podofopdfvariantdelayedload-pdfvariant-h/ +CVE-2017-6844 - https://blogs.gentoo.org/ago/2017/03/02/podofo-global-buffer-overflow-in-podofopdfparserreadxrefsubsection-pdfparser-cpp/ +CVE-2017-6845 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcoloroperator-pdfcolor-cpp/ +CVE-2017-6846 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementsetnonstrokingcolorspace-graphicsstack-h/ +CVE-2017-6847 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfvariantdelayedload-pdfvariant-h/ +CVE-2017-6848 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfxobjectpdfxobject-pdfxobject-cpp/ +CVE-2017-6849 - https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcolorgraypdfcolorgray-pdfcolor-cpp/ +CVE-2017-6850 - https://blogs.gentoo.org/ago/2017/01/25/jasper-null-pointer-dereference-in-jp2_cdef_destroy-jp2_cod-c/ +CVE-2017-6850 - https://github.com/mdadams/jasper/issues/112 +CVE-2017-6851 - https://blogs.gentoo.org/ago/2017/01/25/jasper-invalid-memory-read-in-jas_matrix_bindsub-jas_seq-c/ +CVE-2017-6851 - https://github.com/mdadams/jasper/issues/113 +CVE-2017-6852 - https://blogs.gentoo.org/ago/2017/01/25/jasper-heap-based-buffer-overflow-in-jpc_dec_decodepkt-jpc_t2dec-c/ +CVE-2017-6852 - https://github.com/mdadams/jasper/issues/114 +CVE-2017-6862 - https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261 +CVE-2017-6870 - https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf +CVE-2017-6871 - https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf +CVE-2017-6878 - http://packetstormsecurity.com/files/141689/MetInfo-5.3.15-Cross-Site-Scripting.html +CVE-2017-6878 - http://seclists.org/fulldisclosure/2017/Mar/49 +CVE-2017-6880 - https://www.exploit-db.com/exploits/41620/ +CVE-2017-6884 - https://www.exploit-db.com/exploits/41782/ +CVE-2017-6892 - https://usn.ubuntu.com/4013-1/ +CVE-2017-6895 - http://packetstormsecurity.com/files/141652/USB-Pratirodh-XXE-Injection.html +CVE-2017-6895 - http://seclists.org/fulldisclosure/2017/Mar/42 +CVE-2017-6895 - https://secur1tyadvisory.wordpress.com/2017/03/15/usb-pratirodh-xml-external-entity-injection-vulnerability/ +CVE-2017-6896 - http://seclists.org/fulldisclosure/2017/Mar/52 +CVE-2017-6896 - https://drive.google.com/file/d/0B6715xUqH18MX29uRlpaSVJ4OTA/view?usp=sharing +CVE-2017-6896 - https://packetstormsecurity.com/files/141693/digisol-escalate.txt +CVE-2017-6896 - https://www.exploit-db.com/exploits/41633/ +CVE-2017-6906 - https://github.com/Xtraball/SiberianCMS/issues/217 +CVE-2017-6907 - https://github.com/Overv/Open.GL/issues/56 +CVE-2017-6908 - https://github.com/concrete5/concrete5-legacy/issues/1948 +CVE-2017-6909 - https://github.com/shish/shimmie2/issues/597 +CVE-2017-6911 - http://packetstormsecurity.com/files/141651/USB-Pratirodh-Insecure-Password-Storage.html +CVE-2017-6914 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf +CVE-2017-6914 - https://github.com/bigtreecms/BigTree-CMS/issues/275 +CVE-2017-6915 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf +CVE-2017-6915 - https://github.com/bigtreecms/BigTree-CMS/issues/275 +CVE-2017-6916 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf +CVE-2017-6916 - https://github.com/bigtreecms/BigTree-CMS/issues/275 +CVE-2017-6917 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf +CVE-2017-6917 - https://github.com/bigtreecms/BigTree-CMS/issues/275 +CVE-2017-6918 - https://github.com/bigtreecms/BigTree-CMS/files/843734/BigTree.-.Multiple.Issue.of.CSRF.that.could.Illegally.Few.Data.Changes.v02.pdf +CVE-2017-6918 - https://github.com/bigtreecms/BigTree-CMS/issues/275 +CVE-2017-6950 - https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/ +CVE-2017-6953 - https://www.exploit-db.com/exploits/41972/ +CVE-2017-6956 - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html +CVE-2017-6957 - http://packetstormsecurity.com/files/141803/Broadcom-Stack-Buffer-Overflow.html +CVE-2017-6970 - https://www.exploit-db.com/exploits/42305/ +CVE-2017-6971 - https://www.exploit-db.com/exploits/42306/ +CVE-2017-6972 - https://www.exploit-db.com/exploits/42314/ +CVE-2017-6975 - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html +CVE-2017-6978 - https://www.exploit-db.com/exploits/42056/ +CVE-2017-6979 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6980 - https://www.exploit-db.com/exploits/42189/ +CVE-2017-6982 - https://www.exploit-db.com/exploits/42014/ +CVE-2017-6984 - https://www.exploit-db.com/exploits/42191/ +CVE-2017-6989 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6994 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6995 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6996 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6997 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6998 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-6999 - https://www.exploit-db.com/exploits/42555/ +CVE-2017-7004 - https://www.exploit-db.com/exploits/42145/ +CVE-2017-7005 - https://www.exploit-db.com/exploits/42188/ +CVE-2017-7018 - https://www.exploit-db.com/exploits/42373/ +CVE-2017-7037 - https://www.exploit-db.com/exploits/42378/ +CVE-2017-7039 - https://www.exploit-db.com/exploits/42362/ +CVE-2017-7040 - https://www.exploit-db.com/exploits/42367/ +CVE-2017-7041 - https://www.exploit-db.com/exploits/42366/ +CVE-2017-7042 - https://www.exploit-db.com/exploits/42364/ +CVE-2017-7043 - https://www.exploit-db.com/exploits/42361/ +CVE-2017-7046 - https://www.exploit-db.com/exploits/42365/ +CVE-2017-7047 - https://www.exploit-db.com/exploits/42407/ +CVE-2017-7048 - https://www.exploit-db.com/exploits/42360/ +CVE-2017-7049 - https://www.exploit-db.com/exploits/42363/ +CVE-2017-7056 - https://www.exploit-db.com/exploits/42376/ +CVE-2017-7061 - https://www.exploit-db.com/exploits/42666/ +CVE-2017-7064 - https://www.exploit-db.com/exploits/42375/ +CVE-2017-7115 - https://www.exploit-db.com/exploits/42996/ +CVE-2017-7117 - https://www.exploit-db.com/exploits/42955/ +CVE-2017-7149 - https://nakedsecurity.sophos.com/2017/10/05/urgent-update-your-mac-again-right-now/ +CVE-2017-7149 - https://www.theregister.co.uk/2017/10/05/apple_patches_password_hint_bug_that_revealed_password/ +CVE-2017-7154 - https://www.exploit-db.com/exploits/43521/ +CVE-2017-7175 - https://www.exploit-db.com/exploits/42314/ +CVE-2017-7178 - http://seclists.org/fulldisclosure/2017/Mar/6 +CVE-2017-7180 - https://www.exploit-db.com/exploits/42141/ +CVE-2017-7183 - http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html +CVE-2017-7183 - https://www.exploit-db.com/exploits/41639/ +CVE-2017-7184 - https://blog.trendmicro.com/results-pwn2own-2017-day-one/ +CVE-2017-7185 - https://www.exploit-db.com/exploits/41826/ +CVE-2017-7186 - https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/ +CVE-2017-7187 - https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b +CVE-2017-7188 - https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC +CVE-2017-7189 - https://hackerone.com/reports/305974 +CVE-2017-7202 - https://github.com/slims/slims7_cendana/issues/50 +CVE-2017-7203 - https://github.com/ZoneMinder/ZoneMinder/issues/1797 +CVE-2017-7204 - https://github.com/tboothman/imdbphp/issues/88 +CVE-2017-7205 - https://github.com/devryan/GamePanelX-V3/issues/161 +CVE-2017-7206 - https://bugzilla.libav.org/show_bug.cgi?id=1002 +CVE-2017-7207 - https://bugs.ghostscript.com/show_bug.cgi?id=697676 +CVE-2017-7208 - https://bugzilla.libav.org/show_bug.cgi?id=1000 +CVE-2017-7215 - https://www.misp.software/Changelog.txt +CVE-2017-7220 - http://seclists.org/bugtraq/2017/Apr/61 +CVE-2017-7221 - http://seclists.org/fulldisclosure/2017/Apr/97 +CVE-2017-7221 - https://www.exploit-db.com/exploits/41928/ +CVE-2017-7228 - https://www.exploit-db.com/exploits/41870/ +CVE-2017-7230 - https://www.exploit-db.com/exploits/41666/ +CVE-2017-7231 - https://github.com/Tatsh/pngdefry/issues/1 +CVE-2017-7237 - http://hyp3rlinx.altervista.org/advisories/SPICEWORKS-IMPROPER-ACCESS-CONTROL-FILE-OVERWRITE.txt +CVE-2017-7237 - https://www.exploit-db.com/exploits/41825/ +CVE-2017-7240 - http://seclists.org/fulldisclosure/2017/Mar/63 +CVE-2017-7240 - https://www.exploit-db.com/exploits/41718/ +CVE-2017-7244 - https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/ +CVE-2017-7245 - https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ +CVE-2017-7246 - https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ +CVE-2017-7247 - https://github.com/WhatCD/Gazelle/issues/114 +CVE-2017-7248 - https://github.com/WhatCD/Gazelle/issues/111 +CVE-2017-7249 - https://github.com/WhatCD/Gazelle/issues/112 +CVE-2017-7250 - https://github.com/WhatCD/Gazelle/issues/113 +CVE-2017-7251 - http://www.securityfocus.com/bid/97061 +CVE-2017-7251 - https://github.com/pi-engine/pi/issues/1523 +CVE-2017-7253 - https://gist.github.com/anonymous/16aca69b7dea27cb73ddebb0d9033b02 +CVE-2017-7258 - https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html +CVE-2017-7263 - https://blogs.gentoo.org/ago/2017/03/03/potrace-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c-incomplete-fix-for-cve-2016-8698/ +CVE-2017-7264 - https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/ +CVE-2017-7269 - https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html +CVE-2017-7269 - https://medium.com/@iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 +CVE-2017-7269 - https://www.exploit-db.com/exploits/41738/ +CVE-2017-7269 - https://www.exploit-db.com/exploits/41992/ +CVE-2017-7275 - https://github.com/ImageMagick/ImageMagick/issues/271 +CVE-2017-7277 - https://lkml.org/lkml/2017/3/15/485 +CVE-2017-7285 - https://www.exploit-db.com/exploits/41752/ +CVE-2017-7290 - https://gist.github.com/jk1986/3b304ac6b4ae52ae667bba380c2dce19 +CVE-2017-7293 - https://www.exploit-db.com/exploits/41933/ +CVE-2017-7308 - https://www.exploit-db.com/exploits/41994/ +CVE-2017-7308 - https://www.exploit-db.com/exploits/44654/ +CVE-2017-7310 - https://www.exploit-db.com/exploits/41771/ +CVE-2017-7310 - https://www.exploit-db.com/exploits/41772/ +CVE-2017-7310 - https://www.exploit-db.com/exploits/41773/ +CVE-2017-7310 - https://www.exploit-db.com/exploits/43875/ +CVE-2017-7310 - https://www.exploit-db.com/exploits/44157/ +CVE-2017-7315 - http://seclists.org/fulldisclosure/2017/Jun/45 +CVE-2017-7316 - http://seclists.org/fulldisclosure/2017/Jun/45 +CVE-2017-7317 - http://seclists.org/fulldisclosure/2017/Jun/45 +CVE-2017-7325 - https://browser.yandex.com/security/changelogs/fixed-in-version-16-9 +CVE-2017-7336 - https://fortiguard.com/advisory/FG-IR-17-115 +CVE-2017-7337 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7338 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7339 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7340 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7342 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7343 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7351 - https://labs.nettitude.com/blog/cve-2017-7351-redcap-7-0-0-7-0-10-sql-injection/ +CVE-2017-7358 - https://www.exploit-db.com/exploits/41923/ +CVE-2017-7378 - https://blogs.gentoo.org/ago/2017/03/31/podofo-heap-based-buffer-overflow-in-podofopdfpainterexpandtabs-pdfpainter-cpp +CVE-2017-7379 - https://blogs.gentoo.org/ago/2017/03/31/podofo-heap-based-buffer-overflow-in-podofopdfsimpleencodingconverttoencoding-pdfencoding-cpp +CVE-2017-7380 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference +CVE-2017-7381 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference +CVE-2017-7382 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference +CVE-2017-7383 - https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference +CVE-2017-7388 - https://github.com/micwallace/wallacepos/issues/84 +CVE-2017-7389 - https://github.com/gunet/openeclass/issues/11 +CVE-2017-7390 - https://github.com/andreas83/SocialNetwork/issues/84 +CVE-2017-7391 - https://github.com/dweeves/magmi-git/issues/522 +CVE-2017-7393 - https://github.com/TigerVNC/tigervnc/pull/438 +CVE-2017-7397 - https://forum.backbox.org/security-advisories/waiting-verification-backbox-os-denial-of-service/msg10218 +CVE-2017-7397 - https://www.exploit-db.com/exploits/41781/ +CVE-2017-7398 - http://seclists.org/fulldisclosure/2017/Apr/4 +CVE-2017-7398 - https://www.exploit-db.com/exploits/41821/ +CVE-2017-7402 - http://rungga.blogspot.co.id/2017/04/remote-file-upload-vulnerability-in.html +CVE-2017-7402 - https://www.exploit-db.com/exploits/41784/ +CVE-2017-7407 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-7411 - http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html +CVE-2017-7411 - https://tuleap.net/plugins/tracker/?aid=10118 +CVE-2017-7411 - https://www.exploit-db.com/exploits/43374/ +CVE-2017-7412 - https://github.com/NixOS/nixpkgs/commit/fa4fe7110566d8370983fa81f2b04a833339236d +CVE-2017-7415 - https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html +CVE-2017-7442 - http://srcincite.io/advisories/src-2017-0005/ +CVE-2017-7442 - https://www.exploit-db.com/exploits/42418/ +CVE-2017-7446 - http://rungga.blogspot.co.id/2017/04/multiple-csrf-remote-code-execution.html +CVE-2017-7446 - https://github.com/albandes/helpdezk/issues/2 +CVE-2017-7446 - https://www.exploit-db.com/exploits/41824/ +CVE-2017-7447 - http://rungga.blogspot.co.id/2017/04/multiple-csrf-remote-code-execution.html +CVE-2017-7447 - https://github.com/albandes/helpdezk/issues/2 +CVE-2017-7447 - https://www.exploit-db.com/exploits/41824/ +CVE-2017-7455 - http://packetstormsecurity.com/files/142074/Moxa-MXview-2.8-Private-Key-Disclosure.html +CVE-2017-7455 - http://seclists.org/fulldisclosure/2017/Apr/49 +CVE-2017-7455 - https://www.exploit-db.com/exploits/41850/ +CVE-2017-7456 - http://hyp3rlinx.altervista.org/advisories/MOXA-MXVIEW-v2.8-DENIAL-OF-SERVICE.txt +CVE-2017-7456 - http://seclists.org/fulldisclosure/2017/Apr/50 +CVE-2017-7456 - https://www.exploit-db.com/exploits/41851/ +CVE-2017-7457 - http://hyp3rlinx.altervista.org/advisories/MOXA-MX-AOPC-SERVER-v1.5-XML-EXTERNAL-ENTITY.txt +CVE-2017-7457 - http://seclists.org/fulldisclosure/2017/Apr/51 +CVE-2017-7457 - https://www.exploit-db.com/exploits/41852/ +CVE-2017-7461 - https://www.exploit-db.com/exploits/41829/ +CVE-2017-7462 - https://www.exploit-db.com/exploits/41829/ +CVE-2017-7467 - http://www.openwall.com/lists/oss-security/2017/04/18/5 +CVE-2017-7472 - https://www.exploit-db.com/exploits/42136/ +CVE-2017-7475 - https://bugs.freedesktop.org/show_bug.cgi?id=100763 +CVE-2017-7478 - https://www.exploit-db.com/exploits/41993/ +CVE-2017-7482 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f2f97656ada8d811d3c1bef503ced266fcd53a0 +CVE-2017-7494 - https://www.exploit-db.com/exploits/42060/ +CVE-2017-7494 - https://www.exploit-db.com/exploits/42084/ +CVE-2017-7502 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-7508 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 +CVE-2017-7515 - https://bugs.freedesktop.org/show_bug.cgi?id=101208 +CVE-2017-7520 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 +CVE-2017-7521 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 +CVE-2017-7522 - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 +CVE-2017-7525 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-7525 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-7525 - https://access.redhat.com/errata/RHSA-2017:1835 +CVE-2017-7525 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-7525 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-7529 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2017-7542 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-7542 - https://usn.ubuntu.com/3583-2/ +CVE-2017-7544 - https://sourceforge.net/p/libexif/bugs/130/ +CVE-2017-7551 - https://pagure.io/389-ds-base/issue/49336 +CVE-2017-7571 - http://rungga.blogspot.co.id/2017/04/csrf-privilege-escalation-manipulation.html +CVE-2017-7571 - https://github.com/ladybirdweb/faveo-helpdesk/issues/446 +CVE-2017-7571 - https://www.exploit-db.com/exploits/41830/ +CVE-2017-7581 - https://www.ambionics.io/blog/typo3-news-module-sqli +CVE-2017-7588 - https://cxsecurity.com/blad/WLB-2017040064 +CVE-2017-7588 - https://www.exploit-db.com/exploits/41863/ +CVE-2017-7595 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-divide-by-zero-in-jpegsetupencode-tiff_jpeg-c +CVE-2017-7596 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7597 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7598 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7599 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7600 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7601 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7602 - https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes +CVE-2017-7603 - https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ +CVE-2017-7604 - https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ +CVE-2017-7605 - https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/ +CVE-2017-7606 - https://blogs.gentoo.org/ago/2017/04/02/imagemagick-undefined-behavior-in-codersrle-c/ +CVE-2017-7607 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c +CVE-2017-7608 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c +CVE-2017-7609 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c +CVE-2017-7610 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c +CVE-2017-7611 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c +CVE-2017-7612 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c +CVE-2017-7613 - https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c +CVE-2017-7615 - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt +CVE-2017-7615 - http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html +CVE-2017-7615 - https://www.exploit-db.com/exploits/41890/ +CVE-2017-7620 - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt +CVE-2017-7620 - https://mantisbt.org/bugs/view.php?id=22816 +CVE-2017-7620 - https://www.exploit-db.com/exploits/42043/ +CVE-2017-7621 - https://sudoat.blogspot.in/2017/04/xss-vulnerability-in-multiple-emli.html +CVE-2017-7622 - https://github.com/kings-way/deepinhack/blob/master/dde_daemon_poc.py +CVE-2017-7625 - https://github.com/Xyntax/POC-T/blob/2.0/script/fiyo2.0.7-getshell.py +CVE-2017-7642 - http://seclists.org/fulldisclosure/2017/Jul/29 +CVE-2017-7642 - https://www.exploit-db.com/exploits/42334/ +CVE-2017-7643 - https://www.exploit-db.com/exploits/41854/ +CVE-2017-7645 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e +CVE-2017-7645 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-7650 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 +CVE-2017-7651 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754 +CVE-2017-7652 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=530102 +CVE-2017-7656 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-7656 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-7656 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-7657 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-7657 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-7657 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-7658 - https://hackerone.com/reports/648434 +CVE-2017-7658 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-7658 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-7658 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-7658 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-7668 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-7668 - https://hackerone.com/reports/241610 +CVE-2017-7679 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-7679 - https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679 +CVE-2017-7690 - https://www.exploit-db.com/exploits/43225/ +CVE-2017-7692 - http://openwall.com/lists/oss-security/2017/04/19/6 +CVE-2017-7692 - https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html +CVE-2017-7692 - https://www.exploit-db.com/exploits/41910/ +CVE-2017-7696 - https://erpscan.io/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/ +CVE-2017-7697 - https://github.com/erikd/libsamplerate/issues/11 +CVE-2017-7719 - http://lists.openwall.net/full-disclosure/2017/04/09/1 +CVE-2017-7720 - https://www.exploit-db.com/exploits/41916/ +CVE-2017-7725 - http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt +CVE-2017-7725 - https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html +CVE-2017-7725 - https://www.exploit-db.com/exploits/41885/ +CVE-2017-7731 - https://fortiguard.com/psirt/FG-IR-17-114 +CVE-2017-7734 - https://fortiguard.com/advisory/FG-IR-17-127 +CVE-2017-7735 - https://fortiguard.com/advisory/FG-IR-17-127 +CVE-2017-7736 - https://fortiguard.com/advisory/FG-IR-17-131 +CVE-2017-7737 - https://fortiguard.com/advisory/FG-IR-17-162 +CVE-2017-7739 - https://fortiguard.com/advisory/FG-IR-17-168 +CVE-2017-7741 - https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/ +CVE-2017-7742 - https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/ +CVE-2017-7753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1353312 +CVE-2017-7757 - https://bugzilla.mozilla.org/show_bug.cgi?id=1356824 +CVE-2017-7758 - https://bugzilla.mozilla.org/show_bug.cgi?id=1368490 +CVE-2017-7759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1356893 +CVE-2017-7760 - https://bugzilla.mozilla.org/show_bug.cgi?id=1348645 +CVE-2017-7761 - https://bugzilla.mozilla.org/show_bug.cgi?id=1215648 +CVE-2017-7766 - https://bugzilla.mozilla.org/show_bug.cgi?id=1342742 +CVE-2017-7767 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336964 +CVE-2017-7768 - https://bugzilla.mozilla.org/show_bug.cgi?id=1336979 +CVE-2017-7778 - https://bugzilla.mozilla.org/show_bug.cgi?id=1349310 +CVE-2017-7781 - https://bugzilla.mozilla.org/show_bug.cgi?id=1352039 +CVE-2017-7783 - https://bugzilla.mozilla.org/show_bug.cgi?id=1360842 +CVE-2017-7783 - https://www.exploit-db.com/exploits/43020/ +CVE-2017-7788 - https://bugzilla.mozilla.org/show_bug.cgi?id=1073952 +CVE-2017-7800 - https://bugzilla.mozilla.org/show_bug.cgi?id=1374047 +CVE-2017-7805 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-7808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1367531 +CVE-2017-7817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1356596 +CVE-2017-7821 - https://bugzilla.mozilla.org/show_bug.cgi?id=1346515 +CVE-2017-7830 - https://bugzilla.mozilla.org/show_bug.cgi?id=1408990 +CVE-2017-7833 - https://bugzilla.mozilla.org/show_bug.cgi?id=1370497 +CVE-2017-7836 - https://bugzilla.mozilla.org/show_bug.cgi?id=1401339 +CVE-2017-7838 - https://bugzilla.mozilla.org/show_bug.cgi?id=1399540 +CVE-2017-7842 - https://bugzilla.mozilla.org/show_bug.cgi?id=1397064 +CVE-2017-7845 - https://bugzilla.mozilla.org/show_bug.cgi?id=1402372 +CVE-2017-7846 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411716 +CVE-2017-7847 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411708 +CVE-2017-7848 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411699 +CVE-2017-7849 - https://www.tenable.com/security/tns-2017-10 +CVE-2017-7850 - https://www.tenable.com/security/tns-2017-10 +CVE-2017-7852 - https://www.qualys.com/2017/02/22/qsa-2017-02-22/qsa-2017-02-22.pdf +CVE-2017-7857 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-7858 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-7864 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-7867 - http://bugs.icu-project.org/trac/changeset/39671 +CVE-2017-7868 - http://bugs.icu-project.org/trac/changeset/39671 +CVE-2017-7870 - http://www.securityfocus.com/bid/97671 +CVE-2017-7870 - https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722 +CVE-2017-7877 - https://github.com/flatCore/flatCore-CMS/issues/27 +CVE-2017-7881 - https://www.cdxy.me/?p=765 +CVE-2017-7885 - https://bugs.ghostscript.com/show_bug.cgi?id=697703 +CVE-2017-7889 - https://usn.ubuntu.com/3583-2/ +CVE-2017-7895 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309 +CVE-2017-7897 - https://github.com/mantisbt/mantisbt/pull/1094 +CVE-2017-7911 - https://www.tenable.com/security/research/tra-2017-19 +CVE-2017-7938 - https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html +CVE-2017-7938 - https://www.exploit-db.com/exploits/41898/ +CVE-2017-7948 - https://bugs.ghostscript.com/show_bug.cgi?id=697762 +CVE-2017-7952 - https://www.exploit-db.com/exploits/42028/ +CVE-2017-7953 - http://seclists.org/fulldisclosure/2017/May/54 +CVE-2017-7953 - https://www.exploit-db.com/exploits/42029/ +CVE-2017-7960 - https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ +CVE-2017-7961 - http://openwall.com/lists/oss-security/2017/04/24/2 +CVE-2017-7961 - https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ +CVE-2017-7961 - https://bugzilla.suse.com/show_bug.cgi?id=1034482 +CVE-2017-7962 - https://blogs.gentoo.org/ago/2017/04/17/imageworsener-divide-by-zero-in-iwgif_record_pixel-imagew-gif-c/ +CVE-2017-7962 - https://github.com/jsummers/imageworsener/issues/15 +CVE-2017-7975 - https://bugs.ghostscript.com/show_bug.cgi?id=697693 +CVE-2017-7976 - https://bugs.ghostscript.com/show_bug.cgi?id=697683 +CVE-2017-7981 - https://www.exploit-db.com/exploits/41953/ +CVE-2017-7985 - https://fortiguard.com/zeroday/FG-VD-17-107 +CVE-2017-7990 - https://www.youtube.com/watch?v=pfrIaNvIuFY +CVE-2017-7991 - http://seclists.org/fulldisclosure/2017/Apr/78 +CVE-2017-7991 - https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29 +CVE-2017-7991 - https://packetstormsecurity.com/files/142258/Exponent-CMS-2.4.1-SQL-Injection.html +CVE-2017-7994 - https://github.com/icepng/PoC/tree/master/PoC1 +CVE-2017-7994 - https://icepng.github.io/2017/04/21/PoDoFo-1/ +CVE-2017-7997 - http://seclists.org/fulldisclosure/2018/Jan/14 +CVE-2017-7997 - https://sysdream.com/news/lab/2018-01-02-cve-2017-7997-gespage-sql-injection-vulnerability/ +CVE-2017-7997 - https://www.exploit-db.com/exploits/43447/ +CVE-2017-7998 - http://seclists.org/fulldisclosure/2018/Jan/13 +CVE-2017-7998 - https://sysdream.com/news/lab/2018-01-02-cve-2017-7998-gespage-stored-cross-site-scripting-xss-vulnerability/ +CVE-2017-8013 - http://seclists.org/fulldisclosure/2017/Sep/36 +CVE-2017-8015 - http://seclists.org/fulldisclosure/2017/Sep/14 +CVE-2017-8028 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2017-8046 - https://www.exploit-db.com/exploits/44289/ +CVE-2017-8051 - https://www.exploit-db.com/exploits/41892/ +CVE-2017-8054 - http://qwertwwwe.github.io/2017/04/22/PoDoFo-0-9-5-allows-remote-attackers-to-cause-a-denial-of-service-infinit-loop/ +CVE-2017-8055 - https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt +CVE-2017-8056 - https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt +CVE-2017-8061 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67b0503db9c29b04eadfeede6bebbfe5ddad94ef +CVE-2017-8062 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=606142af57dad981b78707234cfbd15f9f7b7125 +CVE-2017-8063 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f190e3aec212fc8c61e202c51400afa7384d4bc +CVE-2017-8064 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=005145378c9ad7575a01b6ce1ba118fb427f583a +CVE-2017-8065 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b30460c5b0ed762be75a004e924ec3f8711e032 +CVE-2017-8066 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.2 +CVE-2017-8066 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c919a3069c775c1c876bec55e00b2305d5125caa +CVE-2017-8067 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c4baad50297d84bde1a7ad45e50c73adae4a2192 +CVE-2017-8068 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5593523f968bc86d42a035c6df47d5e0979b5ace +CVE-2017-8069 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7926aff5c57b577ab0f43364ff0c59d968f6a414 +CVE-2017-8070 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478 +CVE-2017-8071 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a7b5df84b6b4e5d599c7289526eed96541a0654 +CVE-2017-8072 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8e9faa15469ed7c7467423db4c62aeed3ff4cae3 +CVE-2017-8083 - http://seclists.org/fulldisclosure/2017/Jun/6 +CVE-2017-8083 - https://watchmysys.com/blog/2017/06/cve-2017-8083-compulab-intensepc-lacks-bios-wp/ +CVE-2017-8098 - http://seclists.org/fulldisclosure/2017/Apr/40 +CVE-2017-8099 - http://seclists.org/fulldisclosure/2017/Apr/41 +CVE-2017-8100 - http://seclists.org/fulldisclosure/2017/Apr/42 +CVE-2017-8101 - http://seclists.org/fulldisclosure/2017/Apr/52 +CVE-2017-8102 - http://seclists.org/fulldisclosure/2017/Apr/44 +CVE-2017-8103 - http://seclists.org/fulldisclosure/2017/Apr/53 +CVE-2017-8104 - http://seclists.org/fulldisclosure/2017/Apr/55 +CVE-2017-8105 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-8106 - https://bugzilla.kernel.org/show_bug.cgi?id=195167 +CVE-2017-8106 - https://launchpad.net/bugs/1678676 +CVE-2017-8110 - http://jgj212.blogspot.hk/2017/04/modified-ecommerce-shopsoftware-2022.html +CVE-2017-8114 - https://hackerone.com/reports/242119 +CVE-2017-8116 - https://labs.nettitude.com/blog/cve-2017-8116-teltonika-router-unauthenticated-remote-code-execution/ +CVE-2017-8221 - http://seclists.org/fulldisclosure/2017/Mar/23 +CVE-2017-8221 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#cloud +CVE-2017-8222 - http://seclists.org/fulldisclosure/2017/Mar/23 +CVE-2017-8222 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#rsa-lulz +CVE-2017-8223 - http://seclists.org/fulldisclosure/2017/Mar/23 +CVE-2017-8223 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead +CVE-2017-8224 - http://seclists.org/fulldisclosure/2017/Mar/23 +CVE-2017-8224 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#backdoor-account +CVE-2017-8225 - http://seclists.org/fulldisclosure/2017/Mar/23 +CVE-2017-8225 - https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead +CVE-2017-8226 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html +CVE-2017-8227 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html +CVE-2017-8228 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html +CVE-2017-8229 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html +CVE-2017-8230 - http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html +CVE-2017-8252 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-8260 - https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/blob/master/CVE-2017-8260.c +CVE-2017-8274 - http://www.securityfocus.com/bid/103671 +CVE-2017-8275 - http://www.securityfocus.com/bid/103671 +CVE-2017-8276 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2017-8287 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2017-8289 - https://github.com/RIOT-OS/RIOT/issues/6840 +CVE-2017-8289 - https://github.com/RIOT-OS/RIOT/pull/6961 +CVE-2017-8289 - https://github.com/RIOT-OS/RIOT/pull/6962 +CVE-2017-8290 - http://packetstormsecurity.com/files/143053/TeamSpeak-Client-3.1.4-Buffer-Overflow.html +CVE-2017-8291 - https://www.exploit-db.com/exploits/41955/ +CVE-2017-8295 - https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html +CVE-2017-8295 - https://wpvulndb.com/vulnerabilities/8807 +CVE-2017-8295 - https://www.exploit-db.com/exploits/41963/ +CVE-2017-8298 - https://github.com/cnvs/canvas/issues/331 +CVE-2017-8303 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8304 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8311 - https://www.exploit-db.com/exploits/44514/ +CVE-2017-8325 - https://blogs.gentoo.org/ago/2017/04/27/imageworsener-heap-based-buffer-overflow-in-iw_process_cols_to_intermediate-imagew-main-c/ +CVE-2017-8326 - https://blogs.gentoo.org/ago/2017/04/27/imageworsener-two-left-shift/ +CVE-2017-8327 - https://blogs.gentoo.org/ago/2017/04/27/imageworsener-memory-allocation-failure-in-my_mallocfn-imagew-cmd-c/ +CVE-2017-8328 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8329 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8330 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8331 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8332 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8333 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8334 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8335 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8336 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8337 - http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html +CVE-2017-8338 - http://seclists.org/fulldisclosure/2017/May/59 +CVE-2017-8338 - https://cxsecurity.com/issue/WLB-2017050062 +CVE-2017-8338 - https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html +CVE-2017-8338 - https://www.vulnerability-lab.com/get_content.php?id=2064 +CVE-2017-8339 - https://www.exploit-db.com/exploits/41945/ +CVE-2017-8345 - https://github.com/ImageMagick/ImageMagick/issues/442 +CVE-2017-8360 - https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt +CVE-2017-8361 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/ +CVE-2017-8362 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/ +CVE-2017-8363 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/ +CVE-2017-8364 - https://blogs.gentoo.org/ago/2017/04/29/rzip-heap-based-buffer-overflow-in-read_buf-stream-c/ +CVE-2017-8365 - https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/ +CVE-2017-8366 - https://blogs.gentoo.org/ago/2017/04/29/ettercap-etterfilter-heap-based-buffer-overflow-write/ +CVE-2017-8367 - https://www.exploit-db.com/exploits/41911/ +CVE-2017-8372 - https://blogs.gentoo.org/ago/2017/04/30/libmad-assertion-failure-in-layer3-c/ +CVE-2017-8373 - https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/ +CVE-2017-8374 - https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_bit_skip-bit-c/ +CVE-2017-8378 - https://github.com/xiangxiaobo/poc_and_report/tree/master/podofo_heapoverflow_PdfParser.ReadObjects +CVE-2017-8382 - http://en.0day.today/exploit/27771 +CVE-2017-8382 - https://github.com/Admidio/admidio/issues/612 +CVE-2017-8382 - https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc +CVE-2017-8382 - https://www.exploit-db.com/exploits/42005/ +CVE-2017-8400 - https://github.com/matthiaskramm/swftools/issues/13 +CVE-2017-8401 - https://github.com/matthiaskramm/swftools/issues/14 +CVE-2017-8403 - https://www.slideshare.net/fuguet/bluediot-when-a-mature-and-immature-technology-mixes-becomes-an-idiot-situation-75529672 +CVE-2017-8404 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8405 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8406 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8407 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8409 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8410 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8411 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8412 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8413 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8414 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8415 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8416 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8417 - http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html +CVE-2017-8418 - http://www.openwall.com/lists/oss-security/2017/05/01/14 +CVE-2017-8418 - https://github.com/bbatsov/rubocop/issues/4336 +CVE-2017-8419 - https://sourceforge.net/p/lame/bugs/458/ +CVE-2017-8422 - http://www.openwall.com/lists/oss-security/2017/05/10/3 +CVE-2017-8422 - https://www.exploit-db.com/exploits/42053/ +CVE-2017-8438 - https://www.elastic.co/community/security +CVE-2017-8439 - https://www.elastic.co/community/security +CVE-2017-8440 - https://www.elastic.co/community/security +CVE-2017-8441 - https://www.elastic.co/community/security +CVE-2017-8442 - https://www.elastic.co/community/security +CVE-2017-8443 - https://www.elastic.co/community/security +CVE-2017-8445 - https://www.elastic.co/community/security +CVE-2017-8446 - https://www.elastic.co/community/security +CVE-2017-8449 - https://www.elastic.co/community/security +CVE-2017-8450 - https://www.elastic.co/community/security +CVE-2017-8451 - https://www.elastic.co/community/security +CVE-2017-8452 - https://www.elastic.co/community/security +CVE-2017-8461 - http://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html +CVE-2017-8462 - https://www.exploit-db.com/exploits/42218/ +CVE-2017-8464 - https://www.exploit-db.com/exploits/42382/ +CVE-2017-8464 - https://www.exploit-db.com/exploits/42429/ +CVE-2017-8469 - https://www.exploit-db.com/exploits/42217/ +CVE-2017-8470 - https://www.exploit-db.com/exploits/42223/ +CVE-2017-8471 - https://www.exploit-db.com/exploits/42224/ +CVE-2017-8472 - https://www.exploit-db.com/exploits/42225/ +CVE-2017-8473 - https://www.exploit-db.com/exploits/42226/ +CVE-2017-8476 - https://www.exploit-db.com/exploits/42229/ +CVE-2017-8477 - https://www.exploit-db.com/exploits/42230/ +CVE-2017-8478 - https://www.exploit-db.com/exploits/42231/ +CVE-2017-8479 - https://www.exploit-db.com/exploits/42232/ +CVE-2017-8480 - https://www.exploit-db.com/exploits/42233/ +CVE-2017-8481 - https://www.exploit-db.com/exploits/42242/ +CVE-2017-8482 - https://www.exploit-db.com/exploits/42220/ +CVE-2017-8483 - https://www.exploit-db.com/exploits/42243/ +CVE-2017-8484 - https://www.exploit-db.com/exploits/42210/ +CVE-2017-8485 - https://www.exploit-db.com/exploits/42228/ +CVE-2017-8487 - https://www.exploit-db.com/exploits/42211/ +CVE-2017-8488 - https://www.exploit-db.com/exploits/42212/ +CVE-2017-8489 - https://www.exploit-db.com/exploits/42213/ +CVE-2017-8490 - https://www.exploit-db.com/exploits/42214/ +CVE-2017-8491 - https://www.exploit-db.com/exploits/42215/ +CVE-2017-8492 - https://www.exploit-db.com/exploits/42216/ +CVE-2017-8496 - https://www.exploit-db.com/exploits/42246/ +CVE-2017-8535 - https://www.exploit-db.com/exploits/42081/ +CVE-2017-8536 - https://www.exploit-db.com/exploits/42081/ +CVE-2017-8537 - https://www.exploit-db.com/exploits/42081/ +CVE-2017-8538 - https://www.exploit-db.com/exploits/42081/ +CVE-2017-8540 - https://www.exploit-db.com/exploits/42088/ +CVE-2017-8541 - https://www.exploit-db.com/exploits/42092/ +CVE-2017-8548 - https://www.exploit-db.com/exploits/42473/ +CVE-2017-8550 - https://www.exploit-db.com/exploits/42316/ +CVE-2017-8558 - https://www.exploit-db.com/exploits/42264/ +CVE-2017-8564 - https://www.exploit-db.com/exploits/42338/ +CVE-2017-8570 - https://github.com/rxwx/CVE-2017-8570 +CVE-2017-8594 - https://www.exploit-db.com/exploits/42336/ +CVE-2017-8601 - https://www.exploit-db.com/exploits/42479/ +CVE-2017-8618 - https://www.exploit-db.com/exploits/42337/ +CVE-2017-8620 - https://threatpost.com/windows-search-bug-worth-watching-and-squashing/127434/ +CVE-2017-8625 - https://msitpros.com/?p=3909 +CVE-2017-8625 - https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/ +CVE-2017-8625 - https://posts.specterops.io/umci-vs-internet-explorer-exploring-cve-2017-8625-3946536c6442 +CVE-2017-8634 - https://www.exploit-db.com/exploits/42474/ +CVE-2017-8635 - https://www.exploit-db.com/exploits/42471/ +CVE-2017-8636 - https://www.exploit-db.com/exploits/42466/ +CVE-2017-8636 - https://www.exploit-db.com/exploits/42467/ +CVE-2017-8636 - https://www.exploit-db.com/exploits/42468/ +CVE-2017-8636 - https://www.exploit-db.com/exploits/42478/ +CVE-2017-8640 - https://www.exploit-db.com/exploits/42476/ +CVE-2017-8641 - https://www.exploit-db.com/exploits/42465/ +CVE-2017-8644 - https://www.exploit-db.com/exploits/42459/ +CVE-2017-8645 - https://www.exploit-db.com/exploits/42469/ +CVE-2017-8646 - https://www.exploit-db.com/exploits/42470/ +CVE-2017-8652 - https://www.exploit-db.com/exploits/42445/ +CVE-2017-8656 - https://www.exploit-db.com/exploits/42464/ +CVE-2017-8657 - https://www.exploit-db.com/exploits/42481/ +CVE-2017-8665 - https://www.exploit-db.com/exploits/42454/ +CVE-2017-8670 - https://www.exploit-db.com/exploits/42477/ +CVE-2017-8671 - https://www.exploit-db.com/exploits/42475/ +CVE-2017-8678 - https://www.exploit-db.com/exploits/42750/ +CVE-2017-8680 - https://www.exploit-db.com/exploits/42741/ +CVE-2017-8681 - https://www.exploit-db.com/exploits/42742/ +CVE-2017-8682 - https://www.exploit-db.com/exploits/42744/ +CVE-2017-8683 - https://www.exploit-db.com/exploits/42746/ +CVE-2017-8684 - https://www.exploit-db.com/exploits/42747/ +CVE-2017-8685 - https://www.exploit-db.com/exploits/42748/ +CVE-2017-8687 - https://www.exploit-db.com/exploits/42749/ +CVE-2017-8708 - https://www.exploit-db.com/exploits/42743/ +CVE-2017-8710 - https://www.vulnerability-lab.com/get_content.php?id=2094 +CVE-2017-8710 - https://www.youtube.com/watch?v=bIFot3a-58I +CVE-2017-8729 - https://www.exploit-db.com/exploits/42763/ +CVE-2017-8731 - https://www.exploit-db.com/exploits/42758/ +CVE-2017-8734 - https://www.exploit-db.com/exploits/42759/ +CVE-2017-8740 - https://www.exploit-db.com/exploits/42764/ +CVE-2017-8751 - https://www.exploit-db.com/exploits/43151/ +CVE-2017-8755 - https://www.exploit-db.com/exploits/42766/ +CVE-2017-8759 - https://www.exploit-db.com/exploits/42711/ +CVE-2017-8760 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8765 - https://github.com/ImageMagick/ImageMagick/issues/466 +CVE-2017-8768 - http://openwall.com/lists/oss-security/2017/05/03/5 +CVE-2017-8768 - http://seclists.org/fulldisclosure/2017/May/10 +CVE-2017-8768 - https://www.youtube.com/watch?v=SQ1_Ht-0Bdo +CVE-2017-8770 - https://www.exploit-db.com/exploits/42547/ +CVE-2017-8779 - https://www.exploit-db.com/exploits/41974/ +CVE-2017-8782 - http://seclists.org/fulldisclosure/2017/May/106 +CVE-2017-8786 - https://blogs.gentoo.org/ago/2017/04/29/libpcre-heap-based-buffer-overflow-write-in-pcre2test-c/ +CVE-2017-8788 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8789 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8790 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8791 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8792 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8793 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8794 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8795 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8796 - https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb +CVE-2017-8798 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 +CVE-2017-8824 - http://www.openwall.com/lists/oss-security/2017/12/05/1 +CVE-2017-8824 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-8824 - https://usn.ubuntu.com/3581-1/ +CVE-2017-8824 - https://usn.ubuntu.com/3582-1/ +CVE-2017-8824 - https://usn.ubuntu.com/3583-2/ +CVE-2017-8824 - https://www.exploit-db.com/exploits/43234/ +CVE-2017-8825 - https://github.com/dinhviethoa/libetpan/issues/274 +CVE-2017-8829 - https://bugs.debian.org/861958 +CVE-2017-8830 - https://github.com/ImageMagick/ImageMagick/issues/467 +CVE-2017-8832 - https://github.com/s3131212/allendisk/commit/37b6a63b85d5ab3ed81141cadc47489d7571664b +CVE-2017-8833 - https://github.com/zencart/zencart/issues/1431 +CVE-2017-8834 - https://www.exploit-db.com/exploits/42147/ +CVE-2017-8835 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8836 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8837 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8838 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8839 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8840 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8841 - https://www.exploit-db.com/exploits/42130/ +CVE-2017-8842 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-divide-by-zero-in-bufreadget-libzpaq-h/ +CVE-2017-8842 - https://github.com/ckolivas/lrzip/issues/66 +CVE-2017-8843 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-null-pointer-dereference-in-join_pthread-stream-c/ +CVE-2017-8843 - https://github.com/ckolivas/lrzip/issues/69 +CVE-2017-8844 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/ +CVE-2017-8844 - https://github.com/ckolivas/lrzip/issues/70 +CVE-2017-8845 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-invalid-memory-read-in-lzo_decompress_buf-stream-c/ +CVE-2017-8845 - https://github.com/ckolivas/lrzip/issues/68 +CVE-2017-8846 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-use-after-free-in-read_stream-stream-c/ +CVE-2017-8846 - https://github.com/ckolivas/lrzip/issues/71 +CVE-2017-8847 - https://blogs.gentoo.org/ago/2017/05/07/lrzip-null-pointer-dereference-in-bufreadget-libzpaq-h/ +CVE-2017-8847 - https://github.com/ckolivas/lrzip/issues/67 +CVE-2017-8848 - https://github.com/s3131212/allendisk/issues/16 +CVE-2017-8849 - http://www.openwall.com/lists/oss-security/2017/05/10/3 +CVE-2017-8849 - https://www.exploit-db.com/exploits/42053/ +CVE-2017-8850 - https://alephsecurity.com/vulns/aleph-2017020 +CVE-2017-8851 - https://alephsecurity.com/vulns/aleph-2017021 +CVE-2017-8852 - https://www.coresecurity.com/advisories/sap-sapcar-heap-based-buffer-overflow-vulnerability +CVE-2017-8852 - https://www.exploit-db.com/exploits/41991/ +CVE-2017-8869 - https://www.exploit-db.com/exploits/42384/ +CVE-2017-8870 - https://www.exploit-db.com/exploits/42385/ +CVE-2017-8871 - https://www.exploit-db.com/exploits/42147/ +CVE-2017-8872 - https://bugzilla.gnome.org/show_bug.cgi?id=775200 +CVE-2017-8875 - http://seclists.org/fulldisclosure/2017/May/23 +CVE-2017-8877 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ +CVE-2017-8878 - https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/ +CVE-2017-8892 - https://www.tarlogic.com/blog/vulnerabilidades-en-tempobox/ +CVE-2017-8893 - https://www.tarlogic.com/advisories/Tarlogic-2017-001.txt +CVE-2017-8894 - https://www.tarlogic.com/advisories/Tarlogic-2017-001.txt +CVE-2017-8895 - https://www.exploit-db.com/exploits/42282/ +CVE-2017-8908 - https://bugs.ghostscript.com/show_bug.cgi?id=697810 +CVE-2017-8911 - https://github.com/verdammelt/tnef/issues/23 +CVE-2017-8912 - https://www.exploit-db.com/exploits/41997/ +CVE-2017-8913 - https://erpscan.io/advisories/erpscan-17-007-sap-netweaver-java-7-5-xxe-visual-composer-vc70runtime/ +CVE-2017-8914 - https://erpscan.io/advisories/erpscan-17-009-sap-hana-sinopia-default-user-creation-policy-insecure/ +CVE-2017-8915 - https://erpscan.io/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/ +CVE-2017-8917 - https://www.exploit-db.com/exploits/42033/ +CVE-2017-8917 - https://www.exploit-db.com/exploits/44358/ +CVE-2017-8926 - https://www.exploit-db.com/exploits/42001/ +CVE-2017-8927 - https://www.exploit-db.com/exploits/42002/ +CVE-2017-8928 - https://www.exploit-db.com/exploits/42004/ +CVE-2017-8932 - https://groups.google.com/d/msg/golang-announce/B5ww0iFt1_Q/TgUFJV14BgAJ +CVE-2017-8949 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us +CVE-2017-8950 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us +CVE-2017-8951 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us +CVE-2017-8952 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us +CVE-2017-8982 - https://www.exploit-db.com/exploits/44648/ +CVE-2017-8994 - https://www.tenable.com/security/research/tra-2017-25 +CVE-2017-8994 - https://www.tenable.com/security/research/tra-2017-28 +CVE-2017-9024 - http://hyp3rlinx.altervista.org/advisories/SECURE-AUDITOR-v3.0-DIRECTORY-TRAVERSAL.txt +CVE-2017-9024 - https://www.exploit-db.com/exploits/42041/ +CVE-2017-9030 - https://navixia.com/storage/app/media/uploaded-files/CVE/cve-2017-521415.txt +CVE-2017-9032 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html +CVE-2017-9032 - http://seclists.org/fulldisclosure/2017/May/91 +CVE-2017-9032 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities +CVE-2017-9033 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html +CVE-2017-9033 - http://seclists.org/fulldisclosure/2017/May/91 +CVE-2017-9033 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities +CVE-2017-9034 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html +CVE-2017-9034 - http://seclists.org/fulldisclosure/2017/May/91 +CVE-2017-9034 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities +CVE-2017-9035 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html +CVE-2017-9035 - http://seclists.org/fulldisclosure/2017/May/91 +CVE-2017-9035 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities +CVE-2017-9036 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html +CVE-2017-9036 - http://seclists.org/fulldisclosure/2017/May/91 +CVE-2017-9036 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities +CVE-2017-9037 - http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html +CVE-2017-9037 - http://seclists.org/fulldisclosure/2017/May/91 +CVE-2017-9037 - https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities +CVE-2017-9038 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9039 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9040 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9041 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9042 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9043 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9044 - https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ +CVE-2017-9045 - https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-google-io-2017-android-app/ +CVE-2017-9046 - https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-Execution.html +CVE-2017-9052 - https://www.prevanders.net/dwarfbug.html +CVE-2017-9053 - https://www.prevanders.net/dwarfbug.html +CVE-2017-9054 - https://www.prevanders.net/dwarfbug.html +CVE-2017-9055 - https://www.prevanders.net/dwarfbug.html +CVE-2017-9065 - https://wpvulndb.com/vulnerabilities/8817 +CVE-2017-9072 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-9074 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2017-9080 - http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ +CVE-2017-9080 - https://www.exploit-db.com/exploits/42003/ +CVE-2017-9080 - https://www.exploit-db.com/exploits/44599/ +CVE-2017-9083 - https://bugs.freedesktop.org/show_bug.cgi?id=101084 +CVE-2017-9085 - https://packetstormsecurity.com/files/142587/Kodak-InSite-8.0-Cross-Site-Scripting.html +CVE-2017-9095 - https://www.exploit-db.com/exploits/43187/ +CVE-2017-9096 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-9098 - http://www.securityfocus.com/bid/98593 +CVE-2017-9100 - http://touhidshaikh.com/blog/poc/d-link-dir600-auth-bypass/ +CVE-2017-9100 - https://www.exploit-db.com/exploits/42039/ +CVE-2017-9101 - https://www.exploit-db.com/exploits/42044/ +CVE-2017-9101 - https://www.exploit-db.com/exploits/44598/ +CVE-2017-9117 - http://bugzilla.maptools.org/show_bug.cgi?id=2690 +CVE-2017-9117 - https://usn.ubuntu.com/3606-1/ +CVE-2017-9120 - https://bugs.php.net/bug.php?id=74544 +CVE-2017-9122 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9123 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9124 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9125 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9126 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9127 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9128 - https://www.exploit-db.com/exploits/42148/ +CVE-2017-9129 - https://www.exploit-db.com/exploits/42207/ +CVE-2017-9130 - https://www.exploit-db.com/exploits/42207/ +CVE-2017-9140 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 +CVE-2017-9140 - https://www.veracode.com/blog/research/anatomy-cross-site-scripting-flaw-telerik-reporting-module +CVE-2017-9147 - http://bugzilla.maptools.org/show_bug.cgi?id=2693 +CVE-2017-9147 - https://usn.ubuntu.com/3606-1/ +CVE-2017-9147 - https://www.exploit-db.com/exploits/42301/ +CVE-2017-9148 - http://seclists.org/oss-sec/2017/q2/422 +CVE-2017-9150 - https://www.exploit-db.com/exploits/42048/ +CVE-2017-9151 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9152 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9153 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9154 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9155 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9156 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9157 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9158 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9159 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9160 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9161 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9162 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9163 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9164 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9165 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9166 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9167 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9168 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9169 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9170 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9171 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9172 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9173 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9174 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9175 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9176 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9177 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9178 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9179 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9180 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9181 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9182 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9183 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9184 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9185 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9186 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9187 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9188 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9189 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9190 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9191 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9192 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9193 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9194 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9195 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9196 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9197 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9198 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9199 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9200 - https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/ +CVE-2017-9201 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9202 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9203 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9204 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9205 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9206 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9207 - https://blogs.gentoo.org/ago/2017/05/20/imageworsener-multiple-vulnerabilities/ +CVE-2017-9208 - https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ +CVE-2017-9209 - https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ +CVE-2017-9210 - https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/ +CVE-2017-9218 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9219 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9220 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9221 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9222 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9223 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9232 - https://www.exploit-db.com/exploits/44023/ +CVE-2017-9233 - http://www.securityfocus.com/bid/99276 +CVE-2017-9239 - https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test(exiv2) +CVE-2017-9243 - http://touhidshaikh.com/blog/poc/qwr-1104-wireless-n-router-xss/ +CVE-2017-9243 - https://www.exploit-db.com/exploits/42075/ +CVE-2017-9248 - https://www.exploit-db.com/exploits/43873/ +CVE-2017-9249 - https://github.com/s3131212/allendisk/issues/21 +CVE-2017-9253 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9254 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9255 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9256 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9257 - http://seclists.org/fulldisclosure/2017/Jun/32 +CVE-2017-9258 - http://seclists.org/fulldisclosure/2017/Jul/62 +CVE-2017-9258 - https://www.exploit-db.com/exploits/42389/ +CVE-2017-9259 - http://seclists.org/fulldisclosure/2017/Jul/62 +CVE-2017-9259 - https://www.exploit-db.com/exploits/42389/ +CVE-2017-9260 - http://seclists.org/fulldisclosure/2017/Jul/62 +CVE-2017-9260 - https://www.exploit-db.com/exploits/42389/ +CVE-2017-9281 - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes +CVE-2017-9282 - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes +CVE-2017-9283 - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes +CVE-2017-9287 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2017-9287 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2017-9288 - http://jgj212.blogspot.kr/2017/05/a-reflected-xss-vulnerability-in.html +CVE-2017-9288 - https://wpvulndb.com/vulnerabilities/8836 +CVE-2017-9299 - http://code610.blogspot.com/2017/05/turnkey-feat-otrs.html +CVE-2017-9300 - http://code610.blogspot.com/2017/04/multiple-crashes-in-vlc-224.html +CVE-2017-9301 - http://code610.blogspot.com/2017/04/multiple-crashes-in-vlc-224.html +CVE-2017-9302 - http://code610.blogspot.com/2017/05/divided-realplayer-160232.html +CVE-2017-9305 - https://www.cdxy.me/?p=763 +CVE-2017-9306 - https://www.cdxy.me/?p=763 +CVE-2017-9313 - http://seclists.org/bugtraq/2017/Jul/3 +CVE-2017-9324 - https://packetstormsecurity.com/files/142862/OTRS-Install-Dialog-Disclosure.html +CVE-2017-9328 - https://gist.github.com/hybriz/63bbe2d963e531357aca353c74dd1ad5 +CVE-2017-9347 - https://www.exploit-db.com/exploits/42124/ +CVE-2017-9353 - https://www.exploit-db.com/exploits/42123/ +CVE-2017-9355 - http://hyp3rlinx.altervista.org/advisories/SUBSONIC-XML-EXTERNAL-ENITITY.txt +CVE-2017-9355 - http://packetstormsecurity.com/files/142795/Subsonic-6.1.1-XML-External-Entity-Attack.html +CVE-2017-9355 - https://www.exploit-db.com/exploits/42119/ +CVE-2017-9356 - http://seclists.org/bugtraq/2017/Jun/43 +CVE-2017-9360 - https://jgj212.blogspot.tw/2017/05/a-sql-injection-vulnerability-in.html +CVE-2017-9361 - https://jgj212.blogspot.tw/2017/05/a-stored-xss-vulnerability-in.html +CVE-2017-9369 - http://support.blackberry.com/kb/articleDetail?articleNumber=000046674 +CVE-2017-9370 - http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000045350 +CVE-2017-9374 - https://bugzilla.redhat.com/show_bug.cgi?id=1459132 +CVE-2017-9379 - https://github.com/bigtreecms/BigTree-CMS/issues/287 +CVE-2017-9380 - http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html +CVE-2017-9381 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9382 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9383 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9384 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9385 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9386 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9388 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9389 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9390 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9391 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9392 - http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html +CVE-2017-9406 - https://bugs.freedesktop.org/show_bug.cgi?id=100775 +CVE-2017-9408 - https://bugs.freedesktop.org/show_bug.cgi?id=100776 +CVE-2017-9412 - http://seclists.org/fulldisclosure/2017/Jul/63 +CVE-2017-9412 - https://www.exploit-db.com/exploits/42390/ +CVE-2017-9413 - http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html +CVE-2017-9413 - https://www.exploit-db.com/exploits/42118/ +CVE-2017-9414 - http://hyp3rlinx.altervista.org/advisories/SUBSONIC-CSRF-PERSISTENT-XSS.txt +CVE-2017-9414 - http://packetstormsecurity.com/files/142796/Subsonic-6.1.1-Persistent-XSS.html +CVE-2017-9414 - https://www.exploit-db.com/exploits/42120/ +CVE-2017-9415 - https://www.exploit-db.com/exploits/42117/ +CVE-2017-9417 - https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets +CVE-2017-9418 - https://wpvulndb.com/vulnerabilities/8845 +CVE-2017-9418 - https://www.exploit-db.com/exploits/42166/ +CVE-2017-9419 - https://wpvulndb.com/vulnerabilities/8848 +CVE-2017-9420 - https://wpvulndb.com/vulnerabilities/8842 +CVE-2017-9424 - https://www.blackhat.com/us-17/briefings.html#friday-the-13th-json-attacks +CVE-2017-9425 - http://touhidshaikh.com/blog/poc/facetag-ext-piwigo-stored-xss/ +CVE-2017-9425 - https://www.exploit-db.com/exploits/42098/ +CVE-2017-9425 - https://www.youtube.com/watch?v=_ha7XBT_Omo +CVE-2017-9426 - http://touhidshaikh.com/blog/poc/facetag-extension-piwigo-sqli/ +CVE-2017-9426 - https://www.exploit-db.com/exploits/42094/ +CVE-2017-9426 - https://www.youtube.com/watch?v=MVCe_zYtFsQ +CVE-2017-9427 - https://github.com/bigtreecms/BigTree-CMS/issues/288 +CVE-2017-9428 - https://github.com/bigtreecms/BigTree-CMS/issues/289 +CVE-2017-9429 - https://www.exploit-db.com/exploits/42173/ +CVE-2017-9430 - https://packetstormsecurity.com/files/142799/DNSTracer-1.8.1-Buffer-Overflow.html +CVE-2017-9430 - https://www.exploit-db.com/exploits/42115/ +CVE-2017-9430 - https://www.exploit-db.com/exploits/42424/ +CVE-2017-9441 - https://github.com/bigtreecms/BigTree-CMS/issues/290 +CVE-2017-9442 - https://github.com/bigtreecms/BigTree-CMS/issues/291 +CVE-2017-9443 - https://github.com/bigtreecms/BigTree-CMS/issues/292 +CVE-2017-9444 - https://github.com/bigtreecms/BigTree-CMS/issues/293 +CVE-2017-9447 - https://www.exploit-db.com/exploits/442321/ +CVE-2017-9448 - https://github.com/bigtreecms/BigTree-CMS/issues/294 +CVE-2017-9449 - https://github.com/bigtreecms/BigTree-CMS/issues/295 +CVE-2017-9450 - https://sintonen.fi/advisories/aws-cfn-bootstrap-local-code-execution-as-root.txt +CVE-2017-9457 - http://packetstormsecurity.com/files/143481/Compulab-Intense-PC-MintBox-2-Signature-Verification.html +CVE-2017-9457 - http://seclists.org/fulldisclosure/2017/Jul/56 +CVE-2017-9457 - https://watchmysys.com/blog/2017/07/cve-2017-9457-compulab-intense-pc-lacks-firmware-validation/ +CVE-2017-9462 - https://hackerone.com/reports/222020 +CVE-2017-9470 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-null-pointer-dereference-in-mapiprint-ytnef-c/ +CVE-2017-9471 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapword-ytnef-c/ +CVE-2017-9472 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapdword-ytnef-c/ +CVE-2017-9473 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-memory-allocation-failure-in-tneffillmapi-ytnef-c/ +CVE-2017-9474 - https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-decompressrtf-ytnef-c/ +CVE-2017-9475 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-17.public-wifi-theft-impersonation.txt +CVE-2017-9476 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-18.home-security-wifi-network.txt +CVE-2017-9477 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-19.wifi-dhcp-cm-mac-leak.txt +CVE-2017-9478 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-20.emta-reverse-dns.txt +CVE-2017-9479 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-22.syseventd.txt +CVE-2017-9480 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-23.upnp-directory-write.txt +CVE-2017-9481 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-24.atom-ip-routing.txt +CVE-2017-9482 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-25.atom-telnet.txt +CVE-2017-9483 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-26.arbitrary-command-execution.txt +CVE-2017-9484 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-27.ipv6-cm-mac-leak.txt +CVE-2017-9485 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-28.session-cookie-write.txt +CVE-2017-9486 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-29.password-of-the-day.txt +CVE-2017-9487 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-30.wan0-ipv6-cm-mac.txt +CVE-2017-9488 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-31.stb-remote-webui.txt +CVE-2017-9489 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt +CVE-2017-9490 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt +CVE-2017-9491 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt +CVE-2017-9492 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt +CVE-2017-9493 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-37.rf4ce-forced-pairing.vendor.txt +CVE-2017-9494 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-38.remote-web-inspector.txt +CVE-2017-9495 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-39.arbitrary-file-read.txt +CVE-2017-9496 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-40.ethernet-snmp.txt +CVE-2017-9497 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-41.root-command-execution.txt +CVE-2017-9498 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-42.remote-OTA.txt +CVE-2017-9506 - https://ecosystem.atlassian.net/browse/OAUTH-344 +CVE-2017-9513 - https://ecosystem.atlassian.net/browse/STRM-2350 +CVE-2017-9516 - https://packetstormsecurity.com/files/142851/Craft-CMS-2.6-Cross-Site-Scripting-File-Upload.html +CVE-2017-9516 - https://www.exploit-db.com/exploits/42143/ +CVE-2017-9521 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-32.unnecessary-services.txt +CVE-2017-9522 - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-21.default-wifi-credentials.txt +CVE-2017-9526 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-9526 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-9542 - https://www.facebook.com/tigerBOY777/videos/1368513696568992/ +CVE-2017-9543 - https://www.exploit-db.com/exploits/42154/ +CVE-2017-9544 - https://www.exploit-db.com/exploits/42155/ +CVE-2017-9545 - http://seclists.org/fulldisclosure/2017/Jul/65 +CVE-2017-9546 - https://github.com/bigtreecms/BigTree-CMS/issues/298 +CVE-2017-9547 - https://github.com/bigtreecms/BigTree-CMS/issues/297 +CVE-2017-9548 - https://github.com/bigtreecms/BigTree-CMS/issues/296 +CVE-2017-9554 - https://www.exploit-db.com/exploits/43455/ +CVE-2017-9557 - https://www.exploit-db.com/exploits/42153/ +CVE-2017-9558 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9559 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9560 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9561 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9562 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9563 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9564 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9565 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9566 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9567 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9568 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9569 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9570 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9571 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9572 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9573 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9574 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9575 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9576 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9577 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9578 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9579 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9580 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9581 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9582 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9583 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9584 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9585 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9586 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9587 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9588 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9589 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9590 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9591 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9592 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9593 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9594 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9595 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9596 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9597 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9598 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9599 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9600 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9601 - https://medium.com/@chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5 +CVE-2017-9602 - https://www.exploit-db.com/exploits/42184/ +CVE-2017-9603 - https://wpvulndb.com/vulnerabilities/8847 +CVE-2017-9603 - https://www.exploit-db.com/exploits/42172/ +CVE-2017-9608 - http://www.openwall.com/lists/oss-security/2017/08/14/1 +CVE-2017-9608 - http://www.openwall.com/lists/oss-security/2017/08/15/8 +CVE-2017-9609 - http://packetstormsecurity.com/files/143103/Blackcat-CMS-1.2-Cross-Site-Scripting.html +CVE-2017-9609 - https://github.com/BlackCatDevelopment/BlackCatCMS/issues/373 +CVE-2017-9609 - https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc +CVE-2017-9610 - https://bugs.ghostscript.com/show_bug.cgi?id=698025 +CVE-2017-9611 - https://bugs.ghostscript.com/show_bug.cgi?id=698024 +CVE-2017-9612 - https://bugs.ghostscript.com/show_bug.cgi?id=698026 +CVE-2017-9613 - https://packetstormsecurity.com/files/142952/SAP-Successfactors-b1702p5e.1190658-Cross-Site-Scripting.html +CVE-2017-9614 - http://packetstormsecurity.com/files/143518/libjpeg-turbo-1.5.1-Denial-Of-Service.html +CVE-2017-9614 - http://seclists.org/fulldisclosure/2017/Jul/66 +CVE-2017-9614 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/167 +CVE-2017-9614 - https://www.exploit-db.com/exploits/42391/ +CVE-2017-9616 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 +CVE-2017-9617 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13799 +CVE-2017-9618 - https://bugs.ghostscript.com/show_bug.cgi?id=698044 +CVE-2017-9619 - https://bugs.ghostscript.com/show_bug.cgi?id=698042 +CVE-2017-9620 - https://bugs.ghostscript.com/show_bug.cgi?id=698050 +CVE-2017-9640 - https://www.exploit-db.com/exploits/42543/ +CVE-2017-9644 - https://www.exploit-db.com/exploits/42542/ +CVE-2017-9650 - https://www.exploit-db.com/exploits/42544/ +CVE-2017-9669 - http://www.openwall.com/lists/oss-security/2017/06/25/2 +CVE-2017-9670 - https://sourceforge.net/p/gnuplot/bugs/1933/ +CVE-2017-9671 - http://www.openwall.com/lists/oss-security/2017/06/25/2 +CVE-2017-9673 - https://packetstormsecurity.com/files/142944/SimpleCE-2.3.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2017-9674 - https://packetstormsecurity.com/files/142944/SimpleCE-2.3.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2017-9675 - https://www.exploit-db.com/exploits/43147/ +CVE-2017-9726 - http://bugs.ghostscript.com/show_bug.cgi?id=698055 +CVE-2017-9727 - http://bugs.ghostscript.com/show_bug.cgi?id=698056 +CVE-2017-9728 - http://openwall.com/lists/oss-security/2017/06/16/4 +CVE-2017-9729 - http://openwall.com/lists/oss-security/2017/06/16/4 +CVE-2017-9730 - https://www.exploit-db.com/exploits/42193/ +CVE-2017-9732 - http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html +CVE-2017-9732 - http://seclists.org/fulldisclosure/2018/Nov/65 +CVE-2017-9732 - https://github.com/irsl/knc-memory-exhaustion/ +CVE-2017-9735 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2017-9735 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-9735 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2017-9739 - https://bugs.ghostscript.com/show_bug.cgi?id=698063 +CVE-2017-9740 - https://bugs.ghostscript.com/show_bug.cgi?id=698064 +CVE-2017-9742 - https://www.exploit-db.com/exploits/42203/ +CVE-2017-9746 - https://www.exploit-db.com/exploits/42199/ +CVE-2017-9747 - https://www.exploit-db.com/exploits/42200/ +CVE-2017-9748 - https://www.exploit-db.com/exploits/42202/ +CVE-2017-9749 - https://www.exploit-db.com/exploits/42201/ +CVE-2017-9750 - https://www.exploit-db.com/exploits/42198/ +CVE-2017-9756 - https://www.exploit-db.com/exploits/42204/ +CVE-2017-9757 - https://www.exploit-db.com/exploits/42149/ +CVE-2017-9758 - https://www.kb.cert.org/vuls/id/446847 +CVE-2017-9759 - https://www.vulnerability-lab.com/get_content.php?id=2073 +CVE-2017-9762 - https://github.com/radare/radare2/issues/7726 +CVE-2017-9764 - https://github.com/phantom0301/vulns/blob/master/Metinfo.md +CVE-2017-9766 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13811 +CVE-2017-9767 - http://packetstormsecurity.com/files/143746/Quali-CloudShell-7.1.0.6508-Patch-6-Cross-Site-Scripting.html +CVE-2017-9767 - https://www.exploit-db.com/exploits/42453/ +CVE-2017-9769 - https://www.exploit-db.com/exploits/42368/ +CVE-2017-9772 - https://caml.inria.fr/mantis/view.php?id=7557 +CVE-2017-9775 - https://bugs.freedesktop.org/show_bug.cgi?id=101540 +CVE-2017-9779 - https://caml.inria.fr/mantis/view.php?id=7557 +CVE-2017-9781 - https://www.tenable.com/security/research/tra-2017-21 +CVE-2017-9788 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html +CVE-2017-9791 - https://www.exploit-db.com/exploits/42324/ +CVE-2017-9791 - https://www.exploit-db.com/exploits/44643/ +CVE-2017-9798 - http://openwall.com/lists/oss-security/2017/09/18/2 +CVE-2017-9798 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2017-9798 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2017-9798 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2017-9798 - https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html +CVE-2017-9798 - https://github.com/hannob/optionsbleed +CVE-2017-9798 - https://hackerone.com/reports/269568 +CVE-2017-9798 - https://www.exploit-db.com/exploits/42745/ +CVE-2017-9798 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2017-9800 - http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html +CVE-2017-9800 - https://hackerone.com/reports/260005 +CVE-2017-9800 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2017-9802 - http://packetstormsecurity.com/files/143758/Apache-Sling-Servlets-Post-2.3.20-Cross-Site-Scripting.html +CVE-2017-9805 - https://www.exploit-db.com/exploits/42627/ +CVE-2017-9806 - http://www.openoffice.org/security/cves/CVE-2017-9806.html +CVE-2017-9810 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html +CVE-2017-9810 - http://seclists.org/fulldisclosure/2017/Jun/33 +CVE-2017-9810 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities +CVE-2017-9810 - https://www.exploit-db.com/exploits/42269/ +CVE-2017-9811 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html +CVE-2017-9811 - http://seclists.org/fulldisclosure/2017/Jun/33 +CVE-2017-9811 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities +CVE-2017-9811 - https://www.exploit-db.com/exploits/42269/ +CVE-2017-9812 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html +CVE-2017-9812 - http://seclists.org/fulldisclosure/2017/Jun/33 +CVE-2017-9812 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities +CVE-2017-9812 - https://www.exploit-db.com/exploits/42269/ +CVE-2017-9813 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html +CVE-2017-9813 - http://seclists.org/fulldisclosure/2017/Jun/33 +CVE-2017-9813 - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities +CVE-2017-9813 - https://www.exploit-db.com/exploits/42269/ +CVE-2017-9814 - https://bugs.freedesktop.org/show_bug.cgi?id=101547 +CVE-2017-9822 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html +CVE-2017-9822 - http://www.dnnsoftware.com/community/security/security-center +CVE-2017-9833 - https://pastebin.com/raw/rt7LJvyF +CVE-2017-9833 - https://www.exploit-db.com/exploits/42290/ +CVE-2017-9834 - https://wpvulndb.com/vulnerabilities/8897 +CVE-2017-9834 - https://www.exploit-db.com/exploits/42291/ +CVE-2017-9835 - https://bugs.ghostscript.com/show_bug.cgi?id=697985 +CVE-2017-9841 - http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/ +CVE-2017-9841 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2017-9843 - https://erpscan.io/advisories/erpscan-17-010-sap-netweaver-abap-dispwork-crash-using-cl_java_script/ +CVE-2017-9844 - https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/ +CVE-2017-9845 - https://erpscan.io/advisories/erpscan-17-015-sap-netweaver-dispwork-anonymous-denial-service/ +CVE-2017-9847 - https://github.com/arvidn/libtorrent/issues/2099 +CVE-2017-9851 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9852 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9853 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9854 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9855 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9856 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9857 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9858 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9859 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9860 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9861 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9862 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9863 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9864 - http://www.sma.de/en/statement-on-cyber-security.html +CVE-2017-9865 - https://bugs.freedesktop.org/show_bug.cgi?id=100774 +CVE-2017-9869 - https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/ +CVE-2017-9869 - https://www.exploit-db.com/exploits/42258/ +CVE-2017-9870 - https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-iii_i_stereo-layer3-c/ +CVE-2017-9871 - https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/ +CVE-2017-9872 - https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_dequantize_sample-layer3-c/ +CVE-2017-9872 - https://www.exploit-db.com/exploits/42259/ +CVE-2017-9935 - http://bugzilla.maptools.org/show_bug.cgi?id=2704 +CVE-2017-9935 - https://usn.ubuntu.com/3606-1/ +CVE-2017-9936 - http://bugzilla.maptools.org/show_bug.cgi?id=2706 +CVE-2017-9936 - https://www.exploit-db.com/exploits/42300/ +CVE-2017-9937 - http://bugzilla.maptools.org/show_bug.cgi?id=2707 +CVE-2017-9938 - https://www.tenable.com/security/research/tra-2017-34 +CVE-2017-9946 - http://packetstormsecurity.com/files/169544/Siemens-APOGEE-PXC-TALON-TC-Authentication-Bypass.html +CVE-2017-9947 - http://packetstormsecurity.com/files/169544/Siemens-APOGEE-PXC-TALON-TC-Authentication-Bypass.html +CVE-2017-9948 - https://www.vulnerability-db.com/?q=articles/2017/05/28/stack-buffer-overflow-zero-day-vulnerability-uncovered-microsoft-skype-v72-v735 +CVE-2017-9948 - https://www.vulnerability-lab.com/get_content.php?id=2071 +CVE-2017-9955 - https://sourceware.org/bugzilla/show_bug.cgi?id=21665 +CVE-2017-9962 - http://www.schneider-electric.com/en/download/document/SEVD-2017-264-01/ +CVE-2017-9978 - http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html +CVE-2017-9978 - http://seclists.org/fulldisclosure/2017/Aug/23 +CVE-2017-9978 - https://www.exploit-db.com/exploits/42517/ +CVE-2017-9979 - http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html +CVE-2017-9979 - http://seclists.org/fulldisclosure/2017/Aug/23 +CVE-2017-9979 - https://www.exploit-db.com/exploits/42517/ +CVE-2017-9982 - https://www.youtube.com/watch?v=8BrQCUOgQL0 +CVE-2017-9987 - https://bugzilla.libav.org/show_bug.cgi?id=1067 +CVE-2017-9988 - https://github.com/libming/libming/issues/85 +CVE-2017-9989 - https://github.com/libming/libming/issues/86 +CVE-2017-9998 - https://bugzilla.redhat.com/show_bug.cgi?id=1465756 +CVE-2018-0101 - https://pastebin.com/YrBcG2Ln +CVE-2018-0101 - https://www.exploit-db.com/exploits/43986/ +CVE-2018-0114 - https://github.com/zi0Black/POC-CVE-2018-0114 +CVE-2018-0114 - https://www.exploit-db.com/exploits/44324/ +CVE-2018-0171 - https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490 +CVE-2018-0202 - https://bugzilla.clamav.net/show_bug.cgi?id=11973 +CVE-2018-0202 - https://bugzilla.clamav.net/show_bug.cgi?id=11980 +CVE-2018-0258 - https://www.tenable.com/security/research/tra-2018-11 +CVE-2018-0296 - http://packetstormsecurity.com/files/154017/Cisco-Adaptive-Security-Appliance-Path-Traversal.html +CVE-2018-0296 - https://www.exploit-db.com/exploits/44956/ +CVE-2018-0437 - https://www.exploit-db.com/exploits/45339/ +CVE-2018-0438 - https://www.exploit-db.com/exploits/45339/ +CVE-2018-0464 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal +CVE-2018-0491 - https://www.exploit-db.com/exploits/44994/ +CVE-2018-0492 - https://www.exploit-db.com/exploits/44452/ +CVE-2018-0494 - https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt +CVE-2018-0494 - https://www.exploit-db.com/exploits/44601/ +CVE-2018-0495 - https://usn.ubuntu.com/3689-2/ +CVE-2018-0495 - https://usn.ubuntu.com/3692-1/ +CVE-2018-0576 - https://wpvulndb.com/vulnerabilities/9609 +CVE-2018-0577 - https://wpvulndb.com/vulnerabilities/9610 +CVE-2018-0585 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-0586 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-0587 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-0588 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-0589 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-0590 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-0602 - https://wpvulndb.com/vulnerabilities/9101 +CVE-2018-0603 - https://wpvulndb.com/vulnerabilities/9102 +CVE-2018-0706 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html +CVE-2018-0706 - http://seclists.org/fulldisclosure/2018/Jul/45 +CVE-2018-0706 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities +CVE-2018-0706 - https://www.exploit-db.com/exploits/45015/ +CVE-2018-0706 - https://www.exploit-db.com/exploits/45043/ +CVE-2018-0707 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html +CVE-2018-0707 - http://seclists.org/fulldisclosure/2018/Jul/45 +CVE-2018-0707 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities +CVE-2018-0707 - https://www.exploit-db.com/exploits/45015/ +CVE-2018-0707 - https://www.exploit-db.com/exploits/45043/ +CVE-2018-0708 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html +CVE-2018-0708 - http://seclists.org/fulldisclosure/2018/Jul/45 +CVE-2018-0708 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities +CVE-2018-0708 - https://www.exploit-db.com/exploits/45015/ +CVE-2018-0709 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html +CVE-2018-0709 - http://seclists.org/fulldisclosure/2018/Jul/45 +CVE-2018-0709 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities +CVE-2018-0709 - https://www.exploit-db.com/exploits/45015/ +CVE-2018-0710 - http://packetstormsecurity.com/files/148515/QNAP-Qcenter-Virtual-Appliance-1.6.x-Information-Disclosure-Command-Injection.html +CVE-2018-0710 - http://seclists.org/fulldisclosure/2018/Jul/45 +CVE-2018-0710 - https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities +CVE-2018-0710 - https://www.exploit-db.com/exploits/45015/ +CVE-2018-0715 - https://www.exploit-db.com/exploits/45348/ +CVE-2018-0732 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-0732 - https://usn.ubuntu.com/3692-1/ +CVE-2018-0732 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-0732 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-0732 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-0732 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-0732 - https://www.tenable.com/security/tns-2018-17 +CVE-2018-0733 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-0733 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-0733 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-0733 - https://www.tenable.com/security/tns-2018-04 +CVE-2018-0733 - https://www.tenable.com/security/tns-2018-06 +CVE-2018-0733 - https://www.tenable.com/security/tns-2018-07 +CVE-2018-0734 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-0734 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-0734 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-0734 - https://www.tenable.com/security/tns-2018-16 +CVE-2018-0734 - https://www.tenable.com/security/tns-2018-17 +CVE-2018-0735 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-0735 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-0737 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-0737 - https://usn.ubuntu.com/3692-1/ +CVE-2018-0737 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-0737 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-0737 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-0737 - https://www.tenable.com/security/tns-2018-17 +CVE-2018-0739 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-0739 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-0739 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-0739 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-0739 - https://www.tenable.com/security/tns-2018-04 +CVE-2018-0739 - https://www.tenable.com/security/tns-2018-06 +CVE-2018-0739 - https://www.tenable.com/security/tns-2018-07 +CVE-2018-0743 - https://github.com/saaramar/execve_exploit +CVE-2018-0743 - https://www.exploit-db.com/exploits/43962/ +CVE-2018-0744 - https://www.exploit-db.com/exploits/43446/ +CVE-2018-0745 - https://www.exploit-db.com/exploits/43470/ +CVE-2018-0746 - https://www.exploit-db.com/exploits/43471/ +CVE-2018-0748 - https://www.exploit-db.com/exploits/43514/ +CVE-2018-0749 - https://www.exploit-db.com/exploits/43517/ +CVE-2018-0751 - https://www.exploit-db.com/exploits/43515/ +CVE-2018-0752 - https://www.exploit-db.com/exploits/43516/ +CVE-2018-0758 - https://www.exploit-db.com/exploits/43491/ +CVE-2018-0767 - https://www.exploit-db.com/exploits/43522/ +CVE-2018-0769 - https://www.exploit-db.com/exploits/43710/ +CVE-2018-0770 - https://www.exploit-db.com/exploits/44075/ +CVE-2018-0774 - https://www.exploit-db.com/exploits/43715/ +CVE-2018-0775 - https://www.exploit-db.com/exploits/43717/ +CVE-2018-0776 - https://www.exploit-db.com/exploits/43723/ +CVE-2018-0777 - https://www.exploit-db.com/exploits/43718/ +CVE-2018-0780 - https://www.exploit-db.com/exploits/43720/ +CVE-2018-0802 - https://0patch.blogspot.com/2018/01/the-bug-that-killed-equation-editor-how.html +CVE-2018-0802 - https://github.com/rxwx/CVE-2018-0802 +CVE-2018-0802 - https://github.com/zldww2011/CVE-2018-0802_POC +CVE-2018-0802 - https://research.checkpoint.com/another-office-equation-rce-vulnerability/ +CVE-2018-0821 - https://www.exploit-db.com/exploits/44149/ +CVE-2018-0822 - https://www.exploit-db.com/exploits/44147/ +CVE-2018-0823 - https://www.exploit-db.com/exploits/44148/ +CVE-2018-0824 - https://www.exploit-db.com/exploits/44906/ +CVE-2018-0826 - https://www.exploit-db.com/exploits/44152/ +CVE-2018-0832 - https://www.exploit-db.com/exploits/44146/ +CVE-2018-0833 - https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-0833 +CVE-2018-0833 - https://www.exploit-db.com/exploits/44189/ +CVE-2018-0834 - https://www.exploit-db.com/exploits/44078/ +CVE-2018-0835 - https://www.exploit-db.com/exploits/44079/ +CVE-2018-0837 - https://www.exploit-db.com/exploits/44081/ +CVE-2018-0838 - https://www.exploit-db.com/exploits/44080/ +CVE-2018-0840 - https://www.exploit-db.com/exploits/44077/ +CVE-2018-0860 - https://www.exploit-db.com/exploits/44076/ +CVE-2018-0866 - https://www.exploit-db.com/exploits/44153/ +CVE-2018-0877 - https://www.exploit-db.com/exploits/44313/ +CVE-2018-0878 - https://www.exploit-db.com/exploits/44352/ +CVE-2018-0880 - https://www.exploit-db.com/exploits/44314/ +CVE-2018-0882 - https://www.exploit-db.com/exploits/44315/ +CVE-2018-0886 - https://github.com/preempt/credssp +CVE-2018-0886 - https://www.exploit-db.com/exploits/44453/ +CVE-2018-0891 - https://www.exploit-db.com/exploits/44312/ +CVE-2018-0894 - https://www.exploit-db.com/exploits/44308/ +CVE-2018-0895 - https://www.exploit-db.com/exploits/44309/ +CVE-2018-0897 - https://www.exploit-db.com/exploits/44310/ +CVE-2018-0901 - https://www.exploit-db.com/exploits/44311/ +CVE-2018-0933 - https://www.exploit-db.com/exploits/44396/ +CVE-2018-0934 - https://www.exploit-db.com/exploits/44396/ +CVE-2018-0934 - https://www.exploit-db.com/exploits/44397/ +CVE-2018-0935 - https://www.exploit-db.com/exploits/44404/ +CVE-2018-0946 - https://www.exploit-db.com/exploits/44758/ +CVE-2018-0952 - https://www.exploit-db.com/exploits/45244/ +CVE-2018-0953 - https://www.exploit-db.com/exploits/44694/ +CVE-2018-0966 - https://www.exploit-db.com/exploits/44466/ +CVE-2018-0968 - https://www.exploit-db.com/exploits/44465/ +CVE-2018-0969 - https://www.exploit-db.com/exploits/44459/ +CVE-2018-0970 - https://www.exploit-db.com/exploits/44460/ +CVE-2018-0971 - https://www.exploit-db.com/exploits/44461/ +CVE-2018-0972 - https://www.exploit-db.com/exploits/44462/ +CVE-2018-0973 - https://www.exploit-db.com/exploits/44463/ +CVE-2018-0974 - https://www.exploit-db.com/exploits/44464/ +CVE-2018-0975 - https://www.exploit-db.com/exploits/44458/ +CVE-2018-0980 - https://www.exploit-db.com/exploits/44653/ +CVE-2018-0982 - https://www.exploit-db.com/exploits/44888/ +CVE-2018-0986 - https://www.exploit-db.com/exploits/44402/ +CVE-2018-0988 - http://www.securityfocus.com/bid/103615 +CVE-2018-0991 - http://www.securityfocus.com/bid/103614 +CVE-2018-0997 - http://www.securityfocus.com/bid/103618 +CVE-2018-1000001 - http://seclists.org/oss-sec/2018/q1/38 +CVE-2018-1000001 - https://www.exploit-db.com/exploits/43775/ +CVE-2018-1000001 - https://www.exploit-db.com/exploits/44889/ +CVE-2018-1000001 - https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ +CVE-2018-1000004 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-1000004 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1000006 - https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374 +CVE-2018-1000006 - https://www.exploit-db.com/exploits/43899/ +CVE-2018-1000006 - https://www.exploit-db.com/exploits/44357/ +CVE-2018-1000007 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-1000024 - https://usn.ubuntu.com/3557-1/ +CVE-2018-1000026 - https://usn.ubuntu.com/3620-1/ +CVE-2018-1000027 - https://usn.ubuntu.com/3557-1/ +CVE-2018-1000030 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-1000049 - http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html +CVE-2018-1000049 - http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html +CVE-2018-1000049 - https://www.exploit-db.com/exploits/44638/ +CVE-2018-1000049 - https://www.exploit-db.com/exploits/45044/ +CVE-2018-1000067 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1000068 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1000069 - https://www.youtube.com/watch?v=7IXtiTNilAI +CVE-2018-1000070 - https://github.com/Bitmessage/PyBitmessage/commit/3a8016d31f517775d226aa8b902480f4a3a148a9#comments +CVE-2018-1000080 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee +CVE-2018-1000081 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee +CVE-2018-1000082 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee +CVE-2018-1000083 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee +CVE-2018-1000085 - http://www.openwall.com/lists/oss-security/2017/09/29/4 +CVE-2018-1000087 - https://cveexploit.blogspot.in/ +CVE-2018-1000091 - https://github.com/mwarning/KadNode/issues/79 +CVE-2018-1000093 - https://github.com/cryptonotefoundation/cryptonote/issues/172 +CVE-2018-1000093 - https://www.ayrx.me/cryptonote-unauthenticated-json-rpc +CVE-2018-1000094 - http://dev.cmsmadesimple.org/bug/view/11741 +CVE-2018-1000094 - https://www.exploit-db.com/exploits/44976/ +CVE-2018-10001 - http://git.videolan.org/?p=ffmpeg.git;a=commit;h=47b7c68ae54560e2308bdb6be4fb076c73b93081 +CVE-2018-1000115 - https://www.exploit-db.com/exploits/44264/ +CVE-2018-1000115 - https://www.exploit-db.com/exploits/44265/ +CVE-2018-1000120 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1000120 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1000120 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000120 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-1000121 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1000121 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1000121 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000122 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1000122 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1000122 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000124 - https://github.com/mkucej/i-librarian/issues/116 +CVE-2018-1000126 - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee +CVE-2018-1000131 - https://wpvulndb.com/vulnerabilities/9041 +CVE-2018-1000136 - https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/ +CVE-2018-1000137 - https://github.com/mkucej/i-librarian/issues/121 +CVE-2018-1000138 - https://github.com/mkucej/i-librarian/issues/120 +CVE-2018-1000139 - https://github.com/mkucej/i-librarian/issues/119 +CVE-2018-1000140 - http://packetstormsecurity.com/files/172829/librelp-Remote-Code-Execution.html +CVE-2018-1000156 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html +CVE-2018-1000156 - http://rachelbythebay.com/w/2018/04/05/bangpatch/ +CVE-2018-1000156 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19 +CVE-2018-1000156 - https://savannah.gnu.org/bugs/index.php?53566 +CVE-2018-1000156 - https://seclists.org/bugtraq/2019/Aug/29 +CVE-2018-1000160 - https://github.com/RisingStack/protect/issues/16 +CVE-2018-1000167 - https://tech.feedyourhead.at/content/remote-code-execution-in-suricata-update +CVE-2018-1000168 - https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html +CVE-2018-1000172 - https://fortiguard.com/zeroday/FG-VD-17-215 +CVE-2018-1000180 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-1000180 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1000180 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-1000180 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000192 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1000193 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1000194 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1000195 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1000203 - https://www.bankinfosecurity.com/exclusive-aussie-firm-loses-5m-to-backdoored-cryptocurrency-a-11057 +CVE-2018-1000204 - https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 +CVE-2018-1000204 - https://usn.ubuntu.com/3696-1/ +CVE-2018-1000206 - https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/ +CVE-2018-1000206 - https://www.jfrog.com/jira/browse/RTFACT-17004 +CVE-2018-1000206 - https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581 +CVE-2018-1000218 - https://github.com/openemr/openemr/issues/1781 +CVE-2018-1000219 - https://github.com/openemr/openemr/issues/1781 +CVE-2018-1000223 - https://gitlab.com/soundtouch/soundtouch/issues/6 +CVE-2018-1000225 - https://github.com/cobbler/cobbler/issues/1917 +CVE-2018-1000225 - https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/ +CVE-2018-1000226 - https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/ +CVE-2018-1000300 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1000300 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1000300 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000301 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1000301 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1000301 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000504 - https://advisories.dxw.com/advisories/ace-file-inclusion-redirection/ +CVE-2018-1000505 - https://advisories.dxw.com/advisories/csrf-in-tooltipy/ +CVE-2018-1000506 - https://advisories.dxw.com/advisories/csrf-metronet-tag-manager/ +CVE-2018-1000507 - https://advisories.dxw.com/advisories/csrf-wp-user-groups/ +CVE-2018-1000508 - https://advisories.dxw.com/advisories/stored-xss-wp-ulike/ +CVE-2018-1000509 - https://advisories.dxw.com/advisories/unserialization-redirection/ +CVE-2018-1000510 - https://advisories.dxw.com/advisories/wp-image-zoom-dos/ +CVE-2018-1000511 - https://advisories.dxw.com/advisories/wp-ulike-delete-rows/ +CVE-2018-1000512 - https://advisories.dxw.com/advisories/xss-in-tooltipy/ +CVE-2018-1000519 - https://github.com/aio-libs/aiohttp-session/issues/272 +CVE-2018-1000520 - https://github.com/ARMmbed/mbedtls/issues/1561 +CVE-2018-1000524 - https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 +CVE-2018-1000524 - https://github.com/fatcerberus/minisphere/pull/268 +CVE-2018-1000529 - https://github.com/martinfrancois/CVE-2018-1000529 +CVE-2018-1000534 - https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 +CVE-2018-1000534 - https://github.com/laurent22/joplin/issues/500 +CVE-2018-1000536 - https://github.com/luin/medis/issues/109 +CVE-2018-1000540 - https://github.com/oswetto/LoboEvolution/issues/38 +CVE-2018-1000542 - https://0dd.zone/2018/06/02/Netbeans-MMD-Plugin-XXE/ +CVE-2018-1000544 - https://access.redhat.com/errata/RHSA-2018:3466 +CVE-2018-1000544 - https://github.com/rubyzip/rubyzip/issues/369 +CVE-2018-1000546 - https://0dd.zone/2018/05/31/TripleA-XXE/ +CVE-2018-1000548 - http://0dd.zone/2018/04/23/UMLet-XXE/ +CVE-2018-1000548 - https://github.com/umlet/umlet/issues/500 +CVE-2018-1000611 - https://github.com/OpenConext/OpenConext-engineblock/pull/563/files +CVE-2018-1000613 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-1000613 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1000613 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-1000613 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000619 - https://drive.google.com/open?id=195h-LirGiIVKxioyusw3SvmLp8BljPxe +CVE-2018-1000621 - https://github.com/Nhoya/MycroftAI-RCE +CVE-2018-1000632 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-1000632 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1000632 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1000632 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1000638 - https://github.com/bg5sbk/MiniCMS/issues/20 +CVE-2018-1000653 - https://gist.github.com/Lz1y/3388fa886a3e10edd2a7e93d3c3e5b6c +CVE-2018-1000654 - https://gitlab.com/gnutls/libtasn1/issues/4 +CVE-2018-1000657 - https://github.com/rust-lang/rust/issues/44800 +CVE-2018-1000666 - https://medium.com/@vrico315/vulnerability-in-jumpscale-portal-7-a88098a1caca +CVE-2018-1000667 - https://bugzilla.nasm.us/show_bug.cgi?id=3392507 +CVE-2018-1000669 - https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=19117 +CVE-2018-1000670 - https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=19086 +CVE-2018-1000773 - https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ +CVE-2018-1000773 - https://youtu.be/GePBmsNJw6Y?t=1763 +CVE-2018-1000801 - https://bugs.kde.org/show_bug.cgi?id=398096 +CVE-2018-1000805 - https://access.redhat.com/errata/RHBA-2018:3497 +CVE-2018-1000811 - https://github.com/bludit/bludit/issues/812 +CVE-2018-1000811 - https://www.exploit-db.com/exploits/46060/ +CVE-2018-1000812 - https://cp270.wordpress.com/2018/05/14/war-story-password-resets/ +CVE-2018-1000812 - https://github.com/fleetcaptain/integria-takeover +CVE-2018-1000814 - https://github.com/aio-libs/aiohttp-session/issues/325 +CVE-2018-1000816 - https://github.com/grafana/grafana/issues/13667 +CVE-2018-1000826 - https://github.com/microweber/microweber/issues/489 +CVE-2018-1000839 - https://0dd.zone/2018/09/03/lh-ehr-RCE-via-picture-upload/ +CVE-2018-1000839 - https://github.com/LibreHealthIO/lh-ehr/issues/1223 +CVE-2018-1000840 - https://github.com/processing/processing/issues/5706 +CVE-2018-1000846 - https://github.com/funzoneq/freshdns/issues/7 +CVE-2018-1000851 - https://github.com/dominictarr/event-stream/issues/116 +CVE-2018-1000852 - https://usn.ubuntu.com/4379-1/ +CVE-2018-1000856 - https://github.com/domainmod/domainmod/issues/80 +CVE-2018-1000857 - https://www.halfdog.net/Security/2018/LogUserSessionLocalRootPrivilegeEscalation/ +CVE-2018-1000861 - http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html +CVE-2018-1000863 - https://www.tenable.com/security/research/tra-2018-43 +CVE-2018-1000869 - https://github.com/phpipam/phpipam/issues/2344 +CVE-2018-1000871 - https://www.exploit-db.com/exploits/45976 +CVE-2018-1000873 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1000873 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-1000873 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-1000874 - https://github.com/cebe/markdown/issues/166 +CVE-2018-1000874 - https://github.com/cebe/markdown/issues/166#issuecomment-508230493 +CVE-2018-1000881 - https://appcheck-ng.com/advisory-remote-code-execution-traccar-server/ +CVE-2018-1000885 - https://tech.feedyourhead.at/content/full-disclosure-remote-command-execution-in-phkp +CVE-2018-1000886 - https://bugzilla.nasm.us/show_bug.cgi?id=3392514 +CVE-2018-1000887 - https://github.com/advisto/peel-shopping/issues/1 +CVE-2018-1000888 - https://www.exploit-db.com/exploits/46108/ +CVE-2018-1000890 - https://github.com/FrontAccountingERP/FA/issues/37 +CVE-2018-1000890 - https://www.exploit-db.com/exploits/46037 +CVE-2018-1000998 - https://www.kvakil.me/posts/cvsweb/ +CVE-2018-10016 - https://bugzilla.nasm.us/show_bug.cgi?id=3392473 +CVE-2018-10018 - http://seclists.org/fulldisclosure/2018/Jul/55 +CVE-2018-10018 - https://www.exploit-db.com/exploits/45017/ +CVE-2018-1002000 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002001 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002002 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002003 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002004 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002005 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002006 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002007 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002008 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-1002009 - https://www.exploit-db.com/exploits/45434/ +CVE-2018-10021 - https://usn.ubuntu.com/3696-1/ +CVE-2018-1002100 - https://github.com/kubernetes/kubernetes/issues/61297 +CVE-2018-1002100 - https://hansmi.ch/articles/2018-04-openshift-s2i-security +CVE-2018-1002105 - https://github.com/evict/poc_CVE-2018-1002105 +CVE-2018-1002105 - https://www.exploit-db.com/exploits/46052/ +CVE-2018-1002105 - https://www.exploit-db.com/exploits/46053/ +CVE-2018-1002203 - https://hackerone.com/reports/362119 +CVE-2018-1002207 - https://github.com/mholt/archiver/pull/65 +CVE-2018-1002208 - https://github.com/icsharpcode/SharpZipLib/issues/232 +CVE-2018-10023 - https://github.com/xwlrbh/Catfish/issues/1 +CVE-2018-10024 - https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt +CVE-2018-10027 - https://pastebin.com/XHMeS7pQ +CVE-2018-10048 - https://pastebin.com/RVdpLAT8 +CVE-2018-10049 - https://pastebin.com/QbhRJp4q +CVE-2018-10050 - https://pastebin.com/UDEsFq3u +CVE-2018-10051 - https://pastebin.com/aQn3Cr2G +CVE-2018-10052 - https://pastebin.com/aeqYLK9u +CVE-2018-10054 - https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html +CVE-2018-10054 - https://www.exploit-db.com/exploits/44422/ +CVE-2018-10057 - http://www.openwall.com/lists/oss-security/2018/06/03/1 +CVE-2018-10057 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2018-10057 +CVE-2018-10058 - http://www.openwall.com/lists/oss-security/2018/06/03/1 +CVE-2018-10058 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2018-10058 +CVE-2018-10063 - https://www.exploit-db.com/exploits/44447/ +CVE-2018-10068 - https://www.exploit-db.com/exploits/44471/ +CVE-2018-10070 - http://packetstormsecurity.com/files/147183/MikroTik-6.41.4-Denial-Of-Service.html +CVE-2018-10070 - https://www.exploit-db.com/exploits/44450/ +CVE-2018-10077 - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html +CVE-2018-10077 - https://www.exploit-db.com/exploits/44493/ +CVE-2018-10078 - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html +CVE-2018-10078 - https://www.exploit-db.com/exploits/44493/ +CVE-2018-10079 - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html +CVE-2018-10079 - https://www.exploit-db.com/exploits/44493/ +CVE-2018-10080 - https://www.exploit-db.com/exploits/44393/ +CVE-2018-10081 - https://github.com/itodaro/cve/blob/master/README.md +CVE-2018-10082 - https://github.com/itodaro/cve/blob/master/README.md +CVE-2018-10083 - https://github.com/itodaro/cve/blob/master/README.md +CVE-2018-10084 - https://github.com/itodaro/cve/blob/master/README.md +CVE-2018-10085 - https://github.com/itodaro/cve/blob/master/README.md +CVE-2018-10086 - https://github.com/itodaro/cve/blob/master/README.md +CVE-2018-10087 - https://usn.ubuntu.com/3696-1/ +CVE-2018-10088 - https://github.com/bitfu/uc-httpd-1.0.0-buffer-overflow-exploit +CVE-2018-10088 - https://www.exploit-db.com/exploits/44864/ +CVE-2018-10091 - http://packetstormsecurity.com/files/151115/AudioCode-400HD-Cross-Site-scripting.html +CVE-2018-10092 - http://www.openwall.com/lists/oss-security/2018/05/21/2 +CVE-2018-10092 - https://sysdream.com/news/lab/2018-05-21-cve-2018-10092-dolibarr-admin-panel-authenticated-remote-code-execution-rce-vulnerability/ +CVE-2018-10093 - http://packetstormsecurity.com/files/151116/AudioCode-400HD-Remote-Command-Injection.html +CVE-2018-10093 - https://www.exploit-db.com/exploits/46164/ +CVE-2018-10094 - http://www.openwall.com/lists/oss-security/2018/05/21/1 +CVE-2018-10094 - https://sysdream.com/news/lab/2018-05-21-cve-2018-10094-dolibarr-sql-injection-vulnerability/ +CVE-2018-10094 - https://www.exploit-db.com/exploits/44805/ +CVE-2018-10095 - http://www.openwall.com/lists/oss-security/2018/05/21/3 +CVE-2018-10095 - https://sysdream.com/news/lab/2018-05-21-cve-2018-10095-dolibarr-xss-injection-vulnerability/ +CVE-2018-10097 - https://packetstormsecurity.com/files/146855/Domaintrader-2.5.3-Cross-Site-Scripting.html +CVE-2018-10099 - https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 +CVE-2018-10099 - https://www.reddit.com/r/netsec/comments/9yiidf/xssearching_googles_bug_tracker_to_find_out/ea2i7wz/ +CVE-2018-10106 - https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md +CVE-2018-10107 - https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md +CVE-2018-10108 - https://github.com/iceMatcha/Some-Vulnerabilities-of-D-link-Dir815/blob/master/Vulnerabilities_Summary.md +CVE-2018-10109 - https://www.exploit-db.com/exploits/44502/ +CVE-2018-1011 - http://www.securityfocus.com/bid/103611 +CVE-2018-10110 - http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html +CVE-2018-10110 - https://www.exploit-db.com/exploits/44473/ +CVE-2018-10111 - https://github.com/xiaoqx/pocs/tree/master/gegl +CVE-2018-10112 - https://bugzilla.gnome.org/show_bug.cgi?id=795249 +CVE-2018-10112 - https://github.com/xiaoqx/pocs/tree/master/gegl +CVE-2018-10113 - https://github.com/xiaoqx/pocs/tree/master/gegl +CVE-2018-10114 - https://bugzilla.gnome.org/show_bug.cgi?id=795248 +CVE-2018-10114 - https://github.com/xiaoqx/pocs/tree/master/gegl +CVE-2018-10118 - https://www.exploit-db.com/exploits/44855/ +CVE-2018-10122 - https://github.com/goodrain-apps/chanzhieps/issues/1 +CVE-2018-10123 - https://neonsea.uk/blog/2018/04/15/pwn910nd.html +CVE-2018-10123 - https://www.exploit-db.com/exploits/44635/ +CVE-2018-10124 - https://usn.ubuntu.com/3696-1/ +CVE-2018-10126 - http://bugzilla.maptools.org/show_bug.cgi?id=2786 +CVE-2018-10132 - https://github.com/vQAQv/Request-CVE-ID-PoC/blob/master/PbootCMS/v0.9.8/CSRF.md +CVE-2018-10133 - https://github.com/vQAQv/Request-CVE-ID-PoC/blob/master/PbootCMS/v0.9.8/Getshll.md +CVE-2018-10135 - https://pastebin.com/vVN00qRh +CVE-2018-10136 - https://pastebin.com/TCEWRZEd +CVE-2018-10137 - https://pastebin.com/TCEWRZEd +CVE-2018-10138 - https://cxsecurity.com/issue/WLB-2018040120 +CVE-2018-10143 - https://doddsecurity.com/234/command-injection-on-palo-alto-networks-expedition/ +CVE-2018-10164 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities +CVE-2018-10165 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities +CVE-2018-10166 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities +CVE-2018-10167 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities +CVE-2018-10168 - https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities +CVE-2018-10173 - http://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html +CVE-2018-10174 - http://packetstormsecurity.com/files/147260/Digital-Guardian-Management-Console-7.1.2.0015-Server-Side-Request-Forgery.html +CVE-2018-10175 - http://packetstormsecurity.com/files/147261/Digital-Guardian-Management-Console-7.1.2.0015-XXE-Injection.html +CVE-2018-10176 - http://packetstormsecurity.com/files/147242/Digital-Guardian-Management-Console-7.1.2.0015-Arbitrary-File-Read.html +CVE-2018-10177 - https://github.com/ImageMagick/ImageMagick/issues/1095 +CVE-2018-1018 - http://www.securityfocus.com/bid/103610 +CVE-2018-10183 - https://github.com/bigtreecms/BigTree-CMS/issues/333 +CVE-2018-10185 - https://github.com/yeyinshi/tuzicms/issues/1 +CVE-2018-10186 - https://github.com/radare/radare2/issues/9915 +CVE-2018-10187 - https://github.com/radare/radare2/issues/9913 +CVE-2018-10188 - https://www.exploit-db.com/exploits/44496/ +CVE-2018-10191 - https://github.com/mruby/mruby/issues/3995 +CVE-2018-10193 - https://www.youtube.com/watch?v=wTcYWZwq3TE +CVE-2018-10197 - http://seclists.org/fulldisclosure/2018/Jul/29 +CVE-2018-1020 - http://www.securityfocus.com/bid/103612 +CVE-2018-10201 - http://www.kwell.net/kwell_blog/?p=5199 +CVE-2018-10201 - https://www.exploit-db.com/exploits/44497/ +CVE-2018-10221 - https://github.com/wuzhicms/wuzhicms/issues/129 +CVE-2018-10223 - https://github.com/yzmcms/yzmcms/issues/1 +CVE-2018-10224 - https://github.com/yzmcms/yzmcms/issues/2 +CVE-2018-10227 - https://github.com/bg5sbk/MiniCMS/issues/15 +CVE-2018-10233 - https://wpvulndb.com/vulnerabilities/9611 +CVE-2018-10235 - https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-10.md +CVE-2018-10236 - https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-18.md +CVE-2018-10237 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-10237 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-10237 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-10237 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-10241 - https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service/ +CVE-2018-10248 - https://github.com/wuzhicms/wuzhicms/issues/130 +CVE-2018-10249 - https://crayon-xin.github.io/2018/04/20/baijiacmsV3-CSRF-add-admin/ +CVE-2018-10252 - https://actiontecsupport.zendesk.com/hc/en-us/articles/115000432163-WCB6200Q-Firmware-Upgrade +CVE-2018-10253 - https://www.exploit-db.com/exploits/44500/ +CVE-2018-10254 - https://sourceforge.net/p/nasm/bugs/561/ +CVE-2018-10255 - http://packetstormsecurity.com/files/147363/Blog-Master-Pro-1.0-CSV-Injection.html +CVE-2018-10255 - https://www.exploit-db.com/exploits/44535/ +CVE-2018-10256 - http://packetstormsecurity.com/files/147366/HRSALE-The-Ultimate-HRM-1.0.2-SQL-Injection.html +CVE-2018-10256 - https://www.exploit-db.com/exploits/44537/ +CVE-2018-10257 - http://packetstormsecurity.com/files/147364/HRSALE-The-Ultimate-HRM-1.0.2-CSV-Injection.html +CVE-2018-10257 - https://www.exploit-db.com/exploits/44536/ +CVE-2018-10258 - http://packetstormsecurity.com/files/147362/Shopy-Point-Of-Sale-1.0-CSV-Injection.html +CVE-2018-10258 - https://www.exploit-db.com/exploits/44534/ +CVE-2018-10259 - http://packetstormsecurity.com/files/147383/HRSALE-The-Ultimate-HRM-1.0.2-Cross-Site-Scripting.html +CVE-2018-10259 - https://www.exploit-db.com/exploits/44538/ +CVE-2018-1026 - http://www.securityfocus.com/bid/103613 +CVE-2018-10260 - http://packetstormsecurity.com/files/147382/HRSALE-The-Ultimate-HRM-1.0.2-Local-File-Inclusion.html +CVE-2018-10260 - https://www.exploit-db.com/exploits/44539/ +CVE-2018-10266 - https://github.com/source-trace/beescms/issues/1 +CVE-2018-1027 - http://www.securityfocus.com/bid/103616 +CVE-2018-10285 - https://www.exploit-db.com/exploits/44515/ +CVE-2018-10286 - https://www.exploit-db.com/exploits/44515/ +CVE-2018-10289 - https://bugs.ghostscript.com/show_bug.cgi?id=699271 +CVE-2018-1029 - http://www.securityfocus.com/bid/103617 +CVE-2018-10294 - http://seclists.org/fulldisclosure/2018/May/3 +CVE-2018-10295 - https://github.com/chemcms/ChemCMS/issues/1 +CVE-2018-10299 - https://medium.com/secbit-media/a-disastrous-vulnerability-found-in-smart-contracts-of-beautychain-bec-dbf24ddbc30e +CVE-2018-10299 - https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/ +CVE-2018-10300 - https://medium.com/@squeal/wd-instagram-feed-1-3-0-xss-vulnerabilities-cve-2018-10300-and-cve-2018-10301-7173ffc4c271 +CVE-2018-10300 - https://wpvulndb.com/vulnerabilities/9393 +CVE-2018-10301 - https://medium.com/@squeal/wd-instagram-feed-1-3-0-xss-vulnerabilities-cve-2018-10300-and-cve-2018-10301-7173ffc4c271 +CVE-2018-10301 - https://wpvulndb.com/vulnerabilities/9393 +CVE-2018-10309 - https://gist.github.com/B0UG/f0cfb356e23be3cd6ebea69566d6100a +CVE-2018-10309 - https://wpvulndb.com/vulnerabilities/9067 +CVE-2018-10309 - https://www.exploit-db.com/exploits/44563/ +CVE-2018-10310 - http://packetstormsecurity.com/files/147333/WordPress-UK-Cookie-Consent-2.3.9-Cross-Site-Scripting.html +CVE-2018-10310 - https://gist.github.com/B0UG/9732614abccaf2893c352d14c822d07b +CVE-2018-10310 - https://www.exploit-db.com/exploits/44503/ +CVE-2018-10311 - https://github.com/wuzhicms/wuzhicms/issues/131 +CVE-2018-10311 - https://www.exploit-db.com/exploits/44618/ +CVE-2018-10312 - https://github.com/wuzhicms/wuzhicms/issues/132 +CVE-2018-10312 - https://www.exploit-db.com/exploits/44504/ +CVE-2018-10313 - https://github.com/wuzhicms/wuzhicms/issues/133 +CVE-2018-10313 - https://www.exploit-db.com/exploits/44617/ +CVE-2018-10314 - https://docs.google.com/document/d/1lUHMAOnbQUfh_yBGdBB1x9n0QdVGeP9Tggu9auqpXNo/edit?usp=sharing +CVE-2018-10314 - https://www.exploit-db.com/exploits/44613/ +CVE-2018-10316 - https://bugzilla.nasm.us/show_bug.cgi?id=3392474 +CVE-2018-10318 - https://github.com/philippe/FrogCMS/issues/6 +CVE-2018-10321 - https://www.exploit-db.com/exploits/44551/ +CVE-2018-10322 - https://bugzilla.kernel.org/show_bug.cgi?id=199377 +CVE-2018-10323 - https://bugzilla.kernel.org/show_bug.cgi?id=199423 +CVE-2018-10361 - http://www.openwall.com/lists/oss-security/2018/04/24/1 +CVE-2018-10361 - https://bugzilla.suse.com/show_bug.cgi?id=1033055 +CVE-2018-10363 - https://gist.github.com/B0UG/68d3161af0c0ec85c615ca7452f9755e +CVE-2018-10365 - https://www.exploit-db.com/exploits/44547/ +CVE-2018-10366 - https://www.exploit-db.com/exploits/44546/ +CVE-2018-10369 - https://medium.com/@julianpedrobraga/router-hacking-destrinchando-o-elo-mais-fraco-de-uma-rede-4d0e7fcfbd9e +CVE-2018-10371 - https://gist.github.com/B0UG/8615df3fe83a4deca07334af783696d6 +CVE-2018-10371 - https://wpvulndb.com/vulnerabilities/9080 +CVE-2018-10371 - https://www.exploit-db.com/exploits/44585/ +CVE-2018-10376 - https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/ +CVE-2018-10377 - https://hackerone.com/reports/337680 +CVE-2018-10377 - https://integritylabs.io/advisories/cve-2018-10377 +CVE-2018-1038 - https://blog.xpnsec.com/total-meltdown-cve-2018-1038/ +CVE-2018-1038 - https://www.exploit-db.com/exploits/44581/ +CVE-2018-10391 - https://github.com/wuzhicms/wuzhicms/issues/134 +CVE-2018-10403 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-10404 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-10405 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-10406 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-10407 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-10408 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-1041 - https://www.exploit-db.com/exploits/44099/ +CVE-2018-1042 - http://packetstormsecurity.com/files/153766/Moodle-Filepicker-3.5.2-Server-Side-Request-Forgery.html +CVE-2018-10425 - https://github.com/rebol0x6c/2345poc +CVE-2018-10428 - http://packetstormsecurity.com/files/147726/ILIAS-5.3.2-5.2.14-5.1.25-Cross-Site-Scripting.html +CVE-2018-10428 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-007.txt +CVE-2018-1043 - https://moodle.org/mod/forum/discuss.php?d=364382 +CVE-2018-10470 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-1050 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-10503 - https://github.com/monburan/attack-baijiacmsV4-with-csrf +CVE-2018-10504 - https://www.exploit-db.com/exploits/44559/ +CVE-2018-10507 - http://hyp3rlinx.altervista.org/advisories/TRENDMICRO-OFFICESCAN-XG-v11.0-UNAUTHORIZED-CHANGE-PREVENTION-SERVICE-BYPASS.txt +CVE-2018-10507 - https://www.exploit-db.com/exploits/44858/ +CVE-2018-10515 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10516 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10517 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10517 - https://www.exploit-db.com/exploits/45793/ +CVE-2018-10518 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10519 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10520 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10521 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10522 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10523 - https://github.com/itodaro/cmsms_cve/blob/master/README.md +CVE-2018-10528 - https://github.com/LibRaw/LibRaw/issues/144 +CVE-2018-10529 - https://github.com/LibRaw/LibRaw/issues/144 +CVE-2018-10532 - https://www.theregister.co.uk/2018/10/26/ee_4gee_hh70_ssh_backdoor/ +CVE-2018-10536 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-10537 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-10538 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-10539 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-10540 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-10546 - https://hackerone.com/reports/505278 +CVE-2018-10548 - https://bugs.php.net/bug.php?id=76248 +CVE-2018-10549 - https://hackerone.com/reports/344035 +CVE-2018-10553 - http://code610.blogspot.com/2018/04/few-bugs-in-latest-nagios-xi-5413.html +CVE-2018-10554 - http://code610.blogspot.com/2018/04/few-bugs-in-latest-nagios-xi-5413.html +CVE-2018-1056 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270 +CVE-2018-1056 - https://sourceforge.net/p/advancemame/bugs/259/ +CVE-2018-10561 - https://www.exploit-db.com/exploits/44576/ +CVE-2018-10562 - https://www.exploit-db.com/exploits/44576/ +CVE-2018-10563 - http://seclists.org/fulldisclosure/2018/May/4 +CVE-2018-10565 - http://seclists.org/fulldisclosure/2018/May/6 +CVE-2018-10566 - http://seclists.org/fulldisclosure/2018/May/7 +CVE-2018-10569 - https://youtu.be/6d4BPbvddkE +CVE-2018-10569 - https://youtu.be/m2to4PWmHkI +CVE-2018-10575 - https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy +CVE-2018-10575 - https://www.exploit-db.com/exploits/45409/ +CVE-2018-10576 - https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy +CVE-2018-10576 - https://www.exploit-db.com/exploits/45409/ +CVE-2018-10577 - https://www.exploit-db.com/exploits/45409/ +CVE-2018-10580 - http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html +CVE-2018-10580 - https://www.exploit-db.com/exploits/44608/ +CVE-2018-10583 - http://seclists.org/fulldisclosure/2020/Oct/26 +CVE-2018-10583 - http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/ +CVE-2018-10583 - https://www.exploit-db.com/exploits/44564/ +CVE-2018-1059 - https://usn.ubuntu.com/3642-2/ +CVE-2018-10594 - https://www.exploit-db.com/exploits/44965/ +CVE-2018-10594 - https://www.exploit-db.com/exploits/45574/ +CVE-2018-1060 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-10607 - http://martem.eu/csa/Martem_CSA_Telem_1805184.pdf +CVE-2018-10608 - http://packetstormsecurity.com/files/152951/SEL-AcSELerator-Architect-2.2.24-Denial-Of-Service.html +CVE-2018-10618 - https://www.exploit-db.com/exploits/45076/ +CVE-2018-10619 - https://www.exploit-db.com/exploits/44892/ +CVE-2018-10641 - https://advancedpersistentsecurity.net/cve-2018-10641/ +CVE-2018-10641 - https://gist.github.com/jocephus/806ff4679cf54af130d69777a551f819 +CVE-2018-10642 - https://github.com/arbahayoub/POC/blob/master/itop_command_injection_1.txt +CVE-2018-10642 - https://sourceforge.net/p/itop/tickets/1585/ +CVE-2018-10653 - http://packetstormsecurity.com/files/156037/Citrix-XenMobile-Server-10.8-XML-Injection.html +CVE-2018-10655 - http://hyp3rlinx.altervista.org/advisories/DEVICELOCK-PLUG-PLAY-AUDITOR-v5.72-UNICODE-BUFFER-OVERFLOW.txt +CVE-2018-10655 - http://packetstormsecurity.com/files/147516/DeviceLock-Plug-And-Play-Auditor-5.72-Buffer-Overflow.html +CVE-2018-10655 - https://www.exploit-db.com/exploits/44590/ +CVE-2018-10658 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10659 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10660 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10660 - https://www.exploit-db.com/exploits/45100/ +CVE-2018-10661 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10661 - https://www.exploit-db.com/exploits/45100/ +CVE-2018-10662 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10662 - https://www.exploit-db.com/exploits/45100/ +CVE-2018-10663 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10664 - https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ +CVE-2018-10666 - https://medium.com/@jonghyk.song/aurora-idex-membership-idxm-erc20-token-allows-attackers-to-acquire-contract-ownership-1ff426cee7c6 +CVE-2018-10675 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-10675 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-10682 - https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt +CVE-2018-10683 - https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt +CVE-2018-10685 - https://github.com/ckolivas/lrzip/issues/95 +CVE-2018-10686 - https://medium.com/@ndrbasi/cve-2018-10686-vestacp-rce-d96d95c2bde2 +CVE-2018-10690 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10690 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10691 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10691 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10692 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10692 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10693 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10693 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10694 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10694 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10695 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10695 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10696 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10696 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10697 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10697 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10698 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10698 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10699 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10699 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10700 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10700 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10701 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10701 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10702 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10702 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10703 - http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html +CVE-2018-10703 - https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 +CVE-2018-10709 - https://www.exploit-db.com/exploits/45716/ +CVE-2018-10710 - https://www.exploit-db.com/exploits/45716/ +CVE-2018-10711 - https://www.exploit-db.com/exploits/45716/ +CVE-2018-10712 - https://www.exploit-db.com/exploits/45716/ +CVE-2018-10716 - https://github.com/rebol0x6c/2345_msg_poc +CVE-2018-10718 - https://github.com/momo5502/cod-exploit +CVE-2018-10718 - https://momo5502.com/blog/?p=34 +CVE-2018-10718 - https://www.exploit-db.com/exploits/44987/ +CVE-2018-10733 - https://bugzilla.redhat.com/show_bug.cgi?id=1574844 +CVE-2018-10734 - https://github.com/hucmosin/Python_Small_Tool/blob/master/other/DVR_POC.py +CVE-2018-10751 - http://packetstormsecurity.com/files/147841/Samsung-Galaxy-S7-Edge-OMACP-WbXml-String-Extension-Processing-Overflow.html +CVE-2018-10751 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-10751 - https://www.exploit-db.com/exploits/44724/ +CVE-2018-10752 - https://pastebin.com/ZGr5tyP2 +CVE-2018-10752 - https://www.exploit-db.com/exploits/45225/ +CVE-2018-10753 - https://github.com/leesavide/abcm2ps/issues/16 +CVE-2018-10757 - https://packetstormsecurity.com/files/147501/cspmysqlum231-sql.txt +CVE-2018-10757 - https://www.exploit-db.com/exploits/44589/ +CVE-2018-10763 - http://packetstormsecurity.com/files/149324/SynaMan-4.0-Build-1488-Cross-Site-Scripting.html +CVE-2018-10763 - https://www.exploit-db.com/exploits/45386/ +CVE-2018-10767 - https://bugzilla.redhat.com/show_bug.cgi?id=1575188 +CVE-2018-10768 - https://bugs.freedesktop.org/show_bug.cgi?id=106408 +CVE-2018-10772 - https://bugzilla.redhat.com/show_bug.cgi?id=1566260 +CVE-2018-10773 - https://docs.google.com/document/d/1k598A16gV9HPwFXnYkyrPwoRbnbFX6LAMRyzb_dxLCM/edit +CVE-2018-10775 - https://drive.google.com/drive/u/1/folders/1qtq272m7jJaEUPGFLvyXmIl5zNJv7rd1 +CVE-2018-10779 - http://bugzilla.maptools.org/show_bug.cgi?id=2788 +CVE-2018-10779 - https://usn.ubuntu.com/3906-1/ +CVE-2018-10780 - https://bugzilla.redhat.com/show_bug.cgi?id=1575201 +CVE-2018-10790 - https://docs.google.com/document/d/1OSwQjtyALgV3OulmWGaTqZrSzk7Ta-xGrcLI0I7SPyM +CVE-2018-10790 - https://github.com/axiomatic-systems/Bento4/issues/390 +CVE-2018-10795 - https://cxsecurity.com/issue/WLB-2018050029 +CVE-2018-10796 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222014 +CVE-2018-10801 - http://bugzilla.maptools.org/show_bug.cgi?id=2790 +CVE-2018-10806 - https://github.com/philippe/FrogCMS/issues/10 +CVE-2018-10809 - http://packetstormsecurity.com/files/147538/2345-Security-Guard-3.7-Denial-Of-Service.html +CVE-2018-10809 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222040 +CVE-2018-10809 - https://www.exploit-db.com/exploits/44600/ +CVE-2018-10814 - http://packetstormsecurity.com/files/149326/SynaMan-40-Build-1488-SMTP-Credential-Disclosure.html +CVE-2018-10814 - https://www.exploit-db.com/exploits/45387/ +CVE-2018-10822 - http://sploit.tech/2018/10/12/D-Link.html +CVE-2018-10822 - https://seclists.org/fulldisclosure/2018/Oct/36 +CVE-2018-10823 - http://sploit.tech/2018/10/12/D-Link.html +CVE-2018-10823 - https://seclists.org/fulldisclosure/2018/Oct/36 +CVE-2018-10824 - http://sploit.tech/2018/10/12/D-Link.html +CVE-2018-10824 - https://seclists.org/fulldisclosure/2018/Oct/36 +CVE-2018-10828 - https://www.exploit-db.com/exploits/44610/ +CVE-2018-10830 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220e0 +CVE-2018-10830 - https://www.exploit-db.com/exploits/44615/ +CVE-2018-10832 - http://packetstormsecurity.com/files/147573/ModbusPal-1.6b-XML-External-Entity-Injection.html +CVE-2018-10832 - https://www.exploit-db.com/exploits/44607/ +CVE-2018-1084 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1084 +CVE-2018-10840 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10840 +CVE-2018-10841 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10841 +CVE-2018-10843 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10843 +CVE-2018-10844 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844 +CVE-2018-10845 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845 +CVE-2018-10846 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846 +CVE-2018-10847 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10847 +CVE-2018-10853 - https://usn.ubuntu.com/3777-1/ +CVE-2018-10858 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2018-10858 - https://usn.ubuntu.com/3738-1/ +CVE-2018-1087 - http://www.openwall.com/lists/oss-security/2018/05/08/5 +CVE-2018-10872 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-10872 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-10876 - https://bugzilla.kernel.org/show_bug.cgi?id=199403 +CVE-2018-10876 - https://usn.ubuntu.com/3753-1/ +CVE-2018-10876 - https://usn.ubuntu.com/3753-2/ +CVE-2018-10877 - https://usn.ubuntu.com/3753-1/ +CVE-2018-10877 - https://usn.ubuntu.com/3753-2/ +CVE-2018-10878 - https://bugzilla.kernel.org/show_bug.cgi?id=199865 +CVE-2018-10878 - https://usn.ubuntu.com/3753-1/ +CVE-2018-10878 - https://usn.ubuntu.com/3753-2/ +CVE-2018-10879 - https://bugzilla.kernel.org/show_bug.cgi?id=200001 +CVE-2018-10879 - https://usn.ubuntu.com/3753-1/ +CVE-2018-10879 - https://usn.ubuntu.com/3753-2/ +CVE-2018-10880 - https://bugzilla.kernel.org/show_bug.cgi?id=200005 +CVE-2018-10880 - https://usn.ubuntu.com/3821-1/ +CVE-2018-10880 - https://usn.ubuntu.com/3821-2/ +CVE-2018-10881 - https://bugzilla.kernel.org/show_bug.cgi?id=200015 +CVE-2018-10881 - https://usn.ubuntu.com/3753-1/ +CVE-2018-10881 - https://usn.ubuntu.com/3753-2/ +CVE-2018-10882 - https://bugzilla.kernel.org/show_bug.cgi?id=200069 +CVE-2018-10882 - https://usn.ubuntu.com/3753-1/ +CVE-2018-10882 - https://usn.ubuntu.com/3753-2/ +CVE-2018-10897 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-10900 - https://www.exploit-db.com/exploits/45313/ +CVE-2018-10901 - https://access.redhat.com/errata/RHSA-2018:2393 +CVE-2018-10901 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-10901 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-10903 - https://usn.ubuntu.com/3720-1/ +CVE-2018-10906 - https://www.exploit-db.com/exploits/45106/ +CVE-2018-10918 - https://usn.ubuntu.com/3738-1/ +CVE-2018-10919 - https://usn.ubuntu.com/3738-1/ +CVE-2018-1093 - https://bugzilla.kernel.org/show_bug.cgi?id=199181 +CVE-2018-10933 - https://www.exploit-db.com/exploits/45638/ +CVE-2018-10933 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1094 - https://bugzilla.kernel.org/show_bug.cgi?id=199183 +CVE-2018-10946 - https://support.polycom.com/PolycomService/home/home.htm +CVE-2018-10947 - https://support.polycom.com/PolycomService/home/home.htm +CVE-2018-1095 - https://bugzilla.kernel.org/show_bug.cgi?id=199185 +CVE-2018-10952 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222088 +CVE-2018-10953 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x0022204C +CVE-2018-10954 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222550 +CVE-2018-10955 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222548 +CVE-2018-10956 - http://packetstormsecurity.com/files/148274/IPConfigure-Orchid-VMS-2.0.5-Directory-Traversal-Information-Disclosure.html +CVE-2018-10956 - https://www.exploit-db.com/exploits/44916/ +CVE-2018-10957 - https://packetstormsecurity.com/files/147525/D-Link-DIR-868L-1.12-Cross-Site-Request-Forgery.html +CVE-2018-10958 - https://github.com/Exiv2/exiv2/issues/302 +CVE-2018-10962 - https://github.com/rebol0x6c/2345_mouse_poc +CVE-2018-10963 - http://bugzilla.maptools.org/show_bug.cgi?id=2795 +CVE-2018-10969 - https://www.exploit-db.com/exploits/44867/ +CVE-2018-10971 - https://github.com/FLIF-hub/FLIF/issues/501 +CVE-2018-10972 - https://github.com/FLIF-hub/FLIF/issues/503 +CVE-2018-10974 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222100 +CVE-2018-10975 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222104 +CVE-2018-10976 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222050 +CVE-2018-10977 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220E4 +CVE-2018-1098 - https://github.com/coreos/etcd/issues/9353 +CVE-2018-10989 - https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c +CVE-2018-1099 - https://github.com/coreos/etcd/issues/9353 +CVE-2018-10990 - https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c +CVE-2018-10997 - https://gist.github.com/dmblbc/14a77036a9562407194c3cf3ee3f265e +CVE-2018-10998 - https://github.com/Exiv2/exiv2/issues/303 +CVE-2018-10999 - https://github.com/Exiv2/exiv2/issues/306 +CVE-2018-11005 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11006 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11007 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11008 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11009 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11010 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11013 - https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/ +CVE-2018-11017 - https://docs.google.com/document/d/18lJc_F5p3HPaMwsUAIwP0zMMhwJs-Snhuj05nhMIgAw/edit +CVE-2018-11018 - https://github.com/zhaoheng521/PbootCMS/blob/master/V1.0.7%20csrf +CVE-2018-11019 - https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11019.md +CVE-2018-11020 - https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11020.md +CVE-2018-11021 - https://github.com/datadancer/HIAFuzz/blob/master/CVE-2018-11021.md +CVE-2018-11023 - https://github.com/datadancer/HIAFuzz/blob/master/CVEs.md +CVE-2018-11024 - https://github.com/datadancer/HIAFuzz/blob/master/CVEs.md +CVE-2018-11033 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=40842 +CVE-2018-11034 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NsProtect.sys-x64-0x8000200D +CVE-2018-11034 - https://www.exploit-db.com/exploits/44619/ +CVE-2018-11035 - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NsProtect.sys-x64-0x80002019 +CVE-2018-11037 - https://github.com/Exiv2/exiv2/issues/307 +CVE-2018-11039 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-11039 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11039 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11039 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-11039 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11040 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-11040 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11040 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11040 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-11040 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11049 - http://seclists.org/fulldisclosure/2018/Jul/23 +CVE-2018-11052 - http://seclists.org/fulldisclosure/2018/Jul/1 +CVE-2018-11054 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11054 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11054 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11054 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-11055 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11055 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11055 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11055 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-11056 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11056 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11056 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11056 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-11057 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11057 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11057 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11057 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-11058 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11058 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11058 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11058 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-1106 - http://www.openwall.com/lists/oss-security/2018/04/23/3 +CVE-2018-11066 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html +CVE-2018-11067 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html +CVE-2018-11073 - https://seclists.org/fulldisclosure/2018/Sep/39 +CVE-2018-11074 - https://seclists.org/fulldisclosure/2018/Sep/39 +CVE-2018-11075 - https://seclists.org/fulldisclosure/2018/Sep/39 +CVE-2018-11076 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html +CVE-2018-11077 - https://www.vmware.com/security/advisories/VMSA-2018-0029.html +CVE-2018-1109 - https://snyk.io/vuln/npm:braces:20180219 +CVE-2018-11090 - http://seclists.org/fulldisclosure/2018/May/32 +CVE-2018-11090 - https://www.sec-consult.com/en/blog/advisories/arbitrary-file-upload-cross-site-scripting-in-mybiz-myprocurenet/ +CVE-2018-11091 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html +CVE-2018-11091 - http://seclists.org/fulldisclosure/2018/May/32 +CVE-2018-11091 - https://www.sec-consult.com/en/blog/advisories/arbitrary-file-upload-cross-site-scripting-in-mybiz-myprocurenet/ +CVE-2018-11092 - https://www.exploit-db.com/exploits/44624/ +CVE-2018-11094 - https://blog.kos-lab.com/Hello-World/ +CVE-2018-11094 - https://www.exploit-db.com/exploits/44637/ +CVE-2018-11096 - https://www.exploit-db.com/exploits/44628/ +CVE-2018-11102 - https://docs.google.com/document/d/18xCwfxMSJiQ9ruQSVaO8-jlcobDjFiYXWOaw31V37xo/edit +CVE-2018-1111 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-1111 - https://www.exploit-db.com/exploits/44652/ +CVE-2018-1111 - https://www.exploit-db.com/exploits/44890/ +CVE-2018-11124 - https://docs.google.com/document/d/1dJP1CQupHGXjsMWthgPGepOkcnxYA4mDfdjOE46nrhM/edit?usp=sharing +CVE-2018-11124 - https://www.exploit-db.com/exploits/45053/ +CVE-2018-11126 - https://github.com/doorgets/CMS/issues/11 +CVE-2018-11132 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11133 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11134 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11135 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11136 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11137 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11138 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11138 - https://www.exploit-db.com/exploits/44950/ +CVE-2018-11139 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11140 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11141 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11142 - https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities +CVE-2018-11143 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11143 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11143 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11144 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11144 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11144 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11145 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11145 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11145 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11146 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11146 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11146 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11147 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11147 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11147 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11148 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11148 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11148 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11149 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11149 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11149 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11150 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11150 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11150 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11151 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11151 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11151 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11152 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11152 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11152 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11153 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11153 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11153 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11154 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11154 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11154 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11155 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11155 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11155 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11156 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11156 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11156 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11157 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11157 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11157 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11158 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11158 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11158 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11159 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11159 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11159 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11160 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11160 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11160 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11161 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11161 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11161 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11162 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11162 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11162 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11163 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11163 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11163 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11164 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11164 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11164 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11165 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11165 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11165 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11166 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11166 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11166 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11167 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11167 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11167 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11168 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11168 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11168 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11169 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11169 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11169 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11170 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11170 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11170 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11171 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11171 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11171 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11172 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11172 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11172 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11173 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11173 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11173 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11174 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11174 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11174 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11175 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11175 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11175 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11176 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11176 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11176 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11177 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11177 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11177 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11178 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11178 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11178 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11179 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11179 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11179 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11180 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11180 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11180 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11181 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11181 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11181 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11182 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11182 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11182 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11183 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11183 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11183 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11184 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11184 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11184 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11185 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11185 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11185 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11186 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11186 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11186 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11187 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11187 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11187 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11188 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11188 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11188 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11189 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11189 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11189 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11190 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11190 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11190 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11191 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11191 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11191 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11192 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11192 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11192 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11193 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11193 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11193 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11194 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html +CVE-2018-11194 - http://seclists.org/fulldisclosure/2018/May/71 +CVE-2018-11194 - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities +CVE-2018-11195 - https://bugs.launchpad.net/mahara/+bug/1770561 +CVE-2018-1120 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1120 - https://www.exploit-db.com/exploits/44806/ +CVE-2018-11202 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 +CVE-2018-11203 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 +CVE-2018-11204 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 +CVE-2018-11205 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 +CVE-2018-11206 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 +CVE-2018-11207 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5#divided-by-zero---divbyzero__h5d_chunk_poc +CVE-2018-11207 - https://github.com/Twi1ight/fuzzing-pocs/tree/master/hdf5 +CVE-2018-11208 - https://github.com/zblogcn/zblogphp/issues/187 +CVE-2018-11209 - https://github.com/zblogcn/zblogphp/issues/188 +CVE-2018-1121 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1121 - https://www.exploit-db.com/exploits/44806/ +CVE-2018-1121 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt +CVE-2018-11212 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-11212 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11218 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES +CVE-2018-11219 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES +CVE-2018-1122 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1122 - https://www.exploit-db.com/exploits/44806/ +CVE-2018-1122 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt +CVE-2018-11220 - https://www.exploit-db.com/exploits/44779/ +CVE-2018-11227 - https://github.com/monstra-cms/monstra/issues +CVE-2018-11227 - https://www.exploit-db.com/exploits/44646 +CVE-2018-1123 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1123 - https://www.exploit-db.com/exploits/44806/ +CVE-2018-1123 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt +CVE-2018-11232 - https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.2 +CVE-2018-11233 - https://marc.info/?l=git&m=152761328506724&w=2 +CVE-2018-11235 - https://marc.info/?l=git&m=152761328506724&w=2 +CVE-2018-11235 - https://www.exploit-db.com/exploits/44822/ +CVE-2018-11237 - https://www.exploit-db.com/exploits/44750/ +CVE-2018-1124 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1124 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-1124 - https://usn.ubuntu.com/3658-2/ +CVE-2018-1124 - https://www.exploit-db.com/exploits/44806/ +CVE-2018-1124 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt +CVE-2018-11242 - https://www.exploit-db.com/exploits/44690/ +CVE-2018-11243 - https://github.com/upx/upx/issues/206 +CVE-2018-11243 - https://github.com/upx/upx/issues/207 +CVE-2018-11244 - https://wpvulndb.com/vulnerabilities/9087 +CVE-2018-11245 - https://zigrin.com/advisories/misp-xss-with-cortex-type-attributes/ +CVE-2018-11246 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-11247 - http://seclists.org/fulldisclosure/2018/Aug/11 +CVE-2018-1125 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1125 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt +CVE-2018-11254 - https://bugzilla.redhat.com/show_bug.cgi?id=1576174 +CVE-2018-11255 - https://bugzilla.redhat.com/show_bug.cgi?id=1575502 +CVE-2018-11256 - https://bugzilla.redhat.com/show_bug.cgi?id=1575851 +CVE-2018-11257 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11258 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11259 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1126 - http://seclists.org/oss-sec/2018/q2/122 +CVE-2018-1126 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-1126 - https://usn.ubuntu.com/3658-2/ +CVE-2018-1126 - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt +CVE-2018-11264 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11267 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11268 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11269 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11271 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11271 +CVE-2018-11277 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11279 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11284 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11285 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11287 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11288 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11289 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1129 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2018-11290 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11291 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11292 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1130 - https://usn.ubuntu.com/3698-1/ +CVE-2018-1130 - https://usn.ubuntu.com/3698-2/ +CVE-2018-11305 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11307 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2018-11307 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11307 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11307 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-11311 - https://www.exploit-db.com/exploits/44656/ +CVE-2018-11314 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 +CVE-2018-11315 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 +CVE-2018-11316 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 +CVE-2018-1132 - https://www.exploit-db.com/exploits/44747/ +CVE-2018-1133 - https://www.exploit-db.com/exploits/46551/ +CVE-2018-11332 - https://www.exploit-db.com/exploits/44775/ +CVE-2018-11335 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-11339 - https://www.exploit-db.com/exploits/44691/ +CVE-2018-11340 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11341 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11342 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11343 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11344 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11345 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11346 - http://seclists.org/fulldisclosure/2018/May/2 +CVE-2018-11347 - https://www.bishopfox.com/news/2018/10/yunohost-2-7-2-to-2-7-14-multiple-vulnerabilities/ +CVE-2018-11348 - https://www.bishopfox.com/news/2018/10/yunohost-2-7-2-to-2-7-14-multiple-vulnerabilities/ +CVE-2018-11363 - https://github.com/ChijinZ/security_advisories/tree/master/PDFgen-206ef1b +CVE-2018-11366 - https://wpvulndb.com/vulnerabilities/9088 +CVE-2018-11371 - https://github.com/zorlan/skycaiji/issues/9 +CVE-2018-11372 - https://github.com/hi-KK/CVE-Hunter/blob/master/1.md +CVE-2018-11373 - https://github.com/hi-KK/CVE-Hunter/blob/master/2.md +CVE-2018-1139 - https://usn.ubuntu.com/3738-1/ +CVE-2018-11392 - http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Shell-Upload.html +CVE-2018-11396 - https://bugzilla.gnome.org/show_bug.cgi?id=795740 +CVE-2018-11403 - https://www.exploit-db.com/exploits/44782/ +CVE-2018-11404 - https://www.exploit-db.com/exploits/44783/ +CVE-2018-11405 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/256 +CVE-2018-11409 - https://github.com/kofa2002/splunk +CVE-2018-11409 - https://www.exploit-db.com/exploits/44865/ +CVE-2018-1141 - https://www.tenable.com/security/tns-2018-01 +CVE-2018-11410 - https://bugzilla.redhat.com/show_bug.cgi?id=1582024 +CVE-2018-11410 - https://docs.google.com/document/d/1Uw3D6ECXZr8S2cWOTY81kg6ivv0WpR4kQqxVpUSyGUA/edit?usp=sharing +CVE-2018-11412 - https://www.exploit-db.com/exploits/44832/ +CVE-2018-11413 - https://github.com/yupoxiong/BearAdmin/issues/5 +CVE-2018-11414 - https://github.com/yupoxiong/BearAdmin/issues/5 +CVE-2018-11415 - https://www.exploit-db.com/exploits/44755/ +CVE-2018-11429 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-1143 - https://www.tenable.com/security/research/tra-2018-08 +CVE-2018-11430 - https://www.exploit-db.com/exploits/44754/ +CVE-2018-11439 - http://seclists.org/fulldisclosure/2018/May/49 +CVE-2018-1144 - https://www.tenable.com/security/research/tra-2018-08 +CVE-2018-11442 - https://gist.github.com/NinjaXshell/a5fae5e2d1031ca59160fbe29d94279c +CVE-2018-11442 - https://www.exploit-db.com/exploits/44763/ +CVE-2018-11443 - https://gist.github.com/NinjaXshell/be613dab99601f6abce884f6bc3d83a8 +CVE-2018-11443 - https://www.exploit-db.com/exploits/44764/ +CVE-2018-11444 - https://gist.github.com/NinjaXshell/4c0509096cb4ec6543b3f8050369920c +CVE-2018-11444 - https://www.exploit-db.com/exploits/44765/ +CVE-2018-11445 - https://gist.github.com/NinjaXshell/a5fae5e2d1031ca59160fbe29d94279c +CVE-2018-11445 - https://www.exploit-db.com/exploits/44763/ +CVE-2018-1145 - https://www.tenable.com/security/research/tra-2018-08 +CVE-2018-11450 - https://github.com/LucvanDonk/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability/wiki +CVE-2018-1146 - https://www.tenable.com/security/research/tra-2018-08 +CVE-2018-1147 - https://www.tenable.com/security/tns-2018-05 +CVE-2018-11470 - https://github.com/hi-KK/CVE-Hunter/blob/master/3.md +CVE-2018-11471 - https://github.com/nikhil1232/Cockpit-CMS-XSS-POC +CVE-2018-11476 - http://seclists.org/fulldisclosure/2018/May/66 +CVE-2018-11476 - https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ +CVE-2018-11477 - http://seclists.org/fulldisclosure/2018/May/66 +CVE-2018-11477 - https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ +CVE-2018-11478 - http://seclists.org/fulldisclosure/2018/May/66 +CVE-2018-11478 - https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ +CVE-2018-11479 - http://packetstormsecurity.com/files/156222/Windscribe-WindscribeService-Named-Pipe-Privilege-Escalation.html +CVE-2018-1148 - https://www.tenable.com/security/tns-2018-05 +CVE-2018-1149 - https://github.com/tenable/poc/tree/master/nuuo/nvrmini2 +CVE-2018-1149 - https://www.nuuo.com/backend/CKEdit/upload/files/NUUO_NVRsolo_v3_9_1_Release%20note.pdf +CVE-2018-1149 - https://www.tenable.com/security/research/tra-2018-25 +CVE-2018-11491 - https://mars-cheng.github.io/blog/2018/CVE-2018-11491/ +CVE-2018-11492 - http://packetstormsecurity.com/files/152542/ASUS-HG100-Denial-Of-Service.html +CVE-2018-11492 - https://mars-cheng.github.io/blog/2018/CVE-2018-11492/ +CVE-2018-11492 - https://www.exploit-db.com/exploits/46720/ +CVE-2018-11493 - https://github.com/wuzhicms/wuzhicms/issues/137 +CVE-2018-11496 - https://github.com/ckolivas/lrzip/issues/96 +CVE-2018-11498 - https://github.com/inikep/lizard/issues/16 +CVE-2018-1150 - https://www.nuuo.com/backend/CKEdit/upload/files/NUUO_NVRsolo_v3_9_1_Release%20note.pdf +CVE-2018-1150 - https://www.tenable.com/security/research/tra-2018-25 +CVE-2018-11500 - https://github.com/sanluan/PublicCMS/issues/11 +CVE-2018-11501 - https://gkaim.com/cve-2018-11501-vikas-chaudhary/ +CVE-2018-11502 - https://packetstormsecurity.com/files/148999/MyBB-Moderator-Log-Notes-1.1-Cross-Site-Request-Forgery.html +CVE-2018-11502 - https://www.exploit-db.com/exploits/45224/ +CVE-2018-11505 - https://pastebin.com/NtPn3jB8 +CVE-2018-11505 - https://www.exploit-db.com/exploits/44776/ +CVE-2018-11508 - https://www.exploit-db.com/exploits/46208/ +CVE-2018-11509 - http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html +CVE-2018-11509 - https://www.exploit-db.com/exploits/45200/ +CVE-2018-1151 - https://www.tenable.com/security/research/tra-2018-14 +CVE-2018-11510 - http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html +CVE-2018-11510 - https://www.exploit-db.com/exploits/45200/ +CVE-2018-11510 - https://www.exploit-db.com/exploits/45212/ +CVE-2018-11511 - http://packetstormsecurity.com/files/148919/ASUSTOR-NAS-ADM-3.1.0-Remote-Command-Execution-SQL-Injection.html +CVE-2018-11511 - https://www.exploit-db.com/exploits/45200/ +CVE-2018-11512 - https://www.exploit-db.com/exploits/44790/ +CVE-2018-11515 - https://github.com/DediData/wpforo/issues/1 +CVE-2018-11515 - https://wpvulndb.com/vulnerabilities/9089 +CVE-2018-11516 - http://code610.blogspot.com/2018/05/make-free-vlc.html +CVE-2018-11518 - http://virgil-cj.blogspot.com/2018/05/0day-legacy-ivr-lets-phreak.html +CVE-2018-11518 - https://datarift.blogspot.com/2018/05/CVE-2018-11518-abusing-ivr-systems.html +CVE-2018-11522 - http://packetstormsecurity.com/files/147978/Yosoro-1.0.4-Remote-Code-Execution.html +CVE-2018-11522 - https://www.exploit-db.com/exploits/44803/ +CVE-2018-11523 - https://github.com/unh3x/just4cve/issues/1 +CVE-2018-11523 - https://www.exploit-db.com/exploits/44794/ +CVE-2018-11525 - https://wpvulndb.com/vulnerabilities/9096 +CVE-2018-11525 - https://www.exploit-db.com/exploits/44931/ +CVE-2018-11526 - https://wpvulndb.com/vulnerabilities/9097 +CVE-2018-11526 - https://www.exploit-db.com/exploits/44940/ +CVE-2018-11527 - https://github.com/fanyibo2009/cscms/blob/master/v4.1%20csrf +CVE-2018-11528 - https://github.com/wuzhicms/wuzhicms/issues/138 +CVE-2018-11529 - http://seclists.org/fulldisclosure/2018/Jul/28 +CVE-2018-11529 - https://www.exploit-db.com/exploits/45626/ +CVE-2018-11532 - https://www.exploit-db.com/exploits/44795/ +CVE-2018-11535 - https://gist.github.com/NinjaXshell/f894bd79f9707a92a7b6934711a8fdc9 +CVE-2018-11535 - https://www.exploit-db.com/exploits/44793/ +CVE-2018-11538 - http://packetstormsecurity.com/files/147977/SearchBlox-8.6.6-Cross-Site-Request-Forgery.html +CVE-2018-11538 - https://gurelahmet.com/cve-2018-11538-csrf-privilege-escalation-creation-of-an-administrator-account-on-searchblox-8-6-6/ +CVE-2018-11538 - https://www.exploit-db.com/exploits/44801/ +CVE-2018-1154 - https://www.tenable.com/security/tns-2018-11 +CVE-2018-11544 - https://pastebin.com/ygwczqpP +CVE-2018-1155 - https://www.tenable.com/security/tns-2018-11 +CVE-2018-11551 - http://seclists.org/fulldisclosure/2018/May/69 +CVE-2018-11555 - https://github.com/xiaoqx/pocs/tree/master/cms +CVE-2018-11556 - https://github.com/xiaoqx/pocs/tree/master/cms +CVE-2018-11558 - https://github.com/domainmod/domainmod/issues/66 +CVE-2018-11559 - https://github.com/domainmod/domainmod/issues/66 +CVE-2018-1156 - https://www.tenable.com/security/research/tra-2018-21 +CVE-2018-11564 - http://ruffsecurity.blogspot.com/2018/05/my-first-cve-found.html +CVE-2018-11564 - https://packetstormsecurity.com/files/148001/PageKit-CMS-1.0.13-Cross-Site-Scripting.html +CVE-2018-11564 - https://www.exploit-db.com/exploits/44837/ +CVE-2018-11567 - https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html +CVE-2018-11568 - https://packetstormsecurity.com/files/143666/WordPress-GamePlan-Event-And-Gym-Fitness-Theme-1.5.13.2-Cross-Site-Scripting.html +CVE-2018-1157 - http://seclists.org/fulldisclosure/2019/Jul/20 +CVE-2018-1157 - https://www.tenable.com/security/research/tra-2018-21 +CVE-2018-11575 - https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib +CVE-2018-11575 - https://github.com/miniupnp/ngiflib/issues/4 +CVE-2018-11576 - https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib +CVE-2018-11576 - https://github.com/miniupnp/ngiflib/issues/6 +CVE-2018-11577 - https://github.com/Edward-L/fuzzing-pocs/tree/master/liblouis +CVE-2018-11577 - https://github.com/liblouis/liblouis/issues/582 +CVE-2018-11578 - https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib +CVE-2018-11578 - https://github.com/miniupnp/ngiflib/issues/5 +CVE-2018-1158 - http://seclists.org/fulldisclosure/2019/Jul/20 +CVE-2018-1158 - https://www.tenable.com/security/research/tra-2018-21 +CVE-2018-11581 - https://www.exploit-db.com/exploits/44839/ +CVE-2018-11586 - http://packetstormsecurity.com/files/148032/SearchBlox-8.6.7-XML-External-Entity-Injection.html +CVE-2018-11586 - https://gurelahmet.com/searchblox-8-6-7-out-of-band-xml-external-entity-oob-xxe-cve-2018-11586/ +CVE-2018-11586 - https://www.exploit-db.com/exploits/44827/ +CVE-2018-1159 - https://www.tenable.com/security/research/tra-2018-21 +CVE-2018-11590 - https://github.com/espruino/Espruino/issues/1427 +CVE-2018-11591 - https://github.com/espruino/Espruino/issues/1420 +CVE-2018-11592 - https://github.com/espruino/Espruino/issues/1421 +CVE-2018-11593 - https://github.com/espruino/Espruino/issues/1426 +CVE-2018-11594 - https://github.com/espruino/Espruino/issues/1434 +CVE-2018-11595 - https://github.com/espruino/Espruino/issues/1425 +CVE-2018-11596 - https://github.com/espruino/Espruino/issues/1435 +CVE-2018-11597 - https://github.com/espruino/Espruino/issues/1448 +CVE-2018-11598 - https://github.com/espruino/Espruino/issues/1437 +CVE-2018-1160 - http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html +CVE-2018-1160 - https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/ +CVE-2018-1160 - https://www.exploit-db.com/exploits/46034/ +CVE-2018-1160 - https://www.exploit-db.com/exploits/46048/ +CVE-2018-1160 - https://www.exploit-db.com/exploits/46675/ +CVE-2018-1160 - https://www.tenable.com/security/research/tra-2018-48 +CVE-2018-11624 - https://github.com/ImageMagick/ImageMagick/issues/1149 +CVE-2018-11625 - https://github.com/ImageMagick/ImageMagick/issues/1156 +CVE-2018-11628 - https://www.exploit-db.com/exploits/44831/ +CVE-2018-11646 - https://bugzilla.gnome.org/show_bug.cgi?id=795740 +CVE-2018-11646 - https://www.exploit-db.com/exploits/44842/ +CVE-2018-11646 - https://www.exploit-db.com/exploits/44876/ +CVE-2018-11647 - https://github.com/jaredhanson/oauth2orize-fprm/commit/2bf9faee787eb004abbdfb6f4cc2fb06653defd5 +CVE-2018-11649 - https://github.com/Blck4/HUE-Exploit +CVE-2018-1165 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11652 - https://www.exploit-db.com/exploits/44899/ +CVE-2018-11654 - https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems/CVE-2018-11654 +CVE-2018-11657 - https://github.com/miniupnp/ngiflib/issues/7 +CVE-2018-11670 - https://www.exploit-db.com/exploits/44825/ +CVE-2018-11671 - https://www.exploit-db.com/exploits/44826/ +CVE-2018-11688 - http://packetstormsecurity.com/files/148057/Ignite-Realtime-Openfire-3.7.1-Cross-Site-Scripting.html +CVE-2018-11688 - http://seclists.org/fulldisclosure/2018/Jun/13 +CVE-2018-11689 - https://seclists.org/bugtraq/2018/Jun/40 +CVE-2018-11689 - https://vulmon.com/vulnerabilitydetails?qid=CVE-2018-11689 +CVE-2018-11690 - http://packetstormsecurity.com/files/148127/Joomla-2.4.0-Gridbox-Cross-Site-Scripting.html +CVE-2018-11690 - http://seclists.org/fulldisclosure/2018/Jun/26 +CVE-2018-11691 - http://www.emerson.com/documents/automation/deltav-smart-switches-en-179014.pdf +CVE-2018-11692 - https://www.exploit-db.com/exploits/44844/ +CVE-2018-11693 - https://github.com/sass/libsass/issues/2661 +CVE-2018-11694 - https://github.com/sass/libsass/issues/2663 +CVE-2018-11695 - https://github.com/sass/libsass/issues/2664 +CVE-2018-11696 - https://github.com/sass/libsass/issues/2665 +CVE-2018-11697 - https://github.com/sass/libsass/issues/2656 +CVE-2018-11698 - https://github.com/sass/libsass/issues/2662 +CVE-2018-11709 - https://wpvulndb.com/vulnerabilities/9090 +CVE-2018-1171 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-11711 - https://www.exploit-db.com/exploits/44845/ +CVE-2018-11714 - https://www.exploit-db.com/exploits/44781/ +CVE-2018-11715 - https://www.exploit-db.com/exploits/44833/ +CVE-2018-11722 - https://github.com/wuzhicms/wuzhicms/issues/141 +CVE-2018-11723 - http://packetstormsecurity.com/files/148113/libpff-2018-04-28-Information-Disclosure.html +CVE-2018-11723 - http://seclists.org/fulldisclosure/2018/Jun/15 +CVE-2018-11724 - http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html +CVE-2018-11725 - http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html +CVE-2018-11726 - http://packetstormsecurity.com/files/148114/libmobi-0.3-Information-Disclosure.html +CVE-2018-11727 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html +CVE-2018-11728 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html +CVE-2018-11729 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html +CVE-2018-11730 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html +CVE-2018-11731 - http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html +CVE-2018-11737 - https://github.com/sleuthkit/sleuthkit/issues/1266 +CVE-2018-11738 - https://github.com/sleuthkit/sleuthkit/issues/1265 +CVE-2018-11739 - https://github.com/sleuthkit/sleuthkit/issues/1267 +CVE-2018-11740 - https://github.com/sleuthkit/sleuthkit/issues/1264 +CVE-2018-11741 - http://hyp3rlinx.altervista.org/advisories/NEC-UNIVERGE-WEBPRO-v6.00-PREDICTABLE-SESSIONID-CLEARTEXT-PASSWORDS.txt +CVE-2018-11741 - http://packetstormsecurity.com/files/150610/NEC-Univerge-Sv9100-WebPro-6.00.00-Predictable-Session-ID-Cleartext-Passwords.html +CVE-2018-11741 - http://seclists.org/fulldisclosure/2018/Dec/1 +CVE-2018-11741 - https://www.exploit-db.com/exploits/45942/ +CVE-2018-11742 - http://hyp3rlinx.altervista.org/advisories/NEC-UNIVERGE-WEBPRO-v6.00-PREDICTABLE-SESSIONID-CLEARTEXT-PASSWORDS.txt +CVE-2018-11742 - http://packetstormsecurity.com/files/150610/NEC-Univerge-Sv9100-WebPro-6.00.00-Predictable-Session-ID-Cleartext-Passwords.html +CVE-2018-11742 - http://seclists.org/fulldisclosure/2018/Dec/1 +CVE-2018-11742 - https://www.exploit-db.com/exploits/45942/ +CVE-2018-11759 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11763 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11771 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2018-11775 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11775 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-11775 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11776 - http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html +CVE-2018-11776 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-11776 - https://cwiki.apache.org/confluence/display/WW/S2-057 +CVE-2018-11776 - https://github.com/hook-s3c/CVE-2018-11776-Python-PoC +CVE-2018-11776 - https://www.exploit-db.com/exploits/45260/ +CVE-2018-11776 - https://www.exploit-db.com/exploits/45262/ +CVE-2018-11776 - https://www.exploit-db.com/exploits/45367/ +CVE-2018-11776 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11776 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11784 - http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html +CVE-2018-11784 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2018-11784 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11784 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-11784 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-11784 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-11790 - https://www.openoffice.org/security/cves/CVE-2018-11790.html +CVE-2018-11797 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-11798 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-11813 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz +CVE-2018-11820 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11821 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11822 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11824 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11828 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1183 - http://seclists.org/fulldisclosure/2018/Apr/61 +CVE-2018-11830 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11838 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2018-11845 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11846 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11847 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11849 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1185 - https://www.exploit-db.com/exploits/44614/ +CVE-2018-11850 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11853 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11854 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11855 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11856 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11857 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11858 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11859 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1186 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1186 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-11861 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11862 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11864 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11865 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11866 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11867 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1187 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1187 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-11870 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11871 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11872 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11873 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11874 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11875 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11876 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11877 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11879 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1188 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1188 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-11880 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11882 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11884 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11888 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1189 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1189 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-11899 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11921 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11928 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11928 +CVE-2018-11931 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11932 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11935 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11936 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11936 +CVE-2018-11938 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11945 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11948 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11950 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11951 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11958 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11966 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11968 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11968 +CVE-2018-11970 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11971 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11976 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11976 +CVE-2018-11980 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2018-11982 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1199 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-11993 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11994 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11996 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11998 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-11999 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-12004 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12004 +CVE-2018-12005 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12005 +CVE-2018-1201 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1201 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-12012 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12012 +CVE-2018-12013 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12013 +CVE-2018-12015 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834 +CVE-2018-12015 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-12018 - https://github.com/ethereum/go-ethereum/pull/16891 +CVE-2018-12019 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-1202 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1202 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-12020 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-12020 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-12021 - http://www.openwall.com/lists/oss-security/2019/05/16/1 +CVE-2018-12022 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2018-12022 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-12022 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-12023 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-12023 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-12023 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-12023 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-12025 - https://medium.com/secbit-media/bugged-smart-contract-f-e-how-could-someone-mess-up-with-boolean-d2251defd6ff +CVE-2018-12029 - https://pulsesecurity.co.nz/advisories/phusion-passenger-priv-esc +CVE-2018-1203 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1203 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-12034 - https://bnbdr.github.io/posts/swisscheese/ +CVE-2018-12034 - https://github.com/VirusTotal/yara/issues/891 +CVE-2018-12034 - https://github.com/bnbdr/swisscheese +CVE-2018-12035 - https://bnbdr.github.io/posts/swisscheese/ +CVE-2018-12035 - https://github.com/VirusTotal/yara/issues/891 +CVE-2018-12035 - https://github.com/bnbdr/swisscheese +CVE-2018-12038 - http://www.kb.cert.org/vuls/id/395981 +CVE-2018-1204 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1204 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-12040 - http://packetstormsecurity.com/files/148125/SensioLabs-Symfony-3.3.6-Cross-Site-Scripting.html +CVE-2018-12045 - https://github.com/SukaraLin/php_code_audit_project/blob/master/dedecms/dedecms%20v5.7%20sp2%20%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md +CVE-2018-12046 - https://github.com/SukaraLin/php_code_audit_project/blob/master/dedecms/dedecms%20v5.7%20sp2%20%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md +CVE-2018-12048 - https://www.exploit-db.com/exploits/44885/ +CVE-2018-12049 - https://www.exploit-db.com/exploits/44886/ +CVE-2018-12051 - https://github.com/unh3x/just4cve/issues/5 +CVE-2018-12052 - https://github.com/unh3x/just4cve/issues/3 +CVE-2018-12052 - https://www.exploit-db.com/exploits/44873/ +CVE-2018-12053 - https://github.com/unh3x/just4cve/issues/6 +CVE-2018-12053 - https://www.exploit-db.com/exploits/44870/ +CVE-2018-12054 - https://github.com/unh3x/just4cve/issues/4 +CVE-2018-12054 - https://www.exploit-db.com/exploits/44874/ +CVE-2018-12055 - https://github.com/unh3x/just4cve/issues/2 +CVE-2018-12055 - https://www.exploit-db.com/exploits/44866/ +CVE-2018-12071 - https://www.codeigniter.com/user_guide/changelog.html +CVE-2018-12076 - https://sorsnce.com/2018/11/13/announcing-cve-2018-12076/ +CVE-2018-12090 - https://www.exploit-db.com/exploits/45153/ +CVE-2018-12094 - https://cxsecurity.com/issue/WLB-2018060091 +CVE-2018-12094 - https://www.exploit-db.com/exploits/44897/ +CVE-2018-12095 - https://cxsecurity.com/issue/WLB-2018060092 +CVE-2018-12095 - https://www.exploit-db.com/exploits/44895/ +CVE-2018-12100 - https://support.sonatype.com/hc/en-us/articles/360018565994-CVE-2018-12100-Nexus-Repository-Manager-3-Cross-Site-Scripting-XSS-June-4th-2018 +CVE-2018-12101 - https://github.com/ClipperCMS/ClipperCMS/issues/487 +CVE-2018-12101 - https://github.com/ClipperCMS/ClipperCMS/issues/488 +CVE-2018-12102 - https://github.com/Edward-L/fuzzing-pocs/tree/master/md4c +CVE-2018-12102 - https://github.com/mity/md4c/issues/41 +CVE-2018-12104 - https://github.com/airbnb/knowledge-repo/issues/431 +CVE-2018-12111 - https://www.exploit-db.com/exploits/44882/ +CVE-2018-12112 - https://github.com/mity/md4c/issues/42 +CVE-2018-12113 - http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html +CVE-2018-12113 - https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa +CVE-2018-12113 - https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9 +CVE-2018-12114 - https://www.exploit-db.com/exploits/44887/ +CVE-2018-12126 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html +CVE-2018-12126 - https://seclists.org/bugtraq/2019/Jun/28 +CVE-2018-12126 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2018-12126 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html +CVE-2018-12127 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html +CVE-2018-12127 - https://seclists.org/bugtraq/2019/Jun/28 +CVE-2018-12127 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2018-12127 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html +CVE-2018-1213 - https://www.coresecurity.com/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities +CVE-2018-1213 - https://www.exploit-db.com/exploits/44039/ +CVE-2018-12130 - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html +CVE-2018-12130 - https://seclists.org/bugtraq/2019/Jun/28 +CVE-2018-12130 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2018-12130 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html +CVE-2018-12169 - https://support.lenovo.com/us/en/solutions/LEN-20527 +CVE-2018-1217 - https://www.exploit-db.com/exploits/44441/ +CVE-2018-1218 - https://www.exploit-db.com/exploits/44332/ +CVE-2018-12207 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-12209 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12209 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12210 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12210 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12211 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12211 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12212 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12212 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12213 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12213 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12214 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12214 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12215 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12215 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12216 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12216 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12217 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12217 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12218 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12218 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12219 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12219 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12220 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12220 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12221 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12221 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12222 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12222 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12223 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12223 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12224 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-12224 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-12229 - https://metamorfosec.com/Files/Advisories/METS-2018-001-A_XSS_Vulnerability_in_OJS_3.0.0_to_3.1.1-1.txt +CVE-2018-12233 - https://usn.ubuntu.com/3753-1/ +CVE-2018-12233 - https://usn.ubuntu.com/3753-2/ +CVE-2018-12234 - http://packetstormsecurity.com/files/155231/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html +CVE-2018-12250 - https://cxsecurity.com/issue/WLB-2018060157 +CVE-2018-12254 - https://www.exploit-db.com/exploits/44893/ +CVE-2018-12263 - https://github.com/oyeahtime/test/issues/3 +CVE-2018-12264 - https://github.com/Exiv2/exiv2/issues/366 +CVE-2018-12264 - https://github.com/TeamSeri0us/pocs/blob/master/exiv2/2-out-of-read-Poc +CVE-2018-12265 - https://github.com/Exiv2/exiv2/issues/365 +CVE-2018-12265 - https://github.com/TeamSeri0us/pocs/blob/master/exiv2/1-out-of-read-Poc +CVE-2018-12266 - https://github.com/lzlzh2016/CVE/blob/master/XSS.md +CVE-2018-12271 - https://gist.github.com/tanprathan/6e8ed195a2e05b7f9d9a342dbdacb349 +CVE-2018-12292 - https://www.exploit-db.com/exploits/44900/ +CVE-2018-12293 - http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html +CVE-2018-12293 - https://www.exploit-db.com/exploits/45205/ +CVE-2018-12294 - http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html +CVE-2018-12305 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12306 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12307 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12308 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12309 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12310 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12311 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12312 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12313 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12314 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12315 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12316 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12317 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12318 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12319 - https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc +CVE-2018-12326 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES +CVE-2018-12326 - https://www.exploit-db.com/exploits/44904/ +CVE-2018-12327 - https://usn.ubuntu.com/4229-1/ +CVE-2018-12327 - https://www.exploit-db.com/exploits/44909/ +CVE-2018-1235 - https://www.exploit-db.com/exploits/44920/ +CVE-2018-12353 - https://medium.com/stolabs/security-issue-on-knowage-spagobi-ec539a68e55 +CVE-2018-12354 - https://medium.com/stolabs/security-issue-on-knowage-spagobi-ec539a68e55 +CVE-2018-12355 - https://medium.com/stolabs/security-issue-on-knowage-spagobi-ec539a68e55 +CVE-2018-12356 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-12357 - https://www.arista.com/en/support/advisories-notices +CVE-2018-12359 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12360 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12362 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12363 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12364 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12365 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12366 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12368 - https://bugzilla.mozilla.org/show_bug.cgi?id=1468217 +CVE-2018-12368 - https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 +CVE-2018-12370 - https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 +CVE-2018-12372 - https://bugzilla.mozilla.org/show_bug.cgi?id=1419417 +CVE-2018-12372 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12373 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12374 - https://bugzilla.mozilla.org/show_bug.cgi?id=1462910 +CVE-2018-12374 - https://usn.ubuntu.com/3714-1/ +CVE-2018-12384 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-12386 - https://bugzilla.mozilla.org/show_bug.cgi?id=1493900 +CVE-2018-12402 - https://bugzilla.mozilla.org/show_bug.cgi?id=1447087 +CVE-2018-12402 - https://bugzilla.mozilla.org/show_bug.cgi?id=1469916 +CVE-2018-12403 - https://bugzilla.mozilla.org/show_bug.cgi?id=1484753 +CVE-2018-12404 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12404 +CVE-2018-12404 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-12407 - https://bugzilla.mozilla.org/show_bug.cgi?id=1505973 +CVE-2018-12413 - https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-messaging-apache-kafka-distribution-schema-repository +CVE-2018-12426 - https://wpvulndb.com/vulnerabilities/9697 +CVE-2018-12447 - https://github.com/ebel34/bpg-web-encoder/issues/2 +CVE-2018-12453 - https://www.exploit-db.com/exploits/44908/ +CVE-2018-12454 - https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d +CVE-2018-1246 - https://seclists.org/fulldisclosure/2018/Sep/30 +CVE-2018-12463 - https://www.exploit-db.com/exploits/45027/ +CVE-2018-12464 - https://www.exploit-db.com/exploits/45083/ +CVE-2018-12465 - https://www.exploit-db.com/exploits/45083/ +CVE-2018-1247 - https://www.exploit-db.com/exploits/44634/ +CVE-2018-12481 - https://pastebin.com/sp5nMhvc +CVE-2018-12482 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ +CVE-2018-12483 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ +CVE-2018-12493 - https://github.com/sanluan/PublicCMS/issues/12 +CVE-2018-12494 - https://github.com/sanluan/PublicCMS/issues/12 +CVE-2018-1250 - https://seclists.org/fulldisclosure/2018/Sep/30 +CVE-2018-1251 - https://seclists.org/fulldisclosure/2018/Sep/30 +CVE-2018-12519 - https://cxsecurity.com/issue/WLB-2018060185 +CVE-2018-12519 - https://www.exploit-db.com/exploits/44978/ +CVE-2018-12520 - http://seclists.org/fulldisclosure/2018/Jul/14 +CVE-2018-12520 - https://gist.github.com/Psychotropos/3e8c047cada9b1fb716e6a014a428b7f +CVE-2018-12520 - https://www.exploit-db.com/exploits/44973/ +CVE-2018-12522 - https://pastebin.com/eA5tGKf0 +CVE-2018-12522 - https://www.exploit-db.com/exploits/44910/ +CVE-2018-12523 - https://pastebin.com/eA5tGKf0 +CVE-2018-12523 - https://www.exploit-db.com/exploits/44910/ +CVE-2018-12524 - https://pastebin.com/eA5tGKf0 +CVE-2018-12524 - https://www.exploit-db.com/exploits/44910/ +CVE-2018-12525 - https://pastebin.com/eA5tGKf0 +CVE-2018-12525 - https://www.exploit-db.com/exploits/44910/ +CVE-2018-12528 - https://www.exploit-db.com/exploits/44933/ +CVE-2018-12529 - https://www.exploit-db.com/exploits/44939/ +CVE-2018-12536 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-12536 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-12538 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-12538 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-12545 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-12545 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-12556 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-1257 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1257 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-1257 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1257 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-1257 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-12571 - http://packetstormsecurity.com/files/148389/Microsoft-Forefront-Unified-Access-Gateway-2010-External-DNS-Interaction.html +CVE-2018-12571 - http://seclists.org/fulldisclosure/2018/Jul/2 +CVE-2018-12571 - http://seclists.org/fulldisclosure/2018/Jul/7 +CVE-2018-12572 - http://packetstormsecurity.com/files/151590/Avast-Anti-Virus-Local-Credential-Disclosure.html +CVE-2018-12578 - https://github.com/pts/sam2p/issues/39 +CVE-2018-1258 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1258 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1258 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1258 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-1258 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-1258 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1258 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-1258 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-12582 - https://github.com/p8w/akcms/issues/1 +CVE-2018-12583 - https://github.com/p8w/akcms/issues/2 +CVE-2018-12584 - https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html +CVE-2018-12584 - https://www.exploit-db.com/exploits/45174/ +CVE-2018-12587 - https://metamorfosec.com/Files/Advisories/METS-2018-003-A_XSS_Vulnerability_in_German_Spelling_Dictionary_1.3.txt +CVE-2018-12588 - https://metamorfosec.com/Files/Advisories/METS-2018-002-A_XSS_Vulnerability_in_OMP_1.2.0_to_3.1.1-2.txt +CVE-2018-12589 - http://packetstormsecurity.com/files/148312/Polaris-Office-2017-8.1-Remote-Code-Execution.html +CVE-2018-12589 - https://www.exploit-db.com/exploits/44985/ +CVE-2018-1259 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2018-12596 - http://seclists.org/fulldisclosure/2018/Oct/15 +CVE-2018-12596 - https://medium.com/@alt3kx/ektron-content-management-system-cms-9-20-sp2-remote-re-enabling-users-cve-2018-12596-bdf1e3a05158 +CVE-2018-12596 - https://www.exploit-db.com/exploits/45577/ +CVE-2018-12599 - https://github.com/ImageMagick/ImageMagick/issues/1177 +CVE-2018-12600 - https://github.com/ImageMagick/ImageMagick/issues/1178 +CVE-2018-12601 - https://github.com/pts/sam2p/issues/41 +CVE-2018-12602 - http://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html +CVE-2018-12602 - https://www.exploit-db.com/exploits/44918/ +CVE-2018-12603 - https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html +CVE-2018-12603 - https://www.exploit-db.com/exploits/44919/ +CVE-2018-12604 - https://github.com/GreenCMS/GreenCMS/issues/110 +CVE-2018-12604 - https://www.exploit-db.com/exploits/44922/ +CVE-2018-12607 - https://gitlab.com/gitlab-org/gitlab-ce/issues/45903 +CVE-2018-12609 - http://seclists.org/fulldisclosure/2019/Jan/10 +CVE-2018-12610 - http://seclists.org/fulldisclosure/2019/Jan/10 +CVE-2018-12611 - http://seclists.org/fulldisclosure/2019/Jan/10 +CVE-2018-12613 - http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html +CVE-2018-12613 - https://www.exploit-db.com/exploits/44924/ +CVE-2018-12613 - https://www.exploit-db.com/exploits/44928/ +CVE-2018-12613 - https://www.exploit-db.com/exploits/45020/ +CVE-2018-12617 - https://gist.github.com/fakhrizulkifli/c7740d28efa07dafee66d4da5d857ef6 +CVE-2018-12617 - https://www.exploit-db.com/exploits/44925/ +CVE-2018-12621 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12622 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12623 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12624 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12625 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12626 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12627 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12628 - https://github.com/eventum/eventum/blob/master/CHANGELOG.md +CVE-2018-12630 - https://www.exploit-db.com/exploits/44911/ +CVE-2018-12631 - https://www.exploit-db.com/exploits/44905/ +CVE-2018-12632 - https://www.exploit-db.com/exploits/44905/ +CVE-2018-12634 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life +CVE-2018-12634 - https://www.exploit-db.com/exploits/45384/ +CVE-2018-12636 - https://www.exploit-db.com/exploits/44943/ +CVE-2018-12638 - http://packetstormsecurity.com/files/151018/Base-Soundtouch-18.1.4-Cross-Site-Scripting.html +CVE-2018-12648 - https://bugs.freedesktop.org/show_bug.cgi?id=106981 +CVE-2018-12650 - http://packetstormsecurity.com/files/155232/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html +CVE-2018-12651 - https://www.knowcybersec.com/2018/12/CVE-2018-12651-reflected-XSS.html +CVE-2018-12652 - https://www.knowcybersec.com/2019/02/CVE-2018-12652-reflected-XSS.html +CVE-2018-12653 - http://packetstormsecurity.com/files/155244/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html +CVE-2018-12653 - https://www.knowcybersec.com/2019/02/CVE-2018-12653-reflected-XSS.html +CVE-2018-12659 - https://github.com/slims/slims8_akasia/issues/103 +CVE-2018-12666 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12667 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12668 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12669 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12670 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12671 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12672 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12673 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12674 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12675 - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ +CVE-2018-12689 - https://www.exploit-db.com/exploits/44926/ +CVE-2018-12692 - https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc +CVE-2018-12692 - https://www.exploit-db.com/exploits/44912/ +CVE-2018-12693 - https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc +CVE-2018-12694 - https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc +CVE-2018-1270 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1270 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1270 - https://www.exploit-db.com/exploits/44796/ +CVE-2018-1270 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1270 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-1270 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-12705 - https://hackings8n.blogspot.com/2018/06/cve-2018-12705-digisol-wireless-router.html +CVE-2018-12705 - https://www.exploit-db.com/exploits/44935/ +CVE-2018-12706 - https://hackings8n.blogspot.com/2018/06/cve-2018-12706-digisol-dg-br4000ng.html +CVE-2018-12706 - https://www.exploit-db.com/exploits/44934/ +CVE-2018-1271 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1271 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1271 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1271 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-1271 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-12710 - https://www.exploit-db.com/exploits/45306/ +CVE-2018-12715 - https://www.exploit-db.com/exploits/44955 +CVE-2018-12716 - https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 +CVE-2018-1272 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1272 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1272 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1272 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-1272 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-1273 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2018-12739 - https://www.exploit-db.com/exploits/44952/ +CVE-2018-1274 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2018-1275 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1275 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-1275 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-1275 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-12812 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-12827 - https://www.exploit-db.com/exploits/45268/ +CVE-2018-1285 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-1285 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1285 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-1288 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-12882 - https://hackerone.com/reports/371135 +CVE-2018-12895 - http://packetstormsecurity.com/files/164633/WordPress-4.9.6-Arbitrary-File-Deletion.html +CVE-2018-12897 - http://packetstormsecurity.com/files/153668/DameWare-Remote-Support-12.0.0.509-Buffer-Overflow.html +CVE-2018-12897 - https://labs.nettitude.com/blog/solarwinds-cve-2018-12897-dameware-mini-remote-control-local-seh-buffer-overflow/ +CVE-2018-12900 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-12900 +CVE-2018-12900 - https://usn.ubuntu.com/3906-1/ +CVE-2018-12903 - http://code610.blogspot.com/2018/06/exploiting-cyberark-1021603.html +CVE-2018-12904 - https://www.exploit-db.com/exploits/44944/ +CVE-2018-12908 - https://cxsecurity.com/issue/WLB-2018060325 +CVE-2018-12908 - https://www.exploit-db.com/exploits/44977/ +CVE-2018-12910 - https://usn.ubuntu.com/3701-1/ +CVE-2018-12912 - https://github.com/Neeke/HongCMS/issues/4 +CVE-2018-12912 - https://www.exploit-db.com/exploits/44953/ +CVE-2018-12913 - https://github.com/richgel999/miniz/issues/90 +CVE-2018-12919 - https://github.com/lzlzh2016/CraftedWeb/blob/master/xss.md +CVE-2018-1292 - http://www.securityfocus.com/bid/104007 +CVE-2018-12971 - https://github.com/teameasy/EasyCMS/issues/3 +CVE-2018-12975 - https://medium.com/@jonghyk.song/create-legendary-champs-by-breaking-prng-of-cryptosaga-an-ethereum-rpg-game-cve-2018-12975-8de733ff8255 +CVE-2018-12977 - https://www.exploit-db.com/exploits/44981/ +CVE-2018-12979 - http://seclists.org/fulldisclosure/2018/Jul/38 +CVE-2018-12979 - https://cert.vde.com/en-us/advisories/vde-2018-010 +CVE-2018-12979 - https://www.exploit-db.com/exploits/45014/ +CVE-2018-12979 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ +CVE-2018-12980 - http://seclists.org/fulldisclosure/2018/Jul/38 +CVE-2018-12980 - https://cert.vde.com/en-us/advisories/vde-2018-010 +CVE-2018-12980 - https://www.exploit-db.com/exploits/45014/ +CVE-2018-12980 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ +CVE-2018-12981 - http://seclists.org/fulldisclosure/2018/Jul/38 +CVE-2018-12981 - https://cert.vde.com/en-us/advisories/vde-2018-010 +CVE-2018-12981 - https://www.exploit-db.com/exploits/45014/ +CVE-2018-12981 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ +CVE-2018-12982 - https://bugzilla.redhat.com/show_bug.cgi?id=1595689 +CVE-2018-12983 - https://bugzilla.redhat.com/show_bug.cgi?id=1595693 +CVE-2018-12984 - https://www.exploit-db.com/exploits/44954/ +CVE-2018-12990 - https://3xpl01tc0d3r.blogspot.com/2018/06/information-disclosure-internal-path.html +CVE-2018-12996 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html +CVE-2018-12996 - http://seclists.org/fulldisclosure/2018/Jul/71 +CVE-2018-12996 - https://github.com/unh3x/just4cve/issues/7 +CVE-2018-12997 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html +CVE-2018-12997 - http://seclists.org/fulldisclosure/2018/Jul/73 +CVE-2018-12997 - https://github.com/unh3x/just4cve/issues/8 +CVE-2018-12998 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html +CVE-2018-12998 - http://seclists.org/fulldisclosure/2018/Jul/75 +CVE-2018-12998 - https://github.com/unh3x/just4cve/issues/10 +CVE-2018-12999 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html +CVE-2018-12999 - http://seclists.org/fulldisclosure/2018/Jul/74 +CVE-2018-12999 - https://github.com/unh3x/just4cve/issues/9 +CVE-2018-13000 - https://www.vulnerability-lab.com/get_content.php?id=2123 +CVE-2018-13001 - https://www.vulnerability-lab.com/get_content.php?id=2122 +CVE-2018-13002 - https://www.vulnerability-lab.com/get_content.php?id=2121 +CVE-2018-13007 - https://github.com/gopro/gpmf-parser/issues/29 +CVE-2018-13008 - https://github.com/gopro/gpmf-parser/issues/29 +CVE-2018-13009 - https://github.com/gopro/gpmf-parser/issues/29 +CVE-2018-13010 - https://github.com/wstmall/wstmall/issues/4 +CVE-2018-13011 - https://github.com/gopro/gpmf-parser/issues/31 +CVE-2018-13022 - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 +CVE-2018-13023 - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 +CVE-2018-13025 - https://github.com/zhaoheng521/yxcms/blob/master/Any%20file%20deletion +CVE-2018-13026 - https://github.com/gopro/gpmf-parser/issues/32 +CVE-2018-13031 - https://github.com/AutismJH/damicms/issues/6 +CVE-2018-13031 - https://www.exploit-db.com/exploits/44960/ +CVE-2018-13032 - https://www.exploit-db.com/exploits/44938/ +CVE-2018-13033 - https://sourceware.org/bugzilla/show_bug.cgi?id=23361 +CVE-2018-1304 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1304 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1304 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-13042 - https://www.exploit-db.com/exploits/46165/ +CVE-2018-13042 - https://www.valbrux.it/blog/2019/01/22/cve-2018-13042-1password-android-7-0-denial-of-service/ +CVE-2018-13045 - http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html +CVE-2018-13045 - https://www.exploit-db.com/exploits/46015/ +CVE-2018-13049 - https://github.com/glpi-project/glpi/issues/4270 +CVE-2018-1305 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-1305 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-1305 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-13050 - https://github.com/x-f1v3/ForCve/issues/1 +CVE-2018-13052 - https://www.youtube.com/watch?v=xYRbXBPubaw +CVE-2018-13053 - https://usn.ubuntu.com/3821-1/ +CVE-2018-13053 - https://usn.ubuntu.com/3821-2/ +CVE-2018-13053 - https://usn.ubuntu.com/4118-1/ +CVE-2018-1306 - https://www.exploit-db.com/exploits/45396/ +CVE-2018-13060 - https://sysdream.com/news/lab/ +CVE-2018-13060 - https://sysdream.com/news/lab/2019-10-25-cve-2018-13060-easy-appointments-captcha-bypass/ +CVE-2018-13063 - https://sysdream.com/news/lab/ +CVE-2018-13063 - https://sysdream.com/news/lab/2019-10-25-cve-2018-13063-easy-appointments-multiple-confidential-information-leakage/ +CVE-2018-13065 - https://github.com/SpiderLabs/ModSecurity/issues/1829 +CVE-2018-13065 - https://hackings8n.blogspot.com/2018/07/cve-2018-13065-modsecurity-300-has-xss.html +CVE-2018-13065 - https://www.exploit-db.com/exploits/44970/ +CVE-2018-13066 - https://github.com/libming/libming/issues/146 +CVE-2018-13067 - https://whitehatck01.blogspot.com/2018/06/opencart-v3-0-3-0-user-changes-password.html +CVE-2018-13093 - https://bugzilla.kernel.org/show_bug.cgi?id=199367 +CVE-2018-13093 - https://usn.ubuntu.com/4118-1/ +CVE-2018-13094 - https://bugzilla.kernel.org/show_bug.cgi?id=199969 +CVE-2018-13094 - https://usn.ubuntu.com/3753-1/ +CVE-2018-13094 - https://usn.ubuntu.com/3753-2/ +CVE-2018-13095 - https://bugzilla.kernel.org/show_bug.cgi?id=199915 +CVE-2018-13096 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-13096 - https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 +CVE-2018-13096 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3 +CVE-2018-13096 - https://usn.ubuntu.com/3821-1/ +CVE-2018-13096 - https://usn.ubuntu.com/3821-2/ +CVE-2018-13096 - https://usn.ubuntu.com/4118-1/ +CVE-2018-13097 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-13097 - https://usn.ubuntu.com/3932-1/ +CVE-2018-13097 - https://usn.ubuntu.com/4118-1/ +CVE-2018-13098 - https://bugzilla.kernel.org/show_bug.cgi?id=200173 +CVE-2018-13098 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2 +CVE-2018-13098 - https://usn.ubuntu.com/4118-1/ +CVE-2018-13099 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-13099 - https://bugzilla.kernel.org/show_bug.cgi?id=200179 +CVE-2018-13099 - https://usn.ubuntu.com/3932-1/ +CVE-2018-13099 - https://usn.ubuntu.com/4118-1/ +CVE-2018-13100 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-13100 - https://usn.ubuntu.com/3932-1/ +CVE-2018-13100 - https://usn.ubuntu.com/4118-1/ +CVE-2018-13103 - http://packetstormsecurity.com/files/151243/Open-Xchange-OX-App-Suite-Cross-Site-Scripting-SSRF.html +CVE-2018-13103 - http://seclists.org/fulldisclosure/2019/Jan/46 +CVE-2018-13104 - http://packetstormsecurity.com/files/151243/Open-Xchange-OX-App-Suite-Cross-Site-Scripting-SSRF.html +CVE-2018-13104 - http://seclists.org/fulldisclosure/2019/Jan/46 +CVE-2018-13106 - https://github.com/ClipperCMS/ClipperCMS/issues/489 +CVE-2018-13108 - http://packetstormsecurity.com/files/148424/ADB-Local-Root-Jailbreak.html +CVE-2018-13108 - http://seclists.org/fulldisclosure/2018/Jul/17 +CVE-2018-13108 - https://www.exploit-db.com/exploits/44983/ +CVE-2018-13108 - https://www.sec-consult.com/en/blog/advisories/local-root-jailbreak-via-network-file-sharing-flaw-in-all-adb-broadband-gateways-routers/ +CVE-2018-13109 - http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html +CVE-2018-13109 - http://seclists.org/fulldisclosure/2018/Jul/18 +CVE-2018-13109 - https://www.exploit-db.com/exploits/44982/ +CVE-2018-13109 - https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/ +CVE-2018-1311 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2018-13110 - http://packetstormsecurity.com/files/148430/ADB-Group-Manipulation-Privilege-Escalation.html +CVE-2018-13110 - http://seclists.org/fulldisclosure/2018/Jul/19 +CVE-2018-13110 - https://www.exploit-db.com/exploits/44984/ +CVE-2018-13110 - https://www.sec-consult.com/en/blog/advisories/privilege-escalation-via-linux-group-manipulation-in-all-adb-broadband-gateways-routers/ +CVE-2018-13111 - https://hackinganarchy.wordpress.com/2018/09/20/cve-2018-13111/ +CVE-2018-13112 - https://github.com/appneta/tcpreplay/issues/477 +CVE-2018-13126 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-13127 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-13128 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-13129 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-1313 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-13130 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-13131 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-13132 - https://github.com/dwfault/AirTokens/blob/master/SPXToken/mint%20interger%20overflow.md +CVE-2018-13134 - https://www.exploit-db.com/exploits/45970/ +CVE-2018-13134 - https://www.xc0re.net/2018/05/25/tp-link-wireless-router-archer-c1200-cross-site-scripting/ +CVE-2018-13136 - https://wpvulndb.com/vulnerabilities/9708 +CVE-2018-13137 - https://ansawaf.blogspot.com/2019/04/cve-2018-13137-xss-in-events-manager.html +CVE-2018-13137 - https://gist.github.com/ansarisec/12737c207c0851d52865ed60c08891b7 +CVE-2018-13139 - https://github.com/erikd/libsndfile/issues/397 +CVE-2018-13139 - https://usn.ubuntu.com/4013-1/ +CVE-2018-13140 - http://packetstormsecurity.com/files/149468/Antidote-9.5.1-Code-Execution.html +CVE-2018-13140 - http://seclists.org/fulldisclosure/2018/Sep/38 +CVE-2018-13140 - https://sysdream.com/news/lab/2018-09-21-cve-2018-13140-antidote-remote-code-execution-against-the-update-component/ +CVE-2018-13160 - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/etktokens +CVE-2018-1320 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1320 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-1321 - https://www.exploit-db.com/exploits/45400/ +CVE-2018-1322 - https://www.exploit-db.com/exploits/45400/ +CVE-2018-1324 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2018-13250 - https://github.com/libming/libming/issues/147 +CVE-2018-13251 - https://github.com/libming/libming/issues/149 +CVE-2018-13256 - https://gkaim.com/cve-2018-13256-vikas-chaudhary/ +CVE-2018-13256 - https://www.exploit-db.com/exploits/45125/ +CVE-2018-13257 - https://github.com/gluxon/CVE-2018-13257 +CVE-2018-1327 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-13306 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13307 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13308 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13309 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13310 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13311 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13312 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13313 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13313 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ +CVE-2018-13314 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13315 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13316 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13317 - https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 +CVE-2018-13318 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13319 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13320 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13321 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13322 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13323 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13324 - https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d +CVE-2018-13329 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13330 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13331 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13332 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13333 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13334 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13335 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13336 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13337 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13338 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13339 - https://github.com/TylerGarlick/angular-redactor/issues/77 +CVE-2018-13340 - https://github.com/gleez/cms/issues/795 +CVE-2018-13349 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-1335 - http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html +CVE-2018-1335 - https://www.exploit-db.com/exploits/46540/ +CVE-2018-13350 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13351 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13352 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13353 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13354 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13355 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13356 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13357 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13358 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13359 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-1336 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-13360 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13361 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13365 - https://fortiguard.com/advisory/FG-IR-18-085 +CVE-2018-13368 - https://fortiguard.com/advisory/FG-IR-18-108 +CVE-2018-13374 - https://fortiguard.com/advisory/FG-IR-18-157 +CVE-2018-13378 - https://fortiguard.com/advisory/FG-IR-18-382 +CVE-2018-13379 - https://fortiguard.com/advisory/FG-IR-18-384 +CVE-2018-13380 - https://fortiguard.com/advisory/FG-IR-18-383 +CVE-2018-13380 - https://fortiguard.com/advisory/FG-IR-20-230 +CVE-2018-13383 - https://fortiguard.com/advisory/FG-IR-18-388 +CVE-2018-13384 - https://fortiguard.com/advisory/FG-IR-19-002 +CVE-2018-13400 - http://www.securityfocus.com/bid/105751 +CVE-2018-13401 - http://www.securityfocus.com/bid/105751 +CVE-2018-13402 - http://www.securityfocus.com/bid/105751 +CVE-2018-13405 - https://usn.ubuntu.com/3753-1/ +CVE-2018-13405 - https://usn.ubuntu.com/3753-2/ +CVE-2018-13405 - https://www.exploit-db.com/exploits/45033/ +CVE-2018-13406 - https://usn.ubuntu.com/3753-1/ +CVE-2018-13406 - https://usn.ubuntu.com/3753-2/ +CVE-2018-13410 - http://seclists.org/fulldisclosure/2018/Jul/24 +CVE-2018-13415 - http://seclists.org/fulldisclosure/2018/Aug/1 +CVE-2018-13415 - https://www.exploit-db.com/exploits/45146/ +CVE-2018-13416 - http://seclists.org/fulldisclosure/2018/Jul/94 +CVE-2018-13416 - https://www.exploit-db.com/exploits/45133/ +CVE-2018-13417 - http://seclists.org/fulldisclosure/2018/Aug/2 +CVE-2018-13417 - https://www.exploit-db.com/exploits/45145/ +CVE-2018-13418 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a +CVE-2018-13419 - https://github.com/erikd/libsndfile/issues/398 +CVE-2018-13434 - https://gist.github.com/tanprathan/f5133651e438b2ad1b39172d52b56115 +CVE-2018-13435 - https://gist.github.com/tanprathan/19165c43ade898ab8b664098fb171f49 +CVE-2018-13439 - https://packetstormsecurity.com/files/148390/WeChat-Pay-SDK-XXE-Injection.html +CVE-2018-13440 - https://github.com/mpruett/audiofile/issues/49 +CVE-2018-13441 - https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8 +CVE-2018-13441 - https://www.exploit-db.com/exploits/45082/ +CVE-2018-13442 - https://labs.nettitude.com/blog/cve-2018-13442-solarwinds-npm-sql-injection/ +CVE-2018-13444 - https://github.com/MichaelWayneLIU/seacms/blob/master/seacms1.md +CVE-2018-13445 - https://github.com/MichaelWayneLIU/seacms/blob/master/seacms1.md +CVE-2018-13457 - https://gist.github.com/fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab +CVE-2018-13457 - https://www.exploit-db.com/exploits/45082/ +CVE-2018-13458 - https://gist.github.com/fakhrizulkifli/40f3daf52950cca6de28ebec2498ff6e +CVE-2018-13458 - https://www.exploit-db.com/exploits/45082/ +CVE-2018-13464 - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/t_swap +CVE-2018-1351 - https://fortiguard.com/advisory/FG-IR-18-006 +CVE-2018-1354 - https://fortiguard.com/advisory/FG-IR-18-014 +CVE-2018-1355 - https://fortiguard.com/advisory/FG-IR-18-022 +CVE-2018-13727 - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Eastcoin +CVE-2018-13784 - https://www.exploit-db.com/exploits/45046/ +CVE-2018-13784 - https://www.exploit-db.com/exploits/45047/ +CVE-2018-13785 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-13787 - https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/ +CVE-2018-13800 - https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf +CVE-2018-13818 - https://www.exploit-db.com/exploits/44102/ +CVE-2018-13832 - https://hackpuntes.com/cve-2018-13832-wordpress-plugin-all-in-one-favicon-4-6-autenticado-multiples-cross-site-scripting-persistentes/ +CVE-2018-13832 - https://www.exploit-db.com/exploits/45056/ +CVE-2018-13849 - https://cxsecurity.com/issue/WLB-2018070095 +CVE-2018-13849 - https://www.exploit-db.com/exploits/45003/ +CVE-2018-13850 - https://cxsecurity.com/issue/WLB-2018070096 +CVE-2018-13859 - https://www.exploit-db.com/exploits/45088/ +CVE-2018-13862 - https://www.exploit-db.com/exploits/45063/ +CVE-2018-13863 - https://snyk.io/vuln/npm:bson:20180225 +CVE-2018-13866 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13867 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13868 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13869 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13870 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13871 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13872 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13873 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13874 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13875 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13876 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 +CVE-2018-13877 - https://medium.com/coinmonks/denial-of-service-dos-attack-on-megacryptopolis-an-ethereum-game-cve-2018-13877-cdd7f7ef8b08 +CVE-2018-13885 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13885 +CVE-2018-13886 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13886 +CVE-2018-13887 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13887 +CVE-2018-13888 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13895 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13895 +CVE-2018-13896 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13898 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13901 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13902 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13903 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2018-13904 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13906 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13907 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13908 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13909 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-1391 - http://www.ibm.com/support/docview.wss?uid=swg22013247 +CVE-2018-13910 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13911 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13916 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2018-13918 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13924 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13925 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13925 +CVE-2018-13927 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-13980 - http://packetstormsecurity.com/files/148537/Zeta-Producer-Desktop-CMS-14.2.0-Code-Execution-File-Disclosure.html +CVE-2018-13980 - https://www.exploit-db.com/exploits/45016/ +CVE-2018-13981 - http://packetstormsecurity.com/files/148537/Zeta-Producer-Desktop-CMS-14.2.0-Code-Execution-File-Disclosure.html +CVE-2018-13981 - https://www.exploit-db.com/exploits/45016/ +CVE-2018-13982 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal +CVE-2018-13983 - http://packetstormsecurity.com/files/150990/ImpressCMS-1.3.10-Cross-Site-Scripting.html +CVE-2018-13988 - http://packetstormsecurity.com/files/148661/PDFunite-0.62.0-Buffer-Overflow.html +CVE-2018-13989 - https://packetstormsecurity.com/files/148453/Grundig-Smart-Inter-ctive-3.0-Insecure-Direct-Object-Reference.html +CVE-2018-13989 - https://www.exploit-db.com/exploits/45022/ +CVE-2018-14008 - https://www.arista.com/en/support/advisories-notices +CVE-2018-14009 - http://packetstormsecurity.com/files/161944/Codiad-2.8.4-Remote-Code-Execution.html +CVE-2018-14010 - https://github.com/cc-crack/router/blob/master/CNVD-2018-04521.py +CVE-2018-14012 - https://www.exploit-db.com/exploits/44997/ +CVE-2018-14013 - http://packetstormsecurity.com/files/151472/Zimbra-Collaboration-Cross-Site-Scripting.html +CVE-2018-14013 - http://seclists.org/fulldisclosure/2019/Feb/3 +CVE-2018-14013 - http://www.openwall.com/lists/oss-security/2019/01/30/1 +CVE-2018-14014 - https://github.com/caokang/waimai/issues/2 +CVE-2018-14015 - https://github.com/radare/radare2/issues/10465 +CVE-2018-14016 - https://github.com/radare/radare2/issues/10464 +CVE-2018-14017 - https://github.com/radare/radare2/issues/10498 +CVE-2018-14020 - https://oxidforge.org/en/security-bulletin-2018-003.html +CVE-2018-14023 - http://n0sign4l.blogspot.com/2018/08/advisory-id-n0sign4l-002-risk-level-4-5.html?m=1 +CVE-2018-14023 - https://www.youtube.com/watch?v=oSJscEei5SE&app=desktop +CVE-2018-14029 - https://github.com/Creatiwity/wityCMS/issues/153 +CVE-2018-14029 - https://www.exploit-db.com/exploits/45127/ +CVE-2018-14037 - http://seclists.org/fulldisclosure/2018/Sep/49 +CVE-2018-14037 - http://seclists.org/fulldisclosure/2018/Sep/50 +CVE-2018-14037 - https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ +CVE-2018-14040 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html +CVE-2018-14040 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html +CVE-2018-14040 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2018-14040 - https://seclists.org/bugtraq/2019/May/18 +CVE-2018-14040 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-14041 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html +CVE-2018-14041 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html +CVE-2018-14041 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2018-14041 - https://seclists.org/bugtraq/2019/May/18 +CVE-2018-14041 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-14042 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html +CVE-2018-14042 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2018-14042 - https://seclists.org/bugtraq/2019/May/18 +CVE-2018-14042 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-14044 - https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/readme.md +CVE-2018-14045 - https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/readme.md +CVE-2018-14046 - https://github.com/Exiv2/exiv2/issues/378 +CVE-2018-14048 - http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html +CVE-2018-14048 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-14054 - http://www.openwall.com/lists/oss-security/2018/07/13/1 +CVE-2018-14057 - http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html +CVE-2018-14057 - http://seclists.org/fulldisclosure/2018/Aug/13 +CVE-2018-14057 - https://www.exploit-db.com/exploits/45208/ +CVE-2018-14057 - https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ +CVE-2018-14058 - http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html +CVE-2018-14058 - http://seclists.org/fulldisclosure/2018/Aug/13 +CVE-2018-14058 - https://www.exploit-db.com/exploits/45208/ +CVE-2018-14058 - https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ +CVE-2018-14059 - http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html +CVE-2018-14059 - http://seclists.org/fulldisclosure/2018/Aug/13 +CVE-2018-14059 - https://www.exploit-db.com/exploits/45208/ +CVE-2018-14059 - https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/ +CVE-2018-14060 - https://github.com/cc-crack/router/blob/master/CNVD-2018-04520.py +CVE-2018-14064 - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac +CVE-2018-14064 - https://www.exploit-db.com/exploits/45030/ +CVE-2018-14068 - https://github.com/martinzhou2015/SRCMS/issues/20 +CVE-2018-14069 - https://github.com/martinzhou2015/SRCMS/issues/20 +CVE-2018-14082 - https://gkaim.com/cve-2018-14082-vikas-chaudhary/ +CVE-2018-14082 - https://www.exploit-db.com/exploits/45141/ +CVE-2018-1418 - https://www.exploit-db.com/exploits/45005/ +CVE-2018-1429 - http://www.securityfocus.com/bid/103491 +CVE-2018-14325 - http://www.openwall.com/lists/oss-security/2018/07/16/1 +CVE-2018-14326 - http://www.openwall.com/lists/oss-security/2018/07/16/1 +CVE-2018-14327 - http://packetstormsecurity.com/files/149492/EE-4GEE-Mini-Local-Privilege-Escalation.html +CVE-2018-14327 - https://www.exploit-db.com/exploits/45501/ +CVE-2018-14328 - https://cxsecurity.com/issue/WLB-2018070175 +CVE-2018-14328 - https://www.exploit-db.com/exploits/45094/ +CVE-2018-14333 - https://github.com/vah13/extractTVpasswords +CVE-2018-14335 - https://www.exploit-db.com/exploits/45105/ +CVE-2018-14336 - https://www.exploit-db.com/exploits/45064/ +CVE-2018-14364 - https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 +CVE-2018-14366 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 +CVE-2018-14379 - http://www.openwall.com/lists/oss-security/2018/07/17/1 +CVE-2018-14382 - https://github.com/instantsoft/icms2/issues/892 +CVE-2018-14384 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-005 +CVE-2018-14387 - https://github.com/robiso/wondercms/issues/64 +CVE-2018-14388 - https://github.com/joyplus/joyplus-cms/issues/429 +CVE-2018-14392 - https://www.exploit-db.com/exploits/45057/ +CVE-2018-14401 - https://github.com/jjanier/axml/issues/1 +CVE-2018-14402 - https://github.com/ytsutano/axmldec/issues/4 +CVE-2018-14403 - http://www.openwall.com/lists/oss-security/2018/07/18/3 +CVE-2018-14417 - http://seclists.org/fulldisclosure/2018/Jul/85 +CVE-2018-14417 - https://docs.softnas.com/display/SD/Release+Notes +CVE-2018-14417 - https://www.coresecurity.com/advisories/softnas-cloud-os-command-injection +CVE-2018-14417 - https://www.exploit-db.com/exploits/45097/ +CVE-2018-14418 - https://www.exploit-db.com/exploits/45062/ +CVE-2018-14420 - https://github.com/AvaterXXX/Metinfo---XSS/blob/master/CSRF +CVE-2018-14424 - https://usn.ubuntu.com/3737-1/ +CVE-2018-14429 - http://packetstormsecurity.com/files/148855/man-cgi-Local-File-Inclusion.html +CVE-2018-14430 - https://hackpuntes.com/cve-2018-14430-wordpress-plugin-multi-step-form-125-multiples-xss-reflejados/ +CVE-2018-14430 - https://wpvulndb.com/vulnerabilities/9106 +CVE-2018-14443 - https://github.com/ArchimedesCAD/libredwg/issues/6 +CVE-2018-14445 - https://github.com/axiomatic-systems/Bento4/issues/289 +CVE-2018-14446 - https://github.com/TechSmith/mp4v2/issues/20 +CVE-2018-14447 - https://github.com/martinh/libconfuse/issues/109 +CVE-2018-14448 - https://github.com/ponchio/untrunc/issues/131 +CVE-2018-14471 - https://github.com/LibreDWG/libredwg/issues/32 +CVE-2018-14472 - https://github.com/wuzhicms/wuzhicms/issues/144 +CVE-2018-14473 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ +CVE-2018-14476 - http://packetstormsecurity.com/files/151006/GeniXCMS-1.1.5-Cross-Site-Scripting.html +CVE-2018-14478 - http://packetstormsecurity.com/files/151306/Coppermine-1.5.46-Cross-Site-Scripting.html +CVE-2018-14481 - http://packetstormsecurity.com/files/150643/OSclass-3.7.4-Cross-Site-Scripting.html +CVE-2018-14485 - http://packetstormsecurity.com/files/151063/BlogEngine-3.3-XML-External-Entity-Injection.html +CVE-2018-14485 - https://www.exploit-db.com/exploits/46106/ +CVE-2018-14486 - http://packetstormsecurity.com/files/151304/DNN-9.1-XML-Related-Cross-Site-Scripting.html +CVE-2018-14486 - http://www.dnnsoftware.com/community/security/security-center +CVE-2018-1449 - http://www.ibm.com/support/docview.wss?uid=swg22016181 +CVE-2018-14492 - https://github.com/ZIllR0/Routers/blob/master/Tendaoob1.md +CVE-2018-14493 - https://docs.google.com/document/d/1K3G6a8P_LhYdk5Ddn57Z2aDUpaGAS7I_F8lESVfSFfY/edit +CVE-2018-14493 - https://www.exploit-db.com/exploits/45160/ +CVE-2018-14497 - https://www.exploit-db.com/exploits/45336/ +CVE-2018-14498 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258 +CVE-2018-14498 - https://github.com/mozilla/mozjpeg/issues/299 +CVE-2018-1450 - http://www.ibm.com/support/docview.wss?uid=swg22016181 +CVE-2018-14502 - https://wpvulndb.com/vulnerabilities/9112 +CVE-2018-14505 - https://github.com/mitmproxy/mitmproxy/issues/3234 +CVE-2018-1451 - http://www.ibm.com/support/docview.wss?uid=swg22016181 +CVE-2018-14512 - https://github.com/wuzhicms/wuzhicms/issues/143 +CVE-2018-14513 - https://github.com/wuzhicms/wuzhicms/issues/145 +CVE-2018-14515 - https://github.com/wuzhicms/wuzhicms/issues/146 +CVE-2018-14517 - https://github.com/SecWiki/CMS-Hunter/blob/master/seacms/seacms6.61/seacms661.md +CVE-2018-14519 - https://www.exploit-db.com/exploits/45090 +CVE-2018-1452 - http://www.ibm.com/support/docview.wss?uid=swg22016181 +CVE-2018-14520 - https://www.exploit-db.com/exploits/45068 +CVE-2018-14524 - https://github.com/LibreDWG/libredwg/issues/33 +CVE-2018-14533 - https://neonsea.uk/blog/2018/07/21/tmp-to-rce.html +CVE-2018-14533 - https://www.exploit-db.com/exploits/45089/ +CVE-2018-14541 - https://gkaim.com/cve-2018-14541-vikas-chaudhary/ +CVE-2018-14541 - https://www.exploit-db.com/exploits/45140/ +CVE-2018-14543 - https://github.com/axiomatic-systems/Bento4/issues/292 +CVE-2018-14544 - https://github.com/axiomatic-systems/Bento4/issues/291 +CVE-2018-14545 - https://github.com/axiomatic-systems/Bento4/issues/291 +CVE-2018-14550 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-14550 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-14551 - https://github.com/ImageMagick/ImageMagick/issues/1221 +CVE-2018-14557 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-03/Tenda.md +CVE-2018-14558 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-01/Tenda.md +CVE-2018-14559 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md +CVE-2018-14568 - https://github.com/kirillwow/ids_bypass +CVE-2018-14568 - https://redmine.openinfosecfoundation.org/issues/2501 +CVE-2018-14570 - https://github.com/GitHaaH/issue/blob/master/Niushop.md +CVE-2018-14572 - https://github.com/PyconUK/ConferenceScheduler-cli/issues/19 +CVE-2018-14572 - https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/ +CVE-2018-14575 - http://packetstormsecurity.com/files/151704/MyBB-Trash-Bin-1.1.3-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2018-14575 - https://www.exploit-db.com/exploits/46384/ +CVE-2018-14582 - https://github.com/bagesoft/bagecms/issues/2 +CVE-2018-14584 - https://github.com/axiomatic-systems/Bento4/issues/298 +CVE-2018-14592 - https://www.exploit-db.com/exploits/45447/ +CVE-2018-14605 - https://gitlab.com/gitlab-org/gitlab-ce/issues/47793 +CVE-2018-14606 - https://gitlab.com/gitlab-org/gitlab-ce/issues/48617 +CVE-2018-14609 - https://usn.ubuntu.com/3821-1/ +CVE-2018-14609 - https://usn.ubuntu.com/3821-2/ +CVE-2018-14609 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14610 - https://bugzilla.kernel.org/show_bug.cgi?id=199837 +CVE-2018-14610 - https://usn.ubuntu.com/3932-1/ +CVE-2018-14610 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14611 - https://usn.ubuntu.com/3932-1/ +CVE-2018-14611 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14612 - https://usn.ubuntu.com/3932-1/ +CVE-2018-14612 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14613 - https://bugzilla.kernel.org/show_bug.cgi?id=199849 +CVE-2018-14613 - https://usn.ubuntu.com/3932-1/ +CVE-2018-14613 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14613 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-14614 - https://usn.ubuntu.com/3932-1/ +CVE-2018-14614 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14615 - https://bugzilla.kernel.org/show_bug.cgi?id=200421 +CVE-2018-14615 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14616 - https://bugzilla.kernel.org/show_bug.cgi?id=200465 +CVE-2018-14616 - https://usn.ubuntu.com/3932-1/ +CVE-2018-14616 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14617 - https://bugzilla.kernel.org/show_bug.cgi?id=200297 +CVE-2018-14617 - https://usn.ubuntu.com/3821-1/ +CVE-2018-14617 - https://usn.ubuntu.com/3821-2/ +CVE-2018-14617 - https://usn.ubuntu.com/4118-1/ +CVE-2018-14629 - https://usn.ubuntu.com/3827-2/ +CVE-2018-14630 - https://seclists.org/fulldisclosure/2018/Sep/28 +CVE-2018-14630 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-unserialize-moodle-open-source-learning-platform-cve-2018-14630/ +CVE-2018-14633 - https://usn.ubuntu.com/3777-1/ +CVE-2018-14633 - https://usn.ubuntu.com/3777-3/ +CVE-2018-14634 - http://www.openwall.com/lists/oss-security/2021/07/20/2 +CVE-2018-14634 - https://www.exploit-db.com/exploits/45516/ +CVE-2018-14634 - https://www.openwall.com/lists/oss-security/2018/09/25/4 +CVE-2018-14665 - http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html +CVE-2018-14665 - http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html +CVE-2018-14665 - https://www.exploit-db.com/exploits/45697/ +CVE-2018-14665 - https://www.exploit-db.com/exploits/45742/ +CVE-2018-14665 - https://www.exploit-db.com/exploits/45832/ +CVE-2018-14665 - https://www.exploit-db.com/exploits/45908/ +CVE-2018-14665 - https://www.exploit-db.com/exploits/45922/ +CVE-2018-14665 - https://www.exploit-db.com/exploits/45938/ +CVE-2018-14665 - https://www.exploit-db.com/exploits/46142/ +CVE-2018-14667 - http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html +CVE-2018-14685 - https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 +CVE-2018-14686 - https://github.com/TonyKentClark/MyCodeAudit/blob/master/xycms%20%20v1.7 +CVE-2018-14688 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ +CVE-2018-14689 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ +CVE-2018-14690 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ +CVE-2018-14691 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ +CVE-2018-14695 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14696 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14697 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14698 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14699 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14700 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14701 - http://packetstormsecurity.com/files/156710/Drobo-5N2-4.1.1-Remote-Command-Injection.html +CVE-2018-14701 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14702 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14703 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14704 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14705 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14705 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ +CVE-2018-14706 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14707 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14708 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14709 - http://packetstormsecurity.com/files/156710/Drobo-5N2-4.1.1-Remote-Command-Injection.html +CVE-2018-14709 - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc +CVE-2018-14710 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 +CVE-2018-14711 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 +CVE-2018-14712 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 +CVE-2018-14713 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 +CVE-2018-14714 - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 +CVE-2018-14715 - https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-cryptogs-an-ethereum-cve-2018-14715-f63a51ac2eb9 +CVE-2018-14716 - http://ha.cker.info/exploitation-of-server-side-template-injection-with-craft-cms-plguin-seomatic/ +CVE-2018-14716 - https://www.exploit-db.com/exploits/45108/ +CVE-2018-14718 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-14718 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-14718 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-14718 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-14718 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-14719 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-14719 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-14719 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-14720 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-14720 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-14720 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-14721 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-14721 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-14721 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-14722 - https://bugzilla.suse.com/show_bug.cgi?id=1102721 +CVE-2018-14724 - https://www.exploit-db.com/exploits/46347 +CVE-2018-14728 - http://packetstormsecurity.com/files/148742/Responsive-Filemanager-9.13.1-Server-Side-Request-Forgery.html +CVE-2018-14728 - https://www.exploit-db.com/exploits/45103/ +CVE-2018-14731 - https://github.com/parcel-bundler/parcel/pull/1794 +CVE-2018-14745 - https://pastebin.com/tmFrECnZ +CVE-2018-14745 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-14773 - https://www.drupal.org/SA-CORE-2018-005 +CVE-2018-14777 - https://cxsecurity.com/issue/WLB-2018080003 +CVE-2018-14804 - http://www.securityfocus.com/bid/105406 +CVE-2018-14808 - http://www.securityfocus.com/bid/105406 +CVE-2018-14836 - https://github.com/intelliants/subrion/issues/762 +CVE-2018-14838 - https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1 +CVE-2018-14839 - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 +CVE-2018-14840 - https://www.exploit-db.com/exploits/45150/ +CVE-2018-14846 - https://ansawaf.blogspot.com/2018/10/cve-2018-14846-multiple-stored-xss-in.html +CVE-2018-14846 - https://cwatch.comodo.com/blog/website-security/vulnerability-found-in-multiple-stored-xss-form-in-wordpress-version-1-2-5/ +CVE-2018-14846 - https://wpvulndb.com/vulnerabilities/9186 +CVE-2018-14847 - https://github.com/BasuCert/WinboxPoC +CVE-2018-14847 - https://github.com/BigNerd95/WinboxExploit +CVE-2018-14847 - https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf +CVE-2018-14847 - https://github.com/tenable/routeros/tree/master/poc/bytheway +CVE-2018-14847 - https://github.com/tenable/routeros/tree/master/poc/cve_2018_14847 +CVE-2018-14847 - https://www.exploit-db.com/exploits/45578/ +CVE-2018-14851 - https://bugs.php.net/bug.php?id=76557 +CVE-2018-14851 - https://hackerone.com/reports/384214 +CVE-2018-14867 - https://github.com/odoo/odoo/commits/master +CVE-2018-14868 - https://github.com/odoo/odoo/commits/master +CVE-2018-14869 - https://www.exploit-db.com/exploits/45143/ +CVE-2018-14874 - https://neetech18.blogspot.com/2019/03/error-based-sql-injection-vulnerability.html +CVE-2018-14875 - https://neetech18.blogspot.com/2019/03/reflected-xss-vulnerability-in-polaris.html +CVE-2018-14883 - https://hackerone.com/reports/384477 +CVE-2018-14884 - https://bugs.php.net/bug.php?id=75535 +CVE-2018-14885 - https://github.com/odoo/odoo/commits/master +CVE-2018-14886 - https://github.com/odoo/odoo/commits/master +CVE-2018-14887 - https://github.com/odoo/odoo/commits/master +CVE-2018-14888 - http://packetstormsecurity.com/files/148871/MyBB-Thank-You-Like-3.0.0-Cross-Site-Scripting.html +CVE-2018-14888 - https://www.exploit-db.com/exploits/45178/ +CVE-2018-14892 - https://blog.securityevaluators.com/ise-labs-finds-vulnerabilities-in-zyxel-nsa325-945481a699b8 +CVE-2018-14893 - https://blog.securityevaluators.com/ise-labs-finds-vulnerabilities-in-zyxel-nsa325-945481a699b8 +CVE-2018-14894 - http://packetstormsecurity.com/files/152489/CyberArk-EPM-10.2.1.603-Security-Restrictions-Bypass.html +CVE-2018-14894 - https://mustafakemalcan.com/cyberark-epm-file-block-bypass-cve-2018-14894/ +CVE-2018-14894 - https://www.exploit-db.com/exploits/46688/ +CVE-2018-14894 - https://www.youtube.com/watch?v=B0VpK0poTco +CVE-2018-14904 - https://medium.com/stolabs/security-issues-on-samsung-syncthru-web-service-cc86467d2df +CVE-2018-14905 - https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 +CVE-2018-14906 - https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 +CVE-2018-14907 - https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 +CVE-2018-14908 - https://medium.com/stolabs/security-issues-on-samsung-syncthru-web-service-cc86467d2df +CVE-2018-14911 - https://github.com/yxcmf/ukcms/issues/1 +CVE-2018-14912 - https://www.exploit-db.com/exploits/45195/ +CVE-2018-14916 - http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html +CVE-2018-14916 - http://seclists.org/fulldisclosure/2019/Apr/12 +CVE-2018-14916 - https://seclists.org/fulldisclosure/2019/Apr/12 +CVE-2018-14918 - http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html +CVE-2018-14918 - http://seclists.org/fulldisclosure/2019/Apr/12 +CVE-2018-14918 - https://seclists.org/fulldisclosure/2019/Apr/12 +CVE-2018-14919 - http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html +CVE-2018-14919 - http://seclists.org/fulldisclosure/2019/Apr/12 +CVE-2018-14919 - https://seclists.org/fulldisclosure/2019/Apr/12 +CVE-2018-14922 - http://packetstormsecurity.com/files/148836/Monstra-Dev-3.0.4-Cross-Site-Scripting.html +CVE-2018-14922 - https://www.exploit-db.com/exploits/45156/ +CVE-2018-14924 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 +CVE-2018-14925 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 +CVE-2018-14926 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 +CVE-2018-14927 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 +CVE-2018-14928 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 +CVE-2018-14929 - https://medium.com/stolabs/security-issues-on-matera-systems-fba14d207dc9 +CVE-2018-14930 - https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software.html +CVE-2018-14931 - https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html +CVE-2018-14933 - https://www.exploit-db.com/exploits/45070/ +CVE-2018-14933 - https://www.exploit-db.com/exploits/46340/ +CVE-2018-14956 - http://packetstormsecurity.com/files/149571/CMS-ISWEB-3.5.3-SQL-Injection.html +CVE-2018-14956 - https://cxsecurity.com/issue/WLB-2018090249 +CVE-2018-14957 - https://cxsecurity.com/issue/WLB-2018090248 +CVE-2018-14958 - https://github.com/alterebro/WeaselCMS/issues/6 +CVE-2018-14959 - https://github.com/alterebro/WeaselCMS/issues/6 +CVE-2018-14961 - https://blog.csdn.net/weixin_42813492/article/details/81240523 +CVE-2018-14961 - https://github.com/AvaterXXX/ZZCMS/blob/master/README.md +CVE-2018-14962 - https://github.com/AvaterXXX/ZZCMS/blob/master/README.md +CVE-2018-14963 - https://github.com/AvaterXXX/ZZCMS/blob/master/README.md +CVE-2018-15120 - https://www.exploit-db.com/exploits/45263 +CVE-2018-15120 - https://www.exploit-db.com/exploits/45263/ +CVE-2018-15126 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/ +CVE-2018-15127 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/ +CVE-2018-15129 - https://github.com/thinksaas/ThinkSAAS/issues/16 +CVE-2018-1513 - https://www.exploit-db.com/exploits/45190/ +CVE-2018-15130 - https://github.com/thinksaas/ThinkSAAS/issues/18 +CVE-2018-15133 - http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html +CVE-2018-15136 - https://www.fwhibbit.es/bypassing-spam-titan-my-first-cve +CVE-2018-15137 - https://github.com/safakaslan/CelaLinkCLRM20/issues/1 +CVE-2018-15137 - https://www.exploit-db.com/exploits/45021/ +CVE-2018-15138 - https://www.exploit-db.com/exploits/45167/ +CVE-2018-15139 - http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html +CVE-2018-15139 - http://packetstormsecurity.com/files/163482/OpenEMR-5.0.1.3-Shell-Upload.html +CVE-2018-15139 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15140 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15140 - https://www.exploit-db.com/exploits/45202/ +CVE-2018-15141 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15141 - https://www.exploit-db.com/exploits/45202/ +CVE-2018-15142 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15142 - https://www.exploit-db.com/exploits/45202/ +CVE-2018-15143 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15144 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15145 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15146 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15147 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15148 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15149 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15150 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15151 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15152 - http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html +CVE-2018-15152 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15153 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15153 - https://www.exploit-db.com/exploits/45161/ +CVE-2018-15154 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15155 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15156 - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ +CVE-2018-15157 - https://github.com/libyal/libfsclfs/issues/3 +CVE-2018-15158 - https://github.com/libyal/libesedb/issues/43 +CVE-2018-15159 - https://github.com/libyal/libesedb/issues/43 +CVE-2018-15160 - https://github.com/libyal/libesedb/issues/43 +CVE-2018-15161 - https://github.com/libyal/libesedb/issues/43 +CVE-2018-15168 - https://github.com/x-f1v3/ForCve/issues/2 +CVE-2018-15169 - https://github.com/x-f1v3/ForCve/issues/3 +CVE-2018-15172 - https://www.exploit-db.com/exploits/45203/ +CVE-2018-15173 - http://code610.blogspot.com/2018/07/crashing-nmap-760.html +CVE-2018-15173 - http://code610.blogspot.com/2018/07/crashing-nmap-770.html +CVE-2018-15174 - http://code610.blogspot.com/2018/08/updating-xnview.html +CVE-2018-15175 - http://code610.blogspot.com/2018/08/updating-xnview.html +CVE-2018-15176 - http://code610.blogspot.com/2018/08/updating-xnview.html +CVE-2018-15178 - https://github.com/gogs/gogs/issues/5364 +CVE-2018-15181 - https://gkaim.com/cve-2018-15181-vikas-chaudhary/ +CVE-2018-15181 - https://www.exploit-db.com/exploits/45199/ +CVE-2018-15182 - https://gkaim.com/cve-2018-15182-vikas-chaudhary/ +CVE-2018-15183 - https://gkaim.com/cve-2018-15183-vikas-chaudhary/ +CVE-2018-15184 - https://gkaim.com/cve-2018-15184-vikas-chaudhary/ +CVE-2018-15185 - https://gkaim.com/cve-2018-15185-vikas-chaudhary/ +CVE-2018-15186 - https://gkaim.com/cve-2018-15186-vikas-chaudhary/ +CVE-2018-15187 - https://gkaim.com/cve-2018-15187-vikas-chaudhary/ +CVE-2018-15188 - https://gkaim.com/cve-2018-15188-vikas-chaudhary/ +CVE-2018-15189 - https://gkaim.com/cve-2018-15189-vikas-chaudhary/ +CVE-2018-15190 - https://gkaim.com/cve-2018-15190-vikas-chaudhary/ +CVE-2018-15191 - https://gkaim.com/cve-2018-15191-vikas-chaudhary/ +CVE-2018-15197 - https://github.com/liu21st/onethink/issues/36 +CVE-2018-15198 - https://github.com/liu21st/onethink/issues/36 +CVE-2018-15202 - https://github.com/Juunan06/eCommerce/issues/1 +CVE-2018-15203 - https://github.com/ignitedcms/ignitedcms/issues/4 +CVE-2018-15206 - https://neetech18.blogspot.com/2019/03/cross-site-request-forgery-smartvista.html +CVE-2018-15207 - https://neetech18.blogspot.com/2019/03/incorrect-access-control-smart-vista.html +CVE-2018-15208 - https://neetech18.blogspot.com/2019/03/session-fixation-smart-vista-svfe-2.html +CVE-2018-15209 - http://bugzilla.maptools.org/show_bug.cgi?id=2808 +CVE-2018-15361 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/ +CVE-2018-15365 - https://github.com/nixwizard/CVE-2018-15365/ +CVE-2018-15378 - https://bugzilla.clamav.net/show_bug.cgi?id=12170 +CVE-2018-15379 - https://www.exploit-db.com/exploits/45555/ +CVE-2018-15437 - https://www.exploit-db.com/exploits/45829/ +CVE-2018-15442 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection +CVE-2018-15442 - https://www.exploit-db.com/exploits/45695/ +CVE-2018-15442 - https://www.exploit-db.com/exploits/45696/ +CVE-2018-15444 - https://www.tenable.com/security/research/tra-2018-36 +CVE-2018-15445 - https://www.tenable.com/security/research/tra-2018-36 +CVE-2018-15465 - https://www.tenable.com/security/research/tra-2018-46 +CVE-2018-15471 - https://usn.ubuntu.com/3820-1/ +CVE-2018-15473 - https://www.exploit-db.com/exploits/45210/ +CVE-2018-15473 - https://www.exploit-db.com/exploits/45233/ +CVE-2018-15473 - https://www.exploit-db.com/exploits/45939/ +CVE-2018-15473 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-15474 - https://github.com/splitbrain/dokuwiki/issues/2450 +CVE-2018-15474 - https://seclists.org/fulldisclosure/2018/Sep/4 +CVE-2018-15474 - https://www.sec-consult.com/en/blog/advisories/dokuwiki-csv-formula-injection-vulnerability/ +CVE-2018-15483 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html +CVE-2018-15484 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html +CVE-2018-15485 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html +CVE-2018-15486 - http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html +CVE-2018-15490 - https://medium.com/@Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47 +CVE-2018-15491 - https://github.com/mspaling/zemana-exclusions-poc/blob/master/zemana-whitelist-poc.txt +CVE-2018-15493 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-017.txt +CVE-2018-15499 - https://github.com/DownWithUp/CVE-2018-15499 +CVE-2018-15503 - https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/ +CVE-2018-15508 - https://0tkombo.wixsite.com/0tkombo/blog/five9-dos-websocket-access +CVE-2018-15509 - https://0tkombo.wixsite.com/0tkombo/blog/five9-dos-websocket-access +CVE-2018-15514 - https://docs.docker.com/docker-for-windows/release-notes/ +CVE-2018-15514 - https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html +CVE-2018-15515 - http://packetstormsecurity.com/files/150244/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-DLL-Hijacking.html +CVE-2018-15515 - http://seclists.org/fulldisclosure/2018/Nov/29 +CVE-2018-15516 - http://packetstormsecurity.com/files/150242/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-Man-In-The-Middle.html +CVE-2018-15516 - http://seclists.org/fulldisclosure/2018/Nov/27 +CVE-2018-15517 - http://packetstormsecurity.com/files/150243/D-LINK-Central-WifiManager-CWM-100-1.03-r0098-Server-Side-Request-Forgery.html +CVE-2018-15517 - http://seclists.org/fulldisclosure/2018/Nov/28 +CVE-2018-15528 - http://packetstormsecurity.com/files/149007/BMC-MyIT-Java-System-Solutions-SSO-Plugin-4.0.13.1-Cross-Site-Scripting.html +CVE-2018-15528 - http://seclists.org/bugtraq/2018/Aug/41 +CVE-2018-15529 - http://packetstormsecurity.com/files/149065/Mutiny-Monitoring-Appliance-Command-Injection.html +CVE-2018-15530 - https://ysec.ch/?p=94 +CVE-2018-15533 - http://packetstormsecurity.com/files/149003/Geutebruck-re_porter-16-Cross-Site-Scripting.html +CVE-2018-15533 - https://www.exploit-db.com/exploits/45242/ +CVE-2018-15534 - http://packetstormsecurity.com/files/149002/Geutebruck-re_porter-16-Credential-Disclosure.html +CVE-2018-15534 - https://www.exploit-db.com/exploits/45240/ +CVE-2018-15535 - https://www.exploit-db.com/exploits/45271/ +CVE-2018-15536 - https://www.exploit-db.com/exploits/45271/ +CVE-2018-15537 - http://packetstormsecurity.com/files/150330/OCS-Inventory-NG-ocsreports-Shell-Upload.html +CVE-2018-15537 - http://seclists.org/fulldisclosure/2018/Nov/40 +CVE-2018-15542 - https://gist.github.com/tanprathan/18d0f692a2485acfb5693e2f6dabeb5d +CVE-2018-15543 - https://gist.github.com/tanprathan/d286c0d5b02e344606287774304a1ccd +CVE-2018-15555 - http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html +CVE-2018-15555 - http://seclists.org/fulldisclosure/2019/Jun/1 +CVE-2018-15556 - http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html +CVE-2018-15556 - http://seclists.org/fulldisclosure/2019/Jun/1 +CVE-2018-15557 - http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html +CVE-2018-15557 - http://seclists.org/fulldisclosure/2019/Jun/2 +CVE-2018-15560 - https://github.com/Legrandin/pycryptodome/issues/198 +CVE-2018-15562 - http://packetstormsecurity.com/files/149109/CMS-ISWEB-3.5.3-Cross-Site-Scripting.html +CVE-2018-15563 - https://cxsecurity.com/issue/WLB-2018090261 +CVE-2018-15565 - https://github.com/daveismyname/simple-cms/issues/3 +CVE-2018-15568 - https://github.com/fmsdwifull/tp5cms/issues/3 +CVE-2018-15571 - https://hackpuntes.com/cve-2018-15571-wordpress-plugin-export-users-to-csv-1-1-1-csv-injection/ +CVE-2018-15571 - https://www.exploit-db.com/exploits/45206/ +CVE-2018-15572 - https://usn.ubuntu.com/3777-1/ +CVE-2018-15572 - https://usn.ubuntu.com/3777-3/ +CVE-2018-15573 - http://seclists.org/fulldisclosure/2021/Dec/18 +CVE-2018-15576 - http://packetstormsecurity.com/files/149018/Easylogin-Pro-1.3.0-Remote-Code-Execution.html +CVE-2018-15576 - https://www.exploit-db.com/exploits/45227/ +CVE-2018-15582 - https://github.com/gnuboard/gnuboard5/commit/b1fc952c7600b825c4b02e2789ddafdea18c8d13#diff-72e9a967d5cebb96734e6f6984091e66 +CVE-2018-15586 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-15587 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-15587 - https://bugzilla.gnome.org/show_bug.cgi?id=796424 +CVE-2018-15588 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-15588 - https://updates.mailmate-app.com/release_notes +CVE-2018-15590 - http://packetstormsecurity.com/files/149617/Ivanti-Workspace-Control-UNC-Path-Data-Security-Bypass.html +CVE-2018-15590 - http://seclists.org/fulldisclosure/2018/Oct/2 +CVE-2018-15591 - http://packetstormsecurity.com/files/149614/Ivanti-Workspace-Control-Application-PowerGrid-SEE-Whitelist-Bypass.html +CVE-2018-15591 - https://www.securify.nl/en/advisory/SFY20180806/ivanti-workspace-control-application-whitelist-bypass-via-powergrid-_see-command-line-argument.html +CVE-2018-15592 - http://packetstormsecurity.com/files/149615/Ivanti-Workspace-Control-Named-Pipe-Privilege-Escalation.html +CVE-2018-15592 - http://seclists.org/fulldisclosure/2018/Oct/1 +CVE-2018-15593 - http://packetstormsecurity.com/files/149616/Ivanti-Workspace-Control-Registry-Stored-Credentials.html +CVE-2018-15594 - https://usn.ubuntu.com/3777-1/ +CVE-2018-15594 - https://usn.ubuntu.com/3777-3/ +CVE-2018-15596 - https://www.exploit-db.com/exploits/45393/ +CVE-2018-15599 - http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html +CVE-2018-15599 - https://old.reddit.com/r/blackhat/comments/97ywnm/openssh_username_enumeration/e4e05n2/ +CVE-2018-15607 - https://github.com/ImageMagick/ImageMagick/issues/1255 +CVE-2018-15608 - https://www.exploit-db.com/exploits/45254/ +CVE-2018-15610 - https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html +CVE-2018-1563 - https://www.exploit-db.com/exploits/45190/ +CVE-2018-15655 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ +CVE-2018-15656 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ +CVE-2018-15657 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ +CVE-2018-15657 - https://www.exploit-db.com/exploits/46305/ +CVE-2018-15658 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ +CVE-2018-15659 - https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/ +CVE-2018-15671 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5#stack-overflow---stackoverflow_h5p__get_cb +CVE-2018-15676 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15677 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15678 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15679 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15680 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15681 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15682 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15683 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15684 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-15685 - https://www.exploit-db.com/exploits/45272/ +CVE-2018-15686 - https://www.exploit-db.com/exploits/45714/ +CVE-2018-15686 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-15687 - https://www.exploit-db.com/exploits/45715/ +CVE-2018-15691 - https://www.exploit-db.com/exploits/45425/ +CVE-2018-15692 - https://www.kpmg.de/noindex/advisories/KPMG-2018-002.txt +CVE-2018-15693 - https://www.kpmg.de/noindex/advisories/KPMG-2018-001.txt +CVE-2018-15703 - https://www.tenable.com/security/research/tra-2018-33 +CVE-2018-15704 - https://www.tenable.com/security/research/tra-2018-33 +CVE-2018-15705 - https://www.exploit-db.com/exploits/45774/ +CVE-2018-15705 - https://www.tenable.com/security/research/tra-2018-35 +CVE-2018-15706 - https://www.tenable.com/security/research/tra-2018-35 +CVE-2018-15707 - https://www.exploit-db.com/exploits/45774/ +CVE-2018-15707 - https://www.tenable.com/security/research/tra-2018-35 +CVE-2018-15708 - http://packetstormsecurity.com/files/153433/Nagios-XI-Magpie_debug.php-Root-Remote-Code-Execution.html +CVE-2018-15708 - https://www.exploit-db.com/exploits/46221/ +CVE-2018-15708 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15709 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15710 - http://packetstormsecurity.com/files/153433/Nagios-XI-Magpie_debug.php-Root-Remote-Code-Execution.html +CVE-2018-15710 - https://www.exploit-db.com/exploits/46221/ +CVE-2018-15710 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15711 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15712 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15713 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15714 - https://www.tenable.com/security/research/tra-2018-37 +CVE-2018-15715 - https://www.tenable.com/security/research/tra-2018-40 +CVE-2018-15716 - https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716 +CVE-2018-15716 - https://www.exploit-db.com/exploits/45948/ +CVE-2018-15716 - https://www.tenable.com/security/research/tra-2018-41 +CVE-2018-15720 - https://www.tenable.com/security/research/tra-2018-47 +CVE-2018-15721 - https://www.tenable.com/security/research/tra-2018-47 +CVE-2018-15722 - https://www.tenable.com/security/research/tra-2018-47 +CVE-2018-15723 - https://www.tenable.com/security/research/tra-2018-47 +CVE-2018-15726 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 +CVE-2018-15728 - http://seclists.org/bugtraq/2018/Aug/49 +CVE-2018-15729 - https://www.greyhathacker.net +CVE-2018-15730 - https://www.greyhathacker.net +CVE-2018-15731 - https://www.greyhathacker.net +CVE-2018-15732 - https://www.greyhathacker.net +CVE-2018-15733 - https://www.greyhathacker.net +CVE-2018-15734 - https://www.greyhathacker.net +CVE-2018-15735 - https://www.greyhathacker.net +CVE-2018-15736 - https://www.greyhathacker.net +CVE-2018-15737 - https://www.greyhathacker.net +CVE-2018-15738 - https://www.greyhathacker.net +CVE-2018-15740 - http://packetstormsecurity.com/files/149097/ManageEngine-ADManager-Plus-6.5.7-Cross-Site-Scripting.html +CVE-2018-15740 - https://www.exploit-db.com/exploits/45256/ +CVE-2018-15745 - http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt +CVE-2018-15745 - http://packetstormsecurity.com/files/149134/Argus-Surveillance-DVR-4.0.0.0-Directory-Traversal.html +CVE-2018-15745 - https://www.exploit-db.com/exploits/45296/ +CVE-2018-15749 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 +CVE-2018-15752 - https://seclists.org/bugtraq/2018/Oct/3 +CVE-2018-15753 - https://seclists.org/bugtraq/2018/Oct/3 +CVE-2018-15756 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-15756 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-15756 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-15756 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-15756 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-15756 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-15756 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-15764 - https://seclists.org/fulldisclosure/2018/Sep/47 +CVE-2018-15767 - https://www.exploit-db.com/exploits/45852/ +CVE-2018-15768 - https://www.exploit-db.com/exploits/45852/ +CVE-2018-15769 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-15769 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-15769 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-15769 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-15805 - https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c +CVE-2018-15808 - https://versprite.com/advisories/posim-evo-for-windows-2/ +CVE-2018-15811 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html +CVE-2018-15812 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html +CVE-2018-15818 - http://packetstormsecurity.com/files/149981/WordPress-Arforms-3.5.1-Arbitrary-File-Delete.html +CVE-2018-15818 - https://wpvulndb.com/vulnerabilities/9139 +CVE-2018-15819 - https://packetstormsecurity.com/files/152454/EasyIO-30P-Authentication-Bypass-Cross-Site-Scripting.html +CVE-2018-15819 - https://seclists.org/fulldisclosure/2019/Apr/13 +CVE-2018-15820 - https://packetstormsecurity.com/files/152454/EasyIO-30P-Authentication-Bypass-Cross-Site-Scripting.html +CVE-2018-15820 - https://seclists.org/fulldisclosure/2019/Apr/13 +CVE-2018-1583 - http://www.ibm.com/support/docview.wss?uid=swg22016465 +CVE-2018-15832 - https://www.exploit-db.com/exploits/45429/ +CVE-2018-15835 - http://packetstormsecurity.com/files/150284/Android-5.0-Battery-Information-Broadcast-Information-Disclosure.html +CVE-2018-15839 - https://www.exploit-db.com/exploits/45317/ +CVE-2018-15843 - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1293 +CVE-2018-15844 - https://github.com/Vict00r/poc/issues/1 +CVE-2018-15844 - https://www.exploit-db.com/exploits/45314/ +CVE-2018-15845 - https://github.com/gleez/cms/issues/800 +CVE-2018-15845 - https://www.exploit-db.com/exploits/45258/ +CVE-2018-15846 - https://github.com/mattiapazienti/fledrCMS/issues/2 +CVE-2018-15848 - https://github.com/Westbrookadmin/portfolioCMS/issues/1 +CVE-2018-15849 - https://github.com/Westbrookadmin/portfolioCMS/issues/1 +CVE-2018-15850 - https://github.com/redaxo/redaxo4/issues/420 +CVE-2018-15851 - https://github.com/flexocms/flexo1.source/issues/25 +CVE-2018-15852 - https://bkd00r.wordpress.com/2018/08/24/cve-2018-15852-exploit-title-cable-modem-technicolor-tc7200-20-wifi-buffer-overflow/ +CVE-2018-15865 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 +CVE-2018-15870 - https://github.com/libming/libming/issues/122 +CVE-2018-15871 - https://github.com/libming/libming/issues/123 +CVE-2018-15873 - https://hackpuntes.com/cve-2018-15873-sentrifugo-hrms-3-2-blind-sql-injection/ +CVE-2018-15877 - http://packetstormsecurity.com/files/155502/WordPress-Plainview-Activity-Monitor-20161228-Remote-Command-Execution.html +CVE-2018-15877 - http://packetstormsecurity.com/files/163425/WordPress-Plainview-Activity-Monitor-20161228-Remote-Code-Execution.html +CVE-2018-15877 - https://www.exploit-db.com/exploits/45274/ +CVE-2018-15884 - http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html +CVE-2018-15884 - https://www.exploit-db.com/exploits/45264/ +CVE-2018-15890 - https://github.com/frohoff/ysoserial/ +CVE-2018-15893 - https://github.com/wuzhicms/wuzhicms/issues/149 +CVE-2018-15894 - https://github.com/wuzhicms/wuzhicms/issues/150 +CVE-2018-15896 - https://gkaim.com/cve-2018-15896-vikas-chaudhary/ +CVE-2018-15897 - https://gkaim.com/cve-2018-15897-vikas-chaudhary/ +CVE-2018-15898 - http://packetstormsecurity.com/files/149267/Subsonic-Music-Streamer-4.4-For-Android-Improper-Certificate-Validation.html +CVE-2018-15899 - https://github.com/bg5sbk/MiniCMS/issues/21 +CVE-2018-15901 - https://github.com/dhananjay-bajaj/e107_2.1.8_csrf +CVE-2018-15903 - https://seclists.org/fulldisclosure/2018/Oct/12 +CVE-2018-15906 - http://packetstormsecurity.com/files/151473/SolarWinds-Serv-U-FTP-15.1.6-Privilege-Escalation.html +CVE-2018-15906 - http://seclists.org/fulldisclosure/2019/Feb/4 +CVE-2018-15912 - https://lists.manjaro.org/pipermail/manjaro-security/2018-August/000785.html +CVE-2018-15917 - https://github.com/bbalet/jorani/issues/254 +CVE-2018-15917 - https://hackpuntes.com/cve-2018-15917-jorani-leave-management-system-0-6-5-cross-site-scripting-persistente/ +CVE-2018-15917 - https://www.exploit-db.com/exploits/45338/ +CVE-2018-15918 - https://github.com/bbalet/jorani/issues/254 +CVE-2018-15918 - https://hackpuntes.com/cve-2018-15918-jorani-leave-management-system-0-6-5-sql-injection/ +CVE-2018-15918 - https://www.exploit-db.com/exploits/45340/ +CVE-2018-15919 - http://seclists.org/oss-sec/2018/q3/180 +CVE-2018-15961 - https://www.exploit-db.com/exploits/45979/ +CVE-2018-15979 - https://helpx.adobe.com/security/products/acrobat/apsb18-40.html +CVE-2018-15982 - https://www.exploit-db.com/exploits/46051/ +CVE-2018-16042 - https://pdf-insecurity.org/signature/evaluation_2018.html +CVE-2018-16059 - https://cert.vde.com/en-us/advisories/vde-2019-002 +CVE-2018-16059 - https://www.exploit-db.com/exploits/45342/ +CVE-2018-1606 - http://www.ibm.com/support/docview.wss?uid=ibm10738301 +CVE-2018-16060 - http://packetstormsecurity.com/files/164538/Mitsubishi-Electric-INEA-SmartRTU-Source-Code-Disclosure.html +CVE-2018-16061 - http://packetstormsecurity.com/files/164537/Mitsubishi-Electric-INEA-SmartRTU-Cross-Site-Scripting.html +CVE-2018-16071 - https://www.exploit-db.com/exploits/45443/ +CVE-2018-16083 - https://www.exploit-db.com/exploits/45444/ +CVE-2018-16119 - https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day +CVE-2018-1612 - https://www.exploit-db.com/exploits/45005/ +CVE-2018-16130 - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 +CVE-2018-16133 - https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal +CVE-2018-16133 - https://www.exploit-db.com/exploits/45303/ +CVE-2018-16134 - https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Reflected-XSS +CVE-2018-16134 - https://www.exploit-db.com/exploits/45309/ +CVE-2018-16140 - https://sourceforge.net/p/mcj/tickets/28/ +CVE-2018-16141 - https://unothing.github.io/posts/thinkcmfx223/ +CVE-2018-16142 - https://unothing.github.io/posts/phpok48278/ +CVE-2018-16144 - https://seclists.org/fulldisclosure/2018/Sep/3 +CVE-2018-16144 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities +CVE-2018-16145 - https://seclists.org/fulldisclosure/2018/Sep/3 +CVE-2018-16145 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities +CVE-2018-16146 - https://seclists.org/fulldisclosure/2018/Sep/3 +CVE-2018-16146 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities +CVE-2018-16147 - https://seclists.org/fulldisclosure/2018/Sep/3 +CVE-2018-16147 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities +CVE-2018-16148 - https://seclists.org/fulldisclosure/2018/Sep/3 +CVE-2018-16148 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities +CVE-2018-16149 - https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c +CVE-2018-16149 - https://sourceforge.net/p/axtls/mailman/message/36459928/ +CVE-2018-16150 - https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c +CVE-2018-16150 - https://sourceforge.net/p/axtls/mailman/message/36459928/ +CVE-2018-16156 - http://packetstormsecurity.com/files/160832/PaperStream-IP-TWAIN-1.42.0.5685-Local-Privilege-Escalation.html +CVE-2018-16156 - https://www.securifera.com/advisories/cve-2018-16156/ +CVE-2018-16158 - https://www.ctrlu.net/vuln/0006.html +CVE-2018-16159 - https://wpvulndb.com/vulnerabilities/9117 +CVE-2018-16159 - https://www.exploit-db.com/exploits/45255/ +CVE-2018-16164 - https://wpvulndb.com/vulnerabilities/9199 +CVE-2018-16179 - https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking +CVE-2018-16210 - https://www.exploit-db.com/exploits/45581/ +CVE-2018-16216 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf +CVE-2018-16219 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf +CVE-2018-16220 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf +CVE-2018-16222 - http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html +CVE-2018-16222 - http://seclists.org/fulldisclosure/2018/Nov/2 +CVE-2018-16223 - http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html +CVE-2018-16223 - http://seclists.org/fulldisclosure/2018/Nov/2 +CVE-2018-16224 - http://packetstormsecurity.com/files/150165/QBee-Camera-iSmartAlarm-Credential-Disclosure.html +CVE-2018-16224 - http://seclists.org/fulldisclosure/2018/Nov/2 +CVE-2018-16225 - https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability/ +CVE-2018-16233 - https://github.com/bg5sbk/MiniCMS/issues/22 +CVE-2018-16247 - https://github.com/yzmcms/yzmcms/issues/3 +CVE-2018-16252 - http://hyp3rlinx.altervista.org/advisories/FSPRO-LABS-EVENT-LOG-EXPLORER-XML-INJECTION-INFO-DISCLOSURE.txt +CVE-2018-16252 - http://packetstormsecurity.com/files/149195/FsPro-Labs-Event-Log-Explorer-4.6.1.2115-XML-Injection.html +CVE-2018-16252 - https://www.exploit-db.com/exploits/45319/ +CVE-2018-16253 - https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c +CVE-2018-16253 - https://sourceforge.net/p/axtls/mailman/message/36459928/ +CVE-2018-16254 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html +CVE-2018-16254 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing +CVE-2018-16255 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html +CVE-2018-16255 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing +CVE-2018-16256 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html +CVE-2018-16256 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing +CVE-2018-16257 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html +CVE-2018-16257 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing +CVE-2018-16258 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html +CVE-2018-16258 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing +CVE-2018-16259 - https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html +CVE-2018-16259 - https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing +CVE-2018-16261 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 +CVE-2018-16262 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16263 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16264 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16265 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16266 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16267 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16268 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16269 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16270 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16271 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16272 - https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be +CVE-2018-16282 - https://gist.github.com/tim124058/5c4babe391a016c771d2cccabead21cb +CVE-2018-16283 - http://seclists.org/fulldisclosure/2018/Sep/32 +CVE-2018-16283 - https://wpvulndb.com/vulnerabilities/9132 +CVE-2018-16283 - https://www.exploit-db.com/exploits/45438/ +CVE-2018-16285 - https://wpvulndb.com/vulnerabilities/9124 +CVE-2018-16288 - https://www.exploit-db.com/exploits/45440/ +CVE-2018-16299 - http://seclists.org/fulldisclosure/2018/Sep/33 +CVE-2018-16299 - https://packetstormsecurity.com/files/149433/WordPress-Localize-My-Post-1.0-Local-File-Inclusion.html +CVE-2018-16299 - https://www.exploit-db.com/exploits/45439/ +CVE-2018-1630 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16302 - https://www.exploit-db.com/exploits/44828/ +CVE-2018-16303 - https://forum.tracker-software.com/viewtopic.php?f=62&t=31419 +CVE-2018-16307 - http://packetstormsecurity.com/files/149196/MIWiFi-Xiaomi_55DD-2.8.50-Out-Of-Band-Resource-Load.html +CVE-2018-16308 - https://packetstormsecurity.com/files/148993/WordPress-Ninja-Forms-3.3.13-CSV-Injection.html +CVE-2018-16308 - https://www.exploit-db.com/exploits/45234/ +CVE-2018-1631 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16310 - http://buddieshub27.blogspot.com/2018/09/cve-2018-16310-technicolor-tg588v-v2.html +CVE-2018-16313 - https://blog.csdn.net/F_carry/article/details/81536424 +CVE-2018-16315 - https://github.com/caokang/waimai/issues/3 +CVE-2018-1632 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16323 - https://www.exploit-db.com/exploits/45890/ +CVE-2018-16324 - https://cxsecurity.com/issue/WLB-2018080098 +CVE-2018-16324 - https://packetstormsecurity.com/files/148887/IceWarp-WebMail-12.0.3.1-Cross-Site-Scripting.html +CVE-2018-1633 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16331 - https://github.com/Vict00r/poc/issues/1 +CVE-2018-16333 - https://github.com/ZIllR0/Routers/blob/master/Tenda/oob1.md +CVE-2018-16334 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md +CVE-2018-16335 - http://bugzilla.maptools.org/show_bug.cgi?id=2809 +CVE-2018-16336 - https://github.com/Exiv2/exiv2/issues/400 +CVE-2018-16337 - https://github.com/chshcms/cscms/issues/2 +CVE-2018-16338 - https://github.com/auracms/AuraCMS/issues/3 +CVE-2018-16339 - https://github.com/sbmzhcn/EmpireCMS/issues/1 +CVE-2018-1634 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16343 - https://github.com/cumtxujiabin/CmsPoc/blob/master/Seacms_v6.61_backend_RCE.md +CVE-2018-16345 - https://github.com/teameasy/EasyCMS/issues/5 +CVE-2018-16346 - https://github.com/chemcms/ChemCMS/issues/2 +CVE-2018-16348 - https://github.com/Jas0nwhy/vulnerability/blob/master/Seacmsxss.md +CVE-2018-16349 - https://github.com/wuzhicms/wuzhicms/issues/147 +CVE-2018-1635 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16350 - https://github.com/wuzhicms/wuzhicms/issues/148 +CVE-2018-1636 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-16361 - https://rastating.github.io/xbtit-multiple-vulnerabilities/ +CVE-2018-16363 - http://blog.51cto.com/010bjsoft/2171087 +CVE-2018-16363 - https://wpvulndb.com/vulnerabilities/9126 +CVE-2018-16364 - https://blog.jamesotten.com/post/applications-manager-rce/ +CVE-2018-16368 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf +CVE-2018-16369 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf +CVE-2018-16381 - https://github.com/dhananjay-bajaj/E107-v2.1.8-XSS-POC +CVE-2018-16382 - https://bugzilla.nasm.us/show_bug.cgi?id=3392503 +CVE-2018-16387 - https://github.com/jbroadway/elefant/issues/285 +CVE-2018-16395 - https://hackerone.com/reports/387250 +CVE-2018-16395 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-16409 - https://github.com/gogs/gogs/issues/5372 +CVE-2018-16412 - https://github.com/ImageMagick/ImageMagick/issues/1250 +CVE-2018-16413 - https://github.com/ImageMagick/ImageMagick/issues/1249 +CVE-2018-16413 - https://github.com/ImageMagick/ImageMagick/issues/1251 +CVE-2018-16416 - https://github.com/daylightstudio/FUEL-CMS/issues/481 +CVE-2018-16428 - https://usn.ubuntu.com/3767-1/ +CVE-2018-16429 - https://usn.ubuntu.com/3767-1/ +CVE-2018-16438 - https://github.com/TeamSeri0us/pocs/tree/master/hdf5/h5stat +CVE-2018-16449 - https://github.com/liu21st/onethink/issues/37 +CVE-2018-16459 - https://hackerone.com/reports/356809 +CVE-2018-16460 - https://hackerone.com/reports/390848 +CVE-2018-16461 - https://hackerone.com/reports/390865 +CVE-2018-16462 - https://hackerone.com/reports/405694 +CVE-2018-16463 - https://hackerone.com/reports/237184 +CVE-2018-16464 - https://hackerone.com/reports/146133 +CVE-2018-16465 - https://hackerone.com/reports/317711 +CVE-2018-16466 - https://hackerone.com/reports/388515 +CVE-2018-16467 - https://hackerone.com/reports/231917 +CVE-2018-16469 - https://hackerone.com/reports/381194 +CVE-2018-16470 - https://hackerone.com/reports/431561 +CVE-2018-16472 - https://hackerone.com/reports/390847 +CVE-2018-16473 - https://hackerone.com/reports/403736 +CVE-2018-16474 - https://hackerone.com/reports/403692 +CVE-2018-16475 - https://hackerone.com/reports/403707 +CVE-2018-16477 - https://hackerone.com/reports/407319 +CVE-2018-16478 - https://hackerone.com/reports/403703 +CVE-2018-16479 - https://hackerone.com/reports/411405 +CVE-2018-16480 - https://hackerone.com/reports/329950 +CVE-2018-16481 - https://hackerone.com/reports/330356 +CVE-2018-16482 - https://hackerone.com/reports/330285 +CVE-2018-16483 - https://hackerone.com/reports/343626 +CVE-2018-16484 - https://hackerone.com/reports/319794 +CVE-2018-16485 - https://hackerone.com/reports/319795 +CVE-2018-16486 - https://hackerone.com/reports/380878 +CVE-2018-16487 - https://hackerone.com/reports/380873 +CVE-2018-16489 - https://hackerone.com/reports/430291 +CVE-2018-16490 - https://hackerone.com/reports/390860 +CVE-2018-16491 - https://hackerone.com/reports/430831 +CVE-2018-16492 - https://hackerone.com/reports/381185 +CVE-2018-16493 - https://hackerone.com/reports/432600 +CVE-2018-16509 - http://seclists.org/oss-sec/2018/q3/142 +CVE-2018-16509 - https://www.exploit-db.com/exploits/45369/ +CVE-2018-16510 - https://bugs.ghostscript.com/show_bug.cgi?id=699671 +CVE-2018-16517 - http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html +CVE-2018-16517 - https://bugzilla.nasm.us/show_bug.cgi?id=3392513 +CVE-2018-16517 - https://www.exploit-db.com/exploits/46726/ +CVE-2018-16519 - http://packetstormsecurity.com/files/151467/COYO-9.0.8-10.0.11-12.0.4-Cross-Site-Scripting.html +CVE-2018-16519 - https://seclists.org/bugtraq/2019/Feb/0 +CVE-2018-16519 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-032.txt +CVE-2018-16529 - https://seclists.org/fulldisclosure/2018/Nov/23 +CVE-2018-16548 - https://github.com/gdraheim/zziplib/issues/58 +CVE-2018-16549 - https://packetstormsecurity.com/files/149204 +CVE-2018-16552 - https://github.com/MicroPyramid/Django-CRM/issues/68 +CVE-2018-16554 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176 +CVE-2018-16590 - https://cyberskr.com/blog/furuno-felcom.html +CVE-2018-16591 - https://cyberskr.com/blog/furuno-felcom.html +CVE-2018-16597 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-16605 - https://www.youtube.com/watch?v=BvZJ_e2BH_M&feature=youtu.be +CVE-2018-16606 - https://packetstormsecurity.com/files/149259/IDOR-On-ProConf-Peer-Review-And-Conference-Management-6.0-File-Disclosure.html +CVE-2018-16607 - https://docs.google.com/document/d/1MKeb9lly_oOrVG0Ja4A-HgwaeXhb_xQHT9IIOee3wi0/edit +CVE-2018-16619 - https://support.sonatype.com/hc/en-us/articles/360010789893-CVE-2018-16619-Nexus-Repository-Manager-XSS-October-17-2018 +CVE-2018-16620 - https://support.sonatype.com/hc/en-us/articles/360010789453-CVE-2018-16620-Nexus-Repository-Manager-Missing-Access-Controls-October-17-2018 +CVE-2018-16621 - https://support.sonatype.com/hc/en-us/articles/360010789153-CVE-2018-16621-Nexus-Repository-Manager-Java-Injection-October-17-2018 +CVE-2018-16622 - https://github.com/doramart/DoraCMS/issues/136 +CVE-2018-16629 - https://github.com/security-breachlock/CVE-2018-16629/blob/master/subrion_cms.pdf +CVE-2018-16636 - https://github.com/NucleusCMS/NucleusCMS/issues/84 +CVE-2018-16646 - https://bugzilla.redhat.com/show_bug.cgi?id=1622951 +CVE-2018-16647 - https://bugs.ghostscript.com/show_bug.cgi?id=699686 +CVE-2018-16648 - https://bugs.ghostscript.com/show_bug.cgi?id=699685 +CVE-2018-16653 - https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1%20%20xss1 +CVE-2018-16656 - https://mars-cheng.github.io/blog/2019/CVE-2018-16656 +CVE-2018-16658 - https://usn.ubuntu.com/3820-1/ +CVE-2018-16658 - https://usn.ubuntu.com/3822-1/ +CVE-2018-16659 - https://www.exploit-db.com/exploits/45500/ +CVE-2018-16660 - https://www.exploit-db.com/exploits/45542/ +CVE-2018-16668 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life +CVE-2018-16668 - https://www.exploit-db.com/exploits/45384/ +CVE-2018-16669 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life +CVE-2018-16669 - https://www.exploit-db.com/exploits/45384/ +CVE-2018-16670 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life +CVE-2018-16670 - https://www.exploit-db.com/exploits/45384/ +CVE-2018-16671 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life +CVE-2018-16671 - https://www.exploit-db.com/exploits/45384/ +CVE-2018-16672 - https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life +CVE-2018-16672 - https://www.exploit-db.com/exploits/45384/ +CVE-2018-16703 - https://github.com/gleez/cms/issues/802 +CVE-2018-16705 - https://cyberskr.com/blog/furuno-felcom.html +CVE-2018-16709 - https://www.exploit-db.com/exploits/45332/ +CVE-2018-16718 - https://github.com/grymer/CVE/blob/master/CVE-2018-16718.md +CVE-2018-16724 - https://github.com/xxy961216/attack-baijiacmsV4-with-blind-sql-injection +CVE-2018-16725 - https://github.com/xxy961216/attack-baijiacmsV4-with-xss +CVE-2018-16728 - https://github.com/frozeman/feindura-flat-file-cms/issues/29 +CVE-2018-16732 - https://github.com/AvaterXXX/CScms/blob/master/CScms_csrf.md +CVE-2018-16736 - https://www.exploit-db.com/exploits/45437/ +CVE-2018-16739 - https://sec.maride.cc/posts/abus/ +CVE-2018-16752 - http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.html +CVE-2018-16752 - https://www.exploit-db.com/exploits/45351/ +CVE-2018-16759 - https://github.com/teameasy/EasyCMS/issues/4 +CVE-2018-16763 - http://packetstormsecurity.com/files/153696/fuelCMS-1.4.1-Remote-Code-Execution.html +CVE-2018-16763 - http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html +CVE-2018-16763 - http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html +CVE-2018-16763 - https://0xd0ff9.wordpress.com/2019/07/19/from-code-evaluation-to-pre-auth-remote-code-execution-cve-2018-16763-bypass/ +CVE-2018-16763 - https://www.exploit-db.com/exploits/47138 +CVE-2018-16778 - https://metamorfosec.com/Files/Advisories/METS-2018-004-A_XSS_Vulnerability_in_Jenzabar_8.2.1_to_9.2.0.txt +CVE-2018-16789 - http://packetstormsecurity.com/files/149978/Shell-In-A-Box-2.2.0-Denial-Of-Service.html +CVE-2018-16793 - http://packetstormsecurity.com/files/149411/Rollup-18-For-Microsoft-Exchange-Server-2010-SP3-Server-Side-Request-Forgery.html +CVE-2018-16793 - http://seclists.org/fulldisclosure/2018/Sep/20 +CVE-2018-16793 - https://seclists.org/bugtraq/2018/Sep/38 +CVE-2018-16794 - http://packetstormsecurity.com/files/149376/Microsoft-ADFS-4.0-Windows-Server-2016-Server-Side-Request-Forgery.html +CVE-2018-16794 - http://seclists.org/fulldisclosure/2018/Sep/13 +CVE-2018-16794 - https://seclists.org/bugtraq/2018/Sep/26 +CVE-2018-16795 - https://www.open-emr.org/wiki/images/1/11/Openemr_insecurity.pdf +CVE-2018-16796 - https://seclists.org/bugtraq/2018/Sep/27 +CVE-2018-16796 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-015.txt +CVE-2018-16803 - https://www.linkedin.com/feed/update/urn:li:activity:6489145511902212096/ +CVE-2018-16803 - https://www.websec.nl/news.php +CVE-2018-16806 - https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ +CVE-2018-16821 - http://www.seacms.net/thread-6249-1-1.html +CVE-2018-16831 - https://github.com/smarty-php/smarty/issues/486 +CVE-2018-16832 - https://github.com/ysrc/xunfeng/issues/177 +CVE-2018-16833 - http://packetstormsecurity.com/files/149436/ManageEngine-Desktop-Central-10.0.271-Cross-Site-Scripting.html +CVE-2018-16836 - https://www.exploit-db.com/exploits/45385/ +CVE-2018-16839 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 +CVE-2018-16839 - https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 +CVE-2018-16841 - https://usn.ubuntu.com/3827-2/ +CVE-2018-16842 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-16843 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2018-16844 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2018-16845 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2018-16851 - https://usn.ubuntu.com/3827-2/ +CVE-2018-16858 - http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html +CVE-2018-16858 - https://www.exploit-db.com/exploits/46727/ +CVE-2018-16862 - https://usn.ubuntu.com/4118-1/ +CVE-2018-16864 - http://www.openwall.com/lists/oss-security/2021/07/20/2 +CVE-2018-16864 - https://www.qualys.com/2019/01/09/system-down/system-down.txt +CVE-2018-16865 - http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html +CVE-2018-16865 - http://www.openwall.com/lists/oss-security/2021/07/20/2 +CVE-2018-16865 - https://www.qualys.com/2019/01/09/system-down/system-down.txt +CVE-2018-16866 - http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html +CVE-2018-16866 - https://www.qualys.com/2019/01/09/system-down/system-down.txt +CVE-2018-16868 - http://cat.eyalro.net/ +CVE-2018-16869 - http://cat.eyalro.net/ +CVE-2018-16870 - http://cat.eyalro.net/ +CVE-2018-16884 - https://usn.ubuntu.com/3932-1/ +CVE-2018-16884 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-1694 - http://www.ibm.com/support/docview.wss?uid=ibm10738301 +CVE-2018-16946 - https://github.com/EgeBalci/LG-Smart-IP-Device-Backup-Download +CVE-2018-16946 - https://www.exploit-db.com/exploits/45394/ +CVE-2018-16965 - http://packetstormsecurity.com/files/149438/ManageEngine-SupportCenter-Plus-8.1.0-Cross-Site-Scripting.html +CVE-2018-16966 - https://wpvulndb.com/vulnerabilities/9614 +CVE-2018-16967 - https://wpvulndb.com/vulnerabilities/9614 +CVE-2018-16974 - https://github.com/jbroadway/elefant/issues/287 +CVE-2018-16975 - https://github.com/jbroadway/elefant/issues/286 +CVE-2018-16985 - https://github.com/inikep/lizard/issues/18 +CVE-2018-16986 - https://armis.com/bleedingbit/ +CVE-2018-16986 - https://www.kb.cert.org/vuls/id/317277 +CVE-2018-16999 - https://bugzilla.nasm.us/show_bug.cgi?id=3392508 +CVE-2018-17000 - http://bugzilla.maptools.org/show_bug.cgi?id=2811 +CVE-2018-17000 - https://usn.ubuntu.com/3906-1/ +CVE-2018-17001 - http://packetstormsecurity.com/files/149441/RICOH-SP-4510SF-Printer-Cross-Site-Scripting.html +CVE-2018-17002 - http://packetstormsecurity.com/files/149443/RICOH-MP-2001-Printer-Cross-Site-Scripting.html +CVE-2018-17003 - http://packetstormsecurity.com/files/149435/LimeSurvey-3.14.7-Cross-Site-Scripting.html +CVE-2018-17004 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_00/README.md +CVE-2018-17005 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_01/README.md +CVE-2018-17006 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_02/README.md +CVE-2018-17007 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_03/README.md +CVE-2018-17008 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_04/README.md +CVE-2018-17009 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_05/README.md +CVE-2018-17010 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_06/README.md +CVE-2018-17011 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_07/README.md +CVE-2018-17012 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_08/README.md +CVE-2018-17013 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_09/README.md +CVE-2018-17014 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_10/README.md +CVE-2018-17015 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_11/README.md +CVE-2018-17016 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_12/README.md +CVE-2018-17017 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_13/README.md +CVE-2018-17018 - https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_14/README.md +CVE-2018-17024 - https://github.com/monstra-cms/monstra/issues/452 +CVE-2018-17024 - https://github.com/monstra-cms/monstra/issues/458 +CVE-2018-17025 - https://github.com/monstra-cms/monstra/issues/458 +CVE-2018-17026 - https://github.com/bg5sbk/MiniCMS/issues/25 +CVE-2018-17030 - https://github.com/bigtreecms/BigTree-CMS/issues/342 +CVE-2018-17031 - https://github.com/gogs/gogs/issues/5397 +CVE-2018-17044 - https://github.com/yzmcms/yzmcms/issues/3 +CVE-2018-17045 - https://github.com/maelosoki/MaeloStore/issues/1 +CVE-2018-17049 - https://github.com/TREYWANGCQU/LANKERS/issues/1 +CVE-2018-17053 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ +CVE-2018-17053 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 +CVE-2018-17054 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ +CVE-2018-17054 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 +CVE-2018-17055 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ +CVE-2018-17055 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 +CVE-2018-17056 - https://insinuator.net/2018/10/vulnerabilities-in-sitefinity-wcms-a-success-story-of-a-responsible-disclosure-process/ +CVE-2018-17056 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-September-2018 +CVE-2018-17057 - http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html +CVE-2018-17057 - http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html +CVE-2018-17057 - http://seclists.org/fulldisclosure/2019/Mar/36 +CVE-2018-17057 - https://www.exploit-db.com/exploits/46634/ +CVE-2018-17061 - https://medium.com/@Mthirup/hacking-your-own-antivirus-for-fun-and-profit-safe-browsing-gone-wrong-365db9d1d3f7 +CVE-2018-17062 - https://secwk.blogspot.com/2018/09/seacms-664-xss-vulnerability.html +CVE-2018-17063 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_3 +CVE-2018-17064 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_2 +CVE-2018-17065 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_1 +CVE-2018-17066 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_0 +CVE-2018-17067 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_0 +CVE-2018-17068 - https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_1 +CVE-2018-17069 - https://github.com/unlcms/UNL-CMS/issues/941 +CVE-2018-17070 - https://github.com/unlcms/UNL-CMS/issues/941 +CVE-2018-17074 - https://wpvulndb.com/vulnerabilities/7543 +CVE-2018-17075 - https://github.com/golang/go/issues/27016 +CVE-2018-17076 - https://github.com/logological/gpp/issues/26 +CVE-2018-17079 - https://github.com/94fzb/zrlog/issues/38 +CVE-2018-17081 - https://github.com/himanshurahi/e107_2.1.9_CSRF_POC +CVE-2018-17082 - https://bugs.php.net/bug.php?id=76582 +CVE-2018-17082 - https://hackerone.com/reports/409986 +CVE-2018-17085 - http://secwk.blogspot.com/2018/09/otcms-361-reflected-xss-usersphp.html +CVE-2018-17086 - http://secwk.blogspot.com/2018/09/otcms-361-reflected-xss-shareswitchphp.html +CVE-2018-17088 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907925 +CVE-2018-17096 - https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03 +CVE-2018-17097 - https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03 +CVE-2018-17098 - https://github.com/TeamSeri0us/pocs/blob/master/soundtouch/2018_09_03 +CVE-2018-17102 - https://github.com/quickapps/cms/issues/199 +CVE-2018-17103 - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1295 +CVE-2018-17104 - https://github.com/microweber/microweber/issues/483 +CVE-2018-17104 - https://github.com/microweber/microweber/issues/484 +CVE-2018-17110 - https://www.exploit-db.com/exploits/45328/ +CVE-2018-17113 - https://github.com/teameasy/EasyCMS/issues/7 +CVE-2018-17127 - https://github.com/PAGalaxyLab/VulInfo/tree/master/ASUS/GT-AC5300/dos1 +CVE-2018-17128 - https://www.exploit-db.com/exploits/45449/ +CVE-2018-17129 - https://github.com/panghusec/exploit/issues/2 +CVE-2018-17136 - https://github.com/TEag1e/zzcms +CVE-2018-17138 - https://www.exploit-db.com/exploits/45305/ +CVE-2018-17139 - https://www.exploit-db.com/exploits/45253/ +CVE-2018-17140 - https://www.exploit-db.com/exploits/45307/ +CVE-2018-17144 - https://github.com/bitcoin/bitcoin/blob/v0.16.3/doc/release-notes.md +CVE-2018-17145 - https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md +CVE-2018-17150 - https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities +CVE-2018-17151 - https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities +CVE-2018-17152 - https://know.bishopfox.com/advisories/intersystems-cache-2017-2-2-865-0-vulnerabilities +CVE-2018-17153 - http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html +CVE-2018-17153 - https://securify.nl/nl/advisory/SFY20180102/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges.html +CVE-2018-17173 - http://packetstormsecurity.com/files/152733/LG-Supersign-EZ-CMS-Remote-Code-Execution.html +CVE-2018-17173 - https://www.exploit-db.com/exploits/45448/ +CVE-2018-17173 - https://www.exploit-db.com/exploits/46795/ +CVE-2018-17174 - https://www.cnblogs.com/tr3e/p/9662324.html +CVE-2018-17175 - https://github.com/marshmallow-code/marshmallow/issues/772 +CVE-2018-17182 - https://usn.ubuntu.com/3777-1/ +CVE-2018-17182 - https://usn.ubuntu.com/3777-3/ +CVE-2018-17182 - https://www.exploit-db.com/exploits/45497/ +CVE-2018-17189 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-17190 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-17196 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-17196 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-17197 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1721 - https://www.ibm.com/support/pages/node/1074144 +CVE-2018-17215 - https://seclists.org/bugtraq/2018/Sep/56 +CVE-2018-17215 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-016.txt +CVE-2018-17229 - https://github.com/Exiv2/exiv2/issues/453 +CVE-2018-17230 - https://github.com/Exiv2/exiv2/issues/455 +CVE-2018-17233 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero +CVE-2018-17234 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak +CVE-2018-17235 - https://bugzilla.redhat.com/show_bug.cgi?id=1629451 +CVE-2018-17236 - https://bugzilla.redhat.com/show_bug.cgi?id=1629453 +CVE-2018-17237 - https://github.com/SegfaultMasters/covering360/blob/master/HDF5/README.md#divided-by-zero---h5d__chunk_set_info_real_div_by_zero +CVE-2018-17240 - https://github.com/BBge/CVE-2018-17240 +CVE-2018-17240 - https://github.com/BBge/CVE-2018-17240/blob/main/exploit.py +CVE-2018-17244 - https://www.elastic.co/community/security +CVE-2018-17245 - https://www.elastic.co/community/security +CVE-2018-17246 - https://www.elastic.co/community/security +CVE-2018-17247 - https://www.elastic.co/community/security +CVE-2018-17254 - http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html +CVE-2018-17254 - https://www.exploit-db.com/exploits/45423/ +CVE-2018-17281 - http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html +CVE-2018-17282 - https://github.com/Exiv2/exiv2/issues/457 +CVE-2018-17283 - https://github.com/x-f1v3/ForCve/issues/4 +CVE-2018-17293 - https://github.com/WAVM/WAVM/issues/110#issuecomment-421764693 +CVE-2018-17300 - https://github.com/CuppaCMS/CuppaCMS/issues/4 +CVE-2018-17301 - https://github.com/espocrm/espocrm/issues/1038 +CVE-2018-17302 - https://github.com/espocrm/espocrm/issues/1039 +CVE-2018-17305 - https://www.uipath.com/product/release-notes/uipath-v2018.1.7 +CVE-2018-17309 - http://packetstormsecurity.com/files/149493/RICOH-MP-C406Z-Printer-Cross-Site-Scripting.html +CVE-2018-17310 - http://packetstormsecurity.com/files/149494/RICOH-MP-C1803-JPN-Printer-Cross-Site-Scripting.html +CVE-2018-17310 - https://www.exploit-db.com/exploits/45526/ +CVE-2018-17311 - http://packetstormsecurity.com/files/149495/RICOH-MP-C6503-Plus-Printer-Cross-Site-Scripting.html +CVE-2018-17312 - http://packetstormsecurity.com/files/149496/RICOH-Aficio-MP-301-Printer-Cross-Site-Scripting.html +CVE-2018-17313 - http://packetstormsecurity.com/files/149497/RICOH-MP-C307-Printer-Cross-Site-Scripting.html +CVE-2018-17313 - https://www.exploit-db.com/exploits/45526/ +CVE-2018-17314 - http://packetstormsecurity.com/files/149501/RICOH-MP-305-Printer-Cross-Site-Scripting.html +CVE-2018-17315 - http://packetstormsecurity.com/files/149502/RICOH-MP-C2003-Printer-Cross-Site-Scripting.html +CVE-2018-17316 - http://packetstormsecurity.com/files/149505/RICOH-MP-C6003-Printer-Cross-Site-Scripting.html +CVE-2018-17317 - http://blog.51cto.com/010bjsoft/2175710 +CVE-2018-17321 - https://secwk.blogspot.com/2018/09/seacms-664-xss-vulnerability_14.html +CVE-2018-17322 - https://github.com/source-trace/yunucms/issues/1 +CVE-2018-17332 - https://github.com/agambier/libsvg2/issues/2 +CVE-2018-17333 - https://github.com/agambier/libsvg2/issues/4 +CVE-2018-17334 - https://github.com/agambier/libsvg2/issues/3 +CVE-2018-17358 - https://sourceware.org/bugzilla/show_bug.cgi?id=23686 +CVE-2018-17359 - https://sourceware.org/bugzilla/show_bug.cgi?id=23686 +CVE-2018-17360 - https://sourceware.org/bugzilla/show_bug.cgi?id=23685 +CVE-2018-17365 - https://github.com/sfh320/seacms/issues/1 +CVE-2018-17374 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17374 - https://www.exploit-db.com/exploits/45456 +CVE-2018-17375 - http://packetstormsecurity.com/files/149521/Joomla-Music-Collection-3.0.3-SQL-Injection.html +CVE-2018-17375 - https://www.exploit-db.com/exploits/45465/ +CVE-2018-17376 - http://packetstormsecurity.com/files/149531/Joomla-Reverse-Auction-Factory-4.3.8-SQL-Injection.html +CVE-2018-17376 - https://www.exploit-db.com/exploits/45475/ +CVE-2018-17377 - http://packetstormsecurity.com/files/149523/Joomla-Questions-1.4.3-SQL-Injection.html +CVE-2018-17377 - https://www.exploit-db.com/exploits/45468/ +CVE-2018-17378 - http://packetstormsecurity.com/files/149522/Joomla-Penny-Auction-Factory-2.0.4-SQL-Injection.html +CVE-2018-17378 - https://www.exploit-db.com/exploits/45466/ +CVE-2018-17379 - http://packetstormsecurity.com/files/149520/Joomla-Raffle-Factory-3.5.2-SQL-Injection.html +CVE-2018-17379 - https://www.exploit-db.com/exploits/45464/ +CVE-2018-17380 - http://packetstormsecurity.com/files/149533/Joomla-Article-Factory-Manager-4.3.9-SQL-Injection.html +CVE-2018-17380 - https://www.exploit-db.com/exploits/45477/ +CVE-2018-17381 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17381 - https://www.exploit-db.com/exploits/45462 +CVE-2018-17382 - http://packetstormsecurity.com/files/149524/Joomla-Jobs-Factory-2.0.4-SQL-Injection.html +CVE-2018-17382 - https://www.exploit-db.com/exploits/45469/ +CVE-2018-17383 - http://packetstormsecurity.com/files/149530/Joomla-Collection-Factory-4.1.9-SQL-Injection.html +CVE-2018-17383 - https://www.exploit-db.com/exploits/45474/ +CVE-2018-17384 - http://packetstormsecurity.com/files/149529/Joomla-Swap-Factory-2.2.1-SQL-Injection.html +CVE-2018-17384 - https://www.exploit-db.com/exploits/45473/ +CVE-2018-17385 - http://packetstormsecurity.com/files/149525/Joomla-Social-Factory-3.8.3-SQL-Injection.html +CVE-2018-17385 - https://www.exploit-db.com/exploits/45470/ +CVE-2018-17386 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17386 - https://www.exploit-db.com/exploits/45452 +CVE-2018-17387 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17387 - https://www.exploit-db.com/exploits/42648 +CVE-2018-17388 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17388 - https://www.exploit-db.com/exploits/46139 +CVE-2018-17389 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17389 - https://www.exploit-db.com/exploits/46140 +CVE-2018-17391 - http://packetstormsecurity.com/files/149519/Super-Cms-Blog-Pro-1.0-SQL-Injection.html +CVE-2018-17391 - https://www.exploit-db.com/exploits/45463/ +CVE-2018-17393 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17393 - https://www.exploit-db.com/exploits/46148 +CVE-2018-17394 - http://packetstormsecurity.com/files/149534/Joomla-Timetable-Schedule-3.6.8-SQL-Injection.html +CVE-2018-17394 - https://www.exploit-db.com/exploits/45478/ +CVE-2018-17397 - http://packetstormsecurity.com/files/149532/Joomla-AlphaIndex-Dictionaries-1.0-SQL-Injection.html +CVE-2018-17397 - https://www.exploit-db.com/exploits/45476/ +CVE-2018-17398 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17398 - https://www.exploit-db.com/exploits/45451 +CVE-2018-17399 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17399 - https://www.exploit-db.com/exploits/45524 +CVE-2018-17408 - https://www.exploit-db.com/exploits/45505/ +CVE-2018-17408 - https://www.exploit-db.com/exploits/45560/ +CVE-2018-17412 - https://github.com/seedis/zzcms/blob/master/README.md +CVE-2018-17414 - https://github.com/seedis/zzcms/blob/master/SQL%20injection.md +CVE-2018-17415 - https://github.com/seedis/zzcms/blob/master/SQL%20injection%20in%20zs_elite.php.md +CVE-2018-17416 - https://github.com/seedis/zzcms/blob/master/SQL%20injection%20in%20%20addclass.md +CVE-2018-17419 - https://github.com/miekg/dns/issues/742 +CVE-2018-17420 - https://github.com/94fzb/zrlog/issues/37 +CVE-2018-17421 - https://github.com/94fzb/zrlog/issues/39 +CVE-2018-17423 - https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc +CVE-2018-17423 - https://github.com/e107inc/e107/issues/3414 +CVE-2018-17425 - https://github.com/wuzhicms/wuzhicms/issues/153 +CVE-2018-17426 - https://github.com/wuzhicms/wuzhicms/issues/154 +CVE-2018-17428 - https://www.exploit-db.com/exploits/45518/ +CVE-2018-17431 - http://packetstormsecurity.com/files/159246/Comodo-Unified-Threat-Management-Web-Console-2.7.0-Remote-Code-Execution.html +CVE-2018-17431 - https://github.com/Fadavvi/CVE-2018-17431-PoC#confirmation-than-bug-exist-2018-09-25-ticket-id-xwr-503-79437 +CVE-2018-17432 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode +CVE-2018-17433 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc +CVE-2018-17434 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters +CVE-2018-17435 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln7#heap-overflow-in-h5o_attr_decode +CVE-2018-17436 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#invalid-write-memory-access-in-decompressc +CVE-2018-17437 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper +CVE-2018-17438 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect +CVE-2018-17439 - https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#stack-overflow-in-h5s_extent_get_dims +CVE-2018-17440 - http://seclists.org/fulldisclosure/2018/Oct/11 +CVE-2018-17440 - https://www.exploit-db.com/exploits/45533/ +CVE-2018-17441 - http://seclists.org/fulldisclosure/2018/Oct/11 +CVE-2018-17441 - https://www.exploit-db.com/exploits/45533/ +CVE-2018-17442 - http://seclists.org/fulldisclosure/2018/Oct/11 +CVE-2018-17442 - https://www.exploit-db.com/exploits/45533/ +CVE-2018-17443 - http://seclists.org/fulldisclosure/2018/Oct/11 +CVE-2018-17443 - https://www.exploit-db.com/exploits/45533/ +CVE-2018-17456 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html +CVE-2018-17456 - https://www.exploit-db.com/exploits/45548/ +CVE-2018-17456 - https://www.exploit-db.com/exploits/45631/ +CVE-2018-17463 - http://packetstormsecurity.com/files/156640/Google-Chrome-67-68-69-Object.create-Type-Confusion.html +CVE-2018-17532 - http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html +CVE-2018-17532 - http://seclists.org/fulldisclosure/2018/Oct/27 +CVE-2018-17532 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection +CVE-2018-17533 - http://packetstormsecurity.com/files/149781/Teltonika-RUT9XX-Reflected-Cross-Site-Scripting.html +CVE-2018-17533 - http://seclists.org/fulldisclosure/2018/Oct/29 +CVE-2018-17533 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180410-01_Teltonika_Cross_Site_Scripting +CVE-2018-17534 - http://packetstormsecurity.com/files/149779/Teltonika-RUT9XX-Missing-Access-Control-To-UART-Root-Terminal.html +CVE-2018-17534 - http://seclists.org/fulldisclosure/2018/Oct/28 +CVE-2018-17534 - https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-02_Teltonika_Incorrect_Access_Control +CVE-2018-17552 - https://www.exploit-db.com/exploits/45561/ +CVE-2018-17553 - https://www.exploit-db.com/exploits/45561/ +CVE-2018-17558 - https://sec.maride.cc/posts/abus/ +CVE-2018-17559 - https://sec.maride.cc/posts/abus/#cve-2018-17559 +CVE-2018-1756 - https://www.exploit-db.com/exploits/45392/ +CVE-2018-17562 - https://securityshards.wordpress.com/2018/10/02/cve-2018-17562-faxfinder-5-0-5-8-sqlite-inejection-vulnerability/ +CVE-2018-17572 - https://gist.github.com/Raghavrao29/1cb84f1f2d8ce993fd7b2d1366d35f48 +CVE-2018-17573 - https://cxsecurity.com/issue/WLB-2018090255 +CVE-2018-17573 - https://packetstormsecurity.com/files/149568/WordPress-WP-Insert-2.4.2-Arbitrary-File-Upload.html +CVE-2018-17580 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay +CVE-2018-17580 - https://github.com/appneta/tcpreplay/issues/485 +CVE-2018-17581 - https://github.com/Exiv2/exiv2/issues/460 +CVE-2018-17581 - https://github.com/SegfaultMasters/covering360/blob/master/Exiv2 +CVE-2018-17582 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay +CVE-2018-17582 - https://github.com/appneta/tcpreplay/issues/484 +CVE-2018-17583 - https://wpvulndb.com/vulnerabilities/9696 +CVE-2018-17584 - https://wpvulndb.com/vulnerabilities/9696 +CVE-2018-17585 - https://wpvulndb.com/vulnerabilities/9696 +CVE-2018-17586 - https://wpvulndb.com/vulnerabilities/9696 +CVE-2018-17587 - http://packetstormsecurity.com/files/149600/Airties-AIR5750-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17587 - https://www.exploit-db.com/exploits/45525/ +CVE-2018-17588 - http://packetstormsecurity.com/files/149598/Airties-AIR5021-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17588 - https://www.exploit-db.com/exploits/45525/ +CVE-2018-17589 - http://packetstormsecurity.com/files/149599/Airties-AIR5650-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17590 - http://packetstormsecurity.com/files/149594/Airties-AIR5443v2-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17590 - https://www.exploit-db.com/exploits/45525/ +CVE-2018-17591 - http://packetstormsecurity.com/files/149592/Airties-AIR5343v2-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17591 - https://www.exploit-db.com/exploits/45525/ +CVE-2018-17593 - http://packetstormsecurity.com/files/149595/Airties-AIR5453-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17593 - https://www.exploit-db.com/exploits/45525/ +CVE-2018-17594 - http://packetstormsecurity.com/files/149593/Airties-AIR5442-1.0.0.18-Cross-Site-Scripting.html +CVE-2018-17595 - https://packetstormsecurity.com/files/149596/CVE-2018-17595.txt +CVE-2018-17596 - http://packetstormsecurity.com/files/149597/ManageEngine-AssetExplorer-6.2.0-Cross-Site-Scripting.html +CVE-2018-17613 - https://www.inputzero.io/2018/09/telegram-share-password-in-cleartext.html +CVE-2018-17765 - https://youtu.be/gtbS3Gr264w +CVE-2018-17765 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17766 - https://youtu.be/gtbS3Gr264w +CVE-2018-17766 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17767 - https://youtu.be/gtbS3Gr264w +CVE-2018-17767 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17768 - https://youtu.be/gtbS3Gr264w +CVE-2018-17768 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17769 - https://youtu.be/gtbS3Gr264w +CVE-2018-17769 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17770 - https://youtu.be/gtbS3Gr264w +CVE-2018-17770 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17771 - https://youtu.be/gtbS3Gr264w +CVE-2018-17771 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17772 - https://youtu.be/gtbS3Gr264w +CVE-2018-17772 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17773 - https://youtu.be/gtbS3Gr264w +CVE-2018-17773 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17774 - https://youtu.be/gtbS3Gr264w +CVE-2018-17774 - https://youtu.be/oyUD7RDJsJs +CVE-2018-17775 - https://packetstormsecurity.com/files/149586/Seqrite-End-Point-Security-7.4-Privilege-Escalation.html +CVE-2018-17775 - https://www.exploit-db.com/exploits/45568/ +CVE-2018-17776 - https://packetstormsecurity.com/files/149581/PCProtect-4-8.35-Privilege-Escalation.html +CVE-2018-17776 - https://www.exploit-db.com/exploits/45503/ +CVE-2018-17784 - https://www.exploit-db.com/exploits/45594/ +CVE-2018-17784 - https://www.purplemet.com/blog/sugarcrm-multiple-xss-vulnerabilities +CVE-2018-17786 - https://xz.aliyun.com/t/2834 +CVE-2018-17787 - https://xz.aliyun.com/t/2834 +CVE-2018-17789 - http://packetstormsecurity.com/files/154498/Master-Data-Online-Cross-Site-Request-Forgery-Data-Tampering.html +CVE-2018-17789 - https://packetstormsecurity.com/files/cve/CVE-2018-17789 +CVE-2018-17790 - http://packetstormsecurity.com/files/154001/Master-Data-Online-2.0-Cross-Site-Scripting.html +CVE-2018-17790 - https://packetstormsecurity.com/files/cve/CVE-2018-17790 +CVE-2018-17791 - http://packetstormsecurity.com/files/154061/OmniDoc-7.0-Input-Validation.html +CVE-2018-17791 - https://packetstormsecurity.com/files/cve/CVE-2018-17791 +CVE-2018-17792 - http://packetstormsecurity.com/files/153686/WorldClient-14-Cross-Site-Request-Forgery.html +CVE-2018-17792 - https://packetstormsecurity.com/files/cve/CVE-2018-17792 +CVE-2018-17794 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350 +CVE-2018-17795 - http://bugzilla.maptools.org/show_bug.cgi?id=2816 +CVE-2018-17795 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-17795 +CVE-2018-17797 - https://github.com/seedis/zzcms/blob/master/arbitrary_file_deletion1.md +CVE-2018-17798 - https://github.com/seedis/zzcms/blob/master/arbitrary_file_deletion2.md +CVE-2018-17830 - https://github.com/redaxo/redaxo4/issues/421 +CVE-2018-17831 - https://github.com/redaxo/redaxo/issues/2043 +CVE-2018-17832 - https://cxsecurity.com/issue/WLB-2018050139 +CVE-2018-17832 - https://www.exploit-db.com/exploits/45514/ +CVE-2018-17840 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17840 - https://www.exploit-db.com/exploits/45510 +CVE-2018-17841 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17841 - https://www.exploit-db.com/exploits/41674 +CVE-2018-17842 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17842 - https://www.exploit-db.com/exploits/45509 +CVE-2018-17843 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-17843 - https://www.exploit-db.com/exploits/45511 +CVE-2018-17849 - https://cxsecurity.com/issue/WLB-2018100018 +CVE-2018-17852 - https://github.com/wuzhicms/wuzhicms/issues/155 +CVE-2018-17861 - http://packetstormsecurity.com/files/151945/SAP-J2EE-Engine-7.01-Portal-EPP-Protocol-Cross-Site-Scripting.html +CVE-2018-17861 - http://seclists.org/fulldisclosure/2019/Mar/6 +CVE-2018-17861 - https://seclists.org/bugtraq/2019/Mar/4 +CVE-2018-17862 - http://packetstormsecurity.com/files/151946/SAP-J2EE-Engine-7.01-Fiori-test2-Cross-Site-Scripting.html +CVE-2018-17862 - https://seclists.org/bugtraq/2019/Mar/5 +CVE-2018-17866 - https://serhack.me/articles/ultimate-member-xss-security-issue +CVE-2018-17866 - https://wpvulndb.com/vulnerabilities/9615 +CVE-2018-17871 - http://packetstormsecurity.com/files/149651/Collaboration-Compliance-And-Quality-Management-Platform-9.1.1.5482-Disclosure.html +CVE-2018-17871 - https://seclists.org/bugtraq/2018/Oct/12 +CVE-2018-17871 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-023.txt +CVE-2018-17872 - http://packetstormsecurity.com/files/149652/Collaboration-Compliance-And-Quality-Management-Platform-9.1.1.5482-Improper-Access-Control.html +CVE-2018-17872 - https://seclists.org/bugtraq/2018/Oct/13 +CVE-2018-17872 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-024.txt +CVE-2018-17873 - http://packetstormsecurity.com/files/149867/WiFiRanger-7.0.8rc3-Incorrect-Access-Control-Privilege-Escalation.html +CVE-2018-17876 - http://packetstormsecurity.com/files/149647/Coaster-CMS-5.5.0-Cross-Site-Scripting.html +CVE-2018-17878 - https://sec.maride.cc/posts/abus/#cve-2018-17878 +CVE-2018-17879 - https://sec.maride.cc/posts/abus/#cve-2018-17879 +CVE-2018-17880 - https://xz.aliyun.com/t/2834#toc-5 +CVE-2018-17881 - https://xz.aliyun.com/t/2834#toc-5 +CVE-2018-17914 - https://www.tenable.com/security/research/tra-2018-34 +CVE-2018-17916 - https://www.tenable.com/security/research/tra-2018-34 +CVE-2018-17947 - http://www.defensecode.com/advisories/DC-2018-05-006_WordPress_Snazzy_Maps_Plugin_Advisory.pdf +CVE-2018-1796 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2018-17961 - https://www.exploit-db.com/exploits/45573/ +CVE-2018-17964 - https://packetstormsecurity.com/files/149823/HighPortal-12.5-Cross-Site-Scripting.html +CVE-2018-17972 - https://usn.ubuntu.com/3821-1/ +CVE-2018-17972 - https://usn.ubuntu.com/3821-2/ +CVE-2018-17974 - https://github.com/SegfaultMasters/covering360/tree/master/tcpreplay +CVE-2018-17974 - https://github.com/appneta/tcpreplay/issues/486 +CVE-2018-17975 - https://gitlab.com/gitlab-org/gitlab-ce/issues/50744 +CVE-2018-17976 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51581 +CVE-2018-17980 - http://hyp3rlinx.altervista.org/advisories/NOMACHINE-TROJAN-FILE-REMOTE-CODE-EXECUTION.txt +CVE-2018-17980 - http://packetstormsecurity.com/files/149784/NoMachine-5.3.26-Remote-Code-Execution.html +CVE-2018-17980 - https://www.exploit-db.com/exploits/45611/ +CVE-2018-17985 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335 +CVE-2018-17988 - https://github.com/AndyRixon/LayerBB/issues/51 +CVE-2018-17988 - https://www.exploit-db.com/exploits/45530/ +CVE-2018-17996 - http://packetstormsecurity.com/files/151694/LayerBB-1.1.2-Cross-Site-Request-Forgery.html +CVE-2018-17996 - https://www.exploit-db.com/exploits/46379/ +CVE-2018-17997 - http://packetstormsecurity.com/files/151015/LayerBB-1.1.1-Cross-Site-Scripting.html +CVE-2018-17997 - https://www.exploit-db.com/exploits/46079/ +CVE-2018-18006 - http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html +CVE-2018-18006 - http://seclists.org/fulldisclosure/2018/Nov/46 +CVE-2018-18013 - https://advisories.dxw.com/advisories/xen-mobile-vulnerable-to-code-execution-via-object-serialisation/ +CVE-2018-18014 - https://advisories.dxw.com/advisories/xen-mobile-backing-service-allows-unauthenticated-local-users-to-execute-system-commands-as-root/ +CVE-2018-18020 - https://github.com/qpdf/qpdf/issues/243 +CVE-2018-18021 - https://usn.ubuntu.com/3821-1/ +CVE-2018-18021 - https://usn.ubuntu.com/3821-2/ +CVE-2018-18023 - https://github.com/ImageMagick/ImageMagick/issues/1336 +CVE-2018-18024 - https://github.com/ImageMagick/ImageMagick/issues/1337 +CVE-2018-18025 - https://github.com/ImageMagick/ImageMagick/issues/1335 +CVE-2018-18035 - https://www.purplemet.com/blog/openemr-xss-vulnerability +CVE-2018-18058 - https://www.bitdefender.com/ +CVE-2018-18059 - https://www.bitdefender.com/ +CVE-2018-18060 - https://www.bitdefender.com/ +CVE-2018-18061 - https://seclists.org/bugtraq/2018/Oct/25 +CVE-2018-18062 - https://seclists.org/bugtraq/2018/Oct/26 +CVE-2018-18064 - https://gitlab.freedesktop.org/cairo/cairo/issues/341 +CVE-2018-18065 - https://dumpco.re/blog/net-snmp-5.7.3-remote-dos +CVE-2018-18065 - https://www.exploit-db.com/exploits/45547/ +CVE-2018-18065 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-18066 - https://dumpco.re/blog/net-snmp-5.7.3-remote-dos +CVE-2018-18066 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-18069 - https://0x62626262.wordpress.com/2018/10/08/sitepress-multilingual-cms-plugin-unauthenticated-stored-xss/ +CVE-2018-18073 - http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html +CVE-2018-18074 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2018-18075 - https://seccops.com/wikidforum-2-20-multiple-sql-injection-vulnerabilities/ +CVE-2018-18075 - https://www.exploit-db.com/exploits/45564/ +CVE-2018-18087 - https://github.com/Bixie/pagekit-portfolio/issues/44 +CVE-2018-18088 - https://github.com/uclouvain/openjpeg/issues/1152 +CVE-2018-18089 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-18089 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-18090 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-18090 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-18091 - https://support.lenovo.com/us/en/product_security/LEN-25084 +CVE-2018-18091 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html +CVE-2018-18198 - https://github.com/redaxo/redaxo4/issues/422 +CVE-2018-18207 - https://0day.today/exploit/description/31282 +CVE-2018-18208 - https://0day.today/exploit/description/31282 +CVE-2018-18209 - https://github.com/chekun/DiliCMS/issues/59 +CVE-2018-1821 - https://www.exploit-db.com/exploits/46017/ +CVE-2018-18210 - https://github.com/chekun/DiliCMS/issues/59 +CVE-2018-18227 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-18252 - https://improsec.com/tech-blog/cam1 +CVE-2018-18253 - https://improsec.com/tech-blog/cam1 +CVE-2018-18254 - https://improsec.com/tech-blog/cam1 +CVE-2018-18255 - https://improsec.com/tech-blog/cam1 +CVE-2018-18256 - https://improsec.com/tech-blog/cam1 +CVE-2018-18258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2018-18259 - http://packetstormsecurity.com/files/149771/LUYA-CMS-1.0.12-Cross-Site-Scripting.html +CVE-2018-18260 - http://packetstormsecurity.com/files/149772/CAMALEON-CMS-2.4-Cross-Site-Scripting.html +CVE-2018-18274 - https://github.com/TeamSeri0us/pocs/tree/master/pdfalto +CVE-2018-18276 - http://www.cinquino.eu/ProFiles%201.5%20Free%20Version%20Component%20Xss.htm +CVE-2018-18281 - http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html +CVE-2018-18287 - https://github.com/remix30303/AsusLeak +CVE-2018-18307 - http://packetstormsecurity.com/files/149787/Alchemy-CMS-4.1-Stable-Cross-Site-Scripting.html +CVE-2018-18308 - http://packetstormsecurity.com/files/149788/BigTree-CMS-4.2.23-Cross-Site-Scripting.html +CVE-2018-18308 - https://www.exploit-db.com/exploits/45628/ +CVE-2018-18309 - https://sourceware.org/bugzilla/show_bug.cgi?id=23770 +CVE-2018-18310 - https://sourceware.org/bugzilla/show_bug.cgi?id=23752 +CVE-2018-18311 - https://hackerone.com/reports/424447 +CVE-2018-18311 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-18311 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-18312 - https://hackerone.com/reports/510887 +CVE-2018-18312 - https://rt.perl.org/Public/Bug/Display.html?id=133423 +CVE-2018-18312 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-18313 - https://hackerone.com/reports/510888 +CVE-2018-18313 - https://rt.perl.org/Ticket/Display.html?id=133192 +CVE-2018-18313 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-18314 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-18318 - https://github.com/datadancer/HIAFuzz/blob/master/360%20Phone%20N6%20Pro%20Kernel%20Vuln.md +CVE-2018-18319 - http://blog.51cto.com/010bjsoft/2298902 +CVE-2018-18319 - https://github.com/qoli/Merlin.PHP/issues/27 +CVE-2018-18320 - https://github.com/qoli/Merlin.PHP/issues/26 +CVE-2018-18322 - https://0day.today/exploit/31304 +CVE-2018-18322 - https://www.exploit-db.com/exploits/45610/ +CVE-2018-18323 - https://0day.today/exploit/31304 +CVE-2018-18323 - https://www.exploit-db.com/exploits/45610/ +CVE-2018-18324 - https://0day.today/exploit/31304 +CVE-2018-18324 - https://www.exploit-db.com/exploits/45610/ +CVE-2018-18325 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html +CVE-2018-18326 - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html +CVE-2018-18333 - https://kaganisildak.com/2019/01/17/discovery-of-dll-hijack-on-trend-micro-antivirus-cve-2018-18333/ +CVE-2018-18372 - http://packetstormsecurity.com/files/149805/Library-CMS-2.1.1-Cross-Site-Scripting.html +CVE-2018-18373 - http://packetstormsecurity.com/files/149806/WordPress-Support-Board-1.2.3-Cross-Site-Scripting.html +CVE-2018-18373 - https://wpvulndb.com/vulnerabilities/9707 +CVE-2018-18375 - https://github.com/remix30303/AirBoxAPNLeaks +CVE-2018-18376 - https://github.com/remix30303/AirboxLeak +CVE-2018-18377 - https://github.com/remix30303/AirBoxDoom +CVE-2018-18381 - https://github.com/seedis/Z-BlogPHP/blob/master/Z-BlogPHP_stored_xss.md +CVE-2018-18382 - https://www.exploit-db.com/exploits/45604/ +CVE-2018-18388 - http://blog.escanav.com/2018/11/cve-2018-18388/ +CVE-2018-18397 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7 +CVE-2018-18397 - https://usn.ubuntu.com/3901-1/ +CVE-2018-18398 - https://0xd0ff9.wordpress.com/2018/10/18/cve-2018-18398/ +CVE-2018-18399 - http://packetstormsecurity.com/files/150810/KARMA-6.0.0-SQL-Injection.html +CVE-2018-18406 - https://www.exploit-db.com/exploits/45808 +CVE-2018-18407 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#user-content-heap-overflow-in-csum_replace4 +CVE-2018-18407 - https://github.com/appneta/tcpreplay/issues/488 +CVE-2018-18408 - https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#use-after-free-in-post_args +CVE-2018-18409 - https://github.com/simsong/tcpflow/issues/195 +CVE-2018-18416 - http://packetstormsecurity.com/files/149841/LANGO-Codeigniter-Multilingual-Script-1.0-Cross-Site-Scripting.html +CVE-2018-18416 - https://www.exploit-db.com/exploits/45672/ +CVE-2018-18417 - http://packetstormsecurity.com/files/149842/Ekushey-Project-Manager-CRM-3.1-Cross-Site-Scripting.html +CVE-2018-18417 - https://www.exploit-db.com/exploits/45681/ +CVE-2018-18419 - http://packetstormsecurity.com/files/149850/User-Management-1.1-Cross-Site-Scripting.html +CVE-2018-18419 - https://www.exploit-db.com/exploits/45686/ +CVE-2018-18420 - http://packetstormsecurity.com/files/149851/Zenar-Content-Management-System-8.3-Cross-Site-Request-Forgery.html +CVE-2018-18428 - https://packetstormsecurity.com/files/149843 +CVE-2018-18428 - https://www.exploit-db.com/exploits/45632/ +CVE-2018-18428 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5497.php +CVE-2018-18435 - http://packetstormsecurity.com/files/151031/KioWare-Server-4.9.6-Privilege-Escalation.html +CVE-2018-18435 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-002.md +CVE-2018-18435 - https://www.exploit-db.com/exploits/46093/ +CVE-2018-18436 - https://github.com/w3irdo001/demo/blob/master/1.html +CVE-2018-18437 - http://www.binaryworld.it/guidepoc.asp +CVE-2018-18437 - https://www.exploit-db.com/exploits/45668/ +CVE-2018-18443 - https://github.com/openexr/openexr/issues/350 +CVE-2018-18444 - https://github.com/openexr/openexr/issues/351 +CVE-2018-18449 - https://github.com/w3irdo001/demo/blob/master/3.html +CVE-2018-18454 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm +CVE-2018-18455 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm +CVE-2018-18456 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm +CVE-2018-18457 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm +CVE-2018-18458 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm +CVE-2018-18459 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm +CVE-2018-18460 - https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf +CVE-2018-18471 - https://www.wizcase.com/blog/hack-2018/ +CVE-2018-18472 - https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo +CVE-2018-18472 - https://www.wizcase.com/blog/hack-2018/ +CVE-2018-18475 - http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html +CVE-2018-18478 - https://github.com/librenms/librenms/issues/9170 +CVE-2018-18478 - https://hackpuntes.com/cve-2018-18478-libre-nms-1-43-cross-site-scripting-persistente/ +CVE-2018-18480 - https://github.com/sandyre/libopencad/issues/43 +CVE-2018-18481 - https://github.com/sandyre/libopencad/issues/43 +CVE-2018-18483 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602 +CVE-2018-18483 - https://sourceware.org/bugzilla/show_bug.cgi?id=23767 +CVE-2018-18484 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636 +CVE-2018-18485 - https://gitee.com/koyshe/phpshe/issues/INOG4 +CVE-2018-18489 - https://youtu.be/VGNEYWR9MgY +CVE-2018-18494 - https://bugzilla.mozilla.org/show_bug.cgi?id=1487964 +CVE-2018-18496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1422231 +CVE-2018-18499 - https://bugzilla.mozilla.org/show_bug.cgi?id=1468523 +CVE-2018-18500 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18501 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18502 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18503 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18504 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18505 - https://bugzilla.mozilla.org/show_bug.cgi?id=1087565 +CVE-2018-18505 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18506 - https://usn.ubuntu.com/3874-1/ +CVE-2018-18509 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2018-18511 - https://bugzilla.mozilla.org/show_bug.cgi?id=1526218 +CVE-2018-18520 - https://sourceware.org/bugzilla/show_bug.cgi?id=23787 +CVE-2018-18521 - https://sourceware.org/bugzilla/show_bug.cgi?id=23786 +CVE-2018-18527 - https://www.exploit-db.com/exploits/45637/ +CVE-2018-18535 - http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html +CVE-2018-18535 - http://seclists.org/fulldisclosure/2018/Dec/34 +CVE-2018-18536 - http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html +CVE-2018-18536 - http://seclists.org/fulldisclosure/2018/Dec/34 +CVE-2018-18537 - http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html +CVE-2018-18537 - http://seclists.org/fulldisclosure/2018/Dec/34 +CVE-2018-18547 - http://packetstormsecurity.com/files/149897/VestaCP-0.9.8-22-Cross-Site-Scripting.html +CVE-2018-18548 - http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html +CVE-2018-18548 - https://www.exploit-db.com/exploits/45691/ +CVE-2018-18551 - http://hyp3rlinx.altervista.org/advisories/CVE-2018-18551-SERVERSCHECK-MONITORING-SOFTWARE-CROSS-SITE-SCRIPTING.txt +CVE-2018-18551 - http://packetstormsecurity.com/files/149914/ServersCheck-Monitoring-Software-14.3.3-Cross-Site-Scripting.html +CVE-2018-18552 - http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt +CVE-2018-18552 - http://packetstormsecurity.com/files/149907/ServersCheck-Monitoring-Software-14.3.3-Arbitrary-File-Write-DoS.html +CVE-2018-18555 - https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases +CVE-2018-18556 - http://packetstormsecurity.com/files/159234/VyOS-restricted-shell-Escape-Privilege-Escalation.html +CVE-2018-18556 - https://blog.mirch.io/2018/11/05/cve-2018-18556-vyos-privilege-escalation-via-sudo-pppd-for-operator-users/ +CVE-2018-18556 - https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases +CVE-2018-18557 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-18557 +CVE-2018-18557 - https://www.exploit-db.com/exploits/45694/ +CVE-2018-18561 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 +CVE-2018-18562 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 +CVE-2018-18563 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 +CVE-2018-18564 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 +CVE-2018-18565 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-310-01 +CVE-2018-18566 - https://seclists.org/bugtraq/2018/Oct/33 +CVE-2018-18566 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-028.txt +CVE-2018-18567 - https://seclists.org/bugtraq/2018/Oct/32 +CVE-2018-18567 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-026.txt +CVE-2018-18568 - https://seclists.org/bugtraq/2018/Oct/36 +CVE-2018-18568 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt +CVE-2018-18569 - https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/ +CVE-2018-18599 - https://github.com/abeluck/stegdetect/issues/10 +CVE-2018-18600 - https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/ +CVE-2018-18601 - https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/ +CVE-2018-18602 - https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/ +CVE-2018-18605 - https://sourceware.org/bugzilla/show_bug.cgi?id=23804 +CVE-2018-18606 - https://sourceware.org/bugzilla/show_bug.cgi?id=23806 +CVE-2018-18607 - https://sourceware.org/bugzilla/show_bug.cgi?id=23805 +CVE-2018-18619 - http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html +CVE-2018-18619 - http://seclists.org/fulldisclosure/2018/Nov/30 +CVE-2018-18619 - https://www.exploit-db.com/exploits/45853/ +CVE-2018-18621 - http://packetstormsecurity.com/files/149916/CommuniGatePro-Pronto-Webmail-6.2-Cross-Site-Scripting.html +CVE-2018-18629 - https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/ +CVE-2018-18635 - https://github.com/MailCleaner/MailCleaner/issues/53 +CVE-2018-18636 - https://cxsecurity.com/issue/WLB-2018100107 +CVE-2018-18636 - https://packetstormsecurity.com/files/149785/D-Link-DSL-2640T-Cross-Site-Scripting.html +CVE-2018-18640 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51423 +CVE-2018-18644 - https://gitlab.com/gitlab-org/gitlab-ee/issues/7528 +CVE-2018-18646 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51142 +CVE-2018-18650 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 +CVE-2018-18651 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 +CVE-2018-18656 - https://www.trustwave.com/Resources/SpiderLabs-Blog/Credential-Leak-Flaws-in-Windows-PureVPN-Client/ +CVE-2018-18661 - http://bugzilla.maptools.org/show_bug.cgi?id=2819 +CVE-2018-18662 - https://bugs.ghostscript.com/show_bug.cgi?id=700043 +CVE-2018-18662 - https://github.com/TeamSeri0us/pocs/tree/master/mupdf +CVE-2018-18665 - https://etherscan.io/address/0x7627de4b93263a6a7570b8dafa64bae812e5c394#code +CVE-2018-18688 - https://pdf-insecurity.org/signature/evaluation_2018.html +CVE-2018-18689 - https://pdf-insecurity.org/signature/evaluation_2018.html +CVE-2018-18695 - https://github.com/DelspoN/CVE/tree/master/CVE-2018-18695 +CVE-2018-18696 - https://raw.githubusercontent.com/Siros96/MicroStrategy_CSRF/master/PoC +CVE-2018-18696 - https://seclists.org/bugtraq/2018/Dec/3 +CVE-2018-18699 - https://github.com/gopro/gpmf-parser/issues/43 +CVE-2018-18700 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681 +CVE-2018-18701 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675 +CVE-2018-18703 - https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html +CVE-2018-18704 - https://www.exploit-db.com/exploits/45682/ +CVE-2018-18705 - https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html +CVE-2018-18706 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-06/Tenda.md +CVE-2018-18707 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-07/Tenda.md +CVE-2018-18708 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-05/Tenda.md +CVE-2018-18709 - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-08/Tenda.md +CVE-2018-18711 - https://github.com/wuzhicms/wuzhicms/issues/156 +CVE-2018-18712 - https://github.com/wuzhicms/wuzhicms/issues/156 +CVE-2018-18715 - http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html +CVE-2018-18715 - http://seclists.org/fulldisclosure/2018/Nov/3 +CVE-2018-18716 - http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html +CVE-2018-18716 - http://seclists.org/fulldisclosure/2018/Nov/6 +CVE-2018-18720 - https://github.com/source-trace/yunucms/issues/2 +CVE-2018-18721 - https://github.com/source-trace/yunucms/issues/7 +CVE-2018-18722 - https://github.com/source-trace/yunucms/issues/6 +CVE-2018-18723 - https://github.com/source-trace/yunucms/issues/3 +CVE-2018-18724 - https://github.com/source-trace/yunucms/issues/5 +CVE-2018-18725 - https://github.com/source-trace/yunucms/issues/4 +CVE-2018-18726 - https://github.com/source-trace/yunucms/issues/8 +CVE-2018-18727 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack1.md +CVE-2018-18728 - https://github.com/ZIllR0/Routers/blob/master/Tenda/rce1.md +CVE-2018-18729 - https://github.com/ZIllR0/Routers/blob/master/Tenda/heapoverflow1.md +CVE-2018-18730 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack3.md +CVE-2018-18731 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack4.md +CVE-2018-18732 - https://github.com/ZIllR0/Routers/blob/master/Tenda/stack2.md +CVE-2018-18735 - https://github.com/AvaterXXX/catfish/blob/master/catfishblog.md#csrf +CVE-2018-18736 - https://github.com/AvaterXXX/catfish/blob/master/catfishblog.md#xss +CVE-2018-18737 - https://github.com/AvaterXXX/douchat/blob/master/xxe.md#xxe +CVE-2018-18742 - https://github.com/AvaterXXX/SEMCMS/blob/master/CSRF.md +CVE-2018-18749 - https://github.com/clarkgrubb/data-tools/issues/7 +CVE-2018-18751 - https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree +CVE-2018-18751 - https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption +CVE-2018-18752 - https://packetstormsecurity.com/files/149982/Webiness-Inventory-2.9-Shell-Upload.html +CVE-2018-18753 - https://github.com/wuzhicms/wuzhicms/issues/157 +CVE-2018-18755 - http://packetstormsecurity.com/files/150016/K-iwi-Framework-1775-SQL-Injection.html +CVE-2018-18755 - https://www.exploit-db.com/exploits/45735/ +CVE-2018-18756 - http://packetstormsecurity.com/files/149986/Local-Server-1.0.9-Denial-Of-Service.html +CVE-2018-18757 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-18757 - https://www.exploit-db.com/exploits/45703 +CVE-2018-18758 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-18758 - https://www.exploit-db.com/exploits/45707 +CVE-2018-18759 - http://packetstormsecurity.com/files/150015/Modbus-Slave-7.0.0-Denial-Of-Service.html +CVE-2018-18759 - https://www.exploit-db.com/exploits/45732/ +CVE-2018-18760 - http://packetstormsecurity.com/files/150018/RhinOS-CMS-3.x-Arbitrary-File-Download.html +CVE-2018-18760 - https://www.exploit-db.com/exploits/45729/ +CVE-2018-18761 - https://www.exploit-db.com/exploits/45731/ +CVE-2018-18762 - http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html +CVE-2018-18762 - https://www.exploit-db.com/exploits/45734/ +CVE-2018-18763 - http://packetstormsecurity.com/files/150004/SaltOS-Erp-Crm-3.1-r8126-SQL-Injection.html +CVE-2018-18763 - https://www.exploit-db.com/exploits/45733/ +CVE-2018-18764 - https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow1.md +CVE-2018-18764 - https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow2.md +CVE-2018-18765 - https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20mg_mqtt_next_subscribe_topic%20heap%20buffer%20overflow.md +CVE-2018-18772 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html +CVE-2018-18772 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html +CVE-2018-18772 - https://www.exploit-db.com/exploits/45822/ +CVE-2018-18773 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html +CVE-2018-18773 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html +CVE-2018-18773 - https://www.exploit-db.com/exploits/45822/ +CVE-2018-18774 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-Root-Account-Takeover-Command-Execution.html +CVE-2018-18774 - http://packetstormsecurity.com/files/150169/CentOS-Web-Panel-0.9.8.740-XSS-CSRF-Code-Execution.html +CVE-2018-18774 - https://www.exploit-db.com/exploits/45822/ +CVE-2018-18775 - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html +CVE-2018-18775 - https://www.exploit-db.com/exploits/45755/ +CVE-2018-18776 - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html +CVE-2018-18776 - https://www.exploit-db.com/exploits/45755/ +CVE-2018-18777 - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html +CVE-2018-18777 - https://www.exploit-db.com/exploits/45755/ +CVE-2018-18784 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18785 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18786 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18787 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18788 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18789 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18790 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18791 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18792 - https://github.com/qiubaoyang/CVEs/blob/master/zzcms/zzcms.md +CVE-2018-18793 - http://packetstormsecurity.com/files/150006/School-Event-Management-System-1.0-Shell-Upload.html +CVE-2018-18793 - https://www.exploit-db.com/exploits/45723/ +CVE-2018-18794 - http://packetstormsecurity.com/files/150007/School-Event-Management-System-1.0-Cross-Site-Request-Forgery.html +CVE-2018-18794 - https://www.exploit-db.com/exploits/45724/ +CVE-2018-18795 - http://packetstormsecurity.com/files/150014/School-Event-Management-System-1.0-SQL-Injection.html +CVE-2018-18795 - https://www.exploit-db.com/exploits/45722/ +CVE-2018-18796 - http://packetstormsecurity.com/files/149987/Library-Management-System-1.0-SQL-Injection.html +CVE-2018-18797 - http://packetstormsecurity.com/files/150008/School-Attendance-Monitoring-System-1.0-Cross-Site-Request-Forgery.html +CVE-2018-18797 - https://www.exploit-db.com/exploits/45725/ +CVE-2018-18798 - http://packetstormsecurity.com/files/150010/School-Attendance-Monitoring-System-1.0-SQL-Injection.html +CVE-2018-18798 - https://www.exploit-db.com/exploits/45727/ +CVE-2018-18799 - http://packetstormsecurity.com/files/150009/School-Attendance-Monitoring-System-1.0-Shell-Upload.html +CVE-2018-18799 - https://www.exploit-db.com/exploits/45726/ +CVE-2018-18800 - http://packetstormsecurity.com/files/150019/PayPal-Credit-Card-Debit-Card-Payment-1.0-SQL-Injection.html +CVE-2018-18800 - https://www.exploit-db.com/exploits/45728/ +CVE-2018-18801 - http://packetstormsecurity.com/files/150017/E-Negosyo-System-1.0-SQL-Injection.html +CVE-2018-18801 - https://www.exploit-db.com/exploits/45730/ +CVE-2018-18802 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-18802 - https://www.exploit-db.com/exploits/45718 +CVE-2018-18803 - http://packetstormsecurity.com/files/150011/Curriculum-Evaluation-System-1.0-SQL-Injection.html +CVE-2018-18803 - https://www.exploit-db.com/exploits/45719/ +CVE-2018-18804 - http://packetstormsecurity.com/files/150012/Bakeshop-Inventory-System-In-VB.Net-MS-Access-Database-1.0-SQL-Injection.html +CVE-2018-18804 - https://www.exploit-db.com/exploits/45720/ +CVE-2018-18805 - http://packetstormsecurity.com/files/150013/Point-Of-Sales-POS-In-VB.Net-MYSQL-Database-1.0-SQL-Injection.html +CVE-2018-18805 - https://www.exploit-db.com/exploits/45721/ +CVE-2018-18806 - http://packetstormsecurity.com/files/149996/School-Equipment-Monitoring-System-1.0-SQL-Injection.html +CVE-2018-18809 - http://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html +CVE-2018-18809 - http://seclists.org/fulldisclosure/2019/Sep/17 +CVE-2018-18809 - https://cybersecurityworks.com/zerodays/cve-2018-18809-tibco.html +CVE-2018-18809 - https://security.elarlang.eu/cve-2018-18809-path-traversal-in-tibco-jaspersoft.html +CVE-2018-18822 - https://www.exploit-db.com/exploits/45704/ +CVE-2018-18823 - https://www.linkedin.com/in/subodh-kumar-8a00b1125/ +CVE-2018-18824 - https://www.linkedin.com/in/subodh-kumar-8a00b1125/ +CVE-2018-18826 - https://bugzilla.libav.org/show_bug.cgi?id=1135 +CVE-2018-18827 - https://bugzilla.libav.org/show_bug.cgi?id=1135 +CVE-2018-18828 - https://bugzilla.libav.org/show_bug.cgi?id=1135 +CVE-2018-18829 - https://bugzilla.libav.org/show_bug.cgi?id=1136 +CVE-2018-18831 - https://gitee.com/mingSoft/MCMS/issues/IO0K0 +CVE-2018-18836 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca +CVE-2018-18837 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca +CVE-2018-18838 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca +CVE-2018-18839 - https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca +CVE-2018-18840 - https://github.com/m3lon/XSS-Expoit/blob/master/SEMCMS%20Stored%20XSS%20Vulnerability.md +CVE-2018-18845 - http://packetstormsecurity.com/files/151799/Advanced-Comment-System-1.0-Cross-Site-Scripting.html +CVE-2018-18845 - http://seclists.org/fulldisclosure/2019/Feb/46 +CVE-2018-18856 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html +CVE-2018-18856 - http://seclists.org/fulldisclosure/2018/Nov/1 +CVE-2018-18856 - https://www.exploit-db.com/exploits/45782/ +CVE-2018-18857 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html +CVE-2018-18857 - http://seclists.org/fulldisclosure/2018/Nov/1 +CVE-2018-18857 - https://www.exploit-db.com/exploits/45782/ +CVE-2018-18858 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html +CVE-2018-18858 - http://seclists.org/fulldisclosure/2018/Nov/1 +CVE-2018-18858 - https://www.exploit-db.com/exploits/45782/ +CVE-2018-18859 - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html +CVE-2018-18859 - http://seclists.org/fulldisclosure/2018/Nov/1 +CVE-2018-18859 - https://www.exploit-db.com/exploits/45782/ +CVE-2018-18860 - http://packetstormsecurity.com/files/150323/SwitchVPN-For-MacOS-2.1012.03-Privilege-Escalation.html +CVE-2018-18860 - http://seclists.org/fulldisclosure/2018/Nov/38 +CVE-2018-18860 - https://www.exploit-db.com/exploits/45854/ +CVE-2018-18861 - http://packetstormsecurity.com/files/150174/PCManFTPD-2.0.7-Server-APPE-Command-Buffer-Overflow.html +CVE-2018-18862 - http://packetstormsecurity.com/files/151021/BMC-Remedy-ITAM-7.1.00-9.1.02.003-Information-Disclosure.html +CVE-2018-18864 - http://packetstormsecurity.com/files/150135/Loadbalancer.org-Enterprise-VA-MAX-Cross-Site-Scripting.html +CVE-2018-18864 - http://seclists.org/fulldisclosure/2018/Nov/5 +CVE-2018-18865 - http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html +CVE-2018-18865 - http://seclists.org/fulldisclosure/2018/Nov/25 +CVE-2018-18865 - http://seclists.org/fulldisclosure/2018/Nov/4 +CVE-2018-18865 - https://www.exploit-db.com/exploits/45783/ +CVE-2018-18871 - https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Gigaset_Maxwell.pdf?_=1541431343 +CVE-2018-18872 - https://wpvulndb.com/vulnerabilities/9141 +CVE-2018-18873 - https://github.com/mdadams/jasper/issues/184 +CVE-2018-18873 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-18874 - https://github.com/gnat/nc-cms/issues/11 +CVE-2018-18890 - https://github.com/AvaterXXX/MiniCms/blob/master/Authentication%20and%20Information%20Exposure.md#information-exposure +CVE-2018-18891 - https://github.com/AvaterXXX/MiniCms/blob/master/Authentication%20and%20Information%20Exposure.md#authentication-vulnerability +CVE-2018-18897 - https://gitlab.freedesktop.org/poppler/poppler/issues/654 +CVE-2018-1890 - https://www.ibm.com/support/docview.wss?uid=ibm10873042 +CVE-2018-18903 - https://open.vanillaforums.com/discussion/36771/security-update-vanilla-2-6-4 +CVE-2018-18903 - https://srcincite.io/blog/2018/10/02/old-school-pwning-with-new-school-tricks-vanilla-forums-remote-code-execution.html +CVE-2018-18909 - https://github.com/yaniswang/xhEditor/issues/37 +CVE-2018-18912 - https://github.com/notkisi/CVE-s/blob/master/CVE-2018-18912.py +CVE-2018-18915 - https://github.com/Exiv2/exiv2/issues/511 +CVE-2018-18919 - https://github.com/JaxsonWang/WP-Editor.md/issues/275 +CVE-2018-18920 - https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx/ +CVE-2018-18921 - https://medium.com/bugbountywriteup/cve-2018-18921-php-server-monitor-3-3-1-cross-site-request-forgery-a73e8dae563 +CVE-2018-18922 - https://0day.today/exploit/31658 +CVE-2018-18922 - https://hackpuntes.com/cve-2018-18922-ticketly-1-0-escalacion-de-privilegios-crear-cuenta-administrador/ +CVE-2018-18922 - https://medium.com/@javierolmedo/cve-2018-18922-ticketly-1-0-privilege-escalation-add-admin-4d1b3696f367 +CVE-2018-18922 - https://www.exploit-db.com/exploits/45892 +CVE-2018-18923 - https://hackpuntes.com/cve-2018-18923-ticketly-1-0-multiples-sql-injections/ +CVE-2018-18923 - https://www.exploit-db.com/exploits/45902/ +CVE-2018-18924 - https://www.exploit-db.com/exploits/45680/ +CVE-2018-18928 - https://unicode-org.atlassian.net/browse/ICU-20246 +CVE-2018-18934 - https://github.com/PopojiCMS/PopojiCMS/issues/13 +CVE-2018-18935 - https://github.com/PopojiCMS/PopojiCMS/issues/14 +CVE-2018-18938 - https://github.com/wuzhicms/wuzhicms/issues/158 +CVE-2018-18939 - https://github.com/wuzhicms/wuzhicms/issues/159 +CVE-2018-18940 - http://packetstormsecurity.com/files/150262/Netscape-Enterprise-3.63-Cross-Site-Scripting.html +CVE-2018-18940 - http://seclists.org/fulldisclosure/2018/Nov/31 +CVE-2018-18941 - http://packetstormsecurity.com/files/150263/Vignette-Content-Management-6-Security-Bypass.html +CVE-2018-18941 - http://seclists.org/fulldisclosure/2018/Nov/32 +CVE-2018-18942 - http://sunu11.com/2018/10/31/baserCMS/ +CVE-2018-18943 - http://sunu11.com/2018/10/31/baserCMS/ +CVE-2018-18944 - https://www.exploit-db.com/author/?a=8844 +CVE-2018-18944 - https://www.exploit-db.com/exploits/45760 +CVE-2018-18952 - https://blog.csdn.net/libieme/article/details/83588929 +CVE-2018-18955 - https://www.exploit-db.com/exploits/45886/ +CVE-2018-18955 - https://www.exploit-db.com/exploits/45915/ +CVE-2018-18957 - https://www.exploit-db.com/exploits/45798/ +CVE-2018-18959 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-18959/poc-cve-2018-18959.py +CVE-2018-18960 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-18960/poc-cve-2018-18960.py +CVE-2018-18975 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic +CVE-2018-18976 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic +CVE-2018-18977 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic +CVE-2018-18978 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic +CVE-2018-18979 - https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic +CVE-2018-18980 - https://github.com/x-f1v3/ForCve/issues/5 +CVE-2018-18982 - https://www.exploit-db.com/exploits/46449/ +CVE-2018-19005 - https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01 +CVE-2018-19037 - https://www.exploit-db.com/exploits/45776/ +CVE-2018-19039 - https://www.percona.com/blog/2018/11/20/how-cve-2018-19039-affects-percona-monitoring-and-management/ +CVE-2018-19040 - https://www.exploit-db.com/exploits/45809/ +CVE-2018-19041 - https://www.exploit-db.com/exploits/45809/ +CVE-2018-19042 - https://www.exploit-db.com/exploits/45809/ +CVE-2018-19043 - https://www.exploit-db.com/exploits/45809/ +CVE-2018-19047 - https://github.com/mpdf/mpdf/issues/867 +CVE-2018-19058 - https://gitlab.freedesktop.org/poppler/poppler/issues/659 +CVE-2018-19059 - https://gitlab.freedesktop.org/poppler/poppler/issues/661 +CVE-2018-19063 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19064 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19065 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19066 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19067 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19068 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19069 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19070 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19071 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19072 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19073 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19074 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19075 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19076 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19077 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19078 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19079 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19080 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19081 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19082 - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt +CVE-2018-19092 - https://github.com/yzmcms/yzmcms/issues/7 +CVE-2018-1910 - http://www.ibm.com/support/docview.wss?uid=ibm10875372 +CVE-2018-19105 - https://code610.blogspot.com/2018/11/crashing-librecad-213.html +CVE-2018-19107 - https://github.com/Exiv2/exiv2/pull/518 +CVE-2018-19108 - https://github.com/Exiv2/exiv2/pull/518 +CVE-2018-19113 - http://packetstormsecurity.com/files/153275/Pronestor-Health-Monitoring-Privilege-Escalation.html +CVE-2018-19125 - https://www.exploit-db.com/exploits/45964/ +CVE-2018-19126 - https://www.exploit-db.com/exploits/45964/ +CVE-2018-19128 - https://bugzilla.libav.org/show_bug.cgi?id=1137 +CVE-2018-19129 - https://bugzilla.libav.org/show_bug.cgi?id=1138 +CVE-2018-19130 - https://bugzilla.libav.org/show_bug.cgi?id=1139 +CVE-2018-19135 - https://github.com/ClipperCMS/ClipperCMS/issues/494 +CVE-2018-19135 - https://www.exploit-db.com/exploits/45839/ +CVE-2018-19136 - https://www.exploit-db.com/exploits/45883/ +CVE-2018-19138 - https://www.exploit-db.com/exploits/46036/ +CVE-2018-19139 - https://github.com/mdadams/jasper/issues/188 +CVE-2018-19139 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-1914 - http://www.ibm.com/support/docview.wss?uid=ibm10875372 +CVE-2018-19145 - https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmsxss.html +CVE-2018-19150 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2018-09-19-pdf-architect-corruption.md +CVE-2018-19150 - https://nafiez.github.io/security/integer/2018/09/18/pdf-architect-corruption.html +CVE-2018-19178 - https://github.com/zchuanzhao/jeesns/issues/6 +CVE-2018-19180 - https://github.com/doublefast/yunucms/issues/1 +CVE-2018-19181 - https://github.com/doublefast/yunucms/issues/1 +CVE-2018-19186 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk +CVE-2018-19187 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk +CVE-2018-19188 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk +CVE-2018-19189 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk +CVE-2018-19190 - https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk +CVE-2018-19191 - http://packetstormsecurity.com/files/151144/Webmin-1.890-Cross-Site-Scripting.html +CVE-2018-19192 - https://github.com/AvaterXXX/XiaoCms/blob/master/CSRF.md +CVE-2018-19196 - https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md +CVE-2018-19207 - https://wpvulndb.com/vulnerabilities/9144 +CVE-2018-19207 - https://www.wordfence.com/blog/2018/11/trends-following-vulnerability-in-wp-gdpr-compliance-plugin/ +CVE-2018-19208 - https://bugzilla.redhat.com/show_bug.cgi?id=1643752 +CVE-2018-19210 - http://bugzilla.maptools.org/show_bug.cgi?id=2820 +CVE-2018-19210 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html +CVE-2018-19210 - https://usn.ubuntu.com/3906-1/ +CVE-2018-19211 - https://bugzilla.redhat.com/show_bug.cgi?id=1643754 +CVE-2018-19213 - https://bugzilla.nasm.us/show_bug.cgi?id=3392524 +CVE-2018-19214 - https://bugzilla.nasm.us/show_bug.cgi?id=3392521 +CVE-2018-19215 - https://bugzilla.nasm.us/show_bug.cgi?id=3392525 +CVE-2018-19217 - https://bugzilla.redhat.com/show_bug.cgi?id=1643753 +CVE-2018-19220 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#getshell +CVE-2018-19221 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#sql-injection +CVE-2018-19222 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#reset-admin-password +CVE-2018-19223 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss2 +CVE-2018-19224 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#unauthorized-access +CVE-2018-19225 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#csrf +CVE-2018-19226 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#info_exp +CVE-2018-19227 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss1 +CVE-2018-19228 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#del-file +CVE-2018-19229 - https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss3 +CVE-2018-19232 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19232/poc-cve-2018-19232.py +CVE-2018-19233 - http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html +CVE-2018-19233 - http://seclists.org/fulldisclosure/2018/Nov/55 +CVE-2018-19233 - https://seclists.org/bugtraq/2018/Nov/37 +CVE-2018-19233 - https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ +CVE-2018-19234 - http://packetstormsecurity.com/files/150427/Miss-Marple-Enterprise-Edition-File-Upload-Hardcoded-AES-Key.html +CVE-2018-19234 - http://seclists.org/fulldisclosure/2018/Nov/55 +CVE-2018-19234 - https://seclists.org/bugtraq/2018/Nov/37 +CVE-2018-19234 - https://www.sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-miss-marple-enterprise-edition/ +CVE-2018-19239 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html +CVE-2018-19239 - http://seclists.org/fulldisclosure/2018/Dec/21 +CVE-2018-19240 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html +CVE-2018-19240 - http://seclists.org/fulldisclosure/2018/Dec/21 +CVE-2018-19241 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html +CVE-2018-19241 - http://seclists.org/fulldisclosure/2018/Dec/21 +CVE-2018-19242 - http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html +CVE-2018-19242 - http://seclists.org/fulldisclosure/2018/Dec/21 +CVE-2018-19244 - https://whitehatck01.blogspot.com/2018/11/charles-427-xml-external-entity.html +CVE-2018-19246 - https://github.com/Athlon1600/php-proxy-app/issues/134 +CVE-2018-19246 - https://www.exploit-db.com/exploits/45861/ +CVE-2018-19248 - https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19248/poc-cve-2018-19248.py +CVE-2018-19275 - https://www.mitel.com/-/media/mitel/pdf/security-advisories/security-bulletin-190002001-v10.pdf +CVE-2018-19276 - http://packetstormsecurity.com/files/151553/OpenMRS-Platform-Insecure-Object-Deserialization.html +CVE-2018-19276 - http://packetstormsecurity.com/files/155691/OpenMRS-Java-Deserialization-Remote-Code-Execution.html +CVE-2018-19276 - https://know.bishopfox.com/advisories/news/2019/02/openmrs-insecure-object-deserialization +CVE-2018-19276 - https://www.exploit-db.com/exploits/46327/ +CVE-2018-19277 - https://www.drupal.org/sa-contrib-2021-043 +CVE-2018-19287 - https://www.exploit-db.com/exploits/45880/ +CVE-2018-19289 - https://github.com/xCss/Valine/issues/127 +CVE-2018-1929 - http://www.ibm.com/support/docview.wss?uid=ibm10875372 +CVE-2018-19290 - http://packetstormsecurity.com/files/150391/Budabot-4.0-Denial-Of-Service.html +CVE-2018-19290 - http://seclists.org/fulldisclosure/2018/Nov/44 +CVE-2018-19291 - https://github.com/chekun/DiliCMS/issues/60 +CVE-2018-19300 - https://community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerability-in-d-link-dwr-and-dap-routers/1772 +CVE-2018-19320 - http://seclists.org/fulldisclosure/2018/Dec/39 +CVE-2018-19320 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities +CVE-2018-19321 - http://seclists.org/fulldisclosure/2018/Dec/39 +CVE-2018-19321 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities +CVE-2018-19322 - http://seclists.org/fulldisclosure/2018/Dec/39 +CVE-2018-19322 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities +CVE-2018-19323 - http://seclists.org/fulldisclosure/2018/Dec/39 +CVE-2018-19323 - https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities +CVE-2018-19328 - https://github.com/onkyoworm/poc/blob/master/laobancms/poc.md +CVE-2018-19331 - https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmssql-injection.html +CVE-2018-19332 - https://kingflyme.blogspot.com/2018/11/the-poc-of-s-cmscsrf.html +CVE-2018-19333 - https://justi.cz/security/2018/11/14/gvisor-lpe.html +CVE-2018-19334 - https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 +CVE-2018-19334 - https://www.reddit.com/r/netsec/comments/9yiidf/xssearching_googles_bug_tracker_to_find_out/ea2i7wz/ +CVE-2018-19335 - https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 +CVE-2018-19335 - https://www.reddit.com/r/netsec/comments/9yiidf/xssearching_googles_bug_tracker_to_find_out/ea2i7wz/ +CVE-2018-19353 - https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-libansilove-1.0.0 +CVE-2018-19353 - https://github.com/ansilove/libansilove/issues/4 +CVE-2018-19357 - https://exploit-db.com/exploits/46020/ +CVE-2018-19358 - https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365 +CVE-2018-19358 - https://github.com/sungjungk/keyring_crack +CVE-2018-19358 - https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550 +CVE-2018-19359 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54189 +CVE-2018-19360 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19360 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-19361 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19361 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-19362 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19362 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-19362 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-19367 - https://github.com/lichti/shodan-portainer/ +CVE-2018-19367 - https://github.com/portainer/portainer/issues/2475 +CVE-2018-19371 - http://packetstormsecurity.com/files/150826/SDL-Web-Content-Manager-8.5.0-XML-Injection.html +CVE-2018-19371 - https://www.exploit-db.com/exploits/46000/ +CVE-2018-19376 - https://github.com/GreenCMS/GreenCMS/issues/114 +CVE-2018-19386 - https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5 +CVE-2018-19393 - https://cyberskr.com/blog/cobham-satcom-800-900.html +CVE-2018-19394 - https://cyberskr.com/blog/cobham-satcom-800-900.html +CVE-2018-19404 - https://github.com/HF9/yxcms-code-audit/blob/master/Any%20PHP%20Code%20Execution +CVE-2018-19406 - https://lkml.org/lkml/2018/11/20/411 +CVE-2018-19409 - https://bugs.ghostscript.com/show_bug.cgi?id=700176 +CVE-2018-19413 - http://packetstormsecurity.com/files/150496/SonarSource-SonarQube-7.3-Information-Disclosure.html +CVE-2018-19413 - https://jira.sonarsource.com/browse/SONAR-11305 +CVE-2018-19414 - http://packetstormsecurity.com/files/150657/Plikli-4.0.0-Cross-Site-Scripting.html +CVE-2018-19416 - https://github.com/sysstat/sysstat/issues/196 +CVE-2018-19422 - http://packetstormsecurity.com/files/162591/Subrion-CMS-4.2.1-Shell-Upload.html +CVE-2018-19422 - http://packetstormsecurity.com/files/173998/Intelliants-Subrion-CMS-4.2.1-Remote-Code-Execution.html +CVE-2018-19423 - http://packetstormsecurity.com/files/162772/Codiad-2.8.4-Shell-Upload.html +CVE-2018-19432 - https://github.com/erikd/libsndfile/issues/427 +CVE-2018-19432 - https://usn.ubuntu.com/4013-1/ +CVE-2018-19439 - http://packetstormsecurity.com/files/150444/Oracle-Secure-Global-Desktop-Administration-Console-4.4-Cross-Site-Scripting.html +CVE-2018-19439 - http://seclists.org/fulldisclosure/2018/Nov/58 +CVE-2018-19442 - https://media.ccc.de/v/eh19-157-smart-vacuum-cleaners-as-remote-wiretapping-devices#t=1779 +CVE-2018-19457 - https://www.exploit-db.com/exploits/45326/ +CVE-2018-19458 - https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html +CVE-2018-19458 - https://www.exploit-db.com/exploits/45780/ +CVE-2018-19459 - https://www.exploit-db.com/exploits/45687/ +CVE-2018-19466 - https://github.com/MauroEldritch/lempo +CVE-2018-19469 - https://github.com/woider/ArticleCMS/issues/5 +CVE-2018-19475 - https://bugs.ghostscript.com/show_bug.cgi?id=700153 +CVE-2018-19487 - https://github.com/Antho59/wp-jobhunt-exploit +CVE-2018-19487 - https://wpvulndb.com/vulnerabilities/9206 +CVE-2018-19488 - https://github.com/Antho59/wp-jobhunt-exploit +CVE-2018-19488 - https://wpvulndb.com/vulnerabilities/9206 +CVE-2018-19493 - https://gitlab.com/gitlab-org/gitlab-ce/issues/53037 +CVE-2018-19495 - https://gitlab.com/gitlab-org/gitlab-ee/issues/8167 +CVE-2018-19497 - https://github.com/sleuthkit/sleuthkit/pull/1374 +CVE-2018-19498 - http://packetstormsecurity.com/files/151466/Pages-For-Bitbucket-Server-2.6.0-Cross-Site-Scripting.html +CVE-2018-19498 - https://seclists.org/bugtraq/2019/Jan/53 +CVE-2018-19498 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-037.txt +CVE-2018-19502 - https://github.com/TeamSeri0us/pocs/tree/master/faad +CVE-2018-19503 - https://github.com/TeamSeri0us/pocs/tree/master/faad +CVE-2018-19504 - https://github.com/TeamSeri0us/pocs/tree/master/faad +CVE-2018-19505 - http://packetstormsecurity.com/files/150492/BMC-Remedy-7.1-User-Impersonation.html +CVE-2018-19505 - http://seclists.org/fulldisclosure/2018/Nov/62 +CVE-2018-19509 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19510 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19511 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19512 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19513 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19514 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19515 - http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html +CVE-2018-19517 - https://github.com/sysstat/sysstat/issues/199 +CVE-2018-19518 - https://antichat.com/threads/463395/#post-4254681 +CVE-2018-19518 - https://bugs.debian.org/913775 +CVE-2018-19518 - https://bugs.debian.org/913835 +CVE-2018-19518 - https://bugs.debian.org/913836 +CVE-2018-19518 - https://www.exploit-db.com/exploits/45914/ +CVE-2018-19518 - https://www.openwall.com/lists/oss-security/2018/11/22/3 +CVE-2018-19519 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2018-19523 - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86ahttps://downwithup.github.io/CVEPosts.html +CVE-2018-19524 - http://packetstormsecurity.com/files/151608/Skyworth-GPON-HomeGateways-Optical-Network-Stack-Overflow.html +CVE-2018-19524 - http://seclists.org/fulldisclosure/2019/Feb/30 +CVE-2018-19524 - https://s3curityb3ast.github.io/KSA-Dev-001.md +CVE-2018-19524 - https://seclists.org/bugtraq/2019/Feb/21 +CVE-2018-19524 - https://www.exploit-db.com/exploits/46358/ +CVE-2018-19525 - http://packetstormsecurity.com/files/151647/SYSTORME-ISG-Cross-Site-Request-Forgery.html +CVE-2018-19525 - http://seclists.org/fulldisclosure/2019/Feb/31 +CVE-2018-19525 - https://s3curityb3ast.github.io/KSA-Dev-002.md +CVE-2018-19530 - https://github.com/httl/httl/issues/225 +CVE-2018-19531 - https://github.com/httl/httl/issues/224 +CVE-2018-19532 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-pdftranslatorsettarget-podofo-0-9-6/ +CVE-2018-19532 - https://sourceforge.net/p/podofo/tickets/32/ +CVE-2018-19535 - https://github.com/Exiv2/exiv2/issues/428 +CVE-2018-19537 - https://github.com/JackDoan/TP-Link-ArcherC5-RCE +CVE-2018-19539 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19540 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19541 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19542 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19543 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19550 - http://packetstormsecurity.com/files/153018/Interspire-Email-Marketer-6.20-Remote-Code-Execution.html +CVE-2018-19554 - https://medium.com/@buxuqua/dotcms-xss-65cdc4174815 +CVE-2018-19564 - https://www.exploit-db.com/exploits/45900/ +CVE-2018-19570 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52392 +CVE-2018-19571 - http://packetstormsecurity.com/files/160516/GitLab-11.4.7-Remote-Code-Execution.html +CVE-2018-19571 - http://packetstormsecurity.com/files/160699/GitLab-11.4.7-Remote-Code-Execution.html +CVE-2018-19575 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52523 +CVE-2018-19576 - https://gitlab.com/gitlab-org/gitlab-ce/issues/51238 +CVE-2018-19577 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52444 +CVE-2018-19581 - https://gitlab.com/gitlab-org/gitlab-ee/issues/7696 +CVE-2018-19584 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52522 +CVE-2018-19585 - http://packetstormsecurity.com/files/160516/GitLab-11.4.7-Remote-Code-Execution.html +CVE-2018-19585 - http://packetstormsecurity.com/files/160699/GitLab-11.4.7-Remote-Code-Execution.html +CVE-2018-19588 - https://www.vfxcomputing.com/?CVE-2018-19588 +CVE-2018-19591 - https://sourceware.org/bugzilla/show_bug.cgi?id=23927 +CVE-2018-19600 - https://github.com/rhymix/rhymix/issues/1088 +CVE-2018-19607 - https://github.com/Exiv2/exiv2/issues/561 +CVE-2018-19608 - http://cat.eyalro.net/ +CVE-2018-19609 - https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/IncorrectAccessControl +CVE-2018-19615 - http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html +CVE-2018-19615 - https://www.exploit-db.com/exploits/45928/ +CVE-2018-19616 - http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html +CVE-2018-19616 - https://www.exploit-db.com/exploits/45937/ +CVE-2018-19620 - https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/IncorrectAccessControl#0x02-modify +CVE-2018-19621 - https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/csrf +CVE-2018-19622 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19623 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19624 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280 +CVE-2018-19624 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19625 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19626 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19627 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279 +CVE-2018-19627 - https://www.exploit-db.com/exploits/45951/ +CVE-2018-19627 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19628 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15281 +CVE-2018-19628 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-19629 - https://www.oppositionsecurity.com/imagenow-7-1-4-dos/ +CVE-2018-19646 - https://www.exploit-db.com/exploits/45542 +CVE-2018-19649 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19649 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19650 - http://packetstormsecurity.com/files/150549/ATool-1.0.0.22-Stack-Buffer-Overflow.html +CVE-2018-19651 - https://medium.com/@namhb/ssrf-to-lfi-in-interspire-email-marketer-698a748462a9 +CVE-2018-19655 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890086 +CVE-2018-19655 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906529 +CVE-2018-19659 - http://packetstormsecurity.com/files/150535/Moxa-NPort-W2x50A-2.1-OS-Command-Injection.html +CVE-2018-19659 - http://seclists.org/fulldisclosure/2018/Nov/64 +CVE-2018-19660 - http://packetstormsecurity.com/files/150535/Moxa-NPort-W2x50A-2.1-OS-Command-Injection.html +CVE-2018-19660 - http://seclists.org/fulldisclosure/2018/Nov/64 +CVE-2018-19661 - https://github.com/erikd/libsndfile/issues/429 +CVE-2018-19661 - https://usn.ubuntu.com/4013-1/ +CVE-2018-19662 - https://github.com/erikd/libsndfile/issues/429 +CVE-2018-19662 - https://usn.ubuntu.com/4013-1/ +CVE-2018-19666 - https://github.com/ossec/ossec-hids/issues/1585 +CVE-2018-19693 - https://github.com/fmsdwifull/tp5cms/issues/6 +CVE-2018-19694 - http://packetstormsecurity.com/files/151119/HMS-Netbiter-WS100-3.30.5-Cross-Site-Scripting.html +CVE-2018-19694 - https://seclists.org/bugtraq/2019/Jan/9 +CVE-2018-19749 - https://github.com/domainmod/domainmod/issues/81 +CVE-2018-19749 - https://www.exploit-db.com/exploits/45941/ +CVE-2018-19750 - https://github.com/domainmod/domainmod/issues/82 +CVE-2018-19750 - https://www.exploit-db.com/exploits/45946/ +CVE-2018-19751 - https://github.com/domainmod/domainmod/issues/83 +CVE-2018-19751 - https://www.exploit-db.com/exploits/45947/ +CVE-2018-19752 - https://github.com/domainmod/domainmod/issues/84 +CVE-2018-19752 - https://www.exploit-db.com/exploits/45949/ +CVE-2018-19753 - http://packetstormsecurity.com/files/150541/Tarantella-Enterprise-Directory-Traversal.html +CVE-2018-19753 - http://seclists.org/fulldisclosure/2018/Nov/66 +CVE-2018-19754 - http://packetstormsecurity.com/files/150542/Tarantella-Enterprise-Security-Bypass.html +CVE-2018-19754 - http://seclists.org/fulldisclosure/2018/Nov/67 +CVE-2018-19755 - https://bugzilla.nasm.us/show_bug.cgi?id=3392528 +CVE-2018-19756 - https://bugzilla.redhat.com/show_bug.cgi?id=1649198 +CVE-2018-19757 - https://bugzilla.redhat.com/show_bug.cgi?id=1649197 +CVE-2018-19758 - https://bugzilla.redhat.com/show_bug.cgi?id=1643812 +CVE-2018-19758 - https://usn.ubuntu.com/4013-1/ +CVE-2018-19759 - https://bugzilla.redhat.com/show_bug.cgi?id=1649202 +CVE-2018-19761 - https://bugzilla.redhat.com/show_bug.cgi?id=1649200 +CVE-2018-19762 - https://bugzilla.redhat.com/show_bug.cgi?id=1649199 +CVE-2018-19763 - https://bugzilla.redhat.com/show_bug.cgi?id=1649201 +CVE-2018-19765 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19765 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19766 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19766 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19767 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19767 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19768 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19768 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19769 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19769 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19770 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19770 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19771 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19771 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19772 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19772 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19773 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19773 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19774 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19774 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19775 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19775 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19777 - https://bugs.ghostscript.com/show_bug.cgi?id=700301 +CVE-2018-19782 - http://packetstormsecurity.com/files/150608/FreshRSS-1.11.1-Cross-Site-Scripting.html +CVE-2018-19782 - http://seclists.org/fulldisclosure/2018/Dec/3 +CVE-2018-19782 - https://www.exploit-db.com/exploits/45954/ +CVE-2018-19783 - http://packetstormsecurity.com/files/151237/Kentix-MultiSensor-LAN-5.63.00-Authentication-Bypass.html +CVE-2018-19783 - https://seclists.org/bugtraq/2019/Jan/21 +CVE-2018-19791 - https://github.com/litespeedtech/openlitespeed/issues/117 +CVE-2018-19792 - https://github.com/litespeedtech/openlitespeed/issues/117 +CVE-2018-19794 - https://bugs.internet2.edu/jira/browse/GRP-1838 +CVE-2018-19796 - https://wpvulndb.com/vulnerabilities/9154 +CVE-2018-19798 - https://exploit-db.com/exploits/45927 +CVE-2018-19799 - http://packetstormsecurity.com/files/150623/Dolibarr-ERP-CRM-8.0.3-Cross-Site-Scripting.html +CVE-2018-19799 - https://pentest.com.tr/exploits/Dolibarr-ERP-CRM-8-0-3-Cross-Site-Scripting.html +CVE-2018-19799 - https://www.exploit-db.com/exploits/45945/ +CVE-2018-19809 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19809 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19810 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19810 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19811 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19811 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19812 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19812 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19813 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19813 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19814 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19814 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19815 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19815 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19816 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19816 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19817 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19817 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19818 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19818 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19819 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19819 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19820 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19820 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19821 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19821 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19822 - http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html +CVE-2018-19822 - http://seclists.org/fulldisclosure/2018/Dec/20 +CVE-2018-19828 - https://hackpuntes.com/cve-2018-19828-integria-ims-5-0-83-cross-site-scripting-reflejado/ +CVE-2018-19828 - https://www.exploit-db.com/exploits/46012/ +CVE-2018-19829 - https://hackpuntes.com/cve-2018-19829-integria-ims-5-0-83-cross-site-request-forgery/ +CVE-2018-19829 - https://www.exploit-db.com/exploits/46013/ +CVE-2018-19840 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-19841 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-19854 - https://usn.ubuntu.com/3901-1/ +CVE-2018-19855 - https://www.uipath.com/product/release-notes +CVE-2018-19856 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54857 +CVE-2018-19858 - https://www.youtube.com/watch?v=-7YIzYtWhzM +CVE-2018-19861 - http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html +CVE-2018-19861 - http://seclists.org/fulldisclosure/2018/Dec/19 +CVE-2018-19861 - https://www.exploit-db.com/exploits/45999/ +CVE-2018-19862 - http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html +CVE-2018-19862 - http://seclists.org/fulldisclosure/2018/Dec/19 +CVE-2018-19862 - https://www.exploit-db.com/exploits/45999/ +CVE-2018-19864 - http://packetstormsecurity.com/files/153162/NUUO-NVRMini-2-3.9.1-Stack-Overflow.html +CVE-2018-19877 - https://www.exploit-db.com/exploits/45958/ +CVE-2018-19878 - https://www.triadsec.com/ +CVE-2018-19878 - https://www.triadsec.com/CVE-2018-19878.pdf +CVE-2018-19879 - https://www.triadsec.com/CVE-2018-19879.pdf +CVE-2018-19881 - https://github.com/TeamSeri0us/pocs/tree/master/mupdf/20181203 +CVE-2018-19882 - https://github.com/TeamSeri0us/pocs/tree/master/mupdf/20181203 +CVE-2018-19886 - https://github.com/knik0/faac/issues/23 +CVE-2018-19887 - https://github.com/knik0/faac/issues/21 +CVE-2018-19888 - https://github.com/knik0/faac/issues/25 +CVE-2018-19889 - https://github.com/knik0/faac/issues/22 +CVE-2018-19890 - https://github.com/knik0/faac/issues/20 +CVE-2018-19891 - https://github.com/knik0/faac/issues/24 +CVE-2018-19894 - https://github.com/thinkcmf/cmfx/issues/26 +CVE-2018-19895 - https://github.com/thinkcmf/cmfx/issues/26 +CVE-2018-19896 - https://github.com/thinkcmf/cmfx/issues/26 +CVE-2018-19897 - https://github.com/thinkcmf/cmfx/issues/26 +CVE-2018-19898 - https://github.com/thinkcmf/cmfx/issues/26 +CVE-2018-19908 - https://www.exploit-db.com/exploits/46401/ +CVE-2018-19913 - https://github.com/domainmod/domainmod/issues/86 +CVE-2018-19913 - https://www.exploit-db.com/exploits/45967/ +CVE-2018-19914 - https://github.com/domainmod/domainmod/issues/87 +CVE-2018-19914 - https://www.exploit-db.com/exploits/46375/ +CVE-2018-19915 - https://github.com/domainmod/domainmod/issues/87 +CVE-2018-19915 - https://www.exploit-db.com/exploits/46376/ +CVE-2018-19917 - http://packetstormsecurity.com/files/151005/Microweber-1.0.8-Cross-Site-Scripting.html +CVE-2018-19918 - https://github.com/CuppaCMS/CuppaCMS/issues/3 +CVE-2018-19919 - https://github.com/pixelimity/pixelimity/issues/19 +CVE-2018-19922 - https://github.com/logern5/c1000a_xss/blob/master/README.md +CVE-2018-19923 - https://github.com/Venan24/SCMS/issues/2 +CVE-2018-19924 - https://github.com/Venan24/SCMS/issues/2 +CVE-2018-19933 - https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting +CVE-2018-19933 - https://www.exploit-db.com/exploits/46014/ +CVE-2018-19934 - http://packetstormsecurity.com/files/151474/SolarWinds-Serv-U-FTP-15.1.6.25-Cross-Site-Scripting.html +CVE-2018-19934 - http://seclists.org/fulldisclosure/2019/Feb/5 +CVE-2018-19935 - https://hackerone.com/reports/456727 +CVE-2018-19936 - http://packetstormsecurity.com/files/150750/PrinterOn-Enterprise-4.1.4-Arbitrary-File-Deletion.html +CVE-2018-19936 - https://www.exploit-db.com/exploits/45969 +CVE-2018-19971 - http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html +CVE-2018-19971 - http://www.securityfocus.com/bid/107518 +CVE-2018-19974 - https://bnbdr.github.io/posts/extracheese/ +CVE-2018-19974 - https://github.com/VirusTotal/yara/issues/999 +CVE-2018-19974 - https://github.com/bnbdr/swisscheese/ +CVE-2018-19975 - https://bnbdr.github.io/posts/extracheese/ +CVE-2018-19975 - https://github.com/VirusTotal/yara/issues/999 +CVE-2018-19975 - https://github.com/bnbdr/swisscheese/ +CVE-2018-19976 - https://bnbdr.github.io/posts/extracheese/ +CVE-2018-19976 - https://github.com/VirusTotal/yara/issues/999 +CVE-2018-19976 - https://github.com/bnbdr/swisscheese/ +CVE-2018-19980 - https://github.com/ISCAS-Vulab/PoC_Nebula-Capsule-Pro-Wifi +CVE-2018-19985 - http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-19985 - https://usn.ubuntu.com/4115-1/ +CVE-2018-19985 - https://usn.ubuntu.com/4118-1/ +CVE-2018-19986 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 +CVE-2018-19987 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 +CVE-2018-19988 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 +CVE-2018-19989 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 +CVE-2018-19990 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 +CVE-2018-1999001 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1999002 - https://www.exploit-db.com/exploits/46453/ +CVE-2018-1999002 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1999003 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1999004 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1999005 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-1999007 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-19991 - https://github.com/alexazhou/VeryNginx/issues/218 +CVE-2018-20001 - https://bugzilla.libav.org/show_bug.cgi?id=1141 +CVE-2018-20002 - https://sourceware.org/bugzilla/show_bug.cgi?id=23952 +CVE-2018-20009 - https://github.com/domainmod/domainmod/issues/88 +CVE-2018-20009 - https://www.exploit-db.com/exploits/46372/ +CVE-2018-20010 - https://github.com/domainmod/domainmod/issues/88 +CVE-2018-20010 - https://www.exploit-db.com/exploits/46373/ +CVE-2018-20011 - https://github.com/domainmod/domainmod/issues/88 +CVE-2018-20011 - https://www.exploit-db.com/exploits/46374/ +CVE-2018-20015 - https://github.com/Jxysir/YZM-CSRF- +CVE-2018-20017 - https://github.com/source-trace/semcms/issues/1 +CVE-2018-20018 - https://github.com/QQ704568679/-/blob/master/README.md +CVE-2018-20019 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/ +CVE-2018-20020 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/ +CVE-2018-20021 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/ +CVE-2018-20022 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/ +CVE-2018-20023 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/ +CVE-2018-20024 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/ +CVE-2018-20027 - https://github.com/lisa-lab/pylearn2/issues/1593 +CVE-2018-20031 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-20032 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-20033 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-20034 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-20050 - https://github.com/iamweifan/jooan/blob/master/es_poc.py +CVE-2018-20051 - https://github.com/iamweifan/jooan/blob/master/ss_poc.py +CVE-2018-20052 - https://www.securifera.com/advisories/cve-2018-20052-20053/ +CVE-2018-20053 - https://www.securifera.com/advisories/cve-2018-20052-20053/ +CVE-2018-20061 - https://github.com/frappe/erpnext/issues/15337 +CVE-2018-20062 - http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html +CVE-2018-20062 - https://github.com/nangge/noneCms/issues/21 +CVE-2018-20063 - https://medium.com/@vrico315/unrestricted-upload-of-file-with-dangerous-type-in-gurocks-testrail-11d9f4d13688 +CVE-2018-20064 - https://github.com/doorgets/CMS/issues/12 +CVE-2018-20095 - https://github.com/axiomatic-systems/Bento4/issues/341 +CVE-2018-20096 - https://github.com/Exiv2/exiv2/issues/590 +CVE-2018-20096 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 +CVE-2018-20097 - https://github.com/Exiv2/exiv2/issues/590 +CVE-2018-20097 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 +CVE-2018-20098 - https://github.com/Exiv2/exiv2/issues/590 +CVE-2018-20098 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 +CVE-2018-20099 - https://github.com/Exiv2/exiv2/issues/590 +CVE-2018-20099 - https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206 +CVE-2018-20101 - https://wpvulndb.com/vulnerabilities/9176 +CVE-2018-20114 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114 +CVE-2018-20121 - http://packetstormsecurity.com/files/151333/Podcast-Generator-2.7-Cross-Site-Scripting.html +CVE-2018-20133 - https://github.com/dexter2206/ymlref/issues/2 +CVE-2018-20135 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-20138 - https://suku90.wordpress.com/2018/12/13/php-b2b-script-stored-xss/ +CVE-2018-20140 - http://packetstormsecurity.com/files/151052/ZenPhoto-1.4.14-Cross-Site-Scripting.html +CVE-2018-20141 - http://packetstormsecurity.com/files/151305/Abantecart-1.2.12-Cross-Site-Scripting.html +CVE-2018-20144 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55200 +CVE-2018-20148 - https://wpvulndb.com/vulnerabilities/9171 +CVE-2018-20159 - https://pentest.com.tr/exploits/i-doit-CMDB-1-11-2-Remote-Code-Execution.html +CVE-2018-20159 - https://www.exploit-db.com/exploits/45957 +CVE-2018-20161 - https://github.com/Jacquais/BlinkVuln +CVE-2018-20162 - http://packetstormsecurity.com/files/151719/Digi-TransPort-LR54-Restricted-Shell-Escape.html +CVE-2018-20162 - https://blog.hackeriet.no/cve-2018-20162-digi-lr54-restricted-shell-escape/ +CVE-2018-20162 - https://seclists.org/bugtraq/2019/Feb/34 +CVE-2018-20164 - https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/ +CVE-2018-20166 - https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-Authenticated-Remote-Code-Execution.html +CVE-2018-20166 - https://www.exploit-db.com/exploits/46011 +CVE-2018-20167 - https://phab.enlightenment.org/T7504 +CVE-2018-20169 - https://usn.ubuntu.com/4118-1/ +CVE-2018-20174 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20175 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20176 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20177 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20178 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20179 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20180 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20181 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20182 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-20186 - https://github.com/axiomatic-systems/Bento4/issues/342 +CVE-2018-20188 - https://github.com/m3lon/CVE/blob/master/CSRF/FUELCMS%20CSRF.md +CVE-2018-20189 - https://sourceforge.net/p/graphicsmagick/bugs/585/ +CVE-2018-20193 - http://seclists.org/fulldisclosure/2018/Dec/37 +CVE-2018-20194 - https://github.com/knik0/faad2/issues/21 +CVE-2018-20195 - https://github.com/knik0/faad2/issues/25 +CVE-2018-20196 - https://github.com/knik0/faad2/issues/19 +CVE-2018-20197 - https://github.com/knik0/faad2/issues/20 +CVE-2018-20198 - https://github.com/knik0/faad2/issues/23 +CVE-2018-20199 - https://github.com/knik0/faad2/issues/24 +CVE-2018-20200 - https://cxsecurity.com/issue/WLB-2018120252 +CVE-2018-20201 - https://github.com/espruino/Espruino/issues/1587 +CVE-2018-20211 - http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html +CVE-2018-20211 - http://seclists.org/fulldisclosure/2018/Dec/44 +CVE-2018-20212 - http://packetstormsecurity.com/files/151028/TWiki-6.0.2-Cross-Site-Scripting.html +CVE-2018-20218 - http://seclists.org/fulldisclosure/2019/Feb/48 +CVE-2018-20219 - http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html +CVE-2018-20219 - http://seclists.org/fulldisclosure/2019/Feb/48 +CVE-2018-20220 - http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-Missing-Authentication.html +CVE-2018-20220 - http://seclists.org/fulldisclosure/2019/Feb/48 +CVE-2018-20221 - http://packetstormsecurity.com/files/151035/Ajera-Timesheets-9.10.16-Deserialization.html +CVE-2018-20221 - https://www.exploit-db.com/exploits/46086/ +CVE-2018-20228 - https://www.vulnerability-lab.com/get_content.php?id=2175 +CVE-2018-20230 - https://bugzilla.redhat.com/show_bug.cgi?id=1660318 +CVE-2018-20231 - https://wpvulndb.com/vulnerabilities/9187 +CVE-2018-20231 - https://www.privacy-wise.com/two-factor-authentication-cross-site-request-forgery-csrf-vulnerability-cve-2018-20231/ +CVE-2018-20233 - https://ecosystem.atlassian.net/browse/UPM-5964 +CVE-2018-20234 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html +CVE-2018-20235 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html +CVE-2018-20236 - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html +CVE-2018-20239 - https://ecosystem.atlassian.net/browse/APL-1373 +CVE-2018-20250 - http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html +CVE-2018-20250 - https://github.com/blau72/CVE-2018-20250-WinRAR-ACE +CVE-2018-20250 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ +CVE-2018-20250 - https://www.exploit-db.com/exploits/46552/ +CVE-2018-20250 - https://www.exploit-db.com/exploits/46756/ +CVE-2018-20251 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ +CVE-2018-20252 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ +CVE-2018-20253 - https://research.checkpoint.com/extracting-code-execution-from-winrar/ +CVE-2018-20305 - https://github.com/RootSoull/Vuln-Poc/tree/master/D-Link/DIR-816 +CVE-2018-20306 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 +CVE-2018-20307 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 +CVE-2018-20322 - https://bugs.limesurvey.org/view.php?id=14376 +CVE-2018-20323 - http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html +CVE-2018-20323 - https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/ +CVE-2018-20325 - https://github.com/danijar/definitions/issues/14 +CVE-2018-20326 - http://packetstormsecurity.com/files/150918/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Scripting.html +CVE-2018-20326 - https://www.exploit-db.com/exploits/46081/ +CVE-2018-20326 - https://youtu.be/TwNi05yfQks +CVE-2018-20331 - https://packetstormsecurity.com/files/150900 +CVE-2018-20334 - https://starlabs.sg/advisories/18-20334/ +CVE-2018-20335 - https://starlabs.sg/advisories/18-20335/ +CVE-2018-20336 - https://starlabs.sg/advisories/18-20336/ +CVE-2018-20337 - https://github.com/LibRaw/LibRaw/issues/192 +CVE-2018-20340 - https://blog.inhq.net/posts/yubico-libu2f-host-vuln-part1/ +CVE-2018-20343 - https://github.com/Alexandre-Bartel/CVE-2018-20343 +CVE-2018-20346 - https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html +CVE-2018-20346 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2018-20346 - https://news.ycombinator.com/item?id=18685296 +CVE-2018-20346 - https://worthdoingbadly.com/sqlitebug/ +CVE-2018-20346 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20348 - https://github.com/libyal/libpff/issues/48 +CVE-2018-20349 - https://github.com/igraph/igraph/issues/1141 +CVE-2018-20357 - https://github.com/knik0/faad2/issues/28 +CVE-2018-20358 - https://github.com/knik0/faad2/issues/31 +CVE-2018-20359 - https://github.com/knik0/faad2/issues/29 +CVE-2018-20360 - https://github.com/knik0/faad2/issues/32 +CVE-2018-20361 - https://github.com/knik0/faad2/issues/30 +CVE-2018-20362 - https://github.com/knik0/faad2/issues/26 +CVE-2018-20363 - https://github.com/LibRaw/LibRaw/issues/193 +CVE-2018-20364 - https://github.com/LibRaw/LibRaw/issues/194 +CVE-2018-20365 - https://github.com/LibRaw/LibRaw/issues/195 +CVE-2018-20367 - https://github.com/wstmall/wstmart/issues/1 +CVE-2018-20368 - https://www.vulnerability-lab.com/get_content.php?id=2158 +CVE-2018-20369 - https://www.vulnerability-lab.com/get_content.php?id=2168 +CVE-2018-20370 - https://www.vulnerability-lab.com/get_content.php?id=2171 +CVE-2018-20371 - https://www.vulnerability-lab.com/get_content.php?id=2110 +CVE-2018-20372 - https://www.vulnerability-lab.com/get_content.php?id=1990 +CVE-2018-20372 - https://www.youtube.com/watch?v=HUM5myJWbvc +CVE-2018-20373 - https://www.vulnerability-lab.com/get_content.php?id=1990 +CVE-2018-20373 - https://www.youtube.com/watch?v=HUM5myJWbvc +CVE-2018-20377 - https://github.com/zadewg/LIVEBOX-0DAY +CVE-2018-20406 - https://bugs.python.org/issue34656 +CVE-2018-20406 - https://usn.ubuntu.com/4127-2/ +CVE-2018-20407 - https://github.com/axiomatic-systems/Bento4/issues/343 +CVE-2018-20408 - https://github.com/axiomatic-systems/Bento4/issues/343 +CVE-2018-20409 - https://github.com/axiomatic-systems/Bento4/issues/345 +CVE-2018-20410 - https://github.com/flypuma/vul/blob/master/kingview/copy_argumengt_overflow/poc.py +CVE-2018-20418 - https://github.com/rdincel1/Craft-CMS-3.0.25---Cross-Site-Scripting +CVE-2018-20418 - https://www.exploit-db.com/exploits/46054/ +CVE-2018-20419 - https://github.com/Jxysir/Douphpcms/blob/master/POC +CVE-2018-20425 - https://github.com/libming/libming/issues/163 +CVE-2018-20426 - https://github.com/libming/libming/issues/162 +CVE-2018-20427 - https://github.com/libming/libming/issues/164 +CVE-2018-20428 - https://github.com/libming/libming/issues/161 +CVE-2018-20429 - https://github.com/libming/libming/issues/160 +CVE-2018-20432 - http://packetstormsecurity.com/files/159058/COVR-3902-1.01B0-Hardcoded-Credentials.html +CVE-2018-20432 - https://cybersecurityworks.com/zerodays/cve-2018-20432-dlink.html +CVE-2018-20434 - http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html +CVE-2018-20434 - http://packetstormsecurity.com/files/153448/LibreNMS-1.46-addhost-Remote-Code-Execution.html +CVE-2018-20448 - https://www.exploit-db.com/exploits/46067/ +CVE-2018-20450 - https://github.com/evanmiller/libxls/issues/34 +CVE-2018-20451 - https://github.com/uvoteam/libdoc/issues/2 +CVE-2018-20452 - https://github.com/evanmiller/libxls/issues/35 +CVE-2018-20453 - https://github.com/uvoteam/libdoc/issues/1 +CVE-2018-20454 - https://github.com/coolboy0816/audit/issues/1 +CVE-2018-20462 - https://wpvulndb.com/vulnerabilities/9196 +CVE-2018-20463 - https://wpvulndb.com/vulnerabilities/9197 +CVE-2018-20468 - https://barriersec.com/2019/06/cve-2018-20468-sahi-pro/ +CVE-2018-20469 - http://packetstormsecurity.com/files/153331/Sahi-Pro-8.x-SQL-Injection.html +CVE-2018-20469 - https://barriersec.com/2019/06/cve-2018-20469-sahi-pro/ +CVE-2018-20470 - http://packetstormsecurity.com/files/153330/Sahi-Pro-7.x-8.x-Directory-Traversal.html +CVE-2018-20470 - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ +CVE-2018-20472 - http://packetstormsecurity.com/files/153332/Sahi-Pro-8.x-Cross-Site-Scripting.html +CVE-2018-20472 - https://barriersec.com/2019/06/cve-2018-20472-sahi-pro/ +CVE-2018-20483 - https://usn.ubuntu.com/3943-1/ +CVE-2018-20484 - http://packetstormsecurity.com/files/152793/Zoho-ManageEngine-ADSelfService-Plus-5.7-Cross-Site-Scripting.html +CVE-2018-20485 - http://packetstormsecurity.com/files/152793/Zoho-ManageEngine-ADSelfService-Plus-5.7-Cross-Site-Scripting.html +CVE-2018-20486 - https://github.com/Ppsoft1990/Metinfo6.1.3/issues/2 +CVE-2018-20487 - https://neonsea.uk/blog/2018/12/26/firewall-includes.html +CVE-2018-20498 - https://gitlab.com/gitlab-org/gitlab-ce/issues/50995 +CVE-2018-20502 - https://github.com/axiomatic-systems/Bento4/issues/349 +CVE-2018-20503 - http://packetstormsecurity.com/files/151327/SirsiDynix-e-Library-3.5.x-Cross-Site-Scripting.html +CVE-2018-20503 - https://pentest.com.tr/exploits/Allied-Telesis-8100L-8-Cross-Site-Scripting.html +CVE-2018-20503 - https://www.exploit-db.com/exploits/46237/ +CVE-2018-20506 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2018-20506 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20511 - https://usn.ubuntu.com/4118-1/ +CVE-2018-20512 - https://www.reddit.com/r/networking/comments/abu4kq/vulnerability_in_cdata_technologies_epon_cpewifi/ +CVE-2018-20523 - http://packetstormsecurity.com/files/163796/Xiaomi-10.2.4.g-Information-Disclosure.html +CVE-2018-20523 - https://vishwarajbhattrai.wordpress.com/2019/03/22/content-provider-injection-in-xiaomi-stock-browser +CVE-2018-20524 - https://vul.su.ki/posts/Chat_Anywhere_2.4.0_XSS.md/ +CVE-2018-20525 - http://packetstormsecurity.com/files/151033/Roxy-Fileman-1.4.5-File-Upload-Directory-Traversal.html +CVE-2018-20525 - http://packetstormsecurity.com/files/166585/Roxy-File-Manager-1.4.5-PHP-File-Upload-Restriction-Bypass.html +CVE-2018-20525 - https://www.exploit-db.com/exploits/46085/ +CVE-2018-20526 - http://packetstormsecurity.com/files/151033/Roxy-Fileman-1.4.5-File-Upload-Directory-Traversal.html +CVE-2018-20526 - https://www.exploit-db.com/exploits/46085/ +CVE-2018-20535 - https://bugzilla.nasm.us/show_bug.cgi?id=3392530 +CVE-2018-20538 - https://bugzilla.nasm.us/show_bug.cgi?id=3392531 +CVE-2018-20541 - https://bugzilla.redhat.com/show_bug.cgi?id=1652632 +CVE-2018-20542 - https://bugzilla.redhat.com/show_bug.cgi?id=1652633 +CVE-2018-20542 - https://bugzilla.redhat.com/show_bug.cgi?id=1652635 +CVE-2018-20543 - https://bugzilla.redhat.com/show_bug.cgi?id=1652634 +CVE-2018-20552 - https://github.com/appneta/tcpreplay/issues/530 +CVE-2018-20553 - https://github.com/appneta/tcpreplay/issues/530 +CVE-2018-20555 - https://github.com/fs0c131y/CVE-2018-20555 +CVE-2018-20555 - https://wpvulndb.com/vulnerabilities/9204 +CVE-2018-20556 - http://packetstormsecurity.com/files/151692/WordPress-Booking-Calendar-8.4.3-SQL-Injection.html +CVE-2018-20556 - https://gist.github.com/B0UG/a750c2c204825453e6faf898ea6d09f6 +CVE-2018-20556 - https://vulners.com/exploitdb/EDB-ID:46377 +CVE-2018-20556 - https://www.exploit-db.com/exploits/46377/ +CVE-2018-20568 - https://github.com/nabby27/CMS/pull/2 +CVE-2018-20569 - https://github.com/nabby27/CMS/pull/2 +CVE-2018-20570 - https://github.com/mdadams/jasper/issues/191 +CVE-2018-20570 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20572 - https://github.com/wuzhicms/wuzhicms/issues/166 +CVE-2018-20573 - https://github.com/jbeder/yaml-cpp/issues/655 +CVE-2018-20574 - https://github.com/jbeder/yaml-cpp/issues/654 +CVE-2018-20575 - https://github.com/zadewg/LIVEBOX-0DAY +CVE-2018-20576 - https://gbhackers.com/orange-adsl-modems/ +CVE-2018-20576 - https://github.com/zadewg/LIVEBOX-0DAY +CVE-2018-20577 - https://github.com/zadewg/LIVEBOX-0DAY +CVE-2018-20580 - http://packetstormsecurity.com/files/152731/ReadyAPI-2.5.0-2.6.0-Remote-Code-Execution.html +CVE-2018-20580 - https://github.com/gscamelo/CVE-2018-20580 +CVE-2018-20580 - https://www.exploit-db.com/exploits/46796/ +CVE-2018-20582 - https://medium.com/@beefaaubee/dissecting-into-gree-android-application-43892d54b006 +CVE-2018-20584 - https://github.com/mdadams/jasper/issues/192 +CVE-2018-20584 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20587 - https://medium.com/@lukedashjr/cve-2018-20587-advisory-and-full-disclosure-a3105551e78b +CVE-2018-20588 - https://github.com/caryll/otfcc/issues/59 +CVE-2018-20589 - https://github.com/nabby27/CMS/pull/3 +CVE-2018-20590 - https://github.com/nabby27/CMS/pull/3 +CVE-2018-20591 - https://github.com/libming/libming/issues/168 +CVE-2018-20592 - https://github.com/michaelrsweet/mxml/issues/237 +CVE-2018-20593 - https://github.com/michaelrsweet/mxml/issues/237 +CVE-2018-20597 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss1 +CVE-2018-20598 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#csrf +CVE-2018-20599 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#getshell +CVE-2018-20600 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss2 +CVE-2018-20601 - https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss3 +CVE-2018-20602 - https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#information_disclosure +CVE-2018-20603 - https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#csrf +CVE-2018-20604 - https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#directory-traversal +CVE-2018-20616 - https://github.com/brackeen/ok-file-formats/issues/4 +CVE-2018-20617 - https://github.com/brackeen/ok-file-formats/issues/5 +CVE-2018-20618 - https://github.com/brackeen/ok-file-formats/issues/6 +CVE-2018-20621 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-20621 +CVE-2018-20622 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20626 - https://gkaim.com/cve-2018-20626-vikas-chaudhary/ +CVE-2018-20627 - https://gkaim.com/cve-2018-20627-vikas-chaudhary/ +CVE-2018-20628 - https://gkaim.com/cve-2018-20628-vikas-chaudhary/ +CVE-2018-20629 - https://gkaim.com/cve-2018-20629-vikas-chaudhary/ +CVE-2018-20630 - https://gkaim.com/cve-2018-20630-vikas-chaudhary/ +CVE-2018-20631 - https://gkaim.com/cve-2018-20631-vikas-chaudhary/ +CVE-2018-20632 - https://gkaim.com/cve-2018-20632-vikas-chaudhary/ +CVE-2018-20633 - https://gkaim.com/cve-2018-20633-vikas-chaudhary/ +CVE-2018-20634 - https://gkaim.com/cve-2018-20634-vikas-chaudhary/ +CVE-2018-20635 - https://gkaim.com/cve-2018-20635-vikas-chaudhary/ +CVE-2018-20636 - https://gkaim.com/cve-2018-20636-vikas-chaudhary/ +CVE-2018-20637 - https://gkaim.com/cve-2018-20637-vikas-chaudhary/ +CVE-2018-20638 - https://gkaim.com/cve-2018-20638-vikas-chaudhary/ +CVE-2018-20639 - https://gkaim.com/cve-2018-20639-vikas-chaudhary/ +CVE-2018-20640 - https://gkaim.com/cve-2018-20640-vikas-chaudhary/ +CVE-2018-20641 - https://gkaim.com/cve-2018-20641-vikas-chaudhary/ +CVE-2018-20642 - https://gkaim.com/cve-2018-20642-vikas-chaudhary/ +CVE-2018-20643 - https://gkaim.com/cve-2018-20643-vikas-chaudhary/ +CVE-2018-20644 - https://gkaim.com/cve-2018-20644-vikas-chaudhary/ +CVE-2018-20645 - https://gkaim.com/cve-2018-20645-vikas-chaudhary/ +CVE-2018-20646 - https://gkaim.com/cve-2018-20646-vikas-chaudhary/ +CVE-2018-20648 - https://gkaim.com/cve-2018-20648-vikas-chaudhary/ +CVE-2018-20651 - https://sourceware.org/bugzilla/show_bug.cgi?id=24041 +CVE-2018-20652 - https://github.com/syoyo/tinyexr/issues/104 +CVE-2018-20657 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 +CVE-2018-20658 - https://www.exploit-db.com/exploits/45091 +CVE-2018-20659 - https://github.com/axiomatic-systems/Bento4/issues/350 +CVE-2018-20662 - https://gitlab.freedesktop.org/poppler/poppler/issues/706 +CVE-2018-20673 - https://sourceware.org/bugzilla/show_bug.cgi?id=24039 +CVE-2018-20676 - https://access.redhat.com/errata/RHSA-2020:0133 +CVE-2018-20677 - https://access.redhat.com/errata/RHSA-2020:0133 +CVE-2018-20679 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2018-20679 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2018-20679 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2018-20681 - https://github.com/mate-desktop/mate-screensaver/issues/155 +CVE-2018-20683 - https://groups.google.com/forum/#!topic/gitolite-announce/6xbjjmpLePQ +CVE-2018-20684 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2018-20684 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-20685 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2018-20685 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-20687 - http://packetstormsecurity.com/files/155359/Raritan-CommandCenter-Secure-Gateway-XML-Injection.html +CVE-2018-20712 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 +CVE-2018-20712 - https://sourceware.org/bugzilla/show_bug.cgi?id=24043 +CVE-2018-20716 - https://blog.ripstech.com/2018/cubecart-admin-authentication-bypass/ +CVE-2018-20717 - https://blog.ripstech.com/2018/prestashop-remote-code-execution/ +CVE-2018-20735 - https://www.exploit-db.com/exploits/46556/ +CVE-2018-20736 - https://wso2.com/security-patch-releases/api-manager +CVE-2018-20737 - https://wso2.com/security-patch-releases/api-manager +CVE-2018-20748 - https://github.com/LibVNC/libvncserver/issues/273 +CVE-2018-20749 - https://github.com/LibVNC/libvncserver/issues/273 +CVE-2018-20750 - https://github.com/LibVNC/libvncserver/issues/273 +CVE-2018-20751 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-crop_page-podofo-0-9-6/ +CVE-2018-20751 - https://sourceforge.net/p/podofo/tickets/33/ +CVE-2018-20764 - https://community.helpsystems.com/knowledge-base/fox-technologies/hotfix/515/ +CVE-2018-20779 - https://packetstormsecurity.com/files/149894 +CVE-2018-20780 - https://packetstormsecurity.com/files/149894 +CVE-2018-20781 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-20782 - https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3 +CVE-2018-20782 - https://www.exploit-db.com/exploits/46414/ +CVE-2018-20783 - https://hackerone.com/reports/477344 +CVE-2018-20784 - https://usn.ubuntu.com/4115-1/ +CVE-2018-20784 - https://usn.ubuntu.com/4118-1/ +CVE-2018-20784 - https://usn.ubuntu.com/4211-2/ +CVE-2018-20789 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20790 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20791 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20792 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20793 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20794 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20795 - https://www.exploit-db.com/exploits/45987 +CVE-2018-20801 - https://snyk.io/vuln/npm:highcharts:20180225 +CVE-2018-20806 - https://github.com/lota/phamm/issues/24 +CVE-2018-20807 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730/ +CVE-2018-20808 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20809 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20810 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20811 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20812 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20813 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20814 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ +CVE-2018-20817 - https://github.com/RektInator/cod-steamauth-rce +CVE-2018-20817 - https://github.com/momo5502/cod-exploits/tree/master/steam-auth +CVE-2018-20818 - https://arxiv.org/pdf/1809.07477 +CVE-2018-20819 - https://github.com/dropbox/lepton/issues/112 +CVE-2018-20820 - https://github.com/dropbox/lepton/issues/111 +CVE-2018-20823 - https://hackaday.com/2018/07/17/freak-out-your-smartphone-with-ultrasound/ +CVE-2018-20823 - https://medium.com/@juliodellaflora/ultrassom-pode-causar-anomalias-no-girosc%C3%B3pio-do-xiaomi-mi5s-plus-4050d718bc7f +CVE-2018-20836 - https://usn.ubuntu.com/4076-1/ +CVE-2018-20838 - https://ampforwp.com/critical-security-issues-has-been-fixed-in-0-9-97-20-version/ +CVE-2018-20840 - https://github.com/google/google-api-cpp-client/issues/57 +CVE-2018-20840 - https://github.com/google/google-api-cpp-client/pull/58 +CVE-2018-20841 - https://ioactive.com/hootoo-tripmate-routers-are-cute-but/ +CVE-2018-20841 - https://www.exploit-db.com/exploits/46143 +CVE-2018-20843 - https://seclists.org/bugtraq/2019/Jun/39 +CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-20843 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-20846 - https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc +CVE-2018-20848 - https://packetstormsecurity.com/files/147467/Peel-Shopping-Cart-9.0.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2018-20849 - https://packetstormsecurity.com/files/147470/Arastta-1.6.2-Cross-Site-Scripting.html +CVE-2018-20850 - https://advisories.stormshield.eu/2018-006/ +CVE-2018-20852 - https://usn.ubuntu.com/4127-2/ +CVE-2018-20852 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-20856 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-20856 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html +CVE-2018-20856 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2018-20856 - https://usn.ubuntu.com/4118-1/ +CVE-2018-20895 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20896 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20897 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20898 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20899 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20900 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20901 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20902 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20903 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20904 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20905 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20906 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20907 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20908 - https://documentation.cpanel.net/display/CL/72+Change+Log +CVE-2018-20961 - http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-20961 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2018-20965 - https://wpvulndb.com/vulnerabilities/9608 +CVE-2018-20969 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html +CVE-2018-20969 - https://github.com/irsl/gnu-patch-vulnerabilities +CVE-2018-20969 - https://seclists.org/bugtraq/2019/Aug/29 +CVE-2018-20976 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2018-20976 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2018-20987 - https://wpvulndb.com/vulnerabilities/9627 +CVE-2018-21003 - https://wpvulndb.com/vulnerabilities/9829 +CVE-2018-21004 - https://wpvulndb.com/vulnerabilities/9831 +CVE-2018-21007 - https://wpvulndb.com/vulnerabilities/9847 +CVE-2018-21008 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2018-21010 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-21013 - https://wpvulndb.com/vulnerabilities/9024 +CVE-2018-21014 - https://wpvulndb.com/vulnerabilities/9007 +CVE-2018-21015 - https://github.com/gpac/gpac/issues/1179 +CVE-2018-21016 - https://github.com/gpac/gpac/issues/1180 +CVE-2018-21017 - https://github.com/gpac/gpac/issues/1183 +CVE-2018-21018 - https://github.com/tootsuite/mastodon/pull/9329 +CVE-2018-21018 - https://github.com/tootsuite/mastodon/pull/9381 +CVE-2018-21029 - https://github.com/systemd/systemd/issues/9397 +CVE-2018-21031 - https://www.elladodelmal.com/2018/08/shodan-es-de-cine-hacking-tautulli-un.html +CVE-2018-21031 - https://www.exploit-db.com/docs/47790 +CVE-2018-21034 - https://www.soluble.ai/blog/argo-cves-2020 +CVE-2018-21037 - https://github.com/intelliants/subrion/issues/638 +CVE-2018-21038 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21039 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21040 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21041 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21042 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21043 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21044 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21045 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21046 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21047 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21048 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21049 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21050 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21051 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21052 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21053 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21054 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21055 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21056 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21057 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21058 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21059 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21060 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21061 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21062 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21063 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21064 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21065 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21066 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21067 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21068 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21069 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21070 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21071 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21072 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21073 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21074 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21075 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21076 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21077 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21078 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21079 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21080 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21081 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21082 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21083 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21084 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21085 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21086 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21087 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21088 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21089 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21090 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21091 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21092 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-21096 - https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096 +CVE-2018-21102 - https://kb.netgear.com/000060454/Security-Advisory-for-Cross-Site-Request-Forgery-on-ReadyNAS-OS-6-PSV-2018-0373 +CVE-2018-21112 - https://kb.netgear.com/000060439/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2018-0093 +CVE-2018-21113 - https://kb.netgear.com/000060438/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2018-0033 +CVE-2018-21123 - https://kb.netgear.com/000060235/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Wireless-Controllers-PSV-2018-0230 +CVE-2018-21124 - https://kb.netgear.com/000060234/Security-Advisory-for-a-Vertical-Privilege-Escalation-on-WAC510-PSV-2018-0260 +CVE-2018-21128 - https://kb.netgear.com/000060230/Security-Advisory-for-Authentication-Bypass-on-Some-Wireless-Access-Points-PSV-2018-0264 +CVE-2018-21130 - https://kb.netgear.com/000060229/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Wireless-Access-Points-PSV-2018-0267 +CVE-2018-21135 - https://kb.netgear.com/000060225/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-3165 +CVE-2018-21136 - https://kb.netgear.com/000060224/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Modem-Routers-PSV-2018-0100 +CVE-2018-21138 - https://kb.netgear.com/000060222/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2018-0098 +CVE-2018-21140 - https://kb.netgear.com/000060221/Security-Advisory-for-Security-Misconfiguration-on-Some-Modem-Routers-PSV-2018-0097 +CVE-2018-21146 - https://kb.netgear.com/000059487/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Gateways-and-Routers-PSV-2017-3159 +CVE-2018-21149 - https://kb.netgear.com/000059484/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3156 +CVE-2018-21151 - https://kb.netgear.com/000059482/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3154 +CVE-2018-21159 - https://kb.netgear.com/000059471/Security-Advisory-for-Security-Misconfiguration-on-ReadyNAS-OS-6-PSV-2017-1999 +CVE-2018-21160 - https://kb.netgear.com/000059470/Security-Advisory-for-Cross-Site-Request-Forgery-on-ReadyNAS-OS-6-PSV-2017-1998 +CVE-2018-21167 - https://kb.netgear.com/000055191/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Routers-Gateways-Extenders-and-DSL-Modems-PSV-2017-3093 +CVE-2018-21171 - https://kb.netgear.com/000055187/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2632 +CVE-2018-21173 - https://kb.netgear.com/000055185/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2627 +CVE-2018-21175 - https://kb.netgear.com/000055183/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2624 +CVE-2018-21176 - https://kb.netgear.com/000055182/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2623 +CVE-2018-21183 - https://kb.netgear.com/000055175/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2616 +CVE-2018-21189 - https://kb.netgear.com/000055168/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2606 +CVE-2018-21190 - https://kb.netgear.com/000055167/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2605 +CVE-2018-21194 - https://kb.netgear.com/000055163/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2601 +CVE-2018-21195 - https://kb.netgear.com/000055162/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2600 +CVE-2018-21197 - https://kb.netgear.com/000055152/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2596 +CVE-2018-21202 - https://kb.netgear.com/000055147/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2590 +CVE-2018-21203 - https://kb.netgear.com/000055146/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2589 +CVE-2018-21205 - https://kb.netgear.com/000055144/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2568 +CVE-2018-21207 - https://kb.netgear.com/000055142/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2566 +CVE-2018-21211 - https://kb.netgear.com/000055138/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2491 +CVE-2018-21212 - https://kb.netgear.com/000055137/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2490 +CVE-2018-21214 - https://kb.netgear.com/000055123/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2488 +CVE-2018-21215 - https://kb.netgear.com/000055122/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2486 +CVE-2018-21216 - https://kb.netgear.com/000055121/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2485 +CVE-2018-21217 - https://kb.netgear.com/000055120/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2484 +CVE-2018-21218 - https://kb.netgear.com/000055119/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2483 +CVE-2018-21221 - https://kb.netgear.com/000055116/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2459 +CVE-2018-21224 - https://kb.netgear.com/000055113/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2456 +CVE-2018-21231 - https://kb.netgear.com/000055103/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Gateways-and-Extenders-PSV-2016-0102 +CVE-2018-21246 - https://bugs.gentoo.org/715214 +CVE-2018-21248 - https://mattermost.com/security-updates/ +CVE-2018-21249 - https://mattermost.com/security-updates/ +CVE-2018-21250 - https://mattermost.com/security-updates/ +CVE-2018-21251 - https://mattermost.com/security-updates/ +CVE-2018-21252 - https://mattermost.com/security-updates/ +CVE-2018-21253 - https://mattermost.com/security-updates/ +CVE-2018-21254 - https://mattermost.com/security-updates/ +CVE-2018-21255 - https://mattermost.com/security-updates/ +CVE-2018-21256 - https://mattermost.com/security-updates/ +CVE-2018-21257 - https://mattermost.com/security-updates/ +CVE-2018-21258 - https://mattermost.com/security-updates/ +CVE-2018-21259 - https://mattermost.com/security-updates/ +CVE-2018-21260 - https://mattermost.com/security-updates/ +CVE-2018-21261 - https://mattermost.com/security-updates/ +CVE-2018-21262 - https://mattermost.com/security-updates/ +CVE-2018-21263 - https://mattermost.com/security-updates/ +CVE-2018-21264 - https://mattermost.com/security-updates/ +CVE-2018-21265 - https://mattermost.com/security-updates/ +CVE-2018-21268 - https://medium.com/@shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3 +CVE-2018-21268 - https://snyk.io/vuln/npm:traceroute:20160311 +CVE-2018-2364 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2364 - https://launchpad.support.sap.com/#/notes/2541700 +CVE-2018-2365 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2367 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2368 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2369 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2370 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2371 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2372 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2373 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2374 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2375 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2376 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2377 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2378 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2379 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2380 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2380 - https://github.com/erpscanteam/CVE-2018-2380 +CVE-2018-2380 - https://www.exploit-db.com/exploits/44292/ +CVE-2018-2381 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2382 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2383 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2384 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2385 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2386 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2387 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2388 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2389 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2390 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2391 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2392 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2393 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2394 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2395 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2396 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ +CVE-2018-2415 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2416 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2417 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2418 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2419 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2420 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2421 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2421 - https://launchpad.support.sap.com/#/notes/2616599 +CVE-2018-2422 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2423 - https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ +CVE-2018-2452 - https://launchpad.support.sap.com/#/notes/2623846 +CVE-2018-2473 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2476 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2477 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2478 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2479 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2481 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2482 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2483 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2485 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2487 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2488 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2489 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2490 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-2491 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 +CVE-2018-25002 - https://www.drupal.org/sa-contrib-2018-024 +CVE-2018-25019 - https://lists.openwall.net/full-disclosure/2018/01/10/17 +CVE-2018-25019 - https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a +CVE-2018-25020 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html +CVE-2018-25031 - https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885 +CVE-2018-25032 - https://github.com/madler/zlib/issues/605 +CVE-2018-25032 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2018-25035 - https://vuldb.com/?id.126696 +CVE-2018-25036 - https://vuldb.com/?id.126697 +CVE-2018-25037 - https://vuldb.com/?id.126698 +CVE-2018-25038 - https://vuldb.com/?id.126699 +CVE-2018-25043 - https://vuldb.com/?id.113806 +CVE-2018-25055 - https://github.com/jeffcoughlin/farcrysolrpro/issues/78 +CVE-2018-25080 - https://vuldb.com/?id.220061 +CVE-2018-25081 - https://flashpoint.io/blog/bitwarden-password-pilfering/ +CVE-2018-25083 - https://security.snyk.io/vuln/npm:pullit:20180214 +CVE-2018-25095 - https://wpscan.com/vulnerability/16cc47aa-cb31-4114-b014-7ac5fbc1d3ee +CVE-2018-2560 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2561 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2562 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2564 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2565 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2566 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2567 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2568 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2569 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2570 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2571 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2573 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2574 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2575 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2576 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2577 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2578 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2579 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2579 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2579 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2580 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2581 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2581 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2582 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2582 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2583 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2584 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2585 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2586 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2587 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-2588 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2588 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2588 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2589 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2590 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2591 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2592 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2593 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2594 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2595 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2596 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2597 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2598 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2599 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2599 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2599 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2600 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2601 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2602 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2602 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2602 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2603 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2603 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2603 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2604 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2605 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2605 - https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/ +CVE-2018-2606 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2607 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2608 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2609 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2610 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2611 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2612 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2613 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2614 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2615 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2616 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2617 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2618 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2618 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2618 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2619 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2620 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2621 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2622 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2623 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2624 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2625 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2626 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2627 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2627 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2628 - https://www.exploit-db.com/exploits/44553/ +CVE-2018-2628 - https://www.exploit-db.com/exploits/45193/ +CVE-2018-2628 - https://www.exploit-db.com/exploits/46513/ +CVE-2018-2629 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2629 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2629 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2630 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2631 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2632 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2633 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2633 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2633 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2634 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2634 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2634 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2635 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2636 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2636 - https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/ +CVE-2018-2636 - https://github.com/erpscanteam/CVE-2018-2636 +CVE-2018-2636 - https://www.exploit-db.com/exploits/43960/ +CVE-2018-2637 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2637 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2637 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2638 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2638 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2639 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2639 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2640 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2641 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2641 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2641 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2642 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2643 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2644 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2645 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2646 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2647 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2648 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2649 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2650 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2651 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2652 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2653 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2654 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2655 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2656 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2657 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2657 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2658 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2659 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2660 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2661 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2662 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2663 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2663 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2663 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2664 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2665 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2666 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2667 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2668 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2669 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2670 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2671 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2672 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2673 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2674 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2675 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2676 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2677 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2677 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2677 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2678 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2678 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2678 - https://usn.ubuntu.com/3614-1/ +CVE-2018-2679 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2680 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2681 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2682 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2683 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2684 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2685 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2686 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2687 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2688 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2689 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2690 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2691 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2692 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2693 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2694 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2695 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2696 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2697 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2698 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2698 - https://www.exploit-db.com/exploits/43878/ +CVE-2018-2699 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2700 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2701 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2702 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2703 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2704 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2705 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2706 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2707 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2708 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2709 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2710 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2711 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2712 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2713 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2714 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2715 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2716 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2717 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2719 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2720 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2721 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2722 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2723 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2724 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2725 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2726 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2727 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2728 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2729 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2730 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2731 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2732 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2733 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html +CVE-2018-2765 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-2767 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2767 - https://usn.ubuntu.com/3725-1/ +CVE-2018-2783 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2783 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2790 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2790 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2791 - https://www.exploit-db.com/exploits/44752/ +CVE-2018-2794 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2794 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2795 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2795 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2796 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2796 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2797 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2797 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2798 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2798 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2799 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2799 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2800 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2800 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2811 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2814 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2814 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2815 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2815 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us +CVE-2018-2825 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2826 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-2844 - https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html +CVE-2018-2875 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-2879 - http://packetstormsecurity.com/files/152551/OAMbuster-Multi-Threaded-CVE-2018-2879-Scanner.html +CVE-2018-2879 - https://www.sec-consult.com/en/blog/2018/05/oracle-access-managers-identity-crisis/ +CVE-2018-2880 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2018-2881 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2882 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2883 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2018-2887 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2888 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2889 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2891 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2892 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2892 - https://www.exploit-db.com/exploits/45126/ +CVE-2018-2893 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2894 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2895 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2896 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2897 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2898 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2899 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2900 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2901 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2902 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2903 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2904 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2905 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2906 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2907 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2908 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2909 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2911 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2912 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2912 - https://www.tenable.com/security/research/tra-2018-31 +CVE-2018-2913 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2913 - https://www.tenable.com/security/research/tra-2018-31 +CVE-2018-2914 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2914 - https://www.tenable.com/security/research/tra-2018-31 +CVE-2018-2915 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2916 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2917 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2918 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2919 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2920 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2921 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2922 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2923 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2924 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2925 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2926 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2927 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2928 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2929 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2930 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2932 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2933 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2934 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2935 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2936 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2937 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2938 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2939 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2940 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2941 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2942 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2943 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2944 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2945 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2946 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2947 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2948 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2949 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2950 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2951 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2952 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2953 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2954 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2955 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2956 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2957 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2958 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2959 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2960 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2961 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2962 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2963 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2964 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2965 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2966 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2967 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2968 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2969 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2970 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2971 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-2972 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2973 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2974 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2975 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2976 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2977 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2978 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2979 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2980 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2981 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2982 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2984 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2985 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2986 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2987 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2988 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2989 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2990 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2991 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2992 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2993 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2994 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2995 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2996 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2997 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2998 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-2999 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3000 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3001 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3002 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3003 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3004 - http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html +CVE-2018-3004 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3005 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3006 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3007 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3008 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3009 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3010 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3011 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3012 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3013 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3014 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3015 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3016 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3017 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3018 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3019 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3020 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3021 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3022 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3023 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3024 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3025 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3026 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3027 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3028 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3029 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3030 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3031 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3032 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3033 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3034 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3035 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3036 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3037 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3038 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3039 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3040 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3041 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3042 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3043 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3044 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3045 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3046 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3047 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3048 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3049 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3050 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3051 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3052 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3053 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3054 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3054 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3055 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3056 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3056 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3057 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3058 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3058 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3059 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3060 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3060 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3061 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3061 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3062 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3062 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3063 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3063 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3064 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3064 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3065 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3065 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3066 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3066 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3067 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3068 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3069 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3070 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3070 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3071 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3071 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3072 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3073 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3074 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3075 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3076 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3077 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3077 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3078 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3079 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3080 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3081 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3081 - https://usn.ubuntu.com/3725-1/ +CVE-2018-3082 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3084 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3085 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3086 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3087 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3088 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3089 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3090 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3091 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3092 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3093 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3094 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3095 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3096 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3097 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3098 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3099 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3100 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3101 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3102 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3103 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3104 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3105 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3108 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3109 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-3111 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2018-3115 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3120 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2018-3122 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3123 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2018-3125 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3126 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3127 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3128 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3129 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3130 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3131 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3132 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3133 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3134 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3135 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3136 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3137 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3138 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3139 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3140 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3141 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3142 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3143 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3144 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3145 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3146 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3147 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3147 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3148 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3149 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3150 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3151 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3152 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3153 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3154 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3155 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3156 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3157 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3158 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3159 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3160 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3161 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3162 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3163 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3164 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3165 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3166 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3167 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3168 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3169 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3170 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3171 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3172 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3173 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3174 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3175 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3176 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3177 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3178 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3179 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3180 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3181 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3182 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3183 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3184 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3185 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3186 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3187 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3188 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3189 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3190 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3191 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3192 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3193 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3194 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3195 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3196 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3197 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3198 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3200 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3201 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3202 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3203 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3204 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3205 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3206 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3207 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3208 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3209 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3210 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3211 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3212 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3213 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3214 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3215 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3217 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3218 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3219 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3220 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3221 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3222 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3223 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3224 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3225 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3226 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3227 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3228 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3229 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3230 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3231 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3232 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3233 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3234 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3235 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3236 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3237 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3238 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3239 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3241 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3242 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3243 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3244 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3245 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3245 - https://www.exploit-db.com/exploits/46513/ +CVE-2018-3246 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3246 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3247 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3248 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3249 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3250 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3251 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3252 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3253 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3254 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3255 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3256 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3257 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3258 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3259 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3261 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3262 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3263 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3264 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3265 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3266 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3267 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3268 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3269 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3270 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3271 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3272 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3273 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3274 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3275 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3276 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3277 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3278 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3279 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3280 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3281 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3282 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3283 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3284 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3285 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3286 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3287 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3288 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3289 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3290 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3291 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3292 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3293 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3294 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3295 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3296 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3297 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3298 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3299 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3300 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-3301 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3302 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-3303 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3304 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3305 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3309 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3311 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3312 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2018-3314 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2018-3315 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2018-3316 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2018-3574 - https://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000049462 +CVE-2018-3588 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-3589 - http://www.securityfocus.com/bid/103671 +CVE-2018-3590 - http://www.securityfocus.com/bid/103671 +CVE-2018-3591 - http://www.securityfocus.com/bid/103671 +CVE-2018-3592 - http://www.securityfocus.com/bid/103671 +CVE-2018-3593 - http://www.securityfocus.com/bid/103671 +CVE-2018-3594 - http://www.securityfocus.com/bid/103671 +CVE-2018-3595 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-3609 - https://korelogic.com/Resources/Advisories/KL-001-2018-006.txt +CVE-2018-3615 - https://www.kb.cert.org/vuls/id/982149 +CVE-2018-3620 - https://access.redhat.com/errata/RHSA-2018:2393 +CVE-2018-3620 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-3620 - https://www.kb.cert.org/vuls/id/982149 +CVE-2018-3620 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-3639 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-3639 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2018-3639 - https://usn.ubuntu.com/3777-3/ +CVE-2018-3639 - https://www.exploit-db.com/exploits/44695/ +CVE-2018-3639 - https://www.kb.cert.org/vuls/id/180049 +CVE-2018-3639 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-3639 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3640 - https://www.kb.cert.org/vuls/id/180049 +CVE-2018-3646 - https://access.redhat.com/errata/RHSA-2018:2393 +CVE-2018-3646 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-3646 - https://www.kb.cert.org/vuls/id/982149 +CVE-2018-3646 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-3646 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-3665 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-3665 - https://usn.ubuntu.com/3696-1/ +CVE-2018-3665 - https://usn.ubuntu.com/3698-1/ +CVE-2018-3665 - https://usn.ubuntu.com/3698-2/ +CVE-2018-3665 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-3693 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-3693 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-3693 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-3710 - https://gitlab.com/gitlab-org/gitlab-ce/issues/41757 +CVE-2018-3711 - https://hackerone.com/reports/303632 +CVE-2018-3712 - https://hackerone.com/reports/307666 +CVE-2018-3713 - https://hackerone.com/reports/309120 +CVE-2018-3714 - https://hackerone.com/reports/309124 +CVE-2018-3715 - https://hackerone.com/reports/310106 +CVE-2018-3716 - https://hackerone.com/reports/309648 +CVE-2018-3717 - https://hackerone.com/reports/309394 +CVE-2018-3717 - https://hackerone.com/reports/309641 +CVE-2018-3718 - https://hackerone.com/reports/308721 +CVE-2018-3719 - https://hackerone.com/reports/311236 +CVE-2018-3720 - https://hackerone.com/reports/310707 +CVE-2018-3721 - https://hackerone.com/reports/310443 +CVE-2018-3722 - https://hackerone.com/reports/310708 +CVE-2018-3723 - https://hackerone.com/reports/310514 +CVE-2018-3724 - https://hackerone.com/reports/310943 +CVE-2018-3725 - https://hackerone.com/reports/311218 +CVE-2018-3726 - https://hackerone.com/reports/311101 +CVE-2018-3727 - https://hackerone.com/reports/311216 +CVE-2018-3728 - https://hackerone.com/reports/310439 +CVE-2018-3728 - https://snyk.io/vuln/npm:hoek:20180212 +CVE-2018-3729 - https://hackerone.com/reports/312889 +CVE-2018-3730 - https://hackerone.com/reports/312907 +CVE-2018-3731 - https://hackerone.com/reports/312918 +CVE-2018-3732 - https://hackerone.com/reports/315760 +CVE-2018-3733 - https://hackerone.com/reports/310690 +CVE-2018-3734 - https://hackerone.com/reports/319003 +CVE-2018-3738 - https://hackerone.com/reports/319576 +CVE-2018-3741 - https://hackerone.com/reports/328270 +CVE-2018-3743 - https://hackerone.com/reports/320693 +CVE-2018-3744 - https://hackerone.com/reports/306607 +CVE-2018-3745 - https://hackerone.com/reports/321686 +CVE-2018-3746 - https://hackerone.com/reports/330957 +CVE-2018-3747 - https://hackerone.com/reports/316346 +CVE-2018-3748 - https://hackerone.com/reports/310133 +CVE-2018-3749 - https://hackerone.com/reports/310446 +CVE-2018-3750 - https://hackerone.com/reports/311333 +CVE-2018-3751 - https://hackerone.com/reports/311337 +CVE-2018-3752 - https://hackerone.com/reports/311336 +CVE-2018-3753 - https://hackerone.com/reports/310706 +CVE-2018-3754 - https://hackerone.com/reports/311244 +CVE-2018-3755 - https://hackerone.com/reports/328210 +CVE-2018-3757 - https://hackerone.com/reports/340208 +CVE-2018-3758 - https://hackerone.com/reports/343726 +CVE-2018-3760 - https://hackerone.com/reports/307808 +CVE-2018-3761 - https://hackerone.com/reports/343111 +CVE-2018-3762 - https://hackerone.com/reports/358339 +CVE-2018-3765 - https://hackerone.com/reports/331302 +CVE-2018-3766 - https://hackerone.com/reports/358112 +CVE-2018-3767 - https://hackerone.com/reports/319809 +CVE-2018-3769 - https://github.com/ruby-grape/grape/issues/1762 +CVE-2018-3770 - https://hackerone.com/reports/360727 +CVE-2018-3771 - https://hackerone.com/reports/355458 +CVE-2018-3772 - https://hackerone.com/reports/319476 +CVE-2018-3773 - https://hackerone.com/reports/309367 +CVE-2018-3774 - https://hackerone.com/reports/384029 +CVE-2018-3775 - https://hackerone.com/reports/248656 +CVE-2018-3776 - https://hackerone.com/reports/232347 +CVE-2018-3779 - https://hackerone.com/reports/392311 +CVE-2018-3780 - https://hackerone.com/reports/383117 +CVE-2018-3781 - https://hackerone.com/reports/383117 +CVE-2018-3783 - https://hackerone.com/reports/386807 +CVE-2018-3784 - https://hackerone.com/reports/350418 +CVE-2018-3785 - https://hackerone.com/reports/341710 +CVE-2018-3786 - https://hackerone.com/reports/388936 +CVE-2018-3787 - https://hackerone.com/reports/357109 +CVE-2018-3809 - https://hackerone.com/reports/330650 +CVE-2018-3810 - https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html +CVE-2018-3810 - https://wpvulndb.com/vulnerabilities/8987 +CVE-2018-3810 - https://www.exploit-db.com/exploits/43420/ +CVE-2018-3811 - https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html +CVE-2018-3811 - https://wpvulndb.com/vulnerabilities/8988 +CVE-2018-3811 - https://www.exploit-db.com/exploits/43420/ +CVE-2018-3814 - https://github.com/Snowty/myCVE/blob/master/CraftCMS-2.6.3000/README.md +CVE-2018-3815 - https://packetstormsecurity.com/files/145724/communigatepro62-spoof +CVE-2018-3823 - https://www.elastic.co/community/security +CVE-2018-3824 - https://www.elastic.co/community/security +CVE-2018-3825 - https://www.elastic.co/community/security +CVE-2018-3826 - https://www.elastic.co/community/security +CVE-2018-3827 - https://www.elastic.co/community/security +CVE-2018-3828 - https://www.elastic.co/community/security +CVE-2018-3829 - https://www.elastic.co/community/security +CVE-2018-3830 - https://www.elastic.co/community/security +CVE-2018-3831 - https://www.elastic.co/community/security +CVE-2018-3832 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0511 +CVE-2018-3833 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 +CVE-2018-3836 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516 +CVE-2018-3839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0521 +CVE-2018-3840 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0523 +CVE-2018-3841 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0524 +CVE-2018-3844 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0527 +CVE-2018-3845 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0528 +CVE-2018-3850 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0532 +CVE-2018-3851 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0534 +CVE-2018-3852 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0535 +CVE-2018-3853 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0536 +CVE-2018-3855 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0538 +CVE-2018-3856 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0539 +CVE-2018-3857 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0541 +CVE-2018-3858 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0542 +CVE-2018-3859 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0543 +CVE-2018-3860 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0544 +CVE-2018-3861 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0546 +CVE-2018-3862 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0547 +CVE-2018-3863 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0548 +CVE-2018-3864 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 +CVE-2018-3865 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 +CVE-2018-3866 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548 +CVE-2018-3867 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0549 +CVE-2018-3868 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0550 +CVE-2018-3870 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0552 +CVE-2018-3871 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0553 +CVE-2018-3872 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0554 +CVE-2018-3873 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 +CVE-2018-3874 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 +CVE-2018-3875 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 +CVE-2018-3876 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 +CVE-2018-3877 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555 +CVE-2018-3878 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0555 +CVE-2018-3879 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0556 +CVE-2018-3880 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0557 +CVE-2018-3882 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 +CVE-2018-3883 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 +CVE-2018-3884 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 +CVE-2018-3885 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 +CVE-2018-3886 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0561 +CVE-2018-3887 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0562 +CVE-2018-3888 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0563 +CVE-2018-3889 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0564 +CVE-2018-3893 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 +CVE-2018-3894 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 +CVE-2018-3895 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 +CVE-2018-3896 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 +CVE-2018-3897 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 +CVE-2018-3902 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0573 +CVE-2018-3903 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0574 +CVE-2018-3904 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0574 +CVE-2018-3905 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0575 +CVE-2018-3906 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0576 +CVE-2018-3907 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 +CVE-2018-3908 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 +CVE-2018-3909 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577 +CVE-2018-3911 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0578 +CVE-2018-3913 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 +CVE-2018-3914 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 +CVE-2018-3915 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 +CVE-2018-3916 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 +CVE-2018-3918 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0582 +CVE-2018-3919 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0583 +CVE-2018-3921 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0585 +CVE-2018-3922 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0586 +CVE-2018-3924 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0588 +CVE-2018-3926 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593 +CVE-2018-3927 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0594 +CVE-2018-3934 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0601 +CVE-2018-3937 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0604 +CVE-2018-3939 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0606 +CVE-2018-3940 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0607 +CVE-2018-3941 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0608 +CVE-2018-3942 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0609 +CVE-2018-3943 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610 +CVE-2018-3944 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611 +CVE-2018-3945 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0612 +CVE-2018-3946 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0613 +CVE-2018-3947 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0616 +CVE-2018-3948 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617 +CVE-2018-3949 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0618 +CVE-2018-3950 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0619 +CVE-2018-3951 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620 +CVE-2018-3952 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0622 +CVE-2018-3953 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 +CVE-2018-3954 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 +CVE-2018-3955 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625 +CVE-2018-3957 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 +CVE-2018-3958 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 +CVE-2018-3959 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 +CVE-2018-3960 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 +CVE-2018-3961 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 +CVE-2018-3962 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 +CVE-2018-3963 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0627 +CVE-2018-3964 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0629 +CVE-2018-3965 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0630 +CVE-2018-3966 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0631 +CVE-2018-3967 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0632 +CVE-2018-3968 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 +CVE-2018-3969 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634 +CVE-2018-3970 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0635 +CVE-2018-3971 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0636 +CVE-2018-3973 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0638 +CVE-2018-3974 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0640 +CVE-2018-3975 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0641 +CVE-2018-3976 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0642 +CVE-2018-3977 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0645 +CVE-2018-3978 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646 +CVE-2018-3979 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0647 +CVE-2018-3980 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0648 +CVE-2018-3981 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0649 +CVE-2018-3981 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0651 +CVE-2018-3982 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0650 +CVE-2018-3983 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0651 +CVE-2018-3984 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0652 +CVE-2018-3985 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0653 +CVE-2018-3986 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0654 +CVE-2018-3987 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0655 +CVE-2018-3989 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657 +CVE-2018-3990 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0658 +CVE-2018-3991 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 +CVE-2018-3992 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0660 +CVE-2018-3993 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0661 +CVE-2018-3994 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0662 +CVE-2018-3995 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0663 +CVE-2018-3996 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0664 +CVE-2018-3997 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0665 +CVE-2018-3998 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666 +CVE-2018-3999 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0667 +CVE-2018-4000 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0668 +CVE-2018-4001 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0669 +CVE-2018-4002 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0671 +CVE-2018-4003 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0672 +CVE-2018-4004 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0673 +CVE-2018-4005 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0674 +CVE-2018-4006 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0675 +CVE-2018-4007 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0676 +CVE-2018-4008 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0677 +CVE-2018-4009 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0678 +CVE-2018-4010 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0679 +CVE-2018-4011 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681 +CVE-2018-4012 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0683 +CVE-2018-4013 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684 +CVE-2018-4014 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0685 +CVE-2018-4015 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0686 +CVE-2018-4016 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0687 +CVE-2018-4017 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688 +CVE-2018-4018 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0689 +CVE-2018-4019 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 +CVE-2018-4020 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 +CVE-2018-4021 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 +CVE-2018-4022 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0694 +CVE-2018-4023 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0695 +CVE-2018-4024 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0696 +CVE-2018-4025 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0697 +CVE-2018-4026 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0698 +CVE-2018-4027 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0699 +CVE-2018-4028 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0700 +CVE-2018-4029 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0701 +CVE-2018-4030 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0702 +CVE-2018-4031 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703 +CVE-2018-4032 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0705 +CVE-2018-4033 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0706 +CVE-2018-4034 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0707 +CVE-2018-4035 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0708 +CVE-2018-4036 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0709 +CVE-2018-4037 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0710 +CVE-2018-4038 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0711 +CVE-2018-4039 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0712 +CVE-2018-4040 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0713 +CVE-2018-4041 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0715 +CVE-2018-4042 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0716 +CVE-2018-4043 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0717 +CVE-2018-4044 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0718 +CVE-2018-4045 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0719 +CVE-2018-4046 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0720 +CVE-2018-4047 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0721 +CVE-2018-4048 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0722 +CVE-2018-4049 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0723 +CVE-2018-4050 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0724 +CVE-2018-4052 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0726 +CVE-2018-4053 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0727 +CVE-2018-4054 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0728 +CVE-2018-4055 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0729 +CVE-2018-4056 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 +CVE-2018-4058 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0732 +CVE-2018-4059 - https://hackerone.com/reports/843263 +CVE-2018-4059 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0733 +CVE-2018-4061 - http://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html +CVE-2018-4061 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746 +CVE-2018-4062 - http://packetstormsecurity.com/files/152647/Sierra-Wireless-AirLink-ES450-SNMPD-Hard-Coded-Credentials.html +CVE-2018-4062 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747 +CVE-2018-4063 - http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html +CVE-2018-4063 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 +CVE-2018-4064 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0749 +CVE-2018-4065 - http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html +CVE-2018-4065 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750 +CVE-2018-4066 - http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html +CVE-2018-4066 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751 +CVE-2018-4067 - http://packetstormsecurity.com/files/152652/Sierra-Wireless-AirLink-ES450-ACEManager-template_load.cgi-Information-Disclosure.html +CVE-2018-4067 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0752 +CVE-2018-4068 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0753 +CVE-2018-4069 - http://packetstormsecurity.com/files/152654/Sierra-Wireless-AirLink-ES450-ACEManager-Information-Exposure.html +CVE-2018-4069 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0754 +CVE-2018-4070 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755 +CVE-2018-4071 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755 +CVE-2018-4072 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756 +CVE-2018-4073 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756 +CVE-2018-4083 - https://www.exploit-db.com/exploits/44007/ +CVE-2018-4087 - https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/ +CVE-2018-4087 - https://www.exploit-db.com/exploits/44215/ +CVE-2018-4089 - https://www.exploit-db.com/exploits/43937/ +CVE-2018-4090 - https://www.exploit-db.com/exploits/43923/ +CVE-2018-4095 - https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/ +CVE-2018-4121 - https://github.com/mwrlabs/CVE-2018-4121 +CVE-2018-4121 - https://www.exploit-db.com/exploits/44427/ +CVE-2018-4124 - https://nakedsecurity.sophos.com/2018/02/20/apple-fixes-that-1-character-to-crash-your-mac-and-iphone-bug/ +CVE-2018-4139 - https://www.exploit-db.com/exploits/44561/ +CVE-2018-4162 - http://packetstormsecurity.com/files/158874/Safari-Webkit-For-iOS-7.1.2-JIT-Optimization-Bug.html +CVE-2018-4192 - https://www.exploit-db.com/exploits/45048/ +CVE-2018-4193 - https://www.exploit-db.com/exploits/46428/ +CVE-2018-4200 - https://www.exploit-db.com/exploits/44566/ +CVE-2018-4206 - https://www.exploit-db.com/exploits/44562/ +CVE-2018-4218 - https://www.exploit-db.com/exploits/44861/ +CVE-2018-4222 - https://www.exploit-db.com/exploits/44859/ +CVE-2018-4230 - https://www.exploit-db.com/exploits/44847/ +CVE-2018-4233 - http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html +CVE-2018-4233 - https://www.exploit-db.com/exploits/45998/ +CVE-2018-4237 - https://www.exploit-db.com/exploits/45916/ +CVE-2018-4240 - https://www.exploit-db.com/exploits/45391/ +CVE-2018-4241 - https://www.exploit-db.com/exploits/44849/ +CVE-2018-4243 - https://www.exploit-db.com/exploits/44848/ +CVE-2018-4249 - http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html +CVE-2018-4259 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html +CVE-2018-4286 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html +CVE-2018-4287 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html +CVE-2018-4288 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html +CVE-2018-4291 - http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html +CVE-2018-4386 - http://packetstormsecurity.com/files/155871/Sony-Playstation-4-Webkit-Code-Execution.html +CVE-2018-4404 - https://www.exploit-db.com/exploits/45998/ +CVE-2018-4407 - http://packetstormsecurity.com/files/172832/iOS-11.4.1-macOS-10.13.6-icmp_error-Heap-Buffer-Overflow.html +CVE-2018-4832 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2018-4863 - http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-v10.7-TAMPER-PROTECTION-BYPASS-CVE-2018-4863.txt +CVE-2018-4863 - http://seclists.org/fulldisclosure/2018/Apr/6 +CVE-2018-4863 - https://www.exploit-db.com/exploits/44410/ +CVE-2018-4868 - https://github.com/Exiv2/exiv2/issues/202 +CVE-2018-4878 - https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign +CVE-2018-4878 - https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day +CVE-2018-4878 - https://github.com/vysec/CVE-2018-4878 +CVE-2018-4878 - https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/ +CVE-2018-4878 - https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139 +CVE-2018-4878 - https://www.exploit-db.com/exploits/44412/ +CVE-2018-4934 - https://www.exploit-db.com/exploits/44528/ +CVE-2018-4935 - https://www.exploit-db.com/exploits/44527/ +CVE-2018-4936 - https://www.exploit-db.com/exploits/44526/ +CVE-2018-4937 - https://www.exploit-db.com/exploits/44529/ +CVE-2018-4947 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4948 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4949 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4950 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4951 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4952 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4953 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4954 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4955 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4956 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4957 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4958 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4959 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4960 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4961 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4962 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4963 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4964 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4965 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4966 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4967 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4968 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4969 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4970 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4971 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4972 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4973 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4974 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4975 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4976 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4977 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4978 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4979 - http://www.securityfocus.com/bid/104168 +CVE-2018-4979 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4980 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4981 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4982 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4983 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4984 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4985 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4986 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4987 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4988 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4989 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4990 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4993 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4995 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-4996 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html +CVE-2018-5072 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5073 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5074 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5075 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5076 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5077 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5078 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2018-5079 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002130 +CVE-2018-5080 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x830020FC +CVE-2018-5081 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x830020F0 +CVE-2018-5082 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002128 +CVE-2018-5083 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300215B +CVE-2018-5084 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300212C +CVE-2018-5085 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002124 +CVE-2018-5086 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300215F +CVE-2018-5087 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x83002100 +CVE-2018-5088 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300211C +CVE-2018-5091 - https://bugzilla.mozilla.org/show_bug.cgi?id=1423086 +CVE-2018-5095 - https://bugzilla.mozilla.org/show_bug.cgi?id=1418447 +CVE-2018-5105 - https://bugzilla.mozilla.org/show_bug.cgi?id=1390882 +CVE-2018-5106 - https://bugzilla.mozilla.org/show_bug.cgi?id=1408708 +CVE-2018-5111 - https://bugzilla.mozilla.org/show_bug.cgi?id=1321619 +CVE-2018-5112 - https://bugzilla.mozilla.org/show_bug.cgi?id=1425224 +CVE-2018-5113 - https://bugzilla.mozilla.org/show_bug.cgi?id=1425267 +CVE-2018-5114 - https://bugzilla.mozilla.org/show_bug.cgi?id=1421324 +CVE-2018-5116 - https://bugzilla.mozilla.org/show_bug.cgi?id=1396399 +CVE-2018-5117 - https://bugzilla.mozilla.org/show_bug.cgi?id=1395508 +CVE-2018-5123 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123 +CVE-2018-5129 - https://bugzilla.mozilla.org/show_bug.cgi?id=1428947 +CVE-2018-5134 - https://bugzilla.mozilla.org/show_bug.cgi?id=1429379 +CVE-2018-5135 - https://bugzilla.mozilla.org/show_bug.cgi?id=1431371 +CVE-2018-5136 - https://bugzilla.mozilla.org/show_bug.cgi?id=1419166 +CVE-2018-5137 - https://bugzilla.mozilla.org/show_bug.cgi?id=1432870 +CVE-2018-5138 - https://bugzilla.mozilla.org/show_bug.cgi?id=1432624 +CVE-2018-5140 - https://bugzilla.mozilla.org/show_bug.cgi?id=1424261 +CVE-2018-5142 - https://bugzilla.mozilla.org/show_bug.cgi?id=1366357 +CVE-2018-5143 - https://bugzilla.mozilla.org/show_bug.cgi?id=1422643 +CVE-2018-5146 - https://bugzilla.mozilla.org/show_bug.cgi?id=1446062 +CVE-2018-5152 - https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 +CVE-2018-5157 - https://bugzilla.mozilla.org/show_bug.cgi?id=1449898 +CVE-2018-5158 - https://bugzilla.mozilla.org/show_bug.cgi?id=1452075 +CVE-2018-5159 - https://bugzilla.mozilla.org/show_bug.cgi?id=1441941 +CVE-2018-5159 - https://www.exploit-db.com/exploits/44759/ +CVE-2018-5162 - https://bugzilla.mozilla.org/show_bug.cgi?id=1457721 +CVE-2018-5164 - https://bugzilla.mozilla.org/show_bug.cgi?id=1416045 +CVE-2018-5166 - https://bugzilla.mozilla.org/show_bug.cgi?id=1437325 +CVE-2018-5168 - https://bugzilla.mozilla.org/show_bug.cgi?id=1449548 +CVE-2018-5172 - https://bugzilla.mozilla.org/show_bug.cgi?id=1436482 +CVE-2018-5173 - https://bugzilla.mozilla.org/show_bug.cgi?id=1438025 +CVE-2018-5175 - https://bugzilla.mozilla.org/show_bug.cgi?id=1432358 +CVE-2018-5176 - https://bugzilla.mozilla.org/show_bug.cgi?id=1442840 +CVE-2018-5181 - https://bugzilla.mozilla.org/show_bug.cgi?id=1424107 +CVE-2018-5188 - https://usn.ubuntu.com/3714-1/ +CVE-2018-5189 - https://www.exploit-db.com/exploits/43494/ +CVE-2018-5189 - https://www.fidusinfosec.com/jungo-windriver-code-execution-cve-2018-5189/ +CVE-2018-5210 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-5211 - https://www.exploit-db.com/exploits/43409/ +CVE-2018-5217 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_95002578 +CVE-2018-5218 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_950025b0 +CVE-2018-5219 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_83002168 +CVE-2018-5220 - https://github.com/rubyfly/K7AntiVirus_POC/tree/master/1_95002610 +CVE-2018-5221 - http://hyp3rlinx.altervista.org/advisories/BARCODEWIZ-v6.7-ACTIVEX-COMPONENT-BUFFER-OVERFLOW.txt +CVE-2018-5221 - http://packetstormsecurity.com/files/145731/BarcodeWiz-ActiveX-Control-Buffer-Overflow.html +CVE-2018-5227 - https://ecosystem.atlassian.net/browse/APL-1361 +CVE-2018-5229 - https://ecosystem.atlassian.net/browse/UPM-5871 +CVE-2018-5233 - http://www.openwall.com/lists/oss-security/2018/03/15/1 +CVE-2018-5233 - https://sysdream.com/news/lab/2018-03-15-cve-2018-5233-grav-cms-admin-plugin-reflected-cross-site-scripting-xss-vulnerability/ +CVE-2018-5234 - https://www.exploit-db.com/exploits/44574/ +CVE-2018-5246 - https://github.com/ImageMagick/ImageMagick/issues/929 +CVE-2018-5247 - https://github.com/ImageMagick/ImageMagick/issues/928 +CVE-2018-5248 - https://github.com/ImageMagick/ImageMagick/issues/927 +CVE-2018-5251 - https://github.com/libming/libming/issues/97 +CVE-2018-5252 - https://github.com/jsummers/imageworsener/issues/34 +CVE-2018-5253 - https://github.com/axiomatic-systems/Bento4/issues/233 +CVE-2018-5262 - http://packetstormsecurity.com/files/145825/DiskBoss-Enterprise-8.8.16-Buffer-Overflow.html +CVE-2018-5262 - https://www.exploit-db.com/exploits/43478/ +CVE-2018-5263 - https://www.exploit-db.com/exploits/43488/ +CVE-2018-5270 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e010 +CVE-2018-5271 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e008 +CVE-2018-5272 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e004 +CVE-2018-5273 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e014 +CVE-2018-5274 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E024 +CVE-2018-5275 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E020 +CVE-2018-5276 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e018 +CVE-2018-5277 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e000 +CVE-2018-5278 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e00c +CVE-2018-5279 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e02c +CVE-2018-5280 - https://www.vulnerability-lab.com/get_content.php?id=1725 +CVE-2018-5281 - https://www.vulnerability-lab.com/get_content.php?id=1729 +CVE-2018-5282 - https://www.exploit-db.com/exploits/43547/ +CVE-2018-5282 - https://www.vulnerability-lab.com/get_content.php?id=1943 +CVE-2018-5283 - https://www.vulnerability-lab.com/get_content.php?id=1600 +CVE-2018-5284 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ImageInject.md +CVE-2018-5284 - https://wpvulndb.com/vulnerabilities/8994 +CVE-2018-5285 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/ImageInject.md +CVE-2018-5285 - https://wpvulndb.com/vulnerabilities/8994 +CVE-2018-5286 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5286 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5287 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5287 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5288 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5288 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5289 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5289 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5290 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5290 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5291 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5291 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5292 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5292 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5293 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md +CVE-2018-5293 - https://wpvulndb.com/vulnerabilities/8995 +CVE-2018-5294 - https://github.com/libming/libming/issues/98 +CVE-2018-5295 - https://bugzilla.redhat.com/show_bug.cgi?id=1531897 +CVE-2018-5296 - https://bugzilla.redhat.com/show_bug.cgi?id=1531956 +CVE-2018-5306 - http://seclists.org/fulldisclosure/2018/Feb/23 +CVE-2018-5306 - https://support.sonatype.com/hc/en-us/articles/360000134968 +CVE-2018-5307 - http://seclists.org/fulldisclosure/2018/Feb/23 +CVE-2018-5307 - https://support.sonatype.com/hc/en-us/articles/360000134928 +CVE-2018-5308 - https://bugzilla.redhat.com/show_bug.cgi?id=1532390 +CVE-2018-5309 - https://bugzilla.redhat.com/show_bug.cgi?id=1532381 +CVE-2018-5313 - http://packetstormsecurity.com/files/146668/Rapid-Scada-5.5.0-Insecure-Permissions.html +CVE-2018-5315 - http://packetstormsecurity.com/files/145833/WordPress-Events-Calendar-1.0-SQL-Injection.html +CVE-2018-5315 - https://www.exploit-db.com/exploits/43479/ +CVE-2018-5316 - https://packetstormsecurity.com/files/145459/WordPress-Sagepay-Server-Gateway-For-WooCommerce-1.0.7-XSS.html +CVE-2018-5319 - https://www.exploit-db.com/exploits/43856/ +CVE-2018-5330 - http://packetstormsecurity.com/files/145863/ZyXEL-P-660HW-UDP-Denial-Of-Service.html +CVE-2018-5332 - https://usn.ubuntu.com/3620-1/ +CVE-2018-5333 - http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html +CVE-2018-5333 - https://usn.ubuntu.com/3583-2/ +CVE-2018-5344 - https://usn.ubuntu.com/3583-2/ +CVE-2018-5347 - https://www.exploit-db.com/exploits/43659/ +CVE-2018-5353 - https://github.com/missing0x00/CVE-2018-5353 +CVE-2018-5354 - https://github.com/missing0x00/CVE-2018-5354 +CVE-2018-5357 - https://github.com/ImageMagick/ImageMagick/issues/941 +CVE-2018-5359 - http://packetstormsecurity.com/files/145900/SysGauge-Server-3.6.18-Buffer-Overflow.html +CVE-2018-5359 - https://www.exploit-db.com/exploits/43588/ +CVE-2018-5360 - https://sourceforge.net/p/graphicsmagick/bugs/540/ +CVE-2018-5361 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5361 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5362 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5362 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5363 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5363 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5364 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5364 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5365 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5365 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5366 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5366 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5367 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md +CVE-2018-5367 - https://wpvulndb.com/vulnerabilities/9003 +CVE-2018-5368 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/SrbTransLatin.md +CVE-2018-5368 - https://wpvulndb.com/vulnerabilities/9004 +CVE-2018-5369 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/SrbTransLatin.md +CVE-2018-5369 - https://wpvulndb.com/vulnerabilities/9004 +CVE-2018-5370 - http://packetstormsecurity.com/files/145872/Xnami-Image-Sharing-1.0-Cross-Site-Scripting.html +CVE-2018-5370 - https://www.exploit-db.com/exploits/43535/ +CVE-2018-5378 - http://www.kb.cert.org/vuls/id/940439 +CVE-2018-5379 - http://www.kb.cert.org/vuls/id/940439 +CVE-2018-5380 - http://www.kb.cert.org/vuls/id/940439 +CVE-2018-5381 - http://www.kb.cert.org/vuls/id/940439 +CVE-2018-5382 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-5383 - https://usn.ubuntu.com/4118-1/ +CVE-2018-5383 - https://www.kb.cert.org/vuls/id/304725 +CVE-2018-5384 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 +CVE-2018-5384 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html +CVE-2018-5385 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 +CVE-2018-5385 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html +CVE-2018-5386 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 +CVE-2018-5386 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html +CVE-2018-5387 - https://github.com/GoGentoOSS/SAMLBase/issues/3 +CVE-2018-5387 - https://www.kb.cert.org/vuls/id/475445 +CVE-2018-5388 - http://packetstormsecurity.com/files/172833/strongSwan-VPN-Charon-Server-Buffer-Overflow.html +CVE-2018-5388 - http://www.kb.cert.org/vuls/id/338343 +CVE-2018-5389 - https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html +CVE-2018-5389 - https://www.kb.cert.org/vuls/id/857035 +CVE-2018-5390 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-5390 - https://www.kb.cert.org/vuls/id/962459 +CVE-2018-5390 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-5390 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-5393 - https://www.kb.cert.org/vuls/id/581311 +CVE-2018-5403 - https://www.exploit-db.com/exploits/45542 +CVE-2018-5404 - https://www.kb.cert.org/vuls/id/877837/ +CVE-2018-5405 - http://packetstormsecurity.com/files/153150/Dell-KACE-System-Management-Appliance-SMA-XSS-SQL-Injection.html +CVE-2018-5405 - https://www.kb.cert.org/vuls/id/877837/ +CVE-2018-5406 - http://packetstormsecurity.com/files/153150/Dell-KACE-System-Management-Appliance-SMA-XSS-SQL-Injection.html +CVE-2018-5406 - https://www.kb.cert.org/vuls/id/877837/ +CVE-2018-5407 - https://github.com/bbbrumley/portsmash +CVE-2018-5407 - https://www.exploit-db.com/exploits/45785/ +CVE-2018-5407 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-5407 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-5407 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-5407 - https://www.tenable.com/security/tns-2018-16 +CVE-2018-5407 - https://www.tenable.com/security/tns-2018-17 +CVE-2018-5410 - https://www.exploit-db.com/exploits/46155/ +CVE-2018-5411 - https://www.kb.cert.org/vuls/id/756913/ +CVE-2018-5412 - https://www.exploit-db.com/exploits/45132 +CVE-2018-5413 - https://www.exploit-db.com/exploits/45130 +CVE-2018-5430 - https://www.exploit-db.com/exploits/44623/ +CVE-2018-5441 - https://cert.vde.com/en-us/advisories/vde-2018-001 +CVE-2018-5479 - https://www.exploit-db.com/exploits/43567/ +CVE-2018-5511 - http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html +CVE-2018-5511 - https://www.exploit-db.com/exploits/46600/ +CVE-2018-5529 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt +CVE-2018-5546 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt +CVE-2018-5650 - https://github.com/ckolivas/lrzip/issues/88 +CVE-2018-5651 - https://wpvulndb.com/vulnerabilities/9008 +CVE-2018-5652 - https://wpvulndb.com/vulnerabilities/9008 +CVE-2018-5653 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md +CVE-2018-5653 - https://wpvulndb.com/vulnerabilities/9009 +CVE-2018-5654 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md +CVE-2018-5654 - https://wpvulndb.com/vulnerabilities/9009 +CVE-2018-5655 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md +CVE-2018-5656 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/weblizar-pinterest-feeds.md +CVE-2018-5657 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5657 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5658 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5658 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5659 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5659 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5660 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5660 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5661 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5661 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5662 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5662 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5663 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5663 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5664 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5664 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5665 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5665 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5666 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md +CVE-2018-5666 - https://wpvulndb.com/vulnerabilities/9010 +CVE-2018-5667 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/read-and-understood.md +CVE-2018-5668 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/read-and-understood.md +CVE-2018-5669 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/read-and-understood.md +CVE-2018-5670 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md +CVE-2018-5670 - https://wpvulndb.com/vulnerabilities/9012 +CVE-2018-5671 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md +CVE-2018-5671 - https://wpvulndb.com/vulnerabilities/9012 +CVE-2018-5672 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md +CVE-2018-5672 - https://wpvulndb.com/vulnerabilities/9012 +CVE-2018-5673 - https://github.com/d4wner/Vulnerabilities-Report/blob/master/booking-calendar.md +CVE-2018-5673 - https://wpvulndb.com/vulnerabilities/9012 +CVE-2018-5684 - https://bugzilla.libav.org/show_bug.cgi?id=1110 +CVE-2018-5685 - https://sourceforge.net/p/graphicsmagick/bugs/541/ +CVE-2018-5686 - https://bugs.ghostscript.com/show_bug.cgi?id=698860 +CVE-2018-5688 - https://www.exploit-db.com/exploits/43595/ +CVE-2018-5691 - https://www.vulnerability-lab.com/get_content.php?id=1819 +CVE-2018-5692 - https://www.vulnerability-lab.com/get_content.php?id=2005 +CVE-2018-5693 - https://www.vulnerability-lab.com/get_content.php?id=2113 +CVE-2018-5694 - https://www.vulnerability-lab.com/get_content.php?id=1907 +CVE-2018-5695 - https://www.vulnerability-lab.com/get_content.php?id=1940 +CVE-2018-5696 - https://www.vulnerability-lab.com/get_content.php?id=1927 +CVE-2018-5697 - https://www.vulnerability-lab.com/get_content.php?id=2006 +CVE-2018-5698 - https://github.com/WizardMac/ReadStat/issues/108 +CVE-2018-5701 - http://packetstormsecurity.com/files/146165/System-Shield-5.0.0.136-Privilege-Escalation.html +CVE-2018-5701 - https://www.exploit-db.com/exploits/43929/ +CVE-2018-5701 - https://www.greyhathacker.net/?p=1006 +CVE-2018-5702 - https://github.com/transmission/transmission/pull/468 +CVE-2018-5702 - https://www.exploit-db.com/exploits/43665/ +CVE-2018-5704 - https://sourceforge.net/p/openocd/mailman/message/36188041/ +CVE-2018-5705 - http://packetstormsecurity.com/files/145940/Reservo-Image-Hosting-Script-1.5-Cross-Site-Scripting.html +CVE-2018-5705 - https://www.exploit-db.com/exploits/43676/ +CVE-2018-5708 - http://seclists.org/fulldisclosure/2018/Mar/66 +CVE-2018-5708 - https://www.exploit-db.com/exploits/44388/ +CVE-2018-5711 - https://bugs.php.net/bug.php?id=75571 +CVE-2018-5711 - https://hackerone.com/reports/305972 +CVE-2018-5711 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-5712 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-5713 - https://github.com/whiteHat001/DRIVER_POC/tree/master/malwarefox/0x80002010 +CVE-2018-5714 - https://github.com/whiteHat001/DRIVER_POC/tree/master/malwarefox/0x80002054 +CVE-2018-5715 - https://www.exploit-db.com/exploits/43683/ +CVE-2018-5720 - https://www.exploit-db.com/exploits/43898/ +CVE-2018-5723 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html +CVE-2018-5723 - https://www.exploit-db.com/exploits/43693/ +CVE-2018-5724 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html +CVE-2018-5724 - https://www.exploit-db.com/exploits/43693/ +CVE-2018-5725 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html +CVE-2018-5725 - https://www.exploit-db.com/exploits/43693/ +CVE-2018-5726 - https://packetstormsecurity.com/files/145935/Master-IP-CAM-01-Hardcoded-Password-Unauthenticated-Access.html +CVE-2018-5726 - https://www.exploit-db.com/exploits/43693/ +CVE-2018-5727 - https://github.com/uclouvain/openjpeg/issues/1053 +CVE-2018-5731 - https://improsec.com/blog/heimdal-advisory-2 +CVE-2018-5737 - https://kb.isc.org/docs/aa-01606 +CVE-2018-5747 - https://github.com/ckolivas/lrzip/issues/90 +CVE-2018-5750 - https://usn.ubuntu.com/3698-1/ +CVE-2018-5750 - https://usn.ubuntu.com/3698-2/ +CVE-2018-5751 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2018-5751 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2018-5751 - https://www.exploit-db.com/exploits/44881/ +CVE-2018-5752 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2018-5752 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2018-5752 - https://www.exploit-db.com/exploits/44881/ +CVE-2018-5753 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2018-5753 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2018-5753 - https://www.exploit-db.com/exploits/44881/ +CVE-2018-5754 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2018-5754 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2018-5754 - https://www.exploit-db.com/exploits/44881/ +CVE-2018-5755 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2018-5755 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2018-5755 - https://www.exploit-db.com/exploits/44881/ +CVE-2018-5756 - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html +CVE-2018-5756 - http://seclists.org/fulldisclosure/2018/Jun/23 +CVE-2018-5756 - https://www.exploit-db.com/exploits/44881/ +CVE-2018-5757 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 +CVE-2018-5759 - https://bugs.ghostscript.com/show_bug.cgi?id=698868 +CVE-2018-5759 - https://www.exploit-db.com/exploits/43904/ +CVE-2018-5761 - https://support.rubrik.com/articles/How_To/000001135 +CVE-2018-5766 - https://bugzilla.libav.org/show_bug.cgi?id=1112 +CVE-2018-5767 - https://www.exploit-db.com/exploits/44253/ +CVE-2018-5767 - https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/ +CVE-2018-5772 - https://github.com/Exiv2/exiv2/issues/216 +CVE-2018-5773 - https://github.com/trentm/python-markdown2/issues/285 +CVE-2018-5782 - https://github.com/twosevenzero/shoretel-mitel-rce +CVE-2018-5782 - https://www.exploit-db.com/exploits/46174/ +CVE-2018-5783 - https://bugzilla.redhat.com/show_bug.cgi?id=1536179 +CVE-2018-5783 - https://sourceforge.net/p/podofo/tickets/27/ +CVE-2018-5784 - http://bugzilla.maptools.org/show_bug.cgi?id=2772 +CVE-2018-5784 - https://usn.ubuntu.com/3606-1/ +CVE-2018-5785 - https://github.com/uclouvain/openjpeg/issues/1057 +CVE-2018-5786 - https://github.com/ckolivas/lrzip/issues/91 +CVE-2018-5787 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5788 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5789 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5790 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5791 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5792 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5793 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5794 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5795 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5796 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5797 - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003 +CVE-2018-5799 - http://seclists.org/fulldisclosure/2018/Mar/58 +CVE-2018-5803 - https://usn.ubuntu.com/3698-1/ +CVE-2018-5803 - https://usn.ubuntu.com/3698-2/ +CVE-2018-5803 - https://www.spinics.net/lists/netdev/msg482523.html +CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43 +CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11 +CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133 +CVE-2018-5814 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102 +CVE-2018-5814 - https://usn.ubuntu.com/3696-1/ +CVE-2018-5837 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5838 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5839 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5866 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5867 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5868 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5869 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5870 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5871 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5874 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5875 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5876 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5877 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5878 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5879 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5880 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5881 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5882 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5884 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5885 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5891 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5892 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5894 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5912 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5913 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5914 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5915 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5916 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5917 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5918 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2018-5924 - https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/ +CVE-2018-5925 - https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/ +CVE-2018-5950 - http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html +CVE-2018-5951 - https://github.com/Nat-Lab/CVE-2018-5951 +CVE-2018-5954 - http://packetstormsecurity.com/files/146037/PHPFreeChat-1.7-Denial-Of-Service.html +CVE-2018-5954 - https://www.exploit-db.com/exploits/43852/ +CVE-2018-5955 - https://www.exploit-db.com/exploits/44356/ +CVE-2018-5956 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402414 +CVE-2018-5957 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C40242C +CVE-2018-5958 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402424 +CVE-2018-5960 - https://www.vulnerability-lab.com/get_content.php?id=2043 +CVE-2018-5961 - https://www.vulnerability-lab.com/get_content.php?id=1835 +CVE-2018-5962 - https://www.vulnerability-lab.com/get_content.php?id=1836 +CVE-2018-5963 - http://packetstormsecurity.com/files/146033/CMS-Made-Simple-2.2.5-Persistent-Cross-Site-Scripting.html +CVE-2018-5963 - http://seclists.org/fulldisclosure/2018/Jan/80 +CVE-2018-5964 - http://packetstormsecurity.com/files/146034/CMS-Made-Simple-2.2.5-moduleinterface.php-title-Cross-Site-Scripting.html +CVE-2018-5964 - http://seclists.org/fulldisclosure/2018/Jan/82 +CVE-2018-5965 - http://packetstormsecurity.com/files/146035/CMS-Made-Simple-2.2.5-moduleinterface.php-m1_errors-Cross-Site-Scripting.html +CVE-2018-5965 - http://seclists.org/fulldisclosure/2018/Jan/83 +CVE-2018-5967 - https://packetstormsecurity.com/files/145513/Netis-WF2419-HTML-Injection.html +CVE-2018-5968 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-5969 - https://www.exploit-db.com/exploits/43867/ +CVE-2018-5970 - https://exploit-db.com/exploits/44116 +CVE-2018-5971 - https://exploit-db.com/exploits/44122 +CVE-2018-5972 - https://www.exploit-db.com/exploits/43868/ +CVE-2018-5973 - http://packetstormsecurity.com/files/146071/Professional-Local-Directory-Script-1.0-SQL-Injection.html +CVE-2018-5973 - https://www.exploit-db.com/exploits/43870/ +CVE-2018-5974 - https://exploit-db.com/exploits/44126 +CVE-2018-5975 - https://exploit-db.com/exploits/44127 +CVE-2018-5976 - https://www.exploit-db.com/exploits/43862/ +CVE-2018-5977 - https://www.exploit-db.com/exploits/43861/ +CVE-2018-5978 - https://www.exploit-db.com/exploits/43865/ +CVE-2018-5979 - https://www.exploit-db.com/exploits/43864/ +CVE-2018-5980 - https://exploit-db.com/exploits/44128 +CVE-2018-5981 - https://exploit-db.com/exploits/44112 +CVE-2018-5982 - https://exploit-db.com/exploits/44105 +CVE-2018-5983 - https://exploit-db.com/exploits/44118 +CVE-2018-5984 - https://www.exploit-db.com/exploits/43866/ +CVE-2018-5985 - https://www.exploit-db.com/exploits/43860/ +CVE-2018-5986 - https://www.exploit-db.com/exploits/43863/ +CVE-2018-5987 - https://exploit-db.com/exploits/44131 +CVE-2018-5988 - https://www.exploit-db.com/exploits/43869/ +CVE-2018-5989 - https://exploit-db.com/exploits/44132 +CVE-2018-5990 - https://exploit-db.com/exploits/44107 +CVE-2018-5991 - https://exploit-db.com/exploits/44111 +CVE-2018-5992 - https://exploit-db.com/exploits/44129 +CVE-2018-5993 - https://exploit-db.com/exploits/44106 +CVE-2018-5994 - https://exploit-db.com/exploits/44120 +CVE-2018-5997 - https://www.exploit-db.com/exploits/43871/ +CVE-2018-5999 - https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt +CVE-2018-5999 - https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb +CVE-2018-5999 - https://www.exploit-db.com/exploits/43881/ +CVE-2018-5999 - https://www.exploit-db.com/exploits/44176/ +CVE-2018-6000 - https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt +CVE-2018-6000 - https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb +CVE-2018-6000 - https://www.exploit-db.com/exploits/43881/ +CVE-2018-6000 - https://www.exploit-db.com/exploits/44176/ +CVE-2018-6004 - https://exploit-db.com/exploits/44110 +CVE-2018-6005 - https://exploit-db.com/exploits/44125 +CVE-2018-6006 - https://exploit-db.com/exploits/44119 +CVE-2018-6007 - https://packetstormsecurity.com/files/146135/Joomla-JS-Support-Ticket-1.1.0-Cross-Site-Request-Forgery.html +CVE-2018-6007 - https://www.exploit-db.com/exploits/43912/ +CVE-2018-6008 - https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html +CVE-2018-6008 - https://www.exploit-db.com/exploits/43913/ +CVE-2018-6013 - https://github.com/bigtreecms/BigTree-CMS/issues/327 +CVE-2018-6014 - https://www.youtube.com/watch?v=t3nYuhAHOMg +CVE-2018-6015 - https://www.exploit-db.com/exploits/43872/ +CVE-2018-6017 - https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/ +CVE-2018-6018 - https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/ +CVE-2018-6022 - http://blackwolfsec.cc/2018/01/22/Nonecms/ +CVE-2018-6023 - http://packetstormsecurity.com/files/147571/Fastweb-FASTGate-0.00.47-Cross-Site-Request-Forgery.html +CVE-2018-6023 - https://www.exploit-db.com/exploits/44606/ +CVE-2018-6024 - http://packetstormsecurity.com/files/146454/Joomla-Project-Log-1.5.3-SQL-Injection.html +CVE-2018-6024 - https://www.exploit-db.com/exploits/44124/ +CVE-2018-6064 - https://www.exploit-db.com/exploits/44394/ +CVE-2018-6065 - https://www.exploit-db.com/exploits/44584/ +CVE-2018-6084 - https://www.exploit-db.com/exploits/44307/ +CVE-2018-6092 - https://www.exploit-db.com/exploits/44860/ +CVE-2018-6126 - https://www.exploit-db.com/exploits/45098/ +CVE-2018-6180 - http://packetstormsecurity.com/files/146254/Online-Voting-System-Authentication-Bypass.html +CVE-2018-6180 - https://www.exploit-db.com/exploits/43967/ +CVE-2018-6187 - https://bugs.ghostscript.com/show_bug.cgi?id=698908 +CVE-2018-6190 - https://packetstormsecurity.com/files/146032/Netis-WF2419-3.2.41381-Cross-Site-Scripting.html +CVE-2018-6190 - https://www.exploit-db.com/exploits/43981/ +CVE-2018-6191 - https://bugs.ghostscript.com/show_bug.cgi?id=698920 +CVE-2018-6191 - https://www.exploit-db.com/exploits/43903/ +CVE-2018-6192 - https://bugs.ghostscript.com/show_bug.cgi?id=698916 +CVE-2018-6193 - https://www.exploit-db.com/exploits/44216/ +CVE-2018-6194 - http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html +CVE-2018-6194 - http://seclists.org/fulldisclosure/2018/Jan/91 +CVE-2018-6194 - https://wpvulndb.com/vulnerabilities/9016 +CVE-2018-6195 - http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html +CVE-2018-6195 - http://seclists.org/fulldisclosure/2018/Jan/91 +CVE-2018-6195 - https://wpvulndb.com/vulnerabilities/9015 +CVE-2018-6200 - https://cxsecurity.com/issue/WLB-2018010251 +CVE-2018-6201 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020E0_0x830020E4 +CVE-2018-6202 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020F8 +CVE-2018-6203 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x8300210C +CVE-2018-6204 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/SDActMon +CVE-2018-6205 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x220009 +CVE-2018-6206 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x220011 +CVE-2018-6207 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_220019 +CVE-2018-6208 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxProtector32_0x22000d +CVE-2018-6209 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/MaxSecureAntivirus_POC/tree/master/MaxCryptMon +CVE-2018-6211 - https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html +CVE-2018-6211 - https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/ +CVE-2018-6212 - https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html +CVE-2018-6212 - https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/ +CVE-2018-6213 - https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html +CVE-2018-6213 - https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/ +CVE-2018-6217 - https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180122 +CVE-2018-6219 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6219 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6220 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6220 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6221 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6221 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6222 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6222 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6223 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6223 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6224 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6224 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6225 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6225 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6226 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6226 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6227 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6227 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6228 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6228 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6229 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6229 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6230 - https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities +CVE-2018-6230 - https://www.exploit-db.com/exploits/44166/ +CVE-2018-6237 - https://www.tenable.com/security/research/tra-2018-10 +CVE-2018-6240 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2018-6241 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2018-6253 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0522 +CVE-2018-6260 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2018-6263 - https://support.lenovo.com/us/en/product_security/LEN-25444 +CVE-2018-6265 - https://support.lenovo.com/us/en/product_security/LEN-25444 +CVE-2018-6266 - https://support.lenovo.com/us/en/product_security/LEN-25444 +CVE-2018-6267 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2018-6268 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2018-6269 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2018-6288 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 +CVE-2018-6288 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities +CVE-2018-6289 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 +CVE-2018-6289 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities +CVE-2018-6290 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 +CVE-2018-6290 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities +CVE-2018-6291 - https://support.kaspersky.com/vulnerability.aspx?el=12430#010218 +CVE-2018-6291 - https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities +CVE-2018-6306 - https://support.kaspersky.com/vulnerability.aspx?el=12430#120418 +CVE-2018-6307 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/ +CVE-2018-6311 - https://gist.github.com/DrmnSamoLiu/cd1d6fa59501f161616686296aa4a6c8 +CVE-2018-6312 - https://gist.github.com/DrmnSamoLiu/cd1d6fa59501f161616686296aa4a6c8 +CVE-2018-6315 - https://github.com/libming/libming/issues/101 +CVE-2018-6317 - https://medium.com/@res1n/claymore-dual-gpu-miner-10-5-format-strings-vulnerability-916ab3d2db30 +CVE-2018-6317 - https://www.exploit-db.com/exploits/43972/ +CVE-2018-6320 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 +CVE-2018-6323 - https://sourceware.org/bugzilla/show_bug.cgi?id=22746 +CVE-2018-6323 - https://www.exploit-db.com/exploits/44035/ +CVE-2018-6328 - https://www.exploit-db.com/exploits/44297/ +CVE-2018-6328 - https://www.exploit-db.com/exploits/45559/ +CVE-2018-6329 - https://www.exploit-db.com/exploits/44297/ +CVE-2018-6329 - https://www.exploit-db.com/exploits/45913/ +CVE-2018-6336 - https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ +CVE-2018-6350 - https://www.facebook.com/security/advisories/cve-2018-6350/ +CVE-2018-6352 - https://bugzilla.redhat.com/show_bug.cgi?id=1539237 +CVE-2018-6353 - https://github.com/spesmilo/electrum/issues/3678 +CVE-2018-6353 - https://github.com/spesmilo/electrum/pull/3700 +CVE-2018-6356 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-6357 - http://lists.openwall.net/full-disclosure/2018/01/10/8 +CVE-2018-6358 - https://github.com/libming/libming/issues/104 +CVE-2018-6359 - https://github.com/libming/libming/issues/105 +CVE-2018-6361 - http://packetstormsecurity.com/files/147553/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Scripting-Add-FTP-Account.html +CVE-2018-6362 - http://packetstormsecurity.com/files/147554/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Scripting-Cookie-Theft.html +CVE-2018-6363 - https://packetstormsecurity.com/files/146131/Task-Rabbit-Clone-1.0-SQL-Injection.html +CVE-2018-6363 - https://www.exploit-db.com/exploits/43914/ +CVE-2018-6364 - https://packetstormsecurity.com/files/146130/Multilanguage-Real-Estate-MLM-Script-3.0-SQL-Injection.html +CVE-2018-6364 - https://www.exploit-db.com/exploits/43917/ +CVE-2018-6365 - https://packetstormsecurity.com/files/146128/TSiteBuilder-1.0-SQL-Injection.html +CVE-2018-6365 - https://www.exploit-db.com/exploits/43915/ +CVE-2018-6367 - https://packetstormsecurity.com/files/146136/Vastal-I-Tech-Facebook-Clone-2.9.9-SQL-Injection.html +CVE-2018-6367 - https://www.exploit-db.com/exploits/43918/ +CVE-2018-6368 - https://exploit-db.com/exploits/44117 +CVE-2018-6370 - https://exploit-db.com/exploits/44123 +CVE-2018-6372 - https://exploit-db.com/exploits/44115 +CVE-2018-6373 - https://exploit-db.com/exploits/44109 +CVE-2018-6374 - http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43620 +CVE-2018-6381 - https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-6381 +CVE-2018-6381 - https://github.com/gdraheim/zziplib/issues/12 +CVE-2018-6383 - http://packetstormsecurity.com/files/162968/Monstra-CMS-3.0.4-Remote-Code-Execution.html +CVE-2018-6389 - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html +CVE-2018-6389 - https://github.com/WazeHell/CVE-2018-6389 +CVE-2018-6389 - https://thehackernews.com/2018/02/wordpress-dos-exploit.html +CVE-2018-6389 - https://www.exploit-db.com/exploits/43968/ +CVE-2018-6390 - https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180129 +CVE-2018-6391 - https://0day.today/exploit/29659 +CVE-2018-6391 - https://packetstormsecurity.com/files/146117/netiswf2419-xsrf.txt +CVE-2018-6391 - https://www.exploit-db.com/exploits/43919/ +CVE-2018-6392 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/c6939f65a116b1ffed345d29d8621ee4ffb32235 +CVE-2018-6393 - http://code610.blogspot.com/2018/01/post-auth-sql-injection-in-freepbx.html +CVE-2018-6393 - https://github.com/c610/tmp/blob/master/sqlipoc-freepbx-14.0.1.24-req.txt +CVE-2018-6394 - https://exploit-db.com/exploits/44114 +CVE-2018-6395 - https://www.exploit-db.com/exploits/43933/ +CVE-2018-6396 - https://exploit-db.com/exploits/44113 +CVE-2018-6397 - https://www.exploit-db.com/exploits/43931/ +CVE-2018-6398 - https://www.exploit-db.com/exploits/43932/ +CVE-2018-6407 - https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/ +CVE-2018-6408 - https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/ +CVE-2018-6409 - https://metalamin.github.io/MachForm-not-0-day-EN/ +CVE-2018-6409 - https://www.exploit-db.com/exploits/44804/ +CVE-2018-6410 - https://metalamin.github.io/MachForm-not-0-day-EN/ +CVE-2018-6410 - https://www.exploit-db.com/exploits/44804/ +CVE-2018-6411 - https://metalamin.github.io/MachForm-not-0-day-EN/ +CVE-2018-6411 - https://www.exploit-db.com/exploits/44804/ +CVE-2018-6443 - http://packetstormsecurity.com/files/153035/Brocade-Network-Advisor-14.4.1-Unauthenticated-Remote-Code-Execution.html +CVE-2018-6458 - http://packetstormsecurity.com/files/147555/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Request-Forgery.html +CVE-2018-6460 - https://www.exploit-db.com/exploits/44042/ +CVE-2018-6461 - http://hyp3rlinx.altervista.org/advisories/CVS-SUITE-2009R2-INSECURE-LIBRARY-LOADING-CVE-2018-6461.txt +CVE-2018-6461 - http://packetstormsecurity.com/files/146267/WINCVS-2009R2-DLL-Hijacking.html +CVE-2018-6461 - http://seclists.org/fulldisclosure/2018/Feb/24 +CVE-2018-6465 - https://packetstormsecurity.com/files/146174/WordPress-Propertyhive-1.4.14-Cross-Site-Scripting.html +CVE-2018-6465 - https://wpvulndb.com/vulnerabilities/9020 +CVE-2018-6466 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss +CVE-2018-6467 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss +CVE-2018-6468 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss +CVE-2018-6469 - https://github.com/AntsKnows/CVE/blob/master/WP_Plugin_Flickr-rss +CVE-2018-6471 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402078 +CVE-2018-6472 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C40204c +CVE-2018-6473 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402080 +CVE-2018-6474 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402148 +CVE-2018-6475 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/getshell +CVE-2018-6476 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402114_9C402124_9C40207c +CVE-2018-6479 - https://github.com/dreadlocked/netwave-dosvulnerability +CVE-2018-6481 - http://packetstormsecurity.com/files/146541/Disk-Savvy-Enterprise-10.4.18-Buffer-Overflow.html +CVE-2018-6481 - https://www.exploit-db.com/exploits/44156/ +CVE-2018-6484 - https://github.com/gdraheim/zziplib/issues/14 +CVE-2018-6490 - https://www.tenable.com/security/research/tra-2018-05 +CVE-2018-6506 - https://offensivehacking.wordpress.com/2018/02/07/minibb-forums-v3-2-2-stored-xss/ +CVE-2018-6522 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKRgFtXp_0x220408 +CVE-2018-6523 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x22045c +CVE-2018-6524 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x220c20 +CVE-2018-6525 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x220458 +CVE-2018-6527 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto +CVE-2018-6528 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto +CVE-2018-6529 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto +CVE-2018-6530 - https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-proto +CVE-2018-6537 - https://www.exploit-db.com/exploits/43936/ +CVE-2018-6540 - https://github.com/gdraheim/zziplib/issues/15 +CVE-2018-6541 - https://github.com/gdraheim/zziplib/issues/16 +CVE-2018-6542 - https://github.com/gdraheim/zziplib/issues/17 +CVE-2018-6543 - https://sourceware.org/bugzilla/show_bug.cgi?id=22769 +CVE-2018-6544 - https://bugs.ghostscript.com/show_bug.cgi?id=698830 +CVE-2018-6544 - https://bugs.ghostscript.com/show_bug.cgi?id=698965 +CVE-2018-6546 - https://github.com/securifera/CVE-2018-6546-Exploit/ +CVE-2018-6546 - https://www.exploit-db.com/exploits/44476/ +CVE-2018-6546 - https://www.securifera.com/advisories/CVE-2018-6546/ +CVE-2018-6547 - https://www.securifera.com/advisories/CVE-2018-6547/ +CVE-2018-6554 - https://usn.ubuntu.com/3777-1/ +CVE-2018-6554 - https://usn.ubuntu.com/3777-3/ +CVE-2018-6555 - https://usn.ubuntu.com/3777-1/ +CVE-2018-6555 - https://usn.ubuntu.com/3777-3/ +CVE-2018-6559 - https://launchpad.net/bugs/1793458 +CVE-2018-6562 - http://packetstormsecurity.com/files/147637/Totemomail-Encryption-Gateway-6.0.0_Build_371-JSONP-Hijacking.html +CVE-2018-6562 - https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-002_totemo_json_hijacking.txt +CVE-2018-6563 - http://packetstormsecurity.com/files/147648/Totemomail-Encryption-Gateway-6.0.0_Build_371-Cross-Site-Request-Forgery.html +CVE-2018-6563 - https://www.exploit-db.com/exploits/44631/ +CVE-2018-6574 - https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574 +CVE-2018-6575 - https://www.exploit-db.com/exploits/43957 +CVE-2018-6576 - https://www.exploit-db.com/exploits/43949 +CVE-2018-6577 - https://www.exploit-db.com/exploits/43940 +CVE-2018-6578 - https://www.exploit-db.com/exploits/43948 +CVE-2018-6579 - https://www.exploit-db.com/exploits/43950 +CVE-2018-6580 - https://www.exploit-db.com/exploits/43958 +CVE-2018-6581 - https://www.exploit-db.com/exploits/43959 +CVE-2018-6582 - https://www.exploit-db.com/exploits/43976/ +CVE-2018-6583 - https://exploit-db.com/exploits/44130 +CVE-2018-6584 - https://exploit-db.com/exploits/44108 +CVE-2018-6585 - https://exploit-db.com/exploits/44121 +CVE-2018-6593 - https://www.exploit-db.com/exploits/43973/ +CVE-2018-6594 - https://github.com/dlitz/pycrypto/issues/253 +CVE-2018-6596 - https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5 +CVE-2018-6604 - https://www.exploit-db.com/exploits/43975/ +CVE-2018-6605 - https://www.exploit-db.com/exploits/43974/ +CVE-2018-6606 - https://www.exploit-db.com/exploits/43987/ +CVE-2018-6608 - https://docs.google.com/spreadsheets/d/1Nm7mxfFvmdn-3Az-BtE5O0BIdbJiIAWUnkoAF_v_0ug/edit?usp=sharing +CVE-2018-6608 - https://voidsec.com/vpn-leak/ +CVE-2018-6608 - https://www.bleepingcomputer.com/news/security/many-vpn-providers-leak-customers-ip-address-via-webrtc-bug/ +CVE-2018-6609 - https://www.exploit-db.com/exploits/43978 +CVE-2018-6610 - https://www.exploit-db.com/exploits/43977 +CVE-2018-6612 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889272 +CVE-2018-6616 - https://github.com/uclouvain/openjpeg/issues/1059 +CVE-2018-6616 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-6617 - http://packetstormsecurity.com/files/147558/Easy-Hosting-Control-Panel-0.37.12.b-Unverified-Password-Change.html +CVE-2018-6618 - http://packetstormsecurity.com/files/147557/Easy-Hosting-Control-Panel-0.37.12.b-Clear-Text-Password-Storage.html +CVE-2018-6619 - http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-INSECURE-CRYPTO.txt +CVE-2018-6619 - http://packetstormsecurity.com/files/147556/Easy-Hosting-Control-Panel-0.37.12.b-Insecure-Cryptography.html +CVE-2018-6621 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/118e1b0b3370dd1c0da442901b486689efd1654b +CVE-2018-6621 - https://github.com/FFmpeg/FFmpeg/commit/22aa37c0fedf14531783189a197542a055959b6c +CVE-2018-6625 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/WatchDog_AntiMalware_POC/tree/master/0x80002010 +CVE-2018-6626 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000035 +CVE-2018-6627 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/WatchDog_AntiMalware_POC/tree/master/0x80002054 +CVE-2018-6628 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000010c +CVE-2018-6629 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000118 +CVE-2018-6630 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000014c +CVE-2018-6631 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110009/0x80000170 +CVE-2018-6632 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000110 +CVE-2018-6633 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000038 +CVE-2018-6635 - https://downloads.avaya.com/css/P8/documents/101038598 +CVE-2018-6651 - https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7 +CVE-2018-6656 - https://github.com/zblogcn/zblogphp/issues/175 +CVE-2018-6659 - https://kc.mcafee.com/corporate/index?page=content&id=SB10228 +CVE-2018-6660 - https://kc.mcafee.com/corporate/index?page=content&id=SB10228 +CVE-2018-6664 - https://kc.mcafee.com/corporate/index?page=content&id=SB10237 +CVE-2018-6671 - https://kc.mcafee.com/corporate/index?page=content&id=SB10240 +CVE-2018-6671 - https://www.exploit-db.com/exploits/46518/ +CVE-2018-6672 - https://kc.mcafee.com/corporate/index?page=content&id=SB10240 +CVE-2018-6674 - https://kc.mcafee.com/corporate/index?page=content&id=SB10237 +CVE-2018-6686 - https://kc.mcafee.com/corporate/index?page=content&id=SB10242 +CVE-2018-6693 - https://kc.mcafee.com/corporate/index?page=content&id=SB10248 +CVE-2018-6700 - https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102846 +CVE-2018-6703 - https://kc.mcafee.com/corporate/index?page=content&id=SB10258 +CVE-2018-6755 - https://www.exploit-db.com/exploits/45961/ +CVE-2018-6756 - https://www.exploit-db.com/exploits/45961/ +CVE-2018-6757 - https://www.exploit-db.com/exploits/45961/ +CVE-2018-6759 - https://sourceware.org/bugzilla/show_bug.cgi?id=22794 +CVE-2018-6767 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-6767 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276 +CVE-2018-6767 - https://github.com/dbry/WavPack/issues/27 +CVE-2018-6768 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008090 +CVE-2018-6769 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008020 +CVE-2018-6770 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008210 +CVE-2018-6771 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008224 +CVE-2018-6772 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_99008208 +CVE-2018-6773 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008084 +CVE-2018-6774 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008088 +CVE-2018-6775 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KrnlCall_990081C8 +CVE-2018-6776 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00813C +CVE-2018-6777 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_220400 +CVE-2018-6778 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008268 +CVE-2018-6779 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008240 +CVE-2018-6780 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A0081E4 +CVE-2018-6781 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008264 +CVE-2018-6782 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A0081DC +CVE-2018-6783 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00825C +CVE-2018-6784 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A00824C +CVE-2018-6785 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KSysCall_9A008254 +CVE-2018-6786 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_220840 +CVE-2018-6787 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_221808 +CVE-2018-6788 - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Jiangmin_Antivirus_POC/tree/master/KVFG_2208C0 +CVE-2018-6789 - http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html +CVE-2018-6789 - https://www.exploit-db.com/exploits/44571/ +CVE-2018-6789 - https://www.exploit-db.com/exploits/45671/ +CVE-2018-6792 - https://www.tarlogic.com/advisories/Tarlogic-2018-001.txt +CVE-2018-6794 - https://www.exploit-db.com/exploits/44247/ +CVE-2018-6797 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-6798 - https://hackerone.com/reports/480778 +CVE-2018-6798 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-6829 - https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki +CVE-2018-6829 - https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html +CVE-2018-6829 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-6830 - https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ +CVE-2018-6831 - https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ +CVE-2018-6832 - https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ +CVE-2018-6834 - https://github.com/ether/etherpad-lite/releases/tag/1.6.3 +CVE-2018-6835 - https://github.com/ether/etherpad-lite/releases/tag/1.6.3 +CVE-2018-6836 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397 +CVE-2018-6844 - https://websecnerd.blogspot.com/2018/02/mybb-forum-1.html +CVE-2018-6845 - https://www.exploit-db.com/exploits/44016 +CVE-2018-6846 - https://github.com/zblogcn/zblogphp/issues/176 +CVE-2018-6849 - https://voidsec.com/vpn-leak/ +CVE-2018-6849 - https://www.exploit-db.com/exploits/44403/ +CVE-2018-6851 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6851 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6852 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6852 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6853 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6853 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6854 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6854 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6855 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6855 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6856 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6856 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6857 - http://seclists.org/fulldisclosure/2018/Jul/20 +CVE-2018-6857 - https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities/ +CVE-2018-6858 - https://www.exploit-db.com/exploits/44010 +CVE-2018-6859 - https://www.exploit-db.com/exploits/44185/ +CVE-2018-6860 - https://www.exploit-db.com/exploits/44011 +CVE-2018-6861 - https://www.exploit-db.com/exploits/44012 +CVE-2018-6862 - https://www.exploit-db.com/exploits/44013 +CVE-2018-6863 - https://www.exploit-db.com/exploits/44014 +CVE-2018-6864 - https://www.exploit-db.com/exploits/44015 +CVE-2018-6869 - https://github.com/gdraheim/zziplib/issues/22 +CVE-2018-6871 - https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure +CVE-2018-6871 - https://www.exploit-db.com/exploits/44022/ +CVE-2018-6876 - https://github.com/ImageMagick/ImageMagick/issues/973 +CVE-2018-6878 - https://www.exploit-db.com/exploits/43991/ +CVE-2018-6880 - https://kongxin.gitbook.io/empirecms/ +CVE-2018-6881 - https://kongxin.gitbook.io/dedecms-5-7-bug/ +CVE-2018-6881 - https://kongxin.gitbook.io/empirecms/ +CVE-2018-6882 - https://www.securify.nl/advisory/SFY20180101/cross-site-scripting-vulnerability-in-zimbra-collaboration-suite-due-to-the-way-it-handles-attachment-links.html +CVE-2018-6883 - https://github.com/Piwigo/Piwigo/issues/839 +CVE-2018-6883 - https://pastebin.com/tPebQFy4 +CVE-2018-6888 - https://www.exploit-db.com/exploits/44029/ +CVE-2018-6889 - https://www.exploit-db.com/exploits/44028/ +CVE-2018-6890 - https://github.com/pradeepjairamani/WolfCMS-XSS-POC +CVE-2018-6890 - https://github.com/pradeepjairamani/WolfCMS-XSS-POC/blob/master/Wolfcms%20v0.8.3.1%20xss%20POC%20by%20Pradeep%20Jairamani.pdf +CVE-2018-6891 - https://www.gubello.me/blog/bookly-blind-stored-xss/ +CVE-2018-6892 - http://hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txt +CVE-2018-6892 - http://packetstormsecurity.com/files/157407/CloudMe-1.11.2-Buffer-Overflow.html +CVE-2018-6892 - http://packetstormsecurity.com/files/158716/CloudMe-1.11.2-SEH-Buffer-Overflow.html +CVE-2018-6892 - http://packetstormsecurity.com/files/159327/CloudMe-1.11.2-Buffer-Overflow.html +CVE-2018-6892 - https://www.exploit-db.com/exploits/44027/ +CVE-2018-6892 - https://www.exploit-db.com/exploits/44175/ +CVE-2018-6892 - https://www.exploit-db.com/exploits/45197/ +CVE-2018-6892 - https://www.exploit-db.com/exploits/46250/ +CVE-2018-6892 - https://www.exploit-db.com/exploits/48840 +CVE-2018-6905 - https://github.com/pradeepjairamani/TYPO3-XSS-POC +CVE-2018-6910 - https://kongxin.gitbook.io/dedecms-5-7-bug/ +CVE-2018-6911 - https://www.exploit-db.com/exploits/44031/ +CVE-2018-6913 - https://hackerone.com/reports/354650 +CVE-2018-6913 - https://rt.perl.org/Public/Bug/Display.html?id=131844 +CVE-2018-6913 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-6914 - https://hackerone.com/reports/302298 +CVE-2018-6922 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-6927 - https://usn.ubuntu.com/3698-1/ +CVE-2018-6927 - https://usn.ubuntu.com/3698-2/ +CVE-2018-6928 - https://www.exploit-db.com/exploits/44030/ +CVE-2018-6936 - https://www.exploit-db.com/exploits/44219/ +CVE-2018-6940 - http://hyp3rlinx.altervista.org/advisories/NAT32-REMOTE-COMMAND-EXECUTION-CVE-2018-6940.txt +CVE-2018-6940 - http://packetstormsecurity.com/files/146373/NAT32-Build-22284-Remote-Command-Execution.html +CVE-2018-6940 - https://www.exploit-db.com/exploits/44033/ +CVE-2018-6941 - http://hyp3rlinx.altervista.org/advisories/NAT32-REMOTE-COMMAND-EXECUTION-CSRF-CVE-2018-6941.txt +CVE-2018-6941 - http://packetstormsecurity.com/files/146402/NAT32-Build-22284-Remote-Command-Execution-CSRF.html +CVE-2018-6941 - https://www.exploit-db.com/exploits/44034/ +CVE-2018-6942 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-6943 - https://packetstormsecurity.com/files/146403/WordPress-UltimateMember-2.0-Cross-Site-Scripting.html +CVE-2018-6943 - https://wpvulndb.com/vulnerabilities/9705 +CVE-2018-6944 - https://packetstormsecurity.com/files/146403/WordPress-UltimateMember-2.0-Cross-Site-Scripting.html +CVE-2018-6944 - https://wpvulndb.com/vulnerabilities/9705 +CVE-2018-6947 - https://www.exploit-db.com/exploits/44167/ +CVE-2018-6947 - https://www.exploit-db.com/exploits/44168/ +CVE-2018-6954 - https://github.com/systemd/systemd/issues/7986 +CVE-2018-6961 - https://www.exploit-db.com/exploits/44959/ +CVE-2018-6975 - https://www.vmware.com/security/advisories/VMSA-2018-0023.html +CVE-2018-6976 - https://www.vmware.com/security/advisories/VMSA-2018-0023.html +CVE-2018-7032 - https://bugs.debian.org/840014 +CVE-2018-7072 - https://www.tenable.com/security/research/tra-2018-15 +CVE-2018-7073 - https://www.tenable.com/security/research/tra-2018-15 +CVE-2018-7077 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03860en_us +CVE-2018-7081 - https://x-c3ll.github.io/posts/CVE-2018-7081-RCE-ArubaOS/ +CVE-2018-7117 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us +CVE-2018-7119 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03910en_us +CVE-2018-7121 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2018-7122 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2018-7123 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2018-7124 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2018-7125 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2018-7160 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-7170 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html +CVE-2018-7171 - http://packetstormsecurity.com/files/146938/TwonkyMedia-Server-7.0.11-8.5-Directory-Traversal.html +CVE-2018-7171 - https://www.exploit-db.com/exploits/44350/ +CVE-2018-7172 - http://foreversong.cn/archives/1070 +CVE-2018-7175 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 +CVE-2018-7176 - https://www.exploit-db.com/exploits/44137/ +CVE-2018-7177 - https://www.exploit-db.com/exploits/44134 +CVE-2018-7178 - https://www.exploit-db.com/exploits/44136 +CVE-2018-7179 - https://www.exploit-db.com/exploits/44135 +CVE-2018-7180 - https://www.exploit-db.com/exploits/44133 +CVE-2018-7182 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html +CVE-2018-7182 - https://www.exploit-db.com/exploits/45846/ +CVE-2018-7183 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2018-7184 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html +CVE-2018-7185 - http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html +CVE-2018-7185 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-7187 - https://github.com/golang/go/issues/23867 +CVE-2018-7198 - https://www.exploit-db.com/exploits/44144/ +CVE-2018-7203 - http://packetstormsecurity.com/files/146939/TwonkyMedia-Server-7.0.11-8.5-Cross-Site-Scripting.html +CVE-2018-7203 - https://www.exploit-db.com/exploits/44351/ +CVE-2018-7204 - https://wpvulndb.com/vulnerabilities/9036 +CVE-2018-7209 - https://membership.backbox.org/idashboards-9-6b-multiple-vulnerabilities/ +CVE-2018-7210 - https://membership.backbox.org/idashboards-9-6b-multiple-vulnerabilities/ +CVE-2018-7211 - https://membership.backbox.org/idashboards-9-6b-multiple-vulnerabilities/ +CVE-2018-7212 - https://github.com/sinatra/sinatra/pull/1379 +CVE-2018-7213 - http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html +CVE-2018-7213 - http://seclists.org/fulldisclosure/2019/Mar/33 +CVE-2018-7216 - http://seclists.org/fulldisclosure/2018/Feb/44 +CVE-2018-7216 - https://packetstormsecurity.com/files/146409/Tejari-Cross-Site-Request-Forgery.html +CVE-2018-7216 - https://www.exploit-db.com/exploits/44256/ +CVE-2018-7217 - https://packetstormsecurity.com/files/146425/Tejari-Arbitrary-File-Upload.html +CVE-2018-7219 - http://foreversong.cn/archives/1081 +CVE-2018-7248 - https://medium.com/@esterling_/cve-2018-7248-enumerating-active-directory-users-via-unauthenticated-manageengine-servicedesk-a1eda2942eb0 +CVE-2018-7249 - https://github.com/Elvin9/NotSecDrv/blob/master/README.md +CVE-2018-7250 - https://github.com/Elvin9/SecDrvPoolLeak/blob/master/README.md +CVE-2018-7251 - http://packetstormsecurity.com/files/154723/Anchor-CMS-0.12.3a-Information-Disclosure.html +CVE-2018-7251 - http://www.andmp.com/2018/02/advisory-assigned-CVE-2018-7251-in-anchorcms.html +CVE-2018-7253 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-7253 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559 +CVE-2018-7253 - https://github.com/dbry/WavPack/issues/28 +CVE-2018-7254 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html +CVE-2018-7254 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274 +CVE-2018-7254 - https://github.com/dbry/WavPack/issues/26 +CVE-2018-7254 - https://www.exploit-db.com/exploits/44154/ +CVE-2018-7259 - https://medium.com/@lukegorman97/flightsimlabs-alleged-malware-analysis-1427c4d23368 +CVE-2018-7264 - https://www.exploit-db.com/exploits/44251/ +CVE-2018-7268 - http://packetstormsecurity.com/files/147687/MagniComp-SysInfo-Information-Exposure.html +CVE-2018-7273 - https://www.exploit-db.com/exploits/44325/ +CVE-2018-7284 - https://www.exploit-db.com/exploits/44184/ +CVE-2018-7286 - https://www.exploit-db.com/exploits/44181/ +CVE-2018-7289 - https://www.exploit-db.com/exploits/44169/ +CVE-2018-7297 - http://atomic111.github.io/article/homematic-ccu2-remote-code-execution +CVE-2018-7297 - https://www.exploit-db.com/exploits/44368/ +CVE-2018-7300 - http://atomic111.github.io/article/homematic-ccu2-filewrite +CVE-2018-7300 - https://www.exploit-db.com/exploits/44361/ +CVE-2018-7302 - https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html +CVE-2018-7303 - https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html +CVE-2018-7304 - https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html +CVE-2018-7305 - https://websecnerd.blogspot.in/2018/02/mybb-forum-1_21.html +CVE-2018-7308 - http://www.andmp.com/2018/02/advisory-assigned-cve-2018-7308-csrf.html +CVE-2018-7312 - https://exploit-db.com/exploits/44162 +CVE-2018-7313 - https://www.exploit-db.com/exploits/44158/ +CVE-2018-7314 - https://exploit-db.com/exploits/44160 +CVE-2018-7315 - https://exploit-db.com/exploits/44161 +CVE-2018-7316 - https://exploit-db.com/exploits/44164 +CVE-2018-7317 - https://exploit-db.com/exploits/44159 +CVE-2018-7318 - https://exploit-db.com/exploits/44163 +CVE-2018-7318 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-7319 - https://exploit-db.com/exploits/44165 +CVE-2018-7340 - https://www.kb.cert.org/vuls/id/475445 +CVE-2018-7355 - https://www.exploit-db.com/exploits/46102/ +CVE-2018-7357 - https://www.exploit-db.com/exploits/45972/ +CVE-2018-7358 - https://www.exploit-db.com/exploits/45972/ +CVE-2018-7364 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-34f2-7h57-rg7p +CVE-2018-7408 - https://github.com/npm/npm/issues/19883 +CVE-2018-7409 - http://www.unixodbc.org/unixODBC-2.3.5.tar.gz +CVE-2018-7422 - http://seclists.org/fulldisclosure/2018/Mar/40 +CVE-2018-7422 - https://wpvulndb.com/vulnerabilities/9044 +CVE-2018-7422 - https://www.exploit-db.com/exploits/44340/ +CVE-2018-7434 - https://kongxin.gitbook.io/zzcms-8-2-bug/ +CVE-2018-7435 - https://bugzilla.redhat.com/show_bug.cgi?id=1547879 +CVE-2018-7435 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE +CVE-2018-7436 - https://bugzilla.redhat.com/show_bug.cgi?id=1547883 +CVE-2018-7436 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE +CVE-2018-7437 - https://bugzilla.redhat.com/show_bug.cgi?id=1547885 +CVE-2018-7437 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE +CVE-2018-7438 - https://bugzilla.redhat.com/show_bug.cgi?id=1547889 +CVE-2018-7438 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE +CVE-2018-7439 - https://bugzilla.redhat.com/show_bug.cgi?id=1547892 +CVE-2018-7439 - https://groups.google.com/forum/#!topic/spatialite-users/b-d9iB5TDPE +CVE-2018-7445 - http://seclists.org/fulldisclosure/2018/Mar/38 +CVE-2018-7445 - https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow +CVE-2018-7445 - https://www.exploit-db.com/exploits/44290/ +CVE-2018-7448 - https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html +CVE-2018-7448 - https://www.exploit-db.com/exploits/44192/ +CVE-2018-7449 - http://hyp3rlinx.altervista.org/advisories/SEGGER-embOS-FTP-SERVER-v3.22-FTP-COMMANDS-DENIAL-OF-SERVICE.txt +CVE-2018-7449 - https://www.exploit-db.com/exploits/44221/ +CVE-2018-7452 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 +CVE-2018-7454 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=613 +CVE-2018-7456 - http://bugzilla.maptools.org/show_bug.cgi?id=2778 +CVE-2018-7456 - https://github.com/xiaoqx/pocs/tree/master/libtiff +CVE-2018-7465 - https://www.exploit-db.com/exploits/44625/ +CVE-2018-7466 - https://www.exploit-db.com/exploits/44226/ +CVE-2018-7466 - https://www.exploit-db.com/exploits/44349/ +CVE-2018-7469 - https://neetech18.blogspot.in/2018/02/stored-xss-vulnerability-in-php-scripts.html +CVE-2018-7470 - https://github.com/ImageMagick/ImageMagick/issues/998 +CVE-2018-7474 - http://seclists.org/fulldisclosure/2018/Mar/34 +CVE-2018-7474 - https://www.exploit-db.com/exploits/44277/ +CVE-2018-7475 - https://0xd0ff9.wordpress.com/2018/06/21/cve-2018-7475/ +CVE-2018-7476 - https://www.from0to1.me/index.php/archives/22/ +CVE-2018-7477 - https://exploit-db.com/exploits/44191 +CVE-2018-7479 - https://kongxin.gitbook.io/yzmcms-3-6-bug/ +CVE-2018-7487 - https://github.com/pts/sam2p/issues/18 +CVE-2018-7489 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-7489 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-7489 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-7489 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-7490 - https://www.exploit-db.com/exploits/44223/ +CVE-2018-7502 - https://srcincite.io/advisories/src-2018-0007/ +CVE-2018-7538 - http://seclists.org/fulldisclosure/2018/Mar/20 +CVE-2018-7538 - https://www.exploit-db.com/exploits/44286/ +CVE-2018-7543 - https://www.exploit-db.com/exploits/44288/ +CVE-2018-7544 - http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html +CVE-2018-7550 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f49v-45qp-cv53 +CVE-2018-7551 - https://github.com/pts/sam2p/issues/28 +CVE-2018-7552 - https://github.com/pts/sam2p/issues/30 +CVE-2018-7553 - https://github.com/pts/sam2p/issues/32 +CVE-2018-7554 - https://github.com/pts/sam2p/issues/29 +CVE-2018-7557 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/7414d0bda7763f9bd69c26c068e482ab297c1c96 +CVE-2018-7557 - https://github.com/FFmpeg/FFmpeg/commit/e724bd1dd9efea3abb8586d6644ec07694afceae +CVE-2018-7561 - https://github.com/VulDetailsPublication/Poc/tree/master/Tenda/AC9 +CVE-2018-7562 - https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ +CVE-2018-7563 - https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ +CVE-2018-7566 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-7566 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-7567 - https://0day.today/exploit/29938 +CVE-2018-7568 - https://sourceware.org/bugzilla/show_bug.cgi?id=22894 +CVE-2018-7569 - https://sourceware.org/bugzilla/show_bug.cgi?id=22895 +CVE-2018-7573 - https://www.exploit-db.com/exploits/44596/ +CVE-2018-7573 - https://www.exploit-db.com/exploits/44968/ +CVE-2018-7580 - http://packetstormsecurity.com/files/160724/Philips-Hue-Denial-Of-Service.html +CVE-2018-7580 - http://seclists.org/fulldisclosure/2020/Dec/51 +CVE-2018-7580 - https://www.iliashn.com/CVE-2018-7580/ +CVE-2018-7581 - http://hyp3rlinx.altervista.org/advisories/WEBLOG-EXPERT-WEB-SERVER-ENTERPRISE-v9.4-AUTHENTICATION-BYPASS.txt +CVE-2018-7581 - http://packetstormsecurity.com/files/146697/WebLog-Expert-Web-Server-Enterprise-9.4-Weak-Permissions.html +CVE-2018-7581 - https://www.exploit-db.com/exploits/44270/ +CVE-2018-7582 - http://hyp3rlinx.altervista.org/advisories/WEBLOG-EXPERT-WEB-SERVER-ENTERPRISE-v9.4-DENIAL-OF-SERVICE.txt +CVE-2018-7582 - http://packetstormsecurity.com/files/146698/WebLog-Expert-Web-Server-Enterprise-9.4-Denial-Of-Service.html +CVE-2018-7582 - https://www.exploit-db.com/exploits/44271/ +CVE-2018-7583 - https://www.exploit-db.com/exploits/44222/ +CVE-2018-7584 - https://bugs.php.net/bug.php?id=75981 +CVE-2018-7584 - https://hackerone.com/reports/320222 +CVE-2018-7584 - https://www.exploit-db.com/exploits/44846/ +CVE-2018-7584 - https://www.tenable.com/security/tns-2018-03 +CVE-2018-7586 - https://wpvulndb.com/vulnerabilities/9033 +CVE-2018-7589 - https://github.com/dtschump/CImg/issues/184 +CVE-2018-7600 - https://blog.appsecco.com/remote-code-execution-with-drupal-core-sa-core-2018-002-95e6ecc0c714 +CVE-2018-7600 - https://github.com/a2u/CVE-2018-7600 +CVE-2018-7600 - https://github.com/g0rx/CVE-2018-7600-Drupal-RCE +CVE-2018-7600 - https://greysec.net/showthread.php?tid=2912&pid=10561 +CVE-2018-7600 - https://groups.drupal.org/security/faq-2018-002 +CVE-2018-7600 - https://research.checkpoint.com/uncovering-drupalgeddon-2/ +CVE-2018-7600 - https://www.exploit-db.com/exploits/44448/ +CVE-2018-7600 - https://www.exploit-db.com/exploits/44449/ +CVE-2018-7600 - https://www.exploit-db.com/exploits/44482/ +CVE-2018-7600 - https://www.tenable.com/blog/critical-drupal-core-vulnerability-what-you-need-to-know +CVE-2018-7602 - https://www.exploit-db.com/exploits/44542/ +CVE-2018-7602 - https://www.exploit-db.com/exploits/44557/ +CVE-2018-7634 - https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/ +CVE-2018-7642 - https://sourceware.org/bugzilla/show_bug.cgi?id=22887 +CVE-2018-7643 - https://sourceware.org/bugzilla/show_bug.cgi?id=22905 +CVE-2018-7650 - https://neetech18.blogspot.in/2018/03/stored-xss-vulnerability-in-hot-scripts.html +CVE-2018-7653 - https://packetstormsecurity.com/files/147065/YzmCMS-3.6-Cross-Site-Scripting.html +CVE-2018-7653 - https://www.exploit-db.com/exploits/44405/ +CVE-2018-7654 - https://medium.com/stolabs/path-traversal-in-3cx-7421a8ffdb7a +CVE-2018-7658 - http://packetstormsecurity.com/files/146645/Softros-Network-Time-System-Server-2.3.4-Denial-Of-Service.html +CVE-2018-7658 - https://www.exploit-db.com/exploits/44255/ +CVE-2018-7659 - https://vipinxsec.blogspot.com/2018/04/stored-xss-in-documentum-d2-steps-to.html +CVE-2018-7660 - https://vipinxsec.blogspot.com/2018/04/reflected-xss-in-documentum-d2.html +CVE-2018-7661 - https://blog.manchestergreyhats.co.uk/2018/02/25/eavesdropping-on-wifi-baby-monitor/ +CVE-2018-7661 - https://www.exploit-db.com/exploits/442322/ +CVE-2018-7664 - http://lists.openwall.net/full-disclosure/2018/02/27/1 +CVE-2018-7665 - http://lists.openwall.net/full-disclosure/2018/02/27/1 +CVE-2018-7666 - http://lists.openwall.net/full-disclosure/2018/02/27/1 +CVE-2018-7667 - http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt +CVE-2018-7668 - http://lists.openwall.net/full-disclosure/2018/02/28/1 +CVE-2018-7669 - https://www.exploit-db.com/exploits/45152/ +CVE-2018-7690 - https://www.exploit-db.com/exploits/45989/ +CVE-2018-7691 - https://www.exploit-db.com/exploits/45990/ +CVE-2018-7700 - https://laworigin.github.io/2018/03/07/CVE-2018-7700-dedecms%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C/ +CVE-2018-7701 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7701 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7702 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7702 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7703 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7703 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7704 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7704 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7705 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7705 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7706 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7706 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7707 - http://seclists.org/fulldisclosure/2018/Mar/29 +CVE-2018-7707 - https://www.exploit-db.com/exploits/44285/ +CVE-2018-7719 - https://www.exploit-db.com/exploits/44345/ +CVE-2018-7720 - https://github.com/Kyhvedn/CVE_Description/blob/master/CVE-2018-7720_Description.md +CVE-2018-7725 - https://github.com/gdraheim/zziplib/issues/39 +CVE-2018-7726 - https://github.com/gdraheim/zziplib/issues/41 +CVE-2018-7727 - https://github.com/gdraheim/zziplib/issues/40 +CVE-2018-7728 - https://bugs.freedesktop.org/show_bug.cgi?id=105205 +CVE-2018-7729 - https://bugs.freedesktop.org/show_bug.cgi?id=105206 +CVE-2018-7730 - https://bugs.freedesktop.org/show_bug.cgi?id=105204 +CVE-2018-7731 - https://bugs.freedesktop.org/show_bug.cgi?id=105247 +CVE-2018-7736 - https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md +CVE-2018-7736 - https://packetstormsecurity.com/files/147066/Z-Blog-1.5.1.1740-Cross-Site-Scripting.html +CVE-2018-7736 - https://www.exploit-db.com/exploits/44406/ +CVE-2018-7737 - https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md#web-site-physical-path-leakage +CVE-2018-7737 - https://packetstormsecurity.com/files/147063/Z-Blog-1.5.1.1740-Full-Path-Disclosure.html +CVE-2018-7737 - https://www.exploit-db.com/exploits/44407/ +CVE-2018-7739 - http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html +CVE-2018-7739 - https://www.exploit-db.com/exploits/44220/ +CVE-2018-7739 - https://www.exploit-db.com/exploits/44262/ +CVE-2018-7745 - https://www.exploit-db.com/exploits/44419/ +CVE-2018-7746 - https://www.exploit-db.com/exploits/44416/ +CVE-2018-7747 - http://packetstormsecurity.com/files/147257/WordPress-Caldera-Forms-1.5.9.1-Cross-Site-Scripting.html +CVE-2018-7747 - https://www.exploit-db.com/exploits/44489/ +CVE-2018-7750 - https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst +CVE-2018-7750 - https://www.exploit-db.com/exploits/45712/ +CVE-2018-7751 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/a6cba062051f345e8ebfdff34aba071ed73d923f +CVE-2018-7752 - https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 +CVE-2018-7752 - https://github.com/gpac/gpac/issues/997 +CVE-2018-7755 - https://usn.ubuntu.com/3696-1/ +CVE-2018-7755 - https://usn.ubuntu.com/3698-1/ +CVE-2018-7755 - https://usn.ubuntu.com/3698-2/ +CVE-2018-7756 - http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt +CVE-2018-7756 - https://www.exploit-db.com/exploits/44275/ +CVE-2018-7757 - https://usn.ubuntu.com/3698-1/ +CVE-2018-7757 - https://usn.ubuntu.com/3698-2/ +CVE-2018-7765 - http://seclists.org/fulldisclosure/2019/May/26 +CVE-2018-7777 - http://packetstormsecurity.com/files/156184/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html +CVE-2018-7801 - http://seclists.org/fulldisclosure/2021/Jul/32 +CVE-2018-7806 - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes +CVE-2018-7807 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-7809 - https://www.tenable.com/security/research/tra-2018-38 +CVE-2018-7810 - https://www.tenable.com/security/research/tra-2018-38 +CVE-2018-7811 - https://www.tenable.com/security/research/tra-2018-38 +CVE-2018-7812 - https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems/CVE-2018-7812 +CVE-2018-7816 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ +CVE-2018-7825 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ +CVE-2018-7826 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ +CVE-2018-7827 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ +CVE-2018-7828 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ +CVE-2018-7829 - https://www.schneider-electric.com/en/download/document/SEVD-2019-045-03/ +CVE-2018-7830 - https://www.tenable.com/security/research/tra-2018-38 +CVE-2018-7831 - https://www.tenable.com/security/research/tra-2018-38 +CVE-2018-7841 - http://packetstormsecurity.com/files/152862/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html +CVE-2018-7841 - http://seclists.org/fulldisclosure/2019/May/26 +CVE-2018-7842 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0741 +CVE-2018-7843 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0738 +CVE-2018-7844 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0739 +CVE-2018-7845 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0745 +CVE-2018-7846 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0735 +CVE-2018-7848 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0740 +CVE-2018-7849 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0737 +CVE-2018-7852 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0763 +CVE-2018-7853 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0764 +CVE-2018-7854 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0765 +CVE-2018-7855 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0766 +CVE-2018-7855 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0767 +CVE-2018-7856 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0767 +CVE-2018-7857 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0768 +CVE-2018-7866 - https://github.com/libming/libming/issues/118 +CVE-2018-7867 - https://github.com/libming/libming/issues/116 +CVE-2018-7868 - https://github.com/libming/libming/issues/113 +CVE-2018-7869 - https://github.com/libming/libming/issues/119 +CVE-2018-7870 - https://github.com/libming/libming/issues/117 +CVE-2018-7871 - https://github.com/libming/libming/issues/120 +CVE-2018-7872 - https://github.com/libming/libming/issues/114 +CVE-2018-7873 - https://github.com/libming/libming/issues/111 +CVE-2018-7874 - https://github.com/libming/libming/issues/115 +CVE-2018-7875 - https://github.com/libming/libming/issues/112 +CVE-2018-7876 - https://github.com/libming/libming/issues/109 +CVE-2018-7877 - https://github.com/libming/libming/issues/110 +CVE-2018-7884 - http://seclists.org/fulldisclosure/2018/Jun/1 +CVE-2018-7886 - https://www.exploit-db.com/exploits/44470/ +CVE-2018-7889 - https://bugs.launchpad.net/calibre/+bug/1753870 +CVE-2018-7890 - https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/ +CVE-2018-7890 - https://www.exploit-db.com/exploits/44274/ +CVE-2018-7893 - https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md +CVE-2018-7900 - https://blog.newskysecurity.com/information-disclosure-vulnerability-cve-2018-7900-makes-it-easy-for-attackers-to-find-huawei-3e7039b6f44f +CVE-2018-7921 - https://www.exploit-db.com/exploits/45971/ +CVE-2018-7999 - https://github.com/silnrsi/graphite/issues/22 +CVE-2018-8000 - https://bugzilla.redhat.com/show_bug.cgi?id=1548918 +CVE-2018-8000 - https://sourceforge.net/p/podofo/tickets/13/ +CVE-2018-8001 - https://bugzilla.redhat.com/show_bug.cgi?id=1549469 +CVE-2018-8002 - https://bugzilla.redhat.com/show_bug.cgi?id=1548930 +CVE-2018-8002 - https://www.exploit-db.com/exploits/44946/ +CVE-2018-8007 - https://www.mdsec.co.uk/2018/08/advisory-cve-2018-8007-apache-couchdb-remote-code-execution/ +CVE-2018-8012 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-8013 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html +CVE-2018-8013 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-8013 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-8013 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-8013 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-8014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-8014 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-8021 - https://www.exploit-db.com/exploits/45933/ +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2018-8032 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-8032 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-8034 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-8034 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-8034 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-8036 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-8037 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2018-8037 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-8037 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2018-8039 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-8039 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2018-8044 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-8046 - http://seclists.org/fulldisclosure/2018/Jul/8 +CVE-2018-8050 - https://github.com/sshock/AFFLIBv3/commit/435a2ca802358a3debb6d164d2c33049131df81c +CVE-2018-8056 - https://www.exploit-db.com/exploits/44495/ +CVE-2018-8057 - https://github.com/Kyhvedn/CVE_Description/blob/master/Cobub_Razor_0.8.0_SQL_injection_description.md +CVE-2018-8057 - https://www.exploit-db.com/exploits/44454/ +CVE-2018-8058 - https://github.com/ibey0nd/CVE/blob/master/CMS%20Made%20Simple%20Stored%20XSS%202.md +CVE-2018-8060 - https://github.com/otavioarj/SIOCtl +CVE-2018-8061 - https://github.com/otavioarj/SIOCtl +CVE-2018-8062 - http://packetstormsecurity.com/files/159618/Comtrend-AR-5387un-Cross-Site-Scripting.html +CVE-2018-8065 - http://packetstormsecurity.com/files/172676/Flexense-HTTP-Server-10.6.24-Buffer-Overflow-Denial-Of-Service.html +CVE-2018-8072 - https://gitlab.com/nemux/CVE-2018-8072/blob/master/CVE-2018-8072_PoC.txt +CVE-2018-8072 - https://www.nemux.org/2018/04/24/cve-2018-8072/ +CVE-2018-8088 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2018-8088 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2018-8088 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2018-8096 - https://medium.com/stolabs/bypass-admin-authentication-on-seq-17f0f9e02732 +CVE-2018-8096 - https://www.exploit-db.com/exploits/45136/ +CVE-2018-8108 - https://github.com/zlgxzswjy/BUI-select-xss +CVE-2018-8120 - https://www.exploit-db.com/exploits/45653/ +CVE-2018-8133 - https://www.exploit-db.com/exploits/44817/ +CVE-2018-8134 - https://www.exploit-db.com/exploits/44630/ +CVE-2018-8139 - https://www.exploit-db.com/exploits/45012/ +CVE-2018-8145 - https://www.exploit-db.com/exploits/45011/ +CVE-2018-8174 - https://blog.0patch.com/2018/05/a-single-instruction-micropatch-for.html +CVE-2018-8174 - https://www.exploit-db.com/exploits/44741/ +CVE-2018-8208 - https://www.exploit-db.com/exploits/44914/ +CVE-2018-8214 - https://www.exploit-db.com/exploits/44915/ +CVE-2018-8229 - https://www.exploit-db.com/exploits/45013/ +CVE-2018-8269 - https://www.exploit-db.com/exploits/46101/ +CVE-2018-8275 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8275 +CVE-2018-8279 - https://www.exploit-db.com/exploits/45214/ +CVE-2018-8288 - https://www.exploit-db.com/exploits/45213/ +CVE-2018-8291 - https://www.exploit-db.com/exploits/45215/ +CVE-2018-8298 - https://www.exploit-db.com/exploits/45217/ +CVE-2018-8353 - https://www.exploit-db.com/exploits/45279/ +CVE-2018-8355 - https://www.exploit-db.com/exploits/45432/ +CVE-2018-8384 - https://www.exploit-db.com/exploits/45431/ +CVE-2018-8410 - https://www.exploit-db.com/exploits/45436/ +CVE-2018-8411 - https://www.exploit-db.com/exploits/45624/ +CVE-2018-8413 - http://packetstormsecurity.com/files/156027/Microsoft-Windows-Theme-API-File-Parsing.html +CVE-2018-8423 - https://blog.0patch.com/2018/09/outrunning-attackers-on-jet-database.html +CVE-2018-8423 - https://blog.0patch.com/2018/10/patching-re-patching-and-meta-patching.html +CVE-2018-8440 - https://blog.0patch.com/2018/08/how-we-micropatched-publicly-dropped.html +CVE-2018-8440 - https://blog.0patch.com/2018/09/comparing-our-micropatch-with.html +CVE-2018-8449 - https://www.exploit-db.com/exploits/45435/ +CVE-2018-8453 - http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html +CVE-2018-8453 - https://securelist.com/cve-2018-8453-used-in-targeted-attack +CVE-2018-8463 - https://www.exploit-db.com/exploits/45502/ +CVE-2018-8466 - https://www.exploit-db.com/exploits/45571/ +CVE-2018-8467 - https://www.exploit-db.com/exploits/45572/ +CVE-2018-8468 - https://www.exploit-db.com/exploits/45502/ +CVE-2018-8469 - https://www.exploit-db.com/exploits/45502/ +CVE-2018-8474 - https://www.exploit-db.com/exploits/45936/ +CVE-2018-8476 - https://research.checkpoint.com/2019/pxe-dust-finding-a-vulnerability-in-windows-servers-deployment-services/ +CVE-2018-8495 - https://leucosite.com/Microsoft-Edge-RCE/ +CVE-2018-8527 - https://www.exploit-db.com/exploits/45585/ +CVE-2018-8532 - https://www.exploit-db.com/exploits/45587/ +CVE-2018-8533 - https://www.exploit-db.com/exploits/45583/ +CVE-2018-8544 - https://www.exploit-db.com/exploits/45923/ +CVE-2018-8550 - https://www.exploit-db.com/exploits/45893/ +CVE-2018-8552 - https://www.exploit-db.com/exploits/45924/ +CVE-2018-8584 - https://www.exploit-db.com/exploits/46104/ +CVE-2018-8617 - https://www.exploit-db.com/exploits/46202/ +CVE-2018-8619 - https://www.exploit-db.com/exploits/46023/ +CVE-2018-8625 - https://www.exploit-db.com/exploits/46022/ +CVE-2018-8631 - https://www.exploit-db.com/exploits/46001/ +CVE-2018-8712 - https://www.7elements.co.uk/resources/technical-advisories/webmin-1-840-1-880-unrestricted-access-arbitrary-files-using-local-file-include/ +CVE-2018-8716 - http://packetstormsecurity.com/files/147330/WSO2-Identity-Server-5.3.0-Cross-Site-Scripting.html +CVE-2018-8716 - http://seclists.org/fulldisclosure/2018/Apr/45 +CVE-2018-8716 - https://www.exploit-db.com/exploits/44531/ +CVE-2018-8718 - https://www.exploit-db.com/exploits/44843/ +CVE-2018-8719 - https://www.exploit-db.com/exploits/44371/ +CVE-2018-8720 - https://packetstormsecurity.com/files/137427/ServiceNow-ITSM-Cross-Site-Scripting.html +CVE-2018-8724 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-8725 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-8726 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-8729 - https://www.exploit-db.com/exploits/44437/ +CVE-2018-8732 - https://www.exploit-db.com/exploits/44384/ +CVE-2018-8733 - https://www.exploit-db.com/exploits/44560/ +CVE-2018-8733 - https://www.exploit-db.com/exploits/44969/ +CVE-2018-8734 - https://www.exploit-db.com/exploits/44560/ +CVE-2018-8734 - https://www.exploit-db.com/exploits/44969/ +CVE-2018-8735 - https://www.exploit-db.com/exploits/44560/ +CVE-2018-8735 - https://www.exploit-db.com/exploits/44969/ +CVE-2018-8736 - https://www.exploit-db.com/exploits/44560/ +CVE-2018-8736 - https://www.exploit-db.com/exploits/44969/ +CVE-2018-8737 - https://neetech18.blogspot.in/2018/03/stored-xss-vulnerability-in-bookme_17.html +CVE-2018-8738 - https://www.exploit-db.com/exploits/44986/ +CVE-2018-8739 - https://github.com/VerSprite/research/blob/master/advisories/VS-2018-014.md +CVE-2018-8763 - http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html +CVE-2018-8764 - http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html +CVE-2018-8765 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222018 +CVE-2018-8769 - https://sourceware.org/bugzilla/show_bug.cgi?id=22976 +CVE-2018-8770 - https://www.exploit-db.com/exploits/44495/ +CVE-2018-8778 - https://hackerone.com/reports/298246 +CVE-2018-8779 - https://hackerone.com/reports/302997 +CVE-2018-8780 - https://hackerone.com/reports/302338 +CVE-2018-8784 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8785 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8786 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8787 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8788 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8789 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8791 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8792 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8793 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8794 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8795 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8796 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8797 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8798 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8799 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8800 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2018-8802 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=49 +CVE-2018-8804 - https://github.com/ImageMagick/ImageMagick/issues/1025 +CVE-2018-8805 - https://github.com/QQ704568679/YXcms-Code-audit/blob/master/Yxcms%20Code%20audit +CVE-2018-8806 - https://github.com/libming/libming/issues/128 +CVE-2018-8807 - https://github.com/libming/libming/issues/129 +CVE-2018-8808 - https://github.com/radare/radare2/issues/9725 +CVE-2018-8809 - https://github.com/radare/radare2/issues/9726 +CVE-2018-8810 - https://github.com/radare/radare2/issues/9727 +CVE-2018-8811 - https://www.exploit-db.com/exploits/44391/ +CVE-2018-8813 - https://www.exploit-db.com/exploits/44421/ +CVE-2018-8814 - https://www.exploit-db.com/exploits/44418/ +CVE-2018-8815 - https://www.exploit-db.com/exploits/44392/ +CVE-2018-8817 - https://seclists.org/bugtraq/2019/Jun/10 +CVE-2018-8817 - https://www.exploit-db.com/exploits/44385/ +CVE-2018-8819 - http://packetstormsecurity.com/files/148126/WebCTRL-Out-Of-Band-XML-Injection.html +CVE-2018-8819 - http://seclists.org/fulldisclosure/2018/Jun/21 +CVE-2018-8820 - http://seclists.org/fulldisclosure/2018/Mar/57 +CVE-2018-8821 - https://github.com/bigric3/poc +CVE-2018-8823 - https://ia-informatica.com/it/CVE-2018-8823 +CVE-2018-8824 - https://ia-informatica.com/it/CVE-2018-8824 +CVE-2018-8831 - http://seclists.org/fulldisclosure/2018/Apr/36 +CVE-2018-8831 - https://www.exploit-db.com/exploits/44487/ +CVE-2018-8840 - https://www.tenable.com/security/research/tra-2018-07 +CVE-2018-8873 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222040 +CVE-2018-8874 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222054 +CVE-2018-8875 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x0022209c +CVE-2018-8876 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222098 +CVE-2018-8880 - https://www.exploit-db.com/exploits/44488/ +CVE-2018-8881 - https://bugzilla.nasm.us/show_bug.cgi?id=3392446 +CVE-2018-8882 - https://bugzilla.nasm.us/show_bug.cgi?id=3392445 +CVE-2018-8883 - https://bugzilla.nasm.us/show_bug.cgi?id=3392447 +CVE-2018-8888 - http://support.blackberry.com/kb/articleDetail?articleNumber=000054162 +CVE-2018-8891 - http://support.blackberry.com/kb/articleDetail?articleNumber=000054162 +CVE-2018-8892 - http://support.blackberry.com/kb/articleDetail?articleNumber=000054162 +CVE-2018-8894 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222108 +CVE-2018-8895 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/2345DumpBlock.sys-0x00222040 +CVE-2018-8896 - https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/2345DumpBlock.sys-0x00222044 +CVE-2018-8897 - http://openwall.com/lists/oss-security/2018/05/08/4 +CVE-2018-8897 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 +CVE-2018-8897 - https://www.exploit-db.com/exploits/44697/ +CVE-2018-8897 - https://www.exploit-db.com/exploits/45024/ +CVE-2018-8897 - https://www.kb.cert.org/vuls/id/631579 +CVE-2018-8898 - http://packetstormsecurity.com/files/147708/D-Link-DSL-3782-Authentication-Bypass.html +CVE-2018-8898 - https://www.exploit-db.com/exploits/44657/ +CVE-2018-8903 - https://nileshsapariya.blogspot.ae/2018/03/csrf-to-xss-open-auditit-professional-21.html +CVE-2018-8903 - https://www.exploit-db.com/exploits/44354/ +CVE-2018-8904 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002000 +CVE-2018-8905 - http://bugzilla.maptools.org/show_bug.cgi?id=2780 +CVE-2018-8905 - https://github.com/halfbitteam/POCs/tree/master/libtiff-4.08_tiff2ps_heap_overflow +CVE-2018-8906 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug.md +CVE-2018-8908 - https://www.exploit-db.com/exploits/44383/ +CVE-2018-8909 - https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Android.pdf +CVE-2018-8930 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8931 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8932 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8933 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8934 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8935 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8936 - https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ +CVE-2018-8937 - https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html +CVE-2018-8940 - https://seclists.org/fulldisclosure/2019/May/9 +CVE-2018-8941 - https://github.com/SECFORCE/CVE-2018-8941 +CVE-2018-8945 - https://sourceware.org/bugzilla/show_bug.cgi?id=22809 +CVE-2018-8947 - https://www.exploit-db.com/exploits/44343/ +CVE-2018-8955 - http://packetstormsecurity.com/files/149900/Bitdefender-GravityZone-Installer-Signature-Bypass-Code-Execution.html +CVE-2018-8955 - https://labs.nettitude.com/blog/cve-2018-8955-bitdefender-gravityzone-arbitrary-code-execution/ +CVE-2018-8960 - https://github.com/ImageMagick/ImageMagick/issues/1020 +CVE-2018-8961 - https://github.com/libming/libming/issues/130 +CVE-2018-8962 - https://github.com/libming/libming/issues/130 +CVE-2018-8963 - https://github.com/libming/libming/issues/130 +CVE-2018-8964 - https://github.com/libming/libming/issues/130 +CVE-2018-8965 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/ppsave.php.md +CVE-2018-8966 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/install.md +CVE-2018-8967 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/adv2.php.md +CVE-2018-8968 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/manage.php.md +CVE-2018-8969 - https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/licence_save.php.md +CVE-2018-8970 - https://hackerone.com/reports/329645 +CVE-2018-8973 - https://github.com/yaxuan404/OTCMS_3.2 +CVE-2018-8974 - https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-8974.md +CVE-2018-8975 - https://github.com/xiaoqx/pocs/blob/master/netpbm +CVE-2018-8976 - https://github.com/Exiv2/exiv2/issues/246 +CVE-2018-8977 - https://github.com/Exiv2/exiv2/issues/247 +CVE-2018-8978 - https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html +CVE-2018-8979 - https://nileshsapariya.blogspot.ae/2018/03/csrf-to-xss-open-auditit-professional-21.html +CVE-2018-8979 - https://www.exploit-db.com/exploits/44360/ +CVE-2018-8988 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002008 +CVE-2018-8989 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002006 +CVE-2018-8990 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002010 +CVE-2018-8991 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002009 +CVE-2018-8992 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002005 +CVE-2018-8993 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002001 +CVE-2018-8994 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002003 +CVE-2018-8995 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002002 +CVE-2018-8996 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002007 +CVE-2018-8997 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004 +CVE-2018-8998 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060cc +CVE-2018-8999 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060c4 +CVE-2018-9000 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c402004 +CVE-2018-9001 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402000 +CVE-2018-9002 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060cc +CVE-2018-9003 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c402000 +CVE-2018-9004 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060d0 +CVE-2018-9005 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c4060d0 +CVE-2018-9006 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402004 +CVE-2018-9007 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060c4 +CVE-2018-9009 - https://github.com/libming/libming/issues/131 +CVE-2018-9010 - https://www.exploit-db.com/exploits/44317/ +CVE-2018-9014 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug4.md +CVE-2018-9015 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug5.md +CVE-2018-9016 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug2.md +CVE-2018-9017 - https://github.com/xuheunbaicai/cangku/blob/master/cve/dsmall_v20180320_bug3.md +CVE-2018-9018 - https://sourceforge.net/p/graphicsmagick/bugs/554/ +CVE-2018-9019 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2018-9020 - https://www.gubello.me/blog/events-manager-authenticated-stored-xss/ +CVE-2018-9020 - https://www.youtube.com/watch?v=40d7uXl36O4 +CVE-2018-9021 - http://packetstormsecurity.com/files/155576/Broadcom-CA-Privileged-Access-Manager-2.8.2-Remote-Command-Execution.html +CVE-2018-9022 - http://packetstormsecurity.com/files/155576/Broadcom-CA-Privileged-Access-Manager-2.8.2-Remote-Command-Execution.html +CVE-2018-9032 - https://www.exploit-db.com/exploits/44378/ +CVE-2018-9032 - https://www.youtube.com/watch?v=Wmm4p8znS3s +CVE-2018-9034 - https://www.exploit-db.com/exploits/44366/ +CVE-2018-9035 - https://www.exploit-db.com/exploits/44367/ +CVE-2018-9037 - https://www.exploit-db.com/exploits/44621/ +CVE-2018-9038 - https://www.exploit-db.com/exploits/44512/ +CVE-2018-9040 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060c4 +CVE-2018-9041 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c402004 +CVE-2018-9042 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c402000 +CVE-2018-9043 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060d0 +CVE-2018-9044 - https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win10_x64.sys-0x9c4060cc +CVE-2018-9045 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002849 +CVE-2018-9046 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100282d +CVE-2018-9047 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002841 +CVE-2018-9048 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100282C +CVE-2018-9049 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002833 +CVE-2018-9050 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100202D +CVE-2018-9051 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002021 +CVE-2018-9052 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100283c +CVE-2018-9053 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf10026cc +CVE-2018-9054 - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf100284c +CVE-2018-9055 - https://github.com/mdadams/jasper/issues/172 +CVE-2018-9055 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-9056 - http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf +CVE-2018-9058 - https://github.com/ckolivas/lrzip/issues/93 +CVE-2018-9059 - http://packetstormsecurity.com/files/147246/Easy-File-Sharing-Web-Server-7.2-Buffer-Overflow.html +CVE-2018-9059 - https://www.exploit-db.com/exploits/44485/ +CVE-2018-9059 - https://www.exploit-db.com/exploits/44522/ +CVE-2018-9062 - https://support.lenovo.com/us/en/solutions/LEN-20527 +CVE-2018-9092 - https://github.com/bg5sbk/MiniCMS/issues/14 +CVE-2018-9092 - https://www.exploit-db.com/exploits/44362/ +CVE-2018-9101 - https://www.mitel.com/mitel-product-security-advisory-18-0003 +CVE-2018-9102 - https://www.mitel.com/mitel-product-security-advisory-18-0003 +CVE-2018-9103 - https://www.mitel.com/mitel-product-security-advisory-18-0003 +CVE-2018-9104 - https://www.mitel.com/mitel-product-security-advisory-18-0003 +CVE-2018-9106 - https://www.exploit-db.com/exploits/44370/ +CVE-2018-9107 - https://www.exploit-db.com/exploits/44369/ +CVE-2018-9113 - https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-9113.md +CVE-2018-9115 - https://packetstormsecurity.com/files/146982 +CVE-2018-9115 - https://www.exploit-db.com/exploits/44375/ +CVE-2018-9118 - https://wpvulndb.com/vulnerabilities/9056 +CVE-2018-9118 - https://www.exploit-db.com/exploits/44417/ +CVE-2018-9119 - https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html +CVE-2018-9119 - https://www.elttam.com/blog/fuzereview/#content +CVE-2018-9119 - https://www.reddit.com/r/netsec/comments/89qrp1/stealing_credit_cards_from_fuze_via_bluetooth/ +CVE-2018-9120 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ +CVE-2018-9121 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ +CVE-2018-9122 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ +CVE-2018-9123 - https://www.seekurity.com/blog/general/multiple-cross-site-scripting-vulnerabilities-in-crea8social-social-network-script/ +CVE-2018-9126 - http://packetstormsecurity.com/files/146999/DotNetNuke-DNNarticle-Directory-Traversal.html +CVE-2018-9126 - https://www.exploit-db.com/exploits/44414/ +CVE-2018-9128 - http://packetstormsecurity.com/files/152177/DVD-X-Player-5.5.3-Buffer-Overflow.html +CVE-2018-9128 - https://www.exploit-db.com/exploits/44438/ +CVE-2018-9128 - https://www.exploit-db.com/exploits/46584/ +CVE-2018-9130 - https://github.com/cnonce/IBOS_4.4.3/blob/master/Cross%20Site%20Scripting.md +CVE-2018-9132 - https://github.com/libming/libming/issues/133 +CVE-2018-9133 - https://github.com/ImageMagick/ImageMagick/issues/1072 +CVE-2018-9134 - https://xz.aliyun.com/t/2234 +CVE-2018-9135 - https://github.com/ImageMagick/ImageMagick/issues/1009 +CVE-2018-9136 - https://github.com/bigric3/poc2 +CVE-2018-9137 - https://www.exploit-db.com/exploits/44511/ +CVE-2018-9138 - https://sourceware.org/bugzilla/show_bug.cgi?id=23008 +CVE-2018-9139 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-9140 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-9141 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-9142 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-9143 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2018-9144 - https://github.com/xiaoqx/pocs/tree/master/exiv2 +CVE-2018-9145 - https://github.com/xiaoqx/pocs/tree/master/exiv2 +CVE-2018-9148 - https://exploit-db.com/exploits/44350/ +CVE-2018-9149 - https://www.slideshare.net/secret/qrHwDOJ71eLg7f +CVE-2018-9154 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-9155 - https://docs.google.com/document/d/1ZG1qiwpECbVnv92yNckDn7yyuluKoC2_ON-eLhAY97Q/edit?usp=sharing +CVE-2018-9155 - https://www.exploit-db.com/exploits/44612/ +CVE-2018-9160 - https://www.exploit-db.com/exploits/44545/ +CVE-2018-9161 - https://www.exploit-db.com/exploits/44276/ +CVE-2018-9161 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php +CVE-2018-9162 - https://www.exploit-db.com/exploits/44295/ +CVE-2018-9163 - https://www.exploit-db.com/exploits/44666/ +CVE-2018-9165 - https://github.com/libming/libming/issues/121 +CVE-2018-9172 - https://www.exploit-db.com/exploits/44443/ +CVE-2018-9173 - https://www.exploit-db.com/exploits/44408/ +CVE-2018-9183 - https://www.exploit-db.com/exploits/44401/ +CVE-2018-9185 - https://fortiguard.com/advisory/FG-IR-18-027 +CVE-2018-9190 - https://fortiguard.com/advisory/FG-IR-18-092 +CVE-2018-9191 - https://fortiguard.com/advisory/FG-IR-18-108 +CVE-2018-9192 - https://fortiguard.com/advisory/FG-IR-17-302 +CVE-2018-9192 - https://robotattack.org/ +CVE-2018-9192 - https://www.kb.cert.org/vuls/id/144389 +CVE-2018-9193 - https://fortiguard.com/advisory/FG-IR-18-108 +CVE-2018-9194 - https://fortiguard.com/advisory/FG-IR-17-302 +CVE-2018-9194 - https://robotattack.org/ +CVE-2018-9194 - https://www.kb.cert.org/vuls/id/144389 +CVE-2018-9205 - https://www.exploit-db.com/exploits/44501/ +CVE-2018-9206 - https://wpvulndb.com/vulnerabilities/9136 +CVE-2018-9206 - https://www.exploit-db.com/exploits/45790/ +CVE-2018-9206 - https://www.exploit-db.com/exploits/46182/ +CVE-2018-9206 - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2018-9233 - https://www.exploit-db.com/exploits/44411/ +CVE-2018-9235 - https://pastebin.com/caQW37fY +CVE-2018-9235 - https://www.exploit-db.com/exploits/44434/ +CVE-2018-9236 - https://pastebin.com/Amw08sAj +CVE-2018-9236 - https://www.exploit-db.com/exploits/44436/ +CVE-2018-9237 - https://pastebin.com/9C0QBs8u +CVE-2018-9237 - https://www.exploit-db.com/exploits/44436/ +CVE-2018-9238 - https://pastebin.com/ia7U4vi9 +CVE-2018-9238 - https://www.exploit-db.com/exploits/44424/ +CVE-2018-9243 - https://gitlab.com/gitlab-org/gitlab-ce/issues/42028 +CVE-2018-9244 - https://gitlab.com/gitlab-org/gitlab-ce/issues/41838 +CVE-2018-9245 - https://www.exploit-db.com/exploits/44515/ +CVE-2018-9248 - https://www.exploit-db.com/exploits/44413/ +CVE-2018-9251 - https://bugzilla.gnome.org/show_bug.cgi?id=794914 +CVE-2018-9252 - https://github.com/mdadams/jasper/issues/173 +CVE-2018-9252 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2018-9259 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 +CVE-2018-9276 - http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html +CVE-2018-9276 - http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html +CVE-2018-9276 - https://www.exploit-db.com/exploits/46527/ +CVE-2018-9279 - https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities/ +CVE-2018-9280 - https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities/ +CVE-2018-9281 - https://www.bishopfox.com/news/2018/10/eaton-ups-9px-8000-sp-multiple-vulnerabilities/ +CVE-2018-9282 - https://www.bishopfox.com/news/2018/09/subsonic-6-1-1-multiple-vulnerabilities/ +CVE-2018-9284 - https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in--d-link-router-dir868.html +CVE-2018-9285 - http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html +CVE-2018-9302 - https://www.exploit-db.com/exploits/44567/ +CVE-2018-9303 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md +CVE-2018-9304 - https://github.com/Exiv2/exiv2/issues/262 +CVE-2018-9304 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md +CVE-2018-9305 - https://github.com/Exiv2/exiv2/issues/263 +CVE-2018-9305 - https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md +CVE-2018-9307 - https://github.com/xuheunbaicai/cangku/blob/master/cve/%E9%AD%94%E6%96%B9%E5%8A%A8%E5%8A%9B_Latest%20version_bug.md +CVE-2018-9309 - https://github.com/lihonghuyang/vulnerability/blob/master/dl_sendsms.php.md +CVE-2018-9311 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9312 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9313 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9314 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9318 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9320 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9322 - https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/ +CVE-2018-9328 - https://pastebin.com/SbjwbYVr +CVE-2018-9331 - https://github.com/cherryla/zzcms/blob/master/adv.php.md +CVE-2018-9332 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-9333 - https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 +CVE-2018-9363 - https://usn.ubuntu.com/3820-1/ +CVE-2018-9363 - https://usn.ubuntu.com/3822-1/ +CVE-2018-9445 - https://www.exploit-db.com/exploits/45192/ +CVE-2018-9473 - https://android.googlesource.com/platform/external/libhevc/+/9f0fb67540d2259e4930d9bd5f1a1a6fb95af862 +CVE-2018-9488 - https://www.exploit-db.com/exploits/45379/ +CVE-2018-9496 - https://android.googlesource.com/platform/external/libxaac/+/04e8cd58f075bec5892e369c8deebca9c67e855c +CVE-2018-9499 - https://android.googlesource.com/platform/frameworks/av/+/bf7a67c33c0f044abeef3b9746f434b7f3295bb1 +CVE-2018-9506 - https://android.googlesource.com/platform/system/bt/+/830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 +CVE-2018-9515 - https://www.exploit-db.com/exploits/45558/ +CVE-2018-9517 - https://usn.ubuntu.com/3932-1/ +CVE-2018-9842 - http://seclists.org/fulldisclosure/2018/Apr/19 +CVE-2018-9842 - https://www.exploit-db.com/exploits/44428/ +CVE-2018-9842 - https://www.exploit-db.com/exploits/44829/ +CVE-2018-9842 - https://www.exploit-db.com/exploits/45926/ +CVE-2018-9842 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-015/-cyberark-password-vault-memory-disclosure +CVE-2018-9843 - http://seclists.org/fulldisclosure/2018/Apr/18 +CVE-2018-9843 - https://www.exploit-db.com/exploits/44429/ +CVE-2018-9843 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2017-014/-cyberark-password-vault-web-access-remote-code-execution +CVE-2018-9844 - https://www.exploit-db.com/exploits/44444/ +CVE-2018-9846 - https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a +CVE-2018-9849 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 +CVE-2018-9853 - https://medium.com/@TheWindowsTwin/vulnerability-in-freesshd-5a0abc147d7a +CVE-2018-9856 - https://github.com/Kotti/Kotti/issues/551 +CVE-2018-9857 - https://pastebin.com/Y9uEC4nu +CVE-2018-9857 - https://www.exploit-db.com/exploits/44486/ +CVE-2018-9861 - https://github.com/ckeditor/ckeditor-dev/blob/master/CHANGES.md +CVE-2018-9864 - https://www.gubello.me/blog/wp-live-chat-support-8-0-05-stored-xss/ +CVE-2018-9864 - https://www.youtube.com/watch?v=eHG1pWaez9w +CVE-2018-9867 - https://www.tenable.com/security/research/tra-2019-08 +CVE-2018-9918 - https://github.com/qpdf/qpdf/issues/202 +CVE-2018-9926 - https://github.com/wuzhicms/wuzhicms/issues/128 +CVE-2018-9926 - https://www.exploit-db.com/exploits/44439/ +CVE-2018-9927 - https://github.com/wuzhicms/wuzhicms/issues/128 +CVE-2018-9948 - https://www.exploit-db.com/exploits/44941/ +CVE-2018-9948 - https://www.exploit-db.com/exploits/45269/ +CVE-2018-9958 - http://packetstormsecurity.com/files/160240/Foxit-Reader-9.0.1.1049-Arbitrary-Code-Execution.html +CVE-2018-9958 - https://www.exploit-db.com/exploits/44941/ +CVE-2018-9958 - https://www.exploit-db.com/exploits/45269/ +CVE-2018-9985 - https://github.com/learnsec6/test/issues/1 +CVE-2018-9995 - https://www.bleepingcomputer.com/news/security/new-hacking-tool-lets-users-access-a-bunch-of-dvrs-and-their-video-feeds/ +CVE-2018-9995 - https://www.exploit-db.com/exploits/44577/ +CVE-2018-9996 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 +CVE-2018-9997 - http://packetstormsecurity.com/files/154127/Open-Xchange-OX-Guard-Cross-Site-Scripting-Signature-Validation.html +CVE-2018-9997 - http://seclists.org/fulldisclosure/2018/Jul/12 +CVE-2018-9998 - http://seclists.org/fulldisclosure/2018/Jul/12 +CVE-2019-0028 - http://www.securityfocus.com/bid/107892 +CVE-2019-0053 - http://packetstormsecurity.com/files/153746/FreeBSD-Security-Advisory-FreeBSD-SA-19-12.telnet.html +CVE-2019-0053 - https://www.exploit-db.com/exploits/45982 +CVE-2019-0129 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00229.html +CVE-2019-0130 - https://support.lenovo.com/us/en/product_security/LEN-27843 +CVE-2019-0135 - https://support.lenovo.com/us/en/product_security/LEN-27843 +CVE-2019-0136 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-0136 - https://usn.ubuntu.com/4115-1/ +CVE-2019-0136 - https://usn.ubuntu.com/4118-1/ +CVE-2019-0154 - http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-0155 - http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-0177 - https://www.intel.com/content/www/us/en/security-center/advisory/in +CVE-2019-0186 - http://packetstormsecurity.com/files/152642/Apache-Pluto-3.0.0-3.0.1-Cross-Site-Scripting.html +CVE-2019-0186 - https://www.exploit-db.com/exploits/46759/ +CVE-2019-0188 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-0188 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-0188 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0190 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-0192 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-0196 - https://hackerone.com/reports/527042 +CVE-2019-0196 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0196 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0197 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0197 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0199 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0199 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-0201 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-0201 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-0201 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-0205 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-0210 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-0211 - http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html +CVE-2019-0211 - http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html +CVE-2019-0211 - http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html +CVE-2019-0211 - https://hackerone.com/reports/520903 +CVE-2019-0211 - https://www.exploit-db.com/exploits/46676/ +CVE-2019-0211 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0211 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0213 - http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html +CVE-2019-0214 - http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html +CVE-2019-0215 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0215 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-0215 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0217 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0217 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0219 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-0219 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0219 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-0220 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0220 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-0220 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-0220 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0221 - http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html +CVE-2019-0221 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0221 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0221 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-0222 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0222 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-0227 - https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/ +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-0227 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-0227 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0228 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-0228 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0228 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0228 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-0230 - http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html +CVE-2019-0230 - http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html +CVE-2019-0230 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0230 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-0230 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-0232 - http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html +CVE-2019-0232 - http://seclists.org/fulldisclosure/2019/May/4 +CVE-2019-0232 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0232 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-0232 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-0232 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-0232 - https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/ +CVE-2019-0233 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-0233 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-0233 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-0235 - http://packetstormsecurity.com/files/157514/Apache-OFBiz-17.12.03-Cross-Site-Request-Forgery.html +CVE-2019-0241 - https://launchpad.support.sap.com/#/notes/2725538 +CVE-2019-0267 - http://www.securityfocus.com/bid/106990 +CVE-2019-0285 - http://packetstormsecurity.com/files/153471/SAP-Crystal-Reports-Information-Disclosure.html +CVE-2019-0319 - http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html +CVE-2019-0319 - https://cxsecurity.com/ascii/WLB-2019050283 +CVE-2019-0363 - https://launchpad.support.sap.com/#/notes/2817491 +CVE-2019-0364 - https://launchpad.support.sap.com/#/notes/2817491 +CVE-2019-0367 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0368 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0369 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0370 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0374 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0375 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0376 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0377 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0378 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0379 - https://launchpad.support.sap.com/#/notes/2826015 +CVE-2019-0379 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0380 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0381 - https://launchpad.support.sap.com/#/notes/2792430 +CVE-2019-0381 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 +CVE-2019-0539 - https://www.exploit-db.com/exploits/46203/ +CVE-2019-0539 - https://www.exploit-db.com/exploits/46204/ +CVE-2019-0539 - https://www.exploit-db.com/exploits/46485/ +CVE-2019-0541 - https://www.exploit-db.com/exploits/46536/ +CVE-2019-0543 - https://www.exploit-db.com/exploits/46156/ +CVE-2019-0552 - https://www.exploit-db.com/exploits/46162/ +CVE-2019-0555 - https://www.exploit-db.com/exploits/46185/ +CVE-2019-0566 - https://www.exploit-db.com/exploits/46161/ +CVE-2019-0567 - https://www.exploit-db.com/exploits/46203/ +CVE-2019-0568 - https://www.exploit-db.com/exploits/46205/ +CVE-2019-0570 - https://www.exploit-db.com/exploits/46184/ +CVE-2019-0571 - https://www.exploit-db.com/exploits/46159/ +CVE-2019-0572 - https://www.exploit-db.com/exploits/46157/ +CVE-2019-0573 - https://www.exploit-db.com/exploits/46158/ +CVE-2019-0574 - https://www.exploit-db.com/exploits/46160/ +CVE-2019-0708 - http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html +CVE-2019-0708 - http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html +CVE-2019-0708 - http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html +CVE-2019-0708 - http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html +CVE-2019-0708 - http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html +CVE-2019-0730 - http://packetstormsecurity.com/files/152533/Microsoft-Windows-LUAFV-Delayed-Virtualization-MAXIMUM_ACCESS-DesiredAccess-Privilege-Escalation.html +CVE-2019-0730 - https://www.exploit-db.com/exploits/46713/ +CVE-2019-0731 - http://packetstormsecurity.com/files/152534/Microsoft-Windows-LUAFV-Delayed-Virtualization-Cross-Process-Handle-Duplication-Privilege-Escalation.html +CVE-2019-0731 - https://www.exploit-db.com/exploits/46714/ +CVE-2019-0732 - http://packetstormsecurity.com/files/152536/Microsoft-Windows-LUAFV-NtSetCachedSigningLevel-Device-Guard-Bypass.html +CVE-2019-0732 - https://www.exploit-db.com/exploits/46716/ +CVE-2019-0735 - http://packetstormsecurity.com/files/152532/Microsoft-Windows-CSRSS-SxSSrv-Cached-Manifest-Privilege-Escalation.html +CVE-2019-0735 - https://www.exploit-db.com/exploits/46712/ +CVE-2019-0752 - http://packetstormsecurity.com/files/153078/Microsoft-Internet-Explorer-Windows-10-1809-17763.316-Memory-Corruption.html +CVE-2019-0755 - http://packetstormsecurity.com/files/153407/Microsoft-Windows-CmpAddRemoveContainerToCLFSLog-Arbitrary-File-Directory-Creation.html +CVE-2019-0755 - http://packetstormsecurity.com/files/153408/Microsoft-Windows-Font-Cache-Service-Insecure-Sections.html +CVE-2019-0796 - http://packetstormsecurity.com/files/152535/Microsoft-Windows-LUAFV-LuafvCopyShortName-Arbitrary-Short-Name-Privilege-Escalation.html +CVE-2019-0796 - https://www.exploit-db.com/exploits/46715/ +CVE-2019-0803 - http://packetstormsecurity.com/files/153034/Microsoft-Windows-Win32k-Privilege-Escalation.html +CVE-2019-0805 - http://packetstormsecurity.com/files/152537/Microsoft-Windows-LUAFV-Delayed-Virtualization-Cache-Manager-Poisoning-Privilege-Escalation.html +CVE-2019-0805 - https://www.exploit-db.com/exploits/46717/ +CVE-2019-0808 - http://packetstormsecurity.com/files/157616/Microsoft-Windows-NtUserMNDragOver-Local-Privilege-Escalation.html +CVE-2019-0836 - http://packetstormsecurity.com/files/152538/Microsoft-Windows-LUAFV-PostLuafvPostReadWrite-SECTION_OBJECT_POINTERS-Race-Condition.html +CVE-2019-0836 - https://www.exploit-db.com/exploits/46718/ +CVE-2019-0841 - http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html +CVE-2019-0841 - http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html +CVE-2019-0841 - http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html +CVE-2019-0841 - http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html +CVE-2019-0841 - http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html +CVE-2019-0841 - https://www.exploit-db.com/exploits/46683/ +CVE-2019-0863 - http://packetstormsecurity.com/files/153008/Angry-Polar-Bear-2-Microsoft-Windows-Error-Reporting-Local-Privilege-Escalation.html +CVE-2019-0881 - http://packetstormsecurity.com/files/152988/Microsoft-Windows-CmKeyBodyRemapToVirtualForEnum-Arbitrary-Key-Enumeration.html +CVE-2019-0887 - https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ +CVE-2019-1000003 - https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ +CVE-2019-1000003 - https://wpvulndb.com/vulnerabilities/9198 +CVE-2019-1000005 - https://github.com/mpdf/mpdf/issues/949 +CVE-2019-1000006 - https://github.com/RIOT-OS/RIOT/issues/10739 +CVE-2019-1000010 - https://github.com/phpipam/phpipam/issues/2327 +CVE-2019-1000018 - http://seclists.org/fulldisclosure/2021/May/78 +CVE-2019-1000023 - https://inf0seq.github.io/cve/2019/01/20/SQL-Injection-in-OPTOSS-Next-Gen-Network-Management-System-(NG-NetMS).html +CVE-2019-1000024 - https://inf0seq.github.io/cve/2019/01/20/Cross-site-scripting-(XSS)-in-OPTOSS-Next-Gen-Network-Management-System-(NG-NetMS).html +CVE-2019-1000031 - http://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html +CVE-2019-1000031 - https://wpvulndb.com/vulnerabilities/9246 +CVE-2019-10008 - https://www.exploit-db.com/exploits/46659 +CVE-2019-10009 - http://packetstormsecurity.com/files/152244/Titan-FTP-Server-2019-Build-3505-Directory-Traversal.html +CVE-2019-10009 - http://seclists.org/fulldisclosure/2019/Mar/47 +CVE-2019-10009 - https://seclists.org/fulldisclosure/2019/Mar/47 +CVE-2019-10009 - https://www.exploit-db.com/exploits/46611 +CVE-2019-10009 - https://www.exploit-db.com/exploits/46611/ +CVE-2019-10011 - https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-create-your-own-accounts-d865bd22cdd8 +CVE-2019-10012 - https://medium.com/@mdavis332/critical-vulnerability-in-higher-ed-erp-55580f8880c +CVE-2019-10013 - http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html +CVE-2019-10013 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 +CVE-2019-10018 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 +CVE-2019-10019 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275 +CVE-2019-10020 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 +CVE-2019-10021 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 +CVE-2019-10022 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41273 +CVE-2019-10023 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 +CVE-2019-10024 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 +CVE-2019-10025 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 +CVE-2019-10026 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276 +CVE-2019-10027 - https://github.com/sharemice/phpcms_xss/blob/master/index.html +CVE-2019-10027 - https://sharemice.github.io/phpcms_xss/ +CVE-2019-1003000 - http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html +CVE-2019-1003000 - https://www.exploit-db.com/exploits/46453/ +CVE-2019-1003000 - https://www.exploit-db.com/exploits/46572/ +CVE-2019-1003001 - http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html +CVE-2019-1003001 - https://www.exploit-db.com/exploits/46572/ +CVE-2019-1003002 - http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html +CVE-2019-1003002 - https://www.exploit-db.com/exploits/46572/ +CVE-2019-1003005 - http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html +CVE-2019-1003029 - http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html +CVE-2019-1003030 - http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html +CVE-2019-1003049 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-1003050 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-10039 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_web_and_sys_account/README.md +CVE-2019-10040 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/remote_cmd_exec_0/README.md +CVE-2019-10041 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_sys_account/README.md +CVE-2019-10042 - https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/reset_router/README.md +CVE-2019-10062 - https://www.gosecure.net/blog/2021/05/12/aurelia-framework-insecure-default-allows-xss/ +CVE-2019-10064 - http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html +CVE-2019-10068 - http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html +CVE-2019-10068 - https://devnet.kentico.com/download/hotfixes#securityBugs-v12 +CVE-2019-10072 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10072 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10072 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10072 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10072 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10080 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10081 - https://hackerone.com/reports/677557 +CVE-2019-10081 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10081 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10081 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10082 - https://hackerone.com/reports/680415 +CVE-2019-10082 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10082 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10082 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-10082 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-10082 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10086 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-10086 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-10088 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10088 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10092 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd +CVE-2019-10092 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10092 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10092 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10092 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10093 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10093 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10094 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10094 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10097 - https://hackerone.com/reports/674540 +CVE-2019-10097 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10097 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10097 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10097 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10098 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10098 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10098 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10098 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-1010004 - https://sourceforge.net/p/sox/bugs/299/ +CVE-2019-1010005 - https://github.com/Moeditor/Moeditor/issues/156 +CVE-2019-1010005 - https://github.com/zhuzhuyule/HexoEditor/issues/3 +CVE-2019-1010006 - http://bugzilla.maptools.org/show_bug.cgi?id=2745 +CVE-2019-1010006 - https://bugzilla.gnome.org/show_bug.cgi?id=788980 +CVE-2019-1010022 - https://sourceware.org/bugzilla/show_bug.cgi?id=22850 +CVE-2019-1010022 - https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 +CVE-2019-1010023 - https://sourceware.org/bugzilla/show_bug.cgi?id=22851 +CVE-2019-1010025 - https://sourceware.org/bugzilla/show_bug.cgi?id=22853 +CVE-2019-1010034 - https://wpvulndb.com/vulnerabilities/9553 +CVE-2019-1010054 - https://github.com/lucasgcilento/CVE/blob/master/Dolibarr_CSRF +CVE-2019-1010060 - https://github.com/astropy/astropy/pull/7274 +CVE-2019-1010084 - https://github.com/bigpresh/Dancer-Plugin-SimpleCRUD/pull/109 +CVE-2019-1010091 - https://github.com/tinymce/tinymce/issues/4394 +CVE-2019-10101 - https://medium.com/bugbountywriteup/want-to-take-over-the-java-ecosystem-all-you-need-is-a-mitm-1fc329d898fb +CVE-2019-1010104 - https://metalamin.github.io/Quick-Chat-SQLi-EN/ +CVE-2019-1010112 - https://github.com/LiodAir/images/blob/master/csrf.md +CVE-2019-1010124 - http://packetstormsecurity.com/files/154263/WordPress-WooCommerce-Product-Feed-2.2.18-Cross-Site-Scripting.html +CVE-2019-1010124 - https://wpvulndb.com/vulnerabilities/9856 +CVE-2019-1010124 - https://www.youtube.com/watch?v=T-sqQDFRRBg +CVE-2019-1010127 - https://docs.google.com/document/d/e/2PACX-1vQJveVcGMp_NMdBY5Je2K2k63RoCYznvKjJk5u1wJRmLotvwQkG5qiqZjpABcOkjzj49wkwGweiFwrc/pub +CVE-2019-1010136 - https://www.exploit-db.com/exploits/45187/ +CVE-2019-1010148 - https://gist.github.com/Lz1y/acd1bfd0cc0e0f53b8f781840e7bf368 +CVE-2019-1010149 - https://gist.github.com/Lz1y/e82eb9cc776e629b9d1874dc689421eb +CVE-2019-1010150 - https://gist.github.com/Lz1y/7ab529230c43dfc5441ac32dd13e3e5b +CVE-2019-1010151 - https://gist.github.com/Lz1y/24a6368c7ffdc1af7292035dd16a97f5 +CVE-2019-1010152 - https://gist.github.com/Lz1y/cfb2f8179003b91404ad029333508f4c +CVE-2019-1010153 - https://gist.github.com/Lz1y/31595b060cd6a031896fdf2b3a1273f5 +CVE-2019-1010155 - https://www.youtube.com/watch?v=7sk6agpcA_s +CVE-2019-1010155 - https://youtu.be/BQQbp2vn_wY +CVE-2019-1010163 - https://packetstormsecurity.com/files/145181/SocuSoft-Co.-Photo-2-Video-Converter-8.0.0-Code-Execution-DoS.html +CVE-2019-1010163 - https://ret2eax.github.io/posts/socusoft-bof.html +CVE-2019-1010163 - https://www.exploit-db.com/exploits/43208/ +CVE-2019-1010178 - https://www.youtube.com/watch?v=vOlw2DP9WbE +CVE-2019-1010193 - https://github.com/hisiphp/hisiphp/issues/3 +CVE-2019-1010207 - https://0day.today/exploit/31255 +CVE-2019-1010207 - https://packetstormsecurity.com/files/149665/wppieregister3015-xss.txt +CVE-2019-1010209 - https://gist.github.com/pouyadarabi/467d3167551fb0712d3264c72db092af +CVE-2019-1010238 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-1010239 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-1010241 - https://docs.google.com/document/d/1MBEoJSMvkjp5Kua0bRD_kiDBisL0fOCwTL9uMWj4lGA/edit?usp=sharing +CVE-2019-1010248 - https://sourceforge.net/projects/i-doit/files/i-doit/1.12.1/CHANGELOG/download +CVE-2019-1010257 - https://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html +CVE-2019-1010257 - https://wpvulndb.com/vulnerabilities/9246 +CVE-2019-1010258 - https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg/ +CVE-2019-1010258 - https://github.com/memononen/nanosvg/issues/136 +CVE-2019-1010260 - https://github.com/shyiko/ktlint/pull/332 +CVE-2019-1010266 - https://snyk.io/vuln/SNYK-JS-LODASH-73639 +CVE-2019-1010268 - https://www.exploit-db.com/exploits/43113 +CVE-2019-1010279 - https://redmine.openinfosecfoundation.org/issues/2770 +CVE-2019-1010283 - https://forge.univention.org/bugzilla/show_bug.cgi?id=48427 +CVE-2019-1010290 - https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/ +CVE-2019-1010301 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251 +CVE-2019-1010305 - https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d +CVE-2019-1010305 - https://github.com/kyz/libmspack/issues/27 +CVE-2019-10109 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54220 +CVE-2019-10109 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55469 +CVE-2019-10126 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-10126 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-10126 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-10126 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-10126 - https://usn.ubuntu.com/4118-1/ +CVE-2019-10131 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10131 +CVE-2019-10143 - http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html +CVE-2019-10143 - http://seclists.org/fulldisclosure/2019/Nov/14 +CVE-2019-10149 - http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html +CVE-2019-10149 - http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html +CVE-2019-10149 - http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html +CVE-2019-10149 - http://seclists.org/fulldisclosure/2019/Jun/16 +CVE-2019-10149 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2019-10160 - https://usn.ubuntu.com/4127-2/ +CVE-2019-10173 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-10173 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10173 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10173 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-10173 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10181 - http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html +CVE-2019-10181 - https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344 +CVE-2019-10181 - https://seclists.org/bugtraq/2019/Oct/5 +CVE-2019-10182 - http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html +CVE-2019-10182 - https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344 +CVE-2019-10182 - https://seclists.org/bugtraq/2019/Oct/5 +CVE-2019-10185 - http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html +CVE-2019-10185 - https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344 +CVE-2019-10185 - https://seclists.org/bugtraq/2019/Oct/5 +CVE-2019-1019 - http://packetstormsecurity.com/files/153639/Microsoft-Windows-HTTP-To-SMB-NTLM-Reflection-Privilege-Escalation.html +CVE-2019-10192 - https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES +CVE-2019-10192 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES +CVE-2019-10192 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10193 - https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES +CVE-2019-10193 - https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES +CVE-2019-10193 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-1020002 - https://github.com/pterodactyl/panel/security/advisories/GHSA-vcm9-hx3q-qwj8 +CVE-2019-1020010 - https://github.com/syuilo/misskey/security/advisories/GHSA-6qw9-6jxq-xj3p +CVE-2019-10219 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-10226 - http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html +CVE-2019-10226 - https://www.exploit-db.com/exploits/46617/ +CVE-2019-10239 - https://blog.to.com/advisory-runasspc-cve-2019-10239/ +CVE-2019-10241 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10241 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10246 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10246 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10246 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10246 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-10246 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10246 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10246 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-10247 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10247 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-10249 - https://github.com/eclipse/xtext-xtend/issues/759 +CVE-2019-10250 - https://www.bleepingcomputer.com/news/security/uc-browser-for-android-desktop-exposes-500-million-users-to-mitm-attacks/ +CVE-2019-10251 - https://www.bleepingcomputer.com/news/security/uc-browser-for-android-desktop-exposes-500-million-users-to-mitm-attacks/ +CVE-2019-10253 - http://packetstormsecurity.com/files/154294/Wolters-Kluwer-TeamMate-3.1-Cross-Site-Request-Forgery.html +CVE-2019-10253 - http://www.teammatesolutions.com/ +CVE-2019-10261 - https://packetstormsecurity.com/files/152303/CentOS-Web-Panel-0.9.8.789-Cross-Site-Scripting.html +CVE-2019-10261 - https://www.exploit-db.com/exploits/46629 +CVE-2019-10266 - http://packetstormsecurity.com/files/153772/Ahsay-Backup-7.x-8.x-XML-Injection.html +CVE-2019-10267 - http://packetstormsecurity.com/files/153770/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html +CVE-2019-10267 - http://packetstormsecurity.com/files/153771/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html +CVE-2019-10269 - https://coreymhudson.github.io/bwa_vulnerabilties/ +CVE-2019-10273 - http://packetstormsecurity.com/files/152439/ManageEngine-ServiceDesk-Plus-9.3-User-Enumeration.html +CVE-2019-10273 - https://www.exploit-db.com/exploits/46674/ +CVE-2019-10276 - https://github.com/cobub/razor/issues/168 +CVE-2019-10276 - https://github.com/kyrie403/Vuln/blob/master/Cobub%20Razor/Cobub%20Razor%20-%20file%20upload%20vulnerability.md +CVE-2019-10309 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0783 +CVE-2019-10320 - http://seclists.org/fulldisclosure/2019/May/39 +CVE-2019-10321 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 +CVE-2019-10322 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 +CVE-2019-10349 - http://packetstormsecurity.com/files/153610/Jenkins-Dependency-Graph-View-0.13-Cross-Site-Scripting.html +CVE-2019-10352 - https://www.tenable.com/security/research/tra-2019-35 +CVE-2019-10383 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-10384 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-10475 - http://packetstormsecurity.com/files/155200/Jenkins-Build-Metrics-1.3-Cross-Site-Scripting.html +CVE-2019-10478 - https://github.com/warringaa/CVEs#glory-systems-rbw-100 +CVE-2019-10479 - https://github.com/warringaa/CVEs#glory-systems-rbw-100 +CVE-2019-10480 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10481 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10482 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10483 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10484 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10485 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10486 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10487 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10489 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-10490 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10493 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10494 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10498 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-10500 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10503 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10511 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10513 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10516 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10517 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10518 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10523 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10525 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10526 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10527 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-10532 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10535 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10536 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10537 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10539 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-10540 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-10544 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10545 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10546 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10547 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10548 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10549 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10550 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10551 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10552 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10553 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10554 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10555 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10556 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10557 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10558 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10559 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10561 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10562 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-10563 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10564 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10565 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10566 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10567 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-10569 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10571 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10572 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10574 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10575 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10577 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10578 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10579 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10580 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-10581 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10582 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10583 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10584 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10585 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10586 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10587 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10588 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10589 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10590 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-10591 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10592 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10593 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10594 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10595 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10596 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-10597 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-10598 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10600 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10601 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10602 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10603 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10604 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10605 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10606 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10607 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10608 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10609 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10610 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10611 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-10612 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10614 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-10615 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-10616 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-10617 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10618 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-10620 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10621 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10622 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10623 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10624 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10625 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-10626 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-10627 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-10628 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-10629 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-10630 - http://maxwelldulin.com/BlogPost?post=3236967424 +CVE-2019-10631 - http://maxwelldulin.com/BlogPost?post=3236967424 +CVE-2019-10632 - http://maxwelldulin.com/BlogPost?post=3236967424 +CVE-2019-10633 - http://maxwelldulin.com/BlogPost?post=3236967424 +CVE-2019-10634 - http://maxwelldulin.com/BlogPost?post=3236967424 +CVE-2019-10638 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-10638 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 +CVE-2019-10638 - https://usn.ubuntu.com/4115-1/ +CVE-2019-10638 - https://usn.ubuntu.com/4118-1/ +CVE-2019-10638 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10639 - https://usn.ubuntu.com/4115-1/ +CVE-2019-10639 - https://usn.ubuntu.com/4118-1/ +CVE-2019-10639 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-10644 - https://github.com/hyyyp/HYBBS2/issues/3 +CVE-2019-10647 - https://github.com/kyrie403/Vuln/blob/master/zzzcms/zzzphp%20v1.6.3%20write%20file%20with%20dangerous%20type.md +CVE-2019-10649 - https://github.com/ImageMagick/ImageMagick/issues/1533 +CVE-2019-10650 - https://github.com/ImageMagick/ImageMagick/issues/1532 +CVE-2019-10654 - https://github.com/ckolivas/lrzip/issues/108 +CVE-2019-10655 - http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-Command-Execution.html +CVE-2019-10655 - http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-Unauthenticated-Command-Execution.html +CVE-2019-10655 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10655 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10656 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10656 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10657 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10657 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10658 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10658 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10659 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10659 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10660 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10660 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10661 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10661 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10662 - https://github.com/scarvell/grandstream_exploits +CVE-2019-10662 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10663 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 +CVE-2019-10664 - http://packetstormsecurity.com/files/152678/Domoticz-4.10577-Unauthenticated-Remote-Command-Execution.html +CVE-2019-10664 - https://www.exploit-db.com/exploits/46773/ +CVE-2019-10669 - http://packetstormsecurity.com/files/154391/LibreNMS-Collectd-Command-Injection.html +CVE-2019-10673 - http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html +CVE-2019-10673 - https://wpvulndb.com/vulnerabilities/9250 +CVE-2019-10676 - https://packetstormsecurity.com/files/152410/Uniqkey-Password-Manager-1.14-Credential-Disclosure.html +CVE-2019-10676 - https://seclists.org/fulldisclosure/2019/Apr/1 +CVE-2019-10677 - http://packetstormsecurity.com/files/154357/DASAN-Zhone-ZNID-GPON-2426A-EU-Cross-Site-Scripting.html +CVE-2019-10677 - https://adamziaja.com/poc/201903-xss-zhone.html +CVE-2019-10677 - https://redteam.pl/poc/dasan-zhone-znid-gpon-2426a-eu.html +CVE-2019-10678 - http://packetstormsecurity.com/files/152678/Domoticz-4.10577-Unauthenticated-Remote-Command-Execution.html +CVE-2019-10678 - https://www.exploit-db.com/exploits/46773/ +CVE-2019-10679 - http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-File-Permissions.html +CVE-2019-10679 - http://seclists.org/fulldisclosure/2020/Aug/19 +CVE-2019-10679 - https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-service-executable-in-eikon-thomson-reuters-cve-2019-10679/ +CVE-2019-10684 - https://github.com/kyrie403/Vuln/blob/master/74cms/74cms%20v5.0.1%20remote%20code%20execution.md +CVE-2019-10685 - https://github.com/alt3kx/CVE-2019-10685 +CVE-2019-10685 - https://medium.com/@alt3kx/a-reflected-xss-in-print-archive-system-v2015-release-2-6-cve-2019-10685-b60763b7768b +CVE-2019-10686 - https://github.com/ctripcorp/apollo/issues/2103 +CVE-2019-10687 - http://packetstormsecurity.com/files/154184/KBPublisher-6.0.2.1-SQL-Injection.html +CVE-2019-1069 - https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html +CVE-2019-1069 - https://www.kb.cert.org/vuls/id/119704 +CVE-2019-10692 - http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html +CVE-2019-10705 - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd +CVE-2019-10705 - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd +CVE-2019-10706 - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd +CVE-2019-10706 - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd +CVE-2019-10709 - http://packetstormsecurity.com/files/154259/Asus-Precision-TouchPad-11.0.0.25-Denial-Of-Service-Privilege-Escalation.html +CVE-2019-10709 - https://blog.telspace.co.za/2019/08/tsa-2019-001-asus-precision-touchpad.html +CVE-2019-10710 - https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/ +CVE-2019-10711 - https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/ +CVE-2019-10716 - http://packetstormsecurity.com/files/156214/Verodin-Director-Web-Console-3.5.4.0-Password-Disclosure.html +CVE-2019-10717 - http://seclists.org/fulldisclosure/2019/Jun/44 +CVE-2019-10718 - http://packetstormsecurity.com/files/153364/BlogEngine.NET-3.3.6-3.3.7-XML-Injection.html +CVE-2019-10719 - http://packetstormsecurity.com/files/153347/BlogEngine.NET-3.3.6-3.3.7-dirPath-Directory-Traversal-Remote-Code-Execution.html +CVE-2019-10720 - http://packetstormsecurity.com/files/153348/BlogEngine.NET-3.3.6-3.3.7-Theme-Cookie-Directory-Traversal-Remote-Code-Execution.html +CVE-2019-10723 - https://sourceforge.net/p/podofo/tickets/46/ +CVE-2019-10732 - https://bugs.kde.org/show_bug.cgi?id=404698 +CVE-2019-10734 - https://bugs.kde.org/show_bug.cgi?id=404697 +CVE-2019-10735 - https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159 +CVE-2019-10742 - https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505 +CVE-2019-10744 - https://snyk.io/vuln/SNYK-JS-LODASH-450202 +CVE-2019-10744 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-10744 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-10745 - https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211 +CVE-2019-10746 - https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212 +CVE-2019-10746 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-10747 - https://snyk.io/vuln/SNYK-JS-SETVALUE-450213 +CVE-2019-10748 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221 +CVE-2019-10749 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222 +CVE-2019-10750 - https://snyk.io/vuln/SNYK-JS-DEEPLY-451026 +CVE-2019-10751 - https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107 +CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467402 +CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467404 +CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467406 +CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468868 +CVE-2019-10754 - https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468869 +CVE-2019-10755 - https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407 +CVE-2019-10756 - https://snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-471939 +CVE-2019-10758 - https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215 +CVE-2019-10761 - https://github.com/patriksimek/vm2/issues/197 +CVE-2019-10761 - https://snyk.io/vuln/SNYK-JS-VM2-473188 +CVE-2019-10764 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-10766 - https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879 +CVE-2019-10768 - https://snyk.io/vuln/SNYK-JS-ANGULAR-534884 +CVE-2019-10769 - https://snyk.io/vuln/SNYK-JS-SAFEREVAL-534901 +CVE-2019-10770 - https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882 +CVE-2019-10772 - https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969 +CVE-2019-10773 - https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/ +CVE-2019-10775 - https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354 +CVE-2019-10777 - https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839 +CVE-2019-10778 - https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926 +CVE-2019-10779 - https://snyk.io/vuln/SNYK-JAVA-STROOM-541182 +CVE-2019-10780 - https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602 +CVE-2019-10781 - https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970 +CVE-2019-10783 - https://snyk.io/vuln/SNYK-JS-LSOF-543632 +CVE-2019-10784 - https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885 +CVE-2019-10786 - https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035 +CVE-2019-10787 - https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183 +CVE-2019-10788 - https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184 +CVE-2019-10789 - https://snyk.io/vuln/SNYK-JS-CURLING-546484 +CVE-2019-10790 - https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450 +CVE-2019-10790 - https://snyk.io/vuln/SNYK-JS-TAFFY-546521 +CVE-2019-10791 - https://snyk.io/vuln/SNYK-JS-PROMISEPROBE-546816 +CVE-2019-10792 - https://snyk.io/vuln/SNYK-JS-BODYMEN-548897 +CVE-2019-10793 - https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905 +CVE-2019-10794 - https://snyk.io/vuln/SNYK-JS-COMPONENTFLATTEN-548907 +CVE-2019-10795 - https://snyk.io/vuln/SNYK-JS-UNDEFSAFE-548940 +CVE-2019-10796 - https://snyk.io/vuln/SNYK-JS-RPI-548942 +CVE-2019-10797 - https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944 +CVE-2019-10798 - https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803 +CVE-2019-10799 - https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804 +CVE-2019-10800 - https://snyk.io/vuln/SNYK-PYTHON-CODECOV-552149 +CVE-2019-10801 - https://snyk.io/vuln/SNYK-JS-ENPEEM-559007 +CVE-2019-10802 - https://snyk.io/vuln/SNYK-JS-GITING-559008 +CVE-2019-10803 - https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009 +CVE-2019-10804 - https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010 +CVE-2019-10805 - https://snyk.io/vuln/SNYK-JS-VALIB-559015 +CVE-2019-10806 - https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223 +CVE-2019-10807 - https://snyk.io/vuln/SNYK-JS-BLAMER-559541 +CVE-2019-10808 - https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497 +CVE-2019-10842 - https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093 +CVE-2019-10844 - https://github.com/sony/nnabla/issues/209 +CVE-2019-10845 - http://packetstormsecurity.com/files/152452/Uniqkey-Password-Manager-1.14-Denial-Of-Service.html +CVE-2019-10845 - https://vuldb.com/?id.132960 +CVE-2019-10846 - http://packetstormsecurity.com/files/155257/Computrols-CBAS-Web-19.0.0-Cross-Site-Scripting.html +CVE-2019-10847 - http://packetstormsecurity.com/files/155247/Computrols-CBAS-Web-19.0.0-Cross-Site-Request-Forgery.html +CVE-2019-10848 - http://packetstormsecurity.com/files/155266/Computrols-CBAS-Web-19.0.0-Username-Enumeration.html +CVE-2019-10849 - http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html +CVE-2019-10850 - https://applied-risk.com/labs/advisories +CVE-2019-10851 - https://applied-risk.com/labs/advisories +CVE-2019-10852 - http://packetstormsecurity.com/files/155251/Computrols-CBAS-Web-19.0.0-Blind-SQL-Injection.html +CVE-2019-10853 - https://applied-risk.com/labs/advisories +CVE-2019-10854 - https://applied-risk.com/labs/advisories +CVE-2019-10855 - https://applied-risk.com/labs/advisories +CVE-2019-10863 - https://pentest.com.tr/exploits/TeemIp-IPAM-2-4-0-new-config-Command-Injection-Metasploit.html +CVE-2019-10863 - https://www.exploit-db.com/exploits/46641 +CVE-2019-10863 - https://www.exploit-db.com/exploits/46641/ +CVE-2019-10864 - https://medium.com/@aramburu/cve-2019-10864-wordpress-7aebc24751c4 +CVE-2019-10866 - http://seclists.org/fulldisclosure/2019/May/8 +CVE-2019-10866 - https://wpvulndb.com/vulnerabilities/9286 +CVE-2019-10867 - http://packetstormsecurity.com/files/152667/Pimcore-Unserialize-Remote-Code-Execution.html +CVE-2019-10867 - https://www.exploit-db.com/exploits/46783/ +CVE-2019-10869 - https://wpvulndb.com/vulnerabilities/9272 +CVE-2019-10871 - https://gitlab.freedesktop.org/poppler/poppler/issues/751 +CVE-2019-10872 - https://gitlab.freedesktop.org/poppler/poppler/issues/750 +CVE-2019-10873 - https://gitlab.freedesktop.org/poppler/poppler/issues/748 +CVE-2019-10874 - http://packetstormsecurity.com/files/152429/Bolt-CMS-3.6.6-Cross-Site-Request-Forgery-Code-Execution.html +CVE-2019-10874 - https://www.exploit-db.com/exploits/46664/ +CVE-2019-10875 - http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.html +CVE-2019-10875 - https://thehackernews.com/2019/04/xiaomi-browser-vulnerability.html +CVE-2019-10875 - https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html +CVE-2019-10883 - https://www.tenable.com/security/research +CVE-2019-10884 - https://vuldb.com/?id.133069 +CVE-2019-10885 - http://packetstormsecurity.com/files/156792/Ivanti-Workspace-Manager-Security-Bypass.html +CVE-2019-10886 - http://packetstormsecurity.com/files/152612/Sony-Smart-TV-Information-Disclosure-File-Read.html +CVE-2019-10887 - http://packetstormsecurity.com/files/152435/SaLICru-SLC-20-cube3-5-HTML-Injection.html +CVE-2019-10887 - https://www.exploit-db.com/exploits/46667/ +CVE-2019-1089 - http://packetstormsecurity.com/files/153683/Microsoft-Windows-RPCSS-Activation-Kernel-Security-Callback-Privilege-Escalation.html +CVE-2019-10893 - http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0.9.8.793-Free-0.9.8.753-Pro-Cross-Site-Scripting.html +CVE-2019-10893 - https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt +CVE-2019-10893 - https://www.exploit-db.com/exploits/46669 +CVE-2019-10893 - https://www.exploit-db.com/exploits/46669/ +CVE-2019-10898 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585 +CVE-2019-10900 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612 +CVE-2019-10903 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 +CVE-2019-10906 - https://usn.ubuntu.com/4011-1/ +CVE-2019-10909 - https://www.drupal.org/sa-core-2019-005 +CVE-2019-10919 - http://packetstormsecurity.com/files/153123/Siemens-LOGO-8-Missing-Authentication.html +CVE-2019-10919 - http://seclists.org/fulldisclosure/2019/May/45 +CVE-2019-10919 - https://seclists.org/bugtraq/2019/May/73 +CVE-2019-10920 - http://packetstormsecurity.com/files/153122/Siemens-LOGO-8-Hard-Coded-Cryptographic-Key.html +CVE-2019-10920 - http://seclists.org/fulldisclosure/2019/May/44 +CVE-2019-10920 - https://seclists.org/bugtraq/2019/May/72 +CVE-2019-10921 - http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html +CVE-2019-10921 - http://seclists.org/fulldisclosure/2019/May/49 +CVE-2019-10921 - https://seclists.org/bugtraq/2019/May/74 +CVE-2019-10929 - https://cert-portal.siemens.com/productcert/pdf/ssa-273799.pdf +CVE-2019-10945 - http://packetstormsecurity.com/files/152515/Joomla-3.9.4-Arbitrary-File-Deletion-Directory-Traversal.html +CVE-2019-10945 - https://www.exploit-db.com/exploits/46710/ +CVE-2019-10963 - http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html +CVE-2019-10969 - http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html +CVE-2019-10999 - https://github.com/fuzzywalls/CVE-2019-10999 +CVE-2019-11001 - https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py +CVE-2019-11001 - https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ +CVE-2019-11002 - https://github.com/Dogfalo/materialize/issues/6286 +CVE-2019-11003 - https://github.com/Dogfalo/materialize/issues/6286 +CVE-2019-11004 - https://github.com/Dogfalo/materialize/issues/6286 +CVE-2019-11013 - http://packetstormsecurity.com/files/154196/Nimble-Streamer-3.x-Directory-Traversal.html +CVE-2019-11013 - https://mayaseven.com/nimble-directory-traversal-in-nimble-streamer-version-3-0-2-2-to-3-5-4-9/ +CVE-2019-11015 - https://www.andmp.com/2019/04/unpatched-vulnerability-in-xiaomi-miui-os-lock-screen.html +CVE-2019-11017 - http://packetstormsecurity.com/files/152465/D-Link-DI-524-2.06RU-Cross-Site-Scripting.html +CVE-2019-11017 - https://www.exploit-db.com/exploits/46687 +CVE-2019-11018 - https://github.com/zoujingli/ThinkAdmin/issues/173 +CVE-2019-11023 - https://gitlab.com/graphviz/graphviz/issues/1517 +CVE-2019-11023 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/ +CVE-2019-11024 - https://github.com/saitoha/libsixel/issues/85 +CVE-2019-11024 - https://research.loginsoft.com/bugs/1501/ +CVE-2019-11026 - https://gitlab.freedesktop.org/poppler/poppler/issues/752 +CVE-2019-11026 - https://research.loginsoft.com/bugs/1508/ +CVE-2019-11028 - http://packetstormsecurity.com/files/152643/GAT-Ship-Web-Module-Unrestricted-File-Upload.html +CVE-2019-11029 - https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution +CVE-2019-11030 - https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution +CVE-2019-11031 - https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution +CVE-2019-11033 - https://support.applaudsolutions.com/hc/en-us/articles/203794318-Download-latest-Applaud-HCM-patch +CVE-2019-11034 - https://usn.ubuntu.com/3953-2/ +CVE-2019-11035 - https://usn.ubuntu.com/3953-2/ +CVE-2019-11038 - https://bugzilla.suse.com/show_bug.cgi?id=1140118 +CVE-2019-11038 - https://hackerone.com/reports/623588 +CVE-2019-11039 - https://bugs.php.net/bug.php?id=78069 +CVE-2019-11039 - https://hackerone.com/reports/593229 +CVE-2019-11040 - https://hackerone.com/reports/665330 +CVE-2019-11041 - https://hackerone.com/reports/675578 +CVE-2019-11042 - https://hackerone.com/reports/675580 +CVE-2019-11043 - http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html +CVE-2019-11043 - https://hackerone.com/reports/722327 +CVE-2019-11043 - https://usn.ubuntu.com/4166-1/ +CVE-2019-11044 - https://bugs.php.net/bug.php?id=78862 +CVE-2019-11045 - https://bugs.php.net/bug.php?id=78863 +CVE-2019-11048 - https://bugs.php.net/bug.php?id=78875 +CVE-2019-11048 - https://bugs.php.net/bug.php?id=78876 +CVE-2019-11048 - https://hackerone.com/reports/905015 +CVE-2019-11048 - https://usn.ubuntu.com/4375-1/ +CVE-2019-11048 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-11048 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11057 - https://cybersecurityworks.com/zerodays/cve-2019-11057-vtiger.html +CVE-2019-11057 - https://medium.com/@mohnishdhage/sql-injection-vtiger-crm-v7-1-0-cve-2019-11057-245f84fc5c2c +CVE-2019-11059 - https://github.com/u-boot/u-boot/commits/master +CVE-2019-11060 - https://www.exploit-db.com/exploits/46720 +CVE-2019-11064 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md +CVE-2019-11068 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-11070 - http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html +CVE-2019-11073 - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ +CVE-2019-11074 - https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1935152.html +CVE-2019-11074 - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ +CVE-2019-11076 - https://github.com/livehybrid/poc-cribl-rce +CVE-2019-11080 - http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html +CVE-2019-11085 - https://usn.ubuntu.com/4068-1/ +CVE-2019-11085 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11091 - https://seclists.org/bugtraq/2019/Jun/28 +CVE-2019-11091 - https://seclists.org/bugtraq/2019/Jun/36 +CVE-2019-11091 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html +CVE-2019-11117 - https://www.intel.com/content/www/us/en/security-center/advisory/in +CVE-2019-11128 - https://www.intel.com/content/www/us/en/security-center/advisory/in +CVE-2019-11135 - http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-11135 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html +CVE-2019-11135 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-11157 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html +CVE-2019-11185 - https://wpvulndb.com/vulnerabilities/9320 +CVE-2019-11190 - https://usn.ubuntu.com/4008-1/ +CVE-2019-11190 - https://www.openwall.com/lists/oss-security/2019/04/03/4 +CVE-2019-11190 - https://www.openwall.com/lists/oss-security/2019/04/03/4/1 +CVE-2019-11191 - https://usn.ubuntu.com/4008-1/ +CVE-2019-11191 - https://www.openwall.com/lists/oss-security/2019/04/03/4 +CVE-2019-11191 - https://www.openwall.com/lists/oss-security/2019/04/03/4/1 +CVE-2019-11193 - http://packetstormsecurity.com/files/152494/DirectAdmin-1.561-Cross-Site-Scripting.html +CVE-2019-11193 - https://www.exploit-db.com/exploits/46694 +CVE-2019-11198 - https://outpost24.com/blog +CVE-2019-11199 - https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities +CVE-2019-11200 - https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities +CVE-2019-11201 - https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities +CVE-2019-11213 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 +CVE-2019-11213 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114/ +CVE-2019-11213 - https://www.kb.cert.org/vuls/id/192371 +CVE-2019-11216 - http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html +CVE-2019-11216 - http://seclists.org/fulldisclosure/2019/Dec/7 +CVE-2019-11223 - https://wpvulndb.com/vulnerabilities/9488 +CVE-2019-11226 - http://packetstormsecurity.com/files/153071/CMS-Made-Simple-2.2.10-Cross-Site-Scripting.html +CVE-2019-11226 - http://seclists.org/fulldisclosure/2019/May/36 +CVE-2019-11229 - http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html +CVE-2019-11231 - http://packetstormsecurity.com/files/152961/GetSimpleCMS-3.3.15-Remote-Code-Execution.html +CVE-2019-11231 - https://ssd-disclosure.com/?p=3899&preview=true +CVE-2019-1125 - http://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.html +CVE-2019-11253 - https://github.com/kubernetes/kubernetes/issues/83253 +CVE-2019-11255 - https://groups.google.com/forum/#!topic/kubernetes-security-announce/aXiYN0q4uIw +CVE-2019-11269 - http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html +CVE-2019-11269 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-11275 - https://pivotal.io/security/cve-2019-11275 +CVE-2019-11287 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin +CVE-2019-11288 - https://pivotal.io/security/cve-2019-11288 +CVE-2019-11325 - https://github.com/symfony/symfony/releases/tag/v4.3.8 +CVE-2019-11326 - https://mezdanak.de/2019/06/21/iot-full-disclosure-topcon-positioning-net-g5-receiver/ +CVE-2019-11327 - https://mezdanak.de/2019/06/21/iot-full-disclosure-topcon-positioning-net-g5-receiver/ +CVE-2019-11328 - http://www.openwall.com/lists/oss-security/2019/05/16/1 +CVE-2019-11332 - https://cisk123456.blogspot.com/2019/04/mkcms-v50.html +CVE-2019-11334 - http://packetstormsecurity.com/files/153280/Tzumi-Electronics-Klic-Lock-Authentication-Bypass.html +CVE-2019-11336 - http://packetstormsecurity.com/files/152612/Sony-Smart-TV-Information-Disclosure-File-Read.html +CVE-2019-11338 - https://github.com/FFmpeg/FFmpeg/commit/54655623a82632e7624714d7b2a3e039dc5faa7e +CVE-2019-11338 - https://github.com/FFmpeg/FFmpeg/commit/9ccc633068c6fe76989f487c8932bd11886ad65b +CVE-2019-11341 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-11351 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-004.md +CVE-2019-11353 - https://securityshards.wordpress.com/2019/04/21/cve-2019-11353-engenius-ews660ap-arbitrary-code-execution/ +CVE-2019-11354 - http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html +CVE-2019-11354 - http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html +CVE-2019-11354 - https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/ +CVE-2019-11354 - https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien +CVE-2019-11354 - https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client +CVE-2019-11354 - https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/ +CVE-2019-11358 - http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html +CVE-2019-11358 - http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html +CVE-2019-11358 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html +CVE-2019-11358 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2019-11358 - https://hackerone.com/reports/454365 +CVE-2019-11358 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2019-11358 - https://seclists.org/bugtraq/2019/May/18 +CVE-2019-11358 - https://snyk.io/vuln/SNYK-JS-JQUERY-174006 +CVE-2019-11358 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11358 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-11358 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-11358 - https://www.tenable.com/security/tns-2019-08 +CVE-2019-11358 - https://www.tenable.com/security/tns-2020-02 +CVE-2019-11359 - https://github.com/mkucej/i-librarian/issues/138 +CVE-2019-11360 - https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/ +CVE-2019-11363 - https://prophecyinternational.atlassian.net/wiki/spaces/SC7/pages/158760961/Release+Notes+for+Snare+Central+v7.4.5 +CVE-2019-11364 - https://prophecyinternational.atlassian.net/wiki/spaces/SC7/pages/158760961/Release+Notes+for+Snare+Central+v7.4.5 +CVE-2019-11365 - https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities +CVE-2019-11365 - https://seclists.org/bugtraq/2019/May/16 +CVE-2019-11365 - https://sourceforge.net/p/atftp/code/ci/abed7d245d8e8bdfeab24f9f7f55a52c3140f96b/ +CVE-2019-11366 - https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities +CVE-2019-11366 - https://seclists.org/bugtraq/2019/May/16 +CVE-2019-11367 - http://packetstormsecurity.com/files/153151/AUO-Solar-Data-Recorder-Incorrect-Access-Control.html +CVE-2019-11367 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11367 +CVE-2019-11368 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11368 +CVE-2019-11369 - http://seclists.org/fulldisclosure/2019/Oct/45 +CVE-2019-11369 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11369 +CVE-2019-11370 - https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11370 +CVE-2019-11372 - https://sourceforge.net/p/mediainfo/bugs/1101/ +CVE-2019-11373 - https://sourceforge.net/p/mediainfo/bugs/1101/ +CVE-2019-11374 - http://packetstormsecurity.com/files/152603/74CMS-5.0.1-Cross-Site-Request-Forgery.html +CVE-2019-11374 - https://www.exploit-db.com/exploits/46738/ +CVE-2019-11375 - http://packetstormsecurity.com/files/152604/Msvod-10-Cross-Site-Request-Forgery.html +CVE-2019-11375 - https://www.exploit-db.com/exploits/46739/ +CVE-2019-11377 - https://github.com/vedees/wcms/issues/2 +CVE-2019-11383 - https://pastebin.com/6uT9jhDR +CVE-2019-11384 - https://pastebin.com/c90h9WfB +CVE-2019-11393 - https://www.exploit-db.com/exploits/46404 +CVE-2019-11395 - http://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html +CVE-2019-11395 - http://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html +CVE-2019-11395 - http://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html +CVE-2019-11395 - http://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html +CVE-2019-11395 - http://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html +CVE-2019-11395 - https://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html +CVE-2019-11395 - https://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html +CVE-2019-11395 - https://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html +CVE-2019-11395 - https://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html +CVE-2019-11395 - https://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html +CVE-2019-11396 - http://packetstormsecurity.com/files/153868/Avira-Free-Security-Suite-2019-Software-Updater-2.0.6.13175-Improper-Access-Control.html +CVE-2019-11397 - https://medium.com/@javarmutt/rapid4-local-file-inclusion-0day-151c830ac74a +CVE-2019-11398 - http://packetstormsecurity.com/files/153219/UliCMS-2019.1-Cross-Site-Scripting.html +CVE-2019-11398 - https://www.exploit-db.com/exploits/46741/ +CVE-2019-11401 - https://github.com/siteserver/cms/issues/1858 +CVE-2019-11404 - https://github.com/arrow-kt/ank/issues/35 +CVE-2019-11404 - https://github.com/arrow-kt/arrow/issues/1310 +CVE-2019-11405 - https://github.com/OpenAPITools/openapi-generator/issues/2253 +CVE-2019-11406 - https://github.com/intelliants/subrion/issues/821 +CVE-2019-11407 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html +CVE-2019-11408 - http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html +CVE-2019-11408 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html +CVE-2019-11409 - http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html +CVE-2019-11409 - http://packetstormsecurity.com/files/155344/FusionPBX-Operator-Panel-exec.php-Command-Execution.html +CVE-2019-11409 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html +CVE-2019-11410 - https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html +CVE-2019-11415 - http://packetstormsecurity.com/files/152680/Intelbras-IWR-3000N-Denial-Of-Service.html +CVE-2019-11415 - https://www.exploit-db.com/exploits/46768/ +CVE-2019-11416 - http://packetstormsecurity.com/files/152682/Intelbras-IWR-3000N-1.5.0-Cross-Site-Request-Forgery.html +CVE-2019-11416 - https://www.exploit-db.com/exploits/46770/ +CVE-2019-11419 - http://packetstormsecurity.com/files/152947/WeChat-7.0.4-Denial-Of-Service.html +CVE-2019-11419 - https://awakened1712.github.io/hacking/hacking-wechat-dos/ +CVE-2019-11419 - https://www.exploit-db.com/exploits/46853 +CVE-2019-11428 - https://github.com/mkucej/i-librarian/issues/139 +CVE-2019-11429 - http://packetstormsecurity.com/files/152696/CentOS-Web-Panel-Domain-Field-Cross-Site-Scripting.html +CVE-2019-11429 - https://www.exploit-db.com/exploits/46784/ +CVE-2019-1144 - http://packetstormsecurity.com/files/154085/Microsoft-Font-Subsetting-DLL-MergeFormat12Cmap-MakeFormat12MergedGlyphList-Double-Free.html +CVE-2019-11444 - https://pentest.com.tr/exploits/Liferay-CE-Portal-Tomcat-7-1-2-ga3-Groovy-Console-Remote-Command-Execution-Metasploit.html +CVE-2019-11444 - https://www.exploit-db.com/exploits/46525 +CVE-2019-11445 - https://pentest.com.tr/exploits/OpenKM-DM-6-3-7-Remote-Command-Execution-Metasploit.html +CVE-2019-11445 - https://www.exploit-db.com/exploits/46526 +CVE-2019-11446 - http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html +CVE-2019-11446 - https://www.exploit-db.com/exploits/46691/ +CVE-2019-11447 - http://packetstormsecurity.com/files/159134/CuteNews-2.1.2-Remote-Code-Execution.html +CVE-2019-11447 - http://pentest.com.tr/exploits/CuteNews-2-1-2-Remote-Code-Execution-Metasploit.html +CVE-2019-11447 - https://www.exploit-db.com/exploits/46698/ +CVE-2019-11448 - https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-SQLi-Remote-Code-Execution.html +CVE-2019-11448 - https://www.exploit-db.com/exploits/46725 +CVE-2019-11448 - https://www.exploit-db.com/exploits/46725/ +CVE-2019-1145 - http://packetstormsecurity.com/files/154081/Microsoft-Font-Subsetting-DLL-MergeFontPackage-Dangling-Pointer.html +CVE-2019-11455 - https://github.com/dzflack/exploits/blob/master/unix/monit_buffer_overread.py +CVE-2019-11456 - https://cisk123456.blogspot.com/2019/04/gila-cms-1101-csrf.html +CVE-2019-11457 - http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html +CVE-2019-11469 - http://packetstormsecurity.com/files/152607/ManageEngine-Applications-Manager-14.0-SQL-Injection-Command-Injection.html +CVE-2019-11469 - https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-Auth-Bypass-Remote-Command-Execution.html +CVE-2019-11469 - https://www.exploit-db.com/exploits/46740 +CVE-2019-11469 - https://www.exploit-db.com/exploits/46740/ +CVE-2019-11476 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html +CVE-2019-11476 - https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863 +CVE-2019-11477 - http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html +CVE-2019-11477 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-11477 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 +CVE-2019-11477 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-11477 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11478 - http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html +CVE-2019-11478 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html +CVE-2019-11478 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-11478 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 +CVE-2019-11478 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-11478 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11479 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 +CVE-2019-11479 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-11479 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-1148 - http://packetstormsecurity.com/files/154084/Microsoft-Font-Subsetting-DLL-GetGlyphId-Out-Of-Bounds-Read.html +CVE-2019-11481 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html +CVE-2019-11484 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html +CVE-2019-11486 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-11487 - https://usn.ubuntu.com/4115-1/ +CVE-2019-11487 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11487 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-1149 - http://packetstormsecurity.com/files/154086/Microsoft-Font-Subsetting-DLL-FixSbitSubTables-Heap-Corruption.html +CVE-2019-11490 - https://github.com/nmap/nmap/issues/1568 +CVE-2019-1150 - http://packetstormsecurity.com/files/154087/Microsoft-Font-Subsetting-DLL-ReadTableIntoStructure-Heap-Corruption.html +CVE-2019-1150 - http://packetstormsecurity.com/files/154093/Microsoft-Font-Subsetting-DLL-WriteTableFromStructure-Out-Of-Bounds-Read.html +CVE-2019-11502 - http://www.openwall.com/lists/oss-security/2019/04/25/7 +CVE-2019-11502 - https://www.openwall.com/lists/oss-security/2019/04/18/4 +CVE-2019-11503 - http://www.openwall.com/lists/oss-security/2019/04/25/7 +CVE-2019-11503 - https://www.openwall.com/lists/oss-security/2019/04/18/4 +CVE-2019-11504 - http://packetstormsecurity.com/files/152717/Zotonic-0.46-mod_admin-Cross-Site-Scripting.html +CVE-2019-11504 - https://www.exploit-db.com/exploits/46788/ +CVE-2019-11507 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11507 - https://kb.pulsesecure.net/?atype=sa +CVE-2019-11507 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2019-11508 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11508 - https://kb.pulsesecure.net/?atype=sa +CVE-2019-11509 - https://kb.pulsesecure.net/?atype=sa +CVE-2019-1151 - http://packetstormsecurity.com/files/154092/Microsoft-Font-Subsetting-DLL-ReadAllocFormat12CharGlyphMapList-Heap-Corruption.html +CVE-2019-11510 - http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html +CVE-2019-11510 - http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html +CVE-2019-11510 - https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/ +CVE-2019-11510 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11510 - https://kb.pulsesecure.net/?atype=sa +CVE-2019-11511 - https://zeroauth.ltd/blog/2019/05/26/cve-2019-11511-zoho-manageengine-adselfservice-plus-xss/ +CVE-2019-11515 - https://cisk123456.blogspot.com/2019/04/gila-cms-1101.html +CVE-2019-11516 - https://www.techrepublic.com/article/android-security-bulletin-august-2019-what-you-need-to-know/ +CVE-2019-11517 - https://seclists.org/bugtraq/2019/Jun/10 +CVE-2019-1152 - http://packetstormsecurity.com/files/154096/Microsoft-Font-Subsetting-DLL-MakeFormat12MergedGlyphList-Heap-Corruption.html +CVE-2019-11521 - http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html +CVE-2019-11522 - http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html +CVE-2019-11523 - https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc +CVE-2019-11526 - https://security.mioso.com/CVE-2019-11526-en.html +CVE-2019-11527 - https://security.mioso.com/CVE-2019-11527-en.html +CVE-2019-11528 - https://security.mioso.com/CVE-2019-11528-en.html +CVE-2019-1153 - http://packetstormsecurity.com/files/154098/Microsoft-Font-Subsetting-DLL-FixSbitSubTableFormat1-Out-Of-Bounds-Read.html +CVE-2019-11537 - https://www.exploit-db.com/exploits/46753 +CVE-2019-11537 - https://www.exploit-db.com/exploits/46753/ +CVE-2019-11538 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11539 - http://packetstormsecurity.com/files/154376/Pulse-Secure-8.1R15.1-8.2-8.3-9.0-SSL-VPN-Remote-Code-Execution.html +CVE-2019-11539 - http://packetstormsecurity.com/files/155277/Pulse-Secure-VPN-Arbitrary-Command-Execution.html +CVE-2019-11539 - http://packetstormsecurity.com/files/162092/Pulse-Secure-VPN-Arbitrary-Command-Execution.html +CVE-2019-11539 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11540 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11542 - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ +CVE-2019-11549 - https://gitlab.com/gitlab-org/gitlab-ce/issues/57779 +CVE-2019-11552 - https://bordplate.no/blog/en/post/crashplan-privilege-escalation/ +CVE-2019-11555 - https://usn.ubuntu.com/3969-2/ +CVE-2019-11557 - https://lists.openwall.net/full-disclosure/2019/04/23/1 +CVE-2019-11557 - https://wpvulndb.com/vulnerabilities/9260 +CVE-2019-11559 - http://seclists.org/fulldisclosure/2019/Sep/28 +CVE-2019-11564 - https://www.exploit-db.com/exploits/46771/ +CVE-2019-11565 - http://dumpco.re/bugs/wp-plugin-print-my-blog-ssrf +CVE-2019-11565 - https://wpvulndb.com/vulnerabilities/9263 +CVE-2019-11569 - https://www.exploit-db.com/exploits/46765 +CVE-2019-11580 - http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html +CVE-2019-11590 - http://seclists.org/fulldisclosure/2019/Apr/36 +CVE-2019-11590 - https://lists.openwall.net/full-disclosure/2019/04/05/11 +CVE-2019-11591 - http://seclists.org/fulldisclosure/2019/Apr/37 +CVE-2019-11591 - https://lists.openwall.net/full-disclosure/2019/04/05/12 +CVE-2019-11591 - https://wpvulndb.com/vulnerabilities/9252 +CVE-2019-11593 - https://adblockplus.org/releases/adblock-plus-352-for-chrome-firefox-and-opera-released +CVE-2019-11597 - https://github.com/ImageMagick/ImageMagick/issues/1555 +CVE-2019-11598 - https://github.com/ImageMagick/ImageMagick/issues/1540 +CVE-2019-11599 - http://packetstormsecurity.com/files/152663/Linux-Missing-Lockdown.html +CVE-2019-11599 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-11599 - https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a +CVE-2019-11599 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-11599 - https://usn.ubuntu.com/4115-1/ +CVE-2019-11599 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11599 - https://www.exploit-db.com/exploits/46781/ +CVE-2019-11599 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-11600 - http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html +CVE-2019-11600 - http://seclists.org/fulldisclosure/2019/May/7 +CVE-2019-11600 - https://seclists.org/bugtraq/2019/May/22 +CVE-2019-11604 - http://packetstormsecurity.com/files/153053/Quest-KACE-Systems-Management-Appliance-9.0-Cross-Site-Scripting.html +CVE-2019-11604 - http://seclists.org/fulldisclosure/2019/May/40 +CVE-2019-11604 - https://www.rcesecurity.com/ +CVE-2019-11606 - https://github.com/itodaro/doorGets_cve +CVE-2019-11607 - https://github.com/itodaro/doorGets_cve +CVE-2019-11608 - https://github.com/itodaro/doorGets_cve +CVE-2019-11609 - https://github.com/itodaro/doorGets_cve +CVE-2019-11610 - https://github.com/itodaro/doorGets_cve +CVE-2019-11611 - https://github.com/itodaro/doorGets_cve +CVE-2019-11612 - https://github.com/itodaro/doorGets_cve +CVE-2019-11613 - https://github.com/itodaro/doorGets_cve +CVE-2019-11614 - https://github.com/itodaro/doorGets_cve +CVE-2019-11615 - https://github.com/itodaro/doorGets_cve +CVE-2019-11616 - https://github.com/itodaro/doorGets_cve +CVE-2019-11617 - https://github.com/itodaro/doorGets_cve +CVE-2019-11618 - https://github.com/itodaro/doorGets_cve +CVE-2019-11619 - https://github.com/itodaro/doorGets_cve +CVE-2019-11620 - https://github.com/itodaro/doorGets_cve +CVE-2019-11621 - https://github.com/itodaro/doorGets_cve +CVE-2019-11622 - https://github.com/itodaro/doorGets_cve +CVE-2019-11623 - https://github.com/itodaro/doorGets_cve +CVE-2019-11624 - https://github.com/itodaro/doorGets_cve +CVE-2019-11625 - https://github.com/itodaro/doorGets_cve +CVE-2019-11626 - https://github.com/itodaro/doorGets_cve +CVE-2019-11629 - https://support.sonatype.com/hc/en-us/articles/360022528733-CVE-2019-11629-Nexus-Repository-Manager-2-Cross-Site-Scripting-XSS-2019-05-02 +CVE-2019-11636 - https://github.com/zcash/zcash/issues/3955 +CVE-2019-11636 - https://saplingwoodchipper.github.io +CVE-2019-11637 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils +CVE-2019-11637 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/rec2csv +CVE-2019-11638 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils +CVE-2019-11638 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/rec2csv +CVE-2019-11639 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils +CVE-2019-11639 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/recfix +CVE-2019-11640 - https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils/ +CVE-2019-11640 - https://github.com/TeamSeri0us/pocs/tree/master/recutils/bug-report-recutils/recfix +CVE-2019-11642 - http://seclists.org/fulldisclosure/2019/May/1 +CVE-2019-11643 - http://seclists.org/fulldisclosure/2019/May/2 +CVE-2019-11660 - http://packetstormsecurity.com/files/155076/Micro-Focus-HPE-Data-Protector-SUID-Privilege-Escalation.html +CVE-2019-11682 - https://packetstormsecurity.com/files/152694/MailCarrier-2.51-HELP-Remote-Buffer-Overflow.html +CVE-2019-11686 - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd +CVE-2019-11686 - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-s +CVE-2019-11687 - https://github.com/d00rt/pedicom +CVE-2019-11687 - https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_(DICOM)_file_format_standard_-_Markel_Picado_Ortiz_(d00rt).pdf +CVE-2019-11687 - https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware +CVE-2019-11688 - https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md +CVE-2019-11689 - https://github.com/mikedamm/CVEs/blob/master/CVE-2019-11688.md +CVE-2019-11693 - https://bugzilla.mozilla.org/show_bug.cgi?id=1532525 +CVE-2019-11697 - https://bugzilla.mozilla.org/show_bug.cgi?id=1440079 +CVE-2019-11698 - https://bugzilla.mozilla.org/show_bug.cgi?id=1543191 +CVE-2019-11699 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528939 +CVE-2019-1170 - http://packetstormsecurity.com/files/154192/Microsoft-Windows-SET_REPARSE_POINT_EX-Mount-Point-Security-Feature-Bypass.html +CVE-2019-11700 - https://bugzilla.mozilla.org/show_bug.cgi?id=1549833 +CVE-2019-11701 - https://bugzilla.mozilla.org/show_bug.cgi?id=1518627 +CVE-2019-11703 - https://bugzilla.mozilla.org/show_bug.cgi?id=1553820 +CVE-2019-11707 - https://bugzilla.mozilla.org/show_bug.cgi?id=1544386 +CVE-2019-11708 - http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html +CVE-2019-11712 - https://bugzilla.mozilla.org/show_bug.cgi?id=1543804 +CVE-2019-11715 - https://bugzilla.mozilla.org/show_bug.cgi?id=1555523 +CVE-2019-11720 - https://bugzilla.mozilla.org/show_bug.cgi?id=1556230 +CVE-2019-11725 - https://bugzilla.mozilla.org/show_bug.cgi?id=1483510 +CVE-2019-11730 - https://bugzilla.mozilla.org/show_bug.cgi?id=1558299 +CVE-2019-11736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1551913 +CVE-2019-11736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1552206 +CVE-2019-11737 - https://bugzilla.mozilla.org/show_bug.cgi?id=1388015 +CVE-2019-11738 - https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 +CVE-2019-11739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1571481 +CVE-2019-11739 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11740 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11742 - https://bugzilla.mozilla.org/show_bug.cgi?id=1559715 +CVE-2019-11742 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11743 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11744 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11745 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-11746 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1568397 +CVE-2019-11751 - https://bugzilla.mozilla.org/show_bug.cgi?id=1572838 +CVE-2019-11752 - https://bugzilla.mozilla.org/show_bug.cgi?id=1501152 +CVE-2019-11752 - https://www.mozilla.org/security/advisories/mfsa2019-29/ +CVE-2019-11753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1574980 +CVE-2019-11755 - https://usn.ubuntu.com/4202-1/ +CVE-2019-11756 - https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 +CVE-2019-11759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1577953 +CVE-2019-11765 - https://bugzilla.mozilla.org/show_bug.cgi?id=1562582 +CVE-2019-11769 - https://blog.to.com/advisory-teamviewer-cve-2019-11769-2/ +CVE-2019-11770 - https://github.com/eclipse/buildship/issues/855 +CVE-2019-11783 - https://github.com/odoo/odoo/issues/63708 +CVE-2019-11806 - http://packetstormsecurity.com/files/154128/Open-Xchange-OX-App-Suite-Content-Spoofing-Cross-Site-Scripting.html +CVE-2019-11807 - https://wpvulndb.com/vulnerabilities/9262 +CVE-2019-11810 - https://usn.ubuntu.com/4008-1/ +CVE-2019-11810 - https://usn.ubuntu.com/4115-1/ +CVE-2019-11810 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11815 - http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html +CVE-2019-11815 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-11815 - https://usn.ubuntu.com/4008-1/ +CVE-2019-11815 - https://usn.ubuntu.com/4068-1/ +CVE-2019-11815 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11823 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1051 +CVE-2019-11833 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-11833 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-11833 - https://usn.ubuntu.com/4068-1/ +CVE-2019-11833 - https://usn.ubuntu.com/4076-1/ +CVE-2019-11833 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11834 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11835 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11841 - http://packetstormsecurity.com/files/152840/Go-Cryptography-Libraries-Cleartext-Message-Spoofing.html +CVE-2019-11841 - https://sec-consult.com/ +CVE-2019-11844 - http://packetstormsecurity.com/files/152790/RICOH-SP-4520DN-Printer-HTML-Injection.html +CVE-2019-11845 - http://packetstormsecurity.com/files/152789/RICOH-SP-4510DN-Printer-HTML-Injection.html +CVE-2019-11846 - http://packetstormsecurity.com/files/152788/dotCMS-5.1.1-HTML-Injection.html +CVE-2019-11847 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11848 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11849 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11850 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11852 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11853 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11855 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11856 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11857 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11858 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11859 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2020-004/ +CVE-2019-11869 - https://wpvulndb.com/vulnerabilities/9254 +CVE-2019-11869 - https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild/ +CVE-2019-11871 - https://wpvulndb.com/vulnerabilities/9273 +CVE-2019-11872 - https://wpvulndb.com/vulnerabilities/9326 +CVE-2019-11873 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 +CVE-2019-11875 - http://packetstormsecurity.com/files/153007/Blue-Prism-Robotic-Process-Automation-RPA-Privilege-Escalation.html +CVE-2019-11875 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-002.txt +CVE-2019-11877 - https://medium.com/@igor.lrgomes/cve-2019-11877-credentials-stealing-through-xss-on-pix-link-repeater-9a98c344f58e +CVE-2019-11878 - https://www.youtube.com/watch?v=SnyPJtDDMFQ +CVE-2019-11880 - http://packetstormsecurity.com/files/152910/CommSy-8.6.5-SQL-Injection.html +CVE-2019-11881 - https://github.com/MauroEldritch/VanCleef +CVE-2019-11884 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-11884 - https://usn.ubuntu.com/4068-1/ +CVE-2019-11884 - https://usn.ubuntu.com/4076-1/ +CVE-2019-11884 - https://usn.ubuntu.com/4118-1/ +CVE-2019-11886 - https://wpvulndb.com/vulnerabilities/9256 +CVE-2019-11886 - https://www.wordfence.com/blog/2019/04/zero-day-vulnerability-in-yellow-pencil-visual-theme-customizer-exploited-in-the-wild/ +CVE-2019-11889 - http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html +CVE-2019-11889 - http://seclists.org/fulldisclosure/2019/Jul/8 +CVE-2019-11890 - http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html +CVE-2019-11890 - http://seclists.org/fulldisclosure/2019/Jul/8 +CVE-2019-11922 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-11924 - https://www.facebook.com/security/advisories/cve-2019-11924 +CVE-2019-11931 - https://www.facebook.com/security/advisories/cve-2019-11931 +CVE-2019-11932 - http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html +CVE-2019-11932 - http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html +CVE-2019-11932 - https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263 +CVE-2019-11941 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11942 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11943 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11944 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11945 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11946 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11947 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11948 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11949 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11950 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11951 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11952 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11953 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11954 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11955 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11956 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11957 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11958 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11959 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11960 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11961 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11962 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11963 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11964 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11965 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11966 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11967 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11968 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11969 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11970 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11971 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11972 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11973 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11974 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11975 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11976 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11977 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11978 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11979 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11980 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11982 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us +CVE-2019-11983 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03917en_us +CVE-2019-11984 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11985 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-11986 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-12041 - https://github.com/jonschlinkert/remarkable/issues/331 +CVE-2019-12042 - https://github.com/SouhailHammou/Panda-Antivirus-LPE +CVE-2019-12046 - https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742 +CVE-2019-12068 - https://usn.ubuntu.com/4191-1/ +CVE-2019-12086 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-12086 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-12086 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12086 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12086 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-12087 - https://github.com/fs0c131y/SamsungLocker +CVE-2019-12094 - https://bugs.horde.org/ticket/14926 +CVE-2019-12094 - https://cxsecurity.com/issue/WLB-2019050199 +CVE-2019-12094 - https://packetstormsecurity.com/files/152975/Horde-Webmail-5.2.22-XSS-CSRF-SQL-Injection-Code-Execution.html +CVE-2019-12094 - https://www.exploit-db.com/exploits/46903 +CVE-2019-12095 - https://bugs.horde.org/ticket/14926 +CVE-2019-12095 - https://cxsecurity.com/issue/WLB-2019050199 +CVE-2019-12095 - https://packetstormsecurity.com/files/152975/Horde-Webmail-5.2.22-XSS-CSRF-SQL-Injection-Code-Execution.html +CVE-2019-12095 - https://www.exploit-db.com/exploits/46903 +CVE-2019-12098 - https://seclists.org/bugtraq/2019/Jun/1 +CVE-2019-12099 - https://www.exploit-db.com/exploits/46839 +CVE-2019-12099 - https://www.pentest.com.tr/exploits/PHP-Fusion-9-03-00-Edit-Profile-Remote-Code-Execution.html +CVE-2019-12102 - https://devnet.kentico.com/download/hotfixes +CVE-2019-12106 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp +CVE-2019-12107 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp +CVE-2019-12108 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp +CVE-2019-12109 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp +CVE-2019-12110 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp +CVE-2019-12111 - https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp +CVE-2019-12133 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-007.md +CVE-2019-12134 - https://sinfosec757.blogspot.com/2019/06/exploit-title-workday-32-csv-injection.html +CVE-2019-12137 - http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html +CVE-2019-12137 - https://github.com/typora/typora-issues/issues/2505 +CVE-2019-12138 - https://github.com/MacDownApp/macdown/issues/1076 +CVE-2019-12147 - http://packetstormsecurity.com/files/154914/Sangoma-SBC-2.3.23-119-GA-Unauthenticated-User-Creation.html +CVE-2019-12147 - http://seclists.org/fulldisclosure/2019/Oct/40 +CVE-2019-12148 - http://packetstormsecurity.com/files/154915/Sangoma-SBC-2.3.23-119-GA-Authentication-Bypass.html +CVE-2019-12148 - http://seclists.org/fulldisclosure/2019/Oct/41 +CVE-2019-12155 - https://usn.ubuntu.com/4191-1/ +CVE-2019-12162 - https://support.upwork.com/hc/en-us/categories/360001180954 +CVE-2019-12163 - http://packetstormsecurity.com/files/152964/GAT-Ship-Web-Module-1.30-Information-Disclosure.html +CVE-2019-12163 - http://seclists.org/fulldisclosure/2019/May/32 +CVE-2019-12163 - https://seclists.org/fulldisclosure/2019/May/29 +CVE-2019-12164 - https://github.com/status-im/react-native-desktop/pull/475/commits/f6945f1e4b157c69e414cd94fe5cde1876aabcc1 +CVE-2019-12168 - https://medium.com/@bertinjoseb/four-faith-industrial-routers-command-injection-rce-reverse-shell-121c4dedb0d8 +CVE-2019-12169 - http://packetstormsecurity.com/files/153870/ATutor-2.2.4-Arbitrary-File-Upload-Command-Execution.html +CVE-2019-12169 - http://packetstormsecurity.com/files/158246/ATutor-2.2.4-Directory-Traversal-Remote-Code-Execution.html +CVE-2019-12169 - https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit +CVE-2019-12170 - http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html +CVE-2019-12170 - https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File +CVE-2019-12171 - https://drive.google.com/open?id=1msz6pb08crPC0VT7s_Z_KTsKm9CbLJEXNsmRwzoNLy8 +CVE-2019-12172 - https://github.com/typora/typora-issues/issues/2166 +CVE-2019-12173 - https://github.com/MacDownApp/macdown/issues/1050 +CVE-2019-12176 - https://huskersec.com/privilege-escalation-via-htc-viveport-desktop-c93471ff87c8 +CVE-2019-12177 - https://huskersec.com/privilege-escalation-via-htc-viveport-desktop-c93471ff87c8 +CVE-2019-12177 - https://posts.specterops.io/razer-synapse-3-elevation-of-privilege-6d2802bd0585 +CVE-2019-12180 - https://lab.mediaservice.net/advisory/2020-04-readyapi-soapui.txt +CVE-2019-12181 - http://packetstormsecurity.com/files/153333/Serv-U-FTP-Server-15.1.6-Privilege-Escalation.html +CVE-2019-12181 - http://packetstormsecurity.com/files/153505/Serv-U-FTP-Server-prepareinstallation-Privilege-Escalation.html +CVE-2019-12182 - https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ +CVE-2019-12183 - https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ +CVE-2019-12189 - http://packetstormsecurity.com/files/153028/Zoho-ManageEngine-ServiceDesk-Plus-9.3-Cross-Site-Scripting.html +CVE-2019-12195 - http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripting.html +CVE-2019-12206 - https://github.com/nginx/njs/issues/162 +CVE-2019-12215 - https://github.com/matomo-org/matomo/issues/14464 +CVE-2019-12216 - https://bugzilla.libsdl.org/show_bug.cgi?id=4619 +CVE-2019-12217 - https://bugzilla.libsdl.org/show_bug.cgi?id=4626 +CVE-2019-12218 - https://bugzilla.libsdl.org/show_bug.cgi?id=4620 +CVE-2019-12219 - https://bugzilla.libsdl.org/show_bug.cgi?id=4625 +CVE-2019-12220 - https://bugzilla.libsdl.org/show_bug.cgi?id=4627 +CVE-2019-12221 - https://bugzilla.libsdl.org/show_bug.cgi?id=4628 +CVE-2019-12222 - https://bugzilla.libsdl.org/show_bug.cgi?id=4621 +CVE-2019-12223 - https://medium.com/@noe.dustin/samsung-webviewer-remote-dos-vulberability-cve-2019-12223-5f4afbc83fbd +CVE-2019-12239 - https://wpvulndb.com/vulnerabilities/9284 +CVE-2019-12240 - https://wpvulndb.com/vulnerabilities/9291 +CVE-2019-12241 - https://wpvulndb.com/vulnerabilities/9292 +CVE-2019-12252 - http://packetstormsecurity.com/files/153029/Zoho-ManageEngine-ServiceDesk-Plus-Privilege-Escalation.html +CVE-2019-12255 - http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html +CVE-2019-12260 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-12260 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12261 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12266 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-wyze-cam-iot-device/ +CVE-2019-12270 - https://packetstormsecurity.com/files/150125/Brava-Enterprise-Server-16.4-Information-Disclosure.html +CVE-2019-12271 - http://packetstormsecurity.com/files/155355/Centraleyezer-Shell-Upload.html +CVE-2019-12276 - http://packetstormsecurity.com/files/153373/GrandNode-4.40-Path-Traversal-File-Download.html +CVE-2019-12279 - http://packetstormsecurity.com/files/153040/Nagios-XI-5.6.1-SQL-Injection.html +CVE-2019-12279 - https://github.com/JameelNabbo/exploits/blob/master/nagiosxi%20username%20sql%20injection.txt +CVE-2019-12280 - http://packetstormsecurity.com/files/153374/PC-Doctor-Toolbox-DLL-Hijacking.html +CVE-2019-12280 - https://safebreach.com/Press-Post/SafeBreach-Identifies-Serious-Vulnerability-In-PC-Doctor-Software +CVE-2019-12288 - http://f1security.co.kr/cve/cve_190314.htm +CVE-2019-12289 - http://f1security.co.kr/cve/cve_190314.htm +CVE-2019-12299 - https://medium.com/insidersec0x42/centraleyezer-stored-xss-using-html-entities-cve-2019-12299-5c295ae54ef +CVE-2019-1230 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1230 +CVE-2019-12301 - https://jira.percona.com/browse/PS-5640 +CVE-2019-12301 - https://www.percona.com/blog/2019/05/17/percona-server-for-mysql-5-6-44-85-0-is-now-available/ +CVE-2019-12311 - https://medium.com/insidersec0x42/centraleyezer-unrestricted-file-upload-cve-2019-12311-7cad12e95165 +CVE-2019-12312 - https://github.com/libreswan/libreswan/issues/246 +CVE-2019-12314 - http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html +CVE-2019-12314 - https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt +CVE-2019-12323 - http://hyp3rlinx.altervista.org +CVE-2019-12323 - http://seclists.org/fulldisclosure/2019/Jun/28 +CVE-2019-12331 - https://herolab.usd.de/security-advisories/usd-2019-0046/ +CVE-2019-12345 - https://wpvulndb.com/vulnerabilities/9289 +CVE-2019-12346 - https://wpvulndb.com/vulnerabilities/9397 +CVE-2019-12346 - https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss/ +CVE-2019-12347 - http://packetstormsecurity.com/files/153112/pfSense-2.4.4-p3-Cross-Site-Scripting.html +CVE-2019-12347 - https://redmine.pfsense.org/issues/9554#change-40729 +CVE-2019-12348 - https://github.com/cby234/zzcms/issues/1 +CVE-2019-12349 - https://github.com/cby234/zzcms/issues/2 +CVE-2019-12350 - https://github.com/cby234/zzcms/issues/4 +CVE-2019-12351 - https://github.com/cby234/zzcms/issues/3 +CVE-2019-12352 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12353 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12354 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12355 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12356 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12357 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12358 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12359 - https://github.com/cby234/zzcms/issues/5 +CVE-2019-12363 - https://seekurity.com/blog/advisories/mybb-two-factor-authentication-extension-vulnerabilities/ +CVE-2019-12365 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ +CVE-2019-12366 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ +CVE-2019-12367 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ +CVE-2019-12368 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ +CVE-2019-12369 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ +CVE-2019-12370 - https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/ +CVE-2019-12372 - http://packetstormsecurity.com/files/153084/Petraware-pTransformer-ADC-SQL-Injection.html +CVE-2019-12372 - https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html +CVE-2019-12380 - https://usn.ubuntu.com/4414-1/ +CVE-2019-12382 - https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382 +CVE-2019-12384 - https://doyensec.com/research.html +CVE-2019-12384 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12384 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-12384 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12384 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12384 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-12385 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ +CVE-2019-12386 - https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/ +CVE-2019-12387 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12388 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12389 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12390 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12391 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12392 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12393 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12394 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-12395 - https://github.com/webbukkit/dynmap/issues/2474 +CVE-2019-12399 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-12399 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12399 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-12399 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-12400 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-12401 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12401-XML%20Bomb-Apache%20Solr +CVE-2019-12402 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12402 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-12406 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12406 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12406 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-12409 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12409-RCE%20Vulnerability%20Due%20to%20Bad%20Defalut%20Config-Apache%20Solr +CVE-2019-1241 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12415 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12415 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-12418 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12419 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12419 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12419 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-12419 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12423 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-12423 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12423 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12439 - https://github.com/projectatomic/bubblewrap/issues/304 +CVE-2019-12457 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ +CVE-2019-12457 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 +CVE-2019-12458 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ +CVE-2019-12458 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 +CVE-2019-12459 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ +CVE-2019-12459 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 +CVE-2019-12460 - http://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.html +CVE-2019-12460 - https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/ +CVE-2019-12461 - http://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.html +CVE-2019-12461 - https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/ +CVE-2019-12476 - https://github.com/0katz/CVE-2019-12476 +CVE-2019-12477 - http://packetstormsecurity.com/files/153191/Supra-Smart-Cloud-TV-Remote-File-Inclusion.html +CVE-2019-12479 - https://security401.com/twentytwenty-storage-path-traversal/ +CVE-2019-12480 - http://packetstormsecurity.com/files/153716/BACnet-Stack-0.8.6-Denial-Of-Service.html +CVE-2019-12480 - https://1modm.github.io/CVE-2019-12480.html +CVE-2019-12481 - https://github.com/gpac/gpac/issues/1249 +CVE-2019-12482 - https://github.com/gpac/gpac/issues/1249 +CVE-2019-12483 - https://github.com/gpac/gpac/issues/1249 +CVE-2019-12489 - https://www.exploit-db.com/exploits/47654 +CVE-2019-12490 - https://www.youtube.com/watch?v=gCVeFoxZ1DI +CVE-2019-12499 - https://github.com/netblue30/firejail/issues/2401 +CVE-2019-12500 - https://blog.zimperium.com/dont-give-me-a-brake-xiaomi-scooter-hack-enables-dangerous-accelerations-and-stops-for-unsuspecting-riders/ +CVE-2019-12502 - https://gist.github.com/llandeilocymro/55a61e3730cdef56ab5806a677ba0891 +CVE-2019-12503 - http://packetstormsecurity.com/files/155503/Inateck-BCST-60-Barcode-Scanner-Keystroke-Injection.html +CVE-2019-12503 - http://seclists.org/fulldisclosure/2019/Nov/30 +CVE-2019-12503 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-027.txt +CVE-2019-12504 - http://packetstormsecurity.com/files/153185/Inateck-2.4-GHz-Wearable-Wireless-Presenter-WP2002-Keystroke-Injection.html +CVE-2019-12504 - http://seclists.org/fulldisclosure/2019/Jun/14 +CVE-2019-12504 - https://seclists.org/bugtraq/2019/Jun/3 +CVE-2019-12504 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-008.txt +CVE-2019-12505 - http://packetstormsecurity.com/files/153184/Inateck-2.4-GHz-Wireless-Presenter-WP1001-Keystroke-Injection.html +CVE-2019-12505 - http://seclists.org/fulldisclosure/2019/Jun/4 +CVE-2019-12505 - https://seclists.org/bugtraq/2019/Jun/2 +CVE-2019-12505 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-007.txt +CVE-2019-12506 - http://packetstormsecurity.com/files/153186/Logitech-R700-Laser-Presentation-Remote-Keystroke-Injection.html +CVE-2019-12506 - http://seclists.org/fulldisclosure/2019/Jun/15 +CVE-2019-12506 - https://seclists.org/bugtraq/2019/Jun/4 +CVE-2019-12506 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-015.txt +CVE-2019-12510 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ +CVE-2019-12511 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ +CVE-2019-12512 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ +CVE-2019-12513 - https://www.ise.io/casestudies/sohopelessly-broken-2-0/ +CVE-2019-12516 - http://packetstormsecurity.com/files/154440/WordPress-SlickQuiz-1.3.7.1-SQL-Injection.html +CVE-2019-12517 - http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-Site-Scripting.html +CVE-2019-12518 - http://packetstormsecurity.com/files/156335/Anviz-CrossChex-Buffer-Overflow.html +CVE-2019-12518 - https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html +CVE-2019-1253 - http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html +CVE-2019-12549 - https://cert.vde.com/en-us/advisories/vde-2019-013 +CVE-2019-12550 - https://cert.vde.com/en-us/advisories/vde-2019-013 +CVE-2019-12551 - https://ereisr00.github.io/ +CVE-2019-12551 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor +CVE-2019-12552 - https://ereisr00.github.io/ +CVE-2019-12552 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor +CVE-2019-12553 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor/strcat_heap_overflow.bt +CVE-2019-12554 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor/WSubStr.bt +CVE-2019-12555 - https://github.com/ereisr00/bagofbugz/blob/master/010Editor/SubStr.bt +CVE-2019-12562 - http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html +CVE-2019-12562 - https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/ +CVE-2019-12564 - https://github.com/srsec/-srsec-/issues/1 +CVE-2019-12569 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-006.md +CVE-2019-12570 - https://wpvulndb.com/vulnerabilities/9964 +CVE-2019-12573 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12573.txt +CVE-2019-12574 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12574.txt +CVE-2019-12576 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12576.txt +CVE-2019-12577 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12577.txt +CVE-2019-12581 - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ +CVE-2019-12583 - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ +CVE-2019-12586 - https://github.com/Matheus-Garbelini/esp32_esp8266_attacks +CVE-2019-12586 - https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ +CVE-2019-12587 - https://github.com/Matheus-Garbelini/esp32_esp8266_attacks +CVE-2019-12587 - https://matheus-garbelini.github.io/home/post/zero-pmk-installation/ +CVE-2019-12588 - https://github.com/Matheus-Garbelini/esp32_esp8266_attacks +CVE-2019-12588 - https://matheus-garbelini.github.io/home/post/esp8266-beacon-frame-crash/ +CVE-2019-12589 - https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134 +CVE-2019-12589 - https://github.com/netblue30/firejail/issues/2718 +CVE-2019-12589 - https://github.com/netblue30/firejail/releases/tag/0.9.60 +CVE-2019-12592 - https://www.techrepublic.com/article/evernote-chrome-extension-vulnerability-allowed-attackers-to-steal-4-7m-users-data/ +CVE-2019-12593 - http://packetstormsecurity.com/files/153161/IceWarp-10.4.4-Local-File-Inclusion.html +CVE-2019-12593 - https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt +CVE-2019-12614 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-12614 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-12614 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-12616 - http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html +CVE-2019-1262 - http://packetstormsecurity.com/files/154591/Microsoft-SharePoint-2013-SP1-Cross-Site-Scripting.html +CVE-2019-12643 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass +CVE-2019-12708 - https://www.tenable.com/security/research/tra-2019-44 +CVE-2019-12719 - https://drive.google.com/open?id=1Khz7x6b32g7JYCyA6ZQ6NGEc4I0yFA45 +CVE-2019-12719 - https://www.exploit-db.com/exploits/47541 +CVE-2019-12720 - https://drive.google.com/file/d/1QYgj4FU0MjSIhgXwddg4L5no9KYn8E9v/view +CVE-2019-12720 - https://www.exploit-db.com/exploits/47542 +CVE-2019-12725 - http://packetstormsecurity.com/files/160211/ZeroShell-3.9.0-Remote-Command-Execution.html +CVE-2019-12725 - http://packetstormsecurity.com/files/162561/ZeroShell-3.9.0-Remote-Command-Execution.html +CVE-2019-12725 - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt +CVE-2019-12727 - https://github.com/X-C3LL/PoC-CVEs/blob/master/Aircam-DoS/Aircam-DoS.py +CVE-2019-12728 - https://github.com/grails/grails-core/issues/11250 +CVE-2019-12730 - https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n4.1.4 +CVE-2019-12731 - https://www.detack.de/en/cve-2019-12731 +CVE-2019-12733 - http://packetstormsecurity.com/files/155585/SiteVision-4.x-5.x-Remote-Code-Execution.html +CVE-2019-12733 - http://seclists.org/fulldisclosure/2019/Dec/12 +CVE-2019-12734 - http://packetstormsecurity.com/files/155584/SiteVision-4.x-5.x-Insufficient-Module-Access-Control.html +CVE-2019-12734 - http://seclists.org/fulldisclosure/2019/Dec/12 +CVE-2019-12735 - https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md +CVE-2019-12735 - https://seclists.org/bugtraq/2019/Jun/33 +CVE-2019-12735 - https://usn.ubuntu.com/4016-1/ +CVE-2019-12739 - https://www.secsignal.org/news/a-tale-of-rce-nextcloud-extract-app/ +CVE-2019-12744 - http://packetstormsecurity.com/files/153383/SeedDMS-Remote-Command-Execution.html +CVE-2019-12744 - http://packetstormsecurity.com/files/163283/Seeddms-5.1.10-Remote-Command-Execution.html +CVE-2019-12745 - http://packetstormsecurity.com/files/153382/SeedDMS-out.UsrMgr.php-Cross-Site-Scripting.html +CVE-2019-12750 - http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html +CVE-2019-12758 - https://safebreach.com/Post/Symantec-Endpoint-Protection-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-12758 +CVE-2019-12760 - https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7 +CVE-2019-12760 - https://github.com/davidhalter/parso/issues/75 +CVE-2019-12761 - https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba +CVE-2019-12761 - https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562 +CVE-2019-12762 - https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/ +CVE-2019-12762 - https://medium.com/@juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607 +CVE-2019-12769 - https://medium.com/@clod81/cve-2019-12769-solarwinds-serv-u-managed-file-transfer-mft-web-client-15-1-6-a2dab98d668d +CVE-2019-12771 - https://github.com/Thinstation/thinstation/issues/427 +CVE-2019-12773 - http://packetstormsecurity.com/files/158411/Verint-Impact-360-15.1-Script-Insertion-HTML-Injection.html +CVE-2019-12773 - https://seclists.org/fulldisclosure/2020/Jul/15 +CVE-2019-12779 - https://github.com/ClusterLabs/libqb/issues/338 +CVE-2019-12780 - https://www.exploit-db.com/exploits/46436 +CVE-2019-12783 - http://packetstormsecurity.com/files/158412/Verint-Impact-360-15.1-Open-Redirect.html +CVE-2019-12783 - https://seclists.org/fulldisclosure/2020/Jul/16 +CVE-2019-12784 - http://packetstormsecurity.com/files/158413/Verint-Impact-360-15.1-Cross-Site-Request-Forgery.html +CVE-2019-12784 - https://seclists.org/fulldisclosure/2020/Jul/17 +CVE-2019-12786 - https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-protected.pdf +CVE-2019-12787 - https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-2-protected.pdf +CVE-2019-12788 - http://packetstormsecurity.com/files/153249/ProShow-9.0.3797-Privilege-Escalation.html +CVE-2019-12789 - http://seclists.org/fulldisclosure/2019/Jun/10 +CVE-2019-12801 - http://packetstormsecurity.com/files/153384/SeedDMS-out.GroupMgr.php-Cross-Site-Scripting.html +CVE-2019-12813 - https://github.com/sungjungk/fp-scanner-hacking +CVE-2019-12813 - https://www.youtube.com/watch?v=Grirez2xeas +CVE-2019-12813 - https://www.youtube.com/watch?v=wEXJDyEOatM +CVE-2019-12814 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-12814 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12814 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12814 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-12815 - https://seclists.org/bugtraq/2019/Aug/3 +CVE-2019-12816 - https://seclists.org/bugtraq/2019/Jun/23 +CVE-2019-12817 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15 +CVE-2019-12817 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc +CVE-2019-12818 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-12818 - https://usn.ubuntu.com/4118-1/ +CVE-2019-12819 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-12819 - https://usn.ubuntu.com/4118-1/ +CVE-2019-12826 - https://wpvulndb.com/vulnerabilities/9403 +CVE-2019-12826 - https://wpvulndb.com/vulnerabilities/9413 +CVE-2019-12828 - http://packetstormsecurity.com/files/153385/EA-Origin-Remote-Code-Execution.html +CVE-2019-12828 - https://www.bleepingcomputer.com/news/security/qt5-based-gui-apps-susceptible-to-remote-code-execution/ +CVE-2019-12828 - https://www.youtube.com/watch?v=E9vCx9KsF3c +CVE-2019-12834 - https://github.com/miruser/Roche-CVEs/blob/master/CVE-2019-12834.md +CVE-2019-12836 - https://github.com/9lyph/CVE-2019-12836/blob/master/README.md +CVE-2019-12840 - http://packetstormsecurity.com/files/153372/Webmin-1.910-Remote-Command-Execution.html +CVE-2019-12840 - https://pentest.com.tr/exploits/Webmin-1910-Package-Updates-Remote-Command-Execution.html +CVE-2019-12840 - https://www.exploit-db.com/exploits/46984 +CVE-2019-12855 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-12863 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-12863-stored-html-injection-vulnerability-in-solarwinds-orion-platform-2018-4-hf3-npm-12-4-netpath-1-1-4/ +CVE-2019-12863 - https://www.solarwinds.com/network-performance-monitor +CVE-2019-12864 - https://www.esecforte.com/network-performance-monitor-india-esec-forte-technologies/ +CVE-2019-12864 - https://www.solarwinds.com/network-performance-monitor +CVE-2019-12868 - https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/ +CVE-2019-12869 - https://cert.vde.com/en-us/advisories/vde-2019-014 +CVE-2019-12870 - https://cert.vde.com/en-us/advisories/vde-2019-014 +CVE-2019-12871 - https://cert.vde.com/en-us/advisories/vde-2019-014 +CVE-2019-12880 - http://packetstormsecurity.com/files/153405/Quarking-Password-Manager-3.1.84-Clickjacking.html +CVE-2019-12890 - https://www.exploit-db.com/exploits/46992 +CVE-2019-12890 - https://www.youtube.com/watch?v=MK9AvoJDtxY +CVE-2019-12893 - https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html +CVE-2019-12894 - https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html +CVE-2019-12895 - https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html +CVE-2019-12896 - https://code610.blogspot.com/2019/05/crashing-edraw-max.html +CVE-2019-12897 - https://code610.blogspot.com/2019/05/crashing-edraw-max.html +CVE-2019-12898 - https://code610.blogspot.com/2019/05/crashing-devicenet-builder.html +CVE-2019-12899 - https://code610.blogspot.com/2019/05/crashing-devicenet-builder.html +CVE-2019-12900 - http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html +CVE-2019-12900 - http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html +CVE-2019-12900 - https://seclists.org/bugtraq/2019/Aug/4 +CVE-2019-12900 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-12904 - https://dev.gnupg.org/T4541 +CVE-2019-12905 - http://packetstormsecurity.com/files/158173/FileRun-2019.05.21-Cross-Site-Scripting.html +CVE-2019-12905 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/ +CVE-2019-12905 - https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 +CVE-2019-12919 - https://www.exploit-db.com/exploits/46993 +CVE-2019-12920 - https://www.exploit-db.com/exploits/46993 +CVE-2019-12921 - https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md +CVE-2019-12922 - http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html +CVE-2019-12922 - http://seclists.org/fulldisclosure/2019/Sep/23 +CVE-2019-12922 - https://www.exploit-db.com/exploits/47385 +CVE-2019-12934 - https://zeroauth.ltd/blog/2019/07/17/cve-2019-12934-wp-code-highlightjs-wordpress-plugin-csrf-leads-to-blog-wide-injected-script-html/ +CVE-2019-12935 - http://packetstormsecurity.com/files/153145/Shopware-5.5.6-Cross-Site-Scripting.html +CVE-2019-12938 - https://bitbucket.org/analogic/mailserver/issues/665/posteio-logs-leak +CVE-2019-12942 - https://www.kth.se/polopoly_fs/1.923565.1568098364!/Vulnerability_Report_TTLock_State_Consistency.pdf +CVE-2019-12943 - https://www.kth.se/polopoly_fs/1.923564.1568098316!/Vulnerability_Report_TTLock_Password_Reset.pdf +CVE-2019-12944 - https://www.kth.se/polopoly_fs/1.931930.1571073241!/Vulnerability_Report_Glue_State_Consistency.pdf +CVE-2019-12949 - https://github.com/tarantula-team/CVE-2019-12949 +CVE-2019-12954 - https://www.esecforte.com/cve-2019-12954-solarwinds-network-performance-monitor-orion-platform-2018-npm-12-3-netpath-1-1-3-vulnerable-for-stored-xss/ +CVE-2019-12962 - http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html +CVE-2019-12966 - https://github.com/zxlie/FeHelper/issues/63 +CVE-2019-12967 - https://securiteam.io/2019/10/20/cve-2019-12967-moolticute-improper-access-control/ +CVE-2019-12970 - http://packetstormsecurity.com/files/153495/SquirrelMail-1.4.22-Cross-Site-Scripting.html +CVE-2019-12970 - https://seclists.org/bugtraq/2019/Jul/0 +CVE-2019-12970 - https://seclists.org/bugtraq/2019/Jul/50 +CVE-2019-12970 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-016.txt +CVE-2019-12971 - https://seclists.org/bugtraq/2019/Jul/6 +CVE-2019-12971 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-017.txt +CVE-2019-12972 - https://sourceware.org/bugzilla/show_bug.cgi?id=24689 +CVE-2019-12973 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-12973 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-12984 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-12984 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 +CVE-2019-12984 - https://usn.ubuntu.com/4118-1/ +CVE-2019-12985 - https://www.tenable.com/security/research/tra-2019-31 +CVE-2019-12986 - https://www.tenable.com/security/research/tra-2019-31 +CVE-2019-12987 - https://www.tenable.com/security/research/tra-2019-31 +CVE-2019-12988 - https://www.tenable.com/security/research/tra-2019-31 +CVE-2019-12989 - http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html +CVE-2019-12989 - https://www.tenable.com/security/research/tra-2019-32 +CVE-2019-12990 - https://www.tenable.com/security/research/tra-2019-31 +CVE-2019-12991 - http://packetstormsecurity.com/files/153638/Citrix-SD-WAN-Appliance-10.2.2-Authentication-Bypass-Remote-Command-Execution.html +CVE-2019-12991 - https://www.tenable.com/security/research/tra-2019-32 +CVE-2019-12992 - https://www.tenable.com/security/research/tra-2019-31 +CVE-2019-12997 - https://github.com/icon-project/loopchain/issues/231 +CVE-2019-13021 - https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ +CVE-2019-13022 - https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ +CVE-2019-13023 - https://labs.nettitude.com/blog/cve-2019-13021-22-23-jetselect-network-segregation-application/ +CVE-2019-13024 - http://packetstormsecurity.com/files/153504/Centreon-19.04-Remote-Code-Execution.html +CVE-2019-13025 - https://xitan.me/posts/connect-box-ch7465lg-rce/ +CVE-2019-13029 - http://packetstormsecurity.com/files/153691/REDCap-Cross-Site-Scripting.html +CVE-2019-13030 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-06-29-CVE-2019-13030.md +CVE-2019-13035 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-008.md +CVE-2019-13038 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-13045 - http://packetstormsecurity.com/files/153480/Slackware-Security-Advisory-irssi-Updates.html +CVE-2019-13045 - https://seclists.org/bugtraq/2019/Jun/41 +CVE-2019-13050 - https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f +CVE-2019-13052 - https://www.youtube.com/watch?v=GRJ7i2J_Y80 +CVE-2019-13053 - https://www.youtube.com/watch?v=EksyCO0DzYs +CVE-2019-13055 - https://www.youtube.com/watch?v=5z_PEZ5PyeA +CVE-2019-13056 - http://packetstormsecurity.com/files/153492/CyberPanel-1.8.4-Cross-Site-Request-Forgery.html +CVE-2019-13057 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-13057 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-13057 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-13063 - https://www.exploit-db.com/exploits/47062 +CVE-2019-13066 - https://packetstormsecurity.com/files/154985/Sahi-Pro-8.x-Cross-Site-Scripting.html +CVE-2019-13068 - http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html +CVE-2019-13069 - https://www.fobz.net/adv/ag47ex/info.html +CVE-2019-13070 - https://www.exploit-db.com/exploits/47059 +CVE-2019-13071 - http://packetstormsecurity.com/files/153581/PowerPanel-Business-Edition-3.4.0-Cross-Site-Request-Forgery.html +CVE-2019-13072 - https://www.exploit-db.com/exploits/47060 +CVE-2019-13075 - https://hackerone.com/reports/588239 +CVE-2019-13096 - https://pastebin.com/raw/08REmV1X +CVE-2019-13096 - https://pastebin.com/raw/J9B8Lh0j +CVE-2019-13097 - https://pastebin.com/WkkGk0tw +CVE-2019-13098 - https://pastebin.com/a5VhaxYn +CVE-2019-13098 - https://pastebin.com/raw/rVGbwSw0 +CVE-2019-13099 - https://pastebin.com/SgVPb7Lb +CVE-2019-13100 - https://pastebin.com/Gdd0Shgr +CVE-2019-13101 - http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html +CVE-2019-13103 - https://github.com/u-boot/u-boot/commits/master +CVE-2019-13104 - https://github.com/u-boot/u-boot/commits/master +CVE-2019-13105 - https://github.com/u-boot/u-boot/commits/master +CVE-2019-13106 - https://github.com/u-boot/u-boot/commits/master +CVE-2019-13108 - https://github.com/Exiv2/exiv2/issues/789 +CVE-2019-13109 - https://github.com/Exiv2/exiv2/issues/790 +CVE-2019-13110 - https://github.com/Exiv2/exiv2/issues/843 +CVE-2019-13111 - https://github.com/Exiv2/exiv2/issues/791 +CVE-2019-13112 - https://github.com/Exiv2/exiv2/issues/845 +CVE-2019-13113 - https://github.com/Exiv2/exiv2/issues/841 +CVE-2019-13115 - http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html +CVE-2019-13117 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-13118 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-13127 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-032.txt +CVE-2019-13131 - https://www.exploit-db.com/exploits/47030 +CVE-2019-13132 - https://github.com/zeromq/libzmq/issues/3558 +CVE-2019-13132 - https://usn.ubuntu.com/4050-1/ +CVE-2019-13140 - http://packetstormsecurity.com/files/154494/Inteno-IOPSYS-Gateway-3DES-Key-Extraction-Improper-Access.html +CVE-2019-13140 - https://www.exploit-db.com/docs/47397 +CVE-2019-13140 - https://www.exploit-db.com/exploits/47390 +CVE-2019-13143 - http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure/ +CVE-2019-13147 - https://github.com/mpruett/audiofile/issues/54 +CVE-2019-13164 - https://usn.ubuntu.com/4191-1/ +CVE-2019-13181 - http://packetstormsecurity.com/files/155673/Serv-U-FTP-Server-15.1.7-CSV-Injection.html +CVE-2019-13181 - http://seclists.org/fulldisclosure/2019/Dec/33 +CVE-2019-13182 - http://packetstormsecurity.com/files/155672/Serv-U-FTP-Server-15.1.7-Persistent-Cross-Site-Scripting.html +CVE-2019-13182 - http://seclists.org/fulldisclosure/2019/Dec/32 +CVE-2019-13183 - https://discuss.flarum.org/d/20606-flarum-0-1-0-beta-9-released +CVE-2019-13186 - https://github.com/bg5sbk/MiniCMS/issues/31 +CVE-2019-13208 - https://versprite.com/blog/security-research/windows-registry/ +CVE-2019-1322 - http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html +CVE-2019-13226 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 +CVE-2019-13227 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 +CVE-2019-13228 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 +CVE-2019-13229 - https://bugzilla.suse.com/show_bug.cgi?id=1130388 +CVE-2019-13233 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html +CVE-2019-13233 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 +CVE-2019-13233 - https://usn.ubuntu.com/4118-1/ +CVE-2019-13234 - http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html +CVE-2019-13235 - http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html +CVE-2019-13236 - http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html +CVE-2019-13237 - http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html +CVE-2019-13241 - https://github.com/Sigil-Ebook/flightcrew/issues/52 +CVE-2019-13242 - https://github.com/apriorit/pentesting/blob/master/bugs/irfanview/0x0000000000013a98.md +CVE-2019-13272 - http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html +CVE-2019-13272 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-13272 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-13272 - http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html +CVE-2019-13272 - http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html +CVE-2019-13272 - http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html +CVE-2019-13272 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 +CVE-2019-13272 - https://usn.ubuntu.com/4118-1/ +CVE-2019-13275 - https://wpvulndb.com/vulnerabilities/9412 +CVE-2019-13285 - https://www.esecforte.com/endpoint-protector-india-cososys-dlp/ +CVE-2019-13291 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41818 +CVE-2019-13292 - https://www.exploit-db.com/exploits/47013 +CVE-2019-13294 - http://www.pentest.com.tr/exploits/AROX-School-ERP-Pro-Unauthenticated-RCE-Metasploit.html +CVE-2019-13294 - https://www.exploit-db.com/exploits/46999 +CVE-2019-13299 - https://github.com/ImageMagick/ImageMagick/issues/1610 +CVE-2019-1332 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-1332-Cross-Site%20Scripting-Microsoft%20SQL%20Server%20Reporting%20Services +CVE-2019-13336 - http://noahclements.com/Improper-Input-Validation-on-dbell-Smart-Doorbell-Can-Lead-To-Attackers-Remotely-Unlocking-Door/ +CVE-2019-13336 - https://www.reddit.com/r/AskNetsec/comments/c9p22m/company_threatening_to_sue_me_if_i_publicly/ +CVE-2019-13336 - https://www.youtube.com/watch?v=SkTKt1nV57I +CVE-2019-13339 - https://github.com/bg5sbk/MiniCMS/issues/32 +CVE-2019-13340 - https://github.com/bg5sbk/MiniCMS/issues/32 +CVE-2019-13341 - https://github.com/bg5sbk/MiniCMS/issues/32 +CVE-2019-13343 - https://www.gosecure.net/blog/2019/09/30/butor-portal-arbitrary-file-download-vulnerability-cve-2019-13343 +CVE-2019-13344 - http://packetstormsecurity.com/files/153541/WordPress-Like-Button-1.6.0-Authentication-Bypass.html +CVE-2019-13344 - https://limbenjamin.com/articles/wp-like-button-auth-bypass.html +CVE-2019-13344 - https://wpvulndb.com/vulnerabilities/9432 +CVE-2019-13346 - https://www.exploit-db.com/exploits/47109 +CVE-2019-13347 - https://marketplace.atlassian.com/apps/1212129/saml-single-sign-on-sso-confluence?hosting=server&tab=overview +CVE-2019-13352 - http://packetstormsecurity.com/files/153530/WolfVision-Cynap-1.18g-1.28j-Hardcoded-Credential.html +CVE-2019-13352 - http://seclists.org/fulldisclosure/2019/Jul/9 +CVE-2019-13352 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt +CVE-2019-13358 - http://packetstormsecurity.com/files/164253/OpenCats-0.9.4-2-XML-Injection.html +CVE-2019-13359 - http://packetstormsecurity.com/files/153666/CentOS-Control-Web-Panel-0.9.8.836-Privilege-Escalation.html +CVE-2019-13360 - http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html +CVE-2019-13361 - https://github.com/lodi-g/CVE-2019-13361/ +CVE-2019-13363 - http://packetstormsecurity.com/files/154484/Piwigo-2.9.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2019-13364 - http://packetstormsecurity.com/files/154484/Piwigo-2.9.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2019-13370 - https://github.com/ignitedcms/ignitedcms/issues/7 +CVE-2019-13372 - http://packetstormsecurity.com/files/158904/D-Link-Central-WiFi-Manager-CWM-100-Remote-Code-Execution.html +CVE-2019-13372 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md +CVE-2019-13372 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ +CVE-2019-13373 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md +CVE-2019-13373 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ +CVE-2019-13374 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md +CVE-2019-13374 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ +CVE-2019-13375 - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md +CVE-2019-13375 - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ +CVE-2019-13376 - https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss +CVE-2019-13379 - https://jordonlovik.wordpress.com/2019/07/06/roomalert-by-avtech-critical-vulnerability-disclosure/ +CVE-2019-13379 - https://www.youtube.com/watch?v=X1PY7kMFkVg +CVE-2019-13382 - https://posts.specterops.io/cve-2019-13382-local-privilege-escalation-in-snagit-abe5f31c349 +CVE-2019-13383 - http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-User-Enumeration.html +CVE-2019-13385 - http://packetstormsecurity.com/files/153877/CentOS-Control-Web-Panel-0.9.8.840-User-Enumeration.html +CVE-2019-13386 - http://packetstormsecurity.com/files/153876/CentOS-Control-Web-Panel-0.9.8.836-Remote-Command-Execution.html +CVE-2019-13387 - http://packetstormsecurity.com/files/153878/CentOS-Control-Web-Panel-0.9.8.846-Cross-Site-Scripting.html +CVE-2019-13396 - http://getflightpath.com/node/2650 +CVE-2019-13396 - http://packetstormsecurity.com/files/153626/FlightPath-Local-File-Inclusion.html +CVE-2019-13397 - https://medium.com/@sarapremashish/osticket-1-10-1-unauthenticated-stored-xss-allows-an-attacker-to-gain-admin-privileges-6a0348761a3a +CVE-2019-13398 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ +CVE-2019-13399 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ +CVE-2019-13400 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ +CVE-2019-13401 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ +CVE-2019-13402 - https://xor.cat/2019/06/19/fortinet-forticam-vulns/ +CVE-2019-13403 - https://github.com/B3Bo1d/CVE-2019-13403/ +CVE-2019-13405 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md +CVE-2019-13406 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md +CVE-2019-13407 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md +CVE-2019-13408 - https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md +CVE-2019-13413 - https://wpvulndb.com/vulnerabilities/9430 +CVE-2019-13414 - https://wpvulndb.com/vulnerabilities/9430 +CVE-2019-13415 - https://search-guard.com/cve-advisory/ +CVE-2019-13416 - https://search-guard.com/cve-advisory/ +CVE-2019-13417 - https://search-guard.com/cve-advisory/ +CVE-2019-13418 - https://search-guard.com/cve-advisory/ +CVE-2019-13419 - https://search-guard.com/cve-advisory/ +CVE-2019-13420 - https://search-guard.com/cve-advisory/ +CVE-2019-13421 - https://search-guard.com/cve-advisory/ +CVE-2019-13421 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SySS-2018-025.txt +CVE-2019-13422 - https://search-guard.com/cve-advisory/ +CVE-2019-13423 - https://search-guard.com/cve-advisory/ +CVE-2019-1343 - http://packetstormsecurity.com/files/154798/Microsoft-Windows-Kernel-nt-MiOffsetToProtos-NULL-Pointer-Dereference.html +CVE-2019-1344 - http://packetstormsecurity.com/files/154799/Microsoft-Windows-Kernel-CI-CipFixImageType-Out-Of-Bounds-Read.html +CVE-2019-13449 - https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5 +CVE-2019-1345 - http://packetstormsecurity.com/files/154800/Microsoft-Windows-Kernel-nt-MiParseImageLoadConfig-Out-Of-Bounds-Read.html +CVE-2019-13450 - https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5 +CVE-2019-13450 - https://news.ycombinator.com/item?id=20387298 +CVE-2019-1346 - http://packetstormsecurity.com/files/154801/Microsoft-Windows-Kernel-CI-HashKComputeFirstPageHash-Out-Of-Bounds-Read.html +CVE-2019-13462 - https://www.lansweeper.com/forum/yaf_topics33_Announcements.aspx +CVE-2019-13466 - https://www.westerndigital.com/support/productsecurity/wdc-19009-sandisk-and-western-digital-ssd-dashboard-vulnerabilities +CVE-2019-13467 - https://www.westerndigital.com/support/productsecurity/wdc-19009-sandisk-and-western-digital-ssd-dashboard-vulnerabilities +CVE-2019-1347 - http://packetstormsecurity.com/files/154802/Microsoft-Windows-Kernel-nt-MiRelocateImage-Out-Of-Bounds-Read.html +CVE-2019-13472 - https://www.vulnerability-lab.com/get_content.php?id=2184 +CVE-2019-13473 - http://packetstormsecurity.com/files/154416/Dabman-And-Imperial-Web-Radio-Devices-Undocumented-Telnet-Backdoor.html +CVE-2019-13473 - http://packetstormsecurity.com/files/174503/Internet-Radio-auna-IR-160-SE-UIProto-DoS-XSS-Missing-Authentication.html +CVE-2019-13473 - https://www.vulnerability-lab.com/get_content.php?id=2183 +CVE-2019-13474 - http://packetstormsecurity.com/files/174503/Internet-Radio-auna-IR-160-SE-UIProto-DoS-XSS-Missing-Authentication.html +CVE-2019-13474 - http://seclists.org/fulldisclosure/2019/Sep/12 +CVE-2019-13474 - https://www.vulnerability-lab.com/get_content.php?id=2183 +CVE-2019-13475 - https://www.vulnerability-lab.com/get_content.php?id=2186 +CVE-2019-13476 - http://packetstormsecurity.com/files/154216/CentOS-7.6.1810-Control-Web-Panel-0.9.8.837-Cross-Site-Scripting.html +CVE-2019-13477 - http://packetstormsecurity.com/files/154217/CentOS-7.6.1810-Control-Web-Panel-0.9.8.837-Cross-Site-Request-Forgery.html +CVE-2019-13477 - https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13477.md +CVE-2019-13478 - https://wpvulndb.com/vulnerabilities/9445 +CVE-2019-13481 - https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-3.pdf +CVE-2019-13488 - https://github.com/jofpin/trape/issues/169 +CVE-2019-13489 - https://github.com/jofpin/trape/issues/168 +CVE-2019-13493 - http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html +CVE-2019-13494 - http://packetstormsecurity.com/files/153612/SNMPc-Enterprise-Edition-9-10-Mapping-Filename-Buffer-Overflow.html +CVE-2019-13494 - https://www.mogozobo.com/?p=3534 +CVE-2019-13505 - https://wpvulndb.com/vulnerabilities/9458 +CVE-2019-13506 - https://github.com/nuxt/devalue/pull/8 +CVE-2019-13507 - https://www.exploit-db.com/exploits/47034 +CVE-2019-13529 - http://packetstormsecurity.com/files/154789/SMA-Solar-Technology-AG-Sunny-WebBox-1.6-Cross-Site-Request-Forgery.html +CVE-2019-13549 - http://seclists.org/fulldisclosure/2019/Oct/46 +CVE-2019-13553 - http://seclists.org/fulldisclosure/2019/Oct/45 +CVE-2019-13564 - http://packetstormsecurity.com/files/154274/Ping-Identity-Agentless-Integration-Kit-Cross-Site-Scripting.html +CVE-2019-13564 - http://seclists.org/fulldisclosure/2019/Aug/33 +CVE-2019-13564 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190305-01_Ping_Identity_Agentless_Integration_Kit_Reflected_XSS +CVE-2019-13565 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-13565 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-13566 - https://github.com/ros/ros_comm/issues/1752 +CVE-2019-13567 - https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b +CVE-2019-13569 - https://wpvulndb.com/vulnerabilities/9467 +CVE-2019-13570 - https://ajdg.solutions/2019/07/11/adrotate-pro-5-3-important-update-for-security-and-ads-txt/ +CVE-2019-13570 - https://wpvulndb.com/vulnerabilities/9475 +CVE-2019-13571 - https://github.com/beerpwn/ctf/blob/master/CVE/CVE-2019-13571/report.pdf +CVE-2019-13571 - https://github.com/beerpwn/ctf/tree/master/CVE/CVE-2019-13571 +CVE-2019-13571 - https://wpvulndb.com/vulnerabilities/9479 +CVE-2019-13572 - https://wpvulndb.com/vulnerabilities/9476 +CVE-2019-13573 - https://wpvulndb.com/vulnerabilities/9451 +CVE-2019-13575 - https://wpvulndb.com/vulnerabilities/9466 +CVE-2019-13577 - http://hyp3rlinx.altervista.org +CVE-2019-13577 - http://packetstormsecurity.com/files/153675/MAPLE-Computer-WBT-SNMP-Administrator-2.0.195.15-Buffer-Overflow.html +CVE-2019-13577 - http://seclists.org/fulldisclosure/2019/Jul/17 +CVE-2019-13577 - https://seclists.org/bugtraq/2019/Jul/29 +CVE-2019-13578 - https://wpvulndb.com/vulnerabilities/9504 +CVE-2019-13584 - http://packetstormsecurity.com/files/153672/FANUC-Robotics-Virtual-Robot-Controller-8.23-Path-Traversal.html +CVE-2019-13584 - https://seclists.org/bugtraq/2019/Jul/23 +CVE-2019-13584 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-025.txt +CVE-2019-13585 - http://packetstormsecurity.com/files/153671/FANUC-Robotics-Virtual-Robot-Controller-8.23-Buffer-Overflow.html +CVE-2019-13585 - https://seclists.org/bugtraq/2019/Jul/24 +CVE-2019-13585 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-024.txt +CVE-2019-13597 - https://pentest.com.tr/exploits/Sahi-Pro-v8-x-Unauthenticated-RCE-Exploit-Python.html +CVE-2019-13597 - https://www.exploit-db.com/exploits/47110 +CVE-2019-13599 - http://packetstormsecurity.com/files/154164/CentOS-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html +CVE-2019-13599 - http://packetstormsecurity.com/files/154164/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html +CVE-2019-13599 - http://packetstormsecurity.com/files/154164/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.848-User-Enumeration.html +CVE-2019-13603 - https://github.com/sungjungk/fp-scanner-hacking +CVE-2019-13603 - https://www.youtube.com/watch?v=Grirez2xeas +CVE-2019-13603 - https://www.youtube.com/watch?v=wEXJDyEOatM +CVE-2019-13604 - https://github.com/sungjungk/fp-img-key-crack +CVE-2019-13604 - https://www.youtube.com/watch?v=7tKJQdKRm2k +CVE-2019-13604 - https://www.youtube.com/watch?v=BwYK_xZlKi4 +CVE-2019-13605 - http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html +CVE-2019-13605 - https://www.exploit-db.com/exploits/47123 +CVE-2019-13607 - https://blog.rakeshmane.com/2019/07/u-xss-in-operamini-for-ios-browser-0-day.html +CVE-2019-13612 - http://lists.altn.com/WebX/.59862f3c +CVE-2019-13616 - https://bugzilla.libsdl.org/show_bug.cgi?id=4538 +CVE-2019-13617 - https://github.com/nginx/njs/issues/174 +CVE-2019-13623 - http://packetstormsecurity.com/files/154015/Ghidra-Linux-9.0.4-Arbitrary-Code-Execution.html +CVE-2019-13625 - https://github.com/NationalSecurityAgency/ghidra/issues/71 +CVE-2019-13625 - https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/ +CVE-2019-13626 - https://bugzilla.libsdl.org/show_bug.cgi?id=4522 +CVE-2019-13627 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-13628 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-13628 - https://tches.iacr.org/index.php/TCHES/article/view/7337 +CVE-2019-13629 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-13629 - https://tches.iacr.org/index.php/TCHES/article/view/7337 +CVE-2019-13631 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-13631 - https://usn.ubuntu.com/4115-1/ +CVE-2019-13631 - https://usn.ubuntu.com/4118-1/ +CVE-2019-13633 - https://github.com/Security-AVS/CVE-2019-13633 +CVE-2019-13635 - http://packetstormsecurity.com/files/153821/WordPress-WP-Fastest-Cache-0.8.9.5-Directory-Traversal.html +CVE-2019-13635 - https://wpvulndb.com/vulnerabilities/9507 +CVE-2019-13636 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html +CVE-2019-13636 - https://github.com/irsl/gnu-patch-vulnerabilities +CVE-2019-13636 - https://seclists.org/bugtraq/2019/Aug/29 +CVE-2019-13637 - https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-009.md +CVE-2019-13638 - http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html +CVE-2019-13638 - https://github.com/irsl/gnu-patch-vulnerabilities +CVE-2019-13638 - https://seclists.org/bugtraq/2019/Aug/29 +CVE-2019-1364 - http://packetstormsecurity.com/files/154797/Microsoft-Windows-Kernel-win32k.sys-TTF-Font-Processing-win32k-ulClearTypeFilter-Pool-Corruption.html +CVE-2019-13643 - https://github.com/espocrm/espocrm/issues/1349 +CVE-2019-13644 - https://github.com/firefly-iii/firefly-iii/issues/2335 +CVE-2019-13645 - https://github.com/firefly-iii/firefly-iii/issues/2337 +CVE-2019-13646 - https://github.com/firefly-iii/firefly-iii/issues/2339 +CVE-2019-13647 - https://github.com/firefly-iii/firefly-iii/issues/2338 +CVE-2019-13648 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-13648 - https://usn.ubuntu.com/4115-1/ +CVE-2019-13656 - http://packetstormsecurity.com/files/154418/CA-Common-Services-Distributed-Intelligence-Architecture-DIA-Code-Execution.html +CVE-2019-13657 - http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitary-Command-Execution.html +CVE-2019-13657 - http://packetstormsecurity.com/files/154904/CA-Performance-Management-Arbitrary-Command-Execution.html +CVE-2019-13658 - http://packetstormsecurity.com/files/154739/CA-Network-Flow-Analysis-9.x-10.0.x-Remote-Command-Execution.html +CVE-2019-13720 - http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html +CVE-2019-13734 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-13767 - http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html +CVE-2019-13916 - https://github.com/seemoo-lab/frankenstein/blob/master/doc/CVE_2019_13916.md +CVE-2019-13954 - http://packetstormsecurity.com/files/153733/Mikrotik-RouterOS-Resource-Stack-Exhaustion.html +CVE-2019-13954 - https://seclists.org/fulldisclosure/2019/Jul/20 +CVE-2019-13955 - http://packetstormsecurity.com/files/153733/Mikrotik-RouterOS-Resource-Stack-Exhaustion.html +CVE-2019-13955 - https://seclists.org/fulldisclosure/2019/Jul/20 +CVE-2019-13961 - https://github.com/flatCore/flatCore-CMS/issues/39 +CVE-2019-13971 - https://cisk123456.blogspot.com/2019/05/otcms-xss.html +CVE-2019-13972 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ +CVE-2019-13973 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ +CVE-2019-13974 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ +CVE-2019-13976 - https://medium.com/@dr.spitfire/bypass-file-upload-restrictions-cve-2019-13976-35682bd1fdd3 +CVE-2019-13977 - http://packetstormsecurity.com/files/153737/Ovidentia-8.4.3-Cross-Site-Scripting.html +CVE-2019-13977 - https://github.com/Kitsun3Sec/exploits/blob/master/cms/ovidentia/exploitXSSOvidentia.txt +CVE-2019-13978 - http://packetstormsecurity.com/files/153738/Ovidentia-8.4.3-SQL-Injection.html +CVE-2019-13978 - https://github.com/Kitsun3Sec/exploits/blob/master/cms/ovidentia/exploitSQLIOvidentia.txt +CVE-2019-13990 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-13990 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-13990 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-13990 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-13990 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-13990 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-13992 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-13994 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-13995 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-13998 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-13999 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14000 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14001 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14002 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14003 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14004 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14005 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14006 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14007 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14008 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14009 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14010 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14011 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14012 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14013 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14014 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14015 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14016 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14017 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14018 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14019 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14020 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14021 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14022 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14023 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14024 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14025 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14026 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14027 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14028 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14029 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14030 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14031 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14032 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14033 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14034 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14036 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-14037 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14038 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14039 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14040 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14041 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14042 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14043 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14044 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14045 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14046 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14047 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14048 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14049 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-1405 - http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html +CVE-2019-14050 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14051 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14052 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14053 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14054 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14055 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14056 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14057 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14060 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14061 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14062 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14063 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14065 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14066 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14067 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14068 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14070 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14071 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14072 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14073 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14074 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14075 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14076 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14077 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14078 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14079 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14080 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14081 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14082 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14083 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14085 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14086 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14087 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2019-14088 - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin +CVE-2019-14089 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14091 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14092 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14093 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14094 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2019-14095 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14097 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14098 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-14099 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14100 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14101 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14104 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14105 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14110 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14111 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14112 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14113 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14114 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14115 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14116 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14117 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14119 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2019-14122 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14123 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14124 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14127 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14130 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2019-14131 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14132 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14134 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14135 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2019-14205 - https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown +CVE-2019-14205 - https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html +CVE-2019-14205 - https://wpvulndb.com/vulnerabilities/9468 +CVE-2019-14206 - https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown +CVE-2019-14206 - https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html +CVE-2019-14206 - https://wpvulndb.com/vulnerabilities/9468 +CVE-2019-14216 - https://wpvulndb.com/vulnerabilities/9510 +CVE-2019-14216 - https://zeroauth.ltd/blog/2019/08/09/cve-2019-14216-svg-vector-icon-plugin-wordpress-plugin-vulnerable-to-csrf-and-arbitrary-file-upload-leading-to-remote-code-execution/ +CVE-2019-14221 - https://github.com/cccaaasser/1CRM-CVE/blob/master/CVE-2019-14221.md +CVE-2019-14221 - https://www.exploit-db.com/exploits/47206 +CVE-2019-14225 - http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html +CVE-2019-14225 - https://seclists.org/fulldisclosure/2019/Oct/25 +CVE-2019-14226 - http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html +CVE-2019-14226 - https://seclists.org/fulldisclosure/2019/Oct/25 +CVE-2019-14227 - http://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html +CVE-2019-14227 - http://seclists.org/fulldisclosure/2019/Oct/25 +CVE-2019-14228 - https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ +CVE-2019-14230 - http://www.openwall.com/lists/oss-security/2019/07/23/1 +CVE-2019-14230 - https://www.openwall.com/lists/oss-security/2019/07/21/1 +CVE-2019-14231 - http://www.openwall.com/lists/oss-security/2019/07/23/1 +CVE-2019-14231 - https://www.openwall.com/lists/oss-security/2019/07/21/1 +CVE-2019-14243 - https://caddy.community/t/dos-in-http-proxyprotocol-plugin/6014 +CVE-2019-14245 - http://packetstormsecurity.com/files/154155/CentOS-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html +CVE-2019-14245 - http://packetstormsecurity.com/files/154155/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html +CVE-2019-14245 - http://packetstormsecurity.com/files/154155/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.851-Arbitrary-Database-Drop.html +CVE-2019-14246 - http://packetstormsecurity.com/files/154156/CentOS-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html +CVE-2019-14246 - http://packetstormsecurity.com/files/154156/CentOS-WebPanel.com-CentOS-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html +CVE-2019-14246 - http://packetstormsecurity.com/files/154156/CentOS-WebPanel.com-Control-Web-Panel-CWP-0.9.8.851-phpMyAdmin-Password-Change.html +CVE-2019-14248 - https://bugzilla.nasm.us/show_bug.cgi?id=3392576 +CVE-2019-14250 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 +CVE-2019-14251 - https://github.com/kmkz/exploit/blob/master/CVE-2019-14251-TEMENOS-T24.txt +CVE-2019-14252 - https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt +CVE-2019-14253 - https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt +CVE-2019-14254 - https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt +CVE-2019-14257 - https://www.coalfire.com/The-Coalfire-Blog +CVE-2019-14257 - https://www.coalfire.com/The-Coalfire-Blog/August-2019/Getting-more-from-a-compliance-test +CVE-2019-14258 - https://www.coalfire.com/The-Coalfire-Blog +CVE-2019-14258 - https://www.coalfire.com/The-Coalfire-Blog/August-2019/Getting-more-from-a-compliance-test +CVE-2019-14261 - http://packetstormsecurity.com/files/153780/ABUS-Secvest-3.01.01-Unchecked-Message-Transmission-Error-Condition.html +CVE-2019-14261 - http://seclists.org/fulldisclosure/2019/Jul/30 +CVE-2019-14261 - https://seclists.org/bugtraq/2019/Jul/52 +CVE-2019-14261 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-004.txt +CVE-2019-14267 - http://packetstormsecurity.com/files/153767/pdfresurrect-0.15-Buffer-Overflow.html +CVE-2019-14277 - https://www.exploit-db.com/exploits/47150 +CVE-2019-14280 - http://packetstormsecurity.com/files/154276/Craft-CMS-2.7.9-3.2.5-Information-Disclosure.html +CVE-2019-14283 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-14283 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html +CVE-2019-14283 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-14283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-14283 - https://usn.ubuntu.com/4115-1/ +CVE-2019-14283 - https://usn.ubuntu.com/4118-1/ +CVE-2019-14284 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-14284 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html +CVE-2019-14284 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-14284 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-14284 - https://usn.ubuntu.com/4115-1/ +CVE-2019-14284 - https://usn.ubuntu.com/4118-1/ +CVE-2019-14287 - http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html +CVE-2019-14288 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14288 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-14289 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14289 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-1429 - http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html +CVE-2019-14290 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14290 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-14291 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14291 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-14292 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14292 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-14293 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14293 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-14294 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851 +CVE-2019-14294 - https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +CVE-2019-14295 - https://github.com/upx/upx/issues/286 +CVE-2019-14296 - https://github.com/upx/upx/issues/287 +CVE-2019-14297 - https://www.exploit-db.com/exploits/46767 +CVE-2019-14298 - https://www.exploit-db.com/exploits/46766 +CVE-2019-14312 - http://packetstormsecurity.com/files/153985/Aptana-Jaxer-1.0.3.4547-Local-File-Inclusion.html +CVE-2019-14313 - https://wpvulndb.com/vulnerabilities/9480 +CVE-2019-14314 - https://wpvulndb.com/vulnerabilities/9816 +CVE-2019-14318 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-14318 - https://tches.iacr.org/index.php/TCHES/article/view/7337 +CVE-2019-14319 - https://play.google.com/store/apps/details?id=com.zhiliaoapp.musically&hl=en_US +CVE-2019-14322 - http://packetstormsecurity.com/files/163398/Pallets-Werkzeug-0.15.4-Path-Traversal.html +CVE-2019-14326 - https://github.com/seqred-s-a/cve-2019-14326 +CVE-2019-14327 - https://wpvulndb.com/vulnerabilities/9483 +CVE-2019-14328 - http://packetstormsecurity.com/files/153801/WordPress-Simple-Membership-3.8.4-Cross-Site-Request-Forgery.html +CVE-2019-14328 - https://wpvulndb.com/vulnerabilities/9482 +CVE-2019-14329 - http://www.cinquino.eu/EspoCRM.htm +CVE-2019-14330 - http://www.cinquino.eu/EspoCRM.htm +CVE-2019-14331 - http://www.cinquino.eu/EspoCRM.htm +CVE-2019-14332 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14333 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14334 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14335 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14336 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14337 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14338 - http://packetstormsecurity.com/files/153840/D-Link-6600-AP-XSS-DoS-Information-Disclosure.html +CVE-2019-14339 - http://packetstormsecurity.com/files/154266/Canon-PRINT-2.5.5-URI-Injection.html +CVE-2019-14343 - http://packetstormsecurity.com/files/155376/TemaTres-3.0-Cross-Site-Scripting.html +CVE-2019-14343 - https://medium.com/@Pablo0xSantiago/cve-2019-14343-ebc120800053 +CVE-2019-14344 - https://medium.com/@Pablo0xSantiago/cve-2019-14344-tematres-3-0-cross-site-scripting-reflected-xss-3826a23c7fff +CVE-2019-14345 - https://medium.com/@Pablo0xSantiago/cve-2019-14345-ff6f6d9fd30f +CVE-2019-14346 - http://packetstormsecurity.com/files/153989/Adive-Framework-2.0.7-Cross-Site-Request-Forgery.html +CVE-2019-14347 - http://packetstormsecurity.com/files/155213/Adive-Framework-2.0.7-Privilege-Escalation.html +CVE-2019-14347 - https://hackpuntes.com/cve-2019-14347-escalacion-de-privilegios-en-adive/ +CVE-2019-14348 - http://packetstormsecurity.com/files/153963/WordPress-JoomSport-3.3-SQL-Injection.html +CVE-2019-14348 - https://wpvulndb.com/vulnerabilities/9499 +CVE-2019-14349 - https://github.com/espocrm/espocrm/issues/1358 +CVE-2019-14350 - https://github.com/espocrm/espocrm/issues/1356 +CVE-2019-14351 - https://github.com/espocrm/espocrm/issues/1357 +CVE-2019-14353 - https://blog.trezor.io/details-of-the-oled-vulnerability-and-its-mitigation-d331c4e2001a +CVE-2019-14355 - https://medium.com/shapeshift-stories/shapeshift-security-update-5b0dd45c93db +CVE-2019-14356 - https://blog.coinkite.com/noise-troll/ +CVE-2019-14363 - https://github.com/reevesrs24/CVE/blob/master/Netgear_WNDR2400v3/upnp_stack_overflow/upnp_stack_overflow.md +CVE-2019-14364 - https://github.com/ivoschyk-cs/CVE-s/blob/master/Email%20Subscribers%20%26%20Newsletters%20Wordpress%20Plugin%20(XSS) +CVE-2019-14364 - https://wpvulndb.com/vulnerabilities/9508 +CVE-2019-14368 - https://github.com/Exiv2/exiv2/issues/952 +CVE-2019-14369 - https://github.com/Exiv2/exiv2/issues/953 +CVE-2019-14370 - https://github.com/Exiv2/exiv2/issues/954 +CVE-2019-14371 - https://bugzilla.libav.org/show_bug.cgi?id=1163 +CVE-2019-14372 - https://bugzilla.libav.org/show_bug.cgi?id=1165 +CVE-2019-14373 - https://github.com/FLIF-hub/FLIF/issues/541 +CVE-2019-14378 - http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html +CVE-2019-14378 - https://usn.ubuntu.com/4191-1/ +CVE-2019-14379 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-14379 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-14379 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-14379 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-14379 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-14379 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-14415 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html +CVE-2019-14416 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html +CVE-2019-14417 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html +CVE-2019-14418 - http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html +CVE-2019-14422 - http://seclists.org/fulldisclosure/2019/Aug/7 +CVE-2019-14422 - https://www.vulnerability-lab.com/get_content.php?id=2188 +CVE-2019-14423 - https://noskill1337.github.io/homematic-with-cux-daemon-remote-code-execution +CVE-2019-14424 - https://noskill1337.github.io/homematic-with-cux-daemon-local-file-inclusion +CVE-2019-14427 - https://www.exploit-db.com/exploits/47198 +CVE-2019-14430 - https://www.exploit-db.com/exploits/47294 +CVE-2019-14432 - https://thomask.sdf.org/blog/2019/08/07/cve-2019-14432-loom-desktop-rce-vulnerability.html +CVE-2019-14439 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-14439 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-14439 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-14439 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-14441 - https://bugzilla.libav.org/show_bug.cgi?id=1161#c0 +CVE-2019-14442 - https://bugzilla.libav.org/show_bug.cgi?id=1159 +CVE-2019-14443 - https://bugzilla.libav.org/show_bug.cgi?id=1161#c1 +CVE-2019-14444 - https://sourceware.org/bugzilla/show_bug.cgi?id=24829 +CVE-2019-14452 - https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505967936 +CVE-2019-14452 - https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505997355 +CVE-2019-14467 - http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-Remote-Code-Execution.html +CVE-2019-14467 - https://seclists.org/fulldisclosure/2019/Nov/13 +CVE-2019-14467 - https://wpvulndb.com/vulnerabilities/9952 +CVE-2019-14469 - https://support.sonatype.com/hc/en-us/articles/360033999733-CVE-2019-14469-Nexus-Repository-Manager-3-Cross-Site-Scripting-XSS-2019-07-26 +CVE-2019-14470 - http://packetstormsecurity.com/files/154206/WordPress-UserPro-4.9.32-Cross-Site-Scripting.html +CVE-2019-14470 - https://wpvulndb.com/vulnerabilities/9815 +CVE-2019-14470 - https://www.exploit-db.com/exploits/47304 +CVE-2019-14471 - https://code610.blogspot.com/2019/07/xss-in-testlink-1919.html +CVE-2019-14472 - https://code610.blogspot.com/2019/07/xss-in-zurmo-crm.html +CVE-2019-14478 - https://compass-security.com/fileadmin/Research/Advisories/2020-12_CSNC-2019-013_AdRem_NetCrunch_Cross-Site_Scripting_XSS.txt +CVE-2019-14481 - https://compass-security.com/fileadmin/Research/Advisories/2020-15_CSNC-2019-016_AdRem_NetCrunch_Cross-Site_Request_Forgery_CSRF.txt +CVE-2019-14492 - https://github.com/opencv/opencv/issues/15124 +CVE-2019-14494 - https://gitlab.freedesktop.org/poppler/poppler/issues/802 +CVE-2019-14510 - https://lockstepgroup.com/blog/abusing-the-kaseya-lan-cache-fsadmin/ +CVE-2019-14511 - https://sphinxsearch.com/blog/ +CVE-2019-14513 - https://github.com/Slovejoy/dnsmasq-pre2.76 +CVE-2019-14517 - https://github.com/pandao/editor.md/issues/709 +CVE-2019-14518 - https://github.com/evolution-cms/evolution/issues/1041 +CVE-2019-14518 - https://github.com/evolution-cms/evolution/issues/1042 +CVE-2019-14525 - https://github.com/OctopusDeploy/Issues/issues/5754 +CVE-2019-14530 - http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html +CVE-2019-14530 - http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html +CVE-2019-14531 - https://github.com/sleuthkit/sleuthkit/issues/1576 +CVE-2019-14532 - https://github.com/sleuthkit/sleuthkit/issues/1575 +CVE-2019-14537 - https://github.com/Wocanilo/CVE-2019-14537 +CVE-2019-14540 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-14540 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-14540 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-14540 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-14540 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-14546 - https://gauravnarwani.com/publications/CVE-2019-14546/ +CVE-2019-14547 - https://gauravnarwani.com/publications/cve-2019-14547/ +CVE-2019-14548 - https://gauravnarwani.com/publications/cve-2019-14548/ +CVE-2019-14549 - https://gauravnarwani.com/publications/cve-2019-14549/ +CVE-2019-14550 - https://gauravnarwani.com/publications/cve-2019-14550/ +CVE-2019-14551 - https://griffinbyatt.com/2019/08/02/Das-Vulnerabilities.html +CVE-2019-1458 - http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html +CVE-2019-1458 - http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html +CVE-2019-14615 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-14615 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html +CVE-2019-14615 - https://usn.ubuntu.com/4253-1/ +CVE-2019-14615 - https://usn.ubuntu.com/4287-2/ +CVE-2019-14664 - https://sourceforge.net/p/enigmail/bugs/984/ +CVE-2019-14666 - https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt +CVE-2019-14667 - https://github.com/firefly-iii/firefly-iii/issues/2363 +CVE-2019-14668 - https://github.com/firefly-iii/firefly-iii/issues/2364 +CVE-2019-14669 - https://github.com/firefly-iii/firefly-iii/issues/2366 +CVE-2019-14670 - https://github.com/firefly-iii/firefly-iii/issues/2365 +CVE-2019-14678 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14678-Unsafe%20XML%20Parsing-SAS%20XML%20Mapper +CVE-2019-14680 - https://wpvulndb.com/vulnerabilities/9551 +CVE-2019-14682 - https://wpvulndb.com/vulnerabilities/9399 +CVE-2019-14683 - https://wpvulndb.com/vulnerabilities/9392 +CVE-2019-14684 - https://safebreach.com/Post/Trend-Micro-Password-Manager-Privilege-Escalation-to-SYSTEM +CVE-2019-14685 - http://packetstormsecurity.com/files/154200/Trend-Maximum-Security-2019-Unquoted-Search-Path.html +CVE-2019-14685 - http://seclists.org/fulldisclosure/2019/Aug/26 +CVE-2019-14685 - https://medium.com/sidechannel-br/vulnerabilidade-no-trend-micro-maximum-security-2019-permite-a-escala%C3%A7%C3%A3o-de-privil%C3%A9gios-no-windows-471403d53b68 +CVE-2019-14687 - https://medium.com/@infiniti_css/fa839acaad59 +CVE-2019-14694 - http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html +CVE-2019-14694 - https://github.com/SouhailHammou/Exploits/blob/master/CVE-2019-14694%20-%20Comodo%20AV%20Sandbox%20Race%20Condition%20UAF/comodo_av_uaf_poc.c +CVE-2019-14695 - https://wpvulndb.com/vulnerabilities/9495 +CVE-2019-14696 - http://packetstormsecurity.com/files/153984/Open-School-3.0-Community-Edition-2.3-Cross-Site-Scripting.html +CVE-2019-14698 - https://pastebin.com/PSyqqs1g +CVE-2019-14699 - https://pastebin.com/PSyqqs1g +CVE-2019-14700 - https://pastebin.com/PSyqqs1g +CVE-2019-14701 - https://pastebin.com/PSyqqs1g +CVE-2019-14702 - https://pastebin.com/PSyqqs1g +CVE-2019-14703 - https://pastebin.com/PSyqqs1g +CVE-2019-14704 - https://pastebin.com/PSyqqs1g +CVE-2019-14705 - https://pastebin.com/PSyqqs1g +CVE-2019-14706 - https://pastebin.com/PSyqqs1g +CVE-2019-14707 - https://pastebin.com/PSyqqs1g +CVE-2019-14708 - https://pastebin.com/PSyqqs1g +CVE-2019-14709 - https://pastebin.com/PSyqqs1g +CVE-2019-14721 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14722 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14723 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14724 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14725 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14726 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14727 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14728 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14729 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14730 - https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html +CVE-2019-14737 - https://www.exploit-db.com/exploits/47493 +CVE-2019-14743 - https://amonitoring.ru/article/steamclient-0day/ +CVE-2019-14743 - https://habr.com/ru/company/pm/blog/462479/ +CVE-2019-14744 - http://packetstormsecurity.com/files/153981/Slackware-Security-Advisory-kdelibs-Updates.html +CVE-2019-14744 - https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/ +CVE-2019-14745 - https://bananamafia.dev/post/r2-pwndebian/ +CVE-2019-14745 - https://github.com/radare/radare2/releases/tag/3.7.0 +CVE-2019-14747 - https://github.com/wkeyuan/DWSurvey/issues/47 +CVE-2019-14748 - http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html +CVE-2019-14748 - https://www.exploit-db.com/exploits/47224 +CVE-2019-14749 - http://packetstormsecurity.com/files/154004/osTicket-1.12-Formula-Injection.html +CVE-2019-14749 - https://www.exploit-db.com/exploits/47225 +CVE-2019-14750 - http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html +CVE-2019-14750 - https://www.exploit-db.com/exploits/47226 +CVE-2019-14751 - https://github.com/mssalvatore/CVE-2019-14751_PoC +CVE-2019-14751 - https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/ +CVE-2019-14756 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ +CVE-2019-14757 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ +CVE-2019-14758 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ +CVE-2019-1476 - http://packetstormsecurity.com/files/155653/AppXSvc-17763-Arbitrary-File-Overwrite.html +CVE-2019-14760 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ +CVE-2019-14761 - https://research.nccgroup.com/2020/08/21/technical-advisory-multiple-html-injection-vulnerabilities-in-kaios-pre-installed-mobile-applications/ +CVE-2019-14763 - https://usn.ubuntu.com/4115-1/ +CVE-2019-14763 - https://usn.ubuntu.com/4118-1/ +CVE-2019-14765 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 +CVE-2019-14766 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 +CVE-2019-14767 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 +CVE-2019-14768 - https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305 +CVE-2019-14774 - https://wpvulndb.com/vulnerabilities/9855 +CVE-2019-14782 - https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html +CVE-2019-14783 - http://packetstormsecurity.com/files/154615/Samsung-Mobile-Android-FotaAgent-Arbitrary-File-Creation.html +CVE-2019-14783 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-14786 - https://wpvulndb.com/vulnerabilities/9375 +CVE-2019-14787 - https://wpvulndb.com/vulnerabilities/9447 +CVE-2019-14788 - https://wpvulndb.com/vulnerabilities/9447 +CVE-2019-14790 - https://wpvulndb.com/vulnerabilities/9517 +CVE-2019-14791 - https://wpvulndb.com/vulnerabilities/9426 +CVE-2019-14792 - https://wpvulndb.com/vulnerabilities/9442 +CVE-2019-14795 - https://wpvulndb.com/vulnerabilities/9516 +CVE-2019-14796 - https://wpvulndb.com/vulnerabilities/9515 +CVE-2019-14798 - https://wpvulndb.com/vulnerabilities/9361 +CVE-2019-14799 - https://wpvulndb.com/vulnerabilities/9278 +CVE-2019-14804 - http://packetstormsecurity.com/files/154018/UNA-10.0.0-RC1-Cross-Site-Scripting.html +CVE-2019-14808 - http://packetstormsecurity.com/files/154772/RENPHO-3.0.0-Information-Disclosure.html +CVE-2019-14810 - https://www.arista.com/en/support/advisories-notices +CVE-2019-14814 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-14814 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-14816 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-14816 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-14821 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-14821 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-14821 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-14822 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-14835 - http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html +CVE-2019-14835 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-14835 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-14835 - http://www.openwall.com/lists/oss-security/2019/09/24/1 +CVE-2019-14836 - https://bugzilla.redhat.com/show_bug.cgi?id=1847605 +CVE-2019-14862 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-14862 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-14862 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-14868 - http://seclists.org/fulldisclosure/2020/May/53 +CVE-2019-14881 - https://moodle.org/mod/forum/discuss.php?d=393584#p1586746 +CVE-2019-14882 - https://moodle.org/mod/forum/discuss.php?d=393585#p1586747 +CVE-2019-14889 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-14892 - https://github.com/FasterXML/jackson-databind/issues/2462 +CVE-2019-14893 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-14893 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-14895 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html +CVE-2019-14895 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-14896 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html +CVE-2019-14896 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-14897 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html +CVE-2019-14897 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-14898 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-14901 - http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html +CVE-2019-14901 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-14911 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-14912 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-14913 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-14914 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-14915 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-14916 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-14923 - https://www.exploit-db.com/exploits/47280 +CVE-2019-14925 - https://www.mogozobo.com/ +CVE-2019-14925 - https://www.mogozobo.com/?p=3593 +CVE-2019-14926 - https://www.mogozobo.com/ +CVE-2019-14926 - https://www.mogozobo.com/?p=3593 +CVE-2019-14927 - https://www.mogozobo.com/ +CVE-2019-14927 - https://www.mogozobo.com/?p=3593 +CVE-2019-14928 - https://www.mogozobo.com/ +CVE-2019-14928 - https://www.mogozobo.com/?p=3593 +CVE-2019-14929 - https://www.mogozobo.com/ +CVE-2019-14929 - https://www.mogozobo.com/?p=3593 +CVE-2019-14930 - https://www.mogozobo.com/ +CVE-2019-14930 - https://www.mogozobo.com/?p=3593 +CVE-2019-14931 - https://www.mogozobo.com/ +CVE-2019-14931 - https://www.mogozobo.com/?p=3593 +CVE-2019-14935 - https://www.3cx.com/community/threads/security-issue-with-3cx-windows-client-install.64432/ +CVE-2019-14943 - https://gitlab.com/gitlab-org/omnibus-gitlab/issues/4530 +CVE-2019-14945 - https://wpvulndb.com/vulnerabilities/9506 +CVE-2019-14946 - https://wpvulndb.com/vulnerabilities/9449 +CVE-2019-14947 - https://wpvulndb.com/vulnerabilities/9449 +CVE-2019-14948 - https://wpvulndb.com/vulnerabilities/9502 +CVE-2019-14949 - https://wpvulndb.com/vulnerabilities/9548 +CVE-2019-14969 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-010.md +CVE-2019-14973 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html +CVE-2019-14974 - https://www.exploit-db.com/exploits/47247 +CVE-2019-14978 - https://gkaim.com/cve-2019-14978-vikas-chaudhary/ +CVE-2019-14978 - https://wpvulndb.com/vulnerabilities/9959 +CVE-2019-14979 - https://gkaim.com/cve-2019-14979-vikas-chaudhary/ +CVE-2019-14982 - https://github.com/Exiv2/exiv2/issues/960 +CVE-2019-14994 - http://packetstormsecurity.com/files/154574/Jira-Service-Desk-Server-And-Data-Center-Path-Traversal.html +CVE-2019-14994 - https://samcurry.net/analysis-of-cve-2019-14994/ +CVE-2019-14995 - https://jira.atlassian.com/browse/JRASERVER-69792 +CVE-2019-14995 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836 +CVE-2019-14995 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837 +CVE-2019-14998 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 +CVE-2019-14999 - https://ecosystem.atlassian.net/browse/UPM-6044 +CVE-2019-15000 - http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html +CVE-2019-15001 - http://packetstormsecurity.com/files/154611/Jira-Server-Data-Center-Template-Injection.html +CVE-2019-15003 - http://packetstormsecurity.com/files/155214/Jira-Service-Desk-Server-Data-Center-Path-Traversal.html +CVE-2019-15004 - http://packetstormsecurity.com/files/155214/Jira-Service-Desk-Server-Data-Center-Path-Traversal.html +CVE-2019-15005 - https://herolab.usd.de/security-advisories/usd-2019-0016/ +CVE-2019-15006 - http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html +CVE-2019-15011 - https://ecosystem.atlassian.net/browse/APL-1386 +CVE-2019-15030 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 +CVE-2019-15031 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97 +CVE-2019-15033 - https://heitorgouvea.me/2019/09/17/CVE-2019-15033 +CVE-2019-15039 - http://packetstormsecurity.com/files/155874/JetBrains-TeamCity-2018.2.4-Remote-Code-Execution.html +CVE-2019-15043 - https://community.grafana.com/t/release-notes-v6-3-x/19202 +CVE-2019-15045 - http://packetstormsecurity.com/files/154183/Zoho-Corporation-ManageEngine-ServiceDesk-Plus-Information-Disclosure.html +CVE-2019-15045 - http://seclists.org/fulldisclosure/2019/Aug/17 +CVE-2019-15046 - http://packetstormsecurity.com/files/154183/Zoho-Corporation-ManageEngine-ServiceDesk-Plus-Information-Disclosure.html +CVE-2019-15046 - http://seclists.org/fulldisclosure/2019/Aug/17 +CVE-2019-15046 - https://seclists.org/bugtraq/2019/Aug/37 +CVE-2019-15047 - https://github.com/axiomatic-systems/bento4/issues/408 +CVE-2019-15048 - https://github.com/axiomatic-systems/bento4/issues/409 +CVE-2019-15049 - https://github.com/axiomatic-systems/bento4/issues/408 +CVE-2019-15050 - https://github.com/axiomatic-systems/bento4/issues/409 +CVE-2019-15051 - https://security.mioso.com/CVE-2019-15051-en.html +CVE-2019-15052 - https://github.com/gradle/gradle/pull/10176 +CVE-2019-15053 - https://github.com/l0nax/CVE-2019-15053 +CVE-2019-15054 - https://startrekdude.github.io/mailbird.html +CVE-2019-15055 - https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055 +CVE-2019-15055 - https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 +CVE-2019-15058 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973 +CVE-2019-15058 - https://github.com/nothings/stb/issues/790 +CVE-2019-15058 - https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1695025.html +CVE-2019-15062 - https://gauravnarwani.com/publications/CVE-2019-15062/ +CVE-2019-15081 - http://packetstormsecurity.com/files/154286/Opencart-3.x-Cross-Site-Scripting.html +CVE-2019-15081 - https://github.com/nipunsomani/Opencart-3.x.x-Authenticated-Stored-XSS/blob/master/README.md +CVE-2019-15082 - https://wpvulndb.com/vulnerabilities/9405 +CVE-2019-15083 - http://packetstormsecurity.com/files/157717/ManageEngine-Service-Desk-10.0-Cross-Site-Scripting.html +CVE-2019-15083 - https://www.exploit-db.com/exploits/48473 +CVE-2019-15084 - https://www.exploit-db.com/exploits/46416 +CVE-2019-15085 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-15086 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-15087 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-15088 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-15089 - https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas +CVE-2019-15090 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12 +CVE-2019-15090 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15090 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15092 - http://packetstormsecurity.com/files/154203/WordPress-Import-Export-WordPress-Users-1.3.1-CSV-Injection.html +CVE-2019-15092 - https://hackpuntes.com/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection/ +CVE-2019-15092 - https://wpvulndb.com/vulnerabilities/9704 +CVE-2019-15095 - https://github.com/wkeyuan/DWSurvey/issues/48 +CVE-2019-15098 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-15099 - https://usn.ubuntu.com/4287-2/ +CVE-2019-15102 - https://barriersec.com/2019/08/cve-2019-15102-sahi-pro/ +CVE-2019-15104 - http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Privilege-Escalation-Remote-Command-Execution.html +CVE-2019-15104 - https://www.exploit-db.com/exploits/47227 +CVE-2019-15105 - http://pentest.com.tr/exploits/DEFCON-ManageEngine-APM-v14-Privilege-Escalation-Remote-Command-Execution.html +CVE-2019-15105 - https://www.exploit-db.com/exploits/47228 +CVE-2019-15106 - http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html +CVE-2019-15106 - https://www.exploit-db.com/exploits/47229 +CVE-2019-15107 - http://packetstormsecurity.com/files/154141/Webmin-1.920-Remote-Command-Execution.html +CVE-2019-15107 - http://packetstormsecurity.com/files/154141/Webmin-Remote-Comman-Execution.html +CVE-2019-15107 - http://packetstormsecurity.com/files/154197/Webmin-1.920-password_change.cgi-Backdoor.html +CVE-2019-15107 - http://packetstormsecurity.com/files/154485/Webmin-1.920-Remote-Code-Execution.html +CVE-2019-15107 - http://www.pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html +CVE-2019-15107 - https://attackerkb.com/topics/hxx3zmiCkR/webmin-password-change-cgi-command-injection +CVE-2019-15107 - https://www.exploit-db.com/exploits/47230 +CVE-2019-15109 - https://wpvulndb.com/vulnerabilities/9554 +CVE-2019-15112 - https://wpvulndb.com/vulnerabilities/9285 +CVE-2019-15116 - https://wpvulndb.com/vulnerabilities/9334 +CVE-2019-15117 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-15118 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-15120 - https://github.com/h3llraiser/CVE-2019-15120 +CVE-2019-15123 - https://www.gosecure.net/blog/2020/06/11/vera-vulnerable-to-authenticated-remote-code-execution-cve-2019-15123/ +CVE-2019-15126 - http://packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html +CVE-2019-15126 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt +CVE-2019-15126 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure +CVE-2019-15128 - https://zeroauth.ltd/blog/2019/08/23/cve-2019-15128-if-svnadmin-through-1-6-2-allows-svnadmin-usercreate-php-csrf-to-create-a-user/ +CVE-2019-15129 - https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd +CVE-2019-15130 - https://gist.github.com/izadgot/38a7dd553f8024ed3154134dae0414fd +CVE-2019-15134 - https://github.com/RIOT-OS/RIOT/pull/12001 +CVE-2019-15140 - https://github.com/ImageMagick/ImageMagick/issues/1554 +CVE-2019-15142 - https://usn.ubuntu.com/4198-1/ +CVE-2019-15143 - https://usn.ubuntu.com/4198-1/ +CVE-2019-15144 - https://usn.ubuntu.com/4198-1/ +CVE-2019-15145 - https://usn.ubuntu.com/4198-1/ +CVE-2019-15146 - https://github.com/gopro/gpmf-parser/issues/60 +CVE-2019-15147 - https://github.com/gopro/gpmf-parser/issues/60 +CVE-2019-15148 - https://github.com/gopro/gpmf-parser/issues/60 +CVE-2019-15150 - http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html +CVE-2019-15161 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15162 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15163 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15164 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15165 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15211 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 +CVE-2019-15211 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c666355e60ddb4748ead3bdd983e3f7f2224aaf0 +CVE-2019-15211 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15211 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15212 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 +CVE-2019-15212 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f +CVE-2019-15212 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15212 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15213 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-15213 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7 +CVE-2019-15214 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac +CVE-2019-15214 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7 +CVE-2019-15214 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15214 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15215 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 +CVE-2019-15215 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eff73de2b1600ad8230692f00bc0ab49b166512a +CVE-2019-15215 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15215 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15216 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef61eb43ada6c1d6b94668f0f514e4c268093ff3 +CVE-2019-15216 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15216 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15217 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-15217 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e +CVE-2019-15218 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 +CVE-2019-15218 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e +CVE-2019-15218 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15218 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15218 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-15219 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 +CVE-2019-15219 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a +CVE-2019-15220 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.1 +CVE-2019-15220 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e41e2257f1094acc37618bf6c856115374c6922 +CVE-2019-15220 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15220 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15221 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 +CVE-2019-15221 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710 +CVE-2019-15221 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15221 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15222 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.8 +CVE-2019-15222 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d78e1c2b7f4be00bbe62141603a631dc7812f35 +CVE-2019-15223 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 +CVE-2019-15223 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b074ab7fc0d575247b9cc9f93bb7e007ca38840 +CVE-2019-15229 - https://www.sevenlayers.com/index.php/238-fuelcms-1-4-4-csrf +CVE-2019-15233 - https://github.com/l0nax/CVE-2019-15233 +CVE-2019-15235 - https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html +CVE-2019-15238 - https://wpvulndb.com/vulnerabilities/9505 +CVE-2019-15239 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f582b248d0a86bae5788c548d7bb5bca6f7691a +CVE-2019-15239 - https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf +CVE-2019-15239 - https://salsa.debian.org/kernel-team/kernel-sec/blob/f6273af2d956a87296b6b60379d0a186c9be4bbc/active/CVE-2019-15239 +CVE-2019-15253 - http://packetstormsecurity.com/files/157668/Cisco-Digital-Network-Architecture-Center-1.3.1.4-Cross-Site-Scripting.html +CVE-2019-15257 - https://www.tenable.com/security/research/tra-2019-44 +CVE-2019-15258 - https://www.tenable.com/security/research/tra-2019-44 +CVE-2019-15276 - http://packetstormsecurity.com/files/155554/Cisco-WLC-2504-8.9-Denial-Of-Service.html +CVE-2019-15291 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-15291 - https://usn.ubuntu.com/4287-2/ +CVE-2019-15292 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6377f787aeb945cae7abbb6474798de129e1f3ac +CVE-2019-15292 - https://usn.ubuntu.com/4115-1/ +CVE-2019-15292 - https://usn.ubuntu.com/4118-1/ +CVE-2019-15295 - https://safebreach.com/Post/BitDefender-Antivirus-Free-2020-Privilege-Escalation-to-SYSTEM +CVE-2019-15297 - http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html +CVE-2019-15297 - http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html +CVE-2019-15299 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html +CVE-2019-15300 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html +CVE-2019-15301 - https://medium.com/@sorokinpf/bpmonline-sql-injection-607916447e30 +CVE-2019-15304 - http://packetstormsecurity.com/files/154221/ProGrade-Lierda-Grill-Temperature-1.00_50006-Hardcoded-Credentials.html +CVE-2019-15304 - https://www.joesandbox.com/analysis/287596/0/html +CVE-2019-15310 - https://labs.mwrinfosecurity.com/advisories/ +CVE-2019-15311 - https://labs.mwrinfosecurity.com/advisories/ +CVE-2019-15312 - https://labs.mwrinfosecurity.com/advisories/ +CVE-2019-15314 - https://pastebin.com/wEM7rnG7 +CVE-2019-15316 - https://www.youtube.com/watch?v=I93aH86BUaE +CVE-2019-15316 - https://www.youtube.com/watch?v=ZCHrjP0cMew +CVE-2019-15317 - https://wpvulndb.com/vulnerabilities/9584 +CVE-2019-15318 - https://wpvulndb.com/vulnerabilities/9583 +CVE-2019-15319 - https://wpvulndb.com/vulnerabilities/9599 +CVE-2019-15320 - https://wpvulndb.com/vulnerabilities/9600 +CVE-2019-15321 - https://wpvulndb.com/vulnerabilities/9600 +CVE-2019-15323 - https://wpvulndb.com/vulnerabilities/9453 +CVE-2019-15324 - https://wpvulndb.com/vulnerabilities/9455 +CVE-2019-15326 - https://wpvulndb.com/vulnerabilities/9392 +CVE-2019-1543 - https://hackerone.com/reports/506040 +CVE-2019-1543 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-1543 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-1543 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-1547 - http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html +CVE-2019-1547 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-1547 - https://seclists.org/bugtraq/2019/Oct/1 +CVE-2019-1547 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-1547 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-1547 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-1547 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-1547 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-1547 - https://www.tenable.com/security/tns-2019-08 +CVE-2019-1549 - https://seclists.org/bugtraq/2019/Oct/1 +CVE-2019-1549 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-1549 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-1549 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-1549 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-1549 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-15499 - https://github.com/hackmdio/codimd/issues/1263 +CVE-2019-15501 - http://packetstormsecurity.com/files/154202/LSoft-ListServ-Cross-Site-Scripting.html +CVE-2019-15501 - https://www.exploit-db.com/exploits/47302 +CVE-2019-15502 - https://r4p3.net/threads/teamkilled-new-teamspeak-crash.8144/ +CVE-2019-15502 - https://www.youtube.com/watch?v=PlVbPIs75D4 +CVE-2019-15505 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-1551 - http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html +CVE-2019-1551 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-1551 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-1551 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-1551 - https://www.tenable.com/security/tns-2020-11 +CVE-2019-1551 - https://www.tenable.com/security/tns-2021-10 +CVE-2019-15510 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-15510-manageengine-desktopcentral-v-10-vulnerable-to-html-injection/ +CVE-2019-15511 - https://cqureacademy.com/cqure-labs/cqlabs-cve-2019-15511-broken-access-control-in-gog-galaxy +CVE-2019-1552 - https://hackerone.com/reports/683318 +CVE-2019-1552 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-1552 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-1552 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-1552 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-1552 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-1552 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-1552 - https://www.tenable.com/security/tns-2019-08 +CVE-2019-15562 - https://github.com/go-gorm/gorm/pull/2519 +CVE-2019-15575 - https://hackerone.com/reports/682442 +CVE-2019-15576 - https://hackerone.com/reports/633001 +CVE-2019-15577 - https://hackerone.com/reports/636560 +CVE-2019-15580 - https://hackerone.com/reports/667408 +CVE-2019-15584 - https://hackerone.com/reports/670572 +CVE-2019-15588 - https://hackerone.com/reports/688270 +CVE-2019-15588 - https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09 +CVE-2019-15589 - https://hackerone.com/reports/497047 +CVE-2019-1559 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-1559 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-1559 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-1559 - https://www.tenable.com/security/tns-2019-02 +CVE-2019-15591 - https://hackerone.com/reports/676976 +CVE-2019-15593 - https://hackerone.com/reports/557154 +CVE-2019-15595 - https://hackerone.com/reports/544928 +CVE-2019-15596 - https://hackerone.com/reports/695416 +CVE-2019-15597 - https://hackerone.com/reports/703412 +CVE-2019-15598 - https://hackerone.com/reports/703415 +CVE-2019-15599 - https://hackerone.com/reports/701183 +CVE-2019-15600 - https://hackerone.com/reports/692262 +CVE-2019-15602 - https://hackerone.com/reports/507159 +CVE-2019-15603 - https://hackerone.com/reports/665302 +CVE-2019-15604 - https://hackerone.com/reports/746733 +CVE-2019-15604 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-15604 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15605 - https://hackerone.com/reports/735748 +CVE-2019-15605 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-15605 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15606 - https://hackerone.com/reports/730779 +CVE-2019-15606 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-15606 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15607 - https://hackerone.com/reports/681986 +CVE-2019-15608 - https://hackerone.com/reports/703138 +CVE-2019-15609 - https://hackerone.com/reports/661959 +CVE-2019-15610 - https://hackerone.com/reports/673724 +CVE-2019-15611 - https://hackerone.com/reports/672623 +CVE-2019-15613 - https://hackerone.com/reports/697959 +CVE-2019-15614 - https://hackerone.com/reports/575562 +CVE-2019-15616 - https://hackerone.com/reports/592864 +CVE-2019-15617 - https://hackerone.com/reports/722748 +CVE-2019-15618 - https://hackerone.com/reports/515484 +CVE-2019-15619 - https://hackerone.com/reports/662204 +CVE-2019-15620 - https://hackerone.com/reports/662218 +CVE-2019-15621 - https://hackerone.com/reports/619484 +CVE-2019-15622 - https://hackerone.com/reports/518669 +CVE-2019-15623 - https://hackerone.com/reports/508490 +CVE-2019-15624 - https://hackerone.com/reports/508493 +CVE-2019-15627 - http://packetstormsecurity.com/files/155579/Trend-Micro-Deep-Security-Agent-11-Arbitrary-File-Overwrite.html +CVE-2019-15628 - https://safebreach.com/Post/Trend-Micro-Security-16-DLL-Search-Order-Hijacking-and-Potential-Abuses-CVE-2019-15628 +CVE-2019-1563 - http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html +CVE-2019-1563 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-1563 - https://seclists.org/bugtraq/2019/Oct/1 +CVE-2019-1563 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-1563 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-1563 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-1563 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-1563 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-15637 - https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html +CVE-2019-15639 - http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html +CVE-2019-15643 - https://wpvulndb.com/vulnerabilities/9833 +CVE-2019-15644 - https://wpvulndb.com/vulnerabilities/9433 +CVE-2019-15645 - https://wpvulndb.com/vulnerabilities/9433 +CVE-2019-15646 - https://wpvulndb.com/vulnerabilities/9830 +CVE-2019-15647 - https://wpvulndb.com/vulnerabilities/9834 +CVE-2019-15648 - https://wpvulndb.com/vulnerabilities/9416 +CVE-2019-15649 - https://wpvulndb.com/vulnerabilities/9415 +CVE-2019-15650 - https://wpvulndb.com/vulnerabilities/9837 +CVE-2019-15652 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26455 +CVE-2019-15653 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 +CVE-2019-15654 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 +CVE-2019-15655 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26165 +CVE-2019-15656 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26165 +CVE-2019-15659 - https://wpvulndb.com/vulnerabilities/9835 +CVE-2019-1566 - https://www.purplemet.com/blog/palo-alto-firewall-multiple-xss-vulnerabilities +CVE-2019-15661 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0005/FEYE-2019-0005.md +CVE-2019-15662 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0006/FEYE-2019-0006.md +CVE-2019-15663 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0007/FEYE-2019-0007.md +CVE-2019-15664 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0008/FEYE-2019-0008.md +CVE-2019-15665 - https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0009/FEYE-2019-0009.md +CVE-2019-15666 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427 +CVE-2019-15682 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/ +CVE-2019-15684 - https://hackerone.com/reports/470519 +CVE-2019-15684 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 +CVE-2019-15685 - https://hackerone.com/reports/470544 +CVE-2019-15685 - https://hackerone.com/reports/470547 +CVE-2019-15685 - https://hackerone.com/reports/470553 +CVE-2019-15685 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 +CVE-2019-15686 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 +CVE-2019-15687 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 +CVE-2019-15688 - https://hackerone.com/reports/469372 +CVE-2019-15688 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 +CVE-2019-15689 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219 +CVE-2019-15701 - https://github.com/BloodHoundAD/BloodHound/issues/267 +CVE-2019-15702 - https://github.com/RIOT-OS/RIOT/issues/12086 +CVE-2019-15708 - https://fortiguard.com/psirt/FG-IR-19-209 +CVE-2019-15711 - https://fortiguard.com/psirt/FG-IR-19-238 +CVE-2019-15714 - https://github.com/entropic-dev/entropic/issues/251 +CVE-2019-15715 - http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html +CVE-2019-15719 - http://packetstormsecurity.com/files/154782/PBS-Professional-19.2.3-Authentication-Bypass.html +CVE-2019-15720 - https://www.sevenlayers.com/index.php/243-cloudberry-backup-local-privilege-escalation +CVE-2019-15721 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15722 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15723 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15724 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15725 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15725 - https://gitlab.com/gitlab-org/gitlab-ee/issues/11431 +CVE-2019-15726 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15727 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15728 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15729 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-1573 - https://www.kb.cert.org/vuls/id/192371 +CVE-2019-15730 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15731 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15732 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15733 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15734 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15736 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15737 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15738 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15739 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15740 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15741 - http://packetstormsecurity.com/files/154734/GitLab-Omnibus-12.2.1-Logrotate-Privilege-Escalation.html +CVE-2019-15741 - http://seclists.org/fulldisclosure/2019/Oct/7 +CVE-2019-15741 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ +CVE-2019-15741 - https://gitlab.com/gitlab-org/omnibus-gitlab/issues/4380 +CVE-2019-15742 - http://packetstormsecurity.com/files/155952/Plantronics-Hub-SpokesUpdateService-Privilege-Escalation.html +CVE-2019-15752 - http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-Privilege-Escalation.html +CVE-2019-15752 - https://medium.com/@morgan.henry.roman/elevation-of-privilege-in-docker-for-windows-2fd8450b478e +CVE-2019-15758 - https://github.com/WebAssembly/binaryen/issues/2288 +CVE-2019-15759 - https://github.com/WebAssembly/binaryen/issues/2288 +CVE-2019-15766 - https://rastating.github.io/ksweb-android-remote-code-execution/ +CVE-2019-15769 - https://wpvulndb.com/vulnerabilities/9848 +CVE-2019-15770 - https://wpvulndb.com/vulnerabilities/9849 +CVE-2019-15771 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ +CVE-2019-15771 - https://wpvulndb.com/vulnerabilities/9485 +CVE-2019-15772 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ +CVE-2019-15772 - https://wpvulndb.com/vulnerabilities/9493 +CVE-2019-15773 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ +CVE-2019-15773 - https://wpvulndb.com/vulnerabilities/9491 +CVE-2019-15774 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ +CVE-2019-15774 - https://wpvulndb.com/vulnerabilities/9494 +CVE-2019-15775 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ +CVE-2019-15775 - https://wpvulndb.com/vulnerabilities/9496 +CVE-2019-15776 - https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/ +CVE-2019-15776 - https://wpvulndb.com/vulnerabilities/9503 +CVE-2019-15777 - https://wpvulndb.com/vulnerabilities/9850 +CVE-2019-15778 - https://wpvulndb.com/vulnerabilities/9852 +CVE-2019-15779 - https://wpvulndb.com/vulnerabilities/9853 +CVE-2019-15780 - https://wpvulndb.com/vulnerabilities/9935 +CVE-2019-15781 - https://wpvulndb.com/vulnerabilities/9851 +CVE-2019-15782 - https://hackerone.com/reports/681617 +CVE-2019-15789 - https://pulsesecurity.co.nz/advisories/microk8s-privilege-escalation +CVE-2019-1579 - https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study/ +CVE-2019-15790 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html +CVE-2019-15790 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1839795 +CVE-2019-15791 - https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1 +CVE-2019-15792 - https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=5df147c8140efc71ac0879ae3b0057f577226d4c +CVE-2019-15805 - https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 +CVE-2019-15806 - https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 +CVE-2019-15807 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 +CVE-2019-15807 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d +CVE-2019-15809 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-15809 - https://tches.iacr.org/index.php/TCHES/article/view/7337 +CVE-2019-15811 - http://packetstormsecurity.com/files/154270/DomainMod-4.13-Cross-Site-Scripting.html +CVE-2019-15813 - http://packetstormsecurity.com/files/159712/Sentrifugo-3.2-Shell-Upload-Restriction-Bypass.html +CVE-2019-15813 - https://www.exploit-db.com/exploits/47323 +CVE-2019-15814 - https://www.exploit-db.com/exploits/47324 +CVE-2019-15816 - https://wpvulndb.com/vulnerabilities/9817 +CVE-2019-15817 - https://wpvulndb.com/vulnerabilities/9511 +CVE-2019-15818 - https://wpvulndb.com/vulnerabilities/9503 +CVE-2019-15819 - https://wpvulndb.com/vulnerabilities/9501 +CVE-2019-15820 - https://wpvulndb.com/vulnerabilities/9500 +CVE-2019-15821 - https://wpvulndb.com/vulnerabilities/9703 +CVE-2019-15822 - https://wpvulndb.com/vulnerabilities/9470 +CVE-2019-15823 - https://wpvulndb.com/vulnerabilities/9469 +CVE-2019-15824 - https://wpvulndb.com/vulnerabilities/9469 +CVE-2019-15825 - https://wpvulndb.com/vulnerabilities/9469 +CVE-2019-15826 - https://wpvulndb.com/vulnerabilities/9469 +CVE-2019-15827 - https://wpvulndb.com/vulnerabilities/9478 +CVE-2019-15827 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5530.php +CVE-2019-15828 - https://wpvulndb.com/vulnerabilities/9448 +CVE-2019-15829 - https://wpvulndb.com/vulnerabilities/9443 +CVE-2019-15830 - https://wpvulndb.com/vulnerabilities/9440 +CVE-2019-15831 - https://wpvulndb.com/vulnerabilities/9420 +CVE-2019-15832 - https://wpvulndb.com/vulnerabilities/9420 +CVE-2019-15833 - https://wpvulndb.com/vulnerabilities/9418 +CVE-2019-15834 - https://wpvulndb.com/vulnerabilities/9400 +CVE-2019-15835 - https://wpvulndb.com/vulnerabilities/9398 +CVE-2019-15836 - https://wpvulndb.com/vulnerabilities/9394 +CVE-2019-15837 - https://wpvulndb.com/vulnerabilities/9389 +CVE-2019-15838 - https://wpvulndb.com/vulnerabilities/9857 +CVE-2019-15839 - https://wpvulndb.com/vulnerabilities/9368 +CVE-2019-15845 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-15846 - http://exim.org/static/doc/security/CVE-2019-15846.txt +CVE-2019-15846 - https://exim.org/static/doc/security/CVE-2019-15846.txt +CVE-2019-15846 - https://www.kb.cert.org/vuls/id/672565 +CVE-2019-15848 - https://gist.github.com/JLLeitschuh/fe6784391254b58de680bbda78a04a70 +CVE-2019-15848 - https://www.softwaresecured.com/jetbrains-teamcity-reflected-xss/ +CVE-2019-15849 - https://noskill1337.github.io/homematic-ccu3-session-fixation +CVE-2019-15850 - https://noskill1337.github.io/homematic-ccu3-remote-code-execution +CVE-2019-15858 - https://wpvulndb.com/vulnerabilities/9490 +CVE-2019-15859 - http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html +CVE-2019-15860 - https://gist.github.com/RootUp/b5de893bb2e51a4c846c5a0caa13b666 +CVE-2019-15864 - https://wpvulndb.com/vulnerabilities/9338 +CVE-2019-15865 - https://wpvulndb.com/vulnerabilities/9338 +CVE-2019-15867 - https://wpvulndb.com/vulnerabilities/9317 +CVE-2019-15868 - https://wpvulndb.com/vulnerabilities/9335 +CVE-2019-15869 - https://wpvulndb.com/vulnerabilities/9322 +CVE-2019-15870 - https://wpvulndb.com/vulnerabilities/9258 +CVE-2019-15873 - https://wpvulndb.com/vulnerabilities/9086 +CVE-2019-15889 - http://packetstormsecurity.com/files/154356/WordPress-Download-Manager-2.9.93-Cross-Site-Scripting.html +CVE-2019-15889 - https://packetstormsecurity.com/files/152511/WordPress-Download-Manager-2.9.92-Cross-Site-Scripting.html +CVE-2019-15889 - https://packetstormsecurity.com/files/152552/WordPress-Download-Manager-2.9.93-Cross-Site-Scripting.html +CVE-2019-15889 - https://wpvulndb.com/vulnerabilities/9257 +CVE-2019-15889 - https://www.cybersecurity-help.cz/vdb/SB2019041819 +CVE-2019-15890 - https://usn.ubuntu.com/4191-1/ +CVE-2019-15893 - https://hackerone.com/reports/683965 +CVE-2019-15893 - https://support.sonatype.com/hc/en-us/articles/360035055794 +CVE-2019-15894 - https://www.espressif.com/en/news/Espressif_Security_Advisory_Concerning_Fault_Injection_and_Secure_Boot +CVE-2019-15895 - https://wpvulndb.com/vulnerabilities/9870 +CVE-2019-15896 - https://wpvulndb.com/vulnerabilities/9871 +CVE-2019-15897 - http://packetstormsecurity.com/files/155573/BeeGFS-7.1.3-Privilege-Escalation.html +CVE-2019-15903 - http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html +CVE-2019-15903 - http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html +CVE-2019-15903 - http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html +CVE-2019-15903 - https://github.com/libexpat/libexpat/pull/318 +CVE-2019-15903 - https://usn.ubuntu.com/4202-1/ +CVE-2019-15903 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-15903 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-15910 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15910.md +CVE-2019-15911 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15911.md +CVE-2019-15912 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15912_1.md +CVE-2019-15912 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15912_2.md +CVE-2019-15913 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15913.md +CVE-2019-15914 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15914_1.md +CVE-2019-15914 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15914_2.md +CVE-2019-15915 - https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15915.md +CVE-2019-15916 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab +CVE-2019-15917 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-15925 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-15925 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f25edb48c441fc278ecc154c270f16966cbb90 +CVE-2019-15926 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-15926 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab +CVE-2019-15927 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46 +CVE-2019-15929 - http://packetstormsecurity.com/files/155012/Craft-CMS-Rate-Limiting-Brute-Force.html +CVE-2019-15930 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15931 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15932 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15933 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15934 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15935 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15936 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-15940 - https://blog.avira.com/victure-pc530-home-insecurity-you-can-install-yourself/ +CVE-2019-15942 - https://trac.ffmpeg.org/ticket/8093 +CVE-2019-15943 - http://packetstormsecurity.com/files/154705/Counter-Strike-Global-Offensive-Code-Execution-Denial-Of-Service.html +CVE-2019-15943 - https://github.com/bi7s/CVE/blob/master/CVE-2019-15943/README.md +CVE-2019-15947 - https://github.com/bitcoin/bitcoin/issues/16824 +CVE-2019-15948 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/ti_wl18xx_adv_rce.py +CVE-2019-15948 - https://www.youtube.com/watch?v=bk5lOxieqbA +CVE-2019-15949 - http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html +CVE-2019-15949 - http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html +CVE-2019-15949 - https://github.com/jakgibb/nagiosxi-root-rce-exploit +CVE-2019-15950 - https://github.com/zerohax/RedmineUP-XSS/blob/master/vcard-upload-xss +CVE-2019-15952 - http://packetstormsecurity.com/files/154340/Totaljs-CMS-12.0-Path-Traversal.html +CVE-2019-15954 - http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html +CVE-2019-15955 - https://seclists.org/fulldisclosure/2019/Sep/3 +CVE-2019-15961 - https://bugzilla.clamav.net/show_bug.cgi?id=12380 +CVE-2019-15975 - http://packetstormsecurity.com/files/156238/Cisco-Data-Center-Network-Manager-11.2-Remote-Code-Execution.html +CVE-2019-15975 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass +CVE-2019-15976 - http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html +CVE-2019-15976 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass +CVE-2019-15977 - http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html +CVE-2019-15977 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass +CVE-2019-15978 - http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html +CVE-2019-15978 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject +CVE-2019-15979 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject +CVE-2019-15980 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav +CVE-2019-15981 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav +CVE-2019-15982 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav +CVE-2019-15983 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-xml-ext-entity +CVE-2019-15984 - http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html +CVE-2019-15984 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-inject +CVE-2019-15985 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-inject +CVE-2019-15992 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce +CVE-2019-15993 - http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html +CVE-2019-15999 - http://packetstormsecurity.com/files/155870/Cisco-DCNM-JBoss-10.4-Credential-Leakage.html +CVE-2019-15999 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-unauth-access +CVE-2019-16056 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-16056 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-16057 - https://blog.cystack.net/d-link-dns-320-rce/ +CVE-2019-16061 - https://www.mogozobo.com/?p=3647 +CVE-2019-16062 - https://www.mogozobo.com/?p=3647 +CVE-2019-16063 - https://www.mogozobo.com/?p=3647 +CVE-2019-16064 - https://www.mogozobo.com/?p=3647 +CVE-2019-16065 - https://www.mogozobo.com/?p=3647 +CVE-2019-16066 - https://www.mogozobo.com/?p=3647 +CVE-2019-16067 - https://www.mogozobo.com/?p=3647 +CVE-2019-16068 - https://www.mogozobo.com/?p=3647 +CVE-2019-16069 - https://www.mogozobo.com/?p=3647 +CVE-2019-16070 - https://www.mogozobo.com/?p=3647 +CVE-2019-16071 - https://www.mogozobo.com/?p=3647 +CVE-2019-16072 - https://www.mogozobo.com/?p=3647 +CVE-2019-16088 - https://gist.github.com/RootUp/3d9e90ea5ae0799305b4c7ec66e19387 +CVE-2019-16089 - https://usn.ubuntu.com/4414-1/ +CVE-2019-16096 - https://github.com/antirez/kilo/issues/60 +CVE-2019-16097 - https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ +CVE-2019-16098 - https://github.com/Barakat/CVE-2019-16098 +CVE-2019-16108 - https://hackerone.com/reports/587727 +CVE-2019-16112 - https://www.exploit-db.com/exploits/48462 +CVE-2019-16113 - http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html +CVE-2019-16113 - http://packetstormsecurity.com/files/157988/Bludit-3.9.12-Directory-Traversal.html +CVE-2019-16113 - http://packetstormsecurity.com/files/158569/Bludit-3.9.2-Directory-Traversal.html +CVE-2019-16113 - https://github.com/bludit/bludit/issues/1081 +CVE-2019-16116 - https://rhinosecuritylabs.com/application-security/completeftp-server-local-privesc-cve-2019-16116/ +CVE-2019-16117 - http://packetstormsecurity.com/files/154433/WordPress-Photo-Gallery-1.5.34-Cross-Site-Scripting.html +CVE-2019-16117 - https://wpvulndb.com/vulnerabilities/9872 +CVE-2019-16118 - http://packetstormsecurity.com/files/154433/WordPress-Photo-Gallery-1.5.34-Cross-Site-Scripting.html +CVE-2019-16118 - https://wpvulndb.com/vulnerabilities/9872 +CVE-2019-16119 - http://packetstormsecurity.com/files/154432/WordPress-Photo-Gallery-1.5.34-SQL-Injection.html +CVE-2019-16119 - https://wpvulndb.com/vulnerabilities/9872 +CVE-2019-16120 - https://wpvulndb.com/vulnerabilities/9858 +CVE-2019-16120 - https://www.exploit-db.com/exploits/47335 +CVE-2019-16123 - https://www.exploit-db.com/exploits/47315 +CVE-2019-16124 - https://www.exploit-db.com/exploits/47326 +CVE-2019-16125 - https://www.exploit-db.com/exploits/47314 +CVE-2019-16130 - https://github.com/weison-tech/yii2-cms/issues/2 +CVE-2019-16152 - https://fortiguard.com/psirt/FG-IR-19-238 +CVE-2019-16155 - https://fortiguard.com/psirt/FG-IR-19-238 +CVE-2019-16156 - https://fortiguard.com/advisory/FG-IR-19-265 +CVE-2019-16161 - https://github.com/k-takata/Onigmo/issues/132 +CVE-2019-16162 - https://github.com/k-takata/Onigmo/issues/139 +CVE-2019-16163 - https://github.com/kkos/oniguruma/issues/147 +CVE-2019-16164 - https://github.com/lexborisov/myhtml/issues/175 +CVE-2019-16165 - https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00001.html +CVE-2019-16166 - https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html +CVE-2019-16167 - https://github.com/sysstat/sysstat/issues/230 +CVE-2019-16168 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-16168 - https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg116312.html +CVE-2019-16168 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-16168 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16172 - http://packetstormsecurity.com/files/154479/LimeSurvey-3.17.13-Cross-Site-Scripting.html +CVE-2019-16172 - http://seclists.org/fulldisclosure/2019/Sep/22 +CVE-2019-16172 - https://seclists.org/bugtraq/2019/Sep/27 +CVE-2019-16173 - http://packetstormsecurity.com/files/154479/LimeSurvey-3.17.13-Cross-Site-Scripting.html +CVE-2019-16173 - http://seclists.org/fulldisclosure/2019/Sep/22 +CVE-2019-16173 - https://seclists.org/bugtraq/2019/Sep/27 +CVE-2019-1619 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html +CVE-2019-1619 - http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1619 - http://seclists.org/fulldisclosure/2019/Jul/7 +CVE-2019-1619 - https://seclists.org/bugtraq/2019/Jul/11 +CVE-2019-1619 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass +CVE-2019-16193 - https://www.facebook.com/Huang.YuHsiang.Phone/posts/1795457353931689 +CVE-2019-16197 - http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html +CVE-2019-16198 - https://rastating.github.io/ksweb-android-remote-code-execution/ +CVE-2019-1620 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html +CVE-2019-1620 - http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1620 - http://seclists.org/fulldisclosure/2019/Jul/7 +CVE-2019-1620 - https://seclists.org/bugtraq/2019/Jul/11 +CVE-2019-1620 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-codex +CVE-2019-16201 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-1621 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html +CVE-2019-1621 - http://seclists.org/fulldisclosure/2019/Jul/7 +CVE-2019-1621 - https://seclists.org/bugtraq/2019/Jul/11 +CVE-2019-1621 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-file-dwnld +CVE-2019-16214 - https://blog.openzeppelin.com/libra-vulnerability-summary/ +CVE-2019-16218 - https://wpvulndb.com/vulnerabilities/9861 +CVE-2019-16219 - https://wpvulndb.com/vulnerabilities/9864 +CVE-2019-1622 - http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html +CVE-2019-1622 - http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1622 - http://seclists.org/fulldisclosure/2019/Jul/7 +CVE-2019-1622 - https://seclists.org/bugtraq/2019/Jul/11 +CVE-2019-1622 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-infodiscl +CVE-2019-16220 - https://wpvulndb.com/vulnerabilities/9863 +CVE-2019-16221 - https://wpvulndb.com/vulnerabilities/9865 +CVE-2019-16223 - http://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.html +CVE-2019-16223 - https://wpvulndb.com/vulnerabilities/9862 +CVE-2019-16224 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20initialization%20vuln +CVE-2019-16225 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20write%20to%20illegal%20address +CVE-2019-16226 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memory%20corruption%20vuln +CVE-2019-16227 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memcpy%20illegal%20dst +CVE-2019-16228 - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/FPE +CVE-2019-16229 - https://usn.ubuntu.com/4287-2/ +CVE-2019-16231 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html +CVE-2019-16232 - https://usn.ubuntu.com/4287-2/ +CVE-2019-16234 - https://usn.ubuntu.com/4342-1/ +CVE-2019-16235 - https://usn.ubuntu.com/4306-1/ +CVE-2019-16236 - https://usn.ubuntu.com/4306-1/ +CVE-2019-16237 - https://usn.ubuntu.com/4306-1/ +CVE-2019-16239 - https://t2.fi/schedule/2019/ +CVE-2019-16246 - https://know.bishopfox.com/advisories +CVE-2019-16246 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-16247 - https://code610.blogspot.com/2019/09/crashing-dcisoft-121.html +CVE-2019-16248 - https://github.com/RootUp/PersonalStuff/blob/master/Telegram_Privacy.pdf +CVE-2019-16248 - https://www.inputzero.io/2019/09/telegram-privacy-fails-again.html +CVE-2019-16250 - https://blog.nintechnet.com/settings-change-and-css-injection-in-wordpress-ocean-extra-plugin/ +CVE-2019-16251 - https://wpvulndb.com/vulnerabilities/9932 +CVE-2019-16252 - https://arxiv.org/pdf/2005.08208.pdf +CVE-2019-16253 - http://packetstormsecurity.com/files/154614/Samsung-Mobile-Android-SamsungTTS-Privilege-Escalation.html +CVE-2019-16253 - https://blog.flanker017.me/text-to-speech-speaks-pwned/ +CVE-2019-16253 - https://github.com/flankerhqd/vendor-android-cves/tree/master/SMT-CVE-2019-16253 +CVE-2019-16254 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16255 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16258 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-026.txt +CVE-2019-16263 - https://blog.appicaptor.com/2019/10/04/vulnerable-library-warning-twitterkit-for-ios/ +CVE-2019-16264 - https://infayer.com/?p=43 +CVE-2019-16268 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-16268-html-injection-vulnerability-in-manageengine-remote-access-plus/ +CVE-2019-16278 - http://packetstormsecurity.com/files/155045/Nostromo-1.9.6-Directory-Traversal-Remote-Command-Execution.html +CVE-2019-16278 - http://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Execution.html +CVE-2019-16282 - https://www.exploit-db.com/exploits/47496 +CVE-2019-16285 - http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html +CVE-2019-16285 - http://seclists.org/fulldisclosure/2020/Mar/30 +CVE-2019-16286 - http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html +CVE-2019-16286 - http://seclists.org/fulldisclosure/2020/Mar/37 +CVE-2019-16287 - http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html +CVE-2019-16287 - http://seclists.org/fulldisclosure/2020/Mar/38 +CVE-2019-16289 - https://generaleg0x01.com/2019/09/13/xss-woody/ +CVE-2019-16289 - https://wpvulndb.com/vulnerabilities/9880 +CVE-2019-16294 - http://packetstormsecurity.com/files/154706/Notepad-Code-Execution-Denial-Of-Service.html +CVE-2019-16294 - https://github.com/bi7s/CVE/tree/master/CVE-2019-16294 +CVE-2019-16295 - http://packetstormsecurity.com/files/154990/CWP-0.9.8.885-Cross-Site-Scripting.html +CVE-2019-16303 - https://github.com/jhipster/generator-jhipster/issues/10401 +CVE-2019-16303 - https://github.com/jhipster/jhipster-kotlin/issues/183 +CVE-2019-16305 - https://freetom.github.io/0day/2019/09/14/MobaXterm-command-exec-in-protocol-handler.html +CVE-2019-16307 - https://gist.github.com/izadgot/3efc75f62f9c9567c8f11bad74165425 +CVE-2019-16326 - https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ +CVE-2019-16327 - https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ +CVE-2019-16330 - https://www.exploit-db.com/exploits/47505 +CVE-2019-16332 - https://packetstormsecurity.com/files/154369/WordPress-API-Bearer-Auth-20181229-Cross-Site-Scripting.html +CVE-2019-16332 - https://wpvulndb.com/vulnerabilities/9868 +CVE-2019-16335 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-16335 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16335 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-16335 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-16335 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-16336 - https://www.youtube.com/watch?v=Iw8sIBLWE_w +CVE-2019-16337 - https://starlabs.sg/advisories/ +CVE-2019-16338 - https://starlabs.sg/advisories/ +CVE-2019-16340 - https://puzzor.github.io/Linksys-Velop-Authentication-bypass +CVE-2019-16346 - https://github.com/miniupnp/ngiflib/issues/11 +CVE-2019-16347 - https://github.com/miniupnp/ngiflib/issues/12 +CVE-2019-16348 - https://github.com/marc-q/libwav/issues/24 +CVE-2019-16349 - https://github.com/axiomatic-systems/Bento4/issues/422 +CVE-2019-16350 - https://github.com/rockcarry/ffjpeg/issues/10 +CVE-2019-16351 - https://github.com/rockcarry/ffjpeg/issues/11 +CVE-2019-16352 - https://github.com/rockcarry/ffjpeg/issues/12 +CVE-2019-16383 - http://packetstormsecurity.com/files/157208/MOVEit-Transfer-11.1.1-SQL-Injection.html +CVE-2019-16384 - https://labs.nettitude.com/blog/cve-2019-16384-85-cyblesoft-thinfinity-virtualui-path-traversal-http-header-injection/ +CVE-2019-16385 - https://labs.nettitude.com/blog/cve-2019-16384-85-cyblesoft-thinfinity-virtualui-path-traversal-http-header-injection/ +CVE-2019-16399 - http://packetstormsecurity.com/files/154524/Western-Digital-My-Book-World-II-NAS-1.02.12-Hardcoded-Credential.html +CVE-2019-16404 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16404/README.md +CVE-2019-16405 - http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html +CVE-2019-16405 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html +CVE-2019-16413 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5e3cc1ee1405a7eb3487ed24f786dec01b4cbe1f +CVE-2019-16414 - http://packetstormsecurity.com/files/154678/GFI-Kerio-Control-9.3.0-Cross-Site-Scripting.html +CVE-2019-16414 - http://seclists.org/fulldisclosure/2019/Sep/35 +CVE-2019-16414 - https://www.youtube.com/watch?v=ZqqR89vzZ_I +CVE-2019-16416 - https://gist.github.com/svennergr/501409fbdb0ef4a8b0f07a26a2815fbb +CVE-2019-16417 - https://gist.github.com/svennergr/204038bda1849ebce9af32eea9e55038 +CVE-2019-1642 - https://www.exploit-db.com/exploits/46263/ +CVE-2019-1649 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot +CVE-2019-16512 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 +CVE-2019-16512 - https://know.bishopfox.com/advisories +CVE-2019-16512 - https://know.bishopfox.com/advisories/connectwise-control +CVE-2019-16513 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 +CVE-2019-16513 - https://know.bishopfox.com/advisories +CVE-2019-16513 - https://know.bishopfox.com/advisories/connectwise-control +CVE-2019-16514 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 +CVE-2019-16514 - https://know.bishopfox.com/advisories +CVE-2019-16514 - https://know.bishopfox.com/advisories/connectwise-control +CVE-2019-16515 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 +CVE-2019-16515 - https://know.bishopfox.com/advisories +CVE-2019-16515 - https://know.bishopfox.com/advisories/connectwise-control +CVE-2019-16515 - https://wpvulndb.com/vulnerabilities/10013 +CVE-2019-16516 - http://packetstormsecurity.com/files/165432/ConnectWise-Control-19.2.24707-Username-Enumeration.html +CVE-2019-16516 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 +CVE-2019-16516 - https://know.bishopfox.com/advisories +CVE-2019-16516 - https://know.bishopfox.com/advisories/connectwise-control +CVE-2019-16517 - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 +CVE-2019-16517 - https://know.bishopfox.com/advisories +CVE-2019-16517 - https://know.bishopfox.com/advisories/connectwise-control +CVE-2019-1652 - http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html +CVE-2019-1652 - http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1652 - http://seclists.org/fulldisclosure/2019/Mar/61 +CVE-2019-1652 - https://seclists.org/bugtraq/2019/Mar/55 +CVE-2019-1652 - https://www.exploit-db.com/exploits/46243/ +CVE-2019-1652 - https://www.exploit-db.com/exploits/46655/ +CVE-2019-16520 - http://www.openwall.com/lists/oss-security/2019/10/16/5 +CVE-2019-16520 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-04_WordPress_Plugin_All_in_One_SEO_Pack +CVE-2019-16520 - https://wpvulndb.com/vulnerabilities/9915 +CVE-2019-16521 - http://www.openwall.com/lists/oss-security/2019/10/16/3 +CVE-2019-16521 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker +CVE-2019-16521 - https://wpvulndb.com/vulnerabilities/9917 +CVE-2019-16522 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-01_WordPress_Plugin_EU_Cookie_Law +CVE-2019-16522 - https://wpvulndb.com/vulnerabilities/9918 +CVE-2019-16523 - http://www.openwall.com/lists/oss-security/2019/10/16/4 +CVE-2019-16523 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-03_WordPress_Plugin_Events_Manager +CVE-2019-16523 - https://wpvulndb.com/vulnerabilities/9916 +CVE-2019-16524 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190911-01_Easy_FancyBox_WP_Plugin_Stored_XSS +CVE-2019-16524 - https://wpvulndb.com/vulnerabilities/9891 +CVE-2019-16525 - https://packetstormsecurity.com/files/154436/WordPress-Checklist-1.1.5-Cross-Site-Scripting.html +CVE-2019-16525 - https://wpvulndb.com/vulnerabilities/9877 +CVE-2019-1653 - http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html +CVE-2019-1653 - http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html +CVE-2019-1653 - http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1653 - http://seclists.org/fulldisclosure/2019/Mar/59 +CVE-2019-1653 - http://seclists.org/fulldisclosure/2019/Mar/60 +CVE-2019-1653 - https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/ +CVE-2019-1653 - https://seclists.org/bugtraq/2019/Mar/53 +CVE-2019-1653 - https://seclists.org/bugtraq/2019/Mar/54 +CVE-2019-1653 - https://threatpost.com/scans-cisco-routers-code-execution/141218/ +CVE-2019-1653 - https://www.exploit-db.com/exploits/46262/ +CVE-2019-1653 - https://www.exploit-db.com/exploits/46655/ +CVE-2019-1653 - https://www.youtube.com/watch?v=bx0RQJDlGbY +CVE-2019-1653 - https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/ +CVE-2019-16530 - https://support.sonatype.com/hc/en-us/articles/360036132453 +CVE-2019-16531 - http://packetstormsecurity.com/files/154549/LayerBB-1.1.3-Cross-Site-Request-Forgery.html +CVE-2019-16531 - https://github.com/0xB9/LayerBB-1.1.3-CSRF/blob/master/README.md +CVE-2019-16532 - https://github.com/yzmcms/yzmcms/issues/28 +CVE-2019-16532 - https://www.exploit-db.com/exploits/47422 +CVE-2019-16533 - https://www.facebook.com/Huang.YuHsiang.Phone/posts/1815316691945755 +CVE-2019-16534 - https://www.facebook.com/Huang.YuHsiang.Phone/posts/1815316691945755 +CVE-2019-1663 - http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html +CVE-2019-1663 - http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html +CVE-2019-1663 - http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html +CVE-2019-1663 - https://www.exploit-db.com/exploits/46705/ +CVE-2019-16645 - http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html +CVE-2019-16645 - https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection +CVE-2019-16647 - https://safebreach.com/Post/Maxthon-Browser-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-16647 +CVE-2019-16649 - https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/ +CVE-2019-16649 - https://github.com/eclypsium/USBAnywhere +CVE-2019-16650 - https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/ +CVE-2019-16650 - https://github.com/eclypsium/USBAnywhere +CVE-2019-16651 - https://fidusinfosec.com/silently-unmasking-virgin-media-vpn-users-in-seconds-cve-2019-16651/ +CVE-2019-16651 - https://portswigger.net/daily-swig/vpn-users-unmasked-by-zero-day-vulnerability-in-virgin-media-routers +CVE-2019-16662 - http://packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html +CVE-2019-16662 - http://packetstormsecurity.com/files/155186/rConfig-3.9.2-Command-Injection.html +CVE-2019-16667 - http://packetstormsecurity.com/files/158614/pfSense-2.4.4-p3-Cross-Site-Request-Forgery.html +CVE-2019-16667 - https://pastebin.com/TEJdu9LN +CVE-2019-16670 - https://cert.vde.com/en-us/advisories +CVE-2019-16670 - https://cert.vde.com/en-us/advisories/vde-2019-018 +CVE-2019-16671 - https://cert.vde.com/en-us/advisories +CVE-2019-16671 - https://cert.vde.com/en-us/advisories/vde-2019-018 +CVE-2019-16672 - https://cert.vde.com/en-us/advisories +CVE-2019-16672 - https://cert.vde.com/en-us/advisories/vde-2019-018 +CVE-2019-16673 - https://cert.vde.com/en-us/advisories +CVE-2019-16673 - https://cert.vde.com/en-us/advisories/vde-2019-018 +CVE-2019-16674 - https://cert.vde.com/en-us/advisories +CVE-2019-16674 - https://cert.vde.com/en-us/advisories/vde-2019-018 +CVE-2019-16675 - https://cert.vde.com/en-us/advisories +CVE-2019-16678 - https://github.com/yzmcms/yzmcms/issues/27 +CVE-2019-16679 - http://packetstormsecurity.com/files/154578/Gila-CMS-Local-File-Inclusion.html +CVE-2019-16680 - https://bugzilla.gnome.org/show_bug.cgi?id=794337 +CVE-2019-16681 - https://github.com/tarantula-team/Traveloka-Android-App-Critical-Vulnerability +CVE-2019-16685 - http://verneet.com/cve-2019-16685/ +CVE-2019-16686 - http://verneet.com/cve-2019-16686 +CVE-2019-16687 - http://verneet.com/cve-2019-16687 +CVE-2019-16688 - http://verneet.com/cve-2019-16688 +CVE-2019-16692 - http://packetstormsecurity.com/files/154651/phpIPAM-1.4-SQL-Injection.html +CVE-2019-16701 - http://packetstormsecurity.com/files/154587/pfSense-2.3.4-2.4.4-p3-Remote-Code-Injection.html +CVE-2019-16702 - http://packetstormsecurity.com/files/155578/Integard-Pro-NoJs-2.2.0.9026-Remote-Buffer-Overflow.html +CVE-2019-16705 - https://github.com/libming/libming/issues/178 +CVE-2019-16714 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.14 +CVE-2019-16716 - http://packetstormsecurity.com/files/155813/OX-App-Suite-7.10.2-Cross-Site-Scripting-Improper-Access-Control.html +CVE-2019-16716 - http://seclists.org/fulldisclosure/2020/Jan/7 +CVE-2019-16717 - http://packetstormsecurity.com/files/155813/OX-App-Suite-7.10.2-Cross-Site-Scripting-Improper-Access-Control.html +CVE-2019-16717 - http://seclists.org/fulldisclosure/2020/Jan/7 +CVE-2019-16724 - http://packetstormsecurity.com/files/154586/File-Sharing-Wizard-1.5.0-SEH-Buffer-Overflow.html +CVE-2019-16724 - http://packetstormsecurity.com/files/154777/File-Sharing-Wizard-1.5.0-POST-SEH-Overflow.html +CVE-2019-16724 - https://www.exploit-db.com/exploits/47412 +CVE-2019-16730 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16730 - https://www.securityevaluators.com/research/ +CVE-2019-16731 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16732 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16733 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16734 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16735 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16736 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-16737 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-1674 - https://www.exploit-db.com/exploits/46479/ +CVE-2019-16743 - http://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html +CVE-2019-16744 - https://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html +CVE-2019-16745 - https://packetstormsecurity.com/files/154624/eBrigade-SQL-Injection.html +CVE-2019-16746 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-16746 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-16754 - https://github.com/RIOT-OS/RIOT/pull/12293 +CVE-2019-16758 - http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html +CVE-2019-16758 - http://seclists.org/fulldisclosure/2019/Nov/17 +CVE-2019-16759 - http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html +CVE-2019-16759 - http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html +CVE-2019-16759 - http://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.html +CVE-2019-16759 - http://packetstormsecurity.com/files/158829/vBulletin-5.x-Remote-Code-Execution.html +CVE-2019-16759 - http://packetstormsecurity.com/files/158830/vBulletin-5.x-Remote-Code-Execution.html +CVE-2019-16759 - http://packetstormsecurity.com/files/158866/vBulletin-5.x-Remote-Code-Execution.html +CVE-2019-16759 - https://seclists.org/fulldisclosure/2019/Sep/31 +CVE-2019-16759 - https://www.theregister.co.uk/2019/09/24/vbulletin_vbug_zeroday/ +CVE-2019-16773 - https://hackerone.com/reports/509930 +CVE-2019-16775 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16775 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-16776 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16777 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16780 - https://wpvulndb.com/vulnerabilities/9976 +CVE-2019-16781 - https://wpvulndb.com/vulnerabilities/9976 +CVE-2019-16785 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-16786 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-16789 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-16792 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-16862 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16862/README.md +CVE-2019-16864 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-16864 +CVE-2019-16868 - https://github.com/emlog/emlog/issues/48 +CVE-2019-16872 - https://fortiguard.com/zeroday/FG-VD-19-120 +CVE-2019-16874 - https://fortiguard.com/zeroday/FG-VD-19-121 +CVE-2019-16884 - https://github.com/opencontainers/runc/issues/2128 +CVE-2019-16885 - http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html +CVE-2019-16885 - http://seclists.org/fulldisclosure/2019/Dec/15 +CVE-2019-16885 - https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms +CVE-2019-16891 - https://dappsec.substack.com/p/an-advisory-for-cve-2019-16891-from +CVE-2019-16891 - https://sec.vnpt.vn/2019/09/liferay-deserialization-json-deserialization-part-4/ +CVE-2019-16891 - https://www.youtube.com/watch?v=DjMEfQW3bf0 +CVE-2019-16892 - https://github.com/rubyzip/rubyzip/pull/403 +CVE-2019-16893 - https://exploit-db.com/exploits/47958 +CVE-2019-16894 - https://www.exploit-db.com/exploits/47426 +CVE-2019-16897 - https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md +CVE-2019-16899 - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html +CVE-2019-16900 - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html +CVE-2019-16901 - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html +CVE-2019-16906 - http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html +CVE-2019-16907 - http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html +CVE-2019-16908 - http://packetstormsecurity.com/files/154992/Infosysta-Jira-1.6.13_J8-Project-List-Authentication-Bypass.html +CVE-2019-16909 - http://packetstormsecurity.com/files/154992/Infosysta-Jira-1.6.13_J8-Project-List-Authentication-Bypass.html +CVE-2019-16913 - https://flipflopsecurity.wordpress.com/2019/10/07/pc-protect-v4-14-31-privilege-esclation/ +CVE-2019-16917 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-16920 - https://www.kb.cert.org/vuls/id/766427 +CVE-2019-16931 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf +CVE-2019-16931 - https://wpvulndb.com/vulnerabilities/9893 +CVE-2019-16932 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf +CVE-2019-16932 - https://wpvulndb.com/vulnerabilities/9892 +CVE-2019-16935 - https://bugs.python.org/issue38243 +CVE-2019-16935 - https://hackerone.com/reports/705420 +CVE-2019-16935 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-16941 - https://github.com/purpleracc00n/CVE-2019-16941 +CVE-2019-16942 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2019-16942 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-16942 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-16942 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-16942 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16942 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-16942 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-16943 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2019-16943 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-16943 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-16943 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-16943 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-16943 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-16948 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ +CVE-2019-16949 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ +CVE-2019-16950 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ +CVE-2019-16951 - https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat/ +CVE-2019-16954 - https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/ +CVE-2019-16955 - https://www.esecforte.com/cross-site-scripting-via-file-upload-vulnerability-in-solarwinds-web-help-desk/ +CVE-2019-16956 - https://www.esecforte.com/cross-site-scripting-vulnerability-india-responsible-vulnerability-disclosure/ +CVE-2019-16957 - https://www.esecforte.com/cross-site-scripting-vulnerability-in-solarwinds-web-help-desk/ +CVE-2019-16958 - https://www.esecforte.com/cross-site-scripting-vulnerability-with-solarwinds-web-help-desk/ +CVE-2019-16959 - https://www.esecforte.com/formula-injection-vulnerability-india-in-solarwinds-web-help-desk/ +CVE-2019-16960 - https://www.esecforte.com/responsible-vulnerability-disclosure-cve-2019-16960-cross-site-scripting-vulnerability-in-solarwinds-web-help-desk/ +CVE-2019-16961 - https://www.esecforte.com/cross-site-scripting-vulnerability-in-solarwinds-web-help-desk-cve-2019-16961-responsible-vulnerability-disclosure/ +CVE-2019-16962 - https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/ +CVE-2019-16999 - https://github.com/idcos/Cloudboot/issues/22 +CVE-2019-17000 - https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 +CVE-2019-17001 - https://bugzilla.mozilla.org/show_bug.cgi?id=1587976 +CVE-2019-17003 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2019-17003 +CVE-2019-17005 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-17008 - https://bugzilla.mozilla.org/show_bug.cgi?id=1546331 +CVE-2019-17008 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-17009 - https://bugzilla.mozilla.org/show_bug.cgi?id=1510494 +CVE-2019-17009 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-17010 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-17011 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-17012 - https://www.mozilla.org/security/advisories/mfsa2019-38/ +CVE-2019-17014 - https://bugzilla.mozilla.org/show_bug.cgi?id=1322864 +CVE-2019-17015 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html +CVE-2019-17015 - https://bugzilla.mozilla.org/show_bug.cgi?id=1599005 +CVE-2019-17016 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html +CVE-2019-17016 - https://bugzilla.mozilla.org/show_bug.cgi?id=1599181 +CVE-2019-17017 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html +CVE-2019-17017 - https://bugzilla.mozilla.org/show_bug.cgi?id=1603055 +CVE-2019-17021 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html +CVE-2019-17021 - https://bugzilla.mozilla.org/show_bug.cgi?id=1599008 +CVE-2019-17022 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html +CVE-2019-17022 - https://bugzilla.mozilla.org/show_bug.cgi?id=1602843 +CVE-2019-17023 - https://usn.ubuntu.com/4397-1/ +CVE-2019-17024 - http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html +CVE-2019-17026 - http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html +CVE-2019-17026 - https://bugzilla.mozilla.org/show_bug.cgi?id=1607443 +CVE-2019-17045 - https://syhack.wordpress.com/2019/09/29/ilch-content-management-system-v-2-1-22-vulnerability-disclosure/ +CVE-2019-17046 - https://syhack.wordpress.com/2019/09/29/ilch-content-management-system-v-2-1-22-insecure-file-upload-lfi-remote-code-execution-critical-vulnerability-disclosure/ +CVE-2019-17052 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17052 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0614e2b73768b502fc32a75349823356d98aae2c +CVE-2019-17052 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b +CVE-2019-17053 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17053 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b +CVE-2019-17053 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef +CVE-2019-17054 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b +CVE-2019-17054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac +CVE-2019-17055 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html +CVE-2019-17055 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b +CVE-2019-17055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80 +CVE-2019-17056 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17056 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b +CVE-2019-17056 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a359798b176183ef09efb7a3dc59abad1cc7104 +CVE-2019-17059 - https://thebestvpn.com/cyberoam-preauth-rce/ +CVE-2019-17062 - https://oxidforge.org/en/security-bulletin-2019-002.html +CVE-2019-17064 - http://packetstormsecurity.com/files/154713/Xpdf-4.02-NULL-Pointer-Dereference.html +CVE-2019-17064 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41890 +CVE-2019-17073 - https://github.com/emlog/emlog/issues/49 +CVE-2019-17075 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17075 - https://usn.ubuntu.com/4208-1/ +CVE-2019-17075 - https://usn.ubuntu.com/4211-2/ +CVE-2019-17075 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17080 - http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html +CVE-2019-17091 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=548244 +CVE-2019-17091 - https://github.com/eclipse-ee4j/mojarra/files/3039198/advisory.txt +CVE-2019-17091 - https://github.com/eclipse-ee4j/mojarra/issues/4556 +CVE-2019-17091 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-17091 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17091 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17091 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-17092 - http://packetstormsecurity.com/files/154851/OpenProject-10.0.1-9.0.3-Cross-Site-Scripting.html +CVE-2019-17092 - http://seclists.org/fulldisclosure/2019/Oct/29 +CVE-2019-17092 - https://seclists.org/bugtraq/2019/Oct/19 +CVE-2019-17093 - https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses +CVE-2019-17094 - https://labs.bitdefender.com/2019/12/multiple-vulnerabilities-in-belkin-wemo-insight-switch/ +CVE-2019-17098 - https://labs.bitdefender.com/2020/08/smart-locks-not-so-smart-with-wi-fi-security/ +CVE-2019-17101 - https://labs.bitdefender.com/2020/04/cracking-the-netatmo-smart-indoor-security-camera/ +CVE-2019-17114 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17115 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17116 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17117 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17118 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17119 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17120 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html +CVE-2019-17123 - https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8 +CVE-2019-17124 - http://packetstormsecurity.com/files/166541/Kramer-VIAware-2.5.0719.1034-Remote-Code-Execution.html +CVE-2019-17124 - https://github.com/hessandrew/CVE-2019-17124 +CVE-2019-17128 - http://packetstormsecurity.com/files/154763/OmniCenter-12.1.1-SQL-Injection.html +CVE-2019-17132 - http://packetstormsecurity.com/files/154759/vBulletin-5.5.4-Remote-Code-Execution.html +CVE-2019-17132 - http://seclists.org/fulldisclosure/2019/Oct/9 +CVE-2019-17133 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-17133 - https://usn.ubuntu.com/4208-1/ +CVE-2019-17133 - https://usn.ubuntu.com/4211-2/ +CVE-2019-17133 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17176 - https://gist.github.com/MortalP0ison/5fd584b4c85fa13281fdc918913446fa +CVE-2019-17177 - https://github.com/FreeRDP/FreeRDP/issues/5645 +CVE-2019-17177 - https://usn.ubuntu.com/4379-1/ +CVE-2019-17178 - https://github.com/FreeRDP/FreeRDP/issues/5645 +CVE-2019-17179 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17179/README.md +CVE-2019-17180 - https://habr.com/ru/company/pm/blog/469507/ +CVE-2019-17181 - https://cxsecurity.com/issue/WLB-2019100164 +CVE-2019-17190 - http://packetstormsecurity.com/files/156844/Avast-Secure-Browser-76.0.1659.101-Local-Privilege-Escalation.html +CVE-2019-17195 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-17195 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-17195 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-17195 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-17206 - https://github.com/frostming/rediswrapper/pull/1 +CVE-2019-17207 - http://packetstormsecurity.com/files/154875/WordPress-Broken-Link-Checker-1.11.8-Cross-Site-Scripting.html +CVE-2019-17207 - http://seclists.org/fulldisclosure/2019/Oct/31 +CVE-2019-17207 - https://wpvulndb.com/vulnerabilities/9917 +CVE-2019-17212 - https://github.com/ARMmbed/mbed-os/issues/11803 +CVE-2019-17213 - https://packetstormsecurity.com/files/149573/WordPress-WebARX-Website-Firewall-4.9.8-XSS-Bypass.html +CVE-2019-17214 - https://packetstormsecurity.com/files/149573/WordPress-WebARX-Website-Firewall-4.9.8-XSS-Bypass.html +CVE-2019-17215 - https://vuldb.com/?id.140463 +CVE-2019-17216 - https://vuldb.com/?id.134117 +CVE-2019-17217 - https://vuldb.com/?id.140464 +CVE-2019-17218 - https://vuldb.com/?id.134116 +CVE-2019-17219 - https://vuldb.com/?id.134115 +CVE-2019-17220 - http://packetstormsecurity.com/files/154944/Rocket.Chat-2.1.0-Cross-Site-Scripting.html +CVE-2019-17220 - https://www.nezami.me/ +CVE-2019-17222 - https://www.youtube.com/watch?v=e3sozdDExTM +CVE-2019-17223 - https://medium.com/@k43p/cve-2019-17223-stored-html-injection-dolibarr-crm-erp-ad1e064d0ca5 +CVE-2019-17224 - https://vulnerabilities.home.blog/2019/10/27/again-a-vunerability-in-cable-router-ch7465lg-cve-2019-17224/ +CVE-2019-17225 - http://packetstormsecurity.com/files/154746/Subrion-4.2.1-Cross-Site-Scripting.html +CVE-2019-17225 - https://github.com/intelliants/subrion/issues/845 +CVE-2019-17228 - https://wpvulndb.com/vulnerabilities/9884 +CVE-2019-17229 - https://wpvulndb.com/vulnerabilities/9884 +CVE-2019-17232 - https://wpvulndb.com/vulnerabilities/9883 +CVE-2019-17233 - https://wpvulndb.com/vulnerabilities/9883 +CVE-2019-17239 - https://wpvulndb.com/vulnerabilities/9896 +CVE-2019-17240 - http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html +CVE-2019-17240 - http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-Bypass.html +CVE-2019-17240 - https://github.com/bludit/bludit/pull/1090 +CVE-2019-17240 - https://rastating.github.io/bludit-brute-force-mitigation-bypass/ +CVE-2019-17263 - http://packetstormsecurity.com/files/154774/libyal-libfwsi-Buffer-Overread.html +CVE-2019-17263 - https://github.com/libyal/libfwsi/issues/13 +CVE-2019-17264 - https://github.com/libyal/liblnk/issues/38 +CVE-2019-17266 - https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md +CVE-2019-17267 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-17267 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17267 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17270 - http://packetstormsecurity.com/files/155582/Yachtcontrol-2019-10-06-Remote-Code-Execution.html +CVE-2019-17270 - https://www.exploit-db.com/exploits/47760 +CVE-2019-17271 - http://packetstormsecurity.com/files/154758/vBulletin-5.5.4-SQL-Injection.html +CVE-2019-17351 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 +CVE-2019-17355 - https://pastebin.com/GgpFz3ZW +CVE-2019-17356 - https://bit.ly/2kfL7xE +CVE-2019-17356 - https://pastebin.com/yUFxs2J7 +CVE-2019-17359 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-17359 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-17359 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-17359 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17359 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17361 - https://github.com/saltstack/salt/commits/master +CVE-2019-17362 - https://github.com/libtom/libtomcrypt/issues/507 +CVE-2019-17362 - https://github.com/libtom/libtomcrypt/pull/508 +CVE-2019-17362 - https://vuldb.com/?id.142995 +CVE-2019-17364 - https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3 +CVE-2019-17371 - https://github.com/glennrp/libpng/issues/307 +CVE-2019-17371 - https://github.com/glennrp/libpng/issues/307#issuecomment-544779431 +CVE-2019-17371 - https://gitlab.com/esr/gif2png/issues/8 +CVE-2019-17372 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/netgear_cgi_unauthorized_access_vulnerability.md +CVE-2019-17373 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md +CVE-2019-17382 - https://www.exploit-db.com/exploits/47467 +CVE-2019-17384 - https://wpvulndb.com/vulnerabilities/9900 +CVE-2019-17385 - https://wpvulndb.com/vulnerabilities/9900 +CVE-2019-17386 - https://wpvulndb.com/vulnerabilities/9900 +CVE-2019-17387 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html +CVE-2019-17387 - https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/ +CVE-2019-17388 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html +CVE-2019-17388 - https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/ +CVE-2019-17389 - https://github.com/RIOT-OS/RIOT/pull/12382 +CVE-2019-17390 - https://improsec.com +CVE-2019-17391 - https://www.espressif.com/en/news/Security_Advisory_Concerning_Fault_Injection_and_eFuse_Protections +CVE-2019-17392 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-November-2019 +CVE-2019-17393 - http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html +CVE-2019-17393 - http://seclists.org/fulldisclosure/2019/Oct/33 +CVE-2019-17394 - https://pastebin.com/h8v0qxZH +CVE-2019-17395 - https://pastebin.com/8dvs5RcJ +CVE-2019-17396 - https://pastebin.com/9VBiRpAR +CVE-2019-17397 - https://pastebin.com/hGg5efMe +CVE-2019-17398 - https://pastebin.com/5ZDDCqgL +CVE-2019-17400 - https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ +CVE-2019-17401 - https://github.com/libyal/liblnk/issues/40 +CVE-2019-17402 - https://github.com/Exiv2/exiv2/issues/1019 +CVE-2019-17403 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-17404 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-17405 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-17406 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-17408 - https://github.com/Tardis07/CVE_GO/blob/master/zzzphp_code_execution_v1.7.3.md +CVE-2019-17409 - https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17409/README.md +CVE-2019-17415 - https://packetstormsecurity.com/files/154738/File-Sharing-Wizard-1.5.0-DELETE-SEH-Buffer-Overflow.html +CVE-2019-17424 - http://packetstormsecurity.com/files/155378/nipper-ng-0.11.10-Remote-Buffer-Overflow.html +CVE-2019-17426 - https://github.com/Automattic/mongoose/issues/8222 +CVE-2019-17427 - https://github.com/RealLinkers/CVE-2019-17427 +CVE-2019-17428 - https://know.bishopfox.com/advisories +CVE-2019-17428 - https://know.bishopfox.com/advisories/solismed-critical +CVE-2019-17430 - https://github.com/eyoucms/eyoucms/issues/1 +CVE-2019-17449 - https://safebreach.com/Post/Avira-Antivirus-2019-4-Services-DLL-Preloading-and-Potential-Abuses-CVE-2019-17449 +CVE-2019-17450 - https://sourceware.org/bugzilla/show_bug.cgi?id=25078 +CVE-2019-17451 - https://sourceware.org/bugzilla/show_bug.cgi?id=25070 +CVE-2019-17452 - https://github.com/axiomatic-systems/Bento4/issues/434 +CVE-2019-17453 - https://github.com/axiomatic-systems/Bento4/issues/436 +CVE-2019-17453 - https://github.com/axiomatic-systems/Bento4/issues/437 +CVE-2019-17454 - https://github.com/axiomatic-systems/Bento4/issues/435 +CVE-2019-17455 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942145 +CVE-2019-17455 - https://gitlab.com/jas/libntlm/issues/2 +CVE-2019-17489 - https://github.com/shi-yang/jnoj/issues/51 +CVE-2019-17490 - https://github.com/shi-yang/jnoj/issues/51 +CVE-2019-17491 - https://github.com/shi-yang/jnoj/issues/51 +CVE-2019-17493 - https://github.com/shi-yang/jnoj/issues/51 +CVE-2019-17495 - https://github.com/tarantula-team/CSS-injection-in-Swagger-UI +CVE-2019-17495 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17495 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-17495 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-17495 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17498 - http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html +CVE-2019-17502 - https://gist.github.com/fxb6476/0b9883a88ff2ca40de46a8469834e16c +CVE-2019-17503 - http://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html +CVE-2019-17504 - http://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html +CVE-2019-17505 - https://github.com/dahua966/Routers-vuls/blob/master/DAP-1320/vuls_poc.md +CVE-2019-17509 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/vuls_info.md +CVE-2019-17510 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/vuls_info.md +CVE-2019-17511 - https://github.com/dahua966/Routers-vuls +CVE-2019-17512 - https://github.com/dahua966/Routers-vuls +CVE-2019-17515 - https://wpvulndb.com/vulnerabilities/9949 +CVE-2019-17520 - https://www.youtube.com/watch?v=Iw8sIBLWE_w +CVE-2019-17521 - https://github.com/Elias-Black/Landing-CMS/issues/8 +CVE-2019-17524 - https://gitlab.com/luiss/cve_repo/blob/master/CVE-2019-17523/README.md +CVE-2019-17525 - http://packetstormsecurity.com/files/157936/D-Link-DIR-615-T1-20.10-CAPTCHA-Bypass.html +CVE-2019-17526 - https://sethsec.blogspot.com/2016/11/exploiting-python-code-injection-in-web.html +CVE-2019-17531 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2019-17531 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-17531 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-17531 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-17531 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17531 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17535 - https://rastating.github.io/gila-cms-reflected-xss/ +CVE-2019-17536 - https://rastating.github.io/gila-cms-upload-filter-bypass-and-rce/ +CVE-2019-17541 - https://github.com/ImageMagick/ImageMagick/issues/1641 +CVE-2019-17543 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-17543 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17545 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-17550 - https://wpvulndb.com/vulnerabilities/9948 +CVE-2019-17554 - http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html +CVE-2019-17558 - http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html +CVE-2019-17558 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17560 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17561 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17563 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-17563 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-17563 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17566 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-17566 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17566 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-17566 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2019-17566 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-17566 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-17567 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-17569 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-17569 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17569 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17570 - http://www.openwall.com/lists/oss-security/2020/01/24/2 +CVE-2019-17570 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp +CVE-2019-17571 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17571 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-17571 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-17571 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17571 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-17573 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17573 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-17574 - https://wpvulndb.com/vulnerabilities/9907 +CVE-2019-17576 - https://mycvee.blogspot.com/p/blog-page.html +CVE-2019-17577 - https://mycvee.blogspot.com/p/cve-2019-17576.html +CVE-2019-17578 - https://mycvee.blogspot.com/p/cve-2019-17578.html +CVE-2019-17582 - https://github.com/nih-at/libzip/issues/5 +CVE-2019-17584 - https://w1n73r.de/CVE/2019/17584/ +CVE-2019-17594 - https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html +CVE-2019-17595 - https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html +CVE-2019-17598 - https://www.playframework.com/security/vulnerability +CVE-2019-17599 - https://wpvulndb.com/vulnerabilities/9977 +CVE-2019-17600 - https://www.exploit-db.com/exploits/46770/ +CVE-2019-17601 - https://packetstormsecurity.com/files/154819/MiniShare-1.4.1-CONNECT-Remote-Buffer-Overflow.html +CVE-2019-17603 - http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html +CVE-2019-17603 - https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/ +CVE-2019-17604 - https://gist.github.com/AhMyth/b0f7e4b8244def8eb8d7d8c61fa6d4e5 +CVE-2019-17605 - https://gist.github.com/AhMyth/6d9c5e15d943dd092ccca19fca8d5d37 +CVE-2019-17612 - https://github.com/Ers4tz/vuln/blob/master/74cms_5.2.8_SQLI.md +CVE-2019-17613 - https://github.com/Ers4tz/vuln/blob/master/qibosoft/qibosoft_v7_remote_code_execution.md +CVE-2019-17621 - http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html +CVE-2019-17621 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104 +CVE-2019-17621 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9 +CVE-2019-17624 - http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html +CVE-2019-17624 - https://www.exploit-db.com/exploits/47507 +CVE-2019-17625 - https://github.com/ramboxapp/community-edition/issues/2418 +CVE-2019-17632 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17632 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17633 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=551596 +CVE-2019-17636 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747 +CVE-2019-17637 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=458571 +CVE-2019-17638 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-17638 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-17643 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 +CVE-2019-17645 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 +CVE-2019-17646 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 +CVE-2019-17647 - https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html#centreon-web-19-10-2 +CVE-2019-17650 - https://fortiguard.com/advisory/FG-IR-19-210 +CVE-2019-17652 - https://fortiguard.com/psirt/FG-IR-19-238 +CVE-2019-17655 - https://fortiguard.com/psirt/FG-IR-20-224 +CVE-2019-17656 - https://fortiguard.com/advisory/FG-IR-21-007 +CVE-2019-17658 - https://fortiguard.com/advisory/FG-IR-19-281 +CVE-2019-17662 - http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html +CVE-2019-17662 - https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py +CVE-2019-17662 - https://redteamzone.com/ThinVNC/ +CVE-2019-17666 - https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/ +CVE-2019-17669 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-17670 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-17671 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-17672 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-17673 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-17674 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-17675 - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html +CVE-2019-1785 - https://bugzilla.clamav.net/show_bug.cgi?id=12284 +CVE-2019-1791 - http://www.securityfocus.com/bid/108390 +CVE-2019-18194 - https://www.youtube.com/watch?v=88qeaLq98Gc +CVE-2019-18196 - https://safebreach.com/Post/TeamViewer-Windows-Client-v11-to-v14-DLL-Preloading-and-Potential-Abuses-CVE-2019-18196 +CVE-2019-18197 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-18198 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 +CVE-2019-18199 - http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html +CVE-2019-18199 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt +CVE-2019-18199 - https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ +CVE-2019-18200 - http://packetstormsecurity.com/files/154956/Fujitsu-Wireless-Keyboard-Set-LX390-Keystroke-Injection.html +CVE-2019-18200 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt +CVE-2019-18200 - https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ +CVE-2019-18201 - http://packetstormsecurity.com/files/154955/Fujitsu-Wireless-Keyboard-Set-LX390-Missing-Encryption.html +CVE-2019-18201 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-010.txt +CVE-2019-18201 - https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ +CVE-2019-18203 - https://medium.com/zero2flag/cve-2019-18203-bfa65918e591 +CVE-2019-1821 - http://packetstormsecurity.com/files/153350/Cisco-Prime-Infrastructure-Health-Monitor-TarArchive-Directory-Traversal.html +CVE-2019-18212 - https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/ +CVE-2019-18213 - https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/ +CVE-2019-18215 - https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215 +CVE-2019-18216 - https://blog.modpr0.be/2019/10/18/asus-rog-bios-reset-on-lost-battery-power/ +CVE-2019-18221 - https://vuldb.com/?id.144170 +CVE-2019-18276 - http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html +CVE-2019-18276 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-18276 - https://www.youtube.com/watch?v=-wGtxJ8opa8 +CVE-2019-18277 - https://nathandavison.com/blog/haproxy-http-request-smuggling +CVE-2019-18278 - https://code610.blogspot.com/2019/10/random-bytes-in-vlc-308.html +CVE-2019-18279 - https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf +CVE-2019-18282 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10 +CVE-2019-18283 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18284 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18285 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18286 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18287 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18288 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18289 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18290 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18291 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18292 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18293 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18294 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18295 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18296 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18297 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18298 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18299 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18300 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18301 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18302 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18303 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18304 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18305 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18306 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18307 - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html +CVE-2019-18344 - https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli +CVE-2019-18345 - http://packetstormsecurity.com/files/155630/DAViCal-CalDAV-Server-1.1.8-Reflective-Cross-Site-Scripting.html +CVE-2019-18345 - https://hackdefense.com/publications/cve-2019-18345-davical-caldav-server-vulnerability/ +CVE-2019-18346 - http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html +CVE-2019-18346 - http://seclists.org/fulldisclosure/2019/Dec/17 +CVE-2019-18346 - http://seclists.org/fulldisclosure/2019/Dec/19 +CVE-2019-18347 - http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html +CVE-2019-18347 - http://seclists.org/fulldisclosure/2019/Dec/17 +CVE-2019-18347 - http://seclists.org/fulldisclosure/2019/Dec/19 +CVE-2019-18347 - https://hackdefense.com/publications/cve-2019-18347-davical-caldav-server-vulnerability/ +CVE-2019-18348 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-18350 - https://github.com/ant-design/ant-design-pro/pull/5461 +CVE-2019-18359 - https://sourceforge.net/p/mp3gain/bugs/46/ +CVE-2019-18370 - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/remote_command_execution_vulnerability.py +CVE-2019-18371 - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/arbitrary_file_read_vulnerability.py +CVE-2019-18387 - https://www.sevenlayers.com/index.php/266-hotel-and-lodge-management-system-1-0-sqli +CVE-2019-18396 - http://packetstormsecurity.com/files/155296/Technicolor-TD5130.2-Remote-Command-Execution.html +CVE-2019-18396 - https://medium.com/@c4pt41nnn/cve-2019-18396-command-injection-in-technicolor-router-da5dd2134052 +CVE-2019-18409 - https://github.com/zenspider/ruby_parser-legacy/issues/1 +CVE-2019-18411 - https://gist.github.com/aliceicl/e32fb4a17277c7db9e0256185ac03dae +CVE-2019-18413 - https://github.com/typestack/class-validator/issues/438 +CVE-2019-18413 - https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 +CVE-2019-18418 - http://packetstormsecurity.com/files/154986/ClonOs-WEB-UI-19.09-Improper-Access-Control.html +CVE-2019-18426 - http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html +CVE-2019-1854 - http://packetstormsecurity.com/files/152963/Cisco-Expressway-Gateway-11.5.1-Directory-Traversal.html +CVE-2019-1854 - http://seclists.org/fulldisclosure/2019/May/28 +CVE-2019-1854 - https://seclists.org/bugtraq/2019/May/49 +CVE-2019-18567 - https://airbus-cyber-security.com/dive-into-a-kernel-bromium-race-condition-cve-2019-18567 +CVE-2019-18608 - https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md +CVE-2019-18624 - http://firstsight.me/2019/10/illegal-rendered-at-download-feature-in-several-apps-including-opera-mini-that-lead-to-extension-manipulation-with-rtlo/ +CVE-2019-18624 - https://medium.com/@YoKoKho/illegal-rendered-at-download-feature-in-opera-mini-that-lead-to-extension-manipulation-with-rtlo-685bf2d77d51 +CVE-2019-18634 - http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html +CVE-2019-18634 - http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html +CVE-2019-18634 - https://seclists.org/bugtraq/2020/Feb/2 +CVE-2019-18641 - http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html +CVE-2019-18641 - http://seclists.org/fulldisclosure/2021/Jan/1 +CVE-2019-18642 - http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html +CVE-2019-18643 - http://packetstormsecurity.com/files/160766/Rock-RMS-File-Upload-Account-Takeover-Information-Disclosure.html +CVE-2019-18653 - http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ +CVE-2019-18653 - https://medium.com/@YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968 +CVE-2019-18654 - http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ +CVE-2019-18654 - https://medium.com/@YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968 +CVE-2019-18655 - https://www.0xhuesca.com/2019/11/cve-2019-18655.html +CVE-2019-18657 - https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md +CVE-2019-18660 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-18660 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1 +CVE-2019-18660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad +CVE-2019-18662 - http://packetstormsecurity.com/files/155564/YouPHPTube-7.7-SQL-Injection.html +CVE-2019-18662 - https://github.com/YouPHPTube/YouPHPTube/issues/2202 +CVE-2019-18668 - https://wpvulndb.com/vulnerabilities/9936 +CVE-2019-18671 - https://blog.inhq.net/posts/keepkey-CVE-2019-18671/ +CVE-2019-18671 - https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 +CVE-2019-18672 - https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ +CVE-2019-18672 - https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 +CVE-2019-18675 - https://deshal3v.github.io/blog/kernel-research/mmap_exploitation +CVE-2019-18675 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429 +CVE-2019-18680 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.195 +CVE-2019-18683 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-18683 - http://www.openwall.com/lists/oss-security/2019/11/05/1 +CVE-2019-18683 - https://usn.ubuntu.com/4287-2/ +CVE-2019-18683 - https://www.openwall.com/lists/oss-security/2019/11/02/1 +CVE-2019-18684 - https://gist.github.com/oxagast/51171aa161074188a11d96cbef884bbd +CVE-2019-18786 - https://usn.ubuntu.com/4287-2/ +CVE-2019-18793 - http://packetstormsecurity.com/files/155175/Parallels-Plesk-Panel-9.5-Cross-Site-Scripting.html +CVE-2019-18794 - https://github.com/staufnic/CVE/tree/master/CVE-2019-18794 +CVE-2019-18795 - https://github.com/staufnic/CVE/tree/master/CVE-2019-18795 +CVE-2019-18796 - https://github.com/staufnic/CVE/tree/master/CVE-2019-18796 +CVE-2019-18797 - https://github.com/sass/libsass/issues/3000 +CVE-2019-18798 - https://github.com/sass/libsass/issues/2999 +CVE-2019-18799 - https://github.com/sass/libsass/issues/3001 +CVE-2019-18801 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-gxvv-x4p2-rppp +CVE-2019-18804 - https://usn.ubuntu.com/4198-1/ +CVE-2019-18805 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html +CVE-2019-18805 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78 +CVE-2019-18806 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 +CVE-2019-18807 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 +CVE-2019-18808 - https://usn.ubuntu.com/4526-1/ +CVE-2019-18809 - https://usn.ubuntu.com/4287-2/ +CVE-2019-18810 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 +CVE-2019-18810 - https://usn.ubuntu.com/4208-1/ +CVE-2019-18818 - http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html +CVE-2019-18818 - http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html +CVE-2019-18818 - http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html +CVE-2019-18818 - https://github.com/strapi/strapi/pull/4443 +CVE-2019-18818 - https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5 +CVE-2019-18819 - https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html +CVE-2019-18820 - https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html +CVE-2019-18821 - https://code610.blogspot.com/2019/11/crashing-eximioussoft-logo-designer.html +CVE-2019-18824 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18825 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18827 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18828 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18829 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18830 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18831 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18832 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18833 - https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ +CVE-2019-18836 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xvf-4396-cj46 +CVE-2019-18839 - https://packetstormsecurity.com/files/155261/FUDForum-3.0.9-Code-Execution-Cross-Site-Scripting.html +CVE-2019-18842 - https://www.tildeho.me/theres-javascript-in-my-power-plug/ +CVE-2019-18845 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-012.md +CVE-2019-18846 - http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html +CVE-2019-18846 - http://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html +CVE-2019-18852 - https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf +CVE-2019-18854 - https://fortiguard.com/zeroday/FG-VD-19-113 +CVE-2019-18854 - https://wordpress.org/plugins/safe-svg/#developers +CVE-2019-18854 - https://wpvulndb.com/vulnerabilities/9937 +CVE-2019-18855 - https://fortiguard.com/zeroday/FG-VD-19-113 +CVE-2019-18855 - https://wordpress.org/plugins/safe-svg/#developers +CVE-2019-18855 - https://wpvulndb.com/vulnerabilities/9937 +CVE-2019-18856 - https://fortiguard.com/zeroday/FG-VD-19-115 +CVE-2019-18858 - https://www.tenable.com/security/research/tra-2019-48 +CVE-2019-18859 - http://packetstormsecurity.com/files/155926/Digi-AnywhereUSB-14-Cross-Site-Scripting.html +CVE-2019-18859 - https://gist.github.com/RNPG/e0d25ad51aa5c288b9005900f88a4f03 +CVE-2019-18862 - http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html +CVE-2019-18883 - http://packetstormsecurity.com/files/155241/LavaLite-CMS-5.7-Cross-Site-Scripting.html +CVE-2019-18884 - http://packetstormsecurity.com/files/155242/RISE-Ultimate-Project-Manager-2.3-Cross-Site-Request-Forgery.html +CVE-2019-18885 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-18885 - https://github.com/bobfuzzer/CVE-2019-18885 +CVE-2019-18885 - https://usn.ubuntu.com/4287-2/ +CVE-2019-18885 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-18886 - https://github.com/symfony/symfony/releases/tag/v4.3.8 +CVE-2019-18887 - https://github.com/symfony/symfony/releases/tag/v4.3.8 +CVE-2019-18888 - https://github.com/symfony/symfony/releases/tag/v4.3.8 +CVE-2019-18889 - https://github.com/symfony/symfony/releases/tag/v4.3.8 +CVE-2019-18890 - https://github.com/RealLinkers/CVE-2019-18890 +CVE-2019-18893 - https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/ +CVE-2019-18894 - https://palant.de/2020/01/13/pwning-avast-secure-browser-for-fun-and-profit/ +CVE-2019-18895 - http://hyp3rlinx.altervista.org +CVE-2019-18895 - http://seclists.org/fulldisclosure/2019/Nov/5 +CVE-2019-18895 - https://packetstormsecurity.com/files/155319/ScanGuard-Antivirus-Insecure-Permissions.html +CVE-2019-18897 - https://bugzilla.suse.com/show_bug.cgi?id=1157465 +CVE-2019-18898 - https://bugzilla.suse.com/show_bug.cgi?id=1157651 +CVE-2019-18909 - http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html +CVE-2019-18909 - http://seclists.org/fulldisclosure/2020/Mar/39 +CVE-2019-18910 - http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html +CVE-2019-18910 - http://seclists.org/fulldisclosure/2020/Mar/40 +CVE-2019-18922 - http://packetstormsecurity.com/files/155504/Allied-Telesis-AT-GS950-8-Directory-Traversal.html +CVE-2019-18929 - https://github.com/DelspoN/CVE/tree/master/CVE-2019-18929 +CVE-2019-18930 - https://github.com/DelspoN/CVE/tree/master/CVE-2019-18930 +CVE-2019-18931 - https://github.com/DelspoN/CVE/tree/master/CVE-2019-18931 +CVE-2019-18932 - https://bugzilla.suse.com/show_bug.cgi?id=1150554 +CVE-2019-18935 - http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html +CVE-2019-18935 - http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html +CVE-2019-18935 - https://github.com/noperator/CVE-2019-18935 +CVE-2019-18935 - https://www.bleepingcomputer.com/news/security/us-federal-agency-hacked-using-old-telerik-bug-to-steal-data/ +CVE-2019-18951 - http://packetstormsecurity.com/files/155324/Xfilesharing-2.5.1-Local-File-Inclusion-Shell-Upload.html +CVE-2019-18952 - http://packetstormsecurity.com/files/155324/Xfilesharing-2.5.1-Local-File-Inclusion-Shell-Upload.html +CVE-2019-18954 - https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation +CVE-2019-18956 - https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956 +CVE-2019-18957 - http://packetstormsecurity.com/files/155320/MicroStrategy-Library-Cross-Site-Scripting.html +CVE-2019-18958 - https://a-man-in-the-cookie.blogspot.com/2019/11/nitro-pro-vulnerability.html +CVE-2019-1897 - https://www.tenable.com/security/research/tra-2019-29 +CVE-2019-18976 - https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html +CVE-2019-18976 - https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1 +CVE-2019-18979 - https://medium.com/@kusolwatcharaapanukorn/0-days-adaware-antivirus-quarantine-flaws-allow-privilege-escalation-3d1f3c8214ec +CVE-2019-1898 - https://www.tenable.com/security/research/tra-2019-29 +CVE-2019-18989 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ +CVE-2019-1899 - https://www.tenable.com/security/research/tra-2019-29 +CVE-2019-18990 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ +CVE-2019-18991 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/ +CVE-2019-19000 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19001 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19002 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19003 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19004 - https://github.com/autotrace/autotrace/pull/40 +CVE-2019-19005 - https://github.com/autotrace/autotrace/pull/40 +CVE-2019-19006 - https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-001/62772 +CVE-2019-19007 - https://medium.com/@rsantos_14778/1500b407dccc +CVE-2019-19011 - https://github.com/miniupnp/ngiflib/issues/16 +CVE-2019-19012 - https://github.com/kkos/oniguruma/issues/164 +CVE-2019-19012 - https://github.com/tarantula-team/CVE-2019-19012 +CVE-2019-19013 - https://packetstormsecurity.com/files/155426/Pagekit-CMS-1.0.17-Cross-Site-Request-Forgery.html +CVE-2019-19014 - https://write-up.github.io/webtitan/ +CVE-2019-19015 - https://write-up.github.io/webtitan/ +CVE-2019-19016 - https://write-up.github.io/webtitan/ +CVE-2019-19017 - https://write-up.github.io/webtitan/ +CVE-2019-19018 - https://write-up.github.io/webtitan/ +CVE-2019-19019 - https://write-up.github.io/webtitan/ +CVE-2019-19020 - https://write-up.github.io/webtitan/ +CVE-2019-19021 - https://write-up.github.io/webtitan/ +CVE-2019-19031 - http://packetstormsecurity.com/files/155996/Easy-XML-Editor-1.7.8-XML-Injection.html +CVE-2019-19032 - http://packetstormsecurity.com/files/156139/XMLBlueprint-16.191112-XML-Injection.html +CVE-2019-19033 - http://packetstormsecurity.com/files/155419/Jalios-JCMS-10-Backdoor-Account-Authentication-Bypass.html +CVE-2019-19034 - http://packetstormsecurity.com/files/157731/ManageEngine-AssetExplorer-Authenticated-Command-Execution.html +CVE-2019-19034 - http://seclists.org/fulldisclosure/2020/May/36 +CVE-2019-19035 - https://bugzilla.redhat.com/show_bug.cgi?id=1765647 +CVE-2019-19036 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036 +CVE-2019-19036 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19037 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19037 +CVE-2019-19039 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039 +CVE-2019-19039 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19044 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19045 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19045 - https://github.com/torvalds/linux/commit/c8c2a057fdc7de1cd16f4baa51425b932a42eb39 +CVE-2019-19047 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19048 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19048 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19049 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10 +CVE-2019-19050 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html +CVE-2019-19051 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19052 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19052 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19054 - https://usn.ubuntu.com/4526-1/ +CVE-2019-19057 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-19057 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19060 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19060 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19061 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19061 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19061 - https://usn.ubuntu.com/4526-1/ +CVE-2019-19062 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-19062 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19063 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-19063 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19063 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19065 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19065 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19066 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19067 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 +CVE-2019-19067 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19067 - https://usn.ubuntu.com/4526-1/ +CVE-2019-19069 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19069 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19071 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19073 - https://usn.ubuntu.com/4526-1/ +CVE-2019-19073 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19074 - https://usn.ubuntu.com/4526-1/ +CVE-2019-19074 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19075 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 +CVE-2019-19075 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19076 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6 +CVE-2019-19078 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19078 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19079 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3 +CVE-2019-19080 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 +CVE-2019-19081 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 +CVE-2019-19082 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19083 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 +CVE-2019-19083 - https://usn.ubuntu.com/4208-1/ +CVE-2019-19089 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19090 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19091 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19092 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19093 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19094 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19095 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19096 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19097 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2019-19113 - https://github.com/newbee-ltd/newbee-mall/issues/1 +CVE-2019-19115 - https://safebreach.com/Post/Nahimic-APO-Software-Component-Driver-Deployed-with-MSI-Computers-DLL-Search-Order-Hijacking-and-Potential-Abuses-CVE-2019-19115 +CVE-2019-1912 - http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html +CVE-2019-19127 - http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html +CVE-2019-1913 - http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html +CVE-2019-19133 - http://packetstormsecurity.com/files/155558/WordPress-CSS-Hero-4.0.3-Cross-Site-Scripting.html +CVE-2019-19133 - http://seclists.org/fulldisclosure/2019/Dec/6 +CVE-2019-19133 - https://wpvulndb.com/vulnerabilities/9966 +CVE-2019-19134 - https://wpvulndb.com/vulnerabilities/10095 +CVE-2019-19135 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf +CVE-2019-19135 - https://opcfoundation.org/security-bulletins/ +CVE-2019-1914 - http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html +CVE-2019-19142 - http://packetstormsecurity.com/files/156589/Intelbras-Wireless-N-150Mbps-WRN240-Authentication-Bypass.html +CVE-2019-19142 - https://fireshellsecurity.team/hack-n-routers/ +CVE-2019-19143 - http://packetstormsecurity.com/files/156586/TP-Link-TL-WR849N-0.9.1-4.16-Authentication-Bypass.html +CVE-2019-19143 - https://fireshellsecurity.team/hack-n-routers/ +CVE-2019-19191 - https://bugzilla.suse.com/show_bug.cgi?id=1157471 +CVE-2019-19191 - https://issues.shibboleth.net/jira/browse/SSPCPP-874 +CVE-2019-19195 - https://www.microchip.com/wwwproducts/en/ATSAMB11 +CVE-2019-19197 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-11-16-kyrol-internet-security-driver-issue.md +CVE-2019-19197 - https://nafiez.github.io/security/vulnerability/2019/11/16/kyrol-internet-security-driver-issue.html +CVE-2019-19198 - http://packetstormsecurity.com/files/155615/WordPress-Scoutnet-Kalender-1.1.0-Cross-Site-Scripting.html +CVE-2019-19198 - https://wpvulndb.com/vulnerabilities/9969 +CVE-2019-19198 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-045.txt +CVE-2019-19199 - http://seclists.org/fulldisclosure/2020/Sep/49 +CVE-2019-19199 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-049.txt +CVE-2019-19199 - https://www.syss.de/pentest-blog/ +CVE-2019-19200 - http://packetstormsecurity.com/files/159455/MailDepot-2032-SP2-2.2.1242-Authorization-Bypass.html +CVE-2019-19200 - https://www.syss.de/pentest-blog/ +CVE-2019-19203 - https://github.com/ManhNDd/CVE-2019-19203 +CVE-2019-19203 - https://github.com/kkos/oniguruma/issues/163 +CVE-2019-19203 - https://github.com/tarantula-team/CVE-2019-19203 +CVE-2019-19204 - https://github.com/ManhNDd/CVE-2019-19204 +CVE-2019-19204 - https://github.com/kkos/oniguruma/issues/162 +CVE-2019-19204 - https://github.com/tarantula-team/CVE-2019-19204 +CVE-2019-19208 - http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html +CVE-2019-19208 - https://herolab.usd.de/en/security-advisories/ +CVE-2019-19208 - https://herolab.usd.de/security-advisories/usd-2019-0049/ +CVE-2019-19208 - https://www.exploit-db.com/exploits/49902 +CVE-2019-19209 - https://herolab.usd.de/en/security-advisories/ +CVE-2019-19209 - https://herolab.usd.de/security-advisories/usd-2019-0051/ +CVE-2019-19210 - https://herolab.usd.de/en/security-advisories/ +CVE-2019-19210 - https://herolab.usd.de/security-advisories/usd-2019-0052/ +CVE-2019-19211 - https://herolab.usd.de/en/security-advisories/ +CVE-2019-19211 - https://herolab.usd.de/en/security-advisories/usd-2019-0053/ +CVE-2019-19212 - https://herolab.usd.de/en/security-advisories/ +CVE-2019-19212 - https://herolab.usd.de/security-advisories/usd-2019-0054/ +CVE-2019-19215 - https://herolab.usd.de/en/security-advisories/ +CVE-2019-19227 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-19227 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 +CVE-2019-19227 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc +CVE-2019-19227 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19228 - http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html +CVE-2019-19228 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/ +CVE-2019-19228 - https://seclists.org/bugtraq/2019/Dec/5 +CVE-2019-19229 - http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html +CVE-2019-19229 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/ +CVE-2019-19229 - https://seclists.org/bugtraq/2019/Dec/5 +CVE-2019-19230 - http://packetstormsecurity.com/files/155631/CA-Nolio-6.6-Arbitrary-Code-Execution.html +CVE-2019-19231 - http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html +CVE-2019-19231 - http://seclists.org/fulldisclosure/2020/Jan/5 +CVE-2019-19232 - https://www.tenable.com/plugins/nessus/133936 +CVE-2019-19241 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 +CVE-2019-19241 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=181e448d8709e517c9c7b523fcd209f24eb38ca7 +CVE-2019-19241 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d69e07793f891524c6bbf1e75b9ae69db4450953 +CVE-2019-19242 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19244 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19245 - http://hyp3rlinx.altervista.org +CVE-2019-19245 - https://packetstormsecurity.com/files/155505/Xinet-Elegant-6-Asset-Library-Web-Interface-6.1.655-SQL-Injection.html +CVE-2019-19262 - https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-2-released/ +CVE-2019-19265 - http://seclists.org/fulldisclosure/2020/Jan/0 +CVE-2019-19265 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-015/-icewarp-cross-site-scripting-in-notes-for-contacts +CVE-2019-19266 - http://seclists.org/fulldisclosure/2020/Jan/1 +CVE-2019-19266 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-016/-icewarp-cross-site-scripting-in-notes +CVE-2019-19269 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19273 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-19306 - https://cybersecurityworks.com/zerodays/cve-2019-19306-zoho.html +CVE-2019-19306 - https://github.com/cybersecurityworks/Disclosed/issues/16 +CVE-2019-19306 - https://wpvulndb.com/vulnerabilities/9919 +CVE-2019-19311 - https://gitlab.com/gitlab-org/gitlab/issues/31536 +CVE-2019-19315 - https://github.com/monoxgas/mailorder +CVE-2019-19317 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19318 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318 +CVE-2019-19318 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19319 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30 +CVE-2019-19319 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319 +CVE-2019-19332 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-19332 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19346 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19346 +CVE-2019-1935 - http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html +CVE-2019-1935 - http://packetstormsecurity.com/files/154305/Cisco-UCS-Director-Default-scpuser-Password.html +CVE-2019-1935 - http://seclists.org/fulldisclosure/2019/Aug/36 +CVE-2019-1935 - https://seclists.org/bugtraq/2019/Aug/49 +CVE-2019-19356 - http://packetstormsecurity.com/files/156588/Netis-WF2419-2.2.36123-Remote-Code-Execution.html +CVE-2019-1936 - http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html +CVE-2019-1936 - http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1936 - http://seclists.org/fulldisclosure/2019/Aug/36 +CVE-2019-1936 - https://seclists.org/bugtraq/2019/Aug/49 +CVE-2019-19363 - http://packetstormsecurity.com/files/156082/Ricoh-Printer-Driver-Local-Privilege-Escalation.html +CVE-2019-19363 - http://packetstormsecurity.com/files/156251/Ricoh-Driver-Privilege-Escalation.html +CVE-2019-19363 - http://seclists.org/fulldisclosure/2020/Jan/34 +CVE-2019-19366 - https://gist.github.com/xax007/94183b11bdfe579fd860a37e74cd3a8e +CVE-2019-19367 - https://gist.github.com/xax007/94183b11bdfe579fd860a37e74cd3a8e +CVE-2019-19368 - http://packetstormsecurity.com/files/155719/Rumpus-FTP-Web-File-Manager-8.2.9.1-Cross-Site-Scripting.html +CVE-2019-1937 - http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html +CVE-2019-1937 - http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html +CVE-2019-1937 - http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html +CVE-2019-1937 - http://seclists.org/fulldisclosure/2019/Aug/36 +CVE-2019-1937 - https://seclists.org/bugtraq/2019/Aug/49 +CVE-2019-19373 - http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html +CVE-2019-19374 - http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html +CVE-2019-19377 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377 +CVE-2019-19377 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19378 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378 +CVE-2019-19382 - http://hyp3rlinx.altervista.org +CVE-2019-19382 - http://packetstormsecurity.com/files/155506/Max-Secure-Anti-Virus-Plus-19.0.4.020-Insecure-Permissions.html +CVE-2019-19384 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 +CVE-2019-19385 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 +CVE-2019-19386 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 +CVE-2019-19387 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 +CVE-2019-19388 - https://gist.github.com/xax007/28e7326acfae677be0b351216888e522 +CVE-2019-19389 - https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737 +CVE-2019-19390 - https://seclists.org/fulldisclosure/2020/Apr/10 +CVE-2019-19391 - https://github.com/LuaJIT/LuaJIT/pull/526 +CVE-2019-19393 - https://github.com/miguelhamal/CVE-2019-19393 +CVE-2019-19447 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447 +CVE-2019-19448 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448 +CVE-2019-19449 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 +CVE-2019-19452 - https://www.coresecurity.com/advisories/viper-rgb-driver-multiple-vulnerabilities +CVE-2019-19453 - https://www.gruppotim.it/redteam +CVE-2019-19454 - https://www.gruppotim.it/redteam +CVE-2019-19455 - https://www.gruppotim.it/redteam +CVE-2019-19456 - https://www.gruppotim.it/redteam +CVE-2019-19457 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html +CVE-2019-19458 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html +CVE-2019-19458 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ +CVE-2019-19459 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html +CVE-2019-19459 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ +CVE-2019-19460 - https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html +CVE-2019-19460 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/ +CVE-2019-19462 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19468 - https://code610.blogspot.com/2019/11/from-0-to-0day-quick-fuzzing-lesson.html +CVE-2019-19469 - https://github.com/robertchrk/zmanda_exploit +CVE-2019-19484 - https://medium.com/@mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd +CVE-2019-19486 - https://medium.com/@mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd +CVE-2019-19487 - https://medium.com/@mucomplex/undisclosed-cve-2019-19484-cve-2019-19486-cve-2019-19487-b46b97c930cd +CVE-2019-19489 - https://www.exploit-db.com/exploits/47709 +CVE-2019-19490 - https://www.exploit-db.com/exploits/47706 +CVE-2019-19491 - https://www.exploit-db.com/exploits/47702 +CVE-2019-19492 - https://www.exploit-db.com/exploits/47698 +CVE-2019-19493 - http://packetstormsecurity.com/files/159525/Kentico-CMS-9.0-12.0.49-Cross-Site-Scripting.html +CVE-2019-19493 - https://devnet.kentico.com/download/hotfixes +CVE-2019-19494 - https://github.com/Lyrebirds/Fast8690-exploit +CVE-2019-19495 - https://github.com/Lyrebirds/Fast8690-exploit +CVE-2019-19496 - https://github.com/vipinxsec/Alfresco_XSS/blob/master/README.md +CVE-2019-19496 - https://vipinxsec.blogspot.com/2019/11/alfresco-stored-xss-vulnerability-blind.html +CVE-2019-19500 - http://packetstormsecurity.com/files/157232/Matrix42-Workspace-Management-9.1.2.2765-Cross-Site-Scripting.html +CVE-2019-19500 - http://seclists.org/fulldisclosure/2020/Apr/8 +CVE-2019-19502 - https://visat.me/security/cve-2019-19502/ +CVE-2019-19509 - http://packetstormsecurity.com/files/156146/rConfig-3.9.3-Remote-Code-Execution.html +CVE-2019-19509 - http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html +CVE-2019-19509 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html +CVE-2019-19513 - https://github.com/staufnic/CVE/tree/master/CVE-2019-19513 +CVE-2019-19516 - http://packetstormsecurity.com/files/155557/Intelbras-Router-RF1200-1.1.3-Cross-Site-Request-Forgery.html +CVE-2019-19516 - https://www.exploit-db.com/exploits/47545 +CVE-2019-19519 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html +CVE-2019-19520 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html +CVE-2019-19521 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html +CVE-2019-19522 - http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html +CVE-2019-19523 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 +CVE-2019-19523 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0 +CVE-2019-19524 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-19524 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12 +CVE-2019-19524 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86 +CVE-2019-19525 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6 +CVE-2019-19525 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fd25e6fc035f4b04b75bca6d7e8daa069603a76 +CVE-2019-19526 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19526 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc +CVE-2019-19527 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 +CVE-2019-19527 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49 +CVE-2019-19527 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d +CVE-2019-19528 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 +CVE-2019-19528 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c468a8aa790e0dfe0a7f8a39db282d39c2c00b46 +CVE-2019-19528 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=edc4746f253d907d048de680a621e121517f484b +CVE-2019-19529 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19529 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d6636498c41891d0482a914dd570343a838ad79 +CVE-2019-19530 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 +CVE-2019-19530 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625 +CVE-2019-19531 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 +CVE-2019-19531 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc05481b2fcabaaeccf63e32ac1baab54e5b6963 +CVE-2019-19532 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19532 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d9d4b1e46d9543a82c23f6df03f4ad697dab361b +CVE-2019-19533 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 +CVE-2019-19533 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1 +CVE-2019-19534 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19534 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7a1337f0d29b98733c8824e165fca3371d7d4fd +CVE-2019-19535 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 +CVE-2019-19535 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9 +CVE-2019-19535 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19536 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 +CVE-2019-19536 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69 +CVE-2019-19537 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 +CVE-2019-19537 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff +CVE-2019-19538 - https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-00 +CVE-2019-19540 - https://wpvulndb.com/vulnerabilities/9974 +CVE-2019-19541 - https://wpvulndb.com/vulnerabilities/9974 +CVE-2019-19542 - https://wpvulndb.com/vulnerabilities/9974 +CVE-2019-19543 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 +CVE-2019-19543 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=56cd26b618855c9af48c8301aa6754ced8dd0beb +CVE-2019-19550 - https://github.com/underprotection/CVE-2019-19550/ +CVE-2019-19553 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19576 - http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html +CVE-2019-19576 - https://github.com/jra89/CVE-2019-19576 +CVE-2019-19576 - https://medium.com/@jra8908/cve-2019-19576-e9da712b779 +CVE-2019-19585 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html +CVE-2019-19590 - https://github.com/radareorg/radare2/issues/15543 +CVE-2019-19592 - https://sumukh30.blogspot.com/2020/01/normal-0-false-false-false-en-us-x-none.html?m=1 +CVE-2019-19594 - https://ia-informatica.com/it/CVE-2019-19594 +CVE-2019-19595 - https://ia-informatica.com/it/CVE-2019-19595 +CVE-2019-19597 - https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ +CVE-2019-19598 - https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ +CVE-2019-19602 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 +CVE-2019-19603 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19603 - https://www.sqlite.org/ +CVE-2019-19605 - https://blog.0xlabs.com/2020/03/x-plane-1141-remote-command-execution.html +CVE-2019-19606 - https://blog.0xlabs.com/2020/03/x-plane-1141-remote-command-execution.html +CVE-2019-19609 - http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html +CVE-2019-19609 - http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html +CVE-2019-19609 - https://github.com/strapi/strapi/pull/4636 +CVE-2019-19610 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2019-19612 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2019-19613 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2019-19614 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2019-19615 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities +CVE-2019-19620 - https://medium.com/@CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e +CVE-2019-19631 - https://know.bishopfox.com/advisories +CVE-2019-19631 - https://know.bishopfox.com/advisories/big-monitoring-fabric +CVE-2019-19632 - https://know.bishopfox.com/advisories +CVE-2019-19632 - https://know.bishopfox.com/advisories/big-monitoring-fabric +CVE-2019-19634 - https://github.com/jra89/CVE-2019-19634 +CVE-2019-19634 - https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e +CVE-2019-19642 - https://www.dark-sec.net/2019/12/supermicro-ipmi-exploitation.html +CVE-2019-19645 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19646 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19646 - https://www.sqlite.org/ +CVE-2019-19648 - https://github.com/VirusTotal/yara/issues/1178 +CVE-2019-19676 - https://www2.deloitte.com/de/de/pages/risk/articles/arxes-tolina-csv-injection.html +CVE-2019-19681 - https://medium.com/@k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a +CVE-2019-19697 - http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt +CVE-2019-19697 - https://seclists.org/bugtraq/2020/Jan/29 +CVE-2019-19699 - https://github.com/SpengeSec/CVE-2019-19699 +CVE-2019-19708 - https://phabricator.wikimedia.org/T239209 +CVE-2019-19726 - http://packetstormsecurity.com/files/155658/Qualys-Security-Advisory-OpenBSD-Dynamic-Loader-Privilege-Escalation.html +CVE-2019-19726 - http://packetstormsecurity.com/files/155764/OpenBSD-Dynamic-Loader-chpass-Privilege-Escalation.html +CVE-2019-19726 - http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html +CVE-2019-19726 - http://seclists.org/fulldisclosure/2019/Dec/31 +CVE-2019-19726 - http://seclists.org/fulldisclosure/2023/Oct/11 +CVE-2019-19726 - http://www.openwall.com/lists/oss-security/2023/10/03/2 +CVE-2019-19726 - https://seclists.org/bugtraq/2019/Dec/25 +CVE-2019-19726 - https://www.openwall.com/lists/oss-security/2019/12/11/9 +CVE-2019-19731 - http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html +CVE-2019-19732 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19733 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19734 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19735 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19736 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19737 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19738 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19739 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19740 - http://packetstormsecurity.com/files/156113/Octeth-Oempro-4.8-SQL-Injection.html +CVE-2019-19741 - https://medium.com/@tobiasgyoerfi/ea-origin-10-5-55-33574-createdirectory-arbitrary-dacl-write-privilege-escalation-cve-2019-19741-5f18adfabb27 +CVE-2019-19742 - https://infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-router.html +CVE-2019-19742 - https://medium.com/@infosecsanyam/d-link-dir-615-wireless-router-persistent-cross-site-scripting-6ee00f5c694d +CVE-2019-19742 - https://www.exploit-db.com/exploits/47776 +CVE-2019-19743 - https://www.exploit-db.com/exploits/47778 +CVE-2019-19743 - https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html +CVE-2019-19746 - https://sourceforge.net/p/mcj/tickets/57/ +CVE-2019-19766 - https://github.com/bitwarden/jslib/issues/52 +CVE-2019-19766 - https://github.com/bitwarden/server/issues/589 +CVE-2019-19767 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 +CVE-2019-19767 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19768 - https://usn.ubuntu.com/4342-1/ +CVE-2019-19774 - http://packetstormsecurity.com/files/156485/ManageEngine-EventLog-Analyzer-10.0-Information-Disclosure.html +CVE-2019-19777 - https://github.com/saitoha/libsixel/issues/109 +CVE-2019-19778 - https://github.com/saitoha/libsixel/issues/110 +CVE-2019-19781 - http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html +CVE-2019-19781 - http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html +CVE-2019-19781 - http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html +CVE-2019-19781 - http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html +CVE-2019-19781 - http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html +CVE-2019-19781 - https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/ +CVE-2019-19782 - https://github.com/sketler/sketler.github.io/blob/master/_posts/2019-11-11-AceaXeftp-RCE-Via-Buffer-Overflow.markdown +CVE-2019-19782 - https://sketler.github.io/cve_research/AceaXeftp-RCE-Via-Buffer-Overflow/ +CVE-2019-19800 - https://www.manageengine.com +CVE-2019-19805 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19806 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 +CVE-2019-19807 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 +CVE-2019-19813 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19813 +CVE-2019-19813 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19814 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814 +CVE-2019-19815 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19815 +CVE-2019-19816 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816 +CVE-2019-19816 - https://usn.ubuntu.com/4414-1/ +CVE-2019-19820 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-12-04-kyrol-internet-security-invalid-pointer-vulnerability.md +CVE-2019-19820 - https://nafiez.github.io/security/vulnerability/2019/12/04/kyrol-internet-security-invalid-pointer-vulnerability.html +CVE-2019-19822 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html +CVE-2019-19822 - http://seclists.org/fulldisclosure/2020/Jan/36 +CVE-2019-19822 - http://seclists.org/fulldisclosure/2020/Jan/38 +CVE-2019-19823 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html +CVE-2019-19823 - http://seclists.org/fulldisclosure/2020/Jan/36 +CVE-2019-19823 - http://seclists.org/fulldisclosure/2020/Jan/38 +CVE-2019-19824 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html +CVE-2019-19824 - http://seclists.org/fulldisclosure/2020/Jan/36 +CVE-2019-19824 - http://seclists.org/fulldisclosure/2020/Jan/38 +CVE-2019-19825 - http://packetstormsecurity.com/files/156083/Realtek-SDK-Information-Disclosure-Code-Execution.html +CVE-2019-19825 - http://seclists.org/fulldisclosure/2020/Jan/36 +CVE-2019-19825 - http://seclists.org/fulldisclosure/2020/Jan/38 +CVE-2019-19826 - https://www.drupal.org/project/views_dynamic_fields/issues/3056600 +CVE-2019-19829 - http://packetstormsecurity.com/files/155708/Serv-U-FTP-Server-15.1.7-Cross-Site-Scripting.html +CVE-2019-19832 - http://packetstormsecurity.com/files/155709/Xerox-AltaLink-C8035-Printer-Cross-Site-Request-Forgery.html +CVE-2019-19833 - http://packetstormsecurity.com/files/155710/Tautulli-2.1.9-Cross-Site-Request-Forgery.html +CVE-2019-19833 - http://packetstormsecurity.com/files/155974/Tautulli-2.1.9-Denial-Of-Service.html +CVE-2019-19844 - http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html +CVE-2019-19851 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities +CVE-2019-19852 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities +CVE-2019-19854 - https://websec.nl/news.php +CVE-2019-19855 - https://websec.nl/news.php +CVE-2019-19856 - https://websec.nl/news.php +CVE-2019-19857 - https://websec.nl/news.php +CVE-2019-19858 - https://websec.nl/news.php +CVE-2019-19859 - https://www.websec.nl/news.php +CVE-2019-19880 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19885 - https://cert.vde.com/en-us/advisories/vde-2020-043 +CVE-2019-19887 - https://github.com/rockcarry/ffjpeg/issues/14 +CVE-2019-19888 - https://github.com/rockcarry/ffjpeg/issues/13 +CVE-2019-19889 - https://github.com/V1n1v131r4/HGB10R-2 +CVE-2019-19890 - https://github.com/V1n1v131r4/HGB10R-2 +CVE-2019-19906 - https://www.openldap.org/its/index.cgi/Incoming?id=9123 +CVE-2019-19912 - http://packetstormsecurity.com/files/156951/codeBeamer-9.5-Cross-Site-Scripting.html +CVE-2019-19913 - http://packetstormsecurity.com/files/156951/codeBeamer-9.5-Cross-Site-Scripting.html +CVE-2019-19913 - http://seclists.org/fulldisclosure/2020/Apr/9 +CVE-2019-19915 - https://wpvulndb.com/vulnerabilities/9979 +CVE-2019-19916 - https://github.com/V1n1v131r4/MIME-Confusion-Attack-on-Midori-Browser/blob/master/README.md +CVE-2019-19916 - https://portswigger.net/research/bypassing-csp-using-polyglot-jpegs +CVE-2019-19921 - https://github.com/opencontainers/runc/issues/2197 +CVE-2019-19922 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 +CVE-2019-19922 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-19923 - https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35 +CVE-2019-19923 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19924 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19925 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19926 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19927 - https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927 +CVE-2019-19929 - https://www.bleepingcomputer.com/news/software/adwcleaner-801-fixes-dll-hijacking-vulnerability/ +CVE-2019-19930 - https://github.com/mz-automation/libiec61850/issues/193 +CVE-2019-19931 - https://github.com/mz-automation/libiec61850/issues/194 +CVE-2019-19935 - http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html +CVE-2019-19935 - https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/ +CVE-2019-19935 - https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt +CVE-2019-19935 - https://snyk.io/vuln/npm:froala-editor +CVE-2019-19940 - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt +CVE-2019-19941 - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt +CVE-2019-19942 - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2019-19940ff.txt +CVE-2019-19943 - https://www.exploit-db.com/exploits/48111 +CVE-2019-19944 - https://github.com/mz-automation/libiec61850/issues/196 +CVE-2019-19945 - https://github.com/openwrt/openwrt/commits/master +CVE-2019-19945 - https://openwrt.org/advisory/2020-01-13-1 +CVE-2019-19946 - https://know.bishopfox.com/advisories +CVE-2019-19946 - https://know.bishopfox.com/advisories/dradis-pro-3-4-1 +CVE-2019-19948 - https://github.com/ImageMagick/ImageMagick/issues/1562 +CVE-2019-19949 - https://github.com/ImageMagick/ImageMagick/issues/1561 +CVE-2019-19950 - https://sourceforge.net/p/graphicsmagick/bugs/603/ +CVE-2019-19952 - https://github.com/ImageMagick/ImageMagick/issues/1791 +CVE-2019-19954 - https://blog.mirch.io/2019/12/18/signal-desktop-windows-lpe/ +CVE-2019-19956 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-19957 - https://github.com/mz-automation/libiec61850/issues/197 +CVE-2019-19958 - https://github.com/mz-automation/libiec61850/issues/198 +CVE-2019-19959 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-19965 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f +CVE-2019-19965 - https://usn.ubuntu.com/4287-2/ +CVE-2019-19966 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 +CVE-2019-19966 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd +CVE-2019-19967 - https://github.com/filipi86/ConnectBoxDOCSIS-3.0 +CVE-2019-19979 - https://wpvulndb.com/vulnerabilities/9954 +CVE-2019-19979 - https://www.wordfence.com/blog/2019/11/high-severity-vulnerability-patched-in-wp-maintenance-plugin/ +CVE-2019-19980 - https://wpvulndb.com/vulnerabilities/9946 +CVE-2019-19981 - https://wpvulndb.com/vulnerabilities/9946 +CVE-2019-19982 - https://wpvulndb.com/vulnerabilities/9946 +CVE-2019-19983 - https://wpvulndb.com/vulnerabilities/9914 +CVE-2019-19984 - https://wpvulndb.com/vulnerabilities/9946 +CVE-2019-19985 - http://packetstormsecurity.com/files/158563/WordPress-Email-Subscribers-And-Newsletters-4.2.2-File-Disclosure.html +CVE-2019-19985 - https://wpvulndb.com/vulnerabilities/9946 +CVE-2019-19986 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19987 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19988 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19989 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-1999 - https://www.exploit-db.com/exploits/46357/ +CVE-2019-19990 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19991 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19992 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19993 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19994 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2019-19995 - https://medium.com/@rsantos_14778/csrf-cve-2019-19995-96c1a2dcc182 +CVE-2019-19996 - https://medium.com/@rsantos_14778/dos-cve-2019-19996-5ad1be772179 +CVE-2019-2000 - https://www.exploit-db.com/exploits/46356/ +CVE-2019-20002 - https://medium.com/@ayaan.saikia91/formula-injection-vulnerability-on-solarwinds-webhelpdesk-12-7-1-37569cd4cdc1 +CVE-2019-20004 - https://medium.com/@rsantos_14778/remote-control-cve-2019-20004-21f77e976715 +CVE-2019-20009 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20009 - https://github.com/LibreDWG/libredwg/issues/176#issue-541977765 +CVE-2019-20010 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20010 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383 +CVE-2019-20011 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20011 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 +CVE-2019-20012 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20012 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088 +CVE-2019-20013 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20013 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060 +CVE-2019-20014 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20014 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172 +CVE-2019-20015 - https://github.com/LibreDWG/libredwg/issues/176 +CVE-2019-20015 - https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028 +CVE-2019-20016 - https://github.com/hoene/libmysofa/issues/83 +CVE-2019-20016 - https://github.com/hoene/libmysofa/issues/84 +CVE-2019-20017 - https://github.com/tbeu/matio/issues/127 +CVE-2019-20018 - https://github.com/tbeu/matio/issues/129 +CVE-2019-20019 - https://github.com/tbeu/matio/issues/130 +CVE-2019-20020 - https://github.com/tbeu/matio/issues/128 +CVE-2019-20021 - https://github.com/upx/upx/issues/315 +CVE-2019-20022 - https://github.com/saitoha/libsixel/issues/108 +CVE-2019-20023 - https://github.com/saitoha/libsixel/issues/120 +CVE-2019-20024 - https://github.com/saitoha/libsixel/issues/121 +CVE-2019-20044 - http://seclists.org/fulldisclosure/2020/May/53 +CVE-2019-20044 - http://seclists.org/fulldisclosure/2020/May/55 +CVE-2019-20044 - http://seclists.org/fulldisclosure/2020/May/59 +CVE-2019-20047 - https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html +CVE-2019-20047 - https://www.exploit-db.com/exploits/47761 +CVE-2019-20048 - https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html +CVE-2019-20048 - https://www.exploit-db.com/exploits/47761 +CVE-2019-20049 - https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html +CVE-2019-20049 - https://www.exploit-db.com/exploits/47761 +CVE-2019-20051 - https://github.com/upx/upx/issues/313 +CVE-2019-20052 - https://github.com/tbeu/matio/issues/131 +CVE-2019-20053 - https://github.com/upx/upx/issues/314 +CVE-2019-20054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23da9588037ecdd4901db76a5b79a42b529c4ec3 +CVE-2019-20054 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4 +CVE-2019-20055 - https://code610.blogspot.com/2019/12/testing-ssrf-in-liquifireos.html +CVE-2019-20056 - https://github.com/saitoha/libsixel/issues/126 +CVE-2019-20057 - https://github.com/ProxymanApp/Proxyman/issues/364 +CVE-2019-20059 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad +CVE-2019-20060 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad +CVE-2019-20061 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad +CVE-2019-20062 - https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad +CVE-2019-20063 - https://github.com/hoene/libmysofa/issues/67 +CVE-2019-20071 - https://drive.google.com/open?id=1p4HJ5C20TqY0rVNffdD5Zd7S_bGvDhnk +CVE-2019-20072 - https://drive.google.com/open?id=1IGRYVci8fxic0jJJb-pAfAK1kJ4V2yGM +CVE-2019-20073 - https://drive.google.com/open?id=1CxLrSKAczEZpm_7FERIrCGGJAs2mp6Go +CVE-2019-20074 - https://drive.google.com/open?id=1MH6DMhP1JsV_RptGXDze0Vo9MDuCH9se +CVE-2019-20074 - https://fatihhcelik.blogspot.com/2019/12/clear-text-password-netis-dl4323.html +CVE-2019-20075 - https://drive.google.com/open?id=1795_joGaL3QXMFeJoJPiNgB_d913XePx +CVE-2019-20076 - https://drive.google.com/open?id=1HrYqVKlSxhQqB5tNhhLIgpyfi0Y2ZL80 +CVE-2019-20079 - https://packetstormsecurity.com/files/154898 +CVE-2019-20082 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-20082 +CVE-2019-20085 - http://packetstormsecurity.com/files/157196/TVT-NVMS-1000-Directory-Traversal.html +CVE-2019-20085 - https://www.exploit-db.com/exploits/47774 +CVE-2019-20086 - https://github.com/gopro/gpmf-parser/issues/74 +CVE-2019-20087 - https://github.com/gopro/gpmf-parser/issues/76 +CVE-2019-20088 - https://github.com/gopro/gpmf-parser/issues/77 +CVE-2019-20089 - https://github.com/gopro/gpmf-parser/issues/75 +CVE-2019-20090 - https://github.com/axiomatic-systems/Bento4/issues/461 +CVE-2019-20091 - https://github.com/axiomatic-systems/Bento4/issues/462 +CVE-2019-20092 - https://github.com/axiomatic-systems/Bento4/issues/462 +CVE-2019-20093 - https://sourceforge.net/p/podofo/tickets/75/ +CVE-2019-20094 - https://github.com/saitoha/libsixel/issues/125 +CVE-2019-20095 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 +CVE-2019-20095 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc +CVE-2019-20096 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html +CVE-2019-20096 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 +CVE-2019-20096 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d3ff0950e2b40dc861b1739029649d03f591820 +CVE-2019-20096 - https://usn.ubuntu.com/4287-2/ +CVE-2019-20098 - https://www.tenable.com/security/research/tra-2020-05 +CVE-2019-20099 - https://www.tenable.com/security/research/tra-2020-05 +CVE-2019-20100 - https://ecosystem.atlassian.net/browse/APL-1390 +CVE-2019-20100 - https://www.tenable.com/security/research/tra-2020-06 +CVE-2019-20101 - https://ecosystem.atlassian.net/browse/AW-20 +CVE-2019-20104 - https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/ +CVE-2019-20105 - https://ecosystem.atlassian.net/browse/APL-1391 +CVE-2019-20139 - https://code610.blogspot.com/2019/12/multiple-xss-bugs-in-nagios-569.html +CVE-2019-20140 - https://github.com/saitoha/libsixel/issues/122 +CVE-2019-20153 - https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ +CVE-2019-20154 - https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ +CVE-2019-20155 - https://www.n00py.io/2020/01/zero-day-exploit-in-determine-selectica-contract-lifecycle-management-sclm-v5-4/ +CVE-2019-20159 - https://github.com/gpac/gpac/issues/1321 +CVE-2019-20160 - https://github.com/gpac/gpac/issues/1334 +CVE-2019-20161 - https://github.com/gpac/gpac/issues/1320 +CVE-2019-20162 - https://github.com/gpac/gpac/issues/1327 +CVE-2019-20163 - https://github.com/gpac/gpac/issues/1335 +CVE-2019-20164 - https://github.com/gpac/gpac/issues/1332 +CVE-2019-20165 - https://github.com/gpac/gpac/issues/1338 +CVE-2019-20166 - https://github.com/gpac/gpac/issues/1331 +CVE-2019-20167 - https://github.com/gpac/gpac/issues/1330 +CVE-2019-20168 - https://github.com/gpac/gpac/issues/1333 +CVE-2019-20169 - https://github.com/gpac/gpac/issues/1329 +CVE-2019-20170 - https://github.com/gpac/gpac/issues/1328 +CVE-2019-20171 - https://github.com/gpac/gpac/issues/1337 +CVE-2019-20173 - https://wpvulndb.com/vulnerabilities/10059 +CVE-2019-20175 - https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html +CVE-2019-20175 - https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html +CVE-2019-20175 - https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html +CVE-2019-20178 - https://medium.com/@Pablo0xSantiago/cve-2019-20178-peel-shopping-ecommerce-shopping-cart-9-2-1-cross-site-request-forgery-17fc49ab5a65 +CVE-2019-20179 - https://medium.com/@Pablo0xSantiago/cve-2019-20179-so-planning-1-45-sql-injection-5f0050ad81d1 +CVE-2019-20180 - https://medium.com/@Pablo0xSantiago/cve-2019-20180-tablepress-version-1-9-2-csv-injection-65309fcc8be8 +CVE-2019-20181 - https://medium.com/@Pablo0xSantiago/cve-2019-20181-awesome-support-wordpress-helpdesk-support-plugin-5-8-0-84a0c022cf53 +CVE-2019-20182 - https://medium.com/@Pablo0xSantiago/cve-2019-20182-foogallery-image-gallery-wordpress-plugin-1-8-12-stored-cross-site-scripting-d5864f1259f +CVE-2019-20183 - https://medium.com/@Pablo0xSantiago/cve-2019-20183-employee-records-system-bypass-file-upload-to-rce-ea2653660b34 +CVE-2019-20184 - https://medium.com/@Pablo0xSantiago/cve-2019-20184-keepass-2-4-1-csv-injection-33f08de3c11a +CVE-2019-20191 - https://medium.com/@Pablo0xSantiago/cve-2019-20191-oxygen-xml-editor-21-1-1-allows-xxe-216b816f312b +CVE-2019-20197 - https://code610.blogspot.com/2019/12/postauth-rce-in-latest-nagiosxi.html +CVE-2019-20203 - https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md +CVE-2019-20203 - https://wpvulndb.com/vulnerabilities/10002 +CVE-2019-20204 - http://packetstormsecurity.com/files/155973/WordPress-Postie-1.9.40-Cross-Site-Scripting.html +CVE-2019-20204 - https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md +CVE-2019-20204 - https://wpvulndb.com/vulnerabilities/10002 +CVE-2019-20205 - https://github.com/saitoha/libsixel/issues/127 +CVE-2019-20208 - https://github.com/gpac/gpac/issues/1348 +CVE-2019-20209 - https://cxsecurity.com/issue/WLB-2019120110 +CVE-2019-20209 - https://cxsecurity.com/issue/WLB-2019120111 +CVE-2019-20209 - https://cxsecurity.com/issue/WLB-2019120112 +CVE-2019-20209 - https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622 +CVE-2019-20209 - https://wpvulndb.com/vulnerabilities/10013 +CVE-2019-20209 - https://wpvulndb.com/vulnerabilities/10014 +CVE-2019-20209 - https://wpvulndb.com/vulnerabilities/10018 +CVE-2019-20210 - https://cxsecurity.com/issue/WLB-2019120110 +CVE-2019-20210 - https://cxsecurity.com/issue/WLB-2019120111 +CVE-2019-20210 - https://cxsecurity.com/issue/WLB-2019120112 +CVE-2019-20210 - https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622 +CVE-2019-20210 - https://wpvulndb.com/vulnerabilities/10013 +CVE-2019-20210 - https://wpvulndb.com/vulnerabilities/10014 +CVE-2019-20210 - https://wpvulndb.com/vulnerabilities/10018 +CVE-2019-20211 - https://cxsecurity.com/issue/WLB-2019120110 +CVE-2019-20211 - https://cxsecurity.com/issue/WLB-2019120111 +CVE-2019-20211 - https://cxsecurity.com/issue/WLB-2019120112 +CVE-2019-20211 - https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622 +CVE-2019-20211 - https://wpvulndb.com/vulnerabilities/10013 +CVE-2019-20211 - https://wpvulndb.com/vulnerabilities/10014 +CVE-2019-20211 - https://wpvulndb.com/vulnerabilities/10018 +CVE-2019-20212 - https://cxsecurity.com/issue/WLB-2019120110 +CVE-2019-20212 - https://cxsecurity.com/issue/WLB-2019120111 +CVE-2019-20212 - https://cxsecurity.com/issue/WLB-2019120112 +CVE-2019-20212 - https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622 +CVE-2019-20212 - https://wpvulndb.com/vulnerabilities/10013 +CVE-2019-20212 - https://wpvulndb.com/vulnerabilities/10014 +CVE-2019-20212 - https://wpvulndb.com/vulnerabilities/10018 +CVE-2019-20213 - https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-information-disclosure-en-faf1a9a13f3f +CVE-2019-20213 - https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-information-disclosure-es-6540f7f55b03 +CVE-2019-20215 - http://packetstormsecurity.com/files/156250/D-Link-ssdpcgi-Unauthenticated-Remote-Command-Execution.html +CVE-2019-20215 - https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-rce-in-ssdpcgi-http-st-cve-2019-20215-en-2e799acb8a73 +CVE-2019-20216 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae +CVE-2019-20216 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-es-e11ca6168d35 +CVE-2019-20217 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae +CVE-2019-20217 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-es-e11ca6168d35 +CVE-2019-20218 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-20219 - https://github.com/miniupnp/ngiflib/issues/15 +CVE-2019-20224 - http://packetstormsecurity.com/files/155897/Pandora-7.0NG-Remote-Code-Execution.html +CVE-2019-2024 - https://usn.ubuntu.com/4118-1/ +CVE-2019-20326 - https://github.com/Fysac/CVE-2019-20326 +CVE-2019-20330 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-20330 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-20330 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-20330 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-20334 - https://bugzilla.nasm.us/show_bug.cgi?id=3392548#c4 +CVE-2019-20334 - https://bugzilla.nasm.us/show_bug.cgi?id=3392638 +CVE-2019-20336 - https://github.com/Mad-robot/CVE-List/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2019-20337 - https://github.com/Mad-robot/CVE-List/blob/master/Advanced%20Real%20Estate%20Script.md +CVE-2019-20348 - https://gist.github.com/tanprathan/24cab2eb02937f86961c6380b47ce385 +CVE-2019-20352 - https://bugzilla.nasm.us/show_bug.cgi?id=3392636 +CVE-2019-20354 - http://packetstormsecurity.com/files/155864/piSignage-2.6.4-Directory-Traversal.html +CVE-2019-20357 - http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt +CVE-2019-20357 - https://seclists.org/bugtraq/2020/Jan/28 +CVE-2019-20358 - http://seclists.org/fulldisclosure/2020/Jan/50 +CVE-2019-20358 - https://seclists.org/bugtraq/2020/Jan/55 +CVE-2019-20360 - https://wpvulndb.com/vulnerabilities/9889 +CVE-2019-20361 - http://packetstormsecurity.com/files/158568/WordPress-Email-Subscribers-And-Newsletters-4.2.2-SQL-Injection.html +CVE-2019-20361 - https://wpvulndb.com/vulnerabilities/9947 +CVE-2019-20363 - https://cybersecurityworks.com/zerodays/cve-2019-20363-openfire.html +CVE-2019-20363 - https://issues.igniterealtime.org/browse/OF-1955 +CVE-2019-20364 - https://cybersecurityworks.com/zerodays/cve-2019-20364-openfire.html +CVE-2019-20364 - https://issues.igniterealtime.org/browse/OF-1955 +CVE-2019-20365 - https://cybersecurityworks.com/zerodays/cve-2019-20365-openfire.html +CVE-2019-20365 - https://issues.igniterealtime.org/browse/OF-1955 +CVE-2019-20366 - https://cybersecurityworks.com/zerodays/cve-2019-20366-openfire.html +CVE-2019-20366 - https://issues.igniterealtime.org/browse/OF-1955 +CVE-2019-20372 - http://seclists.org/fulldisclosure/2021/Sep/36 +CVE-2019-20374 - https://github.com/typora/typora-issues/issues/3124 +CVE-2019-20384 - https://bugs.gentoo.org/692492 +CVE-2019-20388 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-20388 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-20388 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-20388 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-20389 - http://packetstormsecurity.com/files/157699/Subrion-CMS-4.2.1-Cross-Site-Scripting.html +CVE-2019-20390 - http://packetstormsecurity.com/files/157700/Subrion-CMS-4.2.1-Cross-Site-Request-Forgery.html +CVE-2019-20397 - https://github.com/CESNET/libyang/issues/739 +CVE-2019-20421 - https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8 +CVE-2019-20421 - https://github.com/Exiv2/exiv2/issues/1011 +CVE-2019-20422 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 +CVE-2019-20423 - http://lustre.org/ +CVE-2019-20423 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20424 - http://lustre.org/ +CVE-2019-20424 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20425 - http://lustre.org/ +CVE-2019-20425 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20426 - http://lustre.org/ +CVE-2019-20426 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20427 - http://lustre.org/ +CVE-2019-20427 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20428 - http://lustre.org/ +CVE-2019-20428 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20429 - http://lustre.org/ +CVE-2019-20429 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20430 - http://lustre.org/ +CVE-2019-20430 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20431 - http://lustre.org/ +CVE-2019-20431 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20432 - http://lustre.org/ +CVE-2019-20432 - http://wiki.lustre.org/Lustre_2.12.3_Changelog +CVE-2019-20434 - https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html +CVE-2019-20434 - https://github.com/cybersecurityworks/Disclosed/issues/17 +CVE-2019-20435 - https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html +CVE-2019-20435 - https://github.com/cybersecurityworks/Disclosed/issues/18 +CVE-2019-20436 - https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html +CVE-2019-20436 - https://github.com/cybersecurityworks/Disclosed/issues/19 +CVE-2019-20437 - https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html +CVE-2019-20437 - https://github.com/cybersecurityworks/Disclosed/issues/20 +CVE-2019-20438 - https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html +CVE-2019-20438 - https://github.com/cybersecurityworks/Disclosed/issues/22 +CVE-2019-20439 - https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html +CVE-2019-20439 - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0644 +CVE-2019-20439 - https://github.com/cybersecurityworks/Disclosed/issues/21 +CVE-2019-20440 - https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html +CVE-2019-20440 - https://github.com/cybersecurityworks/Disclosed/issues/24 +CVE-2019-20441 - https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html +CVE-2019-20441 - https://github.com/cybersecurityworks/Disclosed/issues/23 +CVE-2019-20442 - https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html +CVE-2019-20442 - https://github.com/cybersecurityworks/Disclosed/issues/25 +CVE-2019-20443 - https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html +CVE-2019-20443 - https://github.com/cybersecurityworks/Disclosed/issues/26 +CVE-2019-20447 - https://packetstormsecurity.com/files/152503/Jobberbase-CMS-2.0-SQL-Injection.html +CVE-2019-20447 - https://www.exploit-db.com/exploits/47311 +CVE-2019-20451 - https://www.exploit-db.com/papers/47535 +CVE-2019-20455 - https://github.com/globalpayments/php-sdk/pull/8 +CVE-2019-20477 - https://www.exploit-db.com/download/47655 +CVE-2019-20478 - https://www.exploit-db.com/exploits/47655 +CVE-2019-20480 - https://cert.vde.com/en-us/advisories/vde-2019-010 +CVE-2019-20481 - https://cert.vde.com/en-us/advisories/vde-2019-010 +CVE-2019-20483 - https://www.gosecure.net/blog/2020/12/15/vera-stored-xss-improper-access-control/ +CVE-2019-20484 - https://www.gosecure.net/blog/2020/12/15/vera-stored-xss-improper-access-control/ +CVE-2019-20499 - http://packetstormsecurity.com/files/156952/DLINK-DWL-2600-Authenticated-Remote-Command-Injection.html +CVE-2019-20499 - https://www.exploit-db.com/exploits/46841 +CVE-2019-20500 - https://www.exploit-db.com/exploits/46841 +CVE-2019-20501 - https://www.exploit-db.com/exploits/46841 +CVE-2019-20502 - https://github.com/s1kr10s/EasyChatServer-DOS +CVE-2019-20503 - http://seclists.org/fulldisclosure/2020/May/52 +CVE-2019-20503 - http://seclists.org/fulldisclosure/2020/May/55 +CVE-2019-20503 - http://seclists.org/fulldisclosure/2020/May/59 +CVE-2019-20503 - https://usn.ubuntu.com/4328-1/ +CVE-2019-20530 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20531 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20532 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20533 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20534 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20535 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20536 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20537 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20538 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20539 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-2054 - http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html +CVE-2019-2054 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-2054 - https://usn.ubuntu.com/4076-1/ +CVE-2019-20540 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20541 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20542 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20543 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20544 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20545 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20546 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20547 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20548 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20549 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20550 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20551 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20552 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20553 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20554 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20555 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20556 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20557 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20558 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20559 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20560 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20561 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20562 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20563 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20564 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20565 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20566 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20567 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20568 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20569 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20570 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20571 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20572 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20573 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20574 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20575 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20576 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20577 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20578 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20579 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20580 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20581 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20582 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20583 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20584 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20585 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20586 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20587 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20588 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20589 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20590 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20591 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20592 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20593 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20594 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20595 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20596 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20597 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20598 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20599 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20600 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20601 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20602 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20603 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20604 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20605 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20606 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20607 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20608 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20609 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20610 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20611 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20612 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20613 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20614 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20615 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20616 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20617 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20618 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20619 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20620 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20621 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20622 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20623 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20624 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20625 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-20626 - https://medium.com/@victor_14768/replay-attacks-en-autos-206481dcfee1 +CVE-2019-20628 - https://github.com/gpac/gpac/issues/1269 +CVE-2019-20629 - https://github.com/gpac/gpac/issues/1264 +CVE-2019-20630 - https://github.com/gpac/gpac/issues/1268 +CVE-2019-20631 - https://github.com/gpac/gpac/issues/1270 +CVE-2019-20632 - https://github.com/gpac/gpac/issues/1271 +CVE-2019-20633 - https://savannah.gnu.org/bugs/index.php?56683 +CVE-2019-20636 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12 +CVE-2019-20636 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784 +CVE-2019-20639 - https://kb.netgear.com/000061505/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0543 +CVE-2019-20641 - https://kb.netgear.com/000061501/Security-Advisory-for-Missing-Function-Level-Access-Control-on-RAX40-PSV-2019-0285 +CVE-2019-20645 - https://kb.netgear.com/000061497/Security-Advisory-for-Stored-Cross-Site-Scripting-on-RAX40-PSV-2019-0243 +CVE-2019-20646 - https://kb.netgear.com/000061496/Security-Advisory-for-Admin-Credential-Disclosure-on-RAX40-PSV-2019-0237 +CVE-2019-20649 - https://kb.netgear.com/000061493/Security-Advisory-for-Sensitive-Information-Disclosure-on-MR1100-PSV-2019-0204 +CVE-2019-20650 - https://kb.netgear.com/000061492/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2019-0197 +CVE-2019-20653 - https://kb.netgear.com/000061488/Security-Advisory-for-Denial-of-Service-on-WAC505-and-WAC510-PSV-2019-0083 +CVE-2019-20654 - https://kb.netgear.com/000061487/Security-Advisory-for-Security-Misconfiguration-on-WAC505-and-WAC510-PSV-2019-0061 +CVE-2019-20656 - https://kb.netgear.com/000061483/Security-Advisory-for-Hardcoded-Password-on-Some-Routers-and-Gateways-PSV-2018-0623 +CVE-2019-20659 - https://kb.netgear.com/000061480/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0567 +CVE-2019-20661 - https://kb.netgear.com/000061478/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0561 +CVE-2019-20664 - https://kb.netgear.com/000061475/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0558 +CVE-2019-20666 - https://kb.netgear.com/000061473/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0555 +CVE-2019-20668 - https://kb.netgear.com/000061471/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0551 +CVE-2019-20675 - https://kb.netgear.com/000061464/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0544 +CVE-2019-20679 - https://kb.netgear.com/000061460/Security-Advisory-for-Missing-Function-Level-Access-Control-on-MR1100-PSV-2018-0537 +CVE-2019-20686 - https://kb.netgear.com/000061453/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0239 +CVE-2019-20688 - https://kb.netgear.com/000061451/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0142 +CVE-2019-20689 - https://kb.netgear.com/000061450/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0132 +CVE-2019-20690 - https://kb.netgear.com/000061449/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-and-Gateways-PSV-2018-0073 +CVE-2019-20693 - https://kb.netgear.com/000061236/Security-Advisory-for-Security-Misconfiguration-on-WAC505-and-WAC510-PSV-2019-0084 +CVE-2019-20695 - https://kb.netgear.com/000061234/Security-Advisory-for-Sensitive-Information-Disclosure-on-Orbi-Pro-WiFi-System-PSV-2019-0158 +CVE-2019-20700 - https://kb.netgear.com/000061194/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2018 +CVE-2019-20706 - https://kb.netgear.com/000061223/Security-Advisory-for-Post-Authentication-Command-Injection-on-R7800-and-XR500-PSV-2018-0354 +CVE-2019-20708 - https://kb.netgear.com/000061221/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0340 +CVE-2019-20718 - https://kb.netgear.com/000061210/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0195 +CVE-2019-20719 - https://kb.netgear.com/000061209/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0194 +CVE-2019-20722 - https://kb.netgear.com/000061206/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0148 +CVE-2019-20724 - https://kb.netgear.com/000061204/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0144 +CVE-2019-20726 - https://kb.netgear.com/000061202/Security-Advisory-for-Post-Authentication-Command-on-Some-Routers-and-Gateways-PSV-2018-0141 +CVE-2019-20731 - https://kb.netgear.com/000061196/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2254 +CVE-2019-20732 - https://kb.netgear.com/000061195/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2228 +CVE-2019-20733 - https://kb.netgear.com/000061193/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2017 +CVE-2019-20734 - https://kb.netgear.com/000061192/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-0791 +CVE-2019-20737 - https://kb.netgear.com/000061188/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2016 +CVE-2019-20739 - https://kb.netgear.com/000061179/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-R8500-PSV-2017-0636 +CVE-2019-20740 - https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258 +CVE-2019-20741 - https://kb.netgear.com/000060982/Security-Advisory-for-Sensitive-Information-Disclosure-on-WAC510-PSV-2018-0635 +CVE-2019-20746 - https://kb.netgear.com/000060973/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0252 +CVE-2019-20748 - https://kb.netgear.com/000060963/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0147 +CVE-2019-20751 - https://kb.netgear.com/000060964/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Extenders-Gateways-and-Routers-PSV-2018-0171 +CVE-2019-20752 - https://kb.netgear.com/000060967/Security-Advisory-for-Site-Stored-Cross-Scripting-on-Some-Gateways-Routers-and-WiFi-Systems-PSV-2018-0250 +CVE-2019-20760 - https://kb.netgear.com/000060639/Security-Advisory-for-Authentication-Bypass-on-R9000-PSV-2018-0615 +CVE-2019-20761 - https://kb.netgear.com/000060638/Security-Advisory-for-Post-Authentication-Command-Injection-on-R7800-PSV-2018-0383 +CVE-2019-20762 - https://kb.netgear.com/000060637/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Modem-Routers-and-Gateways-PSV-2018-0197 +CVE-2019-20763 - https://kb.netgear.com/000060636/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R7800-PSV-2018-0145 +CVE-2019-20764 - https://kb.netgear.com/000060635/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R7800-PSV-2018-0137 +CVE-2019-20798 - https://github.com/cherokee/webserver/issues/1227 +CVE-2019-20798 - https://logicaltrust.net/blog/2019/11/cherokee.html +CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1221 +CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1222 +CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1225 +CVE-2019-20799 - https://github.com/cherokee/webserver/issues/1226 +CVE-2019-20799 - https://logicaltrust.net/blog/2019/11/cherokee.html +CVE-2019-20800 - https://github.com/cherokee/webserver/issues/1224 +CVE-2019-20800 - https://logicaltrust.net/blog/2019/11/cherokee.html +CVE-2019-20801 - https://logicaltrust.net/blog/2019/12/documents.html#authorization +CVE-2019-20802 - https://logicaltrust.net/blog/2019/12/documents.html#xss +CVE-2019-20803 - http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2019-20804 - http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2019-20804 - https://github.com/GilaCMS/gila/issues/57 +CVE-2019-20806 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 +CVE-2019-20810 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 +CVE-2019-20810 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 +CVE-2019-20811 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e +CVE-2019-20812 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7 +CVE-2019-20812 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b43d1f9f7067c6759b1051e8ecb84e82cef569fe +CVE-2019-20812 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-20841 - https://mattermost.com/security-updates/ +CVE-2019-20842 - https://mattermost.com/security-updates/ +CVE-2019-20843 - https://mattermost.com/security-updates/ +CVE-2019-20844 - https://mattermost.com/security-updates/ +CVE-2019-20845 - https://mattermost.com/security-updates/ +CVE-2019-20846 - https://mattermost.com/security-updates/ +CVE-2019-20847 - https://mattermost.com/security-updates/ +CVE-2019-20848 - https://mattermost.com/security-updates/ +CVE-2019-20849 - https://mattermost.com/security-updates/ +CVE-2019-20850 - https://mattermost.com/security-updates/ +CVE-2019-20851 - https://mattermost.com/security-updates/ +CVE-2019-20852 - https://mattermost.com/security-updates/ +CVE-2019-20853 - https://mattermost.com/security-updates/ +CVE-2019-20854 - https://mattermost.com/security-updates/ +CVE-2019-20855 - https://mattermost.com/security-updates/ +CVE-2019-20856 - https://mattermost.com/security-updates/ +CVE-2019-20857 - https://mattermost.com/security-updates/ +CVE-2019-20858 - https://mattermost.com/security-updates/ +CVE-2019-20859 - https://mattermost.com/security-updates/ +CVE-2019-20860 - https://mattermost.com/security-updates/ +CVE-2019-20861 - https://mattermost.com/security-updates/ +CVE-2019-20862 - https://mattermost.com/security-updates/ +CVE-2019-20863 - https://mattermost.com/security-updates/ +CVE-2019-20864 - https://mattermost.com/security-updates/ +CVE-2019-20865 - https://mattermost.com/security-updates/ +CVE-2019-20866 - https://mattermost.com/security-updates/ +CVE-2019-20867 - https://mattermost.com/security-updates/ +CVE-2019-20868 - https://mattermost.com/security-updates/ +CVE-2019-20869 - https://mattermost.com/security-updates/ +CVE-2019-20870 - https://mattermost.com/security-updates/ +CVE-2019-20871 - https://mattermost.com/security-updates/ +CVE-2019-20872 - https://mattermost.com/security-updates/ +CVE-2019-20873 - https://mattermost.com/security-updates/ +CVE-2019-20874 - https://mattermost.com/security-updates/ +CVE-2019-20875 - https://mattermost.com/security-updates/ +CVE-2019-20876 - https://mattermost.com/security-updates/ +CVE-2019-20877 - https://mattermost.com/security-updates/ +CVE-2019-20878 - https://mattermost.com/security-updates/ +CVE-2019-20879 - https://mattermost.com/security-updates/ +CVE-2019-20880 - https://mattermost.com/security-updates/ +CVE-2019-20881 - https://mattermost.com/security-updates/ +CVE-2019-20882 - https://mattermost.com/security-updates/ +CVE-2019-20883 - https://mattermost.com/security-updates/ +CVE-2019-20884 - https://mattermost.com/security-updates/ +CVE-2019-20885 - https://mattermost.com/security-updates/ +CVE-2019-20886 - https://mattermost.com/security-updates/ +CVE-2019-20887 - https://mattermost.com/security-updates/ +CVE-2019-20888 - https://mattermost.com/security-updates/ +CVE-2019-20889 - https://mattermost.com/security-updates/ +CVE-2019-20890 - https://mattermost.com/security-updates/ +CVE-2019-20892 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-20907 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-20908 - http://www.openwall.com/lists/oss-security/2020/07/20/6 +CVE-2019-20908 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4 +CVE-2019-20908 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e +CVE-2019-20908 - https://usn.ubuntu.com/4426-1/ +CVE-2019-20909 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20910 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20911 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20912 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20913 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20914 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20915 - https://github.com/LibreDWG/libredwg/issues/178 +CVE-2019-20916 - https://github.com/pypa/pip/issues/6413 +CVE-2019-20916 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-20916 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-20919 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-... +CVE-2019-20920 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478 +CVE-2019-20921 - https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457 +CVE-2019-20934 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6 +CVE-2019-20934 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16d51a590a8ce3befb1308e0e7ab77f3b661af33 +CVE-2019-2101 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-2101 - https://usn.ubuntu.com/4118-1/ +CVE-2019-2107 - http://packetstormsecurity.com/files/153628/Android-VideoPlayer-ihevcd_parse_pps-Out-Of-Bounds-Write.html +CVE-2019-2107 - http://seclists.org/fulldisclosure/2019/Jul/18 +CVE-2019-2181 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-2214 - http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html +CVE-2019-2215 - http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html +CVE-2019-2215 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-2215 - http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html +CVE-2019-2235 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2236 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2237 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2238 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2239 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2240 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2241 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2242 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-2243 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2244 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2019-2244 +CVE-2019-2245 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2019-2245 +CVE-2019-2250 - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2019-2250 +CVE-2019-2251 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2252 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2253 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2254 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2255 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2256 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2257 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2259 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2261 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2266 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2267 - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin +CVE-2019-2268 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2271 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2273 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2274 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-2275 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2281 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2288 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2289 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2294 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2295 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2297 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2298 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2300 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-2302 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2303 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2304 - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin +CVE-2019-2310 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2311 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-2315 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2317 - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin +CVE-2019-2318 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2319 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2320 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2321 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2322 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2327 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2329 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2334 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2335 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2336 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2337 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2338 - https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin +CVE-2019-2339 - https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin +CVE-2019-2343 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2346 - https://www.qualcomm.com/company/product-security/bulletins +CVE-2019-2386 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829 +CVE-2019-2395 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2396 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2397 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2398 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2399 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2400 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2401 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2402 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2403 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2404 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2405 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2406 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2407 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2408 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2409 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2410 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2411 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2412 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2413 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2413 - https://www.exploit-db.com/exploits/46187/ +CVE-2019-2414 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2414 - http://www.securityfocus.com/bid/106621 +CVE-2019-2415 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2416 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2417 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2418 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2419 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2420 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2421 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2422 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2422 - https://usn.ubuntu.com/3942-1/ +CVE-2019-2423 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2424 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2425 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2426 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2427 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2429 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2430 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2431 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2432 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2433 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2434 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2435 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2436 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2437 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2438 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2439 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2440 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2441 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2442 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2443 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2444 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2445 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2446 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2447 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2448 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2449 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2450 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2451 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2452 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2453 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2455 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2456 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2457 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2458 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2459 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2460 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2461 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2462 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2463 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2464 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2465 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2466 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2467 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2468 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2469 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2470 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2471 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2472 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2473 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2474 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2475 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2476 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2477 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2478 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2479 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2480 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2481 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2482 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2484 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2485 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2486 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2487 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2488 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2489 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2490 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2491 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2492 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2493 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2494 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2495 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2496 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2497 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2498 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2499 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2500 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2501 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25011 - http://www.cinquino.eu/NetBox.htm +CVE-2019-25011 - https://github.com/netbox-community/netbox/issues/3471 +CVE-2019-25013 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-25014 - https://bugzilla.redhat.com/show_bug.cgi?id=1919066 +CVE-2019-25017 - https://bugzilla.suse.com/show_bug.cgi?id=1131109 +CVE-2019-25018 - https://bugzilla.suse.com/show_bug.cgi?id=1131109 +CVE-2019-2502 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25023 - https://suid.ch/research/CVE-2019-25023.html +CVE-2019-25027 - https://github.com/vaadin/flow/pull/5498 +CVE-2019-2503 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25031 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25032 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25033 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25034 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25035 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25036 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25037 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25038 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25039 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-2504 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25040 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25041 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25042 - https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/ +CVE-2019-25044 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 +CVE-2019-25044 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 +CVE-2019-25045 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399 +CVE-2019-2505 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25053 - https://www.on-x.com/wp-content/uploads/2023/01/on-x_-_security_advisory_-_sage_frp_1000_-_cve-2019-25053.pdf +CVE-2019-25056 - https://github.com/bromite/bromite/issues/2#issuecomment-524102774 +CVE-2019-2506 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25060 - https://wpscan.com/vulnerability/393be73a-f8dc-462f-8670-f20ab89421fc +CVE-2019-25061 - https://stackoverflow.com/questions/42170239/security-of-rand-in-ruby-compared-to-other-methods/42170560 +CVE-2019-25062 - https://www.exploit-db.com/exploits/47477 +CVE-2019-25064 - https://vuldb.com/?id.146832 +CVE-2019-25065 - https://0day.today/exploit/33544 +CVE-2019-25065 - https://vuldb.com/?id.146798 +CVE-2019-25066 - https://vuldb.com/?id.143950 +CVE-2019-25066 - https://www.exploit-db.com/exploits/47497 +CVE-2019-25067 - https://vuldb.com/?id.143949 +CVE-2019-25067 - https://www.exploit-db.com/exploits/47500 +CVE-2019-2507 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25070 - https://vuldb.com/?id.135125 +CVE-2019-25071 - https://youtu.be/AeuGjMbAirU +CVE-2019-25075 - https://medium.com/@maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f +CVE-2019-25076 - https://www.youtube.com/watch?v=5cHpzVK0D28 +CVE-2019-25076 - https://www.youtube.com/watch?v=DSC3m-Bww64 +CVE-2019-2508 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2509 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25090 - https://vuldb.com/?ctiid.216878 +CVE-2019-25096 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 +CVE-2019-25097 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 +CVE-2019-25098 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 +CVE-2019-2510 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25102 - https://vuldb.com/?id.220638 +CVE-2019-2511 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2512 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2513 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-25137 - https://0xdf.gitlab.io/2020/09/05/htb-remote.html +CVE-2019-25137 - https://github.com/Ickarah/CVE-2019-25137-Version-Research +CVE-2019-25137 - https://github.com/noraj/Umbraco-RCE +CVE-2019-25137 - https://www.exploit-db.com/exploits/46153 +CVE-2019-25138 - https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin/ +CVE-2019-25139 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ +CVE-2019-25140 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ +CVE-2019-25141 - https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ +CVE-2019-2516 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2517 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2518 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2519 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2520 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2521 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2522 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2523 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2524 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2525 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2526 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2527 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2528 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2529 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2530 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2531 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2532 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2533 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2534 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2535 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2536 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2537 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2538 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2539 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2540 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2541 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2543 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2544 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2545 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2546 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2547 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2548 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2549 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2550 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2551 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2552 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2553 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2554 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2555 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2556 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html +CVE-2019-2557 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2558 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2561 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2564 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2565 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2566 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2567 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2568 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2569 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2570 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2571 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2572 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2573 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2574 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2575 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2576 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2577 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2578 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2579 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2580 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2581 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2582 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2583 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2584 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2585 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2586 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2587 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2588 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2589 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2590 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2591 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2592 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2593 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2594 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2595 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2596 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2597 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2598 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2599 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2600 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2601 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2602 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2602 - https://usn.ubuntu.com/3975-1/ +CVE-2019-2603 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2604 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2605 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2606 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2607 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2608 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2609 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2610 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2611 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2612 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2613 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2614 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2615 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2616 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2617 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2618 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2619 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2620 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2621 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2622 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2623 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2624 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2625 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2626 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2627 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2628 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2629 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2630 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2631 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2632 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2633 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2634 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2635 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2636 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2637 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2638 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2639 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2640 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2641 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2642 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2643 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2644 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2645 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2646 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2647 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2648 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2649 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2650 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2651 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2652 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2653 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2654 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2655 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2656 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2657 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2658 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2659 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2660 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2661 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2662 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2663 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2664 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2665 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2666 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2668 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2669 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2670 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2671 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2672 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2673 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2674 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2675 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2676 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2677 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2678 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2679 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2680 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2681 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2682 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2683 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2684 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2684 - https://usn.ubuntu.com/3975-1/ +CVE-2019-2685 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2686 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2687 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2688 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2689 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2690 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2691 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2692 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2693 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2694 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2695 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2696 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2697 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2697 - https://usn.ubuntu.com/3975-1/ +CVE-2019-2698 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2698 - https://usn.ubuntu.com/3975-1/ +CVE-2019-2699 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2700 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2701 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2702 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2703 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2704 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2705 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2706 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2707 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2708 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2709 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2712 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2713 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2719 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2720 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2721 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2721 - https://www.exploit-db.com/exploits/46747/ +CVE-2019-2722 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2723 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2725 - http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html +CVE-2019-2725 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2725 - https://www.exploit-db.com/exploits/46780/ +CVE-2019-2725 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-2726 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html +CVE-2019-2727 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2728 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2729 - http://packetstormsecurity.com/files/155886/Oracle-Weblogic-10.3.6.0.0-Remote-Command-Execution.html +CVE-2019-2729 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2729 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-2729 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-2729 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-2729 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2019-2730 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2731 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2732 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2733 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2734 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2735 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2736 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2737 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html +CVE-2019-2737 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2738 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2739 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html +CVE-2019-2739 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2740 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html +CVE-2019-2740 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2741 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2742 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2743 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2744 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2745 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2746 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2747 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2748 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2749 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2750 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2751 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2752 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2753 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2754 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2755 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2756 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2757 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2758 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2759 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2760 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2761 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2762 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2763 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2764 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2765 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2766 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2767 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2768 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2769 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2770 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2771 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2772 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2773 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2774 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2775 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2776 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2777 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2778 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2779 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2780 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2781 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2782 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2783 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2784 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2785 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2786 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2787 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2788 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2789 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2790 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2791 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2792 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2792 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2019-2793 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2794 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2795 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2796 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2797 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2798 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2799 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2800 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2801 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2802 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2803 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2804 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2805 - http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html +CVE-2019-2805 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2807 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2808 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2809 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2810 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2811 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2812 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2813 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2814 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2815 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2816 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2817 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2818 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2819 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2820 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2821 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2822 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2823 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2824 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2825 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2826 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2827 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2828 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2829 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2830 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2831 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2832 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2833 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2834 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2835 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2836 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2837 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2838 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2839 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2840 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2841 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2842 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2843 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2844 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2845 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2846 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2847 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2848 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2850 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2852 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2853 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2853 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-2854 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2855 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2856 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2857 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2858 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2859 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2860 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2861 - http://packetstormsecurity.com/files/153841/Oracle-Hyperion-Planning-11.1.2.3-XML-Injection.html +CVE-2019-2861 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2862 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2863 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2864 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2865 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2866 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2867 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2868 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2869 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2870 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2871 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2872 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2873 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2874 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2875 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2876 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2877 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2878 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2879 - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html +CVE-2019-2880 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-2883 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2884 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2886 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2887 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2888 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2889 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2890 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2891 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2894 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2894 - https://minerva.crocs.fi.muni.cz/ +CVE-2019-2895 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2896 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2897 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2897 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2019-2897 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-2898 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2899 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2899 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-2900 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2901 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2902 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2903 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2904 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2904 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-2904 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2019-2904 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-2904 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-2904 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-2905 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2906 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2907 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2909 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2910 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2911 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2913 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2914 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2915 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2920 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2922 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2923 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2924 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2925 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2926 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2927 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2929 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2930 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2931 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2932 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2933 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2934 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2935 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2936 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2937 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2938 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2938 - https://usn.ubuntu.com/4195-2/ +CVE-2019-2939 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2940 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2941 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2942 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2943 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2944 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2945 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2946 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2947 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2948 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2949 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2950 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2951 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2952 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2953 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2954 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2955 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2956 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2957 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2958 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2959 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2960 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2961 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2962 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2963 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2964 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2965 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2966 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2967 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2968 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2969 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2970 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2971 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2972 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2973 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2974 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2974 - https://usn.ubuntu.com/4195-2/ +CVE-2019-2975 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2976 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2977 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2978 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2979 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2980 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2981 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2982 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2983 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2984 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2985 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2986 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2987 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2988 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2989 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2990 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2991 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2992 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2993 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2994 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2995 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2996 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2997 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2998 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-2999 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3000 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3001 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3002 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3003 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3004 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3005 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3008 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3009 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3010 - http://packetstormsecurity.com/files/154960/Solaris-xscreensaver-Privilege-Escalation.html +CVE-2019-3010 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3011 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3012 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3014 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3015 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3016 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html +CVE-2019-3017 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3018 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3019 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3020 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3021 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3022 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3023 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3024 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3025 - http://packetstormsecurity.com/files/157746/Oracle-Hospitality-RES-3700-5.7-Remote-Code-Execution.html +CVE-2019-3025 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3026 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3027 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3028 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3031 - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3396 - http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html +CVE-2019-3396 - http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html +CVE-2019-3396 - https://jira.atlassian.com/browse/CONFSERVER-57974 +CVE-2019-3396 - https://www.exploit-db.com/exploits/46731/ +CVE-2019-3398 - http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html +CVE-2019-3398 - http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html +CVE-2019-3398 - http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html +CVE-2019-3422 - http://packetstormsecurity.com/files/158990/ZTE-Mobile-Hotspot-MS910S-Backdoor-Hardcoded-Password.html +CVE-2019-3422 - http://seclists.org/fulldisclosure/2020/Aug/20 +CVE-2019-3463 - http://seclists.org/fulldisclosure/2021/May/78 +CVE-2019-3464 - http://seclists.org/fulldisclosure/2021/May/78 +CVE-2019-3466 - https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/ +CVE-2019-3474 - https://www.exploit-db.com/exploits/46450/ +CVE-2019-3475 - https://www.exploit-db.com/exploits/46450/ +CVE-2019-3495 - http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html +CVE-2019-3496 - http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html +CVE-2019-3497 - http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html +CVE-2019-3501 - https://www.exploit-db.com/exploits/46080/ +CVE-2019-3560 - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html +CVE-2019-3565 - https://www.facebook.com/security/advisories/cve-2019-3565 +CVE-2019-3572 - https://github.com/libming/libming/issues/169 +CVE-2019-3575 - https://github.com/schettino72/sqla_yaml_fixtures/issues/20 +CVE-2019-3576 - https://gitee.com/inxeduopen/inxedu/issues/IQIIV +CVE-2019-3582 - https://kc.mcafee.com/corporate/index?page=content&id=SB10254 +CVE-2019-3585 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302 +CVE-2019-3586 - https://kc.mcafee.com/corporate/index?page=content&id=SB10280 +CVE-2019-3588 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302 +CVE-2019-3592 - https://kc.mcafee.com/corporate/index?page=content&id=SB10288 +CVE-2019-3613 - https://kc.mcafee.com/corporate/index?page=content&id=SB10320 +CVE-2019-3621 - https://kc.mcafee.com/corporate/index?page=content&id=SB10290 +CVE-2019-3622 - https://kc.mcafee.com/corporate/index?page=content&id=SB10290 +CVE-2019-3628 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2019-3629 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2019-3630 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2019-3631 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2019-3632 - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 +CVE-2019-3633 - https://kc.mcafee.com/corporate/index?page=content&id=SB10295 +CVE-2019-3634 - https://kc.mcafee.com/corporate/index?page=content&id=SB10295 +CVE-2019-3637 - https://kc.mcafee.com/corporate/index?page=content&id=SB10291 +CVE-2019-3638 - https://kc.mcafee.com/corporate/index?page=content&id=SB10294 +CVE-2019-3641 - https://kc.mcafee.com/corporate/index?page=content&id=SB10303 +CVE-2019-3648 - https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648 +CVE-2019-3649 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3650 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3651 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3652 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299 +CVE-2019-3653 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299 +CVE-2019-3654 - https://kc.mcafee.com/corporate/index?page=content&id=SB10305 +CVE-2019-3660 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3661 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3662 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3663 - https://kc.mcafee.com/corporate/index?page=content&id=SB10304 +CVE-2019-3691 - https://bugzilla.suse.com/show_bug.cgi?id=1155075 +CVE-2019-3692 - https://bugzilla.suse.com/show_bug.cgi?id=1154302 +CVE-2019-3693 - https://bugzilla.suse.com/show_bug.cgi?id=1154328 +CVE-2019-3694 - https://bugzilla.suse.com/show_bug.cgi?id=1155078 +CVE-2019-3697 - https://bugzilla.suse.com/show_bug.cgi?id=1154229 +CVE-2019-3701 - https://bugzilla.suse.com/show_bug.cgi?id=1120386 +CVE-2019-3701 - https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 +CVE-2019-3701 - https://marc.info/?l=linux-netdev&m=154661373531512&w=2 +CVE-2019-3701 - https://usn.ubuntu.com/3932-1/ +CVE-2019-3701 - https://usn.ubuntu.com/4115-1/ +CVE-2019-3701 - https://usn.ubuntu.com/4118-1/ +CVE-2019-3738 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-3738 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-3738 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-3739 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-3739 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-3739 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-3740 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-3740 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-3740 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-3759 - http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html +CVE-2019-3759 - https://community.rsa.com/docs/DOC-106943 +CVE-2019-3760 - https://community.rsa.com/docs/DOC-106943 +CVE-2019-3761 - https://community.rsa.com/docs/DOC-106943 +CVE-2019-3763 - https://community.rsa.com/docs/DOC-106943 +CVE-2019-3773 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-3773 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-3773 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-3778 - http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html +CVE-2019-3778 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-3799 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-3810 - http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html +CVE-2019-3814 - https://hackerone.com/reports/480928 +CVE-2019-3814 - https://www.dovecot.org/list/dovecot/2019-February/114575.html +CVE-2019-3819 - https://usn.ubuntu.com/3932-1/ +CVE-2019-3819 - https://usn.ubuntu.com/4115-1/ +CVE-2019-3819 - https://usn.ubuntu.com/4118-1/ +CVE-2019-3822 - http://www.securityfocus.com/bid/106950 +CVE-2019-3823 - http://www.securityfocus.com/bid/106950 +CVE-2019-3828 - http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html +CVE-2019-3832 - https://github.com/erikd/libsndfile/issues/456 +CVE-2019-3832 - https://usn.ubuntu.com/4013-1/ +CVE-2019-3835 - http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html +CVE-2019-3835 - https://bugs.ghostscript.com/show_bug.cgi?id=700585 +CVE-2019-3838 - http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html +CVE-2019-3838 - https://bugs.ghostscript.com/show_bug.cgi?id=700576 +CVE-2019-3842 - http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html +CVE-2019-3842 - https://www.exploit-db.com/exploits/46743/ +CVE-2019-3846 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-3846 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html +CVE-2019-3846 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html +CVE-2019-3846 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-3846 - https://usn.ubuntu.com/4118-1/ +CVE-2019-3855 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html +CVE-2019-3855 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3856 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3857 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3858 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html +CVE-2019-3858 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3859 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html +CVE-2019-3859 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3860 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3861 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3862 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html +CVE-2019-3862 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-3862 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3863 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-3870 - https://www.synology.com/security/advisory/Synology_SA_19_15 +CVE-2019-3874 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-3880 - https://www.synology.com/security/advisory/Synology_SA_19_15 +CVE-2019-3883 - https://pagure.io/389-ds-base/issue/50329 +CVE-2019-3900 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html +CVE-2019-3900 - https://usn.ubuntu.com/4115-1/ +CVE-2019-3900 - https://usn.ubuntu.com/4118-1/ +CVE-2019-3900 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-3906 - http://www.securityfocus.com/bid/106552 +CVE-2019-3907 - http://www.securityfocus.com/bid/106552 +CVE-2019-3908 - http://www.securityfocus.com/bid/106552 +CVE-2019-3909 - http://www.securityfocus.com/bid/106552 +CVE-2019-3910 - https://www.tenable.com/security/research/tra-2019-02 +CVE-2019-3911 - https://www.tenable.com/security/research/tra-2019-03 +CVE-2019-3912 - https://www.tenable.com/security/research/tra-2019-03 +CVE-2019-3913 - https://www.tenable.com/security/research/tra-2019-03 +CVE-2019-3914 - https://www.tenable.com/security/research/tra-2019-17 +CVE-2019-3915 - https://www.tenable.com/security/research/tra-2019-17 +CVE-2019-3916 - https://www.tenable.com/security/research/tra-2019-17 +CVE-2019-3917 - https://www.tenable.com/security/research/tra-2019-09 +CVE-2019-3918 - https://www.tenable.com/security/research/tra-2019-09 +CVE-2019-3919 - https://www.tenable.com/security/research/tra-2019-09 +CVE-2019-3920 - https://www.tenable.com/security/research/tra-2019-09 +CVE-2019-3921 - https://www.exploit-db.com/exploits/46469/ +CVE-2019-3921 - https://www.tenable.com/security/research/tra-2019-09 +CVE-2019-3922 - https://www.tenable.com/security/research/tra-2019-09 +CVE-2019-3924 - https://www.exploit-db.com/exploits/46444/ +CVE-2019-3924 - https://www.tenable.com/security/research/tra-2019-07 +CVE-2019-3925 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3926 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3927 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3928 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3929 - http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html +CVE-2019-3929 - http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html +CVE-2019-3929 - https://www.exploit-db.com/exploits/46786/ +CVE-2019-3929 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3930 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3931 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3932 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3933 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3934 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3935 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3936 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3937 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3938 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3939 - https://www.tenable.com/security/research/tra-2019-20 +CVE-2019-3943 - https://www.tenable.com/security/research/tra-2019-16 +CVE-2019-3946 - https://www.tenable.com/security/research/tra-2019-27 +CVE-2019-3947 - https://www.tenable.com/security/research/tra-2019-27 +CVE-2019-3948 - http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html +CVE-2019-3948 - https://www.tenable.com/security/research/tra-2019-36 +CVE-2019-3949 - https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms +CVE-2019-3950 - https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms +CVE-2019-3953 - https://www.tenable.com/security/research/tra-2019-17 +CVE-2019-3958 - https://www.tenable.com/security/research/tra-2019-37 +CVE-2019-3959 - https://www.tenable.com/security/research/tra-2019-37 +CVE-2019-3960 - https://www.tenable.com/security/research/tra-2019-37 +CVE-2019-3961 - https://www.tenable.com/security/tns-2019-04 +CVE-2019-3962 - https://www.tenable.com/security/tns-2019-04 +CVE-2019-3963 - https://www.tenable.com/security/research/tra-2019-40 +CVE-2019-3964 - https://www.tenable.com/security/research/tra-2019-40 +CVE-2019-3965 - https://www.tenable.com/security/research/tra-2019-40 +CVE-2019-3966 - https://www.tenable.com/security/research/tra-2019-40 +CVE-2019-3967 - https://www.tenable.com/security/research/tra-2019-40 +CVE-2019-3968 - https://www.tenable.com/security/research/tra-2019-40 +CVE-2019-3969 - https://www.tenable.com/security/research/tra-2019-34 +CVE-2019-3970 - https://www.tenable.com/security/research/tra-2019-34 +CVE-2019-3971 - https://www.tenable.com/security/research/tra-2019-34 +CVE-2019-3972 - https://www.tenable.com/security/research/tra-2019-34 +CVE-2019-3973 - https://www.tenable.com/security/research/tra-2019-34 +CVE-2019-3974 - https://www.tenable.com/security/tns-2019-05 +CVE-2019-3976 - https://www.tenable.com/security/research/tra-2019-46 +CVE-2019-3977 - https://www.tenable.com/security/research/tra-2019-46 +CVE-2019-3978 - http://packetstormsecurity.com/files/155036/MikroTik-RouterOS-6.45.6-DNS-Cache-Poisoning.html +CVE-2019-3978 - https://www.tenable.com/security/research/tra-2019-46 +CVE-2019-3979 - https://www.tenable.com/security/research/tra-2019-46 +CVE-2019-3980 - https://www.tenable.com/security/research/tra-2019-43 +CVE-2019-3980 - https://www.tenable.com/security/research/tra-227-43 +CVE-2019-3981 - https://www.tenable.com/security/research/tra-2020-01 +CVE-2019-3982 - https://www.tenable.com/security/tns-2019-06 +CVE-2019-3992 - https://www.tenable.com/security/research/tra-2019-53 +CVE-2019-3993 - https://www.tenable.com/security/research/tra-2019-53 +CVE-2019-3994 - https://www.tenable.com/security/research/tra-2019-53 +CVE-2019-3995 - https://www.tenable.com/security/research/tra-2019-53 +CVE-2019-3996 - https://www.tenable.com/security/research/tra-2019-53 +CVE-2019-3997 - https://www.tenable.com/security/research/tra-2020-03 +CVE-2019-3998 - https://www.tenable.com/security/research/tra-2020-09 +CVE-2019-3999 - http://packetstormsecurity.com/files/157493/Druva-inSync-Windows-Client-6.5.2-Privilege-Escalation.html +CVE-2019-3999 - http://packetstormsecurity.com/files/157680/Druva-inSync-inSyncCPHwnet64.exe-RPC-Type-5-Privilege-Escalation.html +CVE-2019-3999 - https://www.tenable.com/security/research/tra-2020-12 +CVE-2019-4000 - https://www.tenable.com/security/research/tra-2020-12 +CVE-2019-4001 - https://www.tenable.com/security/research/tra-2020-12 +CVE-2019-4013 - http://packetstormsecurity.com/files/154747/IBM-Bigfix-Platform-9.5.9.62-Arbitary-File-Upload-Code-Execution.html +CVE-2019-4047 - https://www.ibm.com/support/docview.wss?uid=ibm10882262 +CVE-2019-4149 - https://www.ibm.com/support/docview.wss?uid=ibm10885104 +CVE-2019-4178 - http://www.ibm.com/support/docview.wss?uid=ibm10879079 +CVE-2019-4253 - http://www.ibm.com/support/docview.wss?uid=ibm10964987 +CVE-2019-4334 - https://www.ibm.com/support/pages/node/1074144 +CVE-2019-4426 - https://www.ibm.com/support/pages/node/1116087 +CVE-2019-4444 - https://www.ibm.com/support/pages/node/1126833 +CVE-2019-4471 - https://www.ibm.com/support/pages/node/6451705 +CVE-2019-4556 - https://www.ibm.com/support/pages/node/1102443 +CVE-2019-4635 - https://www.ibm.com/support/pages/node/1283212 +CVE-2019-4645 - https://www.ibm.com/support/pages/node/1074144 +CVE-2019-4653 - https://www.ibm.com/support/pages/node/6451705 +CVE-2019-4716 - http://packetstormsecurity.com/files/156953/IBM-Cognos-TM1-IBM-Planning-Analytics-Server-Configuration-Overwrite-Code-Execution.html +CVE-2019-4716 - http://seclists.org/fulldisclosure/2020/Mar/44 +CVE-2019-4722 - https://www.ibm.com/support/pages/node/6451705 +CVE-2019-4723 - https://www.ibm.com/support/pages/node/6451705 +CVE-2019-4724 - https://www.ibm.com/support/pages/node/6451705 +CVE-2019-4730 - https://www.ibm.com/support/pages/node/6451705 +CVE-2019-5009 - http://lists.vtigercrm.com/pipermail/vtigercrm-developers/2019-January/037852.html +CVE-2019-5009 - https://pentest.com.tr/exploits/Vtiger-CRM-7-1-0-Remote-Code-Execution.html +CVE-2019-5009 - https://www.exploit-db.com/exploits/46065 +CVE-2019-5010 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758 +CVE-2019-5011 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0759 +CVE-2019-5012 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0760 +CVE-2019-5013 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0761 +CVE-2019-5014 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0772 +CVE-2019-5015 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0773 +CVE-2019-5016 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0775 +CVE-2019-5017 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0776 +CVE-2019-5018 - http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html +CVE-2019-5018 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777 +CVE-2019-5019 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0780 +CVE-2019-5020 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0781 +CVE-2019-5021 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0782 +CVE-2019-5023 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0784 +CVE-2019-5024 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 +CVE-2019-5029 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0790 +CVE-2019-5030 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0792 +CVE-2019-5031 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0793 +CVE-2019-5034 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0797 +CVE-2019-5035 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0798 +CVE-2019-5036 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0799 +CVE-2019-5037 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0800 +CVE-2019-5038 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0801 +CVE-2019-5039 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0802 +CVE-2019-5040 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0803 +CVE-2019-5042 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0809 +CVE-2019-5043 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0810 +CVE-2019-5045 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0814 +CVE-2019-5046 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0815 +CVE-2019-5047 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0816 +CVE-2019-5048 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0817 +CVE-2019-5049 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0818 +CVE-2019-5050 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0819 +CVE-2019-5051 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820 +CVE-2019-5052 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821 +CVE-2019-5053 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0830 +CVE-2019-5054 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0831 +CVE-2019-5055 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0832 +CVE-2019-5057 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0841 +CVE-2019-5058 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0842 +CVE-2019-5059 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843 +CVE-2019-5060 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0844 +CVE-2019-5061 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0849 +CVE-2019-5062 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850 +CVE-2019-5063 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852 +CVE-2019-5063 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-5063 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-5064 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853 +CVE-2019-5064 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2019-5064 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-5065 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0854 +CVE-2019-5068 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 +CVE-2019-5069 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0858 +CVE-2019-5070 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0859 +CVE-2019-5071 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 +CVE-2019-5072 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 +CVE-2019-5073 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0862 +CVE-2019-5074 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0863 +CVE-2019-5075 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0864 +CVE-2019-5076 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0865 +CVE-2019-5077 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0869 +CVE-2019-5078 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0870 +CVE-2019-5079 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0871 +CVE-2019-5080 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0872 +CVE-2019-5081 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0873 +CVE-2019-5082 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0874 +CVE-2019-5083 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0875 +CVE-2019-5084 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0876 +CVE-2019-5085 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0877 +CVE-2019-5086 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0878 +CVE-2019-5086 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0878 +CVE-2019-5087 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0879 +CVE-2019-5088 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0880 +CVE-2019-5089 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0881 +CVE-2019-5090 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0882 +CVE-2019-5091 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0883 +CVE-2019-5092 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0884 +CVE-2019-5093 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0885 +CVE-2019-5094 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887 +CVE-2019-5095 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0838 +CVE-2019-5096 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888 +CVE-2019-5097 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889 +CVE-2019-5098 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0890 +CVE-2019-5099 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0891 +CVE-2019-5100 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0892 +CVE-2019-5101 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0893 +CVE-2019-5102 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0893 +CVE-2019-5105 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0897 +CVE-2019-5106 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898 +CVE-2019-5107 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899 +CVE-2019-5108 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html +CVE-2019-5108 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900 +CVE-2019-5108 - https://usn.ubuntu.com/4287-2/ +CVE-2019-5108 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-5109 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0902 +CVE-2019-5110 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0903 +CVE-2019-5111 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904 +CVE-2019-5112 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904 +CVE-2019-5114 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0906 +CVE-2019-5116 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0907 +CVE-2019-5117 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0908 +CVE-2019-5119 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0909 +CVE-2019-5120 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0910 +CVE-2019-5121 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 +CVE-2019-5122 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 +CVE-2019-5123 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 +CVE-2019-5124 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0913 +CVE-2019-5125 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0916 +CVE-2019-5126 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0915 +CVE-2019-5127 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 +CVE-2019-5128 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 +CVE-2019-5129 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 +CVE-2019-5130 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0935 +CVE-2019-5131 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0920 +CVE-2019-5132 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0921 +CVE-2019-5133 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0922 +CVE-2019-5134 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0923 +CVE-2019-5135 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0924 +CVE-2019-5136 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0925 +CVE-2019-5137 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0926 +CVE-2019-5138 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0927 +CVE-2019-5139 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0928 +CVE-2019-5140 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0929 +CVE-2019-5141 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0930 +CVE-2019-5142 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0931 +CVE-2019-5143 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0932 +CVE-2019-5144 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0933 +CVE-2019-5145 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0934 +CVE-2019-5146 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0937 +CVE-2019-5147 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0936 +CVE-2019-5148 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0938 +CVE-2019-5149 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0939 +CVE-2019-5150 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0940 +CVE-2019-5151 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0941 +CVE-2019-5152 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942 +CVE-2019-5153 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0944 +CVE-2019-5154 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0945 +CVE-2019-5155 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0948 +CVE-2019-5156 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0949 +CVE-2019-5157 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0950 +CVE-2019-5158 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951 +CVE-2019-5159 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0952 +CVE-2019-5160 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0953 +CVE-2019-5161 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0954 +CVE-2019-5162 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0955 +CVE-2019-5163 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956 +CVE-2019-5164 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 +CVE-2019-5165 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0960 +CVE-2019-5166 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0961 +CVE-2019-5167 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5168 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5169 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5170 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5171 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5172 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5173 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5174 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5175 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 +CVE-2019-5176 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5177 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5178 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5179 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5180 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5181 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5182 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 +CVE-2019-5183 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0964 +CVE-2019-5184 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0965 +CVE-2019-5185 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0966 +CVE-2019-5186 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0966 +CVE-2019-5187 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0972 +CVE-2019-5188 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973 +CVE-2019-5338 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5339 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5340 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5341 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5342 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5343 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5344 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5345 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5346 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5347 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5348 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5349 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5350 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5351 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5352 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5353 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5354 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5355 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5356 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5357 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5358 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5359 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5360 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5361 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5362 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5363 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5364 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5365 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5366 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5367 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5368 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5369 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5370 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5371 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5372 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5373 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5374 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5375 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5376 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5377 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5378 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5379 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5380 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5381 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5382 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5383 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5384 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5385 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5386 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5387 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5388 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5389 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5390 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5390 - https://www.tenable.com/security/research/tra-2019-42 +CVE-2019-5391 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5391 - https://www.tenable.com/security/research/tra-2019-42 +CVE-2019-5392 - http://packetstormsecurity.com/files/154580/HPE-Intelligent-Management-Center-Information-Disclosure.html +CVE-2019-5392 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5393 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us +CVE-2019-5401 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03944en_us +CVE-2019-5413 - https://hackerone.com/reports/390881 +CVE-2019-5414 - https://hackerone.com/reports/389561 +CVE-2019-5415 - https://hackerone.com/reports/330724 +CVE-2019-5416 - https://hackerone.com/reports/334837 +CVE-2019-5417 - https://hackerone.com/reports/358645 +CVE-2019-5418 - http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html +CVE-2019-5418 - https://www.exploit-db.com/exploits/46585/ +CVE-2019-5420 - http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html +CVE-2019-5420 - https://hackerone.com/reports/473888 +CVE-2019-5420 - https://www.exploit-db.com/exploits/46785/ +CVE-2019-5422 - https://hackerone.com/reports/331110 +CVE-2019-5423 - https://hackerone.com/reports/384939 +CVE-2019-5424 - https://hackerone.com/reports/508256 +CVE-2019-5425 - https://hackerone.com/reports/511025 +CVE-2019-5426 - https://hackerone.com/reports/512958 +CVE-2019-5427 - https://hackerone.com/reports/509315 +CVE-2019-5427 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-5427 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-5427 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-5427 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-5427 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-5429 - https://www.tenable.com/security/research/tra-2019-14 +CVE-2019-5430 - https://hackerone.com/reports/329749 +CVE-2019-5432 - https://hackerone.com/reports/541354 +CVE-2019-5433 - https://hackerone.com/reports/390663 +CVE-2019-5434 - http://packetstormsecurity.com/files/155559/Revive-Adserver-4.2-Remote-Code-Execution.html +CVE-2019-5435 - https://hackerone.com/reports/547630 +CVE-2019-5435 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-5435 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-5435 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-5436 - https://hackerone.com/reports/550696 +CVE-2019-5436 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-5436 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-5436 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-5437 - https://hackerone.com/reports/453820 +CVE-2019-5438 - https://hackerone.com/reports/530289 +CVE-2019-5439 - https://hackerone.com/reports/484398 +CVE-2019-5441 - https://hackerone.com/reports/546753 +CVE-2019-5442 - https://hackerone.com/reports/506791 +CVE-2019-5443 - http://www.openwall.com/lists/oss-security/2019/06/24/1 +CVE-2019-5443 - https://curl.haxx.se/docs/CVE-2019-5443.html +CVE-2019-5443 - https://hackerone.com/reports/608577 +CVE-2019-5443 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-5443 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-5443 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-5444 - https://hackerone.com/reports/569966 +CVE-2019-5447 - https://hackerone.com/reports/570133 +CVE-2019-5448 - https://hackerone.com/reports/640904 +CVE-2019-5449 - https://hackerone.com/reports/231917 +CVE-2019-5449 - https://hackerone.com/reports/476615 +CVE-2019-5450 - https://hackerone.com/reports/631227 +CVE-2019-5451 - https://hackerone.com/reports/507172 +CVE-2019-5452 - https://hackerone.com/reports/534541 +CVE-2019-5453 - https://hackerone.com/reports/331489 +CVE-2019-5454 - https://hackerone.com/reports/291764 +CVE-2019-5455 - https://hackerone.com/reports/490946 +CVE-2019-5456 - https://hackerone.com/reports/519582 +CVE-2019-5457 - https://hackerone.com/reports/570568 +CVE-2019-5458 - https://hackerone.com/reports/570563 +CVE-2019-5459 - https://hackerone.com/reports/502816 +CVE-2019-5460 - https://hackerone.com/reports/503208 +CVE-2019-5461 - https://gitlab.com//gitlab-org/gitlab-ce/issues/54649 +CVE-2019-5461 - https://hackerone.com/reports/446593 +CVE-2019-5463 - https://hackerone.com/reports/477222 +CVE-2019-5464 - https://gitlab.com/gitlab-org/gitlab-ce/issues/63959 +CVE-2019-5464 - https://hackerone.com/reports/632101 +CVE-2019-5467 - https://hackerone.com/reports/526325 +CVE-2019-5468 - https://gitlab.com/gitlab-org/gitlab-ce/issues/57556 +CVE-2019-5469 - https://hackerone.com/reports/534794 +CVE-2019-5471 - https://hackerone.com/reports/496973 +CVE-2019-5473 - https://hackerone.com/reports/565883 +CVE-2019-5475 - https://hackerone.com/reports/654888 +CVE-2019-5476 - https://hackerone.com/reports/508487 +CVE-2019-5479 - https://hackerone.com/reports/566056 +CVE-2019-5480 - https://hackerone.com/reports/570035 +CVE-2019-5481 - https://hackerone.com/reports/686823 +CVE-2019-5481 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-5481 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-5481 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-5482 - https://hackerone.com/reports/684603 +CVE-2019-5482 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-5482 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-5482 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-5483 - https://hackerone.com/reports/526258 +CVE-2019-5484 - https://hackerone.com/reports/473811 +CVE-2019-5484 - https://hackerone.com/reports/492512 +CVE-2019-5484 - https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction +CVE-2019-5485 - http://packetstormsecurity.com/files/154598/NPMJS-gitlabhook-0.0.17-Remote-Command-Execution.html +CVE-2019-5485 - https://hackerone.com/reports/685447 +CVE-2019-5486 - https://hackerone.com/reports/617896 +CVE-2019-5487 - https://hackerone.com/reports/692252 +CVE-2019-5489 - https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e +CVE-2019-5489 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-5489 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-5489 - https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/ +CVE-2019-5514 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html +CVE-2019-5515 - https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html +CVE-2019-5518 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html +CVE-2019-5519 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html +CVE-2019-5523 - http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html +CVE-2019-5524 - http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html +CVE-2019-5526 - http://packetstormsecurity.com/files/152946/VMware-Workstation-DLL-Hijacking.html +CVE-2019-5532 - http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html +CVE-2019-5534 - http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html +CVE-2019-5537 - https://www.vmware.com/security/advisories/VMSA-2019-0018.html +CVE-2019-5538 - https://www.vmware.com/security/advisories/VMSA-2019-0018.html +CVE-2019-5544 - http://www.vmware.com/security/advisories/VMSA-2019-0022.html +CVE-2019-5585 - https://fortiguard.com/advisory/FG-IR-19-003 +CVE-2019-5587 - https://fortiguard.com/advisory/FG-IR-19-017 +CVE-2019-5590 - https://fortiguard.com/advisory/FG-IR-19-070 +CVE-2019-5592 - https://fortiguard.com/advisory/FG-IR-19-145 +CVE-2019-5593 - https://fortiguard.com/psirt/FG-IR-19-134 +CVE-2019-5596 - http://packetstormsecurity.com/files/155790/FreeBSD-fd-Privilege-Escalation.html +CVE-2019-5597 - http://packetstormsecurity.com/files/152933/FreeBSD-Security-Advisory-FreeBSD-SA-19-05.pf.html +CVE-2019-5598 - http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html +CVE-2019-5598 - https://www.synacktiv.com/posts/systems/icmp-reachable.html +CVE-2019-5599 - http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html +CVE-2019-5599 - http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html +CVE-2019-5599 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 +CVE-2019-5599 - https://seclists.org/bugtraq/2019/Jun/27 +CVE-2019-5600 - http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SA-19-09.iconv.html +CVE-2019-5601 - http://packetstormsecurity.com/files/153523/FreeBSD-Security-Advisory-FreeBSD-SA-19-10.ufs.html +CVE-2019-5602 - http://packetstormsecurity.com/files/153522/FreeBSD-Security-Advisory-FreeBSD-SA-19-11.cd_ioctl.html +CVE-2019-5603 - http://packetstormsecurity.com/files/153752/FreeBSD-Security-Advisory-FreeBSD-SA-19-15.mqueuefs.html +CVE-2019-5603 - http://packetstormsecurity.com/files/154172/FreeBSD-Security-Advisory-FreeBSD-SA-19-24.mqueuefs.html +CVE-2019-5604 - http://packetstormsecurity.com/files/153753/FreeBSD-Security-Advisory-FreeBSD-SA-19-16.bhyve.html +CVE-2019-5605 - http://packetstormsecurity.com/files/153749/FreeBSD-Security-Advisory-FreeBSD-SA-19-14.freebsd32.html +CVE-2019-5606 - http://packetstormsecurity.com/files/153748/FreeBSD-Security-Advisory-FreeBSD-SA-19-13.pts.html +CVE-2019-5607 - http://packetstormsecurity.com/files/153755/FreeBSD-Security-Advisory-FreeBSD-SA-19-17.fd.html +CVE-2019-5610 - http://packetstormsecurity.com/files/153959/FreeBSD-Security-Advisory-FreeBSD-SA-19-20.bsnmp.html +CVE-2019-5611 - http://packetstormsecurity.com/files/154170/FreeBSD-Security-Advisory-FreeBSD-SA-19-22.mbuf.html +CVE-2019-5624 - https://blog.doyensec.com/2019/04/24/rubyzip-bug.html +CVE-2019-5629 - http://packetstormsecurity.com/files/153159/Rapid7-Windows-InsightIDR-Agent-2.6.3.14-Local-Privilege-Escalation.html +CVE-2019-5629 - http://seclists.org/fulldisclosure/2019/Jun/13 +CVE-2019-5629 - https://bogner.sh/2019/06/local-privilege-escalation-in-rapid7s-windows-insight-idr-agent/ +CVE-2019-5629 - https://seclists.org/bugtraq/2019/Jun/0 +CVE-2019-5665 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5665 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5666 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5666 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5667 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5667 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5668 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5668 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5669 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5669 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5670 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5670 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5671 - http://support.lenovo.com/us/en/solutions/LEN-26250 +CVE-2019-5671 - https://nvidia.custhelp.com/app/answers/detail/a_id/4772 +CVE-2019-5676 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 +CVE-2019-5676 - https://support.lenovo.com/us/en/product_security/LEN-27815 +CVE-2019-5678 - https://support.lenovo.com/us/en/product_security/LEN-27815 +CVE-2019-5679 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2019-5680 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2019-5681 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2019-5682 - https://nvidia.custhelp.com/app/answers/detail/a_id/4804 +CVE-2019-5683 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 +CVE-2019-5684 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 +CVE-2019-5685 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 +CVE-2019-5686 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 +CVE-2019-5687 - https://nvidia.custhelp.com/app/answers/detail/a_id/4841 +CVE-2019-5694 - https://safebreach.com/Post/NVIDIA-GPU-Display-Drivers-for-Windows-and-GFE-Software-DLL-Preloading-and-Potential-Abuses-CVE-2019-5694-CVE-2019-5695 +CVE-2019-5695 - https://safebreach.com/Post/NVIDIA-GPU-Display-Drivers-for-Windows-and-GFE-Software-DLL-Preloading-and-Potential-Abuses-CVE-2019-5694-CVE-2019-5695 +CVE-2019-5701 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md +CVE-2019-5718 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373 +CVE-2019-5718 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-5720 - https://github.com/FrontAccountingERP/FA/issues/38 +CVE-2019-5722 - http://packetstormsecurity.com/files/151117/PORTIER-4.4.4.2-4.4.4.6-SQL-Injection.html +CVE-2019-5722 - https://seclists.org/bugtraq/2019/Jan/7 +CVE-2019-5722 - https://www.exploit-db.com/exploits/46163/ +CVE-2019-5722 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-012.txt +CVE-2019-5723 - http://packetstormsecurity.com/files/151118/PORTIER-4.4.4.2-4.4.4.6-Cryptographic-Issues.html +CVE-2019-5723 - https://seclists.org/bugtraq/2019/Jan/8 +CVE-2019-5723 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-011.txt +CVE-2019-5736 - http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html +CVE-2019-5736 - http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html +CVE-2019-5736 - https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/ +CVE-2019-5736 - https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/ +CVE-2019-5736 - https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html +CVE-2019-5736 - https://github.com/Frichetten/CVE-2019-5736-PoC +CVE-2019-5736 - https://github.com/q3k/cve-2019-5736-poc +CVE-2019-5736 - https://github.com/rancher/runc-cve +CVE-2019-5736 - https://hackerone.com/reports/495495 +CVE-2019-5736 - https://www.exploit-db.com/exploits/46359/ +CVE-2019-5736 - https://www.exploit-db.com/exploits/46369/ +CVE-2019-5747 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html +CVE-2019-5747 - http://seclists.org/fulldisclosure/2019/Sep/7 +CVE-2019-5747 - https://seclists.org/bugtraq/2019/Sep/7 +CVE-2019-5825 - http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html +CVE-2019-5831 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0791 +CVE-2019-5893 - https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection +CVE-2019-5893 - https://www.exploit-db.com/exploits/46118/ +CVE-2019-5916 - https://poweregg.d-circle.com/support/package/important/20190204_000780/ +CVE-2019-5918 - https://nablarch.atlassian.net/projects/NAB/issues/NAB-295 +CVE-2019-5919 - https://nablarch.atlassian.net/browse/NAB-313 +CVE-2019-5920 - https://wpvulndb.com/vulnerabilities/9231 +CVE-2019-5924 - https://wpvulndb.com/vulnerabilities/9232 +CVE-2019-5953 - https://access.redhat.com/errata/RHSA-2019:3168 +CVE-2019-5962 - https://wpvulndb.com/vulnerabilities/9433 +CVE-2019-5963 - https://wpvulndb.com/vulnerabilities/9433 +CVE-2019-5970 - https://wpvulndb.com/vulnerabilities/9434 +CVE-2019-5971 - https://wpvulndb.com/vulnerabilities/9434 +CVE-2019-5972 - https://wpvulndb.com/vulnerabilities/9435 +CVE-2019-5973 - https://wpvulndb.com/vulnerabilities/9435 +CVE-2019-5974 - https://wpvulndb.com/vulnerabilities/9436 +CVE-2019-5979 - https://wpvulndb.com/vulnerabilities/9437 +CVE-2019-5980 - https://wpvulndb.com/vulnerabilities/9336 +CVE-2019-5983 - https://wpvulndb.com/vulnerabilities/9438 +CVE-2019-5984 - https://wpvulndb.com/vulnerabilities/9439 +CVE-2019-5994 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ +CVE-2019-5995 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ +CVE-2019-5997 - http://downloadvi.com/downloads/IPServer/v7.6/760272/v760272RN.pdf +CVE-2019-5998 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ +CVE-2019-5999 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ +CVE-2019-6000 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ +CVE-2019-6001 - https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ +CVE-2019-6009 - https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3 +CVE-2019-6009 - https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch +CVE-2019-6109 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2019-6109 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-6110 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2019-6110 - https://www.exploit-db.com/exploits/46193/ +CVE-2019-6111 - https://bugzilla.redhat.com/show_bug.cgi?id=1677794 +CVE-2019-6111 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2019-6111 - https://www.exploit-db.com/exploits/46193/ +CVE-2019-6111 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-6112 - https://metamorfosec.com/Files/Advisories/METS-2020-001-A_XSS_Vulnerability_in_Sell_Media_Plugin_v2.4.1_for_WordPress.txt +CVE-2019-6114 - https://github.com/ereisr00/bagofbugz/tree/master/CorelPaintShop2019 +CVE-2019-6116 - http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html +CVE-2019-6116 - http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html +CVE-2019-6116 - https://www.exploit-db.com/exploits/46242/ +CVE-2019-6120 - https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ +CVE-2019-6121 - https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ +CVE-2019-6122 - https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ +CVE-2019-6126 - https://github.com/Mad-robot/CVE-List/blob/master/Advance%20Peer%20to%20Peer%20MLM%20Script.md +CVE-2019-6128 - http://bugzilla.maptools.org/show_bug.cgi?id=2836 +CVE-2019-6128 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html +CVE-2019-6128 - https://usn.ubuntu.com/3906-1/ +CVE-2019-6129 - https://github.com/glennrp/libpng/issues/269 +CVE-2019-6132 - https://github.com/axiomatic-systems/Bento4/issues/357 +CVE-2019-6133 - https://usn.ubuntu.com/3901-1/ +CVE-2019-6145 - https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 +CVE-2019-6146 - http://packetstormsecurity.com/files/156274/Forcepoint-WebSecurity-8.5-Cross-Site-Scripting.html +CVE-2019-6163 - https://support.lenovo.com/solutions/LEN-27348 +CVE-2019-6170 - https://support.lenovo.com/us/en/product_security/LEN-27714 +CVE-2019-6172 - https://support.lenovo.com/us/en/product_security/LEN-27714 +CVE-2019-6184 - https://support.lenovo.com/solutions/LEN-29289 +CVE-2019-6188 - https://support.lenovo.com/us/en/product_security/LEN-27714 +CVE-2019-6192 - http://packetstormsecurity.com/files/155656/Lenovo-Power-Management-Driver-Buffer-Overflow.html +CVE-2019-6205 - http://packetstormsecurity.com/files/156051/XNU-vm_map_copy-Insufficient-Fix.html +CVE-2019-6205 - https://www.exploit-db.com/exploits/46299/ +CVE-2019-6208 - https://www.exploit-db.com/exploits/46296/ +CVE-2019-6209 - https://www.exploit-db.com/exploits/46285/ +CVE-2019-6213 - https://www.exploit-db.com/exploits/46300/ +CVE-2019-6214 - https://www.exploit-db.com/exploits/46298/ +CVE-2019-6215 - https://www.exploit-db.com/exploits/46448/ +CVE-2019-6218 - https://www.exploit-db.com/exploits/46297/ +CVE-2019-6224 - https://www.exploit-db.com/exploits/46433/ +CVE-2019-6225 - https://www.exploit-db.com/exploits/46248/ +CVE-2019-6244 - https://github.com/fdbao/UsualToolCMS/issues/1 +CVE-2019-6245 - https://github.com/svgpp/svgpp/issues/70 +CVE-2019-6246 - https://github.com/svgpp/svgpp/issues/70 +CVE-2019-6247 - https://github.com/svgpp/svgpp/issues/70 +CVE-2019-6249 - https://www.exploit-db.com/exploits/46149/ +CVE-2019-6250 - https://hackerone.com/reports/477073 +CVE-2019-6251 - http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html +CVE-2019-6256 - https://github.com/rgaufman/live555/issues/19 +CVE-2019-6258 - https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-6258 +CVE-2019-6260 - https://www.flamingspork.com/blog/2019/01/23/cve-2019-6260:-gaining-control-of-bmc-from-the-host-processor/ +CVE-2019-6263 - https://www.exploit-db.com/exploits/46200/ +CVE-2019-6265 - https://www.detack.de/en/cve-2019-6265-6266 +CVE-2019-6266 - https://www.detack.de/en/cve-2019-6265-6266 +CVE-2019-6267 - https://wpvulndb.com/vulnerabilities/9203 +CVE-2019-6268 - https://packetstormsecurity.com/files/177440/RAD-SecFlow-2-Path-Traversal.html +CVE-2019-6272 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html +CVE-2019-6272 - https://www.exploit-db.com/exploits/46179/ +CVE-2019-6273 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html +CVE-2019-6273 - https://www.exploit-db.com/exploits/46179/ +CVE-2019-6274 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html +CVE-2019-6274 - https://www.exploit-db.com/exploits/46179/ +CVE-2019-6275 - http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html +CVE-2019-6275 - https://www.exploit-db.com/exploits/46179/ +CVE-2019-6279 - http://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html +CVE-2019-6279 - http://packetstormsecurity.com/files/152166/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html +CVE-2019-6279 - https://www.exploit-db.com/exploits/46580/ +CVE-2019-6279 - https://www.youtube.com/watch?v=-cw04rOYREQ +CVE-2019-6282 - http://packetstormsecurity.com/files/151275/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html +CVE-2019-6282 - http://packetstormsecurity.com/files/152167/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html +CVE-2019-6282 - https://www.exploit-db.com/exploits/46581/ +CVE-2019-6282 - https://www.youtube.com/watch?v=x-r4lnWPdzY +CVE-2019-6283 - https://github.com/sass/libsass/issues/2814 +CVE-2019-6284 - https://github.com/sass/libsass/issues/2816 +CVE-2019-6285 - https://github.com/jbeder/yaml-cpp/issues/660 +CVE-2019-6286 - https://github.com/sass/libsass/issues/2815 +CVE-2019-6290 - https://bugzilla.nasm.us/show_bug.cgi?id=3392548 +CVE-2019-6291 - https://bugzilla.nasm.us/show_bug.cgi?id=3392549 +CVE-2019-6292 - https://github.com/jbeder/yaml-cpp/issues/657 +CVE-2019-6293 - https://github.com/westes/flex/issues/414 +CVE-2019-6294 - https://github.com/TeamEasy/EasyCMS/issues/8 +CVE-2019-6333 - https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333 +CVE-2019-6338 - https://www.drupal.org/sa-core-2019-001 +CVE-2019-6340 - https://www.exploit-db.com/exploits/46452/ +CVE-2019-6340 - https://www.exploit-db.com/exploits/46459/ +CVE-2019-6340 - https://www.exploit-db.com/exploits/46510/ +CVE-2019-6441 - http://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html +CVE-2019-6441 - https://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html +CVE-2019-6441 - https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180 +CVE-2019-6441 - https://www.exploit-db.com/exploits/46180 +CVE-2019-6441 - https://www.exploit-db.com/exploits/46180/ +CVE-2019-6442 - https://dumpco.re/bugs/ntpsec-authed-oobwrite +CVE-2019-6442 - https://www.exploit-db.com/exploits/46178/ +CVE-2019-6443 - https://dumpco.re/bugs/ntpsec-oobread1 +CVE-2019-6443 - https://www.exploit-db.com/exploits/46175/ +CVE-2019-6444 - https://dumpco.re/bugs/ntpsec-oobread2 +CVE-2019-6444 - https://www.exploit-db.com/exploits/46176/ +CVE-2019-6445 - https://dumpco.re/bugs/ntpsec-authed-npe +CVE-2019-6445 - https://www.exploit-db.com/exploits/46177/ +CVE-2019-6447 - http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html +CVE-2019-6447 - https://github.com/fs0c131y/ESFileExplorerOpenPortVuln +CVE-2019-6452 - https://github.com/cvereveal/CVEs/tree/master/CVE-2019-6452 +CVE-2019-6453 - https://github.com/proofofcalc/cve-2019-6453-poc +CVE-2019-6453 - https://proofofcalc.com/advisories/20190218.txt +CVE-2019-6453 - https://proofofcalc.com/cve-2019-6453-mIRC/ +CVE-2019-6453 - https://www.exploit-db.com/exploits/46392/ +CVE-2019-6454 - http://www.openwall.com/lists/oss-security/2021/07/20/2 +CVE-2019-6455 - https://github.com/TeamSeri0us/pocs/tree/master/recutils +CVE-2019-6456 - https://github.com/TeamSeri0us/pocs/tree/master/recutils +CVE-2019-6457 - https://github.com/TeamSeri0us/pocs/tree/master/recutils +CVE-2019-6458 - https://github.com/TeamSeri0us/pocs/tree/master/recutils +CVE-2019-6459 - https://github.com/TeamSeri0us/pocs/tree/master/recutils +CVE-2019-6460 - https://github.com/TeamSeri0us/pocs/tree/master/recutils +CVE-2019-6461 - https://github.com/TeamSeri0us/pocs/tree/master/gerbv +CVE-2019-6462 - https://github.com/TeamSeri0us/pocs/tree/master/gerbv +CVE-2019-6481 - http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-Bypass.html +CVE-2019-6481 - http://seclists.org/fulldisclosure/2019/Mar/33 +CVE-2019-6487 - https://github.com/0xcc-Since2016/TP-Link-WDR-Router-Command-injection_POC/blob/master/poc.py +CVE-2019-6496 - https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/ +CVE-2019-6498 - https://github.com/labapart/gattlib/issues/81 +CVE-2019-6498 - https://github.com/labapart/gattlib/issues/82 +CVE-2019-6498 - https://www.exploit-db.com/exploits/46215/ +CVE-2019-6504 - https://communities.ca.com/community/product-vulnerability-response/blog/2019/01/24/ca20190124-01-security-notice-for-ca-automic-workload-automation +CVE-2019-6504 - https://packetstormsecurity.com/files/151325/CA-Automic-Workload-Automation-12.x-Cross-Site-Scripting.html +CVE-2019-6507 - https://github.com/creditease-sec/insight/issues/42 +CVE-2019-6508 - https://github.com/creditease-sec/insight/issues/42 +CVE-2019-6509 - https://github.com/creditease-sec/insight/issues/42 +CVE-2019-6510 - https://github.com/creditease-sec/insight/issues/42 +CVE-2019-6512 - https://wso2.com/security-patch-releases/api-manager +CVE-2019-6515 - https://wso2.com/security-patch-releases/api-manager +CVE-2019-6543 - https://www.exploit-db.com/exploits/46342/ +CVE-2019-6545 - https://www.exploit-db.com/exploits/46342/ +CVE-2019-6551 - http://www.securityfocus.com/bid/107031 +CVE-2019-6555 - https://ics-cert.us-cert.gov/advisories/ICSA-19-050-03 +CVE-2019-6588 - http://packetstormsecurity.com/files/153252/Liferay-Portal-7.1-CE-GA4-Cross-Site-Scripting.html +CVE-2019-6617 - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2019-6617.txt +CVE-2019-6690 - http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html +CVE-2019-6690 - https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/ +CVE-2019-6690 - https://seclists.org/bugtraq/2019/Jan/41 +CVE-2019-6691 - https://github.com/Veeeooo/phpwind/blob/master/README.md +CVE-2019-6695 - https://fortiguard.com/advisory/FG-IR-19-017 +CVE-2019-6698 - https://fortiguard.com/advisory/FG-IR-19-185 +CVE-2019-6699 - https://fortiguard.com/advisory/FG-IR-19-220 +CVE-2019-6700 - https://fortiguard.com/advisory/FG-IR-19-100 +CVE-2019-6702 - http://packetstormsecurity.com/files/151524/Qkr-With-MasterPass-Man-In-The-Middle.html +CVE-2019-6703 - https://wpvulndb.com/vulnerabilities/9208 +CVE-2019-6706 - http://packetstormsecurity.com/files/151335/Lua-5.3.5-Use-After-Free.html +CVE-2019-6706 - https://www.exploit-db.com/exploits/46246/ +CVE-2019-6707 - https://github.com/kk98kk0/exploit/issues/1 +CVE-2019-6708 - https://github.com/kk98kk0/exploit/issues/2 +CVE-2019-6710 - https://www.exploit-db.com/exploits/46240/ +CVE-2019-6714 - http://packetstormsecurity.com/files/151628/BlogEngine.NET-3.3.6-Directory-Traversal-Remote-Code-Execution.html +CVE-2019-6714 - https://www.exploit-db.com/exploits/46353/ +CVE-2019-6715 - http://packetstormsecurity.com/files/160674/WordPress-W3-Total-Cache-0.9.3-File-Read-Directory-Traversal.html +CVE-2019-6715 - https://vinhjaxt.github.io/2019/03/cve-2019-6715 +CVE-2019-6716 - http://packetstormsecurity.com/files/151373/LongBox-Limited-Access-Manager-Insecure-Direct-Object-Reference.html +CVE-2019-6716 - https://www.exploit-db.com/exploits/46254/ +CVE-2019-6716 - https://www.logonbox.com/en/ +CVE-2019-6724 - https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/ +CVE-2019-6726 - https://packetstormsecurity.com/files/152042 +CVE-2019-6744 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2019-6779 - https://github.com/chshcms/cscms/issues/3 +CVE-2019-6780 - https://www.exploit-db.com/exploits/46247/ +CVE-2019-6785 - https://gitlab.com/gitlab-org/gitlab-ce/issues/52212 +CVE-2019-6793 - https://gitlab.com/gitlab-org/gitlab-ce/issues/50748 +CVE-2019-6804 - https://www.exploit-db.com/exploits/46251/ +CVE-2019-6806 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0769 +CVE-2019-6807 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0770 +CVE-2019-6815 - https://www.schneider-electric.com/en/download/document/SEVD-2019-134-09/ +CVE-2019-6816 - https://www.schneider-electric.com/en/download/document/SEVD-2019-134-09/ +CVE-2019-6956 - https://github.com/TeamSeri0us/pocs/blob/master/faad/global-buffer-overflow%40ps_mix_phase.md +CVE-2019-6961 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open +CVE-2019-6962 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open +CVE-2019-6963 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open +CVE-2019-6964 - https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open +CVE-2019-6966 - https://github.com/axiomatic-systems/Bento4/issues/361 +CVE-2019-6967 - http://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.html +CVE-2019-6967 - https://www.exploit-db.com/exploits/46253/ +CVE-2019-6971 - https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf +CVE-2019-6972 - https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf +CVE-2019-6973 - http://packetstormsecurity.com/files/151377/Sricam-gSOAP-2.8-Denial-Of-Service.html +CVE-2019-6973 - https://github.com/bitfu/sricam-gsoap2.8-dos-exploit +CVE-2019-6973 - https://www.exploit-db.com/exploits/46261/ +CVE-2019-6974 - https://usn.ubuntu.com/3932-1/ +CVE-2019-6974 - https://www.exploit-db.com/exploits/46388/ +CVE-2019-6976 - https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/ +CVE-2019-6977 - http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html +CVE-2019-6977 - https://bugs.php.net/bug.php?id=77270 +CVE-2019-6977 - https://hackerone.com/reports/478368 +CVE-2019-6977 - https://www.exploit-db.com/exploits/46677/ +CVE-2019-6979 - https://www.exploit-db.com/exploits/46273/ +CVE-2019-6986 - http://packetstormsecurity.com/files/172838/VIVO-SPARQL-Injection.html +CVE-2019-6988 - https://github.com/uclouvain/openjpeg/issues/1178 +CVE-2019-6989 - http://packetstormsecurity.com/files/152458/TP-LINK-TL-WR940N-TL-WR941ND-Buffer-Overflow.html +CVE-2019-6989 - https://www.exploit-db.com/exploits/46678/ +CVE-2019-7004 - http://packetstormsecurity.com/files/156476/Avaya-IP-Office-Application-Server-11.0.0.0-Cross-Site-Scripting.html +CVE-2019-7140 - http://www.securityfocus.com/bid/108326 +CVE-2019-7141 - http://www.securityfocus.com/bid/108326 +CVE-2019-7142 - http://www.securityfocus.com/bid/108326 +CVE-2019-7143 - http://www.securityfocus.com/bid/108326 +CVE-2019-7144 - http://www.securityfocus.com/bid/108326 +CVE-2019-7145 - http://www.securityfocus.com/bid/108326 +CVE-2019-7146 - https://sourceware.org/bugzilla/show_bug.cgi?id=24075 +CVE-2019-7146 - https://sourceware.org/bugzilla/show_bug.cgi?id=24081 +CVE-2019-7147 - https://bugzilla.nasm.us/show_bug.cgi?id=3392544 +CVE-2019-7148 - https://sourceware.org/bugzilla/show_bug.cgi?id=24085 +CVE-2019-7149 - https://sourceware.org/bugzilla/show_bug.cgi?id=24102 +CVE-2019-7150 - https://sourceware.org/bugzilla/show_bug.cgi?id=24103 +CVE-2019-7151 - https://github.com/WebAssembly/binaryen/issues/1881 +CVE-2019-7152 - https://github.com/WebAssembly/binaryen/issues/1880 +CVE-2019-7153 - https://github.com/WebAssembly/binaryen/issues/1879 +CVE-2019-7154 - https://github.com/WebAssembly/binaryen/issues/1876 +CVE-2019-7156 - https://github.com/uvoteam/libdoc/issues/5 +CVE-2019-7164 - https://github.com/sqlalchemy/sqlalchemy/issues/4481 +CVE-2019-7164 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-7167 - http://fortune.com/2019/02/05/zcash-vulnerability-cryptocurrency/ +CVE-2019-7181 - http://packetstormsecurity.com/files/152570/QNAP-myQNAPcloud-Connect-1.3.4.0317-Username-Password-Denial-Of-Service.html +CVE-2019-7181 - https://www.exploit-db.com/exploits/46733/ +CVE-2019-7192 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html +CVE-2019-7193 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html +CVE-2019-7194 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html +CVE-2019-7195 - http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html +CVE-2019-7214 - http://packetstormsecurity.com/files/160416/SmarterMail-6985-Remote-Code-Execution.html +CVE-2019-7214 - http://packetstormsecurity.com/files/173388/SmarterTools-SmarterMail-Remote-Code-Execution.html +CVE-2019-7215 - https://knowledgebase.progress.com/articles/Article/Security-Advisory-For-Resolving-Security-Vulnerabilities-May-2019 +CVE-2019-7216 - https://github.com/ekultek/cve-2019-7216 +CVE-2019-7221 - http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html +CVE-2019-7221 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65f +CVE-2019-7221 - https://github.com/torvalds/linux/commits/master/arch/x86/kvm +CVE-2019-7221 - https://usn.ubuntu.com/3932-1/ +CVE-2019-7222 - http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html +CVE-2019-7222 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a +CVE-2019-7222 - https://github.com/torvalds/linux/commits/master/arch/x86/kvm +CVE-2019-7222 - https://usn.ubuntu.com/3932-1/ +CVE-2019-7223 - https://cxsecurity.com/issue/WLB-2019020191 +CVE-2019-7225 - http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html +CVE-2019-7226 - http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html +CVE-2019-7226 - http://seclists.org/fulldisclosure/2019/Jun/39 +CVE-2019-7227 - http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html +CVE-2019-7227 - http://seclists.org/fulldisclosure/2019/Jun/37 +CVE-2019-7228 - http://packetstormsecurity.com/files/153404/ABB-IDAL-HTTP-Server-Uncontrolled-Format-String.html +CVE-2019-7228 - http://seclists.org/fulldisclosure/2019/Jun/43 +CVE-2019-7229 - http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-Verification.html +CVE-2019-7229 - http://seclists.org/fulldisclosure/2019/Jun/34 +CVE-2019-7230 - http://packetstormsecurity.com/files/153386/ABB-IDAL-FTP-Server-Uncontrolled-Format-String.html +CVE-2019-7230 - http://seclists.org/fulldisclosure/2019/Jun/33 +CVE-2019-7231 - http://packetstormsecurity.com/files/153395/ABB-IDAL-FTP-Server-Buffer-Overflow.html +CVE-2019-7231 - http://seclists.org/fulldisclosure/2019/Jun/35 +CVE-2019-7232 - http://packetstormsecurity.com/files/153403/ABB-IDAL-HTTP-Server-Stack-Based-Buffer-Overflow.html +CVE-2019-7232 - http://seclists.org/fulldisclosure/2019/Jun/40 +CVE-2019-7233 - https://github.com/uvoteam/libdoc/issues/6 +CVE-2019-7238 - https://support.sonatype.com/hc/en-us/articles/360017310793-CVE-2019-7238-Nexus-Repository-Manager-3-Missing-Access-Controls-and-Remote-Code-Execution-February-5th-2019 +CVE-2019-7249 - https://hackerone.com/reports/471739 +CVE-2019-7252 - https://applied-risk.com/labs/advisories +CVE-2019-7253 - https://applied-risk.com/labs/advisories +CVE-2019-7254 - http://packetstormsecurity.com/files/155252/Linear-eMerge-E3-1.00-06-Directory-Traversal.html +CVE-2019-7255 - http://packetstormsecurity.com/files/155253/Linear-eMerge-E3-1.00-06-Cross-Site-Scripting.html +CVE-2019-7256 - http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html +CVE-2019-7256 - http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Injection.html +CVE-2019-7256 - http://packetstormsecurity.com/files/155272/Linear-eMerge-E3-Access-Controller-Command-Injection.html +CVE-2019-7256 - http://packetstormsecurity.com/files/170372/Linear-eMerge-E3-Series-Access-Controller-Command-Injection.html +CVE-2019-7257 - http://packetstormsecurity.com/files/155254/Linear-eMerge-E3-1.00-06-Arbitrary-File-Upload-Remote-Root-Code-Execution.html +CVE-2019-7258 - http://packetstormsecurity.com/files/155260/Linear-eMerge-E3-1.00-06-Privilege-Escalation.html +CVE-2019-7259 - http://packetstormsecurity.com/files/155260/Linear-eMerge-E3-1.00-06-Privilege-Escalation.html +CVE-2019-7260 - https://applied-risk.com/labs/advisories +CVE-2019-7261 - http://packetstormsecurity.com/files/155267/Nortek-Linear-eMerge-E3-Access-Controller-1.00-06-SSH-FTP-Remote-Root.html +CVE-2019-7262 - http://packetstormsecurity.com/files/155263/Nortek-Linear-eMerge-E3-Access-Control-Cross-Site-Request-Forgery.html +CVE-2019-7263 - https://applied-risk.com/labs/advisories +CVE-2019-7264 - https://applied-risk.com/labs/advisories +CVE-2019-7265 - http://packetstormsecurity.com/files/155267/Nortek-Linear-eMerge-E3-Access-Controller-1.00-06-SSH-FTP-Remote-Root.html +CVE-2019-7266 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html +CVE-2019-7267 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html +CVE-2019-7268 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html +CVE-2019-7269 - http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html +CVE-2019-7270 - https://applied-risk.com/labs/advisories +CVE-2019-7271 - https://applied-risk.com/labs/advisories +CVE-2019-7272 - http://packetstormsecurity.com/files/155259/Optergy-BMS-2.0.3a-Account-Reset-Username-Disclosure.html +CVE-2019-7273 - http://packetstormsecurity.com/files/155265/Optergy-Proton-Enterprise-BMS-2.0.3a-Cross-Site-Request-Forgery.html +CVE-2019-7274 - http://packetstormsecurity.com/files/155269/Optergy-2.3.0a-Remote-Root.html +CVE-2019-7275 - http://packetstormsecurity.com/files/155268/Optergy-Proton-Enterprise-BMS-2.3.0a-Open-Redirect.html +CVE-2019-7276 - http://packetstormsecurity.com/files/171564/Optergy-Proton-And-Enterprise-BMS-2.0.3a-Command-Injection.html +CVE-2019-7276 - https://applied-risk.com/labs/advisories +CVE-2019-7277 - https://applied-risk.com/labs/advisories +CVE-2019-7278 - https://applied-risk.com/labs/advisories +CVE-2019-7279 - https://applied-risk.com/labs/advisories +CVE-2019-7280 - https://applied-risk.com/labs/advisories +CVE-2019-7281 - https://applied-risk.com/labs/advisories +CVE-2019-7282 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2019-7283 - https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt +CVE-2019-7295 - https://github.com/typora/typora-issues/issues/2129 +CVE-2019-7296 - https://github.com/typora/typora-issues/issues/2131 +CVE-2019-7297 - https://github.com/leonW7/D-Link/blob/master/Vul_1.md +CVE-2019-7298 - https://github.com/leonW7/D-Link/blob/master/Vul_2.md +CVE-2019-7299 - https://wpvulndb.com/vulnerabilities/9235 +CVE-2019-7300 - https://code610.blogspot.com/2019/01/rce-in-artica.html +CVE-2019-7300 - https://github.com/c610/tmp/blob/master/aRtiCE.py +CVE-2019-7301 - https://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html +CVE-2019-7303 - https://www.exploit-db.com/exploits/46594 +CVE-2019-7304 - https://www.exploit-db.com/exploits/46361 +CVE-2019-7304 - https://www.exploit-db.com/exploits/46362 +CVE-2019-7305 - https://launchpad.net/bugs/1822013 +CVE-2019-7306 - https://bugs.launchpad.net/ubuntu/+source/byobu/+bug/1827202 +CVE-2019-7307 - http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html +CVE-2019-7307 - https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858 +CVE-2019-7315 - https://labs.nettitude.com/blog/cve-2019-7315-genie-access-wip3bvaf-ip-camera-directory-traversal/ +CVE-2019-7316 - https://kc.mcafee.com/corporate/index?page=content&id=SB10330 +CVE-2019-7316 - https://packetstormsecurity.com/files/125780 +CVE-2019-7317 - http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html +CVE-2019-7317 - https://usn.ubuntu.com/3991-1/ +CVE-2019-7317 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-7317 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2019-7323 - https://bmantra.github.io/logmx/logmx.html +CVE-2019-7323 - https://github.com/bmantra/bmantra.github.io/blob/master/logmx/logmx.html +CVE-2019-7324 - http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html +CVE-2019-7383 - http://packetstormsecurity.com/files/151648/SYSTORME-ISG-Command-Injection.html +CVE-2019-7383 - http://seclists.org/fulldisclosure/2019/Feb/32 +CVE-2019-7384 - http://packetstormsecurity.com/files/151649/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html +CVE-2019-7384 - http://seclists.org/fulldisclosure/2019/Feb/33 +CVE-2019-7384 - https://s3curityb3ast.github.io/KSA-Dev-005.md +CVE-2019-7385 - http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html +CVE-2019-7385 - http://seclists.org/fulldisclosure/2019/Feb/34 +CVE-2019-7385 - https://s3curityb3ast.github.io +CVE-2019-7385 - https://s3curityb3ast.github.io/KSA-Dev-006.md +CVE-2019-7386 - http://packetstormsecurity.com/files/151651/Nokia-8810-Denial-Of-Service.html +CVE-2019-7386 - http://seclists.org/fulldisclosure/2019/Feb/35 +CVE-2019-7386 - https://s3curityb3ast.github.io +CVE-2019-7386 - https://s3curityb3ast.github.io/KSA-Dev-007.md +CVE-2019-7387 - https://s3curityb3ast.github.io/KSA-Dev-004.md +CVE-2019-7388 - https://github.com/leonW7/D-Link/blob/master/Vul_3.md +CVE-2019-7389 - https://github.com/leonW7/D-Link/blob/master/Vul_4.md +CVE-2019-7390 - https://github.com/leonW7/D-Link/blob/master/Vul_5.md +CVE-2019-7391 - http://packetstormsecurity.com/files/151550/Zyxel-VMG3312-B10B-DSL-491HNU-B1-V2-Cross-Site-Request-Forgery.html +CVE-2019-7391 - https://www.exploit-db.com/exploits/46326/ +CVE-2019-7391 - https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) +CVE-2019-7393 - http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html +CVE-2019-7394 - http://packetstormsecurity.com/files/153089/CA-Risk-Strong-Authentication-Privilege-Escalation.html +CVE-2019-7400 - http://packetstormsecurity.com/files/152248/Rukovoditel-ERP-And-CRM-2.4.1-Cross-Site-Scripting.html +CVE-2019-7400 - https://hackpuntes.com/cve-2019-7400-rukovoditel-erp-crm-2-4-1-cross-site-scripting-reflejado/ +CVE-2019-7400 - https://www.exploit-db.com/exploits/46608/ +CVE-2019-7402 - https://github.com/panghusec/exploit/issues/8 +CVE-2019-7404 - https://github.com/epistemophilia/CVEs/blob/master/LG-GAMP-Routers/CVE-2019-7404/poc-cve-2019-7404.py +CVE-2019-7409 - https://metamorfosec.com/Files/Advisories/METS-2019-001-Multiple_XSS_Vulnerabilities_in_ProfileDesign_CMS_v6.0.2.5.txt +CVE-2019-7410 - https://metamorfosec.com/Files/Advisories/METS-2020-002-A_Stored_XSS_Vulnerability_in_Galileo_CMS_v0.042.txt +CVE-2019-7411 - https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_Vulnerabilities_in_the_MyThemeShop_Launcher_plugin_v1.0.8_for_WordPress.txt +CVE-2019-7411 - https://wpvulndb.com/vulnerabilities/9275 +CVE-2019-7412 - https://metamorfosec.com/Files/Advisories/METS-2019-003-Denial_of_Service_in_PS_PHPCaptcha_WP_before_v1.2.0.txt +CVE-2019-7413 - https://metamorfosec.com/Files/Advisories/METS-2019-004-A_XSS_Vulnerability_in_Parallax_Scroll_plugin_before_v2.1_for_WordPress.txt +CVE-2019-7416 - http://packetstormsecurity.com/files/151582/OpenText-Documentum-Webtop-5.3-SP2-Open-Redirect.html +CVE-2019-7416 - http://seclists.org/fulldisclosure/2019/Feb/26 +CVE-2019-7417 - http://packetstormsecurity.com/files/151583/Ericsson-Active-Library-Explorer-ALEX-14.3-Cross-Site-Scripting.html +CVE-2019-7417 - http://seclists.org/fulldisclosure/2019/Feb/27 +CVE-2019-7418 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html +CVE-2019-7418 - http://seclists.org/fulldisclosure/2019/Feb/28 +CVE-2019-7419 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html +CVE-2019-7419 - http://seclists.org/fulldisclosure/2019/Feb/28 +CVE-2019-7420 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html +CVE-2019-7420 - http://seclists.org/fulldisclosure/2019/Feb/28 +CVE-2019-7421 - http://packetstormsecurity.com/files/151584/SAMSUNG-X7400GX-Sync-Thru-Web-Cross-Site-Scripting.html +CVE-2019-7421 - http://seclists.org/fulldisclosure/2019/Feb/28 +CVE-2019-7422 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html +CVE-2019-7422 - http://seclists.org/fulldisclosure/2019/Feb/29 +CVE-2019-7423 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html +CVE-2019-7423 - http://seclists.org/fulldisclosure/2019/Feb/29 +CVE-2019-7424 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html +CVE-2019-7424 - http://seclists.org/fulldisclosure/2019/Feb/29 +CVE-2019-7425 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html +CVE-2019-7425 - http://seclists.org/fulldisclosure/2019/Feb/29 +CVE-2019-7426 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html +CVE-2019-7426 - http://seclists.org/fulldisclosure/2019/Feb/29 +CVE-2019-7427 - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html +CVE-2019-7427 - http://seclists.org/fulldisclosure/2019/Feb/29 +CVE-2019-7429 - https://gkaim.com/cve-2019-7429-vikas-chaudhary/ +CVE-2019-7430 - https://gkaim.com/cve-2019-7430-vikas-chaudhary/ +CVE-2019-7431 - https://gkaim.com/cve-2019-7431-vikas-chaudhary/ +CVE-2019-7432 - https://gkaim.com/cve-2019-7432-vikas-chaudhary/ +CVE-2019-7433 - https://gkaim.com/cve-2019-7433-vikas-chaudhary/ +CVE-2019-7434 - https://gkaim.com/cve-2019-7434-vikas-chaudhary/ +CVE-2019-7435 - https://gkaim.com/cve-2019-7435-vikas-chaudhary/ +CVE-2019-7436 - https://gkaim.com/cve-2019-7436-vikas-chaudhary/ +CVE-2019-7437 - https://gkaim.com/cve-2019-7437-vikas-chaudhary/ +CVE-2019-7438 - http://packetstormsecurity.com/files/152625/JioFi-4G-M2S-1.0.2-Cross-Site-Scripting.html +CVE-2019-7438 - https://gkaim.com/cve-2019-7438-html-vikas-chaudhary/ +CVE-2019-7438 - https://gkaim.com/cve-2019-7438-xss-vikas-chaudhary/ +CVE-2019-7438 - https://www.exploit-db.com/exploits/46751/ +CVE-2019-7439 - http://packetstormsecurity.com/files/152626/JioFi-4G-M2S-1.0.2-Denial-Of-Service.html +CVE-2019-7439 - https://gkaim.com/cve-2019-7439-vikas-chaudhary/ +CVE-2019-7439 - https://www.exploit-db.com/exploits/46752/ +CVE-2019-7440 - http://packetstormsecurity.com/files/152361/JioFi-4G-M2S-1.0.2-Cross-Site-Request-Forgery.html +CVE-2019-7440 - https://gkaim.com/cve-2019-7440-vikas-chaudhary/ +CVE-2019-7440 - https://www.exploit-db.com/exploits/46633/ +CVE-2019-7441 - http://packetstormsecurity.com/files/152362/WordPress-PayPal-Checkout-Payment-Gateway-1.6.8-Parameter-Tampering.html +CVE-2019-7441 - https://gkaim.com/cve-2019-7441-vikas-chaudhary/ +CVE-2019-7441 - https://www.exploit-db.com/exploits/46632/ +CVE-2019-7442 - http://packetstormsecurity.com/files/152801/CyberArk-Enterprise-Password-Vault-10.7-XML-External-Entity-Injection.html +CVE-2019-7442 - https://www.octority.com/2019/05/07/cyberark-enterprise-password-vault-xml-external-entity-xxe-injection/ +CVE-2019-7537 - https://github.com/pytroll/donfig/issues/5 +CVE-2019-7541 - http://packetstormsecurity.com/files/151657/Rukovoditel-Project-Management-CRM-2.4.1-Cross-Site-Scripting.html +CVE-2019-7541 - https://www.exploit-db.com/exploits/46366/ +CVE-2019-7548 - https://github.com/no-security/sqlalchemy_test +CVE-2019-7548 - https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518 +CVE-2019-7548 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-7552 - https://securityhitlist.blogspot.com/2019/02/cve-2019-7552-php-scripts-mall.html +CVE-2019-7553 - https://securityhitlist.blogspot.com/2019/02/cve-2019-7553-stores-xss-in-php-scripts.html +CVE-2019-7554 - https://securityhitlist.blogspot.com/2019/02/cve-2019-7554-reflected-xss-in-api.html +CVE-2019-7564 - http://packetstormsecurity.com/files/151595/Coship-Wireless-Router-4.0.0.x-5.0.0.x-Authentication-Bypass.html +CVE-2019-7566 - https://github.com/cskaza/cszcms/issues/17 +CVE-2019-7568 - https://github.com/baijiacms/baijiacmsV4/issues/2 +CVE-2019-7569 - https://github.com/millken/doyocms/issues/1 +CVE-2019-7570 - https://blog.csdn.net/yangfan0502/article/details/86189065 +CVE-2019-7572 - https://bugzilla.libsdl.org/show_bug.cgi?id=4495 +CVE-2019-7573 - https://bugzilla.libsdl.org/show_bug.cgi?id=4491 +CVE-2019-7574 - https://bugzilla.libsdl.org/show_bug.cgi?id=4496 +CVE-2019-7575 - https://bugzilla.libsdl.org/show_bug.cgi?id=4493 +CVE-2019-7576 - https://bugzilla.libsdl.org/show_bug.cgi?id=4490 +CVE-2019-7577 - https://bugzilla.libsdl.org/show_bug.cgi?id=4492 +CVE-2019-7578 - https://bugzilla.libsdl.org/show_bug.cgi?id=4494 +CVE-2019-7579 - http://www.x0rsecurity.com/2019/06/09/my-second-cve-linksys-wrt-acs-cve-2019-7579-or-as-i-call-it-acceptance-no-one-considers-security-by-design/ +CVE-2019-7580 - https://github.com/shadowsock5/ThinkCMF-5.0.190111/blob/master/README.md +CVE-2019-7580 - https://xz.aliyun.com/t/3997 +CVE-2019-7581 - https://github.com/libming/libming/issues/173 +CVE-2019-7582 - https://github.com/libming/libming/issues/172 +CVE-2019-7588 - https://packetstormsecurity.com/files/151691/exacqvisionesm5122-escalate.txt +CVE-2019-7590 - https://packetstormsecurity.com/files/152128/exacqVision-9.8-Unquoted-Service-Path-Privilege-Escalation.html +CVE-2019-7590 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5515.php +CVE-2019-7608 - https://www.elastic.co/community/security +CVE-2019-7609 - http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Pollution-Remote-Code-Execution.html +CVE-2019-7609 - https://www.elastic.co/community/security +CVE-2019-7610 - https://www.elastic.co/community/security +CVE-2019-7611 - https://www.elastic.co/community/security +CVE-2019-7612 - https://www.elastic.co/community/security +CVE-2019-7613 - https://www.elastic.co/community/security +CVE-2019-7614 - https://www.elastic.co/community/security/ +CVE-2019-7615 - https://www.elastic.co/community/security/ +CVE-2019-7616 - https://www.elastic.co/community/security/ +CVE-2019-7617 - https://www.elastic.co/community/security/ +CVE-2019-7618 - https://staging-website.elastic.co/community/security +CVE-2019-7619 - https://www.elastic.co/community/security +CVE-2019-7620 - https://www.elastic.co/community/security +CVE-2019-7621 - https://www.elastic.co/community/security/ +CVE-2019-7629 - https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/ +CVE-2019-7632 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=22113 +CVE-2019-7634 - https://medium.com/@crhenr/cve-2019-7634-my-first-cve-61db875dc94a +CVE-2019-7635 - https://bugzilla.libsdl.org/show_bug.cgi?id=4498 +CVE-2019-7636 - https://bugzilla.libsdl.org/show_bug.cgi?id=4499 +CVE-2019-7637 - https://bugzilla.libsdl.org/show_bug.cgi?id=4497 +CVE-2019-7638 - https://bugzilla.libsdl.org/show_bug.cgi?id=4500 +CVE-2019-7646 - http://packetstormsecurity.com/files/151630/CentOS-Web-Panel-0.9.8.763-Cross-Site-Scripting.html +CVE-2019-7646 - https://www.exploit-db.com/exploits/46349/ +CVE-2019-7651 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-01-09-emsisoft-Anti-Malware-bypass.md +CVE-2019-7651 - https://nafiez.github.io/security/bypass/2019/01/08/emsisoft-Anti-Malware-bypass.html +CVE-2019-7652 - http://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html +CVE-2019-7656 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-7656-PrivEscal-Wowza +CVE-2019-7659 - https://outpost24.com/blog/gsoap-vulnerability-identified +CVE-2019-7662 - https://github.com/WebAssembly/binaryen/issues/1872 +CVE-2019-7663 - http://bugzilla.maptools.org/show_bug.cgi?id=2833 +CVE-2019-7663 - https://usn.ubuntu.com/3906-1/ +CVE-2019-7664 - https://sourceware.org/bugzilla/show_bug.cgi?id=24084 +CVE-2019-7665 - https://sourceware.org/bugzilla/show_bug.cgi?id=24089 +CVE-2019-7666 - http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html +CVE-2019-7667 - http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html +CVE-2019-7668 - https://applied-risk.com/labs/advisories +CVE-2019-7669 - http://packetstormsecurity.com/files/155270/FlexAir-Access-Control-2.3.38-Command-Injection.html +CVE-2019-7670 - http://packetstormsecurity.com/files/155271/FlexAir-Access-Control-2.3.38-Remote-Root.html +CVE-2019-7671 - http://packetstormsecurity.com/files/155274/Prima-Access-Control-2.3.35-Cross-Site-Scripting.html +CVE-2019-7672 - https://applied-risk.com/labs/advisories +CVE-2019-7673 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb +CVE-2019-7674 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb +CVE-2019-7675 - https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb +CVE-2019-7684 - https://gitee.com/inxeduopen/inxedu/issues/IQJUH +CVE-2019-7687 - http://packetstormsecurity.com/files/151654/Jiofi-4-JMR-1140-Cross-Site-Scripting.html +CVE-2019-7687 - https://www.exploit-db.com/exploits/46363/ +CVE-2019-7690 - https://github.com/yogeshshe1ke/CVE/blob/master/2019-7690/mobaxterm_exploit.py +CVE-2019-7693 - https://pastebin.com/raw/nQ648Dif +CVE-2019-7697 - https://github.com/axiomatic-systems/Bento4/issues/351 +CVE-2019-7698 - https://github.com/axiomatic-systems/Bento4/issues/354 +CVE-2019-7699 - https://github.com/axiomatic-systems/Bento4/issues/355 +CVE-2019-7700 - https://github.com/WebAssembly/binaryen/issues/1864 +CVE-2019-7701 - https://github.com/WebAssembly/binaryen/issues/1863 +CVE-2019-7702 - https://github.com/WebAssembly/binaryen/issues/1867 +CVE-2019-7703 - https://github.com/WebAssembly/binaryen/issues/1865 +CVE-2019-7704 - https://github.com/WebAssembly/binaryen/issues/1866 +CVE-2019-7718 - https://github.com/jadacheng/vulnerability/blob/master/Metinfo6.x/MetInfo.md +CVE-2019-7730 - https://github.com/eddietcc/CVEnotes/blob/master/MyWebSQL/CSRF/readme.md +CVE-2019-7737 - https://github.com/Verytops/verydows/issues/10 +CVE-2019-7738 - https://github.com/cooltey/C.P.Sub/issues/3 +CVE-2019-7745 - http://packetstormsecurity.com/files/151655/Jiofi-4-JMR-1140-WiFi-Password-Cross-Site-Request-Forgery.html +CVE-2019-7745 - https://www.exploit-db.com/exploits/46364/ +CVE-2019-7746 - http://packetstormsecurity.com/files/151656/Jiofi-4-JMR-1140-Admin-Token-Disclosure-Cross-Site-Request-Forgery.html +CVE-2019-7746 - https://www.exploit-db.com/exploits/46365/ +CVE-2019-7751 - https://packetstormsecurity.com/files/151963/MarcomCentral-FusionPro-VDP-Creator-Directory-Traversal.html +CVE-2019-7751 - https://www.exploit-db.com/exploits/46494 +CVE-2019-7755 - https://www.exploit-database.net/?id=101060 +CVE-2019-7755 - https://www.exploit-db.com/exploits/46431/ +CVE-2019-7758 - http://www.securityfocus.com/bid/108326 +CVE-2019-7761 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0778 +CVE-2019-7769 - http://www.securityfocus.com/bid/108326 +CVE-2019-7770 - http://www.securityfocus.com/bid/108326 +CVE-2019-7771 - http://www.securityfocus.com/bid/108326 +CVE-2019-7773 - http://www.securityfocus.com/bid/108326 +CVE-2019-7774 - http://www.securityfocus.com/bid/108326 +CVE-2019-7775 - http://www.securityfocus.com/bid/108326 +CVE-2019-7776 - http://www.securityfocus.com/bid/108326 +CVE-2019-7777 - http://www.securityfocus.com/bid/108326 +CVE-2019-7778 - http://www.securityfocus.com/bid/108326 +CVE-2019-7780 - http://www.securityfocus.com/bid/108326 +CVE-2019-7787 - http://www.securityfocus.com/bid/108326 +CVE-2019-7789 - http://www.securityfocus.com/bid/108326 +CVE-2019-7790 - http://www.securityfocus.com/bid/108326 +CVE-2019-7793 - http://www.securityfocus.com/bid/108326 +CVE-2019-7794 - http://www.securityfocus.com/bid/108326 +CVE-2019-7795 - http://www.securityfocus.com/bid/108326 +CVE-2019-7798 - http://www.securityfocus.com/bid/108326 +CVE-2019-7799 - http://www.securityfocus.com/bid/108326 +CVE-2019-7801 - http://www.securityfocus.com/bid/108326 +CVE-2019-7802 - http://www.securityfocus.com/bid/108326 +CVE-2019-7803 - http://www.securityfocus.com/bid/108326 +CVE-2019-7810 - http://www.securityfocus.com/bid/108326 +CVE-2019-7811 - http://www.securityfocus.com/bid/108326 +CVE-2019-7812 - http://www.securityfocus.com/bid/108326 +CVE-2019-7813 - http://www.securityfocus.com/bid/108326 +CVE-2019-7826 - http://www.securityfocus.com/bid/108326 +CVE-2019-7831 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0796 +CVE-2019-7836 - http://www.securityfocus.com/bid/108326 +CVE-2019-7839 - http://packetstormsecurity.com/files/153439/Coldfusion-JNBridge-Remote-Code-Execution.html +CVE-2019-7839 - https://seclists.org/bugtraq/2019/Jun/38 +CVE-2019-7841 - http://www.securityfocus.com/bid/108326 +CVE-2019-8195 - http://packetstormsecurity.com/files/155224/Adobe-Acrobat-Reader-DC-For-Windows-Malformed-JBIG2Globals-Stream-Uninitialized-Pointer.html +CVE-2019-8196 - http://packetstormsecurity.com/files/155225/Adobe-Acrobat-Reader-DC-For-Windows-Malformed-OTF-Font-Uninitialized-Pointer.html +CVE-2019-8258 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/ +CVE-2019-8259 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/ +CVE-2019-8260 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/ +CVE-2019-8261 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/ +CVE-2019-8262 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/ +CVE-2019-8263 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/ +CVE-2019-8263 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/ +CVE-2019-8264 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/ +CVE-2019-8265 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/ +CVE-2019-8266 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/ +CVE-2019-8267 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/ +CVE-2019-8268 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/ +CVE-2019-8269 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/ +CVE-2019-8270 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/ +CVE-2019-8271 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/ +CVE-2019-8272 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/ +CVE-2019-8273 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/ +CVE-2019-8274 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/ +CVE-2019-8275 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/ +CVE-2019-8276 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/ +CVE-2019-8277 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/ +CVE-2019-8280 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/ +CVE-2019-8285 - https://support.kaspersky.com/vulnerability.aspx?el=12430#080519 +CVE-2019-8286 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#110719 +CVE-2019-8320 - https://hackerone.com/reports/317321 +CVE-2019-8331 - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html +CVE-2019-8331 - http://seclists.org/fulldisclosure/2019/May/13 +CVE-2019-8331 - https://seclists.org/bugtraq/2019/May/18 +CVE-2019-8331 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2019-8334 - https://github.com/gongfuxiang/schoolcms/issues/1 +CVE-2019-8335 - https://github.com/gongfuxiang/schoolcms/issues/1 +CVE-2019-8338 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html +CVE-2019-8339 - https://sysdig.com/blog/cve-2019-8339-falco-vulnerability/ +CVE-2019-8341 - https://www.exploit-db.com/exploits/46386/ +CVE-2019-8345 - https://www.youtube.com/watch?v=BtLUO-ujJ7I +CVE-2019-8347 - https://github.com/source-trace/beescms/issues/4 +CVE-2019-8349 - http://packetstormsecurity.com/files/151733/HTMLy-2.7.4-Cross-Site-Scripting.html +CVE-2019-8349 - http://seclists.org/fulldisclosure/2019/Feb/40 +CVE-2019-8349 - https://www.netsparker.com/web-applications-advisories/ +CVE-2019-8351 - https://support.heimdalsecurity.com/hc/en-us/articles/360001084158-Release-2-5-172-PROD-Update +CVE-2019-8352 - https://www.securifera.com/advisories/CVE-2019-8352/ +CVE-2019-8360 - https://packetstormsecurity.com/files/151706/Find-A-Place-CMS-Directory-1.5-SQL-Injection.html +CVE-2019-8368 - https://know.bishopfox.com/advisories/openemr-5-0-16-remote-code-execution-cross-site-scripting +CVE-2019-8371 - https://know.bishopfox.com/advisories/openemr-5-0-16-remote-code-execution-cross-site-scripting +CVE-2019-8372 - http://www.jackson-t.ca/lg-driver-lpe.html +CVE-2019-8375 - https://www.exploit-db.com/exploits/46465/ +CVE-2019-8375 - https://www.inputzero.io/2019/02/fuzzing-webkit.html +CVE-2019-8376 - https://github.com/appneta/tcpreplay/issues/537 +CVE-2019-8376 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_layer4_v6-tcpreplay-4-3-1/ +CVE-2019-8377 - https://github.com/appneta/tcpreplay/issues/536 +CVE-2019-8377 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_ipv6_l4proto-tcpreplay-4-3-1/ +CVE-2019-8378 - https://github.com/axiomatic-systems/Bento4/issues/363 +CVE-2019-8378 - https://research.loginsoft.com/bugs/a-heap-buffer-overflow-vulnerability-in-the-function-ap4_bitstreamreadbytes-bento4-1-5-1-628/ +CVE-2019-8379 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/ +CVE-2019-8379 - https://sourceforge.net/p/advancemame/bugs/271/ +CVE-2019-8380 - https://github.com/axiomatic-systems/Bento4/issues/366 +CVE-2019-8380 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_trackgetsampleindexfortimestampms-bento4-1-5-1-628/ +CVE-2019-8381 - https://github.com/appneta/tcpreplay/issues/538 +CVE-2019-8381 - https://research.loginsoft.com/bugs/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/ +CVE-2019-8382 - https://github.com/axiomatic-systems/Bento4/issues/364 +CVE-2019-8382 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_listfind-bento4-1-5-1-628/ +CVE-2019-8383 - https://research.loginsoft.com/bugs/invalid-memory-access-in-adv_png_unfilter_8-advancecomp/ +CVE-2019-8383 - https://sourceforge.net/p/advancemame/bugs/272/ +CVE-2019-8385 - http://packetstormsecurity.com/files/152298/Thomson-Reuters-Concourse-And-Firm-Central-Local-File-Inclusion-Directory-Traversal.html +CVE-2019-8387 - http://packetstormsecurity.com/files/151725/Master-IP-CAM-01-3.3.4.2103-Remote-Command-Execution.html +CVE-2019-8387 - https://www.exploit-db.com/exploits/46400/ +CVE-2019-8389 - https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465 +CVE-2019-8390 - http://packetstormsecurity.com/files/151723/qdPM-9.1-Cross-Site-Scripting.html +CVE-2019-8390 - https://www.exploit-db.com/exploits/46399/ +CVE-2019-8391 - http://packetstormsecurity.com/files/151723/qdPM-9.1-Cross-Site-Scripting.html +CVE-2019-8391 - https://www.exploit-db.com/exploits/46398/ +CVE-2019-8392 - https://github.com/leonW7/D-Link/blob/master/Vul_6.md +CVE-2019-8394 - https://www.exploit-db.com/exploits/46413/ +CVE-2019-8400 - https://www.youtube.com/watch?v=RIyZLeKEC8E +CVE-2019-8404 - http://packetstormsecurity.com/files/151763/Webiness-Inventory-2.3-Arbitrary-File-Upload.html +CVE-2019-8404 - https://www.exploit-db.com/exploits/46405/ +CVE-2019-8410 - https://github.com/holychang/maccms8/blob/master/xss2 +CVE-2019-8421 - https://github.com/bagesoft/bagecms/issues/5 +CVE-2019-8422 - https://github.com/wowwooo/vnotes/blob/master/PbootCMS%20SQL%20Injection%20Description.md +CVE-2019-8423 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewseventsphp-line-44-sql-injection +CVE-2019-8424 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-276-orderby-sql-injection +CVE-2019-8425 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#sql-query-error-reflected-xss +CVE-2019-8426 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolcapphp-reflected-xss +CVE-2019-8427 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#includesfunctionsphp-daemoncontrol-command-injection +CVE-2019-8428 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolphp-line-35-second-order-sqli +CVE-2019-8429 - https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-393-sql-injection +CVE-2019-8437 - https://github.com/beyond7176/njiandan-cms/issues/1 +CVE-2019-8444 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833 +CVE-2019-8445 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840 +CVE-2019-8446 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839 +CVE-2019-8449 - http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html +CVE-2019-8452 - http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html +CVE-2019-8457 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2019-8457 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-8457 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-8457 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2019-8457 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-8461 - https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM +CVE-2019-8921 - https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/ +CVE-2019-8922 - https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/ +CVE-2019-8923 - http://packetstormsecurity.com/files/151756/XAMPP-5.6.8-Cross-Site-Scripting-SQL-Injection.html +CVE-2019-8923 - http://seclists.org/fulldisclosure/2019/Feb/43 +CVE-2019-8923 - https://www.exploit-db.com/exploits/46424/ +CVE-2019-8924 - http://packetstormsecurity.com/files/151756/XAMPP-5.6.8-Cross-Site-Scripting-SQL-Injection.html +CVE-2019-8924 - http://seclists.org/fulldisclosure/2019/Feb/43 +CVE-2019-8924 - https://www.exploit-db.com/exploits/46424/ +CVE-2019-8925 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html +CVE-2019-8925 - http://seclists.org/fulldisclosure/2019/Feb/45 +CVE-2019-8925 - https://www.exploit-db.com/exploits/46425/ +CVE-2019-8926 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html +CVE-2019-8926 - http://seclists.org/fulldisclosure/2019/Feb/45 +CVE-2019-8926 - https://www.exploit-db.com/exploits/46425/ +CVE-2019-8927 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html +CVE-2019-8927 - http://seclists.org/fulldisclosure/2019/Feb/45 +CVE-2019-8927 - https://www.exploit-db.com/exploits/46425/ +CVE-2019-8928 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html +CVE-2019-8928 - http://seclists.org/fulldisclosure/2019/Feb/45 +CVE-2019-8928 - https://www.exploit-db.com/exploits/46425/ +CVE-2019-8929 - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html +CVE-2019-8929 - http://seclists.org/fulldisclosure/2019/Feb/45 +CVE-2019-8929 - https://www.exploit-db.com/exploits/46425/ +CVE-2019-8933 - https://blog.csdn.net/qq_36093477/article/details/86681178 +CVE-2019-8936 - http://bugs.ntp.org/show_bug.cgi?id=3565 +CVE-2019-8936 - http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html +CVE-2019-8937 - http://packetstormsecurity.com/files/151779/HotelDruid-2.3-Cross-Site-Scripting.html +CVE-2019-8937 - https://www.exploit-db.com/exploits/46429/ +CVE-2019-8938 - http://packetstormsecurity.com/files/151800/VertrigoServ-2.17-Cross-Site-Scripting.html +CVE-2019-8938 - http://seclists.org/fulldisclosure/2019/Feb/47 +CVE-2019-8942 - http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html +CVE-2019-8942 - https://wpvulndb.com/vulnerabilities/9222 +CVE-2019-8942 - https://www.exploit-db.com/exploits/46511/ +CVE-2019-8942 - https://www.exploit-db.com/exploits/46662/ +CVE-2019-8943 - http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html +CVE-2019-8943 - http://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html +CVE-2019-8943 - https://www.exploit-db.com/exploits/46511/ +CVE-2019-8943 - https://www.exploit-db.com/exploits/46662/ +CVE-2019-8953 - https://www.exploit-db.com/exploits/46538/ +CVE-2019-8978 - http://packetstormsecurity.com/files/152856/Ellucian-Banner-Web-Tailor-Banner-Enterprise-Identity-Services-Improper-Authentication.html +CVE-2019-8981 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 +CVE-2019-8981 - https://www.telekom.com/resource/blob/566546/276aaa2eab781729f2544d62edecf002/dl-190322-remote-buffer-overflow-in-a-axtls-data.pdf +CVE-2019-8982 - https://www.exploit-db.com/exploits/45158 +CVE-2019-8997 - http://support.blackberry.com/kb/articleDetail?articleNumber=000047227 +CVE-2019-9002 - https://github.com/mikelbring/tinyissue/issues/237 +CVE-2019-9003 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5 +CVE-2019-9005 - https://www.detack.de/en/cve-2019-9005 +CVE-2019-9017 - http://packetstormsecurity.com/files/152721/SolarWinds-DameWare-Mini-Remote-Control-10.0-Denial-Of-Service.html +CVE-2019-9017 - http://www.binaryworld.it/guidepoc.asp +CVE-2019-9017 - https://www.exploit-db.com/exploits/46793/ +CVE-2019-9019 - https://www.linkedin.com/pulse/buffer-overflow-exploitation-british-airways-system-marco-gisbert/ +CVE-2019-9020 - https://hackerone.com/reports/477896 +CVE-2019-9020 - https://usn.ubuntu.com/3902-1/ +CVE-2019-9021 - https://bugs.php.net/bug.php?id=77247 +CVE-2019-9021 - https://hackerone.com/reports/475499 +CVE-2019-9021 - https://usn.ubuntu.com/3902-1/ +CVE-2019-9022 - https://usn.ubuntu.com/3902-1/ +CVE-2019-9023 - https://hackerone.com/reports/476168 +CVE-2019-9023 - https://usn.ubuntu.com/3902-1/ +CVE-2019-9024 - https://hackerone.com/reports/477897 +CVE-2019-9024 - https://usn.ubuntu.com/3902-1/ +CVE-2019-9025 - https://hackerone.com/reports/476178 +CVE-2019-9041 - https://www.exploit-db.com/exploits/46454/ +CVE-2019-9048 - https://github.com/pluck-cms/pluck/issues/69 +CVE-2019-9049 - https://github.com/pluck-cms/pluck/issues/69 +CVE-2019-9050 - https://github.com/pluck-cms/pluck/issues/70 +CVE-2019-9051 - https://github.com/pluck-cms/pluck/issues/69 +CVE-2019-9052 - https://github.com/pluck-cms/pluck/issues/69 +CVE-2019-9053 - http://packetstormsecurity.com/files/152356/CMS-Made-Simple-SQL-Injection.html +CVE-2019-9053 - https://www.exploit-db.com/exploits/46635/ +CVE-2019-9055 - http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html +CVE-2019-9062 - https://hackingvila.wordpress.com/2019/02/19/php-scripts-mall-online-food-ordering-script-has-cross-site-request-forgery-csrf-php-script-mall/ +CVE-2019-9081 - https://github.com/Laworigin/Laworigin.github.io/blob/master/2019/02/21/laravelv5-7%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96rce/index.html +CVE-2019-9081 - https://laworigin.github.io/2019/02/21/laravelv5-7%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96rce/ +CVE-2019-9082 - http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html +CVE-2019-9082 - https://github.com/xiayulei/open_source_bms/issues/33 +CVE-2019-9082 - https://www.exploit-db.com/exploits/46488/ +CVE-2019-9083 - http://seclists.org/fulldisclosure/2019/Feb/51 +CVE-2019-9084 - https://metamorfosec.com/Files/Advisories/METS-2019-005-A_division_by_zero_in_Hoteldruid_before_v2.3.1.txt +CVE-2019-9085 - https://metamorfosec.com/Files/Advisories/METS-2019-006-An_Invalid_Arguments_in_Hoteldruid_before_v2.3.1.txt +CVE-2019-9086 - https://metamorfosec.com/Files/Advisories/METS-2019-007-A_SQL_Injection_in_HotelDruid_before_v2.3.1.txt +CVE-2019-9087 - https://metamorfosec.com/Files/Advisories/METS-2019-008-A_SQL_Injection_in_HotelDruid_before_v2.3.1.txt +CVE-2019-9095 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9096 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9097 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9098 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9099 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9101 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9102 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9103 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9104 - https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities +CVE-2019-9105 - https://members.backbox.org/saet-tebe-small-supervisor-multiple-vulnerabilities/ +CVE-2019-9106 - https://members.backbox.org/saet-tebe-small-supervisor-multiple-vulnerabilities/ +CVE-2019-9107 - https://gist.github.com/redeye5/ccbbc43330cc9821062249b78c916317 +CVE-2019-9107 - https://github.com/wuzhicms/wuzhicms/issues/169 +CVE-2019-9108 - https://gist.github.com/redeye5/ebfef23f0a063b82779151f9cde8e480 +CVE-2019-9108 - https://github.com/wuzhicms/wuzhicms/issues/171 +CVE-2019-9109 - https://gist.github.com/redeye5/57ccafea7263efec67c82b0503c72480 +CVE-2019-9109 - https://github.com/wuzhicms/wuzhicms/issues/172 +CVE-2019-9110 - https://gist.github.com/redeye5/470708bd27ed115b29d0434255b9f7a0 +CVE-2019-9110 - https://github.com/wuzhicms/wuzhicms/issues/170 +CVE-2019-9113 - https://github.com/libming/libming/issues/171 +CVE-2019-9114 - https://github.com/libming/libming/issues/170 +CVE-2019-9124 - https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/blankpassword.md +CVE-2019-9143 - https://github.com/Exiv2/exiv2/issues/711 +CVE-2019-9143 - https://research.loginsoft.com/bugs/uncontrolled-recursion-loop-in-exiv2imageprinttiffstructure-exiv2-0-27/ +CVE-2019-9144 - https://github.com/Exiv2/exiv2/issues/712 +CVE-2019-9144 - https://research.loginsoft.com/bugs/uncontrolled-recursion-loop-in-exiv2anonymous-namespacebigtiffimageprintifd-exiv2-0-27/ +CVE-2019-9151 - https://github.com/magicSwordsMan/PAAFS/tree/master/vul7 +CVE-2019-9153 - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html +CVE-2019-9153 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ +CVE-2019-9154 - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html +CVE-2019-9154 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ +CVE-2019-9155 - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html +CVE-2019-9155 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ +CVE-2019-9156 - http://seclists.org/fulldisclosure/2019/May/6 +CVE-2019-9157 - http://seclists.org/fulldisclosure/2019/May/6 +CVE-2019-9158 - http://seclists.org/fulldisclosure/2019/May/6 +CVE-2019-9162 - https://www.exploit-db.com/exploits/46477/ +CVE-2019-9164 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9165 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9166 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9167 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9169 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2019-9172 - https://gitlab.com/gitlab-org/gitlab-ce/issues/54795 +CVE-2019-9176 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55664 +CVE-2019-9184 - https://www.exploit-db.com/exploits/46467/ +CVE-2019-9189 - http://packetstormsecurity.com/files/155273/Prima-Access-Control-2.3.35-Script-Upload-Remote-Code-Execution.html +CVE-2019-9193 - http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html +CVE-2019-9193 - http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html +CVE-2019-9193 - http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html +CVE-2019-9193 - https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 +CVE-2019-9194 - https://www.exploit-db.com/exploits/46481/ +CVE-2019-9194 - https://www.exploit-db.com/exploits/46539/ +CVE-2019-9197 - https://unity3d.com/security#CVE-2019-9197 +CVE-2019-9199 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-setsource-podofo-0-9-6-trunk-r1967/ +CVE-2019-9199 - https://sourceforge.net/p/podofo/tickets/40/ +CVE-2019-9200 - https://gitlab.freedesktop.org/poppler/poppler/issues/728 +CVE-2019-9200 - https://research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/ +CVE-2019-9201 - https://medium.com/@SergiuSechel/misconfiguration-in-ilc-gsm-gprs-devices-leaves-over-1-200-ics-devices-vulnerable-to-attacks-over-82c2d4a91561 +CVE-2019-9202 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9203 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9204 - http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html +CVE-2019-9206 - https://packetstormsecurity.com/files/151925/PRTG-Network-Monitor-7.1.3.3378-Cross-Site-Scripting.html +CVE-2019-9206 - https://seclists.org/fulldisclosure/2019/Mar/3 +CVE-2019-9207 - https://packetstormsecurity.com/files/151925/PRTG-Network-Monitor-7.1.3.3378-Cross-Site-Scripting.html +CVE-2019-9207 - https://seclists.org/fulldisclosure/2019/Mar/3 +CVE-2019-9208 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-9209 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447 +CVE-2019-9210 - https://sourceforge.net/p/advancemame/bugs/277/ +CVE-2019-9211 - https://bugzilla.redhat.com/show_bug.cgi?id=1683499 +CVE-2019-9212 - https://github.com/alipay/sofa-hessian/issues/34 +CVE-2019-9213 - http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html +CVE-2019-9213 - https://usn.ubuntu.com/3932-1/ +CVE-2019-9213 - https://www.exploit-db.com/exploits/46502/ +CVE-2019-9220 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55653 +CVE-2019-9226 - https://github.com/baigoStudio/baigoCMS/issues/7 +CVE-2019-9227 - https://github.com/baigoStudio/baigoCMS/issues/8 +CVE-2019-9228 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf +CVE-2019-9229 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf +CVE-2019-9230 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf +CVE-2019-9231 - https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf +CVE-2019-9445 - https://usn.ubuntu.com/4526-1/ +CVE-2019-9483 - https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts +CVE-2019-9491 - http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-ANTI-THREAT-TOOLKIT-(ATTK)-REMOTE-CODE-EXECUTION.txt +CVE-2019-9491 - http://packetstormsecurity.com/files/156160/TrendMicro-Anti-Threat-Toolkit-Improper-Fix.html +CVE-2019-9491 - http://seclists.org/fulldisclosure/2019/Oct/42 +CVE-2019-9491 - http://seclists.org/fulldisclosure/2020/Jan/50 +CVE-2019-9491 - https://seclists.org/bugtraq/2019/Oct/30 +CVE-2019-9491 - https://seclists.org/bugtraq/2020/Jan/55 +CVE-2019-9493 - https://www.kb.cert.org/vuls/id/174715/ +CVE-2019-9494 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html +CVE-2019-9495 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html +CVE-2019-9496 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html +CVE-2019-9497 - http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html +CVE-2019-9500 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html +CVE-2019-9500 - https://kb.cert.org/vuls/id/166939/ +CVE-2019-9501 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html +CVE-2019-9501 - https://kb.cert.org/vuls/id/166939/ +CVE-2019-9502 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html +CVE-2019-9502 - https://kb.cert.org/vuls/id/166939/ +CVE-2019-9503 - https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html +CVE-2019-9503 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f +CVE-2019-9503 - https://kb.cert.org/vuls/id/166939/ +CVE-2019-9506 - https://usn.ubuntu.com/4115-1/ +CVE-2019-9506 - https://usn.ubuntu.com/4118-1/ +CVE-2019-9510 - https://www.kb.cert.org/vuls/id/576688/ +CVE-2019-9511 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9511 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-9511 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-9511 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-9512 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9513 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9513 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2019-9513 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2019-9514 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9515 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9516 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9517 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9517 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-9517 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-9518 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9535 - https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/ +CVE-2019-9535 - https://kb.cert.org/vuls/id/763073/ +CVE-2019-9537 - https://www.kb.cert.org/vuls/id/873161/ +CVE-2019-9538 - https://www.kb.cert.org/vuls/id/873161/ +CVE-2019-9539 - https://www.kb.cert.org/vuls/id/873161/ +CVE-2019-9540 - https://www.kb.cert.org/vuls/id/873161/ +CVE-2019-9541 - https://www.kb.cert.org/vuls/id/873161/ +CVE-2019-9542 - https://www.kb.cert.org/vuls/id/873161/ +CVE-2019-9543 - https://gitlab.freedesktop.org/poppler/poppler/issues/730 +CVE-2019-9543 - https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/ +CVE-2019-9544 - https://github.com/axiomatic-systems/Bento4/issues/374 +CVE-2019-9544 - https://research.loginsoft.com/bugs/out-of-bounds-write-in-function-ap4_cttstableentryap4_cttstableentry-bento4-1-5-1-0/ +CVE-2019-9545 - https://gitlab.freedesktop.org/poppler/poppler/issues/731 +CVE-2019-9545 - https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/ +CVE-2019-9546 - https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-005.md +CVE-2019-9553 - https://packetstormsecurity.com/files/151943/Bold-CMS-3.6.4-Cross-Site-Scripting.html +CVE-2019-9553 - https://www.exploit-db.com/exploits/46495 +CVE-2019-9554 - https://packetstormsecurity.com/files/151944/Craft-CMS-3.1.12-Pro-Cross-Site-Scripting.html +CVE-2019-9554 - https://www.exploit-db.com/exploits/46496 +CVE-2019-9555 - https://seclists.org/fulldisclosure/2019/Mar/12 +CVE-2019-9556 - https://packetstormsecurity.com/files/151959/Fiberhome-AN5506-04-F-RP2669-Cross-Site-Scripting.html +CVE-2019-9556 - https://www.exploit-db.com/exploits/46498 +CVE-2019-9557 - https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html +CVE-2019-9558 - https://packetstormsecurity.com/files/151957/Mailtraq-WebMail-2.17.7.3550-Cross-Site-Scripting.html +CVE-2019-9564 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-wyze-cam-iot-device/ +CVE-2019-9567 - https://lists.openwall.net/full-disclosure/2019/02/05/4 +CVE-2019-9567 - https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/ +CVE-2019-9567 - https://wpvulndb.com/vulnerabilities/9215 +CVE-2019-9568 - https://lists.openwall.net/full-disclosure/2019/02/05/4 +CVE-2019-9568 - https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/ +CVE-2019-9568 - https://wpvulndb.com/vulnerabilities/9215 +CVE-2019-9570 - https://github.com/yzmcms/yzmcms/issues/11 +CVE-2019-9575 - https://lists.openwall.net/full-disclosure/2019/02/05/5 +CVE-2019-9575 - https://security-consulting.icu/blog/2019/02/wordpress-quiz-and-survey-master-xss/ +CVE-2019-9576 - https://lists.openwall.net/full-disclosure/2019/02/05/6 +CVE-2019-9576 - https://security-consulting.icu/blog/2019/02/wordpress-blog2social-xss/ +CVE-2019-9579 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2019-9581 - http://packetstormsecurity.com/files/165263/Booked-Scheduler-2.7.5-Shell-Upload.html +CVE-2019-9581 - https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html +CVE-2019-9581 - https://www.exploit-db.com/exploits/46486 +CVE-2019-9582 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9582.md +CVE-2019-9583 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md +CVE-2019-9584 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md +CVE-2019-9585 - https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md +CVE-2019-9587 - https://research.loginsoft.com/bugs/stack-based-buffer-overflow-vulnerability-in-function-md5round1-xpdf-4-01/ +CVE-2019-9588 - https://research.loginsoft.com/bugs/invalid-memory-access-in-gatomiccounter-gatomicincrement-xpdf-4-01/ +CVE-2019-9589 - https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-psoutputdevsetupresources-xpdf-4-01/ +CVE-2019-9591 - http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html +CVE-2019-9591 - https://www.exploit-db.com/exploits/46666/ +CVE-2019-9592 - http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html +CVE-2019-9592 - https://www.exploit-db.com/exploits/46666/ +CVE-2019-9593 - http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html +CVE-2019-9593 - https://www.exploit-db.com/exploits/46666/ +CVE-2019-9596 - http://packetstormsecurity.com/files/152986/Darktrace-Enterpise-Immune-System-3.0.9-3.0.10-Cross-Site-Request-Forgery.html +CVE-2019-9596 - https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html +CVE-2019-9596 - https://seclists.org/bugtraq/2019/May/54 +CVE-2019-9597 - http://packetstormsecurity.com/files/152986/Darktrace-Enterpise-Immune-System-3.0.9-3.0.10-Cross-Site-Request-Forgery.html +CVE-2019-9597 - https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html +CVE-2019-9597 - https://seclists.org/bugtraq/2019/May/54 +CVE-2019-9598 - https://github.com/chshcms/cscms/issues/4 +CVE-2019-9599 - https://www.exploit-db.com/exploits/46337 +CVE-2019-9599 - https://www.youtube.com/watch?v=0QDM224_6DM +CVE-2019-9600 - https://www.exploit-db.com/exploits/46464 +CVE-2019-9600 - https://www.youtube.com/watch?v=C8Nz3YmVc_g +CVE-2019-9601 - https://www.exploit-db.com/exploits/46380 +CVE-2019-9603 - https://github.com/bg5sbk/MiniCMS/issues/29 +CVE-2019-9604 - https://hackingvila.wordpress.com/2019/03/06/php-scripts-mall-online-lottery-php-readymade-script-1-7-0-has-cross-site-request-forgery-csrf-for-edit-profile-actionscve-2019-9604/ +CVE-2019-9617 - https://www.seebug.org/vuldb/ssvid-97831 +CVE-2019-9618 - http://seclists.org/fulldisclosure/2019/Mar/26 +CVE-2019-9618 - https://wpvulndb.com/vulnerabilities/9234 +CVE-2019-9621 - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html +CVE-2019-9621 - http://packetstormsecurity.com/files/153190/Zimbra-XML-Injection-Server-Side-Request-Forgery.html +CVE-2019-9621 - https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html +CVE-2019-9621 - https://www.exploit-db.com/exploits/46693/ +CVE-2019-9622 - https://pentest.com.tr/exploits/Brigade-ERP-4-5-Database-Backup-Disclosure-via-AFD.html +CVE-2019-9622 - https://www.exploit-db.com/exploits/46109 +CVE-2019-9623 - https://pentest.com.tr/exploits/Feng-Office-3-7-0-5-Unauthenticated-Remote-Command-Execution-Metasploit.html +CVE-2019-9623 - https://www.exploit-db.com/exploits/46471 +CVE-2019-9624 - https://pentest.com.tr/exploits/Webmin-1900-Remote-Command-Execution.html +CVE-2019-9624 - https://www.exploit-db.com/exploits/46201 +CVE-2019-9625 - https://www.exploit-db.com/exploits/46520/ +CVE-2019-9626 - https://gitee.com/koyshe/phpshe/issues/ISW87 +CVE-2019-9628 - https://wiki.shibboleth.net/confluence/display/SP3/SecurityAdvisories +CVE-2019-9636 - https://usn.ubuntu.com/4127-2/ +CVE-2019-9636 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-9636 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-9638 - https://hackerone.com/reports/516237 +CVE-2019-9640 - https://hackerone.com/reports/510025 +CVE-2019-9641 - https://hackerone.com/reports/510336 +CVE-2019-9646 - https://lists.openwall.net/full-disclosure/2019/02/05/7 +CVE-2019-9646 - https://security-consulting.icu/blog/2019/02/wordpress-contact-form-email-xss-csrf/ +CVE-2019-9647 - http://packetstormsecurity.com/files/152153/Gila-CMS-1.9.1-Cross-Site-Scripting.html +CVE-2019-9648 - http://packetstormsecurity.com/files/154204/CoreFTP-Server-SIZE-Directory-Traversal.html +CVE-2019-9648 - https://seclists.org/fulldisclosure/2019/Mar/23 +CVE-2019-9648 - https://www.exploit-db.com/exploits/46535 +CVE-2019-9649 - http://packetstormsecurity.com/files/154205/CoreFTP-Server-MDTM-Directory-Traversal.html +CVE-2019-9649 - https://seclists.org/fulldisclosure/2019/Mar/25 +CVE-2019-9649 - https://www.exploit-db.com/exploits/46534 +CVE-2019-9650 - http://packetstormsecurity.com/files/152152/MyBB-Upcoming-Events-1.32-Cross-Site-Scripting.html +CVE-2019-9650 - https://github.com/vintagedaddyo/MyBB_Plugin-Upcoming_Events/pull/1/commits/d0a0e1c6e56f248613e0150344ebea8764bba5fa +CVE-2019-9650 - https://www.exploit-db.com/exploits/46558/ +CVE-2019-9656 - https://github.com/TeamSeri0us/pocs/tree/master/libofx +CVE-2019-9656 - https://github.com/libofx/libofx/issues/22 +CVE-2019-9657 - https://www.vfxcomputing.com/?CVE-2019-9657 +CVE-2019-9659 - https://github.com/RiieCco/write-ups/tree/master/CVE-2019-9659 +CVE-2019-9660 - https://github.com/yzmcms/yzmcms/issues/12 +CVE-2019-9661 - https://github.com/yzmcms/yzmcms/issues/13 +CVE-2019-9668 - https://packetstormsecurity.com/files/152058/robinbhandari-FTP-Remote-Denial-Of-Service.html +CVE-2019-9670 - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html +CVE-2019-9670 - https://www.exploit-db.com/exploits/46693/ +CVE-2019-9675 - https://hackerone.com/reports/504761 +CVE-2019-9687 - https://sourceforge.net/p/podofo/code/1969 +CVE-2019-9688 - https://github.com/forgeekscn/sftnow/issues/6 +CVE-2019-9689 - http://packetstormsecurity.com/files/155500/axTLS-2.1.5-Denial-Of-Service.html +CVE-2019-9689 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 +CVE-2019-9692 - http://packetstormsecurity.com/files/152269/CMS-Made-Simple-CMSMS-Showtime2-File-Upload-Remote-Command-Execution.html +CVE-2019-9692 - https://www.exploit-db.com/exploits/46546/ +CVE-2019-9692 - https://www.exploit-db.com/exploits/46627/ +CVE-2019-9701 - http://packetstormsecurity.com/files/153512/Symantec-DLP-15.5-MP1-Cross-Site-Scripting.html +CVE-2019-9725 - https://medium.com/@bertinjoseb/korenix-jetport-web-manager-persistent-xss-6cf7e2a38634 +CVE-2019-9729 - https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation +CVE-2019-9733 - http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html +CVE-2019-9734 - https://github.com/aquaverde/aquarius-core/commit/d1dfa5b8280388a0b6f2f341f0681522dbea03b0 +CVE-2019-9738 - https://github.com/jimmykuu/gopher/issues/88 +CVE-2019-9740 - http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html +CVE-2019-9740 - http://www.openwall.com/lists/oss-security/2021/02/04/2 +CVE-2019-9740 - https://bugs.python.org/issue36276 +CVE-2019-9740 - https://usn.ubuntu.com/4127-2/ +CVE-2019-9740 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2019-9742 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-03-13-gdata-total-security-acl-bypass.md +CVE-2019-9742 - https://nafiez.github.io/security/bypass/2019/03/12/gdata-total-security-acl-bypass.html +CVE-2019-9745 - https://github.com/KPN-CISO/CVE-2019-9745/blob/master/README.md +CVE-2019-9757 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9757 +CVE-2019-9757 - https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce +CVE-2019-9758 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9758 +CVE-2019-9758 - https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce +CVE-2019-9760 - https://github.com/w4fz5uck5/FTPGetter/blob/master/xpl.py +CVE-2019-9760 - https://www.exploit-db.com/exploits/46543/ +CVE-2019-9761 - https://gitee.com/koyshe/phpshe/issues/ITC0C +CVE-2019-9762 - https://gitee.com/koyshe/phpshe/issues/ITC0C +CVE-2019-9766 - https://www.exploit-db.com/exploits/45403 +CVE-2019-9767 - http://packetstormsecurity.com/files/160157/Free-MP3-CD-Ripper-2.8-Buffer-Overflow.html +CVE-2019-9767 - https://packetstormsecurity.com/files/149371/Free-MP3-CD-Ripper-2.6-Local-Buffer-Overflow.html +CVE-2019-9767 - https://www.exploit-db.com/exploits/45412 +CVE-2019-9768 - http://packetstormsecurity.com/files/152182/Canarytokens-2019-03-01-Detection-Bypass.html +CVE-2019-9768 - https://www.exploit-db.com/exploits/46589/ +CVE-2019-9769 - https://www.exploit-db.com/exploits/46531 +CVE-2019-9785 - https://github.com/CCCCCrash/POCs/tree/master/Web/gitnote +CVE-2019-9787 - https://wpvulndb.com/vulnerabilities/9230 +CVE-2019-9790 - https://bugzilla.mozilla.org/show_bug.cgi?id=1525145 +CVE-2019-9791 - https://bugzilla.mozilla.org/show_bug.cgi?id=1530958 +CVE-2019-9792 - http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html +CVE-2019-9792 - https://bugzilla.mozilla.org/show_bug.cgi?id=1532599 +CVE-2019-9797 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528909 +CVE-2019-9801 - https://bugzilla.mozilla.org/show_bug.cgi?id=1527717 +CVE-2019-9807 - https://bugzilla.mozilla.org/show_bug.cgi?id=1362050 +CVE-2019-9808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1434634 +CVE-2019-9809 - https://bugzilla.mozilla.org/show_bug.cgi?id=1282430 +CVE-2019-9810 - http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html +CVE-2019-9811 - https://bugzilla.mozilla.org/show_bug.cgi?id=1563327 +CVE-2019-9812 - https://bugzilla.mozilla.org/show_bug.cgi?id=1538015 +CVE-2019-9813 - https://bugzilla.mozilla.org/show_bug.cgi?id=1538006 +CVE-2019-9815 - https://mdsattacks.com/ +CVE-2019-9826 - http://www.openwall.com/lists/oss-security/2019/04/29/3 +CVE-2019-9831 - https://www.exploit-db.com/exploits/46381 +CVE-2019-9831 - https://www.youtube.com/watch?v=FJmZ_FfcdoU +CVE-2019-9832 - https://www.exploit-db.com/exploits/46445 +CVE-2019-9833 - https://www.exploit-db.com/exploits/46443 +CVE-2019-9834 - https://www.exploit-db.com/exploits/46545 +CVE-2019-9834 - https://www.youtube.com/watch?v=zSG93yX0B8k +CVE-2019-9835 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-033.txt +CVE-2019-9836 - http://packetstormsecurity.com/files/153436/AMD-Secure-Encrypted-Virtualization-SEV-Key-Recovery.html +CVE-2019-9836 - https://seclists.org/fulldisclosure/2019/Jun/46 +CVE-2019-9838 - http://packetstormsecurity.com/files/153104/VFront-0.99.5-Persistent-Cross-Site-Scripting.html +CVE-2019-9838 - https://www.netsparker.com/web-applications-advisories/ +CVE-2019-9839 - http://packetstormsecurity.com/files/153103/VFront-0.99.5-Reflective-Cross-Site-Scripting.html +CVE-2019-9839 - https://www.netsparker.com/web-applications-advisories/ +CVE-2019-9841 - https://cardaci.xyz/advisories/2019/04/15/vesta-control-panel-0.9.8-23-reflected-xss-in-file-manager-api/ +CVE-2019-9842 - https://rastating.github.io/miniblog-remote-code-execution/ +CVE-2019-9845 - https://rastating.github.io/miniblog-remote-code-execution/ +CVE-2019-9851 - http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html +CVE-2019-9853 - http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html +CVE-2019-9858 - http://packetstormsecurity.com/files/152476/Horde-Form-Shell-Upload.html +CVE-2019-9858 - https://seclists.org/bugtraq/2019/Jun/31 +CVE-2019-9858 - https://ssd-disclosure.com/?p=3814&preview=true +CVE-2019-9860 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-036.txt +CVE-2019-9861 - http://packetstormsecurity.com/files/152714/ABUS-Secvest-3.01.01-Cryptographic-Issues.html +CVE-2019-9861 - http://seclists.org/fulldisclosure/2019/May/3 +CVE-2019-9861 - https://seclists.org/bugtraq/2019/May/1 +CVE-2019-9861 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-005.txt +CVE-2019-9862 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-035.txt +CVE-2019-9863 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-034.txt +CVE-2019-9866 - https://gitlab.com/gitlab-org/gitlab-ce/issues/59003 +CVE-2019-9877 - https://research.loginsoft.com/bugs/invalid-memory-access-in-textpagefindgaps-xpdf-4-01/ +CVE-2019-9878 - https://github.com/kermitt2/pdfalto/issues/46 +CVE-2019-9878 - https://research.loginsoft.com/bugs/invalid-memory-access-in-gfxindexedcolorspacemapcolortobase-pdfalto-0-2/ +CVE-2019-9879 - http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html +CVE-2019-9879 - https://wpvulndb.com/vulnerabilities/9282 +CVE-2019-9879 - https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ +CVE-2019-9880 - http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html +CVE-2019-9880 - https://wpvulndb.com/vulnerabilities/9282 +CVE-2019-9880 - https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ +CVE-2019-9881 - http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html +CVE-2019-9881 - https://wpvulndb.com/vulnerabilities/9282 +CVE-2019-9881 - https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ +CVE-2019-9885 - https://zeroday.hitcon.org/vulnerability/ZD-2019-00333 +CVE-2019-9891 - https://www.redteam-pentesting.de/advisories/rt-sa-2019-007 +CVE-2019-9900 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h +CVE-2019-9900 - https://hackerone.com/reports/536954 +CVE-2019-9901 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w +CVE-2019-9903 - https://gitlab.freedesktop.org/poppler/poppler/issues/741 +CVE-2019-9903 - https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/ +CVE-2019-9904 - https://gitlab.com/graphviz/graphviz/issues/1512 +CVE-2019-9904 - https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/ +CVE-2019-9908 - https://lists.openwall.net/full-disclosure/2019/02/05/8 +CVE-2019-9908 - https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/ +CVE-2019-9908 - https://wpvulndb.com/vulnerabilities/9239 +CVE-2019-9909 - https://lists.openwall.net/full-disclosure/2019/02/05/9 +CVE-2019-9909 - https://security-consulting.icu/blog/2019/02/wordpress-give-xss/ +CVE-2019-9909 - https://wpvulndb.com/vulnerabilities/9240 +CVE-2019-9910 - https://lists.openwall.net/full-disclosure/2019/02/05/11 +CVE-2019-9910 - https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/ +CVE-2019-9911 - https://lists.openwall.net/full-disclosure/2019/02/05/12 +CVE-2019-9911 - https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/ +CVE-2019-9912 - https://lists.openwall.net/full-disclosure/2019/02/05/13 +CVE-2019-9912 - https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/ +CVE-2019-9913 - https://lists.openwall.net/full-disclosure/2019/02/05/14 +CVE-2019-9913 - https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/ +CVE-2019-9914 - https://lists.openwall.net/full-disclosure/2019/02/05/15 +CVE-2019-9914 - https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/ +CVE-2019-9917 - https://seclists.org/bugtraq/2019/Jun/23 +CVE-2019-9919 - https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9919.md +CVE-2019-9926 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9926 +CVE-2019-9926 - https://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce/ +CVE-2019-9936 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-9936 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-9937 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2019-9937 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html +CVE-2019-9938 - https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ +CVE-2019-9939 - https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ +CVE-2019-9947 - http://www.openwall.com/lists/oss-security/2021/02/04/2 +CVE-2019-9947 - https://bugs.python.org/issue35906 +CVE-2019-9947 - https://hackerone.com/reports/590020 +CVE-2019-9947 - https://usn.ubuntu.com/4127-2/ +CVE-2019-9948 - http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html +CVE-2019-9948 - https://bugs.python.org/issue35907 +CVE-2019-9948 - https://usn.ubuntu.com/4127-2/ +CVE-2019-9949 - https://bnbdr.github.io/posts/wd/ +CVE-2019-9949 - https://github.com/bnbdr/wd-rce/ +CVE-2019-9950 - https://bnbdr.github.io/posts/wd/ +CVE-2019-9950 - https://github.com/bnbdr/wd-rce/ +CVE-2019-9951 - https://bnbdr.github.io/posts/wd/ +CVE-2019-9951 - https://github.com/bnbdr/wd-rce/ +CVE-2019-9955 - http://packetstormsecurity.com/files/152525/Zyxel-ZyWall-Cross-Site-Scripting.html +CVE-2019-9955 - https://www.exploit-db.com/exploits/46706/ +CVE-2019-9956 - https://github.com/ImageMagick/ImageMagick/issues/1523 +CVE-2019-9962 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9963 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9964 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9965 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9966 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9967 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9968 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9969 - https://code610.blogspot.com/2019/03/crashing-xnview-248.html +CVE-2019-9971 - https://www.gosecure.net/blog +CVE-2019-9971 - https://www.gosecure.net/blog/2022/05/31/security-advisory-multiple-vulnerabilities-impact-3cx-phone-system/ +CVE-2019-9972 - https://www.gosecure.net/blog +CVE-2019-9972 - https://www.gosecure.net/blog/2022/05/31/security-advisory-multiple-vulnerabilities-impact-3cx-phone-system/ +CVE-2019-9974 - http://packetstormsecurity.com/files/152232/DASAN-H660RM-Information-Disclosure-Hardcoded-Key.html +CVE-2019-9974 - https://blog.burghardt.pl/2019/03/diag_tool-cgi-on-dasan-h660rm-devices-with-firmware-1-03-0022-allows-spawning-ping-processes-without-any-authorization-leading-to-information-disclosure-and-dos-attacks/ +CVE-2019-9974 - https://seclists.org/bugtraq/2019/Mar/41 +CVE-2019-9975 - http://packetstormsecurity.com/files/152232/DASAN-H660RM-Information-Disclosure-Hardcoded-Key.html +CVE-2019-9975 - https://seclists.org/bugtraq/2019/Mar/41 +CVE-2019-9978 - http://packetstormsecurity.com/files/152722/Wordpress-Social-Warfare-Remote-Code-Execution.html +CVE-2019-9978 - http://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html +CVE-2019-9978 - https://blog.sucuri.net/2019/03/zero-day-stored-xss-in-social-warfare.html +CVE-2019-9978 - https://wpvulndb.com/vulnerabilities/9238 +CVE-2019-9978 - https://www.cybersecurity-help.cz/vdb/SB2019032105 +CVE-2019-9978 - https://www.exploit-db.com/exploits/46794/ +CVE-2020-0009 - http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html +CVE-2020-0022 - http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html +CVE-2020-0022 - http://seclists.org/fulldisclosure/2020/Feb/10 +CVE-2020-0067 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html +CVE-2020-0067 - https://usn.ubuntu.com/4388-1/ +CVE-2020-0258 - http://packetstormsecurity.com/files/158869/Android-App-Zygotes-Improper-Guarding.html +CVE-2020-0404 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-0427 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html +CVE-2020-0510 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-0512 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-0513 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-0515 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-0516 - http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html +CVE-2020-0531 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0532 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0533 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0534 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0535 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0536 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0537 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0538 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0539 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0540 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0541 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0542 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0543 - https://usn.ubuntu.com/4385-1/ +CVE-2020-0543 - https://usn.ubuntu.com/4388-1/ +CVE-2020-0545 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0548 - https://usn.ubuntu.com/4385-1/ +CVE-2020-0548 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html +CVE-2020-0549 - https://usn.ubuntu.com/4385-1/ +CVE-2020-0549 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html +CVE-2020-0566 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0586 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0594 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0594 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-0595 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0595 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-0596 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0597 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-0597 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-0601 - http://packetstormsecurity.com/files/155960/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html +CVE-2020-0601 - http://packetstormsecurity.com/files/155961/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html +CVE-2020-0618 - http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html +CVE-2020-0618 - http://packetstormsecurity.com/files/159216/Microsoft-SQL-Server-Reporting-Services-2016-Remote-Code-Execution.html +CVE-2020-0642 - http://packetstormsecurity.com/files/158729/Microsoft-Windows-Win32k-Privilege-Escalation.html +CVE-2020-0646 - http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html +CVE-2020-0668 - http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html +CVE-2020-0668 - http://packetstormsecurity.com/files/157615/Service-Tracing-Privilege-Escalation.html +CVE-2020-0674 - http://packetstormsecurity.com/files/159137/Microsoft-Internet-Explorer-11-Use-After-Free.html +CVE-2020-0674 - http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html +CVE-2020-0674 - http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html +CVE-2020-0683 - http://packetstormsecurity.com/files/156373/Microsoft-Windows-10-MSI-Privilege-Escalation.html +CVE-2020-0683 - https://github.com/nu11secur1ty/Windows10Exploits/blob/master/Undefined/CVE-2020-0683/README.md +CVE-2020-0688 - http://packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html +CVE-2020-0688 - http://packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html +CVE-2020-0728 - http://packetstormsecurity.com/files/156394/Microsoft-Windows-Modules-Installer-Service-Information-Disclosure.html +CVE-2020-0728 - http://seclists.org/fulldisclosure/2020/Feb/16 +CVE-2020-0728 - https://seclists.org/bugtraq/2020/Feb/21 +CVE-2020-0787 - http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html +CVE-2020-0796 - http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html +CVE-2020-0796 - http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html +CVE-2020-0796 - http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html +CVE-2020-0796 - http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html +CVE-2020-0796 - http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html +CVE-2020-0796 - http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html +CVE-2020-0938 - http://packetstormsecurity.com/files/161299/Apple-CoreText-libFontParser.dylib-Stack-Corruption.html +CVE-2020-0981 - http://packetstormsecurity.com/files/157248/Microsoft-Windows-NtFilterToken-ParentTokenId-Incorrect-Setting-Privilege-Escalation.html +CVE-2020-0986 - http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html +CVE-2020-10005 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246 +CVE-2020-10019 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25 +CVE-2020-10021 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26 +CVE-2020-10022 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28 +CVE-2020-10023 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29 +CVE-2020-10024 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30 +CVE-2020-10027 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35 +CVE-2020-10028 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32 +CVE-2020-10029 - https://sourceware.org/bugzilla/show_bug.cgi?id=25487 +CVE-2020-10057 - https://github.com/J3rryBl4nks/GenixCMS/blob/master/CreateAdminBAC.md +CVE-2020-10058 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34 +CVE-2020-10059 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36 +CVE-2020-10060 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37 +CVE-2020-10061 - https://github.com/zephyrproject-rtos/zephyr/pull/23091 +CVE-2020-10061 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75 +CVE-2020-10062 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment +CVE-2020-10062 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84 +CVE-2020-10063 - https://github.com/zephyrproject-rtos/zephyr/pull/24535 +CVE-2020-10063 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55 +CVE-2020-10067 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27 +CVE-2020-10068 - https://github.com/zephyrproject-rtos/zephyr/pull/23091 +CVE-2020-10068 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78 +CVE-2020-10070 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment +CVE-2020-10070 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85 +CVE-2020-10071 - https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment +CVE-2020-10071 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86 +CVE-2020-10108 - https://know.bishopfox.com/advisories +CVE-2020-10108 - https://know.bishopfox.com/advisories/twisted-version-19.10.0 +CVE-2020-10108 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10109 - https://know.bishopfox.com/advisories +CVE-2020-10109 - https://know.bishopfox.com/advisories/twisted-version-19.10.0 +CVE-2020-10110 - http://packetstormsecurity.com/files/156656/Citrix-Gateway-11.1-12.0-12.1-Information-Disclosure.html +CVE-2020-10110 - https://seclists.org/fulldisclosure/2020/Mar/7 +CVE-2020-10111 - http://packetstormsecurity.com/files/156661/Citrix-Gateway-11.1-12.0-12.1-Cache-Bypass.html +CVE-2020-10111 - http://seclists.org/fulldisclosure/2020/Mar/11 +CVE-2020-10112 - http://packetstormsecurity.com/files/156660/Citrix-Gateway-11.1-12.0-12.1-Cache-Poisoning.html +CVE-2020-10112 - http://seclists.org/fulldisclosure/2020/Mar/8 +CVE-2020-10135 - http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html +CVE-2020-10135 - http://seclists.org/fulldisclosure/2020/Jun/5 +CVE-2020-10136 - https://kb.cert.org/vuls/id/636397/ +CVE-2020-10136 - https://www.digi.com/resources/security +CVE-2020-10136 - https://www.kb.cert.org/vuls/id/636397 +CVE-2020-10137 - https://github.com/CNK2100/VFuzz-public +CVE-2020-10146 - https://github.com/oskarsve/ms-teams-rce +CVE-2020-10173 - https://www.exploit-db.com/exploits/48142 +CVE-2020-10174 - http://www.openwall.com/lists/oss-security/2020/03/06/3 +CVE-2020-10174 - https://bugzilla.suse.com/show_bug.cgi?id=1165802 +CVE-2020-10180 - https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html +CVE-2020-10181 - http://packetstormsecurity.com/files/156746/Enhanced-Multimedia-Router-3.0.4.27-Cross-Site-Request-Forgery.html +CVE-2020-10181 - https://www.youtube.com/watch?v=Ufcj4D9eA5o +CVE-2020-10188 - https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html +CVE-2020-10188 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telnetd-EFJrEzPx +CVE-2020-10188 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-10189 - http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html +CVE-2020-10189 - https://srcincite.io/advisories/src-2020-0011/ +CVE-2020-10189 - https://srcincite.io/pocs/src-2020-0011.py.txt +CVE-2020-10189 - https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/ +CVE-2020-10190 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-10191 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-10192 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-10193 - https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html +CVE-2020-10195 - https://wpvulndb.com/vulnerabilities/10127 +CVE-2020-10196 - https://wpvulndb.com/vulnerabilities/10127 +CVE-2020-10199 - http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html +CVE-2020-10199 - http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html +CVE-2020-10199 - https://support.sonatype.com/hc/en-us/articles/360044882533 +CVE-2020-10203 - https://support.sonatype.com/hc/en-us/articles/360044361594 +CVE-2020-10204 - https://support.sonatype.com/hc/en-us/articles/360044356194 +CVE-2020-1021 - http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html +CVE-2020-10218 - https://www.exploit-db.com/exploits/48179 +CVE-2020-10220 - http://packetstormsecurity.com/files/156688/rConfig-3.9-SQL-Injection.html +CVE-2020-10220 - http://packetstormsecurity.com/files/156766/Rconfig-3.x-Chained-Remote-Code-Execution.html +CVE-2020-10220 - http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html +CVE-2020-10220 - https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2020-10220.py +CVE-2020-10220 - https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_sqli.py +CVE-2020-10221 - http://packetstormsecurity.com/files/156687/rConfig-3.93-Authenticated-Remote-Code-Execution.html +CVE-2020-10222 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md +CVE-2020-10222 - https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html +CVE-2020-10223 - https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md +CVE-2020-10223 - https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html +CVE-2020-10224 - https://www.exploit-db.com/exploits/47887 +CVE-2020-10225 - https://www.exploit-db.com/exploits/47881 +CVE-2020-10227 - https://www.exploit-db.com/exploits/48804 +CVE-2020-10228 - https://www.exploit-db.com/exploits/48804 +CVE-2020-10229 - https://www.exploit-db.com/exploits/48804 +CVE-2020-10230 - https://www.exploit-db.com/exploits/48212 +CVE-2020-10231 - http://packetstormsecurity.com/files/157048/TP-LINK-Cloud-Cameras-NCXXX-Remote-NULL-Pointer-Dereference.html +CVE-2020-10231 - http://seclists.org/fulldisclosure/2020/Apr/5 +CVE-2020-10231 - http://seclists.org/fulldisclosure/2020/Mar/54 +CVE-2020-10233 - https://github.com/sleuthkit/sleuthkit/issues/1829 +CVE-2020-10234 - https://github.com/FULLSHADE/Kernel-exploits +CVE-2020-10234 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys +CVE-2020-10235 - https://bugzilla.suse.com/show_bug.cgi?id=1165721 +CVE-2020-10245 - https://www.tenable.com/security/research/tra-2020-16 +CVE-2020-10248 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html +CVE-2020-10249 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html +CVE-2020-10250 - https://sku11army.blogspot.com/2020/03/bwa-multiple-vulnerabilities-in-direx.html +CVE-2020-10251 - https://github.com/ImageMagick/ImageMagick/issues/1859 +CVE-2020-10255 - https://thehackernews.com/2020/03/rowhammer-vulnerability-ddr4-dram.html +CVE-2020-10256 - https://support.1password.com/kb/202010/ +CVE-2020-10257 - https://www.wordfence.com/blog/2020/03/zero-day-vulnerability-in-themerex-addons-now-patched/ +CVE-2020-10262 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10262.md +CVE-2020-10262 - https://www.youtube.com/watch?v=Cr5DupGxmL4 +CVE-2020-10263 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10263.md +CVE-2020-10263 - https://www.youtube.com/watch?v=Cr5DupGxmL4 +CVE-2020-1027 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html +CVE-2020-10283 - https://github.com/aliasrobotics/RVD/issues/3316 +CVE-2020-10289 - https://github.com/ros/actionlib/pull/171 +CVE-2020-10290 - https://github.com/aliasrobotics/RVD/issues/1495 +CVE-2020-1032 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 +CVE-2020-1036 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 +CVE-2020-10364 - https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html +CVE-2020-10364 - https://www.exploit-db.com/exploits/48228 +CVE-2020-10365 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities +CVE-2020-10366 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities +CVE-2020-10375 - https://www.x41-dsec.de/lab/advisories/x41-2020-005-smarty/ +CVE-2020-10376 - https://medium.com/@felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3 +CVE-2020-10385 - https://packetstormsecurity.com/files/156910/WordPress-WP-Forms-1.5.8.2-Cross-Site-Scripting.html +CVE-2020-10385 - https://wpvulndb.com/vulnerabilities/10114 +CVE-2020-10386 - http://packetstormsecurity.com/files/156757/PHPKB-Multi-Language-9-image-upload.php-Code-Execution.html +CVE-2020-10386 - https://antoniocannito.it/phpkb1#remote-code-execution-cve-2020-10386 +CVE-2020-10386 - https://www.exploit-db.com/exploits/48221 +CVE-2020-10387 - http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-Authenticated-Directory-Traversal.html +CVE-2020-10387 - https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-10387 +CVE-2020-10387 - https://www.exploit-db.com/exploits/48220 +CVE-2020-10388 - https://antoniocannito.it/phpkb1#blind-cross-site-scripting-cve-2020-10388 +CVE-2020-10389 - http://packetstormsecurity.com/files/156751/PHPKB-Multi-Language-9-Authenticated-Remote-Code-Execution.html +CVE-2020-10389 - https://antoniocannito.it/phpkb1#authenticated-remote-code-execution-cve-2020-10389 +CVE-2020-10389 - https://www.exploit-db.com/exploits/48219 +CVE-2020-10390 - https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390 +CVE-2020-10391 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10392 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10393 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10394 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10395 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10396 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10397 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10398 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10399 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-1040 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 +CVE-2020-10400 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10401 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10402 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10403 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10404 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10405 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10406 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10407 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10408 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10409 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-1041 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 +CVE-2020-10410 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10411 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10412 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10413 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10414 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10415 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10416 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10417 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10418 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10419 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-1042 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 +CVE-2020-10420 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10421 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10422 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10423 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10424 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10425 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10426 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10427 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10428 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10429 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-1043 - https://nvidia.custhelp.com/app/answers/detail/a_id/5044 +CVE-2020-10430 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10431 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10432 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10433 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10434 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10435 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10436 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10437 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10438 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10439 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10440 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10441 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10442 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10443 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10444 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10445 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10446 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10447 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10448 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10449 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10450 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10451 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10452 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10453 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10454 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10455 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10456 - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 +CVE-2020-10457 - https://antoniocannito.it/phpkb1#arbitrary-file-renaming-cve-2020-10457 +CVE-2020-10458 - https://antoniocannito.it/phpkb1#arbitrary-folder-deletion-cve-2020-10458 +CVE-2020-10459 - https://antoniocannito.it/phpkb1#arbitrary-file-listing-cve-2020-10459 +CVE-2020-10460 - https://antoniocannito.it/phpkb1#csv-injection-cve-2020-10460 +CVE-2020-10461 - https://antoniocannito.it/phpkb1#blind-cross-site-scripting-2-cve-2020-10461 +CVE-2020-10462 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-custom-field-cve-2020-10462 +CVE-2020-10463 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-template-cve-2020-10463 +CVE-2020-10464 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-an-article-cve-2020-10464 +CVE-2020-10465 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-category-cve-2020-10465 +CVE-2020-10466 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-cve-2020-10466 +CVE-2020-10467 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-comment-cve-2020-10467 +CVE-2020-10468 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-news-article-cve-2020-10468 +CVE-2020-10469 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-department-cve-2020-10469 +CVE-2020-10470 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-custom-fields-cve-2020-10470 +CVE-2020-10471 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-articles-cve-2020-10471 +CVE-2020-10472 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-sorting-templates-cve-2020-10472 +CVE-2020-10473 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-category-cve-2020-10473 +CVE-2020-10474 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-comment-cve-2020-10474 +CVE-2020-10475 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-deleting-a-ticket-cve-2020-10475 +CVE-2020-10476 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-2-cve-2020-10476 +CVE-2020-10477 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-news-article-cve-2020-10477 +CVE-2020-10478 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-changing-settings-cve-2020-10478 +CVE-2020-10479 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-news-article-cve-2020-10479 +CVE-2020-1048 - http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html +CVE-2020-1048 - http://packetstormsecurity.com/files/159217/Microsoft-Spooler-Local-Privilege-Elevation.html +CVE-2020-10480 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-category-cve-2020-10480 +CVE-2020-10481 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-glossary-term-cve-2020-10481 +CVE-2020-10482 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-article-template-cve-2020-10482 +CVE-2020-10483 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-posting-a-comment-cve-2020-10483 +CVE-2020-10484 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-creating-a-new-custom-field-cve-2020-10484 +CVE-2020-10485 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-an-article-cve-2020-10485 +CVE-2020-10486 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-comment-cve-2020-10486 +CVE-2020-10487 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-glossary-term-cve-2020-10487 +CVE-2020-10488 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-news-article-cve-2020-10488 +CVE-2020-10489 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-ticket-cve-2020-10489 +CVE-2020-10490 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-department-cve-2020-10490 +CVE-2020-10491 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-department-cve-2020-10491 +CVE-2020-10492 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-an-article-template-cve-2020-10492 +CVE-2020-10493 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-glossary-term-cve-2020-10493 +CVE-2020-10494 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-news-article-cve-2020-10494 +CVE-2020-10495 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-an-article-template-cve-2020-10495 +CVE-2020-10496 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-an-article-cve-2020-10496 +CVE-2020-10497 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-deleting-a-category-cve-2020-10497 +CVE-2020-10498 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-category-cve-2020-10498 +CVE-2020-10499 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-closing-a-ticket-cve-2020-10499 +CVE-2020-10500 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-replying-to-a-ticket-cve-2020-10500 +CVE-2020-10501 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-department-cve-2020-10501 +CVE-2020-10502 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-approving-a-new-comment-cve-2020-10502 +CVE-2020-10503 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-disapproving-a-new-comment-cve-2020-10503 +CVE-2020-10504 - https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-comment-cve-2020-10504 +CVE-2020-10515 - https://herolab.usd.de/security-advisories/ +CVE-2020-10531 - https://unicode-org.atlassian.net/browse/ICU-20958 +CVE-2020-10531 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-10531 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-10531 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10532 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component +CVE-2020-1054 - http://packetstormsecurity.com/files/160515/Microsoft-Windows-DrawIconEx-Local-Privilege-Escalation.html +CVE-2020-10543 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-10543 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10543 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10543 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10558 - https://cylect.io/blog/Tesla_Model_3_Vuln/ +CVE-2020-10560 - https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery +CVE-2020-10564 - https://github.com/beerpwn/CVE/tree/master/WP-File-Upload_disclosure_report/ +CVE-2020-10564 - https://wpvulndb.com/vulnerabilities/10132 +CVE-2020-10567 - http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html +CVE-2020-10567 - https://github.com/trippo/ResponsiveFilemanager/issues/600 +CVE-2020-10568 - https://medium.com/@arall/sitepress-multilingual-cms-wplugin-wpml-4-3-7-b-2-9c9486c13577 +CVE-2020-10568 - https://wpvulndb.com/vulnerabilities/10131 +CVE-2020-10569 - http://packetstormsecurity.com/files/157314/Sysaid-20.1.11-b26-Remote-Command-Execution.html +CVE-2020-10570 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-10570 +CVE-2020-10591 - https://github.com/walmartlabs/concord/issues/22 +CVE-2020-10596 - http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html +CVE-2020-10644 - http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html +CVE-2020-10648 - https://github.com/u-boot/u-boot/commits/master +CVE-2020-10650 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2020-10665 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md +CVE-2020-10665 - https://github.com/spaceraccoon/CVE-2020-10665 +CVE-2020-10666 - https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities +CVE-2020-10667 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html +CVE-2020-10668 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html +CVE-2020-10669 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html +CVE-2020-10670 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html +CVE-2020-10671 - http://packetstormsecurity.com/files/156833/Oce-Colorwave-500-CSRF-XSS-Authentication-Bypass.html +CVE-2020-10672 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-10672 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10672 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-10672 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10672 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10673 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-10673 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10673 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-10673 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10673 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10683 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10683 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10690 - https://usn.ubuntu.com/4419-1/ +CVE-2020-10693 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-10711 - https://usn.ubuntu.com/4413-1/ +CVE-2020-10711 - https://usn.ubuntu.com/4414-1/ +CVE-2020-10711 - https://usn.ubuntu.com/4419-1/ +CVE-2020-10713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY +CVE-2020-10720 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef +CVE-2020-10722 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10722 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10723 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10723 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10724 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10724 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10725 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10726 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10735 - https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y +CVE-2020-10751 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6 +CVE-2020-10751 - https://usn.ubuntu.com/4413-1/ +CVE-2020-10751 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-10757 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9 +CVE-2020-10757 - https://usn.ubuntu.com/4426-1/ +CVE-2020-10759 - https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md +CVE-2020-10766 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e +CVE-2020-10767 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada +CVE-2020-10768 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf +CVE-2020-10769 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-10770 - http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html +CVE-2020-10773 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f +CVE-2020-10777 - https://bugzilla.redhat.com/show_bug.cgi?id=1847605 +CVE-2020-10781 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680 +CVE-2020-10786 - https://gitlab.com/snippets/1954764 +CVE-2020-10787 - https://gitlab.com/snippets/1954764 +CVE-2020-10793 - https://medium.com/@vbharad/account-takeover-via-modifying-email-id-codeigniter-framework-ca30741ad297 +CVE-2020-10807 - https://github.com/mitre/caldera/issues/1405 +CVE-2020-10808 - http://packetstormsecurity.com/files/157111/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html +CVE-2020-10808 - http://packetstormsecurity.com/files/157219/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html +CVE-2020-10808 - https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/ +CVE-2020-10809 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_1 +CVE-2020-10809 - https://research.loginsoft.com/bugs/heap-overflow-in-decompress-c-hdf5-1-13-0/ +CVE-2020-10810 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_3 +CVE-2020-10810 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5ac-c-hdf5-1-13-0/ +CVE-2020-10811 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_2 +CVE-2020-10811 - https://research.loginsoft.com/bugs/heap-buffer-overflow-in-h5olayout-c-hdf5-1-13-0/ +CVE-2020-10812 - https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_4 +CVE-2020-10812 - https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/ +CVE-2020-10818 - https://code610.blogspot.com/2020/03/rce-in-artica-426.html +CVE-2020-10819 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html +CVE-2020-1082 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1082 +CVE-2020-10820 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html +CVE-2020-10821 - https://code610.blogspot.com/2020/03/nagios-5611-xssd.html +CVE-2020-10823 - https://slashd.ga/2020/03/draytek-vulnerabilities/ +CVE-2020-10824 - https://slashd.ga/2020/03/draytek-vulnerabilities/ +CVE-2020-10825 - https://slashd.ga/2020/03/draytek-vulnerabilities/ +CVE-2020-10826 - https://slashd.ga/2020/03/draytek-vulnerabilities/ +CVE-2020-10827 - https://slashd.ga/2020/03/draytek-vulnerabilities/ +CVE-2020-10828 - https://slashd.ga/2020/03/draytek-vulnerabilities/ +CVE-2020-10829 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10830 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10831 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10832 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10833 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10834 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10835 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10836 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10837 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10838 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10839 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10840 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10841 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10842 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10843 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10844 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10845 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10846 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10847 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10848 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10849 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10850 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10851 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10852 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10853 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10854 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10855 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-10874 - https://www.youtube.com/watch?v=Lv-STOyQCVY +CVE-2020-10875 - https://www.youtube.com/watch?v=Lv-STOyQCVY +CVE-2020-10878 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-10878 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10878 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10878 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10879 - https://www.exploit-db.com/exploits/48241 +CVE-2020-10882 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html +CVE-2020-10883 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html +CVE-2020-10884 - http://packetstormsecurity.com/files/157255/TP-Link-Archer-A7-C7-Unauthenticated-LAN-Remote-Code-Execution.html +CVE-2020-10914 - http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html +CVE-2020-10915 - http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html +CVE-2020-10931 - https://github.com/memcached/memcached/issues/629 +CVE-2020-10935 - https://www.coresecurity.com/advisories/zulip-account-takeover-stored-xss +CVE-2020-10936 - https://sysdream.com/news/lab/ +CVE-2020-10936 - https://sysdream.com/news/lab/2020-05-25-cve-2020-10936-sympa-privileges-escalation-to-root/ +CVE-2020-10939 - https://cert.vde.com/en-us/advisories/vde-2020-012 +CVE-2020-10940 - https://cert.vde.com/en-us/advisories/vde-2020-013 +CVE-2020-10942 - https://usn.ubuntu.com/4342-1/ +CVE-2020-10945 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10945-centreon-session-id-exposure +CVE-2020-10946 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ +CVE-2020-10947 - https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation +CVE-2020-10951 - https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-portal-websites-clickjacking-vulnerability +CVE-2020-10951 - https://www.westerndigital.com/support/productsecurity/wdc-19012-my-cloud-home-and-ibi-websites-2-2-0 +CVE-2020-10957 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html +CVE-2020-10957 - https://hackerone.com/reports/827729 +CVE-2020-10958 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html +CVE-2020-10958 - https://hackerone.com/reports/827051 +CVE-2020-10963 - http://packetstormsecurity.com/files/160243/Laravel-Administrator-4-File-Upload.html +CVE-2020-10967 - http://packetstormsecurity.com/files/157771/Open-Xchange-Dovecot-2.3.10-Null-Pointer-Dereference-Denial-Of-Service.html +CVE-2020-10968 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-10968 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10968 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-10968 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10968 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10969 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-10969 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-10969 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-10969 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-10969 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-10977 - http://packetstormsecurity.com/files/160441/GitLab-File-Read-Remote-Code-Execution.html +CVE-2020-10982 - https://herolab.usd.de/security-advisories/ +CVE-2020-10982 - https://herolab.usd.de/security-advisories/usd-2020-0033/ +CVE-2020-10983 - https://herolab.usd.de/security-advisories/ +CVE-2020-10983 - https://herolab.usd.de/security-advisories/usd-2020-0034/ +CVE-2020-10984 - https://herolab.usd.de/security-advisories/ +CVE-2020-10984 - https://herolab.usd.de/security-advisories/usd-2020-0031/ +CVE-2020-10985 - https://herolab.usd.de/security-advisories/ +CVE-2020-10985 - https://herolab.usd.de/security-advisories/usd-2020-0035/ +CVE-2020-10986 - https://www.ise.io/research/ +CVE-2020-10987 - https://www.ise.io/research/ +CVE-2020-10988 - https://www.ise.io/research/ +CVE-2020-10989 - https://www.ise.io/research/ +CVE-2020-10996 - https://jira.percona.com/browse/PXC-3117 +CVE-2020-10996 - https://www.percona.com/blog/2020/04/20/cve-2020-10996-percona-xtradb-cluster-sst-script-static-key/ +CVE-2020-10997 - https://jira.percona.com/browse/PXB-2142 +CVE-2020-10997 - https://www.percona.com/blog/2020/04/16/cve-2020-10997-percona-xtrabackup-information-disclosure-of-command-line-arguments/ +CVE-2020-11022 - http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html +CVE-2020-11022 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11022 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11022 - https://www.tenable.com/security/tns-2020-10 +CVE-2020-11022 - https://www.tenable.com/security/tns-2020-11 +CVE-2020-11022 - https://www.tenable.com/security/tns-2021-02 +CVE-2020-11022 - https://www.tenable.com/security/tns-2021-10 +CVE-2020-11023 - http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html +CVE-2020-11023 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11023 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11023 - https://www.tenable.com/security/tns-2021-02 +CVE-2020-11023 - https://www.tenable.com/security/tns-2021-10 +CVE-2020-11026 - https://hackerone.com/reports/179695 +CVE-2020-11027 - http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html +CVE-2020-11042 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11044 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11045 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11046 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11047 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11048 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11049 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11058 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11060 - http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html +CVE-2020-11080 - https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr +CVE-2020-11080 - https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html +CVE-2020-11080 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11080 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-11080 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11080 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11080 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11083 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html +CVE-2020-11083 - http://seclists.org/fulldisclosure/2020/Aug/2 +CVE-2020-11090 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123 +CVE-2020-11093 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1124 +CVE-2020-11093 - https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w-39f4-rpv2 +CVE-2020-11095 - https://usn.ubuntu.com/4481-1/ +CVE-2020-11096 - https://usn.ubuntu.com/4481-1/ +CVE-2020-11097 - https://usn.ubuntu.com/4481-1/ +CVE-2020-11098 - https://usn.ubuntu.com/4481-1/ +CVE-2020-11099 - https://usn.ubuntu.com/4481-1/ +CVE-2020-11100 - http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html +CVE-2020-11107 - http://packetstormsecurity.com/files/164292/XAMPP-7.4.3-Privilege-Escalation.html +CVE-2020-11108 - http://packetstormsecurity.com/files/157623/Pi-hole-4.4-Remote-Code-Execution.html +CVE-2020-11108 - http://packetstormsecurity.com/files/157624/Pi-hole-4.4-Remote-Code-Execution-Privilege-Escalation.html +CVE-2020-11108 - http://packetstormsecurity.com/files/157748/Pi-Hole-heisenbergCompensator-Blocklist-OS-Command-Execution.html +CVE-2020-11108 - http://packetstormsecurity.com/files/157839/Pi-hole-4.4.0-Remote-Code-Execution.html +CVE-2020-11108 - https://frichetten.com/blog/cve-2020-11108-pihole-rce/ +CVE-2020-11108 - https://github.com/Frichetten/CVE-2020-11108-PoC +CVE-2020-11110 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md +CVE-2020-11111 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-11111 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11111 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11111 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11111 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11112 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-11112 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11112 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11112 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11112 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11113 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-11113 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11113 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11113 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11113 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11114 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11115 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11116 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11117 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11118 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11119 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11120 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11121 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11122 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11123 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11124 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-11125 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11126 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11127 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11128 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11129 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-11130 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11131 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11132 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11133 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11134 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11135 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-11136 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11137 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11138 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11139 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11140 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11141 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11143 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11144 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11145 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11146 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11147 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11148 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11149 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11150 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11151 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11152 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11153 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11154 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11155 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11156 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11157 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11158 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-11159 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11160 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11161 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11162 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11163 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11164 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11165 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11166 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11167 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11168 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11169 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11170 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11171 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11172 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11173 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11174 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-11175 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11176 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11177 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11178 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11179 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11180 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11181 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11182 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11183 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11184 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11185 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11186 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11187 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11188 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11189 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11190 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11191 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11192 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11193 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11194 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11195 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11196 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11197 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11198 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11199 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11200 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11201 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ +CVE-2020-11201 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11202 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ +CVE-2020-11202 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11203 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11204 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11205 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11206 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ +CVE-2020-11206 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11207 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ +CVE-2020-11207 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11208 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ +CVE-2020-11208 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11209 - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ +CVE-2020-11209 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-11210 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11212 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11213 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11214 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11215 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11216 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11217 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11218 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11220 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11221 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11222 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11223 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11225 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-11226 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11227 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11228 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11230 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11231 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11233 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11234 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11235 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11236 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11237 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11238 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11239 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11240 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11241 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11242 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11243 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11245 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11246 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11247 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11250 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11251 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11252 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11253 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11254 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11255 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2020-11256 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11257 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11258 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11259 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11260 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11261 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11262 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11263 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2020-11264 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2020-11265 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11266 - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin +CVE-2020-11267 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11268 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11269 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11270 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11271 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11272 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11273 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11274 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11275 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11276 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11277 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11278 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11279 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11280 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11281 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11282 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11283 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11284 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11285 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11286 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11287 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11288 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11289 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11290 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11291 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11292 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11293 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11294 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11295 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2020-11296 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11297 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-11298 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11299 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11301 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2020-11303 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2020-11304 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11305 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11306 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2020-11307 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2020-11308 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11309 - https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin +CVE-2020-11415 - https://support.sonatype.com/hc/en-us/articles/360045360854 +CVE-2020-11436 - https://know.bishopfox.com/advisories +CVE-2020-11436 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 +CVE-2020-11437 - https://know.bishopfox.com/advisories +CVE-2020-11437 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 +CVE-2020-11438 - https://know.bishopfox.com/advisories +CVE-2020-11438 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 +CVE-2020-11439 - https://know.bishopfox.com/advisories +CVE-2020-11439 - https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0 +CVE-2020-11441 - https://github.com/phpmyadmin/phpmyadmin/issues/16056 +CVE-2020-11444 - https://support.sonatype.com +CVE-2020-11444 - https://support.sonatype.com/hc/en-us/articles/360046133553 +CVE-2020-11449 - https://github.com/RioIsDown/TC7337 +CVE-2020-11450 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html +CVE-2020-11451 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html +CVE-2020-11452 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html +CVE-2020-11453 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html +CVE-2020-11454 - http://packetstormsecurity.com/files/157068/MicroStrategy-Intelligence-Server-And-Web-10.4-XSS-Disclosure-SSRF-Code-Execution.html +CVE-2020-11455 - http://packetstormsecurity.com/files/157112/LimeSurvey-4.1.11-Path-Traversal.html +CVE-2020-11455 - https://www.exploit-db.com/exploits/48297 +CVE-2020-11456 - http://packetstormsecurity.com/files/157114/LimeSurvey-4.1.11-Cross-Site-Scripting.html +CVE-2020-11456 - https://www.exploit-db.com/exploits/48289 +CVE-2020-11457 - http://packetstormsecurity.com/files/157104/pfSense-2.4.4-P3-User-Manager-Cross-Site-Scripting.html +CVE-2020-11457 - https://www.exploit-db.com/exploits/48300 +CVE-2020-11458 - https://matthias.sdfeu.org/misp-poc.py +CVE-2020-11463 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11464 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11465 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11466 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11467 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-1147 - http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html +CVE-2020-1147 - http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html +CVE-2020-1147 - http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html +CVE-2020-11474 - https://herolab.usd.de/security-advisories/ +CVE-2020-11474 - https://herolab.usd.de/security-advisories/usd-2020-0038/ +CVE-2020-11476 - https://herolab.usd.de/security-advisories/ +CVE-2020-11476 - https://herolab.usd.de/security-advisories/usd-2020-0041/ +CVE-2020-11490 - http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html +CVE-2020-11490 - https://github.com/c610/tmp/blob/master/zenload4patreons.zip +CVE-2020-11491 - http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html +CVE-2020-11491 - https://github.com/c610/tmp/blob/master/zenload4patreons.zip +CVE-2020-11492 - https://docs.docker.com/docker-for-windows/release-notes/ +CVE-2020-11492 - https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/ +CVE-2020-11494 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html +CVE-2020-11497 - http://packetstormsecurity.com/files/158931/WordPress-NAB-Transact-WooCommerce-2.1.0-Payment-Bypass.html +CVE-2020-11497 - http://seclists.org/fulldisclosure/2020/Aug/13 +CVE-2020-11501 - https://usn.ubuntu.com/4322-1/ +CVE-2020-11503 - https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503 +CVE-2020-11507 - https://forums.malwarebytes.com/topic/258140-release-adwcleaner-804/ +CVE-2020-11511 - http://packetstormsecurity.com/files/163538/WordPress-LearnPress-Privilege-Escalation.html +CVE-2020-11521 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11522 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11523 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11524 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11525 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11526 - https://usn.ubuntu.com/4379-1/ +CVE-2020-11528 - https://github.com/14isnot40/vul_discovery/blob/06d04dbbc6f792a82321c00376d4dbf3add00f4f/poc/bit2spr%20vulnerability%20discovery.md.pdf +CVE-2020-11529 - https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7 +CVE-2020-11530 - http://packetstormsecurity.com/files/157607/WordPress-ChopSlider-3-SQL-Injection.html +CVE-2020-11530 - http://packetstormsecurity.com/files/157655/WordPress-ChopSlider3-3.4-SQL-Injection.html +CVE-2020-11531 - http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html +CVE-2020-11531 - http://seclists.org/fulldisclosure/2020/May/27 +CVE-2020-11532 - http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html +CVE-2020-11532 - http://seclists.org/fulldisclosure/2020/May/28 +CVE-2020-11539 - https://github.com/the-girl-who-lived/CVE-2020-11539/ +CVE-2020-11539 - https://medium.com/@sayliambure/hacking-a-5-smartband-824763ab6e8f +CVE-2020-11546 - https://blog.to.com/advisory-superwebmailer-cve-2020-11546/ +CVE-2020-11548 - https://www.exploit-db.com/exploits/48197 +CVE-2020-11549 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security +CVE-2020-11549 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt +CVE-2020-11550 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security +CVE-2020-11550 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt +CVE-2020-11551 - https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security +CVE-2020-11551 - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt +CVE-2020-11552 - http://packetstormsecurity.com/files/158820/ManageEngine-ADSelfService-Plus-6000-Remote-Code-Execution.html +CVE-2020-11552 - http://seclists.org/fulldisclosure/2020/Aug/4 +CVE-2020-11552 - http://seclists.org/fulldisclosure/2020/Aug/6 +CVE-2020-11552 - https://www.exploit-db.com/exploits/48739 +CVE-2020-11552 - https://www.manageengine.com +CVE-2020-11553 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee +CVE-2020-11554 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee +CVE-2020-11555 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee +CVE-2020-11556 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee +CVE-2020-11557 - https://medium.com/tsscyber/noc-noc-whos-there-your-nms-is-pwned-1826174e0dee +CVE-2020-11558 - https://github.com/gpac/gpac/issues/1440 +CVE-2020-11560 - http://packetstormsecurity.com/files/173117/NCH-Express-Invoice-7.25-Cleartext-Password.html +CVE-2020-11560 - https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11560-title-clear-text.html +CVE-2020-11560 - https://www.youtube.com/watch?v=V0BWq33qVCs&feature=youtu.be +CVE-2020-11561 - https://tejaspingulkar.blogspot.com +CVE-2020-11561 - https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11561-title-escalation-via.html +CVE-2020-11561 - https://youtu.be/-i2KtBgO3Kw +CVE-2020-11576 - https://www.soluble.ai/blog/argo-cves-2020 +CVE-2020-11579 - https://shielder.it/ +CVE-2020-11579 - https://www.shielder.it/blog/mysql-and-cve-2020-11579-exploitation/ +CVE-2020-11583 - https://medium.com/@0x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5 +CVE-2020-11584 - https://medium.com/@0x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5 +CVE-2020-11601 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11602 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11603 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11604 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11605 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11606 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11607 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-11608 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 +CVE-2020-11609 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 +CVE-2020-11610 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe +CVE-2020-11611 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client +CVE-2020-11612 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11612 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11612 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-11612 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11619 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-11619 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11619 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11619 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11620 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-11620 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11620 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11620 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11622 - https://www.arista.com/en/support/advisories-notices +CVE-2020-11651 - http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html +CVE-2020-11651 - http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html +CVE-2020-11652 - http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html +CVE-2020-11652 - http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html +CVE-2020-11655 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11655 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11655 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11655 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11656 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11656 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11656 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-11656 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11658 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11659 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11660 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11661 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11661 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11662 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11662 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11663 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11663 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11664 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11664 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11665 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11665 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11666 - http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11666 - http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html +CVE-2020-11668 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 +CVE-2020-11669 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 +CVE-2020-11673 - https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459 +CVE-2020-11679 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html +CVE-2020-11680 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html +CVE-2020-11681 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html +CVE-2020-11682 - http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html +CVE-2020-11698 - http://packetstormsecurity.com/files/159470/SpamTitan-7.07-Remote-Code-Execution.html +CVE-2020-11698 - http://packetstormsecurity.com/files/160809/SpamTitan-7.07-Command-Injection.html +CVE-2020-11698 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-11699 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html +CVE-2020-11699 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-1170 - http://packetstormsecurity.com/files/160919/Cloud-Filter-Arbitrary-File-Creation-Privilege-Escalation.html +CVE-2020-11700 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html +CVE-2020-11700 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-11709 - https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495 +CVE-2020-11709 - https://github.com/yhirose/cpp-httplib/issues/425 +CVE-2020-11711 - https://advisories.stormshield.eu/2020-011/ +CVE-2020-11712 - https://github.com/jenaye/cve/blob/master/readme.MD +CVE-2020-11713 - https://gist.github.com/pietroborrello/7c5be2d1dc15349c4ffc8671f0aad04f +CVE-2020-11714 - https://github.com/leona4040/PSG-6528VM-xss/blob/master/README.md +CVE-2020-11717 - http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html +CVE-2020-11717 - https://seclists.org/fulldisclosure/2020/Dec/36 +CVE-2020-11718 - http://packetstormsecurity.com/files/160627/Programi-Bilanc-Build-007-Release-014-31.01.2020-Insecure-Downloads.html +CVE-2020-11718 - http://seclists.org/fulldisclosure/2020/Dec/39 +CVE-2020-11719 - http://packetstormsecurity.com/files/160625/Programi-Bilanc-Build-007-Release-014-31.01.2020-Static-Key.html +CVE-2020-11719 - http://seclists.org/fulldisclosure/2020/Dec/35 +CVE-2020-11720 - http://packetstormsecurity.com/files/160623/Programi-Bilanc-Build-007-Release-014-31.01.2020-Weak-Default-Password.html +CVE-2020-11720 - http://seclists.org/fulldisclosure/2020/Dec/34 +CVE-2020-11721 - https://github.com/saitoha/libsixel/issues/134 +CVE-2020-11723 - http://packetstormsecurity.com/files/157217/Cellebrite-UFED-7.29-Hardcoded-ADB-Authentication-Keys.html +CVE-2020-11727 - http://packetstormsecurity.com/files/157557/WordPress-WooCommerce-Advanced-Order-Export-3.1.3-Cross-Site-Scripting.html +CVE-2020-11738 - http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html +CVE-2020-11738 - http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html +CVE-2020-11749 - https://medium.com/@tehwinsam/multiple-xss-on-pandorafms-7-0-ng-744-64b244b8523c +CVE-2020-11749 - https://packetstormsecurity.com/files/158389/Pandora-FMS-7.0-NG-746-Script-Insertion-Code-Execution.htmlPoC +CVE-2020-11749 - https://www.exploit-db.com/exploits/48707 +CVE-2020-11753 - https://support.sonatype.com/hc/en-us/articles/360046233714 +CVE-2020-11771 - https://kb.netgear.com/000061759/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0519 +CVE-2020-11773 - https://kb.netgear.com/000061757/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0521 +CVE-2020-11774 - https://kb.netgear.com/000061756/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0522 +CVE-2020-11775 - https://kb.netgear.com/000061755/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0523 +CVE-2020-11776 - https://kb.netgear.com/000061754/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0524 +CVE-2020-11777 - https://kb.netgear.com/000061753/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateway-PSV-2018-0525 +CVE-2020-11780 - https://kb.netgear.com/000061750/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0528 +CVE-2020-11782 - https://kb.netgear.com/000061748/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0530 +CVE-2020-11783 - https://kb.netgear.com/000061747/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0531 +CVE-2020-11786 - https://kb.netgear.com/000061744/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0535 +CVE-2020-11789 - https://kb.netgear.com/000061741/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0051 +CVE-2020-11798 - http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html +CVE-2020-11803 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html +CVE-2020-11803 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-11804 - http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html +CVE-2020-11804 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-11811 - https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html +CVE-2020-11827 - https://www.gog.com/galaxy +CVE-2020-11853 - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html +CVE-2020-11853 - http://packetstormsecurity.com/files/161366/Micro-Focus-Operations-Bridge-Manager-Remote-Code-Execution.html +CVE-2020-11854 - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html +CVE-2020-11857 - http://packetstormsecurity.com/files/162407/Micro-Focus-Operations-Bridge-Reporter-shrboadmin-Default-Password.html +CVE-2020-11858 - http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html +CVE-2020-11868 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11879 - https://gitlab.gnome.org/GNOME/evolution/issues/784 +CVE-2020-11882 - http://packetstormsecurity.com/files/158302/Android-o2-Business-1.2.0-Open-Redirect.html +CVE-2020-11884 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f +CVE-2020-11884 - https://usn.ubuntu.com/4342-1/ +CVE-2020-11885 - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0684 +CVE-2020-11886 - https://issues.opennms.org/browse/NMS-12572 +CVE-2020-11888 - https://github.com/trentm/python-markdown2/issues/348 +CVE-2020-11894 - https://github.com/libming/libming/issues/196 +CVE-2020-11895 - https://github.com/libming/libming/issues/197 +CVE-2020-11896 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11896 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11896 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11896 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11897 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11897 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11897 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11897 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11898 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11898 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11898 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11898 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11899 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11899 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11899 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11899 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11900 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11900 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11900 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11900 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11901 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11901 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11901 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11901 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11902 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11902 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11902 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11902 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11903 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11903 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11903 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11903 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11904 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11904 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11904 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11904 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11905 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11905 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11905 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11905 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11906 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11906 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11906 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11906 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11907 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11907 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11907 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11907 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11908 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11908 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11908 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11908 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11909 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11909 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11909 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11909 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11910 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11910 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11910 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11910 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11911 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11911 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11911 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11911 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11912 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11912 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11912 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11912 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11913 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11913 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11913 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11913 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11914 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC +CVE-2020-11914 - https://www.jsof-tech.com/ripple20/ +CVE-2020-11914 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-11914 - https://www.kb.cert.org/vuls/id/257161/ +CVE-2020-11915 - https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/ +CVE-2020-11920 - https://www.pentestpartners.com/security-blog/vulnerable-wi-fi-dildo-camera-endoscope-yes-really/ +CVE-2020-11930 - https://wpvulndb.com/vulnerabilities/10181 +CVE-2020-11935 - https://ubuntu.com/security/CVE-2020-11935 +CVE-2020-11937 - https://github.com/sungjungk/whoopsie_killer +CVE-2020-11937 - https://launchpad.net/bugs/1881982 +CVE-2020-11941 - http://packetstormsecurity.com/files/157476/Open-AudIT-3.2.2-Command-Injection-SQL-Injection.html +CVE-2020-11941 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities +CVE-2020-11942 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities +CVE-2020-11943 - https://www.coresecurity.com/advisories/open-audit-multiple-vulnerabilities +CVE-2020-11945 - https://github.com/squid-cache/squid/pull/585 +CVE-2020-11951 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ +CVE-2020-11952 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ +CVE-2020-11953 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ +CVE-2020-11955 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ +CVE-2020-11956 - https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/ +CVE-2020-11958 - https://github.com/skvadrik/re2c/commit/c4603ba5ce229db83a2a4fb93e6d4b4e3ec3776a +CVE-2020-11959 - https://privacy.mi.com/trust#/security/vulnerability-management/vulnerability-announcement/detail?id=14 +CVE-2020-11971 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-11971 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11971 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11972 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11972 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11973 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11973 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11973 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11973 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11978 - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html +CVE-2020-11978 - http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html +CVE-2020-11979 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-11979 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11979 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-11979 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11984 - http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html +CVE-2020-11984 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11984 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11985 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11987 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11987 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11987 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-11987 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-11987 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11988 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11988 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11993 - http://packetstormsecurity.com/files/160393/Apache-2-HTTP2-Module-Concurrent-Pool-Usage.html +CVE-2020-11993 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11993 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11994 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11994 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11994 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-11996 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11996 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-11998 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-11998 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-11998 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-11998 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-12004 - http://packetstormsecurity.com/files/158226/Inductive-Automation-Ignition-Remote-Code-Execution.html +CVE-2020-12027 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html +CVE-2020-12028 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html +CVE-2020-12029 - http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html +CVE-2020-12049 - http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html +CVE-2020-12049 - https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 +CVE-2020-12049 - https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak +CVE-2020-12050 - https://bugzilla.redhat.com/show_bug.cgi?id=1825762 +CVE-2020-12050 - https://sysdream.com/news/lab/ +CVE-2020-12050 - https://sysdream.com/news/lab/2020-05-25-cve-2020-12050-fedora-red-hat-centos-local-privilege-escalation-through-a-race-condition-in-the-sqliteodbc-installer-script/ +CVE-2020-12052 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2020-12054 - https://cxsecurity.com/issue/WLB-2020040144 +CVE-2020-12054 - https://wpvulndb.com/vulnerabilities/10184 +CVE-2020-1206 - http://packetstormsecurity.com/files/158053/SMBleed-Uninitialized-Kernel-Memory-Read-Proof-Of-Concept.html +CVE-2020-12061 - https://eprint.iacr.org/2021/640.pdf +CVE-2020-12074 - https://www.wordfence.com/blog/2020/03/vulnerability-patched-in-import-export-wordpress-users/ +CVE-2020-12078 - http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html +CVE-2020-12078 - https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/ +CVE-2020-12080 - https://www.tenable.com/security/research/tra-2020-28 +CVE-2020-12101 - http://packetstormsecurity.com/files/157534/xt-Commerce-5.4.1-6.2.1-6.2.2-Improper-Access-Control.html +CVE-2020-12101 - http://seclists.org/fulldisclosure/2020/May/0 +CVE-2020-12101 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-012.txt +CVE-2020-12102 - https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/ +CVE-2020-12102 - https://github.com/prasathmani/tinyfilemanager/issues/357 +CVE-2020-12103 - https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/ +CVE-2020-12103 - https://github.com/prasathmani/tinyfilemanager/issues/357 +CVE-2020-12104 - https://wpvulndb.com/vulnerabilities/10199 +CVE-2020-12109 - http://packetstormsecurity.com/files/157531/TP-LINK-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html +CVE-2020-12109 - http://packetstormsecurity.com/files/159222/TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html +CVE-2020-12110 - http://packetstormsecurity.com/files/157532/TP-LINK-Cloud-Cameras-NCXXX-Hardcoded-Encryption-Key.html +CVE-2020-12111 - http://packetstormsecurity.com/files/157533/TP-LINK-Cloud-Cameras-NCXXX-SetEncryptKey-Command-Injection.html +CVE-2020-12112 - https://github.com/tchenu/CVE-2020-12112 +CVE-2020-12114 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html +CVE-2020-12114 - http://www.openwall.com/lists/oss-security/2020/05/04/2 +CVE-2020-12114 - https://usn.ubuntu.com/4388-1/ +CVE-2020-12114 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-12117 - https://blog.scadafence.com/technical-blog-cve-2020-12117-industrial-iot-insecure-default-configurations +CVE-2020-12120 - https://ia-informatica.com/it/CVE-2020-12120 +CVE-2020-12122 - https://github.com/FULLSHADE/Kernel-exploits +CVE-2020-12122 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/MaxProc64.sys +CVE-2020-12125 - https://cerne.xyz/bugs/CVE-2020-12125 +CVE-2020-12128 - https://www.vulnerability-lab.com/get_content.php?id=2199 +CVE-2020-12129 - https://www.vulnerability-lab.com/get_content.php?id=2203 +CVE-2020-12130 - https://www.vulnerability-lab.com/get_content.php?id=2203 +CVE-2020-12131 - https://www.vulnerability-lab.com/get_content.php?id=2203 +CVE-2020-12132 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php +CVE-2020-12133 - http://packetstormsecurity.com/files/157383/Furukawa-Electric-ConsciusMAP-2.8.1-Java-Deserialization-Remote-Code-Execution.html +CVE-2020-12134 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5562.php +CVE-2020-12138 - https://eclypsium.com/2019/11/12/mother-of-all-drivers/ +CVE-2020-12138 - https://h0mbre.github.io/atillk64_exploit/ +CVE-2020-12243 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-12243 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-12244 - https://hackerone.com/reports/858854 +CVE-2020-12245 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2020-12245 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23 +CVE-2020-12245 - https://github.com/grafana/grafana/pull/23816 +CVE-2020-12246 - https://medium.com/@Pavel.Step/security-analysis-of-the-smart-box-router-932f86dc8a9e +CVE-2020-12246 - https://yadi.sk/i/YdfXr-ofAN2ZWA +CVE-2020-12246 - https://yadi.sk/i/iIUCJVaGEuSaAw +CVE-2020-12246 - https://yadi.sk/i/jXV87yn4ZJfSHA +CVE-2020-12251 - http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html +CVE-2020-12252 - http://packetstormsecurity.com/files/157484/Gigamon-GigaVUE-5.5.01.11-Directory-Traversal-File-Upload.html +CVE-2020-12261 - http://packetstormsecurity.com/files/157401/Open-AudIT-3.3.0-Cross-Site-Scripting.html +CVE-2020-12261 - https://www.exploit-db.com/exploits/48516 +CVE-2020-12262 - https://lucxs.medium.com/cve-2020-12262-xss-voip-intelbras-d5697e31fbf6 +CVE-2020-12262 - https://www.youtube.com/watch?v=rihboOgiJRs +CVE-2020-12265 - https://github.com/kevva/decompress/issues/71 +CVE-2020-12265 - https://github.com/kevva/decompress/pull/73 +CVE-2020-12351 - http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html +CVE-2020-12352 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html +CVE-2020-12352 - http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html +CVE-2020-12387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1545345 +CVE-2020-12388 - http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html +CVE-2020-12388 - https://bugzilla.mozilla.org/show_bug.cgi?id=1618911 +CVE-2020-12393 - https://bugzilla.mozilla.org/show_bug.cgi?id=1615471 +CVE-2020-12404 - https://bugzilla.mozilla.org/show_bug.cgi?id=1631739 +CVE-2020-12405 - https://bugzilla.mozilla.org/show_bug.cgi?id=1631618 +CVE-2020-12412 - https://bugzilla.mozilla.org/show_bug.cgi?id=1528587 +CVE-2020-12418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1641303 +CVE-2020-12422 - https://bugzilla.mozilla.org/show_bug.cgi?id=1450353 +CVE-2020-12425 - https://bugzilla.mozilla.org/show_bug.cgi?id=1634738 +CVE-2020-12427 - https://www.westerndigital.com/support/productsecurity/wdc-20004-wd-discovery-cross-site-request-forgery-csrf +CVE-2020-12429 - https://www.exploit-db.com/exploits/48385 +CVE-2020-12431 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-splashtop-streamer +CVE-2020-12432 - https://github.com/d7x/CVE-2020-12432 +CVE-2020-12432 - https://www.youtube.com/watch?v=_tkRnSr6yc0 +CVE-2020-12443 - https://github.com/mclab-hbrs/BBB-POC +CVE-2020-12446 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-003.md +CVE-2020-12460 - https://github.com/trusteddomainproject/OpenDMARC/issues/64 +CVE-2020-12461 - https://github.com/php-fusion/PHP-Fusion/commit/79fe5ec1d5c75e017a6f42127741b9543658f822 +CVE-2020-12464 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 +CVE-2020-12464 - https://usn.ubuntu.com/4388-1/ +CVE-2020-12474 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram:CVE-2020-12474 +CVE-2020-12480 - https://www.playframework.com/security/vulnerability +CVE-2020-12494 - https://cert.vde.com/en-us/advisories/vde-2020-019 +CVE-2020-12495 - https://cert.vde.com/en-us/advisories/vde-2020-021 +CVE-2020-12496 - https://cert.vde.com/en-us/advisories/vde-2020-022 +CVE-2020-12499 - https://cert.vde.com/en-us/advisories/vde-2020-025 +CVE-2020-12500 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html +CVE-2020-12500 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html +CVE-2020-12500 - http://seclists.org/fulldisclosure/2021/Jun/0 +CVE-2020-12500 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ +CVE-2020-12501 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html +CVE-2020-12501 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html +CVE-2020-12501 - http://packetstormsecurity.com/files/167409/Korenix-JetPort-5601V3-Backdoor-Account.html +CVE-2020-12501 - http://seclists.org/fulldisclosure/2021/Jun/0 +CVE-2020-12501 - http://seclists.org/fulldisclosure/2022/Jun/3 +CVE-2020-12501 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ +CVE-2020-12502 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html +CVE-2020-12502 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html +CVE-2020-12502 - http://seclists.org/fulldisclosure/2021/Jun/0 +CVE-2020-12502 - https://cert.vde.com/en-us/advisories/vde-2020-053 +CVE-2020-12502 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ +CVE-2020-12503 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html +CVE-2020-12503 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html +CVE-2020-12503 - http://seclists.org/fulldisclosure/2021/Jun/0 +CVE-2020-12503 - https://cert.vde.com/en-us/advisories/vde-2020-053 +CVE-2020-12503 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ +CVE-2020-12504 - http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html +CVE-2020-12504 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html +CVE-2020-12504 - http://seclists.org/fulldisclosure/2021/Jun/0 +CVE-2020-12504 - https://cert.vde.com/en-us/advisories/vde-2020-053 +CVE-2020-12504 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/ +CVE-2020-12505 - https://cert.vde.com/en-us/advisories/vde-2020-027 +CVE-2020-12506 - https://cert.vde.com/en-us/advisories/vde-2020-028 +CVE-2020-12510 - https://cert.vde.com/en-us/advisories/vde-2020-037 +CVE-2020-12511 - https://cert.vde.com/en-us/advisories/vde-2020-038 +CVE-2020-12512 - https://cert.vde.com/en-us/advisories/vde-2020-038 +CVE-2020-12513 - https://cert.vde.com/en-us/advisories/vde-2020-038 +CVE-2020-12514 - https://cert.vde.com/en-us/advisories/vde-2020-038 +CVE-2020-12516 - https://cert.vde.com/en-us/advisories/vde-2020-042 +CVE-2020-12517 - https://cert.vde.com/en-us/advisories/vde-2020-049 +CVE-2020-12518 - https://cert.vde.com/en-us/advisories/vde-2020-049 +CVE-2020-12519 - https://cert.vde.com/en-us/advisories/vde-2020-049 +CVE-2020-12521 - https://cert.vde.com/en-us/advisories/vde-2020-049 +CVE-2020-12522 - https://cert.vde.com/en-us/advisories/vde-2020-045 +CVE-2020-12523 - https://cert.vde.com/en-us/advisories/vde-2020-046 +CVE-2020-12524 - https://cert.vde.com/en-us/advisories/vde-2020-047 +CVE-2020-12525 - https://cert.vde.com/en-us/advisories/vde-2020-038 +CVE-2020-12526 - https://cert.vde.com/en-us/advisories/vde-2020-051 +CVE-2020-12606 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-12606 +CVE-2020-12607 - https://github.com/AntonKueltz/fastecdsa/issues/52 +CVE-2020-12608 - http://packetstormsecurity.com/files/157591/SolarWinds-MSP-PME-Cache-Service-Insecure-File-Permissions-Code-Execution.html +CVE-2020-12608 - http://seclists.org/fulldisclosure/2020/May/23 +CVE-2020-12608 - https://github.com/jensregel/Advisories/tree/master/CVE-2020-12608 +CVE-2020-12619 - https://updates.mailmate-app.com/2.0/release_notes +CVE-2020-12624 - https://push32.com/post/dating-app-fail/ +CVE-2020-12625 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube +CVE-2020-12626 - https://github.com/roundcube/roundcubemail/pull/7302 +CVE-2020-12629 - https://www.exploit-db.com/exploits/48413 +CVE-2020-12638 - https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors +CVE-2020-12640 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube +CVE-2020-12641 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube +CVE-2020-12643 - http://seclists.org/fulldisclosure/2020/Aug/14 +CVE-2020-12647 - https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55 +CVE-2020-12648 - https://labs.bishopfox.com/advisories/tinymce-version-5.2.1 +CVE-2020-12652 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14 +CVE-2020-12657 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 +CVE-2020-12659 - https://bugzilla.kernel.org/show_bug.cgi?id=207225 +CVE-2020-12659 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.7 +CVE-2020-12659 - https://usn.ubuntu.com/4388-1/ +CVE-2020-12673 - https://hackerone.com/reports/866597 +CVE-2020-12674 - https://hackerone.com/reports/866605 +CVE-2020-12676 - http://packetstormsecurity.com/files/159454/FusionAuth-SAMLv2-0.2.3-Message-Forging.html +CVE-2020-12676 - http://seclists.org/fulldisclosure/2020/Oct/1 +CVE-2020-12695 - http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html +CVE-2020-12695 - https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/ +CVE-2020-12695 - https://github.com/corelight/callstranger-detector +CVE-2020-12695 - https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of +CVE-2020-12702 - https://www.youtube.com/watch?v=DghYH7WY6iE&feature=youtu.be +CVE-2020-12706 - https://www.exploit-db.com/exploits/48404 +CVE-2020-12712 - http://packetstormsecurity.com/files/158112/SOS-JobScheduler-1.13.3-Stored-Password-Decryption.html +CVE-2020-12713 - http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html +CVE-2020-12713 - https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities +CVE-2020-12714 - https://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html +CVE-2020-12714 - https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities +CVE-2020-12717 - https://medium.com/@wabz/covidsafe-ios-vulnerability-cve-2020-12717-30dc003f9708 +CVE-2020-12720 - http://packetstormsecurity.com/files/157716/vBulletin-5.6.1-SQL-Injection.html +CVE-2020-12720 - http://packetstormsecurity.com/files/157904/vBulletin-5.6.1-SQL-Injection.html +CVE-2020-12720 - https://attackerkb.com/topics/RSDAFLik92/cve-2020-12720-vbulletin-incorrect-access-control +CVE-2020-12723 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-12723 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-12723 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-12723 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-12740 - https://github.com/appneta/tcpreplay/issues/576 +CVE-2020-12745 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12746 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12747 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12748 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12749 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12750 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12751 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12752 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-12753 - https://douevenknow.us/post/619763074822520832/an-el1el3-coldboot-vulnerability +CVE-2020-12753 - https://www.zdnet.com/article/new-cold-boot-attack-affects-seven-years-of-lg-android-smartphones/ +CVE-2020-12760 - https://issues.opennms.org/browse/NMS-12673 +CVE-2020-12762 - https://github.com/json-c/json-c/pull/592 +CVE-2020-12762 - https://github.com/rsyslog/libfastjson/issues/161 +CVE-2020-12763 - https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability +CVE-2020-12768 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 +CVE-2020-12768 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d80b64ff297e40c2b6f7d7abc1b3eba70d22a068 +CVE-2020-12768 - https://usn.ubuntu.com/4413-1/ +CVE-2020-12769 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17 +CVE-2020-12769 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19b61392c5a852b4e8a0bf35aecb969983c5932d +CVE-2020-12770 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee +CVE-2020-12770 - https://usn.ubuntu.com/4413-1/ +CVE-2020-12770 - https://usn.ubuntu.com/4414-1/ +CVE-2020-12770 - https://usn.ubuntu.com/4419-1/ +CVE-2020-12771 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-12783 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2020-12783 - https://bugs.exim.org/show_bug.cgi?id=2571 +CVE-2020-12790 - https://isec.pl/en/vulnerabilities/isec-0028-seomatic-ssti-23032020.txt +CVE-2020-12798 - http://packetstormsecurity.com/files/157715/Cellebrite-UFED-7.5.0.845-Desktop-Escape-Privilege-Escalation.html +CVE-2020-12798 - https://korelogic.com/Resources/Advisories/KL-001-2020-002.txt +CVE-2020-12798 - https://twitter.com/thatguylevel +CVE-2020-12800 - https://packetstormsecurity.com/files/157951/WordPress-Drag-And-Drop-Multi-File-Uploader-Remote-Code-Execution.html +CVE-2020-1281 - http://packetstormsecurity.com/files/158028/Microsoft-Windows-Privilege-Escalation-Code-Execution.html +CVE-2020-12811 - https://fortiguard.com/advisory/FG-IR-20-005 +CVE-2020-12814 - https://fortiguard.com/advisory/FG-IR-20-092 +CVE-2020-12815 - https://fortiguard.com/advisory/FG-IR-20-054 +CVE-2020-12816 - https://fortiguard.com/advisory/FG-IR-20-002 +CVE-2020-12817 - https://fortiguard.com/advisory/FG-IR-20-054 +CVE-2020-12825 - https://gitlab.gnome.org/GNOME/libcroco/-/issues/8 +CVE-2020-12826 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 +CVE-2020-12826 - https://lists.openwall.net/linux-kernel/2020/03/24/1803 +CVE-2020-12826 - https://www.openwall.com/lists/kernel-hardening/2020/03/25/1 +CVE-2020-12827 - http://packetstormsecurity.com/files/158111/MJML-4.6.2-Path-Traversal.html +CVE-2020-12830 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 +CVE-2020-12835 - http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html +CVE-2020-12835 - http://seclists.org/fulldisclosure/2020/May/38 +CVE-2020-12835 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt +CVE-2020-12835 - https://www.syss.de/pentest-blog/ +CVE-2020-12847 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12847 - https://www.coresecurity.com/advisories +CVE-2020-12847 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12848 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12848 - https://www.coresecurity.com/advisories +CVE-2020-12848 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12849 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12849 - https://www.coresecurity.com/advisories +CVE-2020-12849 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12850 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12850 - https://www.coresecurity.com/advisories +CVE-2020-12850 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12851 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12851 - https://www.coresecurity.com/advisories +CVE-2020-12851 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12852 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12852 - https://www.coresecurity.com/advisories +CVE-2020-12852 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12853 - http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html +CVE-2020-12853 - https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities +CVE-2020-12854 - http://packetstormsecurity.com/files/158434/SecZetta-NEProfile-3.3.11-Remote-Code-Execution.html +CVE-2020-12855 - http://packetstormsecurity.com/files/158965/SecZetta-NEProfile-3.3.11-Host-Header-Injection.html +CVE-2020-12856 - https://github.com/alwentiu/COVIDSafe-CVE-2020-12856/blob/master/README.md +CVE-2020-12861 - http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html +CVE-2020-12861 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12862 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12863 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12864 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12865 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12866 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12867 - https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read +CVE-2020-12867 - https://securitylab.github.com/advisories/GHSL-2020-075-libsane +CVE-2020-12872 - https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70 +CVE-2020-12872 - https://sweet32.info/ +CVE-2020-12880 - https://kb.pulsesecure.net/?atype=sa +CVE-2020-12880 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-12882 - http://packetstormsecurity.com/files/157756/Submitty-20.04.01-Cross-Site-Scripting.html +CVE-2020-12888 - https://usn.ubuntu.com/4526-1/ +CVE-2020-13094 - http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html +CVE-2020-13101 - https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=dss-x +CVE-2020-13109 - https://cturt.github.io/shogihax.html +CVE-2020-13109 - https://github.com/CTurt/shogihax +CVE-2020-13110 - https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd +CVE-2020-13110 - https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/ +CVE-2020-13117 - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html +CVE-2020-13118 - http://packetstormsecurity.com/files/157733/Mikrotik-Router-Monitoring-System-1.2.3-SQL-Injection.html +CVE-2020-13118 - https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4 +CVE-2020-13125 - https://wpvulndb.com/vulnerabilities/10214 +CVE-2020-13125 - https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/ +CVE-2020-13126 - https://wpvulndb.com/vulnerabilities/10214 +CVE-2020-13126 - https://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/ +CVE-2020-1313 - http://packetstormsecurity.com/files/159305/Microsoft-Windows-Update-Orchestrator-Unchecked-ScheduleWork-Call.html +CVE-2020-13131 - https://blog.inhq.net/posts/yubico-libykpiv-vuln/ +CVE-2020-13132 - https://blog.inhq.net/posts/yubico-libykpiv-vuln/ +CVE-2020-13143 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f +CVE-2020-13143 - https://usn.ubuntu.com/4413-1/ +CVE-2020-13143 - https://usn.ubuntu.com/4414-1/ +CVE-2020-13143 - https://usn.ubuntu.com/4419-1/ +CVE-2020-13144 - http://packetstormsecurity.com/files/157785/OpenEDX-Ironwood-2.5-Remote-Code-Execution.html +CVE-2020-13149 - https://github.com/rishaldwivedi/Public_Disclosure/blob/master/README.md#msi-dragon-center-eop +CVE-2020-13151 - http://packetstormsecurity.com/files/160106/Aerospike-Database-5.1.0.3-Remote-Command-Execution.html +CVE-2020-13151 - http://packetstormsecurity.com/files/160451/Aerospike-Database-UDF-Lua-Code-Execution.html +CVE-2020-13151 - https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html +CVE-2020-13152 - http://packetstormsecurity.com/files/159898/Amarok-2.8.0-Denial-Of-Service.html +CVE-2020-13155 - https://www.exploit-db.com/exploits/48489 +CVE-2020-13156 - https://www.exploit-db.com/exploits/48489 +CVE-2020-13157 - https://www.exploit-db.com/exploits/48489 +CVE-2020-13160 - http://packetstormsecurity.com/files/158291/AnyDesk-GUI-Format-String-Write.html +CVE-2020-13160 - http://packetstormsecurity.com/files/161628/AnyDesk-5.5.2-Remote-Code-Execution.html +CVE-2020-13160 - https://devel0pment.de/?p=1881 +CVE-2020-13162 - http://packetstormsecurity.com/files/158117/Pulse-Secure-Client-For-Windows-Local-Privilege-Escalation.html +CVE-2020-13162 - http://packetstormsecurity.com/files/159065/Pulse-Secure-Windows-Client-Privilege-Escalation.html +CVE-2020-13162 - https://kb.pulsesecure.net/?atype=sa +CVE-2020-13162 - https://www.redtimmy.com/privilege-escalation/pulse-secure-client-for-windows-9-1-6-toctou-privilege-escalation-cve-2020-13162/ +CVE-2020-13166 - http://packetstormsecurity.com/files/157808/Plesk-myLittleAdmin-ViewState-.NET-Deserialization.html +CVE-2020-13168 - https://github.com/lodestone-security/CVEs/tree/master/CVE-2020-13168 +CVE-2020-13224 - http://packetstormsecurity.com/files/158115/TP-LINK-Cloud-Cameras-NCXXX-Stack-Overflow.html +CVE-2020-13225 - https://github.com/phpipam/phpipam/issues/3025 +CVE-2020-13225 - https://www.youtube.com/watch?v=SpFmM03Jl40 +CVE-2020-13227 - https://github.com/wrongsid3 +CVE-2020-13227 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md +CVE-2020-13228 - http://packetstormsecurity.com/files/158062/Sysax-MultiServer-6.90-Cross-Site-Scripting.html +CVE-2020-13228 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md +CVE-2020-13229 - https://github.com/wrongsid3 +CVE-2020-13229 - https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md +CVE-2020-13245 - https://iot-lab-fh-ooe.github.io/netgear_update_vulnerability/ +CVE-2020-13247 - https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/ +CVE-2020-13248 - https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/ +CVE-2020-13252 - https://github.com/centreon/centreon/compare/19.04.13...19.04.15 +CVE-2020-13254 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-13258 - https://github.com/contentful/the-example-app.py/issues/44 +CVE-2020-13259 - https://cxsecurity.com/issue/WLB-2020090064 +CVE-2020-13259 - https://www.exploit-db.com/exploits/48809 +CVE-2020-13260 - https://cxsecurity.com/issue/WLB-2020090063 +CVE-2020-13260 - https://www.exploit-db.com/exploits/48807 +CVE-2020-13265 - https://gitlab.com/gitlab-org/gitlab/-/issues/121664 +CVE-2020-13267 - https://gitlab.com/gitlab-org/gitlab/-/issues/211956 +CVE-2020-13269 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13269.json +CVE-2020-13269 - https://gitlab.com/gitlab-org/gitlab/-/issues/216528 +CVE-2020-13277 - https://gitlab.com/gitlab-org/gitlab/-/issues/220972 +CVE-2020-13278 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/282 +CVE-2020-13290 - https://gitlab.com/gitlab-org/gitlab/-/issues/32291 +CVE-2020-13301 - https://gitlab.com/gitlab-org/gitlab/-/issues/219378 +CVE-2020-13311 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13311.json +CVE-2020-13315 - https://hackerone.com/reports/463010 +CVE-2020-13316 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13316.json +CVE-2020-13316 - https://gitlab.com/gitlab-org/gitlab/-/issues/220137 +CVE-2020-13324 - https://gitlab.com/gitlab-org/gitlab/-/issues/24542 +CVE-2020-13330 - https://gitlab.com/gitlab-org/gitlab/issues/30017 +CVE-2020-13331 - https://gitlab.com/gitlab-org/gitlab/-/issues/219010 +CVE-2020-13335 - https://gitlab.com/gitlab-org/gitlab/-/issues/27231 +CVE-2020-13337 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13337.json +CVE-2020-13340 - https://hackerone.com/reports/950190 +CVE-2020-13343 - https://hackerone.com/reports/689314 +CVE-2020-13346 - https://gitlab.com/gitlab-org/gitlab/-/issues/219496 +CVE-2020-13350 - https://hackerone.com/reports/415238 +CVE-2020-13351 - https://gitlab.com/gitlab-org/gitlab/-/issues/239369 +CVE-2020-13351 - https://hackerone.com/reports/962462 +CVE-2020-1337 - http://packetstormsecurity.com/files/160028/Microsoft-Windows-Local-Spooler-Bypass.html +CVE-2020-1337 - http://packetstormsecurity.com/files/160993/Microsoft-Spooler-Local-Privilege-Elevation.html +CVE-2020-13376 - https://sidechannel.tempestsi.com/path-traversal-vulnerability-in-securenvoy-impacts-on-remote-command-execution-through-file-upload-ec2e731bd50a +CVE-2020-13377 - https://inf0seq.github.io/cve/2020/04/21/Path-Traversal-in-Enterprise-loadbalancer-VA-MAX-v8.3.8-and-earlier.html +CVE-2020-13378 - https://inf0seq.github.io/cve/2020/04/21/OS.html +CVE-2020-13379 - http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html +CVE-2020-13379 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2020-13379 - https://community.grafana.com/t/release-notes-v7-0-x/29381 +CVE-2020-13379 - https://mostwanted002.cf/post/grafanados/ +CVE-2020-13380 - https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html +CVE-2020-13381 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html +CVE-2020-13381 - https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html +CVE-2020-13382 - http://packetstormsecurity.com/files/158255/openSIS-7.4-Incorrect-Access-Control.html +CVE-2020-13382 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html +CVE-2020-13383 - http://packetstormsecurity.com/files/158256/openSIS-7.4-Local-File-Inclusion.html +CVE-2020-13383 - http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html +CVE-2020-13384 - https://www.exploit-db.com/exploits/48479 +CVE-2020-13388 - https://joel-malwarebenchmark.github.io +CVE-2020-13388 - https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/ +CVE-2020-13389 - https://joel-malwarebenchmark.github.io +CVE-2020-13389 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13389-Tenda-vulnerability/ +CVE-2020-13390 - https://joel-malwarebenchmark.github.io +CVE-2020-13390 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13390-Tenda-vulnerability/ +CVE-2020-13391 - https://joel-malwarebenchmark.github.io +CVE-2020-13391 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13391-Tenda-vulnerability/ +CVE-2020-13392 - https://joel-malwarebenchmark.github.io +CVE-2020-13392 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13392-Tenda-vulnerability/ +CVE-2020-13393 - https://joel-malwarebenchmark.github.io +CVE-2020-13393 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13393-Tenda-vulnerability/ +CVE-2020-13394 - https://joel-malwarebenchmark.github.io +CVE-2020-13394 - https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13394-Tenda-vulnerability/ +CVE-2020-13396 - https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc +CVE-2020-13396 - https://usn.ubuntu.com/4379-1/ +CVE-2020-13397 - https://usn.ubuntu.com/4379-1/ +CVE-2020-13398 - https://usn.ubuntu.com/4379-1/ +CVE-2020-13404 - https://github.com/quadra-informatique/Atos-Magento/releases +CVE-2020-13404 - https://sysdream.com/news/lab/ +CVE-2020-13404 - https://sysdream.com/news/lab/2020-06-09-cve-2020-13404-remote-system-command-injection-in-atos-magento-module/ +CVE-2020-13412 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#cross-site-request-forgery-csrf +CVE-2020-13413 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#observable-response-discrepancy-from-api +CVE-2020-13414 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#clean-up-old-code +CVE-2020-13415 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml +CVE-2020-13416 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#csrf-on-password-reset +CVE-2020-13417 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-client-elevation-of-privilege +CVE-2020-13426 - https://0day.today/exploit/34496 +CVE-2020-13426 - https://cxsecurity.com/issue/WLB-2020050235 +CVE-2020-13426 - https://infayer.com/archivos/448 +CVE-2020-13426 - https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html +CVE-2020-13426 - https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user +CVE-2020-13426 - https://www.exploit-db.com/exploits/48532 +CVE-2020-13427 - https://www.exploit-db.com/exploits/48511 +CVE-2020-13431 - https://blog.blazeinfosec.com/security-advisory-i2p-for-windows-local-privilege-escalation/ +CVE-2020-13432 - http://hyp3rlinx.altervista.org/advisories/HFS-HTTP-FILE-SERVER-v2.3-REMOTE-BUFFER-OVERFLOW-DoS.txt +CVE-2020-13432 - http://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html +CVE-2020-13432 - http://seclists.org/fulldisclosure/2020/Jun/13 +CVE-2020-13432 - http://seclists.org/fulldisclosure/2021/Apr/12 +CVE-2020-13432 - https://packetstormsecurity.com/files/157980/HFS-Http-File-Server-2.3m-Build-300-Buffer-Overflow.html +CVE-2020-13433 - https://news.websec.nl/news-cve-report-0.html +CVE-2020-13434 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-13434 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13434 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-13434 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-13434 - https://www.sqlite.org/src/info/23439ea582241138 +CVE-2020-13435 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-13435 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13435 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-13435 - https://www.sqlite.org/src/info/7a5279a25c57adf1 +CVE-2020-13438 - https://github.com/rockcarry/ffjpeg/issues/23 +CVE-2020-13443 - https://gist.github.com/mariuszpoplwski/51604d8a6d7d78fffdf590c25e844e09 +CVE-2020-13444 - https://issues.liferay.com/browse/LPE-17009 +CVE-2020-13445 - https://issues.liferay.com/browse/LPE-17023 +CVE-2020-13448 - http://packetstormsecurity.com/files/157898/QuickBox-Pro-2.1.8-Remote-Code-Execution.html +CVE-2020-13449 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html +CVE-2020-13450 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html +CVE-2020-13451 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html +CVE-2020-13452 - http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html +CVE-2020-13463 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13464 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13465 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13466 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13467 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13468 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13469 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13470 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13471 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13472 - https://www.usenix.org/system/files/woot20-paper-obermaier.pdf +CVE-2020-13473 - https://cvewalkthrough.com/cve-2020-13473-nch-account-clear-text-password-storage/ +CVE-2020-13473 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13473-nch-account-clear-text.html +CVE-2020-13474 - https://cvewalkthrough.com/cve-2020-13474-nch-express-accounts-privilege-escalation/ +CVE-2020-13474 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13474-nch-express-accounts.html +CVE-2020-13476 - https://tejaspingulkar.blogspot.com/2020/12/cve-2020-13475-nch-accounts-cross-site.html +CVE-2020-13480 - http://cvewalkthrough.com/cve-2020-13480html-injection +CVE-2020-13480 - https://tejaspingulkar.blogspot.com/2020/06/cve-2020-13480-verint-html-injection.html +CVE-2020-13487 - https://www.youtube.com/watch?v=3rXP8CGTe08 +CVE-2020-1349 - http://packetstormsecurity.com/files/169959/Microsoft-Outlook-2019-16.0.12624.20424-Remote-Code-Execution.html +CVE-2020-13493 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 +CVE-2020-13494 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1103 +CVE-2020-13495 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1104 +CVE-2020-13496 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 +CVE-2020-13497 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 +CVE-2020-13498 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 +CVE-2020-13499 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 +CVE-2020-1350 - http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html +CVE-2020-13500 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 +CVE-2020-13501 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 +CVE-2020-13504 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1108 +CVE-2020-13505 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1108 +CVE-2020-13509 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 +CVE-2020-13510 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 +CVE-2020-13511 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110 +CVE-2020-13512 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111 +CVE-2020-13513 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111 +CVE-2020-13514 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111 +CVE-2020-13515 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1112 +CVE-2020-13516 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1113 +CVE-2020-13517 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1114 +CVE-2020-13518 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1115 +CVE-2020-13519 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1116 +CVE-2020-13520 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1120 +CVE-2020-13522 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1121 +CVE-2020-13523 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1122 +CVE-2020-13524 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1125 +CVE-2020-13525 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126 +CVE-2020-13526 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126 +CVE-2020-13527 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1135 +CVE-2020-13528 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1136 +CVE-2020-13529 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 +CVE-2020-13530 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1143 +CVE-2020-13531 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1145 +CVE-2020-13532 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 +CVE-2020-13533 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 +CVE-2020-13534 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 +CVE-2020-13535 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1147 +CVE-2020-13536 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 +CVE-2020-13537 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 +CVE-2020-13539 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150 +CVE-2020-13540 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150 +CVE-2020-13541 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1151 +CVE-2020-13542 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154 +CVE-2020-13543 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155 +CVE-2020-13543 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-13544 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1161 +CVE-2020-13545 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1162 +CVE-2020-13546 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1163 +CVE-2020-13547 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1165 +CVE-2020-13548 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1166 +CVE-2020-13549 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1167 +CVE-2020-13550 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1168 +CVE-2020-13551 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 +CVE-2020-13552 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 +CVE-2020-13553 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 +CVE-2020-13554 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 +CVE-2020-13555 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 +CVE-2020-13556 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1170 +CVE-2020-13557 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1171 +CVE-2020-13558 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172 +CVE-2020-13559 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1174 +CVE-2020-13560 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1175 +CVE-2020-13561 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1176 +CVE-2020-13562 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 +CVE-2020-13563 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 +CVE-2020-13564 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 +CVE-2020-13565 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1178 +CVE-2020-13566 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 +CVE-2020-13567 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 +CVE-2020-13568 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179 +CVE-2020-13569 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1180 +CVE-2020-13570 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1181 +CVE-2020-13571 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1182 +CVE-2020-13572 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1183 +CVE-2020-13573 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1184 +CVE-2020-13574 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1185 +CVE-2020-13575 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186 +CVE-2020-13576 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187 +CVE-2020-13577 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1188 +CVE-2020-13578 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189 +CVE-2020-13579 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1190 +CVE-2020-13580 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 +CVE-2020-13581 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1192 +CVE-2020-13582 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1193 +CVE-2020-13583 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1194 +CVE-2020-13584 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1195 +CVE-2020-13585 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1196 +CVE-2020-13586 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1197 +CVE-2020-13587 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1198 +CVE-2020-13588 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 +CVE-2020-13589 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 +CVE-2020-13590 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 +CVE-2020-13591 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1200 +CVE-2020-13592 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1201 +CVE-2020-13596 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-13619 - https://reallinkers.github.io/CVE-2020-13619/ +CVE-2020-13620 - https://lucadidomenico.medium.com/fastgate-gpon-cross-site-request-forgery-cve-2020-13620-e279f3fbaee4 +CVE-2020-13620 - https://members.backbox.org/fastgate-gpon-cross-site-request-forgery/ +CVE-2020-13623 - https://github.com/jerryscript-project/jerryscript/issues/3785 +CVE-2020-13626 - https://medium.com/@bugsbunnyy1107/the-tell-tale-of-cve-in-oneplus-phones-91e97342a8b5 +CVE-2020-13627 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ +CVE-2020-13628 - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ +CVE-2020-13630 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-13630 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-13630 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-13631 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-13631 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-13631 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-13632 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-13632 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-13640 - http://www.openwall.com/lists/oss-security/2020/07/06/1 +CVE-2020-13642 - https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ +CVE-2020-13643 - https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ +CVE-2020-13650 - https://know.bishopfox.com/advisories/digdash-version-2018 +CVE-2020-13651 - https://know.bishopfox.com/advisories/digdash-version-2018 +CVE-2020-13652 - https://know.bishopfox.com/advisories/digdash-version-2018 +CVE-2020-13656 - https://know.bishopfox.com/advisories/oob-to-rce-exploitation-of-the-hobbes-functional-interpreter +CVE-2020-13658 - https://research.nccgroup.com/2020/09/25/technical-advisory-lansweeper-privilege-escalation-via-csrf-using-http-method-interchange/ +CVE-2020-13660 - http://dev.cmsmadesimple.org/bug/view/12312 +CVE-2020-13660 - https://www.youtube.com/watch?v=Q6RMhmpScho +CVE-2020-13661 - https://www.nagenrauft-consulting.com/blog/ +CVE-2020-13693 - http://packetstormsecurity.com/files/157885/WordPress-BBPress-2.5-Privilege-Escalation.html +CVE-2020-13756 - http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html +CVE-2020-13756 - http://seclists.org/fulldisclosure/2020/Jun/7 +CVE-2020-13757 - https://github.com/sybrenstuvel/python-rsa/issues/146 +CVE-2020-13757 - https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 +CVE-2020-13758 - https://blog.deteact.com/bitrix-waf-bypass/ +CVE-2020-1377 - http://packetstormsecurity.com/files/158938/Microsoft-Windows-CmpDoReDoCreateKey-Arbitrary-Registry-Key-Creation-Privilege-Escalation.html +CVE-2020-1378 - http://packetstormsecurity.com/files/158939/Microsoft-Windows-CmpDoReadTxRBigLogRecord-Memory-Corruption-Privilege-Escalation.html +CVE-2020-13788 - https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 +CVE-2020-13788 - https://www.youtube.com/watch?v=v8Isqy4yR3Q +CVE-2020-13795 - http://packetstormsecurity.com/files/157940/Navigate-CMS-2.8.7-Directory-Traversal.html +CVE-2020-13799 - https://www.westerndigital.com/support/productsecurity/wdc-20008-replay-attack-vulnerabilities-rpmb-protocol-applications +CVE-2020-1380 - http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html +CVE-2020-13802 - http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html +CVE-2020-13802 - https://github.com/vulnbe/poc-rebar3.git +CVE-2020-13802 - https://vuln.be/post/rebar3-command-injection/ +CVE-2020-13817 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-13820 - https://medium.com/@0x00crash/xss-reflected-in-extreme-management-center-8-4-1-24-cve-2020-13820-c6febe951219 +CVE-2020-13822 - https://github.com/indutny/elliptic/issues/226 +CVE-2020-13822 - https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4 +CVE-2020-13825 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-005 +CVE-2020-13826 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-006 +CVE-2020-13827 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-004 +CVE-2020-13828 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-002 +CVE-2020-13829 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13830 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13831 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13832 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13833 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13834 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13835 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13836 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13837 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13838 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-13850 - https://www.coresecurity.com/advisories +CVE-2020-13850 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities +CVE-2020-13851 - http://packetstormsecurity.com/files/158390/Pandora-FMS-7.0-NG-7XX-Remote-Command-Execution.html +CVE-2020-13851 - https://www.coresecurity.com/advisories +CVE-2020-13851 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities +CVE-2020-13852 - https://www.coresecurity.com/advisories +CVE-2020-13852 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities +CVE-2020-13853 - https://www.coresecurity.com/advisories +CVE-2020-13853 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities +CVE-2020-13854 - https://www.coresecurity.com/advisories +CVE-2020-13854 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities +CVE-2020-13855 - https://www.coresecurity.com/advisories +CVE-2020-13855 - https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities +CVE-2020-13864 - https://www.softwaresecured.com/elementor-page-builder-stored-xss/ +CVE-2020-13865 - https://www.softwaresecured.com/elementor-page-builder-stored-xss/ +CVE-2020-13866 - http://hyp3rlinx.altervista.org/advisories/WINGATE-INSECURE-PERMISSIONS-LOCAL-PRIVILEGE-ESCALATION.txt +CVE-2020-13866 - http://packetstormsecurity.com/files/157958/WinGate-9.4.1.5998-Insecure-Permissions-Privilege-Escalation.html +CVE-2020-13866 - http://seclists.org/fulldisclosure/2020/Jun/11 +CVE-2020-13871 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13871 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-13871 - https://www.sqlite.org/src/info/c8d3b9f0a750a529 +CVE-2020-13871 - https://www.sqlite.org/src/info/cd708fa84d2aaaea +CVE-2020-13872 - http://packetstormsecurity.com/files/158000/RoyalTS-SSH-Tunnel-Authentication-Bypass.html +CVE-2020-13872 - http://seclists.org/fulldisclosure/2020/Jun/14 +CVE-2020-13877 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/807698439/v1.8+HF+1+2+3+OnPrem+v5.3 +CVE-2020-13886 - https://github.com/lucxssouza/CVE-2020-13886 +CVE-2020-13890 - https://jizen0x01.blogspot.com/2020/06/neon-dashboard-xss.html +CVE-2020-13891 - https://mattermost.com/security-updates/ +CVE-2020-13892 - https://wpvulndb.com/vulnerabilities/10257 +CVE-2020-13895 - https://github.com/FGasper/p5-Crypt-Perl/issues/14 +CVE-2020-13898 - https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898 +CVE-2020-13899 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13899 +CVE-2020-13900 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900 +CVE-2020-13901 - https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13901 +CVE-2020-13904 - https://trac.ffmpeg.org/ticket/8673 +CVE-2020-13911 - https://gist.github.com/kdrypr/5dac91c2d27c4dc82b1225dffa38f7a8 +CVE-2020-13920 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-13927 - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html +CVE-2020-13927 - http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html +CVE-2020-13934 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-13934 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13934 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-13934 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-13934 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-13935 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-13935 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-13935 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-13935 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-13935 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-13936 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-13936 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-13943 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13945 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html +CVE-2020-13947 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13947 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-13949 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-13949 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-13950 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-13951 - http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html +CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-13954 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-13954 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-13956 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-13956 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-13956 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-13961 - https://github.com/strapi/strapi/pull/6599 +CVE-2020-13961 - https://github.com/strapi/strapi/releases/tag/v3.0.2 +CVE-2020-13965 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube +CVE-2020-13974 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae +CVE-2020-13974 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-13976 - https://svn.dd-wrt.com/ticket/7039 +CVE-2020-13977 - https://anhtai.me/nagios-core-4-4-5-url-injection/ +CVE-2020-13992 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise +CVE-2020-13993 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ +CVE-2020-13994 - https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ +CVE-2020-13995 - https://www.riverloopsecurity.com/blog/2020/09/nitf-extract75-cve-2020-13995/ +CVE-2020-14000 - https://github.com/LLK/scratch-vm/pull/2476 +CVE-2020-14000 - https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443 +CVE-2020-14004 - http://www.openwall.com/lists/oss-security/2020/06/12/1 +CVE-2020-14006 - https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 +CVE-2020-14007 - https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 +CVE-2020-14008 - http://packetstormsecurity.com/files/159066/ManageEngine-Applications-Manager-Authenticated-Remote-Code-Execution.html +CVE-2020-14008 - https://www.manageengine.com +CVE-2020-14011 - http://packetstormsecurity.com/files/158205/Lansweeper-7.2-Default-Account-Remote-Code-Execution.html +CVE-2020-14014 - https://cxsecurity.com/issue/WLB-2018090182 +CVE-2020-14021 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14021-Arbitrary%20File%20Read-Ozeki%20SMS%20Gateway +CVE-2020-14022 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14022-Dangerous%20File%20Upload-Ozeki%20SMS%20Gateway +CVE-2020-14023 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14023-Server%20Side%20Request%20Forgery-Ozeki%20SMS%20Gateway +CVE-2020-14024 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14024-Multiple%20XSS-Ozeki%20SMS%20Gateway +CVE-2020-14025 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14025-Cross-Site%20Request%20Forgery-Ozeki%20SMS%20Gateway +CVE-2020-14026 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14026-Formula%20Injection-Ozeki%20SMS%20Gateway +CVE-2020-14027 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14027-MySQL%20LOAD%20DATA%20LOCAL%20INFILE%20Attack-Ozeki%20SMS%20Gateway +CVE-2020-14028 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14028-Arbitary%20File%20Write-Ozeki%20SMS%20Gateway +CVE-2020-14029 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway +CVE-2020-14030 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14030-RCE%20via%20.NET%20Deserialization-Ozeki%20SMS%20Gateway +CVE-2020-14031 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14031-Arbitary%20File%20Delete-Ozeki%20SMS%20Gateway +CVE-2020-14032 - https://dannyodler.medium.com/attacking-the-golden-ring-on-amd-mini-pc-b7bfb217b437 +CVE-2020-14033 - https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117 +CVE-2020-14033 - https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166 +CVE-2020-14039 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-14042 - https://github.com/Codiad/Codiad/issues/1122 +CVE-2020-14043 - https://github.com/Codiad/Codiad/issues/1122 +CVE-2020-14044 - https://github.com/Codiad/Codiad/issues/1122 +CVE-2020-14055 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191211-01_Monsta_FTP_Stored_XSS +CVE-2020-14056 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery +CVE-2020-14057 - https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-01_Monsta_FTP_Arbitrary_File_Read_and_Write +CVE-2020-14060 - https://github.com/FasterXML/jackson-databind/issues/2688 +CVE-2020-14060 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-14060 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-14060 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14060 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-14061 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-14061 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-14061 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14061 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-14062 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-14062 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-14062 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14062 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-14068 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 +CVE-2020-14069 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 +CVE-2020-14070 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 +CVE-2020-14071 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 +CVE-2020-14072 - https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 +CVE-2020-14073 - http://packetstormsecurity.com/files/160312/PRTG-Network-Monitor-20.4.63.1412-Cross-Site-Scripting.html +CVE-2020-14092 - https://wpvulndb.com/vulnerabilities/10287 +CVE-2020-14144 - http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html +CVE-2020-14144 - https://docs.gitlab.com/ee/administration/server_hooks.html +CVE-2020-14146 - https://github.com/jenaye/KumbiaPHP- +CVE-2020-14147 - https://github.com/antirez/redis/pull/6875 +CVE-2020-14147 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14152 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz +CVE-2020-14153 - http://www.ijg.org/files/jpegsrc.v9d.tar.gz +CVE-2020-14153 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445 +CVE-2020-14155 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-14157 - http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html +CVE-2020-14157 - http://seclists.org/fulldisclosure/2020/Jun/26 +CVE-2020-14157 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt +CVE-2020-14157 - https://www.youtube.com/watch?v=kCqAVYyahLc +CVE-2020-14158 - http://packetstormsecurity.com/files/158692/ABUS-Secvest-Hybrid-Module-FUMO50110-Authentication-Bypass.html +CVE-2020-14158 - http://seclists.org/fulldisclosure/2020/Jul/36 +CVE-2020-14158 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-015.txt +CVE-2020-14163 - https://github.com/jerryscript-project/jerryscript/issues/3804 +CVE-2020-14166 - http://packetstormsecurity.com/files/162107/Atlassian-Jira-Service-Desk-4.9.1-Cross-Site-Scripting.html +CVE-2020-14181 - http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html +CVE-2020-14195 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-14195 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14195 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-14198 - https://github.com/bitcoin/bitcoin/commits/master +CVE-2020-14201 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-011 +CVE-2020-14208 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-008 +CVE-2020-14209 - http://packetstormsecurity.com/files/161955/Dolibarr-ERP-CRM-11.0.4-Bypass-Code-Execution.html +CVE-2020-14209 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-012 +CVE-2020-14293 - http://seclists.org/fulldisclosure/2020/Sep/51 +CVE-2020-14293 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-025.txt +CVE-2020-14293 - https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata +CVE-2020-14294 - http://seclists.org/fulldisclosure/2020/Sep/50 +CVE-2020-14294 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-024.txt +CVE-2020-14294 - https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata +CVE-2020-14295 - http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html +CVE-2020-14295 - http://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html +CVE-2020-14303 - https://usn.ubuntu.com/4454-2/ +CVE-2020-14314 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1 +CVE-2020-14315 - https://www.openwall.com/lists/oss-security/2020/07/09/2 +CVE-2020-14315 - https://www.x41-dsec.de/lab/advisories/x41-2020-006-bspatch/ +CVE-2020-14331 - https://www.openwall.com/lists/oss-security/2020/07/28/2 +CVE-2020-14335 - https://access.redhat.com/errata/RHSA-2021:1313 +CVE-2020-14340 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-14340 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-14343 - https://github.com/yaml/pyyaml/issues/420 +CVE-2020-14343 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-14343 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-14354 - https://packetstormsecurity.com/files/158755/GS20200804145053.txt +CVE-2020-14356 - https://usn.ubuntu.com/4526-1/ +CVE-2020-14363 - https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt +CVE-2020-14372 - https://bugzilla.redhat.com/show_bug.cgi?id=1873150 +CVE-2020-14373 - https://bugs.ghostscript.com/show_bug.cgi?id=702851 +CVE-2020-14375 - https://bugzilla.redhat.com/show_bug.cgi?id=1879468 +CVE-2020-14381 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254 +CVE-2020-14385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 +CVE-2020-14386 - http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html +CVE-2020-14386 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386 +CVE-2020-14386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06 +CVE-2020-14387 - https://bugzilla.redhat.com/show_bug.cgi?id=1875549 +CVE-2020-14392 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 +CVE-2020-14393 - https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 +CVE-2020-14408 - https://github.com/agentejo/cockpit/issues/1310 +CVE-2020-14409 - https://bugzilla.libsdl.org/show_bug.cgi?id=5200 +CVE-2020-14410 - https://bugzilla.libsdl.org/show_bug.cgi?id=5200 +CVE-2020-14416 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16 +CVE-2020-14416 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd +CVE-2020-14418 - https://labs.nettitude.com/blog/cve-2020-14418-madcodehook-library-local-privilege-escalation/ +CVE-2020-14421 - http://packetstormsecurity.com/files/159575/aaPanel-6.6.6-Privilege-Escalation.html +CVE-2020-14421 - https://forum.aapanel.com +CVE-2020-14421 - https://github.com/jenaye/aapanel +CVE-2020-14422 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14425 - http://packetstormsecurity.com/files/159784/Foxit-Reader-9.7.1-Remote-Command-Execution.html +CVE-2020-14425 - https://www.exploit-db.com/exploits/48982 +CVE-2020-14428 - https://kb.netgear.com/000061936/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0044 +CVE-2020-14429 - https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050 +CVE-2020-14431 - https://kb.netgear.com/000061944/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0068 +CVE-2020-14439 - https://kb.netgear.com/000061942/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0064 +CVE-2020-14444 - https://cybersecurityworks.com/zerodays/cve-2020-14444-wso2.html +CVE-2020-14445 - https://cybersecurityworks.com/zerodays/cve-2020-14445-wso2.html +CVE-2020-14446 - https://cybersecurityworks.com/zerodays/cve-2020-14446-wso2.html +CVE-2020-14447 - https://mattermost.com/security-updates/ +CVE-2020-14448 - https://mattermost.com/security-updates/ +CVE-2020-14449 - https://mattermost.com/security-updates/ +CVE-2020-14450 - https://mattermost.com/security-updates/ +CVE-2020-14451 - https://mattermost.com/security-updates/ +CVE-2020-14452 - https://mattermost.com/security-updates/ +CVE-2020-14453 - https://mattermost.com/security-updates/ +CVE-2020-14454 - https://mattermost.com/security-updates/ +CVE-2020-14455 - https://mattermost.com/security-updates/ +CVE-2020-14456 - https://mattermost.com/security-updates/ +CVE-2020-14457 - https://mattermost.com/security-updates/ +CVE-2020-14458 - https://mattermost.com/security-updates/ +CVE-2020-14459 - https://mattermost.com/security-updates/ +CVE-2020-14460 - https://mattermost.com/security-updates/ +CVE-2020-14461 - http://packetstormsecurity.com/files/158428/Zyxel-Armor-X1-WAP6806-Directory-Traversal.html +CVE-2020-14473 - https://github.com/Cossack9989/Vulns/blob/master/IoT/CVE-2020-14473.md +CVE-2020-14474 - http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html +CVE-2020-14474 - http://seclists.org/fulldisclosure/2020/Jun/31 +CVE-2020-14474 - https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt +CVE-2020-14527 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14528 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14529 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14530 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14531 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14532 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14533 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14534 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14535 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14536 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14537 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14539 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14540 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14541 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14542 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14543 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14544 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14545 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14546 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14547 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14548 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14549 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14550 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14551 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14552 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14553 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14554 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14555 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14556 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14557 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14558 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14559 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14560 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14561 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14562 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14563 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14564 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14565 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14566 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14567 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14568 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14569 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14570 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14571 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14572 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14573 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-14573 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14574 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14575 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14576 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14577 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14578 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-14578 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14579 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-14579 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14580 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14581 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-14581 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14582 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14583 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14584 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14585 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14586 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14587 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14588 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14589 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14590 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14591 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14592 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14593 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14594 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14595 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14596 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14597 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14598 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14599 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14600 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14601 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14602 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14603 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14604 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14605 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14606 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14607 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14608 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14609 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14610 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14611 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14612 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14613 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14614 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14615 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14616 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14617 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14618 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14619 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14620 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14621 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-14621 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14622 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14623 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14624 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14625 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14626 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14627 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14628 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14629 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14630 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14631 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14632 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14633 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14634 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14635 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14636 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14637 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14638 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14639 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1464 - https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ +CVE-2020-1464 - https://medium.com/@TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd +CVE-2020-14640 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14641 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14642 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14643 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14644 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14645 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14646 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14647 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14648 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14649 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14650 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14651 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14652 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14653 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14654 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14655 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14656 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14657 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14658 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14659 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14660 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14661 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14662 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14663 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14664 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14665 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14666 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14667 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14668 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14669 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14670 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14671 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14672 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14673 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14674 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14675 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14676 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14677 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14678 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14679 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14680 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14681 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14682 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14684 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14685 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14686 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14687 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14688 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14690 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14691 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14692 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14693 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14694 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14695 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14696 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14697 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14698 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14699 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14700 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14701 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14702 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14703 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14704 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14705 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14706 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14707 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14708 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14709 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14710 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14711 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14712 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14713 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14714 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14715 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14716 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14717 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14718 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14719 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1472 - http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html +CVE-2020-1472 - http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html +CVE-2020-1472 - https://usn.ubuntu.com/4559-1/ +CVE-2020-1472 - https://www.kb.cert.org/vuls/id/490028 +CVE-2020-1472 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-14720 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14721 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14722 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14723 - https://cybersecurityworks.com/zerodays/cve-2020-14723-oracle.html +CVE-2020-14723 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14724 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14725 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-14731 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14732 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14734 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14735 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14736 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14740 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14741 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14742 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14743 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14744 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14745 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14746 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14750 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html +CVE-2020-14752 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14753 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14754 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14756 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14756 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-14757 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14758 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14759 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14760 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14761 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14762 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14763 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14764 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14765 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14766 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14767 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14768 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14769 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14770 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14771 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14772 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14773 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14774 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14775 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14776 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14777 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14778 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14779 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14780 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14781 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14782 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14783 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14784 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14785 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14786 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14787 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14788 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14789 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14790 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14791 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14792 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14793 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14794 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14795 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14796 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14797 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14798 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14799 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14800 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14801 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14802 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14803 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-14803 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14804 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14805 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14806 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14807 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14808 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14809 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14810 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14811 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14812 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14813 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14814 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14815 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14816 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14817 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14818 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14819 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14820 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14821 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14822 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14823 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14824 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14825 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14826 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14827 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14828 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14829 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14830 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14831 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14832 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14833 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14834 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14835 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14836 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14837 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14838 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14839 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14840 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14841 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14842 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14843 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14844 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14845 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14846 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14847 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14848 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14849 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14850 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14851 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14852 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14853 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14854 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14855 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14856 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14857 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14858 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14859 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14860 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14861 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14862 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14863 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14864 - http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html +CVE-2020-14864 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14865 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14866 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14867 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14868 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14869 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14870 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14871 - http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html +CVE-2020-14871 - http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html +CVE-2020-14871 - http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html +CVE-2020-14871 - http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html +CVE-2020-14871 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14872 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14873 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14875 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14876 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14877 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14878 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14879 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14880 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14881 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14882 - http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html +CVE-2020-14882 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html +CVE-2020-14882 - http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html +CVE-2020-14882 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14883 - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html +CVE-2020-14883 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14884 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14885 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14886 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14887 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14888 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14889 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14890 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14891 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14892 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14893 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14894 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14895 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14896 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14897 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14898 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14899 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14900 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14901 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-14928 - https://bugzilla.suse.com/show_bug.cgi?id=1173910 +CVE-2020-1493 - http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html +CVE-2020-14930 - https://www.exploit-db.com/exploits/48196 +CVE-2020-14930 - https://www.pentest.com.tr/exploits/CTROMS-Terminal-OS-Port-Portal-Password-Reset-Authentication-Bypass.html +CVE-2020-14931 - https://github.com/jaygreig86/dmitry/issues/4 +CVE-2020-14938 - https://bugs.freedroid.org/b/issue951 +CVE-2020-14939 - https://bugs.freedroid.org/b/issue953 +CVE-2020-14940 - https://sourceforge.net/p/tuxguitar/bugs/126/ +CVE-2020-14943 - http://packetstormsecurity.com/files/158217/BSA-Radar-1.6.7234.24750-Cross-Site-Scripting.html +CVE-2020-14943 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14943%20-%20Stored%20XSS.md +CVE-2020-14943 - https://www.exploit-db.com/exploits/48619 +CVE-2020-14944 - http://packetstormsecurity.com/files/158372/BSA-Radar-1.6.7234.24750-Cross-Site-Request-Forgery.html +CVE-2020-14944 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14944%20-%20Access%20Control%20Vulnerabilities.md +CVE-2020-14945 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14945%20-%20Privilege%20Escalation.md +CVE-2020-14945 - https://www.exploit-db.com/exploits/48649 +CVE-2020-14946 - http://packetstormsecurity.com/files/158420/BSA-Radar-1.6.7234.24750-Local-File-Inclusion.html +CVE-2020-14946 - https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14946%20-%20Local%20File%20Inclusion.md +CVE-2020-14947 - http://packetstormsecurity.com/files/158293/OCS-Inventory-NG-2.7-Remote-Code-Execution.html +CVE-2020-14950 - https://github.com/jenaye/aapanel +CVE-2020-14959 - https://wpvulndb.com/vulnerabilities/10223 +CVE-2020-14960 - https://www.exploit-db.com/exploits/48487 +CVE-2020-14962 - https://wpvulndb.com/vulnerabilities/10241 +CVE-2020-14966 - https://github.com/kjur/jsrsasign/issues/437 +CVE-2020-14967 - https://github.com/kjur/jsrsasign/issues/439 +CVE-2020-14968 - https://github.com/kjur/jsrsasign/issues/438 +CVE-2020-14972 - https://www.exploit-db.com/exploits/48439 +CVE-2020-14973 - https://packetstormsecurity.com/files/157608/WebTareas-2.0p8-Cross-Site-Scripting.html +CVE-2020-14979 - https://posts.specterops.io/cve-2020-14979-local-privilege-escalation-in-evga-precisionx1-cf63c6b95896 +CVE-2020-14980 - http://packetstormsecurity.com/files/158322/Sophos-Secure-Email-Android-Application-3.9.4-Man-In-The-Middle.html +CVE-2020-14981 - http://packetstormsecurity.com/files/158323/VIPRE-Password-Vault-1.100.1090-Man-In-The-Middle.html +CVE-2020-14982 - https://www.mindpointgroup.com/blog/webta-sqli-vulnerability/ +CVE-2020-14983 - https://github.com/chocolate-doom/chocolate-doom/issues/1293 +CVE-2020-14990 - https://daniels-it-blog.blogspot.com/2020/06/arbitrary-file-deletion-in-iobit.html +CVE-2020-14990 - https://github.com/Daniel-itsec/AdvancedSystemCare +CVE-2020-14993 - https://github.com/dexterone/Vigor-poc +CVE-2020-15002 - https://seclists.org/fulldisclosure/2020/Oct/20 +CVE-2020-15003 - https://seclists.org/fulldisclosure/2020/Oct/20 +CVE-2020-15004 - https://seclists.org/fulldisclosure/2020/Oct/20 +CVE-2020-15012 - https://support.sonatype.com/hc/en-us/articles/360051068253 +CVE-2020-15014 - https://github.com/pramodmahato/BlogCMS/issues/1 +CVE-2020-15020 - http://hidden-one.co.in/2020/07/07/cve-2020-1020-stored-xss-on-elementor-wordpress-plugin/ +CVE-2020-15023 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d +CVE-2020-15023 - https://www.askey.com.tw/Products/wifi.html +CVE-2020-15023 - https://www.askey.com.tw/incident_report_notifications.html +CVE-2020-15025 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-15027 - https://slagle.tech/2020/07/06/cve-2020-15027/ +CVE-2020-15038 - http://packetstormsecurity.com/files/158649/WordPress-Maintenance-Mode-By-SeedProd-5.1.1-Cross-Site-Scripting.html +CVE-2020-15038 - https://wpvulndb.com/vulnerabilities/10283 +CVE-2020-15046 - http://packetstormsecurity.com/files/158373/SuperMicro-IPMI-03.40-Cross-Site-Request-Forgery.html +CVE-2020-15050 - http://packetstormsecurity.com/files/158576/Bio-Star-2.8.2-Local-File-Inclusion.html +CVE-2020-15069 - https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal +CVE-2020-15078 - https://community.openvpn.net/openvpn/wiki/CVE-2020-15078 +CVE-2020-15103 - https://usn.ubuntu.com/4481-1/ +CVE-2020-15117 - https://github.com/symless/synergy-core/security/advisories/GHSA-chfm-333q-gfpp +CVE-2020-15123 - https://github.com/advisories/GHSA-5q88-cjfq-g2mh +CVE-2020-15135 - https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f +CVE-2020-15135 - https://www.npmjs.com/package/save-server +CVE-2020-15149 - http://packetstormsecurity.com/files/159560/NodeBB-Forum-1.14.2-Account-Takeover.html +CVE-2020-15149 - https://zeroauth.ltd/blog/2020/08/20/proof-of-concept-exploit-for-cve-2020-15149-nodebb-arbitrary-user-password-change/ +CVE-2020-15152 - https://www.npmjs.com/package/ftp-srv +CVE-2020-15160 - http://packetstormsecurity.com/files/162140/PrestaShop-1.7.6.7-SQL-Injection.html +CVE-2020-15180 - https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/ +CVE-2020-15182 - https://youtu.be/ffvKH3gwyRE +CVE-2020-15188 - https://www.youtube.com/watch?v=zAE4Swjc-GU&feature=youtu.be +CVE-2020-15189 - https://youtu.be/FWIDFNXmr9g +CVE-2020-15209 - https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8 +CVE-2020-15226 - https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc +CVE-2020-15228 - http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html +CVE-2020-15238 - http://packetstormsecurity.com/files/159740/Blueman-Local-Root-Privilege-Escalation.html +CVE-2020-15238 - https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/1897287 +CVE-2020-15246 - https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 +CVE-2020-15249 - https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 +CVE-2020-15250 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-15253 - https://www.exploit-db.com/exploits/48792 +CVE-2020-15255 - http://packetstormsecurity.com/files/159996/Anuko-Time-Tracker-1.19.23.5325-CSV-Injection.html +CVE-2020-15255 - https://www.exploit-db.com/exploits/49027 +CVE-2020-15261 - http://packetstormsecurity.com/files/162873/Veyon-4.4.1-Unquoted-Service-Path.html +CVE-2020-15261 - https://github.com/veyon/veyon/issues/657 +CVE-2020-15261 - https://www.exploit-db.com/exploits/48246 +CVE-2020-15261 - https://www.exploit-db.com/exploits/49925 +CVE-2020-15266 - https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845 +CVE-2020-15300 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-009 +CVE-2020-15301 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-010 +CVE-2020-15302 - https://blog.openzeppelin.com/argent-vulnerability-report/ +CVE-2020-15304 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md +CVE-2020-15305 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md +CVE-2020-15306 - https://github.com/AcademySoftwareFoundation/openexr/blob/master/SECURITY.md +CVE-2020-15307 - https://www2.deloitte.com/de/de/pages/risk/articles/nozomi-stored-xss.html?nc=1 +CVE-2020-15308 - https://code610.blogspot.com/2020/06/postauth-sqli-in-sitracker-v367-p2.html +CVE-2020-15350 - https://github.com/RIOT-OS/RIOT/pull/14400 +CVE-2020-15351 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-004.md +CVE-2020-15352 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-15357 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d +CVE-2020-15357 - https://starlabs.sg/advisories/ +CVE-2020-15357 - https://www.askey.com.tw/incident_report_notifications.html +CVE-2020-15358 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-15358 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-15358 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-15358 - https://www.sqlite.org/src/tktview?name=8f157e8010 +CVE-2020-15360 - https://docs.docker.com/docker-for-windows/release-notes/ +CVE-2020-15360 - https://whitehatck01.blogspot.com/2020/06/dockers-latest-version-of-privilege.html +CVE-2020-15363 - http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html +CVE-2020-15364 - http://packetstormsecurity.com/files/158510/WordPress-NexosReal-Estate-Theme-1.7-Cross-Site-Scripting-SQL-Injection.html +CVE-2020-15365 - https://github.com/LibRaw/LibRaw/issues/301 +CVE-2020-15367 - https://github.com/inflixim4be/CVE-2020-15367 +CVE-2020-15368 - https://codetector.org/post/asrock_rgb_driver/ +CVE-2020-15368 - https://github.com/stong/CVE-2020-15368?tab=readme-ov-file +CVE-2020-15389 - https://github.com/uclouvain/openjpeg/issues/1261 +CVE-2020-15389 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-15389 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-15392 - https://github.com/inflixim4be/CVE-2020-15392 +CVE-2020-15393 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba +CVE-2020-15394 - https://www.manageengine.com +CVE-2020-15395 - https://sourceforge.net/p/mediainfo/bugs/1127/ +CVE-2020-15396 - https://bugzilla.suse.com/show_bug.cgi?id=1173521 +CVE-2020-15397 - https://bugzilla.suse.com/show_bug.cgi?id=1173519 +CVE-2020-15401 - http://daniels-it-blog.blogspot.com/2020/06/when-your-anti-virus-turns-against-you.html +CVE-2020-15408 - https://kb.pulsesecure.net/?atype=sa +CVE-2020-15408 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-15415 - https://github.com/CLP-team/Vigor-Commond-Injection +CVE-2020-15468 - https://www.exploit-db.com/exploits/48190 +CVE-2020-15470 - https://github.com/rockcarry/ffjpeg/issues/26 +CVE-2020-15487 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/ +CVE-2020-15488 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/ +CVE-2020-15492 - http://packetstormsecurity.com/files/158556/INNEO-Startup-TOOLS-2018-M040-13.0.70.3804-Remote-Code-Execution.html +CVE-2020-15492 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-028.txt +CVE-2020-15492 - https://www.syss.de/pentest-blog/2020/syss-2020-028-sicherheitsschwachstelle-in-inneo-startup-tools-2017-und-2018/ +CVE-2020-15498 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440 +CVE-2020-15499 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440 +CVE-2020-15500 - http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html +CVE-2020-15504 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-via-sqli-cve-2020-15504 +CVE-2020-15505 - http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html +CVE-2020-15505 - https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/ +CVE-2020-15518 - https://zwclose.github.io/veeamon +CVE-2020-15521 - https://www.manageengine.com +CVE-2020-15528 - http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html +CVE-2020-15529 - http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html +CVE-2020-15530 - http://daniels-it-blog.blogspot.com/2020/07/steam-arbitrary-code-execution-part-2.html +CVE-2020-15531 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py +CVE-2020-15531 - https://www.youtube.com/watch?v=saoTr1NwdzM +CVE-2020-15532 - https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_dos.py +CVE-2020-15533 - https://www.manageengine.com +CVE-2020-15535 - https://packetstormsecurity.com/files/157118/WordPress-Car-Rental-System-1.3-Cross-Site-Scripting.html +CVE-2020-15535 - https://wpvulndb.com/vulnerabilities/10172 +CVE-2020-15536 - https://packetstormsecurity.com/files/157116/WordPress-Hotel-Booking-System-Pro-1.1-Cross-Site-Scripting.html +CVE-2020-15536 - https://wpvulndb.com/vulnerabilities/10171 +CVE-2020-15537 - https://cxsecurity.com/issue/WLB-2020040032 +CVE-2020-15537 - https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html +CVE-2020-15538 - https://cxsecurity.com/issue/WLB-2020060011 +CVE-2020-15538 - https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html +CVE-2020-15539 - https://cxsecurity.com/issue/WLB-2020060011 +CVE-2020-15539 - https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html +CVE-2020-15540 - https://cxsecurity.com/issue/WLB-2020060010 +CVE-2020-15540 - https://packetstormsecurity.com/files/157887/We-Com-OpenData-CMS-2.0-SQL-Injection.html +CVE-2020-15570 - https://github.com/sungjungk/whoopsie_killer2/blob/master/README.md +CVE-2020-15570 - https://github.com/sungjungk/whoopsie_killer2/blob/master/whoopsie_killer2.py +CVE-2020-15570 - https://www.youtube.com/watch?v=oZXGwC7PWYE +CVE-2020-15577 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15578 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15579 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15580 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15581 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15582 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15583 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15584 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-15586 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-15590 - https://github.com/sickcodes +CVE-2020-15598 - http://packetstormsecurity.com/files/159185/ModSecurity-3.0.x-Denial-Of-Service.html +CVE-2020-15598 - http://seclists.org/fulldisclosure/2020/Sep/32 +CVE-2020-15598 - https://coreruleset.org/20200914/cve-2020-15598/ +CVE-2020-15599 - https://www.exploit-db.com/exploits/48626 +CVE-2020-15600 - http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html +CVE-2020-15600 - https://github.com/boiteasite/cmsuno/issues/15 +CVE-2020-15636 - https://kb.netgear.com/000062128/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-R6700v3-PSV-2020-0224 +CVE-2020-15643 - https://www.tenable.com/security/research/tra-2020-56 +CVE-2020-15644 - https://www.tenable.com/security/research/tra-2020-56 +CVE-2020-15645 - https://www.tenable.com/security/research/tra-2020-56 +CVE-2020-15647 - https://bugzilla.mozilla.org/show_bug.cgi?id=1647078 +CVE-2020-15650 - https://bugzilla.mozilla.org/show_bug.cgi?id=1652360 +CVE-2020-15655 - https://bugzilla.mozilla.org/show_bug.cgi?id=1645204 +CVE-2020-15657 - https://bugzilla.mozilla.org/show_bug.cgi?id=1644954 +CVE-2020-15663 - https://bugzilla.mozilla.org/show_bug.cgi?id=1643199 +CVE-2020-15667 - https://bugzilla.mozilla.org/show_bug.cgi?id=1653371 +CVE-2020-15676 - https://bugzilla.mozilla.org/show_bug.cgi?id=1646140 +CVE-2020-15677 - https://bugzilla.mozilla.org/show_bug.cgi?id=1641487 +CVE-2020-15680 - https://bugzilla.mozilla.org/show_bug.cgi?id=1658881 +CVE-2020-15682 - https://bugzilla.mozilla.org/show_bug.cgi?id=1636654 +CVE-2020-15685 - https://bugzilla.mozilla.org/show_bug.cgi?id=1622640 +CVE-2020-15688 - http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html +CVE-2020-15690 - http://www.openwall.com/lists/oss-security/2021/02/04/3 +CVE-2020-15690 - https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/ +CVE-2020-15690 - https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690 +CVE-2020-15692 - http://www.openwall.com/lists/oss-security/2021/02/04/1 +CVE-2020-15692 - https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/ +CVE-2020-15693 - http://www.openwall.com/lists/oss-security/2021/02/04/2 +CVE-2020-15693 - https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/ +CVE-2020-15694 - http://www.openwall.com/lists/oss-security/2021/02/04/2 +CVE-2020-15694 - https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/ +CVE-2020-15716 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 +CVE-2020-15717 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 +CVE-2020-15718 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 +CVE-2020-15719 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 +CVE-2020-15719 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-15721 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 +CVE-2020-15744 - https://www.bitdefender.com/blog/labs/cracking-the-victure-pc420-camera +CVE-2020-15780 - http://www.openwall.com/lists/oss-security/2020/07/20/7 +CVE-2020-15780 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7 +CVE-2020-15780 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354 +CVE-2020-15780 - https://usn.ubuntu.com/4426-1/ +CVE-2020-15780 - https://www.openwall.com/lists/oss-security/2020/06/15/3 +CVE-2020-15797 - https://www.siemens-healthineers.com/support-documentation/security-advisory +CVE-2020-15803 - https://support.zabbix.com/browse/ZBX-18057 +CVE-2020-15806 - https://www.tenable.com/security/research/tra-2020-46 +CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/186 +CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/189 +CVE-2020-15807 - https://github.com/LibreDWG/libredwg/issues/190 +CVE-2020-15816 - https://www.westerndigital.com/support/productsecurity/wdc-20005-wd-discovery-remote-command-execution-vulnerability +CVE-2020-15824 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-15824 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-15839 - https://issues.liferay.com/browse/LPE-17029 +CVE-2020-15839 - https://issues.liferay.com/browse/LPE-17055 +CVE-2020-15840 - https://issues.liferay.com/browse/LPE-17046 +CVE-2020-15841 - https://issues.liferay.com/browse/LPE-16928 +CVE-2020-15842 - https://issues.liferay.com/browse/LPE-16963 +CVE-2020-15843 - https://blog.to.com/advisory-actfax-7-10-build-0335-privilege-escalation-cve-2020-15843/ +CVE-2020-15849 - https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/ +CVE-2020-15850 - https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities +CVE-2020-15851 - https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities +CVE-2020-15858 - http://packetstormsecurity.com/files/171978/Telit-Cinterion-IoT-Traversal-Escalation-Bypass-Heap-Overflow.html +CVE-2020-15858 - http://seclists.org/fulldisclosure/2023/Apr/11 +CVE-2020-15860 - https://www.coresecurity.com/core-labs/advisories/parallels-ras-os-command-execution +CVE-2020-15862 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965166 +CVE-2020-15863 - https://git.qemu.org/?p=qemu.git;a=commitdiff;h=5519724a13664b43e225ca05351c60b4468e4555 +CVE-2020-15864 - https://www.quali.com/products/cloudshell-pro/ +CVE-2020-15866 - https://github.com/mruby/mruby/issues/5042 +CVE-2020-15867 - http://packetstormsecurity.com/files/162123/Gogs-Git-Hooks-Remote-Code-Execution.html +CVE-2020-15868 - https://support.sonatype.com/hc/en-us/articles/360052192533 +CVE-2020-15869 - https://support.sonatype.com +CVE-2020-15869 - https://support.sonatype.com/hc/en-us/articles/360051424554 +CVE-2020-15870 - https://support.sonatype.com +CVE-2020-15870 - https://support.sonatype.com/hc/en-us/articles/360051424754 +CVE-2020-15871 - https://hackerone.com/reports/917843 +CVE-2020-15871 - https://support.sonatype.com +CVE-2020-15871 - https://support.sonatype.com/hc/en-us/articles/360052192693 +CVE-2020-15873 - https://research.loginsoft.com/bugs/blind-sql-injection-in-librenms/ +CVE-2020-15877 - https://shielder.it/blog +CVE-2020-15881 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15882 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-15882 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15883 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15884 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-15884 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15885 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15886 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-15886 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15887 - https://github.com/munkireport/munkireport-php/releases +CVE-2020-15887 - https://github.com/munkireport/munkireport-php/releases/tag/v5.6.3 +CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00053.html +CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00054.html +CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00071.html +CVE-2020-15888 - http://lua-users.org/lists/lua-l/2020-07/msg00079.html +CVE-2020-15889 - http://lua-users.org/lists/lua-l/2020-07/msg00078.html +CVE-2020-15890 - https://github.com/LuaJIT/LuaJIT/issues/601 +CVE-2020-15893 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ +CVE-2020-15894 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ +CVE-2020-15895 - https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ +CVE-2020-15896 - https://research.loginsoft.com/bugs/authentication-bypass-in-d-link-firmware-dap-1522/ +CVE-2020-15906 - http://packetstormsecurity.com/files/159663/Tiki-Wiki-CMS-Groupware-21.1-Authentication-Bypass.html +CVE-2020-15912 - https://www.youtube.com/watch?v=VYKsfgox-bs +CVE-2020-15912 - https://www.youtube.com/watch?v=kQWg-Ywv3S4 +CVE-2020-15912 - https://www.youtube.com/watch?v=nn-_3AbtEkI +CVE-2020-15918 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15919 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15920 - http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html +CVE-2020-15920 - http://packetstormsecurity.com/files/159194/Mida-Solutions-eFramework-ajaxreq.php-Command-Injection.html +CVE-2020-15920 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15921 - http://packetstormsecurity.com/files/159239/Mida-eFramework-2.9.0-Backdoor-Access.html +CVE-2020-15921 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15922 - http://packetstormsecurity.com/files/159314/Mida-eFramework-2.8.9-Remote-Code-Execution.html +CVE-2020-15922 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15923 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15924 - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html +CVE-2020-15927 - https://www.manageengine.com +CVE-2020-15928 - https://www.exploit-db.com/exploits/49078 +CVE-2020-15929 - https://www.exploit-db.com/exploits/49077 +CVE-2020-15930 - http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html +CVE-2020-15930 - https://github.com/laurent22/joplin/issues/3552 +CVE-2020-15930 - https://github.com/laurent22/joplin/releases/tag/v1.1.4 +CVE-2020-15931 - https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability +CVE-2020-15932 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-005.md +CVE-2020-15936 - https://fortiguard.com/advisory/FG-IR-20-091 +CVE-2020-15943 - http://packetstormsecurity.com/files/158751/Gantt-Chart-For-Jira-5.5.3-Missing-Privilege-Check.html +CVE-2020-15943 - http://seclists.org/fulldisclosure/2020/Aug/0 +CVE-2020-15943 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-029.txt +CVE-2020-15944 - http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html +CVE-2020-15944 - http://seclists.org/fulldisclosure/2020/Aug/1 +CVE-2020-15944 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt +CVE-2020-15945 - http://lua-users.org/lists/lua-l/2020-07/msg00123.html +CVE-2020-15948 - http://packetstormsecurity.com/files/163687/eGain-Chat-15.5.5-Cross-Site-Scripting.html +CVE-2020-15949 - https://labs.bishopfox.com/advisories +CVE-2020-15949 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 +CVE-2020-15950 - https://labs.bishopfox.com/advisories +CVE-2020-15950 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 +CVE-2020-15951 - https://labs.bishopfox.com/advisories +CVE-2020-15951 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 +CVE-2020-15952 - https://labs.bishopfox.com/advisories +CVE-2020-15952 - https://labs.bishopfox.com/advisories/immuta-version-2.8.2 +CVE-2020-15956 - http://packetstormsecurity.com/files/158771/ACTi-NVR3-Standard-Professional-Server-3.0.12.42-Denial-Of-Service.html +CVE-2020-15956 - https://github.com/megamagnus/cve-2020-15956 +CVE-2020-15957 - https://github.com/DP-3T/dp3t-sdk-backend/security/advisories/GHSA-5m5q-3qw2-3xf3 +CVE-2020-15958 - http://packetstormsecurity.com/files/159193/1CRM-8.6.7-Insecure-Direct-Object-Reference.html +CVE-2020-15958 - http://seclists.org/fulldisclosure/2020/Sep/31 +CVE-2020-15972 - http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html +CVE-2020-15999 - https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html +CVE-2020-16009 - http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html +CVE-2020-16011 - http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html +CVE-2020-16024 - http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html +CVE-2020-16025 - http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html +CVE-2020-16040 - http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html +CVE-2020-16040 - http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html +CVE-2020-16040 - http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html +CVE-2020-16041 - http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html +CVE-2020-16094 - https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4313 +CVE-2020-16116 - https://kde.org/info/security/advisory-20200730-1.txt +CVE-2020-16119 - https://launchpad.net/bugs/1883840 +CVE-2020-16125 - https://gitlab.gnome.org/GNOME/gdm/-/issues/642 +CVE-2020-16126 - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS +CVE-2020-16127 - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS +CVE-2020-16134 - https://www.swisscom.ch +CVE-2020-16135 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-16137 - https://packetstormsecurity.com/files/158818/Cisco-7937G-Privilege-Escalation.html +CVE-2020-16138 - https://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html +CVE-2020-16139 - http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html +CVE-2020-16140 - https://cybersecurityworks.com/zerodays/cve-2020-16140-thembay.html +CVE-2020-16142 - https://medium.com/@reliable_lait_mouse_975/mercedes-comand-infotainment-improper-format-strings-handling-4c67063d744e +CVE-2020-16143 - https://github.com/haiwen/seafile-client/issues/1309 +CVE-2020-16147 - https://podalirius.net/cves/2020-16147/ +CVE-2020-16147 - https://podalirius.net/en/cves/2020-16147/ +CVE-2020-16148 - https://podalirius.net/cves/2020-16148/ +CVE-2020-16148 - https://podalirius.net/en/cves/2020-16148/ +CVE-2020-16152 - http://packetstormsecurity.com/files/164957/Aerohive-NetConfig-10.0r8a-Local-File-Inclusion-Remote-Code-Execution.html +CVE-2020-16154 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ +CVE-2020-16155 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ +CVE-2020-16156 - https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ +CVE-2020-16157 - http://packetstormsecurity.com/files/158992/Nagios-Log-Server-2.1.6-Cross-Site-Scripting.html +CVE-2020-16158 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ +CVE-2020-16159 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ +CVE-2020-16160 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ +CVE-2020-16161 - https://blog.inhq.net/posts/gopro-gpmf-parser-vuln-1/ +CVE-2020-16166 - https://arxiv.org/pdf/2012.07432.pdf +CVE-2020-16166 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638 +CVE-2020-16166 - https://usn.ubuntu.com/4526-1/ +CVE-2020-16166 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-16167 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ +CVE-2020-16168 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ +CVE-2020-16169 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ +CVE-2020-16170 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/ +CVE-2020-16171 - http://seclists.org/fulldisclosure/2020/Sep/33 +CVE-2020-16194 - https://github.com/login-securite/CVE/blob/main/CVE-2020-16194.md +CVE-2020-16204 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html +CVE-2020-16204 - http://seclists.org/fulldisclosure/2020/Sep/6 +CVE-2020-16205 - http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html +CVE-2020-16206 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html +CVE-2020-16206 - http://seclists.org/fulldisclosure/2020/Sep/6 +CVE-2020-16208 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html +CVE-2020-16208 - http://seclists.org/fulldisclosure/2020/Sep/6 +CVE-2020-16210 - http://packetstormsecurity.com/files/159064/Red-Lion-N-Tron-702-W-702M12-W-2.0.26-XSS-CSRF-Shell.html +CVE-2020-16210 - http://seclists.org/fulldisclosure/2020/Sep/6 +CVE-2020-16250 - http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html +CVE-2020-16251 - http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html +CVE-2020-16256 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16257 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16258 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16259 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16260 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16261 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16262 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16263 - https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4 +CVE-2020-16266 - https://mantisbt.org/bugs/view.php?id=27056 +CVE-2020-16267 - https://www.manageengine.com +CVE-2020-16269 - https://github.com/radareorg/radare2/issues/17383 +CVE-2020-16270 - https://github.com/Security-AVS/CVE-2020-16270 +CVE-2020-16271 - https://danzinger.wien/exploiting-keepassrpc/ +CVE-2020-16271 - https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 +CVE-2020-16272 - https://danzinger.wien/exploiting-keepassrpc/ +CVE-2020-16272 - https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 +CVE-2020-16287 - https://bugs.ghostscript.com/show_bug.cgi?id=701785 +CVE-2020-16288 - https://bugs.ghostscript.com/show_bug.cgi?id=701791 +CVE-2020-16289 - https://bugs.ghostscript.com/show_bug.cgi?id=701788 +CVE-2020-16290 - https://bugs.ghostscript.com/show_bug.cgi?id=701786 +CVE-2020-16291 - https://bugs.ghostscript.com/show_bug.cgi?id=701787 +CVE-2020-16292 - https://bugs.ghostscript.com/show_bug.cgi?id=701793 +CVE-2020-16293 - https://bugs.ghostscript.com/show_bug.cgi?id=701795 +CVE-2020-16294 - https://bugs.ghostscript.com/show_bug.cgi?id=701794 +CVE-2020-16295 - https://bugs.ghostscript.com/show_bug.cgi?id=701796 +CVE-2020-16296 - https://bugs.ghostscript.com/show_bug.cgi?id=701792 +CVE-2020-16297 - https://bugs.ghostscript.com/show_bug.cgi?id=701800 +CVE-2020-16298 - https://bugs.ghostscript.com/show_bug.cgi?id=701799 +CVE-2020-16299 - https://bugs.ghostscript.com/show_bug.cgi?id=701801 +CVE-2020-16300 - https://bugs.ghostscript.com/show_bug.cgi?id=701807 +CVE-2020-16301 - https://bugs.ghostscript.com/show_bug.cgi?id=701808 +CVE-2020-16302 - https://bugs.ghostscript.com/show_bug.cgi?id=701815 +CVE-2020-16303 - https://bugs.ghostscript.com/show_bug.cgi?id=701818 +CVE-2020-16304 - https://bugs.ghostscript.com/show_bug.cgi?id=701816 +CVE-2020-16305 - https://bugs.ghostscript.com/show_bug.cgi?id=701819 +CVE-2020-16306 - https://bugs.ghostscript.com/show_bug.cgi?id=701821 +CVE-2020-16307 - https://bugs.ghostscript.com/show_bug.cgi?id=701822 +CVE-2020-16308 - https://bugs.ghostscript.com/show_bug.cgi?id=701829 +CVE-2020-16309 - https://bugs.ghostscript.com/show_bug.cgi?id=701827 +CVE-2020-16310 - https://bugs.ghostscript.com/show_bug.cgi?id=701828 +CVE-2020-1639 - https://kb.juniper.net/ +CVE-2020-1652 - https://kb.juniper.net/ +CVE-2020-16587 - https://github.com/AcademySoftwareFoundation/openexr/issues/491 +CVE-2020-16588 - https://github.com/AcademySoftwareFoundation/openexr/issues/493 +CVE-2020-16589 - https://github.com/AcademySoftwareFoundation/openexr/issues/494 +CVE-2020-16590 - https://sourceware.org/bugzilla/show_bug.cgi?id=25821 +CVE-2020-16591 - https://sourceware.org/bugzilla/show_bug.cgi?id=25822 +CVE-2020-16592 - https://sourceware.org/bugzilla/show_bug.cgi?id=25823 +CVE-2020-16593 - https://sourceware.org/bugzilla/show_bug.cgi?id=25827 +CVE-2020-16599 - https://sourceware.org/bugzilla/show_bug.cgi?id=25842 +CVE-2020-16600 - https://bugs.ghostscript.com/show_bug.cgi?id=702253 +CVE-2020-16602 - http://packetstormsecurity.com/files/160225/Razer-Chroma-SDK-Server-3.16.02-Race-Condition.html +CVE-2020-16602 - https://www.angelystor.com/2020/09/cve-2020-16602-remote-file-execution-on.html +CVE-2020-16602 - https://www.youtube.com/watch?v=fkESBVhIdIA +CVE-2020-16608 - https://sghosh2402.medium.com/cve-2020-16608-8cdad9f4d9b4 +CVE-2020-16630 - https://www.usenix.org/system/files/sec20-zhang-yue.pdf +CVE-2020-1667 - https://kb.juniper.net/ +CVE-2020-1670 - https://kb.juniper.net/ +CVE-2020-16843 - https://github.com/firecracker-microvm/firecracker/issues/2057 +CVE-2020-16845 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-16846 - http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html +CVE-2020-16846 - https://github.com/saltstack/salt/releases +CVE-2020-16849 - https://blog.scadafence.com/vulnerability-report-cve-2020-16849 +CVE-2020-16850 - https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series +CVE-2020-16875 - http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html +CVE-2020-1693 - https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ +CVE-2020-16947 - http://packetstormsecurity.com/files/169961/Microsoft-Outlook-2019-16.0.13231.20262-Remote-Code-Execution.html +CVE-2020-16952 - http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html +CVE-2020-16984 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1128 +CVE-2020-16985 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1130 +CVE-2020-16990 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1089 +CVE-2020-16991 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1090 +CVE-2020-1700 - https://usn.ubuntu.com/4304-1/ +CVE-2020-1711 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711 +CVE-2020-17113 - http://packetstormsecurity.com/files/160054/Microsoft-Windows-WindowsCodecsRaw-CCanonRawImageRep-GetNamedWhiteBalances-Out-Of-Bounds-Read.html +CVE-2020-1721 - https://bugzilla.redhat.com/show_bug.cgi?id=1777579 +CVE-2020-1730 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-1731 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731 +CVE-2020-1735 - https://github.com/ansible/ansible/issues/67793 +CVE-2020-17352 - https://community.sophos.com/b/security-blog +CVE-2020-17352 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-authenticated-rce-issues-in-user-portal-cve-2020-17352 +CVE-2020-17354 - https://phabricator.wikimedia.org/T259210 +CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Aug/8 +CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/11 +CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/13 +CVE-2020-17360 - http://seclists.org/fulldisclosure/2020/Sep/14 +CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Aug/10 +CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/11 +CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/13 +CVE-2020-17361 - http://seclists.org/fulldisclosure/2020/Sep/14 +CVE-2020-17364 - https://sysdream.com/news/lab/ +CVE-2020-17365 - https://cymptom.com/cve-2020-17365-hotspot-shield-vpn-new-privilege-escalation-vulnerability/2020/10/ +CVE-2020-17367 - https://github.com/netblue30/firejail +CVE-2020-17368 - https://github.com/netblue30/firejail/ +CVE-2020-17372 - http://packetstormsecurity.com/files/158847/SugarCRM-Cross-Site-Scripting.html +CVE-2020-17372 - http://seclists.org/fulldisclosure/2020/Aug/7 +CVE-2020-17373 - http://packetstormsecurity.com/files/158848/SugarCRM-SQL-Injection.html +CVE-2020-17373 - http://seclists.org/fulldisclosure/2020/Aug/9 +CVE-2020-17381 - https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-17381.md +CVE-2020-17381 - https://github.com/an0ry/advisories/blob/main/CVE-2020-17381.md +CVE-2020-17382 - http://packetstormsecurity.com/files/159315/MSI-Ambient-Link-Driver-1.0.0.8-Privilege-Escalation.html +CVE-2020-17382 - https://www.coresecurity.com/core-labs/advisories/msi-ambient-link-multiple-vulnerabilities +CVE-2020-17448 - https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram-CVE-2020-17448 +CVE-2020-17449 - https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/ +CVE-2020-1745 - https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/ +CVE-2020-1745 - https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 +CVE-2020-17450 - https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/ +CVE-2020-17451 - https://lists.openwall.net/full-disclosure/2020/08/07/1 +CVE-2020-17451 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/ +CVE-2020-17452 - https://lists.openwall.net/full-disclosure/2020/08/07/1 +CVE-2020-17452 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/ +CVE-2020-17453 - https://github.com/JHHAX/CVE-2020-17453-PoC +CVE-2020-17456 - http://packetstormsecurity.com/files/158933/Seowon-SlC-130-Router-Remote-Code-Execution.html +CVE-2020-17456 - http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html +CVE-2020-17456 - https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated +CVE-2020-17456 - https://www.exploit-db.com/exploits/50821 +CVE-2020-17457 - https://www.gruppotim.it/redteam +CVE-2020-17458 - https://www.gruppotim.it/redteam +CVE-2020-17462 - https://www.exploit-db.com/exploits/48742 +CVE-2020-17463 - http://packetstormsecurity.com/files/158840/Fuel-CMS-1.4.7-SQL-Injection.html +CVE-2020-17466 - https://cxsecurity.com/issue/WLB-2020080046 +CVE-2020-1747 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-17473 - https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8131/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-long-lasting-token-vulnerability +CVE-2020-17479 - https://blog.sonatype.com/cve-2020-17479 +CVE-2020-17479 - https://github.com/manvel-khnkoyan/jpv/issues/10 +CVE-2020-17487 - https://github.com/radareorg/radare2/issues/17431 +CVE-2020-17496 - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ +CVE-2020-17498 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-17505 - http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html +CVE-2020-17506 - http://packetstormsecurity.com/files/158868/Artica-Proxy-4.3.0-Authentication-Bypass.html +CVE-2020-17506 - http://packetstormsecurity.com/files/159267/Artica-Proxy-4.30.000000-Authentication-Bypass-Command-Injection.html +CVE-2020-17519 - http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html +CVE-2020-17521 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-17521 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-17521 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-17527 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-17527 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-17527 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-17527 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-1753 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753 +CVE-2020-17530 - http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html +CVE-2020-17530 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-17530 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-17530 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-17530 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-17538 - https://bugs.ghostscript.com/show_bug.cgi?id=701792 +CVE-2020-17541 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 +CVE-2020-1757 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1757 +CVE-2020-17752 - https://github.com/hellowuzekai/blockchains/blob/master/balance.md +CVE-2020-17753 - https://etherscan.io/address/0x340DbA127F099DAB9DC8599C75b16e44D9b02Fdb +CVE-2020-17753 - https://etherscan.io/address/0x5a50C7D96fC68ea2F0bEE06D86CD971c31F85604 +CVE-2020-17753 - https://etherscan.io/address/0xD7aA007C3e7ab454FFE3E20F0b28F926Db295477 +CVE-2020-1790 - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-gauss-en +CVE-2020-17901 - https://github.com/AvaterXXX/PbootCMS/blob/master/CSRF.md +CVE-2020-17952 - https://github.com/twothink/twothink/issues/1 +CVE-2020-18020 - https://gitee.com/koyshe/phpshe/issues/IQ8S8 +CVE-2020-18065 - https://github.com/PopojiCMS/PopojiCMS/issues/16 +CVE-2020-18077 - https://github.com/cve-vul/vul/blob/master/FTPShell/FTPShell_Server_6.83_DOS.md +CVE-2020-18084 - https://github.com/yzmcms/yzmcms/issues/9 +CVE-2020-18114 - https://blog.csdn.net/qq_36093477/article/details/86681178 +CVE-2020-18116 - https://blog.csdn.net/qq_36093477/article/details/98035255 +CVE-2020-18121 - https://github.com/Indexhibit/indexhibit/issues/17 +CVE-2020-18123 - https://github.com/Indexhibit/indexhibit/issues/18 +CVE-2020-18124 - https://github.com/Indexhibit/indexhibit/issues/19 +CVE-2020-18126 - https://github.com/Indexhibit/indexhibit/issues/21 +CVE-2020-18127 - https://github.com/Indexhibit/indexhibit/issues/22 +CVE-2020-18155 - https://github.com/intelliants/subrion/issues/817 +CVE-2020-18157 - https://github.com/je6k/ctf-challenges/blob/master/poc.txt +CVE-2020-18158 - https://www.cnblogs.com/echod/articles/10380909.html +CVE-2020-18175 - https://github.com/sword1991912/metinfo/issues/1 +CVE-2020-18184 - https://github.com/pluxml/PluXml/issues/320 +CVE-2020-18185 - https://github.com/pluxml/PluXml/issues/321 +CVE-2020-18195 - https://github.com/pluck-cms/pluck/issues/69 +CVE-2020-18198 - https://github.com/pluck-cms/pluck/issues/69 +CVE-2020-18215 - https://gitee.com/koyshe/phpshe/issues/ITLK2 +CVE-2020-18215 - https://github.com/lemon666/vuln/blob/master/Phpshe1.7_sql1.md +CVE-2020-18221 - https://github.com/typora/typora-issues/issues/2204 +CVE-2020-18259 - https://github.com/chilin89117/ED01-CMS/issues/1 +CVE-2020-18261 - https://github.com/chilin89117/ED01-CMS/issues/2 +CVE-2020-18265 - https://github.com/github123abc123/bird/issues/1 +CVE-2020-18268 - https://github.com/zblogcn/zblogphp/issues/209 +CVE-2020-18305 - https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c +CVE-2020-18324 - https://github.com/hamm0nz/CVE-2020-18324 +CVE-2020-18325 - https://github.com/hamm0nz/CVE-2020-18325 +CVE-2020-18326 - https://github.com/hamm0nz/CVE-2020-18326 +CVE-2020-18327 - https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8 +CVE-2020-18378 - https://github.com/WebAssembly/binaryen/issues/1900 +CVE-2020-18382 - https://github.com/WebAssembly/binaryen/issues/1900 +CVE-2020-18395 - http://lists.gnu.org/archive/html/bug-gama/2019-04/msg00001.html +CVE-2020-18404 - https://github.com/source-hunter/espcms/issues/1 +CVE-2020-18409 - https://github.com/xwlrbh/Catfish/issues/5 +CVE-2020-18410 - https://github.com/GodEpic/chaojicms/issues/6 +CVE-2020-18413 - https://github.com/GodEpic/chaojicms/issues/5 +CVE-2020-18414 - https://github.com/GodEpic/chaojicms/issues/3 +CVE-2020-18416 - https://github.com/dtorp06/jymusic/issues/1 +CVE-2020-18418 - https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/FeiFeiCMS_4.1_csrf.doc +CVE-2020-18418 - https://github.com/GodEpic/Vulnerability-detection/blob/master/feifeicms/poc +CVE-2020-18442 - https://github.com/gdraheim/zziplib/issues/68 +CVE-2020-18454 - https://github.com/hillerlin/bycms/issues/1 +CVE-2020-18457 - https://github.com/hillerlin/bycms/issues/3 +CVE-2020-18458 - https://github.com/AutismJH/damicms/issues/5 +CVE-2020-18463 - https://github.com/Richard1266/aikcms/issues/2 +CVE-2020-18464 - https://github.com/Richard1266/aikcms/issues/2 +CVE-2020-18467 - https://github.com/bigtreecms/BigTree-CMS/issues/364 +CVE-2020-18568 - https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a +CVE-2020-18568 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-18648 - https://github.com/GodEpic/JuQingCMS/issues/1 +CVE-2020-18651 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/13 +CVE-2020-18652 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/12 +CVE-2020-18654 - https://github.com/wuzhicms/wuzhicms/issues/174 +CVE-2020-18668 - https://www.seebug.org/vuldb/ssvid-97996 +CVE-2020-18694 - https://github.com/ignitedcms/ignitedcms/issues/5 +CVE-2020-18723 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html +CVE-2020-18724 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html +CVE-2020-18734 - https://github.com/eclipse-cyclonedds/cyclonedds +CVE-2020-18734 - https://github.com/eclipse-cyclonedds/cyclonedds/issues/476 +CVE-2020-18735 - https://github.com/eclipse-cyclonedds/cyclonedds +CVE-2020-18735 - https://github.com/eclipse-cyclonedds/cyclonedds/issues/501 +CVE-2020-18737 - https://github.com/typora/typora-issues/issues/2289 +CVE-2020-18746 - https://github.com/kk98kk0/exploit/issues/3 +CVE-2020-18748 - https://github.com/typora +CVE-2020-18753 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_start-stop.md +CVE-2020-18754 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak.md +CVE-2020-18756 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_read.md +CVE-2020-18757 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_DOS.md +CVE-2020-18758 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_upload.md +CVE-2020-18759 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak2.md +CVE-2020-18766 - https://github.com/AntSwordProject/antSword/issues/147 +CVE-2020-18770 - https://github.com/gdraheim/zziplib/issues/69 +CVE-2020-18771 - https://github.com/Exiv2/exiv2/issues/756 +CVE-2020-18773 - https://github.com/Exiv2/exiv2/issues/760 +CVE-2020-18774 - https://github.com/Exiv2/exiv2/issues/759 +CVE-2020-18775 - https://bugzilla.libav.org/show_bug.cgi?id=1152 +CVE-2020-18776 - https://bugzilla.libav.org/show_bug.cgi?id=1153 +CVE-2020-18778 - https://bugzilla.libav.org/show_bug.cgi?id=1155 +CVE-2020-18781 - https://github.com/mpruett/audiofile/issues/56 +CVE-2020-18831 - https://github.com/Exiv2/exiv2/issues/828 +CVE-2020-18839 - https://gitlab.freedesktop.org/poppler/poppler/issues/742 +CVE-2020-1885 - https://www.facebook.com/security/advisories/cve-2020-1885 +CVE-2020-1887 - https://github.com/osquery/osquery/pull/6197 +CVE-2020-18878 - https://github.com/zorlan/skycaiji/issues/13 +CVE-2020-18889 - https://github.com/choregus/puppyCMS/issues/13 +CVE-2020-18897 - https://github.com/libyal/libpff/issues/61 +CVE-2020-18897 - https://github.com/libyal/libpff/issues/62 +CVE-2020-18898 - https://github.com/Exiv2/exiv2/issues/741 +CVE-2020-18899 - https://github.com/Exiv2/exiv2/issues/742 +CVE-2020-18900 - https://github.com/libyal/libexe/issues/1 +CVE-2020-18964 - https://github.com/saysky/ForestBlog/issues/20 +CVE-2020-18971 - https://sourceforge.net/p/podofo/tickets/48/ +CVE-2020-18972 - https://sourceforge.net/p/podofo/tickets/49/ +CVE-2020-18974 - https://bugzilla.nasm.us/show_bug.cgi?id=3392568 +CVE-2020-18976 - https://github.com/appneta/tcpreplay/issues/556 +CVE-2020-18984 - https://github.com/buxu/bug/issues/2 +CVE-2020-19107 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/9 +CVE-2020-19108 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10 +CVE-2020-19109 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12 +CVE-2020-19110 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11 +CVE-2020-19112 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/13 +CVE-2020-19113 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/15 +CVE-2020-19114 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/8 +CVE-2020-19118 - https://github.com/yzmcms/yzmcms/issues/14 +CVE-2020-1913 - https://www.facebook.com/security/advisories/cve-2020-1913 +CVE-2020-19131 - http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/ +CVE-2020-19131 - http://bugzilla.maptools.org/show_bug.cgi?id=2831 +CVE-2020-19146 - https://www.seebug.org/vuldb/ssvid-97884 +CVE-2020-19148 - https://www.seebug.org/vuldb/ssvid-97879 +CVE-2020-1915 - https://www.facebook.com/security/advisories/cve-2020-1915 +CVE-2020-19151 - https://www.seebug.org/vuldb/ssvid-97881 +CVE-2020-19154 - https://www.seebug.org/vuldb/ssvid-97882 +CVE-2020-19165 - https://github.com/Mint60/PHP/issues/1 +CVE-2020-19185 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md +CVE-2020-19186 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md +CVE-2020-19187 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md +CVE-2020-19188 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md +CVE-2020-19189 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md +CVE-2020-19190 - https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md +CVE-2020-19199 - https://github.com/qinggan/phpok/issues/5 +CVE-2020-19263 - https://github.com/sansanyun/mipcms5/issues/4 +CVE-2020-19264 - https://github.com/sansanyun/mipcms5/issues/4 +CVE-2020-19265 - https://github.com/tifaweb/Dswjcms/issues/4 +CVE-2020-19266 - https://github.com/tifaweb/Dswjcms/issues/5 +CVE-2020-1927 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-1927 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1927 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-19280 - https://github.com/zchuanzhao/jeesns/issues/9 +CVE-2020-19282 - https://www.seebug.org/vuldb/ssvid-97940 +CVE-2020-19287 - https://www.seebug.org/vuldb/ssvid-97945 +CVE-2020-19291 - https://www.seebug.org/vuldb/ssvid-97948 +CVE-2020-19295 - https://www.seebug.org/vuldb/ssvid-97950 +CVE-2020-19301 - https://github.com/tingyuu/vaeThink/issues/1 +CVE-2020-19302 - https://github.com/tingyuu/vaeThink/issues/2 +CVE-2020-19305 - https://github.com/MRdoulestar/CodeAnalyse/issues/2 +CVE-2020-19316 - http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/ +CVE-2020-19319 - https://github.com/hhhhu8045759/dir_619l-buffer-overflow +CVE-2020-19320 - https://github.com/hhhhu8045759/dlink-619l-buffer_overflow +CVE-2020-19320 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-19323 - https://github.com/hhhhu8045759/619L_upnpd_heapoverflow +CVE-2020-19323 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-1934 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1935 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-1935 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1935 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-19360 - https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability +CVE-2020-19361 - https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability +CVE-2020-19362 - https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/ +CVE-2020-19363 - https://github.com/EmreOvunc/Vtiger-CRM-Vulnerabilities/ +CVE-2020-19364 - https://github.com/EmreOvunc/OpenEMR_Vulnerabilities +CVE-2020-1938 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-1938 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1938 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-1941 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-1941 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-1941 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1941 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-19417 - http://packetstormsecurity.com/files/161700/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Privilege-Escalation.html +CVE-2020-19419 - http://packetstormsecurity.com/files/161701/Emerson-Smart-Wireless-Gateway-1420-4.6.59-Missing-Authentication.html +CVE-2020-1945 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-1945 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-1945 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-19463 - https://github.com/flexpaper/pdf2json/issues/24 +CVE-2020-19464 - https://github.com/flexpaper/pdf2json/issues/25 +CVE-2020-19465 - https://github.com/flexpaper/pdf2json/issues/26 +CVE-2020-19466 - https://github.com/flexpaper/pdf2json/issues/27 +CVE-2020-19467 - https://github.com/flexpaper/pdf2json/issues/28 +CVE-2020-19468 - https://github.com/flexpaper/pdf2json/issues/29 +CVE-2020-19469 - https://github.com/flexpaper/pdf2json/issues/30 +CVE-2020-19470 - https://github.com/flexpaper/pdf2json/issues/31 +CVE-2020-19471 - https://github.com/flexpaper/pdf2json/issues/32 +CVE-2020-19472 - https://github.com/flexpaper/pdf2json/issues/33 +CVE-2020-19473 - https://github.com/flexpaper/pdf2json/issues/34 +CVE-2020-19474 - https://github.com/flexpaper/pdf2json/issues/35 +CVE-2020-19475 - https://github.com/flexpaper/pdf2json/issues/36 +CVE-2020-19481 - https://github.com/gpac/gpac/issues/1265 +CVE-2020-19481 - https://github.com/gpac/gpac/issues/1266 +CVE-2020-19481 - https://github.com/gpac/gpac/issues/1267 +CVE-2020-19488 - https://github.com/gpac/gpac/issues/1263 +CVE-2020-19490 - https://github.com/syoyo/tinyexr/issues/124 +CVE-2020-19491 - https://github.com/pts/sam2p/issues/67 +CVE-2020-19492 - https://github.com/pts/sam2p/issues/66 +CVE-2020-19497 - https://github.com/tbeu/matio/issues/121 +CVE-2020-19498 - https://github.com/strukturag/libheif/issues/139 +CVE-2020-19499 - https://github.com/strukturag/libheif/issues/138 +CVE-2020-1950 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1950 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-1951 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1951 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-19513 - https://www.exploit-db.com/exploits/46991 +CVE-2020-1953 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-1954 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-19559 - https://medium.com/nightst0rm/t%E1%BA%A3n-m%E1%BA%A1n-v%E1%BB%81-l%E1%BB%97-h%E1%BB%95ng-trong-atm-diebold-f1040a70f2c9 +CVE-2020-19609 - https://bugs.ghostscript.com/show_bug.cgi?id=701176 +CVE-2020-19613 - https://github.com/sunkaifei/FlyCms/issues/1 +CVE-2020-19616 - https://github.com/langhsu/mblog/issues/27 +CVE-2020-19617 - https://github.com/langhsu/mblog/issues/27 +CVE-2020-19618 - https://github.com/langhsu/mblog/issues/27 +CVE-2020-19619 - https://github.com/langhsu/mblog/issues/27 +CVE-2020-19626 - http://mayoterry.com/file/cve/XSS_vuluerability_in_Craftcms_3.1.31.pdf +CVE-2020-1963 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-19639 - https://xn--sb-lka.org/cve/INSMA.txt +CVE-2020-19640 - https://xn--sb-lka.org/cve/INSMA.txt +CVE-2020-19641 - https://xn--sb-lka.org/cve/INSMA.txt +CVE-2020-19642 - https://xn--sb-lka.org/cve/INSMA.txt +CVE-2020-19643 - https://xn--sb-lka.org/cve/INSMA.txt +CVE-2020-19664 - https://github.com/minghangshen/bug_poc +CVE-2020-19664 - https://nosec.org/home/detail/4631.html +CVE-2020-19667 - https://github.com/ImageMagick/ImageMagick/issues/1895 +CVE-2020-19668 - https://github.com/saitoha/libsixel/issues/136 +CVE-2020-19669 - https://github.com/eyoucms/eyoucms/issues/4 +CVE-2020-1967 - http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html +CVE-2020-1967 - http://seclists.org/fulldisclosure/2020/May/5 +CVE-2020-1967 - https://github.com/irsl/CVE-2020-1967 +CVE-2020-1967 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-1967 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-1967 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-1967 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-1967 - https://www.tenable.com/security/tns-2020-04 +CVE-2020-1967 - https://www.tenable.com/security/tns-2020-11 +CVE-2020-1967 - https://www.tenable.com/security/tns-2021-10 +CVE-2020-19670 - https://github.com/bluecity/CMS/blob/master/niushop%20v1.11-passwd/Niushop%20V1.11.md +CVE-2020-19672 - https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md +CVE-2020-19678 - https://pastebin.com/8dj59053 +CVE-2020-1968 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-1968 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-1968 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-19682 - https://zhhhy.github.io/2019/06/28/zzzcms/ +CVE-2020-19683 - https://zhhhy.github.io/2019/06/28/zzzcms/ +CVE-2020-19692 - https://github.com/nginx/njs/issues/187 +CVE-2020-19693 - https://github.com/espruino/Espruino/issues/1684 +CVE-2020-19695 - https://github.com/nginx/njs/issues/188 +CVE-2020-19698 - https://github.com/pandao/editor.md/issues/700 +CVE-2020-1971 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-1971 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-1971 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-1971 - https://www.tenable.com/security/tns-2020-11 +CVE-2020-1971 - https://www.tenable.com/security/tns-2021-09 +CVE-2020-1971 - https://www.tenable.com/security/tns-2021-10 +CVE-2020-19716 - https://github.com/Exiv2/exiv2/issues/980 +CVE-2020-19717 - https://github.com/axiomatic-systems/Bento4/issues/416 +CVE-2020-19718 - https://github.com/axiomatic-systems/Bento4/issues/417 +CVE-2020-19719 - https://github.com/axiomatic-systems/Bento4/issues/414 +CVE-2020-19720 - https://github.com/axiomatic-systems/Bento4/issues/413 +CVE-2020-19721 - https://github.com/axiomatic-systems/Bento4/issues/415 +CVE-2020-19722 - https://github.com/axiomatic-systems/Bento4/issues/418 +CVE-2020-19724 - https://sourceware.org/bugzilla/show_bug.cgi?id=25362 +CVE-2020-19725 - https://github.com/Z3Prover/z3/issues/3363 +CVE-2020-19726 - https://sourceware.org/bugzilla/show_bug.cgi?id=26240 +CVE-2020-19726 - https://sourceware.org/bugzilla/show_bug.cgi?id=26241 +CVE-2020-19752 - https://github.com/kohler/gifsicle/issues/140 +CVE-2020-19877 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#1 +CVE-2020-19878 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#2 +CVE-2020-19879 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#3 +CVE-2020-19880 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#4 +CVE-2020-19881 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#6 +CVE-2020-19882 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#7 +CVE-2020-19883 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#5 +CVE-2020-19884 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#8 +CVE-2020-19885 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#9 +CVE-2020-19886 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#12 +CVE-2020-19887 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#10 +CVE-2020-19888 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#13 +CVE-2020-19889 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#11 +CVE-2020-19890 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#15 +CVE-2020-19891 - https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#14 +CVE-2020-19897 - https://github.com/wuzhicms/wuzhicms/issues/183 +CVE-2020-19902 - https://github.com/vedees/wcms/issues/3 +CVE-2020-19914 - https://kevinoclam.github.io/blog/2019/07/31/xiunobbs-upload/ +CVE-2020-19915 - https://gist.github.com/feixuezhi/7a1b117e1a4800efb3b6fffe76ca0e97 +CVE-2020-19915 - https://github.com/wuzhicms/wuzhicms/issues/173 +CVE-2020-19949 - https://github.com/yzmcms/yzmcms/issues/21 +CVE-2020-19950 - https://github.com/yzmcms/yzmcms/issues/22 +CVE-2020-19951 - https://github.com/yzmcms/yzmcms/issues/43 +CVE-2020-19962 - https://github.com/zhuxianjin/vuln_repo/blob/master/chaojicms_stored_xss.md +CVE-2020-19964 - https://github.com/gaozhifeng/PHPMyWind +CVE-2020-19964 - https://github.com/gaozhifeng/PHPMyWind/issues/9 +CVE-2020-20021 - https://www.exploit-db.com/exploits/48228 +CVE-2020-20067 - https://github.com/a932278490/ebcms/issues/1 +CVE-2020-20070 - https://github.com/wkeyuan/DWSurvey/issues/48 +CVE-2020-20093 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html +CVE-2020-20093 - https://github.com/zadewg/RIUS +CVE-2020-20094 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html +CVE-2020-20094 - https://github.com/zadewg/RIUS +CVE-2020-20095 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html +CVE-2020-20095 - https://github.com/zadewg/RIUS +CVE-2020-20096 - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html +CVE-2020-20096 - https://github.com/zadewg/RIUS +CVE-2020-20124 - https://github.com/wuzhicms/wuzhicms/issues/188 +CVE-2020-20136 - https://github.com/QuantConnect/Lean/issues/3537 +CVE-2020-20138 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html +CVE-2020-20139 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html +CVE-2020-20140 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html +CVE-2020-20141 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html +CVE-2020-20142 - https://packetstormsecurity.com/files/160604/Flexmonster-Pivot-Table-And-Charts-2.7.17-Cross-Site-Scripting.html +CVE-2020-20184 - https://github.com/liftoff/GateOne/issues/736 +CVE-2020-20211 - http://seclists.org/fulldisclosure/2021/May/0 +CVE-2020-20212 - http://seclists.org/fulldisclosure/2021/May/0 +CVE-2020-20213 - http://seclists.org/fulldisclosure/2021/May/10 +CVE-2020-20214 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html +CVE-2020-20214 - http://seclists.org/fulldisclosure/2021/May/15 +CVE-2020-20215 - http://seclists.org/fulldisclosure/2021/May/10 +CVE-2020-20216 - http://seclists.org/fulldisclosure/2021/May/10 +CVE-2020-20217 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20217/README.md +CVE-2020-20218 - https://seclists.org/fulldisclosure/2021/May/1 +CVE-2020-20219 - https://seclists.org/fulldisclosure/2021/May/2 +CVE-2020-20220 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html +CVE-2020-20220 - http://seclists.org/fulldisclosure/2021/May/23 +CVE-2020-20221 - https://seclists.org/fulldisclosure/2021/May/1 +CVE-2020-20222 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html +CVE-2020-20222 - http://seclists.org/fulldisclosure/2021/May/15 +CVE-2020-20225 - http://seclists.org/fulldisclosure/2021/May/12 +CVE-2020-20227 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html +CVE-2020-20227 - http://seclists.org/fulldisclosure/2021/May/23 +CVE-2020-2023 - https://github.com/kata-containers/runtime/pull/2477 +CVE-2020-20230 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20230/README.md +CVE-2020-20231 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20231/README.md +CVE-2020-20236 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html +CVE-2020-20236 - http://seclists.org/fulldisclosure/2021/May/15 +CVE-2020-20237 - http://packetstormsecurity.com/files/162513/Mikrotik-RouterOS-6.46.5-Memory-Corruption-Assertion-Failure.html +CVE-2020-20237 - http://seclists.org/fulldisclosure/2021/May/15 +CVE-2020-2024 - https://github.com/kata-containers/runtime/issues/2474 +CVE-2020-20245 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html +CVE-2020-20245 - http://seclists.org/fulldisclosure/2021/May/23 +CVE-2020-20246 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html +CVE-2020-20246 - http://seclists.org/fulldisclosure/2021/May/23 +CVE-2020-20248 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20248/README.md +CVE-2020-20249 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20249/README.md +CVE-2020-20250 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20250/README.md +CVE-2020-20252 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2020-20252/README.md +CVE-2020-20253 - http://seclists.org/fulldisclosure/2021/May/14 +CVE-2020-20253 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_4/README.md +CVE-2020-20254 - http://seclists.org/fulldisclosure/2021/May/14 +CVE-2020-20254 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_lcdstat_2/README.md +CVE-2020-20262 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_ipsec/README.md +CVE-2020-20262 - https://seclists.org/fulldisclosure/2021/May/2 +CVE-2020-20264 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_netwatch/README.md +CVE-2020-20264 - https://seclists.org/fulldisclosure/2021/May/11 +CVE-2020-20265 - http://seclists.org/fulldisclosure/2021/May/12 +CVE-2020-20265 - https://seclists.org/fulldisclosure/2021/May/11 +CVE-2020-20266 - https://github.com/cq674350529/pocs_slides/blob/master/pocs/MikroTik/vul_dot1x/README.md +CVE-2020-20266 - https://seclists.org/fulldisclosure/2021/May/11 +CVE-2020-20267 - http://seclists.org/fulldisclosure/2021/May/12 +CVE-2020-20269 - http://packetstormsecurity.com/files/161072/Caret-Editor-4.0.0-rc21-Remote-Code-Execution.html +CVE-2020-20276 - https://arinerron.com/blog/posts/6 +CVE-2020-20277 - http://packetstormsecurity.com/files/167908/uftpd-2.10-Directory-Traversal.html +CVE-2020-20277 - https://arinerron.com/blog/posts/6 +CVE-2020-20285 - https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md +CVE-2020-20335 - https://github.com/antirez/kilo/issues/60 +CVE-2020-20340 - https://github.com/mntn0x/POC/blob/master/S-CMS/S-CMS-SQL%E6%B3%A8%E5%85%A5.md +CVE-2020-20343 - https://github.com/taosir/wtcms/issues/8 +CVE-2020-20344 - https://github.com/taosir/wtcms/issues/9 +CVE-2020-20345 - https://github.com/taosir/wtcms +CVE-2020-20345 - https://github.com/taosir/wtcms/issues/10 +CVE-2020-20347 - https://github.com/taosir/wtcms/issues/11 +CVE-2020-20348 - https://github.com/taosir/wtcms/issues/11 +CVE-2020-20349 - https://github.com/taosir/wtcms/issues/11 +CVE-2020-2035 - https://www.mnemonic.no/blog/introducing-snicat/ +CVE-2020-2036 - https://security.paloaltonetworks.com/CVE-2020-2036 +CVE-2020-2037 - https://security.paloaltonetworks.com/CVE-2020-2037 +CVE-2020-2038 - http://packetstormsecurity.com/files/168008/PAN-OS-10.0-Remote-Code-Execution.html +CVE-2020-2038 - http://packetstormsecurity.com/files/168408/Palo-Alto-Networks-Authenticated-Remote-Code-Execution.html +CVE-2020-2038 - https://security.paloaltonetworks.com/CVE-2020-2038 +CVE-2020-2039 - https://security.paloaltonetworks.com/CVE-2020-2039 +CVE-2020-20412 - https://github.com/stepmania/stepmania/issues/1890 +CVE-2020-20444 - https://github.com/jact/openclinic/issues/8 +CVE-2020-20451 - https://trac.ffmpeg.org/ticket/8094 +CVE-2020-20466 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20467 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20468 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20469 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20470 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20471 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20472 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20473 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20474 - https://github.com/itodaro/WhiteSharkSystem_cve +CVE-2020-20502 - https://github.com/yzmcms/yzmcms/issues/27 +CVE-2020-20514 - https://github.com/magicblack/maccms10/issues/76 +CVE-2020-20521 - https://github.com/Kitesky/KiteCMS/issues/1 +CVE-2020-20522 - https://github.com/Kitesky/KiteCMS/issues/1 +CVE-2020-20582 - https://github.com/sansanyun/mipcms5/issues/5 +CVE-2020-20583 - https://github.com/0xyu/PHP_Learning/issues/1 +CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO +CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO/ +CVE-2020-20584 - https://github.com/baigoStudio/baigoSSO/issues/13 +CVE-2020-20585 - https://github.com/0xyu/PHP_Learning/issues/3 +CVE-2020-20586 - https://github.com/0xyu/PHP_Learning/issues/4 +CVE-2020-20589 - https://github.com/liufee/cms/issues/45 +CVE-2020-20593 - https://github.com/alixiaowei/alixiaowei.github.io/issues/1 +CVE-2020-20595 - https://github.com/lock-upme/OPMS/issues/25 +CVE-2020-20597 - https://github.com/xuhuisheng/lemon/issues/198 +CVE-2020-20598 - https://github.com/xuhuisheng/lemon/issues/199 +CVE-2020-20600 - https://github.com/alixiaowei/cve_test/issues/2 +CVE-2020-20640 - https://www.jianshu.com/p/219755c047a1 +CVE-2020-20642 - https://github.com/eyoucms/eyoucms/issues/5 +CVE-2020-20670 - https://github.com/yilezhu/Czar.Cms/issues/6 +CVE-2020-20671 - https://github.com/Kitesky/KiteCMS/issues/3 +CVE-2020-20672 - https://github.com/Kitesky/KiteCMS/issues/3 +CVE-2020-20693 - https://github.com/GilaCMS/gila/issues/51 +CVE-2020-20695 - https://github.com/GilaCMS/gila/issues/52 +CVE-2020-20703 - https://github.com/vim/vim/issues/5041 +CVE-2020-20726 - https://github.com/GilaCMS/gila/issues/51 +CVE-2020-20740 - https://github.com/enferex/pdfresurrect/issues/14 +CVE-2020-20797 - https://github.com/FlameNET/FlameCMS/issues/26 +CVE-2020-20799 - https://github.com/blackjliuyun/cvetest/issues/1 +CVE-2020-20808 - https://github.com/alorfm/vuln/blob/master/qibosoft_cross_Site_Scripting.md +CVE-2020-20891 - https://trac.ffmpeg.org/ticket/8282 +CVE-2020-20892 - https://trac.ffmpeg.org/ticket/8265 +CVE-2020-20896 - https://trac.ffmpeg.org/ticket/8273 +CVE-2020-20898 - https://trac.ffmpeg.org/ticket/8263 +CVE-2020-20902 - https://trac.ffmpeg.org/ticket/8176 +CVE-2020-20907 - https://github.com/cby234/cve_request/issues/1 +CVE-2020-20907 - https://github.com/cby234/cve_request/issues/2 +CVE-2020-20908 - https://packetstormsecurity.com/files/154691/Akaunting-1.3.17-Cross-Site-Scripting.html +CVE-2020-20943 - https://blog.csdn.net/he_and/article/details/102698171 +CVE-2020-20944 - https://blog.csdn.net/he_and/article/details/102698171 +CVE-2020-20945 - https://blog.csdn.net/he_and/article/details/102698171 +CVE-2020-20946 - https://blog.csdn.net/he_and/article/details/102698171 +CVE-2020-20949 - https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb +CVE-2020-20950 - http://microchip.com +CVE-2020-20950 - https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb +CVE-2020-2096 - http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html +CVE-2020-20971 - https://github.com/TplusSs/PbootCMS/issues/1 +CVE-2020-20975 - https://blog.csdn.net/qq_41770175/article/details/93486383 +CVE-2020-20988 - https://mycvee.blogspot.com/p/xss2.html +CVE-2020-20989 - https://mycvee.blogspot.com/p/csrf.html +CVE-2020-20990 - https://mycvee.blogspot.com/p/xss1.html +CVE-2020-21012 - https://github.com/hitIer/web_test/tree/master/hotel +CVE-2020-21013 - https://github.com/emlog/emlog/issues/52 +CVE-2020-21014 - https://github.com/emlog/emlog/issues/53 +CVE-2020-21016 - https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/GuestWLanSetting_RCE.md +CVE-2020-21016 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-21038 - https://github.com/typecho/typecho/issues/952 +CVE-2020-21046 - https://medium.com/@n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0 +CVE-2020-21048 - https://github.com/saitoha/libsixel/blob/master/ChangeLog +CVE-2020-21048 - https://github.com/saitoha/libsixel/issues/73 +CVE-2020-21049 - https://github.com/saitoha/libsixel/blob/master/ChangeLog +CVE-2020-21049 - https://github.com/saitoha/libsixel/issues/74 +CVE-2020-21050 - https://github.com/saitoha/libsixel/blob/master/ChangeLog +CVE-2020-21050 - https://github.com/saitoha/libsixel/issues/75 +CVE-2020-21058 - https://github.com/typora/typora-issues/issues/2959 +CVE-2020-21060 - https://github.com/gaozhifeng/PHPMyWind/issues/10 +CVE-2020-21066 - https://github.com/axiomatic-systems/Bento4/issues/408 +CVE-2020-21120 - https://github.com/alixiaowei/cve_test/issues/3 +CVE-2020-21126 - https://github.com/Echox1/metinfo_csrf/issues/1 +CVE-2020-21130 - https://github.com/hisiphp/hisiphp/issues/7 +CVE-2020-21139 - https://github.com/Ryan0lb/EC-cloud-e-commerce-system-CVE-application/blob/master/README.md +CVE-2020-21141 - https://github.com/hxcc/just_for_fun/blob/master/ICMS%20CSRF +CVE-2020-21142 - https://bugzilla.ipfire.org/show_bug.cgi?id=12226 +CVE-2020-21146 - https://github.com/liufee/cms/issues/43 +CVE-2020-21147 - https://blog.csdn.net/adminxw/article/details/102881463 +CVE-2020-21147 - https://github.com/alixiaowei/alixiaowei.github.io/issues/2 +CVE-2020-21161 - https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html +CVE-2020-21179 - https://github.com/wclimb/Koa2-blog/issues/40 +CVE-2020-21180 - https://github.com/wclimb/Koa2-blog/issues/41 +CVE-2020-21228 - https://github.com/Cherry-toto/jizhicms +CVE-2020-21236 - https://github.com/wind-cyber/DamiCMS-v6.0.0-have-csrf-and-xss-Vulnerabilities-/blob/master/README.md +CVE-2020-21246 - https://github.com/yongshengli/yiicms/issues/6 +CVE-2020-21268 - https://github.com/easysoft/zentaopms/issues/40 +CVE-2020-21325 - https://github.com/wuzhicms/wuzhicms/issues/188 +CVE-2020-21356 - https://github.com/PopojiCMS/PopojiCMS/issues/23 +CVE-2020-21357 - https://github.com/PopojiCMS/PopojiCMS/issues/24 +CVE-2020-21366 - https://github.com/GreenCMS/GreenCMS/issues/115 +CVE-2020-21400 - https://github.com/gaozhifeng/PHPMyWind/issues/11 +CVE-2020-21480 - https://www.porlockz.com/A-arbitrary-file-write-vulnerability-in-RGCMS-V1-06/ +CVE-2020-21481 - https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-RGCMS-V1-06/ +CVE-2020-21482 - https://www.porlockz.com/A-xss-vulnerability-in-RGCMS-V1-06/ +CVE-2020-21483 - https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-jizhicms-v1-5/ +CVE-2020-21485 - https://github.com/Alluxio/alluxio/issues/10552 +CVE-2020-21493 - https://github.com/wanghaiwei/xiuno-docker/issues/3 +CVE-2020-21494 - https://github.com/wanghaiwei/xiuno-docker/issues/4 +CVE-2020-21495 - https://github.com/wanghaiwei/xiuno-docker/issues/5 +CVE-2020-21496 - https://github.com/wanghaiwei/xiuno-docker/issues/5 +CVE-2020-21503 - https://github.com/caokang/waimai/issues/15 +CVE-2020-21517 - https://github.com/lvyyevd/cms/blob/master/metinfo/metinfo7.0.0.md +CVE-2020-21529 - https://sourceforge.net/p/mcj/tickets/65/ +CVE-2020-21530 - https://sourceforge.net/p/mcj/tickets/61/ +CVE-2020-21531 - https://sourceforge.net/p/mcj/tickets/63/ +CVE-2020-21532 - https://sourceforge.net/p/mcj/tickets/64/ +CVE-2020-21533 - https://sourceforge.net/p/mcj/tickets/59/ +CVE-2020-21534 - https://sourceforge.net/p/mcj/tickets/58/ +CVE-2020-21535 - https://sourceforge.net/p/mcj/tickets/62/ +CVE-2020-21547 - https://github.com/saitoha/libsixel/issues/114 +CVE-2020-21548 - https://github.com/saitoha/libsixel/issues/116 +CVE-2020-21564 - https://github.com/pluck-cms/pluck/issues/83 +CVE-2020-21583 - https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html +CVE-2020-21585 - https://github.com/pwnninja/emlog/issues/1 +CVE-2020-21594 - https://github.com/strukturag/libde265/issues/233 +CVE-2020-21595 - https://github.com/strukturag/libde265/issues/239 +CVE-2020-21596 - https://github.com/strukturag/libde265/issues/236 +CVE-2020-21597 - https://github.com/strukturag/libde265/issues/238 +CVE-2020-21598 - https://github.com/strukturag/libde265/issues/237 +CVE-2020-21599 - https://github.com/strukturag/libde265/issues/235 +CVE-2020-21600 - https://github.com/strukturag/libde265/issues/243 +CVE-2020-21601 - https://github.com/strukturag/libde265/issues/241 +CVE-2020-21602 - https://github.com/strukturag/libde265/issues/242 +CVE-2020-21603 - https://github.com/strukturag/libde265/issues/240 +CVE-2020-21604 - https://github.com/strukturag/libde265/issues/231 +CVE-2020-21605 - https://github.com/strukturag/libde265/issues/234 +CVE-2020-21606 - https://github.com/strukturag/libde265/issues/232 +CVE-2020-21643 - https://github.com/Neeke/HongCMS/issues/15 +CVE-2020-21658 - https://github.com/shadoweb/wdja/issues/10 +CVE-2020-21667 - https://github.com/che-my/fastadmin-tp6/issues/2 +CVE-2020-21675 - https://sourceforge.net/p/mcj/tickets/78/ +CVE-2020-21676 - https://sourceforge.net/p/mcj/tickets/76/ +CVE-2020-21677 - https://github.com/saitoha/libsixel/issues/123 +CVE-2020-21678 - https://sourceforge.net/p/mcj/tickets/71/ +CVE-2020-21679 - https://sourceforge.net/p/graphicsmagick/bugs/619/ +CVE-2020-21680 - https://sourceforge.net/p/mcj/tickets/74/ +CVE-2020-21681 - https://sourceforge.net/p/mcj/tickets/73/ +CVE-2020-21682 - https://sourceforge.net/p/mcj/tickets/72/ +CVE-2020-21683 - https://sourceforge.net/p/mcj/tickets/77/ +CVE-2020-21684 - https://sourceforge.net/p/mcj/tickets/75/ +CVE-2020-21688 - https://trac.ffmpeg.org/ticket/8186 +CVE-2020-21697 - https://trac.ffmpeg.org/ticket/8188 +CVE-2020-21699 - https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx +CVE-2020-21710 - https://bugs.ghostscript.com/show_bug.cgi?id=701843 +CVE-2020-21725 - https://github.com/CoColizdf/CVE/issues/1 +CVE-2020-21726 - https://github.com/CoColizdf/CVE/issues/2 +CVE-2020-21729 - https://github.com/CoColizdf/CVE/issues/3 +CVE-2020-21806 - https://github.com/ectouch/ectouch/issues/5 +CVE-2020-21808 - https://whitehub.net/submissions/1516 +CVE-2020-21809 - https://whitehub.net/submissions/1517 +CVE-2020-21809 - https://whitehub.net/submissions/1518 +CVE-2020-21813 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890969 +CVE-2020-21814 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083 +CVE-2020-21815 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932 +CVE-2020-21816 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 +CVE-2020-21817 - https://github.com/LibreDWG/libredwg/issues/182#issue-547887727 +CVE-2020-21818 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053 +CVE-2020-21819 - https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901 +CVE-2020-21827 - https://github.com/LibreDWG/libredwg/issues/183 +CVE-2020-21830 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493134 +CVE-2020-21831 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267 +CVE-2020-21832 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492612 +CVE-2020-21833 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493364 +CVE-2020-21834 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 +CVE-2020-21835 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046 +CVE-2020-21836 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493437 +CVE-2020-21838 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492816 +CVE-2020-21839 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492707 +CVE-2020-21840 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493513 +CVE-2020-21841 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493775 +CVE-2020-21842 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684 +CVE-2020-21843 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857 +CVE-2020-21844 - https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607 +CVE-2020-21845 - https://vyshnavvizz.blogspot.com/2020/01/html-injection-in-codoforum-v483.html +CVE-2020-21881 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG +CVE-2020-21883 - https://s3curityb3ast.github.io/KSA-Dev-009.txt +CVE-2020-21883 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07140.html +CVE-2020-21884 - https://s3curityb3ast.github.io/KSA-Dev-008.txt +CVE-2020-21884 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07139.html +CVE-2020-21890 - https://bugs.ghostscript.com/show_bug.cgi?id=701846 +CVE-2020-21896 - https://bugs.ghostscript.com/show_bug.cgi?id=701294 +CVE-2020-21913 - https://unicode-org.atlassian.net/browse/ICU-20850 +CVE-2020-21929 - https://github.com/eyoucms/eyoucms/issues/8 +CVE-2020-21930 - https://github.com/eyoucms/eyoucms/issues/9 +CVE-2020-21932 - https://github.com/cc-crack/router/blob/master/motocx2.md +CVE-2020-21932 - https://l0n0l.xyz/post/motocx2/ +CVE-2020-21933 - https://github.com/cc-crack/router/blob/master/motocx2.md +CVE-2020-21933 - https://l0n0l.xyz/post/motocx2/ +CVE-2020-21934 - https://github.com/cc-crack/router/blob/master/motocx2.md +CVE-2020-21934 - https://l0n0l.xyz/post/motocx2/ +CVE-2020-21935 - https://github.com/cc-crack/router/blob/master/motocx2.md +CVE-2020-21935 - https://l0n0l.xyz/post/motocx2/ +CVE-2020-21936 - https://github.com/cc-crack/router/blob/master/motocx2.md +CVE-2020-21936 - https://l0n0l.xyz/post/motocx2/ +CVE-2020-21937 - https://github.com/cc-crack/router/blob/master/motocx2.md +CVE-2020-21937 - https://l0n0l.xyz/post/motocx2/ +CVE-2020-21967 - http://packetstormsecurity.com/files/167742/PrestaShop-1.7.6.7-Cross-Site-Scripting.html +CVE-2020-21976 - https://cxsecurity.com/issue/WLB-2020010143 +CVE-2020-21987 - https://www.exploit-db.com/exploits/47806 +CVE-2020-21987 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5556.php +CVE-2020-21989 - https://www.exploit-db.com/exploits/47808 +CVE-2020-21989 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php +CVE-2020-21990 - https://www.exploit-db.com/exploits/47824 +CVE-2020-21990 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php +CVE-2020-21991 - https://www.exploit-db.com/exploits/47822 +CVE-2020-21991 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5549.php +CVE-2020-21992 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5544.php +CVE-2020-21993 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php +CVE-2020-21994 - https://www.exploit-db.com/exploits/47819 +CVE-2020-21994 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php +CVE-2020-21995 - https://www.exploit-db.com/exploits/47763 +CVE-2020-21995 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.php +CVE-2020-21996 - https://www.exploit-db.com/exploits/47820 +CVE-2020-21996 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php +CVE-2020-21997 - https://www.exploit-db.com/exploits/47596 +CVE-2020-21997 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5541.php +CVE-2020-21998 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php +CVE-2020-21999 - https://www.exploit-db.com/exploits/47066 +CVE-2020-21999 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php +CVE-2020-22000 - https://www.exploit-db.com/exploits/47809 +CVE-2020-22000 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php +CVE-2020-22001 - https://www.exploit-db.com/exploits/47807 +CVE-2020-22001 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php +CVE-2020-22002 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php +CVE-2020-22007 - https://gist.github.com/tanprathan/69fbf6fbac11988e12f44069ec5b18ea#file-cve-2020-22007-txt +CVE-2020-22015 - https://trac.ffmpeg.org/ticket/8190 +CVE-2020-22016 - https://trac.ffmpeg.org/ticket/8183 +CVE-2020-22017 - https://trac.ffmpeg.org/ticket/8309 +CVE-2020-22019 - https://trac.ffmpeg.org/ticket/8241 +CVE-2020-22020 - https://trac.ffmpeg.org/ticket/8239 +CVE-2020-22021 - https://trac.ffmpeg.org/ticket/8240 +CVE-2020-22022 - https://trac.ffmpeg.org/ticket/8264 +CVE-2020-22023 - https://trac.ffmpeg.org/ticket/8244 +CVE-2020-22024 - https://trac.ffmpeg.org/ticket/8310 +CVE-2020-22025 - https://trac.ffmpeg.org/ticket/8260 +CVE-2020-22026 - https://trac.ffmpeg.org/ticket/8317 +CVE-2020-22027 - https://trac.ffmpeg.org/ticket/8242 +CVE-2020-22028 - https://trac.ffmpeg.org/ticket/8274 +CVE-2020-22029 - https://trac.ffmpeg.org/ticket/8250 +CVE-2020-22031 - https://trac.ffmpeg.org/ticket/8243 +CVE-2020-22032 - https://trac.ffmpeg.org/ticket/8275 +CVE-2020-22033 - https://trac.ffmpeg.org/ticket/8246 +CVE-2020-22034 - https://trac.ffmpeg.org/ticket/8236 +CVE-2020-22035 - https://trac.ffmpeg.org/ticket/8262 +CVE-2020-22036 - https://trac.ffmpeg.org/ticket/8261 +CVE-2020-22037 - https://trac.ffmpeg.org/ticket/8281 +CVE-2020-22038 - https://trac.ffmpeg.org/ticket/8285 +CVE-2020-22039 - https://trac.ffmpeg.org/ticket/8302 +CVE-2020-22040 - https://trac.ffmpeg.org/ticket/8283 +CVE-2020-22041 - https://trac.ffmpeg.org/ticket/8296 +CVE-2020-22042 - https://trac.ffmpeg.org/ticket/8267 +CVE-2020-22043 - https://trac.ffmpeg.org/ticket/8284 +CVE-2020-22044 - https://trac.ffmpeg.org/ticket/8295 +CVE-2020-22046 - https://trac.ffmpeg.org/ticket/8294 +CVE-2020-22048 - https://trac.ffmpeg.org/ticket/8303 +CVE-2020-22049 - https://trac.ffmpeg.org/ticket/8314 +CVE-2020-22051 - https://trac.ffmpeg.org/ticket/8313 +CVE-2020-22054 - https://trac.ffmpeg.org/ticket/8315 +CVE-2020-22056 - https://trac.ffmpeg.org/ticket/8304 +CVE-2020-22079 - https://github.com/Lyc-heng/routers/blob/main/routers/stack1.md +CVE-2020-22122 - https://github.com/876054426/vul/blob/master/ljcms_sql.md +CVE-2020-22148 - https://github.com/Piwigo/Piwigo/issues/1157 +CVE-2020-22150 - https://github.com/Piwigo/Piwigo/issues/1158 +CVE-2020-22158 - https://sku11army.blogspot.com/2020/02/ericsson-multiple-stored-reflected-xss.html +CVE-2020-22159 - https://sku11army.blogspot.com/2020/02/evertz-path-transversal-arbitrary-file.html +CVE-2020-22198 - http://www.hackdig.com/?02/hack-8391.htm +CVE-2020-22198 - https://github.com/blindkey/DedeCMSv5/issues/1 +CVE-2020-22200 - https://github.com/blindkey/cve_like/issues/2 +CVE-2020-22201 - https://github.com/blindkey/cve_like/issues/4 +CVE-2020-22203 - https://github.com/blindkey/cve_like/issues/6 +CVE-2020-22208 - https://github.com/blindkey/cve_like/issues/10 +CVE-2020-22209 - https://github.com/blindkey/cve_like/issues/12 +CVE-2020-22210 - https://github.com/blindkey/cve_like/issues/11 +CVE-2020-22211 - https://github.com/blindkey/cve_like/issues/13 +CVE-2020-22249 - https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 +CVE-2020-22251 - https://github.com/phpList/phplist3/issues/660 +CVE-2020-2229 - http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html +CVE-2020-2230 - http://packetstormsecurity.com/files/160443/Jenkins-2.235.3-Cross-Site-Scripting.html +CVE-2020-2231 - http://packetstormsecurity.com/files/160616/Jenkins-2.251-LTS-2.235.3-Cross-Site-Scripting.html +CVE-2020-22312 - https://github.com/wlx65003/HZNUOJ/issues/17 +CVE-2020-22334 - https://github.com/source-trace/beescms/issues/5 +CVE-2020-22352 - https://github.com/gpac/gpac/issues/1423 +CVE-2020-22403 - https://github.com/mrvautin/expressCart/issues/120 +CVE-2020-22421 - https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/74cms.docx +CVE-2020-22425 - https://code610.blogspot.com/2020/04/postauth-sqli-in-centreon-1910-1el7.html, +CVE-2020-22425 - https://github.com/c610/free/ +CVE-2020-22427 - https://code610.blogspot.com/2020/03/postauth-rce-bugs-in-nagiosxi-5611.html +CVE-2020-22428 - https://github.com/matrix +CVE-2020-22428 - https://www.linkedin.com/in/gabrielegristina +CVE-2020-22453 - https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/ +CVE-2020-22475 - https://www.exploit-db.com/exploits/49563 +CVE-2020-22550 - https://gist.github.com/Sp3eD-X/22640377f96340544baf12891f708b8f +CVE-2020-22552 - https://sourceforge.net/p/snap7/discussion/bugfix/thread/456d76fdde/ +CVE-2020-22628 - https://github.com/LibRaw/LibRaw/issues/269 +CVE-2020-22669 - https://github.com/coreruleset/coreruleset/pull/1793 +CVE-2020-22673 - https://github.com/gpac/gpac/issues/1342 +CVE-2020-22674 - https://github.com/gpac/gpac/issues/1346 +CVE-2020-22675 - https://github.com/gpac/gpac/issues/1344 +CVE-2020-22677 - https://github.com/gpac/gpac/issues/1341 +CVE-2020-22678 - https://github.com/gpac/gpac/issues/1339 +CVE-2020-22679 - https://github.com/gpac/gpac/issues/1345 +CVE-2020-22721 - https://syhack.wordpress.com/2020/04/18/pnotes-insecure-file-upload-vulnerability-code-execution/ +CVE-2020-22722 - https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ +CVE-2020-22807 - https://cloud.tencent.com/developer/article/1612208 +CVE-2020-22809 - https://www.exploit-db.com/exploits/48306 +CVE-2020-22818 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html +CVE-2020-22819 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html +CVE-2020-22820 - https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html +CVE-2020-22839 - http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html +CVE-2020-22839 - https://sohambakore.medium.com/b2evolution-cms-reflected-xss-in-tab-type-parameter-in-evoadm-php-38886216cdd3 +CVE-2020-22839 - https://www.exploit-db.com/exploits/49555 +CVE-2020-22840 - http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html +CVE-2020-22840 - https://www.exploit-db.com/exploits/49554 +CVE-2020-22841 - http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-Scripting.html +CVE-2020-22841 - https://www.exploit-db.com/exploits/49551 +CVE-2020-22844 - https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md +CVE-2020-22845 - https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md +CVE-2020-22864 - https://github.com/froala/wysiwyg-editor/issues/3880 +CVE-2020-22864 - https://www.youtube.com/watch?v=WE3b1iSnWJY +CVE-2020-22874 - https://github.com/pcmacdon/jsish/issues/5 +CVE-2020-22875 - https://github.com/pcmacdon/jsish/issues/10 +CVE-2020-22876 - https://github.com/ldarren/QuickJS/issues/11 +CVE-2020-22882 - https://github.com/Moddable-OpenSource/moddable/issues/351 +CVE-2020-22884 - https://github.com/espruino/Espruino/issues/1799 +CVE-2020-22885 - https://github.com/ccxvii/mujs/issues/133 +CVE-2020-22886 - https://github.com/ccxvii/mujs/issues/134 +CVE-2020-22907 - https://github.com/pcmacdon/jsish/issues/16 +CVE-2020-22916 - http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability +CVE-2020-22916 - https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability +CVE-2020-22983 - https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 +CVE-2020-22984 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d +CVE-2020-22985 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d +CVE-2020-22986 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d +CVE-2020-22987 - https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d +CVE-2020-23014 - https://seekurity.com/blog/2020/04/19/admin/advisories/apfell-post-exploitation-red-team-framework-authenticated-cross-site-scripting-vulnerability +CVE-2020-23036 - https://www.vulnerability-lab.com/get_content.php?id=2211 +CVE-2020-23037 - https://www.vulnerability-lab.com/get_content.php?id=2198 +CVE-2020-23038 - https://www.vulnerability-lab.com/get_content.php?id=2205 +CVE-2020-23039 - https://www.vulnerability-lab.com/get_content.php?id=2210 +CVE-2020-23040 - https://www.vulnerability-lab.com/get_content.php?id=2207 +CVE-2020-23041 - https://www.vulnerability-lab.com/get_content.php?id=2204 +CVE-2020-23042 - https://www.vulnerability-lab.com/get_content.php?id=2201 +CVE-2020-23043 - https://www.vulnerability-lab.com/get_content.php?id=2212 +CVE-2020-23044 - https://www.vulnerability-lab.com/get_content.php?id=2195 +CVE-2020-23045 - https://www.vulnerability-lab.com/get_content.php?id=2206 +CVE-2020-23046 - https://www.vulnerability-lab.com/get_content.php?id=2194 +CVE-2020-23047 - https://www.vulnerability-lab.com/get_content.php?id=2206 +CVE-2020-23048 - https://www.vulnerability-lab.com/get_content.php?id=2209 +CVE-2020-23049 - https://www.vulnerability-lab.com/get_content.php?id=2208 +CVE-2020-23050 - https://www.vulnerability-lab.com/get_content.php?id=2215 +CVE-2020-23051 - https://www.vulnerability-lab.com/get_content.php?id=2216 +CVE-2020-23052 - https://www.vulnerability-lab.com/get_content.php?id=2217 +CVE-2020-23054 - https://www.vulnerability-lab.com/get_content.php?id=2189 +CVE-2020-23055 - https://www.vulnerability-lab.com/get_content.php?id=2196 +CVE-2020-23058 - https://www.vulnerability-lab.com/get_content.php?id=2219 +CVE-2020-23060 - https://www.vulnerability-lab.com/get_content.php?id=2236 +CVE-2020-23061 - https://www.vulnerability-lab.com/get_content.php?id=2200 +CVE-2020-23064 - https://snyk.io/vuln/SNYK-JS-JQUERY-565129 +CVE-2020-23069 - https://www.exploit-db.com/exploits/48312 +CVE-2020-23109 - https://github.com/strukturag/libheif/issues/207 +CVE-2020-23127 - https://toandak.blogspot.com/2020/05/csrf-vulnerbility-in-chamilo-lms.html +CVE-2020-23128 - https://toandak.blogspot.com/2020/05/improper-privilege-management-in.html +CVE-2020-23160 - https://github.com/Outpost24/Pyrescom-Termod-PoC +CVE-2020-23160 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device +CVE-2020-23161 - https://github.com/Outpost24/Pyrescom-Termod-PoC +CVE-2020-23161 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device +CVE-2020-23162 - https://github.com/Outpost24/Pyrescom-Termod-PoC +CVE-2020-23162 - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device +CVE-2020-23171 - https://github.com/nim-lang/zip/issues/54 +CVE-2020-23172 - https://github.com/kuba--/zip/issues/123 +CVE-2020-23178 - https://github.com/PHPFusion/PHPFusion/issues/2314 +CVE-2020-23182 - https://github.com/phpfusion/PHPFusion/issues/2329 +CVE-2020-23208 - https://github.com/phpList/phplist3/issues/665 +CVE-2020-23209 - https://github.com/phpList/phplist3/issues/666 +CVE-2020-23214 - https://github.com/phpList/phplist3/issues/669 +CVE-2020-23217 - https://github.com/phpList/phplist3/issues/672 +CVE-2020-23257 - https://github.com/espruino/Espruino/issues/1820 +CVE-2020-23258 - https://github.com/pcmacdon/jsish/issues/12 +CVE-2020-23259 - https://github.com/pcmacdon/jsish/issues/13 +CVE-2020-23260 - https://github.com/pcmacdon/jsish/issues/14 +CVE-2020-23260 - https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1 +CVE-2020-23266 - https://github.com/gpac/gpac/issues/1481 +CVE-2020-23267 - https://github.com/gpac/gpac/issues/1479 +CVE-2020-23269 - https://github.com/gpac/gpac/issues/1482 +CVE-2020-23273 - https://github.com/appneta/tcpreplay/issues/579 +CVE-2020-23283 - https://www.linkedin.com/pulse/descobrindo-usu%C3%A1rios-brute-force-iran/ +CVE-2020-23342 - http://packetstormsecurity.com/files/161048/Anchor-CMS-0.12.7-Cross-Site-Request-Forgery.html +CVE-2020-23363 - https://github.com/Verytops/verydows/issues/17 +CVE-2020-23369 - https://github.com/yzmcms/yzmcms/issues/46 +CVE-2020-23370 - https://github.com/yzmcms/yzmcms/issues/45 +CVE-2020-23371 - https://github.com/nangge/noneCms/issues/30 +CVE-2020-23373 - https://github.com/nangge/noneCms/issues/33 +CVE-2020-23374 - https://github.com/nangge/noneCms/issues/32 +CVE-2020-23376 - https://github.com/nangge/noneCms/issues/35 +CVE-2020-23446 - http://cvewalkthrough.com/variant-unauthenticated-information-disclosure-via-api/ +CVE-2020-23446 - https://tejaspingulkar.blogspot.com/2020/09/cve-2020-23446-verint-workforce.html +CVE-2020-23450 - https://abuyv.com +CVE-2020-23466 - https://www.exploit-db.com/exploits/48522 +CVE-2020-23517 - https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html +CVE-2020-23518 - https://www.exploit-db.com/exploits/47289 +CVE-2020-23522 - http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html +CVE-2020-23522 - https://github.com/pixelimity/pixelimity/issues/20 +CVE-2020-23533 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 +CVE-2020-23534 - https://github.com/gopeak/masterlab/issues/254 +CVE-2020-23539 - https://github.com/pokerfacett/MY_REQUEST/blob/df73fe140655ea44542b03ac186e6c2b47e97540/Realtek%208723ds%20BLE%20SDK%20denial%20of%20service%20attack.md +CVE-2020-23565 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3 +CVE-2020-23566 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/1 +CVE-2020-23567 - https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/2 +CVE-2020-23575 - https://www.exploit-db.com/exploits/48561 +CVE-2020-23580 - https://github.com/DengyigeFeng/vuln/issues/1 +CVE-2020-23595 - https://github.com/yzmcms/yzmcms/issues/47 +CVE-2020-23622 - https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of?tns_redirect=true +CVE-2020-23630 - https://github.com/Pandora1m2/zzcms201910/issues/1 +CVE-2020-23643 - https://github.com/Cherry-toto/jizhicms/issues/29 +CVE-2020-23644 - https://github.com/Cherry-toto/jizhicms/issues/28 +CVE-2020-23648 - https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb +CVE-2020-23653 - https://github.com/zoujingli/ThinkAdmin/issues/238 +CVE-2020-23686 - https://github.com/loadream/AyaCMS/issues/1 +CVE-2020-23705 - https://github.com/rockcarry/ffjpeg/issues/25 +CVE-2020-23706 - https://github.com/brackeen/ok-file-formats/issues/7 +CVE-2020-23707 - https://github.com/brackeen/ok-file-formats/issues/8 +CVE-2020-23710 - https://github.com/LimeSurvey/LimeSurvey/pull/1441#partial-pull-merging +CVE-2020-23715 - https://github.com/luuthehienhbit/LFI-Vulnerability-Webport-CMS-version-1.19.10.17121/blob/master/README.md +CVE-2020-23721 - https://github.com/daylightstudio/FUEL-CMS/issues/559 +CVE-2020-23761 - http://hidden-one.co.in/2021/04/09/cve-2020-23761-stored-xss-vulnerability-in-subrion-cms-version/ +CVE-2020-23762 - http://hidden-one.co.in/2021/04/09/cve-2020-23762-stored-xss-vulnerability-in-the-larsens-calender-plugin-version/ +CVE-2020-23763 - http://hidden-one.co.in/2021/04/09/cve-2020-23763-sql-injection-leading-to-authentication-bypass-in-online-book-store-1-0/ +CVE-2020-23790 - https://github.com/vladvector/vladvector.github.io/blob/master/exploit/2020-07-02-golo-business-listing-city-travel-guide-laravel-theme-v1-1-5.txt +CVE-2020-23814 - https://github.com/xuxueli/xxl-job/issues/1866 +CVE-2020-23824 - https://github.com/V1n1v131r4/CSRF-on-ArGoSoft-Mail-Server/blob/master/README.md +CVE-2020-23826 - https://whiterosezex.blogspot.com/2021/01/cve-2020-23826-rce-vulnerability-in.html +CVE-2020-23828 - https://www.exploit-db.com/exploits/48704 +CVE-2020-23829 - https://www.exploit-db.com/exploits/48702 +CVE-2020-23830 - https://www.exploit-db.com/exploits/48783 +CVE-2020-23831 - https://packetstormsecurity.com/files/158813/Tailor-MS-1.0-Cross-Site-Scripting.html +CVE-2020-23832 - https://github.com/projectworlds32/Car-Rental-Syatem-PHP-MYSQL/archive/master.zip +CVE-2020-23832 - https://packetstormsecurity.com/files/158795/Car-Rental-Management-System-1.0-Cross-Site-Scripting.html +CVE-2020-23833 - https://packetstormsecurity.com/files/158811/House-Rental-1.0-SQL-Injection.html +CVE-2020-23834 - https://www.exploit-db.com/exploits/48789 +CVE-2020-23835 - https://www.exploit-db.com/exploits/48813 +CVE-2020-23836 - https://www.exploit-db.com/exploits/48738 +CVE-2020-23837 - https://www.exploit-db.com/exploits/48745 +CVE-2020-23839 - http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html +CVE-2020-23839 - https://github.com/boku7/CVE-2020-23839 +CVE-2020-23839 - https://www.exploit-db.com/exploits/49726 +CVE-2020-23849 - https://github.com/josdejong/jsoneditor/issues/1029 +CVE-2020-23851 - https://github.com/rockcarry/ffjpeg/issues/27 +CVE-2020-23852 - https://github.com/rockcarry/ffjpeg/issues/28 +CVE-2020-23856 - https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 +CVE-2020-23856 - https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html +CVE-2020-23861 - https://github.com/LibreDWG/libredwg/issues/248 +CVE-2020-23864 - http://daniels-it-blog.blogspot.com/2020/07/iobit-malware-fighter-arbitrary-code.html +CVE-2020-23872 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml +CVE-2020-23872 - https://github.com/kermitt2/pdf2xml/issues/10 +CVE-2020-23873 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml +CVE-2020-23873 - https://github.com/kermitt2/pdf2xml/issues/11 +CVE-2020-23874 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml +CVE-2020-23874 - https://github.com/kermitt2/pdf2xml/issues/12 +CVE-2020-23876 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml +CVE-2020-23876 - https://github.com/kermitt2/pdf2xml/issues/14 +CVE-2020-23877 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml +CVE-2020-23877 - https://github.com/kermitt2/pdf2xml/issues/15 +CVE-2020-23878 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2json +CVE-2020-23878 - https://github.com/flexpaper/pdf2json/issues/45 +CVE-2020-23879 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2json +CVE-2020-23879 - https://github.com/flexpaper/pdf2json/issues/44 +CVE-2020-23910 - https://github.com/vlm/asn1c/issues/396 +CVE-2020-23911 - https://github.com/vlm/asn1c/issues/394 +CVE-2020-23912 - https://github.com/axiomatic-systems/Bento4/issues/540 +CVE-2020-23914 - https://github.com/yhirose/cpp-peglib/issues/121 +CVE-2020-23915 - https://github.com/yhirose/cpp-peglib/issues/122 +CVE-2020-23921 - https://github.com/Samuel-Tyler/fast_ber/issues/30 +CVE-2020-23928 - https://github.com/gpac/gpac/issues/1568 +CVE-2020-23928 - https://github.com/gpac/gpac/issues/1569 +CVE-2020-23930 - https://github.com/gpac/gpac/issues/1565 +CVE-2020-23931 - https://github.com/gpac/gpac/issues/1564 +CVE-2020-23931 - https://github.com/gpac/gpac/issues/1567 +CVE-2020-23932 - https://github.com/gpac/gpac/issues/1566 +CVE-2020-23934 - https://www.exploit-db.com/exploits/48636 +CVE-2020-23935 - http://packetstormsecurity.com/files/165215/Kabir-Alhasan-Student-Management-System-1.0-SQL-Injection.html +CVE-2020-23945 - https://github.com/VictorAlagwu/CMSsite/issues/14 +CVE-2020-23957 - https://jayaramyalla.medium.com/cross-site-scripting-in-pega-cve-2020-23957-16d1c417da5f +CVE-2020-23966 - https://github.com/VictorAlagwu/CMSsite/issues/15 +CVE-2020-23967 - https://www.youtube.com/watch?v=q7Kqi7kE59U +CVE-2020-23971 - https://packetstormsecurity.com/files/156889/Joomla-GMapFP-3.30-Arbitrary-File-Upload.html +CVE-2020-23972 - http://packetstormsecurity.com/files/159072/Joomla-GMapFP-J3.5-J3.5F-Arbitrary-File-Upload.html +CVE-2020-23972 - https://raw.githubusercontent.com/me4yoursecurity/Reports/master/README.md +CVE-2020-23973 - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html +CVE-2020-23974 - https://cxsecurity.com/issue/WLB-2020050071 +CVE-2020-23974 - https://packetstormsecurity.com/files/157599/Create-Project-Manager-1.07-Cross-Site-Scripting-HTML-Injection.html +CVE-2020-23975 - https://cxsecurity.com/issue/WLB-2020030174 +CVE-2020-23975 - https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html +CVE-2020-23976 - https://cxsecurity.com/issue/WLB-2020030174 +CVE-2020-23976 - https://packetstormsecurity.com/files/156948/Webexcels-Ecommerce-CMS-2.x-SQL-Injection-Cross-Site-Scripting.html +CVE-2020-23977 - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html +CVE-2020-23978 - https://cxsecurity.com/issue/WLB-2020030150 +CVE-2020-23978 - https://packetstormsecurity.com/files/156939/Soluzione-Globale-Ecommerce-CMS-1-SQL-Injection.html +CVE-2020-23979 - https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html +CVE-2020-23980 - https://cxsecurity.com/issue/WLB-2020030177 +CVE-2020-23980 - https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html +CVE-2020-23981 - https://packetstormsecurity.com/files/157094/13enforme-CMS-SQL-Injection-Cross-Site-Scripting.html +CVE-2020-23982 - https://cxsecurity.com/issue/WLB-2020030177 +CVE-2020-23982 - https://packetstormsecurity.com/files/156959/DesignMasterEvents-CMS-1.0-SQL-Injection-Cross-Site-Scripting.html +CVE-2020-23983 - https://packetstormsecurity.com/files/157594/iChat-1.6-Cross-Site-Scripting.html +CVE-2020-23984 - https://packetstormsecurity.com/files/157117/Online-Hotel-Booking-System-Pro-1.3-Cross-Site-Scripting.html +CVE-2020-23989 - https://gist.github.com/harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b +CVE-2020-23992 - https://github.com/EmreOvunc/Nagios-XI-Reflected-XSS +CVE-2020-24000 - https://github.com/eyoucms/eyoucms/issues/13 +CVE-2020-24003 - https://www.hdwsec.fr/blog/20200608-skype/ +CVE-2020-24007 - https://github.com/inflixim4be/Brute-Force-on-Umanni-RH +CVE-2020-24008 - https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH +CVE-2020-24026 - https://github.com/jianyan74/TinyShop +CVE-2020-24026 - https://github.com/jianyan74/TinyShop/issues/14 +CVE-2020-24027 - http://lists.live555.com/pipermail/live-devel/2020-July/021662.html +CVE-2020-24033 - https://github.com/M0NsTeRRR/CVE-2020-24033 +CVE-2020-24033 - https://github.com/M0NsTeRRR/S3900-24T4S-CSRF-vulnerability +CVE-2020-24034 - http://packetstormsecurity.com/files/159026/Sagemcom-F-ST-5280-Privilege-Escalation.html +CVE-2020-24034 - http://seclists.org/fulldisclosure/2020/Sep/3 +CVE-2020-24034 - https://seclists.org/fulldisclosure/2020/Sep/3 +CVE-2020-24036 - http://seclists.org/fulldisclosure/2021/Mar/31 +CVE-2020-24036 - https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036 +CVE-2020-24036 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04 +CVE-2020-24038 - https://github.com/Dmitriy-area51/Exploit/tree/master/CVE-2020-24038 +CVE-2020-24045 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-24046 - https://sensepost.com/blog/2020/clash-of-the-spamtitan/ +CVE-2020-24088 - http://blog.rewolf.pl/blog/?p=1630 +CVE-2020-24104 - http://n0hat.blogspot.com/2020/07/stored-cross-site-scripting-xss-at-pix.html +CVE-2020-24119 - https://github.com/upx/upx/issues/388 +CVE-2020-24135 - https://github.com/vedees/wcms/issues/9 +CVE-2020-24136 - https://github.com/vedees/wcms/issues/12 +CVE-2020-24137 - https://github.com/vedees/wcms/issues/7 +CVE-2020-24138 - https://github.com/vedees/wcms/issues/10 +CVE-2020-24139 - https://github.com/vedees/wcms/issues/8 +CVE-2020-24140 - https://github.com/vedees/wcms/issues/11 +CVE-2020-24175 - https://gist.github.com/illikainen/ced14e08e00747fef613ba619bb25bb4 +CVE-2020-24175 - https://illikainen.dev/advisories/014-yz1-izarc +CVE-2020-24186 - http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html +CVE-2020-24186 - http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html +CVE-2020-24186 - http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html +CVE-2020-24186 - https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ +CVE-2020-24187 - https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type +CVE-2020-24193 - https://www.exploit-db.com/exploits/48787 +CVE-2020-24194 - https://cxsecurity.com/issue/WLB-2020090030 +CVE-2020-24195 - https://packetstormsecurity.com/files/158704/Online-Bike-Rental-1.0-Shell-Upload.html +CVE-2020-24196 - https://packetstormsecurity.com/files/158683/Online-Bike-Rental-1.0-Shell-Upload.html +CVE-2020-24208 - https://packetstormsecurity.com/files/158684/Online-Shopping-Alphaware-1.0-SQL-Injection.html +CVE-2020-24208 - https://www.exploit-db.com/exploits/48725 +CVE-2020-24213 - https://github.com/Fluorohydride/ygopro/issues/2314 +CVE-2020-24214 - http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html +CVE-2020-24215 - http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html +CVE-2020-24217 - http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html +CVE-2020-24217 - http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html +CVE-2020-24219 - http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html +CVE-2020-24221 - https://github.com/miniupnp/ngiflib/issues/17 +CVE-2020-24223 - http://packetstormsecurity.com/files/158728/Mara-CMS-7.5-Cross-Site-Scripting.html +CVE-2020-24223 - https://github.com/FreySolarEye/CVE/blob/master/Mara%20CMS%207.5%20-%20Cross%20Site%20Scripting +CVE-2020-24223 - https://www.exploit-db.com/exploits/48777 +CVE-2020-24240 - https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html +CVE-2020-24241 - https://bugzilla.nasm.us/show_bug.cgi?id=3392707 +CVE-2020-24242 - https://bugzilla.nasm.us/show_bug.cgi?id=3392708 +CVE-2020-24265 - https://github.com/appneta/tcpreplay/issues/616 +CVE-2020-24266 - https://github.com/appneta/tcpreplay/issues/617 +CVE-2020-24275 - https://github.com/swoole/swoole-src/pull/3539 +CVE-2020-24285 - https://github.com/SecLoop/CVE/blob/main/telefone_ip_tip200.md +CVE-2020-24297 - https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ +CVE-2020-24301 - https://github.com/jamesagnew/hapi-fhir/issues/2026 +CVE-2020-24303 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01 +CVE-2020-24307 - https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html +CVE-2020-24333 - https://www.arista.com/en/support/advisories-notices +CVE-2020-24342 - http://lua-users.org/lists/lua-l/2020-07/msg00052.html +CVE-2020-24343 - https://github.com/ccxvii/mujs/issues/136 +CVE-2020-24344 - https://github.com/jerryscript-project/jerryscript/issues/3976 +CVE-2020-24345 - https://github.com/jerryscript-project/jerryscript/issues/3977 +CVE-2020-24346 - https://github.com/nginx/njs/issues/325 +CVE-2020-24347 - https://github.com/nginx/njs/issues/323 +CVE-2020-24348 - https://github.com/nginx/njs/issues/322 +CVE-2020-24349 - https://github.com/nginx/njs/issues/324 +CVE-2020-24365 - http://packetstormsecurity.com/files/160136/Gemtek-WVRTM-127ACN-01.01.02.141-Command-Injection.html +CVE-2020-24370 - http://lua-users.org/lists/lua-l/2020-07/msg00324.html +CVE-2020-24372 - https://github.com/LuaJIT/LuaJIT/issues/603 +CVE-2020-24379 - https://github.com/vulnbe/poc-yaws-dav-xxe +CVE-2020-24379 - https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html +CVE-2020-24379 - https://vuln.be/post/yaws-xxe-and-shell-injections/ +CVE-2020-24381 - https://emaragkos.gr/cve-2020-24381/ +CVE-2020-24381 - https://github.com/gunet/openeclass/issues/39 +CVE-2020-24385 - http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:02.txt +CVE-2020-24386 - http://packetstormsecurity.com/files/160842/Dovecot-2.3.11.3-Access-Bypass.html +CVE-2020-24387 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln/ +CVE-2020-24388 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln/ +CVE-2020-24394 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8 +CVE-2020-24394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832 +CVE-2020-24394 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-24395 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-026.txt +CVE-2020-24395 - https://www.syss.de/pentest-blog/ +CVE-2020-24396 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-027.txt +CVE-2020-24396 - https://www.syss.de/pentest-blog/ +CVE-2020-24437 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1156 +CVE-2020-24548 - http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html +CVE-2020-24548 - https://www.youtube.com/watch?v=oDTd-yRxVJ0 +CVE-2020-24549 - https://www.exploit-db.com/exploits/48866 +CVE-2020-24550 - https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/ +CVE-2020-24553 - http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html +CVE-2020-24553 - http://seclists.org/fulldisclosure/2020/Sep/5 +CVE-2020-24553 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-24553 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-24553 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 +CVE-2020-24567 - https://www.cymaera.com/articles/everything.html +CVE-2020-24574 - https://github.com/jtesta/gog_galaxy_client_service_poc +CVE-2020-24574 - https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218 +CVE-2020-24574 - https://www.gog.com/galaxy +CVE-2020-24574 - https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/ +CVE-2020-24576 - https://www.netskope.com +CVE-2020-24577 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ +CVE-2020-24577 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2020-24577 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241 +CVE-2020-24578 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ +CVE-2020-24578 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2020-24579 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ +CVE-2020-24579 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2020-24580 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ +CVE-2020-24580 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2020-24581 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ +CVE-2020-24581 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2020-24583 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-24584 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-24586 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-24587 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-24588 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-24600 - https://cybersecurityworks.com/zerodays/cve-2020-24600-sql-injection-in-capexweb.html +CVE-2020-24601 - https://cybersecurityworks.com/zerodays/cve-2020-24601-ignite-realtime-openfire.html +CVE-2020-24601 - https://issues.igniterealtime.org/browse/OF-1963 +CVE-2020-24602 - https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html +CVE-2020-24602 - https://issues.igniterealtime.org/browse/OF-1963 +CVE-2020-24604 - https://cybersecurityworks.com/zerodays/cve-2020-24604-ignite-realtime-openfire.html +CVE-2020-24604 - https://issues.igniterealtime.org/browse/OF-1963 +CVE-2020-24609 - https://www.exploit-db.com/exploits/48753 +CVE-2020-24609 - https://www.exploit-db.com/exploits/48785 +CVE-2020-24613 - https://research.nccgroup.com/2020/08/24/technical-advisory-wolfssl-tls-1-3-client-man-in-the-middle-attack/ +CVE-2020-24616 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-24616 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-24616 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-24616 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-24616 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-24621 - https://issues.openmrs.org/browse/HTML-730 +CVE-2020-24622 - https://support.sonatype.com/hc/en-us/articles/360053516793 +CVE-2020-24654 - https://kde.org/info/security/advisory-20200827-1.txt +CVE-2020-24700 - http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2020-24700 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html +CVE-2020-24700 - http://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2020-24701 - http://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2020-24701 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html +CVE-2020-24701 - http://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2020-24707 - https://herolab.usd.de/security-advisories/usd-2020-0052/ +CVE-2020-24708 - https://herolab.usd.de/security-advisories/usd-2020-0048/ +CVE-2020-24709 - https://herolab.usd.de/security-advisories/usd-2020-0049/ +CVE-2020-24710 - https://herolab.usd.de/security-advisories/usd-2020-0054/ +CVE-2020-24711 - https://herolab.usd.de/security-advisories/usd-2020-0051/ +CVE-2020-24712 - https://herolab.usd.de/security-advisories/usd-2020-0050/ +CVE-2020-24713 - https://herolab.usd.de/security-advisories/usd-2020-0053/ +CVE-2020-24716 - https://jira.ixsystems.com/browse/NAS-107270 +CVE-2020-24717 - https://jira.ixsystems.com/browse/NAS-107270 +CVE-2020-24721 - http://packetstormsecurity.com/files/159419/Corona-Exposure-Notifications-API-Data-Leakage.html +CVE-2020-24722 - http://packetstormsecurity.com/files/159496/GAEN-Protocol-Metadata-Deanonymization-Risk-Score-Inflation.html +CVE-2020-24723 - https://phpgurukul.com/ +CVE-2020-24723 - https://systemweakness.com/cve-2020-24723-89ea76588286 +CVE-2020-24740 - https://github.com/pluck-cms/pluck/issues/81 +CVE-2020-24750 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-24750 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-24750 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-24750 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-24753 - https://warcollar.com/cve-2020-24753.html +CVE-2020-24755 - https://www.youtube.com/watch?v=T41h4yeh9dk +CVE-2020-24765 - https://github.com/trump88/CVE-2020-24765 +CVE-2020-24772 - https://github.com/Dreamacro/clash/issues/910 +CVE-2020-24786 - https://medium.com/@frycos/another-zoho-manageengine-story-7b472f1515f5 +CVE-2020-24791 - https://github.com/daylightstudio/FUEL-CMS/issues/561 +CVE-2020-24791 - https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt +CVE-2020-24791 - https://www.exploit-db.com/exploits/48778 +CVE-2020-24794 - https://devnet.kentico.com/download/hotfixes +CVE-2020-24821 - https://github.com/aclements/libelfin/issues/52 +CVE-2020-24841 - https://www.exploit-db.com/exploits/48757 +CVE-2020-24842 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-288-01 +CVE-2020-24847 - https://github.com/xtr4nge/FruityWifi/issues/277 +CVE-2020-24860 - http://packetstormsecurity.com/files/159434/CMS-Made-Simple-2.2.14-Cross-Site-Scripting.html +CVE-2020-24860 - https://www.exploit-db.com/exploits/48851 +CVE-2020-24860 - https://www.youtube.com/watch?v=M6D7DmmjLak&t=22s +CVE-2020-24861 - https://www.exploit-db.com/exploits/48850 +CVE-2020-24861 - https://www.youtube.com/watch?v=8IMfD5KGt_U +CVE-2020-24862 - https://www.exploit-db.com/exploits/48752 +CVE-2020-24870 - https://github.com/LibRaw/LibRaw/issues/330 +CVE-2020-24876 - https://www.vaadata.com/blog/hardcoded-secret-leads-to-account-takeover/ +CVE-2020-24881 - http://packetstormsecurity.com/files/160995/osTicket-1.14.2-Server-Side-Request-Forgery.html +CVE-2020-24881 - https://blackbatsec.medium.com/cve-2020-24881-server-side-request-forgery-in-osticket-eea175e147f0 +CVE-2020-24889 - https://github.com/LibRaw/LibRaw/issues/334 +CVE-2020-24890 - https://github.com/LibRaw/LibRaw/issues/335 +CVE-2020-24897 - https://stiltsoft.atlassian.net/browse/VD-2 +CVE-2020-24898 - https://stiltsoft.atlassian.net/browse/VD-1 +CVE-2020-24899 - https://code610.blogspot.com/2020/08/postauth-rce-in-nagios-572.html +CVE-2020-24900 - https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html +CVE-2020-24901 - https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html +CVE-2020-24902 - https://dl.packetstormsecurity.net/1804-exploits/quixplorer241beta-xss.txt +CVE-2020-24903 - https://seclists.org/bugtraq/2016/Mar/104 +CVE-2020-24904 - https://github.com/davesteele/gnome-gmail/issues/84 +CVE-2020-24908 - https://compass-security.com/fileadmin/Research/Advisories/2020-05_CSNC-2020-005_Checkmk_Local_Privilege_Escalation.txt +CVE-2020-24912 - http://seclists.org/fulldisclosure/2021/Mar/30 +CVE-2020-24912 - https://tech.feedyourhead.at/content/QCubed-Cross-Site-Scripting-CVE-2020-24912 +CVE-2020-24912 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 +CVE-2020-24913 - http://seclists.org/fulldisclosure/2021/Mar/30 +CVE-2020-24916 - https://github.com/vulnbe/poc-yaws-cgi-shell-injection +CVE-2020-24916 - https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html +CVE-2020-24916 - https://vuln.be/post/yaws-xxe-and-shell-injections/ +CVE-2020-24918 - https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1 +CVE-2020-24918 - https://www.somersetrecon.com/blog +CVE-2020-24922 - https://github.com/xuxueli/xxl-job/issues/1921 +CVE-2020-24930 - https://github.com/wuzhicms/wuzhicms/issues/191 +CVE-2020-24932 - https://www.exploit-db.com/exploits/48758 +CVE-2020-24939 - https://github.com/stampit-org/supermixer/issues/9 +CVE-2020-24948 - http://packetstormsecurity.com/files/160850/WordPress-Autoptimize-Shell-Upload.html +CVE-2020-24948 - https://wpvulndb.com/vulnerabilities/10372 +CVE-2020-24949 - http://packetstormsecurity.com/files/162852/PHPFusion-9.03.50-Remote-Code-Execution.html +CVE-2020-24955 - https://www.youtube.com/watch?v=jdcqbev-H5I +CVE-2020-24963 - https://medium.com/@ex.mi/php-best-support-system-v3-0-4-authenticated-persistent-xss-dfe6d4a06f75 +CVE-2020-24977 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 +CVE-2020-24977 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-24977 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-24977 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-24978 - https://bugzilla.nasm.us/show_bug.cgi?id=3392712 +CVE-2020-24982 - https://c41nc.co.uk/cve-2020-24982/ +CVE-2020-24983 - https://c41nc.co.uk/cve-2020-24983/ +CVE-2020-24985 - https://c41nc.co.uk/cve-2020-24985/ +CVE-2020-24990 - http://packetstormsecurity.com/files/159699/QSC-Q-SYS-Core-Manager-8.2.1-Directory-Traversal.html +CVE-2020-24994 - https://github.com/libass/libass/issues/422 +CVE-2020-24994 - https://github.com/libass/libass/issues/422#issuecomment-806002919 +CVE-2020-24994 - https://github.com/libass/libass/issues/423 +CVE-2020-24996 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42028 +CVE-2020-24999 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42029 +CVE-2020-25004 - https://www.exploit-db.com/ +CVE-2020-25005 - https://www.exploit-db.com/ +CVE-2020-25006 - https://www.exploit-db.com/ +CVE-2020-25010 - https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25010.md +CVE-2020-25011 - https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25011.md +CVE-2020-25015 - http://packetstormsecurity.com/files/159936/Genexis-Platinum-4410-P4410-V2-1.28-Missing-Access-Control-CSRF.html +CVE-2020-25019 - https://security.stackexchange.com/questions/225799 +CVE-2020-25020 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-25021 - http://packetstormsecurity.com/files/159057/Noise-Java-ChaChaPolyCipherState.encryptWithAd-Insufficient-Boundary-Checks.html +CVE-2020-25021 - http://seclists.org/fulldisclosure/2020/Sep/14 +CVE-2020-25022 - http://packetstormsecurity.com/files/159055/Noise-Java-AESGCMFallbackCipherState.encryptWithAd-Insufficient-Boundary-Checks.html +CVE-2020-25022 - http://seclists.org/fulldisclosure/2020/Sep/11 +CVE-2020-25023 - http://packetstormsecurity.com/files/159056/Noise-Java-AESGCMOnCtrCipherState.encryptWithAd-Insufficient-Boundary-Checks.html +CVE-2020-25023 - http://seclists.org/fulldisclosure/2020/Sep/13 +CVE-2020-25034 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-031.txt +CVE-2020-25042 - http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html +CVE-2020-25042 - https://www.exploit-db.com/exploits/48780 +CVE-2020-25043 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 +CVE-2020-25044 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 +CVE-2020-25045 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 +CVE-2020-25046 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25047 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25048 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25049 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25050 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25051 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25052 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25053 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25054 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25055 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25056 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25068 - https://www.youtube.com/watch?v=CLAHE0qUHXs +CVE-2020-25071 - https://medium.com/@muffydium/a-tale-of-reflected-xss-to-stored-which-ultimately-resulted-into-a-cve-82981f8648d7 +CVE-2020-2510 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25106 - http://packetstormsecurity.com/files/160666/SUPREMO-4.1.3.2348-Privilege-Escalation.html +CVE-2020-25106 - https://seclists.org/fulldisclosure/2020/Dec/42 +CVE-2020-2511 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2512 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2513 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2514 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-25142 - https://gist.github.com/ahpaleus/76aa81ec82644a89c2088ab3ea99f07c +CVE-2020-2515 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2516 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2517 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2518 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2519 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25203 - http://packetstormsecurity.com/files/159264/Framer-Preview-12-Content-Injection.html +CVE-2020-25204 - http://packetstormsecurity.com/files/159747/God-Kings-0.60.1-Notification-Spoofing.html +CVE-2020-25205 - https://labs.f-secure.com/advisories/ +CVE-2020-25206 - https://labs.f-secure.com/advisories/ +CVE-2020-25211 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6 +CVE-2020-25212 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3 +CVE-2020-25212 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21 +CVE-2020-25213 - http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html +CVE-2020-25213 - http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html +CVE-2020-25213 - https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html +CVE-2020-25213 - https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ +CVE-2020-25213 - https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/ +CVE-2020-2522 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-25220 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.194 +CVE-2020-25220 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.233 +CVE-2020-25221 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.7 +CVE-2020-25223 - http://packetstormsecurity.com/files/164697/Sophos-UTM-WebAdmin-SID-Command-Injection.html +CVE-2020-25223 - https://community.sophos.com/b/security-blog +CVE-2020-25223 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-in-sg-utm-webadmin-cve-2020-25223 +CVE-2020-2524 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-25247 - http://seclists.org/fulldisclosure/2020/Oct/9 +CVE-2020-25248 - http://seclists.org/fulldisclosure/2020/Oct/9 +CVE-2020-25248 - https://seclists.org/fulldisclosure/2020/Oct/9 +CVE-2020-25254 - http://seclists.org/fulldisclosure/2020/Oct/9 +CVE-2020-25254 - https://seclists.org/fulldisclosure/2020/Oct/9 +CVE-2020-25265 - https://github.com/refi64/CVE-2020-25265-25266 +CVE-2020-25266 - https://github.com/refi64/CVE-2020-25265-25266 +CVE-2020-25267 - https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620 +CVE-2020-25268 - https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620 +CVE-2020-2527 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25270 - http://packetstormsecurity.com/files/159614/Hostel-Management-System-2.1-Cross-Site-Scripting.html +CVE-2020-25270 - https://phpgurukul.com +CVE-2020-25271 - https://phpgurukul.com +CVE-2020-25275 - http://packetstormsecurity.com/files/160841/Dovecot-2.3.11.3-Denial-Of-Service.html +CVE-2020-25278 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25279 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25280 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-25284 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a +CVE-2020-25285 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8 +CVE-2020-25285 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467 +CVE-2020-25287 - https://github.com/jenaye/pligg/blob/master/README.md +CVE-2020-25288 - https://mantisbt.org/bugs/view.php?id=27275 +CVE-2020-25289 - http://zeifan.my/security/arbitrary%20file/eop/2020/07/21/avast-secureline-vpn-arb-file-eop.html +CVE-2020-25291 - http://zeifan.my/security/rce/heap/2020/09/03/wps-rce-heap.html +CVE-2020-2530 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2531 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2533 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2534 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25343 - https://www.exploit-db.com/exploits/48773 +CVE-2020-2535 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2536 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25362 - https://www.exploit-db.com/exploits/48771 +CVE-2020-25366 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-25367 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-25368 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-2537 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25374 - https://medium.com/@virajmota38/full-path-disclosure-8a9358e5a867 +CVE-2020-2538 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25385 - https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting +CVE-2020-2539 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25398 - https://github.com/h3llraiser/CVE-2020-25398 +CVE-2020-25399 - https://github.com/h3llraiser/CVE-2020-25399 +CVE-2020-2540 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25408 - https://nikhilkumar01.medium.com/cve-2020-25408-97eb7bcc23a6 +CVE-2020-25409 - https://nikhilkumar01.medium.com/cve-2020-25409-5ecbe735c004 +CVE-2020-2541 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25411 - https://nikhilkumar01.medium.com/cve-2020-25411-a245bdf88fb5 +CVE-2020-25412 - https://sourceforge.net/p/gnuplot/bugs/2303/ +CVE-2020-2542 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25427 - https://github.com/gpac/gpac/issues/1406 +CVE-2020-2543 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2544 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25444 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e +CVE-2020-25445 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e +CVE-2020-25449 - https://packetstormsecurity.com/files/159070/Cabot-0.11.12-Cross-Site-Scripting.html +CVE-2020-25449 - https://www.exploit-db.com/exploits/48791 +CVE-2020-25449 - https://www.exploitalert.com/view-details.html?id=36106 +CVE-2020-2545 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25453 - http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html +CVE-2020-25453 - https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389 +CVE-2020-25454 - http://packetstormsecurity.com/files/160107/Grocy-Household-Management-Solution-2.7.1-Cross-Site-Scripting.html +CVE-2020-2546 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25461 - https://github.com/Moddable-OpenSource/moddable/issues/441 +CVE-2020-25462 - https://github.com/Moddable-OpenSource/moddable/issues/432 +CVE-2020-25463 - https://github.com/Moddable-OpenSource/moddable/issues/440 +CVE-2020-25464 - https://github.com/Moddable-OpenSource/moddable/issues/431 +CVE-2020-25465 - https://github.com/Moddable-OpenSource/moddable/issues/442 +CVE-2020-25466 - https://github.com/crmeb/CRMEB/issues/22 +CVE-2020-25467 - https://bugs.launchpad.net/ubuntu/+source/lrzip/+bug/1893641 +CVE-2020-25467 - https://github.com/ckolivas/lrzip/issues/163 +CVE-2020-2547 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25472 - https://news.websec.nl +CVE-2020-25472 - https://websec.nl +CVE-2020-25472 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 +CVE-2020-25473 - https://news.websec.nl/ +CVE-2020-25473 - https://websec.nl/ +CVE-2020-25473 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 +CVE-2020-25474 - https://news.websec.nl +CVE-2020-25474 - https://websec.nl +CVE-2020-25474 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 +CVE-2020-25475 - https://websec.nl/ +CVE-2020-25475 - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 +CVE-2020-2548 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2549 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25494 - http://packetstormsecurity.com/files/160635/SCO-Openserver-5.0.7-Command-Injection.html +CVE-2020-25494 - https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20OS%20Command%20Injection%20Vulnerability +CVE-2020-25495 - http://packetstormsecurity.com/files/160634/SCO-Openserver-5.0.7-Cross-Site-Scripting.html +CVE-2020-25495 - https://github.com/Ramikan/Vulnerabilities/blob/master/SCO%20Openserver%20XSS%20%26%20HTML%20Injection%20vulnerability +CVE-2020-25498 - https://github.com/the-girl-who-lived/CVE-2020-25498 +CVE-2020-25498 - https://youtu.be/qeVHvmS5wtI +CVE-2020-25498 - https://youtu.be/u_6yBIMF74A +CVE-2020-2550 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25506 - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 +CVE-2020-25506 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-25507 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-002.md +CVE-2020-25507 - https://sick.codes/sick-2020-002/ +CVE-2020-2551 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25516 - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0781 +CVE-2020-25516 - https://github.com/piuppi/Proof-of-Concepts/blob/main/WSO2/CVE-2020-25516.md +CVE-2020-2552 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2553 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-25538 - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html +CVE-2020-25538 - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution_30.html +CVE-2020-25540 - http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html +CVE-2020-2555 - http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html +CVE-2020-2555 - http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html +CVE-2020-2555 - http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html +CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2555 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2020-2555 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-25557 - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html +CVE-2020-25557 - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution.html +CVE-2020-2556 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25560 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25560-sapphireims-unauthenticated-remote-command-execution-on-server/ +CVE-2020-25561 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25561-sapphireims-hardcoded-credentials/ +CVE-2020-25562 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25562-sapphireims-csrf/ +CVE-2020-25563 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25563-sapphireims-unauthenticated-remote-command-execution-create-local-admin-on-clients/ +CVE-2020-25564 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25564-sapphireims-unprivileged-user-remote-command-execution-create-local-admin-on-clients/ +CVE-2020-25565 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25565-sapphireims-unprivileged-user-remote-command-execution-on-server/ +CVE-2020-25566 - https://vuln.shellcoder.party/2020/09/19/cve-2020-25566-sapphireims-unauthenticated-account-takeover/ +CVE-2020-2557 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2558 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2559 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25592 - http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html +CVE-2020-25593 - https://www.acronis.com/en-us/blog/ +CVE-2020-2560 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2561 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2562 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2563 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25638 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-25638 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-25638 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-2564 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25641 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124 +CVE-2020-25643 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105 +CVE-2020-25645 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html +CVE-2020-25648 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-25648 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-25648 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-25649 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-25649 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-25649 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-25649 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-2565 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25656 - https://lkml.org/lkml/2020/10/16/84 +CVE-2020-25659 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-25659 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-2566 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25663 - https://bugzilla.redhat.com/show_bug.cgi?id=1891601 +CVE-2020-25663 - https://github.com/ImageMagick/ImageMagick/issues/1723 +CVE-2020-25663 - https://github.com/ImageMagick/ImageMagick/issues/1723#issuecomment-718275153 +CVE-2020-25668 - http://www.openwall.com/lists/oss-security/2020/10/30/1 +CVE-2020-25668 - http://www.openwall.com/lists/oss-security/2020/11/04/3 +CVE-2020-25668 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220 +CVE-2020-25668 - https://www.openwall.com/lists/oss-security/2020/10/30/1, +CVE-2020-25668 - https://www.openwall.com/lists/oss-security/2020/11/04/3, +CVE-2020-25669 - http://www.openwall.com/lists/oss-security/2020/11/05/2 +CVE-2020-25669 - http://www.openwall.com/lists/oss-security/2020/11/20/5 +CVE-2020-25669 - https://www.openwall.com/lists/oss-security/2020/11/05/2, +CVE-2020-25669 - https://www.openwall.com/lists/oss-security/2020/11/20/5, +CVE-2020-2567 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2568 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2569 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2570 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25704 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00 +CVE-2020-2571 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2572 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2573 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25733 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a +CVE-2020-25733 - https://sourceforge.net/projects/webtareas/files/ +CVE-2020-25734 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a +CVE-2020-25734 - https://sourceforge.net/projects/webtareas/files/ +CVE-2020-25735 - https://medium.com/@tehwinsam/webtareas-2-1-c8b406c68c2a +CVE-2020-25735 - https://sourceforge.net/projects/webtareas/files/ +CVE-2020-25736 - http://packetstormsecurity.com/files/170246/Acronis-TrueImage-XPC-Privilege-Escalation.html +CVE-2020-25736 - https://www.acronis.com/en-us/blog/ +CVE-2020-2574 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25744 - https://medium.com/@thebinary0x1/safervpn-for-windows-arbitrary-file-overwrite-dos-bdc88fdb5ead +CVE-2020-25744 - https://www.youtube.com/watch?v=0QdRJdA_aos +CVE-2020-25746 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 +CVE-2020-2575 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-25751 - https://geekwire.eu/2020/09/14/joomla-pago-commerce-2-5-9-0-sql-injection-authenticated/ +CVE-2020-25751 - https://www.exploit-db.com/exploits/48811 +CVE-2020-25752 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a +CVE-2020-25753 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a +CVE-2020-25754 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a +CVE-2020-25755 - https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a +CVE-2020-25757 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/ +CVE-2020-25758 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/ +CVE-2020-25759 - https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/ +CVE-2020-2576 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25760 - http://packetstormsecurity.com/files/159262/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html +CVE-2020-25760 - http://packetstormsecurity.com/files/159637/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html +CVE-2020-25760 - http://seclists.org/fulldisclosure/2020/Sep/43 +CVE-2020-25760 - https://packetstormsecurity.com/files/author/15149/ +CVE-2020-25761 - http://packetstormsecurity.com/files/159263/Visitor-Management-System-In-PHP-1.0-Cross-Site-Scripting.html +CVE-2020-25761 - http://seclists.org/fulldisclosure/2020/Sep/45 +CVE-2020-25761 - https://packetstormsecurity.com/files/author/15149/ +CVE-2020-25762 - http://packetstormsecurity.com/files/159261/Seat-Reservation-System-1.0-SQL-Injection.html +CVE-2020-25762 - http://seclists.org/fulldisclosure/2020/Sep/42 +CVE-2020-25762 - https://packetstormsecurity.com/files/author/15149 +CVE-2020-25763 - http://packetstormsecurity.com/files/159260/Seat-Reservation-System-1.0-Shell-Upload.html +CVE-2020-25763 - http://seclists.org/fulldisclosure/2020/Sep/41 +CVE-2020-25763 - https://packetstormsecurity.com/files/author/15149 +CVE-2020-25765 - https://www.westerndigital.com/support/productsecurity +CVE-2020-25765 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 +CVE-2020-25767 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-25767 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-2577 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2578 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25782 - https://github.com/tezeb/accfly/blob/master/Readme.md +CVE-2020-25783 - https://github.com/tezeb/accfly/blob/master/Readme.md +CVE-2020-25784 - https://github.com/tezeb/accfly/blob/master/Readme.md +CVE-2020-25785 - https://github.com/tezeb/accfly/blob/master/Readme.md +CVE-2020-25786 - https://github.com/sek1th/iot/blob/master/DIR-816L_XSS.md +CVE-2020-25786 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10190 +CVE-2020-25787 - http://packetstormsecurity.com/files/161606/TinyTinyRSS-Remote-Code-Execution.html +CVE-2020-2579 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25790 - http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html +CVE-2020-25790 - http://packetstormsecurity.com/files/159615/Typesetter-CMS-5.1-Remote-Code-Execution.html +CVE-2020-25790 - https://github.com/Typesetter/Typesetter/issues/674 +CVE-2020-2580 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2581 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2582 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25820 - http://packetstormsecurity.com/files/159667/BigBlueButton-2.2.25-File-Disclosure-Server-Side-Request-Forgery.html +CVE-2020-25820 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-005 +CVE-2020-2583 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25830 - https://mantisbt.org/bugs/view.php?id=27304 +CVE-2020-2584 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2585 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25858 - http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities +CVE-2020-25859 - http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities +CVE-2020-2586 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25860 - https://github.com/rauc/rauc/security/advisories/GHSA-cgf3-h62j-w9vv +CVE-2020-25860 - https://www.vdoo.com/blog/cve-2020-25860-significant-vulnerability-discovered-rauc-embedded-firmware-update-framework +CVE-2020-25862 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-25863 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-25866 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-2587 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2588 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25889 - http://packetstormsecurity.com/files/160397/Online-Bus-Booking-System-Project-Using-PHP-MySQL-1.0-SQL-Injection.html +CVE-2020-25889 - http://seclists.org/fulldisclosure/2020/Dec/4 +CVE-2020-25889 - https://seclists.org/fulldisclosure/2020/Dec/4 +CVE-2020-2589 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25890 - https://vitor-santos.medium.com/xss-in-kyocera-printer-ecosys-m2640idw-cf6d3bc525e3 +CVE-2020-2590 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25901 - http://packetstormsecurity.com/files/160631/Spiceworks-7.5-HTTP-Header-Injection.html +CVE-2020-25901 - https://frontend.spiceworks.com/topic/2309457-desktop-host-header-injection-vulnerability +CVE-2020-25905 - https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html +CVE-2020-25905 - https://www.exploit-db.com/exploits/48916 +CVE-2020-2591 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25915 - https://github.com/thinkcmf/thinkcmf/issues/675 +CVE-2020-25917 - http://packetstormsecurity.com/files/160652/Stratodesk-NoTouch-Center-Privilege-Escalation.html +CVE-2020-2592 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25925 - https://ashketchum.medium.com/cross-site-scripting-xss-in-webmail-calender-in-icewarp-webclient-cve-2020-25925-67e1cbc40bd9 +CVE-2020-25926 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-25926 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-25927 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-25927 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-25928 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-25928 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-2593 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2594 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2595 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25950 - https://www.exploit-db.com/exploits/49369 +CVE-2020-25952 - https://phpgurukul.com/ +CVE-2020-25952 - https://systemweakness.com/cve-2020-25952-f60fff8ffac +CVE-2020-25952 - https://www.exploit-db.com/exploits/49052 +CVE-2020-25955 - http://packetstormsecurity.com/files/160398/Student-Management-System-Project-PHP-1.0-Cross-Site-Scripting.html +CVE-2020-25955 - http://seclists.org/fulldisclosure/2020/Dec/4 +CVE-2020-25955 - https://seclists.org/fulldisclosure/2020/Dec/4 +CVE-2020-2596 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25967 - https://www.cnpanda.net/codeaudit/777.html +CVE-2020-2597 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2598 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25985 - https://www.exploit-db.com/exploits/48848 +CVE-2020-25986 - http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html +CVE-2020-25987 - http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html +CVE-2020-25988 - https://medium.com/@niteshsurana/424f0db73129 +CVE-2020-25988 - https://www.exploit-db.com/exploits/49075 +CVE-2020-25988 - https://youtu.be/GOMLavacqSI +CVE-2020-25989 - https://vkas-afk.github.io/vuln-disclosures/ +CVE-2020-2599 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-25990 - https://www.exploit-db.com/exploits/48849 +CVE-2020-2600 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26006 - https://nikhilkumar01.medium.com/cve-2020-26006-31f847e16019 +CVE-2020-2601 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2602 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2603 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2604 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2604 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2020-26045 - https://github.com/daylightstudio/FUEL-CMS/issues/575 +CVE-2020-26048 - https://github.com/CuppaCMS/CuppaCMS/issues/7 +CVE-2020-26049 - https://hardik-solanki.medium.com/html-injection-stored-which-ultimately-resulted-into-a-cve-2020-26049-61c1a47dc2e8 +CVE-2020-2605 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26050 - https://thebinary0x1.medium.com/cve-2020-26050-safervpn-for-windows-local-privilege-escalation-da069bb1373c +CVE-2020-26051 - https://www.exploit-db.com/exploits/48593 +CVE-2020-26052 - https://www.exploit-db.com/exploits/48522 +CVE-2020-2606 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26061 - https://github.com/missing0x00/CVE-2020-26061 +CVE-2020-2607 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2608 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26088 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 +CVE-2020-2609 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2610 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2611 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26116 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-2612 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26124 - http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html +CVE-2020-2613 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26130 - https://github.com/an0ry/advisories +CVE-2020-26131 - https://github.com/an0ry/advisories +CVE-2020-26132 - https://github.com/an0ry/advisories +CVE-2020-26133 - https://github.com/an0ry/advisories +CVE-2020-26137 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-26137 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-26139 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-2614 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26140 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-26141 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-26142 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-26143 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-26144 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-26146 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-26147 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu +CVE-2020-2615 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26153 - https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/ +CVE-2020-2616 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26164 - https://github.com/KDE/kdeconnect-kde/commit/8112729eb0f13e6947984416118531078e65580d +CVE-2020-26165 - http://packetstormsecurity.com/files/160733/qdPM-9.1-PHP-Object-Injection.html +CVE-2020-26165 - http://seclists.org/fulldisclosure/2021/Jan/10 +CVE-2020-26167 - https://github.com/daylightstudio/FUEL-CMS/ +CVE-2020-26168 - https://hazelcast.zendesk.com/hc/en-us/articles/360050161951--IMDG-Enterprise-4-0-4-0-1-4-0-2-LDAP-Authentication-Bypass +CVE-2020-2617 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26171 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26172 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26173 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26174 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26175 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26176 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26177 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-26178 - https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ +CVE-2020-2618 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26184 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-26185 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-2619 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2620 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26200 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221 +CVE-2020-26201 - https://medium.com/csg-govtech/bolstering-security-how-i-breached-a-wifi-mesh-access-point-from-close-proximity-to-uncover-f8f77dc3cd5d +CVE-2020-26201 - https://www.askey.com.tw/ +CVE-2020-26201 - https://www.askey.com.tw/incident_report_notifications.html +CVE-2020-26205 - https://hackerone.com/reports/995995 +CVE-2020-26208 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821 +CVE-2020-26208 - https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc +CVE-2020-26208 - https://github.com/Matthias-Wandel/jhead/issues/7 +CVE-2020-2621 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26217 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-26217 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-26217 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-2622 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26223 - https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status +CVE-2020-2623 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26235 - https://github.com/time-rs/time/issues/293 +CVE-2020-26237 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-26238 - https://github.com/jmrozanec/cron-utils/issues/461 +CVE-2020-2624 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26248 - http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html +CVE-2020-2625 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26251 - https://github.com/open-zaak/open-zaak/blob/master/CHANGELOG.rst#133-2020-12-17 +CVE-2020-26257 - https://github.com/matrix-org/synapse/blob/develop/CHANGES.md#synapse-1231-2020-12-09 +CVE-2020-2626 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2627 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2628 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26280 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-043.txt +CVE-2020-26282 - https://securitylab.github.com/research/bean-validation-RCE +CVE-2020-26287 - https://github.com/hackmdio/codimd/issues/1630 +CVE-2020-26287 - https://github.com/hedgedoc/hedgedoc/commit/58276ebbf4504a682454a3686dcaff88bc1069d4 +CVE-2020-2629 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26299 - https://www.npmjs.com/package/ftp-srv +CVE-2020-2630 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26301 - https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/ +CVE-2020-26302 - https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js +CVE-2020-2631 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26312 - https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh/ +CVE-2020-2632 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2633 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2634 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2635 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2636 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2637 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2638 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2639 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2640 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26409 - https://gitlab.com/gitlab-org/gitlab/-/issues/259626 +CVE-2020-2641 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26418 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-26419 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-2642 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26420 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-26421 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-26422 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-2643 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2644 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2645 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2646 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2647 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2648 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2649 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2650 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26508 - https://www.syss.de/pentest-blog/ +CVE-2020-26509 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt +CVE-2020-2651 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26510 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-033.txt +CVE-2020-26511 - https://wpvulndb.com/vulnerabilities/10418 +CVE-2020-26511 - https://www.wpo365.com/change-log/ +CVE-2020-26515 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-09_CSNC-2020-010-codebeamer_ALM_Insecure-RememberMe.txt +CVE-2020-26516 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-08_CSNC-2020-009-codebeamer_ALM_Missing-CSRF.txt +CVE-2020-2652 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26522 - http://packetstormsecurity.com/files/159520/Garfield-Petshop-2020-10-01-Cross-Site-Request-Forgery.html +CVE-2020-2653 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2654 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26542 - https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/ +CVE-2020-2655 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26554 - http://packetstormsecurity.com/files/160077/MailDepot-2033-2.3.3022-Cross-Site-Scripting.html +CVE-2020-26554 - https://www.syss.de/pentest-blog/syss-2020-037-persistent-cross-site-scripting-schwachstelle-in-reddoxx-maildepot +CVE-2020-26555 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2020-26556 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2020-26557 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2020-26558 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2020-26559 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2020-2656 - http://packetstormsecurity.com/files/155990/Solaris-xlock-Information-Disclosure.html +CVE-2020-2656 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26560 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2020-26561 - https://research.nccgroup.com/2020/10/20/wrt160nl-cve-2020-26561-bof/ +CVE-2020-26563 - https://packetstormsecurity.com/files/163699/ObjectPlanet-Opinio-7.12-Cross-Site-Scripting.html +CVE-2020-26564 - https://packetstormsecurity.com/files/163707/ObjectPlanet-Opinio-7.13-7.14-XML-Injection.html +CVE-2020-26565 - https://packetstormsecurity.com/files/163708/ObjectPlanet-Opinio-7.13-Expression-Language-Injection.html +CVE-2020-26566 - https://github.com/Motion-Project/motion/issues/1227#issuecomment-715927776 +CVE-2020-26567 - http://packetstormsecurity.com/files/159516/D-Link-DSR-250N-Denial-Of-Service.html +CVE-2020-26567 - http://seclists.org/fulldisclosure/2020/Oct/14 +CVE-2020-26567 - https://www.redteam-pentesting.de/advisories/rt-sa-2020-002 +CVE-2020-2657 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26574 - https://adepts.of0x.cc/leostream-xss-to-rce/ +CVE-2020-26574 - https://www.leostream.com/resources/product-lifecycle/ +CVE-2020-26575 - https://gitlab.com/wireshark/wireshark/-/issues/16887 +CVE-2020-26575 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-2658 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26583 - https://seclists.org/fulldisclosure/2020/Oct/17 +CVE-2020-26584 - https://seclists.org/fulldisclosure/2020/Oct/17 +CVE-2020-2659 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26599 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-2660 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26600 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26601 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26602 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26603 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26604 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26605 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26606 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-26607 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-2661 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2662 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26623 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html +CVE-2020-26624 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html +CVE-2020-26625 - https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html +CVE-2020-26627 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html +CVE-2020-26628 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html +CVE-2020-26629 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html +CVE-2020-2663 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26630 - https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html +CVE-2020-2664 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2665 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26652 - https://github.com/aircrack-ng/rtl8812au/issues/730 +CVE-2020-2666 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26668 - https://www.exploit-db.com/exploits/48831 +CVE-2020-26669 - https://www.exploit-db.com/exploits/48831 +CVE-2020-2667 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26670 - https://www.exploit-db.com/exploits/48831 +CVE-2020-26672 - https://wpvulndb.com/vulnerabilities/10272 +CVE-2020-2668 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26682 - https://github.com/libass/libass/issues/431 +CVE-2020-2669 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2670 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26701 - http://packetstormsecurity.com/files/160082/Kaa-IoT-Platform-1.2.0-Cross-Site-Scripting.html +CVE-2020-26705 - https://github.com/darkfoxprime/python-easy_xml/issues/1 +CVE-2020-26707 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-26708 - https://github.com/erinxocon/requests-xml/issues/7 +CVE-2020-26709 - https://github.com/PinaeOS/py-xml/issues/2 +CVE-2020-2671 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26710 - https://github.com/uncmath25/easy-parse/issues/3 +CVE-2020-26712 - https://github.com/vuongdq54/RedCap +CVE-2020-26713 - https://github.com/vuongdq54/RedCap +CVE-2020-2672 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26728 - https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md +CVE-2020-26728 - https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md +CVE-2020-2673 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26732 - https://github.com/swzhouu/CVE-2020-26732 +CVE-2020-26733 - https://github.com/swzhouu/CVE-2020-26733 +CVE-2020-2674 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2675 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2676 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26766 - https://www.exploit-db.com/exploits/49180 +CVE-2020-2677 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26773 - https://packetstormsecurity.com/files/159475/Restaurant-Reservation-System-1.0-SQL-Injection.html +CVE-2020-2678 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2679 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26797 - https://sourceforge.net/p/mediainfo/bugs/1154/ +CVE-2020-2680 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26802 - https://www.exploit-db.com/exploits/48494 +CVE-2020-26806 - https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html +CVE-2020-26808 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2020-26808 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2020-26809 - http://packetstormsecurity.com/files/163146/SAP-Hybris-eCommerce-Information-Disclosure.html +CVE-2020-2681 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26811 - http://packetstormsecurity.com/files/163143/SAP-Hybris-eCommerce-Server-Side-Request-Forgery.html +CVE-2020-2682 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26820 - http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html +CVE-2020-26829 - http://packetstormsecurity.com/files/163166/SAP-Netweaver-JAVA-7.50-Missing-Authorization.html +CVE-2020-2683 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26830 - http://packetstormsecurity.com/files/163161/SAP-Solution-Manager-7.2-Missing-Authorization.html +CVE-2020-26832 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2020-26832 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2020-26836 - http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html +CVE-2020-26837 - http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html +CVE-2020-2684 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2685 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2686 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26867 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/ +CVE-2020-26868 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/ +CVE-2020-26869 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/ +CVE-2020-2687 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26870 - https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d +CVE-2020-26870 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-26878 - https://adepts.of0x.cc +CVE-2020-26878 - https://adepts.of0x.cc/ruckus-vriot-rce/ +CVE-2020-26878 - https://support.ruckuswireless.com/documents +CVE-2020-26878 - https://x-c3ll.github.io +CVE-2020-26879 - https://adepts.of0x.cc +CVE-2020-26879 - https://adepts.of0x.cc/ruckus-vriot-rce/ +CVE-2020-26879 - https://support.ruckuswireless.com/documents +CVE-2020-26879 - https://x-c3ll.github.io +CVE-2020-2688 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26880 - https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420 +CVE-2020-26880 - https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235 +CVE-2020-26882 - https://www.playframework.com/security/vulnerability +CVE-2020-26883 - https://www.playframework.com/security/vulnerability +CVE-2020-26885 - https://2SXC.org/en/blog/post/2sxc-security-notification-2021-001 +CVE-2020-26886 - https://vulnerable.af +CVE-2020-26886 - https://vulnerable.af/posts/cve-2020-26886/ +CVE-2020-26887 - http://packetstormsecurity.com/files/159606/FRITZ-Box-7.20-DNS-Rebinding-Protection-Bypass.html +CVE-2020-26887 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2020-2689 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26899 - https://kb.netgear.com/000062355/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2020-0030 +CVE-2020-2690 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26905 - https://kb.netgear.com/000062349/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0047 +CVE-2020-26907 - https://kb.netgear.com/000062347/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0264 +CVE-2020-2691 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26912 - https://kb.netgear.com/000062341/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2019-0018 +CVE-2020-26913 - https://kb.netgear.com/000062340/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2018-0140 +CVE-2020-26916 - https://kb.netgear.com/000062337/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2019-0012 +CVE-2020-26917 - https://kb.netgear.com/000062336/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Extender-and-Routers-PSV-2018-0242 +CVE-2020-26918 - https://kb.netgear.com/000062335/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Extenders-and-Routers-PSV-2018-0243 +CVE-2020-26919 - https://kb.netgear.com/000062334/Security-Advisory-for-Missing-Function-Level-Access-Control-on-JGS516PE-PSV-2020-0377 +CVE-2020-2692 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26921 - https://kb.netgear.com/000062332/Security-Advisory-for-Authentication-Bypass-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0305 +CVE-2020-26922 - https://kb.netgear.com/000062330/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Wireless-Controllers-PSV-2020-0139 +CVE-2020-26924 - https://kb.netgear.com/000062328/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Wireless-Access-Points-PSV-2020-0141 +CVE-2020-2693 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26930 - https://kb.netgear.com/000062322/Security-Advisory-for-Security-Misconfiguration-on-EX7700-PSV-2020-0109 +CVE-2020-2694 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26943 - https://launchpad.net/bugs/1895688 +CVE-2020-26947 - https://github.com/monero-project/monero-gui/issues/3142#issuecomment-705940446 +CVE-2020-2695 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26950 - http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html +CVE-2020-26950 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675905 +CVE-2020-26953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1656741 +CVE-2020-26959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1669466 +CVE-2020-2696 - http://packetstormsecurity.com/files/155963/SunOS-5.10-Generic_147148-26-Local-Privilege-Escalation.html +CVE-2020-2696 - http://packetstormsecurity.com/files/155991/Common-Desktop-Environment-2.3.1-Buffer-Overflow.html +CVE-2020-2696 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26960 - https://bugzilla.mozilla.org/show_bug.cgi?id=1670358 +CVE-2020-26962 - https://bugzilla.mozilla.org/show_bug.cgi?id=610997 +CVE-2020-26966 - https://bugzilla.mozilla.org/show_bug.cgi?id=1663571 +CVE-2020-2697 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26971 - https://bugzilla.mozilla.org/show_bug.cgi?id=1663466 +CVE-2020-26975 - https://bugzilla.mozilla.org/show_bug.cgi?id=1661071 +CVE-2020-26977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1676311 +CVE-2020-2698 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-26989 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf +CVE-2020-2699 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2700 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2701 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27016 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ +CVE-2020-27017 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ +CVE-2020-27018 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ +CVE-2020-27019 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ +CVE-2020-2702 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27020 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#270421 +CVE-2020-2703 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2704 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2705 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2706 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2707 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2709 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2710 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2711 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2712 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2713 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2714 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27149 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities +CVE-2020-2715 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27150 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities +CVE-2020-27151 - https://bugs.launchpad.net/katacontainers.io/+bug/1878234 +CVE-2020-27151 - https://github.com/kata-containers/kata-containers/releases/tag/2.0.0 +CVE-2020-27152 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.2 +CVE-2020-27152 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77377064c3a94911339f13ce113b3abf265e06da +CVE-2020-27158 - https://www.westerndigital.com/support/productsecurity +CVE-2020-27158 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 +CVE-2020-27159 - https://www.westerndigital.com/support/productsecurity +CVE-2020-27159 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 +CVE-2020-2716 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27160 - https://www.westerndigital.com/support/productsecurity +CVE-2020-27160 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 +CVE-2020-2717 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27170 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2020-27170 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 +CVE-2020-27170 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76 +CVE-2020-27170 - https://www.openwall.com/lists/oss-security/2021/03/19/2 +CVE-2020-27171 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2020-27171 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 +CVE-2020-27171 - https://www.openwall.com/lists/oss-security/2021/03/19/3 +CVE-2020-27176 - https://github.com/marktext/marktext/issues/2360 +CVE-2020-27179 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ +CVE-2020-27179 - https://seclists.org/fulldisclosure/2020/Oct/28 +CVE-2020-2718 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27180 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ +CVE-2020-27180 - https://seclists.org/fulldisclosure/2020/Oct/28 +CVE-2020-27181 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ +CVE-2020-27181 - https://seclists.org/fulldisclosure/2020/Oct/28 +CVE-2020-27182 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ +CVE-2020-27182 - https://seclists.org/fulldisclosure/2020/Oct/28 +CVE-2020-27183 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ +CVE-2020-27183 - https://seclists.org/fulldisclosure/2020/Oct/28 +CVE-2020-27184 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities +CVE-2020-27185 - https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities +CVE-2020-2719 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27191 - https://www.junebug.site/blog/cve-2020-27191-lionwiki-3-2-11-lfi +CVE-2020-27193 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27193 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27193 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-27194 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15 +CVE-2020-27196 - https://www.playframework.com/security/vulnerability +CVE-2020-27197 - http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html +CVE-2020-27197 - https://github.com/eclecticiq/OpenTAXII/issues/176 +CVE-2020-27199 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/magic-home-pro-mobile-application-authentication-bypass-cve-2020-27199/ +CVE-2020-2720 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27207 - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 +CVE-2020-27208 - https://eprint.iacr.org/2021/640 +CVE-2020-27208 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html +CVE-2020-27209 - https://eprint.iacr.org/2021/640 +CVE-2020-27209 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html +CVE-2020-2721 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27211 - https://eprint.iacr.org/2021/640 +CVE-2020-27211 - https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ +CVE-2020-27211 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html +CVE-2020-27212 - https://eprint.iacr.org/2021/640 +CVE-2020-27212 - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html +CVE-2020-27216 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27216 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27216 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-27216 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-27216 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-27218 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-27218 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-2722 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27223 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27224 - https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/ +CVE-2020-27226 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1202 +CVE-2020-27227 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1203 +CVE-2020-27228 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1204 +CVE-2020-27229 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 +CVE-2020-2723 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27230 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 +CVE-2020-27231 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 +CVE-2020-27232 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1206 +CVE-2020-27233 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27234 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27235 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27236 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27237 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27238 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27239 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-2724 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27240 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27241 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207 +CVE-2020-27242 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 +CVE-2020-27243 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 +CVE-2020-27244 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 +CVE-2020-27245 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 +CVE-2020-27246 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 +CVE-2020-27247 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 +CVE-2020-27248 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 +CVE-2020-27249 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 +CVE-2020-2725 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27250 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 +CVE-2020-2726 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2727 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2728 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2729 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2730 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-27301 - https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day +CVE-2020-27302 - https://www.vdoo.com/blog/realtek-wifi-vulnerabilities-zero-day +CVE-2020-2731 - https://www.oracle.com/security-alerts/cpujan2020.html +CVE-2020-2733 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2734 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27348 - https://bugs.launchpad.net/bugs/1901572 +CVE-2020-27349 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1899193 +CVE-2020-2735 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27350 - https://bugs.launchpad.net/bugs/1899193 +CVE-2020-27351 - https://bugs.launchpad.net/bugs/1899193 +CVE-2020-27368 - https://github.com/swzhouu/CVE-2020-27368 +CVE-2020-2737 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27373 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c +CVE-2020-27374 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c +CVE-2020-27375 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c +CVE-2020-27376 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c +CVE-2020-27379 - https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e +CVE-2020-2738 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27383 - https://github.com/FreySolarEye/CVE/blob/master/Battle%20Net%20Launcher%20Local%20Privilege%20Escalation +CVE-2020-27384 - https://github.com/FreySolarEye/CVE/blob/master/Guild%20Wars%202%20-%20Local%20Privilege%20Escalation +CVE-2020-27385 - https://blog.vonahi.io/whats-in-a-re-name/ +CVE-2020-27386 - http://packetstormsecurity.com/files/160411/FlexDotnetCMS-1.5.8-Arbitrary-ASP-File-Upload.html +CVE-2020-27386 - https://blog.vonahi.io/whats-in-a-re-name/ +CVE-2020-27387 - http://packetstormsecurity.com/files/160046/HorizontCMS-1.0.0-beta-Shell-Upload.html +CVE-2020-27387 - https://blog.vonahi.io/whats-in-a-re-name/ +CVE-2020-27388 - http://yourls.com +CVE-2020-2739 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27397 - https://packetstormsecurity.com/files/160337/Online-Matrimonial-Project-1.0-Remote-Code-Execution.html +CVE-2020-2740 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27402 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-004.md +CVE-2020-27402 - https://sick.codes/sick-2020-004/ +CVE-2020-27402 - https://threatpost.com/authentication-bug-android-smart-tv-data-theft/160025/ +CVE-2020-27402 - https://www.cybersecurity-help.cz/vdb/SB2020101404 +CVE-2020-27402 - https://www.securitylab.ru/news/513051.php +CVE-2020-27403 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-009.md +CVE-2020-27403 - https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/ +CVE-2020-27403 - https://sick.codes/sick-2020-009 +CVE-2020-27406 - https://www.exploit-db.com/exploits/48865 +CVE-2020-2741 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27413 - https://cvewalkthrough.com/cve-2020-27413-mahavitaran-android-application-clear-text-password-storage/ +CVE-2020-27414 - https://cvewalkthrough.com/cve-2020-27414-mahavitaran-android-application-insecure-communication-of-sensitive-dat/ +CVE-2020-27416 - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/ +CVE-2020-2742 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27422 - https://packetstormsecurity.com/files/160051/Anuko-Time-Tracker-1.19.23.5311-Password-Reset.html +CVE-2020-27423 - https://packetstormsecurity.com/files/160052/Anuko-Time-Tracker-1.19.23.5311-Missing-Rate-Limiting.html +CVE-2020-2743 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2744 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2745 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27459 - https://github.com/nugmubs/chronoforums-cve/wiki/Stored-XSS-Vulnerability-in-Chronoforum-v2.0.11-(Joomla-plugin) +CVE-2020-2746 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27461 - https://www.exploit-db.com/exploits/48862 +CVE-2020-27467 - https://github.com/ceng-yildirim/LFI-processwire +CVE-2020-2747 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27478 - https://github.com/simplcommerce/SimplCommerce/issues/943 +CVE-2020-2748 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27481 - https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070 +CVE-2020-27484 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0004.md +CVE-2020-27488 - https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/ +CVE-2020-27488 - https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/ +CVE-2020-2749 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2750 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27509 - https://medium.com/@tomhulme_74888/persistent-cross-site-scripting-leading-to-full-account-takeover-on-galaxkey-v5-6-11-4-8bf96be35b54 +CVE-2020-2751 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27511 - https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md +CVE-2020-27515 - https://www.exploit-db.com/exploits/49208 +CVE-2020-27518 - https://jeffs.sh/CVEs/CVE-2020-27518.txt +CVE-2020-2752 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27523 - https://www.youtube.com/watch?v=EGW_M1MqAG0 +CVE-2020-27524 - https://www.youtube.com/watch?v=BQUVgAdhwQs +CVE-2020-2753 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27533 - http://packetstormsecurity.com/files/159772/DedeCMS-5.8-Cross-Site-Scripting.html +CVE-2020-27539 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 +CVE-2020-2754 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-2754 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27540 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 +CVE-2020-27541 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 +CVE-2020-27542 - https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 +CVE-2020-27543 - https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate +CVE-2020-27545 - https://www.prevanders.net/dwarfbug.html#DW202010-001 +CVE-2020-2755 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-2755 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27553 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns +CVE-2020-27554 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns +CVE-2020-27555 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns +CVE-2020-27556 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns +CVE-2020-27557 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns +CVE-2020-27558 - https://infosec.rm-it.de/2020/11/04/basetech-ip-camera-analysis/#vulns +CVE-2020-2756 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-2756 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27568 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#insecure-file-permissions +CVE-2020-27569 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-abitrary-file-write +CVE-2020-2757 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-2757 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27574 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html +CVE-2020-27575 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html +CVE-2020-27576 - https://tvrbk.github.io/cve/2021/03/07/rumpus.html +CVE-2020-2758 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27583 - https://n4nj0.github.io/advisories/ibm-infosphere-java-deserialization/ +CVE-2020-2759 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2760 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27600 - https://github.com/pwnninja/dlink/blob/main/DIR-846_SetMasterWLanSettingsCI.md +CVE-2020-27600 - https://www.dlink.com/en/security-bulletin/ +CVE-2020-2761 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27615 - https://wpdeeply.com/loginizer-before-1-6-4-sqli-injection/ +CVE-2020-27615 - https://wpscan.com/vulnerability/10441 +CVE-2020-27615 - https://www.zdnet.com/article/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/ +CVE-2020-27618 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-27618 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-27619 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-2762 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27621 - https://phabricator.wikimedia.org/T265810 +CVE-2020-2763 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27637 - https://labs.bishopfox.com/advisories/cran-version-4.0.2 +CVE-2020-2764 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-2764 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2765 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27652 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061 +CVE-2020-27653 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061 +CVE-2020-27659 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087 +CVE-2020-2766 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27660 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087 +CVE-2020-27664 - https://github.com/strapi/strapi/pull/8442 +CVE-2020-27664 - https://github.com/strapi/strapi/releases/tag/v3.2.5 +CVE-2020-27665 - https://github.com/strapi/strapi/pull/8439 +CVE-2020-27665 - https://github.com/strapi/strapi/releases/tag/v3.2.5 +CVE-2020-27666 - https://github.com/strapi/strapi/pull/8440 +CVE-2020-27666 - https://github.com/strapi/strapi/releases/tag/v3.2.5 +CVE-2020-2767 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2768 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27687 - https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936 +CVE-2020-27688 - https://github.com/matthiasmaes/CVE-2020-27688 +CVE-2020-27689 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf +CVE-2020-2769 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27690 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf +CVE-2020-27691 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf +CVE-2020-27692 - https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf +CVE-2020-27693 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ +CVE-2020-27694 - https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ +CVE-2020-2770 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2771 - http://packetstormsecurity.com/files/157282/Oracle-Solaris-11.x-10-whodo-w-Buffer-Overflow.html +CVE-2020-2771 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2772 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2773 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-2773 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27735 - https://wshenk.blogspot.com/2021/01/xss-in-wing-ftps-web-interface-cve-2020.html +CVE-2020-2774 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27744 - https://www.westerndigital.com/support/productsecurity/wdc-20007-my-cloud-firmware-version-5-04-114 +CVE-2020-2775 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2776 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2777 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2778 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27783 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27784 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8d5f92b8d30bb4ade76494490c3c065e12411b1 +CVE-2020-27786 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d +CVE-2020-27787 - https://github.com/upx/upx/issues/333 +CVE-2020-27788 - https://github.com/upx/upx/issues/332 +CVE-2020-2779 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27790 - https://github.com/upx/upx/issues/331 +CVE-2020-27792 - https://bugs.ghostscript.com/show_bug.cgi?id=701844 +CVE-2020-27796 - https://github.com/upx/upx/issues/392 +CVE-2020-27797 - https://github.com/upx/upx/issues/390 +CVE-2020-27798 - https://github.com/upx/upx/issues/396 +CVE-2020-27799 - https://github.com/upx/upx/issues/391 +CVE-2020-2780 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27800 - https://github.com/upx/upx/issues/395 +CVE-2020-27801 - https://github.com/upx/upx/issues/394 +CVE-2020-27802 - https://github.com/upx/upx/issues/393 +CVE-2020-2781 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27813 - https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh +CVE-2020-27814 - https://github.com/uclouvain/openjpeg/issues/1283 +CVE-2020-27814 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27815 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c +CVE-2020-2782 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27820 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-27824 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-27828 - https://github.com/jasper-software/jasper/issues/252 +CVE-2020-27829 - https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0 +CVE-2020-2783 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2784 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27841 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27841 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27842 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27842 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27843 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27843 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27844 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27844 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-27845 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-27845 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-2785 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2786 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2787 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27885 - https://www.rodrigofavarini.com.br/cybersecurity/multiple-xss-on-api-manager-3-1-0/ +CVE-2020-2789 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2790 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2791 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2793 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27930 - http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html +CVE-2020-27932 - http://packetstormsecurity.com/files/161295/XNU-Kernel-Turnstiles-Type-Confusion.html +CVE-2020-2794 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2795 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27950 - http://packetstormsecurity.com/files/161296/XNU-Kernel-Mach-Message-Trailers-Memory-Disclosure.html +CVE-2020-27955 - http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html +CVE-2020-27955 - http://packetstormsecurity.com/files/164180/Git-git-lfs-Remote-Code-Execution.html +CVE-2020-27955 - http://seclists.org/fulldisclosure/2020/Nov/1 +CVE-2020-27955 - https://exploitbox.io +CVE-2020-27955 - https://legalhackers.com +CVE-2020-27955 - https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html +CVE-2020-27956 - https://www.exploit-db.com/exploits/48931 +CVE-2020-2796 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2797 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27974 - https://herolab.usd.de/security-advisories/usd-2020-0029/ +CVE-2020-27975 - https://herolab.usd.de/security-advisories/usd-2020-0027/ +CVE-2020-27976 - https://herolab.usd.de/security-advisories/usd-2020-0026/ +CVE-2020-2798 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27980 - https://www.exploit-db.com/exploits/48948 +CVE-2020-27982 - http://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html +CVE-2020-27982 - https://cxsecurity.com/issue/WLB-2020100161 +CVE-2020-2799 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-27992 - https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html +CVE-2020-27993 - https://www.exploit-db.com/exploits/48920 +CVE-2020-27994 - http://packetstormsecurity.com/files/161399/SolarWinds-Serv-U-FTP-Server-15.2.1-Path-Traversal.html +CVE-2020-27994 - http://seclists.org/fulldisclosure/2021/Feb/36 +CVE-2020-27996 - https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET +CVE-2020-27997 - https://securitylab.github.com/advisories/GHSL-2020-138-139-SmartstoreAG-SmartStoreNET +CVE-2020-2800 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28001 - http://packetstormsecurity.com/files/161400/SolarWinds-Serv-U-FTP-Server-15.2.1-Cross-Site-Scripting.html +CVE-2020-28001 - http://seclists.org/fulldisclosure/2021/Feb/37 +CVE-2020-28005 - https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ +CVE-2020-28007 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt +CVE-2020-28008 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt +CVE-2020-28009 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt +CVE-2020-2801 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28010 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt +CVE-2020-28011 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt +CVE-2020-28012 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt +CVE-2020-28013 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt +CVE-2020-28014 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt +CVE-2020-28015 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt +CVE-2020-28016 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt +CVE-2020-28017 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt +CVE-2020-28018 - http://www.openwall.com/lists/oss-security/2021/05/11/5 +CVE-2020-28018 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt +CVE-2020-28019 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt +CVE-2020-2802 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28020 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt +CVE-2020-28021 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt +CVE-2020-28022 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt +CVE-2020-28023 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt +CVE-2020-28024 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt +CVE-2020-28025 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt +CVE-2020-28026 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt +CVE-2020-2803 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28030 - https://gitlab.com/wireshark/wireshark/-/issues/16887 +CVE-2020-28032 - https://wpscan.com/vulnerability/10446 +CVE-2020-28036 - https://wpscan.com/vulnerability/10449 +CVE-2020-28037 - https://wpscan.com/vulnerability/10450 +CVE-2020-28038 - https://blog.ripstech.com +CVE-2020-28039 - https://wpscan.com/vulnerability/10452 +CVE-2020-2804 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28041 - https://github.com/samyk/slipstream +CVE-2020-28041 - https://samy.pl/slipstream/ +CVE-2020-28042 - https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/ +CVE-2020-28047 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/Reflected-XSS.md +CVE-2020-28049 - https://github.com/sddm/sddm/releases +CVE-2020-2805 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28052 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-28052 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-28052 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-28052 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-28054 - https://voidsec.com +CVE-2020-28054 - https://voidsec.com/tivoli-madness/ +CVE-2020-28055 - https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/ +CVE-2020-28055 - https://sick.codes/sick-2020-012 +CVE-2020-2806 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28062 - https://github.com/hisiphp/hisiphp/issues/10 +CVE-2020-2807 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28070 - http://packetstormsecurity.com/files/160583/Alumni-Management-System-1.0-Blind-SQL-Injection.html +CVE-2020-28071 - http://packetstormsecurity.com/files/160591/Alumni-Management-System-1.0-Cross-Site-Scripting.html +CVE-2020-28072 - http://packetstormsecurity.com/files/160508/Alumni-Management-System-1.0-Shell-Upload.html +CVE-2020-28073 - http://packetstormsecurity.com/files/160606/Library-Management-System-1.0-SQL-Injection.html +CVE-2020-28074 - http://packetstormsecurity.com/files/160599/Online-Health-Card-System-1.0-SQL-Injection.html +CVE-2020-2808 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2809 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28091 - http://packetstormsecurity.com/files/160129/xuucms-3-SQL-Injection.html +CVE-2020-28092 - http://packetstormsecurity.com/files/160128/PESCMS-TEAM-2.3.2-Cross-Site-Scripting.html +CVE-2020-28097 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10 +CVE-2020-28097 - https://seclists.org/oss-sec/2020/q3/176 +CVE-2020-2810 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2811 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28115 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/README.md +CVE-2020-28119 - https://github.com/i900008/panexiang.github.io/blob/gh-pages/CVE-2020-28119.md +CVE-2020-2812 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28129 - https://www.exploit-db.com/exploits/48941 +CVE-2020-2813 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28130 - https://www.exploit-db.com/exploits/48928 +CVE-2020-28133 - https://www.exploit-db.com/exploits/48879 +CVE-2020-28136 - https://www.exploit-db.com/exploits/48892 +CVE-2020-28137 - https://www.exploit-db.com/exploits/48972 +CVE-2020-28138 - https://www.exploit-db.com/exploits/48429 +CVE-2020-28139 - https://www.exploit-db.com/exploits/48426 +CVE-2020-2814 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28140 - https://www.exploit-db.com/exploits/48438 +CVE-2020-28141 - https://www.exploit-db.com/exploits/48897 +CVE-2020-28145 - https://github.com/wuzhicms/wuzhicms/issues/191 +CVE-2020-28146 - https://github.com/eyoucms/eyoucms/issues/12 +CVE-2020-28146 - https://www.exploit-db.com/exploits/48530 +CVE-2020-28149 - https://c41nc.co.uk/cve-2020-28149/ +CVE-2020-2815 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28150 - https://c41nc.co.uk/?page_id=85 +CVE-2020-2816 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28163 - https://www.prevanders.net/dwarfbug.html#DW202010-003 +CVE-2020-28169 - http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html +CVE-2020-28169 - https://github.com/fluent/fluentd/issues/3201 +CVE-2020-2817 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28172 - https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py +CVE-2020-28172 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip +CVE-2020-28173 - https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py +CVE-2020-28173 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip +CVE-2020-2818 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28183 - https://www.exploit-db.com/exploits/49032 +CVE-2020-28184 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-28185 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-28186 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-28187 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-28188 - http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html +CVE-2020-28188 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-2819 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28190 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-28196 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-28196 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-28196 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-28198 - https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py +CVE-2020-28198 - https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager +CVE-2020-28199 - https://aramido.de/media/aramido-2020-006-disclosure-amazon-secret-access-key.md +CVE-2020-2820 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28206 - https://justrealstag.medium.com/user-enumeration-improper-restriction-of-excessive-authentication-attempts-in-bitrix-98933a97e0e6 +CVE-2020-28208 - http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html +CVE-2020-28208 - http://seclists.org/fulldisclosure/2021/Jan/32 +CVE-2020-28208 - http://seclists.org/fulldisclosure/2021/Jan/43 +CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/07/1 +CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/08/1 +CVE-2020-28208 - http://www.openwall.com/lists/oss-security/2021/01/13/1 +CVE-2020-28208 - https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt +CVE-2020-28208 - https://trovent.io/security-advisory-2010-01 +CVE-2020-2821 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2822 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2823 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2824 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28241 - https://github.com/maxmind/libmaxminddb/issues/236 +CVE-2020-28243 - https://sec.stealthcopter.com/cve-2020-28243/ +CVE-2020-28249 - https://github.com/fhlip0/JopinXSS +CVE-2020-28249 - https://github.com/laurent22/joplin/releases +CVE-2020-2825 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2826 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28267 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28267 +CVE-2020-28268 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268 +CVE-2020-28269 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269 +CVE-2020-2827 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28270 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270 +CVE-2020-28271 - https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20 +CVE-2020-28271 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271 +CVE-2020-28272 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28272 +CVE-2020-28273 - https://www.whitesourcesoftware.com/vulnerability-database +CVE-2020-28273 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273 +CVE-2020-28276 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28276 +CVE-2020-28277 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28277 +CVE-2020-28278 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28278 +CVE-2020-28279 - https://github.com/sahellebusch/flattenizer/pull/13 +CVE-2020-28279 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28279 +CVE-2020-2828 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28280 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280 +CVE-2020-28281 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281 +CVE-2020-28282 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282 +CVE-2020-2829 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2830 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2831 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2832 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28328 - http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html +CVE-2020-28328 - http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html +CVE-2020-28328 - http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html +CVE-2020-28328 - https://github.com/mcorybillington/SuiteCRM-RCE +CVE-2020-28329 - https://korelogic.com/Resources/Advisories/KL-001-2020-004.txt +CVE-2020-2833 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28330 - https://korelogic.com/Resources/Advisories/KL-001-2020-005.txt +CVE-2020-28331 - http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html +CVE-2020-28331 - https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt +CVE-2020-28332 - http://packetstormsecurity.com/files/160164/Barco-wePresent-Insecure-Firmware-Image.html +CVE-2020-28332 - https://korelogic.com/Resources/Advisories/KL-001-2020-009.txt +CVE-2020-28333 - http://packetstormsecurity.com/files/160161/Barco-wePresent-Authentication-Bypass.html +CVE-2020-28333 - https://korelogic.com/Resources/Advisories/KL-001-2020-006.txt +CVE-2020-28334 - http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-Root-SSH-Password.html +CVE-2020-28334 - https://korelogic.com/Resources/Advisories/KL-001-2020-008.txt +CVE-2020-28337 - http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html +CVE-2020-28337 - https://sl1nki.page/advisories/CVE-2020-28337 +CVE-2020-28337 - https://sl1nki.page/blog/2021/02/01/microweber-zip-slip +CVE-2020-2834 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28340 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-28341 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-28342 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-28343 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-28347 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2019/lao_bomb/lao_bomb.md +CVE-2020-28347 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/minesweeper.md +CVE-2020-28347 - https://github.com/rapid7/metasploit-framework/pull/14365 +CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2019/lao_bomb.md +CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2020/minesweeper.md +CVE-2020-28349 - https://www.cyberark.com/resources/threat-research-blog/lorawan-mqtt-what-to-know-when-securing-your-iot-network +CVE-2020-2835 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28351 - http://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html +CVE-2020-2836 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28361 - https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html +CVE-2020-28362 - https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI +CVE-2020-2837 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28373 - https://github.com/cpeggg/Netgear-upnpd-poc +CVE-2020-28374 - http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html +CVE-2020-28374 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.7 +CVE-2020-2838 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28381 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf +CVE-2020-28382 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf +CVE-2020-28383 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf +CVE-2020-28384 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf +CVE-2020-28386 - https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf +CVE-2020-2839 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2840 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28408 - https://mattschmidt.net/2020/11/10/dundas-persistent-xss/ +CVE-2020-28409 - https://mattschmidt.net/2020/11/10/dundas-persistent-xss/ +CVE-2020-2841 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28413 - http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html +CVE-2020-28413 - https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d +CVE-2020-2842 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28423 - https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392 +CVE-2020-28424 - https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396 +CVE-2020-28425 - https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404 +CVE-2020-28426 - https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458 +CVE-2020-28429 - https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 +CVE-2020-2843 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28433 - https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426 +CVE-2020-28434 - https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430 +CVE-2020-28435 - https://security.snyk.io/vuln/SNYK-JS-FFMPEGSDK-1050429 +CVE-2020-28436 - https://security.snyk.io/vuln/SNYK-JS-GOOGLECLOUDSTORAGECOMMANDS-1050431 +CVE-2020-28437 - https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432 +CVE-2020-28438 - https://security.snyk.io/vuln/SNYK-JS-DEFERREDEXEC-1050433 +CVE-2020-28439 - https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434 +CVE-2020-2844 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28440 - https://snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435 +CVE-2020-28441 - https://security.snyk.io/vuln/SNYK-JS-CONFCFGINI-1048973 +CVE-2020-28442 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1050978 +CVE-2020-28442 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050979 +CVE-2020-28442 - https://snyk.io/vuln/SNYK-JS-JSDATA-1023655 +CVE-2020-28443 - https://security.snyk.io/vuln/SNYK-JS-SONARWRAPPER-1050980 +CVE-2020-28445 - https://security.snyk.io/vuln/SNYK-JS-NPMHELP-1050983 +CVE-2020-28446 - https://security.snyk.io/vuln/SNYK-JS-NTESSERACT-1050982 +CVE-2020-28447 - https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981 +CVE-2020-28448 - https://github.com/evangelion1204/multi-ini/pull/37 +CVE-2020-28448 - https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969 +CVE-2020-28449 - https://snyk.io/vuln/SNYK-JS-DECAL-1051007 +CVE-2020-2845 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28450 - https://snyk.io/vuln/SNYK-JS-DECAL-1051028 +CVE-2020-28451 - https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029 +CVE-2020-28453 - https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031 +CVE-2020-28455 - https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067 +CVE-2020-28456 - https://github.com/s-cart/s-cart/issues/52 +CVE-2020-28457 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-1047342 +CVE-2020-28458 - https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806 +CVE-2020-28459 - https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITDECORATE-1044068 +CVE-2020-2846 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28460 - https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229 +CVE-2020-28461 - https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970 +CVE-2020-28462 - https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971 +CVE-2020-28463 - https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145 +CVE-2020-28464 - https://github.com/korzio/djv/pull/98/files +CVE-2020-28464 - https://snyk.io/vuln/SNYK-JS-DJV-1014545 +CVE-2020-28468 - https://github.com/Gallopsled/pwntools/issues/1427 +CVE-2020-28468 - https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345 +CVE-2020-28469 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093 +CVE-2020-28469 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092 +CVE-2020-28469 - https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905 +CVE-2020-28469 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-2847 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28470 - https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829 +CVE-2020-28471 - https://github.com/steveukx/properties/issues/40 +CVE-2020-28471 - https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968 +CVE-2020-28472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426 +CVE-2020-28472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425 +CVE-2020-28472 - https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424 +CVE-2020-28472 - https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304 +CVE-2020-28473 - https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108 +CVE-2020-28477 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986 +CVE-2020-28477 - https://snyk.io/vuln/SNYK-JS-IMMER-1019369 +CVE-2020-28478 - https://snyk.io/vuln/SNYK-JS-GSAP-1054614 +CVE-2020-28479 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040 +CVE-2020-28479 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039 +CVE-2020-28479 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038 +CVE-2020-2848 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28480 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037 +CVE-2020-28480 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036 +CVE-2020-28480 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444 +CVE-2020-28481 - https://github.com/socketio/socket.io/issues/3671 +CVE-2020-28481 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358 +CVE-2020-28481 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357 +CVE-2020-28481 - https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859 +CVE-2020-28487 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 +CVE-2020-28487 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 +CVE-2020-28487 - https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 +CVE-2020-2849 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28491 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-28493 - https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994 +CVE-2020-28494 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672 +CVE-2020-28495 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671 +CVE-2020-28496 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972 +CVE-2020-28496 - https://snyk.io/vuln/SNYK-JS-THREE-1064931 +CVE-2020-28499 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049 +CVE-2020-28499 - https://snyk.io/vuln/SNYK-JS-MERGE-1042987 +CVE-2020-2850 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896 +CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894 +CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892 +CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895 +CVE-2020-28500 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893 +CVE-2020-28500 - https://snyk.io/vuln/SNYK-JS-LODASH-1018905 +CVE-2020-28500 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-28500 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-28500 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-28500 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-28502 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937 +CVE-2020-28502 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938 +CVE-2020-28502 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935 +CVE-2020-28502 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936 +CVE-2020-28503 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047 +CVE-2020-28503 - https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870 +CVE-2020-2851 - http://packetstormsecurity.com/files/157281/Common-Desktop-Environment-2.3.1-1.6-libDtSvc-Buffer-Overflow.html +CVE-2020-2851 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2852 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2853 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2854 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2855 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2856 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2857 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28574 - https://www.tenable.com/security/research/tra-2020-62 +CVE-2020-28578 - https://www.tenable.com/security/research/tra-2020-63 +CVE-2020-28579 - https://www.tenable.com/security/research/tra-2020-63 +CVE-2020-2858 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28580 - https://www.tenable.com/security/research/tra-2020-63 +CVE-2020-28581 - https://www.tenable.com/security/research/tra-2020-63 +CVE-2020-28587 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210 +CVE-2020-28588 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211 +CVE-2020-28589 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212 +CVE-2020-2859 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28590 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1213 +CVE-2020-28591 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215 +CVE-2020-28592 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1216 +CVE-2020-28593 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1217 +CVE-2020-28594 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1218 +CVE-2020-28595 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219 +CVE-2020-28596 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220 +CVE-2020-28597 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221 +CVE-2020-28598 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1222 +CVE-2020-28599 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223 +CVE-2020-2860 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28600 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1224 +CVE-2020-28601 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28602 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28603 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28604 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28605 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28606 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28607 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28608 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28609 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-2861 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28610 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28611 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28612 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28613 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28614 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28615 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28616 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28617 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28618 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28619 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-2862 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28620 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28621 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28622 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28623 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28624 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28625 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28626 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28627 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28628 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28629 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-2863 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28630 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28631 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28632 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28633 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28634 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28635 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-28636 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-2864 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28647 - https://labs.secforce.com/posts/progress-moveit-transfer-2020.1-stored-xss-cve-2020-28647/ +CVE-2020-28648 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28648 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-2865 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28653 - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html +CVE-2020-28657 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-28657 +CVE-2020-2866 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2867 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28672 - https://github.com/fortest-1/vuln/blob/main/MonoCMS%20Blog/MonoCMS%20Blog%201.0_remote_code_execution.md +CVE-2020-2868 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28687 - https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html +CVE-2020-28688 - https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html +CVE-2020-2869 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28695 - https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b +CVE-2020-2870 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28705 - https://github.com/daylightstudio/FUEL-CMS/issues/576 +CVE-2020-28707 - https://jondow.eu/cve-2020-28707-xss-in-stockdio-historical-chart-plugin-for-wordpress-before-version-281/ +CVE-2020-2871 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28717 - https://github.com/kindsoft/kindeditor/issues/321 +CVE-2020-2872 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28722 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro +CVE-2020-2873 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2874 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2875 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28759 - https://github.com/OAID/Tengine/issues/476 +CVE-2020-2876 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2877 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2878 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2879 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2880 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2881 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2882 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2883 - http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html +CVE-2020-2883 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28838 - https://www.exploit-db.com/exploits/49228 +CVE-2020-2884 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28840 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 +CVE-2020-28841 - https://github.com/datadancer/WinSysVuln/blob/main/DriverGenius-MyDrivers64.md +CVE-2020-28845 - http://the-it-wonders.blogspot.com/2020/11/netskope-csv-injection-in-admin-ui.html +CVE-2020-28849 - https://github.com/ChurchCRM/CRM/issues/5477 +CVE-2020-2885 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28856 - http://packetstormsecurity.com/files/160453/OpenAsset-Digital-Asset-Management-IP-Access-Control-Bypass.html +CVE-2020-28856 - http://seclists.org/fulldisclosure/2020/Dec/17 +CVE-2020-28857 - http://packetstormsecurity.com/files/160455/OpenAsset-Digital-Asset-Management-Cross-Site-Scripting.html +CVE-2020-28857 - http://seclists.org/fulldisclosure/2020/Dec/18 +CVE-2020-28858 - http://packetstormsecurity.com/files/160458/OpenAsset-Digital-Asset-Management-Cross-Site-Request-Forgery.html +CVE-2020-28858 - http://seclists.org/fulldisclosure/2020/Dec/19 +CVE-2020-2886 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28860 - http://packetstormsecurity.com/files/160459/OpenAsset-Digital-Asset-Management-SQL-Injection.html +CVE-2020-28860 - http://seclists.org/fulldisclosure/2020/Dec/21 +CVE-2020-28861 - http://packetstormsecurity.com/files/160457/OpenAsset-Digital-Asset-Management-Insecure-Direct-Object-Reference.html +CVE-2020-28861 - http://seclists.org/fulldisclosure/2020/Dec/22 +CVE-2020-28864 - https://winscp.net/forum/viewtopic.php?t=30085 +CVE-2020-2887 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28870 - https://www.exploit-db.com/exploits/48946 +CVE-2020-28871 - http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html +CVE-2020-28871 - http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html +CVE-2020-28871 - http://packetstormsecurity.com/files/171429/Monitorr-1.7.6m-1.7.7d-Remote-Code-Execution.html +CVE-2020-28871 - https://www.exploit-db.com/exploits/48980 +CVE-2020-28872 - http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-Disclosure-Shell-Upload.html +CVE-2020-28872 - https://www.exploit-db.com/exploits/48981 +CVE-2020-28877 - https://github.com/peanuts62/TP-Link-poc +CVE-2020-2888 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28884 - https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3 +CVE-2020-28885 - https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3 +CVE-2020-2889 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28895 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-28898 - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/1318289409/v2021.2+-+March+2021 +CVE-2020-2890 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28900 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28900 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28901 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28901 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28902 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28902 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28903 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28903 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28904 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28904 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28905 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28905 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28906 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28906 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28907 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28907 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28908 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28908 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28909 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28909 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-2891 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28910 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28910 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28911 - http://packetstormsecurity.com/files/162783/Nagios-XI-Fusion-Privilege-Escalation-Cross-Site-Scripting-Code-Execution.html +CVE-2020-28911 - https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/ +CVE-2020-28915 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15 +CVE-2020-28915 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262 +CVE-2020-28915 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16 +CVE-2020-2892 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28923 - https://www.playframework.com/security/vulnerability +CVE-2020-28926 - https://www.rootshellsecurity.net/remote-heap-corruption-bug-discovery-minidlna/ +CVE-2020-28928 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-28928 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-2893 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28937 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 +CVE-2020-28938 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 +CVE-2020-28939 - https://labs.bishopfox.com/advisories/openclinic-version-0.8.2 +CVE-2020-2894 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28940 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 +CVE-2020-28941 - http://www.openwall.com/lists/oss-security/2020/11/19/5 +CVE-2020-28941 - https://www.openwall.com/lists/oss-security/2020/11/19/3 +CVE-2020-28943 - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html +CVE-2020-28944 - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html +CVE-2020-28945 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html +CVE-2020-28947 - https://github.com/MISP/MISP/commit/626ca544ffb5604ea01bb291f69811668b6b5631 +CVE-2020-28948 - https://github.com/pear/Archive_Tar/issues/33 +CVE-2020-28949 - http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html +CVE-2020-28949 - https://github.com/pear/Archive_Tar/issues/33 +CVE-2020-2895 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28950 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 +CVE-2020-28955 - https://www.vulnerability-lab.com/get_content.php?id=2257 +CVE-2020-28956 - https://www.vulnerability-lab.com/get_content.php?id=2249 +CVE-2020-28957 - https://www.vulnerability-lab.com/get_content.php?id=2241 +CVE-2020-2896 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28960 - https://www.vulnerability-lab.com/get_content.php?id=2259 +CVE-2020-28961 - https://www.vulnerability-lab.com/get_content.php?id=2231 +CVE-2020-28963 - https://www.vulnerability-lab.com/get_content.php?id=2258 +CVE-2020-28964 - https://www.vulnerability-lab.com/get_content.php?id=2236 +CVE-2020-28967 - https://www.vulnerability-lab.com/get_content.php?id=2248 +CVE-2020-28968 - https://www.vulnerability-lab.com/get_content.php?id=2244 +CVE-2020-2897 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28970 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 +CVE-2020-28971 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 +CVE-2020-28974 - http://www.openwall.com/lists/oss-security/2020/11/25/1 +CVE-2020-28974 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7 +CVE-2020-28974 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804 +CVE-2020-28974 - https://seclists.org/oss-sec/2020/q4/104 +CVE-2020-28975 - http://packetstormsecurity.com/files/160281/SciKit-Learn-0.23.2-Denial-Of-Service.html +CVE-2020-28975 - https://github.com/scikit-learn/scikit-learn/issues/18891 +CVE-2020-28976 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html +CVE-2020-28977 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html +CVE-2020-28978 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html +CVE-2020-2898 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2899 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-28993 - https://www.exploit-db.com/exploits/49124 +CVE-2020-28994 - https://gist.github.com/wes4m/e32080b02c2cd668d50eeac66613ca1d +CVE-2020-2900 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29007 - https://github.com/seqred-s-a/cve-2020-29007 +CVE-2020-2901 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29013 - https://fortiguard.com/advisory/FG-IR-20-178 +CVE-2020-2902 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29020 - https://www.secomea.com/support/cybersecurity-advisory/#3217 +CVE-2020-29021 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2020-29022 - https://www.secomea.com/support/cybersecurity-advisory/#2923 +CVE-2020-29023 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2020-29023 - https://www.secomea.com/support/cybersecurity-advisory/#2418 +CVE-2020-29024 - https://www.secomea.com/support/cybersecurity-advisory/#2418 +CVE-2020-29025 - https://www.secomea.com/support/cybersecurity-advisory/#3042 +CVE-2020-29026 - https://www.secomea.com/support/cybersecurity-advisory/#2918 +CVE-2020-29027 - https://www.secomea.com/support/cybersecurity-advisory/#3042 +CVE-2020-29028 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2020-29029 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2020-2903 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29030 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2020-29031 - https://www.secomea.com/support/cybersecurity-advisory/#2920 +CVE-2020-29032 - https://www.secomea.com/support/cybersecurity-advisory/#3737 +CVE-2020-29032 - https://www.tenable.com/security/research/tra-2021-06 +CVE-2020-2904 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29042 - http://packetstormsecurity.com/files/160238/BigBlueButton-2.2.29-Brute-Force.html +CVE-2020-29043 - http://packetstormsecurity.com/files/160239/BigBlueButton-2.2.29-E-mail-Validation-Bypass.html +CVE-2020-2905 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29053 - https://grimthereaperteam.medium.com/hrsale-v-2-0-0-reflected-cross-site-scripting-17a5617e2c6e +CVE-2020-2906 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2907 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29071 - https://lean0x2f.github.io/liquidfiles_advisory +CVE-2020-29072 - https://lean0x2f.github.io/liquidfiles_advisory +CVE-2020-2908 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2909 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2910 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2911 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2912 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29127 - http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html +CVE-2020-2913 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29134 - https://systemweakness.com/cve-2020-29134-totvs-fluig-platform-f298ea84b507 +CVE-2020-29134 - https://www.exploit-db.com/exploits/49622 +CVE-2020-29138 - https://medium.com/@alexandrevvo/improper-access-control-in-the-sagemcom-router-model-f-st3486-net-797968e8adc8 +CVE-2020-2914 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29144 - http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html +CVE-2020-29145 - http://the-it-wonders.blogspot.com/2020/01/ericsson-bscs-ix-r18-billing-rating.html +CVE-2020-2915 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29163 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d +CVE-2020-29164 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d +CVE-2020-29165 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d +CVE-2020-29166 - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d +CVE-2020-29168 - https://www.exploit-db.com/exploits/49059 +CVE-2020-29189 - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ +CVE-2020-2920 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29203 - https://github.com/armink/struct2json/issues/13 +CVE-2020-29204 - https://github.com/xuxueli/xxl-job/issues/2083 +CVE-2020-29205 - https://nikhilkumar01.medium.com/cve-2020-29205-a7ab5cbcd156 +CVE-2020-29205 - https://www.exploit-db.com/exploits/48969 +CVE-2020-2921 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29214 - https://www.exploit-db.com/exploits/48883 +CVE-2020-29215 - https://www.exploit-db.com/exploits/48881 +CVE-2020-2922 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29227 - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 +CVE-2020-29228 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29228.md +CVE-2020-2923 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29230 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29230.md +CVE-2020-29231 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29231.md +CVE-2020-29233 - https://www.exploit-db.com/exploits/49085 +CVE-2020-29238 - http://packetstormsecurity.com/files/162152/ExpressVPN-VPN-Router-1.0-Integer-Overflow.html +CVE-2020-29239 - https://www.exploit-db.com/exploits/49159 +CVE-2020-2924 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29240 - https://www.exploit-db.com/exploits/49137 +CVE-2020-29247 - https://systemweakness.com/cve-2020-29247-wondercms-3-1-3-page-persistent-cross-site-scripting-3dd2bb210beb +CVE-2020-29247 - https://www.exploit-db.com/exploits/49102 +CVE-2020-2925 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29254 - https://youtu.be/Uc3sRBitu50 +CVE-2020-29257 - https://asfiyashaikh20.medium.com/exploit-for-cve-2020-29257-reflected-cross-site-scripting-xss-vulnerability-4a7bf9ae7d80 +CVE-2020-29258 - https://asfiyashaikh20.medium.com/exploit-for-cve-2020-29258-reflected-cross-site-scripting-xss-vulnerability-957f365a1f3b +CVE-2020-29259 - https://asfiyashaikh20.medium.com/cve-2020-29259-persistent-xss-2ef63cc5cee6 +CVE-2020-2926 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2927 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29279 - https://github.com/BigTiger2020/74CMS/blob/main/README.md +CVE-2020-2928 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29280 - https://github.com/BigTiger2020/Victor-CMS-/blob/main/README.md +CVE-2020-29280 - https://www.exploit-db.com/exploits/48734 +CVE-2020-29282 - https://github.com/BigTiger2020/BloodX-CMS/blob/main/README.md +CVE-2020-29282 - https://www.exploit-db.com/exploits/48786 +CVE-2020-29283 - https://github.com/BigTiger2020/Online-Doctor-Appointment-Booking-System-PHP/blob/main/README.md +CVE-2020-29284 - https://www.exploit-db.com/exploits/48984 +CVE-2020-29285 - https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md +CVE-2020-29287 - https://www.exploit-db.com/exploits/49056 +CVE-2020-29288 - https://www.exploit-db.com/exploits/48936 +CVE-2020-2929 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2930 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29303 - http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html +CVE-2020-29303 - http://seclists.org/fulldisclosure/2020/Dec/14 +CVE-2020-29304 - http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html +CVE-2020-29304 - http://seclists.org/fulldisclosure/2020/Dec/15 +CVE-2020-2931 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29315 - https://github.com/zoujingli/ThinkAdmin/issues/255 +CVE-2020-2932 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29321 - https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html +CVE-2020-29322 - https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html +CVE-2020-29323 - https://cybersecurityworks.com/zerodays/cve-2020-29323-telnet-hardcoded-credentials.html +CVE-2020-29324 - https://cybersecurityworks.com/zerodays/cve-2020-29324-d-link-router-dir-895l-mfc-telnet-hardcoded-credentials.html +CVE-2020-2933 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2934 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2934 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-2935 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2936 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29363 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-29364 - https://github.com/aslanemre/CVE-2020-29364/blob/main/CVE-2020-29364 +CVE-2020-29368 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.5 +CVE-2020-29368 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c444eb564fb16645c172d550359cb3d75fe8a040 +CVE-2020-29369 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.11 +CVE-2020-29369 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=246c320a8cfe0b11d81a4af38fa9985ef0cc9a4c +CVE-2020-2937 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29370 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd4d9c7d0c71866ec0c2825189ebd2ce35bd95b8 +CVE-2020-29371 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.4 +CVE-2020-29371 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2935e0a3cec1ffa558eea90db6279cff83aa3592 +CVE-2020-29371 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcf85fcedfdd17911982a3e3564fcfec7b01eebd +CVE-2020-29372 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2020-29372 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 +CVE-2020-29372 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0c4d1e176eeb614dc8734fc3ace34292771f11 +CVE-2020-29373 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 +CVE-2020-29373 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d30cdfbca316dadd099c3ca0d739c +CVE-2020-29374 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2020-29374 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3 +CVE-2020-29374 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f +CVE-2020-2938 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29384 - https://gist.github.com/mmmdzz/03df5177afd04b32ac190eb7907f3834 +CVE-2020-2939 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29392 - https://i.blackhat.com/asia-20/Friday/asia-20-Loke-Patching-Loopholes-Finding-Backdoors-In-Applications.pdf +CVE-2020-29394 - https://github.com/GENIVI/dlt-daemon/issues/274 +CVE-2020-29395 - http://packetstormsecurity.com/files/160282/WordPress-EventON-Calendar-3.0.5-Cross-Site-Scripting.html +CVE-2020-29396 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-2940 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2941 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2942 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2943 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29436 - https://support.sonatype.com/hc/en-us/articles/1500000415082-CVE-2020-29436-Nexus-Repository-Manager-3-XML-External-Entities-injection-2020-12-15 +CVE-2020-29437 - https://github.com/orangehrm/orangehrm/issues/695 +CVE-2020-29437 - https://www.horizon3.ai/disclosures/orangehrm-sqli.html +CVE-2020-2944 - http://packetstormsecurity.com/files/157280/Common-Desktop-Environment-1.6-Local-Privilege-Escalation.html +CVE-2020-2944 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2945 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29456 - https://github.com/ciur/papermerge/issues/228 +CVE-2020-29457 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf +CVE-2020-29458 - https://www.exploit-db.com/exploits/48907 +CVE-2020-2946 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29469 - https://www.exploit-db.com/exploits/49164 +CVE-2020-2947 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29470 - https://www.exploit-db.com/exploits/49099 +CVE-2020-29471 - https://www.exploit-db.com/exploits/49098 +CVE-2020-29472 - https://systemweakness.com/cve-2020-29472-under-construction-page-with-cpanel-1-0-sql-injection-18a6508c9683 +CVE-2020-29472 - https://www.exploit-db.com/exploits/49150 +CVE-2020-29474 - https://systemweakness.com/cve-2020-29474-egavilanmedia-address-book-1-0-exploit-sqli-auth-bypass-228cd4864262 +CVE-2020-29474 - https://www.exploit-db.com/exploits/49182 +CVE-2020-29475 - https://www.exploit-db.com/exploits/49093 +CVE-2020-29477 - https://www.exploit-db.com/exploits/49188 +CVE-2020-2949 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29499 - https://www.dell.com/support/kbdoc/000180775 +CVE-2020-2950 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29500 - https://www.dell.com/support/kbdoc/000180775 +CVE-2020-29501 - https://www.dell.com/support/kbdoc/000180775 +CVE-2020-29502 - https://www.dell.com/support/kbdoc/000180775 +CVE-2020-29503 - https://www.dell.com/support/kbdoc/000180775 +CVE-2020-29505 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-29506 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-29507 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-29508 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-2951 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2952 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29529 - https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug +CVE-2020-2953 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29534 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.3 +CVE-2020-29534 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f2122045b946241a9e549c2a76cea54fa58a7ff +CVE-2020-29535 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2020-29536 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2020-29537 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2020-29538 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2020-29539 - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14 +CVE-2020-2954 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29540 - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14 +CVE-2020-29547 - http://uncensored.citadel.org/msg/4576039 +CVE-2020-2955 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29550 - http://packetstormsecurity.com/files/160726/URVE-Software-Build-24.03.2020-Information-Disclosure.html +CVE-2020-29550 - http://seclists.org/fulldisclosure/2020/Dec/49 +CVE-2020-29550 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-042.txt +CVE-2020-29551 - http://packetstormsecurity.com/files/160725/URVE-Software-Build-24.03.2020-Missing-Authorization.html +CVE-2020-29551 - http://seclists.org/fulldisclosure/2020/Dec/48 +CVE-2020-29551 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-041.txt +CVE-2020-29552 - http://packetstormsecurity.com/files/160722/URVE-Software-Build-24.03.2020-Authentication-Bypass-Remote-Code-Execution.html +CVE-2020-29552 - http://seclists.org/fulldisclosure/2020/Dec/47 +CVE-2020-29552 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-040.txt +CVE-2020-2956 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29563 - https://www.westerndigital.com/support/productsecurity/wdc-20010-my-cloud-os5-firmware-5-07-118 +CVE-2020-29574 - https://www.bleepingcomputer.com/news/security/sophos-fixes-sql-injection-vulnerability-in-their-cyberoam-os/ +CVE-2020-2958 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29582 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-29582 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-29582 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-29587 - https://github.com/simplcommerce/SimplCommerce/issues/969 +CVE-2020-2959 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29596 - https://packetstormsecurity.com/files/160470/MiniWeb-HTTP-Server-0.8.19-Buffer-Overflow.html +CVE-2020-29596 - https://www.exploit-db.com/exploits/49247 +CVE-2020-29597 - http://packetstormsecurity.com/files/160784/Incom-CMS-2.0-File-Upload.html +CVE-2020-29599 - https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html +CVE-2020-29603 - https://mantisbt.org/bugs/view.php?id=27357 +CVE-2020-29604 - https://mantisbt.org/bugs/view.php?id=27357 +CVE-2020-29605 - https://mantisbt.org/bugs/view.php?id=27357 +CVE-2020-29607 - http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html +CVE-2020-2961 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2963 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-2964 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-29651 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-29654 - https://www.westerndigital.com/support/productsecurity/wdc-20011-western-digital-dashboard-privilege-escalation +CVE-2020-29655 - https://vuldb.com/?id.165678 +CVE-2020-29656 - https://vuldb.com/?id.165677 +CVE-2020-29659 - https://www.exploit-db.com/exploits/49217 +CVE-2020-2966 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-29660 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html +CVE-2020-29660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9 +CVE-2020-29661 - http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html +CVE-2020-29661 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html +CVE-2020-29661 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc +CVE-2020-29661 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-29664 - http://hacktheplanet.nu/djihax.pdf +CVE-2020-29669 - http://packetstormsecurity.com/files/160478/Macally-WIFISD2-2A82-2.000.010-Privilege-Escalation.html +CVE-2020-29669 - https://github.com/S1lkys/CVE-2020-29669 +CVE-2020-2967 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2968 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2969 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2971 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2972 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2973 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2974 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2975 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2976 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2977 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2978 - http://packetstormsecurity.com/files/172183/Oracle-RMAN-Missing-Auditing.html +CVE-2020-2978 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2981 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2982 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2983 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-2984 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-3110 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html +CVE-2020-3111 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html +CVE-2020-3118 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html +CVE-2020-3119 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html +CVE-2020-3120 - http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html +CVE-2020-3153 - http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html +CVE-2020-3153 - http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html +CVE-2020-3153 - http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html +CVE-2020-3161 - http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html +CVE-2020-3161 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs +CVE-2020-3187 - http://packetstormsecurity.com/files/158648/Cisco-Adaptive-Security-Appliance-Software-9.7-Arbitrary-File-Deletion.html +CVE-2020-3235 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-3239 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3240 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3243 - http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html +CVE-2020-3243 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3247 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3248 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3249 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3250 - http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html +CVE-2020-3250 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3251 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3252 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E +CVE-2020-3264 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r +CVE-2020-3268 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ +CVE-2020-3269 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ +CVE-2020-3274 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 +CVE-2020-3275 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 +CVE-2020-3276 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 +CVE-2020-3277 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 +CVE-2020-3278 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 +CVE-2020-3279 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 +CVE-2020-3286 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3287 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3288 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3289 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3290 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3291 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3292 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3293 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3294 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3295 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3296 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz +CVE-2020-3347 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-NBmqM9vt +CVE-2020-3350 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy +CVE-2020-3387 - http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html +CVE-2020-3433 - http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html +CVE-2020-3433 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW +CVE-2020-3437 - http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html +CVE-2020-3452 - http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html +CVE-2020-3452 - http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html +CVE-2020-3452 - http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html +CVE-2020-3452 - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html +CVE-2020-35012 - https://wpscan.com/vulnerability/323140b1-66c4-4e7d-85a4-1c922e40866f +CVE-2020-35037 - https://wpscan.com/vulnerability/937b9bdb-7e8e-4ea8-82ec-aa5f6bd70619 +CVE-2020-35124 - https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce +CVE-2020-35125 - https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce +CVE-2020-35126 - https://www.exploit-db.com/exploits/48852 +CVE-2020-35128 - https://labs.bishopfox.com/advisories/mautic-version-3.2.2 +CVE-2020-35129 - https://labs.bishopfox.com/advisories/mautic-version-3.2.2 +CVE-2020-35131 - https://www.exploit-db.com/exploits/49390 +CVE-2020-35151 - https://www.exploit-db.com/exploits/49307 +CVE-2020-35163 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35164 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35166 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35167 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35168 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35169 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35175 - https://github.com/frappe/frappe/pull/11237 +CVE-2020-35198 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-35199 - https://www.exploit-db.com/exploits/49233 +CVE-2020-35201 - https://www.exploit-db.com/exploits/49234 +CVE-2020-35202 - https://www.exploit-db.com/exploits/49235 +CVE-2020-35208 - https://youtu.be/63PfHVSr8iw +CVE-2020-35211 - https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing +CVE-2020-35214 - https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing +CVE-2020-35221 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35223 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35224 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35225 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35226 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35227 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35228 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35229 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35230 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35231 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35233 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35240 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35240.md +CVE-2020-35240 - https://github.com/hemantsolo/CVE-Reference/issues/1 +CVE-2020-35241 - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35241.md +CVE-2020-35242 - https://github.com/balloonwj/flamingo/issues/47 +CVE-2020-35243 - https://github.com/balloonwj/flamingo/issues/47 +CVE-2020-35244 - https://github.com/balloonwj/flamingo/issues/47 +CVE-2020-35245 - https://github.com/balloonwj/flamingo/issues/47 +CVE-2020-35249 - https://www.exploit-db.com/exploits/48756 +CVE-2020-35252 - https://www.exploit-db.com/exploits/49153 +CVE-2020-35261 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 +CVE-2020-35261 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html +CVE-2020-35261 - https://www.exploit-db.com/exploits/49135 +CVE-2020-35262 - https://github.com/the-girl-who-lived/CVE-2020-35262 +CVE-2020-35262 - https://youtu.be/E5wEzf-gkOE +CVE-2020-35263 - https://www.exploit-db.com/exploits/49058 +CVE-2020-35269 - https://gist.github.com/MoSalah20/d1d40b43eafba0bd22ee4cddecad3cbc +CVE-2020-35270 - https://www.exploit-db.com/exploits/49152 +CVE-2020-35271 - https://riteshgohil-25.medium.com/employee-performance-evaluation-system-1-0-first-and-last-name-persistent-cross-site-scripting-7f319775e96f +CVE-2020-35272 - https://www.exploit-db.com/exploits/49215 +CVE-2020-35273 - https://www.exploit-db.com/exploits/49151 +CVE-2020-35274 - https://www.exploit-db.com/exploits/49168 +CVE-2020-35275 - https://www.exploit-db.com/exploits/49181 +CVE-2020-35276 - https://hardik-solanki.medium.com/authentication-admin-panel-bypass-which-leads-to-full-admin-access-control-c10ec4ab4255 +CVE-2020-35284 - https://github.com/balloonwj/flamingo/issues/48 +CVE-2020-35296 - https://github.com/zoujingli/ThinkAdmin +CVE-2020-35309 - https://www.exploit-db.com/exploits/49161 +CVE-2020-35313 - https://packetstormsecurity.com/files/160310/WonderCMS-3.1.3-Code-Execution-Server-Side-Request-Forgery.html +CVE-2020-35314 - https://packetstormsecurity.com/files/160311/WonderCMS-3.1.3-Remote-Code-Execution.html +CVE-2020-35327 - https://www.exploit-db.com/exploits/49243 +CVE-2020-35328 - https://www.exploit-db.com/exploits/49241 +CVE-2020-35329 - https://www.exploit-db.com/exploits/49242 +CVE-2020-35337 - https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html +CVE-2020-35337 - https://github.com/thinksaas/ThinkSAAS/issues/24 +CVE-2020-35338 - https://jeyaseelans.medium.com/cve-2020-35338-9e841f48defa +CVE-2020-35339 - https://github.com/BigTiger2020/74cms-rce/blob/main/README.md +CVE-2020-35342 - https://sourceware.org/bugzilla/show_bug.cgi?id=25319 +CVE-2020-35346 - https://github.com/cbkhwx/cxuucmsv3/issues/4 +CVE-2020-35347 - https://github.com/cbkhwx/cxuucmsv3/issues/5 +CVE-2020-35349 - https://www.exploit-db.com/exploits/49196 +CVE-2020-35359 - https://www.exploit-db.com/exploits/49105 +CVE-2020-35362 - https://github.com/kbgsft/vuln-dext5upload/wiki/File-Download-Vulnerability-in-DEXT5Upload-2.7.1262310-by-xcuter +CVE-2020-35364 - https://github.com/yangfan6888/PoC +CVE-2020-35364 - https://github.com/yangfan6888/PoC/blob/main/PoC.cpp +CVE-2020-35370 - https://www.exploit-db.com/exploits/49265 +CVE-2020-35376 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42066 +CVE-2020-35378 - https://www.exploit-db.com/exploits/49212 +CVE-2020-35388 - https://github.com/xuechengen/xinhu-oa/blob/main/README.md +CVE-2020-35391 - http://packetstormsecurity.com/files/171773/Tenda-N300-F3-12.01.01.48-Header-Processing.html +CVE-2020-35391 - https://medium.com/@signalhilltech/tenda-n300-authentication-bypass-via-malformed-http-request-header-5b8744ca685e +CVE-2020-35395 - https://nikhilkumar01.medium.com/cve-2020-35395-cd393ac8371c +CVE-2020-35395 - https://www.exploit-db.com/exploits/49146 +CVE-2020-35396 - https://nikhilkumar01.medium.com/cve-2020-35396-f4b5675fb168 +CVE-2020-35396 - https://www.exploit-db.com/exploits/49227 +CVE-2020-35398 - https://cvewalkthrough.com/cve-2020-35398-uti-mutual-fund-android-application-username-enumeration/ +CVE-2020-35416 - http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html +CVE-2020-35416 - http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html +CVE-2020-35416 - https://www.exploit-db.com/exploits/49281 +CVE-2020-35418 - https://fatihhcelik.blogspot.com/2020/12/group-office-crm-stored-xss-via-svg-file.html +CVE-2020-35419 - https://fatihhcelik.github.io/posts/Group-Office-CRM-Stored-XSS-via-SVG-File/ +CVE-2020-35427 - https://phpgurukul.com/ +CVE-2020-35427 - https://www.exploit-db.com/exploits/49165 +CVE-2020-35430 - https://gitee.com/inxeduopen/inxedu/issues/I294XL +CVE-2020-35437 - http://packetstormsecurity.com/files/160783/Subrion-CMS-4.2.1-Cross-Site-Scripting.html +CVE-2020-35448 - https://sourceware.org/bugzilla/show_bug.cgi?id=26574 +CVE-2020-35452 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-35460 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-35470 - https://github.com/envoyproxy/envoy/issues/14087 +CVE-2020-35470 - https://github.com/envoyproxy/envoy/pull/14131 +CVE-2020-35471 - https://github.com/envoyproxy/envoy/pull/14122 +CVE-2020-35473 - https://www.sigsac.org/ccs/CCS2022/proceedings/ccs-proceedings.html +CVE-2020-35476 - http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html +CVE-2020-35476 - https://github.com/OpenTSDB/opentsdb/issues/2051 +CVE-2020-35488 - https://github.com/GuillaumePetit84/CVE-2020-35488 +CVE-2020-35489 - https://wpscan.com/vulnerability/10508 +CVE-2020-35489 - https://www.jinsonvarghese.com/unrestricted-file-upload-in-contact-form-7/ +CVE-2020-35490 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-35490 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-35490 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-35490 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35490 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-35491 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-35491 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-35491 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-35491 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35491 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-35505 - https://bugzilla.redhat.com/show_bug.cgi?id=1909769 +CVE-2020-35530 - https://github.com/LibRaw/LibRaw/issues/272 +CVE-2020-35531 - https://github.com/LibRaw/LibRaw/issues/270 +CVE-2020-35532 - https://github.com/LibRaw/LibRaw/issues/271 +CVE-2020-35533 - https://github.com/LibRaw/LibRaw/issues/273 +CVE-2020-35534 - https://github.com/LibRaw/LibRaw/issues/279 +CVE-2020-35535 - https://github.com/LibRaw/LibRaw/issues/283 +CVE-2020-35539 - https://seclists.org/fulldisclosure/2021/Mar/24 +CVE-2020-35548 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-35549 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-35550 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-35551 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-35552 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-35553 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-35556 - https://www.acronis.com +CVE-2020-3556 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK +CVE-2020-35575 - http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html +CVE-2020-35575 - https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip +CVE-2020-35577 - https://github.com/blackarrowsec/advisories/tree/master/2020/CVE-2020-35577 +CVE-2020-35578 - http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html +CVE-2020-35578 - http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html +CVE-2020-35581 - http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html +CVE-2020-35582 - http://packetstormsecurity.com/files/160924/Envira-Gallery-Lite-1.8.3.2-Cross-Site-Scripting.html +CVE-2020-35589 - https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/ +CVE-2020-35590 - https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/ +CVE-2020-35591 - https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ +CVE-2020-35592 - https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ +CVE-2020-35593 - https://www.securifera.com/advisories/ +CVE-2020-35597 - https://cxsecurity.com/issue/WLB-2020120118 +CVE-2020-35597 - https://www.exploit-db.com/exploits/49282 +CVE-2020-35606 - http://packetstormsecurity.com/files/160676/Webmin-1.962-Remote-Command-Execution.html +CVE-2020-35606 - https://www.exploit-db.com/exploits/49318 +CVE-2020-35606 - https://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html +CVE-2020-35608 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134 +CVE-2020-35608 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134 +CVE-2020-35609 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1117 +CVE-2020-35625 - https://phabricator.wikimedia.org/T269718 +CVE-2020-35627 - https://gist.github.com/bc0d3/cbc458f0fcbe0f897e529c7f3d77c9d6 +CVE-2020-35628 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35629 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35630 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35631 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35632 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35633 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35634 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35635 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35636 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 +CVE-2020-35660 - https://www.huntr.dev/bounties/1-other-monica/ +CVE-2020-35664 - https://www.acronis.com +CVE-2020-35665 - http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html +CVE-2020-35665 - https://www.exploit-db.com/exploits/49330 +CVE-2020-35665 - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html +CVE-2020-35677 - https://labs.ingredous.com/2020/07/13/ois-groupedit-xss/ +CVE-2020-35679 - https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/ +CVE-2020-35680 - https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/ +CVE-2020-35683 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-35683 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-35684 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-35684 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-35685 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2020-35685 - https://www.kb.cert.org/vuls/id/608209 +CVE-2020-35687 - https://www.exploit-db.com/exploits/49426 +CVE-2020-35693 - https://github.com/alwentiu/contact-tracing-research/blob/main/samsung.pdf +CVE-2020-35700 - https://www.horizon3.ai/disclosures/librenms-second-order-sqli +CVE-2020-35702 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 +CVE-2020-35710 - https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html +CVE-2020-35713 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions +CVE-2020-35713 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html +CVE-2020-35714 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions +CVE-2020-35714 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html +CVE-2020-35715 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions +CVE-2020-35715 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html +CVE-2020-35716 - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions +CVE-2020-35716 - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html +CVE-2020-35717 - https://medium.com/bugbountywriteup/remote-code-execution-through-cross-site-scripting-in-electron-f3b891ad637 +CVE-2020-35728 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-35728 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-35728 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-35728 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-35728 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-35729 - http://packetstormsecurity.com/files/160798/Klog-Server-2.4.1-Command-Injection.html +CVE-2020-35729 - http://packetstormsecurity.com/files/161123/Klog-Server-2.4.1-Command-Injection.html +CVE-2020-35729 - http://packetstormsecurity.com/files/161410/Klog-Server-2.4.1-Command-Injection.html +CVE-2020-35734 - http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html +CVE-2020-35737 - http://packetstormsecurity.com/files/160826/Newgen-Correspondence-Management-System-eGov-12.0-Insecure-Direct-Object-Reference.html +CVE-2020-35737 - https://www.exploit-db.com/exploits/49378 +CVE-2020-35738 - https://github.com/dbry/WavPack/issues/91 +CVE-2020-35745 - https://medium.com/@ashketchum/privilege-escalation-unauthenticated-access-to-admin-portal-cve-2020-35745-bb5d5dca97a0 +CVE-2020-35745 - https://www.youtube.com/watch?v=vnSsg6iwV9Y&feature=youtu.be&ab_channel=ashketchum +CVE-2020-35749 - http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html +CVE-2020-35749 - http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html +CVE-2020-35752 - https://www.exploit-db.com/exploits/49358 +CVE-2020-35754 - http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html +CVE-2020-35759 - https://github.com/alexlang24/bloofoxCMS/issues/10 +CVE-2020-35760 - https://github.com/alexlang24/bloofoxCMS/issues/9 +CVE-2020-35761 - https://github.com/alexlang24/bloofoxCMS/issues/8 +CVE-2020-35762 - https://github.com/alexlang24/bloofoxCMS/issues/11 +CVE-2020-35765 - https://www.manageengine.com +CVE-2020-35775 - http://packetstormsecurity.com/files/162181/CITSmart-ITSM-9.1.2.22-LDAP-Injection.html +CVE-2020-35775 - https://rdstation-static.s3.amazonaws.com/cms/files/86153/1597862259Ebook-Whatsnew-CITSmart.pdf +CVE-2020-35776 - http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html +CVE-2020-35776 - https://issues.asterisk.org/ +CVE-2020-35778 - https://kb.netgear.com/000062721/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Smart-Managed-Pro-Switches-PSV-2020-0368 +CVE-2020-35779 - https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500 +CVE-2020-35781 - https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561 +CVE-2020-35782 - https://kb.netgear.com/000062636/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0378 +CVE-2020-35782 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35783 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35786 - https://kb.netgear.com/000062718/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R7800-PSV-2020-0218 +CVE-2020-35789 - https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559 +CVE-2020-35791 - https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079 +CVE-2020-35793 - https://kb.netgear.com/000062725/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0185 +CVE-2020-35801 - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ +CVE-2020-35807 - https://kb.netgear.com/000062730/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2018-0557 +CVE-2020-35809 - https://kb.netgear.com/000062674/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-PSV-2018-0510 +CVE-2020-35810 - https://kb.netgear.com/000062645/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-System-PSV-2018-0491 +CVE-2020-35817 - https://kb.netgear.com/000062668/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0493 +CVE-2020-35819 - https://kb.netgear.com/000062648/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0495 +CVE-2020-35825 - https://kb.netgear.com/000062642/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0502 +CVE-2020-35826 - https://kb.netgear.com/000062647/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0503 +CVE-2020-35830 - https://kb.netgear.com/000062672/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0507 +CVE-2020-35831 - https://kb.netgear.com/000062679/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-WiFi-Systems-PSV-2018-0508 +CVE-2020-35837 - https://kb.netgear.com/000062650/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2018-0499 +CVE-2020-35846 - http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html +CVE-2020-35847 - http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html +CVE-2020-35847 - http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html +CVE-2020-35848 - http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html +CVE-2020-35849 - https://mantisbt.org/bugs/view.php?id=27370 +CVE-2020-35850 - https://github.com/cockpit-project/cockpit/issues/15077 +CVE-2020-35850 - https://github.com/passtheticket/vulnerability-research/blob/main/cockpitProject/README.md +CVE-2020-35852 - https://github.com/riteshgohil/My_CVE/blob/main/CVE-2020-35852.md +CVE-2020-35853 - https://www.exploit-db.com/exploits/49339 +CVE-2020-35854 - https://riteshgohil-25.medium.com/textpattern-4-8-4-is-affected-by-cross-site-scripting-xss-in-the-body-parameter-b9a3d7da2a88 +CVE-2020-35930 - https://github.com/seopanel/Seo-Panel/issues/201 +CVE-2020-35944 - https://wpscan.com/vulnerability/10240 +CVE-2020-35944 - https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ +CVE-2020-35945 - https://wpscan.com/vulnerability/10342 +CVE-2020-35945 - https://www.wordfence.com/blog/2020/08/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder/ +CVE-2020-35946 - https://wpscan.com/vulnerability/10320 +CVE-2020-35946 - https://www.wordfence.com/blog/2020/07/2-million-users-affected-by-vulnerability-in-all-in-one-seo-pack/ +CVE-2020-35947 - https://wpscan.com/vulnerability/10239 +CVE-2020-35947 - https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ +CVE-2020-35948 - http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html +CVE-2020-35948 - https://wpscan.com/vulnerability/10412 +CVE-2020-35949 - https://wpscan.com/vulnerability/10349 +CVE-2020-35949 - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ +CVE-2020-35950 - https://wpscan.com/vulnerability/10413 +CVE-2020-35951 - https://wpscan.com/vulnerability/10348 +CVE-2020-35951 - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ +CVE-2020-35962 - https://blocksecteam.medium.com/loopring-lrc-protocol-incident-66e9470bd51f +CVE-2020-35972 - https://github.com/yzmcms/yzmcms/issues/55 +CVE-2020-35973 - https://github.com/BLL-l/vulnerability_wiki/blob/main/zzcms/user_manage_xss.md +CVE-2020-35979 - https://github.com/gpac/gpac/issues/1662 +CVE-2020-35980 - https://github.com/gpac/gpac/issues/1661 +CVE-2020-35981 - https://github.com/gpac/gpac/issues/1659 +CVE-2020-35982 - https://github.com/gpac/gpac/issues/1660 +CVE-2020-36002 - https://github.com/BigTiger2020/Seat-Reservation-System +CVE-2020-36002 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/seat-reservation-system-using-php_0.zip +CVE-2020-36009 - https://github.com/SomeBottle/OBottle/issues/6 +CVE-2020-36011 - https://www.exploit-db.com/exploits/49290 +CVE-2020-36012 - https://kislay00.medium.com/m-store-multi-store-inventory-management-system-add-customer-stored-xss-875a376770ec +CVE-2020-36023 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1013 +CVE-2020-36024 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016 +CVE-2020-36037 - https://github.com/wuzhicms/wuzhicms/issues/192 +CVE-2020-36048 - https://blog.caller.xyz/socketio-engineio-dos/ +CVE-2020-36049 - https://blog.caller.xyz/socketio-engineio-dos/ +CVE-2020-36056 - https://www.linkedin.com/in/vivek-panday-796768149 +CVE-2020-36062 - https://github.com/VivekPanday12/CVE-/issues/3 +CVE-2020-36062 - https://phpgurukul.com +CVE-2020-36064 - https://github.com/VivekPanday12/CVE-/issues/2 +CVE-2020-36065 - https://github.com/sunkaifei/FlyCms/issues/8 +CVE-2020-36066 - https://github.com/tidwall/gjson/issues/195 +CVE-2020-36079 - http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html +CVE-2020-3610 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-3611 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36112 - https://www.exploit-db.com/exploits/49314 +CVE-2020-36115 - https://www.exploit-db.com/exploits/49484 +CVE-2020-36120 - https://github.com/saitoha/libsixel/issues/143 +CVE-2020-36123 - https://github.com/saitoha/libsixel/issues/144 +CVE-2020-3613 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36139 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html +CVE-2020-3614 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36140 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html +CVE-2020-36141 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html +CVE-2020-36142 - https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html +CVE-2020-3615 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-36154 - https://www.exploit-db.com/exploits/49143 +CVE-2020-36155 - https://wpscan.com/vulnerability/cf13b0f8-5815-4d27-a276-5eff8985fc0b +CVE-2020-36156 - https://wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53 +CVE-2020-36157 - https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b +CVE-2020-3616 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-3617 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-36179 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36179 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36179 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36179 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36179 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-3618 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-36180 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36180 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36180 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36180 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36180 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36181 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36181 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36181 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36181 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36181 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36182 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36182 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36182 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36182 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36182 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36183 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36183 - https://github.com/FasterXML/jackson-databind/issues/3003 +CVE-2020-36183 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36183 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36183 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36183 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36184 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36184 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36184 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36184 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36184 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36185 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36185 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36185 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36185 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36185 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36186 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36186 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36186 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36186 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36186 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36187 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36187 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36187 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36187 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36187 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36188 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36188 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36188 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36188 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36188 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-36189 - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-36189 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36189 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-36189 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36189 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-3619 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36197 - http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html +CVE-2020-36198 - http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html +CVE-2020-3620 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3621 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3622 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36221 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36221 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36222 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36222 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36223 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36223 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36224 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36224 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36225 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36225 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36226 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36226 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36227 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36227 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36228 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36228 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36229 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36229 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-3623 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-36230 - http://seclists.org/fulldisclosure/2021/May/64 +CVE-2020-36230 - http://seclists.org/fulldisclosure/2021/May/65 +CVE-2020-36233 - https://jira.atlassian.com/browse/BSERV-12753 +CVE-2020-3624 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36241 - https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7 +CVE-2020-36242 - https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst +CVE-2020-36242 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36242 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36244 - https://github.com/GENIVI/dlt-daemon/issues/265 +CVE-2020-3625 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-3626 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-3628 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36280 - https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c +CVE-2020-36284 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 +CVE-2020-36285 - https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0 +CVE-2020-3629 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3630 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-36310 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 +CVE-2020-36310 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e +CVE-2020-36311 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9 +CVE-2020-36311 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03 +CVE-2020-36312 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10 +CVE-2020-36312 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f65886606c2d3b562716de030706dfe1bea4ed5e +CVE-2020-36313 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7 +CVE-2020-36313 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0774a964ef561b7170d8d1b1bfe6f88002b6d219 +CVE-2020-36314 - https://gitlab.gnome.org/GNOME/file-roller/-/issues/108 +CVE-2020-36315 - https://github.com/relic-toolkit/relic/ +CVE-2020-36315 - https://github.com/relic-toolkit/relic/issues/154 +CVE-2020-36316 - https://github.com/relic-toolkit/relic/ +CVE-2020-36316 - https://github.com/relic-toolkit/relic/issues/155 +CVE-2020-3632 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-36322 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6 +CVE-2020-36322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454 +CVE-2020-3633 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-36333 - https://www.openwall.com/lists/oss-security/2020/02/19/1 +CVE-2020-36334 - https://www.openwall.com/lists/oss-security/2020/02/19/1 +CVE-2020-3634 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-3635 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-3636 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36367 - https://github.com/cesanta/mjs/issues/135 +CVE-2020-36368 - https://github.com/cesanta/mjs/issues/135 +CVE-2020-36369 - https://github.com/cesanta/mjs/issues/135 +CVE-2020-36370 - https://github.com/cesanta/mjs/issues/136 +CVE-2020-36371 - https://github.com/cesanta/mjs/issues/136 +CVE-2020-36372 - https://github.com/cesanta/mjs/issues/136 +CVE-2020-36373 - https://github.com/cesanta/mjs/issues/136 +CVE-2020-36374 - https://github.com/cesanta/mjs/issues/136 +CVE-2020-36375 - https://github.com/cesanta/mjs/issues/136 +CVE-2020-36376 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-36377 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-36378 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-36379 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-3638 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-36380 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-36381 - https://github.com/shenzhim/aaptjs/issues/2 +CVE-2020-36385 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10 +CVE-2020-36385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1 +CVE-2020-36386 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1 +CVE-2020-36386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101 +CVE-2020-36387 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 +CVE-2020-36387 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d816e088c359866f9867057e04f244c608c42fe +CVE-2020-3639 - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin +CVE-2020-3640 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3641 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-3642 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36420 - https://www.openwall.com/lists/oss-security/2020/11/18/1 +CVE-2020-3643 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3644 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3645 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-3646 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36461 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/noise_search/RUSTSEC-2020-0141.md +CVE-2020-36461 - https://rustsec.org/advisories/RUSTSEC-2020-0141.html +CVE-2020-36462 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md +CVE-2020-36462 - https://rustsec.org/advisories/RUSTSEC-2020-0142.html +CVE-2020-36464 - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/heapless/RUSTSEC-2020-0145.md +CVE-2020-36464 - https://rustsec.org/advisories/RUSTSEC-2020-0145.html +CVE-2020-3647 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36473 - https://medium.com/@ciph3r/why-you-should-not-use-uc-browser-54558916d020 +CVE-2020-3648 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36485 - https://www.vulnerability-lab.com/get_content.php?id=2198 +CVE-2020-36486 - https://www.vulnerability-lab.com/get_content.php?id=2205 +CVE-2020-36488 - https://www.vulnerability-lab.com/get_content.php?id=2207 +CVE-2020-36489 - https://www.vulnerability-lab.com/get_content.php?id=2204 +CVE-2020-36490 - https://www.vulnerability-lab.com/get_content.php?id=2195 +CVE-2020-36491 - https://www.vulnerability-lab.com/get_content.php?id=2195 +CVE-2020-36492 - https://www.vulnerability-lab.com/get_content.php?id=2195 +CVE-2020-36493 - https://www.vulnerability-lab.com/get_content.php?id=2195 +CVE-2020-36494 - https://www.vulnerability-lab.com/get_content.php?id=2194 +CVE-2020-36495 - https://www.vulnerability-lab.com/get_content.php?id=2194 +CVE-2020-36496 - https://www.vulnerability-lab.com/get_content.php?id=2194 +CVE-2020-36497 - https://www.vulnerability-lab.com/get_content.php?id=2194 +CVE-2020-36498 - https://www.vulnerability-lab.com/get_content.php?id=2206 +CVE-2020-36499 - https://www.vulnerability-lab.com/get_content.php?id=2215 +CVE-2020-36501 - https://www.vulnerability-lab.com/get_content.php?id=2249 +CVE-2020-36502 - https://www.vulnerability-lab.com/get_content.php?id=2205 +CVE-2020-36503 - https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec +CVE-2020-36504 - https://medium.com/@hoanhp/0-days-story-1-wp-pro-quiz-2115dd77a6d4 +CVE-2020-36504 - https://wpscan.com/vulnerability/83679b90-faa5-454e-924c-89f388eccbd1 +CVE-2020-36505 - https://medium.com/@hoanhp/0-day-story-2-delete-all-comments-easily-a854e52a7d50 +CVE-2020-36505 - https://wpscan.com/vulnerability/239f8efa-8fa4-4274-904f-708e65083821 +CVE-2020-3651 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2020-36510 - https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95 +CVE-2020-36518 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-36518 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-36519 - https://wesleyk.me/2020/01/10/my-first-vulnerability-mimecast-sender-address-verification/ +CVE-2020-3652 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2020-36523 - https://seclists.org/fulldisclosure/2020/Oct/15 +CVE-2020-36523 - https://vuldb.com/?id.164509 +CVE-2020-36524 - https://seclists.org/fulldisclosure/2020/Oct/15 +CVE-2020-36524 - https://vuldb.com/?id.164510 +CVE-2020-36525 - https://seclists.org/fulldisclosure/2020/Oct/15 +CVE-2020-36525 - https://vuldb.com/?id.164511 +CVE-2020-36526 - https://seclists.org/fulldisclosure/2020/Oct/15 +CVE-2020-36526 - https://vuldb.com/?id.164512 +CVE-2020-36527 - https://seclists.org/fulldisclosure/2020/Oct/15 +CVE-2020-36527 - https://vuldb.com/?id.164513 +CVE-2020-36528 - http://seclists.org/fulldisclosure/2020/Oct/4 +CVE-2020-36528 - https://vuldb.com/?id.162264 +CVE-2020-36529 - http://seclists.org/fulldisclosure/2020/Oct/5 +CVE-2020-36529 - https://vuldb.com/?id.162261 +CVE-2020-3653 - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin +CVE-2020-36530 - http://seclists.org/fulldisclosure/2020/Oct/5 +CVE-2020-36530 - https://vuldb.com/?id.162262 +CVE-2020-36531 - http://seclists.org/fulldisclosure/2020/Oct/5 +CVE-2020-36531 - https://vuldb.com/?id.162263 +CVE-2020-36534 - https://vuldb.com/?id.160278 +CVE-2020-36536 - https://vuldb.com/?id.159956 +CVE-2020-3654 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-36540 - https://vuldb.com/?id.159438 +CVE-2020-36541 - https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian +CVE-2020-36541 - https://vuldb.com/?id.159434 +CVE-2020-36542 - https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian +CVE-2020-36542 - https://vuldb.com/?id.159435 +CVE-2020-36543 - https://vuldb.com/?id.159429 +CVE-2020-36544 - https://vuldb.com/?id.159430 +CVE-2020-36547 - https://vuldb.com/?id.129833 +CVE-2020-36550 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 +CVE-2020-36550 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html +CVE-2020-36550 - https://www.exploit-db.com/exploits/49135 +CVE-2020-36551 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 +CVE-2020-36551 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html +CVE-2020-36551 - https://www.exploit-db.com/exploits/49135 +CVE-2020-36552 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 +CVE-2020-36552 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html +CVE-2020-36552 - https://www.exploit-db.com/exploits/49135 +CVE-2020-36553 - https://github.com/yunaranyancat/poc-dump/tree/main/MultiRestaurantReservationSystem/1.0 +CVE-2020-36553 - https://packetstormsecurity.com/files/159786/Multi-Restaurant-Table-Reservation-System-1.0-Cross-Site-Scripting.html +CVE-2020-36553 - https://www.exploit-db.com/exploits/49135 +CVE-2020-36557 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.2 +CVE-2020-36557 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220 +CVE-2020-36558 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb +CVE-2020-3656 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-36560 - https://github.com/artdarek/go-unzip/pull/2 +CVE-2020-36561 - https://github.com/yi-ge/unzip/pull/1 +CVE-2020-36564 - https://github.com/justinas/nosurf/pull/60 +CVE-2020-36565 - https://github.com/labstack/echo/pull/1718 +CVE-2020-3657 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3658 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-3660 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36603 - https://github.com/kkent030315/evil-mhyprot-cli +CVE-2020-36603 - https://web.archive.org/web/20211204031301/https://www.godeye.club/2021/05/20/001-disclosure-mhyprot.html +CVE-2020-36603 - https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html +CVE-2020-36603 - https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims +CVE-2020-36604 - https://github.com/hapijs/hoek/issues/352 +CVE-2020-36607 - https://github.com/liufee/cms/issues/45 +CVE-2020-36609 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG +CVE-2020-36609 - https://vuldb.com/?id.215115 +CVE-2020-3661 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36610 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG +CVE-2020-36610 - https://vuldb.com/?id.215116 +CVE-2020-3662 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36629 - https://github.com/SimbCo/httpster/pull/36 +CVE-2020-3663 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-3664 - https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin +CVE-2020-36642 - https://github.com/trampgeek/jobe/issues/39 +CVE-2020-3665 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36651 - https://github.com/youngerheart/nodeserver/pull/6 +CVE-2020-36656 - https://wpscan.com/vulnerability/10f7e892-7a91-4292-b03e-6ad75756488b +CVE-2020-3666 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36666 - https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96 +CVE-2020-3667 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3668 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3669 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-36691 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 +CVE-2020-36694 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10 +CVE-2020-36694 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12 +CVE-2020-36696 - https://wpscan.com/vulnerability/15f345e6-fc53-4bac-bc5a-de898181ea74 +CVE-2020-3670 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3671 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-36718 - https://wpscan.com/vulnerability/92f1d6fb-c665-419e-a13b-688b1df6c395 +CVE-2020-3673 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3674 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-3675 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3676 - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin +CVE-2020-36763 - https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG +CVE-2020-36766 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.6 +CVE-2020-36771 - http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html +CVE-2020-36771 - http://seclists.org/fulldisclosure/2024/Jan/24 +CVE-2020-36771 - https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure +CVE-2020-36772 - http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html +CVE-2020-36772 - http://seclists.org/fulldisclosure/2024/Jan/25 +CVE-2020-36772 - https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-02_CloudLinux_CageFS_Insufficiently_Restricted_Proxy_Commands +CVE-2020-3678 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3679 - https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin +CVE-2020-3680 - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin +CVE-2020-3681 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-3684 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3685 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-3686 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-3687 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-3688 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-3690 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3691 - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin +CVE-2020-3692 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3693 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3694 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3696 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3698 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-3699 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-3700 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-3701 - https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin +CVE-2020-3702 - https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin +CVE-2020-3703 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3704 - https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin +CVE-2020-3811 - https://www.openwall.com/lists/oss-security/2020/05/19/8 +CVE-2020-3812 - https://www.openwall.com/lists/oss-security/2020/05/19/8 +CVE-2020-3843 - http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html +CVE-2020-3909 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-3931 - https://www.acronis.com/en-us/blog/posts/backdoor-wide-open-critical-vulnerabilities-uncovered-geovision +CVE-2020-3950 - http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html +CVE-2020-3950 - http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html +CVE-2020-3952 - http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html +CVE-2020-3956 - http://packetstormsecurity.com/files/157909/vCloud-Director-9.7.0.15498291-Remote-Code-Execution.html +CVE-2020-3956 - https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956/ +CVE-2020-3956 - https://github.com/aaronsvk/CVE-2020-3956 +CVE-2020-3957 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html +CVE-2020-3958 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html +CVE-2020-3959 - https://www.vmware.com/security/advisories/VMSA-2020-0011.html +CVE-2020-3963 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html +CVE-2020-3964 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html +CVE-2020-3965 - http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html +CVE-2020-3976 - https://www.vmware.com/security/advisories/VMSA-2020-0018.html +CVE-2020-3984 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html +CVE-2020-3985 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html +CVE-2020-3996 - https://github.com/vmware-tanzu/velero/security/advisories/GHSA-72xg-3mcq-52v4 +CVE-2020-4000 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html +CVE-2020-4001 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html +CVE-2020-4002 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html +CVE-2020-4003 - http://www.vmware.com/security/advisories/VMSA-2020-0025.html +CVE-2020-4016 - https://jira.atlassian.com/browse/FE-7285 +CVE-2020-4030 - https://usn.ubuntu.com/4481-1/ +CVE-2020-4031 - https://usn.ubuntu.com/4481-1/ +CVE-2020-4032 - https://usn.ubuntu.com/4481-1/ +CVE-2020-4033 - https://usn.ubuntu.com/4481-1/ +CVE-2020-4040 - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html +CVE-2020-4041 - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html +CVE-2020-4044 - https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c +CVE-2020-4051 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-4206 - https://www.ibm.com/support/pages/node/6114130 +CVE-2020-4208 - https://www.ibm.com/support/pages/node/6114130 +CVE-2020-4214 - https://www.ibm.com/support/pages/node/6114130 +CVE-2020-4241 - https://www.ibm.com/support/pages/node/6114130 +CVE-2020-4242 - https://www.ibm.com/support/pages/node/6114130 +CVE-2020-4269 - http://packetstormsecurity.com/files/157328/QRadar-Community-Edition-7.3.1.6-Default-Credentials.html +CVE-2020-4270 - http://packetstormsecurity.com/files/157335/QRadar-Community-Edition-7.3.1.6-Insecure-File-Permissions.html +CVE-2020-4271 - http://packetstormsecurity.com/files/157336/QRadar-Community-Edition-7.3.1.6-PHP-Object-Injection.html +CVE-2020-4272 - http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html +CVE-2020-4274 - http://packetstormsecurity.com/files/157338/QRadar-Community-Edition-7.3.1.6-Authorization-Bypass.html +CVE-2020-4280 - http://packetstormsecurity.com/files/159589/QRadar-RemoteJavaScript-Deserialization.html +CVE-2020-4280 - http://seclists.org/fulldisclosure/2020/Oct/18 +CVE-2020-4294 - http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html +CVE-2020-4300 - https://www.ibm.com/support/pages/node/6451705 +CVE-2020-4315 - https://www.ibm.com/support/pages/node/6334813 +CVE-2020-4354 - https://www.ibm.com/support/pages/node/6451705 +CVE-2020-4379 - https://www.ibm.com/support/pages/node/6214483 +CVE-2020-4432 - https://www.ibm.com/support/pages/node/6221324 +CVE-2020-4433 - https://www.ibm.com/support/pages/node/6221324 +CVE-2020-4434 - https://www.ibm.com/support/pages/node/6221324 +CVE-2020-4435 - https://www.ibm.com/support/pages/node/6221324 +CVE-2020-4436 - https://www.ibm.com/support/pages/node/6221324 +CVE-2020-4469 - https://www.tenable.com/security/research/tra-2020-37 +CVE-2020-4470 - https://www.tenable.com/security/research/tra-2020-37 +CVE-2020-4471 - https://www.tenable.com/security/research/tra-2020-37 +CVE-2020-4510 - https://www.ibm.com/support/pages/node/6246133 +CVE-2020-4516 - https://www.ibm.com/support/pages/node/6326901 +CVE-2020-4520 - https://www.ibm.com/support/pages/node/6451705 +CVE-2020-4559 - https://www.ibm.com/support/pages/node/6323757 +CVE-2020-4561 - https://www.ibm.com/support/pages/node/6451705 +CVE-2020-4567 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4569 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4572 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4573 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4574 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4576 - https://www.ibm.com/support/pages/node/6339807 +CVE-2020-4757 - https://www.gosecure.net/blog/2022/06/21/xss-vulnerability-in-ibm-content-navigator-cve-2020-4757/ +CVE-2020-4766 - https://www.ibm.com/support/pages/node/6406254 +CVE-2020-4782 - https://www.ibm.com/support/pages/node/6356083 +CVE-2020-4788 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-4845 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4846 - https://www.ibm.com/support/pages/node/6253781 +CVE-2020-4854 - https://www.tenable.com/security/research/tra-2020-66 +CVE-2020-4856 - https://www.ibm.com/support/pages/node/6417585 +CVE-2020-4857 - https://www.ibm.com/support/pages/node/6417585 +CVE-2020-4863 - https://www.ibm.com/support/pages/node/6417585 +CVE-2020-4866 - https://www.ibm.com/support/pages/node/6417585 +CVE-2020-4949 - https://www.ibm.com/support/pages/node/6408244 +CVE-2020-4975 - https://www.ibm.com/support/pages/node/6417585 +CVE-2020-5024 - https://www.ibm.com/support/pages/node/6427861 +CVE-2020-5147 - http://packetstormsecurity.com/files/163857/SonicWall-NetExtender-10.2.0.300-Unquoted-Service-Path.html +CVE-2020-5183 - http://packetstormsecurity.com/files/155832/FTPGetter-Professional-5.97.0.223-Denial-Of-Service.html +CVE-2020-5183 - https://www.exploit-db.com/exploits/47871 +CVE-2020-5186 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 +CVE-2020-5186 - https://packetstormsecurity.com/files/156483/DotNetNuke-CMS-9.5.0-Cross-Site-Scripting.html +CVE-2020-5187 - http://packetstormsecurity.com/files/156489/DotNetNuke-CMS-9.4.4-Zip-Directory-Traversal.html +CVE-2020-5187 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 +CVE-2020-5188 - http://packetstormsecurity.com/files/156484/DotNetNuke-CMS-9.5.0-File-Extension-Check-Bypass.html +CVE-2020-5188 - https://medium.com/@SajjadPourali/dnn-dotnetnuke-cms-not-as-secure-as-you-think-e8516f789175 +CVE-2020-5191 - https://www.exploit-db.com/exploits/47841 +CVE-2020-5192 - https://www.exploit-db.com/exploits/47840 +CVE-2020-5193 - http://packetstormsecurity.com/files/155929/Hospital-Management-System-4.0-Cross-Site-Scripting.html +CVE-2020-5202 - http://www.openwall.com/lists/oss-security/2020/01/20/4 +CVE-2020-5202 - https://seclists.org/oss-sec/2020/q1/21 +CVE-2020-5223 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 +CVE-2020-5237 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt +CVE-2020-5245 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-5258 - https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2 +CVE-2020-5258 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-5258 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-5258 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-5260 - http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html +CVE-2020-5295 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html +CVE-2020-5295 - http://seclists.org/fulldisclosure/2020/Aug/2 +CVE-2020-5296 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html +CVE-2020-5296 - http://seclists.org/fulldisclosure/2020/Aug/2 +CVE-2020-5297 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html +CVE-2020-5297 - http://seclists.org/fulldisclosure/2020/Aug/2 +CVE-2020-5298 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html +CVE-2020-5298 - http://seclists.org/fulldisclosure/2020/Aug/2 +CVE-2020-5299 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html +CVE-2020-5299 - http://seclists.org/fulldisclosure/2020/Aug/2 +CVE-2020-5304 - https://medium.com/@venkatajayaram.yalla/whitesource-log-injection-vulnerability-cve-2020-5304-e543b7943c2b +CVE-2020-5305 - https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in_2.html +CVE-2020-5306 - https://vyshnavvizz.blogspot.com/2020/01/stored-cross-site-scripting-in.html +CVE-2020-5306 - https://www.exploit-db.com/exploits/47886 +CVE-2020-5307 - https://www.exploit-db.com/exploits/47846 +CVE-2020-5308 - http://packetstormsecurity.com/files/155861/Dairy-Farm-Shop-Management-System-1.0-Cross-Site-Scripting.html +CVE-2020-5330 - http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html +CVE-2020-5359 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5360 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5377 - http://packetstormsecurity.com/files/162110/Dell-OpenManage-Server-Administrator-9.4.0.0-File-Read.html +CVE-2020-5393 - https://sumukh30.blogspot.com/2020/01/cross-site-scripting-vulnerability-in.html +CVE-2020-5397 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-5397 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-5397 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-5397 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-5398 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-5398 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-5407 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5407 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-5407 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-5408 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5408 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-5408 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-5413 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-5413 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-5421 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-5421 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-5421 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-5421 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-5497 - http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html +CVE-2020-5499 - https://github.com/wssgcsc58/CVEs/tree/master/baidurustsgxsdk_enclaveid_race +CVE-2020-5504 - https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html +CVE-2020-5505 - http://packetstormsecurity.com/files/155922/Freelancy-1.0.0-Remote-Code-Execution.html +CVE-2020-5509 - http://packetstormsecurity.com/files/155925/Car-Rental-Project-1.0-Remote-Code-Execution.html +CVE-2020-5510 - https://www.exploit-db.com/exploits/47854 +CVE-2020-5511 - https://www.exploit-db.com/exploits/47874 +CVE-2020-5513 - https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-cm-deletet-lfi-local-file-inclusion-and-rce/ +CVE-2020-5514 - https://infosecdb.wordpress.com/2020/01/05/gilacms-1-11-8-remote-code-execution/ +CVE-2020-5515 - http://packetstormsecurity.com/files/158114/Gila-CMS-1.11.8-SQL-Injection.html +CVE-2020-5515 - http://packetstormsecurity.com/files/158140/Gila-CMS-1.1.18.1-SQL-Injection-Shell-Upload.html +CVE-2020-5530 - https://wpvulndb.com/vulnerabilities/10075 +CVE-2020-5665 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-018_en.pdf +CVE-2020-5720 - https://www.tenable.com/security/research/tra-2020-07 +CVE-2020-5722 - http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html +CVE-2020-5722 - http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html +CVE-2020-5722 - https://www.tenable.com/security/research/tra-2020-15 +CVE-2020-5723 - https://www.tenable.com/security/research/tra-2020-17 +CVE-2020-5724 - https://www.tenable.com/security/research/tra-2020-17 +CVE-2020-5725 - http://packetstormsecurity.com/files/156976/Grandstream-UCM6200-Series-WebSocket-1.0.20.20-SQL-Injection.html +CVE-2020-5725 - https://www.tenable.com/security/research/tra-2020-17 +CVE-2020-5726 - http://packetstormsecurity.com/files/156977/Grandstream-UCM6200-Series-CTI-Interface-SQL-Injection.html +CVE-2020-5726 - https://www.tenable.com/security/research/tra-2020-17 +CVE-2020-5727 - https://www.tenable.com/security/research/tra-2020-29 +CVE-2020-5734 - https://www.tenable.com/security/research/tra-2020-19 +CVE-2020-5735 - http://packetstormsecurity.com/files/157164/Amcrest-Dahua-NVR-Camera-IP2M-841-Denial-Of-Service.html +CVE-2020-5735 - https://www.tenable.com/security/research/tra-2020-20 +CVE-2020-5736 - https://www.tenable.com/security/research/tra-2020-20 +CVE-2020-5737 - https://www.tenable.com/security/tns-2020-02 +CVE-2020-5738 - https://www.tenable.com/security/research/tra-2020-22 +CVE-2020-5739 - https://www.tenable.com/security/research/tra-2020-22 +CVE-2020-5740 - https://www.tenable.com/security/research/tra-2020-25 +CVE-2020-5741 - http://packetstormsecurity.com/files/158470/Plex-Unpickle-Dict-Windows-Remote-Code-Execution.html +CVE-2020-5741 - https://www.tenable.com/security/research/tra-2020-32 +CVE-2020-5742 - https://www.tenable.com/security/research/tra-2020-35 +CVE-2020-5743 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5744 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5745 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5746 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5747 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5748 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5749 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5750 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5751 - https://www.tenable.com/security/research/tra-2020-31 +CVE-2020-5752 - http://packetstormsecurity.com/files/157802/Druva-inSync-Windows-Client-6.6.3-Local-Privilege-Escalation.html +CVE-2020-5752 - http://packetstormsecurity.com/files/160404/Druva-inSync-Windows-Client-6.6.3-Privilege-Escalation.html +CVE-2020-5752 - https://www.tenable.com/security/research/tra-2020-34 +CVE-2020-5756 - https://www.tenable.com/security/research/tra-2020-41 +CVE-2020-5757 - https://www.tenable.com/security/research/tra-2020-42 +CVE-2020-5758 - https://www.tenable.com/security/research/tra-2020-42 +CVE-2020-5759 - https://www.tenable.com/security/research/tra-2020-42 +CVE-2020-5760 - https://www.tenable.com/security/research/tra-2020-43 +CVE-2020-5760 - https://www.tenable.com/security/research/tra-2020-47 +CVE-2020-5761 - https://www.tenable.com/security/research/tra-2020-43 +CVE-2020-5761 - https://www.tenable.com/security/research/tra-2020-47 +CVE-2020-5762 - https://www.tenable.com/security/research/tra-2020-43 +CVE-2020-5762 - https://www.tenable.com/security/research/tra-2020-47 +CVE-2020-5763 - https://www.tenable.com/security/research/tra-2020-43 +CVE-2020-5763 - https://www.tenable.com/security/research/tra-2020-47 +CVE-2020-5764 - https://www.tenable.com/security/research/tra-2020-41 +CVE-2020-5765 - https://www.tenable.com/security/tns-2020-05 +CVE-2020-5766 - https://www.tenable.com/security/research/tra-2020-42 +CVE-2020-5767 - https://www.tenable.com/security/research/tra-2020-44-0 +CVE-2020-5768 - https://www.tenable.com/security/research/tra-2020-44-0 +CVE-2020-5769 - https://www.tenable.com/security/research/tra-2020-43-0 +CVE-2020-5770 - https://www.tenable.com/security/research/tra-2020-48 +CVE-2020-5771 - https://www.tenable.com/security/research/tra-2020-48 +CVE-2020-5772 - https://www.tenable.com/security/research/tra-2020-48 +CVE-2020-5773 - https://www.tenable.com/security/research/tra-2020-48 +CVE-2020-5774 - https://www.tenable.com/security/tns-2020-06 +CVE-2020-5775 - https://www.tenable.com/security/research/tra-2020-49 +CVE-2020-5776 - https://www.tenable.com/security/research/tra-2020-51 +CVE-2020-5777 - https://www.tenable.com/security/research/tra-2020-51 +CVE-2020-5780 - https://www.tenable.com/security/research/tra-2020-53 +CVE-2020-5781 - https://www.tenable.com/security/research/tra-2020-55 +CVE-2020-5782 - https://www.tenable.com/security/research/tra-2020-55 +CVE-2020-5783 - https://www.tenable.com/security/research/tra-2020-55 +CVE-2020-5784 - https://www.tenable.com/security/research/tra-2020-57 +CVE-2020-5785 - https://www.tenable.com/security/research/tra-2020-57 +CVE-2020-5786 - https://www.tenable.com/security/research/tra-2020-57 +CVE-2020-5787 - https://www.tenable.com/security/research/tra-2020-57 +CVE-2020-5788 - https://www.tenable.com/security/research/tra-2020-57 +CVE-2020-5789 - https://www.tenable.com/security/research/tra-2020-57 +CVE-2020-5790 - https://www.tenable.com/security/research/tra-2020-58 +CVE-2020-5791 - http://packetstormsecurity.com/files/159743/Nagios-XI-5.7.3-Remote-Command-Injection.html +CVE-2020-5791 - http://packetstormsecurity.com/files/162235/Nagios-XI-5.7.3-Remote-Code-Execution.html +CVE-2020-5791 - https://www.tenable.com/security/research/tra-2020-58 +CVE-2020-5792 - http://packetstormsecurity.com/files/162284/Nagios-XI-5.7.3-Remote-Code-Execution.html +CVE-2020-5792 - https://www.tenable.com/security/research/tra-2020-58 +CVE-2020-5793 - https://www.tenable.com/security/tns-2020-07 +CVE-2020-5793 - https://www.tenable.com/security/tns-2020-08 +CVE-2020-5794 - https://www.tenable.com/security/tns-2020-09 +CVE-2020-5795 - https://www.tenable.com/security/research/tra-2020-60 +CVE-2020-5796 - https://www.tenable.com/security/research/tra-2020-61 +CVE-2020-5797 - https://www.tenable.com/security/research/tra-2020-60 +CVE-2020-5798 - https://www.tenable.com/security/research/tra-2020-67 +CVE-2020-5798 - https://www.tenable.com/security/research/tra-2020-67,https://docs.druva.com/001_inSync_Cloud/Cloud/010_Release_Details/010_inSync_Cloud_Updates +CVE-2020-5801 - https://www.tenable.com/security/research/tra-2020-71 +CVE-2020-5802 - https://www.tenable.com/security/research/tra-2020-71 +CVE-2020-5803 - https://www.tenable.com/security/research/tra-2020-56 +CVE-2020-5806 - https://www.tenable.com/security/research/tra-2020-71 +CVE-2020-5807 - https://www.tenable.com/security/research/tra-2020-71 +CVE-2020-5808 - https://www.tenable.com/security/tns-2020-11 +CVE-2020-5809 - https://www.tenable.com/security/research/tra-2020-59 +CVE-2020-5810 - https://www.tenable.com/security/research/tra-2020-59 +CVE-2020-5811 - http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html +CVE-2020-5811 - https://www.tenable.com/security/research/tra-2020-59 +CVE-2020-5812 - https://www.tenable.com/security/tns-2021-01 +CVE-2020-5841 - https://medium.com/@ph0rensic/sql-injection-opmon-9-3-1-1-770bd7e7ad1 +CVE-2020-5842 - https://www.exploit-db.com/exploits/47876 +CVE-2020-5844 - http://packetstormsecurity.com/files/167503/Pandora-FMS-7.0NG.742-Remote-Code-Execution.html +CVE-2020-5844 - https://github.com/TheCyberGeek/CVE-2020-5844 +CVE-2020-5847 - http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html +CVE-2020-5847 - https://sysdream.com/news/lab/ +CVE-2020-5849 - http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html +CVE-2020-5849 - https://sysdream.com/news/lab/ +CVE-2020-5902 - http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html +CVE-2020-5902 - http://packetstormsecurity.com/files/158334/BIG-IP-TMUI-Remote-Code-Execution.html +CVE-2020-5902 - http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html +CVE-2020-5902 - http://packetstormsecurity.com/files/158414/Checker-CVE-2020-5902.html +CVE-2020-5902 - http://packetstormsecurity.com/files/158581/F5-Big-IP-13.1.3-Build-0.0.6-Local-File-Inclusion.html +CVE-2020-5902 - http://packetstormsecurity.com/files/175671/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html +CVE-2020-5902 - https://badpackets.net/over-3000-f5-big-ip-endpoints-vulnerable-to-cve-2020-5902/ +CVE-2020-5902 - https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902 +CVE-2020-5902 - https://swarm.ptsecurity.com/rce-in-f5-big-ip/ +CVE-2020-5902 - https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/ +CVE-2020-5962 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5963 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5964 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5965 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5966 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5967 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5968 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5969 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5970 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5971 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5972 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5973 - https://nvidia.custhelp.com/app/answers/detail/a_id/5031 +CVE-2020-5975 - https://nvidia.custhelp.com/app/answers/detail/a_id/5052 +CVE-2020-5976 - https://nvidia.custhelp.com/app/answers/detail/a_id/5052 +CVE-2020-5992 - https://nvidia.custhelp.com/app/answers/detail/a_id/5096 +CVE-2020-6007 - https://research.checkpoint.com/2020/dont-be-silly-its-only-a-lightbulb/ +CVE-2020-6010 - http://packetstormsecurity.com/files/163536/WordPress-LearnPress-SQL-Injection.html +CVE-2020-6019 - https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678 +CVE-2020-6058 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0975 +CVE-2020-6059 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0976 +CVE-2020-6060 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0977 +CVE-2020-6061 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984 +CVE-2020-6062 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0985 +CVE-2020-6063 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0986 +CVE-2020-6064 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0987 +CVE-2020-6065 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0989 +CVE-2020-6066 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0990 +CVE-2020-6067 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0991 +CVE-2020-6068 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0992 +CVE-2020-6069 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0993 +CVE-2020-6070 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0988 +CVE-2020-6071 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994 +CVE-2020-6072 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995 +CVE-2020-6073 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996 +CVE-2020-6074 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0997 +CVE-2020-6075 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0998 +CVE-2020-6076 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-0999 +CVE-2020-6077 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000 +CVE-2020-6078 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001 +CVE-2020-6079 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002 +CVE-2020-6080 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002 +CVE-2020-6081 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1003 +CVE-2020-6082 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1004 +CVE-2020-6083 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1005 +CVE-2020-6084 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 +CVE-2020-6085 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 +CVE-2020-6086 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 +CVE-2020-6087 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 +CVE-2020-6088 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1008 +CVE-2020-6089 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1009 +CVE-2020-6090 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1010 +CVE-2020-6091 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1011 +CVE-2020-6092 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1013 +CVE-2020-6093 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1014 +CVE-2020-6094 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1017 +CVE-2020-6097 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029 +CVE-2020-6098 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1030 +CVE-2020-6099 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1032 +CVE-2020-6100 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040 +CVE-2020-6101 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1041 +CVE-2020-6102 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1042 +CVE-2020-6103 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1043 +CVE-2020-6104 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046 +CVE-2020-6105 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047 +CVE-2020-6106 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048 +CVE-2020-6107 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049 +CVE-2020-6108 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050 +CVE-2020-6109 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055 +CVE-2020-6110 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056 +CVE-2020-6111 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1057 +CVE-2020-6112 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1062 +CVE-2020-6113 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1063 +CVE-2020-6114 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1067 +CVE-2020-6115 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068 +CVE-2020-6116 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070 +CVE-2020-6117 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 +CVE-2020-6118 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 +CVE-2020-6119 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 +CVE-2020-6120 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 +CVE-2020-6121 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 +CVE-2020-6122 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072 +CVE-2020-6123 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 +CVE-2020-6124 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 +CVE-2020-6125 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1074 +CVE-2020-6126 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075 +CVE-2020-6127 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075 +CVE-2020-6128 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075 +CVE-2020-6129 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076 +CVE-2020-6130 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076 +CVE-2020-6131 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076 +CVE-2020-6132 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077 +CVE-2020-6133 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077 +CVE-2020-6134 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077 +CVE-2020-6135 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1078 +CVE-2020-6136 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1079 +CVE-2020-6137 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 +CVE-2020-6138 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 +CVE-2020-6139 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 +CVE-2020-6140 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080 +CVE-2020-6141 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1081 +CVE-2020-6142 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1082 +CVE-2020-6143 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083 +CVE-2020-6144 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083 +CVE-2020-6145 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1091 +CVE-2020-6146 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1084 +CVE-2020-6147 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 +CVE-2020-6148 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 +CVE-2020-6149 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 +CVE-2020-6150 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 +CVE-2020-6151 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1095 +CVE-2020-6152 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1096 +CVE-2020-6155 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1101 +CVE-2020-6156 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 +CVE-2020-6166 - https://wpvulndb.com/vulnerabilities/10009 +CVE-2020-6166 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ +CVE-2020-6167 - https://wpvulndb.com/vulnerabilities/10007 +CVE-2020-6167 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ +CVE-2020-6168 - https://wpvulndb.com/vulnerabilities/10008 +CVE-2020-6168 - https://www.wordfence.com/blog/2020/01/multiple-vulnerabilities-patched-in-minimal-coming-soon-maintenance-mode-coming-soon-page-plugin/ +CVE-2020-6170 - http://packetstormsecurity.com/files/156075/Genexis-Platinum-4410-2.1-Authentication-Bypass.html +CVE-2020-6171 - https://www.deepcode.ca/index.php/2020/04/07/cve-2020-xss-in-clink-office-v2/ +CVE-2020-6173 - https://github.com/theupdateframework/tuf/commits/develop +CVE-2020-6178 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6184 - https://launchpad.support.sap.com/#/notes/2863397 +CVE-2020-6196 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6197 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6198 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6199 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6200 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6201 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6202 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6203 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6204 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6205 - https://launchpad.support.sap.com/#/notes/2884910 +CVE-2020-6205 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6206 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6207 - http://packetstormsecurity.com/files/161993/SAP-Solution-Manager-7.2-Remote-Command-Execution.html +CVE-2020-6207 - http://packetstormsecurity.com/files/162083/SAP-SMD-Agent-Unauthenticated-Remote-Code-Execution.html +CVE-2020-6207 - http://packetstormsecurity.com/files/163168/SAP-Solution-Manager-7.20-Missing-Authorization.html +CVE-2020-6207 - http://seclists.org/fulldisclosure/2021/Apr/4 +CVE-2020-6207 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6208 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6209 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6210 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 +CVE-2020-6215 - http://packetstormsecurity.com/files/174985/SAP-Application-Server-ABAP-Open-Redirection.html +CVE-2020-6215 - http://seclists.org/fulldisclosure/2023/Oct/13 +CVE-2020-6234 - http://packetstormsecurity.com/files/162084/SAP-Host-Control-Local-Privilege-Escalation.html +CVE-2020-6287 - http://packetstormsecurity.com/files/162085/SAP-JAVA-Configuration-Task-Execution.html +CVE-2020-6287 - http://seclists.org/fulldisclosure/2021/Apr/6 +CVE-2020-6307 - https://launchpad.support.sap.com/#/notes/2863397 +CVE-2020-6318 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2020-6318 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2020-6364 - http://packetstormsecurity.com/files/163153/SAP-Wily-Introscope-Enterprise-OS-Command-Injection.html +CVE-2020-6367 - https://launchpad.support.sap.com/#/notes/2972661 +CVE-2020-6369 - http://packetstormsecurity.com/files/163159/SAP-Wily-Introscope-Enterprise-Default-Hard-Coded-Credentials.html +CVE-2020-6388 - http://packetstormsecurity.com/files/157376/Chrome-AudioArray-Allocate-Data-Race-Out-Of-Bounds-Access.html +CVE-2020-6390 - http://packetstormsecurity.com/files/157419/Chrome-ReadableStream-Close-Out-Of-Bounds-Access.html +CVE-2020-6418 - http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html +CVE-2020-6449 - http://packetstormsecurity.com/files/172843/Chrome-WebAudio-Use-After-Free.html +CVE-2020-6458 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044 +CVE-2020-6507 - http://packetstormsecurity.com/files/162088/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html +CVE-2020-6507 - http://packetstormsecurity.com/files/162105/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html +CVE-2020-6513 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092 +CVE-2020-6514 - http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html +CVE-2020-6519 - http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html +CVE-2020-6541 - http://packetstormsecurity.com/files/159610/Chrome-USB-OnServiceConnectionError-Use-After-Free.html +CVE-2020-6542 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127 +CVE-2020-6549 - http://packetstormsecurity.com/files/159558/Chrome-MediaElementEventListener-UpdateSources-Use-After-Free.html +CVE-2020-6550 - http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html +CVE-2020-6551 - http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html +CVE-2020-6555 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1123 +CVE-2020-6577 - https://herolab.usd.de/security-advisories/ +CVE-2020-6577 - https://herolab.usd.de/security-advisories/usd-2019-0072/ +CVE-2020-6578 - https://herolab.usd.de/security-advisories/ +CVE-2020-6578 - https://herolab.usd.de/security-advisories/usd-2019-0069/ +CVE-2020-6579 - https://herolab.usd.de/security-advisories/usd-2019-0070/ +CVE-2020-6581 - https://herolab.usd.de/security-advisories/ +CVE-2020-6581 - https://herolab.usd.de/security-advisories/usd-2020-0002/ +CVE-2020-6582 - https://herolab.usd.de/security-advisories/ +CVE-2020-6582 - https://herolab.usd.de/security-advisories/usd-2020-0001/ +CVE-2020-6584 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60 +CVE-2020-6585 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60 +CVE-2020-6586 - https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60 +CVE-2020-6609 - https://github.com/LibreDWG/libredwg/issues/179#issue-544834443 +CVE-2020-6610 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120 +CVE-2020-6611 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190 +CVE-2020-6612 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169 +CVE-2020-6613 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025 +CVE-2020-6614 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 +CVE-2020-6615 - https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 +CVE-2020-6616 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-6617 - https://github.com/nothings/stb/issues/864 +CVE-2020-6618 - https://github.com/nothings/stb/issues/866 +CVE-2020-6619 - https://github.com/nothings/stb/issues/863 +CVE-2020-6620 - https://github.com/nothings/stb/issues/868 +CVE-2020-6621 - https://github.com/nothings/stb/issues/867 +CVE-2020-6622 - https://github.com/nothings/stb/issues/869 +CVE-2020-6623 - https://github.com/nothings/stb/issues/865 +CVE-2020-6624 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858744 +CVE-2020-6625 - https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1858746 +CVE-2020-6627 - http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html +CVE-2020-6627 - https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/ +CVE-2020-6628 - https://github.com/libming/libming/issues/191 +CVE-2020-6629 - https://github.com/libming/libming/issues/190 +CVE-2020-6630 - https://github.com/gpac/gpac/issues/1377 +CVE-2020-6631 - https://github.com/gpac/gpac/issues/1378 +CVE-2020-6637 - https://cinzinga.com/CVE-2020-6637/ +CVE-2020-6640 - https://fortiguard.com/advisory/FG-IR-20-003 +CVE-2020-6643 - https://fortiguard.com/advisory/FG-IR-19-270 +CVE-2020-6649 - https://fortiguard.com/advisory/FG-IR-20-011 +CVE-2020-6756 - http://packetstormsecurity.com/files/155898/PixelStor-5000-K-4.0.1580-20150629-Remote-Code-Execution.html +CVE-2020-6792 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6793 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6794 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6795 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6796 - https://bugzilla.mozilla.org/show_bug.cgi?id=1610426 +CVE-2020-6797 - https://bugzilla.mozilla.org/show_bug.cgi?id=1596668 +CVE-2020-6798 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6799 - https://bugzilla.mozilla.org/show_bug.cgi?id=1606596 +CVE-2020-6800 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6802 - https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach +CVE-2020-6805 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6806 - http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html +CVE-2020-6806 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6807 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6808 - https://bugzilla.mozilla.org/show_bug.cgi?id=1247968 +CVE-2020-6811 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6812 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6813 - https://bugzilla.mozilla.org/show_bug.cgi?id=1605814 +CVE-2020-6814 - https://usn.ubuntu.com/4328-1/ +CVE-2020-6816 - https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach +CVE-2020-6817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 +CVE-2020-6828 - https://bugzilla.mozilla.org/show_bug.cgi?id=1617928 +CVE-2020-6830 - https://bugzilla.mozilla.org/show_bug.cgi?id=1632387 +CVE-2020-6831 - http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html +CVE-2020-6836 - https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/ +CVE-2020-6838 - https://github.com/mruby/mruby/issues/4926 +CVE-2020-6839 - https://github.com/mruby/mruby/issues/4929 +CVE-2020-6840 - https://github.com/mruby/mruby/issues/4927 +CVE-2020-6843 - http://packetstormsecurity.com/files/156050/ZOHO-ManageEngine-ServiceDeskPlus-11.0-Build-11007-Cross-Site-Scripting.html +CVE-2020-6843 - http://seclists.org/fulldisclosure/2020/Jan/32 +CVE-2020-6843 - https://seclists.org/bugtraq/2020/Jan/34 +CVE-2020-6844 - https://websec.nl/news.php +CVE-2020-6844 - https://www.exploit-db.com/exploits/47960 +CVE-2020-6845 - https://websec.nl/news.php +CVE-2020-6845 - https://www.exploit-db.com/exploits/47960 +CVE-2020-6847 - https://gist.github.com/Marshall-Hallenbeck/bf6a4a4f408bb7a5e0a47cb39dc1dbbe +CVE-2020-6849 - https://wpvulndb.com/vulnerabilities/10031 +CVE-2020-6849 - https://zeroauth.ltd/blog/ +CVE-2020-6850 - https://zeroauth.ltd/blog/ +CVE-2020-6850 - https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response/ +CVE-2020-6851 - https://github.com/uclouvain/openjpeg/issues/1228 +CVE-2020-6851 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-6857 - http://hyp3rlinx.altervista.org +CVE-2020-6857 - http://packetstormsecurity.com/files/156015/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html +CVE-2020-6857 - http://packetstormsecurity.com/files/157321/Neowise-CarbonFTP-1.4-Insecure-Proprietary-Password-Encryption.html +CVE-2020-6857 - http://seclists.org/fulldisclosure/2020/Jan/29 +CVE-2020-6857 - http://seclists.org/fulldisclosure/2020/Jan/35 +CVE-2020-6857 - https://seclists.org/bugtraq/2020/Jan/30 +CVE-2020-6858 - https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v +CVE-2020-6859 - https://wpvulndb.com/vulnerabilities/10041 +CVE-2020-6860 - https://github.com/hoene/libmysofa/issues/96 +CVE-2020-6861 - https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html +CVE-2020-6862 - http://packetstormsecurity.com/files/159135/ZTE-F602W-CAPTCHA-Bypass.html +CVE-2020-6950 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-6950 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-6950 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-6954 - https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html +CVE-2020-6955 - https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html +CVE-2020-6956 - https://www.kpmg.de/noindex/advisories/KPMG-2019-001.txt +CVE-2020-6958 - https://github.com/NationalSecurityAgency/ghidra/issues/943 +CVE-2020-6958 - https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md +CVE-2020-6958 - https://sourceforge.net/p/yajsw/bugs/166/ +CVE-2020-7009 - https://www.elastic.co/community/security/ +CVE-2020-7010 - https://www.elastic.co/community/security/ +CVE-2020-7011 - https://www.elastic.co/community/security/ +CVE-2020-7012 - https://www.elastic.co/community/security/ +CVE-2020-7013 - https://www.elastic.co/community/security/ +CVE-2020-7014 - https://www.elastic.co/community/security/ +CVE-2020-7015 - https://www.elastic.co/community/security/ +CVE-2020-7016 - https://www.elastic.co/community/security/ +CVE-2020-7016 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-7017 - https://www.elastic.co/community/security/ +CVE-2020-7017 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-7020 - https://staging-website.elastic.co/community/security/ +CVE-2020-7030 - http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html +CVE-2020-7032 - http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html +CVE-2020-7032 - http://seclists.org/fulldisclosure/2020/Nov/31 +CVE-2020-7032 - https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ +CVE-2020-7044 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-7047 - https://wpvulndb.com/vulnerabilities/10028 +CVE-2020-7048 - https://wpvulndb.com/vulnerabilities/10027 +CVE-2020-7050 - https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/ +CVE-2020-7051 - https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/ +CVE-2020-7052 - https://www.tenable.com/security/research/tra-2020-04 +CVE-2020-7053 - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html +CVE-2020-7053 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522 +CVE-2020-7053 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 +CVE-2020-7053 - https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks@canonical.com +CVE-2020-7053 - https://usn.ubuntu.com/4287-2/ +CVE-2020-7054 - https://github.com/mz-automation/libiec61850/issues/200 +CVE-2020-7059 - https://hackerone.com/reports/778834 +CVE-2020-7059 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7059 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-7060 - https://bugs.php.net/bug.php?id=79037 +CVE-2020-7060 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7060 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-7062 - https://bugs.php.net/bug.php?id=79221 +CVE-2020-7064 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-7065 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-7067 - https://bugs.php.net/bug.php?id=79465 +CVE-2020-7067 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7067 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-7068 - https://bugs.php.net/bug.php?id=79797 +CVE-2020-7069 - https://usn.ubuntu.com/4583-1/ +CVE-2020-7069 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7069 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-7070 - https://usn.ubuntu.com/4583-1/ +CVE-2020-7070 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-7071 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-7104 - https://wpvulndb.com/vulnerabilities/10029 +CVE-2020-7107 - https://wpvulndb.com/vulnerabilities/10006 +CVE-2020-7108 - http://packetstormsecurity.com/files/156275/LearnDash-WordPress-LMS-3.1.2-Cross-Site-Scripting.html +CVE-2020-7108 - https://wpvulndb.com/vulnerabilities/10026 +CVE-2020-7115 - http://packetstormsecurity.com/files/158368/ClearPass-Policy-Manager-Unauthenticated-Remote-Command-Execution.html +CVE-2020-7200 - http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html +CVE-2020-7209 - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html +CVE-2020-7209 - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html +CVE-2020-7210 - http://packetstormsecurity.com/files/156062/Umbraco-CMS-8.2.2-Cross-Site-Request-Forgery.html +CVE-2020-7210 - http://seclists.org/fulldisclosure/2020/Jan/33 +CVE-2020-7210 - https://sec-consult.com/en/blog/advisories/cross-site-request-forgery-csrf-in-umbraco-cms/ +CVE-2020-7210 - https://seclists.org/bugtraq/2020/Jan/35 +CVE-2020-7213 - http://almorabea.net/en/2020/01/19/write-up-for-the-parallel-vulnerability-cve-2020-7213/ +CVE-2020-7222 - https://sku11army.blogspot.com/2020/01/amcrest-2520ac0018r-login-bypass.html +CVE-2020-7224 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html +CVE-2020-7224 - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001 +CVE-2020-7226 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-7226 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-7228 - https://wpvulndb.com/vulnerabilities/10043 +CVE-2020-7229 - https://github.com/niteosoft/simplejobscript/issues/7 +CVE-2020-7231 - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html +CVE-2020-7232 - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html +CVE-2020-7233 - https://sku11army.blogspot.com/2020/01/kms-controls-backdoor-in-bacnet.html +CVE-2020-7234 - https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html +CVE-2020-7239 - https://wpvulndb.com/vulnerabilities/10035 +CVE-2020-7240 - https://sku11army.blogspot.com/2020/01/heinberg-lantime-m1000-rce.html +CVE-2020-7241 - https://github.com/V1n1v131r4/Exploiting-WP-Database-Backup-WordPress-Plugin/blob/master/README.md +CVE-2020-7241 - https://zeroauth.ltd/blog/2020/01/21/analysis-on-cve-2020-7241-misrepresenting-a-security-vulnerability/ +CVE-2020-7242 - https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html +CVE-2020-7246 - http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html +CVE-2020-7246 - http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html +CVE-2020-7246 - http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html +CVE-2020-7246 - http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html +CVE-2020-7246 - https://docs.google.com/document/d/13ZZSm0DL1Ie6r_fU5ZdDKGZ4defFqiFXMG--zDo8S10/edit?usp=sharing +CVE-2020-7247 - http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html +CVE-2020-7247 - http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html +CVE-2020-7247 - http://packetstormsecurity.com/files/156249/OpenSMTPD-MAIL-FROM-Remote-Code-Execution.html +CVE-2020-7247 - http://packetstormsecurity.com/files/156295/OpenSMTPD-6.6.1-Local-Privilege-Escalation.html +CVE-2020-7247 - http://packetstormsecurity.com/files/162093/OpenBSD-OpenSMTPD-6.6-Remote-Code-Execution.html +CVE-2020-7247 - http://seclists.org/fulldisclosure/2020/Jan/49 +CVE-2020-7247 - http://www.openwall.com/lists/oss-security/2020/01/28/3 +CVE-2020-7248 - https://github.com/openwrt/openwrt/commits/master +CVE-2020-7250 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7251 - https://kc.mcafee.com/corporate/index?page=content&id=SB10299 +CVE-2020-7252 - https://kc.mcafee.com/corporate/index?page=content&id=SB10307 +CVE-2020-7253 - https://kc.mcafee.com/corporate/index?page=content&id=SB10312 +CVE-2020-7254 - https://kc.mcafee.com/corporate/index?page=content&id=SB10311 +CVE-2020-7255 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7259 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7260 - https://kc.mcafee.com/corporate/index?page=content&id=SB10313 +CVE-2020-7261 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7262 - https://kc.mcafee.com/corporate/index?page=content&id=SB10319 +CVE-2020-7263 - https://kc.mcafee.com/corporate/index?page=content&id=SB10314 +CVE-2020-7268 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7269 - https://kc.mcafee.com/corporate/index?page=content&id=SB10336 +CVE-2020-7270 - https://kc.mcafee.com/corporate/index?page=content&id=SB10336 +CVE-2020-7273 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7274 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7275 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7276 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7277 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7278 - https://kc.mcafee.com/corporate/index?page=content&id=SB10309 +CVE-2020-7279 - https://kc.mcafee.com/corporate/index?page=content&id=SB10320 +CVE-2020-7280 - https://kc.mcafee.com/corporate/index?page=content&id=SB10302 +CVE-2020-7292 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7293 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7294 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7295 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7296 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7297 - https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +CVE-2020-7300 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7301 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7302 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7303 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7304 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7305 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7306 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7307 - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 +CVE-2020-7308 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354 +CVE-2020-7309 - https://kc.mcafee.com/corporate/index?page=content&id=SB10324 +CVE-2020-7311 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 +CVE-2020-7312 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 +CVE-2020-7314 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 +CVE-2020-7315 - https://kc.mcafee.com/corporate/index?page=content&id=SB10325 +CVE-2020-7316 - https://kc.mcafee.com/corporate/index?page=content&id=SB10330 +CVE-2020-7317 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-7318 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-7319 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 +CVE-2020-7320 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 +CVE-2020-7322 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 +CVE-2020-7323 - https://kc.mcafee.com/corporate/index?page=content&id=SB10327 +CVE-2020-7324 - https://kc.mcafee.com/corporate/index?page=content&id=SB10328 +CVE-2020-7325 - https://kc.mcafee.com/corporate/index?page=content&id=SB10328 +CVE-2020-7326 - https://kc.mcafee.com/corporate/index?page=content&id=SB10331 +CVE-2020-7327 - https://kc.mcafee.com/corporate/index?page=content&id=SB10331 +CVE-2020-7328 - https://kc.mcafee.com/corporate/index?page=content&id=SB10334 +CVE-2020-7329 - https://kc.mcafee.com/corporate/index?page=content&id=SB10334 +CVE-2020-7331 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335 +CVE-2020-7332 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335 +CVE-2020-7333 - https://kc.mcafee.com/corporate/index?page=content&id=SB10335 +CVE-2020-7336 - https://kc.mcafee.com/corporate/index?page=content&id=SB10341 +CVE-2020-7337 - https://kc.mcafee.com/corporate/index?page=content&id=SB10338 +CVE-2020-7339 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340 +CVE-2020-7343 - https://kc.mcafee.com/corporate/index?page=content&id=SB10343 +CVE-2020-7346 - https://kc.mcafee.com/corporate/index?page=content&id=SB10344 +CVE-2020-7350 - https://github.com/rapid7/metasploit-framework/issues/13026 +CVE-2020-7351 - http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html +CVE-2020-7352 - https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/ +CVE-2020-7354 - https://avalz.it/research/metasploit-pro-xss-to-rce/ +CVE-2020-7355 - https://avalz.it/research/metasploit-pro-xss-to-rce/ +CVE-2020-7356 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php +CVE-2020-7357 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php +CVE-2020-7361 - https://github.com/rapid7/metasploit-framework/pull/13828 +CVE-2020-7363 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ +CVE-2020-7363 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html +CVE-2020-7364 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ +CVE-2020-7364 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html +CVE-2020-7369 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ +CVE-2020-7369 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html +CVE-2020-7370 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ +CVE-2020-7370 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html +CVE-2020-7371 - https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ +CVE-2020-7371 - https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html +CVE-2020-7373 - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ +CVE-2020-7377 - https://github.com/rapid7/metasploit-framework/issues/14015 +CVE-2020-7384 - http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html +CVE-2020-7384 - http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html +CVE-2020-7457 - http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html +CVE-2020-7470 - https://sku11army.blogspot.com/2020/01/sonoff-sonoff-th-module-vuln-xss.html +CVE-2020-7483 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 +CVE-2020-7484 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 +CVE-2020-7485 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 +CVE-2020-7486 - https://www.se.com/ww/en/download/document/SESB-2020-105-01 +CVE-2020-7491 - https://www.se.com/ww/en/download/document/SESB-2020-105-01/ +CVE-2020-7499 - https://www.se.com/ww/en/download/document/SEVD-2020-133-03/ +CVE-2020-7500 - https://www.se.com/ww/en/download/document/SEVD-2020-133-03/ +CVE-2020-7590 - https://www.siemens-healthineers.com/support-documentation/security-advisory +CVE-2020-7593 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069 +CVE-2020-7594 - https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html +CVE-2020-7595 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-7595 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-7595 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-7595 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-7596 - https://snyk.io/vuln/SNYK-JS-CODECOV-543183 +CVE-2020-7597 - https://snyk.io/vuln/SNYK-JS-CODECOV-548879 +CVE-2020-7598 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764 +CVE-2020-7600 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867 +CVE-2020-7601 - https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114 +CVE-2020-7602 - https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115 +CVE-2020-7603 - https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123 +CVE-2020-7604 - https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122 +CVE-2020-7605 - https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124 +CVE-2020-7606 - https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125 +CVE-2020-7607 - https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126 +CVE-2020-7608 - https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381 +CVE-2020-7609 - https://snyk.io/vuln/SNYK-JS-NODERULES-560426 +CVE-2020-7611 - https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342 +CVE-2020-7613 - https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113 +CVE-2020-7614 - https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115 +CVE-2020-7615 - https://snyk.io/vuln/SNYK-JS-FSA-564118 +CVE-2020-7616 - https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120 +CVE-2020-7617 - https://snyk.io/vuln/SNYK-JS-INIPARSER-564122 +CVE-2020-7618 - https://snyk.io/vuln/SNYK-JS-SDS-564123 +CVE-2020-7619 - https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222 +CVE-2020-7620 - https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695 +CVE-2020-7621 - https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248 +CVE-2020-7623 - https://snyk.io/vuln/SNYK-JS-JSCOVER-564250 +CVE-2020-7624 - https://snyk.io/vuln/SNYK-JS-EFFECT-564256 +CVE-2020-7625 - https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259 +CVE-2020-7626 - https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260 +CVE-2020-7627 - https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261 +CVE-2020-7628 - https://snyk.io/vuln/SNYK-JS-UMOUNT-564265 +CVE-2020-7629 - https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267 +CVE-2020-7630 - https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269 +CVE-2020-7631 - https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425 +CVE-2020-7632 - https://snyk.io/vuln/SNYK-JS-NODEMPV-564426 +CVE-2020-7633 - https://snyk.io/vuln/SNYK-JS-APICONNECTCLIPLUGINS-564427 +CVE-2020-7634 - https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428 +CVE-2020-7635 - https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429 +CVE-2020-7636 - https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430 +CVE-2020-7637 - https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431 +CVE-2020-7638 - https://snyk.io/vuln/SNYK-JS-CONFINIT-564433 +CVE-2020-7639 - https://snyk.io/vuln/SNYK-JS-EIVIFJDOT-564435 +CVE-2020-7640 - https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968 +CVE-2020-7641 - https://security.snyk.io/vuln/SNYK-JS-GRUNTUTILPROPERTY-565088 +CVE-2020-7642 - https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144 +CVE-2020-7643 - https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089 +CVE-2020-7644 - https://snyk.io/vuln/SNYK-JS-FUNMAP-564436 +CVE-2020-7645 - http://snyk.io/vuln/SNYK-JS-CHROMELAUNCHER-537575 +CVE-2020-7646 - https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274 +CVE-2020-7648 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607 +CVE-2020-7649 - https://security.snyk.io/vuln/SNYK-JS-SNYKBROKER-570608 +CVE-2020-7650 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609 +CVE-2020-7651 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610 +CVE-2020-7652 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611 +CVE-2020-7653 - https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570612 +CVE-2020-7655 - https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141 +CVE-2020-7656 - https://snyk.io/vuln/SNYK-JS-JQUERY-569619 +CVE-2020-7656 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-7658 - https://snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140 +CVE-2020-7659 - https://snyk.io/vuln/SNYK-RUBY-REEL-569135 +CVE-2020-7661 - https://snyk.io/vuln/SNYK-JS-URLREGEX-569472 +CVE-2020-7662 - https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623 +CVE-2020-7663 - https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830 +CVE-2020-7664 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383 +CVE-2020-7665 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441 +CVE-2020-7666 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGCPIO-570440 +CVE-2020-7667 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427 +CVE-2020-7668 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384 +CVE-2020-7669 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428 +CVE-2020-7670 - https://github.com/ohler55/agoo/issues/88 +CVE-2020-7670 - https://snyk.io/vuln/SNYK-RUBY-AGOO-569137 +CVE-2020-7671 - https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136 +CVE-2020-7672 - https://snyk.io/vuln/SNYK-JS-MOSC-571492 +CVE-2020-7673 - https://snyk.io/vuln/SNYK-JS-NODEEXTEND-571491 +CVE-2020-7674 - https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490 +CVE-2020-7675 - https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493 +CVE-2020-7677 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-572317 +CVE-2020-7677 - https://security.snyk.io/vuln/SNYK-JS-THENIFY-571690 +CVE-2020-7678 - https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691 +CVE-2020-7679 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-572804 +CVE-2020-7679 - https://snyk.io/vuln/SNYK-JS-CASPERJS-572803 +CVE-2020-7680 - http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html +CVE-2020-7680 - http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html +CVE-2020-7680 - https://github.com/docsifyjs/docsify/issues/1126 +CVE-2020-7680 - https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099 +CVE-2020-7681 - https://snyk.io/vuln/SNYK-JS-MARSCODE-590122 +CVE-2020-7682 - https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121 +CVE-2020-7683 - https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123 +CVE-2020-7685 - https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765 +CVE-2020-7686 - https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124 +CVE-2020-7687 - https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892 +CVE-2020-7688 - https://github.com/418sec/huntr/pull/102 +CVE-2020-7688 - https://snyk.io/vuln/SNYK-JS-MVERSION-573174 +CVE-2020-7690 - https://snyk.io/vuln/SNYK-JS-JSPDF-575256 +CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255 +CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253 +CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254 +CVE-2020-7691 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252 +CVE-2020-7691 - https://snyk.io/vuln/SNYK-JS-JSPDF-568273 +CVE-2020-7693 - https://github.com/andsnw/sockjs-dos-py +CVE-2020-7693 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448 +CVE-2020-7693 - https://snyk.io/vuln/SNYK-JS-SOCKJS-575261 +CVE-2020-7694 - https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560 +CVE-2020-7695 - https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471 +CVE-2020-7699 - https://github.com/richardgirges/express-fileupload/issues/236 +CVE-2020-7699 - https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969 +CVE-2020-7700 - https://snyk.io/vuln/SNYK-JS-PHPJS-598681 +CVE-2020-7701 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676 +CVE-2020-7702 - https://snyk.io/vuln/SNYK-JS-TEMPL8-598770 +CVE-2020-7703 - https://snyk.io/vuln/SNYK-JS-NISUTILS-598799 +CVE-2020-7704 - https://snyk.io/vuln/SNYK-JS-LINUXCMDLINE-598674 +CVE-2020-7705 - https://snyk.io/research/sour-mint-malicious-sdk/ +CVE-2020-7706 - https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853 +CVE-2020-7707 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857 +CVE-2020-7707 - https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800 +CVE-2020-7708 - https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672 +CVE-2020-7708 - https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673 +CVE-2020-7709 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598862 +CVE-2020-7709 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925 +CVE-2020-7710 - https://github.com/hacksparrow/safe-eval/issues/19 +CVE-2020-7710 - https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076 +CVE-2020-7711 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-608301 +CVE-2020-7712 - https://github.com/trentm/json/issues/144 +CVE-2020-7712 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931 +CVE-2020-7712 - https://snyk.io/vuln/SNYK-JS-JSON-597481 +CVE-2020-7712 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-7712 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-7712 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-7713 - https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396 +CVE-2020-7714 - https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665 +CVE-2020-7715 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666 +CVE-2020-7716 - https://snyk.io/vuln/SNYK-JS-DEEPS-598667 +CVE-2020-7717 - https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668 +CVE-2020-7718 - https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670 +CVE-2020-7719 - https://github.com/kvz/locutus/pull/418/ +CVE-2020-7719 - https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675 +CVE-2020-7720 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293 +CVE-2020-7720 - https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677 +CVE-2020-7721 - https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678 +CVE-2020-7722 - https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679 +CVE-2020-7723 - https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686 +CVE-2020-7724 - https://snyk.io/vuln/SNYK-JS-TINYCONF-598792 +CVE-2020-7725 - https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798 +CVE-2020-7726 - https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801 +CVE-2020-7727 - https://snyk.io/vuln/SNYK-JS-GEDI-598803 +CVE-2020-7729 - https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7 +CVE-2020-7731 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302 +CVE-2020-7733 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666 +CVE-2020-7733 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665 +CVE-2020-7733 - https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226 +CVE-2020-7733 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-7734 - https://github.com/arachnys/cabot/pull/694 +CVE-2020-7734 - https://snyk.io/vuln/SNYK-PYTHON-CABOT-609862 +CVE-2020-7734 - https://www.exploit-db.com/exploits/48791 +CVE-2020-7736 - https://snyk.io/vuln/SNYK-JS-BMOOR-598664 +CVE-2020-7737 - https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687 +CVE-2020-7739 - https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638 +CVE-2020-7740 - https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636 +CVE-2020-7742 - https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157 +CVE-2020-7744 - https://snyk.io/blog/remote-code-execution-rce-sourmint/ +CVE-2020-7744 - https://snyk.io/research/sour-mint-malicious-sdk/ +CVE-2020-7745 - https://snyk.io/blog/remote-code-execution-rce-sourmint/ +CVE-2020-7745 - https://snyk.io/research/sour-mint-malicious-sdk/%23rce +CVE-2020-7745 - https://www.youtube.com/watch?v=n-mEMkeoUqs +CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375 +CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376 +CVE-2020-7746 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374 +CVE-2020-7746 - https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716 +CVE-2020-7747 - https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381 +CVE-2020-7748 - https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382 +CVE-2020-7749 - https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637 +CVE-2020-7750 - https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497 +CVE-2020-7751 - https://snyk.io/vuln/SNYK-JS-PATHVAL-596926 +CVE-2020-7752 - https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909 +CVE-2020-7753 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132 +CVE-2020-7753 - https://snyk.io/vuln/SNYK-JS-TRIM-1017038 +CVE-2020-7755 - https://snyk.io/vuln/SNYK-JS-DATGUI-1016275 +CVE-2020-7757 - https://snyk.io/vuln/SNYK-JS-DROPPY-1023656 +CVE-2020-7758 - https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657 +CVE-2020-7759 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447 +CVE-2020-7760 - https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937 +CVE-2020-7760 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-7760 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7760 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-7762 - https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310 +CVE-2020-7763 - https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598 +CVE-2020-7764 - https://hackerone.com/reports/1025575 +CVE-2020-7764 - https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269 +CVE-2020-7765 - https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324 +CVE-2020-7766 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396 +CVE-2020-7766 - https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939 +CVE-2020-7767 - https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404 +CVE-2020-7768 - https://github.com/grpc/grpc-node/pull/1606 +CVE-2020-7768 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819 +CVE-2020-7768 - https://snyk.io/vuln/SNYK-JS-GRPC-598671 +CVE-2020-7768 - https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818 +CVE-2020-7769 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742 +CVE-2020-7769 - https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834 +CVE-2020-7771 - https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799 +CVE-2020-7772 - https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952 +CVE-2020-7773 - https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461 +CVE-2020-7774 - https://github.com/yargs/y18n/issues/96 +CVE-2020-7774 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306 +CVE-2020-7774 - https://snyk.io/vuln/SNYK-JS-Y18N-1021887 +CVE-2020-7774 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7775 - https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716 +CVE-2020-7776 - https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856 +CVE-2020-7777 - https://snyk.io/vuln/SNYK-JS-JSEN-1014670 +CVE-2020-7778 - https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753 +CVE-2020-7781 - https://snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337 +CVE-2020-7782 - https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333 +CVE-2020-7784 - https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334 +CVE-2020-7785 - https://snyk.io/vuln/SNYK-JS-NODEPS-1048335 +CVE-2020-7786 - https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336 +CVE-2020-7787 - https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907 +CVE-2020-7788 - https://snyk.io/vuln/SNYK-JS-INI-1048974 +CVE-2020-7793 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388 +CVE-2020-7793 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387 +CVE-2020-7793 - https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599 +CVE-2020-7794 - https://snyk.io/vuln/SNYK-JS-BUNS-1050389 +CVE-2020-7795 - https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390 +CVE-2020-7799 - http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html +CVE-2020-7799 - https://lab.mediaservice.net/advisory/2020-03-fusionauth.txt +CVE-2020-7919 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-7920 - https://jira.percona.com/browse/PMM-5232 +CVE-2020-7920 - https://jira.percona.com/browse/PMM-5233 +CVE-2020-7920 - https://www.percona.com/blog/2020/02/03/improvements-in-pmm-bug-fixes-in-percona-server-percona-backup-for-mongodb-alert-release-roundup-2-3-2020/ +CVE-2020-7934 - http://packetstormsecurity.com/files/160168/LifeRay-7.2.1-GA2-Cross-Site-Scripting.html +CVE-2020-7934 - https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 +CVE-2020-7934 - https://semanticbits.com/liferay-portal-authenticated-xss-disclosure/ +CVE-2020-7953 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 +CVE-2020-7954 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 +CVE-2020-7959 - https://www.exploit-db.com/exploits/48090 +CVE-2020-7961 - http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html +CVE-2020-7961 - http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html +CVE-2020-7980 - http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html +CVE-2020-7980 - https://github.com/Xh4H/Satellian-CVE-2020-7980 +CVE-2020-7981 - https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613 +CVE-2020-7982 - https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982 +CVE-2020-7982 - https://github.com/openwrt/openwrt/commits/master +CVE-2020-7984 - https://blog.huntresslabs.com/validating-the-solarwinds-n-central-dumpster-diver-vulnerability-5e3a045982e5 +CVE-2020-7984 - https://packetstormsecurity.com/files/156033 +CVE-2020-7984 - https://www.crn.com/news/managed-services/solarwinds-rmm-tool-has-open-zero-day-exploit-huntress-labs +CVE-2020-7988 - https://pastebin.com/ZPECbgZb +CVE-2020-7989 - https://www.exploit-db.com/exploits/47946 +CVE-2020-7990 - https://www.exploit-db.com/exploits/47946 +CVE-2020-7991 - http://packetstormsecurity.com/files/156106/Adive-Framework-2.0.8-Cross-Site-Request-Forgery.html +CVE-2020-7991 - https://www.exploit-db.com/exploits/47946 +CVE-2020-7995 - http://packetstormsecurity.com/files/163541/Dolibarr-ERP-CRM-10.0.6-Login-Brute-Forcer.html +CVE-2020-7997 - https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68 +CVE-2020-7998 - https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f +CVE-2020-7999 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html +CVE-2020-8000 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html +CVE-2020-8001 - https://sku11army.blogspot.com/2020/01/intellian-multiple-vulnerabilities-in.html +CVE-2020-8010 - http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html +CVE-2020-8012 - http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html +CVE-2020-8012 - http://packetstormsecurity.com/files/158693/CA-Unified-Infrastructure-Management-Nimsoft-7.80-Buffer-Overflow.html +CVE-2020-8014 - https://bugzilla.suse.com/show_bug.cgi?id=1164131 +CVE-2020-8015 - https://bugzilla.suse.com/show_bug.cgi?id=1154183 +CVE-2020-8016 - https://bugzilla.suse.com/show_bug.cgi?id=1159740 +CVE-2020-8019 - https://bugzilla.suse.com/show_bug.cgi?id=1169385 +CVE-2020-8023 - https://bugzilla.suse.com/show_bug.cgi?id=1172698 +CVE-2020-8029 - https://bugzilla.suse.com/show_bug.cgi?id=1177362 +CVE-2020-8091 - https://www.purplemet.com/blog/typo3-xss-vulnerability +CVE-2020-8101 - https://labs.bitdefender.com/2021/01/cracking-the-lifeshield-unauthorized-live-streaming-in-your-home/ +CVE-2020-8105 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-theabode-iota-security-system-fake-image-injectioninto-timeline +CVE-2020-8112 - https://github.com/uclouvain/openjpeg/issues/1231 +CVE-2020-8112 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-8115 - https://hackerone.com/reports/775693 +CVE-2020-8116 - https://hackerone.com/reports/719856 +CVE-2020-8117 - https://hackerone.com/reports/439828 +CVE-2020-8118 - https://hackerone.com/reports/427835 +CVE-2020-8119 - https://hackerone.com/reports/719426 +CVE-2020-8120 - https://hackerone.com/reports/605915 +CVE-2020-8121 - https://hackerone.com/reports/452854 +CVE-2020-8122 - https://hackerone.com/reports/447494 +CVE-2020-8123 - https://hackerone.com/reports/768574 +CVE-2020-8124 - https://hackerone.com/reports/496293 +CVE-2020-8125 - https://hackerone.com/reports/778414 +CVE-2020-8126 - https://hackerone.com/reports/197958 +CVE-2020-8127 - https://hackerone.com/reports/691977 +CVE-2020-8128 - https://hackerone.com/reports/660565 +CVE-2020-8129 - https://hackerone.com/reports/660563 +CVE-2020-8130 - https://hackerone.com/reports/651518 +CVE-2020-8131 - https://hackerone.com/reports/730239 +CVE-2020-8132 - https://hackerone.com/reports/781664 +CVE-2020-8133 - https://hackerone.com/reports/661051 +CVE-2020-8134 - https://hackerone.com/reports/793704 +CVE-2020-8134 - https://hackerone.com/reports/815084 +CVE-2020-8135 - https://hackerone.com/reports/786956 +CVE-2020-8136 - https://hackerone.com/reports/804772 +CVE-2020-8137 - https://hackerone.com/reports/772448 +CVE-2020-8138 - https://hackerone.com/reports/736867 +CVE-2020-8139 - https://hackerone.com/reports/788257 +CVE-2020-8140 - https://hackerone.com/reports/633266 +CVE-2020-8141 - https://hackerone.com/reports/390929 +CVE-2020-8142 - https://hackerone.com/reports/792895 +CVE-2020-8143 - https://hackerone.com/reports/794144 +CVE-2020-8144 - https://hackerone.com/reports/330051 +CVE-2020-8145 - https://hackerone.com/reports/329659 +CVE-2020-8146 - https://hackerone.com/reports/530967 +CVE-2020-8147 - https://hackerone.com/reports/801522 +CVE-2020-8148 - https://hackerone.com/reports/802079 +CVE-2020-8149 - https://hackerone.com/reports/825729 +CVE-2020-8150 - https://hackerone.com/reports/742588 +CVE-2020-8151 - https://hackerone.com/reports/800231 +CVE-2020-8151 - https://hackerone.com/reports/803922 +CVE-2020-8152 - http://seclists.org/fulldisclosure/2020/Dec/54 +CVE-2020-8152 - https://hackerone.com/reports/743505 +CVE-2020-8153 - https://hackerone.com/reports/642515 +CVE-2020-8154 - https://hackerone.com/reports/819807 +CVE-2020-8155 - https://hackerone.com/reports/819863 +CVE-2020-8156 - https://hackerone.com/reports/803734 +CVE-2020-8158 - https://hackerone.com/reports/869574 +CVE-2020-8159 - https://hackerone.com/reports/519220 +CVE-2020-8160 - https://hackerone.com/reports/838178 +CVE-2020-8162 - https://hackerone.com/reports/789579 +CVE-2020-8163 - http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html +CVE-2020-8164 - https://hackerone.com/reports/292797 +CVE-2020-8165 - https://hackerone.com/reports/413388 +CVE-2020-8166 - https://hackerone.com/reports/732415 +CVE-2020-8167 - https://hackerone.com/reports/189878 +CVE-2020-8168 - https://hackerone.com/reports/323852 +CVE-2020-8168 - https://hackerone.com/reports/661647 +CVE-2020-8168 - https://hackerone.com/reports/703659 +CVE-2020-8169 - https://hackerone.com/reports/874778 +CVE-2020-8170 - https://hackerone.com/reports/386570 +CVE-2020-8170 - https://hackerone.com/reports/661647 +CVE-2020-8170 - https://hackerone.com/reports/703659 +CVE-2020-8172 - https://hackerone.com/reports/811502 +CVE-2020-8172 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8172 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8172 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-8172 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-8172 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-8173 - https://hackerone.com/reports/852841 +CVE-2020-8174 - https://hackerone.com/reports/784186 +CVE-2020-8174 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8174 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8174 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-8174 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-8175 - https://hackerone.com/reports/842462 +CVE-2020-8177 - https://hackerone.com/reports/887462 +CVE-2020-8177 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-8178 - https://hackerone.com/reports/690010 +CVE-2020-8179 - https://hackerone.com/reports/867052 +CVE-2020-8180 - https://hackerone.com/reports/851807 +CVE-2020-8181 - https://hackerone.com/reports/808287 +CVE-2020-8182 - https://hackerone.com/reports/827816 +CVE-2020-8183 - https://hackerone.com/reports/885041 +CVE-2020-8184 - https://hackerone.com/reports/895727 +CVE-2020-8185 - https://hackerone.com/reports/899069 +CVE-2020-8186 - https://hackerone.com/reports/863544 +CVE-2020-8189 - https://hackerone.com/reports/685552 +CVE-2020-8192 - https://hackerone.com/reports/903521 +CVE-2020-8193 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html +CVE-2020-8195 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html +CVE-2020-8196 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html +CVE-2020-8201 - https://hackerone.com/reports/922597 +CVE-2020-8202 - https://hackerone.com/reports/840598 +CVE-2020-8203 - https://hackerone.com/reports/712065 +CVE-2020-8203 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8203 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-8203 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-8204 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8205 - https://hackerone.com/reports/891270 +CVE-2020-8206 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8214 - https://hackerone.com/reports/355501 +CVE-2020-8215 - https://hackerone.com/reports/315037 +CVE-2020-8216 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8217 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8218 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8218 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/ +CVE-2020-8219 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8220 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8221 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8222 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 +CVE-2020-8223 - https://hackerone.com/reports/889243 +CVE-2020-8224 - https://hackerone.com/reports/622170 +CVE-2020-8225 - https://hackerone.com/reports/685990 +CVE-2020-8227 - https://hackerone.com/reports/590319 +CVE-2020-8228 - https://hackerone.com/reports/922470 +CVE-2020-8229 - https://hackerone.com/reports/588562 +CVE-2020-8230 - https://hackerone.com/reports/380102 +CVE-2020-8231 - https://hackerone.com/reports/948876 +CVE-2020-8231 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8235 - https://hackerone.com/reports/916704 +CVE-2020-8236 - https://hackerone.com/reports/924393 +CVE-2020-8237 - https://hackerone.com/reports/916430 +CVE-2020-8238 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588 +CVE-2020-8238 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/ +CVE-2020-8239 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8240 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8241 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8244 - https://hackerone.com/reports/966347 +CVE-2020-8248 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8249 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8250 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8251 - https://hackerone.com/reports/868834 +CVE-2020-8252 - https://hackerone.com/reports/965914 +CVE-2020-8254 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8255 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8256 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588 +CVE-2020-8256 - https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/ +CVE-2020-8259 - https://hackerone.com/reports/732431 +CVE-2020-8260 - http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html +CVE-2020-8260 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8261 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8262 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8263 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8265 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-8268 - https://hackerone.com/reports/980649 +CVE-2020-8276 - https://hackerone.com/reports/1024668 +CVE-2020-8277 - https://hackerone.com/reports/1033107 +CVE-2020-8277 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8277 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-8277 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-8278 - https://hackerone.com/reports/921717 +CVE-2020-8279 - https://hackerone.com/reports/915585 +CVE-2020-8284 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8284 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-8284 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8284 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-8285 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8285 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-8285 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8285 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-8286 - https://hackerone.com/reports/1048457 +CVE-2020-8286 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8286 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-8286 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8287 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-8289 - https://github.com/geffner/CVE-2020-8289/blob/master/README.md +CVE-2020-8289 - https://youtu.be/W0THXbcX5V8 +CVE-2020-8290 - https://github.com/geffner/CVE-2020-8290/blob/master/README.md +CVE-2020-8290 - https://youtu.be/OpC6neWd2aM +CVE-2020-8298 - https://github.com/pillys/fs-path/pull/6 +CVE-2020-8416 - http://packetstormsecurity.com/files/156170/BearFTP-0.1.0-Denial-Of-Service.html +CVE-2020-8416 - https://pastebin.com/wqNWnCuN +CVE-2020-8417 - https://wpvulndb.com/vulnerabilities/10050 +CVE-2020-8423 - https://ktln2.org/2020/03/29/exploiting-mips-router/ +CVE-2020-8424 - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html +CVE-2020-8424 - https://github.com/J3rryBl4nks/CUPSEasyExploits +CVE-2020-8425 - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html +CVE-2020-8425 - https://github.com/J3rryBl4nks/CUPSEasyExploits +CVE-2020-8426 - https://wpvulndb.com/vulnerabilities/10051 +CVE-2020-8428 - http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html +CVE-2020-8434 - https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80 +CVE-2020-8439 - http://uploadboy.me/cn40ne6p89t6/POC.mp4.html +CVE-2020-8440 - https://github.com/niteosoft/simplejobscript/issues/10 +CVE-2020-8461 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ +CVE-2020-8462 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ +CVE-2020-8463 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ +CVE-2020-8464 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ +CVE-2020-8465 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ +CVE-2020-8466 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/ +CVE-2020-8492 - https://github.com/python/cpython/pull/18284 +CVE-2020-8493 - http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html +CVE-2020-8495 - http://packetstormsecurity.com/files/156215/Kronos-WebTA-4.0-Privilege-Escalation-Cross-Site-Scripting.html +CVE-2020-8498 - https://wpvulndb.com/vulnerabilities/10053 +CVE-2020-8504 - https://github.com/J3rryBl4nks/SchoolERPCSRF +CVE-2020-8505 - https://github.com/J3rryBl4nks/SchoolERPCSRF +CVE-2020-8506 - http://packetstormsecurity.com/files/156425/Global-TV-Unencrypted-Analytics.html +CVE-2020-8507 - http://packetstormsecurity.com/files/156426/Citytv-Video-Unencrypted-Analytics.html +CVE-2020-8512 - http://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html +CVE-2020-8512 - https://cxsecurity.com/issue/WLB-2020010205 +CVE-2020-8512 - https://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html +CVE-2020-8515 - http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html +CVE-2020-8515 - https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html +CVE-2020-8518 - http://packetstormsecurity.com/files/156872/Horde-5.2.22-CSV-Import-Code-Execution.html +CVE-2020-8541 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html +CVE-2020-8542 - http://packetstormsecurity.com/files/158932/OX-App-Suite-OX-Documents-XSS-SSRF-Bypass.html +CVE-2020-8542 - http://seclists.org/fulldisclosure/2020/Aug/14 +CVE-2020-8542 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html +CVE-2020-8543 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html +CVE-2020-8544 - https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html +CVE-2020-8547 - https://www.exploit-db.com/exploits/47989 +CVE-2020-8549 - http://packetstormsecurity.com/files/156369/WordPress-Strong-Testimonials-2.40.1-Cross-Site-Scripting.html +CVE-2020-8549 - https://wpvulndb.com/vulnerabilities/10056 +CVE-2020-8551 - https://hackerone.com/reports/774896 +CVE-2020-8553 - https://hackerone.com/reports/778803 +CVE-2020-8554 - https://github.com/kubernetes/kubernetes/issues/97076 +CVE-2020-8554 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8554 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8554 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-8555 - https://hackerone.com/reports/776017 +CVE-2020-8557 - https://hackerone.com/reports/867699 +CVE-2020-8559 - https://github.com/kubernetes/kubernetes/issues/92914 +CVE-2020-8559 - https://hackerone.com/reports/863979 +CVE-2020-8563 - https://hackerone.com/reports/966383 +CVE-2020-8565 - https://hackerone.com/reports/952771 +CVE-2020-8568 - https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378 +CVE-2020-8569 - https://hackerone.com/reports/1032086 +CVE-2020-8594 - https://wpvulndb.com/vulnerabilities/10070 +CVE-2020-8595 - https://github.com/istio/istio/commits/master +CVE-2020-8596 - https://blog.impenetrable.tech/cve-2020-8596 +CVE-2020-8596 - https://wpvulndb.com/vulnerabilities/10068 +CVE-2020-8597 - http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html +CVE-2020-8597 - http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html +CVE-2020-8597 - https://www.kb.cert.org/vuls/id/782301 +CVE-2020-8604 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html +CVE-2020-8604 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html +CVE-2020-8605 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html +CVE-2020-8605 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html +CVE-2020-8606 - http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html +CVE-2020-8606 - http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html +CVE-2020-8615 - http://packetstormsecurity.com/files/156585/WordPress-Tutor-LMS-1.5.3-Cross-Site-Request-Forgery.html +CVE-2020-8615 - https://wpvulndb.com/vulnerabilities/10058 +CVE-2020-8617 - http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html +CVE-2020-8622 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-8631 - https://github.com/canonical/cloud-init/pull/204 +CVE-2020-8636 - https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 +CVE-2020-8639 - http://packetstormsecurity.com/files/161401/TestLink-1.9.20-Shell-Upload.html +CVE-2020-8641 - https://www.exploit-db.com/exploits/47985 +CVE-2020-8644 - http://packetstormsecurity.com/files/157106/PlaySMS-index.php-Unauthenticated-Template-Injection-Code-Execution.html +CVE-2020-8644 - https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/ +CVE-2020-8645 - https://github.com/niteosoft/simplejobscript/issues/9 +CVE-2020-8648 - https://usn.ubuntu.com/4342-1/ +CVE-2020-8654 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html +CVE-2020-8654 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html +CVE-2020-8655 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html +CVE-2020-8655 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html +CVE-2020-8656 - http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html +CVE-2020-8656 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html +CVE-2020-8657 - http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html +CVE-2020-8658 - https://github.com/V1n1v131r4/Exploiting-WP-Htaccess-by-BestWebSoft-Plugin/blob/master/README.md +CVE-2020-8658 - https://wpvulndb.com/vulnerabilities/10060 +CVE-2020-8674 - https://support.lenovo.com/de/en/product_security/len-30041 +CVE-2020-8674 - https://www.kb.cert.org/vuls/id/257161 +CVE-2020-8679 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-8680 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-8681 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-8682 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-8683 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html +CVE-2020-8771 - https://wpvulndb.com/vulnerabilities/10010 +CVE-2020-8772 - https://wpvulndb.com/vulnerabilities/10011 +CVE-2020-8776 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html +CVE-2020-8777 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html +CVE-2020-8778 - http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html +CVE-2020-8789 - http://packetstormsecurity.com/files/157787/Composr-CMS-10.0.30-Cross-Site-Scripting.html +CVE-2020-8789 - http://seclists.org/fulldisclosure/2020/May/39 +CVE-2020-8793 - http://seclists.org/fulldisclosure/2020/Feb/28 +CVE-2020-8793 - http://www.openwall.com/lists/oss-security/2020/02/24/4 +CVE-2020-8794 - http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html +CVE-2020-8794 - http://www.openwall.com/lists/oss-security/2021/05/04/7 +CVE-2020-8799 - https://wpvulndb.com/vulnerabilities/10210 +CVE-2020-8800 - http://packetstormsecurity.com/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html +CVE-2020-8801 - http://packetstormsecurity.com/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html +CVE-2020-8802 - http://packetstormsecurity.com/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html +CVE-2020-8803 - http://packetstormsecurity.com/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html +CVE-2020-8804 - http://packetstormsecurity.com/files/156331/SuiteCRM-7.11.10-SQL-Injection.html +CVE-2020-8808 - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-001.md +CVE-2020-8812 - https://github.com/bludit/bludit/issues/1132 +CVE-2020-8813 - http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html +CVE-2020-8813 - http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html +CVE-2020-8813 - http://packetstormsecurity.com/files/156593/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html +CVE-2020-8813 - http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html +CVE-2020-8813 - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ +CVE-2020-8816 - http://packetstormsecurity.com/files/157861/Pi-Hole-4.3.2-DHCP-MAC-OS-Command-Execution.html +CVE-2020-8816 - http://packetstormsecurity.com/files/158737/Pi-hole-4.3.2-Remote-Code-Execution.html +CVE-2020-8818 - http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html +CVE-2020-8818 - https://github.com/cardgate/magento2/issues/54 +CVE-2020-8819 - http://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html +CVE-2020-8819 - https://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442 +CVE-2020-8819 - https://github.com/cardgate/woocommerce/issues/18 +CVE-2020-8819 - https://wpvulndb.com/vulnerabilities/10097 +CVE-2020-8819 - https://www.exploit-db.com/exploits/48134 +CVE-2020-8822 - https://sku11army.blogspot.com/2020/02/digi-transport-stored-xss-on-wr-family.html +CVE-2020-8823 - https://snyk.io/vuln/SNYK-JS-SOCKJS-548397 +CVE-2020-8824 - https://gist.github.com/9thplayer/df042fe48c314dbc1afad80ffed8387d +CVE-2020-8825 - http://packetstormsecurity.com/files/156281/Vanilla-Forum-2.6.3-Cross-Site-Scripting.html +CVE-2020-8825 - https://github.com/hacky1997/CVE-2020-8825 +CVE-2020-8826 - https://www.soluble.ai/blog/argo-cves-2020 +CVE-2020-8827 - https://www.soluble.ai/blog/argo-cves-2020 +CVE-2020-8828 - https://www.soluble.ai/blog/argo-cves-2020 +CVE-2020-8832 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840 +CVE-2020-8833 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1862933 +CVE-2020-8835 - http://www.openwall.com/lists/oss-security/2021/07/20/1 +CVE-2020-8835 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2d67fec0b43edce8c416101cdc52e71145b5fef +CVE-2020-8838 - http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html +CVE-2020-8838 - http://seclists.org/fulldisclosure/2020/May/29 +CVE-2020-8839 - http://packetstormsecurity.com/files/156289/CHIYU-BF430-TCP-IP-Converter-Cross-Site-Scripting.html +CVE-2020-8839 - https://drive.google.com/open?id=1eDN0rsGPs4-yxeMxl7MGh__yjdbl-wON +CVE-2020-8840 - https://www.oracle.com/security-alerts/cpuapr2020.html +CVE-2020-8840 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-8843 - https://github.com/istio/istio/commits/master +CVE-2020-8860 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-8867 - https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf +CVE-2020-8887 - https://github.com/google/security-research/security/advisories/GHSA-g69r-8jwh-2462 +CVE-2020-8893 - https://zigrin.com/advisories/misp-bruteforce-protection-not-working-in-very-specific-environments/ +CVE-2020-8893 - https://zigrin.com/advisories/misp-reflected-xss-in-galaxy-view/ +CVE-2020-8899 - http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html +CVE-2020-8899 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2020-8899 - https://www.kb.cert.org/vuls/id/366027 +CVE-2020-8903 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 +CVE-2020-8907 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 +CVE-2020-8908 - https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415 +CVE-2020-8908 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-8908 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-8908 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-8911 - https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9 +CVE-2020-8912 - https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw +CVE-2020-8913 - https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ +CVE-2020-8916 - https://github.com/openthread/wpantund/pull/468/commits/0e5d1601febb869f583e944785e5685c6c747be7 +CVE-2020-8933 - https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020 +CVE-2020-8946 - https://sku11army.blogspot.com/2020/02/netis-authenticated-rce-on-wf2471.html +CVE-2020-8947 - http://packetstormsecurity.com/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html +CVE-2020-8948 - https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2020-002-cve-2020-8948/#sthash.ByZB8ifG.dpbs +CVE-2020-8950 - https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html +CVE-2020-8950 - https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html +CVE-2020-8956 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 +CVE-2020-8958 - https://github.com/qurbat/gpon +CVE-2020-8958 - https://www.karansaini.com/os-command-injection-v-sol/ +CVE-2020-8959 - https://www.westerndigital.com/support/productsecurity/wdc-20001-ssd-dashboard-setup-privilege-escalation +CVE-2020-8960 - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-site-version-2-2-0-134 +CVE-2020-8960 - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-xss-vulnerability +CVE-2020-8963 - https://sku11army.blogspot.com/2020/02/timetools-sr-sc-series-network-time.html +CVE-2020-8964 - https://sku11army.blogspot.com/2020/02/timetools-sr-sc-series-network-time.html +CVE-2020-8990 - https://www.westerndigital.com/support/productsecurity/wdc-19013-my-cloud-home-and-ibi-session-invalidation-vulnerability +CVE-2020-8992 - https://usn.ubuntu.com/4342-1/ +CVE-2020-8992 - https://usn.ubuntu.com/4419-1/ +CVE-2020-8994 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-8994.md +CVE-2020-8994 - https://youtu.be/yCadG38yZW8 +CVE-2020-8995 - http://seclists.org/fulldisclosure/2020/Dec/38 +CVE-2020-8995 - https://packetstormsecurity.com/files/160626/Programi-Bilanc-Build-007-Release-014-31.01.2020-Hardcoded-Credentials.html +CVE-2020-9000 - https://websec.nl/blog/ +CVE-2020-9000 - https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/ +CVE-2020-9002 - https://websec.nl/blog/ +CVE-2020-9002 - https://websec.nl/blog/6127847280e759c7d31286d0/cve%20report%20august%202021/ +CVE-2020-9003 - https://wpvulndb.com/vulnerabilities/10077 +CVE-2020-9006 - https://wpvulndb.com/vulnerabilities/10073 +CVE-2020-9006 - https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/ +CVE-2020-9013 - https://www.exploit-db.com/docs/48175 +CVE-2020-9014 - https://github.com/FULLSHADE/Kernel-exploits +CVE-2020-9014 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/EMP_NSAU.sys +CVE-2020-9015 - http://packetstormsecurity.com/files/158119/Arista-Restricted-Shell-Escape-Privilege-Escalation.html +CVE-2020-9015 - https://securitybytes.me +CVE-2020-9015 - https://securitybytes.me/posts/cve-2020-9015/ +CVE-2020-9016 - https://code610.blogspot.com/2020/02/this-time-i-tried-to-check-one-of.html +CVE-2020-9019 - https://wpvulndb.com/vulnerabilities/10113 +CVE-2020-9021 - https://sku11army.blogspot.com/2020/01/post-oak-traffic-systems-awam-bluetooth.html +CVE-2020-9023 - https://sku11army.blogspot.com/2020/01/iteris-vantage-velocity-field-unit-no.html +CVE-2020-9026 - https://sku11army.blogspot.com/2020/01/eltex-devices-ntp-rg-1402g-ntp-2-os.html +CVE-2020-9027 - https://sku11army.blogspot.com/2020/01/eltex-devices-ntp-rg-1402g-ntp-2-os.html +CVE-2020-9029 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html +CVE-2020-9030 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html +CVE-2020-9031 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html +CVE-2020-9032 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html +CVE-2020-9033 - https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html +CVE-2020-9036 - https://sysdream.com/news/lab/2020-08-05-cve-2020-9036-jeedom-xss-leading-to-remote-code-execution/ +CVE-2020-9038 - http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html +CVE-2020-9038 - https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc +CVE-2020-9038 - https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20 +CVE-2020-9043 - https://wpvulndb.com/vulnerabilities/10074 +CVE-2020-9054 - https://kb.cert.org/artifacts/cve-2020-9054.html +CVE-2020-9054 - https://kb.cert.org/vuls/id/498544/ +CVE-2020-9054 - https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/ +CVE-2020-9055 - https://kb.cert.org/vuls/id/962085/ +CVE-2020-9056 - https://kb.cert.org/vuls/id/660597/ +CVE-2020-9057 - https://github.com/CNK2100/VFuzz-public +CVE-2020-9058 - https://github.com/CNK2100/VFuzz-public +CVE-2020-9059 - https://github.com/CNK2100/VFuzz-public +CVE-2020-9060 - https://github.com/CNK2100/VFuzz-public +CVE-2020-9061 - https://github.com/CNK2100/VFuzz-public +CVE-2020-9264 - https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html +CVE-2020-9265 - https://github.com/J3rryBl4nks/PHPMyChatPlus/blob/master/SQLi.md +CVE-2020-9266 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/AdminPasswordChangeCSRF.md +CVE-2020-9267 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/AddUserCSRF.md +CVE-2020-9269 - https://github.com/J3rryBl4nks/SOPlanning/blob/master/InjectionIcalShell.md +CVE-2020-9270 - https://github.com/J3rryBl4nks/IceHRM/blob/master/ChangeUserPasswordCSRF.md +CVE-2020-9271 - https://github.com/J3rryBl4nks/IceHRM/blob/master/AddNewUserCSRF.md +CVE-2020-9273 - https://github.com/proftpd/proftpd/issues/903 +CVE-2020-9275 - https://raelize.com/advisories/CVE-2020-9275_D-Link-DSL-2640B_Remote-Credentials-Exfiltration_v1.0.txt +CVE-2020-9277 - https://raelize.com/advisories/CVE-2020-9277_D-Link-DSL-2640B_CGI-Authentication-bypass_v1.0.txt +CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-9281 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9281 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9281 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-9283 - http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html +CVE-2020-9287 - https://fortiguard.com/psirt/FG-IR-19-060 +CVE-2020-9288 - https://fortiguard.com/advisory/FG-IR-20-016 +CVE-2020-9290 - https://fortiguard.com/psirt/FG-IR-19-060 +CVE-2020-9291 - https://fortiguard.com/psirt/FG-IR-20-040 +CVE-2020-9292 - https://fortiguard.com/advisory/FG-IR-20-021 +CVE-2020-9306 - https://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html +CVE-2020-9314 - https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf +CVE-2020-9315 - https://www.oracle.com/us/assets/lifetime-support-middleware-069163.pdf +CVE-2020-9320 - http://packetstormsecurity.com/files/156472/AVIRA-Generic-Malformed-Container-Bypass.html +CVE-2020-9320 - http://seclists.org/fulldisclosure/2020/Feb/31 +CVE-2020-9320 - https://blog.zoller.lu/p/from-low-hanging-fruit-department-avira.html +CVE-2020-9327 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-9327 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9327 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-9327 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9327 - https://www.sqlite.org/cgi/src/info/4374860b29383380 +CVE-2020-9329 - https://github.com/gogs/gogs/issues/5926 +CVE-2020-9331 - https://www.youtube.com/watch?v=b5vPDmMtzwQ +CVE-2020-9332 - https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/ +CVE-2020-9334 - https://wpvulndb.com/vulnerabilities/10089 +CVE-2020-9335 - https://wpvulndb.com/vulnerabilities/10088 +CVE-2020-9339 - https://github.com/0xEmma/CVEs/blob/master/CVEs/2020-02-14-SoPlanning-Status-XSS.md +CVE-2020-9341 - https://github.com/J3rryBl4nks/CandidATS/blob/master/AddAdminUserCSRF.md +CVE-2020-9342 - http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html +CVE-2020-9342 - https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html +CVE-2020-9343 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-053.txt +CVE-2020-9344 - https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin +CVE-2020-9344 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt +CVE-2020-9345 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-052.txt +CVE-2020-9361 - https://www.youtube.com/watch?v=b5vPDmMtzwQ +CVE-2020-9362 - http://packetstormsecurity.com/files/156580/QuickHeal-Generic-Malformed-Archive-Bypass.html +CVE-2020-9362 - https://blog.zoller.lu/p/from-low-hanging-fruit-department_24.html +CVE-2020-9362 - https://blog.zoller.lu/p/tzo-20-2020-quickheal-malformed-archive.html +CVE-2020-9363 - https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html +CVE-2020-9363 - https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363 +CVE-2020-9364 - http://packetstormsecurity.com/files/156655/Creative-Contact-Form-4.6.2-Directory-Traversal.html +CVE-2020-9368 - https://www.intrinsec.com/publications/ +CVE-2020-9370 - https://medium.com/@rsantos_14778/hijacked-session-cve-2020-9370-255bbd02975a +CVE-2020-9371 - http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html +CVE-2020-9371 - https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 +CVE-2020-9371 - https://wpvulndb.com/vulnerabilities/10110 +CVE-2020-9372 - http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html +CVE-2020-9372 - https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 +CVE-2020-9374 - http://packetstormsecurity.com/files/156584/TP-Link-TL-WR849N-Remote-Code-Execution.html +CVE-2020-9374 - https://fireshellsecurity.team/hack-n-routers/ +CVE-2020-9374 - https://github.com/ElberTavares/routers-exploit/tree/master/tp-link +CVE-2020-9375 - http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html +CVE-2020-9375 - https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html +CVE-2020-9376 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 +CVE-2020-9377 - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 +CVE-2020-9380 - https://github.com/migueltarga/CVE-2020-9380 +CVE-2020-9383 - https://usn.ubuntu.com/4342-1/ +CVE-2020-9384 - http://packetstormsecurity.com/files/157197/Subex-ROC-Partner-Settlement-10.5-Insecure-Direct-Object-Reference.html +CVE-2020-9385 - https://sourceforge.net/p/zint/tickets/181/ +CVE-2020-9388 - https://support.squaredup.com/hc/en-us/articles/360017568238 +CVE-2020-9388 - https://support.squaredup.com/hc/en-us/articles/360019427218-CVE-2020-9388-API-Endpoints-are-not-protected-against-CSRF +CVE-2020-9389 - https://support.squaredup.com/hc/en-us/articles/360017255858 +CVE-2020-9389 - https://support.squaredup.com/hc/en-us/articles/360019427238-CVE-2020-9389-Username-enumeration-possible-via-a-timing-attack +CVE-2020-9390 - https://support.squaredup.com/hc/en-us/articles/360017568258 +CVE-2020-9390 - https://support.squaredup.com/hc/en-us/articles/360019427258-CVE-2020-9390-Stored-cross-site-scripting +CVE-2020-9391 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a +CVE-2020-9392 - https://www.wordfence.com/blog/2020/02/multiple-vulnerabilities-patched-in-pricing-table-by-supsystic-plugin/ +CVE-2020-9399 - https://blog.zoller.lu/p/tzo-23-2020-avast-generic-archive.html +CVE-2020-9409 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9410 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9423 - https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities +CVE-2020-9426 - http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html +CVE-2020-9427 - http://packetstormsecurity.com/files/158069/OX-Guard-2.10.3-Cross-Site-Scripting-Server-Side-Request-Forgery.html +CVE-2020-9435 - http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html +CVE-2020-9435 - http://seclists.org/fulldisclosure/2020/Mar/15 +CVE-2020-9435 - https://cert.vde.com/en-us/advisories/ +CVE-2020-9435 - https://cert.vde.com/en-us/advisories/vde-2020-003 +CVE-2020-9436 - http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html +CVE-2020-9436 - http://seclists.org/fulldisclosure/2020/Mar/15 +CVE-2020-9436 - https://cert.vde.com/en-us/advisories/ +CVE-2020-9436 - https://cert.vde.com/en-us/advisories/vde-2020-003 +CVE-2020-9437 - https://know.bishopfox.com/advisories +CVE-2020-9437 - https://labs.bishopfox.com/advisories/secureauth-version-9.3 +CVE-2020-9438 - https://medium.com/@avishek_75733/smart-products-are-always-not-that-smart-tinxy-smart-door-lock-vulnerability-97f91e435e06 +CVE-2020-9447 - https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality +CVE-2020-9450 - https://www.acronis.com +CVE-2020-9451 - https://www.acronis.com +CVE-2020-9452 - https://www.acronis.com +CVE-2020-9453 - https://github.com/FULLSHADE/Kernel-exploits +CVE-2020-9453 - https://github.com/FULLSHADE/Kernel-exploits/tree/master/EMP_MPAU.sys +CVE-2020-9454 - https://wpvulndb.com/vulnerabilities/10116 +CVE-2020-9455 - https://wpvulndb.com/vulnerabilities/10116 +CVE-2020-9456 - https://wpvulndb.com/vulnerabilities/10116 +CVE-2020-9457 - https://wpvulndb.com/vulnerabilities/10116 +CVE-2020-9458 - https://wpvulndb.com/vulnerabilities/10116 +CVE-2020-9459 - https://wpvulndb.com/vulnerabilities/10100 +CVE-2020-9461 - https://guilhermerubert.com/blog/cve-2020-9460/ +CVE-2020-9463 - https://code610.blogspot.com/2020/02/postauth-rce-in-centreon-1910.html +CVE-2020-9464 - https://cert.vde.com/en-us/advisories/vde-2020-005 +CVE-2020-9466 - https://wpvulndb.com/vulnerabilities/10094 +CVE-2020-9467 - http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html +CVE-2020-9476 - https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9476-494a08298c6b +CVE-2020-9477 - https://medium.com/@rsantos_14778/info-disclosure-cve-2020-9477-29d0ca48d4fa +CVE-2020-9480 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-9484 - http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html +CVE-2020-9484 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 +CVE-2020-9484 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9484 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2020-9488 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9488 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9488 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-9489 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2020-9489 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2020-9489 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9490 - http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-Corruption.html +CVE-2020-9490 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9490 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9492 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2020-9496 - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html +CVE-2020-9496 - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html +CVE-2020-9496 - http://packetstormsecurity.com/files/163730/Apache-OfBiz-17.12.01-Remote-Command-Execution.html +CVE-2020-9497 - https://research.checkpoint.com/2020/apache-guacamole-rce/ +CVE-2020-9498 - https://research.checkpoint.com/2020/apache-guacamole-rce/ +CVE-2020-9520 - http://seclists.org/fulldisclosure/2020/Mar/50 +CVE-2020-9546 - https://github.com/FasterXML/jackson-databind/issues/2631 +CVE-2020-9546 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-9546 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9546 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-9546 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9546 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-9547 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-9547 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9547 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-9547 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9547 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-9548 - https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 +CVE-2020-9548 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2020-9548 - https://www.oracle.com/security-alerts/cpujul2020.html +CVE-2020-9548 - https://www.oracle.com/security-alerts/cpuoct2020.html +CVE-2020-9548 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2020-9549 - https://github.com/enferex/pdfresurrect/issues/8 +CVE-2020-9756 - https://www.coresecurity.com/advisories/viper-rgb-driver-multiple-vulnerabilities +CVE-2020-9876 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9906 - http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html +CVE-2020-9948 - http://seclists.org/fulldisclosure/2020/Nov/18 +CVE-2020-9951 - http://seclists.org/fulldisclosure/2020/Nov/18 +CVE-2020-9951 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9952 - http://seclists.org/fulldisclosure/2020/Nov/18 +CVE-2020-9952 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9961 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9967 - http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html +CVE-2020-9968 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9973 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1104 +CVE-2020-9976 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9979 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2020-9983 - http://seclists.org/fulldisclosure/2020/Nov/18 +CVE-2020-9983 - http://seclists.org/fulldisclosure/2020/Nov/19 +CVE-2021-0146 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html +CVE-2021-0252 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gr7j-26pv-5v57 +CVE-2021-0253 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr +CVE-2021-0278 - https://kb.juniper.net/JSA11182 +CVE-2021-0430 - http://packetstormsecurity.com/files/162380/Android-NFC-Stack-Out-Of-Bounds-Write.html +CVE-2021-0870 - http://packetstormsecurity.com/files/164704/Android-NFC-Type-Confusion.html +CVE-2021-1050 - http://packetstormsecurity.com/files/175260/PowerVR-Out-Of-Bounds-Access-Information-Leak.html +CVE-2021-1051 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1052 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1053 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1054 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1055 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1056 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1057 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1058 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1059 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1060 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1061 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1062 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1063 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1064 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1065 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1066 - https://nvidia.custhelp.com/app/answers/detail/a_id/5142 +CVE-2021-1067 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148 +CVE-2021-1068 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148 +CVE-2021-1069 - https://nvidia.custhelp.com/app/answers/detail/a_id/5148 +CVE-2021-1089 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1090 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1091 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1092 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1093 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1094 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1095 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1096 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1097 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1098 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1099 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1100 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1101 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1102 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1103 - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 +CVE-2021-1167 - http://packetstormsecurity.com/files/160953/Cisco-RV110W-1.2.1.7-Denial-Of-Service.html +CVE-2021-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 +CVE-2021-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 +CVE-2021-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 +CVE-2021-1258 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-fileread-PbHbgHMj +CVE-2021-1382 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 +CVE-2021-1383 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r +CVE-2021-1384 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232 +CVE-2021-1385 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hhfw-6cm2-v3w5 +CVE-2021-1450 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-55AYyxYr +CVE-2021-1472 - http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html +CVE-2021-1473 - http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html +CVE-2021-1497 - http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html +CVE-2021-1498 - http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html +CVE-2021-1499 - http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html +CVE-2021-1519 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-AggMUCDg +CVE-2021-1531 - http://packetstormsecurity.com/files/163265/Cisco-Modeling-Labs-2.1.1-b19-Remote-Command-Execution.html +CVE-2021-1585 - https://github.com/jbaines-r7/staystaystay +CVE-2021-1616 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q +CVE-2021-1629 - http://packetstormsecurity.com/files/162138/Tableau-Server-Open-Redirection.html +CVE-2021-1629 - http://seclists.org/fulldisclosure/2021/Apr/22 +CVE-2021-1645 - http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html +CVE-2021-1645 - http://seclists.org/fulldisclosure/2021/Mar/33 +CVE-2021-1675 - http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html +CVE-2021-1675 - http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html +CVE-2021-1675 - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html +CVE-2021-1732 - http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html +CVE-2021-1732 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html +CVE-2021-1810 - http://packetstormsecurity.com/files/164375/Gatekeeper-Bypass-Proof-Of-Concept.html +CVE-2021-1886 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1887 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1888 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1889 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1890 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1891 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1892 - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin +CVE-2021-1894 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-1895 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1896 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1897 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1898 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1899 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1900 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2021-1901 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1903 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1904 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1905 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1906 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1907 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1909 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1910 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1912 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1913 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1914 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1915 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1916 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1917 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1918 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-1919 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1920 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1921 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1923 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1924 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1925 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1927 - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin +CVE-2021-1928 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1929 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1930 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1931 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1932 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1933 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1934 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1935 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1936 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1937 - https://www.qualcomm.com/company/product-security/bulletins/june-2021-bulletin +CVE-2021-1938 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1939 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1940 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html +CVE-2021-1940 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1941 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1942 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-1943 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1945 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1946 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1947 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1948 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1949 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1950 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-1952 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1953 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1954 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1955 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1956 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1957 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1958 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1959 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1960 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1961 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1962 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1963 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1964 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1965 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1966 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1967 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1968 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html +CVE-2021-1968 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1969 - http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html +CVE-2021-1969 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1970 - https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin +CVE-2021-1971 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1972 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1973 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1974 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-1975 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1976 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-1977 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1979 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1980 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1981 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1982 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-1983 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1984 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1985 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-1993 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-1994 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-1995 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-1996 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-1997 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-1998 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-1999 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2000 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2001 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2002 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2003 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20031 - http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html +CVE-2021-20034 - http://packetstormsecurity.com/files/164564/SonicWall-SMA-10.2.1.0-17sv-Password-Reset.html +CVE-2021-20039 - http://packetstormsecurity.com/files/165563/SonicWall-SMA-100-Series-Authenticated-Command-Injection.html +CVE-2021-2004 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2005 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2006 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20067 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20068 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20069 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-2007 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20070 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20071 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20072 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20073 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20074 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20075 - https://www.tenable.com/security/research/tra-2021-04 +CVE-2021-20076 - https://www.tenable.com/security/tns-2021-03 +CVE-2021-20077 - https://www.tenable.com/security/tns-2021-07 +CVE-2021-20078 - https://www.tenable.com/security/research/tra-2021-10 +CVE-2021-20079 - https://www.tenable.com/security/tns-2021-07 +CVE-2021-2008 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-20080 - https://www.tenable.com/security/research/tra-2021-11 +CVE-2021-20081 - https://www.tenable.com/security/research/tra-2021-22 +CVE-2021-20083 - http://packetstormsecurity.com/files/166299/WordPress-Core-5.9.0-5.9.1-Cross-Site-Scripting.html +CVE-2021-20083 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md +CVE-2021-20084 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-sparkle.md +CVE-2021-20085 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md +CVE-2021-20086 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md +CVE-2021-20087 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md +CVE-2021-20088 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/mootools-more.md +CVE-2021-20089 - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/purl.md +CVE-2021-2009 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20090 - https://www.tenable.com/security/research/tra-2021-13 +CVE-2021-20091 - https://www.tenable.com/security/research/tra-2021-13 +CVE-2021-20092 - https://www.tenable.com/security/research/tra-2021-13 +CVE-2021-20093 - https://www.tenable.com/security/research/tra-2021-24 +CVE-2021-20094 - https://www.tenable.com/security/research/tra-2021-24 +CVE-2021-20096 - https://www.tenable.com/security/research/tra-2021-18 +CVE-2021-2010 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20106 - https://www.tenable.com/security/tns-2021-13 +CVE-2021-20107 - https://www.tenable.com/security/research/tra-2021-26-0 +CVE-2021-2011 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2012 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20120 - https://www.tenable.com/security/research/tra-2021-45 +CVE-2021-20121 - https://www.tenable.com/security/research/tra-2021-41 +CVE-2021-20122 - https://www.tenable.com/security/research/tra-2021-41 +CVE-2021-20123 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-20124 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-20125 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-20126 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-20127 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-20128 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-20129 - https://www.tenable.com/security/research/tra-2021-42 +CVE-2021-2013 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20132 - https://www.tenable.com/security/research/tra-2021-44 +CVE-2021-20133 - https://www.tenable.com/security/research/tra-2021-44 +CVE-2021-20134 - https://www.tenable.com/security/research/tra-2021-44 +CVE-2021-20136 - https://www.tenable.com/security/research/tra-2021-48 +CVE-2021-20137 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20138 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20139 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-2014 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20140 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20141 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20142 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20143 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20144 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20145 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20146 - https://www.tenable.com/security/research/tra-2021-51 +CVE-2021-20149 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-2015 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20150 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20151 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20152 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20153 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20154 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20155 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20156 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20157 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20158 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20159 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-2016 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20160 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20161 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20162 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20163 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20164 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20165 - https://www.tenable.com/security/research/tra-2021-54 +CVE-2021-20166 - https://www.tenable.com/security/research/tra-2021-55 +CVE-2021-20167 - https://www.tenable.com/security/research/tra-2021-55 +CVE-2021-20168 - https://www.tenable.com/security/research/tra-2021-55 +CVE-2021-20169 - https://www.tenable.com/security/research/tra-2021-55 +CVE-2021-2017 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20170 - https://www.tenable.com/security/research/tra-2021-55 +CVE-2021-20171 - https://www.tenable.com/security/research/tra-2021-55 +CVE-2021-2018 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2019 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20190 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-20193 - https://bugzilla.redhat.com/show_bug.cgi?id=1917565 +CVE-2021-20193 - https://savannah.gnu.org/bugs/?59897 +CVE-2021-2020 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2021 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2022 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20227 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-20227 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-20227 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2023 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2024 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2025 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2026 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20261 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a +CVE-2021-20265 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa0dc04df259ba2df3ce1920e9690c7842f8fa4b +CVE-2021-20265 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2027 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20270 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2028 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20280 - http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html +CVE-2021-20285 - https://github.com/upx/upx/issues/421 +CVE-2021-20289 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2029 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2030 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20304 - https://github.com/AcademySoftwareFoundation/openexr/pull/849 +CVE-2021-20308 - https://github.com/michaelrsweet/htmldoc/issues/423 +CVE-2021-2031 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20316 - https://www.samba.org/samba/security/CVE-2021-20316.html +CVE-2021-2032 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810 +CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1 +CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e +CVE-2021-20322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43 +CVE-2021-20322 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-2033 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2034 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20340 - https://www.ibm.com/support/pages/node/6417585 +CVE-2021-2035 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20350 - https://www.ibm.com/support/pages/node/6417585 +CVE-2021-20351 - https://www.ibm.com/support/pages/node/6417585 +CVE-2021-2036 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20365 - https://www.ibm.com/support/pages/node/6471345 +CVE-2021-2038 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2039 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2040 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2041 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2042 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2043 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2044 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2045 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2046 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2047 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2048 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2049 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2050 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2051 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2052 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2053 - https://blog.stmcyber.com/vulns/cve-2021-2053/ +CVE-2021-2053 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2054 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2055 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2056 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20562 - http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html +CVE-2021-20562 - http://seclists.org/fulldisclosure/2021/Nov/16 +CVE-2021-2057 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2058 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2059 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2060 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2061 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2062 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2063 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2064 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2065 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20654 - https://jvn.jp/en/jp/JVN80785288/ +CVE-2021-20654 - https://wekan.github.io/hall-of-fame/fieldbleed/ +CVE-2021-20656 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-20657 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-20658 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-20659 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-2066 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20660 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-20661 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-20662 - https://www.contec.com/jp/api/downloadlogger?download=https://www.contec.com/jp/-/media/contec/jp/support/security-info/contec_security_solarview_210216.pdf +CVE-2021-2067 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2068 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2069 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2070 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20700 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20701 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20702 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20703 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20704 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20705 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20706 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-20707 - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html +CVE-2021-2071 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20718 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-2072 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2073 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2074 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2075 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2076 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2077 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2078 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2079 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2080 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2081 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2082 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2083 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20834 - https://play.google.com/store/apps/details?id=com.nike.omega +CVE-2021-20837 - http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html +CVE-2021-20837 - http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html +CVE-2021-20837 - https://jvn.jp/en/jp/JVN41119755/index.html +CVE-2021-2084 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2085 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2086 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2087 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20873 - https://support.yappli.co.jp/hc/ja/articles/4410249902745 +CVE-2021-2088 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2089 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2090 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2091 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2092 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2093 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2094 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2096 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2097 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2098 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20986 - https://cert.vde.com/en-us/advisories/vde-2021-006 +CVE-2021-20987 - https://cert.vde.com/en-us/advisories/vde-2021-007 +CVE-2021-20989 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html +CVE-2021-20989 - http://seclists.org/fulldisclosure/2021/Apr/27 +CVE-2021-20989 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ +CVE-2021-2099 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-20990 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html +CVE-2021-20990 - http://seclists.org/fulldisclosure/2021/Apr/27 +CVE-2021-20990 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ +CVE-2021-20991 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html +CVE-2021-20991 - http://seclists.org/fulldisclosure/2021/Apr/27 +CVE-2021-20991 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ +CVE-2021-20992 - http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html +CVE-2021-20992 - http://seclists.org/fulldisclosure/2021/Apr/27 +CVE-2021-20992 - https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ +CVE-2021-20993 - https://cert.vde.com/en-us/advisories/vde-2021-013 +CVE-2021-20994 - https://cert.vde.com/en-us/advisories/vde-2021-013 +CVE-2021-20995 - https://cert.vde.com/en-us/advisories/vde-2021-013 +CVE-2021-20996 - https://cert.vde.com/en-us/advisories/vde-2021-013 +CVE-2021-20997 - https://cert.vde.com/en-us/advisories/vde-2021-013 +CVE-2021-20998 - https://cert.vde.com/en-us/advisories/vde-2021-013 +CVE-2021-20999 - https://cert.vde.com/en-us/advisories/vde-2021-016 +CVE-2021-2100 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21000 - https://cert.vde.com/en-us/advisories/vde-2021-014 +CVE-2021-21001 - https://cert.vde.com/en-us/advisories/vde-2021-014 +CVE-2021-21002 - https://cert.vde.com/en-us/advisories/vde-2021-022 +CVE-2021-21003 - https://cert.vde.com/en-us/advisories/vde-2021-023 +CVE-2021-21004 - https://cert.vde.com/en-us/advisories/vde-2021-023 +CVE-2021-21005 - https://cert.vde.com/en-us/advisories/vde-2021-023 +CVE-2021-2101 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2102 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2103 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2104 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2105 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2106 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2107 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2108 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2109 - http://packetstormsecurity.com/files/161053/Oracle-WebLogic-Server-14.1.1.0-Remote-Code-Execution.html +CVE-2021-2109 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2110 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2111 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2112 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2113 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2114 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21148 - http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html +CVE-2021-2115 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21156 - http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html +CVE-2021-2116 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21160 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235 +CVE-2021-2117 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2118 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2119 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21198 - http://packetstormsecurity.com/files/162973/Chrome-Legacy-ipc-Message-Passed-Via-Shared-Memory.html +CVE-2021-2120 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2121 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2122 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21220 - http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html +CVE-2021-21220 - http://packetstormsecurity.com/files/176210/Chrome-V8-JIT-XOR-Arbitrary-Code-Execution.html +CVE-2021-2123 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2124 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21242 - https://github.com/theonedev/onedev/security/advisories/GHSA-5q3q-f373-2jv8 +CVE-2021-21243 - https://github.com/theonedev/onedev/security/advisories/GHSA-9mmq-fm8c-q4fv +CVE-2021-2125 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21259 - https://github.com/hackmdio/codimd/issues/1648 +CVE-2021-2126 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21267 - https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f +CVE-2021-21267 - https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr +CVE-2021-2127 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21275 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21275 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-21276 - http://packetstormsecurity.com/files/171743/POLR-URL-2.3.0-Shortener-Admin-Takeover.html +CVE-2021-2128 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-2129 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21290 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-21290 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21293 - https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc +CVE-2021-21294 - https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc +CVE-2021-21295 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2130 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21300 - http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html +CVE-2021-21305 - https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4 +CVE-2021-21307 - http://packetstormsecurity.com/files/163864/Lucee-Administrator-imgProcess.cfm-Arbitrary-File-Write.html +CVE-2021-21307 - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md +CVE-2021-2131 - https://www.oracle.com/security-alerts/cpujan2021.html +CVE-2021-21310 - https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q +CVE-2021-21322 - https://www.npmjs.com/package/fastify-http-proxy +CVE-2021-21327 - http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html +CVE-2021-21337 - http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html +CVE-2021-2134 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21341 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21341 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21341 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21342 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21342 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21342 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21343 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21343 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21343 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21344 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21344 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21344 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21345 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21345 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-21345 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21345 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21346 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21346 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21346 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21347 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21347 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21347 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21348 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21348 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21348 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21349 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21349 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21349 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2135 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21350 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21350 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21350 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21351 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21351 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21351 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21353 - https://github.com/pugjs/pug/issues/3312 +CVE-2021-21354 - https://bugzilla.mozilla.org/show_bug.cgi?id=1694684 +CVE-2021-21354 - https://github.com/mozilla/PollBot/pull/333 +CVE-2021-2136 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2137 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21372 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ +CVE-2021-21373 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ +CVE-2021-21374 - https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ +CVE-2021-21382 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0732 +CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-engine +CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-font +CVE-2021-21391 - https://www.npmjs.com/package/@ckeditor/ckeditor5-widget +CVE-2021-2140 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21405 - https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754 +CVE-2021-21405 - https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh +CVE-2021-21409 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-21409 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21409 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2141 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21411 - https://docs.gitlab.com/ee/user/group/ +CVE-2021-2142 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21425 - http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html +CVE-2021-21425 - http://packetstormsecurity.com/files/162457/GravCMS-1.10.7-Remote-Command-Execution.html +CVE-2021-21425 - https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/ +CVE-2021-21430 - https://github.com/OpenAPITools/openapi-generator/pull/8791 +CVE-2021-21431 - https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m +CVE-2021-2144 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2145 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2146 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21465 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2021-21465 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2021-21466 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2021-21466 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2021-21468 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2021-21468 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2021-2147 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21473 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2021-21473 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2021-21480 - http://packetstormsecurity.com/files/163164/SAP-XMII-Remote-Code-Execution.html +CVE-2021-21480 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2021-2149 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21495 - https://gist.github.com/alacerda/98853283be6009e75b7d94968d50b88e +CVE-2021-2150 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21503 - https://www.dell.com/support/kbdoc/000183717 +CVE-2021-21506 - https://www.dell.com/support/kbdoc/000183717 +CVE-2021-2151 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21513 - https://www.tenable.com/security/research/tra-2021-07 +CVE-2021-2152 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2153 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2154 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2155 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21551 - http://packetstormsecurity.com/files/162604/Dell-DBUtil_2_3.sys-IOCTL-Memory-Read-Write.html +CVE-2021-21551 - http://packetstormsecurity.com/files/162739/DELL-dbutil_2_3.sys-2.3-Arbitrary-Write-Privilege-Escalation.html +CVE-2021-2156 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21568 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-2157 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2158 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2159 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21592 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-21594 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-21595 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-21599 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-2160 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2161 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-2161 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2162 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2163 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2164 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2166 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21660 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-21660 +CVE-2021-2167 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2169 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2170 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21702 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21703 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-21703 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21704 - https://bugs.php.net/bug.php?id=76449 +CVE-2021-21704 - https://bugs.php.net/bug.php?id=76450 +CVE-2021-21705 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21707 - https://bugs.php.net/bug.php?id=79971 +CVE-2021-21708 - https://bugs.php.net/bug.php?id=81708 +CVE-2021-2171 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2172 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2173 - http://packetstormsecurity.com/files/171344/Oracle-DB-Broken-PDB-Isolation-Metadata-Exposure.html +CVE-2021-2173 - https://github.com/emad-almousa/CVE-2021-2173 +CVE-2021-2173 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2174 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2175 - http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html +CVE-2021-2175 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2177 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21772 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226 +CVE-2021-21773 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1227 +CVE-2021-21775 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229 +CVE-2021-21776 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1232 +CVE-2021-21777 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1234 +CVE-2021-21778 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1236 +CVE-2021-21779 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238 +CVE-2021-2178 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21781 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243 +CVE-2021-21781 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-21782 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1244 +CVE-2021-21783 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245 +CVE-2021-21783 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-21783 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-21784 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1248 +CVE-2021-21786 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1253 +CVE-2021-21787 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 +CVE-2021-21788 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 +CVE-2021-21789 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 +CVE-2021-2179 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21790 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 +CVE-2021-21791 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 +CVE-2021-21792 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255 +CVE-2021-21793 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1257 +CVE-2021-21794 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1261 +CVE-2021-21795 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1264 +CVE-2021-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1265 +CVE-2021-21797 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 +CVE-2021-21798 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1267 +CVE-2021-21799 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1270 +CVE-2021-2180 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21800 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1271 +CVE-2021-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 +CVE-2021-21802 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 +CVE-2021-21803 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 +CVE-2021-21804 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 +CVE-2021-21805 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1274 +CVE-2021-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214 +CVE-2021-21807 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1275 +CVE-2021-21808 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1276 +CVE-2021-21809 - http://packetstormsecurity.com/files/164481/Moodle-SpellChecker-Path-Authenticated-Remote-Command-Execution.html +CVE-2021-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277 +CVE-2021-2181 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21810 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1278 +CVE-2021-21811 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1279 +CVE-2021-21812 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 +CVE-2021-21813 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 +CVE-2021-21814 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 +CVE-2021-21815 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280 +CVE-2021-21816 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 +CVE-2021-21817 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1282 +CVE-2021-21818 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283 +CVE-2021-21819 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1284 +CVE-2021-2182 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21820 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1285 +CVE-2021-21821 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1286 +CVE-2021-21822 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1287 +CVE-2021-21823 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1288 +CVE-2021-21824 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1289 +CVE-2021-21825 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1290 +CVE-2021-21826 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291 +CVE-2021-21827 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291 +CVE-2021-21828 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291 +CVE-2021-21829 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1292 +CVE-2021-2183 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21830 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1293 +CVE-2021-21831 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1294 +CVE-2021-21832 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1295 +CVE-2021-21833 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1296 +CVE-2021-21834 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21835 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21836 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21837 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21837 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21838 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21838 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21839 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21839 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-2184 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21840 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21841 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21842 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21843 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21843 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21844 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21844 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21845 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21845 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21846 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21846 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21847 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21847 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21848 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21849 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-2185 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21850 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21851 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21851 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21852 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21852 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297 +CVE-2021-21853 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 +CVE-2021-21854 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 +CVE-2021-21855 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 +CVE-2021-21856 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 +CVE-2021-21857 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 +CVE-2021-21858 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299 +CVE-2021-21859 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 +CVE-2021-2186 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21860 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 +CVE-2021-21861 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 +CVE-2021-21862 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 +CVE-2021-21864 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301 +CVE-2021-21865 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301 +CVE-2021-21866 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301 +CVE-2021-21867 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1304 +CVE-2021-21868 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1305 +CVE-2021-21869 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1306 +CVE-2021-2187 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21870 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1307 +CVE-2021-21871 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1308 +CVE-2021-21872 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1312 +CVE-2021-21873 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314 +CVE-2021-21874 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314 +CVE-2021-21875 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314 +CVE-2021-21876 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315 +CVE-2021-21877 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315 +CVE-2021-21878 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1322 +CVE-2021-21879 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1323 +CVE-2021-2188 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21880 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1324 +CVE-2021-21881 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1325 +CVE-2021-21882 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1326 +CVE-2021-21883 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1327 +CVE-2021-21884 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1328 +CVE-2021-21885 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1329 +CVE-2021-21886 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1330 +CVE-2021-21887 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1331 +CVE-2021-21888 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1332 +CVE-2021-21889 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1333 +CVE-2021-2189 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21890 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334 +CVE-2021-21891 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334 +CVE-2021-21892 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1335 +CVE-2021-21893 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1336 +CVE-2021-21894 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337 +CVE-2021-21895 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337 +CVE-2021-21896 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1338 +CVE-2021-21897 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1346 +CVE-2021-21898 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349 +CVE-2021-21899 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350 +CVE-2021-2190 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21900 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351 +CVE-2021-21901 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1353 +CVE-2021-21902 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1354 +CVE-2021-21903 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1355 +CVE-2021-21904 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1356 +CVE-2021-21905 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357 +CVE-2021-21906 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357 +CVE-2021-21907 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1358 +CVE-2021-21908 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359 +CVE-2021-21909 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359 +CVE-2021-2191 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21910 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 +CVE-2021-21911 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 +CVE-2021-21912 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360 +CVE-2021-21913 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1361 +CVE-2021-21914 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1362 +CVE-2021-21915 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 +CVE-2021-21916 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 +CVE-2021-21917 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 +CVE-2021-21918 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 +CVE-2021-21919 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 +CVE-2021-2192 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21920 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 +CVE-2021-21921 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 +CVE-2021-21922 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 +CVE-2021-21923 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365 +CVE-2021-21924 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21925 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21926 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21927 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21928 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21929 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-2193 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21930 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21931 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21932 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21933 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21934 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21935 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21936 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21937 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366 +CVE-2021-21938 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1367 +CVE-2021-21939 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1368 +CVE-2021-2194 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21940 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1369 +CVE-2021-21941 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1370 +CVE-2021-21942 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1371 +CVE-2021-21943 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1373 +CVE-2021-21944 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374 +CVE-2021-21945 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374 +CVE-2021-21946 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375 +CVE-2021-21947 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375 +CVE-2021-21948 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1376 +CVE-2021-21949 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1377 +CVE-2021-2195 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21950 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378 +CVE-2021-21951 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378 +CVE-2021-21952 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1379 +CVE-2021-21953 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1380 +CVE-2021-21954 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1381 +CVE-2021-21955 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1382 +CVE-2021-21956 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1383 +CVE-2021-21957 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1384 +CVE-2021-21958 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1386 +CVE-2021-21959 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1388 +CVE-2021-2196 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21960 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389 +CVE-2021-21961 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389 +CVE-2021-21962 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1390 +CVE-2021-21963 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1391 +CVE-2021-21964 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392 +CVE-2021-21965 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392 +CVE-2021-21966 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1393 +CVE-2021-21967 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1394 +CVE-2021-21968 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395 +CVE-2021-21969 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396 +CVE-2021-2197 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21970 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396 +CVE-2021-21971 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1406 +CVE-2021-21972 - http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html +CVE-2021-21972 - http://packetstormsecurity.com/files/161695/VMware-vCenter-Server-File-Upload-Remote-Code-Execution.html +CVE-2021-21972 - http://packetstormsecurity.com/files/163268/VMware-vCenter-6.5-6.7-7.0-Remote-Code-Execution.html +CVE-2021-21974 - http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html +CVE-2021-21975 - http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html +CVE-2021-21978 - http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html +CVE-2021-2198 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21983 - http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html +CVE-2021-21985 - http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html +CVE-2021-21985 - http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html +CVE-2021-21986 - http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html +CVE-2021-2199 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-21990 - https://herolab.usd.de/security-advisories/usd-2021-0008/ +CVE-2021-21991 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-21992 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-21993 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-2200 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22000 - http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html +CVE-2021-22005 - http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html +CVE-2021-22005 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22006 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22007 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22008 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22009 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-2201 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22010 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22011 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22012 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22013 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22014 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22015 - http://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html +CVE-2021-22015 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22016 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22017 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22018 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-22019 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-2202 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22020 - https://www.vmware.com/security/advisories/VMSA-2021-0020.html +CVE-2021-2203 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2204 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22045 - http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html +CVE-2021-22045 - https://www.vmware.com/security/advisories/VMSA-2022-0001.html +CVE-2021-22048 - http://packetstormsecurity.com/files/167733/VMware-Security-Advisory-2022-0025.2.html +CVE-2021-22048 - http://packetstormsecurity.com/files/167795/VMware-Security-Advisory-2021-0025.3.html +CVE-2021-2205 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22056 - https://www.vmware.com/security/advisories/VMSA-2021-0030.html +CVE-2021-22057 - https://www.vmware.com/security/advisories/VMSA-2021-0030.html +CVE-2021-2206 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22060 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2207 - http://packetstormsecurity.com/files/174448/Oracle-RMAN-Missing-Auditing.html +CVE-2021-2207 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2208 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2209 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22096 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2210 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2211 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22112 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22112 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-22112 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22118 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22118 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22118 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22118 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-22118 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22119 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22119 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-2212 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2213 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22132 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22134 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2214 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22141 - https://www.elastic.co/community/security/ +CVE-2021-22142 - https://www.elastic.co/community/security +CVE-2021-22143 - https://www.elastic.co/community/security +CVE-2021-22144 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22145 - http://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html +CVE-2021-22145 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22146 - http://packetstormsecurity.com/files/163655/Elasticsearch-ECE-7.13.3-Database-Disclosure.html +CVE-2021-22147 - https://www.elastic.co/community/security/ +CVE-2021-22148 - https://www.elastic.co/community/security/ +CVE-2021-22149 - https://www.elastic.co/community/security/ +CVE-2021-2215 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22150 - https://www.elastic.co/community/security +CVE-2021-22151 - https://www.elastic.co/community/security +CVE-2021-2216 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2217 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22171 - https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262 +CVE-2021-22173 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-22174 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-22175 - https://gitlab.com/gitlab-org/gitlab/-/issues/294178 +CVE-2021-2218 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2219 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22191 - https://gitlab.com/wireshark/wireshark/-/issues/17232 +CVE-2021-22191 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-22195 - https://gitlab.com/gitlab-org/gitlab-vscode-extension/-/issues/325 +CVE-2021-2220 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22204 - http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html +CVE-2021-22204 - http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html +CVE-2021-22204 - http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html +CVE-2021-22204 - http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html +CVE-2021-22204 - http://www.openwall.com/lists/oss-security/2021/05/10/5 +CVE-2021-22205 - http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html +CVE-2021-22205 - http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html +CVE-2021-22207 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2221 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22213 - https://gitlab.com/gitlab-org/gitlab/-/issues/300308 +CVE-2021-22214 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22214.json +CVE-2021-2222 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22222 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22224 - https://gitlab.com/gitlab-org/gitlab/-/issues/324397 +CVE-2021-22225 - https://gitlab.com/gitlab-org/gitlab/-/issues/331051 +CVE-2021-2223 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22238 - https://gitlab.com/gitlab-org/gitlab/-/issues/332420 +CVE-2021-2224 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22241 - https://gitlab.com/gitlab-org/gitlab/-/issues/336460 +CVE-2021-22245 - https://gitlab.com/gitlab-org/gitlab/-/issues/255612 +CVE-2021-2225 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2226 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22261 - https://gitlab.com/gitlab-org/gitlab/-/issues/328389 +CVE-2021-2227 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2228 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2229 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22298 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-2230 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2231 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2232 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2233 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2234 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2235 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2236 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2237 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2238 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2239 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2240 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2241 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2242 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2244 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2244 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2245 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2246 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2247 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2248 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2249 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22492 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-22494 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-22495 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-2250 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22502 - http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html +CVE-2021-2251 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2252 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2253 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2254 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22543 - https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584 +CVE-2021-2255 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22555 - http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html +CVE-2021-22555 - http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html +CVE-2021-22555 - http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html +CVE-2021-22555 - http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html +CVE-2021-22555 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html +CVE-2021-22555 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 +CVE-2021-22555 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d +CVE-2021-22555 - https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 +CVE-2021-22557 - http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html +CVE-2021-2256 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22569 - http://www.openwall.com/lists/oss-security/2022/01/12/4 +CVE-2021-22569 - http://www.openwall.com/lists/oss-security/2022/01/12/7 +CVE-2021-22569 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2257 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22570 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22571 - https://github.com/google/sa360-webquery-bigquery/pull/15 +CVE-2021-2258 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2259 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2260 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22600 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 +CVE-2021-2261 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2262 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2263 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2264 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22652 - http://packetstormsecurity.com/files/161937/Advantech-iView-Unauthenticated-Remote-Code-Execution.html +CVE-2021-2266 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2267 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2268 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2269 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22696 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22696 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2270 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2271 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2272 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2273 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2274 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2275 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2276 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2277 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2278 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2279 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2280 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2281 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2282 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2283 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2284 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2285 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2286 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2287 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22871 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html +CVE-2021-22872 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html +CVE-2021-22872 - https://hackerone.com/reports/986365 +CVE-2021-22873 - http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html +CVE-2021-22876 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-2288 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22883 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22883 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-22883 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22884 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22884 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-22884 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22887 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712 +CVE-2021-2289 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22890 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22894 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY +CVE-2021-22897 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22897 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22897 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22898 - https://curl.se/docs/CVE-2021-22898.html +CVE-2021-22898 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22898 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22898 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22899 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY +CVE-2021-2290 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22900 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY +CVE-2021-22901 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-22901 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22901 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-2291 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22911 - http://packetstormsecurity.com/files/162997/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html +CVE-2021-22911 - http://packetstormsecurity.com/files/163419/Rocket.Chat-3.12.1-NoSQL-Injection-Code-Execution.html +CVE-2021-2292 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22922 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22923 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22924 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22924 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22925 - http://seclists.org/fulldisclosure/2021/Sep/39 +CVE-2021-22925 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22925 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22926 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22926 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2293 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22931 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22931 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-22931 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22939 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22939 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-22939 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2294 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22940 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22940 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-22940 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22945 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22946 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22946 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22946 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-22946 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-22947 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-22947 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-22947 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2295 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22959 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-2296 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22960 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-2297 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2298 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-22986 - http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html +CVE-2021-22986 - http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html +CVE-2021-2299 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2300 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2301 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23017 - http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html +CVE-2021-23017 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-23017 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-23017 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2302 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23024 - http://packetstormsecurity.com/files/163264/F5-BIG-IQ-VE-8.0.0-2923215-Remote-Root.html +CVE-2021-2303 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2304 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2305 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2306 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2307 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2308 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2309 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2310 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2311 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2312 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23133 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b +CVE-2021-23133 - https://www.openwall.com/lists/oss-security/2021/04/18/2 +CVE-2021-2314 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2315 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23158 - https://github.com/michaelrsweet/htmldoc/issues/414 +CVE-2021-2316 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23165 - https://github.com/michaelrsweet/htmldoc/issues/413 +CVE-2021-2317 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2318 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23180 - https://github.com/michaelrsweet/htmldoc/issues/418 +CVE-2021-2319 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23191 - https://github.com/michaelrsweet/htmldoc/issues/415 +CVE-2021-2320 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-23206 - https://github.com/michaelrsweet/htmldoc/issues/416 +CVE-2021-2321 - https://www.oracle.com/security-alerts/cpuapr2021.html +CVE-2021-2323 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2324 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2326 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2328 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2329 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2330 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2332 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23327 - https://github.com/apexcharts/apexcharts.js/pull/2158 +CVE-2021-23327 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616 +CVE-2021-23327 - https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708 +CVE-2021-23328 - https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989 +CVE-2021-23329 - https://github.com/Geta/NestedObjectAssign/pull/11 +CVE-2021-23329 - https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977 +CVE-2021-2333 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23330 - https://github.com/bitovi/launchpad/pull/124 +CVE-2021-23331 - https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988 +CVE-2021-23335 - https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766 +CVE-2021-23336 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-23336 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-23336 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-23336 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932 +CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930 +CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928 +CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931 +CVE-2021-23337 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929 +CVE-2021-23337 - https://snyk.io/vuln/SNYK-JS-LODASH-1040724 +CVE-2021-23337 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-23337 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-23337 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-23337 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23338 - https://github.com/418sec/huntr/pull/1329 +CVE-2021-23338 - https://snyk.io/vuln/SNYK-PYTHON-QLIB-1054635 +CVE-2021-2334 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23340 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132 +CVE-2021-23341 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583 +CVE-2021-23341 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582 +CVE-2021-23341 - https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581 +CVE-2021-23342 - http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html +CVE-2021-23342 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593 +CVE-2021-23342 - https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017 +CVE-2021-23343 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028 +CVE-2021-23343 - https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067 +CVE-2021-23344 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069 +CVE-2021-23346 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633 +CVE-2021-23346 - https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306 +CVE-2021-23346 - https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307 +CVE-2021-23348 - https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm +CVE-2021-23348 - https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536 +CVE-2021-2335 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23352 - https://snyk.io/vuln/SNYK-JS-MADGE-1082875 +CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289 +CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287 +CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288 +CVE-2021-23353 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286 +CVE-2021-23353 - https://snyk.io/vuln/SNYK-JS-JSPDF-1073626 +CVE-2021-23355 - https://snyk.io/vuln/SNYK-JS-PSKILL-1078529 +CVE-2021-23356 - https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534 +CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504 +CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505 +CVE-2021-23358 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503 +CVE-2021-23358 - https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984 +CVE-2021-23359 - https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533 +CVE-2021-2336 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23360 - https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535 +CVE-2021-23362 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356 +CVE-2021-23362 - https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355 +CVE-2021-23363 - https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531 +CVE-2021-23364 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182 +CVE-2021-23364 - https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194 +CVE-2021-23368 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795 +CVE-2021-23368 - https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595 +CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950 +CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951 +CVE-2021-23369 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952 +CVE-2021-23369 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767 +CVE-2021-2337 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698 +CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699 +CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697 +CVE-2021-23370 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696 +CVE-2021-23370 - https://snyk.io/vuln/SNYK-JS-SWIPER-1088062 +CVE-2021-23373 - https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231 +CVE-2021-23374 - https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544 +CVE-2021-23375 - https://snyk.io/vuln/SNYK-JS-PSNODE-1078543 +CVE-2021-23376 - https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542 +CVE-2021-23377 - https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808 +CVE-2021-23378 - https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539 +CVE-2021-23379 - https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537 +CVE-2021-2338 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23380 - https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 +CVE-2021-23381 - https://snyk.io/vuln/SNYK-JS-KILLING-1078532 +CVE-2021-23382 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641 +CVE-2021-23382 - https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640 +CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031 +CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032 +CVE-2021-23383 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030 +CVE-2021-23383 - https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029 +CVE-2021-23384 - https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708 +CVE-2021-23385 - https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234 +CVE-2021-23385 - https://snyk.io/blog/url-confusion-vulnerabilities/ +CVE-2021-23387 - https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707 +CVE-2021-23389 - https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607 +CVE-2021-2339 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23390 - https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527 +CVE-2021-23391 - https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555 +CVE-2021-23392 - https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597 +CVE-2021-23393 - https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189 +CVE-2021-23394 - https://github.com/Studio-42/elFinder +CVE-2021-23394 - https://github.com/Studio-42/elFinder/issues/3295 +CVE-2021-23394 - https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554 +CVE-2021-23395 - https://snyk.io/vuln/SNYK-JS-NEDB-1305279 +CVE-2021-23396 - https://snyk.io/vuln/SNYK-JS-LUTILS-1311023 +CVE-2021-23397 - https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022 +CVE-2021-23398 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286 +CVE-2021-23398 - https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285 +CVE-2021-23399 - https://snyk.io/vuln/SNYK-JS-WINCRED-1078538 +CVE-2021-2340 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23400 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737 +CVE-2021-23400 - https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415 +CVE-2021-23401 - https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188 +CVE-2021-23402 - https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024 +CVE-2021-23403 - https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009 +CVE-2021-23404 - https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324 +CVE-2021-23405 - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297 +CVE-2021-23406 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506 +CVE-2021-23406 - https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857 +CVE-2021-23407 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152 +CVE-2021-23408 - https://snyk.io/vuln/SNYK-JAVA-COMGRAPHHOPPER-1320114 +CVE-2021-2341 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2341 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23411 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695 +CVE-2021-23411 - https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008 +CVE-2021-23412 - https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832 +CVE-2021-23413 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499 +CVE-2021-23413 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498 +CVE-2021-23413 - https://snyk.io/vuln/SNYK-JS-JSZIP-1251497 +CVE-2021-23414 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588 +CVE-2021-23414 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587 +CVE-2021-23414 - https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429 +CVE-2021-23415 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153 +CVE-2021-23416 - https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106 +CVE-2021-23417 - https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984 +CVE-2021-23419 - https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747 +CVE-2021-2342 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23420 - https://github.com/JinYiTong/poc +CVE-2021-23420 - https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585 +CVE-2021-23424 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198 +CVE-2021-23424 - https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849 +CVE-2021-23425 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197 +CVE-2021-23425 - https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850 +CVE-2021-23426 - https://snyk.io/vuln/SNYK-JS-PROTO-1316301 +CVE-2021-23427 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778 +CVE-2021-23428 - https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838 +CVE-2021-23429 - https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774 +CVE-2021-2343 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23430 - https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388 +CVE-2021-23431 - https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e +CVE-2021-23432 - https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536 +CVE-2021-23433 - https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421 +CVE-2021-23434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423 +CVE-2021-23434 - https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453 +CVE-2021-23436 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266 +CVE-2021-23436 - https://snyk.io/vuln/SNYK-JS-IMMER-1540542 +CVE-2021-23438 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548 +CVE-2021-23438 - https://snyk.io/vuln/SNYK-JS-MPATH-1577289 +CVE-2021-23439 - https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492 +CVE-2021-2344 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23440 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212 +CVE-2021-23440 - https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541 +CVE-2021-23440 - https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/ +CVE-2021-23440 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-23442 - https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793 +CVE-2021-23443 - https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556 +CVE-2021-23444 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817 +CVE-2021-23444 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816 +CVE-2021-23444 - https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578 +CVE-2021-23445 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371 +CVE-2021-23445 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376 +CVE-2021-23445 - https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544 +CVE-2021-23447 - https://snyk.io/vuln/SNYK-JS-TEDDY-1579557 +CVE-2021-23448 - https://github.com/jarradseers/config-handler/issues/1 +CVE-2021-23449 - https://snyk.io/vuln/SNYK-JS-VM2-1585918 +CVE-2021-2345 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036 +CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035 +CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034 +CVE-2021-23450 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033 +CVE-2021-23450 - https://snyk.io/vuln/SNYK-JS-DOJO-1535223 +CVE-2021-23450 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-23450 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-23452 - https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314 +CVE-2021-2346 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23460 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2342127 +CVE-2021-23460 - https://snyk.io/vuln/SNYK-JS-MINDASH-2340605 +CVE-2021-23463 - https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238 +CVE-2021-23463 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2347 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23470 - https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487 +CVE-2021-23472 - https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 +CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 +CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 +CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 +CVE-2021-23472 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 +CVE-2021-23472 - https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 +CVE-2021-2348 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23484 - https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477 +CVE-2021-2349 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23490 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973 +CVE-2021-23490 - https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783 +CVE-2021-23497 - https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945 +CVE-2021-2350 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23507 - https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 +CVE-2021-23509 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1767165 +CVE-2021-23509 - https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291 +CVE-2021-2351 - http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html +CVE-2021-2351 - http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html +CVE-2021-2351 - http://seclists.org/fulldisclosure/2021/Dec/19 +CVE-2021-2351 - http://seclists.org/fulldisclosure/2021/Dec/20 +CVE-2021-2351 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2351 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-2351 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23514 - https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336163 +CVE-2021-23518 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2348246 +CVE-2021-23518 - https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653 +CVE-2021-2352 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2353 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2354 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23543 - https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908 +CVE-2021-2355 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23555 - https://snyk.io/vuln/SNYK-JS-VM2-2309905 +CVE-2021-23556 - https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334 +CVE-2021-23558 - https://snyk.io/vuln/SNYK-JS-BMOOR-2342622 +CVE-2021-2356 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23561 - https://snyk.io/vuln/SNYK-JS-COMB-1730083 +CVE-2021-23566 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550 +CVE-2021-23566 - https://snyk.io/vuln/SNYK-JS-NANOID-2332193 +CVE-2021-23568 - https://snyk.io/vuln/SNYK-JS-EXTEND2-2320315 +CVE-2021-2357 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23574 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790 +CVE-2021-23574 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791 +CVE-2021-23574 - https://snyk.io/vuln/SNYK-JS-JSDATA-1584361 +CVE-2021-2358 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2359 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23592 - https://snyk.io/vuln/SNYK-PHP-TOPTHINKFRAMEWORK-2385695 +CVE-2021-23594 - https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907 +CVE-2021-23597 - https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 +CVE-2021-2360 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2361 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2362 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23624 - https://snyk.io/vuln/SNYK-JS-DOTTY-1577292 +CVE-2021-2363 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23631 - https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14 +CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785 +CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245 +CVE-2021-23631 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244 +CVE-2021-23632 - https://snyk.io/vuln/SNYK-JS-GIT-1568518 +CVE-2021-23639 - https://github.com/simonhaenisch/md-to-pdf/issues/99 +CVE-2021-23639 - https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880 +CVE-2021-2364 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23648 - https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882 +CVE-2021-2365 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23654 - https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py +CVE-2021-2366 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23663 - https://snyk.io/vuln/SNYK-JS-SEY-1727592 +CVE-2021-23664 - https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788 +CVE-2021-2367 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23673 - https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360 +CVE-2021-2368 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23682 - https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250 +CVE-2021-23682 - https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820 +CVE-2021-2369 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2369 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2370 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23700 - https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593 +CVE-2021-23702 - https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470 +CVE-2021-2371 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23718 - https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362 +CVE-2021-2372 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23727 - https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 +CVE-2021-2373 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2374 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2375 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23758 - http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html +CVE-2021-2376 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23760 - https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 +CVE-2021-2377 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23771 - https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587 +CVE-2021-23771 - https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946 +CVE-2021-23772 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 +CVE-2021-23772 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 +CVE-2021-2378 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23784 - https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633 +CVE-2021-23797 - https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656 +CVE-2021-2380 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23803 - https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226 +CVE-2021-23807 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273 +CVE-2021-23807 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288 +CVE-2021-2381 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2382 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23820 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910686 +CVE-2021-23820 - https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287 +CVE-2021-23824 - https://snyk.io/vuln/SNYK-UNMANAGED-CROW-2336164 +CVE-2021-2383 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23835 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html +CVE-2021-23835 - https://sec-consult.com/vulnerability-lab/ +CVE-2021-23836 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html +CVE-2021-23836 - https://sec-consult.com/vulnerability-lab/ +CVE-2021-23837 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html +CVE-2021-23837 - https://sec-consult.com/vulnerability-lab/ +CVE-2021-23838 - http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html +CVE-2021-23838 - https://sec-consult.com/vulnerability-lab/ +CVE-2021-23839 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 +CVE-2021-23839 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-23839 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-2384 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23840 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 +CVE-2021-23840 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-23840 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-23840 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-23840 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23840 - https://www.tenable.com/security/tns-2021-03 +CVE-2021-23840 - https://www.tenable.com/security/tns-2021-09 +CVE-2021-23840 - https://www.tenable.com/security/tns-2021-10 +CVE-2021-23841 - http://seclists.org/fulldisclosure/2021/May/67 +CVE-2021-23841 - http://seclists.org/fulldisclosure/2021/May/68 +CVE-2021-23841 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 +CVE-2021-23841 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-23841 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23841 - https://www.tenable.com/security/tns-2021-03 +CVE-2021-23841 - https://www.tenable.com/security/tns-2021-09 +CVE-2021-2385 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2386 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2387 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23878 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 +CVE-2021-23879 - https://kc.mcafee.com/corporate/index?page=content&id=SB10351 +CVE-2021-2388 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2388 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23880 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 +CVE-2021-23881 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 +CVE-2021-23882 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 +CVE-2021-23883 - https://kc.mcafee.com/corporate/index?page=content&id=SB10345 +CVE-2021-23884 - https://kc.mcafee.com/corporate/index?page=content&id=SB10353 +CVE-2021-23885 - https://kc.mcafee.com/corporate/index?page=content&id=SB10349 +CVE-2021-23886 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354 +CVE-2021-23886 - https://kc.mcafee.com/corporate/index?page=content&id=SB10357 +CVE-2021-23887 - https://kc.mcafee.com/corporate/index?page=content&id=SB10354 +CVE-2021-23887 - https://kc.mcafee.com/corporate/index?page=content&id=SB10357 +CVE-2021-23888 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 +CVE-2021-23889 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 +CVE-2021-2389 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23890 - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 +CVE-2021-23892 - https://kc.mcafee.com/corporate/index?page=content&id=SB10355 +CVE-2021-23893 - https://kc.mcafee.com/corporate/index?page=content&id=SB10361 +CVE-2021-23894 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 +CVE-2021-23895 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 +CVE-2021-23896 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 +CVE-2021-2390 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2391 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2392 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23926 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-23926 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-23927 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23928 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23929 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-2393 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23930 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23931 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23932 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23933 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23934 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23935 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-23936 - https://packetstormsecurity.com/files/160853/OX-App-Suite-OX-Documents-7.10.x-XSS-SSRF.html +CVE-2021-2394 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2395 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1683940 +CVE-2021-23955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1684837 +CVE-2021-23956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1338637 +CVE-2021-2396 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23960 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675755 +CVE-2021-2397 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23971 - https://bugzilla.mozilla.org/show_bug.cgi?id=1678545 +CVE-2021-23977 - https://bugzilla.mozilla.org/show_bug.cgi?id=1684761 +CVE-2021-2398 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23980 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980 +CVE-2021-23981 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692832 +CVE-2021-23986 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692623 +CVE-2021-2399 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-23991 - https://bugzilla.mozilla.org/show_bug.cgi?id=1673240 +CVE-2021-23994 - https://bugzilla.mozilla.org/show_bug.cgi?id=1699077 +CVE-2021-23997 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701942 +CVE-2021-23999 - https://bugzilla.mozilla.org/show_bug.cgi?id=1691153 +CVE-2021-2400 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24000 - https://bugzilla.mozilla.org/show_bug.cgi?id=1694698 +CVE-2021-24002 - https://bugzilla.mozilla.org/show_bug.cgi?id=1702374 +CVE-2021-2401 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2402 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2403 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24033 - https://github.com/facebook/create-react-app/pull/10644 +CVE-2021-2404 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24040 - http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html +CVE-2021-24045 - https://www.facebook.com/security/advisories/cve-2021-24045 +CVE-2021-2405 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2406 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2407 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2408 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24086 - http://packetstormsecurity.com/files/163499/Windows-TCP-IP-Denial-Of-Service.html +CVE-2021-2409 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24091 - http://packetstormsecurity.com/files/161713/Microsoft-Windows-WindowsCodecsRaw-COlympusE300LoadRaw-Out-Of-Bounds-Write.html +CVE-2021-24093 - http://packetstormsecurity.com/files/161582/Microsoft-DirectWrite-fsg_ExecuteGlyph-Buffer-Overflow.html +CVE-2021-2410 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2411 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2412 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24122 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-24123 - https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36 +CVE-2021-24124 - https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee +CVE-2021-24125 - https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178 +CVE-2021-24126 - https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3 +CVE-2021-24127 - https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6 +CVE-2021-24128 - https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864 +CVE-2021-24129 - https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6 +CVE-2021-24130 - https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8 +CVE-2021-24131 - https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8 +CVE-2021-24132 - https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c +CVE-2021-24133 - https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120 +CVE-2021-24134 - https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b +CVE-2021-24135 - https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3 +CVE-2021-24136 - https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1 +CVE-2021-24137 - https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3 +CVE-2021-24138 - https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151 +CVE-2021-24139 - https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28 +CVE-2021-2414 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24140 - https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056 +CVE-2021-24141 - https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93 +CVE-2021-24142 - https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14 +CVE-2021-24143 - https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b +CVE-2021-24144 - https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48 +CVE-2021-24145 - http://packetstormsecurity.com/files/163346/WordPress-Modern-Events-Calendar-5.16.2-Shell-Upload.html +CVE-2021-24145 - http://packetstormsecurity.com/files/163672/WordPress-Modern-Events-Calendar-Remote-Code-Execution.html +CVE-2021-24145 - https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610 +CVE-2021-24146 - http://packetstormsecurity.com/files/163345/WordPress-Modern-Events-Calendar-5.16.2-Information-Disclosure.html +CVE-2021-24146 - https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc +CVE-2021-24147 - https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f +CVE-2021-24148 - https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882 +CVE-2021-24149 - https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0 +CVE-2021-2415 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24150 - https://wpscan.com/vulnerability/6bc6023f-a5e7-4665-896c-95afa5b638fb +CVE-2021-24151 - https://wpscan.com/vulnerability/5ee77dd7-5a73-4d4e-8038-23e6e763e20c/ +CVE-2021-24152 - https://wpscan.com/vulnerability/597e9686-f4e2-43bf-85ef-c5967e5652bd +CVE-2021-24153 - https://packetstormsecurity.com/files/138192/ +CVE-2021-24154 - https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e +CVE-2021-24155 - http://packetstormsecurity.com/files/163382/WordPress-Backup-Guard-1.5.8-Shell-Upload.html +CVE-2021-24155 - http://packetstormsecurity.com/files/163623/WordPress-Backup-Guard-Authenticated-Remote-Code-Execution.html +CVE-2021-24155 - https://wpscan.com/vulnerability/d442acac-4394-45e4-b6bb-adf4a40960fb +CVE-2021-24156 - https://wpscan.com/vulnerability/8b6f4a77-4008-4730-9a91-fa055a8b3e68 +CVE-2021-24157 - https://wpscan.com/vulnerability/28e42f4e-e38a-4bf4-b51b-d8f21c40f037 +CVE-2021-24158 - https://wpscan.com/vulnerability/d81d0e72-9bb5-47ef-a796-3b305a4b604f +CVE-2021-24159 - https://wpscan.com/vulnerability/363182f1-9fda-4363-8f6a-be37c4c07aa9 +CVE-2021-2416 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24160 - https://wpscan.com/vulnerability/066ba5d4-4aaa-4462-b106-500c1f291c37 +CVE-2021-24161 - https://wpscan.com/vulnerability/efca27e0-bdb6-4497-8330-081f909d6933 +CVE-2021-24162 - https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 +CVE-2021-24163 - https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2 +CVE-2021-24164 - https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89 +CVE-2021-24165 - https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818 +CVE-2021-24166 - https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6 +CVE-2021-24168 - https://wpscan.com/vulnerability/bfaa7d79-904e-45f1-bc42-ddd90a65ce74 +CVE-2021-24169 - http://packetstormsecurity.com/files/164263/WordPress-Advanced-Order-Export-For-WooCommerce-3.1.7-Cross-Site-Scripting.html +CVE-2021-24169 - https://wpscan.com/vulnerability/09681a6c-57b8-4448-982a-fe8d28c87fc3 +CVE-2021-2417 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24170 - https://wpscan.com/vulnerability/29fc5b0e-0a5f-4484-a1e6-a0a1206726cc +CVE-2021-24171 - https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/ +CVE-2021-24172 - https://wpscan.com/vulnerability/187e6967-6961-4843-a9d5-866f6ebdb7bc +CVE-2021-24173 - https://wpscan.com/vulnerability/b69ea1bc-3c9b-47d7-a164-c860ee46a9af +CVE-2021-24174 - http://packetstormsecurity.com/files/163091/WordPress-Database-Backups-1.2.2.6-Cross-Site-Request-Forgery.html +CVE-2021-24174 - https://wpscan.com/vulnerability/350c3e9a-bcc2-486a-90e6-d1dc13ce1bd5 +CVE-2021-24175 - https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89 +CVE-2021-24175 - https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/ +CVE-2021-24176 - https://ganofins.com/blog/my-first-cve-2021-24176/ +CVE-2021-24176 - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 +CVE-2021-24177 - https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i/ +CVE-2021-24178 - https://wpscan.com/vulnerability/700f3b04-8298-447c-8d3c-4581880a63b5 +CVE-2021-24179 - https://wpscan.com/vulnerability/c0a5cdde-732a-432a-86c2-776df5d130a7 +CVE-2021-2418 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24180 - https://wpscan.com/vulnerability/7593d5c8-cbc2-4469-b36b-5d4fb6d49718 +CVE-2021-24181 - https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17 +CVE-2021-24182 - https://wpscan.com/vulnerability/f74dfc52-46ba-41e3-994b-23115a22984f +CVE-2021-24183 - https://wpscan.com/vulnerability/9b8da6b7-f1d6-4a7d-a621-4ca01e4b7496 +CVE-2021-24184 - https://wpscan.com/vulnerability/5e85917c-7a58-49cb-b8b3-05aa18ffff3e +CVE-2021-24185 - https://wpscan.com/vulnerability/0cba5349-e916-43f0-a1fe-62cf73e352a2 +CVE-2021-24186 - https://wpscan.com/vulnerability/5f5c0c6c-6f76-4366-b590-0aab557f8c60 +CVE-2021-24187 - https://wpscan.com/vulnerability/c234700e-61dd-46a0-90fb-609e704269a9 +CVE-2021-24188 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24189 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-2419 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24190 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24191 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24192 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24193 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24194 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24195 - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c +CVE-2021-24196 - https://purinechu.github.io/posts/social_slider_widget_reflected_xss/ +CVE-2021-24196 - https://wpscan.com/vulnerability/bb20d732-a5e4-4140-ab51-b2aa1a53db12 +CVE-2021-24197 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ +CVE-2021-24198 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ +CVE-2021-24199 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ +CVE-2021-2420 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24200 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ +CVE-2021-24201 - https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0 +CVE-2021-24202 - https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb +CVE-2021-24203 - https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e +CVE-2021-24204 - https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf +CVE-2021-24205 - https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9 +CVE-2021-24206 - https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309 +CVE-2021-24207 - https://wpscan.com/vulnerability/21e7a46f-e9a3-4b20-b44a-a5b6ce7b7ce6 +CVE-2021-24209 - https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3 +CVE-2021-2421 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24210 - https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb +CVE-2021-24211 - https://wpscan.com/vulnerability/37e0a033-3dee-476d-ae86-68354e8f0b1c +CVE-2021-24212 - https://wpscan.com/vulnerability/cf9305e8-f5bc-45c3-82db-0ef00fd46129 +CVE-2021-24213 - https://bentl.ee/posts/cve-givewp/ +CVE-2021-24213 - https://wpscan.com/vulnerability/da4ab508-a423-4c7f-a1d4-42ec6f989309 +CVE-2021-24214 - https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10 +CVE-2021-24215 - https://wpscan.com/vulnerability/eec0f29f-a985-4285-8eed-d1855d204a20 +CVE-2021-24216 - https://wpscan.com/vulnerability/87c6052c-2628-4987-a9a3-a03b5ca1e083 +CVE-2021-24217 - https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a +CVE-2021-24218 - https://wpscan.com/vulnerability/169d21fc-d191-46ff-82e8-9ac887aed8a4 +CVE-2021-24219 - https://wpscan.com/vulnerability/35acd2d8-85fc-4af5-8f6c-224fa7d92900 +CVE-2021-24219 - https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild +CVE-2021-2422 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24220 - https://wpscan.com/vulnerability/a2424354-2639-4f53-a24f-afc11f6c4cac +CVE-2021-24220 - https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild +CVE-2021-24221 - https://wpscan.com/vulnerability/3b52b25c-82a1-41c7-83ac-92e244f7c5ab +CVE-2021-24222 - https://wpscan.com/vulnerability/4d715de6-8595-4da9-808a-04a28e409900 +CVE-2021-24223 - https://wpscan.com/vulnerability/d7a72183-0cd1-45de-b98b-2e295b27e5db +CVE-2021-24224 - https://wpscan.com/vulnerability/ed0c054b-54bf-4df8-9015-c76704c93484 +CVE-2021-24225 - https://wpscan.com/vulnerability/25ca8af5-ab48-4e6d-b2ef-fc291742f1d5 +CVE-2021-24226 - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 +CVE-2021-2423 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24232 - https://wpscan.com/vulnerability/f06629b5-8b15-48eb-a7a7-78b693e06b71 +CVE-2021-24233 - https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0 +CVE-2021-24233 - https://www.getastra.com/blog/911/reflected-xss-found-in-cooked-pro-recipe-plugin-for-wordpress/ +CVE-2021-24234 - https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835 +CVE-2021-24235 - https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139 +CVE-2021-24236 - https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea +CVE-2021-24237 - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e +CVE-2021-24238 - https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5 +CVE-2021-24239 - https://wpscan.com/vulnerability/f1b67f40-642f-451e-a67a-b7487918ee34 +CVE-2021-2424 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24240 - https://wpscan.com/vulnerability/10528cb2-12a1-43f7-9b7d-d75d18fdf5bb +CVE-2021-24241 - https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f +CVE-2021-24242 - https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c +CVE-2021-24243 - https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3 +CVE-2021-24244 - https://wpscan.com/vulnerability/354b98d8-46a1-4189-b347-198701ea59b9 +CVE-2021-24245 - http://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html +CVE-2021-24245 - https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735 +CVE-2021-24246 - https://wpscan.com/vulnerability/2365a9d0-f6f4-4602-9804-5af23d0cb11d +CVE-2021-24247 - https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3 +CVE-2021-24248 - https://wpscan.com/vulnerability/ca886a34-cd2b-4032-9de1-8089b5cf3001 +CVE-2021-24249 - https://wpscan.com/vulnerability/fc4cf749-34ef-43b8-a529-5065d698ab81 +CVE-2021-2425 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24250 - https://wpscan.com/vulnerability/e23bf712-d891-4df7-99cc-9ef64f19f685 +CVE-2021-24251 - https://wpscan.com/vulnerability/c9911236-4af3-4557-9bc0-217face534e1 +CVE-2021-24252 - https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c +CVE-2021-24253 - https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079 +CVE-2021-24254 - https://wpscan.com/vulnerability/bb3e56dd-ae2e-45c2-a6c9-a59ae5fc1dc4 +CVE-2021-24255 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24256 - https://wpscan.com/vulnerability/a9412fed-aed3-4931-a504-1a86f876892e +CVE-2021-24256 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24257 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24258 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24259 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-2426 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24260 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24261 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24262 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24263 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24264 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24265 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24266 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24267 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24268 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24269 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-2427 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24270 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24271 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24272 - http://packetstormsecurity.com/files/164261/WordPress-Fitness-Calculators-1.9.5-Cross-Site-Request-Forgery.html +CVE-2021-24272 - https://wpscan.com/vulnerability/e643040b-1f3b-4c13-8a20-acfd069dcc4f +CVE-2021-24273 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24274 - http://packetstormsecurity.com/files/164316/WordPress-Ultimate-Maps-1.2.4-Cross-Site-Scripting.html +CVE-2021-24274 - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d +CVE-2021-24275 - http://packetstormsecurity.com/files/164311/WordPress-Popup-1.10.4-Cross-Site-Scripting.html +CVE-2021-24275 - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f +CVE-2021-24276 - http://packetstormsecurity.com/files/164308/WordPress-Contact-Form-1.7.14-Cross-Site-Scripting.html +CVE-2021-24276 - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c +CVE-2021-24277 - https://wpscan.com/vulnerability/8ebf56be-46c0-4435-819f-dc30370eafa4 +CVE-2021-24278 - https://wpscan.com/vulnerability/99f30604-d62b-4e30-afcd-b482f8d66413 +CVE-2021-24279 - https://wpscan.com/vulnerability/75f7690d-7f6b-48a8-a9d1-95578a657920 +CVE-2021-2428 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24280 - https://wpscan.com/vulnerability/db4ba6b0-887e-4ec1-8935-ab21d369b329 +CVE-2021-24281 - https://wpscan.com/vulnerability/daf12b85-f5ad-4261-ab39-be6840ad3cdc +CVE-2021-24283 - https://wpscan.com/vulnerability/6ccd9990-e15f-4800-b499-f7c74b480051 +CVE-2021-24284 - http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html +CVE-2021-24284 - https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 +CVE-2021-24285 - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 +CVE-2021-24286 - http://packetstormsecurity.com/files/164328/WordPress-Redirect-404-To-Parent-1.3.0-Cross-Site-Scripting.html +CVE-2021-24286 - https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27 +CVE-2021-24287 - http://packetstormsecurity.com/files/164327/WordPress-Select-All-Categories-And-Taxonomies-1.3.1-Cross-Site-Scripting.html +CVE-2021-24287 - https://wpscan.com/vulnerability/56e1bb56-bfc5-40dd-b2d0-edef43d89bdf +CVE-2021-24288 - https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 +CVE-2021-24289 - https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62 +CVE-2021-2429 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24290 - https://wpscan.com/vulnerability/dc368484-f2fe-4c76-ba3d-e00e7f633719 +CVE-2021-24291 - https://packetstormsecurity.com/files/162227/ +CVE-2021-24291 - https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a +CVE-2021-24292 - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ +CVE-2021-24293 - https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7 +CVE-2021-24294 - https://wpscan.com/vulnerability/43b8cfb4-f875-432b-8e3b-52653fdee87c +CVE-2021-24295 - https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/ +CVE-2021-24296 - https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e +CVE-2021-24297 - https://wpscan.com/vulnerability/a64a3b2e-7924-47aa-96e8-3aa02a6cdccc +CVE-2021-24298 - https://codevigilant.com/disclosure/2021/wp-plugin-giveasap-xss/ +CVE-2021-24298 - https://wpscan.com/vulnerability/30aebded-3eb3-4dda-90b5-12de5e622c91 +CVE-2021-24299 - http://packetstormsecurity.com/files/162756/WordPress-ReDi-Restaurant-Reservation-21.0307-Cross-Site-Scripting.html +CVE-2021-24299 - https://wpscan.com/vulnerability/fd6ce00b-8c5f-4180-b648-f47b37303670 +CVE-2021-2430 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24300 - https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837 +CVE-2021-24301 - https://wpscan.com/vulnerability/eb8e2b9d-f153-49c9-862a-5c016934f9ad +CVE-2021-24302 - https://wpscan.com/vulnerability/372a66ca-1c3c-4429-86a5-81dbdaa9ec7d +CVE-2021-24303 - https://github.com/ja9er/CVEProject/blob/main/wordpress_jiangqie-official-website-mini-program_sqli.md +CVE-2021-24303 - https://wpscan.com/vulnerability/cbd65b7d-d3c3-4ee3-8e5e-ff0eeeaa7b30 +CVE-2021-24304 - https://wpscan.com/vulnerability/bb71f2f9-76bd-43f4-a8c9-35771dd28dff +CVE-2021-24305 - https://wpscan.com/vulnerability/4d55d1f5-a7b8-4029-942d-7a13e2498f64 +CVE-2021-24306 - https://wpscan.com/vulnerability/35516555-c50c-486a-886c-df49c9e51e2c +CVE-2021-24307 - https://wpscan.com/vulnerability/ab2c94d2-f6c4-418b-bd14-711ed164bcf1 +CVE-2021-24308 - http://packetstormsecurity.com/files/162856/WordPress-LifterLMS-4.21.0-Cross-Site-Scripting.html +CVE-2021-24308 - https://wpscan.com/vulnerability/f29f68a5-6575-441d-98c9-867145f2b082 +CVE-2021-24309 - https://wpscan.com/vulnerability/ba1d01dc-16e4-464f-94be-ed311ff6ccf9 +CVE-2021-2431 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24310 - https://wpscan.com/vulnerability/f34096ec-b1b0-471d-88a4-4699178a3165 +CVE-2021-24311 - https://wpscan.com/vulnerability/4fb90999-6f91-4200-a0cc-bfe9b34a5de9 +CVE-2021-24312 - https://wpscan.com/vulnerability/2142c3d3-9a7f-4e3c-8776-d469a355d62f +CVE-2021-24313 - https://bastijnouwendijk.com/cve-2021-24313/ +CVE-2021-24313 - https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586 +CVE-2021-24314 - https://m0ze.ru/vulnerability/%5B2021-03-24%5D-%5BWordPress%5D-%5BCWE-89%5D-Goto-WordPress-Theme-v2.0.txt +CVE-2021-24314 - https://wpscan.com/vulnerability/1cc6dc17-b019-49dd-8149-c8bba165eb30 +CVE-2021-24315 - https://m0ze.ru/vulnerability/%5B2021-04-02%5D-%5BWordPress%5D-%5BCWE-79%5D-GiveWP-WordPress-Plugin-v2.10.3.txt +CVE-2021-24315 - https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2 +CVE-2021-24316 - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt +CVE-2021-24316 - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e +CVE-2021-24317 - https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-79%5D-Listeo-WordPress-Theme-v1.6.10.txt +CVE-2021-24317 - https://wpscan.com/vulnerability/704d8886-df9e-4217-88d1-a72a71924174 +CVE-2021-24318 - https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-639%5D-Listeo-WordPress-Theme-v1.6.10.txt +CVE-2021-24318 - https://wpscan.com/vulnerability/9afa7e11-68b3-4196-975e-8b3f8e68ce56 +CVE-2021-24319 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-1021%5D-Bello-WordPress-Theme-v1.5.9.txt +CVE-2021-24319 - https://wpscan.com/vulnerability/2c274eb7-25f1-49d4-a2c8-8ce8cecebe68 +CVE-2021-2432 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-2432 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-2432 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24320 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt +CVE-2021-24320 - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb +CVE-2021-24321 - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-89%5D-Bello-WordPress-Theme-v1.5.9.txt +CVE-2021-24321 - https://wpscan.com/vulnerability/7314f9fa-c047-4e0c-b145-940240a50c02 +CVE-2021-24322 - https://m0ze.ru/vulnerability/%5B2021-04-04%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-DB-Backup-WordPress-Plugin-v2.3.3.txt +CVE-2021-24322 - https://wpscan.com/vulnerability/6bea6301-0762-45c3-a4eb-15d6ac4f9f37 +CVE-2021-24323 - https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010 +CVE-2021-24324 - https://wpscan.com/vulnerability/63a24890-3735-4016-b4b7-4b070a842664 +CVE-2021-24325 - https://wpscan.com/vulnerability/96e9a7fd-9ab8-478e-9420-4bca2a0b23a1 +CVE-2021-24326 - https://wpscan.com/vulnerability/63d6ca03-e0df-40db-9839-531c13619094 +CVE-2021-24327 - https://wpscan.com/vulnerability/ca8068f7-dcf0-44fd-841d-d02987220d79 +CVE-2021-24328 - https://m0ze.ru/exploit/csrf-wp-login-security-and-history-v1.0.html +CVE-2021-24328 - https://m0ze.ru/vulnerability/%5B2021-03-29%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-Login-Security-and-History-WordPress-Plugin-v1.0.txt +CVE-2021-24328 - https://wpscan.com/vulnerability/eeb41d7b-8f9e-4a12-b65f-f310f08e4ace +CVE-2021-24329 - https://wpscan.com/vulnerability/9df86d05-1408-4c22-af55-5e3d44249fd0 +CVE-2021-2433 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24330 - https://wpscan.com/vulnerability/b9748066-83b7-4762-9124-de021f687477 +CVE-2021-24331 - https://wpscan.com/vulnerability/2c7ca586-def8-4723-b779-09d7f37fa1ab +CVE-2021-24332 - https://wpscan.com/vulnerability/6678e064-ce21-4bb2-8c50-061073fb22fb +CVE-2021-24333 - https://m0ze.ru/exploit/csrf-prevent-content-copy-image-save-v1.3.html +CVE-2021-24333 - https://wpscan.com/vulnerability/c722f8d0-f86b-41c2-9f1f-48e475e22864 +CVE-2021-24334 - https://wpscan.com/vulnerability/ae79189a-6b63-4110-9567-cd7c97d71e4f +CVE-2021-24335 - https://wpscan.com/vulnerability/39258aba-2449-4214-a490-b8e46945117d +CVE-2021-24336 - https://codevigilant.com/disclosure/2021/wp-plugin-flightlog-sql-injection/ +CVE-2021-24336 - https://wpscan.com/vulnerability/dda0593e-cd97-454e-a8c8-15d7f690311c +CVE-2021-24337 - https://codevigilant.com/disclosure/2021/wp-plugin-video-embed-box/ +CVE-2021-24337 - https://wpscan.com/vulnerability/a8fd8dd4-5b5e-462e-8dae-065d5e2d003a +CVE-2021-24338 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24338 +CVE-2021-24339 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24339 +CVE-2021-2434 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24340 - https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c +CVE-2021-24341 - https://wpscan.com/vulnerability/1eba1c73-a19b-4226-afec-d27c48388a04 +CVE-2021-24342 - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e +CVE-2021-24343 - https://wpscan.com/vulnerability/d6c72d90-e321-47b9-957a-6fea7c944293 +CVE-2021-24344 - https://wpscan.com/vulnerability/6d6c1d46-5c3d-4d56-9728-2f94064132aa +CVE-2021-24345 - https://codevigilant.com/disclosure/2021/wp-plugin-sendit/ +CVE-2021-24345 - https://wpscan.com/vulnerability/02ba4d8b-f4d2-42cd-9fae-b543e112fa04 +CVE-2021-24346 - https://codevigilant.com/disclosure/2021/wp-plugin-stock-in/ +CVE-2021-24346 - https://wpscan.com/vulnerability/c25146fd-4143-463c-8c85-05dd33e9a77b +CVE-2021-24347 - http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html +CVE-2021-24347 - http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html +CVE-2021-24347 - https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a +CVE-2021-24348 - https://codevigilant.com/disclosure/2021/wp-plugin-side-menu/ +CVE-2021-24348 - https://wpscan.com/vulnerability/e0ca257e-6e78-4611-a9ad-be43d37cf474 +CVE-2021-24349 - https://wpscan.com/vulnerability/6bb4eb71-d702-4732-b01f-b723077d66ca +CVE-2021-2435 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24350 - https://wpscan.com/vulnerability/06f1889d-8e2f-481a-b91b-3a8008e00ffc +CVE-2021-24351 - https://wpscan.com/vulnerability/2ee62f85-7aea-4b7d-8b2d-5d86d9fb8016 +CVE-2021-24352 - https://wpscan.com/vulnerability/d770f1fa-7652-465a-833c-b7178146847d +CVE-2021-24353 - https://wpscan.com/vulnerability/74c23d56-e81f-47e9-bf8b-33d3f0e81894 +CVE-2021-24354 - https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668 +CVE-2021-24355 - https://wpscan.com/vulnerability/ce8f9648-30fb-4fb9-894e-879dc0f26f98 +CVE-2021-24356 - https://wpscan.com/vulnerability/be356530-5e00-4f27-8177-b80f3c1ae6e8 +CVE-2021-24357 - https://wpscan.com/vulnerability/950f46ae-4476-4969-863a-0e55752953b3 +CVE-2021-24358 - https://wpscan.com/vulnerability/fd4352ad-dae0-4404-94d1-11083cb1f44d +CVE-2021-24359 - https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92 +CVE-2021-2436 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24360 - https://wpscan.com/vulnerability/d9586453-cc5c-4d26-bb45-a6370c9427fe +CVE-2021-24361 - https://wpscan.com/vulnerability/5aff50fc-ac96-4076-a07c-bb145ae37025 +CVE-2021-24362 - https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a +CVE-2021-24363 - https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974 +CVE-2021-24364 - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 +CVE-2021-24365 - https://wpscan.com/vulnerability/fdbeb137-b404-46c7-85fb-394a3bdac388 +CVE-2021-24365 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-032.txt +CVE-2021-24366 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-24366 +CVE-2021-24367 - https://wpscan.com/vulnerability/f35b7c8f-cfb6-42b6-8a3a-8c07cd1e9da0 +CVE-2021-24368 - https://wpscan.com/vulnerability/7f2fda5b-45a5-4fc6-968f-90bc9674c999 +CVE-2021-24369 - https://wpscan.com/vulnerability/1d1a731b-78f7-4d97-b40d-80f66700edae +CVE-2021-2437 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24370 - https://lists.openwall.net/full-disclosure/2020/11/17/2 +CVE-2021-24370 - https://seclists.org/fulldisclosure/2020/Nov/30 +CVE-2021-24370 - https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38 +CVE-2021-24370 - https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/ +CVE-2021-24371 - https://codevigilant.com/disclosure/2021/wp-plugin-rsvpmaker/ +CVE-2021-24371 - https://wpscan.com/vulnerability/63be225c-ebee-4cac-b43e-cf033ee7425d +CVE-2021-24372 - https://wpscan.com/vulnerability/5340ae4e-95ba-4a69-beb1-3459cac17782 +CVE-2021-24373 - https://wpscan.com/vulnerability/fcf17278-609f-4f75-8a87-9b4579dee1c8 +CVE-2021-24374 - https://wpscan.com/vulnerability/08a8a51c-49d3-4bce-b7e0-e365af1d8f33 +CVE-2021-24375 - https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/ +CVE-2021-24375 - https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f +CVE-2021-24376 - https://wpscan.com/vulnerability/93edcc23-894a-46c2-84d2-407dcb64ba1e +CVE-2021-24377 - https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4 +CVE-2021-24378 - https://wpscan.com/vulnerability/375bd694-1a30-41af-bbd4-8a8ee54f0dbf +CVE-2021-24379 - https://wpscan.com/vulnerability/aae7a889-195c-45a3-bbe4-e6d4cd2d7fd9 +CVE-2021-2438 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24380 - https://wpscan.com/vulnerability/1dd0f9a8-22ab-4ecc-a925-605822739000 +CVE-2021-24381 - https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d +CVE-2021-24382 - https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d +CVE-2021-24383 - http://packetstormsecurity.com/files/163261/WordPress-WP-Google-Maps-8.1.11-Cross-Site-Scripting.html +CVE-2021-24383 - https://wpscan.com/vulnerability/1270588c-53fe-447e-b83c-1b877dc7a954 +CVE-2021-24384 - https://wpscan.com/vulnerability/fb6c407c-713c-4e83-92ce-4e5f791be696 +CVE-2021-24385 - https://wpscan.com/vulnerability/754ac750-0262-4f65-b23e-d5523995fbfa +CVE-2021-24386 - https://wpscan.com/vulnerability/e9b48b19-14cc-41ad-a029-f7f9ae236e4e +CVE-2021-24387 - https://wpscan.com/vulnerability/27264f30-71d5-4d2b-8f36-4009a2be6745 +CVE-2021-24388 - https://wpscan.com/vulnerability/e3f6576f-08cb-4278-8c79-3ef4d0b85cd9 +CVE-2021-24389 - https://wpscan.com/vulnerability/23b8b8c4-cded-4887-a021-5f3ea610213b +CVE-2021-2439 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24390 - https://codevigilant.com/disclosure/2021/wp-plugin-alipay/ +CVE-2021-24390 - https://wpscan.com/vulnerability/92b0abec-082f-4545-9636-1b2f4dac66fe +CVE-2021-24391 - https://codevigilant.com/disclosure/2021/wp-plugin-cashtomer/ +CVE-2021-24391 - https://wpscan.com/vulnerability/0c26ee50-df3d-438a-93bb-faa88b7983af +CVE-2021-24392 - https://codevigilant.com/disclosure/2021/wp-plugin-club-management-software/ +CVE-2021-24392 - https://wpscan.com/vulnerability/68530e63-bba3-4a9a-ae83-516684aa5dc6 +CVE-2021-24393 - https://codevigilant.com/disclosure/2021/wp-plugin-comment-highlighter/ +CVE-2021-24393 - https://wpscan.com/vulnerability/24969766-19e3-47cd-b32c-6c3330651d1f +CVE-2021-24394 - https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/ +CVE-2021-24394 - https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3 +CVE-2021-24395 - https://codevigilant.com/disclosure/2021/wp-plugin-embed-youtube-video/ +CVE-2021-24395 - https://wpscan.com/vulnerability/6cd9ebcf-e78f-4f97-a8f9-b7e4ceab66b7 +CVE-2021-24396 - https://codevigilant.com/disclosure/2021/wp-plugin-gseor/ +CVE-2021-24396 - https://wpscan.com/vulnerability/28687291-2369-49e0-8905-dc4359454830 +CVE-2021-24397 - https://codevigilant.com/disclosure/2021/wp-plugin-microcopy/ +CVE-2021-24397 - https://wpscan.com/vulnerability/2edab2b0-d4fd-4d50-aca0-2a1b7b37c23d +CVE-2021-24398 - https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/ +CVE-2021-24398 - https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5 +CVE-2021-24399 - https://codevigilant.com/disclosure/2021/wp-plugin-the-sorter/ +CVE-2021-24399 - https://wpscan.com/vulnerability/f7af0795-f111-4acc-9b1e-63cae5862f8b +CVE-2021-2440 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24400 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-display-users/ +CVE-2021-24400 - https://wpscan.com/vulnerability/614cf338-c8cf-4570-ae83-4f79cbdcc9d5 +CVE-2021-24401 - https://codevigilant.com/disclosure/2021/wp-plugins-domain-redirect/ +CVE-2021-24401 - https://wpscan.com/vulnerability/f9ae34a9-84c9-4d48-af6a-9e6c786f856e +CVE-2021-24402 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-icommerce/ +CVE-2021-24402 - https://wpscan.com/vulnerability/7840e664-907f-42d1-950d-8c919032b707 +CVE-2021-24403 - https://codevigilant.com/disclosure/2021/wp-plugin-wpagecontact/ +CVE-2021-24403 - https://wpscan.com/vulnerability/a87040c1-58fc-4bf7-8bfa-0b9712a62ba8 +CVE-2021-24404 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-board/ +CVE-2021-24404 - https://wpscan.com/vulnerability/a86240e1-f064-4972-9f97-6b349fdd57f6 +CVE-2021-24405 - http://packetstormsecurity.com/files/166543/WordPress-Easy-Cookie-Policy-1.6.2-Cross-Site-Scripting.html +CVE-2021-24405 - https://wpscan.com/vulnerability/9157d6d2-4bda-4fcd-8192-363a63a51ff5 +CVE-2021-24406 - https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388 +CVE-2021-24407 - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 +CVE-2021-24408 - https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d +CVE-2021-24409 - https://wpscan.com/vulnerability/ae3cd3ed-aecd-4d8c-8a2b-2936aaaef0cf +CVE-2021-2441 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24410 - https://wpscan.com/vulnerability/b47ea36e-f37c-4745-b750-31f5b91f543f +CVE-2021-24411 - https://wpscan.com/vulnerability/ebe7f625-67e1-4df5-a569-20526dd57b24 +CVE-2021-24412 - https://wpscan.com/vulnerability/c4ed3e52-cbe0-46dc-ab43-65de78cfb225 +CVE-2021-24413 - https://wpscan.com/vulnerability/ce6d17c3-6741-4c80-ab13-e1824960ae24 +CVE-2021-24414 - https://wpscan.com/vulnerability/e20b805d-eb11-4702-9803-77de276000ac +CVE-2021-24415 - https://wpscan.com/vulnerability/fd312bfd-7c98-4682-877d-846442e9c6a2 +CVE-2021-24416 - https://wpscan.com/vulnerability/260c7e2d-d48c-42d6-ae05-bad3f3bac01d +CVE-2021-24418 - https://wpscan.com/vulnerability/1512bba9-89e2-493d-b85d-10c7acb903db +CVE-2021-24419 - https://wpscan.com/vulnerability/0eeff1ee-d11e-4d52-a032-5f5bd8a6a2d7 +CVE-2021-2442 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24420 - https://wpscan.com/vulnerability/426eafb1-0261-4e7e-8c70-75bf4c476f18 +CVE-2021-24421 - https://wpscan.com/vulnerability/b378d36d-66d9-4373-a628-e379e4766375 +CVE-2021-24423 - https://wpscan.com/vulnerability/541974d6-2df8-4497-9aee-afd3b9024102 +CVE-2021-24424 - https://wpscan.com/vulnerability/90cf8f9d-4d37-405d-b161-239bdb281828 +CVE-2021-24425 - https://wpscan.com/vulnerability/14632fa8-597e-49ff-8583-9797208a3583 +CVE-2021-24426 - https://wpscan.com/vulnerability/48464b3f-fe57-40fe-8868-398a36099fb9 +CVE-2021-24427 - https://wpscan.com/vulnerability/5da5ce9a-82a6-404f-8dec-795d7905b3f9 +CVE-2021-24428 - https://wpscan.com/vulnerability/9fcf6ebe-01d9-4730-a20e-58b192bb6d87 +CVE-2021-24429 - https://wpscan.com/vulnerability/e922b788-7da5-43b4-9b05-839c8610252a +CVE-2021-2443 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24430 - https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df +CVE-2021-24431 - https://wpscan.com/vulnerability/ae50cec9-5f80-4221-b6a8-4593ab66c37b +CVE-2021-24432 - https://wpscan.com/vulnerability/b92ec5f7-d6a8-476f-a01e-21001a558914/ +CVE-2021-24433 - https://wpscan.com/vulnerability/2ce8c786-ba82-427c-b5e7-e3b300a24c5f/ +CVE-2021-24434 - https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39 +CVE-2021-24435 - https://wpscan.com/vulnerability/a88ffc42-6611-406e-8660-3af24c9cc5e8 +CVE-2021-24436 - https://wpscan.com/vulnerability/05988ebb-7378-4a3a-9d2d-30f8f58fe9ef +CVE-2021-24437 - https://wpscan.com/vulnerability/ed9d26be-cc96-4274-a05b-0b7ad9d8cfd9 +CVE-2021-24438 - https://wpscan.com/vulnerability/af472879-9328-45c2-957f-e7bed77e4c2d +CVE-2021-24439 - https://wpscan.com/vulnerability/9c538c51-ae58-461d-b93b-cc9dfebf2bc0 +CVE-2021-2444 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24440 - https://wpscan.com/vulnerability/ba4503f7-684e-4274-bc53-3aa848712496 +CVE-2021-24441 - https://wpscan.com/vulnerability/ec9292b1-5cbd-4332-bdb6-2351c94f5ac6 +CVE-2021-24442 - https://wpscan.com/vulnerability/7376666e-9b2a-4239-b11f-8544435b444a +CVE-2021-24443 - https://wpscan.com/vulnerability/a4432acd-df49-4a4f-8184-b55cdd5d4d34 +CVE-2021-24444 - http://packetstormsecurity.com/files/164604/WordPress-TaxoPress-3.0.7.1-Cross-Site-Scripting.html +CVE-2021-24444 - https://wpscan.com/vulnerability/a31321fe-adc6-4480-a220-35aedca52b8b +CVE-2021-24445 - https://wpscan.com/vulnerability/d60634a3-ca39-43be-893b-ff9ba625360f +CVE-2021-24446 - https://wpscan.com/vulnerability/be55131b-d9f2-4ac1-b667-c544c066887f +CVE-2021-24447 - https://wpscan.com/vulnerability/fb9dbcdf-4ffd-484d-9b67-283683d050fd +CVE-2021-24448 - https://wpscan.com/vulnerability/81e42812-93eb-480d-a2d2-5ba5e02dd0ba +CVE-2021-2445 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24450 - https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92 +CVE-2021-24451 - https://wpscan.com/vulnerability/40603382-404b-44a2-8212-f2008366891c +CVE-2021-24452 - https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0 +CVE-2021-24453 - https://wpscan.com/vulnerability/78575072-4e04-4a8a-baec-f313cfffe829 +CVE-2021-24454 - https://wpscan.com/vulnerability/48ade7a5-5abb-4267-b9b6-13e31e1b3e91 +CVE-2021-24455 - https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9 +CVE-2021-24456 - https://wpscan.com/vulnerability/929ad37d-9cdb-4117-8cd3-cf7130a7c9d4 +CVE-2021-24457 - https://wpscan.com/vulnerability/97f4f7da-22a8-42a6-88ac-82e95a6c06dd +CVE-2021-24458 - https://wpscan.com/vulnerability/8a588266-54cd-4779-adcf-f9b9e226c297 +CVE-2021-24459 - https://wpscan.com/vulnerability/3fafbec0-55e4-41cf-8402-1b57b6615225 +CVE-2021-2446 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24460 - https://wpscan.com/vulnerability/9c0164f2-464b-4876-a48f-c0ebd63cf397 +CVE-2021-24461 - https://wpscan.com/vulnerability/311974b5-6d6e-4b47-a33d-6d8f468aa528 +CVE-2021-24462 - https://wpscan.com/vulnerability/e24dac6d-de48-42c1-bdde-4a45fb331376 +CVE-2021-24463 - https://wpscan.com/vulnerability/994e6198-f0e9-4e30-989f-b5a3dfe95ded +CVE-2021-24464 - https://wpscan.com/vulnerability/531b3fac-48b9-4821-a3aa-4db073d43aae +CVE-2021-24465 - https://wpscan.com/vulnerability/08dbe202-0136-4502-87e7-5e984dc27b16 +CVE-2021-24466 - https://wpscan.com/vulnerability/37c7bdbb-f27f-47d3-9886-69d2e83d7581 +CVE-2021-24467 - https://wpscan.com/vulnerability/ac32d265-066e-49ec-9042-3145cd99e2e8 +CVE-2021-24468 - https://wpscan.com/vulnerability/4b7c61da-952c-492a-8ce6-3c2126942a7c +CVE-2021-2447 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24470 - https://wpscan.com/vulnerability/b01a85cc-0e45-4183-a916-19476354d5d4 +CVE-2021-24471 - https://wpscan.com/vulnerability/a8ccb09a-9f8c-448f-b2d0-9b01c3a748ac +CVE-2021-24472 - https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a +CVE-2021-24473 - https://wpscan.com/vulnerability/79982ea9-4733-4b1e-a43e-17629c1136de +CVE-2021-24474 - https://wpscan.com/vulnerability/49bc46a8-9d55-4fa1-8e0d-0556a6336fa0 +CVE-2021-24476 - https://wpscan.com/vulnerability/d1885641-9547-4dd5-84be-ba4a160ee1f5 +CVE-2021-24477 - https://wpscan.com/vulnerability/7915070f-1d9b-43c3-b01e-fec35f633a4d +CVE-2021-24478 - https://wpscan.com/vulnerability/c73818e5-0734-46c9-9703-d211b4f58664 +CVE-2021-24479 - https://wpscan.com/vulnerability/5fd2246a-fbd9-4f2a-8b0b-a64c3f91157c +CVE-2021-2448 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24480 - https://wpscan.com/vulnerability/243d417a-6fb9-4e17-9e12-a8c605f9af8a +CVE-2021-24481 - https://wpscan.com/vulnerability/a4c352de-9815-4dfe-ac51-65b5bfb37438 +CVE-2021-24482 - https://wpscan.com/vulnerability/2f86e418-22fd-4cb8-8de1-062b17cf20a7 +CVE-2021-24483 - https://wpscan.com/vulnerability/0dc931c6-1fce-4d70-a658-a4bbab10dab3 +CVE-2021-24484 - https://wpscan.com/vulnerability/9ce0153d-4a8b-4215-b6b6-15ca68c4f52c +CVE-2021-24485 - https://wpscan.com/vulnerability/4a6b278a-4c11-4624-86bf-754212979643 +CVE-2021-24486 - https://wpscan.com/vulnerability/324e6b7b-a2ac-4c08-8b97-0967513f7328 +CVE-2021-24487 - https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4 +CVE-2021-24488 - https://wpscan.com/vulnerability/1fc0aace-ba85-4939-9007-d150960add4a +CVE-2021-24489 - https://wpscan.com/vulnerability/36e8efe8-b29f-4c9e-9dd5-3e317aa43e0c +CVE-2021-2449 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24490 - https://wpscan.com/vulnerability/4ea0127e-afef-41bf-a005-c57432f9f58c +CVE-2021-24491 - https://wpscan.com/vulnerability/ddd37827-f4c1-4806-8846-d06d9fbf23dd +CVE-2021-24492 - https://codevigilant.com/disclosure/2021/wp-plugin-handsome-testimonials/ +CVE-2021-24492 - https://wpscan.com/vulnerability/42760007-0e59-4d45-8d64-86bc0b8dacea +CVE-2021-24493 - https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e +CVE-2021-24494 - https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160 +CVE-2021-24495 - https://wpscan.com/vulnerability/d11b79a3-f762-49ab-b7c8-3174624d7638 +CVE-2021-24496 - https://wpscan.com/vulnerability/5fd1cb7f-a036-4c5b-9557-0ffd4ef6b834 +CVE-2021-24497 - https://wpscan.com/vulnerability/a1cf08fe-943a-4f14-beb0-25216011b538 +CVE-2021-24498 - https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 +CVE-2021-24499 - http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html +CVE-2021-24499 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ +CVE-2021-24499 - https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb +CVE-2021-2450 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24500 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ +CVE-2021-24500 - https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56 +CVE-2021-24501 - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ +CVE-2021-24501 - https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e +CVE-2021-24502 - https://wpscan.com/vulnerability/f95c3a48-5228-4047-9b92-de985741d157 +CVE-2021-24503 - https://wpscan.com/vulnerability/18ab1570-2b4a-48a4-86e6-c1d368563691 +CVE-2021-24504 - https://wpscan.com/vulnerability/e0182508-23f4-4bdb-a1ef-1d1be38f3ad1 +CVE-2021-24505 - https://wpscan.com/vulnerability/550e08ac-4c3a-4e22-8e98-bc5bfc020ca9 +CVE-2021-24506 - https://wpscan.com/vulnerability/52c8755c-46b9-4383-8c8d-8816f03456b0 +CVE-2021-24507 - https://wpscan.com/vulnerability/a1a0dc0b-c351-4d46-ac9b-b297ce4d251c +CVE-2021-24508 - https://wpscan.com/vulnerability/2b543740-d4b0-49b5-a021-454a3a72162f +CVE-2021-24509 - https://wpscan.com/vulnerability/06df2729-21da-4c22-ae1e-dda1f15bdf8f +CVE-2021-2451 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24510 - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 +CVE-2021-24511 - https://codevigilant.com/disclosure/2021/wp-plugin-purple-xmls-google-product-feed-for-woocommerce/ +CVE-2021-24511 - https://wpscan.com/vulnerability/0fa114a0-29df-4312-9138-eb9f0aedb3c5 +CVE-2021-24512 - https://wpscan.com/vulnerability/458a576e-a7ed-4758-a80c-cd08c370aaf4 +CVE-2021-24513 - https://wpscan.com/vulnerability/a1dc0ea9-51dd-43c3-bfd9-c5106193aeb6 +CVE-2021-24514 - https://wpscan.com/vulnerability/0afa78d3-2403-4e0c-8f16-5b7874b03cd2 +CVE-2021-24515 - https://wpscan.com/vulnerability/6bbea7fe-e966-406b-ad06-0206fcc6f0a0 +CVE-2021-24516 - https://wpscan.com/vulnerability/88d70e35-4c22-4bc7-b1a5-24068d55257c +CVE-2021-24517 - https://wpscan.com/vulnerability/f440edd8-94fe-440a-8a5b-e3d24dcfcbc1 +CVE-2021-24518 - https://packetstormsecurity.com/files/163472/ +CVE-2021-24518 - https://wpscan.com/vulnerability/53103cdc-a4bf-40fa-aeb1-790fc7a65f0a +CVE-2021-24519 - https://wpscan.com/vulnerability/368828f9-fdd1-4a82-8658-20e0f4c4da0c +CVE-2021-2452 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24520 - https://wpscan.com/vulnerability/f903aadd-17af-4ddf-8635-abb3338ac815 +CVE-2021-24521 - https://github.com/pang0lin/CVEproject/blob/main/wordpress_side-menu-lite_sqli.md +CVE-2021-24521 - https://wpscan.com/vulnerability/eb21ebc5-265c-4378-b2c6-62f6bc2f69cd +CVE-2021-24522 - https://wpscan.com/vulnerability/25b51add-197c-4aff-b1a8-b92fb11d8697 +CVE-2021-24523 - https://wpscan.com/vulnerability/832fe086-1d33-430b-bdb5-e444761576b2 +CVE-2021-24524 - https://wpscan.com/vulnerability/5a4774ec-c0ee-4c6b-92a6-fa10821ec336 +CVE-2021-24525 - https://wpscan.com/vulnerability/7f5659bd-50c3-4725-95f4-cf88812acf1c +CVE-2021-24526 - https://wpscan.com/vulnerability/17287d8a-ba27-42dc-9370-a931ef404995 +CVE-2021-24527 - https://wpscan.com/vulnerability/c142e738-bc4b-4058-a03e-1be6fca47207 +CVE-2021-24528 - https://wpscan.com/vulnerability/8b8d316b-96b2-4cdc-9da5-c9ea6108a85b +CVE-2021-24529 - https://wpscan.com/vulnerability/8953d931-19f9-4b73-991c-9c48db1af8b5 +CVE-2021-2453 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24530 - https://wpscan.com/vulnerability/caf36ca5-aafd-48bd-a1e5-30f3973d8eb8 +CVE-2021-24531 - https://wpscan.com/vulnerability/a5837621-ee6e-4876-9f65-82658fc0341f +CVE-2021-24533 - https://wpscan.com/vulnerability/174b2119-b806-4da4-a23d-c19b552c86cb +CVE-2021-24534 - https://wpscan.com/vulnerability/b968b9a1-67f3-4bef-a3d3-6e8942bb6570 +CVE-2021-24535 - https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f +CVE-2021-24536 - https://wpscan.com/vulnerability/e1ca9978-a44d-4717-b963-acaf56258fc9 +CVE-2021-24537 - https://wpscan.com/vulnerability/0d6b46cb-5244-486f-ad70-4023907ac9eb +CVE-2021-24538 - https://wpscan.com/vulnerability/f9911a43-0f4c-403f-9fca-7822eb693317 +CVE-2021-24539 - https://wpscan.com/vulnerability/4bda5dff-f577-4cd8-a225-c6b4c32f22b4 +CVE-2021-2454 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24540 - https://wpscan.com/vulnerability/67910e5d-ea93-418b-af81-c50d0e05d213 +CVE-2021-24541 - https://wpscan.com/vulnerability/e6602369-87f4-4454-8298-89cc69f8375c +CVE-2021-24543 - https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312 +CVE-2021-24544 - https://wpscan.com/vulnerability/4a2dddfc-6ce2-4edd-aaaa-4c130a9356d0 +CVE-2021-24545 - https://wpscan.com/vulnerability/64267134-9d8c-4e0c-b24f-d18692a5775e +CVE-2021-24546 - https://wpscan.com/vulnerability/bdc36f6a-682d-4d66-b587-92e86085d971 +CVE-2021-24547 - https://wpscan.com/vulnerability/faaeb685-ea02-4a5a-ac5f-87081efe94e0 +CVE-2021-24548 - https://wpscan.com/vulnerability/10660c95-d366-4152-9ce8-b57c57a2ec6c +CVE-2021-24549 - https://codevigilant.com/disclosure/2021/wp-plugin-aceide/ +CVE-2021-24549 - https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a +CVE-2021-2455 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24550 - https://codevigilant.com/disclosure/2021/wp-plugin-broken-link-manager/ +CVE-2021-24550 - https://wpscan.com/vulnerability/1bf65448-689c-474d-a566-c9b6797d3e4a +CVE-2021-24551 - https://codevigilant.com/disclosure/2021/wp-plugin-edit-comments/ +CVE-2021-24551 - https://wpscan.com/vulnerability/e62fb8db-384f-4384-ad24-e10eb9058ed5 +CVE-2021-24552 - https://codevigilant.com/disclosure/2021/wp-plugin-simple-events-calendar/ +CVE-2021-24552 - https://wpscan.com/vulnerability/3482a015-a5ed-4913-b516-9eae2b3f89db +CVE-2021-24553 - https://codevigilant.com/disclosure/2021/wp-plugin-timeline-calendar/ +CVE-2021-24553 - https://wpscan.com/vulnerability/14c75a00-a52b-430b-92da-5145e5aee30a +CVE-2021-24554 - https://codevigilant.com/disclosure/2021/wp-plugin-wp-paytm-pay/ +CVE-2021-24554 - https://wpscan.com/vulnerability/f2842ac8-76fa-4490-aa0c-5f2b07ecf2ad +CVE-2021-24555 - https://codevigilant.com/disclosure/2021/wp-plugin-diary-availability-calendar/ +CVE-2021-24555 - https://wpscan.com/vulnerability/8eafd84b-6214-450b-869b-0afe7cca4c5f +CVE-2021-24556 - https://codevigilant.com/disclosure/2021/wp-plugin-email-subscriber/ +CVE-2021-24556 - https://wpscan.com/vulnerability/f050aedc-f79f-4b27-acac-0cdb33b25af8 +CVE-2021-24557 - https://codevigilant.com/disclosure/2021/wp-plugin-m-vslider/ +CVE-2021-24557 - https://wpscan.com/vulnerability/8b8e41e8-5a40-4062-b5b7-3b01b1a709ef +CVE-2021-24558 - https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ +CVE-2021-24558 - https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff +CVE-2021-24559 - https://wpscan.com/vulnerability/65a29976-163a-4bbf-a4e8-590ddc4b83f2/ +CVE-2021-2456 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24560 - https://wpscan.com/vulnerability/d51fcd97-e535-42dd-997a-edc2f5f12269 +CVE-2021-24561 - https://wpscan.com/vulnerability/5433ef4c-4451-4b6e-992b-69c5eccabf90 +CVE-2021-24562 - https://wpscan.com/vulnerability/d45bb744-4a0d-4af0-aa16-71f7e3ea6e00 +CVE-2021-24563 - http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html +CVE-2021-24563 - https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1 +CVE-2021-24564 - https://wpscan.com/vulnerability/b25af0e1-392f-4305-ad44-50e64ef3dbdf +CVE-2021-24565 - https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 +CVE-2021-24566 - https://jetpack.com/2021/07/22/severe-vulnerability-patched-in-woocommerce-currency-switcher/ +CVE-2021-24567 - https://wpscan.com/vulnerability/a3cd3115-2181-4e14-8b39-4de096433847/ +CVE-2021-24568 - https://wpscan.com/vulnerability/cf7c0207-adb2-44c6-9469-2b24dbfec83a +CVE-2021-24569 - https://wpscan.com/vulnerability/38053e05-4b17-4fa9-acd3-85d8529b202b +CVE-2021-2457 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24570 - https://wpscan.com/vulnerability/5c73754c-eebe-424a-9d3b-ca83eb53bf87 +CVE-2021-24571 - https://wpscan.com/vulnerability/377fd65f-3a8c-4f7a-9e40-046d52ec0eef +CVE-2021-24572 - https://wpscan.com/vulnerability/7b1ebd26-ea8b-448c-a775-66a04102e44f +CVE-2021-24574 - https://wpscan.com/vulnerability/9adf7022-5108-43b7-bf0e-a42593185b74 +CVE-2021-24575 - https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a +CVE-2021-24576 - https://wpscan.com/vulnerability/4d0c60d1-db5a-4c4f-9bdb-669975ac7210 +CVE-2021-24577 - https://wpscan.com/vulnerability/d453b547-41a8-4a6b-8349-8686b7054805 +CVE-2021-24578 - https://wpscan.com/vulnerability/69351798-c790-42d4-9485-1813cd325769 +CVE-2021-24579 - https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 +CVE-2021-2458 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24580 - https://wpscan.com/vulnerability/2faccd1b-4b1c-4b3e-b917-de2d05e860f8 +CVE-2021-24581 - https://wpscan.com/vulnerability/75abd073-b45f-4fe6-8501-7a6d0163f78d +CVE-2021-24582 - https://wpscan.com/vulnerability/5a5293ed-ddcb-4a63-9420-09942e7d69c2 +CVE-2021-24583 - https://wpscan.com/vulnerability/7aec4ef4-db3b-41fb-9177-88ce9d37bca6 +CVE-2021-24584 - https://wpscan.com/vulnerability/60eadf75-8298-49de-877e-ce103fc34d58 +CVE-2021-24585 - https://wpscan.com/vulnerability/cd288a92-903b-47c9-83ac-8e5b677e949b +CVE-2021-24586 - https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85 +CVE-2021-24587 - https://wpscan.com/vulnerability/bb5d94ad-e1ce-44e2-8403-d73fe75a146a +CVE-2021-24588 - https://wpscan.com/vulnerability/dc2ce546-9da1-442c-8ee2-cd660634501f +CVE-2021-24590 - https://wpscan.com/vulnerability/d6846774-1958-4c8d-bb64-af0d8c46e6e7 +CVE-2021-24591 - https://wpscan.com/vulnerability/c5cbe3b4-2829-4fd2-8194-4b3a2ae0e257 +CVE-2021-24592 - https://wpscan.com/vulnerability/9579ff13-9597-4a77-8cb9-997e35265d22 +CVE-2021-24593 - https://wpscan.com/vulnerability/309296d4-c397-4fc7-85fb-a28b5b5b6a8d +CVE-2021-24594 - https://wpscan.com/vulnerability/cf7b0f07-8b9b-40a1-ba7b-e8d34f515a6b +CVE-2021-24595 - https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052 +CVE-2021-24596 - https://wpscan.com/vulnerability/b5def0e7-2b4a-43e0-8175-28b28aa2f8ae +CVE-2021-24597 - https://wpscan.com/vulnerability/37554d0e-68e2-4df9-8c59-65f5cd7f184e +CVE-2021-24598 - https://wpscan.com/vulnerability/365c09a7-0b10-4145-a415-5c0e9f429ae0 +CVE-2021-24599 - https://wpscan.com/vulnerability/625a272f-5c69-4f6a-8eee-32f70cd4a558 +CVE-2021-2460 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24600 - https://wpscan.com/vulnerability/413b3a2e-1c05-45ec-b00f-1c137a1ae33e +CVE-2021-24601 - https://wpscan.com/vulnerability/bb437706-a918-4d66-b027-b083ab486074 +CVE-2021-24602 - https://wpscan.com/vulnerability/5fd2548a-08de-4417-bff1-f174dab718d5 +CVE-2021-24603 - https://wpscan.com/vulnerability/72aea0e5-1fa7-4827-a173-59982202d323 +CVE-2021-24604 - https://wpscan.com/vulnerability/d084c5b1-45f1-4e7e-b3e9-3c98ae4bce9c +CVE-2021-24605 - https://wpscan.com/vulnerability/e0be384c-3e63-49f6-b2ab-3024dcd88686 +CVE-2021-24606 - https://wpscan.com/vulnerability/fe49f48a-f97a-44fe-8d71-be08e7ce4f83 +CVE-2021-24607 - https://wpscan.com/vulnerability/efa7d91a-447b-4fd8-aa21-5364b177fee9 +CVE-2021-24608 - https://wpscan.com/vulnerability/75305ea8-730b-4caf-a3c6-cb94adee683c +CVE-2021-24609 - https://wpscan.com/vulnerability/8b639743-3eb5-4f74-a156-76cb657bbe05 +CVE-2021-2461 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24610 - http://packetstormsecurity.com/files/164306/WordPress-TranslatePress-2.0.8-Cross-Site-Scripting.html +CVE-2021-24610 - https://wpscan.com/vulnerability/b87fcc2f-c2eb-4e23-9757-d1c590f26d3f +CVE-2021-24611 - https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd +CVE-2021-24612 - https://wpscan.com/vulnerability/12f1ed97-d392-449d-b25c-42d241693888 +CVE-2021-24613 - https://wpscan.com/vulnerability/0b8c5947-bc73-448e-8f10-a4f4456e4000 +CVE-2021-24614 - https://wpscan.com/vulnerability/e8b5c609-dc67-4dce-b6bb-7d63c0c2a014 +CVE-2021-24615 - https://wpscan.com/vulnerability/9d48313b-76d7-4252-9b81-2fdd0373561b +CVE-2021-24616 - https://wpscan.com/vulnerability/04eaf380-c345-425f-8800-142e3f4745a9 +CVE-2021-24617 - https://wpscan.com/vulnerability/3e262cd7-ca64-4190-8d8c-38b07bbe63e0 +CVE-2021-24618 - https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49 +CVE-2021-24619 - https://wpscan.com/vulnerability/f360f383-0646-44ca-b49e-e2258dfbf3a6 +CVE-2021-2462 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24620 - https://wpscan.com/vulnerability/1f2b3c4a-f7e9-4d22-b71e-f6b051fd8349 +CVE-2021-24621 - https://wpscan.com/vulnerability/bfbb32ac-9ef9-46de-8e5e-7d6d6fb868d8 +CVE-2021-24622 - https://wpscan.com/vulnerability/41a2c72c-7db1-473a-8844-47f6ae9d0594 +CVE-2021-24623 - https://wpscan.com/vulnerability/41d9027c-a982-44c7-889e-721333496b5c +CVE-2021-24624 - https://wpscan.com/vulnerability/d79d2f6a-257a-4c9e-b971-9837abd4211c +CVE-2021-24625 - https://codevigilant.com/disclosure/2021/wp-plugin-catalog/ +CVE-2021-24625 - https://wpscan.com/vulnerability/33e4d7c6-fa6f-459f-84b9-732ec40088b8 +CVE-2021-24626 - https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/ +CVE-2021-24626 - https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165 +CVE-2021-24627 - https://codevigilant.com/disclosure/2021/wp-plugin-g-auto-hyperlink/ +CVE-2021-24627 - https://wpscan.com/vulnerability/c04ea768-150f-41b8-b08c-78d1ae006bbb +CVE-2021-24628 - https://codevigilant.com/disclosure/2021/wp-plugin-mwp-forms/ +CVE-2021-24628 - https://wpscan.com/vulnerability/d742ab35-4e2d-42a8-bebc-b953b2e10e3c +CVE-2021-24629 - https://codevigilant.com/disclosure/2021/wp-plugin-post-content-xmlrpc/ +CVE-2021-24629 - https://wpscan.com/vulnerability/fb42980c-93e5-42d5-a478-c2b348eaea67 +CVE-2021-2463 - https://www.oracle.com/security-alerts/cpujul2021.html +CVE-2021-24630 - https://codevigilant.com/disclosure/2021/wp-plugin-schreikasten/ +CVE-2021-24630 - https://wpscan.com/vulnerability/a0787dae-a4b7-4248-9960-aaffabfaeb9f +CVE-2021-24631 - https://codevigilant.com/disclosure/2021/wp-plugin-unlimited-popups/ +CVE-2021-24631 - https://wpscan.com/vulnerability/9841176d-1d37-4636-9144-0ca42b6f3605 +CVE-2021-24632 - https://wpscan.com/vulnerability/55cd6d5e-92c1-407a-8c0f-f89d415ebb66 +CVE-2021-24633 - https://wpscan.com/vulnerability/431901eb-0f95-4033-b943-324e6d3844a5 +CVE-2021-24634 - https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288 +CVE-2021-24635 - https://wpscan.com/vulnerability/854b23d9-e3f8-4835-8d29-140c580f11c9 +CVE-2021-24636 - https://wpscan.com/vulnerability/db8ace7b-7a44-4620-9fe8-ddf0ad520f5e +CVE-2021-24637 - https://wpscan.com/vulnerability/dd2b3f22-5e8b-41cf-bcb8-d2e673e1d21e +CVE-2021-24638 - https://wpscan.com/vulnerability/c783a746-f1fe-4d68-9d0a-477de5dbb35c +CVE-2021-24639 - https://wpscan.com/vulnerability/1ada2a96-32aa-4e37-809c-705db6026e0b +CVE-2021-2464 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-24640 - https://wpscan.com/vulnerability/e61dd498-5d0e-45ce-b660-a36c576f8d78 +CVE-2021-24641 - https://wpscan.com/vulnerability/972f8c5d-22b7-42de-a981-2e5acb72297b +CVE-2021-24642 - https://wpscan.com/vulnerability/8d9129ab-33c3-44ee-b150-f7552d88e658 +CVE-2021-24643 - https://wpscan.com/vulnerability/240ddde9-095f-4919-832a-50279196dac5 +CVE-2021-24644 - https://wpscan.com/vulnerability/5a363eeb-9510-4535-97e2-9dfd3b10d511 +CVE-2021-24645 - https://wpscan.com/vulnerability/b15744de-bf56-4e84-9427-b5652d123c15 +CVE-2021-24646 - https://wpscan.com/vulnerability/36aae14e-4bdf-4da6-a0f9-d71935105d45 +CVE-2021-24647 - https://wpscan.com/vulnerability/40d347b1-b86e-477d-b4c6-da105935ce37 +CVE-2021-24648 - https://wpscan.com/vulnerability/a3573212-2a98-4504-b8f4-b4d46655e17c +CVE-2021-24649 - https://wpscan.com/vulnerability/9486744e-ab24-44e4-b06e-9e0b4be132e2 +CVE-2021-24651 - https://wpscan.com/vulnerability/24f933b0-ad57-4ed3-817d-d637256e2fb1 +CVE-2021-24652 - https://wpscan.com/vulnerability/5375bd3e-a30d-4f24-9b17-470b28a8231c +CVE-2021-24653 - https://wpscan.com/vulnerability/bfa8f46f-d323-4a2d-b875-39cd9b4cee0a +CVE-2021-24654 - https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2 +CVE-2021-24655 - https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f +CVE-2021-24656 - https://wpscan.com/vulnerability/8e897dcc-6e52-440b-83ad-b119c55751c7 +CVE-2021-24657 - https://wpscan.com/vulnerability/c789ca04-d88c-4789-8be1-812888f0c8f8 +CVE-2021-24658 - https://wpscan.com/vulnerability/ec70f02b-02a1-4511-949e-68f2d9d37ca8 +CVE-2021-24659 - https://wpscan.com/vulnerability/5f2fe510-7513-4d33-82d9-3107b3b3f2ae +CVE-2021-24660 - https://wpscan.com/vulnerability/af14ac23-843d-4f80-beaf-237618109edd +CVE-2021-24661 - https://wpscan.com/vulnerability/8d966ff1-9c88-43c7-8f4b-93c88e214677 +CVE-2021-24662 - https://wpscan.com/vulnerability/8a74a2a0-3d8c-427f-9a83-0160d652c5f0 +CVE-2021-24663 - https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a +CVE-2021-24664 - http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html +CVE-2021-24664 - https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669 +CVE-2021-24665 - https://wpscan.com/vulnerability/42a8947f-2ae5-4f12-bd3d-ab3716501df5 +CVE-2021-24666 - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe +CVE-2021-24667 - https://wpscan.com/vulnerability/5925b263-6d6f-4a03-a98a-620150dff8f7 +CVE-2021-24668 - https://wpscan.com/vulnerability/519205ff-2ff6-41e4-9e95-475ab2ce35b9 +CVE-2021-24669 - https://wpscan.com/vulnerability/b97afbe8-c9ae-40a2-81e5-b1d7a6b31831 +CVE-2021-24670 - https://wpscan.com/vulnerability/a092548f-1ad5-44d3-9901-cdf4ebcee40a +CVE-2021-24671 - https://wpscan.com/vulnerability/4e51dffa-027d-4f3d-a190-dcc5269f6435 +CVE-2021-24672 - https://wpscan.com/vulnerability/762c506a-f57d-450f-99c0-32d750306ddc +CVE-2021-24673 - https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755 +CVE-2021-24674 - https://wpscan.com/vulnerability/26965878-c4c9-4f43-9e9a-6e58d6b46ef2 +CVE-2021-24675 - https://wpscan.com/vulnerability/9b9a55d5-c121-4b5b-80df-f9f419c0dc55 +CVE-2021-24676 - https://wpscan.com/vulnerability/59589e74-f901-4f4d-81de-26ad19d1b7fd +CVE-2021-24677 - https://wpscan.com/vulnerability/40c7e424-9a97-41ab-a312-2a06b607609a +CVE-2021-24678 - https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd +CVE-2021-24679 - https://wpscan.com/vulnerability/7c6c0aac-1733-4abc-8e95-05416636a127 +CVE-2021-24680 - https://wpscan.com/vulnerability/30f2a0d5-7959-436c-9860-2535020e82d3 +CVE-2021-24681 - https://wpscan.com/vulnerability/9ebdd1df-1d6f-4399-8b0f-77a79f841464 +CVE-2021-24682 - https://wpscan.com/vulnerability/7dfdd50d-77f9-4f0a-8673-8f033c0b0e05 +CVE-2021-24683 - https://wpscan.com/vulnerability/54f95b51-5804-4bee-9e4a-f73b8ef9bbd5 +CVE-2021-24684 - https://wpscan.com/vulnerability/b5295bf9-8cf6-416e-b215-074742a5fc63 +CVE-2021-24685 - https://wpscan.com/vulnerability/972ecde8-3d44-4dd9-81e3-643d8737434f +CVE-2021-24686 - https://wpscan.com/vulnerability/38018695-901d-48d9-b39a-7c00df7f0a4b +CVE-2021-24687 - https://wpscan.com/vulnerability/300ba418-63ed-4c03-9031-263742ed522e +CVE-2021-24688 - https://wpscan.com/vulnerability/78bc7cf1-7563-4ada-aec9-af4c943e3e2c +CVE-2021-24689 - https://wpscan.com/vulnerability/31824250-e0d4-4285-97fa-9880b363e075 +CVE-2021-24690 - https://wpscan.com/vulnerability/b2f473b4-268c-48b7-95e8-0a8eeaa3fc28 +CVE-2021-24691 - https://wpscan.com/vulnerability/ecf6a082-b563-42c4-9d8c-3757aa6b696f +CVE-2021-24692 - https://wpscan.com/vulnerability/4c9fe97e-3d9b-4079-88d9-34e2d0605215 +CVE-2021-24693 - https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7 +CVE-2021-24694 - https://wpscan.com/vulnerability/9d0d8f8c-f8fb-457f-b557-255a052ccc32 +CVE-2021-24695 - https://wpscan.com/vulnerability/d7bdaf2b-cdd9-4aee-b1bb-01728160ff25 +CVE-2021-24696 - https://wpscan.com/vulnerability/e94772af-39ac-4743-a556-52351ebda9fe +CVE-2021-24697 - https://wpscan.com/vulnerability/ef9ae513-6c29-45c2-b5ae-4a06a217c499 +CVE-2021-24698 - https://wpscan.com/vulnerability/1fda1356-77d8-4e77-9ee6-8f9ceeb3d380 +CVE-2021-24699 - https://wpscan.com/vulnerability/4f5c3f75-0501-4a1a-95ea-cbfd3fc96852 +CVE-2021-24700 - https://wpscan.com/vulnerability/1d489b05-296e-4268-8082-9737608f9b41 +CVE-2021-24701 - https://wpscan.com/vulnerability/f7b95789-43f2-42a5-95e6-eb7accbd5ed3 +CVE-2021-24702 - https://wpscan.com/vulnerability/30635cc9-4415-48bb-9c67-ea670ea1b942 +CVE-2021-24703 - https://wpscan.com/vulnerability/4ed8296e-1306-481f-9a22-723b051122c0 +CVE-2021-24704 - https://wpscan.com/vulnerability/60843022-fe43-4608-8859-9c9109b35b42 +CVE-2021-24705 - https://wpscan.com/vulnerability/eca883d8-9499-4dbd-8fe1-4447fc2ca28a +CVE-2021-24706 - https://wpscan.com/vulnerability/ecddb611-de75-41d5-a470-8fc2cf0780a4 +CVE-2021-24707 - https://wpscan.com/vulnerability/0be5e06e-4ff1-43d2-8ba7-2530519d517e +CVE-2021-24708 - https://wpscan.com/vulnerability/4560eef4-253b-49a4-8e20-9520c45c6f7f +CVE-2021-24709 - https://wpscan.com/vulnerability/df74ed76-af9e-47a8-9a4d-c5c57e9e0f91 +CVE-2021-2471 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-2471 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24710 - https://wpscan.com/vulnerability/84e83d52-f69a-4de2-80c8-7c1996b30a04 +CVE-2021-24711 - https://wpscan.com/vulnerability/3351bc30-e5ff-471f-8d1c-b1bcdf419937 +CVE-2021-24712 - https://wpscan.com/vulnerability/e677e51b-0d3f-44a5-9fcd-c159786b9926 +CVE-2021-24713 - https://wpscan.com/vulnerability/4a90be69-41eb-43e9-962d-34316497b4df +CVE-2021-24714 - https://wpscan.com/vulnerability/a8d314b9-26ac-4b56-a85c-a2528e55e73a +CVE-2021-24715 - https://wpscan.com/vulnerability/da66d54e-dda8-4aa8-8d27-b8b87100bb21 +CVE-2021-24716 - https://wpscan.com/vulnerability/576cc93d-1499-452b-97dd-80f69002e2a0 +CVE-2021-24717 - https://wpscan.com/vulnerability/5916ea42-eb33-463d-8528-2a142805c91f +CVE-2021-24718 - https://wpscan.com/vulnerability/60c9d78f-ae2c-49e0-aca3-6dce1bd8f697 +CVE-2021-24719 - http://packetstormsecurity.com/files/164548/WordPress-Enfold-Theme-4.8.3-Cross-Site-Scripting.html +CVE-2021-24719 - https://wpscan.com/vulnerability/a53e213f-6011-47f8-93e6-aa5ad30e857e +CVE-2021-24720 - https://wpscan.com/vulnerability/9de5cc51-f64c-4475-a0f4-d932dc4364a6 +CVE-2021-24721 - https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 +CVE-2021-24722 - https://wpscan.com/vulnerability/14b29450-2450-4b5f-8630-bb2cbfbd0a83 +CVE-2021-24723 - https://wpscan.com/vulnerability/0a46ae96-41e5-4b52-91c3-409f7387aecc +CVE-2021-24724 - https://wpscan.com/vulnerability/c1194a1e-bf33-4f3f-a4a6-27b76b1b1eeb +CVE-2021-24724 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29235 +CVE-2021-24725 - https://wpscan.com/vulnerability/01483284-57f5-4ae9-b5f1-ae26b623571f +CVE-2021-24725 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29225 +CVE-2021-24726 - https://wpscan.com/vulnerability/f85b6033-d7c1-45b7-b3b0-8967f7373bb8 +CVE-2021-24726 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29176 +CVE-2021-24727 - https://wpscan.com/vulnerability/ffa1f718-f2c5-48ef-8eea-33a18a628a2c +CVE-2021-24727 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29174 +CVE-2021-24728 - https://wpscan.com/vulnerability/2277d335-1c90-4fa8-b0bf-25873c039c38 +CVE-2021-24728 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29172 +CVE-2021-24729 - https://wpscan.com/vulnerability/5d70818e-730d-40c9-a2db-652052a5fd5c +CVE-2021-24730 - https://wpscan.com/vulnerability/d5534ff9-c4af-46b7-8852-0f3dfd644855 +CVE-2021-24731 - https://wpscan.com/vulnerability/6bed00e4-b363-43b8-a392-d068d342151a +CVE-2021-24732 - https://wpscan.com/vulnerability/9425a9b2-e9b8-41f5-a3ca-623b6da0297c +CVE-2021-24733 - https://wpscan.com/vulnerability/a7fa5896-5a1d-44c6-985c-e4abcc53da0e +CVE-2021-24734 - https://wpscan.com/vulnerability/fb007191-b008-4d19-b896-55fbee2a3cf7 +CVE-2021-24735 - https://wpscan.com/vulnerability/dcbcf6e7-e5b3-498b-9f5e-7896d309441f +CVE-2021-24736 - https://wpscan.com/vulnerability/d72275bd-0c66-4b2a-940d-d5256b5426cc +CVE-2021-24737 - https://wpscan.com/vulnerability/f51a350c-c46d-4d52-b787-762283625d0b +CVE-2021-24738 - https://wpscan.com/vulnerability/2c3d8c21-ecd4-41ba-8183-2ecbd9a3df25 +CVE-2021-24739 - https://wpscan.com/vulnerability/2afadc76-93ad-47e1-a224-e442ac41cbce +CVE-2021-2474 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24740 - https://wpscan.com/vulnerability/e6cf694d-c4ae-4b91-97c0-a6bdbafc7d60 +CVE-2021-24741 - https://medium.com/@lijohnjefferson/multiple-sql-injection-unauthenticated-in-support-board-v-3-3-3-3e9b4214a4f9 +CVE-2021-24741 - https://wpscan.com/vulnerability/ccf293ec-7607-412b-b662-5e237b8690ca +CVE-2021-24742 - https://wpscan.com/vulnerability/8dfc86e4-56a0-4e30-9050-cf3f328ff993 +CVE-2021-24743 - https://wpscan.com/vulnerability/998395f0-f176-45b9-baf7-b50d30538c7d +CVE-2021-24744 - https://wpscan.com/vulnerability/702a4283-1fd6-4186-9db7-6ad387d714ea +CVE-2021-24745 - https://wpscan.com/vulnerability/a965aeca-d8f9-4070-aa0d-9c9b95493dda +CVE-2021-24746 - https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa +CVE-2021-24747 - https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea +CVE-2021-24748 - https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1 +CVE-2021-24749 - https://wpscan.com/vulnerability/4b4e417d-0ae2-4c3c-81e6-4dcf39eb5697 +CVE-2021-2475 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24750 - http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html +CVE-2021-24750 - https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de +CVE-2021-24751 - https://wpscan.com/vulnerability/e0131980-d2d3-4780-8a68-a81ee8c90b7a +CVE-2021-24752 - https://wpscan.com/vulnerability/181a729e-fffe-457c-9e8d-a4343fd2e630 +CVE-2021-24753 - https://wpscan.com/vulnerability/be7b102f-3982-46bd-a79c-203498f7c820 +CVE-2021-24754 - https://wpscan.com/vulnerability/132118aa-4b72-4eaa-8aa1-6ad7b0c7f495 +CVE-2021-24755 - https://wpscan.com/vulnerability/01419d03-54d6-413d-9a67-64c63c26d741 +CVE-2021-24756 - https://wpscan.com/vulnerability/0cea0717-8f54-4f1c-b3ee-aff7dd91bf59 +CVE-2021-24757 - https://wpscan.com/vulnerability/352a9e05-2d5f-4bf7-8da9-85621fb15d91 +CVE-2021-24758 - https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 +CVE-2021-24759 - https://wpscan.com/vulnerability/38274ef2-5100-4669-9544-a42346b6727d +CVE-2021-2476 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24760 - https://wpscan.com/vulnerability/aebf821f-1724-4e4c-8d42-5a94e509d271 +CVE-2021-24761 - https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2 +CVE-2021-24762 - http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html +CVE-2021-24762 - https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad +CVE-2021-24763 - https://wpscan.com/vulnerability/c73c7694-1cee-4f26-a425-9c336adce52b +CVE-2021-24764 - https://wpscan.com/vulnerability/c2f8e9b9-c044-4c45-8d17-e628e9cb5d59 +CVE-2021-24765 - https://wpscan.com/vulnerability/4440e7ca-1a55-444d-8f6c-04153302d750 +CVE-2021-24766 - https://wpscan.com/vulnerability/cc13db1e-5f7f-49b2-81da-f913cfe70543 +CVE-2021-24767 - https://wpscan.com/vulnerability/0b35ad4a-3d94-49b1-a98d-07acf8dd4962 +CVE-2021-24768 - https://wpscan.com/vulnerability/3673e13f-7ce6-4d72-b179-ae4bab55514c +CVE-2021-24769 - https://wpscan.com/vulnerability/a2f211af-5373-425f-9964-ebbf5efde87b +CVE-2021-2477 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24770 - https://wpscan.com/vulnerability/4365c813-4bd7-4c7c-a15b-ef9a42d32b26 +CVE-2021-24771 - https://wpscan.com/vulnerability/a6d57fda-79a7-4bf8-b18e-8cf0a4efd1b3 +CVE-2021-24772 - https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d +CVE-2021-24773 - https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 +CVE-2021-24774 - https://wpscan.com/vulnerability/f80ef09a-d3e2-4d62-8532-f0ebe59ae110 +CVE-2021-24775 - https://wpscan.com/vulnerability/c6f24afe-d273-4f87-83ca-a791a385b06b +CVE-2021-24776 - https://wpscan.com/vulnerability/a59ebab8-5df7-4093-b853-da9472f53508 +CVE-2021-24777 - https://wpscan.com/vulnerability/2dfde2ef-1b33-4dc9-aa3e-02d319effb3a +CVE-2021-24778 - https://wpscan.com/vulnerability/e37f9aa6-e409-4155-b8e4-566c5bce58d6 +CVE-2021-24779 - https://wpscan.com/vulnerability/8d0e65ee-fdd1-4fd6-9a27-01664c703d90 +CVE-2021-2478 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24780 - https://wpscan.com/vulnerability/8764e550-4127-471e-84e6-494d6106a3b0 +CVE-2021-24781 - https://wpscan.com/vulnerability/3550ba54-7786-4ad9-aeb1-1c0750f189d0 +CVE-2021-24782 - https://wpscan.com/vulnerability/5cd846df-1d8b-488d-a691-b76850e8687a +CVE-2021-24783 - https://wpscan.com/vulnerability/de51b970-ab13-41a6-a479-a92cd0e70b71 +CVE-2021-24784 - https://wpscan.com/vulnerability/2e9132b5-f8cd-4acc-839c-188d79277270 +CVE-2021-24785 - https://wpscan.com/vulnerability/3957056c-df25-41f7-ab0d-1d09222f2fa5 +CVE-2021-24786 - https://wpscan.com/vulnerability/a6571f16-66d2-449e-af83-1c6ddd56edfa +CVE-2021-24787 - https://wpscan.com/vulnerability/c89bf498-f384-49de-820e-6cbd70390db2 +CVE-2021-24788 - https://wpscan.com/vulnerability/f8fdff8a-f158-46e8-94f1-f051a6c5608b +CVE-2021-24789 - https://wpscan.com/vulnerability/e8550ccd-3898-4e27-aca9-ade89823ff4d +CVE-2021-2479 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24790 - https://wpscan.com/vulnerability/adc5dd9b-0781-4cea-8cc5-2c10ac35b968 +CVE-2021-24791 - https://wpscan.com/vulnerability/d55caa9b-d50f-4c13-bc69-dc475641735f +CVE-2021-24792 - https://wpscan.com/vulnerability/29514d8e-9d1c-4fb6-b378-f6b7374989ca +CVE-2021-24793 - https://wpscan.com/vulnerability/eeedbb3b-ae10-4472-a1d3-f196f95b9d96 +CVE-2021-24794 - https://wpscan.com/vulnerability/651dc567-943e-4f57-8ec4-6eee466785f5 +CVE-2021-24795 - https://wpscan.com/vulnerability/ef3c1d4f-53a4-439e-9434-b3b4adb687a4 +CVE-2021-24796 - https://wpscan.com/vulnerability/d973dc0f-3cb4-408d-a8b0-01abeb9ef951 +CVE-2021-24797 - https://wpscan.com/vulnerability/0eb07cc8-8a19-4e01-ab90-844495413453 +CVE-2021-24798 - https://wpscan.com/vulnerability/58c9a007-42db-4142-b096-0b9ba8850f87 +CVE-2021-24799 - https://wpscan.com/vulnerability/6010ce4e-3e46-4cc1-96d8-560b30b605ed +CVE-2021-2480 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24800 - https://wpscan.com/vulnerability/cd37ca81-d683-4955-bc97-60204cb9c346 +CVE-2021-24801 - https://wpscan.com/vulnerability/78405609-2105-4011-b18e-1ba5f438972d +CVE-2021-24802 - https://wpscan.com/vulnerability/d92db61f-341c-4f3f-b962-326194ddbd1e +CVE-2021-24803 - https://wpscan.com/vulnerability/97adac02-4163-48d4-ba14-0b1badfd3d42 +CVE-2021-24804 - https://wpscan.com/vulnerability/6f015e8e-462b-4ef7-a9a1-bb91e7d28e37 +CVE-2021-24805 - https://wpscan.com/vulnerability/a6be3fcf-60f7-4f13-b773-871a7296113c +CVE-2021-24806 - https://wpscan.com/vulnerability/2746101e-e993-42b9-bd6f-dfd5544fa3fe +CVE-2021-24807 - https://medium.com/@lijohnjefferson/cve-2021-24807-6bc22af2a444 +CVE-2021-24807 - https://wpscan.com/vulnerability/19d101aa-4b60-4db4-a33b-86c826b288b0 +CVE-2021-24808 - https://wpscan.com/vulnerability/53ff82ec-00ec-4b20-8f60-db9db8c025b4 +CVE-2021-24809 - https://wpscan.com/vulnerability/e186fef4-dca0-461f-b539-082c13a68d13 +CVE-2021-2481 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24810 - https://wpscan.com/vulnerability/94670822-0251-4e77-8d7f-b47aa7232e52 +CVE-2021-24811 - https://wpscan.com/vulnerability/000e65f1-89cd-4dd5-a09d-5febd9fdfbdb +CVE-2021-24812 - https://wpscan.com/vulnerability/6bc8fff1-ff10-4175-8a46-563f0f26f96a +CVE-2021-24813 - https://wpscan.com/vulnerability/a1fe0783-7a88-4d75-967f-cef970b73752 +CVE-2021-24814 - https://wpscan.com/vulnerability/94ab34f6-86a9-4e14-bf86-26ff6cb4383e +CVE-2021-24815 - https://wpscan.com/vulnerability/08f4ebf5-6bbe-4fb0-a9d2-c8a994afe39b +CVE-2021-24816 - https://wpscan.com/vulnerability/5f63d677-20f3-4fe0-bb90-048b6898e6cd +CVE-2021-24817 - https://wpscan.com/vulnerability/ccb27d2e-2d2a-40d3-ba7e-bcd5e5012a9a +CVE-2021-24818 - https://wpscan.com/vulnerability/7cd524ed-5eb9-4d6b-b4d2-3d4be6b57879 +CVE-2021-24819 - https://wpscan.com/vulnerability/c97b218c-b430-4301-884f-f64d0dd08f07 +CVE-2021-2482 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24820 - https://wpscan.com/vulnerability/47652b24-a6f0-4bbc-834e-496b88523fe7 +CVE-2021-24821 - https://wpscan.com/vulnerability/f0915b66-0b99-4aeb-9fba-759cafaeb0cb +CVE-2021-24822 - https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e +CVE-2021-24823 - https://wpscan.com/vulnerability/1bdebd9e-a7f2-4f55-b5b0-185eb619ebaf +CVE-2021-24824 - https://wpscan.com/vulnerability/7b4d4675-6089-4435-9b56-31496adc4767 +CVE-2021-24825 - https://wpscan.com/vulnerability/be9d6f82-c972-459a-bacf-65b3dfb11a09 +CVE-2021-24826 - https://wpscan.com/vulnerability/e247d78a-7243-486c-a017-7471a8dcb800 +CVE-2021-24827 - https://wpscan.com/vulnerability/36cc5151-1d5e-4874-bcec-3b6326235db1 +CVE-2021-24828 - https://wpscan.com/vulnerability/6f9d1ee5-7ed7-4304-96a2-611b2f0081d2 +CVE-2021-24829 - https://wpscan.com/vulnerability/cc6585c8-5798-48a1-89f7-a3337f56df3f +CVE-2021-2483 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24830 - https://wpscan.com/vulnerability/1c46373b-d43d-4d18-b0ae-3711fb0be0f9 +CVE-2021-24831 - https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900 +CVE-2021-24832 - https://wpscan.com/vulnerability/cf031259-b76e-475c-8a8e-fa6a0d9e7bb4 +CVE-2021-24833 - https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34 +CVE-2021-24835 - https://wpscan.com/vulnerability/c493ac9c-67d1-48a9-be21-824b1a1d56c2 +CVE-2021-24836 - https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f +CVE-2021-24837 - https://wpscan.com/vulnerability/5fea3ac3-d599-41f3-8f76-08f0d3552af1 +CVE-2021-24838 - https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82 +CVE-2021-24839 - https://wpscan.com/vulnerability/5e6e63c2-2675-4b8d-9b94-c16c525a1a0e +CVE-2021-2484 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24840 - https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef +CVE-2021-24841 - https://mikadmin.fr/tech/XSS-Stored-Helpful-5b10bc7f40ab319f9797eb4abad4f420660.pdf +CVE-2021-24841 - https://wpscan.com/vulnerability/55d11acf-8c47-40da-be47-24f74fd7566e +CVE-2021-24842 - https://wpscan.com/vulnerability/054bd981-dbdd-47dd-bad0-fa327e5860a2 +CVE-2021-24843 - https://wpscan.com/vulnerability/b71f53d7-6b9e-458c-8754-576ad2a52f7d +CVE-2021-24844 - https://wpscan.com/vulnerability/ebd6d13c-572e-4861-b7d1-a7a87332ce0d +CVE-2021-24845 - https://wpscan.com/vulnerability/ab857454-7c7c-454d-9c7f-1db767961e5f +CVE-2021-24846 - https://wpscan.com/vulnerability/a1e7cd2b-8400-4c5d-8b47-a8ccd1e21675 +CVE-2021-24847 - https://wpscan.com/vulnerability/679ca6ed-2343-43f3-9c3e-2c12e12407c1 +CVE-2021-24848 - https://wpscan.com/vulnerability/156d4faf-7d34-4d9f-a654-9064d4eb3aea +CVE-2021-24849 - https://wpscan.com/vulnerability/763c08a0-4b2b-4487-b91c-be6cc2b9322e +CVE-2021-2485 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-24850 - https://wpscan.com/vulnerability/2d6f9be0-b9fd-48e5-bd68-94eeb3822c0a +CVE-2021-24851 - https://wpscan.com/vulnerability/919e67a1-3a50-4940-bb4f-5c5cc2017a83 +CVE-2021-24852 - https://wpscan.com/vulnerability/1069fb40-44f0-468e-9fd4-7a0fb8cde5a5 +CVE-2021-24853 - https://wpscan.com/vulnerability/240bed24-0315-4bbf-ba17-e4947e5ecacb +CVE-2021-24854 - https://wpscan.com/vulnerability/0d422397-69ff-4d05-aafa-7a572e460e5f +CVE-2021-24855 - https://wpscan.com/vulnerability/49328498-d3a0-4d27-8a52-24054b5e42f3 +CVE-2021-24856 - https://wpscan.com/vulnerability/8fd483fb-d399-4b4f-b4ef-bbfad1b5cf1b +CVE-2021-24857 - https://wpscan.com/vulnerability/518204d8-fbf5-4bfa-9db5-835f908f8d8e +CVE-2021-24858 - https://wpscan.com/vulnerability/9bd1c040-09cc-4c2d-88c9-8406a653a48b +CVE-2021-24859 - https://wpscan.com/vulnerability/958f44a5-07e7-4349-9212-2a039a082ba0 +CVE-2021-24860 - https://wpscan.com/vulnerability/d5891973-37d0-48cb-a5a3-a26c771b3369 +CVE-2021-24861 - https://wpscan.com/vulnerability/9a50d5d0-7a50-47d1-a8f9-e0eb217919d9 +CVE-2021-24862 - http://packetstormsecurity.com/files/165746/WordPress-RegistrationMagic-V-5.0.1.5-SQL-Injection.html +CVE-2021-24862 - https://wpscan.com/vulnerability/7d3af3b5-5548-419d-aa32-1f7b51622615 +CVE-2021-24863 - https://wpscan.com/vulnerability/1e4dd002-6c96-44f9-bd55-61359265f7ae +CVE-2021-24864 - https://wpscan.com/vulnerability/e3b9ee9f-602d-4e9d-810c-e1e3ba604464 +CVE-2021-24865 - https://wpscan.com/vulnerability/055a2dcf-77ec-4e54-be7d-9c47f7730d1b +CVE-2021-24866 - https://wpscan.com/vulnerability/a9073616-ffd6-4956-b2e7-0fb2eac6e9b5 +CVE-2021-24868 - https://wpscan.com/vulnerability/45a43927-a427-46bc-9c61-e0b8532c8138 +CVE-2021-24869 - https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/ +CVE-2021-24870 - https://jetpack.com/2021/10/14/multiple-vulnerabilities-in-wp-fastest-cache-plugin/ +CVE-2021-24871 - https://wpscan.com/vulnerability/28007c80-dc14-4987-a52c-f2a05cfe5905 +CVE-2021-24872 - https://wpscan.com/vulnerability/ec23734a-5ea7-4e46-aba9-3dee4e6dffb6 +CVE-2021-24873 - https://wpscan.com/vulnerability/19980b57-1954-4a29-b2c2-43eadf758ed3 +CVE-2021-24874 - https://wpscan.com/vulnerability/28d34cc1-2294-4409-a60f-c8c441eb3f2d +CVE-2021-24875 - https://wpscan.com/vulnerability/652efc4a-f931-4668-ae74-a58b288a5715 +CVE-2021-24876 - https://wpscan.com/vulnerability/e77c2493-993d-418d-9629-a1f07b5a2b6f +CVE-2021-24877 - https://wpscan.com/vulnerability/b09fe120-ab9b-44f2-b50d-3b4b299d6d15 +CVE-2021-24878 - https://wpscan.com/vulnerability/d2f1fd60-5e5e-4e38-9559-ba2d14ae37bf +CVE-2021-24879 - https://wpscan.com/vulnerability/6dfb4f61-c8cb-40ad-812f-139482be0fb4 +CVE-2021-24880 - https://wpscan.com/vulnerability/09226067-0289-4d4f-9450-6f2c2ba058a0 +CVE-2021-24881 - https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 +CVE-2021-24882 - https://wpscan.com/vulnerability/6d71816c-8267-4b84-9087-191fbb976e72 +CVE-2021-24884 - https://wpscan.com/vulnerability/b57dacdd-43c2-48f8-ac1e-eb8306b22533 +CVE-2021-24885 - https://wpscan.com/vulnerability/d0b312f8-8b16-45be-b5e5-bf9d4b3e9b1e +CVE-2021-24888 - https://wpscan.com/vulnerability/19bffa71-705c-42fc-b2ca-bf62fabb70a0 +CVE-2021-24889 - https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495 +CVE-2021-24890 - https://wpscan.com/vulnerability/f3b450d2-84ce-4c13-ad6a-b60785dee7e7 +CVE-2021-24891 - https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d +CVE-2021-24892 - https://wpscan.com/vulnerability/364b0843-a990-4204-848a-60c928cc5bc0 +CVE-2021-24893 - https://wpscan.com/vulnerability/05d3af69-20b4-499a-8322-2b53674d6a58 +CVE-2021-24894 - https://wpscan.com/vulnerability/79bb5acb-ea56-41a9-83a1-28a181ae41e2 +CVE-2021-24895 - https://wpscan.com/vulnerability/be7bbf4f-6f6a-4a44-bf86-2f096351ae08 +CVE-2021-24896 - https://wpscan.com/vulnerability/2c469e8b-c761-460b-b31d-9219a43006ff +CVE-2021-24897 - https://wpscan.com/vulnerability/a0dd1da8-f8d2-453d-a2f2-711a49fb6466 +CVE-2021-24898 - https://wpscan.com/vulnerability/10fdc464-0ddc-4919-8f21-969fff854011 +CVE-2021-24899 - https://wpscan.com/vulnerability/cf4b266c-d68e-4add-892a-d01a31987a4b +CVE-2021-24900 - https://packetstormsecurity.com/files/164632/ +CVE-2021-24900 - https://wpscan.com/vulnerability/213d7c08-a37c-49d0-a072-24db711da5ec +CVE-2021-24901 - https://wpscan.com/vulnerability/9c315404-b66a-448c-a3b7-367a37b53435 +CVE-2021-24902 - https://wpscan.com/vulnerability/2bde2030-2dfe-4dd3-afc1-36f7031a91ea +CVE-2021-24903 - https://wpscan.com/vulnerability/ad67e45e-254a-46ce-a243-bfc86839446e +CVE-2021-24904 - https://wpscan.com/vulnerability/7b80f89b-e724-41c5-aa03-21d1eef50f21 +CVE-2021-24905 - https://wpscan.com/vulnerability/cf022415-6614-4b95-913b-802186766ae6 +CVE-2021-24906 - https://wpscan.com/vulnerability/4204682b-f657-42e1-941c-bee7a245e9fd +CVE-2021-24907 - https://wpscan.com/vulnerability/56dae1ae-d5d2-45d3-8991-db69cc47ddb7 +CVE-2021-24908 - https://wpscan.com/vulnerability/77f50129-4b1f-4e50-8321-9dd32deba6e1 +CVE-2021-24909 - https://wpscan.com/vulnerability/5855f1fe-28f6-4cd6-a83c-95c23d809b79 +CVE-2021-24910 - https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17 +CVE-2021-24911 - https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 +CVE-2021-24912 - https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d +CVE-2021-24913 - https://wpscan.com/vulnerability/2f499945-1924-49f0-ad6e-9192273a5c05 +CVE-2021-24914 - https://wpscan.com/vulnerability/39392055-8cd3-452f-8bcb-a650f5bddc2e +CVE-2021-24915 - https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 +CVE-2021-24915 - https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac +CVE-2021-24916 - https://wpscan.com/vulnerability/93b893be-59ad-4500-8edb-9fa7a45304d5 +CVE-2021-24917 - https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375 +CVE-2021-24919 - https://wpscan.com/vulnerability/f472ec7d-765c-4266-ab9c-e2d06703ebb4 +CVE-2021-24920 - https://wpscan.com/vulnerability/b00b5037-8ce4-4f61-b2ce-33315b39454e +CVE-2021-24921 - https://wpscan.com/vulnerability/43ab0997-4d15-4ff7-af41-7b528b0ba3c7 +CVE-2021-24922 - https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2 +CVE-2021-24923 - https://wpscan.com/vulnerability/3afef591-9e00-4af8-a8a6-e04ec5e61795 +CVE-2021-24924 - https://wpscan.com/vulnerability/4621e86e-aba4-429c-8e08-32cf9b4c65e6 +CVE-2021-24925 - https://wpscan.com/vulnerability/82233588-6033-462d-b886-a8ef5ee9adb0 +CVE-2021-24926 - https://wpscan.com/vulnerability/8cc7cbbd-f74f-4f30-9483-573641fea733 +CVE-2021-24927 - https://wpscan.com/vulnerability/86f3acc7-8902-4215-bd75-6105d601524e +CVE-2021-24928 - https://wpscan.com/vulnerability/3762a77c-b8c9-428f-877c-bbfd7958e7be +CVE-2021-24930 - https://wpscan.com/vulnerability/479704d8-057b-4642-b84a-4a78567ba20b +CVE-2021-24931 - http://packetstormsecurity.com/files/165946/WordPress-Secure-Copy-Content-Protection-And-Content-Locking-2.8.1-SQL-Injection.html +CVE-2021-24931 - https://wpscan.com/vulnerability/1cd52d61-af75-43ed-9b99-b46c471c4231 +CVE-2021-24932 - https://wpscan.com/vulnerability/575c02ea-4fe9-428c-bbc8-e161af679b6d +CVE-2021-24933 - https://wpscan.com/vulnerability/b8e6f0d3-a7d1-4ca8-aba8-0d5075167d55 +CVE-2021-24934 - https://wpscan.com/vulnerability/0aa5a8d5-e736-4cd3-abfd-8e0a356bb6ef +CVE-2021-24935 - https://wpscan.com/vulnerability/53702281-1bd5-4828-b7a4-9f81cf0b6bb6 +CVE-2021-24936 - https://wpscan.com/vulnerability/4fb61b84-ff5f-4b4c-a516-54b749f9611e +CVE-2021-24937 - https://wpscan.com/vulnerability/dde3c119-dad9-4205-a931-d49bbf3b6b87 +CVE-2021-24938 - https://wpscan.com/vulnerability/df8a6f2c-e075-45d5-9262-b4eb63c9351e +CVE-2021-24939 - https://wpscan.com/vulnerability/1a46cfec-24ad-4619-8579-f09bbd8ee748 +CVE-2021-24940 - https://wpscan.com/vulnerability/1980c5ca-447d-4875-b542-9212cc7ff77f +CVE-2021-24941 - https://wpscan.com/vulnerability/beca7afd-8f03-4909-bea0-77b63513564b +CVE-2021-24942 - https://wpscan.com/vulnerability/eaa28832-74c1-4cd5-9b0f-02338e23b418 +CVE-2021-24943 - https://wpscan.com/vulnerability/ba50c590-42ee-4523-8aa0-87ac644b77ed +CVE-2021-24944 - https://wpscan.com/vulnerability/d1bfdce3-89bd-441f-8ebb-02cf0ff8b6cc +CVE-2021-24945 - https://wpscan.com/vulnerability/d7618061-a7fa-4da4-9384-be19bc5e8548 +CVE-2021-24946 - http://packetstormsecurity.com/files/165742/WordPress-Modern-Events-Calendar-6.1-SQL-Injection.html +CVE-2021-24946 - https://wpscan.com/vulnerability/09871847-1d6a-4dfe-8a8c-f2f53ff87445 +CVE-2021-24947 - https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18 +CVE-2021-24948 - https://wpscan.com/vulnerability/2b67005a-476e-4772-b15c-3191911a50b0 +CVE-2021-24949 - https://wpscan.com/vulnerability/9d7f8ba8-a5d5-4ec3-a48f-5cd4b115e8d5 +CVE-2021-24950 - https://wpscan.com/vulnerability/01d430ea-ef85-4529-9ae4-c1f70016bb75 +CVE-2021-24951 - https://wpscan.com/vulnerability/0a16ddc5-5ab9-4a8f-86b5-41edcbeafc50 +CVE-2021-24952 - https://wpscan.com/vulnerability/cbb8fa9f-1c84-4410-ae86-64cb1771ce78 +CVE-2021-24953 - https://wpscan.com/vulnerability/0529261d-65e1-4c64-b8ed-ecb7356d9067 +CVE-2021-24954 - https://wpscan.com/vulnerability/54ff0db8-1d9e-4e67-b71a-142a9e5ed851 +CVE-2021-24955 - https://wpscan.com/vulnerability/e8005d4d-41c3-451d-b85a-2626decaa080 +CVE-2021-24956 - https://wpscan.com/vulnerability/5882ea89-f463-4f0b-a624-150bbaf967c2 +CVE-2021-24957 - https://wpscan.com/vulnerability/a282606f-6abf-4f75-99c9-dab0bea8cc96 +CVE-2021-24958 - https://wpscan.com/vulnerability/011c2519-fd84-4c95-b8b8-23654af59d70 +CVE-2021-24959 - https://wpscan.com/vulnerability/0471d2e2-e759-468f-becd-0b062f00b435 +CVE-2021-24960 - https://plugins.trac.wordpress.org/changeset/2677722 +CVE-2021-24960 - https://wpscan.com/vulnerability/18902832-2973-498d-808e-c75d1aedc11e +CVE-2021-24961 - https://plugins.trac.wordpress.org/changeset/2677722 +CVE-2021-24961 - https://wpscan.com/vulnerability/c911bbbd-0196-4e3d-ada3-4efb8a339954 +CVE-2021-24962 - https://plugins.trac.wordpress.org/changeset/2677722 +CVE-2021-24962 - https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 +CVE-2021-24963 - https://wpscan.com/vulnerability/7f8b4275-7586-4e04-afd9-d12bdab6ba9b +CVE-2021-24964 - https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc +CVE-2021-24965 - https://wpscan.com/vulnerability/306ecf09-fdf0-449c-930c-9dfa58f0efc2 +CVE-2021-24966 - https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0 +CVE-2021-24967 - https://wpscan.com/vulnerability/4e165122-4746-42de-952e-a3bf51393a74 +CVE-2021-24968 - https://wpscan.com/vulnerability/f0a9e6cc-46cc-4ac2-927a-c006b8e8aa68 +CVE-2021-24969 - https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114ee +CVE-2021-24970 - https://wpscan.com/vulnerability/9b15d47e-43b6-49a8-b2c3-b99c92101e10 +CVE-2021-24971 - https://wpscan.com/vulnerability/661cb7e3-d7bd-4bc1-bf78-bdb4ba9610d7 +CVE-2021-24972 - https://wpscan.com/vulnerability/b960cb36-62de-4b9f-a35d-144a34a4c63d +CVE-2021-24973 - https://wpscan.com/vulnerability/0118f245-0e6f-44c1-9bdb-5b3a5d2403d6 +CVE-2021-24974 - https://wpscan.com/vulnerability/8ed549fe-7d27-4a7a-b226-c20252964b29 +CVE-2021-24975 - https://wpscan.com/vulnerability/b99dae3d-8230-4427-adc5-4ef9cbfb8ba1 +CVE-2021-24976 - https://wpscan.com/vulnerability/7d5f58a8-bee4-46be-9c08-d272678338f0 +CVE-2021-24977 - https://wpscan.com/vulnerability/739831e3-cdfb-4a22-9abf-6c594d7e3d75 +CVE-2021-24978 - https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86 +CVE-2021-24979 - https://wpscan.com/vulnerability/fc011990-4ec1-4553-901d-4ff1f482cb79 +CVE-2021-24980 - https://wpscan.com/vulnerability/e50bcb39-9a01-433f-81b3-fd4018672b85 +CVE-2021-24981 - https://wpscan.com/vulnerability/4c45df6d-b3f6-49e5-8b1f-edd32a12d71c +CVE-2021-24982 - https://wpscan.com/vulnerability/8e53f15e-8b6a-4d47-a40d-4ebbe6934286 +CVE-2021-24983 - https://wpscan.com/vulnerability/31fdabb0-bc74-4d25-b0cd-c872aae6cb2f +CVE-2021-24984 - https://wpscan.com/vulnerability/96bb2fba-4b18-4c29-8344-3ba4d2f06a19 +CVE-2021-24985 - https://wpscan.com/vulnerability/50be0ebf-fe6d-41e5-8af9-0d74f33aeb57 +CVE-2021-24986 - https://wpscan.com/vulnerability/51e57f25-b8b2-44ca-9162-d7328eac64eb +CVE-2021-24987 - https://wpscan.com/vulnerability/a14b668f-812f-46ee-827e-0996b378f7f0 +CVE-2021-24988 - https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845 +CVE-2021-24989 - https://wpscan.com/vulnerability/82c2ead1-1d3c-442a-ae68-359a4748447f +CVE-2021-24991 - https://wpscan.com/vulnerability/88e706df-ae03-4665-94a3-db226e1f31a9 +CVE-2021-24992 - https://wpscan.com/vulnerability/db0b9480-2ff4-423c-a745-68e983ffa12b +CVE-2021-24993 - https://wpscan.com/vulnerability/514416fa-d915-4953-bf1b-6dbf40b4d7e5 +CVE-2021-24994 - https://wpscan.com/vulnerability/ea74257a-f6b0-49e9-a81f-53c0eb81b1da +CVE-2021-24995 - https://wpscan.com/vulnerability/3caf0de0-57f2-4c87-8713-d00a7db9eeef +CVE-2021-24996 - https://wpscan.com/vulnerability/6ee14423-f7ff-4433-987a-a1a6b7bd65e3 +CVE-2021-24997 - https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900 +CVE-2021-24999 - https://wpscan.com/vulnerability/8527f4fe-312f-45c1-ae4c-7e799702fc26 +CVE-2021-25000 - https://wpscan.com/vulnerability/bc167b3a-24ee-4988-9934-189b6216ce40 +CVE-2021-25001 - https://wpscan.com/vulnerability/76f0257d-aae7-4054-9b3d-ba10b4005cf1 +CVE-2021-25002 - https://wpscan.com/vulnerability/b14f476e-3124-4cbf-91b4-ae53c4dabd7c +CVE-2021-25003 - https://wpscan.com/vulnerability/5c21ad35-b2fb-4a51-858f-8ffff685de4a +CVE-2021-25004 - https://wpscan.com/vulnerability/cfbc2b43-b8f8-4bcb-a3d3-39d217afa530 +CVE-2021-25005 - https://wpscan.com/vulnerability/af7d62ca-09b3-41c8-b771-be936ce8f6b2 +CVE-2021-25006 - https://wpscan.com/vulnerability/dbe2c6ca-d2f1-40a2-83d5-4623c22d4d61 +CVE-2021-25007 - https://wpscan.com/vulnerability/cf907d53-cc4a-4b02-bed3-64754128112c +CVE-2021-25008 - https://wpscan.com/vulnerability/cb232354-f74d-48bb-b437-7bdddd1df42a +CVE-2021-25009 - https://wpscan.com/vulnerability/ce2e3503-9a06-4f5c-ae0f-f40e7dfb2903 +CVE-2021-25010 - https://wpscan.com/vulnerability/d1ebd15a-72ab-4ba2-a212-7e2eea0b0fb0 +CVE-2021-25011 - https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833 +CVE-2021-25012 - https://wpscan.com/vulnerability/b126d2fc-6cc7-4c18-b95e-d32c2effcc4f +CVE-2021-25013 - https://wpscan.com/vulnerability/e88b7a70-ee71-439f-b3c6-0300adb980b0 +CVE-2021-25014 - https://wpscan.com/vulnerability/63c58d7f-8e0b-4aa5-b3c8-8726b4f19bf1 +CVE-2021-25015 - https://wpscan.com/vulnerability/7608829d-2820-49e2-a10e-e93eb3005f68 +CVE-2021-25016 - https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0 +CVE-2021-25017 - https://wpscan.com/vulnerability/2d0c4872-a341-4974-926c-10b094a5d13c +CVE-2021-25018 - https://wpscan.com/vulnerability/9e092aad-0b36-45a9-8987-8d904b34fbb2 +CVE-2021-25019 - https://wpscan.com/vulnerability/cea0ce4b-886a-47cc-8653-a297e9759d09 +CVE-2021-25020 - https://wpscan.com/vulnerability/67398332-b93e-46ae-8904-68419949a124 +CVE-2021-25021 - https://wpscan.com/vulnerability/92db763c-ca6b-43cf-87ff-c1678cf4ade5 +CVE-2021-25022 - https://wpscan.com/vulnerability/1801c7ae-2b5c-493f-969d-4bb19a9feb15 +CVE-2021-25023 - https://wpscan.com/vulnerability/4a27d374-f690-4a8a-987a-9e0f56bbe143 +CVE-2021-25024 - https://wpscan.com/vulnerability/08864b76-d898-4dfe-970d-d7cc1b1115a7 +CVE-2021-25025 - https://wpscan.com/vulnerability/24fb4eb4-9fe1-4433-8844-8904eaf13c0e +CVE-2021-25026 - https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe +CVE-2021-25027 - https://wpscan.com/vulnerability/48612c44-151d-4438-b91c-c27e96174270 +CVE-2021-25028 - https://wpscan.com/vulnerability/80b0682e-2c3b-441b-9628-6462368e5fc7 +CVE-2021-25029 - https://wpscan.com/vulnerability/723d0d07-c48b-4fe3-9fb2-7dae3c7d3cfb +CVE-2021-25030 - https://wpscan.com/vulnerability/bc7058b1-ca93-4c45-9ced-7848c7ae4150 +CVE-2021-25031 - https://wpscan.com/vulnerability/1fbcf5ec-498e-4d40-8577-84b8c7ac3201 +CVE-2021-25032 - https://wpscan.com/vulnerability/2f0f1a32-0c7a-48e6-8617-e0b2dcf62727 +CVE-2021-25033 - https://wpscan.com/vulnerability/c2d2384c-41b9-4aaf-b918-c1cfda58af5c +CVE-2021-25034 - https://wpscan.com/vulnerability/c4e50dd2-450f-413d-b15f-ece413e42157 +CVE-2021-25035 - https://wpscan.com/vulnerability/f426360e-5ba0-4d6b-bfd4-61bc54be3469 +CVE-2021-25038 - https://wpscan.com/vulnerability/72ccdcb9-3d24-41d7-b9fa-c8bd73d30aa6 +CVE-2021-25039 - https://wpscan.com/vulnerability/c92eb2bf-0a5d-40b9-b0be-1820e7b9bebb +CVE-2021-25040 - https://wpscan.com/vulnerability/3ed821a6-c3e2-4964-86f8-d14c4a54708a +CVE-2021-25041 - https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f +CVE-2021-25042 - https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4 +CVE-2021-25043 - https://wpscan.com/vulnerability/8601bd21-becf-4809-8c11-d053d1121eae +CVE-2021-25044 - https://wpscan.com/vulnerability/dc1507c1-8894-4ab6-b25f-c5e26a425b03 +CVE-2021-25045 - https://wpscan.com/vulnerability/c60a3d40-449c-4c84-8d13-68c04267c1d7 +CVE-2021-25046 - https://wpscan.com/vulnerability/19c2f456-a41e-4755-912d-13683719bae6 +CVE-2021-25047 - https://wpscan.com/vulnerability/d33241cc-17b6-491a-b836-dd9368652316 +CVE-2021-25048 - https://wpscan.com/vulnerability/5687e5db-d987-416d-a7f4-036cce4d56cb +CVE-2021-25049 - https://wpscan.com/vulnerability/227cbf50-59da-4f4c-85da-1959a108ae7e +CVE-2021-25050 - https://wpscan.com/vulnerability/25a28adb-794f-4bdb-89e8-060296b45b38 +CVE-2021-25051 - https://wpscan.com/vulnerability/566ff8dc-f820-412b-b2d3-fa789bce528e +CVE-2021-25052 - https://wpscan.com/vulnerability/a01844a0-0c43-4d96-b738-57fe5bfbd67a +CVE-2021-25053 - https://wpscan.com/vulnerability/a5448599-64de-43b0-b04d-c6492366eab1 +CVE-2021-25054 - https://wpscan.com/vulnerability/200969eb-e2a4-4200-82d7-0c313de089af +CVE-2021-25055 - https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 +CVE-2021-25056 - https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de +CVE-2021-25057 - https://wpscan.com/vulnerability/c0dd3ef1-579d-43a4-801a-660c41495d58 +CVE-2021-25058 - https://wpscan.com/vulnerability/fd5271ef-1da5-4d09-888e-f1fd71820cde +CVE-2021-25059 - https://wpscan.com/vulnerability/b125a765-a6b6-421b-bd8a-effec12bc629 +CVE-2021-25060 - https://wpscan.com/vulnerability/9e1ac711-1f65-49fa-b007-66170a77b265 +CVE-2021-25061 - https://wpscan.com/vulnerability/bd9dc754-08a4-4bfc-8dda-3f5c0e070f7e +CVE-2021-25062 - https://wpscan.com/vulnerability/dc9a5d36-7453-46a8-a17f-712449d7987d +CVE-2021-25063 - https://wpscan.com/vulnerability/e2185887-3e53-4089-aa3f-981c944ee0bb +CVE-2021-25064 - https://wpscan.com/vulnerability/30c70315-3c17-41f0-a12f-7e3f793e259c +CVE-2021-25065 - https://wpscan.com/vulnerability/ae1aab4e-b00a-458b-a176-85761655bdcc +CVE-2021-25066 - https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d +CVE-2021-25067 - https://wpscan.com/vulnerability/365007f0-61ac-4e81-8a3a-3a068f2c84bc +CVE-2021-25068 - https://wpscan.com/vulnerability/32799efd-99dc-46dd-8648-e9eb872a0371 +CVE-2021-25069 - https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8 +CVE-2021-25070 - https://wpscan.com/vulnerability/e00b2946-15e5-4458-9b13-2e272630a36f +CVE-2021-25071 - https://wpscan.com/vulnerability/53085936-fa07-4f00-a7dc-bbe98c51320e +CVE-2021-25072 - https://wpscan.com/vulnerability/53d2c61d-ce73-40e0-a113-9d76d8fecc91 +CVE-2021-25073 - https://wpscan.com/vulnerability/922a2037-9b5e-4c94-83d9-99efc494e9e2 +CVE-2021-25074 - https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164 +CVE-2021-25075 - https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b +CVE-2021-25076 - http://packetstormsecurity.com/files/166071/WordPress-WP-User-Frontend-3.5.25-SQL-Injection.html +CVE-2021-25076 - https://wpscan.com/vulnerability/6d3eeba6-5560-4380-a6e9-f008a9112ac6 +CVE-2021-25077 - https://wpscan.com/vulnerability/53868650-aba0-4d07-89d2-a998bb0ee5f6 +CVE-2021-25078 - https://wpscan.com/vulnerability/d4edb5f2-aa1b-4e2d-abb4-76c46def6c6e +CVE-2021-25079 - https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63 +CVE-2021-25080 - https://wpscan.com/vulnerability/acd3d98a-aab8-49be-b77e-e8c6ede171ac +CVE-2021-25081 - https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e +CVE-2021-25082 - https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132 +CVE-2021-25083 - https://wpscan.com/vulnerability/9b69544d-6a08-4757-901b-6ccf1cd00ecc +CVE-2021-25084 - https://wpscan.com/vulnerability/7c5c602f-499f-431b-80bc-507053984a06 +CVE-2021-25085 - https://wpscan.com/vulnerability/b7dd81c6-6af1-4976-b928-421ca69bfa90 +CVE-2021-25086 - https://wpscan.com/vulnerability/2cf9e517-d882-4af2-bd12-e700b75e7a11 +CVE-2021-25087 - https://wpscan.com/vulnerability/d7ceafae-65ec-4e05-9ed1-59470771bf07 +CVE-2021-25088 - https://wpscan.com/vulnerability/820c51d6-186e-4d63-b4a7-bd0a59c02cc8 +CVE-2021-25089 - https://wpscan.com/vulnerability/5adb977e-f7bf-4d36-b625-87bc23d379c8 +CVE-2021-25090 - https://wpscan.com/vulnerability/32a4a2b5-ef65-4e29-af4a-f003dbd0809c +CVE-2021-25091 - https://wpscan.com/vulnerability/96204946-0b10-4a2c-8079-473883ff95b6 +CVE-2021-25092 - https://wpscan.com/vulnerability/1cd30913-67c7-46c3-a2de-dcca0c332323 +CVE-2021-25093 - https://wpscan.com/vulnerability/7a7603ce-d76d-4c49-a886-67653bed8cd3 +CVE-2021-25094 - http://packetstormsecurity.com/files/167190/WordPress-Tatsu-Builder-Remote-Code-Execution.html +CVE-2021-25094 - https://wpscan.com/vulnerability/fb0097a0-5d7b-4e5b-97de-aacafa8fffcd +CVE-2021-25095 - https://wpscan.com/vulnerability/cbfa7211-ac1f-4cf2-bd79-ebce2fc4baa1 +CVE-2021-25096 - https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1 +CVE-2021-25097 - https://wpscan.com/vulnerability/67f5beb8-2cb0-4b43-87c7-dead9c005f9c +CVE-2021-25098 - https://wpscan.com/vulnerability/960a634d-a88a-4d90-9ac3-7d24b1fe07fe +CVE-2021-25099 - https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f +CVE-2021-25100 - https://wpscan.com/vulnerability/fe2c02bf-207c-43da-98bd-4c85d235de8b +CVE-2021-25101 - https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba +CVE-2021-25102 - https://wpscan.com/vulnerability/9b8a00a6-622b-4309-bbbf-fe2c7fc9f8b6 +CVE-2021-25103 - https://wpscan.com/vulnerability/90067336-c039-4cbe-aa9f-5eab5d1e1c3d +CVE-2021-25104 - https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558 +CVE-2021-25105 - https://wpscan.com/vulnerability/a9ab9e84-7f5e-4e7c-8647-114d9e02e59f +CVE-2021-25106 - https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e +CVE-2021-25107 - https://wpscan.com/vulnerability/3999a1b9-df85-43b1-b412-dc8a6f71cc5d +CVE-2021-25108 - https://wpscan.com/vulnerability/9d416ca3-bd02-4fcf-b3b8-f2f2280d02d2 +CVE-2021-25109 - https://wpscan.com/vulnerability/36261af9-3b34-4563-af3c-c9e54ae2d581 +CVE-2021-25110 - https://wpscan.com/vulnerability/b655fc21-47a1-4786-8911-d78ab823c153 +CVE-2021-25111 - https://wpscan.com/vulnerability/af548fab-96c2-4129-b609-e24aad0b1fc4 +CVE-2021-25112 - https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c +CVE-2021-25113 - https://wpscan.com/vulnerability/7a5078db-e0d4-4076-9de9-5401c3ca0d65 +CVE-2021-25114 - https://wpscan.com/vulnerability/6c25a5f0-a137-4ea5-9422-8ae393d7b76b +CVE-2021-25115 - https://wpscan.com/vulnerability/dbc18c2c-7547-44fc-8a41-c819757e47a7 +CVE-2021-25116 - https://wpscan.com/vulnerability/140a15b6-12c8-4f03-a877-3876db866852 +CVE-2021-25117 - https://wpscan.com/vulnerability/d2d9a789-edae-4ae1-92af-e6132db7efcd/ +CVE-2021-25118 - https://wpscan.com/vulnerability/2c3f9038-632d-40ef-a099-6ea202efb550 +CVE-2021-25119 - https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a +CVE-2021-25120 - https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6 +CVE-2021-25121 - https://wpscan.com/vulnerability/efb1ddef-2123-416c-a932-856d41ed836d +CVE-2021-25122 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-25122 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-25122 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-25142 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-25155 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25155 - http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html +CVE-2021-25156 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25157 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25158 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25159 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25160 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25161 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25162 - http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html +CVE-2021-25168 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-25169 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-25170 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-25171 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-25172 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-25179 - https://www.linkedin.com/in/gabrielegristina +CVE-2021-25215 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-25219 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-25264 - https://community.sophos.com/b/security-blog +CVE-2021-25264 - https://community.sophos.com/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264 +CVE-2021-25265 - https://community.sophos.com/b/security-blog +CVE-2021-25265 - https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265 +CVE-2021-25273 - http://seclists.org/fulldisclosure/2021/Dec/3 +CVE-2021-25274 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ +CVE-2021-25275 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ +CVE-2021-25276 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ +CVE-2021-25277 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-25277 +CVE-2021-25281 - http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html +CVE-2021-25281 - https://github.com/saltstack/salt/releases +CVE-2021-25282 - http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html +CVE-2021-25282 - https://github.com/saltstack/salt/releases +CVE-2021-25283 - https://github.com/saltstack/salt/releases +CVE-2021-25284 - https://github.com/saltstack/salt/releases +CVE-2021-25287 - https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470 +CVE-2021-25288 - https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470 +CVE-2021-25296 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25296 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25296 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md +CVE-2021-25296 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and +CVE-2021-25297 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25297 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25297 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md +CVE-2021-25297 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and +CVE-2021-25298 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25298 - http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25298 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md +CVE-2021-25298 - https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and +CVE-2021-25299 - http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html +CVE-2021-25299 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md +CVE-2021-25306 - https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/ +CVE-2021-25309 - https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/ +CVE-2021-25310 - https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/ +CVE-2021-25310 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2021-25316 - https://bugzilla.suse.com/show_bug.cgi?id=1182777 +CVE-2021-25326 - http://packetstormsecurity.com/files/162455/Shenzhen-Skyworth-RN510-Information-Disclosure.html +CVE-2021-25326 - http://seclists.org/fulldisclosure/2021/May/8 +CVE-2021-25326 - https://s3curityb3ast.github.io/KSA-Dev-013.md +CVE-2021-25327 - http://packetstormsecurity.com/files/162454/Shenzhen-Skyworth-RN510-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2021-25327 - http://seclists.org/fulldisclosure/2021/May/6 +CVE-2021-25327 - https://s3curityb3ast.github.io/KSA-Dev-012.md +CVE-2021-25328 - http://packetstormsecurity.com/files/162450/Shenzhen-Skyworth-RN510-Buffer-Overflow.html +CVE-2021-25328 - http://seclists.org/fulldisclosure/2021/May/5 +CVE-2021-25328 - https://s3curityb3ast.github.io/KSA-Dev-011.md +CVE-2021-25329 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-25329 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-25329 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-25330 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25334 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25335 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25336 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25337 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25338 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25339 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25340 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25344 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25345 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25346 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25347 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25356 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25356 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25357 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25358 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25359 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25360 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25361 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25362 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25363 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25364 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25365 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25369 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25370 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25371 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25372 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-25382 - https://security.samsungmobile.com/securityUpdate.smsb?year=2020&month=10 +CVE-2021-25383 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25384 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25385 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25386 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25387 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25388 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25388 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25389 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25390 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25390 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25391 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25391 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25392 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25392 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25393 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25393 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25394 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25395 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25396 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25397 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/ +CVE-2021-25397 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5 +CVE-2021-25407 - http://packetstormsecurity.com/files/163198/Samsung-NPU-npu_session_format-Out-Of-Bounds-Write.html +CVE-2021-25407 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25408 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25409 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25410 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ +CVE-2021-25410 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25411 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25412 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25413 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ +CVE-2021-25413 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25414 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ +CVE-2021-25414 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25415 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25416 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25417 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6 +CVE-2021-25426 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ +CVE-2021-25426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 +CVE-2021-25427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 +CVE-2021-25428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 +CVE-2021-25429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 +CVE-2021-25430 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=7 +CVE-2021-25440 - https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-2/ +CVE-2021-25443 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=8 +CVE-2021-25444 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=8 +CVE-2021-25449 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25450 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25451 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25452 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25453 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25454 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25455 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25456 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25457 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25458 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25459 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25460 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25461 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25462 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=9 +CVE-2021-25467 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25468 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25469 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25470 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25471 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25472 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25473 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25474 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25475 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25476 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25477 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25478 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25479 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25480 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25481 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25482 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25483 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25484 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25485 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25486 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25487 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25488 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25489 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25490 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25491 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10 +CVE-2021-25500 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 +CVE-2021-25501 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 +CVE-2021-25502 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 +CVE-2021-25503 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=11 +CVE-2021-25510 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25511 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25512 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25513 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25514 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25515 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25516 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25517 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25518 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25519 - https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=12 +CVE-2021-25631 - https://positive.security/blog/url-open-rce#open-libreoffice +CVE-2021-25646 - http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html +CVE-2021-25659 - https://cert-portal.siemens.com/productcert/pdf/ssa-158827.pdf +CVE-2021-25679 - http://packetstormsecurity.com/files/162268/Adtran-Personal-Phone-Manager-10.8.1-Persistent-Cross-Site-Scripting.html +CVE-2021-25679 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25679.md +CVE-2021-25680 - http://packetstormsecurity.com/files/162269/Adtran-Personal-Phone-Manager-10.8.1-Cross-Site-Scripting.html +CVE-2021-25680 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25680.md +CVE-2021-25681 - http://packetstormsecurity.com/files/162280/Adtran-Personal-Phone-Manager-10.8.1-DNS-Exfiltration.html +CVE-2021-25681 - https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns/blob/main/CVE-2021-25681.md +CVE-2021-25682 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 +CVE-2021-25683 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 +CVE-2021-25684 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326 +CVE-2021-25783 - https://github.com/taogogo/taocms/issues/5 +CVE-2021-25784 - https://github.com/taogogo/taocms/issues/4 +CVE-2021-25785 - https://github.com/taogogo/taocms/issues/3 +CVE-2021-25786 - https://github.com/qpdf/qpdf/issues/492 +CVE-2021-25790 - https://www.exploit-db.com/exploits/49352 +CVE-2021-25791 - https://www.exploit-db.com/exploits/49396 +CVE-2021-25829 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25829 +CVE-2021-25830 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830 +CVE-2021-25831 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25831 +CVE-2021-25832 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25832 +CVE-2021-25833 - https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833 +CVE-2021-25856 - https://github.com/pcmt/superMicro-CMS/issues/1 +CVE-2021-25857 - https://github.com/pcmt/superMicro-CMS/issues/2 +CVE-2021-25863 - https://github.com/open5gs/open5gs/issues/764 +CVE-2021-25864 - https://github.com/Foddy/node-red-contrib-huemagic/issues/217 +CVE-2021-25893 - https://www.itas.vn/itas-security-team-found-multi-vulnerabilities-on-magnolia-cms-platform/ +CVE-2021-25894 - https://www.itas.vn/itas-security-team-found-multi-vulnerabilities-on-magnolia-cms-platform/ +CVE-2021-25898 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ +CVE-2021-25898 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 +CVE-2021-25899 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ +CVE-2021-25899 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 +CVE-2021-25912 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912 +CVE-2021-25913 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913 +CVE-2021-25914 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914 +CVE-2021-25915 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25915 +CVE-2021-25916 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916 +CVE-2021-25917 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25917 +CVE-2021-25918 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25918 +CVE-2021-25919 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25919 +CVE-2021-25921 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921 +CVE-2021-25922 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25922 +CVE-2021-25923 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25923 +CVE-2021-25924 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25924, +CVE-2021-25925 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925 +CVE-2021-25926 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926, +CVE-2021-25927 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927 +CVE-2021-25928 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928 +CVE-2021-25929 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929 +CVE-2021-25931 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931 +CVE-2021-25932 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25932 +CVE-2021-25933 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933 +CVE-2021-25934 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25934 +CVE-2021-25935 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25935 +CVE-2021-25938 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25938 +CVE-2021-25939 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939 +CVE-2021-25940 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25940 +CVE-2021-25941 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941 +CVE-2021-25943 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943 +CVE-2021-25944 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25944 +CVE-2021-25945 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945 +CVE-2021-25946 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946 +CVE-2021-25947 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947 +CVE-2021-25948 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948 +CVE-2021-25949 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949 +CVE-2021-25951 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951 +CVE-2021-25952 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952 +CVE-2021-25953 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953 +CVE-2021-25954 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954 +CVE-2021-25955 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955 +CVE-2021-25956 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956 +CVE-2021-25957 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957 +CVE-2021-25958 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25958 +CVE-2021-25959 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959 +CVE-2021-25960 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25960 +CVE-2021-25961 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25961 +CVE-2021-25962 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962 +CVE-2021-25963 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963 +CVE-2021-25964 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964 +CVE-2021-25965 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25965 +CVE-2021-25966 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25966 +CVE-2021-25967 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967 +CVE-2021-25968 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25968 +CVE-2021-25969 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969 +CVE-2021-25970 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970 +CVE-2021-25971 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971 +CVE-2021-25972 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972 +CVE-2021-25973 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973 +CVE-2021-25974 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974 +CVE-2021-25975 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974 +CVE-2021-25976 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976 +CVE-2021-25977 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977 +CVE-2021-25980 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 +CVE-2021-25981 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981 +CVE-2021-25982 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982 +CVE-2021-25983 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983 +CVE-2021-25984 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25984 +CVE-2021-25985 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 +CVE-2021-25986 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986 +CVE-2021-25987 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987 +CVE-2021-25988 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25988 +CVE-2021-25989 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25989 +CVE-2021-25990 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25990 +CVE-2021-25991 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25991 +CVE-2021-25992 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992 +CVE-2021-25993 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25993 +CVE-2021-25994 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994 +CVE-2021-26078 - http://packetstormsecurity.com/files/163289/Atlassian-Jira-Server-Data-Center-8.16.0-Cross-Site-Scripting.html +CVE-2021-26084 - http://packetstormsecurity.com/files/164013/Confluence-Server-7.12.4-OGNL-Injection-Remote-Code-Execution.html +CVE-2021-26084 - http://packetstormsecurity.com/files/164122/Atlassian-Confluence-WebWork-OGNL-Injection.html +CVE-2021-26084 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html +CVE-2021-26085 - http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html +CVE-2021-26086 - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html +CVE-2021-26104 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f73m-fvj3-m2pm +CVE-2021-26117 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-26117 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-26117 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-26194 - https://github.com/jerryscript-project/jerryscript/issues/4445 +CVE-2021-26200 - https://www.exploit-db.com/exploits/49462 +CVE-2021-26201 - https://www.exploit-db.com/exploits/49463 +CVE-2021-26215 - https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822 +CVE-2021-26216 - https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91 +CVE-2021-26228 - https://github.com/BigTiger2020/CASAP-Automated-Enrollment-System/blob/main/README.md +CVE-2021-26233 - https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ +CVE-2021-26234 - https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ +CVE-2021-26235 - https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ +CVE-2021-26236 - https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/ +CVE-2021-26236 - https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236 +CVE-2021-26236 - https://www.exploit-db.com/exploits/49660 +CVE-2021-26237 - https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/ +CVE-2021-26259 - https://github.com/michaelrsweet/htmldoc/issues/417 +CVE-2021-26260 - https://bugzilla.redhat.com/show_bug.cgi?id=1947582 +CVE-2021-26271 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-26271 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-26272 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-26272 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-26272 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-26273 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm +CVE-2021-26274 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm +CVE-2021-26291 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-26291 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-26291 - https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/ +CVE-2021-26295 - http://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html +CVE-2021-26296 - http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html +CVE-2021-26296 - http://seclists.org/fulldisclosure/2021/Feb/66 +CVE-2021-26303 - https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html +CVE-2021-26304 - https://packetstormsecurity.com/files/161114/Daily-Expense-Tracker-System-1.0-Cross-Site-Scripting.html +CVE-2021-26333 - http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html +CVE-2021-26333 - http://seclists.org/fulldisclosure/2021/Sep/24 +CVE-2021-26414 - http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html +CVE-2021-26419 - http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html +CVE-2021-26504 - https://github.com/Foddy/node-red-contrib-huemagic/issues/217 +CVE-2021-26549 - http://packetstormsecurity.com/files/161335/SmartFoxServer-2X-2.17.0-God-Mode-Console-WebSocket-Cross-Site-Scripting.html +CVE-2021-26549 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-26549 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.php +CVE-2021-26550 - http://packetstormsecurity.com/files/161337/SmartFoxServer-2X-2.17.0-Credential-Disclosure.html +CVE-2021-26550 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-26550 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5627.php +CVE-2021-26551 - http://packetstormsecurity.com/files/161340/SmartFoxServer-2X-2.17.0-Remote-Code-Execution.html +CVE-2021-26551 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-26563 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1158 +CVE-2021-26570 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26571 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26572 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26573 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26574 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26575 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26576 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26577 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04080en_us +CVE-2021-26596 - https://www.gruppotim.it/redteam +CVE-2021-26597 - https://www.gruppotim.it/redteam +CVE-2021-26598 - https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html +CVE-2021-26599 - http://packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.html +CVE-2021-26600 - http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html +CVE-2021-26600 - https://hackerone.com/reports/1081986 +CVE-2021-26601 - http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html +CVE-2021-26690 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-26691 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-26691 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-26698 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html +CVE-2021-26698 - http://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2021-26699 - http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html +CVE-2021-26699 - http://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2021-26699 - https://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2021-26705 - https://www.exploit-db.com/exploits/49621 +CVE-2021-26708 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.13 +CVE-2021-26708 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c518adafa39f37858697ac9309c6cf1805581446 +CVE-2021-26709 - http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.html +CVE-2021-26712 - http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html +CVE-2021-26716 - https://github.com/emoncms/emoncms/issues/1652 +CVE-2021-26717 - http://packetstormsecurity.com/files/161471/Asterisk-Project-Security-Advisory-AST-2021-002.html +CVE-2021-26718 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310321 +CVE-2021-26723 - http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html +CVE-2021-26723 - https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328 +CVE-2021-26751 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ +CVE-2021-26752 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ +CVE-2021-26753 - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ +CVE-2021-26754 - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-i/ +CVE-2021-26758 - https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758 +CVE-2021-26758 - https://github.com/litespeedtech/openlitespeed/issues/217 +CVE-2021-26758 - https://www.exploit-db.com/exploits/49556 +CVE-2021-26762 - https://phpgurukul.com/ +CVE-2021-26762 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip +CVE-2021-26762 - https://www.exploit-db.com/exploits/49513 +CVE-2021-26764 - https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html +CVE-2021-26764 - https://phpgurukul.com/ +CVE-2021-26764 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip +CVE-2021-26765 - https://packetstormsecurity.com/files/161237/Student-Record-System-4.0-SQL-Injection.html +CVE-2021-26765 - https://phpgurukul.com/ +CVE-2021-26765 - https://phpgurukul.com/wp-content/uploads/2019/05/schoolmanagement.zip +CVE-2021-26776 - https://github.com/cskaza/cszcms/issues/29 +CVE-2021-26787 - http://genesys.com +CVE-2021-26787 - https://medium.com/@reliable_lait_mouse_975/cross-site-scripting-vulnerability-within-genesys-workforce-management-version-8-5-214-20-a68500cf5e18 +CVE-2021-26795 - http://packetstormsecurity.com/files/164961/Talariax-sendQuick-Alertplus-Server-Admin-4.3-SQL-Injection.html +CVE-2021-26795 - http://seclists.org/fulldisclosure/2021/Nov/37 +CVE-2021-26797 - https://le0nc.blogspot.com/2021/04/cve-2021-26797-access-control.html +CVE-2021-26799 - https://github.com/omeka/Omeka/issues/935 +CVE-2021-26804 - https://medium.com/@pedro.ferreira.phf/vulnerability-affecting-some-versions-of-centreon-2b34bd6dc621 +CVE-2021-26805 - https://github.com/justdan96/tsMuxer/issues/395 +CVE-2021-26807 - https://illuminati.services/2021/04/29/cve-2021-26807-gog-galaxy-v2-0-35-dll-load-order-hijacking/ +CVE-2021-26809 - https://packetstormsecurity.com/files/161267/Car-Rental-Project-2.0-Shell-Upload.html +CVE-2021-26809 - https://www.exploit-db.com/exploits/49520 +CVE-2021-26810 - https://github.com/GD008/vuln/blob/main/DIR-816.md +CVE-2021-26810 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-26812 - https://github.com/udima-university/moodle-mod_jitsi/issues/67 +CVE-2021-26822 - https://www.exploit-db.com/exploits/49562 +CVE-2021-26824 - https://sites.google.com/view/boss-lab +CVE-2021-26825 - https://github.com/godotengine/godot/pull/45702 +CVE-2021-26825 - https://github.com/godotengine/godot/pull/45702/files +CVE-2021-26826 - https://github.com/godotengine/godot/pull/45701 +CVE-2021-26826 - https://github.com/godotengine/godot/pull/45701/commits/403e4fd08b0b212e96f53d926e6273e0745eaa5a +CVE-2021-26827 - https://github.com/GD008/vuln/blob/main/tplink_wr2041/tplink_WR2041pv1.md +CVE-2021-26828 - http://packetstormsecurity.com/files/162564/ScadaBR-1.0-1.1CE-Linux-Shell-Upload.html +CVE-2021-26828 - https://youtu.be/k1teIStQr1A +CVE-2021-26829 - https://youtu.be/Xh6LPCiLMa8 +CVE-2021-26834 - https://github.com/alagrede/znote-app/issues/5 +CVE-2021-26855 - http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html +CVE-2021-26855 - http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html +CVE-2021-26855 - http://packetstormsecurity.com/files/162610/Microsoft-Exchange-2019-Unauthenticated-Email-Download.html +CVE-2021-26855 - http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html +CVE-2021-26863 - http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html +CVE-2021-26906 - http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html +CVE-2021-26910 - http://www.openwall.com/lists/oss-security/2021/02/09/1 +CVE-2021-26910 - https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b +CVE-2021-26910 - https://github.com/netblue30/firejail/releases/tag/0.9.64.4 +CVE-2021-26910 - https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt +CVE-2021-26912 - https://ssd-disclosure.com/?p=4676 +CVE-2021-26912 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ +CVE-2021-26912 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 +CVE-2021-26913 - https://ssd-disclosure.com/?p=4676 +CVE-2021-26913 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ +CVE-2021-26913 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 +CVE-2021-26914 - http://packetstormsecurity.com/files/162617/NetMotion-Mobility-Server-MvcUtil-Java-Deserialization.html +CVE-2021-26914 - https://ssd-disclosure.com/?p=4676 +CVE-2021-26914 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ +CVE-2021-26914 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 +CVE-2021-26915 - https://ssd-disclosure.com/?p=4676 +CVE-2021-26915 - https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/ +CVE-2021-26915 - https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020 +CVE-2021-26916 - https://github.com/nopSolutions/nopCommerce/issues/5322 +CVE-2021-26918 - http://packetstormsecurity.com/files/161347/Discord-Probot-Arbitrary-File-Upload.html +CVE-2021-26918 - https://raw.githubusercontent.com/TheLastVvV/Vulnerability-Reports-and-CVE/main/Reports/Discord%20Probot%20-%20Unrestricted%20File%20Upload.txt +CVE-2021-26926 - https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b +CVE-2021-26926 - https://github.com/jasper-software/jasper/issues/264 +CVE-2021-26927 - https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b +CVE-2021-26927 - https://github.com/jasper-software/jasper/issues/265 +CVE-2021-26928 - https://www.cyberark.com/resources/threat-research-blog/attacking-kubernetes-clusters-through-your-network-plumbing-part-2 +CVE-2021-26929 - http://packetstormsecurity.com/files/162187/Webmail-Edition-5.2.22-XSS-Remote-Code-Execution.html +CVE-2021-26929 - http://packetstormsecurity.com/files/162194/Horde-Groupware-Webmail-5.2.22-Cross-Site-Scripting.html +CVE-2021-26935 - https://www.exploit-db.com/exploits/49657 +CVE-2021-26943 - https://www.youtube.com/watch?v=1H3AfaVyeuk +CVE-2021-27065 - http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html +CVE-2021-27065 - http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html +CVE-2021-27086 - http://packetstormsecurity.com/files/162157/Microsoft-Windows-SCM-Remote-Access-Check-Limit-Bypass-Privilege-Escalation.html +CVE-2021-27097 - https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 +CVE-2021-27113 - https://github.com/GD008/vuln/blob/main/DIR-816_2.md +CVE-2021-27113 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-27114 - https://github.com/GD008/vuln/blob/main/DIR-816_stackoverflow.md +CVE-2021-27114 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-27116 - https://github.com/beego/beego/issues/4484 +CVE-2021-27117 - https://github.com/beego/beego/issues/4484 +CVE-2021-27124 - http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html +CVE-2021-27124 - https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-dios-7689b1d30f5f +CVE-2021-27129 - https://packetstormsecurity.com/files/161080/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html +CVE-2021-27130 - https://packetstormsecurity.com/files/161219/Online-Reviewer-System-1.0-SQL-Injection-Shell-Upload.html +CVE-2021-27135 - http://seclists.org/fulldisclosure/2021/May/52 +CVE-2021-27138 - https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 +CVE-2021-27184 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server.txt +CVE-2021-27185 - https://www.npmjs.com/package/samba-client +CVE-2021-27189 - http://packetstormsecurity.com/files/161507/CIRA-Canadian-Shield-Man-In-The-Middle.html +CVE-2021-27190 - https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611 +CVE-2021-27190 - https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS +CVE-2021-27190 - https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS +CVE-2021-27190 - https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/ +CVE-2021-27192 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight +CVE-2021-27193 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight +CVE-2021-27194 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight +CVE-2021-27195 - https://www.mcafee.com/blogs/other-blogs/mcafee-labs/netop-vision-pro-distance-learning-software-is-20-20-in-hindsight +CVE-2021-27197 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server_AFW.txt +CVE-2021-27198 - http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html +CVE-2021-27198 - http://seclists.org/fulldisclosure/2021/Feb/81 +CVE-2021-27198 - https://www.securifera.com/advisories/cve-2021-27198/ +CVE-2021-27200 - https://www.exploit-db.com/exploits/49989 +CVE-2021-27201 - https://github.com/MucahitSaratar/endian_firewall_authenticated_rce +CVE-2021-27201 - https://www.endian.com/company/news/endian-community-releases-new-version-332-148/ +CVE-2021-27203 - https://www.rootshellsecurity.net/rootshell-discover-denial-of-service-flaw-dekart-private-disk-encryption-software/ +CVE-2021-27204 - https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html +CVE-2021-27204 - https://www.youtube.com/watch?v=zEt-_5b4OaA +CVE-2021-27205 - https://www.inputzero.io/2020/12/telegram-privacy-fails-again.html +CVE-2021-27205 - https://www.youtube.com/watch?v=Go-4srm_1fQ +CVE-2021-27211 - http://packetstormsecurity.com/files/165199/Steghide-Hidden-Data-Extraction.html +CVE-2021-27215 - https://sec-consult.com/vulnerability-lab/advisory/authentication-bypass-genua-genugate/ +CVE-2021-27216 - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt +CVE-2021-27217 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln2 +CVE-2021-27219 - https://gitlab.gnome.org/GNOME/glib/-/issues/2319 +CVE-2021-27223 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_1 +CVE-2021-27224 - http://packetstormsecurity.com/files/161449/IrfanView-4.57-Denial-Of-Service-Code-Execution.html +CVE-2021-27224 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ +CVE-2021-27230 - http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html +CVE-2021-27231 - https://sick.codes/sick-2021-006 +CVE-2021-27232 - https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server-RSTPLive555%20Activex%20Buffer%20overflow.txt +CVE-2021-27237 - https://www.exploit-db.com/exploits/49565 +CVE-2021-27251 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27252 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27253 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27254 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27255 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27256 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27257 - https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders +CVE-2021-27273 - https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559 +CVE-2021-27275 - https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561 +CVE-2021-27276 - https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500 +CVE-2021-27290 - https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf +CVE-2021-27290 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-27306 - https://medium.com/@sew.campos/cve-2021-27306-access-an-authenticated-route-on-kong-api-gateway-6ae3d81968a3 +CVE-2021-27308 - http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html +CVE-2021-27308 - https://github.com/4images/4images/issues/3 +CVE-2021-27309 - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md +CVE-2021-27310 - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md +CVE-2021-27312 - https://gist.github.com/LioTree/8d10d123d31f50db05a25586e62a87ba +CVE-2021-27314 - https://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html +CVE-2021-27315 - http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html +CVE-2021-27316 - http://packetstormsecurity.com/files/161641/Doctor-Appointment-System-1.0-SQL-Injection.html +CVE-2021-27317 - http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html +CVE-2021-27318 - http://packetstormsecurity.com/files/161574/Doctor-Appointment-System-1.0-Cross-Site-Scripting.html +CVE-2021-27319 - http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html +CVE-2021-27320 - http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html +CVE-2021-27328 - http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html +CVE-2021-27328 - https://github.com/SQSamir/CVE-2021-27328 +CVE-2021-27330 - http://packetstormsecurity.com/files/161570/Triconsole-3.75-Cross-Site-Scripting.html +CVE-2021-27330 - https://www.exploit-db.com/exploits/49597 +CVE-2021-27335 - https://hacked0x90.net/index.php/2021/02/15/kollectapp-insecure-java-deserialization/ +CVE-2021-27340 - https://github.com/OS4ED/openSIS-Classic/issues/158 +CVE-2021-27341 - https://github.com/OS4ED/openSIS-Classic/issues/158 +CVE-2021-27345 - https://github.com/ckolivas/lrzip/issues/164 +CVE-2021-27347 - https://github.com/ckolivas/lrzip/issues/165 +CVE-2021-27351 - https://0ffsecninja.github.io/Telegram:CVE-2021-2735.html +CVE-2021-27352 - https://drive.google.com/file/d/1kSDlPASBCgJEINxTSIsjMWrU4u4T5XCc/view?usp=sharing +CVE-2021-27352 - https://github.com/xoffense/POC/blob/main/Ilch%202.1.42%20Open%20redirect +CVE-2021-27357 - https://github.com/RIOT-OS/RIOT/issues/16018 +CVE-2021-27358 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md +CVE-2021-27358 - https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17 +CVE-2021-27362 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ +CVE-2021-27363 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2021-27363 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html +CVE-2021-27363 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa +CVE-2021-27364 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2021-27364 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html +CVE-2021-27364 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa +CVE-2021-27364 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-27365 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2021-27365 - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html +CVE-2021-27365 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee +CVE-2021-27365 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5 +CVE-2021-27365 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-27368 - https://github.com/monicahq/monica/issues/4888 +CVE-2021-27368 - https://github.com/monicahq/monica/pull/4543 +CVE-2021-27369 - https://github.com/monicahq/monica/issues/4888 +CVE-2021-27369 - https://github.com/monicahq/monica/pull/4543 +CVE-2021-27370 - http://packetstormsecurity.com/files/161501/Monica-2.19.1-Cross-Site-Scripting.html +CVE-2021-27370 - https://github.com/monicahq/monica/issues/4888 +CVE-2021-27370 - https://github.com/monicahq/monica/pull/4543 +CVE-2021-27371 - https://github.com/monicahq/monica/issues/4888 +CVE-2021-27371 - https://github.com/monicahq/monica/pull/4543 +CVE-2021-27405 - https://github.com/progfay/scrapbox-parser/pull/519 +CVE-2021-27405 - https://github.com/progfay/scrapbox-parser/pull/539 +CVE-2021-27414 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7777&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-27416 - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7777&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-27427 - https://github.com/RIOT-OS/RIOT +CVE-2021-27433 - https://github.com/ARMmbed/mbed-os/pull/14408 +CVE-2021-27435 - https://github.com/ARMmbed/mbed-os/pull/14408 +CVE-2021-27513 - https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py +CVE-2021-27514 - https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py +CVE-2021-27519 - http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html +CVE-2021-27519 - https://github.com/fudforum/FUDforum/issues/2 +CVE-2021-27520 - http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html +CVE-2021-27520 - https://github.com/fudforum/FUDforum/issues/2 +CVE-2021-27526 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20page%20parameter +CVE-2021-27527 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20valueID%20parameter +CVE-2021-27528 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20refID%20parameter +CVE-2021-27529 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20limit%20parameter +CVE-2021-27530 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20index.php%20URI +CVE-2021-27531 - https://github.com/xoffense/POC/blob/main/DynPG%204.9.2%20XSS%20via%20query%20parameter +CVE-2021-27544 - https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html +CVE-2021-27545 - https://packetstormsecurity.com/files/161468/Beauty-Parlour-Management-System-1.0-Cross-Site-Scripting.html +CVE-2021-27545 - https://www.exploit-db.com/exploits/49580 +CVE-2021-27549 - https://www.genymotion.com/download/ +CVE-2021-27549 - https://www.youtube.com/watch?v=Tod8Q6sf0P8 +CVE-2021-27550 - https://gist.github.com/sqrtrev/1f9986d4bdd1393832c60a97b56e170a +CVE-2021-27559 - https://github.com/monicahq/monica/issues/4888 +CVE-2021-27559 - https://github.com/monicahq/monica/pull/4543 +CVE-2021-27561 - https://ssd-disclosure.com/?p=4688 +CVE-2021-27565 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-27565 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-27568 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-27568 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-27568 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-27597 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html +CVE-2021-27597 - https://launchpad.support.sap.com/#/notes/3020209 +CVE-2021-27606 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html +CVE-2021-27607 - http://packetstormsecurity.com/files/164591/SAP-NetWeaver-ABAP-Dispatcher-Service-Memory-Corruption.html +CVE-2021-27620 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html +CVE-2021-27622 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html +CVE-2021-27624 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html +CVE-2021-27625 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html +CVE-2021-27626 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html +CVE-2021-27627 - http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html +CVE-2021-27628 - http://packetstormsecurity.com/files/164591/SAP-NetWeaver-ABAP-Dispatcher-Service-Memory-Corruption.html +CVE-2021-27629 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html +CVE-2021-27630 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html +CVE-2021-27631 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html +CVE-2021-27632 - http://packetstormsecurity.com/files/164595/SAP-NetWeaver-ABAP-Enqueue-Memory-Corruption.html +CVE-2021-27633 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html +CVE-2021-27633 - https://launchpad.support.sap.com/#/notes/3020209 +CVE-2021-27634 - http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html +CVE-2021-27634 - https://launchpad.support.sap.com/#/notes/3020209 +CVE-2021-27635 - http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html +CVE-2021-27673 - http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html +CVE-2021-27691 - https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/rkhTCGzMd +CVE-2021-27692 - https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu +CVE-2021-27695 - https://www.exploit-db.com/exploits/49649 +CVE-2021-27697 - https://github.com/RIOT-OS/RIOT/issues/16062 +CVE-2021-27698 - https://github.com/RIOT-OS/RIOT/issues/16085 +CVE-2021-27705 - https://hackmd.io/Zb7lfFaNR0ScpaTssECFbg +CVE-2021-27706 - https://hackmd.io/BhzJ4H20TjqKUiBrDOIKaw +CVE-2021-27707 - https://hackmd.io/U7OVgYIuRcOKV7SW5-euHw +CVE-2021-27708 - https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA +CVE-2021-27708 - https://hackmd.io/mDgIBvoxSPCZrZiZjfQGhw +CVE-2021-27710 - https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw +CVE-2021-27710 - https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A +CVE-2021-27722 - https://www.exploit-db.com/exploits/49590 +CVE-2021-27722 - https://www.exploit-db.com/exploits/49638 +CVE-2021-27804 - http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html +CVE-2021-27804 - http://seclists.org/fulldisclosure/2021/Mar/2 +CVE-2021-27807 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-27807 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-27807 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-27815 - https://github.com/libexif/exif/issues/4 +CVE-2021-27822 - https://www.exploit-db.com/exploits/49595 +CVE-2021-27825 - http://packetstormsecurity.com/files/171771/MAC-1200R-Directory-Traversal.html +CVE-2021-27828 - https://www.exploit-db.com/exploits/49884 +CVE-2021-27836 - https://github.com/libxls/libxls/issues/94 +CVE-2021-27853 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX +CVE-2021-27855 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5685.php +CVE-2021-27856 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php +CVE-2021-27857 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5683.php +CVE-2021-27858 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5682.php +CVE-2021-27859 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php +CVE-2021-27876 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html +CVE-2021-27877 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html +CVE-2021-27878 - http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html +CVE-2021-27885 - http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html +CVE-2021-27886 - http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html +CVE-2021-27889 - http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html +CVE-2021-27890 - http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html +CVE-2021-27906 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-27906 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-27906 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-27913 - https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 +CVE-2021-27918 - https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw +CVE-2021-27919 - https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw +CVE-2021-27928 - http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html +CVE-2021-27931 - https://github.com/sl4cky/LumisXP-XXE---POC/blob/main/poc.txt +CVE-2021-27932 - https://advisories.stormshield.eu/2021-004/ +CVE-2021-27933 - http://seclists.org/fulldisclosure/2021/Apr/61 +CVE-2021-27940 - https://www.youtube.com/watch?v=DOYm0DIS3Us +CVE-2021-27945 - https://squirro.atlassian.net/wiki/spaces/DOC/pages/2389672672/CVE-2021-27945+-+Cross-Site+Scripting +CVE-2021-27946 - http://packetstormsecurity.com/files/161918/MyBB-1.8.25-SQL-Injection.html +CVE-2021-27956 - https://raxis.com/blog/cve-2021-27956-manage-engine-xss +CVE-2021-27956 - https://www.manageengine.com +CVE-2021-27962 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 +CVE-2021-27962 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2021-27963 - https://github.com/erberkan/SonLogger-vulns +CVE-2021-27964 - http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html +CVE-2021-27964 - https://github.com/erberkan/SonLogger-vulns +CVE-2021-27969 - https://www.exploit-db.com/exploits/49670 +CVE-2021-27971 - http://packetstormsecurity.com/files/165690/Alps-Alpine-Touchpad-Driver-DLL-Injection.html +CVE-2021-27973 - http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html +CVE-2021-27983 - https://github.com/maxsite/cms/issues/430 +CVE-2021-27984 - https://github.com/pluck-cms/pluck/issues/98 +CVE-2021-27989 - https://github.com/syedsohaibkarim/PoC-StoredXSS-Appspace6.2.4 +CVE-2021-27990 - https://github.com/syedsohaibkarim/PoC-BrokenAuth-AppSpace6.2.4 +CVE-2021-27999 - https://medium.com/@tusharvaidya16/authenticated-blind-error-based-sql-injection-on-local-services-search-engine-management-system-3e99779f0850 +CVE-2021-28000 - https://tusharvaidya16.medium.com/local-services-search-engine-management-system-project-lssmes-1-0-af2cae7cbbf +CVE-2021-28001 - https://www.exploit-db.com/exploits/49616 +CVE-2021-28002 - https://www.exploit-db.com/exploits/49617 +CVE-2021-28006 - https://www.exploit-db.com/exploits/49605 +CVE-2021-28007 - https://www.exploit-db.com/exploits/49607 +CVE-2021-28021 - https://github.com/nothings/stb/issues/1108 +CVE-2021-28026 - https://gitlab.com/wg1/jpeg-xl/-/issues/163 +CVE-2021-28040 - https://github.com/ossec/ossec-hids/issues/1953 +CVE-2021-28041 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-28042 - https://herolab.usd.de/security-advisories/usd-2020-0028/ +CVE-2021-28060 - https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/ +CVE-2021-28070 - https://github.com/PopojiCMS/PopojiCMS/issues/31 +CVE-2021-28079 - https://github.com/theart42/cves/blob/master/CVE-2021-28079/CVE-2021-28079.md +CVE-2021-28088 - https://anotepad.com/note/read/s3kkk6h7 +CVE-2021-28093 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html +CVE-2021-28094 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html +CVE-2021-28095 - http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html +CVE-2021-28113 - http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html +CVE-2021-28114 - https://labs.bishopfox.com/advisories +CVE-2021-28114 - https://labs.bishopfox.com/advisories/froala-editor-v3.2.6 +CVE-2021-28115 - http://packetstormsecurity.com/files/161746/MyBB-OUGC-Feedback-1.8.22-Cross-Site-Scripting.html +CVE-2021-28127 - https://advisories.stormshield.eu +CVE-2021-28127 - https://advisories.stormshield.eu/2021-006 +CVE-2021-28128 - https://github.com/strapi/strapi/releases +CVE-2021-28128 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt +CVE-2021-28132 - https://abuyv.com/cve/lucy-file-upload-RCE +CVE-2021-28133 - http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html +CVE-2021-28133 - http://seclists.org/fulldisclosure/2021/Mar/48 +CVE-2021-28133 - https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html +CVE-2021-28133 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt +CVE-2021-28133 - https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133 +CVE-2021-28133 - https://www.youtube.com/watch?v=SonmmgQlLzg +CVE-2021-28135 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-28136 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-28139 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-28142 - http://packetstormsecurity.com/files/162182/CITSmart-ITSM-9.1.2.27-SQL-Injection.html +CVE-2021-28143 - https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt +CVE-2021-28144 - http://packetstormsecurity.com/files/161757/D-Link-DIR-3060-1.11b04-Command-Injection.html +CVE-2021-28144 - http://seclists.org/fulldisclosure/2021/Mar/23 +CVE-2021-28146 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 +CVE-2021-28146 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2021-28147 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 +CVE-2021-28147 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2021-28148 - https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724 +CVE-2021-28148 - https://community.grafana.com/t/release-notes-v6-7-x/27119 +CVE-2021-28153 - https://gitlab.gnome.org/GNOME/glib/-/issues/2325 +CVE-2021-28155 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-28160 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 +CVE-2021-28161 - https://github.com/eclipse-theia/theia/issues/8794 +CVE-2021-28162 - https://github.com/eclipse-theia/theia/issues/7283 +CVE-2021-28163 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28163 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-28163 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28164 - http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html +CVE-2021-28164 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28164 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-28164 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28165 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-28165 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28165 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-28165 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28168 - https://github.com/eclipse-ee4j/jersey/pull/4712 +CVE-2021-28168 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28169 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28169 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-28169 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28170 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28211 - https://bugzilla.tianocore.org/show_bug.cgi?id=1816 +CVE-2021-28233 - https://github.com/brackeen/ok-file-formats/issues/11 +CVE-2021-28236 - https://github.com/LibreDWG/libredwg/issues/324 +CVE-2021-28237 - https://github.com/LibreDWG/libredwg/issues/325 +CVE-2021-28242 - http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html +CVE-2021-28242 - https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644 +CVE-2021-28246 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ +CVE-2021-28247 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ +CVE-2021-28248 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ +CVE-2021-28249 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ +CVE-2021-28250 - https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/ +CVE-2021-28269 - https://www.exploit-db.com/exploits/49679 +CVE-2021-28269 - https://www.zeroscience.mk/en/vulnerabilities +CVE-2021-28269 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5634.php +CVE-2021-28271 - https://www.exploit-db.com/exploits/49678 +CVE-2021-28271 - https://www.zeroscience.mk/en/vulnerabilities +CVE-2021-28271 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5633.php +CVE-2021-28275 - https://github.com/Matthias-Wandel/jhead/issues/17 +CVE-2021-28277 - https://github.com/Matthias-Wandel/jhead/issues/16 +CVE-2021-28278 - https://github.com/Matthias-Wandel/jhead/issues/15 +CVE-2021-28280 - https://anotepad.com/notes/2skndayt +CVE-2021-28293 - https://0xdb9.in/2021/06/07/cve-2021-28293.html +CVE-2021-28294 - https://www.exploit-db.com/exploits/49615 +CVE-2021-28295 - https://www.exploit-db.com/exploits/49618 +CVE-2021-28300 - https://github.com/gpac/gpac/issues/1702 +CVE-2021-28302 - https://github.com/pupnp/pupnp/issues/249 +CVE-2021-28313 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html +CVE-2021-28313 - http://seclists.org/fulldisclosure/2021/Apr/40 +CVE-2021-28321 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html +CVE-2021-28321 - http://seclists.org/fulldisclosure/2021/Apr/40 +CVE-2021-28322 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html +CVE-2021-28322 - http://seclists.org/fulldisclosure/2021/Apr/40 +CVE-2021-28323 - http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html +CVE-2021-28323 - http://seclists.org/fulldisclosure/2021/Apr/40 +CVE-2021-28363 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28376 - https://herolab.usd.de/en/security-advisories/usd-2021-0006 +CVE-2021-28377 - https://herolab.usd.de/en/security-advisories/usd-2021-0007/ +CVE-2021-28378 - https://github.com/go-gitea/gitea/pull/14898 +CVE-2021-28379 - http://packetstormsecurity.com/files/161836/VestaCP-0.9.8-Cross-Site-Request-Forgery.html +CVE-2021-28382 - https://raxis.com/blog/cve-2021-28382 +CVE-2021-28417 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html +CVE-2021-28417 - https://github.com/seopanel/Seo-Panel/issues/208 +CVE-2021-28418 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html +CVE-2021-28418 - https://github.com/seopanel/Seo-Panel/issues/207 +CVE-2021-28419 - http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html +CVE-2021-28419 - https://github.com/seopanel/Seo-Panel/issues/209 +CVE-2021-28420 - http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html +CVE-2021-28420 - https://github.com/seopanel/Seo-Panel/issues/206 +CVE-2021-28423 - https://nhattruong.blog/2021/05/22/cve-2021-28423-teachers-record-management-system-1-0-searchdata-error-based-sql-injection-authenticated/ +CVE-2021-28423 - https://packetstormsecurity.com/files/163172/Teachers-Record-Management-System-1.0-SQL-Injection.html +CVE-2021-28423 - https://www.exploit-db.com/exploits/50018 +CVE-2021-28424 - https://nhattruong.blog/2021/05/22/cve-2021-28424-teachers-record-management-system-1-0-email-stored-cross-site-scripting-xss-vulnerability-authenticated/ +CVE-2021-28424 - https://packetstormsecurity.com/files/163171/Teachers-Record-Management-System-1.0-Cross-Site-Scripting.html +CVE-2021-28424 - https://www.exploit-db.com/exploits/50019 +CVE-2021-28429 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/c94875471e3ba3dc396c6919ff3ec9b14539cd71 +CVE-2021-28459 - http://packetstormsecurity.com/files/162190/Microsoft-Azure-DevOps-Server-2020.0.1-Cross-Site-Scripting.html +CVE-2021-28459 - http://seclists.org/fulldisclosure/2021/Apr/25 +CVE-2021-28476 - http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html +CVE-2021-28485 - https://www.ericsson.com/en/about-us/security/psirt +CVE-2021-28485 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2021-28488 - https://www.ericsson.com +CVE-2021-28488 - https://www.ericsson.com/en/about-us/enterprise-security/psirt +CVE-2021-28488 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2021-28653 - https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability +CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28660 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7 +CVE-2021-28661 - https://github.com/silverstripe/silverstripe-graphql/releases +CVE-2021-28663 - https://github.com/lntrx/CVE-2021-28663 +CVE-2021-28665 - https://advisories.stormshield.eu/ +CVE-2021-28680 - https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/ +CVE-2021-28684 - https://peterka.tech/blog/posts/cve-2021-28684/ +CVE-2021-28807 - https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/ +CVE-2021-28807 - https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/ +CVE-2021-28838 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-28839 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-28840 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-28855 - https://fatihhcelik.github.io/posts/NULL-Pointer-Dereference-Deark/ +CVE-2021-28856 - https://fatihhcelik.github.io/posts/Division-By-Zero-Deark/ +CVE-2021-28857 - https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-credentials-in-cookie-7516a2649394 +CVE-2021-28858 - https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 +CVE-2021-28861 - https://bugs.python.org/issue43223 +CVE-2021-28903 - https://github.com/CESNET/libyang/issues/1453 +CVE-2021-28918 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md +CVE-2021-28918 - https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/ +CVE-2021-28927 - http://libretro.com +CVE-2021-28927 - https://labs.bishopfox.com/advisories/retroarch-for-windows-version-1.9.0 +CVE-2021-28935 - http://packetstormsecurity.com/files/162287/CMS-Made-Simple-2.2.15-Cross-Site-Scripting.html +CVE-2021-28936 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 +CVE-2021-28937 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 +CVE-2021-28940 - https://www.exploit-db.com/exploits/49643 +CVE-2021-28950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 +CVE-2021-28950 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed +CVE-2021-28957 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-28958 - https://blog.stmcyber.com/vulns/cve-2021-28958/ +CVE-2021-28958 - https://www.manageengine.com +CVE-2021-28959 - https://www.manageengine.com +CVE-2021-28960 - https://www.manageengine.com +CVE-2021-28962 - https://advisories.stormshield.eu/ +CVE-2021-28963 - https://issues.shibboleth.net/jira/browse/SSPCPP-922 +CVE-2021-28964 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5 +CVE-2021-28969 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-005.txt +CVE-2021-28970 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt +CVE-2021-28971 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea +CVE-2021-28972 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678 +CVE-2021-28975 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-18_CSNC-2021-018-WPMailster_XSS_CSRF.txt +CVE-2021-28979 - https://www.gruppotim.it/redteam +CVE-2021-28998 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/file_upload_RCE/File_upload_to_RCE.md +CVE-2021-28998 - https://seclists.org/fulldisclosure/2021/Mar/50 +CVE-2021-28999 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md +CVE-2021-28999 - https://seclists.org/fulldisclosure/2021/Mar/49 +CVE-2021-29002 - https://github.com/plone/Products.CMFPlone/issues/3255 +CVE-2021-29002 - https://www.exploit-db.com/exploits/49668 +CVE-2021-29003 - http://packetstormsecurity.com/files/162174/Genexis-PLATINUM-4410-2.1-P4410-V2-1.28-Remote-Command-Execution.html +CVE-2021-29004 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29004-POC-req.txt +CVE-2021-29004 - https://github.com/mrojz/rconfig-exploit/blob/main/README.md +CVE-2021-29005 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29005-POC.sh +CVE-2021-29006 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29006-POC.py +CVE-2021-29008 - https://github.com/seopanel/Seo-Panel/issues/211 +CVE-2021-29009 - https://github.com/seopanel/Seo-Panel/issues/210 +CVE-2021-29010 - https://github.com/seopanel/Seo-Panel/issues/212 +CVE-2021-29011 - http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html +CVE-2021-29011 - https://github.com/1d8/publications/tree/main/cve-2021-29011 +CVE-2021-29012 - http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html +CVE-2021-29012 - https://github.com/1d8/publications/tree/main/cve-2021-29012 +CVE-2021-29022 - https://notnnor.github.io/research/2021/03/17/full-path-discloure-in-invoiceplane.html +CVE-2021-29023 - https://notnnor.github.io/research/2021/03/16/weak-password-recovery-mechanism-in-invoiceplane.html +CVE-2021-29025 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29026 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29027 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29028 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29029 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29030 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29031 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29032 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29033 - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md +CVE-2021-29041 - https://issues.liferay.com/browse/LPE-17131 +CVE-2021-29049 - https://issues.liferay.com/browse/LPE-17211 +CVE-2021-29054 - https://packetstormsecurity.com/files/162077/Papoo-CMS-Cross-Site-Request-Forgery.html +CVE-2021-29055 - https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html +CVE-2021-29056 - https://github.com/pixelimity/pixelimity/issues/21 +CVE-2021-29059 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md +CVE-2021-29060 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md +CVE-2021-29061 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md +CVE-2021-29061 - https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md +CVE-2021-29063 - https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md +CVE-2021-29067 - https://kb.netgear.com/000063017/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0492 +CVE-2021-29068 - https://kb.netgear.com/000063021/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0155 +CVE-2021-29070 - https://kb.netgear.com/000063019/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Routers-PSV-2020-0530 +CVE-2021-29072 - https://kb.netgear.com/000063018/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0493 +CVE-2021-29075 - https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466 +CVE-2021-29099 - https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-e21-03-server-sql/ +CVE-2021-29100 - https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update +CVE-2021-29154 - http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html +CVE-2021-29154 - https://news.ycombinator.com/item?id=26757760 +CVE-2021-29154 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-29155 - https://www.kernel.org +CVE-2021-29155 - https://www.openwall.com/lists/oss-security/2021/04/18/4 +CVE-2021-29158 - https://support.sonatype.com/hc/en-us/articles/1500006126462 +CVE-2021-29158 - https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base +CVE-2021-29159 - https://support.sonatype.com/hc/en-us/articles/1500005031082 +CVE-2021-29159 - https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base +CVE-2021-29252 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2021-29253 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2021-29265 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 +CVE-2021-29266 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.9 +CVE-2021-29267 - https://github.com/Security-AVS/CVE-2021-29267 +CVE-2021-29281 - https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload +CVE-2021-29281 - https://www.exploit-db.com/exploits/50181 +CVE-2021-29294 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-29295 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-29296 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-29302 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 +CVE-2021-29323 - https://github.com/Moddable-OpenSource/moddable/issues/5 +CVE-2021-29324 - https://github.com/Moddable-OpenSource/moddable/issues/586 +CVE-2021-29325 - https://github.com/Moddable-OpenSource/moddable/issues/582 +CVE-2021-29326 - https://github.com/Moddable-OpenSource/moddable/issues/583 +CVE-2021-29327 - https://github.com/Moddable-OpenSource/moddable/issues/580 +CVE-2021-29328 - https://github.com/Moddable-OpenSource/moddable/issues/585 +CVE-2021-29329 - https://github.com/Moddable-OpenSource/moddable/issues/587 +CVE-2021-29337 - https://github.com/rjt-gupta/CVE-2021-29337 +CVE-2021-29338 - https://github.com/uclouvain/openjpeg/issues/1338 +CVE-2021-29343 - https://www.exploit-db.com/exploits/49707 +CVE-2021-29349 - https://github.com/0xBaz/CVE-2021-29349/issues/1 +CVE-2021-29369 - https://www.npmjs.com/package/@rkesters/gnuplot +CVE-2021-29370 - https://medium.com/@kunal94/indirect-uxss-issues-on-a-private-integrated-browser-219f6b809b6c +CVE-2021-29376 - https://www.openwall.com/lists/oss-security/2021/03/24/2 +CVE-2021-29378 - https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DIEC +CVE-2021-29379 - https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection +CVE-2021-29379 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-29387 - https://www.exploit-db.com/exploits/49722 +CVE-2021-29388 - https://www.exploit-db.com/exploits/49723 +CVE-2021-29390 - https://bugzilla.redhat.com/show_bug.cgi?id=1943797 +CVE-2021-29393 - https://ardent-security.com +CVE-2021-29393 - https://ardent-security.com/en/advisory/asa-2021-01/ +CVE-2021-29394 - https://ardent-security.com +CVE-2021-29394 - https://ardent-security.com/en/advisory/asa-2021-02/ +CVE-2021-29395 - https://ardent-security.com/en/advisory/asa-2021-03/ +CVE-2021-29396 - https://ardent-security.com/en/advisory/asa-2021-04/ +CVE-2021-29397 - https://ardent-security.com/en/advisory/asa-2021-05/ +CVE-2021-29398 - https://ardent-security.com/en/advisory/asa-2021-06/ +CVE-2021-29414 - https://eprint.iacr.org/2021/640 +CVE-2021-29415 - https://eprint.iacr.org/2021/640 +CVE-2021-29425 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-29425 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-29425 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-29425 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-29439 - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities +CVE-2021-29440 - http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html +CVE-2021-29440 - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities +CVE-2021-29442 - https://github.com/alibaba/nacos/issues/4463 +CVE-2021-29447 - http://packetstormsecurity.com/files/163148/XML-External-Entity-Via-MP3-File-Upload-On-WordPress.html +CVE-2021-29447 - http://packetstormsecurity.com/files/164198/WordPress-5.7-Media-Library-XML-Injection.html +CVE-2021-29447 - https://blog.sonarsource.com/wordpress-xxe-security-vulnerability/ +CVE-2021-29449 - http://packetstormsecurity.com/files/163715/Pi-Hole-Remove-Commands-Linux-Privilege-Escalation.html +CVE-2021-29458 - https://github.com/Exiv2/exiv2/pull/1536 +CVE-2021-29460 - http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html +CVE-2021-29473 - https://github.com/Exiv2/exiv2/security/policy +CVE-2021-29474 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87 +CVE-2021-29475 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pxxg-px9v-6qf3 +CVE-2021-29484 - https://blog.sonarsource.com/ghost-admin-takeover +CVE-2021-29486 - https://www.npmjs.com/package/cumulative-distribution-function +CVE-2021-29504 - https://github.com/wp-cli/wp-cli/pull/5523 +CVE-2021-29505 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-29505 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-29505 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-29505 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-29620 - https://mvnrepository.com/artifact/com.epam.reportportal/service-api +CVE-2021-29623 - https://github.com/Exiv2/exiv2/pull/1627 +CVE-2021-29624 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html +CVE-2021-29641 - http://packetstormsecurity.com/files/162118/Monospace-Directus-Headless-CMS-File-Upload-Rule-Bypass.html +CVE-2021-29641 - http://seclists.org/fulldisclosure/2021/Apr/14 +CVE-2021-29641 - https://sec-consult.com/vulnerability-lab/advisory/arbitrary-file-upload-and-bypassing-htaccess-rules-in-monospace-directus-headless-cms/ +CVE-2021-29643 - https://raxis.com/blog/prtg-network-monitor-cve-2021-29643 +CVE-2021-29646 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 +CVE-2021-29646 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0217ed2848e8538bcf9172d97ed2eeb4a26041bb +CVE-2021-29647 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 +CVE-2021-29647 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50535249f624d0072cd885bcdce4e4b6fb770160 +CVE-2021-29648 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 +CVE-2021-29648 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef +CVE-2021-29649 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 +CVE-2021-29649 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f60a85cad677c4f9bb4cadd764f1d106c38c7cf8 +CVE-2021-29650 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.11 +CVE-2021-29650 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=175e476b8cdf2a4de7432583b49c871345e4f8a1 +CVE-2021-29657 - http://packetstormsecurity.com/files/163324/KVM-nested_svm_vmrun-Double-Fetch.html +CVE-2021-29657 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.12 +CVE-2021-29657 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a58d9166a756a0f4a6618e4f593232593d6df134 +CVE-2021-29660 - https://www.gruppotim.it/redteam +CVE-2021-29661 - https://www.gruppotim.it/redteam +CVE-2021-29662 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md +CVE-2021-29662 - https://sick.codes/sick-2021-018/ +CVE-2021-29663 - http://sourceforge.net/projects/coursems +CVE-2021-29700 - https://www.ibm.com/support/pages/node/6496749 +CVE-2021-29921 - https://github.com/python/cpython/pull/12577 +CVE-2021-29921 - https://github.com/python/cpython/pull/25099 +CVE-2021-29921 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md +CVE-2021-29921 - https://sick.codes/sick-2021-014 +CVE-2021-29921 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-29922 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md +CVE-2021-29923 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md +CVE-2021-29923 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-29944 - https://bugzilla.mozilla.org/show_bug.cgi?id=1697604 +CVE-2021-29951 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690062 +CVE-2021-29953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701684 +CVE-2021-29955 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692972 +CVE-2021-29957 - https://bugzilla.mozilla.org/show_bug.cgi?id=1673241 +CVE-2021-29962 - https://bugzilla.mozilla.org/show_bug.cgi?id=1701673 +CVE-2021-29964 - https://bugzilla.mozilla.org/show_bug.cgi?id=1706501 +CVE-2021-29965 - https://bugzilla.mozilla.org/show_bug.cgi?id=1709257 +CVE-2021-29983 - https://bugzilla.mozilla.org/show_bug.cgi?id=1719088 +CVE-2021-29985 - https://bugzilla.mozilla.org/show_bug.cgi?id=1722083 +CVE-2021-29995 - http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html +CVE-2021-29995 - https://support1.cloverdx.com/hc/en-us/articles/360021006520 +CVE-2021-29996 - https://github.com/marktext/marktext/issues/2548 +CVE-2021-30002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3 +CVE-2021-30002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899 +CVE-2021-3002 - http://www.cinquino.eu/SeoPanelReflect.htm +CVE-2021-3002 - https://github.com/seopanel/Seo-Panel/issues/202 +CVE-2021-30028 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 +CVE-2021-3003 - https://fibonhack.github.io/2021/desktop-telematico-mitm-to-rce +CVE-2021-30030 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html +CVE-2021-30034 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html +CVE-2021-30039 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html +CVE-2021-30042 - http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html +CVE-2021-30044 - http://packetstormsecurity.com/files/162262/RemoteClinic-2-Cross-Site-Scripting.html +CVE-2021-30046 - https://github.com/ukoethe/vigra/issues/494 +CVE-2021-30047 - https://www.exploit-db.com/exploits/49719 +CVE-2021-30048 - https://github.com/201206030/novel-plus/issues/39 +CVE-2021-30048 - https://www.exploit-db.com/exploits/49724 +CVE-2021-30055 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/SQLi-KnowageSuite.md +CVE-2021-30056 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite.md +CVE-2021-30057 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/HTLM-Injection-KnowageSuite.md +CVE-2021-30058 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSSI-KnowageSuite.md +CVE-2021-3007 - https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md +CVE-2021-30072 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-30083 - https://github.com/WebFairyNet/Mediat/issues/3 +CVE-2021-3010 - https://www.exploit-db.com/exploits/49578 +CVE-2021-30108 - https://github.com/liufee/cms/issues/57 +CVE-2021-30109 - https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md +CVE-2021-30110 - https://blog.grimm-co.com/2021/04/time-for-upgrade.html +CVE-2021-30111 - https://github.com/0xrayan/CVEs/issues/4 +CVE-2021-30112 - https://github.com/0xrayan/CVEs/issues/3 +CVE-2021-30113 - https://github.com/0xrayan/CVEs/issues/1 +CVE-2021-30114 - https://github.com/0xrayan/CVEs/issues/2 +CVE-2021-30117 - https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021 +CVE-2021-30123 - https://trac.ffmpeg.org/ticket/8863 +CVE-2021-30129 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-30129 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-30133 - https://support1.cloverdx.com/hc/en-us/articles/360021006520 +CVE-2021-30134 - https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7 +CVE-2021-3014 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md +CVE-2021-3014 - https://m4dm0e.github.io/2021/01/04/mikrotik-xss-reflected.html +CVE-2021-30140 - http://packetstormsecurity.com/files/167228/LiquidFiles-3.4.15-Cross-Site-Scripting.html +CVE-2021-30145 - https://devel0pment.de/?p=2217 +CVE-2021-30146 - https://github.com/Security-AVS/CVE-2021-30146 +CVE-2021-30147 - http://packetstormsecurity.com/files/162136/DMA-Radius-Manager-4.4.0-Cross-Site-Request-Forgery.html +CVE-2021-30149 - http://packetstormsecurity.com/files/162128/Composr-10.0.36-Shell-Upload.html +CVE-2021-30150 - http://packetstormsecurity.com/files/162111/Composr-CMS-10.0.36-Cross-Site-Scripting.html +CVE-2021-30151 - https://github.com/mperham/sidekiq/issues/4852 +CVE-2021-30178 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=919f4ebc598701670e80e31573a58f1f2d2bf918 +CVE-2021-3018 - http://packetstormsecurity.com/files/160815/IPeakCMS-3.5-SQL-Injection.html +CVE-2021-3018 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2020-12-07-ipeak-cms-sqli.md +CVE-2021-3018 - https://m4dm0e.github.io/2020/12/07/ipeak-cms-sqli.html +CVE-2021-30201 - https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021 +CVE-2021-30203 - https://github.com/zyx0814/dzzoffice/issues/183 +CVE-2021-30211 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-surname.md +CVE-2021-30212 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/Stored-XSS-KnowageSuite7-3-notes.md +CVE-2021-30213 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md +CVE-2021-30214 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/CSTI-KnowageSuite7-3.md +CVE-2021-30224 - https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760 +CVE-2021-3025 - http://packetstormsecurity.com/files/160830/IPS-Community-Suite-4.5.4-SQL-Injection.html +CVE-2021-30254 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30255 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30256 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30257 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30258 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30259 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30260 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-30261 - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin +CVE-2021-30262 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30263 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30264 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30265 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30266 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30267 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30268 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30269 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30270 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30271 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30272 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30273 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30274 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30275 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30276 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30278 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30279 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30282 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30283 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30284 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30285 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30287 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30288 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30289 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30290 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-30291 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30292 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30293 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30294 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-30295 - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin +CVE-2021-30297 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30298 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30300 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30301 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30302 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30303 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30304 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30305 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30306 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30307 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30308 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30309 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30310 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30311 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30312 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30313 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30314 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30315 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30316 - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin +CVE-2021-30317 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30318 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30319 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30321 - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin +CVE-2021-30322 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30323 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30324 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30325 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30326 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-30328 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-30329 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-30330 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30331 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-30332 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-30333 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-30335 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30336 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30337 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30348 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30351 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-30353 - https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin +CVE-2021-30468 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-30468 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-30480 - https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own +CVE-2021-30481 - https://news.ycombinator.com/item?id=26762170 +CVE-2021-30481 - https://www.youtube.com/watch?v=rNQn--9xR1Q +CVE-2021-30493 - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ +CVE-2021-30493 - https://versprite.com/security-resources/ +CVE-2021-30494 - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ +CVE-2021-30494 - https://versprite.com/security-resources/ +CVE-2021-30496 - https://t.me/joinchat/bJ9cnUosVh03ZTI0 +CVE-2021-30498 - https://github.com/cacalabs/libcaca/issues/53 +CVE-2021-30499 - https://github.com/cacalabs/libcaca/issues/54 +CVE-2021-30500 - https://github.com/upx/upx/issues/485 +CVE-2021-30501 - https://github.com/upx/upx/issues/486 +CVE-2021-30522 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1251 +CVE-2021-30528 - http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html +CVE-2021-30561 - http://packetstormsecurity.com/files/163835/Chrome-JS-WasmJs-InstallConditionalFeatures-Object-Corruption.html +CVE-2021-3060 - https://security.paloaltonetworks.com/CVE-2021-3060 +CVE-2021-30602 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348 +CVE-2021-30603 - http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html +CVE-2021-30625 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352 +CVE-2021-30632 - http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html +CVE-2021-30635 - https://support.sonatype.com/hc/en-us/articles/1500006879561 +CVE-2021-30637 - http://packetstormsecurity.com/files/162195/htmly-2.8.0-Cross-Site-Scripting.html +CVE-2021-30639 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-30639 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-30640 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-30640 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-30640 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-30641 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/25 +CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/27 +CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/29 +CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/38 +CVE-2021-30858 - http://seclists.org/fulldisclosure/2021/Sep/39 +CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/25 +CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/26 +CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/27 +CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/28 +CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/38 +CVE-2021-30860 - http://seclists.org/fulldisclosure/2021/Sep/39 +CVE-2021-30917 - http://packetstormsecurity.com/files/165075/Apple-ColorSync-CMMNDimLinear-Interpolate-Uninitialized-Memory.html +CVE-2021-30934 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-30936 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-30937 - http://packetstormsecurity.com/files/165475/XNU-inm_merge-Heap-Use-After-Free.html +CVE-2021-30939 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1414 +CVE-2021-30942 - http://packetstormsecurity.com/files/165559/Apple-ColorSync-Out-Of-Bounds-Read.html +CVE-2021-30949 - http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html +CVE-2021-30951 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-30952 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-30953 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-30954 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-30984 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-3100 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities +CVE-2021-3101 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities +CVE-2021-3110 - https://medium.com/@gondaliyajaimin797/cve-2021-3110-75a24943ca5e +CVE-2021-3110 - https://www.exploit-db.com/exploits/49410 +CVE-2021-3111 - http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html +CVE-2021-3111 - http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html +CVE-2021-3113 - https://www.exploit-db.com/exploits/49435 +CVE-2021-3113 - https://www.netsia.com/#netsiaseba +CVE-2021-3113 - https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html +CVE-2021-31152 - http://packetstormsecurity.com/files/162258/Multilaser-Router-RE018-AC1200-Cross-Site-Request-Forgery.html +CVE-2021-31152 - https://www.youtube.com/watch?v=zN3DVrcu6Eg +CVE-2021-31156 - https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8 +CVE-2021-31159 - http://packetstormsecurity.com/files/163192/Zoho-ManageEngine-ServiceDesk-Plus-9.4-User-Enumeration.html +CVE-2021-31159 - https://www.manageengine.com +CVE-2021-31159 - https://www.manageengine.com/products/service-desk-msp/readme.html#10519 +CVE-2021-3116 - https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/ +CVE-2021-31160 - https://www.manageengine.com/products/service-desk-msp/readme.html#10521 +CVE-2021-31162 - https://github.com/rust-lang/rust/issues/83618 +CVE-2021-31165 - http://packetstormsecurity.com/files/162555/Windows-Container-Manager-Service-CmsRpcSrv_CreateContainer-Privilege-Escalation.html +CVE-2021-31166 - http://packetstormsecurity.com/files/162722/Microsoft-HTTP-Protocol-Stack-Remote-Code-Execution.html +CVE-2021-31167 - http://packetstormsecurity.com/files/162559/Windows-Container-Manager-Service-CmsRpcSrv_MapNamedPipeToContainer-Privilege-Escalation.html +CVE-2021-31168 - http://packetstormsecurity.com/files/162556/Windows-Container-Manager-Service-CmsRpcSrv_MapVirtualDiskToContainer-Privilege-Escalation.html +CVE-2021-31169 - http://packetstormsecurity.com/files/162557/Windows-Container-Manager-Service-Arbitrary-Object-Directory-Creation-Privilege-Escalation.html +CVE-2021-3118 - https://www.exploit-db.com/exploits/49392 +CVE-2021-31181 - http://packetstormsecurity.com/files/163208/Microsoft-SharePoint-Unsafe-Control-And-ViewState-Remote-Code-Execution.html +CVE-2021-3120 - https://github.com/guy-liu/yith-giftdrop +CVE-2021-31207 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html +CVE-2021-3122 - https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 +CVE-2021-3122 - https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/ +CVE-2021-31220 - https://advisories.stormshield.eu +CVE-2021-31220 - https://advisories.stormshield.eu/2021-022/ +CVE-2021-31221 - https://advisories.stormshield.eu +CVE-2021-31221 - https://advisories.stormshield.eu/2021-023/ +CVE-2021-31222 - https://advisories.stormshield.eu +CVE-2021-31222 - https://advisories.stormshield.eu/2021-024/ +CVE-2021-31223 - https://advisories.stormshield.eu +CVE-2021-31223 - https://advisories.stormshield.eu/2021-025/ +CVE-2021-31224 - https://advisories.stormshield.eu +CVE-2021-31224 - https://advisories.stormshield.eu/2021-026/ +CVE-2021-31225 - https://advisories.stormshield.eu +CVE-2021-31225 - https://advisories.stormshield.eu/2021-027/ +CVE-2021-31226 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-31226 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-31227 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-31227 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-31228 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-31228 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-31239 - https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239 +CVE-2021-31239 - https://www.sqlite.org/forum/forumpost/d9fce1a89b +CVE-2021-3124 - https://www.exploit-db.com/exploits/49406 +CVE-2021-31240 - https://github.com/libming/libming/issues/218 +CVE-2021-31245 - https://medium.com/d3crypt/timing-attack-on-openmptcprouter-vps-admin-authentication-cve-2021-31245-12dd92303e1 +CVE-2021-31249 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249 +CVE-2021-31250 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250 +CVE-2021-31251 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251 +CVE-2021-31252 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31252 +CVE-2021-31254 - https://github.com/gpac/gpac/issues/1703 +CVE-2021-31255 - https://github.com/gpac/gpac/issues/1733 +CVE-2021-31256 - https://github.com/gpac/gpac/issues/1705 +CVE-2021-31257 - https://github.com/gpac/gpac/issues/1734 +CVE-2021-31258 - https://github.com/gpac/gpac/issues/1706 +CVE-2021-31259 - https://github.com/gpac/gpac/issues/1735 +CVE-2021-31260 - https://github.com/gpac/gpac/issues/1736 +CVE-2021-31261 - https://github.com/gpac/gpac/issues/1737 +CVE-2021-31262 - https://github.com/gpac/gpac/issues/1738 +CVE-2021-31280 - https://github.com/fmsdwifull/tp5cms/issues/8 +CVE-2021-3129 - http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html +CVE-2021-3129 - http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html +CVE-2021-31315 - https://www.shielder.it/advisories/telegram-rlottie-blit-stack-buffer-overflow/ +CVE-2021-31316 - https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/ +CVE-2021-31317 - https://www.shielder.it/advisories/telegram-rlottie-vdasher-vdasher-type-confusion/ +CVE-2021-31318 - https://www.shielder.it/advisories/telegram-rlottie-lotcomplayeritem-lotcomplayeritem-type-confusion/ +CVE-2021-31319 - https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-integer-overflow/ +CVE-2021-31320 - https://www.shielder.it/advisories/telegram-rlottie-vgradientcache-generategradientcolortable-heap-buffer-overflow/ +CVE-2021-31321 - https://www.shielder.it/advisories/telegram-rlottie-gray_split_cubic-stack-buffer-overflow/ +CVE-2021-31322 - https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-heap-buffer-overflow/ +CVE-2021-31323 - https://www.shielder.it/advisories/telegram-rlottie-lottieparserimpl-parsedashproperty-heap-buffer-overflow/ +CVE-2021-31324 - https://www.shielder.it/advisories/centos-web-panel-idsession-root-rce/ +CVE-2021-31326 - https://github.com/GD008/vuln/blob/main/DIR-816_reset.md +CVE-2021-31326 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-31329 - https://github.com/remoteclinic/RemoteClinic/issues/16 +CVE-2021-31330 - https://mattschmidt.net/2021/04/14/review-board-xss-discovered/ +CVE-2021-3137 - https://www.exploit-db.com/exploits/49437 +CVE-2021-3138 - http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html +CVE-2021-3138 - https://github.com/Mesh3l911/Disource +CVE-2021-31384 - https://kb.juniper.net/ +CVE-2021-31400 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-31400 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-31401 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-31401 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-31408 - https://github.com/vaadin/flow/pull/10577 +CVE-2021-3144 - https://github.com/saltstack/salt/releases +CVE-2021-31440 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36 +CVE-2021-3145 - http://packetstormsecurity.com/files/164085/Ionic-Identity-Vault-4.7-Android-Biometric-Authentication-Bypass.html +CVE-2021-31476 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-3148 - https://github.com/saltstack/salt/releases +CVE-2021-3149 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 +CVE-2021-3150 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 +CVE-2021-31505 - https://kb.arlo.com/000062592/Security-Advisory-for-Arlo-Q-Plus-SSH-Use-of-Hard-coded-Credentials-Allowing-Privilege-Escalation +CVE-2021-3151 - http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html +CVE-2021-3151 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 +CVE-2021-31530 - https://www.manageengine.com/products/service-desk-msp/readme.html#10522 +CVE-2021-31531 - https://www.manageengine.com/products/service-desk-msp/readme.html#10521 +CVE-2021-31532 - https://oxide.computer/blog/lpc55/ +CVE-2021-31535 - http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html +CVE-2021-31535 - http://seclists.org/fulldisclosure/2021/May/52 +CVE-2021-31535 - https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ +CVE-2021-31535 - https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt +CVE-2021-31537 - http://seclists.org/fulldisclosure/2021/May/20 +CVE-2021-31538 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-010.txt +CVE-2021-31539 - https://www.gruppotim.it/redteam +CVE-2021-31540 - https://www.gruppotim.it/redteam +CVE-2021-31552 - https://phabricator.wikimedia.org/T152394 +CVE-2021-3156 - http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html +CVE-2021-3156 - http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html +CVE-2021-3156 - http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html +CVE-2021-3156 - http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html +CVE-2021-3156 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html +CVE-2021-3156 - http://seclists.org/fulldisclosure/2024/Feb/3 +CVE-2021-3156 - http://www.openwall.com/lists/oss-security/2024/01/30/6 +CVE-2021-3156 - http://www.openwall.com/lists/oss-security/2024/01/30/8 +CVE-2021-3156 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-3156 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3156 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-31583 - http://packetstormsecurity.com/files/162316/Sipwise-C5-NGCP-CSC-Cross-Site-Scripting.html +CVE-2021-31583 - https://www.zeroscience.mk/en/vulnerabilities +CVE-2021-31583 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5648.php +CVE-2021-31584 - http://packetstormsecurity.com/files/162318/Sipwise-C5-NGCP-CSC-Cross-Site-Request-Forgery.html +CVE-2021-31584 - https://www.zeroscience.mk/en/vulnerabilities +CVE-2021-31584 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5649.php +CVE-2021-31589 - http://packetstormsecurity.com/files/165408/BeyondTrust-Remote-Support-6.0-Cross-Site-Scripting.html +CVE-2021-31589 - https://cxsecurity.com/issue/WLB-2022010013 +CVE-2021-31599 - http://packetstormsecurity.com/files/164772/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Remote-Code-Execution.html +CVE-2021-31600 - http://packetstormsecurity.com/files/164787/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-User-Enumeration.html +CVE-2021-31601 - http://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html +CVE-2021-31602 - http://packetstormsecurity.com/files/164784/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Authentication-Bypass.html +CVE-2021-31604 - http://packetstormsecurity.com/files/164281/OpenVPN-Monitor-1.1.3-Cross-Site-Request-Forgery.html +CVE-2021-31605 - http://packetstormsecurity.com/files/164278/OpenVPN-Monitor-1.1.3-Command-Injection.html +CVE-2021-31606 - http://packetstormsecurity.com/files/164274/OpenVPN-Monitor-1.1.3-Authorization-Bypass-Denial-Of-Service.html +CVE-2021-31607 - https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/ +CVE-2021-31609 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31610 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31611 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31612 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31613 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31616 - https://blog.inhq.net/posts/keepkey-CVE-2021-31616/ +CVE-2021-31617 - https://advisories.stormshield.eu/ +CVE-2021-31617 - https://advisories.stormshield.eu/2021-020/ +CVE-2021-31618 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-31624 - https://github.com/Lyc-heng/routers/blob/main/routers/stack2.md +CVE-2021-31627 - https://github.com/Lyc-heng/routers/blob/main/routers/stack3.md +CVE-2021-3163 - https://github.com/quilljs/quill/issues/3364 +CVE-2021-31630 - https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html +CVE-2021-31630 - https://www.youtube.com/watch?v=l08DHB08Gow +CVE-2021-3164 - https://github.com/rmccarth/cve-2021-3164 +CVE-2021-31641 - http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html +CVE-2021-31641 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641 +CVE-2021-31642 - http://packetstormsecurity.com/files/162934/CHIYU-IoT-Denial-Of-Service.html +CVE-2021-31642 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642 +CVE-2021-31643 - http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html +CVE-2021-31643 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31643 +CVE-2021-31645 - https://www.exploit-db.com/exploits/49773 +CVE-2021-3165 - https://packetstormsecurity.com/files/160906/SmartAgent-3.1.0-Privilege-Escalation.html +CVE-2021-31650 - https://www.exploit-db.com/exploits/49493 +CVE-2021-31655 - https://github.com/yinfeidi/Vuls/blob/main/TRENDnet%20TV-IP110WN/CVE-2021-31655.md +CVE-2021-31658 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31658 +CVE-2021-31659 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31659 +CVE-2021-3166 - https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-17-dsl-n14u.md +CVE-2021-3166 - https://kaisersource.github.io/dsl-n14u +CVE-2021-31660 - https://github.com/RIOT-OS/RIOT/commit/85da504d2dc30188b89f44c3276fc5a25b31251f +CVE-2021-31660 - https://github.com/RIOT-OS/RIOT/pull/15947 +CVE-2021-31661 - https://github.com/RIOT-OS/RIOT/commit/609c9ada34da5546cffb632a98b7ba157c112658 +CVE-2021-31661 - https://github.com/RIOT-OS/RIOT/pull/15945 +CVE-2021-31662 - https://github.com/RIOT-OS/RIOT/commit/07f1254d8537497552e7dce80364aaead9266bbe +CVE-2021-31662 - https://github.com/RIOT-OS/RIOT/pull/15930 +CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/commit/bc59d60be60dfc0a05def57d74985371e4f22d79 +CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/issues/15927 +CVE-2021-31663 - https://github.com/RIOT-OS/RIOT/pull/15929 +CVE-2021-31664 - https://github.com/RIOT-OS/RIOT/commit/44741ff99f7a71df45420635b238b9c22093647a +CVE-2021-31664 - https://github.com/RIOT-OS/RIOT/pull/15345 +CVE-2021-31673 - http://packetstormsecurity.com/files/167040/Cyclos-4.14.7-Cross-Site-Scripting.html +CVE-2021-31674 - https://www.exploit-db.com/exploits/50908 +CVE-2021-31676 - https://github.com/RO6OTXX/pescms_vulnerability +CVE-2021-31676 - https://github.com/lazyphp/PESCMS-TEAM/issues/7 +CVE-2021-31676 - https://github.com/two-kisses/pescms_vulnerability, +CVE-2021-31677 - https://github.com/RO6OTXX/pescms_vulnerability +CVE-2021-31677 - https://github.com/lazyphp/PESCMS-TEAM/issues/7, +CVE-2021-31677 - https://github.com/two-kisses/pescms_vulnerability, +CVE-2021-31678 - https://github.com/RO6OTXX/pescms_vulnerability +CVE-2021-31678 - https://github.com/lazyphp/PESCMS-TEAM/issues/7 +CVE-2021-31678 - https://github.com/two-kisses/pescms_vulnerability +CVE-2021-31679 - https://github.com/RO6OTXX/pescms_vulnerability +CVE-2021-31679 - https://github.com/lazyphp/PESCMS-TEAM/issues/7 +CVE-2021-31679 - https://github.com/two-kisses/pescms_vulnerability, +CVE-2021-31680 - https://huntr.dev/bounties/1-other-yolov5/ +CVE-2021-31681 - https://huntr.dev/bounties/1-other-yolov3/ +CVE-2021-31682 - http://packetstormsecurity.com/files/164707/WebCTRL-OEM-6.5-Cross-Site-Scripting.html +CVE-2021-31684 - https://github.com/netplex/json-smart-v2/issues/67 +CVE-2021-31684 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-31684 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3169 - https://mp.weixin.qq.com/s/5tgcaIrnDnGP-LvWPw9YCg +CVE-2021-31693 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html +CVE-2021-31721 - http://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html +CVE-2021-31721 - https://www.exploit-db.com/exploits/49859 +CVE-2021-31727 - https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31727.md +CVE-2021-31728 - https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31728.md +CVE-2021-31738 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-024.txt +CVE-2021-31755 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3 +CVE-2021-31756 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1 +CVE-2021-31757 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4 +CVE-2021-31758 - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_2 +CVE-2021-31760 - https://github.com/Mesh3l911/CVE-2021-31760 +CVE-2021-31760 - https://github.com/electronicbots/CVE-2021-31760 +CVE-2021-31760 - https://youtu.be/D45FN8QrzDo +CVE-2021-31761 - http://packetstormsecurity.com/files/163559/Webmin-1.973-Cross-Site-Request-Forgery.html +CVE-2021-31761 - https://github.com/Mesh3l911/CVE-2021-31761 +CVE-2021-31761 - https://github.com/electronicbots/CVE-2021-31761 +CVE-2021-31762 - http://packetstormsecurity.com/files/163492/Webmin-1.973-Cross-Site-Request-Forgery.html +CVE-2021-31762 - https://github.com/Mesh3l911/CVE-2021-31762 +CVE-2021-31762 - https://github.com/electronicbots/CVE-2021-31762 +CVE-2021-31762 - https://youtu.be/qCvEXwyaF5U +CVE-2021-31769 - https://gist.github.com/bc0d3/6d55866a78f66569383241406e18794f +CVE-2021-3177 - https://bugs.python.org/issue42938 +CVE-2021-3177 - https://news.ycombinator.com/item?id=26185005 +CVE-2021-3177 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-3177 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3177 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3177 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-31777 - http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html +CVE-2021-31777 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2021-3178 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6 +CVE-2021-31785 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31786 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-31787 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-3179 - https://medium.com/@ksteo11/yet-another-password-manager-app-how-to-better-secure-it-8e9df2ce35c8 +CVE-2021-31793 - https://gist.github.com/tj-oconnor/16a4116050bbcb4717315f519b944f1f +CVE-2021-31795 - https://mcyoloswagham.github.io/linux/ +CVE-2021-31796 - http://packetstormsecurity.com/files/164023/CyberArk-Credential-File-Insufficient-Effective-Key-Space.html +CVE-2021-31796 - http://seclists.org/fulldisclosure/2021/Sep/1 +CVE-2021-31796 - https://korelogic.com/Resources/Advisories/KL-001-2021-008.txt +CVE-2021-31797 - http://packetstormsecurity.com/files/164033/CyberArk-Credential-Provider-Race-Condition-Authorization-Bypass.html +CVE-2021-31797 - http://seclists.org/fulldisclosure/2021/Sep/2 +CVE-2021-31797 - https://korelogic.com/Resources/Advisories/KL-001-2021-009.txt +CVE-2021-31798 - http://packetstormsecurity.com/files/164035/CyberArk-Credential-Provider-Local-Cache-Decryption.html +CVE-2021-31798 - http://seclists.org/fulldisclosure/2021/Sep/3 +CVE-2021-31798 - https://korelogic.com/Resources/Advisories/KL-001-2021-010.txt +CVE-2021-31799 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-31800 - https://github.com/SecureAuthCorp/impacket/releases +CVE-2021-31805 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-31810 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-31811 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-31811 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-31811 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-31811 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-31811 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-31812 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-31812 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-31812 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-31812 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-31813 - https://raxis.com/blog/cve-2021-31813 +CVE-2021-31814 - https://advisories.stormshield.eu/ +CVE-2021-31814 - https://advisories.stormshield.eu/2021-019/ +CVE-2021-31815 - https://themarkup.org/privacy/2021/04/27/google-promised-its-contact-tracing-app-was-completely-private-but-it-wasnt +CVE-2021-31826 - https://issues.shibboleth.net/jira/browse/SSPCPP-927 +CVE-2021-31829 - http://www.openwall.com/lists/oss-security/2021/05/04/4 +CVE-2021-3183 - https://seclists.org/fulldisclosure/2021/Jan/20 +CVE-2021-31830 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 +CVE-2021-31831 - https://kc.mcafee.com/corporate/index?page=content&id=SB10359 +CVE-2021-31832 - https://kc.mcafee.com/corporate/index?page=content&id=SB10360 +CVE-2021-31833 - https://kc.mcafee.com/corporate/index?page=content&id=SB10370 +CVE-2021-31834 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-31835 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-31836 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 +CVE-2021-31837 - https://kc.mcafee.com/corporate/index?page=content&id=SB10363 +CVE-2021-31838 - https://kc.mcafee.com/corporate/index?page=content&id=SB10342 +CVE-2021-31839 - https://kc.mcafee.com/corporate/index?page=content&id=SB10362 +CVE-2021-31840 - https://kc.mcafee.com/corporate/index?page=content&id=SB10362 +CVE-2021-31841 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 +CVE-2021-31842 - https://kc.mcafee.com/corporate/index?page=content&id=SB10367 +CVE-2021-31843 - https://kc.mcafee.com/corporate/index?page=content&id=SB10367 +CVE-2021-31844 - https://kc.mcafee.com/corporate/index?page=content&id=SB10368 +CVE-2021-31845 - https://kc.mcafee.com/corporate/index?page=content&id=SB10368 +CVE-2021-31847 - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 +CVE-2021-31848 - https://kc.mcafee.com/corporate/index?page=content&id=SB10371 +CVE-2021-31849 - https://kc.mcafee.com/corporate/index?page=content&id=SB10371 +CVE-2021-31850 - https://kc.mcafee.com/corporate/index?page=content&id=SB10358 +CVE-2021-31851 - https://kc.mcafee.com/corporate/index?page=content&id=SB10372 +CVE-2021-31852 - https://kc.mcafee.com/corporate/index?page=content&id=SB10372 +CVE-2021-31853 - https://kc.mcafee.com/corporate/index?page=content&id=SB10374 +CVE-2021-31854 - https://kc.mcafee.com/corporate/index?page=content&id=SB10378 +CVE-2021-31857 - https://www.manageengine.com +CVE-2021-31859 - https://www.ysoft.com/en +CVE-2021-31859 - https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler +CVE-2021-3186 - http://packetstormsecurity.com/files/161119/Tenda-AC5-AC1200-Wireless-Cross-Site-Scripting.html +CVE-2021-31862 - https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md +CVE-2021-31867 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-31869 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-31874 - https://blog.stmcyber.com/vulns/cve-2021-31874/ +CVE-2021-31876 - https://github.com/bitcoin/bitcoin +CVE-2021-31878 - http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html +CVE-2021-3188 - https://wehackmx.com/security-research/WeHackMX-2021-001/ +CVE-2021-31916 - https://seclists.org/oss-sec/2021/q1/268 +CVE-2021-31923 - https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html +CVE-2021-31932 - http://packetstormsecurity.com/files/165964/Nokia-Transport-Module-Authentication-Bypass.html +CVE-2021-31933 - http://packetstormsecurity.com/files/162572/Chamilo-LMS-1.11.14-Remote-Code-Execution.html +CVE-2021-31934 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html +CVE-2021-31935 - https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html +CVE-2021-3195 - https://github.com/bitcoin/bitcoin/issues/20866 +CVE-2021-31950 - http://packetstormsecurity.com/files/163080/Microsoft-SharePoint-Server-16.0.10372.20060-Server-Side-Request-Forgery.html +CVE-2021-31959 - http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html +CVE-2021-31962 - http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html +CVE-2021-3197 - https://github.com/saltstack/salt/releases +CVE-2021-31970 - http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html +CVE-2021-3198 - https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/ +CVE-2021-31985 - http://packetstormsecurity.com/files/163443/MpEngine-ASProtect-Embedded-Runtime-DLL-Memory-Corruption.html +CVE-2021-31987 - https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf +CVE-2021-3199 - https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFile.py +CVE-2021-3199 - https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py +CVE-2021-3200 - https://github.com/openSUSE/libsolv/issues/416 +CVE-2021-3200 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334 +CVE-2021-3200 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32002 - https://www.secomea.com/support/cybersecurity-advisory +CVE-2021-32003 - https://www.secomea.com/support/cybersecurity-advisory +CVE-2021-32004 - https://www.secomea.com/support/cybersecurity-advisory/#4578 +CVE-2021-32005 - https://www.secomea.com/support/cybersecurity-advisory/#5017 +CVE-2021-32006 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2021-32008 - https://www.secomea.com/support/cybersecurity-advisory +CVE-2021-32009 - https://www.secomea.com/support/cybersecurity-advisory +CVE-2021-32010 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2021-32012 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32013 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32014 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32021 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685 +CVE-2021-32022 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685 +CVE-2021-32023 - https://support.blackberry.com/kb/articleDetail?articleNumber=000088685 +CVE-2021-32033 - http://packetstormsecurity.com/files/163223/Protectimus-SLIM-NFC-Time-Manipulation.html +CVE-2021-32033 - http://seclists.org/fulldisclosure/2021/Jun/39 +CVE-2021-32033 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt +CVE-2021-32051 - http://packetstormsecurity.com/files/162534/Hexagon-G-nius-Auskunftsportal-SQL-Injection.html +CVE-2021-32051 - https://gist.githubusercontent.com/mke1985/a21a71098f48829916dfec74eff1e24a/raw/f635b060ad03e23fd887de48a79b70040daadadb/CVE-2021-32051 +CVE-2021-32066 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32089 - https://www.securifera.com/advisories/cve-2021-32089/ +CVE-2021-32089 - https://www.zebra.com/us/en/support-downloads/rfid/rfid-readers/fx9500.html +CVE-2021-32098 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack +CVE-2021-32099 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack +CVE-2021-3210 - https://github.com/BloodHoundAD/BloodHound/issues/338 +CVE-2021-32100 - https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack +CVE-2021-32132 - https://github.com/gpac/gpac/issues/1753 +CVE-2021-32134 - https://github.com/gpac/gpac/issues/1756 +CVE-2021-32135 - https://github.com/gpac/gpac/issues/1757 +CVE-2021-32136 - https://github.com/gpac/gpac/issues/1765 +CVE-2021-32137 - https://github.com/gpac/gpac/issues/1766 +CVE-2021-32138 - https://github.com/gpac/gpac/issues/1767 +CVE-2021-32139 - https://github.com/gpac/gpac/issues/1768 +CVE-2021-32142 - https://github.com/LibRaw/LibRaw/issues/400 +CVE-2021-32156 - https://github.com/Mesh3l911/CVE-2021-32156 +CVE-2021-32157 - https://github.com/Mesh3l911/CVE-2021-32157 +CVE-2021-32158 - https://github.com/Mesh3l911/CVE-2021-32158 +CVE-2021-32159 - https://github.com/Mesh3l911/CVE-2021-32159 +CVE-2021-32160 - https://github.com/Mesh3l911/CVE-2021-32160 +CVE-2021-32161 - https://github.com/Mesh3l911/CVE-2021-32161 +CVE-2021-32162 - https://github.com/Mesh3l911/CVE-2021-32162 +CVE-2021-32172 - http://packetstormsecurity.com/files/164445/Maian-Cart-3.8-Remote-Code-Execution.html +CVE-2021-32172 - https://dreyand.github.io/maian-cart-rce/ +CVE-2021-32172 - https://github.com/DreyAnd/maian-cart-rce +CVE-2021-32238 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-32238 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5651.php +CVE-2021-3224 - https://github.com/cskaza/cszcms/issues/28 +CVE-2021-32256 - https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 +CVE-2021-32263 - https://github.com/brackeen/ok-file-formats/issues/13 +CVE-2021-32265 - https://github.com/axiomatic-systems/Bento4/issues/545 +CVE-2021-32268 - https://github.com/gpac/gpac/issues/1587 +CVE-2021-32269 - https://github.com/gpac/gpac/issues/1574 +CVE-2021-32270 - https://github.com/gpac/gpac/issues/1586 +CVE-2021-32271 - https://github.com/gpac/gpac/issues/1575 +CVE-2021-32272 - https://github.com/knik0/faad2/issues/57 +CVE-2021-32273 - https://github.com/knik0/faad2/issues/56 +CVE-2021-32274 - https://github.com/knik0/faad2/issues/60 +CVE-2021-32275 - https://github.com/grame-cncm/faust/issues/482 +CVE-2021-32276 - https://github.com/knik0/faad2/issues/58 +CVE-2021-32277 - https://github.com/knik0/faad2/issues/59 +CVE-2021-32278 - https://github.com/knik0/faad2/issues/62 +CVE-2021-32281 - https://github.com/marcobambini/gravity/issues/313 +CVE-2021-32282 - https://github.com/marcobambini/gravity/issues/315 +CVE-2021-32283 - https://github.com/marcobambini/gravity/issues/314 +CVE-2021-32284 - https://github.com/marcobambini/gravity/issues/321 +CVE-2021-32285 - https://github.com/marcobambini/gravity/issues/319 +CVE-2021-32286 - https://github.com/ZerBea/hcxtools/issues/155 +CVE-2021-32287 - https://github.com/nokiatech/heif/issues/86 +CVE-2021-32288 - https://github.com/nokiatech/heif/issues/87 +CVE-2021-32289 - https://github.com/nokiatech/heif/issues/85 +CVE-2021-32292 - https://github.com/json-c/json-c/issues/654 +CVE-2021-32294 - https://github.com/drbye78/libgig/issues/1 +CVE-2021-32297 - https://github.com/lief-project/LIEF/issues/449 +CVE-2021-32298 - https://github.com/svanderburg/libiff/issues/10 +CVE-2021-32299 - https://github.com/mmp/pbrt-v3/issues/296 +CVE-2021-32305 - http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html +CVE-2021-3236 - https://github.com/vim/vim/issues/7674 +CVE-2021-3239 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101821 +CVE-2021-3239 - https://packetstormsecurity.com/files/160966/E-Learning-System-1.0-SQL-Injection-Shell-Upload.html +CVE-2021-3239 - https://www.exploit-db.com/exploits/49434 +CVE-2021-32399 - http://www.openwall.com/lists/oss-security/2021/05/11/2 +CVE-2021-32403 - http://packetstormsecurity.com/files/163023/Intelbras-Router-RF-301K-Cross-Site-Request-Forgery.html +CVE-2021-32403 - https://www.youtube.com/watch?v=1Ed-2xBFG3M +CVE-2021-32415 - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm +CVE-2021-32426 - https://github.com/Galapag0s/Trendnet_TW100-S4W1CA/blob/main/writeup_XSS.txt +CVE-2021-3243 - https://drivertom.blogspot.com/2021/01/wfilter-icf-0day-rce.html +CVE-2021-32434 - https://github.com/leesavide/abcm2ps/issues/83 +CVE-2021-32435 - https://github.com/leesavide/abcm2ps/issues/84 +CVE-2021-32436 - https://github.com/leesavide/abcm2ps/issues/85 +CVE-2021-32437 - https://github.com/gpac/gpac/issues/1770 +CVE-2021-32438 - https://github.com/gpac/gpac/issues/1769 +CVE-2021-32439 - https://github.com/gpac/gpac/issues/1774 +CVE-2021-32440 - https://github.com/gpac/gpac/issues/1772 +CVE-2021-32457 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230 +CVE-2021-32458 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1231 +CVE-2021-32459 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241 +CVE-2021-3246 - https://github.com/libsndfile/libsndfile/issues/687 +CVE-2021-32467 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-32468 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-32469 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-32489 - https://blog.inhq.net/posts/yubico-libyubihsm-vuln2/#second-attack-variant-cve-pending +CVE-2021-3252 - https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01 +CVE-2021-32537 - http://packetstormsecurity.com/files/163498/Realtek-RTKVHD64.sys-Out-Of-Bounds-Access.html +CVE-2021-3254 - https://kaisersource.github.io/dsl-n14u-syn +CVE-2021-32547 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32548 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32549 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32550 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32551 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32552 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32553 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32554 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32555 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32556 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32557 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 +CVE-2021-32558 - http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html +CVE-2021-3256 - https://github.com/poropro/kuaifan/issues/3 +CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/1 +CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/2 +CVE-2021-32568 - https://huntr.dev/bounties/04fc04b3-2dc1-4cad-a090-e403cd66b5ad +CVE-2021-32569 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html +CVE-2021-32570 - https://www.ericsson.com +CVE-2021-32570 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2021-32571 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html +CVE-2021-32604 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29000 +CVE-2021-32605 - https://srcincite.io/advisories/src-2021-0015/ +CVE-2021-32612 - http://seclists.org/fulldisclosure/2021/Jun/45 +CVE-2021-32612 - https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt +CVE-2021-32612 - https://trovent.io/security-advisory-2105-01 +CVE-2021-32617 - https://github.com/Exiv2/exiv2/pull/1657 +CVE-2021-32618 - https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c +CVE-2021-3262 - https://susos.co/blog/f/cve-disclosureuncovered-sql-injection-in-tripspark-veo-transport +CVE-2021-32626 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32627 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32628 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32633 - https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/ +CVE-2021-32640 - https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff +CVE-2021-32640 - https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 +CVE-2021-32672 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32675 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32682 - http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html +CVE-2021-32687 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32695 - https://hackerone.com/reports/1142918 +CVE-2021-32706 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-5cm9-6p3m-v259 +CVE-2021-3271 - https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/ +CVE-2021-32718 - http://seclists.org/fulldisclosure/2021/Dec/3 +CVE-2021-32719 - https://herolab.usd.de/security-advisories/usd-2021-0011/ +CVE-2021-3272 - https://github.com/jasper-software/jasper/issues/259 +CVE-2021-32723 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32749 - https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm +CVE-2021-3275 - http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html +CVE-2021-3275 - https://github.com/smriti548/CVE/blob/main/CVE-2021-3275 +CVE-2021-3275 - https://seclists.org/fulldisclosure/2021/Mar/67 +CVE-2021-32751 - https://medium.com/dot-debug/the-perils-of-bash-eval-cc5f9e309cae +CVE-2021-32762 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3278 - http://packetstormsecurity.com/files/162919/Local-Service-Search-Engine-Management-System-1.0-SQL-Injection.html +CVE-2021-3278 - https://www.exploit-db.com/exploits/49163 +CVE-2021-32785 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32786 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3279 - https://borrachariadofael.sz.chat/webchat/conversation/6009c625415e206dc77172d3 +CVE-2021-3279 - https://www.youtube.com/watch?v=H9ttpjFVDgA +CVE-2021-32791 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32792 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-32803 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-32804 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-32808 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32808 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-32809 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32809 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-32816 - https://securitylab.github.com/advisories/GHSL-2021-027-redos-ProtonMail/ +CVE-2021-32817 - https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/ +CVE-2021-32818 - https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/ +CVE-2021-32819 - https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ +CVE-2021-32820 - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ +CVE-2021-32821 - https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ +CVE-2021-32822 - https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/ +CVE-2021-32824 - https://securitylab.github.com/advisories/GHSL-2021-034_043-apache-dubbo/ +CVE-2021-32825 - https://securitylab.github.com/advisories/GHSL-2020-258-zipslip-bblfshd/ +CVE-2021-32826 - https://securitylab.github.com/advisories/GHSL-2021-053-proxyee-down/ +CVE-2021-32827 - https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/ +CVE-2021-32827 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-32829 - https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html +CVE-2021-32829 - https://securitylab.github.com/advisories/GHSL-2021-065-zstack/ +CVE-2021-32830 - https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/ +CVE-2021-32831 - https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/ +CVE-2021-32833 - https://securitylab.github.com/advisories/GHSL-2021-051-emby/ +CVE-2021-32834 - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ +CVE-2021-32835 - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ +CVE-2021-32843 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ +CVE-2021-32844 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ +CVE-2021-32845 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ +CVE-2021-32846 - https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ +CVE-2021-32847 - https://securitylab.github.com/advisories/GHSL-2021-058-moby-hyperkit/ +CVE-2021-32850 - https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/ +CVE-2021-32851 - https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/ +CVE-2021-32854 - https://securitylab.github.com/advisories/GHSL-2021-1001-textAngular/ +CVE-2021-32855 - https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/ +CVE-2021-32856 - https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/ +CVE-2021-32857 - https://securitylab.github.com/advisories/GHSL-2021-1035_Cockpit_Next/ +CVE-2021-32858 - https://securitylab.github.com/advisories/GHSL-2021-1034_esdoc-publish-html-plugin/ +CVE-2021-32859 - https://securitylab.github.com/advisories/GHSL-2021-1042_Baremetrics_Date_Range_Picker/ +CVE-2021-32860 - https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/ +CVE-2021-32862 - https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq +CVE-2021-3287 - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html +CVE-2021-3291 - http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html +CVE-2021-3291 - https://github.com/MucahitSaratar/zencart_auth_rce_poc +CVE-2021-32917 - http://www.openwall.com/lists/oss-security/2021/05/13/1 +CVE-2021-32917 - http://www.openwall.com/lists/oss-security/2021/05/14/2 +CVE-2021-32918 - http://www.openwall.com/lists/oss-security/2021/05/13/1 +CVE-2021-32918 - http://www.openwall.com/lists/oss-security/2021/05/14/2 +CVE-2021-32919 - http://www.openwall.com/lists/oss-security/2021/05/13/1 +CVE-2021-32919 - http://www.openwall.com/lists/oss-security/2021/05/14/2 +CVE-2021-32920 - http://www.openwall.com/lists/oss-security/2021/05/13/1 +CVE-2021-32920 - http://www.openwall.com/lists/oss-security/2021/05/14/2 +CVE-2021-32921 - http://www.openwall.com/lists/oss-security/2021/05/13/1 +CVE-2021-32921 - http://www.openwall.com/lists/oss-security/2021/05/14/2 +CVE-2021-32924 - http://packetstormsecurity.com/files/162868/IPS-Community-Suite-4.5.4.2-PHP-Code-Injection.html +CVE-2021-32924 - http://seclists.org/fulldisclosure/2021/May/80 +CVE-2021-3293 - https://github.com/thinkgad/Bugs/blob/main/emlog%20v5.3.1%20has%20Full%20Path%20Disclosure%20vulnerability.md +CVE-2021-3294 - http://packetstormsecurity.com/files/161421/CASAP-Automated-Enrollment-System-1.0-Cross-Site-Scripting.html +CVE-2021-3294 - https://www.exploit-db.com/exploits/49469 +CVE-2021-32942 - https://www.aveva.com/en/support/cyber-security-updates/ +CVE-2021-3298 - https://www.exploit-db.com/exploits/49468 +CVE-2021-33032 - https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ +CVE-2021-33032 - https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf +CVE-2021-33033 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14 +CVE-2021-33033 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 +CVE-2021-33033 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 +CVE-2021-33033 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08 +CVE-2021-33034 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4 +CVE-2021-33034 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3 +CVE-2021-33037 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-33037 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-33037 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-33037 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-33037 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-33041 - https://github.com/yoshuawuyts/vmd/issues/137 +CVE-2021-33044 - http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html +CVE-2021-33044 - http://seclists.org/fulldisclosure/2021/Oct/13 +CVE-2021-33045 - http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html +CVE-2021-33045 - http://seclists.org/fulldisclosure/2021/Oct/13 +CVE-2021-3305 - https://github.com/liong007/Feishu/issues/1 +CVE-2021-33055 - https://blog.stmcyber.com/vulns/cve-2021-33055/ +CVE-2021-33057 - https://arxiv.org/pdf/2205.15202.pdf +CVE-2021-3310 - https://www.westerndigital.com/support/productsecurity/wdc-21002-my-cloud-firmware-version-5-10-122 +CVE-2021-3313 - https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt +CVE-2021-3314 - https://n4nj0.github.io/advisories/oracle-glassfish-reflected-xss/ +CVE-2021-3314 - https://www.gruppotim.it/redteam +CVE-2021-3317 - http://packetstormsecurity.com/files/161208/Klog-Server-2.4.1-Command-Injection.html +CVE-2021-3318 - http://packetstormsecurity.com/files/162314/DzzOffice-2.02.1-Cross-Site-Scripting.html +CVE-2021-33183 - https://www.synology.com/security/advisory/Synology_SA_21_08 +CVE-2021-33193 - https://portswigger.net/research/http2 +CVE-2021-33193 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-33193 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-33205 - https://www.westerndigital.com/support/productsecurity/wdc-21007-edgerover-windows-app-ver-0-25 +CVE-2021-33207 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33207 +CVE-2021-33208 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33208 +CVE-2021-3321 - http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99 +CVE-2021-33211 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-021.txt +CVE-2021-33211 - https://www.syss.de/pentest-blog/ +CVE-2021-33212 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-020.txt +CVE-2021-33212 - https://www.syss.de/pentest-blog/ +CVE-2021-33213 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-027.txt +CVE-2021-33213 - https://www.syss.de/pentest-blog/ +CVE-2021-33214 - https://labs.bishopfox.com/advisories +CVE-2021-33214 - https://labs.bishopfox.com/advisories/ecatcher-desktop-version-6.6.4 +CVE-2021-33215 - http://seclists.org/fulldisclosure/2021/May/76 +CVE-2021-33216 - http://seclists.org/fulldisclosure/2021/May/78 +CVE-2021-33217 - http://seclists.org/fulldisclosure/2021/May/77 +CVE-2021-33218 - https://seclists.org/fulldisclosure/2021/May/74 +CVE-2021-33219 - https://seclists.org/fulldisclosure/2021/May/75 +CVE-2021-33220 - http://seclists.org/fulldisclosure/2021/May/73 +CVE-2021-33221 - http://seclists.org/fulldisclosure/2021/May/72 +CVE-2021-33235 - https://github.com/michaelrsweet/htmldoc/issues/426 +CVE-2021-33236 - https://github.com/michaelrsweet/htmldoc/issues/425 +CVE-2021-3325 - https://github.com/mikaku/Monitorix/issues/309 +CVE-2021-33254 - https://awxylitol.github.io/2021/05/09/embedthis-appweb-npd-bug.html +CVE-2021-33256 - https://docs.unsafe-inline.com/0day/manageengine-adselfservice-plus-6.1-csv-injection +CVE-2021-33259 - https://github.com/jayus0821/uai-poc/blob/main/D-Link/DIR-868L/webaccess_UAI.md +CVE-2021-33259 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-3326 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3326 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-33265 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln05 +CVE-2021-33265 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33266 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln04 +CVE-2021-33266 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33267 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln02 +CVE-2021-33267 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33268 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln03 +CVE-2021-33268 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33269 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln01 +CVE-2021-33269 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33270 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln06 +CVE-2021-33270 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33271 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln11 +CVE-2021-33271 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33274 - https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln07 +CVE-2021-33274 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-3328 - https://jankopecky.net/index.php/2021/04/08/cve-2021-3328-abyss-web-server-remote-dos/ +CVE-2021-3329 - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117 +CVE-2021-33293 - https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74 +CVE-2021-33294 - https://sourceware.org/bugzilla/show_bug.cgi?id=27501 +CVE-2021-33295 - https://github.com/laurent22/joplin/commit/9c20d5947d1fa4678a8b640792ff3d31224f0adf +CVE-2021-33295 - https://github.com/laurent22/joplin/releases/tag/v1.8.5 +CVE-2021-33295 - https://the-it-wonders.blogspot.com/2021/05/joplin-app-desktop-version-vulnerable.html +CVE-2021-33318 - https://github.com/kaoudis/advisories/blob/main/0-2021.md +CVE-2021-33320 - https://issues.liferay.com/browse/LPE-17007 +CVE-2021-33321 - https://help.liferay.com/hc/en-us/articles/360050785632 +CVE-2021-33322 - https://issues.liferay.com/browse/LPE-16981 +CVE-2021-33323 - https://issues.liferay.com/browse/LPE-17049 +CVE-2021-33324 - https://issues.liferay.com/browse/LPE-17001 +CVE-2021-33325 - https://issues.liferay.com/browse/LPE-17042 +CVE-2021-33326 - https://issues.liferay.com/browse/LPE-17093 +CVE-2021-33327 - https://issues.liferay.com/browse/LPE-17075 +CVE-2021-33328 - https://issues.liferay.com/browse/LPE-17100 +CVE-2021-33330 - https://issues.liferay.com/browse/LPE-17127 +CVE-2021-33331 - https://issues.liferay.com/browse/LPE-17022 +CVE-2021-33332 - https://issues.liferay.com/browse/LPE-17053 +CVE-2021-33333 - https://issues.liferay.com/browse/LPE-17032 +CVE-2021-33334 - https://issues.liferay.com/browse/LPE-17039 +CVE-2021-33335 - https://issues.liferay.com/browse/LPE-17103 +CVE-2021-33336 - https://issues.liferay.com/browse/LPE-17078 +CVE-2021-33337 - https://issues.liferay.com/browse/LPE-17101 +CVE-2021-33338 - https://issues.liferay.com/browse/LPE-17030 +CVE-2021-33339 - https://issues.liferay.com/browse/LPE-17102 +CVE-2021-33346 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-33351 - https://www.exploit-db.com/exploits/50113 +CVE-2021-33352 - https://www.exploit-db.com/exploits/50113 +CVE-2021-33353 - https://www.exploit-db.com/exploits/50113 +CVE-2021-33354 - https://github.com/danpros/htmly/issues/462 +CVE-2021-33361 - https://github.com/gpac/gpac/issues/1782 +CVE-2021-33362 - https://github.com/gpac/gpac/issues/1780 +CVE-2021-33363 - https://github.com/gpac/gpac/issues/1786 +CVE-2021-33364 - https://github.com/gpac/gpac/issues/1783 +CVE-2021-33365 - https://github.com/gpac/gpac/issues/1784 +CVE-2021-33366 - https://github.com/gpac/gpac/issues/1785 +CVE-2021-3337 - http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html +CVE-2021-33371 - https://www.exploit-db.com/exploits/49865 +CVE-2021-3339 - https://appsource.microsoft.com/en-us/product/web-apps/acctech-systems-pty-ltd.modernflow-saas?tab=overview +CVE-2021-33393 - http://packetstormsecurity.com/files/163158/IPFire-2.25-Remote-Code-Execution.html +CVE-2021-33394 - https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md +CVE-2021-33396 - https://github.com/baijiacms/baijiacmsV4/issues/7 +CVE-2021-33403 - https://cn.etherscan.com/address/0x63e634330a20150dbb61b15648bc73855d6ccf07#code +CVE-2021-33408 - https://www.abinitio.com/en/security-advisories/ab-2021-001/ +CVE-2021-33436 - https://github.com/active-labs/Advisories/blob/master/2021/ACTIVE-2021-001.md +CVE-2021-33437 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33437 - https://github.com/cesanta/mjs/issues/160 +CVE-2021-33438 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33438 - https://github.com/cesanta/mjs/issues/158 +CVE-2021-33439 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33439 - https://github.com/cesanta/mjs/issues/159 +CVE-2021-33440 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33440 - https://github.com/cesanta/mjs/issues/163 +CVE-2021-33441 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33441 - https://github.com/cesanta/mjs/issues/165 +CVE-2021-33442 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33442 - https://github.com/cesanta/mjs/issues/161 +CVE-2021-33443 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33443 - https://github.com/cesanta/mjs/issues/167 +CVE-2021-33444 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33444 - https://github.com/cesanta/mjs/issues/166 +CVE-2021-33445 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33445 - https://github.com/cesanta/mjs/issues/169 +CVE-2021-33446 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33446 - https://github.com/cesanta/mjs/issues/168 +CVE-2021-33447 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33447 - https://github.com/cesanta/mjs/issues/164 +CVE-2021-33448 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33448 - https://github.com/cesanta/mjs/issues/170 +CVE-2021-33449 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33449 - https://github.com/cesanta/mjs/issues/162 +CVE-2021-3345 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-33450 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33451 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33451 - https://github.com/ckolivas/lrzip/issues/198 +CVE-2021-33452 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33453 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33453 - https://github.com/ckolivas/lrzip/issues/199 +CVE-2021-33454 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33454 - https://github.com/yasm/yasm/issues/166 +CVE-2021-33455 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33455 - https://github.com/yasm/yasm/issues/169 +CVE-2021-33456 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33456 - https://github.com/yasm/yasm/issues/175 +CVE-2021-33457 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33457 - https://github.com/yasm/yasm/issues/171 +CVE-2021-33458 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33458 - https://github.com/yasm/yasm/issues/170 +CVE-2021-33459 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33459 - https://github.com/yasm/yasm/issues/167 +CVE-2021-3346 - https://gitlab.nic.cz/turris/foris/foris/-/issues/201 +CVE-2021-33460 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33460 - https://github.com/yasm/yasm/issues/168 +CVE-2021-33461 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33461 - https://github.com/yasm/yasm/issues/161 +CVE-2021-33462 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33462 - https://github.com/yasm/yasm/issues/165 +CVE-2021-33463 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33463 - https://github.com/yasm/yasm/issues/174 +CVE-2021-33464 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33464 - https://github.com/yasm/yasm/issues/164 +CVE-2021-33465 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33465 - https://github.com/yasm/yasm/issues/173 +CVE-2021-33466 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33466 - https://github.com/yasm/yasm/issues/172 +CVE-2021-33467 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33467 - https://github.com/yasm/yasm/issues/163 +CVE-2021-33468 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +CVE-2021-33468 - https://github.com/yasm/yasm/issues/162 +CVE-2021-33469 - https://phpgurukul.com/ +CVE-2021-33469 - https://www.exploit-db.com/exploits/49887 +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307 +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9 +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697 +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7 +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120 +CVE-2021-3347 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2 +CVE-2021-33470 - http://packetstormsecurity.com/files/163014/COVID-19-Testing-Management-System-1.0-SQL-Injection.html +CVE-2021-33470 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-04 +CVE-2021-33470 - https://phpgurukul.com/ +CVE-2021-33470 - https://www.exploit-db.com/exploits/49886 +CVE-2021-33477 - https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html +CVE-2021-33477 - https://www.openwall.com/lists/oss-security/2021/05/17/1 +CVE-2021-3348 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 +CVE-2021-33483 - https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html +CVE-2021-33484 - https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html +CVE-2021-33488 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33488 - http://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33489 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33489 - http://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33490 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33490 - https://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33491 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33491 - https://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33492 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33492 - https://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33493 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33493 - https://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33494 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33494 - https://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33495 - http://packetstormsecurity.com/files/165028/OX-App-Suite-Ox-Documents-7.10.x-XSS-Code-Injection-Traversal.html +CVE-2021-33495 - https://seclists.org/fulldisclosure/2021/Nov/42 +CVE-2021-33501 - https://github.com/swordbytes/Advisories/blob/master/2021/Advisory_CVE-2021-33501.pdf +CVE-2021-33501 - https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/ +CVE-2021-33503 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-33514 - https://gynvael.coldwind.pl/?lang=en&id=733 +CVE-2021-33514 - https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071 +CVE-2021-33515 - https://www.openwall.com/lists/oss-security/2021/06/28/2 +CVE-2021-33516 - https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536 +CVE-2021-33523 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33523 +CVE-2021-33528 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33529 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33530 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33531 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33532 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33533 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33534 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33535 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33536 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33537 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33538 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33539 - https://cert.vde.com/en-us/advisories/vde-2021-026 +CVE-2021-33540 - https://cert.vde.com/en-us/advisories/vde-2021-021 +CVE-2021-33541 - https://cert.vde.com/en-us/advisories/vde-2021-019 +CVE-2021-33542 - https://cert.vde.com/en-us/advisories/vde-2021-020 +CVE-2021-33543 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33544 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33545 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33546 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33547 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33548 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33549 - http://packetstormsecurity.com/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html +CVE-2021-33549 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-3355 - http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html +CVE-2021-3355 - https://www.exploit-db.com/exploits/49598 +CVE-2021-33550 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33551 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33552 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33553 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33554 - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ +CVE-2021-33555 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-33558 - https://github.com/mdanzaruddin/CVE-2021-33558. +CVE-2021-33558 - https://github.com/mdanzaruddin/CVE-2021-33558./issues/1 +CVE-2021-33560 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-33560 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-33560 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-33560 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-33561 - https://www.exploit-db.com/exploits/49901 +CVE-2021-33562 - https://www.exploit-db.com/exploits/49901 +CVE-2021-33563 - https://huntr.dev/bounties/1-other-koel/koel/ +CVE-2021-33564 - https://github.com/mlr0p/CVE-2021-33564 +CVE-2021-33564 - https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/ +CVE-2021-33570 - http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html +CVE-2021-33570 - http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html +CVE-2021-33570 - https://github.com/Paxa/postbird/issues/132 +CVE-2021-33570 - https://github.com/Paxa/postbird/issues/133 +CVE-2021-33570 - https://github.com/Paxa/postbird/issues/134 +CVE-2021-33570 - https://tridentsec.io/blogs/postbird-cve-2021-33570/ +CVE-2021-33570 - https://www.exploit-db.com/exploits/49910 +CVE-2021-33571 - https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo +CVE-2021-33572 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33575 - https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24 +CVE-2021-33581 - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33581 +CVE-2021-33582 - https://github.com/cyrusimap/cyrus-imapd/commits/master +CVE-2021-33594 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33595 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33596 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33597 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33598 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33600 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600 +CVE-2021-33601 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601 +CVE-2021-33602 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-33616 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2021-33617 - https://herolab.usd.de/security-advisories/usd-2021-0015/ +CVE-2021-33617 - https://www.manageengine.com +CVE-2021-33618 - http://seclists.org/fulldisclosure/2021/Nov/38 +CVE-2021-33618 - https://trovent.github.io/security-advisories/TRSA-2105-02/TRSA-2105-02.txt +CVE-2021-33618 - https://trovent.io/security-advisory-2105-02 +CVE-2021-33655 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 +CVE-2021-33670 - http://packetstormsecurity.com/files/166965/SAP-NetWeaver-Java-Denial-Of-Service.html +CVE-2021-33678 - http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html +CVE-2021-33678 - http://seclists.org/fulldisclosure/2022/May/42 +CVE-2021-33687 - http://packetstormsecurity.com/files/164600/SAP-Enterprise-Portal-Sensitive-Data-Disclosure.html +CVE-2021-3370 - https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/douphp_xss.docx +CVE-2021-33701 - http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html +CVE-2021-33701 - http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html +CVE-2021-33701 - http://seclists.org/fulldisclosure/2021/Dec/35 +CVE-2021-33701 - http://seclists.org/fulldisclosure/2021/Dec/36 +CVE-2021-33702 - http://packetstormsecurity.com/files/165737/SAP-Enterprise-Portal-NavigationReporter-Cross-Site-Scripting.html +CVE-2021-33703 - http://packetstormsecurity.com/files/165740/SAP-Enterprise-Portal-RunContentCreation-Cross-Site-Scripting.html +CVE-2021-33705 - http://packetstormsecurity.com/files/165743/SAP-Enterprise-Portal-iviewCatcherEditor-Server-Side-Request-Forgery.html +CVE-2021-33707 - http://packetstormsecurity.com/files/165748/SAP-Enterprise-Portal-Open-Redirect.html +CVE-2021-3375 - https://code610.blogspot.com/2021/01/crashing-activepresenter.html +CVE-2021-3376 - https://github.com/CuppaCMS/CuppaCMS/issues/12 +CVE-2021-3378 - http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html +CVE-2021-3378 - http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html +CVE-2021-3378 - https://github.com/erberkan/fortilogger_arbitrary_fileupload +CVE-2021-33797 - https://github.com/ccxvii/mujs/issues/148 +CVE-2021-33798 - https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74 +CVE-2021-3380 - https://www.exploit-db.com/exploits/49508 +CVE-2021-33813 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-33813 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-33816 - http://seclists.org/fulldisclosure/2021/Nov/39 +CVE-2021-33816 - https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt +CVE-2021-33816 - https://trovent.io/security-advisory-2106-01 +CVE-2021-33818 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33818.md +CVE-2021-33820 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33820.md +CVE-2021-33822 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33822.md +CVE-2021-33823 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33823.md +CVE-2021-33824 - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33824.md +CVE-2021-33829 - https://www.drupal.org/sa-core-2021-003 +CVE-2021-33833 - http://www.openwall.com/lists/oss-security/2021/06/09/1 +CVE-2021-33839 - https://youtu.be/jWyDfEB0m08 +CVE-2021-33840 - https://gitlab.com/lucaapp/web/-/issues/1#note_560963608 +CVE-2021-33849 - https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html +CVE-2021-33849 - https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html +CVE-2021-33850 - https://cybersecurityworks.com/zerodays/cve-2021-33850-stored-cross-site-scripting-xss-in-wordpress-microsoft-clarity-plugin.html +CVE-2021-33851 - https://cybersecurityworks.com/zerodays/cve-2021-33851-stored-cross-site-scripting-in-wordpress-customize-login-image.html +CVE-2021-33852 - https://cybersecurityworks.com/zerodays/cve-2021-33852-stored-cross-site-scripting-in-wordpress-post-duplicator-plugin-2-23.html +CVE-2021-33853 - https://cybersecurityworks.com/zerodays/cve-2021-33853-stored-cross-site-scripting-in-x2crm.html +CVE-2021-33880 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-33880 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-33887 - https://youtu.be/RLjXfvb0ADw +CVE-2021-33904 - http://packetstormsecurity.com/files/163093/Accela-Civic-Platorm-21.1-Cross-Site-Scripting.html +CVE-2021-33909 - http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html +CVE-2021-33909 - http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html +CVE-2021-33909 - http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html +CVE-2021-33909 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html +CVE-2021-33909 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 +CVE-2021-33909 - https://www.openwall.com/lists/oss-security/2021/07/20/1 +CVE-2021-33909 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-33910 - http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html +CVE-2021-33910 - https://www.openwall.com/lists/oss-security/2021/07/20/2 +CVE-2021-33923 - https://confluent.io +CVE-2021-33923 - https://www.detack.de/en/cve-2021-33923 +CVE-2021-33924 - https://confluent.io +CVE-2021-33924 - https://www.detack.de/en/cve-2021-33924 +CVE-2021-33925 - https://github.com/nitinp1232/cms-corephp/issues/1 +CVE-2021-33928 - https://github.com/openSUSE/libsolv/issues/417 +CVE-2021-33929 - https://github.com/openSUSE/libsolv/issues/417 +CVE-2021-33930 - https://github.com/openSUSE/libsolv/issues/417 +CVE-2021-33938 - https://github.com/openSUSE/libsolv/issues/420 +CVE-2021-3394 - http://packetstormsecurity.com/files/161334/Millewin-13.39.028-Unquoted-Service-Path-Insecure-Permissions.html +CVE-2021-3394 - https://www.exploit-db.com/exploits/49530 +CVE-2021-33945 - https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1 +CVE-2021-33966 - https://packetstormsecurity.com/files/162731/Spotweb-Develop-1.4.9-Cross-Site-Scripting.html +CVE-2021-33970 - https://pastebin.com/Qug7tquW +CVE-2021-33971 - https://pastebin.com/31v5JMcG +CVE-2021-33972 - https://pastebin.com/qDedtZf3 +CVE-2021-33973 - https://pastebin.com/fsLDebg5 +CVE-2021-33974 - https://pastebin.com/ms1ivjYe +CVE-2021-33975 - https://pastebin.com/ivNL7s0n +CVE-2021-33983 - https://github.com/dvidelabs/flatcc/issues/188 +CVE-2021-33988 - https://github.com/nck0099/osTicket/issues/2 +CVE-2021-33990 - http://packetstormsecurity.com/files/171701/Liferay-Portal-6.2.5-Insecure-Permissions.html +CVE-2021-33990 - https://github.com/fu2x2000/Liferay_exploit_Poc +CVE-2021-3401 - https://github.com/bitcoin/bitcoin/pull/16578 +CVE-2021-3402 - https://www.openwall.com/lists/oss-security/2021/01/29/2 +CVE-2021-3402 - https://www.x41-dsec.de/lab/advisories/x41-2021-001-yara/ +CVE-2021-3405 - https://github.com/Matroska-Org/libebml/issues/74 +CVE-2021-34055 - https://github.com/Matthias-Wandel/jhead/issues/36 +CVE-2021-34066 - https://github.com/EdgeGallery/developer-be/issues/1 +CVE-2021-34067 - https://github.com/justdan96/tsMuxer/issues/424 +CVE-2021-34068 - https://github.com/justdan96/tsMuxer/issues/427 +CVE-2021-34069 - https://github.com/justdan96/tsMuxer/issues/428 +CVE-2021-34070 - https://github.com/justdan96/tsMuxer/issues/426 +CVE-2021-34071 - https://github.com/justdan96/tsMuxer/issues/423 +CVE-2021-34073 - https://www.exploit-db.com/exploits/49904 +CVE-2021-34076 - https://github.com/HolaAsuka/CVE/issues/1 +CVE-2021-34085 - https://drive.google.com/drive/folders/1epm65c4_iC0zE5V_leoet4Jyk1Prz2p5?usp=sharing +CVE-2021-3410 - https://bugzilla.redhat.com/show_bug.cgi?id=1928437 +CVE-2021-34110 - https://packetstormsecurity.com/files/163335/WinWaste.NET-1.0.6183.16475-Local-Privilege-Escalation.html +CVE-2021-34110 - https://www.exploit-db.com/exploits/50083 +CVE-2021-34119 - https://github.com/michaelrsweet/htmldoc/issues/431 +CVE-2021-34121 - https://github.com/michaelrsweet/htmldoc/issues/433 +CVE-2021-34122 - https://github.com/rockcarry/ffjpeg/issues/36 +CVE-2021-34125 - https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac +CVE-2021-34125 - https://github.com/PX4/PX4-Autopilot/issues/17062 +CVE-2021-34125 - https://www.st.com/resource/en/application_note/dm00493651-introduction-to-stm32-microcontrollers-security-stmicroelectronics.pdf +CVE-2021-34128 - https://github.com/bettershop/LaikeTui/issues/8 +CVE-2021-34141 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-34143 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34144 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34145 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34146 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34147 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34148 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34149 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34150 - https://dl.packetstormsecurity.net/papers/general/braktooth.pdf +CVE-2021-34164 - https://github.com/lizhipay/faka/issues/22 +CVE-2021-34165 - https://www.exploit-db.com/exploits/49741 +CVE-2021-34166 - https://www.exploit-db.com/exploits/49740 +CVE-2021-34167 - https://github.com/taogogo/taocms/issues/6 +CVE-2021-34170 - https://www.reddit.com/r/darksouls3/comments/n1235k/potential_pc_security_exploit_spreading/ +CVE-2021-34173 - https://github.com/E7mer/OWFuzz +CVE-2021-34174 - https://github.com/E7mer/OWFuzz +CVE-2021-34187 - https://murat.one/?p=118 +CVE-2021-34190 - https://www.youtube.com/watch?v=apJH_D68lZI +CVE-2021-34201 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34201 +CVE-2021-34201 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-34202 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34202 +CVE-2021-34202 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-34203 - https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34203 +CVE-2021-34203 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-34204 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-34235 - http://packetstormsecurity.com/files/165944/Tokheim-Profleet-DiaLOG-Fuel-Management-System-11.005.02-SQL-Injection-Code-Execution.html +CVE-2021-34243 - https://github.com/xoffense/POC/blob/main/Stored%20XSS%20via%20malicious%20file%20upload%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md +CVE-2021-34244 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20using%20CSRF%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md +CVE-2021-34248 - https://packetstormsecurity.com/files/159132/Mobile-Shop-System-1.0-SQL-Injection.html +CVE-2021-34248 - https://www.exploit-db.com/exploits/48916 +CVE-2021-34249 - https://packetstormsecurity.com/files/159000/Online-Book-Store-1.0-SQL-Injection.html +CVE-2021-34249 - https://www.exploit-db.com/exploits/48775 +CVE-2021-34250 - https://github.com/baijiacms/baijiacmsV4/issues/7 +CVE-2021-34257 - https://github.com/Sentinal920/WPanel4-Authenticated-RCE +CVE-2021-34257 - https://latestpcsolution.wordpress.com/2021/06/05/wpanel4-cms-authenticated-rce/ +CVE-2021-3426 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3426 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3427 - https://groups.google.com/g/deluge-dev/c/e5zh7wT0rEg +CVE-2021-3428 - https://ubuntu.com/security/CVE-2021-3428 +CVE-2021-34338 - https://github.com/libming/libming/issues/201 +CVE-2021-34339 - https://github.com/libming/libming/issues/202 +CVE-2021-34340 - https://github.com/libming/libming/issues/203 +CVE-2021-34341 - https://github.com/libming/libming/issues/204 +CVE-2021-34342 - https://github.com/libming/libming/issues/205 +CVE-2021-34369 - http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html +CVE-2021-34370 - http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html +CVE-2021-34371 - https://www.exploit-db.com/exploits/50170 +CVE-2021-34372 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34373 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34374 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34375 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34376 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34377 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34378 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34379 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34380 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34381 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34382 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34383 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34384 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34385 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34386 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34387 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34388 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34389 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34390 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34391 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34392 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34393 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34394 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34395 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34396 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34397 - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 +CVE-2021-34420 - https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e +CVE-2021-34423 - http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html +CVE-2021-34424 - http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html +CVE-2021-34427 - http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html +CVE-2021-34427 - http://seclists.org/fulldisclosure/2022/Dec/30 +CVE-2021-34427 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142 +CVE-2021-34428 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-34428 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-34428 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-34429 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-34429 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-34429 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-34430 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=568803 +CVE-2021-34435 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018 +CVE-2021-3444 - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html +CVE-2021-3444 - http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html +CVE-2021-3444 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b00f1b78809 +CVE-2021-34470 - http://packetstormsecurity.com/files/163706/Microsoft-Exchange-AD-Schema-Misconfiguration-Privilege-Escalation.html +CVE-2021-34473 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html +CVE-2021-3448 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-34480 - http://packetstormsecurity.com/files/164121/Internet-Explorer-JIT-Optimization-Memory-Corruption.html +CVE-2021-3449 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 +CVE-2021-3449 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd +CVE-2021-3449 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3449 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3449 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3449 - https://www.tenable.com/security/tns-2021-05 +CVE-2021-3449 - https://www.tenable.com/security/tns-2021-06 +CVE-2021-3449 - https://www.tenable.com/security/tns-2021-09 +CVE-2021-3449 - https://www.tenable.com/security/tns-2021-10 +CVE-2021-3450 - https://kc.mcafee.com/corporate/index?page=content&id=SB10356 +CVE-2021-3450 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd +CVE-2021-3450 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuApr2021.html +CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3450 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3450 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3450 - https://www.tenable.com/security/tns-2021-05 +CVE-2021-3450 - https://www.tenable.com/security/tns-2021-09 +CVE-2021-34523 - http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html +CVE-2021-34527 - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html +CVE-2021-34543 - https://drive.google.com/file/d/1z1TaANlDyX4SOP2vjNzkPQI3nETL9kZM/view?usp=sharing +CVE-2021-34543 - https://www.exploit-db.com/exploits/49986 +CVE-2021-34544 - https://drive.google.com/file/d/1N8Ch1UGNcoocUaPhOe_1mAECOe5kr4pt/view?usp=sharing +CVE-2021-34544 - https://www.exploit-db.com/exploits/49987 +CVE-2021-34546 - http://packetstormsecurity.com/files/163097/NetSetManPro-4.7.2-Privilege-Escalation.html +CVE-2021-34548 - http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html +CVE-2021-34553 - https://support.sonatype.com/hc/en-us/articles/4402433828371 +CVE-2021-34558 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-34558 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-34559 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34560 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34561 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34562 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34563 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34564 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34565 - https://cert.vde.com/en-us/advisories/vde-2021-027 +CVE-2021-34578 - https://cert.vde.com/en-us/advisories/vde-2020-044 +CVE-2021-34581 - https://cert.vde.com/en-us/advisories/vde-2021-038 +CVE-2021-34587 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34588 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34589 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34590 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34591 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34592 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34593 - http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html +CVE-2021-34593 - http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html +CVE-2021-34593 - http://seclists.org/fulldisclosure/2021/Oct/64 +CVE-2021-34600 - https://www.x41-dsec.de/lab/advisories/x41-2021-003-telenot-complex-insecure-keygen/ +CVE-2021-34601 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34602 - https://cert.vde.com/en/advisories/VDE-2021-047 +CVE-2021-34605 - https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ +CVE-2021-34606 - https://claroty.com/2022/05/11/blog-research-from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool/ +CVE-2021-34621 - http://packetstormsecurity.com/files/163973/WordPress-ProfilePress-3.1.3-Privilege-Escalation.html +CVE-2021-34657 - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34657 +CVE-2021-3466 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334XJNDJPYQNFE6S3S2KUJJ7TMHYCWL/ +CVE-2021-34675 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675 +CVE-2021-34676 - https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34676 +CVE-2021-34682 - https://www.youtube.com/watch?v=vClCaAAfzGg +CVE-2021-34684 - http://packetstormsecurity.com/files/164791/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-SQL-Injection.html +CVE-2021-34685 - http://packetstormsecurity.com/files/164775/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Filename-Bypass.html +CVE-2021-34693 - http://www.openwall.com/lists/oss-security/2021/06/15/1 +CVE-2021-34746 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh +CVE-2021-34749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN +CVE-2021-34759 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-4HnZFewr +CVE-2021-34784 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-U2JK537j +CVE-2021-34790 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng +CVE-2021-34791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng +CVE-2021-34798 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-34798 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-34805 - http://packetstormsecurity.com/files/165701/FAUST-iServer-9.0.018.018.4-Local-File-Inclusion.html +CVE-2021-34805 - https://sec-consult.com/vulnerability-lab/ +CVE-2021-34816 - https://github.com/ether/etherpad-lite/releases +CVE-2021-34817 - https://github.com/ether/etherpad-lite/releases/tag/1.8.14 +CVE-2021-34820 - http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html +CVE-2021-34823 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2021-34823 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105 +CVE-2021-34831 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34832 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34833 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34834 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34835 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34836 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34837 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34838 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34839 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34840 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34841 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34842 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34843 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34844 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34845 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34846 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34847 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34848 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34849 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-3485 - https://herolab.usd.de/security-advisories/usd-2021-0014/ +CVE-2021-34850 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34851 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34852 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34853 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-34870 - https://kb.netgear.com/000063967/Security-Advisory-for-a-Security-Misconfiguration-Vulnerability-on-the-XR1000-PSV-2021-0101 +CVE-2021-34874 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34875 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34876 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34877 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34878 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34880 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34885 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34888 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34889 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34890 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34891 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34892 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34894 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34895 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34898 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34899 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-3490 - http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html +CVE-2021-34901 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34909 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-3491 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f82808877bb10d3deee7cf3374a4eb3fb582db +CVE-2021-34911 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-34912 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34913 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-3492 - http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html +CVE-2021-34920 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34921 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34922 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34923 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34924 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34925 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34926 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34927 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34928 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34929 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-3493 - http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html +CVE-2021-3493 - http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html +CVE-2021-3493 - http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html +CVE-2021-3493 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52 +CVE-2021-34930 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34931 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34932 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34933 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34934 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34935 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34936 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34937 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34938 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34939 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34940 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34941 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34942 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34943 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34944 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34945 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-34946 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-3496 - https://github.com/Matthias-Wandel/jhead/issues/33 +CVE-2021-34978 - https://kb.netgear.com/000064258/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-DSL-Modem-Routers-and-Access-Points-PSV-2021-0151-and-PSV-2021-0170?article=000064258 +CVE-2021-3498 - http://packetstormsecurity.com/files/162952/Gstreamer-Matroska-Demuxing-Use-After-Free.html +CVE-2021-34980 - https://kb.netgear.com/000064262/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-PSV-2021-0150?article=000064262 +CVE-2021-34991 - https://kb.netgear.com/000064361/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Multiple-Products-PSV-2021-0168 +CVE-2021-3501 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a +CVE-2021-35039 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14 +CVE-2021-35039 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75 +CVE-2021-35043 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-35043 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35043 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-35043 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35045 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md +CVE-2021-35046 - https://github.com/xoffense/POC/blob/main/Account%20takeover%20(Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting)%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md +CVE-2021-35052 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#221121 +CVE-2021-35053 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021 +CVE-2021-35055 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-35061 - https://github.com/sthierolf/security/blob/main/CVE-2021-35061.md +CVE-2021-35062 - https://github.com/sthierolf/security/blob/main/CVE-2021-35062.md +CVE-2021-35064 - http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html +CVE-2021-35065 - https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294 +CVE-2021-35068 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-35069 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-35074 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-35075 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-35077 - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin +CVE-2021-3508 - https://github.com/enferex/pdfresurrect/issues/17 +CVE-2021-35088 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-35089 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-3509 - https://bugzilla.redhat.com/show_bug.cgi?id=1950116 +CVE-2021-35093 - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin +CVE-2021-35103 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-35105 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-35106 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-35110 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-35115 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-35117 - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin +CVE-2021-3516 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 +CVE-2021-3516 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3517 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3517 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3517 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3517 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3518 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3518 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3518 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35193 - https://github.com/jshafer817/Eaglesoft +CVE-2021-35196 - https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/ +CVE-2021-3520 - https://www.oracle.com//security-alerts/cpujul2021.html +CVE-2021-3520 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3520 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35211 - https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211 +CVE-2021-3522 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35296 - https://github.com/afaq1337/CVE-2021-35296 +CVE-2021-35306 - https://github.com/axiomatic-systems/Bento4/issues/615 +CVE-2021-35307 - https://github.com/axiomatic-systems/Bento4/issues/616 +CVE-2021-35312 - http://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html +CVE-2021-35312 - https://packetstormsecurity.com/files/163744/Amica-Prodigy-1.7-Privilege-Escalation.html +CVE-2021-35323 - http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html +CVE-2021-35323 - https://github.com/bludit/bludit/issues/1327 +CVE-2021-35324 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_login_bypass.md +CVE-2021-35325 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_cookie_overflow.md +CVE-2021-35326 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_leak_config_file.md +CVE-2021-35327 - https://github.com/hurricane618/my_cves/blob/master/router/totolink/A720R_default_telnet_info.md +CVE-2021-35336 - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c +CVE-2021-35337 - https://www.exploit-db.com/exploits/50050 +CVE-2021-35343 - https://medium.com/@cyberdivision/cve-2021-35343-c5c298cbb2d4 +CVE-2021-35344 - https://github.com/justdan96/tsMuxer/issues/432 +CVE-2021-35346 - https://github.com/justdan96/tsMuxer/issues/436 +CVE-2021-3537 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3537 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3537 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35380 - https://www.exploit-db.com/exploits/50638 +CVE-2021-35380 - https://www.swascan.com/solari-di-udine/ +CVE-2021-3539 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-35391 - https://sayaanalam.github.io/CVE-2021-35391.html +CVE-2021-35392 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain +CVE-2021-35393 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain +CVE-2021-35394 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain +CVE-2021-35395 - https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain +CVE-2021-3540 - https://www.rapid7.com/blog/post/2021/06/02/untitled-cve-2021-3198-and-cve-2021-3540-mobileiron-shell-escape-privilege-escalation-vulnerabilities/ +CVE-2021-3541 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35438 - https://github.com/phpipam/phpipam/issues/3351 +CVE-2021-35448 - https://www.exploit-db.com/exploits/50047 +CVE-2021-35449 - http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html +CVE-2021-35450 - https://www.swascan.com/entando/ +CVE-2021-35452 - https://github.com/strukturag/libde265/issues/298 +CVE-2021-35456 - https://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html +CVE-2021-35458 - http://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html +CVE-2021-35458 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-35458 +CVE-2021-35464 - http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html +CVE-2021-35464 - http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html +CVE-2021-35475 - http://packetstormsecurity.com/files/163294/SAS-Environment-Manager-2.5-Cross-Site-Scripting.html +CVE-2021-35475 - https://github.com/saitamang/CVE-2021-35475/blob/main/README.md +CVE-2021-35478 - https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/ +CVE-2021-35478 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2021-35479 - https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/ +CVE-2021-35479 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2021-35487 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2021-35488 - https://www.gruppotim.it/redteam +CVE-2021-35489 - https://www.gruppotim.it/redteam +CVE-2021-35490 - https://www.gruppotim.it/redteam +CVE-2021-35491 - https://n4nj0.github.io/advisories/wowza-streaming-engine-i/ +CVE-2021-35491 - https://www.gruppotim.it/redteam +CVE-2021-35492 - https://n4nj0.github.io/advisories/wowza-streaming-engine-i/ +CVE-2021-35492 - https://www.gruppotim.it/redteam +CVE-2021-35501 - http://packetstormsecurity.com/files/163466/Pandora-FMS-7.54-Cross-Site-Scripting.html +CVE-2021-35503 - https://syntegris-sec.github.io/filerun-advisory +CVE-2021-35504 - https://syntegris-sec.github.io/filerun-advisory +CVE-2021-35505 - https://syntegris-sec.github.io/filerun-advisory +CVE-2021-35506 - https://syntegris-sec.github.io/filerun-advisory +CVE-2021-35508 - https://www.linkedin.com/pulse/cve-2021-35508-privilege-escalation-via-weak-windows-marshall-mba +CVE-2021-35512 - https://www.esecforte.com/server-side-request-forgery-india-ssrf-rvd-manage-engine/ +CVE-2021-35515 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-35515 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35515 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-35515 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35516 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-35516 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35516 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-35516 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35517 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-35517 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35517 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-35517 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35523 - http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html +CVE-2021-35528 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000068&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-35536 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35537 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35538 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35539 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35540 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35541 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35542 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35543 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35545 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35546 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35549 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3555 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera/ +CVE-2021-35550 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35551 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35552 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35553 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35554 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35556 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35557 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35558 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35559 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35560 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35561 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35562 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35563 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35564 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35565 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35566 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35567 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35568 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35569 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35570 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35571 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35572 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35573 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35574 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-35574 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35575 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35576 - http://packetstormsecurity.com/files/170354/Oracle-Unified-Audit-Policy-Bypass.html +CVE-2021-35576 - http://packetstormsecurity.com/files/170373/Oracle-Database-Vault-Metadata-Exposure.html +CVE-2021-35576 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35577 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35578 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35580 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35581 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35582 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35583 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35584 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35585 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35586 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35587 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35588 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35589 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35590 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35591 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35592 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35593 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35594 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35595 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35596 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35597 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35598 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35599 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3560 - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html +CVE-2021-3560 - https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ +CVE-2021-35601 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35602 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35603 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35604 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35606 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35607 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35608 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35609 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35610 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35611 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35612 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35613 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35616 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35617 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35618 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35619 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35620 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35621 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35622 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35623 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35624 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35625 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35626 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35627 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35628 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35629 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35630 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35631 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35632 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35633 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35634 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35635 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35636 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35637 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35638 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35639 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3564 - http://www.openwall.com/lists/oss-security/2021/05/25/1 +CVE-2021-3564 - http://www.openwall.com/lists/oss-security/2021/06/01/2 +CVE-2021-3564 - https://www.openwall.com/lists/oss-security/2021/05/25/1 +CVE-2021-35640 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35641 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35642 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35643 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35644 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35645 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35646 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35647 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35648 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35649 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35650 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35651 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35652 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35653 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35654 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35655 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35656 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35657 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35658 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35659 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35660 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35661 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35662 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35665 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35666 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-35683 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35686 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-35687 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3572 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3572 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3573 - http://www.openwall.com/lists/oss-security/2023/07/02/1 +CVE-2021-3573 - https://www.openwall.com/lists/oss-security/2021/06/08/2 +CVE-2021-3574 - https://github.com/ImageMagick/ImageMagick/issues/3540 +CVE-2021-3575 - https://github.com/uclouvain/openjpeg/issues/1347 +CVE-2021-3578 - https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ +CVE-2021-35940 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-35941 - https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo +CVE-2021-35956 - http://packetstormsecurity.com/files/163343/AKCP-sensorProbe-SPX476-Cross-Site-Scripting.html +CVE-2021-35956 - https://tbutler.org/2021/06/28/cve-2021-35956 +CVE-2021-35957 - https://advisories.stormshield.eu +CVE-2021-3596 - https://github.com/ImageMagick/ImageMagick/issues/2624 +CVE-2021-35973 - https://gynvael.coldwind.pl/?lang=en&id=736 +CVE-2021-35975 - https://github.com/fbkcs/CVE-2021-35975 +CVE-2021-35978 - https://digi.com +CVE-2021-3603 - https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ +CVE-2021-36088 - https://github.com/fluent/fluent-bit/pull/3453 +CVE-2021-3609 - https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md +CVE-2021-36090 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-36090 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-36090 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-36090 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3612 - https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/ +CVE-2021-3612 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-36146 - https://github.com/projectacrn/acrn-hypervisor/pull/6173/commits/330359921e2e4c2f3f3a10b5bab86942d63c4428 +CVE-2021-36150 - https://github.com/silverstripe/silverstripe-framework/releases +CVE-2021-36159 - https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749 +CVE-2021-36160 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-36160 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-36221 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-36222 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-36224 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md +CVE-2021-36224 - https://www.youtube.com/watch?v=vsg9YgvGBec +CVE-2021-36225 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md +CVE-2021-36225 - https://www.youtube.com/watch?v=vsg9YgvGBec +CVE-2021-36226 - https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/weekend_destroyer/weekend_destroyer.md +CVE-2021-36226 - https://www.youtube.com/watch?v=vsg9YgvGBec +CVE-2021-36231 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-035.txt +CVE-2021-36232 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-036.txt +CVE-2021-36233 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-037.txt +CVE-2021-36234 - https://www.syss.de +CVE-2021-36234 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-039.txt +CVE-2021-36260 - http://packetstormsecurity.com/files/164603/Hikvision-Web-Server-Build-210702-Command-Injection.html +CVE-2021-36260 - http://packetstormsecurity.com/files/166167/Hikvision-IP-Camera-Unauthenticated-Command-Injection.html +CVE-2021-36278 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-36279 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-36280 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-36281 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-36282 - https://www.dell.com/support/kbdoc/000190408 +CVE-2021-3634 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-36351 - https://www.exploit-db.com/exploits/50165 +CVE-2021-36352 - https://www.exploit-db.com/exploits/50197 +CVE-2021-36356 - http://packetstormsecurity.com/files/166623/Kramer-VIAware-Remote-Code-Execution.html +CVE-2021-36359 - http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html +CVE-2021-36359 - http://seclists.org/fulldisclosure/2021/Aug/23 +CVE-2021-36368 - https://docs.ssh-mitm.at/trivialauth.html +CVE-2021-36373 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-36373 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-36373 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-36373 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-36374 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-36374 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-36374 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-36374 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-36380 - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ +CVE-2021-36383 - https://github.com/vatesfr/xen-orchestra/issues/5712 +CVE-2021-36387 - http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html +CVE-2021-36387 - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html +CVE-2021-36388 - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html +CVE-2021-36389 - http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html +CVE-2021-3640 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951 +CVE-2021-3640 - https://ubuntu.com/security/CVE-2021-3640 +CVE-2021-3640 - https://www.openwall.com/lists/oss-security/2021/07/22/1 +CVE-2021-36408 - https://github.com/strukturag/libde265/issues/299 +CVE-2021-36409 - https://github.com/strukturag/libde265/issues/300 +CVE-2021-36410 - https://github.com/strukturag/libde265/issues/301 +CVE-2021-36411 - https://github.com/strukturag/libde265/issues/302 +CVE-2021-36412 - https://github.com/gpac/gpac/issues/1838 +CVE-2021-36414 - https://github.com/gpac/gpac/issues/1840 +CVE-2021-36417 - https://github.com/gpac/gpac/issues/1846 +CVE-2021-36426 - https://github.com/slackero/phpwcms/issues/312 +CVE-2021-36440 - https://github.com/star7th/showdoc/issues/1406 +CVE-2021-3645 - https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262 +CVE-2021-36450 - https://medium.com/@1nf0sk/cve-2021-36450-cross-site-scripting-xss-6f5d8d7db740 +CVE-2021-36450 - https://sushantvkamble.blogspot.com/2021/11/cross-site-scripting-xss.html +CVE-2021-3646 - https://huntr.dev/bounties/32e30ecf-31fa-45f6-8552-47250ef0e613 +CVE-2021-36460 - https://github.com/martinfrancois/CVE-2021-36460 +CVE-2021-3647 - https://huntr.dev/bounties/1625558772840-medialize/URI.js +CVE-2021-3649 - https://huntr.dev/bounties/1625088985607-chatwoot/chatwoot +CVE-2021-36493 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42160 +CVE-2021-36520 - http://packetstormsecurity.com/files/171731/itech-TrainSmart-r1044-SQL-Injection.html +CVE-2021-3653 - http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html +CVE-2021-36530 - https://github.com/miniupnp/ngiflib/issues/19 +CVE-2021-36531 - https://github.com/miniupnp/ngiflib/issues/18 +CVE-2021-36532 - https://github.com/excellentoldtv/portfolioCMS-issues/issues/1 +CVE-2021-36535 - https://github.com/cesanta/mjs/issues/175 +CVE-2021-36539 - https://github.com/gaukas/instructure-canvas-file-oracle +CVE-2021-36543 - https://cyberdivision.medium.com/cve-2021-36543-9622f50c6dc +CVE-2021-36546 - https://github.com/Kitesky/KiteCMS/issues/10 +CVE-2021-36550 - https://github.com/r0ck3t1973/xss_payload/issues/6 +CVE-2021-36551 - https://github.com/r0ck3t1973/xss_payload/issues/7 +CVE-2021-36563 - https://github.com/Edgarloyola/CVE-2021-36563 +CVE-2021-36564 - https://github.com/top-think/framework/issues/2559 +CVE-2021-36568 - https://blog.hackingforce.com.br/en/cve-2021-36568/ +CVE-2021-36569 - https://github.com/daylightstudio/FUEL-CMS/issues/578 +CVE-2021-36570 - https://github.com/daylightstudio/FUEL-CMS/issues/579 +CVE-2021-36572 - https://github.com/liufee/cms/issues/58 +CVE-2021-36573 - https://github.com/liufee/cms/issues/59 +CVE-2021-36580 - http://icewarp.com +CVE-2021-36584 - https://github.com/gpac/gpac/issues/1842 +CVE-2021-3659 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 +CVE-2021-36608 - https://sourceforge.net/p/webtareas/tickets/44/ +CVE-2021-36609 - https://sourceforge.net/p/webtareas/tickets/43/ +CVE-2021-36613 - http://seclists.org/fulldisclosure/2022/Jun/2 +CVE-2021-36613 - https://seclists.org/fulldisclosure/2021/Jul/0 +CVE-2021-36614 - http://seclists.org/fulldisclosure/2022/Jun/2 +CVE-2021-36614 - https://seclists.org/fulldisclosure/2021/Jul/0 +CVE-2021-36621 - http://packetstormsecurity.com/files/164324/Covid-Vaccination-Scheduler-System-1.0-SQL-Injection-Cross-Site-Scripting.html +CVE-2021-36621 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821 +CVE-2021-36621 - https://www.exploit-db.com/exploits/50109 +CVE-2021-36622 - https://www.exploit-db.com/exploits/50114 +CVE-2021-36623 - https://www.exploit-db.com/exploits/50106 +CVE-2021-36624 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-36624 +CVE-2021-36624 - https://www.exploit-db.com/exploits/50105 +CVE-2021-3664 - https://huntr.dev/bounties/1625557993985-unshiftio/url-parse +CVE-2021-36646 - https://github.com/kalcaddle/KodExplorer/issues/482 +CVE-2021-36654 - http://packetstormsecurity.com/files/163737/CMSuno-1.7-Cross-Site-Scripting.html +CVE-2021-3666 - https://huntr.dev/bounties/1-other-fiznool/body-parser-xml +CVE-2021-36665 - https://imhotepisinvisible.com/druva-lpe/ +CVE-2021-36666 - https://imhotepisinvisible.com/druva-lpe/ +CVE-2021-36667 - https://imhotepisinvisible.com/druva-lpe/ +CVE-2021-36668 - https://imhotepisinvisible.com/druva-lpe/ +CVE-2021-36689 - https://vrls.ws/posts/2021/08/samourai-wallet-bitcoin-pin-authentication-bypass-crypto/ +CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/47 +CVE-2021-36690 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2021-36690 - https://www.sqlite.org/forum/forumpost/718c0a8d17 +CVE-2021-36691 - https://github.com/libjxl/libjxl/issues/422 +CVE-2021-36695 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor1 +CVE-2021-36696 - https://www.r29k.com/articles/bb/stored-xss-in-deskpro#anchor2 +CVE-2021-36705 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#tr069-command-injection +CVE-2021-36706 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection +CVE-2021-36707 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#ledonoff-command-injection +CVE-2021-36708 - https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#sysinit-password-reset +CVE-2021-36711 - http://packetstormsecurity.com/files/167780/OctoBot-WebInterface-0.4.3-Remote-Code-Execution.html +CVE-2021-36711 - https://github.com/Drakkar-Software/OctoBot/issues/1966 +CVE-2021-36711 - https://github.com/Nwqda/Sashimi-Evil-OctoBot-Tentacle +CVE-2021-36711 - https://packetstormsecurity.com/files/167721/Sashimi-Evil-OctoBot-Tentacle.html +CVE-2021-36713 - https://gist.github.com/walhajri/711af9b62f6fb25e66a5d9a490deab98 +CVE-2021-3672 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3674 - https://gist.github.com/netspooky/61101e191afee95feda7dbd2f6b061c4 +CVE-2021-3674 - https://github.com/rizinorg/rizin/pull/1313 +CVE-2021-36748 - https://blog.sorcery.ie +CVE-2021-36748 - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ +CVE-2021-36750 - https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software +CVE-2021-36751 - https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software +CVE-2021-36761 - https://www.cyberiskvision.com/advisory/ +CVE-2021-36762 - https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ +CVE-2021-36762 - https://www.kb.cert.org/vuls/id/608209 +CVE-2021-36766 - http://packetstormsecurity.com/files/163564/Concrete5-8.5.5-Phar-Deserialization.html +CVE-2021-36773 - https://news.ycombinator.com/item?id=27833752 +CVE-2021-3678 - https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4 +CVE-2021-36787 - http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html +CVE-2021-36787 - http://seclists.org/fulldisclosure/2022/Jan/53 +CVE-2021-3679 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a +CVE-2021-36797 - https://github.com/victronenergy/venus/issues/836 +CVE-2021-36798 - https://labs.sentinelone.com/hotcobalt-new-cobalt-strike-dos-vulnerability-that-lets-you-halt-operations/ +CVE-2021-36799 - http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html +CVE-2021-36799 - https://github.com/robertguetzkow/ets5-password-recovery +CVE-2021-3680 - https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2 +CVE-2021-36800 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-36801 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-36802 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-36803 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-36804 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-36805 - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ +CVE-2021-3683 - https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134 +CVE-2021-3689 - https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f +CVE-2021-3692 - https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba +CVE-2021-36934 - http://packetstormsecurity.com/files/164006/HiveNightmare-AKA-SeriousSAM.html +CVE-2021-36942 - https://www.kb.cert.org/vuls/id/405600 +CVE-2021-36977 - https://github.com/HDFGroup/hdf5/issues/272 +CVE-2021-36978 - https://github.com/qpdf/qpdf/issues/492 +CVE-2021-36981 - https://github.com/0xBrAinsTorM/CVE-2021-36981 +CVE-2021-3706 - https://huntr.dev/bounties/ac7fd77b-b31b-4d02-aebd-f89ecbae3fce +CVE-2021-3707 - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md +CVE-2021-3708 - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md +CVE-2021-3709 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308 +CVE-2021-3710 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 +CVE-2021-3711 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3711 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3711 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3712 - https://kc.mcafee.com/corporate/index?page=content&id=SB10366 +CVE-2021-3712 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-3712 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-3712 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-37136 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-37136 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-37136 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37137 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-37137 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-37137 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37144 - https://github.com/cskaza/cszcms/issues/32 +CVE-2021-37145 - https://support.polycom.com/content/support.html +CVE-2021-3715 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 +CVE-2021-37152 - https://support.sonatype.com +CVE-2021-37152 - https://support.sonatype.com/hc/en-us/articles/4404115639827 +CVE-2021-37157 - https://www.exploit-db.com/exploits/50373 +CVE-2021-37158 - https://www.exploit-db.com/exploits/50373 +CVE-2021-37159 - https://bugzilla.suse.com/show_bug.cgi?id=1188601 +CVE-2021-37159 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37160 - https://www.armis.com/PwnedPiper +CVE-2021-37161 - https://www.armis.com/PwnedPiper +CVE-2021-37161 - https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37161-bulletin---underflow-in-udprxthread.pdf?rev=9395dad86d0b4811ae4a9e37f0568c2e&hash=3D8571C7A3DCC8B7D8DCB89C2DA4BB8D +CVE-2021-37162 - https://www.armis.com/PwnedPiper +CVE-2021-37163 - https://www.armis.com/PwnedPiper +CVE-2021-37164 - https://www.armis.com/PwnedPiper +CVE-2021-37165 - https://www.armis.com/PwnedPiper +CVE-2021-37166 - https://www.armis.com/PwnedPiper +CVE-2021-37167 - https://www.armis.com/PwnedPiper +CVE-2021-37187 - https://www.digi.com/search/results?q=transport +CVE-2021-37188 - https://www.digi.com/search/results?q=transport +CVE-2021-37189 - https://www.digi.com/search/results?q=transport +CVE-2021-37220 - https://bugs.ghostscript.com/show_bug.cgi?id=703791 +CVE-2021-37221 - https://www.exploit-db.com/exploits/50046 +CVE-2021-37253 - http://packetstormsecurity.com/files/165139/M-Files-Web-Denial-Of-Service.html +CVE-2021-37253 - http://seclists.org/fulldisclosure/2021/Dec/1 +CVE-2021-37253 - https://www.tenable.com/cve/CVE-2021-37253 +CVE-2021-3728 - https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d +CVE-2021-3729 - https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76 +CVE-2021-37291 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-37292 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-37293 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2021-3730 - https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7 +CVE-2021-37315 - https://robertchen.cc/blog/2021/03/31/asus-rce +CVE-2021-37316 - https://robertchen.cc/blog/2021/03/31/asus-rce +CVE-2021-37317 - https://robertchen.cc/blog/2021/03/31/asus-rce +CVE-2021-3732 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 +CVE-2021-37322 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188 +CVE-2021-37330 - https://www.navidkagalwalla.com/booking-core-vulnerabilities +CVE-2021-37331 - https://www.navidkagalwalla.com/booking-core-vulnerabilities +CVE-2021-37333 - https://www.navidkagalwalla.com/booking-core-vulnerabilities +CVE-2021-3734 - https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd +CVE-2021-37343 - http://packetstormsecurity.com/files/165978/Nagios-XI-Autodiscovery-Shell-Upload.html +CVE-2021-37354 - https://github.com/Ainevsia/CVE-Request/tree/main/Xerox/1 +CVE-2021-37363 - https://www.exploit-db.com/exploits/50449 +CVE-2021-37364 - https://www.exploit-db.com/exploits/50448 +CVE-2021-3737 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37371 - http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html +CVE-2021-37371 - https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf +CVE-2021-37372 - http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html +CVE-2021-37372 - https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf +CVE-2021-37373 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37374 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37375 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37376 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37377 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37378 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37379 - https://tbutler.org/2021/04/29/teradek-vulnerability-advisory +CVE-2021-37381 - https://github.com/caiteli/poc_information/blob/main/southsoft_GMIS.txt +CVE-2021-37381 - https://github.com/caiteli/poc_information/issues/1 +CVE-2021-37388 - https://github.com/noobexploiter/IOTHACKS/blob/main/vuln1.md +CVE-2021-37388 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-37389 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities +CVE-2021-3739 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 +CVE-2021-3739 - https://ubuntu.com/security/CVE-2021-3739 +CVE-2021-37390 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities +CVE-2021-37391 - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities +CVE-2021-37402 - http://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2021-37403 - http://seclists.org/fulldisclosure/2021/Jul/33 +CVE-2021-37412 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-040.txt +CVE-2021-37415 - https://www.manageengine.com +CVE-2021-37416 - https://blog.stmcyber.com/vulns/cve-2021-37416/ +CVE-2021-37417 - https://blog.stmcyber.com/vulns/cve-2021-37417/ +CVE-2021-37419 - https://blog.stmcyber.com/vulns/cve-2021-37419/ +CVE-2021-37419 - https://www.manageengine.com +CVE-2021-37420 - https://blog.stmcyber.com/vulns/cve-2021-37420/ +CVE-2021-37420 - https://www.manageengine.com +CVE-2021-37421 - https://blog.stmcyber.com/vulns/cve-2021-37421/ +CVE-2021-37424 - https://www.manageengine.com +CVE-2021-37425 - http://seclists.org/fulldisclosure/2021/Aug/12 +CVE-2021-37425 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 +CVE-2021-37425 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2021-3743 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117 +CVE-2021-3743 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37439 - https://github.com/0xfml/poc/blob/main/NCH/Flexiserver_6.00_LFI.md +CVE-2021-3744 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37440 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md +CVE-2021-37441 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md +CVE-2021-37442 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md +CVE-2021-37443 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md +CVE-2021-37444 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md +CVE-2021-37445 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md +CVE-2021-37446 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md +CVE-2021-37447 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md +CVE-2021-37448 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md +CVE-2021-37449 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md +CVE-2021-3745 - https://huntr.dev/bounties/7879ab3d-8018-402a-aa0b-131bdbd1966c +CVE-2021-37450 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md +CVE-2021-37451 - https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md +CVE-2021-37452 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_CC.md +CVE-2021-37453 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37454 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37455 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37456 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37457 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37458 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37459 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37460 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37461 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37462 - https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md +CVE-2021-37463 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md +CVE-2021-37464 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md +CVE-2021-37465 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md +CVE-2021-37466 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md +CVE-2021-37467 - https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md +CVE-2021-37468 - https://github.com/0xfml/poc/blob/main/NCH/ReflectCRM_3.01_CC.md +CVE-2021-37469 - https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_LFI.md +CVE-2021-37470 - https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_XSS.md +CVE-2021-3749 - https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31 +CVE-2021-3749 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37491 - https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3 +CVE-2021-37492 - https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3 +CVE-2021-37497 - https://github.com/penson233/Vuln/issues/3 +CVE-2021-37501 - https://github.com/HDFGroup/hdf5 +CVE-2021-37501 - https://github.com/HDFGroup/hdf5/issues/2458 +CVE-2021-37501 - https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md +CVE-2021-3751 - https://huntr.dev/bounties/fcb4383c-bc27-4b89-bfce-6b041f0cb769 +CVE-2021-37519 - https://github.com/memcached/memcached/issues/805 +CVE-2021-3752 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37529 - https://sourceforge.net/p/mcj/tickets/125/ +CVE-2021-37531 - http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html +CVE-2021-37538 - https://blog.sorcery.ie/posts/smartblog_sqli/ +CVE-2021-37539 - https://www.manageengine.com +CVE-2021-3756 - https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1 +CVE-2021-37560 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37561 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37562 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37563 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37564 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37565 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37566 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37567 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37568 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37569 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-3757 - https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa +CVE-2021-37570 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37571 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37572 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37573 - http://packetstormsecurity.com/files/163825/Tiny-Java-Web-Server-1.115-Cross-Site-Scripting.html +CVE-2021-37573 - http://seclists.org/fulldisclosure/2021/Aug/13 +CVE-2021-37573 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-042.txt +CVE-2021-37576 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a +CVE-2021-3758 - https://huntr.dev/bounties/a8d7fb24-9a69-42f3-990a-2db93b53f76b +CVE-2021-37583 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37584 - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 +CVE-2021-37589 - http://packetstormsecurity.com/files/167480/Virtua-Software-Cobranca-12S-SQL-Injection.html +CVE-2021-37589 - https://github.com/luca-regne/my-cves/tree/main/CVE-2021-37589 +CVE-2021-3759 - https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ +CVE-2021-37593 - http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/ +CVE-2021-37593 - https://github.com/advisto/peel-shopping/issues/3 +CVE-2021-37593 - https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md +CVE-2021-37605 - https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf +CVE-2021-37606 - https://peter.website/meow-hash-cryptanalysis +CVE-2021-37613 - https://advisories.stormshield.eu +CVE-2021-37623 - https://github.com/Exiv2/exiv2/pull/1790 +CVE-2021-37624 - http://packetstormsecurity.com/files/164628/FreeSWITCH-1.10.6-Missing-SIP-MESSAGE-Authentication.html +CVE-2021-37628 - https://github.com/nextcloud/richdocuments/pull/1664 +CVE-2021-3765 - https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9 +CVE-2021-3766 - https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc +CVE-2021-3767 - https://huntr.dev/bounties/7ec92c85-30eb-4071-8891-6183446ca980 +CVE-2021-3768 - https://huntr.dev/bounties/64a0229f-ff5e-4c64-b83e-9bfc0698a78e +CVE-2021-37695 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-37695 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-3770 - http://www.openwall.com/lists/oss-security/2021/10/01/1 +CVE-2021-3770 - https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365 +CVE-2021-37701 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-37706 - http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html +CVE-2021-37712 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-37713 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-37714 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-37714 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-37714 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df +CVE-2021-3772 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3773 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-37740 - https://github.com/robertguetzkow/CVE-2021-37740 +CVE-2021-37741 - https://www.manageengine.com +CVE-2021-37748 - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/ +CVE-2021-37749 - https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/ +CVE-2021-3775 - https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3 +CVE-2021-37750 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3776 - https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304 +CVE-2021-37761 - https://www.manageengine.com +CVE-2021-37762 - https://www.manageengine.com +CVE-2021-37764 - https://github.com/XOS-Shop/xos_shop_system/issues/1 +CVE-2021-3777 - https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df +CVE-2021-37774 - https://github.com/fishykz/TP-POC +CVE-2021-37777 - https://www.navidkagalwalla.com/gila-cms-vulnerabilities +CVE-2021-3778 - http://www.openwall.com/lists/oss-security/2021/10/01/1 +CVE-2021-3778 - https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 +CVE-2021-37788 - https://gist.github.com/rvismit/67bc11dd9ccb7423827564cb81d25740 +CVE-2021-37789 - https://github.com/nothings/stb/issues/1178 +CVE-2021-37791 - https://github.com/cdfan/my-admin/issues/3 +CVE-2021-3780 - https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6 +CVE-2021-3780 - https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65 +CVE-2021-37803 - https://packetstormsecurity.com/files/163415/Online-Covid-Vaccination-Scheduler-System-1.0-SQL-Injection.html +CVE-2021-37805 - https://packetstormsecurity.com/files/163625/Vehicle-Parking-Management-System-1.0-Cross-Site-Scripting.html +CVE-2021-37806 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37806 +CVE-2021-37806 - https://packetstormsecurity.com/files/163626/Vehicle-Parking-Management-System-1.0-SQL-Injection.html +CVE-2021-37807 - https://packetstormsecurity.com/files/163574/Online-Shopping-Portal-3.1-SQL-Injection.html +CVE-2021-37808 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808 +CVE-2021-37808 - https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html +CVE-2021-37819 - https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21/diffs?commit_id=9b0cbb76c8434a8505f02ada02a94263dcae9247#diff-content-b3cfd29983c793bcae2375502abd5baa8f5d1081 +CVE-2021-37840 - https://github.com/aaPanel/aaPanel/issues/74 +CVE-2021-37841 - https://docs.docker.com/docker-for-windows/release-notes/ +CVE-2021-3785 - https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638 +CVE-2021-37859 - https://mattermost.com/security-updates/ +CVE-2021-37860 - https://mattermost.com/security-updates/ +CVE-2021-37861 - https://mattermost.com/security-updates/ +CVE-2021-37862 - https://mattermost.com/security-updates/ +CVE-2021-37863 - https://mattermost.com/security-updates/ +CVE-2021-37864 - https://mattermost.com/security-updates/ +CVE-2021-37865 - https://mattermost.com/security-updates/ +CVE-2021-37866 - https://mattermost.com/security-updates/ +CVE-2021-37866 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-37866 +CVE-2021-37867 - https://mattermost.com/security-updates/ +CVE-2021-37914 - https://github.com/argoproj/argo-workflows/issues/6441 +CVE-2021-37914 - https://github.com/argoproj/argo-workflows/pull/6442 +CVE-2021-37915 - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/ +CVE-2021-37916 - https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26 +CVE-2021-37916 - https://github.com/laurent22/joplin/releases/tag/v2.0.9 +CVE-2021-37918 - https://www.manageengine.com +CVE-2021-37919 - https://www.manageengine.com +CVE-2021-37920 - https://www.manageengine.com +CVE-2021-37921 - https://www.manageengine.com +CVE-2021-37922 - https://www.manageengine.com +CVE-2021-37923 - https://www.manageengine.com +CVE-2021-37924 - https://www.manageengine.com +CVE-2021-37925 - https://www.manageengine.com +CVE-2021-37926 - https://www.manageengine.com +CVE-2021-37927 - https://www.manageengine.com +CVE-2021-37928 - https://www.manageengine.com +CVE-2021-37929 - https://www.manageengine.com +CVE-2021-37930 - https://www.manageengine.com +CVE-2021-37931 - https://www.manageengine.com +CVE-2021-37936 - https://www.elastic.co/community/security/ +CVE-2021-37937 - https://www.elastic.co/community/security +CVE-2021-3794 - https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7 +CVE-2021-37942 - https://www.elastic.co/community/security +CVE-2021-3796 - http://www.openwall.com/lists/oss-security/2021/10/01/1 +CVE-2021-3796 - https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d +CVE-2021-3797 - https://huntr.dev/bounties/c24fb15c-3c84-45c8-af04-a660f8da388f +CVE-2021-37975 - http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html +CVE-2021-37979 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1372 +CVE-2021-3799 - https://huntr.dev/bounties/d73f24a8-302b-4f9f-abb8-54688abd9813 +CVE-2021-3801 - https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a +CVE-2021-3802 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt +CVE-2021-3803 - https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0 +CVE-2021-3804 - https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414 +CVE-2021-3805 - https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053 +CVE-2021-3806 - https://pentest.blog/pardus-21-linux-distro-remote-code-execution-0day-2021/ +CVE-2021-3807 - https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 +CVE-2021-3807 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-38085 - http://packetstormsecurity.com/files/163795/Canon-TR150-Driver-3.71.2.10-Privilege-Escalation.html +CVE-2021-38085 - https://www.youtube.com/watch?v=vdesswZYz-8 +CVE-2021-38090 - https://trac.ffmpeg.org/ticket/8263 +CVE-2021-38091 - https://trac.ffmpeg.org/ticket/8263 +CVE-2021-38092 - https://trac.ffmpeg.org/ticket/8263 +CVE-2021-38093 - https://trac.ffmpeg.org/ticket/8263 +CVE-2021-38094 - https://trac.ffmpeg.org/ticket/8263 +CVE-2021-38095 - https://github.com/FlaviuPopescu/Spigit-PoC +CVE-2021-3810 - https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223 +CVE-2021-3811 - https://huntr.dev/bounties/fa38c61f-4043-4872-bc85-7fe5ae5cc2e8 +CVE-2021-38112 - https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/ +CVE-2021-38113 - https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387 +CVE-2021-3812 - https://huntr.dev/bounties/875a6885-9a64-46f3-94ad-92f40f989200 +CVE-2021-3813 - https://huntr.dev/bounties/36f02c4f-cf1c-479e-a1ad-091a1ac7cb56 +CVE-2021-38136 - https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapshot-path-traversal/ +CVE-2021-38137 - https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/ +CVE-2021-38138 - http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html +CVE-2021-38143 - https://bernardofsr.github.io/blog/2021/form-tools/ +CVE-2021-38143 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md +CVE-2021-38144 - https://bernardofsr.github.io/blog/2021/form-tools/ +CVE-2021-38144 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md +CVE-2021-38145 - https://bernardofsr.github.io/blog/2021/form-tools/ +CVE-2021-38145 - https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md +CVE-2021-38146 - http://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html +CVE-2021-38147 - http://packetstormsecurity.com/files/165039/Wipro-Holmes-Orchestrator-20.4.1-Report-Disclosure.html +CVE-2021-38149 - https://github.com/jboogie15/CVE-2021-38149 +CVE-2021-3815 - https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0 +CVE-2021-38151 - https://github.com/jboogie15/CVE-2021-38149 +CVE-2021-38152 - http://packetstormsecurity.com/files/163816/Chikitsa-2.0.0-Cross-Site-Scripting.html +CVE-2021-38152 - https://github.com/jboogie15/CVE-2021-38149 +CVE-2021-38153 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-38153 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-38153 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-38156 - https://raxis.com/blog/cve-2021-38156 +CVE-2021-38157 - https://gist.github.com/erud1te-sec/5c85924cb78ba85af42e0b7b62a5ec91 +CVE-2021-38157 - https://leostream.com +CVE-2021-38157 - https://www.leostream.com/resources-2/product-lifecycle/ +CVE-2021-38160 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 +CVE-2021-38162 - http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html +CVE-2021-3817 - http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html +CVE-2021-3817 - https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7 +CVE-2021-38177 - http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html +CVE-2021-38178 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-38179 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-3818 - https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea +CVE-2021-38180 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-38181 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-38183 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-38185 - https://github.com/fangqyi/cpiopwn +CVE-2021-38198 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11 +CVE-2021-38199 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 +CVE-2021-3820 - https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a +CVE-2021-38200 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 +CVE-2021-38201 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 +CVE-2021-38202 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 +CVE-2021-38203 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 +CVE-2021-38204 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6 +CVE-2021-38205 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 +CVE-2021-38206 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 +CVE-2021-38207 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 +CVE-2021-38208 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 +CVE-2021-38209 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2 +CVE-2021-3822 - https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73 +CVE-2021-38221 - https://github.com/mlogclub/bbs-go/issues/112 +CVE-2021-38241 - https://www.du1ge.com/archives/CVE-2021-38241 +CVE-2021-38244 - https://github.com/cBioPortal/cbioportal/issues/8680 +CVE-2021-3825 - https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ +CVE-2021-38263 - https://issues.liferay.com/browse/LPE-17061 +CVE-2021-38266 - https://issues.liferay.com/browse/LPE-17191 +CVE-2021-38278 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-2-strcpy-buffer-overflow-92cd88e1d503 +CVE-2021-3828 - https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32 +CVE-2021-38283 - http://packetstormsecurity.com/files/165031/Wipro-Holmes-Orchestrator-20.4.1-File-Disclosure.html +CVE-2021-38289 - https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation +CVE-2021-3829 - https://huntr.dev/bounties/6b8acb0c-8b5d-461e-9b46-b1bfb5a8ccdf +CVE-2021-38291 - https://trac.ffmpeg.org/ticket/9312 +CVE-2021-38294 - http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html +CVE-2021-38296 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3830 - https://huntr.dev/bounties/0fcdee5f-1f07-47ce-b650-ea8b4a7d35d8 +CVE-2021-38300 - http://www.openwall.com/lists/oss-security/2021/09/15/5 +CVE-2021-38300 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 +CVE-2021-38300 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b +CVE-2021-3831 - https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04 +CVE-2021-3836 - https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4 +CVE-2021-38362 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2021-3837 - https://huntr.dev/bounties/d66f90d6-1b5f-440d-8be6-cdffc9d4587e +CVE-2021-38371 - https://www.exim.org +CVE-2021-38374 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html +CVE-2021-38374 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html +CVE-2021-38374 - http://seclists.org/fulldisclosure/2021/Nov/43 +CVE-2021-38374 - http://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2021-38375 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html +CVE-2021-38375 - https://seclists.org/fulldisclosure/2021/Nov/43 +CVE-2021-38376 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html +CVE-2021-38376 - https://seclists.org/fulldisclosure/2021/Nov/43 +CVE-2021-38377 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html +CVE-2021-38377 - https://seclists.org/fulldisclosure/2021/Nov/43 +CVE-2021-38378 - http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html +CVE-2021-38378 - https://seclists.org/fulldisclosure/2021/Nov/43 +CVE-2021-38380 - http://lists.live555.com/pipermail/live-devel/2021-August/021954.html +CVE-2021-38381 - http://lists.live555.com/pipermail/live-devel/2021-August/021961.html +CVE-2021-38382 - http://lists.live555.com/pipermail/live-devel/2021-August/021959.html +CVE-2021-38410 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ +CVE-2021-3842 - https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a +CVE-2021-38425 - https://github.com/eProsima/Fast-DDS +CVE-2021-3845 - https://huntr.dev/bounties/dc7fc98f-4f4f-440a-b6f6-124a56ea36ef +CVE-2021-3846 - https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18 +CVE-2021-38490 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 +CVE-2021-38496 - https://bugzilla.mozilla.org/show_bug.cgi?id=1725335 +CVE-2021-38498 - https://bugzilla.mozilla.org/show_bug.cgi?id=1729642 +CVE-2021-3850 - https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c +CVE-2021-38503 - https://bugzilla.mozilla.org/show_bug.cgi?id=1729517 +CVE-2021-38509 - https://bugzilla.mozilla.org/show_bug.cgi?id=1718571 +CVE-2021-38520 - https://kb.netgear.com/000063763/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0565 +CVE-2021-38522 - https://kb.netgear.com/000063767/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0058 +CVE-2021-38523 - https://kb.netgear.com/000063771/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0166 +CVE-2021-3853 - https://huntr.dev/bounties/2b6a7647-8f2b-4510-b40f-c52aedc2820d +CVE-2021-38530 - https://kb.netgear.com/000063770/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2019-0151 +CVE-2021-38531 - https://kb.netgear.com/000063769/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2019-0113 +CVE-2021-38532 - https://kb.netgear.com/000063787/Security-Advisory-for-Security-Misconfiguration-on-WAC104-PSV-2021-0124 +CVE-2021-38535 - https://kb.netgear.com/000063773/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0192 +CVE-2021-38536 - https://kb.netgear.com/000063774/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0193 +CVE-2021-3855 - https://docs.liman.dev/baslangic/guvenlik +CVE-2021-3857 - https://huntr.dev/bounties/18f7eaee-6309-40cb-aed3-d5ac0af03cf3 +CVE-2021-3858 - https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b +CVE-2021-3860 - http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html +CVE-2021-38603 - http://packetstormsecurity.com/files/163823/PluXML-5.8.7-Cross-Site-Scripting.html +CVE-2021-38604 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-38615 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2021-38616 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2021-38617 - https://excellium-services.com/cert-xlm-advisory/ +CVE-2021-3862 - https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601 +CVE-2021-3863 - https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0 +CVE-2021-3864 - https://www.openwall.com/lists/oss-security/2021/10/20/2 +CVE-2021-38647 - http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html +CVE-2021-38648 - http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html +CVE-2021-3866 - https://huntr.dev/bounties/5f48dac5-e112-4b23-bbbf-cc00ba83bcf2 +CVE-2021-3869 - https://huntr.dev/bounties/2f8baf6c-14b3-420d-8ede-9805797cd324 +CVE-2021-38699 - http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html +CVE-2021-38699 - https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS +CVE-2021-38699 - https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS +CVE-2021-38702 - http://packetstormsecurity.com/files/163859/Cyberoam-NetGenie-Cross-Site-Scripting.html +CVE-2021-38702 - http://seclists.org/fulldisclosure/2021/Aug/20 +CVE-2021-38702 - https://seclists.org/fulldisclosure/2021/Aug/20 +CVE-2021-38703 - https://7bits.nl/journal/posts/cve-2021-38703-kpn-experia-wifi-root-shell/ +CVE-2021-38714 - https://sourceforge.net/p/plib/bugs/55/ +CVE-2021-3872 - https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 +CVE-2021-38721 - https://github.com/daylightstudio/FUEL-CMS/issues/584 +CVE-2021-38727 - https://www.nu11secur1ty.com/2021/10/cve-2021-38727.html +CVE-2021-3874 - https://huntr.dev/bounties/ac268a17-72b5-446f-a09a-9945ef58607a +CVE-2021-3875 - https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53 +CVE-2021-38752 - https://github.com/dumpling-soup/Online-Catering-Reservation/blob/main/README.md +CVE-2021-38753 - https://github.com/dumpling-soup/Simple-Image-Gallery-Web-App/blob/main/README.md +CVE-2021-38757 - http://packetstormsecurity.com/files/163869/Hospital-Management-System-Cross-Site-Scripting.html +CVE-2021-38758 - https://attackerkb.com/topics/XuEb81tsid/online-catering-reservation-dt-food-catering-by-oretnom23-v1-0-sql-injection---login +CVE-2021-38758 - https://github.com/dumpling-soup/Online-Catering-Reservation-DT/blob/main/README.md +CVE-2021-38758 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/Online-Catering-Reservation-DT-Food-Catering +CVE-2021-38759 - http://packetstormsecurity.com/files/165211/Raspberry-Pi-5.10-Default-Credentials.html +CVE-2021-38772 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-3-yet-another-buffer-overflow-4eb322f64823 +CVE-2021-3878 - https://huntr.dev/bounties/a11c889b-ccff-4fea-9e29-963a23a63dd2 +CVE-2021-38789 - https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9Aaw_display%20service%20has%20EoP%20Vulnerability.md +CVE-2021-3879 - https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe +CVE-2021-3881 - https://huntr.dev/bounties/540fd115-7de4-4e19-a918-5ee61f5157c1 +CVE-2021-38819 - https://github.com/m4sk0ff/CVE-2021-38819/blob/main/CVE-2021-38819.md +CVE-2021-3882 - https://huntr.dev/bounties/7061d97a-98a5-495a-8ba0-3a4c66091e9d +CVE-2021-38822 - https://www.navidkagalwalla.com/icehrm-vulnerabilities +CVE-2021-38823 - https://www.navidkagalwalla.com/icehrm-vulnerabilities +CVE-2021-38833 - https://www.exploit-db.com/exploits/50288 +CVE-2021-38834 - https://www.exploit-db.com/exploits/50194 +CVE-2021-38840 - https://www.exploit-db.com/exploits/50204 +CVE-2021-38840 - https://www.exploit-db.com/exploits/50205 +CVE-2021-38841 - https://www.exploit-db.com/exploits/50205 +CVE-2021-3888 - https://huntr.dev/bounties/722b3acb-792b-4429-a98d-bb80efb8938d +CVE-2021-3889 - https://huntr.dev/bounties/efb3e261-3f7d-4a45-8114-e0ace6b21516 +CVE-2021-38926 - https://www.ibm.com/support/pages/node/6523808 +CVE-2021-3899 - https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376 +CVE-2021-3900 - https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76 +CVE-2021-3901 - https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464 +CVE-2021-3903 - https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 +CVE-2021-3904 - https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d +CVE-2021-39118 - https://jira.atlassian.com/browse/JRASERVER-72736 +CVE-2021-39131 - https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9 +CVE-2021-39134 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-39135 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-39139 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39139 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39139 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39140 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39140 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39140 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39141 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39141 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39141 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39144 - http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html +CVE-2021-39144 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39144 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39144 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39145 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39145 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39145 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39146 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39146 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39146 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39147 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39147 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39147 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39148 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39148 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39148 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39149 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39149 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39149 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-3915 - https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079 +CVE-2021-39150 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39150 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39150 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39151 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39151 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39151 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39152 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39152 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39152 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39153 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39153 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39153 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39154 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39154 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39154 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-39157 - https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr +CVE-2021-3916 - https://huntr.dev/bounties/0be32e6b-7c48-43f0-9cec-433000ad8f64 +CVE-2021-39170 - https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/ +CVE-2021-39171 - https://github.com/node-saml/passport-saml/pull/595 +CVE-2021-39172 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ +CVE-2021-39173 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ +CVE-2021-39174 - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ +CVE-2021-39176 - https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj +CVE-2021-3918 - https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9 +CVE-2021-39189 - https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/ +CVE-2021-39193 - https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm +CVE-2021-3920 - https://huntr.dev/bounties/ab564760-90c6-4e1d-80c2-852f45034cd1 +CVE-2021-39243 - http://seclists.org/fulldisclosure/2021/Aug/21 +CVE-2021-39244 - https://seclists.org/fulldisclosure/2021/Aug/21 +CVE-2021-39245 - https://seclists.org/fulldisclosure/2021/Aug/21 +CVE-2021-39246 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md +CVE-2021-39246 - https://sick.codes/sick-2021-111 +CVE-2021-39249 - https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/ +CVE-2021-39250 - https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/ +CVE-2021-39251 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39252 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39253 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39254 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39255 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39256 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39257 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39258 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39259 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39260 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39261 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39262 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39263 - https://github.com/tuxera/ntfs-3g/releases +CVE-2021-39267 - https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/ +CVE-2021-39268 - https://thanhlocpanda.wordpress.com/2021/07/31/stored-xss-via-svg-on-suitecrm/ +CVE-2021-3927 - https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 +CVE-2021-39271 - http://packetstormsecurity.com/files/163989/BSCW-Server-Remote-Code-Execution.html +CVE-2021-39271 - https://seclists.org/fulldisclosure/2021/Aug/24 +CVE-2021-39275 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-39275 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-39278 - http://packetstormsecurity.com/files/164014 +CVE-2021-3928 - https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd +CVE-2021-39280 - http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html +CVE-2021-39282 - http://lists.live555.com/pipermail/live-devel/2021-August/021970.html +CVE-2021-39283 - http://lists.live555.com/pipermail/live-devel/2021-August/021969.html +CVE-2021-39285 - https://github.com/pbgt/CVEs/blob/main/CVE-2021-39285.md +CVE-2021-39289 - http://seclists.org/fulldisclosure/2021/Aug/22 +CVE-2021-39290 - https://seclists.org/fulldisclosure/2021/Aug/22 +CVE-2021-39291 - https://seclists.org/fulldisclosure/2021/Aug/22 +CVE-2021-39295 - https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q +CVE-2021-39296 - https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q +CVE-2021-39307 - https://research.nccgroup.com/2021/09/14/technical-advisory-pdftron-javascript-urls-allowed-in-webviewer-ui-cve-2021-39307/ +CVE-2021-39307 - https://www.pdftron.com/webviewer/ +CVE-2021-3931 - https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f +CVE-2021-39312 - http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html +CVE-2021-39316 - http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html +CVE-2021-39320 - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 +CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html +CVE-2021-39327 - https://www.exploit-db.com/exploits/50382 +CVE-2021-39352 - http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html +CVE-2021-39352 - http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html +CVE-2021-39352 - https://www.exploit-db.com/exploits/50580 +CVE-2021-39363 - https://www.honeywell.com/us/en/product-security +CVE-2021-39364 - https://www.honeywell.com/us/en/product-security +CVE-2021-39369 - https://www.youtube.com/watch?v=7zC84TNpIxw +CVE-2021-39375 - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/ +CVE-2021-39376 - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/ +CVE-2021-3938 - https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063 +CVE-2021-39383 - https://github.com/wkeyuan/DWSurvey/issues/81 +CVE-2021-3939 - http://packetstormsecurity.com/files/172848/Ubuntu-accountsservice-Double-Free-Memory-Corruption.html +CVE-2021-39416 - https://github.com/remoteclinic/RemoteClinic/issues/17 +CVE-2021-39428 - https://github.com/eyoucms/eyoucms/issues/14 +CVE-2021-39432 - https://github.com/DIPlib/diplib/issues/80 +CVE-2021-3944 - https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9 +CVE-2021-3945 - https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4 +CVE-2021-39458 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39458 +CVE-2021-39459 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459 +CVE-2021-39474 - https://saikotwolf.medium.com/f9ed24e14e51 +CVE-2021-39480 - https://github.com/m4b/bingrep/issues/30 +CVE-2021-39486 - https://www.navidkagalwalla.com/gila-cms-vulnerabilities +CVE-2021-39499 - https://github.com/eyoucms/eyoucms/issues/18 +CVE-2021-3950 - https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e +CVE-2021-39501 - https://github.com/eyoucms/eyoucms/issues/17 +CVE-2021-39503 - https://github.com/gaozhifeng/PHPMyWind/issues/15 +CVE-2021-39509 - https://github.com/doudoudedi/main-DIR-816_A2_Command-injection +CVE-2021-39509 - https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md +CVE-2021-39509 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-39510 - https://github.com/doudoudedi/main-DIR-816_A1_Command-injection +CVE-2021-39510 - https://github.com/doudoudedi/main-DIR-816_A1_Command-injection/blob/main/injection_A1.md +CVE-2021-39510 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-39514 - https://github.com/thorfdbg/libjpeg/issues/36 +CVE-2021-39515 - https://github.com/thorfdbg/libjpeg/issues/37 +CVE-2021-39516 - https://github.com/thorfdbg/libjpeg/issues/42 +CVE-2021-39517 - https://github.com/thorfdbg/libjpeg/issues/33 +CVE-2021-39518 - https://github.com/thorfdbg/libjpeg/issues/35 +CVE-2021-39519 - https://github.com/thorfdbg/libjpeg/issues/28 +CVE-2021-39520 - https://github.com/thorfdbg/libjpeg/issues/34 +CVE-2021-39521 - https://github.com/LibreDWG/libredwg/issues/262 +CVE-2021-39522 - https://github.com/LibreDWG/libredwg/issues/255 +CVE-2021-39523 - https://github.com/LibreDWG/libredwg/issues/251 +CVE-2021-39525 - https://github.com/LibreDWG/libredwg/issues/261 +CVE-2021-39527 - https://github.com/LibreDWG/libredwg/issues/252 +CVE-2021-39528 - https://github.com/LibreDWG/libredwg/issues/256 +CVE-2021-39530 - https://github.com/LibreDWG/libredwg/issues/258 +CVE-2021-39531 - https://github.com/Juniper/libslax/issues/53 +CVE-2021-39532 - https://github.com/Juniper/libslax/issues/50 +CVE-2021-39533 - https://github.com/Juniper/libslax/issues/51 +CVE-2021-39534 - https://github.com/Juniper/libslax/issues/52 +CVE-2021-39535 - https://github.com/hfp/libxsmm/issues/398 +CVE-2021-39536 - https://github.com/hfp/libxsmm/issues/402 +CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2021-39537 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2021-39537 - https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html +CVE-2021-39538 - https://github.com/leonhad/pdftools/issues/4 +CVE-2021-39539 - https://github.com/leonhad/pdftools/issues/6 +CVE-2021-39540 - https://github.com/leonhad/pdftools/issues/2 +CVE-2021-39541 - https://github.com/leonhad/pdftools/issues/3 +CVE-2021-39542 - https://github.com/leonhad/pdftools/issues/5 +CVE-2021-39543 - https://github.com/leonhad/pdftools/issues/1 +CVE-2021-39544 - https://github.com/sahaRatul/sela/issues/25 +CVE-2021-39545 - https://github.com/sahaRatul/sela/issues/31 +CVE-2021-39546 - https://github.com/sahaRatul/sela/issues/29 +CVE-2021-39547 - https://github.com/sahaRatul/sela/issues/32 +CVE-2021-39548 - https://github.com/sahaRatul/sela/issues/28 +CVE-2021-39549 - https://github.com/sahaRatul/sela/issues/27 +CVE-2021-39550 - https://github.com/sahaRatul/sela/issues/30 +CVE-2021-39551 - https://github.com/sahaRatul/sela/issues/26 +CVE-2021-39552 - https://github.com/sahaRatul/sela/issues/23 +CVE-2021-39553 - https://github.com/matthiaskramm/swftools/issues/103 +CVE-2021-39554 - https://github.com/matthiaskramm/swftools/issues/100 +CVE-2021-39555 - https://github.com/matthiaskramm/swftools/issues/99 +CVE-2021-39556 - https://github.com/matthiaskramm/swftools/issues/105 +CVE-2021-39557 - https://github.com/matthiaskramm/swftools/issues/97 +CVE-2021-39558 - https://github.com/matthiaskramm/swftools/issues/106 +CVE-2021-39559 - https://github.com/matthiaskramm/swftools/issues/101 +CVE-2021-39561 - https://github.com/matthiaskramm/swftools/issues/102 +CVE-2021-39562 - https://github.com/matthiaskramm/swftools/issues/98 +CVE-2021-39563 - https://github.com/matthiaskramm/swftools/issues/115 +CVE-2021-39564 - https://github.com/matthiaskramm/swftools/issues/116 +CVE-2021-39569 - https://github.com/matthiaskramm/swftools/issues/114 +CVE-2021-3957 - https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691 +CVE-2021-39574 - https://github.com/matthiaskramm/swftools/issues/124 +CVE-2021-39575 - https://github.com/matthiaskramm/swftools/issues/128 +CVE-2021-39577 - https://github.com/matthiaskramm/swftools/issues/121 +CVE-2021-39579 - https://github.com/matthiaskramm/swftools/issues/125 +CVE-2021-3958 - https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt +CVE-2021-39582 - https://github.com/matthiaskramm/swftools/issues/122 +CVE-2021-39583 - https://github.com/matthiaskramm/swftools/issues/136 +CVE-2021-39584 - https://github.com/matthiaskramm/swftools/issues/130 +CVE-2021-39585 - https://github.com/matthiaskramm/swftools/issues/133 +CVE-2021-39587 - https://github.com/matthiaskramm/swftools/issues/129 +CVE-2021-39588 - https://github.com/matthiaskramm/swftools/issues/131 +CVE-2021-39589 - https://github.com/matthiaskramm/swftools/issues/132 +CVE-2021-39590 - https://github.com/matthiaskramm/swftools/issues/137 +CVE-2021-39591 - https://github.com/matthiaskramm/swftools/issues/135 +CVE-2021-39592 - https://github.com/matthiaskramm/swftools/issues/138 +CVE-2021-39593 - https://github.com/matthiaskramm/swftools/issues/139 +CVE-2021-39594 - https://github.com/matthiaskramm/swftools/issues/142 +CVE-2021-39595 - https://github.com/matthiaskramm/swftools/issues/141 +CVE-2021-39596 - https://github.com/matthiaskramm/swftools/issues/146 +CVE-2021-39597 - https://github.com/matthiaskramm/swftools/issues/143 +CVE-2021-39598 - https://github.com/matthiaskramm/swftools/issues/145 +CVE-2021-39599 - https://github.com/cbkhwx/cxuucmsv3/issues/7 +CVE-2021-39608 - http://packetstormsecurity.com/files/164047/FlatCore-CMS-2.0.7-Remote-Code-Execution.html +CVE-2021-39608 - https://github.com/flatCore/flatCore-CMS/issues/52 +CVE-2021-39609 - https://github.com/flatCore/flatCore-CMS/issues/53 +CVE-2021-3961 - https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10 +CVE-2021-39613 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-39613 - https://www.nussko.com/advisories/advisory-2021-08-01.txt +CVE-2021-39614 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-39614 - https://www.nussko.com/advisories/advisory-2021-08-01.txt +CVE-2021-39615 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-39615 - https://www.nussko.com/advisories/advisory-2021-08-02.txt +CVE-2021-3962 - https://github.com/ImageMagick/ImageMagick/issues/4446 +CVE-2021-3963 - https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8 +CVE-2021-3967 - https://huntr.dev/bounties/2928a625-0467-4a0a-b4e2-e27322786686 +CVE-2021-3968 - https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528 +CVE-2021-39713 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html +CVE-2021-3973 - https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e +CVE-2021-3974 - https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 +CVE-2021-3976 - https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406 +CVE-2021-3977 - https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde +CVE-2021-3980 - https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac +CVE-2021-3983 - https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413 +CVE-2021-3984 - https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a +CVE-2021-3985 - https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4 +CVE-2021-39868 - https://gitlab.com/gitlab-org/gitlab/-/issues/24649 +CVE-2021-39877 - https://gitlab.com/gitlab-org/gitlab/-/issues/300095 +CVE-2021-39881 - https://gitlab.com/gitlab-org/gitlab/-/issues/26695 +CVE-2021-3989 - https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5 +CVE-2021-39892 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39892.json +CVE-2021-39892 - https://gitlab.com/gitlab-org/gitlab/-/issues/28440 +CVE-2021-39895 - https://gitlab.com/gitlab-org/gitlab/-/issues/337824 +CVE-2021-3990 - https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f +CVE-2021-39905 - https://gitlab.com/gitlab-org/gitlab/-/issues/28226 +CVE-2021-39914 - https://gitlab.com/gitlab-org/gitlab/-/issues/289948 +CVE-2021-3992 - https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93 +CVE-2021-3993 - https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871 +CVE-2021-3993 - https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9 +CVE-2021-39936 - https://gitlab.com/gitlab-org/gitlab/-/issues/241767 +CVE-2021-3994 - https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd +CVE-2021-39946 - https://gitlab.com/gitlab-org/gitlab/-/issues/345657 +CVE-2021-3995 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html +CVE-2021-3996 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html +CVE-2021-3998 - https://www.openwall.com/lists/oss-security/2022/01/24/4 +CVE-2021-3999 - https://www.openwall.com/lists/oss-security/2022/01/24/4 +CVE-2021-4000 - https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962 +CVE-2021-4002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea +CVE-2021-4002 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 +CVE-2021-4002 - https://www.openwall.com/lists/oss-security/2021/11/25/1 +CVE-2021-4002 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-4005 - https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff +CVE-2021-40085 - https://launchpad.net/bugs/1939733 +CVE-2021-40091 - https://support.squaredup.com +CVE-2021-40091 - https://support.squaredup.com/hc/en-us/articles/4410656394129-CVE-2021-40091-SSRF-issue +CVE-2021-40092 - https://support.squaredup.com +CVE-2021-40092 - https://support.squaredup.com/hc/en-us/articles/4410635417233-CVE-2021-40092-Stored-cross-site-scripting-Image-tile- +CVE-2021-40093 - https://support.squaredup.com +CVE-2021-40093 - https://support.squaredup.com/hc/en-us/articles/4410635418257-CVE-2021-40093-Stored-cross-site-scripting-Action-Buttons- +CVE-2021-40094 - https://support.squaredup.com +CVE-2021-40094 - https://support.squaredup.com/hc/en-us/articles/4410656395537-CVE-2021-40094-DOM-based-stored-cross-site-scripting +CVE-2021-40095 - https://support.squaredup.com +CVE-2021-40095 - https://support.squaredup.com/hc/en-us/articles/4410635419153-CVE-2021-40095-Reading-arbitrary-files +CVE-2021-40096 - https://support.squaredup.com +CVE-2021-40096 - https://support.squaredup.com/hc/en-us/articles/4410656396817-CVE-2021-40096-Stored-cross-site-scripting-provider-configuration- +CVE-2021-40104 - https://hackerone.com/reports/1102088 +CVE-2021-40142 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2021-40142.pdf +CVE-2021-40142 - https://opcfoundation.org/security-bulletins/ +CVE-2021-40143 - https://support.sonatype.com/hc/en-us/articles/4405941762579 +CVE-2021-40145 - https://github.com/libgd/libgd/issues/700 +CVE-2021-40145 - https://github.com/libgd/libgd/pull/713 +CVE-2021-40149 - http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html +CVE-2021-4015 - https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1 +CVE-2021-40153 - https://github.com/plougher/squashfs-tools/issues/72 +CVE-2021-40154 - https://github.com/Xen1thLabs-AE/CVE-2021-40154 +CVE-2021-4017 - https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871 +CVE-2021-4017 - https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd +CVE-2021-4018 - https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54 +CVE-2021-40180 - https://arxiv.org/pdf/2205.15202.pdf +CVE-2021-40186 - https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186 +CVE-2021-4019 - https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 +CVE-2021-4020 - https://huntr.dev/bounties/9814baa8-7bdd-4e31-a132-d9d15653409e +CVE-2021-40212 - https://a-man-in-the-cookie.blogspot.com +CVE-2021-40212 - https://a-man-in-the-cookie.blogspot.com/2021/08/PotPlayer-Critical-Memory-Access-Violation-Vulnerability.html +CVE-2021-40219 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219 +CVE-2021-40222 - https://github.com/asang17/CVE-2021-RCE +CVE-2021-4026 - https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d +CVE-2021-40279 - https://gist.github.com/aaaahuia/b99596c6de9bd6f60e0ddb7bf0bd13c4 +CVE-2021-4028 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74 +CVE-2021-40280 - https://gist.github.com/aaaahuia/1fd31c1ebcddfe4c95268fa4f31fc312 +CVE-2021-40281 - https://gist.github.com/aaaahuia/583b062b686cdff27554e3c6fa5ac94e +CVE-2021-40282 - https://gist.github.com/aaaahuia/1343e3aa06b031ea621b5701cebcee3e +CVE-2021-40284 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-40285 - https://github.com/danpros/htmly/issues/462 +CVE-2021-40292 - https://github.com/zyx0814/dzzoffice/issues/195 +CVE-2021-40303 - https://www.exploit-db.com/exploits/50097 +CVE-2021-40309 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md +CVE-2021-40309 - https://www.exploit-db.com/exploits/50249 +CVE-2021-40310 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md +CVE-2021-40310 - https://www.youtube.com/watch?v=aPKPUDmmYpc +CVE-2021-4032 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee +CVE-2021-40326 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-4033 - https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7 +CVE-2021-40337 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-40338 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-40339 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-4034 - http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html +CVE-2021-4034 - http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html +CVE-2021-4034 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-40340 - https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch +CVE-2021-40352 - http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html +CVE-2021-4037 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e +CVE-2021-4037 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848 +CVE-2021-40371 - http://packetstormsecurity.com/files/164621/GridPro-Request-Management-For-Windows-Azure-Pack-2.0.7905-Directory-Traversal.html +CVE-2021-40371 - http://seclists.org/fulldisclosure/2021/Oct/33 +CVE-2021-40376 - https://www.tuv.com/landingpage/en/vulnerability-disclosure/ +CVE-2021-40378 - http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html +CVE-2021-40379 - http://packetstormsecurity.com/files/164026/Compro-Technology-IP-Camera-RTSP-Stream-Disclosure.html +CVE-2021-40380 - http://packetstormsecurity.com/files/164027/Compro-Technology-IP-Camera-Credential-Disclosure.html +CVE-2021-40381 - http://packetstormsecurity.com/files/164031/Compro-Technology-IP-Camera-Stream-Disclosure.html +CVE-2021-40382 - http://packetstormsecurity.com/files/164032/Compro-Technology-IP-Camera-Screenshot-Disclosure.html +CVE-2021-40388 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1399 +CVE-2021-40389 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1400 +CVE-2021-4039 - http://packetstormsecurity.com/files/166752/Zyxel-NWA-1100-NH-Command-Injection.html +CVE-2021-40390 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1401 +CVE-2021-40391 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402 +CVE-2021-40392 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403 +CVE-2021-40393 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 +CVE-2021-40394 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 +CVE-2021-40396 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1408 +CVE-2021-40397 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1409 +CVE-2021-40398 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1411 +CVE-2021-40399 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412 +CVE-2021-40400 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413 +CVE-2021-40401 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415 +CVE-2021-40402 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416 +CVE-2021-40403 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417 +CVE-2021-40404 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1420 +CVE-2021-40405 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1422 +CVE-2021-40406 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1423 +CVE-2021-40407 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 +CVE-2021-40408 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 +CVE-2021-40409 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 +CVE-2021-40410 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 +CVE-2021-40411 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 +CVE-2021-40412 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 +CVE-2021-40413 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 +CVE-2021-40414 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 +CVE-2021-40415 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 +CVE-2021-40416 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 +CVE-2021-40417 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426 +CVE-2021-40418 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427 +CVE-2021-40419 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1428 +CVE-2021-40420 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429 +CVE-2021-40422 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431 +CVE-2021-40423 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1432 +CVE-2021-40424 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 +CVE-2021-40425 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 +CVE-2021-40426 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 +CVE-2021-4043 - https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47 +CVE-2021-40438 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-40438 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-40444 - http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html +CVE-2021-40444 - http://packetstormsecurity.com/files/165214/Microsoft-Office-Word-MSHTML-Remote-Code-Execution.html +CVE-2021-40444 - http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html +CVE-2021-40449 - http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html +CVE-2021-4045 - http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html +CVE-2021-40476 - http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html +CVE-2021-4049 - https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e +CVE-2021-40495 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-40496 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-40497 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-40498 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-40499 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-4050 - https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05 +CVE-2021-40500 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 +CVE-2021-40509 - http://packetstormsecurity.com/files/164045/jforum-2.7.0-Cross-Site-Scripting.html +CVE-2021-40509 - http://seclists.org/fulldisclosure/2021/Sep/13 +CVE-2021-40509 - https://lists.openwall.net/full-disclosure/2021/09/03/7 +CVE-2021-40510 - https://www.cyberiskvision.com/advisory/ +CVE-2021-40511 - https://www.cyberiskvision.com/advisory/ +CVE-2021-40528 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 +CVE-2021-40529 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 +CVE-2021-40530 - https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 +CVE-2021-40531 - https://jonpalmisc.com/2021/11/22/cve-2021-40531 +CVE-2021-40539 - http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html +CVE-2021-40539 - https://www.manageengine.com +CVE-2021-40540 - http://packetstormsecurity.com/files/164152/Ulfius-Web-Framework-Remote-Memory-Corruption.html +CVE-2021-40546 - https://github.com/doudoudedi/buffer_overflow/blob/main/Tenda%20AC6%20V4.0-Denial%20of%20Service%20Vulnerability.md +CVE-2021-40555 - https://github.com/flatCore/flatCore-CMS/issues/56 +CVE-2021-40556 - https://x1ng.top/2021/10/14/ASUS%E6%A0%88%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ +CVE-2021-40559 - https://github.com/gpac/gpac/issues/1886 +CVE-2021-40562 - https://github.com/gpac/gpac/issues/1901 +CVE-2021-40563 - https://github.com/gpac/gpac/issues/1892 +CVE-2021-40564 - https://github.com/gpac/gpac/issues/1898 +CVE-2021-40565 - https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b +CVE-2021-40565 - https://github.com/gpac/gpac/issues/1902 +CVE-2021-40566 - https://github.com/gpac/gpac/issues/1887 +CVE-2021-40567 - https://github.com/gpac/gpac/issues/1889 +CVE-2021-40568 - https://github.com/gpac/gpac/issues/1900 +CVE-2021-40569 - https://github.com/gpac/gpac/issues/1890 +CVE-2021-4057 - http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html +CVE-2021-40570 - https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302 +CVE-2021-40570 - https://github.com/gpac/gpac/issues/1899 +CVE-2021-40571 - https://github.com/gpac/gpac/issues/1895 +CVE-2021-40572 - https://github.com/gpac/gpac/issues/1893 +CVE-2021-40573 - https://github.com/gpac/gpac/issues/1891 +CVE-2021-40574 - https://github.com/gpac/gpac/issues/1897 +CVE-2021-40575 - https://github.com/gpac/gpac/issues/1905 +CVE-2021-40576 - https://github.com/gpac/gpac/issues/1904 +CVE-2021-40577 - http://packetstormsecurity.com/files/165106/Online-Enrollment-Management-System-In-PHP-And-PayPal-1.0-Cross-Site-Scripting.html +CVE-2021-40577 - https://medium.com/@J03KR/cve-2021-40577-ec96a831ba71 +CVE-2021-40578 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System +CVE-2021-40595 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-03 +CVE-2021-40596 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07 +CVE-2021-40606 - https://github.com/gpac/gpac/issues/1885 +CVE-2021-40607 - https://github.com/gpac/gpac/issues/1879 +CVE-2021-40608 - https://github.com/gpac/gpac/issues/1883 +CVE-2021-40609 - https://github.com/gpac/gpac/issues/1894 +CVE-2021-40617 - https://github.com/OS4ED/openSIS-Classic/issues/192 +CVE-2021-40618 - https://github.com/OS4ED/openSIS-Classic/issues/193 +CVE-2021-40639 - https://github.com/jflyfox/jfinal_cms/issues/27 +CVE-2021-40644 - https://github.com/novysodope/VulReq/blob/main/oa_system +CVE-2021-40645 - https://github.com/novysodope/VulReq/blob/main/JFinalOA +CVE-2021-40651 - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md +CVE-2021-40651 - https://www.exploit-db.com/exploits/50259 +CVE-2021-40651 - https://youtu.be/wFwlbXANRCo +CVE-2021-40654 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-40655 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-40656 - https://github.com/libsixel/libsixel/issues/25 +CVE-2021-40660 - https://github.com/javadelight/delight-nashorn-sandbox/issues/117 +CVE-2021-40661 - https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr +CVE-2021-40662 - https://febinj.medium.com/cve-2021-40662-chamilo-lms-1-11-14-rce-5301bad245d7 +CVE-2021-40663 - https://github.com/janbialostok/deep-assign/issues/1 +CVE-2021-40669 - https://github.com/wuzhicms/wuzhicms/issues/196 +CVE-2021-40670 - https://github.com/wuzhicms/wuzhicms/issues/197 +CVE-2021-40674 - https://github.com/wuzhicms/wuzhicms/issues/198 +CVE-2021-40680 - http://seclists.org/fulldisclosure/2022/Apr/39 +CVE-2021-4069 - https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 +CVE-2021-40690 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-40690 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-4070 - https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877 +CVE-2021-4080 - https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db +CVE-2021-40813 - https://www.exploit-db.com/exploits/50645 +CVE-2021-40814 - https://www.getastra.com/blog/911/plugin-exploit/prestashops-customer-photo-gallery-module-vulnerable-to-sql-injection-attacks/ +CVE-2021-4082 - https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092 +CVE-2021-40822 - https://osgeo-org.atlassian.net/browse/GEOS-10229 +CVE-2021-40822 - https://osgeo-org.atlassian.net/browse/GEOS-10229?focusedCommentId=83508 +CVE-2021-40826 - https://voidsec.com/advisories/cve-2021-40826/ +CVE-2021-40827 - https://voidsec.com/advisories/cve-2021-40827/ +CVE-2021-40828 - https://github.com/aws/aws-iot-device-sdk-python-v2 +CVE-2021-40829 - https://github.com/aws/aws-iot-device-sdk-python-v2 +CVE-2021-4083 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9 +CVE-2021-4083 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-40830 - https://github.com/aws/aws-iot-device-sdk-python-v2 +CVE-2021-40831 - https://github.com/aws/aws-iot-device-sdk-python-v2 +CVE-2021-40835 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-40836 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-40837 - https://www.f-secure.com/en/business/support-and-downloads/security-advisories +CVE-2021-4084 - https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266 +CVE-2021-40845 - http://packetstormsecurity.com/files/164149/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html +CVE-2021-40845 - http://packetstormsecurity.com/files/164160/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html +CVE-2021-40845 - https://github.com/ricardojoserf/CVE-2021-40845 +CVE-2021-40845 - https://ricardojoserf.github.io/CVE-2021-40845/ +CVE-2021-40847 - https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html +CVE-2021-40847 - https://kb.netgear.com/000064039/Security-Advisory-for-Remote-Code-Execution-on-Some-Routers-PSV-2021-0204 +CVE-2021-40856 - http://packetstormsecurity.com/files/165162/Auerswald-COMfortel-1400-2600-3600-IP-2.8F-Authentication-Bypass.html +CVE-2021-40856 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2021-40856 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass +CVE-2021-40857 - http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html +CVE-2021-40857 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-005 +CVE-2021-40857 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2021-40858 - http://packetstormsecurity.com/files/165166/Auerswald-COMpact-8.0B-Arbitrary-File-Disclosure.html +CVE-2021-40858 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-006 +CVE-2021-40858 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2021-40859 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2021-40859 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/-auerswald-compact-multiple-backdoors +CVE-2021-40866 - https://gynvael.coldwind.pl/?id=740 +CVE-2021-40867 - https://gynvael.coldwind.pl/?id=741 +CVE-2021-40868 - http://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html +CVE-2021-40868 - https://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html +CVE-2021-40870 - http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html +CVE-2021-40870 - https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021 +CVE-2021-40870 - https://wearetradecraft.com/advisories/tc-2021-0002/ +CVE-2021-40875 - http://packetstormsecurity.com/files/164270/Gurock-Testrail-7.2.0.3014-Improper-Access-Control.html +CVE-2021-40875 - https://github.com/SakuraSamuraii/derailed +CVE-2021-4088 - https://kc.mcafee.com/corporate/index?page=content&id=SB10376 +CVE-2021-40888 - https://github.com/projectsend/projectsend/issues/995 +CVE-2021-40889 - https://github.com/boiteasite/cmsuno/issues/19 +CVE-2021-4089 - https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862 +CVE-2021-40903 - https://packetstormsecurity.com/files/164048/Antminer-Monitor-0.5.0-Authentication-Bypass.html +CVE-2021-40903 - https://www.exploit-db.com/exploits/50267 +CVE-2021-40904 - https://github.com/Edgarloyola/CVE-2021-40904 +CVE-2021-40906 - https://github.com/Edgarloyola/CVE-2021-40906 +CVE-2021-40907 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-08-09072021 +CVE-2021-40908 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-09 +CVE-2021-40909 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-10-09102021 +CVE-2021-4092 - https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e +CVE-2021-40940 - https://github.com/monstra-cms/monstra/issues/471 +CVE-2021-40943 - https://github.com/axiomatic-systems/Bento4/issues/643 +CVE-2021-40960 - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/ +CVE-2021-40961 - https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md +CVE-2021-40961 - https://packetstormsecurity.com/files/161895/CMS-Made-Simple-2.2.15-SQL-Injection.html +CVE-2021-40961 - https://seclists.org/fulldisclosure/2021/Mar/49 +CVE-2021-40961 - https://www.soteritsecurity.com/blog/2023/01/CMS-Made-Simple_CVE-2021-40961.html +CVE-2021-40964 - http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html +CVE-2021-4097 - https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43 +CVE-2021-40978 - https://github.com/nisdn/CVE-2021-40978 +CVE-2021-40978 - https://github.com/nisdn/CVE-2021-40978/issues/1 +CVE-2021-40985 - https://github.com/michaelrsweet/htmldoc/issues/444 +CVE-2021-4103 - https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225 +CVE-2021-41038 - https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924 +CVE-2021-4104 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4104 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-4104 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41043 - https://github.com/the-tcpdump-group/tcpslice/issues/11 +CVE-2021-41054 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 +CVE-2021-41061 - https://github.com/RIOT-OS/RIOT/issues/16844 +CVE-2021-41063 - https://www.xylem.com +CVE-2021-41063 - https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-aanderaa-psa-2021-003.pdf +CVE-2021-41065 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e +CVE-2021-41066 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e +CVE-2021-41067 - https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e +CVE-2021-4107 - https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8 +CVE-2021-41072 - https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405 +CVE-2021-41073 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc +CVE-2021-4108 - https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4 +CVE-2021-41090 - https://github.com/grafana/agent/pull/1152 +CVE-2021-41097 - https://github.com/aurelia/path/issues/44 +CVE-2021-41099 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4110 - https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20 +CVE-2021-4111 - https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a +CVE-2021-41110 - https://www.fatalerrors.org/a/analysis-of-the-snakeyaml-deserialization-in-java-security.html +CVE-2021-41116 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ +CVE-2021-41131 - https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr +CVE-2021-41146 - https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430 +CVE-2021-4115 - http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html +CVE-2021-4115 - https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 +CVE-2021-4115 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41150 - https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr +CVE-2021-4116 - https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c +CVE-2021-41164 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41164 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-41164 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41165 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41165 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-41165 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41168 - https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6 +CVE-2021-41171 - https://www.exploit-db.com/docs/50436 +CVE-2021-41172 - https://github.com/AntSword-Store/AS_Redis/issues/1 +CVE-2021-41173 - https://github.com/ethereum/go-ethereum/pull/23801 +CVE-2021-4118 - https://huntr.dev/bounties/31832f0c-e5bb-4552-a12c-542f81f111e6 +CVE-2021-41182 - https://www.drupal.org/sa-contrib-2022-004 +CVE-2021-41182 - https://www.drupal.org/sa-core-2022-002 +CVE-2021-41182 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41182 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41183 - https://www.drupal.org/sa-contrib-2022-004 +CVE-2021-41183 - https://www.drupal.org/sa-core-2022-001 +CVE-2021-41183 - https://www.drupal.org/sa-core-2022-002 +CVE-2021-41183 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41183 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41184 - https://www.drupal.org/sa-core-2022-001 +CVE-2021-41184 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41184 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-4119 - https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca +CVE-2021-4121 - https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d +CVE-2021-4123 - https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba +CVE-2021-4124 - https://huntr.dev/bounties/a6ca142e-60aa-4d6f-b231-5d1bcd1b7190 +CVE-2021-41245 - https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae +CVE-2021-41249 - https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad +CVE-2021-41253 - https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784 +CVE-2021-41256 - https://github.com/nextcloud/news-android/blob/master/security/GHSL-2021-1033_Nextcloud_News_for_Android.md +CVE-2021-41269 - https://github.com/jmrozanec/cron-utils/issues/461 +CVE-2021-41282 - http://packetstormsecurity.com/files/166208/pfSense-2.5.2-Shell-Upload.html +CVE-2021-41282 - https://www.shielder.it/advisories/pfsense-remote-command-execution/ +CVE-2021-41285 - https://github.com/VoidSec/Exploit-Development/blob/master/windows/x64/kernel/crucial_Ballistix_MOD_Utility_v.2.0.2.5/crucial_Ballistix_MOD_Utility_v.2.0.2.5_memory_dump_PoC.cpp +CVE-2021-41285 - https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/ +CVE-2021-41286 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt +CVE-2021-4130 - https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e +CVE-2021-41303 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-4131 - https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43 +CVE-2021-41314 - https://gynvael.coldwind.pl/?id=742 +CVE-2021-41318 - http://packetstormsecurity.com/files/164359/WhatsUpGold-21.0.3-Cross-Site-Scripting.html +CVE-2021-4132 - https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2 +CVE-2021-41322 - https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html +CVE-2021-41322 - https://support.polycom.com/content/support.html +CVE-2021-41323 - https://charonv.net/Pydio-Broken-Access-Control/ +CVE-2021-41324 - https://charonv.net/Pydio-Broken-Access-Control/ +CVE-2021-41325 - https://charonv.net/Pydio-Broken-Access-Control/ +CVE-2021-4133 - https://github.com/keycloak/keycloak/issues/9247 +CVE-2021-4133 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41355 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-4136 - https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938 +CVE-2021-4138 - https://bugzilla.mozilla.org/show_bug.cgi?id=1652612 +CVE-2021-41381 - http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html +CVE-2021-41381 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html +CVE-2021-41381 - http://seclists.org/fulldisclosure/2022/Nov/11 +CVE-2021-41381 - https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC +CVE-2021-41381 - https://www.exploit-db.com/exploits/50371 +CVE-2021-41381 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt +CVE-2021-41382 - http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Improper-Access-Control.html +CVE-2021-41382 - http://packetstormsecurity.com/files/164531/Plastic-SCM-10.0.16.5622-Insecure-Direct-Object-Reference.html +CVE-2021-41388 - https://www.netskope.com/company/security-compliance-and-assurance/netskope-security-advisory-nskpsa-2021-002 +CVE-2021-4139 - https://huntr.dev/bounties/6ec59e43-095f-4ba3-8b75-e92250da8e3a +CVE-2021-41390 - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content_17.html +CVE-2021-41391 - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content.html +CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v4.4.11 +CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v5.2.4 +CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v6.2.12 +CVE-2021-41393 - https://github.com/gravitational/teleport/releases/tag/v7.1.1 +CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v4.4.11 +CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v5.2.4 +CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v6.2.12 +CVE-2021-41394 - https://github.com/gravitational/teleport/releases/tag/v7.1.1 +CVE-2021-41395 - https://github.com/gravitational/teleport/releases/tag/v6.2.12 +CVE-2021-41395 - https://github.com/gravitational/teleport/releases/tag/v7.1.1 +CVE-2021-41413 - https://github.com/brackeen/ok-file-formats/issues/20 +CVE-2021-41415 - https://github.com/youranreus/Subscription-Manager/issues/2 +CVE-2021-41419 - https://gist.github.com/Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee/712ac36c8a08e2698e875169442a23a4 +CVE-2021-41426 - https://youtu.be/HL73yOW7YWU?t=540 +CVE-2021-41426 - https://youtu.be/WtcyIVImcwc +CVE-2021-41427 - https://youtu.be/CbWI-JQteRo +CVE-2021-41427 - https://youtu.be/HL73yOW7YWU?t=520 +CVE-2021-4143 - https://huntr.dev/bounties/e67603e6-8497-4ab6-b93a-02c26407d443 +CVE-2021-41441 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-41442 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-41445 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-41456 - https://github.com/gpac/gpac/issues/1911 +CVE-2021-41458 - https://github.com/gpac/gpac/issues/1910 +CVE-2021-41459 - https://github.com/gpac/gpac/issues/1912 +CVE-2021-4146 - https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760 +CVE-2021-41461 - https://github.com/concrete5/concrete5-legacy/issues/2006 +CVE-2021-41462 - https://github.com/concrete5/concrete5-legacy/issues/2006 +CVE-2021-41463 - https://github.com/concrete5/concrete5-legacy/issues/2006 +CVE-2021-41464 - https://github.com/concrete5/concrete5-legacy/issues/2006 +CVE-2021-41465 - https://github.com/concrete5/concrete5-legacy/issues/2006 +CVE-2021-41471 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-12-09162021 +CVE-2021-41472 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/razormist +CVE-2021-41487 - https://www.exploit-db.com/exploits/48528 +CVE-2021-41492 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41492 +CVE-2021-41495 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41496 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41497 - https://github.com/RaRe-Technologies/bounter/issues/47 +CVE-2021-41503 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-41504 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-41506 - https://github.com/Snawoot/hisilicon-dvr-telnet +CVE-2021-41506 - https://github.com/tothi/hs-dvr-telnet +CVE-2021-41506 - https://habr.com/en/post/486856/ +CVE-2021-41511 - http://packetstormsecurity.com/files/164366/Lodging-Reservation-Management-System-1.0-SQL-Injection.html +CVE-2021-41511 - https://github.com/Ni7inSharma/CVE-2021-41511 +CVE-2021-41511 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41511 +CVE-2021-41511 - https://www.exploit-db.com/exploits/50372 +CVE-2021-41524 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-41526 - http://seclists.org/fulldisclosure/2024/Apr/24 +CVE-2021-4154 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b +CVE-2021-4155 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79 +CVE-2021-41550 - https://leostream.com/wp-content/uploads/2018/11/Leostream_release_notes.pdf +CVE-2021-41550 - https://www.leostream.com/resource/leostream-connection-broker-9-0/ +CVE-2021-41551 - https://leostream.com/wp-content/uploads/2018/11/Leostream_release_notes.pdf +CVE-2021-41551 - https://www.leostream.com/resource/leostream-connection-broker-9-0/ +CVE-2021-41553 - https://www.gruppotim.it/redteam +CVE-2021-41554 - https://www.gruppotim.it/redteam +CVE-2021-41555 - https://www.gruppotim.it/redteam +CVE-2021-41556 - https://blog.sonarsource.com/squirrel-vm-sandbox-escape/ +CVE-2021-41557 - http://packetstormsecurity.com/files/165278/Sofico-Miles-RIA-2020.2-Build-127964T-Cross-Site-Scripting.html +CVE-2021-41559 - https://github.com/silverstripe/silverstripe-framework/releases +CVE-2021-4156 - https://github.com/libsndfile/libsndfile/issues/731 +CVE-2021-4157 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-4159 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd +CVE-2021-41591 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing +CVE-2021-41592 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing +CVE-2021-41593 - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing +CVE-2021-41594 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2021-41594 - https://www.rsa.com/en-us/company/vulnerability-response-policy +CVE-2021-4160 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4160 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41615 - https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true +CVE-2021-41617 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41617 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-4162 - https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32 +CVE-2021-41634 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ +CVE-2021-41635 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ +CVE-2021-41636 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ +CVE-2021-41637 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ +CVE-2021-41638 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ +CVE-2021-41639 - https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/ +CVE-2021-4164 - https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758 +CVE-2021-41641 - https://github.com/denoland/deno/issues/12152 +CVE-2021-41643 - https://www.exploit-db.com/exploits/50306 +CVE-2021-41644 - https://www.exploit-db.com/exploits/50305 +CVE-2021-41645 - https://www.exploit-db.com/exploits/50308 +CVE-2021-41646 - https://www.exploit-db.com/exploits/50319 +CVE-2021-41647 - http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html +CVE-2021-41647 - https://github.com/MobiusBinary/CVE-2021-41647 +CVE-2021-41647 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 +CVE-2021-41648 - http://packetstormsecurity.com/files/165036/PuneethReddyHC-Online-Shopping-System-Advanced-1.0-SQL-Injection.html +CVE-2021-41648 - https://github.com/MobiusBinary/CVE-2021-41648 +CVE-2021-41648 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41648 +CVE-2021-41649 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41649 +CVE-2021-41651 - https://github.com/MobiusBinary/CVE-2021-41651/ +CVE-2021-41653 - https://k4m1ll0.com/cve-2021-41653.html +CVE-2021-41654 - https://github.com/wuzhicms/wuzhicms/issues/198 +CVE-2021-41657 - https://gist.github.com/rvismit/2b1a10a48104e01f575cc948da69df19 +CVE-2021-41658 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-15-092121 +CVE-2021-41659 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-16-092421 +CVE-2021-4166 - https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 +CVE-2021-41660 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-06-092421 +CVE-2021-41663 - http://minicms.com +CVE-2021-41672 - https://github.com/advisto/peel-shopping/issues/5 +CVE-2021-41674 - https://github.com/janikwehrli1/0dayHunt/blob/main/E-Negosyo-System-SQLi.txt +CVE-2021-41674 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41674 +CVE-2021-41675 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41675 +CVE-2021-41677 - https://github.com/OS4ED/openSIS-Classic/issues/202 +CVE-2021-41678 - https://github.com/OS4ED/openSIS-Classic/issues/203 +CVE-2021-41679 - https://github.com/OS4ED/openSIS-Classic/issues/204 +CVE-2021-4169 - https://huntr.dev/bounties/91bbb411-6502-4dc1-8b59-b31f7d1c1f72 +CVE-2021-41694 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ +CVE-2021-41695 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ +CVE-2021-41696 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ +CVE-2021-41697 - https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ +CVE-2021-4170 - https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0 +CVE-2021-4171 - https://huntr.dev/bounties/1117f439-133c-4563-afb2-6cd80607bd5c +CVE-2021-41715 - https://github.com/libsixel/libsixel/issues/27 +CVE-2021-41716 - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/ +CVE-2021-41729 - https://github.com/meiko-S/BaiCloud-cms/issues/3 +CVE-2021-4173 - https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766 +CVE-2021-41731 - http://packetstormsecurity.com/files/168384/News247-News-Magazine-1.0-Cross-Site-Scripting.html +CVE-2021-41732 - https://github.com/zeek/zeek/issues/1798 +CVE-2021-41738 - https://medium.com/@rootless724 +CVE-2021-41739 - https://medium.com/@rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a868c695 +CVE-2021-4175 - https://huntr.dev/bounties/8a7d16e0-9a46-4710-a029-c89c33c01528 +CVE-2021-4176 - https://huntr.dev/bounties/8b531ae9-2d36-43ff-af33-4d81acfb2f27 +CVE-2021-41765 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/ +CVE-2021-4177 - https://huntr.dev/bounties/ac641425-1c64-4874-95e7-c7805c72074e +CVE-2021-41771 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41772 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41773 - http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html +CVE-2021-41773 - http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html +CVE-2021-41773 - http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html +CVE-2021-41773 - http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html +CVE-2021-41773 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-41780 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-41781 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-41782 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-41783 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-41784 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-41785 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-4179 - https://huntr.dev/bounties/8df06513-c57d-4a55-9798-0a1f6c153535 +CVE-2021-41794 - https://research.nccgroup.com/2021/10/06/technical-advisory-open5gs-stack-buffer-overflow-during-pfcp-session-establishment-on-upf-cve-2021-41794 +CVE-2021-4181 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4182 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41821 - https://documentation.wazuh.com/current/release-notes/release_4_2_0.html +CVE-2021-41823 - https://pastebin.com/kpx9Nvbf +CVE-2021-41825 - https://0xy37.medium.com/my-first-cve-cve-2021-41825-verint-workforce-optimization-html-injection-6dd450e7f2af +CVE-2021-41826 - http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html +CVE-2021-41827 - https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e +CVE-2021-41828 - https://medium.com/nestedif/vulnerability-disclosure-hardcoded-keys-password-zoho-r-a-p-318aa9bba2e +CVE-2021-4183 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4184 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41843 - http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html +CVE-2021-41843 - http://seclists.org/fulldisclosure/2021/Dec/38 +CVE-2021-41843 - https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt +CVE-2021-41843 - https://trovent.io/security-advisory-2109-01 +CVE-2021-41847 - https://grant-rose.com/infinias-access-control-vulnerability/ +CVE-2021-4185 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41861 - https://pikabu.ru/story/konfidentsialnost_polzovateley_telegram_snova_narushena_predstaviteli_messendzhera_trebuyut_ne_raskryivat_podrobnostey_8511495 +CVE-2021-41864 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12 +CVE-2021-41867 - https://www.ihteam.net/advisory/onionshare/ +CVE-2021-41868 - https://www.ihteam.net/advisory/onionshare/ +CVE-2021-4187 - https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e +CVE-2021-41870 - https://f20.be/cves/socomec +CVE-2021-41871 - https://f20.be/cves/socomec +CVE-2021-41878 - http://packetstormsecurity.com/files/164519/i-Panel-Administration-System-2.0-Cross-Site-Scripting.html +CVE-2021-41878 - https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html +CVE-2021-41878 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41878 +CVE-2021-4188 - https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28 +CVE-2021-4190 - https://gitlab.com/wireshark/wireshark/-/issues/17811 +CVE-2021-41916 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ +CVE-2021-41917 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ +CVE-2021-41918 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ +CVE-2021-41919 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ +CVE-2021-4192 - https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22 +CVE-2021-41920 - https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ +CVE-2021-41928 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921 +CVE-2021-41929 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-19-302021 +CVE-2021-4193 - https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0 +CVE-2021-41930 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821 +CVE-2021-41931 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-20-100121 +CVE-2021-4194 - https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114 +CVE-2021-41943 - https://medium.com/@idema16/how-i-found-a-cve-in-logrhythm-cve-2021-41943-61cef1797cb +CVE-2021-41945 - https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 +CVE-2021-41946 - https://github.com/afaq1337/CVE-2021-41946 +CVE-2021-41947 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41947 +CVE-2021-41950 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/ +CVE-2021-41951 - https://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace/ +CVE-2021-41965 - https://www.alexbilz.com/post/2022-05-14-cve-2021-41965/ +CVE-2021-4197 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-41973 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-41987 - https://teamt5.org/en/posts/vulnerability-mikrotik-cve-2021-41987/ +CVE-2021-42006 - https://github.com/gpertea/gclib/issues/11 +CVE-2021-42008 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13 +CVE-2021-42008 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793 +CVE-2021-42013 - http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html +CVE-2021-42013 - http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html +CVE-2021-42013 - http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html +CVE-2021-42013 - http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html +CVE-2021-42013 - http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html +CVE-2021-42013 - http://packetstormsecurity.com/files/167397/Apache-2.4.50-Remote-Code-Execution.html +CVE-2021-42013 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-42013 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-4203 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-42050 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/ +CVE-2021-42051 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/ +CVE-2021-42052 - https://nxnjz.net/2022/08/cve-2021-42052-full-disclosure/ +CVE-2021-42053 - http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html +CVE-2021-42056 - https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056 +CVE-2021-42057 - https://github.com/blacksmithgu/obsidian-dataview/issues/615 +CVE-2021-42063 - http://packetstormsecurity.com/files/166369/SAP-Knowledge-Warehouse-7.50-7.40-7.31-7.30-Cross-Site-Scripting.html +CVE-2021-42063 - http://seclists.org/fulldisclosure/2022/Mar/32 +CVE-2021-42071 - https://www.exploit-db.com/exploits/50098 +CVE-2021-42071 - https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/ +CVE-2021-42077 - http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html +CVE-2021-42077 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt +CVE-2021-42078 - http://seclists.org/fulldisclosure/2021/Nov/24 +CVE-2021-42078 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-049.txt +CVE-2021-4208 - https://wpscan.com/vulnerability/0cf63b44-f709-4ba4-be14-1eea934c2007 +CVE-2021-4209 - https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568 +CVE-2021-42099 - https://www.manageengine.com +CVE-2021-42110 - https://excellium-services.com/cert-xlm-advisory/CVE-2021-42110 +CVE-2021-42112 - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf +CVE-2021-42136 - http://packetstormsecurity.com/files/166723/REDCap-Cross-Site-Scripting.html +CVE-2021-42141 - http://packetstormsecurity.com/files/176625/Contiki-NG-tinyDTLS-Denial-Of-Service.html +CVE-2021-42165 - https://packetstormsecurity.com/files/164333/Mitrastar-GPT-2541GNAC-N1-Privilege-Escalation.html +CVE-2021-42165 - https://www.exploit-db.com/exploits/50351 +CVE-2021-42168 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-17-092921 +CVE-2021-42169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-21-100521 +CVE-2021-42169 - https://www.exploit-db.com/exploits/50403 +CVE-2021-42171 - http://packetstormsecurity.com/files/166617/Zenario-CMS-9.0.54156-Remote-Code-Execution.html +CVE-2021-42171 - https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74 +CVE-2021-42192 - https://www.exploit-db.com/exploits/50521 +CVE-2021-42194 - https://github.com/eyoucms/eyoucms/issues/19 +CVE-2021-42195 - https://github.com/matthiaskramm/swftools/issues/174 +CVE-2021-42196 - https://github.com/matthiaskramm/swftools/issues/172 +CVE-2021-42197 - https://github.com/matthiaskramm/swftools/issues/177 +CVE-2021-42198 - https://github.com/matthiaskramm/swftools/issues/168 +CVE-2021-42199 - https://github.com/matthiaskramm/swftools/issues/173 +CVE-2021-42200 - https://github.com/matthiaskramm/swftools/issues/170 +CVE-2021-42201 - https://github.com/matthiaskramm/swftools/issues/175 +CVE-2021-42202 - https://github.com/matthiaskramm/swftools/issues/171 +CVE-2021-42203 - https://github.com/matthiaskramm/swftools/issues/176 +CVE-2021-42204 - https://github.com/matthiaskramm/swftools/issues/169 +CVE-2021-4221 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704422 +CVE-2021-42216 - https://huntr.dev/bounties/419f4e8a-ee15-4f80-bcbf-5c83513515dd +CVE-2021-4222 - https://packetstormsecurity.com/files/160800/ +CVE-2021-4222 - https://wpscan.com/vulnerability/6df5f5b1-f10b-488e-80b3-2c024bbb8c78 +CVE-2021-42220 - https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html +CVE-2021-42220 - https://truedigitalsecurity.com/advisory-summary-2021 +CVE-2021-42223 - https://www.exploit-db.com/exploits/50386 +CVE-2021-42224 - http://packetstormsecurity.com/files/164514/IFSC-Code-Finder-Project-1.0-SQL-Injection.html +CVE-2021-42224 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42224 +CVE-2021-42224 - https://www.exploit-db.com/exploits/50391 +CVE-2021-42230 - https://www.exploit-db.com/exploits/50295 +CVE-2021-42237 - http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html +CVE-2021-42244 - https://github.com/PaquitoSoft/Notimoo/issues/3 +CVE-2021-42245 - https://github.com/flatCore/flatCore-CMS/issues/69 +CVE-2021-4225 - https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md +CVE-2021-4225 - https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd +CVE-2021-42252 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6 +CVE-2021-42252 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96 +CVE-2021-42258 - https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware +CVE-2021-4226 - https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 +CVE-2021-4227 - https://wpscan.com/vulnerability/8d015eba-31dc-44cb-a051-4e95df782b75/ +CVE-2021-4229 - https://github.com/faisalman/ua-parser-js/issues/536 +CVE-2021-4229 - https://vuldb.com/?id.185453 +CVE-2021-4232 - https://vuldb.com/?id.178254 +CVE-2021-42321 - http://packetstormsecurity.com/files/166153/Microsoft-Exchange-Server-Remote-Code-Execution.html +CVE-2021-42321 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html +CVE-2021-42325 - http://packetstormsecurity.com/files/164800/Froxlor-0.10.29.1-SQL-Injection.html +CVE-2021-42325 - https://www.exploit-db.com/exploits/50502 +CVE-2021-42340 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-42340 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-42340 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-42343 - https://docs.dask.org/en/latest/changelog.html +CVE-2021-42362 - http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html +CVE-2021-42369 - https://www.imagicle.com/en/resources/download/ +CVE-2021-42371 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-p2fq-9h5j-x6w5 +CVE-2021-42372 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-xfw3-pgp3-5j2p +CVE-2021-42373 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42373 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42374 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42374 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42375 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42375 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42376 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42376 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42377 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42377 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42378 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42378 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42379 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42379 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42380 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42380 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42381 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42381 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42382 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42382 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42383 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42383 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42384 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42384 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42385 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42385 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42386 - https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog +CVE-2021-42386 - https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ +CVE-2021-42392 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4240 - https://huntr.dev/bounties/2-phpservermon/phpservermon/ +CVE-2021-4240 - https://vuldb.com/?id.213717 +CVE-2021-4241 - https://github.com/phpservermon/phpservermon/commit/bb10a5f3c68527c58073258cb12446782d223bc3 +CVE-2021-4241 - https://huntr.dev/bounties/1-phpservermon/phpservermon/ +CVE-2021-4241 - https://vuldb.com/?id.213744 +CVE-2021-4242 - https://blog.csdn.net/qq_44159028/article/details/114590267 +CVE-2021-4242 - https://vuldb.com/?id.214592 +CVE-2021-4243 - https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/ +CVE-2021-4245 - https://github.com/chbrown/rfc6902/pull/76 +CVE-2021-4245 - https://vuldb.com/?id.215883 +CVE-2021-4250 - https://vuldb.com/?id.216207 +CVE-2021-42550 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html +CVE-2021-42550 - http://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2021-42551 - https://www.redguard.ch/advisories/netbiblio_webopac.txt +CVE-2021-42552 - https://it-sec.de/schwachstelle-in-archivista-dms/ +CVE-2021-42556 - https://rasa.com +CVE-2021-42558 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera +CVE-2021-42559 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera +CVE-2021-42560 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42560-Unsafe%20XML%20Parsing-MITRE%20Caldera +CVE-2021-42561 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42561-Command%20Injection%20Via%20the%20Human%20Plugin-MITRE%20Caldera +CVE-2021-42562 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42562-Improper%20Access%20Control-MITRE%20Caldera +CVE-2021-42564 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-057.txt +CVE-2021-42565 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 +CVE-2021-42566 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 +CVE-2021-42568 - https://support.sonatype.com +CVE-2021-42568 - https://support.sonatype.com/hc/en-us/articles/4408801690515-CVE-2021-42568-Nexus-Repository-Manager-3-Incorrect-Access-Control-October-27-2021 +CVE-2021-42575 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-42575 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-42580 - http://packetstormsecurity.com/files/164985/Online-Learning-System-2.0-Remote-Code-Execution.html +CVE-2021-42580 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07 +CVE-2021-42581 - https://github.com/ramda/ramda/pull/3192 +CVE-2021-42584 - https://dev696.github.io/Writeup/ +CVE-2021-42584 - https://github.com/convos-chat/convos/issues/623 +CVE-2021-42585 - https://github.com/LibreDWG/libredwg/issues/351 +CVE-2021-42586 - https://github.com/LibreDWG/libredwg/issues/350 +CVE-2021-42612 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-text-uaf +CVE-2021-42613 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-winhelp-df +CVE-2021-42614 - https://carteryagemann.com/halibut-case-study.html#poc-halibut-info-uaf +CVE-2021-42627 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-42631 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42631 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42631 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42633 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42633 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42633 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42635 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42635 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42635 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42637 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42637 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42637 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42638 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42638 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42638 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42639 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42639 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42639 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-4264 - https://vuldb.com/?id.216464 +CVE-2021-42640 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42640 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42640 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42641 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42641 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42641 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42642 - https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html +CVE-2021-42642 - https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite +CVE-2021-42642 - https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite +CVE-2021-42643 - https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ +CVE-2021-42644 - https://jdr2021.github.io/2021/10/14/CmsEasy_7.7.5_20211012%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E5%92%8C%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ +CVE-2021-42646 - http://packetstormsecurity.com/files/167465/WSO2-Management-Console-XML-Injection.html +CVE-2021-42646 - https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1289/ +CVE-2021-42659 - https://github.com/Lyc-heng/routers/blob/main/routers/stack4.md +CVE-2021-42662 - http://packetstormsecurity.com/files/164615/Online-Event-Booking-And-Reservation-System-1.0-Cross-Site-Scripting.html +CVE-2021-42662 - https://github.com/TheHackingRabbi/CVE-2021-42662 +CVE-2021-42662 - https://www.exploit-db.com/exploits/50450 +CVE-2021-42663 - https://github.com/TheHackingRabbi/CVE-2021-42663 +CVE-2021-42664 - http://packetstormsecurity.com/files/164618/Engineers-Online-Portal-1.0-SQL-Injection.html +CVE-2021-42664 - https://github.com/TheHackingRabbi/CVE-2021-42664 +CVE-2021-42664 - https://www.exploit-db.com/exploits/50451 +CVE-2021-42665 - https://github.com/TheHackingRabbi/CVE-2021-42665 +CVE-2021-42665 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42665 +CVE-2021-42665 - https://www.exploit-db.com/exploits/50452 +CVE-2021-42666 - https://github.com/TheHackingRabbi/CVE-2021-42666 +CVE-2021-42666 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321 +CVE-2021-42666 - https://www.exploit-db.com/exploits/50453 +CVE-2021-42667 - https://github.com/TheHackingRabbi/CVE-2021-42667 +CVE-2021-42667 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42667 +CVE-2021-42668 - https://github.com/TheHackingRabbi/CVE-2021-42668 +CVE-2021-42668 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42668 +CVE-2021-42669 - https://github.com/TheHackingRabbi/CVE-2021-42669 +CVE-2021-42669 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671 +CVE-2021-42670 - https://github.com/TheHackingRabbi/CVE-2021-42670 +CVE-2021-42670 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE-nu11-101321 +CVE-2021-42671 - https://github.com/TheHackingRabbi/CVE-2021-42671 +CVE-2021-42671 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671 +CVE-2021-42681 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42682 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42683 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42685 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42686 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42687 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42688 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42697 - http://packetstormsecurity.com/files/167018/Akka-HTTP-10.1.14-Denial-Of-Service.html +CVE-2021-42715 - https://github.com/nothings/stb/issues/1224 +CVE-2021-42716 - https://github.com/nothings/stb/issues/1166 +CVE-2021-42716 - https://github.com/nothings/stb/issues/1225 +CVE-2021-42717 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-4273 - https://vuldb.com/?id.216478 +CVE-2021-42739 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-42750 - https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html +CVE-2021-42751 - https://packetstormsecurity.com/files/167999/Thingsboard-3.3.1-Cross-Site-Scripting.html +CVE-2021-4276 - https://vuldb.com/?id.216746 +CVE-2021-42770 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r32j-xgg3-w2rw +CVE-2021-42771 - https://www.tenable.com/security/research/tra-2021-14 +CVE-2021-42777 - http://burninatorsec.blogspot.com/2022/04/library-rce-object-chaining-cve-2021.html +CVE-2021-4279 - https://github.com/Starcounter-Jack/JSON-Patch/pull/262 +CVE-2021-42794 - https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf +CVE-2021-42840 - http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html +CVE-2021-42847 - http://packetstormsecurity.com/files/172258/ManageEngine-ADAudit-Plus-Remote-Code-Execution.html +CVE-2021-42859 - https://github.com/michaelrsweet/mxml/issues/286 +CVE-2021-42860 - https://github.com/michaelrsweet/mxml/issues/286 +CVE-2021-42863 - https://github.com/jerryscript-project/jerryscript/issues/4793 +CVE-2021-42870 - https://github.com/xebd/accel-ppp/issues/158 +CVE-2021-42872 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_NoticeUrl_rce4.md +CVE-2021-42875 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_ipdoamin_rce.md +CVE-2021-42877 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_reboot.md +CVE-2021-4288 - https://github.com/openmrs/openmrs-module-referenceapplication/pull/92 +CVE-2021-42884 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicename_rce.md +CVE-2021-42885 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_devicemac_rce.md +CVE-2021-42886 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_exportsettings_leak.md +CVE-2021-42887 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_login_bypass.md +CVE-2021-42888 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_langtype_rce.md +CVE-2021-42889 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_getWiFiApConfig_leak.md +CVE-2021-4289 - https://issues.openmrs.org/browse/RA-1875 +CVE-2021-42890 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_hosttime_rce.md +CVE-2021-42891 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_easywizard_leak.md +CVE-2021-42892 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_telnet_default.md +CVE-2021-42893 - https://github.com/p1Kk/vuln/blob/main/totolink_ex1200t_sysstatus_leak.md +CVE-2021-42897 - https://github.com/FeMiner/wms/issues/12 +CVE-2021-42911 - https://gist.github.com/Cossack9989/e9c1c2d2e69b773ca4251acdd77f2835 +CVE-2021-42912 - https://medium.com/@windsormoreira/fiberhome-an5506-os-command-injection-cve-2021-42912-10b64fd10ce2 +CVE-2021-42913 - https://medium.com/@windsormoreira/samsung-printer-scx-6x55x-improper-access-control-cve-2021-42913-bd50837e5e9a +CVE-2021-42913 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-42917 - https://github.com/xbmc/xbmc/issues/20305 +CVE-2021-42917 - https://github.com/xbmc/xbmc/pull/20306 +CVE-2021-42940 - https://truedigitalsecurity.com/services/penetration-testing-services/advisory-summary-2.2022-cve-2021-42940 +CVE-2021-42943 - https://devbrain.com.br/index.php/2022/05/16/cve-2021-42943/ +CVE-2021-42950 - http://zepl.com +CVE-2021-42951 - http://algorithmia.com +CVE-2021-42952 - http://zepl.com +CVE-2021-42954 - https://medium.com/nestedif/vulnerability-disclosure-improper-filesystem-permission-misconfigured-acls-zoho-r-a-p-56e195464b51 +CVE-2021-42955 - https://medium.com/nestedif/vulnerability-disclosure-improper-acl-unauthorized-password-reset-zoho-r-a-p-62efcdceb7a6 +CVE-2021-42970 - https://github.com/cbkhwx/cxuucmsv3/issues/8 +CVE-2021-42972 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42973 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42976 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42977 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42979 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42980 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42983 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42986 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42987 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42988 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42990 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42993 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42994 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-42996 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43000 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43002 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43003 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43006 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43009 - http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html +CVE-2021-43009 - https://www.exploit-db.com/exploits/50857 +CVE-2021-43032 - https://github.com/SakuraSamuraii/CVE-2021-43032 +CVE-2021-43033 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43033 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43033 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43034 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43034 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43034 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43035 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43035 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43035 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43036 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43036 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43036 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43037 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43037 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43037 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43038 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43038 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43038 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43039 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43039 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43039 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43040 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43040 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43040 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43041 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43041 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43041 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43042 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43042 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43042 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43043 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43043 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43043 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-43044 - https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 +CVE-2021-43044 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 +CVE-2021-43044 - https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 +CVE-2021-4305 - https://vuldb.com/?id.217448 +CVE-2021-43056 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 +CVE-2021-43057 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8 +CVE-2021-43057 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7 +CVE-2021-43062 - http://packetstormsecurity.com/files/166055/Fortinet-Fortimail-7.0.1-Cross-Site-Scripting.html +CVE-2021-43065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8wx4-g5p9-348h +CVE-2021-4307 - https://github.com/Yomguithereal/baobab/pull/511 +CVE-2021-4308 - https://github.com/WebPA/WebPA/commit/8836c4f549181e885a68e0e7ca561fdbcbd04bf0 +CVE-2021-43091 - https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/ +CVE-2021-43094 - https://issues.openmrs.org/browse/TRUNK-6043 +CVE-2021-43097 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43098 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43099 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43100 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43101 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43102 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43103 - https://github.com/diyhi/bbs/issues/51 +CVE-2021-43109 - https://github.com/PuneethReddyHC/online-shopping-system/issues/17 +CVE-2021-43110 - https://github.com/PuneethReddyHC/online-shopping-system/issues/17 +CVE-2021-43113 - https://pastebin.com/BXnkY9YY +CVE-2021-43116 - http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html +CVE-2021-43118 - https://gist.github.com/Cossack9989/6034c077f46e4f06d0992e9f2fae7f26 +CVE-2021-43129 - https://github.com/Skotizo/CVE-2021-43129 +CVE-2021-43130 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43130 +CVE-2021-43130 - https://www.exploit-db.com/exploits/50158 +CVE-2021-43136 - http://packetstormsecurity.com/files/164930/FormaLMS-2.4.4-Authentication-Bypass.html +CVE-2021-43136 - https://blog.hacktivesecurity.com +CVE-2021-43136 - https://blog.hacktivesecurity.com/index.php/2021/10/05/cve-2021-43136-formalms-the-evil-default-value-that-leads-to-authentication-bypass/ +CVE-2021-43137 - https://www.exploit-db.com/exploits/50461 +CVE-2021-43140 - http://packetstormsecurity.com/files/164968/Simple-Subscription-Website-1.0-SQL-Injection.html +CVE-2021-43140 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43140 +CVE-2021-43141 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-43141 +CVE-2021-43142 - https://novysodope.github.io/2021/10/29/64/ +CVE-2021-4315 - https://vuldb.com/?id.219676 +CVE-2021-43155 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18 +CVE-2021-43156 - https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19 +CVE-2021-43157 - https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1 +CVE-2021-43158 - https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2 +CVE-2021-43159 - http://ruijie.com +CVE-2021-43160 - http://ruijie.com +CVE-2021-43161 - http://ruijie.com +CVE-2021-43162 - http://ruijie.com +CVE-2021-43163 - http://ruijie.com +CVE-2021-43164 - http://packetstormsecurity.com/files/167099/Ruijie-Reyee-Mesh-Router-Remote-Code-Execution.html +CVE-2021-43164 - http://ruijie.com +CVE-2021-43257 - https://www.mantisbt.org/bugs/view.php?id=29130 +CVE-2021-43267 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16 +CVE-2021-4328 - https://hammerking.top/index.php/archives/104/ +CVE-2021-43282 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ +CVE-2021-43283 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ +CVE-2021-43284 - https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ +CVE-2021-43286 - https://blog.sonarsource.com/gocd-vulnerability-chain +CVE-2021-43288 - https://blog.sonarsource.com/gocd-vulnerability-chain +CVE-2021-43289 - https://blog.sonarsource.com/gocd-vulnerability-chain +CVE-2021-43290 - https://blog.sonarsource.com/gocd-vulnerability-chain +CVE-2021-43293 - https://support.sonatype.com/hc/en-us/articles/4409326330003 +CVE-2021-43306 - https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/ +CVE-2021-43307 - https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/ +CVE-2021-43308 - https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/ +CVE-2021-43309 - https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ +CVE-2021-43311 - https://github.com/upx/upx/issues/380 +CVE-2021-43312 - https://github.com/upx/upx/issues/379 +CVE-2021-43313 - https://github.com/upx/upx/issues/378 +CVE-2021-43314 - https://github.com/upx/upx/issues/380 +CVE-2021-43315 - https://github.com/upx/upx/issues/380 +CVE-2021-43316 - https://github.com/upx/upx/issues/381 +CVE-2021-43317 - https://github.com/upx/upx/issues/380 +CVE-2021-43326 - http://packetstormsecurity.com/files/165449/Automox-Agent-32-Local-Privilege-Escalation.html +CVE-2021-43329 - https://cxsecurity.com/issue/WLB-2021110057 +CVE-2021-43329 - https://packetstormsecurity.com/files/164947/Mumara-Classic-2.93-SQL-Injection.html +CVE-2021-43329 - https://packetstormsecurity.com/files/164947/mumaraclassic293-sql.txt +CVE-2021-43329 - https://vulners.com/zdt/1337DAY-ID-37036 +CVE-2021-43329 - https://www.cyberdetails.org/2021/11/mumara-classic-293-sql-injection.html +CVE-2021-43329 - https://www.exploit-db.com/exploits/50518 +CVE-2021-43329 - https://www.gen.net.uk/about-us/news/50-exploit-db/18335-webapps-mumara-classic-293-license-sql-injection-unauthenticated +CVE-2021-43334 - https://www.cygenta.co.uk/post/buddyboss +CVE-2021-43339 - https://www.exploit-db.com/exploits/50468 +CVE-2021-43339 - https://www.exploit-db.com/exploits/50469 +CVE-2021-43389 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 +CVE-2021-43389 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d +CVE-2021-43389 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-43395 - https://jgardner100.wordpress.com/2022/01/20/security-heads-up/ +CVE-2021-43395 - https://kebe.com/blog/?p=505 +CVE-2021-43395 - https://www.illumos.org/issues/14424 +CVE-2021-43395 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-43396 - https://sourceware.org/bugzilla/show_bug.cgi?id=28524 +CVE-2021-43396 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-43397 - http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html +CVE-2021-43399 - https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ +CVE-2021-43405 - http://packetstormsecurity.com/files/164795/FusionPBX-4.5.29-Remote-Code-Execution.html +CVE-2021-43409 - https://appcheck-ng.com/wordpress-microsoft-office-365-azure-ad-login-persistent-cross-site-scripting/ +CVE-2021-43409 - https://www.wpo365.com/change-log/ +CVE-2021-43419 - https://www.youtube.com/watch?v=HJUj3PgH7Ag +CVE-2021-43429 - https://github.com/Seagate/cortx-s3server/issues/1037 +CVE-2021-43436 - https://medium.com/@mayhem7999/cve-2021-43436-56dc43aeac81 +CVE-2021-43437 - https://medium.com/@mayhem7999/cve-2021-43437-5c5e3b977e84 +CVE-2021-43439 - https://medium.com/@mayhem7999/cve-2021-43439-79c8ff1801fc +CVE-2021-43440 - https://medium.com/@mayhem7999/cve-2021-43439-d04781bca6ce +CVE-2021-43441 - https://medium.com/@mayhem7999/cve-2021-43441-2fcc857cb6bb +CVE-2021-43442 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5688.php +CVE-2021-43444 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ +CVE-2021-43445 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ +CVE-2021-43446 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ +CVE-2021-43447 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ +CVE-2021-43448 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ +CVE-2021-43449 - https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ +CVE-2021-43451 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection +CVE-2021-43451 - https://www.exploit-db.com/exploits/50467 +CVE-2021-43453 - https://github.com/jerryscript-project/jerryscript/issues/4754 +CVE-2021-43454 - https://www.exploit-db.com/exploits/49549 +CVE-2021-43455 - https://www.exploit-db.com/exploits/49630 +CVE-2021-43456 - https://www.exploit-db.com/exploits/49203 +CVE-2021-43457 - https://www.exploit-db.com/exploits/49632 +CVE-2021-43458 - https://www.exploit-db.com/exploits/49641 +CVE-2021-43459 - https://www.exploit-db.com/exploits/49254 +CVE-2021-43460 - https://www.exploit-db.com/exploits/49248 +CVE-2021-43461 - https://www.exploit-db.com/exploits/49253 +CVE-2021-43462 - https://www.exploit-db.com/exploits/49255 +CVE-2021-43463 - https://www.exploit-db.com/exploits/49706 +CVE-2021-43474 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-43481 - http://packetstormsecurity.com/files/167026/WebTareas-2.4-SQL-Injection.html +CVE-2021-43481 - https://behradtaher.dev/2021/11/05/Discovering-a-Blind-SQL-Injection-Whitebox-Approach/ +CVE-2021-43484 - https://www.exploit-db.com/exploits/50094 +CVE-2021-43492 - https://github.com/AlquistManager/alquist/issues/42 +CVE-2021-43493 - https://github.com/cksgf/ServerManagement/issues/21 +CVE-2021-43495 - https://github.com/AlquistManager/alquist/issues/43 +CVE-2021-43496 - https://github.com/varun-suresh/Clustering/issues/12 +CVE-2021-43498 - https://packetstormsecurity.com/files/157563/ATutor-LMS-2.2.4-Weak-Password-Reset-Hash.html +CVE-2021-43505 - https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/xss.txt +CVE-2021-43506 - https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/sql.txt +CVE-2021-43509 - https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43509 +CVE-2021-43509 - https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26 +CVE-2021-43510 - https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43510 +CVE-2021-43510 - https://r4hn1.medium.com/journey-to-first-two-cve-by-rahul-kalnarayan-307e2e87ee26 +CVE-2021-43512 - https://medium.com/@janmejayaswainofficial/advisory-of-cve-2021-43512-5e54e6a93101 +CVE-2021-43517 - https://habr.com/ru/post/486856/ +CVE-2021-43527 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-43530 - https://bugzilla.mozilla.org/show_bug.cgi?id=1736886 +CVE-2021-43532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 +CVE-2021-43536 - https://bugzilla.mozilla.org/show_bug.cgi?id=1730120 +CVE-2021-43537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1738237 +CVE-2021-43538 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739091 +CVE-2021-43540 - https://bugzilla.mozilla.org/show_bug.cgi?id=1636629 +CVE-2021-43544 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739934 +CVE-2021-43566 - https://bugzilla.samba.org/show_bug.cgi?id=13979 +CVE-2021-43566 - https://www.samba.org/samba/security/CVE-2021-43566.html +CVE-2021-43568 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ +CVE-2021-43569 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ +CVE-2021-43570 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ +CVE-2021-43571 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ +CVE-2021-43572 - https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ +CVE-2021-43574 - https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e +CVE-2021-43575 - https://github.com/robertguetzkow/ets5-password-recovery +CVE-2021-43579 - https://github.com/michaelrsweet/htmldoc/issues/453 +CVE-2021-43579 - https://github.com/michaelrsweet/htmldoc/issues/456 +CVE-2021-4360 - https://wpscan.com/vulnerability/5ddc0a9d-c081-4bef-aa87-3b10d037379c +CVE-2021-43609 - https://github.com/d5sec/CVE-2021-43609-POC +CVE-2021-43609 - https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe +CVE-2021-43616 - https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0 +CVE-2021-43628 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2 +CVE-2021-43629 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3 +CVE-2021-43630 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4 +CVE-2021-43631 - https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5 +CVE-2021-43633 - https://medium.com/@shaunwhorton/how-i-found-two-different-xss-vulnerabilities-a491144e8494 +CVE-2021-43637 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43638 - https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ +CVE-2021-43650 - https://www.exploit-db.com/exploits/50542 +CVE-2021-43657 - https://github.com/c0n5n3d/CVE-2021-43657/blob/main/Info.txt +CVE-2021-43683 - https://github.com/HaschekSolutions/pictshare/issues/133 +CVE-2021-43691 - https://github.com/toocool/tripexpress/issues/40 +CVE-2021-43700 - https://github.com/gongwalker/ApiManager/issues/26 +CVE-2021-43701 - http://packetstormsecurity.com/files/166535/CSZ-CMS-1.2.9-SQL-Injection.html +CVE-2021-43701 - https://github.com/cskaza/cszcms/issues/31 +CVE-2021-43701 - https://www.exploit-db.com/exploits/50846 +CVE-2021-43702 - https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch +CVE-2021-43708 - https://medium.com/@way2goraj/bypass-data-classification-labelling-tool-aa037ff86dee +CVE-2021-43711 - https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md +CVE-2021-43722 - https://github.com/luqiut/iot/blob/main/DIR-645%20Stack%20overflow.md +CVE-2021-43722 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-43724 - https://github.com/intelliants/subrion/issues/890 +CVE-2021-43728 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 +CVE-2021-43729 - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 +CVE-2021-43734 - https://github.com/kekingcn/kkFileView/issues/304 +CVE-2021-43737 - https://github.com/hiliqi/xiaohuanxiong/issues/28 +CVE-2021-43738 - https://github.com/hiliqi/xiaohuanxiong/issues/28 +CVE-2021-43741 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43741 +CVE-2021-43742 - https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43742 +CVE-2021-4377 - https://wpscan.com/vulnerability/36afc442-9634-498e-961e-4c935880cd2b +CVE-2021-43778 - https://github.com/hansmach1ne/MyExploits/tree/main/Path%20Traversal%20in%20GLPI%20Barcode%20plugin +CVE-2021-43779 - https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin +CVE-2021-43797 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-43797 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-43798 - http://packetstormsecurity.com/files/165198/Grafana-Arbitrary-File-Reading.html +CVE-2021-43798 - http://packetstormsecurity.com/files/165221/Grafana-8.3.0-Directory-Traversal-Arbitrary-File-Read.html +CVE-2021-43802 - https://github.com/ether/etherpad-lite/releases/tag/1.8.16 +CVE-2021-43809 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ +CVE-2021-43818 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-43818 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-43828 - https://huntr.dev/bounties/fe6248f1-603d-43df-816c-c75534a56f72 +CVE-2021-43829 - https://huntr.dev/bounties/17324785-f83a-4058-ac40-03f2bfa16399/ +CVE-2021-43837 - https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ +CVE-2021-43847 - https://huntr.dev/bounties/943dad83-f0ed-4c74-ba81-7dfce7ca0ef2/ +CVE-2021-43857 - http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html +CVE-2021-43859 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-43859 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-43862 - https://github.com/jcubic/jquery.terminal/issues/727 +CVE-2021-43863 - https://github.com/nextcloud/android/security/advisories/GHSA-vjp2-f63v-w479 +CVE-2021-43890 - https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks/ +CVE-2021-43893 - http://packetstormsecurity.com/files/165560/Microsoft-Windows-EFSRPC-Arbitrary-File-Upload-Privilege-Escalation.html +CVE-2021-43936 - http://packetstormsecurity.com/files/165252/WebHMI-4.0-Remote-Code-Execution.html +CVE-2021-43960 - https://www.surecloud.com/resources/blog/lorensbergs-connect2-cross-site-scripting +CVE-2021-43961 - https://support.sonatype.com/hc/en-us/articles/4412183372307 +CVE-2021-43969 - https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/ +CVE-2021-43970 - https://www.assurainc.com/assura-announces-discovery-of-two-vulnerabilities-in-quicklert-for-digium-switchvox/amp-on/ +CVE-2021-43971 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md +CVE-2021-43972 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md +CVE-2021-43973 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md +CVE-2021-43974 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md +CVE-2021-43976 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-43979 - https://github.com/hkerma/opa-gatekeeper-concurrency-issue +CVE-2021-43991 - https://appcheck-ng.com/persistent-xss-kentico-cms/ +CVE-2021-44032 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md +CVE-2021-44033 - http://packetstormsecurity.com/files/165027/Ionic-Identity-Vault-5.0.4-PIN-Unlock-Lockout-Bypass.html +CVE-2021-44035 - https://www.wolterskluwer.com/en/solutions/teammate +CVE-2021-44036 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-059.txt +CVE-2021-44037 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-060.txt +CVE-2021-44041 - https://docs.uipath.com/robot/docs/release-notes-2021-10-4 +CVE-2021-44041 - https://docs.uipath.com/robot/docs/uipath-assistant +CVE-2021-44042 - https://docs.uipath.com/robot/docs/release-notes-2021-10-4 +CVE-2021-44042 - https://docs.uipath.com/robot/docs/uipath-assistant +CVE-2021-44043 - https://docs.uipath.com/apps/v2021.10/docs/2021-10-1 +CVE-2021-44043 - https://docs.uipath.com/robot/docs/uipath-assistant +CVE-2021-44049 - https://hencohen10.medium.com/cyberark-endpoint-manager-local-privilege-escalation-cve-2021-44049-67cd5e62c3d2 +CVE-2021-44076 - https://labs.nettitude.com/blog/cve-2021-44076-cross-site-scripting-xss-in-crushftp/ +CVE-2021-44077 - http://packetstormsecurity.com/files/165400/ManageEngine-ServiceDesk-Plus-Remote-Code-Execution.html +CVE-2021-44080 - https://research.nccgroup.com/2022/05/24/technical-advisory-sercomm-h500s-authenticated-remote-command-execution-cve-2021-44080/ +CVE-2021-44087 - https://www.exploit-db.com/exploits/50801 +CVE-2021-44087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip +CVE-2021-44088 - https://www.exploit-db.com/exploits/50802 +CVE-2021-44088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip +CVE-2021-44091 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Multi%20Restaurant%20Table%20Reservation%20System +CVE-2021-44092 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/code-projects/Pharmacy-Management +CVE-2021-44095 - https://medium.com/@shubhamvpandey/cve-2021-44095-481059d14470 +CVE-2021-44097 - https://medium.com/@shubhamvpandey/cve-2021-44097-d51c11258571 +CVE-2021-44098 - https://medium.com/@shubhamvpandey/cve-2021-44098-8dbaced8b854 +CVE-2021-44103 - https://www.exploit-db.com/exploits/50521 +CVE-2021-44108 - https://github.com/open5gs/open5gs/issues/1247 +CVE-2021-44109 - https://github.com/open5gs/open5gs/issues/1247 +CVE-2021-44111 - https://github.com/s-cart/s-cart/issues/102 +CVE-2021-44114 - https://medium.com/@mayhem7999/cve-2021-44114-957145c1773 +CVE-2021-44117 - https://github.com/warmachine-57/CVE-2021-44117/blob/main/CSRF%20in%20FuelCMS +CVE-2021-44127 - https://github.com/tgp-top/DAP-1360/blob/main/README.md +CVE-2021-44127 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-44142 - https://bugzilla.samba.org/show_bug.cgi?id=14914 +CVE-2021-44151 - http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html +CVE-2021-44152 - http://packetstormsecurity.com/files/165186/Reprise-License-Manager-14.2-Unauthenticated-Password-Change.html +CVE-2021-44153 - http://packetstormsecurity.com/files/165194/Reprise-License-Manager-14.2-Remote-Binary-Execution.html +CVE-2021-44154 - http://packetstormsecurity.com/files/165193/Reprise-License-Manager-14.2-Buffer-Overflow.html +CVE-2021-44155 - http://packetstormsecurity.com/files/165182/Reprise-License-Manager-14.2-User-Enumeration.html +CVE-2021-44208 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html +CVE-2021-44209 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html +CVE-2021-44210 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html +CVE-2021-44211 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html +CVE-2021-44212 - http://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html +CVE-2021-44213 - https://packetstormsecurity.com/files/166389/OX-App-Suite-7.10.5-Cross-Site-Scripting.html +CVE-2021-44223 - https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-update-can-get-you-pwned/ +CVE-2021-44224 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44224 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-44226 - http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html +CVE-2021-44226 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html +CVE-2021-44226 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html +CVE-2021-44226 - http://seclists.org/fulldisclosure/2022/Mar/51 +CVE-2021-44226 - http://seclists.org/fulldisclosure/2023/Jan/26 +CVE-2021-44226 - http://seclists.org/fulldisclosure/2023/Sep/6 +CVE-2021-44226 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt +CVE-2021-44228 - http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html +CVE-2021-44228 - http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html +CVE-2021-44228 - http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html +CVE-2021-44228 - http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html +CVE-2021-44228 - http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html +CVE-2021-44228 - http://seclists.org/fulldisclosure/2022/Dec/2 +CVE-2021-44228 - http://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2021-44228 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 +CVE-2021-44228 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd +CVE-2021-44228 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44228 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-44244 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Simple-Logistic-Hub-Parcels-Management +CVE-2021-44245 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/unyasoft/CTMS +CVE-2021-44249 - https://www.exploit-db.com/exploits/50429 +CVE-2021-44255 - https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/ +CVE-2021-44259 - https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_second.md +CVE-2021-44260 - https://github.com/zer0yu/CVE_Request/blob/master/WAVLINK/WAVLINK_AC1200_unauthorized_access_vulnerability_first.md +CVE-2021-44261 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_first.md +CVE-2021-44262 - https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_second.md +CVE-2021-44280 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44280 +CVE-2021-44315 - https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/blob/master/Directory%20listing/Report_Directory%20listing.pdf +CVE-2021-44315 - https://github.com/abhiunix/Bus-Pass-Management-System-v1.0/tree/master/Directory%20listing +CVE-2021-4432 - https://0day.today/exploit/description/36412 +CVE-2021-4432 - https://packetstormsecurity.com/files/163104/PCMan-FTP-Server-2.0.7-Denial-Of-Service.html +CVE-2021-4432 - https://vuldb.com/?id.250719 +CVE-2021-4433 - https://packetstormsecurity.com/files/163138/Sami-HTTP-Server-2.0-Denial-Of-Service.html +CVE-2021-44331 - https://github.com/ARM-software/astc-encoder/issues/294 +CVE-2021-44334 - https://github.com/brackeen/ok-file-formats/issues/12 +CVE-2021-44335 - https://github.com/brackeen/ok-file-formats/issues/17 +CVE-2021-44339 - https://github.com/brackeen/ok-file-formats/issues/15 +CVE-2021-4434 - https://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html +CVE-2021-44340 - https://github.com/brackeen/ok-file-formats/issues/11 +CVE-2021-44342 - https://github.com/brackeen/ok-file-formats/issues/19 +CVE-2021-44343 - https://github.com/brackeen/ok-file-formats/issues/18 +CVE-2021-44347 - https://github.com/yeyinshi/tuzicms/issues/7 +CVE-2021-44348 - https://github.com/yeyinshi/tuzicms/issues/9 +CVE-2021-44349 - https://github.com/yeyinshi/tuzicms/issues/8 +CVE-2021-44352 - https://github.com/zhlu32/cve/blob/main/tenda/Tenda-ac15-buffer-overflow.md +CVE-2021-44354 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44355 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44356 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44357 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44358 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44359 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-4436 - https://wpscan.com/vulnerability/c46ecd0d-a132-4ad6-b936-8acde3a09282/ +CVE-2021-44360 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44361 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44362 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44363 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44364 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44365 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44366 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44367 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44368 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44369 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44370 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44371 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44372 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44373 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44374 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44375 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44376 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44377 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44378 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44379 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44380 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44381 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44382 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44383 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44384 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44385 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44386 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44387 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44388 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44389 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44390 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44391 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44392 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44393 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44394 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44395 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44396 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44397 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44398 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44399 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44400 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44401 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44402 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44403 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44404 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44405 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44406 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44407 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44408 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44409 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44410 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44411 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44412 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44413 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44414 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44415 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44416 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44417 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44418 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44419 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 +CVE-2021-44427 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/328 +CVE-2021-44428 - https://www.exploit-db.com/exploits/50535 +CVE-2021-44429 - https://packetstormsecurity.com/files/165058/Serva-4.4.0-TFTP-Remote-Buffer-Overflow.html +CVE-2021-44444 - http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html +CVE-2021-44460 - https://github.com/odoo/odoo/issues/107685 +CVE-2021-44479 - https://github.com/Xen1thLabs-AE/CVE-2021-40154 +CVE-2021-44521 - https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/ +CVE-2021-44529 - http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html +CVE-2021-44529 - http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html +CVE-2021-44531 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44531 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-44532 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44532 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-44533 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44533 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-44565 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/307 +CVE-2021-44567 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/308 +CVE-2021-44568 - https://github.com/openSUSE/libsolv/issues/425 +CVE-2021-44568 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940 +CVE-2021-44568 - https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995 +CVE-2021-44586 - https://github.com/qinming99/dst-admin/issues/28 +CVE-2021-44590 - https://github.com/libming/libming/issues/236 +CVE-2021-44591 - https://github.com/libming/libming/issues/235 +CVE-2021-44593 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44593 +CVE-2021-44595 - http://packetstormsecurity.com/files/167036/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html +CVE-2021-44595 - https://medium.com/@tomerp_77017/wondershell-a82372914f26 +CVE-2021-44596 - http://packetstormsecurity.com/files/167035/Wondershare-Dr.Fone-12.0.7-Privilege-Escalation.html +CVE-2021-44596 - https://medium.com/@tomerp_77017/wondershell-a82372914f26 +CVE-2021-44598 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44598 +CVE-2021-44599 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System +CVE-2021-44600 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS +CVE-2021-44617 - http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html +CVE-2021-44622 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkRegVeriRegister +CVE-2021-44623 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkResetVeriRegister +CVE-2021-44625 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/deviceInfoRegister +CVE-2021-44626 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getRegVeriRegister +CVE-2021-44627 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getResetVeriRegister +CVE-2021-44628 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/loginRegister +CVE-2021-44629 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/registerRegister +CVE-2021-44630 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/modifyAccPwdRegister +CVE-2021-44631 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/resetCloudPwdRegister +CVE-2021-44632 - https://github.com/Yu3H0/IoT_CVE/tree/main/886N/upgradeInfoRegister +CVE-2021-44648 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 +CVE-2021-44648 - https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ +CVE-2021-44649 - https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/ +CVE-2021-44651 - https://sahildhar.github.io/blogpost/Zoho-ManageEngine-CloudSecurityPlus-Remote-Code-Execution-via-Security-Misconfiguration/ +CVE-2021-44653 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44653 +CVE-2021-44653 - https://www.exploit-db.com/exploits/50561 +CVE-2021-44655 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44655 +CVE-2021-44655 - https://www.exploit-db.com/exploits/50560 +CVE-2021-44657 - https://github.com/pallets/jinja/issues/549 +CVE-2021-44657 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/ +CVE-2021-44659 - https://youtu.be/WW_a3znugl0 +CVE-2021-44663 - https://riklutz.nl/2021/10/30/unauthenticated-file-upload-to-remote-code-execution-in-xerte/ +CVE-2021-44664 - http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html +CVE-2021-44664 - https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ +CVE-2021-44665 - http://packetstormsecurity.com/files/166181/Xerte-3.10.3-Directory-Traversal.html +CVE-2021-44676 - https://www.manageengine.com +CVE-2021-44684 - https://github.com/dwisiswant0/advisory/issues/5 +CVE-2021-44685 - https://github.com/dwisiswant0/advisory/issues/3 +CVE-2021-44686 - https://bugs.launchpad.net/calibre/+bug/1951979 +CVE-2021-44686 - https://github.com/dwisiswant0/advisory/issues/18 +CVE-2021-44692 - https://www.cygenta.co.uk/post/buddyboss +CVE-2021-44720 - https://kb.pulsesecure.net/?atype=sa +CVE-2021-44730 - http://www.openwall.com/lists/oss-security/2022/02/23/1 +CVE-2021-44731 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html +CVE-2021-44731 - http://www.openwall.com/lists/oss-security/2022/02/23/1 +CVE-2021-44733 - https://github.com/pjlantz/optee-qemu/blob/main/README.md +CVE-2021-44790 - http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html +CVE-2021-44790 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44790 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-44827 - https://Full-Disclosure.eu +CVE-2021-44827 - https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html +CVE-2021-44829 - http://packetstormsecurity.com/files/165684/WebACMS-2.1.0-Cross-Site-Scripting.html +CVE-2021-44829 - http://seclists.org/fulldisclosure/2022/Jan/41 +CVE-2021-44829 - https://blog.to.com/advisory-webacms-2-1-0-cross-site-scripting/ +CVE-2021-44832 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd +CVE-2021-44832 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-44832 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-44832 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-44835 - https://gist.github.com/rntcruz23/199782fb65b7dc3c4492d168770b71e5 +CVE-2021-44848 - http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html +CVE-2021-44864 - https://github.com/zhlu32/cve/blob/main/tplink/wr886n/Tplink-wr886n-V3-Ping-DOS.md +CVE-2021-44868 - https://github.com/ming-soft/MCMS/issues/58 +CVE-2021-44879 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 +CVE-2021-44879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f +CVE-2021-44880 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-44881 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-44882 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-44899 - https://voidsec.com +CVE-2021-44899 - https://voidsec.com/advisories/cve-2021-44899/ +CVE-2021-44900 - https://voidsec.com +CVE-2021-44900 - https://voidsec.com/advisories/cve-2021-44900/ +CVE-2021-44901 - https://voidsec.com +CVE-2021-44901 - https://voidsec.com/advisories/cve-2021-44901/ +CVE-2021-44903 - https://voidsec.com +CVE-2021-44903 - https://voidsec.com/advisories/cve-2021-44903/ +CVE-2021-44906 - https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip +CVE-2021-44906 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764 +CVE-2021-44908 - https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip +CVE-2021-44908 - https://github.com/balderdashy/sails/issues/7209 +CVE-2021-44915 - https://github.com/taogogo/taocms/issues/8 +CVE-2021-44916 - http://packetstormsecurity.com/files/165502/Open-AudIT-Community-4.2.0-Cross-Site-Scripting.html +CVE-2021-44917 - https://sourceforge.net/p/gnuplot/bugs/2358/ +CVE-2021-44918 - https://github.com/gpac/gpac/issues/1968 +CVE-2021-44920 - https://github.com/gpac/gpac/issues/1957 +CVE-2021-44921 - https://github.com/gpac/gpac/issues/1964 +CVE-2021-44922 - https://github.com/gpac/gpac/issues/1969 +CVE-2021-44924 - https://github.com/gpac/gpac/issues/1959 +CVE-2021-44925 - https://github.com/gpac/gpac/issues/1967 +CVE-2021-44942 - https://github.com/glFusion/glfusion/issues/486 +CVE-2021-44956 - https://github.com/rockcarry/ffjpeg/issues/43 +CVE-2021-44957 - https://github.com/rockcarry/ffjpeg/issues/44 +CVE-2021-44964 - http://lua-users.org/lists/lua-l/2021-11/msg00186.html +CVE-2021-44965 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System +CVE-2021-44966 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection-Bypass-Authentication +CVE-2021-44967 - https://github.com/Y1LD1R1M-1337/Limesurvey-RCE +CVE-2021-44967 - https://www.exploit-db.com/exploits/50573 +CVE-2021-44971 - https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md +CVE-2021-44981 - https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server +CVE-2021-44988 - https://github.com/jerryscript-project/jerryscript/issues/4890 +CVE-2021-44988 - https://github.com/jerryscript-project/jerryscript/issues/4891 +CVE-2021-44988 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-44992 - https://github.com/jerryscript-project/jerryscript/issues/4875 +CVE-2021-44992 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-44993 - https://github.com/jerryscript-project/jerryscript/issues/4876 +CVE-2021-44993 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-44994 - https://github.com/jerryscript-project/jerryscript/issues/4894 +CVE-2021-44994 - https://github.com/jerryscript-project/jerryscript/issues/4895 +CVE-2021-44994 - https://security.samsungmobile.com/securityUpdate.smsb +CVE-2021-45010 - http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html +CVE-2021-45010 - https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce/ +CVE-2021-45010 - https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh +CVE-2021-45010 - https://raw.githubusercontent.com/febinrev/tinyfilemanager-2.4.6-exploit/main/exploit.sh +CVE-2021-45010 - https://sploitus.com/exploit?id=1337DAY-ID-37364&utm_source=rss&utm_medium=rss +CVE-2021-45024 - http://asg.com +CVE-2021-45025 - http://asg.com +CVE-2021-45026 - http://asg.com +CVE-2021-45027 - https://www.exploit-db.com/exploits/50599 +CVE-2021-45034 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html +CVE-2021-45034 - http://seclists.org/fulldisclosure/2022/Apr/20 +CVE-2021-45041 - https://github.com/manuelz120/CVE-2021-45041 +CVE-2021-45046 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd +CVE-2021-45046 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-45046 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-45046 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-45078 - https://sourceware.org/bugzilla/show_bug.cgi?id=28694 +CVE-2021-45085 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 +CVE-2021-45086 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 +CVE-2021-45087 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 +CVE-2021-45088 - https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 +CVE-2021-45092 - http://packetstormsecurity.com/files/166068/Thinfinity-VirtualUI-2.5.41.0-IFRAME-Injection.html +CVE-2021-45098 - https://redmine.openinfosecfoundation.org/issues/4710 +CVE-2021-45099 - https://gist.github.com/Eriner/0872628519f70556d2c26c83439a9f67 +CVE-2021-45105 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd +CVE-2021-45105 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2021-45105 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2021-45105 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-45117 - https://www.youtube.com/watch?v=qv-RBdCaV4k +CVE-2021-45222 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45222 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-029.txt +CVE-2021-45222 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 +CVE-2021-45223 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45223 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-028.txt +CVE-2021-45223 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 +CVE-2021-45224 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45224 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt +CVE-2021-45224 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 +CVE-2021-45225 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45225 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-052.txt +CVE-2021-45225 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 +CVE-2021-45226 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45226 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-051.txt +CVE-2021-45226 - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 +CVE-2021-45227 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45227 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-030.txt +CVE-2021-45228 - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview +CVE-2021-45228 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-031.txt +CVE-2021-45252 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Forum-Discussion-System-1.0 +CVE-2021-45253 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0 +CVE-2021-45255 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website +CVE-2021-45256 - https://bugzilla.nasm.us/show_bug.cgi?id=3392789 +CVE-2021-45257 - https://bugzilla.nasm.us/show_bug.cgi?id=3392790 +CVE-2021-45258 - https://github.com/gpac/gpac/issues/1970 +CVE-2021-45259 - https://github.com/gpac/gpac/issues/1986 +CVE-2021-45260 - https://github.com/gpac/gpac/issues/1979 +CVE-2021-45262 - https://github.com/gpac/gpac/issues/1980 +CVE-2021-45263 - https://github.com/gpac/gpac/issues/1975 +CVE-2021-45267 - https://github.com/gpac/gpac/issues/1965 +CVE-2021-45268 - https://github.com/V1n1v131r4/CSRF-to-RCE-on-Backdrop-CMS +CVE-2021-45268 - https://www.exploit-db.com/exploits/50323 +CVE-2021-45281 - https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box +CVE-2021-45286 - https://github.com/Boomingjacob/ZZCMS2021#readme +CVE-2021-45288 - https://github.com/gpac/gpac/issues/1956 +CVE-2021-45289 - https://github.com/gpac/gpac/issues/1972 +CVE-2021-45291 - https://github.com/gpac/gpac/issues/1955 +CVE-2021-45292 - https://github.com/gpac/gpac/issues/1958 +CVE-2021-45297 - https://github.com/gpac/gpac/issues/1973 +CVE-2021-45330 - https://github.com/go-gitea/gitea/issues/4336 +CVE-2021-45334 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-45334 +CVE-2021-45334 - https://packetstormsecurity.com/files/165272/Online-Thesis-Archiving-System-1.0-SQL-Injection-Cross-Site-Scripting.html +CVE-2021-45334 - https://www.exploit-db.com/exploits/50597 +CVE-2021-45340 - https://github.com/libsixel/libsixel/issues/51 +CVE-2021-45341 - https://github.com/LibreCAD/LibreCAD/issues/1462 +CVE-2021-45342 - https://github.com/LibreCAD/LibreCAD/issues/1464 +CVE-2021-45343 - https://github.com/LibreCAD/LibreCAD/issues/1468 +CVE-2021-45345 - https://gist.github.com/0xHop/0d065694d56ac3943d8e8c239d80c63f +CVE-2021-45346 - https://github.com/guyinatuxedo/sqlite3_record_leaking +CVE-2021-45382 - https://github.com/doudoudedi/D-LINK_Command_Injection1/blob/main/D-LINK_Command_injection.md +CVE-2021-45385 - https://github.com/rockcarry/ffjpeg/issues/47 +CVE-2021-45386 - https://github.com/appneta/tcpreplay/issues/687 +CVE-2021-45387 - https://github.com/appneta/tcpreplay/issues/687 +CVE-2021-45391 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/1 +CVE-2021-45392 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2 +CVE-2021-45401 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf +CVE-2021-45406 - https://www.exploit-db.com/exploits/50659 +CVE-2021-45411 - https://www.exploit-db.com/exploits/49877 +CVE-2021-45414 - http://packetstormsecurity.com/files/166073/Datarobot-Remote-Code-Execution.html +CVE-2021-45416 - https://github.com/86x/CVE-2021-45416 +CVE-2021-45417 - http://www.openwall.com/lists/oss-security/2022/01/20/3 +CVE-2021-45417 - https://www.ipi.fi/pipermail/aide/2022-January/001713.html +CVE-2021-45417 - https://www.openwall.com/lists/oss-security/2022/01/20/3 +CVE-2021-45418 - https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45418.md +CVE-2021-45419 - https://github.com/shortmore/trsh/blob/main/starcharge/CVE-2021-45419.md +CVE-2021-45420 - https://www.swascan.com/emerson +CVE-2021-45421 - https://www.swascan.com/emerson +CVE-2021-45422 - https://seclists.org/fulldisclosure/2022/Jan/31 +CVE-2021-45422 - https://www.getinfosec.news/13202933/reprise-license-manager-142-reflected-cross-site-scripting#/ +CVE-2021-45423 - https://github.com/merces/libpe/issues/35 +CVE-2021-45425 - http://packetstormsecurity.com/files/165439/Safari-Montage-8.5-Cross-Site-Scripting.html +CVE-2021-45427 - https://drive.google.com/file/d/1iusYdheb62dom0DnvAzEiNR-e4EXSf2k/view?usp=sharing +CVE-2021-45428 - http://packetstormsecurity.com/files/167101/TLR-2005KSH-Arbitrary-File-Upload.html +CVE-2021-45429 - https://github.com/VirusTotal/yara/issues/1616 +CVE-2021-45459 - https://github.com/dwisiswant0/advisory/issues/4 +CVE-2021-45461 - https://community.freepbx.org/t/0-day-freepbx-exploit/80092 +CVE-2021-45463 - https://gitlab.gnome.org/GNOME/gegl/-/issues/298 +CVE-2021-45466 - https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/ +CVE-2021-45467 - https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/ +CVE-2021-45469 - https://bugzilla.kernel.org/show_bug.cgi?id=215235 +CVE-2021-45480 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11 +CVE-2021-45481 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-45482 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-45483 - http://www.openwall.com/lists/oss-security/2022/01/21/2 +CVE-2021-45485 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 +CVE-2021-45485 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99 +CVE-2021-45485 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-45486 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4 +CVE-2021-45486 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-45490 - https://packetstormsecurity.com/files/166376/3CX-Client-Missing-TLS-Validation.html +CVE-2021-45491 - http://packetstormsecurity.com/files/166386/3CX-Phone-System-Cleartext-Passwords.html +CVE-2021-45494 - https://kb.netgear.com/000064160/Security-Advisory-for-Arbitrary-File-Read-on-Some-WiFi-Systems-PSV-2021-0044 +CVE-2021-45496 - https://kb.netgear.com/000064529/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2021-0060 +CVE-2021-45497 - https://kb.netgear.com/000064533/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2021-0155 +CVE-2021-45499 - https://kb.netgear.com/000064445/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2019-0027 +CVE-2021-45501 - https://kb.netgear.com/000064532/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2021-0154 +CVE-2021-45502 - https://kb.netgear.com/000064126/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0473 +CVE-2021-45507 - https://kb.netgear.com/000064131/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0487 +CVE-2021-45515 - https://kb.netgear.com/000064484/Security-Advisory-for-Denial-of-Service-on-Some-Extenders-and-WiFi-Systems-PSV-2020-0286 +CVE-2021-45516 - https://kb.netgear.com/000064060/Security-Advisory-for-Denial-of-Service-on-Some-Routers-and-WiFi-Systems-PSV-2019-0115 +CVE-2021-45519 - https://kb.netgear.com/000064158/Security-Advisory-for-Denial-of-Service-on-XR1000-PSV-2021-0033 +CVE-2021-45522 - https://kb.netgear.com/000064155/Security-Advisory-for-Hardcoded-Password-on-XR1000-PSV-2021-0030 +CVE-2021-45523 - https://kb.netgear.com/000064442/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R7000-PSV-2018-0418 +CVE-2021-45524 - https://kb.netgear.com/000064123/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-R8000-PSV-2020-0315 +CVE-2021-45526 - https://kb.netgear.com/000064446/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Extenders-PSV-2019-0078 +CVE-2021-45532 - https://kb.netgear.com/000064454/Security-Advisory-for-Post-Authentication-Command-Injection-on-R8000-PSV-2019-0294 +CVE-2021-45535 - https://kb.netgear.com/000064457/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0052 +CVE-2021-45536 - https://kb.netgear.com/000064080/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0056 +CVE-2021-45541 - https://kb.netgear.com/000064479/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0246 +CVE-2021-45542 - https://kb.netgear.com/000064143/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0540 +CVE-2021-45543 - https://kb.netgear.com/000064517/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0541 +CVE-2021-45549 - https://kb.netgear.com/000064513/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0517 +CVE-2021-45563 - https://kb.netgear.com/000064084/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0066 +CVE-2021-45567 - https://kb.netgear.com/000064089/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0075 +CVE-2021-45570 - https://kb.netgear.com/000064092/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0078 +CVE-2021-45574 - https://kb.netgear.com/000064096/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0082 +CVE-2021-45576 - https://kb.netgear.com/000064098/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0084 +CVE-2021-45577 - https://kb.netgear.com/000064099/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0085 +CVE-2021-45587 - https://kb.netgear.com/000064109/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0095 +CVE-2021-45590 - https://kb.netgear.com/000064112/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0098 +CVE-2021-45591 - https://kb.netgear.com/000064113/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0099 +CVE-2021-45594 - https://kb.netgear.com/000064475/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0183 +CVE-2021-45607 - https://kb.netgear.com/000064531/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2021-0128 +CVE-2021-45608 - https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/ +CVE-2021-45612 - https://kb.netgear.com/000064515/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0524 +CVE-2021-45615 - https://kb.netgear.com/000064514/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0521 +CVE-2021-45619 - https://kb.netgear.com/000064492/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0435 +CVE-2021-45631 - https://kb.netgear.com/000064136/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0504 +CVE-2021-45638 - https://kb.netgear.com/000064496/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2020-0464 +CVE-2021-45643 - https://kb.netgear.com/000064159/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2021-0035 +CVE-2021-45653 - https://kb.netgear.com/000064163/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2021-0047 +CVE-2021-45657 - https://kb.netgear.com/000064067/Security-Advisory-for-Server-Side-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2019-0141 +CVE-2021-45658 - https://kb.netgear.com/000064062/Security-Advisory-for-Server-Side-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2019-0125 +CVE-2021-45659 - https://kb.netgear.com/000064063/Security-Advisory-for-Server-Side-Injection-on-Some-WiFi-Systems-PSV-2019-0126 +CVE-2021-45664 - https://kb.netgear.com/000064076/Security-Advisory-for-Stored-Cross-Site-Scripting-on-R7000-PSV-2020-0011 +CVE-2021-45667 - https://kb.netgear.com/000064481/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0256 +CVE-2021-45670 - https://kb.netgear.com/000064480/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0255 +CVE-2021-45679 - https://kb.netgear.com/000064528/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-PSV-2021-0043 +CVE-2021-45760 - https://github.com/gpac/gpac/issues/1966 +CVE-2021-45761 - https://github.com/Boyan-MILANOV/ropium/issues/32 +CVE-2021-45762 - https://github.com/gpac/gpac/issues/1978 +CVE-2021-45763 - https://github.com/gpac/gpac/issues/1974 +CVE-2021-45764 - https://github.com/gpac/gpac/issues/1971 +CVE-2021-45767 - https://github.com/gpac/gpac/issues/1982 +CVE-2021-45769 - https://github.com/mz-automation/libiec61850/issues/368 +CVE-2021-45783 - http://packetstormsecurity.com/files/167016/Bookeen-Notea-BK_R_1.0.5_20210608-Directory-Traversal.html +CVE-2021-45786 - https://github.com/magicblack/maccms10/issues/747 +CVE-2021-45802 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#file-cve-2021-45802-md +CVE-2021-45803 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-45803 +CVE-2021-45811 - https://members.backbox.org/osticket-sql-injection/ +CVE-2021-45812 - https://drive.google.com/drive/folders/18YCKzFnS5CZRmzgcwc8g7jvLpmqgy68B?usp=sharing +CVE-2021-45814 - http://packetstormsecurity.com/files/165438/Nettmp-NNT-5.1-SQL-Injection.html +CVE-2021-45821 - https://emaragkos.gr/infosec-adventures/xbtit-3-1-sql-njection/ +CVE-2021-45821 - https://github.com/btiteam/xbtit-3.1/issues/6 +CVE-2021-45822 - https://emaragkos.gr/infosec-adventures/xbtit-3-1-xss-stored-amp-reflected/ +CVE-2021-45822 - https://github.com/btiteam/xbtit-3.1/issues/7 +CVE-2021-45829 - https://github.com/HDFGroup/hdf5/issues/1317 +CVE-2021-45830 - https://github.com/HDFGroup/hdf5/issues/1314 +CVE-2021-45832 - https://github.com/HDFGroup/hdf5/issues/1315 +CVE-2021-45833 - https://github.com/HDFGroup/hdf5/issues/1313 +CVE-2021-45835 - https://www.exploit-db.com/exploits/50623 +CVE-2021-45837 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html +CVE-2021-45839 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html +CVE-2021-45841 - http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html +CVE-2021-45843 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/glfusion/XSS-Reflected +CVE-2021-45844 - https://forum.freecadweb.org/viewtopic.php?t=64733 +CVE-2021-45844 - https://tracker.freecad.org/view.php?id=4809 +CVE-2021-45846 - https://github.com/slic3r/Slic3r/issues/5117 +CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5118 +CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5119 +CVE-2021-45847 - https://github.com/slic3r/Slic3r/issues/5120 +CVE-2021-45851 - https://www.youtube.com/watch?v=JE1Kcq3iJpc +CVE-2021-45856 - https://packetstormsecurity.com/files/165392/Accu-Time-Systems-MAXIMUS-1.0-Buffer-Overflow-Denial-Of-Service.html +CVE-2021-45860 - https://github.com/justdan96/tsMuxer/issues/510 +CVE-2021-45861 - https://github.com/justdan96/tsMuxer/issues/478 +CVE-2021-45863 - https://github.com/justdan96/tsMuxer/issues/509 +CVE-2021-45864 - https://github.com/justdan96/tsMuxer/issues/476 +CVE-2021-45868 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3 +CVE-2021-45868 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050 +CVE-2021-45868 - https://www.openwall.com/lists/oss-security/2022/03/17/1 +CVE-2021-45868 - https://www.openwall.com/lists/oss-security/2022/03/17/2 +CVE-2021-45876 - https://github.com/delikely/advisory/tree/main/GARO +CVE-2021-45877 - https://github.com/delikely/advisory/tree/main/GARO +CVE-2021-45878 - https://github.com/delikely/advisory/tree/main/GARO +CVE-2021-45884 - https://github.com/brave/brave-core/pull/10742 +CVE-2021-45885 - https://advisories.stormshield.eu +CVE-2021-45885 - https://advisories.stormshield.eu/2021-069/ +CVE-2021-45886 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-080.txt +CVE-2021-45887 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-077.txt +CVE-2021-45888 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-079.txt +CVE-2021-45889 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-078.txt +CVE-2021-45891 - https://syss.de +CVE-2021-45891 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-063.txt +CVE-2021-45892 - https://syss.de +CVE-2021-45892 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-064.txt +CVE-2021-45893 - https://syss.de +CVE-2021-45893 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-065.txt +CVE-2021-45894 - https://syss.de +CVE-2021-45894 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt +CVE-2021-45897 - https://github.com/manuelz120/CVE-2021-45897 +CVE-2021-45901 - http://packetstormsecurity.com/files/165989/ServiceNow-Orlando-Username-Enumeration.html +CVE-2021-45901 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/servicenow-username-enumeration-vulnerability-cve-2021-45901/ +CVE-2021-45901 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2021-45904 - https://bugs.openwrt.org/index.php?do=details&task_id=4199 +CVE-2021-45905 - https://bugs.openwrt.org/index.php?do=details&task_id=4199 +CVE-2021-45906 - https://bugs.openwrt.org/index.php?do=details&task_id=4199 +CVE-2021-45907 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 +CVE-2021-45908 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 +CVE-2021-45909 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002668 +CVE-2021-45910 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002667 +CVE-2021-45911 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002687 +CVE-2021-45919 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-stored-xss-to-rce-using-beef-and-elfinder-cve-2021-45919/ +CVE-2021-45935 - https://github.com/osamu620/OpenHTJ2K +CVE-2021-45943 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2021-45966 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html +CVE-2021-45967 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html +CVE-2021-45968 - https://tutorialboy24.blogspot.com/2022/03/the-story-of-3-bugs-that-lead-to.html +CVE-2021-45972 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002739 +CVE-2021-45978 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-45979 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-45980 - https://www.foxit.com/support/security-bulletins.html +CVE-2021-45998 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46005 - https://www.exploit-db.com/exploits/49546 +CVE-2021-46006 - https://hackmd.io/vS-OfUEzSqqKh8e1PKce5A +CVE-2021-46007 - https://hackmd.io/t_nRWxS2Q2O7GV2E5BhQMg +CVE-2021-46008 - https://hackmd.io/ZkeEB-VvRiWBS53rFKG8DQ +CVE-2021-46009 - https://hackmd.io/-riYp6Q-ReCx-dKKWFBTLg +CVE-2021-46010 - https://hackmd.io/Ynwm8NnQSiK0xm7QKuNteg +CVE-2021-46013 - https://www.exploit-db.com/exploits/50587 +CVE-2021-46019 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00009.html +CVE-2021-46020 - https://github.com/mruby/mruby/issues/5613 +CVE-2021-46021 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00008.html +CVE-2021-46022 - https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg00007.html +CVE-2021-46023 - https://github.com/mruby/mruby/issues/5613 +CVE-2021-46027 - https://github.com/wangl1989/mysiteforme/issues/40 +CVE-2021-46028 - https://github.com/langhsu/mblog/issues/50 +CVE-2021-46039 - https://github.com/gpac/gpac/issues/1999 +CVE-2021-46061 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/RSMS-1.0 +CVE-2021-46062 - https://github.com/ming-soft/MCMS/issues/59 +CVE-2021-46063 - https://github.com/ming-soft/MCMS/issues/59 +CVE-2021-46088 - https://github.com/paalbra/zabbix-zbxsec-7 +CVE-2021-46089 - https://github.com/jeecgboot/jeecg-boot/issues/3331 +CVE-2021-46097 - https://gist.github.com/w4nd3r-hya/784a86dda91bdcb3071892e56aacdee2 +CVE-2021-46101 - https://github.com/0xADY/git_rce +CVE-2021-46102 - https://github.com/solana-labs/rbpf/blob/c14764850f0b83b58aa013248eaf6d65836c1218/src/elf.rs#L609-L630 +CVE-2021-46108 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46109 - https://drive.google.com/drive/folders/1GAOuZwPB-upkpjPgjB8qLIKl9Mh3IVfl?usp=sharing +CVE-2021-46113 - https://gist.github.com/P0cas/5aa55f62781364a750ac4a4d47f319fa#cve-2021-46113 +CVE-2021-46113 - https://www.youtube.com/watch?v=gnSMrvV5e9w +CVE-2021-46122 - https://k4m1ll0.com/cve-tplink-tlwr840n-euV620-password-reset.html +CVE-2021-46167 - http://wizplat.com/PRODUCT1_3/?idx=217 +CVE-2021-46168 - https://github.com/nimble-code/Spin/issues/56 +CVE-2021-46169 - https://github.com/nimble-code/Modex/issues/10 +CVE-2021-46170 - https://github.com/jerryscript-project/jerryscript/issues/4917 +CVE-2021-46171 - https://github.com/nimble-code/Modex/issues/8 +CVE-2021-46179 - https://github.com/upx/upx/issues/545 +CVE-2021-46195 - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841 +CVE-2021-46198 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Courier-Management-System +CVE-2021-46200 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Music-Cloud-Community-System +CVE-2021-46201 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Resort-Management-System-1.0 +CVE-2021-46203 - https://github.com/taogogo/taocms/issues/13 +CVE-2021-46204 - https://github.com/taogogo/taocms/issues/14 +CVE-2021-46226 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46227 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46228 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46229 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46230 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46231 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46232 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46233 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46242 - https://github.com/HDFGroup/hdf5/issues/1329 +CVE-2021-46243 - https://github.com/HDFGroup/hdf5/issues/1326 +CVE-2021-46244 - https://github.com/HDFGroup/hdf5/issues/1327 +CVE-2021-46247 - https://drive.google.com/drive/folders/1lSaxWKiNKRkeZxQanEMpt906aUgDGUk_?usp=sharing +CVE-2021-46255 - https://github.com/eyoucms/eyoucms/issues/21 +CVE-2021-46262 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/7 +CVE-2021-46263 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/11 +CVE-2021-46264 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/9 +CVE-2021-46265 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/13 +CVE-2021-46283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 +CVE-2021-46283 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9f151e560b016b6ad3280b48e42fa11e1a5440 +CVE-2021-46307 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Projectworlds/2022/Online%20Examination%20System +CVE-2021-46308 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Railway-Reservation +CVE-2021-46309 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Employee-and-Visitor-Gate-Pass-Logging +CVE-2021-46310 - https://sourceforge.net/p/djvu/bugs/345/ +CVE-2021-46312 - https://sourceforge.net/p/djvu/bugs/344/ +CVE-2021-46314 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md +CVE-2021-46314 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46315 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md +CVE-2021-46315 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46319 - https://github.com/doudoudedi/DIR-846_Command_Injection/blob/main/DIR-846_Command_Injection1.md +CVE-2021-46319 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46321 - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/15 +CVE-2021-46322 - https://github.com/svaarala/duktape/issues/2448 +CVE-2021-46323 - https://github.com/espruino/Espruino/issues/2122 +CVE-2021-46324 - https://github.com/espruino/Espruino/issues/2121 +CVE-2021-46325 - https://github.com/espruino/Espruino/issues/2114 +CVE-2021-46326 - https://github.com/Moddable-OpenSource/moddable/issues/759 +CVE-2021-46327 - https://github.com/Moddable-OpenSource/moddable/issues/766 +CVE-2021-46329 - https://github.com/Moddable-OpenSource/moddable/issues/768 +CVE-2021-46330 - https://github.com/Moddable-OpenSource/moddable/issues/774 +CVE-2021-46331 - https://github.com/Moddable-OpenSource/moddable/issues/750 +CVE-2021-46332 - https://github.com/Moddable-OpenSource/moddable/issues/749 +CVE-2021-46332 - https://github.com/Moddable-OpenSource/moddable/issues/752 +CVE-2021-46333 - https://github.com/Moddable-OpenSource/moddable/issues/769 +CVE-2021-46334 - https://github.com/Moddable-OpenSource/moddable/issues/760 +CVE-2021-46335 - https://github.com/Moddable-OpenSource/moddable/issues/748 +CVE-2021-46335 - https://github.com/Moddable-OpenSource/moddable/issues/767 +CVE-2021-46336 - https://github.com/jerryscript-project/jerryscript/issues/4927 +CVE-2021-46337 - https://github.com/jerryscript-project/jerryscript/issues/4930 +CVE-2021-46338 - https://github.com/jerryscript-project/jerryscript/issues/4900 +CVE-2021-46339 - https://github.com/jerryscript-project/jerryscript/issues/4935 +CVE-2021-46340 - https://github.com/jerryscript-project/jerryscript/issues/4924 +CVE-2021-46342 - https://github.com/jerryscript-project/jerryscript/issues/4934 +CVE-2021-46343 - https://github.com/jerryscript-project/jerryscript/issues/4921 +CVE-2021-46344 - https://github.com/jerryscript-project/jerryscript/issues/4928 +CVE-2021-46345 - https://github.com/jerryscript-project/jerryscript/issues/4920 +CVE-2021-46346 - https://github.com/jerryscript-project/jerryscript/issues/4939 +CVE-2021-46347 - https://github.com/jerryscript-project/jerryscript/issues/4938 +CVE-2021-46348 - https://github.com/jerryscript-project/jerryscript/issues/4941 +CVE-2021-46349 - https://github.com/jerryscript-project/jerryscript/issues/4937 +CVE-2021-46350 - https://github.com/jerryscript-project/jerryscript/issues/4936 +CVE-2021-46351 - https://github.com/jerryscript-project/jerryscript/issues/4940 +CVE-2021-46353 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46354 - http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html +CVE-2021-46355 - https://medium.com/@windsormoreira/ocs-inventory-2-9-1-cross-site-scripting-xss-cve-2021-46355-a88d72606b7e +CVE-2021-46360 - http://packetstormsecurity.com/files/171489/Composr-CMS-10.0.39-Remote-Code-Execution.html +CVE-2021-46361 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS +CVE-2021-46362 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46362-Unauthenticated%20SSTI-Magnolia%20CMS +CVE-2021-46363 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS +CVE-2021-46364 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364-YAML%20Deserialization-Magnolia%20CMS +CVE-2021-46365 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS +CVE-2021-46366 - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS +CVE-2021-46367 - https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597 +CVE-2021-46367 - https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html +CVE-2021-46367 - https://www.exploit-db.com/exploits/50616 +CVE-2021-46368 - https://packetstormsecurity.com/files/165404/TRIGONE-Remote-System-Monitor-3.61-Unquoted-Service-Path.html +CVE-2021-46368 - https://www.exploit-db.com/exploits/50633 +CVE-2021-46371 - https://github.com/zuiidea/antd-admin/issues/1127 +CVE-2021-46372 - https://www.huntr.dev/bounties/eb681144-04f2-4eaa-98b6-c8cffbcb1601/ +CVE-2021-46378 - http://packetstormsecurity.com/files/167042/DLINK-DIR850-Insecure-Direct-Object-Reference.html +CVE-2021-46378 - https://drive.google.com/file/d/1S69wOovVa8NRVUXcB0PkVvZHFxREcD4Y/view?usp=sharing +CVE-2021-46378 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46379 - http://packetstormsecurity.com/files/167041/DLINK-DIR850-Open-Redirection.html +CVE-2021-46379 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46381 - http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html +CVE-2021-46381 - https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing +CVE-2021-46381 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46382 - https://drive.google.com/drive/folders/1NOIoT8yE_HDoLVYhchml5E2Za3Oo6V9Y?usp=sharing +CVE-2021-46387 - http://packetstormsecurity.com/files/166189/Zyxel-ZyWALL-2-Plus-Cross-Site-Scripting.html +CVE-2021-46387 - https://drive.google.com/drive/folders/1_XfWBLqxT2Mqt7uB663Sjlc62pE8-rcN?usp=sharing +CVE-2021-46388 - https://drive.google.com/drive/folders/1FDtxZayLeSITcqP72c7FsTOpAFGFePVE +CVE-2021-46393 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/3 +CVE-2021-46394 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/4 +CVE-2021-46398 - http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html +CVE-2021-46398 - https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html +CVE-2021-46398 - https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/ +CVE-2021-46398 - https://febinj.medium.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 +CVE-2021-46398 - https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 +CVE-2021-46408 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2 +CVE-2021-46416 - http://packetstormsecurity.com/files/166670/SAM-SUNNY-TRIPOWER-5.0-Insecure-Direct-Object-Reference.html +CVE-2021-46416 - https://drive.google.com/drive/folders/1BPULhDC_g__seH_VnQlVtkrKdOLkXdzV?usp=sharing +CVE-2021-46417 - http://packetstormsecurity.com/files/166610/FFS-Colibri-Controller-Module-1.8.19.8580-Directory-Traversal.html +CVE-2021-46417 - http://packetstormsecurity.com/files/166671/Franklin-Fueling-Systems-Colibri-Controller-Module-1.8.19.8580-Local-File-Inclusion.html +CVE-2021-46417 - https://drive.google.com/drive/folders/1Yu4aVDdrgvs-F9jP3R8Cw7qo_TC7VB-R +CVE-2021-46418 - http://packetstormsecurity.com/files/166674/Telesquare-TLR-2855KS6-Arbitrary-File-Creation.html +CVE-2021-46419 - http://packetstormsecurity.com/files/166675/Telesquare-TLR-2855KS6-Arbitrary-File-Deletion.html +CVE-2021-46421 - https://drive.google.com/file/d/17y764rRfgab2EhYMEqCIYh__5sOTigqe/view?usp=sharing +CVE-2021-46422 - http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html +CVE-2021-46422 - http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html +CVE-2021-46422 - https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing +CVE-2021-46423 - https://drive.google.com/drive/folders/1iY4QqzZLdYgwD0LYc74M4Gm2wSC6Be1u?usp=sharing +CVE-2021-46424 - http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html +CVE-2021-46426 - http://packetstormsecurity.com/files/167227/PHPIPAM-1.4.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html +CVE-2021-46427 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple%20ChatBot +CVE-2021-46427 - https://www.exploit-db.com/exploits/50673 +CVE-2021-46428 - https://cxsecurity.com/issue/WLB-2022010093 +CVE-2021-46428 - https://www.exploit-db.com/exploits/50672 +CVE-2021-46436 - https://github.com/xunyang1/ZZCMS/issues/1 +CVE-2021-46437 - https://github.com/xunyang1/ZZCMS/issues/2 +CVE-2021-46440 - http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html +CVE-2021-46440 - https://github.com/strapi/strapi/pull/12246 +CVE-2021-46441 - https://github.com/tgp-top/D-Link-DIR-825 +CVE-2021-46441 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46442 - https://github.com/tgp-top/D-Link-DIR-825 +CVE-2021-46442 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46451 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Project-Time-Management +CVE-2021-46452 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46453 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46454 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46455 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46456 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46457 - https://www.dlink.com/en/security-bulletin/ +CVE-2021-46461 - https://github.com/nginx/njs/issues/450 +CVE-2021-46462 - https://github.com/nginx/njs/issues/449 +CVE-2021-46463 - https://github.com/nginx/njs/issues/447 +CVE-2021-46474 - https://github.com/pcmacdon/jsish/issues/57 +CVE-2021-46475 - https://github.com/pcmacdon/jsish/issues/64 +CVE-2021-46477 - https://github.com/pcmacdon/jsish/issues/63 +CVE-2021-46478 - https://github.com/pcmacdon/jsish/issues/60 +CVE-2021-46480 - https://github.com/pcmacdon/jsish/issues/61 +CVE-2021-46481 - https://github.com/pcmacdon/jsish/issues/55 +CVE-2021-46482 - https://github.com/pcmacdon/jsish/issues/66 +CVE-2021-46483 - https://github.com/pcmacdon/jsish/issues/62 +CVE-2021-46484 - https://github.com/pcmacdon/jsish/issues/73 +CVE-2021-46485 - https://github.com/pcmacdon/jsish/issues/70 +CVE-2021-46486 - https://github.com/pcmacdon/jsish/issues/65 +CVE-2021-46487 - https://github.com/pcmacdon/jsish/issues/72 +CVE-2021-46488 - https://github.com/pcmacdon/jsish/issues/68 +CVE-2021-46489 - https://github.com/pcmacdon/jsish/issues/74 +CVE-2021-46490 - https://github.com/pcmacdon/jsish/issues/67 +CVE-2021-46491 - https://github.com/pcmacdon/jsish/issues/69 +CVE-2021-46494 - https://github.com/pcmacdon/jsish/issues/78 +CVE-2021-46495 - https://github.com/pcmacdon/jsish/issues/82 +CVE-2021-46496 - https://github.com/pcmacdon/jsish/issues/83 +CVE-2021-46497 - https://github.com/pcmacdon/jsish/issues/84 +CVE-2021-46498 - https://github.com/pcmacdon/jsish/issues/81 +CVE-2021-46499 - https://github.com/pcmacdon/jsish/issues/76 +CVE-2021-46500 - https://github.com/pcmacdon/jsish/issues/85 +CVE-2021-46501 - https://github.com/pcmacdon/jsish/issues/86 +CVE-2021-46502 - https://github.com/pcmacdon/jsish/issues/87 +CVE-2021-46503 - https://github.com/pcmacdon/jsish/issues/88 +CVE-2021-46504 - https://github.com/pcmacdon/jsish/issues/51 +CVE-2021-46505 - https://github.com/pcmacdon/jsish/issues/53 +CVE-2021-46506 - https://github.com/pcmacdon/jsish/issues/52 +CVE-2021-46507 - https://github.com/pcmacdon/jsish/issues/54 +CVE-2021-46508 - https://github.com/cesanta/mjs/issues/188 +CVE-2021-46509 - https://github.com/cesanta/mjs/issues/200 +CVE-2021-46510 - https://github.com/cesanta/mjs/issues/185 +CVE-2021-46511 - https://github.com/cesanta/mjs/issues/183 +CVE-2021-46512 - https://github.com/cesanta/mjs/issues/202 +CVE-2021-46513 - https://github.com/cesanta/mjs/issues/189 +CVE-2021-46514 - https://github.com/cesanta/mjs/issues/187 +CVE-2021-46515 - https://github.com/cesanta/mjs/issues/186 +CVE-2021-46516 - https://github.com/cesanta/mjs/issues/201 +CVE-2021-46517 - https://github.com/cesanta/mjs/issues/184 +CVE-2021-46518 - https://github.com/cesanta/mjs/issues/195 +CVE-2021-46519 - https://github.com/cesanta/mjs/issues/194 +CVE-2021-46520 - https://github.com/cesanta/mjs/issues/193 +CVE-2021-46521 - https://github.com/cesanta/mjs/issues/190 +CVE-2021-46522 - https://github.com/cesanta/mjs/issues/196 +CVE-2021-46523 - https://github.com/cesanta/mjs/issues/198 +CVE-2021-46524 - https://github.com/cesanta/mjs/issues/192 +CVE-2021-46525 - https://github.com/cesanta/mjs/issues/199 +CVE-2021-46526 - https://github.com/cesanta/mjs/issues/191 +CVE-2021-46527 - https://github.com/cesanta/mjs/issues/197 +CVE-2021-46528 - https://github.com/cesanta/mjs/issues/208 +CVE-2021-46529 - https://github.com/cesanta/mjs/issues/210 +CVE-2021-46530 - https://github.com/cesanta/mjs/issues/206 +CVE-2021-46531 - https://github.com/cesanta/mjs/issues/211 +CVE-2021-46532 - https://github.com/cesanta/mjs/issues/203 +CVE-2021-46534 - https://github.com/cesanta/mjs/issues/204 +CVE-2021-46535 - https://github.com/cesanta/mjs/issues/209 +CVE-2021-46537 - https://github.com/cesanta/mjs/issues/212 +CVE-2021-46538 - https://github.com/cesanta/mjs/issues/216 +CVE-2021-46539 - https://github.com/cesanta/mjs/issues/217 +CVE-2021-46540 - https://github.com/cesanta/mjs/issues/214 +CVE-2021-46541 - https://github.com/cesanta/mjs/issues/222 +CVE-2021-46542 - https://github.com/cesanta/mjs/issues/215 +CVE-2021-46543 - https://github.com/cesanta/mjs/issues/219 +CVE-2021-46544 - https://github.com/cesanta/mjs/issues/220 +CVE-2021-46545 - https://github.com/cesanta/mjs/issues/218 +CVE-2021-46546 - https://github.com/cesanta/mjs/issues/213 +CVE-2021-46547 - https://github.com/cesanta/mjs/issues/221 +CVE-2021-46548 - https://github.com/cesanta/mjs/issues/228 +CVE-2021-46549 - https://github.com/cesanta/mjs/issues/224 +CVE-2021-46550 - https://github.com/cesanta/mjs/issues/230 +CVE-2021-46553 - https://github.com/cesanta/mjs/issues/226 +CVE-2021-46554 - https://github.com/cesanta/mjs/issues/229 +CVE-2021-46556 - https://github.com/cesanta/mjs/issues/227 +CVE-2021-46557 - https://github.com/Zeyad-Azima/Vicidial-stored-XSS +CVE-2021-46558 - https://github.com/Zeyad-Azima/Issabel-stored-XSS +CVE-2021-46562 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46563 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46564 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46565 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46566 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46567 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46568 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46569 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46570 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46571 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46572 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46573 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46574 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46575 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46576 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46577 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46578 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46579 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46580 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46581 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46585 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46586 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46587 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46588 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46590 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46591 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46592 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46595 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46597 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46598 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46600 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46601 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46602 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46607 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46610 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46621 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46623 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004 +CVE-2021-46625 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46634 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46655 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46656 - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 +CVE-2021-46700 - https://github.com/saitoha/libsixel/issues/158 +CVE-2021-46702 - https://www.sciencedirect.com/science/article/pii/S0167404821001358 +CVE-2021-46708 - https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884 +CVE-2021-46743 - https://github.com/firebase/php-jwt/issues/351 +CVE-2021-46780 - https://wpscan.com/vulnerability/cba4ccdd-9331-4ca0-b910-8f427ed9b540 +CVE-2021-46781 - https://wpscan.com/vulnerability/49589867-f764-4c4a-b640-84973c673b23 +CVE-2021-46782 - https://wpscan.com/vulnerability/39e69487-aa53-4b78-a422-12515a6449bf +CVE-2021-46820 - https://github.com/XOS-Shop/xos_shop_system/issues/1 +CVE-2021-46824 - https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html +CVE-2021-46824 - https://www.exploit-db.com/exploits/49559 +CVE-2021-46829 - http://www.openwall.com/lists/oss-security/2022/07/25/1 +CVE-2021-46829 - https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md +CVE-2021-46829 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 +CVE-2021-46850 - https://www.exploit-db.com/exploits/49674 +CVE-2021-46888 - https://www.youtube.com/watch?v=QnRO-VkfIic +CVE-2021-46889 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html +CVE-2021-46898 - https://github.com/sehmaschine/django-grappelli/issues/975 +CVE-2022-0001 - https://www.kb.cert.org/vuls/id/155143 +CVE-2022-0001 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-0002 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-0020 - http://packetstormsecurity.com/files/171782/Palo-Alto-Cortex-XSOAR-6.5.0-Cross-Site-Scripting.html +CVE-2022-0070 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities +CVE-2022-0071 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities +CVE-2022-0079 - https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee +CVE-2022-0080 - https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e +CVE-2022-0083 - https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736 +CVE-2022-0085 - https://huntr.dev/bounties/73dbcc78-5ba9-492f-9133-13bbc9f31236 +CVE-2022-0086 - https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122 +CVE-2022-0087 - https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e +CVE-2022-0088 - https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29 +CVE-2022-0090 - https://gitlab.com/gitlab-org/gitaly/-/issues/3948 +CVE-2022-0121 - https://huntr.dev/bounties/b70a6191-8226-4ac6-b817-cae7332a68ee +CVE-2022-0122 - https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae +CVE-2022-0125 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0125.json +CVE-2022-0128 - https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba +CVE-2022-0132 - https://huntr.dev/bounties/77ec5308-5561-4664-af21-d780df2d1e4b +CVE-2022-0133 - https://huntr.dev/bounties/80aabdc1-89fe-47b8-87ca-9d68107fc0b4 +CVE-2022-0134 - https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85 +CVE-2022-0137 - https://github.com/michaelrsweet/htmldoc/issues/461 +CVE-2022-0139 - https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0 +CVE-2022-0140 - https://wpscan.com/vulnerability/9fa2b3b6-2fe3-40f0-8f71-371dd58fe336 +CVE-2022-0141 - https://wpscan.com/vulnerability/2adc8390-bb19-4adf-9805-e9c462d14d22 +CVE-2022-0142 - https://wpscan.com/vulnerability/03210390-2054-40c0-9508-39d168087878 +CVE-2022-0144 - https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c +CVE-2022-0145 - https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba +CVE-2022-0147 - https://wpscan.com/vulnerability/2c735365-69c0-4652-b48e-c4a192dfe0d1 +CVE-2022-0148 - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd +CVE-2022-0149 - https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c +CVE-2022-0150 - https://wpscan.com/vulnerability/7142a538-7c3d-4dd0-bd2c-cbd2efaf53c5 +CVE-2022-0153 - https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb +CVE-2022-0156 - https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36 +CVE-2022-0157 - https://huntr.dev/bounties/2c0fe81b-0977-4e1e-b5d8-7646c9a7ebbd +CVE-2022-0158 - https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b +CVE-2022-0159 - https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b +CVE-2022-0161 - https://wpscan.com/vulnerability/6b37fa17-0dcb-47a7-b1eb-f9f6abb458c0 +CVE-2022-0163 - https://wpscan.com/vulnerability/2b6b0731-4515-498a-82bd-d416f5885268 +CVE-2022-0164 - https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51 +CVE-2022-0165 - https://wpscan.com/vulnerability/906d0c31-370e-46b4-af1f-e52fbddd00cb +CVE-2022-0166 - https://kc.mcafee.com/corporate/index?page=content&id=SB10378 +CVE-2022-0168 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6f5e358452479fa8a773b5c6ccc9e4ec5a20880 +CVE-2022-0169 - https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c +CVE-2022-0170 - https://huntr.dev/bounties/f2a003fc-b911-43b6-81ec-f856cdfeaefc +CVE-2022-0171 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=683412ccf61294d727ead4a73d97397396e69a6b +CVE-2022-0173 - https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5 +CVE-2022-0174 - https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db +CVE-2022-0176 - https://wpscan.com/vulnerability/564a66d5-7fab-4de0-868a-e19466a507af +CVE-2022-0178 - https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368 +CVE-2022-0179 - https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7 +CVE-2022-0185 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2 +CVE-2022-0185 - https://www.willsroot.io/2022/01/cve-2022-0185.html +CVE-2022-0186 - https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720 +CVE-2022-0188 - https://wpscan.com/vulnerability/50b6f770-6f53-41ef-b2f3-2a58e9afd332 +CVE-2022-0189 - https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014 +CVE-2022-0190 - https://wpscan.com/vulnerability/ae322f11-d8b4-4b69-9efa-0fb87475fa44 +CVE-2022-0191 - https://wpscan.com/vulnerability/d4c32a02-810f-43d8-946a-b7e18ac54f55 +CVE-2022-0193 - https://plugins.trac.wordpress.org/changeset/2654225 +CVE-2022-0193 - https://wpscan.com/vulnerability/30d1d328-9f19-4c4c-b90a-04937d617864 +CVE-2022-0196 - https://huntr.dev/bounties/3675eec7-bbce-4dfd-a2d3-d6862dce9ea6 +CVE-2022-0197 - https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2 +CVE-2022-0198 - https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763 +CVE-2022-0199 - https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714 +CVE-2022-0200 - https://wpscan.com/vulnerability/bbc0b812-7b30-4ab4-bac8-27c706b3f146 +CVE-2022-0201 - https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4 +CVE-2022-0203 - https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406 +CVE-2022-0204 - https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q +CVE-2022-0205 - https://wpscan.com/vulnerability/446de364-720e-41ec-b80e-7678c8f4ad80 +CVE-2022-0206 - https://wpscan.com/vulnerability/ce12437a-d440-4c4a-9247-95a8f39d00b9 +CVE-2022-0208 - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc +CVE-2022-0209 - https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe +CVE-2022-0211 - https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679 +CVE-2022-0212 - https://wpscan.com/vulnerability/15be2d2b-baa3-4845-82cf-3c351c695b47 +CVE-2022-0213 - https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed +CVE-2022-0214 - https://wpscan.com/vulnerability/ca2e8feb-15d6-4965-ad9c-8da1bc01e0f4 +CVE-2022-0216 - https://starlabs.sg/advisories/22/22-0216/ +CVE-2022-0217 - https://prosody.im/security/advisory_20220113/ +CVE-2022-0217 - https://prosody.im/security/advisory_20220113/1.patch +CVE-2022-0219 - https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e +CVE-2022-0220 - https://wpscan.com/vulnerability/a91a01b9-7e36-4280-bc50-f6cff3e66059 +CVE-2022-0224 - https://huntr.dev/bounties/f1d1ce3e-ca92-4c7b-b1b8-934e28eaa486 +CVE-2022-0226 - https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f +CVE-2022-0228 - https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9 +CVE-2022-0229 - https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351 +CVE-2022-0230 - https://wpscan.com/vulnerability/c73316d2-ae6a-42db-935b-b8b03a7e4363 +CVE-2022-0231 - https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf +CVE-2022-0234 - https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b +CVE-2022-0236 - https://github.com/qurbat/CVE-2022-0236 +CVE-2022-0238 - https://huntr.dev/bounties/63f24b24-4af2-47b8-baea-7ad5f4db3633 +CVE-2022-0239 - https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3 +CVE-2022-0240 - https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb +CVE-2022-0242 - https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94 +CVE-2022-0243 - https://huntr.dev/bounties/fa538421-ae55-4288-928f-4e96aaed5803 +CVE-2022-0245 - https://huntr.dev/bounties/6a6aca72-32b7-45b3-a8ba-9b400b2d669c +CVE-2022-0246 - https://wpscan.com/vulnerability/892802b1-26e2-4ce1-be6f-71ce29687776 +CVE-2022-0248 - https://wpscan.com/vulnerability/d02cf542-2d75-46bc-a0df-67bbe501cc89 +CVE-2022-0250 - https://wpscan.com/vulnerability/05700942-3143-4978-89eb-814ceff74867 +CVE-2022-0252 - https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a +CVE-2022-0253 - https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303 +CVE-2022-0254 - https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997 +CVE-2022-0255 - https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa +CVE-2022-0256 - https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1 +CVE-2022-0257 - https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6 +CVE-2022-0258 - https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802 +CVE-2022-0261 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0261 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0261 - https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82 +CVE-2022-0262 - https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d +CVE-2022-0263 - https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6 +CVE-2022-0265 - https://huntr.dev/bounties/d63972a2-b910-480a-a86b-d1f75d24d563 +CVE-2022-0267 - https://wpscan.com/vulnerability/7df70f49-547f-4bdb-bf9b-2e06f93488c6 +CVE-2022-0268 - https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39 +CVE-2022-0269 - https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0 +CVE-2022-0271 - https://wpscan.com/vulnerability/ad07d9cd-8a75-4f7c-bbbe-3b6b89b699f2 +CVE-2022-0272 - https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44 +CVE-2022-0273 - https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13 +CVE-2022-0274 - https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764 +CVE-2022-0277 - https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316 +CVE-2022-0278 - https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030 +CVE-2022-0279 - https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865 +CVE-2022-0281 - https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505 +CVE-2022-0282 - https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd +CVE-2022-0284 - https://github.com/ImageMagick/ImageMagick/issues/4729 +CVE-2022-0285 - https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c +CVE-2022-0286 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40 +CVE-2022-0286 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-0287 - https://wpscan.com/vulnerability/6cd7cd6d-1cc1-472c-809b-b66389f149b0 +CVE-2022-0288 - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42 +CVE-2022-0289 - http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html +CVE-2022-0290 - http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html +CVE-2022-0306 - http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html +CVE-2022-0313 - https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c +CVE-2022-0314 - https://wpscan.com/vulnerability/17585f16-c62c-422d-ad9c-9138b6da97b7 +CVE-2022-0316 - https://wpscan.com/vulnerability/9ab3d6cf-aad7-41bc-9aae-dc5313f12f7c +CVE-2022-0318 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0318 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0318 - https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08 +CVE-2022-0319 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0319 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0319 - https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b +CVE-2022-0320 - https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95 +CVE-2022-0321 - https://wpscan.com/vulnerability/286b81a0-6f6d-4024-9bbc-6cb373990a7a +CVE-2022-0322 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c +CVE-2022-0322 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-0323 - https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7 +CVE-2022-0326 - https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976 +CVE-2022-0327 - https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883 +CVE-2022-0328 - https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9 +CVE-2022-0339 - https://huntr.dev/bounties/499688c4-6ac4-4047-a868-7922c3eab369 +CVE-2022-0341 - https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628 +CVE-2022-0345 - https://wpscan.com/vulnerability/b3b523b9-6c92-4091-837a-d34e3174eb19 +CVE-2022-0346 - https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6 +CVE-2022-0347 - https://wpscan.com/vulnerability/a5084367-842b-496a-a23c-24dbebac1e8b +CVE-2022-0348 - https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4 +CVE-2022-0349 - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a +CVE-2022-0350 - https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c +CVE-2022-0351 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0351 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0351 - https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161 +CVE-2022-0352 - https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717 +CVE-2022-0359 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0359 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0359 - https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def +CVE-2022-0360 - https://wpscan.com/vulnerability/d718b993-4de5-499c-84c9-69801396f51f +CVE-2022-0361 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0361 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0361 - https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b +CVE-2022-0362 - https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091 +CVE-2022-0363 - https://wpscan.com/vulnerability/a438a951-497c-43cd-822f-1a48d4315191 +CVE-2022-0364 - https://wpscan.com/vulnerability/0eb40cd5-838e-4b53-994d-22cf7c8a6c50 +CVE-2022-0367 - https://github.com/stephane/libmodbus/issues/614 +CVE-2022-0368 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0368 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0368 - https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9 +CVE-2022-0370 - https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca +CVE-2022-0372 - https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1 +CVE-2022-0374 - https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef +CVE-2022-0376 - https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932 +CVE-2022-0377 - https://wpscan.com/vulnerability/0d95ada6-53e3-4a80-a395-eacd7b090f26 +CVE-2022-0378 - https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31 +CVE-2022-0379 - https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6 +CVE-2022-0381 - https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3 +CVE-2022-0383 - https://wpscan.com/vulnerability/e0402753-3a80-455b-9fab-a7d2a7687193 +CVE-2022-0384 - https://wpscan.com/vulnerability/91c44c45-994b-4aed-b9f9-7db45924eeb4 +CVE-2022-0385 - https://wpscan.com/vulnerability/60067b8b-9fa5-40d1-817a-929779947891 +CVE-2022-0387 - https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98 +CVE-2022-0388 - https://wpscan.com/vulnerability/7d4ad1f3-6d27-4655-9796-ce370ef5fced +CVE-2022-0389 - https://wpscan.com/vulnerability/788ead78-9aa2-49a3-b191-12114be8270b +CVE-2022-0391 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-0392 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0392 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-0392 - https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126 +CVE-2022-0393 - https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba +CVE-2022-0394 - https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272 +CVE-2022-0397 - https://wpscan.com/vulnerability/c8091254-1ced-4363-ab7f-5b880447713d +CVE-2022-0398 - https://wpscan.com/vulnerability/21aec131-91ff-4300-ac7a-0bf31d6b2b24 +CVE-2022-0399 - https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164 +CVE-2022-0401 - https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d +CVE-2022-0402 - https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/ +CVE-2022-0403 - https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e +CVE-2022-0404 - https://wpscan.com/vulnerability/6d0932bb-d515-4432-b67b-16aba34bd285 +CVE-2022-0405 - https://huntr.dev/bounties/370538f6-5312-4c15-9fc0-b4c36ac236fe +CVE-2022-0406 - https://huntr.dev/bounties/d7498799-4797-4751-b5e2-b669e729d5db +CVE-2022-0407 - https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c +CVE-2022-0408 - https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d +CVE-2022-0409 - https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7 +CVE-2022-0410 - https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20 +CVE-2022-0411 - https://wpscan.com/vulnerability/35272197-c973-48ad-8405-538bfbafa172 +CVE-2022-0412 - https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 +CVE-2022-0413 - https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38 +CVE-2022-0414 - https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f +CVE-2022-0415 - https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902 +CVE-2022-0417 - https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a +CVE-2022-0418 - https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0 +CVE-2022-0419 - https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa +CVE-2022-0420 - https://wpscan.com/vulnerability/056b5167-3cbc-47d1-9917-52a434796151 +CVE-2022-0421 - https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9 +CVE-2022-0422 - https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc +CVE-2022-0423 - https://wpscan.com/vulnerability/7dde0b9d-9b86-4961-b005-a11b6ffba952 +CVE-2022-0424 - https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f +CVE-2022-0426 - https://wpscan.com/vulnerability/de69bcd1-b0b1-4b16-9655-776ee57ad90a +CVE-2022-0427 - https://gitlab.com/gitlab-org/gitlab/-/issues/347284 +CVE-2022-0428 - https://wpscan.com/vulnerability/071a2f69-9cd6-42a8-a56c-264a589784ab +CVE-2022-0429 - https://wpscan.com/vulnerability/d1b6f438-f737-4b18-89cf-161238a7421b +CVE-2022-0430 - https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f +CVE-2022-0431 - https://wpscan.com/vulnerability/52bd94df-8816-48fd-8788-38d045eb57ca +CVE-2022-0432 - https://huntr.dev/bounties/d06da292-7716-4d74-a129-dd04773398d7 +CVE-2022-0434 - https://wpscan.com/vulnerability/be895016-7365-4ce4-a54f-f36d0ef2d6f1 +CVE-2022-0436 - https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b +CVE-2022-0437 - https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885 +CVE-2022-0439 - https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095 +CVE-2022-0440 - https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1 +CVE-2022-0441 - https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed +CVE-2022-0442 - https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692 +CVE-2022-0443 - https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51 +CVE-2022-0444 - https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b +CVE-2022-0445 - https://wpscan.com/vulnerability/d9f28255-0026-4c42-9e67-d17b618c2285 +CVE-2022-0446 - https://wpscan.com/vulnerability/3fc7986e-3b38-4e16-9516-2ae00bc7a581 +CVE-2022-0447 - https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe +CVE-2022-0448 - https://wpscan.com/vulnerability/d4ff63ee-28e6-486e-9aa7-c878b97f707c +CVE-2022-0449 - https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387 +CVE-2022-0450 - https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a +CVE-2022-0471 - https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66 +CVE-2022-0472 - https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713 +CVE-2022-0476 - https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d +CVE-2022-0478 - https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431f +CVE-2022-0479 - https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816 +CVE-2022-0480 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042 +CVE-2022-0480 - https://github.com/kata-containers/kata-containers/issues/3373 +CVE-2022-0480 - https://ubuntu.com/security/CVE-2022-0480 +CVE-2022-0481 - https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027 +CVE-2022-0482 - http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html +CVE-2022-0482 - https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466 +CVE-2022-0482 - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26 +CVE-2022-0487 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39 +CVE-2022-0489 - https://gitlab.com/gitlab-org/gitlab/-/issues/341832 +CVE-2022-0492 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html +CVE-2022-0492 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html +CVE-2022-0492 - http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html +CVE-2022-0492 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af +CVE-2022-0493 - https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed +CVE-2022-0496 - https://github.com/openscad/openscad/issues/4037 +CVE-2022-0497 - https://github.com/openscad/openscad/issues/4043 +CVE-2022-0499 - https://wpscan.com/vulnerability/e9ccf1fc-1dbf-4a41-bf4a-90af20b286d6 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841 +CVE-2022-0500 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57 +CVE-2022-0503 - https://wpscan.com/vulnerability/b6d38e23-3761-4447-a794-1e5077fd953a +CVE-2022-0505 - https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968 +CVE-2022-0506 - https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f +CVE-2022-0507 - https://khoori.org/posts/cve-2022-0507/ +CVE-2022-0509 - https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b +CVE-2022-0510 - https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe +CVE-2022-0511 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-0512 - https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b +CVE-2022-0514 - https://huntr.dev/bounties/af08000d-9f4a-4743-865d-5d5cdaf7fb27 +CVE-2022-0515 - https://huntr.dev/bounties/efb93f1f-1896-4a4c-a059-9ecadac1c4de +CVE-2022-0516 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55 +CVE-2022-0518 - https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184 +CVE-2022-0519 - https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3 +CVE-2022-0520 - https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6 +CVE-2022-0521 - https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca +CVE-2022-0522 - https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9 +CVE-2022-0523 - https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69 +CVE-2022-0524 - https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d +CVE-2022-0525 - https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9 +CVE-2022-0526 - https://huntr.dev/bounties/d8f5ce74-2a00-4813-b220-70af771b0edd +CVE-2022-0529 - https://bugzilla.redhat.com/show_bug.cgi?id=2051402 +CVE-2022-0529 - https://github.com/ByteHackr/unzip_poc +CVE-2022-0530 - https://bugzilla.redhat.com/show_bug.cgi?id=2051395 +CVE-2022-0530 - https://github.com/ByteHackr/unzip_poc +CVE-2022-0531 - https://wpscan.com/vulnerability/ac5c2a5d-09b6-470b-a598-2972183413ca +CVE-2022-0533 - https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74 +CVE-2022-0534 - https://github.com/michaelrsweet/htmldoc/issues/463 +CVE-2022-0535 - https://wpscan.com/vulnerability/a4162e96-a3c5-4f38-a60b-aa3ed9508985 +CVE-2022-0537 - https://wpscan.com/vulnerability/abfbba70-5158-4990-98e5-f302361db367 +CVE-2022-0539 - https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af +CVE-2022-0541 - https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce +CVE-2022-0542 - https://huntr.dev/bounties/e6469ba6-03a2-4b17-8b4e-8932ecd0f7ac +CVE-2022-0543 - http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html +CVE-2022-0543 - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce +CVE-2022-0554 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0554 - https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71 +CVE-2022-0557 - http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html +CVE-2022-0557 - https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8 +CVE-2022-0557 - https://www.exploit-db.com/exploits/50768 +CVE-2022-0558 - https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c +CVE-2022-0559 - https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e +CVE-2022-0560 - https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25 +CVE-2022-0561 - https://gitlab.com/libtiff/libtiff/-/issues/362 +CVE-2022-0562 - https://gitlab.com/libtiff/libtiff/-/issues/362 +CVE-2022-0565 - https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5 +CVE-2022-0570 - https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1 +CVE-2022-0571 - https://huntr.dev/bounties/a5039485-6e48-4313-98ad-915506c19ae8 +CVE-2022-0572 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0572 - https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf +CVE-2022-0574 - https://huntr.dev/bounties/6f322c84-9e20-4df6-97e8-92bc271ede3f +CVE-2022-0575 - https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d +CVE-2022-0576 - https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177 +CVE-2022-0578 - https://huntr.dev/bounties/02c81928-eb47-476f-8000-e93dc796dbcc +CVE-2022-0579 - https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849 +CVE-2022-0580 - https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3 +CVE-2022-0583 - https://gitlab.com/wireshark/wireshark/-/issues/17840 +CVE-2022-0586 - https://gitlab.com/wireshark/wireshark/-/issues/17813 +CVE-2022-0587 - https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469 +CVE-2022-0588 - https://huntr.dev/bounties/caab3310-0d70-4c8a-8768-956f8dd3326d +CVE-2022-0589 - https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768 +CVE-2022-0590 - https://wpscan.com/vulnerability/08b66b69-3c69-4a1e-9c0a-5697e31bc04e +CVE-2022-0591 - https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47 +CVE-2022-0592 - https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b +CVE-2022-0593 - https://wpscan.com/vulnerability/76a50157-04b5-43e8-afbc-a6ddf6d1cba3 +CVE-2022-0594 - https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1 +CVE-2022-0595 - https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de +CVE-2022-0596 - https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5 +CVE-2022-0597 - https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813 +CVE-2022-0598 - https://wpscan.com/vulnerability/4688d39e-ac9b-47f5-a4c1-f9548b63c68c +CVE-2022-0599 - https://wpscan.com/vulnerability/4f1d45bc-d3bd-472c-959d-05abeff32765 +CVE-2022-0600 - https://wpscan.com/vulnerability/5dd6f625-6738-4e6a-81dc-21c0add4368d +CVE-2022-0601 - https://wpscan.com/vulnerability/6ec62eae-2072-4098-8f77-b22d61a89cbf +CVE-2022-0602 - https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010 +CVE-2022-0611 - https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b +CVE-2022-0613 - https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083 +CVE-2022-0614 - https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879 +CVE-2022-0616 - https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0 +CVE-2022-0617 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee +CVE-2022-0617 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f +CVE-2022-0619 - https://wpscan.com/vulnerability/d18892c6-2b19-4037-bc39-5d170adaf3d9 +CVE-2022-0620 - https://wpscan.com/vulnerability/77b92130-167c-4e8a-bde5-3fd1bd6982c6 +CVE-2022-0621 - https://wpscan.com/vulnerability/b5578747-298d-4f4b-867e-46b767485a98 +CVE-2022-0623 - https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580 +CVE-2022-0624 - https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388 +CVE-2022-0625 - https://wpscan.com/vulnerability/ec5c331c-fb74-4ccc-a4d4-446c2b4e703a +CVE-2022-0626 - https://wpscan.com/vulnerability/d72164e2-8449-4fb1-aad3-bfa86d645e47 +CVE-2022-0627 - https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4 +CVE-2022-0628 - https://wpscan.com/vulnerability/af9787ee-c496-4f02-a22c-c8f8a97ad902 +CVE-2022-0629 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0629 - https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877 +CVE-2022-0630 - https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32 +CVE-2022-0631 - https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40 +CVE-2022-0632 - https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b +CVE-2022-0633 - http://packetstormsecurity.com/files/166059/WordPress-UpdraftPlus-1.22.2-Backup-Disclosure.html +CVE-2022-0633 - https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3 +CVE-2022-0634 - https://wpscan.com/vulnerability/7e11aeb0-b231-407d-86ec-9018c2c7eee3 +CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753838 +CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2022-0637 +CVE-2022-0639 - https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155 +CVE-2022-0640 - https://wpscan.com/vulnerability/f8405e06-9cf3-4acb-aebb-e80fb402daa9 +CVE-2022-0641 - https://wpscan.com/vulnerability/0a9830df-5f5d-40a3-9841-40994275136f +CVE-2022-0642 - https://wpscan.com/vulnerability/099cf9b4-0b3a-43c6-8ca9-7c2d50f86425 +CVE-2022-0643 - https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24c +CVE-2022-0645 - https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6 +CVE-2022-0647 - https://wpscan.com/vulnerability/4a585d5f-72ba-43e3-b04f-8b3e1b84444a +CVE-2022-0648 - https://wpscan.com/vulnerability/90f9ad6a-4855-4a8e-97f6-5f403eb6455d +CVE-2022-0649 - https://wpscan.com/vulnerability/284fbc98-803d-4da5-8920-411eeae4bac8 +CVE-2022-0651 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 +CVE-2022-0654 - https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc +CVE-2022-0656 - https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 +CVE-2022-0657 - https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6 +CVE-2022-0658 - https://wpscan.com/vulnerability/d7f0805a-61ce-454a-96fb-5ecacd767578 +CVE-2022-0659 - https://wpscan.com/vulnerability/22dc2661-ba64-49e7-af65-892a617ab02c +CVE-2022-0660 - https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291 +CVE-2022-0661 - https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd +CVE-2022-0662 - https://wpscan.com/vulnerability/27ad58ba-b648-41d9-8074-16e4feeaee69 +CVE-2022-0663 - https://wpscan.com/vulnerability/b586b217-f91e-42d3-81f1-cc3ee3a4b01e +CVE-2022-0664 - https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac +CVE-2022-0665 - https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3 +CVE-2022-0666 - https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55 +CVE-2022-0674 - https://wpscan.com/vulnerability/332e1e1e-7420-4605-99bc-4074e212ff9b +CVE-2022-0676 - https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485 +CVE-2022-0678 - https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0 +CVE-2022-0679 - https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 +CVE-2022-0680 - https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded +CVE-2022-0681 - https://wpscan.com/vulnerability/c5765816-4439-4c14-a847-044248ada0ef +CVE-2022-0684 - https://wpscan.com/vulnerability/69b178f3-5951-4879-9bbe-183951d002ec +CVE-2022-0685 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0685 - https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782 +CVE-2022-0686 - https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c +CVE-2022-0687 - https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c +CVE-2022-0689 - https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649 +CVE-2022-0690 - https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9 +CVE-2022-0691 - https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4 +CVE-2022-0692 - https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203 +CVE-2022-0693 - https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643 +CVE-2022-0694 - https://wpscan.com/vulnerability/990d1b0a-dbd1-42d0-9a40-c345407c6fe0 +CVE-2022-0695 - https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea +CVE-2022-0696 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0696 - https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f +CVE-2022-0697 - https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b +CVE-2022-0700 - https://wpscan.com/vulnerability/1bf1f255-1571-425c-92b1-02833f6a44a7 +CVE-2022-0701 - https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1 +CVE-2022-0702 - https://wpscan.com/vulnerability/bf6f897b-af65-4122-802c-ae6d4f2346f9 +CVE-2022-0703 - https://wpscan.com/vulnerability/fa34beff-c8ab-4297-9c59-b3b0c52f0536 +CVE-2022-0704 - https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6 +CVE-2022-0705 - https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b +CVE-2022-0706 - https://wpscan.com/vulnerability/598d5c1b-7930-46a6-9a31-5e08a5f14907 +CVE-2022-0707 - https://wpscan.com/vulnerability/50680797-61e4-4737-898f-e5b394d89117 +CVE-2022-0708 - https://mattermost.com/security-updates/ +CVE-2022-0709 - https://wpscan.com/vulnerability/3cd1d8d2-d2a4-45a9-9b5f-c2a56f08be85 +CVE-2022-0712 - https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466 +CVE-2022-0713 - https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c +CVE-2022-0714 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0714 - https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3 +CVE-2022-0715 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02 +CVE-2022-0717 - https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9 +CVE-2022-0719 - https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312 +CVE-2022-0720 - https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf +CVE-2022-0721 - https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb +CVE-2022-0723 - https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5 +CVE-2022-0724 - https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062 +CVE-2022-0725 - https://bugzilla.redhat.com/show_bug.cgi?id=2052696 +CVE-2022-0726 - https://huntr.dev/bounties/8928ab08-7fcb-475e-8da7-18e8412c1ac3 +CVE-2022-0727 - https://huntr.dev/bounties/d1faa10f-0640-480c-bb52-089adb351e6e +CVE-2022-0728 - https://wpscan.com/vulnerability/c6d3d308-4bf1-493f-86e9-dd623526e3c6 +CVE-2022-0729 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0729 - https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea +CVE-2022-0731 - https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8 +CVE-2022-0732 - https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ +CVE-2022-0737 - https://wpscan.com/vulnerability/a5c9fa61-e6f1-4460-84fe-977a203bd4bc +CVE-2022-0739 - https://wpscan.com/vulnerability/388cd42d-b61a-42a4-8604-99b812db2357 +CVE-2022-0742 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d3916f3189172d5c69d33065c3c21119fe539fc +CVE-2022-0743 - https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293 +CVE-2022-0745 - https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a +CVE-2022-0746 - https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd +CVE-2022-0747 - https://wpscan.com/vulnerability/a8575322-c2cf-486a-9c37-71a22167aac3 +CVE-2022-0748 - https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737 +CVE-2022-0749 - https://github.com/SinGooCMS/SinGooCMSUtility/issues/1 +CVE-2022-0749 - https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979 +CVE-2022-0751 - https://gitlab.com/gitlab-org/gitlab/-/issues/349382 +CVE-2022-0752 - https://huntr.dev/bounties/49940dd2-72c2-4607-857a-1fade7e8f080 +CVE-2022-0753 - https://huntr.dev/bounties/8ce4b776-1c53-45ec-bc5f-783077e2d324 +CVE-2022-0754 - https://huntr.dev/bounties/8afb7991-c6ed-42d9-bd9b-1cc83418df88 +CVE-2022-0755 - https://huntr.dev/bounties/cc767dbc-c676-44c1-a9d1-cd17ae77ee7e +CVE-2022-0756 - https://huntr.dev/bounties/55164a63-62e4-4fb6-b4ca-87eca14f6f31 +CVE-2022-0760 - https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210 +CVE-2022-0762 - https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48 +CVE-2022-0763 - https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6 +CVE-2022-0764 - https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c +CVE-2022-0764 - https://github.com/strapi/strapi/issues/12879 +CVE-2022-0764 - https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5 +CVE-2022-0765 - https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587 +CVE-2022-0766 - https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b +CVE-2022-0767 - https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e +CVE-2022-0768 - https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903 +CVE-2022-0769 - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141 +CVE-2022-0770 - https://wpscan.com/vulnerability/49abe79c-ab1c-4dbf-824c-8daaac7e079d +CVE-2022-0771 - https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75 +CVE-2022-0773 - https://wpscan.com/vulnerability/55b89de0-30ed-4f98-935e-51f069faf6fc +CVE-2022-0775 - https://wpscan.com/vulnerability/b76dbf37-a0a2-48cf-bd85-3ebbc2f394dd/ +CVE-2022-0776 - https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001 +CVE-2022-0777 - https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7 +CVE-2022-0778 - http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html +CVE-2022-0778 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-0778 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-0779 - https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd +CVE-2022-0780 - https://wpscan.com/vulnerability/0ee7d1a8-9782-4db5-b055-e732f2763825 +CVE-2022-0781 - https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161 +CVE-2022-0782 - https://wpscan.com/vulnerability/b81e824c-d2b1-4381-abee-18c42bb5c2f5 +CVE-2022-0783 - https://wpscan.com/vulnerability/4d594424-8048-482d-b61c-45be1e97a8ba +CVE-2022-0784 - https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f +CVE-2022-0785 - https://wpscan.com/vulnerability/e1e09f56-89a4-4d6f-907b-3fb2cb825255 +CVE-2022-0786 - https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30 +CVE-2022-0787 - https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd +CVE-2022-0788 - https://wpscan.com/vulnerability/fbc71710-123f-4c61-9796-a6a4fd354828 +CVE-2022-0812 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1 +CVE-2022-0812 - https://ubuntu.com/security/CVE-2022-0812 +CVE-2022-0814 - https://wpscan.com/vulnerability/fd84dc08-0079-4fcf-81c3-a61d652e3269 +CVE-2022-0817 - https://wpscan.com/vulnerability/69263610-f454-4f27-80af-be523d25659e +CVE-2022-0818 - https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b +CVE-2022-0819 - https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5 +CVE-2022-0821 - https://huntr.dev/bounties/0019eb1c-8bf9-4bd0-a27f-aadc173515cb +CVE-2022-0822 - https://huntr.dev/bounties/06971613-b6ab-4b96-8aa6-4982bfcfeb73 +CVE-2022-0824 - http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html +CVE-2022-0824 - http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html +CVE-2022-0824 - https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295 +CVE-2022-0824 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html +CVE-2022-0825 - https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e +CVE-2022-0826 - https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5 +CVE-2022-0827 - https://wpscan.com/vulnerability/0d208ebc-7805-457b-aa5f-ffd5adb2f3be +CVE-2022-0828 - https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb +CVE-2022-0829 - https://huntr.dev/bounties/f2d0389f-d7d1-4f34-9f9d-268b0a0da05e +CVE-2022-0829 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html +CVE-2022-0830 - https://wpscan.com/vulnerability/114c0202-39f8-4748-ac0d-013d2d6f02f7 +CVE-2022-0833 - https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d +CVE-2022-0836 - https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f +CVE-2022-0837 - https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a +CVE-2022-0838 - https://huntr.dev/bounties/bd2fb1f1-cc8b-4ef7-8e2b-4ca686d8d614 +CVE-2022-0839 - https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70 +CVE-2022-0839 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-0840 - https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df +CVE-2022-0841 - https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1 +CVE-2022-0845 - https://huntr.dev/bounties/a795bf93-c91e-4c79-aae8-f7d8bda92e2a +CVE-2022-0846 - https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4 +CVE-2022-0847 - http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html +CVE-2022-0847 - http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html +CVE-2022-0847 - http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html +CVE-2022-0847 - http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html +CVE-2022-0847 - https://dirtypipe.cm4all.com/ +CVE-2022-0848 - http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html +CVE-2022-0848 - https://huntr.dev/bounties/3e91685f-cfb9-4ee4-abaf-9b712a8fd5a6 +CVE-2022-0849 - https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 +CVE-2022-0849 - https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6 +CVE-2022-0850 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe +CVE-2022-0854 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13 +CVE-2022-0856 - https://github.com/cacalabs/libcaca/issues/65 +CVE-2022-0860 - https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d +CVE-2022-0863 - https://wpscan.com/vulnerability/a30212a0-c910-4657-aee1-4a2d72c77983 +CVE-2022-0864 - http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html +CVE-2022-0864 - https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872 +CVE-2022-0865 - https://gitlab.com/libtiff/libtiff/-/issues/385 +CVE-2022-0867 - https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494 +CVE-2022-0868 - https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02 +CVE-2022-0869 - https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342 +CVE-2022-0870 - https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531 +CVE-2022-0871 - https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62 +CVE-2022-0873 - https://wpscan.com/vulnerability/d5ce4b8a-9aa5-4df8-b521-c2105990a87e +CVE-2022-0874 - https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810 +CVE-2022-0875 - https://wpscan.com/vulnerability/fefc1411-594d-465b-aeb9-78c141b23762 +CVE-2022-0876 - https://wpscan.com/vulnerability/73be6e92-ea37-4416-977d-52ee2afa022a +CVE-2022-0877 - https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c +CVE-2022-0879 - https://wpscan.com/vulnerability/c12f6087-1875-4edf-ac32-bec6f712968d +CVE-2022-0881 - https://huntr.dev/bounties/2628431e-6a98-4063-a0e3-a8b1d9ebaa9c +CVE-2022-0884 - https://wpscan.com/vulnerability/af06b96c-105f-429c-b2ad-c8c823897dba +CVE-2022-0885 - https://wpscan.com/vulnerability/8b08b72e-5584-4f25-ab73-5ab0f47412df +CVE-2022-0887 - https://wpscan.com/vulnerability/a6c1676d-9dcb-45f6-833a-9545bccd0ad6 +CVE-2022-0888 - https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607 +CVE-2022-0890 - https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276 +CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/380 +CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/382 +CVE-2022-0892 - https://wpscan.com/vulnerability/e5d95261-a243-493f-be6a-3c15ccb65435 +CVE-2022-0893 - https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9 +CVE-2022-0894 - https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95 +CVE-2022-0895 - https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d +CVE-2022-0896 - https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0 +CVE-2022-0898 - https://wpscan.com/vulnerability/f51d8345-3927-4be2-8145-e201371c8c43 +CVE-2022-0899 - https://wpscan.com/vulnerability/1772417a-1abb-4d97-9694-1254840defd1 +CVE-2022-0901 - http://packetstormsecurity.com/files/166626/WordPress-Ad-Inserter-Cross-Site-Scripting.html +CVE-2022-0901 - https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba +CVE-2022-0903 - https://mattermost.com/security-updates/ +CVE-2022-0904 - https://mattermost.com/security-updates/ +CVE-2022-0905 - https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb +CVE-2022-0906 - https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8 +CVE-2022-0907 - https://gitlab.com/libtiff/libtiff/-/issues/392 +CVE-2022-0908 - https://gitlab.com/libtiff/libtiff/-/issues/383 +CVE-2022-0909 - https://gitlab.com/libtiff/libtiff/-/issues/393 +CVE-2022-0911 - https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77 +CVE-2022-0912 - https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54 +CVE-2022-0913 - https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f +CVE-2022-0914 - https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930 +CVE-2022-0919 - https://wpscan.com/vulnerability/e8f32e0b-4a89-460b-bb78-7c83ef5e16b4 +CVE-2022-0920 - https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0 +CVE-2022-0921 - https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622 +CVE-2022-0924 - https://gitlab.com/libtiff/libtiff/-/issues/278 +CVE-2022-0926 - https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17 +CVE-2022-0928 - https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd +CVE-2022-0929 - https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03 +CVE-2022-0930 - https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993 +CVE-2022-0935 - https://huntr.dev/bounties/a7e40fdf-a333-4a50-8a53-d11b16ce3ec2 +CVE-2022-0936 - https://huntr.dev/bounties/90701766-bfed-409e-b3dd-6ff884373968 +CVE-2022-0937 - https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5 +CVE-2022-0938 - https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e +CVE-2022-0939 - https://huntr.dev/bounties/768fd7e2-a767-4d8d-a517-e9dda849c6e4 +CVE-2022-0940 - https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782 +CVE-2022-0941 - https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc +CVE-2022-0942 - https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9 +CVE-2022-0943 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-0943 - https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1 +CVE-2022-0944 - https://huntr.dev/bounties/46630727-d923-4444-a421-537ecd63e7fb +CVE-2022-0945 - https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e +CVE-2022-0946 - https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1 +CVE-2022-0948 - https://wpscan.com/vulnerability/daad48df-6a25-493f-9d1d-17b897462576 +CVE-2022-0949 - https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb +CVE-2022-0950 - https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc +CVE-2022-0951 - https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932 +CVE-2022-0952 - https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b +CVE-2022-0953 - https://wpscan.com/vulnerability/29ab3c7b-58e0-4a72-b7b4-ab12a6d54f5a +CVE-2022-0954 - https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26 +CVE-2022-0955 - https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df +CVE-2022-0956 - https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2 +CVE-2022-0957 - https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21 +CVE-2022-0958 - https://wpscan.com/vulnerability/05034521-6eb9-43b9-8f03-7e0de60e3022 +CVE-2022-0960 - https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e +CVE-2022-0961 - https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436 +CVE-2022-0962 - https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908 +CVE-2022-0963 - https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c +CVE-2022-0964 - https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0 +CVE-2022-0965 - https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347 +CVE-2022-0966 - https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe +CVE-2022-0967 - http://packetstormsecurity.com/files/167198/Showdoc-2.10.3-Cross-Site-Scripting.html +CVE-2022-0967 - https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a +CVE-2022-0968 - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e +CVE-2022-0969 - https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf +CVE-2022-0970 - https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec +CVE-2022-0986 - https://huntr.dev/bounties/57635c78-303f-412f-b75a-623df9fa9edd +CVE-2022-0989 - https://wpscan.com/vulnerability/a6bfc150-8e3f-4b2d-a6e1-09406af41dd4 +CVE-2022-0990 - https://huntr.dev/bounties/31649903-c19c-4dae-aee0-a04b095855c5 +CVE-2022-0991 - https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4 +CVE-2022-0994 - https://wpscan.com/vulnerability/e9dd62fc-bb79-4a6b-b99c-60e40f010d7a +CVE-2022-0995 - http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html +CVE-2022-0995 - http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html +CVE-2022-0995 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb +CVE-2022-0996 - https://github.com/ByteHackr/389-ds-base +CVE-2022-1000 - https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424 +CVE-2022-1001 - https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb +CVE-2022-1002 - https://mattermost.com/security-updates/ +CVE-2022-1003 - https://mattermost.com/security-updates/ +CVE-2022-1005 - https://wpscan.com/vulnerability/f37d1d55-10cc-4202-8d16-9ec2128f54f9 +CVE-2022-1006 - https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68 +CVE-2022-1007 - https://wpscan.com/vulnerability/6f5b764b-d13b-4371-9cc5-91204d9d6358 +CVE-2022-1008 - https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082 +CVE-2022-1009 - https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e +CVE-2022-1010 - https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b +CVE-2022-1011 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-1013 - https://wpscan.com/vulnerability/eed70659-9e3e-42a2-b427-56c52e0fbc0d +CVE-2022-1014 - https://wpscan.com/vulnerability/eb9e202d-04aa-4343-86a2-4aa2edaa7f6b +CVE-2022-1015 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ +CVE-2022-1015 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html +CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/01/13/2 +CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/02/23/1 +CVE-2022-1016 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ +CVE-2022-1020 - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 +CVE-2022-1021 - https://huntr.dev/bounties/a8187478-75e1-4d62-b894-651269401ca3 +CVE-2022-1022 - https://huntr.dev/bounties/2e4ac6b5-7357-415d-9633-65c636b20e94 +CVE-2022-1023 - https://wpscan.com/vulnerability/163069cd-98a8-4cfb-8b58-a6727a7d5c48 +CVE-2022-1026 - https://www.rapid7.com/blog/post/2022/03/29/cve-2022-1026-kyocera-net-view-address-book-exposure/ +CVE-2022-1027 - https://wpscan.com/vulnerability/9dbb0d6d-bc84-4b85-8aa5-fa2a8e6fa5e3 +CVE-2022-1028 - https://wpscan.com/vulnerability/16fc08ec-8476-4f3c-93ea-6a51ed880dd5 +CVE-2022-1029 - https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba +CVE-2022-1031 - https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457 +CVE-2022-1032 - https://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622 +CVE-2022-1033 - https://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045 +CVE-2022-1034 - https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7 +CVE-2022-1037 - https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957 +CVE-2022-1040 - http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html +CVE-2022-1040 - https://www.exploit-db.com/exploits/51006 +CVE-2022-1043 - http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html +CVE-2022-1044 - https://huntr.dev/bounties/ff878be9-563a-4d0e-99c1-fc3c767f6d3e +CVE-2022-1045 - https://huntr.dev/bounties/b0c4f992-4ac8-4479-82f4-367ed1a2a826 +CVE-2022-1046 - https://wpscan.com/vulnerability/a1ae4512-0b5b-4f36-8334-14633bf24758 +CVE-2022-1047 - https://wpscan.com/vulnerability/078bd5f6-64f7-4665-825b-9fd0c2b7b91b +CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5 +CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5/ +CVE-2022-1051 - https://wpscan.com/vulnerability/cb2fa587-da2f-460e-a402-225df7744765 +CVE-2022-1052 - https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7 +CVE-2022-1054 - https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d +CVE-2022-1055 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html +CVE-2022-1055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 +CVE-2022-1056 - https://gitlab.com/libtiff/libtiff/-/issues/391 +CVE-2022-1057 - https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243 +CVE-2022-1058 - https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d +CVE-2022-1061 - https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 +CVE-2022-1061 - https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7 +CVE-2022-1062 - https://wpscan.com/vulnerability/e770ba87-95d2-40c9-89cc-5d7390e9cbb0 +CVE-2022-1063 - https://wpscan.com/vulnerability/f90c528b-8c3a-4f9a-aa36-099c24abe082 +CVE-2022-1064 - https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40 +CVE-2022-1065 - https://www.redguard.ch/advisories/abacus_mfa_bypass.txt +CVE-2022-1071 - https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3 +CVE-2022-1073 - https://vuldb.com/?id.194839 +CVE-2022-1074 - https://vuldb.com/?id.194845 +CVE-2022-1075 - https://vuldb.com/?id.194846 +CVE-2022-1077 - https://vuldb.com/?id.194848 +CVE-2022-1078 - https://vuldb.com/?id.194856 +CVE-2022-1079 - https://vuldb.com/?id.195426 +CVE-2022-1081 - https://vuldb.com/?id.195640 +CVE-2022-1082 - https://vuldb.com/?id.195641 +CVE-2022-1083 - https://vuldb.com/?id.195642 +CVE-2022-1084 - https://vuldb.com/?id.195643 +CVE-2022-1085 - https://vuldb.com/?id.194857 +CVE-2022-1086 - https://github.com/xiahao90/CVEproject/blob/main/DolphinPHPV1.5.0_xss.md +CVE-2022-1086 - https://vuldb.com/?id.195368 +CVE-2022-1087 - https://github.com/liaojia-99/project/blob/main/htmly/1.md +CVE-2022-1087 - https://vuldb.com/?id.195203 +CVE-2022-1088 - https://wpscan.com/vulnerability/e86d456d-7a54-43e8-acf1-0b6a0a8bb41b +CVE-2022-1089 - https://wpscan.com/vulnerability/75a9fd23-7fa9-4cb1-a55b-ec5deae5d6fa +CVE-2022-1090 - https://wpscan.com/vulnerability/3993fa42-b4c3-462b-b568-0a08fe112c19 +CVE-2022-1091 - https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3 +CVE-2022-1092 - https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc546af61 +CVE-2022-1093 - https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553 +CVE-2022-1094 - https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329 +CVE-2022-1095 - https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b +CVE-2022-1103 - https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18 +CVE-2022-1104 - https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52 +CVE-2022-1106 - https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f +CVE-2022-1112 - https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 +CVE-2022-1113 - https://wpscan.com/vulnerability/ea438e84-f842-4cb9-b6c0-550cd8187701 +CVE-2022-1115 - https://github.com/ImageMagick/ImageMagick/issues/4974 +CVE-2022-1116 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html +CVE-2022-1119 - https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit +CVE-2022-1119 - https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606 +CVE-2022-1122 - https://github.com/uclouvain/openjpeg/issues/1368 +CVE-2022-1123 - https://wpscan.com/vulnerability/03e0d4d5-0184-4a15-b8ac-fdc2010e4812 +CVE-2022-1134 - http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html +CVE-2022-1148 - https://gitlab.com/gitlab-org/gitlab/-/issues/350687 +CVE-2022-1152 - https://wpscan.com/vulnerability/1c55fda9-e938-4267-be77-a6d73ee46af3 +CVE-2022-1153 - https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 +CVE-2022-1154 - https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 +CVE-2022-1154 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-1155 - https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1 +CVE-2022-1156 - https://wpscan.com/vulnerability/76ad4273-6bf4-41e9-99a8-bf6d634608ac +CVE-2022-1160 - https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c +CVE-2022-1162 - http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html +CVE-2022-1163 - http://packetstormsecurity.com/files/166629/minewebcms-1.15.2-Cross-Site-Scripting.html +CVE-2022-1163 - https://huntr.dev/bounties/44d40f34-c391-40c0-a517-12a2c0258149 +CVE-2022-1163 - https://www.exploit-db.com/exploits/50853 +CVE-2022-1164 - https://wpscan.com/vulnerability/157a9a76-3e5f-4d27-aefc-cb9cb88b3286 +CVE-2022-1165 - https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 +CVE-2022-1166 - https://wpscan.com/vulnerability/ea6646ac-f71f-4340-965d-fab272da5189 +CVE-2022-1167 - https://wpscan.com/vulnerability/a30a1430-c474-4cd1-877c-35c4ab624170 +CVE-2022-1168 - https://wpscan.com/vulnerability/bcf38e87-011e-4540-8bfb-c93443a4a490 +CVE-2022-1169 - https://wpscan.com/vulnerability/f3a1dcad-528a-4ecc-ac8e-728caa7c9878 +CVE-2022-1170 - https://wpscan.com/vulnerability/2ecb18e6-b575-4a20-bd31-94d24f1d1efc +CVE-2022-1171 - https://wpscan.com/vulnerability/dc5eace4-542f-47e9-b870-a6aae6a38b0f +CVE-2022-1172 - https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264 +CVE-2022-1173 - https://huntr.dev/bounties/b6016e95-9f48-4945-89cb-199b6e072218 +CVE-2022-1174 - https://gitlab.com/gitlab-org/gitlab/-/issues/338721 +CVE-2022-1175 - http://packetstormsecurity.com/files/166829/Gitlab-14.9-Cross-Site-Scripting.html +CVE-2022-1176 - https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3 +CVE-2022-1182 - https://wpscan.com/vulnerability/01d108bb-d134-4651-9c74-babcc88da177 +CVE-2022-1185 - https://gitlab.com/gitlab-org/gitlab/-/issues/349148 +CVE-2022-1191 - https://huntr.dev/bounties/7264a2e1-17e7-4244-93e4-49ec14f282b3 +CVE-2022-1192 - https://wpscan.com/vulnerability/18660c71-5a89-4ef6-b0dd-7a166e3449d6 +CVE-2022-1193 - https://gitlab.com/gitlab-org/gitlab/-/issues/351823 +CVE-2022-1194 - https://wpscan.com/vulnerability/62be0991-f095-43cf-a167-3daaed254594 +CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8 +CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469 +CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71 +CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e +CVE-2022-1196 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750679 +CVE-2022-1201 - https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b +CVE-2022-1202 - https://wpscan.com/vulnerability/53c8190c-baef-4807-970b-f01ab440576a +CVE-2022-1203 - https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820 +CVE-2022-1207 - https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb +CVE-2022-1210 - https://gitlab.com/libtiff/libtiff/-/issues/402 +CVE-2022-1210 - https://vuldb.com/?id.196363 +CVE-2022-1211 - https://github.com/tildearrow/furnace/issues/325 +CVE-2022-1211 - https://vuldb.com/?id.196371 +CVE-2022-1212 - https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe +CVE-2022-1213 - https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1 +CVE-2022-1216 - https://wpscan.com/vulnerability/31a5b138-3d9e-4cd6-b85c-d20406ab51bd +CVE-2022-1217 - https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c +CVE-2022-1218 - https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65 +CVE-2022-1219 - https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6 +CVE-2022-1220 - https://wpscan.com/vulnerability/eb58f43e-4304-40e7-9e0f-d0d6fe049724 +CVE-2022-1221 - https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9 +CVE-2022-1222 - https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d +CVE-2022-1223 - https://huntr.dev/bounties/baec4c23-2466-4b13-b3c0-eaf1d000d4ab +CVE-2022-1224 - https://huntr.dev/bounties/cd9e1508-5682-427e-a921-14b4f520b85a +CVE-2022-1225 - https://huntr.dev/bounties/49b44cfa-d142-4d79-b529-7805507169d2 +CVE-2022-1231 - https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604 +CVE-2022-1233 - https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c +CVE-2022-1235 - https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705 +CVE-2022-1237 - https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 +CVE-2022-1238 - https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200 +CVE-2022-1239 - https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee +CVE-2022-1240 - https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc +CVE-2022-1241 - https://wpscan.com/vulnerability/3258393a-eafb-4356-994e-2ff8ce223c9b +CVE-2022-1243 - https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7 +CVE-2022-1244 - https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 +CVE-2022-1247 - https://bugzilla.redhat.com/show_bug.cgi?id=2066799 +CVE-2022-1248 - http://packetstormsecurity.com/files/166609/SAP-Information-System-1.0.0-Missing-Authorization.html +CVE-2022-1248 - https://vuldb.com/?id.196550 +CVE-2022-1250 - https://wpscan.com/vulnerability/1f8cb0b9-7447-44db-8d13-292db5b17718 +CVE-2022-1251 - https://wpscan.com/vulnerability/34b3fc35-381a-4bd7-87e3-f1ef0a15a349 +CVE-2022-1252 - https://0g.vc/posts/insecure-cipher-gnuboard5/ +CVE-2022-1252 - https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb +CVE-2022-1253 - https://huntr.dev/bounties/1-other-strukturag/libde265 +CVE-2022-1255 - https://wpscan.com/vulnerability/22fe68c4-8f47-491e-be87-5e8e40535a82 +CVE-2022-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 +CVE-2022-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 +CVE-2022-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382 +CVE-2022-1263 - https://www.openwall.com/lists/oss-security/2022/04/07/1 +CVE-2022-1265 - https://wpscan.com/vulnerability/9b66819d-8479-4c0b-b206-7f7ff769f758 +CVE-2022-1266 - https://wpscan.com/vulnerability/7800d583-fcfc-4360-9dc3-af3f73e12ab4 +CVE-2022-1267 - https://wpscan.com/vulnerability/ed2971c2-b99c-4320-ac46-bea5a0a493ed +CVE-2022-1268 - https://wpscan.com/vulnerability/6d596afb-cac3-4ef2-9742-235c068d1006 +CVE-2022-1269 - https://wpscan.com/vulnerability/65ff0e71-0fcd-4357-9b00-143cb18901bf +CVE-2022-1273 - https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603 +CVE-2022-1274 - https://herolab.usd.de/security-advisories/usd-2021-0033/ +CVE-2022-1275 - https://wpscan.com/vulnerability/bc2e5be3-cd2b-4ee9-8d7a-cabce46b7092 +CVE-2022-1276 - https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25 +CVE-2022-1280 - https://www.openwall.com/lists/oss-security/2022/04/12/3 +CVE-2022-1281 - https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de +CVE-2022-1282 - https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6 +CVE-2022-1283 - https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013 +CVE-2022-1284 - https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 +CVE-2022-1285 - https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d +CVE-2022-1286 - https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189 +CVE-2022-1287 - https://vuldb.com/?id.196750 +CVE-2022-1288 - https://vuldb.com/?id.196751 +CVE-2022-1289 - https://github.com/tildearrow/furnace/issues/325#issuecomment-1094139655 +CVE-2022-1290 - https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed +CVE-2022-1291 - https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5 +CVE-2022-1292 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-1294 - https://wpscan.com/vulnerability/205a24b8-6d14-4458-aecd-79748e1324c7 +CVE-2022-1295 - https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a +CVE-2022-1296 - https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0 +CVE-2022-1297 - https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac +CVE-2022-1298 - https://wpscan.com/vulnerability/e124d1ab-3e02-4ca5-8218-ce635e8bf074 +CVE-2022-1299 - https://wpscan.com/vulnerability/8c46adb1-82d7-4621-a8c3-15cd90e98b96 +CVE-2022-1301 - https://wpscan.com/vulnerability/69b75983-1010-453e-bf67-27b4a2a327a8 +CVE-2022-1303 - https://wpscan.com/vulnerability/590b446d-f8bc-49b0-93e7-2a6f2e6f62f1 +CVE-2022-1316 - https://huntr.dev/bounties/e7835226-1b20-4546-b256-3f625badb022 +CVE-2022-1320 - https://wpscan.com/vulnerability/43581d6b-333a-48d9-a1ae-b9479da8ff87 +CVE-2022-1321 - https://wpscan.com/vulnerability/b8784995-0deb-4c83-959f-52b37881e05c +CVE-2022-1322 - https://wpscan.com/vulnerability/e1724471-26bd-4cb3-a279-51783102ed0c +CVE-2022-1323 - https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b +CVE-2022-1324 - https://wpscan.com/vulnerability/2ce2a387-acc8-482a-9452-a4d9acb187fd +CVE-2022-1325 - https://bugzilla.redhat.com/show_bug.cgi?id=2074549 +CVE-2022-1325 - https://github.com/GreycLab/CImg/issues/343 +CVE-2022-1325 - https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/ +CVE-2022-1326 - https://wpscan.com/vulnerability/f57615d9-a567-4c2a-9f06-2c6b61f56074 +CVE-2022-1327 - https://wpscan.com/vulnerability/6b71eb38-0a4a-49d1-96bc-84bbe675be1e +CVE-2022-1328 - http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html +CVE-2022-1329 - http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html +CVE-2022-1332 - https://mattermost.com/security-updates/ +CVE-2022-1333 - https://mattermost.com/security-updates/ +CVE-2022-1334 - https://wpscan.com/vulnerability/af3b32c9-f386-4bb6-a362-86a27f49a739 +CVE-2022-1335 - https://wpscan.com/vulnerability/cfc80857-8674-478f-9604-7a8849e5b85e +CVE-2022-1336 - https://wpscan.com/vulnerability/39e127f1-c36e-4699-892f-3755ee17bab6 +CVE-2022-1337 - https://mattermost.com/security-updates/ +CVE-2022-1338 - https://wpscan.com/vulnerability/51b91d0e-33af-41ce-b95f-d422586f1d5f +CVE-2022-1339 - https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9 +CVE-2022-1340 - https://huntr.dev/bounties/4746f149-fc55-48a1-a7ab-fd7c7412c05a +CVE-2022-1344 - https://huntr.dev/bounties/35f66966-af13-4f07-9734-0c50fdfc3a8c +CVE-2022-1345 - https://huntr.dev/bounties/781b5c2a-bc98-41a0-a276-ea12399e5a25 +CVE-2022-1346 - https://huntr.dev/bounties/8fe435b0-192f-41ca-b41e-580fcd34892f +CVE-2022-1347 - https://huntr.dev/bounties/6059501f-05d2-4e76-ae03-5eb64835e6bf +CVE-2022-1349 - https://wpscan.com/vulnerability/7ee95a53-5fe9-404c-a77a-d1218265e4aa +CVE-2022-1351 - https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615 +CVE-2022-1354 - https://gitlab.com/libtiff/libtiff/-/issues/319 +CVE-2022-1355 - https://gitlab.com/libtiff/libtiff/-/issues/400 +CVE-2022-1379 - https://huntr.dev/bounties/0d737527-86e1-41d1-9d37-b2de36bc063a +CVE-2022-1380 - https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12 +CVE-2022-1381 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1381 - https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4 +CVE-2022-1382 - https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1 +CVE-2022-1383 - https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9 +CVE-2022-1384 - https://mattermost.com/security-updates/ +CVE-2022-1385 - https://mattermost.com/security-updates/ +CVE-2022-1386 - https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b +CVE-2022-1386 - https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/ +CVE-2022-1387 - https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347 +CVE-2022-1388 - http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html +CVE-2022-1388 - http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html +CVE-2022-1388 - http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html +CVE-2022-1390 - https://packetstormsecurity.com/files/166476/ +CVE-2022-1390 - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 +CVE-2022-1391 - https://packetstormsecurity.com/files/166533/ +CVE-2022-1391 - https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac +CVE-2022-1392 - https://packetstormsecurity.com/files/166534/ +CVE-2022-1392 - https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815 +CVE-2022-1393 - https://wpscan.com/vulnerability/3491b889-94dd-4507-9fed-58f48d8275cf +CVE-2022-1394 - https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3 +CVE-2022-1395 - https://wpscan.com/vulnerability/e5c06b38-fab8-44af-84dc-df94eb72ce80 +CVE-2022-1396 - https://packetstormsecurity.com/files/166531/ +CVE-2022-1396 - https://wpscan.com/vulnerability/721ddc3e-ab24-4834-bd47-4eb6700439a9 +CVE-2022-1397 - https://huntr.dev/bounties/5f69e094-ab8c-47a3-b01d-8c12a3b14c61 +CVE-2022-1398 - https://wpscan.com/vulnerability/5440d177-e995-403e-b2c9-42ceda14579e +CVE-2022-1399 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ +CVE-2022-1400 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ +CVE-2022-1401 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ +CVE-2022-1407 - https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d +CVE-2022-1408 - https://wpscan.com/vulnerability/48dccf4c-07e0-4877-867d-f8f43aeb5705 +CVE-2022-1409 - https://wpscan.com/vulnerability/1330f8f7-4a59-4e9d-acae-21656a4101fe +CVE-2022-1410 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/ +CVE-2022-1411 - https://huntr.dev/bounties/75c7cf09-d118-4f91-9686-22b142772529 +CVE-2022-1412 - https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2 +CVE-2022-1416 - https://gitlab.com/gitlab-org/gitlab/-/issues/342988 +CVE-2022-1417 - https://hackerone.com/reports/1075586 +CVE-2022-1418 - https://wpscan.com/vulnerability/3851e61e-f462-4259-af0a-8d832809d559 +CVE-2022-1420 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1420 - https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326 +CVE-2022-1421 - https://wpscan.com/vulnerability/a7a24e8e-9056-4967-bcad-b96cc0c5b249 +CVE-2022-1422 - https://wpscan.com/vulnerability/29aff4bf-1691-4dc1-a670-1f2c9a765a3b +CVE-2022-1424 - https://wpscan.com/vulnerability/147b4097-dec8-4542-b122-7b237db81c05 +CVE-2022-1425 - https://wpscan.com/vulnerability/b110e2f7-4aa3-47b5-a8f2-0a7fe53cc467 +CVE-2022-1427 - https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301 +CVE-2022-1429 - https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e +CVE-2022-1430 - https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541 +CVE-2022-1432 - https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf +CVE-2022-1435 - https://wpscan.com/vulnerability/ef5aa8a7-23a7-4ce0-bb09-d9c986386114 +CVE-2022-1436 - https://wpscan.com/vulnerability/d5c6f894-6ad1-46f4-bd77-17ad9234cfc3 +CVE-2022-1437 - https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038 +CVE-2022-1439 - https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0 +CVE-2022-1440 - https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 +CVE-2022-1441 - https://github.com/gpac/gpac/issues/2175 +CVE-2022-1442 - https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf +CVE-2022-1444 - https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa +CVE-2022-1445 - https://huntr.dev/bounties/f4420149-5236-4051-a458-5d4f1d5b7abd +CVE-2022-1451 - https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 +CVE-2022-1452 - https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6 +CVE-2022-1455 - https://wpscan.com/vulnerability/8267046e-870e-4ccd-b920-340233ed3b93 +CVE-2022-1456 - https://wpscan.com/vulnerability/1f41fc5c-18d0-493d-9a7d-8b521ab49f85 +CVE-2022-1457 - https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046 +CVE-2022-1458 - https://huntr.dev/bounties/78674078-0796-4102-a81e-f699cd6981b0 +CVE-2022-1462 - https://seclists.org/oss-sec/2022/q2/155 +CVE-2022-1464 - https://huntr.dev/bounties/34a12146-3a5d-4efc-a0f8-7a3ae04b198d +CVE-2022-1465 - https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7 +CVE-2022-1466 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt +CVE-2022-1466 - https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076 +CVE-2022-1467 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ +CVE-2022-1469 - https://wpscan.com/vulnerability/88869380-173d-4d4f-81d8-3c20add5f98d +CVE-2022-1470 - https://wpscan.com/vulnerability/13bb796f-7a17-47c9-a46f-a1d6ca4b6b91 +CVE-2022-1471 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html +CVE-2022-1471 - https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2 +CVE-2022-1472 - https://wpscan.com/vulnerability/9c608b14-dc5e-469e-b97a-84696fae804c +CVE-2022-1474 - https://wpscan.com/vulnerability/2d821464-c502-4f71-afee-97b3dea16612 +CVE-2022-1503 - https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md +CVE-2022-1503 - https://vuldb.com/?id.198542 +CVE-2022-1504 - https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6 +CVE-2022-1506 - https://wpscan.com/vulnerability/ee4f6786-27e4-474c-85e0-715b0c0f2776 +CVE-2022-1507 - https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95 +CVE-2022-1508 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 +CVE-2022-1509 - https://huntr.dev/bounties/09e69dff-f281-4e51-8312-ed7ab7606338 +CVE-2022-1511 - https://huntr.dev/bounties/4a1723e9-5bc4-4c4b-bceb-1c45964cc71d +CVE-2022-1512 - https://packetstormsecurity.com/files/166820/ +CVE-2022-1512 - https://wpscan.com/vulnerability/a754a516-07fc-44f1-9c34-31e963460301 +CVE-2022-1514 - https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c +CVE-2022-1526 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md +CVE-2022-1527 - https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16 +CVE-2022-1528 - https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f +CVE-2022-1529 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770048 +CVE-2022-1530 - https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6 +CVE-2022-1531 - https://huntr.dev/bounties/fc4eb544-ef1e-412d-9fdb-0ceb04e038fe +CVE-2022-1532 - https://wpscan.com/vulnerability/d106cd93-cb9b-4558-9a29-0d556fd7c9e1 +CVE-2022-1533 - https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3 +CVE-2022-1534 - https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d +CVE-2022-1536 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/automad%3C%3D1.10.9%20Stored%20Cross-Site%20Scripting(XSS).md +CVE-2022-1536 - https://vuldb.com/?id.198706 +CVE-2022-1537 - https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d +CVE-2022-1538 - https://wpscan.com/vulnerability/b19adf7c-3983-487b-9b46-0f2922b08c1c/ +CVE-2022-1539 - https://wpscan.com/vulnerability/50f70927-9677-4ba4-a388-0a41ed356523 +CVE-2022-1540 - https://wpscan.com/vulnerability/77a524d8-0b1a-407a-98d2-d8d0ed78fa0f +CVE-2022-1541 - https://wpscan.com/vulnerability/053a9815-cf0a-472e-844a-3dea407ce022 +CVE-2022-1542 - https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359 +CVE-2022-1543 - https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9f +CVE-2022-1544 - https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4 +CVE-2022-1546 - https://wpscan.com/vulnerability/5ec6182c-6917-4c48-90ce-e0ebe38e7595 +CVE-2022-1547 - https://wpscan.com/vulnerability/83eca346-7045-414e-81fc-e0d9b735f0bd +CVE-2022-1548 - https://mattermost.com/security-updates/ +CVE-2022-1549 - https://wpscan.com/vulnerability/afef06f5-71a6-4372-9648-0db59f9b254f +CVE-2022-1551 - https://wpscan.com/vulnerability/51b4752a-7922-444d-a022-f1c7159b5d84 +CVE-2022-1553 - https://huntr.dev/bounties/b398e4c9-6cdf-4973-ad86-da796cde221f +CVE-2022-1554 - https://huntr.dev/bounties/7acac778-5ba4-4f02-99e2-e4e17a81e600 +CVE-2022-1555 - https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687 +CVE-2022-1556 - https://packetstormsecurity.com/files/166918/ +CVE-2022-1556 - https://wpscan.com/vulnerability/04890549-6bd1-44dd-8bce-7125c01be5d4 +CVE-2022-1557 - https://packetstormsecurity.com/files/166564/ +CVE-2022-1557 - https://wpscan.com/vulnerability/e2b6dbf5-8709-4a2c-90be-3214ff55ed56 +CVE-2022-1558 - https://packetstormsecurity.com/files/166839/ +CVE-2022-1558 - https://wpscan.com/vulnerability/0414dad4-e90b-4122-8b77-a8a958ab824d +CVE-2022-1559 - https://packetstormsecurity.com/files/166530/ +CVE-2022-1559 - https://wpscan.com/vulnerability/99059337-c3cd-4e91-9a03-df32a05b719c +CVE-2022-1560 - https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de +CVE-2022-1562 - https://wpscan.com/vulnerability/8e5b1e4f-c132-42ee-b2d0-7306ab4ab615 +CVE-2022-1563 - https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456/ +CVE-2022-1564 - https://wpscan.com/vulnerability/a487c7e7-667c-4c92-a427-c43cc13b348d +CVE-2022-1565 - http://packetstormsecurity.com/files/171578/WordPress-WP-All-Import-3.6.7-Remote-Code-Execution.html +CVE-2022-1566 - https://wpscan.com/vulnerability/0af030d8-b676-4826-91c0-98706b816f3c +CVE-2022-1568 - https://wpscan.com/vulnerability/88328d17-ffc9-4b94-8b01-ad2fd3047fbc +CVE-2022-1569 - https://wpscan.com/vulnerability/5a2756c1-9abf-4fd6-8ce2-9f840514dfcc +CVE-2022-1570 - https://wpscan.com/vulnerability/c0257564-48ee-4d02-865f-82c8b5e793c9 +CVE-2022-1571 - https://huntr.dev/bounties/4578a690-73e5-4313-840c-ee15e5329741 +CVE-2022-1572 - https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5 +CVE-2022-1573 - https://wpscan.com/vulnerability/9c1acd9c-999f-4a35-a272-1ad31552e685 +CVE-2022-1574 - https://wpscan.com/vulnerability/c36d0ea8-bf5c-4af9-bd3d-911eb02adc14 +CVE-2022-1575 - https://huntr.dev/bounties/033d3423-eb05-4b53-a747-1bfcba873127 +CVE-2022-1576 - https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf +CVE-2022-1577 - https://wpscan.com/vulnerability/39388900-266d-4308-88e7-d40ca6bbe346 +CVE-2022-1578 - https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b +CVE-2022-1579 - https://wpscan.com/vulnerability/6f3d40fa-458b-44f0-9407-763e80b29668 +CVE-2022-1580 - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a +CVE-2022-1582 - https://wpscan.com/vulnerability/cbb75383-4351-4488-aaca-ddb0f6f120cd +CVE-2022-1583 - https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9 +CVE-2022-1584 - https://huntr.dev/bounties/69f4ca67-d615-4f25-b2d1-19df7bf1107d +CVE-2022-1585 - https://wpscan.com/vulnerability/e709958c-7bce-45d7-9a0a-6e0ed12cd03f +CVE-2022-1589 - https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633 +CVE-2022-1590 - https://github.com/joinia/webray.com.cn/blob/main/Bludit/Bluditreadme.md +CVE-2022-1590 - https://vuldb.com/?id.199060 +CVE-2022-1591 - https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa +CVE-2022-1592 - https://huntr.dev/bounties/352b39da-0f2e-415a-9793-5480cae8bd27 +CVE-2022-1593 - https://wpscan.com/vulnerability/67678666-402b-4010-ac56-7067a0f40185 +CVE-2022-1594 - https://wpscan.com/vulnerability/bb0efc5e-044b-47dc-9101-9aae40cdbaa5 +CVE-2022-1595 - https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b +CVE-2022-1597 - https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e +CVE-2022-1598 - https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8 +CVE-2022-1599 - https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6 +CVE-2022-1600 - https://wpscan.com/vulnerability/2b7445fd-0992-47cd-9a48-f5f18d8171f7 +CVE-2022-1601 - https://wpscan.com/vulnerability/f6d3408c-2ceb-4a89-822b-13f5272a5fce +CVE-2022-1603 - https://wpscan.com/vulnerability/0e12ba6f-a86f-4cc6-9013-8a15586098d0 +CVE-2022-1604 - https://wpscan.com/vulnerability/557c1c49-7195-4085-b67a-9fd8aca57845 +CVE-2022-1605 - https://wpscan.com/vulnerability/a1b69615-690a-423b-afdf-729dcd32bc2f +CVE-2022-1608 - https://wpscan.com/vulnerability/56d2d55b-bd09-47af-988c-7f47eec4151f +CVE-2022-1609 - https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/ +CVE-2022-1610 - https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93 +CVE-2022-1611 - https://wpscan.com/vulnerability/3843b867-7784-4976-b5ab-8a1e7d45618a +CVE-2022-1612 - https://wpscan.com/vulnerability/a8cec792-6435-4047-bca8-597c104dbc1f +CVE-2022-1613 - https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b +CVE-2022-1614 - https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 +CVE-2022-1616 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1616 - https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2 +CVE-2022-1617 - https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/ +CVE-2022-1618 - https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d/ +CVE-2022-1619 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1619 - https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 +CVE-2022-1620 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1620 - https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51 +CVE-2022-1621 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1621 - https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb +CVE-2022-1622 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1624 - https://wpscan.com/vulnerability/06e547fd-cddf-4294-87be-54f58d6138a7 +CVE-2022-1625 - https://wpscan.com/vulnerability/e1693318-900c-47f1-bb77-008b0d33327f +CVE-2022-1626 - https://wpscan.com/vulnerability/3d1f90d9-45da-42f8-93f8-15c8a4ff90ca +CVE-2022-1627 - https://wpscan.com/vulnerability/70ce3654-8fd9-4c33-b594-fac13ec26137 +CVE-2022-1629 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1629 - https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee +CVE-2022-1630 - https://wpscan.com/vulnerability/178d0c49-3a93-4948-8734-f3d7518361b3 +CVE-2022-1631 - http://packetstormsecurity.com/files/167376/Microweber-CMS-1.2.15-Account-Takeover.html +CVE-2022-1631 - https://huntr.dev/bounties/5494e258-5c7b-44b4-b443-85cff7ae0ba4 +CVE-2022-1643 - https://wpscan.com/vulnerability/73111c7e-c772-4bed-b282-854c1ae57444 +CVE-2022-1644 - https://wpscan.com/vulnerability/0184d70a-548c-4258-b01d-7477f03cc346 +CVE-2022-1645 - https://wpscan.com/vulnerability/915b7d79-f9dd-451d-bf8f-6d14ec3e67d2 +CVE-2022-1646 - https://wpscan.com/vulnerability/8a32896d-bf1b-4d7b-8d84-dc38b877928b +CVE-2022-1647 - https://wpscan.com/vulnerability/8e8f6b08-90ab-466a-9828-dca0c0da2c9c +CVE-2022-1649 - https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449 +CVE-2022-1650 - https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e +CVE-2022-1651 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b +CVE-2022-1653 - https://wpscan.com/vulnerability/52eff451-8ce3-4ac4-b530-3196aa82db48 +CVE-2022-1663 - https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70 +CVE-2022-1671 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff8376ade4f668130385839cef586a0990f8ef87 +CVE-2022-1672 - https://wpscan.com/vulnerability/5c5955d7-24f0-45e6-9c27-78ef50446dad +CVE-2022-1673 - https://wpscan.com/vulnerability/14283389-a6b8-4dd8-9441-f16fcc4ab3c0 +CVE-2022-1674 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1674 - https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385 +CVE-2022-1681 - https://huntr.dev/bounties/591b11e1-7504-4a96-99c6-08f2b419e767 +CVE-2022-1682 - https://huntr.dev/bounties/e962d191-93e2-405e-a6af-b4a4e4d02527 +CVE-2022-1683 - https://wpscan.com/vulnerability/359d145b-c365-4e7c-a12e-c26b7b8617ce +CVE-2022-1684 - https://bulletin.iese.de/post/cube-slider_1-2 +CVE-2022-1684 - https://wpscan.com/vulnerability/db7fb815-945a-41c7-8932-834cc646a806 +CVE-2022-1685 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1 +CVE-2022-1685 - https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97 +CVE-2022-1686 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2 +CVE-2022-1686 - https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71 +CVE-2022-1687 - https://bulletin.iese.de/post/logo-slider_1-4-8 +CVE-2022-1687 - https://wpscan.com/vulnerability/e7506906-5c3d-4963-ae24-55f18c3e5081 +CVE-2022-1688 - https://bulletin.iese.de/post/note-press_0-1-10_1 +CVE-2022-1688 - https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92 +CVE-2022-1689 - https://bulletin.iese.de/post/note-press_0-1-10_2 +CVE-2022-1689 - https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28 +CVE-2022-1690 - https://bulletin.iese.de/post/note-press_0-1-10_3 +CVE-2022-1690 - https://wpscan.com/vulnerability/54e16f0a-667c-44ea-98ad-0306c4a35d9d +CVE-2022-1691 - https://bulletin.iese.de/post/realty-workstation_1-0-6 +CVE-2022-1691 - https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049 +CVE-2022-1692 - https://bulletin.iese.de/post/cp-image-store_1-0-67 +CVE-2022-1692 - https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571 +CVE-2022-1694 - https://wpscan.com/vulnerability/169a6c81-6c76-4f29-8f60-b2551042b962 +CVE-2022-1695 - https://wpscan.com/vulnerability/2ac5b87b-1390-41ce-af6e-c50e5709baaa +CVE-2022-1697 - https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm +CVE-2022-1698 - https://huntr.dev/bounties/f4ab747b-e89a-4514-9432-ac1ea56639f3 +CVE-2022-1699 - https://huntr.dev/bounties/3024b2bb-50ca-46a2-85db-1cc916791cda +CVE-2022-1709 - https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc +CVE-2022-1710 - https://wpscan.com/vulnerability/ed162ccc-88e6-41e8-b24d-1b9f77a038b6 +CVE-2022-1711 - https://huntr.dev/bounties/c32afff5-6ad5-4d4d-beea-f55ab4925797 +CVE-2022-1712 - https://wpscan.com/vulnerability/9ab9626f-66d5-47e4-bdb8-d8fb519f9515 +CVE-2022-1713 - https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11 +CVE-2022-1714 - https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0 +CVE-2022-1715 - https://huntr.dev/bounties/58918962-ccb5-47f9-bb43-ffd8cae1ef24 +CVE-2022-1716 - https://fluidattacks.com/advisories/tyler/ +CVE-2022-1717 - https://wpscan.com/vulnerability/79a532e9-bc6e-4722-8d67-9c15720d06a6 +CVE-2022-1718 - https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e +CVE-2022-1719 - https://huntr.dev/bounties/790ba3fd-41e9-4393-8e2f-71161b56279b +CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-1720 - https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8 +CVE-2022-1721 - https://huntr.dev/bounties/000931cc-6d0e-4a4f-b4d8-4ba46ba0e699 +CVE-2022-1722 - https://huntr.dev/bounties/c903d563-ba97-44e9-b421-22bfab1e0cbd +CVE-2022-1723 - https://huntr.dev/bounties/619851a4-2a08-4196-80e9-ab41953491d8 +CVE-2022-1724 - https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae +CVE-2022-1725 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1725 - https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c +CVE-2022-1726 - https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea +CVE-2022-1727 - https://huntr.dev/bounties/b242e806-fc8c-41c0-aad7-e0c9c37ecdee +CVE-2022-1728 - https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519 +CVE-2022-1729 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 +CVE-2022-1730 - https://huntr.dev/bounties/fded4835-bd49-4533-8311-1d71e0ed7c00 +CVE-2022-1731 - https://www.tenable.com/security/research/tra-2022-17 +CVE-2022-1732 - https://wpscan.com/vulnerability/3620a087-032e-4a5f-99c8-f9e7e9c29813 +CVE-2022-1733 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1733 - https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a +CVE-2022-1734 - https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 +CVE-2022-1735 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1735 - https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9 +CVE-2022-1752 - https://huntr.dev/bounties/66e9bfa9-598f-49ab-a472-752911df3f2d +CVE-2022-1753 - https://vuldb.com/?id.199974 +CVE-2022-1753 - https://www.youtube.com/watch?v=tIzOZtp2fxA +CVE-2022-1753 - https://youtu.be/tIzOZtp2fxA +CVE-2022-1754 - https://huntr.dev/bounties/2f65af7c-a74b-46a6-8847-5db6785f1cf2 +CVE-2022-1755 - https://wpscan.com/vulnerability/62b2548e-6b59-48b8-b1c2-9bd47e634982 +CVE-2022-1756 - https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072 +CVE-2022-1757 - https://wpscan.com/vulnerability/e648633e-868b-45b2-870a-308a2f9cb7f5 +CVE-2022-1758 - https://wpscan.com/vulnerability/211816ce-d2bc-469b-9a8e-e0c2a5c4461b +CVE-2022-1759 - https://wpscan.com/vulnerability/d8e63f78-f38a-4f68-96ba-8059d175cea8 +CVE-2022-1760 - https://wpscan.com/vulnerability/c7906b1d-25c9-4f34-bd02-66824878b88e/ +CVE-2022-1761 - https://wpscan.com/vulnerability/31b413e1-d4b5-463e-9910-37876881c062 +CVE-2022-1762 - https://wpscan.com/vulnerability/03254977-37cc-4365-979b-326f9637be85 +CVE-2022-1763 - https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8 +CVE-2022-1764 - https://wpscan.com/vulnerability/04305e4e-37e3-4f35-bf66-3b79b99d2868 +CVE-2022-1765 - https://wpscan.com/vulnerability/b50e7622-c1dc-485b-a5f5-b010b40eef20 +CVE-2022-1767 - https://huntr.dev/bounties/b1ce040c-9ed1-4d36-9b48-82df42310868 +CVE-2022-1768 - http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html +CVE-2022-1768 - https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc +CVE-2022-1769 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1769 - https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c +CVE-2022-1770 - https://huntr.dev/bounties/74a252a2-8bf6-4f88-a180-b90338a239fa +CVE-2022-1771 - https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb +CVE-2022-1772 - https://wpscan.com/vulnerability/02addade-d191-4e45-b7b5-2f3f673679ab +CVE-2022-1773 - https://wpscan.com/vulnerability/c2cc3d8e-f3ac-46c6-871e-894cf3ba67f6 +CVE-2022-1774 - https://huntr.dev/bounties/6ac07c49-bb7f-47b5-b361-33e6757b8757 +CVE-2022-1775 - https://huntr.dev/bounties/0966043c-602f-463e-a6e5-9a1745f4fbfa +CVE-2022-1776 - https://wpscan.com/vulnerability/46ed56db-9b9d-4390-80fc-343a01fcc3c9 +CVE-2022-1777 - https://wpscan.com/vulnerability/a50dc7f8-a9e6-41fa-a047-ad1c3bc309b4 +CVE-2022-1779 - https://wpscan.com/vulnerability/45117646-88ff-41d4-8abd-e2f18d4b693e +CVE-2022-1780 - https://wpscan.com/vulnerability/dd22ea1e-49a9-4b06-8dd9-bb224110f98a +CVE-2022-1781 - https://wpscan.com/vulnerability/7f2ae2c9-57d4-46a0-a9a1-585ec543b153 +CVE-2022-1782 - https://huntr.dev/bounties/7555693f-94e4-4183-98cb-3497da6df028 +CVE-2022-1784 - https://huntr.dev/bounties/d1330ce8-cccb-4bae-b9a9-a03b97f444a5 +CVE-2022-1785 - https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109 +CVE-2022-1787 - https://wpscan.com/vulnerability/b85920b3-dfc1-4112-abd8-ce6a5d91ae0d +CVE-2022-1788 - https://wpscan.com/vulnerability/c39719e5-dadd-4414-a96d-5e70a1e3d462 +CVE-2022-1790 - https://wpscan.com/vulnerability/176d5761-4f01-4173-a70c-6052a6a9963e +CVE-2022-1791 - https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431 +CVE-2022-1792 - https://wpscan.com/vulnerability/44555c79-480d-4b6a-9fda-988183c06909 +CVE-2022-1793 - https://wpscan.com/vulnerability/fd8b84b4-6944-4638-bdc1-1cb6aaabd42c +CVE-2022-1795 - https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc +CVE-2022-1796 - https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e +CVE-2022-1800 - https://wpscan.com/vulnerability/4267109c-0ca2-441d-889d-fb39c235f128 +CVE-2022-1801 - https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06 +CVE-2022-1803 - https://huntr.dev/bounties/47cc6621-2474-40f9-ab68-3cf62389a124 +CVE-2022-1806 - https://huntr.dev/bounties/101a2a31-0b27-433a-ad3a-a216238ca4d1 +CVE-2022-1809 - https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17 +CVE-2022-1810 - https://huntr.dev/bounties/9b2d7579-032e-42da-b736-4b10a868eacb +CVE-2022-1811 - https://huntr.dev/bounties/4d97f665-c9f1-4c38-b774-692255a7c44c +CVE-2022-1812 - https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3 +CVE-2022-1813 - https://huntr.dev/bounties/b255cf59-9ecd-4255-b9a2-b40b5ec6c572 +CVE-2022-1814 - https://wpscan.com/vulnerability/b5624fb3-b110-4b36-a00f-20bbc3a8fdb9 +CVE-2022-1815 - https://huntr.dev/bounties/6e856a25-9117-47c6-9375-52f78876902f +CVE-2022-1816 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md +CVE-2022-1817 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md +CVE-2022-1817 - https://vuldb.com/?id.200559 +CVE-2022-1818 - https://wpscan.com/vulnerability/9d6c628f-cdea-481c-a2e5-101dc167718d +CVE-2022-1819 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Student%20Information%20System/SIS_Stored_Cross_Site_Scripting(XSS).md +CVE-2022-1825 - https://huntr.dev/bounties/c6ad4cef-1b3d-472f-af0e-68e46341dfe5 +CVE-2022-1826 - https://wpscan.com/vulnerability/b9dba241-d94c-4ce5-8730-445ba8005e66 +CVE-2022-1827 - https://wpscan.com/vulnerability/0bd25283-e079-4010-b139-cce9afb1d54d +CVE-2022-1828 - https://wpscan.com/vulnerability/877ce7a5-b1ff-4d03-9cd8-6beed5595af8 +CVE-2022-1829 - https://wpscan.com/vulnerability/8353aa12-dbb7-433f-9dd9-d61a3f303d4b +CVE-2022-1830 - https://wpscan.com/vulnerability/a6b3e927-41e2-4e48-b9e1-8c58a1b9a933 +CVE-2022-1831 - https://wpscan.com/vulnerability/91c44a4f-b599-46c0-a8df-d1fb87472abe +CVE-2022-1832 - https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275 +CVE-2022-1833 - https://bugzilla.redhat.com/show_bug.cgi?id=2089406#c4 +CVE-2022-1837 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md +CVE-2022-1837 - https://vuldb.com/?id.200582 +CVE-2022-1838 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_admin_SQL_Inject.md +CVE-2022-1838 - https://vuldb.com/?id.200583 +CVE-2022-1839 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_login_email_SQL_injection.md +CVE-2022-1839 - https://vuldb.com/?id.200584 +CVE-2022-1840 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/Home%20Clean%20Services%20Management%20System%20Stored%20Cross-Site%20Scripting(XSS).md +CVE-2022-1840 - https://vuldb.com/?id.200585 +CVE-2022-1842 - https://wpscan.com/vulnerability/77aafeb9-af80-490a-b3d7-4fa973bab61c +CVE-2022-1843 - https://wpscan.com/vulnerability/aa59f811-2375-4593-93d4-f587f9870ed1 +CVE-2022-1844 - https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d +CVE-2022-1845 - https://wpscan.com/vulnerability/6ee3e9e2-ff57-41c4-8cc5-b258801a8a02 +CVE-2022-1846 - https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a +CVE-2022-1847 - https://wpscan.com/vulnerability/d34ed713-4cca-4cef-b431-f132f1b10aa6 +CVE-2022-1848 - https://huntr.dev/bounties/8dfe0877-e44b-4a1a-8eee-5c03c93ae90a +CVE-2022-1849 - https://huntr.dev/bounties/881f8f36-d5c8-470d-8261-f109e6d5db4b +CVE-2022-1850 - https://huntr.dev/bounties/07755f07-a412-4911-84a4-2f8c03c8f7ce +CVE-2022-1851 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1851 - https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d +CVE-2022-1883 - https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7 +CVE-2022-1885 - https://wpscan.com/vulnerability/8416cbcf-086d-42ff-b2a4-f3954c8ff0c8 +CVE-2022-1886 - https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a +CVE-2022-1889 - https://wpscan.com/vulnerability/ee3832e2-ce40-4063-a23e-44c7f7f5f46a +CVE-2022-1893 - https://huntr.dev/bounties/a1cfe61b-5248-4a73-9a80-0b764edc9b26 +CVE-2022-1894 - https://wpscan.com/vulnerability/68af14ef-ca66-40d6-a1e5-09f74e2cd971 +CVE-2022-1895 - https://wpscan.com/vulnerability/bd9ef7e0-ebbb-4b91-8c58-265218a3c536 +CVE-2022-1896 - https://wpscan.com/vulnerability/3e8bd875-2435-4a15-8ee8-8a00882b499c +CVE-2022-1897 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1897 - https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118 +CVE-2022-1898 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1898 - https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea +CVE-2022-1899 - https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04 +CVE-2022-1903 - https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08 +CVE-2022-1904 - https://wpscan.com/vulnerability/92215d07-d129-49b4-a838-0de1a944c06b +CVE-2022-1905 - https://wpscan.com/vulnerability/ff5fd894-aff3-400a-8eec-fad9d50f788e +CVE-2022-1906 - https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338 +CVE-2022-1907 - https://huntr.dev/bounties/4eb0fa3e-4480-4fb5-8ec0-fbcd71de6012 +CVE-2022-1908 - https://huntr.dev/bounties/a7436e88-0488-4bd4-816f-2e2c803e93e8 +CVE-2022-1909 - https://huntr.dev/bounties/8f83eb8f-51a8-41c0-bc7d-077f48faebdc +CVE-2022-1910 - https://wpscan.com/vulnerability/8afe1638-66fa-44c7-9d02-c81573193b47 +CVE-2022-1913 - https://wpscan.com/vulnerability/2cafef43-e64a-4897-8c41-f0ed473d7ead +CVE-2022-1914 - https://wpscan.com/vulnerability/8c8dad47-8591-47dc-b84f-8c5cb18b2d78 +CVE-2022-1915 - https://wpscan.com/vulnerability/c3c28edf-19bc-4f3a-b58e-f1c67557aa29 +CVE-2022-1916 - https://wpscan.com/vulnerability/d16a0c3d-4318-4ecd-9e65-fc4165af8808 +CVE-2022-1921 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224 +CVE-2022-1922 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 +CVE-2022-1923 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 +CVE-2022-1924 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 +CVE-2022-1925 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 +CVE-2022-1926 - https://huntr.dev/bounties/3fda8902-68ee-4734-86a3-9551ab17c893 +CVE-2022-1927 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1927 - https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777 +CVE-2022-1928 - https://huntr.dev/bounties/6336ec42-5c4d-4f61-ae38-2bb539f433d2 +CVE-2022-1929 - https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/ +CVE-2022-1930 - https://research.jfrog.com/vulnerabilities/eth-account-redos-xray-248681/ +CVE-2022-1931 - https://huntr.dev/bounties/50c4cb63-65db-41c5-a16d-0560d7131fde +CVE-2022-1932 - https://wpscan.com/vulnerability/005c2300-f6bd-416e-97a6-d42284bbb093 +CVE-2022-1933 - https://wpscan.com/vulnerability/6cedb27f-6140-4cba-836f-63de98e521bf +CVE-2022-1934 - https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f +CVE-2022-1937 - https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9 +CVE-2022-1938 - https://wpscan.com/vulnerability/70aed824-c53e-4672-84c9-039dc34ed5fa +CVE-2022-1939 - https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f +CVE-2022-1940 - https://gitlab.com/gitlab-org/gitlab/-/issues/359142 +CVE-2022-1941 - http://www.openwall.com/lists/oss-security/2022/09/27/1 +CVE-2022-1941 - https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf +CVE-2022-1942 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1942 - https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071 +CVE-2022-1943 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1ad35dd0548ce947d97aaf92f7f2f9a202951cf +CVE-2022-1945 - https://wpscan.com/vulnerability/4ad297e5-c92d-403c-abf4-9decf7e8378b +CVE-2022-1946 - https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940 +CVE-2022-1947 - https://huntr.dev/bounties/cb4d0ab3-51ba-4a42-9e38-ac0e544266f1 +CVE-2022-1948 - https://gitlab.com/gitlab-org/security/gitlab/-/issues/673 +CVE-2022-1950 - https://wpscan.com/vulnerability/4352283f-dd43-4827-b417-0c55d0f4637d +CVE-2022-1951 - https://wpscan.com/vulnerability/f56f7244-e8ec-4a87-9419-643bc13b45a0 +CVE-2022-1952 - https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 +CVE-2022-1953 - https://wpscan.com/vulnerability/b66d6682-edbc-435f-a73a-dced32a32770 +CVE-2022-1955 - https://fluidattacks.com/advisories/tempest/ +CVE-2022-1955 - https://github.com/oxen-io/session-android/pull/897 +CVE-2022-1956 - https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a +CVE-2022-1957 - https://wpscan.com/vulnerability/ad3f6f3d-e12c-4867-906c-73aa001c7351 +CVE-2022-1958 - https://vuldb.com/?id.201960 +CVE-2022-1960 - https://wpscan.com/vulnerability/bc97dd57-e9f6-4bc3-a4c2-40303786ae4a +CVE-2022-1961 - https://gist.github.com/Xib3rR4dAr/02a21cd0ea0b7bf586131c5eebb69f1d +CVE-2022-1964 - https://wpscan.com/vulnerability/52cf7e3c-2a0c-45c4-be27-be87424f1338 +CVE-2022-1967 - https://wpscan.com/vulnerability/02d25736-c796-49bd-b774-66e0e3fcf4c9 +CVE-2022-1968 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-1968 - https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b +CVE-2022-1971 - https://wpscan.com/vulnerability/1bffbbef-7876-43a6-9cb0-6e09bb4ff2b0 +CVE-2022-1977 - https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d +CVE-2022-1979 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Message'%20Stored%20Cross-Site%20Scripting(XSS).md +CVE-2022-1979 - https://vuldb.com/?id.200950 +CVE-2022-1980 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Telephone'%20Stored%20Cross-Site%20Scripting(XSS).md +CVE-2022-1980 - https://vuldb.com/?id.200951 +CVE-2022-1982 - https://mattermost.com/security-updates/ +CVE-2022-1986 - https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930 +CVE-2022-1987 - https://huntr.dev/bounties/e8197737-7557-443e-a59f-2a86e8dda75f +CVE-2022-1988 - https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c +CVE-2022-1990 - https://wpscan.com/vulnerability/42f1bf1f-95a8-41ee-a637-88deb80ab870 +CVE-2022-1991 - https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 +CVE-2022-1991 - https://vuldb.com/?id.201276 +CVE-2022-1992 - https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab +CVE-2022-1993 - https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d +CVE-2022-1994 - https://wpscan.com/vulnerability/114d94be-b567-4b4b-9a44-f2c05cdbe18e +CVE-2022-1995 - https://wpscan.com/vulnerability/62fb399d-3327-45d0-b10f-769d2d164903 +CVE-2022-1996 - https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1 +CVE-2022-1997 - https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d +CVE-2022-1998 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d +CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-2000 - https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0 +CVE-2022-2014 - https://huntr.dev/bounties/911a4ada-7fd6-467a-a464-b88604b16ffc +CVE-2022-2015 - https://huntr.dev/bounties/0d32f448-155c-4b71-9291-9e8bcd522b37 +CVE-2022-2016 - https://huntr.dev/bounties/5fa17e9b-c767-46b4-af64-aafb8c2aa521 +CVE-2022-2017 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI)2.md +CVE-2022-2017 - https://vuldb.com/?id.201365 +CVE-2022-2018 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI).md +CVE-2022-2018 - https://vuldb.com/?id.201366 +CVE-2022-20186 - http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html +CVE-2022-2019 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System--.md +CVE-2022-2019 - https://vuldb.com/?id.201367 +CVE-2022-2020 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(XSS).md +CVE-2022-2020 - https://vuldb.com/?id.201368 +CVE-2022-2022 - https://huntr.dev/bounties/f6082949-40d3-411c-b613-23ada2691913 +CVE-2022-2023 - https://huntr.dev/bounties/0f35b1d3-56e6-49e4-bc5a-830f52e094b3 +CVE-2022-2024 - https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97 +CVE-2022-2026 - https://huntr.dev/bounties/dcfa6790-c609-4ed5-ba5e-8f31f98e5e11 +CVE-2022-2027 - https://huntr.dev/bounties/fb99c27c-7eaa-48db-be39-b804cb83871d +CVE-2022-2028 - https://huntr.dev/bounties/588fb241-bc8f-40fc-82a4-df249956d69f +CVE-2022-2029 - https://huntr.dev/bounties/9052a874-634c-473e-a2b3-65112181543f +CVE-2022-2034 - https://wpscan.com/vulnerability/aba3dd58-7a8e-4129-add5-4dd5972c0426 +CVE-2022-2035 - https://www.tenable.com/security/research/tra-2022-21 +CVE-2022-2036 - https://huntr.dev/bounties/c7715149-f99c-4d62-a5c6-c78bfdb41905 +CVE-2022-2037 - https://huntr.dev/bounties/4431ef84-93f2-4bc5-bc1a-97d7f229b28e +CVE-2022-2040 - https://wpscan.com/vulnerability/ab53a70c-57d5-400f-b11f-b1b7b2b0cf01 +CVE-2022-2041 - https://wpscan.com/vulnerability/8edb11bc-9e8d-4a98-8538-aaff0f072109 +CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-2042 - https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba +CVE-2022-2046 - https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 +CVE-2022-2050 - https://wpscan.com/vulnerability/016453e3-803b-4a67-8ea7-2d228c2998d4 +CVE-2022-2054 - https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7 +CVE-2022-2056 - https://gitlab.com/libtiff/libtiff/-/issues/415 +CVE-2022-2057 - https://gitlab.com/libtiff/libtiff/-/issues/427 +CVE-2022-2058 - https://gitlab.com/libtiff/libtiff/-/issues/428 +CVE-2022-2060 - https://huntr.dev/bounties/2acfc8fe-247c-4f88-aeaa-042b6b8690a0 +CVE-2022-2061 - https://huntr.dev/bounties/365ab61f-9a63-421c-97e6-21d4653021f0 +CVE-2022-20612 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-20613 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-20614 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-20615 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-2062 - https://huntr.dev/bounties/35593b4c-f127-4699-8ad3-f0b2203a8ef6 +CVE-2022-2063 - https://huntr.dev/bounties/156f405b-21d6-4384-9bff-17ebfe484e20 +CVE-2022-2064 - https://huntr.dev/bounties/39523d51-fc5c-48b8-a082-171da79761bb +CVE-2022-20659 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW +CVE-2022-2066 - https://huntr.dev/bounties/da4bbbfd-501f-4c7e-be83-47778103cb59 +CVE-2022-20660 - http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html +CVE-2022-20660 - http://seclists.org/fulldisclosure/2022/Jan/34 +CVE-2022-2067 - https://huntr.dev/bounties/a85a53a4-3009-4f41-ac33-8bed8bbe16a8 +CVE-2022-20699 - http://packetstormsecurity.com/files/167113/Cisco-RV340-SSL-VPN-Unauthenticated-Remote-Code-Execution.html +CVE-2022-20699 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20700 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20701 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20702 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20703 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20704 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20705 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html +CVE-2022-20705 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20706 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20707 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html +CVE-2022-20707 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20708 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20709 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-2071 - https://wpscan.com/vulnerability/d3653976-9e0a-4f2b-87f7-26b5e7a74b9d +CVE-2022-20710 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20711 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20712 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20713 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO +CVE-2022-20713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO +CVE-2022-20718 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc +CVE-2022-20719 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj +CVE-2022-2072 - https://wpscan.com/vulnerability/3014540c-21b3-481c-83a1-ce3017151af4 +CVE-2022-2073 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66 +CVE-2022-20738 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p +CVE-2022-20749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D +CVE-2022-20759 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24 +CVE-2022-20775 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc +CVE-2022-20777 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g +CVE-2022-20779 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492 +CVE-2022-2078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85 +CVE-2022-20780 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg +CVE-2022-2079 - https://huntr.dev/bounties/2615adf2-ff40-4623-97fb-2e4a3800202a +CVE-2022-20791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd +CVE-2022-20795 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV +CVE-2022-2080 - https://wpscan.com/vulnerability/5395d196-a39a-4a58-913e-5b5b9d6123a5 +CVE-2022-20816 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE +CVE-2022-20822 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM +CVE-2022-20822 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/ +CVE-2022-20828 - http://packetstormsecurity.com/files/168256/Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection.html +CVE-2022-20829 - https://github.com/jbaines-r7/theway +CVE-2022-2083 - https://wpscan.com/vulnerability/2bbfc855-6901-462f-8a93-120d7fb5d268 +CVE-2022-2085 - https://bugs.ghostscript.com/show_bug.cgi?id=704945 +CVE-2022-2086 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbanksql.md +CVE-2022-2086 - https://vuldb.com/?id.202034 +CVE-2022-2087 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbankxss.md +CVE-2022-2087 - https://vuldb.com/?id.202035 +CVE-2022-2089 - https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8 +CVE-2022-2090 - https://wpscan.com/vulnerability/0201f365-7acb-4640-bd3f-7119432f4917 +CVE-2022-2091 - https://wpscan.com/vulnerability/03e7c2dc-1c6d-4cff-af59-6b41ead74978 +CVE-2022-20917 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM +CVE-2022-2092 - https://wpscan.com/vulnerability/87546554-276a-45fe-b2aa-b18bfc55db2d +CVE-2022-20921 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs +CVE-2022-20929 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-4f6q-86ww-gmcr +CVE-2022-2093 - https://wpscan.com/vulnerability/a11628e4-f47b-42d8-9c09-7536d49fce4c +CVE-2022-2094 - https://wpscan.com/vulnerability/c9a106e1-29ae-47ad-907b-01086af3d3fb +CVE-2022-20956 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx +CVE-2022-20956 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx +CVE-2022-20956 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-broken-access-control/ +CVE-2022-20959 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M +CVE-2022-20959 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/ +CVE-2022-20964 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx +CVE-2022-20964 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ +CVE-2022-20965 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx +CVE-2022-20965 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ +CVE-2022-20966 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx +CVE-2022-20966 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ +CVE-2022-20967 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx +CVE-2022-20967 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ +CVE-2022-20968 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U +CVE-2022-20968 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U +CVE-2022-2098 - https://huntr.dev/bounties/a5d6c854-e158-49e9-bf40-bddc93dda7e6 +CVE-2022-2099 - https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b +CVE-2022-2100 - https://wpscan.com/vulnerability/7d8b7871-baa5-4a54-a9e9-2c9d302cdd12 +CVE-2022-2101 - https://medium.com/%40andreabocchetti88/download-manager-3-2-43-contributor-cross-site-scripting-fa4970fba45c +CVE-2022-2101 - https://packetstormsecurity.com/files/167573/ +CVE-2022-2111 - https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1 +CVE-2022-2112 - https://huntr.dev/bounties/e57c36e7-fa39-435f-944a-3a52ee066f73 +CVE-2022-21122 - https://snyk.io/vuln/SNYK-JS-METACALC-2826197 +CVE-2022-21129 - https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747 +CVE-2022-2113 - https://huntr.dev/bounties/4cae8442-c042-43c2-ad89-6f666eaf3d57 +CVE-2022-21134 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1447 +CVE-2022-2114 - https://wpscan.com/vulnerability/59911ba4-fa06-498a-9e7c-0c337cce691c +CVE-2022-21144 - https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756 +CVE-2022-21145 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442 +CVE-2022-21147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1452 +CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036 +CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035 +CVE-2022-2115 - https://wpscan.com/vulnerability/1f0ae535-c560-4510-ae9a-059e2435ad39 +CVE-2022-21154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1464 +CVE-2022-21159 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467 +CVE-2022-21159 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1467 +CVE-2022-2116 - https://wpscan.com/vulnerability/01568da4-2ecf-4cf9-8030-31868ce0a87a +CVE-2022-21164 - https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723 +CVE-2022-21165 - https://security.snyk.io/vuln/SNYK-JS-FONTCONVERTER-2976194 +CVE-2022-21169 - https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 +CVE-2022-21169 - https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 +CVE-2022-21178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1457 +CVE-2022-2118 - https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c +CVE-2022-21182 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1472 +CVE-2022-21184 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1461 +CVE-2022-21186 - https://security.snyk.io/vuln/SNYK-JS-ACRONTUMFILESYSTEMTEMPLATE-2419071 +CVE-2022-21187 - https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204 +CVE-2022-21189 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308 +CVE-2022-21189 - https://snyk.io/vuln/SNYK-JS-DEXIE-2607042 +CVE-2022-21190 - https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808 +CVE-2022-21190 - https://snyk.io/vuln/SNYK-JS-CONVICT-2774757 +CVE-2022-21191 - https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 +CVE-2022-21192 - https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0 +CVE-2022-21192 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916 +CVE-2022-21195 - https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643 +CVE-2022-21199 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1448 +CVE-2022-21201 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1456 +CVE-2022-21208 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 +CVE-2022-21210 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444 +CVE-2022-21211 - https://snyk.io/vuln/SNYK-JS-POSIX-2400719 +CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623 +CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622 +CVE-2022-21213 - https://snyk.io/vuln/SNYK-JS-MOUT-2342654 +CVE-2022-21217 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1445 +CVE-2022-2122 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225 +CVE-2022-21222 - https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488 +CVE-2022-21223 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280 +CVE-2022-21225 - http://packetstormsecurity.com/files/170180/Intel-Data-Center-Manager-4.1-SQL-Injection.html +CVE-2022-21225 - http://seclists.org/fulldisclosure/2022/Dec/1 +CVE-2022-21227 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470 +CVE-2022-21227 - https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645 +CVE-2022-2123 - https://wpscan.com/vulnerability/46b634f6-92bc-4e00-a4c0-c25135c61922 +CVE-2022-21231 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655 +CVE-2022-21234 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443 +CVE-2022-21235 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078 +CVE-2022-21236 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446 +CVE-2022-21238 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1469 +CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-2124 - https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42 +CVE-2022-21242 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21243 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21244 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21245 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21246 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21247 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21248 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21249 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-2125 - https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705 +CVE-2022-21250 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21251 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21252 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21253 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21254 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21255 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21256 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21257 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21258 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21259 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-2126 - https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e +CVE-2022-21260 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21261 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21262 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21263 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21264 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21265 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21266 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21267 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21268 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21269 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21270 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21271 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21271 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21272 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21273 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21274 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21275 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21276 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21277 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21278 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21279 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2128 - https://huntr.dev/bounties/ec40ec76-c7db-4384-a33b-024f3dd21d75 +CVE-2022-21280 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21281 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21282 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21283 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21284 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21285 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21286 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21287 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21288 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21289 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2129 - https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352 +CVE-2022-21290 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21291 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21292 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21293 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21294 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21295 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21296 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21297 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21298 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21299 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2130 - https://huntr.dev/bounties/0142970a-5cb8-4dba-8bbc-4fa2f3bee65c +CVE-2022-21300 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21301 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21302 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21303 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21304 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21305 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21306 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21307 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21308 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21309 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21310 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21311 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21312 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21313 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21314 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21315 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21316 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21317 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21318 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21319 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21320 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21321 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21322 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21323 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21324 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21325 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21326 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21327 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21328 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21329 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2133 - https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de +CVE-2022-21330 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21331 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21332 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21333 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21334 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21335 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21336 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21337 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21338 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21339 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-2134 - https://huntr.dev/bounties/57b0f272-a97f-4cb3-b546-c863c68a561a +CVE-2022-21340 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21341 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21342 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21344 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21345 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21346 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21347 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21348 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21349 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21350 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21351 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21352 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21353 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21354 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21355 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21356 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21357 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21358 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21359 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21360 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21361 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21362 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21363 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21364 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21365 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21366 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21367 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21368 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21369 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21370 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21371 - http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html +CVE-2022-21371 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21372 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21373 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21374 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21375 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21375 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21376 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21377 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21378 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21379 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21380 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21381 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21382 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21383 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea010070d0a7497253d5a6f919f6dd107450b31a +CVE-2022-21386 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21387 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21388 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21389 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21390 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21391 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21392 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21393 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21394 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21395 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21396 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21397 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21398 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21399 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21400 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21401 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21402 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21403 - https://www.oracle.com/security-alerts/cpujan2022.html +CVE-2022-21404 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21405 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21410 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21411 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21412 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21413 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21414 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21415 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21416 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21417 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21418 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21419 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21420 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21421 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21422 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21423 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21424 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21425 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21426 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21427 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21428 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21429 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2143 - http://packetstormsecurity.com/files/168108/Advantech-iView-NetworkServlet-Command-Injection.html +CVE-2022-21430 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21431 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21432 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21434 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21435 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21436 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21437 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21438 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21439 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2144 - https://wpscan.com/vulnerability/419054d4-95e8-4f4a-b864-a98b3e18435a +CVE-2022-21440 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21441 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21442 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21443 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21444 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21445 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21446 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21447 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21448 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21449 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21450 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21451 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21452 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21453 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21454 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21455 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21456 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21457 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21458 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21459 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-2146 - https://wpscan.com/vulnerability/adc1d752-331e-44af-b5dc-b463d56c2cb4 +CVE-2022-21460 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21461 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21462 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21463 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21464 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21465 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21466 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21467 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21468 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21469 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21470 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21471 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21472 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21473 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21474 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21475 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21476 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21477 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21478 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21479 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-2148 - https://wpscan.com/vulnerability/92214311-da6d-49a8-95c9-86f47635264f +CVE-2022-21480 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21481 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21482 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21483 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21484 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21485 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21486 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21487 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21488 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21489 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-2149 - https://wpscan.com/vulnerability/40191e87-8648-47ef-add0-d7180e8ffe13 +CVE-2022-21490 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21491 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21492 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21493 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21494 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21496 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21497 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21498 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21499 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html +CVE-2022-21500 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21508 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21509 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2151 - https://wpscan.com/vulnerability/7c08e4c1-57c5-471c-a990-dcb9fd7ce0f4 +CVE-2022-21510 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21511 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21512 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21513 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21514 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21515 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21516 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21517 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21518 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21519 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2152 - https://wpscan.com/vulnerability/e972e2c5-0d56-4d2a-81cc-2b0dff750124 +CVE-2022-21520 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21521 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21522 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21523 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21524 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21525 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21526 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21527 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21528 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21529 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2153 - https://www.openwall.com/lists/oss-security/2022/06/22/1 +CVE-2022-21530 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21531 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21532 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21533 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21534 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21535 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21536 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21537 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21538 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21539 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21540 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21541 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21542 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21543 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21544 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21545 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21547 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21548 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21549 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21550 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21551 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21552 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21553 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21554 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21555 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21556 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21557 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21558 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21559 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21560 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21561 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21562 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21563 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21564 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21565 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21566 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21567 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21568 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21569 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21570 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21571 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21572 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21573 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21574 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21575 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21576 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21577 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21578 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21579 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21580 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21581 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21582 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21583 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21584 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21585 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21586 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-21587 - http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html +CVE-2022-21587 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21589 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21590 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21591 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21592 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21593 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21594 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21595 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21596 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21597 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21598 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21599 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21600 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21601 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21602 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21603 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21604 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21605 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21606 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21607 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21608 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21609 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21610 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21611 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21612 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21613 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21614 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21615 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21616 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21617 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21618 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21619 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21620 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21621 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21622 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21623 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21624 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21625 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21626 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21627 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21628 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21629 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21630 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21631 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21632 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21633 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21634 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21635 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21636 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21637 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21638 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21639 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21640 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21641 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-21649 - https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/ +CVE-2022-21650 - https://www.huntr.dev/bounties/ae424798-de01-4972-b73b-2db674f82368/ +CVE-2022-21658 - https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946 +CVE-2022-2166 - https://huntr.dev/bounties/2f96f990-01c2-44ea-ae47-58bdb3aa455b +CVE-2022-21661 - http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html +CVE-2022-21661 - https://www.exploit-db.com/exploits/50663 +CVE-2022-2167 - https://wpscan.com/vulnerability/ad35fbae-1e90-47a0-b1d2-f8d91a5db90e +CVE-2022-21677 - https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27 +CVE-2022-2168 - https://wpscan.com/vulnerability/66789b32-049e-4440-8b19-658649851010 +CVE-2022-21680 - https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf +CVE-2022-21681 - https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj +CVE-2022-21689 - https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc +CVE-2022-2169 - https://wpscan.com/vulnerability/a9f4aab7-b42b-4bb6-b05d-05407f935230 +CVE-2022-21694 - https://github.com/onionshare/onionshare/issues/1389 +CVE-2022-21699 - https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x +CVE-2022-2170 - https://wpscan.com/vulnerability/6eaef938-ce98-4d57-8a1d-fa9d1ae3d6ed +CVE-2022-2171 - https://wpscan.com/vulnerability/11937296-7ecf-4b94-b274-06f7990dbede +CVE-2022-21711 - https://github.com/liyansong2018/elfspirit/issues/1 +CVE-2022-21716 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-2172 - https://wpscan.com/vulnerability/bfb6ed12-ae64-4075-9d0b-5620e998df74 +CVE-2022-21720 - https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83 +CVE-2022-21723 - http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html +CVE-2022-2173 - https://wpscan.com/vulnerability/86bfe0cc-a579-43d6-a26b-6e06000251f6 +CVE-2022-2174 - https://huntr.dev/bounties/ac68e3fc-8cf1-4a62-90ee-95c4b2bad607 +CVE-2022-2175 - https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55 +CVE-2022-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1451 +CVE-2022-21797 - https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033 +CVE-2022-2180 - https://wpscan.com/vulnerability/c330f92b-1e21-414f-b316-d5e97cb62bd1 +CVE-2022-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1450 +CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781 +CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960 +CVE-2022-21803 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2632450 +CVE-2022-21803 - https://snyk.io/vuln/SNYK-JS-NCONF-2395478 +CVE-2022-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1440 +CVE-2022-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1468 +CVE-2022-2181 - https://wpscan.com/vulnerability/68ddf343-6e69-44a7-bd33-72004053d41e +CVE-2022-21810 - https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 +CVE-2022-21817 - https://nvidia.custhelp.com/app/answers/detail/a_id/5318 +CVE-2022-2182 - https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8 +CVE-2022-21820 - http://packetstormsecurity.com/files/167396/NVIDIA-Data-Center-GPU-Manager-Remote-Memory-Corruption.html +CVE-2022-21824 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-21824 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2183 - https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975 +CVE-2022-2184 - https://wpscan.com/vulnerability/e777784f-5ba0-4966-be27-e0a0cbbfe056 +CVE-2022-2186 - https://wpscan.com/vulnerability/b766103a-7f91-4d91-9f9c-bff4bfd53f57 +CVE-2022-2187 - https://wpscan.com/vulnerability/4fd2f1ef-39c6-4425-8b4d-1a332dabac8d +CVE-2022-2188 - https://kcm.trellix.com/corporate/index?page=content&id=SB10383 +CVE-2022-21881 - http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html +CVE-2022-21882 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html +CVE-2022-2189 - https://wpscan.com/vulnerability/b6ed4d64-ee98-41bd-a97a-8350c2a8a546 +CVE-2022-2190 - https://wpscan.com/vulnerability/1af4beb6-ba16-429b-acf2-43f9594f5ace +CVE-2022-21907 - http://packetstormsecurity.com/files/165566/HTTP-Protocol-Stack-Denial-Of-Service-Remote-Code-Execution.html +CVE-2022-21907 - http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html +CVE-2022-21907 - https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907 +CVE-2022-2194 - https://wpscan.com/vulnerability/ecf4b707-dea9-42d0-9ade-d788a9f97190 +CVE-2022-21948 - https://bugzilla.suse.com/show_bug.cgi?id=1197930 +CVE-2022-21952 - https://bugzilla.suse.com/show_bug.cgi?id=1199512 +CVE-2022-2196 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 +CVE-2022-2198 - https://wpscan.com/vulnerability/867248f2-d497-4ea8-b3f8-0f2e8aaaa2bd +CVE-2022-21999 - http://packetstormsecurity.com/files/166344/Windows-SpoolFool-Privilege-Escalation.html +CVE-2022-22026 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html +CVE-2022-22031 - http://packetstormsecurity.com/files/168094/Windows-Credential-Guard-Domain-Joined-Device-Public-Key-Privilege-Escalation.html +CVE-2022-22049 - http://packetstormsecurity.com/files/168069/Windows-sxssrv-BaseSrvActivationContextCacheDuplicateUnicodeString-Heap-Buffer-Overflow.html +CVE-2022-22057 - http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html +CVE-2022-2206 - https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668 +CVE-2022-2207 - https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9 +CVE-2022-2208 - https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1 +CVE-2022-2210 - https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25 +CVE-2022-22107 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107 +CVE-2022-22108 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108 +CVE-2022-22109 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109 +CVE-2022-22110 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110 +CVE-2022-22111 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111 +CVE-2022-22112 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22112 +CVE-2022-22113 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22113 +CVE-2022-22114 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22114 +CVE-2022-22115 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22115 +CVE-2022-22116 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116 +CVE-2022-22117 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22117 +CVE-2022-2212 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/File_Upload/POC.md +CVE-2022-2212 - https://vuldb.com/?id.202758 +CVE-2022-22120 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22120 +CVE-2022-22121 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22121 +CVE-2022-22123 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123 +CVE-2022-22124 - https://github.com/halo-dev/halo/issues/1575 +CVE-2022-22124 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124 +CVE-2022-22125 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125 +CVE-2022-2213 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md +CVE-2022-2213 - https://vuldb.com/?id.202759 +CVE-2022-22137 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1449 +CVE-2022-22138 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367 +CVE-2022-2214 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Sql%20Injection/POC.md +CVE-2022-2214 - https://vuldb.com/?id.202760 +CVE-2022-22140 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1458 +CVE-2022-22143 - https://snyk.io/vuln/SNYK-JS-CONVICT-2340604 +CVE-2022-22144 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1459 +CVE-2022-22149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441 +CVE-2022-2215 - https://wpscan.com/vulnerability/daa9b6c1-1ee1-434c-9f88-fd273b7e20bb +CVE-2022-22150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439 +CVE-2022-2216 - https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1 +CVE-2022-2217 - https://huntr.dev/bounties/4e046c63-b1ca-4bcc-b418-29796918a71b +CVE-2022-2218 - https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5 +CVE-2022-2219 - https://wpscan.com/vulnerability/1240797c-7f45-4c36-83f0-501c544ce76a +CVE-2022-2222 - https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b +CVE-2022-22263 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22264 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22265 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22266 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22267 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22268 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22269 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22270 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22271 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22272 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 +CVE-2022-22291 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-22292 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-22293 - https://github.com/Dolibarr/dolibarr/issues/20237 +CVE-2022-2231 - https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5 +CVE-2022-22312 - https://www.ibm.com/support/pages/node/6574671 +CVE-2022-22323 - https://www.ibm.com/support/pages/node/6574671 +CVE-2022-2239 - https://wpscan.com/vulnerability/42127d96-547f-46cb-95d0-a19a8fe7580e +CVE-2022-2241 - https://wpscan.com/vulnerability/8670d196-972b-491b-8d9b-25994a345f57 +CVE-2022-2242 - https://www.kuka.com/advisories-CVE-2022-2242 +CVE-2022-2245 - https://wpscan.com/vulnerability/33705003-1f82-4b0c-9b4b-d4de75da309c +CVE-2022-2250 - https://gitlab.com/gitlab-org/gitlab/-/issues/355509 +CVE-2022-2251 - https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27386 +CVE-2022-2252 - https://huntr.dev/bounties/4d394bcc-a000-4f96-8cd2-8c565e1347e8 +CVE-2022-22521 - http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html +CVE-2022-22521 - http://seclists.org/fulldisclosure/2022/Apr/42 +CVE-2022-22528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22530 - https://launchpad.support.sap.com/#/notes/3112928 +CVE-2022-22531 - https://launchpad.support.sap.com/#/notes/3112928 +CVE-2022-22532 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22533 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22534 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22535 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22536 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22537 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22538 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22539 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22540 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22541 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22542 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22543 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22544 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22545 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22546 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-22547 - http://packetstormsecurity.com/files/167562/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Information-Disclosure.html +CVE-2022-2257 - https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89 +CVE-2022-2260 - https://wpscan.com/vulnerability/831b3afa-8fa3-4cb7-8374-36d0c368292f +CVE-2022-2261 - https://wpscan.com/vulnerability/f6091d7b-97b5-42f2-b2f4-09a0fe6d5a21 +CVE-2022-2262 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_all_room.php%20id%20SQL%20inject.md +CVE-2022-2262 - https://vuldb.com/?id.202981 +CVE-2022-2263 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_room_cat.php%20id%20SQL%20inject.md +CVE-2022-2263 - https://vuldb.com/?id.202982 +CVE-2022-2264 - https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c +CVE-2022-22666 - http://packetstormsecurity.com/files/167144/AppleVideoDecoder-CreateHeaderBuffer-Out-Of-Bounds-Free.html +CVE-2022-2267 - https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870 +CVE-2022-2268 - https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7 +CVE-2022-2269 - https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 +CVE-2022-22700 - https://fluidattacks.com/advisories/porter/ +CVE-2022-22701 - https://fluidattacks.com/advisories/hendrix/ +CVE-2022-22702 - https://fluidattacks.com/advisories/joplin/ +CVE-2022-2271 - https://wpscan.com/vulnerability/b064940f-9614-4b7b-b2c4-e79528746833 +CVE-2022-22719 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-22720 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-22720 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22721 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-22721 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2273 - https://wpscan.com/vulnerability/724729d9-1c4a-485c-9c90-a27664c47c84 +CVE-2022-22734 - https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251 +CVE-2022-22735 - https://wpscan.com/vulnerability/6940a97e-5a75-405c-be74-bedcc3a8ee00 +CVE-2022-22737 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745874 +CVE-2022-22739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1744158 +CVE-2022-22740 - https://bugzilla.mozilla.org/show_bug.cgi?id=1742334 +CVE-2022-22744 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737252 +CVE-2022-22748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1705211 +CVE-2022-2275 - https://wpscan.com/vulnerability/07757d1e-39ad-4199-bc7a-ecb821dfc996 +CVE-2022-22753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1732435 +CVE-2022-22753 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22754 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750565 +CVE-2022-22754 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22755 - https://bugzilla.mozilla.org/show_bug.cgi?id=1309630 +CVE-2022-22755 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22756 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317873 +CVE-2022-22756 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22757 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22758 - https://bugzilla.mozilla.org/show_bug.cgi?id=1728742 +CVE-2022-22758 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739957 +CVE-2022-22759 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-2276 - https://wpscan.com/vulnerability/92de9c1b-48dd-4a5f-bbb3-455f8f172b09 +CVE-2022-22760 - https://bugzilla.mozilla.org/show_bug.cgi?id=1740985 +CVE-2022-22760 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22761 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745566 +CVE-2022-22761 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22762 - https://bugzilla.mozilla.org/show_bug.cgi?id=1743931 +CVE-2022-22762 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-22764 - https://www.mozilla.org/security/advisories/mfsa2022-04/ +CVE-2022-2278 - https://wpscan.com/vulnerability/4481731d-4dbf-4bfa-b4cc-64f10bb7e7bf +CVE-2022-22787 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html +CVE-2022-2279 - https://huntr.dev/bounties/68c249e2-779d-4871-b7e3-851f03aca2de +CVE-2022-22805 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02 +CVE-2022-22806 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02 +CVE-2022-22819 - https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom +CVE-2022-22831 - http://packetstormsecurity.com/files/165863/Servisnet-Tessa-Authentication-Bypass.html +CVE-2022-22831 - https://www.exploit-db.com/exploits/50714 +CVE-2022-22831 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html +CVE-2022-22832 - http://packetstormsecurity.com/files/165873/Servisnet-Tessa-Privilege-Escalation.html +CVE-2022-22832 - https://www.exploit-db.com/exploits/50712 +CVE-2022-22832 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html +CVE-2022-22833 - http://packetstormsecurity.com/files/165867/Servisnet-Tessa-MQTT-Credential-Disclosure.html +CVE-2022-22833 - https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html +CVE-2022-22833 - https://www.exploit-db.com/exploits/50713 +CVE-2022-22834 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/ +CVE-2022-22835 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/ +CVE-2022-22836 - https://yoursecuritybores.me/coreftp-vulnerabilities/ +CVE-2022-2284 - https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874 +CVE-2022-22844 - https://gitlab.com/libtiff/libtiff/-/issues/355 +CVE-2022-2285 - https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736 +CVE-2022-22853 - https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System +CVE-2022-22853 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hprms_0.zip +CVE-2022-2286 - https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8 +CVE-2022-2287 - https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284 +CVE-2022-2288 - https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad +CVE-2022-2289 - https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64 +CVE-2022-22890 - https://github.com/jerryscript-project/jerryscript/issues/4847 +CVE-2022-22891 - https://github.com/jerryscript-project/jerryscript/issues/4871 +CVE-2022-22892 - https://github.com/jerryscript-project/jerryscript/issues/4872 +CVE-2022-22893 - https://github.com/jerryscript-project/jerryscript/issues/4901 +CVE-2022-22894 - https://github.com/jerryscript-project/jerryscript/issues/4890 +CVE-2022-22895 - https://github.com/jerryscript-project/jerryscript/issues/4882 +CVE-2022-22897 - http://packetstormsecurity.com/files/168148/PrestaShop-Ap-Pagebuilder-2.4.4-SQL-Injection.html +CVE-2022-22897 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/05/appagebuilder.html +CVE-2022-22899 - https://yoursecuritybores.me/coreftp-vulnerabilities/ +CVE-2022-2290 - https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf +CVE-2022-22901 - https://github.com/jerryscript-project/jerryscript/issues/4916 +CVE-2022-22909 - https://github.com/0z09e/CVE-2022-22909 +CVE-2022-2291 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Refelected)/POC.md +CVE-2022-2291 - https://vuldb.com/?id.203165 +CVE-2022-22916 - https://github.com/wendell1224/O2OA-POC/blob/main/POC.md +CVE-2022-2292 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Stored)/POC.md +CVE-2022-22922 - https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md +CVE-2022-2293 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Simple%20Sales%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md +CVE-2022-22934 - https://github.com/saltstack/salt/releases, +CVE-2022-22935 - https://github.com/saltstack/salt/releases, +CVE-2022-22936 - https://github.com/saltstack/salt/releases, +CVE-2022-22941 - https://github.com/saltstack/salt/releases, +CVE-2022-22946 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22947 - http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html +CVE-2022-22947 - http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html +CVE-2022-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-22947 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22954 - http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html +CVE-2022-22956 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html +CVE-2022-22956 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html +CVE-2022-22957 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html +CVE-2022-22957 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html +CVE-2022-22960 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html +CVE-2022-22960 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html +CVE-2022-22960 - http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html +CVE-2022-22963 - http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html +CVE-2022-22963 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH +CVE-2022-22963 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-22963 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22965 - http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html +CVE-2022-22965 - http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html +CVE-2022-22965 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-22965 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22968 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22969 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2297 - https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/CVE/Clinic's%20Patient%20Management%20System/Unrestricted%20file%20upload%20(RCE)/POC.md +CVE-2022-22970 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22971 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22976 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-22978 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2298 - https://github.com/CyberThoth/CVE/blob/63e283e7d7dad3783237f15cdae2bb649bc1e198/CVE/Clinic's%20Patient%20Management%20System/SQLi/POC.md +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625 +CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680 +CVE-2022-22988 - https://www.westerndigital.com/support/product-security/wdc-22003-edgerover-desktop-app-version-1-5-0-576 +CVE-2022-22989 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 +CVE-2022-2299 - https://wpscan.com/vulnerability/29015c35-0470-41b8-b197-c71b800ae2a9 +CVE-2022-22990 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 +CVE-2022-22991 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 +CVE-2022-22992 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 +CVE-2022-22993 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 +CVE-2022-22994 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117 +CVE-2022-22995 - https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities +CVE-2022-22996 - https://www.westerndigital.com/support/product-security/wdc-22007-sandisk-professional-g-raid-4-8-software-utility-setup-for-windows-privilege-escalation +CVE-2022-22997 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107 +CVE-2022-22998 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107 +CVE-2022-22999 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114 +CVE-2022-2300 - https://huntr.dev/bounties/882d6cf9-64f5-4614-a873-a3030473c817 +CVE-2022-23000 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114 +CVE-2022-23001 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities +CVE-2022-23002 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities +CVE-2022-23003 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities +CVE-2022-23004 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities +CVE-2022-23005 - https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf +CVE-2022-23005 - https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature +CVE-2022-2301 - https://huntr.dev/bounties/f6b9114b-671d-4948-b946-ffe5c9aeb816 +CVE-2022-2304 - https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a +CVE-2022-23043 - https://fluidattacks.com/advisories/simone/ +CVE-2022-23045 - https://fluidattacks.com/advisories/osbourne/ +CVE-2022-23046 - http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.html +CVE-2022-23046 - https://fluidattacks.com/advisories/mercury/ +CVE-2022-23047 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459 +CVE-2022-23047 - https://fluidattacks.com/advisories/franklin/ +CVE-2022-23048 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460 +CVE-2022-23048 - https://fluidattacks.com/advisories/dylan/ +CVE-2022-23049 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461 +CVE-2022-23049 - https://fluidattacks.com/advisories/cobain/ +CVE-2022-2305 - https://wpscan.com/vulnerability/ea0180cd-e018-43ea-88b9-fa8e71bf34bf +CVE-2022-23050 - https://fluidattacks.com/advisories/cerati/ +CVE-2022-23051 - https://fluidattacks.com/advisories/brown/ +CVE-2022-23052 - https://fluidattacks.com/advisories/jett/ +CVE-2022-23055 - https://www.mend.io/vulnerability-database/CVE-2022-23055 +CVE-2022-23056 - https://www.mend.io/vulnerability-database/CVE-2022-23056 +CVE-2022-23057 - https://www.mend.io/vulnerability-database/CVE-2022-23057 +CVE-2022-23058 - https://www.mend.io/vulnerability-database/CVE-2022-23058 +CVE-2022-23059 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059 +CVE-2022-2306 - https://huntr.dev/bounties/35acf263-6db4-4310-ab27-4c3c3a53f796 +CVE-2022-23060 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23060 +CVE-2022-23061 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23061 +CVE-2022-23063 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23063 +CVE-2022-23064 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064 +CVE-2022-23065 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065 +CVE-2022-23066 - https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a701870e1324 +CVE-2022-23066 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23066 +CVE-2022-23067 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23067 +CVE-2022-23068 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23068 +CVE-2022-23071 - https://www.mend.io/vulnerability-database/CVE-2022-23071 +CVE-2022-23072 - https://www.mend.io/vulnerability-database/CVE-2022-23072 +CVE-2022-23073 - https://www.mend.io/vulnerability-database/CVE-2022-23073 +CVE-2022-23074 - https://www.mend.io/vulnerability-database/CVE-2022-23074 +CVE-2022-23077 - https://www.mend.io/vulnerability-database/CVE-2022-23077 +CVE-2022-23078 - https://www.mend.io/vulnerability-database/CVE-2022-23078 +CVE-2022-23079 - https://www.mend.io/vulnerability-database/CVE-2022-23079 +CVE-2022-23080 - https://www.mend.io/vulnerability-database/CVE-2022-23080 +CVE-2022-23081 - https://www.mend.io/vulnerability-database/CVE-2022-23081 +CVE-2022-23082 - https://www.mend.io/vulnerability-database/CVE-2022-23082 +CVE-2022-2309 - https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba +CVE-2022-23099 - https://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2022-2310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10384&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US +CVE-2022-23100 - https://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2022-23101 - https://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2022-23102 - http://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html +CVE-2022-23102 - http://seclists.org/fulldisclosure/2022/Feb/20 +CVE-2022-23103 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1462 +CVE-2022-2311 - https://wpscan.com/vulnerability/287a14dc-d1fc-481d-84af-7eb172dc68c9 +CVE-2022-23119 - https://success.trendmicro.com/solution/000290104 +CVE-2022-23119 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt +CVE-2022-2312 - https://wpscan.com/vulnerability/7548c1fb-77b5-4290-a297-35820edfe0f8 +CVE-2022-23120 - https://success.trendmicro.com/solution/000290104 +CVE-2022-23120 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt +CVE-2022-2313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US +CVE-2022-2314 - https://wpscan.com/vulnerability/b22fe77c-844e-4c24-8023-014441cc1e82 +CVE-2022-2317 - https://wpscan.com/vulnerability/77b7ca19-294c-4480-8f57-6fddfc67fffb +CVE-2022-23178 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-009 +CVE-2022-23179 - https://wpscan.com/vulnerability/90b8af99-e4a1-4076-99fa-efe805dd4be4/ +CVE-2022-2318 - https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6 +CVE-2022-23180 - https://wpscan.com/vulnerability/da87358a-3a72-4cf7-a2af-a266dd9b4290/ +CVE-2022-23181 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23181 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2321 - https://huntr.dev/bounties/3055b3f5-6b80-4d47-8e00-3500dfb458bc +CVE-2022-23218 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23219 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23221 - http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html +CVE-2022-23221 - http://seclists.org/fulldisclosure/2022/Jan/39 +CVE-2022-23221 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23221 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23227 - https://github.com/pedrib/PoC/blob/master/advisories/NUUO/nuuo_nvrmini_round2.mkd +CVE-2022-23227 - https://github.com/rapid7/metasploit-framework/pull/16044 +CVE-2022-23227 - https://portswigger.net/daily-swig/researcher-discloses-alleged-zero-day-vulnerabilities-in-nuuo-nvrmini2-recording-device +CVE-2022-2325 - https://wpscan.com/vulnerability/c8dcd7a7-5ad4-452c-a6a5-2362986656e4 +CVE-2022-2326 - https://gitlab.com/gitlab-org/gitlab/-/issues/356665 +CVE-2022-23277 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html +CVE-2022-2328 - https://wpscan.com/vulnerability/dbac391b-fc48-4e5e-b63a-2b3ddb0d5552 +CVE-2022-2330 - https://kcm.trellix.com/corporate/index?page=content&id=SB10386 +CVE-2022-23302 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23302 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23305 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23305 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23307 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23307 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23308 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23316 - https://github.com/taogogo/taocms/issues/15 +CVE-2022-23320 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/ +CVE-2022-23321 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/ +CVE-2022-23332 - https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332 +CVE-2022-23334 - https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf +CVE-2022-23340 - https://github.com/laurent22/joplin/issues/6004 +CVE-2022-23342 - https://github.com/InitRoot/CVE-2022-23342 +CVE-2022-23345 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23345 +CVE-2022-23346 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23346 +CVE-2022-23347 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347 +CVE-2022-23348 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23348 +CVE-2022-23349 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23349 +CVE-2022-23350 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23350 +CVE-2022-23352 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352 +CVE-2022-23366 - http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html +CVE-2022-23366 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366 +CVE-2022-23367 - https://gist.github.com/bincat99/311aff295c270371dc8ee89599b016f1 +CVE-2022-23377 - https://www.exploit-db.com/exploits/50665 +CVE-2022-23378 - https://github.com/TheGetch/CVE-2022-23378 +CVE-2022-2339 - https://huntr.dev/bounties/fff06de8-2a82-49b1-8e81-968731e87eef +CVE-2022-23390 - https://github.com/diyhi/bbs/issues/51 +CVE-2022-23399 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1454 +CVE-2022-2340 - https://packetstormsecurity.com/files/167595/ +CVE-2022-2340 - https://wpscan.com/vulnerability/306ea895-0b90-4276-bb97-eecb34f9bfae +CVE-2022-23400 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1465 +CVE-2022-23409 - http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html +CVE-2022-23409 - https://sec-consult.com/vulnerability-lab/ +CVE-2022-2341 - https://packetstormsecurity.com/files/167597/ +CVE-2022-2341 - https://wpscan.com/vulnerability/4a98a024-1f84-482f-9dc9-4714ac42c094 +CVE-2022-2342 - https://huntr.dev/bounties/b2caceaa-5b28-40ba-9980-70144159efba +CVE-2022-23425 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-2343 - https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5 +CVE-2022-23431 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23432 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23437 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23437 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2344 - https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996 +CVE-2022-2345 - https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f +CVE-2022-23457 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23458 - https://securitylab.github.com/advisories/GHSL-2022-029_nhn_tui_grid/ +CVE-2022-23459 - https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx +CVE-2022-23461 - https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/ +CVE-2022-23463 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/ +CVE-2022-23464 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/ +CVE-2022-23474 - https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/ +CVE-2022-2350 - https://wpscan.com/vulnerability/de28543b-c110-4a9f-bfe9-febccfba3a96 +CVE-2022-23507 - https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5 +CVE-2022-2351 - https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87 +CVE-2022-23512 - https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27 +CVE-2022-23513 - http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html +CVE-2022-23513 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497 +CVE-2022-2352 - https://wpscan.com/vulnerability/dc99ac40-646a-4f8e-b2b9-dc55d6d4c55c +CVE-2022-23520 - https://hackerone.com/reports/1654310 +CVE-2022-23522 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp +CVE-2022-23529 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 +CVE-2022-2353 - https://huntr.dev/bounties/7782c095-9e8c-48b0-a7f5-3a8f52e8af52 +CVE-2022-23530 - https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v +CVE-2022-23539 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 +CVE-2022-2354 - https://wpscan.com/vulnerability/1c8c5861-ce87-4813-9e26-470d63c1903a +CVE-2022-23540 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 +CVE-2022-23541 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 +CVE-2022-23544 - https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj +CVE-2022-2355 - https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826 +CVE-2022-23553 - https://securitylab.github.com/advisories/GHSL-2021-1009-Alpine/ +CVE-2022-23555 - https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h +CVE-2022-2356 - https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43 +CVE-2022-2357 - https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553 +CVE-2022-23596 - https://github.com/junrar/junrar/issues/73 +CVE-2022-23608 - http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html +CVE-2022-2361 - https://wpscan.com/vulnerability/aa69377d-ba9e-4a2f-921c-be2ab5edcb4e +CVE-2022-2362 - https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653 +CVE-2022-23626 - http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html +CVE-2022-2363 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Refelected)/POC.md +CVE-2022-23632 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2364 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md +CVE-2022-23642 - http://packetstormsecurity.com/files/167506/Sourcegraph-Gitserver-3.36.3-Remote-Code-Execution.html +CVE-2022-23642 - http://packetstormsecurity.com/files/167741/Sourcegraph-gitserver-sshCommand-Remote-Command-Execution.html +CVE-2022-23648 - http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html +CVE-2022-2366 - https://mattermost.com/security-updates/ +CVE-2022-2367 - https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f +CVE-2022-2368 - https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452 +CVE-2022-2369 - https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d +CVE-2022-2370 - https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334 +CVE-2022-2371 - https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7 +CVE-2022-23712 - https://www.elastic.co/community/security/ +CVE-2022-23713 - https://www.elastic.co/community/security +CVE-2022-23714 - https://www.elastic.co/community/security +CVE-2022-23715 - https://www.elastic.co/community/security +CVE-2022-23716 - https://www.elastic.co/community/security/ +CVE-2022-2372 - https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45 +CVE-2022-2373 - https://wpscan.com/vulnerability/6aa9aa0d-b447-4584-a07e-b8a0d1b83a31 +CVE-2022-2374 - https://wpscan.com/vulnerability/12062d78-7a0d-4dc1-9bd6-6c54aa6bc761 +CVE-2022-2375 - https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81 +CVE-2022-2376 - https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad +CVE-2022-2377 - https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530 +CVE-2022-23772 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23773 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-23774 - https://docs.docker.com/docker-for-windows/release-notes/ +CVE-2022-2378 - https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596 +CVE-2022-2379 - https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6 +CVE-2022-23793 - http://packetstormsecurity.com/files/166546/Joomla-4.1.0-Zip-Slip-File-Overwrite-Path-Traversal.html +CVE-2022-23803 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ +CVE-2022-23803 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453 +CVE-2022-23804 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ +CVE-2022-23804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453 +CVE-2022-23806 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2381 - https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f +CVE-2022-2382 - https://wpscan.com/vulnerability/777d4637-444b-4eda-bc21-95d3a3bf6cd3 +CVE-2022-2383 - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531 +CVE-2022-2384 - https://wpscan.com/vulnerability/0917b964-f347-487e-b8d7-c4f09c290fe5 +CVE-2022-23850 - https://github.com/kevinboone/epub2txt2/issues/17 +CVE-2022-23852 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23854 - https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal +CVE-2022-2386 - https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886 +CVE-2022-23865 - https://www.exploit-db.com/exploits/50674 +CVE-2022-2387 - https://wpscan.com/vulnerability/db3c3c78-1724-4791-9ab6-ebb2e8a4c8b8 +CVE-2022-23878 - https://blog.csdn.net/miuzzx/article/details/122249953 +CVE-2022-2388 - https://wpscan.com/vulnerability/50acd35f-eb31-4aba-bf32-b390e9514beb +CVE-2022-23881 - https://github.com/metaStor/Vuls/blob/main/zzzcms/zzzphp%20V2.1.0%20RCE/zzzphp%20V2.1.0%20RCE.md +CVE-2022-23882 - https://github.com/yeyinshi/tuzicms/issues/10 +CVE-2022-23887 - https://github.com/yzmcms/yzmcms/issues/59 +CVE-2022-23888 - https://github.com/yzmcms/yzmcms/issues/60 +CVE-2022-2389 - https://wpscan.com/vulnerability/e70f00b7-6251-476e-9297-60af509e6ad9 +CVE-2022-23896 - https://huntr.dev/bounties/79c2d16c-bae2-417f-ab50-10c52707a30f/ +CVE-2022-23900 - https://stigward.medium.com/wavlink-command-injection-cve-2022-23900-51988f6f15df +CVE-2022-23907 - http://dev.cmsmadesimple.org/bug/view/12503 +CVE-2022-23909 - http://packetstormsecurity.com/files/166574/Sherpa-Connector-Service-2020.2.20328.2050-Unquoted-Service-Path.html +CVE-2022-2391 - https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3 +CVE-2022-23911 - https://wpscan.com/vulnerability/77fd6749-4fb2-48fa-a191-437b442f28e9 +CVE-2022-23912 - https://wpscan.com/vulnerability/09512431-aa33-4514-8b20-1963c5d89f33 +CVE-2022-23915 - https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088 +CVE-2022-23918 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455 +CVE-2022-23919 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455 +CVE-2022-2392 - https://wpscan.com/vulnerability/5001ed18-858e-4c9d-9d7b-a1305fcdf61b +CVE-2022-23923 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254 +CVE-2022-23923 - https://snyk.io/vuln/SNYK-JS-JAILED-2391490 +CVE-2022-23935 - https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429 +CVE-2022-23940 - https://github.com/manuelz120 +CVE-2022-23943 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23946 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ +CVE-2022-23946 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460 +CVE-2022-23947 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/ +CVE-2022-23947 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460 +CVE-2022-2395 - https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b +CVE-2022-2396 - https://github.com/CyberThoth/CVE/blob/83c243538386cd0761025f85eb747eab7cae5c21/CVE/Simple%20e-Learning%20System/Cross%20Site%20Scripting(Stored)/POC.md +CVE-2022-2396 - https://vuldb.com/?id.203779 +CVE-2022-23967 - https://github.com/MaherAzzouzi/CVE-2022-23967 +CVE-2022-23968 - https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/ +CVE-2022-2398 - https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672 +CVE-2022-23987 - https://wpscan.com/vulnerability/1697351b-c201-4e85-891e-94fdccbdfb55 +CVE-2022-23988 - https://wpscan.com/vulnerability/9d5738f9-9a2e-4878-8a03-745894420bf6 +CVE-2022-23990 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-23994 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23995 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23996 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23997 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-23999 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-2400 - https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a +CVE-2022-24000 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2 +CVE-2022-24004 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/ +CVE-2022-24005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-2401 - https://mattermost.com/security-updates/ +CVE-2022-24010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-24029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 +CVE-2022-2404 - https://wpscan.com/vulnerability/0d889dde-b9d5-46cf-87d3-4f8a85cf9b98 +CVE-2022-2405 - https://wpscan.com/vulnerability/50037028-2790-47ee-aae1-faf0724eb917 +CVE-2022-2406 - https://mattermost.com/security-updates/ +CVE-2022-24065 - https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281 +CVE-2022-24066 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820 +CVE-2022-24066 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306 +CVE-2022-2407 - https://wpscan.com/vulnerability/5be611e8-5b7a-4579-9757-45a4c94a53ca +CVE-2022-2408 - https://mattermost.com/security-updates/ +CVE-2022-24082 - http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html +CVE-2022-2409 - https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea +CVE-2022-2410 - https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18 +CVE-2022-24108 - http://packetstormsecurity.com/files/167197/OpenCart-So-Listing-Tabs-2.2.0-Unsafe-Deserialization.html +CVE-2022-2411 - https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294 +CVE-2022-24112 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html +CVE-2022-24112 - http://packetstormsecurity.com/files/166328/Apache-APISIX-2.12.1-Remote-Code-Execution.html +CVE-2022-2412 - https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6 +CVE-2022-24121 - https://www.coresecurity.com/core-labs/advisories/unified-office-total-connect-sql-injection +CVE-2022-24124 - http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html +CVE-2022-24124 - https://github.com/casdoor/casdoor/issues/439 +CVE-2022-24124 - https://github.com/casdoor/casdoor/pull/442 +CVE-2022-24125 - https://github.com/tremwil/ds3-nrssr-rce +CVE-2022-24126 - https://github.com/tremwil/ds3-nrssr-rce +CVE-2022-24127 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/ +CVE-2022-24129 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF +CVE-2022-2413 - https://wpscan.com/vulnerability/2e38b1bb-4410-45e3-87ca-d47a2cce9e22/ +CVE-2022-24138 - https://github.com/tomerpeled92/CVE/ +CVE-2022-24139 - https://github.com/tomerpeled92/CVE/ +CVE-2022-24140 - https://github.com/tomerpeled92/CVE/ +CVE-2022-24141 - https://github.com/tomerpeled92/CVE/ +CVE-2022-2415 - http://packetstormsecurity.com/files/167972/Chrome-WebGL-Uniform-Integer-Overflows.html +CVE-2022-2417 - https://gitlab.com/gitlab-org/gitlab/-/issues/361179 +CVE-2022-2418 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20img_upload.php%20File%20upload%20vulnerability.md +CVE-2022-24187 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html +CVE-2022-24188 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html +CVE-2022-24189 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html +CVE-2022-2419 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20upload.php%20File%20upload%20vulnerability.md +CVE-2022-24190 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html +CVE-2022-24191 - https://github.com/michaelrsweet/htmldoc/issues/470 +CVE-2022-24196 - https://github.com/itext/itext7/pull/78 +CVE-2022-24196 - https://github.com/itext/itext7/pull/78#issuecomment-1089279222 +CVE-2022-24197 - https://github.com/itext/itext7/pull/78 +CVE-2022-24197 - https://github.com/itext/itext7/pull/78#issuecomment-1089282165 +CVE-2022-24198 - https://github.com/itext/itext7/pull/78 +CVE-2022-24198 - https://github.com/itext/itext7/pull/78#issuecomment-1089287808 +CVE-2022-2420 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20uploader.php%20%20File%20upload%20vulnerability.md +CVE-2022-24223 - http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html +CVE-2022-2423 - https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2 +CVE-2022-24231 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Student-Information +CVE-2022-2424 - https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909 +CVE-2022-24247 - https://cxsecurity.com/issue/WLB-2022010019 +CVE-2022-24247 - https://www.exploit-db.com/exploits/50614 +CVE-2022-24248 - https://en.0day.today/exploit/description/37177 +CVE-2022-24248 - https://www.exploit-db.com/exploits/50615 +CVE-2022-24249 - https://github.com/gpac/gpac/issues/2081 +CVE-2022-2425 - https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d +CVE-2022-24251 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ +CVE-2022-24252 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ +CVE-2022-24253 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ +CVE-2022-24254 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ +CVE-2022-24255 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/ +CVE-2022-2426 - https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422 +CVE-2022-24263 - http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html +CVE-2022-24263 - https://github.com/kishan0725/Hospital-Management-System/issues/17 +CVE-2022-24263 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263 +CVE-2022-24264 - https://github.com/CuppaCMS/CuppaCMS/issues/13 +CVE-2022-24265 - https://github.com/CuppaCMS/CuppaCMS/issues/14 +CVE-2022-24266 - https://github.com/CuppaCMS/CuppaCMS/issues/17 +CVE-2022-24278 - https://github.com/neocotic/convert-svg/issues/86 +CVE-2022-24278 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830 +CVE-2022-24279 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572 +CVE-2022-24298 - https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720 +CVE-2022-24302 - https://www.paramiko.org/changelog.html +CVE-2022-2431 - https://packetstormsecurity.com/files/167920/wpdownloadmanager3250-filedelete.txt +CVE-2022-24329 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-24329 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24356 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24357 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24358 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24359 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24360 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24361 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24362 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24363 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24364 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24365 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24366 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24367 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24368 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24369 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24370 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24372 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-046.txt +CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382 +CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa +CVE-2022-24373 - https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEREANIMATED-2949507 +CVE-2022-24375 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725 +CVE-2022-24376 - https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310 +CVE-2022-24377 - https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955 +CVE-2022-24381 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988735 +CVE-2022-24396 - http://packetstormsecurity.com/files/167560/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Missing-Authentication.html +CVE-2022-24396 - http://seclists.org/fulldisclosure/2022/Jun/38 +CVE-2022-24399 - http://packetstormsecurity.com/files/167559/SAP-FRUN-2.00-3.00-Cross-Site-Scripting.html +CVE-2022-24399 - http://seclists.org/fulldisclosure/2022/Jun/37 +CVE-2022-24400 - https://tetraburst.com/ +CVE-2022-24401 - https://tetraburst.com/ +CVE-2022-24402 - https://tetraburst.com/ +CVE-2022-24403 - https://tetraburst.com/ +CVE-2022-24404 - https://tetraburst.com/ +CVE-2022-24405 - https://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2022-24406 - https://seclists.org/fulldisclosure/2022/Jul/11 +CVE-2022-24407 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2441 - https://www.exploit-db.com/exploits/51025 +CVE-2022-24428 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities +CVE-2022-24429 - https://github.com/neocotic/convert-svg/issues/84 +CVE-2022-24429 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212 +CVE-2022-24431 - https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950 +CVE-2022-24433 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245 +CVE-2022-24433 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199 +CVE-2022-24434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865 +CVE-2022-24434 - https://snyk.io/vuln/SNYK-JS-DICER-2311764 +CVE-2022-24437 - https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b +CVE-2022-24437 - https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307 +CVE-2022-24439 - https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858 +CVE-2022-24440 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278 +CVE-2022-24448 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 +CVE-2022-24448 - https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/ +CVE-2022-24449 - https://github.com/jet-pentest/CVE-2022-24449 +CVE-2022-2448 - https://wpscan.com/vulnerability/a4599942-2878-4da4-b55d-077775323b61 +CVE-2022-2449 - https://wpscan.com/vulnerability/6e42f26b-3403-4d55-99ad-2c8e2d76e537 +CVE-2022-2450 - https://wpscan.com/vulnerability/1b3ff124-f973-4584-a7d7-26cc404bfe2b +CVE-2022-2453 - https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a +CVE-2022-2454 - https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f +CVE-2022-24545 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html +CVE-2022-24562 - http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html +CVE-2022-24562 - https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d +CVE-2022-24571 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24571 +CVE-2022-24574 - https://huntr.dev/bounties/a08437cc-25aa-4116-8069-816f78a2247c/ +CVE-2022-24575 - https://github.com/gpac/gpac/issues/2058 +CVE-2022-24575 - https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/ +CVE-2022-24576 - https://github.com/gpac/gpac/issues/2061 +CVE-2022-24576 - https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/ +CVE-2022-24577 - https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/ +CVE-2022-24578 - https://huntr.dev/bounties/1691cca3-ab54-4259-856b-751be2395b11/ +CVE-2022-24582 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Accounting-Journal-Management +CVE-2022-24594 - https://github.com/walinejs/waline/issues/785 +CVE-2022-24595 - https://youtu.be/E-ZTuWSg-JU +CVE-2022-24599 - https://github.com/mpruett/audiofile/issues/60 +CVE-2022-2460 - https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db +CVE-2022-2461 - https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt +CVE-2022-2461 - https://www.exploitalert.com/view-details.html?id=38891 +CVE-2022-24613 - https://github.com/drewnoakes/metadata-extractor/issues/561 +CVE-2022-24614 - https://github.com/drewnoakes/metadata-extractor/issues/561 +CVE-2022-2462 - https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt +CVE-2022-24620 - https://github.com/Piwigo/Piwigo/issues/1605 +CVE-2022-24637 - http://packetstormsecurity.com/files/169811/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html +CVE-2022-24637 - http://packetstormsecurity.com/files/171389/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html +CVE-2022-24644 - https://github.com/gerr-re/cve-2022-24644/blob/main/cve-2022-24644_public-advisory.pdf +CVE-2022-24646 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263 +CVE-2022-24647 - https://github.com/CuppaCMS/CuppaCMS/issues/23 +CVE-2022-24654 - https://github.com/leonardobg/CVE-2022-24654 +CVE-2022-24654 - https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html +CVE-2022-24655 - https://kb.netgear.com/000064615/Security-Advisory-for-Pre-Authentication-Command-Injection-on-EX6100v1-and-Pre-Authentication-Stack-Overflow-on-Multiple-Products-PSV-2021-0282-PSV-2021-0288 +CVE-2022-24656 - https://github.com/zhuzhuyule/HexoEditor/issues/3 +CVE-2022-2467 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md +CVE-2022-24676 - https://github.com/hyyyp/HYBBS2/issues/33 +CVE-2022-24677 - https://github.com/hyyyp/HYBBS2/issues/34 +CVE-2022-2468 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md +CVE-2022-2468 - https://vuldb.com/?id.204161 +CVE-2022-24681 - https://raxis.com/blog/cve-2022-24681 +CVE-2022-2470 - https://huntr.dev/bounties/3f1f679c-c243-431c-8ed0-e61543b9921b +CVE-2022-24706 - http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html +CVE-2022-24706 - http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html +CVE-2022-24706 - https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd +CVE-2022-24707 - http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html +CVE-2022-2471 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams +CVE-2022-24715 - http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html +CVE-2022-24716 - http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html +CVE-2022-2472 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams +CVE-2022-24723 - https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/ +CVE-2022-24724 - http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html +CVE-2022-24728 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24729 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2473 - https://packetstormsecurity.com/files/167864/wpuseronline2876-xss.txt +CVE-2022-2473 - https://www.exploit-db.com/exploits/50988 +CVE-2022-2473 - https://youtu.be/Q3zInrUnAV0 +CVE-2022-24734 - http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html +CVE-2022-24734 - http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html +CVE-2022-24735 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24736 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24755 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/ +CVE-2022-24756 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/ +CVE-2022-2476 - https://github.com/dbry/WavPack/issues/121 +CVE-2022-24760 - https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/ +CVE-2022-24780 - http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html +CVE-2022-24780 - https://markus-krell.de/itop-template-injection-inside-customer-portal/ +CVE-2022-24799 - https://github.com/wireapp/wire-webapp/releases/tag/2022-03-30-production.0 +CVE-2022-2480 - http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html +CVE-2022-24801 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24823 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24833 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw +CVE-2022-24836 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-24839 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-24844 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425 +CVE-2022-24851 - https://github.com/LDAPAccountManager/lam/issues/170 +CVE-2022-2486 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md +CVE-2022-2486 - https://vuldb.com/?id.204537 +CVE-2022-24860 - https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png +CVE-2022-24865 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76/ +CVE-2022-2487 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md +CVE-2022-2487 - https://vuldb.com/?id.204538 +CVE-2022-2488 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20touchlist_sync.cgi.md +CVE-2022-2489 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md +CVE-2022-2489 - https://vuldb.com/?id.204551 +CVE-2022-24891 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2490 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php +CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/issues/350 +CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/pull/351 +CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4 +CVE-2022-2491 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md +CVE-2022-2491 - https://vuldb.com/?id.204574 +CVE-2022-24910 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471 +CVE-2022-2492 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md#index.php +CVE-2022-2492 - https://vuldb.com/?id.204575 +CVE-2022-24928 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-24929 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-24930 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-24931 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-24932 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-2494 - https://huntr.dev/bounties/74ddb017-c1fd-4e72-bd30-3b2033911472 +CVE-2022-24949 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxg8-4r3q-p9rv +CVE-2022-2495 - https://huntr.dev/bounties/00affb69-275d-4f4c-b419-437922bc7798 +CVE-2022-24950 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3 +CVE-2022-24951 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q +CVE-2022-24952 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw +CVE-2022-24954 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24955 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24956 - https://syss.de +CVE-2022-24956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-018.txt +CVE-2022-24957 - https://syss.de +CVE-2022-24957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-019.txt +CVE-2022-24958 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda +CVE-2022-24959 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 +CVE-2022-24971 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-24976 - https://www.openwall.com/lists/oss-security/2022/01/30/4 +CVE-2022-24977 - https://r0.haxors.org/posts?id=8 +CVE-2022-24989 - https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990 +CVE-2022-24989 - https://packetstormsecurity.com/files/172904 +CVE-2022-24990 - http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html +CVE-2022-24995 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/7 +CVE-2022-24999 - https://github.com/n8tz/CVE-2022-24999 +CVE-2022-25003 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25003 +CVE-2022-25004 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25004/ +CVE-2022-25012 - https://www.exploit-db.com/exploits/50130 +CVE-2022-25013 - https://github.com/gamonoid/icehrm/issues/284 +CVE-2022-25014 - https://github.com/gamonoid/icehrm/issues/283 +CVE-2022-25015 - https://github.com/gamonoid/icehrm/issues/285 +CVE-2022-25017 - https://gist.github.com/zaee-k/390b2f8e50407e4b199df806baa7e4ef +CVE-2022-25020 - https://youtu.be/TsGp-QB5XWI +CVE-2022-25022 - http://danpros.com +CVE-2022-25022 - https://youtu.be/acookTqf3Nc +CVE-2022-25023 - https://github.com/adamstark/AudioFile/issues/58 +CVE-2022-25026 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/ +CVE-2022-25027 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/ +CVE-2022-2503 - https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m +CVE-2022-25044 - https://github.com/espruino/Espruino/issues/2142 +CVE-2022-25045 - https://github.com/VivekPanday12/CVE-/issues/6 +CVE-2022-25045 - https://www.linkedin.com/in/vivek-panday-796768149/ +CVE-2022-25046 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel +CVE-2022-25047 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel +CVE-2022-25048 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel +CVE-2022-2505 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-25072 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/Archer%20A54 +CVE-2022-25073 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841N +CVE-2022-25074 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC +CVE-2022-25075 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3000RU/README.md +CVE-2022-25076 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A800R/README.md +CVE-2022-25077 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3100R/README.md +CVE-2022-25078 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3600R/README.md +CVE-2022-25079 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A810R/README.md +CVE-2022-25080 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A830R/README.md +CVE-2022-25081 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T10/README.md +CVE-2022-25082 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A950RG/README.md +CVE-2022-25083 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A860R/README.md +CVE-2022-25084 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T6/README.md +CVE-2022-25089 - http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html +CVE-2022-25089 - https://www.exploit-db.com/exploits/50798 +CVE-2022-25090 - http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html +CVE-2022-25090 - http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html +CVE-2022-25090 - https://github.com/ComparedArray/printix-CVE-2022-25090 +CVE-2022-25090 - https://www.exploit-db.com/exploits/50812 +CVE-2022-25094 - https://www.exploit-db.com/exploits/50731 +CVE-2022-25095 - https://www.exploit-db.com/exploits/50730 +CVE-2022-25096 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management +CVE-2022-25096 - https://www.exploit-db.com/exploits/50732 +CVE-2022-25104 - https://github.com/ttimot24/HorizontCMS/issues/43 +CVE-2022-25106 - https://github.com/chunklhit/cve/blob/master/dlink/DIR859/BufferOverflow.md +CVE-2022-25106 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-25108 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-25114 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PuneethReddyHC/event-management-1.0 +CVE-2022-25115 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management +CVE-2022-25131 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md +CVE-2022-25139 - https://github.com/nginx/njs/issues/451 +CVE-2022-2514 - https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 +CVE-2022-25148 - http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html +CVE-2022-25148 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 +CVE-2022-25149 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042 +CVE-2022-2515 - https://gist.github.com/Xib3rR4dAr/6aa9e730c1d030a5ee9f9d1eae6fbd5e +CVE-2022-25164 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-25165 - https://github.com/RhinoSecurityLabs/CVEs +CVE-2022-25165 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ +CVE-2022-25166 - https://github.com/RhinoSecurityLabs/CVEs +CVE-2022-25166 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ +CVE-2022-25169 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-25171 - https://security.snyk.io/vuln/SNYK-JS-P4-3167330 +CVE-2022-25172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470 +CVE-2022-25216 - https://www.tenable.com/security/research/tra-2022-07 +CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 +CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/ +CVE-2022-25220 - https://fluidattacks.com/advisories/armstrong/ +CVE-2022-25220 - https://github.com/1modm/petereport/issues/35 +CVE-2022-25221 - https://fluidattacks.com/advisories/charles/ +CVE-2022-25222 - https://fluidattacks.com/advisories/berry/ +CVE-2022-25223 - https://fluidattacks.com/advisories/jagger/ +CVE-2022-25224 - https://fluidattacks.com/advisories/lennon/ +CVE-2022-25225 - https://fluidattacks.com/advisories/spinetta/ +CVE-2022-25226 - https://fluidattacks.com/advisories/sinatra/ +CVE-2022-25227 - https://fluidattacks.com/advisories/clapton/ +CVE-2022-25228 - https://fluidattacks.com/advisories/jackson/ +CVE-2022-25229 - https://fluidattacks.com/advisories/bowie/ +CVE-2022-25229 - https://github.com/popcorn-official/popcorn-desktop/issues/2491 +CVE-2022-2523 - https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f +CVE-2022-25231 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724 +CVE-2022-25235 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-25236 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html +CVE-2022-25236 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-25237 - https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/ +CVE-2022-25241 - http://packetstormsecurity.com/files/166074/FileCloud-21.2-Cross-Site-Request-Forgery.html +CVE-2022-25241 - https://herolab.usd.de/security-advisories/ +CVE-2022-25242 - https://herolab.usd.de/security-advisories/ +CVE-2022-25245 - https://raxis.com/blog/cve-2022-25245 +CVE-2022-25258 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 +CVE-2022-25265 - https://github.com/x0reaxeax/exec-prot-bypass +CVE-2022-25276 - https://www.drupal.org/sa-core-2022-015 +CVE-2022-25295 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177 +CVE-2022-25296 - https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623 +CVE-2022-25297 - https://snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-2407243 +CVE-2022-25298 - https://snyk.io/vuln/SNYK-UNMANAGED-SPRINFALLWEBCC-2404182 +CVE-2022-25299 - https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180 +CVE-2022-25301 - https://github.com/metabench/jsgui-lang-essentials/issues/1 +CVE-2022-25301 - https://snyk.io/vuln/SNYK-JS-JSGUILANGESSENTIALS-2316897 +CVE-2022-25302 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988732 +CVE-2022-25303 - https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 +CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731 +CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730 +CVE-2022-25305 - https://gist.github.com/Xib3rR4dAr/af90cef7867583ab2de4cccea2a8c87d +CVE-2022-25306 - https://gist.github.com/Xib3rR4dAr/89fc87ea1d62348c21c99fc11a3bfd88 +CVE-2022-25307 - https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb +CVE-2022-25308 - https://github.com/fribidi/fribidi/issues/181 +CVE-2022-25309 - https://github.com/fribidi/fribidi/issues/182 +CVE-2022-2531 - https://gitlab.com/gitlab-org/gitlab/-/issues/364252 +CVE-2022-25310 - https://github.com/fribidi/fribidi/issues/183 +CVE-2022-25313 - https://github.com/libexpat/libexpat/pull/558 +CVE-2022-25313 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-25314 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-25315 - https://github.com/libexpat/libexpat/pull/559 +CVE-2022-25315 - https://www.oracle.com/security-alerts/cpuapr2022.html +CVE-2022-2532 - https://wpscan.com/vulnerability/07278b12-58e6-4230-b2fb-19237e9785d8 +CVE-2022-25324 - https://snyk.io/vuln/SNYK-JS-BIGNUM-2388581 +CVE-2022-25329 - https://www.tenable.com/security/research/tra-2022-05 +CVE-2022-25330 - https://www.tenable.com/security/research/tra-2022-05 +CVE-2022-25331 - https://www.tenable.com/security/research/tra-2022-05 +CVE-2022-25332 - https://tetraburst.com/ +CVE-2022-25333 - https://tetraburst.com/ +CVE-2022-25334 - https://tetraburst.com/ +CVE-2022-25342 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-25343 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-25344 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-25345 - https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100 +CVE-2022-25349 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498 +CVE-2022-25349 - https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800 +CVE-2022-2535 - https://wpscan.com/vulnerability/0e13c375-044c-4c2e-ab8e-48cb89d90d02 +CVE-2022-25350 - https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616 +CVE-2022-25352 - https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117 +CVE-2022-25354 - https://snyk.io/vuln/SNYK-JS-SETIN-2388571 +CVE-2022-25356 - https://www.swascan.com/security-advisory-alt-n-security-gateway/ +CVE-2022-25359 - https://packetstormsecurity.com/files/166103/ICL-ScadaFlex-II-SCADA-Controllers-SC-1-SC-2-1.03.07-Remote-File-Modification.html +CVE-2022-2536 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-2536.txt +CVE-2022-2536 - https://packetstormsecurity.com/files/168120/wptransposh1081-authz.txt +CVE-2022-2536 - https://www.exploitalert.com/view-details.html?id=38949 +CVE-2022-2536 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2536 +CVE-2022-2537 - https://wpscan.com/vulnerability/ae613148-85d8-47a0-952d-49c29584676f +CVE-2022-25373 - https://raxis.com/blog/cve-2022-25373 +CVE-2022-25375 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 +CVE-2022-25377 - https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/ +CVE-2022-2538 - https://wpscan.com/vulnerability/afa1e159-30bc-42d2-b3f8-8c868b113d3e +CVE-2022-25389 - https://www.adminxe.com/3246.html +CVE-2022-25390 - https://www.adminxe.com/3276.html +CVE-2022-25393 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Bakery-Shop-Management +CVE-2022-25394 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/abhisheks008/2022/Medical-Store-Management-System +CVE-2022-25395 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store +CVE-2022-25396 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store/SQL-Injection +CVE-2022-25398 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/pavanpatil45/Auto-Spare-Parts-Management +CVE-2022-25399 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Real-Estate-Portal-System +CVE-2022-25402 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md +CVE-2022-25403 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md +CVE-2022-25407 - https://github.com/kishan0725/Hospital-Management-System/issues/21 +CVE-2022-25408 - https://github.com/kishan0725/Hospital-Management-System/issues/22 +CVE-2022-25409 - https://github.com/kishan0725/Hospital-Management-System/issues/20 +CVE-2022-25411 - https://github.com/maxsite/cms/issues/487 +CVE-2022-25412 - https://github.com/maxsite/cms/issues/486 +CVE-2022-25414 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1 +CVE-2022-25417 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3 +CVE-2022-25418 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2 +CVE-2022-25427 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2 +CVE-2022-25428 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3 +CVE-2022-25429 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1 +CVE-2022-2543 - https://wpscan.com/vulnerability/5dc8b671-f2fa-47be-8664-9005c4fdbea8 +CVE-2022-25431 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/4 +CVE-2022-25433 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/5 +CVE-2022-25434 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/6 +CVE-2022-25435 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/7 +CVE-2022-25437 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/9 +CVE-2022-25438 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/11 +CVE-2022-25439 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/8 +CVE-2022-2544 - https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053 +CVE-2022-25440 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/13 +CVE-2022-25441 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/12 +CVE-2022-25445 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/1 +CVE-2022-25446 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/3 +CVE-2022-25447 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/4 +CVE-2022-25448 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/2 +CVE-2022-25449 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/5 +CVE-2022-25450 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/8 +CVE-2022-25451 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/9 +CVE-2022-25452 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/7 +CVE-2022-25453 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/6 +CVE-2022-25454 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/10 +CVE-2022-25455 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/11 +CVE-2022-25456 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/12 +CVE-2022-25457 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/14 +CVE-2022-25458 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/13 +CVE-2022-25459 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/15 +CVE-2022-2546 - https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 +CVE-2022-25460 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/17 +CVE-2022-25461 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/16 +CVE-2022-25465 - https://github.com/espruino/Espruino/issues/2136 +CVE-2022-25481 - https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md +CVE-2022-25484 - https://github.com/appneta/tcpreplay/issues/715 +CVE-2022-25485 - https://github.com/CuppaCMS/CuppaCMS/issues/24 +CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/15 +CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/25 +CVE-2022-25486 - https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts +CVE-2022-25487 - http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html +CVE-2022-25487 - https://github.com/thedigicraft/Atom.CMS/issues/256 +CVE-2022-25488 - https://github.com/thedigicraft/Atom.CMS/issues/257 +CVE-2022-2549 - https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537 +CVE-2022-25494 - https://github.com/g33kyrash/Online-Banking-system/issues/16 +CVE-2022-25495 - https://github.com/CuppaCMS/CuppaCMS/issues/26 +CVE-2022-25497 - https://github.com/CuppaCMS/CuppaCMS/issues/28 +CVE-2022-25498 - https://github.com/CuppaCMS/CuppaCMS/issues/29 +CVE-2022-2550 - https://huntr.dev/bounties/6ab4384d-bcbe-4d98-bf67-35c3535fc5c7 +CVE-2022-25506 - https://github.com/FreeTAKTeam/UI/issues/27 +CVE-2022-2551 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551 +CVE-2022-2551 - https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0 +CVE-2022-25511 - https://github.com/FreeTAKTeam/UI/issues/29 +CVE-2022-25514 - https://github.com/nothings/stb/issues/1286 +CVE-2022-25515 - https://github.com/nothings/stb/issues/1286 +CVE-2022-25515 - https://github.com/nothings/stb/issues/1288 +CVE-2022-25516 - https://github.com/nothings/stb/issues/1286 +CVE-2022-25516 - https://github.com/nothings/stb/issues/1287 +CVE-2022-2552 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2552 +CVE-2022-2552 - https://wpscan.com/vulnerability/6b540712-fda5-4be6-ae4b-bd30a9d9d698 +CVE-2022-25521 - https://medium.com/@dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0 +CVE-2022-25523 - https://github.com/Typesetter/Typesetter/issues/697 +CVE-2022-2554 - https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9 +CVE-2022-25546 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/6 +CVE-2022-25548 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/5 +CVE-2022-25549 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4 +CVE-2022-2555 - https://wpscan.com/vulnerability/7ec9e493-bc48-4a5d-8c7e-34beaba892ae +CVE-2022-25550 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/9 +CVE-2022-25551 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/8 +CVE-2022-25552 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/3 +CVE-2022-25553 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/7 +CVE-2022-25554 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/10 +CVE-2022-25555 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/2 +CVE-2022-25556 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/6 +CVE-2022-25557 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/11 +CVE-2022-25558 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/13 +CVE-2022-2556 - https://wpscan.com/vulnerability/f2a59eaa-6b44-4098-912f-823289cf33b0 +CVE-2022-25560 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/4 +CVE-2022-25561 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/5 +CVE-2022-25566 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/12 +CVE-2022-25568 - https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/ +CVE-2022-2557 - https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e +CVE-2022-25576 - https://github.com/butterflyhack/anchorcms-0.12.7-CSRF +CVE-2022-25577 - https://github.com/ph0nkybit/proof-of-concepts/tree/main/Use_Of_Hardcoded_Password_In_ALF-BanCO_8.2.x +CVE-2022-2558 - https://wpscan.com/vulnerability/6e096269-eedc-4614-88ce-6795c4adf32f +CVE-2022-2559 - https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec +CVE-2022-2563 - https://wpscan.com/vulnerability/98cd761c-7527-4224-965d-d34472b5c19f +CVE-2022-25630 - http://packetstormsecurity.com/files/171781/Symantec-Messaging-Gateway-10.7.4-Cross-Site-Scripting.html +CVE-2022-25636 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html +CVE-2022-25636 - https://github.com/Bonfee/CVE-2022-25636 +CVE-2022-25636 - https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ +CVE-2022-25636 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2564 - https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd +CVE-2022-25641 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-25644 - https://security.snyk.io/vuln/SNYK-JS-PENDO324GETPROCESSBYNAME-2419094 +CVE-2022-25645 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974 +CVE-2022-25645 - https://snyk.io/vuln/SNYK-JS-DSET-2330881 +CVE-2022-25646 - https://github.com/myliang/x-spreadsheet/issues/580 +CVE-2022-25646 - https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381 +CVE-2022-25646 - https://youtu.be/Ij-8VVKNh7U +CVE-2022-25647 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-25648 - https://snyk.io/vuln/SNYK-RUBY-GIT-2421270 +CVE-2022-2565 - https://wpscan.com/vulnerability/d89eff7d-a3e6-4876-aa0e-6d17e206af83 +CVE-2022-25664 - http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html +CVE-2022-2567 - https://wpscan.com/vulnerability/dfa21dde-a9fc-4a35-9602-c3fde907ca54 +CVE-2022-2571 - https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571 +CVE-2022-2574 - https://wpscan.com/vulnerability/9dec8ac7-befd-4c9d-9a9e-7da9e395dbf2 +CVE-2022-25743 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html +CVE-2022-2575 - https://wpscan.com/vulnerability/e934af78-9dfd-4e14-853d-dc453de6e365 +CVE-2022-25758 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782 +CVE-2022-25758 - https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884 +CVE-2022-25759 - https://github.com/neocotic/convert-svg/issues/81 +CVE-2022-25759 - https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633 +CVE-2022-25760 - https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 +CVE-2022-25761 - https://security.snyk.io/vuln/SNYK-UNMANAGED-OPEN62541OPEN62541-2988719 +CVE-2022-25762 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-25765 - http://packetstormsecurity.com/files/171746/pdfkit-0.8.7.2-Command-Injection.html +CVE-2022-25765 - https://security.snyk.io/vuln/SNYK-RUBY-PDFKIT-2869795 +CVE-2022-25766 - https://github.com/FredrikNoren/ungit/pull/1510 +CVE-2022-25766 - https://snyk.io/vuln/SNYK-JS-UNGIT-2414099 +CVE-2022-25767 - https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018 +CVE-2022-2577 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(SQLI).md +CVE-2022-2577 - https://vuldb.com/?id.205300 +CVE-2022-25778 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25779 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-2578 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System--.md +CVE-2022-25780 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25781 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25782 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25783 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25784 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25785 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25786 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-25787 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-2579 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(XSS).md +CVE-2022-2579 - https://vuldb.com/?id.205302 +CVE-2022-2580 - https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249 +CVE-2022-2581 - https://huntr.dev/bounties/0bedbae2-82ae-46ae-aa68-1c28b309b60b +CVE-2022-25810 - https://wpscan.com/vulnerability/9a934a84-f0c7-42ed-b980-bb168b2c5892 +CVE-2022-25811 - https://wpscan.com/vulnerability/0e0d2c5f-3396-4a0a-a5c6-6a98de3802c9 +CVE-2022-25812 - https://wpscan.com/vulnerability/1f6bd346-4743-44b8-86d7-4fbe09bad657 +CVE-2022-25814 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25815 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25816 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25817 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25818 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25819 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25820 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3 +CVE-2022-25831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-25832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-25833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-25836 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2022-25837 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ +CVE-2022-25839 - https://snyk.io/vuln/SNYK-JS-URLJS-2414030 +CVE-2022-25842 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874 +CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736 +CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738 +CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737 +CVE-2022-25844 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735 +CVE-2022-25845 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 +CVE-2022-25845 - https://www.ddosi.org/fastjson-poc/ +CVE-2022-25845 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-25847 - https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c +CVE-2022-25847 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915 +CVE-2022-25848 - https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd +CVE-2022-25848 - https://security.snyk.io/vuln/SNYK-JS-STATICDEVSERVER-3149917 +CVE-2022-25849 - https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544 +CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5564-1 +CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5565-1 +CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5566-1 +CVE-2022-2585 - https://www.openwall.com/lists/oss-security/2022/08/09/7 +CVE-2022-25850 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228 +CVE-2022-25851 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295 +CVE-2022-25851 - https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218 +CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-LIBPQ-2392366 +CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-PGNATIVE-2392365 +CVE-2022-25853 - https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612 +CVE-2022-25854 - https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/ +CVE-2022-25855 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951 +CVE-2022-25858 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 +CVE-2022-25858 - https://snyk.io/vuln/SNYK-JS-TERSER-2806366 +CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5560-2 +CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5562-1 +CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5564-1 +CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5565-1 +CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5566-1 +CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5582-1 +CVE-2022-2586 - https://www.openwall.com/lists/oss-security/2022/08/09/5 +CVE-2022-25860 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391 +CVE-2022-25862 - https://snyk.io/vuln/SNYK-JS-SDS-2385944 +CVE-2022-25863 - https://snyk.io/vuln/SNYK-JS-GATSBYPLUGINMDX-2405699 +CVE-2022-25865 - https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201 +CVE-2022-25866 - https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 +CVE-2022-25867 - https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 +CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783 +CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2949784 +CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949782 +CVE-2022-25869 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2949781 +CVE-2022-25871 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488 +CVE-2022-25872 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368 +CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407 +CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406 +CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858 +CVE-2022-25875 - https://snyk.io/vuln/SNYK-JS-SVELTE-2931080 +CVE-2022-25876 - https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520 +CVE-2022-25878 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 +CVE-2022-25878 - https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 +CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5560-2 +CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5562-1 +CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5564-1 +CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5565-1 +CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5566-1 +CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5582-1 +CVE-2022-2588 - https://www.openwall.com/lists/oss-security/2022/08/09/6 +CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 +CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 +CVE-2022-25882 - https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856 +CVE-2022-25882 - https://github.com/onnx/onnx/issues/3991 +CVE-2022-25882 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 +CVE-2022-25883 - https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 +CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091139 +CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3091137 +CVE-2022-25888 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751 +CVE-2022-2589 - https://huntr.dev/bounties/8705800d-cf2f-433d-9c3e-dbef6a3f7e08 +CVE-2022-25890 - https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 +CVE-2022-25891 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINRRRSHOUTRRRPKGUTIL-2849059 +CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138 +CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320 +CVE-2022-25893 - https://security.snyk.io/vuln/SNYK-JS-VM2-2990237 +CVE-2022-25894 - https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112 +CVE-2022-25895 - https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120 +CVE-2022-25895 - https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718 +CVE-2022-25897 - https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191 +CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898 +CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897 +CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896 +CVE-2022-25898 - https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122 +CVE-2022-25900 - https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308 +CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681 +CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984 +CVE-2022-25903 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750 +CVE-2022-25904 - https://github.com/hacksparrow/safe-eval/issues/26 +CVE-2022-25904 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701 +CVE-2022-25906 - https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878 +CVE-2022-25907 - https://security.snyk.io/vuln/SNYK-JS-TSDEEPMERGE-2959975 +CVE-2022-25908 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953 +CVE-2022-2591 - http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html +CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 +CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 +CVE-2022-25914 - https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECLOUDTOOLS-2968871 +CVE-2022-25916 - https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394 +CVE-2022-25918 - https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108 +CVE-2022-25921 - https://security.snyk.io/vuln/SNYK-JS-MORGANJSON-2976193 +CVE-2022-25923 - https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 +CVE-2022-25926 - https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345 +CVE-2022-25927 - https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450 +CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-3177369 +CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-3177368 +CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JS-SMOOTHIE-3177364 +CVE-2022-2593 - https://wpscan.com/vulnerability/229a065e-1062-44d4-818d-29aa3b6b6d41 +CVE-2022-25931 - https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9 +CVE-2022-25931 - https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539 +CVE-2022-25932 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1523 +CVE-2022-25936 - https://gist.github.com/lirantal/691d02d607753d54856f9335f9a1692f +CVE-2022-25936 - https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896 +CVE-2022-25937 - https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395 +CVE-2022-2594 - https://wpscan.com/vulnerability/3fde5336-552c-4861-8b4d-89a16735c0e2 +CVE-2022-25940 - https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb +CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3175617 +CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JS-LITESERVER-3153540 +CVE-2022-25942 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1486 +CVE-2022-25943 - https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE +CVE-2022-2595 - https://huntr.dev/bounties/1c6afb84-2025-46d8-9e9f-cbfc20e5d04d +CVE-2022-2596 - https://huntr.dev/bounties/a7e6a136-0a4b-46c4-ad20-802f1dd60bf7 +CVE-2022-25962 - https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614 +CVE-2022-25967 - https://security.snyk.io/vuln/SNYK-JS-ETA-2936803 +CVE-2022-2597 - https://wpscan.com/vulnerability/3ffcee7c-1e03-448c-8006-a9405658cdb7 +CVE-2022-25972 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1485 +CVE-2022-25973 - https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070 +CVE-2022-25978 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070 +CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331 +CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764 +CVE-2022-2598 - https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e +CVE-2022-25989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1479 +CVE-2022-2599 - https://wpscan.com/vulnerability/276a7fc5-3d0d-446d-92cf-20060aecd0ef +CVE-2022-25995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1477 +CVE-2022-25996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1482 +CVE-2022-26002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476 +CVE-2022-26007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1475 +CVE-2022-26009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1483 +CVE-2022-2602 - http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html +CVE-2022-2602 - https://ubuntu.com/security/notices/USN-5693-1 +CVE-2022-26020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1474 +CVE-2022-26023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520 +CVE-2022-26026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1491 +CVE-2022-26042 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1478 +CVE-2022-26043 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1489 +CVE-2022-26061 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487 +CVE-2022-26067 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1492 +CVE-2022-26068 - https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332 +CVE-2022-26073 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1480 +CVE-2022-26075 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1500 +CVE-2022-26077 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1490 +CVE-2022-26082 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493 +CVE-2022-26085 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1473 +CVE-2022-26088 - http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html +CVE-2022-26088 - http://seclists.org/fulldisclosure/2022/Nov/10 +CVE-2022-26088 - https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/ +CVE-2022-26090 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26091 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26092 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26093 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26094 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26095 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26096 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26097 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26098 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26099 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-26101 - http://packetstormsecurity.com/files/167561/SAP-Fiori-Launchpad-Cross-Site-Scripting.html +CVE-2022-26101 - http://seclists.org/fulldisclosure/2022/Jun/39 +CVE-2022-26105 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-26106 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-26107 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-26108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-26109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-26117 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47 +CVE-2022-26134 - http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html +CVE-2022-26134 - http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html +CVE-2022-26134 - http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html +CVE-2022-26134 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html +CVE-2022-26143 - https://team-cymru.com/blog/2022/03/08/record-breaking-ddos-potential-discovered-cve-2022-26143/ +CVE-2022-26149 - http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html +CVE-2022-26159 - https://podalirius.net/en/cves/2022-26159/ +CVE-2022-26169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Air-Cargo-Management-System +CVE-2022-26170 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Mobile-Comparison-Website +CVE-2022-26171 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/campcodes.com/Bank-Management-System +CVE-2022-26173 - http://jforum.com +CVE-2022-26173 - https://github.com/WULINPIN/CVE/blob/main/JForum/poc.html +CVE-2022-26180 - http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html +CVE-2022-26180 - https://www.exploit-db.com/exploits/50854 +CVE-2022-26181 - https://github.com/dropbox/lepton/issues/154 +CVE-2022-26183 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ +CVE-2022-26184 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ +CVE-2022-26186 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ +CVE-2022-26187 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ +CVE-2022-26188 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ +CVE-2022-26189 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/ +CVE-2022-26197 - https://gist.github.com/CrimsonHamster/1aeec6db0d740de6ed4690f6a975f377 +CVE-2022-26211 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_25/25.md +CVE-2022-26233 - http://packetstormsecurity.com/files/166577/Barco-Control-Room-Management-Suite-Directory-Traversal.html +CVE-2022-26233 - http://seclists.org/fulldisclosure/2022/Apr/0 +CVE-2022-26235 - https://pastebin.com/amgw9pE7 +CVE-2022-26236 - https://pastebin.com/hwrvFix5 +CVE-2022-26237 - https://pastebin.com/DREqM7AT +CVE-2022-26238 - https://pastebin.com/23N5wcC7 +CVE-2022-26239 - https://pastebin.com/1QEHrj01 +CVE-2022-26240 - https://pastebin.com/Bsy6KTxJ +CVE-2022-26243 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-4-sscanf-buffer-overflow-75ae0e06abb6 +CVE-2022-26244 - https://github.com/kishan0725/Hospital-Management-System/issues/23 +CVE-2022-26250 - https://www.bencteux.fr/posts/synaman/ +CVE-2022-26251 - https://www.bencteux.fr/posts/synaman/ +CVE-2022-26252 - https://www.exploit-db.com/exploits/50780 +CVE-2022-26254 - https://youtu.be/b665r1ZfCg4 +CVE-2022-26255 - https://github.com/Fndroid/clash_for_windows_pkg/issues/2710 +CVE-2022-26258 - https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md +CVE-2022-26258 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-2626 - https://huntr.dev/bounties/704aacc9-edff-4da5-90a6-4adf8dbf36fe +CVE-2022-26260 - https://github.com/wollardj/simple-plist/issues/60 +CVE-2022-26269 - https://github.com/nsbogam/CVE-2022-26269/blob/main/README.md +CVE-2022-2627 - https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea +CVE-2022-26278 - https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9 +CVE-2022-26279 - https://github.com/eyoucms/eyoucms/issues/22 +CVE-2022-2628 - https://wpscan.com/vulnerability/e712f83e-b437-4bc6-9511-2b0290ed315d +CVE-2022-26281 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-26281 +CVE-2022-2629 - https://wpscan.com/vulnerability/25a0d41f-3b6f-4d18-b4d5-767ac60ee8a8 +CVE-2022-26291 - https://github.com/ckolivas/lrzip/issues/206 +CVE-2022-26293 - https://www.exploit-db.com/exploits/50682 +CVE-2022-26295 - https://www.exploit-db.com/exploits/50683 +CVE-2022-26296 - https://github.com/riscv-boom/riscv-boom/issues/577 +CVE-2022-26301 - https://github.com/yeyinshi/tuzicms/issues/11 +CVE-2022-26303 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1488 +CVE-2022-2631 - https://huntr.dev/bounties/86881f9e-ca48-49b5-9782-3c406316930c +CVE-2022-26315 - https://github.com/claudiodangelis/qrcp/issues/223 +CVE-2022-26332 - https://www.exploit-db.com/exploits/50788 +CVE-2022-26342 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1484 +CVE-2022-26346 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1507 +CVE-2022-2635 - https://wpscan.com/vulnerability/219767a8-2427-42d5-8734-bd197d9ab46b +CVE-2022-26352 - http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html +CVE-2022-2636 - https://huntr.dev/bounties/357c0390-631c-4684-b6e1-a6d8b2453d66 +CVE-2022-26362 - http://packetstormsecurity.com/files/167718/Xen-TLB-Flush-Bypass.html +CVE-2022-26364 - http://packetstormsecurity.com/files/167710/Xen-PV-Guest-Non-SELFSNOOP-CPU-Memory-Corruption.html +CVE-2022-26376 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511 +CVE-2022-2638 - https://wpscan.com/vulnerability/70840a72-ccdc-4eee-9ad2-874809e5de11 +CVE-2022-26382 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741888 +CVE-2022-26385 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747526 +CVE-2022-26387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1752979 +CVE-2022-26420 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499 +CVE-2022-2643 - https://vuldb.com/?id.205564 +CVE-2022-2645 - https://vuldb.com/?id.205573 +CVE-2022-26479 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/ +CVE-2022-26481 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-command-injection-in-poly-studio/ +CVE-2022-26482 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/ +CVE-2022-26495 - https://lists.debian.org/nbd/2022/01/msg00037.html +CVE-2022-26496 - http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html +CVE-2022-26496 - https://lists.debian.org/nbd/2022/01/msg00037.html +CVE-2022-26497 - http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html +CVE-2022-26498 - http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html +CVE-2022-26498 - http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html +CVE-2022-26499 - http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html +CVE-2022-2650 - https://huntr.dev/bounties/f0d85efa-4e78-4b1d-848f-edea115af64b +CVE-2022-26507 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-02 +CVE-2022-2651 - http://packetstormsecurity.com/files/168423/Bookwyrm-0.4.3-Authentication-Bypass.html +CVE-2022-26510 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1495 +CVE-2022-26518 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501 +CVE-2022-2652 - https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5 +CVE-2022-26521 - http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html +CVE-2022-2653 - https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 +CVE-2022-26531 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html +CVE-2022-26531 - http://packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html +CVE-2022-26532 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html +CVE-2022-2654 - https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993 +CVE-2022-2655 - https://wpscan.com/vulnerability/acc9675a-56f6-411a-9594-07144c2aad1b +CVE-2022-2656 - https://vuldb.com/?id.205596 +CVE-2022-26562 - https://kopano.com/ +CVE-2022-26565 - https://bug.pocas.kr/2022/03/01/2022-03-05-CVE-2022-26565/ +CVE-2022-26565 - https://github.com/totaljs/cms/issues/35 +CVE-2022-2657 - https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a +CVE-2022-26579 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ +CVE-2022-2658 - https://wpscan.com/vulnerability/e72fa040-3ca5-4570-9a3c-c704574b1ca3 +CVE-2022-26580 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ +CVE-2022-26581 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ +CVE-2022-26582 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ +CVE-2022-26588 - http://packetstormsecurity.com/files/166627/ICEHRM-31.0.0.0S-Cross-Site-Request-Forgery.html +CVE-2022-26588 - https://medium.com/@devansh3008/csrf-in-icehrm-31-0-0-0s-in-delete-user-endpoint-86a39ecf253f +CVE-2022-26589 - https://medium.com/@devansh3008/pluck-cms-v4-7-15-csrf-vulnerability-at-delete-page-9fff0309f9c +CVE-2022-26589 - https://owasp.org/www-community/attacks/csrf +CVE-2022-26592 - https://github.com/sass/libsass/issues/3174 +CVE-2022-26607 - https://github.com/baigoStudio/baigoCMS/issues/9 +CVE-2022-26613 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613 +CVE-2022-26624 - https://drive.google.com/file/d/1Dp0dD9PNcwamjRi0ldD0hUOEivu48SR6/view?usp=sharing +CVE-2022-26628 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/vetbossel.in/2022/Matrimony +CVE-2022-26629 - https://github.com/sysenter-eip/CVE-2022-26629 +CVE-2022-2663 - https://www.youtube.com/watch?v=WIq-YgQuYCA +CVE-2022-26632 - https://www.exploit-db.com/exploits/50739 +CVE-2022-26633 - https://www.exploit-db.com/exploits/50740 +CVE-2022-26634 - https://www.exploit-db.com/exploits/50765 +CVE-2022-26635 - https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/ +CVE-2022-26639 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_DNSServers%3D.pdf +CVE-2022-26640 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_minAddress%3D.pdf +CVE-2022-26641 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_httpRemotePort%3D.pdf +CVE-2022-26642 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_X_TP_ClonedMACAddress%3D.pdf +CVE-2022-2665 - https://vuldb.com/?id.205615 +CVE-2022-26651 - http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html +CVE-2022-26653 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777 +CVE-2022-26659 - https://docs.docker.com/docker-for-windows/release-notes/ +CVE-2022-2667 - https://vuldb.com/?id.205619 +CVE-2022-2669 - https://wpscan.com/vulnerability/792d9f22-abf6-47b2-a247-d0cdb705cd81 +CVE-2022-26702 - http://seclists.org/fulldisclosure/2023/Mar/21 +CVE-2022-2671 - https://vuldb.com/?id.205655 +CVE-2022-2672 - https://vuldb.com/?id.205656 +CVE-2022-26744 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-2675 - https://fccid.io/2A5PE-YUSHU001/Users-Manual/User-Manual-5810729 +CVE-2022-26757 - http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html +CVE-2022-2676 - https://vuldb.com/?id.205664 +CVE-2022-2677 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-SQL%20injections.md +CVE-2022-2677 - https://vuldb.com/?id.205665 +CVE-2022-26777 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777 +CVE-2022-26779 - https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-vpcc-9rh2-8jfp +CVE-2022-26780 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 +CVE-2022-26781 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 +CVE-2022-26782 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481 +CVE-2022-2679 - https://vuldb.com/?id.205667 +CVE-2022-2683 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md +CVE-2022-2683 - https://vuldb.com/?id.205671 +CVE-2022-26833 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513 +CVE-2022-2684 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-XSS.md +CVE-2022-26842 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537 +CVE-2022-2685 - https://vuldb.com/?id.205673 +CVE-2022-26851 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities +CVE-2022-26852 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities +CVE-2022-26854 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities +CVE-2022-26855 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities +CVE-2022-26873 - https://www.binarly.io/advisories/BRLY-2022-027 +CVE-2022-26877 - https://asana.com +CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17 +CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 +CVE-2022-26878 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d0688421449718c6c5f46e458a378c9b530ba18 +CVE-2022-2690 - https://vuldb.com/?id.205813 +CVE-2022-2691 - https://vuldb.com/?id.205814 +CVE-2022-2692 - https://vuldb.com/?id.205815 +CVE-2022-2694 - https://vuldb.com/?id.205817 +CVE-2022-26941 - https://tetraburst.com/ +CVE-2022-26942 - https://tetraburst.com/ +CVE-2022-26943 - https://tetraburst.com/ +CVE-2022-26947 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2022-26948 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2022-26949 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2022-26950 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2022-26951 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 +CVE-2022-26952 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md +CVE-2022-26953 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md +CVE-2022-26959 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1842675717/CVE-2022-26959+Northstar+Club+Management+software+version+6.3+-+Full+Blind+Time-based+SQL+Injection +CVE-2022-26965 - https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html +CVE-2022-26965 - https://youtu.be/sN6J_X4mEbY +CVE-2022-26966 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 +CVE-2022-26966 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062 +CVE-2022-26967 - https://github.com/gpac/gpac/issues/2138 +CVE-2022-26979 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-2698 - https://vuldb.com/?id.205819 +CVE-2022-26980 - https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca +CVE-2022-26981 - https://github.com/liblouis/liblouis/issues/1171 +CVE-2022-26982 - http://packetstormsecurity.com/files/171486/SimpleMachinesForum-2.1.1-Remote-Code-Execution.html +CVE-2022-26986 - http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html +CVE-2022-26990 - https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_2/2.md +CVE-2022-27003 - https://github.com/wudipjq/my_vuln/blob/main/totolink/vuln_32/32.md +CVE-2022-27007 - https://github.com/nginx/njs/issues/469 +CVE-2022-27008 - https://github.com/nginx/njs/issues/471 +CVE-2022-27016 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/10 +CVE-2022-2702 - https://vuldb.com/?id.205826 +CVE-2022-27022 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14 +CVE-2022-2703 - https://vuldb.com/?id.205827 +CVE-2022-2704 - https://vuldb.com/?id.205828 +CVE-2022-27041 - https://github.com/OS4ED/openSIS-Classic/issues/248 +CVE-2022-27044 - https://github.com/saitoha/libsixel/issues/156 +CVE-2022-27046 - https://github.com/saitoha/libsixel/issues/157 +CVE-2022-2705 - https://vuldb.com/?id.205829 +CVE-2022-2706 - https://vuldb.com/?id.205830 +CVE-2022-27061 - http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html +CVE-2022-27061 - https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC +CVE-2022-27062 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html +CVE-2022-27062 - https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc +CVE-2022-27063 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html +CVE-2022-27063 - https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc +CVE-2022-27064 - http://packetstormsecurity.com/files/166653/Musical-World-1-Shell-Upload.html +CVE-2022-27064 - https://github.com/D4rkP0w4r/Musical-World-Unrestricted-File-Upload-RCE-POC +CVE-2022-2707 - https://vuldb.com/?id.205831 +CVE-2022-2708 - https://vuldb.com/?id.205833 +CVE-2022-27083 - https://github.com/GD008/vuln/blob/main/tenda_M3_uploadAccessCodePic/M3_uploadAccessCodePic.md +CVE-2022-2709 - https://wpscan.com/vulnerability/1c551234-9c59-41a0-ab74-beea2d27df6b +CVE-2022-27092 - https://www.exploit-db.com/exploits/50804 +CVE-2022-27094 - https://www.exploit-db.com/exploits/50817 +CVE-2022-27095 - https://www.exploit-db.com/exploits/50815 +CVE-2022-2710 - https://wpscan.com/vulnerability/f730f584-2370-49f9-a094-a5bc521671c1 +CVE-2022-27104 - https://www.swascan.com/security-advisory-forma-lms/ +CVE-2022-2711 - https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1 +CVE-2022-27114 - https://github.com/michaelrsweet/htmldoc/issues/471 +CVE-2022-2713 - https://huntr.dev/bounties/3080fc96-75d7-4868-84de-9fc8c9b90290 +CVE-2022-27134 - https://github.com/Kenun99/CVE-batdappboomx +CVE-2022-27135 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232 +CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/pic_ppm.png +CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/poc_ppm +CVE-2022-27139 - http://ghost.org/docs/security/#privilege-escalation-attacks +CVE-2022-27145 - https://github.com/gpac/gpac/issues/2108 +CVE-2022-27146 - https://github.com/gpac/gpac/issues/2120 +CVE-2022-27147 - https://github.com/gpac/gpac/issues/2109 +CVE-2022-27148 - https://github.com/gpac/gpac/issues/2067 +CVE-2022-27169 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1494 +CVE-2022-27172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496 +CVE-2022-27178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1506 +CVE-2022-27185 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1505 +CVE-2022-27192 - https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md +CVE-2022-27193 - https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2 +CVE-2022-27223 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 +CVE-2022-27226 - http://packetstormsecurity.com/files/166396/iRZ-Mobile-Router-Cross-Site-Request-Forgery-Remote-Code-Execution.html +CVE-2022-27226 - https://github.com/SakuraSamuraii/ez-iRZ +CVE-2022-27226 - https://johnjhacking.com/blog/cve-2022-27226/ +CVE-2022-2723 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20eprocess.php%20SQL%20Injection/ +CVE-2022-2724 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20aprocess.php%20SQL%20Injection/ +CVE-2022-27248 - http://packetstormsecurity.com/files/166560/IdeaRE-RefTree-Path-Traversal.html +CVE-2022-27249 - http://packetstormsecurity.com/files/166559/IdeaRE-RefTree-Shell-Upload.html +CVE-2022-2725 - https://vuldb.com/?id.205838 +CVE-2022-27254 - https://github.com/nonamecoder/CVE-2022-27254 +CVE-2022-27254 - https://news.ycombinator.com/item?id=30804702 +CVE-2022-27254 - https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/ +CVE-2022-27254 - https://www.theregister.com/2022/03/25/honda_civic_hack/ +CVE-2022-27256 - https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/ +CVE-2022-2726 - https://vuldb.com/?id.205839 +CVE-2022-27260 - http://buttercms.com +CVE-2022-27263 - https://github.com/strapi/strapi +CVE-2022-27268 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27269 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27270 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27271 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27272 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27273 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27274 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27275 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27276 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing +CVE-2022-27286 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27287 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27288 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27289 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-2729 - https://huntr.dev/bounties/13b58e74-2dd0-4eec-9f3a-554485701540 +CVE-2022-27290 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27291 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27292 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27293 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27294 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-27295 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-2730 - https://huntr.dev/bounties/a81f39ab-092b-4941-b9ca-c4c8f2191504 +CVE-2022-27304 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Student-Grading-System +CVE-2022-27308 - http://packetstormsecurity.com/files/166966/PHProjekt-PhpSimplyGest-MyProjects-1.3.0-Cross-Site-Scripting.html +CVE-2022-2731 - https://huntr.dev/bounties/20b8d5c5-0764-4f0b-8ab3-b9f6b857175e +CVE-2022-2732 - https://huntr.dev/bounties/8773e0d1-5f1a-4e87-8998-f5ec45f6d533 +CVE-2022-2733 - https://huntr.dev/bounties/25b91301-dfb0-4353-a732-e051bbe8420c +CVE-2022-27330 - https://github.com/CP04042K/Full-Ecommece-Website-Add_Product-Stored_XSS-POC +CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230 +CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230#note_1372177 +CVE-2022-2734 - https://huntr.dev/bounties/d8e4c70c-788b-47e9-8141-a08db751d4e6 +CVE-2022-27346 - http://packetstormsecurity.com/files/166654/E-Commerce-Website-1.1.0-Shell-Upload.html +CVE-2022-27346 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC +CVE-2022-27348 - http://packetstormsecurity.com/files/166650/Social-Codia-SMS-1-Cross-Site-Scripting.html +CVE-2022-27348 - https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC +CVE-2022-27349 - http://packetstormsecurity.com/files/166655/Social-Codia-SMS-1-Shell-Upload.html +CVE-2022-27349 - https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC +CVE-2022-2735 - https://www.openwall.com/lists/oss-security/2022/09/01/4 +CVE-2022-27351 - http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html +CVE-2022-27351 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md +CVE-2022-27352 - http://packetstormsecurity.com/files/166656/Simple-House-Rental-System-1-Shell-Upload.html +CVE-2022-27352 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md +CVE-2022-27357 - http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html +CVE-2022-27357 - https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md +CVE-2022-27365 - https://github.com/chshcms/cscms/issues/12#issue-1170440183 +CVE-2022-2737 - https://wpscan.com/vulnerability/91bbdeb0-f2df-4500-b856-af0ff68fbb12 +CVE-2022-27374 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12.md +CVE-2022-27375 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12-2.md +CVE-2022-27378 - https://jira.mariadb.org/browse/MDEV-26423 +CVE-2022-27382 - https://jira.mariadb.org/browse/MDEV-26402 +CVE-2022-27385 - https://jira.mariadb.org/browse/MDEV-26415 +CVE-2022-27386 - https://jira.mariadb.org/browse/MDEV-26406 +CVE-2022-27387 - https://jira.mariadb.org/browse/MDEV-26422 +CVE-2022-27411 - https://github.com/ejdhssh/IOT_Vul +CVE-2022-27412 - http://packetstormsecurity.com/files/166694/Explore-CMS-1.0-SQL-Injection.html +CVE-2022-27431 - https://github.com/wuzhicms/wuzhicms/issues/200 +CVE-2022-27432 - https://owasp.org/www-community/attacks/csrf +CVE-2022-27432 - https://www.exploit-db.com/exploits/50831 +CVE-2022-27435 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC +CVE-2022-27436 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC +CVE-2022-27438 - https://gerr.re/posts/cve-2022-27438/ +CVE-2022-27444 - https://jira.mariadb.org/browse/MDEV-28080 +CVE-2022-27445 - https://jira.mariadb.org/browse/MDEV-28081 +CVE-2022-27446 - https://jira.mariadb.org/browse/MDEV-28082 +CVE-2022-27447 - https://jira.mariadb.org/browse/MDEV-28099 +CVE-2022-27448 - https://jira.mariadb.org/browse/MDEV-28095 +CVE-2022-27449 - https://jira.mariadb.org/browse/MDEV-28089 +CVE-2022-2745 - https://vuldb.com/?id.206013 +CVE-2022-27451 - https://jira.mariadb.org/browse/MDEV-28094 +CVE-2022-27452 - https://jira.mariadb.org/browse/MDEV-28090 +CVE-2022-27455 - https://jira.mariadb.org/browse/MDEV-28097 +CVE-2022-27456 - https://jira.mariadb.org/browse/MDEV-28093 +CVE-2022-27457 - https://jira.mariadb.org/browse/MDEV-28098 +CVE-2022-27458 - https://jira.mariadb.org/browse/MDEV-28099 +CVE-2022-2747 - https://vuldb.com/?id.206015 +CVE-2022-27474 - https://github.com/Mount4in/Mount4in.github.io/blob/master/poc.py +CVE-2022-27480 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html +CVE-2022-27480 - http://seclists.org/fulldisclosure/2022/Apr/20 +CVE-2022-27481 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf +CVE-2022-27498 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531 +CVE-2022-2750 - https://vuldb.com/?id.206022 +CVE-2022-2752 - https://www.secomea.com/support/cybersecurity-advisory +CVE-2022-2753 - https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182 +CVE-2022-27531 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010 +CVE-2022-27532 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010 +CVE-2022-27534 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_2 +CVE-2022-27535 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822 +CVE-2022-2754 - https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5 +CVE-2022-2756 - https://huntr.dev/bounties/95e7c181-9d80-4428-aebf-687ac55a9216 +CVE-2022-27567 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27568 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27569 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27570 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27571 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27572 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27573 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27574 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27575 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27576 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27607 - https://github.com/axiomatic-systems/Bento4/issues/677 +CVE-2022-2762 - https://wpscan.com/vulnerability/cf0b3893-3283-46d6-a497-f3110a35d42a +CVE-2022-2763 - https://wpscan.com/vulnerability/36a7b872-31fa-4375-9be7-8f787e616ed5 +CVE-2022-27630 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1504 +CVE-2022-27631 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510 +CVE-2022-27633 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1503 +CVE-2022-27642 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327 +CVE-2022-27645 - https://kb.netgear.com/000064722/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-Fixed-Wireless-Products-PSV-2021-0325 +CVE-2022-27647 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327 +CVE-2022-2765 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS--.md +CVE-2022-27654 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27655 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27656 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27657 - http://packetstormsecurity.com/files/167563/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Directory-Traversal.html +CVE-2022-27657 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27658 - https://launchpad.support.sap.com/#/notes/3165856 +CVE-2022-2766 - https://vuldb.com/?id.206162 +CVE-2022-27660 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1502 +CVE-2022-27666 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.15 +CVE-2022-27667 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27668 - http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html +CVE-2022-27668 - http://seclists.org/fulldisclosure/2022/Sep/17 +CVE-2022-27668 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27669 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27670 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-27671 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-2769 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS(XSS).md +CVE-2022-2770 - https://vuldb.com/?id.206166 +CVE-2022-2772 - https://vuldb.com/?id.206168 +CVE-2022-2774 - https://vuldb.com/?id.206170 +CVE-2022-2775 - https://wpscan.com/vulnerability/7101ce04-670e-4ce0-9f60-e00494ff379d +CVE-2022-2776 - https://vuldb.com/?id.206172 +CVE-2022-2777 - https://huntr.dev/bounties/13dd2f4d-0c7f-483e-a771-e1ed2ff1c36f +CVE-2022-27778 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-27782 - https://hackerone.com/reports/1555796 +CVE-2022-27804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567 +CVE-2022-27805 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1552 +CVE-2022-27813 - https://tetraburst.com/ +CVE-2022-27821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27823 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27824 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27825 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27826 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27827 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27828 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27829 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27830 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27834 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27835 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27836 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 +CVE-2022-27881 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html +CVE-2022-27882 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html +CVE-2022-27888 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md +CVE-2022-27889 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md +CVE-2022-27890 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md +CVE-2022-27895 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md +CVE-2022-27896 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md +CVE-2022-27907 - https://support.sonatype.com/hc/en-us/articles/5011047953555 +CVE-2022-27925 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html +CVE-2022-27927 - http://packetstormsecurity.com/files/167017/Microfinance-Management-System-1.0-SQL-Injection.html +CVE-2022-27927 - https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated +CVE-2022-27938 - https://github.com/saitoha/libsixel/issues/163 +CVE-2022-27939 - https://github.com/appneta/tcpreplay/issues/717 +CVE-2022-27940 - https://github.com/appneta/tcpreplay/issues/718 +CVE-2022-27941 - https://github.com/appneta/tcpreplay/issues/716 +CVE-2022-27942 - https://github.com/appneta/tcpreplay/issues/719 +CVE-2022-27944 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-27946 - https://github.com/donothingme/VUL/blob/main/vul3/3.md +CVE-2022-27950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11 +CVE-2022-27958 - https://github.com/afeng2016-s/CVE-Request/blob/main/febs-security/febs.md +CVE-2022-2796 - https://huntr.dev/bounties/69d56ec3-8370-44cf-9732-4065e3076097 +CVE-2022-27978 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md +CVE-2022-27979 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220321-tooljet-xss.md +CVE-2022-2798 - https://wpscan.com/vulnerability/f169567d-c682-4abe-94df-a9d00be90edd +CVE-2022-27982 - https://www.adminxe.com/3651.html +CVE-2022-27983 - https://www.adminxe.com/3687.html +CVE-2022-27984 - https://github.com/CuppaCMS/CuppaCMS/issues/30 +CVE-2022-27985 - https://github.com/CuppaCMS/CuppaCMS/issues/31 +CVE-2022-2799 - https://wpscan.com/vulnerability/4385370e-cf99-4249-b2c1-90cbfa8378a4 +CVE-2022-27991 - https://github.com/D4rkP0w4r/CVEs/blob/main/Online-Banking_SQLI/POC.md +CVE-2022-27992 - http://packetstormsecurity.com/files/166648/PHPGurukul-Zoo-Management-System-1.0-SQL-Injection.html +CVE-2022-27992 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md +CVE-2022-28000 - http://packetstormsecurity.com/files/166657/Car-Rental-System-1.0-SQL-Injection.html +CVE-2022-28000 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20SQLI/POC.md +CVE-2022-28001 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html +CVE-2022-28001 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20SQLI/POC.md +CVE-2022-28002 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html +CVE-2022-28002 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20File%20Disclosure/POC.md +CVE-2022-28005 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 +CVE-2022-28006 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip +CVE-2022-2801 - https://vuldb.com/?id.206247 +CVE-2022-28021 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/RCE-1.md +CVE-2022-28022 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-1.md +CVE-2022-28023 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-2.md +CVE-2022-28024 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-1.md +CVE-2022-28025 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-2.md +CVE-2022-28026 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-3.md +CVE-2022-28028 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-1.md +CVE-2022-28029 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md +CVE-2022-28030 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-3.md +CVE-2022-2804 - https://vuldb.com/?id.206250 +CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/blob/main/CVE-2022-28051/README.md +CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28051 +CVE-2022-28060 - https://github.com/JiuBanSec/CVE/blob/main/VictorCMS%20SQL.md +CVE-2022-28062 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20Upload%20%2B%20RCE/POC.md +CVE-2022-28063 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20Bakery%20Shop%20Management%20System%20File%20Disclosure/POC.md +CVE-2022-28079 - http://packetstormsecurity.com/files/167131/College-Management-System-1.0-SQL-Injection.html +CVE-2022-28079 - https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated +CVE-2022-28080 - http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html +CVE-2022-28080 - https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated +CVE-2022-28080 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip +CVE-2022-28085 - https://github.com/michaelrsweet/htmldoc/issues/480 +CVE-2022-28099 - https://github.com/IbrahimEkimIsik/CVE-2022-28099/blob/main/SQL%20Injection%20For%20Poultry%20Farm%20Management%20system%201.0 +CVE-2022-28099 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip +CVE-2022-28102 - https://github.com/housamz/php-mysql-admin-panel-generator/issues/19 +CVE-2022-28104 - https://packetstormsecurity.com/files/166430 +CVE-2022-28108 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ +CVE-2022-28109 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ +CVE-2022-28110 - https://medium.com/@honeyakshat999/hotel-management-system-sql-injection-on-login-page-a1ca87a31176 +CVE-2022-28117 - http://packetstormsecurity.com/files/167063/Navigate-CMS-2.9.4-Server-Side-Request-Forgery.html +CVE-2022-28127 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1571 +CVE-2022-28132 - https://www.exploit-db.com/exploits/50939 +CVE-2022-2814 - https://vuldb.com/?id.206401 +CVE-2022-2816 - https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58 +CVE-2022-2817 - https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f +CVE-2022-28171 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html +CVE-2022-28171 - http://packetstormsecurity.com/files/173653/Hikvision-Hybrid-SAN-Ds-a71024-SQL-Injection.html +CVE-2022-28172 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html +CVE-2022-2818 - https://huntr.dev/bounties/ee27e5df-516b-4cf4-9f28-346d907b5491 +CVE-2022-28181 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28182 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28183 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28184 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28185 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28186 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28187 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28188 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28189 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-2819 - https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59 +CVE-2022-28190 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28191 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28192 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 +CVE-2022-28193 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 +CVE-2022-28194 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 +CVE-2022-28195 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 +CVE-2022-28196 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 +CVE-2022-28197 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343 +CVE-2022-28199 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8 +CVE-2022-2820 - https://huntr.dev/bounties/df06b7d7-6077-43a5-bd81-3cc66f0d4d19 +CVE-2022-2821 - https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069 +CVE-2022-28213 - http://packetstormsecurity.com/files/167046/SAP-BusinessObjects-Intelligence-4.3-XML-Injection.html +CVE-2022-28213 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28216 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28217 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28219 - http://packetstormsecurity.com/files/167997/ManageEngine-ADAudit-Plus-Path-Traversal-XML-Injection.html +CVE-2022-28219 - https://www.horizon3.ai/red-team-blog-cve-2022-28219/ +CVE-2022-28219 - https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html +CVE-2022-2823 - https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-af6bce6bb4ef +CVE-2022-2824 - https://huntr.dev/bounties/1ccb2d1c-6881-4813-a5bc-1603d29b7141 +CVE-2022-28282 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751609 +CVE-2022-28286 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735265 +CVE-2022-28287 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741515 +CVE-2022-2829 - https://huntr.dev/bounties/d6eaa453-9758-41b7-8c38-fd878d6aeab4 +CVE-2022-28290 - https://cybersecurityworks.com/zerodays/cve-2022-28290-reflected-cross-site-scripting-in-welaunch.html +CVE-2022-28291 - https://cybersecurityworks.com/blog/zero-days/csw-expert-discovers-a-zero-day-vulnerability-in-tenables-nessus-scanner.html +CVE-2022-2831 - https://developer.blender.org/T99705 +CVE-2022-2832 - https://developer.blender.org/D15463 +CVE-2022-2832 - https://developer.blender.org/T99706 +CVE-2022-28321 - http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/ +CVE-2022-28328 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf +CVE-2022-28329 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf +CVE-2022-2833 - https://developer.blender.org/T99711 +CVE-2022-2834 - https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae +CVE-2022-28345 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-42.md +CVE-2022-28345 - https://github.com/zadewg/RIUS +CVE-2022-28345 - https://sick.codes/sick-2022-42 +CVE-2022-28353 - http://packetstormsecurity.com/files/171403/MyBB-External-Redirect-Warning-1.3-Cross-Site-Scripting.html +CVE-2022-28354 - http://packetstormsecurity.com/files/171402/MyBB-Active-Threads-1.3.0-Cross-Site-Scripting.html +CVE-2022-28356 - http://www.openwall.com/lists/oss-security/2022/04/06/1 +CVE-2022-28356 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 +CVE-2022-28363 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html +CVE-2022-28363 - https://seclists.org/fulldisclosure/2022/Apr/1 +CVE-2022-28364 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html +CVE-2022-28364 - https://seclists.org/fulldisclosure/2022/Apr/1 +CVE-2022-28365 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html +CVE-2022-28365 - https://seclists.org/fulldisclosure/2022/Apr/1 +CVE-2022-28368 - http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html +CVE-2022-28381 - http://packetstormsecurity.com/files/166573/ALLMediaServer-1.6-Buffer-Overflow.html +CVE-2022-28382 - http://packetstormsecurity.com/files/167491/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-ECB-Issue.html +CVE-2022-28382 - http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html +CVE-2022-28382 - http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html +CVE-2022-28382 - http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html +CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/18 +CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/22 +CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/24 +CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/9 +CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Oct/4 +CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt +CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt +CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt +CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt +CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt +CVE-2022-28383 - http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Missing-Control.html +CVE-2022-28383 - http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html +CVE-2022-28383 - http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html +CVE-2022-28383 - http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html +CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/10 +CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/12 +CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/19 +CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/25 +CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Oct/5 +CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.txt +CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.txt +CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.txt +CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.txt +CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.txt +CVE-2022-28384 - http://packetstormsecurity.com/files/167481/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Cryptography-Issue.html +CVE-2022-28384 - http://packetstormsecurity.com/files/167499/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html +CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/17 +CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/8 +CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Oct/3 +CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt +CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt +CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt +CVE-2022-28385 - http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html +CVE-2022-28385 - http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html +CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/23 +CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/26 +CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-013.txt +CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-017.txt +CVE-2022-28386 - http://packetstormsecurity.com/files/167492/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Passcode-Retry.html +CVE-2022-28386 - http://packetstormsecurity.com/files/167509/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Behavior-Violation.html +CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/11 +CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/20 +CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Oct/6 +CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-004.txt +CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-008.txt +CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-046.txt +CVE-2022-28387 - http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html +CVE-2022-28387 - http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html +CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/13 +CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/21 +CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-009.txt +CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-014.txt +CVE-2022-2839 - https://wpscan.com/vulnerability/82e01f95-81c2-46d8-898e-07b3b8a3f8c9 +CVE-2022-28397 - https://ghost.org/docs/security/#privilege-escalation-attacks +CVE-2022-2840 - http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html +CVE-2022-2840 - https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c +CVE-2022-2841 - https://www.modzero.com/advisories/MZ-22-02-CrowdStrike-FalconSensor.txt +CVE-2022-2841 - https://www.modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html +CVE-2022-2841 - https://youtu.be/3If-Fqwx-4s +CVE-2022-28410 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-4.md +CVE-2022-28411 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-5.md +CVE-2022-28412 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-1.md +CVE-2022-28413 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-2.md +CVE-2022-2845 - https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445 +CVE-2022-28452 - https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL +CVE-2022-28452 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-28452 +CVE-2022-2846 - http://packetstormsecurity.com/files/171697/Calendar-Event-Multi-View-1.4.07-Cross-Site-Scripting.html +CVE-2022-2846 - https://wpscan.com/vulnerability/95f92062-08ce-478a-a2bc-6d026adf657c +CVE-2022-28463 - https://github.com/ImageMagick/ImageMagick/issues/4988 +CVE-2022-28468 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Payroll-Management-System +CVE-2022-2847 - https://vuldb.com/?id.206489 +CVE-2022-28471 - https://github.com/rockcarry/ffjpeg/issues/49 +CVE-2022-28478 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 +CVE-2022-28479 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28479 +CVE-2022-28480 - https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html +CVE-2022-28488 - https://github.com/marc-q/libwav/issues/29 +CVE-2022-28488 - https://github.com/tin-z/Stuff_and_POCs/blob/main/poc_libwav/POC +CVE-2022-2849 - https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e +CVE-2022-28491 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md +CVE-2022-28492 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/8/8.md +CVE-2022-28494 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md +CVE-2022-28495 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md +CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png +CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/giflib_poc +CVE-2022-28506 - https://sourceforge.net/p/giflib/bugs/159/ +CVE-2022-28507 - https://youtu.be/Ra7tWMs5dkk +CVE-2022-2852 - http://packetstormsecurity.com/files/169457/Chrome-AccountSelectionBubbleView-OnAccountImageFetched-Heap-Use-After-Free.html +CVE-2022-28521 - https://github.com/zhendezuile/bug_report/blob/main/zcms%EF%BC%9Aphp%20file%20inclusion +CVE-2022-28522 - https://github.com/zhendezuile/bug_report/blob/main/zcms +CVE-2022-2853 - http://packetstormsecurity.com/files/169459/Chrome-offline_items_collection-OfflineContentAggregator-OnItemRemoved-Heap-Buffer-Overflow.html +CVE-2022-28530 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html +CVE-2022-28531 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html +CVE-2022-28533 - https://packetstormsecurity.com/files/166539 +CVE-2022-28560 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/Tenda%20AC9 +CVE-2022-28561 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/AX12 +CVE-2022-28571 - https://github.com/F0und-icu/TempName/tree/main/Dlink-882 +CVE-2022-28571 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28572 - https://github.com/F0und-icu/TempName/tree/main/TendaAX18 +CVE-2022-28573 - https://github.com/F0und-icu/TempName/tree/main/Dlink-823pro +CVE-2022-28573 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28575 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1 +CVE-2022-28577 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/3 +CVE-2022-28578 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2 +CVE-2022-28579 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/4 +CVE-2022-28580 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/5 +CVE-2022-28581 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/9 +CVE-2022-28582 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6 +CVE-2022-28583 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7 +CVE-2022-28584 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/8 +CVE-2022-28586 - https://github.com/havok89/Hoosk/issues/63 +CVE-2022-28589 - https://github.com/pixelimity/pixelimity/issues/23 +CVE-2022-28598 - http://packetstormsecurity.com/files/171730/ERPNext-12.29-Cross-Site-Scripting.html +CVE-2022-28599 - https://github.com/daylightstudio/FUEL-CMS/issues/595 +CVE-2022-28601 - https://github.com/FlaviuPopescu/CVE-2022-28601 +CVE-2022-2862 - https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765 +CVE-2022-2863 - http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html +CVE-2022-2863 - https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5 +CVE-2022-28637 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us +CVE-2022-28638 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us +CVE-2022-28639 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us +CVE-2022-28640 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us +CVE-2022-28664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509 +CVE-2022-28665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509 +CVE-2022-28669 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28670 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28671 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28672 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28673 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28674 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28675 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28676 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28677 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28678 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28679 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28680 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28681 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28682 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28683 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-28689 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521 +CVE-2022-28703 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532 +CVE-2022-2871 - https://huntr.dev/bounties/61126c07-22ac-4961-a198-1aa33060b373 +CVE-2022-28710 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550 +CVE-2022-28711 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512 +CVE-2022-28712 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540 +CVE-2022-2872 - https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56 +CVE-2022-2873 - https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/ +CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/30 +CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/42 +CVE-2022-2874 - https://huntr.dev/bounties/95f97dfe-247d-475d-9740-b7adc71f4c79 +CVE-2022-2877 - https://wpscan.com/vulnerability/f1af4267-3a43-4b88-a8b9-c1d5b2aa9d68 +CVE-2022-28770 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28771 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28772 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28773 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28774 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-28780 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28781 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28782 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28783 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28784 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28785 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28786 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28787 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28788 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5 +CVE-2022-28794 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-28795 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2022-28796 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 +CVE-2022-28802 - https://www.zenity.io/blog/zapescape-vulnerability-disclosure/ +CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00001.html +CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00070.html +CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-04/msg00009.html +CVE-2022-28810 - http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html +CVE-2022-28810 - https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/ +CVE-2022-2884 - http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html +CVE-2022-2884 - https://gitlab.com/gitlab-org/gitlab/-/issues/371098 +CVE-2022-2885 - https://huntr.dev/bounties/edeed309-be07-4373-b15e-2d1eb415eb89 +CVE-2022-2886 - https://vuldb.com/?id.206688 +CVE-2022-28862 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-28862 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2022-28863 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-28864 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-28865 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-28866 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-28866 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html +CVE-2022-28867 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-2887 - https://wpscan.com/vulnerability/237541d5-c1a5-44f2-8e5f-82457b8f9497 +CVE-2022-2888 - https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629 +CVE-2022-28888 - http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html +CVE-2022-28888 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html +CVE-2022-28888 - http://seclists.org/fulldisclosure/2022/Jul/4 +CVE-2022-28888 - https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ +CVE-2022-2889 - https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa +CVE-2022-28893 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a +CVE-2022-28895 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/1 +CVE-2022-28895 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28896 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/2 +CVE-2022-28896 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-2890 - https://huntr.dev/bounties/5d228a33-eda3-4cff-91da-7bc43e6636da +CVE-2022-28901 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/3 +CVE-2022-28901 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28905 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/1 +CVE-2022-28906 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/2 +CVE-2022-28907 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/5 +CVE-2022-28908 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/4 +CVE-2022-28909 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/3 +CVE-2022-28910 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/9 +CVE-2022-28911 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/7 +CVE-2022-28912 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/8 +CVE-2022-28913 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/10 +CVE-2022-28915 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/1 +CVE-2022-28915 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28917 - https://github.com/NSSCYCTFER/SRC-CVE +CVE-2022-28921 - https://www.0xlanks.me/blog/cve-2022-28921-advisory/ +CVE-2022-28924 - https://suumcuique.org/blog/posts/information-disclosure-vulnerability-universis +CVE-2022-28927 - https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03 +CVE-2022-28932 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28944 - https://github.com/gerr-re/cve-2022-28944/blob/main/cve-2022-28944_public-advisory.pdf +CVE-2022-28955 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28956 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-28958 - https://vulncheck.com/blog/moobot-uses-fake-vulnerability +CVE-2022-28959 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ +CVE-2022-28960 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ +CVE-2022-28961 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ +CVE-2022-28962 - https://packetstormsecurity.com/files/166598/Online-Sports-Complex-Booking-System-1.0-SQL-Injection.html +CVE-2022-28966 - https://github.com/wasm3/wasm3/issues/320 +CVE-2022-28969 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetWifiGusetBasic +CVE-2022-28970 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/GetParentControlInfo/readme.md +CVE-2022-28971 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md +CVE-2022-28972 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/form_fast_setting_wifi_set/readme.md +CVE-2022-28973 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromAdvSetMacMtuWan/readme.md +CVE-2022-28975 - https://piotrryciak.com/posts/xss-infoblox/ +CVE-2022-28979 - https://issues.liferay.com/browse/LPE-17381 +CVE-2022-28986 - https://github.com/FlaviuPopescu/CVE-2022-28986 +CVE-2022-28987 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.md +CVE-2022-28990 - https://github.com/wasm3/wasm3/issues/323 +CVE-2022-28991 - https://packetstormsecurity.com/files/166590/Multi-Store-Inventory-Management-System-1.0-Information-Disclosure.html +CVE-2022-28992 - https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html +CVE-2022-28993 - https://packetstormsecurity.com/files/166591/Multi-Store-Inventory-Management-System-1.0-Account-Takeover.html +CVE-2022-28994 - https://packetstormsecurity.com/files/166622/Small-HTTP-Server-3.06-Remote-Buffer-Overflow.html +CVE-2022-28997 - https://packetstormsecurity.com/files/166613/CSZCMS-1.3.0-SSRF-LFI-Remote-Code-Execution.html +CVE-2022-28998 - https://packetstormsecurity.com/files/166381/Xlight-FTP-3.9.3.2-Buffer-Overflow.html +CVE-2022-29002 - https://github.com/xuxueli/xxl-job/issues/2821 +CVE-2022-29006 - https://www.exploit-db.com/exploits/50370 +CVE-2022-29007 - https://www.exploit-db.com/exploits/50365 +CVE-2022-29008 - https://www.exploit-db.com/exploits/50263 +CVE-2022-29009 - https://www.exploit-db.com/exploits/50355 +CVE-2022-2901 - https://huntr.dev/bounties/cf46e0a6-f1b5-4959-a952-be9e4bac03fe +CVE-2022-29013 - https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-Injection.html +CVE-2022-29013 - https://www.exploit-db.com/exploits/50865 +CVE-2022-29014 - https://packetstormsecurity.com/files/166683/Razer-Sila-2.0.418-Local-File-Inclusion.html +CVE-2022-29014 - https://www.exploit-db.com/exploits/50864 +CVE-2022-29017 - https://github.com/axiomatic-systems/Bento4/issues/691 +CVE-2022-29021 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities +CVE-2022-29022 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities +CVE-2022-29023 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities +CVE-2022-2903 - https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864 +CVE-2022-29034 - http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html +CVE-2022-29034 - http://seclists.org/fulldisclosure/2022/Jun/35 +CVE-2022-29072 - http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html +CVE-2022-29072 - https://github.com/kagancapar/CVE-2022-29072 +CVE-2022-29072 - https://news.ycombinator.com/item?id=31070256 +CVE-2022-29072 - https://www.youtube.com/watch?v=sT1cvbu7ZTA +CVE-2022-29078 - https://eslam.io/posts/ejs-server-side-template-injection-rce/ +CVE-2022-29080 - https://github.com/barneycarroll/npm-dependency-versions/issues/6 +CVE-2022-29081 - https://www.tenable.com/security/research/tra-2022-14 +CVE-2022-2909 - https://vuldb.com/?id.206845 +CVE-2022-2912 - https://wpscan.com/vulnerability/fd9853e8-b3ae-4a10-8389-8a4a11a8297c +CVE-2022-2913 - https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1 +CVE-2022-29156 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 +CVE-2022-29181 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-29181 - https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/ +CVE-2022-2921 - https://huntr.dev/bounties/51b32a1c-946b-4390-a212-b6c4b6e4115c +CVE-2022-29217 - https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc +CVE-2022-29217 - https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24 +CVE-2022-2922 - https://huntr.dev/bounties/74918f40-dc11-4218-abef-064eb71a0703 +CVE-2022-29224 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49 +CVE-2022-29225 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh +CVE-2022-29226 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh +CVE-2022-29227 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6 +CVE-2022-29228 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6 +CVE-2022-2923 - https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2 +CVE-2022-2924 - https://huntr.dev/bounties/f0f3aded-6e97-4cf2-980a-c90f2c6ca0e0 +CVE-2022-2925 - https://huntr.dev/bounties/a3b4148f-165f-4583-abed-5568696d99dc +CVE-2022-2926 - https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785 +CVE-2022-29269 - https://github.com/4LPH4-NL/CVEs +CVE-2022-29269 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi +CVE-2022-2927 - https://huntr.dev/bounties/7fa956dd-f541-4dcd-987d-ba15caa6a886 +CVE-2022-29270 - https://github.com/4LPH4-NL/CVEs +CVE-2022-29270 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi +CVE-2022-29271 - https://github.com/4LPH4-NL/CVEs +CVE-2022-29271 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi +CVE-2022-29272 - https://github.com/4LPH4-NL/CVEs +CVE-2022-29272 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi +CVE-2022-29287 - https://devnet.kentico.com/download/hotfixes +CVE-2022-29296 - http://packetstormsecurity.com/files/167341/Avantune-Genialcloud-ProJ-10-Cross-Site-Scripting.html +CVE-2022-29296 - https://dl.packetstormsecurity.net/2206-exploits/avantunegenialcloudproj10-xss.txt +CVE-2022-29298 - http://packetstormsecurity.com/files/167383/SolarView-Compact-6.00-Directory-Traversal.html +CVE-2022-2930 - https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477 +CVE-2022-29303 - http://packetstormsecurity.com/files/167183/SolarView-Compact-6.0-Command-Injection.html +CVE-2022-29303 - https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing +CVE-2022-29305 - https://github.com/helloxz/imgurl/issues/75 +CVE-2022-29315 - https://the-it-wonders.blogspot.com/2022/04/csv-injection-in-acunetix-version.html +CVE-2022-2932 - https://huntr.dev/bounties/2-other-bustle/mobiledoc-kit +CVE-2022-29320 - https://www.exploit-db.com/exploits/50859 +CVE-2022-29321 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/4 +CVE-2022-29321 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29322 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/5 +CVE-2022-29322 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29323 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/3 +CVE-2022-29323 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29324 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/6 +CVE-2022-29324 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29325 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/8 +CVE-2022-29325 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29326 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/7 +CVE-2022-29326 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29327 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/9 +CVE-2022-29327 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29328 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/1 +CVE-2022-29328 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29329 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/2 +CVE-2022-29329 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29332 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf +CVE-2022-29333 - https://www.youtube.com/watch?v=r75k-ae3_ng +CVE-2022-29333 - https://youtu.be/B46wtd-ZNog +CVE-2022-29339 - https://github.com/gpac/gpac/issues/2165 +CVE-2022-29340 - https://github.com/gpac/gpac/issues/2163 +CVE-2022-29347 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2022-29347 +CVE-2022-29349 - https://github.com/kekingcn/kkFileView/issues/347 +CVE-2022-29351 - https://www.youtube.com/watch?v=F_DBx4psWns +CVE-2022-29358 - https://github.com/kevinboone/epub2txt2/issues/22 +CVE-2022-29360 - https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/ +CVE-2022-29363 - https://github.com/qinggan/phpok/issues/12 +CVE-2022-29368 - https://github.com/Moddable-OpenSource/moddable/issues/896 +CVE-2022-29369 - https://github.com/nginx/njs/issues/467 +CVE-2022-2938 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848 +CVE-2022-29380 - https://www.exploit-db.com/exploits/49298 +CVE-2022-29391 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/5.setStaticDhcpConfig +CVE-2022-29392 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/2.setPortForwardRules +CVE-2022-29393 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules +CVE-2022-29394 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/1.setWiFiAclAddConfig +CVE-2022-29395 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/6.setWiFiRepeaterConfig +CVE-2022-29396 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/8.setIpPortFilterRules +CVE-2022-29397 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/4.setMacFilterRules +CVE-2022-29398 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/7.UploadCustomModule +CVE-2022-29399 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/9.setUrlFilterRules +CVE-2022-2941 - http://packetstormsecurity.com/files/168479/WordPress-WP-UserOnline-2.88.0-Cross-Site-Scripting.html +CVE-2022-2941 - https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt +CVE-2022-29418 - https://patchstack.com/database/vulnerability/night-mode/wordpress-night-mode-plugin-1-0-0-authenticated-persistent-cross-site-scripting-xss-vulnerability +CVE-2022-2943 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 +CVE-2022-2945 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 +CVE-2022-29455 - https://rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor +CVE-2022-29457 - http://packetstormsecurity.com/files/167051/ManageEngine-ADSelfService-Plus-Build-6118-NTLMv2-Hash-Exposure.html +CVE-2022-29458 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html +CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html +CVE-2022-2946 - https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 +CVE-2022-29464 - http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html +CVE-2022-29464 - http://www.openwall.com/lists/oss-security/2022/04/22/7 +CVE-2022-29464 - https://github.com/hakivvi/CVE-2022-29464 +CVE-2022-29465 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1526 +CVE-2022-29468 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1534 +CVE-2022-2947 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 +CVE-2022-29472 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566 +CVE-2022-29475 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1553 +CVE-2022-29477 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554 +CVE-2022-29481 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518 +CVE-2022-2949 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 +CVE-2022-29496 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1524 +CVE-2022-2950 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 +CVE-2022-29503 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517 +CVE-2022-2951 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01 +CVE-2022-29511 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530 +CVE-2022-29517 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1529 +CVE-2022-29520 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1561 +CVE-2022-2953 - https://gitlab.com/libtiff/libtiff/-/issues/414 +CVE-2022-29537 - https://github.com/gpac/gpac/issues/2173 +CVE-2022-29538 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-29539 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-29540 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-29548 - http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html +CVE-2022-29549 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html +CVE-2022-29549 - https://blog.qualys.com/vulnerabilities-threat-research +CVE-2022-29550 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html +CVE-2022-29550 - https://blog.qualys.com/vulnerabilities-threat-research +CVE-2022-29557 - https://github.com/Q2Flc2FySec/CVE-List/blob/main/CVE-2022-29557.txt +CVE-2022-29566 - https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/ +CVE-2022-29577 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-2958 - https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a +CVE-2022-29581 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html +CVE-2022-29581 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html +CVE-2022-29581 - http://www.openwall.com/lists/oss-security/2022/05/18/2 +CVE-2022-29581 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8 +CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/04/22/4 +CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/08/08/3 +CVE-2022-29582 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3 +CVE-2022-29582 - https://www.openwall.com/lists/oss-security/2022/04/22/3 +CVE-2022-29586 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/ +CVE-2022-29587 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/ +CVE-2022-29588 - http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html +CVE-2022-2959 - https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a +CVE-2022-29592 - https://github.com/H4niz/Vulnerability/blob/main/Tenda-TX9-V22.03.02.10-19042022-3.md +CVE-2022-29593 - http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html +CVE-2022-29593 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ +CVE-2022-29593 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2022-29596 - https://github.com/haxpunk1337/Microstrategy-Poc/blob/main/poc +CVE-2022-29597 - https://github.com/TheGetch/CVE-2022-29597 +CVE-2022-29598 - https://github.com/TheGetch/CVE-2022-29598 +CVE-2022-29603 - https://suumcuique.org/blog/posts/sql-injection-vulnerability-universis/ +CVE-2022-29610 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29611 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29612 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29613 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29614 - http://packetstormsecurity.com/files/168409/SAP-SAPControl-Web-Service-Interface-Local-Privilege-Escalation.html +CVE-2022-29614 - http://seclists.org/fulldisclosure/2022/Sep/18 +CVE-2022-29614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29619 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-29620 - https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643 +CVE-2022-29620 - https://youtu.be/ErZl1i7McHk +CVE-2022-29622 - https://medium.com/@zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 +CVE-2022-29622 - https://www.youtube.com/watch?v=C6QPKooxhAo +CVE-2022-29631 - https://github.com/oblac/jodd-http/issues/9 +CVE-2022-29631 - https://github.com/oblac/jodd/issues/787 +CVE-2022-29633 - https://github.com/awake1t/linglong +CVE-2022-29638 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md +CVE-2022-29640 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/3.md +CVE-2022-29641 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/4.md +CVE-2022-29642 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/5.md +CVE-2022-29643 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/6.md +CVE-2022-29646 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/9.md +CVE-2022-2965 - https://huntr.dev/bounties/61e3bdf7-3548-45ea-b105-967abc0977f4 +CVE-2022-29650 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Unauthenticated_Sql_Injection +CVE-2022-29651 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Remote_Code_Execution +CVE-2022-29652 - https://packetstormsecurity.com/files/166641/Online-Sports-Complex-Booking-System-1.0-Cross-Site-Scripting.html +CVE-2022-29654 - https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f +CVE-2022-29659 - https://packetstormsecurity.com/files/158391/responsiveonlineblog10poc-sql.txt +CVE-2022-29660 - https://github.com/chshcms/cscms/issues/25#issue-1207649017 +CVE-2022-29661 - https://github.com/chshcms/cscms/issues/21#issue-1207638326 +CVE-2022-29663 - https://github.com/chshcms/cscms/issues/22#issue-1207641519 +CVE-2022-29664 - https://github.com/chshcms/cscms/issues/23#issue-1207644525 +CVE-2022-29666 - https://github.com/chshcms/cscms/issues/24#issue-1207646618 +CVE-2022-29667 - https://github.com/chshcms/cscms/issues/26#issue-1207651726 +CVE-2022-29669 - https://github.com/chshcms/cscms/issues/20#issue-1207634969 +CVE-2022-29670 - https://github.com/chshcms/cscms/issues/21#issue-1207638326 +CVE-2022-29676 - https://github.com/chshcms/cscms/issues/24#issue-1207646618 +CVE-2022-29680 - https://github.com/chshcms/cscms/issues/31#issue-1209052957 +CVE-2022-29681 - https://github.com/chshcms/cscms/issues/35#issue-1209058818 +CVE-2022-29682 - https://github.com/chshcms/cscms/issues/36#issue-1209060196 +CVE-2022-29683 - https://github.com/chshcms/cscms/issues/34#issue-1209056912 +CVE-2022-29684 - https://github.com/chshcms/cscms/issues/33#issue-1209055493 +CVE-2022-29685 - https://github.com/chshcms/cscms/issues/32#issue-1209054307 +CVE-2022-29686 - https://github.com/chshcms/cscms/issues/29#issue-1209046027 +CVE-2022-29687 - https://github.com/chshcms/cscms/issues/30#issue-1209049714 +CVE-2022-29688 - https://github.com/chshcms/cscms/issues/27#issue-1209040138 +CVE-2022-29689 - https://github.com/chshcms/cscms/issues/28#issue-1209044410 +CVE-2022-29692 - https://github.com/unicorn-engine/unicorn/issues/1578 +CVE-2022-29693 - https://github.com/unicorn-engine/unicorn/issues/1586 +CVE-2022-29694 - https://github.com/unicorn-engine/unicorn/issues/1588 +CVE-2022-29695 - https://github.com/unicorn-engine/unicorn/issues/1595 +CVE-2022-29704 - https://www.youtube.com/watch?v=ECTu2QVAl1c +CVE-2022-29709 - https://packetstormsecurity.com/files/167240/CLink-Office-2.0-SQL-Injection.html +CVE-2022-29721 - https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/2 +CVE-2022-29727 - http://packetstormsecurity.com/files/167187/Survey-Sparrow-Enterprise-Survey-Software-2022-Cross-Site-Scripting.html +CVE-2022-29729 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php +CVE-2022-29730 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php +CVE-2022-29731 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5700.php +CVE-2022-29732 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5703.php +CVE-2022-29733 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5704.php +CVE-2022-29734 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5699.php +CVE-2022-29735 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5702.php +CVE-2022-2977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f +CVE-2022-29770 - https://github.com/xuxueli/xxl-job/issues/2836 +CVE-2022-29776 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29776 +CVE-2022-29777 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29777 +CVE-2022-29778 - https://github.com/TyeYeah/DIR-890L-1.20-RCE +CVE-2022-29778 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-29779 - https://github.com/nginx/njs/issues/485 +CVE-2022-29780 - https://github.com/nginx/njs/issues/486 +CVE-2022-2980 - https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea +CVE-2022-29804 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ +CVE-2022-29806 - http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html +CVE-2022-29806 - https://krastanoel.com/cve/2022-29806 +CVE-2022-2981 - https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305 +CVE-2022-2982 - https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be +CVE-2022-29824 - http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html +CVE-2022-29824 - http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html +CVE-2022-29824 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-29825 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29826 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29827 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29828 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29829 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-2983 - https://wpscan.com/vulnerability/e2af8c7f-9bd4-4902-8df8-72ffb414fdbf +CVE-2022-29830 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29831 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29832 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29833 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf +CVE-2022-29835 - https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396 +CVE-2022-29836 - https://www.westerndigital.com/support/product-security/wdc-22016-my-cloud-home-ibi-firmware-version-8-11-0-113 +CVE-2022-29837 - https://www.westerndigital.com/support/product-security/wdc-22018-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-8-12-0-178 +CVE-2022-29838 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124 +CVE-2022-29839 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124 +CVE-2022-29840 - https://www.westerndigital.com/support/product-security +CVE-2022-29841 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119 +CVE-2022-29842 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119 +CVE-2022-29851 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html +CVE-2022-29854 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html +CVE-2022-29854 - http://seclists.org/fulldisclosure/2022/Jun/32 +CVE-2022-29854 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 +CVE-2022-29855 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html +CVE-2022-29855 - http://seclists.org/fulldisclosure/2022/Jun/32 +CVE-2022-29855 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 +CVE-2022-29856 - https://dolosgroup.io/blog +CVE-2022-29858 - https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/ +CVE-2022-29862 - https://opcfoundation.org/security/ +CVE-2022-29863 - https://opcfoundation.org/security/ +CVE-2022-29864 - https://opcfoundation.org/security/ +CVE-2022-29865 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf +CVE-2022-29865 - https://opcfoundation.org/security/ +CVE-2022-29866 - https://opcfoundation.org/security/ +CVE-2022-2987 - https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67 +CVE-2022-29875 - https://www.siemens-healthineers.com/support-documentation/cybersecurity/shsa-455016 +CVE-2022-29885 - http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html +CVE-2022-29885 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-29886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1533 +CVE-2022-29888 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1522 +CVE-2022-29889 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1569 +CVE-2022-2989 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ +CVE-2022-29894 - https://github.com/strapi/strapi +CVE-2022-2990 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ +CVE-2022-29909 - https://bugzilla.mozilla.org/show_bug.cgi?id=1755081 +CVE-2022-29912 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692655 +CVE-2022-29914 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746448 +CVE-2022-29915 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751678 +CVE-2022-29916 - https://bugzilla.mozilla.org/show_bug.cgi?id=1760674 +CVE-2022-2992 - http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html +CVE-2022-29932 - https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md +CVE-2022-29933 - http://packetstormsecurity.com/files/166989/Craft-CMS-3.7.36-Password-Reset-Poisoning-Attack.html +CVE-2022-29933 - https://sec-consult.com/vulnerability-lab/advisory/password-reset-poisoning-attack-craft-cms/ +CVE-2022-29938 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r +CVE-2022-29939 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r +CVE-2022-29940 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r +CVE-2022-29945 - https://www.theverge.com/2022/4/28/23046916/dji-aeroscope-signals-not-encrypted-drone-tracking +CVE-2022-29948 - http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html +CVE-2022-29948 - http://seclists.org/fulldisclosure/2022/Jun/27 +CVE-2022-29948 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt +CVE-2022-2995 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ +CVE-2022-29950 - https://gist.github.com/Voidager88/73c2d512a72cceb0ef84dbf87a497d10 +CVE-2022-29951 - https://www.forescout.com/blog/ +CVE-2022-29952 - https://www.forescout.com/blog/ +CVE-2022-29953 - https://www.forescout.com/blog/ +CVE-2022-29957 - https://www.forescout.com/blog/ +CVE-2022-29958 - https://www.forescout.com/blog/ +CVE-2022-29959 - https://www.forescout.com/blog/ +CVE-2022-29960 - https://www.forescout.com/blog/ +CVE-2022-29962 - https://www.forescout.com/blog/ +CVE-2022-29963 - https://www.forescout.com/blog/ +CVE-2022-29964 - https://www.forescout.com/blog/ +CVE-2022-29965 - https://www.forescout.com/blog/ +CVE-2022-2997 - https://huntr.dev/bounties/c09bf21b-50d2-49f0-8c92-49f6b3c358d8 +CVE-2022-29971 - https://www.magnitude.com/products/data-connectivity +CVE-2022-29972 - https://www.magnitude.com/products/data-connectivity +CVE-2022-29975 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20CC%20endpoint +CVE-2022-29976 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20BCC%20endpoint +CVE-2022-29977 - https://github.com/saitoha/libsixel/issues/165 +CVE-2022-29978 - https://github.com/saitoha/libsixel/issues/166 +CVE-2022-3000 - https://huntr.dev/bounties/a060d3dd-6fdd-4958-82a9-364df1cb770c +CVE-2022-30003 - https://packetstormsecurity.com/files/168250/omps10-xss.txt +CVE-2022-30004 - https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html +CVE-2022-30014 - https://github.com/offsecin/bugsdisclose/blob/main/csrf +CVE-2022-3002 - https://huntr.dev/bounties/d213d7ea-fe92-40b2-a1f9-2ba32dec50f5 +CVE-2022-30036 - https://parzival.sh/posts/Pwning-a-Lighting-Console-in-a-Few-Minutes/ +CVE-2022-30037 - https://weltolk.github.io/p/xunruicms-v4.3.3-to-v4.5.1-backstage-code-injection-vulnerabilityfile-write-and-file-inclusion/ +CVE-2022-3004 - https://huntr.dev/bounties/461e5f8f-17cf-4be4-9149-111d0bd92d14 +CVE-2022-30040 - https://github.com/Le1a/CVE-2022-30040 +CVE-2022-30040 - https://github.com/Le1a/Tenda-AX1803-Denial-of-service +CVE-2022-30045 - https://sourceforge.net/p/ezxml/bugs/29/ +CVE-2022-3005 - https://huntr.dev/bounties/4b144433-a979-4c4e-a627-659838acc217 +CVE-2022-30052 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/acetech/2022/Home-Clean-Service-System +CVE-2022-30053 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Toll-Tax-Management-System +CVE-2022-30054 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Covid-19-Travel-Pass-Management +CVE-2022-30055 - https://packetstormsecurity.com/files/166840/Prime95-30.7-Build-9-Buffer-Overflow.html +CVE-2022-30067 - https://gitlab.gnome.org/GNOME/gimp/-/issues/8120 +CVE-2022-30075 - http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html +CVE-2022-30075 - https://github.com/aaronsvk +CVE-2022-30075 - https://github.com/aaronsvk/CVE-2022-30075 +CVE-2022-30075 - https://www.exploit-db.com/exploits/50962 +CVE-2022-30076 - http://packetstormsecurity.com/files/171777/ENTAB-ERP-1.0-Information-Disclosure.html +CVE-2022-30078 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md +CVE-2022-30079 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30079/CVE-2022-30079.md +CVE-2022-3008 - https://github.com/syoyo/tinygltf/issues/368 +CVE-2022-30105 - https://www.exploitee.rs/index.php/Belkin_N300#Remote_Root +CVE-2022-30111 - https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html +CVE-2022-30111 - https://www.youtube.com/watch?v=EruaGuE-cWI +CVE-2022-30114 - https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/ +CVE-2022-3012 - https://vuldb.com/?id.207422 +CVE-2022-30126 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-3013 - https://vuldb.com/?id.207423 +CVE-2022-3014 - https://vuldb.com/?id.207424 +CVE-2022-3015 - https://vuldb.com/?id.207425 +CVE-2022-30150 - http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html +CVE-2022-30155 - http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html +CVE-2022-3016 - https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371 +CVE-2022-30164 - http://packetstormsecurity.com/files/167716/Windows-Kerberos-KerbRetrieveEncodedTicketMessage-AppContainer-Privilege-Escalation.html +CVE-2022-30165 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html +CVE-2022-30166 - http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html +CVE-2022-30168 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30168 +CVE-2022-3017 - https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0 +CVE-2022-30174 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30174 +CVE-2022-30190 - http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html +CVE-2022-3021 - https://wpscan.com/vulnerability/3c5ff229-85c2-49c2-8fb9-6419a8002a4e +CVE-2022-30239 - https://www.magnitude.com/products/data-connectivity +CVE-2022-3024 - https://wpscan.com/vulnerability/7f43cb8e-0c1b-4528-8c5c-b81ab42778dc +CVE-2022-30240 - https://www.magnitude.com/products/data-connectivity +CVE-2022-30242 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities +CVE-2022-30242 - https://www.honeywell.com/us/en/product-security +CVE-2022-30243 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities +CVE-2022-30243 - https://www.honeywell.com/us/en/product-security +CVE-2022-30244 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities +CVE-2022-30244 - https://www.honeywell.com/us/en/product-security +CVE-2022-30245 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities +CVE-2022-30245 - https://www.honeywell.com/us/en/product-security +CVE-2022-3025 - https://wpscan.com/vulnerability/66bc783b-67e1-4bd0-99c0-322873b3a22a +CVE-2022-30262 - https://www.forescout.com/blog/ +CVE-2022-30264 - https://www.forescout.com/blog/ +CVE-2022-30269 - https://www.forescout.com/blog/ +CVE-2022-30270 - https://www.forescout.com/blog/ +CVE-2022-30271 - https://www.forescout.com/blog/ +CVE-2022-30272 - https://www.forescout.com/blog/ +CVE-2022-30273 - https://www.forescout.com/blog/ +CVE-2022-30274 - https://www.forescout.com/blog/ +CVE-2022-30275 - https://www.forescout.com/blog/ +CVE-2022-30276 - https://www.forescout.com/blog/ +CVE-2022-30280 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-30284 - https://www.swascan.com/security-advisory-libnmap-2/ +CVE-2022-30286 - http://packetstormsecurity.com/files/167069/PyScript-2022-05-04-Alpha-Source-Code-Disclosure.html +CVE-2022-30286 - https://cyber-guy.gitbook.io/cyber-guy/pocs/pyscript-file-read +CVE-2022-30286 - https://www.exploit-db.com/exploits/50918 +CVE-2022-30292 - https://github.com/sprushed/CVE-2022-30292 +CVE-2022-30293 - https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.36.0 +CVE-2022-3030 - https://gitlab.com/gitlab-org/gitlab/-/issues/37959 +CVE-2022-30312 - https://www.forescout.com/blog/ +CVE-2022-30313 - https://www.forescout.com/blog/ +CVE-2022-30314 - https://www.forescout.com/blog/ +CVE-2022-30315 - https://www.forescout.com/blog/ +CVE-2022-30316 - https://www.forescout.com/blog/ +CVE-2022-30317 - https://www.forescout.com/blog/ +CVE-2022-30318 - https://www.forescout.com/blog/ +CVE-2022-30319 - https://www.forescout.com/blog/ +CVE-2022-30320 - https://www.forescout.com/blog/ +CVE-2022-30325 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ +CVE-2022-30325 - https://research.nccgroup.com/?research=Technical+advisories +CVE-2022-30326 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ +CVE-2022-30326 - https://research.nccgroup.com/?research=Technical+advisories +CVE-2022-30327 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ +CVE-2022-30327 - https://research.nccgroup.com/?research=Technical+advisories +CVE-2022-30328 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ +CVE-2022-30328 - https://research.nccgroup.com/?research=Technical+advisories +CVE-2022-30329 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ +CVE-2022-30329 - https://research.nccgroup.com/?research=Technical+advisories +CVE-2022-30330 - https://blog.inhq.net/posts/keepkey-CVE-2022-30330/ +CVE-2022-30333 - http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html +CVE-2022-30333 - https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ +CVE-2022-30335 - https://gist.github.com/aliceicl/b2f25f3a0a3ba9973e4977f922d04008 +CVE-2022-3035 - https://huntr.dev/bounties/0bbb1046-ea9e-4cb9-bc91-b294a72d1902 +CVE-2022-30352 - https://www.exploit-db.com/exploits/50071 +CVE-2022-3036 - https://wpscan.com/vulnerability/0dbc85dd-736c-492e-9db8-acb7195771aa +CVE-2022-3037 - https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5 +CVE-2022-3038 - http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html +CVE-2022-30422 - https://www.swascan.com/it/security-advisory-proietti-planet-time-enterprise-cve-2022-30422/ +CVE-2022-30425 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5706.php +CVE-2022-30426 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md +CVE-2022-30427 - https://github.com/gphper/ginadmin/issues/8 +CVE-2022-30428 - https://github.com/gphper/ginadmin/issues/9 +CVE-2022-30466 - https://github.com/nsbogam/ebike +CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer +CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer/blob/main/README.md +CVE-2022-30469 - https://github.com/blockomat2100/PoCs/blob/main/filerun/CVE-2022-30469.md +CVE-2022-30472 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1 +CVE-2022-30473 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/2 +CVE-2022-30474 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5 +CVE-2022-30475 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/3 +CVE-2022-30476 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6 +CVE-2022-30477 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/4 +CVE-2022-30490 - https://github.com/yasinyildiz26/Badminton-Center-Management-System +CVE-2022-30503 - https://github.com/nginx/njs/issues/478 +CVE-2022-30508 - https://github.com/1security/Vulnerability/blob/master/web/dedecms/1.md +CVE-2022-30515 - https://codingkoala.eu/posts/CVE202230515/ +CVE-2022-30518 - https://packetstormsecurity.com/files/166984/ChatBot-Application-With-A-Suggestion-Feature-1.0-SQL-Injection.html +CVE-2022-30519 - http://packetstormsecurity.com/files/171627/Reprise-Software-RLM-14.2BL4-Cross-Site-Scripting.html +CVE-2022-30519 - https://github.com/earth2sky/Disclosed/blob/main/CVE-2022-30519 +CVE-2022-30521 - https://github.com/winmt/CVE/blob/main/DIR-890L/README.md +CVE-2022-30521 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-30524 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42261 +CVE-2022-30525 - http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html +CVE-2022-30525 - http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html +CVE-2022-30525 - http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html +CVE-2022-30525 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html +CVE-2022-30526 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html +CVE-2022-30534 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1546 +CVE-2022-30541 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1557 +CVE-2022-30543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519 +CVE-2022-30547 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547 +CVE-2022-30551 - https://opcfoundation.org +CVE-2022-30552 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ +CVE-2022-30557 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-30580 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ +CVE-2022-30584 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341 +CVE-2022-30585 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341 +CVE-2022-30594 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html +CVE-2022-30594 - http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html +CVE-2022-30594 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 +CVE-2022-3060 - https://gitlab.com/gitlab-org/gitlab/-/issues/365427 +CVE-2022-30603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1562 +CVE-2022-30605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535 +CVE-2022-30607 - https://www.ibm.com/support/pages/node/6595759 +CVE-2022-3062 - https://wpscan.com/vulnerability/2e829bbe-1843-496d-a852-4150fa6d1f7a +CVE-2022-30629 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ +CVE-2022-30634 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ +CVE-2022-3065 - https://huntr.dev/bounties/5f3bc4b6-1d53-46b7-a23d-70f5faaf0c76 +CVE-2022-3068 - https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884 +CVE-2022-30688 - https://github.com/liske/needrestart/releases/tag/v3.6 +CVE-2022-3069 - https://wpscan.com/vulnerability/a9918dfd-389c-43eb-afcc-03d29b42b369 +CVE-2022-30690 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1539 +CVE-2022-3070 - https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c +CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin +CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin/blob/main/exploit.py +CVE-2022-30708 - https://github.com/webmin/webmin/issues/1635 +CVE-2022-30709 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30710 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30711 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30712 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30713 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30714 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30715 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30716 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30717 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30719 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-3072 - https://huntr.dev/bounties/9755ae6a-b08b-40a0-8089-c723b2d9ca52 +CVE-2022-30720 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30721 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30722 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30723 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30724 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30725 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30726 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30727 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30728 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-30729 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 +CVE-2022-3074 - https://wpscan.com/vulnerability/90ebaedc-89df-413f-b22e-753d4dd5e1c3 +CVE-2022-30759 - https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html +CVE-2022-3076 - https://wpscan.com/vulnerability/d18e695b-4d6e-4ff6-a060-312594a0d2bd +CVE-2022-30763 - https://blog.convisoappsec.com/en/bug-hunting-in-the-janet-language-interpreter/ +CVE-2022-30768 - https://medium.com/@dk50u1/stored-xss-in-zoneminder-up-to-v1-36-12-f26b4bb68c31 +CVE-2022-30769 - https://medium.com/@dk50u1/session-fixation-in-zoneminder-up-to-v1-36-12-3c850b1fbbf3 +CVE-2022-30775 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264 +CVE-2022-30776 - https://medium.com/@bhattronit96/cve-2022-30776-cd34f977c2b9 +CVE-2022-30777 - https://medium.com/@bhattronit96/cve-2022-30777-45725763ab59 +CVE-2022-30778 - https://github.com/1nhann/vulns/issues/1 +CVE-2022-30779 - https://github.com/1nhann/vulns/issues/2 +CVE-2022-3078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e6a21a14106d9718aa4f8e115b1e474888eeba44 +CVE-2022-30780 - https://podalirius.net/en/cves/2022-30780/ +CVE-2022-30781 - http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html +CVE-2022-30781 - http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html +CVE-2022-30783 - http://www.openwall.com/lists/oss-security/2022/06/07/4 +CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 +CVE-2022-30784 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30785 - http://www.openwall.com/lists/oss-security/2022/06/07/4 +CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 +CVE-2022-30786 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30787 - http://www.openwall.com/lists/oss-security/2022/06/07/4 +CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 +CVE-2022-30788 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30789 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-30790 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ +CVE-2022-3082 - https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f +CVE-2022-30852 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ +CVE-2022-30858 - https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md +CVE-2022-30858 - https://github.com/miniupnp/ngiflib/issues/22 +CVE-2022-30860 - https://github.com/fudforum/FUDforum/issues/23 +CVE-2022-30861 - https://github.com/fudforum/FUDforum/issues/24 +CVE-2022-30863 - https://github.com/fudforum/FUDforum/issues/24 +CVE-2022-30874 - https://blog.stmcyber.com/vulns/cve-2022-30874/ +CVE-2022-30874 - https://whitehub.net/submissions/2968 +CVE-2022-30886 - https://packetstormsecurity.com/files/167001/School-Dormitory-Management-System-1.0-SQL-Injection.html +CVE-2022-30887 - https://packetstormsecurity.com/files/166786/Pharmacy-Management-System-1.0-Shell-Upload.html +CVE-2022-30898 - https://github.com/chshcms/cscms/issues/37 +CVE-2022-30903 - https://medium.com/@shubhamvpandey/xss-found-in-nokia-g-2425g-a-home-wifi-router-f4fae083ed97 +CVE-2022-30903 - https://youtu.be/CxBo_gQffOY +CVE-2022-30909 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/3 +CVE-2022-30910 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/1 +CVE-2022-30912 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/4 +CVE-2022-30913 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/7 +CVE-2022-30914 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/5 +CVE-2022-30915 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/6 +CVE-2022-30916 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/9 +CVE-2022-30917 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/10 +CVE-2022-30918 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/8 +CVE-2022-30919 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/13 +CVE-2022-30920 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/12 +CVE-2022-30921 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/14 +CVE-2022-30922 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/11 +CVE-2022-30923 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/16 +CVE-2022-30924 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/15 +CVE-2022-30925 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/17 +CVE-2022-30926 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/18 +CVE-2022-30927 - https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated +CVE-2022-30927 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tss.zip +CVE-2022-30929 - https://github.com/AgainstTheLight/CVE-2022-30929 +CVE-2022-30930 - https://medium.com/@pmmali/my-second-cve-2022-30930-4f9aab047518 +CVE-2022-30931 - https://medium.com/@niteshbiwal2011/my-first-cve-2022-30931-e70b9cbecbba +CVE-2022-3096 - https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d +CVE-2022-3097 - https://wpscan.com/vulnerability/9ebb8318-ebaf-4de7-b337-c91327685a43 +CVE-2022-30974 - https://github.com/ccxvii/mujs/issues/162 +CVE-2022-30975 - https://github.com/ccxvii/mujs/issues/161 +CVE-2022-30976 - https://github.com/gpac/gpac/issues/2179 +CVE-2022-3098 - https://wpscan.com/vulnerability/f4fcf41b-c05d-4236-8e67-a52d0f94c80a +CVE-2022-30981 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/ +CVE-2022-30982 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/ +CVE-2022-3099 - https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e +CVE-2022-3104 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2 +CVE-2022-3105 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531 +CVE-2022-31056 - http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html +CVE-2022-3106 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9 +CVE-2022-31062 - http://packetstormsecurity.com/files/171654/GLPI-Glpiinventory-1.0.1-Local-File-Inclusion.html +CVE-2022-31064 - http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html +CVE-2022-31064 - http://seclists.org/fulldisclosure/2022/Jun/52 +CVE-2022-3107 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a +CVE-2022-3108 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e +CVE-2022-3110 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95 +CVE-2022-31101 - http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html +CVE-2022-31108 - https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf +CVE-2022-3111 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078 +CVE-2022-31110 - https://github.com/DIYgod/RSSHub/issues/10045 +CVE-2022-3112 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99 +CVE-2022-31125 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html +CVE-2022-31129 - https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/ +CVE-2022-3113 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0 +CVE-2022-31133 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76 +CVE-2022-31137 - http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html +CVE-2022-31137 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html +CVE-2022-31137 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html +CVE-2022-31137 - http://packetstormsecurity.com/files/172547/Roxy-WI-6.1.0.0-Remote-Command-Execution.html +CVE-2022-31138 - https://github.com/ly1g3/Mailcow-CVE-2022-31138 +CVE-2022-3114 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037 +CVE-2022-3115 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33 +CVE-2022-31160 - https://www.drupal.org/sa-contrib-2022-052 +CVE-2022-31161 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html +CVE-2022-31173 - https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j +CVE-2022-3118 - https://vuldb.com/?id.207845 +CVE-2022-31188 - http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html +CVE-2022-3119 - https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5 +CVE-2022-3120 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpms.md +CVE-2022-3120 - https://vuldb.com/?id.207847 +CVE-2022-31201 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/ +CVE-2022-31202 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/ +CVE-2022-31204 - https://www.forescout.com/blog/ +CVE-2022-31205 - https://www.forescout.com/blog/ +CVE-2022-31206 - https://www.forescout.com/blog/ +CVE-2022-31207 - https://www.forescout.com/blog/ +CVE-2022-31208 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ +CVE-2022-31209 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ +CVE-2022-3121 - https://vuldb.com/?id.207853 +CVE-2022-31210 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ +CVE-2022-31211 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/ +CVE-2022-31212 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ +CVE-2022-31213 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ +CVE-2022-31214 - https://www.openwall.com/lists/oss-security/2022/06/08/10 +CVE-2022-3122 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpmssql.md +CVE-2022-3122 - https://vuldb.com/?id.207854 +CVE-2022-3123 - https://huntr.dev/bounties/d72a979b-57db-4201-9500-66b49a5c1345 +CVE-2022-31237 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en +CVE-2022-31239 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en +CVE-2022-3124 - https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608 +CVE-2022-31244 - https://packetstormsecurity.com/files/171970/Nokia-OneNDS-17-Insecure-Permissions-Privilege-Escalation.html +CVE-2022-31245 - https://github.com/ly1g3/Mailcow-CVE-2022-31245 +CVE-2022-3125 - https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e +CVE-2022-31250 - https://bugzilla.suse.com/show_bug.cgi?id=1200885 +CVE-2022-31251 - https://bugzilla.suse.com/show_bug.cgi?id=1201674 +CVE-2022-31254 - https://bugzilla.suse.com/show_bug.cgi?id=1204285 +CVE-2022-3126 - https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8 +CVE-2022-31262 - https://github.com/secure-77/CVE-2022-31262 +CVE-2022-31262 - https://secure77.de/category/subjects/researches/ +CVE-2022-31262 - https://secure77.de/gog-galaxy-cve-2022-31262/ +CVE-2022-31262 - https://www.youtube.com/watch?v=Bgdbx5TJShI +CVE-2022-31264 - https://github.com/Ainevsia/CVE-Request/tree/main/Solana/1 +CVE-2022-31266 - https://medium.com/@bcksec/in-ilias-through-7-10-620c0de685ee +CVE-2022-31268 - https://github.com/metaStor/Vuls/blob/main/gitblit/gitblit%20V1.9.3%20path%20traversal/gitblit%20V1.9.3%20path%20traversal.md +CVE-2022-31269 - http://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html +CVE-2022-31269 - https://eg.linkedin.com/in/omar-1-hashem +CVE-2022-31269 - https://gist.github.com/omarhashem123/71ec9223e90ea76a76096d777d9b945c +CVE-2022-3127 - https://huntr.dev/bounties/6cea89d1-39dc-4023-82fa-821f566b841a +CVE-2022-3128 - https://wpscan.com/vulnerability/97201998-1859-4428-9b81-9c2748806cf4 +CVE-2022-31282 - https://github.com/axiomatic-systems/Bento4/issues/708 +CVE-2022-31285 - https://github.com/axiomatic-systems/Bento4/issues/702 +CVE-2022-31287 - https://github.com/axiomatic-systems/Bento4/issues/703 +CVE-2022-3129 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md +CVE-2022-3129 - https://vuldb.com/?id.207872 +CVE-2022-31290 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ +CVE-2022-3130 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md +CVE-2022-3130 - https://vuldb.com/?id.207873 +CVE-2022-31306 - https://github.com/nginx/njs/issues/481 +CVE-2022-31307 - https://github.com/nginx/njs/issues/482 +CVE-2022-31308 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200.md +CVE-2022-31309 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md +CVE-2022-3131 - https://wpscan.com/vulnerability/b6c62e53-ae49-4fe0-aed9-0c493fc4442d +CVE-2022-31311 - https://github.com/pghuanghui/CVE_Request/blob/main/AERIAL%20X%201200_Command%20Execution%20Vulnerability.md +CVE-2022-3132 - https://wpscan.com/vulnerability/ed2dc1b9-f9f9-4e99-87b3-a614c223dd64 +CVE-2022-31322 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb +CVE-2022-31324 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb +CVE-2022-31325 - http://packetstormsecurity.com/files/167483/ChurchCRM-4.4.5-SQL-Injection.html +CVE-2022-31325 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-31325 +CVE-2022-31325 - https://www.nu11secur1ty.com/2022/06/cve-2022-31325.htm +CVE-2022-3133 - https://huntr.dev/bounties/2d93052f-efc6-4647-9a6d-8b08dc251223 +CVE-2022-3134 - https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc +CVE-2022-3135 - https://wpscan.com/vulnerability/3505481d-141a-4516-bdbb-d4dad4e1eb01 +CVE-2022-31358 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ +CVE-2022-3136 - https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649 +CVE-2022-31361 - https://www.swascan.com/security-advisory-docebo-community-edition/ +CVE-2022-31362 - https://www.swascan.com/security-advisory-docebo-community-edition/ +CVE-2022-31366 - https://erpaciocco.github.io/2022/eve-ng-rce/ +CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v3.6.10 +CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v4.1.10 +CVE-2022-3137 - https://wpscan.com/vulnerability/524928d6-d4e9-4a2f-b410-46958da549d8 +CVE-2022-31373 - https://github.com/badboycxcc/SolarView_Compact_6.0_xss +CVE-2022-3138 - https://huntr.dev/bounties/1816a207-6abf-408c-b19a-e497e24172b3 +CVE-2022-31382 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31382.txt +CVE-2022-31383 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31383.txt +CVE-2022-31384 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31384.txt +CVE-2022-31386 - https://github.com/Fanli2012/nbnbk/issues/5 +CVE-2022-3139 - https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db +CVE-2022-31390 - https://github.com/Cherry-toto/jizhicms/issues/75 +CVE-2022-31393 - https://github.com/Cherry-toto/jizhicms/issues/76 +CVE-2022-31395 - https://n0ur5sec.medium.com/achievement-unlocked-cve-2022-31395-33299f32cc00 +CVE-2022-31398 - https://youtu.be/OungdOub18c +CVE-2022-31400 - https://youtu.be/uqO6hluHDB4 +CVE-2022-3141 - http://packetstormsecurity.com/files/171479/WordPress-Translatepress-Multilingual-SQL-Injection.html +CVE-2022-3141 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-translatepress-multilingual-wordpress-plugin-effc08eda514 +CVE-2022-3141 - https://wpscan.com/vulnerability/1fa355d1-cca8-4b27-9d21-0b420a2e1bf3 +CVE-2022-31414 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-31415 - https://researchinthebin.org/posts/ofrs-sql-injection/ +CVE-2022-3142 - http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html +CVE-2022-3142 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5 +CVE-2022-3142 - https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328 +CVE-2022-31446 - https://github.com/wshidamowang/Router/blob/main/Tenda/AC18/RCE_1.md +CVE-2022-31464 - https://r0h1rr1m.medium.com/adaware-protect-local-privilege-escalation-through-insecure-service-permissions-44d0eeb6c933 +CVE-2022-31468 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html +CVE-2022-31469 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-3147 - https://mattermost.com/security-updates/ +CVE-2022-31470 - http://packetstormsecurity.com/files/174551/Axigen-10.5.0-4370c946-Cross-Site-Scripting.html +CVE-2022-31478 - https://medium.com/@bcksec/ilias-lms-usertakeover-4-0-1-vulnerability-b2824679403 +CVE-2022-3148 - https://huntr.dev/bounties/1f730015-b4d0-4f84-8cac-9cf1e57a091a +CVE-2022-3149 - https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f +CVE-2022-31492 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31493 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31494 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31495 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31496 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31497 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31498 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r +CVE-2022-31499 - http://packetstormsecurity.com/files/167991/Nortek-Linear-eMerge-E3-Series-Command-Injection.html +CVE-2022-31499 - https://eg.linkedin.com/in/omar-1-hashem +CVE-2022-31499 - https://gist.github.com/omarhashem123/5f0c6f1394099b555740fdc5c7651ee2 +CVE-2022-3150 - https://wpscan.com/vulnerability/bb0806d7-21e3-4a65-910c-bf0625c338ec +CVE-2022-31501 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31502 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31503 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31504 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31505 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31506 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31507 - https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c +CVE-2022-31507 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31508 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31509 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-3151 - https://wpscan.com/vulnerability/27816c70-58ad-4ffb-adcc-69eb1b210744 +CVE-2022-31510 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31510 - https://github.com/sergeKashkin/Simple-RAT/pull/11 +CVE-2022-31511 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31512 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31513 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31514 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31515 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31516 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31517 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31518 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31519 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-3152 - https://huntr.dev/bounties/b3f888d2-5c71-4682-8287-42613401fd5a +CVE-2022-31520 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31521 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31522 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31523 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31524 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31525 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31526 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31527 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31528 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31529 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-3153 - https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a +CVE-2022-31530 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31531 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31532 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31533 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31534 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31535 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31536 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31537 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31538 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31539 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-3154 - https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd +CVE-2022-31540 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31541 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31542 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31543 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31544 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31545 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31546 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31547 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31548 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31549 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31549 - https://github.com/olmax99/helm-flask-celery/commit/28c985d712d7ac26893433e8035e2e3678fcae9f +CVE-2022-3155 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789061 +CVE-2022-31550 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31551 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31552 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31553 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31554 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31555 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31556 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31557 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31558 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31559 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31560 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31561 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31562 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31563 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31564 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31564 - https://github.com/woduq1414/munhak-moa/commit/e8f800373b20cb22de70c7a994325b8903877da0 +CVE-2022-31565 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31566 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31567 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31568 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31570 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31571 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31572 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31573 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31574 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31575 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31576 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31577 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31578 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31579 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31580 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31581 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31581 - https://github.com/scorelab/OpenMF/issues/262 +CVE-2022-31582 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31583 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31584 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31585 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31586 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31587 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31588 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 +CVE-2022-31589 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31590 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31591 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31592 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31593 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31594 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31595 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31596 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31597 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31598 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-31620 - https://github.com/thorfdbg/libjpeg/issues/70 +CVE-2022-31628 - https://bugs.php.net/bug.php?id=81726 +CVE-2022-31629 - http://www.openwall.com/lists/oss-security/2024/04/12/11 +CVE-2022-31647 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 +CVE-2022-31650 - https://sourceforge.net/p/sox/bugs/360/ +CVE-2022-31651 - https://sourceforge.net/p/sox/bugs/360/ +CVE-2022-31656 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31657 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31658 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31659 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31660 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31661 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31662 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31663 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31664 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-31665 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html +CVE-2022-3167 - https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c +CVE-2022-31678 - https://www.vmware.com/security/advisories/VMSA-2022-0027.html +CVE-2022-31680 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587 +CVE-2022-31704 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html +CVE-2022-31706 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html +CVE-2022-31711 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html +CVE-2022-3173 - https://huntr.dev/bounties/6d8ffcc6-c6e3-4385-8ead-bdbbbacf79e9 +CVE-2022-31736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735923 +CVE-2022-31739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1765049 +CVE-2022-3174 - https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce +CVE-2022-31741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767590 +CVE-2022-31743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747388 +CVE-2022-3175 - https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159 +CVE-2022-3178 - https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0 +CVE-2022-31782 - https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8 +CVE-2022-31783 - https://github.com/liblouis/liblouis/issues/1214 +CVE-2022-31786 - https://gist.github.com/RNPG/e10524f1781a9981b50fb27bb473b0fe +CVE-2022-31787 - https://gist.github.com/RNPG/ef10c0acceb650d43625a77d3472dd84 +CVE-2022-31787 - https://gist.github.com/This-is-Neo/c91e1a0ed5d40fbcf0dada43ea1d7479 +CVE-2022-31788 - https://gist.github.com/RNPG/b154f4b2e90340d2f39605989af06bee +CVE-2022-31788 - https://gist.github.com/This-is-Neo/cc5b08ad8a3a60cd81fd1b9c1cb573b4 +CVE-2022-3179 - https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe +CVE-2022-31790 - https://www.ambionics.io/blog/hacking-watchguard-firewalls +CVE-2022-31793 - https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/ +CVE-2022-31793 - https://derekabdine.com/blog/2022-arris-advisory +CVE-2022-31794 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/ +CVE-2022-31795 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/ +CVE-2022-31796 - https://github.com/thorfdbg/libjpeg/issues/71 +CVE-2022-31798 - http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html +CVE-2022-31798 - https://eg.linkedin.com/in/omar-1-hashem +CVE-2022-31798 - https://gist.github.com/omarhashem123/bccdcec70ab7e8f00519d56ea2e3fd79 +CVE-2022-31814 - http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html +CVE-2022-31814 - http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html +CVE-2022-31814 - https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/ +CVE-2022-31827 - https://github.com/zer0yu/CVE_Request/blob/master/MonstaFTP/MonstaFTP_v2_10_3_SSRF.md +CVE-2022-31830 - https://github.com/fex-team/kityminder/issues/345 +CVE-2022-31845 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_live.md +CVE-2022-31846 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__live_mfg.md +CVE-2022-31847 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__Sensitive%20information%20leakage.md +CVE-2022-31854 - http://packetstormsecurity.com/files/167782/CodoForum-5.1-Remote-Code-Execution.html +CVE-2022-31856 - https://www.exploit-db.com/exploits/50942 +CVE-2022-31860 - https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html +CVE-2022-31861 - https://securityblog101.blogspot.com/2022/09/cve-2022-31861.html +CVE-2022-31873 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md +CVE-2022-31874 - https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md +CVE-2022-31875 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md +CVE-2022-31876 - https://github.com/jayus0821/uai-poc/blob/main/Netgear/WNAP320/unauth.md +CVE-2022-31877 - https://patsch.dev/2022/07/08/cve-2022-31877-privilege-escalation-in-msi-centers-msi-terminalserver-exe/ +CVE-2022-31879 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting +CVE-2022-31884 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/unauthorized-delete-add-api-users-api-keys +CVE-2022-31885 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/os-command-injection +CVE-2022-31886 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/2fa-bypass-via-x-csrf +CVE-2022-31887 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover +CVE-2022-31888 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ +CVE-2022-31889 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ +CVE-2022-31890 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/ +CVE-2022-31897 - https://packetstormsecurity.com/files/167572/Zoo-Management-System-1.0-Cross-Site-Scripting.html +CVE-2022-31898 - https://boschko.ca/glinet-router +CVE-2022-31901 - https://github.com/CDACesec/CVE-2022-31901 +CVE-2022-31902 - https://github.com/CDACesec/CVE-2022-31902 +CVE-2022-3194 - https://wpscan.com/vulnerability/85e32913-dc2a-44c9-addd-7abde618e995/ +CVE-2022-3199 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html +CVE-2022-32030 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetQosBand +CVE-2022-32031 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetRouteStatic +CVE-2022-32032 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/A18/formAddMacfilterRule +CVE-2022-32033 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetVirtualSer +CVE-2022-32034 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formdelMasteraclist +CVE-2022-32035 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng +CVE-2022-32036 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetStoreWeb +CVE-2022-32037 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAPCfg +CVE-2022-32039 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/fromDhcpListClient +CVE-2022-32040 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetCfm +CVE-2022-32041 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formGetPassengerAnalyseData +CVE-2022-32043 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAccessCodeInfo +CVE-2022-32044 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/5.setWiFiRepeaterCfg +CVE-2022-32045 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/4.setWiFiScheduleCfg +CVE-2022-32046 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/8.setMacFilterRules +CVE-2022-32047 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/1.setIpPortFilterRules +CVE-2022-32048 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/10.setTracerouteCfg +CVE-2022-32049 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/7.setUrlFilterRules +CVE-2022-3205 - https://bugzilla.redhat.com/show_bug.cgi?id=2120597 +CVE-2022-32050 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/9.setWanCfg +CVE-2022-32051 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/2.setParentalRules +CVE-2022-32052 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/3.setWiFiAclRules +CVE-2022-32053 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/6.setWizardCfg +CVE-2022-32055 - https://github.com/bigb0x/CVEs/blob/main/Inout-Homestay-2-2-sqli.md +CVE-2022-32056 - https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi +CVE-2022-32060 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-b15becc1a5ea +CVE-2022-32061 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab +CVE-2022-32065 - https://gitee.com/y_project/RuoYi/issues/I57IME +CVE-2022-32065 - https://github.com/yangzongzhuan/RuoYi/issues/118 +CVE-2022-3207 - https://wpscan.com/vulnerability/b57272ea-9a8a-482a-bbaa-5f202ca5b9aa +CVE-2022-3208 - https://wpscan.com/vulnerability/80d475ca-b475-4789-8eef-9c4d880853b7 +CVE-2022-32081 - https://jira.mariadb.org/browse/MDEV-26420 +CVE-2022-32085 - https://jira.mariadb.org/browse/MDEV-26407 +CVE-2022-32086 - https://jira.mariadb.org/browse/MDEV-26412 +CVE-2022-32088 - https://jira.mariadb.org/browse/MDEV-26419 +CVE-2022-32089 - https://jira.mariadb.org/browse/MDEV-26410 +CVE-2022-3209 - https://wpscan.com/vulnerability/7a244fb1-fa0b-4294-9b51-588bf5d673a2 +CVE-2022-32092 - https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645 +CVE-2022-32092 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-3211 - https://huntr.dev/bounties/31ac0506-ae38-4128-a46d-71d5d079f8b7 +CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14 +CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33 +CVE-2022-32114 - https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e +CVE-2022-32115 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ +CVE-2022-3212 - https://research.jfrog.com/vulnerabilities/axum-core-dos/ +CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2 +CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750 +CVE-2022-32159 - https://www.mend.io/vulnerability-database/CVE-2022-32159 +CVE-2022-3216 - https://vuldb.com/?id.208606 +CVE-2022-32167 - https://www.mend.io/vulnerability-database/CVE-2022-32167 +CVE-2022-32168 - https://www.mend.io/vulnerability-database/CVE-2022-32168 +CVE-2022-32169 - https://www.mend.io/vulnerability-database/CVE-2022-32169 +CVE-2022-3217 - https://www.tenable.com/security/research/tra-2022-31 +CVE-2022-32170 - https://www.mend.io/vulnerability-database/CVE-2022-32170 +CVE-2022-32171 - https://www.mend.io/vulnerability-database/CVE-2022-32171 +CVE-2022-32172 - https://www.mend.io/vulnerability-database/CVE-2022-32172 +CVE-2022-32173 - https://www.mend.io/vulnerability-database/CVE-2022-32173 +CVE-2022-32174 - https://www.mend.io/vulnerability-database/CVE-2022-32174 +CVE-2022-32175 - https://www.mend.io/vulnerability-database/CVE-2022-32175 +CVE-2022-32176 - https://www.mend.io/vulnerability-database/CVE-2022-32176 +CVE-2022-32177 - https://www.mend.io/vulnerability-database/CVE-2022-32177 +CVE-2022-3218 - http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html +CVE-2022-3218 - https://www.exploit-db.com/exploits/49601 +CVE-2022-3218 - https://www.exploit-db.com/exploits/50972 +CVE-2022-32199 - https://github.com/Toxich4/CVE-2022-32199 +CVE-2022-3220 - https://wpscan.com/vulnerability/cb6f4953-e68b-48f3-a821-a1d77e5476ef +CVE-2022-32200 - https://github.com/davea42/libdwarf-code/issues/116 +CVE-2022-32200 - https://www.prevanders.net/dwarfbug.html +CVE-2022-32201 - https://github.com/thorfdbg/libjpeg/issues/73 +CVE-2022-32202 - https://github.com/thorfdbg/libjpeg/issues/74 +CVE-2022-32205 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32206 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32207 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32208 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-3221 - https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d +CVE-2022-3222 - https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235 +CVE-2022-32221 - http://seclists.org/fulldisclosure/2023/Jan/19 +CVE-2022-3223 - https://huntr.dev/bounties/125791b6-3a68-4235-8866-6bc3a52332ba +CVE-2022-32230 - https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/ +CVE-2022-32235 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32236 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32237 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32238 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32239 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-3224 - https://huntr.dev/bounties/3587a567-7fcd-4702-b7c9-d9ca565e3c62 +CVE-2022-32240 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32241 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32242 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32243 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32244 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32245 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32246 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32247 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32248 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32249 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/06/03/1 +CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/08/25/1 +CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/09/02/9 +CVE-2022-32250 - https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/ +CVE-2022-32250 - https://bugzilla.redhat.com/show_bug.cgi?id=2092427 +CVE-2022-32250 - https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd +CVE-2022-32250 - https://www.openwall.com/lists/oss-security/2022/05/31/1 +CVE-2022-32269 - https://github.com/Edubr2020/RealPlayer_G2_RCE +CVE-2022-32269 - https://www.youtube.com/watch?v=9c9Q4VZQOUk +CVE-2022-32270 - https://github.com/Edubr2020/RP_Import_RCE +CVE-2022-32270 - https://youtu.be/CONlijEgDLc +CVE-2022-32271 - https://github.com/Edubr2020/RP_DCP_Code_Exec +CVE-2022-32271 - https://youtu.be/AMODp3iTnqY +CVE-2022-32272 - http://packetstormsecurity.com/files/171549/OPSWAT-Metadefender-Core-4.21.1-Privilege-Escalation.html +CVE-2022-32274 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-040.txt +CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana +CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md +CVE-2022-32276 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md +CVE-2022-32277 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/squiz-matrix-cms-authenticated-privilege-escalation-through-idor/ +CVE-2022-32282 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1545 +CVE-2022-3229 - https://github.com/rapid7/metasploit-framework/pull/16989 +CVE-2022-32294 - https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e +CVE-2022-32296 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9 +CVE-2022-32298 - https://github.com/landley/toybox/issues/346 +CVE-2022-32308 - https://github.com/uBlockOrigin/uBlock-issues/issues/1992 +CVE-2022-3231 - https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f +CVE-2022-32310 - https://packetstormsecurity.com/files/167291/Ingredient-Stock-Management-System-1.0-Account-Takeover.html +CVE-2022-32311 - https://packetstormsecurity.com/files/167290/Ingredient-Stock-Management-System-1.0-SQL-Injection.html +CVE-2022-32317 - https://bugs.gentoo.org/show_bug.cgi?id=858107 +CVE-2022-32317 - https://github.com/b17fr13nds/MPlayer_cve_poc +CVE-2022-32318 - https://packetstormsecurity.com/files/167309/Fast-Food-Ordering-System-1.0-Cross-Site-Scripting.html +CVE-2022-3232 - https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c +CVE-2022-3233 - https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3 +CVE-2022-3234 - https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da +CVE-2022-3235 - https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af +CVE-2022-32353 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/product-show-room-site/SQLi-1.md +CVE-2022-3237 - https://wpscan.com/vulnerability/cd2fd6cd-a839-4de8-af28-b5134873c40e +CVE-2022-32387 - https://devnet.kentico.com/download/hotfixes +CVE-2022-3239 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d +CVE-2022-32391 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32391.md +CVE-2022-32392 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32392.md +CVE-2022-32393 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32393.md +CVE-2022-32394 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32394.md +CVE-2022-32395 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32395.md +CVE-2022-32396 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32396.md +CVE-2022-32397 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32397.md +CVE-2022-32398 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32398.md +CVE-2022-32399 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32399.md +CVE-2022-32400 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32400.md +CVE-2022-32401 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32401.md +CVE-2022-32402 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32402.md +CVE-2022-32403 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32403.md +CVE-2022-32404 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32404.md +CVE-2022-32405 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32405.md +CVE-2022-32407 - https://riteshgohil-25.medium.com/softr-version-2-0-33463a6bf766 +CVE-2022-32409 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt +CVE-2022-32409 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion +CVE-2022-3241 - https://wpscan.com/vulnerability/a995dd67-43fc-4087-a7f1-5db57f4c828c +CVE-2022-32414 - https://github.com/nginx/njs/issues/483 +CVE-2022-3242 - https://huntr.dev/bounties/3e6b218a-a5a6-40d9-9f7e-5ab0c6214faf +CVE-2022-32429 - http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html +CVE-2022-32429 - https://elifulkerson.com/CVE-2022-32429/ +CVE-2022-3243 - https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a +CVE-2022-32434 - https://github.com/EIPStackGroup/OpENer/issues/374 +CVE-2022-32441 - https://code610.blogspot.com/2022/06/night-fuzzing-session-idapro-66-part-2.html +CVE-2022-32449 - https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md +CVE-2022-3245 - https://huntr.dev/bounties/747c2924-95ca-4311-9e69-58ee0fb440a0 +CVE-2022-32450 - http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html +CVE-2022-32450 - http://seclists.org/fulldisclosure/2022/Jul/9 +CVE-2022-32450 - https://seclists.org/fulldisclosure/2022/Jun/44 +CVE-2022-32454 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560 +CVE-2022-3246 - https://wpscan.com/vulnerability/ece049b2-9a21-463d-9e8b-b4ce61919f0c +CVE-2022-3247 - https://wpscan.com/vulnerability/ee312f22-ca58-451d-a1cb-3f78a6e5ecaf +CVE-2022-32480 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en +CVE-2022-3249 - https://wpscan.com/vulnerability/6503da78-a2bf-4b4c-b56d-21c8c55b076e +CVE-2022-3250 - https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23 +CVE-2022-32502 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32502 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32503 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32503 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32504 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32504 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32505 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32505 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32506 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32506 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32507 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32507 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32508 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32508 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-32509 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32509 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-3251 - https://huntr.dev/bounties/b9a1b411-060b-4235-9426-e39bd0a1d6d9 +CVE-2022-32510 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ +CVE-2022-32510 - https://www.hackread.com/nuki-smart-locks-vulnerabilities-plethora-attack-options/ +CVE-2022-3254 - https://wpscan.com/vulnerability/546c47c2-5b4b-46db-b754-c6b43aef2660 +CVE-2022-32543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1527 +CVE-2022-32548 - https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers +CVE-2022-3255 - https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902 +CVE-2022-3256 - https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3 +CVE-2022-32567 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-039.txt +CVE-2022-3257 - https://mattermost.com/security-updates/ +CVE-2022-32572 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548 +CVE-2022-32573 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528 +CVE-2022-32574 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1565 +CVE-2022-32585 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1570 +CVE-2022-32586 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1563 +CVE-2022-32588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1544 +CVE-2022-3267 - https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2 +CVE-2022-3268 - https://huntr.dev/bounties/00e464ce-53b9-485d-ac62-6467881654c2 +CVE-2022-3269 - https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6 +CVE-2022-3272 - https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38 +CVE-2022-3273 - https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6 +CVE-2022-3274 - https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f +CVE-2022-32760 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1555 +CVE-2022-32761 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549 +CVE-2022-32763 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1541 +CVE-2022-32765 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1576 +CVE-2022-32768 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536 +CVE-2022-32769 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536 +CVE-2022-32770 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 +CVE-2022-32771 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 +CVE-2022-32772 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538 +CVE-2022-32773 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1556 +CVE-2022-32774 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1600 +CVE-2022-32775 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564 +CVE-2022-32777 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542 +CVE-2022-32778 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542 +CVE-2022-3278 - https://huntr.dev/bounties/a9fad77e-f245-4ce9-ba15-c7d4c86c4612 +CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-3282 - https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c +CVE-2022-32827 - http://packetstormsecurity.com/files/169929/AppleAVD-deallocateKernelMemoryInternal-Missing-Surface-Lock.html +CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/47 +CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/50 +CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-3288 - https://gitlab.com/gitlab-org/gitlab/-/issues/354948 +CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32893 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/1 +CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/2 +CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/09/13/1 +CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2022-3290 - https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5 +CVE-2022-32907 - http://packetstormsecurity.com/files/169930/AppleAVD-AppleAVDUserClient-decodeFrameFig-Memory-Corruption.html +CVE-2022-32908 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32911 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/47 +CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/49 +CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/50 +CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/39 +CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/40 +CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/43 +CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/45 +CVE-2022-3292 - https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d +CVE-2022-32924 - http://packetstormsecurity.com/files/170010/XNU-Dangling-PTE-Entry.html +CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-3295 - https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233 +CVE-2022-3296 - https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077 +CVE-2022-3297 - https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c +CVE-2022-32978 - https://github.com/thorfdbg/libjpeg/issues/75 +CVE-2022-3298 - https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7 +CVE-2022-32985 - https://sec-consult.com/vulnerability-lab/advisory/hardcoded-backdoor-user-outdated-software-components-nexans-ftto-gigaswitch/ +CVE-2022-32988 - https://github.com/FedericoHeichou/CVE-2022-32988 +CVE-2022-32988 - https://github.com/FedericoHeichou/DSL-N14U-XSS +CVE-2022-32993 - https://github.com/laotun-s/POC/blob/main/CVE-2022-32993.txt +CVE-2022-32994 - https://github.com/zongdeiqianxing/cve-reports/issues/1 +CVE-2022-32995 - https://github.com/zongdeiqianxing/cve-reports/issues/2 +CVE-2022-3300 - https://wpscan.com/vulnerability/ddc9ed69-d942-4fad-bbf4-1be3b86460d9 +CVE-2022-3301 - https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a +CVE-2022-33011 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/ +CVE-2022-33012 - https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/ +CVE-2022-3302 - https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b +CVE-2022-33024 - https://github.com/LibreDWG/libredwg/issues/492 +CVE-2022-33025 - https://github.com/LibreDWG/libredwg/issues/487 +CVE-2022-33026 - https://github.com/LibreDWG/libredwg/issues/484 +CVE-2022-33027 - https://github.com/LibreDWG/libredwg/issues/490 +CVE-2022-33028 - https://github.com/LibreDWG/libredwg/issues/489 +CVE-2022-3303 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d +CVE-2022-33032 - https://github.com/LibreDWG/libredwg/issues/488 +CVE-2022-33033 - https://github.com/LibreDWG/libredwg/issues/493 +CVE-2022-33034 - https://github.com/LibreDWG/libredwg/issues/494 +CVE-2022-33043 - https://github.com/chen-jerry-php/vim/blob/main/core_tmp.md +CVE-2022-33047 - https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing +CVE-2022-33065 - https://github.com/libsndfile/libsndfile/issues/789 +CVE-2022-33075 - https://packetstormsecurity.com/files/167603/Zoo-Management-System-1.0-Cross-Site-Scripting.html +CVE-2022-33077 - https://medium.com/@rohan_pagey/cve-2022-33077-idor-to-change-address-of-any-customer-via-parameter-pollution-in-nopcommerce-4-5-2fa4bc763cc6 +CVE-2022-33087 - https://github.com/cilan2/iot/blob/main/4.md +CVE-2022-33099 - https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf +CVE-2022-33099 - https://lua-users.org/lists/lua-l/2022-05/msg00035.html +CVE-2022-33103 - https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/ +CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284 +CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286 +CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287 +CVE-2022-33116 - https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/ +CVE-2022-33119 - https://github.com/badboycxcc/nuuo-xss/blob/main/README.md +CVE-2022-33121 - https://github.com/bg5sbk/MiniCMS/issues/45 +CVE-2022-33122 - https://github.com/eyoucms/eyoucms/issues/24 +CVE-2022-33124 - https://github.com/aio-libs/aiohttp/issues/6772 +CVE-2022-33147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 +CVE-2022-33148 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 +CVE-2022-33149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 +CVE-2022-33150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1577 +CVE-2022-33171 - http://packetstormsecurity.com/files/168096/TypeORM-0.3.7-Information-Disclosure.html +CVE-2022-33174 - https://gynvael.coldwind.pl/?lang=en&id=748 +CVE-2022-33175 - https://gynvael.coldwind.pl/?lang=en&id=748 +CVE-2022-33189 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558 +CVE-2022-33192 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 +CVE-2022-33193 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 +CVE-2022-33194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 +CVE-2022-33195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 +CVE-2022-33204 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 +CVE-2022-33205 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 +CVE-2022-33206 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 +CVE-2022-33207 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568 +CVE-2022-3323 - https://www.tenable.com/security/research/tra-2022-32 +CVE-2022-3324 - https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c +CVE-2022-3326 - https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97 +CVE-2022-3327 - https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1 +CVE-2022-33312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 +CVE-2022-33313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 +CVE-2022-33314 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 +CVE-2022-33321 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-010.pdf +CVE-2022-33322 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf +CVE-2022-33325 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 +CVE-2022-33326 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 +CVE-2022-33327 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 +CVE-2022-33328 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 +CVE-2022-33329 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573 +CVE-2022-3333 - https://wpscan.com/vulnerability/bfd8a7aa-5977-4fe5-b2fc-12bf93caf3ed +CVE-2022-3334 - https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9 +CVE-2022-3335 - https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d +CVE-2022-3336 - https://wpscan.com/vulnerability/57bc6633-1aeb-4c20-a2a5-9b3fa10ba95d +CVE-2022-3338 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387 +CVE-2022-3339 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387 +CVE-2022-3343 - https://wpscan.com/vulnerability/e507b1b5-1a56-4b2f-b7e7-e22f6da1e32a +CVE-2022-3350 - https://wpscan.com/vulnerability/6d796b83-03c0-49f8-8d07-5c63ce8a32b9 +CVE-2022-3352 - https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60 +CVE-2022-3354 - https://vuldb.com/?id.209686 +CVE-2022-3355 - https://huntr.dev/bounties/4b7fb92c-f06b-4bbf-82dc-9f013b30b6a6 +CVE-2022-3357 - https://wpscan.com/vulnerability/2e28a4e7-e7d3-485c-949c-e300e5b66cbd +CVE-2022-3359 - https://wpscan.com/vulnerability/08f3ce22-94a0-496a-aaf9-d35b6b0f5bb6 +CVE-2022-3360 - https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3 +CVE-2022-3362 - https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1 +CVE-2022-3363 - https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e +CVE-2022-3364 - https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720 +CVE-2022-3366 - https://wpscan.com/vulnerability/72639924-e7a7-4f7d-bd50-015d05ffd4fb +CVE-2022-3368 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2022-3371 - https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce +CVE-2022-3374 - https://wpscan.com/vulnerability/22fd3f28-9036-4bd5-ad98-ff78bd1b51bc +CVE-2022-3376 - https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed +CVE-2022-3380 - https://wpscan.com/vulnerability/a42272a2-f9ce-4aab-9a94-8a4d85008746 +CVE-2022-3389 - https://huntr.dev/bounties/f7d2a6ab-2faf-4719-bdb6-e4e5d6065752 +CVE-2022-33891 - http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html +CVE-2022-33896 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574 +CVE-2022-33897 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1579 +CVE-2022-3391 - https://wpscan.com/vulnerability/ecc51420-ee50-4e39-a38d-09686f1996f2 +CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=29135 +CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=30384 +CVE-2022-33916 - https://opcfoundation.org +CVE-2022-33917 - http://packetstormsecurity.com/files/168147/Arm-Mali-CSF-VMA-Split-Mishandling.html +CVE-2022-3392 - https://wpscan.com/vulnerability/2296156e-b177-478e-a01c-b1ea4fee0aca +CVE-2022-3393 - https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e +CVE-2022-33932 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en +CVE-2022-33938 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584 +CVE-2022-3394 - https://wpscan.com/vulnerability/3266eb59-a8b2-4a5a-ab48-01a9af631b2c +CVE-2022-3395 - https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 +CVE-2022-33981 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6 +CVE-2022-33981 - https://seclists.org/oss-sec/2022/q2/66 +CVE-2022-34000 - https://github.com/libjxl/libjxl/issues/1477 +CVE-2022-34001 - https://prisminfosec.com/cve-2022-34001/ +CVE-2022-34002 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1843134469/CVE-2022-34002+Personnel+Data+Systems+PDS+Vista+7+-+Local+File+Inclusion +CVE-2022-34005 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf +CVE-2022-34006 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf +CVE-2022-34007 - https://packetstormsecurity.com/files/167706/EQS-Integrity-Line-Cross-Site-Scripting-Information-Disclosure.html +CVE-2022-34008 - https://r0h1rr1m.medium.com/comodo-antivirus-local-privilege-escalation-through-insecure-file-move-476a4601d9b8 +CVE-2022-34020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html +CVE-2022-34020 - https://securityblog101.blogspot.com/2022/09/cve-2022-34020.html +CVE-2022-34021 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34021.html +CVE-2022-34022 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34022.html +CVE-2022-34027 - https://github.com/nginx/njs/issues/504 +CVE-2022-34028 - https://github.com/nginx/njs/issues/522 +CVE-2022-34029 - https://github.com/nginx/njs/issues/506 +CVE-2022-34030 - https://github.com/nginx/njs/issues/540 +CVE-2022-34031 - https://github.com/nginx/njs/issues/523 +CVE-2022-34032 - https://github.com/nginx/njs/issues/524 +CVE-2022-34033 - https://github.com/michaelrsweet/htmldoc/issues/425 +CVE-2022-34035 - https://github.com/michaelrsweet/htmldoc/issues/426 +CVE-2022-34046 - http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html +CVE-2022-34047 - http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html +CVE-2022-3405 - https://herolab.usd.de/security-advisories/usd-2022-0008/ +CVE-2022-34067 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System +CVE-2022-3408 - https://wpscan.com/vulnerability/395bc893-2067-4f76-b49f-9ed8e1e8f330 +CVE-2022-34092 - https://github.com/edmarmoretti/i3geo/issues/3 +CVE-2022-34092 - https://github.com/saladesituacao/i3geo/issues/3 +CVE-2022-34092 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23 +CVE-2022-34093 - https://github.com/edmarmoretti/i3geo/issues/4 +CVE-2022-34093 - https://github.com/saladesituacao/i3geo/issues/4 +CVE-2022-34093 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44 +CVE-2022-34094 - https://github.com/edmarmoretti/i3geo/issues/5 +CVE-2022-34094 - https://github.com/saladesituacao/i3geo/issues/5 +CVE-2022-34094 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65 +CVE-2022-34100 - https://www.crestron.com/Security/Security_Advisories +CVE-2022-34101 - https://www.crestron.com/Security/Security_Advisories +CVE-2022-34102 - https://www.crestron.com/Security/Security_Advisories +CVE-2022-34113 - https://github.com/dataease/dataease/issues/2431 +CVE-2022-34121 - https://github.com/CuppaCMS/CuppaCMS/issues/18 +CVE-2022-34121 - https://github.com/hansmach1ne/MyExploits/tree/main/LFI_in_CuppaCMS_templates +CVE-2022-34125 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ +CVE-2022-34126 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ +CVE-2022-34127 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ +CVE-2022-34128 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ +CVE-2022-3414 - https://vuldb.com/?id.210246 +CVE-2022-34140 - http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html +CVE-2022-34140 - http://packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.html +CVE-2022-3415 - https://wpscan.com/vulnerability/012c5b64-ef76-4539-afd8-40f6c329ae88 +CVE-2022-3416 - https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6 +CVE-2022-34169 - http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html +CVE-2022-34169 - https://www.oracle.com/security-alerts/cpujul2022.html +CVE-2022-3418 - https://wpscan.com/vulnerability/ccbb74f5-1b8f-4ea6-96bc-ddf62af7f94d +CVE-2022-3419 - https://wpscan.com/vulnerability/5909a423-9841-449c-a569-f687c609817b +CVE-2022-3420 - https://wpscan.com/vulnerability/ce5fac6e-8da1-4042-9cf8-7988613f92a5 +CVE-2022-3422 - https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551 +CVE-2022-3423 - https://huntr.dev/bounties/94639d8e-8301-4432-ab80-e76e1346e631 +CVE-2022-3425 - https://wpscan.com/vulnerability/df1c36bb-9861-4272-89c9-ae76e62f687c +CVE-2022-3426 - https://wpscan.com/vulnerability/bc90594e-1018-494a-b473-6416e274c59f +CVE-2022-34267 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver +CVE-2022-34268 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver +CVE-2022-34269 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver +CVE-2022-34270 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver +CVE-2022-34292 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 +CVE-2022-34296 - https://github.com/zalando/skipper/releases/tag/v0.13.218 +CVE-2022-34299 - https://github.com/davea42/libdwarf-code/issues/119 +CVE-2022-34300 - https://github.com/syoyo/tinyexr/issues/167 +CVE-2022-34328 - https://github.com/jenaye/PMB +CVE-2022-3434 - https://vuldb.com/?id.210356 +CVE-2022-3436 - http://packetstormsecurity.com/files/176007/Online-Student-Clearance-System-1.0-Shell-Upload.html +CVE-2022-3438 - https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67 +CVE-2022-3439 - https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7 +CVE-2022-34393 - https://www.dell.com/support/kbdoc/000204686 +CVE-2022-3440 - https://wpscan.com/vulnerability/e39fcf30-1e69-4399-854c-4c5b6ccc22a2 +CVE-2022-3441 - https://wpscan.com/vulnerability/7b51b1f0-17ca-46b7-ada1-20bd926f3023 +CVE-2022-3442 - https://vuldb.com/?id.210374 +CVE-2022-3442 - https://www.pentagrid.ch/en/blog/reflected-xss-vulnerability-in-crealogix-ebics-implementation/ +CVE-2022-34446 - https://www.dell.com/support/kbdoc/000205404 +CVE-2022-34447 - https://www.dell.com/support/kbdoc/000205404 +CVE-2022-34448 - https://www.dell.com/support/kbdoc/000205404 +CVE-2022-34449 - https://www.dell.com/support/kbdoc/000205404 +CVE-2022-34450 - https://www.dell.com/support/kbdoc/000205404 +CVE-2022-34451 - https://www.dell.com/support/kbdoc/000205404 +CVE-2022-34460 - https://www.dell.com/support/kbdoc/000204686 +CVE-2022-34468 - https://bugzilla.mozilla.org/show_bug.cgi?id=1768537 +CVE-2022-34474 - https://bugzilla.mozilla.org/show_bug.cgi?id=1677138 +CVE-2022-34482 - https://bugzilla.mozilla.org/show_bug.cgi?id=845880 +CVE-2022-34494 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 +CVE-2022-34495 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4 +CVE-2022-34496 - https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading +CVE-2022-34502 - https://github.com/radareorg/radare2/issues/20336 +CVE-2022-3451 - https://wpscan.com/vulnerability/d8005cd0-8232-4d43-a4e4-14728eaf1300 +CVE-2022-3452 - https://vuldb.com/?id.210436 +CVE-2022-34520 - https://github.com/radareorg/radare2/issues/20354 +CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/433 +CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/486 +CVE-2022-34527 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-34528 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-34529 - https://github.com/wasm3/wasm3/issues/337 +CVE-2022-3453 - https://vuldb.com/?id.210437 +CVE-2022-34549 - https://github.com/rawchen/sims/issues/6 +CVE-2022-34550 - https://github.com/rawchen/sims/issues/8 +CVE-2022-34551 - https://github.com/rawchen/sims/issues/7 +CVE-2022-3456 - https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce +CVE-2022-34567 - https://www.redteam.tips/mango-vulnerability-disclosure-report/ +CVE-2022-34570 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__messages.md +CVE-2022-34571 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_syslog.shtml.md +CVE-2022-34572 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md +CVE-2022-34573 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_mb_wifibasic.assets/WiFi-Repeater_mb_wifibasic.md +CVE-2022-34574 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_Tftpd32.assets/WiFi-Repeater_Tftpd32.md +CVE-2022-34575 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_fctest.assets/WiFi-Repeater_fctest.md +CVE-2022-34576 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Sensitive%20information%20leakage.md +CVE-2022-34577 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Command%20Execution%20Vulnerability.md +CVE-2022-34578 - https://grimthereaperteam.medium.com/open-source-point-of-sale-v3-3-7-file-upload-cross-site-scripting-4900d717b2c3 +CVE-2022-34592 - https://github.com/winmt/CVE/blob/main/WAVLINK%20WL-WN575A3/README.md +CVE-2022-34592 - https://github.com/winmt/my-vuls/tree/main/WAVLINK%20WL-WN575A3 +CVE-2022-34593 - https://github.com/Liyou-ZY/POC/issues/1 +CVE-2022-34595 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/readme_en.md +CVE-2022-34596 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/2/readme_en.md +CVE-2022-34597 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/TendaAX1806/readme_en.md +CVE-2022-34599 - https://github.com/Darry-lang1/vuln/tree/main/H3C/1 +CVE-2022-34600 - https://github.com/Darry-lang1/vuln/tree/main/H3C/3 +CVE-2022-34601 - https://github.com/Darry-lang1/vuln/tree/main/H3C/2 +CVE-2022-34602 - https://github.com/Darry-lang1/vuln/tree/main/H3C/4 +CVE-2022-34603 - https://github.com/Darry-lang1/vuln/tree/main/H3C/5 +CVE-2022-34604 - https://github.com/Darry-lang1/vuln/tree/main/H3C/11 +CVE-2022-34605 - https://github.com/Darry-lang1/vuln/tree/main/H3C/10 +CVE-2022-34606 - https://github.com/Darry-lang1/vuln/tree/main/H3C/6 +CVE-2022-34607 - https://github.com/Darry-lang1/vuln/tree/main/H3C/8 +CVE-2022-34608 - https://github.com/Darry-lang1/vuln/tree/main/H3C/7 +CVE-2022-34609 - https://github.com/Darry-lang1/vuln/tree/main/H3C/9 +CVE-2022-34610 - https://github.com/Darry-lang1/vuln/tree/main/H3C/12 +CVE-2022-34618 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/ +CVE-2022-34619 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/ +CVE-2022-3462 - https://wpscan.com/vulnerability/b583de48-1332-4984-8c0c-a7ed4a2397cd +CVE-2022-3463 - https://wpscan.com/vulnerability/e2a59481-db45-4b8e-b17a-447303469364 +CVE-2022-3464 - https://vuldb.com/?id.210699 +CVE-2022-34652 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 +CVE-2022-34668 - http://packetstormsecurity.com/files/171483/NVFLARE-Unsafe-Deserialization.html +CVE-2022-34669 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34670 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34671 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1719 +CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1720 +CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1721 +CVE-2022-34672 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34673 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34674 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34675 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34676 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34677 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34678 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34679 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34680 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34681 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34682 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34683 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-34684 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-3469 - https://wpscan.com/vulnerability/017ca231-e019-4694-afa2-ab7f8481ae63 +CVE-2022-3470 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20sc%20parameter%20is%20injected.pdf +CVE-2022-34704 - http://packetstormsecurity.com/files/168329/Windows-Credential-Guard-Non-Constant-Time-Comparison-Information-Disclosure.html +CVE-2022-34705 - http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html +CVE-2022-34707 - http://packetstormsecurity.com/files/168311/Windows-Kernel-Refcount-Overflow-Use-After-Free.html +CVE-2022-34708 - http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html +CVE-2022-34709 - http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html +CVE-2022-3471 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20searccity%20parameter%20is%20injected.pdf +CVE-2022-3471 - https://vuldb.com/?id.210715 +CVE-2022-34710 - http://packetstormsecurity.com/files/168318/Windows-Credential-Guard-Insufficient-Checks-On-Kerberos-Encryption-Type-Use.html +CVE-2022-34711 - http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html +CVE-2022-34712 - http://packetstormsecurity.com/files/168326/Windows-Credential-Guard-KerbIumGetNtlmSupplementalCredential-Information-Disclosure.html +CVE-2022-34716 - http://packetstormsecurity.com/files/168332/.NET-XML-Signature-Verification-External-Entity-Injection.html +CVE-2022-3472 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20cityedit%20parameter%20is%20injected.pdf +CVE-2022-3472 - https://vuldb.com/?id.210716 +CVE-2022-3473 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20ci%20parameter%20is%20injected.pdf +CVE-2022-3473 - https://vuldb.com/?id.210717 +CVE-2022-34753 - http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html +CVE-2022-34756 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf +CVE-2022-34757 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf +CVE-2022-34758 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf +CVE-2022-3477 - https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef +CVE-2022-3481 - https://wpscan.com/vulnerability/c5e395f8-257e-49eb-afbd-9c1e26045373 +CVE-2022-3484 - https://wpscan.com/vulnerability/3afaed61-6187-4915-acf0-16e79d5c2464 +CVE-2022-34845 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1580 +CVE-2022-34850 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1578 +CVE-2022-3486 - https://gitlab.com/gitlab-org/gitlab/-/issues/377810 +CVE-2022-34873 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-34874 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-34875 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-3489 - https://wpscan.com/vulnerability/36d78b6c-0da5-44f8-b7b3-eae78edac505 +CVE-2022-3490 - https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136 +CVE-2022-34903 - http://www.openwall.com/lists/oss-security/2022/07/02/1 +CVE-2022-34903 - https://www.openwall.com/lists/oss-security/2022/06/30/1 +CVE-2022-34906 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/ +CVE-2022-34906 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244 +CVE-2022-34907 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/ +CVE-2022-34907 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244 +CVE-2022-3491 - https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb +CVE-2022-34914 - https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914 +CVE-2022-34918 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html +CVE-2022-34918 - http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html +CVE-2022-34918 - http://www.openwall.com/lists/oss-security/2022/07/05/1 +CVE-2022-34918 - https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u +CVE-2022-34918 - https://www.openwall.com/lists/oss-security/2022/07/02/3 +CVE-2022-34918 - https://www.randorisec.fr/crack-linux-firewall/ +CVE-2022-34937 - https://github.com/u5cms/u5cms/issues/51 +CVE-2022-3494 - https://wpscan.com/vulnerability/71db75c0-5907-4237-884f-8db88b1a9b34 +CVE-2022-3495 - https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC +CVE-2022-3495 - https://vuldb.com/?id.210784 +CVE-2022-34955 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 +CVE-2022-34956 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 +CVE-2022-34961 - https://grimthereaperteam.medium.com/cve-2022-34961-ossn-6-3-lts-stored-xss-vulnerability-at-users-timeline-819a9d4e5e6c +CVE-2022-34962 - https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034 +CVE-2022-34963 - https://grimthereaperteam.medium.com/cve-2022-34963-ossn-6-3-lts-stored-xss-vulnerability-at-news-feed-b8ae8f2fa5f3 +CVE-2022-34964 - https://grimthereaperteam.medium.com/ossn-6-3-lts-stored-xss-vulnerability-at-sitepages-ba91bbeccf1c +CVE-2022-34965 - https://grimthereaperteam.medium.com/cve-2022-34965-open-source-social-network-6-3-3f61db82880 +CVE-2022-34966 - https://grimthereaperteam.medium.com/cve-2022-34966-ossn-6-3-lts-html-injection-vulnerability-at-location-parameter-3fe791dd22c6 +CVE-2022-34968 - https://jira.percona.com/browse/PS-8294 +CVE-2022-34970 - https://github.com/0xhebi/CVE-2022-34970/blob/master/report.md +CVE-2022-34972 - https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html +CVE-2022-34973 - https://github.com/1759134370/iot/blob/main/DIR-820L.md +CVE-2022-34973 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-34974 - https://github.com/1759134370/iot/blob/main/DIR-810L.md +CVE-2022-34974 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-34988 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js +CVE-2022-34989 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar +CVE-2022-35014 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md +CVE-2022-35015 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md +CVE-2022-35016 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md +CVE-2022-35017 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md +CVE-2022-35018 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md +CVE-2022-35019 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md +CVE-2022-3502 - https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss +CVE-2022-35020 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md +CVE-2022-35021 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md +CVE-2022-35022 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35022.md +CVE-2022-35023 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35023.md +CVE-2022-35024 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35024.md +CVE-2022-35025 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35025.md +CVE-2022-35026 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35026.md +CVE-2022-35027 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35027.md +CVE-2022-35028 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35028.md +CVE-2022-35029 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35029.md +CVE-2022-3503 - https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC +CVE-2022-35030 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35030.md +CVE-2022-35031 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35031.md +CVE-2022-35032 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35032.md +CVE-2022-35034 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35034.md +CVE-2022-35035 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35035.md +CVE-2022-35036 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35036.md +CVE-2022-35037 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35037.md +CVE-2022-35038 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35038.md +CVE-2022-35039 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35039.md +CVE-2022-35040 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35040.md +CVE-2022-35041 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35041.md +CVE-2022-35042 - https://drive.google.com/file/d/1Gj8rA1kD89lxUZVb_t-s3-18-ospJRJC/view?usp=sharing +CVE-2022-35042 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35042.md +CVE-2022-35043 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35043.md +CVE-2022-35044 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35044.md +CVE-2022-35045 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md +CVE-2022-35046 - https://drive.google.com/file/d/1M8imA5zUlsMA6lgUbvLQ6rbEn6CO6QKq/view?usp=sharing +CVE-2022-35046 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35046.md +CVE-2022-35047 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35047.md +CVE-2022-35048 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md +CVE-2022-35049 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35049.md +CVE-2022-35050 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35050.md +CVE-2022-35051 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35051.md +CVE-2022-35052 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35052.md +CVE-2022-35053 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35053.md +CVE-2022-35054 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35054.md +CVE-2022-35055 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35055.md +CVE-2022-35056 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35056.md +CVE-2022-35058 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35058.md +CVE-2022-35059 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35059.md +CVE-2022-3506 - https://huntr.dev/bounties/08251542-88f6-4264-9074-a89984034828 +CVE-2022-35060 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35060.md +CVE-2022-35061 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35061.md +CVE-2022-35062 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35062.md +CVE-2022-35063 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35063.md +CVE-2022-35064 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35064.md +CVE-2022-35065 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35065.md +CVE-2022-35066 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35066.md +CVE-2022-35067 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35067.md +CVE-2022-35068 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35068.md +CVE-2022-35069 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35069.md +CVE-2022-35070 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35070.md +CVE-2022-35080 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35080.md +CVE-2022-35081 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35081.md +CVE-2022-35085 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35085.md +CVE-2022-35086 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35086.md +CVE-2022-35087 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35087.md +CVE-2022-35088 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35088.md +CVE-2022-35089 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md +CVE-2022-35090 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35090.md +CVE-2022-35091 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35091.md +CVE-2022-35092 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35092.md +CVE-2022-35093 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35093.md +CVE-2022-35094 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35094.md +CVE-2022-35095 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35095.md +CVE-2022-35096 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35096.md +CVE-2022-35097 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35097.md +CVE-2022-35098 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35098.md +CVE-2022-35099 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35099.md +CVE-2022-35107 - https://github.com/matthiaskramm/swftools/issues/184 +CVE-2022-35108 - https://github.com/matthiaskramm/swftools/issues/184 +CVE-2022-35109 - https://github.com/matthiaskramm/swftools/issues/184 +CVE-2022-3511 - https://wpscan.com/vulnerability/9e57285a-0023-4711-874c-6e7b3c2673d1 +CVE-2022-35110 - https://github.com/matthiaskramm/swftools/issues/184 +CVE-2022-35111 - https://github.com/matthiaskramm/swftools/issues/184 +CVE-2022-35122 - https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/ +CVE-2022-35131 - https://github.com/laurent22/joplin/releases/tag/v2.9.1 +CVE-2022-35131 - https://github.com/ly1g3/Joplin-CVE-2022-35131 +CVE-2022-35134 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35134.html +CVE-2022-35135 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html +CVE-2022-35136 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html +CVE-2022-35137 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-35137.html +CVE-2022-3514 - https://gitlab.com/gitlab-org/gitlab/-/issues/377978 +CVE-2022-35147 - https://github.com/doramart/DoraCMS/issues/256 +CVE-2022-35150 - https://github.com/To-LingJing/CVE-Issues/blob/main/baijiacms/upload_file.md +CVE-2022-35151 - https://github.com/kekingcn/kkFileView/issues/366 +CVE-2022-35154 - https://github.com/secf0ra11/secf0ra11.github.io/blob/main/Shopro_SQL_injection.md +CVE-2022-35155 - https://github.com/shellshok3/Cross-Site-Scripting-XSS/blob/main/Bus%20Pass%20Management%20System%201.0.md +CVE-2022-35156 - https://packetstormsecurity.com/files/168555/Bus-Pass-Management-System-1.0-Cross-Site-Scripting.html +CVE-2022-3516 - https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748 +CVE-2022-35164 - https://github.com/LibreDWG/libredwg/issues/497 +CVE-2022-35165 - https://github.com/axiomatic-systems/Bento4/issues/712 +CVE-2022-35166 - https://github.com/thorfdbg/libjpeg/issues/76 +CVE-2022-35168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35173 - https://github.com/nginx/njs/issues/553 +CVE-2022-35174 - https://www.youtube.com/watch?v=0lngc_zPTSg +CVE-2022-3518 - https://github.com/lohith19/CVE-2022-3518/blob/main/POC +CVE-2022-35191 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-35192 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-35193 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35193 +CVE-2022-35194 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35194 +CVE-2022-35195 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35195 +CVE-2022-35196 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35196 +CVE-2022-3520 - https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246 +CVE-2022-35203 - https://medium.com/@shrutukapoor25/cve-2022-35203-2372a0728279 +CVE-2022-35204 - https://github.com/vitejs/vite/issues/8498 +CVE-2022-35206 - https://sourceware.org/bugzilla/show_bug.cgi?id=29290 +CVE-2022-3521 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec7eede369fe5b0d085ac51fdbb95184f87bfc6c +CVE-2022-35224 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35225 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35226 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35227 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35228 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-3523 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16ce101db85db694a91380aa4c89b25530871d33 +CVE-2022-3524 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11 +CVE-2022-35244 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1582 +CVE-2022-3525 - https://huntr.dev/bounties/ed048e8d-87af-440a-a91f-be1e65a40330 +CVE-2022-35260 - http://seclists.org/fulldisclosure/2023/Jan/19 +CVE-2022-35261 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35262 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35263 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35264 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35265 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35266 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35267 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35268 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35269 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35270 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35271 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 +CVE-2022-35290 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35291 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35292 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35293 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35294 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35295 - http://packetstormsecurity.com/files/170233/SAP-Host-Agent-Privilege-Escalation.html +CVE-2022-35295 - http://seclists.org/fulldisclosure/2022/Dec/12 +CVE-2022-35295 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35296 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35297 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35298 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-35299 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-3536 - https://wpscan.com/vulnerability/6af63aab-b7a6-4ef6-8604-4b4b99467a34 +CVE-2022-3537 - https://wpscan.com/vulnerability/696868f7-409d-422d-87f4-92fc6bf6e74e +CVE-2022-3538 - https://wpscan.com/vulnerability/337ee7ed-9ade-4567-b976-88386cbcf036 +CVE-2022-3539 - https://wpscan.com/vulnerability/ab3b0052-1a74-4ba3-b6d2-78cfe56029db +CVE-2022-35401 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1586 +CVE-2022-35405 - http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html +CVE-2022-35405 - https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html +CVE-2022-35411 - http://packetstormsecurity.com/files/167872/rpc.py-0.6.0-Remote-Code-Execution.html +CVE-2022-35411 - https://medium.com/@elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30 +CVE-2022-35413 - https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview +CVE-2022-35413 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb +CVE-2022-35414 - https://sick.codes/sick-2022-113 +CVE-2022-3546 - https://github.com/thehackingverse/Stored-xss-/blob/main/Poc +CVE-2022-3547 - https://github.com/lakshaya0557/POCs/blob/main/POC +CVE-2022-3548 - https://github.com/Ramansh123454/POCs/blob/main/POC +CVE-2022-3548 - https://vuldb.com/?id.211048 +CVE-2022-3549 - https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE +CVE-2022-35493 - https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS/blob/main/README.md +CVE-2022-35503 - https://osm.etsi.org/ +CVE-2022-35503 - https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure +CVE-2022-35505 - https://github.com/h3xduck/TripleCross/issues/40 +CVE-2022-35506 - https://github.com/h3xduck/TripleCross/issues/40 +CVE-2022-35507 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ +CVE-2022-35508 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/ +CVE-2022-35513 - http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html +CVE-2022-35513 - https://github.com/p1ckzi/CVE-2022-35513 +CVE-2022-35516 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.93/Login.poc.md +CVE-2022-35517 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi +CVE-2022-35518 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-nas_diskshtml-command-injection-in-nascgi +CVE-2022-35519 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-deleting-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi +CVE-2022-3552 - http://packetstormsecurity.com/files/171542/BoxBilling-4.22.1.5-Remote-Code-Execution.html +CVE-2022-3552 - https://huntr.dev/bounties/c6e2973d-386d-4667-9426-10d10828539b +CVE-2022-35520 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-hidden-parameter-ufconf-command-injection-in-apicgi +CVE-2022-35521 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-man_securityshtml-command-injection-in-firewallcgi +CVE-2022-35522 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wanshtml-command-injection-in-admcgi +CVE-2022-35523 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi +CVE-2022-35524 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi +CVE-2022-35525 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-command-injection-in-admcgi +CVE-2022-35526 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-loginshtml-command-injection-in-logincgi +CVE-2022-35533 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-hidden-parameters-command-injection-in-qoscgi +CVE-2022-35534 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_multi_ssidshtml-command-injection-in-wirelesscgi +CVE-2022-35535 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-adding-extender-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi +CVE-2022-35536 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-command-injection-in-qoscgi +CVE-2022-35537 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_meshshtml-hidden-parameter-command-injection-in-wirelesscgi +CVE-2022-35538 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-clicking-the-button-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi +CVE-2022-35540 - https://github.com/dotnetcore/AgileConfig/issues/91 +CVE-2022-3558 - https://wpscan.com/vulnerability/e3d72e04-9cdf-4b7d-953e-876e26abdfc6 +CVE-2022-35582 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb +CVE-2022-35583 - http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html +CVE-2022-35583 - https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing +CVE-2022-35585 - https://huntr.dev/bounties/5-other-forkcms/ +CVE-2022-35587 - https://huntr.dev/bounties/6-other-forkcms/ +CVE-2022-35589 - https://huntr.dev/bounties/7-other-forkcms/ +CVE-2022-35590 - https://huntr.dev/bounties/4-other-forkcms/ +CVE-2022-35598 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35599 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35601 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35602 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35603 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35604 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35605 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35606 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-35611 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35611.html +CVE-2022-35612 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35612.html +CVE-2022-35619 - https://github.com/1759134370/iot/blob/main/DIR-818L.md +CVE-2022-35619 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-3562 - https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657 +CVE-2022-35620 - https://github.com/1759134370/iot/blob/main/DIR-818L.md +CVE-2022-35620 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-35621 - https://github.com/MacherCS/CVE_Evoh_Contract +CVE-2022-3569 - http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html +CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/381 +CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/386 +CVE-2022-35737 - https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/ +CVE-2022-35739 - https://raxis.com/blog/cve-2022-35739 +CVE-2022-3574 - https://wpscan.com/vulnerability/0eae5189-81af-4344-9e96-dd1f4e223d41 +CVE-2022-35768 - http://packetstormsecurity.com/files/168313/Windows-Kernel-Registry-Hive-Memory-Problems.html +CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=945a9a8e448b65bec055d37eba58f711b39f66f0 +CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc4ef9d5724973193bfa5ebed181dba6de3a56db +CVE-2022-35771 - http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html +CVE-2022-3578 - https://wpscan.com/vulnerability/17596b0e-ff45-4d0c-8e57-a31101e30345 +CVE-2022-3579 - https://github.com/DisguisedRoot/Exploit/blob/main/SQLInj/POC +CVE-2022-3579 - https://vuldb.com/?id.211186 +CVE-2022-3582 - https://github.com/jusstSahil/CSRF-/blob/main/POC +CVE-2022-35822 - http://packetstormsecurity.com/files/168331/Windows-Credential-Guard-TGT-Renewal-Information-Disclosure.html +CVE-2022-3583 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql1.md +CVE-2022-3583 - https://vuldb.com/?id.211192 +CVE-2022-3584 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql2.md +CVE-2022-3585 - https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System/blob/main/PoC +CVE-2022-35866 - http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html +CVE-2022-3587 - https://github.com/rsrahulsingh05/POC/blob/main/Stored%20XSS +CVE-2022-35874 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 +CVE-2022-35875 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 +CVE-2022-35876 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 +CVE-2022-35877 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581 +CVE-2022-35878 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 +CVE-2022-35879 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 +CVE-2022-35880 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 +CVE-2022-35881 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583 +CVE-2022-35884 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 +CVE-2022-35885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 +CVE-2022-35886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 +CVE-2022-35887 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585 +CVE-2022-35890 - https://github.com/sourceincite/randy +CVE-2022-35899 - https://github.com/AngeloPioAmirante/CVE-2022-35899 +CVE-2022-35899 - https://packetstormsecurity.com/files/167763/Asus-GameSDK-1.0.0.4-Unquoted-Service-Path.html +CVE-2022-35899 - https://www.exploit-db.com/exploits/50985 +CVE-2022-3590 - https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11 +CVE-2022-3591 - https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921 +CVE-2022-35911 - https://packetstormsecurity.com/files/167797/Patlite-1.46-Buffer-Overflow.html +CVE-2022-35913 - https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html +CVE-2022-35914 - http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html +CVE-2022-35919 - http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html +CVE-2022-35923 - https://huntr.dev/bounties/2d92f644-593b-43b4-bfd1-c8042ac60609/ +CVE-2022-35925 - https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/ +CVE-2022-35953 - https://huntr.dev/bounties/67ca22bd-19c6-466b-955a-b1ee2da0c575/ +CVE-2022-3597 - https://gitlab.com/libtiff/libtiff/-/issues/413 +CVE-2022-3598 - https://gitlab.com/libtiff/libtiff/-/issues/435 +CVE-2022-3599 - https://gitlab.com/libtiff/libtiff/-/issues/398 +CVE-2022-3600 - https://wpscan.com/vulnerability/16e2d970-19d0-42d1-8fb1-e7cb14ace1d0 +CVE-2022-3601 - https://wpscan.com/vulnerability/28b7ee77-5826-4c98-b09a-8f197e1a6d18 +CVE-2022-3602 - http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html +CVE-2022-3603 - https://wpscan.com/vulnerability/376e2bc7-2eb9-4e0a-809c-1582940ebdc7 +CVE-2022-3604 - https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de/ +CVE-2022-3605 - https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2 +CVE-2022-36067 - https://github.com/patriksimek/vm2/issues/467 +CVE-2022-36067 - https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067 +CVE-2022-36069 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ +CVE-2022-3608 - https://huntr.dev/bounties/8f0f3635-9d81-4c55-9826-2ba955c3a850 +CVE-2022-36082 - https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw +CVE-2022-36087 - https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7 +CVE-2022-3609 - https://wpscan.com/vulnerability/b893cac2-6511-4e2a-9eff-baf0f3cc9d7e +CVE-2022-3610 - https://wpscan.com/vulnerability/33b52dd7-613f-46e4-b8ee-beddd31689eb +CVE-2022-36111 - https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake +CVE-2022-36115 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36116 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36117 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36118 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36119 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36120 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36121 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise +CVE-2022-36123 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.13 +CVE-2022-36123 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-128.md +CVE-2022-36123 - https://sick.codes/sick-2022-128 +CVE-2022-36126 - https://github.com/sourceincite/randy +CVE-2022-36126 - https://srcincite.io/advisories/src-2022-0014/ +CVE-2022-36131 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-038.txt +CVE-2022-36136 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-deposit-commend-839d2c587d6e +CVE-2022-36137 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-sheader-2ed4184030f7 +CVE-2022-36139 - https://github.com/djcsdy/swfmill/issues/56 +CVE-2022-36140 - https://github.com/djcsdy/swfmill/issues/57 +CVE-2022-36141 - https://github.com/djcsdy/swfmill/issues/58 +CVE-2022-36142 - https://github.com/djcsdy/swfmill/issues/61 +CVE-2022-36143 - https://github.com/djcsdy/swfmill/issues/62 +CVE-2022-36144 - https://github.com/djcsdy/swfmill/issues/63 +CVE-2022-36145 - https://github.com/djcsdy/swfmill/issues/64 +CVE-2022-36146 - https://github.com/djcsdy/swfmill/issues/65 +CVE-2022-36148 - https://github.com/nu774/fdkaac/issues/52 +CVE-2022-36161 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0 +CVE-2022-36170 - https://github.com/prismbreak/vulnerabilities/issues/2 +CVE-2022-36171 - https://github.com/prismbreak/vulnerabilities/issues/2 +CVE-2022-36173 - https://public-exposure.inform.social/post/integrity-checking/ +CVE-2022-36174 - https://public-exposure.inform.social/post/integrity-checking/ +CVE-2022-36179 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ +CVE-2022-3618 - https://wpscan.com/vulnerability/2011dc7b-8e8c-4190-ab34-de288e14685b +CVE-2022-36180 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ +CVE-2022-36182 - https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html +CVE-2022-36186 - https://github.com/gpac/gpac/issues/2223 +CVE-2022-36190 - https://github.com/gpac/gpac/issues/2220 +CVE-2022-36191 - https://github.com/gpac/gpac/issues/2218 +CVE-2022-36193 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-36193/POC.md +CVE-2022-36194 - http://packetstormsecurity.com/files/168149/Centreon-22.04.0-Cross-Site-Scripting.html +CVE-2022-36194 - https://github.com/amdsyad/poc-dump/blob/main/Stored%20XSS%20in%20name%20parameter%20in%20Centreon%20version%2022.04.0 +CVE-2022-36197 - https://github.com/bigtreecms/BigTree-CMS/issues/392 +CVE-2022-36198 - https://github.com/jcarabantes/Bus-Vulnerabilities +CVE-2022-36200 - https://github.com/afaq1337/CVE-2022-36200 +CVE-2022-36201 - http://packetstormsecurity.com/files/168212/Doctors-Appointment-System-1.0-SQL-Injection.html +CVE-2022-36203 - http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html +CVE-2022-36215 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedebiz/6.0.0/sys_info.poc.md +CVE-2022-36216 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.94/member_toadmin.poc.md +CVE-2022-36223 - https://medium.com/@cupc4k3/administrator-account-takeover-in-emby-media-server-616fc2a6704f +CVE-2022-36224 - https://github.com/dayrui/xunruicms/issues/1 +CVE-2022-36225 - https://github.com/weng-xianhu/eyoucms/issues/26 +CVE-2022-36226 - https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell +CVE-2022-36227 - https://github.com/libarchive/libarchive/issues/1754 +CVE-2022-36231 - https://github.com/affix/CVE-2022-36231 +CVE-2022-36234 - https://github.com/kashimAstro/SimpleNetwork/issues/22 +CVE-2022-36251 - https://github.com/ZhenKaiHe/bug_report/blob/main/vendors/onetnom23/clinics-patient-management-system/XSS-1.md +CVE-2022-36254 - https://gist.github.com/ziyishen97/c464b459df73c4cef241e7ec774b7cf6 +CVE-2022-36255 - https://gist.github.com/ziyishen97/268678bca3034c64861b135946ee9fc3 +CVE-2022-36255 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-36256 - https://gist.github.com/ziyishen97/0fd90a5939ffb401e8a74f4a415e1610 +CVE-2022-36256 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-36257 - https://gist.github.com/ziyishen97/ff3816032a76796f45368ed243ab3343 +CVE-2022-36257 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-36258 - https://gist.github.com/ziyishen97/3553468b534c250f7b0d47e8a4c5fa52 +CVE-2022-36258 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-36259 - https://gist.github.com/ziyishen97/47666f584cd4cdad1d0f6af5f33a56db +CVE-2022-36259 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 +CVE-2022-3626 - https://gitlab.com/libtiff/libtiff/-/issues/426 +CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34 +CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34?by=xboy(topsec) +CVE-2022-36266 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html +CVE-2022-36267 - http://packetstormsecurity.com/files/168047/AirSpot-5410-0.3.4.1-4-Remote-Command-Injection.html +CVE-2022-36271 - https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271 +CVE-2022-36273 - https://github.com/F0und-icu/CVEIDs/tree/main/TendaAC9 +CVE-2022-36279 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605 +CVE-2022-36280 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2071 +CVE-2022-36306 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 +CVE-2022-36309 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4 +CVE-2022-3631 - https://wpscan.com/vulnerability/13966b61-7e65-4493-8bd8-828d6d4441d5 +CVE-2022-36310 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm +CVE-2022-36314 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-36315 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-36316 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-36317 - https://bugzilla.mozilla.org/show_bug.cgi?id=1759951 +CVE-2022-36317 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-36318 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-36319 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737722 +CVE-2022-36319 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-3632 - https://wpscan.com/vulnerability/4c1b0e5e-245a-4d1f-a561-e91af906e62d +CVE-2022-36320 - https://www.mozilla.org/security/advisories/mfsa2022-28/ +CVE-2022-36329 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191 +CVE-2022-36330 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191 +CVE-2022-3634 - https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10 +CVE-2022-36354 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1629 +CVE-2022-36402 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2072 +CVE-2022-36429 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597 +CVE-2022-3643 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2022-36436 - https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-bypass/ +CVE-2022-36440 - https://github.com/spwpun/pocs +CVE-2022-36440 - https://github.com/spwpun/pocs/blob/main/frr-bgpd.md +CVE-2022-36442 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html +CVE-2022-36443 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html +CVE-2022-36446 - http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html +CVE-2022-36446 - http://packetstormsecurity.com/files/168049/Webmin-Package-Updates-Command-Injection.html +CVE-2022-36446 - https://www.exploit-db.com/exploits/50998 +CVE-2022-36447 - https://www.chia.net/2022/07/25/upgrading-the-cat-standard.en.html +CVE-2022-36449 - http://packetstormsecurity.com/files/168431/Arm-Mali-Released-Buffer-Use-After-Free.html +CVE-2022-36449 - http://packetstormsecurity.com/files/168432/Arm-Mali-Physical-Address-Exposure.html +CVE-2022-36449 - http://packetstormsecurity.com/files/168433/Arm-Mali-Race-Condition.html +CVE-2022-36449 - http://packetstormsecurity.com/files/168434/Arm-Mali-CSF-Missing-Buffer-Size-Check.html +CVE-2022-36455 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3600R/1/readme.md +CVE-2022-36456 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A720R/1 +CVE-2022-36458 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/2/readme.md +CVE-2022-36459 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/3/readme.md +CVE-2022-36460 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/4/readme.md +CVE-2022-36461 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/5/readme.md +CVE-2022-36462 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/6/readme.md +CVE-2022-36463 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/8/readme.md +CVE-2022-36464 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/10/readme.md +CVE-2022-36465 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/9/readme.md +CVE-2022-36466 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/7/readme.md +CVE-2022-36467 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md +CVE-2022-36468 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/5/readme.md +CVE-2022-36469 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/7/readme.md +CVE-2022-36470 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/6/readme.md +CVE-2022-36471 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/2/readme.md +CVE-2022-36472 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/8/readme.md +CVE-2022-36473 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/10/readme.md +CVE-2022-36474 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/9/readme.md +CVE-2022-36475 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/3/readme.md +CVE-2022-36477 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/12/readme.md +CVE-2022-36478 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/11/readme.md +CVE-2022-36479 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/3 +CVE-2022-36480 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/8 +CVE-2022-36481 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/1 +CVE-2022-36482 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/6 +CVE-2022-36483 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/9 +CVE-2022-36484 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7 +CVE-2022-36485 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/5 +CVE-2022-36486 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/4 +CVE-2022-36487 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/2 +CVE-2022-36488 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10 +CVE-2022-36489 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/1 +CVE-2022-36490 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5 +CVE-2022-36491 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/2 +CVE-2022-36492 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/4 +CVE-2022-36493 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/8 +CVE-2022-36494 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/7 +CVE-2022-36495 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/6 +CVE-2022-36496 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/9 +CVE-2022-36497 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/10 +CVE-2022-36498 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/3 +CVE-2022-36499 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/19 +CVE-2022-3650 - https://seclists.org/oss-sec/2022/q4/41 +CVE-2022-36500 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/13 +CVE-2022-36501 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/16 +CVE-2022-36502 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/18 +CVE-2022-36503 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/17 +CVE-2022-36504 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/11 +CVE-2022-36505 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/20 +CVE-2022-36506 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/14 +CVE-2022-36507 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/12 +CVE-2022-36508 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/15 +CVE-2022-36509 - https://github.com/Darry-lang1/vuln/blob/main/H3C/GR3200/1/readme.md +CVE-2022-36510 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR2200/1 +CVE-2022-36511 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/2 +CVE-2022-36513 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/5 +CVE-2022-36514 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/1 +CVE-2022-36515 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/4 +CVE-2022-36516 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/3 +CVE-2022-36517 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7 +CVE-2022-36518 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8 +CVE-2022-36519 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/9 +CVE-2022-36520 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/10 +CVE-2022-36522 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-36522/README.md +CVE-2022-36522 - https://seclists.org/fulldisclosure/2021/Jul/0 +CVE-2022-36523 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36524 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36525 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36526 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36532 - https://lutrasecurity.com/en/articles/cve-2022-36532/ +CVE-2022-36534 - http://packetstormsecurity.com/files/170245/Syncovery-For-Linux-Web-GUI-Authenticated-Remote-Command-Execution.html +CVE-2022-36537 - https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/ +CVE-2022-3654 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html +CVE-2022-36543 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md +CVE-2022-36544 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md +CVE-2022-36545 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md +CVE-2022-36546 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md +CVE-2022-36551 - http://packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html +CVE-2022-36561 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308 +CVE-2022-36568 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/3/tenda_ac9_setPptpUserList.md +CVE-2022-36569 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/4/tenda_ac9_setMacFilterCfg.md +CVE-2022-36570 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/1/tenda_ac9_SetLEDCfg.md +CVE-2022-36571 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/2/tenda_ac9_WanParameterSetting.md +CVE-2022-36572 - https://github.com/BreakALegCml/try/blob/main/SinSiuEnterpriseWebsiteSystem +CVE-2022-36577 - https://github.com/Cherry-toto/jizhicms/issues/77 +CVE-2022-36579 - https://github.com/wellcms/wellcms/issues/11 +CVE-2022-36580 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/Arbitrary-File-Upload-Vulnerability.md +CVE-2022-36581 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/SQL-Injection-Vulnerability.md +CVE-2022-36582 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Garage-Management-System/Arbitrary-File-Upload-Vulnerability.md +CVE-2022-36588 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36593 - https://github.com/kekingcn/kkFileView/issues/370 +CVE-2022-36606 - https://github.com/cloudwebsoft/ywoa/issues/25 +CVE-2022-36617 - https://startrekdude.github.io/arqbackup.html +CVE-2022-36619 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/setmac/readme.md +CVE-2022-36619 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-3662 - https://github.com/axiomatic-systems/Bento4/issues/802 +CVE-2022-36620 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting +CVE-2022-36620 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md +CVE-2022-36620 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-3663 - https://github.com/axiomatic-systems/Bento4/issues/800 +CVE-2022-3663 - https://vuldb.com/?id.212003 +CVE-2022-36633 - http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html +CVE-2022-36633 - https://github.com/gravitational/teleport +CVE-2022-36633 - https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html +CVE-2022-36634 - https://seclists.org/fulldisclosure/2022/Sep/29 +CVE-2022-36636 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ +CVE-2022-36637 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ +CVE-2022-36638 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ +CVE-2022-36639 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/ +CVE-2022-3664 - https://github.com/axiomatic-systems/Bento4/issues/794 +CVE-2022-36640 - http://influxdata.com +CVE-2022-36640 - http://influxdb.com +CVE-2022-36640 - https://www.influxdata.com/ +CVE-2022-36642 - https://cyber-guy.gitbook.io/cyber-guy/pocs/omnia-node-mpx-auth-bypass-via-lfd +CVE-2022-36642 - https://www.exploit-db.com/exploits/50996 +CVE-2022-36647 - https://github.com/pkuvcl/davs2/issues/29 +CVE-2022-3665 - https://github.com/axiomatic-systems/Bento4/issues/794 +CVE-2022-36657 - https://github.com/z1pwn/bug_report/blob/main/vendors/kingbhob02/library-management-system/XSS-1.md +CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip +CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/issues/793 +CVE-2022-36664 - https://packetstormsecurity.com/files/168599/Password-Manager-For-IIS-2.0-Cross-Site-Scripting.html +CVE-2022-36667 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md +CVE-2022-36668 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md +CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md +CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System +CVE-2022-36669 - https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html +CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip +CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/issues/776 +CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip +CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/issues/776 +CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip +CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/issues/776 +CVE-2022-36736 - https://github.com/UditChavda/Udit-Chavda-CVE/blob/main/CVE-2022-36736 +CVE-2022-36755 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36756 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-36759 - https://hackmd.io/@hieuleuxuan/OFOS_Sql_Injection +CVE-2022-3677 - https://wpscan.com/vulnerability/5a7c6367-a3e6-4411-8865-2a9dbc9f1450 +CVE-2022-36788 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 +CVE-2022-3679 - https://wpscan.com/vulnerability/ec4b9bf7-71d6-4528-9dd1-cc7779624760 +CVE-2022-36804 - http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html +CVE-2022-36804 - http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html +CVE-2022-36879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901 +CVE-2022-3688 - https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848 +CVE-2022-3689 - https://wpscan.com/vulnerability/e9c551a3-7482-4421-8197-5886d028776c +CVE-2022-3690 - https://wpscan.com/vulnerability/725f6ae4-7ec5-4d7c-9533-c9b61b59cc2b +CVE-2022-3691 - https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560 +CVE-2022-3694 - https://wpscan.com/vulnerability/ad12bab7-9baf-4646-a93a-0d3286407c1e +CVE-2022-36943 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-vgvw-6xcf-qqfc +CVE-2022-37030 - http://www.openwall.com/lists/oss-security/2022/08/04/1 +CVE-2022-37030 - https://bugzilla.suse.com/show_bug.cgi?id=1201949 +CVE-2022-37035 - https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing +CVE-2022-37035 - https://github.com/FRRouting/frr/issues/11698 +CVE-2022-3704 - https://github.com/rails/rails/issues/46244 +CVE-2022-37042 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html +CVE-2022-37047 - https://github.com/appneta/tcpreplay/issues/734 +CVE-2022-37048 - https://github.com/appneta/tcpreplay/issues/735 +CVE-2022-37049 - https://github.com/appneta/tcpreplay/issues/736 +CVE-2022-3705 - http://seclists.org/fulldisclosure/2023/Jan/19 +CVE-2022-37050 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274 +CVE-2022-37051 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276 +CVE-2022-37052 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278 +CVE-2022-37055 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37056 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37057 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37060 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html +CVE-2022-37060 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php +CVE-2022-37061 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html +CVE-2022-37061 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html +CVE-2022-37061 - http://packetstormsecurity.com/files/169701/FLIR-AX8-1.46.16-Remote-Command-Injection.html +CVE-2022-37061 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5491.php +CVE-2022-37062 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html +CVE-2022-37063 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html +CVE-2022-37066 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/15 +CVE-2022-37067 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/17 +CVE-2022-37068 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/14 +CVE-2022-37069 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/12 +CVE-2022-37070 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/19 +CVE-2022-37071 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/18 +CVE-2022-37072 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/16 +CVE-2022-37073 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/13 +CVE-2022-37074 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/11 +CVE-2022-37075 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/7 +CVE-2022-37076 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/4 +CVE-2022-37077 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/9 +CVE-2022-37078 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6 +CVE-2022-37079 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/5 +CVE-2022-37080 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/8 +CVE-2022-37081 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/2 +CVE-2022-37082 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3 +CVE-2022-37083 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/1 +CVE-2022-37084 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/10 +CVE-2022-37085 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/9 +CVE-2022-37086 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/3 +CVE-2022-37087 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/6 +CVE-2022-37088 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/4 +CVE-2022-37089 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/2 +CVE-2022-37090 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/8 +CVE-2022-37091 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/10 +CVE-2022-37092 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/5 +CVE-2022-37093 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/1 +CVE-2022-37094 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/7 +CVE-2022-37095 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/16 +CVE-2022-37096 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/11 +CVE-2022-37097 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/13 +CVE-2022-37098 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12 +CVE-2022-37099 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/14 +CVE-2022-37100 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/15 +CVE-2022-37109 - http://packetstormsecurity.com/files/171478/Raspberry-Pi-Camera-Server-1.0-Authentication-Bypass.html +CVE-2022-37109 - https://medium.com/@elias.hohl/authentication-bypass-vulnerability-in-camp-a-raspberry-pi-camera-server-477e5d270904 +CVE-2022-37122 - https://packetstormsecurity.com/files/167684/ +CVE-2022-37122 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5709.php +CVE-2022-37123 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2userconfig_cgi/readme.md +CVE-2022-37123 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37125 - https://github.com/z1r00/IOT_Vul/tree/main/dlink/Dir816/form2systime_cgi +CVE-2022-37125 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37128 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/wizard_end/readme.md +CVE-2022-37128 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37129 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md +CVE-2022-37129 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37130 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis +CVE-2022-37130 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md +CVE-2022-37130 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37133 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/doReboot/readme.md +CVE-2022-37133 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37134 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2Wan_cgi/readme.md +CVE-2022-37134 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-37137 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney +CVE-2022-37138 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md +CVE-2022-37139 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md +CVE-2022-37140 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney +CVE-2022-37149 - https://github.com/fxc233/iot-vul/blob/main/WAVLINK/WN575A3/Readme.md +CVE-2022-37155 - https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.2/SPIP_4.1.2_AUTH_RCE/SPIP_4.1.2_AUTH_RCE_Abyss_Watcher_12_07_22.md +CVE-2022-37155 - https://spawnzii.github.io/posts/2022/07/how-we-have-pwned-root-me-in-2022/ +CVE-2022-37159 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/rce/rce_file_upload.md +CVE-2022-37160 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/csrf/csrf.md +CVE-2022-37161 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/svg_xss/svg_xss.md +CVE-2022-37162 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/calendar_xss/calendar_xss.md +CVE-2022-37175 - https://www.cnblogs.com/Amalll/p/16527552.html +CVE-2022-37176 - https://drive.google.com/drive/folders/1L6ojSooP8sbZLQYRsAxlb0IWVAZef8Z7?usp=sharing +CVE-2022-37183 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Piwigo/2022/12.3.0 +CVE-2022-37184 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Garage-Management-System-1.0-SFU +CVE-2022-37191 - https://github.com/CuppaCMS/CuppaCMS/issues/20 +CVE-2022-37191 - https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability +CVE-2022-37197 - https://www.exploit-db.com/exploits/51029 +CVE-2022-3720 - https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5 +CVE-2022-37201 - https://github.com/AgainstTheLight/CVE-2022-37201/blob/main/README.md +CVE-2022-37201 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql4.md +CVE-2022-37202 - https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md +CVE-2022-37202 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md +CVE-2022-37203 - https://github.com/AgainstTheLight/CVE-2022-37203/blob/main/README.md +CVE-2022-37203 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md +CVE-2022-37204 - https://github.com/AgainstTheLight/CVE-2022-37204/blob/main/README.md +CVE-2022-37204 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md +CVE-2022-37205 - https://github.com/AgainstTheLight/CVE-2022-37205/blob/main/README.md +CVE-2022-37205 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql8.md +CVE-2022-37207 - https://github.com/AgainstTheLight/CVE-2022-37207/blob/main/README.md +CVE-2022-37207 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql10.md +CVE-2022-37208 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql5.md +CVE-2022-37209 - https://github.com/AgainstTheLight/CVE-2022-37209/tree/main +CVE-2022-37209 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md +CVE-2022-3721 - https://huntr.dev/bounties/a3c506f0-5f8a-4eaa-b8cc-46fb9e35cf7a +CVE-2022-37237 - https://github.com/ZLMediaKit/ZLMediaKit/issues/1839 +CVE-2022-3725 - https://gitlab.com/wireshark/wireshark/-/issues/18378 +CVE-2022-37253 - https://packetstormsecurity.com/files/167875/Crime-Reporting-System-1.0-Cross-Site-Scripting.html +CVE-2022-37255 - http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html +CVE-2022-37292 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/1 +CVE-2022-37298 - https://github.com/dbyio/cve-2022-37298 +CVE-2022-3730 - https://vuldb.com/?id.212412 +CVE-2022-37301 - https://www.se.com/us/en/download/document/SEVD-2022-221-02/ +CVE-2022-37306 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html +CVE-2022-37307 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37308 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37309 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37310 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37311 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37312 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37313 - https://seclists.org/fulldisclosure/2022/Nov/18 +CVE-2022-37317 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/682060 +CVE-2022-37318 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/682060 +CVE-2022-37326 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 +CVE-2022-37331 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672 +CVE-2022-37332 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1602 +CVE-2022-37337 - https://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187 +CVE-2022-37337 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596 +CVE-2022-3739 - https://wpscan.com/vulnerability/b9f39ced-1e0f-4559-b861-39ddcbcd1249/ +CVE-2022-37393 - https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis +CVE-2022-37400 - https://www.openoffice.org/security/cves/CVE-2022-37400.html +CVE-2022-37401 - https://www.openoffice.org/security/cves/CVE-2022-37401.html +CVE-2022-3741 - https://huntr.dev/bounties/46f6e07e-f438-4540-938a-510047f987d0 +CVE-2022-37415 - https://gist.github.com/alfarom256/220cb75816ca2b5556e7fc8d8d2803a0 +CVE-2022-37416 - https://issuetracker.google.com/issues/231026247 +CVE-2022-37424 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/ +CVE-2022-37425 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/ +CVE-2022-37426 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/ +CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/37 +CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/38 +CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/41 +CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/42 +CVE-2022-37434 - https://github.com/ivd38/zlib_overflow +CVE-2022-37450 - https://medium.com/@aviv.yaish/uncle-maker-time-stamping-out-the-competition-in-ethereum-d27c1cb62fef +CVE-2022-37454 - https://mouha.be/sha-3-buffer-overflow/ +CVE-2022-37461 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=30693 +CVE-2022-37462 - https://www.campusguard.com/post/going-beyond-pen-testing-to-identify-zero-day-exploits +CVE-2022-3747 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt +CVE-2022-3750 - https://wpscan.com/vulnerability/5019db80-0356-497d-b488-a26a5de78676 +CVE-2022-3751 - https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9 +CVE-2022-3753 - https://wpscan.com/vulnerability/8e88a5b9-6f1d-40de-99fc-8e1e66646c2b +CVE-2022-3754 - https://huntr.dev/bounties/f4711d7f-1368-48ab-9bef-45f32e356c47 +CVE-2022-37599 - https://github.com/webpack/loader-utils/issues/216 +CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212 +CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884 +CVE-2022-37601 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 +CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L11 +CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L16 +CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436 +CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 +CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 +CVE-2022-3762 - https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac +CVE-2022-3763 - https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f +CVE-2022-3764 - https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/ +CVE-2022-3765 - https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d +CVE-2022-3766 - https://huntr.dev/bounties/d9666520-4ff5-43bb-aacf-50c8e5570983 +CVE-2022-37661 - http://packetstormsecurity.com/files/168336/SmartRG-Router-2.6.13-Remote-Code-Execution.html +CVE-2022-37661 - http://packetstormsecurity.com/files/169816/SmartRG-Router-SR510n-2.6.13-Remote-Code-Execution.html +CVE-2022-37661 - https://packetstormsecurity.com/files/cve/CVE-2022-37661 +CVE-2022-3768 - https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/ +CVE-2022-3768 - https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3 +CVE-2022-3769 - https://bulletin.iese.de/post/owm-weather_5-6-8/ +CVE-2022-3769 - https://wpscan.com/vulnerability/2f9ffc1e-c8a9-47bb-a76b-d043c93e63f8 +CVE-2022-37700 - https://medium.com/@sc0p3hacker/cve-2022-37700-directory-transversal-in-zentao-easy-soft-alm-2573c1f0fc21 +CVE-2022-37703 - https://github.com/MaherAzzouzi/CVE-2022-37703 +CVE-2022-37704 - https://github.com/MaherAzzouzi/CVE-2022-37704 +CVE-2022-37705 - https://github.com/MaherAzzouzi/CVE-2022-37705 +CVE-2022-37706 - https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit +CVE-2022-37709 - https://github.com/fmsh-seclab/TesMla +CVE-2022-37709 - https://youtu.be/cPhYW5FzA9A +CVE-2022-37718 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html +CVE-2022-37719 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html +CVE-2022-37731 - https://github.com/whiex/webvue2/blob/gh-pages/ftcmsxss.md +CVE-2022-3774 - http://packetstormsecurity.com/files/169604/Train-Scheduler-App-1.0-Insecure-Direct-Object-Reference.html +CVE-2022-3774 - https://github.com/rohit0x5/poc/blob/main/idor +CVE-2022-3774 - https://vuldb.com/?id.212504 +CVE-2022-37768 - https://github.com/thorfdbg/libjpeg/issues/77 +CVE-2022-37769 - https://github.com/thorfdbg/libjpeg/issues/78 +CVE-2022-37770 - https://github.com/thorfdbg/libjpeg/issues/79 +CVE-2022-37771 - https://packetstormsecurity.com/files/167913/IObit-Malware-Fighter-9.2-Tampering-Privilege-Escalation.html +CVE-2022-37775 - http://genesys.com +CVE-2022-37775 - http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html +CVE-2022-37781 - https://github.com/nu774/fdkaac/issues/54 +CVE-2022-37794 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md +CVE-2022-37797 - https://redmine.lighttpd.net/issues/3165 +CVE-2022-37798 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5 +CVE-2022-37799 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/2 +CVE-2022-37800 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/7 +CVE-2022-37801 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/9 +CVE-2022-37802 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/6 +CVE-2022-37803 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/8 +CVE-2022-37804 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3 +CVE-2022-37805 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/1 +CVE-2022-37806 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/4 +CVE-2022-37807 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/10 +CVE-2022-37808 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/15 +CVE-2022-37809 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/11 +CVE-2022-37810 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/19 +CVE-2022-37811 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/17 +CVE-2022-37812 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12 +CVE-2022-37813 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/16 +CVE-2022-37814 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/14 +CVE-2022-37815 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/18 +CVE-2022-37816 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/13 +CVE-2022-37817 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/4 +CVE-2022-37818 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/2 +CVE-2022-37819 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/7 +CVE-2022-37820 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/8 +CVE-2022-37821 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/6 +CVE-2022-37822 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/3 +CVE-2022-37823 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/1 +CVE-2022-37824 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/5 +CVE-2022-37839 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/5.md +CVE-2022-3784 - https://github.com/axiomatic-systems/Bento4/issues/806 +CVE-2022-3784 - https://vuldb.com/?id.212563 +CVE-2022-37840 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/3.md +CVE-2022-37842 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/1.md +CVE-2022-37843 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/4.md +CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip +CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/issues/780 +CVE-2022-37956 - http://packetstormsecurity.com/files/168723/Windows-Kernel-Registry-Subkey-Lists-Integer-Overflow.html +CVE-2022-3797 - https://vuldb.com/?id.212633 +CVE-2022-3798 - https://github.com/IBAX-io/go-ibax/issues/2060 +CVE-2022-37988 - http://packetstormsecurity.com/files/169731/Windows-Kernel-Registry-Use-After-Free.html +CVE-2022-3799 - https://github.com/IBAX-io/go-ibax/issues/2060 +CVE-2022-37991 - http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html +CVE-2022-3800 - https://github.com/IBAX-io/go-ibax/issues/2061 +CVE-2022-3801 - https://github.com/IBAX-io/go-ibax/issues/2062 +CVE-2022-3802 - https://github.com/IBAX-io/go-ibax/issues/2063 +CVE-2022-38037 - http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html +CVE-2022-38038 - http://packetstormsecurity.com/files/169805/Windows-Kernel-Long-Registry-Path-Memory-Corruption.html +CVE-2022-38060 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589 +CVE-2022-38065 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599 +CVE-2022-38066 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615 +CVE-2022-3807 - https://vuldb.com/?id.212660 +CVE-2022-38072 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 +CVE-2022-38088 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609 +CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip +CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/issues/779 +CVE-2022-38096 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2073 +CVE-2022-38097 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601 +CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip +CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/issues/779 +CVE-2022-3810 - https://vuldb.com/?id.212667 +CVE-2022-38105 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1590 +CVE-2022-38108 - http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html +CVE-2022-3811 - https://wpscan.com/vulnerability/262924da-e269-4008-a24f-9f26a033b23e +CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip +CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/issues/792 +CVE-2022-38123 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-38124 - https://www.secomea.com/support/cybersecurity-advisory/ +CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip +CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/issues/792 +CVE-2022-3813 - https://vuldb.com/?id.212679 +CVE-2022-38131 - https://support.posit.co/hc/en-us/articles/10983374992023 +CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip +CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/issues/792 +CVE-2022-3814 - https://vuldb.com/?id.212680 +CVE-2022-38143 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630 +CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip +CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/issues/792 +CVE-2022-38152 - http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html +CVE-2022-38152 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ +CVE-2022-38153 - http://packetstormsecurity.com/files/170605/wolfSSL-5.3.0-Denial-Of-Service.html +CVE-2022-38153 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ +CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip +CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/issues/792 +CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip +CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/issues/792 +CVE-2022-38171 - https://github.com/jeffssh/CVE-2021-30860 +CVE-2022-38176 - https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation +CVE-2022-38181 - http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html +CVE-2022-38181 - https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ +CVE-2022-38183 - https://herolab.usd.de/security-advisories/usd-2022-0015/ +CVE-2022-38201 - https://www.esri.com/arcgis-blog/products/product/uncategorized/portal-for-arcgis-quick-capture-security-patch-is-now-available +CVE-2022-3822 - https://wpscan.com/vulnerability/48ec2e4a-0190-4f36-afd1-d5799ba28c13 +CVE-2022-38222 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42320 +CVE-2022-38223 - https://github.com/tats/w3m/issues/242 +CVE-2022-3823 - https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e +CVE-2022-3824 - https://wpscan.com/vulnerability/3ca6d724-cd79-4e07-b8d0-a8c1688abf16 +CVE-2022-38256 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005 +CVE-2022-38258 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-3826 - https://vuldb.com/?id.212793 +CVE-2022-38272 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38273 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38274 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38275 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38276 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38277 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38278 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38279 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-3828 - https://wpscan.com/vulnerability/4188ed01-b64b-4aba-a215-e8dc5b308486 +CVE-2022-38280 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-38281 - https://github.com/jflyfox/jfinal_cms/issues/51 +CVE-2022-3829 - https://wpscan.com/vulnerability/684941ad-541f-43f9-a7ef-d26c0f4e6e21/ +CVE-2022-38295 - https://github.com/CuppaCMS/CuppaCMS/issues/34 +CVE-2022-38296 - https://github.com/CuppaCMS/CuppaCMS/issues/33 +CVE-2022-3830 - https://wpscan.com/vulnerability/98b2321d-fb66-4e02-9906-63af7b08d647 +CVE-2022-38305 - https://github.com/MegaTKC/AeroCMS/issues/3 +CVE-2022-38306 - https://github.com/lief-project/LIEF/issues/763 +CVE-2022-38307 - https://github.com/lief-project/LIEF/issues/764 +CVE-2022-38308 - https://github.com/WhoisZkuan/TOTOlink-A700RU +CVE-2022-38309 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/4 +CVE-2022-3831 - https://wpscan.com/vulnerability/fa23bd68-69f3-440e-902c-a3bb6c8a40b8 +CVE-2022-38310 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/6 +CVE-2022-38311 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/5 +CVE-2022-38312 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/3 +CVE-2022-38313 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/2 +CVE-2022-38314 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/1 +CVE-2022-3832 - https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92 +CVE-2022-38325 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_expandDlnaFile.md +CVE-2022-38326 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_NatStaticSetting.md +CVE-2022-38329 - https://albert5888.github.io/posts/CVE-2022-38329/ +CVE-2022-38329 - https://github.com/albert5888/CVE-Issues/blob/main/CVE-2022-38329/file.md +CVE-2022-38329 - https://github.com/zhangqiquan/shopxian_cms/issues/4 +CVE-2022-3833 - https://wpscan.com/vulnerability/41096d40-83d4-40b4-9632-afef51e8b00e +CVE-2022-38334 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42122 +CVE-2022-38335 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting +CVE-2022-3834 - https://wpscan.com/vulnerability/1dbe0f24-b757-49fe-846f-7c259df9f361 +CVE-2022-38349 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282 +CVE-2022-3835 - https://wpscan.com/vulnerability/514ffd28-f2c2-4c95-87b5-d05ce0746f89 +CVE-2022-38351 - https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/ +CVE-2022-38357 - https://www.tenable.com/security/research/tra-2022-29 +CVE-2022-38358 - https://www.tenable.com/security/research/tra-2022-29 +CVE-2022-38359 - https://www.tenable.com/security/research/tra-2022-29 +CVE-2022-3836 - https://wpscan.com/vulnerability/64e144fb-aa9f-4cfe-9c44-a4e1fa2e8dd5/ +CVE-2022-38368 - https://docs.aviatrix.com/HowTos/PSIRT_Advisories.html#aviatrix-controller-and-gateways-unauthorized-access +CVE-2022-3837 - https://wpscan.com/vulnerability/8554ca79-5a4b-49df-a75f-5faa4136bb8c +CVE-2022-3838 - https://wpscan.com/vulnerability/2dc82bd7-651f-4af0-ad2a-c20a38eea0d0 +CVE-2022-3839 - https://wpscan.com/vulnerability/809cea63-9dbe-495c-8388-e294299d3e90 +CVE-2022-38393 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1592 +CVE-2022-3840 - https://wpscan.com/vulnerability/71414436-ef54-4ce6-94e2-62e68d1a371d +CVE-2022-38451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642 +CVE-2022-38452 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1595 +CVE-2022-38457 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2074 +CVE-2022-38458 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1598 +CVE-2022-38459 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608 +CVE-2022-3846 - https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af +CVE-2022-3847 - https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/ +CVE-2022-3847 - https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6 +CVE-2022-38473 - https://bugzilla.mozilla.org/show_bug.cgi?id=1771685 +CVE-2022-3848 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_2/ +CVE-2022-3848 - https://wpscan.com/vulnerability/da1f0313-2576-490e-a95f-bf12de340610 +CVE-2022-38488 - https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example +CVE-2022-3849 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_3/ +CVE-2022-3849 - https://wpscan.com/vulnerability/511327d3-499b-4ad9-8fd3-99f9f7deb4f5 +CVE-2022-38495 - https://github.com/lief-project/LIEF/issues/767 +CVE-2022-38496 - https://github.com/lief-project/LIEF/issues/765 +CVE-2022-38497 - https://github.com/lief-project/LIEF/issues/766 +CVE-2022-3850 - https://wpscan.com/vulnerability/8ae42ec0-7e3a-4ea5-8e76-0aae7b92a8e9 +CVE-2022-38510 - https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md +CVE-2022-38511 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A810R/downloadFile.md +CVE-2022-38528 - https://github.com/assimp/assimp/issues/4662 +CVE-2022-38529 - https://github.com/syoyo/tinyexr/issues/169 +CVE-2022-3853 - https://wpscan.com/vulnerability/c2bc7d23-5bfd-481c-b42b-da7ee80d9514 +CVE-2022-38530 - https://github.com/gpac/gpac/issues/2216 +CVE-2022-38532 - https://github.com/nam3lum/msi-central_privesc +CVE-2022-38534 - https://github.com/Jfox816/TOTOLINK-720R/blob/fb6ba109ba9c5bd1b0d8e22c88ee14bdc4a75e6b/TOTOLINK%20720%20RCode%20Execution.md +CVE-2022-38535 - https://github.com/Jfox816/TOTOLINK-720R/blob/177ee39a5a8557a6bd19586731b0e624548b67ee/totolink%20720%20RCode%20Execution2.md +CVE-2022-3855 - https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb +CVE-2022-38553 - https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md +CVE-2022-38555 - https://github.com/xxy1126/Vuln/tree/main/1 +CVE-2022-38556 - https://github.com/xxy1126/Vuln/tree/main/2 +CVE-2022-38557 - https://github.com/xxy1126/Vuln/tree/main/3 +CVE-2022-38557 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-3856 - https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ +CVE-2022-3856 - https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 +CVE-2022-38562 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_lan +CVE-2022-38563 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_Mac +CVE-2022-38564 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetPicListItem +CVE-2022-38565 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailpwd +CVE-2022-38566 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailname +CVE-2022-38567 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetAdConfigInfo_ +CVE-2022-38568 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_hostname +CVE-2022-38569 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelAd +CVE-2022-3857 - https://sourceforge.net/p/libpng/bugs/300/ +CVE-2022-38570 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelPushedAd +CVE-2022-38571 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem +CVE-2022-38573 - https://packetstormsecurity.com +CVE-2022-38573 - https://packetstormsecurity.com/files/168133/10-Strike-Network-Inventory-Explorer-9.3-Buffer-Overflow.html +CVE-2022-38577 - http://packetstormsecurity.com/files/168427/ProcessMaker-Privilege-Escalation.html +CVE-2022-3858 - https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec +CVE-2022-38580 - http://packetstormsecurity.com/files/171546/X-Skipper-Proxy-0.13.237-Server-Side-Request-Forgery.html +CVE-2022-38582 - https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30 +CVE-2022-3859 - https://kcm.trellix.com/corporate/index?page=content&id=SB10391 +CVE-2022-38599 - https://gist.github.com/arleyna/20d858e11c48984d00926fa8cc0c2722 +CVE-2022-3860 - https://wpscan.com/vulnerability/d99ce21f-fbb6-429c-aa3b-19c4a5eb7557 +CVE-2022-38604 - https://github.com/LucaBarile/CVE-2022-38604 +CVE-2022-38604 - https://lucabarile.github.io/Blog/CVE-2022-38604/index.html +CVE-2022-3861 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt +CVE-2022-38611 - https://gist.github.com/dru1d-foofus/835423de77c3522d53b9e7bdf5a28dfe +CVE-2022-3862 - https://wpscan.com/vulnerability/3db9a8f5-3335-4b8d-a067-091cbfed1efc +CVE-2022-38621 - https://github.com/Doufox/Doufox/issues/7 +CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.txt +CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.yaml +CVE-2022-38628 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt +CVE-2022-38637 - https://www.youtube.com/watch?v=m8nW0p69UHU +CVE-2022-3865 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_1/ +CVE-2022-3865 - https://wpscan.com/vulnerability/fbe4aed8-964a-4774-bbc3-d432792bfeb6 +CVE-2022-38668 - https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.md +CVE-2022-38668 - https://gynvael.coldwind.pl/?id=752 +CVE-2022-3869 - https://huntr.dev/bounties/7de20f21-4a9b-445d-ae2b-15ade648900b +CVE-2022-38715 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1610 +CVE-2022-3873 - https://huntr.dev/bounties/52a4085e-b687-489b-9ed6-f0987583ed77 +CVE-2022-38730 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2 +CVE-2022-38745 - https://www.openoffice.org/security/cves/CVE-2022-38745.html +CVE-2022-3875 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-3875 - https://vuldb.com/?id.216244 +CVE-2022-38756 - http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html +CVE-2022-38756 - http://seclists.org/fulldisclosure/2023/Jan/28 +CVE-2022-3876 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-3876 - https://vuldb.com/?id.216245 +CVE-2022-38766 - https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 +CVE-2022-3877 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-38774 - https://www.elastic.co/community/security +CVE-2022-38775 - https://www.elastic.co/community/security +CVE-2022-38777 - https://www.elastic.co/community/security +CVE-2022-38778 - https://www.elastic.co/community/security +CVE-2022-38779 - https://www.elastic.co/community/security +CVE-2022-3878 - https://vuldb.com/?id.213039 +CVE-2022-38784 - https://github.com/jeffssh/CVE-2021-30860 +CVE-2022-3879 - https://wpscan.com/vulnerability/0db1762e-1401-4006-88ed-d09a4bc6585b +CVE-2022-38796 - https://www.youtube.com/watch?v=k8dp0FJnSsI +CVE-2022-3880 - https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14e +CVE-2022-38808 - https://github.com/cloudwebsoft/ywoa/issues/26 +CVE-2022-3881 - https://wpscan.com/vulnerability/c2a9cf01-051a-429a-82ca-280885114b5a +CVE-2022-38813 - https://drive.google.com/file/d/1iMswKzoUvindXUGh1cuAmi-0R84tLDaH/view?usp=sharing +CVE-2022-38813 - https://github.com/RashidKhanPathan/CVE-2022-38813 +CVE-2022-38813 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0 +CVE-2022-38814 - https://packetstormsecurity.com/files/168065/Fiberhome-AN5506-02-B-Cross-Site-Scripting.html +CVE-2022-3882 - https://wpscan.com/vulnerability/a39c643f-eaa4-4c71-b75d-2c4fe34ac875 +CVE-2022-38826 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setStaticDhcpRules_1.md +CVE-2022-38827 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_2.md +CVE-2022-38828 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_1.md +CVE-2022-38829 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md +CVE-2022-3883 - https://wpscan.com/vulnerability/8695b157-abac-4aa6-a022-e3ae41c03544 +CVE-2022-38830 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md +CVE-2022-38831 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/SetNetControlList.md +CVE-2022-38840 - http://packetstormsecurity.com/files/171439/MAN-EAM-0003-3.2.4-XML-Injection.html +CVE-2022-38841 - http://packetstormsecurity.com/files/171433/Linksys-AX3200-1.1.00-Command-Injection.html +CVE-2022-38843 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-unrestricted-file-upload-7860b15d12bc +CVE-2022-38844 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76 +CVE-2022-38846 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-missing-secure-flag-1664bac5ffe4 +CVE-2022-38867 - https://github.com/zhaojh329/rttys/issues/117 +CVE-2022-38868 - https://github.com/seccome/Ehoney/issues/59 +CVE-2022-38873 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-38890 - https://github.com/nginx/njs/issues/569 +CVE-2022-3891 - https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1 +CVE-2022-3892 - https://wpscan.com/vulnerability/33dddaec-a32a-4fce-89d6-164565be13e1 +CVE-2022-38922 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md +CVE-2022-38923 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md +CVE-2022-38928 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421 +CVE-2022-38931 - https://github.com/zer0yu/CVE_Request/blob/master/baijiacms/baijiacmsv4_ssrf.md +CVE-2022-38932 - https://github.com/klange/toaruos/issues/243 +CVE-2022-38934 - https://github.com/klange/toaruos/issues/244 +CVE-2022-38935 - https://github.com/yourkevin/NiterForum/issues/25 +CVE-2022-38936 - https://github.com/cloudwu/pbc/issues/158 +CVE-2022-3894 - https://wpscan.com/vulnerability/298487b2-4141-4c9f-9bb2-e1450aefc1a8 +CVE-2022-38970 - https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/ +CVE-2022-3899 - https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/ +CVE-2022-3900 - https://wpscan.com/vulnerability/c969c4bc-82d7-46a0-88ba-e056c0b27de7 +CVE-2022-39013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39028 - https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html +CVE-2022-3904 - https://wpscan.com/vulnerability/244d9ef1-335c-4f65-94ad-27c0c633f6ad +CVE-2022-39045 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1611 +CVE-2022-39046 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html +CVE-2022-39046 - http://seclists.org/fulldisclosure/2024/Feb/3 +CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/6 +CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/8 +CVE-2022-3906 - https://wpscan.com/vulnerability/fee8652d-cd50-4cb0-b94d-2d124f56af1a +CVE-2022-3907 - https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c +CVE-2022-3908 - https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505 +CVE-2022-3909 - https://wpscan.com/vulnerability/8d57a534-7630-491a-a0fd-90430f85ae78 +CVE-2022-3911 - https://wpscan.com/vulnerability/c47fdca8-74ac-48a4-9780-556927fb4e52 +CVE-2022-3912 - https://wpscan.com/vulnerability/968c677c-1beb-459b-8fd1-7f70bcaa4f74 +CVE-2022-3915 - https://wpscan.com/vulnerability/fd416d99-1970-418f-81f5-8438490d4479 +CVE-2022-39164 - https://www.ibm.com/support/pages/node/6847947 +CVE-2022-39165 - https://www.ibm.com/support/pages/node/6847947 +CVE-2022-39170 - https://github.com/davea42/libdwarf-code/issues/132 +CVE-2022-39172 - https://sec-consult.com/vulnerability-lab/advisory/stored-cross-site-scripting-in-mb-support-broker-management-solution-openviva-c2/ +CVE-2022-39173 - http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html +CVE-2022-39173 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ +CVE-2022-39188 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 +CVE-2022-39189 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17 +CVE-2022-3919 - https://wpscan.com/vulnerability/fe2f1d52-8421-4b46-b829-6953a0472dcb +CVE-2022-39190 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6 +CVE-2022-39195 - https://packetstormsecurity.com/2301-exploits/listserv17-xss.txt +CVE-2022-39197 - https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/ +CVE-2022-39197 - https://www.cobaltstrike.com/blog/tag/release/ +CVE-2022-3921 - https://wpscan.com/vulnerability/e39b59b0-f24f-4de5-a21c-c4de34c3a14f +CVE-2022-3922 - https://wpscan.com/vulnerability/78054bd7-cdc2-4b14-9b5c-30f10e802d6b +CVE-2022-3923 - https://wpscan.com/vulnerability/6536946a-7ebf-4f8f-9446-36ec2a2a3ad2 +CVE-2022-3925 - https://bulletin.iese.de/post/buddybadges_1-0-0/ +CVE-2022-3925 - https://wpscan.com/vulnerability/178499a3-97d1-4ab2-abbe-4a9d2ebc85da +CVE-2022-3926 - https://wpscan.com/vulnerability/e1fcde2a-91a5-40cb-876b-884f01c80336 +CVE-2022-39261 - https://www.drupal.org/sa-core-2022-016 +CVE-2022-39262 - https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/ +CVE-2022-39276 - https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/ +CVE-2022-39277 - https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/ +CVE-2022-39285 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html +CVE-2022-39288 - https://github.com/fastify/fastify/security/policy +CVE-2022-39290 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html +CVE-2022-39291 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html +CVE-2022-39299 - http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html +CVE-2022-3930 - https://wpscan.com/vulnerability/8728d02a-51db-4447-a843-0264b6ceb413 +CVE-2022-39305 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2 +CVE-2022-39321 - https://github.com/actions/runner/pull/2108 +CVE-2022-3933 - https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4 +CVE-2022-3934 - https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a +CVE-2022-3935 - https://wpscan.com/vulnerability/906c5122-dd6d-494b-b66c-4162e234ea05 +CVE-2022-3936 - https://wpscan.com/vulnerability/921daea1-a06d-4310-8bd9-4db32605e500 +CVE-2022-3937 - https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af +CVE-2022-39399 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39400 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39401 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39402 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39403 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39404 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39405 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39406 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39407 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39408 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39409 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39410 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39411 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39412 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39417 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39419 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39420 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39421 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39422 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39423 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39424 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39425 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39426 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39427 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39428 - https://www.oracle.com/security-alerts/cpuoct2022.html +CVE-2022-39429 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2022-3944 - https://github.com/jerryhanjj/ERP/issues/3 +CVE-2022-3945 - https://huntr.dev/bounties/55cd91b3-1d94-4d34-8d7f-86660b41fd65 +CVE-2022-3946 - https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0 +CVE-2022-3955 - https://github.com/tholum/crm42/issues/1 +CVE-2022-3956 - https://github.com/tsruban/HHIMS/issues/1 +CVE-2022-3961 - https://wpscan.com/vulnerability/6aad6454-de1b-4304-9c14-05e28d08b253 +CVE-2022-3972 - https://github.com/Pingkon/HMS-PHP/issues/1 +CVE-2022-3973 - https://github.com/Pingkon/HMS-PHP/issues/1 +CVE-2022-3973 - https://vuldb.com/?id.213552 +CVE-2022-3974 - https://github.com/axiomatic-systems/Bento4/issues/812 +CVE-2022-3977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89 +CVE-2022-39799 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39800 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39801 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39802 - http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html +CVE-2022-39802 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39803 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39804 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39805 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39806 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39807 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39808 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-39809 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-3981 - https://wpscan.com/vulnerability/78054d08-0227-426c-903d-d146e0919028 +CVE-2022-39810 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39811 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39812 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39813 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39814 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39815 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39816 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39817 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39818 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39819 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-3982 - https://wpscan.com/vulnerability/4d91f3e1-4de9-46c1-b5ba-cc55b7726867 +CVE-2022-39820 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39821 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39822 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-39824 - https://github.com/FCncdn/Appsmith-Js-Injection-POC +CVE-2022-3983 - https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1 +CVE-2022-39831 - https://savannah.gnu.org/bugs/?62977 +CVE-2022-39832 - https://savannah.gnu.org/bugs/index.php?63000 +CVE-2022-39833 - https://gist.github.com/DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c +CVE-2022-39836 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ +CVE-2022-39836 - https://seclists.org/fulldisclosure/2022/Sep/24 +CVE-2022-39837 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ +CVE-2022-39837 - https://seclists.org/fulldisclosure/2022/Sep/24 +CVE-2022-39838 - https://github.com/jet-pentest/CVE-2022-39838 +CVE-2022-39839 - https://github.com/Cotonti/Cotonti/issues/1661 +CVE-2022-3984 - https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa +CVE-2022-39840 - https://github.com/Cotonti/Cotonti/issues/1660 +CVE-2022-39842 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 +CVE-2022-3985 - https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc +CVE-2022-3986 - https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a +CVE-2022-3987 - https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29 +CVE-2022-3989 - https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091 +CVE-2022-3993 - https://huntr.dev/bounties/bebd0cd6-18ec-469c-b6ca-19ffa9db0699 +CVE-2022-3994 - https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa +CVE-2022-39960 - https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e +CVE-2022-39974 - https://github.com/wasm3/wasm3/issues/379 +CVE-2022-3998 - https://github.com/MonikaBrzica/scm/issues/1 +CVE-2022-39983 - https://www.swascan.com/it/vulnerability-report-instant-developer/ +CVE-2022-39986 - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html +CVE-2022-39986 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2 +CVE-2022-39987 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2 +CVE-2022-39988 - http://packetstormsecurity.com/files/168585/Centreon-22.04.0-Cross-Site-Scripting.html +CVE-2022-3999 - https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643 +CVE-2022-4000 - https://wpscan.com/vulnerability/5563c030-bd62-4839-98e8-84bc8191e242 +CVE-2022-40005 - https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/ +CVE-2022-40005 - https://seclists.org/fulldisclosure/2022/Dec/13 +CVE-2022-40008 - https://github.com/matthiaskramm/swftools/issues/188 +CVE-2022-40009 - https://github.com/matthiaskramm/swftools/issues/190 +CVE-2022-40010 - http://packetstormsecurity.com/files/173029/Tenda-AC6-AC1200-15.03.06.50_multi-Cross-Site-Scripting.html +CVE-2022-40016 - https://github.com/ireader/media-server/issues/235 +CVE-2022-40021 - https://www.securifera.com/advisories/CVE-2022-40021/ +CVE-2022-40022 - http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html +CVE-2022-40022 - https://www.securifera.com/advisories/CVE-2022-40022/ +CVE-2022-40023 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ +CVE-2022-40032 - http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html +CVE-2022-40032 - https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated +CVE-2022-4004 - https://wpscan.com/vulnerability/6a3bcfb3-3ede-459d-969f-b7b30dafd098 +CVE-2022-40043 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/ +CVE-2022-40044 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/ +CVE-2022-4005 - https://wpscan.com/vulnerability/61d5c9b8-5c21-4ab5-b31c-e13ca19ea25c +CVE-2022-40055 - https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055 +CVE-2022-40067 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/9 +CVE-2022-40068 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/10 +CVE-2022-40069 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/6 +CVE-2022-40070 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8 +CVE-2022-40071 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/2 +CVE-2022-40072 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/7 +CVE-2022-40073 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/5 +CVE-2022-40074 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/3 +CVE-2022-40075 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/1 +CVE-2022-40076 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/4 +CVE-2022-40087 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-unauthenticated-arbitrary-file-upload-rce-44341831bec8 +CVE-2022-40087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip +CVE-2022-40088 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-xss-1f13228233a +CVE-2022-40088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip +CVE-2022-40089 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip +CVE-2022-40090 - https://gitlab.com/libtiff/libtiff/-/issues/455 +CVE-2022-4010 - https://wpscan.com/vulnerability/bed8c81c-04c7-412d-9563-ce4eb64b7754 +CVE-2022-4011 - https://vuldb.com/?id.213785 +CVE-2022-40110 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/2.md +CVE-2022-40112 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/3.md +CVE-2022-40113 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection3.md +CVE-2022-40113 - https://github.com/zakee94/online-banking-system/issues/18 +CVE-2022-40114 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection5.md +CVE-2022-40114 - https://github.com/zakee94/online-banking-system/issues/16 +CVE-2022-40115 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection1.md +CVE-2022-40115 - https://github.com/zakee94/online-banking-system/issues/10 +CVE-2022-40116 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection9.md +CVE-2022-40116 - https://github.com/zakee94/online-banking-system/issues/13 +CVE-2022-40117 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection2.md +CVE-2022-40117 - https://github.com/zakee94/online-banking-system/issues/17 +CVE-2022-40118 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection4.md +CVE-2022-40118 - https://github.com/zakee94/online-banking-system/issues/19 +CVE-2022-40119 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection6.md +CVE-2022-40119 - https://github.com/zakee94/online-banking-system/issues/11 +CVE-2022-4012 - https://github.com/golamsarwar08/hms/issues/1 +CVE-2022-4012 - https://vuldb.com/?id.213786 +CVE-2022-40120 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection7.md +CVE-2022-40120 - https://github.com/zakee94/online-banking-system/issues/14 +CVE-2022-40121 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection8.md +CVE-2022-40121 - https://github.com/zakee94/online-banking-system/issues/12 +CVE-2022-40122 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection10.md +CVE-2022-40122 - https://github.com/zakee94/online-banking-system/issues/15 +CVE-2022-40123 - https://weed-1.gitbook.io/cve/mojoportal/directory-traversal-in-mojoportal-v2.7-cve-2022-40123 +CVE-2022-40129 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1614 +CVE-2022-4013 - https://github.com/golamsarwar08/hms/issues/2 +CVE-2022-4013 - https://vuldb.com/?id.213787 +CVE-2022-40133 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2075 +CVE-2022-4014 - https://vuldb.com/?id.213788 +CVE-2022-4015 - https://github.com/shreyansh225/Sports-Club-Management-System/issues/6 +CVE-2022-4015 - https://vuldb.com/?id.213789 +CVE-2022-4016 - https://wpscan.com/vulnerability/9b77044c-fd3f-4e6f-a759-dcc3082dcbd6 +CVE-2022-4017 - https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4 +CVE-2022-4018 - https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5 +CVE-2022-4019 - https://mattermost.com/security-updates/ +CVE-2022-40220 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612 +CVE-2022-40222 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638 +CVE-2022-40224 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618 +CVE-2022-4023 - https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/ +CVE-2022-4023 - https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee +CVE-2022-40233 - https://www.ibm.com/support/pages/node/6847947 +CVE-2022-4024 - https://wpscan.com/vulnerability/a087fb45-6f6c-40ac-b48b-2cbceda86cbe +CVE-2022-40250 - https://www.binarly.io/advisories/BRLY-2022-016 +CVE-2022-40277 - https://github.com/laurent22/joplin +CVE-2022-40282 - http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html +CVE-2022-40282 - http://seclists.org/fulldisclosure/2022/Nov/19 +CVE-2022-40284 - https://github.com/tuxera/ntfs-3g/releases +CVE-2022-40297 - https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc +CVE-2022-40298 - https://www.crestron.com/Security/Security_Advisories +CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-40305 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt +CVE-2022-40306 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt +CVE-2022-40319 - https://packetstormsecurity.com/2301-exploits/listserv17-idor.txt +CVE-2022-40320 - https://github.com/libconfuse/libconfuse/issues/163 +CVE-2022-40347 - http://packetstormsecurity.com/files/171740/Intern-Record-System-1.0-SQL-Injection.html +CVE-2022-40347 - https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated +CVE-2022-40348 - https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated +CVE-2022-40357 - https://github.com/zblogcn/zblogphp/issues/336 +CVE-2022-40359 - https://cxsecurity.com/issue/WLB-2022090057 +CVE-2022-40363 - https://github.com/flipperdevices/flipperzero-firmware/pull/1697 +CVE-2022-4042 - https://wpscan.com/vulnerability/8ec76242-717d-4d2d-9c0f-3056cd7c2c90 +CVE-2022-4043 - https://wpscan.com/vulnerability/ffff8c83-0a59-450a-9b40-c7f3af7205fc +CVE-2022-40434 - https://isaghojaria.medium.com/softr-v2-0-was-discovered-to-be-vulnerable-to-html-injection-via-the-name-field-of-the-account-page-c6fbd3162254 +CVE-2022-40439 - https://github.com/axiomatic-systems/Bento4/issues/750 +CVE-2022-4044 - https://mattermost.com/security-updates/ +CVE-2022-40440 - https://github.com/SxB64/mxgraph-xss-vul/wiki +CVE-2022-40443 - https://github.com/liong007/ZZCMS/issues/1 +CVE-2022-40444 - https://github.com/liong007/ZZCMS/issues/2 +CVE-2022-4045 - https://mattermost.com/security-updates/ +CVE-2022-40469 - https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469 +CVE-2022-4047 - https://wpscan.com/vulnerability/8965a87c-5fe5-4b39-88f3-e00966ca1d94 +CVE-2022-40470 - https://drive.google.com/file/d/1UDuez2CTscdWXYzyXLi3x8CMs9IWLL11/view?usp=sharing +CVE-2022-40471 - https://drive.google.com/file/d/1m-wTfOL5gY3huaSEM3YPSf98qIrkl-TW/view?usp=sharing +CVE-2022-40471 - https://github.com/RashidKhanPathan/CVE-2022-40471 +CVE-2022-40476 - https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62 +CVE-2022-40482 - https://ephort.dk/blog/laravel-timing-attack-vulnerability/ +CVE-2022-40482 - https://github.com/ephort/laravel-user-enumeration-demo +CVE-2022-40486 - https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md +CVE-2022-40489 - https://github.com/thinkcmf/thinkcmf/issues/736 +CVE-2022-4049 - https://wpscan.com/vulnerability/9b0781e2-ad62-4308-bafc-d45b9a2472be +CVE-2022-40494 - https://blog.carrot2.cn/2022/08/cve-2022-40494.html +CVE-2022-4050 - https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f +CVE-2022-4051 - https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1 +CVE-2022-4052 - https://vuldb.com/?id.213845 +CVE-2022-4053 - https://vuldb.com/?id.213846 +CVE-2022-4057 - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af +CVE-2022-4058 - https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4 +CVE-2022-4059 - https://wpscan.com/vulnerability/d94bb664-261a-4f3f-8cc3-a2db8230895d +CVE-2022-4060 - https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e +CVE-2022-4061 - https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665 +CVE-2022-40621 - https://www.malbytes.net/2022/07/wavlink-quantum-d4g-zero-day-part-01.html +CVE-2022-40622 - https://youtu.be/cSileV8YbsQ?t=655 +CVE-2022-40623 - https://youtu.be/cSileV8YbsQ?t=1028 +CVE-2022-40624 - https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 +CVE-2022-4063 - https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7 +CVE-2022-4064 - https://github.com/petergoldstein/dalli/issues/932 +CVE-2022-4067 - https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72 +CVE-2022-4068 - https://huntr.dev/bounties/becfecc4-22a6-4f94-bf83-d6030b625fdc +CVE-2022-40684 - http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html +CVE-2022-40684 - http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html +CVE-2022-4069 - https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5 +CVE-2022-40691 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621 +CVE-2022-40693 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616 +CVE-2022-4070 - https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775 +CVE-2022-40701 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1606 +CVE-2022-40711 - https://verneet.com/cve-2022-40711/ +CVE-2022-40712 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-40713 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-40714 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-40715 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150 +CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966 +CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417 +CVE-2022-40735 - https://dheatattack.gitlab.io/ +CVE-2022-40735 - https://github.com/mozilla/ssl-config-generator/issues/162 +CVE-2022-40735 - https://ieeexplore.ieee.org/document/10374117 +CVE-2022-40735 - https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf +CVE-2022-40735 - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf +CVE-2022-40736 - https://github.com/axiomatic-systems/Bento4/issues/755 +CVE-2022-40737 - https://github.com/axiomatic-systems/Bento4/issues/756 +CVE-2022-40738 - https://github.com/axiomatic-systems/Bento4/issues/756 +CVE-2022-40755 - https://github.com/jasper-software/jasper/issues/338 +CVE-2022-40761 - https://github.com/Samsung/mTower/issues/83 +CVE-2022-40769 - https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c +CVE-2022-40774 - https://github.com/axiomatic-systems/Bento4/issues/757 +CVE-2022-40775 - https://github.com/axiomatic-systems/Bento4/issues/758 +CVE-2022-40797 - http://packetstormsecurity.com/files/169964/Roxy-Fileman-1.4.6-Remote-Shell-Upload.html +CVE-2022-40798 - https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc +CVE-2022-40839 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40839/poc.txt +CVE-2022-40840 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40840/poc.txt +CVE-2022-40841 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40841/poc.txt +CVE-2022-40842 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40842/poc.txt +CVE-2022-40843 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-40844 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-40845 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-40846 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-40847 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-40849 - https://github.com/thinkcmf/thinkcmf/issues/737 +CVE-2022-40851 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/addressNat.md +CVE-2022-40853 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/form_fast_setting_wifi_set.md +CVE-2022-40854 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md +CVE-2022-40855 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md +CVE-2022-40860 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/formSetQosBand.md +CVE-2022-40861 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/formSetQosBand.md +CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromNatStaticSetting.md +CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromNatStaticSetting.md +CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSmartPowerManagement.md +CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSmartPowerManagement.md +CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSchedWifi.md +CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSchedWifi.md +CVE-2022-40866 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/setDebugCfg.md +CVE-2022-40867 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formIPMacBindDel.md +CVE-2022-40868 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formDelDhcpRule.md +CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromDhcpListClient-list.md +CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromDhcpListClient-list.md +CVE-2022-40871 - https://github.com/youncyb/dolibarr-rce +CVE-2022-40874 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html +CVE-2022-40875 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html +CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html +CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16704071.html +CVE-2022-40877 - https://www.exploit-db.com/exploits/50725 +CVE-2022-40878 - https://www.exploit-db.com/exploits/50726 +CVE-2022-40879 - https://github.com/kekingcn/kkFileView/issues/389 +CVE-2022-4088 - https://github.com/rickxy/Stock-Management-System/issues/2 +CVE-2022-40881 - https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php +CVE-2022-40884 - https://github.com/yangfar/CVE/blob/main/CVE-2022-40884.md +CVE-2022-40887 - https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester/blob/main/Best-Student-Result-Management-System_1.0.poc.md +CVE-2022-4089 - https://github.com/rickxy/Stock-Management-System/issues/3 +CVE-2022-40890 - https://github.com/ToughRunner/Open5gs_bugreport +CVE-2022-40896 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2/ +CVE-2022-40897 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ +CVE-2022-40898 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ +CVE-2022-40899 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ +CVE-2022-4090 - https://github.com/rickxy/Stock-Management-System/issues/4 +CVE-2022-40912 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php +CVE-2022-40918 - https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368 +CVE-2022-40922 - https://github.com/lief-project/LIEF/issues/781 +CVE-2022-40923 - https://github.com/lief-project/LIEF/issues/784 +CVE-2022-4093 - https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788 +CVE-2022-40931 - https://github.com/dutchcoders/transfer.sh/issues/500 +CVE-2022-40943 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/bwdate-report-ds-sql(CVE-2022-40943).md +CVE-2022-40944 - https://caicaizi.top/archives/9/ +CVE-2022-40944 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/sales-report-ds-sql(CVE-2022-40944).md +CVE-2022-40946 - http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html +CVE-2022-40946 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4095 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73 +CVE-2022-40956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770094 +CVE-2022-40959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1782211 +CVE-2022-4096 - https://huntr.dev/bounties/7969e834-5982-456e-9683-861a7a5e2d22 +CVE-2022-40969 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607 +CVE-2022-4097 - https://wpscan.com/vulnerability/15819d33-7497-4f7d-bbb8-b3ab147806c4 +CVE-2022-40982 - https://downfall.page +CVE-2022-40983 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617 +CVE-2022-40985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40986 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40987 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-4099 - https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028 +CVE-2022-40990 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40993 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40994 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40997 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40998 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-40999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41000 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41001 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41003 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41004 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-4101 - https://wpscan.com/vulnerability/2ce4c837-c62c-41ac-95ca-54bb1a6d1eeb +CVE-2022-41010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-4102 - https://wpscan.com/vulnerability/c177f763-0bb5-4734-ba2e-7ba816578937 +CVE-2022-41020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-41029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-4103 - https://wpscan.com/vulnerability/5e1244f7-39b5-4f37-8fef-e3f35fc388f1 +CVE-2022-41030 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 +CVE-2022-4104 - https://tenable.com/security/research/TRA-2022-35 +CVE-2022-41040 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html +CVE-2022-41040 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/ +CVE-2022-4105 - https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 +CVE-2022-41057 - http://packetstormsecurity.com/files/170128/SentinelOne-sentinelagent-22.3.2.5-Privilege-Escalation.html +CVE-2022-41057 - http://packetstormsecurity.com/files/170128/Windows-HTTP.SYS-Kerberos-PAC-Verification-Bypass-Privilege-Escalation.html +CVE-2022-4106 - https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed +CVE-2022-4107 - https://wpscan.com/vulnerability/0b432858-722c-4bda-aa95-ad48e2097302 +CVE-2022-41073 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html +CVE-2022-4108 - https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470 +CVE-2022-41082 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html +CVE-2022-41082 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/ +CVE-2022-4109 - https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670 +CVE-2022-4110 - https://wpscan.com/vulnerability/037a81b2-8fd8-4898-bb5b-d15d9a38778c +CVE-2022-4111 - https://huntr.dev/bounties/5596d072-66d2-4361-8cac-101c9c781c3d +CVE-2022-4112 - https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e +CVE-2022-41128 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/ +CVE-2022-41138 - https://bugs.gentoo.org/868495 +CVE-2022-41139 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-7344-4pg9-qf45 +CVE-2022-4114 - https://wpscan.com/vulnerability/7569f4ac-05c9-43c9-95e0-5cc360524bbd +CVE-2022-41142 - https://github.com/centreon/centreon/security/policy +CVE-2022-4115 - https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4 +CVE-2022-41154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1637 +CVE-2022-41166 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41167 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-4117 - https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193 +CVE-2022-41170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41173 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41174 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41175 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41176 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41177 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41178 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41179 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-4118 - https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4 +CVE-2022-41180 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41181 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41182 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41183 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41184 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-4119 - https://wpscan.com/vulnerability/11040133-c134-4f96-8421-edd04901ed0d +CVE-2022-41190 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41191 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41192 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41193 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41194 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41195 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41196 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41197 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41198 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41199 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-4120 - https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf +CVE-2022-41200 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41201 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41202 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41203 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41204 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41205 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41206 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41207 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41208 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41209 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-4121 - https://github.com/dinhvh/libetpan/issues/420 +CVE-2022-41210 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41211 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41212 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/23/4 +CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/24/1 +CVE-2022-41221 - https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability +CVE-2022-41222 - http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html +CVE-2022-41222 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html +CVE-2022-41222 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 +CVE-2022-4124 - https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2 +CVE-2022-4125 - https://wpscan.com/vulnerability/7862084a-2821-4ef1-8d01-c9c8b3f28b05 +CVE-2022-41258 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41259 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41260 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41261 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41262 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41263 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41264 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41266 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41272 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41273 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41274 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-41275 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2022-4128 - https://github.com/torvalds/linux/commit/5c835bb142d4 +CVE-2022-41311 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 +CVE-2022-41312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 +CVE-2022-41313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619 +CVE-2022-41322 - https://bugs.gentoo.org/868543 +CVE-2022-41333 - http://packetstormsecurity.com/files/171766/FortiRecorder-6.4.3-Denial-Of-Service.html +CVE-2022-41343 - https://tantosec.com/blog/cve-2022-41343/ +CVE-2022-41352 - http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html +CVE-2022-41358 - http://packetstormsecurity.com/files/168718/Garage-Management-System-1.0-Cross-Site-Scripting.html +CVE-2022-41358 - https://cxsecurity.com/issue/WLB-2022100037 +CVE-2022-41358 - https://github.com/thecasual/CVE-2022-41358 +CVE-2022-41358 - https://vulmon.com/vulnerabilitydetails?qid=CVE-2022-41358 +CVE-2022-4136 - https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 +CVE-2022-41376 - https://alicangonullu.org/konu/138 +CVE-2022-4138 - https://gitlab.com/gitlab-org/gitlab/-/issues/383709 +CVE-2022-41392 - https://www.edoardoottavianelli.it/CVE-2022-41392/ +CVE-2022-41392 - https://www.youtube.com/watch?v=BOPLYnveBqk +CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router +CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router +CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-4140 - https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7 +CVE-2022-41401 - https://github.com/ixSly/CVE-2022-41401 +CVE-2022-41403 - https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html +CVE-2022-41404 - https://sourceforge.net/p/ini4j/bugs/56/ +CVE-2022-4141 - https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f +CVE-2022-41412 - http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html +CVE-2022-41412 - https://github.com/renmizo/CVE-2022-41412 +CVE-2022-41413 - http://packetstormsecurity.com/files/170070/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html +CVE-2022-41413 - http://packetstormsecurity.com/files/171629/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html +CVE-2022-41413 - https://github.com/renmizo/CVE-2022-41413 +CVE-2022-41415 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-41415/CVE-2022-41415.md +CVE-2022-41419 - https://github.com/axiomatic-systems/Bento4/issues/766 +CVE-2022-4142 - https://wpscan.com/vulnerability/8c2adadd-0684-49a8-9185-0c7d9581aef1 +CVE-2022-41423 - https://github.com/axiomatic-systems/Bento4/issues/767 +CVE-2022-41424 - https://github.com/axiomatic-systems/Bento4/issues/768 +CVE-2022-41425 - https://github.com/axiomatic-systems/Bento4/issues/772 +CVE-2022-41426 - https://github.com/axiomatic-systems/Bento4/issues/772 +CVE-2022-41427 - https://github.com/axiomatic-systems/Bento4/issues/772 +CVE-2022-41428 - https://github.com/axiomatic-systems/Bento4/issues/773 +CVE-2022-41429 - https://github.com/axiomatic-systems/Bento4/issues/773 +CVE-2022-41430 - https://github.com/axiomatic-systems/Bento4/issues/773 +CVE-2022-41441 - http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html +CVE-2022-41441 - https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/ +CVE-2022-41445 - https://github.com/RashidKhanPathan/CVE-2022-41445 +CVE-2022-41445 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor +CVE-2022-41446 - https://github.com/RashidKhanPathan/CVE-2022-41446 +CVE-2022-41446 - https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor +CVE-2022-41473 - https://github.com/ralap-z/rpcms/issues/1 +CVE-2022-41474 - https://github.com/ralap-z/rpcms/issues/3 +CVE-2022-41475 - https://github.com/ralap-z/rpcms/issues/2 +CVE-2022-41477 - https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md +CVE-2022-4148 - https://wpscan.com/vulnerability/be9b25c8-b0d7-4c22-81ff-e41650a4ed41 +CVE-2022-41495 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF2.md +CVE-2022-41496 - https://github.com/jayus0821/insight/blob/master/iCMS%20SSRF.md +CVE-2022-41497 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md +CVE-2022-4150 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_13 +CVE-2022-4150 - https://wpscan.com/vulnerability/d5d39138-a216-46cd-9e5f-fc706a2c93da +CVE-2022-4151 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_2 +CVE-2022-4151 - https://wpscan.com/vulnerability/e1320c2a-818d-4e91-8dc9-ba95a1dc4377 +CVE-2022-4152 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_4 +CVE-2022-4152 - https://wpscan.com/vulnerability/4b058966-0859-42ed-a796-b6c6cb08a9fc +CVE-2022-4153 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_7 +CVE-2022-4153 - https://wpscan.com/vulnerability/35b0126d-9293-4e64-a00f-0903303f960a +CVE-2022-4154 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5 +CVE-2022-4154 - https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a +CVE-2022-41540 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption +CVE-2022-41541 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay +CVE-2022-41542 - https://medium.com/@sc0p3hacker/cve-2022-41542-session-mis-configuration-in-devhub-application-ca956bb9027a +CVE-2022-41544 - http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html +CVE-2022-41547 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166 +CVE-2022-4155 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6 +CVE-2022-4155 - https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d +CVE-2022-4156 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1 +CVE-2022-4156 - https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0 +CVE-2022-4157 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3 +CVE-2022-4157 - https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6 +CVE-2022-4158 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_15 +CVE-2022-4158 - https://wpscan.com/vulnerability/1b3b51af-ad73-4f8e-ba97-375b8a363b64 +CVE-2022-4159 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8 +CVE-2022-4159 - https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965 +CVE-2022-4160 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_14 +CVE-2022-4160 - https://wpscan.com/vulnerability/813de343-4814-42b8-b8df-1695320512cd +CVE-2022-4161 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_16 +CVE-2022-4161 - https://wpscan.com/vulnerability/a66af8f7-1d5f-4fe5-a2ba-03337064583b +CVE-2022-4162 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_9 +CVE-2022-4162 - https://wpscan.com/vulnerability/011500ac-17e4-4d4f-bbd9-1fec70511776 +CVE-2022-4163 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_10 +CVE-2022-4163 - https://wpscan.com/vulnerability/de0d7db7-f911-4f5f-97f6-885ca60822d1 +CVE-2022-41639 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633 +CVE-2022-4164 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_11 +CVE-2022-4164 - https://wpscan.com/vulnerability/57fff222-2c64-4b52-86cd-ab8db4541627 +CVE-2022-41649 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1631 +CVE-2022-4165 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17 +CVE-2022-4165 - https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0 +CVE-2022-41654 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624 +CVE-2022-4166 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_12 +CVE-2022-4166 - https://wpscan.com/vulnerability/6e7de2bb-5f71-4c27-ae79-4f6b2ba7f86f +CVE-2022-41666 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ +CVE-2022-41667 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ +CVE-2022-41668 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ +CVE-2022-41669 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ +CVE-2022-41670 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ +CVE-2022-41671 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/ +CVE-2022-41674 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html +CVE-2022-41674 - https://www.openwall.com/lists/oss-security/2022/10/13/5 +CVE-2022-41684 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1632 +CVE-2022-41697 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625 +CVE-2022-4173 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2022-41760 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-41761 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-41762 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-41763 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-41793 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667 +CVE-2022-41793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667 +CVE-2022-41794 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1626 +CVE-2022-41837 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636 +CVE-2022-41838 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1634 +CVE-2022-41841 - https://github.com/axiomatic-systems/Bento4/issues/779 +CVE-2022-41842 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928 +CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42344 +CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421 +CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928 +CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844 +CVE-2022-41845 - https://github.com/axiomatic-systems/Bento4/issues/770 +CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/342 +CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/770 +CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/750 +CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/775 +CVE-2022-41884 - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636 +CVE-2022-41912 - http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html +CVE-2022-41924 - https://emily.id.au/tailscale +CVE-2022-41924 - https://tailscale.com/security-bulletins/#ts-2022-004 +CVE-2022-41925 - https://emily.id.au/tailscale +CVE-2022-41925 - https://tailscale.com/security-bulletins/#ts-2022-005 +CVE-2022-41945 - https://github.com/4ra1n/super-xray/releases/tag/0.2-beta +CVE-2022-41950 - https://github.com/4ra1n/super-xray/releases/tag/0.3-beta +CVE-2022-41952 - https://github.com/matrix-org/synapse/pull/11936 +CVE-2022-41955 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ +CVE-2022-41956 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ +CVE-2022-41958 - https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr +CVE-2022-4196 - https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88 +CVE-2022-4197 - https://wpscan.com/vulnerability/96818024-57ab-419d-bd46-7d2da98269e6 +CVE-2022-41973 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html +CVE-2022-41973 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html +CVE-2022-41974 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html +CVE-2022-41974 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html +CVE-2022-41976 - https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html +CVE-2022-41977 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627 +CVE-2022-4198 - https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2 +CVE-2022-41981 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628 +CVE-2022-41985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680 +CVE-2022-41988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1643 +CVE-2022-4199 - https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d +CVE-2022-41991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1639 +CVE-2022-41992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644 +CVE-2022-41999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1635 +CVE-2022-4200 - https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf +CVE-2022-4201 - https://gitlab.com/gitlab-org/gitlab/-/issues/30376 +CVE-2022-4202 - https://github.com/gpac/gpac/issues/2333 +CVE-2022-42045 - https://github.com/ReCryptLLC/CVE-2022-42045/tree/main +CVE-2022-42046 - https://github.com/kkent030315/CVE-2022-42046 +CVE-2022-42053 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-42054 - https://boschko.ca/glinet-router +CVE-2022-42055 - https://boschko.ca/glinet-router +CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router +CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-4206 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4206.json +CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router +CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router/ +CVE-2022-42064 - https://packetstormsecurity.com/files/168498/Online-Diagnostic-Lab-Management-System-1.0-SQL-Injection-Shell-Upload.html +CVE-2022-42066 - https://packetstormsecurity.com/files/168549/Online-Examination-System-1.0-Cross-Site-Scripting.html +CVE-2022-42067 - https://packetstormsecurity.com/files/168524/Online-Birth-Certificate-Management-System-1.0-Insecure-Direct-Object-Reference.html +CVE-2022-42069 - https://packetstormsecurity.com/files/168529/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html +CVE-2022-42070 - https://packetstormsecurity.com/files/168522/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Request-Forgery.html +CVE-2022-42071 - https://packetstormsecurity.com/files/168533/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html +CVE-2022-42077 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md +CVE-2022-42078 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md +CVE-2022-42079 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-3.md +CVE-2022-4208 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42080 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md +CVE-2022-42081 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md +CVE-2022-42086 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md +CVE-2022-42087 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md +CVE-2022-4209 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42092 - https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c +CVE-2022-42094 - https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xss-at-cards-84266b5250f1 +CVE-2022-42095 - https://grimthereaperteam.medium.com/declined-backdrop-xss-at-pages-26e5d63686bc +CVE-2022-42096 - https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xss-at-posts-437c305036e2 +CVE-2022-42097 - https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xss-at-comments-2ea536ec55e1 +CVE-2022-42098 - https://grimthereaperteam.medium.com/cve-2022-42098-klik-sql-injection-6a9299621789 +CVE-2022-42099 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-forum-subject-a453789736f2 +CVE-2022-4210 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42100 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-reply-form-b189147c1f93 +CVE-2022-42109 - https://github.com/PuneethReddyHC/online-shopping-system-advanced +CVE-2022-42109 - https://medium.com/@grimthereaperteam/online-shopping-system-advanced-sql-injection-at-product-php-c55c435c35c2 +CVE-2022-4211 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42110 - https://issues.liferay.com/browse/LPE-17403 +CVE-2022-42111 - https://issues.liferay.com/browse/LPE-17379 +CVE-2022-42118 - https://issues.liferay.com/browse/LPE-17342 +CVE-2022-42119 - https://issues.liferay.com/browse/LPE-17632 +CVE-2022-4212 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42120 - https://issues.liferay.com/browse/LPE-17513 +CVE-2022-42121 - https://issues.liferay.com/browse/LPE-17414 +CVE-2022-42122 - https://issues.liferay.com/browse/LPE-17520 +CVE-2022-42123 - https://issues.liferay.com/browse/LPE-17518 +CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17435 +CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17535 +CVE-2022-42125 - https://issues.liferay.com/browse/LPE-17517 +CVE-2022-42126 - https://issues.liferay.com/browse/LPE-17593 +CVE-2022-42127 - https://issues.liferay.com/browse/LPE-17607 +CVE-2022-42128 - https://issues.liferay.com/browse/LPE-17595 +CVE-2022-42129 - https://issues.liferay.com/browse/LPE-17448 +CVE-2022-42130 - https://issues.liferay.com/browse/LPE-17447 +CVE-2022-42131 - https://issues.liferay.com/browse/LPE-17377 +CVE-2022-42132 - https://issues.liferay.com/browse/LPE-17438 +CVE-2022-42139 - https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/ +CVE-2022-4214 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-4214 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4214 +CVE-2022-42140 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/ +CVE-2022-42141 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/ +CVE-2022-4215 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42150 - https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements +CVE-2022-42150 - https://hackmd.io/@UR9gnr32QymtmtZHnZceOw/ry428EZGo +CVE-2022-42156 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf +CVE-2022-42156 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-42159 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf +CVE-2022-42159 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4216 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42160 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf +CVE-2022-42160 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-42161 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf +CVE-2022-42161 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-42163 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md +CVE-2022-42164 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md +CVE-2022-42165 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md +CVE-2022-42166 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetSpeedWan/readme.md +CVE-2022-42167 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetFirewallCfg/readme.md +CVE-2022-42168 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromSetIpMacBind/readme.md +CVE-2022-42169 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/addWifiMacFilter/readme.md +CVE-2022-4217 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42170 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formWifiWpsStart/readme.md +CVE-2022-42171 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/saveParentControlInfo/readme.md +CVE-2022-42176 - https://github.com/soy-oreocato/CVE-2022-42176 +CVE-2022-42176 - https://github.com/soy-oreocato/CVE-Advisories/tree/main/PapiQuieroPollo00 +CVE-2022-4218 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-4219 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-42199 - https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE/blob/main/CVE-2022-42199.md +CVE-2022-42199 - https://github.com/ciph0x01/poc/blob/main/poc.html +CVE-2022-4220 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e +CVE-2022-4222 - https://vuldb.com/?id.214523 +CVE-2022-42221 - https://github.com/Cj775995/CVE_Report/tree/main/Netgear/R6220 +CVE-2022-42235 - https://github.com/draco1725/Stored-XSS/blob/main/poc +CVE-2022-42236 - https://github.com/draco1725/vloggers/blob/main/poc +CVE-2022-42237 - https://github.com/draco1725/sqlinj/blob/main/poc +CVE-2022-42238 - https://github.com/draco1725/localpriv/blob/main/poc +CVE-2022-42245 - https://packetstormsecurity.com/files/171585/Dreamer-CMS-4.0.0-SQL-Injection.html +CVE-2022-42246 - https://github.com/farliy-hacker/Doufoxcms/issues/1 +CVE-2022-42254 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42255 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42256 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42257 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42258 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42259 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-4226 - https://wpscan.com/vulnerability/c5ca22e0-b7a5-468d-8366-1855ff33851b +CVE-2022-42260 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42261 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42262 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42263 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42264 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42265 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42266 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42267 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415 +CVE-2022-42271 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42272 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42273 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42274 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42275 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42276 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42277 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42278 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42279 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-4228 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash +CVE-2022-4228 - https://vuldb.com/?id.214587 +CVE-2022-42280 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42281 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42282 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42283 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42284 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42285 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42286 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42287 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42288 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-42289 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-4229 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control +CVE-2022-42290 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435 +CVE-2022-4230 - https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312 +CVE-2022-42300 - https://www.veritas.com/content/support/en_US/security/VTS22-013#M2 +CVE-2022-4231 - https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation +CVE-2022-4233 - https://vuldb.com/?id.214591 +CVE-2022-4235 - https://fluidattacks.com/advisories/miller/ +CVE-2022-4236 - https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 +CVE-2022-4237 - https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f +CVE-2022-4239 - https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c +CVE-2022-4242 - https://wpscan.com/vulnerability/d7f89335-630c-47c6-bebf-92f556caa087 +CVE-2022-4243 - https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0 +CVE-2022-42457 - https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution +CVE-2022-4246 - https://seclists.org/fulldisclosure/2022/Nov/16 +CVE-2022-4247 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/1 +CVE-2022-4248 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/3 +CVE-2022-4248 - https://vuldb.com/?id.214625 +CVE-2022-42484 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1641 +CVE-2022-42490 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 +CVE-2022-42491 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 +CVE-2022-42492 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 +CVE-2022-42493 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640 +CVE-2022-4250 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/2 +CVE-2022-4251 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/4 +CVE-2022-4256 - https://wpscan.com/vulnerability/f5b17c68-c2b0-4d0d-bb7b-19dc30511a89 +CVE-2022-4257 - https://vuldb.com/?id.214631 +CVE-2022-4260 - https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db +CVE-2022-4265 - https://wpscan.com/vulnerability/095cba08-7edd-41fb-9776-da151c0885dd +CVE-2022-4266 - https://wpscan.com/vulnerability/1bcda9d3-c573-441e-828f-055fbec2e08d +CVE-2022-4267 - https://wpscan.com/vulnerability/e09754f2-e241-4bf8-8c95-a3fbc0ba7585 +CVE-2022-4268 - https://bulletin.iese.de/post/plugin-logic_1-0-7/ +CVE-2022-4268 - https://wpscan.com/vulnerability/bde93d90-1178-4d55-aea9-e02c4f8bcaa2 +CVE-2022-42703 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.7 +CVE-2022-42703 - https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html +CVE-2022-4271 - https://huntr.dev/bounties/a11c922f-255a-412a-aa87-7f3bd7121599 +CVE-2022-42710 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-42710/CVE-2022-42710.txt +CVE-2022-42716 - http://packetstormsecurity.com/files/170420/Arm-Mali-CSF-KBASE_REG_NO_USER_FREE-Unsafe-Use-Use-After-Free.html +CVE-2022-42719 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html +CVE-2022-42719 - http://www.openwall.com/lists/oss-security/2022/10/13/5 +CVE-2022-4272 - https://github.com/FeMiner/wms/issues/14 +CVE-2022-42720 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html +CVE-2022-42720 - http://www.openwall.com/lists/oss-security/2022/10/13/5 +CVE-2022-42721 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html +CVE-2022-42721 - http://www.openwall.com/lists/oss-security/2022/10/13/5 +CVE-2022-42722 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html +CVE-2022-42722 - http://www.openwall.com/lists/oss-security/2022/10/13/5 +CVE-2022-4273 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/bypass-fileupload-rce +CVE-2022-4273 - https://vuldb.com/?id.214769 +CVE-2022-42732 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-42733 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-42734 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-4274 - https://github.com/nikeshtiwari1/House-Rental-System/issues/6 +CVE-2022-4274 - https://vuldb.com/?id.214770 +CVE-2022-4275 - https://github.com/nikeshtiwari1/House-Rental-System/issues/7 +CVE-2022-4276 - https://github.com/nikeshtiwari1/House-Rental-System/issues/8 +CVE-2022-4276 - https://vuldb.com/?id.214772 +CVE-2022-4278 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employeeadd-sqli +CVE-2022-4279 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss +CVE-2022-4279 - https://vuldb.com/?id.214776 +CVE-2022-4280 - https://vuldb.com/?id.214778 +CVE-2022-42801 - http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html +CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42844 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42847 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-4285 - https://sourceware.org/bugzilla/show_bug.cgi?id=29699 +CVE-2022-42850 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-42853 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42855 - http://packetstormsecurity.com/files/170518/libCoreEntitlements-CEContextQuery-Arbitrary-Entitlement-Returns.html +CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/22 +CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-42885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668 +CVE-2022-42889 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html +CVE-2022-42889 - http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html +CVE-2022-42891 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-42892 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-42893 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-42894 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 +CVE-2022-42905 - http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html +CVE-2022-42905 - http://seclists.org/fulldisclosure/2023/Jan/11 +CVE-2022-42905 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/ +CVE-2022-4291 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2022-42915 - http://seclists.org/fulldisclosure/2023/Jan/19 +CVE-2022-42916 - http://seclists.org/fulldisclosure/2023/Jan/19 +CVE-2022-4292 - https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b +CVE-2022-42927 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789128 +CVE-2022-4293 - https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143 +CVE-2022-4294 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2022-42948 - https://www.cobaltstrike.com/blog/ +CVE-2022-4295 - https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56 +CVE-2022-42953 - https://seclists.org/fulldisclosure/2022/Oct/23 +CVE-2022-42953 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2022-42964 - https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/ +CVE-2022-42965 - https://research.jfrog.com/vulnerabilities/snowflake-connector-python-redos-xray-257185/ +CVE-2022-42966 - https://research.jfrog.com/vulnerabilities/cleo-redos-xray-257186/ +CVE-2022-42967 - https://research.jfrog.com/vulnerabilities/caret-xss-rce/ +CVE-2022-42969 - https://github.com/pytest-dev/py/issues/287 +CVE-2022-4297 - http://packetstormsecurity.com/files/173293/WordPress-WP-AutoComplete-Search-1.0.4-SQL-Injection.html +CVE-2022-4297 - https://wpscan.com/vulnerability/e2dcc76c-65ac-4cd6-a5c9-6d813b5ac26d +CVE-2022-42979 - https://medium.com/@jalee0606/how-i-found-my-first-one-click-account-takeover-via-deeplink-in-ryde-5406010c36d8 +CVE-2022-4298 - https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478 +CVE-2022-42980 - https://github.com/go-admin-team/go-admin/issues/716 +CVE-2022-4299 - https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303 +CVE-2022-42991 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Public%20Access%20Catalog/XSS +CVE-2022-42992 - https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS +CVE-2022-42993 - https://github.com/draco1725/POC/blob/main/Exploit/Password%20Storage%20Application/XSS +CVE-2022-42998 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd +CVE-2022-42998 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-42999 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm +CVE-2022-42999 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4300 - https://vuldb.com/?id.214901 +CVE-2022-43000 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4 +CVE-2022-43000 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-43001 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity +CVE-2022-43001 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-43002 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54 +CVE-2022-43002 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-43003 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity +CVE-2022-43003 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4301 - https://wpscan.com/vulnerability/a8dca528-fb70-44f3-8149-21385039179d +CVE-2022-43014 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_joborderID.md +CVE-2022-43015 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_entriesPerPage.md +CVE-2022-43016 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_callback.md +CVE-2022-43017 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_indexFile.md +CVE-2022-43018 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_checkEmail.md +CVE-2022-4302 - https://wpscan.com/vulnerability/b7707a15-0987-4051-a8ac-7be2424bcb01 +CVE-2022-43020 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_in_Tag_Updates.md +CVE-2022-43021 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_JobOrders.md +CVE-2022-43022 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_tag_deletion.md +CVE-2022-43023 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_imports_errors.md +CVE-2022-43024 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-6.md +CVE-2022-43025 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-1.md +CVE-2022-43026 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-2.md +CVE-2022-43027 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-5.md +CVE-2022-43028 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-3.md +CVE-2022-43029 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-4.md +CVE-2022-4303 - https://wpscan.com/vulnerability/8428a5e1-dbef-4516-983f-f95605c6dd09 +CVE-2022-43039 - https://github.com/gpac/gpac/issues/2281 +CVE-2022-43040 - https://github.com/gpac/gpac/issues/2280 +CVE-2022-43042 - https://github.com/gpac/gpac/issues/2278 +CVE-2022-43043 - https://github.com/gpac/gpac/issues/2276 +CVE-2022-43044 - https://github.com/gpac/gpac/issues/2282 +CVE-2022-43045 - https://github.com/gpac/gpac/issues/2277 +CVE-2022-43046 - https://github.com/Oudaorui/bug_report/blob/main/vendors/oretnom23/Food%20Ordering%20Management%20System/XSS-1.md +CVE-2022-4305 - https://wpscan.com/vulnerability/286d972d-7bda-455c-a226-fd9ce5f925bd +CVE-2022-4306 - https://wpscan.com/vulnerability/18d7f9af-7267-4723-9d6f-05b895c94dbe +CVE-2022-4307 - https://wpscan.com/vulnerability/4000ba69-d73f-4c5b-a299-82898304cebb +CVE-2022-43071 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42349&p=43959#p43959 +CVE-2022-43076 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-1.md +CVE-2022-43078 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-2.md +CVE-2022-43079 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-3.md +CVE-2022-43081 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-3.md +CVE-2022-43082 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-4.md +CVE-2022-43083 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-2.md +CVE-2022-43084 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-5.md +CVE-2022-43085 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-3.md +CVE-2022-43086 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-4.md +CVE-2022-4309 - https://wpscan.com/vulnerability/1965f53d-c94e-4322-9059-49de69df1051 +CVE-2022-4310 - https://wpscan.com/vulnerability/b1aef75d-0c84-4702-83fc-11f0e98a0821 +CVE-2022-43101 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetdevicenameset_device_namesprintfv4-s1-a1 +CVE-2022-43102 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetsystimesub_496104strcpychar-v6-s +CVE-2022-43103 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetqosband +CVE-2022-43104 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwirelessrepeatsub_45cd64sub_45cad8sub_45bb10 +CVE-2022-43105 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwifigusetbasic +CVE-2022-43106 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setschedwifi-strcpychar-ptr--2-v8 +CVE-2022-43107 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setsmartpowermanagement +CVE-2022-43108 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetfirewallcfg +CVE-2022-43109 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-43117 - https://drive.google.com/file/d/1ZmAuKMVzUpL8pt5KXQJk8IyPECoVP9xw/view?usp=sharing +CVE-2022-43117 - https://github.com/RashidKhanPathan/CVE-2022-43117 +CVE-2022-43119 - https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md +CVE-2022-43138 - https://www.exploit-db.com/exploits/50248 +CVE-2022-4314 - https://huntr.dev/bounties/b2dc504d-92ae-4221-a096-12ff223d95a8 +CVE-2022-43140 - https://github.com/kekingcn/kkFileView/issues/392 +CVE-2022-43143 - https://github.com/beekeeper-studio/beekeeper-studio/issues/1393 +CVE-2022-43144 - https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS +CVE-2022-43146 - https://medium.com/@syedmudassiruddinalvi/cve-2022-43146-rce-via-arbitrary-file-upload-28dfa77c5de7 +CVE-2022-43148 - https://github.com/lvu/rtf2html/issues/11 +CVE-2022-43151 - https://github.com/hzeller/timg/issues/92 +CVE-2022-43152 - https://github.com/justdan96/tsMuxer/issues/641 +CVE-2022-43164 - https://github.com/anhdq201/rukovoditel/issues/4 +CVE-2022-43165 - https://github.com/anhdq201/rukovoditel/issues/5 +CVE-2022-43166 - https://github.com/anhdq201/rukovoditel/issues/2 +CVE-2022-43167 - https://github.com/anhdq201/rukovoditel/issues/7 +CVE-2022-43168 - https://github.com/anhdq201/rukovoditel/issues/1 +CVE-2022-43169 - https://github.com/anhdq201/rukovoditel/issues/3 +CVE-2022-43170 - https://github.com/anhdq201/rukovoditel/issues/6 +CVE-2022-43171 - https://github.com/lief-project/LIEF/issues/782 +CVE-2022-43183 - https://github.com/xuxueli/xxl-job/issues/3002 +CVE-2022-43184 - https://github.com/HuangPayoung/CVE-request/tree/main/DLink/vuln2 +CVE-2022-43184 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-43192 - https://github.com/linchuzhu/Dedecms-v5.7.101-RCE +CVE-2022-4320 - https://wpscan.com/vulnerability/f1244c57-d886-4a6e-8cdb-18404e8c153c +CVE-2022-4321 - https://wpscan.com/vulnerability/6ac1259c-86d9-428b-ba98-7f3d07910644 +CVE-2022-43216 - https://github.com/blackarrowsec/advisories/tree/master/2022/CVE-2022-43216 +CVE-2022-43221 - https://github.com/ToughRunner/Open5gs_bugreport3 +CVE-2022-43222 - https://github.com/ToughRunner/Open5gs_bugreport4 +CVE-2022-43223 - https://github.com/ToughRunner/Open5gs_bugreport2 +CVE-2022-43229 - http://packetstormsecurity.com/files/169605/Simple-Cold-Storage-Management-System-1.0-SQL-Injection.html +CVE-2022-4323 - https://wpscan.com/vulnerability/ce8027b8-9473-463e-ba80-49b3d6d16228 +CVE-2022-43235 - https://github.com/strukturag/libde265/issues/337 +CVE-2022-43236 - https://github.com/strukturag/libde265/issues/343 +CVE-2022-43237 - https://github.com/strukturag/libde265/issues/344 +CVE-2022-43238 - https://github.com/strukturag/libde265/issues/336 +CVE-2022-43239 - https://github.com/strukturag/libde265/issues/341 +CVE-2022-4324 - https://wpscan.com/vulnerability/70c39236-f7ae-49bf-a2f0-7cb9aa983e45 +CVE-2022-43240 - https://github.com/strukturag/libde265/issues/335 +CVE-2022-43241 - https://github.com/strukturag/libde265/issues/338 +CVE-2022-43242 - https://github.com/strukturag/libde265/issues/340 +CVE-2022-43243 - https://github.com/strukturag/libde265/issues/339 +CVE-2022-43244 - https://github.com/strukturag/libde265/issues/342 +CVE-2022-43245 - https://github.com/strukturag/libde265/issues/352 +CVE-2022-43248 - https://github.com/strukturag/libde265/issues/349 +CVE-2022-43249 - https://github.com/strukturag/libde265/issues/345 +CVE-2022-4325 - https://wpscan.com/vulnerability/5b983c48-6b05-47cf-85cb-28bbeec17395 +CVE-2022-43250 - https://github.com/strukturag/libde265/issues/346 +CVE-2022-43252 - https://github.com/strukturag/libde265/issues/347 +CVE-2022-43253 - https://github.com/strukturag/libde265/issues/348 +CVE-2022-43254 - https://github.com/gpac/gpac/issues/2284 +CVE-2022-43255 - https://github.com/gpac/gpac/issues/2285 +CVE-2022-43256 - https://github.com/seacms-com/seacms/issues/23 +CVE-2022-43263 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/ +CVE-2022-43264 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/ +CVE-2022-43265 - https://10degres.net/cves/cve-2022-43265/ +CVE-2022-4328 - https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed +CVE-2022-43280 - https://github.com/WebAssembly/wabt/issues/1982 +CVE-2022-43281 - https://github.com/WebAssembly/wabt/issues/1981 +CVE-2022-43282 - https://github.com/WebAssembly/wabt/issues/1983 +CVE-2022-43283 - https://github.com/WebAssembly/wabt/issues/1985 +CVE-2022-43284 - https://github.com/nginx/njs/issues/470 +CVE-2022-43284 - https://github.com/nginx/njs/issues/529 +CVE-2022-43285 - https://github.com/nginx/njs/issues/533 +CVE-2022-43286 - https://github.com/nginx/njs/issues/480 +CVE-2022-43288 - https://github.com/Kubozz/rukovoditel-3.2.1/issues/2 +CVE-2022-43289 - https://github.com/jsummers/deark/issues/52 +CVE-2022-4329 - https://wpscan.com/vulnerability/d7f2c1c1-75b7-4aec-8574-f38d506d064a +CVE-2022-43293 - https://github.com/LucaBarile/CVE-2022-43293 +CVE-2022-43293 - https://lucabarile.github.io/Blog/CVE-2022-43293/index.html +CVE-2022-4330 - https://wpscan.com/vulnerability/d3c39e17-1dc3-4275-97d8-543ca7226772 +CVE-2022-43308 - https://github.com/vitorespf/Advisories/blob/master/Intelbras-switch.txt +CVE-2022-4331 - https://gitlab.com/gitlab-org/gitlab/-/issues/385050 +CVE-2022-43317 - https://github.com/ImaizumiYui/bug_report/blob/main/vendors/oretnom23/Human%20Resource%20Management%20System/XSS-1.md +CVE-2022-43320 - https://github.com/liufee/feehicms/issues/4 +CVE-2022-43321 - https://github.com/shopwind/yii-shopwind/issues/1 +CVE-2022-43325 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325 +CVE-2022-43326 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43326 +CVE-2022-43333 - https://www.swascan.com/it/security-advisory-telenia-software-tvox/ +CVE-2022-43340 - https://github.com/zyx0814/dzzoffice/issues/223 +CVE-2022-43342 - https://discussions.eramba.org/t/question-stored-xss-vulnerability/2326 +CVE-2022-4335 - https://gitlab.com/gitlab-org/gitlab/-/issues/353018 +CVE-2022-43357 - https://github.com/sass/libsass/issues/3177 +CVE-2022-43358 - https://github.com/sass/libsass/issues/3178 +CVE-2022-43372 - https://github.com/emlog/emlog/issues/195 +CVE-2022-43380 - https://www.ibm.com/support/pages/node/6847947 +CVE-2022-4340 - https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7 +CVE-2022-43403 - https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/ +CVE-2022-43441 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645 +CVE-2022-4346 - https://wpscan.com/vulnerability/cc05f760-983d-4dc1-afbb-6b4965aa8abe +CVE-2022-43467 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671 +CVE-2022-4347 - https://vuldb.com/?id.215107 +CVE-2022-43473 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685 +CVE-2022-43484 - http://terasolunaorg.github.io/vulnerability/cve-2022-43484.html +CVE-2022-43484 - https://osdn.net/projects/terasoluna/wiki/cve-2022-43484 +CVE-2022-4349 - https://gitee.com/CTF-hacker/pwn/issues/I5WAAB +CVE-2022-4350 - https://vuldb.com/?id.215112 +CVE-2022-4351 - https://wpscan.com/vulnerability/2138f736-8a50-4390-a239-fcd1d736670a +CVE-2022-4352 - https://wpscan.com/vulnerability/325874f4-2482-4ae5-b5cf-cb9ff0843067 +CVE-2022-4355 - https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759 +CVE-2022-4356 - https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b +CVE-2022-4357 - https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626 +CVE-2022-4358 - https://wpscan.com/vulnerability/0076a3b8-9a25-41c9-bb07-36ffe2c8c37d +CVE-2022-43588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647 +CVE-2022-43589 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1648 +CVE-2022-4359 - https://wpscan.com/vulnerability/8472dd40-27e3-4084-907a-e251a2a0f339 +CVE-2022-43590 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1649 +CVE-2022-43591 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650 +CVE-2022-43592 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651 +CVE-2022-43593 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652 +CVE-2022-43594 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653 +CVE-2022-43595 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653 +CVE-2022-43596 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1654 +CVE-2022-43597 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655 +CVE-2022-43598 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655 +CVE-2022-43599 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 +CVE-2022-4360 - https://wpscan.com/vulnerability/40c420aa-5da0-42f9-a94f-f68ef57fcdae +CVE-2022-43600 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 +CVE-2022-43601 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 +CVE-2022-43602 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656 +CVE-2022-43603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1657 +CVE-2022-43604 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1661 +CVE-2022-43605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1662 +CVE-2022-43606 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1663 +CVE-2022-43607 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664 +CVE-2022-4362 - https://wpscan.com/vulnerability/2660225a-e4c8-40f2-8c98-775ef2301212 +CVE-2022-4364 - https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md +CVE-2022-4365 - https://hackerone.com/reports/1792626 +CVE-2022-4366 - https://huntr.dev/bounties/f225d69a-d971-410d-a8f9-b0026143aed8 +CVE-2022-43663 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674 +CVE-2022-43664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 +CVE-2022-43665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1682 +CVE-2022-43675 - https://www.gruppotim.it/redteam +CVE-2022-4368 - https://wpscan.com/vulnerability/fa7e2b64-ca48-4b76-a2c2-f5e31e42eab7 +CVE-2022-43684 - http://packetstormsecurity.com/files/173354/ServiceNow-Insecure-Access-Control-Full-Admin-Compromise.html +CVE-2022-4369 - https://wpscan.com/vulnerability/460a01e5-7ce5-4d49-b068-a93ea1fba0e3 +CVE-2022-4370 - https://bulletin.iese.de/post/multimedial-images_1-0b +CVE-2022-4370 - https://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8 +CVE-2022-43701 - https://developer.arm.com/documentation/ka005596/latest +CVE-2022-43702 - https://developer.arm.com/documentation/ka005596/latest +CVE-2022-43703 - https://developer.arm.com/documentation/ka005596/latest +CVE-2022-43704 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/ +CVE-2022-4371 - https://bulletin.iese.de/post/web-invoice_2-1-3_1 +CVE-2022-4371 - https://wpscan.com/vulnerability/45f43359-98c2-4447-b51b-2d466bad8261 +CVE-2022-4372 - https://bulletin.iese.de/post/web-invoice_2-1-3_2 +CVE-2022-4372 - https://wpscan.com/vulnerability/218f8015-e14b-46a8-889d-08b2b822f8ae +CVE-2022-4373 - https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02 +CVE-2022-4374 - https://wpscan.com/vulnerability/bbaa808d-47b1-4c70-b157-f8297f627a07 +CVE-2022-4375 - https://gitee.com/mingSoft/MCMS/issues/I61TG5 +CVE-2022-43750 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15 +CVE-2022-43753 - https://bugzilla.suse.com/show_bug.cgi?id=1204716 +CVE-2022-43769 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html +CVE-2022-43774 - https://www.tenable.com/security/research/tra-2022-33 +CVE-2022-43775 - https://www.tenable.com/security/research/tra-2022-33 +CVE-2022-43776 - https://www.tenable.com/security/research/tra-2022-34 +CVE-2022-4378 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html +CVE-2022-4378 - https://seclists.org/oss-sec/2022/q4/178 +CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0 +CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da +CVE-2022-4381 - https://wpscan.com/vulnerability/8bf8ebe8-1063-492d-a0f9-2f824408d0df +CVE-2022-4383 - https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035 +CVE-2022-4384 - https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5 +CVE-2022-43848 - https://www.ibm.com/support/pages/node/6847947 +CVE-2022-43849 - https://www.ibm.com/support/pages/node/6847947 +CVE-2022-4385 - https://wpscan.com/vulnerability/8f900d37-6eee-4434-8b9b-d10cc4a9167c +CVE-2022-4386 - https://wpscan.com/vulnerability/734064e3-afe9-4dfd-8d76-8a757cc94815 +CVE-2022-4391 - https://wpscan.com/vulnerability/c0c37787-3c4c-42d5-bb75-5d4ed3e7aa2b +CVE-2022-4392 - https://wpscan.com/vulnerability/c298e3dc-09a7-40bb-a361-f49af4bce77e +CVE-2022-4393 - https://wpscan.com/vulnerability/0bd4f370-f9f8-43ee-8f20-96e899a1efb5 +CVE-2022-43939 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html +CVE-2022-4394 - https://wpscan.com/vulnerability/8edbdea1-f9bb-407a-bcd1-fff3e146984c +CVE-2022-43945 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html +CVE-2022-43945 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8 +CVE-2022-4395 - https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40 +CVE-2022-43970 - https://youtu.be/73-1lhvJPNg +CVE-2022-43970 - https://youtu.be/RfWVYCUBNZ0 +CVE-2022-43970 - https://youtu.be/TeWAmZaKQ_w +CVE-2022-43971 - https://youtu.be/73-1lhvJPNg +CVE-2022-43971 - https://youtu.be/RfWVYCUBNZ0 +CVE-2022-43971 - https://youtu.be/TeWAmZaKQ_w +CVE-2022-43972 - https://youtu.be/73-1lhvJPNg +CVE-2022-43972 - https://youtu.be/RfWVYCUBNZ0 +CVE-2022-43972 - https://youtu.be/TeWAmZaKQ_w +CVE-2022-43973 - https://youtu.be/73-1lhvJPNg +CVE-2022-43973 - https://youtu.be/RfWVYCUBNZ0 +CVE-2022-43973 - https://youtu.be/TeWAmZaKQ_w +CVE-2022-43974 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 +CVE-2022-4398 - https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2 +CVE-2022-43996 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json +CVE-2022-43997 - https://winternl.com/cve-2022-43997/ +CVE-2022-43999 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-034.txt +CVE-2022-43999 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44000 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-032.txt +CVE-2022-44000 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44001 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt +CVE-2022-44001 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44002 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44003 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt +CVE-2022-44003 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44004 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt +CVE-2022-44004 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44005 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt +CVE-2022-44005 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44006 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-031.txt +CVE-2022-44006 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44007 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt +CVE-2022-44007 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037 +CVE-2022-44008 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-037.txt +CVE-2022-44012 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ +CVE-2022-44013 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ +CVE-2022-44014 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ +CVE-2022-44015 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ +CVE-2022-44016 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ +CVE-2022-44017 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ +CVE-2022-44019 - https://www.edoardoottavianelli.it/CVE-2022-44019/ +CVE-2022-44019 - https://www.youtube.com/watch?v=x-u3eS8-xJg +CVE-2022-4403 - https://vuldb.com/?id.215272 +CVE-2022-44037 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037 +CVE-2022-44038 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44038 +CVE-2022-4407 - https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b +CVE-2022-44079 - https://github.com/zrax/pycdc/issues/291 +CVE-2022-4408 - https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea +CVE-2022-44081 - https://github.com/lvandeve/lodepng/issues/177 +CVE-2022-4409 - https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c +CVE-2022-44096 - https://github.com/upasvi/CVE-/issues/1 +CVE-2022-44097 - https://github.com/upasvi/CVE-/issues/2 +CVE-2022-44108 - https://github.com/ldenoue/pdftojson/issues/3 +CVE-2022-44109 - https://github.com/ldenoue/pdftojson/issues/4 +CVE-2022-44118 - https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b +CVE-2022-4413 - https://huntr.dev/bounties/70ac720d-c932-4ed3-98b1-dd2cbcb90185 +CVE-2022-4414 - https://huntr.dev/bounties/131a41e5-c936-4c3f-84fc-e0e1f0e090b5 +CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html +CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-80.103.2.5045-Remote-Code-Execution.html +CVE-2022-44149 - https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html +CVE-2022-4415 - https://www.openwall.com/lists/oss-security/2022/12/21/3 +CVE-2022-44156 - https://drive.google.com/file/d/1dbMwByl40uqMiSv_DOEW8pFjRhGX-j97/view?usp=sharing +CVE-2022-44158 - https://drive.google.com/file/d/11PSsUpLmLCl0-eO565TLbVavzfP5aWdG/view?usp=sharing +CVE-2022-44167 - https://drive.google.com/file/d/1Jq8Tm_2FDS4WDD_afdhg1LnA3VcvZdjS/view?usp=sharing +CVE-2022-4417 - https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5 +CVE-2022-44201 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44202 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44204 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3060/5.md +CVE-2022-44204 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44215 - https://github.com/JBalanza/CVE-2022-44215 +CVE-2022-44235 - https://github.com/liong007/Zed-3/issues/1 +CVE-2022-4426 - https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38 +CVE-2022-44262 - https://github.com/ff4j/ff4j/issues/624 +CVE-2022-44267 - https://www.metabaseq.com/imagemagick-zero-days/ +CVE-2022-44268 - http://packetstormsecurity.com/files/171727/ImageMagick-7.1.0-48-Arbitrary-File-Read.html +CVE-2022-44268 - https://www.metabaseq.com/imagemagick-zero-days/ +CVE-2022-44276 - https://github.com/HerrLeStrate/CVE-2022-44276-PoC +CVE-2022-44279 - https://github.com/Onetpaer/bug_report/blob/main/vendors/mayuri_k/garage-management-system/xss1.md +CVE-2022-44283 - https://packetstormsecurity.com/files/169427/AVS-Audio-Converter-10.3-Stack-Overflow.html +CVE-2022-44284 - https://packetstormsecurity.com/files/169531/Dinstar-FXO-Analog-VoIP-Gateway-DAG2000-16O-Cross-Site-Scripting.html +CVE-2022-4429 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2022-44290 - https://github.com/anhdq201/webtareas/issues/2 +CVE-2022-44291 - https://github.com/anhdq201/webtareas/issues/1 +CVE-2022-44298 - https://github.com/siteserver/cms/issues/3492 +CVE-2022-4431 - https://wpscan.com/vulnerability/860b882b-983c-44b5-8c09-b6890df8a0da +CVE-2022-4431 - https://wpscan.com/vulnerability/c7d12fd4-7346-4727-9f6c-7e7e5524a932 +CVE-2022-44354 - https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md +CVE-2022-44355 - https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md +CVE-2022-44356 - https://github.com/strik3r0x1/Vulns/blob/main/Wavlink%20WL-WN531G3.md +CVE-2022-44362 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formAddSysLogRule/readme.md +CVE-2022-44363 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSnmpInfo/readme.md +CVE-2022-44365 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md +CVE-2022-44366 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetDiagnoseInfo/readme.md +CVE-2022-44367 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetUplinkInfo/readme.md +CVE-2022-44373 - https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md +CVE-2022-44380 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/ +CVE-2022-44381 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/ +CVE-2022-44384 - https://www.exploit-db.com/exploits/49783 +CVE-2022-4442 - https://wpscan.com/vulnerability/12766537-df59-49d6-815a-4d68265a4c4a +CVE-2022-4443 - https://wpscan.com/vulnerability/1e621d62-13c7-4b2f-96ca-3617a796d037 +CVE-2022-4445 - https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8 +CVE-2022-44451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669 +CVE-2022-4446 - https://huntr.dev/bounties/718f1be6-3834-4ef2-8134-907a52009894 +CVE-2022-4447 - https://wpscan.com/vulnerability/6939c405-ac62-4144-bd86-944d7b89d0ad +CVE-2022-4448 - https://wpscan.com/vulnerability/ce467a2e-081e-4a6c-bfa4-29e4447ebd3b +CVE-2022-4449 - https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d +CVE-2022-4451 - https://wpscan.com/vulnerability/a28f52a4-fd57-4f46-8983-f34c71ec88d5 +CVE-2022-4453 - https://wpscan.com/vulnerability/120bdcb3-4288-4101-b738-cc84d02da171 +CVE-2022-4458 - https://wpscan.com/vulnerability/c85ceab3-7e79-402d-ad48-a028f1ee070c +CVE-2022-4459 - https://wpscan.com/vulnerability/3ef4783b-4e4a-4691-b858-a7fa8dada4ec +CVE-2022-4460 - https://wpscan.com/vulnerability/034c4c75-42a4-4884-b63f-f9d4d2d6aebc +CVE-2022-44638 - http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html +CVE-2022-44638 - https://gitlab.freedesktop.org/pixman/pixman/-/issues/63 +CVE-2022-4464 - https://wpscan.com/vulnerability/1d3636c1-976f-4c84-8cca-413e38170d0c +CVE-2022-4465 - https://wpscan.com/vulnerability/28abe589-1371-4ed2-90b6-2bb96c93832c +CVE-2022-4466 - https://wpscan.com/vulnerability/497d0bf9-b750-4293-9662-1722a74442e2 +CVE-2022-44666 - http://packetstormsecurity.com/files/171047/Microsoft-Windows-Contact-File-Remote-Code-Execution.html +CVE-2022-44666 - http://seclists.org/fulldisclosure/2023/Feb/14 +CVE-2022-4467 - https://wpscan.com/vulnerability/54168861-c0b8-4de6-a9af-0ad5c20b4a45 +CVE-2022-4468 - https://wpscan.com/vulnerability/a3bf24af-417e-4ca2-886c-bb36bb2d952b +CVE-2022-44683 - http://packetstormsecurity.com/files/170466/Windows-Kernel-NtNotifyChangeMultipleKeys-Use-After-Free.html +CVE-2022-4469 - https://wpscan.com/vulnerability/b195c373-1db9-4fd7-98d0-0860dacd189e +CVE-2022-4470 - https://wpscan.com/vulnerability/7c4e51b3-87ef-4afc-ab53-9a9bbdcfc9d7 +CVE-2022-4471 - https://wpscan.com/vulnerability/c6cf792b-054c-4d77-bcae-3b700f42130b +CVE-2022-4472 - https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a +CVE-2022-44724 - https://stiltsoft.atlassian.net/browse/VD-3 +CVE-2022-44724 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-049.txt +CVE-2022-44725 - https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/ +CVE-2022-44726 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-050.txt +CVE-2022-44727 - https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf +CVE-2022-4473 - https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3 +CVE-2022-4474 - https://wpscan.com/vulnerability/3acc6940-13ec-40fb-8471-6b2f0445c543 +CVE-2022-4475 - https://wpscan.com/vulnerability/3b5c377c-3148-4373-996c-89851d5e39e5 +CVE-2022-4476 - https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45 +CVE-2022-4477 - https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41 +CVE-2022-4478 - https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 +CVE-2022-4479 - https://wpscan.com/vulnerability/10f63d30-1b36-459b-80eb-509caaf5d377 +CVE-2022-44792 - https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 +CVE-2022-44792 - https://github.com/net-snmp/net-snmp/issues/474 +CVE-2022-44793 - https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f +CVE-2022-44793 - https://github.com/net-snmp/net-snmp/issues/475 +CVE-2022-4480 - https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124 +CVE-2022-44801 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44804 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44806 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44807 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-44808 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1 +CVE-2022-44808 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4481 - https://wpscan.com/vulnerability/9dc9d377-635d-4d4f-9916-33bcedbba6f0 +CVE-2022-4482 - https://wpscan.com/vulnerability/389b71d6-b0e6-4e36-b9ca-9d8dab75bb0a +CVE-2022-4483 - https://wpscan.com/vulnerability/a1786400-dc62-489c-b986-ba17c9833179 +CVE-2022-44830 - https://github.com/RashidKhanPathan/CVE-2022-44830 +CVE-2022-44832 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3040/6.md +CVE-2022-44832 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4484 - https://wpscan.com/vulnerability/91252899-029d-49be-859e-7d2c4a70efea +CVE-2022-44843 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1 +CVE-2022-44844 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2 +CVE-2022-4485 - https://wpscan.com/vulnerability/685b068e-0727-45fb-bd8c-66bb1dc3a8e7 +CVE-2022-4486 - https://wpscan.com/vulnerability/d0afd17c-09cd-4ab5-95a5-6ac8c3c0a50b +CVE-2022-4487 - https://wpscan.com/vulnerability/6130958f-f549-4885-adb1-093aa025920e +CVE-2022-44870 - https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md +CVE-2022-44877 - http://packetstormsecurity.com/files/170388/Control-Web-Panel-7-Remote-Code-Execution.html +CVE-2022-44877 - http://packetstormsecurity.com/files/170820/Control-Web-Panel-Unauthenticated-Remote-Command-Execution.html +CVE-2022-44877 - http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html +CVE-2022-44877 - http://seclists.org/fulldisclosure/2023/Jan/1 +CVE-2022-44877 - https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386 +CVE-2022-44877 - https://www.youtube.com/watch?v=kiLfSvc1SYY +CVE-2022-4488 - https://wpscan.com/vulnerability/e52c18a9-550a-40b1-a413-0e06e5b4aabc +CVE-2022-4489 - https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f +CVE-2022-44897 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-44897/poc.txt +CVE-2022-44898 - http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html +CVE-2022-44898 - https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/ +CVE-2022-44900 - http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html +CVE-2022-4491 - https://wpscan.com/vulnerability/b62d8fa6-d546-4794-8f7a-c5e4a7f607dc +CVE-2022-44910 - https://github.com/yangfar/CVE/blob/main/Reference%20of%20Binbloom.md +CVE-2022-44928 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44928 +CVE-2022-44929 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44929 +CVE-2022-44930 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44930 +CVE-2022-44931 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md +CVE-2022-44932 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md +CVE-2022-44937 - https://github.com/5497lvren/Zhenhao/issues/1 +CVE-2022-44938 - https://pwnit.io/2022/11/23/weak-password-reset-token-leads-to-account-takeover-in-seeddms/ +CVE-2022-44939 - https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt +CVE-2022-44942 - https://github.com/casdoor/casdoor/issues/1171 +CVE-2022-44944 - https://github.com/anhdq201/rukovoditel/issues/14 +CVE-2022-44945 - https://github.com/anhdq201/rukovoditel/issues/16 +CVE-2022-44946 - https://github.com/anhdq201/rukovoditel/issues/15 +CVE-2022-44947 - https://github.com/anhdq201/rukovoditel/issues/13 +CVE-2022-44948 - https://github.com/anhdq201/rukovoditel/issues/8 +CVE-2022-44949 - https://github.com/anhdq201/rukovoditel/issues/12 +CVE-2022-44950 - https://github.com/anhdq201/rukovoditel/issues/10 +CVE-2022-44951 - https://github.com/anhdq201/rukovoditel/issues/11 +CVE-2022-44952 - https://github.com/anhdq201/rukovoditel/issues/9 +CVE-2022-44953 - https://github.com/anhdq201/webtareas/issues/8 +CVE-2022-44954 - https://github.com/anhdq201/webtareas/issues/10 +CVE-2022-44955 - https://github.com/anhdq201/webtareas/issues/5 +CVE-2022-44956 - https://github.com/anhdq201/webtareas/issues/3 +CVE-2022-44957 - https://github.com/anhdq201/webtareas/issues/11 +CVE-2022-44959 - https://github.com/anhdq201/webtareas/issues/6 +CVE-2022-44960 - https://github.com/anhdq201/webtareas/issues/4 +CVE-2022-44961 - https://github.com/anhdq201/webtareas/issues/7 +CVE-2022-44962 - https://github.com/anhdq201/webtareas/issues/12 +CVE-2022-4497 - https://wpscan.com/vulnerability/3fa6c8b3-6b81-4fe3-b997-25c9e5fdec86 +CVE-2022-4502 - https://huntr.dev/bounties/5bdef791-6886-4008-b9ba-045cb4524114 +CVE-2022-45025 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639 +CVE-2022-45026 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640 +CVE-2022-45027 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/ +CVE-2022-45028 - https://seanpesce.blogspot.com/2022/11/unauthenticated-stored-xss-in-arris.html +CVE-2022-4503 - https://huntr.dev/bounties/4cba644c-a2f5-4ed7-af5d-f2cab1895e13 +CVE-2022-45030 - http://packetstormsecurity.com/files/171613/rconfig-3.9.7-SQL-Injection.html +CVE-2022-45030 - https://www.rconfig.com/downloads/rconfig-3.9.7.zip +CVE-2022-45033 - https://github.com/cyb3r-n3rd/cve-request/blob/main/cve-poc-payload +CVE-2022-4504 - https://huntr.dev/bounties/f50538cb-99d3-411d-bd1a-5f36d1fa9f5d +CVE-2022-45043 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2 +CVE-2022-45045 - https://vulncheck.com/blog/xiongmai-iot-exploitation +CVE-2022-4505 - https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92 +CVE-2022-4506 - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942 +CVE-2022-45062 - https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390 +CVE-2022-4507 - https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6 +CVE-2022-4508 - https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab +CVE-2022-4509 - https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910 +CVE-2022-4510 - https://github.com/ReFirmLabs/binwalk/pull/617 +CVE-2022-45115 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1684 +CVE-2022-4512 - https://wpscan.com/vulnerability/7957f355-c767-4f59-bb28-0302d33386a6 +CVE-2022-45124 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1683 +CVE-2022-45129 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html +CVE-2022-45129 - http://seclists.org/fulldisclosure/2022/Nov/11 +CVE-2022-45130 - https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/ +CVE-2022-45132 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/ +CVE-2022-45144 - https://herolab.usd.de/security-advisories/usd-2022-0048/ +CVE-2022-45163 - https://research.nccgroup.com/2022/11/17/cve-2022-45163/ +CVE-2022-45163 - https://research.nccgroup.com/category/technical-advisory/ +CVE-2022-45169 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45170 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45171 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45172 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45173 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45174 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45175 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45177 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45178 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45179 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45180 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45202 - https://github.com/gpac/gpac/issues/2296 +CVE-2022-45204 - https://github.com/gpac/gpac/issues/2307 +CVE-2022-45205 - https://github.com/jeecgboot/jeecg-boot/issues/4128 +CVE-2022-45207 - https://github.com/jeecgboot/jeecg-boot/issues/4127 +CVE-2022-45208 - https://github.com/jeecgboot/jeecg-boot/issues/4126 +CVE-2022-45210 - https://github.com/jeecgboot/jeecg-boot/issues/4125 +CVE-2022-45213 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/ +CVE-2022-45218 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hrm.zip +CVE-2022-45221 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124 +CVE-2022-45223 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124 +CVE-2022-45224 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e +CVE-2022-45225 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e +CVE-2022-45283 - https://github.com/gpac/gpac/issues/2295 +CVE-2022-45290 - https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability/blob/main/README.md +CVE-2022-45297 - http://packetstormsecurity.com/files/171615/EQ-Enterprise-Management-System-2.2.0-SQL-Injection.html +CVE-2022-45297 - https://github.com/tlfyyds/EQ +CVE-2022-45299 - https://github.com/offalltn/CVE-2022-45299 +CVE-2022-45313 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md +CVE-2022-45315 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md +CVE-2022-45326 - https://www.navsec.net/2022/11/12/kwoksys-xxe.html +CVE-2022-45329 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/search_sql_injection/search_sql_injection.md +CVE-2022-45330 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/category_sql_injection/category_sql_injection.md +CVE-2022-45331 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_sql_injection/post_sql_injection.md +CVE-2022-45332 - https://github.com/LibreDWG/libredwg/issues/524 +CVE-2022-45337 - https://github.com/no1rr/Vulnerability/tree/master/Tenda/TX9Pro/1 +CVE-2022-45343 - https://github.com/gpac/gpac/issues/2315 +CVE-2022-45411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790311 +CVE-2022-45413 - https://bugzilla.mozilla.org/show_bug.cgi?id=1791201 +CVE-2022-45415 - https://bugzilla.mozilla.org/show_bug.cgi?id=1793551 +CVE-2022-45418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795815 +CVE-2022-4542 - https://wpscan.com/vulnerability/f0bef96f-dfe2-4988-adf8-e1bd493c5242 +CVE-2022-4543 - https://www.willsroot.io/2022/12/entrybleed.html +CVE-2022-4544 - https://wpscan.com/vulnerability/96e34d3d-627f-42f2-bfdb-c9d47dbf396c +CVE-2022-4545 - https://wpscan.com/vulnerability/19f482cb-fcfd-43e6-9a04-143e06351a70 +CVE-2022-4546 - https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8 +CVE-2022-45460 - https://github.com/tothi/pwn-hisilicon-dvr/blob/master/pwn_hisilicon_dvr.py +CVE-2022-4547 - https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99 +CVE-2022-45477 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-45478 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-45479 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-4548 - https://wpscan.com/vulnerability/0ff435bc-ea20-4993-98ae-1f61b1732b59 +CVE-2022-45480 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-45481 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-45482 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-45483 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/ +CVE-2022-4549 - https://wpscan.com/vulnerability/06e1be38-fc1a-4799-a006-556b678ae701 +CVE-2022-45497 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/exeCommand/readme.md +CVE-2022-45498 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolReboot/readme.md +CVE-2022-45499 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/WifiMacFilterGet/readme.md +CVE-2022-4550 - https://wpscan.com/vulnerability/a1179959-2044-479f-a5ca-3c9ffc46d00e +CVE-2022-45501 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/wifiSSIDset/readme.md +CVE-2022-45503 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/setAutoPing/readme.md +CVE-2022-45504 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolRestoreSet/readme.md +CVE-2022-45505 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md +CVE-2022-45506 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/delFileName/readme.md +CVE-2022-45507 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editFileName/readme.md +CVE-2022-45508 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editUserName/readme.md +CVE-2022-45509 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addUserName/readme.md +CVE-2022-4551 - https://wpscan.com/vulnerability/91c00b17-00ba-4c3f-8587-d54449a02659 +CVE-2022-45510 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/AdvSetWrlsafeset/readme.md +CVE-2022-45511 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/QuickIndex/readme.md +CVE-2022-45512 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeEmailFilter/readme.md +CVE-2022-45513 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/P2pListFilter/readme.md +CVE-2022-45514 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/webExcptypemanFilter/readme.md +CVE-2022-45515 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addressNat/readme.md +CVE-2022-45516 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/NatStaticSetting/readme.md +CVE-2022-45517 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/VirtualSer/readme.md +CVE-2022-45518 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SetIpBind/readme.md +CVE-2022-45519 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeMacFilter/readme.md +CVE-2022-4552 - https://wpscan.com/vulnerability/307b0fe4-39de-4fbb-8bb0-f7f15ec6ef52 +CVE-2022-45520 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/qossetting/readme.md +CVE-2022-45521 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeUrlFilter/readme.md +CVE-2022-45522 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeClientFilter/readme.md +CVE-2022-45523 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/L7Im/readme.md +CVE-2022-45524 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/IPSECsave/readme.md +CVE-2022-45525 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/CertListInfo/readme.md +CVE-2022-45526 - https://github.com/Future-Depth/IMS/issues/1 +CVE-2022-45527 - https://github.com/Future-Depth/IMS/issues/2 +CVE-2022-45529 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/edit_post_post_category_id_sql_injection/edit_post_post_category_id_sql_injection.md +CVE-2022-4553 - https://wpscan.com/vulnerability/483ed482-a1d1-44f6-8b99-56e653d3e45f +CVE-2022-45535 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/update_categories_sql_injection/update_categories_sql_injection.md +CVE-2022-45535 - https://rdyx0.github.io/2018/09/06/AeroCMS-v0.0.1-SQLi%20update_categories_sql_injection/ +CVE-2022-45536 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_comments_sql_injection/post_comments_sql_injection.md +CVE-2022-45536 - https://rdyx0.github.io/2018/09/07/AeroCMS-v0.0.1-SQLi%20post_comments_sql_injection/ +CVE-2022-45537 - https://github.com/weng-xianhu/eyoucms/issues/34 +CVE-2022-45538 - https://github.com/weng-xianhu/eyoucms/issues/35 +CVE-2022-45539 - https://github.com/weng-xianhu/eyoucms/issues/38 +CVE-2022-45540 - https://github.com/weng-xianhu/eyoucms/issues/37 +CVE-2022-45541 - https://github.com/weng-xianhu/eyoucms/issues/36 +CVE-2022-45542 - https://github.com/weng-xianhu/eyoucms/issues/33 +CVE-2022-45543 - https://srpopty.github.io/2023/02/15/Vulnerability-Discuz-X3.4-Reflected-XSS-(CVE-2022-45543)/ +CVE-2022-45544 - https://blog.tristaomarinho.com/schlix-cms-2-2-7-2-arbitrary-file-upload/ +CVE-2022-45544 - https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md +CVE-2022-45546 - https://lgnas.gitbook.io/cve-2022-45546/ +CVE-2022-45557 - https://github.com/hundredrabbits/Left/issues/167 +CVE-2022-45558 - https://github.com/hundredrabbits/Left/issues/168 +CVE-2022-45562 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562 +CVE-2022-45586 - https://forum.xpdfreader.com/viewtopic.php?t=42361 +CVE-2022-45587 - https://forum.xpdfreader.com/viewtopic.php?t=42361 +CVE-2022-45598 - https://github.com/laurent22/joplin/commit/a2de167b95debad83a0f0c7925a88c0198db812e +CVE-2022-45598 - https://github.com/laurent22/joplin/releases/tag/v2.9.17 +CVE-2022-45599 - https://github.com/ethancunt/CVE-2022-45599 +CVE-2022-45600 - https://github.com/ethancunt/CVE-2022-45600 +CVE-2022-45613 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss +CVE-2022-45613 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e +CVE-2022-45614 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash +CVE-2022-4562 - https://wpscan.com/vulnerability/2013d79b-e9f6-4a5a-b421-e840a3bae063 +CVE-2022-45634 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45634 +CVE-2022-45635 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45635 +CVE-2022-45636 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636 +CVE-2022-45636 - https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co +CVE-2022-45637 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45637 +CVE-2022-45639 - http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html +CVE-2022-45639 - http://www.binaryworld.it/ +CVE-2022-45639 - https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639 +CVE-2022-45640 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6v1.0_vuln/Tenda%20AC6V1.0%20V15.03.05.19%20Stack%20overflow%20vulnerability.md +CVE-2022-45640 - https://vulncheck.com/blog/xiongmai-iot-exploitation +CVE-2022-45641 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetMacFilterCfg/formSetMacFilterCfg.md +CVE-2022-45643 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md +CVE-2022-45644 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md +CVE-2022-45645 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceMac/addWifiMacFilter_derviceMac.md +CVE-2022-45646 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeedUp/formSetClientState_limitSpeed.md +CVE-2022-45647 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md +CVE-2022-45648 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetDeviceName/formSetDeviceName.md +CVE-2022-45649 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_endIp/formSetPPTPServer_endIp.md +CVE-2022-45650 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetFirewallCfg/formSetFirewallCfg.md +CVE-2022-45651 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md +CVE-2022-45652 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_startIp/formSetPPTPServer_startIp.md +CVE-2022-45653 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromNatStaticSetting/fromNatStaticSetting_page.md +CVE-2022-45654 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_ssid/form_fast_setting_wifi_set_ssid.md +CVE-2022-45655 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_timeZone/form_fast_setting_wifi_set_timeZone.md +CVE-2022-45656 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetSysTime/fromSetSysTime.md +CVE-2022-45657 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetIpMacBind/fromSetIpMacBind.md +CVE-2022-45658 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedEndTime/setSchedWifi_schedEndTime.md +CVE-2022-45659 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetWirelessRepeat/fromSetWirelessRepeat.md +CVE-2022-4566 - https://gitee.com/y_project/RuoYi/issues/I65V2B +CVE-2022-4566 - https://github.com/luelueking/ruoyi-4.7.5-vuln-poc +CVE-2022-45660 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedStartTime/setSchedWifi_schedStartTime.md +CVE-2022-45661 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSmartPowerManagement/setSmartPowerManagement.md +CVE-2022-45663 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWifiMacFilterSet/formWifiMacFilterSet.md +CVE-2022-45664 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDget/formWifiMacFilterGet.md +CVE-2022-45665 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetCfm/formWifiMacFilterSet.md +CVE-2022-45666 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDset/formwrlSSIDset.md +CVE-2022-45667 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md +CVE-2022-45668 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolReboot/fromSysToolReboot.md +CVE-2022-45669 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formWifiMacFilterGet/formWifiMacFilterGet.md +CVE-2022-4567 - https://huntr.dev/bounties/1ac677c4-ec0a-4788-9465-51d9b6bd8fd2 +CVE-2022-45670 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formSetAutoPing_ping1/formSetAutoPing_ping1.md +CVE-2022-45671 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md +CVE-2022-45672 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWx3AuthorizeSet/formWx3AuthorizeSet.md +CVE-2022-45673 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolRestoreSet/fromSysToolRestoreSet.md +CVE-2022-45674 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolReboot/fromSysToolReboot.md +CVE-2022-45677 - https://github.com/yukar1z0e/temp/blob/main/README.md +CVE-2022-45685 - https://github.com/jettison-json/jettison/issues/54 +CVE-2022-45688 - https://github.com/stleary/JSON-java/issues/708 +CVE-2022-45690 - https://github.com/stleary/JSON-java/issues/654 +CVE-2022-45693 - https://github.com/jettison-json/jettison/issues/52 +CVE-2022-45697 - https://github.com/Wh04m1001/CVE +CVE-2022-45699 - https://www.youtube.com/watch?v=YNeeaDPJOBY +CVE-2022-4570 - https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef +CVE-2022-45701 - https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701 +CVE-2022-45703 - https://sourceware.org/bugzilla/show_bug.cgi?id=29799 +CVE-2022-45706 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SJZx0L0Sj +CVE-2022-45707 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HyEfIEpBj +CVE-2022-45708 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1rR3UArj +CVE-2022-45709 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BkFpXcsSs +CVE-2022-4571 - https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00 +CVE-2022-45710 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1XG-5iSo +CVE-2022-45711 - https://hackmd.io/dLM8vDnwQOup8mmDbHJRHQ?both +CVE-2022-45712 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/r1pG4cori +CVE-2022-45714 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/S1QhLw0Ss +CVE-2022-45715 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HkJ_o8Arj +CVE-2022-45716 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/rywHivCBo +CVE-2022-45717 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/By3Y6DRrj +CVE-2022-45718 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/Hkb38vELj +CVE-2022-45719 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJ8I_DCBi +CVE-2022-45720 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SkCD5PEUo +CVE-2022-45721 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJUfyuABo +CVE-2022-45748 - https://github.com/assimp/assimp/issues/4286 +CVE-2022-4576 - https://wpscan.com/vulnerability/0d679e0e-891b-44f1-ac7f-a766e12956e0 +CVE-2022-45768 - https://github.com/Erebua/CVE/blob/main/Edimax.md +CVE-2022-45768 - https://www.lovesandy.cc/2022/11/20/EDIMAX%E6%BC%8F%E6%B4%9E/ +CVE-2022-4577 - https://wpscan.com/vulnerability/85d9fad7-ba3d-4140-ae05-46262d2643e6 +CVE-2022-45770 - https://hackmag.com/security/aguard-cve/ +CVE-2022-45770 - https://xakep.ru/2023/01/27/aguard-cve/ +CVE-2022-45771 - https://github.com/pwndoc/pwndoc/issues/401 +CVE-2022-4578 - https://wpscan.com/vulnerability/fad16c68-9f14-4866-b241-40468fb71494 +CVE-2022-45781 - https://www.cnblogs.com/FALL3N/p/16813932.html +CVE-2022-4580 - https://wpscan.com/vulnerability/e54804c7-68a9-4c4c-94f9-1c3c9b97e8ca +CVE-2022-4584 - https://vuldb.com/?id.216170 +CVE-2022-45868 - https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243 +CVE-2022-45869 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15 +CVE-2022-45889 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45890 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45891 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45892 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45893 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45894 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45895 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/ +CVE-2022-45896 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/- +CVE-2022-45914 - http://packetstormsecurity.com/files/170177/Zhuhai-Suny-Technology-ESL-Tag-Forgery-Replay-Attacks.html +CVE-2022-45914 - http://seclists.org/fulldisclosure/2022/Dec/6 +CVE-2022-45915 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html +CVE-2022-45915 - http://seclists.org/fulldisclosure/2022/Dec/7 +CVE-2022-45915 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ +CVE-2022-45916 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html +CVE-2022-45916 - http://seclists.org/fulldisclosure/2022/Dec/7 +CVE-2022-45916 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ +CVE-2022-45917 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html +CVE-2022-45917 - http://seclists.org/fulldisclosure/2022/Dec/7 +CVE-2022-45917 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ +CVE-2022-45918 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html +CVE-2022-45918 - http://seclists.org/fulldisclosure/2022/Dec/7 +CVE-2022-45918 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/ +CVE-2022-45922 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html +CVE-2022-45922 - http://seclists.org/fulldisclosure/2023/Jan/14 +CVE-2022-45922 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ +CVE-2022-45923 - http://packetstormsecurity.com/files/170613/OpenText-Extended-ECM-22.3-cs.exe-Remote-Code-Execution.html +CVE-2022-45923 - http://seclists.org/fulldisclosure/2023/Jan/10 +CVE-2022-45923 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-in-csexe-opentext-server-component/ +CVE-2022-45924 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html +CVE-2022-45924 - http://seclists.org/fulldisclosure/2023/Jan/14 +CVE-2022-45924 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ +CVE-2022-45925 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html +CVE-2022-45925 - http://seclists.org/fulldisclosure/2023/Jan/14 +CVE-2022-45925 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ +CVE-2022-45926 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html +CVE-2022-45926 - http://seclists.org/fulldisclosure/2023/Jan/14 +CVE-2022-45926 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ +CVE-2022-45927 - http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html +CVE-2022-45927 - http://seclists.org/fulldisclosure/2023/Jan/13 +CVE-2022-45927 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ +CVE-2022-45928 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html +CVE-2022-45928 - http://seclists.org/fulldisclosure/2023/Jan/14 +CVE-2022-45928 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ +CVE-2022-45942 - https://github.com/This-is-Y/baijiacms-RCE +CVE-2022-45942 - https://this-is-y.xyz/2022/11/20/baijiacmsV4-RCE/ +CVE-2022-45956 - https://packetstormsecurity.com/files/169962/Boa-Web-Server-0.94.13-0.94.14-Authentication-Bypass.html +CVE-2022-45957 - https://packetstormsecurity.com/files/169949/ZTE-ZXHN-H108NS-Stack-Buffer-Overflow-Denial-Of-Service.html +CVE-2022-45957 - https://packetstormsecurity.com/files/169958/ZTE-ZXHN-H108NS-Authentication-Bypass.html +CVE-2022-4596 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-45962 - https://ccat.gitbook.io/cyber-sec/cve/cve-2022-45962-postauth-sqli +CVE-2022-4597 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-45977 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/3 +CVE-2022-45979 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/4 +CVE-2022-4598 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-45980 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/6 +CVE-2022-4599 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-45995 - https://github.com/bugfinder0/public_bug/tree/main/tenda/ax12/1 +CVE-2022-45996 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2 +CVE-2022-45997 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/1 +CVE-2022-4600 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-4601 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-4602 - https://seclists.org/fulldisclosure/2022/Dec/11 +CVE-2022-46047 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/categories_delete_sql_injection/categories_delete_sql_injection.md +CVE-2022-4605 - https://huntr.dev/bounties/df455d44-0dec-470c-b576-8ea86ec5a367 +CVE-2022-46051 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/view_all_comments_update/view_all_comments_update.MD +CVE-2022-46059 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-CSRF/add_user_csrf/add_user_csrf.md +CVE-2022-4606 - https://huntr.dev/bounties/3dab0466-c35d-4163-b3c7-a8666e2f7d95 +CVE-2022-46062 - https://github.com/rdyx0/CVE/blob/master/Gym%20Management%20System/CSRF/delete_user/delete_user.md +CVE-2022-46071 - https://yuyudhn.github.io/CVE-2022-46071/ +CVE-2022-46072 - https://yuyudhn.github.io/CVE-2022-46072/ +CVE-2022-46073 - https://yuyudhn.github.io/CVE-2022-46073/ +CVE-2022-46074 - https://www.youtube.com/watch?v=5Q3vyTo02bc&ab_channel=IkariShinji +CVE-2022-46074 - https://yuyudhn.github.io/CVE-2022-46074/ +CVE-2022-46076 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-869 +CVE-2022-46076 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46087 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-46087/poc.md +CVE-2022-46088 - https://packetstormsecurity.com +CVE-2022-4609 - https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce +CVE-2022-46093 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Hospital-Management-System/Hospital-Management-System.md +CVE-2022-46095 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc/covid-19-vaccination.md +CVE-2022-46096 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc2/covid-19-vaccination2.md +CVE-2022-4610 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-46109 - https://github.com/z1r00/IOT_Vul/tree/main/Tenda/AC10/formSetClientState +CVE-2022-4611 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-4612 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-4613 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html +CVE-2022-4613 - https://vuldb.com/?id.216275 +CVE-2022-46135 - https://github.com/MegaTKC/AeroCMS/issues/5 +CVE-2022-4614 - https://huntr.dev/bounties/8b429330-3096-4fe4-85e0-1a9143e4dca5 +CVE-2022-4615 - https://huntr.dev/bounties/9c66ece4-bcaa-417d-8b98-e8daff8a728b +CVE-2022-46152 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1 +CVE-2022-46161 - https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/ +CVE-2022-4617 - https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df +CVE-2022-46172 - https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5 +CVE-2022-46179 - https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf +CVE-2022-4621 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04 +CVE-2022-4622 - https://wpscan.com/vulnerability/ea055ed4-324d-4d77-826a-b6f814413eb2 +CVE-2022-4623 - https://wpscan.com/vulnerability/1b3201da-f254-406f-9b4a-cd5025b6b03d +CVE-2022-4624 - https://wpscan.com/vulnerability/e7dc0202-6be4-46fc-a451-fb3a25727b51 +CVE-2022-4625 - https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15 +CVE-2022-4626 - https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d +CVE-2022-4627 - https://wpscan.com/vulnerability/be9e8870-0682-441d-8955-d096d1346bd1 +CVE-2022-4628 - https://wpscan.com/vulnerability/6ae719da-c43c-4b3a-bb8a-efa1de20100a +CVE-2022-46280 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670 +CVE-2022-46289 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665 +CVE-2022-4629 - https://wpscan.com/vulnerability/cf0a51f9-21d3-4ae8-b7d2-361921038fe8 +CVE-2022-46290 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665 +CVE-2022-46291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 +CVE-2022-46292 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 +CVE-2022-46293 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 +CVE-2022-46294 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 +CVE-2022-46295 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666 +CVE-2022-4630 - https://huntr.dev/bounties/401661ee-40e6-4ee3-a925-3716b96ece5c +CVE-2022-4636 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01 +CVE-2022-46377 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 +CVE-2022-46378 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 +CVE-2022-46381 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-46381/CVE-2022-46381.txt +CVE-2022-46395 - http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html +CVE-2022-4640 - https://gitee.com/mingSoft/MCMS/issues/I65KI5 +CVE-2022-46407 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-46408 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-46428 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1hP34Hvj +CVE-2022-46430 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi +CVE-2022-46432 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/B1Vgv1uwo +CVE-2022-46434 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/rJl69Icws +CVE-2022-46435 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SyvnlO9Pi +CVE-2022-4644 - https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0 +CVE-2022-46440 - https://github.com/keepinggg/poc +CVE-2022-46440 - https://github.com/matthiaskramm/swftools/issues/194 +CVE-2022-46443 - https://www.youtube.com/watch?v=Dmjk6uOU8vY +CVE-2022-46443 - https://yuyudhn.github.io/CVE-2022-46443/ +CVE-2022-4645 - https://gitlab.com/libtiff/libtiff/-/issues/277 +CVE-2022-4646 - https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10 +CVE-2022-4647 - https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242 +CVE-2022-46475 - https://github.com/Insight8991/iot/blob/main/DIR-645%20genacgi%20Stack%20overflow.md +CVE-2022-46476 - https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md +CVE-2022-46478 - https://github.com/WeiYe-Jing/datax-web/issues/587 +CVE-2022-4648 - https://wpscan.com/vulnerability/9bbfb664-5b83-452b-82bb-562a1e18eb65 +CVE-2022-46485 - https://github.com/WodenSec/CVE-2022-46485 +CVE-2022-46486 - https://jovanbulck.github.io/files/ccs19-tale.pdf +CVE-2022-46489 - https://github.com/gpac/gpac/issues/2328 +CVE-2022-4649 - https://wpscan.com/vulnerability/0d9ba176-97be-4b6b-9cf1-6c3047321a1e +CVE-2022-46490 - https://github.com/gpac/gpac/issues/2327 +CVE-2022-46491 - https://github.com/Fanli2012/nbnbk/issues/2 +CVE-2022-4650 - https://wpscan.com/vulnerability/b430fdaa-191a-429e-b6d2-479b32bb1075 +CVE-2022-4651 - https://wpscan.com/vulnerability/d8182075-7472-48c8-8e9d-94b12ab6fcf6 +CVE-2022-4652 - https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc +CVE-2022-4653 - https://wpscan.com/vulnerability/fa44ed44-9dac-4b4f-aaa3-503b76034578 +CVE-2022-46530 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/GetParentControlInfo/GetParentControlInfo.md +CVE-2022-46531 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md +CVE-2022-46532 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceMac/addWifiMacFilter_deviceMac.md +CVE-2022-46533 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md +CVE-2022-46534 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetSpeedWan/formSetSpeedWan.md +CVE-2022-46535 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_deviceId/formSetClientState_deviceId.md +CVE-2022-46536 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeedUp/formSetClientState_limitSpeedUp.md +CVE-2022-46537 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security/formWifiBasicSet_security.md +CVE-2022-46538 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWriteFacMac/formWriteFacMac.md +CVE-2022-46539 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security%20_5g/formWifiBasicSet_security_5g.md +CVE-2022-4654 - https://wpscan.com/vulnerability/a29744cd-b760-4757-8564-883d59fa4881 +CVE-2022-46540 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_entrys/fromAddressNat_entrys.md +CVE-2022-46541 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/form_fast_setting_wifi_set/form_fast_setting_wifi_set.md +CVE-2022-46542 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_page/fromAddressNat_page.md +CVE-2022-46543 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_mitInterface/fromAddressNat_mitInterface.md +CVE-2022-46544 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formexeCommand/formexeCommand.md +CVE-2022-46545 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromNatStaticSetting/fromNatStaticSetting.md +CVE-2022-46546 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromRouteStatic/fromRouteStatic.md +CVE-2022-46547 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromVirtualSer/fromVirtualSer.md +CVE-2022-46548 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromDhcpListClient/fromDhcpListClient.md +CVE-2022-46549 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_deviceId/saveParentControlInfo_deviceId.md +CVE-2022-4655 - https://wpscan.com/vulnerability/a1c70c80-e952-4cc7-aca0-c2dde3fa08a9 +CVE-2022-46550 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md +CVE-2022-46551 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_time/saveParentControlInfo_time.md +CVE-2022-46552 - http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html +CVE-2022-46552 - https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e +CVE-2022-46552 - https://github.com/c2dc/cve-reported/blob/main/CVE-2022-46552/CVE-2022-46552.md +CVE-2022-46552 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4656 - https://wpscan.com/vulnerability/05976ed8-5a26-4eae-adb2-0ea3b2722391 +CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp +CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe +CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pptp +CVE-2022-46560 - https://hackmd.io/@0dayResearch/rkXr4BQPi +CVE-2022-46560 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_L2TP +CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPPoE +CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPTP +CVE-2022-46561 - https://hackmd.io/@0dayResearch/ry55QVQvj +CVE-2022-46561 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46562 - https://hackmd.io/@0dayResearch/B1C9jeXDi +CVE-2022-46562 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_PSK +CVE-2022-46562 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46563 - https://hackmd.io/@0dayResearch/HkDzZLCUo +CVE-2022-46563 - https://hackmd.io/@0dayResearch/SetDynamicDNSSettings +CVE-2022-46563 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46566 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_Password +CVE-2022-46566 - https://hackmd.io/@0dayResearch/SyhDme7wo +CVE-2022-46566 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46568 - https://hackmd.io/@0dayResearch/B1SZP0aIo +CVE-2022-46568 - https://hackmd.io/@0dayResearch/SetSysEmailSettings +CVE-2022-46568 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46569 - https://hackmd.io/@0dayResearch/SetWLanRadioSecurity +CVE-2022-46569 - https://hackmd.io/@0dayResearch/r1R6sWRUs +CVE-2022-46569 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4657 - https://wpscan.com/vulnerability/a90a413d-0e00-4da8-a339-d6cdfba70bb3 +CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp +CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe +CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pptp +CVE-2022-46570 - https://hackmd.io/@0dayResearch/r1zsTSmDs +CVE-2022-46570 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4658 - https://wpscan.com/vulnerability/c7a17eb9-2811-45ba-bab3-f53b2fa7d051 +CVE-2022-46581 - https://brief-nymphea-813.notion.site/Vul5-TEW755-bof-tools_nslookup-c83bac14fe0f4f729535053459479fd1 +CVE-2022-46603 - https://github.com/10cks/inkdropPoc +CVE-2022-46604 - http://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html +CVE-2022-46604 - https://medium.com/@_sadshade/file-extention-bypass-in-responsive-filemanager-9-5-5-leading-to-rce-authenticated-3290eddc54e7 +CVE-2022-4661 - https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f +CVE-2022-46631 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6 +CVE-2022-46634 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7 +CVE-2022-46637 - https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.html +CVE-2022-46637 - https://prolink2u.com/product/prs1841/ +CVE-2022-46639 - https://ia-informatica.com/it/CVE-2022-46639 +CVE-2022-4664 - https://wpscan.com/vulnerability/d6a9cfaa-d3fa-442e-a9a1-b06588723e39 +CVE-2022-46640 - https://pwning.tech/cve-2022-46640/ +CVE-2022-46641 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetIpMacBindSettings%20Command%20Injection%20Vulnerability.md +CVE-2022-46641 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-46642 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetAutoUpgradeInfo%20command%20injection%20vulnerability.md +CVE-2022-46642 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4665 - https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f +CVE-2022-4666 - https://wpscan.com/vulnerability/a6d23f2f-9504-40da-9b71-189033d8bd1d +CVE-2022-4667 - https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d +CVE-2022-4668 - https://wpscan.com/vulnerability/3e43156a-b784-4066-be69-23b139aafbad +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/24 +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/25 +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-4669 - https://wpscan.com/vulnerability/79f011e4-3422-4307-8736-f27048796aae +CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-46697 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-4670 - https://wpscan.com/vulnerability/2a67c290-2a27-44fe-95ae-2d427e9d7548 +CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/21 +CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/27 +CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/28 +CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/23 +CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/26 +CVE-2022-46702 - http://seclists.org/fulldisclosure/2022/Dec/20 +CVE-2022-4671 - https://wpscan.com/vulnerability/14c83830-3207-4f92-b8f5-afd7cc93af88 +CVE-2022-4672 - https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d +CVE-2022-4673 - https://wpscan.com/vulnerability/1c4f379d-252a-487b-81c9-bf711ab71dff +CVE-2022-4674 - https://wpscan.com/vulnerability/eda64678-81ae-4be3-941e-a1e26e54029b +CVE-2022-46741 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md +CVE-2022-4675 - https://wpscan.com/vulnerability/21f4cc5d-c4b4-495f-acf3-9fdf53591052 +CVE-2022-4676 - https://wpscan.com/vulnerability/1df3c17c-990d-4074-b1d5-b26da880d88e +CVE-2022-46764 - https://vuldb.com/?diff.216845 +CVE-2022-4677 - https://wpscan.com/vulnerability/9c293098-de54-4a04-b13d-2a702200f02e +CVE-2022-46770 - http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html +CVE-2022-46770 - https://github.com/mirage/qubes-mirage-firewall/issues/166 +CVE-2022-4678 - https://wpscan.com/vulnerability/6a36d665-a0ca-4346-8e55-cf9ba45966cc +CVE-2022-46786 - https://support.squaredup.com +CVE-2022-4679 - https://wpscan.com/vulnerability/c817c4af-cff2-4720-944d-c59e27544d41 +CVE-2022-4680 - https://wpscan.com/vulnerability/f4197386-975d-4e53-8fc9-9425732da9af +CVE-2022-4681 - https://wpscan.com/vulnerability/5a4096e8-abe4-41c4-b741-c44e740e8689 +CVE-2022-4682 - https://wpscan.com/vulnerability/5fc92954-20cf-4563-806e-e7a8e5ccfc72 +CVE-2022-4683 - https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef +CVE-2022-4686 - https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637 +CVE-2022-4687 - https://huntr.dev/bounties/b908377f-a61b-432c-8e6a-c7498da69788 +CVE-2022-46874 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746139 +CVE-2022-46875 - https://bugzilla.mozilla.org/show_bug.cgi?id=1786188 +CVE-2022-46887 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities +CVE-2022-46888 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities +CVE-2022-46889 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities +CVE-2022-4689 - https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3 +CVE-2022-46890 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities +CVE-2022-4690 - https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335 +CVE-2022-4691 - https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f +CVE-2022-46910 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BkwzORiDo +CVE-2022-46912 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/Sk6sfbTPi +CVE-2022-46914 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJ4czlpwi +CVE-2022-4692 - https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74 +CVE-2022-4693 - https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea +CVE-2022-46934 - https://github.com/kekingcn/kkFileView/issues/411 +CVE-2022-4694 - https://huntr.dev/bounties/a4d865c2-1a2b-4e3a-aaae-915b0dfc3f22 +CVE-2022-4695 - https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789 +CVE-2022-46957 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tracking.zip +CVE-2022-46965 - https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-hg7m-23j3-rf56 +CVE-2022-46966 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html +CVE-2022-46967 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html +CVE-2022-46968 - https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html +CVE-2022-4699 - https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9 +CVE-2022-47027 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2022-47027/CVE%20detail.md +CVE-2022-47028 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47028/CVE%20detailed.md +CVE-2022-47029 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md +CVE-2022-47035 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-47036 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html +CVE-2022-47037 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html +CVE-2022-4706 - https://wpscan.com/vulnerability/30882a45-ca03-4ff1-a36d-758d9b9b641c +CVE-2022-47065 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/01/README.md +CVE-2022-47069 - https://sourceforge.net/p/p7zip/bugs/241/ +CVE-2022-47070 - https://github.com/Sylon001/NVS-365-Camera/tree/master/NVS365%20Network%20Video%20Server%20Password%20Information%20Unauthorized%20Access%20Vulnerability +CVE-2022-47072 - https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection +CVE-2022-47073 - https://medium.com/@shiva.infocop/stored-xss-found-in-small-crm-phpgurukul-7890ea3c04df +CVE-2022-47073 - https://packetstormsecurity.com +CVE-2022-47075 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html +CVE-2022-47075 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/ +CVE-2022-47076 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html +CVE-2022-47076 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/ +CVE-2022-47083 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5720.php +CVE-2022-47085 - https://doc.rust-lang.org/std/macro.eprintln.html +CVE-2022-47086 - https://github.com/gpac/gpac/issues/2337 +CVE-2022-47087 - https://github.com/gpac/gpac/issues/2339 +CVE-2022-47088 - https://github.com/gpac/gpac/issues/2340 +CVE-2022-47089 - https://github.com/gpac/gpac/issues/2338 +CVE-2022-47091 - https://github.com/gpac/gpac/issues/2343 +CVE-2022-47092 - https://github.com/gpac/gpac/issues/2347 +CVE-2022-47093 - https://github.com/gpac/gpac/issues/2344 +CVE-2022-47094 - https://github.com/gpac/gpac/issues/2345 +CVE-2022-47095 - https://github.com/gpac/gpac/issues/2346 +CVE-2022-47102 - https://github.com/sudoninja-noob/CVE-2022-47102/blob/main/CVE-2022-47102 +CVE-2022-47130 - https://portswigger.net/web-security/csrf +CVE-2022-47130 - https://xpsec.co/blog/academy-lms-5-10-coupon-csrf +CVE-2022-47131 - https://portswigger.net/web-security/csrf +CVE-2022-47131 - https://portswigger.net/web-security/csrf/xss-vs-csrf +CVE-2022-47131 - https://xpsec.co/blog/academy-lms-5-10-add-page-csrf-xss +CVE-2022-47132 - https://portswigger.net/web-security/csrf +CVE-2022-47132 - https://xpsec.co/blog/academy-lms-5-10-add-admin-csrf +CVE-2022-4714 - https://wpscan.com/vulnerability/61b475f1-bbfb-4450-a3b2-b8caf5df2340 +CVE-2022-4715 - https://wpscan.com/vulnerability/4394fe86-4240-4454-b724-81464b04123a +CVE-2022-4716 - https://wpscan.com/vulnerability/24176ad3-2317-4853-b4db-8394384d52cd +CVE-2022-4717 - https://wpscan.com/vulnerability/14b679f5-44a8-46d4-89dd-94eb647cb672 +CVE-2022-4718 - https://wpscan.com/vulnerability/04d7cd44-9e18-42b9-9f79-cc9cd6980526 +CVE-2022-4719 - https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09 +CVE-2022-47194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 +CVE-2022-47195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 +CVE-2022-47196 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 +CVE-2022-47197 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686 +CVE-2022-4720 - https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70 +CVE-2022-4721 - https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720 +CVE-2022-4722 - https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58 +CVE-2022-4723 - https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c +CVE-2022-4724 - https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445 +CVE-2022-4730 - https://vuldb.com/?id.216744 +CVE-2022-4732 - https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa +CVE-2022-4733 - https://huntr.dev/bounties/f353adfb-e5b8-43e7-957a-894670fd4ccd +CVE-2022-4737 - https://vuldb.com/?id.216773 +CVE-2022-4744 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html +CVE-2022-4745 - https://wpscan.com/vulnerability/9703f42e-bdfe-4787-92c9-47963d9af425 +CVE-2022-4746 - https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32 +CVE-2022-4747 - https://wpscan.com/vulnerability/004f1872-1576-447f-8837-f29fa319cbdc +CVE-2022-4749 - https://wpscan.com/vulnerability/8afc3b2a-81e5-4b6f-8f4c-c48492843569 +CVE-2022-4750 - https://wpscan.com/vulnerability/7bdc1324-8d08-4185-971f-8d49367702cf +CVE-2022-47502 - https://www.openoffice.org/security/cves/CVE-2022-47502.html +CVE-2022-4751 - https://wpscan.com/vulnerability/dd5cc04a-042d-402a-ab7a-96aff3d57478 +CVE-2022-47514 - https://github.com/jumpycastle/xmlrpc.net-poc +CVE-2022-4752 - https://wpscan.com/vulnerability/309799dd-dea7-489d-8d18-b6014534f5af +CVE-2022-47529 - http://seclists.org/fulldisclosure/2023/Mar/26 +CVE-2022-47529 - http://seclists.org/fulldisclosure/2024/Apr/17 +CVE-2022-47529 - https://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt +CVE-2022-47529 - https://packetstormsecurity.com/files/171476/RSA-NetWitness-Endpoint-EDR-Agent-12.x-Incorrect-Access-Control-Code-Execution.html +CVE-2022-4753 - https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126 +CVE-2022-47531 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-47532 - https://herolab.usd.de/security-advisories/usd-2022-0064/ +CVE-2022-4754 - https://wpscan.com/vulnerability/d2cc0ab2-9bfd-4a09-ac31-bd90e6da12db +CVE-2022-47547 - https://arxiv.org/pdf/2212.05197.pdf +CVE-2022-4756 - https://wpscan.com/vulnerability/d67b0f7a-fdb1-4305-9976-c5f77b0e3b61 +CVE-2022-4757 - https://wpscan.com/vulnerability/30211ffd-8751-4354-96d3-69b0106100b1 +CVE-2022-47577 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a +CVE-2022-47578 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a +CVE-2022-4758 - https://wpscan.com/vulnerability/c2c89234-5e9c-47c8-9827-8ab0b10fb7d6 +CVE-2022-47583 - https://dgl.cx/2023/09/ansi-terminal-security#mintty +CVE-2022-4759 - https://wpscan.com/vulnerability/63328927-5614-4fa1-8f46-46ff0c8eb959 +CVE-2022-4760 - https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d +CVE-2022-4761 - https://wpscan.com/vulnerability/ad163020-8b9c-42cb-a55f-b137b224bafb +CVE-2022-4762 - https://wpscan.com/vulnerability/4500566a-e5f2-40b8-a185-2bcace221b4e +CVE-2022-4763 - https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5 +CVE-2022-47630 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html +CVE-2022-47631 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html +CVE-2022-47631 - http://seclists.org/fulldisclosure/2023/Sep/6 +CVE-2022-47631 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-002.txt +CVE-2022-47632 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html +CVE-2022-47632 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html +CVE-2022-47632 - http://seclists.org/fulldisclosure/2023/Sep/6 +CVE-2022-47632 - https://syss.de +CVE-2022-47632 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt +CVE-2022-47635 - https://wildix.atlassian.net/wiki/spaces/DOC/pages/30279136/Changelogs +CVE-2022-47636 - http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html +CVE-2022-47636 - https://www.exploit-db.com/exploits/51678 +CVE-2022-4764 - https://wpscan.com/vulnerability/788c6aa2-14cc-411f-95e8-5994f8c82d70 +CVE-2022-4765 - https://wpscan.com/vulnerability/a21dc4a3-a4f3-4619-b8a3-493a27e14ccb +CVE-2022-47653 - https://github.com/gpac/gpac/issues/2349 +CVE-2022-47654 - https://github.com/gpac/gpac/issues/2350 +CVE-2022-47655 - https://github.com/strukturag/libde265/issues/367 +CVE-2022-47656 - https://github.com/gpac/gpac/issues/2353 +CVE-2022-47657 - https://github.com/gpac/gpac/issues/2355 +CVE-2022-47658 - https://github.com/gpac/gpac/issues/2356 +CVE-2022-47659 - https://github.com/gpac/gpac/issues/2354 +CVE-2022-47660 - https://github.com/gpac/gpac/issues/2357 +CVE-2022-47661 - https://github.com/gpac/gpac/issues/2358 +CVE-2022-47662 - https://github.com/gpac/gpac/issues/2359 +CVE-2022-47663 - https://github.com/gpac/gpac/issues/2360 +CVE-2022-47664 - https://github.com/strukturag/libde265/issues/368 +CVE-2022-47665 - https://github.com/strukturag/libde265/issues/369 +CVE-2022-47673 - https://sourceware.org/bugzilla/show_bug.cgi?id=29876 +CVE-2022-4769 - https://support.pentaho.com/hc/en-us/articles/14452244712589--Resolved-Pentaho-BA-Server-Generation-of-Error-Message-Containing-Sensitive-Information-Versions-before-9-4-0-0-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-4769- +CVE-2022-47695 - https://sourceware.org/bugzilla/show_bug.cgi?id=29846 +CVE-2022-47696 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677 +CVE-2022-47732 - https://www.swascan.com/security-advisory-yeastar-n412-and-n824-configuration-panel/ +CVE-2022-4774 - https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e +CVE-2022-4775 - https://wpscan.com/vulnerability/5ab3fc58-7d1c-4bcd-8bbd-86c62a3f979c +CVE-2022-47758 - https://pwning.tech/cve-2022-47758 +CVE-2022-47758 - https://pwning.tech/cve-2022-47758/ +CVE-2022-4776 - https://wpscan.com/vulnerability/d5ea8f7f-7d5a-4b2e-a070-a9aef7cac58a +CVE-2022-47767 - https://www.swascan.com/security-advisory-solar-log/ +CVE-2022-47768 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ +CVE-2022-47769 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ +CVE-2022-4777 - https://wpscan.com/vulnerability/b4c53bef-e868-46f1-965d-720b5b9a931e +CVE-2022-47770 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/ +CVE-2022-4781 - https://wpscan.com/vulnerability/a2803027-b822-4bf9-8d1d-6f538681af9d +CVE-2022-4782 - https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5 +CVE-2022-4783 - https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252 +CVE-2022-4784 - https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9 +CVE-2022-4785 - https://wpscan.com/vulnerability/61873267-9f4f-4be5-bad6-95229ad54b99 +CVE-2022-47853 - https://github.com/Am1ngl/ttt/tree/main/16 +CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155 +CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155#issue-1501906608 +CVE-2022-4786 - https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0 +CVE-2022-4787 - https://wpscan.com/vulnerability/2ab59972-ccfd-48f6-b879-58fb38823ca5 +CVE-2022-47870 - https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html +CVE-2022-47873 - https://fordefence.com/cve-2022-47873-keos-software-xx/ +CVE-2022-47874 - http://packetstormsecurity.com/files/172156/Jedox-2020.2.5-Database-Credential-Disclosure.html +CVE-2022-47875 - http://packetstormsecurity.com/files/172152/Jedox-2022.4.2-Directory-Traversal-Remote-Code-Execution.html +CVE-2022-47876 - http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html +CVE-2022-47877 - http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html +CVE-2022-47878 - http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html +CVE-2022-4788 - https://wpscan.com/vulnerability/2a162365-5a86-423d-b7c4-55c9b4d8b024 +CVE-2022-47881 - https://www.foxit.com/support/security-bulletins.html +CVE-2022-4789 - https://wpscan.com/vulnerability/5e816e9a-84e5-42d2-a7ff-e46be9072278 +CVE-2022-4790 - https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1 +CVE-2022-4791 - https://wpscan.com/vulnerability/0a6e4c45-3f6d-4150-9546-141c2e3a1782 +CVE-2022-4792 - https://wpscan.com/vulnerability/13304aca-0722-4bd9-b443-a5fed1ce22da +CVE-2022-47924 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json +CVE-2022-47925 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json +CVE-2022-47929 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407 +CVE-2022-4793 - https://wpscan.com/vulnerability/00c34ba8-b82e-4bb9-90b1-1afefae75948 +CVE-2022-47930 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b +CVE-2022-47931 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b +CVE-2022-47938 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 +CVE-2022-47939 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 +CVE-2022-4794 - https://wpscan.com/vulnerability/feb4580d-df15-45c8-b59e-ad406e4b064c +CVE-2022-47940 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18 +CVE-2022-47941 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 +CVE-2022-47942 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 +CVE-2022-47943 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2 +CVE-2022-47949 - https://github.com/PabloMK7/ENLBufferPwn +CVE-2022-4795 - https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639 +CVE-2022-4796 - https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6 +CVE-2022-47966 - http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html +CVE-2022-47966 - http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html +CVE-2022-47966 - http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html +CVE-2022-47966 - https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis +CVE-2022-47966 - https://github.com/horizon3ai/CVE-2022-47966 +CVE-2022-47966 - https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/ +CVE-2022-4797 - https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b +CVE-2022-4798 - https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae +CVE-2022-47986 - http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html +CVE-2022-4799 - https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79 +CVE-2022-4800 - https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8 +CVE-2022-48006 - https://github.com/taogogo/taocms/issues/35 +CVE-2022-4801 - https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593 +CVE-2022-48011 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-sql%20injection%20in%20viewerrors-importID.md +CVE-2022-48012 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Reflected%20XSS%20in%20onChangeTag.md +CVE-2022-48013 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md +CVE-2022-48019 - https://github.com/kkent030315/CVE-2022-42046 +CVE-2022-4802 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956 +CVE-2022-4803 - https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286 +CVE-2022-4805 - https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873 +CVE-2022-4806 - https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be +CVE-2022-48063 - https://sourceware.org/bugzilla/show_bug.cgi?id=29924 +CVE-2022-48064 - https://sourceware.org/bugzilla/show_bug.cgi?id=29922 +CVE-2022-48065 - https://sourceware.org/bugzilla/show_bug.cgi?id=29925 +CVE-2022-4807 - https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954 +CVE-2022-48078 - https://github.com/zrax/pycdc/issues/295 +CVE-2022-48079 - https://thanatosxingyu.github.io/ +CVE-2022-4808 - https://huntr.dev/bounties/11877cbf-fcaf-42ef-813e-502c7293f2b5 +CVE-2022-48085 - http://google.com +CVE-2022-4809 - https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29 +CVE-2022-48090 - https://github.com/tramyardg/hotel-mgmt-system/issues/21 +CVE-2022-48091 - https://github.com/tramyardg/hotel-mgmt-system/issues/22 +CVE-2022-4810 - https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e +CVE-2022-48107 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20IPAddress +CVE-2022-48107 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-48108 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20Netmask +CVE-2022-48108 - https://www.dlink.com/en/security-bulletin/ +CVE-2022-4811 - https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c +CVE-2022-48110 - https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html +CVE-2022-48111 - https://devisions.github.io/blog/cve-2022-48111 +CVE-2022-48111 - https://labs.yarix.com/2023/02/siri-wi400-xss-on-login-page-cve-2022-48111/ +CVE-2022-48113 - https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html +CVE-2022-48114 - https://gitee.com/y_project/RuoYi/issues/I65V2B +CVE-2022-48116 - https://github.com/loadream/AyaCMS/issues/10 +CVE-2022-4812 - https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c +CVE-2022-48121 - https://github.com/Am1ngl/ttt/tree/main/16 +CVE-2022-48122 - https://github.com/Am1ngl/ttt/tree/main/17 +CVE-2022-48123 - https://github.com/Am1ngl/ttt/tree/main/15 +CVE-2022-48124 - https://github.com/Am1ngl/ttt/tree/main/14 +CVE-2022-48125 - https://github.com/Am1ngl/ttt/tree/main/13 +CVE-2022-48126 - https://github.com/Am1ngl/ttt/tree/main/12 +CVE-2022-4813 - https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc +CVE-2022-48130 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md +CVE-2022-4814 - https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4 +CVE-2022-48150 - https://github.com/sahilop123/-CVE-2022-48150 +CVE-2022-48164 - https://docs.google.com/document/d/1JgqpBYRxyU0WKDSqkvi4Yo0723k7mrIUeuH9i1eEs8U/edit?usp=sharing +CVE-2022-48164 - https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WN533A8.md +CVE-2022-48177 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html +CVE-2022-48178 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html +CVE-2022-48194 - http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html +CVE-2022-48196 - https://www.bleepingcomputer.com/news/security/netgear-warns-users-to-patch-recently-fixed-wifi-router-bug/ +CVE-2022-48197 - http://packetstormsecurity.com/files/171633/Yahoo-User-Interface-TreeView-2.8.2-Cross-Site-Scripting.html +CVE-2022-48199 - https://giuliamelottigaribaldi.com/cve-2022-48199/ +CVE-2022-48216 - https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae +CVE-2022-4824 - https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0 +CVE-2022-4825 - https://wpscan.com/vulnerability/a2758983-d3a7-4718-b5b8-30169df6780a +CVE-2022-48251 - https://eshard.com/posts/sca-attacks-on-armv8 +CVE-2022-48252 - https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r +CVE-2022-48253 - https://www.soteritsecurity.com/blog/2023/01/nostromo_from_directory_traversal_to_RCE.html +CVE-2022-4826 - https://wpscan.com/vulnerability/59fa32d2-aa66-4980-9ee5-0a7513f3a2b0 +CVE-2022-4827 - https://wpscan.com/vulnerability/f2a922ac-6bc9-4caa-b1cc-9ca9cff4bd51 +CVE-2022-4828 - https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948 +CVE-2022-48281 - https://gitlab.com/libtiff/libtiff/-/issues/488 +CVE-2022-4829 - https://wpscan.com/vulnerability/57e528ce-ec8c-4734-8903-926be36f91e7 +CVE-2022-4830 - https://wpscan.com/vulnerability/ae103336-a411-4ebf-a5f0-2f35701e364c +CVE-2022-48303 - https://savannah.gnu.org/bugs/?62387 +CVE-2022-48306 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-09.md +CVE-2022-48307 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md +CVE-2022-48308 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md +CVE-2022-4831 - https://wpscan.com/vulnerability/872fc8e6-4035-4e5a-9f30-16c482c48c7c +CVE-2022-48311 - https://github.com/swzhouu/CVE-2022-48311 +CVE-2022-4832 - https://wpscan.com/vulnerability/735a33e1-63fb-4f17-812c-3e68709b5c2c +CVE-2022-48323 - https://asec.ahnlab.com/en/47088/ +CVE-2022-4833 - https://wpscan.com/vulnerability/35ba38cf-4f23-4344-8de3-cf3004ebf84c +CVE-2022-48331 - https://cyberintel.es/cve/CVE-2022-48331_Buffer_Overflow_in_Widevine_drm_save_keys_0x69b0/ +CVE-2022-48332 - https://cyberintel.es/cve/CVE-2022-48332_Buffer_Overflow_in_Widevine_drm_save_keys_0x6a18/ +CVE-2022-48333 - https://cyberintel.es/cve/CVE-2022-48333_Buffer_Overflow_in_Widevine_drm_verify_keys_0x730c/ +CVE-2022-48334 - https://cyberintel.es/cve/CVE-2022-48334_Buffer_Overflow_in_Widevine_drm_verify_keys_0x7370/ +CVE-2022-48335 - https://cyberintel.es/cve/CVE-2022-48335_Buffer_Overflow_in_Widevine_PRDiagVerifyProvisioning_0x5f90/ +CVE-2022-48336 - https://cyberintel.es/cve/CVE-2022-48336_Buffer_Overflow_in_Widevine_PRDiagParseAndStoreData_0x5cc8/ +CVE-2022-4834 - https://wpscan.com/vulnerability/6183318f-0230-47a1-87f2-3c5aaef678a5 +CVE-2022-4835 - https://wpscan.com/vulnerability/23c22f46-19a2-4a1a-aaef-0a4007eda031 +CVE-2022-4836 - https://wpscan.com/vulnerability/e9a228dc-d32e-4918-898d-4d7af4662a14 +CVE-2022-4837 - https://wpscan.com/vulnerability/41abeacb-ef3e-4621-89bb-df0f2eb617da +CVE-2022-4838 - https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc +CVE-2022-4839 - https://huntr.dev/bounties/ad954cab-f026-4895-8003-99f5e3b507ed +CVE-2022-4840 - https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01 +CVE-2022-4841 - https://huntr.dev/bounties/fa46b3ef-c621-443a-be3a-0a83fb78ba62 +CVE-2022-4843 - https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f +CVE-2022-4844 - https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3 +CVE-2022-4845 - https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b +CVE-2022-4846 - https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3 +CVE-2022-4847 - https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73 +CVE-2022-4848 - https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc +CVE-2022-48482 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 +CVE-2022-48483 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 +CVE-2022-4849 - https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c +CVE-2022-4850 - https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346 +CVE-2022-48502 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 +CVE-2022-48506 - https://dvsorder.org +CVE-2022-48506 - https://freedom-to-tinker.com/2023/06/14/security-analysis-of-the-dominion-imagecast-x/ +CVE-2022-4851 - https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f +CVE-2022-48545 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42092 +CVE-2022-48547 - https://github.com/Cacti/cacti/issues/1882 +CVE-2022-4855 - https://github.com/joinia/webray.com.cn/blob/main/lead-management-system/leadmanasql.md +CVE-2022-48554 - https://bugs.astron.com/view.php?id=310 +CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/Modbus%20Slave%20(version%207.5.1%20and%20earlier)%20mbs%20file%20has%20a%20buffer%20overflow%20vulnerability.md +CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/poc/poc.mbs +CVE-2022-4856 - https://vuldb.com/?id.217021 +CVE-2022-48560 - https://bugs.python.org/issue39421 +CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md +CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp +CVE-2022-48579 - https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee +CVE-2022-48580 - https://www.securifera.com/advisories/cve-2022-48580/ +CVE-2022-48581 - https://www.securifera.com/advisories/cve-2022-48581/ +CVE-2022-48582 - https://www.securifera.com/advisories/cve-2022-48582/ +CVE-2022-48583 - https://www.securifera.com/advisories/cve-2022-48583/ +CVE-2022-48584 - https://www.securifera.com/advisories/cve-2022-48584/ +CVE-2022-48585 - https://www.securifera.com/advisories/cve-2022-48585/ +CVE-2022-48586 - https://www.securifera.com/advisories/cve-2022-48586/ +CVE-2022-48587 - https://www.securifera.com/advisories/cve-2022-48587/ +CVE-2022-48588 - https://www.securifera.com/advisories/cve-2022-48588/ +CVE-2022-48589 - https://www.securifera.com/advisories/cve-2022-48589/ +CVE-2022-48590 - https://www.securifera.com/advisories/cve-2022-48590/ +CVE-2022-48591 - https://www.securifera.com/advisories/cve-2022-48591/ +CVE-2022-48592 - https://www.securifera.com/advisories/cve-2022-48592/ +CVE-2022-48593 - https://www.securifera.com/advisories/cve-2022-48593/ +CVE-2022-48594 - https://www.securifera.com/advisories/cve-2022-48594/ +CVE-2022-48595 - https://www.securifera.com/advisories/cve-2022-48595/ +CVE-2022-48596 - https://www.securifera.com/advisories/cve-2022-48596/ +CVE-2022-48597 - https://www.securifera.com/advisories/cve-2022-48597/ +CVE-2022-48598 - https://www.securifera.com/advisories/cve-2022-48598/ +CVE-2022-48599 - https://www.securifera.com/advisories/cve-2022-48599/ +CVE-2022-48600 - https://www.securifera.com/advisories/cve-2022-48600/ +CVE-2022-48601 - https://www.securifera.com/advisories/cve-2022-48601/ +CVE-2022-48602 - https://www.securifera.com/advisories/cve-2022-48602/ +CVE-2022-48603 - https://www.securifera.com/advisories/cve-2022-48603/ +CVE-2022-48604 - https://www.securifera.com/advisories/cve-2022-48604/ +CVE-2022-48612 - https://blog.zerdle.net/classlink/ +CVE-2022-48615 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/ +CVE-2022-48616 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/ +CVE-2022-48619 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10 +CVE-2022-48622 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 +CVE-2022-4863 - https://huntr.dev/bounties/42751929-e511-49a9-888d-d5b610da2a45 +CVE-2022-4864 - https://huntr.dev/bounties/b7140709-8f84-4f19-9463-78669fa2175b +CVE-2022-4865 - https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be +CVE-2022-4866 - https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff +CVE-2022-4867 - https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa +CVE-2022-4868 - https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b +CVE-2022-48682 - https://bugzilla.suse.com/show_bug.cgi?id=1200381 +CVE-2022-4872 - https://wpscan.com/vulnerability/c76a1c0b-8a5b-4639-85b6-9eebc63c3aa6 +CVE-2022-4882 - https://vuldb.com/?id.217664 +CVE-2022-4888 - https://wpscan.com/vulnerability/2c2379d0-e373-4587-a747-429d7ee8f6cc +CVE-2022-4891 - https://vuldb.com/?id.218452 +CVE-2022-4897 - https://wpscan.com/vulnerability/7b0eeafe-b9bc-43b2-8487-a23d3960f73f +CVE-2022-4944 - https://github.com/kalcaddle/KodExplorer/issues/512 +CVE-2022-4944 - https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file +CVE-2022-4946 - https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0 +CVE-2022-4953 - http://packetstormsecurity.com/files/174550/WordPress-Elementor-Iframe-Injection.html +CVE-2022-4953 - https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7 +CVE-2022-4956 - https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/ +CVE-2022-4964 - https://bugs.launchpad.net/ubuntu/+source/pipewire/+bug/1995707/ +CVE-2023-0005 - https://security.paloaltonetworks.com/CVE-2023-0005 +CVE-2023-0012 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0016 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0017 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0018 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0019 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0020 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0021 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0022 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0024 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0025 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-0028 - https://huntr.dev/bounties/bfd935f4-2d1d-4d3f-8b59-522abe7dd065 +CVE-2023-0029 - https://vuldb.com/?id.217169 +CVE-2023-0045 - https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8 +CVE-2023-0046 - https://huntr.dev/bounties/2214dc41-f283-4342-95b1-34a2f4fea943 +CVE-2023-0048 - https://huntr.dev/bounties/57abd666-4b9c-4f59-825d-1ec832153e79 +CVE-2023-0049 - https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9 +CVE-2023-0051 - https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9 +CVE-2023-0054 - https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d +CVE-2023-0055 - https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce +CVE-2023-0057 - https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d +CVE-2023-0099 - http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html +CVE-2023-0106 - https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb +CVE-2023-0107 - https://huntr.dev/bounties/0b28fa57-acb0-47c8-ac48-962ff3898156 +CVE-2023-0108 - https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944 +CVE-2023-0111 - https://huntr.dev/bounties/70da256c-977a-487e-8a6a-9ae22caedbe3 +CVE-2023-0112 - https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6 +CVE-2023-0113 - https://vuldb.com/?id.217591 +CVE-2023-0114 - https://vuldb.com/?id.217592 +CVE-2023-0122 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168 +CVE-2023-0125 - https://vuldb.com/?id.217717 +CVE-2023-0155 - https://gitlab.com/gitlab-org/gitlab/-/issues/387638 +CVE-2023-0160 - https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/ +CVE-2023-0164 - https://fluidattacks.com/advisories/queen/ +CVE-2023-0179 - http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html +CVE-2023-0179 - https://seclists.org/oss-sec/2023/q1/20 +CVE-2023-0210 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit +CVE-2023-0210 - https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/ +CVE-2023-0210 - https://www.openwall.com/lists/oss-security/2023/01/04/1 +CVE-2023-0214 - https://kcm.trellix.com/corporate/index?page=content&id=SB10393 +CVE-2023-0221 - https://kcm.trellix.com/corporate/index?page=content&id=SB10370 +CVE-2023-0227 - https://huntr.dev/bounties/af3101d7-fea6-463a-b7e4-a48be219e31b +CVE-2023-0236 - https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8 +CVE-2023-0243 - https://github.com/yeyinshi/tuzicms/issues/12 +CVE-2023-0244 - https://github.com/yeyinshi/tuzicms/issues/13 +CVE-2023-0244 - https://vuldb.com/?id.218152 +CVE-2023-0247 - https://huntr.dev/bounties/cab50e44-0995-4ac1-a5d5-889293b9704f +CVE-2023-0285 - https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348 +CVE-2023-0288 - https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3 +CVE-2023-0289 - https://huntr.dev/bounties/b9584c87-60e8-4a03-9e79-5f1e2d595361 +CVE-2023-0291 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt +CVE-2023-0292 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt +CVE-2023-0297 - http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html +CVE-2023-0297 - http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html +CVE-2023-0297 - https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65 +CVE-2023-0298 - https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed +CVE-2023-0299 - https://huntr.dev/bounties/0049774b-1857-46dc-a834-f1fb15138c53 +CVE-2023-0300 - https://huntr.dev/bounties/0a91fec7-a76e-4ca3-80ba-81de1f10d59d +CVE-2023-0301 - https://huntr.dev/bounties/8a91e127-2903-4c6b-9a66-e4d2e30f8dec +CVE-2023-0302 - https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e +CVE-2023-0306 - https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde +CVE-2023-0307 - https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215 +CVE-2023-0308 - https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69 +CVE-2023-0309 - https://huntr.dev/bounties/c03c5925-43ff-450d-9827-2b65a3307ed6 +CVE-2023-0310 - https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a +CVE-2023-0311 - https://huntr.dev/bounties/82b0b629-c56b-4651-af3f-17f749751857 +CVE-2023-0312 - https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9 +CVE-2023-0313 - https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256 +CVE-2023-0314 - https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67 +CVE-2023-0315 - http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html +CVE-2023-0315 - http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html +CVE-2023-0315 - https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943 +CVE-2023-0316 - https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244 +CVE-2023-0321 - https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html +CVE-2023-0323 - https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343 +CVE-2023-0324 - https://vuldb.com/?id.218426 +CVE-2023-0326 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132 +CVE-2023-0329 - http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html +CVE-2023-0332 - https://vuldb.com/?id.218472 +CVE-2023-0341 - https://litios.github.io/2023/01/14/CVE-2023-0341.html +CVE-2023-0358 - https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 +CVE-2023-0386 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html +CVE-2023-0386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a +CVE-2023-0391 - https://www.bleepingcomputer.com/news/security/cloudpanel-installations-use-the-same-ssl-certificate-private-key/ +CVE-2023-0394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17 +CVE-2023-0398 - https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58 +CVE-2023-0400 - https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US +CVE-2023-0406 - https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c +CVE-2023-0410 - https://huntr.dev/bounties/2da583f0-7f66-4ba7-9bed-8e7229aa578e +CVE-2023-0419 - https://wpscan.com/vulnerability/5ccfee43-920d-4613-b976-2ea8966696ba +CVE-2023-0432 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-05 +CVE-2023-0433 - http://seclists.org/fulldisclosure/2023/Mar/21 +CVE-2023-0433 - https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e +CVE-2023-0434 - https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4 +CVE-2023-0435 - https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d +CVE-2023-0438 - https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3 +CVE-2023-0440 - https://huntr.dev/bounties/208a096f-7986-4eed-8629-b7285348a686 +CVE-2023-0448 - https://www.tenable.com/security/research/tra-2023-3 +CVE-2023-0455 - http://packetstormsecurity.com/files/172674/Bumsys-Business-Management-System-1.0.3-beta-Shell-Upload.html +CVE-2023-0455 - https://huntr.dev/bounties/b5e9c578-1a33-4745-bf6b-e7cdb89793f7 +CVE-2023-0461 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c +CVE-2023-0470 - https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b +CVE-2023-0488 - https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a +CVE-2023-0491 - https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60 +CVE-2023-0493 - http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html +CVE-2023-0493 - https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f +CVE-2023-0509 - https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839 +CVE-2023-0512 - http://seclists.org/fulldisclosure/2023/Mar/21 +CVE-2023-0512 - https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74 +CVE-2023-0513 - https://vuldb.com/?id.219334 +CVE-2023-0519 - https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129 +CVE-2023-0527 - http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html +CVE-2023-0527 - https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md +CVE-2023-0528 - https://vuldb.com/?id.219597 +CVE-2023-0531 - https://vuldb.com/?id.219600 +CVE-2023-0532 - https://vuldb.com/?id.219601 +CVE-2023-0533 - https://vuldb.com/?id.219602 +CVE-2023-0549 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5 +CVE-2023-0562 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md +CVE-2023-0563 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md +CVE-2023-0567 - https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4 +CVE-2023-0569 - https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9 +CVE-2023-0571 - https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md +CVE-2023-0571 - https://vuldb.com/?id.219730 +CVE-2023-0587 - https://www.tenable.com/security/research/tra-2023-5 +CVE-2023-0591 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/ +CVE-2023-0592 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/ +CVE-2023-0593 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/ +CVE-2023-0597 - http://www.openwall.com/lists/oss-security/2023/07/28/1 +CVE-2023-0606 - https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b +CVE-2023-0608 - https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c +CVE-2023-0609 - https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0 +CVE-2023-0610 - https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926 +CVE-2023-0611 - https://vuldb.com/?id.219935 +CVE-2023-0612 - https://vuldb.com/?id.219936 +CVE-2023-0617 - https://vuldb.com/?id.219957 +CVE-2023-0638 - https://vuldb.com/?id.220018 +CVE-2023-0641 - https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md +CVE-2023-0642 - https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d +CVE-2023-0643 - https://huntr.dev/bounties/ea90f8b9-d8fe-4432-9a52-4d663400c52f +CVE-2023-0647 - https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md +CVE-2023-0650 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m +CVE-2023-0663 - https://vuldb.com/?id.220175 +CVE-2023-0666 - https://gitlab.com/wireshark/wireshark/-/issues/19085 +CVE-2023-0666 - https://takeonme.org/cves/CVE-2023-0666.html +CVE-2023-0667 - https://gitlab.com/wireshark/wireshark/-/issues/19086 +CVE-2023-0667 - https://takeonme.org/cves/CVE-2023-0667.html +CVE-2023-0668 - https://gitlab.com/wireshark/wireshark/-/issues/19087 +CVE-2023-0668 - https://takeonme.org/cves/CVE-2023-0668.html +CVE-2023-0669 - http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html +CVE-2023-0669 - https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis +CVE-2023-0669 - https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html +CVE-2023-0671 - https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de +CVE-2023-0673 - https://vuldb.com/?id.220195 +CVE-2023-0674 - https://github.com/boyi0508/xxl-job-explain/blob/main/README.md +CVE-2023-0675 - https://www.youtube.com/watch?v=eoPuINHWjHo +CVE-2023-0676 - https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b +CVE-2023-0677 - https://huntr.dev/bounties/d280ae81-a1c9-4a50-9aa4-f98f1f9fd2c0 +CVE-2023-0679 - https://vuldb.com/?id.220220 +CVE-2023-0698 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693 +CVE-2023-0732 - https://vuldb.com/?id.220369 +CVE-2023-0734 - https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b +CVE-2023-0736 - https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e +CVE-2023-0738 - https://fluidattacks.com/advisories/eilish/ +CVE-2023-0739 - https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae +CVE-2023-0740 - https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110 +CVE-2023-0741 - https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809 +CVE-2023-0742 - https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544 +CVE-2023-0743 - https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863 +CVE-2023-0744 - http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html +CVE-2023-0744 - https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434 +CVE-2023-0747 - https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff +CVE-2023-0748 - https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86 +CVE-2023-0756 - https://gitlab.com/gitlab-org/gitlab/-/issues/390910 +CVE-2023-0758 - https://vuldb.com/?id.220469 +CVE-2023-0759 - https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347 +CVE-2023-0760 - https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 +CVE-2023-0770 - https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd +CVE-2023-0771 - https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1 +CVE-2023-0774 - https://www.youtube.com/watch?v=s3oK5jebx_I +CVE-2023-0777 - http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html +CVE-2023-0777 - https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7 +CVE-2023-0779 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549 +CVE-2023-0780 - https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4 +CVE-2023-0782 - https://github.com/jingping911/tendaAC23overflow/blob/main/README.md +CVE-2023-0783 - https://vuldb.com/?id.220641 +CVE-2023-0784 - https://vuldb.com/?id.220644 +CVE-2023-0787 - https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024 +CVE-2023-0789 - https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5 +CVE-2023-0790 - https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156 +CVE-2023-0793 - https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9 +CVE-2023-0794 - https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb +CVE-2023-0795 - https://gitlab.com/libtiff/libtiff/-/issues/493 +CVE-2023-0796 - https://gitlab.com/libtiff/libtiff/-/issues/499 +CVE-2023-0797 - https://gitlab.com/libtiff/libtiff/-/issues/495 +CVE-2023-0798 - https://gitlab.com/libtiff/libtiff/-/issues/492 +CVE-2023-0799 - https://gitlab.com/libtiff/libtiff/-/issues/494 +CVE-2023-0800 - https://gitlab.com/libtiff/libtiff/-/issues/496 +CVE-2023-0801 - https://gitlab.com/libtiff/libtiff/-/issues/498 +CVE-2023-0802 - https://gitlab.com/libtiff/libtiff/-/issues/500 +CVE-2023-0803 - https://gitlab.com/libtiff/libtiff/-/issues/501 +CVE-2023-0804 - https://gitlab.com/libtiff/libtiff/-/issues/497 +CVE-2023-0810 - https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68 +CVE-2023-0817 - https://huntr.dev/bounties/cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3 +CVE-2023-0818 - https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a +CVE-2023-0819 - https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef +CVE-2023-0827 - https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422 +CVE-2023-0841 - https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3 +CVE-2023-0848 - https://vuldb.com/?id.221147 +CVE-2023-0860 - https://huntr.dev/bounties/64f3ab93-1357-4468-8ff4-52bbcec18cca +CVE-2023-0866 - https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f +CVE-2023-0877 - https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8 +CVE-2023-0878 - https://huntr.dev/bounties/a892caf7-b8c2-4638-8cee-eb779d51066a +CVE-2023-0879 - https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541 +CVE-2023-0880 - https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c +CVE-2023-0887 - https://vuldb.com/?id.221351 +CVE-2023-0888 - https://www.bbraun.com/productsecurity +CVE-2023-0888 - https://www.bbraunusa.com/productsecurity +CVE-2023-0897 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-0901 - https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010 +CVE-2023-0902 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Simple%20Food%20Ordering%20System%20-%20Authenticated%20Reflected%20XSS.md +CVE-2023-0903 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md +CVE-2023-0904 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md +CVE-2023-0905 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md +CVE-2023-0907 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0907 +CVE-2023-0908 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908 +CVE-2023-0912 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md +CVE-2023-0913 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md +CVE-2023-0914 - https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec +CVE-2023-0915 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md +CVE-2023-0916 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md +CVE-2023-0916 - https://vuldb.com/?id.221491 +CVE-2023-0919 - https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f +CVE-2023-0938 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md +CVE-2023-0943 - https://vuldb.com/?id.221591 +CVE-2023-0947 - https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496 +CVE-2023-0949 - https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19 +CVE-2023-0961 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md +CVE-2023-0962 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md +CVE-2023-0962 - https://vuldb.com/?id.221632 +CVE-2023-0963 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md +CVE-2023-0964 - https://vuldb.com/?id.221634 +CVE-2023-0975 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396 +CVE-2023-0976 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398 +CVE-2023-0977 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396 +CVE-2023-0978 - https://kcm.trellix.com/corporate/index?page=content&id=SB10397 +CVE-2023-0994 - https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad +CVE-2023-0995 - https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f +CVE-2023-0999 - https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md +CVE-2023-0999 - https://vuldb.com/?id.221734 +CVE-2023-1003 - https://github.com/typora/typora-issues/issues/5623 +CVE-2023-1004 - https://github.com/marktext/marktext/issues/3575 +CVE-2023-1005 - https://github.com/JP1016/Markdown-Electron/issues/3 +CVE-2023-1006 - https://vuldb.com/?id.221739 +CVE-2023-1007 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007 +CVE-2023-1008 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1008 +CVE-2023-1009 - https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md +CVE-2023-1010 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md +CVE-2023-1021 - https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3 +CVE-2023-1030 - https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected +CVE-2023-1031 - https://fluidattacks.com/advisories/napoli +CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6024-1 +CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6033-1 +CVE-2023-1033 - https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387 +CVE-2023-1034 - https://huntr.dev/bounties/0c1365bc-8d9a-4ae0-8b55-615d492b3730 +CVE-2023-1036 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/XSS-1.md +CVE-2023-1037 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/SQLi-1.md +CVE-2023-1037 - https://vuldb.com/?id.221795 +CVE-2023-1044 - https://vuldb.com/?id.221803 +CVE-2023-1063 - https://vuldb.com/?id.221827 +CVE-2023-1067 - https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045 +CVE-2023-1070 - https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c +CVE-2023-1090 - https://github.com/youki992/youki992.github.io/blob/master/others/apply.md +CVE-2023-1094 - https://fluidattacks.com/advisories/napoli +CVE-2023-1103 - https://huntr.dev/bounties/4c5a8af6-3078-4180-bb30-33b57a5540e6 +CVE-2023-1104 - https://huntr.dev/bounties/a4909b4e-ab3c-41d6-b0d8-1c6e933bf758 +CVE-2023-1105 - https://huntr.dev/bounties/4089a63f-cffd-42f3-b8d8-e80b6bd9c80f +CVE-2023-1106 - https://huntr.dev/bounties/1288ec00-f69d-4b84-abce-efc9a97941a0 +CVE-2023-1107 - https://huntr.dev/bounties/4b880868-bd28-4fd0-af56-7686e55d3762 +CVE-2023-1115 - https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17 +CVE-2023-1116 - https://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1 +CVE-2023-1127 - https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb +CVE-2023-1131 - https://vuldb.com/?id.222106 +CVE-2023-1133 - http://packetstormsecurity.com/files/172799/Delta-Electronics-InfraSuite-Device-Master-Deserialization.html +CVE-2023-1146 - https://huntr.dev/bounties/d6d1e1e2-2f67-4d28-aa84-b30fb1d2e737 +CVE-2023-1147 - https://huntr.dev/bounties/187f5353-f866-4d26-a5ba-fca378520020 +CVE-2023-1148 - https://huntr.dev/bounties/f0cc2c4b-fdf9-483b-9a83-4e0dfeb4dac7 +CVE-2023-1149 - https://huntr.dev/bounties/2e734209-d7b0-4f57-a8be-c65c82208f2f +CVE-2023-1151 - https://vuldb.com/?id.222163 +CVE-2023-1157 - https://github.com/10cksYiqiyinHangzhouTechnology/elf-parser_segments_poc +CVE-2023-1160 - https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87 +CVE-2023-1162 - https://github.com/xxy1126/Vuln/blob/main/Draytek/2.md +CVE-2023-1163 - https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md +CVE-2023-1163 - https://vuldb.com/?id.222259 +CVE-2023-1164 - https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md +CVE-2023-1170 - https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4 +CVE-2023-1175 - https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e +CVE-2023-1176 - https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085 +CVE-2023-1177 - https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28 +CVE-2023-1178 - https://gitlab.com/gitlab-org/gitlab/-/issues/381815 +CVE-2023-1181 - https://huntr.dev/bounties/f5cb8816-fc12-4282-9571-81f25670e04a +CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2023/12/28/4 +CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2024/01/03/4 +CVE-2023-1186 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186 +CVE-2023-1187 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187 +CVE-2023-1188 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1188 +CVE-2023-1189 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1189 +CVE-2023-1189 - https://vuldb.com/?id.222361 +CVE-2023-1190 - https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc +CVE-2023-1190 - https://github.com/xiaozhuai/imageinfo/issues/1 +CVE-2023-1197 - https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26 +CVE-2023-1200 - https://vuldb.com/?id.222388 +CVE-2023-1211 - https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd +CVE-2023-1212 - https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499 +CVE-2023-1219 - http://packetstormsecurity.com/files/171795/Chrome-base-debug-ActivityUserData-ActivityUserData-Heap-Buffer-Overflow.html +CVE-2023-1220 - http://packetstormsecurity.com/files/171796/Chrome-base-SampleVectorBase-MoveSingleSampleToCounts-Heap-Buffer-Overflow.html +CVE-2023-1238 - https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d +CVE-2023-1239 - https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8 +CVE-2023-1241 - https://huntr.dev/bounties/e0e9b1bb-3025-4b9f-acb4-16a5da28aa3c +CVE-2023-1242 - https://huntr.dev/bounties/71c24c5e-ceb2-45cf-bda7-fa195d37e289 +CVE-2023-1243 - https://huntr.dev/bounties/1d62d35a-b096-4b76-a021-347c3f1c570c +CVE-2023-1244 - https://huntr.dev/bounties/bcab9555-8a35-42b2-a7de-0a79fd710b52 +CVE-2023-1245 - https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004 +CVE-2023-1247 - https://huntr.dev/bounties/04447124-c7d4-477f-8364-91fe5b59cda0 +CVE-2023-1249 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html +CVE-2023-1258 - http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html +CVE-2023-1264 - https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815 +CVE-2023-1265 - https://gitlab.com/gitlab-org/gitlab/-/issues/394960 +CVE-2023-1270 - https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b +CVE-2023-1277 - https://github.com/cn-lwj/vuldb/blob/master/kylin-system-updater_vuln.md +CVE-2023-1277 - https://vuldb.com/?id.222600 +CVE-2023-1281 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2 +CVE-2023-1282 - https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a +CVE-2023-1283 - https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8 +CVE-2023-1286 - https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c +CVE-2023-1289 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr +CVE-2023-1304 - https://docs.divvycloud.com/changelog/23321-release-notes +CVE-2023-1305 - https://docs.divvycloud.com/changelog/23321-release-notes +CVE-2023-1306 - https://docs.divvycloud.com/changelog/23321-release-notes +CVE-2023-1307 - https://huntr.dev/bounties/5fe85af4-a667-41a9-a00d-f99e07c5e2f1 +CVE-2023-1311 - https://vuldb.com/?id.222699 +CVE-2023-1312 - https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356 +CVE-2023-1313 - https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61 +CVE-2023-1315 - https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e +CVE-2023-1316 - https://huntr.dev/bounties/c6353bab-c382-47f6-937b-56d253f2e8d3 +CVE-2023-1317 - https://huntr.dev/bounties/c3e27af2-358b-490b-9baf-e451663e4e5f +CVE-2023-1318 - https://huntr.dev/bounties/e58b38e0-4897-4bb0-84e8-a7ad8efab338 +CVE-2023-1319 - https://huntr.dev/bounties/a822067a-d90d-4c3e-b9ef-9b2a5c2bc97f +CVE-2023-1320 - https://huntr.dev/bounties/c2bb34ac-452d-4624-a1b9-c5b54f52f0cd +CVE-2023-1326 - https://github.com/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb +CVE-2023-1349 - https://vuldb.com/?id.222842 +CVE-2023-1350 - https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59 +CVE-2023-1353 - https://vuldb.com/?id.222852 +CVE-2023-1355 - https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9 +CVE-2023-1361 - https://huntr.dev/bounties/1b1dbc5a-df16-421f-9a0d-de83e43146c4 +CVE-2023-1362 - https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac +CVE-2023-1367 - https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2 +CVE-2023-1369 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369 +CVE-2023-1370 - https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/ +CVE-2023-1372 - https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/ +CVE-2023-1374 - https://danielkelley.me/solidres-hotel-booking-plugin-for-wordpress-post-based-xss-vulnerability-in-add-new-currency-feature/ +CVE-2023-1380 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html +CVE-2023-1380 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html +CVE-2023-1381 - https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/ +CVE-2023-1383 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ +CVE-2023-1384 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ +CVE-2023-1385 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ +CVE-2023-1387 - https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j +CVE-2023-1388 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398 +CVE-2023-1389 - http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html +CVE-2023-1389 - https://www.tenable.com/security/research/tra-2023-11 +CVE-2023-1390 - https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5 +CVE-2023-1391 - https://blog.csdn.net/Dwayne_Wade/article/details/129526901 +CVE-2023-1394 - https://blog.csdn.net/Dwayne_Wade/article/details/129522869 +CVE-2023-1395 - https://blog.csdn.net/Dwayne_Wade/article/details/129496689 +CVE-2023-1396 - https://blog.csdn.net/Dwayne_Wade/article/details/129524104 +CVE-2023-1410 - https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76 +CVE-2023-1421 - https://mattermost.com/security-updates/ +CVE-2023-1429 - https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f +CVE-2023-1436 - https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/ +CVE-2023-1442 - https://vuldb.com/?id.223287 +CVE-2023-1443 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443 +CVE-2023-1444 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444 +CVE-2023-1445 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1445 +CVE-2023-1446 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446 +CVE-2023-1448 - https://github.com/gpac/gpac/issues/2388 +CVE-2023-1449 - https://github.com/gpac/gpac/issues/2387 +CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc +CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16 +CVE-2023-1450 - https://vuldb.com/?id.223295 +CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc +CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8 +CVE-2023-1452 - https://github.com/gpac/gpac/issues/2386 +CVE-2023-1453 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1453 +CVE-2023-1459 - https://vuldb.com/?id.223304 +CVE-2023-1460 - https://vuldb.com/?id.223305 +CVE-2023-1463 - https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6 +CVE-2023-1486 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1486 +CVE-2023-1487 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1487 +CVE-2023-1487 - https://vuldb.com/?id.223373 +CVE-2023-1488 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1488 +CVE-2023-1489 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1489 +CVE-2023-1490 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1490 +CVE-2023-1491 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491 +CVE-2023-1492 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1492 +CVE-2023-1493 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1493 +CVE-2023-1494 - https://gitee.com/cui-yiwei/cve-number/blob/master/images/IBOS%20oa%20v4.5.5.md/1.md +CVE-2023-1496 - https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2 +CVE-2023-1515 - https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282 +CVE-2023-1517 - https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d +CVE-2023-1523 - https://marc.info/?l=oss-security&m=167879021709955&w=2 +CVE-2023-1527 - https://huntr.dev/bounties/f0272a31-9944-4545-8428-a26154d20348 +CVE-2023-1531 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724 +CVE-2023-1532 - http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html +CVE-2023-1534 - http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html +CVE-2023-1534 - http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html +CVE-2023-1535 - https://huntr.dev/bounties/4d4b0caa-6d8c-4574-ae7e-e9ef5e2e1a40 +CVE-2023-1536 - https://huntr.dev/bounties/538207f4-f805-419a-a314-51716643f05e +CVE-2023-1537 - https://huntr.dev/bounties/171cde18-a447-446c-a9ab-297953ad9b86 +CVE-2023-1538 - https://huntr.dev/bounties/ac0271eb-660f-4966-8b57-4bc660a9a1a0 +CVE-2023-1539 - https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28 +CVE-2023-1540 - https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4 +CVE-2023-1541 - https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92 +CVE-2023-1542 - https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f +CVE-2023-1543 - https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683 +CVE-2023-1545 - https://huntr.dev/bounties/942c015f-7486-49b1-94ae-b1538d812bc2 +CVE-2023-1546 - https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0 +CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF +CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8 +CVE-2023-1560 - https://vuldb.com/?id.223553 +CVE-2023-1562 - https://mattermost.com/security-updates/ +CVE-2023-1568 - https://vuldb.com/?id.223560 +CVE-2023-1570 - https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1 +CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/28 +CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/29 +CVE-2023-1571 - https://vuldb.com/?id.223563 +CVE-2023-1576 - https://sourceforge.net/p/p7zip/bugs/241/ +CVE-2023-1578 - https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e +CVE-2023-1579 - https://sourceware.org/bugzilla/show_bug.cgi?id=29988 +CVE-2023-1585 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2023-1586 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2023-1587 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2023-1590 - https://blog.csdn.net/weixin_43864034/article/details/129730106 +CVE-2023-1594 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf +CVE-2023-1594 - https://vuldb.com/?id.223662 +CVE-2023-1595 - https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md +CVE-2023-1605 - https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2 +CVE-2023-1606 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf +CVE-2023-1616 - https://vuldb.com/?id.223800 +CVE-2023-1621 - https://gitlab.com/gitlab-org/gitlab/-/issues/399774 +CVE-2023-1629 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629 +CVE-2023-1630 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630 +CVE-2023-1631 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1631 +CVE-2023-1634 - https://github.com/BigTiger2020/2023-1/blob/main/ssrf/ssrf.md +CVE-2023-1634 - https://vuldb.com/?id.224016 +CVE-2023-1635 - https://github.com/BigTiger2020/2023/blob/main/XSS.md +CVE-2023-1637 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463 +CVE-2023-1638 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638 +CVE-2023-1639 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639 +CVE-2023-1640 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640 +CVE-2023-1641 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641 +CVE-2023-1642 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642 +CVE-2023-1643 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643 +CVE-2023-1644 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644 +CVE-2023-1645 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645 +CVE-2023-1646 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646 +CVE-2023-1647 - https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6 +CVE-2023-1648 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132 +CVE-2023-1654 - https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14 +CVE-2023-1655 - https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9 +CVE-2023-1665 - https://huntr.dev/bounties/db8fcbab-6ef0-44ba-b5c6-3b0f17ca22a2 +CVE-2023-1671 - http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html +CVE-2023-1674 - https://vuldb.com/?id.224231 +CVE-2023-1676 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676 +CVE-2023-1677 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677 +CVE-2023-1678 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678 +CVE-2023-1679 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679 +CVE-2023-1685 - https://vuldb.com/?id.224242 +CVE-2023-1687 - https://vuldb.com/?id.224244 +CVE-2023-1701 - https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256 +CVE-2023-1702 - https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19 +CVE-2023-1704 - https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f +CVE-2023-1708 - https://gitlab.com/gitlab-org/gitlab/-/issues/387185 +CVE-2023-1712 - https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829 +CVE-2023-1713 - https://starlabs.sg/advisories/23/23-1713/ +CVE-2023-1714 - https://starlabs.sg/advisories/23/23-1714/ +CVE-2023-1715 - https://starlabs.sg/advisories/23/23-1715/ +CVE-2023-1717 - https://starlabs.sg/advisories/23/23-1717/ +CVE-2023-1718 - https://starlabs.sg/advisories/23/23-1718/ +CVE-2023-1719 - https://starlabs.sg/advisories/23/23-1719/ +CVE-2023-1720 - https://starlabs.sg/advisories/23/23-1720/ +CVE-2023-1721 - https://fluidattacks.com/advisories/blessd/ +CVE-2023-1722 - https://fluidattacks.com/advisories/wyckoff/ +CVE-2023-1729 - https://github.com/LibRaw/LibRaw/issues/557 +CVE-2023-1741 - https://vuldb.com/?id.224629 +CVE-2023-1742 - https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md +CVE-2023-1745 - https://github.com/10cksYiqiyinHangzhouTechnology/KMPlayer_Poc +CVE-2023-1745 - https://youtu.be/7bh2BQOqxFo +CVE-2023-1754 - https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28 +CVE-2023-1755 - https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a +CVE-2023-1756 - https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9 +CVE-2023-1757 - https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c +CVE-2023-1758 - https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c +CVE-2023-1759 - https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1 +CVE-2023-1760 - https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5 +CVE-2023-1762 - https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a +CVE-2023-1767 - https://weizman.github.io/2023/04/10/snyk-xss/ +CVE-2023-1774 - https://mattermost.com/security-updates/ +CVE-2023-1775 - https://mattermost.com/security-updates/ +CVE-2023-1776 - https://mattermost.com/security-updates/ +CVE-2023-1777 - https://mattermost.com/security-updates/ +CVE-2023-1780 - https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3 +CVE-2023-1783 - https://fluidattacks.com/advisories/stirling/ +CVE-2023-1788 - https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2 +CVE-2023-1789 - https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d +CVE-2023-1798 - https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md +CVE-2023-1826 - http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html +CVE-2023-1829 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28 +CVE-2023-1831 - https://mattermost.com/security-updates/ +CVE-2023-1836 - https://gitlab.com/gitlab-org/gitlab/-/issues/404613 +CVE-2023-1841 - https://https://www.honeywell.com/us/en/product-security +CVE-2023-1850 - https://vuldb.com/?id.224990 +CVE-2023-1856 - https://vuldb.com/?id.224995 +CVE-2023-1872 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html +CVE-2023-1874 - http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html +CVE-2023-1875 - https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61 +CVE-2023-1876 - https://huntr.dev/bounties/15b06488-5849-47ce-aaf4-81d4c3c202e2 +CVE-2023-1877 - https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55 +CVE-2023-1878 - https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc +CVE-2023-1879 - https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334 +CVE-2023-1880 - https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e +CVE-2023-1881 - https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344 +CVE-2023-1882 - https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957 +CVE-2023-1883 - https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191 +CVE-2023-1884 - https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e +CVE-2023-1887 - https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1 +CVE-2023-1890 - http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html +CVE-2023-1891 - https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828 +CVE-2023-1892 - https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777 +CVE-2023-1893 - http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html +CVE-2023-1893 - https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7 +CVE-2023-1900 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2023-1903 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-1906 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247 +CVE-2023-1912 - http://packetstormsecurity.com/files/171824/WordPress-Limit-Login-Attempts-1.7.1-Cross-Site-Scripting.html +CVE-2023-1916 - https://gitlab.com/libtiff/libtiff/-/issues/537 +CVE-2023-1934 - http://packetstormsecurity.com/files/172511/PnPSCADA-2.x-SQL-Injection.html +CVE-2023-1936 - https://gitlab.com/gitlab-org/gitlab/-/issues/405150 +CVE-2023-1947 - https://gitee.com/misak7in/cve/blob/master/taocms.md +CVE-2023-1956 - https://vuldb.com/?id.225343 +CVE-2023-1960 - https://vuldb.com/?id.225347 +CVE-2023-1965 - https://gitlab.com/gitlab-org/gitlab/-/issues/406235 +CVE-2023-1974 - https://huntr.dev/bounties/852781c6-9cc8-4d25-9336-bf3cb8ee3439 +CVE-2023-1985 - https://vuldb.com/?id.225533 +CVE-2023-1988 - https://vuldb.com/?id.225536 +CVE-2023-1998 - https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx +CVE-2023-20009 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8 +CVE-2023-2002 - https://www.openwall.com/lists/oss-security/2023/04/16/3 +CVE-2023-20024 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20025 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 +CVE-2023-20026 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 +CVE-2023-2003 - https://www.hackplayers.com/2023/07/vulnerabilidad-vision1210-unitronics.html +CVE-2023-20032 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy +CVE-2023-2004 - https://bugzilla.redhat.com/show_bug.cgi?id=2186428 +CVE-2023-20046 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j7p3-gjw6-pp4r +CVE-2023-20046 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h +CVE-2023-20065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qrpq-fp26-7v9r +CVE-2023-20065 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-priv-escalate-Xg8zkyPk +CVE-2023-20075 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8 +CVE-2023-20098 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch +CVE-2023-20116 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-4Ag3yWbD +CVE-2023-20118 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 +CVE-2023-2014 - https://huntr.dev/bounties/a77bf7ed-6b61-452e-b5ee-e20017e28d1a +CVE-2023-20156 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20157 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20158 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20159 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20160 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20161 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20162 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-2017 - https://starlabs.sg/advisories/23/23-2017/ +CVE-2023-20178 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw +CVE-2023-20189 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv +CVE-2023-20197 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee +CVE-2023-20198 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html +CVE-2023-20198 - https://www.darkreading.com/vulnerabilities-threats/critical-unpatched-cisco-zero-day-bug-active-exploit +CVE-2023-20209 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ +CVE-2023-2021 - https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0 +CVE-2023-20211 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2 +CVE-2023-20217 - http://packetstormsecurity.com/files/174232/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Read.html +CVE-2023-20217 - http://seclists.org/fulldisclosure/2023/Aug/19 +CVE-2023-2022 - https://gitlab.com/gitlab-org/gitlab/-/issues/407166 +CVE-2023-20224 - http://packetstormsecurity.com/files/174233/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Privilege-Escalation.html +CVE-2023-20224 - http://seclists.org/fulldisclosure/2023/Aug/20 +CVE-2023-20235 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn +CVE-2023-20273 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html +CVE-2023-2029 - http://packetstormsecurity.com/files/173729/WordPress-PrePost-SEO-3.0-Cross-Site-Scripting.html +CVE-2023-2034 - https://huntr.dev/bounties/aba6beaa-570e-4523-8128-da4d8e374ef6 +CVE-2023-2035 - https://vuldb.com/?id.225913 +CVE-2023-2036 - https://vuldb.com/?id.225914 +CVE-2023-2037 - https://vuldb.com/?id.225915 +CVE-2023-2042 - https://vuldb.com/?id.225920 +CVE-2023-2050 - https://github.com/E1CHO/cve_hub/blob/main/Advanced%20Online%20Voting%20System/Advanced%20Online%20Voting%20System%20-%20vuln%204.pdf +CVE-2023-2051 - https://vuldb.com/?id.225936 +CVE-2023-2054 - https://vuldb.com/?id.225939 +CVE-2023-2055 - https://vuldb.com/?id.225940 +CVE-2023-20569 - https://comsec.ethz.ch/research/microarch/inception/ +CVE-2023-2057 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS1.md +CVE-2023-2057 - https://vuldb.com/?id.225942 +CVE-2023-2058 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS2.md +CVE-2023-2058 - https://vuldb.com/?id.225943 +CVE-2023-20593 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-20593 - http://www.openwall.com/lists/oss-security/2023/07/24/3 +CVE-2023-2068 - http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html +CVE-2023-2069 - https://gitlab.com/gitlab-org/gitlab/-/issues/407374 +CVE-2023-2074 - https://github.com/E1CHO/cve_hub/blob/main/Online%20Traffic%20Offense%20Management%20System/Online%20Traffic%20Offense%20Management%20System%20-%20vuln%202.pdf +CVE-2023-2074 - https://vuldb.com/?id.226052 +CVE-2023-20854 - https://www.vmware.com/security/advisories/VMSA-2023-0003.html +CVE-2023-20857 - http://packetstormsecurity.com/files/171158/VMware-Security-Advisory-2023-0006.html +CVE-2023-20887 - http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html +CVE-2023-2089 - https://vuldb.com/?id.226097 +CVE-2023-20891 - https://www.vmware.com/security/advisories/VMSA-2023-0016.html +CVE-2023-20894 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658 +CVE-2023-20895 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740 +CVE-2023-20902 - https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf +CVE-2023-20928 - http://packetstormsecurity.com/files/170855/Android-Binder-VMA-Management-Security-Issues.html +CVE-2023-20937 - http://packetstormsecurity.com/files/171239/Android-GKI-Kernels-Contain-Broken-Non-Upstream-Speculative-Page-Faults-MM-Code.html +CVE-2023-2097 - https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%206.pdf +CVE-2023-2102 - https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44 +CVE-2023-2103 - https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc +CVE-2023-2105 - https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1 +CVE-2023-2107 - https://vuldb.com/?id.226110 +CVE-2023-2109 - https://huntr.dev/bounties/fd5999fd-b1fd-44b4-ae2e-8f95b5c3d1b6 +CVE-2023-2110 - https://starlabs.sg/advisories/23/23-2110/ +CVE-2023-2123 - https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin +CVE-2023-21238 - https://android.googlesource.com/platform/frameworks/base/+/91bfcbbd87886049778142618a655352b16cd911 +CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3 +CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad +CVE-2023-21255 - https://android.googlesource.com/kernel/common/+/1ca1130ec62d +CVE-2023-21274 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/2bffd7f5e66dd0cf7e5668fb65c4f2b2e9f87cf7 +CVE-2023-21282 - https://android.googlesource.com/platform/external/aac/+/4242f97d149b0bf0cd96f00cd1e9d30d5922cd46 +CVE-2023-21285 - https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1 +CVE-2023-21292 - https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670d +CVE-2023-2138 - https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6 +CVE-2023-21400 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-2150 - https://youtu.be/o46oHLvY2-E +CVE-2023-2152 - https://vuldb.com/?id.226273 +CVE-2023-21521 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406 +CVE-2023-21522 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406 +CVE-2023-2154 - https://youtu.be/teK82KkWtdA +CVE-2023-2156 - http://www.openwall.com/lists/oss-security/2023/05/19/1 +CVE-2023-2160 - https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b +CVE-2023-2164 - https://gitlab.com/gitlab-org/gitlab/-/issues/407783 +CVE-2023-21665 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html +CVE-2023-21666 - http://packetstormsecurity.com/files/172664/Qualcomm-Adreno-KGSL-Data-Leakage.html +CVE-2023-21670 - http://packetstormsecurity.com/files/173296/Qualcomm-Adreno-KGSL-Insecure-Execution.html +CVE-2023-21675 - http://packetstormsecurity.com/files/170852/Windows-Kernel-Registry-Virtualization-Memory-Corruption.html +CVE-2023-21747 - http://packetstormsecurity.com/files/170933/Windows-Kernel-Dangling-Registry-Link-Node-Use-After-Free.html +CVE-2023-21748 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html +CVE-2023-21748 - http://packetstormsecurity.com/files/170949/Windows-Kernel-Registry-Virtualization-Incompatibility.html +CVE-2023-21749 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html +CVE-2023-21750 - http://packetstormsecurity.com/files/170948/Windows-Kernel-Virtualizable-Hive-Key-Deletion.html +CVE-2023-21768 - http://packetstormsecurity.com/files/171606/Ancillary-Function-Driver-AFD-For-Winsock-Privilege-Escalation.html +CVE-2023-21772 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html +CVE-2023-21773 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html +CVE-2023-21774 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html +CVE-2023-21776 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html +CVE-2023-21776 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html +CVE-2023-21824 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21825 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21826 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21827 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21828 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21829 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-2183 - https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3 +CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21831 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21832 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21834 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21835 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21836 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21837 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21838 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21839 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html +CVE-2023-21839 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21840 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21841 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21842 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21843 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21844 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21845 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21846 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21847 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21848 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21849 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21850 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21851 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21852 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21853 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21854 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21855 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21856 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21857 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21858 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21859 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-2186 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html +CVE-2023-21860 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21861 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21862 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21863 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21864 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21865 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21866 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21867 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21868 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21869 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-2187 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html +CVE-2023-21870 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21871 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21872 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21873 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21874 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21875 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21876 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21877 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21878 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21879 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21880 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21881 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21882 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21883 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21884 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21885 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21886 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21887 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21888 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21889 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21890 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21891 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21892 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21893 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21894 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21896 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21898 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21899 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21900 - https://www.oracle.com/security-alerts/cpujan2023.html +CVE-2023-21902 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21903 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21904 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21905 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21906 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21907 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21908 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21909 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-2191 - https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31 +CVE-2023-21910 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21911 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21912 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21913 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21915 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21916 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21917 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21918 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21919 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21920 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21921 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21922 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21923 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21924 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21925 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21926 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21927 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21928 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21929 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-2193 - https://mattermost.com/security-updates/ +CVE-2023-21930 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21931 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html +CVE-2023-21931 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21932 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21933 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21934 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21935 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21936 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21937 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21938 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21939 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21940 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21941 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21942 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21943 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21944 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21945 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21946 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21947 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21948 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21949 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21950 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21952 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21953 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21954 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21955 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21956 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21959 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21960 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21961 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21962 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21963 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21964 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21965 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21966 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21967 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21968 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21969 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21970 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21971 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21971 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21972 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21973 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21974 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21975 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21976 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21977 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21978 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21979 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21980 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21981 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21982 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21983 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21984 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21985 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21986 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21987 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21988 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21989 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21990 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21991 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21992 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21993 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21994 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-21996 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21997 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21998 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-21999 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-22000 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-22001 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-22002 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-22003 - https://www.oracle.com/security-alerts/cpuapr2023.html +CVE-2023-22004 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22005 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22006 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22007 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22008 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22009 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22010 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22011 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22012 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22013 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22014 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22016 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22017 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22018 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22020 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22021 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22022 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22023 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22027 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22031 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22033 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22034 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22035 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22036 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22037 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22038 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22039 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22040 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22041 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22042 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22043 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22044 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22045 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22046 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22047 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22048 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22049 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22050 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22051 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22052 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22053 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22054 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22055 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22056 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22057 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22058 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22060 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22061 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22062 - https://www.oracle.com/security-alerts/cpujul2023.html +CVE-2023-22074 - http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html +CVE-2023-2212 - https://vuldb.com/?id.226977 +CVE-2023-2216 - https://vuldb.com/?id.226981 +CVE-2023-2223 - http://packetstormsecurity.com/files/173726/WordPress-Login-Rebuilder-Cross-Site-Scripting.html +CVE-2023-22232 - http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html +CVE-2023-2224 - http://packetstormsecurity.com/files/173725/WordPress-Seo-By-10Web-Cross-Site-Scripting.html +CVE-2023-2227 - https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3 +CVE-2023-2228 - https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9 +CVE-2023-22291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1687 +CVE-2023-22299 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1712 +CVE-2023-22306 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1698 +CVE-2023-22308 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737 +CVE-2023-2231 - https://vuldb.com/?id.227001 +CVE-2023-22319 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701 +CVE-2023-22325 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736 +CVE-2023-2233 - https://gitlab.com/gitlab-org/gitlab/-/issues/408359 +CVE-2023-2235 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2 +CVE-2023-2236 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4 +CVE-2023-22365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1711 +CVE-2023-22371 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1703 +CVE-2023-2239 - https://huntr.dev/bounties/edeff16b-fc71-4e26-8d2d-dfe7bb5e7868 +CVE-2023-2240 - https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203 +CVE-2023-2241 - https://github.com/podofo/podofo/files/11260976/poc-file.zip +CVE-2023-2241 - https://github.com/podofo/podofo/issues/69 +CVE-2023-2241 - https://vuldb.com/?id.227226 +CVE-2023-2242 - https://docs.google.com/document/d/1GZt9MKB2K-nDrg0cnrnU6_z9wDd9xPE-YJbPV2Qgqg4/edit +CVE-2023-2245 - https://github.com/MorStardust/hansuncmswebshell/blob/main/README.md +CVE-2023-2245 - https://vuldb.com/?id.227230 +CVE-2023-22451 - https://huntr.dev/bounties/32a873c8-f605-4aae-9272-d80985ef2b73 +CVE-2023-2246 - http://packetstormsecurity.com/files/172182/Online-Pizza-Ordering-System-1.0-Shell-Upload.html +CVE-2023-2248 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d +CVE-2023-22481 - https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8vvv-jxg6-8578 +CVE-2023-22483 - https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c +CVE-2023-22484 - https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r +CVE-2023-22485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr +CVE-2023-22486 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p +CVE-2023-2251 - https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c +CVE-2023-22515 - http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html +CVE-2023-22518 - http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html +CVE-2023-22527 - http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html +CVE-2023-2258 - https://huntr.dev/bounties/31eaf0fe-4d91-4022-aa9b-802bc6eafb8f +CVE-2023-2259 - https://huntr.dev/bounties/e753bce0-ce82-463b-b344-2f67b39b60ff +CVE-2023-22612 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ +CVE-2023-22613 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ +CVE-2023-22614 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ +CVE-2023-22616 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/ +CVE-2023-22620 - http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html +CVE-2023-22620 - http://seclists.org/fulldisclosure/2023/Apr/7 +CVE-2023-22620 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt +CVE-2023-22621 - https://github.com/strapi/strapi/releases +CVE-2023-22621 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve +CVE-2023-22621 - https://www.ghostccamm.com/blog/multi_strapi_vulns/ +CVE-2023-22622 - https://www.tenable.com/plugins/was/113449 +CVE-2023-22629 - http://packetstormsecurity.com/files/171737/Titan-FTP-Path-Traversal.html +CVE-2023-22629 - https://f20.be/cves/titan-ftp-vulnerabilities +CVE-2023-22629 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf +CVE-2023-22630 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j94f-5cg6-6j9j +CVE-2023-22653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1714 +CVE-2023-22659 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1699 +CVE-2023-22660 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1722 +CVE-2023-22671 - https://github.com/NationalSecurityAgency/ghidra/issues/4869 +CVE-2023-22710 - https://patchstack.com/database/vulnerability/wc-return-warrranty/wordpress-return-and-warranty-management-system-for-woocommerce-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve +CVE-2023-22726 - https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff +CVE-2023-22726 - https://securitylab.github.com/advisories/GHSL-2023-004_act/ +CVE-2023-22741 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54 +CVE-2023-22745 - https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67 +CVE-2023-22809 - http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html +CVE-2023-22809 - http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html +CVE-2023-22809 - http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html +CVE-2023-22809 - http://seclists.org/fulldisclosure/2023/Aug/21 +CVE-2023-22809 - http://www.openwall.com/lists/oss-security/2023/01/19/1 +CVE-2023-2281 - https://mattermost.com/security-updates/ +CVE-2023-22812 - https://www.westerndigital.com/support/product-security/wdc-23005-sandisk-privateaccess-software-update +CVE-2023-22813 - https://www.westerndigital.com/support/product-security/wdc-23004-western-digital-my-cloud-os-5-my-cloud-home-sandisk-ibi-and-wd-cloud-mobile-and-web-app-update +CVE-2023-2283 - http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html +CVE-2023-22833 - https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae +CVE-2023-22834 - https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8 +CVE-2023-22835 - https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d +CVE-2023-22844 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700 +CVE-2023-22845 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1708 +CVE-2023-22855 - http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html +CVE-2023-22855 - http://packetstormsecurity.com/files/171689/Kardex-Mlog-MCC-5.7.12-Remote-Code-Execution.html +CVE-2023-22855 - http://seclists.org/fulldisclosure/2023/Feb/10 +CVE-2023-22855 - https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md +CVE-2023-22855 - https://www.exploit-db.com/exploits/51239 +CVE-2023-22893 - https://github.com/strapi/strapi/releases +CVE-2023-22893 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve +CVE-2023-22893 - https://www.ghostccamm.com/blog/multi_strapi_vulns/ +CVE-2023-22894 - https://github.com/strapi/strapi/releases +CVE-2023-22894 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve +CVE-2023-22894 - https://www.ghostccamm.com/blog/multi_strapi_vulns/ +CVE-2023-22897 - http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html +CVE-2023-22897 - http://seclists.org/fulldisclosure/2023/Apr/8 +CVE-2023-22897 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt +CVE-2023-22899 - https://breakingthe3ma.app +CVE-2023-22899 - https://breakingthe3ma.app/files/Threema-PST22.pdf +CVE-2023-22906 - https://github.com/nonamecoder/CVE-2023-22906 +CVE-2023-2291 - https://tenable.com/security/research/tra-2023-16 +CVE-2023-22947 - https://shibboleth.atlassian.net/browse/SSPCPP-961 +CVE-2023-22947 - https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs +CVE-2023-22952 - http://packetstormsecurity.com/files/171320/SugarCRM-12.x-Remote-Code-Execution-Shell-Upload.html +CVE-2023-22955 - http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html +CVE-2023-22955 - http://seclists.org/fulldisclosure/2023/Aug/17 +CVE-2023-22955 - https://syss.de +CVE-2023-22955 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-055.txt +CVE-2023-22956 - http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html +CVE-2023-22956 - http://seclists.org/fulldisclosure/2023/Aug/16 +CVE-2023-22956 - https://syss.de +CVE-2023-22956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-054.txt +CVE-2023-22957 - http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html +CVE-2023-22957 - http://seclists.org/fulldisclosure/2023/Aug/15 +CVE-2023-22957 - https://syss.de +CVE-2023-22957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt +CVE-2023-22958 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md +CVE-2023-22959 - https://github.com/chenan224/webchess_sqli_poc +CVE-2023-2297 - https://www.wordfence.com/blog/2023/03/vulnerability-patched-in-cozmolabs-profile-builder-plugin-information-disclosure-leads-to-account-takeover/ +CVE-2023-22971 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5743.php +CVE-2023-2298 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-22984 - https://d0ub1e-d.github.io/2022/12/30/exploit-db-1/ +CVE-2023-2299 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-22995 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 +CVE-2023-22996 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 +CVE-2023-22997 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2 +CVE-2023-22999 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 +CVE-2023-2300 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-23000 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 +CVE-2023-23001 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 +CVE-2023-23002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 +CVE-2023-23003 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16 +CVE-2023-23004 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 +CVE-2023-23005 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 +CVE-2023-23006 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13 +CVE-2023-2301 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-2302 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-2303 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-23040 - https://midist0xf.medium.com/tl-wr940n-uses-weak-md5-hashing-algorithm-ae7b589860d2 +CVE-2023-23059 - https://packetstormsecurity.com/files/172141/GV-Edge-Recording-Manager-2.2.3.0-Privilege-Escalation.html +CVE-2023-23063 - https://github.com/ahmedalroky/CVEs/tree/cellinx +CVE-2023-23064 - https://github.com/shellpei/TOTOLINK-Unauthorized/blob/main/CVE-2023-23064 +CVE-2023-2307 - https://huntr.dev/bounties/204ea12e-9e5c-4166-bf0e-fd49c8836917 +CVE-2023-23073 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459171?tab=originator +CVE-2023-23074 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459195?tab=originator +CVE-2023-23075 - https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator +CVE-2023-23076 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459751?tab=originator +CVE-2023-23077 - https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator +CVE-2023-23078 - https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator +CVE-2023-23080 - https://github.com/fxc233/iot-vul/tree/main/Tenda/IPC +CVE-2023-2315 - https://starlabs.sg/advisories/23/23-2315/ +CVE-2023-2316 - https://starlabs.sg/advisories/23/23-2316/ +CVE-2023-23161 - http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html +CVE-2023-23162 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html +CVE-2023-23163 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html +CVE-2023-23169 - https://github.com/S4nshine/CVE-2023-23169 +CVE-2023-2317 - https://starlabs.sg/advisories/23/23-2317/ +CVE-2023-2318 - https://github.com/marktext/marktext/issues/3618 +CVE-2023-2318 - https://starlabs.sg/advisories/23/23-2318/ +CVE-2023-2322 - https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67 +CVE-2023-2323 - https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3 +CVE-2023-2327 - https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6 +CVE-2023-23277 - https://github.com/pawelmalak/snippet-box/issues/57 +CVE-2023-23279 - https://hackmd.io/mG658E9iSW6TkbS8xAuUNg +CVE-2023-2328 - https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6 +CVE-2023-23286 - http://packetstormsecurity.com/files/171734/Provide-Server-14.4-XSS-Cross-Site-Request-Forgery-Code-Execution.html +CVE-2023-23286 - https://f20.be/cves/provide-server-v-14-4 +CVE-2023-23294 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ +CVE-2023-23295 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ +CVE-2023-23296 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/ +CVE-2023-23298 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23298.md +CVE-2023-23299 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23299.md +CVE-2023-23300 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23300.md +CVE-2023-23301 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23301.md +CVE-2023-23302 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23302.md +CVE-2023-23303 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23303.md +CVE-2023-23304 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23304.md +CVE-2023-23305 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23305.md +CVE-2023-23306 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23306.md +CVE-2023-23315 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/01/stripejs.html +CVE-2023-23326 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md +CVE-2023-23327 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md +CVE-2023-23328 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md +CVE-2023-23330 - https://medium.com/@saleh.py/amano-xparc-local-file-inclusion-cve-2023-23330-672ae8fbfd1e +CVE-2023-23331 - https://0xhunter20.medium.com/how-i-found-my-first-blind-sql-injection-cve-2023-23331-aef103a7f73c +CVE-2023-23333 - http://packetstormsecurity.com/files/174537/SolarView-Compact-6.00-Remote-Command-Execution.html +CVE-2023-23333 - https://github.com/Timorlover/CVE-2023-23333 +CVE-2023-2336 - https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14 +CVE-2023-2338 - https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462 +CVE-2023-2339 - https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2 +CVE-2023-23399 - http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html +CVE-2023-2340 - https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b +CVE-2023-23408 - http://packetstormsecurity.com/files/173134/Azure-Apache-Ambari-2302250400-Spoofing.html +CVE-2023-2341 - https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d +CVE-2023-2342 - https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829 +CVE-2023-23420 - http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html +CVE-2023-23420 - http://packetstormsecurity.com/files/171867/Microsoft-Windows-Kernel-New-Registry-Key-name-Insufficient-Validation.html +CVE-2023-23421 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html +CVE-2023-23422 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html +CVE-2023-23423 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html +CVE-2023-2343 - https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2 +CVE-2023-23454 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12 +CVE-2023-23455 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b +CVE-2023-23456 - https://github.com/upx/upx/issues/632 +CVE-2023-23457 - https://github.com/upx/upx/issues/631 +CVE-2023-23488 - http://packetstormsecurity.com/files/171661/WordPress-Paid-Memberships-Pro-2.9.8-SQL-Injection.html +CVE-2023-23488 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-23489 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-23490 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-23491 - https://www.tenable.com/security/research/tra-2023-3 +CVE-2023-23492 - https://www.tenable.com/security/research/tra-2023-3 +CVE-2023-23514 - http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html +CVE-2023-23514 - http://seclists.org/fulldisclosure/2023/Mar/21 +CVE-2023-23529 - http://seclists.org/fulldisclosure/2023/Mar/20 +CVE-2023-23546 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1705 +CVE-2023-23547 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1695 +CVE-2023-23550 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694 +CVE-2023-2356 - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896 +CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository +CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md +CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository +CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md +CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository +CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md +CVE-2023-23567 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1729 +CVE-2023-23571 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1696 +CVE-2023-23581 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1741 +CVE-2023-23599 - https://bugzilla.mozilla.org/show_bug.cgi?id=1777800 +CVE-2023-23607 - https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq +CVE-2023-23608 - https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v +CVE-2023-2361 - https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7 +CVE-2023-23614 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-33w4-xf7m-f82m +CVE-2023-2363 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-SQL-Injection-1.md +CVE-2023-23634 - https://herolab.usd.de/en/security-advisories/usd-2022-0066/ +CVE-2023-23635 - https://herolab.usd.de/security-advisories/usd-2022-0031/ +CVE-2023-23636 - https://herolab.usd.de/security-advisories/usd-2022-0030/ +CVE-2023-2364 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-Stored-Cross-Site-Scripting-1.md +CVE-2023-2366 - https://vuldb.com/?id.227642 +CVE-2023-2374 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/6 +CVE-2023-2374 - https://vuldb.com/?id.227650 +CVE-2023-23770 - https://tetraburst.com/ +CVE-2023-23771 - https://tetraburst.com/ +CVE-2023-23772 - https://tetraburst.com/ +CVE-2023-23773 - https://tetraburst.com/ +CVE-2023-23774 - https://tetraburst.com/ +CVE-2023-2378 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/4 +CVE-2023-2380 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/17 +CVE-2023-2382 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/1 +CVE-2023-2382 - https://vuldb.com/?id.227660 +CVE-2023-2383 - https://vuldb.com/?id.227661 +CVE-2023-2384 - https://vuldb.com/?id.227662 +CVE-2023-2385 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/5 +CVE-2023-23851 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23852 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23853 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23854 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23855 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23856 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23857 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23858 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23859 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-23860 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-2389 - https://vuldb.com/?id.227667 +CVE-2023-2390 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/10 +CVE-2023-23902 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1697 +CVE-2023-23907 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702 +CVE-2023-2391 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/11 +CVE-2023-2392 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/12 +CVE-2023-2392 - https://vuldb.com/?id.227670 +CVE-2023-23924 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg +CVE-2023-23927 - https://github.com/craftcms/cms/security/advisories/GHSA-qcrj-6ffc-v7hq +CVE-2023-2393 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/13 +CVE-2023-2393 - https://vuldb.com/?id.227671 +CVE-2023-2394 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/14 +CVE-2023-23948 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/ +CVE-2023-2395 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/15 +CVE-2023-2395 - https://vuldb.com/?id.227673 +CVE-2023-23956 - http://packetstormsecurity.com/files/173038/Symantec-SiteMinder-WebAgent-12.52-Cross-Site-Scripting.html +CVE-2023-2396 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/16 +CVE-2023-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715 +CVE-2023-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718 +CVE-2023-24033 - http://packetstormsecurity.com/files/172137/Shannon-Baseband-accept-type-SDP-Attribute-Memory-Corruption.html +CVE-2023-24039 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt +CVE-2023-24039 - https://security.humanativaspa.it/nothing-new-under-the-sun/ +CVE-2023-2404 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-24040 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt +CVE-2023-24040 - https://security.humanativaspa.it/nothing-new-under-the-sun/ +CVE-2023-24044 - https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae +CVE-2023-24044 - https://medium.com/@jetnipat.tho/cve-2023-24044-10e48ab940d8 +CVE-2023-24045 - https://dataiku.com +CVE-2023-24045 - https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b +CVE-2023-24046 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-24047 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-24048 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-24049 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-2405 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-24050 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-24051 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-24052 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ +CVE-2023-24055 - https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/ +CVE-2023-2406 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-24068 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/ +CVE-2023-24069 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/ +CVE-2023-2407 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-24078 - http://packetstormsecurity.com/files/173279/FuguHub-8.1-Remote-Code-Execution.html +CVE-2023-24078 - https://github.com/ojan2021/Fuguhub-8.1-RCE +CVE-2023-24095 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md +CVE-2023-24096 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md +CVE-2023-24097 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/03/README.md +CVE-2023-24098 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/04/README.md +CVE-2023-24099 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md +CVE-2023-24114 - https://github.com/typecho/typecho/issues/1523 +CVE-2023-24117 - https://oxnan.com/posts/WifiBasic_wepauth_5g_DoS +CVE-2023-24118 - https://oxnan.com/posts/WifiBasic_security_DoS +CVE-2023-24119 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS +CVE-2023-24120 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS +CVE-2023-24121 - https://oxnan.com/posts/WifiBasic_security_5g_DoS +CVE-2023-24122 - https://oxnan.com/posts/WifiBasic_ssid_5g_DoS +CVE-2023-24123 - https://oxnan.com/posts/WifiBasic_wepauth_DoS +CVE-2023-24124 - https://oxnan.com/posts/WifiBasic_wrlEn_DoS +CVE-2023-24125 - https://oxnan.com/posts/WifiBasic_wepkey2_5g_DoS +CVE-2023-24126 - https://oxnan.com/posts/WifiBasic_wepkey4_5g_DoS +CVE-2023-24127 - https://oxnan.com/posts/WifiBasic_wepkey1_DoS +CVE-2023-24128 - https://oxnan.com/posts/WifiBasic_wepkey2_DoS +CVE-2023-24129 - https://oxnan.com/posts/WifiBasic_wepkey4_DoS +CVE-2023-24130 - https://oxnan.com/posts/WifiBasic_wepkey_DoS +CVE-2023-24131 - https://oxnan.com/posts/WifiBasic_wepkey1_5g_DoS +CVE-2023-24132 - https://oxnan.com/posts/WifiBasic_wepkey3_5g_DoS +CVE-2023-24133 - https://oxnan.com/posts/WifiBasic_wepkey_5g_DoS +CVE-2023-24134 - https://oxnan.com/posts/WifiBasic_wepkey3_DoS +CVE-2023-24135 - https://oxnan.com/posts/WriteFacMac-Command-Injection +CVE-2023-24138 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/NTPSyncWithHost/NTPSyncWithHost.md +CVE-2023-2414 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-2415 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-24150 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveDlfw/meshSlaveDlfw.md +CVE-2023-24151 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md +CVE-2023-24152 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveUpdate/meshSlaveUpdate.md +CVE-2023-24153 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md +CVE-2023-24154 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/setUpgradeFW/setUpgradeFW.md +CVE-2023-24156 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveUpgstatus/recvSlaveUpgstatus.md +CVE-2023-24157 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/updateWifiInfo/updateWifiInfo.md +CVE-2023-24159 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md +CVE-2023-2416 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita +CVE-2023-24160 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admuser/setPasswordCfg_admuser.md +CVE-2023-24164 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/4/4.md +CVE-2023-24165 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/7/7.md +CVE-2023-24166 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md +CVE-2023-24167 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/1/1.md +CVE-2023-24169 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/6/6.md +CVE-2023-2417 - http://packetstormsecurity.com/files/172105/Advanced-Host-Monitor-12.56-Unquoted-Service-Path.html +CVE-2023-24170 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/3/3.md +CVE-2023-24181 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-9gqg-pp5p-q9hg +CVE-2023-24182 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-7vqh-2r8q-rjg2 +CVE-2023-24205 - https://github.com/Fndroid/clash_for_windows_pkg/issues/3891 +CVE-2023-2421 - https://youtu.be/4JOLhAuoizE +CVE-2023-24212 - https://github.com/Venus-WQLab/bug_report/blob/main/Tenda/CVE-2023-24212.md +CVE-2023-24212 - https://github.com/w0x68y/cve-lists/blob/main/Tenda/vuln/readme.md +CVE-2023-24217 - http://packetstormsecurity.com/files/171252/Agilebio-Lab-Collector-4.234-Remote-Code-Execution.html +CVE-2023-24229 - https://github.com/sadwwcxz/Vul +CVE-2023-24229 - https://web.archive.org/web/20230315181013/https://github.com/sadwwcxz/Vul +CVE-2023-24230 - https://medium.com/@0x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a +CVE-2023-24231 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b +CVE-2023-24232 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b +CVE-2023-24233 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b +CVE-2023-24234 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b +CVE-2023-24236 - https://github.com/Am1ngl/ttt/tree/main/19 +CVE-2023-24238 - https://github.com/Am1ngl/ttt/tree/main/20 +CVE-2023-24251 - https://github.com/Cutegod/CMS_0_day/issues/2 +CVE-2023-2426 - https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425 +CVE-2023-24261 - https://justinapplegate.me/2023/glinet-CVE-2023-24261/ +CVE-2023-24269 - https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md +CVE-2023-2427 - https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d +CVE-2023-24276 - https://github.com/Am1ngl/ttt/tree/main/18 +CVE-2023-24279 - https://www.edoardoottavianelli.it/CVE-2023-24279 +CVE-2023-24279 - https://www.youtube.com/watch?v=1mSXzzwcGMM +CVE-2023-2428 - https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e +CVE-2023-24282 - https://www.cryptnetix.com/blog/2023/01/19/Polycom-Trio-Vulnerability-Disclosure.html +CVE-2023-2429 - https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540 +CVE-2023-24317 - https://packetstormsecurity.com/files/170205/Judging-Management-System-1.0-Shell-Upload.html +CVE-2023-24320 - https://yuyudhn.github.io/CVE-2023-24320/ +CVE-2023-24322 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md +CVE-2023-24323 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md +CVE-2023-24329 - https://github.com/python/cpython/issues/102153 +CVE-2023-24330 - https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330 +CVE-2023-24331 - https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331 +CVE-2023-24332 - https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332 +CVE-2023-24333 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333 +CVE-2023-24334 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334 +CVE-2023-24343 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/01 +CVE-2023-24344 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01 +CVE-2023-24345 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/03 +CVE-2023-24346 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/02 +CVE-2023-24347 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/02 +CVE-2023-24348 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/02 +CVE-2023-24349 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/04 +CVE-2023-24350 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03 +CVE-2023-24351 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/01 +CVE-2023-24352 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/03 +CVE-2023-24364 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md +CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md +CVE-2023-2437 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html +CVE-2023-2437 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2438 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2439 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2440 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2446 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html +CVE-2023-2446 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2447 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-24472 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709 +CVE-2023-24473 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707 +CVE-2023-24479 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762 +CVE-2023-2448 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html +CVE-2023-2448 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2449 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html +CVE-2023-2449 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-24496 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 +CVE-2023-24497 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 +CVE-2023-2451 - https://vuldb.com/?id.227795 +CVE-2023-24519 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706 +CVE-2023-24520 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706 +CVE-2023-24521 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24522 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24523 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24524 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24525 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24526 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24527 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24529 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24530 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-24582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710 +CVE-2023-24583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710 +CVE-2023-24585 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725 +CVE-2023-24595 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713 +CVE-2023-24609 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 +CVE-2023-24620 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md +CVE-2023-24621 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md +CVE-2023-24626 - https://www.exploit-db.com/exploits/51252 +CVE-2023-24651 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24652 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24653 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24654 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24656 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24671 - https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae +CVE-2023-24671 - https://packetstormsecurity.com/files/171300/VX-Search-13.8-Unquoted-Service-Path.html +CVE-2023-24674 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107 +CVE-2023-24674 - https://medium.com/@cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107 +CVE-2023-24675 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107 +CVE-2023-24684 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md +CVE-2023-24685 - http://packetstormsecurity.com/files/172047/ChurchCRM-4.5.3-SQL-Injection.html +CVE-2023-24685 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md +CVE-2023-24686 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md +CVE-2023-24687 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md +CVE-2023-24688 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md +CVE-2023-24689 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md +CVE-2023-24690 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md +CVE-2023-24698 - https://foswiki.org/Support/SecurityAlert-CVE-2023-24698 +CVE-2023-24709 - http://packetstormsecurity.com/files/171783/Paradox-Security-Systems-IPR512-Denial-Of-Service.html +CVE-2023-24709 - https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 +CVE-2023-24709 - https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 +CVE-2023-24720 - https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss +CVE-2023-24721 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-24721/CVE-2023-24721.md +CVE-2023-24728 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24729 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24730 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24731 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24732 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip +CVE-2023-24733 - https://github.com/AetherBlack/CVE/tree/main/PMB +CVE-2023-24734 - https://github.com/AetherBlack/CVE/tree/main/PMB +CVE-2023-24735 - https://github.com/AetherBlack/CVE/tree/main/PMB +CVE-2023-24736 - https://github.com/AetherBlack/CVE/tree/main/PMB +CVE-2023-24737 - https://github.com/AetherBlack/CVE/tree/main/PMB +CVE-2023-2474 - https://vuldb.com/?id.227866 +CVE-2023-24751 - https://github.com/strukturag/libde265/issues/379 +CVE-2023-24752 - https://github.com/strukturag/libde265/issues/378 +CVE-2023-24754 - https://github.com/strukturag/libde265/issues/382 +CVE-2023-24755 - https://github.com/strukturag/libde265/issues/384 +CVE-2023-24756 - https://github.com/strukturag/libde265/issues/380 +CVE-2023-24757 - https://github.com/strukturag/libde265/issues/385 +CVE-2023-24758 - https://github.com/strukturag/libde265/issues/383 +CVE-2023-2476 - https://vuldb.com/?id.227868 +CVE-2023-24762 - https://hackmd.io/@uuXne2y3RjOdpWM87fw6_A/HyPK04zho +CVE-2023-24763 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/06/xenforum.html +CVE-2023-24769 - https://www.edoardoottavianelli.it/CVE-2023-24769 +CVE-2023-24769 - https://www.youtube.com/watch?v=TRTpRlkU3Hc +CVE-2023-24773 - https://github.com/funadmin/funadmin/issues/4 +CVE-2023-24774 - https://github.com/funadmin/funadmin/issues/12 +CVE-2023-24775 - https://github.com/funadmin/funadmin/issues/9 +CVE-2023-24780 - https://github.com/funadmin/funadmin/issues/6 +CVE-2023-24781 - https://github.com/funadmin/funadmin/issues/8 +CVE-2023-24782 - https://github.com/funadmin/funadmin/issues/3 +CVE-2023-24785 - https://sourceforge.net/p/peazip/tickets/734/ +CVE-2023-24788 - http://packetstormsecurity.com/files/171804/NotrinosERP-0.7-SQL-Injection.html +CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.md +CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.py +CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/NotrinosERP/POC.md +CVE-2023-24797 - https://github.com/DrizzlingSun/D-link/blob/main/Dir882/1/1.md +CVE-2023-24798 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/2/2.md +CVE-2023-24799 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/1/1.md +CVE-2023-24800 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/3/3.md +CVE-2023-24804 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/ +CVE-2023-24805 - https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x +CVE-2023-24808 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf +CVE-2023-24815 - https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38 +CVE-2023-24816 - https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7 +CVE-2023-24824 - https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh +CVE-2023-2485 - https://gitlab.com/gitlab-org/gitlab/-/issues/407830 +CVE-2023-2497 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-2507 - https://fluidattacks.com/advisories/maiden/ +CVE-2023-25076 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731 +CVE-2023-25081 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25082 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25083 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25084 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25085 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25086 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25087 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25088 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25089 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25090 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25091 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25092 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25093 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25094 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25095 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25096 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25097 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25098 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25099 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25100 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25101 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25102 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25103 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25104 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25105 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25106 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25107 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25108 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25109 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25110 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25111 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25112 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25113 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25114 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25115 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25116 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25117 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25118 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25119 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25120 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25121 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25122 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25123 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 +CVE-2023-25135 - https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable +CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/13/1 +CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/22/1 +CVE-2023-25136 - https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/ +CVE-2023-25136 - https://news.ycombinator.com/item?id=34711565 +CVE-2023-25156 - https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/ +CVE-2023-2516 - https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716 +CVE-2023-25171 - https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e +CVE-2023-25173 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ +CVE-2023-25181 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726 +CVE-2023-25187 - http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html +CVE-2023-2519 - https://vuldb.com/?id.228010 +CVE-2023-25194 - http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html +CVE-2023-25206 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html +CVE-2023-25207 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/09/dpdfrance.html +CVE-2023-25210 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/1/1.md +CVE-2023-25211 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md +CVE-2023-25212 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/6/6.md +CVE-2023-25213 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/5/5.md +CVE-2023-25214 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/4/4.md +CVE-2023-25215 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/3/3.md +CVE-2023-25216 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md +CVE-2023-25217 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/10/10.md +CVE-2023-25218 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/8/8.md +CVE-2023-25219 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/11/11.md +CVE-2023-25220 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/7/7.md +CVE-2023-25221 - https://github.com/strukturag/libde265/issues/388 +CVE-2023-25222 - https://github.com/LibreDWG/libredwg/issues/615 +CVE-2023-2523 - https://github.com/RCEraser/cve/blob/main/Weaver.md +CVE-2023-25231 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104 +CVE-2023-25233 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113 +CVE-2023-25234 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_1 +CVE-2023-25235 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2 +CVE-2023-25240 - https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions +CVE-2023-25260 - https://cves.at/posts/cve-2023-25260/writeup/ +CVE-2023-25261 - https://cves.at/posts/cve-2023-25261/writeup/ +CVE-2023-25262 - https://cves.at/posts/cve-2023-25262/writeup/ +CVE-2023-25263 - https://cves.at/posts/cve-2023-25263/writeup/ +CVE-2023-25264 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html +CVE-2023-25265 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html +CVE-2023-25266 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html +CVE-2023-25267 - https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599 +CVE-2023-25279 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20In%20tools_AccountName +CVE-2023-25280 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20in%20pingV4Msg +CVE-2023-25281 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing +CVE-2023-25282 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo +CVE-2023-25283 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20%20in%20reserveDHCP_HostName_1.1.1.0 +CVE-2023-25289 - https://www.exploit-db.com/exploits/51142 +CVE-2023-25309 - https://cxsecurity.com/issue/WLB-2023050012 +CVE-2023-25309 - https://packetstormsecurity.com/files/172185/Rollout-UI-0.5-Cross-Site-Scripting.html +CVE-2023-2531 - https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02 +CVE-2023-25313 - https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw +CVE-2023-25330 - https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md +CVE-2023-25344 - https://github.com/node-swig/swig-templates/issues/89 +CVE-2023-25344 - https://www.gem-love.com/2023/02/01/Swig%E6%A8%A1%E6%9D%BF%E5%BC%95%E6%93%8E0day%E6%8C%96%E6%8E%98-%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E5%92%8C%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/ +CVE-2023-25345 - https://github.com/node-swig/swig-templates/issues/88 +CVE-2023-25346 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25346 +CVE-2023-25347 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25347 +CVE-2023-25348 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25348 +CVE-2023-25355 - https://seclists.org/fulldisclosure/2023/Mar/5 +CVE-2023-25356 - https://seclists.org/fulldisclosure/2023/Mar/5 +CVE-2023-25366 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25366.md +CVE-2023-25367 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md +CVE-2023-25368 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md +CVE-2023-25369 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25369.md +CVE-2023-25394 - https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/ +CVE-2023-25395 - https://github.com/Am1ngl/ttt/tree/main/22 +CVE-2023-25403 - https://github.com/CleverStupidDog/yf-exam/issues/2 +CVE-2023-25428 - https://packetstormsecurity.com/files/172259/Soft-o-Free-Password-Manager-1.1.20-DLL-Hijacking.html +CVE-2023-25431 - https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md +CVE-2023-25433 - https://gitlab.com/libtiff/libtiff/-/issues/520 +CVE-2023-25434 - https://gitlab.com/libtiff/libtiff/-/issues/519 +CVE-2023-25435 - https://gitlab.com/libtiff/libtiff/-/issues/518 +CVE-2023-25438 - https://packetstormsecurity.com/files/172052/MilleGPG5-5.9.2-Local-Privilege-Escalation.html +CVE-2023-25439 - https://packetstormsecurity.com/files/172556/FusionInvoice-2023-1.0-Cross-Site-Scripting.html +CVE-2023-25440 - https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html +CVE-2023-2550 - https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b +CVE-2023-2551 - https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c +CVE-2023-2552 - https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32 +CVE-2023-2553 - https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf +CVE-2023-2554 - https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b +CVE-2023-25572 - https://github.com/marmelab/react-admin/pull/8644 +CVE-2023-25572 - https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v +CVE-2023-25582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723 +CVE-2023-25583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723 +CVE-2023-25585 - https://sourceware.org/bugzilla/show_bug.cgi?id=29892 +CVE-2023-25586 - https://sourceware.org/bugzilla/show_bug.cgi?id=29855 +CVE-2023-25588 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677 +CVE-2023-25614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-25615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-25616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-25617 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-25618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-2564 - https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461 +CVE-2023-2566 - https://huntr.dev/bounties/47d6fc2a-989a-44eb-9cb7-ab4f8bd44496 +CVE-2023-25690 - http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html +CVE-2023-25717 - https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/ +CVE-2023-25718 - https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/ +CVE-2023-25718 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity +CVE-2023-25719 - https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/ +CVE-2023-25719 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity +CVE-2023-25728 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790345 +CVE-2023-25729 - https://bugzilla.mozilla.org/show_bug.cgi?id=1792138 +CVE-2023-2573 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html +CVE-2023-2573 - http://seclists.org/fulldisclosure/2023/May/4 +CVE-2023-2573 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ +CVE-2023-25732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1804564 +CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1809923 +CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810143 +CVE-2023-2574 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html +CVE-2023-2574 - http://seclists.org/fulldisclosure/2023/May/4 +CVE-2023-2574 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ +CVE-2023-25741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813376 +CVE-2023-25743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1800203 +CVE-2023-25748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1798798 +CVE-2023-25749 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810705 +CVE-2023-2575 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html +CVE-2023-2575 - http://seclists.org/fulldisclosure/2023/May/4 +CVE-2023-2575 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/ +CVE-2023-25750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1814733 +CVE-2023-25774 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743 +CVE-2023-2579 - https://github.com/daniloalbuqrque/poc-cve-xss-inventory-press-plugin +CVE-2023-25810 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296 +CVE-2023-25811 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp +CVE-2023-25814 - https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j +CVE-2023-2582 - https://www.tenable.com/security/research/tra-2023-18 +CVE-2023-25826 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html +CVE-2023-2583 - https://huntr.dev/bounties/397ea68d-1e28-44ff-b830-c8883d067d96 +CVE-2023-25848 - https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/ +CVE-2023-2590 - https://huntr.dev/bounties/a4238a30-3ddb-4415-9055-e179c3d4dea7 +CVE-2023-2591 - https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b +CVE-2023-2598 - https://www.openwall.com/lists/oss-security/2023/05/08/3 +CVE-2023-2601 - http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html +CVE-2023-26033 - https://github.com/gentoo/soko/security/advisories/GHSA-gp8g-jfq9-5q2g +CVE-2023-26034 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrx +CVE-2023-26035 - http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html +CVE-2023-26043 - https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8 +CVE-2023-2605 - http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html +CVE-2023-2605 - https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb +CVE-2023-26067 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html +CVE-2023-26068 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html +CVE-2023-26071 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2023-26072 - http://packetstormsecurity.com/files/171378/Shannon-Baseband-NrmmMsgCodec-Emergency-Number-List-Heap-Buffer-Overflow.html +CVE-2023-26073 - http://packetstormsecurity.com/files/171380/Shannon-Baseband-NrmmMsgCodec-Extended-Emergency-Number-List-Heap-Buffer-Overflow.html +CVE-2023-26074 - http://packetstormsecurity.com/files/171383/Shannon-Baseband-NrmmMsgCodec-Access-Category-Definitions-Heap-Buffer-Overflow.html +CVE-2023-26075 - http://packetstormsecurity.com/files/171387/Shannon-Baseband-NrmmMsgCodec-Intra-Object-Overflow.html +CVE-2023-26076 - http://packetstormsecurity.com/files/171400/Shannon-Baseband-NrSmPcoCodec-Intra-Object-Overflow.html +CVE-2023-26081 - https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x +CVE-2023-2609 - https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622 +CVE-2023-2610 - https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d +CVE-2023-26102 - https://github.com/timdown/rangy/issues/478 +CVE-2023-26102 - https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 +CVE-2023-26103 - https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970 +CVE-2023-26104 - https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde +CVE-2023-26104 - https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703 +CVE-2023-26105 - https://github.com/mde/utilities/issues/29 +CVE-2023-26105 - https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491 +CVE-2023-26106 - https://security.snyk.io/vuln/SNYK-JS-DOTLENS-3227646 +CVE-2023-26107 - https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969 +CVE-2023-26109 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTHSERIALPORT-3311820 +CVE-2023-26110 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821 +CVE-2023-26111 - https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc +CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928 +CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927 +CVE-2023-26112 - https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 +CVE-2023-26113 - https://github.com/kobezzza/Collection/issues/27 +CVE-2023-26113 - https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148 +CVE-2023-26114 - https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148 +CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657 +CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973 +CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320 +CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322 +CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321 +CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044 +CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323 +CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325 +CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324 +CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045 +CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326 +CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328 +CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327 +CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046 +CVE-2023-26119 - https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEHTMLUNIT-3252500 +CVE-2023-2612 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html +CVE-2023-2612 - https://ubuntu.com/security/CVE-2023-2612 +CVE-2023-2612 - https://ubuntu.com/security/notices/USN-6127-1 +CVE-2023-26120 - https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764 +CVE-2023-26121 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373062 +CVE-2023-26122 - https://github.com/hacksparrow/safe-eval/issues/27 +CVE-2023-26122 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064 +CVE-2023-26123 - https://security.snyk.io/vuln/SNYK-UNMANAGED-RAYSAN5RAYLIB-5421188 +CVE-2023-26125 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285 +CVE-2023-26126 - https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998 +CVE-2023-26126 - https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915 +CVE-2023-26127 - https://security.snyk.io/vuln/SNYK-JS-N158-3183746 +CVE-2023-26128 - https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165 +CVE-2023-26129 - https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876 +CVE-2023-26130 - https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280 +CVE-2023-26130 - https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194 +CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111 +CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112 +CVE-2023-26132 - https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763 +CVE-2023-26133 - https://security.snyk.io/vuln/SNYK-JS-PROGRESSBARJS-3184152 +CVE-2023-26134 - https://github.com/JPeer264/node-git-commit-info/issues/24 +CVE-2023-26134 - https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174 +CVE-2023-26135 - https://github.com/brycebaril/node-flatnest/issues/4 +CVE-2023-26135 - https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149 +CVE-2023-26136 - https://github.com/salesforce/tough-cookie/issues/282 +CVE-2023-26136 - https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873 +CVE-2023-26137 - https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a +CVE-2023-26137 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 +CVE-2023-26138 - https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b +CVE-2023-26138 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555 +CVE-2023-26139 - https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252 +CVE-2023-26139 - https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714 +CVE-2023-2614 - https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6 +CVE-2023-26140 - https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658 +CVE-2023-26141 - https://gist.github.com/keeganparr1/1dffd3c017339b7ed5371ed3d81e6b2a +CVE-2023-26141 - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107 +CVE-2023-26142 - https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c +CVE-2023-26142 - https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 +CVE-2023-26143 - https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318 +CVE-2023-26144 - https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181 +CVE-2023-26145 - https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca +CVE-2023-26145 - https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 +CVE-2023-26146 - https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20 +CVE-2023-26146 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766 +CVE-2023-26147 - https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b +CVE-2023-26147 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 +CVE-2023-26148 - https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e +CVE-2023-26148 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769 +CVE-2023-26149 - https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549 +CVE-2023-2615 - https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a +CVE-2023-26150 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673435 +CVE-2023-26151 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 +CVE-2023-26152 - https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d +CVE-2023-26152 - https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341 +CVE-2023-26153 - https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d +CVE-2023-26153 - https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323 +CVE-2023-26155 - https://github.com/nrhirani/node-qpdf/issues/23 +CVE-2023-26155 - https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918 +CVE-2023-26156 - https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18 +CVE-2023-26156 - https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539 +CVE-2023-26157 - https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730 +CVE-2023-26158 - https://security.snyk.io/vuln/SNYK-JS-MOCKJS-6051365 +CVE-2023-26159 - https://github.com/follow-redirects/follow-redirects/issues/235 +CVE-2023-26159 - https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137 +CVE-2023-2616 - https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801 +CVE-2023-2617 - https://github.com/opencv/opencv_contrib/pull/3480 +CVE-2023-2620 - https://gitlab.com/gitlab-org/gitlab/-/issues/410433 +CVE-2023-26213 - http://seclists.org/fulldisclosure/2023/Mar/2 +CVE-2023-26213 - https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ +CVE-2023-2624 - http://packetstormsecurity.com/files/174895/WordPress-KiviCare-3.2.0-Cross-Site-Scripting.html +CVE-2023-26255 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md +CVE-2023-26256 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26256.md +CVE-2023-2629 - https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01 +CVE-2023-2630 - https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e +CVE-2023-26314 - https://www.openwall.com/lists/oss-security/2023/01/05/1 +CVE-2023-26325 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-26326 - https://www.tenable.com/security/research/tra-2023-7 +CVE-2023-2636 - http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html +CVE-2023-2636 - https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5 +CVE-2023-26360 - http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html +CVE-2023-26427 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26428 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26429 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26430 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26431 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26432 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26433 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26434 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26435 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26436 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html +CVE-2023-26438 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26439 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26440 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26441 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26442 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26443 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26445 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26446 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26447 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26448 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26449 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26450 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26451 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html +CVE-2023-26457 - https://launchpad.support.sap.com/#/notes/3281484 +CVE-2023-26457 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-26458 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-26459 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-26460 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-26461 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-26469 - http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html +CVE-2023-26469 - https://github.com/Orange-Cyberdefense/CVE-repository/tree/master +CVE-2023-2647 - https://github.com/sunyixuan1228/cve/blob/main/weaver%20exec.md +CVE-2023-26475 - https://jira.xwiki.org/browse/XWIKI-20360 +CVE-2023-2648 - https://github.com/sunyixuan1228/cve/blob/main/weaver.md +CVE-2023-26485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5 +CVE-2023-26486 - https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4 +CVE-2023-26487 - https://github.com/vega/vega/security/advisories/GHSA-w5m3-xh75-mp55 +CVE-2023-2649 - https://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md +CVE-2023-26490 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3j2f-wf52-cjg7 +CVE-2023-26492 - https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h +CVE-2023-26493 - https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/ +CVE-2023-26494 - https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/ +CVE-2023-26510 - https://ghost.org/docs/security/ +CVE-2023-26510 - https://gist.github.com/yurahod/2e11eabbe4b92ef1d44b08e37023ecfb +CVE-2023-26510 - https://gist.github.com/yurahod/828d5e6a077c12f3f74c6485d1c7f0e7 +CVE-2023-2652 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md#2classesmasterphpfdelete_item +CVE-2023-2653 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md +CVE-2023-2653 - https://vuldb.com/?id.228781 +CVE-2023-26556 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b +CVE-2023-26557 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b +CVE-2023-2656 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/AC-Repair-and-Services-System---SQL-injections.md +CVE-2023-2657 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#1xss-vulnerability-in-productsphp +CVE-2023-2658 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#2sql-injection-vulnerability-in-productsphp +CVE-2023-2658 - https://vuldb.com/?id.228800 +CVE-2023-2659 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#3sql-injection-vulnerability-in-view_productphp +CVE-2023-2660 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#4sql-injection-vulnerability-in-view_categoriesphp +CVE-2023-2660 - https://vuldb.com/?id.228802 +CVE-2023-26602 - http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html +CVE-2023-26602 - http://seclists.org/fulldisclosure/2023/Feb/15 +CVE-2023-26602 - https://nwsec.de/NWSSA-002-2023.txt +CVE-2023-26604 - http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html +CVE-2023-26604 - https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/ +CVE-2023-26609 - http://packetstormsecurity.com/files/171136/ABUS-Security-Camera-TVIP-20000-21150-LFI-Remote-Code-Execution.html +CVE-2023-26609 - http://seclists.org/fulldisclosure/2023/Feb/16 +CVE-2023-26609 - https://nwsec.de/NWSSA-001-2023.txt +CVE-2023-2661 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#5sql-injection-vulnerability-in-classesmasterphp +CVE-2023-26612 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo +CVE-2023-26613 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell +CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1 +CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetMultipleActions +CVE-2023-26616 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo +CVE-2023-2662 - https://forum.xpdfreader.com/viewtopic.php?t=42505 +CVE-2023-2663 - https://forum.xpdfreader.com/viewtopic.php?t=42421 +CVE-2023-2664 - https://forum.xpdfreader.com/viewtopic.php?t=42422 +CVE-2023-2666 - https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f +CVE-2023-2667 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2667.md +CVE-2023-2668 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2668.md +CVE-2023-2669 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2669.md +CVE-2023-26692 - http://packetstormsecurity.com/files/171787/ZCBS-ZBBS-ZPBS-4.14k-Cross-Site-Scripting.html +CVE-2023-2670 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2670.md +CVE-2023-2670 - https://vuldb.com/?id.228886 +CVE-2023-2671 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md +CVE-2023-2672 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md +CVE-2023-26733 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md +CVE-2023-26733 - https://github.com/jkriege2/TinyTIFF/issues/19 +CVE-2023-26735 - https://github.com/prometheus/blackbox_exporter/issues/1024 +CVE-2023-2674 - https://huntr.dev/bounties/af73e913-730c-4245-88ce-26fc908d3644 +CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755 +CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955 +CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813 +CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351 +CVE-2023-26756 - https://googleinformationsworld.blogspot.com/2023/04/revive-adserver-541-vulnerable-to-brute.html +CVE-2023-26758 - https://www.swascan.com/it/security-advisory-sme-up-erp/ +CVE-2023-26759 - https://www.swascan.com/it/security-advisory-sme-up-erp/ +CVE-2023-2676 - https://github.com/xinzhihen06/dxq-cve/blob/main/h3cr160.md +CVE-2023-26760 - https://www.swascan.com/it/security-advisory-sme-up-erp/ +CVE-2023-26762 - https://www.swascan.com/it/security-advisory-sme-up-erp/ +CVE-2023-26767 - https://github.com/liblouis/liblouis/issues/1292 +CVE-2023-26768 - https://github.com/liblouis/liblouis/issues/1301 +CVE-2023-26773 - https://packetstormsecurity.com/files/171686/Sales-Tracker-Management-System-1.0-Cross-Site-Scripting.html +CVE-2023-26774 - https://packetstormsecurity.com/files/171692/Sales-Tracker-Management-System-1.0-Insecure-Direct-Object-Reference.html +CVE-2023-26775 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html +CVE-2023-26776 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html +CVE-2023-26777 - http://packetstormsecurity.com/files/171699/Uptime-Kuma-1.19.6-Cross-Site-Scripting.html +CVE-2023-26800 - https://github.com/winmt/my-vuls/tree/main/RG-EW1200 +CVE-2023-26801 - https://github.com/winmt/my-vuls/tree/main/LB-LINK%20BL-AC1900%2C%20BL-WR9000%2C%20BL-X26%20and%20BL-LTE300%20Wireless%20Routers +CVE-2023-26802 - https://github.com/winmt/my-vuls/tree/main/DCN%20DCBI-Netlog-LAB +CVE-2023-26805 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formIPMacBindModify.md +CVE-2023-26806 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/SetSysTime.md +CVE-2023-26817 - https://github.com/PGYER/codefever/issues/140 +CVE-2023-26820 - https://github.com/netptop/siteproxy/issues/67 +CVE-2023-26822 - https://github.com/yzskyt/Vuln/blob/main/Go-RT-AC750/Go-RT-AC750.md +CVE-2023-26839 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26839 +CVE-2023-26840 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26840 +CVE-2023-26841 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26841 +CVE-2023-26842 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842 +CVE-2023-26843 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26843 +CVE-2023-26848 - https://github.com/Am1ngl/ttt/tree/main/23 +CVE-2023-26858 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html +CVE-2023-26860 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/04/lgbudget.html +CVE-2023-26864 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/17/smplredirectionsmanager.html +CVE-2023-26865 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/20/bdroppy.html +CVE-2023-26876 - http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html +CVE-2023-26876 - https://gist.github.com/rodnt/a190d14d1715890d8df19bad58b90693 +CVE-2023-2690 - https://vuldb.com/?id.228971 +CVE-2023-2691 - https://vuldb.com/?id.228972 +CVE-2023-26912 - https://github.com/xenv/S-mall-ssm/issues/37 +CVE-2023-26913 - https://wanheiqiyihu.top/2023/02/13/Evolucare-Ecsimaging-new-movie-php%E5%8F%8D%E5%B0%84%E6%80%A7xss/ +CVE-2023-26918 - http://packetstormsecurity.com/files/171879/File-Replication-Pro-7.5.0-Insecure-Permissions-Privilege-Escalation.html +CVE-2023-26919 - https://github.com/javadelight/delight-nashorn-sandbox/issues/135 +CVE-2023-26921 - https://github.com/closethe/AG550QCN_CommandInjection_ql_atfwd/blob/main/README.md +CVE-2023-26922 - https://github.com/varigit/matrix-gui-v2/issues/1 +CVE-2023-26923 - https://github.com/musescore/MuseScore/issues/16346 +CVE-2023-26925 - https://github.com/laotun-s/POC/blob/main/CVE-2023-26925.txt +CVE-2023-2693 - https://vuldb.com/?id.228974 +CVE-2023-26934 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy +CVE-2023-26935 - https://github.com/huanglei3/xpdf_heapoverflow +CVE-2023-26936 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString +CVE-2023-26937 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring +CVE-2023-26938 - https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock +CVE-2023-26949 - https://github.com/keheying/onekeyadmin/issues/1 +CVE-2023-26950 - https://github.com/keheying/onekeyadmin/issues/9 +CVE-2023-26952 - https://github.com/keheying/onekeyadmin/issues/7 +CVE-2023-26953 - https://github.com/keheying/onekeyadmin/issues/8 +CVE-2023-26954 - https://github.com/keheying/onekeyadmin/issues/11 +CVE-2023-26956 - https://github.com/keheying/onekeyadmin/issues/4 +CVE-2023-26958 - https://medium.com/@shiva.infocop/stored-xss-park-ticketing-management-system-phpgurukul-893583dc2e20 +CVE-2023-26959 - https://medium.com/@shiva.infocop/authentication-bypass-park-ticketing-management-system-phpgurukul-427045159c05 +CVE-2023-2696 - https://vuldb.com/?id.228977 +CVE-2023-26961 - https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3 +CVE-2023-26966 - https://gitlab.com/libtiff/libtiff/-/issues/530 +CVE-2023-26974 - https://github.com/overXsky/IrfanviewPoc +CVE-2023-26976 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/AC6/205_1 +CVE-2023-26978 - https://github.com/Am1ngl/ttt/tree/main/28 +CVE-2023-26984 - https://github.com/Peppermint-Lab/peppermint/tree/master +CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw +CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw/edit +CVE-2023-2699 - https://vuldb.com/?id.228980 +CVE-2023-26991 - https://github.com/matthiaskramm/swftools/issues/196 +CVE-2023-26998 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/ +CVE-2023-26999 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/ +CVE-2023-27000 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/ +CVE-2023-27008 - https://plantplants213607121.wordpress.com/2023/02/16/atutor-2-2-1-cross-site-scripting-via-the-token-body-parameter/ +CVE-2023-27010 - https://packetstormsecurity.com/files/171301/Wondershare-Dr-Fone-12.9.6-Weak-Permissions-Privilege-Escalation.html +CVE-2023-27012 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/5/5.md +CVE-2023-27013 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/2/2.md +CVE-2023-27014 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/10/10.md +CVE-2023-27015 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/4/4.md +CVE-2023-27016 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/3/3.md +CVE-2023-27017 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/6/6.md +CVE-2023-27018 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/7/7.md +CVE-2023-27019 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/8/8.md +CVE-2023-27020 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/1/1.md +CVE-2023-27021 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/9/9.md +CVE-2023-27032 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/11/advancedpopupcreator.html +CVE-2023-27035 - https://forum.obsidian.md/t/embedded-web-pages-in-obsidian-canvas-can-use-sensitive-web-apis-without-the-users-permission-grant/54509 +CVE-2023-27035 - https://github.com/fivex3/CVE-2023-27035 +CVE-2023-27040 - https://www.exploit-db.com/exploits/50214 +CVE-2023-27042 - https://github.com/hujianjie123/vuln/blob/main/Tenda/SetFirewallCfg/readme.md +CVE-2023-27054 - https://github.com/miroslavpejic85/mirotalk/issues/139 +CVE-2023-27055 - https://github.com/StolidWaffle/AVer-PTZApp2 +CVE-2023-27059 - https://github.com/ChurchCRM/CRM/issues/6450 +CVE-2023-27061 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formWifiFilterRulesModify.md +CVE-2023-27062 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formPortalAuth.md +CVE-2023-27063 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formModifyDnsForward.md +CVE-2023-27064 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelDnsForward.md +CVE-2023-27065 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelWewifiPic.md +CVE-2023-27069 - https://www.edoardoottavianelli.it/CVE-2023-27069/ +CVE-2023-27069 - https://www.youtube.com/watch?v=Ryuz1gymiw8 +CVE-2023-27070 - https://www.edoardoottavianelli.it/CVE-2023-27070/ +CVE-2023-27070 - https://www.youtube.com/watch?v=4WJqcseH5qk +CVE-2023-27073 - https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt +CVE-2023-27077 - https://github.com/B2eFly/Router/blob/main/360/360D901.md +CVE-2023-27078 - https://github.com/B2eFly/Router/blob/main/TPLINK/MR3020/1.md +CVE-2023-27079 - https://github.com/B2eFly/Router/blob/main/Tenda/G103/2.md +CVE-2023-27098 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098 +CVE-2023-27100 - http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html +CVE-2023-27102 - https://github.com/strukturag/libde265/issues/393 +CVE-2023-27103 - https://github.com/strukturag/libde265/issues/394 +CVE-2023-27107 - https://gist.github.com/smidtbx10/f8ff1c4977b7f54886c6a52e9ef4e816 +CVE-2023-27114 - https://github.com/radareorg/radare2/issues/21363 +CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1938 +CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1992 +CVE-2023-27116 - https://github.com/WebAssembly/wabt/issues/1984 +CVE-2023-27117 - https://github.com/WebAssembly/wabt/issues/1989 +CVE-2023-27119 - https://github.com/WebAssembly/wabt/issues/1990 +CVE-2023-27121 - https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/ +CVE-2023-27130 - https://github.com/typecho/typecho/issues/1535 +CVE-2023-27131 - https://github.com/typecho/typecho/issues/1536 +CVE-2023-27132 - https://packetstormsecurity.com/files/174271 +CVE-2023-27133 - https://packetstormsecurity.com/files/174272 +CVE-2023-27135 - https://github.com/Am1ngl/ttt/tree/main/29 +CVE-2023-27159 - https://gist.github.com/b33t1e/43b26c31e895baf7e7aea2dbf9743a9a +CVE-2023-27159 - https://gist.github.com/b33t1e/e9e8192317c111e7897e04d2f9bf5fdb +CVE-2023-27160 - https://gist.github.com/b33t1e/6172286862a4486b5888f3cbbdc6316d +CVE-2023-27161 - https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952 +CVE-2023-27162 - https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08 +CVE-2023-27163 - http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html +CVE-2023-27163 - http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html +CVE-2023-27163 - https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3 +CVE-2023-27164 - https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867 +CVE-2023-27167 - https://packetstormsecurity.com/files/171523/Suprema-BioStar-2-2.8.16-SQL-Injection.html +CVE-2023-27179 - http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html +CVE-2023-2718 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins +CVE-2023-27191 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security +CVE-2023-27191 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27191/CVE%20detail.md +CVE-2023-27192 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security +CVE-2023-27192 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.md +CVE-2023-27193 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27193/CVE%20detail.md +CVE-2023-27225 - https://packetstormsecurity.com +CVE-2023-27229 - https://github.com/Am1ngl/ttt/tree/main/30 +CVE-2023-27231 - https://github.com/Am1ngl/ttt/tree/main/31 +CVE-2023-27232 - https://github.com/Am1ngl/ttt/tree/main/32 +CVE-2023-27233 - https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245 +CVE-2023-27234 - https://github.com/Cherry-toto/jizhicms/issues/85 +CVE-2023-27235 - https://github.com/Cherry-toto/jizhicms/issues/85 +CVE-2023-2724 - http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html +CVE-2023-27249 - https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc +CVE-2023-27249 - https://github.com/keepinggg/poc/tree/main/poc_of_swfdump +CVE-2023-27249 - https://github.com/matthiaskramm/swftools/issues/197 +CVE-2023-27253 - http://packetstormsecurity.com/files/173487/pfSense-Restore-RRD-Data-Command-Injection.html +CVE-2023-27263 - https://mattermost.com/security-updates/ +CVE-2023-27264 - https://mattermost.com/security-updates/ +CVE-2023-27265 - https://mattermost.com/security-updates/ +CVE-2023-27266 - https://mattermost.com/security-updates/ +CVE-2023-27267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27269 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27270 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27290 - http://packetstormsecurity.com/files/171770/IBM-Instana-243-0-Missing-Authentication.html +CVE-2023-27292 - https://www.tenable.com/security/research/tra-2023-8 +CVE-2023-27293 - https://www.tenable.com/security/research/tra-2023-8 +CVE-2023-27294 - https://www.tenable.com/security/research/tra-2023-8 +CVE-2023-27295 - https://www.tenable.com/security/research/tra-2023-8 +CVE-2023-2730 - https://huntr.dev/bounties/6c6f5c26-d545-4e7b-82bb-1fe28006c885 +CVE-2023-2731 - https://gitlab.com/libtiff/libtiff/-/issues/548 +CVE-2023-27350 - http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html +CVE-2023-27350 - http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html +CVE-2023-27350 - http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html +CVE-2023-27350 - http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html +CVE-2023-27350 - https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/ +CVE-2023-27372 - http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html +CVE-2023-27372 - http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html +CVE-2023-27379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1756 +CVE-2023-2738 - https://github.com/RCEraser/cve/blob/main/tongda.md +CVE-2023-27380 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780 +CVE-2023-27390 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744 +CVE-2023-27390 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744 +CVE-2023-27395 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735 +CVE-2023-27396 - https://www.fa.omron.co.jp/product/vulnerability/OMSR-2023-003_ja.pdf +CVE-2023-27396 - https://www.ia.omron.com/product/vulnerability/OMSR-2023-003_en.pdf +CVE-2023-2744 - http://packetstormsecurity.com/files/175106/WordPress-WP-ERP-1.12.2-SQL-Injection.html +CVE-2023-2745 - http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html +CVE-2023-27479 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv +CVE-2023-27482 - https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md +CVE-2023-27482 - https://www.elttam.com/blog/pwnassistant/ +CVE-2023-27487 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g +CVE-2023-27488 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph +CVE-2023-27491 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp +CVE-2023-27492 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 +CVE-2023-27493 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q +CVE-2023-27496 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5 +CVE-2023-27497 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27498 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27499 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27500 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27501 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27516 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754 +CVE-2023-2752 - https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4 +CVE-2023-27524 - http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html +CVE-2023-27524 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html +CVE-2023-2753 - https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628 +CVE-2023-2756 - https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44 +CVE-2023-27561 - https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9 +CVE-2023-27561 - https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334 +CVE-2023-27561 - https://github.com/opencontainers/runc/issues/3751 +CVE-2023-27566 - https://github.com/openl2d/moc3ingbird +CVE-2023-27568 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html +CVE-2023-27569 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/ +CVE-2023-27570 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/ +CVE-2023-27571 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/ +CVE-2023-27572 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/ +CVE-2023-2758 - https://www.tenable.com/security/research/tra-2023-21 +CVE-2023-27581 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2023-27586 - https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv +CVE-2023-27598 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-27599 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-27600 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-27601 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-27635 - https://bugs.debian.org/1031267 +CVE-2023-27637 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html +CVE-2023-27638 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html +CVE-2023-27639 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html +CVE-2023-27640 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html +CVE-2023-27641 - https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD +CVE-2023-27643 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27643/CVE%20detail.md +CVE-2023-27645 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27645/CVE%20detail.md +CVE-2023-27647 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md +CVE-2023-27648 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27648/CVE%20detail.md +CVE-2023-27649 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27649/CVE%20detail.md +CVE-2023-2765 - https://github.com/eckert-lcc/cve/blob/main/Weaver%20oa.md +CVE-2023-2765 - https://vuldb.com/?id.229270 +CVE-2023-27651 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27651/CVE%20detail.md +CVE-2023-27655 - https://forum.xpdfreader.com/viewtopic.php?t=42398 +CVE-2023-27655 - https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2 +CVE-2023-27655 - https://github.com/keepinggg/poc/tree/main/poc_of_xpdf +CVE-2023-2766 - https://github.com/8079048q/cve/blob/main/weaveroa.md +CVE-2023-2769 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Serviced-Providerd-Managementd-Systemd--d-SQLd-injections.md +CVE-2023-2770 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md +CVE-2023-27707 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-group/ +CVE-2023-27709 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-story/ +CVE-2023-2771 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md +CVE-2023-27711 - https://github.com/typecho/typecho/issues/1539 +CVE-2023-27711 - https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/ +CVE-2023-27718 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/1.md +CVE-2023-27719 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/2.md +CVE-2023-27720 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/4.md +CVE-2023-27727 - https://github.com/nginx/njs/issues/617 +CVE-2023-27728 - https://github.com/nginx/njs/issues/618 +CVE-2023-27729 - https://github.com/nginx/njs/issues/619 +CVE-2023-27730 - https://github.com/nginx/njs/issues/615 +CVE-2023-27739 - https://threeshield.ca/easyxdm-2.5.20.html +CVE-2023-27742 - https://github.com/G37SYS73M/CVE-2023-27742 +CVE-2023-27744 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf +CVE-2023-27745 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf +CVE-2023-27754 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc +CVE-2023-27775 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-27775/CVE-2023-27775.md +CVE-2023-27779 - https://docs.google.com/document/d/1kGzmc6AOCfRzJf9mDz4emkhQj84Y1XemmAMZjYK32-o/edit?usp=sharing +CVE-2023-27781 - https://github.com/tjko/jpegoptim/issues/132 +CVE-2023-27783 - https://github.com/appneta/tcpreplay/issues/780 +CVE-2023-27784 - https://github.com/appneta/tcpreplay/issues/787 +CVE-2023-2779 - http://packetstormsecurity.com/files/173053/WordPress-Super-Socializer-7.13.52-Cross-Site-Scripting.html +CVE-2023-27796 - https://github.com/winmt/my-vuls/tree/main/RG-EW%20PRO%20Series +CVE-2023-2780 - https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689 +CVE-2023-27801 - https://hackmd.io/@0dayResearch/DelDNSHnList +CVE-2023-27802 - https://hackmd.io/@0dayResearch/EditvsList +CVE-2023-27803 - https://hackmd.io/@0dayResearch/EdittriggerList +CVE-2023-27804 - https://hackmd.io/@0dayResearch/DelvsList +CVE-2023-27805 - https://hackmd.io/@0dayResearch/EditSTList +CVE-2023-27806 - https://hackmd.io/@0dayResearch/ipqos_lanip_dellist +CVE-2023-27807 - https://hackmd.io/@0dayResearch/Delstlist +CVE-2023-27808 - https://hackmd.io/@0dayResearch/DeltriggerList +CVE-2023-27810 - https://hackmd.io/@0dayResearch/ipqos_lanip_editlist +CVE-2023-27821 - https://github.com/luelueking/Databasir-1.0.7-vuln-poc +CVE-2023-27821 - https://github.com/vran-dev/databasir/issues/269 +CVE-2023-27823 - https://packetstormsecurity.com/files/172276/Optoma-1080PSTX-Firmware-C02-Authentication-Bypass.html +CVE-2023-27826 - https://www.exploit-db.com/exploits/51311 +CVE-2023-27830 - https://medium.com/nestedif/vulnerability-disclosure-privilege-escalation-tightvnc-8165208cce +CVE-2023-27842 - http://blog.tristaomarinho.com/extplorer-2-1-15-insecure-permissions-following-remote-code-execution/ +CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842 +CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842/blob/main/README.md +CVE-2023-27843 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/25/askforaquote.html +CVE-2023-27847 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/23/xipblog.html +CVE-2023-27848 - https://github.com/omnitaint/Vulnerability-Reports/blob/9d65add2bca71ed6d6b2e281ee6790a12504ff8e/reports/broccoli-compass/report.md +CVE-2023-27849 - https://github.com/omnitaint/Vulnerability-Reports/blob/2211ea4712f24d20b7f223fb737910fdfb041edb/reports/rails-routes-to-json/report.md +CVE-2023-2787 - https://mattermost.com/security-updates/ +CVE-2023-2788 - https://mattermost.com/security-updates/ +CVE-2023-27882 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733 +CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.md +CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.zip +CVE-2023-2789 - https://vuldb.com/?id.229373 +CVE-2023-27890 - http://packetstormsecurity.com/files/171421/MyBB-Export-User-2.0-Cross-Site-Scripting.html +CVE-2023-27892 - https://blog.inhq.net/posts/keepkey-CVE-2023-27892/ +CVE-2023-27893 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27894 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27895 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27896 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-27897 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-2791 - https://mattermost.com/security-updates/ +CVE-2023-2792 - https://mattermost.com/security-updates/ +CVE-2023-2793 - https://mattermost.com/security-updates/ +CVE-2023-27935 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1676 +CVE-2023-2796 - http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html +CVE-2023-2797 - https://mattermost.com/security-updates/ +CVE-2023-27974 - https://flashpoint.io/blog/bitwarden-password-pilfering/ +CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118 +CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675 +CVE-2023-2808 - https://mattermost.com/security-updates/ +CVE-2023-28095 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-28096 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-28097 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-28098 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf +CVE-2023-28100 - https://marc.info/?l=oss-security&m=167879021709955&w=2 +CVE-2023-28102 - https://securitylab.github.com/advisories/GHSL-2022-094_discordrb/ +CVE-2023-28106 - https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a +CVE-2023-28115 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc +CVE-2023-28121 - https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/ +CVE-2023-28128 - http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html +CVE-2023-28130 - http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html +CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Aug/4 +CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-28131 - https://www.darkreading.com/endpoint/oauth-flaw-in-expo-platform-affects-hundreds-of-third-party-sites-apps +CVE-2023-2814 - https://vuldb.com/?id.229428 +CVE-2023-28140 - https://www.qualys.com/security-advisories/ +CVE-2023-28141 - https://www.qualys.com/security-advisories/ +CVE-2023-28142 - https://www.qualys.com/security-advisories/ +CVE-2023-28143 - https://qualys.com/security-advisories +CVE-2023-28153 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/ +CVE-2023-28159 - https://bugzilla.mozilla.org/show_bug.cgi?id=1783561 +CVE-2023-28163 - https://bugzilla.mozilla.org/show_bug.cgi?id=1817768 +CVE-2023-2817 - https://www.tenable.com/security/research/tra-2023-20, +CVE-2023-28180 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1679 +CVE-2023-28248 - http://packetstormsecurity.com/files/172283/Windows-Kernel-CmpCleanupLightWeightPrepare-Use-After-Free.html +CVE-2023-28252 - http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html +CVE-2023-2826 - https://vuldb.com/?id.229612 +CVE-2023-2827 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-28271 - http://packetstormsecurity.com/files/172298/Windows-Kernel-Uninitialized-Memory-Pointer-Disclosure.html +CVE-2023-28285 - http://packetstormsecurity.com/files/173127/Microsoft-Office-Remote-Code-Execution.html +CVE-2023-28285 - http://packetstormsecurity.com/files/173140/Microsoft-365-MSO-2305-Build-16.0.16501.20074-Remote-Code-Execution.html +CVE-2023-28288 - http://packetstormsecurity.com/files/173126/Microsoft-SharePoint-Enterprise-Server-2016-Spoofing.html +CVE-2023-28293 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html +CVE-2023-28293 - http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html +CVE-2023-2831 - https://mattermost.com/security-updates/ +CVE-2023-2832 - https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb +CVE-2023-28343 - http://packetstormsecurity.com/files/171775/Altenergy-Power-Control-Software-C1.2.5-Command-Injection.html +CVE-2023-28343 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/os_command_injection.md +CVE-2023-28344 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28344 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28345 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28345 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28346 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28346 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28347 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28347 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28348 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28348 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28349 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28349 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28350 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28350 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28351 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28351 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28352 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28352 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28353 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ +CVE-2023-28353 - https://research.nccgroup.com/?research=Technical%20advisories +CVE-2023-28365 - https://community.ui.com/releases/Security-Advisory-Bulletin-031-031/8c85fc64-e9a8-4082-9ec4-56b14effd545 +CVE-2023-2837 - https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17 +CVE-2023-28379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738 +CVE-2023-2838 - https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f +CVE-2023-28381 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779 +CVE-2023-2839 - https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f +CVE-2023-28391 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732 +CVE-2023-28393 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1742 +CVE-2023-2840 - https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257 +CVE-2023-28428 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-68x8-9phf-j7jf +CVE-2023-28430 - https://securitylab.github.com/advisories/GHSL-2023-051_React_Native_OneSignal_SDK/ +CVE-2023-28436 - https://tailscale.com/security-bulletins/#ts-2023-003 +CVE-2023-2844 - https://huntr.dev/bounties/6644b36e-603d-4dbe-8ee2-5df8b8fb2e22 +CVE-2023-28443 - https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc +CVE-2023-28443 - https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7 +CVE-2023-28446 - https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf +CVE-2023-2845 - https://huntr.dev/bounties/ac10e81c-998e-4425-9d74-b985d9b0254c +CVE-2023-28450 - https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG +CVE-2023-28466 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 +CVE-2023-28485 - http://packetstormsecurity.com/files/172649/Wekan-6.74-Cross-Site-Scripting.html +CVE-2023-28485 - https://wekan.github.io/hall-of-fame/filebleed/ +CVE-2023-28488 - https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488 +CVE-2023-28489 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html +CVE-2023-28489 - http://seclists.org/fulldisclosure/2023/Jul/14 +CVE-2023-2850 - https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359 +CVE-2023-28501 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28502 - http://packetstormsecurity.com/files/171853/Rocket-Software-Unidata-8.2.4-Build-3003-Buffer-Overflow.html +CVE-2023-28502 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28503 - http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html +CVE-2023-28503 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28504 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28505 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28506 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28507 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28508 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28509 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ +CVE-2023-28528 - http://packetstormsecurity.com/files/172458/IBM-AIX-7.2-inscout-Privilege-Escalation.html +CVE-2023-2859 - https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba +CVE-2023-28613 - http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html +CVE-2023-28616 - https://advisories.stormshield.eu/2023-006 +CVE-2023-28627 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-6589-x6f5-cgg9 +CVE-2023-28628 - https://github.com/lambdaisland/uri/security/advisories/GHSA-cp4w-6x4w-v2h5 +CVE-2023-2863 - https://www.youtube.com/watch?v=V0u9C5RVSic +CVE-2023-28637 - https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 +CVE-2023-28659 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-28660 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-28661 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-28662 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-28663 - https://www.tenable.com/security/research/tra-2023-2 +CVE-2023-28664 - https://www.tenable.com/security/research/tra-2023-3 +CVE-2023-28665 - https://www.tenable.com/security/research/tra-2023-3 +CVE-2023-28666 - https://www.tenable.com/security/research/tra-2023-3 +CVE-2023-28667 - https://www.tenable.com/security/research/tra-2023-7 +CVE-2023-2870 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2870 +CVE-2023-2871 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2871 +CVE-2023-2872 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2872 +CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023 +CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS +CVE-2023-2873 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2873 +CVE-2023-2874 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2874 +CVE-2023-28744 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739 +CVE-2023-2875 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2875 +CVE-2023-28761 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-28762 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-28763 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-28764 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-28765 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-28770 - http://packetstormsecurity.com/files/172277/Zyxel-Chained-Remote-Code-Execution.html +CVE-2023-28771 - http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html +CVE-2023-28772 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 +CVE-2023-28809 - http://packetstormsecurity.com/files/174506/Hikvision-Access-Control-Session-Hijacking.html +CVE-2023-2881 - https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416 +CVE-2023-28848 - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f +CVE-2023-28850 - https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/ +CVE-2023-28853 - http://www.openwall.com/lists/oss-security/2023/07/06/6 +CVE-2023-28853 - https://github.com/mastodon/mastodon/security/advisories/GHSA-38g9-pfm9-gfqv +CVE-2023-28868 - https://herolab.usd.de/en/security-advisories/usd-2022-0002/ +CVE-2023-28869 - https://herolab.usd.de/en/security-advisories/usd-2022-0003/ +CVE-2023-28870 - https://herolab.usd.de/en/security-advisories/usd-2022-0004/ +CVE-2023-28871 - https://herolab.usd.de/en/security-advisories/usd-2022-0005/ +CVE-2023-28872 - https://herolab.usd.de/en/security-advisories/usd-2022-0006/ +CVE-2023-28873 - https://herolab.usd.de/en/security-advisories/usd-2022-0032/ +CVE-2023-28874 - https://herolab.usd.de/en/security-advisories/usd-2022-0033/ +CVE-2023-28875 - https://herolab.usd.de/security-advisories/usd-2022-0009/ +CVE-2023-28876 - https://herolab.usd.de/security-advisories/usd-2022-0010/ +CVE-2023-28879 - http://www.openwall.com/lists/oss-security/2023/04/12/4 +CVE-2023-28879 - https://bugs.ghostscript.com/show_bug.cgi?id=706494 +CVE-2023-28968 - https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf +CVE-2023-2900 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md +CVE-2023-29004 - https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv +CVE-2023-2901 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20User-GetGridJson%20has%20unauthorized%20access%20vulnerability.md +CVE-2023-2901 - https://vuldb.com/?id.229975 +CVE-2023-29010 - https://github.com/Budibase/budibase/security/advisories/GHSA-9xg2-9mcv-985p +CVE-2023-29017 - https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d +CVE-2023-29017 - https://github.com/patriksimek/vm2/issues/515 +CVE-2023-29017 - https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv +CVE-2023-2902 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The%20NFine%20rapid%20development%20platform%20Organize-GetTreeGridJson%20has%20unauthorized%20access%20vulnerability.md +CVE-2023-2902 - https://vuldb.com/?id.229976 +CVE-2023-29020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern +CVE-2023-29020 - https://owasp.org/www-community/attacks/csrf +CVE-2023-2903 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20Role-GetGridJson%20has%20unauthorized%20access%20vulnerability.md +CVE-2023-2903 - https://vuldb.com/?id.229977 +CVE-2023-2904 - https://www.hidglobal.com/security-center +CVE-2023-29048 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html +CVE-2023-29049 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html +CVE-2023-2905 - https://takeonme.org/cves/CVE-2023-2905.html +CVE-2023-29050 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html +CVE-2023-29051 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html +CVE-2023-29052 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html +CVE-2023-2906 - https://gitlab.com/wireshark/wireshark/-/issues/19229 +CVE-2023-2906 - https://takeonme.org/cves/CVE-2023-2906.html +CVE-2023-2908 - https://gitlab.com/libtiff/libtiff/-/merge_requests/479 +CVE-2023-29084 - http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html +CVE-2023-29085 - http://packetstormsecurity.com/files/172288/Shannon-Baseband-SIP-Status-Line-Stack-Buffer-Overflow.html +CVE-2023-29086 - http://packetstormsecurity.com/files/172293/Shannon-Baseband-SIP-Min-SE-Header-Stack-Buffer-Overflow.html +CVE-2023-29087 - http://packetstormsecurity.com/files/172295/Shannon-Baseband-SIP-Retry-After-Header-Heap-Buffer-Overflow.html +CVE-2023-29088 - http://packetstormsecurity.com/files/172289/Shannon-Baseband-SIP-Session-Expires-Header-Stack-Buffer-Overflow.html +CVE-2023-29089 - http://packetstormsecurity.com/files/172292/Shannon-Baseband-Negative-Size-Memcpy-Out-Of-Bounds-Read.html +CVE-2023-29090 - http://packetstormsecurity.com/files/172287/Shannon-Baseband-Via-Header-Decoder-Stack-Buffer-Overflow.html +CVE-2023-29091 - http://packetstormsecurity.com/files/172282/Shannon-Baseband-SIP-URI-Decoder-Stack-Buffer-Overflow.html +CVE-2023-29108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29110 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29159 - https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px +CVE-2023-29185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-29199 - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c +CVE-2023-29199 - https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985 +CVE-2023-29205 - https://jira.xwiki.org/browse/XWIKI-18568 +CVE-2023-29209 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q +CVE-2023-29210 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x +CVE-2023-29211 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w7v9-fc49-4qg4 +CVE-2023-29212 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475 +CVE-2023-29214 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qx9h-c5v6-ghqh +CVE-2023-2923 - https://github.com/GleamingEyes/vul/blob/main/1.md +CVE-2023-2924 - https://github.com/RCEraser/cve/blob/main/SimField.md +CVE-2023-2925 - https://vuldb.com/?id.230079 +CVE-2023-2927 - https://github.com/HuBenLab/HuBenVulList/blob/main/JiZhiCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md +CVE-2023-2928 - https://vuldb.com/?id.230083 +CVE-2023-2934 - http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html +CVE-2023-2935 - http://packetstormsecurity.com/files/173196/Chrome-v8-internal-Object-SetPropertyWithAccessor-Type-Confusion.html +CVE-2023-2936 - http://packetstormsecurity.com/files/173197/Chrome-V8-Type-Confusion.html +CVE-2023-29374 - https://github.com/hwchase17/langchain/issues/1026 +CVE-2023-29383 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/ +CVE-2023-29383 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797 +CVE-2023-29401 - https://github.com/gin-gonic/gin/issues/3555 +CVE-2023-2942 - https://huntr.dev/bounties/dd56e7a0-9dff-48fc-bc59-9a22d91869eb +CVE-2023-2943 - https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9 +CVE-2023-29439 - https://lourcode.kr/posts/CVE-2023-29439-Analysis?_s_id=cve +CVE-2023-2944 - https://huntr.dev/bounties/0d67dcb1-acc0-4d5d-bb69-a09d1bc9fa1d +CVE-2023-2945 - https://huntr.dev/bounties/62de71bd-333d-4593-91a5-534ef7f0c435 +CVE-2023-29459 - http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html +CVE-2023-2946 - https://huntr.dev/bounties/e550f4b0-945c-4886-af7f-ee0dc30b2a08 +CVE-2023-29465 - https://github.com/sagemath/FlintQS/issues/3 +CVE-2023-2947 - https://huntr.dev/bounties/52534def-acab-4200-a79a-89ef4ce6a0b0 +CVE-2023-29478 - https://github.com/Exopteron/BiblioRCE +CVE-2023-2948 - https://huntr.dev/bounties/2393e4d9-9e9f-455f-bf50-f20f77b0a64d +CVE-2023-29489 - https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/ +CVE-2023-2949 - https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4 +CVE-2023-29491 - http://www.openwall.com/lists/oss-security/2023/04/19/11 +CVE-2023-2950 - https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86 +CVE-2023-29505 - https://excellium-services.com/cert-xlm-advisory/CVE-2023-29505 +CVE-2023-29506 - https://jira.xwiki.org/browse/XWIKI-20335 +CVE-2023-29510 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4v38-964c-xjmw +CVE-2023-29517 - https://jira.xwiki.org/browse/XWIKI-20324 +CVE-2023-29519 - https://jira.xwiki.org/browse/XWIKI-20364 +CVE-2023-29523 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx +CVE-2023-29528 - https://jira.xwiki.org/browse/XWIKI-20348 +CVE-2023-29532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 +CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816007 +CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816059 +CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821155 +CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821576 +CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821906 +CVE-2023-29537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823365 +CVE-2023-2954 - https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d +CVE-2023-29541 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810191 +CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810793 +CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1815062 +CVE-2023-29548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1822754 +CVE-2023-29562 - https://github.com/lzd521/IOT/tree/main/TP-Link%20WPA7510 +CVE-2023-29566 - https://github.com/omnitaint/Vulnerability-Reports/blob/ec3645003c7f8996459b5b24c722474adc2d599f/reports/dawnsparks-node-tesseract/report.md +CVE-2023-29569 - https://github.com/cesanta/mjs/issues/239 +CVE-2023-29569 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md +CVE-2023-29570 - https://github.com/cesanta/mjs/issues/240 +CVE-2023-29570 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md +CVE-2023-29571 - https://github.com/cesanta/mjs/issues/241 +CVE-2023-29571 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md +CVE-2023-29573 - https://github.com/axiomatic-systems/Bento4/issues/840 +CVE-2023-29573 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/readme.md +CVE-2023-29574 - https://github.com/axiomatic-systems/Bento4/issues/841 +CVE-2023-29574 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/readme.md +CVE-2023-29575 - https://github.com/axiomatic-systems/Bento4/issues/842 +CVE-2023-29575 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md +CVE-2023-29576 - https://github.com/axiomatic-systems/Bento4/issues/844 +CVE-2023-29576 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/readme.md +CVE-2023-29578 - https://github.com/TechSmith/mp4v2/issues/74 +CVE-2023-29578 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/mp4property.cpp/readme.md +CVE-2023-29579 - https://github.com/yasm/yasm/issues/214 +CVE-2023-29579 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md +CVE-2023-29580 - https://github.com/yasm/yasm/issues/215 +CVE-2023-29580 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/readmd.md +CVE-2023-29581 - https://github.com/yasm/yasm/issues/216 +CVE-2023-29581 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md +CVE-2023-29582 - https://github.com/yasm/yasm/issues/217 +CVE-2023-29582 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md +CVE-2023-29583 - https://github.com/yasm/yasm/issues/218 +CVE-2023-29583 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/readme.md +CVE-2023-29584 - https://github.com/enzo1982/mp4v2/issues/30 +CVE-2023-29584 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/MP4GetVideoProfileLevel/readme.md +CVE-2023-29586 - https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html +CVE-2023-29623 - https://portswigger.net/web-security/cross-site-scripting/reflected +CVE-2023-29631 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmsslider.html +CVE-2023-2964 - https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f +CVE-2023-29656 - https://ramihub.github.io/ +CVE-2023-29657 - http://blog.tristaomarinho.com/extplorer-2-1-15-arbitrary-file-upload/ +CVE-2023-29659 - https://github.com/strukturag/libheif/issues/794 +CVE-2023-29665 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/boSetPasswdSettings +CVE-2023-2968 - https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917 +CVE-2023-29680 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62 +CVE-2023-29680 - https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta +CVE-2023-29681 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62 +CVE-2023-29681 - https://www.youtube.com/watch?v=Xy9_hmpvvA4&ab_channel=0ta +CVE-2023-29689 - http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html +CVE-2023-29693 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/SetTftpUpgrad.md +CVE-2023-29696 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md +CVE-2023-2971 - https://starlabs.sg/advisories/23/23-2971/ +CVE-2023-29712 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf +CVE-2023-29712 - https://labs.yarix.com/2023/05/vade-secure-gateway-multiple-xss-cve-2023-29712-cve-2023-29713-cve-2023-29714/ +CVE-2023-29713 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf +CVE-2023-29714 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf +CVE-2023-2972 - https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef +CVE-2023-29722 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md +CVE-2023-29724 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29724/CVE%20detail.md +CVE-2023-29726 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md +CVE-2023-29731 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29731/CVE%20detail.md +CVE-2023-29732 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29732/CVE%20detail.md +CVE-2023-29733 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md +CVE-2023-29734 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29734/CVE%20detail.md +CVE-2023-29735 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29735/CVE%20detail.md +CVE-2023-29736 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md +CVE-2023-29738 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29738/CVE%20detail.md +CVE-2023-29738 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid +CVE-2023-29739 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid +CVE-2023-29740 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid +CVE-2023-29741 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29741/CVE%20detail.md +CVE-2023-29742 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md +CVE-2023-29743 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29743/CVE%20detail.md +CVE-2023-29745 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29745/CVE%20detail.md +CVE-2023-29746 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29746/CVE%20detail.md +CVE-2023-29748 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md +CVE-2023-29753 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29753/CVE%20detailed.md +CVE-2023-29756 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29756/CVE%20detailed.md +CVE-2023-29759 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29759/CVE%20detailed.md +CVE-2023-29766 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md +CVE-2023-29770 - https://github.com/sapplica/sentrifugo/issues/384 +CVE-2023-2978 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be +CVE-2023-2979 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be +CVE-2023-2980 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be +CVE-2023-29808 - https://packetstormsecurity.com/files/172145/Companymaps-8.0-Cross-Site-Scripting.html +CVE-2023-29809 - https://packetstormsecurity.com/files/172146/Companymaps-8.0-SQL-Injection.html +CVE-2023-29809 - https://www.exploit-db.com/exploits/51422 +CVE-2023-2981 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be +CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713 +CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713#issuecomment-1629468565 +CVE-2023-29827 - https://github.com/mde/ejs/issues/720 +CVE-2023-2983 - https://huntr.dev/bounties/6b2f33d3-2fd0-4d2d-ad7b-2c1e2417eeb1 +CVE-2023-2984 - https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191 +CVE-2023-29842 - http://packetstormsecurity.com/files/175105/ChurchCRM-4.5.4-SQL-Injection.html +CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.md +CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.py +CVE-2023-29847 - https://github.com/MegaTKC/AeroCMS/issues/11 +CVE-2023-29848 - http://packetstormsecurity.com/files/171899/Bang-Resto-1.0-Cross-Site-Scripting.html +CVE-2023-29849 - http://packetstormsecurity.com/files/171900/Bang-Resto-1.0-SQL-Injection.html +CVE-2023-29850 - https://github.com/slims/slims9_bulian/issues/186 +CVE-2023-2986 - http://packetstormsecurity.com/files/172966/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html +CVE-2023-2986 - http://packetstormsecurity.com/files/173018/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html +CVE-2023-2986 - https://github.com/Ayantaker/CVE-2023-2986 +CVE-2023-2986 - https://github.com/TycheSoftwares/woocommerce-abandoned-cart/pull/885#issuecomment-1601813615 +CVE-2023-29863 - https://medium.com/@waadalbyalii5/sql-injection-in-wsdl-file-c66fa00042f5 +CVE-2023-2989 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ +CVE-2023-2990 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ +CVE-2023-29905 - https://hackmd.io/@0dayResearch/H1IFt1Jgn +CVE-2023-29906 - https://hackmd.io/@0dayResearch/rk1uu20Jh +CVE-2023-29907 - https://hackmd.io/@0dayResearch/rk-6aRRyn +CVE-2023-29908 - https://hackmd.io/@0dayResearch/Ski-S20J2 +CVE-2023-29909 - https://hackmd.io/@0dayResearch/r1FC0AAy2 +CVE-2023-2991 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ +CVE-2023-29910 - https://hackmd.io/@0dayResearch/S1aGs1Jl2 +CVE-2023-29911 - https://hackmd.io/@0dayResearch/SyTaRoCJn +CVE-2023-29912 - https://hackmd.io/@0dayResearch/S1TusiR1n +CVE-2023-29913 - https://hackmd.io/@0dayResearch/HyvnMn013 +CVE-2023-29914 - https://hackmd.io/@0dayResearch/H1Cn2sAk3 +CVE-2023-29915 - https://hackmd.io/@0dayResearch/HJBc2lyl2 +CVE-2023-29916 - https://hackmd.io/@0dayResearch/rkpbC1Jgh +CVE-2023-29917 - https://hackmd.io/@0dayResearch/rJJzEg1e3 +CVE-2023-29918 - https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing +CVE-2023-29919 - https://github.com/xiaosed/CVE-2023-29919/ +CVE-2023-29931 - https://github.com/hhxsv5/laravel-s/issues/437 +CVE-2023-29950 - https://github.com/matthiaskramm/swftools/issues/198 +CVE-2023-29963 - https://github.com/superjock1988/debug/blob/main/s-cms_rce.md +CVE-2023-2998 - https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78 +CVE-2023-29983 - https://packetstormsecurity.com/files/172075/CompanyMaps-8.0-Cross-Site-Scripting.html +CVE-2023-29983 - https://www.exploit-db.com/exploits/51417 +CVE-2023-29985 - https://liaorj.github.io/2023/03/17/admin-reports-date-from-has-sql-injection-vulnerability/#more +CVE-2023-29998 - https://labs.yarix.com/2023/07/gis3w-persistent-xss-in-g3wsuite-3-5-cve-2023-29998/ +CVE-2023-30013 - http://packetstormsecurity.com/files/174799/TOTOLINK-Wireless-Routers-Remote-Command-Execution.html +CVE-2023-30013 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2 +CVE-2023-30053 - https://github.com/Am1ngl/ttt/tree/main/160 +CVE-2023-30054 - https://github.com/Am1ngl/ttt/tree/main/161 +CVE-2023-30056 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html +CVE-2023-30057 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html +CVE-2023-30061 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-879 +CVE-2023-3007 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/student-management-system/password_reset.md +CVE-2023-30082 - https://blog.manavparekh.com/2023/06/cve-2023-30082.html +CVE-2023-30082 - https://github.com/manavparekh/CVEs/blob/main/CVE-2023-30082/Steps%20to%20reproduce.txt +CVE-2023-30083 - https://github.com/libming/libming/issues/266 +CVE-2023-30084 - https://github.com/libming/libming/issues/268 +CVE-2023-30085 - https://github.com/libming/libming/issues/267 +CVE-2023-30086 - https://gitlab.com/libtiff/libtiff/-/issues/538 +CVE-2023-30087 - https://github.com/cesanta/mjs/issues/244 +CVE-2023-30088 - https://github.com/cesanta/mjs/issues/243 +CVE-2023-3009 - https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f +CVE-2023-30093 - https://www.edoardoottavianelli.it/CVE-2023-30093/ +CVE-2023-30093 - https://www.youtube.com/watch?v=jZr2JhDd_S8 +CVE-2023-30094 - https://www.edoardoottavianelli.it/CVE-2023-30094/ +CVE-2023-30094 - https://www.youtube.com/watch?v=vOb9Fyg3iVo +CVE-2023-30095 - https://www.edoardoottavianelli.it/CVE-2023-30095/ +CVE-2023-30095 - https://www.youtube.com/watch?v=2k7e9E0Cw0Y +CVE-2023-30096 - https://www.edoardoottavianelli.it/CVE-2023-30096/ +CVE-2023-30096 - https://www.youtube.com/watch?v=ZA7R001kE2w +CVE-2023-30097 - https://www.edoardoottavianelli.it/CVE-2023-30097/ +CVE-2023-30097 - https://www.youtube.com/watch?v=VAlbkvOm_DU +CVE-2023-30106 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip +CVE-2023-30111 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip +CVE-2023-30112 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip +CVE-2023-3012 - https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 +CVE-2023-30123 - https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937 +CVE-2023-3013 - https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073 +CVE-2023-30135 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/8/8.md +CVE-2023-30145 - http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html +CVE-2023-30145 - https://github.com/paragbagul111/CVE-2023-30145 +CVE-2023-30146 - https://github.com/L1-0/CVE-2023-30146 +CVE-2023-30148 - https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html +CVE-2023-30149 - https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html +CVE-2023-30150 - https://friends-of-presta.github.io/security-advisories/module/2023/06/06/leocustomajax.html +CVE-2023-3017 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0 +CVE-2023-3018 - http://packetstormsecurity.com/files/172653/Lost-And-Found-Information-System-1.0-Broken-Access-Control-Privilege-Escalation.html +CVE-2023-3018 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d +CVE-2023-30184 - https://github.com/typecho/typecho/issues/1546 +CVE-2023-30185 - https://github.com/c7w1n/CVE-2023-30185/blob/main/CVE-2023-30185.md +CVE-2023-30189 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html +CVE-2023-30191 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/17/cdesigner-89.html +CVE-2023-30192 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/11/possearchproducts.html +CVE-2023-30194 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/09/posstaticfooter.html +CVE-2023-30198 - http://packetstormsecurity.com/files/173136/PrestaShop-Winbiz-Payment-Improper-Limitation.html +CVE-2023-3020 - https://huntr.dev/bounties/92cbe37c-33fa-43bf-8d5b-69aebf51d32c +CVE-2023-3021 - https://huntr.dev/bounties/9d289d3a-2931-4e94-b61c-449581736eff +CVE-2023-30222 - https://packetstormsecurity.com +CVE-2023-30223 - https://packetstormsecurity.com +CVE-2023-30237 - https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/ +CVE-2023-30253 - https://www.swascan.com/security-advisory-dolibarr-17-0-0/ +CVE-2023-30256 - http://packetstormsecurity.com/files/172542/Webkul-Qloapps-1.5.2-Cross-Site-Scripting.html +CVE-2023-30256 - https://github.com/ahrixia/CVE-2023-30256 +CVE-2023-30257 - https://github.com/stigward/PoCs-and-Exploits/tree/main/fiio_LPE_0day +CVE-2023-30257 - https://stigward.github.io/posts/fiio-m6-exploit/ +CVE-2023-30258 - http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Execution.html +CVE-2023-30258 - https://eldstal.se/advisories/230327-magnusbilling.html +CVE-2023-30259 - https://github.com/LibreCAD/LibreCAD/issues/1481 +CVE-2023-3026 - https://huntr.dev/bounties/9bbcc127-1e69-4c88-b318-d2afef48eff0 +CVE-2023-30264 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%202.md +CVE-2023-30267 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Reflected%20cross-site%20scripting(XSS).md +CVE-2023-30268 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Improper%20Input%20Validation%202.md +CVE-2023-30285 - https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md +CVE-2023-30328 - https://github.com/rand0mIdas/randomideas/blob/main/ShimoVPN.md +CVE-2023-30328 - https://raw.githubusercontent.com/rand0mIdas/randomideas/main/ShimoVPN.md?token=GHSAT0AAAAAACA3WX4SPH2YYOCWGV6LLVSGZBIEKEQ +CVE-2023-30330 - https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0 +CVE-2023-30330 - https://www.exploit-db.com/exploits/51404 +CVE-2023-30331 - https://github.com/luelueking/Beetl-3.15.0-vuln-poc +CVE-2023-30347 - https://github.com/huzefa2212/CVE-2023-30347/blob/main/poc.txt +CVE-2023-30349 - https://github.com/jflyfox/jfinal_cms/issues/54 +CVE-2023-30350 - http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html +CVE-2023-30362 - https://github.com/obgm/libcoap/issues/1063 +CVE-2023-30363 - https://github.com/Tencent/vConsole/issues/616 +CVE-2023-30367 - http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html +CVE-2023-30367 - https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper +CVE-2023-30368 - https://github.com/2205794866/Tenda/blob/main/AC5/1.md +CVE-2023-30369 - https://github.com/2205794866/Tenda/blob/main/AC15/3.md +CVE-2023-30370 - https://github.com/2205794866/Tenda/blob/main/AC15/7.md +CVE-2023-30371 - https://github.com/2205794866/Tenda/blob/main/AC15/4.md +CVE-2023-30372 - https://github.com/2205794866/Tenda/blob/main/AC15/10.md +CVE-2023-30373 - https://github.com/2205794866/Tenda/blob/main/AC15/8.md +CVE-2023-30375 - https://github.com/2205794866/Tenda/blob/main/AC15/1.md +CVE-2023-30376 - https://github.com/2205794866/Tenda/blob/main/AC15/9.md +CVE-2023-30378 - https://github.com/2205794866/Tenda/blob/main/AC15/5.md +CVE-2023-30380 - https://github.com/Howard512966/DedeCMS-v5.7.107-Directory-Traversal +CVE-2023-30399 - https://github.com/Yof3ng/IoT/blob/master/Garo/CVE-2023-30399.md +CVE-2023-30402 - https://github.com/yasm/yasm/issues/206 +CVE-2023-30405 - https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html +CVE-2023-30415 - http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html +CVE-2023-30415 - https://robsware.github.io/2023/09/01/firstcve +CVE-2023-3044 - https://github.com/baker221/poc-xpdf +CVE-2023-30440 - https://www.ibm.com/support/pages/node/6997133 +CVE-2023-30445 - https://www.ibm.com/support/pages/node/7010557 +CVE-2023-30446 - https://www.ibm.com/support/pages/node/7010557 +CVE-2023-30447 - https://www.ibm.com/support/pages/node/7010557 +CVE-2023-30448 - https://www.ibm.com/support/pages/node/7010557 +CVE-2023-30449 - https://www.ibm.com/support/pages/node/7010557 +CVE-2023-30451 - http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html +CVE-2023-30453 - https://y-security.de/news-en/reminder-for-jira-cross-site-scripting-cve-2023-30453/index.html +CVE-2023-30454 - https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html +CVE-2023-30455 - https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html +CVE-2023-30456 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html +CVE-2023-30456 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8 +CVE-2023-30459 - https://github.com/Toxich4/CVE-2023-30459 +CVE-2023-30459 - https://smartptt.com +CVE-2023-30534 - https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p +CVE-2023-30544 - https://huntr.dev/bounties/1714df73-e639-4d64-ab25-ced82dad9f85/ +CVE-2023-30547 - https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244 +CVE-2023-30547 - https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m +CVE-2023-30550 - https://github.com/metersphere/metersphere/security/advisories/GHSA-j5cq-cpw2-gp2q +CVE-2023-3056 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%201.md +CVE-2023-3057 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%202.md +CVE-2023-30577 - https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3 +CVE-2023-30591 - https://starlabs.sg/advisories/23/23-30591/ +CVE-2023-30613 - https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c +CVE-2023-30620 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx +CVE-2023-30623 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2023-30625 - http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html +CVE-2023-30625 - https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/ +CVE-2023-30628 - https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx +CVE-2023-30628 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2023-3067 - https://huntr.dev/bounties/4772ceb7-1594-414d-9b20-5b82029da7b6 +CVE-2023-3069 - https://huntr.dev/bounties/00544982-365a-476b-b5fe-42f02f11d367 +CVE-2023-3070 - https://huntr.dev/bounties/e193068e-0b95-403a-8453-e015241b8f1b +CVE-2023-3071 - https://huntr.dev/bounties/3e8d5166-9bc6-46e7-94a8-cad52434a39e +CVE-2023-3073 - https://huntr.dev/bounties/a4d6a082-2ea8-49a5-8e48-6d39b5cc62e1 +CVE-2023-30740 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-30741 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-30742 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-30743 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-30744 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-30769 - https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks +CVE-2023-30769 - https://www.halborn.com/disclosures +CVE-2023-30772 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 +CVE-2023-30772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=06615d11cc78162dfd5116efb71f29eb29502d37 +CVE-2023-30774 - https://gitlab.com/libtiff/libtiff/-/issues/463 +CVE-2023-30775 - https://gitlab.com/libtiff/libtiff/-/issues/464 +CVE-2023-30777 - https://patchstack.com/articles/reflected-xss-in-advanced-custom-fields-plugins-affecting-2-million-sites?_s_id=cve +CVE-2023-30787 - https://fluidattacks.com/advisories/napoli +CVE-2023-30788 - https://fluidattacks.com/advisories/napoli +CVE-2023-30789 - https://fluidattacks.com/advisories/napoli +CVE-2023-3079 - http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html +CVE-2023-3079 - http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html +CVE-2023-30790 - https://fluidattacks.com/advisories/napoli +CVE-2023-30799 - https://github.com/MarginResearch/FOISted +CVE-2023-30802 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 +CVE-2023-30803 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 +CVE-2023-30804 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 +CVE-2023-30805 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 +CVE-2023-30806 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 +CVE-2023-3083 - https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab +CVE-2023-3084 - https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a +CVE-2023-30858 - https://huntr.dev/bounties/444f2255-5085-466f-ba0e-5549fa8846a3/ +CVE-2023-30859 - https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r +CVE-2023-3086 - https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20 +CVE-2023-30860 - https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm +CVE-2023-30868 - http://packetstormsecurity.com/files/172730/WordPress-Tree-Page-View-1.6.7-Cross-Site-Scripting.html +CVE-2023-3090 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-3090 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-3094 - https://vuldb.com/?id.230670 +CVE-2023-30945 - https://palantir.safebase.us/?tcuUid=e62e4dad-b39b-48ba-ba30-7b7c83406ad9 +CVE-2023-30946 - https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3 +CVE-2023-30948 - https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62 +CVE-2023-30949 - https://palantir.safebase.us/?tcuUid=bbc1772c-e10a-45cc-b89f-48cc1a8b2cfc +CVE-2023-3095 - https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4 +CVE-2023-30950 - https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a +CVE-2023-30951 - https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced +CVE-2023-30952 - https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4 +CVE-2023-30955 - https://palantir.safebase.us/?tcuUid=0c3f6c33-4eb0-48b5-ab87-fe48c46a4170 +CVE-2023-30956 - https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a +CVE-2023-30958 - https://palantir.safebase.us/?tcuUid=5764b094-d3c0-4380-90f2-234f36116c9b +CVE-2023-30959 - https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63 +CVE-2023-3096 - https://github.com/i900008/vulndb/blob/main/kylinos_vul1.md +CVE-2023-30960 - https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b +CVE-2023-30961 - https://palantir.safebase.us/?tcuUid=2755c49f-2c30-459e-8bdf-f95ef3692da4 +CVE-2023-30962 - https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0 +CVE-2023-30963 - https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a +CVE-2023-30967 - https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79 +CVE-2023-30969 - https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7 +CVE-2023-3097 - https://github.com/i900008/vulndb/blob/main/kylinos_vul2.md +CVE-2023-3099 - https://github.com/i900008/vulndb/blob/main/kylinos_vul4.md +CVE-2023-31059 - https://cybir.com/2023/cve/poc-repetier-server-140/ +CVE-2023-31060 - https://cybir.com/2023/cve/poc-repetier-server-140/ +CVE-2023-31061 - https://cybir.com/2023/cve/poc-repetier-server-140/ +CVE-2023-31067 - http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html +CVE-2023-31067 - https://www.exploit-db.com/exploits/51679 +CVE-2023-31068 - http://packetstormsecurity.com/files/174272/TSPlus-16.0.0.0-Insecure-Permissions.html +CVE-2023-31068 - https://www.exploit-db.com/exploits/51680 +CVE-2023-31069 - http://packetstormsecurity.com/files/174271/TSPlus-16.0.0.0-Insecure-Credential-Storage.html +CVE-2023-31069 - https://www.exploit-db.com/exploits/51681 +CVE-2023-3109 - https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123 +CVE-2023-31096 - https://cschwarz1.github.io/posts/0x04/ +CVE-2023-31102 - https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/ +CVE-2023-31128 - https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h +CVE-2023-31128 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2023-31132 - https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876 +CVE-2023-31137 - https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c +CVE-2023-3115 - https://gitlab.com/gitlab-org/gitlab/-/issues/414367 +CVE-2023-3119 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md +CVE-2023-31192 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768 +CVE-2023-31194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1745 +CVE-2023-31194 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1745 +CVE-2023-3120 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md +CVE-2023-31223 - https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/ +CVE-2023-31242 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769 +CVE-2023-31247 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746 +CVE-2023-31248 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html +CVE-2023-31248 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-31272 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765 +CVE-2023-31275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1748 +CVE-2023-3128 - https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp +CVE-2023-31285 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html +CVE-2023-31285 - http://seclists.org/fulldisclosure/2023/May/14 +CVE-2023-31286 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html +CVE-2023-31286 - http://seclists.org/fulldisclosure/2023/May/14 +CVE-2023-31287 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html +CVE-2023-31287 - http://seclists.org/fulldisclosure/2023/May/14 +CVE-2023-31292 - https://herolab.usd.de/en/security-advisories/usd-2022-0051/ +CVE-2023-31293 - https://herolab.usd.de/en/security-advisories/usd-2022-0061/ +CVE-2023-31294 - https://herolab.usd.de/en/security-advisories/usd-2022-0052/ +CVE-2023-31295 - https://herolab.usd.de/en/security-advisories/usd-2022-0053/ +CVE-2023-31296 - https://herolab.usd.de/en/security-advisories/usd-2022-0054/ +CVE-2023-31297 - https://herolab.usd.de/en/security-advisories/usd-2022-0058/ +CVE-2023-31298 - https://herolab.usd.de/en/security-advisories/usd-2022-0060/ +CVE-2023-31299 - https://herolab.usd.de/en/security-advisories/usd-2022-0055/ +CVE-2023-31300 - https://herolab.usd.de/en/security-advisories/usd-2022-0057/ +CVE-2023-31301 - https://herolab.usd.de/en/security-advisories/usd-2022-0059/ +CVE-2023-31302 - https://herolab.usd.de/en/security-advisories/usd-2022-0056/ +CVE-2023-3134 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins +CVE-2023-31404 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-31405 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-31406 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-31407 - https://launchpad.support.sap.com/#/notes/3312892 +CVE-2023-31407 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-31413 - https://www.elastic.co/community/security/ +CVE-2023-31414 - https://www.elastic.co/community/security/ +CVE-2023-31415 - https://www.elastic.co/community/security/ +CVE-2023-31416 - https://www.elastic.co/community/security +CVE-2023-31417 - https://www.elastic.co/community/security +CVE-2023-31418 - https://www.elastic.co/community/security +CVE-2023-31419 - https://www.elastic.co/community/security +CVE-2023-3142 - https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5 +CVE-2023-31421 - https://www.elastic.co/community/security +CVE-2023-31422 - https://www.elastic.co/community/security +CVE-2023-3143 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#11xss-vulnerability-in-adminpostsmanage_postphpcontent +CVE-2023-31433 - https://cves.at/posts/cve-2023-31433/writeup/ +CVE-2023-31434 - https://cves.at/posts/cve-2023-31434/writeup/ +CVE-2023-31435 - https://cves.at/posts/cve-2023-31435/writeup/ +CVE-2023-31436 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html +CVE-2023-31436 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html +CVE-2023-31436 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-31436 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 +CVE-2023-31439 - https://github.com/systemd/systemd/pull/28885 +CVE-2023-3144 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#10xss-vulnerability-in-adminpostsmanage_postphptitle +CVE-2023-31445 - https://blog.kscsc.online/cves/202331445/md.html +CVE-2023-31445 - https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure +CVE-2023-31445 - https://www.swiruhack.online/cves/202331445/md.html +CVE-2023-3145 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#9sql-injection-vulnerability-in-classesusersphppost +CVE-2023-3146 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#8sql-injection-vulnerability-in-admincategoriesmanage_categoryphp +CVE-2023-31465 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31465.md +CVE-2023-31466 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31466.md +CVE-2023-31468 - http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html +CVE-2023-31468 - https://www.exploit-db.com/exploits/51682 +CVE-2023-3147 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-admincategoriesview_categoryphp +CVE-2023-31471 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Abuse_of_Functionality_leads_to_RCE.md +CVE-2023-31472 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Creation.md +CVE-2023-31473 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Read.md +CVE-2023-31475 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Buffer_Overflow.md +CVE-2023-31475 - https://justinapplegate.me/2023/glinet-CVE-2023-31475/ +CVE-2023-31476 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/GL-MV1000_Arbitrary_File_Creation.md +CVE-2023-31477 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Path_Traversal.md +CVE-2023-31478 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/SSID_Key_Disclosure.md +CVE-2023-3148 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#6sql-injection-vulnerability-in-adminpostsmanage_postphp +CVE-2023-31483 - https://github.com/CauldronDevelopmentLLC/cbang/issues/115 +CVE-2023-31489 - https://github.com/FRRouting/frr/issues/13098 +CVE-2023-3149 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp +CVE-2023-31490 - https://github.com/FRRouting/frr/issues/13099 +CVE-2023-31492 - http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html +CVE-2023-31497 - https://github.com/0xInfection/EPScalate +CVE-2023-31498 - https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832 +CVE-2023-3150 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md +CVE-2023-31502 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD +CVE-2023-31505 - https://m3n0sd0n4ld.github.io/patoHackventuras/cve-2023-31505 +CVE-2023-3151 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md +CVE-2023-3152 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#5sql-injection-vulnerability-in-adminpostsview_postphp +CVE-2023-31530 - https://github.com/leetsun/IoT/tree/main/Motorola-CX2L/CI4 +CVE-2023-31543 - https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe +CVE-2023-31543 - https://github.com/bndr/pipreqs/pull/364 +CVE-2023-31548 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548 +CVE-2023-31554 - https://forum.xpdfreader.com/viewtopic.php?t=42421 +CVE-2023-31555 - https://github.com/podofo/podofo/issues/67 +CVE-2023-31556 - https://github.com/podofo/podofo/issues/66 +CVE-2023-31557 - https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748 +CVE-2023-31566 - https://github.com/podofo/podofo/issues/70 +CVE-2023-31567 - https://github.com/podofo/podofo/issues/71 +CVE-2023-31568 - https://github.com/podofo/podofo/issues/72 +CVE-2023-31587 - https://github.com/yanbushuang/CVE/blob/main/TendaAC5.md +CVE-2023-31594 - https://github.com/Yozarseef95/CVE-2023-31594 +CVE-2023-31595 - https://github.com/Yozarseef95/CVE-2023-31595 +CVE-2023-31607 - https://github.com/openlink/virtuoso-opensource/issues/1120 +CVE-2023-31608 - https://github.com/openlink/virtuoso-opensource/issues/1123 +CVE-2023-31609 - https://github.com/openlink/virtuoso-opensource/issues/1126 +CVE-2023-31610 - https://github.com/openlink/virtuoso-opensource/issues/1118 +CVE-2023-31611 - https://github.com/openlink/virtuoso-opensource/issues/1119 +CVE-2023-31612 - https://github.com/openlink/virtuoso-opensource/issues/1125 +CVE-2023-31613 - https://github.com/openlink/virtuoso-opensource/issues/1121 +CVE-2023-31615 - https://github.com/openlink/virtuoso-opensource/issues/1124 +CVE-2023-31616 - https://github.com/openlink/virtuoso-opensource/issues/1122 +CVE-2023-31617 - https://github.com/openlink/virtuoso-opensource/issues/1127 +CVE-2023-31618 - https://github.com/openlink/virtuoso-opensource/issues/1136 +CVE-2023-31619 - https://github.com/openlink/virtuoso-opensource/issues/1133 +CVE-2023-31620 - https://github.com/openlink/virtuoso-opensource/issues/1128 +CVE-2023-31621 - https://github.com/openlink/virtuoso-opensource/issues/1130 +CVE-2023-31622 - https://github.com/openlink/virtuoso-opensource/issues/1135 +CVE-2023-31623 - https://github.com/openlink/virtuoso-opensource/issues/1131 +CVE-2023-31624 - https://github.com/openlink/virtuoso-opensource/issues/1134 +CVE-2023-31625 - https://github.com/openlink/virtuoso-opensource/issues/1132 +CVE-2023-31626 - https://github.com/openlink/virtuoso-opensource/issues/1129 +CVE-2023-31627 - https://github.com/openlink/virtuoso-opensource/issues/1140 +CVE-2023-31628 - https://github.com/openlink/virtuoso-opensource/issues/1141 +CVE-2023-31629 - https://github.com/openlink/virtuoso-opensource/issues/1139 +CVE-2023-3163 - https://gitee.com/y_project/RuoYi/issues/I78DOR +CVE-2023-31630 - https://github.com/openlink/virtuoso-opensource/issues/1138 +CVE-2023-31631 - https://github.com/openlink/virtuoso-opensource/issues/1137 +CVE-2023-3164 - https://gitlab.com/libtiff/libtiff/-/issues/542 +CVE-2023-3165 - https://vuldb.com/?id.231109 +CVE-2023-31664 - https://github.com/adilkhan7/CVE-2023-31664 +CVE-2023-31677 - https://github.com/zzh-newlearner/record/blob/main/luowice.md +CVE-2023-31678 - https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md +CVE-2023-31679 - https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md +CVE-2023-31689 - https://github.com/vedees/wcms/issues/15 +CVE-2023-31698 - http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html +CVE-2023-31698 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 +CVE-2023-31698 - https://github.com/bludit/bludit/issues/1509 +CVE-2023-31699 - https://github.com/ChurchCRM/CRM/issues/6471 +CVE-2023-31700 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md +CVE-2023-31701 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md +CVE-2023-31702 - http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html +CVE-2023-31703 - http://packetstormsecurity.com/files/172540/eScan-Management-Console-14.0.1400.2281-Cross-Site-Scripting.html +CVE-2023-31705 - https://github.com/d34dun1c02n/CVE-2023-31705 +CVE-2023-31708 - https://github.com/weng-xianhu/eyoucms/issues/41 +CVE-2023-31714 - https://www.exploit-db.com/exploits/51383 +CVE-2023-31718 - https://youtu.be/VCQkEGntN04 +CVE-2023-3172 - https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e +CVE-2023-31723 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md +CVE-2023-31723 - https://github.com/yasm/yasm/issues/220 +CVE-2023-31724 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive +CVE-2023-31724 - https://github.com/yasm/yasm/issues/222 +CVE-2023-31725 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params +CVE-2023-31725 - https://github.com/yasm/yasm/issues/221 +CVE-2023-31726 - https://github.com/J6451/CVE-2023-31726 +CVE-2023-3173 - https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14 +CVE-2023-31740 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf +CVE-2023-31741 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf +CVE-2023-31747 - https://packetstormsecurity.com/files/172464/Filmora-12-Build-1.0.0.7-Unquoted-Service-Path.html +CVE-2023-31748 - https://packetstormsecurity.com/files/172466/MobileTrans-4.0.11-Weak-Service-Permissions.html +CVE-2023-31753 - https://github.com/khmk2k/CVE-2023-31753/ +CVE-2023-31754 - https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss +CVE-2023-31757 - https://github.com/sleepyvv/vul_report/blob/main/DedeCMS/XSS.md +CVE-2023-3176 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-adminusermanage_userphp +CVE-2023-3177 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-admininquiriesview_inquiryphp +CVE-2023-3177 - https://vuldb.com/?id.231151 +CVE-2023-3184 - http://packetstormsecurity.com/files/172908/Sales-Tracker-Management-System-1.0-HTML-Injection.html +CVE-2023-3184 - https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md +CVE-2023-31851 - https://github.com/CalfCrusher/CVE-2023-31851 +CVE-2023-31852 - https://github.com/CalfCrusher/CVE-2023-31852 +CVE-2023-31853 - https://github.com/CalfCrusher/CVE-2023-31853 +CVE-2023-31856 - https://github.com/xiangbulala/CVE/blob/main/totlink.md +CVE-2023-3187 - http://packetstormsecurity.com/files/172909/Teachers-Record-Management-System-1.0-Validation-Bypass.html +CVE-2023-3187 - https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md +CVE-2023-31871 - https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7 +CVE-2023-31873 - http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html +CVE-2023-31874 - http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html +CVE-2023-3188 - https://huntr.dev/bounties/0d0d526a-1c39-4e6a-b081-d3914468e495 +CVE-2023-31893 - https://medium.com/@shooterRX/dns-recursion-leads-to-dos-attack-vivo-play-iptv-cve-2023-31893-b5ac45f38f +CVE-2023-3190 - https://huntr.dev/bounties/5562c4c4-0475-448f-a451-7c4666bc7180 +CVE-2023-31902 - https://www.exploit-db.com/exploits/51010 +CVE-2023-31902 - https://www.redpacketsecurity.com/mobile-mouse-code-execution/ +CVE-2023-31903 - https://www.exploit-db.com/exploits/51052 +CVE-2023-31904 - https://www.exploit-db.com/exploits/51015 +CVE-2023-31907 - https://github.com/jerryscript-project/jerryscript/issues/5073 +CVE-2023-31908 - https://github.com/jerryscript-project/jerryscript/issues/5067 +CVE-2023-3191 - https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a +CVE-2023-31910 - https://github.com/jerryscript-project/jerryscript/issues/5076 +CVE-2023-31913 - https://github.com/jerryscript-project/jerryscript/issues/5061 +CVE-2023-31916 - https://github.com/jerryscript-project/jerryscript/issues/5062 +CVE-2023-31918 - https://github.com/jerryscript-project/jerryscript/issues/5064 +CVE-2023-31919 - https://github.com/jerryscript-project/jerryscript/issues/5069 +CVE-2023-3192 - https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551 +CVE-2023-31920 - https://github.com/jerryscript-project/jerryscript/issues/5070 +CVE-2023-31921 - https://github.com/jerryscript-project/jerryscript/issues/5068 +CVE-2023-31922 - https://github.com/bellard/quickjs/issues/178 +CVE-2023-31940 - https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug7-SQL-Injection-page_id.md +CVE-2023-31972 - https://github.com/yasm/yasm/issues/209 +CVE-2023-31973 - https://github.com/yasm/yasm/issues/207 +CVE-2023-31974 - https://github.com/yasm/yasm/issues/208 +CVE-2023-31979 - https://github.com/petewarden/catdoc/issues/9 +CVE-2023-31981 - https://github.com/irontec/sngrep/issues/430 +CVE-2023-31982 - https://github.com/irontec/sngrep/issues/431 +CVE-2023-31983 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/2/Readme.md +CVE-2023-31985 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/3/Readme.md +CVE-2023-31986 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/4/Readme.md +CVE-2023-32019 - http://packetstormsecurity.com/files/173310/Windows-Kernel-KTM-Registry-Transactions-Non-Atomic-Outcomes.html +CVE-2023-32046 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-3206 - https://github.com/shulao2020/cve/blob/main/Flying%20Fish.md +CVE-2023-32068 - https://jira.xwiki.org/browse/XWIKI-20096 +CVE-2023-32071 - https://jira.xwiki.org/browse/XWIKI-20340 +CVE-2023-32073 - https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx +CVE-2023-32111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-32112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-32113 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-32114 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-32115 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-3217 - http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html +CVE-2023-3218 - https://huntr.dev/bounties/94d50b11-20ca-46e3-9086-dd6836421675 +CVE-2023-32183 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32183 +CVE-2023-32184 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32184 +CVE-2023-3219 - http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html +CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753339 +CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753341 +CVE-2023-32207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826116 +CVE-2023-32209 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767194 +CVE-2023-32211 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823379 +CVE-2023-32212 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826622 +CVE-2023-32233 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html +CVE-2023-32233 - https://news.ycombinator.com/item?id=35879660 +CVE-2023-3224 - https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87 +CVE-2023-32243 - http://packetstormsecurity.com/files/172457/WordPress-Elementor-Lite-5.7.1-Arbitrary-Password-Reset.html +CVE-2023-3227 - https://huntr.dev/bounties/97ecf4b8-7eeb-4e39-917c-2660262ff9ba +CVE-2023-32271 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774 +CVE-2023-32275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1753 +CVE-2023-3228 - https://huntr.dev/bounties/0a7ee1fb-e693-4259-abf8-a2c3218c1647 +CVE-2023-32284 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1750 +CVE-2023-3229 - https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170 +CVE-2023-3230 - https://huntr.dev/bounties/390643f0-106b-4424-835d-52610aefa4c7 +CVE-2023-32307 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-rm4c-ccvf-ff9c +CVE-2023-32309 - https://github.com/facelessuser/pymdown-extensions/security/advisories/GHSA-jh85-wwv9-24hv +CVE-2023-32313 - https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550 +CVE-2023-32313 - https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v +CVE-2023-32314 - https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac +CVE-2023-32314 - https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5 +CVE-2023-32315 - http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html +CVE-2023-32317 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/ +CVE-2023-3232 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Broken%20Access%20Control.md +CVE-2023-32321 - https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst +CVE-2023-32322 - https://github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp +CVE-2023-32324 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7 +CVE-2023-3233 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md +CVE-2023-3234 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20deserialization.md +CVE-2023-3235 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%201.md +CVE-2023-3236 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%202.md +CVE-2023-3237 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20contains%20a%20weak%20default%20password%20which%20gives%20attackers%20to%20access%20backstage%20management%20system.md +CVE-2023-3238 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md +CVE-2023-3239 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20obtain%20the%20web%20directory%20path%20and%20other%20information%20leaked%20.md +CVE-2023-3240 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20download%20vulenrability%20via%20the%20filename.md +CVE-2023-3241 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20read%20vulenrability%20via%20the%20filename.md +CVE-2023-3243 - https://www.honeywell.com/us/en/product-security +CVE-2023-3247 - https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw +CVE-2023-32486 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32487 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32488 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32489 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32490 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32491 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32492 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32493 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32494 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32495 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities +CVE-2023-32521 - https://www.tenable.com/security/research/tra-2023-17 +CVE-2023-32522 - https://www.tenable.com/security/research/tra-2023-17 +CVE-2023-32541 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759 +CVE-2023-32560 - http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html +CVE-2023-32560 - http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html +CVE-2023-32571 - https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/ +CVE-2023-32614 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1749 +CVE-2023-32615 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771 +CVE-2023-32616 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837 +CVE-2023-32629 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-32632 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767 +CVE-2023-32634 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755 +CVE-2023-32645 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752 +CVE-2023-32653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802 +CVE-2023-32664 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1795 +CVE-2023-32676 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/ +CVE-2023-32679 - https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c +CVE-2023-3269 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/07/28/1 +CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/08/25/4 +CVE-2023-32698 - https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c +CVE-2023-32699 - https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7 +CVE-2023-32707 - http://packetstormsecurity.com/files/174602/Splunk-Enterprise-Account-Takeover.html +CVE-2023-32707 - http://packetstormsecurity.com/files/175386/Splunk-edit_user-Capability-Privilege-Escalation.html +CVE-2023-32741 - http://packetstormsecurity.com/files/175654/WordPress-Contact-Form-To-Any-API-1.1.2-SQL-Injection.html +CVE-2023-32749 - http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html +CVE-2023-32749 - http://seclists.org/fulldisclosure/2023/May/18 +CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments +CVE-2023-32750 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-005/ +CVE-2023-32750 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2023-32751 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-004/ +CVE-2023-32751 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2023-3276 - https://vuldb.com/?id.231626 +CVE-2023-32767 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-014.txt +CVE-2023-32781 - http://packetstormsecurity.com/files/176677/PRTG-Authenticated-Remote-Code-Execution.html +CVE-2023-32784 - https://github.com/keepassxreboot/keepassxc/discussions/9433 +CVE-2023-32784 - https://github.com/vdohney/keepass-password-dumper +CVE-2023-32784 - https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/ +CVE-2023-3279 - https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635 +CVE-2023-32832 - http://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html +CVE-2023-32837 - http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html +CVE-2023-3291 - https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5 +CVE-2023-3294 - https://huntr.dev/bounties/9d308ebb-4289-411f-ac22-990383d98932 +CVE-2023-32961 - https://lourcode.kr/posts/CVE-2023-32961-Analysis/ +CVE-2023-3304 - https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17 +CVE-2023-3305 - https://github.com/sleepyvv/vul_report/blob/main/C-data/BrokenAccessControl.md +CVE-2023-3307 - https://github.com/ctflearner/Vulnerability/blob/main/MINICAL/minical.md +CVE-2023-3308 - https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md +CVE-2023-3309 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309 +CVE-2023-3311 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3311 +CVE-2023-3313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403 +CVE-2023-33131 - http://packetstormsecurity.com/files/173361/Microsoft-365-MSO-2306-Build-16.0.16529.20100-Remote-Code-Execution.html +CVE-2023-3314 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403 +CVE-2023-33140 - http://packetstormsecurity.com/files/173064/Microsoft-OneNote-2305-Build-16.0.16501.20074-Spoofing.html +CVE-2023-33148 - http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.html +CVE-2023-3316 - https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/ +CVE-2023-3318 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318 +CVE-2023-33185 - https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md +CVE-2023-33190 - https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62 +CVE-2023-33194 - https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9 +CVE-2023-33195 - https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x +CVE-2023-33196 - https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5 +CVE-2023-33197 - https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr +CVE-2023-3320 - http://packetstormsecurity.com/files/173048/WordPress-WP-Sticky-Social-1.0.1-CSRF-Cross-Site-Scripting.html +CVE-2023-33203 - https://bugzilla.suse.com/show_bug.cgi?id=1210685 +CVE-2023-33203 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 +CVE-2023-33237 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-33238 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-33239 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-33241 - https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc +CVE-2023-33241 - https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ +CVE-2023-33242 - https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc +CVE-2023-33242 - https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/ +CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses +CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2022-004/-starface-authentication-with-password-hash-possible +CVE-2023-33246 - http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html +CVE-2023-33253 - https://github.com/Toxich4/CVE-2023-33253 +CVE-2023-33255 - http://packetstormsecurity.com/files/172644/Papaya-Medical-Viewer-1.0-Cross-Site-Scripting.html +CVE-2023-33263 - https://packetstormsecurity.com/files/172560/WFTPD-3.25-Credential-Disclosure.html +CVE-2023-33268 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33268.md +CVE-2023-33269 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33269.md +CVE-2023-33270 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33270.md +CVE-2023-33271 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33271.md +CVE-2023-33272 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33272.md +CVE-2023-33273 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33273.md +CVE-2023-33274 - https://gist.github.com/pedromonteirobb/a0584095b46141702c8cae0f3f1b6759 +CVE-2023-33276 - https://www.syss.de/en/responsible-disclosure-policy +CVE-2023-33276 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt +CVE-2023-33277 - https://www.syss.de/en/responsible-disclosure-policy +CVE-2023-33277 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt +CVE-2023-33284 - https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html +CVE-2023-33288 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 +CVE-2023-33289 - https://gist.github.com/6en6ar/b118888dc739e8979038f24c8ac33611 +CVE-2023-33291 - http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html +CVE-2023-33335 - https://inf0seq.github.io/cve/2023/05/03/Cross-Site-scripting-(XSS)-in-Sophos-iView.html +CVE-2023-33336 - https://inf0seq.github.io/cve/2023/04/30/Cross-site-scripting-(XSS)-in-Sophos-Web-Appliance-4.1.1-0.9.html +CVE-2023-33356 - https://github.com/Thecosy/IceCMS/issues/8 +CVE-2023-33359 - https://github.com/Piwigo/Piwigo/issues/1908 +CVE-2023-3338 - https://seclists.org/oss-sec/2023/q2/276 +CVE-2023-33383 - http://packetstormsecurity.com/files/173954/Shelly-PRO-4PM-0.11.0-Authentication-Bypass.html +CVE-2023-33383 - https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability +CVE-2023-33386 - https://github.com/b1ackc4t/MarsCTF/issues/10 +CVE-2023-33387 - https://www.tuv.com/landingpage/de/schwachstelle/ +CVE-2023-33408 - https://github.com/Thirukrishnan/CVE-2023-33408 +CVE-2023-33409 - https://github.com/Thirukrishnan/CVE-2023-33409 +CVE-2023-33410 - https://github.com/Thirukrishnan/CVE-2023-33410 +CVE-2023-3342 - http://packetstormsecurity.com/files/173434/WordPress-User-Registration-3.0.2-Arbitrary-File-Upload.html +CVE-2023-33440 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html +CVE-2023-33443 - https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras/ +CVE-2023-3346 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-007_en.pdf +CVE-2023-33478 - https://github.com/remoteclinic/RemoteClinic/issues/22 +CVE-2023-33479 - https://github.com/remoteclinic/RemoteClinic/issues/23 +CVE-2023-33480 - https://github.com/remoteclinic/RemoteClinic/issues/24 +CVE-2023-33485 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/5 +CVE-2023-33486 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3 +CVE-2023-33487 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/4 +CVE-2023-33496 - https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md +CVE-2023-33510 - https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/ +CVE-2023-33518 - https://github.com/emoncms/emoncms/issues/1856 +CVE-2023-33534 - https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696 +CVE-2023-33537 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/1/TL-WR940N_TL-WR841N_TL-WR740N_userRpm_FixMapCfgRpm.md +CVE-2023-33538 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md +CVE-2023-33544 - https://github.com/hawtio/hawtio/issues/2832 +CVE-2023-33546 - https://github.com/janino-compiler/janino/issues/201 +CVE-2023-33553 - https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md +CVE-2023-33556 - https://github.com/Am1ngl/ttt/tree/main/37 +CVE-2023-33558 - https://github.com/ninj4c0d3r/OcoMon-Research/commit/6357def478b11119270b89329fceb115f12c69fc +CVE-2023-33568 - https://www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dump/ +CVE-2023-33570 - https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490 +CVE-2023-33580 - http://packetstormsecurity.com/files/173030/Student-Study-Center-Management-System-1.0-Cross-Site-Scripting.html +CVE-2023-33580 - https://www.exploit-db.com/exploits/51528 +CVE-2023-33584 - http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html +CVE-2023-33584 - https://packetstormsecurity.com/files/cve/CVE-2023-33584 +CVE-2023-33584 - https://www.exploit-db.com/exploits/51501 +CVE-2023-33592 - http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html +CVE-2023-33595 - https://github.com/python/cpython/issues/103824 +CVE-2023-33621 - https://justinapplegate.me/2023/glinet-CVE-2023-33621/ +CVE-2023-33625 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md +CVE-2023-33625 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/cmd%20injection +CVE-2023-33626 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md +CVE-2023-33626 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow +CVE-2023-33627 - https://hackmd.io/@0dayResearch/UpdateSnat +CVE-2023-33628 - https://hackmd.io/@0dayResearch/DelvsList_R300 +CVE-2023-33629 - https://hackmd.io/@0dayResearch/r1UjggZfh +CVE-2023-33630 - https://hackmd.io/@0dayResearch/HkUA31-Mh +CVE-2023-33631 - https://hackmd.io/@0dayResearch/DelSTList +CVE-2023-33632 - https://hackmd.io/@0dayResearch/r1N7fg-fn +CVE-2023-33633 - https://hackmd.io/@0dayResearch/UpdateWanParams +CVE-2023-33634 - https://hackmd.io/@0dayResearch/r1g5bl-Mn +CVE-2023-33635 - https://hackmd.io/@0dayResearch/UpdateMacClone +CVE-2023-33636 - https://hackmd.io/@0dayResearch/HyX6mgWz2 +CVE-2023-33637 - https://hackmd.io/@0dayResearch/r1azLeWz3 +CVE-2023-33638 - https://hackmd.io/@0dayResearch/ryyALdiV3 +CVE-2023-33639 - https://hackmd.io/@0dayResearch/Bk2hvYkH3 +CVE-2023-33640 - https://hackmd.io/@0dayResearch/S1twOtyrh +CVE-2023-33641 - https://hackmd.io/@0dayResearch/SycYkOj42 +CVE-2023-33642 - https://hackmd.io/@0dayResearch/Skg0zOsVh +CVE-2023-33643 - https://hackmd.io/@0dayResearch/S1N5bdsE2 +CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1164 +CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127 +CVE-2023-33657 - https://github.com/emqx/nanomq/issues/1165#issue-1668648319 +CVE-2023-33658 - https://github.com/emqx/nanomq/issues/1153 +CVE-2023-33659 - https://github.com/emqx/nanomq/issues/1154 +CVE-2023-33660 - https://github.com/emqx/nanomq/issues/1155 +CVE-2023-33661 - https://github.com/ChurchCRM/CRM/issues/6474 +CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N1/README.md +CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N1 +CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N3/README.md +CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N3 +CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N4/README.md +CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N4 +CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N2/README.md +CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N2 +CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N6/README.md +CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N6 +CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N5/README.md +CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N5 +CVE-2023-3368 - https://starlabs.sg/advisories/23/23-3368/ +CVE-2023-33684 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php +CVE-2023-33690 - https://github.com/lane711/sonicjs/pull/183 +CVE-2023-33690 - https://youtu.be/6ZuwA9CkQLg +CVE-2023-33693 - https://github.com/tsingsee/EasyPlayerPro-Win/pull/24 +CVE-2023-33716 - https://github.com/enzo1982/mp4v2/issues/36 +CVE-2023-33717 - https://github.com/enzo1982/mp4v2/issues/37 +CVE-2023-33718 - https://github.com/enzo1982/mp4v2/issues/37 +CVE-2023-33719 - https://github.com/enzo1982/mp4v2/issues/37 +CVE-2023-33720 - https://github.com/enzo1982/mp4v2/issues/36 +CVE-2023-33733 - https://github.com/c53elyas/CVE-2023-33733 +CVE-2023-33740 - https://github.com/zzh-newlearner/record/blob/main/luowice_warning.md +CVE-2023-33741 - https://github.com/zzh-newlearner/record/blob/main/macrovideo_share.md +CVE-2023-33742 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html +CVE-2023-33743 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html +CVE-2023-33744 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html +CVE-2023-33745 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html +CVE-2023-33747 - http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html +CVE-2023-33747 - https://github.com/EagleTube/CloudPanel +CVE-2023-33754 - https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md +CVE-2023-33757 - https://github.com/twignet/splicecom +CVE-2023-33758 - https://github.com/twignet/splicecom +CVE-2023-33759 - https://github.com/twignet/splicecom +CVE-2023-33760 - https://github.com/twignet/splicecom +CVE-2023-33761 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33761 +CVE-2023-33763 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33763 +CVE-2023-33764 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764 +CVE-2023-33778 - https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef +CVE-2023-33780 - https://github.com/invernyx/smartcars-3-bugs/security/advisories/GHSA-hx8p-f8h7-5h78 +CVE-2023-33781 - https://github.com/s0tr/CVE-2023-33781 +CVE-2023-33782 - https://github.com/s0tr/CVE-2023-33782 +CVE-2023-33785 - https://github.com/anhdq201/netbox/issues/8 +CVE-2023-33786 - https://github.com/anhdq201/netbox/issues/2 +CVE-2023-33787 - https://github.com/anhdq201/netbox/issues/6 +CVE-2023-33788 - https://github.com/anhdq201/netbox/issues/3 +CVE-2023-33789 - https://github.com/anhdq201/netbox/issues/7 +CVE-2023-33790 - https://github.com/anhdq201/netbox/issues/9 +CVE-2023-33791 - https://github.com/anhdq201/netbox/issues/4 +CVE-2023-33792 - https://github.com/anhdq201/netbox/issues/10 +CVE-2023-33793 - https://github.com/anhdq201/netbox/issues/1 +CVE-2023-33794 - https://github.com/anhdq201/netbox/issues/5 +CVE-2023-33795 - https://github.com/anhdq201/netbox/issues/15 +CVE-2023-33796 - https://github.com/anhdq201/netbox/issues/16 +CVE-2023-33797 - https://github.com/anhdq201/netbox/issues/12 +CVE-2023-33798 - https://github.com/anhdq201/netbox/issues/13 +CVE-2023-33799 - https://github.com/anhdq201/netbox/issues/14 +CVE-2023-3380 - https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md +CVE-2023-33800 - https://github.com/anhdq201/netbox/issues/11 +CVE-2023-33817 - https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5 +CVE-2023-33829 - http://packetstormsecurity.com/files/172588/SCM-Manager-1.60-Cross-Site-Scripting.html +CVE-2023-33829 - https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60 +CVE-2023-33849 - https://www.ibm.com/support/pages/node/7001687 +CVE-2023-3385 - https://gitlab.com/gitlab-org/gitlab/-/issues/416161 +CVE-2023-33863 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html +CVE-2023-33863 - http://seclists.org/fulldisclosure/2023/Jun/2 +CVE-2023-33863 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt +CVE-2023-33864 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html +CVE-2023-33864 - http://seclists.org/fulldisclosure/2023/Jun/2 +CVE-2023-33864 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt +CVE-2023-33865 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html +CVE-2023-33865 - http://seclists.org/fulldisclosure/2023/Jun/2 +CVE-2023-33865 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt +CVE-2023-33866 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757 +CVE-2023-33873 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ +CVE-2023-33876 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796 +CVE-2023-3389 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-3390 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-33919 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html +CVE-2023-33919 - http://seclists.org/fulldisclosure/2023/Jul/14 +CVE-2023-33920 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html +CVE-2023-33920 - http://seclists.org/fulldisclosure/2023/Jul/14 +CVE-2023-33921 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html +CVE-2023-33921 - http://seclists.org/fulldisclosure/2023/Jul/14 +CVE-2023-3393 - https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914 +CVE-2023-3394 - https://huntr.dev/bounties/84bf3e85-cdeb-4b8d-9ea4-74156dbda83f +CVE-2023-33956 - https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2 +CVE-2023-33968 - https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr +CVE-2023-33969 - https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9 +CVE-2023-33970 - https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286 +CVE-2023-33971 - https://github.com/pluginsGLPI/formcreator/security/advisories/GHSA-777g-3848-8r3g +CVE-2023-33977 - https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/ +CVE-2023-3398 - https://huntr.dev/bounties/aa087215-80e1-433d-b870-650705630e69 +CVE-2023-33984 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33985 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33986 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33987 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33988 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33989 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33990 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33991 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-33992 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-3401 - https://gitlab.com/gitlab-org/gitlab/-/issues/416252 +CVE-2023-34039 - http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html +CVE-2023-34039 - http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html +CVE-2023-34044 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html +CVE-2023-34045 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html +CVE-2023-34046 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html +CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/10/27/3 +CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/11/26/1 +CVE-2023-34092 - https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67 +CVE-2023-34093 - https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de +CVE-2023-34093 - https://github.com/strapi/strapi/releases/tag/v4.10.8 +CVE-2023-34093 - https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf +CVE-2023-34096 - http://packetstormsecurity.com/files/172822/Thruk-Monitoring-Web-Interface-3.06-Path-Traversal.html +CVE-2023-34096 - https://galogetlatorre.blogspot.com/2023/06/cve-2023-34096-path-traversal-thruk.html +CVE-2023-34096 - https://github.com/galoget/Thruk-CVE-2023-34096 +CVE-2023-34096 - https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h +CVE-2023-34096 - https://www.exploit-db.com/exploits/51509 +CVE-2023-34097 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833 +CVE-2023-34102 - https://github.com/avo-hq/avo/security/advisories/GHSA-86h2-2g4g-29qx +CVE-2023-34103 - https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39 +CVE-2023-34105 - https://github.com/ossrs/srs/security/advisories/GHSA-vpr5-779c-cx62 +CVE-2023-34111 - https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr +CVE-2023-34111 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2023-34112 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2023-34124 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html +CVE-2023-34127 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html +CVE-2023-34132 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html +CVE-2023-34133 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html +CVE-2023-34151 - https://github.com/ImageMagick/ImageMagick/issues/6341 +CVE-2023-34152 - https://github.com/ImageMagick/ImageMagick/issues/6339 +CVE-2023-34153 - https://github.com/ImageMagick/ImageMagick/issues/6338 +CVE-2023-34188 - https://github.com/cesanta/mongoose/pull/2197 +CVE-2023-34198 - https://advisories.stormshield.eu/2023-019 +CVE-2023-34204 - https://github.com/imapsync/imapsync/issues/399 +CVE-2023-34205 - https://github.com/moov-io/signedxml/issues/23 +CVE-2023-3421 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751 +CVE-2023-34213 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-34214 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-34215 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-34216 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-34217 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities +CVE-2023-3423 - https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139 +CVE-2023-34235 - https://github.com/strapi/strapi/releases/tag/v4.10.8 +CVE-2023-34235 - https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f +CVE-2023-34251 - https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5 +CVE-2023-34253 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/ +CVE-2023-34259 - https://seclists.org/fulldisclosure/2023/Jul/15 +CVE-2023-34260 - https://seclists.org/fulldisclosure/2023/Jul/15 +CVE-2023-34261 - https://seclists.org/fulldisclosure/2023/Jul/15 +CVE-2023-3431 - https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c +CVE-2023-34312 - https://github.com/vi3t1/qq-tim-elevation +CVE-2023-34317 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772 +CVE-2023-34319 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-3432 - https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51 +CVE-2023-34346 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764 +CVE-2023-34353 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776 +CVE-2023-34354 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781 +CVE-2023-34356 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778 +CVE-2023-3436 - https://forum.xpdfreader.com/viewtopic.php?t=42618 +CVE-2023-34362 - http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html +CVE-2023-34362 - http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html +CVE-2023-34365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763 +CVE-2023-34366 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758 +CVE-2023-34366 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1758 +CVE-2023-34367 - http://blog.pi3.com.pl/?p=850 +CVE-2023-34367 - https://portswigger.net/daily-swig/blind-tcp-ip-hijacking-is-resurrected-for-windows-7 +CVE-2023-3438 - https://kcm.trellix.com/corporate/index?page=content&id=SB10404 +CVE-2023-3439 - http://www.openwall.com/lists/oss-security/2023/07/02/1 +CVE-2023-3439 - https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 +CVE-2023-34407 - https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/ +CVE-2023-34408 - https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/ +CVE-2023-34409 - https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/ +CVE-2023-34426 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766 +CVE-2023-34434 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-34448 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/ +CVE-2023-3445 - https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070 +CVE-2023-34452 - https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc +CVE-2023-34457 - https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4 +CVE-2023-34467 - https://jira.xwiki.org/browse/XWIKI-20333 +CVE-2023-34468 - http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html +CVE-2023-34488 - https://github.com/emqx/nanomq/issues/1181 +CVE-2023-34494 - https://github.com/emqx/nanomq/issues/1180 +CVE-2023-34553 - https://ashallen.net/wireless-smart-lock-vulnerability-disclosure +CVE-2023-34561 - https://www.youtube.com/watch?v=DMxucOWfLPc +CVE-2023-34561 - https://www.youtube.com/watch?v=ev0VXbiduuQ +CVE-2023-34561 - https://www.youtube.com/watch?v=kAeJvY6BBps +CVE-2023-34563 - https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-34563/EN.md +CVE-2023-34565 - https://github.com/grayfullbuster0804/netbox/issues/1 +CVE-2023-34566 - https://hackmd.io/@0dayResearch/rk8hQf5rh +CVE-2023-34567 - https://hackmd.io/@0dayResearch/H1xUqzfHh +CVE-2023-34568 - https://hackmd.io/@0dayResearch/ryR8IzMH2 +CVE-2023-34569 - https://hackmd.io/@0dayResearch/HymuzffSh +CVE-2023-34570 - https://hackmd.io/@0dayResearch/S1eI91_l2 +CVE-2023-34571 - https://hackmd.io/@0dayResearch/S1GcUxzSn +CVE-2023-34581 - https://packetstormsecurity.com/files/172559/Service-Provider-Management-System-1.0-SQL-Injection.html +CVE-2023-34581 - https://vulners.com/packetstorm/PACKETSTORM:172559 +CVE-2023-34581 - https://www.exploit-db.com/exploits/51482 +CVE-2023-34598 - https://github.com/maddsec/CVE-2023-34598 +CVE-2023-34599 - https://github.com/maddsec/CVE-2023-34599 +CVE-2023-34602 - https://github.com/jeecgboot/jeecg-boot/issues/4983 +CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/48/ +CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/49/ +CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/50/ +CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/51/ +CVE-2023-34610 - https://github.com/jdereg/json-io/issues/169 +CVE-2023-34611 - https://github.com/bolerio/mjson/issues/40 +CVE-2023-34612 - https://github.com/phax/ph-commons/issues/35 +CVE-2023-34613 - https://github.com/maddingo/sojo/issues/15 +CVE-2023-34614 - https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij +CVE-2023-34615 - https://github.com/billdavidson/JSONUtil/issues/10 +CVE-2023-34616 - https://github.com/InductiveComputerScience/pbJson/issues/2 +CVE-2023-34617 - https://github.com/owlike/genson/issues/191 +CVE-2023-34620 - https://github.com/hjson/hjson-java/issues/24 +CVE-2023-34623 - https://github.com/trajano/jtidy/issues/4 +CVE-2023-34624 - https://github.com/amplafi/htmlcleaner/issues/13 +CVE-2023-34625 - https://packetstormsecurity.com/2307-exploits/mojobox14-replay.txt +CVE-2023-34625 - https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock +CVE-2023-34634 - http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html +CVE-2023-34634 - http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html +CVE-2023-34634 - https://greenshot.atlassian.net/browse/BUG-3061 +CVE-2023-34634 - https://www.exploit-db.com/exploits/51633 +CVE-2023-34635 - http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html +CVE-2023-34635 - https://www.exploit-db.com/exploits/51610 +CVE-2023-34644 - https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/ +CVE-2023-34645 - https://github.com/jflyfox/jfinal_cms/issues/57 +CVE-2023-3465 - https://vuldb.com/?id.232711 +CVE-2023-34654 - https://github.com/ae6e361b/taocms-XSS +CVE-2023-34666 - https://www.exploit-db.com/exploits/49204 +CVE-2023-3469 - https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca +CVE-2023-34723 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html +CVE-2023-34723 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 +CVE-2023-34724 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html +CVE-2023-34724 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 +CVE-2023-34725 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html +CVE-2023-34725 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725 +CVE-2023-34733 - https://github.com/zj3t/Automotive-vulnerabilities/tree/main/VW/jetta2021 +CVE-2023-34734 - https://github.com/prismbreak/vulnerabilities/issues/3 +CVE-2023-34735 - https://github.com/prismbreak/vulnerabilities/issues/4 +CVE-2023-34736 - https://github.com/prismbreak/vulnerabilities/issues/5 +CVE-2023-34750 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34751 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34752 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34753 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34754 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34755 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34756 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability +CVE-2023-34758 - https://github.com/advisories/GHSA-8jxm-xp43-qh3q +CVE-2023-34758 - https://github.com/tangent65536/Slivjacker +CVE-2023-3479 - https://huntr.dev/bounties/6ac5cf87-6350-4645-8930-8f2876427723 +CVE-2023-34795 - https://github.com/brechtsanders/xlsxio/issues/121 +CVE-2023-34800 - https://github.com/Tyaoo/IoT-Vuls/blob/main/dlink/Go-RT-AC750/vul.md +CVE-2023-34830 - https://medium.com/@ray.999/cve-2023-34830-reflected-xss-on-i-doit-open-v24-and-below-ad58036f5407 +CVE-2023-34832 - http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html +CVE-2023-34834 - https://www.exploit-db.com/exploits/51542 +CVE-2023-34845 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 +CVE-2023-34849 - https://github.com/cczzmm/IOT-POC/tree/main/Ikuai +CVE-2023-3486 - https://www.tenable.com/security/research/tra-2023-23 +CVE-2023-34867 - https://github.com/jerryscript-project/jerryscript/issues/5084 +CVE-2023-34868 - https://github.com/jerryscript-project/jerryscript/issues/5083 +CVE-2023-34872 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399 +CVE-2023-3490 - https://huntr.dev/bounties/4e60ebc1-e00f-48cb-b011-3cefce688ecd +CVE-2023-3491 - https://huntr.dev/bounties/043bd900-ac78-44d2-a340-84ddd0bc4a1d +CVE-2023-34916 - https://github.com/fuge/cms/issues/4 +CVE-2023-34917 - https://github.com/fuge/cms/issues/3 +CVE-2023-34924 - https://github.com/ChrisL0tus/CVE-2023-34924 +CVE-2023-34927 - https://github.com/casdoor/casdoor/issues/1531 +CVE-2023-34928 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34928.md +CVE-2023-34929 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34929.md +CVE-2023-34930 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34930.md +CVE-2023-34931 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md +CVE-2023-34932 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34932.md +CVE-2023-34933 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34933.md +CVE-2023-34934 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34934.md +CVE-2023-34935 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34935.md +CVE-2023-34936 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md +CVE-2023-34937 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md +CVE-2023-34939 - https://github.com/firsov/onlyoffice +CVE-2023-34939 - https://github.com/firsov/onlyoffice/blob/main/CVE-2023-34939-PoC.md +CVE-2023-34960 - http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html +CVE-2023-34982 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ +CVE-2023-34994 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773 +CVE-2023-34998 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770 +CVE-2023-35001 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html +CVE-2023-35001 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-35002 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760 +CVE-2023-35016 - https://www.ibm.com/support/pages/node/7014397 +CVE-2023-35019 - https://www.ibm.com/support/pages/node/7014397 +CVE-2023-35055 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 +CVE-2023-35056 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 +CVE-2023-35057 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821 +CVE-2023-35057 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1821 +CVE-2023-35088 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-3511 - https://gitlab.com/gitlab-org/gitlab/-/issues/416961 +CVE-2023-35110 - https://github.com/grobmeier/jjson/issues/2 +CVE-2023-35116 - https://github.com/FasterXML/jackson-databind/issues/3972 +CVE-2023-35124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775 +CVE-2023-35126 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825 +CVE-2023-35126 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825 +CVE-2023-3513 - https://starlabs.sg/advisories/23/23-3513/ +CVE-2023-3514 - https://starlabs.sg/advisories/23/23-3514/ +CVE-2023-3515 - https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053 +CVE-2023-35153 - https://jira.xwiki.org/browse/XWIKI-20365 +CVE-2023-35155 - https://jira.xwiki.org/browse/XWIKI-20370 +CVE-2023-35156 - https://jira.xwiki.org/browse/XWIKI-20341 +CVE-2023-35157 - https://jira.xwiki.org/browse/XWIKI-20339 +CVE-2023-35158 - https://jira.xwiki.org/browse/XWIKI-20352 +CVE-2023-35160 - https://jira.xwiki.org/browse/XWIKI-20343 +CVE-2023-35162 - https://jira.xwiki.org/browse/XWIKI-20342 +CVE-2023-35169 - https://github.com/Webklex/php-imap/security/advisories/GHSA-47p7-xfcc-4pv9 +CVE-2023-3519 - http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html +CVE-2023-35193 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782 +CVE-2023-35194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782 +CVE-2023-3520 - https://huntr.dev/bounties/f3b277bb-91db-419e-bcc4-fe0b055d2551 +CVE-2023-3521 - https://huntr.dev/bounties/76a3441d-7f75-4a8d-a7a0-95a7f5456eb0 +CVE-2023-3523 - https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac +CVE-2023-3526 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html +CVE-2023-3526 - http://seclists.org/fulldisclosure/2023/Aug/12 +CVE-2023-3528 - https://vuldb.com/?id.233252 +CVE-2023-3531 - https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414 +CVE-2023-3532 - https://huntr.dev/bounties/ebd2428a-e2cb-480e-ba37-dd89ad62cf1b +CVE-2023-3533 - https://starlabs.sg/advisories/23/23-3533/ +CVE-2023-35356 - http://packetstormsecurity.com/files/174115/Microsoft-Windows-Kernel-Arbitrary-Read.html +CVE-2023-35356 - http://packetstormsecurity.com/files/174118/Microsoft-Windows-Kernel-Security-Descriptor-Use-After-Free.html +CVE-2023-35356 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html +CVE-2023-35357 - http://packetstormsecurity.com/files/174116/Microsoft-Windows-Kernel-Unsafe-Reference.html +CVE-2023-35358 - http://packetstormsecurity.com/files/174117/Microsoft-Windows-Kernel-Unsafe-Reference.html +CVE-2023-35359 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html +CVE-2023-3537 - https://vuldb.com/?id.233289 +CVE-2023-35382 - http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html +CVE-2023-35386 - http://packetstormsecurity.com/files/174567/Microsoft-Windows-Kernel-Integer-Overflow-Out-Of-Bounds-Read.html +CVE-2023-3545 - https://starlabs.sg/advisories/23/23-3545/ +CVE-2023-3551 - https://huntr.dev/bounties/cf8878ff-6cd9-49be-b313-7ac2a94fc7f7 +CVE-2023-3552 - https://huntr.dev/bounties/aeb2f43f-0602-4ac6-9685-273e87ff4ded +CVE-2023-3553 - https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870 +CVE-2023-3559 - https://vuldb.com/?id.233353 +CVE-2023-35633 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html +CVE-2023-3565 - https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530 +CVE-2023-3566 - https://github.com/ctflearner/Vulnerability/blob/main/WALLABAG/NAME-LIMIT.md +CVE-2023-3566 - https://youtu.be/ouwud0PlHkE +CVE-2023-35668 - https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd +CVE-2023-3567 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-3567 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-3568 - https://huntr.dev/bounties/f3782eb1-049b-4998-aac4-d9798ec1c123 +CVE-2023-3569 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html +CVE-2023-3569 - http://seclists.org/fulldisclosure/2023/Aug/12 +CVE-2023-35695 - https://www.tenable.com/security/research/tra-2023-17 +CVE-2023-35719 - https://www.manageengine.com/products/self-service-password/kb/our-response-to-CVE-2023-35719.html +CVE-2023-3574 - https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6 +CVE-2023-3575 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins +CVE-2023-35759 - http://packetstormsecurity.com/files/176978/WhatsUp-Gold-2022-22.1.0-Build-39-Cross-Site-Scripting.html +CVE-2023-35788 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html +CVE-2023-35788 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 +CVE-2023-3579 - https://github.com/nightcloudos/cve/blob/main/CSRF.md +CVE-2023-35799 - https://advisories.stormshield.eu/2023-022/ +CVE-2023-3580 - https://huntr.dev/bounties/4eed53ca-06c2-43aa-aea8-c03ea5f13ce4 +CVE-2023-35800 - https://advisories.stormshield.eu/2023-021/ +CVE-2023-35808 - http://packetstormsecurity.com/files/174300/SugarCRM-12.2.0-Shell-Upload.html +CVE-2023-35808 - http://seclists.org/fulldisclosure/2023/Aug/26 +CVE-2023-35809 - http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html +CVE-2023-35810 - http://packetstormsecurity.com/files/174302/SugarCRM-12.2.0-PHP-Object-Injection.html +CVE-2023-35810 - http://seclists.org/fulldisclosure/2023/Aug/28 +CVE-2023-35811 - http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html +CVE-2023-35811 - http://seclists.org/fulldisclosure/2023/Aug/29 +CVE-2023-35818 - https://espressif.com +CVE-2023-35839 - https://github.com/noear/solon/issues/145 +CVE-2023-35861 - https://blog.freax13.de/cve/cve-2023-35861 +CVE-2023-35863 - https://ctrl-c.club/~blue/nfsdk.html +CVE-2023-35866 - https://medium.com/@cybercitizen.tech/keepassxc-vulnerability-cve-2023-35866-dc7d447c4903 +CVE-2023-35870 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-35871 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-35872 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-35873 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-35874 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-35885 - https://github.com/datackmy/FallingSkies-CVE-2023-35885 +CVE-2023-35885 - https://www.datack.my/fallingskies-cloudpanel-0-day/ +CVE-2023-35925 - https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp +CVE-2023-35932 - https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q +CVE-2023-35937 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r +CVE-2023-35941 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 +CVE-2023-35942 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 +CVE-2023-35943 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq +CVE-2023-35944 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g +CVE-2023-35945 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r +CVE-2023-35965 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 +CVE-2023-35966 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 +CVE-2023-35967 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 +CVE-2023-35968 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 +CVE-2023-35985 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834 +CVE-2023-3599 - https://github.com/movonow/demo/blob/main/click_fees.md +CVE-2023-3607 - https://github.com/mohdkey/cve/blob/main/kodbox.md +CVE-2023-36085 - http://packetstormsecurity.com/files/176991/SISQUAL-WFM-7.1.319.103-Host-Header-Injection.html +CVE-2023-36085 - https://github.com/omershaik0/Handmade_Exploits/tree/main/SISQUALWFM-Host-Header-Injection-CVE-2023-36085 +CVE-2023-3609 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-3609 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-36093 - https://github.com/weng-xianhu/eyoucms/issues/44 +CVE-2023-36095 - http://langchain.com +CVE-2023-36109 - https://github.com/Limesss/CVE-2023-36109/tree/main +CVE-2023-36118 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html +CVE-2023-36118 - https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7 +CVE-2023-36119 - https://nvd.nist.gov/vuln/detail/CVE-2023-0527 +CVE-2023-36121 - https://www.chtsecurity.com/news/0a4743a5-491e-4685-95ee-df8316ab5284 +CVE-2023-36121 - https://www.exploit-db.com/exploits/51449 +CVE-2023-36123 - https://github.com/9Bakabaka/CVE-2023-36123 +CVE-2023-36143 - https://github.com/leonardobg/CVE-2023-36143 +CVE-2023-36144 - https://github.com/leonardobg/CVE-2023-36144 +CVE-2023-36146 - https://github.com/leonardobg/CVE-2023-36146/#readme +CVE-2023-36158 - https://cyberredteam.tech/posts/cve-2023-36158/ +CVE-2023-36158 - https://github.com/unknown00759/CVE-2023-36158/blob/main/CVE-2023-36158.md +CVE-2023-36159 - https://cyberredteam.tech/posts/cve-2023-36159/ +CVE-2023-36162 - https://github.com/779789571/zzcms/blob/main/README.md +CVE-2023-36163 - http://packetstormsecurity.com/files/173366/BuildaGate5-Cross-Site-Scripting.html +CVE-2023-3617 - https://github.com/movonow/demo/blob/main/kruxton.md +CVE-2023-36177 - https://oxnan.com/posts/Snapcast_jsonrpc_rce +CVE-2023-36183 - https://github.com/OpenImageIO/oiio/issues/3871 +CVE-2023-36184 - https://medium.com/@Beosin_com/critical-vulnerability-in-move-vm-can-cause-total-network-shutdown-and-potential-hard-fork-in-sui-49d0d942801c +CVE-2023-3620 - https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9 +CVE-2023-36210 - https://www.exploit-db.com/exploits/51499 +CVE-2023-36211 - https://www.exploit-db.com/exploits/51502 +CVE-2023-36212 - https://packetstormsecurity.com/files/172687/Total-CMS-1.7.4-Shell-Upload.html +CVE-2023-36212 - https://www.exploit-db.com/exploits/51500 +CVE-2023-36213 - https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html +CVE-2023-36213 - https://www.exploit-db.com/exploits/51504 +CVE-2023-36217 - https://www.exploit-db.com/exploits/51520 +CVE-2023-36220 - https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html +CVE-2023-36239 - https://github.com/libming/libming/issues/273 +CVE-2023-36243 - https://github.com/noirotm/flvmeta/issues/19 +CVE-2023-3625 - https://github.com/MoeMion233/cve/blob/main/1.md +CVE-2023-36250 - https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md +CVE-2023-36252 - https://www.zeroscience.mk/en/vulnerabilities/ +CVE-2023-36255 - https://trovent.github.io/security-advisories/TRSA-2303-01/TRSA-2303-01.txt +CVE-2023-36255 - https://trovent.io/security-advisory-2303-01/ +CVE-2023-36256 - https://www.exploit-db.com/exploits/51511 +CVE-2023-36256 - https://www.hackersnotes.com/blog/pentest/online-examination-system-project-1-0-cross-site-request-forgery-csrf/ +CVE-2023-3626 - https://github.com/MoeMion233/cve/blob/main/2.md +CVE-2023-36266 - http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html +CVE-2023-3627 - https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1 +CVE-2023-36271 - https://github.com/LibreDWG/libredwg/issues/681#BUG2 +CVE-2023-36272 - https://github.com/LibreDWG/libredwg/issues/681#BUG1 +CVE-2023-36273 - https://github.com/LibreDWG/libredwg/issues/677#BUG1 +CVE-2023-36274 - https://github.com/LibreDWG/libredwg/issues/677#BUG2 +CVE-2023-36306 - https://www.exploit-db.com/exploits/51643 +CVE-2023-36308 - https://github.com/disintegration/imaging/issues/165 +CVE-2023-36344 - https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html +CVE-2023-36345 - https://youtu.be/KxjsEqNWU9E +CVE-2023-36345 - https://yuyudhn.github.io/pos-codekop-vulnerability/ +CVE-2023-36346 - http://packetstormsecurity.com/files/173280/Sales-Of-Cashier-Goods-1.0-Cross-Site-Scripting.html +CVE-2023-36346 - https://www.youtube.com/watch?v=bbbA-q1syrA +CVE-2023-36346 - https://yuyudhn.github.io/pos-codekop-vulnerability/ +CVE-2023-36347 - https://www.youtube.com/watch?v=7qaIeE2cyO4 +CVE-2023-36347 - https://yuyudhn.github.io/pos-codekop-vulnerability/ +CVE-2023-36348 - http://packetstormsecurity.com/files/173278/POS-Codekop-2.0-Shell-Upload.html +CVE-2023-36348 - https://www.youtube.com/watch?v=Ge0zqY0sGiQ +CVE-2023-36348 - https://yuyudhn.github.io/pos-codekop-vulnerability/ +CVE-2023-3635 - https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/ +CVE-2023-36354 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md +CVE-2023-36355 - http://packetstormsecurity.com/files/173294/TP-Link-TL-WR940N-4-Buffer-Overflow.html +CVE-2023-36357 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md +CVE-2023-36359 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/8/TP-Link%20TL-WR940N%20TL-WR841N%20TL-WR941ND%20wireless%20router%20userRpmQoSRuleListRpm%20buffer%20read%20out-of-bounds%20vulnerability.md +CVE-2023-36375 - https://packetstormsecurity.com +CVE-2023-36376 - https://packetstormsecurity.com +CVE-2023-3638 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05 +CVE-2023-36403 - http://packetstormsecurity.com/files/176209/Windows-Kernel-Race-Conditions.html +CVE-2023-36404 - http://packetstormsecurity.com/files/176110/Windows-Kernel-Information-Disclosure.html +CVE-2023-3643 - https://drive.google.com/file/d/1RXmDUAjqZvWSvHUrfRerz7My6M3KX7YG/view +CVE-2023-36463 - https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7 +CVE-2023-36472 - https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 +CVE-2023-36542 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-36546 - https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/ +CVE-2023-36576 - http://packetstormsecurity.com/files/175659/Windows-Kernel-Containerized-Registry-Escape.html +CVE-2023-36618 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html +CVE-2023-36618 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/ +CVE-2023-36619 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html +CVE-2023-36619 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/ +CVE-2023-36620 - https://seclists.org/fulldisclosure/2023/Jul/12 +CVE-2023-36621 - https://seclists.org/fulldisclosure/2023/Jul/12 +CVE-2023-36622 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-012.txt +CVE-2023-36622 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 +CVE-2023-36623 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-013.txt +CVE-2023-36623 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 +CVE-2023-36624 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-004.txt +CVE-2023-36624 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 +CVE-2023-36629 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hunting-for-android-privilege-escalation-with-a-32-line-fuzzer/ +CVE-2023-36629 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-007_Xiaomi_Redmi_10sNote-1.txt +CVE-2023-36630 - https://github.com/yunaranyancat/poc-dump/blob/main/cloudpanel/README.md +CVE-2023-36631 - https://www.bencteux.fr/posts/malwarebytes_wfc/ +CVE-2023-36632 - https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py +CVE-2023-3665 - https://kcm.trellix.com/corporate/index?page=content&id=SB10405 +CVE-2023-36656 - https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r +CVE-2023-36665 - https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665 +CVE-2023-36669 - https://kratosdefense.com +CVE-2023-36670 - https://kratosdefense.com +CVE-2023-36672 - https://mullvad.net/de/blog/2023/8/9/response-to-tunnelcrack-vulnerability-disclosure/ +CVE-2023-3672 - https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa +CVE-2023-3673 - https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9 +CVE-2023-36803 - http://packetstormsecurity.com/files/175109/Microsoft-Windows-Kernel-Out-Of-Bounds-Reads-Memory-Disclosure.html +CVE-2023-36806 - https://herolab.usd.de/security-advisories/usd-2023-0020/ +CVE-2023-36809 - https://huntr.dev/bounties/c6eeb346-fa99-4d41-bc40-b68f8d689223/ +CVE-2023-36812 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html +CVE-2023-36812 - https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9 +CVE-2023-36813 - https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx +CVE-2023-36815 - https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w +CVE-2023-36816 - https://github.com/Bubka/2FAuth/security/advisories/GHSA-cwhq-2mcq-pp9q +CVE-2023-36820 - https://github.com/micronaut-projects/micronaut-security/security/advisories/GHSA-qw22-8w9r-864h +CVE-2023-36821 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96 +CVE-2023-36822 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 +CVE-2023-36828 - https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g +CVE-2023-36844 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html +CVE-2023-36844 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html +CVE-2023-36845 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html +CVE-2023-36845 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html +CVE-2023-36845 - http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html +CVE-2023-36846 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html +CVE-2023-36847 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html +CVE-2023-36864 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797 +CVE-2023-36864 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1797 +CVE-2023-3687 - https://vuldb.com/?id.234233 +CVE-2023-36874 - http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html +CVE-2023-36884 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-36887 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1747 +CVE-2023-36917 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-36918 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-36919 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-3692 - https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12 +CVE-2023-36921 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-36922 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-36924 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-36925 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html +CVE-2023-36936 - https://packetstormsecurity.com +CVE-2023-36939 - https://packetstormsecurity.com +CVE-2023-36940 - https://packetstormsecurity.com +CVE-2023-36941 - https://packetstormsecurity.com +CVE-2023-36942 - https://packetstormsecurity.com +CVE-2023-36947 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/UploadCustomModule.md +CVE-2023-36950 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/loginauth.md +CVE-2023-36954 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_3.md +CVE-2023-3696 - https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467 +CVE-2023-36968 - https://okankurtulus.com.tr/2023/06/21/food-ordering-system-v1-0-authenticated-sql-injection/ +CVE-2023-36969 - https://okankurtulus.com.tr/2023/06/26/cms-made-simple-v2-2-17-file-upload-remote-code-execution-rce-authenticated/ +CVE-2023-36970 - https://okankurtulus.com.tr/2023/06/27/cms-made-simple-v2-2-17-stored-cross-site-scripting-xss-authenticated/ +CVE-2023-37049 - https://github.com/Num-Nine/CVE/issues/1 +CVE-2023-37070 - https://github.com/InfoSecWarrior/Offensive-Payloads/blob/main/Cross-Site-Scripting-XSS-Payloads.txt +CVE-2023-3710 - https://www.honeywell.com/us/en/product-security +CVE-2023-3711 - https://www.honeywell.com/us/en/product-security +CVE-2023-3712 - https://www.honeywell.com/us/en/product-security +CVE-2023-37139 - https://github.com/chakra-core/ChakraCore/issues/6884 +CVE-2023-37140 - https://github.com/chakra-core/ChakraCore/issues/6885 +CVE-2023-37141 - https://github.com/chakra-core/ChakraCore/issues/6886 +CVE-2023-37142 - https://github.com/chakra-core/ChakraCore/issues/6887 +CVE-2023-37143 - https://github.com/chakra-core/ChakraCore/issues/6888 +CVE-2023-37144 - https://github.com/DaDong-G/Vulnerability_info/blob/main/ac10_command_injection/Readme.md +CVE-2023-37145 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/1/Readme.md +CVE-2023-37146 - https://github.com/DaDong-G/Vulnerability_info/tree/main/TOTOLINK/lr350/2 +CVE-2023-37148 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/3/README.md +CVE-2023-37149 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/4/README.md +CVE-2023-37150 - https://www.chtsecurity.com/news/57fd2fe6-11d9-421d-9087-88b4d5090452 +CVE-2023-37151 - https://www.exploit-db.com/exploits/51431 +CVE-2023-37152 - https://github.com/Trinity-SYT-SECURITY/arbitrary-file-upload-RCE/blob/main/Online%20Art%20gallery%20project%201.0.md +CVE-2023-37152 - https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20 +CVE-2023-37152 - https://www.exploit-db.com/exploits/51524 +CVE-2023-37153 - https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/KodExplorer4.51.03.md +CVE-2023-37153 - https://www.chtsecurity.com/news/13a86b33-7e49-4167-9682-7ff3f51cbcba%20 +CVE-2023-37164 - https://www.exploit-db.com/exploits/51529 +CVE-2023-37165 - https://www.exploit-db.com/exploits/51450 +CVE-2023-37170 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_1 +CVE-2023-37171 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_2 +CVE-2023-37172 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_3 +CVE-2023-37173 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_4 +CVE-2023-37174 - https://github.com/gpac/gpac/issues/2505 +CVE-2023-37177 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html +CVE-2023-37192 - https://satoshihunter1.blogspot.com/2023/06/the-bitcoin-app-is-vulnerable-to-hackers.html +CVE-2023-37192 - https://www.youtube.com/watch?v=oEl4M1oZim0 +CVE-2023-37201 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826002 +CVE-2023-37202 - https://bugzilla.mozilla.org/show_bug.cgi?id=1834711 +CVE-2023-37205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704420 +CVE-2023-37206 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813299 +CVE-2023-37207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816287 +CVE-2023-37208 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837675 +CVE-2023-37210 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821886 +CVE-2023-3725 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-3725 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3 +CVE-2023-37261 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2 +CVE-2023-37262 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2 +CVE-2023-37263 - https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc +CVE-2023-37264 - https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53 +CVE-2023-37268 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-868r-97g5-r9g4 +CVE-2023-37269 - http://packetstormsecurity.com/files/173520/WinterCMS-1.2.2-Cross-Site-Scripting.html +CVE-2023-37270 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-934w-qj9p-3qcx +CVE-2023-37279 - https://github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv +CVE-2023-37298 - https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83 +CVE-2023-37298 - https://github.com/laurent22/joplin/releases/tag/v2.11.5 +CVE-2023-37299 - https://github.com/laurent22/joplin/commit/9e90d9016daf79b5414646a93fd369aedb035071 +CVE-2023-37299 - https://github.com/laurent22/joplin/releases/tag/v2.11.5 +CVE-2023-37302 - https://phabricator.wikimedia.org/T339111 +CVE-2023-37304 - https://phabricator.wikimedia.org/T323651 +CVE-2023-37305 - https://phabricator.wikimedia.org/T326952 +CVE-2023-37306 - https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle +CVE-2023-37307 - http://packetstormsecurity.com/files/176975/MISP-2.4.171-Cross-Site-Scripting.html +CVE-2023-3732 - http://packetstormsecurity.com/files/174223/Chrome-IPCZ-FragmentDescriptors-Missing-Validation.html +CVE-2023-37361 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=32305 +CVE-2023-37456 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795496 +CVE-2023-37460 - https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m +CVE-2023-37461 - https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v +CVE-2023-37463 - https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5 +CVE-2023-37466 - https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5 +CVE-2023-37474 - http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html +CVE-2023-37474 - https://github.com/9001/copyparty/security/advisories/GHSA-pxfv-7rr3-2qjg +CVE-2023-37475 - https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45 +CVE-2023-37477 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5 +CVE-2023-37478 - https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7 +CVE-2023-3752 - https://vuldb.com/?id.234422 +CVE-2023-37543 - https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed +CVE-2023-37569 - http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html +CVE-2023-37581 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-37596 - https://github.com/sahiloj/CVE-2023-37596/blob/main/README.md +CVE-2023-37597 - https://github.com/sahiloj/CVE-2023-37597/blob/main/README.md +CVE-2023-37598 - https://github.com/sahiloj/CVE-2023-37598 +CVE-2023-37600 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html +CVE-2023-37601 - https://packetstormsecurity.com/files/173146/Office-Suite-Premium-10.9.1.42602-Local-File-Inclusion.html +CVE-2023-37602 - https://www.exploit-db.com/exploits/51564 +CVE-2023-37605 - https://medium.com/@david_42/complex-password-vs-buffer-overflow-and-the-winner-is-decbc56db5e3 +CVE-2023-37607 - https://github.com/CQURE/CVEs/blob/main/CVE-2023-37607/README.md +CVE-2023-37608 - https://github.com/CQURE/CVEs/tree/main/CVE-2023-37608 +CVE-2023-3761 - https://vuldb.com/?id.234446 +CVE-2023-3761 - https://youtu.be/bMJwSCps0Lc +CVE-2023-37611 - https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b +CVE-2023-37627 - https://gist.github.com/1337kid/d3e7702bd19cc9355a6b3f153eb2fe8e +CVE-2023-37628 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37628 +CVE-2023-37629 - http://packetstormsecurity.com/files/173656/Online-Piggery-Management-System-1.0-Shell-Upload.html +CVE-2023-37629 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37629 +CVE-2023-37630 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37630 +CVE-2023-37644 - https://github.com/matthiaskramm/swftools/issues/202 +CVE-2023-37649 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/ +CVE-2023-3765 - https://huntr.dev/bounties/4be5fd63-8a0a-490d-9ee1-f33dc768ed76 +CVE-2023-37650 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/ +CVE-2023-37679 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html +CVE-2023-37679 - https://www.ihteam.net/advisory/mirth-connect +CVE-2023-37683 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37683.txt +CVE-2023-37684 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37684.txt +CVE-2023-37685 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37685.txt +CVE-2023-37686 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37686.txt +CVE-2023-37687 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37687.txt +CVE-2023-37688 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37688.txt +CVE-2023-37689 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37689.txt +CVE-2023-37690 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37690.txt +CVE-2023-37692 - https://okankurtulus.com.tr/2023/07/24/october-cms-v3-4-4-stored-cross-site-scripting-xss-authenticated/ +CVE-2023-37710 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetWirelessRepeat +CVE-2023-37711 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/saveParentControlInfo +CVE-2023-37712 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetIpBind +CVE-2023-37714 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromRouteStatic/report.md +CVE-2023-37715 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fmL7ProtForm/reprot.md +CVE-2023-37716 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromNatStaticSetting/report.md +CVE-2023-37717 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.md +CVE-2023-37718 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeClientFilter/report.md +CVE-2023-37719 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromP2pListFilter/report.md +CVE-2023-3772 - http://www.openwall.com/lists/oss-security/2023/08/10/1 +CVE-2023-3772 - https://bugzilla.redhat.com/show_bug.cgi?id=2218943 +CVE-2023-37721 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeMacFilter/report.md +CVE-2023-37722 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeUrlFilter/report.md +CVE-2023-37723 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromqossetting/report.md +CVE-2023-37728 - http://icewarp.com +CVE-2023-3773 - https://bugzilla.redhat.com/show_bug.cgi?id=2218944 +CVE-2023-37732 - https://github.com/yasm/yasm/issues/233 +CVE-2023-37734 - https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911 +CVE-2023-37734 - https://www.exploit-db.com/exploits/10374 +CVE-2023-37748 - https://github.com/miniupnp/ngiflib/issues/25 +CVE-2023-37758 - https://hackmd.io/@pSgS7xsnS5a4K7Y0yiB43g/rJr8oNn_n +CVE-2023-37759 - https://packetstormsecurity.com/files/174240/Crypto-Currency-Tracker-CCT-9.5-Add-Administrator.html +CVE-2023-3776 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-3776 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-37765 - https://github.com/gpac/gpac/issues/2515 +CVE-2023-37766 - https://github.com/gpac/gpac/issues/2516 +CVE-2023-37767 - https://github.com/gpac/gpac/issues/2514 +CVE-2023-3777 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-3777 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-37770 - https://github.com/grame-cncm/faust/issues/922 +CVE-2023-37785 - https://github.com/CrownZTX/cve-description +CVE-2023-37786 - https://github.com/CrownZTX/reflectedxss1 +CVE-2023-37787 - https://github.com/CrownZTX/storedXSS +CVE-2023-37790 - https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html +CVE-2023-37791 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-619L/overflow +CVE-2023-37793 - https://github.com/PwnYouLin/IOT_vul/blob/main/wayos/2/readme.md +CVE-2023-37794 - https://github.com/PwnYouLin/IOT_vul/tree/main/wayos/1 +CVE-2023-37798 - https://www.cyderes.com/blog/cve-2023-37798-stored-cross-site-scripting-in-vanderbilt-redcap/ +CVE-2023-3782 - https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/ +CVE-2023-3783 - https://seclists.org/fulldisclosure/2023/Jul/38 +CVE-2023-3783 - https://www.vulnerability-lab.com/get_content.php?id=2321 +CVE-2023-37831 - https://github.com/strik3r0x1/Vulns/blob/main/User%20enumeration%20-%20Elenos.md +CVE-2023-37832 - https://github.com/strik3r0x1/Vulns/blob/main/Lack%20of%20resources%20and%20rate%20limiting%20-%20Elenos.md +CVE-2023-37833 - https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to%20access%20Traps%20configurations.md +CVE-2023-37836 - https://github.com/thorfdbg/libjpeg/issues/87#BUG1 +CVE-2023-37837 - https://github.com/thorfdbg/libjpeg/issues/87#BUG0 +CVE-2023-3784 - https://seclists.org/fulldisclosure/2023/Jul/37 +CVE-2023-3784 - https://www.vulnerability-lab.com/get_content.php?id=2317 +CVE-2023-37849 - https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/ +CVE-2023-3785 - https://seclists.org/fulldisclosure/2023/Jul/39 +CVE-2023-3785 - https://www.vulnerability-lab.com/get_content.php?id=2285 +CVE-2023-3786 - https://seclists.org/fulldisclosure/2023/Jul/40 +CVE-2023-3786 - https://www.vulnerability-lab.com/get_content.php?id=2323 +CVE-2023-3787 - https://seclists.org/fulldisclosure/2023/Jul/35 +CVE-2023-3787 - https://vuldb.com/?id.235054 +CVE-2023-3787 - https://www.vulnerability-lab.com/get_content.php?id=2276 +CVE-2023-3788 - https://seclists.org/fulldisclosure/2023/Jul/34 +CVE-2023-3788 - https://www.vulnerability-lab.com/get_content.php?id=2278 +CVE-2023-3789 - https://seclists.org/fulldisclosure/2023/Jul/36 +CVE-2023-3789 - https://www.vulnerability-lab.com/get_content.php?id=2286 +CVE-2023-37895 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-3790 - https://seclists.org/fulldisclosure/2023/Jul/33 +CVE-2023-3790 - https://www.vulnerability-lab.com/get_content.php?id=2274 +CVE-2023-37900 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf +CVE-2023-37903 - https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4 +CVE-2023-37907 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-9c9p-c3mg-hpjq +CVE-2023-37910 - https://jira.xwiki.org/browse/XWIKI-20334 +CVE-2023-37915 - https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9 +CVE-2023-37916 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h +CVE-2023-37917 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r +CVE-2023-37918 - https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj +CVE-2023-37927 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ +CVE-2023-37928 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ +CVE-2023-37941 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html +CVE-2023-37979 - http://packetstormsecurity.com/files/173983/WordPress-Ninja-Forms-3.6.25-Cross-Site-Scripting.html +CVE-2023-37988 - http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html +CVE-2023-3801 - https://vuldb.com/?id.235069 +CVE-2023-3802 - https://vuldb.com/?id.235070 +CVE-2023-38022 - https://jovanbulck.github.io/files/ccs19-tale.pdf +CVE-2023-38035 - http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html +CVE-2023-38043 - https://northwave-cybersecurity.com/vulnerability-notice/arbitrary-kernel-function-call-in-ivanti-secure-access-client +CVE-2023-3811 - https://vuldb.com/?id.235079 +CVE-2023-38127 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808 +CVE-2023-38127 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1808 +CVE-2023-38128 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809 +CVE-2023-38128 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809 +CVE-2023-38139 - http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html +CVE-2023-38140 - http://packetstormsecurity.com/files/175108/Microsoft-Windows-Kernel-Paged-Pool-Memory-Disclosure.html +CVE-2023-38141 - http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html +CVE-2023-38146 - http://packetstormsecurity.com/files/176391/Themebleed-Windows-11-Themes-Arbitrary-Code-Execution.html +CVE-2023-38154 - http://packetstormsecurity.com/files/174568/Microsoft-Windows-Kernel-Recovery-Memory-Corruption.html +CVE-2023-3817 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-3819 - https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c +CVE-2023-38190 - https://herolab.usd.de/security-advisories/usd-2023-0014/ +CVE-2023-38191 - https://herolab.usd.de/security-advisories/usd-2023-0012/ +CVE-2023-38192 - https://herolab.usd.de/security-advisories/usd-2023-0011/ +CVE-2023-38193 - https://herolab.usd.de/en/security-advisories/usd-2023-0015/ +CVE-2023-38194 - https://herolab.usd.de/security-advisories/usd-2023-0013/ +CVE-2023-3820 - https://huntr.dev/bounties/b00a38b6-d040-494d-bf46-38f46ac1a1db +CVE-2023-38203 - https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html +CVE-2023-3821 - https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa +CVE-2023-3822 - https://huntr.dev/bounties/2a3a13fe-2a9a-4d1a-8814-fd8ed1e3b1d5 +CVE-2023-3823 - https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr +CVE-2023-3824 - https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv +CVE-2023-38252 - https://github.com/tats/w3m/issues/270 +CVE-2023-38253 - https://github.com/tats/w3m/issues/271 +CVE-2023-38286 - https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI +CVE-2023-3830 - https://vuldb.com/?id.235151 +CVE-2023-38328 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2023-38334 - http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html +CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/42 +CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-38334 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt +CVE-2023-38335 - http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html +CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/41 +CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-38335 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt +CVE-2023-38346 - https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ +CVE-2023-38351 - https://0dr3f.github.io/cve/ +CVE-2023-38352 - https://0dr3f.github.io/cve/ +CVE-2023-38353 - https://0dr3f.github.io/cve/ +CVE-2023-38354 - https://0dr3f.github.io/cve/ +CVE-2023-38355 - https://0dr3f.github.io/cve/ +CVE-2023-38356 - https://0dr3f.github.io/cve/ +CVE-2023-38357 - http://packetstormsecurity.com/files/173609/RWS-WorldServer-11.7.3-Session-Token-Enumeration.html +CVE-2023-38357 - http://seclists.org/fulldisclosure/2023/Jul/30 +CVE-2023-38357 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-001/-session-token-enumeration-in-rws-worldserver +CVE-2023-38378 - https://news.ycombinator.com/item?id=36745664 +CVE-2023-38378 - https://tortel.li/post/insecure-scope/ +CVE-2023-38379 - https://news.ycombinator.com/item?id=36745664 +CVE-2023-38379 - https://tortel.li/post/insecure-scope/ +CVE-2023-38403 - https://github.com/esnet/iperf/issues/1542 +CVE-2023-38408 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html +CVE-2023-38408 - https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent +CVE-2023-38408 - https://news.ycombinator.com/item?id=36790196 +CVE-2023-38409 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12 +CVE-2023-3843 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-3843 - https://vuldb.com/?id.235194 +CVE-2023-38434 - https://github.com/cozis/xHTTP/issues/1 +CVE-2023-38435 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-3844 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-3844 - https://vuldb.com/?id.235195 +CVE-2023-3845 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-3846 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-3847 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-3848 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-38487 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg +CVE-2023-3849 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html +CVE-2023-38495 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf +CVE-2023-38501 - http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html +CVE-2023-38501 - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh +CVE-2023-38502 - https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf +CVE-2023-38507 - https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r +CVE-2023-3853 - https://vuldb.com/?id.235205 +CVE-2023-38543 - https://northwave-cybersecurity.com/vulnerability-notice/denial-of-service-in-ivanti-secure-access-client-driver +CVE-2023-38573 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839 +CVE-2023-38617 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html +CVE-2023-38633 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-38633 - https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/ +CVE-2023-38646 - http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html +CVE-2023-38646 - http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html +CVE-2023-38666 - https://github.com/axiomatic-systems/Bento4/issues/784 +CVE-2023-38669 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md +CVE-2023-38670 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md +CVE-2023-38671 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md +CVE-2023-38672 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md +CVE-2023-38673 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md +CVE-2023-38674 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md +CVE-2023-38675 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md +CVE-2023-38676 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md +CVE-2023-38677 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md +CVE-2023-38678 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md +CVE-2023-38687 - https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq +CVE-2023-38688 - https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx +CVE-2023-38698 - https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3 +CVE-2023-38701 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18 +CVE-2023-38701 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6 +CVE-2023-38702 - https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc +CVE-2023-3878 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2010.pdf +CVE-2023-38817 - https://ioctl.fail/echo-ac-writeup/ +CVE-2023-3882 - https://vuldb.com/?id.235244 +CVE-2023-38823 - https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md +CVE-2023-38829 - https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E +CVE-2023-3883 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2015.pdf +CVE-2023-38831 - http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html +CVE-2023-38831 - https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ +CVE-2023-38836 - http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html +CVE-2023-3884 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2016.pdf +CVE-2023-38840 - https://github.com/bitwarden/clients/pull/5813 +CVE-2023-38840 - https://github.com/markuta/bw-dump +CVE-2023-38840 - https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/ +CVE-2023-38843 - https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1 +CVE-2023-38844 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html +CVE-2023-38861 - https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3 +CVE-2023-38862 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject1 +CVE-2023-38863 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject4 +CVE-2023-38864 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject3 +CVE-2023-38865 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject5 +CVE-2023-38866 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2 +CVE-2023-3887 - https://vuldb.com/?id.235249 +CVE-2023-38886 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38886_Dolibarr_RCE-1.pdf +CVE-2023-38888 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38888_Dolibarr_XSS.pdf +CVE-2023-38890 - https://github.com/akshadjoshi/CVE-2023-38890 +CVE-2023-38891 - https://github.com/jselliott/CVE-2023-38891 +CVE-2023-38902 - https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37 +CVE-2023-38904 - https://www.exploit-db.com/exploits/51576 +CVE-2023-38905 - https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642 +CVE-2023-3891 - https://fluidattacks.com/advisories/aerosmith +CVE-2023-38910 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md +CVE-2023-38911 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38911/Readme.md +CVE-2023-38912 - https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html +CVE-2023-38921 - https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler +CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727 +CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727/issues/160 +CVE-2023-38947 - https://gitee.com/CTF-hacker/pwn/issues/I7LH2N +CVE-2023-38948 - https://gitee.com/CTF-hacker/pwn/issues/I7LI4E +CVE-2023-3896 - https://github.com/vim/vim/issues/12528 +CVE-2023-38960 - https://rodelllemit.medium.com/insecure-permissions-vulnerability-in-raidenftpd-v2-4-build-4005-2016-04-01-ea7389be3d33 +CVE-2023-38961 - https://github.com/jerryscript-project/jerryscript/issues/5092 +CVE-2023-38965 - http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html +CVE-2023-38969 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books +CVE-2023-3897 - http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html +CVE-2023-38970 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-new-member +CVE-2023-38971 - https://panda002.hashnode.dev/badaso-version-297-has-xss-vulnerability-in-add-ranks +CVE-2023-38975 - https://github.com/qdrant/qdrant/issues/2268 +CVE-2023-38996 - https://gist.github.com/RNPG/53b579da330ba896aa8dc2d901e5e400 +CVE-2023-38997 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-38998 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-38999 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-3900 - https://gitlab.com/gitlab-org/gitlab/-/issues/418770 +CVE-2023-39000 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39001 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39002 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39003 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39004 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39005 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39006 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39007 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39008 - https://logicaltrust.net/blog/2023/08/opnsense.html +CVE-2023-39010 - https://github.com/lessthanoptimal/BoofCV/issues/406 +CVE-2023-39017 - https://github.com/quartz-scheduler/quartz/issues/943 +CVE-2023-39026 - http://packetstormsecurity.com/files/174491/FileMage-Gateway-1.10.9-Local-File-Inclusion.html +CVE-2023-39026 - https://raindayzz.com/technicalblog/2023/08/20/FileMage-Vulnerability.html +CVE-2023-3904 - https://gitlab.com/gitlab-org/gitlab/-/issues/418226 +CVE-2023-39063 - https://github.com/AndreGNogueira/CVE-2023-39063 +CVE-2023-39070 - https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/ +CVE-2023-39073 - https://gist.github.com/ph4nt0mbyt3/9456312e867c10de8f808250ec0b12d3 +CVE-2023-39075 - https://blog.dhjeong.kr/posts/automotive/2023/12/how-to-fuzzing-realcars/ +CVE-2023-39075 - https://blog.dhjeong.kr/posts/vuln/202307/renault-zoe/ +CVE-2023-39075 - https://blog.jhyeon.dev/posts/vuln/202307/renault-zoe/ +CVE-2023-39076 - https://blog.dhjeong.kr/posts/vuln/202307/gm-chevrolet/ +CVE-2023-39076 - https://blog.jhyeon.dev/posts/vuln/202307/gm-chevrolet/ +CVE-2023-39107 - https://www.ns-echo.com/posts/nomachine_afo.html +CVE-2023-39108 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_b.md +CVE-2023-39109 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_a.md +CVE-2023-39110 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_%20ajaxGetFileByPath.md +CVE-2023-39113 - https://github.com/miniupnp/ngiflib/issues/27 +CVE-2023-39114 - https://github.com/miniupnp/ngiflib/issues/29 +CVE-2023-39115 - http://packetstormsecurity.com/files/173950/Campcodes-Online-Matrimonial-Website-System-3.3-Cross-Site-Scripting.html +CVE-2023-39115 - https://github.com/Raj789-sec/CVE-2023-39115 +CVE-2023-39115 - https://www.exploit-db.com/exploits/51656 +CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1 +CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1#issue-1817133689 +CVE-2023-39122 - https://github.com/DojoSecurity/BMC-Control-M-Unauthenticated-SQL-Injection +CVE-2023-39125 - https://github.com/LMP88959/NTSC-CRT/issues/32 +CVE-2023-39135 - https://blog.ostorlab.co/zip-packages-exploitation.html +CVE-2023-39136 - https://blog.ostorlab.co/zip-packages-exploitation.html +CVE-2023-39136 - https://github.com/ZipArchive/ZipArchive/issues/680 +CVE-2023-39137 - https://blog.ostorlab.co/zip-packages-exploitation.html +CVE-2023-39137 - https://github.com/brendan-duncan/archive/issues/266 +CVE-2023-39138 - https://blog.ostorlab.co/zip-packages-exploitation.html +CVE-2023-39139 - https://blog.ostorlab.co/zip-packages-exploitation.html +CVE-2023-3914 - https://gitlab.com/gitlab-org/gitlab/-/issues/418115 +CVE-2023-39141 - https://gist.github.com/JafarAkhondali/528fe6c548b78f454911fb866b23f66e +CVE-2023-39143 - https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/ +CVE-2023-39147 - http://packetstormsecurity.com/files/173878/Uvdesk-1.1.3-Shell-Upload.html +CVE-2023-39167 - https://seclists.org/fulldisclosure/2023/Nov/5 +CVE-2023-39169 - https://seclists.org/fulldisclosure/2023/Nov/3 +CVE-2023-3917 - https://gitlab.com/gitlab-org/gitlab/-/issues/417896 +CVE-2023-39171 - https://seclists.org/fulldisclosure/2023/Nov/2 +CVE-2023-39172 - https://seclists.org/fulldisclosure/2023/Nov/4 +CVE-2023-3920 - https://gitlab.com/gitlab-org/gitlab/-/issues/417481 +CVE-2023-39265 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html +CVE-2023-3932 - https://gitlab.com/gitlab-org/gitlab/-/issues/417594 +CVE-2023-39325 - https://go.dev/issue/63417 +CVE-2023-39341 - https://www.sourcenext.com/support/i/2023/230718_01 +CVE-2023-39350 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh +CVE-2023-39351 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq +CVE-2023-39352 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj +CVE-2023-39353 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f +CVE-2023-39354 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6 +CVE-2023-39355 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h +CVE-2023-39356 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m +CVE-2023-39357 - https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg +CVE-2023-39358 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g +CVE-2023-39359 - https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h +CVE-2023-39360 - https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4 +CVE-2023-39361 - https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg +CVE-2023-39362 - http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html +CVE-2023-39362 - https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp +CVE-2023-39364 - https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x +CVE-2023-39365 - https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22 +CVE-2023-39366 - https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv +CVE-2023-39420 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/ +CVE-2023-39421 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained +CVE-2023-39422 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained +CVE-2023-39423 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained +CVE-2023-39424 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained +CVE-2023-39443 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826 +CVE-2023-39444 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826 +CVE-2023-39453 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1830 +CVE-2023-3946 - https://kcm.trellix.com/corporate/index?page=content&id=SB10402 +CVE-2023-39508 - http://seclists.org/fulldisclosure/2023/Jul/43 +CVE-2023-39510 - https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h +CVE-2023-39511 - https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42 +CVE-2023-39512 - https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7 +CVE-2023-39513 - https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2 +CVE-2023-39514 - https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7 +CVE-2023-39515 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h +CVE-2023-39516 - https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv +CVE-2023-39520 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-62gx-54j7-mjh3 +CVE-2023-39523 - https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f +CVE-2023-39534 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-fcr6-x23w-94wp +CVE-2023-39542 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832 +CVE-2023-39551 - https://www.chtsecurity.com/news/0dbe8e1d-0a6c-4604-9cf1-778ddc86a8c1 +CVE-2023-39558 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39558.md +CVE-2023-39559 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39559.md +CVE-2023-39560 - https://github.com/Luci4n555/cve_ectouch +CVE-2023-39562 - https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8 +CVE-2023-39562 - https://github.com/gpac/gpac/issues/2537 +CVE-2023-39578 - https://panda002.hashnode.dev/a-stored-cross-site-scripting-xss-vulnerability-in-the-create-the-function-of-zenario-cms-v94 +CVE-2023-39584 - https://www.gem-love.com/2023/07/25/hexo%E5%8D%9A%E5%AE%A2%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E5%92%8C%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/#undefined +CVE-2023-39598 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-39598-9598b92da49c +CVE-2023-39599 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-39599/Readme.md +CVE-2023-39600 - https://icewarp.com +CVE-2023-39610 - https://github.com/zn9988/publications/tree/main/1.TP-Link%20Tapo%20C100%20-%20HTTP%20Denial-Of-Service +CVE-2023-39611 - https://medium.com/@arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9 +CVE-2023-39612 - https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/ +CVE-2023-39612 - https://github.com/filebrowser/filebrowser/issues/2570 +CVE-2023-39615 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 +CVE-2023-39619 - https://gist.github.com/6en6ar/712a4c1eab0324f15e09232c77ea08f8 +CVE-2023-39631 - https://github.com/langchain-ai/langchain/issues/8363 +CVE-2023-39631 - https://github.com/pydata/numexpr/issues/442 +CVE-2023-39639 - https://security.friendsofpresta.org/modules/2023/08/31/leoblog.html +CVE-2023-3964 - https://gitlab.com/gitlab-org/gitlab/-/issues/419857 +CVE-2023-39641 - https://security.friendsofpresta.org/modules/2023/08/31/psaffiliate.html +CVE-2023-39642 - https://security.friendsofpresta.org/modules/2023/08/29/cartsguru.html +CVE-2023-39643 - https://security.friendsofpresta.org/modules/2023/08/29/xmlfeeds.html +CVE-2023-39654 - https://github.com/Leeyangee/leeya_bug/blob/main/%5BWarning%5DSQL%20Injection%20in%20abupy%20%3C=%20v0.4.0.md +CVE-2023-39659 - https://github.com/langchain-ai/langchain/issues/7700 +CVE-2023-39660 - https://github.com/gventuri/pandas-ai/issues/399 +CVE-2023-39661 - https://github.com/gventuri/pandas-ai/issues/410 +CVE-2023-39662 - https://github.com/jerryjliu/llama_index/issues/7054 +CVE-2023-39675 - https://blog.sorcery.ie/posts/simpleimportproduct_sqli/ +CVE-2023-39676 - https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/ +CVE-2023-39677 - https://blog.sorcery.ie/posts/myprestamodules_phpinfo/ +CVE-2023-39681 - https://github.com/yanbochen97/CuppaCMS_RCE +CVE-2023-39683 - https://medium.com/@vificatem/cve-2023-39683-dom-xss-on-json-source-code-panel-in-zalify-easy-email-3fa08f3e0d49 +CVE-2023-39685 - https://github.com/hjson/hjson-java/issues/27 +CVE-2023-39695 - https://github.com/strik3r0x1/Vulns/blob/35fe4fb3d5945b5df2a87aab0cf9ec6137bcf976/Insufficient%20Session%20Expiration%20-%20Elenos.md +CVE-2023-39699 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion +CVE-2023-3970 - https://vuldb.com/?id.235569 +CVE-2023-39726 - https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50 +CVE-2023-39741 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 +CVE-2023-39741 - https://github.com/ckolivas/lrzip/issues/246 +CVE-2023-39741 - https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow +CVE-2023-39742 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 +CVE-2023-39743 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 +CVE-2023-39743 - https://github.com/huanglei3/lrzip-next-poc/tree/main +CVE-2023-39743 - https://github.com/pete4abw/lrzip-next/issues/132 +CVE-2023-39777 - https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c +CVE-2023-39785 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/2 +CVE-2023-39786 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/3 +CVE-2023-3979 - https://gitlab.com/gitlab-org/gitlab/-/issues/419972 +CVE-2023-3980 - https://huntr.dev/bounties/6eb3cb9a-5c78-451f-ae76-0b1e62fe5e54 +CVE-2023-3981 - https://huntr.dev/bounties/f5018226-0063-415d-9675-d7e30934ff78 +CVE-2023-39810 - https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/ +CVE-2023-3982 - https://huntr.dev/bounties/e5e889ee-5947-4c2a-a72e-9c90e2e2a845 +CVE-2023-39827 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formAddMacfilterRule +CVE-2023-39828 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formWifiBasicSet +CVE-2023-39829 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/fromSetWirelessRepeat +CVE-2023-3983 - https://www.tenable.com/security/research/tra-2023-24 +CVE-2023-39834 - https://github.com/Pbootcms/Pbootcms/issues/8 +CVE-2023-3986 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/Stored%20XSS +CVE-2023-3987 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/SQL%20Injection +CVE-2023-39908 - https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/ +CVE-2023-39909 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2023-39910 - https://news.ycombinator.com/item?id=37054862 +CVE-2023-39928 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831 +CVE-2023-39945 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9 +CVE-2023-39946 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx +CVE-2023-39947 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv +CVE-2023-39948 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-x9pj-vrgf-f68f +CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/issues/3236 +CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg +CVE-2023-39951 - https://github.com/open-telemetry/opentelemetry-java-instrumentation/security/advisories/GHSA-hghr-r469-gfq6 +CVE-2023-39964 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5 +CVE-2023-39965 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 +CVE-2023-39966 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4 +CVE-2023-39967 - https://github.com/wiremock/wiremock/security/advisories/GHSA-676j-xrv3-73vc +CVE-2023-39979 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities +CVE-2023-39980 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities +CVE-2023-39981 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities +CVE-2023-39982 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities +CVE-2023-39983 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities +CVE-2023-40013 - https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8 +CVE-2023-40021 - https://github.com/oppia/oppia/security/advisories/GHSA-49jp-pjc3-2532 +CVE-2023-40024 - https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj +CVE-2023-40031 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ +CVE-2023-40035 - https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw +CVE-2023-40036 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ +CVE-2023-4004 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-4004 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-40044 - http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html +CVE-2023-40044 - https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044 +CVE-2023-40044 - https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044 +CVE-2023-40044 - https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/ +CVE-2023-40044 - https://www.theregister.com/2023/10/02/ws_ftp_update/ +CVE-2023-4005 - https://huntr.dev/bounties/f0aacce1-79bc-4765-95f1-7e824433b9e4 +CVE-2023-4007 - https://huntr.dev/bounties/e891dcbc-2092-49d3-9518-23e37187a5ea +CVE-2023-40085 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/ed6ee1f7eca7b33160e36ac6d730a9ef395ca4f1 +CVE-2023-40121 - https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253 +CVE-2023-40123 - https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9 +CVE-2023-40133 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40134 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40135 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40136 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40137 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40138 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40139 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 +CVE-2023-40163 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836 +CVE-2023-40164 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ +CVE-2023-40166 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ +CVE-2023-40178 - https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw +CVE-2023-40181 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8 +CVE-2023-40186 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v +CVE-2023-40187 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f +CVE-2023-40188 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq +CVE-2023-4019 - https://wpscan.com/vulnerability/0d323b07-c6e7-4aba-85bc-64659ad0c85d +CVE-2023-40194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833 +CVE-2023-40238 - https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html +CVE-2023-40274 - https://github.com/getzola/zola/issues/2257 +CVE-2023-40283 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-40283 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-40291 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ +CVE-2023-40292 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ +CVE-2023-40293 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ +CVE-2023-40305 - https://savannah.gnu.org/bugs/index.php?64503 +CVE-2023-4033 - https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321 +CVE-2023-40361 - https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md +CVE-2023-40362 - https://github.com/ally-petitt/CVE-2023-40362 +CVE-2023-4039 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf +CVE-2023-40459 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs +CVE-2023-40461 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs +CVE-2023-40462 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs +CVE-2023-40463 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs +CVE-2023-40464 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs +CVE-2023-40465 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs +CVE-2023-4047 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839073 +CVE-2023-4051 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821884 +CVE-2023-40519 - https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa +CVE-2023-4052 - https://bugzilla.mozilla.org/show_bug.cgi?id=1824420 +CVE-2023-4053 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839079 +CVE-2023-4054 - https://bugzilla.mozilla.org/show_bug.cgi?id=1840777 +CVE-2023-40567 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp +CVE-2023-40569 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp +CVE-2023-40574 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw +CVE-2023-40575 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v +CVE-2023-40576 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2 +CVE-2023-40586 - https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h +CVE-2023-40589 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x +CVE-2023-40590 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4 +CVE-2023-40610 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f678-j579-4xf5 +CVE-2023-40660 - http://www.openwall.com/lists/oss-security/2023/12/13/2 +CVE-2023-40660 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 +CVE-2023-40661 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 +CVE-2023-40748 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40749 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40750 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40751 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40752 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40753 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40754 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40755 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40756 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40757 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40758 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40759 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40760 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40761 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40762 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40763 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40764 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40765 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40766 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40767 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f +CVE-2023-40779 - https://medium.com/@muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710 +CVE-2023-40781 - https://github.com/libming/libming/issues/288 +CVE-2023-40791 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 +CVE-2023-40796 - https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2 +CVE-2023-40797 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_4781A4 +CVE-2023-40798 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/formSetIPv6status-formGetWanParameter +CVE-2023-40799 - https://github.com/lst-oss/Vulnerability/blob/main/Tenda/AC23/sub_450A4C +CVE-2023-40800 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time +CVE-2023-40801 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_451784 +CVE-2023-40802 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/get_parentControl_list_Info +CVE-2023-40817 - https://www.esecforte.com/cve-2023-40817-html-injection-product-configuration/ +CVE-2023-40829 - https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9 +CVE-2023-40834 - https://packetstormsecurity.com/files/174525/OpenCart-CMS-4.0.2.2-Brute-Force.html +CVE-2023-40843 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/8/8.md +CVE-2023-40845 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/14/14.md +CVE-2023-40847 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/12/12.md +CVE-2023-40851 - https://www.exploit-db.com/exploits/51694 +CVE-2023-40852 - https://www.exploit-db.com/exploits/51695 +CVE-2023-40857 - https://github.com/VirusTotal/yara/issues/1945 +CVE-2023-40868 - https://github.com/MinoTauro2020/CVE-2023-40868 +CVE-2023-40869 - https://github.com/MinoTauro2020/CVE-2023-40869 +CVE-2023-40889 - https://hackmd.io/@cspl/B1ZkFZv23 +CVE-2023-40890 - https://hackmd.io/@cspl/H1PxPAUnn +CVE-2023-40942 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md +CVE-2023-40953 - https://gist.github.com/ChubbyZ/e1e5c1858c389334dcf581a19c741308 +CVE-2023-40954 - https://github.com/luvsn/OdZoo/tree/main/exploits/web_progress +CVE-2023-40955 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2 +CVE-2023-40956 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_job_search +CVE-2023-40957 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/3 +CVE-2023-40958 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1 +CVE-2023-40968 - https://github.com/hzeller/timg/issues/115 +CVE-2023-40969 - https://github.com/slims/slims9_bulian/issues/204 +CVE-2023-40970 - https://github.com/slims/slims9_bulian/issues/205 +CVE-2023-41000 - https://github.com/gpac/gpac/issues/2550 +CVE-2023-41011 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4 +CVE-2023-41012 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws +CVE-2023-41013 - https://medium.com/@katikitala.sushmitha078/cve-2023-41013-789841dcad91 +CVE-2023-4104 - https://github.com/mozilla-mobile/mozilla-vpn-client/pull/7110 +CVE-2023-41040 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c +CVE-2023-41041 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3fqm-frhg-7c85 +CVE-2023-41045 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3 +CVE-2023-41054 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf +CVE-2023-41055 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc +CVE-2023-4110 - http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html +CVE-2023-41107 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt +CVE-2023-41107 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021 +CVE-2023-41108 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt +CVE-2023-41108 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021 +CVE-2023-41109 - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html +CVE-2023-41109 - http://seclists.org/fulldisclosure/2023/Nov/12 +CVE-2023-41109 - https://www.syss.de/ +CVE-2023-41109 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt +CVE-2023-4111 - http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html +CVE-2023-4111 - http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html +CVE-2023-4112 - http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html +CVE-2023-4113 - http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html +CVE-2023-4114 - http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html +CVE-2023-4115 - http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html +CVE-2023-4116 - http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html +CVE-2023-41165 - https://advisories.stormshield.eu/2023-020/ +CVE-2023-41166 - https://advisories.stormshield.eu/2023-027 +CVE-2023-4117 - http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html +CVE-2023-4117 - https://vuldb.com/?id.235964 +CVE-2023-4119 - http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html +CVE-2023-4120 - https://github.com/RCEraser/cve/blob/main/rce.md +CVE-2023-4121 - https://github.com/torres14852/cve/blob/main/upload.md +CVE-2023-4124 - https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348 +CVE-2023-4125 - https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28 +CVE-2023-41257 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838 +CVE-2023-4126 - https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5 +CVE-2023-4127 - https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba +CVE-2023-41270 - https://www.slideshare.net/fuguet/smold-tv-old-smart +CVE-2023-41270 - https://www.youtube.com/watch?v=MdIT4mPTX3s +CVE-2023-4128 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html +CVE-2023-41316 - https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg +CVE-2023-41325 - https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm +CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj +CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc +CVE-2023-41336 - https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax +CVE-2023-4136 - http://packetstormsecurity.com/files/174304/CrafterCMS-4.0.2-Cross-Site-Scripting.html +CVE-2023-41362 - https://blog.sorcery.ie/posts/mybb_acp_rce/ +CVE-2023-41364 - https://herolab.usd.de/security-advisories/usd-2023-0002/ +CVE-2023-4138 - https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed +CVE-2023-41387 - https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data +CVE-2023-41425 - https://gist.github.com/prodigiousMind/fc69a79629c4ba9ee88a7ad526043413 +CVE-2023-41436 - https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md +CVE-2023-41442 - https://writeups.ayyappan.me/v/tor-iot-mqtt/ +CVE-2023-41444 - https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 +CVE-2023-41444 - https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 +CVE-2023-41445 - https://gist.github.com/RNPG/84cac1b949bab0e4c587a668385b052d +CVE-2023-41446 - https://gist.github.com/RNPG/4bb91170f8ee50b395427f26bc96a1f2 +CVE-2023-41447 - https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3 +CVE-2023-41448 - https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0 +CVE-2023-41449 - https://gist.github.com/RNPG/c1ae240f2acec138132aa64ce3faa2e0 +CVE-2023-4145 - https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0 +CVE-2023-41450 - https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589 +CVE-2023-41451 - https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde +CVE-2023-41452 - https://gist.github.com/RNPG/32be1c4bae6f9378d4f382ba0c92b367 +CVE-2023-41453 - https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783 +CVE-2023-41507 - https://github.com/redblueteam/CVE-2023-41507/ +CVE-2023-41508 - https://github.com/redblueteam/CVE-2023-41508/ +CVE-2023-4157 - https://huntr.dev/bounties/abc3521b-1238-4c4e-97f1-2957db670014 +CVE-2023-41575 - https://github.com/soundarkutty/Stored-xss/blob/main/poc +CVE-2023-4158 - https://huntr.dev/bounties/e0e462ae-d7cb-4a84-b6fe-5f5de20e3d15 +CVE-2023-41580 - https://github.com/ehtec/phpipam-exploit +CVE-2023-4159 - https://huntr.dev/bounties/e2e2365e-6a5f-4ca4-9ef1-297e3ed41f9c +CVE-2023-41593 - https://portswigger.net/web-security/cross-site-scripting +CVE-2023-41599 - http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/ +CVE-2023-41601 - https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md +CVE-2023-41613 - https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html +CVE-2023-41615 - https://medium.com/@guravtushar231/sql-injection-in-login-field-a9073780f7e8 +CVE-2023-41616 - https://medium.com/@guravtushar231/reflected-xss-in-admin-panel-7a459dcb9476 +CVE-2023-41627 - https://jira.o-ran-sc.org/browse/RIC-1001 +CVE-2023-41628 - https://jira.o-ran-sc.org/browse/RIC-1002 +CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md +CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md +CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection(1).md +CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection(1).md +CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md +CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md +CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41638%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md +CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md +CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41640%20%7C%20RealGimm%20-%20Information%20disclosure.md +CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md +CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41642%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md +CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md +CVE-2023-41646 - https://github.com/tristao-marinho/CVE-2023-41646/ +CVE-2023-4168 - http://packetstormsecurity.com/files/174015/Adlisting-Classified-Ads-2.14.0-Information-Disclosure.html +CVE-2023-4169 - https://vuldb.com/?id.236185 +CVE-2023-41703 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html +CVE-2023-41704 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html +CVE-2023-41705 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html +CVE-2023-41706 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html +CVE-2023-41707 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html +CVE-2023-41708 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html +CVE-2023-41710 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html +CVE-2023-41717 - https://github.com/federella/CVE-2023-41717 +CVE-2023-4172 - https://vuldb.com/?id.236207 +CVE-2023-4173 - http://packetstormsecurity.com/files/174016/mooSocial-3.1.8-Cross-Site-Scripting.html +CVE-2023-4174 - http://packetstormsecurity.com/files/174017/Social-Commerce-3.1.6-Cross-Site-Scripting.html +CVE-2023-4175 - https://vuldb.com/?id.236210 +CVE-2023-4176 - https://vuldb.com/?id.236211 +CVE-2023-4179 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20doctors.php/vuln.md +CVE-2023-4180 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20login.php/vuln.md +CVE-2023-4181 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/vertical%20privilege%20escalation/vuln.md +CVE-2023-4182 - https://vuldb.com/?id.236217 +CVE-2023-4183 - https://vuldb.com/?id.236218 +CVE-2023-4184 - https://vuldb.com/?id.236219 +CVE-2023-4185 - https://vuldb.com/?id.236220 +CVE-2023-4187 - https://huntr.dev/bounties/14941381-b669-4756-94fc-cce172472f8b +CVE-2023-41879 - https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp +CVE-2023-4188 - https://huntr.dev/bounties/fe9809b6-40ad-4e81-9197-a9aa42e8a7bf +CVE-2023-41885 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-h7cm-mrvq-wcfr +CVE-2023-41886 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m +CVE-2023-41887 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5 +CVE-2023-41889 - https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r +CVE-2023-4189 - https://huntr.dev/bounties/b00e6986-64e7-464e-ba44-e42476bfcdc4 +CVE-2023-41892 - http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html +CVE-2023-4190 - https://huntr.dev/bounties/71bc75d2-320c-4332-ad11-9de535a06d92 +CVE-2023-4191 - https://github.com/Yesec/Resort-Reservation-System/blob/main/local%20file%20inclusion/vuln.md +CVE-2023-4192 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20manage_user.php/vuln.md +CVE-2023-4193 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20view_fee.php/vuln.md +CVE-2023-4195 - https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6 +CVE-2023-4196 - https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0 +CVE-2023-41966 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 +CVE-2023-41966 - https://www.sielco.org/en/contacts +CVE-2023-4197 - https://starlabs.sg/advisories/23/23-4197 +CVE-2023-4198 - https://starlabs.sg/advisories/23/23-4198 +CVE-2023-4199 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20catagory_data.php/vuln.md +CVE-2023-41998 - https://www.tenable.com/security/research/tra-2023-37 +CVE-2023-41999 - https://www.tenable.com/security/research/tra-2023-37 +CVE-2023-4200 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20product_data.php/vuln.md +CVE-2023-42000 - https://www.tenable.com/security/research/tra-2023-37 +CVE-2023-4201 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20ex_catagory_data.php/vuln.md +CVE-2023-4202 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html +CVE-2023-4202 - http://seclists.org/fulldisclosure/2023/Aug/13 +CVE-2023-4202 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/ +CVE-2023-4203 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html +CVE-2023-4203 - http://seclists.org/fulldisclosure/2023/Aug/13 +CVE-2023-4203 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/ +CVE-2023-42134 - https://blog.stmcyber.com/pax-pos-cves-2023/ +CVE-2023-42135 - https://blog.stmcyber.com/pax-pos-cves-2023/ +CVE-2023-42136 - https://blog.stmcyber.com/pax-pos-cves-2023/ +CVE-2023-42137 - https://blog.stmcyber.com/pax-pos-cves-2023/ +CVE-2023-42143 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 +CVE-2023-42144 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 +CVE-2023-4219 - https://github.com/Yesec/-Doctor-s-Appointment-System/blob/main/SQL%20Injection%20in%20login.php/vuln.md +CVE-2023-4220 - https://starlabs.sg/advisories/23/23-4220 +CVE-2023-4221 - https://starlabs.sg/advisories/23/23-4221 +CVE-2023-4222 - https://starlabs.sg/advisories/23/23-4222 +CVE-2023-42222 - http://packetstormsecurity.com/files/176957/WebCatalog-48.4-Arbitrary-Protocol-Execution-Code-Execution.html +CVE-2023-42222 - https://github.com/itssixtyn3in/CVE-2023-42222 +CVE-2023-4223 - https://starlabs.sg/advisories/23/23-4223 +CVE-2023-4224 - https://starlabs.sg/advisories/23/23-4224 +CVE-2023-4225 - https://starlabs.sg/advisories/23/23-4225 +CVE-2023-4226 - https://starlabs.sg/advisories/23/23-4226 +CVE-2023-42270 - http://packetstormsecurity.com/files/176958/Grocy-4.0.2-Cross-Site-Request-Forgery.html +CVE-2023-42270 - http://xploit.sh/posts/cve-2023-xxxxx/ +CVE-2023-42278 - https://github.com/dromara/hutool/issues/3289 +CVE-2023-42282 - https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html +CVE-2023-42283 - https://github.com/andreysanyuk/CVE-2023-42283 +CVE-2023-42284 - https://github.com/andreysanyuk/CVE-2023-42284 +CVE-2023-42295 - https://github.com/OpenImageIO/oiio/issues/3947 +CVE-2023-42298 - https://github.com/gpac/gpac/issues/2567 +CVE-2023-42299 - https://github.com/OpenImageIO/oiio/issues/3840 +CVE-2023-42320 - https://github.com/aixiao0621/Tenda/blob/main/AC10/0.md +CVE-2023-42323 - https://github.com/mnbvcxz131421/douhaocms/blob/main/README.md +CVE-2023-42358 - https://jira.o-ran-sc.org/browse/RIC-1009 +CVE-2023-42361 - https://gccybermonks.com/posts/pdfjira/ +CVE-2023-42362 - https://github.com/Mr-n0b3dy/CVE-2023-42362 +CVE-2023-42374 - https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US +CVE-2023-42405 - https://github.com/fit2cloud/rackshift/issues/79 +CVE-2023-42406 - https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md +CVE-2023-42406 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md +CVE-2023-42448 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03 +CVE-2023-42448 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-mgcx-6p7h-5996 +CVE-2023-42449 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03 +CVE-2023-42449 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p +CVE-2023-42459 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm +CVE-2023-42468 - https://github.com/actuator/com.cutestudio.colordialer/blob/main/CWE-284.md +CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted +CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/dial.gif +CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/poc.apk +CVE-2023-42469 - https://github.com/actuator/cve/blob/main/CVE-2023-42469 +CVE-2023-42470 - https://github.com/actuator/cve/blob/main/CVE-2023-42470 +CVE-2023-42470 - https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md +CVE-2023-42470 - https://github.com/actuator/imou/blob/main/poc.apk +CVE-2023-42471 - https://github.com/actuator/cve/blob/main/CVE-2023-42471 +CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md +CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/poc.apk +CVE-2023-4250 - https://wpscan.com/vulnerability/9c271619-f478-45c3-91d9-be0f55ee06a2 +CVE-2023-4255 - https://github.com/tats/w3m/issues/268 +CVE-2023-4256 - https://github.com/appneta/tcpreplay/issues/813 +CVE-2023-4257 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4257 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j +CVE-2023-4259 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4259 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4 +CVE-2023-4260 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4260 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh +CVE-2023-4262 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4262 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-56p9-5p3v-hhrc +CVE-2023-4263 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4263 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf +CVE-2023-4264 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4264 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j +CVE-2023-4265 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-4265 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh +CVE-2023-42752 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-42753 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-42753 - https://seclists.org/oss-sec/2023/q3/216 +CVE-2023-42753 - https://www.openwall.com/lists/oss-security/2023/09/22/10 +CVE-2023-42754 - https://seclists.org/oss-sec/2023/q4/14 +CVE-2023-42755 - https://seclists.org/oss-sec/2023/q3/229 +CVE-2023-42756 - https://seclists.org/oss-sec/2023/q3/242 +CVE-2023-42769 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 +CVE-2023-42769 - https://www.sielco.org/en/contacts +CVE-2023-4278 - http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html +CVE-2023-42787 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr +CVE-2023-42788 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p +CVE-2023-42793 - http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html +CVE-2023-42793 - https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793 +CVE-2023-42793 - https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ +CVE-2023-42799 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-r8cf-45f4-vf8m +CVE-2023-42800 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-4927-23jw-rq62 +CVE-2023-42808 - https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/ +CVE-2023-42811 - https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq +CVE-2023-42812 - https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh +CVE-2023-42821 - https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2 +CVE-2023-42882 - http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html +CVE-2023-42926 - http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html +CVE-2023-42940 - http://seclists.org/fulldisclosure/2023/Dec/20 +CVE-2023-4295 - http://packetstormsecurity.com/files/176109/Arm-Mali-CSF-Overflow-Use-After-Free.html +CVE-2023-4296 - http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html +CVE-2023-4296 - http://seclists.org/fulldisclosure/2023/Sep/10 +CVE-2023-4304 - https://huntr.dev/bounties/59fe5037-b253-4b0f-be69-1d2e4af8b4a9 +CVE-2023-4309 - https://www.youtube.com/watch?v=yeG1xZkHc64 +CVE-2023-43116 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md +CVE-2023-43131 - https://www.exploit-db.com/exploits/51641 +CVE-2023-43144 - https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2 +CVE-2023-43147 - https://github.com/MinoTauro2020/CVE-2023-43147/ +CVE-2023-43148 - https://github.com/MinoTauro2020/CVE-2023-43148 +CVE-2023-43149 - https://github.com/MinoTauro2020/CVE-2023-43149 +CVE-2023-43154 - https://cxsecurity.com/issue/WLB-2023090075 +CVE-2023-43154 - https://github.com/ally-petitt/macs-cms-auth-bypass +CVE-2023-43176 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1 +CVE-2023-43177 - https://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered/ +CVE-2023-43183 - http://seclists.org/fulldisclosure/2024/Jan/43 +CVE-2023-43183 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html +CVE-2023-43196 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug4.md +CVE-2023-43197 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug1.md +CVE-2023-43198 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug5.md +CVE-2023-43199 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug6.md +CVE-2023-43200 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug3.md +CVE-2023-43201 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug2.md +CVE-2023-43208 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html +CVE-2023-43208 - https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/ +CVE-2023-4321 - https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc +CVE-2023-4322 - https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd +CVE-2023-43222 - https://blog.csdn.net/weixin_51394168/article/details/132817842 +CVE-2023-43226 - https://github.com/zzq66/cve/ +CVE-2023-43235 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWifiDownSettings/1.md +CVE-2023-43236 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/dir_setWanWifi/1.md +CVE-2023-43237 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/setMAC/1.md +CVE-2023-43238 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2Dhcpip_cgi/1.md +CVE-2023-43239 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/showMACfilterMAC/1.md +CVE-2023-43240 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/ipportFilter/1.md +CVE-2023-43241 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWLanRadioSecurity/1.md +CVE-2023-43242 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2IPQoSTcDel/1.md +CVE-2023-43250 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html +CVE-2023-43250 - http://seclists.org/fulldisclosure/2023/Oct/15 +CVE-2023-43251 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html +CVE-2023-43251 - http://seclists.org/fulldisclosure/2023/Oct/15 +CVE-2023-43252 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html +CVE-2023-43252 - http://seclists.org/fulldisclosure/2023/Oct/15 +CVE-2023-43260 - https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13 +CVE-2023-43261 - http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html +CVE-2023-43261 - https://github.com/win3zz/CVE-2023-43261 +CVE-2023-43275 - https://github.com/thedarknessdied/dedecms/blob/main/v5.7_110-CSRF.md +CVE-2023-43278 - https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501 +CVE-2023-43284 - https://github.com/MateusTesser/CVE-2023-43284 +CVE-2023-43291 - https://gist.github.com/Dar1in9s/e3db6b04daacb68633a97581bbd5921b +CVE-2023-43309 - https://github.com/TishaManandhar/Webmin_xss_POC/blob/main/XSS +CVE-2023-43319 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-43319-c2ad758ac2bc +CVE-2023-43320 - http://packetstormsecurity.com/files/176967/Proxmox-VE-7.4-1-TOTP-Brute-Force.html +CVE-2023-43321 - https://github.com/Push3AX/vul/blob/main/DCN/DCFW_1800_SDC_CommandInjection.md +CVE-2023-43323 - https://github.com/ahrixia/CVE-2023-43323 +CVE-2023-43325 - https://github.com/ahrixia/CVE-2023-43325 +CVE-2023-43326 - https://github.com/ahrixia/CVE-2023-43326 +CVE-2023-43336 - https://medium.com/@janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826 +CVE-2023-43338 - https://github.com/cesanta/mjs/issues/250 +CVE-2023-43339 - https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md +CVE-2023-43339 - https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md +CVE-2023-43340 - https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options +CVE-2023-43340 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Admin-Options +CVE-2023-43341 - https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection- +CVE-2023-43341 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection- +CVE-2023-43342 - https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend +CVE-2023-43342 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Frontend +CVE-2023-43343 - https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files +CVE-2023-43343 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files +CVE-2023-43344 - https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description +CVE-2023-43345 - https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content +CVE-2023-43346 - https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend +CVE-2023-43346 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Backend +CVE-2023-43352 - https://github.com/sromanhu/CMSmadesimple-SSTI--Content +CVE-2023-43352 - https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content +CVE-2023-43353 - https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra +CVE-2023-43354 - https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension +CVE-2023-43355 - https://github.com/sromanhu/CMSmadesimple-Reflected-XSS---Add-user +CVE-2023-43355 - https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user +CVE-2023-43356 - https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings +CVE-2023-43357 - https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut +CVE-2023-43358 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---News +CVE-2023-43358 - https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News +CVE-2023-43359 - https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager +CVE-2023-43360 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---File-Picker-extension +CVE-2023-43360 - https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension +CVE-2023-43361 - https://github.com/xiph/vorbis-tools/issues/41 +CVE-2023-43364 - https://github.com/advisories/GHSA-66m2-493m-crh2 +CVE-2023-43364 - https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit- +CVE-2023-43364 - https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection +CVE-2023-4347 - https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f +CVE-2023-43470 - https://github.com/ae6e361b/Online-Voting-System +CVE-2023-43477 - https://www.tenable.com/security/research/tra-2023-19 +CVE-2023-43478 - https://www.tenable.com/security/research/tra-2023-19 +CVE-2023-43481 - https://github.com/actuator/com.tcl.browser/blob/main/CWE-94.md +CVE-2023-4352 - http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html +CVE-2023-4354 - http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html +CVE-2023-4355 - http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html +CVE-2023-43567 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43568 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43569 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43570 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43571 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43572 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43573 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43574 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43575 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43576 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43577 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43578 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43579 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43580 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43581 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-43608 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1845 +CVE-2023-43628 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 +CVE-2023-43641 - http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html +CVE-2023-43641 - https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/ +CVE-2023-43641 - https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj +CVE-2023-43642 - https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv +CVE-2023-43646 - https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5 +CVE-2023-43654 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html +CVE-2023-43661 - https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p +CVE-2023-43741 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md +CVE-2023-43787 - https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/ +CVE-2023-43791 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m +CVE-2023-43809 - https://github.com/charmbracelet/soft-serve/issues/389 +CVE-2023-4381 - https://huntr.dev/bounties/666c2617-e3e9-4955-9c97-2f8ed5262cc3 +CVE-2023-43810 - https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v +CVE-2023-4382 - http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html +CVE-2023-43828 - https://github.com/al3zx/xss_languages_subrion_4.2.1 +CVE-2023-4383 - https://gist.github.com/dmknght/ac489cf3605ded09b3925521afee3003 +CVE-2023-43830 - https://github.com/al3zx/xss_financial_subrion_4.2.1 +CVE-2023-43835 - https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html +CVE-2023-43860 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43861 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43862 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43863 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43864 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43865 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43866 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43867 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43868 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43869 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md +CVE-2023-43871 - https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media/blob/main/README.md +CVE-2023-43871 - https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md +CVE-2023-43872 - https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager +CVE-2023-43873 - https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage/blob/main/README.md +CVE-2023-43874 - https://github.com/sromanhu/e107-CMS-Stored-XSS---MetaCustomTags/blob/main/README.md +CVE-2023-43875 - https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md +CVE-2023-43875 - https://github.com/sromanhu/Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md +CVE-2023-43876 - https://github.com/sromanhu/October-CMS-Reflected-XSS---Installation/blob/main/README.md +CVE-2023-43877 - https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu/blob/main/README.md +CVE-2023-43877 - https://github.com/sromanhu/RiteCMS-Stored-XSS---Home +CVE-2023-43878 - https://github.com/sromanhu/RiteCMS-Stored-XSS---MainMenu/blob/main/README.md +CVE-2023-43879 - https://github.com/sromanhu/RiteCMS-Stored-XSS---GlobalContent/tree/main +CVE-2023-43884 - https://github.com/dpuenteramirez/XSS-ReferenceID-Subrion_4.2.1 +CVE-2023-43887 - https://github.com/strukturag/libde265/issues/418 +CVE-2023-43890 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20bypass%20filter.md +CVE-2023-43891 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20in%20changing%20password%20feature.md +CVE-2023-43892 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20hostname%20parameter%20in%20wan%20settings.md +CVE-2023-43893 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md +CVE-2023-43906 - https://github.com/Playful-CR/CVE-paddle-/blob/main/CVE-2023-43906 +CVE-2023-43907 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md +CVE-2023-4395 - https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da +CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser +CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/CWE-94.md +CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk +CVE-2023-43959 - https://hackmd.io/@tahaafarooq/auth_rce_voip +CVE-2023-43959 - https://www.exploit-db.com/exploits/50509 +CVE-2023-43960 - https://hackmd.io/@tahaafarooq/dlink-dph-400se-cwe-200 +CVE-2023-43960 - https://www.exploit-db.com/exploits/51709 +CVE-2023-44008 - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008 +CVE-2023-44013 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md +CVE-2023-44014 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md +CVE-2023-44015 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md +CVE-2023-44016 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md +CVE-2023-44017 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/6/0.md +CVE-2023-44018 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md +CVE-2023-44019 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/5/0.md +CVE-2023-44020 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md +CVE-2023-44021 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/2/0.md +CVE-2023-44022 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md +CVE-2023-44023 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md +CVE-2023-44031 - http://seclists.org/fulldisclosure/2024/Jan/43 +CVE-2023-44031 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html +CVE-2023-44042 - https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1 +CVE-2023-44043 - https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1 +CVE-2023-44044 - https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL +CVE-2023-44047 - https://github.com/xcodeOn1/SQLI-TollTax/blob/main/README.md +CVE-2023-44047 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44047.md +CVE-2023-44048 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main +CVE-2023-44048 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44048.md +CVE-2023-44061 - https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md +CVE-2023-4407 - http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQL-Injection.html +CVE-2023-4409 - https://vuldb.com/?id.237512 +CVE-2023-44216 - https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/ +CVE-2023-44216 - https://github.com/UT-Security/gpu-zip +CVE-2023-44216 - https://news.ycombinator.com/item?id=37663159 +CVE-2023-44216 - https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/ +CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/ +CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf +CVE-2023-4422 - https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e +CVE-2023-44249 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj +CVE-2023-44256 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh +CVE-2023-4427 - http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html +CVE-2023-44275 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense +CVE-2023-44276 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense +CVE-2023-4432 - https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f +CVE-2023-4433 - https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a +CVE-2023-4434 - https://huntr.dev/bounties/19e68377-e071-4a8e-aa4c-cd84a426602e +CVE-2023-4435 - https://huntr.dev/bounties/1875ee85-4b92-4aa4-861e-094137a29276 +CVE-2023-4437 - https://vuldb.com/?id.237558 +CVE-2023-44372 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842 +CVE-2023-4439 - https://vuldb.com/?id.237560 +CVE-2023-44393 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg +CVE-2023-44398 - https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5 +CVE-2023-44400 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g +CVE-2023-4441 - https://vuldb.com/?id.237562 +CVE-2023-44466 - https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph +CVE-2023-44467 - https://github.com/langchain-ai/langchain/commit/4c97a10bd0d9385cfee234a63b5bd826a295e483 +CVE-2023-44469 - https://security.lauritz-holtmann.de/post/sso-security-ssrf/ +CVE-2023-4448 - https://vuldb.com/?id.237569 +CVE-2023-44487 - https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ +CVE-2023-44487 - https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/ +CVE-2023-44487 - https://github.com/Azure/AKS/issues/3947 +CVE-2023-44487 - https://github.com/advisories/GHSA-qppj-fm5r-hxr3 +CVE-2023-44487 - https://github.com/akka/akka-http/issues/4323 +CVE-2023-44487 - https://github.com/alibaba/tengine/issues/1872 +CVE-2023-44487 - https://github.com/apache/apisix/issues/10320 +CVE-2023-44487 - https://github.com/apache/httpd-site/pull/10 +CVE-2023-44487 - https://github.com/apache/trafficserver/pull/10564 +CVE-2023-44487 - https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 +CVE-2023-44487 - https://github.com/caddyserver/caddy/issues/5877 +CVE-2023-44487 - https://github.com/eclipse/jetty.project/issues/10679 +CVE-2023-44487 - https://github.com/envoyproxy/envoy/pull/30055 +CVE-2023-44487 - https://github.com/etcd-io/etcd/issues/16740 +CVE-2023-44487 - https://github.com/facebook/proxygen/pull/466 +CVE-2023-44487 - https://github.com/golang/go/issues/63417 +CVE-2023-44487 - https://github.com/grpc/grpc-go/pull/6703 +CVE-2023-44487 - https://github.com/h2o/h2o/pull/3291 +CVE-2023-44487 - https://github.com/haproxy/haproxy/issues/2312 +CVE-2023-44487 - https://github.com/kazu-yamamoto/http2/issues/93 +CVE-2023-44487 - https://github.com/kubernetes/kubernetes/pull/121120 +CVE-2023-44487 - https://github.com/line/armeria/pull/5232 +CVE-2023-44487 - https://github.com/micrictor/http2-rst-stream +CVE-2023-44487 - https://github.com/microsoft/CBL-Mariner/pull/6381 +CVE-2023-44487 - https://github.com/nghttp2/nghttp2/pull/1961 +CVE-2023-44487 - https://github.com/ninenines/cowboy/issues/1615 +CVE-2023-44487 - https://github.com/nodejs/node/pull/50121 +CVE-2023-44487 - https://github.com/openresty/openresty/issues/930 +CVE-2023-44487 - https://github.com/opensearch-project/data-prepper/issues/3474 +CVE-2023-44487 - https://github.com/projectcontour/contour/pull/5826 +CVE-2023-44487 - https://github.com/tempesta-tech/tempesta/issues/1986 +CVE-2023-44487 - https://github.com/varnishcache/varnish-cache/issues/3996 +CVE-2023-44487 - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event +CVE-2023-4451 - https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa +CVE-2023-4453 - https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993 +CVE-2023-4454 - https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299 +CVE-2023-4455 - https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a +CVE-2023-4462 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-4463 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-4464 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-4465 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-4466 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-4466 - https://vuldb.com/?id.249259 +CVE-2023-4467 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-4468 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices +CVE-2023-44694 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md +CVE-2023-44709 - https://github.com/sammycage/plutosvg/issues/7 +CVE-2023-4473 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ +CVE-2023-4474 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/ +CVE-2023-44758 - https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main +CVE-2023-44760 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes +CVE-2023-44761 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms +CVE-2023-44762 - https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags +CVE-2023-44763 - https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail +CVE-2023-44764 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation +CVE-2023-44765 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations +CVE-2023-44766 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO +CVE-2023-44767 - https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md +CVE-2023-44769 - https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main +CVE-2023-44769 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main +CVE-2023-44770 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md +CVE-2023-44771 - https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout +CVE-2023-44796 - https://github.com/Hebing123/CVE-2023-44796/issues/1 +CVE-2023-44796 - https://github.com/Hebing123/cve/issues/4 +CVE-2023-44807 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug2.md +CVE-2023-44808 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md +CVE-2023-44809 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md +CVE-2023-44811 - https://github.com/ahrixia/CVE-2023-44811 +CVE-2023-44812 - https://github.com/ahrixia/CVE-2023-44812 +CVE-2023-44813 - https://github.com/ahrixia/CVE-2023-44813 +CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/195 +CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/65 +CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501 +CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 +CVE-2023-44847 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 +CVE-2023-44848 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 +CVE-2023-44860 - https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md +CVE-2023-44954 - https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md +CVE-2023-44961 - https://github.com/ggb0n/CVE-2023-44961 +CVE-2023-44962 - https://github.com/ggb0n/CVE-2023-44962 +CVE-2023-4504 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h +CVE-2023-4504 - https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 +CVE-2023-4504 - https://takeonme.org/cves/CVE-2023-4504.html +CVE-2023-4505 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 +CVE-2023-4506 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 +CVE-2023-45075 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-45076 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-45077 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-45078 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-45079 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a +CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/dfb5aac533a3f9e8ccd93ca217a753258cba4fe5 +CVE-2023-4508 - https://github.com/gerbv/gerbv/issues/191 +CVE-2023-4511 - https://gitlab.com/wireshark/wireshark/-/issues/19258 +CVE-2023-4512 - https://gitlab.com/wireshark/wireshark/-/issues/19144 +CVE-2023-4513 - https://gitlab.com/wireshark/wireshark/-/issues/19259 +CVE-2023-45139 - https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5 +CVE-2023-45142 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr +CVE-2023-45146 - https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/ +CVE-2023-45152 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf +CVE-2023-45160 - https://www.1e.com/vulnerability-disclosure-policy/ +CVE-2023-4517 - https://huntr.dev/bounties/508d1d21-c45d-47ff-833f-50c671882e51 +CVE-2023-45208 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection +CVE-2023-45228 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 +CVE-2023-45228 - https://www.sielco.org/en/contacts +CVE-2023-45229 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-4523 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01 +CVE-2023-45230 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-45231 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-45232 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-45233 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-45234 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-45235 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html +CVE-2023-45252 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/ +CVE-2023-45253 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/ +CVE-2023-45277 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies +CVE-2023-45278 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies +CVE-2023-45279 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies +CVE-2023-45280 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies +CVE-2023-45281 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies +CVE-2023-45303 - https://herolab.usd.de/security-advisories/usd-2023-0010/ +CVE-2023-45312 - https://medium.com/@_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b +CVE-2023-45317 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 +CVE-2023-45317 - https://www.sielco.org/en/contacts +CVE-2023-45318 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843 +CVE-2023-45318 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1843 +CVE-2023-4532 - https://gitlab.com/gitlab-org/gitlab/-/issues/423357 +CVE-2023-4534 - https://vuldb.com/?id.238026 +CVE-2023-4535 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651 +CVE-2023-45357 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 +CVE-2023-45358 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 +CVE-2023-45375 - https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html +CVE-2023-45376 - https://security.friendsofpresta.org/modules/2023/10/19/hicarouselspack.html +CVE-2023-45386 - https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html +CVE-2023-45396 - https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md +CVE-2023-4542 - https://github.com/PumpkinBridge/cve/blob/main/rce.md +CVE-2023-4544 - https://vuldb.com/?id.238049 +CVE-2023-45463 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md +CVE-2023-45464 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md +CVE-2023-45465 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md +CVE-2023-45466 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md +CVE-2023-45467 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md +CVE-2023-45468 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md +CVE-2023-4547 - http://packetstormsecurity.com/files/174343/SPA-Cart-eCommerce-CMS-1.9.0.3-Cross-Site-Scripting.html +CVE-2023-45471 - https://github.com/itsAptx/CVE-2023-45471 +CVE-2023-45479 - https://github.com/l3m0nade/IOTvul/blob/master/sub_49E098.md +CVE-2023-4548 - http://packetstormsecurity.com/files/174344/SPA-Cart-eCommerce-CMS-1.9.0.3-SQL-Injection.html +CVE-2023-45480 - https://github.com/l3m0nade/IOTvul/blob/master/sub_47D878.md +CVE-2023-45481 - https://github.com/l3m0nade/IOTvul/blob/master/SetFirewallCfg.md +CVE-2023-45482 - https://github.com/l3m0nade/IOTvul/blob/master/get_parentControl_list_Info.md +CVE-2023-45483 - https://github.com/l3m0nade/IOTvul/blob/master/compare_parentcontrol_time.md +CVE-2023-45484 - https://github.com/l3m0nade/IOTvul/blob/master/fromSetWifiGusetBasic.md +CVE-2023-45498 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html +CVE-2023-45498 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html +CVE-2023-45498 - http://seclists.org/fulldisclosure/2023/Oct/31 +CVE-2023-45498 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/ +CVE-2023-45499 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html +CVE-2023-45499 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html +CVE-2023-45499 - http://seclists.org/fulldisclosure/2023/Oct/31 +CVE-2023-45499 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/ +CVE-2023-45510 - https://github.com/justdan96/tsMuxer/issues/778 +CVE-2023-45511 - https://github.com/justdan96/tsMuxer/issues/780 +CVE-2023-45540 - https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md +CVE-2023-45542 - https://github.com/ahrixia/CVE-2023-45542 +CVE-2023-45554 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md +CVE-2023-45555 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md +CVE-2023-4560 - https://huntr.dev/bounties/86f06e28-ed8d-4f96-b4ad-e47f2fe94ba6 +CVE-2023-4561 - https://huntr.dev/bounties/d4302a0d-db62-4d76-93dd-e6e6473e057a +CVE-2023-45659 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x +CVE-2023-45670 - https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/ +CVE-2023-45670 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h +CVE-2023-45670 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ +CVE-2023-45671 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ +CVE-2023-45672 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-qp3h-4q62-p428 +CVE-2023-45672 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ +CVE-2023-4568 - https://www.tenable.com/security/research/tra-2023-31 +CVE-2023-45685 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ +CVE-2023-45686 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ +CVE-2023-45687 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ +CVE-2023-45688 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ +CVE-2023-45689 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ +CVE-2023-45690 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ +CVE-2023-45779 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 +CVE-2023-45779 - https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html +CVE-2023-45805 - https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 +CVE-2023-45805 - https://peps.python.org/pep-0440/#post-release-spelling +CVE-2023-45811 - https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx +CVE-2023-45813 - https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff +CVE-2023-4582 - https://bugzilla.mozilla.org/show_bug.cgi?id=1773874 +CVE-2023-45820 - https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m +CVE-2023-45827 - https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47 +CVE-2023-45838 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 +CVE-2023-45839 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 +CVE-2023-45840 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 +CVE-2023-45841 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 +CVE-2023-45842 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 +CVE-2023-45852 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md +CVE-2023-45862 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5 +CVE-2023-45863 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3 +CVE-2023-45866 - https://github.com/skysafe/reblog/tree/main/cve-2023-45866 +CVE-2023-45867 - https://rehmeinfosec.de/labor/cve-2023-45867 +CVE-2023-45868 - https://rehmeinfosec.de/labor/cve-2023-45867 +CVE-2023-45869 - https://rehmeinfosec.de/labor/cve-2023-45869 +CVE-2023-45878 - https://herolab.usd.de/security-advisories/usd-2023-0025/ +CVE-2023-45879 - https://herolab.usd.de/security-advisories/usd-2023-0019/ +CVE-2023-45880 - https://herolab.usd.de/security-advisories/usd-2023-0022/ +CVE-2023-45881 - https://herolab.usd.de/security-advisories/usd-2023-0024/ +CVE-2023-45887 - http://packetstormsecurity.com/files/177135/DS-Wireless-Communication-Code-Execution.html +CVE-2023-45889 - https://blog.zerdle.net/classlink/ +CVE-2023-45889 - https://blog.zerdle.net/classlink2/ +CVE-2023-45892 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md +CVE-2023-45893 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45893.md +CVE-2023-45897 - https://dfir.ru/2023/11/01/cve-2023-45897-a-vulnerability-in-the-linux-exfat-userspace-tools/ +CVE-2023-45898 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4 +CVE-2023-4596 - https://www.exploit-db.com/exploits/51664 +CVE-2023-4597 - http://packetstormsecurity.com/files/174604/WordPress-Slimstat-Analytics-5.0.9-Cross-Site-Scripting-SQL-Injection.html +CVE-2023-45990 - https://github.com/PwnCYN/Wenwenai/issues/2 +CVE-2023-45992 - https://github.com/harry935/CVE-2023-45992 +CVE-2023-46001 - https://github.com/gpac/gpac/issues/2629 +CVE-2023-46004 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/Arbitrary-File-Upload-Vulnerability.md +CVE-2023-46005 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability.md +CVE-2023-46006 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-2.md +CVE-2023-46007 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-3.md +CVE-2023-46009 - https://github.com/kohler/gifsicle/issues/196 +CVE-2023-46010 - https://blog.csdn.net/DGS666/article/details/133795200?spm=1001.2014.3001.5501 +CVE-2023-46014 - https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability +CVE-2023-46015 - https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability +CVE-2023-46016 - https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability +CVE-2023-46017 - https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability +CVE-2023-46018 - https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability +CVE-2023-46019 - https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability +CVE-2023-46020 - https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability +CVE-2023-46021 - https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability +CVE-2023-46022 - https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability +CVE-2023-46023 - https://github.com/ersinerenler/Code-Projects-Simple-Task-List-1.0/blob/main/CVE-2023-46023-Code-Projects-Simple-Task-List-1.0-SQL-Injection-Vulnerability.md +CVE-2023-46024 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46024-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md +CVE-2023-46025 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46025-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md +CVE-2023-46026 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46026-PHPGurukul-Teacher-Subject-Allocation-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md +CVE-2023-46055 - https://gist.github.com/GroundCTL2MajorTom/eef0d55f5df77cc911d84392acdbf625 +CVE-2023-46058 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md +CVE-2023-46059 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/reflected_XSS_in_editservice.md +CVE-2023-46116 - https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644 +CVE-2023-46118 - https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg +CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 +CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h +CVE-2023-46132 - https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m +CVE-2023-46139 - https://github.com/tiann/KernelSU/security/advisories/GHSA-86cp-3prf-pwqq +CVE-2023-4620 - https://wpscan.com/vulnerability/084e9494-2f9e-4420-9bf7-78a1a41433d7 +CVE-2023-4622 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-4623 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-4624 - https://huntr.dev/bounties/9ce5cef6-e546-44e7-addf-a2726fa4e60c +CVE-2023-46245 - https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw +CVE-2023-46246 - https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm +CVE-2023-46256 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw +CVE-2023-46277 - https://github.com/rustsec/advisory-db/pull/1798 +CVE-2023-46316 - http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html +CVE-2023-46324 - https://www.gsma.com/security/wp-content/uploads/2023/10/0073-invalid_curve.pdf +CVE-2023-46331 - https://github.com/WebAssembly/wabt/issues/2310 +CVE-2023-46332 - https://github.com/WebAssembly/wabt/issues/2311 +CVE-2023-4634 - https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz +CVE-2023-4634 - https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ +CVE-2023-46344 - https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS +CVE-2023-46346 - https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html +CVE-2023-46347 - https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html +CVE-2023-46356 - https://security.friendsofpresta.org/modules/2023/10/26/csvfeeds-89.html +CVE-2023-46358 - https://security.friendsofpresta.org/modules/2023/10/24/referralbyphone.html +CVE-2023-46361 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md +CVE-2023-46362 - https://github.com/agl/jbig2enc/issues/84 +CVE-2023-46363 - https://github.com/agl/jbig2enc/issues/85 +CVE-2023-46380 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html +CVE-2023-46381 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html +CVE-2023-46382 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html +CVE-2023-46383 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html +CVE-2023-46384 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html +CVE-2023-46385 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html +CVE-2023-46386 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html +CVE-2023-46387 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html +CVE-2023-46388 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html +CVE-2023-46389 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html +CVE-2023-46402 - https://gist.github.com/6en6ar/7c2424c93e7fbf2b6fc44e7fb9acb95d +CVE-2023-46404 - https://github.com/windecks/CVE-2023-46404 +CVE-2023-46445 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html +CVE-2023-46445 - https://github.com/advisories/GHSA-cfc2-wr2v-gxm5 +CVE-2023-46445 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst +CVE-2023-46445 - https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5 +CVE-2023-46446 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html +CVE-2023-46446 - https://github.com/advisories/GHSA-c35q-ffpf-5qpm +CVE-2023-46446 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst +CVE-2023-46446 - https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm +CVE-2023-46448 - https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/ +CVE-2023-46449 - https://github.com/sajaljat/CVE-2023-46449/tree/main +CVE-2023-46449 - https://www.youtube.com/watch?v=H5QnsOKjs3s +CVE-2023-46450 - https://github.com/yte121/-CVE-2023-46450/ +CVE-2023-46450 - https://youtu.be/LQy0_xIK2q0 +CVE-2023-46451 - https://github.com/sajaljat/CVE-2023-46451 +CVE-2023-46451 - https://youtu.be/f8B3_m5YfqI +CVE-2023-46468 - https://www.sumor.top/index.php/archives/875/ +CVE-2023-46475 - https://github.com/elementalSec/CVE-Disclosures/blob/main/ZentaoPMS/CVE-2023-46475/CVE-2023-46475%20-%20Cross-Site%20Scripting%20(Stored).md +CVE-2023-46478 - https://github.com/mr-xmen786/CVE-2023-46478/tree/main +CVE-2023-46480 - https://github.com/shahzaibak96/CVE-2023-46480 +CVE-2023-46484 - https://815yang.github.io/2023/10/29/x6000r/setLedCfg/TOTOlink%20X6000R%20setLedCfg%20e/ +CVE-2023-46485 - https://815yang.github.io/2023/10/29/x6000r/TOTOlink%20X6000R%20V9.1.0cu.2350_B20230313-rsetTracerouteCfg/ +CVE-2023-4649 - https://huntr.dev/bounties/069bb1f3-0805-480d-a6e1-b3345cdc60f3 +CVE-2023-46490 - https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53 +CVE-2023-4650 - https://huntr.dev/bounties/d92e8985-9d9d-4a62-92e8-ada014ee3b17 +CVE-2023-4651 - https://huntr.dev/bounties/beba9b98-2a5c-4629-987d-b67f47ba9437 +CVE-2023-4652 - https://huntr.dev/bounties/7869e4af-fad9-48c3-9e4f-c949e54cbb41 +CVE-2023-4653 - https://huntr.dev/bounties/e0bf7e95-fc8c-4fd4-8575-8b46b9431c6d +CVE-2023-4654 - https://huntr.dev/bounties/56432a75-af43-4b1a-9307-bd8de568351b +CVE-2023-4655 - https://huntr.dev/bounties/e2189ad5-b665-4ba5-b6c4-112e58ae9a97 +CVE-2023-46569 - https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8 +CVE-2023-46569 - https://github.com/radareorg/radare2/issues/22334 +CVE-2023-46570 - https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6 +CVE-2023-46570 - https://github.com/radareorg/radare2/issues/22333 +CVE-2023-46574 - https://github.com/OraclePi/repo/blob/main/totolink%20A3700R/1/A3700R%20%20V9.1.2u.6165_20211012%20vuln.md +CVE-2023-4658 - https://gitlab.com/gitlab-org/gitlab/-/issues/423835 +CVE-2023-46580 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46580-Code-Projects-Inventory-Management-1.0-Stored-Cross-Site-Scripting-Vulnerability.md +CVE-2023-46581 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46581-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md +CVE-2023-46582 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46582-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md +CVE-2023-46587 - https://github.com/nasroabd/vulns/tree/main/XnView/2.51.5 +CVE-2023-46602 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 +CVE-2023-46603 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 +CVE-2023-46604 - http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html +CVE-2023-46604 - https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html +CVE-2023-46661 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-46662 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-46663 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-46664 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-46665 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-46666 - https://www.elastic.co/community/security +CVE-2023-46667 - https://www.elastic.co/community/security +CVE-2023-46668 - https://www.elastic.co/community/security +CVE-2023-46672 - https://www.elastic.co/community/security +CVE-2023-46673 - https://www.elastic.co/community/security +CVE-2023-46722 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-jfxw-6c5v-c42f +CVE-2023-46730 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfv +CVE-2023-46736 - https://github.com/espocrm/espocrm/security/advisories/GHSA-g955-rwxx-jvf6 +CVE-2023-46744 - https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m +CVE-2023-46745 - https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx +CVE-2023-46747 - http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html +CVE-2023-4678 - https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877 +CVE-2023-46805 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html +CVE-2023-4681 - https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e +CVE-2023-46813 - https://bugzilla.suse.com/show_bug.cgi?id=1212649 +CVE-2023-46817 - http://seclists.org/fulldisclosure/2023/Oct/30 +CVE-2023-46817 - https://karmainsecurity.com/KIS-2023-12 +CVE-2023-46817 - https://karmainsecurity.com/pocs/CVE-2023-46817.php +CVE-2023-46818 - http://packetstormsecurity.com/files/176126/ISPConfig-3.2.11-PHP-Code-Injection.html +CVE-2023-46818 - http://seclists.org/fulldisclosure/2023/Dec/2 +CVE-2023-4682 - https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c +CVE-2023-4683 - https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922 +CVE-2023-46857 - https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/ +CVE-2023-46858 - https://packetstormsecurity.com/files/175277/Moodle-4.3-Cross-Site-Scripting.html +CVE-2023-46864 - https://github.com/Peppermint-Lab/peppermint/issues/171 +CVE-2023-46865 - https://github.com/asylumdx/Crater-CVE-2023-46865-RCE +CVE-2023-46865 - https://github.com/crater-invoice/crater/issues/1267 +CVE-2023-46865 - https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html +CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 +CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 +CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 +CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 +CVE-2023-46871 - https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486 +CVE-2023-46871 - https://github.com/gpac/gpac/issues/2658 +CVE-2023-46889 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 +CVE-2023-46892 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219 +CVE-2023-46916 - http://packetstormsecurity.com/files/175660 +CVE-2023-46927 - https://github.com/gpac/gpac/issues/2657 +CVE-2023-46928 - https://github.com/gpac/gpac/issues/2661 +CVE-2023-46929 - https://github.com/gpac/gpac/issues/2662 +CVE-2023-46930 - https://github.com/gpac/gpac/issues/2666 +CVE-2023-46931 - https://github.com/gpac/gpac/issues/2664 +CVE-2023-46932 - https://github.com/gpac/gpac/issues/2669 +CVE-2023-46935 - https://github.com/weng-xianhu/eyoucms/issues/55 +CVE-2023-4696 - https://huntr.dev/bounties/4747a485-77c3-4bb5-aab0-21253ef303ca +CVE-2023-4697 - https://huntr.dev/bounties/3ff3325a-1dcb-4da7-894d-81a9cf726d81 +CVE-2023-46974 - https://github.com/yte121/CVE-2023-46974/ +CVE-2023-46974 - https://youtu.be/5oVfJHT_-Ys +CVE-2023-46976 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20A3300R/1/README.md +CVE-2023-46977 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20LR1200GB/1/README.md +CVE-2023-46978 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/1/README.md +CVE-2023-46979 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/2/README.md +CVE-2023-4698 - https://huntr.dev/bounties/e1107d79-1d63-4238-90b7-5cc150512654 +CVE-2023-46980 - https://github.com/sajaljat/CVE-2023-46980/tree/main +CVE-2023-46980 - https://youtu.be/3Mz2lSElg7Y +CVE-2023-46981 - https://github.com/JunFengDeng/Cve-List/blob/main/novel-plus/20231027/vuln/readme.md +CVE-2023-46987 - https://blog.csdn.net/weixin_72610998/article/details/133420747?spm=1001.2014.3001.5501 +CVE-2023-46992 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R/readme.md +CVE-2023-46993 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%20Injection/readme.md +CVE-2023-46998 - https://github.com/soy-oreocato/CVE-2023-46998/ +CVE-2023-47004 - https://github.com/RedisGraph/RedisGraph/issues/3178 +CVE-2023-47014 - https://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS/blob/main/README.md +CVE-2023-47016 - https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa +CVE-2023-47016 - https://github.com/radareorg/radare2/issues/22349 +CVE-2023-47025 - https://github.com/free5gc/free5gc/issues/501 +CVE-2023-4704 - https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a +CVE-2023-4707 - http://packetstormsecurity.com/files/174444/Clcknshop-1.0.0-Cross-Site-Scripting.html +CVE-2023-4708 - http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html +CVE-2023-47091 - https://advisories.stormshield.eu/2023-024/ +CVE-2023-47102 - https://quantiano.github.io/cve-2023-47102/ +CVE-2023-47106 - https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm +CVE-2023-47108 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw +CVE-2023-47115 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x +CVE-2023-47116 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r +CVE-2023-47117 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw +CVE-2023-4712 - https://github.com/wpay65249519/cve/blob/main/SQL_injection.md +CVE-2023-47128 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-xq59-7jf3-rjc6 +CVE-2023-47130 - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection +CVE-2023-4714 - http://packetstormsecurity.com/files/174446/PlayTube-3.0.1-Information-Disclosure.html +CVE-2023-47171 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1869 +CVE-2023-4720 - https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad +CVE-2023-4721 - https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc +CVE-2023-47218 - https://www.rapid7.com/blog/post/2024/02/13/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed/ +CVE-2023-4722 - https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830 +CVE-2023-47249 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54 +CVE-2023-47250 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html +CVE-2023-47250 - http://seclists.org/fulldisclosure/2023/Nov/13 +CVE-2023-47250 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ +CVE-2023-47251 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html +CVE-2023-47251 - http://seclists.org/fulldisclosure/2023/Nov/13 +CVE-2023-47251 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ +CVE-2023-47254 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt +CVE-2023-47254 - https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023 +CVE-2023-47256 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 +CVE-2023-47257 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256 +CVE-2023-47271 - http://packetstormsecurity.com/files/176255/PKP-WAL-3.4.0-3-Remote-Code-Execution.html +CVE-2023-47271 - http://seclists.org/fulldisclosure/2023/Dec/23 +CVE-2023-47308 - https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2023-11-09-newsletterpop.md +CVE-2023-47320 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320 +CVE-2023-47321 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47321 +CVE-2023-47322 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47322 +CVE-2023-47323 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323 +CVE-2023-47324 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47324 +CVE-2023-47325 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47325 +CVE-2023-47326 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47326 +CVE-2023-47327 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47327 +CVE-2023-4733 - https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c +CVE-2023-4733 - https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217 +CVE-2023-4734 - https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217 +CVE-2023-47345 - https://github.com/free5gc/free5gc/issues/483 +CVE-2023-47346 - https://github.com/free5gc/free5gc/issues/482 +CVE-2023-47347 - https://github.com/free5gc/free5gc/issues/496 +CVE-2023-4735 - https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51 +CVE-2023-47350 - https://mechaneus.github.io/CVE-2023-47350.html +CVE-2023-47353 - https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md +CVE-2023-47354 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md +CVE-2023-47355 - https://github.com/actuator/com.eypcnnapps.quickreboot/blob/main/CWE-925.md +CVE-2023-4736 - https://huntr.dev/bounties/e1ce0995-4df4-4dec-9cd7-3136ac3e8e71 +CVE-2023-4738 - https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1 +CVE-2023-4738 - https://huntr.dev/bounties/9fc7dced-a7bb-4479-9718-f956df20f612 +CVE-2023-47384 - https://github.com/gpac/gpac/issues/2672 +CVE-2023-4739 - https://github.com/Meizhi-hua/cve/blob/main/upload_file.md +CVE-2023-47397 - https://liotree.github.io/2023/webid.html +CVE-2023-4740 - https://vuldb.com/?id.238629 +CVE-2023-4744 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md +CVE-2023-47444 - https://0xbro.red/disclosures/disclosed-vulnerabilities/opencart-cve-2023-47444/ +CVE-2023-47445 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47445%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20SQL%20Injection.md +CVE-2023-47446 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47446%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20Stored%20XSS%20Vulnerability.md +CVE-2023-4745 - https://github.com/Jacky-Y/vuls/blob/main/vul6.md +CVE-2023-47452 - https://github.com/xieqiang11/poc-1/tree/main +CVE-2023-47453 - https://github.com/xieqiang11/poc-2/tree/main +CVE-2023-47454 - https://github.com/xieqiang11/poc-3/tree/main +CVE-2023-47455 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/setSchedWifi.md +CVE-2023-47456 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/fromSetWirelessRepeat.md +CVE-2023-47462 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary%20File%20Read%20through%20file%20share.md +CVE-2023-47464 - https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Creation%20Through%20API%20upload.md +CVE-2023-47465 - https://github.com/gpac/gpac/issues/2652 +CVE-2023-47470 - https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 +CVE-2023-47470 - https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael@niedermayer.cc/ +CVE-2023-47471 - https://github.com/strukturag/libde265/issues/426 +CVE-2023-47473 - https://github.com/THMOAS0/SSR123/blob/main/%E4%BC%81%E8%AF%ADiFair%20Any%20file%20read.pdf +CVE-2023-47488 - https://bugplorer.github.io/cve-xss-itop/ +CVE-2023-47488 - https://nitipoom-jar.github.io/CVE-2023-47488/ +CVE-2023-47489 - https://bugplorer.github.io/cve-csv-itop/ +CVE-2023-47489 - https://nitipoom-jar.github.io/CVE-2023-47489/ +CVE-2023-4749 - https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/ +CVE-2023-4750 - https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed +CVE-2023-4750 - https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea +CVE-2023-4751 - https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378 +CVE-2023-4752 - https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139 +CVE-2023-4752 - https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757 +CVE-2023-4754 - https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c +CVE-2023-4755 - https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3 +CVE-2023-4756 - https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05 +CVE-2023-4758 - https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6 +CVE-2023-4759 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11 +CVE-2023-47619 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ +CVE-2023-47620 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/ +CVE-2023-47623 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/ +CVE-2023-47624 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ +CVE-2023-47625 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82 +CVE-2023-47627 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg +CVE-2023-47628 - https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx +CVE-2023-47629 - https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8 +CVE-2023-47633 - https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p +CVE-2023-47637 - https://github.com/pimcore/pimcore/security/advisories/GHSA-72hh-xf79-429p +CVE-2023-47640 - https://github.com/datahub-project/datahub/security/advisories/GHSA-fg9x-wvqw-6gmw +CVE-2023-47641 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j +CVE-2023-47643 - https://github.com/salesagility/SuiteCRM-Core/security/advisories/GHSA-fxww-jqfv-9rrr +CVE-2023-4777 - https://www.qualys.com/security-advisories/ +CVE-2023-4778 - https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397 +CVE-2023-47800 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-006.txt +CVE-2023-47804 - https://www.openoffice.org/security/cves/CVE-2023-47804.html +CVE-2023-4781 - https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93 +CVE-2023-4781 - https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883 +CVE-2023-47861 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1884 +CVE-2023-47861 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1884 +CVE-2023-47882 - https://github.com/actuator/yi/blob/main/CWE-319.md +CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/AFC-POC.apk +CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/CWE-94.md +CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/TVBrowserDemo.gif +CVE-2023-47889 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md +CVE-2023-47890 - https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2 +CVE-2023-47992 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47992 +CVE-2023-47993 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47993 +CVE-2023-47994 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994 +CVE-2023-47995 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995 +CVE-2023-47996 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47996 +CVE-2023-47997 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997 +CVE-2023-48003 - https://docs.unsafe-inline.com/0day/asp.net-zero-v12.3.0-html-injection-leads-to-open-redirect-via-websockets-cve-2023-48003 +CVE-2023-48003 - https://github.com/passtheticket/vulnerability-research/blob/main/aspnetzero_html_injection_via_websockets_messages.md +CVE-2023-48011 - https://github.com/gpac/gpac/issues/2611 +CVE-2023-48013 - https://github.com/gpac/gpac/issues/2612 +CVE-2023-48014 - https://github.com/gpac/gpac/issues/2613 +CVE-2023-48016 - https://github.com/Serhatcck/cves/blob/main/CVE-2023-48016-restaurant-table-booking-system-SQLInjection.md +CVE-2023-48028 - https://nitipoom-jar.github.io/CVE-2023-48028/ +CVE-2023-48029 - https://nitipoom-jar.github.io/CVE-2023-48029/ +CVE-2023-48031 - https://nitipoom-jar.github.io/CVE-2023-48031/ +CVE-2023-48039 - https://github.com/gpac/gpac/issues/2679 +CVE-2023-48049 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog +CVE-2023-48050 - https://github.com/luvsn/OdZoo/tree/main/exploits/odoo-biometric-attendance +CVE-2023-48058 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20task%20management%20execution%20task%20location.md +CVE-2023-48060 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20location%20where%20task%20management%20adds%20tasks.md +CVE-2023-48063 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/There%20is%20a%20CSRF%20vulnerability%20at%20th%20menu%20management%20location.md +CVE-2023-48068 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/dedevCMS/dedeCMS_XSS.md +CVE-2023-48078 - https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC +CVE-2023-48090 - https://github.com/gpac/gpac/issues/2680 +CVE-2023-4810 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2023-48104 - https://github.com/E1tex/CVE-2023-48104 +CVE-2023-48105 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726 +CVE-2023-48106 - https://github.com/zlib-ng/minizip-ng/issues/740 +CVE-2023-48107 - https://github.com/zlib-ng/minizip-ng/issues/739 +CVE-2023-48118 - https://github.com/el-dud3rino/CVE-Disclosures/blob/main/Quest%20Analytics%20IQCRM/Proof%20of%20Concept +CVE-2023-48121 - https://joerngermany.github.io/ezviz_vulnerability/ +CVE-2023-48122 - https://github.com/microweber/microweber/issues/1042 +CVE-2023-4814 - https://kcm.trellix.com/corporate/index?page=content&id=SB10407 +CVE-2023-4815 - https://huntr.dev/bounties/4cd3eeb4-57c9-4af2-ad19-2166c9e0fd2c +CVE-2023-4816 - https://images.go.hitachienergy.com/Web/ABBEnterpriseSoftware/%7B70b3d323-4866-42e1-8a75-58996729c1d4%7D_8DBD000172-VU-2023-23_Asset_Suite_Tagout_vulnerability_Rev1.pdf +CVE-2023-48161 - https://github.com/tacetool/TACE#cve-2023-48161 +CVE-2023-48161 - https://sourceforge.net/p/giflib/bugs/167/ +CVE-2023-48172 - http://packetstormsecurity.com/files/175800 +CVE-2023-4818 - https://blog.stmcyber.com/pax-pos-cves-2023/ +CVE-2023-48192 - https://github.com/zxsssd/TotoLink- +CVE-2023-48197 - https://nitipoom-jar.github.io/CVE-2023-48197/ +CVE-2023-48198 - https://nitipoom-jar.github.io/CVE-2023-48198 +CVE-2023-48199 - https://nitipoom-jar.github.io/CVE-2023-48199/ +CVE-2023-48200 - https://nitipoom-jar.github.io/CVE-2023-48200/ +CVE-2023-48201 - https://mechaneus.github.io/CVE-2023-48201.html +CVE-2023-48202 - https://mechaneus.github.io/CVE-2023-48202.html +CVE-2023-48205 - http://packetstormsecurity.com/files/175802 +CVE-2023-48206 - http://packetstormsecurity.com/files/175803 +CVE-2023-48207 - http://packetstormsecurity.com/files/175804 +CVE-2023-48208 - http://packetstormsecurity.com/files/175805 +CVE-2023-48223 - https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg +CVE-2023-48225 - https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp +CVE-2023-48226 - https://bugcrowd.com/vulnerability-rating-taxonomy +CVE-2023-48226 - https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4 +CVE-2023-48238 - https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355 +CVE-2023-4829 - https://huntr.dev/bounties/babd73ca-6c80-4145-8c7d-33a883fe606b +CVE-2023-48294 - https://github.com/librenms/librenms/security/advisories/GHSA-fpq5-4vwm-78x4 +CVE-2023-48295 - https://github.com/librenms/librenms/security/advisories/GHSA-8phr-637g-pxrg +CVE-2023-48300 - https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g +CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6 +CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm +CVE-2023-48312 - https://github.com/projectcapsule/capsule-proxy/security/advisories/GHSA-fpvw-6m5v-hqfp +CVE-2023-4836 - https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc +CVE-2023-48418 - http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html +CVE-2023-4847 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ +CVE-2023-4848 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ +CVE-2023-4850 - https://vuldb.com/?id.239259 +CVE-2023-4858 - https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md +CVE-2023-4863 - https://blog.isosceles.com/the-webp-0day/ +CVE-2023-4863 - https://bugzilla.suse.com/show_bug.cgi?id=1215231 +CVE-2023-4863 - https://news.ycombinator.com/item?id=37478403 +CVE-2023-4863 - https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ +CVE-2023-4864 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/ +CVE-2023-4865 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/ +CVE-2023-4865 - https://vuldb.com/?id.239350 +CVE-2023-48654 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/ +CVE-2023-4868 - https://skypoc.wordpress.com/2023/09/05/vuln1/ +CVE-2023-4869 - https://skypoc.wordpress.com/2023/09/05/vuln1/ +CVE-2023-4870 - https://skypoc.wordpress.com/2023/09/05/vuln1/ +CVE-2023-48702 - https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/ +CVE-2023-48706 - https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q +CVE-2023-4871 - https://skypoc.wordpress.com/2023/09/05/vuln1/ +CVE-2023-48711 - https://github.com/cjvnjde/google-translate-api-browser/security/advisories/GHSA-4233-7q5q-m7p6 +CVE-2023-48712 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-c94j-vqr5-3mxr +CVE-2023-4872 - https://skypoc.wordpress.com/2023/09/05/vuln1/ +CVE-2023-48728 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1883 +CVE-2023-48728 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1883 +CVE-2023-4873 - https://github.com/cugerQDHJ/cve/blob/main/rce.md +CVE-2023-48730 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882 +CVE-2023-48730 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1882 +CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 +CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 +CVE-2023-48733 - https://www.openwall.com/lists/oss-security/2024/02/14/4 +CVE-2023-48736 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58 +CVE-2023-4876 - https://huntr.dev/bounties/f729d2c8-a62e-4f30-ac24-e187b0a7892a +CVE-2023-4877 - https://huntr.dev/bounties/168e9299-f8ff-40d6-9def-d097b38bad84 +CVE-2023-4878 - https://huntr.dev/bounties/655c4f77-04b2-4220-bfaf-a4d99fe86703 +CVE-2023-4879 - https://huntr.dev/bounties/7df6b167-3c39-4563-9b8a-33613e25cf27 +CVE-2023-48795 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html +CVE-2023-48795 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst +CVE-2023-48795 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/ +CVE-2023-48795 - https://www.paramiko.org/changelog.html +CVE-2023-48795 - https://www.theregister.com/2023/12/20/terrapin_attack_ssh +CVE-2023-48813 - https://github.com/slims/slims9_bulian/issues/217 +CVE-2023-48823 - http://packetstormsecurity.com/files/176030 +CVE-2023-48824 - http://packetstormsecurity.com/files/176031 +CVE-2023-48825 - http://packetstormsecurity.com/files/176033 +CVE-2023-48826 - http://packetstormsecurity.com/files/176034 +CVE-2023-48827 - http://packetstormsecurity.com/files/176036 +CVE-2023-48828 - http://packetstormsecurity.com/files/176037 +CVE-2023-48830 - http://packetstormsecurity.com/files/176038 +CVE-2023-48831 - http://packetstormsecurity.com/files/176039 +CVE-2023-48833 - http://packetstormsecurity.com/files/176042 +CVE-2023-48834 - http://packetstormsecurity.com/files/176043 +CVE-2023-48835 - http://packetstormsecurity.com/files/176045 +CVE-2023-48836 - http://packetstormsecurity.com/files/176046 +CVE-2023-48837 - http://packetstormsecurity.com/files/176048 +CVE-2023-48838 - http://packetstormsecurity.com/files/176054 +CVE-2023-48839 - http://packetstormsecurity.com/files/176055 +CVE-2023-48840 - http://packetstormsecurity.com/files/176056 +CVE-2023-48841 - http://packetstormsecurity.com/files/176058 +CVE-2023-48849 - https://github.com/delsploit/CVE-2023-48849 +CVE-2023-48858 - https://github.com/Shumerez/CVE-2023-48858 +CVE-2023-48861 - https://github.com/xieqiang11/POC4/blob/main/README.md +CVE-2023-48866 - https://nitipoom-jar.github.io/CVE-2023-48866/ +CVE-2023-48886 - https://github.com/luxiaoxun/NettyRpc/issues/53 +CVE-2023-48887 - https://github.com/fengjiachun/Jupiter/issues/115 +CVE-2023-48893 - https://github.com/slims/slims9_bulian/issues/209 +CVE-2023-48894 - https://github.com/jishenghua/jshERP/issues/98 +CVE-2023-48910 - https://gist.github.com/b33t1e/2a2dc17cf36cd741b2c99425c892d826 +CVE-2023-48912 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20article%20management%20modification%20section.md +CVE-2023-48913 - https://github.com/Tiamat-ron/cms/blob/main/The%20deletion%20function%20of%20the%20Article%20Management%20Office%20exists%20in%20CSRF.md +CVE-2023-48914 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20section%20of%20article%20management.md +CVE-2023-48925 - https://security.friendsofpresta.org/modules/2023/12/07/bavideotab.html +CVE-2023-48928 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928 +CVE-2023-48929 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929 +CVE-2023-48945 - https://github.com/openlink/virtuoso-opensource/issues/1172 +CVE-2023-48946 - https://github.com/openlink/virtuoso-opensource/issues/1178 +CVE-2023-48947 - https://github.com/openlink/virtuoso-opensource/issues/1179 +CVE-2023-48948 - https://github.com/openlink/virtuoso-opensource/issues/1176 +CVE-2023-48949 - https://github.com/openlink/virtuoso-opensource/issues/1173 +CVE-2023-48950 - https://github.com/openlink/virtuoso-opensource/issues/1174 +CVE-2023-48951 - https://github.com/openlink/virtuoso-opensource/issues/1177 +CVE-2023-48952 - https://github.com/openlink/virtuoso-opensource/issues/1175 +CVE-2023-48958 - https://github.com/gpac/gpac/issues/2689 +CVE-2023-48963 - https://github.com/daodaoshao/vul_tenda_i6_1 +CVE-2023-48964 - https://github.com/daodaoshao/vul_tenda_i6_2 +CVE-2023-48967 - https://github.com/noear/solon/issues/226 +CVE-2023-4897 - https://huntr.dev/bounties/0631af48-84a3-4019-85db-f0f8b12cb0ab +CVE-2023-4898 - https://huntr.dev/bounties/a3dda692-7e8a-44a9-bd96-24cfd3f721d2 +CVE-2023-4899 - https://huntr.dev/bounties/70a2fb18-f030-4abb-9ddc-13f94107ac9d +CVE-2023-49000 - https://github.com/actuator/com.artis.browser/blob/main/CWE-94.md +CVE-2023-49001 - https://github.com/actuator/com.gurry.kvbrowser/blob/main/CWE-94.md +CVE-2023-49002 - https://github.com/actuator/com.sinous.voice.dialer/blob/main/CWE-928.md +CVE-2023-49003 - https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md +CVE-2023-49006 - https://github.com/Hebing123/cve/issues/5 +CVE-2023-49006 - https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/ +CVE-2023-49032 - https://github.com/ltb-project/self-service-password/issues/816 +CVE-2023-49040 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_internet_set.md +CVE-2023-49042 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/setSchedWifi.md +CVE-2023-49043 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md +CVE-2023-49044 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_wifi_set.md +CVE-2023-49046 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md +CVE-2023-49047 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md +CVE-2023-49052 - https://github.com/Cyber-Wo0dy/CVE-2023-49052 +CVE-2023-49052 - https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload +CVE-2023-49070 - http://packetstormsecurity.com/files/176323/Apache-OFBiz-18.12.09-Remote-Code-Execution.html +CVE-2023-49076 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-xx63-4jr8-9ghc +CVE-2023-49078 - https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq +CVE-2023-49079 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-3f39-6537-3cgc +CVE-2023-49081 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2 +CVE-2023-49082 - https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b +CVE-2023-49082 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx +CVE-2023-49083 - http://www.openwall.com/lists/oss-security/2023/11/29/2 +CVE-2023-49083 - https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97 +CVE-2023-49084 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html +CVE-2023-49085 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html +CVE-2023-49086 - https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr +CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h +CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x +CVE-2023-49091 - https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x +CVE-2023-49093 - https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7 +CVE-2023-49100 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html +CVE-2023-4911 - http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html +CVE-2023-4911 - http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html +CVE-2023-4911 - http://seclists.org/fulldisclosure/2023/Oct/11 +CVE-2023-4911 - http://www.openwall.com/lists/oss-security/2023/10/03/2 +CVE-2023-4911 - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt +CVE-2023-49114 - http://seclists.org/fulldisclosure/2024/Mar/10 +CVE-2023-49114 - https://r.sec-consult.com/qognify +CVE-2023-4912 - https://gitlab.com/gitlab-org/gitlab/-/issues/424882 +CVE-2023-4913 - https://huntr.dev/bounties/d2a9ec4d-1b4b-470b-87da-ec069f5925ae +CVE-2023-4914 - https://huntr.dev/bounties/cdd995b2-c983-428b-a73a-827b61b7c06b +CVE-2023-49147 - http://packetstormsecurity.com/files/176206/PDF24-Creator-11.15.1-Local-Privilege-Escalation.html +CVE-2023-49147 - http://seclists.org/fulldisclosure/2023/Dec/18 +CVE-2023-49147 - https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-pdf24-creator-geek-software-gmbh/ +CVE-2023-49210 - https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e +CVE-2023-49276 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-v4v2-8h88-65qj +CVE-2023-4928 - https://huntr.dev/bounties/cb72cc17-5a0d-4392-9a5f-a13aa773de9e +CVE-2023-49287 - http://packetstormsecurity.com/files/176060/TinyDir-1.2.5-Buffer-Overflow.html +CVE-2023-49287 - https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf +CVE-2023-49290 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf +CVE-2023-49291 - https://securitylab.github.com/research/github-actions-untrusted-input +CVE-2023-49293 - https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97 +CVE-2023-49294 - https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f +CVE-2023-49297 - https://github.com/iterative/PyDrive2/security/advisories/GHSA-v5f6-hjmf-9mc5 +CVE-2023-49298 - https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/ +CVE-2023-49313 - https://github.com/louiselalanne/CVE-2023-49313 +CVE-2023-49314 - https://asana.com/pt/download +CVE-2023-49328 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2023-4933 - https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7 +CVE-2023-49355 - https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md +CVE-2023-49356 - https://github.com/linzc21/bug-reports/blob/main/reports/mp3gain/1.6.2/stack-buffer-overflow/CVE-2023-49356.md +CVE-2023-49371 - https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md +CVE-2023-49372 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md +CVE-2023-49373 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20broadcast%20image.md +CVE-2023-49374 - https://github.com/li-yu320/cms/blob/main/There%20is%20CSRF%20in%20the%20rotation%20image%20editing%20section.md +CVE-2023-49375 - https://github.com/cui2shark/cms/blob/main/There%20is%20CSRF%20in%20the%20modification%20of%20the%20friendship%20link.md +CVE-2023-49376 - https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md +CVE-2023-49377 - https://github.com/cui2shark/cms/blob/main/Modification%20of%20CSRF%20in%20Label%20Management.md +CVE-2023-49378 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md +CVE-2023-49379 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20new%20location%20of%20the%20friendship%20link.md +CVE-2023-49380 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20friendship%20link.md +CVE-2023-49381 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20modification%20point%20of%20the%20custom%20table.md +CVE-2023-49382 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20the%20custom%20table.md +CVE-2023-49383 - https://github.com/cui2shark/cms/blob/main/Added%20CSRF%20in%20Label%20Management.md +CVE-2023-49391 - https://github.com/free5gc/free5gc/issues/497 +CVE-2023-49395 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md +CVE-2023-49396 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md +CVE-2023-49397 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md +CVE-2023-49398 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md +CVE-2023-49402 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md +CVE-2023-49403 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md +CVE-2023-49404 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setAdvancedSetList/w30e_setAdvancedSetList.md +CVE-2023-49405 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_UploadCfg/w30e_UploadCfg.md +CVE-2023-49406 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_telnet/w30e_telnet.md +CVE-2023-49408 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md +CVE-2023-49409 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_telnet/AX3_telnet.md +CVE-2023-49410 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setIPv6Status/w30e_setIPv6Status.md +CVE-2023-49411 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_deleteMesh/w30e_deleteMesh.md +CVE-2023-49417 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg +CVE-2023-49418 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setIpPortFilterRules +CVE-2023-49424 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.md +CVE-2023-49425 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/setMacFilterCfg.md +CVE-2023-49426 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.md +CVE-2023-49428 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.md +CVE-2023-49431 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.md +CVE-2023-49432 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.md +CVE-2023-49433 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetVirtualServerCfg.md +CVE-2023-49435 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-3.md +CVE-2023-49436 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-2.md +CVE-2023-49437 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.md +CVE-2023-49438 - https://github.com/brandon-t-elliott/CVE-2023-49438 +CVE-2023-49446 - https://github.com/ysuzhangbin/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20newly%20added%20navigation%20management%20area.md +CVE-2023-49447 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20navigation%20management%20modification%20location.md +CVE-2023-49448 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20navigation%20management.md +CVE-2023-49460 - https://github.com/strukturag/libheif/issues/1046 +CVE-2023-49462 - https://github.com/strukturag/libheif/issues/1043 +CVE-2023-49463 - https://github.com/strukturag/libheif/issues/1042 +CVE-2023-49464 - https://github.com/strukturag/libheif/issues/1044 +CVE-2023-49465 - https://github.com/strukturag/libde265/issues/435 +CVE-2023-49467 - https://github.com/strukturag/libde265/issues/434 +CVE-2023-49468 - https://github.com/strukturag/libde265/issues/432 +CVE-2023-49471 - https://github.com/zunak/CVE-2023-49471 +CVE-2023-49492 - https://github.com/Hebing123/cve/issues/2 +CVE-2023-49493 - https://github.com/Hebing123/cve/issues/2 +CVE-2023-49494 - https://github.com/Hebing123/cve/issues/3 +CVE-2023-49544 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion +CVE-2023-49549 - https://github.com/cesanta/mjs/issues/251 +CVE-2023-49551 - https://github.com/cesanta/mjs/issues/257 +CVE-2023-49553 - https://github.com/cesanta/mjs/issues/253 +CVE-2023-49554 - https://github.com/yasm/yasm/issues/249 +CVE-2023-49555 - https://github.com/yasm/yasm/issues/248 +CVE-2023-49556 - https://github.com/yasm/yasm/issues/250 +CVE-2023-49557 - https://github.com/yasm/yasm/issues/253 +CVE-2023-49558 - https://github.com/yasm/yasm/issues/252 +CVE-2023-49563 - https://gist.github.com/ph4nt0mbyt3/b237bfb06b2bff405ab47e4ea52c0bd2 +CVE-2023-4965 - https://github.com/ctflearner/Vulnerability/blob/main/PHPIPAM/Open_Redirect.md +CVE-2023-4966 - http://packetstormsecurity.com/files/175323/Citrix-Bleed-Session-Token-Leakage-Proof-Of-Concept.html +CVE-2023-4969 - https://blog.trailofbits.com +CVE-2023-4969 - https://kb.cert.org/vuls/id/446598 +CVE-2023-4969 - https://www.kb.cert.org/vuls/id/446598 +CVE-2023-49693 - https://kb.netgear.com/000065886/Security-Advisory-for-Sensitive-Information-Disclosure-on-the-NMS300-PSV-2023-0126 +CVE-2023-49693 - https://www.tenable.com/security/research/tra-2023-39 +CVE-2023-49694 - https://www.tenable.com/security/research/tra-2023-39 +CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 +CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 +CVE-2023-49721 - https://www.openwall.com/lists/oss-security/2024/02/14/4 +CVE-2023-4973 - http://packetstormsecurity.com/files/174680/Academy-LMS-6.2-Cross-Site-Scripting.html +CVE-2023-4974 - http://packetstormsecurity.com/files/174681/Academy-LMS-6.2-SQL-Injection.html +CVE-2023-4977 - https://huntr.dev/bounties/3db8a1a4-ca2d-45df-be18-a959ebf82fbc +CVE-2023-4978 - https://huntr.dev/bounties/cefd9295-2053-4e6e-a130-7e1f845728f4 +CVE-2023-49786 - http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html +CVE-2023-49786 - http://seclists.org/fulldisclosure/2023/Dec/24 +CVE-2023-4979 - https://huntr.dev/bounties/e67f8f5d-4048-404f-9b86-cb6b8719b77f +CVE-2023-49799 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv +CVE-2023-4980 - https://huntr.dev/bounties/470b9b13-b7fe-4b3f-a186-fdc5dc193976 +CVE-2023-49800 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h +CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3 +CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g +CVE-2023-49805 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-mj22-23ff-2hrr +CVE-2023-4981 - https://huntr.dev/bounties/1f014494-49a9-4bf0-8d43-a675498b9609 +CVE-2023-49810 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898 +CVE-2023-4982 - https://huntr.dev/bounties/d3c2dd8a-883c-400e-a1a7-326c3fd37b9e +CVE-2023-4987 - http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html +CVE-2023-49923 - https://www.elastic.co/community/security +CVE-2023-49950 - https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md +CVE-2023-49964 - https://github.com/mbadanoiu/CVE-2023-49964 +CVE-2023-49967 - https://github.com/typecho/typecho/issues/1648 +CVE-2023-49991 - https://github.com/espeak-ng/espeak-ng/issues/1825 +CVE-2023-49992 - https://github.com/espeak-ng/espeak-ng/issues/1827 +CVE-2023-49993 - https://github.com/espeak-ng/espeak-ng/issues/1826 +CVE-2023-49994 - https://github.com/espeak-ng/espeak-ng/issues/1823 +CVE-2023-49999 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setUmountUSBPartition/w30e_setUmountUSBPartition.md +CVE-2023-50000 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_resetMesh/w30e_resetMesh.md +CVE-2023-50001 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_upgradeMeshOnline/w30e_upgradeMeshOnline.md +CVE-2023-50002 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md +CVE-2023-50011 - https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html +CVE-2023-50017 - https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md +CVE-2023-50027 - https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html +CVE-2023-50030 - https://security.friendsofpresta.org/modules/2024/01/16/jmssetting.html +CVE-2023-50061 - https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html +CVE-2023-50069 - https://github.com/holomekc/wiremock/issues/51 +CVE-2023-50072 - https://github.com/ahrixia/CVE-2023-50072 +CVE-2023-50089 - https://github.com/NoneShell/Vulnerabilities/blob/main/NETGEAR/WNR2000v4-1.0.0.70-Authorized-Command-Injection.md +CVE-2023-50094 - https://www.mattz.io/posts/cve-2023-50094/ +CVE-2023-50096 - https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md +CVE-2023-50110 - https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357 +CVE-2023-50120 - https://github.com/gpac/gpac/issues/2698 +CVE-2023-50123 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50124 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50125 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50126 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50127 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50128 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50129 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices +CVE-2023-50164 - http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html +CVE-2023-50172 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897 +CVE-2023-5024 - https://youtu.be/evdhcUlD1EQ +CVE-2023-50245 - https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj +CVE-2023-50246 - https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc +CVE-2023-50250 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 +CVE-2023-50251 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2 +CVE-2023-50252 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr +CVE-2023-50253 - https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f +CVE-2023-50254 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495 +CVE-2023-50255 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 +CVE-2023-50257 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98 +CVE-2023-50258 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g +CVE-2023-50258 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/ +CVE-2023-50259 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv +CVE-2023-50259 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/ +CVE-2023-50262 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2 +CVE-2023-50264 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ +CVE-2023-50265 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ +CVE-2023-50266 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ +CVE-2023-5027 - https://vuldb.com/?id.239869 +CVE-2023-5028 - https://vuldb.com/?id.239870 +CVE-2023-5033 - https://vuldb.com/?id.239877 +CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032 +CVE-2023-5036 - https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d +CVE-2023-5041 - https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523 +CVE-2023-50429 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf +CVE-2023-50445 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html +CVE-2023-50446 - https://github.com/mullvad/mullvadvpn-app/pull/5398 +CVE-2023-50447 - https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/ +CVE-2023-50449 - https://gitee.com/heyewei/JFinalcms/issues/I7WGC6 +CVE-2023-50465 - https://github.com/Crypt0Cr33py/monicahqvuln +CVE-2023-50470 - https://blog.csdn.net/weixin_72610998/article/details/134784075?spm=1001.2014.3001.5502 +CVE-2023-50471 - https://github.com/DaveGamble/cJSON/issues/802 +CVE-2023-50472 - https://github.com/DaveGamble/cJSON/issues/803 +CVE-2023-50488 - https://github.com/roman-mueller/PoC/tree/master/CVE-2023-50488 +CVE-2023-50488 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ +CVE-2023-50495 - https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html +CVE-2023-50559 - https://github.com/OpenXiangShan/XiangShan/issues/2534 +CVE-2023-50569 - https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf +CVE-2023-50569 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 +CVE-2023-50585 - https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.md +CVE-2023-50589 - https://github.com/VauP/CVE-IDs/blob/main/proof_of_concept.md +CVE-2023-5060 - https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3 +CVE-2023-50612 - https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA +CVE-2023-50628 - https://github.com/libming/libming/issues/289 +CVE-2023-50630 - https://github.com/xiweicheng/tms/issues/19 +CVE-2023-50693 - https://github.com/dom96/jester/issues/326 +CVE-2023-50694 - https://github.com/dom96/httpbeast/issues/95 +CVE-2023-50715 - https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83 +CVE-2023-5072 - https://github.com/stleary/JSON-java/issues/758 +CVE-2023-50720 - https://jira.xwiki.org/browse/XWIKI-20371 +CVE-2023-50731 - https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/ +CVE-2023-5074 - https://www.tenable.com/security/research/tra-2023-32 +CVE-2023-5075 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-5078 - https://support.lenovo.com/us/en/product_security/LEN-141775 +CVE-2023-5084 - https://huntr.dev/bounties/f3340570-6e59-4c72-a7d1-d4b829b4fb45 +CVE-2023-50916 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ +CVE-2023-50916 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-001_kyocera-v2.txt +CVE-2023-50917 - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html +CVE-2023-50917 - http://packetstormsecurity.com/files/176669/MajorDoMo-Command-Injection.html +CVE-2023-50919 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html +CVE-2023-50965 - https://github.com/starnight/MicroHttpServer/issues/5 +CVE-2023-50980 - https://github.com/weidai11/cryptopp/issues/1248 +CVE-2023-50982 - https://rehmeinfosec.de/labor/cve-2023-50982 +CVE-2023-51010 - https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro +CVE-2023-51011 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanPriDns/ +CVE-2023-51012 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/ +CVE-2023-51013 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanNetmask/ +CVE-2023-51014 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig_lanSecDns/ +CVE-2023-51015 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/ +CVE-2023-51016 - https://815yang.github.io/2023/12/10/EX1800T/TOTOlink%20EX1800T_V9.1.0cu.2112_B20220316(setRebootScheCfg)/ +CVE-2023-51017 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanIp/ +CVE-2023-51018 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setWiFiApConfig-opmode/ +CVE-2023-51019 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-key5g/ +CVE-2023-51020 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langType/ +CVE-2023-51021 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setRptWizardCfg-merge/ +CVE-2023-51022 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langFlag/ +CVE-2023-51023 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031NTPSyncWithHost-host_time/ +CVE-2023-51024 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setNtpCfg-tz/ +CVE-2023-51025 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setPasswordCfg-admuser/ +CVE-2023-51026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setRebootScheCfg-hour/ +CVE-2023-51027 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliAuthMode/ +CVE-2023-51028 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliChannel/ +CVE-2023-51033 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_setOpModeCfg/ +CVE-2023-51034 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_UploadFirmwareFile/ +CVE-2023-51035 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost/ +CVE-2023-5104 - https://huntr.dev/bounties/1b5c6d9f-941e-4dd7-a964-42b53d6826b0 +CVE-2023-51042 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 +CVE-2023-51063 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md +CVE-2023-51066 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md +CVE-2023-51068 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md +CVE-2023-51070 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md +CVE-2023-51074 - https://github.com/json-path/JsonPath/issues/973 +CVE-2023-51075 - https://github.com/dromara/hutool/issues/3421 +CVE-2023-51079 - https://github.com/mvel/mvel/issues/348 +CVE-2023-51079 - https://github.com/mvel/mvel/issues/348#issuecomment-1874047271 +CVE-2023-51084 - https://github.com/PoppingSnack/VulReport/issues/12 +CVE-2023-51091 - https://github.com/GD008/TENDA/blob/main/M3/cookie/M3_cookie.md +CVE-2023-51093 - https://github.com/GD008/TENDA/blob/main/M3/setVlanInfo/M3_setVlanInfo.md +CVE-2023-51094 - https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md +CVE-2023-51095 - https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md +CVE-2023-51097 - https://github.com/GD008/TENDA/blob/main/W9/W9_setAutoPing/W9_setAutoPing.md +CVE-2023-51098 - https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md +CVE-2023-51102 - https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md +CVE-2023-51123 - https://github.com/WhereisRain/dir-815 +CVE-2023-51123 - https://github.com/WhereisRain/dir-815/blob/main/README.md +CVE-2023-51210 - https://medium.com/@nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91 +CVE-2023-51252 - https://github.com/sanluan/PublicCMS/issues/79 +CVE-2023-51257 - https://github.com/jasper-software/jasper/issues/367 +CVE-2023-51277 - https://www.youtube.com/watch?v=c0nawqA_bdI +CVE-2023-51385 - https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html +CVE-2023-5139 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-5139 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453 +CVE-2023-5142 - https://vuldb.com/?id.240238 +CVE-2023-51442 - https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r +CVE-2023-51443 - http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html +CVE-2023-5152 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_sql_%20importexport.md +CVE-2023-5153 - https://vuldb.com/?id.240249 +CVE-2023-51661 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j +CVE-2023-51664 - https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 +CVE-2023-5167 - https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437 +CVE-2023-51717 - https://dataiku.com +CVE-2023-5173 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823172 +CVE-2023-5174 - https://bugzilla.mozilla.org/show_bug.cgi?id=1848454 +CVE-2023-51747 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ +CVE-2023-5175 - https://bugzilla.mozilla.org/show_bug.cgi?id=1849704 +CVE-2023-51764 - https://github.com/duy-31/CVE-2023-51764 +CVE-2023-51764 - https://github.com/eeenvik1/CVE-2023-51764 +CVE-2023-51764 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ +CVE-2023-51765 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ +CVE-2023-51766 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ +CVE-2023-51771 - https://github.com/starnight/MicroHttpServer/issues/8 +CVE-2023-51772 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/ +CVE-2023-51775 - https://bitbucket.org/b_c/jose4j/issues/212 +CVE-2023-51806 - https://github.com/ujcms/ujcms/issues/8 +CVE-2023-51820 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/ +CVE-2023-51828 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html +CVE-2023-5184 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-5184 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g +CVE-2023-5192 - https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7 +CVE-2023-51939 - https://github.com/liang-junkai/Relic-bbs-fault-injection +CVE-2023-51939 - https://github.com/relic-toolkit/relic/issues/284 +CVE-2023-51949 - https://github.com/cui2shark/security/blob/main/Added%20CSRF%20in%20Role%20Controller.md +CVE-2023-51951 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2023-004 +CVE-2023-5197 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html +CVE-2023-5198 - https://gitlab.com/gitlab-org/gitlab/-/issues/416957 +CVE-2023-51987 - https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2 +CVE-2023-51989 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md +CVE-2023-52026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/ +CVE-2023-52027 - https://815yang.github.io/2023/12/23/a3700r/TOTOLINKA3700R_NTPSyncWithHost/ +CVE-2023-52028 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_setTracerouteCfg/ +CVE-2023-5203 - https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932 +CVE-2023-52031 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_UploadFirmwareFile/ +CVE-2023-52032 - https://815yang.github.io/2023/12/24/cve6/EX1200T_V4.1.2cu.5232_B20210713_downloadFlile/ +CVE-2023-5204 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html +CVE-2023-52041 - https://kee02p.github.io/2024/01/13/CVE-2023-52041/ +CVE-2023-52042 - https://kee02p.github.io/2024/01/13/CVE-2023-52042/ +CVE-2023-52047 - https://github.com/chongfujun/test/blob/main/2023-52047.docx +CVE-2023-52059 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md +CVE-2023-52060 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52060/README.md +CVE-2023-52064 - https://github.com/wuzhicms/wuzhicms/issues/208 +CVE-2023-52072 - https://github.com/zouyang0714/cms/blob/main/2.md +CVE-2023-52073 - https://github.com/zouyang0714/cms/blob/main/3.md +CVE-2023-52074 - https://github.com/zouyang0714/cms/blob/main/1.md +CVE-2023-52075 - https://github.com/ReVanced/revanced-api/security/advisories/GHSA-852x-grxp-8p3q +CVE-2023-52076 - https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 +CVE-2023-5212 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html +CVE-2023-52137 - https://github.com/tj-actions/verify-changed-files/security/advisories/GHSA-ghm2-rq8q-wrhc +CVE-2023-52138 - https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v +CVE-2023-52139 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm +CVE-2023-52153 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html +CVE-2023-52154 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html +CVE-2023-52155 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html +CVE-2023-5221 - https://vuldb.com/?id.240363 +CVE-2023-5222 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_HardcodedPassword.md +CVE-2023-52240 - https://kantega-sso.atlassian.net/wiki/spaces/KSE/pages/1226473473/Security+Vulnerability+HTML+injection+Cross-site+scripting+in+SAML+POST+binding+Kantega+SSO+Enterprise +CVE-2023-52251 - http://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html +CVE-2023-52251 - https://github.com/BobTheShoplifter/CVE-2023-52251-POC +CVE-2023-52252 - https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/ +CVE-2023-52252 - https://www.exploit-db.com/exploits/51309 +CVE-2023-52257 - https://packetstormsecurity.com/files/174815 +CVE-2023-52265 - https://github.com/wbowm15/jubilant-enigma/blob/main/writeup.md +CVE-2023-52266 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 +CVE-2023-52266 - https://github.com/hongliuliao/ehttp/issues/38 +CVE-2023-52267 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 +CVE-2023-52267 - https://github.com/hongliuliao/ehttp/issues/38 +CVE-2023-52269 - https://github.com/vipercalling/XSSsecurityGateway/blob/main/finding +CVE-2023-5227 - https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8 +CVE-2023-52277 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php +CVE-2023-52302 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md +CVE-2023-52303 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md +CVE-2023-52304 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md +CVE-2023-52305 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md +CVE-2023-52306 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md +CVE-2023-52307 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md +CVE-2023-52308 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md +CVE-2023-52309 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md +CVE-2023-52310 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md +CVE-2023-52311 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md +CVE-2023-52312 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md +CVE-2023-52313 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md +CVE-2023-52314 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md +CVE-2023-52339 - https://github.com/Matroska-Org/libebml/issues/147 +CVE-2023-52355 - https://gitlab.com/libtiff/libtiff/-/issues/621 +CVE-2023-52356 - https://gitlab.com/libtiff/libtiff/-/issues/622 +CVE-2023-5237 - https://research.cleantalk.org/cve-2023-5237-memberlite-shortcodes-stored-xss-via-shortcode +CVE-2023-5241 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html +CVE-2023-52430 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2023-5244 - https://huntr.dev/bounties/a3bd58ba-ca59-4cba-85d1-799f73a76470 +CVE-2023-5245 - https://github.com/combust/mleap/pull/866#issuecomment-1738032225 +CVE-2023-5245 - https://research.jfrog.com/vulnerabilities/mleap-path-traversal-rce-xray-532656/ +CVE-2023-52555 - https://github.com/mongo-express/mongo-express/issues/1338 +CVE-2023-5259 - https://github.com/RCEraser/cve/blob/main/ForU-CMS.md +CVE-2023-5264 - https://github.com/yhy217/huakecms-vul/issues/1 +CVE-2023-5284 - https://vuldb.com/?id.240912 +CVE-2023-5286 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App +CVE-2023-5287 - https://vuldb.com/?id.240915 +CVE-2023-5289 - https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce +CVE-2023-5297 - https://vuldb.com/?id.240927 +CVE-2023-5302 - https://github.com/rohit0x5/poc/blob/main/cve_2 +CVE-2023-5307 - https://research.cleantalk.org/cve-2023-5307-photos-and-files-contest-gallery-contact-form-21-2-8-1-unauthenticated-stored-xss-via-http-headers +CVE-2023-5311 - https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311 +CVE-2023-5313 - https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md +CVE-2023-5316 - https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43 +CVE-2023-5317 - https://huntr.dev/bounties/5e146e7c-60c7-498b-9ffe-fd4cb4ca8c54 +CVE-2023-5318 - https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d +CVE-2023-5319 - https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d +CVE-2023-5320 - https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67 +CVE-2023-5321 - https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a +CVE-2023-5322 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5:sysmanage:edit_manageadmin.php.md +CVE-2023-5323 - https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8 +CVE-2023-5341 - https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1 +CVE-2023-5344 - https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04 +CVE-2023-5344 - https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf +CVE-2023-5345 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html +CVE-2023-5347 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html +CVE-2023-5347 - http://seclists.org/fulldisclosure/2024/Jan/11 +CVE-2023-5347 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/ +CVE-2023-5350 - https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736 +CVE-2023-5351 - https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b +CVE-2023-5353 - https://huntr.dev/bounties/3b3bb4f1-1aea-4134-99eb-157f245fa752 +CVE-2023-5360 - http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html +CVE-2023-5375 - https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9 +CVE-2023-5376 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html +CVE-2023-5376 - http://seclists.org/fulldisclosure/2024/Jan/11 +CVE-2023-5376 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/ +CVE-2023-5377 - https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf +CVE-2023-5389 - https://www.honeywell.com/us/en/product-security +CVE-2023-5390 - https://www.honeywell.com/us/en/product-security +CVE-2023-5427 - http://packetstormsecurity.com/files/176029/ARM-Mali-r44p0-Use-After-Free.html +CVE-2023-5441 - https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2 +CVE-2023-5448 - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve +CVE-2023-5452 - https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8 +CVE-2023-5463 - https://drive.google.com/drive/folders/1mpRxWOPjxVS980r0qu1IY_Hf0irKO-cu +CVE-2023-5471 - https://vuldb.com/?id.241608 +CVE-2023-5488 - https://vuldb.com/?id.241640 +CVE-2023-5492 - https://vuldb.com/?id.241644 +CVE-2023-5495 - http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html +CVE-2023-5496 - https://vuldb.com/?id.241649 +CVE-2023-5498 - https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9 +CVE-2023-5511 - https://huntr.dev/bounties/43206801-9862-48da-b379-e55e341d78bf +CVE-2023-5512 - https://gitlab.com/gitlab-org/gitlab/-/issues/427827 +CVE-2023-5520 - https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a +CVE-2023-5521 - https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1 +CVE-2023-5535 - https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d +CVE-2023-5535 - https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f +CVE-2023-5536 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1829071 +CVE-2023-5538 - https://github.com/juweihuitao/MpOperationLogs/ +CVE-2023-5555 - https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f +CVE-2023-5556 - https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b +CVE-2023-5563 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv +CVE-2023-5564 - https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c +CVE-2023-5571 - https://huntr.dev/bounties/926ca25f-dd4a-40cf-8e6b-9d7b5938e95a +CVE-2023-5572 - https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be +CVE-2023-5573 - https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72 +CVE-2023-5586 - https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740 +CVE-2023-5590 - https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99 +CVE-2023-5591 - https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090 +CVE-2023-5595 - https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e +CVE-2023-5607 - https://kcm.trellix.com/corporate/index?page=content&id=SB10411 +CVE-2023-5618 - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve +CVE-2023-5626 - https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b +CVE-2023-5640 - https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/ +CVE-2023-5642 - https://tenable.com/security/research/tra-2023-33 +CVE-2023-5654 - https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231 +CVE-2023-5674 - https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67 +CVE-2023-5681 - https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md +CVE-2023-5684 - https://github.com/Chef003/cve/blob/main/rce.md +CVE-2023-5686 - https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0 +CVE-2023-5687 - https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d +CVE-2023-5688 - https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7 +CVE-2023-5689 - https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6 +CVE-2023-5690 - https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01 +CVE-2023-5708 - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve +CVE-2023-5718 - https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb +CVE-2023-5732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690979 +CVE-2023-5753 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html +CVE-2023-5753 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww +CVE-2023-5754 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 +CVE-2023-5760 - https://support.norton.com/sp/static/external/tools/security-advisories.html +CVE-2023-5762 - https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb +CVE-2023-5772 - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve +CVE-2023-5774 - https://drive.google.com/file/d/1zXWW545ktCznO36k90AN0APhTz8ky-gG/view?usp=sharing +CVE-2023-5774 - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=cve +CVE-2023-5784 - https://github.com/gb111d/ns-asg_poc/ +CVE-2023-5784 - https://vuldb.com/?id.243590 +CVE-2023-5785 - https://github.com/ggg48966/cve/blob/main/NS-ASG-sql-addaddress_interpret.md +CVE-2023-5796 - https://vuldb.com/?id.243602 +CVE-2023-5817 - https://drive.google.com/file/d/125xS3GVMr7_qo5HjWvXaXixuE_R-q_u3/view?usp=sharing +CVE-2023-5826 - https://github.com/Cubi123123123/cve/blob/main/NS-ASG-sql-list_onlineuser.md +CVE-2023-5826 - https://vuldb.com/?id.243716 +CVE-2023-5832 - https://huntr.com/bounties/afee3726-571f-416e-bba5-0828c815f5df +CVE-2023-5838 - https://huntr.com/bounties/8f6feca3-386d-4897-801c-39b9e3e5eb03 +CVE-2023-5839 - https://huntr.com/bounties/21125f12-64a0-42a3-b218-26b9945a5bc0 +CVE-2023-5840 - https://huntr.com/bounties/8042d8c3-650e-4c0d-9146-d9ccf6082b30 +CVE-2023-5841 - https://takeonme.org/cves/CVE-2023-5841.html +CVE-2023-5842 - https://huntr.com/bounties/aed81114-5952-46f5-ae3a-e66518e98ba3 +CVE-2023-5844 - https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021 +CVE-2023-5846 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04 +CVE-2023-5847 - https://www.tenable.com/security/tns-2023-37 +CVE-2023-5861 - https://huntr.com/bounties/7baecef8-6c59-42fc-bced-886c4929e220 +CVE-2023-5862 - https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d +CVE-2023-5863 - https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f +CVE-2023-5864 - https://huntr.com/bounties/e4b0e8f4-5e06-49d1-832f-5756573623ad +CVE-2023-5865 - https://huntr.com/bounties/4c4b7395-d9fd-4ca0-98d7-2e20c1249aff +CVE-2023-5866 - https://huntr.com/bounties/ec44bcba-ae7f-497a-851e-8165ecf56945 +CVE-2023-5873 - https://huntr.com/bounties/701cfc30-22a1-4c4b-9b2f-885c77c290ce +CVE-2023-5889 - https://huntr.com/bounties/fba2991a-1b8a-4c89-9689-d708526928e1 +CVE-2023-5890 - https://huntr.com/bounties/b60e6e1f-e44d-4b11-acf8-b0548b915686 +CVE-2023-5891 - https://huntr.com/bounties/ce4956e4-9ef5-4e0e-bfb2-481ec5cfb0a5 +CVE-2023-5892 - https://huntr.com/bounties/16719252-d88d-43cc-853a-24ff75a067d8 +CVE-2023-5893 - https://huntr.com/bounties/a965aa16-79ce-4185-8f58-3d3b0d74a71e +CVE-2023-5894 - https://huntr.com/bounties/aba3ba5b-aa6b-4076-b663-4237b4a0761d +CVE-2023-5895 - https://huntr.com/bounties/2cc80417-32b2-4024-bbcd-d95a039c11ae +CVE-2023-5898 - https://huntr.com/bounties/19801d12-b8ad-45e7-86e1-8f0230667c9e +CVE-2023-5899 - https://huntr.com/bounties/0c7f1981-3bba-4508-a07e-4cb9a2553216 +CVE-2023-5900 - https://huntr.com/bounties/c3f011d4-9f76-4b2b-b3d4-a5e2ecd2e354 +CVE-2023-5901 - https://huntr.com/bounties/8fb9b06b-cadd-469e-862d-5ce026019597 +CVE-2023-5948 - https://huntr.com/bounties/ac1363b5-207b-40d9-aac5-e66d6213f692 +CVE-2023-5995 - https://gitlab.com/gitlab-org/gitlab/-/issues/425361 +CVE-2023-5998 - https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113 +CVE-2023-6006 - https://www.papercut.com/kb/Main/CommonSecurityQuestions/ +CVE-2023-6007 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-6008 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-6009 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html +CVE-2023-6009 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2023-6013 - https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af +CVE-2023-6014 - https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4 +CVE-2023-6015 - https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3 +CVE-2023-6016 - https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836 +CVE-2023-6017 - https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58 +CVE-2023-6019 - https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe +CVE-2023-6020 - https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 +CVE-2023-6021 - https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 +CVE-2023-6022 - https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af +CVE-2023-6023 - https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca +CVE-2023-6038 - https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c +CVE-2023-6040 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html +CVE-2023-6051 - https://gitlab.com/gitlab-org/gitlab/-/issues/431345 +CVE-2023-6052 - https://vuldb.com/?id.244872 +CVE-2023-6053 - https://vuldb.com/?id.244874 +CVE-2023-6054 - https://vuldb.com/?id.244875 +CVE-2023-6065 - https://drive.google.com/file/d/1w83xWsVLS_gCpQy4LDwbjNK9JaB87EEf/view?usp=sharing +CVE-2023-6070 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413 +CVE-2023-6071 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413 +CVE-2023-6084 - https://vuldb.com/?id.244994 +CVE-2023-6099 - https://github.com/gatsby2003/Shenzhen-Youkate-Industrial-Co.-Ltd/blob/main/Shenzhen%20Youkate%20Industrial%20Co.%2C%20Ltd.md +CVE-2023-6099 - https://vuldb.com/?id.245061 +CVE-2023-6103 - https://vuldb.com/?id.245065 +CVE-2023-6105 - https://www.tenable.com/security/research/tra-2023-35 +CVE-2023-6112 - http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html +CVE-2023-6113 - https://research.cleantalk.org/cve-2023-6113-wp-staging-unauth-sensitive-data-exposure-to-account-takeover-poc-exploit/ +CVE-2023-6114 - https://drive.google.com/file/d/1mpapFCqfZLv__EAM7uivrrl2h55rpi1V/view?usp=sharing +CVE-2023-6119 - https://kcm.trellix.com/corporate/index?page=content&id=SB10412 +CVE-2023-6124 - https://huntr.com/bounties/aed4d8f3-ab9a-42fd-afea-b3ec288a148e +CVE-2023-6125 - https://huntr.com/bounties/a9462f1e-9746-4380-8228-533ff2f64691 +CVE-2023-6127 - https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d +CVE-2023-6132 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ +CVE-2023-6146 - https://www.qualys.com/security-advisories/ +CVE-2023-6147 - https://www.qualys.com/security-advisories/ +CVE-2023-6148 - https://www.qualys.com/security-advisories/ +CVE-2023-6149 - https://www.qualys.com/security-advisories/ +CVE-2023-6152 - https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f +CVE-2023-6176 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html +CVE-2023-6179 - https://www.honeywell.com/us/en/product-security +CVE-2023-6188 - https://vuldb.com/?id.245735 +CVE-2023-6222 - https://drive.google.com/file/d/1krgHH2NvVFr93VpErLkOjDV3L6M5yIA1/view?usp=sharing +CVE-2023-6246 - http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html +CVE-2023-6246 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html +CVE-2023-6246 - http://seclists.org/fulldisclosure/2024/Feb/3 +CVE-2023-6246 - https://www.openwall.com/lists/oss-security/2024/01/30/6 +CVE-2023-6246 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt +CVE-2023-6253 - http://packetstormsecurity.com/files/175956/Fortra-Digital-Guardian-Agent-Uninstaller-Cross-Site-Scripting-UninstallKey-Cached.html +CVE-2023-6253 - http://seclists.org/fulldisclosure/2023/Nov/14 +CVE-2023-6253 - https://r.sec-consult.com/fortra +CVE-2023-6263 - https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing +CVE-2023-6265 - https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md +CVE-2023-6269 - http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html +CVE-2023-6269 - http://seclists.org/fulldisclosure/2023/Dec/16 +CVE-2023-6269 - https://r.sec-consult.com/unifyroot +CVE-2023-6271 - https://research.cleantalk.org/cve-2023-6271-backup-migration-unauth-sensitive-data-exposure-to-full-control-of-the-site-poc-exploit +CVE-2023-6274 - https://github.com/Carol7S/cve/blob/main/rce.md +CVE-2023-6274 - https://vuldb.com/?id.246103 +CVE-2023-6277 - https://gitlab.com/libtiff/libtiff/-/issues/614 +CVE-2023-6292 - https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ +CVE-2023-6293 - https://huntr.com/bounties/36a7ecbf-4d3d-462e-86a3-cda7b1ec64e2 +CVE-2023-6296 - http://packetstormsecurity.com/files/175925/osCommerce-4-Cross-Site-Scripting.html +CVE-2023-6297 - https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md +CVE-2023-6298 - https://vuldb.com/?id.246124 +CVE-2023-6301 - https://vuldb.com/?id.246127 +CVE-2023-6306 - https://vuldb.com/?id.246132 +CVE-2023-6308 - https://github.com/gatsby2003/Struts2-046/blob/main/Xiamen%20Four-Faith%20Communication%20Technology%20Co.,%20Ltd.%20video%20surveillance%20management%20system%20has%20a%20command%20execution%20vulnerability.md +CVE-2023-6309 - https://github.com/moses-smt/mosesdecoder/issues/237 +CVE-2023-6310 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20browser.md +CVE-2023-6311 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteltype.md +CVE-2023-6311 - https://vuldb.com/?id.246137 +CVE-2023-6312 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md +CVE-2023-6313 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/url-shortener.md +CVE-2023-6329 - https://tenable.com/security/research/tra-2023-36 +CVE-2023-6341 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6342 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6343 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6344 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6348 - http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html +CVE-2023-6353 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6354 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6360 - https://www.tenable.com/security/research/tra-2023-40 +CVE-2023-6375 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6376 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ +CVE-2023-6440 - https://github.com/lscjl/lsi.webray.com.cn/blob/main/CVE-project/Book%20Borrower%20System%20Cross%20site%20scripting.md +CVE-2023-6461 - https://huntr.com/bounties/9a97d163-1738-4a09-b284-a04716e69dd0 +CVE-2023-6474 - https://github.com/dhabaleshwar/niv_testing_csrf/blob/main/exploit.md +CVE-2023-6530 - https://research.cleantalk.org/cve-2023-6530-tj-shortcodes-stored-xss-poc/ +CVE-2023-6553 - http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html +CVE-2023-6553 - https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it +CVE-2023-6560 - http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html +CVE-2023-6562 - https://github.com/google/security-research/security/advisories/GHSA-g6qc-fhcq-vhf9 +CVE-2023-6566 - https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6 +CVE-2023-6568 - https://huntr.com/bounties/816bdaaa-8153-4732-951e-b0d92fddf709 +CVE-2023-6569 - https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c +CVE-2023-6570 - https://huntr.com/bounties/82d6e853-013b-4029-a23f-8b50ec56602a +CVE-2023-6571 - https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632 +CVE-2023-6575 - https://github.com/houhuidong/cve/blob/main/rce.md +CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html +CVE-2023-6592 - https://research.cleantalk.org/cve-2023-6592-fastdup-database-users-password-leak-poc-exploit/ +CVE-2023-6599 - https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e +CVE-2023-6653 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_add_sub.md +CVE-2023-6655 - https://github.com/willchen0011/cve/blob/main/HongJing-sql.md +CVE-2023-6659 - https://github.com/Kidjing/cve/blob/main/sql1.md +CVE-2023-6730 - https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16 +CVE-2023-6753 - https://huntr.com/bounties/b397b83a-527a-47e7-b912-a12a17a6cfb4 +CVE-2023-6773 - https://drive.google.com/drive/folders/1yuc1n6tr57wD8qsT0HAFDVAuii7iibDM?usp=sharing +CVE-2023-6778 - https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b +CVE-2023-6779 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html +CVE-2023-6779 - http://seclists.org/fulldisclosure/2024/Feb/3 +CVE-2023-6779 - https://www.openwall.com/lists/oss-security/2024/01/30/6 +CVE-2023-6779 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt +CVE-2023-6780 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html +CVE-2023-6780 - http://seclists.org/fulldisclosure/2024/Feb/3 +CVE-2023-6780 - https://www.openwall.com/lists/oss-security/2024/01/30/6 +CVE-2023-6780 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt +CVE-2023-6817 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html +CVE-2023-6817 - http://www.openwall.com/lists/oss-security/2023/12/22/6 +CVE-2023-6832 - https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376 +CVE-2023-6875 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html +CVE-2023-6888 - http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/ +CVE-2023-6889 - https://huntr.com/bounties/52897778-fad7-4169-bf04-a68a0646df0c +CVE-2023-6890 - https://huntr.com/bounties/2cf11678-8793-4fa1-b21a-f135564a105d +CVE-2023-6893 - https://github.com/willchen0011/cve/blob/main/download.md +CVE-2023-6901 - https://github.com/g1an123/POC/blob/main/README.md +CVE-2023-6902 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20upload%20getshell.md +CVE-2023-6906 - https://github.com/unpWn4bL3/iot-security/blob/main/1.md +CVE-2023-6907 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20deletion.md +CVE-2023-6927 - https://bugzilla.redhat.com/show_bug.cgi?id=2255027 +CVE-2023-6928 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 +CVE-2023-6929 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 +CVE-2023-6930 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 +CVE-2023-6932 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html +CVE-2023-6976 - https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f +CVE-2023-6977 - https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf +CVE-2023-7018 - https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c +CVE-2023-7026 - https://github.com/willchen0011/cve/blob/main/upload2.md +CVE-2023-7027 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html +CVE-2023-7038 - https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF) +CVE-2023-7039 - https://github.com/Stitch3612/cve/blob/main/rce.md +CVE-2023-7040 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20read.md +CVE-2023-7041 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20overwrite.md +CVE-2023-7051 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_notes.md +CVE-2023-7052 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md +CVE-2023-7059 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/school-visitors-log-e-book.md +CVE-2023-7092 - https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/view +CVE-2023-7092 - https://vuldb.com/?id.248939 +CVE-2023-7095 - https://github.com/unpWn4bL3/iot-security/blob/main/2.md +CVE-2023-7100 - https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03 +CVE-2023-7101 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md +CVE-2023-7101 - https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc +CVE-2023-7102 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc +CVE-2023-7102 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md +CVE-2023-7105 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md +CVE-2023-7106 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md +CVE-2023-7107 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md +CVE-2023-7108 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md +CVE-2023-7109 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md +CVE-2023-7109 - https://vuldb.com/?id.249004 +CVE-2023-7110 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md +CVE-2023-7111 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-3.md +CVE-2023-7123 - https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4 +CVE-2023-7124 - https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md +CVE-2023-7126 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-1.md +CVE-2023-7126 - https://vuldb.com/?id.249129 +CVE-2023-7127 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-2.md +CVE-2023-7128 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-1.md +CVE-2023-7129 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-2.md +CVE-2023-7130 - https://github.com/h4md153v63n/CVEs/blob/main/College_Notes_Gallery/College_Notes_Gallery-SQL_Injection.md +CVE-2023-7130 - https://vuldb.com/?id.249133 +CVE-2023-7131 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-SQL-Injection.md +CVE-2023-7132 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-Stored_Cross_site_Scripting.md +CVE-2023-7134 - https://medium.com/@2839549219ljk/medicine-tracking-system-rce-vulnerability-1f009165b915 +CVE-2023-7135 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-1.md +CVE-2023-7136 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-2.md +CVE-2023-7137 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_1.md +CVE-2023-7138 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_2.md +CVE-2023-7139 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_3.md +CVE-2023-7140 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_4.md +CVE-2023-7141 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_5.md +CVE-2023-7142 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_6.md +CVE-2023-7143 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-Blind_Cross_Site_Scripting.md +CVE-2023-7149 - https://github.com/h4md153v63n/CVEs/blob/main/QR_Code_Generator/QR_Code_Generator-Reflected_Cross_Site_Scripting.md +CVE-2023-7150 - https://github.com/laoquanshi/Chic-Vulnerability- +CVE-2023-7155 - https://medium.com/@heishou/inventory-management-system-sql-injection-f6d67247c7ae +CVE-2023-7156 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-95b95ab64ccc +CVE-2023-7157 - https://medium.com/@heishou/inventory-management-system-sql-injection-7b955b5707eb +CVE-2023-7158 - https://github.com/micropython/micropython/issues/13007 +CVE-2023-7160 - https://vuldb.com/?id.249182 +CVE-2023-7161 - https://github.com/fixitc/cve/blob/main/sql.md +CVE-2023-7163 - https://tenable.com/security/research/tra-2023-43 +CVE-2023-7172 - https://github.com/sharathc213/CVE-2023-7172 +CVE-2023-7173 - https://github.com/sharathc213/CVE-2023-7173 +CVE-2023-7175 - https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe +CVE-2023-7176 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-3-d02f0ce78fe3 +CVE-2023-7176 - https://vuldb.com/?id.249363 +CVE-2023-7177 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-4-cadc2983eb5e +CVE-2023-7178 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-5-5a761e5b73b8 +CVE-2023-7179 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-a98949964faf +CVE-2023-7181 - https://vuldb.com/?id.249368 +CVE-2023-7202 - https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/ +CVE-2023-7208 - https://github.com/unpWn4bL3/iot-security/blob/main/13.md +CVE-2023-7215 - https://github.com/Chanzhaoyu/chatgpt-web/issues/2001 +CVE-2023-7215 - https://vuldb.com/?id.249779 +CVE-2023-7216 - https://bugzilla.redhat.com/show_bug.cgi?id=2249901 +CVE-2023-7227 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02 +CVE-2024-0023 - https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268 +CVE-2024-0044 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 +CVE-2024-0044 - https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html +CVE-2024-0049 - https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e +CVE-2024-0051 - https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e +CVE-2024-0181 - https://vuldb.com/?id.249433 +CVE-2024-0182 - https://vuldb.com/?id.249440 +CVE-2024-0187 - https://wpscan.com/vulnerability/b4600411-bee1-4cc8-aee9-0a613ac9b55b/ +CVE-2024-0204 - http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html +CVE-2024-0204 - http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html +CVE-2024-0206 - https://kcm.trellix.com/corporate/index?page=content&id=SB10415 +CVE-2024-0209 - https://gitlab.com/wireshark/wireshark/-/issues/19501 +CVE-2024-0210 - https://gitlab.com/wireshark/wireshark/-/issues/19504 +CVE-2024-0213 - https://kcm.trellix.com/corporate/index?page=content&id=SB10416 +CVE-2024-0233 - https://wpscan.com/vulnerability/04a708a0-b6f3-47d1-aac9-0bb17f57c61e/ +CVE-2024-0235 - https://wpscan.com/vulnerability/e370b99a-f485-42bd-96a3-60432a15a4e9/ +CVE-2024-0236 - https://wpscan.com/vulnerability/09aeb6f2-6473-4de7-8598-e417049896d7/ +CVE-2024-0237 - https://wpscan.com/vulnerability/73d1b00e-1f17-4d9a-bfc8-6bc43a46b90b/ +CVE-2024-0238 - https://wpscan.com/vulnerability/774655ac-b201-4d9f-8790-9eff8564bc91/ +CVE-2024-0239 - https://wpscan.com/vulnerability/b9a4a3e3-7cdd-4354-8541-4219bd41c854/ +CVE-2024-0243 - https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861 +CVE-2024-0248 - https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/ +CVE-2024-0250 - https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/ +CVE-2024-0261 - https://packetstormsecurity.com/files/176342/FTPDMIN-0.96-Denial-Of-Service.html +CVE-2024-0261 - https://vuldb.com/?id.249817 +CVE-2024-0261 - https://www.youtube.com/watch?v=q-CVJfYdd-g +CVE-2024-0263 - https://0day.today/exploit/description/39212 +CVE-2024-0263 - https://packetstormsecurity.com/files/176333/Ultra-Mini-HTTPd-1.21-Denial-Of-Service.html +CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/ +CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py +CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE +CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py +CVE-2024-0268 - https://vuldb.com/?id.249824 +CVE-2024-0273 - https://vuldb.com/?id.249828 +CVE-2024-0278 - https://vuldb.com/?id.249833 +CVE-2024-0300 - https://github.com/tolkent/cve/blob/main/upload.md +CVE-2024-0310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10417 +CVE-2024-0311 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418 +CVE-2024-0312 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418 +CVE-2024-0313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418 +CVE-2024-0321 - https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 +CVE-2024-0322 - https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec +CVE-2024-0337 - https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/ +CVE-2024-0344 - https://vuldb.com/?id.250112 +CVE-2024-0346 - https://drive.google.com/file/d/1bao4YK4GwvAvCdCrsW5UpJZdvREdc_Yj/view?usp=sharing +CVE-2024-0355 - https://medium.com/@heishou/dfsms-has-sql-injection-vulnerability-e9cfbc375be8 +CVE-2024-0357 - https://vuldb.com/?id.250124 +CVE-2024-0361 - https://vuldb.com/?id.250128 +CVE-2024-0365 - https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/ +CVE-2024-0399 - https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/ +CVE-2024-0418 - https://cxsecurity.com/issue/WLB-2024010023 +CVE-2024-0419 - https://cxsecurity.com/issue/WLB-2024010027 +CVE-2024-0419 - https://www.youtube.com/watch?v=6dAWGH0-6TY +CVE-2024-0420 - https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7e54b7/ +CVE-2024-0421 - https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/ +CVE-2024-0425 - https://github.com/mi2acle/forucmsvuln/blob/master/passwordreset.md +CVE-2024-0426 - https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md +CVE-2024-0439 - https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce +CVE-2024-0440 - https://huntr.com/bounties/263fd7eb-f9a9-4578-9655-0e28c609272f +CVE-2024-0455 - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c +CVE-2024-0464 - https://vuldb.com/?id.250569 +CVE-2024-0480 - http://packetstormsecurity.com/files/176548/Taokeyun-SQL-Injection.html +CVE-2024-0496 - https://vuldb.com/?id.250601 +CVE-2024-0500 - https://vuldb.com/?id.250608 +CVE-2024-0503 - https://drive.google.com/file/d/1n9Zas-iSOfKVMN3UzPyVGgQgCmig2A5I/view?usp=sharing +CVE-2024-0510 - http://packetstormsecurity.com/files/176547/HaoKeKeJi-YiQiNiu-Server-Side-Request-Forgery.html +CVE-2024-0521 - https://huntr.com/bounties/a569c64b-1e2b-4bed-a19f-47fd5a3da453 +CVE-2024-0531 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/setBlackRule.md +CVE-2024-0532 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md +CVE-2024-0533 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.devname.md +CVE-2024-0534 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.mac.md +CVE-2024-0538 - https://vuldb.com/?id.250708 +CVE-2024-0543 - https://vuldb.com/?id.250713 +CVE-2024-0546 - https://packetstormsecurity.com/files/94905/EasyFTP-1.7.0.x-Denial-Of-Service.html +CVE-2024-0547 - https://packetstormsecurity.com/files/163079/Ability-FTP-Server-2.34-Denial-Of-Service.html +CVE-2024-0548 - https://packetstormsecurity.com/files/163038/FreeFloat-FTP-Server-1.0-Denial-Of-Service.html +CVE-2024-0550 - https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6 +CVE-2024-0551 - https://huntr.com/bounties/f114c787-ab5f-4f83-afa5-c000435efb78 +CVE-2024-0559 - https://research.cleantalk.org/cve-2024-0559/ +CVE-2024-0559 - https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/ +CVE-2024-0561 - https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/ +CVE-2024-0566 - https://wpscan.com/vulnerability/ca83db95-4a08-4615-aa8d-016022404c32/ +CVE-2024-0574 - https://vuldb.com/?id.250790 +CVE-2024-0575 - https://vuldb.com/?id.250791 +CVE-2024-0599 - https://vuldb.com/?id.250837 +CVE-2024-0603 - https://vuldb.com/?id.250839 +CVE-2024-0646 - https://access.redhat.com/errata/RHSA-2024:0850 +CVE-2024-0647 - https://www.youtube.com/watch?v=KtDjoJlrpAc +CVE-2024-0670 - http://seclists.org/fulldisclosure/2024/Mar/29 +CVE-2024-0670 - https://checkmk.com/werk/16361 +CVE-2024-0672 - https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/ +CVE-2024-0673 - https://wpscan.com/vulnerability/d80e725d-356a-4997-a352-33565e291fc8/ +CVE-2024-0677 - https://wpscan.com/vulnerability/0f7757c9-69fa-49db-90b0-40f0ff29bee7/ +CVE-2024-0684 - https://www.openwall.com/lists/oss-security/2024/01/18/2 +CVE-2024-0693 - https://0day.today/exploit/description/39218 +CVE-2024-0693 - https://packetstormsecurity.com/files/176377/Easy-File-Sharing-FTP-Server-2.0-Denial-Of-Service.html +CVE-2024-0693 - https://www.youtube.com/watch?v=Rcl6VWg_bPY +CVE-2024-0695 - https://packetstormsecurity.com/files/176381/Easy-Chat-Server-3.1-Denial-Of-Service.html +CVE-2024-0695 - https://vuldb.com/?id.251480 +CVE-2024-0695 - https://www.exploitalert.com/view-details.html?id=40072 +CVE-2024-0695 - https://www.youtube.com/watch?v=nGyS2Rp5aEo +CVE-2024-0700 - https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request +CVE-2024-0700 - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve +CVE-2024-0701 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 +CVE-2024-0711 - https://wpscan.com/vulnerability/8e286c04-ef32-4af0-be78-d978999b2a90/ +CVE-2024-0713 - https://drive.google.com/file/d/1C6_4A-96BtR9VTNSadUY09ErroqLEVJ4/view?usp=sharing +CVE-2024-0719 - https://wpscan.com/vulnerability/6e67bf7f-07e6-432b-a8f4-aa69299aecaf/ +CVE-2024-0720 - https://drive.google.com/drive/folders/1ZFjWlD5axvhWp--I7tuiZ9uOpSBmU_f6?usp=drive_link +CVE-2024-0720 - https://github.com/beraoudabdelkhalek/research/tree/main/CVEs/CVE-2024-0720 +CVE-2024-0723 - https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html +CVE-2024-0725 - https://packetstormsecurity.com/files/176544/ProSSHD-1.2-20090726-Denial-Of-Service.html +CVE-2024-0731 - https://fitoxs.com/vuldb/01-PCMan%20v2.0.7-exploit.txt +CVE-2024-0732 - https://fitoxs.com/vuldb/02-PCMan%20v2.0.7-exploit.txt +CVE-2024-0736 - https://0day.today/exploit/39249 +CVE-2024-0737 - https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html +CVE-2024-0741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 +CVE-2024-0745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1871838 +CVE-2024-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 +CVE-2024-0756 - https://wpscan.com/vulnerability/9130a42d-fca3-4f9c-ab97-d5e0a7a5cef2/ +CVE-2024-0757 - https://wpscan.com/vulnerability/eccd017c-e442-46b6-b5e6-aec7bbd5f836/ +CVE-2024-0763 - https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5 +CVE-2024-0765 - https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786 +CVE-2024-0769 - https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md +CVE-2024-0772 - https://youtu.be/WIeWeuXbkiY +CVE-2024-0773 - https://drive.google.com/drive/folders/1YjJFvxis3gLWX95990Y-nJMbWCQHB02U?usp=sharing +CVE-2024-0776 - https://vuldb.com/?id.251678 +CVE-2024-0778 - https://github.com/dezhoutorizhao/cve/blob/main/rce.md +CVE-2024-0778 - https://vuldb.com/?id.251696 +CVE-2024-0779 - https://wpscan.com/vulnerability/ced134cf-82c5-401b-9476-b6456e1924e2/ +CVE-2024-0780 - https://wpscan.com/vulnerability/be3045b1-72e6-450a-8dd2-4702a9328447/ +CVE-2024-0781 - https://drive.google.com/drive/folders/1f61RXqelSDY0T92aLjmb8BhgAHt_eeUS +CVE-2024-0782 - https://drive.google.com/drive/folders/1ecVTReqCS_G8svyq3MG79E2y59psMcPn?usp=sharing +CVE-2024-0782 - https://vuldb.com/?id.251698 +CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC +CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC/blob/main/poc.py +CVE-2024-0784 - https://github.com/biantaibao/octopus_SQL/blob/main/report.md +CVE-2024-0784 - https://vuldb.com/?id.251700 +CVE-2024-0788 - https://fluidattacks.com/advisories/brubeck/ +CVE-2024-0795 - https://huntr.com/bounties/f69e3307-7b44-4776-ac60-2990990723ec +CVE-2024-0799 - https://www.tenable.com/security/research/tra-2024-07 +CVE-2024-0800 - https://www.tenable.com/security/research/tra-2024-07 +CVE-2024-0801 - https://www.tenable.com/security/research/tra-2024-07 +CVE-2024-0811 - http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html +CVE-2024-0815 - https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350 +CVE-2024-0817 - https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3 +CVE-2024-0818 - https://huntr.com/bounties/85b06a1b-ac0b-4096-a06d-330891570cd9 +CVE-2024-0820 - https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/ +CVE-2024-0855 - https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/ +CVE-2024-0856 - https://wpscan.com/vulnerability/eb383600-0cff-4f24-8127-1fb118f0565a/ +CVE-2024-0858 - https://wpscan.com/vulnerability/f6627a35-d158-495e-9d56-69405cfca221/ +CVE-2024-0861 - https://gitlab.com/gitlab-org/gitlab/-/issues/439240 +CVE-2024-0868 - https://wpscan.com/vulnerability/bb7c2d2b-cdfe-433b-96cf-714e71d12b22/ +CVE-2024-0879 - https://research.jfrog.com/vulnerabilities/vector-admin-filter-bypass/ +CVE-2024-0880 - https://vuldb.com/?id.252032 +CVE-2024-0881 - https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/ +CVE-2024-0885 - https://packetstormsecurity.com/files/176633/SpyCamLizard-1.230-Denial-Of-Service.html +CVE-2024-0886 - https://fitoxs.com/vuldb/09-exploit-perl.txt +CVE-2024-0887 - https://fitoxs.com/vuldb/18-exploit-perl.txt +CVE-2024-0889 - https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html +CVE-2024-0890 - https://github.com/biantaibao/octopus_SQL2/blob/main/report.md +CVE-2024-0891 - https://github.com/biantaibao/octopus_XSS/blob/main/report.md +CVE-2024-0891 - https://vuldb.com/?id.252043 +CVE-2024-0902 - https://wpscan.com/vulnerability/fd53e40a-516b-47b9-b495-321774432367/ +CVE-2024-0904 - https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/ +CVE-2024-0905 - https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/ +CVE-2024-0911 - https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html +CVE-2024-0917 - https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119 +CVE-2024-0921 - https://github.com/xiyuanhuaigu/cve/blob/main/rce.md +CVE-2024-0922 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formQuickIndex.md +CVE-2024-0923 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md +CVE-2024-0924 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetPPTPServer.md +CVE-2024-0925 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetVirtualSer.md +CVE-2024-0926 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formWifiWpsOOB.md +CVE-2024-0927 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md +CVE-2024-0928 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md +CVE-2024-0929 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md +CVE-2024-0930 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md +CVE-2024-0930 - https://vuldb.com/?id.252135 +CVE-2024-0931 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md +CVE-2024-0931 - https://vuldb.com/?id.252136 +CVE-2024-0932 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md +CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5 +CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5/blob/main/poc.py +CVE-2024-0937 - https://github.com/bayuncao/vul-cve-6/blob/main/poc.py +CVE-2024-0937 - https://vuldb.com/?id.252182 +CVE-2024-0939 - https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md +CVE-2024-0951 - https://wpscan.com/vulnerability/88b2e479-eb15-4213-9df8-3d353074974e/ +CVE-2024-0953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837916 +CVE-2024-0958 - https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing +CVE-2024-0964 - https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741 +CVE-2024-0968 - https://huntr.com/bounties/566033b9-df20-4928-b4aa-5cd4c3ca1561 +CVE-2024-0973 - https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/ +CVE-2024-0986 - https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link +CVE-2024-0998 - https://vuldb.com/?id.252267 +CVE-2024-1008 - https://vuldb.com/?id.252277 +CVE-2024-1009 - https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn +CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS +CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS/ +CVE-2024-1011 - https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control +CVE-2024-1014 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html +CVE-2024-1015 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html +CVE-2024-1016 - https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html +CVE-2024-1017 - https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html +CVE-2024-1017 - https://www.youtube.com/watch?v=wwHuXfYS8yQ +CVE-2024-1019 - https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30 +CVE-2024-1020 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab +CVE-2024-1021 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5 +CVE-2024-1022 - https://drive.google.com/file/d/1lPZ1yL9UlU-uB03xz17q4OR9338X_1am/view?usp=sharing +CVE-2024-1028 - https://vuldb.com/?id.252301 +CVE-2024-1029 - https://vuldb.com/?id.252302 +CVE-2024-1030 - https://vuldb.com/?id.252303 +CVE-2024-1061 - https://www.tenable.com/security/research/tra-2024-02 +CVE-2024-1068 - https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ +CVE-2024-1076 - https://wpscan.com/vulnerability/9c3e9c72-3d6c-4e2c-bb8a-f4efce1371d5/ +CVE-2024-1086 - https://github.com/Notselwyn/CVE-2024-1086 +CVE-2024-1086 - https://news.ycombinator.com/item?id=39828424 +CVE-2024-1086 - https://pwning.tech/nftables/ +CVE-2024-1098 - https://vuldb.com/?id.252455 +CVE-2024-1098 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/ouiw375l0m8mw5ls +CVE-2024-1099 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/dcilugg0htp973nx +CVE-2024-1103 - https://docs.google.com/document/d/18M55HRrxHQ9Jhph6CwWF-d5epAKtOSHt/edit?usp=drive_link&ouid=105609487033659389545&rtpof=true&sd=true +CVE-2024-1106 - https://wpscan.com/vulnerability/0672f8af-33e2-459c-ac8a-7351247a8a26/ +CVE-2024-1142 - https://support.sonatype.com/hc/en-us/articles/27034479038739-CVE-2024-1142-Sonatype-IQ-Server-Path-Traversal-2024-03-06 +CVE-2024-1163 - https://huntr.com/bounties/c1cbc18b-e4ab-4332-ad13-0033f0f976f5 +CVE-2024-1184 - https://fitoxs.com/vuldb/10-exploit-perl.txt +CVE-2024-1185 - https://fitoxs.com/vuldb/11-exploit-perl.txt +CVE-2024-1186 - https://fitoxs.com/vuldb/12-exploit-perl.txt +CVE-2024-1186 - https://www.exploit-db.com/exploits/45884 +CVE-2024-1187 - https://fitoxs.com/vuldb/13-exploit-perl.txt +CVE-2024-1188 - https://fitoxs.com/vuldb/14-exploit-perl.txt +CVE-2024-1189 - https://fitoxs.com/vuldb/15-exploit-perl.txt +CVE-2024-1193 - https://vuldb.com/?id.252683 +CVE-2024-1195 - https://vuldb.com/?id.252685 +CVE-2024-1204 - https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/ +CVE-2024-1212 - https://support.kemptechnologies.com/hc/en-us/articles/23878931058445-LoadMaster-Security-Vulnerability-CVE-2024-1212 +CVE-2024-1215 - https://github.com/PrecursorYork/crud-without-refresh-reload-Reflected_XSS-POC/blob/main/README.md +CVE-2024-1219 - https://wpscan.com/vulnerability/ce4ac9c4-d293-4464-b6a0-82ddf8d4860b/ +CVE-2024-1231 - https://wpscan.com/vulnerability/7d3968d9-61ed-4c00-8764-0360cf03255e/ +CVE-2024-1232 - https://wpscan.com/vulnerability/2a29b509-4cd5-43c8-84f4-f86251dd28f8/ +CVE-2024-1252 - https://vuldb.com/?id.252991 +CVE-2024-1253 - https://github.com/b51s77/cve/blob/main/upload.md +CVE-2024-1254 - https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md +CVE-2024-1266 - https://drive.google.com/file/d/16a9lQqUFBICw-Hhbe9bT5sSB7qwZjMwA/view?usp=sharing +CVE-2024-1269 - https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md +CVE-2024-1273 - https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/ +CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/ +CVE-2024-1279 - https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/ +CVE-2024-1290 - https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/ +CVE-2024-1292 - https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/ +CVE-2024-1306 - https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/ +CVE-2024-1307 - https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/ +CVE-2024-1309 - https://www.honeywell.com/us/en/product-security +CVE-2024-1309 - https://www.kb.cert.org/vuls/id/417980 +CVE-2024-1310 - https://wpscan.com/vulnerability/a7735feb-876e-461c-9a56-ea6067faf277/ +CVE-2024-1316 - https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/ +CVE-2024-1319 - https://wpscan.com/vulnerability/5904dc7e-1058-4c40-bca3-66ba57b1414b/ +CVE-2024-1331 - https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/ +CVE-2024-1333 - https://wpscan.com/vulnerability/30546402-03b8-4e18-ad7e-04a6b556ffd7/ +CVE-2024-1401 - https://wpscan.com/vulnerability/91064ba5-cf65-46e6-88df-0e4d96a3ef9f/ +CVE-2024-1432 - https://github.com/bayuncao/vul-cve-12 +CVE-2024-1455 - https://github.com/langchain-ai/langchain/commit/727d5023ce88e18e3074ef620a98137d26ff92a3 +CVE-2024-1460 - https://fluidattacks.com/advisories/mingus/ +CVE-2024-1481 - https://bugzilla.redhat.com/show_bug.cgi?id=2262169 +CVE-2024-1487 - https://wpscan.com/vulnerability/c028cd73-f30a-4c8b-870f-3071055f0496/ +CVE-2024-1526 - https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/ +CVE-2024-1564 - https://wpscan.com/vulnerability/ecb1e36f-9c6e-4754-8878-03c97194644d/ +CVE-2024-1588 - https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/ +CVE-2024-1589 - https://wpscan.com/vulnerability/5cfbbddd-d941-4665-be8b-a54454527571/ +CVE-2024-1638 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2 +CVE-2024-1658 - https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/ +CVE-2024-1660 - https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/ +CVE-2024-1661 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-Totolink/X6000R-Hardcoded-Password.md +CVE-2024-1664 - https://wpscan.com/vulnerability/fc3beca7-af38-4ab2-b05f-13b47d042b85/ +CVE-2024-1668 - https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1 +CVE-2024-1669 - https://issues.chromium.org/issues/41495060 +CVE-2024-1670 - https://issues.chromium.org/issues/41481374 +CVE-2024-1671 - https://issues.chromium.org/issues/41487933 +CVE-2024-1672 - https://issues.chromium.org/issues/41485789 +CVE-2024-1675 - https://issues.chromium.org/issues/41486208 +CVE-2024-1676 - https://issues.chromium.org/issues/40944847 +CVE-2024-1694 - https://issues.chromium.org/issues/40946325 +CVE-2024-1700 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS +CVE-2024-1701 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control +CVE-2024-1702 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection +CVE-2024-1703 - https://vuldb.com/?id.254391 +CVE-2024-1704 - https://vuldb.com/?id.254392 +CVE-2024-1705 - https://vuldb.com/?id.254393 +CVE-2024-1707 - https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md +CVE-2024-1708 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass +CVE-2024-1709 - https://github.com/rapid7/metasploit-framework/pull/18870 +CVE-2024-1709 - https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc +CVE-2024-1709 - https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/ +CVE-2024-1709 - https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/ +CVE-2024-1709 - https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/ +CVE-2024-1709 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass +CVE-2024-1709 - https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2 +CVE-2024-1709 - https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 +CVE-2024-1712 - https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/ +CVE-2024-1713 - https://github.com/google/security-research/security/advisories/GHSA-r7m9-grw7-vcc4 +CVE-2024-1743 - https://wpscan.com/vulnerability/3cb1f707-6093-42a7-a778-2b296bdf1735/ +CVE-2024-1745 - https://wpscan.com/vulnerability/b63bbfeb-d6f7-4c33-8824-b86d64d3f598/ +CVE-2024-1746 - https://wpscan.com/vulnerability/5f35572a-4129-4fe0-a465-d25f4c3b4419/ +CVE-2024-1750 - https://vuldb.com/?id.254532 +CVE-2024-1752 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/ +CVE-2024-1754 - https://wpscan.com/vulnerability/c061e792-e37a-4cf6-b46b-ff111c5a5c84/ +CVE-2024-1755 - https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ +CVE-2024-1756 - https://wpscan.com/vulnerability/0baedd8d-2bbe-4091-bec4-f99e25d7290d/ +CVE-2024-1781 - https://github.com/Icycu123/X6000R-AX3000-Wifi-6-Giga/blob/main/2/X6000R%20AX3000%20WiFi%206%20Giga%E7%84%A1%E7%B7%9A%E8%B7%AF%E7%94%B1%E5%99%A8%E6%9C%AA%E6%8E%88%E6%9D%83rce.md +CVE-2024-1784 - https://github.com/liyako/vulnerability/blob/main/POC/Limbas-Blind-SQL-injection.md +CVE-2024-1784 - https://vuldb.com/?id.254575 +CVE-2024-1821 - https://github.com/jxp98/VulResearch/blob/main/2024/02/2Crime%20Reporting%20System%20-%20SQL%20Injection-police_add.md +CVE-2024-1824 - https://vuldb.com/?id.254612 +CVE-2024-1827 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.2Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_login.md +CVE-2024-1828 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.3Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_reg.md +CVE-2024-1828 - https://vuldb.com/?id.254616 +CVE-2024-1829 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.4Library%20System%20In%20PHP%20-%20SQL%20Injection-student_reg.md +CVE-2024-1830 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.5Library%20System%20In%20PHP%20-%20SQL%20Injection-student_lostpass.md +CVE-2024-1833 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp +CVE-2024-1834 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss +CVE-2024-1846 - https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/ +CVE-2024-1849 - https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/ +CVE-2024-1871 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/XSS%20Vulnerability%20in%20Project%20Assignment%20Report.md +CVE-2024-1871 - https://vuldb.com/?id.254694 +CVE-2024-1874 - http://www.openwall.com/lists/oss-security/2024/04/12/11 +CVE-2024-1874 - https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 +CVE-2024-1876 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Project%20SQL%20Injection%20Update.md +CVE-2024-1877 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Leave%20Cancel%20SQL%20Injection.md +CVE-2024-1878 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/IDOR%20Employee%20Profile.md +CVE-2024-1892 - https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b +CVE-2024-1899 - https://www.tenable.com/security/research/tra-2024-05 +CVE-2024-1905 - https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/ +CVE-2024-1919 - https://vuldb.com/?id.254854 +CVE-2024-1922 - https://vuldb.com/?id.254857 +CVE-2024-1923 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md +CVE-2024-1924 - https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md +CVE-2024-1926 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md +CVE-2024-1927 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md +CVE-2024-1928 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20XSS.md +CVE-2024-1929 - https://www.openwall.com/lists/oss-security/2024/03/04/2 +CVE-2024-1930 - https://www.openwall.com/lists/oss-security/2024/03/04/2 +CVE-2024-1932 - https://huntr.com/bounties/fefd711e-3bf0-4884-9acc-167649c1f9a2 +CVE-2024-1956 - https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/ +CVE-2024-1958 - https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/ +CVE-2024-1962 - https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ +CVE-2024-1970 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/OnlineLearningSystemV2-XSS.md +CVE-2024-1971 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SQL%20Injection%20Auth.md +CVE-2024-1977 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-004 +CVE-2024-1981 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/ +CVE-2024-1982 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/ +CVE-2024-1983 - https://wpscan.com/vulnerability/bf3a31de-a227-4db1-bd18-ce6a78dc96fb/ +CVE-2024-2002 - https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt +CVE-2024-2014 - https://github.com/mashroompc0527/CVE/blob/main/vul.md +CVE-2024-2018 - https://melapress.com/support/kb/wp-activity-log-plugin-changelog/ +CVE-2024-2021 - https://github.com/dtxharry/cve/blob/main/cve.md +CVE-2024-20287 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO +CVE-2024-20295 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ +CVE-2024-20356 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb +CVE-2024-2044 - https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/ +CVE-2024-2053 - http://seclists.org/fulldisclosure/2024/Mar/11 +CVE-2024-2053 - https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt +CVE-2024-2054 - http://seclists.org/fulldisclosure/2024/Mar/12 +CVE-2024-2054 - https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt +CVE-2024-2055 - http://seclists.org/fulldisclosure/2024/Mar/13 +CVE-2024-2055 - https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt +CVE-2024-2056 - http://seclists.org/fulldisclosure/2024/Mar/14 +CVE-2024-2056 - https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt +CVE-2024-2057 - https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl +CVE-2024-2058 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md +CVE-2024-2059 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md +CVE-2024-2060 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md +CVE-2024-2061 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md +CVE-2024-2062 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md +CVE-2024-2063 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md +CVE-2024-2064 - https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md +CVE-2024-2065 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md +CVE-2024-2066 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md +CVE-2024-2067 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md +CVE-2024-2068 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md +CVE-2024-2069 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md +CVE-2024-2071 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/faq-management-system.md +CVE-2024-20729 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1890 +CVE-2024-2073 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md +CVE-2024-2075 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md +CVE-2024-2077 - https://github.com/yethu123/vulns-finding/blob/main/Simple%20Online%20Bidding%20System.md +CVE-2024-2093 - https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072 +CVE-2024-20954 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20989 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20990 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20991 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20992 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20993 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20994 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20995 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20997 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20998 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-20999 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21000 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21001 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21002 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21003 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21004 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21005 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21006 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21007 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21008 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21009 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-2101 - https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/ +CVE-2024-21010 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21011 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21012 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21013 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21014 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21015 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21016 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21017 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21018 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21019 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-2102 - https://wpscan.com/vulnerability/3d15f589-956c-4c71-98b1-3ba89d22262c/ +CVE-2024-21020 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21021 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21022 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21023 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21024 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21025 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21026 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21027 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21028 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21029 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21030 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21031 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21032 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21033 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21034 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21035 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21036 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21037 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21038 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21039 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21040 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21041 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21042 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21043 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21044 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21045 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21046 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21047 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21048 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21049 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21050 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21051 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21052 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21053 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21054 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21055 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21056 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21057 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21058 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21059 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21060 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21061 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21062 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21063 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21064 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21065 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21066 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21067 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21068 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21069 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21070 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21071 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21072 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21073 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21074 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21075 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21076 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21077 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21078 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21079 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21080 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21081 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21082 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21083 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21084 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21085 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21086 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21087 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21088 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21089 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21090 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21091 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21092 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21093 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21094 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21095 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21096 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21097 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21098 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21099 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21100 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21101 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21102 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21103 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21104 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21105 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21106 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21107 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21108 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21109 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21110 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21111 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21112 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21113 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21114 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21115 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21116 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21117 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21118 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21119 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21120 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-21121 - https://www.oracle.com/security-alerts/cpuapr2024.html +CVE-2024-2118 - https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/ +CVE-2024-21338 - https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/ +CVE-2024-21413 - https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/ +CVE-2024-2145 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md +CVE-2024-2146 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md +CVE-2024-2147 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md +CVE-2024-2148 - https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md +CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734 +CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733 +CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732 +CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731 +CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084 +CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337 +CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335 +CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334 +CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336 +CVE-2024-21488 - https://gist.github.com/icemonster/282ab98fb68fc22aac7c576538f6369c +CVE-2024-21488 - https://security.snyk.io/vuln/SNYK-JS-NETWORK-6184371 +CVE-2024-2149 - https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md +CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 +CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 +CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 +CVE-2024-21492 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21493 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21493 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078 +CVE-2024-21494 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21494 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 +CVE-2024-21495 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21495 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275 +CVE-2024-21496 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21496 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860 +CVE-2024-21497 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21497 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861 +CVE-2024-21498 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21498 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862 +CVE-2024-21499 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21499 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863 +CVE-2024-21500 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ +CVE-2024-21501 - https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf +CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557 +CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334 +CVE-2024-21502 - https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26 +CVE-2024-21502 - https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36 +CVE-2024-21502 - https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045 +CVE-2024-21503 - https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273 +CVE-2024-21504 - https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222 +CVE-2024-21505 - https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337 +CVE-2024-21506 - https://gist.github.com/keltecc/62a7c2bf74a997d0a7b48a0ff3853a03 +CVE-2024-21506 - https://security.snyk.io/vuln/SNYK-PYTHON-PYMONGO-6370597 +CVE-2024-21507 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591300 +CVE-2024-21508 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591085 +CVE-2024-21509 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591084 +CVE-2024-21511 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6670046 +CVE-2024-21512 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-7176010 +CVE-2024-21512 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6861580 +CVE-2024-2152 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md +CVE-2024-2153 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md +CVE-2024-2154 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md +CVE-2024-2154 - https://vuldb.com/?id.255586 +CVE-2024-2159 - https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/ +CVE-2024-21623 - https://securitylab.github.com/research/github-actions-untrusted-input/ +CVE-2024-21626 - http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html +CVE-2024-21632 - https://www.descope.com/blog/post/noauth +CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/commit/d348c43b24a9de350ff6e5bd610545a10c1fc712 +CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w +CVE-2024-21640 - https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh +CVE-2024-21644 - https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv +CVE-2024-21645 - https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr +CVE-2024-21652 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv +CVE-2024-21661 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7 +CVE-2024-21662 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454 +CVE-2024-21663 - https://github.com/DEMON1A/Discord-Recon/issues/23 +CVE-2024-21664 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3 +CVE-2024-21665 - https://github.com/pimcore/ecommerce-framework-bundle/security/advisories/GHSA-cx99-25hr-5jxf +CVE-2024-21666 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-c38c-c8mh-vq68 +CVE-2024-21667 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-g273-wppx-82w4 +CVE-2024-2169 - https://kb.cert.org/vuls/id/417980 +CVE-2024-2169 - https://www.kb.cert.org/vuls/id/417980 +CVE-2024-21732 - https://github.com/Ghostfox2003/cms/blob/main/1.md +CVE-2024-21733 - http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html +CVE-2024-2174 - https://issues.chromium.org/issues/325866363 +CVE-2024-2176 - https://issues.chromium.org/issues/325936438 +CVE-2024-2180 - https://fluidattacks.com/advisories/gomez/ +CVE-2024-21887 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html +CVE-2024-2189 - https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/ +CVE-2024-21907 - https://alephsecurity.com/vulns/aleph-2018004 +CVE-2024-21907 - https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678 +CVE-2024-2193 - https://www.vusec.net/projects/ghostrace/ +CVE-2024-22049 - https://github.com/advisories/GHSA-5pq7-52mg-hr42 +CVE-2024-22049 - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42 +CVE-2024-22086 - https://github.com/hayyp/cherry/issues/1 +CVE-2024-22087 - https://github.com/foxweb/pico/issues/31 +CVE-2024-22088 - https://github.com/chendotjs/lotos/issues/7 +CVE-2024-22107 - https://adepts.of0x.cc/gtbcc-pwned/ +CVE-2024-22107 - https://x-c3ll.github.io/cves.html +CVE-2024-22108 - https://adepts.of0x.cc/gtbcc-pwned/ +CVE-2024-22108 - https://x-c3ll.github.io/cves.html +CVE-2024-22120 - https://support.zabbix.com/browse/ZBX-24505 +CVE-2024-22144 - https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve +CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/pull/1792 +CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx +CVE-2024-22191 - https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h +CVE-2024-22194 - https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d +CVE-2024-22196 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c +CVE-2024-22197 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-pxmr-q2x3-9x9m +CVE-2024-22198 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-8r25-68wm-jw35 +CVE-2024-2220 - https://wpscan.com/vulnerability/fe8c001e-8880-4570-b010-a41fc8ee0c58/ +CVE-2024-22202 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6648-6g96-mg35 +CVE-2024-22208 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-9hhf-xmcw-r3xg +CVE-2024-22211 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59 +CVE-2024-22318 - http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html +CVE-2024-22318 - http://seclists.org/fulldisclosure/2024/Feb/7 +CVE-2024-22368 - http://www.openwall.com/lists/oss-security/2024/01/10/2 +CVE-2024-22368 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md +CVE-2024-22368 - https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes +CVE-2024-22368 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html +CVE-2024-22409 - https://github.com/datahub-project/datahub/security/advisories/GHSA-x3v6-r479-m4xv +CVE-2024-22411 - https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh +CVE-2024-22412 - https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r +CVE-2024-22414 - https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-mrcw-j96f-p6v6 +CVE-2024-22416 - https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm +CVE-2024-22418 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp +CVE-2024-22419 - https://github.com/vyperlang/vyper/security/advisories/GHSA-2q8v-3gqq-4f8p +CVE-2024-22422 - https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-xmj6-g32r-fc5q +CVE-2024-22490 - https://github.com/cui2shark/security/blob/main/beetl-bbs%20-%20A%20reflected%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20the%20search%20box.md +CVE-2024-22491 - https://github.com/cui2shark/security/blob/main/A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20beetl-bbs%20post%20save.md +CVE-2024-22492 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20contact%20para)A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20Jfinalcms%20contact%20para.md +CVE-2024-22493 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20content%20para)A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20Jfinalcms%20content%20para.md +CVE-2024-22494 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20moblie%20para)A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20Jfinalcms%20moblie%20para.md +CVE-2024-22496 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-username)%20.md +CVE-2024-22497 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-password)%20.md +CVE-2024-22514 - https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution +CVE-2024-22515 - https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability +CVE-2024-22526 - https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3 +CVE-2024-22529 - https://github.com/unpWn4bL3/iot-security/blob/main/29.md +CVE-2024-22532 - https://github.com/pwndorei/CVE-2024-22532 +CVE-2024-22549 - https://github.com/cccbbbttt/cms/blob/main/1.md +CVE-2024-22550 - https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html +CVE-2024-22551 - https://packetstormsecurity.com/files/176314/WhatACart-2.0.7-Cross-Site-Scripting.html +CVE-2024-22562 - https://github.com/matthiaskramm/swftools/issues/210 +CVE-2024-22563 - https://github.com/openvswitch/ovs-issues/issues/315 +CVE-2024-22568 - https://github.com/kayo-zjq/myc/blob/main/1.md +CVE-2024-22569 - https://github.com/Num-Nine/CVE/issues/12 +CVE-2024-22570 - https://github.com/Num-Nine/CVE/issues/11 +CVE-2024-22591 - https://github.com/ysuzhangbin/cms2/blob/main/1.md +CVE-2024-22592 - https://github.com/ysuzhangbin/cms2/blob/main/2.md +CVE-2024-22593 - https://github.com/ysuzhangbin/cms2/blob/main/3.md +CVE-2024-22601 - https://github.com/ljw11e/cms/blob/main/5.md +CVE-2024-22603 - https://github.com/ljw11e/cms/blob/main/4.md +CVE-2024-2262 - https://wpscan.com/vulnerability/30544377-b90d-4762-b38a-ec89bda0dfdc/ +CVE-2024-2263 - https://wpscan.com/vulnerability/ec092ed9-eb3e-40a7-a878-ab854104e290/ +CVE-2024-22632 - https://tomiodarim.io/posts/cve-2024-22632-3/ +CVE-2024-22633 - https://tomiodarim.io/posts/cve-2024-22632-3/ +CVE-2024-22635 - https://packetstormsecurity.com/files/176365/WebCalendar-1.3.0-Cross-Site-Scripting.html +CVE-2024-22637 - https://packetstormsecurity.com/files/176403/Form-Tools-3.1.1-Cross-Site-Scripting.html +CVE-2024-22638 - https://packetstormsecurity.com/files/176420/liveSite-2019.1-Remote-Code-Execution.html +CVE-2024-22638 - https://www.exploit-db.com/exploits/51936 +CVE-2024-22639 - https://packetstormsecurity.com/files/176411/iGalerie-3.0.22-Cross-Site-Scripting.html +CVE-2024-2264 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md +CVE-2024-22640 - https://github.com/zunak/CVE-2024-22640 +CVE-2024-22641 - https://github.com/zunak/CVE-2024-22641 +CVE-2024-22651 - https://github.com/goldds96/Report/blob/main/DLink/DIR-815/CI.md +CVE-2024-22660 - https://github.com/Covteam/iot_vuln/tree/main/setLanguageCfg +CVE-2024-22662 - https://github.com/Covteam/iot_vuln/tree/main/setParentalRules +CVE-2024-22663 - https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2 +CVE-2024-22667 - https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt +CVE-2024-22667 - https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 +CVE-2024-2267 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md +CVE-2024-2268 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md +CVE-2024-2269 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/SQL%20Injection%20Search/SQL%20Injection%20in%20search.php%20.md +CVE-2024-22699 - https://github.com/biantaibao/cms/blob/main/1.md +CVE-2024-2270 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md +CVE-2024-2271 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md +CVE-2024-22715 - https://github.com/RumblingIsOccupied/cms/blob/main/1.md +CVE-2024-22717 - https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/ +CVE-2024-22718 - https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/ +CVE-2024-22719 - https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/ +CVE-2024-2272 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Home/Blind%20SQL%20Injection%20Home.php%20.md +CVE-2024-22721 - https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/ +CVE-2024-22722 - https://hakaisecurity.io/error-404-your-security-not-found-tales-of-web-vulnerabilities/ +CVE-2024-22727 - https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways +CVE-2024-22729 - https://github.com/adhikara13/CVE/blob/main/netis_MW5360/blind%20command%20injection%20in%20password%20parameter%20in%20initial%20settings.md +CVE-2024-22734 - https://www.redlinecybersecurity.com/blog/cve-2024-22734 +CVE-2024-22749 - https://github.com/gpac/gpac/issues/2713 +CVE-2024-22749 - https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md +CVE-2024-22751 - https://github.com/5erua/vuls/blob/main/dir882.md +CVE-2024-22751 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-22752 - https://github.com/hacker625/CVE-2024-22752 +CVE-2024-2277 - https://vuldb.com/?id.256046 +CVE-2024-22773 - https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433 +CVE-2024-22773 - https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s +CVE-2024-2278 - https://wpscan.com/vulnerability/2cbabde8-1e3e-4205-8a5c-b889447236a0/ +CVE-2024-22795 - https://github.com/Hagrid29/ForeScout-SecureConnector-EoP +CVE-2024-2281 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/BROKEN%20ACCESS%20CONTROL%20.md +CVE-2024-22817 - https://github.com/mafangqian/cms/blob/main/1.md +CVE-2024-22818 - https://github.com/mafangqian/cms/blob/main/3.md +CVE-2024-22819 - https://github.com/mafangqian/cms/blob/main/2.md +CVE-2024-2282 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20Login.md +CVE-2024-2282 - https://vuldb.com/?id.256049 +CVE-2024-2283 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20member-view.php%20.md +CVE-2024-22830 - https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf +CVE-2024-22836 - https://github.com/u32i/cve/tree/main/CVE-2024-22836 +CVE-2024-2284 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-chat.php%20.md +CVE-2024-2285 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-member-edit.php%20.md +CVE-2024-22851 - https://www.drive-byte.de/en/blog/liveconfig-advisory-cve-2024-22851 +CVE-2024-22852 - https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md +CVE-2024-22852 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-22853 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-22854 - https://tomekwasiak.pl/cve-2024-22854/ +CVE-2024-22856 - https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html +CVE-2024-22857 - https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 +CVE-2024-22859 - https://github.com/github/advisory-database/pull/3490 +CVE-2024-22871 - https://hackmd.io/@fe1w0/rymmJGida +CVE-2024-22889 - https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9 +CVE-2024-22891 - https://github.com/EQSTLab/PoC/tree/main/2024/RCE/CVE-2024-22891 +CVE-2024-22899 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ +CVE-2024-22900 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ +CVE-2024-22901 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ +CVE-2024-22902 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ +CVE-2024-22903 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ +CVE-2024-22911 - https://github.com/matthiaskramm/swftools/issues/216 +CVE-2024-22912 - https://github.com/matthiaskramm/swftools/issues/212 +CVE-2024-22913 - https://github.com/matthiaskramm/swftools/issues/213 +CVE-2024-22914 - https://github.com/matthiaskramm/swftools/issues/214 +CVE-2024-22915 - https://github.com/matthiaskramm/swftools/issues/215 +CVE-2024-22916 - https://kee02p.github.io/2024/01/13/CVE-2024-22916/ +CVE-2024-22916 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-22919 - https://github.com/matthiaskramm/swftools/issues/209 +CVE-2024-22920 - https://github.com/matthiaskramm/swftools/issues/211 +CVE-2024-22923 - https://gist.github.com/whiteman007/ +CVE-2024-22927 - https://github.com/weng-xianhu/eyoucms/issues/57 +CVE-2024-22939 - https://github.com/NUDTTAN91/CVE-2024-22939 +CVE-2024-22939 - https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md +CVE-2024-22942 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/1/TOTOlink%20A3300R%20setWanCfg.md +CVE-2024-22955 - https://github.com/matthiaskramm/swftools/issues/207 +CVE-2024-22956 - https://github.com/matthiaskramm/swftools/issues/208 +CVE-2024-22957 - https://github.com/matthiaskramm/swftools/issues/206 +CVE-2024-22983 - https://github.com/keru6k/CVE-2024-22983/blob/main/CVE-2024-22983.md +CVE-2024-22988 - https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47 +CVE-2024-22988 - https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies +CVE-2024-23031 - https://github.com/weng-xianhu/eyoucms/issues/57 +CVE-2024-23032 - https://github.com/weng-xianhu/eyoucms/issues/57 +CVE-2024-23033 - https://github.com/weng-xianhu/eyoucms/issues/57 +CVE-2024-23034 - https://github.com/weng-xianhu/eyoucms/issues/57 +CVE-2024-23052 - https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28 +CVE-2024-23054 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md +CVE-2024-23055 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 +CVE-2024-23057 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/5/TOTOlink%20A3300R%20setNtpCfg.md +CVE-2024-23058 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/6/TOTOlink%20A3300R%20setTr069Cfg.md +CVE-2024-23059 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/2/TOTOlink%20A3300R%20setDdnsCfg.md +CVE-2024-23060 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/4/TOTOLINK%20A3300R%20setDmzCfg.md +CVE-2024-23061 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/3/TOTOLINK%20A3300R%20setScheduleCfg.md +CVE-2024-2307 - https://bugzilla.redhat.com/show_bug.cgi?id=2268513 +CVE-2024-2309 - https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/ +CVE-2024-23094 - https://github.com/TinkAnet/cve/blob/main/csrf3.md +CVE-2024-2310 - https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/ +CVE-2024-2318 - https://gist.github.com/whiteman007/a3b25a7ddf38774329d72930e0cd841a +CVE-2024-2322 - https://wpscan.com/vulnerability/c740ed3b-d6b8-4afc-8c6b-a1ec37597055/ +CVE-2024-2329 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.md +CVE-2024-2330 - https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md +CVE-2024-23301 - https://github.com/rear/rear/pull/3123 +CVE-2024-2332 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md +CVE-2024-23329 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr +CVE-2024-2333 - https://github.com/0x404Ming/CVE_Hunter/blob/main/SQLi-3.md +CVE-2024-23330 - https://github.com/tutao/tutanota/security/advisories/GHSA-32w8-v5fc-vpp7 +CVE-2024-23331 - https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw +CVE-2024-23334 - https://github.com/aio-libs/aiohttp/pull/8079 +CVE-2024-23342 - https://minerva.crocs.fi.muni.cz/ +CVE-2024-23346 - https://github.com/materialsproject/pymatgen/security/advisories/GHSA-vgv8-5cpj-qj2f +CVE-2024-2344 - https://gist.github.com/Xib3rR4dAr/05a32f63d75082ab05de27e313e70fa3 +CVE-2024-23446 - https://www.elastic.co/community/security +CVE-2024-23447 - https://www.elastic.co/community/security +CVE-2024-23448 - https://www.elastic.co/community/security +CVE-2024-23450 - https://www.elastic.co/community/security +CVE-2024-23525 - https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a +CVE-2024-23525 - https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes +CVE-2024-23525 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html +CVE-2024-2353 - https://github.com/OraclePi/repo/blob/main/totolink%20X6000R/1/X6000R%20AX3000%20WiFi%206%20Giga%20unauthed%20rce.md +CVE-2024-2355 - https://vuldb.com/?id.256315 +CVE-2024-23633 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r +CVE-2024-23634 - https://github.com/geoserver/geoserver/security/advisories/GHSA-75m5-hh4r-q9gx +CVE-2024-23634 - https://osgeo-org.atlassian.net/browse/GEOS-11213 +CVE-2024-2364 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Musicshelf_Manifest_issue.md +CVE-2024-23640 - https://github.com/geoserver/geoserver/security/advisories/GHSA-9rfr-pf2x-g4xf +CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11149 +CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11155 +CVE-2024-23641 - https://github.com/sveltejs/kit/security/advisories/GHSA-g5m6-hxpp-fc49 +CVE-2024-23642 - https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525 +CVE-2024-23642 - https://osgeo-org.atlassian.net/browse/GEOS-11152 +CVE-2024-23643 - https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7 +CVE-2024-23646 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv +CVE-2024-23648 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-mrqg-mwh7-q94j +CVE-2024-23649 - https://github.com/LemmyNet/lemmy/security/advisories/GHSA-r64r-5h43-26qv +CVE-2024-2365 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md +CVE-2024-23655 - https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g +CVE-2024-23656 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r +CVE-2024-23660 - https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/ +CVE-2024-23674 - https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1 +CVE-2024-23681 - https://github.com/advisories/GHSA-98hq-4wmw-98w9 +CVE-2024-23681 - https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9 +CVE-2024-23686 - https://github.com/advisories/GHSA-qqhq-8r2c-c3f5 +CVE-2024-23686 - https://github.com/jeremylong/DependencyCheck/security/advisories/GHSA-qqhq-8r2c-c3f5 +CVE-2024-2369 - https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/ +CVE-2024-23692 - https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ +CVE-2024-23709 - https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c +CVE-2024-23717 - https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2 +CVE-2024-23722 - https://medium.com/@adurands82/fluent-bit-dos-vulnerability-cve-2024-23722-4e3e74af9d00 +CVE-2024-23724 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724 +CVE-2024-23745 - https://blog.xpnsec.com/dirtynib/ +CVE-2024-23745 - https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model +CVE-2024-23745 - https://github.com/louiselalanne/CVE-2024-23745 +CVE-2024-23746 - https://github.com/louiselalanne/CVE-2024-23746 +CVE-2024-23747 - https://github.com/louiselalanne/CVE-2024-23747 +CVE-2024-23749 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html +CVE-2024-23749 - http://seclists.org/fulldisclosure/2024/Feb/14 +CVE-2024-23752 - https://github.com/gventuri/pandas-ai/issues/868 +CVE-2024-23756 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23756 +CVE-2024-23759 - https://herolab.usd.de/security-advisories/usd-2023-0046/ +CVE-2024-23760 - https://herolab.usd.de/security-advisories/usd-2023-0050/ +CVE-2024-23761 - https://herolab.usd.de/security-advisories/usd-2023-0048/ +CVE-2024-23762 - https://herolab.usd.de/security-advisories/usd-2023-0049/ +CVE-2024-23763 - https://herolab.usd.de/security-advisories/usd-2023-0047/ +CVE-2024-23817 - https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-7947-48q7-cp5m +CVE-2024-23818 - https://osgeo-org.atlassian.net/browse/GEOS-11153 +CVE-2024-23819 - https://osgeo-org.atlassian.net/browse/GEOS-11154 +CVE-2024-23822 - https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx +CVE-2024-23824 - https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack +CVE-2024-23824 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7 +CVE-2024-23825 - https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg +CVE-2024-23826 - https://github.com/spbu-se/spbu_se_site/security/advisories/GHSA-5vfc-v7hg-pvwm +CVE-2024-23827 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m +CVE-2024-23829 - https://github.com/aio-libs/aiohttp/pull/8074 +CVE-2024-23829 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 +CVE-2024-23833 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-6p92-qfqf-qwx4 +CVE-2024-23837 - https://redmine.openinfosecfoundation.org/issues/6444 +CVE-2024-23850 - https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/ +CVE-2024-23897 - http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html +CVE-2024-23897 - http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html +CVE-2024-2391 - https://www.exploit-db.com/exploits/51153 +CVE-2024-2394 - https://github.com/LiAoRJ/CVE_Hunter/blob/main/RCE-1.md +CVE-2024-23940 - https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1 +CVE-2024-23985 - https://packetstormsecurity.com/files/176663/EzServer-6.4.017-Denial-Of-Service.html +CVE-2024-23995 - https://github.com/EQSTLab/PoC/blob/main/2024/RCE/CVE-2024-23995/README.md +CVE-2024-24001 - https://github.com/jishenghua/jshERP/issues/99 +CVE-2024-24002 - https://github.com/jishenghua/jshERP/issues/99 +CVE-2024-24003 - https://github.com/jishenghua/jshERP/issues/99 +CVE-2024-24004 - https://github.com/jishenghua/jshERP/issues/99 +CVE-2024-2402 - https://wpscan.com/vulnerability/98e050cf-5686-4216-bad1-575decf3eaa7/ +CVE-2024-24034 - https://github.com/ELIZEUOPAIN/CVE-2024-24034/tree/main +CVE-2024-24035 - https://github.com/ELIZEUOPAIN/CVE-2024-24035/tree/main +CVE-2024-2404 - https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/ +CVE-2024-24041 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md +CVE-2024-24041 - https://portswigger.net/web-security/cross-site-scripting +CVE-2024-2405 - https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/ +CVE-2024-24050 - https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050 +CVE-2024-24059 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability +CVE-2024-24062 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole +CVE-2024-24115 - https://mechaneus.github.io/CVE-2024-24115.html +CVE-2024-24115 - https://mechaneus.github.io/CVE-PENDING-COTONTI.html +CVE-2024-24130 - https://github.com/Hebing123/cve/issues/13 +CVE-2024-24131 - https://github.com/Hebing123/cve/issues/14 +CVE-2024-24133 - https://github.com/Hebing123/cve/issues/16 +CVE-2024-24134 - https://github.com/BurakSevben/2024_Online_Food_Menu_XSS/ +CVE-2024-24135 - https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/ +CVE-2024-24136 - https://github.com/BurakSevben/2024_Math_Game_XSS +CVE-2024-24139 - https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection/ +CVE-2024-24140 - https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection +CVE-2024-24141 - https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1 +CVE-2024-24142 - https://github.com/BurakSevben/School-Task-Manager-SQL-Injection-2 +CVE-2024-24146 - https://github.com/libming/libming/issues/307 +CVE-2024-24147 - https://github.com/libming/libming/issues/311 +CVE-2024-24148 - https://github.com/libming/libming/issues/308 +CVE-2024-24149 - https://github.com/libming/libming/issues/310 +CVE-2024-24150 - https://github.com/libming/libming/issues/309 +CVE-2024-24155 - https://github.com/axiomatic-systems/Bento4/issues/919 +CVE-2024-24156 - https://github.com/gnuboard/g6/issues/316 +CVE-2024-24160 - https://github.com/wy876/cve/issues/1 +CVE-2024-24161 - https://github.com/wy876/cve/issues/2 +CVE-2024-24186 - https://github.com/pcmacdon/jsish/issues/98 +CVE-2024-24188 - https://github.com/pcmacdon/jsish/issues/100 +CVE-2024-24189 - https://github.com/pcmacdon/jsish/issues/101 +CVE-2024-24246 - https://github.com/qpdf/qpdf/issues/1123 +CVE-2024-24256 - https://github.com/l8l1/killl.github.io/blob/main/3.md +CVE-2024-2428 - https://wpscan.com/vulnerability/4832e223-4571-4b45-97db-2fd403797c49/ +CVE-2024-2429 - https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/ +CVE-2024-24300 - https://github.com/yckuo-sdc/PoC +CVE-2024-24301 - https://github.com/yckuo-sdc/PoC +CVE-2024-2432 - https://security.paloaltonetworks.com/CVE-2024-2432 +CVE-2024-24321 - https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md +CVE-2024-24321 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-24325 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md +CVE-2024-24326 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/8/TOTOlink%20A3300R%20setStaticDhcpRules.md +CVE-2024-24327 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/7/TOTOlink%20A3300R%20setIpv6Cfg.md +CVE-2024-24328 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/12/TOTOlink%20A3300R%20setMacFilterRules.md +CVE-2024-24329 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/10/TOTOlink%20A3300R%20setPortForwardRules.md +CVE-2024-24330 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/14/TOTOlink%20A3300R%20setRemoteCfg.md +CVE-2024-24331 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/13/TOTOlink%20A3300R%20setWiFiScheduleCfg.md +CVE-2024-24332 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/9/TOTOlink%20A3300R%20setUrlFilterRules.md +CVE-2024-24333 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/15/TOTOlink%20A3300R%20setWiFiAclRules.md +CVE-2024-24336 - https://nitipoom-jar.github.io/CVE-2024-24336/ +CVE-2024-24337 - https://nitipoom-jar.github.io/CVE-2024-24337/ +CVE-2024-2439 - https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/ +CVE-2024-24396 - https://cves.at/posts/cve-2024-24396/writeup/ +CVE-2024-24397 - https://cves.at/posts/cve-2024-24397/writeup/ +CVE-2024-24398 - https://cves.at/posts/cve-2024-24398/writeup/ +CVE-2024-24399 - https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html +CVE-2024-24399 - https://www.exploit-db.com/exploits/51949 +CVE-2024-2441 - https://wpscan.com/vulnerability/9647e273-5724-4a02-868d-9b79f4bb2b79/ +CVE-2024-2444 - https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/ +CVE-2024-24468 - https://github.com/tang-0717/cms/blob/main/3.md +CVE-2024-24469 - https://github.com/tang-0717/cms/blob/main/2.md +CVE-2024-24470 - https://github.com/tang-0717/cms/blob/main/1.md +CVE-2024-24482 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-vgwr-4w3p-xmjv +CVE-2024-24494 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Stored_XSS.md +CVE-2024-24495 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/DailyHabitTracker-SQL_Injection.md +CVE-2024-24496 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Broken_Access_Control.md +CVE-2024-24497 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Login.md +CVE-2024-24498 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-Unauthenticated_Unrestricted_File_Upload_To_RCE.md +CVE-2024-24499 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Update_Profile.md +CVE-2024-24506 - https://bugs.limesurvey.org/bug_relationship_graph.php?bug_id=19364&graph=relation +CVE-2024-24506 - https://www.exploit-db.com/exploits/51926 +CVE-2024-24511 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24511%20-%3E%20Stored%20XSS%20in%20input%20Title%20of%20the%20Component +CVE-2024-24512 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24512%20-%3E%20Stored%20XSS%20in%20input%20SubTitle%20of%20the%20Component +CVE-2024-24520 - https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html +CVE-2024-24520 - https://www.exploit-db.com/exploits/51949 +CVE-2024-24524 - https://github.com/harryrabbit5651/cms/blob/main/1.md +CVE-2024-2453 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01 +CVE-2024-24543 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0130/setSchedWifi.md +CVE-2024-24559 - https://github.com/vyperlang/vyper/security/advisories/GHSA-6845-xw22-ffxv +CVE-2024-24560 - https://github.com/vyperlang/vyper/security/advisories/GHSA-gp3w-2v2m-p686 +CVE-2024-24561 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c +CVE-2024-24563 - https://github.com/vyperlang/vyper/security/advisories/GHSA-52xq-j7v9-v4v2 +CVE-2024-24564 - https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx +CVE-2024-24565 - https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96 +CVE-2024-24566 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-pf55-fj96-xf37 +CVE-2024-24569 - https://github.com/pixee/java-security-toolkit/security/advisories/GHSA-qh4g-4m4w-jgv2 +CVE-2024-24570 - http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html +CVE-2024-24570 - http://seclists.org/fulldisclosure/2024/Feb/17 +CVE-2024-24571 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-h7w3-xv88-2xqj +CVE-2024-24572 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-xw34-8pj6-75gc +CVE-2024-24573 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-w67q-pp62-j4pf +CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/pull/2827 +CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx +CVE-2024-24578 - https://github.com/jens-maus/RaspberryMatic/security/advisories/GHSA-q967-q4j8-637h +CVE-2024-2470 - https://wpscan.com/vulnerability/8514b8ce-ff23-4aba-b2f1-fd36beb7d2ff/ +CVE-2024-24707 - https://snicco.io/vulnerability-disclosure/cwicly/remote-code-execution-cwicly-1-4-0-2?_s_id=cve +CVE-2024-24724 - https://packetstormsecurity.com/files/177857 +CVE-2024-24725 - https://www.exploit-db.com/exploits/51903 +CVE-2024-24736 - https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html +CVE-2024-24747 - https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4 +CVE-2024-24752 - https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 +CVE-2024-24753 - https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r +CVE-2024-24754 - https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w +CVE-2024-24756 - https://github.com/crafatar/crafatar/security/advisories/GHSA-5cxq-25mp-q5f2 +CVE-2024-24762 - https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p +CVE-2024-24762 - https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238 +CVE-2024-24762 - https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389 +CVE-2024-24765 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c +CVE-2024-24766 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm +CVE-2024-24767 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x +CVE-2024-24768 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h +CVE-2024-24793 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931 +CVE-2024-24793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931 +CVE-2024-24794 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931 +CVE-2024-24794 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931 +CVE-2024-24806 - http://www.openwall.com/lists/oss-security/2024/02/08/2 +CVE-2024-24806 - https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6 +CVE-2024-24808 - https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5 +CVE-2024-24809 - https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5 +CVE-2024-24810 - https://github.com/wixtoolset/issues/security/advisories/GHSA-7wh2-wxc7-9ph5 +CVE-2024-24814 - https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv +CVE-2024-24818 - https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7j +CVE-2024-24824 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-p6gg-5hf4-4rgj +CVE-2024-24830 - https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v +CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/SetSpeedWan.md +CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md +CVE-2024-2489 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetQosBand.md +CVE-2024-2490 - https://github.com/Emilytutu/IoT-vulnerable/blob/main/Tenda/AC18/setSchedWifi_end.md +CVE-2024-24945 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md +CVE-2024-24945 - https://portswigger.net/web-security/cross-site-scripting +CVE-2024-25003 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html +CVE-2024-25003 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html +CVE-2024-25003 - http://seclists.org/fulldisclosure/2024/Feb/14 +CVE-2024-25003 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 +CVE-2024-25004 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html +CVE-2024-25004 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html +CVE-2024-25004 - http://seclists.org/fulldisclosure/2024/Feb/14 +CVE-2024-25004 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 +CVE-2024-25007 - https://www.ericsson.com/en/about-us/security/psirt/security-bulletin--ericsson-network-manager-march-2024 +CVE-2024-2505 - https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/ +CVE-2024-2509 - https://research.cleantalk.org/cve-2024-2509/ +CVE-2024-2509 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ +CVE-2024-25106 - https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7 +CVE-2024-25108 - https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf +CVE-2024-25117 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273 +CVE-2024-25122 - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 +CVE-2024-25123 - https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2 +CVE-2024-25124 - http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html +CVE-2024-25124 - https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg +CVE-2024-25126 - https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx +CVE-2024-2515 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md +CVE-2024-2516 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md +CVE-2024-25164 - https://github.com/u32i/cve/tree/main/CVE-2024-25164 +CVE-2024-25165 - https://github.com/matthiaskramm/swftools/issues/217 +CVE-2024-25166 - https://github.com/xiaocheng-keji/71cms/issues/1 +CVE-2024-25167 - https://github.com/biantaibao/eblog_xss/blob/main/report.md +CVE-2024-25168 - https://github.com/biantaibao/snow_SQL/blob/main/report.md +CVE-2024-25169 - https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0 +CVE-2024-2517 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md +CVE-2024-25170 - https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 +CVE-2024-2518 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20book_history.php.md +CVE-2024-25180 - https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md +CVE-2024-25180 - https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 +CVE-2024-2519 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20navbar.php.md +CVE-2024-25197 - https://github.com/ros-planning/navigation2/issues/3940 +CVE-2024-2520 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20bookdate.php.md +CVE-2024-25200 - https://github.com/espruino/Espruino/issues/2457 +CVE-2024-25201 - https://github.com/espruino/Espruino/issues/2456 +CVE-2024-25202 - https://github.com/Agampreet-Singh/CVE-2024-25202 +CVE-2024-25202 - https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52 +CVE-2024-25207 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-2.md +CVE-2024-25208 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-1.md +CVE-2024-25209 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20SQL%20Injection.md +CVE-2024-2521 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md +CVE-2024-25210 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tacker%20-%20SQL%20Injection-1.md +CVE-2024-25211 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md +CVE-2024-25212 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%204.md +CVE-2024-25213 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%203.md +CVE-2024-25214 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md +CVE-2024-25215 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%202.md +CVE-2024-25216 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%201.md +CVE-2024-25217 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection(Unauthenticated).md +CVE-2024-25218 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-1.md +CVE-2024-25219 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-%202.md +CVE-2024-2522 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20booktime.php.md +CVE-2024-2522 - https://vuldb.com/?id.256959 +CVE-2024-25220 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%202.md +CVE-2024-25221 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-3.md +CVE-2024-25222 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%201.md +CVE-2024-25223 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md +CVE-2024-25224 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md +CVE-2024-25225 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%201.md +CVE-2024-25226 - https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md +CVE-2024-25228 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/ +CVE-2024-2523 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20booktime.php.md +CVE-2024-25239 - https://blu3ming.github.io/sourcecodester-employee-management-system-sql-injection/ +CVE-2024-2524 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20receipt.php.md +CVE-2024-2525 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20receipt.php.md +CVE-2024-2526 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20rooms.php.md +CVE-2024-25260 - https://sourceware.org/bugzilla/show_bug.cgi?id=31058 +CVE-2024-25262 - https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912 +CVE-2024-25269 - https://github.com/strukturag/libheif/issues/1073 +CVE-2024-2527 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20rooms.php.md +CVE-2024-2528 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-rooms.php.md +CVE-2024-25288 - https://github.com/slims/slims9_bulian/issues/229 +CVE-2024-2529 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20rooms.php.md +CVE-2024-25291 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25291 +CVE-2024-25292 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25292 +CVE-2024-25293 - https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293 +CVE-2024-25297 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/BLUDIT%20Stored%20XSS.md +CVE-2024-25298 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/REDAXO%20RCE.md +CVE-2024-2530 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-rooms.php.md +CVE-2024-25300 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md +CVE-2024-25301 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/RCE.md +CVE-2024-25301 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459 +CVE-2024-25302 - https://github.com/tubakvgc/CVE/blob/main/Event_Student_Attendance_System.md +CVE-2024-25304 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-2.md +CVE-2024-25305 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass.md +CVE-2024-25306 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-1.md +CVE-2024-25307 - https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md +CVE-2024-25308 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md +CVE-2024-25309 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-7.md +CVE-2024-2531 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20update-rooms.php.md +CVE-2024-25310 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-3.md +CVE-2024-25312 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-5.md +CVE-2024-25313 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass%20-%202.md +CVE-2024-25314 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-2.md +CVE-2024-25315 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-1.md +CVE-2024-25316 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-4.md +CVE-2024-25318 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-3.md +CVE-2024-2532 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md +CVE-2024-25320 - https://github.com/cqliuke/cve/blob/main/sql.md +CVE-2024-25327 - https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html +CVE-2024-2533 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-users.php.md +CVE-2024-2534 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20users.php.md +CVE-2024-25343 - https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343 +CVE-2024-25344 - https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html +CVE-2024-2535 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20users.php.md +CVE-2024-25350 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md +CVE-2024-25351 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Change_Image.md +CVE-2024-25354 - https://gist.github.com/6en6ar/c3b11b4058b8e2bc54717408d451fb79 +CVE-2024-25360 - https://github.com/leetsun/Hints/tree/main/moto-CX2L/4 +CVE-2024-25366 - https://github.com/mz-automation/libiec61850/issues/492 +CVE-2024-25369 - https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20(XSS).md +CVE-2024-25373 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_49B384.md +CVE-2024-2538 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e +CVE-2024-25385 - https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md +CVE-2024-25385 - https://github.com/noirotm/flvmeta/issues/23 +CVE-2024-25386 - https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2 +CVE-2024-25386 - https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/ +CVE-2024-25398 - https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md +CVE-2024-25410 - https://github.com/flusity/flusity-CMS/issues/9 +CVE-2024-25413 - https://github.com/capture0x/Magento-ver.-2.4.6 +CVE-2024-25413 - https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html +CVE-2024-25414 - https://github.com/capture0x/CSZ_CMS +CVE-2024-25414 - https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html +CVE-2024-25415 - https://github.com/capture0x/Phoenix +CVE-2024-25415 - https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html +CVE-2024-25415 - https://www.exploit-db.com/exploits/51957 +CVE-2024-25417 - https://github.com/Carl0724/cms/blob/main/3.md +CVE-2024-25418 - https://github.com/Carl0724/cms/blob/main/2.md +CVE-2024-25419 - https://github.com/Carl0724/cms/blob/main/1.md +CVE-2024-25423 - https://github.com/DriverUnload/cve-2024-25423 +CVE-2024-25428 - https://github.com/wuweiit/mushroom/issues/19 +CVE-2024-2543 - https://gist.github.com/Xib3rR4dAr/a248426dfee107c6fda08e80f98fa894 +CVE-2024-25434 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25434%20-%3E%20Stored%20XSS%20in%20input%20public%20name%20of%20the%20Component +CVE-2024-25435 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25435%20-%3E%20Reflected%20XSS%20on%20md1patient%20login%20page +CVE-2024-25436 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions +CVE-2024-25438 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions +CVE-2024-25442 - https://bugs.launchpad.net/hugin/+bug/2025032 +CVE-2024-25443 - https://bugs.launchpad.net/hugin/+bug/2025035 +CVE-2024-25445 - https://bugs.launchpad.net/hugin/+bug/2025038 +CVE-2024-25446 - https://bugs.launchpad.net/hugin/+bug/2025037 +CVE-2024-25447 - https://github.com/derf/feh/issues/709 +CVE-2024-25448 - https://github.com/derf/feh/issues/711 +CVE-2024-25450 - https://github.com/derf/feh/issues/712 +CVE-2024-25451 - https://github.com/axiomatic-systems/Bento4/issues/872 +CVE-2024-25452 - https://github.com/axiomatic-systems/Bento4/issues/873 +CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/204 +CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/874 +CVE-2024-25454 - https://github.com/axiomatic-systems/Bento4/issues/875 +CVE-2024-25458 - https://tanzhuyin.com/posts/cve-2024-25458/ +CVE-2024-2546 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md +CVE-2024-2547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md +CVE-2024-25502 - https://github.com/flusity/flusity-CMS/issues/10 +CVE-2024-25503 - https://github.com/EQSTLab/PoC/tree/main/2024/XSS/CVE-2024-25503 +CVE-2024-25507 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#plan_template_previewaspx +CVE-2024-25508 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#bulletin_template_showaspx +CVE-2024-25509 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_file_downloadaspx +CVE-2024-25510 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx +CVE-2024-25511 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_newaspx +CVE-2024-25512 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#attachdownloadaspx +CVE-2024-25513 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx +CVE-2024-25514 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_template_child_field_listaspx +CVE-2024-25517 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx +CVE-2024-25518 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx +CVE-2024-25519 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx +CVE-2024-25520 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx +CVE-2024-25521 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx +CVE-2024-25522 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx +CVE-2024-25523 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx +CVE-2024-25524 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx +CVE-2024-25526 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx +CVE-2024-25527 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx +CVE-2024-25528 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx +CVE-2024-2553 - https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md +CVE-2024-25530 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx +CVE-2024-25531 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx +CVE-2024-25533 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data +CVE-2024-2554 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp +CVE-2024-2555 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp +CVE-2024-2556 - https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md +CVE-2024-2557 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Execute%20After%20Redirect%20-%20Food%20Management%20System.md +CVE-2024-25575 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1963 +CVE-2024-25575 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1963 +CVE-2024-2558 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md +CVE-2024-2559 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md +CVE-2024-2560 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md +CVE-2024-25600 - https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6 +CVE-2024-25618 - https://github.com/mastodon/mastodon/security/advisories/GHSA-vm39-j3vx-pch3 +CVE-2024-25619 - https://github.com/mastodon/mastodon/security/advisories/GHSA-7w3c-p9j8-mq3x +CVE-2024-25625 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx +CVE-2024-25627 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf +CVE-2024-25634 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv +CVE-2024-25635 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f +CVE-2024-25648 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1959 +CVE-2024-25648 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1959 +CVE-2024-25652 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652 +CVE-2024-25653 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25653 +CVE-2024-2567 - https://github.com/ctflearner/Android_Findings/blob/main/AndroidWeatherApp/Android_backup.md +CVE-2024-25676 - https://excellium-services.com/cert-xlm-advisory/cve-2024-25676 +CVE-2024-2568 - https://github.com/bigbigbigbaby/cms/blob/main/5.md +CVE-2024-2569 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20admin-manage-user.php.md +CVE-2024-2570 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md +CVE-2024-2571 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md +CVE-2024-25712 - https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html +CVE-2024-25713 - https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh +CVE-2024-2572 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md +CVE-2024-25728 - https://www.bleepingcomputer.com/news/security/expressvpn-bug-has-been-leaking-some-dns-requests-for-years/ +CVE-2024-2573 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md +CVE-2024-25730 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-25730 +CVE-2024-25734 - http://packetstormsecurity.com/files/177081 +CVE-2024-25735 - http://packetstormsecurity.com/files/177082 +CVE-2024-25736 - http://packetstormsecurity.com/files/177083 +CVE-2024-2574 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md +CVE-2024-25742 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9 +CVE-2024-25746 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md +CVE-2024-25748 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md +CVE-2024-2575 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md +CVE-2024-25751 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetSysTime.md +CVE-2024-25753 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md +CVE-2024-25756 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md +CVE-2024-2576 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md +CVE-2024-2577 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md +CVE-2024-2577 - https://vuldb.com/?id.257080 +CVE-2024-25807 - https://github.com/Hebing123/cve/issues/17 +CVE-2024-25808 - https://github.com/Hebing123/cve/issues/17 +CVE-2024-2581 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md +CVE-2024-25811 - https://github.com/Fei123-design/vuln/blob/master/Dreamer%20CMS%20Unauthorized%20access%20vulnerability.md +CVE-2024-25817 - https://github.com/advisories/GHSA-3qx3-6hxr-j2ch +CVE-2024-25817 - https://www.cubeyond.net/blog/my-cves/eza-cve-report +CVE-2024-25828 - https://github.com/sec-Kode/cve +CVE-2024-2583 - https://wpscan.com/vulnerability/98d8c713-e8cd-4fad-a8fb-7a40db2742a2/ +CVE-2024-25830 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report +CVE-2024-25831 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report +CVE-2024-25832 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report +CVE-2024-25833 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report +CVE-2024-25843 - https://security.friendsofpresta.org/modules/2024/02/27/ba_importer.html +CVE-2024-25850 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md +CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md +CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md +CVE-2024-25852 - https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md +CVE-2024-25866 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md +CVE-2024-25867 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Add_Type.md +CVE-2024-25868 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Stored_XSS_Add_Type.md +CVE-2024-25869 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Unrestricted_Fileupload.md +CVE-2024-25873 - https://github.com/dd3x3r/enhavo/blob/main/html-injection-page-content-blockquote-author-v0.13.1.md +CVE-2024-25874 - https://github.com/dd3x3r/enhavo/blob/main/xss-create-tag-v0.13.1.md +CVE-2024-25875 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-undertitel-v0.13.1.md +CVE-2024-25876 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md +CVE-2024-25891 - https://github.com/ChurchCRM/CRM/issues/6856 +CVE-2024-25892 - https://github.com/ChurchCRM/CRM/issues/6858 +CVE-2024-25893 - https://github.com/ChurchCRM/CRM/issues/6856 +CVE-2024-25894 - https://github.com/ChurchCRM/CRM/issues/6849 +CVE-2024-25895 - https://github.com/ChurchCRM/CRM/issues/6853 +CVE-2024-25896 - https://github.com/ChurchCRM/CRM/issues/6854 +CVE-2024-25897 - https://github.com/ChurchCRM/CRM/issues/6856 +CVE-2024-25898 - https://github.com/ChurchCRM/CRM/issues/6851 +CVE-2024-25938 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1958 +CVE-2024-25938 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1958 +CVE-2024-25973 - http://seclists.org/fulldisclosure/2024/Feb/23 +CVE-2024-25973 - https://r.sec-consult.com/openolat +CVE-2024-25974 - http://seclists.org/fulldisclosure/2024/Feb/23 +CVE-2024-25974 - https://r.sec-consult.com/openolat +CVE-2024-25975 - https://r.sec-consult.com/hawki +CVE-2024-25976 - https://r.sec-consult.com/hawki +CVE-2024-25977 - https://r.sec-consult.com/hawki +CVE-2024-2603 - https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/ +CVE-2024-2604 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md +CVE-2024-26134 - https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m +CVE-2024-26135 - https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8 +CVE-2024-26149 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w +CVE-2024-26152 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg +CVE-2024-2627 - https://issues.chromium.org/issues/41493290 +CVE-2024-2631 - https://issues.chromium.org/issues/41495878 +CVE-2024-26329 - https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/ +CVE-2024-26333 - https://github.com/matthiaskramm/swftools/issues/219 +CVE-2024-26334 - https://github.com/matthiaskramm/swftools/issues/221 +CVE-2024-26335 - https://github.com/matthiaskramm/swftools/issues/222 +CVE-2024-26337 - https://github.com/matthiaskramm/swftools/issues/223 +CVE-2024-26339 - https://github.com/matthiaskramm/swftools/issues/225 +CVE-2024-26342 - https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md +CVE-2024-26349 - https://github.com/Icycu123/cms/blob/main/1.md +CVE-2024-26362 - https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html +CVE-2024-26369 - https://github.com/eProsima/Fast-DDS/issues/4365 +CVE-2024-26445 - https://github.com/xiaolanjing0/cms/blob/main/1.md +CVE-2024-26454 - https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4 +CVE-2024-26454 - https://medium.com/@0x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210 +CVE-2024-26470 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470 +CVE-2024-26471 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26471 +CVE-2024-26476 - https://github.com/mpdf/mpdf/issues/867 +CVE-2024-26489 - https://github.com/2111715623/cms/blob/main/3.md +CVE-2024-26490 - https://github.com/2111715623/cms/blob/main/2.md +CVE-2024-26491 - https://github.com/2111715623/cms/blob/main/1.md +CVE-2024-26492 - https://packetstormsecurity.com/files/165555/Online-Diagnostic-Lab-Management-System-1.0-Missing-Access-Control.html +CVE-2024-26492 - https://www.exploit-db.com/exploits/50660 +CVE-2024-26495 - https://github.com/friendica/friendica/issues/13884 +CVE-2024-26504 - https://tomiodarim.io/posts/cve-2024-26504/ +CVE-2024-26521 - https://github.com/capture0x/Phoenix +CVE-2024-26521 - https://github.com/hackervegas001/CVE-2024-26521 +CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/492 +CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/495 +CVE-2024-26540 - https://github.com/GreycLab/CImg/issues/403 +CVE-2024-26542 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-26542/README.md +CVE-2024-26548 - https://github.com/cwh031600/vivotek/blob/main/vivotek-FD8166A-uploadfile-dos/vivotek-FD8166A-uploadfile-analysis.md +CVE-2024-26557 - https://github.com/Hebing123/cve/issues/18 +CVE-2024-26559 - https://syst1m.cn/2024/01/22/U%E9%AA%8C%E8%AF%81%E7%BD%91%E7%BB%9C%E7%94%A8%E6%88%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/ +CVE-2024-26577 - https://github.com/guusec/VSeeDoS +CVE-2024-26633 - https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd +CVE-2024-26798 - https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f +CVE-2024-26798 - https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d +CVE-2024-26798 - https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b +CVE-2024-26798 - https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520 +CVE-2024-26798 - https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8 +CVE-2024-2690 - https://github.com/wkeyi0x1/vul-report/issues/2 +CVE-2024-2697 - https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/ +CVE-2024-26979 - https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73 +CVE-2024-26979 - https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac +CVE-2024-26979 - https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791 +CVE-2024-26979 - https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2 +CVE-2024-26979 - https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7 +CVE-2024-26979 - https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d +CVE-2024-26979 - https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000 +CVE-2024-27000 - https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026 +CVE-2024-2703 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md +CVE-2024-2704 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md +CVE-2024-2705 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetQosBand.md +CVE-2024-2706 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md +CVE-2024-2707 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWriteFacMac.md +CVE-2024-2708 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md +CVE-2024-27081 - https://github.com/esphome/esphome/security/advisories/GHSA-8p25-3q46-8q2p +CVE-2024-27082 - https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h +CVE-2024-27088 - https://github.com/medikoo/es5-ext/issues/201 +CVE-2024-2709 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md +CVE-2024-27092 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp +CVE-2024-27093 - https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4 +CVE-2024-27097 - https://github.com/ckan/ckan/commit/81b56c55e5e3651d7fcf9642cd5a489a9b62212c +CVE-2024-2710 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/setSchedWifi_start.md +CVE-2024-2711 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/addWifiMacFilter_deviceMac.md +CVE-2024-27132 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ +CVE-2024-27133 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ +CVE-2024-27285 - https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc +CVE-2024-27285 - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml +CVE-2024-27287 - https://github.com/esphome/esphome/security/advisories/GHSA-9p43-hj5j-96h5 +CVE-2024-2729 - https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14/ +CVE-2024-27297 - https://hackmd.io/03UGerewRcy3db44JQoWvw +CVE-2024-27299 - https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing +CVE-2024-27299 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw +CVE-2024-27300 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx +CVE-2024-27301 - https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc +CVE-2024-27302 - https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq +CVE-2024-27318 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 +CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/561ac3c17b92cb55d3032504a076fa4b +CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e +CVE-2024-2739 - https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2/ +CVE-2024-27398 - https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2 +CVE-2024-27398 - https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249 +CVE-2024-27398 - https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014 +CVE-2024-27398 - https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53 +CVE-2024-27398 - https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546 +CVE-2024-27398 - https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178 +CVE-2024-27398 - https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5 +CVE-2024-27398 - https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93 +CVE-2024-27399 - https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c +CVE-2024-27399 - https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9 +CVE-2024-27399 - https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33 +CVE-2024-27399 - https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0 +CVE-2024-27399 - https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c +CVE-2024-27399 - https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae +CVE-2024-27399 - https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79 +CVE-2024-27399 - https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4 +CVE-2024-2744 - https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f/ +CVE-2024-27453 - https://www.exsiliumsecurity.com/CVE-2024-27453.html +CVE-2024-27474 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md +CVE-2024-27476 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md +CVE-2024-27477 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md +CVE-2024-2749 - https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91/ +CVE-2024-27515 - https://github.com/mindstellar/Osclass/issues/495 +CVE-2024-27516 - https://github.com/LiveHelperChat/livehelperchat/issues/2054 +CVE-2024-27517 - https://github.com/webasyst/webasyst-framework/issues/377 +CVE-2024-27518 - https://github.com/secunnix/CVE-2024-27518 +CVE-2024-27518 - https://www.youtube.com/watch?v=FM5XlZPdvdo +CVE-2024-27521 - https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md +CVE-2024-2754 - https://github.com/wkeyi0x1/vul-report/issues/4 +CVE-2024-27558 - https://github.com/kilooooo/cms/blob/main/2.md +CVE-2024-27559 - https://github.com/kilooooo/cms/blob/main/1.md +CVE-2024-2756 - http://www.openwall.com/lists/oss-security/2024/04/12/11 +CVE-2024-2756 - https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4 +CVE-2024-27561 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md +CVE-2024-27563 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md +CVE-2024-27564 - https://github.com/dirk1983/chatgpt/issues/114 +CVE-2024-27565 - https://github.com/dirk1983/chatgpt-wechat-personal/issues/4 +CVE-2024-27567 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/config_vpn_pptp.md +CVE-2024-27568 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md +CVE-2024-27569 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md +CVE-2024-2757 - http://www.openwall.com/lists/oss-security/2024/04/12/11 +CVE-2024-2757 - https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq +CVE-2024-27570 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md +CVE-2024-27571 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md +CVE-2024-27572 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md +CVE-2024-27592 - https://medium.com/@nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7 +CVE-2024-27593 - https://blog.smarttecs.com/posts/2024-002-cve-2024-27593/ +CVE-2024-2760 - https://fluidattacks.com/advisories/kent/ +CVE-2024-2761 - https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/ +CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos +CVE-2024-27619 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-27620 - https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html +CVE-2024-27622 - https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html +CVE-2024-27625 - https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html +CVE-2024-27626 - https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html +CVE-2024-27627 - https://packetstormsecurity.com/files/177254/SuperCali-1.1.0-Cross-Site-Scripting.html +CVE-2024-2763 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md +CVE-2024-27630 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 +CVE-2024-27631 - https://github.com/ally-petitt/CVE-2024-27631 +CVE-2024-27631 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 +CVE-2024-27632 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 +CVE-2024-2764 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md +CVE-2024-27665 - https://github.com/Thirukrishnan/CVE-2024-27665/ +CVE-2024-27668 - https://github.com/LY102483/cms/blob/main/1.md +CVE-2024-27680 - https://github.com/xiaolanjing0/cms/blob/main/4.md +CVE-2024-27683 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-27684 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-27689 - https://github.com/Xin246/cms/blob/main/2.md +CVE-2024-27694 - https://github.com/sms2056/cms/blob/main/1.md +CVE-2024-27703 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27703/README.md +CVE-2024-27705 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705 +CVE-2024-27706 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md +CVE-2024-27707 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27707 +CVE-2024-27718 - https://github.com/tldjgggg/cve/blob/main/sql.md +CVE-2024-27719 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002 +CVE-2024-27733 - https://github.com/Sadw11v/cve/blob/main/upload.md +CVE-2024-27734 - https://github.com/sms2056/cms/blob/main/3.md +CVE-2024-27743 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md +CVE-2024-27744 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md +CVE-2024-27746 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md +CVE-2024-27747 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md +CVE-2024-27752 - https://github.com/flyhha/cms/blob/main/1.md +CVE-2024-27757 - https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh +CVE-2024-27758 - https://gist.github.com/renbou/957f70d27470982994f12a1d70153d09 +CVE-2024-27916 - https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37 +CVE-2024-27921 - https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc +CVE-2024-27923 - https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v +CVE-2024-27927 - https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3 +CVE-2024-27932 - https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr +CVE-2024-27933 - https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq +CVE-2024-27934 - https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf +CVE-2024-27935 - https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp +CVE-2024-27936 - https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw +CVE-2024-27938 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide +CVE-2024-2805 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md +CVE-2024-28056 - https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/ +CVE-2024-2806 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md +CVE-2024-28065 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-007.txt +CVE-2024-28066 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt +CVE-2024-2807 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md +CVE-2024-2808 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md +CVE-2024-28085 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt +CVE-2024-28085 - https://www.openwall.com/lists/oss-security/2024/03/27/5 +CVE-2024-28088 - https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md +CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089 +CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC.gif +CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC_DOS_ALT.gif +CVE-2024-2809 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md +CVE-2024-2810 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md +CVE-2024-28102 - https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97 +CVE-2024-28105 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf +CVE-2024-28106 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r +CVE-2024-28107 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r +CVE-2024-28108 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh +CVE-2024-2811 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md +CVE-2024-28116 - https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh +CVE-2024-28117 - https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv +CVE-2024-28118 - https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4 +CVE-2024-28119 - https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58 +CVE-2024-2812 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWriteFacMac.md +CVE-2024-28120 - https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p +CVE-2024-28120 - https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome +CVE-2024-28122 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 +CVE-2024-2813 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md +CVE-2024-2814 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md +CVE-2024-2815 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md +CVE-2024-2816 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md +CVE-2024-2817 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md +CVE-2024-28185 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf +CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-3xpw-36v7-2cmg +CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf +CVE-2024-28192 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm +CVE-2024-28193 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-3782-758f-mj85 +CVE-2024-28194 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827 +CVE-2024-28195 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj +CVE-2024-28196 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq +CVE-2024-2821 - https://vuldb.com/?id.257708 +CVE-2024-28224 - https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224/ +CVE-2024-2823 - https://github.com/lcg-22266/cms/blob/main/1.md +CVE-2024-28231 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w +CVE-2024-28232 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p +CVE-2024-28237 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c +CVE-2024-28239 - https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p +CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip +CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/issues/84 +CVE-2024-28247 - https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x +CVE-2024-28253 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-7vf4-x5m2-r6gr +CVE-2024-28254 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-j86m-rrpr-g8gw +CVE-2024-28255 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-6wx7-qw5p-wh84 +CVE-2024-28275 - https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab +CVE-2024-28286 - https://github.com/mz-automation/libiec61850/issues/496 +CVE-2024-28294 - https://gist.github.com/lx39214/248dc58c6d05455d4bd06c4d3df8e2d0 +CVE-2024-28318 - https://github.com/gpac/gpac/issues/2764 +CVE-2024-28319 - https://github.com/gpac/gpac/issues/2763 +CVE-2024-28320 - https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html +CVE-2024-28320 - https://sospiro014.github.io/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-+-Account-Takeover +CVE-2024-28322 - https://github.com/Sospiro014/zday1/blob/main/event-managment.md +CVE-2024-28322 - https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html +CVE-2024-28323 - https://packetstormsecurity.com/files/177168/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection.html +CVE-2024-28323 - https://sospiro014.github.io/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection +CVE-2024-28325 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Credentials-Stored-in-Cleartext-CVE%E2%80%902024%E2%80%9028325 +CVE-2024-28326 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Privilege-Escalation-CVE%E2%80%902024%E2%80%9028326 +CVE-2024-28327 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Insecure-Credential-Storage-CVE%E2%80%902024%E2%80%9028327 +CVE-2024-28328 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328 +CVE-2024-28335 - https://packetstormsecurity.com/files/177708/Lektor-Static-CMS-3.3.10-Arbitrary-File-Upload-Remote-Code-Execution.html +CVE-2024-28338 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md +CVE-2024-28344 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/ +CVE-2024-28345 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/ +CVE-2024-2836 - https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/ +CVE-2024-2837 - https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/ +CVE-2024-28383 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md +CVE-2024-28417 - https://gitee.com/shavchen214/pwn/issues/I94VFH +CVE-2024-28421 - https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9 +CVE-2024-28421 - https://github.com/cobub/razor/issues/178 +CVE-2024-28429 - https://github.com/itsqian797/cms/blob/main/2.md +CVE-2024-28430 - https://github.com/itsqian797/cms/blob/main/1.md +CVE-2024-28431 - https://github.com/itsqian797/cms/blob/main/3.md +CVE-2024-28432 - https://github.com/itsqian797/cms/blob/main/4.md +CVE-2024-28434 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434 +CVE-2024-28435 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28435 +CVE-2024-28441 - https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md +CVE-2024-28442 - https://medium.com/@deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227 +CVE-2024-28458 - https://github.com/keepinggg/poc/blob/main/poc_of_swfc +CVE-2024-2849 - https://github.com/CveSecLook/cve/issues/1 +CVE-2024-2850 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md +CVE-2024-2851 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md +CVE-2024-28515 - https://github.com/heshi906/CVE-2024-28515 +CVE-2024-2852 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md +CVE-2024-28520 - https://github.com/aknbg1thub/cve/blob/main/upload.md +CVE-2024-2853 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md +CVE-2024-28535 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md +CVE-2024-28537 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md +CVE-2024-2854 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md +CVE-2024-28545 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md +CVE-2024-28547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetFirewallCfg.md +CVE-2024-2855 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md +CVE-2024-28550 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formExpandDlnaFile.md +CVE-2024-28551 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md +CVE-2024-28553 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md +CVE-2024-28556 - https://github.com/xuanluansec/vul/issues/1 +CVE-2024-28557 - https://github.com/xuanluansec/vul/issues/2 +CVE-2024-28558 - https://github.com/xuanluansec/vul/issues/3#issue-2243633522 +CVE-2024-2856 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md +CVE-2024-28562 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28563 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28564 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28565 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28566 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28567 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28568 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28569 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-2857 - https://wpscan.com/vulnerability/b7a35c5b-474a-444a-85ee-c50782c7a6c2/ +CVE-2024-28570 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28571 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28572 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28573 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28574 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28575 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28576 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28577 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28578 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28579 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-2858 - https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a/ +CVE-2024-28580 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28581 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28582 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28583 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28584 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 +CVE-2024-28595 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-28595.md +CVE-2024-28623 - https://github.com/GURJOTEXPERT/ritecms +CVE-2024-28635 - https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt +CVE-2024-28639 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_1.md +CVE-2024-28640 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md +CVE-2024-2866 - https://research.cleantalk.org/cve-2024-2509/ +CVE-2024-2866 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ +CVE-2024-28665 - https://github.com/777erp/cms/blob/main/1.md +CVE-2024-28666 - https://github.com/777erp/cms/blob/main/2.md +CVE-2024-28667 - https://github.com/777erp/cms/blob/main/6.md +CVE-2024-28668 - https://github.com/777erp/cms/blob/main/5.md +CVE-2024-28669 - https://github.com/777erp/cms/blob/main/10.md +CVE-2024-28670 - https://github.com/777erp/cms/blob/main/9.md +CVE-2024-28671 - https://github.com/777erp/cms/blob/main/7.md +CVE-2024-28672 - https://github.com/777erp/cms/blob/main/3.md +CVE-2024-28673 - https://github.com/777erp/cms/blob/main/4.md +CVE-2024-28675 - https://github.com/777erp/cms/blob/main/12.md +CVE-2024-28676 - https://github.com/777erp/cms/blob/main/18.md +CVE-2024-28677 - https://github.com/777erp/cms/blob/main/14.md +CVE-2024-28678 - https://github.com/777erp/cms/blob/main/15.md +CVE-2024-28679 - https://github.com/777erp/cms/blob/main/19.md +CVE-2024-28680 - https://github.com/777erp/cms/blob/main/11.md +CVE-2024-28681 - https://github.com/777erp/cms/blob/main/17.md +CVE-2024-28682 - https://github.com/777erp/cms/blob/main/13.md +CVE-2024-28683 - https://github.com/777erp/cms/blob/main/20.md +CVE-2024-28684 - https://github.com/777erp/cms/blob/main/16.md +CVE-2024-28699 - https://github.com/flexpaper/pdf2json/issues/52 +CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md +CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png +CVE-2024-28715 - https://github.com/Lq0ne/CVE-2024-28715 +CVE-2024-28716 - https://bugs.launchpad.net/solum/+bug/2047505 +CVE-2024-28716 - https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link +CVE-2024-28732 - https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792 +CVE-2024-28734 - https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html +CVE-2024-28735 - https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html +CVE-2024-28736 - https://packetstormsecurity.com/files/178794/Debezium-UI-2.5-Credential-Disclosure.html +CVE-2024-28741 - https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/ +CVE-2024-28741 - https://packetstormsecurity.com/files/177542/NorthStar-C2-Agent-1.0-Cross-Site-Scripting-Remote-Command-Execution.html +CVE-2024-28756 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt +CVE-2024-28816 - https://github.com/AaravRajSIngh/Chatbot/pull/10 +CVE-2024-28823 - https://github.com/awslabs/aws-js-s3-explorer/issues/118 +CVE-2024-28834 - https://minerva.crocs.fi.muni.cz/ +CVE-2024-28847 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-8p5r-6mvv-2435 +CVE-2024-28848 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5xv3-fm7g-865r +CVE-2024-28849 - https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp +CVE-2024-28852 - https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639 +CVE-2024-28853 - https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8 +CVE-2024-28854 - https://en.wikipedia.org/wiki/Slowloris_(computer_security) +CVE-2024-28854 - https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7 +CVE-2024-28859 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r +CVE-2024-28861 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-pv9j-c53q-h433 +CVE-2024-28863 - https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36 +CVE-2024-2891 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md +CVE-2024-2899 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md +CVE-2024-2900 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md +CVE-2024-2901 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md +CVE-2024-29019 - https://github.com/advisories/GHSA-9p43-hj5j-96h5 +CVE-2024-29019 - https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99 +CVE-2024-2902 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md +CVE-2024-29021 - https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr +CVE-2024-29025 - https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v +CVE-2024-29028 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos +CVE-2024-29029 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/ +CVE-2024-2903 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md +CVE-2024-29030 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/ +CVE-2024-29031 - https://securitylab.github.com/advisories/GHSL-2023-249_Meshery/ +CVE-2024-29032 - https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m +CVE-2024-29042 - https://github.com/franciscop/translate/security/advisories/GHSA-882j-4vj5-7vmj +CVE-2024-2907 - https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/ +CVE-2024-2908 - https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/ +CVE-2024-29090 - https://www.vicarius.io/vsociety/posts/chaos-in-the-ai-zoo-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-plugin-by-jordy-meow +CVE-2024-29149 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-010.txt +CVE-2024-29150 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt +CVE-2024-29156 - https://launchpad.net/bugs/2048114 +CVE-2024-29179 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9 +CVE-2024-29180 - https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6 +CVE-2024-29183 - https://securitylab.github.com/advisories/GHSL-2023-253_openrasp +CVE-2024-29186 - https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r +CVE-2024-29187 - https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r +CVE-2024-29190 - https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link +CVE-2024-29190 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-wfgj-wrgh-h3r3 +CVE-2024-29191 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ +CVE-2024-29192 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ +CVE-2024-29193 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/ +CVE-2024-29194 - https://github.com/OneUptime/oneuptime/security/advisories/GHSA-246p-xmg8-wmcq +CVE-2024-29196 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72 +CVE-2024-29197 - https://github.com/pimcore/pimcore/security/advisories/GHSA-5737-rqv4-v445 +CVE-2024-29200 - https://github.com/kimai/kimai/security/advisories/GHSA-cj3c-5xpm-cx94 +CVE-2024-29216 - https://sangomakb.atlassian.net/wiki/spaces/DVC/pages/45351279/Natural+Access+Software+Download +CVE-2024-29271 - https://github.com/givanz/VvvebJs/issues/342 +CVE-2024-29272 - https://github.com/givanz/VvvebJs/issues/343 +CVE-2024-29273 - https://github.com/zyx0814/dzzoffice/issues/244 +CVE-2024-29275 - https://github.com/seacms-net/CMS/issues/15 +CVE-2024-29276 - https://www.cnblogs.com/Rainy-Day/p/18061399 +CVE-2024-29291 - https://gist.github.com/whiteman007/43bd7fa1fa0e47554b33f0cf93066784 +CVE-2024-29296 - https://github.com/ThaySolis/CVE-2024-29296 +CVE-2024-2930 - https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md +CVE-2024-29301 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html +CVE-2024-29302 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html +CVE-2024-29303 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html +CVE-2024-29309 - https://gist.github.com/Siebene/c22e1a4a4a8b61067180475895e60858 +CVE-2024-29316 - https://nodebb.org/bounty/ +CVE-2024-2932 - https://github.com/CveSecLook/cve/issues/3 +CVE-2024-29338 - https://github.com/PWwwww123/cms/blob/main/1.md +CVE-2024-2934 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md +CVE-2024-2935 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md +CVE-2024-29366 - https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md +CVE-2024-29366 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-29368 - https://github.com/becpn/mozilocms +CVE-2024-29374 - https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2 +CVE-2024-29375 - https://github.com/ismailcemunver/CVE-2024-29375 +CVE-2024-29384 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 +CVE-2024-29384 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-29384 +CVE-2024-29385 - https://github.com/songah119/Report/blob/main/CI-1.md +CVE-2024-29385 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-29386 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29386/ +CVE-2024-29387 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29387/ +CVE-2024-29392 - https://gist.github.com/phulelouch/48ee63a7c46078574f3b3dc9a739052c +CVE-2024-29399 - https://github.com/ally-petitt/CVE-2024-29399 +CVE-2024-29400 - https://github.com/Fr1ezy/RuoYi_info +CVE-2024-29401 - https://github.com/menghaining/PoC/blob/main/xzs-mysql/xzs-mysql%20--%20PoC.md +CVE-2024-29402 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 +CVE-2024-29413 - https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413 +CVE-2024-29415 - https://github.com/indutny/node-ip/issues/150 +CVE-2024-29421 - https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md +CVE-2024-2944 - https://vuldb.com/?id.258035 +CVE-2024-29461 - https://gist.github.com/ErodedElk/399a226905c574efe705e3bff77955e3 +CVE-2024-29461 - https://github.com/floodlight/floodlight/issues/867 +CVE-2024-29499 - https://github.com/daddywolf/cms/blob/main/1.md +CVE-2024-29504 - https://github.com/summernote/summernote/pull/3782 +CVE-2024-29513 - https://github.com/dru1d-foofus/briscKernelDriver +CVE-2024-29514 - https://github.com/zzq66/cve6/ +CVE-2024-29515 - https://github.com/zzq66/cve7/ +CVE-2024-2954 - https://blog.sth.sh/wordpress-action-network-1-4-3-authenticated-sql-injection-0-day-01fcd6e89e96 +CVE-2024-2962 - https://gist.github.com/Xib3rR4dAr/ab293092ffcfe3c14a3c7daf5462a50b +CVE-2024-29650 - https://gist.github.com/tariqhawis/1bc340ca5ea6ae115c9ab9665cfd5921 +CVE-2024-29650 - https://learn.snyk.io/lesson/prototype-pollution/#a0a863a5-fd3a-539f-e1ed-a0769f6c6e3b +CVE-2024-29651 - https://gist.github.com/tariqhawis/5db76b38112bba756615b688c32409ad +CVE-2024-29684 - https://github.com/iimiss/cms/blob/main/1.md +CVE-2024-29686 - https://www.exploit-db.com/exploits/51893 +CVE-2024-2972 - https://wpscan.com/vulnerability/27134a4f-a59b-40e9-8fc8-abe1f58672ad/ +CVE-2024-2980 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexeCommand.md +CVE-2024-2981 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/form_fast_setting_wifi_set.md +CVE-2024-2982 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWriteFacMac.md +CVE-2024-2982 - https://vuldb.com/?id.258151 +CVE-2024-2983 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetClientState.md +CVE-2024-2984 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetCfm.md +CVE-2024-2985 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md +CVE-2024-29882 - https://github.com/ossrs/srs/security/advisories/GHSA-gv9r-qcjc-5hj7 +CVE-2024-29894 - https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh +CVE-2024-29894 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 +CVE-2024-29895 - https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m +CVE-2024-29903 - https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv +CVE-2024-29916 - https://unsaflok.com +CVE-2024-29937 - https://www.youtube.com/watch?v=i_JOkHaCdzk +CVE-2024-29972 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ +CVE-2024-29973 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ +CVE-2024-29974 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ +CVE-2024-29975 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ +CVE-2024-29976 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ +CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md +CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md +CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md +CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md +CVE-2024-3004 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md +CVE-2024-3011 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md +CVE-2024-3012 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md +CVE-2024-30162 - http://seclists.org/fulldisclosure/2024/Apr/21 +CVE-2024-30163 - http://seclists.org/fulldisclosure/2024/Apr/20 +CVE-2024-3024 - https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing +CVE-2024-30248 - https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83 +CVE-2024-30252 - https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg +CVE-2024-30257 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f +CVE-2024-30258 - https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing +CVE-2024-30258 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh +CVE-2024-30259 - https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing +CVE-2024-30259 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 +CVE-2024-30264 - https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73 +CVE-2024-30268 - https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q +CVE-2024-30406 - https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html +CVE-2024-3048 - https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/ +CVE-2024-3050 - https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/ +CVE-2024-30564 - https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c +CVE-2024-30568 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ping_test).md +CVE-2024-30572 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ntp_server).md +CVE-2024-3058 - https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/ +CVE-2024-30583 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_mitInterface.md +CVE-2024-30584 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security.md +CVE-2024-30585 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_deviceId.md +CVE-2024-30586 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security_5g.md +CVE-2024-30587 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md +CVE-2024-30588 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_start.md +CVE-2024-30589 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_entrys.md +CVE-2024-3059 - https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/ +CVE-2024-30590 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_end.md +CVE-2024-30591 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md +CVE-2024-30592 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_page.md +CVE-2024-30593 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_devName.md +CVE-2024-30594 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceMac.md +CVE-2024-30595 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceId.md +CVE-2024-30596 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_deviceId.md +CVE-2024-30597 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md +CVE-2024-30598 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md +CVE-2024-30599 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md +CVE-2024-3060 - https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ +CVE-2024-30600 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md +CVE-2024-30601 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md +CVE-2024-30602 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md +CVE-2024-30603 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md +CVE-2024-30604 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md +CVE-2024-30606 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_page.md +CVE-2024-30607 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_deviceId.md +CVE-2024-30612 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md +CVE-2024-30613 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/setSmartPowerManagement.md +CVE-2024-30620 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serviceName_parameter_in_the_function_fromAdvSetMacMtuWan.md +CVE-2024-30621 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serverName_parameter_in_the_function_fromAdvSetMacMtuWan.md +CVE-2024-30622 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md +CVE-2024-30623 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md +CVE-2024-30624 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md +CVE-2024-30625 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_entrys.md +CVE-2024-30626 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_end.md +CVE-2024-30627 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_deviceId.md +CVE-2024-30628 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_page.md +CVE-2024-30629 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_list1.md +CVE-2024-30630 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_time.md +CVE-2024-30631 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_start.md +CVE-2024-30632 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security_5g.md +CVE-2024-30633 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security.md +CVE-2024-30634 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_mitInterface.md +CVE-2024-30635 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md +CVE-2024-30636 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formQuickIndex.md +CVE-2024-30637 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formWriteFacMac.md +CVE-2024-30638 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_entrys.md +CVE-2024-30639 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_page.md +CVE-2024-30645 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/setUsbUnload.md +CVE-2024-3075 - https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/ +CVE-2024-3076 - https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/ +CVE-2024-30802 - https://github.com/WarmBrew/web_vul/blob/main/TTX.md +CVE-2024-30807 - https://github.com/axiomatic-systems/Bento4/issues/937 +CVE-2024-30808 - https://github.com/axiomatic-systems/Bento4/issues/937 +CVE-2024-30809 - https://github.com/axiomatic-systems/Bento4/issues/937 +CVE-2024-30840 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md +CVE-2024-30845 - https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66 +CVE-2024-30845 - https://github.com/netcccyun/pan/issues/6 +CVE-2024-30849 - https://github.com/wkeyi0x1/vul-report/issues/3 +CVE-2024-30850 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/ +CVE-2024-30851 - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc +CVE-2024-30862 - https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md +CVE-2024-30878 - https://github.com/jianyan74/rageframe2/issues/111 +CVE-2024-30879 - https://github.com/jianyan74/rageframe2/issues/114 +CVE-2024-30880 - https://github.com/jianyan74/rageframe2/issues/114 +CVE-2024-30883 - https://github.com/jianyan74/rageframe2/issues/114 +CVE-2024-30884 - https://github.com/Hebing123/cve/issues/28 +CVE-2024-30885 - https://github.com/Hebing123/cve/issues/29 +CVE-2024-30886 - https://github.com/Hebing123/cve/issues/30 +CVE-2024-30889 - https://github.com/robymontyz/pocs/blob/main/AudimexEE/ReflectedXSS.md +CVE-2024-3089 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md +CVE-2024-3089 - https://vuldb.com/?submit.306963 +CVE-2024-30891 - https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md +CVE-2024-30915 - https://github.com/OpenDDS/OpenDDS/issues/4527 +CVE-2024-3093 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/ +CVE-2024-30938 - https://github.com/lampSEC/semcms/blob/main/semcms.md +CVE-2024-30939 - https://medium.com/@deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad +CVE-2024-3094 - http://www.openwall.com/lists/oss-security/2024/04/16/5 +CVE-2024-3094 - https://lwn.net/Articles/967180/ +CVE-2024-3094 - https://news.ycombinator.com/item?id=39895344 +CVE-2024-3094 - https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils +CVE-2024-3094 - https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094 +CVE-2024-30946 - https://github.com/testgo1safe/cms/blob/main/1.md +CVE-2024-30950 - https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md +CVE-2024-30952 - https://github.com/CrownZTX/vulnerabilities/blob/main/pescms/stored_xss.md +CVE-2024-30953 - https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md +CVE-2024-3096 - http://www.openwall.com/lists/oss-security/2024/04/12/11 +CVE-2024-3096 - https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr +CVE-2024-30965 - https://github.com/Fishkey1/cms/commit/e9d294951ab2dd85709f1d12ad4747f25d326b1b +CVE-2024-30973 - https://github.com/Athos-Zago/CVE-2024-30973/tree/main +CVE-2024-30979 - https://medium.com/@shanunirwan/cve-2024-30979-stored-cross-site-scripting-xss-in-cyber-cafe-management-system-project-ccms-1-44b10f50817b +CVE-2024-30980 - https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7 +CVE-2024-30981 - https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb +CVE-2024-30985 - https://medium.com/@shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062 +CVE-2024-30986 - https://medium.com/@shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510 +CVE-2024-30987 - https://medium.com/@shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254 +CVE-2024-30988 - https://medium.com/@shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23 +CVE-2024-30989 - https://medium.com/@shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6 +CVE-2024-30990 - https://medium.com/@shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761 +CVE-2024-30998 - https://github.com/efekaanakkar/CVEs/blob/main/PHPGurukul-Men-Salon-Management-System-2.0.md +CVE-2024-31002 - https://github.com/axiomatic-systems/Bento4/issues/939 +CVE-2024-31003 - https://github.com/axiomatic-systems/Bento4/issues/939 +CVE-2024-31004 - https://github.com/axiomatic-systems/Bento4/issues/941 +CVE-2024-31005 - https://github.com/axiomatic-systems/Bento4/issues/941 +CVE-2024-31008 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20(logic%20vulnerability).md +CVE-2024-31009 - https://github.com/ss122-0ss/semcms/blob/main/README.md +CVE-2024-31010 - https://github.com/ss122-0ss/semcms/blob/main/README.md +CVE-2024-31047 - https://github.com/AcademySoftwareFoundation/openexr/issues/1680 +CVE-2024-31061 - https://github.com/sahildari/cve/blob/master/CVE-2024-31061.md +CVE-2024-31061 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-31062 - https://github.com/sahildari/cve/blob/master/CVE-2024-31062.md +CVE-2024-31062 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-31063 - https://github.com/sahildari/cve/blob/master/CVE-2024-31063.md +CVE-2024-31063 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-31064 - https://github.com/sahildari/cve/blob/master/CVE-2024-31064.md +CVE-2024-31065 - https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md +CVE-2024-31065 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-3118 - https://vuldb.com/?id.258779 +CVE-2024-31212 - https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw +CVE-2024-31213 - https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq +CVE-2024-31214 - https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9 +CVE-2024-3124 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md +CVE-2024-3124 - https://vuldb.com/?submit.307752 +CVE-2024-3125 - https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md +CVE-2024-3128 - https://github.com/ctflearner/Android_Findings/blob/main/Replify-Messenger/Backup.md +CVE-2024-3128 - https://vuldb.com/?submit.307761 +CVE-2024-3129 - https://github.com/Sospiro014/zday1/blob/main/Image_Accordion_Gallery.md +CVE-2024-3131 - https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md +CVE-2024-31380 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve +CVE-2024-31380 - https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1 +CVE-2024-31380 - https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1?_s_id=cve +CVE-2024-3139 - https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md +CVE-2024-31390 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve +CVE-2024-31390 - https://snicco.io/vulnerability-disclosure/breakdance/client-mode-remote-code-execution-breakdance-1-7-0?_s_id=cve +CVE-2024-31390 - https://www.youtube.com/watch?v=9glx54-LfRE +CVE-2024-3140 - https://github.com/Sospiro014/zday1/blob/main/xss_1.md +CVE-2024-3141 - https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md +CVE-2024-3142 - https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md +CVE-2024-3144 - https://github.com/Hckwzh/cms/blob/main/12.md +CVE-2024-31443 - https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3 +CVE-2024-31444 - https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87 +CVE-2024-31445 - https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc +CVE-2024-3145 - https://github.com/Hckwzh/cms/blob/main/13.md +CVE-2024-3145 - https://vuldb.com/?id.258920 +CVE-2024-31453 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-xg8v-m2mh-45m6 +CVE-2024-31454 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-2p2x-p7wj-j5h2 +CVE-2024-31457 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4 +CVE-2024-31458 - https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x +CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv +CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r +CVE-2024-3146 - https://github.com/Hckwzh/cms/blob/main/14.md +CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv +CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r +CVE-2024-3147 - https://github.com/Hckwzh/cms/blob/main/15.md +CVE-2024-31497 - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/ +CVE-2024-31497 - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/ +CVE-2024-31502 - https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md +CVE-2024-31506 - https://github.com/CveSecLook/cve/issues/4 +CVE-2024-31507 - https://github.com/CveSecLook/cve/issues/6 +CVE-2024-31510 - https://github.com/liang-junkai/Fault-injection-of-ML-DSA +CVE-2024-3154 - https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j +CVE-2024-31544 - https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md +CVE-2024-31545 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Computer-Laboratory-Management-System-PoC.md +CVE-2024-31546 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md +CVE-2024-31547 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md +CVE-2024-31581 - https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048 +CVE-2024-31610 - https://github.com/ss122-0ss/School/blob/main/readme.md +CVE-2024-31616 - https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883 +CVE-2024-31621 - https://www.exploit-db.com/exploits/52001 +CVE-2024-31636 - https://github.com/lief-project/LIEF/issues/1038 +CVE-2024-31648 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31648.md +CVE-2024-31649 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31649.md +CVE-2024-31650 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31650.md +CVE-2024-31651 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31651.md +CVE-2024-31652 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md +CVE-2024-31678 - https://github.com/CveSecLook/cve/issues/10 +CVE-2024-31680 - https://github.com/heidashuai5588/cve/blob/main/upload.md +CVE-2024-31705 - https://github.com/V3locidad/GLPI_POC_Plugins_Shell +CVE-2024-31705 - https://seclists.org/fulldisclosure/2024/Apr/23 +CVE-2024-31744 - https://github.com/jasper-software/jasper/issues/381 +CVE-2024-31747 - https://medium.com/@deepsahu1/yealink-vp59-microsoft-teams-phone-lock-bypass-b7fee9dd9c8c +CVE-2024-31755 - https://github.com/DaveGamble/cJSON/issues/839 +CVE-2024-31759 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 +CVE-2024-31759 - https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md +CVE-2024-31760 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 +CVE-2024-31760 - https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md +CVE-2024-31804 - https://www.exploit-db.com/exploits/51977 +CVE-2024-31819 - https://chocapikk.com/posts/2024/cve-2024-31819/ +CVE-2024-31819 - https://github.com/Chocapikk/CVE-2024-31819 +CVE-2024-31839 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/ +CVE-2024-31840 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31841 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31843 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31844 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31845 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31846 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31847 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2024-31848 - https://www.tenable.com/security/research/tra-2024-09 +CVE-2024-31849 - https://www.tenable.com/security/research/tra-2024-09 +CVE-2024-31850 - https://www.tenable.com/security/research/tra-2024-09 +CVE-2024-31852 - https://github.com/llvm/llvm-project/issues/80287 +CVE-2024-3188 - https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/ +CVE-2024-31989 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr +CVE-2024-32019 - https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93 +CVE-2024-32022 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss +CVE-2024-32023 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss +CVE-2024-32024 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss +CVE-2024-32025 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss +CVE-2024-32026 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss +CVE-2024-32027 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss +CVE-2024-3203 - https://vuldb.com/?submit.304556 +CVE-2024-3204 - https://vuldb.com/?submit.304557 +CVE-2024-3205 - https://vuldb.com/?submit.304561 +CVE-2024-3207 - https://vuldb.com/?submit.304572 +CVE-2024-32163 - https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md +CVE-2024-32166 - https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md +CVE-2024-3218 - https://github.com/garboa/cve_3/blob/main/file_put_content.md +CVE-2024-32206 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md +CVE-2024-32254 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md +CVE-2024-32256 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md +CVE-2024-32258 - https://github.com/TASEmulators/fceux/issues/727 +CVE-2024-32258 - https://github.com/liyansong2018/CVE-2024-32258 +CVE-2024-32282 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexecommand_cmdi.md +CVE-2024-32283 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formexecommand_cmdi.md +CVE-2024-32285 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md +CVE-2024-32286 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromVirtualSer.md +CVE-2024-32287 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromqossetting.md +CVE-2024-32288 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromwebExcptypemanFilter.md +CVE-2024-32290 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromAddressNat_page.md +CVE-2024-32291 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromNatlimit.md +CVE-2024-32292 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formexecommand_cmdi.md +CVE-2024-32293 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromDhcpListClient_page.md +CVE-2024-32299 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromWizardHandle.md +CVE-2024-32301 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromWizardHandle.md +CVE-2024-32302 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromWizardHandle.md +CVE-2024-32303 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromWizardHandle.md +CVE-2024-32305 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromWizardHandle.md +CVE-2024-32306 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/fromWizardHandle.md +CVE-2024-32307 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromWizardHandle.md +CVE-2024-3231 - https://wpscan.com/vulnerability/81dbb5c0-ccdd-4af1-b2f2-71cb1b37fe93/ +CVE-2024-32310 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/fromWizardHandle.md +CVE-2024-32311 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWanParameterSetting.md +CVE-2024-32312 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/formWanParameterSetting.md +CVE-2024-32313 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWanParameterSetting.md +CVE-2024-32314 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md +CVE-2024-32315 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWanParameterSetting.md +CVE-2024-32316 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md +CVE-2024-32317 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md +CVE-2024-32318 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromSetVlanInfo_vlan.md +CVE-2024-32320 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetTimeZone.md +CVE-2024-32337 - https://github.com/adiapera/xss_security_wondercms_3.4.3 +CVE-2024-32338 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 +CVE-2024-32339 - https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3 +CVE-2024-32340 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 +CVE-2024-32341 - https://github.com/adiapera/xss_home_page_wondercms_3.4.3 +CVE-2024-32342 - https://github.com/adiapera/xss_create_boidcms_2.1.0 +CVE-2024-32343 - https://github.com/adiapera/xss_create2_boidcms_2.1.0 +CVE-2024-32344 - https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md +CVE-2024-32345 - https://github.com/adiapera/xss_language_cmsimple_5.15 +CVE-2024-32359 - https://github.com/HouqiyuA/k8s-rbac-poc +CVE-2024-3239 - https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ +CVE-2024-32391 - https://github.com/magicblack/maccms10/issues/1133 +CVE-2024-32392 - https://github.com/Hebing123/cve/issues/33 +CVE-2024-32394 - https://gist.github.com/Swind1er/7aad5c28e5bdc91d73fa7489b7250c94 +CVE-2024-32399 - https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md +CVE-2024-32404 - https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt +CVE-2024-32405 - https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html +CVE-2024-32405 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-32406 - https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html +CVE-2024-3241 - https://wpscan.com/vulnerability/a645daee-42ea-43f8-9480-ef3be69606e0/ +CVE-2024-32461 - https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34 +CVE-2024-32467 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp +CVE-2024-3247 - https://forum.xpdfreader.com/viewtopic.php?t=43597 +CVE-2024-32472 - https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f +CVE-2024-32477 - https://github.com/denoland/deno/security/advisories/GHSA-95cj-3hr2-7j5j +CVE-2024-32479 - https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw +CVE-2024-3248 - https://forum.xpdfreader.com/viewtopic.php?t=43657 +CVE-2024-32480 - https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438 +CVE-2024-32481 - https://github.com/vyperlang/vyper/security/advisories/GHSA-ppx5-q359-pvwj +CVE-2024-3251 - https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md +CVE-2024-3255 - https://vuldb.com/?id.259104 +CVE-2024-3261 - https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/ +CVE-2024-32645 - https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 +CVE-2024-32646 - https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m +CVE-2024-32648 - https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9 +CVE-2024-32649 - https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h +CVE-2024-3265 - https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ +CVE-2024-32650 - https://github.com/rustls/rustls/security/advisories/GHSA-6g7w-8wpp-frhj +CVE-2024-32651 - https://blog.hacktivesecurity.com/index.php/2024/05/08/cve-2024-32651-server-side-template-injection-changedetection-io/ +CVE-2024-32651 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3 +CVE-2024-32652 - https://github.com/honojs/node-server/issues/159 +CVE-2024-32653 - https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm +CVE-2024-32735 - https://www.tenable.com/security/research/tra-2024-14 +CVE-2024-32736 - https://www.tenable.com/security/research/tra-2024-14 +CVE-2024-32737 - https://www.tenable.com/security/research/tra-2024-14 +CVE-2024-32738 - https://www.tenable.com/security/research/tra-2024-14 +CVE-2024-32739 - https://www.tenable.com/security/research/tra-2024-14 +CVE-2024-32743 - https://github.com/adiapera/xss_security_wondercms_3.4.3 +CVE-2024-32744 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 +CVE-2024-32745 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 +CVE-2024-32746 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 +CVE-2024-3281 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt +CVE-2024-32866 - https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf +CVE-2024-32869 - https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347 +CVE-2024-32876 - https://github.com/TeamNewPipe/NewPipe/security/advisories/GHSA-wxrm-jhpf-vp6v +CVE-2024-32878 - https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-p5mv-gjc5-mwqv +CVE-2024-3288 - https://wpscan.com/vulnerability/4ef99f54-68df-4353-8fc0-9b09ac0df7ba/ +CVE-2024-32880 - https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f +CVE-2024-32881 - https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j +CVE-2024-32884 - https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh +CVE-2024-32884 - https://rustsec.org/advisories/RUSTSEC-2024-0335.html +CVE-2024-32886 - https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2 +CVE-2024-32890 - https://github.com/librespeed/speedtest/security/advisories/GHSA-3954-xrwh-fq4q +CVE-2024-32962 - https://github.com/node-saml/xml-crypto/security/advisories/GHSA-2xp3-57p7-qf4v +CVE-2024-32963 - https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm +CVE-2024-32964 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc +CVE-2024-32970 - https://github.com/payloadbox/xss-payload-list +CVE-2024-32977 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7 +CVE-2024-32982 - https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf +CVE-2024-33101 - https://github.com/thinksaas/ThinkSAAS/issues/34 +CVE-2024-33102 - https://github.com/thinksaas/ThinkSAAS/issues/35 +CVE-2024-33103 - https://github.com/dokuwiki/dokuwiki/issues/4267 +CVE-2024-33110 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md +CVE-2024-33111 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md +CVE-2024-33112 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md +CVE-2024-33113 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md +CVE-2024-3322 - https://github.com/parisneo/lollms-webui/commit/1e17df01e01d4d33599db2afaafe91d90b6f0189 +CVE-2024-33247 - https://github.com/CveSecLook/cve/issues/11 +CVE-2024-33250 - https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md +CVE-2024-33255 - https://github.com/jerryscript-project/jerryscript/issues/5135 +CVE-2024-33258 - https://github.com/jerryscript-project/jerryscript/issues/5114 +CVE-2024-33259 - https://github.com/jerryscript-project/jerryscript/issues/5132 +CVE-2024-33260 - https://github.com/jerryscript-project/jerryscript/issues/5133 +CVE-2024-33263 - https://github.com/bellard/quickjs/issues/277 +CVE-2024-33266 - https://security.friendsofpresta.org/modules/2024/04/25/deliveryorderautoupdate.html +CVE-2024-33272 - https://security.friendsofpresta.org/modules/2024/04/25/autosuggest.html +CVE-2024-33294 - https://github.com/CveSecLook/cve/issues/16 +CVE-2024-33302 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33302.md +CVE-2024-33302 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-33303 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33303.md +CVE-2024-33304 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md +CVE-2024-33305 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md +CVE-2024-33306 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33306.md +CVE-2024-33307 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33307.md +CVE-2024-33332 - https://github.com/wy876/cve/issues/3 +CVE-2024-33338 - https://github.com/7akahash1/POC/blob/main/1.md +CVE-2024-33345 - https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware +CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md +CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ +CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc +CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15 +CVE-2024-33424 - https://github.com/adiapera/xss_language_cmsimple_5.15 +CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png +CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md +CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc +CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1 +CVE-2024-33428 - https://github.com/stsaz/phiola/issues/29 +CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png +CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md +CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/poc/ +CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2 +CVE-2024-33429 - https://github.com/stsaz/phiola/issues/30 +CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5 +CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png +CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md +CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1 +CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc +CVE-2024-33430 - https://github.com/stsaz/phiola/issues/28 +CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png +CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md +CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G +CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1 +CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc +CVE-2024-33431 - https://github.com/stsaz/phiola/issues/27 +CVE-2024-33435 - https://github.com/vulreport3r/cve-reports/blob/main/Ncast_Yingshi_has_RCE_vulnerabilities/report.md +CVE-2024-33436 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 +CVE-2024-33436 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33436 +CVE-2024-33437 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41 +CVE-2024-33437 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33437 +CVE-2024-33438 - https://github.com/julio-cfa/CVE-2024-33438 +CVE-2024-33443 - https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 +CVE-2024-33443 - https://github.com/liu21st/onethink/issues/40 +CVE-2024-33444 - https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152 +CVE-2024-33444 - https://github.com/liu21st/onethink/issues/39 +CVE-2024-33445 - https://gist.github.com/LioTree/04a4ece38df53af4027d52b2aeb7aff6 +CVE-2024-33445 - https://github.com/hisiphp/hisiphp/issues/11 +CVE-2024-3346 - https://github.com/Yu1e/vuls/blob/main/Byzro%20Networks%20Smart%20S80%20management%20platform%20has%20rce%20vulnerability.md +CVE-2024-33485 - https://github.com/CveSecLook/cve/issues/17 +CVE-2024-33525 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ +CVE-2024-33526 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ +CVE-2024-33527 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ +CVE-2024-33528 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ +CVE-2024-33529 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/ +CVE-2024-33530 - https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/ +CVE-2024-33655 - https://gitlab.isc.org/isc-projects/bind9/-/issues/4398 +CVE-2024-33655 - https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/ +CVE-2024-3366 - https://github.com/xuxueli/xxl-job/issues/3391 +CVE-2024-33664 - https://github.com/mpdavis/python-jose/issues/344 +CVE-2024-33669 - https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html +CVE-2024-33669 - https://help.passbolt.com/incidents/pwned-password-service-information-leak +CVE-2024-3368 - https://wpscan.com/vulnerability/ab78b1a5-e28c-406b-baaf-6d53017f9328/ +CVE-2024-3376 - https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md +CVE-2024-33763 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg +CVE-2024-33764 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg +CVE-2024-33766 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg +CVE-2024-33767 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg +CVE-2024-33768 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg +CVE-2024-3377 - https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md +CVE-2024-33771 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md +CVE-2024-33772 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md +CVE-2024-33773 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md +CVE-2024-33774 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md +CVE-2024-3378 - https://vuldb.com/?submit.310642 +CVE-2024-33788 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788 +CVE-2024-33789 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789 +CVE-2024-33792 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 +CVE-2024-33793 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793 +CVE-2024-33809 - https://github.com/pingcap/tidb/issues/52159 +CVE-2024-33820 - https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 +CVE-2024-33829 - https://github.com/xyaly163/cms/blob/main/1.md +CVE-2024-33830 - https://github.com/xyaly163/cms/blob/main/2.md +CVE-2024-33831 - https://github.com/YMFE/yapi/issues/2745 +CVE-2024-33832 - https://github.com/helloxz/onenav/issues/186 +CVE-2024-33835 - https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md +CVE-2024-33891 - https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3 +CVE-2024-33899 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 +CVE-2024-33900 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 +CVE-2024-33901 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 +CVE-2024-33905 - https://medium.com/@pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90 +CVE-2024-3400 - https://security.paloaltonetworks.com/CVE-2024-3400 +CVE-2024-3400 - https://unit42.paloaltonetworks.com/cve-2024-3400/ +CVE-2024-34020 - https://bugzilla.suse.com/show_bug.cgi?id=1223534 +CVE-2024-3405 - https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/ +CVE-2024-34051 - https://blog.smarttecs.com/posts/2024-004-cve-2024-34051/ +CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3 +CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/ +CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67 +CVE-2024-34063 - https://github.com/matrix-org/vodozemac/commit/297548cad4016ce448c4b5007c54db7ee39489d9 +CVE-2024-3407 - https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/ +CVE-2024-34070 - https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53 +CVE-2024-34075 - https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr +CVE-2024-34082 - https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69 +CVE-2024-34196 - https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1 +CVE-2024-34199 - https://github.com/DMCERTCE/PoC_Tiny_Overflow +CVE-2024-34200 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules +CVE-2024-34201 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig +CVE-2024-34202 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules +CVE-2024-34203 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg +CVE-2024-34204 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW +CVE-2024-34206 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx +CVE-2024-34207 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setStaticDhcpConfig +CVE-2024-34209 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules +CVE-2024-34210 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection +CVE-2024-34212 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_overflow +CVE-2024-34213 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetPortForwardRules +CVE-2024-34215 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules +CVE-2024-34217 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode +CVE-2024-34218 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost +CVE-2024-34219 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg +CVE-2024-3422 - https://vuldb.com/?id.259594 +CVE-2024-34220 - https://github.com/dovankha/CVE-2024-34220 +CVE-2024-34221 - https://github.com/dovankha/CVE-2024-34221 +CVE-2024-34222 - https://github.com/dovankha/CVE-2024-34222 +CVE-2024-34223 - https://github.com/dovankha/CVE-2024-34223 +CVE-2024-34224 - https://github.com/dovankha/CVE-2024-34224 +CVE-2024-34225 - https://github.com/dovankha/CVE-2024-34225 +CVE-2024-34226 - https://github.com/dovankha/CVE-2024-34226 +CVE-2024-34230 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md +CVE-2024-34231 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md +CVE-2024-34246 - https://github.com/wasm3/wasm3/issues/484 +CVE-2024-34249 - https://github.com/wasm3/wasm3/issues/485 +CVE-2024-34250 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346 +CVE-2024-34251 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347 +CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483 +CVE-2024-34257 - https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md +CVE-2024-34273 - https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md +CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md +CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m +CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 +CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 +CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 +CVE-2024-34347 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr +CVE-2024-34352 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 +CVE-2024-34359 - https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829 +CVE-2024-34362 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-hww5-43gv-35jv +CVE-2024-34363 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-g979-ph9j-5gg4 +CVE-2024-3437 - https://vuldb.com/?id.259631 +CVE-2024-34391 - https://github.com/libxmljs/libxmljs/issues/645 +CVE-2024-34391 - https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/ +CVE-2024-34392 - https://github.com/libxmljs/libxmljs/issues/646 +CVE-2024-34392 - https://research.jfrog.com/vulnerabilities/libxmljs-namespaces-type-confusion-rce-jfsa-2024-001034096/ +CVE-2024-34393 - https://github.com/marudor/libxmljs2/issues/204 +CVE-2024-34393 - https://research.jfrog.com/vulnerabilities/libxmljs2-attrs-type-confusion-rce-jfsa-2024-001034097/ +CVE-2024-34394 - https://github.com/marudor/libxmljs2/issues/205 +CVE-2024-34394 - https://research.jfrog.com/vulnerabilities/libxmljs2-namespaces-type-confusion-rce-jfsa-2024-001034098/ +CVE-2024-34397 - https://gitlab.gnome.org/GNOME/glib/-/issues/3268 +CVE-2024-34401 - https://www.exploit-db.com/exploits/51988 +CVE-2024-34408 - https://github.com/Tencent/libpag/issues/2230 +CVE-2024-3442 - https://vuldb.com/?id.259695 +CVE-2024-3443 - https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md +CVE-2024-34448 - https://github.com/phulelouch/CVEs/blob/main/CVE-2024-34448.md +CVE-2024-3445 - https://vuldb.com/?id.259702 +CVE-2024-34467 - https://github.com/top-think/framework/issues/2996 +CVE-2024-34470 - https://github.com/osvaldotenorio/CVE-2024-34470 +CVE-2024-34471 - https://github.com/osvaldotenorio/CVE-2024-34471 +CVE-2024-34472 - https://github.com/osvaldotenorio/CVE-2024-34472 +CVE-2024-34473 - https://jira.o-ran-sc.org/browse/RIC-1055 +CVE-2024-34478 - https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455 +CVE-2024-34483 - https://github.com/faucetsdn/ryu/issues/193 +CVE-2024-34484 - https://github.com/faucetsdn/ryu/issues/194 +CVE-2024-34486 - https://github.com/faucetsdn/ryu/issues/190 +CVE-2024-34487 - https://github.com/faucetsdn/ryu/issues/192 +CVE-2024-34488 - https://github.com/faucetsdn/ryu/issues/191 +CVE-2024-34489 - https://github.com/faucetsdn/ryu/issues/195 +CVE-2024-34515 - https://github.com/spatie/image-optimizer/issues/210 +CVE-2024-34523 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md +CVE-2024-34532 - https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe +CVE-2024-34533 - https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data +CVE-2024-34534 - https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander +CVE-2024-34582 - https://github.com/silent6trinity/CVE-2024-34582 +CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/ +CVE-2024-34710 - https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf +CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v +CVE-2024-34715 - https://github.com/ethyca/fides/security/advisories/GHSA-8cm5-jfj2-26q7 +CVE-2024-3472 - https://wpscan.com/vulnerability/d42f74dd-520f-40aa-9cf0-3544db9562c7/ +CVE-2024-3474 - https://wpscan.com/vulnerability/e5c3e145-6738-4d85-8507-43ca1b1d5877/ +CVE-2024-3475 - https://wpscan.com/vulnerability/bf540242-5306-4c94-ad50-782d0d5b127f/ +CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db64ccd/ +CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/ +CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/ +CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/ +CVE-2024-34852 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md +CVE-2024-34854 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md +CVE-2024-34899 - https://hackerdna.com/courses/cve/cve-2024-34899 +CVE-2024-34905 - https://github.com/CloudWise-OpenSource/FlyFish/issues/191 +CVE-2024-34906 - https://github.com/kuaifan/dootask/issues/210 +CVE-2024-34914 - https://chmod744.super.site/redacted-vulnerability +CVE-2024-34919 - https://github.com/CveSecLook/cve/issues/20 +CVE-2024-34921 - https://github.com/cainiao159357/x5000r_poc/blob/main/README.md +CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.assets/debug-coredump.png +CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.md +CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/poc/I1DWE0~U +CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata +CVE-2024-34952 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata/poc +CVE-2024-34952 - https://github.com/taurusxin/ncmdump/issues/18 +CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png +CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.md +CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/poc/I7K9QM~F +CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted +CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted/poc +CVE-2024-34953 - https://github.com/taurusxin/ncmdump/issues/19 +CVE-2024-34954 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md +CVE-2024-34955 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md +CVE-2024-34957 - https://github.com/Gr-1m/cms/blob/main/1.md +CVE-2024-34958 - https://github.com/Gr-1m/cms/blob/main/2.md +CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer +CVE-2024-34987 - https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md +CVE-2024-34997 - https://github.com/joblib/joblib/issues/1582 +CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md +CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md +CVE-2024-35011 - https://github.com/Thirtypenny77/cms/blob/main/8.md +CVE-2024-35012 - https://github.com/Thirtypenny77/cms/blob/main/7.md +CVE-2024-35039 - https://github.com/ywf7678/cms/blob/main/1.md +CVE-2024-35048 - https://github.com/javahuang/SurveyKing/issues/56 +CVE-2024-35049 - https://github.com/javahuang/SurveyKing/issues/55 +CVE-2024-35050 - https://github.com/javahuang/SurveyKing/issues/57 +CVE-2024-35099 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md +CVE-2024-35108 - https://github.com/FirstLIF/cms/blob/main/1.md +CVE-2024-35109 - https://github.com/FirstLIF/cms/blob/main/2.md +CVE-2024-35110 - https://github.com/yzmcms/yzmcms/issues/68 +CVE-2024-35175 - https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52 +CVE-2024-35179 - https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-5pfx-j27j-4c6h +CVE-2024-35181 - https://securitylab.github.com/advisories/GHSL-2024-013_GHSL-2024-014_Meshery/ +CVE-2024-35182 - https://securitylab.github.com/advisories/GHSL-2024-013_GHSL-2024-014_Meshery/ +CVE-2024-35183 - https://github.com/wolfi-dev/wolfictl/security/advisories/GHSA-8fg7-hp93-qhvr +CVE-2024-35186 - https://github.com/Byron/gitoxide/security/advisories/GHSA-7w47-3wg8-547c +CVE-2024-35187 - https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-rwp5-f854-ppg6 +CVE-2024-35189 - https://github.com/ethyca/fides/security/advisories/GHSA-rcvg-jj3g-rj7c +CVE-2024-35190 - https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 +CVE-2024-35196 - https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307 +CVE-2024-35197 - https://github.com/Byron/gitoxide/security/advisories/GHSA-49jc-r788-3fc9 +CVE-2024-3521 - https://github.com/garboa/cve_3/blob/main/Upload2.md +CVE-2024-35222 - https://github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7 +CVE-2024-35231 - https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869 +CVE-2024-35232 - https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr +CVE-2024-35236 - https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-7j99-76cj-q9pg +CVE-2024-3529 - https://vuldb.com/?id.259899 +CVE-2024-35324 - https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md +CVE-2024-35333 - https://github.com/momo1239/CVE-2024-35333 +CVE-2024-35361 - https://github.com/Hebing123/cve/issues/37 +CVE-2024-35362 - https://github.com/shopex/ecshop/issues/6 +CVE-2024-35373 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ +CVE-2024-35374 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ +CVE-2024-35384 - https://github.com/cesanta/mjs/issues/287 +CVE-2024-35385 - https://github.com/cesanta/mjs/issues/288 +CVE-2024-35386 - https://github.com/cesanta/mjs/issues/286 +CVE-2024-35387 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/loginAuth_http_host/README.md +CVE-2024-35388 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20NR1800X/README.md +CVE-2024-35398 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/setMacFilterRules/README.md +CVE-2024-35399 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/loginAuth/README.md +CVE-2024-35400 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/SetPortForwardRules/README.md +CVE-2024-35403 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/setIpPortFilterRules/README.md +CVE-2024-35428 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35428.md +CVE-2024-35429 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35429.md +CVE-2024-35430 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35430.md +CVE-2024-35431 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35431.md +CVE-2024-35432 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35432.md +CVE-2024-35433 - https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35433.md +CVE-2024-35434 - https://github.com/inputzero/Security-Advisories/blob/main/CVE-XXXX-XXXX.md +CVE-2024-35468 - https://github.com/dovankha/CVE-2024-35468 +CVE-2024-35469 - https://github.com/dovankha/CVE-2024-35469 +CVE-2024-35475 - https://github.com/carsonchan12345/CVE-2024-35475 +CVE-2024-35475 - https://github.com/carsonchan12345/OpenKM-CSRF-PoC +CVE-2024-3548 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/ +CVE-2024-35492 - https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Mongoose_null_pointer.md +CVE-2024-35511 - https://github.com/efekaanakkar/CVE-2024-35511/blob/main/Men%20Salon%20Management%20System%20Using%20PHP%20and%20MySQL.md +CVE-2024-35550 - https://github.com/bearman113/1.md/blob/main/17/csrf.md +CVE-2024-35551 - https://github.com/bearman113/1.md/blob/main/16/csrf.md +CVE-2024-35552 - https://github.com/bearman113/1.md/blob/main/20/csrf.md +CVE-2024-35553 - https://github.com/bearman113/1.md/blob/main/21/csrf.md +CVE-2024-35554 - https://github.com/bearman113/1.md/blob/main/19/csrf.md +CVE-2024-35555 - https://github.com/bearman113/1.md/blob/main/18/csrf.md +CVE-2024-35556 - https://github.com/bearman113/1.md/blob/main/26/csrf.md +CVE-2024-35557 - https://github.com/bearman113/1.md/blob/main/27/csrf.md +CVE-2024-35558 - https://github.com/bearman113/1.md/blob/main/24/csrf.md +CVE-2024-35559 - https://github.com/bearman113/1.md/blob/main/22/csrf.md +CVE-2024-35560 - https://github.com/bearman113/1.md/blob/main/25/csrf.md +CVE-2024-35561 - https://github.com/bearman113/1.md/blob/main/23/csrf.md +CVE-2024-35570 - https://github.com/KakeruJ/CVE/ +CVE-2024-35581 - https://github.com/r04i7/CVE/blob/main/CVE-2024-35581.md +CVE-2024-35581 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-35582 - https://github.com/r04i7/CVE/blob/main/CVE-2024-35582.md +CVE-2024-35582 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-35583 - https://github.com/r04i7/CVE/blob/main/CVE-2024-35583.md +CVE-2024-35583 - https://portswigger.net/web-security/cross-site-scripting/stored +CVE-2024-35591 - https://github.com/o2oa/o2oa/issues/156 +CVE-2024-3567 - https://gitlab.com/qemu-project/qemu/-/issues/2273 +CVE-2024-3580 - https://wpscan.com/vulnerability/31f401c4-735a-4efb-b81f-ab98c00c526b/ +CVE-2024-3582 - https://wpscan.com/vulnerability/5a348b5d-13aa-40c3-9d21-0554683f8019/ +CVE-2024-3590 - https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/ +CVE-2024-3591 - https://wpscan.com/vulnerability/f85d8b61-eaeb-433c-b857-06ee4db5c7d5/ +CVE-2024-3594 - https://wpscan.com/vulnerability/7a8a834a-e5d7-4678-9d35-4390d1200437/ +CVE-2024-36049 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-007/ +CVE-2024-36052 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 +CVE-2024-36080 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf +CVE-2024-36081 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf +CVE-2024-36107 - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since +CVE-2024-36108 - https://github.com/casgate/casgate/security/advisories/GHSA-mj5q-rc67-h56c +CVE-2024-36123 - https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-jhm6-qjhq-5mf9 +CVE-2024-3617 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md +CVE-2024-3618 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md +CVE-2024-3619 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md +CVE-2024-3620 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md +CVE-2024-3621 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md +CVE-2024-3628 - https://wpscan.com/vulnerability/171af8eb-ceeb-403a-abc2-969d9535a4c9/ +CVE-2024-3629 - https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/ +CVE-2024-3630 - https://wpscan.com/vulnerability/cbab7639-fdb2-4ee5-b5ca-9e30701a63b7/ +CVE-2024-3631 - https://wpscan.com/vulnerability/c59a8b49-6f3e-452b-ba9b-50b80c522ee9/ +CVE-2024-3634 - https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/ +CVE-2024-3637 - https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/ +CVE-2024-3641 - https://wpscan.com/vulnerability/f4047f1e-d5ea-425f-8def-76dd5e6a497e/ +CVE-2024-3642 - https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8/ +CVE-2024-3643 - https://wpscan.com/vulnerability/698277e6-56f9-4688-9a84-c2fa3ea9f7dc/ +CVE-2024-3644 - https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/ +CVE-2024-36548 - https://github.com/da271133/cms/blob/main/31/csrf.md +CVE-2024-36550 - https://github.com/da271133/cms/blob/main/29/csrf.md +CVE-2024-3657 - https://bugzilla.redhat.com/show_bug.cgi?id=2274401 +CVE-2024-3660 - https://kb.cert.org/vuls/id/253266 +CVE-2024-3660 - https://www.kb.cert.org/vuls/id/253266 +CVE-2024-3661 - https://news.ycombinator.com/item?id=40279632 +CVE-2024-3661 - https://www.leviathansecurity.com/blog/tunnelvision +CVE-2024-3661 - https://www.leviathansecurity.com/research/tunnelvision +CVE-2024-36674 - https://github.com/LyLme/lylme_spage/issues/91 +CVE-2024-36779 - https://github.com/CveSecLook/cve/issues/42 +CVE-2024-36783 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md +CVE-2024-36800 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md +CVE-2024-36844 - https://github.com/stephane/libmodbus/issues/749 +CVE-2024-36858 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability +CVE-2024-3690 - https://github.com/psudo-bugboy/CVE-2024 +CVE-2024-3691 - https://github.com/nikhil-aniill/Small-CRM-CVE +CVE-2024-3691 - https://vuldb.com/?submit.312975 +CVE-2024-3692 - https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/ +CVE-2024-3695 - https://vuldb.com/?id.260482 +CVE-2024-37017 - https://github.com/cinecert/asdcplib/issues/138 +CVE-2024-3703 - https://wpscan.com/vulnerability/3242b820-1da0-41ba-9f35-7be5dbc6d4b0/ +CVE-2024-37153 - https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc +CVE-2024-37160 - https://github.com/getformwork/formwork/security/advisories/GHSA-5pxr-7m4j-jjc6 +CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md +CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection +CVE-2024-3721 - https://vuldb.com/?id.260573 +CVE-2024-37273 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability +CVE-2024-3735 - https://vuldb.com/?submit.311153 +CVE-2024-3745 - https://fluidattacks.com/advisories/gershwin/ +CVE-2024-3748 - https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/ +CVE-2024-3749 - https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/ +CVE-2024-3752 - https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/ +CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/ +CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/ +CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control +CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py +CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md +CVE-2024-3768 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md +CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md +CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md +CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md +CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md +CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/ +CVE-2024-3823 - https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/ +CVE-2024-3824 - https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/ +CVE-2024-3837 - https://issues.chromium.org/issues/41491379 +CVE-2024-3844 - https://issues.chromium.org/issues/40058873 +CVE-2024-3846 - https://issues.chromium.org/issues/40064754 +CVE-2024-3873 - https://vuldb.com/?submit.312623 +CVE-2024-3874 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md +CVE-2024-3875 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md +CVE-2024-3876 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md +CVE-2024-3877 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md +CVE-2024-3878 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md +CVE-2024-3879 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md +CVE-2024-3880 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md +CVE-2024-3881 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md +CVE-2024-3882 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md +CVE-2024-3903 - https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/ +CVE-2024-3905 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md +CVE-2024-3906 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md +CVE-2024-3907 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md +CVE-2024-3908 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md +CVE-2024-3909 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md +CVE-2024-3909 - https://vuldb.com/?id.261145 +CVE-2024-3910 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md +CVE-2024-3917 - https://wpscan.com/vulnerability/88162016-9fc7-4194-9e81-44c50991f6e9/ +CVE-2024-3918 - https://wpscan.com/vulnerability/2074d0f5-4165-4130-9391-37cb21e8aa1b/ +CVE-2024-3920 - https://wpscan.com/vulnerability/2fb28c77-3c35-4a2f-91ed-823d0d011048/ +CVE-2024-3921 - https://wpscan.com/vulnerability/3c114e14-9113-411d-91f3-2e2daeb40739/ +CVE-2024-3928 - https://github.com/ggfzx/OCP-Security-Misconfiguration/tree/main +CVE-2024-3932 - https://vuldb.com/?submit.314381 +CVE-2024-3937 - https://wpscan.com/vulnerability/0cd5b288-05b3-48b7-9245-f59ce7377861/ +CVE-2024-3939 - https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/ +CVE-2024-3940 - https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/ +CVE-2024-3941 - https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/ +CVE-2024-3948 - https://github.com/xuanluansec/vul/issues/5 +CVE-2024-3979 - https://github.com/COVESA/vsomeip/files/14904610/details.zip +CVE-2024-3979 - https://github.com/COVESA/vsomeip/issues/663 +CVE-2024-4019 - https://github.com/scausoft/cve/blob/main/rce.md +CVE-2024-4040 - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ +CVE-2024-4040 - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ +CVE-2024-4057 - https://wpscan.com/vulnerability/da4d4d87-07b3-4f7d-bcbd-d29968a30b4f/ +CVE-2024-4061 - https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/ +CVE-2024-4064 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md +CVE-2024-4065 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md +CVE-2024-4066 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md +CVE-2024-4068 - https://github.com/micromatch/braces/issues/35 +CVE-2024-4068 - https://github.com/micromatch/braces/pull/37 +CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md +CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md +CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md +CVE-2024-4114 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md +CVE-2024-4115 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formAddDnsForward.md +CVE-2024-4116 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelDhcpRule.md +CVE-2024-4117 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelPortMapping.md +CVE-2024-4118 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindAdd.md +CVE-2024-4119 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindDel.md +CVE-2024-4119 - https://vuldb.com/?id.261862 +CVE-2024-4120 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindModify.md +CVE-2024-4121 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formQOSRuleDel.md +CVE-2024-4122 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetDebugCfg.md +CVE-2024-4123 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetPortMapping.md +CVE-2024-4124 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetRemoteWebManage.md +CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetStaticRoute.md +CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md +CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md +CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66 +CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md +CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md +CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md +CVE-2024-4167 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md +CVE-2024-4168 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md +CVE-2024-4169 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md +CVE-2024-4170 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md +CVE-2024-4171 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md +CVE-2024-4172 - https://github.com/bigbigbigbaby/cms2/blob/main/1.md +CVE-2024-4180 - https://wpscan.com/vulnerability/b2a92316-e404-4a5e-8426-f88df6e87550/ +CVE-2024-4236 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md +CVE-2024-4237 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md +CVE-2024-4238 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md +CVE-2024-4239 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md +CVE-2024-4240 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md +CVE-2024-4241 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md +CVE-2024-4242 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md +CVE-2024-4243 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md +CVE-2024-4244 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md +CVE-2024-4245 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_auto.md +CVE-2024-4246 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md +CVE-2024-4247 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md +CVE-2024-4248 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md +CVE-2024-4249 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md +CVE-2024-4250 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md +CVE-2024-4251 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md +CVE-2024-4252 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md +CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md +CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/ +CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ +CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md +CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md +CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md +CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg +CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/ +CVE-2024-4348 - https://vuldb.com/?submit.320855 +CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19 +CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/ +CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/ +CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/ +CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/ +CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md +CVE-2024-4492 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md +CVE-2024-4493 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md +CVE-2024-4494 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md +CVE-2024-4495 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md +CVE-2024-4496 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterSet.md +CVE-2024-4497 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md +CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md +CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md +CVE-2024-4529 - https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/ +CVE-2024-4530 - https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/ +CVE-2024-4531 - https://wpscan.com/vulnerability/18c1b3bb-9998-416f-a972-c4a51643579c/ +CVE-2024-4532 - https://wpscan.com/vulnerability/64cf5f95-bbf0-4c5f-867b-62f1b7f6a42e/ +CVE-2024-4533 - https://wpscan.com/vulnerability/c3406236-aaee-480a-8931-79c867252f11/ +CVE-2024-4534 - https://wpscan.com/vulnerability/7b0046d4-cf95-4307-95a5-9b823f2daaaa/ +CVE-2024-4535 - https://wpscan.com/vulnerability/d4980886-da10-4bbc-a84a-fe071ab3b755/ +CVE-2024-4536 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198 +CVE-2024-4542 - https://research.cleantalk.org/cve-2024-3548/ +CVE-2024-4542 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/ +CVE-2024-4547 - https://www.tenable.com/security/research/tra-2024-13 +CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13 +CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13 +CVE-2024-4585 - https://github.com/Hckwzh/cms/blob/main/16.md +CVE-2024-4586 - https://github.com/Hckwzh/cms/blob/main/17.md +CVE-2024-4587 - https://github.com/Hckwzh/cms/blob/main/18.md +CVE-2024-4588 - https://github.com/Hckwzh/cms/blob/main/19.md +CVE-2024-4589 - https://github.com/Hckwzh/cms/blob/main/20.md +CVE-2024-4590 - https://github.com/Hckwzh/cms/blob/main/21.md +CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md +CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md +CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md +CVE-2024-4594 - https://github.com/Hckwzh/cms/blob/main/25.md +CVE-2024-4620 - https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/ +CVE-2024-4621 - https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/ +CVE-2024-4644 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss3.md +CVE-2024-4645 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss4.md +CVE-2024-4653 - https://github.com/Hefei-Coffee/cve/blob/main/sql.md +CVE-2024-4654 - https://github.com/Hefei-Coffee/cve/blob/main/sql2.md +CVE-2024-4699 - https://github.com/I-Schnee-I/cev/blob/main/D-LINK-DAR-8000-10_rce_importhtml.md +CVE-2024-4723 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-status.md +CVE-2024-4724 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-type.md +CVE-2024-4725 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_client_user.md +CVE-2024-4726 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_clients.md +CVE-2024-4727 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court-type.md +CVE-2024-4728 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court.md +CVE-2024-4730 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_judge.md +CVE-2024-4731 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_role.md +CVE-2024-4732 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_service.md +CVE-2024-4735 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tasks.md +CVE-2024-4737 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_vendor.md +CVE-2024-4738 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md +CVE-2024-4749 - https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/ +CVE-2024-4750 - https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/ +CVE-2024-4756 - https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/ +CVE-2024-4792 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md +CVE-2024-4793 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md +CVE-2024-4794 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md +CVE-2024-4795 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md +CVE-2024-4796 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md +CVE-2024-4797 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md +CVE-2024-4798 - https://github.com/Hefei-Coffee/cve/blob/main/sql5.md +CVE-2024-4817 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md +CVE-2024-4818 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md +CVE-2024-4819 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md +CVE-2024-4819 - https://vuldb.com/?id.263940 +CVE-2024-4853 - https://gitlab.com/wireshark/wireshark/-/issues/19724 +CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19782 +CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19783 +CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19784 +CVE-2024-4856 - https://wpscan.com/vulnerability/6cf90a27-55e2-4b2c-9df1-5fa34c1bd9d1/ +CVE-2024-4857 - https://wpscan.com/vulnerability/bf1b8434-b361-4666-9058-d9f08c09d083/ +CVE-2024-4860 - https://www.tenable.com/security/research/tra-2024-16 +CVE-2024-4886 - https://wpscan.com/vulnerability/76e8591f-120c-4cd7-b9a2-79f8d4d98aa8/ +CVE-2024-4904 - https://github.com/Hefei-Coffee/cve/blob/main/upload.md +CVE-2024-4912 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md +CVE-2024-4913 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md +CVE-2024-4914 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_ranking-exam.md +CVE-2024-4916 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_selExamAttemptExe.md +CVE-2024-4917 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_submitAnswerExe.md +CVE-2024-4918 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_updateQuestion.md +CVE-2024-4919 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addCourseExe.md +CVE-2024-4920 - https://github.com/CveSecLook/cve/issues/27 +CVE-2024-4923 - https://github.com/polaris0x1/CVE/issues/1 +CVE-2024-4925 - https://github.com/Hefei-Coffee/cve/blob/main/sql6.md +CVE-2024-4946 - https://github.com/CveSecLook/cve/issues/29 +CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30 +CVE-2024-4967 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md +CVE-2024-4973 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md +CVE-2024-4974 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md +CVE-2024-4975 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-2.md +CVE-2024-5003 - https://wpscan.com/vulnerability/1d7d0372-bbc5-40b2-a668-253c819415c4/ +CVE-2024-5046 - https://github.com/CveSecLook/cve/issues/32 +CVE-2024-5047 - https://github.com/I-Schnee-I/cev/blob/main/SourceCodester%20Student%20Management%20System%201.0%20controller.php%20Unrestricted%20Upload.md +CVE-2024-5048 - https://github.com/BurakSevben/CVEs/blob/main/Budget%20Management%20App/Budget%20Management%20App%20-%20SQL%20Injection%20-%201.md +CVE-2024-5049 - https://github.com/polaris0x1/CVE/issues/2 +CVE-2024-5051 - https://vuldb.com/?id.264748 +CVE-2024-5063 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md +CVE-2024-5064 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%202%20(Unauthenticated).md +CVE-2024-5064 - https://vuldb.com/?id.264923 +CVE-2024-5065 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%203%20(Unauthenticated).md +CVE-2024-5066 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%204.md +CVE-2024-5069 - https://vuldb.com/?id.264926 +CVE-2024-5093 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20Authentication%20Bypass.md +CVE-2024-5094 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20SQL%20Injection%20-%202.md +CVE-2024-5097 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20CSRF.md +CVE-2024-5098 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-1.md +CVE-2024-5099 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md +CVE-2024-5100 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-3.md +CVE-2024-5101 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md +CVE-2024-5116 - https://github.com/polaris0x1/CVE/issues/3 +CVE-2024-5117 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md +CVE-2024-5118 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md +CVE-2024-5119 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md +CVE-2024-5120 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md +CVE-2024-5121 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md +CVE-2024-5122 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md +CVE-2024-5123 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md +CVE-2024-5134 - https://github.com/BurakSevben/CVEs/blob/main/Electricity%20Consumption%20Monitoring%20Tool/Electricity%20Consumption%20Monitoring%20Tool%20-%20SQL%20Injection.md +CVE-2024-5135 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20SQL%20Injection%20-%201.md +CVE-2024-5136 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md +CVE-2024-5137 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md +CVE-2024-5138 - https://bugs.launchpad.net/snapd/+bug/2065077 +CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38 +CVE-2024-5350 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5351 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5352 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5353 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5354 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5355 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5356 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf +CVE-2024-5362 - https://github.com/CveSecLook/cve/issues/41 +CVE-2024-5363 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-1.md +CVE-2024-5364 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-2.md +CVE-2024-5365 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-3.md +CVE-2024-5366 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-4.md +CVE-2024-5377 - https://github.com/yuyuliq/cve/issues/1 +CVE-2024-5378 - https://github.com/GAO-UNO/cve/blob/main/sql2.md +CVE-2024-5381 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 +CVE-2024-5390 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 +CVE-2024-5391 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 +CVE-2024-5392 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 +CVE-2024-5393 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 +CVE-2024-5394 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 +CVE-2024-5395 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 +CVE-2024-5396 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 +CVE-2024-5397 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 +CVE-2024-5410 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ +CVE-2024-5411 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ +CVE-2024-5420 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html +CVE-2024-5421 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html +CVE-2024-5422 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html +CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md +CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md +CVE-2024-5516 - https://github.com/ppp-src/ha/issues/3 +CVE-2024-5517 - https://github.com/ppp-src/ha/issues/4 +CVE-2024-5518 - https://github.com/L1OudFd8cl09/CVE/issues/1 +CVE-2024-5519 - https://github.com/L1OudFd8cl09/CVE/issues/2 +CVE-2024-5565 - https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/ +CVE-2024-5588 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 +CVE-2024-5590 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-uploadiscuser.md +CVE-2024-5635 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_a.md +CVE-2024-5636 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_b.md +CVE-2024-5656 - https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/ +CVE-2024-5658 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use +CVE-2024-5745 - https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md +CVE-2024-5758 - https://research.cleantalk.org/cve-2024-4305/ +CVE-2024-5758 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/